From 25c022bc53fc8b05d58e64b03fc072d20bb94bca Mon Sep 17 00:00:00 2001 From: alyagomaa Date: Wed, 22 May 2024 10:50:39 +0000 Subject: [PATCH] update slips files in dataset/CTU-Malware-Capture-Botnet-4/slips/ --- .../slips/alerts.json | 72177 ++++++++-------- .../slips/flows.sqlite | Bin 17022976 -> 16781312 bytes .../slips/metadata/info.txt | 14 +- .../slips/metadata/slips.conf | 129 +- .../slips/metadata/whitelist.conf | 22 +- 5 files changed, 34626 insertions(+), 37716 deletions(-) diff --git a/dataset/CTU-Malware-Capture-Botnet-4/slips/alerts.json b/dataset/CTU-Malware-Capture-Botnet-4/slips/alerts.json index f0b7adc..89ad750 100644 --- a/dataset/CTU-Malware-Capture-Botnet-4/slips/alerts.json +++ b/dataset/CTU-Malware-Capture-Botnet-4/slips/alerts.json @@ -1,37649 +1,34528 @@ -{"Format": "IDEA0", "ID": "c5b94a6e-4e53-4fa7-9962-5b45e083c7f7", "DetectTime": "2023-10-30T13:56:52.198571+02:00", "EventTime": "2023-10-30T13:56:52.198595+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CYm0Pq1ysYrYF3fIc2"]} -{"Format": "IDEA0", "ID": "e9cc6183-683e-4714-b5fe-c9a3deccdccd", "DetectTime": "2023-10-30T13:56:52.208330+02:00", "EventTime": "2023-10-30T13:56:52.208351+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CXEmS02UBKaCebcvc3"]} -{"Format": "IDEA0", "ID": "65671eda-f98c-46b3-93ac-7dc4918e9c19", "DetectTime": "2023-10-30T13:56:52.219529+02:00", "EventTime": "2023-10-30T13:56:52.219551+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CepjDx17NKFX3Irh35"]} -{"Format": "IDEA0", "ID": "c377ceda-bdc1-48c1-b32f-eec88510f947", "DetectTime": "2023-10-30T13:56:52.230030+02:00", "EventTime": "2023-10-30T13:56:52.230050+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["COpELw3z9OPoLeDw8g"]} -{"Format": "IDEA0", "ID": "2ed8ee49-1c1d-4247-b6e1-ceaa0b8247f7", "DetectTime": "2023-10-30T13:56:52.240742+02:00", "EventTime": "2023-10-30T13:56:52.240762+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CFSf7UPcOq0SbHA3j"]} -{"Format": "IDEA0", "ID": "0685db98-9856-4043-8bcf-e764a87ba7df", "DetectTime": "2023-10-30T13:56:52.253059+02:00", "EventTime": "2023-10-30T13:56:52.253082+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CVkwQ726594LJu2El3"]} -{"Format": "IDEA0", "ID": "a2eb2f95-c198-4420-9d2e-925a565a9e14", "DetectTime": "2023-10-30T13:56:52.265484+02:00", "EventTime": "2023-10-30T13:56:52.265502+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CLX4pj4ui07PyM3AZ7"]} -{"Format": "IDEA0", "ID": "ebfb59a0-b57e-4ba4-976c-fb61bb07ef58", "DetectTime": "2023-10-30T13:56:52.278025+02:00", "EventTime": "2023-10-30T13:56:52.278057+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["C8g4m41Hn9HWdCAh6"]} -{"Format": "IDEA0", "ID": "85ba8d42-cc52-4b07-831f-743cbd664e4c", "DetectTime": "2023-10-30T13:56:52.288316+02:00", "EventTime": "2023-10-30T13:56:52.288334+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CxbW074qf3HXgjjZkc"]} -{"Format": "IDEA0", "ID": "c6ab4e50-1b65-41ed-a03b-48ff61d0a63d", "DetectTime": "2023-10-30T13:56:52.381603+02:00", "EventTime": "2023-10-30T13:56:52.381619+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CxCeD34G8cA5e2fH8h"]} -{"Format": "IDEA0", "ID": "02e4807f-d30b-47d9-92c4-560ab2b15d74", "DetectTime": "2023-10-30T13:56:52.496016+02:00", "EventTime": "2023-10-30T13:56:52.496064+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.65.34.100"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100.", "ContentType": "text/plain"}], "uids": ["CZn8KT3urZStTnFSb6"]} -{"Format": "IDEA0", "ID": "dd9e153c-0e3e-477d-8d46-1f95a0c61361", "DetectTime": "2023-10-30T13:56:52.599049+02:00", "EventTime": "2023-10-30T13:56:52.599067+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.94.100.116"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 64.94.100.116.", "ContentType": "text/plain"}], "uids": ["C10SLd4fuziBq6oh6e"]} -{"Format": "IDEA0", "ID": "dc7624b6-23cc-47be-9f54-febefa6d1286", "DetectTime": "2023-10-30T13:56:52.726476+02:00", "EventTime": "2023-10-30T13:56:52.726496+02:00", "Category": ["Anomaly.File"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.169.145.69"], "Type": ["ExecutableMIMEType"]}], "Attach": [{"Content": "download of an executable with mime type: ['application/x-dosexec'] by 10.0.2.19 from 81.169.145.69 .", "ContentType": "text/plain"}], "uids": ["CXyZrU2KFZSVJ6wtTc"]} -{"Format": "IDEA0", "ID": "f774f3bb-1cb5-4010-ae2d-36241780242f", "DetectTime": "2023-10-30T13:56:52.737293+02:00", "EventTime": "2023-10-30T13:56:52.737314+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.169.145.69"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 81.169.145.69.", "ContentType": "text/plain"}], "uids": ["CXyZrU2KFZSVJ6wtTc"]} -{"Format": "IDEA0", "ID": "1d9464b7-68bf-4fb6-8648-ce3b944e0990", "DetectTime": "2023-10-30T13:56:52.853196+02:00", "EventTime": "2023-10-30T13:56:52.853214+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["194.8.30.40"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 194.8.30.40.", "ContentType": "text/plain"}], "uids": ["C2yXC42xTcheA80UC4"]} -{"Format": "IDEA0", "ID": "8ce671a3-db13-4a47-a1af-21632118c475", "DetectTime": "2023-10-30T13:56:52.958044+02:00", "EventTime": "2023-10-30T13:56:52.958068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.4.94.138"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 46.4.94.138.", "ContentType": "text/plain"}], "uids": ["CceBai17Ugf4mqoC4e"]} -{"Format": "IDEA0", "ID": "b80277eb-9cbb-4f3e-8420-747f907b955a", "DetectTime": "2023-10-30T13:56:53.060003+02:00", "EventTime": "2023-10-30T13:56:53.060018+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.9.66.5"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 176.9.66.5.", "ContentType": "text/plain"}], "uids": ["CDfwPJ3h2PXoUbjivi"]} -{"Format": "IDEA0", "ID": "a34b0299-ec9f-463c-a53e-e054b59ac7b1", "DetectTime": "2023-10-30T13:56:53.259488+02:00", "EventTime": "2023-10-30T13:56:53.259508+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.234.161.32"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 109.234.161.32.", "ContentType": "text/plain"}], "uids": ["CN9RRU1M71iAk6JBVb"]} -{"Format": "IDEA0", "ID": "df4ffd56-dfc7-486f-aa61-515a998aa8d0", "DetectTime": "2023-10-30T13:56:53.435180+02:00", "EventTime": "2023-10-30T13:56:53.435201+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CZttBa2EmIFSpfSC5l"]} -{"Format": "IDEA0", "ID": "4349d22e-293f-43bc-a259-0f2e8f815ecc", "DetectTime": "2023-10-30T13:56:53.580631+02:00", "EventTime": "2023-10-30T13:56:53.580653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. ", "ContentType": "text/plain"}], "uids": ["CgFZkX10LdlYha8Qj"]} -{"Format": "IDEA0", "ID": "d63f80df-9462-4434-9669-3c4418c9f869", "DetectTime": "2023-10-30T13:56:53.604678+02:00", "EventTime": "2023-10-30T13:56:53.604696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["CJMawoUUSYYf4G9"]} -{"Format": "IDEA0", "ID": "731dbf56-c5f4-4db1-9095-5f651007bffa", "DetectTime": "2023-10-30T13:56:53.693223+02:00", "EventTime": "2023-10-30T13:56:53.693245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["CkmdEp3NVViLqQiEGb"]} -{"Format": "IDEA0", "ID": "6f7d4205-bf97-44e2-be5d-04005e029764", "DetectTime": "2023-10-30T13:56:53.717965+02:00", "EventTime": "2023-10-30T13:56:53.717979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CCpH6x2DaoH0ZcOUu6"]} -{"Format": "IDEA0", "ID": "7321a8ff-e201-43d0-b004-40b103fbd65e", "DetectTime": "2023-10-30T13:56:53.742405+02:00", "EventTime": "2023-10-30T13:56:53.742430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["C0j7al1aWAl0m9obil"]} -{"Format": "IDEA0", "ID": "c03d2a38-24b6-4a82-a5e8-1665fcd47c05", "DetectTime": "2023-10-30T13:56:53.766747+02:00", "EventTime": "2023-10-30T13:56:53.766767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. ", "ContentType": "text/plain"}], "uids": ["CWc0q53WyUBL7J87x1"]} -{"Format": "IDEA0", "ID": "542c7cd1-cc4b-4f67-8cb8-64da74a3da4e", "DetectTime": "2023-10-30T13:56:53.793061+02:00", "EventTime": "2023-10-30T13:56:53.793082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["CI7bW221uanE9qawAg"]} -{"Format": "IDEA0", "ID": "b3edcf34-26e2-4005-999d-00a665128646", "DetectTime": "2023-10-30T13:56:53.818143+02:00", "EventTime": "2023-10-30T13:56:53.818161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["Cy3zqt1CFLbgByVo8"]} -{"Format": "Json", "ID": "b3edcf34-26e2-4005-999d-00a665128646", "DetectTime": "2023-10-30T13:56:53.818143+02:00", "EventTime": "2023-10-30T13:56:53.818161+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:03:56.690661+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:53.871335)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "da027c10-883c-4ca3-b987-4339b87120f0", "DetectTime": "2023-10-30T13:56:53.878211+02:00", "EventTime": "2023-10-30T13:56:53.878234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["Cupg1624oIJdwmmDnh"]} -{"Format": "IDEA0", "ID": "945553dc-250c-4e88-a6d5-620baeee265b", "DetectTime": "2023-10-30T13:56:53.900163+02:00", "EventTime": "2023-10-30T13:56:53.900181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. ", "ContentType": "text/plain"}], "uids": ["ClNuh21YTwkRn5dI23"]} -{"Format": "IDEA0", "ID": "777b1c3a-fd24-4307-b1d4-d6e3b1d43125", "DetectTime": "2023-10-30T13:56:53.920301+02:00", "EventTime": "2023-10-30T13:56:53.920325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7057], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. ", "ContentType": "text/plain"}], "uids": ["Cp5NE02P7IwqZQg4Fk"]} -{"Format": "IDEA0", "ID": "e663dc1e-fdaf-49c2-9fd5-7dca1683a037", "DetectTime": "2023-10-30T13:56:53.938966+02:00", "EventTime": "2023-10-30T13:56:53.938988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CtnYIp36GRntfLbRhg"]} -{"Format": "IDEA0", "ID": "d772df97-37ef-4645-a624-490f307c647d", "DetectTime": "2023-10-30T13:56:53.960956+02:00", "EventTime": "2023-10-30T13:56:53.960978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20246], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20246/UDP destination IP 178.223.239.27. ", "ContentType": "text/plain"}], "uids": ["CgQQo808s4X1UCCF7"]} -{"Format": "IDEA0", "ID": "f7fcd47e-d88b-4881-b908-36d27c8fc2f9", "DetectTime": "2023-10-30T13:56:53.980308+02:00", "EventTime": "2023-10-30T13:56:53.980325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CwbWMZ3FxLlrD9mtx9"]} -{"Format": "IDEA0", "ID": "1cd2fb0e-dc7e-4e11-9ce5-d177ff61ee84", "DetectTime": "2023-10-30T13:56:54.008048+02:00", "EventTime": "2023-10-30T13:56:54.008068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["C3PdBH3fjFPynU7Y74"]} -{"Format": "IDEA0", "ID": "2703f04d-aa64-42e7-94d9-ce302a493f86", "DetectTime": "2023-10-30T13:56:54.036442+02:00", "EventTime": "2023-10-30T13:56:54.036461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["Ch4Huy4d0IZXzSNHic"]} -{"Format": "Json", "ID": "2703f04d-aa64-42e7-94d9-ce302a493f86", "DetectTime": "2023-10-30T13:56:54.036442+02:00", "EventTime": "2023-10-30T13:56:54.036461+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:04:02.264403+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:54.090058)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "32bb5690-c595-41c4-a56c-c8b1c2f7034c", "DetectTime": "2023-10-30T13:56:54.096413+02:00", "EventTime": "2023-10-30T13:56:54.096435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CdJodz2MboRiUgXpIl"]} -{"Format": "IDEA0", "ID": "bb8c3a9c-3f7a-414b-bbad-15798451be83", "DetectTime": "2023-10-30T13:56:54.140813+02:00", "EventTime": "2023-10-30T13:56:54.140832+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3U5A4XYIvu1mnonj"]} -{"Format": "IDEA0", "ID": "49755249-3959-4640-aa3d-24565323d1b3", "DetectTime": "2023-10-30T13:56:54.186026+02:00", "EventTime": "2023-10-30T13:56:54.186040+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.255 on destination port: 137", "ContentType": "text/plain"}], "uids": ["Cy0aGx3MDww1p4Wa"]} -{"Format": "IDEA0", "ID": "596b8866-223b-493b-aa5c-6b302718088c", "DetectTime": "2023-10-30T13:56:54.335917+02:00", "EventTime": "2023-10-30T13:56:54.335934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CwSvZfdwrzSq0Jp6d"]} -{"Format": "IDEA0", "ID": "430986cc-7b51-4d25-bfa1-aa356974cae7", "DetectTime": "2023-10-30T13:56:54.364031+02:00", "EventTime": "2023-10-30T13:56:54.364056+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CMfi6O1b5fyGaFkv5j"]} -{"Format": "IDEA0", "ID": "13697475-454a-4026-9eed-701b9aa4817c", "DetectTime": "2023-10-30T13:56:54.452327+02:00", "EventTime": "2023-10-30T13:56:54.452349+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5Ze9P3zQRwWeBjIxc"]} -{"Format": "IDEA0", "ID": "976b7c06-7e5b-49bb-b07d-659c387853f7", "DetectTime": "2023-10-30T13:56:54.501165+02:00", "EventTime": "2023-10-30T13:56:54.501178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CrdtbF4SXMCV6qYWrh"]} -{"Format": "IDEA0", "ID": "07b9bc7d-28d3-4ca6-9d86-c6489a4efcbd", "DetectTime": "2023-10-30T13:56:54.599621+02:00", "EventTime": "2023-10-30T13:56:54.599648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11925/UDP destination IP 79.154.42.157. ", "ContentType": "text/plain"}], "uids": ["COevIB2sFGxMnDGr2"]} -{"Format": "IDEA0", "ID": "74bb2ac8-fb78-4f30-9121-f5a9a8a90767", "DetectTime": "2023-10-30T13:56:54.661899+02:00", "EventTime": "2023-10-30T13:56:54.661919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["C6hKs436nF5QR9Th4j"]} -{"Format": "IDEA0", "ID": "c284dfaa-2d07-43dc-b4d1-a6af8712c658", "DetectTime": "2023-10-30T13:56:54.697704+02:00", "EventTime": "2023-10-30T13:56:54.697722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["Ceh8P1LiHW4ru0LEc"]} -{"Format": "IDEA0", "ID": "65111166-5498-44e9-8add-cc5b16cc4eda", "DetectTime": "2023-10-30T13:56:54.744663+02:00", "EventTime": "2023-10-30T13:56:54.744689+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 protocol: ICMP", "ContentType": "text/plain"}], "uids": ["CsdsLd41ydG0BFC4T9"]} -{"Format": "IDEA0", "ID": "c18a8019-d9e3-411a-b399-94908074b0ad", "DetectTime": "2023-10-30T13:56:54.811106+02:00", "EventTime": "2023-10-30T13:56:54.811124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CCiQDh2uFJb09HdD38"]} -{"Format": "IDEA0", "ID": "b0d45a80-704c-41f4-97cf-d0b6dc27ae61", "DetectTime": "2023-10-30T13:56:54.854867+02:00", "EventTime": "2023-10-30T13:56:54.854887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20807/UDP destination IP 41.96.126.57. ", "ContentType": "text/plain"}], "uids": ["CJfKvo4r1OKriRO9p3"]} -{"Format": "Json", "ID": "b0d45a80-704c-41f4-97cf-d0b6dc27ae61", "DetectTime": "2023-10-30T13:56:54.854867+02:00", "EventTime": "2023-10-30T13:56:54.854887+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20807], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:04:59.769612+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:54.926432)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "da6feffa-acc2-4e84-88e8-d30ee315eb77", "DetectTime": "2023-10-30T13:56:54.932482+02:00", "EventTime": "2023-10-30T13:56:54.932504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13639], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13639/UDP destination IP 188.169.52.202. ", "ContentType": "text/plain"}], "uids": ["COBsKd239UfGcD4oH"]} -{"Format": "IDEA0", "ID": "f61d885e-92cd-491e-aa67-1848e6b83b91", "DetectTime": "2023-10-30T13:56:55.041639+02:00", "EventTime": "2023-10-30T13:56:55.041659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9545], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 9545/TCP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CQvXMx1V9930NAYYE5"]} -{"Format": "IDEA0", "ID": "c3b8d1d4-1581-4ea6-90c1-10c0036df509", "DetectTime": "2023-10-30T13:56:55.087962+02:00", "EventTime": "2023-10-30T13:56:55.087982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7227], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 7227/TCP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CLOqCf3snPygo1cJEg"]} -{"Format": "IDEA0", "ID": "0a8e2ab5-0783-4b0f-806d-9d479a9d7635", "DetectTime": "2023-10-30T13:56:55.121875+02:00", "EventTime": "2023-10-30T13:56:55.121899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["Cbm1HA19QRlKhvnTI1"]} -{"Format": "IDEA0", "ID": "8f7b1668-0c37-49fa-911a-987f6e908d4a", "DetectTime": "2023-10-30T13:56:55.179164+02:00", "EventTime": "2023-10-30T13:56:55.179184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CPU0HG3bCQH6KTtbh9"]} -{"Format": "IDEA0", "ID": "685ff12d-a400-445e-a419-ac9d4ef4be1d", "DetectTime": "2023-10-30T13:56:55.265165+02:00", "EventTime": "2023-10-30T13:56:55.265184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CVmHDv3mwWd6aaKjId"]} -{"Format": "IDEA0", "ID": "a84451af-653e-44b6-958f-7441dc276e65", "DetectTime": "2023-10-30T13:56:55.306920+02:00", "EventTime": "2023-10-30T13:56:55.306941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CtvBa64gMKxv0rWUz5"]} -{"Format": "IDEA0", "ID": "ba229493-8ce4-470f-8994-de71ae2334aa", "DetectTime": "2023-10-30T13:56:55.336929+02:00", "EventTime": "2023-10-30T13:56:55.336951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CEWz2J3ftkDEypQP3e"]} -{"Format": "Json", "ID": "ba229493-8ce4-470f-8994-de71ae2334aa", "DetectTime": "2023-10-30T13:56:55.336929+02:00", "EventTime": "2023-10-30T13:56:55.336951+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:06:27.728747+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:55.398322)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ce7cd27b-c47a-462a-868e-25dee65a63ab", "DetectTime": "2023-10-30T13:56:55.404650+02:00", "EventTime": "2023-10-30T13:56:55.404669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CvL8ak3jI5qRBUKTg2"]} -{"Format": "IDEA0", "ID": "7a8f2896-60b7-4dda-ba35-4d38ef2ac754", "DetectTime": "2023-10-30T13:56:55.438099+02:00", "EventTime": "2023-10-30T13:56:55.438123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["CwTMUc3J4NVOa24Wgd"]} -{"Format": "IDEA0", "ID": "ac5edfa9-8abf-424a-828f-b264ea445126", "DetectTime": "2023-10-30T13:56:55.740303+02:00", "EventTime": "2023-10-30T13:56:55.740320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6717], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. ", "ContentType": "text/plain"}], "uids": ["CXDOV51rODSD3KLdJe"]} -{"Format": "IDEA0", "ID": "7f1d0d5c-03be-4ac0-9836-754efc8a1cda", "DetectTime": "2023-10-30T13:56:55.771039+02:00", "EventTime": "2023-10-30T13:56:55.771056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["Crty5g1roloYO7aOAg"]} -{"Format": "IDEA0", "ID": "00ad4657-50b2-4528-a0c1-124cb77c242e", "DetectTime": "2023-10-30T13:56:55.805117+02:00", "EventTime": "2023-10-30T13:56:55.805138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CVKuUJPsir7MHcwta"]} -{"Format": "IDEA0", "ID": "eecc8f80-09dd-40be-9a98-6934331527c4", "DetectTime": "2023-10-30T13:56:56.014994+02:00", "EventTime": "2023-10-30T13:56:56.015018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["CTZv7r3zolfaglQV8"]} -{"Format": "IDEA0", "ID": "2758f78b-761f-4f64-8aae-8b2e80934ce4", "DetectTime": "2023-10-30T13:56:56.074606+02:00", "EventTime": "2023-10-30T13:56:56.074626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["ClbQlj2iGv97ChsEj"]} -{"Format": "IDEA0", "ID": "1999d005-64e0-454f-9c2a-d0a7bd23027a", "DetectTime": "2023-10-30T13:56:56.229690+02:00", "EventTime": "2023-10-30T13:56:56.229715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Csv62N1GxluNwkRVv1"]} -{"Format": "Json", "ID": "1999d005-64e0-454f-9c2a-d0a7bd23027a", "DetectTime": "2023-10-30T13:56:56.229690+02:00", "EventTime": "2023-10-30T13:56:56.229715+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:09:44.012898+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:56.289843)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1d1197b4-6b5e-4842-8aa1-3f9d93034820", "DetectTime": "2023-10-30T13:56:56.297581+02:00", "EventTime": "2023-10-30T13:56:56.297600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CGqExsvTdwoJECAJ2"]} -{"Format": "IDEA0", "ID": "1215f546-11f7-4251-b091-217f5b8d757e", "DetectTime": "2023-10-30T13:56:56.330162+02:00", "EventTime": "2023-10-30T13:56:56.330186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CgX1292dvUOnJtugB"]} -{"Format": "IDEA0", "ID": "68a2d5e0-5fe3-4508-ac5a-af0efaf13e31", "DetectTime": "2023-10-30T13:56:56.414605+02:00", "EventTime": "2023-10-30T13:56:56.414625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10008/UDP destination IP 62.98.95.219. ", "ContentType": "text/plain"}], "uids": ["C2UZCV3cVkyiV0AJz"]} -{"Format": "IDEA0", "ID": "ca966c75-4cec-4dda-a9e8-e05172133de6", "DetectTime": "2023-10-30T13:56:56.731799+02:00", "EventTime": "2023-10-30T13:56:56.731822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11230], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11230/UDP destination IP 181.65.3.210. ", "ContentType": "text/plain"}], "uids": ["C9eXgz19E7Jdgp8Sc9"]} -{"Format": "IDEA0", "ID": "ea8c2c23-ec02-4e58-ad0f-ca01b9280dbc", "DetectTime": "2023-10-30T13:56:56.806953+02:00", "EventTime": "2023-10-30T13:56:56.806972+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CKfTin2cs9ZArlKlb2"]} -{"Format": "IDEA0", "ID": "a3d8e9e7-57fe-4f51-a9d9-d288ed6a8abb", "DetectTime": "2023-10-30T13:56:56.949019+02:00", "EventTime": "2023-10-30T13:56:56.949037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9532], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9532/UDP destination IP 108.92.1.214. ", "ContentType": "text/plain"}], "uids": ["ChIlRJ2EQDpLvkLhQf"]} -{"Format": "IDEA0", "ID": "589d2b2b-4644-41f0-b00e-dc8c3fe7778a", "DetectTime": "2023-10-30T13:56:57.030616+02:00", "EventTime": "2023-10-30T13:56:57.030637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. ", "ContentType": "text/plain"}], "uids": ["CbL6Ce2qEEaG4aFiO9"]} -{"Format": "IDEA0", "ID": "f9b7cc9a-9b1c-4e36-a703-d22f908344fc", "DetectTime": "2023-10-30T13:56:57.069978+02:00", "EventTime": "2023-10-30T13:56:57.070001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["Cv0BEa1RuTJSqPNjvd"]} -{"Format": "IDEA0", "ID": "75f2a5b6-dd1b-4744-b4ee-f07140555d2a", "DetectTime": "2023-10-30T13:56:57.109042+02:00", "EventTime": "2023-10-30T13:56:57.109069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["CqmMd52QdxMatbmDfd"]} -{"Format": "Json", "ID": "75f2a5b6-dd1b-4744-b4ee-f07140555d2a", "DetectTime": "2023-10-30T13:56:57.109042+02:00", "EventTime": "2023-10-30T13:56:57.109069+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:11:40.595433+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:57.183489)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5c6331d3-097e-4ada-91c4-d2127ba11cf8", "DetectTime": "2023-10-30T13:56:57.190609+02:00", "EventTime": "2023-10-30T13:56:57.190622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["C9TLXY1Zlqx6aA5vNb"]} -{"Format": "IDEA0", "ID": "b6728b8e-c54f-489d-86cf-6854bb51a9c3", "DetectTime": "2023-10-30T13:56:57.227467+02:00", "EventTime": "2023-10-30T13:56:57.227484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. ", "ContentType": "text/plain"}], "uids": ["CU6KLE1u7iNpwEYvh1"]} -{"Format": "IDEA0", "ID": "dd4ca73a-d179-4030-8435-d355b7c535da", "DetectTime": "2023-10-30T13:56:57.262072+02:00", "EventTime": "2023-10-30T13:56:57.262093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["CNhIu22PvR9FaodlDb"]} -{"Format": "IDEA0", "ID": "65b5071f-290b-4187-a61a-2bb54428b6ff", "DetectTime": "2023-10-30T13:56:57.309392+02:00", "EventTime": "2023-10-30T13:56:57.309413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["CZwDym40G0Uafr7Is6"]} -{"Format": "IDEA0", "ID": "8d6c3a70-b6a6-440b-a1aa-024b5b8fab57", "DetectTime": "2023-10-30T13:56:57.347233+02:00", "EventTime": "2023-10-30T13:56:57.347274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CM9P0R3lAp0iOEKOM7"]} -{"Format": "IDEA0", "ID": "c79f7bd3-fd09-4962-b7eb-4588caa96337", "DetectTime": "2023-10-30T13:56:57.376661+02:00", "EventTime": "2023-10-30T13:56:57.376677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CNZceE3cXkBGtDdGz3"]} -{"Format": "IDEA0", "ID": "1bce69c8-4c9d-436d-afa5-3639a86c05f4", "DetectTime": "2023-10-30T13:56:57.421319+02:00", "EventTime": "2023-10-30T13:56:57.421340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. ", "ContentType": "text/plain"}], "uids": ["C5OXdw3vUhJLjBgY49"]} -{"Format": "IDEA0", "ID": "e6081637-b4f4-4242-ab16-f23c2a4941e6", "DetectTime": "2023-10-30T13:56:57.468418+02:00", "EventTime": "2023-10-30T13:56:57.470189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7057], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. ", "ContentType": "text/plain"}], "uids": ["CndxVu1zCjK3n8NZz6"]} -{"Format": "Json", "ID": "e6081637-b4f4-4242-ab16-f23c2a4941e6", "DetectTime": "2023-10-30T13:56:57.468418+02:00", "EventTime": "2023-10-30T13:56:57.470189+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7057], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:11:42.670611+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:57.586669)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6353b0e-3c7c-4953-914a-adaaf421fde5", "DetectTime": "2023-10-30T13:56:57.607250+02:00", "EventTime": "2023-10-30T13:56:57.607274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20246], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20246/UDP destination IP 178.223.239.27. ", "ContentType": "text/plain"}], "uids": ["CZex6Z3i88q3dULEzl"]} -{"Format": "IDEA0", "ID": "de09ff9b-bcf3-475c-b266-3e91421282c9", "DetectTime": "2023-10-30T13:56:57.643643+02:00", "EventTime": "2023-10-30T13:56:57.643661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["Cq9ASa3JjXV0yp8Xdk"]} -{"Format": "IDEA0", "ID": "98cc6cc6-2313-4a87-8b25-32f73314c2b8", "DetectTime": "2023-10-30T13:56:57.686279+02:00", "EventTime": "2023-10-30T13:56:57.686299+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSKzOX2ViddrVHSZf3"]} -{"Format": "IDEA0", "ID": "85bd887d-b408-4c96-a975-11251918b29e", "DetectTime": "2023-10-30T13:56:57.721874+02:00", "EventTime": "2023-10-30T13:56:57.721893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CBTSRD4pBgWU5K10H9"]} -{"Format": "IDEA0", "ID": "38cf6565-369a-49e0-9a50-1b0738c90375", "DetectTime": "2023-10-30T13:56:57.759246+02:00", "EventTime": "2023-10-30T13:56:57.759265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CORvOC43RlU1KvYE93"]} -{"Format": "IDEA0", "ID": "da335bf0-5a57-4cda-8396-d638e14ef618", "DetectTime": "2023-10-30T13:56:57.804938+02:00", "EventTime": "2023-10-30T13:56:57.804968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CRrTEo4u30z8balJc8"]} -{"Format": "IDEA0", "ID": "48909d85-e84f-46d0-b854-bade2aee1cb3", "DetectTime": "2023-10-30T13:56:57.857010+02:00", "EventTime": "2023-10-30T13:56:57.857026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["C2ksLF3q0e2Z8eOYPd"]} -{"Format": "IDEA0", "ID": "f5657ac0-86ae-4902-b7a2-725d366d2898", "DetectTime": "2023-10-30T13:56:57.905574+02:00", "EventTime": "2023-10-30T13:56:57.905594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11925/UDP destination IP 79.154.42.157. ", "ContentType": "text/plain"}], "uids": ["C7Tvz73Yff9rgYokv1"]} -{"Format": "IDEA0", "ID": "c7fbb8f0-3ee4-4619-96d9-82084d4fb298", "DetectTime": "2023-10-30T13:56:57.940173+02:00", "EventTime": "2023-10-30T13:56:57.940206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CmweZb20rPSsh9r6S7"]} -{"Format": "IDEA0", "ID": "73eab5b8-a411-4158-b28c-420686b5faa8", "DetectTime": "2023-10-30T13:56:57.996055+02:00", "EventTime": "2023-10-30T13:56:57.996083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["CYNdlkPXsgTFTLftl"]} -{"Format": "Json", "ID": "73eab5b8-a411-4158-b28c-420686b5faa8", "DetectTime": "2023-10-30T13:56:57.996055+02:00", "EventTime": "2023-10-30T13:56:57.996083+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:12:00.331454+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:58.084441)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d1a00a81-54fd-44f3-a7f9-3ce78da39d7e", "DetectTime": "2023-10-30T13:56:58.091101+02:00", "EventTime": "2023-10-30T13:56:58.091122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CHApzJ21jQYUZuFU8c"]} -{"Format": "IDEA0", "ID": "c05f0a2f-25c6-48c8-806e-415d6bc9574f", "DetectTime": "2023-10-30T13:56:58.130582+02:00", "EventTime": "2023-10-30T13:56:58.130607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20807/UDP destination IP 41.96.126.57. ", "ContentType": "text/plain"}], "uids": ["CgeAJB467g1bPOEhi"]} -{"Format": "IDEA0", "ID": "cb23f705-91c0-473a-ba34-f64d77d78793", "DetectTime": "2023-10-30T13:56:58.184656+02:00", "EventTime": "2023-10-30T13:56:58.184680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13639], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13639/UDP destination IP 188.169.52.202. ", "ContentType": "text/plain"}], "uids": ["CfTwmL16tHTzdSovra"]} -{"Format": "IDEA0", "ID": "1253c079-ba6a-4430-b94a-24c3cd31c77a", "DetectTime": "2023-10-30T13:56:58.224201+02:00", "EventTime": "2023-10-30T13:56:58.224222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CA6b5N3y7ULuq87Fy2"]} -{"Format": "IDEA0", "ID": "956cf53d-8dd4-4964-b3f2-79a8466b8cae", "DetectTime": "2023-10-30T13:56:58.279348+02:00", "EventTime": "2023-10-30T13:56:58.279382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C5kOtbxl0BcSehXe7"]} -{"Format": "IDEA0", "ID": "632d6ca2-889a-4fa7-9f38-a56ba4f09ac3", "DetectTime": "2023-10-30T13:56:58.324767+02:00", "EventTime": "2023-10-30T13:56:58.324785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CLlFl422pFFXgvtZk3"]} -{"Format": "IDEA0", "ID": "e34bb289-5441-4f0d-9c5c-84eb1650e39e", "DetectTime": "2023-10-30T13:56:58.374159+02:00", "EventTime": "2023-10-30T13:56:58.374174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CE0mzO2naIehvkp4Uh"]} -{"Format": "IDEA0", "ID": "c17c6617-732a-44ae-ab88-dc08ab206a2a", "DetectTime": "2023-10-30T13:56:58.448770+02:00", "EventTime": "2023-10-30T13:56:58.448792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CWrolyrQv4HYQXcl3"]} -{"Format": "Json", "ID": "c17c6617-732a-44ae-ab88-dc08ab206a2a", "DetectTime": "2023-10-30T13:56:58.448770+02:00", "EventTime": "2023-10-30T13:56:58.448792+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:12:02.114255+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:58.586950)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a98a7a60-38d5-4525-8aa1-93c4b372844d", "DetectTime": "2023-10-30T13:56:58.594940+02:00", "EventTime": "2023-10-30T13:56:58.594966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CNp8Z4Pcp0eEGIHn5"]} -{"Format": "IDEA0", "ID": "207a4848-d999-40c4-b13e-641ca7368a7d", "DetectTime": "2023-10-30T13:56:58.649319+02:00", "EventTime": "2023-10-30T13:56:58.649337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["Cez3MQ2HMCIqaAov68"]} -{"Format": "IDEA0", "ID": "e38a4b08-bd8a-4b57-bb89-45929c3a321d", "DetectTime": "2023-10-30T13:56:58.696356+02:00", "EventTime": "2023-10-30T13:56:58.696376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6717], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. ", "ContentType": "text/plain"}], "uids": ["CHGk5Y2FUDx9TmQKD4"]} -{"Format": "IDEA0", "ID": "2f2d9305-8d3c-4883-b7a1-0566a411a4e5", "DetectTime": "2023-10-30T13:56:58.751309+02:00", "EventTime": "2023-10-30T13:56:58.751327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CMqlBS1dO9D6Mo25Cf"]} -{"Format": "IDEA0", "ID": "8273b601-74ca-40a1-bddd-82085b1e6104", "DetectTime": "2023-10-30T13:56:58.816637+02:00", "EventTime": "2023-10-30T13:56:58.816659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CACs3z3PwjzUj8Vwed"]} -{"Format": "IDEA0", "ID": "05034deb-3142-4e5c-b743-81a16ff6dae3", "DetectTime": "2023-10-30T13:56:58.875072+02:00", "EventTime": "2023-10-30T13:56:58.875124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["CRuwhA1pya95zovRV6"]} -{"Format": "IDEA0", "ID": "97bc47c3-1430-4b4b-8f85-0440169952e9", "DetectTime": "2023-10-30T13:56:58.937077+02:00", "EventTime": "2023-10-30T13:56:58.937107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CHxW6Y1wEHOi6JPeX6"]} -{"Format": "IDEA0", "ID": "c19ab958-d285-4b31-ab64-200317ddcfbe", "DetectTime": "2023-10-30T13:56:58.999042+02:00", "EventTime": "2023-10-30T13:56:58.999061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Ck973I2MitY31bvaOc"]} -{"Format": "IDEA0", "ID": "4eda8697-f663-4d60-90f8-df8423a15837", "DetectTime": "2023-10-30T13:56:59.273285+02:00", "EventTime": "2023-10-30T13:56:59.273312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CMfi6O1b5fyGaFkv5j", "CZttBa2EmIFSpfSC5l", "CJbYz04Fa3whrjp8Yc", "CKfTin2cs9ZArlKlb2"]} -{"Format": "Json", "ID": "4eda8697-f663-4d60-90f8-df8423a15837", "DetectTime": "2023-10-30T13:56:59.273285+02:00", "EventTime": "2023-10-30T13:56:59.273312+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "1970-01-01T02:42:32.622968+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:56:59.413909)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9bf40cd7-4d26-4cad-91c5-265b8454859d", "DetectTime": "2023-10-30T13:56:59.424098+02:00", "EventTime": "2023-10-30T13:56:59.424121+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CJbYz04Fa3whrjp8Yc"]} -{"Format": "IDEA0", "ID": "7762c481-2390-4071-ae9b-b6907fe79deb", "DetectTime": "2023-10-30T13:56:59.501739+02:00", "EventTime": "2023-10-30T13:56:59.501763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CsT8Wp3efPCztZ30W8"]} -{"Format": "IDEA0", "ID": "3f748930-bec1-4353-9352-001b55a0f27a", "DetectTime": "2023-10-30T13:56:59.569490+02:00", "EventTime": "2023-10-30T13:56:59.569518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr1bNp3t8il8HuLirk"]} -{"Format": "IDEA0", "ID": "d323efa7-a7f4-42b3-a226-287f5975ff7d", "DetectTime": "2023-10-30T13:56:59.644988+02:00", "EventTime": "2023-10-30T13:56:59.645009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CoaICCCpXjgNFkGS2"]} -{"Format": "IDEA0", "ID": "e950868c-11ee-44a4-8c25-0665940499c4", "DetectTime": "2023-10-30T13:56:59.706661+02:00", "EventTime": "2023-10-30T13:56:59.706681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10008/UDP destination IP 62.98.95.219. ", "ContentType": "text/plain"}], "uids": ["ClT45P1VpVgLvUv93k"]} -{"Format": "IDEA0", "ID": "9a140fec-bd26-4d6e-ae7f-6224bece6b55", "DetectTime": "2023-10-30T13:56:59.761734+02:00", "EventTime": "2023-10-30T13:56:59.761755+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C5rXKnJ2CoalbvBL7"]} -{"Format": "IDEA0", "ID": "f8b66ba7-038a-421a-a358-d86ecc532203", "DetectTime": "2023-10-30T13:56:59.820482+02:00", "EventTime": "2023-10-30T13:56:59.820502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11230], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11230/UDP destination IP 181.65.3.210. ", "ContentType": "text/plain"}], "uids": ["C6t6di7vW6esRTFng"]} -{"Format": "IDEA0", "ID": "5434c875-7c21-4d86-8724-695f4bebcf53", "DetectTime": "2023-10-30T13:56:59.872017+02:00", "EventTime": "2023-10-30T13:56:59.872092+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cm993D4myVLi49Ly2g"]} -{"Format": "IDEA0", "ID": "4ffbea34-57b3-433c-836e-6d7caa9160a4", "DetectTime": "2023-10-30T13:56:59.942353+02:00", "EventTime": "2023-10-30T13:56:59.942375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Cl0tRX1I3NVOmSvN7f"]} -{"Format": "IDEA0", "ID": "01fcad03-e06c-40df-bbf6-e516395a99b5", "DetectTime": "2023-10-30T13:56:59.994463+02:00", "EventTime": "2023-10-30T13:56:59.994482+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cuj9tb1zNnmB9vnlc"]} -{"Format": "IDEA0", "ID": "6610dd65-9927-414a-9526-c0ebf8f03332", "DetectTime": "2023-10-30T13:57:00.050551+02:00", "EventTime": "2023-10-30T13:57:00.050579+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKcxd528u9Pt7UG86a"]} -{"Format": "IDEA0", "ID": "0fb70bc3-c1d8-4b4e-9bd0-4a3b8bd66dd6", "DetectTime": "2023-10-30T13:57:00.165122+02:00", "EventTime": "2023-10-30T13:57:00.165148+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CepCOZSbzViI3pN4f"]} -{"Format": "IDEA0", "ID": "1fccd5ec-f44f-4ff3-bfae-8f290c82cfe2", "DetectTime": "2023-10-30T13:57:00.224975+02:00", "EventTime": "2023-10-30T13:57:00.224995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. ", "ContentType": "text/plain"}], "uids": ["Cawvjv3bg8RH9cm1P3"]} -{"Format": "IDEA0", "ID": "83d81b7c-4ca1-4c50-9918-e6a3735fe397", "DetectTime": "2023-10-30T13:57:00.274641+02:00", "EventTime": "2023-10-30T13:57:00.274658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CdIIy13V61CMKchmkj"]} -{"Format": "IDEA0", "ID": "f2a11807-a151-458d-98b8-bd599286092d", "DetectTime": "2023-10-30T13:57:00.345788+02:00", "EventTime": "2023-10-30T13:57:00.345811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. ", "ContentType": "text/plain"}], "uids": ["CBrkgffyAdckR7rig"]} -{"Format": "Json", "ID": "f2a11807-a151-458d-98b8-bd599286092d", "DetectTime": "2023-10-30T13:57:00.345788+02:00", "EventTime": "2023-10-30T13:57:00.345811+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:42:33.724458+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:57:00.480707)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "227644d8-b9fa-464a-8a93-f604a94c14c9", "DetectTime": "2023-10-30T13:57:00.487636+02:00", "EventTime": "2023-10-30T13:57:00.487679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["CH5GhaF4cG8FO5M2k"]} -{"Format": "IDEA0", "ID": "433ff413-869e-48f8-82bd-44b309b8c3e5", "DetectTime": "2023-10-30T13:57:00.553939+02:00", "EventTime": "2023-10-30T13:57:00.553958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["C4KFLa4SrCldad1Hyd"]} -{"Format": "IDEA0", "ID": "6ae7916b-d797-4692-8837-27144bee1c4f", "DetectTime": "2023-10-30T13:57:00.632234+02:00", "EventTime": "2023-10-30T13:57:00.632260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["CLCyVg20Va8cZX8bc"]} -{"Format": "IDEA0", "ID": "0b61ae79-bbc6-4f06-bb2c-63691bc86f19", "DetectTime": "2023-10-30T13:57:00.702280+02:00", "EventTime": "2023-10-30T13:57:00.702303+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8M6Nq2CRYPK3WnFxe"]} -{"Format": "IDEA0", "ID": "cf4835a0-c3ff-46ae-ab60-6b9815e4abe3", "DetectTime": "2023-10-30T13:57:00.769910+02:00", "EventTime": "2023-10-30T13:57:00.769932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CBfDIP1EHB3VM9KAxi"]} -{"Format": "IDEA0", "ID": "79c01893-6a2e-495c-9f3e-78f22f8f2073", "DetectTime": "2023-10-30T13:57:00.841741+02:00", "EventTime": "2023-10-30T13:57:00.841765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CBzDB01HaC1PUTxf4h"]} -{"Format": "IDEA0", "ID": "a2db3543-5b1b-4ac4-8e27-e64680ea6baa", "DetectTime": "2023-10-30T13:57:00.927777+02:00", "EventTime": "2023-10-30T13:57:00.927800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["ChuYp71KuEhq6iBye3"]} -{"Format": "IDEA0", "ID": "bd92c5a9-476a-4c4f-a198-299bdbfe853f", "DetectTime": "2023-10-30T13:57:00.993530+02:00", "EventTime": "2023-10-30T13:57:00.993552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CepCOZSbzViI3pN4f", "C5rXKnJ2CoalbvBL7", "Cuj9tb1zNnmB9vnlc", "CLTySK1sZjyQAQlq4d"]} -{"Format": "IDEA0", "ID": "83991917-01f4-49e1-8ccb-71d360c5630e", "DetectTime": "2023-10-30T13:57:01.061378+02:00", "EventTime": "2023-10-30T13:57:01.061498+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CLTySK1sZjyQAQlq4d"]} -{"Format": "IDEA0", "ID": "690ec068-a35c-4727-a9a3-e5a0699f0632", "DetectTime": "2023-10-30T13:57:01.112449+02:00", "EventTime": "2023-10-30T13:57:01.112466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["ChvAL21FuQMM4Lf0sf"]} -{"Format": "IDEA0", "ID": "312d1541-0ae7-433f-8f3e-072b3f16abf7", "DetectTime": "2023-10-30T13:57:01.166657+02:00", "EventTime": "2023-10-30T13:57:01.166677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CeW1Z2jeUJmRVX6C4"]} -{"Format": "Json", "ID": "312d1541-0ae7-433f-8f3e-072b3f16abf7", "DetectTime": "2023-10-30T13:57:01.166657+02:00", "EventTime": "2023-10-30T13:57:01.166677+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:42:52.604936+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:57:01.271504)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "22e259e6-9b69-499f-aeea-9db9be3af779", "DetectTime": "2023-10-30T13:57:01.278678+02:00", "EventTime": "2023-10-30T13:57:01.278705+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqMVdC4ZTWS0eodmW2"]} -{"Format": "IDEA0", "ID": "88cff54e-eeba-4542-bed8-ee072dc377f5", "DetectTime": "2023-10-30T13:57:01.333780+02:00", "EventTime": "2023-10-30T13:57:01.333798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7057], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. ", "ContentType": "text/plain"}], "uids": ["Cpfrw214T9RDt7h2Vl"]} -{"Format": "IDEA0", "ID": "dad427ec-9ffe-481e-8537-dc789a1dfe43", "DetectTime": "2023-10-30T13:57:01.381730+02:00", "EventTime": "2023-10-30T13:57:01.381753+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CqPLa34Qf7DDbB1gP3"]} -{"Format": "IDEA0", "ID": "63bec052-26cd-4f08-82ec-10a7aad214a8", "DetectTime": "2023-10-30T13:57:01.436419+02:00", "EventTime": "2023-10-30T13:57:01.436445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CXOpD9381T61BKXXk2"]} -{"Format": "IDEA0", "ID": "aa4ffa40-b2e4-458b-86b4-8d94a62c0b41", "DetectTime": "2023-10-30T13:57:01.492944+02:00", "EventTime": "2023-10-30T13:57:01.492965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Cc97YQ1RqToMEmyOo7"]} -{"Format": "IDEA0", "ID": "26b5bb6c-5d47-44ba-a8e0-2143f1efe3c4", "DetectTime": "2023-10-30T13:57:01.552885+02:00", "EventTime": "2023-10-30T13:57:01.552960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CJZNBw2v1YjqOztbE6"]} -{"Format": "IDEA0", "ID": "8d7fd385-96f6-4f92-b223-8a0e75511fc3", "DetectTime": "2023-10-30T13:57:01.607124+02:00", "EventTime": "2023-10-30T13:57:01.607143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CvAKqU3Jk0XJd2ISj8"]} -{"Format": "IDEA0", "ID": "e7c0021a-a3b6-4da8-9611-40f28b935f80", "DetectTime": "2023-10-30T13:57:01.665899+02:00", "EventTime": "2023-10-30T13:57:01.665920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["CgcnA44SW6XKJAG4si"]} -{"Format": "IDEA0", "ID": "79f09dc1-2ee4-49e9-b1f5-be959267c2ad", "DetectTime": "2023-10-30T13:57:01.723827+02:00", "EventTime": "2023-10-30T13:57:01.723848+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKjRmO3zrlSx3XYERa"]} -{"Format": "IDEA0", "ID": "87c59108-ea3e-4329-85d2-72eb593f9f61", "DetectTime": "2023-10-30T13:57:01.772359+02:00", "EventTime": "2023-10-30T13:57:01.772388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CFBjPq3XwOnfMGRLA5"]} -{"Format": "IDEA0", "ID": "042764bb-1edc-46a1-a390-c02845685ec1", "DetectTime": "2023-10-30T13:57:01.823044+02:00", "EventTime": "2023-10-30T13:57:01.823066+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CxQwcJ345D7hi4Ykob"]} -{"Format": "IDEA0", "ID": "61726598-e666-4feb-8f0c-9ce9410c3e18", "DetectTime": "2023-10-30T13:57:01.875258+02:00", "EventTime": "2023-10-30T13:57:01.875282+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfcImg1CHvdVmHpmR4"]} -{"Format": "IDEA0", "ID": "be8b75af-4db8-4c1e-92b6-1ac8710028c6", "DetectTime": "2023-10-30T13:57:01.935306+02:00", "EventTime": "2023-10-30T13:57:01.935330+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CtODBW1cpT5tlszO1l"]} -{"Format": "IDEA0", "ID": "8cda381e-1327-4ce5-8582-9e36bff5d65d", "DetectTime": "2023-10-30T13:57:02.075357+02:00", "EventTime": "2023-10-30T13:57:02.075377+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cy5g3m3kgDEPfZhXzd"]} -{"Format": "IDEA0", "ID": "3e367d4e-2783-4051-8a44-40942e2d9e1d", "DetectTime": "2023-10-30T13:57:02.146274+02:00", "EventTime": "2023-10-30T13:57:02.146294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CxQwcJ345D7hi4Ykob", "CqPLa34Qf7DDbB1gP3", "CRTqze2DwGqQdzdsSd", "CtODBW1cpT5tlszO1l"]} -{"Format": "IDEA0", "ID": "6e0de03e-cd08-4067-9cdb-7a51ef4c9c9f", "DetectTime": "2023-10-30T13:57:02.212973+02:00", "EventTime": "2023-10-30T13:57:02.212997+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CRTqze2DwGqQdzdsSd"]} -{"Format": "IDEA0", "ID": "83506589-18b2-45d8-9b32-cdee187e9293", "DetectTime": "2023-10-30T13:57:02.275036+02:00", "EventTime": "2023-10-30T13:57:02.275063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["Crn2SoSgg3U0TaLEi"]} -{"Format": "IDEA0", "ID": "e3d6a232-aa4a-4496-80e9-8bc8441bde1e", "DetectTime": "2023-10-30T13:57:02.346257+02:00", "EventTime": "2023-10-30T13:57:02.346283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CrJ5Id3u5n9ubjcfQ"]} -{"Format": "Json", "ID": "e3d6a232-aa4a-4496-80e9-8bc8441bde1e", "DetectTime": "2023-10-30T13:57:02.346257+02:00", "EventTime": "2023-10-30T13:57:02.346283+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:44:01.134018+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:57:02.464229)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f0a1e545-f7b8-430b-a506-9e4f67a8da2b", "DetectTime": "2023-10-30T13:57:02.473058+02:00", "EventTime": "2023-10-30T13:57:02.473077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CEdcIvFeLF6cqGGd"]} -{"Format": "IDEA0", "ID": "ab0e2cce-4da8-4fbe-ac8b-6f0c81613ab9", "DetectTime": "2023-10-30T13:57:02.576294+02:00", "EventTime": "2023-10-30T13:57:02.576316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CTspka1TCkzfcOd45h"]} -{"Format": "IDEA0", "ID": "55ee3711-9cae-4a53-a4fd-2d94e00ae68a", "DetectTime": "2023-10-30T13:57:02.639432+02:00", "EventTime": "2023-10-30T13:57:02.639454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["C3P1M33pYVhF6hoPDh"]} -{"Format": "IDEA0", "ID": "e10eb2e7-5f3d-45c6-801e-104d8ea6e1ac", "DetectTime": "2023-10-30T13:57:02.703115+02:00", "EventTime": "2023-10-30T13:57:02.703135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6717], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. ", "ContentType": "text/plain"}], "uids": ["Cif1RInyZ52kR7Yy3"]} -{"Format": "IDEA0", "ID": "8f3ea014-4b3e-40fe-be78-f705e430bd30", "DetectTime": "2023-10-30T13:57:02.765607+02:00", "EventTime": "2023-10-30T13:57:02.765629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CzBkeT1cZ2XimdD52d"]} -{"Format": "IDEA0", "ID": "ffb0d33e-4c42-49c7-a66b-6c49ebc58d3c", "DetectTime": "2023-10-30T13:57:02.835118+02:00", "EventTime": "2023-10-30T13:57:02.835143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CMpkpj2o2Blwmd6uyf"]} -{"Format": "IDEA0", "ID": "57dbadbe-66c4-418d-acf1-f76665396792", "DetectTime": "2023-10-30T13:57:02.904216+02:00", "EventTime": "2023-10-30T13:57:02.904243+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvyNzX1nXG6CaCGQu"]} -{"Format": "IDEA0", "ID": "c7b1fd35-eb2d-4dc8-98cf-55e721a1859a", "DetectTime": "2023-10-30T13:57:02.964609+02:00", "EventTime": "2023-10-30T13:57:02.964630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["CYivL4449RFnrC0knl"]} -{"Format": "IDEA0", "ID": "676c3e8a-6014-4045-a32f-0b92785d6892", "DetectTime": "2023-10-30T13:57:03.031074+02:00", "EventTime": "2023-10-30T13:57:03.031095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CTPNpL3SSRFpM4bffc"]} -{"Format": "Json", "ID": "676c3e8a-6014-4045-a32f-0b92785d6892", "DetectTime": "2023-10-30T13:57:03.031074+02:00", "EventTime": "2023-10-30T13:57:03.031095+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T02:44:03.173414+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2023/10/30 13:57:03.133022)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f24a7cc4-b70d-4f58-9375-07e08e812655", "DetectTime": "2023-10-30T13:57:03.142018+02:00", "EventTime": "2023-10-30T13:57:03.142038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["CyQozn1Lh62TCnwzkj"]} -{"Format": "IDEA0", "ID": "f50da9e7-d006-4105-b3b2-d8059842bc09", "DetectTime": "2023-10-30T13:57:03.211331+02:00", "EventTime": "2023-10-30T13:57:03.211348+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Ccvc0A1Scc1XXSN8Ml"]} -{"Format": "IDEA0", "ID": "96c6ac3b-03fb-48d0-bd1f-b5961457b011", "DetectTime": "2023-10-30T13:57:03.226268+02:00", "EventTime": "2023-10-30T13:57:03.226284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CzBYIb35Wr7b85Y7E2"]} -{"Format": "IDEA0", "ID": "3c3fcdc0-1e69-479e-98e7-651e403bfd5b", "DetectTime": "2023-10-30T13:57:03.279928+02:00", "EventTime": "2023-10-30T13:57:03.279955+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cq6r1J1s92BeLXqxxd"]} -{"Format": "IDEA0", "ID": "ede2c8e7-3dc7-4669-8c17-1af14d33c9a9", "DetectTime": "2023-10-30T13:57:03.295036+02:00", "EventTime": "2023-10-30T13:57:03.295065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CywBNn3nKx1QqMYsK7"]} -{"Format": "IDEA0", "ID": "540e74f2-5c38-4cd6-b930-9c2e77b89678", "DetectTime": "2023-10-30T13:57:03.348107+02:00", "EventTime": "2023-10-30T13:57:03.348179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CGlDl430gGSe834n19"]} -{"Format": "IDEA0", "ID": "3a23cdc6-e966-4ee9-8abf-23dc6b337456", "DetectTime": "2023-10-30T13:57:03.404536+02:00", "EventTime": "2023-10-30T13:57:03.404557+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CRRZl74AonGJANVzyj"]} -{"Format": "IDEA0", "ID": "10b25b32-bfb7-432e-b4a5-5392dc989c33", "DetectTime": "2023-10-30T13:57:03.422730+02:00", "EventTime": "2023-10-30T13:57:03.422747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CPFRcb2aFf7usMmGve"]} -{"Format": "IDEA0", "ID": "52238e3d-edf7-4252-96e6-f71ddcb45112", "DetectTime": "2023-10-30T13:57:03.476351+02:00", "EventTime": "2023-10-30T13:57:03.476368+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1MfsWUrT9SmtuUme"]} -{"Format": "IDEA0", "ID": "061a7567-e38d-4382-87a4-39b22e8ddab8", "DetectTime": "2023-10-30T13:57:03.488392+02:00", "EventTime": "2023-10-30T13:57:03.488408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["C8njri3rMrdkzACfjc"]} -{"Format": "IDEA0", "ID": "1d0cf848-4adc-47b0-a4fd-4df68f06c799", "DetectTime": "2023-10-30T13:57:03.504008+02:00", "EventTime": "2023-10-30T13:57:03.504028+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CDCNQv3p7orFezHCZd"]} -{"Format": "IDEA0", "ID": "d92daaf1-08f1-47c9-b50e-2d92cab0ee04", "DetectTime": "2023-10-30T13:57:03.520583+02:00", "EventTime": "2023-10-30T13:57:03.520600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. ", "ContentType": "text/plain"}], "uids": ["CR5iK5inzQwWYQS76"]} -{"Format": "IDEA0", "ID": "053e7ac3-1ff8-4cba-9067-ecf667ef9a88", "DetectTime": "2023-10-30T13:57:03.533754+02:00", "EventTime": "2023-10-30T13:57:03.533770+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI63lx1kkAQBURvKfb"]} -{"Format": "IDEA0", "ID": "28c3ff53-31cb-4ad6-afe5-3e44500232c9", "DetectTime": "2023-10-30T13:57:03.546537+02:00", "EventTime": "2023-10-30T13:57:03.546554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDCNQv3p7orFezHCZd", "CDZoXm38jBVqMINeD6", "Ccvc0A1Scc1XXSN8Ml", "CRRZl74AonGJANVzyj"]} -{"Format": "IDEA0", "ID": "221307e8-0f3c-4074-87b5-70cba24302c8", "DetectTime": "2023-10-30T13:57:03.560315+02:00", "EventTime": "2023-10-30T13:57:03.560332+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CDZoXm38jBVqMINeD6"]} -{"Format": "IDEA0", "ID": "8982697a-6580-4338-b736-a6660202ff8c", "DetectTime": "2023-10-30T13:57:03.573443+02:00", "EventTime": "2023-10-30T13:57:03.573465+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkITIc3pjCur4RZQVf"]} -{"Format": "IDEA0", "ID": "85cb4e9c-da42-411e-af9d-842497d660b1", "DetectTime": "2023-10-30T13:57:03.588272+02:00", "EventTime": "2023-10-30T13:57:03.588290+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C5ZuWb39LcMm2GI0Vb"]} -{"Format": "IDEA0", "ID": "db0424e0-e134-484e-9654-8e98b316fd41", "DetectTime": "2023-10-30T13:57:03.602352+02:00", "EventTime": "2023-10-30T13:57:03.602372+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyyVlc4vowUjyIM5mj"]} -{"Format": "IDEA0", "ID": "10f501a3-ea01-4975-92d4-5325db699346", "DetectTime": "2023-10-30T13:57:03.618014+02:00", "EventTime": "2023-10-30T13:57:03.618036+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CjZc1wqvbHXbW2VZ3"]} -{"Format": "IDEA0", "ID": "e88a1bbf-9c45-44c5-bd36-509226d8061a", "DetectTime": "2023-10-30T13:57:03.630911+02:00", "EventTime": "2023-10-30T13:57:03.630930+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPbAXl1s1kogg1YBGg"]} -{"Format": "IDEA0", "ID": "6a1cfa50-7219-4707-9a01-bfe99d5ba8df", "DetectTime": "2023-10-30T13:57:03.647217+02:00", "EventTime": "2023-10-30T13:57:03.647236+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CO7HY2TLzmHKDykMd"]} -{"Format": "IDEA0", "ID": "397fb056-954a-4812-830b-4298cb29871b", "DetectTime": "2023-10-30T13:57:03.659997+02:00", "EventTime": "2023-10-30T13:57:03.660014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWYEdg9b1gHp90XS7"]} -{"Format": "IDEA0", "ID": "8d30bd5d-5c89-431e-81f0-2b579c765f90", "DetectTime": "2023-10-30T13:57:03.678825+02:00", "EventTime": "2023-10-30T13:57:03.678842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CfTvPW2IdeAu0E5Cz5", "CO7HY2TLzmHKDykMd", "C5ZuWb39LcMm2GI0Vb", "CjZc1wqvbHXbW2VZ3"]} -{"Format": "IDEA0", "ID": "0ee09adf-465f-4d82-8003-d2d82b1d087c", "DetectTime": "2023-10-30T13:57:03.691828+02:00", "EventTime": "2023-10-30T13:57:03.691847+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CfTvPW2IdeAu0E5Cz5"]} -{"Format": "IDEA0", "ID": "3209cd86-7dfa-4a5a-8b6d-e53ff6c6deff", "DetectTime": "2023-10-30T13:57:03.706406+02:00", "EventTime": "2023-10-30T13:57:03.706424+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClnziM1kGdo6lKwUUl"]} -{"Format": "IDEA0", "ID": "c823ec59-dbdc-40c4-ab8f-aea71e80dbec", "DetectTime": "2023-10-30T13:57:03.722801+02:00", "EventTime": "2023-10-30T13:57:03.722820+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cv1JId2LUhCzlisPVg"]} -{"Format": "IDEA0", "ID": "37ea4d8f-7012-4939-b628-e4bf26bfbf59", "DetectTime": "2023-10-30T13:57:03.736578+02:00", "EventTime": "2023-10-30T13:57:03.736597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["ClSFzs4VwZhE8Yb108"]} -{"Format": "IDEA0", "ID": "980419d7-ba70-4140-86fe-6109c9536219", "DetectTime": "2023-10-30T13:57:03.754567+02:00", "EventTime": "2023-10-30T13:57:03.754585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. ", "ContentType": "text/plain"}], "uids": ["Cqs2yc2XAbFMPOdPz2"]} -{"Format": "IDEA0", "ID": "a64f9b8c-2a0e-442f-9f01-21824d6bbb07", "DetectTime": "2023-10-30T13:57:03.770655+02:00", "EventTime": "2023-10-30T13:57:03.770670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. ", "ContentType": "text/plain"}], "uids": ["CJKdbr38Q09bfArxj2"]} -{"Format": "IDEA0", "ID": "640f52db-e904-4e04-a316-93bc4a208f3c", "DetectTime": "2023-10-30T13:57:03.786846+02:00", "EventTime": "2023-10-30T13:57:03.786863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["Cg3y3F3xvokG0cn03f"]} -{"Format": "IDEA0", "ID": "5c7cb302-4442-4e7c-a41b-34cca5f7e4c8", "DetectTime": "2023-10-30T13:57:03.812405+02:00", "EventTime": "2023-10-30T13:57:03.812427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["CSwyfd1V1k4TcSMc59"]} -{"Format": "Json", "ID": "5c7cb302-4442-4e7c-a41b-34cca5f7e4c8", "DetectTime": "2023-10-30T13:57:03.812405+02:00", "EventTime": "2023-10-30T13:57:03.812427+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:17:07.458495+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:03.887244)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "12e3977e-a925-44f8-b642-cf57faa9a98a", "DetectTime": "2023-10-30T13:57:03.893647+02:00", "EventTime": "2023-10-30T13:57:03.893661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["CHGFB92JT7Pir44e04"]} -{"Format": "IDEA0", "ID": "676e2318-a7f9-4f68-b2cf-21c6256f8616", "DetectTime": "2023-10-30T13:57:03.909505+02:00", "EventTime": "2023-10-30T13:57:03.909527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["CTQmVa15frCorljava"]} -{"Format": "IDEA0", "ID": "0a865fe8-b981-4062-aaa9-3a499f21f984", "DetectTime": "2023-10-30T13:57:03.927350+02:00", "EventTime": "2023-10-30T13:57:03.927368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["C2LZMp3e7RtWRbqa54"]} -{"Format": "IDEA0", "ID": "c0e3d76d-53b0-422b-a556-b9c0c240fe37", "DetectTime": "2023-10-30T13:57:03.940700+02:00", "EventTime": "2023-10-30T13:57:03.940719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CRqfcr3ZxdXRb0IaCe"]} -{"Format": "IDEA0", "ID": "6d47b044-9527-4d3a-b08a-88403ade5d9f", "DetectTime": "2023-10-30T13:57:03.956164+02:00", "EventTime": "2023-10-30T13:57:03.956189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CUBhi13gMGyePQ3Egl"]} -{"Format": "IDEA0", "ID": "e84a2c22-c8a7-4187-b571-d5771ac75c22", "DetectTime": "2023-10-30T13:57:03.972695+02:00", "EventTime": "2023-10-30T13:57:03.972715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["C6Ct9g3SrkEobhCZD6"]} -{"Format": "IDEA0", "ID": "d6a91c59-9477-4e15-a616-789b81418e5b", "DetectTime": "2023-10-30T13:57:03.990419+02:00", "EventTime": "2023-10-30T13:57:03.990444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CSRlGs42lE7HvyIpvj"]} -{"Format": "IDEA0", "ID": "35e29a02-a699-4fcd-988b-688bb799e67b", "DetectTime": "2023-10-30T13:57:04.013071+02:00", "EventTime": "2023-10-30T13:57:04.013089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CJGFir1ffwilbbKmA"]} -{"Format": "Json", "ID": "35e29a02-a699-4fcd-988b-688bb799e67b", "DetectTime": "2023-10-30T13:57:04.013071+02:00", "EventTime": "2023-10-30T13:57:04.013089+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:17:26.799385+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:04.055724)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "13cd2f12-7133-422e-848f-8da99157221f", "DetectTime": "2023-10-30T13:57:04.061555+02:00", "EventTime": "2023-10-30T13:57:04.061575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CgzQuM3Dt6ZOxPBwZa"]} -{"Format": "IDEA0", "ID": "ba3a7a2d-68ec-4bb8-a4f4-c4e34487630e", "DetectTime": "2023-10-30T13:57:04.077704+02:00", "EventTime": "2023-10-30T13:57:04.077731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["CwpcyvssUeqSpXmol"]} -{"Format": "IDEA0", "ID": "0267dd53-98b4-4bda-9455-d57c4130b87a", "DetectTime": "2023-10-30T13:57:04.094039+02:00", "EventTime": "2023-10-30T13:57:04.094060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Crh1RG1QfsCAnKTDz1"]} -{"Format": "IDEA0", "ID": "80d80753-5d4c-46a8-81c1-04a0f85bab44", "DetectTime": "2023-10-30T13:57:04.114195+02:00", "EventTime": "2023-10-30T13:57:04.114212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CT47HtfI2jeJTFC1a"]} -{"Format": "IDEA0", "ID": "d1642d2c-a18c-4d6b-a200-d8f3a6fc1056", "DetectTime": "2023-10-30T13:57:04.138940+02:00", "EventTime": "2023-10-30T13:57:04.138963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CZV55P1a6moCeExi5b"]} -{"Format": "IDEA0", "ID": "8c1d23a8-a9ce-4360-8af5-3123b6fc8956", "DetectTime": "2023-10-30T13:57:04.162490+02:00", "EventTime": "2023-10-30T13:57:04.162507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CTNgwq4ubroo1D1dub"]} -{"Format": "IDEA0", "ID": "eb92b833-c4d2-441e-9238-2a804fff2ed9", "DetectTime": "2023-10-30T13:57:04.186072+02:00", "EventTime": "2023-10-30T13:57:04.186083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CHVGCE7GHaErI1VW3"]} -{"Format": "IDEA0", "ID": "a0fd519a-e4b5-4c10-8b4b-a6d30668767f", "DetectTime": "2023-10-30T13:57:04.209075+02:00", "EventTime": "2023-10-30T13:57:04.209097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CnivDu3k1JNAY6mCbl"]} -{"Format": "Json", "ID": "a0fd519a-e4b5-4c10-8b4b-a6d30668767f", "DetectTime": "2023-10-30T13:57:04.209075+02:00", "EventTime": "2023-10-30T13:57:04.209097+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:17:28.659844+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:04.250477)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dbb62319-9362-4812-878d-8e11d30fa52d", "DetectTime": "2023-10-30T13:57:04.255820+02:00", "EventTime": "2023-10-30T13:57:04.255836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["C01cA83iOCY6QhjQFi"]} -{"Format": "IDEA0", "ID": "78a92801-1500-48ea-99e4-1e9bee9bede4", "DetectTime": "2023-10-30T13:57:04.271490+02:00", "EventTime": "2023-10-30T13:57:04.271506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6717], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. ", "ContentType": "text/plain"}], "uids": ["CY8occespU2ZRO84d"]} -{"Format": "IDEA0", "ID": "f0ba1ee0-42fa-414b-ae89-e392fb105716", "DetectTime": "2023-10-30T13:57:04.291680+02:00", "EventTime": "2023-10-30T13:57:04.291702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["Cavyrt3fJunV7BFDR4"]} -{"Format": "IDEA0", "ID": "96c0c6ba-48f3-4c2f-b80b-c2b9a4e68253", "DetectTime": "2023-10-30T13:57:04.315755+02:00", "EventTime": "2023-10-30T13:57:04.315770+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Crnmef1bFgjNa3fsPb"]} -{"Format": "IDEA0", "ID": "bf4fdb00-4770-468f-90a4-db19a2e07004", "DetectTime": "2023-10-30T13:57:04.331302+02:00", "EventTime": "2023-10-30T13:57:04.331323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C7mPQS3PnS24PYUYF5"]} -{"Format": "IDEA0", "ID": "1f7d333a-9f38-4cb8-860d-0f54484a065a", "DetectTime": "2023-10-30T13:57:04.352194+02:00", "EventTime": "2023-10-30T13:57:04.352299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CEpMlFErTrdTcubk1"]} -{"Format": "IDEA0", "ID": "fae167d2-826f-4607-b7ec-fe0428f7711c", "DetectTime": "2023-10-30T13:57:04.374968+02:00", "EventTime": "2023-10-30T13:57:04.374986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["C2l1kG3IchCC5HV4d"]} -{"Format": "IDEA0", "ID": "353660d1-4471-4b79-bc3d-9ffeffa64c72", "DetectTime": "2023-10-30T13:57:04.398856+02:00", "EventTime": "2023-10-30T13:57:04.398881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["Crruex405v8TxtA5Eb"]} -{"Format": "IDEA0", "ID": "0fcd82a2-b3dd-43d1-ba64-fcede2ea5abc", "DetectTime": "2023-10-30T13:57:04.426944+02:00", "EventTime": "2023-10-30T13:57:04.426960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CY3zDg5vgIa1gAoKg"]} -{"Format": "Json", "ID": "0fcd82a2-b3dd-43d1-ba64-fcede2ea5abc", "DetectTime": "2023-10-30T13:57:04.426944+02:00", "EventTime": "2023-10-30T13:57:04.426960+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:17:30.781944+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:04.551334)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1e02aca6-5252-4d90-a03b-6b309f0bab6e", "DetectTime": "2023-10-30T13:57:04.560889+02:00", "EventTime": "2023-10-30T13:57:04.560910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["C6NCun1oKuaac1zUMa"]} -{"Format": "IDEA0", "ID": "52f322d5-f181-48fe-8829-33d8afcd305f", "DetectTime": "2023-10-30T13:57:04.586717+02:00", "EventTime": "2023-10-30T13:57:04.586738+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CTXleA4VCKuEDvRjhb"]} -{"Format": "IDEA0", "ID": "cba9c986-f855-4e6a-bd19-498e4120e0c8", "DetectTime": "2023-10-30T13:57:04.611906+02:00", "EventTime": "2023-10-30T13:57:04.611927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["C9VoKh2TBV9BJeNw77"]} -{"Format": "IDEA0", "ID": "4925024e-84b9-4127-a895-46ff7433a243", "DetectTime": "2023-10-30T13:57:04.634046+02:00", "EventTime": "2023-10-30T13:57:04.634070+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwEpi03BEpIAyOxt5l"]} -{"Format": "IDEA0", "ID": "efd96518-97ff-46f2-a899-89027a3b07d3", "DetectTime": "2023-10-30T13:57:04.655159+02:00", "EventTime": "2023-10-30T13:57:04.655186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CwILtb2dzGHIdvB6Rk"]} -{"Format": "IDEA0", "ID": "6fd5cc5e-2b9f-4635-980d-4e8696b4435d", "DetectTime": "2023-10-30T13:57:04.691879+02:00", "EventTime": "2023-10-30T13:57:04.691897+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cq55KA1dijDRVaCDt8"]} -{"Format": "IDEA0", "ID": "f6529b6e-4ab6-4fe7-ac9d-ebced1956cbc", "DetectTime": "2023-10-30T13:57:04.773399+02:00", "EventTime": "2023-10-30T13:57:04.773416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CONtZv3M2uysONaWec"]} -{"Format": "IDEA0", "ID": "ca4c648b-23e3-435e-b704-1cc71cb74dfc", "DetectTime": "2023-10-30T13:57:04.828496+02:00", "EventTime": "2023-10-30T13:57:04.828513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CTXleA4VCKuEDvRjhb", "CRE5yf3ds9RTNfWTG3", "Cv1JId2LUhCzlisPVg", "Cq55KA1dijDRVaCDt8"]} -{"Format": "IDEA0", "ID": "8247bfb6-94a0-4bc4-8fff-fed0369cfca8", "DetectTime": "2023-10-30T13:57:04.851122+02:00", "EventTime": "2023-10-30T13:57:04.851141+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CRE5yf3ds9RTNfWTG3"]} -{"Format": "IDEA0", "ID": "5d22d07e-5c4d-49f1-9b80-207244c2f6fb", "DetectTime": "2023-10-30T13:57:04.899918+02:00", "EventTime": "2023-10-30T13:57:04.899935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. ", "ContentType": "text/plain"}], "uids": ["CgZph63rr8GUSfWsnb"]} -{"Format": "IDEA0", "ID": "1ba76f99-ba8d-49d0-a1ad-3590b6af5b2d", "DetectTime": "2023-10-30T13:57:04.934622+02:00", "EventTime": "2023-10-30T13:57:04.934641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CcrPQr2sgrlbVNszu6"]} -{"Format": "IDEA0", "ID": "e2212df9-ad59-412a-9869-878051f0968b", "DetectTime": "2023-10-30T13:57:04.969995+02:00", "EventTime": "2023-10-30T13:57:04.970011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["CikjHC3qgK39AZl3li"]} -{"Format": "IDEA0", "ID": "4a562996-17dc-4495-992d-9104840181a7", "DetectTime": "2023-10-30T13:57:05.005503+02:00", "EventTime": "2023-10-30T13:57:05.005525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["CTqpws3dDZ6WpGb2E"]} -{"Format": "Json", "ID": "4a562996-17dc-4495-992d-9104840181a7", "DetectTime": "2023-10-30T13:57:05.005503+02:00", "EventTime": "2023-10-30T13:57:05.005525+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:48:37.862978+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:05.072732)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "89fd0369-6484-4f0a-9994-dabb14309b8a", "DetectTime": "2023-10-30T13:57:05.078663+02:00", "EventTime": "2023-10-30T13:57:05.078684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. ", "ContentType": "text/plain"}], "uids": ["Cr7Fm328OHQXGnL6ue"]} -{"Format": "IDEA0", "ID": "a2bb523e-8be1-41e4-ab91-7537e0c80bbd", "DetectTime": "2023-10-30T13:57:05.105287+02:00", "EventTime": "2023-10-30T13:57:05.105305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. ", "ContentType": "text/plain"}], "uids": ["C8nR0s2HBezeXdJDvf"]} -{"Format": "IDEA0", "ID": "e2d16afe-2841-4934-a69d-fe31e234e9cf", "DetectTime": "2023-10-30T13:57:05.129159+02:00", "EventTime": "2023-10-30T13:57:05.129180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["Cn3KSA3XpExWRAfK2i"]} -{"Format": "IDEA0", "ID": "52739511-9c38-49e4-af33-9d0042936ee2", "DetectTime": "2023-10-30T13:57:05.155416+02:00", "EventTime": "2023-10-30T13:57:05.155433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["C2iWRd2H2PIOfVpX9"]} -{"Format": "IDEA0", "ID": "6aface11-b86e-4f69-97cd-3ebaece9d81d", "DetectTime": "2023-10-30T13:57:05.186354+02:00", "EventTime": "2023-10-30T13:57:05.186373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["ConX7t2nNAtSjQTgy1"]} -{"Format": "IDEA0", "ID": "5e7fb302-a1b4-453d-ade8-ed09385d73b7", "DetectTime": "2023-10-30T13:57:05.214870+02:00", "EventTime": "2023-10-30T13:57:05.214893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["COWD8p4DW55VQKWXui"]} -{"Format": "IDEA0", "ID": "a3b6a524-6bbb-4040-b1b0-7ba6237393e2", "DetectTime": "2023-10-30T13:57:05.245607+02:00", "EventTime": "2023-10-30T13:57:05.245619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["Co7VM40cLDDpOgh4"]} -{"Format": "IDEA0", "ID": "2aa37f23-d9b4-4825-bc2a-9e063f211a2d", "DetectTime": "2023-10-30T13:57:05.277704+02:00", "EventTime": "2023-10-30T13:57:05.277716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["C6XfkC4yNxXqANBQFl"]} -{"Format": "Json", "ID": "2aa37f23-d9b4-4825-bc2a-9e063f211a2d", "DetectTime": "2023-10-30T13:57:05.277704+02:00", "EventTime": "2023-10-30T13:57:05.277716+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:48:40.865812+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:05.339447)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "be7aa667-9ded-4fbc-a97e-f0be037f06c5", "DetectTime": "2023-10-30T13:57:05.352257+02:00", "EventTime": "2023-10-30T13:57:05.352279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["COtn1S34YB28Qd5ZPk"]} -{"Format": "IDEA0", "ID": "8ad9b4f1-3dad-4868-8552-a5adc09fc3d6", "DetectTime": "2023-10-30T13:57:05.381007+02:00", "EventTime": "2023-10-30T13:57:05.381027+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIN6xj3XmQx7uwUJD"]} -{"Format": "IDEA0", "ID": "b7c0cd7a-4dca-4152-96db-290c724da235", "DetectTime": "2023-10-30T13:57:05.404742+02:00", "EventTime": "2023-10-30T13:57:05.404763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["Cu5M2W373oaEMUGGt"]} -{"Format": "IDEA0", "ID": "66ef3077-d582-4a35-bc08-f7f303fe3283", "DetectTime": "2023-10-30T13:57:05.439032+02:00", "EventTime": "2023-10-30T13:57:05.439053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CwNxcw3ZqFVQw39mmg"]} -{"Format": "IDEA0", "ID": "958bfa8f-36ff-46d1-8e57-1829af103d70", "DetectTime": "2023-10-30T13:57:05.468674+02:00", "EventTime": "2023-10-30T13:57:05.468691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CZyMgl3t3ScigxGzy3"]} -{"Format": "IDEA0", "ID": "8943c01a-55e6-4a5d-bdcf-9ca91267ab10", "DetectTime": "2023-10-30T13:57:05.495795+02:00", "EventTime": "2023-10-30T13:57:05.495820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CWVvyv1AppYZCVLIj4"]} -{"Format": "IDEA0", "ID": "680e46fe-2e83-4b36-b6d4-06a4e8bd59a4", "DetectTime": "2023-10-30T13:57:05.534082+02:00", "EventTime": "2023-10-30T13:57:05.534098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CsMkT62T1JRpMD7Tsh"]} -{"Format": "IDEA0", "ID": "a159b10d-c940-4851-837c-4241a82abad6", "DetectTime": "2023-10-30T13:57:05.564847+02:00", "EventTime": "2023-10-30T13:57:05.564862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CRqnr640sADTQLCL3f"]} -{"Format": "IDEA0", "ID": "431a7171-339a-4b9f-a058-14fd8e9ab37a", "DetectTime": "2023-10-30T13:57:05.599497+02:00", "EventTime": "2023-10-30T13:57:05.599516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["Cs3k251pP0K10mW3v3"]} -{"Format": "Json", "ID": "431a7171-339a-4b9f-a058-14fd8e9ab37a", "DetectTime": "2023-10-30T13:57:05.599497+02:00", "EventTime": "2023-10-30T13:57:05.599516+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:48:43.278813+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:05.655552)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae959c0a-5f74-4bfc-8209-dc7deaa3b6ee", "DetectTime": "2023-10-30T13:57:05.661622+02:00", "EventTime": "2023-10-30T13:57:05.661642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CpgD7w1we54smgiC6j"]} -{"Format": "IDEA0", "ID": "d5726aaf-bb27-4bba-bbf0-8470b0fa53d5", "DetectTime": "2023-10-30T13:57:05.691613+02:00", "EventTime": "2023-10-30T13:57:05.691629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CgAvgE3xDad2lAKLeg"]} -{"Format": "IDEA0", "ID": "cd2a4955-710d-4945-8bed-0f5edcd93ca1", "DetectTime": "2023-10-30T13:57:05.727493+02:00", "EventTime": "2023-10-30T13:57:05.727512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CD0o7O2IWV8GgBGiY1"]} -{"Format": "IDEA0", "ID": "bf129281-85a9-4289-818a-26f9127c3008", "DetectTime": "2023-10-30T13:57:05.758173+02:00", "EventTime": "2023-10-30T13:57:05.758193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CvmBUu1Nwayf6l828d"]} -{"Format": "IDEA0", "ID": "b34d08e2-9a59-4d7e-a343-0dc5c21a3cf7", "DetectTime": "2023-10-30T13:57:05.786843+02:00", "EventTime": "2023-10-30T13:57:05.786861+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cdd9YR3Nl6x7lGMo9h"]} -{"Format": "IDEA0", "ID": "f6a1c22d-12d8-4afa-abe6-e3c980052c3f", "DetectTime": "2023-10-30T13:57:05.795582+02:00", "EventTime": "2023-10-30T13:57:05.795598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["Cjimww3EZDeoGludc1"]} -{"Format": "IDEA0", "ID": "e69ade36-842e-4848-8e25-42262d001985", "DetectTime": "2023-10-30T13:57:05.830307+02:00", "EventTime": "2023-10-30T13:57:05.830329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["C5lGHqxja2QmuMwi8"]} -{"Format": "IDEA0", "ID": "9d685f64-98e9-4086-aee2-a332cab6cdb9", "DetectTime": "2023-10-30T13:57:05.866201+02:00", "EventTime": "2023-10-30T13:57:05.866218+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtRbFw1YRI86uclgdd"]} -{"Format": "IDEA0", "ID": "e4e268f2-553c-494d-8099-c2de6ff828cb", "DetectTime": "2023-10-30T13:57:05.874003+02:00", "EventTime": "2023-10-30T13:57:05.874019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["C2LxDWe1XWMXUOTza"]} -{"Format": "IDEA0", "ID": "521a58d3-9c69-4369-95ae-2bd16edb6f49", "DetectTime": "2023-10-30T13:57:05.905422+02:00", "EventTime": "2023-10-30T13:57:05.905440+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CJg0ap4hwGXvV1vKkj"]} -{"Format": "IDEA0", "ID": "e0449a83-e909-4a64-a58c-c3246244cd35", "DetectTime": "2023-10-30T13:57:05.913558+02:00", "EventTime": "2023-10-30T13:57:05.913574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["CbEQiL341exFTqv93b"]} -{"Format": "Json", "ID": "e0449a83-e909-4a64-a58c-c3246244cd35", "DetectTime": "2023-10-30T13:57:05.913558+02:00", "EventTime": "2023-10-30T13:57:05.913574+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T03:49:04.180427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2023/10/30 13:57:05.974144)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "99cd5ad7-14fc-4a32-9850-47c368861fe7", "DetectTime": "2023-10-30T13:57:05.980784+02:00", "EventTime": "2023-10-30T13:57:05.980799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CW0oA81UogriSNAFlh"]} -{"Format": "IDEA0", "ID": "4fce91c2-6f0d-4327-88a9-1fe7af681ff1", "DetectTime": "2023-10-30T13:57:06.013858+02:00", "EventTime": "2023-10-30T13:57:06.013875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["Cna8d54VD7yZ0eNFh"]} -{"Format": "IDEA0", "ID": "68934bac-9d50-4f9a-95ab-c8c288e504d9", "DetectTime": "2023-10-30T13:57:06.042442+02:00", "EventTime": "2023-10-30T13:57:06.042514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["C62TwA44orQkVzjCDh"]} -{"Format": "IDEA0", "ID": "d9e0afb2-af55-4d50-a1ab-667307dc5801", "DetectTime": "2023-10-30T13:57:06.073132+02:00", "EventTime": "2023-10-30T13:57:06.073152+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZxmOw2o1wDI1U1gj"]} -{"Format": "IDEA0", "ID": "7b4ad726-0ef2-4a83-86eb-9ae3603ed903", "DetectTime": "2023-10-30T13:57:06.083507+02:00", "EventTime": "2023-10-30T13:57:06.083524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CcECwc3AbcyCn76Vsg"]} -{"Format": "IDEA0", "ID": "8dcdc13d-c82d-48df-9697-ab6267c60e8d", "DetectTime": "2023-10-30T13:57:06.178415+02:00", "EventTime": "2023-10-30T13:57:06.178436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["Ck1Cug3pGjn5zZbHTb"]} -{"Format": "IDEA0", "ID": "1fabf3e5-e3ba-4441-9401-e4c13fb0eee9", "DetectTime": "2023-10-30T13:57:06.194843+02:00", "EventTime": "2023-10-30T13:57:06.194863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. ", "ContentType": "text/plain"}], "uids": ["CBajdS1U1KZrmThoA7"]} -{"Format": "IDEA0", "ID": "dcc34d41-8a0a-4fca-8159-ffadca3f0bf4", "DetectTime": "2023-10-30T13:57:06.213795+02:00", "EventTime": "2023-10-30T13:57:06.213812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["Cah3iEHFqaO667Fg5"]} -{"Format": "IDEA0", "ID": "6498a0df-c85a-45d2-a562-6b97cd7e2101", "DetectTime": "2023-10-30T13:57:06.244538+02:00", "EventTime": "2023-10-30T13:57:06.244555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["C7CsQr4vYp2Ipukot8"]} -{"Format": "IDEA0", "ID": "aebb61e0-853e-458c-8007-1f4f1033660b", "DetectTime": "2023-10-30T13:57:06.262409+02:00", "EventTime": "2023-10-30T13:57:06.262429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["CMJw224xI8kjcC332"]} -{"Format": "IDEA0", "ID": "cacd4768-2705-4de1-aebb-37ee6d893665", "DetectTime": "2023-10-30T13:57:06.279885+02:00", "EventTime": "2023-10-30T13:57:06.279897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["CQcXbB42djw893hvr5"]} -{"Format": "IDEA0", "ID": "7312bb5e-d90f-4236-bfed-f13c3b198bed", "DetectTime": "2023-10-30T13:57:06.299403+02:00", "EventTime": "2023-10-30T13:57:06.299416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS815", "ContentType": "text/plain"}], "uids": ["CcXVEM3O5lEgTuOOOi"]} -{"Format": "Json", "ID": "7312bb5e-d90f-4236-bfed-f13c3b198bed", "DetectTime": "2023-10-30T13:57:06.299403+02:00", "EventTime": "2023-10-30T13:57:06.299416+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T04:19:44.555540+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:06.331224)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "da9528bf-b55a-4c8b-b6c7-af51eeb0db9b", "DetectTime": "2023-10-30T13:57:06.336961+02:00", "EventTime": "2023-10-30T13:57:06.336977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CDRbqg2tKtUiLCvR2h"]} -{"Format": "IDEA0", "ID": "ce223cc5-7721-4d57-a5a3-c212aaef50bc", "DetectTime": "2023-10-30T13:57:06.349740+02:00", "EventTime": "2023-10-30T13:57:06.349761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["Clrp7mquKtMgWHRA8"]} -{"Format": "IDEA0", "ID": "26698522-826a-4dab-8552-b803e3798514", "DetectTime": "2023-10-30T13:57:06.363182+02:00", "EventTime": "2023-10-30T13:57:06.363195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["CLVmjgPJQlSfq09Pc"]} -{"Format": "IDEA0", "ID": "d5482322-4521-41bc-a658-14e3883b23f9", "DetectTime": "2023-10-30T13:57:06.384503+02:00", "EventTime": "2023-10-30T13:57:06.384521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CxZ6pY33EDpgEgaVNj"]} -{"Format": "IDEA0", "ID": "fccd2ccc-62e2-4d31-9ffb-bf827e20f3d3", "DetectTime": "2023-10-30T13:57:06.400690+02:00", "EventTime": "2023-10-30T13:57:06.400701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CF8XYL3cLuKv4uXHX2"]} -{"Format": "IDEA0", "ID": "21cf87bf-39ba-4f83-927b-2f56a77cfe50", "DetectTime": "2023-10-30T13:57:06.419781+02:00", "EventTime": "2023-10-30T13:57:06.419793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["C4QiGf3hq5JBMvPe9i"]} -{"Format": "IDEA0", "ID": "29c4243b-5289-4d24-90dd-05f695f202bb", "DetectTime": "2023-10-30T13:57:06.440619+02:00", "EventTime": "2023-10-30T13:57:06.440641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CBxaik20Nl6QuIK4x8"]} -{"Format": "IDEA0", "ID": "22d995d0-1e13-43b9-afb9-068448dd88db", "DetectTime": "2023-10-30T13:57:06.459976+02:00", "EventTime": "2023-10-30T13:57:06.459988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["C9rv0t4oBePLu8g9xj"]} -{"Format": "Json", "ID": "22d995d0-1e13-43b9-afb9-068448dd88db", "DetectTime": "2023-10-30T13:57:06.459976+02:00", "EventTime": "2023-10-30T13:57:06.459988+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T04:19:46.884964+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:06.501349)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c2c11d0e-dc21-462d-acd5-96ec83fa8e20", "DetectTime": "2023-10-30T13:57:06.507621+02:00", "EventTime": "2023-10-30T13:57:06.507640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CVPV7h1JySz6vcP1Fk"]} -{"Format": "IDEA0", "ID": "6b50683d-d418-4bef-92ec-8d65bbfabe18", "DetectTime": "2023-10-30T13:57:06.525132+02:00", "EventTime": "2023-10-30T13:57:06.525151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CZdCtM1zOL8PV69cwl"]} -{"Format": "IDEA0", "ID": "b64630b6-9d65-490e-ace8-8f58a5f4c2af", "DetectTime": "2023-10-30T13:57:06.537946+02:00", "EventTime": "2023-10-30T13:57:06.537963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["Cs8eyR2iq3afh16fsa"]} -{"Format": "IDEA0", "ID": "1c97024d-8cea-47db-a701-20fcf1757371", "DetectTime": "2023-10-30T13:57:06.554251+02:00", "EventTime": "2023-10-30T13:57:06.554272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["ChX6281dzTx6Z1ANjj"]} -{"Format": "IDEA0", "ID": "8d2c944d-89e6-468c-b1aa-fd262cc9cbd3", "DetectTime": "2023-10-30T13:57:06.569932+02:00", "EventTime": "2023-10-30T13:57:06.569950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CeEEqf3rtsPWSLnl6i"]} -{"Format": "IDEA0", "ID": "7e5b9a0d-4ec5-402a-912f-386243c5ccbc", "DetectTime": "2023-10-30T13:57:06.589771+02:00", "EventTime": "2023-10-30T13:57:06.589786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CkbLQP2NCWbXoAmrs7"]} -{"Format": "IDEA0", "ID": "589b7ae1-fbce-4a39-9402-179ea7f12e5d", "DetectTime": "2023-10-30T13:57:06.610832+02:00", "EventTime": "2023-10-30T13:57:06.610850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CQELMT1pwNj8KNBNlk"]} -{"Format": "IDEA0", "ID": "b897600c-92a5-483f-8f31-13b718e230e4", "DetectTime": "2023-10-30T13:57:06.626651+02:00", "EventTime": "2023-10-30T13:57:06.626670+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["ClpYts2UDsvjRfCOP5"]} -{"Format": "IDEA0", "ID": "5b1e6686-4348-4270-8551-f1d88b91a520", "DetectTime": "2023-10-30T13:57:06.641801+02:00", "EventTime": "2023-10-30T13:57:06.641827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CfP3gE2rG19XDOwbX6"]} -{"Format": "Json", "ID": "5b1e6686-4348-4270-8551-f1d88b91a520", "DetectTime": "2023-10-30T13:57:06.641801+02:00", "EventTime": "2023-10-30T13:57:06.641827+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T04:19:52.753461+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:06.685204)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "542d8f05-5b60-4ea9-b0b3-2748d69f9316", "DetectTime": "2023-10-30T13:57:06.691024+02:00", "EventTime": "2023-10-30T13:57:06.691133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["C7PoxZ27OutzBjBk76"]} -{"Format": "IDEA0", "ID": "4911436f-d0f8-4207-b5ff-d4b2fe331ec3", "DetectTime": "2023-10-30T13:57:06.708738+02:00", "EventTime": "2023-10-30T13:57:06.708757+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVZ7cm2kYrdSOH5kq2"]} -{"Format": "IDEA0", "ID": "c3af0a21-739b-4a54-8ffb-efac3f236fa6", "DetectTime": "2023-10-30T13:57:06.723542+02:00", "EventTime": "2023-10-30T13:57:06.723560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["C0o6E83SpjN6lez1sl"]} -{"Format": "IDEA0", "ID": "9087c63b-3a07-4620-be93-d974cf32c6a7", "DetectTime": "2023-10-30T13:57:06.740117+02:00", "EventTime": "2023-10-30T13:57:06.740139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Cn5TXr3Hh8VzUVFzR4"]} -{"Format": "IDEA0", "ID": "787b469e-2ae7-4660-a6ed-80d1658df50e", "DetectTime": "2023-10-30T13:57:06.755686+02:00", "EventTime": "2023-10-30T13:57:06.755706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["ChyCCq4A8NLw49q5B1"]} -{"Format": "IDEA0", "ID": "6dcb6ea7-0d75-4068-ada2-a2b896881be2", "DetectTime": "2023-10-30T13:57:06.773994+02:00", "EventTime": "2023-10-30T13:57:06.774016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["ClpYts2UDsvjRfCOP5", "Cdd9YR3Nl6x7lGMo9h", "CJg0ap4hwGXvV1vKkj", "CDqUUN2bzQ82uKYAtf"]} -{"Format": "IDEA0", "ID": "6efd73dd-ff88-42fb-8360-08c6d7a0fc09", "DetectTime": "2023-10-30T13:57:06.797378+02:00", "EventTime": "2023-10-30T13:57:06.797401+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CDqUUN2bzQ82uKYAtf"]} -{"Format": "IDEA0", "ID": "041d60ee-7b90-4c66-9dbf-0cff256b69e2", "DetectTime": "2023-10-30T13:57:06.818507+02:00", "EventTime": "2023-10-30T13:57:06.818527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["CIF9IL3WXPkPy0Fjoi"]} -{"Format": "IDEA0", "ID": "fa923680-ad74-4915-9cca-1883ff855a66", "DetectTime": "2023-10-30T13:57:06.838903+02:00", "EventTime": "2023-10-30T13:57:06.838924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["ClpYly1v2sl2j1jVS2"]} -{"Format": "IDEA0", "ID": "31c0a02f-988d-48d9-9eb5-a86d05a04a2c", "DetectTime": "2023-10-30T13:57:06.857630+02:00", "EventTime": "2023-10-30T13:57:06.857645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CwHDLY2KLQyIeMIHwj"]} -{"Format": "IDEA0", "ID": "e7e18da9-0822-47e5-b98f-71c3d4641afb", "DetectTime": "2023-10-30T13:57:06.874880+02:00", "EventTime": "2023-10-30T13:57:06.874899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CXAPj31Hej3DS7iTie"]} -{"Format": "Json", "ID": "e7e18da9-0822-47e5-b98f-71c3d4641afb", "DetectTime": "2023-10-30T13:57:06.874880+02:00", "EventTime": "2023-10-30T13:57:06.874899+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-01T04:35:06.363850+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:06.931165)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "20c89069-85d6-47d8-b607-52ebbce608a9", "DetectTime": "2023-10-30T13:57:07.002311+02:00", "EventTime": "2023-10-30T13:57:07.002330+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cbnm9E1EmoTGlkMsWc"]} -{"Format": "IDEA0", "ID": "e1cbba48-6d8d-4fbc-917c-97faa18fc9fe", "DetectTime": "2023-10-30T13:57:07.053135+02:00", "EventTime": "2023-10-30T13:57:07.053154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["CyuF5f3PR8zUo5bkQ8"]} -{"Format": "IDEA0", "ID": "19cf859e-7204-4265-940a-4c0ed9fb83d6", "DetectTime": "2023-10-30T13:57:07.092666+02:00", "EventTime": "2023-10-30T13:57:07.092687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["C10NaJqaahotU2Rol"]} -{"Format": "IDEA0", "ID": "5ff86b59-a492-4756-8379-ec72da534660", "DetectTime": "2023-10-30T13:57:07.123029+02:00", "EventTime": "2023-10-30T13:57:07.123051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["CZu6l538aAfWX9scs2"]} -{"Format": "IDEA0", "ID": "57ddeb29-5a60-4d9b-b389-ce53ac398e65", "DetectTime": "2023-10-30T13:57:07.155627+02:00", "EventTime": "2023-10-30T13:57:07.155653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["C5KXDQ1a80fjrH6xvj"]} -{"Format": "IDEA0", "ID": "669c0ed9-a1df-40ff-919f-8802cff1a207", "DetectTime": "2023-10-30T13:57:07.184438+02:00", "EventTime": "2023-10-30T13:57:07.184459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["C4Qbfi38CU5l7AFGDg"]} -{"Format": "IDEA0", "ID": "da50a4e9-3a77-46aa-9d29-d8001de56014", "DetectTime": "2023-10-30T13:57:07.218677+02:00", "EventTime": "2023-10-30T13:57:07.218699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CEgwYb1WufZudSbq61"]} -{"Format": "IDEA0", "ID": "4f632305-dc25-4e19-afd9-0fd3d41d199f", "DetectTime": "2023-10-30T13:57:07.248495+02:00", "EventTime": "2023-10-30T13:57:07.248516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. ", "ContentType": "text/plain"}], "uids": ["C10H491jQqqQshrcqc"]} -{"Format": "IDEA0", "ID": "14597522-0577-4140-b5ce-709fae96f61b", "DetectTime": "2023-10-30T13:57:07.278621+02:00", "EventTime": "2023-10-30T13:57:07.278800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CpgStc3gPHrkiCFAf1"]} -{"Format": "Json", "ID": "14597522-0577-4140-b5ce-709fae96f61b", "DetectTime": "2023-10-30T13:57:07.278621+02:00", "EventTime": "2023-10-30T13:57:07.278800+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T04:50:37.406301+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:07.345671)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a165dd3-f7f9-4370-8466-65d6e9797c55", "DetectTime": "2023-10-30T13:57:07.351153+02:00", "EventTime": "2023-10-30T13:57:07.351169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["C5Rf3a4SJo1KbHWfpj"]} -{"Format": "IDEA0", "ID": "9f7eb975-0dc5-4457-9b63-4c471157def1", "DetectTime": "2023-10-30T13:57:07.376154+02:00", "EventTime": "2023-10-30T13:57:07.376174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CecNYsaKaw6TTM0J9"]} -{"Format": "IDEA0", "ID": "5c58592c-0c1e-4d93-93e9-51bcd990d7a7", "DetectTime": "2023-10-30T13:57:07.397481+02:00", "EventTime": "2023-10-30T13:57:07.397499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CHogNp1csmLTusxjAh"]} -{"Format": "IDEA0", "ID": "f810c844-a6ee-4149-becc-5db3b0bb3408", "DetectTime": "2023-10-30T13:57:07.418139+02:00", "EventTime": "2023-10-30T13:57:07.418157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CjNi1v3nPAW9re0Xtb"]} -{"Format": "IDEA0", "ID": "5c2c2bc6-7e9e-4e50-9f23-e1992040d778", "DetectTime": "2023-10-30T13:57:07.439779+02:00", "EventTime": "2023-10-30T13:57:07.439798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CdhNF648o3qbbkc0r4"]} -{"Format": "IDEA0", "ID": "9e0e2f16-6a06-4a1b-ad5b-72e7ec90b56f", "DetectTime": "2023-10-30T13:57:07.468261+02:00", "EventTime": "2023-10-30T13:57:07.468277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["C2PjOL3zVxu9fbbPel"]} -{"Format": "IDEA0", "ID": "4f507c80-5607-402d-8b36-7ec874f74c53", "DetectTime": "2023-10-30T13:57:07.496186+02:00", "EventTime": "2023-10-30T13:57:07.496200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CgcQGROEYWWLzzOE6"]} -{"Format": "IDEA0", "ID": "97f125ba-e854-4bd8-96e5-a66cbaf8436f", "DetectTime": "2023-10-30T13:57:07.524022+02:00", "EventTime": "2023-10-30T13:57:07.524038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CXjf5Q0dKMFU00BJb"]} -{"Format": "Json", "ID": "97f125ba-e854-4bd8-96e5-a66cbaf8436f", "DetectTime": "2023-10-30T13:57:07.524022+02:00", "EventTime": "2023-10-30T13:57:07.524038+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T04:50:39.501223+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:07.580203)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "66f078a4-309e-43c4-8516-3ef07641822d", "DetectTime": "2023-10-30T13:57:07.588479+02:00", "EventTime": "2023-10-30T13:57:07.588505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CBnQnspzVW61pgS1"]} -{"Format": "IDEA0", "ID": "7ff1f790-0ca4-4650-96f7-ce0d15580748", "DetectTime": "2023-10-30T13:57:07.617735+02:00", "EventTime": "2023-10-30T13:57:07.617758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CUOhVP39q4fZXDx15"]} -{"Format": "IDEA0", "ID": "969bb516-19a9-46c4-b718-c5fff47640ff", "DetectTime": "2023-10-30T13:57:07.641209+02:00", "EventTime": "2023-10-30T13:57:07.641229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CHnjLY1ddMqlNUE3g5"]} -{"Format": "IDEA0", "ID": "a13c2b04-5e43-48ae-b178-2a2987872f59", "DetectTime": "2023-10-30T13:57:07.669752+02:00", "EventTime": "2023-10-30T13:57:07.669770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CjjLqu4NjKfE77EKo7"]} -{"Format": "IDEA0", "ID": "6d9be093-3590-4a94-b9ab-2a91304968e3", "DetectTime": "2023-10-30T13:57:07.705522+02:00", "EventTime": "2023-10-30T13:57:07.705541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C7pifokl3IaEiQ1Lb"]} -{"Format": "IDEA0", "ID": "05101661-306e-49ac-aa98-3c05beb896ec", "DetectTime": "2023-10-30T13:57:07.729472+02:00", "EventTime": "2023-10-30T13:57:07.729490+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C11XSy3EkdN12wL1Oc"]} -{"Format": "IDEA0", "ID": "53867c5c-fab0-460b-8300-178ad13d6f67", "DetectTime": "2023-10-30T13:57:07.740152+02:00", "EventTime": "2023-10-30T13:57:07.740169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CrlkG71haZZLFNXDpf"]} -{"Format": "IDEA0", "ID": "1bfba8e7-87e7-4f51-b5f5-b7d0894d3ed9", "DetectTime": "2023-10-30T13:57:07.772425+02:00", "EventTime": "2023-10-30T13:57:07.772447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CaWPQo4Imf4UJF7p7f"]} -{"Format": "IDEA0", "ID": "f5b13436-eb92-4bcc-b864-4432f78d394b", "DetectTime": "2023-10-30T13:57:07.803471+02:00", "EventTime": "2023-10-30T13:57:07.803494+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CT5il4Q9iumhMkvCj"]} -{"Format": "IDEA0", "ID": "dbed44a0-38fc-43b2-93a6-243d25af3d02", "DetectTime": "2023-10-30T13:57:07.815971+02:00", "EventTime": "2023-10-30T13:57:07.815994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CiY8A42aFD8ollDmh9"]} -{"Format": "Json", "ID": "dbed44a0-38fc-43b2-93a6-243d25af3d02", "DetectTime": "2023-10-30T13:57:07.815971+02:00", "EventTime": "2023-10-30T13:57:07.815994+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T04:50:41.529617+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2023/10/30 13:57:07.875760)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa511151-26cb-4403-95ab-42bcf76f0996", "DetectTime": "2023-10-30T13:57:07.882356+02:00", "EventTime": "2023-10-30T13:57:07.882374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Ce4VPr4iJAR5HdRel3"]} -{"Format": "IDEA0", "ID": "4c3f7b83-1cfb-478f-a42a-d82b0dd12852", "DetectTime": "2023-10-30T13:57:07.914491+02:00", "EventTime": "2023-10-30T13:57:07.914511+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CYANEg3JatnG25JjNd"]} -{"Format": "IDEA0", "ID": "1d777113-247b-4e4d-81b1-6c98089876b4", "DetectTime": "2023-10-30T13:57:07.924211+02:00", "EventTime": "2023-10-30T13:57:07.924231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CTcBou4P9UcvWadZfa"]} -{"Format": "IDEA0", "ID": "60eec2b4-9d34-49ad-81ed-7f0037745e6f", "DetectTime": "2023-10-30T13:57:07.951156+02:00", "EventTime": "2023-10-30T13:57:07.951174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CdocC51hTg0uQ0fm1i"]} -{"Format": "IDEA0", "ID": "90701420-c17d-4ea9-b6d8-08ede2cac17c", "DetectTime": "2023-10-30T13:57:07.982467+02:00", "EventTime": "2023-10-30T13:57:07.982484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["CAf4Id2yB4AF2JPKTj"]} -{"Format": "IDEA0", "ID": "8715eb39-ad24-4e39-97cc-4d700b3aa187", "DetectTime": "2023-10-30T13:57:08.005179+02:00", "EventTime": "2023-10-30T13:57:08.005197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["CqMztttFCX3PPKFe"]} -{"Format": "IDEA0", "ID": "14207beb-8e5f-4918-b603-237d60e67e11", "DetectTime": "2023-10-30T13:57:08.030726+02:00", "EventTime": "2023-10-30T13:57:08.030742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CjS4EK21Ce7dfLdTic"]} -{"Format": "IDEA0", "ID": "a811114f-a6c4-4eaa-ab66-ab782e82d055", "DetectTime": "2023-10-30T13:57:08.074956+02:00", "EventTime": "2023-10-30T13:57:08.074978+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIvB0c2G2LNRdAfqm4"]} -{"Format": "IDEA0", "ID": "674e6640-1e03-474f-9fd9-49971d615862", "DetectTime": "2023-10-30T13:57:08.145184+02:00", "EventTime": "2023-10-30T13:57:08.145201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. ", "ContentType": "text/plain"}], "uids": ["CcBccv27WFwsJmumaj"]} -{"Format": "IDEA0", "ID": "72aa2549-5347-4cc0-8afc-ad604241ab38", "DetectTime": "2023-10-30T13:57:08.164697+02:00", "EventTime": "2023-10-30T13:57:08.164716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["Coz5Cg2JotrmWdyjUj"]} -{"Format": "IDEA0", "ID": "01b449a7-9f59-472d-9d21-0f1822e2fbe5", "DetectTime": "2023-10-30T13:57:08.183220+02:00", "EventTime": "2023-10-30T13:57:08.183239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["C9KtBq19mqfDxIFWm"]} -{"Format": "IDEA0", "ID": "bc9bd410-3038-48c3-b4bd-f503e5eaff67", "DetectTime": "2023-10-30T13:57:08.202565+02:00", "EventTime": "2023-10-30T13:57:08.202584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. ", "ContentType": "text/plain"}], "uids": ["CfoEon1LRTH64MHSp5"]} -{"Format": "IDEA0", "ID": "62f04975-a1b6-4cb4-9b88-3b164140848b", "DetectTime": "2023-10-30T13:57:08.221790+02:00", "EventTime": "2023-10-30T13:57:08.221808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. ", "ContentType": "text/plain"}], "uids": ["CqusX01EICqiUch1Uh"]} -{"Format": "IDEA0", "ID": "19b70b9e-71f7-45f7-a331-77f88a8d0980", "DetectTime": "2023-10-30T13:57:08.240556+02:00", "EventTime": "2023-10-30T13:57:08.240572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C1K5sC4IuYDuS30otf"]} -{"Format": "IDEA0", "ID": "0227b3e9-b9e1-48b4-aefe-0e2bff25e072", "DetectTime": "2023-10-30T13:57:08.271653+02:00", "EventTime": "2023-10-30T13:57:08.271670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["Cb3r5B2ghZHxjWxkCf"]} -{"Format": "Json", "ID": "0227b3e9-b9e1-48b4-aefe-0e2bff25e072", "DetectTime": "2023-10-30T13:57:08.271653+02:00", "EventTime": "2023-10-30T13:57:08.271670+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:21:31.508644+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:08.311253)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "21ddfc3a-a191-4430-811b-fc57647c942d", "DetectTime": "2023-10-30T13:57:08.318084+02:00", "EventTime": "2023-10-30T13:57:08.318106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["Cmt2pu37KbZn9mqG0f"]} -{"Format": "IDEA0", "ID": "eddf5726-c697-4795-97f2-527bb65e143d", "DetectTime": "2023-10-30T13:57:08.452293+02:00", "EventTime": "2023-10-30T13:57:08.452310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CPrIdz4hGFvjiuo925"]} -{"Format": "IDEA0", "ID": "25261154-0f69-4d3c-93c7-86be83889842", "DetectTime": "2023-10-30T13:57:08.557374+02:00", "EventTime": "2023-10-30T13:57:08.557394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CwD0qtCBYI6DldBpj"]} -{"Format": "IDEA0", "ID": "97fd6953-ad11-4c35-99a3-d711857a9032", "DetectTime": "2023-10-30T13:57:08.648760+02:00", "EventTime": "2023-10-30T13:57:08.648777+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CCLU9B4Mc2GlBXoGng"]} -{"Format": "IDEA0", "ID": "d63e0664-9eab-42cc-94a3-1ae3ccdcafc4", "DetectTime": "2023-10-30T13:57:08.723725+02:00", "EventTime": "2023-10-30T13:57:08.723750+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoUxBvLtduCGrZBdd"]} -{"Format": "IDEA0", "ID": "4b74ccd0-7956-4269-a686-ea2fcc02395d", "DetectTime": "2023-10-30T13:57:08.761043+02:00", "EventTime": "2023-10-30T13:57:08.761062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CGmCXu424bWBn18iSk"]} -{"Format": "IDEA0", "ID": "b1032288-92e0-4207-849d-742a367ddea0", "DetectTime": "2023-10-30T13:57:09.039513+02:00", "EventTime": "2023-10-30T13:57:09.039527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CnWHpnStBFSpmx1Sj"]} -{"Format": "IDEA0", "ID": "c23e4822-fdcb-4f7c-9c74-ea02e692b4b1", "DetectTime": "2023-10-30T13:57:09.142767+02:00", "EventTime": "2023-10-30T13:57:09.142817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.57.220"], "Hostname": ["adsl-ull-220-57.45-151.wind.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.57.220 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-220-57.45-151.wind.it", "ContentType": "text/plain"}], "uids": ["CFhxskAPu7WOsrhE3"]} -{"Format": "IDEA0", "ID": "ab0a1ce9-24b1-42b8-ac43-dc7de73b34d2", "DetectTime": "2023-10-30T13:57:09.259832+02:00", "EventTime": "2023-10-30T13:57:09.259851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["C8GYpm1hIuArEu43s6"]} -{"Format": "IDEA0", "ID": "aaedb96d-4567-4116-85b6-07d748623a17", "DetectTime": "2023-10-30T13:57:09.351147+02:00", "EventTime": "2023-10-30T13:57:09.351167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCLU9B4Mc2GlBXoGng", "CuVaNw2Rqhxqvg3X52", "CYANEg3JatnG25JjNd", "C11XSy3EkdN12wL1Oc"]} -{"Format": "IDEA0", "ID": "a1cd406f-2efb-45e2-9890-221a3768412c", "DetectTime": "2023-10-30T13:57:09.359849+02:00", "EventTime": "2023-10-30T13:57:09.359872+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CuVaNw2Rqhxqvg3X52"]} -{"Format": "IDEA0", "ID": "13cf66f3-3efe-4190-802c-ee38d8f43355", "DetectTime": "2023-10-30T13:57:09.388272+02:00", "EventTime": "2023-10-30T13:57:09.388293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 ", "ContentType": "text/plain"}], "uids": ["CJMawoUUSYYf4G9"]} -{"Format": "IDEA0", "ID": "2c8b1a17-12e4-4a86-ac39-b44b5aaf09d4", "DetectTime": "2023-10-30T13:57:09.442267+02:00", "EventTime": "2023-10-30T13:57:09.442295+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7zqas1hxYCZ4yqlJa"]} -{"Format": "IDEA0", "ID": "6df587dd-c847-4117-9a0f-515ad83437c6", "DetectTime": "2023-10-30T13:57:09.452133+02:00", "EventTime": "2023-10-30T13:57:09.452152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CgFZkX10LdlYha8Qj"]} -{"Format": "IDEA0", "ID": "35bef32a-e2fa-4167-863c-ae52b81605e2", "DetectTime": "2023-10-30T13:57:09.597099+02:00", "EventTime": "2023-10-30T13:57:09.597118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CuFQqC1DjRx7zx6Gaj"]} -{"Format": "IDEA0", "ID": "1e464da1-07e1-452a-934d-ba81b0f5af89", "DetectTime": "2023-10-30T13:57:09.652462+02:00", "EventTime": "2023-10-30T13:57:09.652479+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cax9Dn2z6IBkIxC4Dc"]} -{"Format": "IDEA0", "ID": "bfef7f62-76fb-4541-9bf0-17f281e6eb6f", "DetectTime": "2023-10-30T13:57:09.665186+02:00", "EventTime": "2023-10-30T13:57:09.665209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 ", "ContentType": "text/plain"}], "uids": ["CkmdEp3NVViLqQiEGb"]} -{"Format": "IDEA0", "ID": "4431d590-aca3-4ce4-8db7-c0860a5e02bc", "DetectTime": "2023-10-30T13:57:09.720547+02:00", "EventTime": "2023-10-30T13:57:09.720562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CPTpm14dHM6sZWIdT2"]} -{"Format": "IDEA0", "ID": "0d08baf1-e062-444d-956f-f351e8d4bdd0", "DetectTime": "2023-10-30T13:57:09.739104+02:00", "EventTime": "2023-10-30T13:57:09.739123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CCpH6x2DaoH0ZcOUu6"]} -{"Format": "IDEA0", "ID": "c968d785-c047-4bb2-88f6-2888f67f3ea3", "DetectTime": "2023-10-30T13:57:09.799896+02:00", "EventTime": "2023-10-30T13:57:09.799915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["Cy3zqt1CFLbgByVo8"]} -{"Format": "IDEA0", "ID": "44994f6e-1654-485c-8992-6d04ad6e575f", "DetectTime": "2023-10-30T13:57:09.860373+02:00", "EventTime": "2023-10-30T13:57:09.860394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["Cupg1624oIJdwmmDnh"]} -{"Format": "IDEA0", "ID": "115c865b-3aec-4fd8-870b-f054e12c0f17", "DetectTime": "2023-10-30T13:57:09.932512+02:00", "EventTime": "2023-10-30T13:57:09.932538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["C0j7al1aWAl0m9obil"]} -{"Format": "IDEA0", "ID": "f4387ff6-8056-43e7-83c4-c30230f795bd", "DetectTime": "2023-10-30T13:57:09.994066+02:00", "EventTime": "2023-10-30T13:57:09.994091+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cvk3MX3wxd0YbJTaca"]} -{"Format": "IDEA0", "ID": "fb40d38d-aa6f-4a5a-9118-1437002884a8", "DetectTime": "2023-10-30T13:57:10.005369+02:00", "EventTime": "2023-10-30T13:57:10.005389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.194.29 ", "ContentType": "text/plain"}], "uids": ["Cp5NE02P7IwqZQg4Fk"]} -{"Format": "IDEA0", "ID": "c9d82a1e-1daf-44c4-a610-07be97743bee", "DetectTime": "2023-10-30T13:57:10.054196+02:00", "EventTime": "2023-10-30T13:57:10.054217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["CWc0q53WyUBL7J87x1"]} -{"Format": "IDEA0", "ID": "e0c20b13-fb48-45b9-988f-6a3310e2a8ad", "DetectTime": "2023-10-30T13:57:10.102505+02:00", "EventTime": "2023-10-30T13:57:10.102523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["ClNuh21YTwkRn5dI23"]} -{"Format": "IDEA0", "ID": "e44e6658-6b13-4aae-9cbb-44b82c970cca", "DetectTime": "2023-10-30T13:57:10.151990+02:00", "EventTime": "2023-10-30T13:57:10.152008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CtnYIp36GRntfLbRhg"]} -{"Format": "IDEA0", "ID": "612d48d6-12f6-4c95-b1af-c078a3b93351", "DetectTime": "2023-10-30T13:57:10.216357+02:00", "EventTime": "2023-10-30T13:57:10.216384+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CXT5kV3GYtqw8UGSk"]} -{"Format": "IDEA0", "ID": "1d36fd1e-63a3-4122-9f2c-27b1d6c6997a", "DetectTime": "2023-10-30T13:57:10.227420+02:00", "EventTime": "2023-10-30T13:57:10.227437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["CI7bW221uanE9qawAg"]} -{"Format": "IDEA0", "ID": "1a99513e-0352-4a89-a68e-4edc25d84d2e", "DetectTime": "2023-10-30T13:57:10.280497+02:00", "EventTime": "2023-10-30T13:57:10.280516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.223.239.27 ", "ContentType": "text/plain"}], "uids": ["CgQQo808s4X1UCCF7"]} -{"Format": "IDEA0", "ID": "fc2b27c3-c8ea-4edb-b965-6dc3c36b7c15", "DetectTime": "2023-10-30T13:57:10.334017+02:00", "EventTime": "2023-10-30T13:57:10.334037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CwbWMZ3FxLlrD9mtx9"]} -{"Format": "IDEA0", "ID": "caf219fc-330d-4086-bfc1-c2b9f17f02ba", "DetectTime": "2023-10-30T13:57:10.389857+02:00", "EventTime": "2023-10-30T13:57:10.389874+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIeB902jg99t3K7w5i"]} -{"Format": "IDEA0", "ID": "bb44a37e-fd78-4802-8057-e9b0f5d68b12", "DetectTime": "2023-10-30T13:57:10.402432+02:00", "EventTime": "2023-10-30T13:57:10.402455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["C3PdBH3fjFPynU7Y74"]} -{"Format": "IDEA0", "ID": "2a2e1e67-695e-4eec-a082-32d263172404", "DetectTime": "2023-10-30T13:57:10.451895+02:00", "EventTime": "2023-10-30T13:57:10.451915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CuV21i3lAtVG1Mc5fi"]} -{"Format": "Json", "ID": "2a2e1e67-695e-4eec-a082-32d263172404", "DetectTime": "2023-10-30T13:57:10.451895+02:00", "EventTime": "2023-10-30T13:57:10.451915+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:21:33.982484+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:10.512458)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4e0f4396-6e6e-4f0d-9da3-b6a218cc54c8", "DetectTime": "2023-10-30T13:57:10.520760+02:00", "EventTime": "2023-10-30T13:57:10.520782+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CmrFt31GiDV4rU6R84"]} -{"Format": "IDEA0", "ID": "f6b79a6e-481c-402d-8e3f-60949eb6b85e", "DetectTime": "2023-10-30T13:57:10.538682+02:00", "EventTime": "2023-10-30T13:57:10.538707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["Ch4Huy4d0IZXzSNHic"]} -{"Format": "IDEA0", "ID": "80a17cb4-c276-459a-bd70-721bbf495ac6", "DetectTime": "2023-10-30T13:57:10.597737+02:00", "EventTime": "2023-10-30T13:57:10.597758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CdJodz2MboRiUgXpIl"]} -{"Format": "IDEA0", "ID": "931a880c-7d32-4592-a3ff-32ad0584bff6", "DetectTime": "2023-10-30T13:57:10.651689+02:00", "EventTime": "2023-10-30T13:57:10.651710+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtvUOlgcHLjInrCHl"]} -{"Format": "IDEA0", "ID": "b6e85226-e625-4526-9365-f61fa865444f", "DetectTime": "2023-10-30T13:57:10.788669+02:00", "EventTime": "2023-10-30T13:57:10.788684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmrFt31GiDV4rU6R84", "CXT5kV3GYtqw8UGSk", "CAyQjM2UoCLPeBlJXd", "Cax9Dn2z6IBkIxC4Dc"]} -{"Format": "IDEA0", "ID": "92edab48-befa-464a-8dcf-f2f18e69d8cf", "DetectTime": "2023-10-30T13:57:10.806349+02:00", "EventTime": "2023-10-30T13:57:10.806363+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CAyQjM2UoCLPeBlJXd"]} -{"Format": "IDEA0", "ID": "91ae8f89-c41f-4597-a3da-30d09419a16b", "DetectTime": "2023-10-30T13:57:10.878615+02:00", "EventTime": "2023-10-30T13:57:10.878635+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cdovse4igSU51u01Ll"]} -{"Format": "IDEA0", "ID": "217ef199-65ad-4792-8dc3-44379e7caaba", "DetectTime": "2023-10-30T13:57:10.945598+02:00", "EventTime": "2023-10-30T13:57:10.945619+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CCtSgj3doiM3B4wrr2"]} -{"Format": "IDEA0", "ID": "01906ddb-178b-4377-8e6d-92122fa143c5", "DetectTime": "2023-10-30T13:57:11.006050+02:00", "EventTime": "2023-10-30T13:57:11.006069+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cnr9evMDE508tKtP4"]} -{"Format": "IDEA0", "ID": "f16aa962-cfca-4667-92f0-e6c9b2bf53f5", "DetectTime": "2023-10-30T13:57:11.076035+02:00", "EventTime": "2023-10-30T13:57:11.076054+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CCUCFj4E5E5bXxnzoj"]} -{"Format": "IDEA0", "ID": "d54d055a-2fdd-4d3e-9092-a223e2bc891a", "DetectTime": "2023-10-30T13:57:11.199321+02:00", "EventTime": "2023-10-30T13:57:11.199348+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5vRgi24uOlw0kaOU2"]} -{"Format": "IDEA0", "ID": "85ff680e-8bf1-4e27-baf7-51a9cb063982", "DetectTime": "2023-10-30T13:57:11.238465+02:00", "EventTime": "2023-10-30T13:57:11.238484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CCQLa918QjtTK0qqu1"]} -{"Format": "IDEA0", "ID": "0bb02805-fafb-49fe-bf67-8a8f02ef6390", "DetectTime": "2023-10-30T13:57:11.267035+02:00", "EventTime": "2023-10-30T13:57:11.267059+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CjpwmMA505xFEyd9a"]} -{"Format": "IDEA0", "ID": "51fb8b41-e6d3-4cfd-aed0-2cfbf9d334ed", "DetectTime": "2023-10-30T13:57:11.614570+02:00", "EventTime": "2023-10-30T13:57:11.614592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CwSvZfdwrzSq0Jp6d"]} -{"Format": "IDEA0", "ID": "7b26afd9-baec-478a-b789-550deba11e0d", "DetectTime": "2023-10-30T13:57:11.740612+02:00", "EventTime": "2023-10-30T13:57:11.740629+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDgG7731oiSLC8QWEb"]} -{"Format": "IDEA0", "ID": "f24d0e40-8518-41a4-a6b4-9571decb85e9", "DetectTime": "2023-10-30T13:57:11.932807+02:00", "EventTime": "2023-10-30T13:57:11.932834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CrdtbF4SXMCV6qYWrh"]} -{"Format": "IDEA0", "ID": "c0e08e5f-1212-4d92-8e4c-efaf688c28ba", "DetectTime": "2023-10-30T13:57:11.981369+02:00", "EventTime": "2023-10-30T13:57:11.981395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCtSgj3doiM3B4wrr2", "CjpwmMA505xFEyd9a", "CxDI8r1fvRZYf6DKG6", "CCUCFj4E5E5bXxnzoj"]} -{"Format": "IDEA0", "ID": "6bc892e1-6eb1-4c72-b31f-673ef84ea6fc", "DetectTime": "2023-10-30T13:57:11.989469+02:00", "EventTime": "2023-10-30T13:57:11.989494+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CxDI8r1fvRZYf6DKG6"]} -{"Format": "IDEA0", "ID": "715c77b7-6799-4992-93c9-dc77e0880ace", "DetectTime": "2023-10-30T13:57:12.169364+02:00", "EventTime": "2023-10-30T13:57:12.169386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.154.42.157 ", "ContentType": "text/plain"}], "uids": ["CsgT0YUwBD0xfQmCl"]} -{"Format": "IDEA0", "ID": "e8e0f616-3168-434b-97a0-42d537bb040f", "DetectTime": "2023-10-30T13:57:12.229975+02:00", "EventTime": "2023-10-30T13:57:12.229996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.22.228.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.22.228.63 ", "ContentType": "text/plain"}], "uids": ["CU4ByA4Nt8xmgBpk9d"]} -{"Format": "IDEA0", "ID": "540fbc91-fe60-4a9c-a75c-dcc2397d4cc1", "DetectTime": "2023-10-30T13:57:12.369864+02:00", "EventTime": "2023-10-30T13:57:12.369884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.154.42.157 ", "ContentType": "text/plain"}], "uids": ["COevIB2sFGxMnDGr2"]} -{"Format": "IDEA0", "ID": "18733f02-f261-47fa-bdcd-671aa78cda97", "DetectTime": "2023-10-30T13:57:12.449617+02:00", "EventTime": "2023-10-30T13:57:12.449640+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CekV8o376fz3PW2A6i"]} -{"Format": "IDEA0", "ID": "0a85f442-9422-4ec7-ba7d-93566b490c7b", "DetectTime": "2023-10-30T13:57:12.507250+02:00", "EventTime": "2023-10-30T13:57:12.507272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.9.200 ", "ContentType": "text/plain"}], "uids": ["Cw38NF3scB3FQP6Ja"]} -{"Format": "IDEA0", "ID": "adeb01a3-c8c6-4bec-9e10-222a5106ed7a", "DetectTime": "2023-10-30T13:57:12.655021+02:00", "EventTime": "2023-10-30T13:57:12.655039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["Czb3gl191NJOqv6Sre"]} -{"Format": "IDEA0", "ID": "9a7bb9a9-7582-49b1-a0b5-15821250106c", "DetectTime": "2023-10-30T13:57:12.702399+02:00", "EventTime": "2023-10-30T13:57:12.702426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.122.62.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.122.62.185 ", "ContentType": "text/plain"}], "uids": ["CW0e3u3jIoOsgpAjkj"]} -{"Format": "IDEA0", "ID": "57f67d2e-475b-4a31-9f75-8fa17f35649d", "DetectTime": "2023-10-30T13:57:12.810639+02:00", "EventTime": "2023-10-30T13:57:12.810657+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CAmoYK3kqgX7zPdpy5"]} -{"Format": "IDEA0", "ID": "240b7e3b-96c9-4745-a452-ddb86df8ac7e", "DetectTime": "2023-10-30T13:57:12.866490+02:00", "EventTime": "2023-10-30T13:57:12.866512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["Ceh8P1LiHW4ru0LEc"]} -{"Format": "IDEA0", "ID": "65c51b47-a5ca-4baf-94b8-3bf69958f417", "DetectTime": "2023-10-30T13:57:12.930193+02:00", "EventTime": "2023-10-30T13:57:12.930208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["C6hKs436nF5QR9Th4j"]} -{"Format": "IDEA0", "ID": "8cdd9691-1548-4e1f-8033-4c8ee31a5e01", "DetectTime": "2023-10-30T13:57:12.991790+02:00", "EventTime": "2023-10-30T13:57:12.991817+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXMBVB4qapnJZXPkxf"]} -{"Format": "IDEA0", "ID": "6766a320-c5eb-4aae-8d46-174c4d1c0e2c", "DetectTime": "2023-10-30T13:57:13.139183+02:00", "EventTime": "2023-10-30T13:57:13.139200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CCiQDh2uFJb09HdD38"]} -{"Format": "IDEA0", "ID": "3796cc41-182f-42a2-bf75-13bf42b23ba0", "DetectTime": "2023-10-30T13:57:13.196537+02:00", "EventTime": "2023-10-30T13:57:13.196555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.232.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.232.130 ", "ContentType": "text/plain"}], "uids": ["CTrJaD3nEEtVqnO372"]} -{"Format": "IDEA0", "ID": "2c1e7988-ace3-4af0-888b-9b4d86d28652", "DetectTime": "2023-10-30T13:57:13.248688+02:00", "EventTime": "2023-10-30T13:57:13.248709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.126.57 ", "ContentType": "text/plain"}], "uids": ["CJfKvo4r1OKriRO9p3"]} -{"Format": "IDEA0", "ID": "ea38838a-4324-4b04-9211-9f3e22dc3a32", "DetectTime": "2023-10-30T13:57:13.570721+02:00", "EventTime": "2023-10-30T13:57:13.570742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 ", "ContentType": "text/plain"}], "uids": ["CPsuCb34Vs1QyDlTSj"]} -{"Format": "IDEA0", "ID": "f924a365-174f-4c5f-b56b-45a189d3398d", "DetectTime": "2023-10-30T13:57:13.637727+02:00", "EventTime": "2023-10-30T13:57:13.637752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.106.248.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.106.248.231 ", "ContentType": "text/plain"}], "uids": ["CUoMOE25o1uA9fGxOb"]} -{"Format": "IDEA0", "ID": "b7d81b6e-a30c-4f2f-8721-1054a09feea0", "DetectTime": "2023-10-30T13:57:13.718414+02:00", "EventTime": "2023-10-30T13:57:13.718431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["Cqi0Dz3LEhb17zXVYg"]} -{"Format": "IDEA0", "ID": "a3fd4fbc-d635-4375-b8d5-35e45f0fbf2e", "DetectTime": "2023-10-30T13:57:13.783478+02:00", "EventTime": "2023-10-30T13:57:13.783494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.233.22.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.233.22.243 ", "ContentType": "text/plain"}], "uids": ["CFO9xM1Lnqtnk1udn9"]} -{"Format": "IDEA0", "ID": "9f6d5603-e07c-4f36-a61a-ed3c6863ebb1", "DetectTime": "2023-10-30T13:57:13.856189+02:00", "EventTime": "2023-10-30T13:57:13.856207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CQvXMx1V9930NAYYE5"]} -{"Format": "IDEA0", "ID": "6723dd25-df9b-4ec3-87a3-3c380f86060f", "DetectTime": "2023-10-30T13:57:13.908461+02:00", "EventTime": "2023-10-30T13:57:13.908481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.55.197.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.55.197.94 ", "ContentType": "text/plain"}], "uids": ["CFbvR21TIxU3wqaJ4i"]} -{"Format": "IDEA0", "ID": "871571fe-eae1-46dd-bd73-53eb85989f52", "DetectTime": "2023-10-30T13:57:14.019295+02:00", "EventTime": "2023-10-30T13:57:14.019317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.94.67.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.94.67.10 ", "ContentType": "text/plain"}], "uids": ["CWy7hq2D9qCjh1toNf"]} -{"Format": "IDEA0", "ID": "40009910-de04-458c-b747-259425ad5eb2", "DetectTime": "2023-10-30T13:57:14.081461+02:00", "EventTime": "2023-10-30T13:57:14.081478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.42.211.201"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.42.211.201 ", "ContentType": "text/plain"}], "uids": ["Cyw3ad2UsjtkaNcTOl"]} -{"Format": "IDEA0", "ID": "faddd48f-c540-4bdc-82db-cc1047ed14b6", "DetectTime": "2023-10-30T13:57:14.137647+02:00", "EventTime": "2023-10-30T13:57:14.137664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 ", "ContentType": "text/plain"}], "uids": ["CN0v5N3cgsw12mjHj7"]} -{"Format": "IDEA0", "ID": "a5d39537-404a-4edd-88de-4b3bae3f5527", "DetectTime": "2023-10-30T13:57:14.199037+02:00", "EventTime": "2023-10-30T13:57:14.199062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CPZoPo11kEffgNHe19"]} -{"Format": "IDEA0", "ID": "46e5c0a9-7b75-4b1a-bea9-027c10003146", "DetectTime": "2023-10-30T13:57:14.271309+02:00", "EventTime": "2023-10-30T13:57:14.271330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.52.202 ", "ContentType": "text/plain"}], "uids": ["COBsKd239UfGcD4oH"]} -{"Format": "IDEA0", "ID": "43431062-7170-43be-b080-48ffe65f444b", "DetectTime": "2023-10-30T13:57:14.378185+02:00", "EventTime": "2023-10-30T13:57:14.378208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CLOqCf3snPygo1cJEg"]} -{"Format": "IDEA0", "ID": "dd26824b-b22e-4ce2-a839-7ff016236f6d", "DetectTime": "2023-10-30T13:57:14.443398+02:00", "EventTime": "2023-10-30T13:57:14.443412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.165.6.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.165.6.146 ", "ContentType": "text/plain"}], "uids": ["CJgUU9v9TWYWqp5m6"]} -{"Format": "IDEA0", "ID": "00d8fbab-ba4e-4175-90d7-b16b55ad4792", "DetectTime": "2023-10-30T13:57:14.509621+02:00", "EventTime": "2023-10-30T13:57:14.509640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["Cbm1HA19QRlKhvnTI1"]} -{"Format": "IDEA0", "ID": "c30d8cd7-c49f-4709-9ed9-9beb9109bf3e", "DetectTime": "2023-10-30T13:57:14.572965+02:00", "EventTime": "2023-10-30T13:57:14.573135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CCSROwXj0KkcSoit5"]} -{"Format": "IDEA0", "ID": "88da00e8-817b-46f0-bc3f-489d16a9cd5d", "DetectTime": "2023-10-30T13:57:14.621922+02:00", "EventTime": "2023-10-30T13:57:14.621938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CSzXbGWBmXcPx1Ik5"]} -{"Format": "IDEA0", "ID": "ea357952-4a87-49ba-862e-6b88306b2492", "DetectTime": "2023-10-30T13:57:14.684914+02:00", "EventTime": "2023-10-30T13:57:14.684934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.151.170.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.151.170.232 ", "ContentType": "text/plain"}], "uids": ["CqVwUO191FOwtAQV3a"]} -{"Format": "IDEA0", "ID": "00e18a68-263e-46a5-8abf-050f22f0d8a5", "DetectTime": "2023-10-30T13:57:14.754662+02:00", "EventTime": "2023-10-30T13:57:14.754678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["209.12.192.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 209.12.192.228 ", "ContentType": "text/plain"}], "uids": ["CUurZs2WjAPy52Lbu5"]} -{"Format": "IDEA0", "ID": "5ebfba5d-1122-4151-a856-27d374026ab8", "DetectTime": "2023-10-30T13:57:14.820994+02:00", "EventTime": "2023-10-30T13:57:14.821017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.19.92.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.19.92.194 ", "ContentType": "text/plain"}], "uids": ["CzZw3mAzXfUBXB6X3"]} -{"Format": "IDEA0", "ID": "e7f17d4d-1db1-4ed4-8fed-dd2f4d40d657", "DetectTime": "2023-10-30T13:57:14.922262+02:00", "EventTime": "2023-10-30T13:57:14.922279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.232.61.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.232.61.59 ", "ContentType": "text/plain"}], "uids": ["CDzsef18YmEOmnF01f"]} -{"Format": "IDEA0", "ID": "84df4657-3e93-4c4f-98e2-e1b611ee6ff3", "DetectTime": "2023-10-30T13:57:14.977038+02:00", "EventTime": "2023-10-30T13:57:14.977056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CvL8ak3jI5qRBUKTg2"]} -{"Format": "IDEA0", "ID": "b2ef8703-a98b-40c5-9c93-22c43d6fddb8", "DetectTime": "2023-10-30T13:57:15.039351+02:00", "EventTime": "2023-10-30T13:57:15.039368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.241.115.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.241.115.233 ", "ContentType": "text/plain"}], "uids": ["CtmeT94gQOmHJc27a6"]} -{"Format": "IDEA0", "ID": "f10318df-adc8-4d98-aec0-23b12c75cf27", "DetectTime": "2023-10-30T13:57:15.120093+02:00", "EventTime": "2023-10-30T13:57:15.120112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.125.106.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.125.106.103 ", "ContentType": "text/plain"}], "uids": ["CNSfZe3WHB3K3WLJ05"]} -{"Format": "IDEA0", "ID": "83bb9fa5-40ec-4c09-9892-5bedd7811b4c", "DetectTime": "2023-10-30T13:57:15.194819+02:00", "EventTime": "2023-10-30T13:57:15.194838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.82.113.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.82.113.18 ", "ContentType": "text/plain"}], "uids": ["CTQYi7qZjOZVLe6e"]} -{"Format": "IDEA0", "ID": "2b599065-a884-4ccd-8f4d-093ad23017dc", "DetectTime": "2023-10-30T13:57:15.263320+02:00", "EventTime": "2023-10-30T13:57:15.263337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CbRlfa2fO27ZxKZ1Q5"]} -{"Format": "IDEA0", "ID": "b91ac348-8432-4bdb-b941-dae7d99633cf", "DetectTime": "2023-10-30T13:57:15.325979+02:00", "EventTime": "2023-10-30T13:57:15.325995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.184.109.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.184.109.119 ", "ContentType": "text/plain"}], "uids": ["ChW6GX24l8nPLGwdIg"]} -{"Format": "IDEA0", "ID": "9998873d-7d1b-428b-9ea7-a320fff14713", "DetectTime": "2023-10-30T13:57:15.403679+02:00", "EventTime": "2023-10-30T13:57:15.403700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CEWz2J3ftkDEypQP3e"]} -{"Format": "IDEA0", "ID": "7cc6fd31-073a-461e-8b3c-000f03a8222e", "DetectTime": "2023-10-30T13:57:15.483166+02:00", "EventTime": "2023-10-30T13:57:15.483193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.250.117.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.250.117.232 ", "ContentType": "text/plain"}], "uids": ["ChzQ2DmM1yofQTPa4"]} -{"Format": "IDEA0", "ID": "dc547f31-62be-4d38-ac32-0de26effeba4", "DetectTime": "2023-10-30T13:57:15.550432+02:00", "EventTime": "2023-10-30T13:57:15.550452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.254.227.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.254.227.46 ", "ContentType": "text/plain"}], "uids": ["CQfPW61wiulbrXiTDb"]} -{"Format": "IDEA0", "ID": "fa9c45d0-2d3f-4e0f-a8c0-dd11c74a4496", "DetectTime": "2023-10-30T13:57:15.607640+02:00", "EventTime": "2023-10-30T13:57:15.607657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CPU0HG3bCQH6KTtbh9"]} -{"Format": "IDEA0", "ID": "890fac32-f819-4689-9fb3-905d90f91827", "DetectTime": "2023-10-30T13:57:15.666189+02:00", "EventTime": "2023-10-30T13:57:15.666209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.253.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.253.45 ", "ContentType": "text/plain"}], "uids": ["CPCpqTPJ8bQ4OkFR6"]} -{"Format": "IDEA0", "ID": "6c0c8856-3e4f-4fa3-b9ba-4aa1acb6827a", "DetectTime": "2023-10-30T13:57:15.728846+02:00", "EventTime": "2023-10-30T13:57:15.728861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["209.149.141.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 209.149.141.190 ", "ContentType": "text/plain"}], "uids": ["CFS5hR1nLaA8eR1OAe"]} -{"Format": "IDEA0", "ID": "b109f564-9a64-42ef-a89b-fffd7b6c937a", "DetectTime": "2023-10-30T13:57:15.781297+02:00", "EventTime": "2023-10-30T13:57:15.781318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CtvBa64gMKxv0rWUz5"]} -{"Format": "IDEA0", "ID": "3614647c-3eff-4c99-9a3c-4c8baedb5c60", "DetectTime": "2023-10-30T13:57:15.842180+02:00", "EventTime": "2023-10-30T13:57:15.842195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.15.249.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.15.249.138 ", "ContentType": "text/plain"}], "uids": ["C7ozDl1WDtJhCaXzXj"]} -{"Format": "IDEA0", "ID": "91e88464-c2d4-4792-a9b6-53bca2cd0b62", "DetectTime": "2023-10-30T13:57:15.893984+02:00", "EventTime": "2023-10-30T13:57:15.894026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.250.168.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.250.168.28 ", "ContentType": "text/plain"}], "uids": ["Cvmq0F131ZvwMM2M49"]} -{"Format": "IDEA0", "ID": "1d7fd2df-9d78-4c0e-9b81-37286cc4652f", "DetectTime": "2023-10-30T13:57:15.948399+02:00", "EventTime": "2023-10-30T13:57:15.948420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CVmHDv3mwWd6aaKjId"]} -{"Format": "IDEA0", "ID": "4e69a82a-05c5-4b5d-bbb3-aac194eb2117", "DetectTime": "2023-10-30T13:57:16.008440+02:00", "EventTime": "2023-10-30T13:57:16.008464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.241.238.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.241.238.162 ", "ContentType": "text/plain"}], "uids": ["CL6DvEl9KQKbVUTE5"]} -{"Format": "IDEA0", "ID": "4ed362af-47a3-472d-86f7-693bad45c191", "DetectTime": "2023-10-30T13:57:16.063088+02:00", "EventTime": "2023-10-30T13:57:16.063109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.38.41.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.38.41.24 ", "ContentType": "text/plain"}], "uids": ["CQxSQK3otefmwGTrQb"]} -{"Format": "IDEA0", "ID": "d45ec125-d98a-4cc4-b9f9-c7a68e5e8722", "DetectTime": "2023-10-30T13:57:16.128847+02:00", "EventTime": "2023-10-30T13:57:16.128873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.96.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.96.185 ", "ContentType": "text/plain"}], "uids": ["CWpgYK3YVlW3jeUmg7"]} -{"Format": "IDEA0", "ID": "d935f5b0-3345-4a0a-bba8-5f617954e25d", "DetectTime": "2023-10-30T13:57:16.197676+02:00", "EventTime": "2023-10-30T13:57:16.197692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["Crty5g1roloYO7aOAg"]} -{"Format": "IDEA0", "ID": "0c78530d-b837-463f-963f-097f1ef85c22", "DetectTime": "2023-10-30T13:57:16.262075+02:00", "EventTime": "2023-10-30T13:57:16.262090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.240.76.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.240.76.121 ", "ContentType": "text/plain"}], "uids": ["CnKiAu37jdBN0fjwji"]} -{"Format": "IDEA0", "ID": "a6efdc45-22f7-4526-8da1-57d26dfedf19", "DetectTime": "2023-10-30T13:57:16.316494+02:00", "EventTime": "2023-10-30T13:57:16.316511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.238.8.184"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.238.8.184 ", "ContentType": "text/plain"}], "uids": ["CkratzWvrkoTuN4C2"]} -{"Format": "IDEA0", "ID": "798ff184-bbb4-4049-b495-92997e0814f8", "DetectTime": "2023-10-30T13:57:16.377233+02:00", "EventTime": "2023-10-30T13:57:16.377256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.40.213.191"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.40.213.191 ", "ContentType": "text/plain"}], "uids": ["C2T1vy1y9MxXEWNJt6"]} -{"Format": "IDEA0", "ID": "accd22d9-9553-435b-82b4-23c7bbaff711", "DetectTime": "2023-10-30T13:57:16.444166+02:00", "EventTime": "2023-10-30T13:57:16.444189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CwTMUc3J4NVOa24Wgd"]} -{"Format": "IDEA0", "ID": "8f921446-6db8-4c50-99e6-bc6b583b18cc", "DetectTime": "2023-10-30T13:57:16.512418+02:00", "EventTime": "2023-10-30T13:57:16.512441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.3.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.3.27 ", "ContentType": "text/plain"}], "uids": ["C8Onbo3qldHgSBrmkd"]} -{"Format": "IDEA0", "ID": "94bb672f-dcdb-4a32-a5f2-30f3d4fd9008", "DetectTime": "2023-10-30T13:57:16.592242+02:00", "EventTime": "2023-10-30T13:57:16.592261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["ClbQlj2iGv97ChsEj"]} -{"Format": "IDEA0", "ID": "1ad28cb5-2d54-4e0e-aa7a-c2726a62c66f", "DetectTime": "2023-10-30T13:57:16.672635+02:00", "EventTime": "2023-10-30T13:57:16.672654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["162.197.203.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 162.197.203.58 ", "ContentType": "text/plain"}], "uids": ["CKKt7i3fSw6LoCt8tb"]} -{"Format": "IDEA0", "ID": "3bdddd6a-4cd1-4ecb-86e1-4b78befa6e7d", "DetectTime": "2023-10-30T13:57:16.735983+02:00", "EventTime": "2023-10-30T13:57:16.736000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CsnGIV31x6N7ysf2Ik"]} -{"Format": "IDEA0", "ID": "509e5ef5-57d0-4656-b9f5-eb73ab9a88f0", "DetectTime": "2023-10-30T13:57:16.757304+02:00", "EventTime": "2023-10-30T13:57:16.757329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.139.178.44 ", "ContentType": "text/plain"}], "uids": ["CXDOV51rODSD3KLdJe"]} -{"Format": "IDEA0", "ID": "84a070a6-0a2f-4fb1-98a3-ba8f4d495a5e", "DetectTime": "2023-10-30T13:57:16.813551+02:00", "EventTime": "2023-10-30T13:57:16.813569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.216.250.89"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.216.250.89 ", "ContentType": "text/plain"}], "uids": ["Cn7t42BTS6xdt8zG9"]} -{"Format": "IDEA0", "ID": "4fa2c76d-26ba-41bb-8fcd-25cb190318df", "DetectTime": "2023-10-30T13:57:16.876534+02:00", "EventTime": "2023-10-30T13:57:16.876564+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CteCNn2vfNov3wmPz6"]} -{"Format": "IDEA0", "ID": "ea026492-1f66-4cec-afd7-b1c7f2788428", "DetectTime": "2023-10-30T13:57:16.886715+02:00", "EventTime": "2023-10-30T13:57:16.886735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["CTZv7r3zolfaglQV8"]} -{"Format": "IDEA0", "ID": "444496cd-6a5b-4634-a739-fdd735400cae", "DetectTime": "2023-10-30T13:57:16.947145+02:00", "EventTime": "2023-10-30T13:57:16.947176+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSWsie1WqmlLzcAHnc"]} -{"Format": "IDEA0", "ID": "443fa304-8242-48d8-b996-aeb1a49b6814", "DetectTime": "2023-10-30T13:57:16.960393+02:00", "EventTime": "2023-10-30T13:57:16.960411+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CxUm1K3IdHHx4BAf7l"]} -{"Format": "IDEA0", "ID": "d1a42a31-130e-429c-ab92-26f27a5262c0", "DetectTime": "2023-10-30T13:57:16.971485+02:00", "EventTime": "2023-10-30T13:57:16.971509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.16.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.16.140 ", "ContentType": "text/plain"}], "uids": ["CVLsIS3TeEvUNSlGjd"]} -{"Format": "IDEA0", "ID": "1cae6525-047d-4a90-a098-a969e0f1a2b3", "DetectTime": "2023-10-30T13:57:17.021330+02:00", "EventTime": "2023-10-30T13:57:17.021357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.178.163.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.178.163.118 ", "ContentType": "text/plain"}], "uids": ["CNpTlv2Mbfw2f38juf"]} -{"Format": "IDEA0", "ID": "0a9dee85-7192-4bad-911f-73e0be6c8856", "DetectTime": "2023-10-30T13:57:17.084379+02:00", "EventTime": "2023-10-30T13:57:17.084400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.165.197.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.165.197.235 ", "ContentType": "text/plain"}], "uids": ["CXmgYd1MruC2RtIGn"]} -{"Format": "IDEA0", "ID": "8abcb6a2-c1bb-4a96-9d29-fa8e820d83cf", "DetectTime": "2023-10-30T13:57:17.148611+02:00", "EventTime": "2023-10-30T13:57:17.148632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.112.228.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.112.228.80 ", "ContentType": "text/plain"}], "uids": ["CUfjST2cKyAyDcTDP7"]} -{"Format": "IDEA0", "ID": "53452720-87dc-4bb0-ac39-43fbaa9a55b3", "DetectTime": "2023-10-30T13:57:17.203165+02:00", "EventTime": "2023-10-30T13:57:17.203181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.121.81.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.121.81.124 ", "ContentType": "text/plain"}], "uids": ["C0eraB1mUPmDOqg1P7"]} -{"Format": "IDEA0", "ID": "557eae78-f15f-43e4-82ae-17343d3bb7c2", "DetectTime": "2023-10-30T13:57:17.265157+02:00", "EventTime": "2023-10-30T13:57:17.265181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.110.135.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.110.135.243 ", "ContentType": "text/plain"}], "uids": ["CWOCys35JDMZZoiZId"]} -{"Format": "IDEA0", "ID": "52e42fb5-c92a-45cd-9a35-912904ba879e", "DetectTime": "2023-10-30T13:57:17.331081+02:00", "EventTime": "2023-10-30T13:57:17.331101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Csv62N1GxluNwkRVv1"]} -{"Format": "IDEA0", "ID": "6eeee6df-ddfe-4b7a-9f77-d1ef9275f775", "DetectTime": "2023-10-30T13:57:17.471230+02:00", "EventTime": "2023-10-30T13:57:17.471253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CVKuUJPsir7MHcwta"]} -{"Format": "IDEA0", "ID": "bde26ef3-683f-47c8-b863-78b4d59c278f", "DetectTime": "2023-10-30T13:57:17.547848+02:00", "EventTime": "2023-10-30T13:57:17.547864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.73.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.73.107 ", "ContentType": "text/plain"}], "uids": ["CELTQz3xzthtCDSsVf"]} -{"Format": "IDEA0", "ID": "beac36c0-10e1-4d91-af7c-59ef98d347dd", "DetectTime": "2023-10-30T13:57:17.637150+02:00", "EventTime": "2023-10-30T13:57:17.637168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.97.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.97.194 ", "ContentType": "text/plain"}], "uids": ["CWZRVCI7d80EdJD88"]} -{"Format": "IDEA0", "ID": "f7815022-0ded-4425-bec0-5fd2becf2241", "DetectTime": "2023-10-30T13:57:17.698757+02:00", "EventTime": "2023-10-30T13:57:17.698775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.92.1.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.92.1.214 ", "ContentType": "text/plain"}], "uids": ["ChIlRJ2EQDpLvkLhQf"]} -{"Format": "IDEA0", "ID": "53813ac4-a841-40b3-bfa5-2bc9f58e3cc6", "DetectTime": "2023-10-30T13:57:17.785673+02:00", "EventTime": "2023-10-30T13:57:17.785698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.132.36.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.132.36.119 ", "ContentType": "text/plain"}], "uids": ["CAe1H82Pm4ZyyaDY73"]} -{"Format": "IDEA0", "ID": "325c8c91-b958-4dc7-a11e-4b94c927d124", "DetectTime": "2023-10-30T13:57:17.847952+02:00", "EventTime": "2023-10-30T13:57:17.847974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.19.221.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.19.221.140 ", "ContentType": "text/plain"}], "uids": ["CoPKIG13xG0dESc14l"]} -{"Format": "IDEA0", "ID": "17f60d47-365d-4eda-a484-00438e86f015", "DetectTime": "2023-10-30T13:57:17.918824+02:00", "EventTime": "2023-10-30T13:57:17.918845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.236.84.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.236.84.133 ", "ContentType": "text/plain"}], "uids": ["CdYBRX2wvFpfVdB8Ii"]} -{"Format": "IDEA0", "ID": "1eb86fd5-1704-4dd0-9a43-6fb9b54e07d6", "DetectTime": "2023-10-30T13:57:17.989221+02:00", "EventTime": "2023-10-30T13:57:17.989241+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJCFJE1YNfeTso5Ndb"]} -{"Format": "IDEA0", "ID": "34f23384-69e7-4fe1-9fce-130029f2450c", "DetectTime": "2023-10-30T13:57:18.011668+02:00", "EventTime": "2023-10-30T13:57:18.011692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.131.60.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.131.60.18 ", "ContentType": "text/plain"}], "uids": ["CzSvy02JZ4mFLLyyGb"]} -{"Format": "IDEA0", "ID": "5faa597d-54f0-426c-9c7e-f9795cbfbcaa", "DetectTime": "2023-10-30T13:57:18.089012+02:00", "EventTime": "2023-10-30T13:57:18.089030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CgX1292dvUOnJtugB"]} -{"Format": "IDEA0", "ID": "79878624-341a-4f2a-b45c-96a19a248e36", "DetectTime": "2023-10-30T13:57:18.165663+02:00", "EventTime": "2023-10-30T13:57:18.165682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CxUm1K3IdHHx4BAf7l", "CteCNn2vfNov3wmPz6", "CAmoYK3kqgX7zPdpy5", "CAb36YBrspEuoMaBk"]} -{"Format": "IDEA0", "ID": "eabaedf6-45aa-4954-bd9a-14d303c40351", "DetectTime": "2023-10-30T13:57:18.180427+02:00", "EventTime": "2023-10-30T13:57:18.180497+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CAb36YBrspEuoMaBk"]} -{"Format": "IDEA0", "ID": "1d21b500-cda3-49c1-b0f2-aa7608fe5556", "DetectTime": "2023-10-30T13:57:18.198499+02:00", "EventTime": "2023-10-30T13:57:18.198525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.142.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.142.109 ", "ContentType": "text/plain"}], "uids": ["CHyijh3qsKp43G84d3"]} -{"Format": "IDEA0", "ID": "b008ade8-1d74-47f9-b0e8-b39017abaeb8", "DetectTime": "2023-10-30T13:57:18.280532+02:00", "EventTime": "2023-10-30T13:57:18.280555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.98.95.219 ", "ContentType": "text/plain"}], "uids": ["C2UZCV3cVkyiV0AJz"]} -{"Format": "IDEA0", "ID": "adad8d88-79cc-4da6-942c-49aebb28ca34", "DetectTime": "2023-10-30T13:57:18.344878+02:00", "EventTime": "2023-10-30T13:57:18.344904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.142.76.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.142.76.175 ", "ContentType": "text/plain"}], "uids": ["CWXOKiRJy8ExXg7P1"]} -{"Format": "IDEA0", "ID": "0f16272a-7554-42ea-9525-124144316fa1", "DetectTime": "2023-10-30T13:57:18.428761+02:00", "EventTime": "2023-10-30T13:57:18.428780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.3.210 ", "ContentType": "text/plain"}], "uids": ["C9eXgz19E7Jdgp8Sc9"]} -{"Format": "IDEA0", "ID": "abd26315-4894-436d-9de9-78dd5346db8b", "DetectTime": "2023-10-30T13:57:18.509367+02:00", "EventTime": "2023-10-30T13:57:18.509390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.87.241.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.87.241.241 ", "ContentType": "text/plain"}], "uids": ["Cd1qP24aA8mAsAxN1e"]} -{"Format": "IDEA0", "ID": "0f5f0b4c-2c57-4e99-8ed0-0b9399d550ea", "DetectTime": "2023-10-30T13:57:18.587419+02:00", "EventTime": "2023-10-30T13:57:18.587437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.212.122.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.212.122.27 ", "ContentType": "text/plain"}], "uids": ["Cf1xGAmnE1dowWXJe"]} -{"Format": "IDEA0", "ID": "43456823-a0fa-4fa5-9297-70a3d0cedd0d", "DetectTime": "2023-10-30T13:57:18.674617+02:00", "EventTime": "2023-10-30T13:57:18.674637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.54.47.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.54.47.53 ", "ContentType": "text/plain"}], "uids": ["CLhVUD1RzFQh9MVLs5"]} -{"Format": "IDEA0", "ID": "4cb3a4f9-4b02-4c02-a890-0e549cc26837", "DetectTime": "2023-10-30T13:57:18.742581+02:00", "EventTime": "2023-10-30T13:57:18.742600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.48.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.48.165 ", "ContentType": "text/plain"}], "uids": ["CvkwUweMO2JetnOB8"]} -{"Format": "IDEA0", "ID": "fcd0e568-4d27-4a90-b29f-78f95858bbc1", "DetectTime": "2023-10-30T13:57:18.811089+02:00", "EventTime": "2023-10-30T13:57:18.811106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.160.177.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.160.177.247 ", "ContentType": "text/plain"}], "uids": ["C9L0Um49DZP56TLske"]} -{"Format": "IDEA0", "ID": "9ed9d3c0-e596-496d-bf9b-5545d11caa73", "DetectTime": "2023-10-30T13:57:18.878103+02:00", "EventTime": "2023-10-30T13:57:18.878123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.162.252.216 ", "ContentType": "text/plain"}], "uids": ["CNPwn946clJSzt1Avh"]} -{"Format": "IDEA0", "ID": "2df7dba5-eb51-4cca-b0fd-61c2929c37a5", "DetectTime": "2023-10-30T13:57:18.942769+02:00", "EventTime": "2023-10-30T13:57:18.942863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.229.84.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.229.84.207 ", "ContentType": "text/plain"}], "uids": ["CNuk6d241kxdKXm2ye"]} -{"Format": "IDEA0", "ID": "4d4b6cfb-eeed-4d38-97e8-0b4eabf0f823", "DetectTime": "2023-10-30T13:57:19.024638+02:00", "EventTime": "2023-10-30T13:57:19.024655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["CU6KLE1u7iNpwEYvh1"]} -{"Format": "IDEA0", "ID": "d4f4cab7-1253-4bd6-8c4f-6fa48433e556", "DetectTime": "2023-10-30T13:57:19.114265+02:00", "EventTime": "2023-10-30T13:57:19.114282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.10.65.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.10.65.138 ", "ContentType": "text/plain"}], "uids": ["CcuZD44Ltf4TzklP17"]} -{"Format": "IDEA0", "ID": "e9440d0e-0409-4b18-ad31-3f6dd66224ee", "DetectTime": "2023-10-30T13:57:19.183846+02:00", "EventTime": "2023-10-30T13:57:19.183882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CORvOC43RlU1KvYE93"]} -{"Format": "IDEA0", "ID": "5f3671db-36a9-49e1-9e8e-fe9bd5042b39", "DetectTime": "2023-10-30T13:57:19.287838+02:00", "EventTime": "2023-10-30T13:57:19.287861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.88.105.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.88.105.164 ", "ContentType": "text/plain"}], "uids": ["CnLJkp4dek0vkvSuJ7"]} -{"Format": "IDEA0", "ID": "53427f2c-11cc-4399-9c6d-baa1e412e1c1", "DetectTime": "2023-10-30T13:57:19.390318+02:00", "EventTime": "2023-10-30T13:57:19.390342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CGqExsvTdwoJECAJ2"]} -{"Format": "IDEA0", "ID": "eac360ce-6e62-47fc-9acd-f8c93de432a0", "DetectTime": "2023-10-30T13:57:19.476487+02:00", "EventTime": "2023-10-30T13:57:19.476507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["CM9P0R3lAp0iOEKOM7"]} -{"Format": "IDEA0", "ID": "05b47ecd-1c56-45eb-9a01-bf9e1261dc64", "DetectTime": "2023-10-30T13:57:19.542508+02:00", "EventTime": "2023-10-30T13:57:19.542535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.223.239.27 ", "ContentType": "text/plain"}], "uids": ["CZex6Z3i88q3dULEzl"]} -{"Format": "IDEA0", "ID": "b6d6daf8-d69c-480a-853f-d70f763fc3ce", "DetectTime": "2023-10-30T13:57:19.600897+02:00", "EventTime": "2023-10-30T13:57:19.600913+02:00", "Category": ["Malware"], "Confidence": 0.5, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Type": ["Malware"], "Hash": ["md5:30039e1a7797604eea03c4e2348c18ec"]}], "Size": 549, "uids": ["ZGIyZjczZmQ5ZTRhODdlYzVl"]} -{"Format": "IDEA0", "ID": "0620c193-8eb9-4879-aa9c-be7cb79b553b", "DetectTime": "2023-10-30T13:57:19.665031+02:00", "EventTime": "2023-10-30T13:57:19.665049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CFA8QE43sJT1Hinqe2"]} -{"Format": "IDEA0", "ID": "0a0366fe-c07d-4503-b03e-cbaf97c07fe0", "DetectTime": "2023-10-30T13:57:19.684648+02:00", "EventTime": "2023-10-30T13:57:19.684666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CqmMd52QdxMatbmDfd"]} -{"Format": "IDEA0", "ID": "5af16e25-956a-4012-9daa-996f6b0fda04", "DetectTime": "2023-10-30T13:57:19.742058+02:00", "EventTime": "2023-10-30T13:57:19.742077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cv0BEa1RuTJSqPNjvd"]} -{"Format": "IDEA0", "ID": "898acbfe-0acc-4f3b-9721-bb9d6689d0df", "DetectTime": "2023-10-30T13:57:19.798454+02:00", "EventTime": "2023-10-30T13:57:19.798480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["CZwDym40G0Uafr7Is6"]} -{"Format": "IDEA0", "ID": "07690be9-1966-4c18-9cfa-053be4429aea", "DetectTime": "2023-10-30T13:57:19.857139+02:00", "EventTime": "2023-10-30T13:57:19.857157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["CNhIu22PvR9FaodlDb"]} -{"Format": "IDEA0", "ID": "5e1e3492-06c9-481f-8471-b35d16c22ba6", "DetectTime": "2023-10-30T13:57:19.912530+02:00", "EventTime": "2023-10-30T13:57:19.912550+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyKzup3XsrEJ344Csc"]} -{"Format": "IDEA0", "ID": "5900e97d-9702-4c0a-b40e-919a2fb6d304", "DetectTime": "2023-10-30T13:57:19.926528+02:00", "EventTime": "2023-10-30T13:57:19.926548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.119.39.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.119.39.105 ", "ContentType": "text/plain"}], "uids": ["Cnrjx53jtTpHfVbqDb"]} -{"Format": "IDEA0", "ID": "afa7f55e-69bf-49f3-bee4-43f926e631d2", "DetectTime": "2023-10-30T13:57:19.982972+02:00", "EventTime": "2023-10-30T13:57:19.982996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C9TLXY1Zlqx6aA5vNb"]} -{"Format": "IDEA0", "ID": "2078cb31-08c2-484e-9658-85cff32bf62c", "DetectTime": "2023-10-30T13:57:20.036679+02:00", "EventTime": "2023-10-30T13:57:20.036703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CHApzJ21jQYUZuFU8c"]} -{"Format": "IDEA0", "ID": "053dcbc2-de72-4fa2-89ef-16ad2b910b97", "DetectTime": "2023-10-30T13:57:20.104211+02:00", "EventTime": "2023-10-30T13:57:20.104248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.154.42.157 ", "ContentType": "text/plain"}], "uids": ["C7Tvz73Yff9rgYokv1"]} -{"Format": "IDEA0", "ID": "622c7867-1f94-4508-b8e0-b1378d026c2a", "DetectTime": "2023-10-30T13:57:20.168700+02:00", "EventTime": "2023-10-30T13:57:20.168720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.15.162.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.15.162.66 ", "ContentType": "text/plain"}], "uids": ["CuFGIj395DTcTSNvPg"]} -{"Format": "IDEA0", "ID": "8e47d84e-aec2-41e8-ace5-4bd7f8a5e7d6", "DetectTime": "2023-10-30T13:57:20.236380+02:00", "EventTime": "2023-10-30T13:57:20.236399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.194.29 ", "ContentType": "text/plain"}], "uids": ["CndxVu1zCjK3n8NZz6"]} -{"Format": "IDEA0", "ID": "dd4f3977-d5f9-42f0-adaf-8c109d2eb504", "DetectTime": "2023-10-30T13:57:20.297916+02:00", "EventTime": "2023-10-30T13:57:20.297933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CMqlBS1dO9D6Mo25Cf"]} -{"Format": "IDEA0", "ID": "97a52b65-51bd-4842-bdb2-955755628294", "DetectTime": "2023-10-30T13:57:20.358347+02:00", "EventTime": "2023-10-30T13:57:20.358365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["C2ksLF3q0e2Z8eOYPd"]} -{"Format": "IDEA0", "ID": "d71fe363-45f6-405a-a046-f35b7c7bf82c", "DetectTime": "2023-10-30T13:57:20.548261+02:00", "EventTime": "2023-10-30T13:57:20.548281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CRrTEo4u30z8balJc8"]} -{"Format": "IDEA0", "ID": "afbd6bce-a5fa-490b-a02d-afbdf6d6fd48", "DetectTime": "2023-10-30T13:57:20.629295+02:00", "EventTime": "2023-10-30T13:57:20.629311+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CxwSi3lj36Bs5gRR7"]} -{"Format": "IDEA0", "ID": "5dad59e4-f03c-44ee-b000-739fa01ec9ce", "DetectTime": "2023-10-30T13:57:20.658901+02:00", "EventTime": "2023-10-30T13:57:20.658918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["C5OXdw3vUhJLjBgY49"]} -{"Format": "IDEA0", "ID": "99013f29-ebb4-49f8-bf0b-cb12c9baea9e", "DetectTime": "2023-10-30T13:57:20.733974+02:00", "EventTime": "2023-10-30T13:57:20.733998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CE0mzO2naIehvkp4Uh"]} -{"Format": "IDEA0", "ID": "795c94cf-4871-478e-a85c-dd89707568ed", "DetectTime": "2023-10-30T13:57:20.806857+02:00", "EventTime": "2023-10-30T13:57:20.806875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CbL6Ce2qEEaG4aFiO9"]} -{"Format": "IDEA0", "ID": "a4832b42-c0fc-4150-afeb-b01bab6cc004", "DetectTime": "2023-10-30T13:57:20.873045+02:00", "EventTime": "2023-10-30T13:57:20.873065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CA6b5N3y7ULuq87Fy2"]} -{"Format": "IDEA0", "ID": "90ace1be-4db3-4d82-a368-bf27e63526c9", "DetectTime": "2023-10-30T13:57:20.931820+02:00", "EventTime": "2023-10-30T13:57:20.931841+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRxATd3AlzxbI3Iul9"]} -{"Format": "IDEA0", "ID": "155a1cbd-aad6-4d9b-b2f9-32a8445dcdb0", "DetectTime": "2023-10-30T13:57:20.947542+02:00", "EventTime": "2023-10-30T13:57:20.947562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["Cq9ASa3JjXV0yp8Xdk"]} -{"Format": "IDEA0", "ID": "eb923da0-9e4c-4173-8755-d914335d2a5d", "DetectTime": "2023-10-30T13:57:21.014458+02:00", "EventTime": "2023-10-30T13:57:21.014480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CBTSRD4pBgWU5K10H9"]} -{"Format": "IDEA0", "ID": "252e0f86-d977-4411-8514-3e9cacdea769", "DetectTime": "2023-10-30T13:57:21.224303+02:00", "EventTime": "2023-10-30T13:57:21.224326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.139.178.44 ", "ContentType": "text/plain"}], "uids": ["CHGk5Y2FUDx9TmQKD4"]} -{"Format": "IDEA0", "ID": "e72600f8-2c61-43e5-8cb7-e82a18bf6720", "DetectTime": "2023-10-30T13:57:21.310053+02:00", "EventTime": "2023-10-30T13:57:21.310075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.126.57 ", "ContentType": "text/plain"}], "uids": ["CgeAJB467g1bPOEhi"]} -{"Format": "IDEA0", "ID": "dba9fa66-f4e1-41a5-98b9-703b8b5896d4", "DetectTime": "2023-10-30T13:57:21.467645+02:00", "EventTime": "2023-10-30T13:57:21.467671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.146.148.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.146.148.217 ", "ContentType": "text/plain"}], "uids": ["CnUU1a4z45iLGv7yY6"]} -{"Format": "IDEA0", "ID": "12efe0d8-46a4-4d81-862a-605a1c42a758", "DetectTime": "2023-10-30T13:57:21.555519+02:00", "EventTime": "2023-10-30T13:57:21.555536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["CYNdlkPXsgTFTLftl"]} -{"Format": "IDEA0", "ID": "93632907-fd01-43df-8c15-064b6c5a4708", "DetectTime": "2023-10-30T13:57:21.645300+02:00", "EventTime": "2023-10-30T13:57:21.645611+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CLwkvA2ArM2wW9ga4d"]} -{"Format": "IDEA0", "ID": "50cc95dd-867b-4201-9ed9-ad48e3b46aa8", "DetectTime": "2023-10-30T13:57:21.676289+02:00", "EventTime": "2023-10-30T13:57:21.676316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["CZWZak3W5hvGKTEL68"]} -{"Format": "IDEA0", "ID": "c0914039-23fd-4a8d-90f7-d69427dec939", "DetectTime": "2023-10-30T13:57:21.751338+02:00", "EventTime": "2023-10-30T13:57:21.751356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CLlFl422pFFXgvtZk3"]} -{"Format": "IDEA0", "ID": "09cfaa9b-238e-4c90-837a-4f0ae11a9121", "DetectTime": "2023-10-30T13:57:21.826861+02:00", "EventTime": "2023-10-30T13:57:21.826884+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6TddyUTFxWOCFni"]} -{"Format": "IDEA0", "ID": "d2bfdec6-bccd-4ef5-87e4-40ceef7a191f", "DetectTime": "2023-10-30T13:57:21.849674+02:00", "EventTime": "2023-10-30T13:57:21.849697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["C2WBSH1gPucaCbH9sb"]} -{"Format": "IDEA0", "ID": "bac49bb7-cdc6-44fa-9a93-e49a3aad065a", "DetectTime": "2023-10-30T13:57:21.927546+02:00", "EventTime": "2023-10-30T13:57:21.927565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.98.95.219 ", "ContentType": "text/plain"}], "uids": ["ClT45P1VpVgLvUv93k"]} -{"Format": "IDEA0", "ID": "4ce20499-d4c9-4564-b9cc-acb0c640494b", "DetectTime": "2023-10-30T13:57:22.019188+02:00", "EventTime": "2023-10-30T13:57:22.019206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["CRuwhA1pya95zovRV6"]} -{"Format": "IDEA0", "ID": "feff9677-97e6-4bbb-a537-6fc808c7dfe6", "DetectTime": "2023-10-30T13:57:22.097293+02:00", "EventTime": "2023-10-30T13:57:22.097316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CxFJu83yXErJ9MUTu4"]} -{"Format": "IDEA0", "ID": "f0026f62-ade0-46d9-9adb-0b571f1b07f9", "DetectTime": "2023-10-30T13:57:22.129192+02:00", "EventTime": "2023-10-30T13:57:22.129270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.52.202 ", "ContentType": "text/plain"}], "uids": ["CfTwmL16tHTzdSovra"]} -{"Format": "IDEA0", "ID": "51a9ac4f-961c-43f3-91f6-435c0ed753fd", "DetectTime": "2023-10-30T13:57:22.199977+02:00", "EventTime": "2023-10-30T13:57:22.200012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["CNZceE3cXkBGtDdGz3"]} -{"Format": "IDEA0", "ID": "102d5f84-2a94-422b-8048-50d0794eccf6", "DetectTime": "2023-10-30T13:57:22.288794+02:00", "EventTime": "2023-10-30T13:57:22.288817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Ck973I2MitY31bvaOc"]} -{"Format": "IDEA0", "ID": "9fbfbe3b-d251-41db-ac1d-82c2ec1d1ff8", "DetectTime": "2023-10-30T13:57:22.356607+02:00", "EventTime": "2023-10-30T13:57:22.356631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["Cez3MQ2HMCIqaAov68"]} -{"Format": "IDEA0", "ID": "5662163e-b1de-4f4e-8796-6db943598b94", "DetectTime": "2023-10-30T13:57:22.419251+02:00", "EventTime": "2023-10-30T13:57:22.419268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CHxW6Y1wEHOi6JPeX6"]} -{"Format": "IDEA0", "ID": "4da9bbe8-69c1-45a7-8130-55a49b17e687", "DetectTime": "2023-10-30T13:57:22.489031+02:00", "EventTime": "2023-10-30T13:57:22.489055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CWrolyrQv4HYQXcl3"]} -{"Format": "IDEA0", "ID": "ce8df52a-62fb-4918-9941-6cee2be7527f", "DetectTime": "2023-10-30T13:57:22.550304+02:00", "EventTime": "2023-10-30T13:57:22.550328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C5kOtbxl0BcSehXe7"]} -{"Format": "IDEA0", "ID": "019da60e-99c7-4831-8a2c-493f6fbea355", "DetectTime": "2023-10-30T13:57:22.621923+02:00", "EventTime": "2023-10-30T13:57:22.621946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CmweZb20rPSsh9r6S7"]} -{"Format": "IDEA0", "ID": "6cf16b71-bc74-4b2f-8f5d-8c392f9b59df", "DetectTime": "2023-10-30T13:57:22.711565+02:00", "EventTime": "2023-10-30T13:57:22.711593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CNp8Z4Pcp0eEGIHn5"]} -{"Format": "IDEA0", "ID": "c4486955-d868-494b-adfc-84747125580a", "DetectTime": "2023-10-30T13:57:22.775399+02:00", "EventTime": "2023-10-30T13:57:22.775415+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXzArb4M5Hu14YBQo8"]} -{"Format": "IDEA0", "ID": "b518acb2-636d-4b1d-9d66-8902716154d0", "DetectTime": "2023-10-30T13:57:22.797994+02:00", "EventTime": "2023-10-30T13:57:22.798010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["Cl0tRX1I3NVOmSvN7f"]} -{"Format": "IDEA0", "ID": "6e1e3405-2717-49e3-8ae3-42019a6b6937", "DetectTime": "2023-10-30T13:57:22.853063+02:00", "EventTime": "2023-10-30T13:57:22.853088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CACs3z3PwjzUj8Vwed"]} -{"Format": "IDEA0", "ID": "1f252f77-7844-4cf9-bae3-f382fd925098", "DetectTime": "2023-10-30T13:57:22.915975+02:00", "EventTime": "2023-10-30T13:57:22.915991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.3.210 ", "ContentType": "text/plain"}], "uids": ["C6t6di7vW6esRTFng"]} -{"Format": "IDEA0", "ID": "91c8311a-deac-43e9-9a5c-a67edb9acc5e", "DetectTime": "2023-10-30T13:57:23.081705+02:00", "EventTime": "2023-10-30T13:57:23.081723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CoaICCCpXjgNFkGS2"]} -{"Format": "IDEA0", "ID": "3063f7f7-50b4-4b2c-bec6-1896d8518ee7", "DetectTime": "2023-10-30T13:57:23.162970+02:00", "EventTime": "2023-10-30T13:57:23.163061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CdIIy13V61CMKchmkj"]} -{"Format": "IDEA0", "ID": "d13d8567-c47d-48b1-b4f7-8397e0b914e3", "DetectTime": "2023-10-30T13:57:23.247033+02:00", "EventTime": "2023-10-30T13:57:23.247051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CJ9scG1Ao4OScuu7H6", "CxFJu83yXErJ9MUTu4", "CLwkvA2ArM2wW9ga4d", "CxwSi3lj36Bs5gRR7"]} -{"Format": "IDEA0", "ID": "d7e2cf4d-76d4-48e1-93ff-09a7790b1bc1", "DetectTime": "2023-10-30T13:57:23.276690+02:00", "EventTime": "2023-10-30T13:57:23.276709+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CJ9scG1Ao4OScuu7H6"]} -{"Format": "IDEA0", "ID": "464a7a78-5b13-4dae-87cf-360ad5e37a6f", "DetectTime": "2023-10-30T13:57:23.309650+02:00", "EventTime": "2023-10-30T13:57:23.309677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CxQ6P04wQn7EsyfUaa"]} -{"Format": "IDEA0", "ID": "854d5e97-b9fa-485b-af2c-0b0410bdc14f", "DetectTime": "2023-10-30T13:57:23.333603+02:00", "EventTime": "2023-10-30T13:57:23.333625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CsT8Wp3efPCztZ30W8"]} -{"Format": "IDEA0", "ID": "00426ad9-ab8d-4f8e-be0a-9e836571f901", "DetectTime": "2023-10-30T13:57:23.412039+02:00", "EventTime": "2023-10-30T13:57:23.412245+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cu88GYL2wnX4q0bti"]} -{"Format": "IDEA0", "ID": "d25c4d0e-9ef0-46b6-b354-588fd5a1dad3", "DetectTime": "2023-10-30T13:57:23.445112+02:00", "EventTime": "2023-10-30T13:57:23.445132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Cawvjv3bg8RH9cm1P3"]} -{"Format": "IDEA0", "ID": "40af996e-46c7-40f5-ac47-d39080c1f679", "DetectTime": "2023-10-30T13:57:23.514844+02:00", "EventTime": "2023-10-30T13:57:23.514870+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CI1MR4yO1csfJuBd2"]} -{"Format": "IDEA0", "ID": "5ddca33e-e381-4ab8-b35b-c18d26079522", "DetectTime": "2023-10-30T13:57:23.539498+02:00", "EventTime": "2023-10-30T13:57:23.539517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["CBrkgffyAdckR7rig"]} -{"Format": "IDEA0", "ID": "847351be-c980-496d-9914-ce7395b3900c", "DetectTime": "2023-10-30T13:57:23.616859+02:00", "EventTime": "2023-10-30T13:57:23.616884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["CBfDIP1EHB3VM9KAxi"]} -{"Format": "IDEA0", "ID": "7adcbaae-cf15-4070-ad75-940a1cfcb9aa", "DetectTime": "2023-10-30T13:57:23.700423+02:00", "EventTime": "2023-10-30T13:57:23.700440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["C4KFLa4SrCldad1Hyd"]} -{"Format": "IDEA0", "ID": "94b81a67-0ea3-42b4-bbdd-578e13e9c46a", "DetectTime": "2023-10-30T13:57:23.782751+02:00", "EventTime": "2023-10-30T13:57:23.782987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["ChuYp71KuEhq6iBye3"]} -{"Format": "IDEA0", "ID": "83a6c804-a1dc-4c79-a5e0-839a0940671e", "DetectTime": "2023-10-30T13:57:23.878562+02:00", "EventTime": "2023-10-30T13:57:23.878587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["CBzDB01HaC1PUTxf4h"]} -{"Format": "IDEA0", "ID": "bcf0c64b-437f-4018-af79-e804563486b4", "DetectTime": "2023-10-30T13:57:23.961543+02:00", "EventTime": "2023-10-30T13:57:23.961559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CH5GhaF4cG8FO5M2k"]} -{"Format": "IDEA0", "ID": "8d9adac8-ca0b-4d01-8fe8-c9bec43d83da", "DetectTime": "2023-10-30T13:57:24.050479+02:00", "EventTime": "2023-10-30T13:57:24.050503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.126.57 ", "ContentType": "text/plain"}], "uids": ["CQqbxg4UHCjMycOSoc"]} -{"Format": "IDEA0", "ID": "b0b94077-d69f-4428-8656-3f82ea317d89", "DetectTime": "2023-10-30T13:57:24.115790+02:00", "EventTime": "2023-10-30T13:57:24.115806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["CzAOm712mI0rZtwtlk"]} -{"Format": "IDEA0", "ID": "082906fd-4ab9-4eb8-bed8-ec10e57cb886", "DetectTime": "2023-10-30T13:57:24.181549+02:00", "EventTime": "2023-10-30T13:57:24.181567+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6VvU03YbTiL2HRNE3"]} -{"Format": "IDEA0", "ID": "3b9db476-beb6-4d01-9ea2-6b28307c95ad", "DetectTime": "2023-10-30T13:57:24.204933+02:00", "EventTime": "2023-10-30T13:57:24.204952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["CLCyVg20Va8cZX8bc"]} -{"Format": "IDEA0", "ID": "7586044a-3ed4-43e8-b332-2e6bed9c4b66", "DetectTime": "2023-10-30T13:57:24.269451+02:00", "EventTime": "2023-10-30T13:57:24.269471+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C4jhEs4VoS0uqCYDw3"]} -{"Format": "IDEA0", "ID": "cbfba6a5-9ae4-49ff-812f-b738c66434a6", "DetectTime": "2023-10-30T13:57:24.288535+02:00", "EventTime": "2023-10-30T13:57:24.288554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CeW1Z2jeUJmRVX6C4"]} -{"Format": "IDEA0", "ID": "aaff6856-a2ec-4545-8558-89f656c2c73d", "DetectTime": "2023-10-30T13:57:24.356635+02:00", "EventTime": "2023-10-30T13:57:24.356654+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CE8YKyIyisN1IeqXl"]} -{"Format": "IDEA0", "ID": "2c553b7e-e915-43ca-9cf9-bd4b0402e783", "DetectTime": "2023-10-30T13:57:24.378193+02:00", "EventTime": "2023-10-30T13:57:24.378217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.194.29 ", "ContentType": "text/plain"}], "uids": ["Cpfrw214T9RDt7h2Vl"]} -{"Format": "IDEA0", "ID": "01e9804f-53f8-4a2b-8e17-d33e72f0feed", "DetectTime": "2023-10-30T13:57:24.436472+02:00", "EventTime": "2023-10-30T13:57:24.436495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["ChvAL21FuQMM4Lf0sf"]} -{"Format": "IDEA0", "ID": "1687878d-a20d-4a0a-816a-2de50fe88a67", "DetectTime": "2023-10-30T13:57:24.504446+02:00", "EventTime": "2023-10-30T13:57:24.504477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CJZNBw2v1YjqOztbE6"]} -{"Format": "IDEA0", "ID": "baa2048c-7d2b-411d-a9e4-1b2d537c75b8", "DetectTime": "2023-10-30T13:57:24.566534+02:00", "EventTime": "2023-10-30T13:57:24.566558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CFBjPq3XwOnfMGRLA5"]} -{"Format": "IDEA0", "ID": "e2d067ae-f75d-47f5-8754-3603e62a0b73", "DetectTime": "2023-10-30T13:57:24.629642+02:00", "EventTime": "2023-10-30T13:57:24.629664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.223.239.27 ", "ContentType": "text/plain"}], "uids": ["C6jd4ibo89oTj8sNh"]} -{"Format": "IDEA0", "ID": "9cdfeb86-ad63-4788-b627-623635f11bed", "DetectTime": "2023-10-30T13:57:24.691249+02:00", "EventTime": "2023-10-30T13:57:24.691270+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C2OdFWOlHobEsAgCj"]} -{"Format": "IDEA0", "ID": "734939eb-ee9d-4375-ac52-220b73009bf7", "DetectTime": "2023-10-30T13:57:24.712659+02:00", "EventTime": "2023-10-30T13:57:24.712680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["C8njri3rMrdkzACfjc"]} -{"Format": "IDEA0", "ID": "577f136d-535d-4607-bad2-bfd83b3604bb", "DetectTime": "2023-10-30T13:57:24.756500+02:00", "EventTime": "2023-10-30T13:57:24.756523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CXOpD9381T61BKXXk2"]} -{"Format": "IDEA0", "ID": "c69555be-ce71-457a-b369-6fcc562cb370", "DetectTime": "2023-10-30T13:57:24.819688+02:00", "EventTime": "2023-10-30T13:57:24.819710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["CgcnA44SW6XKJAG4si"]} -{"Format": "IDEA0", "ID": "9f722069-be9d-4120-b294-56ad9f3d1fce", "DetectTime": "2023-10-30T13:57:24.874321+02:00", "EventTime": "2023-10-30T13:57:24.874341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["Cc97YQ1RqToMEmyOo7"]} -{"Format": "IDEA0", "ID": "fa4ad7c7-4793-45f4-a45a-ed8ce31be1dc", "DetectTime": "2023-10-30T13:57:24.928313+02:00", "EventTime": "2023-10-30T13:57:24.928331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.154.42.157 ", "ContentType": "text/plain"}], "uids": ["CvpA5125CZzrPnxJO"]} -{"Format": "IDEA0", "ID": "5d2cf615-7228-4561-91a5-bf016b8597e6", "DetectTime": "2023-10-30T13:57:24.960848+02:00", "EventTime": "2023-10-30T13:57:24.960865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.52.202 ", "ContentType": "text/plain"}], "uids": ["C9FtS41kMnwwpHbPg6"]} -{"Format": "IDEA0", "ID": "7bc3c216-d67a-471b-92f8-218856a62301", "DetectTime": "2023-10-30T13:57:25.011428+02:00", "EventTime": "2023-10-30T13:57:25.011444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.154.42.157 ", "ContentType": "text/plain"}], "uids": ["CSBOPGyeLJyFt7M17"]} -{"Format": "IDEA0", "ID": "b0f519ea-e714-4d17-8e1c-0cc287037797", "DetectTime": "2023-10-30T13:57:25.059315+02:00", "EventTime": "2023-10-30T13:57:25.059338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CP7GLF10jrkn2Sg9Xe"]} -{"Format": "IDEA0", "ID": "de3509b9-9a86-420d-b577-ec48b59b8861", "DetectTime": "2023-10-30T13:57:25.081294+02:00", "EventTime": "2023-10-30T13:57:25.081449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CEdcIvFeLF6cqGGd"]} -{"Format": "IDEA0", "ID": "11977851-a408-43d9-bdb7-66531293541a", "DetectTime": "2023-10-30T13:57:25.129838+02:00", "EventTime": "2023-10-30T13:57:25.129860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CvAKqU3Jk0XJd2ISj8"]} -{"Format": "IDEA0", "ID": "628a0092-b89f-4c7b-8e42-1ece80b15a4c", "DetectTime": "2023-10-30T13:57:25.181803+02:00", "EventTime": "2023-10-30T13:57:25.181845+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtuKbl39o10GH3dzK1"]} -{"Format": "IDEA0", "ID": "c1f09f36-cc34-4acd-b356-fb159b69c8a2", "DetectTime": "2023-10-30T13:57:25.202099+02:00", "EventTime": "2023-10-30T13:57:25.202114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.223.239.27 ", "ContentType": "text/plain"}], "uids": ["CnSjp23ZDJ621zp8C2"]} -{"Format": "IDEA0", "ID": "cdcf35d2-8b1c-4e69-b0be-5cab87327aa2", "DetectTime": "2023-10-30T13:57:25.236037+02:00", "EventTime": "2023-10-30T13:57:25.236057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C4jhEs4VoS0uqCYDw3", "C2OdFWOlHobEsAgCj", "CI1MR4yO1csfJuBd2", "CLjoGRzKPud2KtBC8"]} -{"Format": "IDEA0", "ID": "c6c0bb21-73fa-495c-9931-518ac52ef118", "DetectTime": "2023-10-30T13:57:25.254194+02:00", "EventTime": "2023-10-30T13:57:25.254214+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CLjoGRzKPud2KtBC8"]} -{"Format": "IDEA0", "ID": "86e23f13-0121-4d12-aa66-34d17a7be16b", "DetectTime": "2023-10-30T13:57:25.269094+02:00", "EventTime": "2023-10-30T13:57:25.269113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CTspka1TCkzfcOd45h"]} -{"Format": "IDEA0", "ID": "82b5c829-c4a7-46c1-a588-a109d21a15fc", "DetectTime": "2023-10-30T13:57:25.319746+02:00", "EventTime": "2023-10-30T13:57:25.319761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.52.202 ", "ContentType": "text/plain"}], "uids": ["C4mYKv3AaMyNN10kwg"]} -{"Format": "IDEA0", "ID": "abe7f2c2-d8bc-4e1e-856a-db1b5e17f275", "DetectTime": "2023-10-30T13:57:25.346001+02:00", "EventTime": "2023-10-30T13:57:25.346019+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnecbX1k7A5WvSE7Xd"]} -{"Format": "IDEA0", "ID": "fc14c140-198a-45c4-86bd-bd31de865f78", "DetectTime": "2023-10-30T13:57:25.359956+02:00", "EventTime": "2023-10-30T13:57:25.359967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.126.57 ", "ContentType": "text/plain"}], "uids": ["CRVrRE0UAqwvPRGAc"]} -{"Format": "IDEA0", "ID": "a32d5d02-d75d-4e39-a7b7-71fb435ec3d6", "DetectTime": "2023-10-30T13:57:25.387140+02:00", "EventTime": "2023-10-30T13:57:25.387213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CYivL4449RFnrC0knl"]} -{"Format": "IDEA0", "ID": "7d58e4dd-a673-451f-aa68-cd03390a1320", "DetectTime": "2023-10-30T13:57:25.431912+02:00", "EventTime": "2023-10-30T13:57:25.431933+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CHUyju3KkJ9bHJ2cx9"]} -{"Format": "IDEA0", "ID": "b3bbdb58-0ea1-4582-8287-eac201551f09", "DetectTime": "2023-10-30T13:57:25.447115+02:00", "EventTime": "2023-10-30T13:57:25.447142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.98.95.219 ", "ContentType": "text/plain"}], "uids": ["CeoOhj4nGnoylEx9Jh"]} -{"Format": "IDEA0", "ID": "9671b670-2d4b-4700-b4b1-f98ab8eac335", "DetectTime": "2023-10-30T13:57:25.476875+02:00", "EventTime": "2023-10-30T13:57:25.476893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["CR5iK5inzQwWYQS76"]} -{"Format": "IDEA0", "ID": "94f8e595-d508-4bc5-bb19-226c3821962a", "DetectTime": "2023-10-30T13:57:25.499386+02:00", "EventTime": "2023-10-30T13:57:25.499404+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcRoPtRsHINiRbmNk"]} -{"Format": "IDEA0", "ID": "3f9205e3-d951-4322-876b-c24b2ebb5bb2", "DetectTime": "2023-10-30T13:57:25.512037+02:00", "EventTime": "2023-10-30T13:57:25.512056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.139.178.44 ", "ContentType": "text/plain"}], "uids": ["Cif1RInyZ52kR7Yy3"]} -{"Format": "IDEA0", "ID": "0794967e-ae8d-4594-86d1-c4ead7b21fe6", "DetectTime": "2023-10-30T13:57:25.549698+02:00", "EventTime": "2023-10-30T13:57:25.549715+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CAEU4V1ExiU9tLCBG8"]} -{"Format": "IDEA0", "ID": "4bf36084-e7b7-4828-84d1-e60b1e4a1434", "DetectTime": "2023-10-30T13:57:25.563025+02:00", "EventTime": "2023-10-30T13:57:25.563048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CMpkpj2o2Blwmd6uyf"]} -{"Format": "IDEA0", "ID": "8eedc347-a283-4ebc-bee1-72320dcf560f", "DetectTime": "2023-10-30T13:57:25.603952+02:00", "EventTime": "2023-10-30T13:57:25.603973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CrJ5Id3u5n9ubjcfQ"]} -{"Format": "IDEA0", "ID": "261b60d5-e84a-4dcb-ae3e-9fd4dc095556", "DetectTime": "2023-10-30T13:57:25.645989+02:00", "EventTime": "2023-10-30T13:57:25.646010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["Cg3y3F3xvokG0cn03f"]} -{"Format": "IDEA0", "ID": "df54ea6a-4753-4545-9ac8-bae05a65bb6a", "DetectTime": "2023-10-30T13:57:25.673499+02:00", "EventTime": "2023-10-30T13:57:25.673511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CzBYIb35Wr7b85Y7E2"]} -{"Format": "IDEA0", "ID": "d6c928b4-9f30-4b02-9af8-daa89564051c", "DetectTime": "2023-10-30T13:57:25.714963+02:00", "EventTime": "2023-10-30T13:57:25.714984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["Crn2SoSgg3U0TaLEi"]} -{"Format": "IDEA0", "ID": "e70a81ab-825f-442b-b6cb-928b8d3e9564", "DetectTime": "2023-10-30T13:57:25.759112+02:00", "EventTime": "2023-10-30T13:57:25.759130+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvMxt3411WtfOP14g9"]} -{"Format": "IDEA0", "ID": "b5f6d4e8-0f72-4815-9dfc-f6a6ac6922ee", "DetectTime": "2023-10-30T13:57:25.774184+02:00", "EventTime": "2023-10-30T13:57:25.774204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.92.1.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.92.1.214 ", "ContentType": "text/plain"}], "uids": ["Cldr1T2AsjyQKR5on9"]} -{"Format": "IDEA0", "ID": "1eab46c5-9a91-4e1f-a1b1-ecdf0b9b6e90", "DetectTime": "2023-10-30T13:57:25.818442+02:00", "EventTime": "2023-10-30T13:57:25.818458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.92.1.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.92.1.214 ", "ContentType": "text/plain"}], "uids": ["CrRhcO28Zgn0QIb8Ul"]} -{"Format": "IDEA0", "ID": "a7237b60-04ac-4f91-b3d0-e3b870459508", "DetectTime": "2023-10-30T13:57:25.848882+02:00", "EventTime": "2023-10-30T13:57:25.848898+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CBHCJ14SWU1HJchFfb"]} -{"Format": "IDEA0", "ID": "d679b425-9832-451b-8e15-d4165b7acf2c", "DetectTime": "2023-10-30T13:57:25.862524+02:00", "EventTime": "2023-10-30T13:57:25.862545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CTPNpL3SSRFpM4bffc"]} -{"Format": "IDEA0", "ID": "00894776-b504-43bb-a265-031bd79ff56b", "DetectTime": "2023-10-30T13:57:25.904995+02:00", "EventTime": "2023-10-30T13:57:25.905013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CPFRcb2aFf7usMmGve"]} -{"Format": "IDEA0", "ID": "9c70fd22-c49d-424b-a12b-d0b3be377b25", "DetectTime": "2023-10-30T13:57:25.945133+02:00", "EventTime": "2023-10-30T13:57:25.945152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CywBNn3nKx1QqMYsK7"]} -{"Format": "IDEA0", "ID": "e7d3fb79-f85b-47ec-bf33-2a39c5622ac4", "DetectTime": "2023-10-30T13:57:25.986481+02:00", "EventTime": "2023-10-30T13:57:25.986501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["CRqfcr3ZxdXRb0IaCe"]} -{"Format": "IDEA0", "ID": "555d55c1-4281-446c-be10-03151c696306", "DetectTime": "2023-10-30T13:57:26.018939+02:00", "EventTime": "2023-10-30T13:57:26.018956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CzBkeT1cZ2XimdD52d"]} -{"Format": "IDEA0", "ID": "6dbc70e7-e72e-4bb5-8bfd-3efa71df667c", "DetectTime": "2023-10-30T13:57:26.064171+02:00", "EventTime": "2023-10-30T13:57:26.064183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["C3P1M33pYVhF6hoPDh"]} -{"Format": "IDEA0", "ID": "e358f514-15e2-4f07-8a99-4949fb5e27b4", "DetectTime": "2023-10-30T13:57:26.105904+02:00", "EventTime": "2023-10-30T13:57:26.105928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["ClSFzs4VwZhE8Yb108"]} -{"Format": "IDEA0", "ID": "5111cfa0-4fd0-43e7-a6be-a378797718d1", "DetectTime": "2023-10-30T13:57:26.132094+02:00", "EventTime": "2023-10-30T13:57:26.132114+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CetEz44ROHue4qn1Bl"]} -{"Format": "IDEA0", "ID": "e6fabb9b-c2cc-4b0b-9645-673d678af38c", "DetectTime": "2023-10-30T13:57:26.147437+02:00", "EventTime": "2023-10-30T13:57:26.147460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["C6Ct9g3SrkEobhCZD6"]} -{"Format": "IDEA0", "ID": "998a69ac-3ced-4b8a-9c91-90996a127d85", "DetectTime": "2023-10-30T13:57:26.174627+02:00", "EventTime": "2023-10-30T13:57:26.174645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Czdkpe2YNxR8V19Qze", "CAEU4V1ExiU9tLCBG8", "CBHCJ14SWU1HJchFfb", "CHUyju3KkJ9bHJ2cx9"]} -{"Format": "IDEA0", "ID": "c6e82ef6-d894-4724-b333-fb297bd6a949", "DetectTime": "2023-10-30T13:57:26.188779+02:00", "EventTime": "2023-10-30T13:57:26.188798+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Czdkpe2YNxR8V19Qze"]} -{"Format": "IDEA0", "ID": "3b7373fc-5612-4c11-9cf4-a25e452aaa83", "DetectTime": "2023-10-30T13:57:26.201533+02:00", "EventTime": "2023-10-30T13:57:26.201546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["CTQmVa15frCorljava"]} -{"Format": "IDEA0", "ID": "7cf2ebc0-8044-4c35-84ba-d00a9353d777", "DetectTime": "2023-10-30T13:57:26.228980+02:00", "EventTime": "2023-10-30T13:57:26.228999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.3.210 ", "ContentType": "text/plain"}], "uids": ["CytELc4g6tTyA4ijBl"]} -{"Format": "IDEA0", "ID": "3e35547f-047a-449d-b7d3-246eb887cb47", "DetectTime": "2023-10-30T13:57:26.257169+02:00", "EventTime": "2023-10-30T13:57:26.257186+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cl41me2eASQGF1MW28"]} -{"Format": "IDEA0", "ID": "3115f536-01a5-4a78-8bde-0911a8afaf1c", "DetectTime": "2023-10-30T13:57:26.272327+02:00", "EventTime": "2023-10-30T13:57:26.272348+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CVVX4VUoaG7FNTU06"]} -{"Format": "IDEA0", "ID": "91bb4acf-051f-4195-bc7c-7c5421cf6b86", "DetectTime": "2023-10-30T13:57:26.287344+02:00", "EventTime": "2023-10-30T13:57:26.287364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["C2LZMp3e7RtWRbqa54"]} -{"Format": "IDEA0", "ID": "4d35071c-df3d-441d-ad1c-4a8fa118f09f", "DetectTime": "2023-10-30T13:57:26.317780+02:00", "EventTime": "2023-10-30T13:57:26.317796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["C03y502g4zZ6cjskMc"]} -{"Format": "Json", "ID": "4d35071c-df3d-441d-ad1c-4a8fa118f09f", "DetectTime": "2023-10-30T13:57:26.317780+02:00", "EventTime": "2023-10-30T13:57:26.317796+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:21:35.952588+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:26.378185)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "316cfa20-ca07-4324-90a9-dd39aca9e4be", "DetectTime": "2023-10-30T13:57:26.384374+02:00", "EventTime": "2023-10-30T13:57:26.384390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CHGFB92JT7Pir44e04"]} -{"Format": "IDEA0", "ID": "b4cb7c00-d61d-4eb8-af91-78efc225a927", "DetectTime": "2023-10-30T13:57:26.408971+02:00", "EventTime": "2023-10-30T13:57:26.408987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CGlDl430gGSe834n19"]} -{"Format": "IDEA0", "ID": "948fb7a1-6d65-41ed-9d17-ba5dd68de401", "DetectTime": "2023-10-30T13:57:26.444550+02:00", "EventTime": "2023-10-30T13:57:26.444565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CT47HtfI2jeJTFC1a"]} -{"Format": "IDEA0", "ID": "e405c8c3-4968-4150-99db-ce9ab9d61e34", "DetectTime": "2023-10-30T13:57:26.467328+02:00", "EventTime": "2023-10-30T13:57:26.467343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.3.210 ", "ContentType": "text/plain"}], "uids": ["Cgvzml1N1obvRLmWud"]} -{"Format": "IDEA0", "ID": "7611bc7e-93ef-4145-b697-f81e7eff160d", "DetectTime": "2023-10-30T13:57:26.503477+02:00", "EventTime": "2023-10-30T13:57:26.503493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["Cqs2yc2XAbFMPOdPz2"]} -{"Format": "IDEA0", "ID": "e9aecc45-9807-4b87-ab6b-fe651061b9ee", "DetectTime": "2023-10-30T13:57:26.529225+02:00", "EventTime": "2023-10-30T13:57:26.529239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["Crh1RG1QfsCAnKTDz1"]} -{"Format": "IDEA0", "ID": "50075cc7-2d17-42a8-babe-d60232f53039", "DetectTime": "2023-10-30T13:57:26.553118+02:00", "EventTime": "2023-10-30T13:57:26.553135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["CwpcyvssUeqSpXmol"]} -{"Format": "IDEA0", "ID": "9e28cdc7-7f2b-418e-812b-cd66070b575e", "DetectTime": "2023-10-30T13:57:26.579288+02:00", "EventTime": "2023-10-30T13:57:26.579305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["CyQozn1Lh62TCnwzkj"]} -{"Format": "IDEA0", "ID": "124d9fa7-bcd3-4b0b-91ca-13366774a6e7", "DetectTime": "2023-10-30T13:57:26.613645+02:00", "EventTime": "2023-10-30T13:57:26.613668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.98.95.219 ", "ContentType": "text/plain"}], "uids": ["C1cI3QjHpPq0XXydh"]} -{"Format": "IDEA0", "ID": "f11d8d4e-4071-4252-a042-2fce10be02f9", "DetectTime": "2023-10-30T13:57:26.654215+02:00", "EventTime": "2023-10-30T13:57:26.654232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CSwyfd1V1k4TcSMc59"]} -{"Format": "IDEA0", "ID": "c4c5c7fc-fe13-462d-9bcf-0a03d191ae52", "DetectTime": "2023-10-30T13:57:26.677281+02:00", "EventTime": "2023-10-30T13:57:26.677292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CJGFir1ffwilbbKmA"]} -{"Format": "IDEA0", "ID": "127680bc-ce09-4bb9-a15d-6116d33f49b8", "DetectTime": "2023-10-30T13:57:26.699838+02:00", "EventTime": "2023-10-30T13:57:26.699849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C7mPQS3PnS24PYUYF5"]} -{"Format": "IDEA0", "ID": "a9b3a399-b68a-4571-a531-be93d36c553c", "DetectTime": "2023-10-30T13:57:26.722932+02:00", "EventTime": "2023-10-30T13:57:26.722952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.139.178.44 ", "ContentType": "text/plain"}], "uids": ["CY8occespU2ZRO84d"]} -{"Format": "IDEA0", "ID": "4c63e60a-2938-4657-b21f-bcb7b2469ae5", "DetectTime": "2023-10-30T13:57:26.749056+02:00", "EventTime": "2023-10-30T13:57:26.749076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CSRlGs42lE7HvyIpvj"]} -{"Format": "IDEA0", "ID": "36a1a3dd-428f-414d-ae24-989aeeca9b25", "DetectTime": "2023-10-30T13:57:26.776778+02:00", "EventTime": "2023-10-30T13:57:26.776796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CTNgwq4ubroo1D1dub"]} -{"Format": "IDEA0", "ID": "1a5e102f-deac-4aa7-8ac1-2a3358e1a328", "DetectTime": "2023-10-30T13:57:26.803330+02:00", "EventTime": "2023-10-30T13:57:26.803349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CnivDu3k1JNAY6mCbl"]} -{"Format": "IDEA0", "ID": "5cadf660-78c0-4a9c-8099-695c82832f91", "DetectTime": "2023-10-30T13:57:26.825467+02:00", "EventTime": "2023-10-30T13:57:26.825488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["Cavyrt3fJunV7BFDR4"]} -{"Format": "IDEA0", "ID": "7d68059a-cdae-40dd-b62f-eabaeff5f7aa", "DetectTime": "2023-10-30T13:57:26.851912+02:00", "EventTime": "2023-10-30T13:57:26.851930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CJKdbr38Q09bfArxj2"]} -{"Format": "IDEA0", "ID": "b0226292-2ab0-4365-9391-5215b9ee040d", "DetectTime": "2023-10-30T13:57:26.878272+02:00", "EventTime": "2023-10-30T13:57:26.878297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CgzQuM3Dt6ZOxPBwZa"]} -{"Format": "IDEA0", "ID": "870e91b7-f6ad-4f90-a370-37f8184e0294", "DetectTime": "2023-10-30T13:57:26.911284+02:00", "EventTime": "2023-10-30T13:57:26.911295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CZV55P1a6moCeExi5b"]} -{"Format": "IDEA0", "ID": "22bdf3d9-1be4-42bf-aa39-56ba12f2da60", "DetectTime": "2023-10-30T13:57:27.004711+02:00", "EventTime": "2023-10-30T13:57:27.004743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CEpMlFErTrdTcubk1"]} -{"Format": "IDEA0", "ID": "4a7340b9-3f1f-4452-a666-4f106db4f0d5", "DetectTime": "2023-10-30T13:57:27.030849+02:00", "EventTime": "2023-10-30T13:57:27.030869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["C2l1kG3IchCC5HV4d"]} -{"Format": "IDEA0", "ID": "2d8109d8-7d64-4c0e-9bb2-7a284774b249", "DetectTime": "2023-10-30T13:57:27.059049+02:00", "EventTime": "2023-10-30T13:57:27.059066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CUBhi13gMGyePQ3Egl"]} -{"Format": "IDEA0", "ID": "69851754-7cf3-4069-9b2b-5f741ca693e7", "DetectTime": "2023-10-30T13:57:27.086062+02:00", "EventTime": "2023-10-30T13:57:27.086079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["Crruex405v8TxtA5Eb"]} -{"Format": "IDEA0", "ID": "05f55e77-d5f5-4c0b-bc3d-7aecb42acee3", "DetectTime": "2023-10-30T13:57:27.113069+02:00", "EventTime": "2023-10-30T13:57:27.113096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CwILtb2dzGHIdvB6Rk"]} -{"Format": "IDEA0", "ID": "6441be61-be5b-4a55-8cc4-2217c7eb6e0a", "DetectTime": "2023-10-30T13:57:27.139707+02:00", "EventTime": "2023-10-30T13:57:27.139726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CY3zDg5vgIa1gAoKg"]} -{"Format": "IDEA0", "ID": "7823f6e4-fb4b-45b0-a859-a2ecc3446919", "DetectTime": "2023-10-30T13:57:27.162361+02:00", "EventTime": "2023-10-30T13:57:27.162372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.194.29 ", "ContentType": "text/plain"}], "uids": ["C12tiw2BtBPuUQnv07"]} -{"Format": "IDEA0", "ID": "4e17ea47-1f98-4744-a55f-7eb1b1b7bcf6", "DetectTime": "2023-10-30T13:57:27.186758+02:00", "EventTime": "2023-10-30T13:57:27.186791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CHVGCE7GHaErI1VW3"]} -{"Format": "IDEA0", "ID": "e509f474-7b04-4bca-b187-76dc98367233", "DetectTime": "2023-10-30T13:57:27.214580+02:00", "EventTime": "2023-10-30T13:57:27.214595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["C9VoKh2TBV9BJeNw77"]} -{"Format": "IDEA0", "ID": "4eedd232-4b4f-41c7-956d-454483ae19aa", "DetectTime": "2023-10-30T13:57:27.239988+02:00", "EventTime": "2023-10-30T13:57:27.240006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["C01cA83iOCY6QhjQFi"]} -{"Format": "IDEA0", "ID": "275e0c37-09cd-4161-997e-e68ecd85e7f7", "DetectTime": "2023-10-30T13:57:27.270629+02:00", "EventTime": "2023-10-30T13:57:27.270651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["CgZph63rr8GUSfWsnb"]} -{"Format": "IDEA0", "ID": "520dd8fa-11c6-47ed-898d-fb52729a6bde", "DetectTime": "2023-10-30T13:57:27.296957+02:00", "EventTime": "2023-10-30T13:57:27.296970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["C6NCun1oKuaac1zUMa"]} -{"Format": "IDEA0", "ID": "43eeb921-e064-428c-8a80-58e05db616b1", "DetectTime": "2023-10-30T13:57:27.324733+02:00", "EventTime": "2023-10-30T13:57:27.324751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CA8zs3ICcdh9r5s0b"]} -{"Format": "IDEA0", "ID": "17717d3c-7833-4251-a663-d595025d2d7a", "DetectTime": "2023-10-30T13:57:27.349968+02:00", "EventTime": "2023-10-30T13:57:27.349988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoR9VEUBqqVsH4Fc2"]} -{"Format": "IDEA0", "ID": "2c2e89ff-c019-4be3-8116-99b7cf3db26a", "DetectTime": "2023-10-30T13:57:27.363873+02:00", "EventTime": "2023-10-30T13:57:27.363889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["Cn3KSA3XpExWRAfK2i"]} -{"Format": "IDEA0", "ID": "71285fdc-a4fd-474e-b854-1de1179620bd", "DetectTime": "2023-10-30T13:57:27.393582+02:00", "EventTime": "2023-10-30T13:57:27.393599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.194.29 ", "ContentType": "text/plain"}], "uids": ["C3cksS3Wj6jQZW88hj"]} -{"Format": "IDEA0", "ID": "e7c3adf7-3f64-4125-96e2-166e205ee5ef", "DetectTime": "2023-10-30T13:57:27.423524+02:00", "EventTime": "2023-10-30T13:57:27.423543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CcrPQr2sgrlbVNszu6"]} -{"Format": "IDEA0", "ID": "d4f580bc-872b-478b-921d-aa5157910fec", "DetectTime": "2023-10-30T13:57:27.446176+02:00", "EventTime": "2023-10-30T13:57:27.446202+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CXiSdP1a2j5t1pCCl5"]} -{"Format": "IDEA0", "ID": "40833395-f718-427e-a82f-8062d66d6a6a", "DetectTime": "2023-10-30T13:57:27.458092+02:00", "EventTime": "2023-10-30T13:57:27.458115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CByaXu2ck5M0fvGIe"]} -{"Format": "IDEA0", "ID": "8867afd2-b1e6-44ea-8679-0ed81dc3058a", "DetectTime": "2023-10-30T13:57:27.484447+02:00", "EventTime": "2023-10-30T13:57:27.484463+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CE9Q8j3a9090KHzRKk"]} -{"Format": "IDEA0", "ID": "254d7d36-b640-409c-91ac-58fac35c02ed", "DetectTime": "2023-10-30T13:57:27.495078+02:00", "EventTime": "2023-10-30T13:57:27.495097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CLDprwiJh1902tPkb"]} -{"Format": "IDEA0", "ID": "47cc061f-dc51-4eac-953a-f4e0a893749f", "DetectTime": "2023-10-30T13:57:27.527940+02:00", "EventTime": "2023-10-30T13:57:27.527961+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CC5fMO1VbWGVKWJKV6"]} -{"Format": "IDEA0", "ID": "e45d245d-61ae-4564-8435-3c49b02c6b62", "DetectTime": "2023-10-30T13:57:27.538762+02:00", "EventTime": "2023-10-30T13:57:27.538804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["Co7VM40cLDDpOgh4"]} -{"Format": "IDEA0", "ID": "535f32c1-24ab-4775-aec4-737e6afa1ebe", "DetectTime": "2023-10-30T13:57:27.565439+02:00", "EventTime": "2023-10-30T13:57:27.565455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.139.178.44 ", "ContentType": "text/plain"}], "uids": ["CqaNaB3ySqyIGPw45g"]} -{"Format": "IDEA0", "ID": "39143c73-5b0c-4ab2-9610-17c87152e16b", "DetectTime": "2023-10-30T13:57:27.590482+02:00", "EventTime": "2023-10-30T13:57:27.590499+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQkOIE22nqnOWtnZ33"]} -{"Format": "IDEA0", "ID": "19ef69c7-b3be-4d52-929b-8c67edad5500", "DetectTime": "2023-10-30T13:57:27.600786+02:00", "EventTime": "2023-10-30T13:57:27.600801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["C6XfkC4yNxXqANBQFl"]} -{"Format": "IDEA0", "ID": "9879eaf0-c467-4175-85d1-065da3d21f67", "DetectTime": "2023-10-30T13:57:27.631953+02:00", "EventTime": "2023-10-30T13:57:27.631970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CRqnr640sADTQLCL3f"]} -{"Format": "IDEA0", "ID": "1ac73bbc-6fd9-44ae-809e-ebe89b5fb194", "DetectTime": "2023-10-30T13:57:27.660753+02:00", "EventTime": "2023-10-30T13:57:27.660775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CpgD7w1we54smgiC6j"]} -{"Format": "IDEA0", "ID": "6546bc00-d857-41d2-a309-6006e7f7177a", "DetectTime": "2023-10-30T13:57:27.686605+02:00", "EventTime": "2023-10-30T13:57:27.686620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CC5fMO1VbWGVKWJKV6", "CVVX4VUoaG7FNTU06", "CXiSdP1a2j5t1pCCl5", "C9xpKrJfOob7BnzM1"]} -{"Format": "IDEA0", "ID": "df96fe4f-a5e2-4fae-a2a7-28c0a7e8d989", "DetectTime": "2023-10-30T13:57:27.699258+02:00", "EventTime": "2023-10-30T13:57:27.699277+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C9xpKrJfOob7BnzM1"]} -{"Format": "IDEA0", "ID": "767b5f47-5715-41f6-bbd1-a6a90d4098ef", "DetectTime": "2023-10-30T13:57:27.712265+02:00", "EventTime": "2023-10-30T13:57:27.712281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CWVvyv1AppYZCVLIj4"]} -{"Format": "IDEA0", "ID": "54d34447-f75a-44b9-a7b8-1874be157a5c", "DetectTime": "2023-10-30T13:57:27.739951+02:00", "EventTime": "2023-10-30T13:57:27.739967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["Cu5M2W373oaEMUGGt"]} -{"Format": "IDEA0", "ID": "2093b213-7877-4a89-bd62-c91c8e7a15e4", "DetectTime": "2023-10-30T13:57:27.764904+02:00", "EventTime": "2023-10-30T13:57:27.764921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["ConX7t2nNAtSjQTgy1"]} -{"Format": "IDEA0", "ID": "d20c06bc-3091-4b8e-8dee-8eeced3a4daf", "DetectTime": "2023-10-30T13:57:27.794246+02:00", "EventTime": "2023-10-30T13:57:27.794273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["COWD8p4DW55VQKWXui"]} -{"Format": "IDEA0", "ID": "2e3910fe-0a14-4db0-b9a7-fc0fbde105b1", "DetectTime": "2023-10-30T13:57:27.823608+02:00", "EventTime": "2023-10-30T13:57:27.823625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["Cr7Fm328OHQXGnL6ue"]} -{"Format": "IDEA0", "ID": "0b82416f-1766-436d-891f-2ae4a79717e1", "DetectTime": "2023-10-30T13:57:27.851494+02:00", "EventTime": "2023-10-30T13:57:27.851517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CwNxcw3ZqFVQw39mmg"]} -{"Format": "IDEA0", "ID": "04d61b55-3c1d-4851-9821-7740e079a0e9", "DetectTime": "2023-10-30T13:57:27.879919+02:00", "EventTime": "2023-10-30T13:57:27.879939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["Ck1Cug3pGjn5zZbHTb"]} -{"Format": "IDEA0", "ID": "4e948a99-8099-4451-8dc7-0dd8b46b221e", "DetectTime": "2023-10-30T13:57:27.909610+02:00", "EventTime": "2023-10-30T13:57:27.909625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CsMkT62T1JRpMD7Tsh"]} -{"Format": "IDEA0", "ID": "d02cecf8-6751-4848-ab6e-0c8cf8bbe697", "DetectTime": "2023-10-30T13:57:27.934835+02:00", "EventTime": "2023-10-30T13:57:27.934852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C2iWRd2H2PIOfVpX9"]} -{"Format": "IDEA0", "ID": "502ae8e3-bd7f-437d-97a8-eeb9f6cabfd8", "DetectTime": "2023-10-30T13:57:27.966962+02:00", "EventTime": "2023-10-30T13:57:27.966986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CcECwc3AbcyCn76Vsg"]} -{"Format": "IDEA0", "ID": "94d0332b-5981-4a35-bcc3-264f626182ab", "DetectTime": "2023-10-30T13:57:27.990272+02:00", "EventTime": "2023-10-30T13:57:27.990289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["Cah3iEHFqaO667Fg5"]} -{"Format": "IDEA0", "ID": "34c76e0f-37dd-4a11-a55b-d7c2cbd56f20", "DetectTime": "2023-10-30T13:57:28.020409+02:00", "EventTime": "2023-10-30T13:57:28.020429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CikjHC3qgK39AZl3li"]} -{"Format": "IDEA0", "ID": "82395f74-7b97-4664-90f7-ab0b043fb315", "DetectTime": "2023-10-30T13:57:28.047084+02:00", "EventTime": "2023-10-30T13:57:28.047104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CeEEqf3rtsPWSLnl6i"]} -{"Format": "IDEA0", "ID": "11bcb3ab-cd23-4247-a2de-4d5af7a4819a", "DetectTime": "2023-10-30T13:57:28.069797+02:00", "EventTime": "2023-10-30T13:57:28.069839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CVPV7h1JySz6vcP1Fk"]} -{"Format": "IDEA0", "ID": "9ed5127a-1835-493b-87e5-41564d509fd6", "DetectTime": "2023-10-30T13:57:28.095055+02:00", "EventTime": "2023-10-30T13:57:28.095075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C8nR0s2HBezeXdJDvf"]} -{"Format": "IDEA0", "ID": "96470b27-f01e-4b02-8447-309deba6357d", "DetectTime": "2023-10-30T13:57:28.117762+02:00", "EventTime": "2023-10-30T13:57:28.117781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CbEQiL341exFTqv93b"]} -{"Format": "IDEA0", "ID": "fcfbccd9-7850-41cf-b909-64e72a032dfa", "DetectTime": "2023-10-30T13:57:28.145122+02:00", "EventTime": "2023-10-30T13:57:28.145139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CvmBUu1Nwayf6l828d"]} -{"Format": "IDEA0", "ID": "5a25e77a-9e86-4c0e-9e2f-ac7f5bb434a4", "DetectTime": "2023-10-30T13:57:28.166527+02:00", "EventTime": "2023-10-30T13:57:28.166543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["C2LxDWe1XWMXUOTza"]} -{"Format": "IDEA0", "ID": "9660d5d4-25e2-48b4-8bec-6626e6df3bc6", "DetectTime": "2023-10-30T13:57:28.193790+02:00", "EventTime": "2023-10-30T13:57:28.193801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["CQcXbB42djw893hvr5"]} -{"Format": "IDEA0", "ID": "94dbeba1-e3a9-4cbc-ad39-7c0507041133", "DetectTime": "2023-10-30T13:57:28.216702+02:00", "EventTime": "2023-10-30T13:57:28.216713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["Cmt2pu37KbZn9mqG0f"]} -{"Format": "IDEA0", "ID": "4da00f71-9193-43f7-9fed-bd8fb7b86c44", "DetectTime": "2023-10-30T13:57:28.247866+02:00", "EventTime": "2023-10-30T13:57:28.247883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["CVsed54zEmSsR1RcF5"]} -{"Format": "IDEA0", "ID": "27cbbd98-e4bf-417b-b8f8-42e88681fbfe", "DetectTime": "2023-10-30T13:57:28.277762+02:00", "EventTime": "2023-10-30T13:57:28.277778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CxZ6pY33EDpgEgaVNj"]} -{"Format": "IDEA0", "ID": "381b8150-fbd7-4929-bdad-168ba124598e", "DetectTime": "2023-10-30T13:57:28.304246+02:00", "EventTime": "2023-10-30T13:57:28.304262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["CfoEon1LRTH64MHSp5"]} -{"Format": "IDEA0", "ID": "27ad233f-0f07-4577-a12f-3d6afbc2732a", "DetectTime": "2023-10-30T13:57:28.333702+02:00", "EventTime": "2023-10-30T13:57:28.333719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["CTqpws3dDZ6WpGb2E"]} -{"Format": "IDEA0", "ID": "d05d2969-53a9-4b5c-a550-84ecc55d856f", "DetectTime": "2023-10-30T13:57:28.358719+02:00", "EventTime": "2023-10-30T13:57:28.358736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CwD0qtCBYI6DldBpj"]} -{"Format": "IDEA0", "ID": "70527655-a99b-4f8d-97b2-a045d41d71b0", "DetectTime": "2023-10-30T13:57:28.394798+02:00", "EventTime": "2023-10-30T13:57:28.394816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["C7CsQr4vYp2Ipukot8"]} -{"Format": "IDEA0", "ID": "50082f47-2e81-449d-a4e9-a93317e8b9a8", "DetectTime": "2023-10-30T13:57:28.417306+02:00", "EventTime": "2023-10-30T13:57:28.417323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["C4QiGf3hq5JBMvPe9i"]} -{"Format": "IDEA0", "ID": "61bf987d-d51a-485e-b1f1-fc9afbf81c27", "DetectTime": "2023-10-30T13:57:28.438273+02:00", "EventTime": "2023-10-30T13:57:28.438288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Cn5TXr3Hh8VzUVFzR4"]} -{"Format": "IDEA0", "ID": "57a97ef6-c2d7-4e3f-8461-fb7a2723f3cf", "DetectTime": "2023-10-30T13:57:28.460406+02:00", "EventTime": "2023-10-30T13:57:28.460421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["Cs3k251pP0K10mW3v3"]} -{"Format": "IDEA0", "ID": "f141dc09-4533-4bdd-9e74-63c813d2ecc3", "DetectTime": "2023-10-30T13:57:28.488305+02:00", "EventTime": "2023-10-30T13:57:28.488328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CW0oA81UogriSNAFlh"]} -{"Format": "IDEA0", "ID": "8b2732ec-63e7-4cb4-b240-3c84bfabaae8", "DetectTime": "2023-10-30T13:57:28.516247+02:00", "EventTime": "2023-10-30T13:57:28.516269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CMJw224xI8kjcC332"]} -{"Format": "IDEA0", "ID": "b9b25812-6ee3-4d72-b46d-51513ec1d9ed", "DetectTime": "2023-10-30T13:57:28.535795+02:00", "EventTime": "2023-10-30T13:57:28.535811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["CDRbqg2tKtUiLCvR2h"]} -{"Format": "IDEA0", "ID": "a4e0837f-91eb-4e9d-b5e8-7486e1855aba", "DetectTime": "2023-10-30T13:57:28.556473+02:00", "EventTime": "2023-10-30T13:57:28.556497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CZyMgl3t3ScigxGzy3"]} -{"Format": "IDEA0", "ID": "f13deed1-34f9-4d30-834b-10491001c23a", "DetectTime": "2023-10-30T13:57:28.581799+02:00", "EventTime": "2023-10-30T13:57:28.581820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["C9rv0t4oBePLu8g9xj"]} -{"Format": "IDEA0", "ID": "98ddaf31-1599-4595-becf-36fc97ef578f", "DetectTime": "2023-10-30T13:57:28.603428+02:00", "EventTime": "2023-10-30T13:57:28.603445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["ChyCCq4A8NLw49q5B1"]} -{"Format": "IDEA0", "ID": "edd31684-f5e0-4722-9743-c0e41ae9e75b", "DetectTime": "2023-10-30T13:57:28.624308+02:00", "EventTime": "2023-10-30T13:57:28.624324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["C5lGHqxja2QmuMwi8"]} -{"Format": "IDEA0", "ID": "c3261683-50dc-438c-8d41-8500e16f1bd7", "DetectTime": "2023-10-30T13:57:28.648333+02:00", "EventTime": "2023-10-30T13:57:28.648345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CjS4EK21Ce7dfLdTic"]} -{"Format": "IDEA0", "ID": "dba67246-a524-47a0-a9f2-aca28bd356a5", "DetectTime": "2023-10-30T13:57:28.672521+02:00", "EventTime": "2023-10-30T13:57:28.672540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["CQLdwP1HWjpeEND0cf"]} -{"Format": "IDEA0", "ID": "47065b39-52f7-463b-9cd3-79171247be1d", "DetectTime": "2023-10-30T13:57:28.692369+02:00", "EventTime": "2023-10-30T13:57:28.692380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CIF9IL3WXPkPy0Fjoi"]} -{"Format": "IDEA0", "ID": "52611b80-d506-4e78-a6c7-3c8faae1de3b", "DetectTime": "2023-10-30T13:57:28.712433+02:00", "EventTime": "2023-10-30T13:57:28.712455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["COtn1S34YB28Qd5ZPk"]} -{"Format": "IDEA0", "ID": "4f55fafc-a0f4-4b1d-8972-754266c9fa04", "DetectTime": "2023-10-30T13:57:28.737950+02:00", "EventTime": "2023-10-30T13:57:28.737966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["Coz5Cg2JotrmWdyjUj"]} -{"Format": "IDEA0", "ID": "8670e878-4ff5-42b3-a5f1-15cf1ebc7987", "DetectTime": "2023-10-30T13:57:28.767295+02:00", "EventTime": "2023-10-30T13:57:28.767315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CF8XYL3cLuKv4uXHX2"]} -{"Format": "IDEA0", "ID": "e6627d80-02aa-4b4c-8675-3a3c775d15be", "DetectTime": "2023-10-30T13:57:28.789003+02:00", "EventTime": "2023-10-30T13:57:28.789019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C5KXDQ1a80fjrH6xvj"]} -{"Format": "IDEA0", "ID": "7490c07a-245d-4325-b8f5-1c26c19acd5d", "DetectTime": "2023-10-30T13:57:28.810595+02:00", "EventTime": "2023-10-30T13:57:28.810611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["Clrp7mquKtMgWHRA8"]} -{"Format": "IDEA0", "ID": "8925825e-5f7c-4c4c-925b-5a97d8ef8a05", "DetectTime": "2023-10-30T13:57:28.832843+02:00", "EventTime": "2023-10-30T13:57:28.832864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["ChX6281dzTx6Z1ANjj"]} -{"Format": "IDEA0", "ID": "7e10b061-3016-44fb-a9eb-0eb92d8d8c24", "DetectTime": "2023-10-30T13:57:28.853261+02:00", "EventTime": "2023-10-30T13:57:28.853278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["CBajdS1U1KZrmThoA7"]} -{"Format": "IDEA0", "ID": "8a26fa5a-3ded-4172-a17e-c3aac762b12f", "DetectTime": "2023-10-30T13:57:28.875705+02:00", "EventTime": "2023-10-30T13:57:28.875715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CBxaik20Nl6QuIK4x8"]} -{"Format": "IDEA0", "ID": "74ba36d1-84ad-4ff9-900b-d0a8d7b93498", "DetectTime": "2023-10-30T13:57:28.894908+02:00", "EventTime": "2023-10-30T13:57:28.894921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CgAvgE3xDad2lAKLeg"]} -{"Format": "IDEA0", "ID": "8a184f24-5e72-4a3e-944a-76afc1d8cea9", "DetectTime": "2023-10-30T13:57:28.915899+02:00", "EventTime": "2023-10-30T13:57:28.915909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["C7PoxZ27OutzBjBk76"]} -{"Format": "IDEA0", "ID": "05cb65a3-6b67-4fa7-a928-1ced32f0d035", "DetectTime": "2023-10-30T13:57:28.935308+02:00", "EventTime": "2023-10-30T13:57:28.935326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CyuF5f3PR8zUo5bkQ8"]} -{"Format": "IDEA0", "ID": "33dc4b0e-fdb5-4626-ad1d-e3c8c2f5c85b", "DetectTime": "2023-10-30T13:57:28.953560+02:00", "EventTime": "2023-10-30T13:57:28.953570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["CCmd5p3yrkE0d5fuC9"]} -{"Format": "IDEA0", "ID": "9c82f25b-8b6e-49c6-94dd-87bafa901a7b", "DetectTime": "2023-10-30T13:57:28.980987+02:00", "EventTime": "2023-10-30T13:57:28.981002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CQELMT1pwNj8KNBNlk"]} -{"Format": "IDEA0", "ID": "8fcfb853-6f52-4048-9660-ba8b8be8467e", "DetectTime": "2023-10-30T13:57:29.002403+02:00", "EventTime": "2023-10-30T13:57:29.002421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CqusX01EICqiUch1Uh"]} -{"Format": "IDEA0", "ID": "e34f503e-6c54-439d-94bc-e154d895732d", "DetectTime": "2023-10-30T13:57:29.026429+02:00", "EventTime": "2023-10-30T13:57:29.026444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.91.49.183 ", "ContentType": "text/plain"}], "uids": ["C3rUaGazdcxckwlSk"]} -{"Format": "IDEA0", "ID": "bb9027c0-ce4f-4cd6-9e5e-9fa6e8ba0469", "DetectTime": "2023-10-30T13:57:29.046568+02:00", "EventTime": "2023-10-30T13:57:29.046585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["C62TwA44orQkVzjCDh"]} -{"Format": "IDEA0", "ID": "0368e2dc-64ca-461c-b369-6c06be9f635b", "DetectTime": "2023-10-30T13:57:29.073303+02:00", "EventTime": "2023-10-30T13:57:29.073322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["Cjimww3EZDeoGludc1"]} -{"Format": "IDEA0", "ID": "4e9ab007-9ac6-4775-99f5-c4e60eafbbd4", "DetectTime": "2023-10-30T13:57:29.097062+02:00", "EventTime": "2023-10-30T13:57:29.097087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CkbLQP2NCWbXoAmrs7"]} -{"Format": "IDEA0", "ID": "1b7bbd59-06aa-496c-89f4-49f613edfc4a", "DetectTime": "2023-10-30T13:57:29.115018+02:00", "EventTime": "2023-10-30T13:57:29.115029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CfP3gE2rG19XDOwbX6"]} -{"Format": "IDEA0", "ID": "e49b02a5-83ab-4641-923a-8b752fa90048", "DetectTime": "2023-10-30T13:57:29.135382+02:00", "EventTime": "2023-10-30T13:57:29.135399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["Cb3r5B2ghZHxjWxkCf"]} -{"Format": "IDEA0", "ID": "c5f65569-2f53-47ff-81b9-d7bb740f4874", "DetectTime": "2023-10-30T13:57:29.161886+02:00", "EventTime": "2023-10-30T13:57:29.161899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["C0o6E83SpjN6lez1sl"]} -{"Format": "IDEA0", "ID": "6f4fecd5-f0ff-40a4-89b0-426a2bb7a55b", "DetectTime": "2023-10-30T13:57:29.179901+02:00", "EventTime": "2023-10-30T13:57:29.179919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["ClpYly1v2sl2j1jVS2"]} -{"Format": "IDEA0", "ID": "3c14d634-5e0d-4120-bba9-de3785903d58", "DetectTime": "2023-10-30T13:57:29.200651+02:00", "EventTime": "2023-10-30T13:57:29.200662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["C9KtBq19mqfDxIFWm"]} -{"Format": "IDEA0", "ID": "335f47d2-b6b0-4e5c-bcff-06134e6d2de9", "DetectTime": "2023-10-30T13:57:29.226504+02:00", "EventTime": "2023-10-30T13:57:29.226520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["CLVmjgPJQlSfq09Pc"]} -{"Format": "IDEA0", "ID": "4d6b747d-d8ed-47c2-baee-a741f91b490f", "DetectTime": "2023-10-30T13:57:29.245476+02:00", "EventTime": "2023-10-30T13:57:29.245487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CcBccv27WFwsJmumaj"]} -{"Format": "IDEA0", "ID": "a4e1e0eb-0521-4c63-80a5-a3387c19f525", "DetectTime": "2023-10-30T13:57:29.273137+02:00", "EventTime": "2023-10-30T13:57:29.273162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C10NaJqaahotU2Rol"]} -{"Format": "IDEA0", "ID": "740fe794-07de-434b-a98b-38721dc941c8", "DetectTime": "2023-10-30T13:57:29.294370+02:00", "EventTime": "2023-10-30T13:57:29.294388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CcXVEM3O5lEgTuOOOi"]} -{"Format": "IDEA0", "ID": "a204bf70-c1c8-4212-82d1-5a67e40a981d", "DetectTime": "2023-10-30T13:57:29.317419+02:00", "EventTime": "2023-10-30T13:57:29.317436+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCZC0o1srjjQEfoWT8"]} -{"Format": "IDEA0", "ID": "f1c66b9a-d436-40ba-a557-6281e7ed1ba1", "DetectTime": "2023-10-30T13:57:29.327994+02:00", "EventTime": "2023-10-30T13:57:29.328006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CPrIdz4hGFvjiuo925"]} -{"Format": "IDEA0", "ID": "c9f9f1db-b80c-4734-be99-f7d959d96c9d", "DetectTime": "2023-10-30T13:57:29.348822+02:00", "EventTime": "2023-10-30T13:57:29.348838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.231.62.73 ", "ContentType": "text/plain"}], "uids": ["C3L0yU1fnf1o14hvTd"]} -{"Format": "IDEA0", "ID": "34117fc8-1cd4-4538-b2c0-374572ccbc45", "DetectTime": "2023-10-30T13:57:29.368270+02:00", "EventTime": "2023-10-30T13:57:29.368282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["C10H491jQqqQshrcqc"]} -{"Format": "IDEA0", "ID": "21a2bf6b-69c1-409f-824b-fceaedd851eb", "DetectTime": "2023-10-30T13:57:29.388260+02:00", "EventTime": "2023-10-30T13:57:29.388276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C1K5sC4IuYDuS30otf"]} -{"Format": "IDEA0", "ID": "a51bcc28-3439-44b0-afb6-98d4ca3477b4", "DetectTime": "2023-10-30T13:57:29.413021+02:00", "EventTime": "2023-10-30T13:57:29.413032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.139.178.44 ", "ContentType": "text/plain"}], "uids": ["C79c923GfyR8pZPmx7"]} -{"Format": "IDEA0", "ID": "94524c16-fc8d-42cd-aa40-ff844d975137", "DetectTime": "2023-10-30T13:57:29.500762+02:00", "EventTime": "2023-10-30T13:57:29.500784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["Cna8d54VD7yZ0eNFh"]} -{"Format": "IDEA0", "ID": "a5bd311e-1238-4b7c-ae89-2aef38863674", "DetectTime": "2023-10-30T13:57:29.529645+02:00", "EventTime": "2023-10-30T13:57:29.529661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CXAPj31Hej3DS7iTie"]} -{"Format": "IDEA0", "ID": "8406bdb9-64d9-43a6-9817-8e9b29e0a43e", "DetectTime": "2023-10-30T13:57:29.551392+02:00", "EventTime": "2023-10-30T13:57:29.551410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 ", "ContentType": "text/plain"}], "uids": ["C4Qbfi38CU5l7AFGDg"]} -{"Format": "IDEA0", "ID": "6ecfd1a4-a71a-41c7-a10f-31311ba59703", "DetectTime": "2023-10-30T13:57:29.575019+02:00", "EventTime": "2023-10-30T13:57:29.575047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CjjLqu4NjKfE77EKo7"]} -{"Format": "IDEA0", "ID": "f57503d2-d3db-4305-a0de-6383d46bf0e8", "DetectTime": "2023-10-30T13:57:29.597677+02:00", "EventTime": "2023-10-30T13:57:29.597690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CZdCtM1zOL8PV69cwl"]} -{"Format": "IDEA0", "ID": "921b4cae-6696-474f-98cf-c74e84b63492", "DetectTime": "2023-10-30T13:57:29.618341+02:00", "EventTime": "2023-10-30T13:57:29.618356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["Cs8eyR2iq3afh16fsa"]} -{"Format": "IDEA0", "ID": "c9659aca-793a-4b50-92b1-dfcde908ad3e", "DetectTime": "2023-10-30T13:57:29.643408+02:00", "EventTime": "2023-10-30T13:57:29.643425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 ", "ContentType": "text/plain"}], "uids": ["CZu6l538aAfWX9scs2"]} -{"Format": "IDEA0", "ID": "b37a0ec5-ce86-4ce5-8737-616ac44e36c1", "DetectTime": "2023-10-30T13:57:29.665384+02:00", "EventTime": "2023-10-30T13:57:29.665396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 ", "ContentType": "text/plain"}], "uids": ["CpgStc3gPHrkiCFAf1"]} -{"Format": "IDEA0", "ID": "c511a5f4-5444-4a08-9907-25cc4fe1f78a", "DetectTime": "2023-10-30T13:57:29.685619+02:00", "EventTime": "2023-10-30T13:57:29.685640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CXjf5Q0dKMFU00BJb"]} -{"Format": "IDEA0", "ID": "3d6b279c-1f12-43f5-a66e-5164ceb033ae", "DetectTime": "2023-10-30T13:57:29.707418+02:00", "EventTime": "2023-10-30T13:57:29.707436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 ", "ContentType": "text/plain"}], "uids": ["C5Rf3a4SJo1KbHWfpj"]} -{"Format": "IDEA0", "ID": "bcf05b03-ca1d-428c-962d-2b2dfa774202", "DetectTime": "2023-10-30T13:57:29.727719+02:00", "EventTime": "2023-10-30T13:57:29.727735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CHnjLY1ddMqlNUE3g5"]} -{"Format": "IDEA0", "ID": "36142388-aacc-4ad6-a5ea-1fe21e248ac8", "DetectTime": "2023-10-30T13:57:29.752667+02:00", "EventTime": "2023-10-30T13:57:29.752683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CUOhVP39q4fZXDx15"]} -{"Format": "IDEA0", "ID": "eeb70e84-3815-4978-9dc7-bceeb68f26ef", "DetectTime": "2023-10-30T13:57:29.776654+02:00", "EventTime": "2023-10-30T13:57:29.776670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CdhNF648o3qbbkc0r4"]} -{"Format": "IDEA0", "ID": "5340baba-2f2b-4e73-904e-1813b9b15123", "DetectTime": "2023-10-30T13:57:29.800444+02:00", "EventTime": "2023-10-30T13:57:29.800455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["Ca6qnT1NY52lA68KV8"]} -{"Format": "IDEA0", "ID": "35219461-cb94-460d-aa33-3cea93a10671", "DetectTime": "2023-10-30T13:57:29.832047+02:00", "EventTime": "2023-10-30T13:57:29.832058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["C2PjOL3zVxu9fbbPel"]} -{"Format": "IDEA0", "ID": "3845b7f3-5d8d-49e8-ae2d-edcc42f69808", "DetectTime": "2023-10-30T13:57:29.855201+02:00", "EventTime": "2023-10-30T13:57:29.855218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CjNi1v3nPAW9re0Xtb"]} -{"Format": "IDEA0", "ID": "ff9aa93c-81e4-46f9-a4f7-532aec5f13f3", "DetectTime": "2023-10-30T13:57:29.881088+02:00", "EventTime": "2023-10-30T13:57:29.881104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CGmCXu424bWBn18iSk"]} -{"Format": "IDEA0", "ID": "65d00d29-b2f8-44f4-9866-9fe362e0f2ec", "DetectTime": "2023-10-30T13:57:29.912734+02:00", "EventTime": "2023-10-30T13:57:29.912750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CrlkG71haZZLFNXDpf"]} -{"Format": "IDEA0", "ID": "762e262d-1593-4aa7-9a6e-6573b0796ee6", "DetectTime": "2023-10-30T13:57:29.933678+02:00", "EventTime": "2023-10-30T13:57:29.933689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CecNYsaKaw6TTM0J9"]} -{"Format": "IDEA0", "ID": "e339ce90-b962-4b2c-b953-5b0a5dc9d77e", "DetectTime": "2023-10-30T13:57:29.953218+02:00", "EventTime": "2023-10-30T13:57:29.953237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CwHDLY2KLQyIeMIHwj"]} -{"Format": "IDEA0", "ID": "4fb91871-163b-4f0a-9073-1ffb6297e564", "DetectTime": "2023-10-30T13:57:29.973765+02:00", "EventTime": "2023-10-30T13:57:29.973781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CaWPQo4Imf4UJF7p7f"]} -{"Format": "IDEA0", "ID": "7c3865bf-8ef8-4c88-bc56-2fa32dfc6f00", "DetectTime": "2023-10-30T13:57:29.999383+02:00", "EventTime": "2023-10-30T13:57:29.999399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CnWHpnStBFSpmx1Sj"]} -{"Format": "IDEA0", "ID": "e8a32e95-b839-4f58-811e-65dd1807031e", "DetectTime": "2023-10-30T13:57:30.028789+02:00", "EventTime": "2023-10-30T13:57:30.028806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["C8GYpm1hIuArEu43s6"]} -{"Format": "IDEA0", "ID": "f6c5c62e-8e72-4444-8abb-564c044f767a", "DetectTime": "2023-10-30T13:57:30.057848+02:00", "EventTime": "2023-10-30T13:57:30.057865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Ce4VPr4iJAR5HdRel3"]} -{"Format": "IDEA0", "ID": "3e40b2c5-5580-46fa-870f-ad9ae91d7849", "DetectTime": "2023-10-30T13:57:30.077817+02:00", "EventTime": "2023-10-30T13:57:30.077834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CHogNp1csmLTusxjAh"]} -{"Format": "IDEA0", "ID": "96c45590-2192-4bc2-9fe0-fc757f356071", "DetectTime": "2023-10-30T13:57:30.101031+02:00", "EventTime": "2023-10-30T13:57:30.101047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CgcQGROEYWWLzzOE6"]} -{"Format": "IDEA0", "ID": "18e8a15e-a807-480f-ac30-45cf4bdfeff9", "DetectTime": "2023-10-30T13:57:30.125187+02:00", "EventTime": "2023-10-30T13:57:30.125204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CD0o7O2IWV8GgBGiY1"]} -{"Format": "IDEA0", "ID": "4c0ac40d-3ddf-43e6-8ec2-e1a5c0290286", "DetectTime": "2023-10-30T13:57:30.157822+02:00", "EventTime": "2023-10-30T13:57:30.157843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C7pifokl3IaEiQ1Lb"]} -{"Format": "IDEA0", "ID": "51595fb3-d1cc-4018-a195-bca44909ab57", "DetectTime": "2023-10-30T13:57:30.178218+02:00", "EventTime": "2023-10-30T13:57:30.178240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CTcBou4P9UcvWadZfa"]} -{"Format": "IDEA0", "ID": "5e41b017-86d6-46c3-bce0-d9da953ff8b4", "DetectTime": "2023-10-30T13:57:30.201878+02:00", "EventTime": "2023-10-30T13:57:30.201895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["CAf4Id2yB4AF2JPKTj"]} -{"Format": "IDEA0", "ID": "dcc2b661-bb3d-4b63-9b3f-6db1e0f70d98", "DetectTime": "2023-10-30T13:57:30.228604+02:00", "EventTime": "2023-10-30T13:57:30.228621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CBnQnspzVW61pgS1"]} -{"Format": "IDEA0", "ID": "318d4f7e-82a2-488f-923b-0cb8d8fd591b", "DetectTime": "2023-10-30T13:57:30.250238+02:00", "EventTime": "2023-10-30T13:57:30.250253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CiY8A42aFD8ollDmh9"]} -{"Format": "IDEA0", "ID": "56a9ea41-2284-4a52-93e2-1e4cd24c6176", "DetectTime": "2023-10-30T13:57:30.271134+02:00", "EventTime": "2023-10-30T13:57:30.271150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CdocC51hTg0uQ0fm1i"]} -{"Format": "IDEA0", "ID": "56ec3dbb-364c-4456-96ab-9edee83c95dc", "DetectTime": "2023-10-30T13:57:30.294176+02:00", "EventTime": "2023-10-30T13:57:30.294196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CEgwYb1WufZudSbq61"]} -{"Format": "IDEA0", "ID": "f2bbd8cd-4e19-4fbc-b51b-4bab3cd2a7cf", "DetectTime": "2023-10-30T13:57:30.319062+02:00", "EventTime": "2023-10-30T13:57:30.319086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CPTpm14dHM6sZWIdT2"]} -{"Format": "IDEA0", "ID": "1d4f5b46-f3d6-450a-be70-b1099d9d68ed", "DetectTime": "2023-10-30T13:57:30.348244+02:00", "EventTime": "2023-10-30T13:57:30.348255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CqMztttFCX3PPKFe"]} -{"Format": "IDEA0", "ID": "2edc0748-556d-4e2e-8078-bd34f4ff7929", "DetectTime": "2023-10-30T13:57:30.370171+02:00", "EventTime": "2023-10-30T13:57:30.370189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CCKuYdpOpq2KHfWZd"]} -{"Format": "IDEA0", "ID": "8c732ba5-4d49-4f5e-ae5b-791eb6566233", "DetectTime": "2023-10-30T13:57:30.399008+02:00", "EventTime": "2023-10-30T13:57:30.399025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["Cl2zht4uWB2j017WD9"]} -{"Format": "IDEA0", "ID": "53d7009f-1f3d-473a-afb9-c5062dcbc845", "DetectTime": "2023-10-30T13:57:30.425995+02:00", "EventTime": "2023-10-30T13:57:30.426011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["C9qqKw2soMtA5c3Ahh"]} -{"Format": "IDEA0", "ID": "ff12e333-bcae-406c-a3ac-c5c90a189054", "DetectTime": "2023-10-30T13:57:30.458408+02:00", "EventTime": "2023-10-30T13:57:30.458420+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C9uRIO84LSwoZDsub"]} -{"Format": "IDEA0", "ID": "f58a0935-d763-467f-a882-c6f4339ae712", "DetectTime": "2023-10-30T13:57:30.467265+02:00", "EventTime": "2023-10-30T13:57:30.467276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CNYnL71cQfleJIfB2e"]} -{"Format": "IDEA0", "ID": "4c507fa7-b826-4628-8b04-4dbe1d4ccde2", "DetectTime": "2023-10-30T13:57:30.497429+02:00", "EventTime": "2023-10-30T13:57:30.497445+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrlfnW12UfkorTo4Uh"]} -{"Format": "IDEA0", "ID": "1fff6591-dda3-42da-9285-73cb992cc12f", "DetectTime": "2023-10-30T13:57:30.507645+02:00", "EventTime": "2023-10-30T13:57:30.507664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CuV21i3lAtVG1Mc5fi"]} -{"Format": "IDEA0", "ID": "c80311b7-9454-4f95-9eb1-8fe2d001422a", "DetectTime": "2023-10-30T13:57:30.545050+02:00", "EventTime": "2023-10-30T13:57:30.545067+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CJjuVKTDp3RDc4327"]} -{"Format": "IDEA0", "ID": "00ce3595-a268-4b36-99d1-fc9a5014718e", "DetectTime": "2023-10-30T13:57:30.556204+02:00", "EventTime": "2023-10-30T13:57:30.556220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CSMFDV1dJ72g0SKXbf"]} -{"Format": "IDEA0", "ID": "af22dbd7-6ac0-47f0-9a2a-a80782529777", "DetectTime": "2023-10-30T13:57:30.586525+02:00", "EventTime": "2023-10-30T13:57:30.586548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CPzyr32d28khSZBMcb"]} -{"Format": "IDEA0", "ID": "6ad270a8-fcd5-4c37-abd2-1d89a06d0c7a", "DetectTime": "2023-10-30T13:57:30.618668+02:00", "EventTime": "2023-10-30T13:57:30.618684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CCd4mNLwIhlWgRld1"]} -{"Format": "IDEA0", "ID": "2c5fd572-b710-4c57-abe4-723144682453", "DetectTime": "2023-10-30T13:57:30.654965+02:00", "EventTime": "2023-10-30T13:57:30.654982+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCR17N1w7h1pUcUSm7"]} -{"Format": "IDEA0", "ID": "29895b67-9bcc-4715-a8c4-1947cbfcbca0", "DetectTime": "2023-10-30T13:57:30.665536+02:00", "EventTime": "2023-10-30T13:57:30.665554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CSaq6P2uPFhHlRl9S3"]} -{"Format": "Json", "ID": "29895b67-9bcc-4715-a8c4-1947cbfcbca0", "DetectTime": "2023-10-30T13:57:30.665536+02:00", "EventTime": "2023-10-30T13:57:30.665554+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:51:57.528214+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:30.719029)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "88af43c2-fb81-44ca-b48d-00b08bcc49e1", "DetectTime": "2023-10-30T13:57:30.724471+02:00", "EventTime": "2023-10-30T13:57:30.724489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["CsvLVF3tHRimUYcMV1"]} -{"Format": "IDEA0", "ID": "49554e85-8940-4b57-b82a-0f72032e527f", "DetectTime": "2023-10-30T13:57:30.753443+02:00", "EventTime": "2023-10-30T13:57:30.753460+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CXHoGv4oNErrWuAsZ8"]} -{"Format": "IDEA0", "ID": "3537282c-f82f-444f-a9c9-3b5e49bc8a37", "DetectTime": "2023-10-30T13:57:30.765411+02:00", "EventTime": "2023-10-30T13:57:30.765427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CSSfEe2Nvjnm8C1VUf"]} -{"Format": "IDEA0", "ID": "728d3d32-7b0b-4032-98f3-65d5fed625ee", "DetectTime": "2023-10-30T13:57:30.795432+02:00", "EventTime": "2023-10-30T13:57:30.795443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CKCBc22Pnmc9GZLVdh"]} -{"Format": "IDEA0", "ID": "cba0865e-bf66-4d7e-8626-bcd539780878", "DetectTime": "2023-10-30T13:57:30.819291+02:00", "EventTime": "2023-10-30T13:57:30.819309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CQdkA1imjfggRuyPc"]} -{"Format": "IDEA0", "ID": "f6a704d5-629f-4c93-9499-a8ee02979f21", "DetectTime": "2023-10-30T13:57:30.847933+02:00", "EventTime": "2023-10-30T13:57:30.847950+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpVwLg3O1TfXNrYmB1"]} -{"Format": "IDEA0", "ID": "337e2263-f8d2-4a10-b635-bb68c1d151cd", "DetectTime": "2023-10-30T13:57:30.859522+02:00", "EventTime": "2023-10-30T13:57:30.859548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CMuJcz4hJTfS3Oyv96"]} -{"Format": "IDEA0", "ID": "6441f491-a767-41c8-b3eb-5e27fde31e49", "DetectTime": "2023-10-30T13:57:30.882669+02:00", "EventTime": "2023-10-30T13:57:30.882680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CE7B381GVIutMQoTG6"]} -{"Format": "IDEA0", "ID": "7accb1cb-61e7-47f0-a850-a11e4be16c0a", "DetectTime": "2023-10-30T13:57:30.913213+02:00", "EventTime": "2023-10-30T13:57:30.913229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CoHfAk4cckEqNV2IB8", "CXHoGv4oNErrWuAsZ8", "CJjuVKTDp3RDc4327", "C9uRIO84LSwoZDsub"]} -{"Format": "IDEA0", "ID": "1f3d3f83-d748-4395-9db5-3a796a994f7a", "DetectTime": "2023-10-30T13:57:30.923746+02:00", "EventTime": "2023-10-30T13:57:30.923764+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CoHfAk4cckEqNV2IB8"]} -{"Format": "IDEA0", "ID": "1002c4ac-012a-4056-82cc-5b55badcb6a5", "DetectTime": "2023-10-30T13:57:30.935356+02:00", "EventTime": "2023-10-30T13:57:30.935371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CH3Auo3sR6YlgTyz7l"]} -{"Format": "IDEA0", "ID": "2f36e227-de76-45d0-a92a-f8ab123a3967", "DetectTime": "2023-10-30T13:57:30.964811+02:00", "EventTime": "2023-10-30T13:57:30.964827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CdzsVf3btnRuC5p35"]} -{"Format": "Json", "ID": "2f36e227-de76-45d0-a92a-f8ab123a3967", "DetectTime": "2023-10-30T13:57:30.964811+02:00", "EventTime": "2023-10-30T13:57:30.964827+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:51:59.794908+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:31.016496)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b70e00f-54a9-48a3-8612-1132f73f8862", "DetectTime": "2023-10-30T13:57:31.022539+02:00", "EventTime": "2023-10-30T13:57:31.022555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["C4B7rg2R8Wxab1es5f"]} -{"Format": "IDEA0", "ID": "e4ba0db4-ae68-4743-aba5-bb9aba8fb882", "DetectTime": "2023-10-30T13:57:31.051906+02:00", "EventTime": "2023-10-30T13:57:31.051923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CbR78MaMMWbWdTWO"]} -{"Format": "IDEA0", "ID": "9ec8bd78-e7f0-4c70-8296-f726abc2bf58", "DetectTime": "2023-10-30T13:57:31.076815+02:00", "EventTime": "2023-10-30T13:57:31.076829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CGFREN3Cp239JsjCh"]} -{"Format": "IDEA0", "ID": "9cd191b6-46ca-49a3-8c25-d3164660d569", "DetectTime": "2023-10-30T13:57:31.102402+02:00", "EventTime": "2023-10-30T13:57:31.102422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CGb1BL1Snp2Fw1nGB8"]} -{"Format": "IDEA0", "ID": "0b24cc73-edf0-4a25-ba1b-0e6e773fe948", "DetectTime": "2023-10-30T13:57:31.128398+02:00", "EventTime": "2023-10-30T13:57:31.128415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CxMGhFjZuVulvUTJh"]} -{"Format": "IDEA0", "ID": "bdf186b1-b003-407a-9088-78ffbfaf049e", "DetectTime": "2023-10-30T13:57:31.152802+02:00", "EventTime": "2023-10-30T13:57:31.152819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CuKTMy2azFXmfPoJKf"]} -{"Format": "IDEA0", "ID": "5b8ef9b3-6b44-4a63-bb29-ec45d2a98f40", "DetectTime": "2023-10-30T13:57:31.179748+02:00", "EventTime": "2023-10-30T13:57:31.179765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CcpEyo2XWmHTi0ay44"]} -{"Format": "IDEA0", "ID": "7dd6718f-c711-414b-9329-fbbc239be8e9", "DetectTime": "2023-10-30T13:57:31.203150+02:00", "EventTime": "2023-10-30T13:57:31.203165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CYQHW71n0CA9EadRbl"]} -{"Format": "Json", "ID": "7dd6718f-c711-414b-9329-fbbc239be8e9", "DetectTime": "2023-10-30T13:57:31.203150+02:00", "EventTime": "2023-10-30T13:57:31.203165+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:52:01.516802+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:31.244300)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2e9ec790-0250-4510-9d0f-12719257412a", "DetectTime": "2023-10-30T13:57:31.249092+02:00", "EventTime": "2023-10-30T13:57:31.249103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CQnAghBAw8H5s3qD3"]} -{"Format": "IDEA0", "ID": "347e0946-5362-4fad-9414-39be7a8b223f", "DetectTime": "2023-10-30T13:57:31.268489+02:00", "EventTime": "2023-10-30T13:57:31.268499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CAxWes3ZxNd5skLOQ"]} -{"Format": "IDEA0", "ID": "1fae0967-138c-4a97-823b-160719e6782f", "DetectTime": "2023-10-30T13:57:31.292267+02:00", "EventTime": "2023-10-30T13:57:31.292282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CcLdZE3ilz8tYeERhi"]} -{"Format": "IDEA0", "ID": "f119492a-e3f2-44a2-9eab-9e646b4624ce", "DetectTime": "2023-10-30T13:57:31.311870+02:00", "EventTime": "2023-10-30T13:57:31.311885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C5cxn41OPechXWYSac"]} -{"Format": "IDEA0", "ID": "574ce935-73c5-485b-b9e8-5a10a9aa753f", "DetectTime": "2023-10-30T13:57:31.334205+02:00", "EventTime": "2023-10-30T13:57:31.334220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CU5DCm2AQDSXwQ1ecf"]} -{"Format": "IDEA0", "ID": "ef38a91b-efac-4051-85a5-de8f6816cf53", "DetectTime": "2023-10-30T13:57:31.355942+02:00", "EventTime": "2023-10-30T13:57:31.355961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. ", "ContentType": "text/plain"}], "uids": ["CpLAKQ2pZUkVSVIOu"]} -{"Format": "IDEA0", "ID": "613632bf-f2f6-47fc-9d6f-555724ab3129", "DetectTime": "2023-10-30T13:57:31.379811+02:00", "EventTime": "2023-10-30T13:57:31.379827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. ", "ContentType": "text/plain"}], "uids": ["Ck7T6w4sR4ISMjt313"]} -{"Format": "IDEA0", "ID": "adc38300-583f-4160-b453-5caf1fb97757", "DetectTime": "2023-10-30T13:57:31.400459+02:00", "EventTime": "2023-10-30T13:57:31.400475+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1yNTh3mz03PD2yjx9"]} -{"Format": "IDEA0", "ID": "67df0125-395e-4cf4-8875-298bfb4641a4", "DetectTime": "2023-10-30T13:57:31.411854+02:00", "EventTime": "2023-10-30T13:57:31.411870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. ", "ContentType": "text/plain"}], "uids": ["CR96sm2qGKBPgWS2Ei"]} -{"Format": "Json", "ID": "67df0125-395e-4cf4-8875-298bfb4641a4", "DetectTime": "2023-10-30T13:57:31.411854+02:00", "EventTime": "2023-10-30T13:57:31.411870+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6442], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T05:52:03.532311+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2023/10/30 13:57:31.457200)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0bd50482-d9c6-4a30-afee-9c5c486632c6", "DetectTime": "2023-10-30T13:57:31.462754+02:00", "EventTime": "2023-10-30T13:57:31.462770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CpEMM36ZC0nnAqN9c"]} -{"Format": "IDEA0", "ID": "14bb5ca3-78dc-431e-a5d7-0b487ef68540", "DetectTime": "2023-10-30T13:57:31.500667+02:00", "EventTime": "2023-10-30T13:57:31.500683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CDVvS01ZLjzQ70I4Wk"]} -{"Format": "IDEA0", "ID": "ce8387ab-efbc-4770-b22d-f028e1d93e9b", "DetectTime": "2023-10-30T13:57:31.526849+02:00", "EventTime": "2023-10-30T13:57:31.526861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CZs7Vp1oFOZ6ZKDTgf"]} -{"Format": "IDEA0", "ID": "f34606ea-b418-4d9f-8910-cc762ba30f2d", "DetectTime": "2023-10-30T13:57:31.558422+02:00", "EventTime": "2023-10-30T13:57:31.558438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["C6EFXj22P1xsWhg1P7"]} -{"Format": "IDEA0", "ID": "aa392e6f-4e98-4e91-84ae-febf3e5947b7", "DetectTime": "2023-10-30T13:57:31.595147+02:00", "EventTime": "2023-10-30T13:57:31.595164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CZkJUA1cUhVZY2cR5l"]} -{"Format": "IDEA0", "ID": "afdd839a-3b8b-4b45-8e4f-4db433dc4a1d", "DetectTime": "2023-10-30T13:57:31.626449+02:00", "EventTime": "2023-10-30T13:57:31.626466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["C2camo4IGIWpY1ikRf"]} -{"Format": "IDEA0", "ID": "f3f475c3-4b12-4343-ab73-24c9a950c844", "DetectTime": "2023-10-30T13:57:31.657432+02:00", "EventTime": "2023-10-30T13:57:31.657451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CNQmY54xBc3tnVSAdh"]} -{"Format": "Json", "ID": "f3f475c3-4b12-4343-ab73-24c9a950c844", "DetectTime": "2023-10-30T13:57:31.657432+02:00", "EventTime": "2023-10-30T13:57:31.657451+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T06:22:09.164605+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2023/10/30 13:57:31.741046)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6897dcc3-b267-4bec-a76b-e6dc124f104a", "DetectTime": "2023-10-30T13:57:31.745432+02:00", "EventTime": "2023-10-30T13:57:31.745444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CFAnCC3fcTkDAOTzZ"]} -{"Format": "IDEA0", "ID": "e0c6e217-91a2-4c96-8807-693aa826e60f", "DetectTime": "2023-10-30T13:57:31.779321+02:00", "EventTime": "2023-10-30T13:57:31.779334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CJxgYJ1TdK2MglFOea"]} -{"Format": "IDEA0", "ID": "ff31f00e-ea68-4b0f-9498-4e2a61ed6858", "DetectTime": "2023-10-30T13:57:31.807351+02:00", "EventTime": "2023-10-30T13:57:31.807368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CCQLa918QjtTK0qqu1"]} -{"Format": "IDEA0", "ID": "f3a9ff6e-1835-4340-b1c6-7f2560d6fcb3", "DetectTime": "2023-10-30T13:57:31.825659+02:00", "EventTime": "2023-10-30T13:57:31.825679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CS80Vp27D8kzi41WJa"]} -{"Format": "IDEA0", "ID": "70ba08e8-14d5-412a-98b7-45006bce3250", "DetectTime": "2023-10-30T13:57:31.856388+02:00", "EventTime": "2023-10-30T13:57:31.856414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CcvvBW2mYQGRHoDss1"]} -{"Format": "IDEA0", "ID": "11192ace-008d-46ae-bdf9-07995fd29f7a", "DetectTime": "2023-10-30T13:57:31.885779+02:00", "EventTime": "2023-10-30T13:57:31.885796+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CHYAcQWMiUepGyEx2"]} -{"Format": "IDEA0", "ID": "08d2790b-5e82-436f-8584-ec0e37c86017", "DetectTime": "2023-10-30T13:57:31.898278+02:00", "EventTime": "2023-10-30T13:57:31.898293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["Cu8de51zmX7hoB6gG1"]} -{"Format": "IDEA0", "ID": "ed39482e-2caf-4acf-a588-c0b1a3634f7e", "DetectTime": "2023-10-30T13:57:31.930734+02:00", "EventTime": "2023-10-30T13:57:31.930751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CLnQ493RIdhMHaYxn"]} -{"Format": "IDEA0", "ID": "edac8431-3611-4e86-82c4-c578ed1e03a1", "DetectTime": "2023-10-30T13:57:31.966348+02:00", "EventTime": "2023-10-30T13:57:31.966366+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP2eFp15rsGu8Ofdqf"]} -{"Format": "IDEA0", "ID": "ba6ba053-6f48-45f9-a119-913e61ff7264", "DetectTime": "2023-10-30T13:57:31.979259+02:00", "EventTime": "2023-10-30T13:57:31.979277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["ChSWWH3NdiTLfHoU8l"]} -{"Format": "IDEA0", "ID": "0cc679b6-95b5-48ac-9bfc-8c91d9beab2b", "DetectTime": "2023-10-30T13:57:32.013870+02:00", "EventTime": "2023-10-30T13:57:32.013895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["CkF28P3zI9nQzxaP05"]} -{"Format": "Json", "ID": "0cc679b6-95b5-48ac-9bfc-8c91d9beab2b", "DetectTime": "2023-10-30T13:57:32.013870+02:00", "EventTime": "2023-10-30T13:57:32.013895+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T06:22:12.159025+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2023/10/30 13:57:32.072232)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d4916ab6-0462-455b-8fb0-816ef473e74e", "DetectTime": "2023-10-30T13:57:32.076975+02:00", "EventTime": "2023-10-30T13:57:32.076987+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CDiWY125bM1Lx4Trsb"]} -{"Format": "IDEA0", "ID": "a1b5f017-df9c-4edd-88d1-0ecdb353d1da", "DetectTime": "2023-10-30T13:57:32.087777+02:00", "EventTime": "2023-10-30T13:57:32.087799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["C6mnms2pipVD6oMSoe"]} -{"Format": "IDEA0", "ID": "c79004d3-69a7-409e-ab84-291e453903f1", "DetectTime": "2023-10-30T13:57:32.120008+02:00", "EventTime": "2023-10-30T13:57:32.120024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CwhaOB35BWtqBo3Pa1"]} -{"Format": "IDEA0", "ID": "0648a5df-5243-48b3-9759-d1fd286646c9", "DetectTime": "2023-10-30T13:57:32.148719+02:00", "EventTime": "2023-10-30T13:57:32.148735+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CH11zj5ILy82MNogk"]} -{"Format": "IDEA0", "ID": "91457eda-398c-4569-92d2-8bf646fecbc9", "DetectTime": "2023-10-30T13:57:32.161194+02:00", "EventTime": "2023-10-30T13:57:32.161213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C4Nd6S1CAzu4fd55Fg"]} -{"Format": "IDEA0", "ID": "f8e040df-0ca9-4d52-8254-63ab900cd895", "DetectTime": "2023-10-30T13:57:32.184275+02:00", "EventTime": "2023-10-30T13:57:32.184287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["C1mwdA4BdJ5xpOfg8b"]} -{"Format": "IDEA0", "ID": "798c1309-a42f-4d32-870d-1f18489b5556", "DetectTime": "2023-10-30T13:57:32.215318+02:00", "EventTime": "2023-10-30T13:57:32.215334+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CAX1uk4IZRM9pP6Nmi"]} -{"Format": "IDEA0", "ID": "1e509920-6c56-43be-9f79-7e121b7268d6", "DetectTime": "2023-10-30T13:57:32.228507+02:00", "EventTime": "2023-10-30T13:57:32.228531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["C4vAhZ2Qy00d3mLZFa"]} -{"Format": "IDEA0", "ID": "222e020c-4e6b-4681-a9a5-08e01d7047ba", "DetectTime": "2023-10-30T13:57:32.257844+02:00", "EventTime": "2023-10-30T13:57:32.257860+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck0dKqOYVzm8pMMG7"]} -{"Format": "IDEA0", "ID": "5a4c3c1a-b25a-4524-8961-2c8e3bac9b3b", "DetectTime": "2023-10-30T13:57:32.270003+02:00", "EventTime": "2023-10-30T13:57:32.270018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CMZfQ13EZXkshVZQm3"]} -{"Format": "IDEA0", "ID": "2219baa4-032a-4c22-a4df-3bb7ac4e4829", "DetectTime": "2023-10-30T13:57:32.299302+02:00", "EventTime": "2023-10-30T13:57:32.299312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CUyxjh1yILdhc4FjXh"]} -{"Format": "IDEA0", "ID": "9ee8936d-0a88-4660-bdc0-db1c8148e844", "DetectTime": "2023-10-30T13:57:32.325434+02:00", "EventTime": "2023-10-30T13:57:32.325456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CHYAcQWMiUepGyEx2", "CDiWY125bM1Lx4Trsb", "CAX1uk4IZRM9pP6Nmi", "CGWoFR2KphwngKmMj"]} -{"Format": "IDEA0", "ID": "7636067c-fd7b-4dbc-83cd-c59027c2a804", "DetectTime": "2023-10-30T13:57:32.336908+02:00", "EventTime": "2023-10-30T13:57:32.336924+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CGWoFR2KphwngKmMj"]} -{"Format": "IDEA0", "ID": "4fb20cd0-1ca2-41e5-bad7-40317ba0238a", "DetectTime": "2023-10-30T13:57:32.350396+02:00", "EventTime": "2023-10-30T13:57:32.350415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CQJ4B73c4RA1uqL7kg"]} -{"Format": "Json", "ID": "4fb20cd0-1ca2-41e5-bad7-40317ba0238a", "DetectTime": "2023-10-30T13:57:32.350396+02:00", "EventTime": "2023-10-30T13:57:32.350415+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T06:22:31.834504+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2023/10/30 13:57:32.397202)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6925d7c8-3175-4633-b4e1-bbf22a288550", "DetectTime": "2023-10-30T13:57:32.402103+02:00", "EventTime": "2023-10-30T13:57:32.402119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Cxe41S1nTqOGmORII1"]} -{"Format": "IDEA0", "ID": "d81970ad-8583-4ceb-ac2e-095ff422143a", "DetectTime": "2023-10-30T13:57:32.432592+02:00", "EventTime": "2023-10-30T13:57:32.432609+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGcCes8Vpchn7YLXc"]} -{"Format": "IDEA0", "ID": "25d99f42-d711-4efe-9f07-c47982583af7", "DetectTime": "2023-10-30T13:57:32.448219+02:00", "EventTime": "2023-10-30T13:57:32.448249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CjP9Wo1aKeO6ZezZL7"]} -{"Format": "IDEA0", "ID": "f1981d8e-98ad-4cd9-bd3d-7b56d06aae56", "DetectTime": "2023-10-30T13:57:32.473479+02:00", "EventTime": "2023-10-30T13:57:32.473494+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C5ck6HuWl9LAcIep5"]} -{"Format": "IDEA0", "ID": "baa14a23-ab32-4bcc-a9e5-3fecff5c2cea", "DetectTime": "2023-10-30T13:57:32.485552+02:00", "EventTime": "2023-10-30T13:57:32.485568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CTUlBA4BSZO6xVM90c"]} -{"Format": "IDEA0", "ID": "fbb06133-1bb1-433e-98ac-44b98366f1b4", "DetectTime": "2023-10-30T13:57:32.514555+02:00", "EventTime": "2023-10-30T13:57:32.514572+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5qOjG1DZgVWDf2L1g"]} -{"Format": "IDEA0", "ID": "b0fcd660-896d-4583-830f-6155db08d2f5", "DetectTime": "2023-10-30T13:57:32.528992+02:00", "EventTime": "2023-10-30T13:57:32.529003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C05kop3KF2HV43WHPf"]} -{"Format": "IDEA0", "ID": "c95e1763-9722-4768-b132-dd35ac725da1", "DetectTime": "2023-10-30T13:57:32.558686+02:00", "EventTime": "2023-10-30T13:57:32.558701+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CYE6Of4flq4M5c0g3i"]} -{"Format": "IDEA0", "ID": "b20dbd83-7f32-42c3-bf2a-60285047107e", "DetectTime": "2023-10-30T13:57:32.570675+02:00", "EventTime": "2023-10-30T13:57:32.570688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CLJwaY2GpCff520Lx6"]} -{"Format": "IDEA0", "ID": "d0016e91-2838-48a6-ac36-156fec8757ec", "DetectTime": "2023-10-30T13:57:32.596263+02:00", "EventTime": "2023-10-30T13:57:32.596275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["Cwuyq14cjiJyTf9Tug"]} -{"Format": "IDEA0", "ID": "b5ddbc29-5246-4033-90ec-bca9d038528a", "DetectTime": "2023-10-30T13:57:32.623999+02:00", "EventTime": "2023-10-30T13:57:32.624014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CEcTf71NgQT0FER0c6"]} -{"Format": "IDEA0", "ID": "ff486dd1-0a3f-4ad7-9288-f2d3b8f436e9", "DetectTime": "2023-10-30T13:57:32.651662+02:00", "EventTime": "2023-10-30T13:57:32.651674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CaeLrw3yOaoylja1e"]} -{"Format": "Json", "ID": "ff486dd1-0a3f-4ad7-9288-f2d3b8f436e9", "DetectTime": "2023-10-30T13:57:32.651662+02:00", "EventTime": "2023-10-30T13:57:32.651674+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T06:54:29.815044+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2023/10/30 13:57:32.702314)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4b7bcb8c-be8c-4d31-a4f5-f13827c33b7a", "DetectTime": "2023-10-30T13:57:32.707883+02:00", "EventTime": "2023-10-30T13:57:32.707896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C7wThD39d2otnnUKm9"]} -{"Format": "IDEA0", "ID": "35d6f967-63ad-4edc-80dd-3fec3c476557", "DetectTime": "2023-10-30T13:57:32.738714+02:00", "EventTime": "2023-10-30T13:57:32.738732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. ", "ContentType": "text/plain"}], "uids": ["Cn78Tz2O9hpr19OXv2"]} -{"Format": "IDEA0", "ID": "2da14b57-32b1-42a4-b22b-68cfe88fcfb4", "DetectTime": "2023-10-30T13:57:32.762886+02:00", "EventTime": "2023-10-30T13:57:32.762901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CRSZtHpRsJ7TGXIBb"]} -{"Format": "IDEA0", "ID": "6abee29e-2f2e-4d9c-8c3a-087c480400c1", "DetectTime": "2023-10-30T13:57:32.789932+02:00", "EventTime": "2023-10-30T13:57:32.789950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CxjUz038JFIPF7DnMd"]} -{"Format": "IDEA0", "ID": "1f6f6968-a129-4ff8-a6eb-97bb2276ce18", "DetectTime": "2023-10-30T13:57:32.816015+02:00", "EventTime": "2023-10-30T13:57:32.816027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["CRDg0DPseBv625eh9"]} -{"Format": "IDEA0", "ID": "a9bba6b6-d3b4-4b50-84c1-cc01aa461854", "DetectTime": "2023-10-30T13:57:32.841473+02:00", "EventTime": "2023-10-30T13:57:32.841495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CfQUSA3PTj1nLVNwt7"]} -{"Format": "IDEA0", "ID": "2436e9bf-4f1f-44e3-84fb-90100c8e9be5", "DetectTime": "2023-10-30T13:57:32.870439+02:00", "EventTime": "2023-10-30T13:57:32.870456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CTjK4F3JBvelIFFwx"]} -{"Format": "IDEA0", "ID": "262b4cb9-df80-40d2-8408-637792ad725c", "DetectTime": "2023-10-30T13:57:32.897297+02:00", "EventTime": "2023-10-30T13:57:32.897313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CVfIA01YbXiRuQ5Ib1"]} -{"Format": "Json", "ID": "262b4cb9-df80-40d2-8408-637792ad725c", "DetectTime": "2023-10-30T13:57:32.897297+02:00", "EventTime": "2023-10-30T13:57:32.897313+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T06:54:32.168427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2023/10/30 13:57:32.965816)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "85e5c9b1-77d7-4601-8d36-ade121f31f35", "DetectTime": "2023-10-30T13:57:32.971357+02:00", "EventTime": "2023-10-30T13:57:32.971373+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVUhdW3nUhnBggha88"]} -{"Format": "IDEA0", "ID": "d4f7bbcb-1852-4a82-b1db-193b6260586e", "DetectTime": "2023-10-30T13:57:32.986316+02:00", "EventTime": "2023-10-30T13:57:32.986336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CorZoh18mC5EBCSYqh"]} -{"Format": "IDEA0", "ID": "d4fbd8ef-fbd2-492f-b44a-429e12936df2", "DetectTime": "2023-10-30T13:57:33.010210+02:00", "EventTime": "2023-10-30T13:57:33.010227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["C9uVRD3i8M0YUfPO83"]} -{"Format": "IDEA0", "ID": "d801a7f2-cc2f-479e-9918-96672e1e9f6a", "DetectTime": "2023-10-30T13:57:33.032506+02:00", "EventTime": "2023-10-30T13:57:33.032526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1089], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. ", "ContentType": "text/plain"}], "uids": ["Cwk9E9wg7yt9wvy72"]} -{"Format": "IDEA0", "ID": "16b16a3c-6bd9-4cfe-ba2c-a6bd94d68a6d", "DetectTime": "2023-10-30T13:57:33.057234+02:00", "EventTime": "2023-10-30T13:57:33.057252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["Cic3E93lwZczGgjKeh"]} -{"Format": "IDEA0", "ID": "862eb973-84e6-4654-8919-5524c37c264f", "DetectTime": "2023-10-30T13:57:33.080181+02:00", "EventTime": "2023-10-30T13:57:33.080200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CjBFir4yOLM88tXnAa"]} -{"Format": "IDEA0", "ID": "39b39b49-e4ac-48f4-9a6a-a0609d81cb16", "DetectTime": "2023-10-30T13:57:33.105132+02:00", "EventTime": "2023-10-30T13:57:33.105158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CqhnUoNUnhrO1Wmo4"]} -{"Format": "IDEA0", "ID": "9771c797-8068-4db4-abe1-845da3e43492", "DetectTime": "2023-10-30T13:57:33.126627+02:00", "EventTime": "2023-10-30T13:57:33.126640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["ChxsHk3Qp3Elw1Jxd9"]} -{"Format": "IDEA0", "ID": "3478548e-c154-4978-b019-abc7ac10ad15", "DetectTime": "2023-10-30T13:57:33.147641+02:00", "EventTime": "2023-10-30T13:57:33.147652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CMsZJP2f4HDwlzRvC1"]} -{"Format": "Json", "ID": "3478548e-c154-4978-b019-abc7ac10ad15", "DetectTime": "2023-10-30T13:57:33.147641+02:00", "EventTime": "2023-10-30T13:57:33.147652+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T06:54:34.520954+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2023/10/30 13:57:33.194318)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "37a954f9-eb55-44c7-9327-2e38697c8ee5", "DetectTime": "2023-10-30T13:57:33.199025+02:00", "EventTime": "2023-10-30T13:57:33.199042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CN3Bi72VZJFCNdTIWk"]} -{"Format": "IDEA0", "ID": "530faf79-9831-4ee2-b0d5-7061b5df708b", "DetectTime": "2023-10-30T13:57:33.217297+02:00", "EventTime": "2023-10-30T13:57:33.217308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CvYAR02oEZ91A1XqTg"]} -{"Format": "IDEA0", "ID": "a51d5aba-ada0-48f6-aa63-cf141b2ce1ee", "DetectTime": "2023-10-30T13:57:33.229227+02:00", "EventTime": "2023-10-30T13:57:33.229244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CZXNgf3XTcr8ZIG42"]} -{"Format": "IDEA0", "ID": "003dc0c5-9d0b-48bf-8db0-636413cb6b62", "DetectTime": "2023-10-30T13:57:33.249919+02:00", "EventTime": "2023-10-30T13:57:33.249936+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqDqNT1BtOF8MkEluf"]} -{"Format": "IDEA0", "ID": "afcff86c-9eba-4ae7-b587-d0e045e51a9d", "DetectTime": "2023-10-30T13:57:33.265172+02:00", "EventTime": "2023-10-30T13:57:33.265185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CULYoG2EKBZJvs1xQ1"]} -{"Format": "IDEA0", "ID": "8e55fc5e-2286-40af-a0cc-55d3a9a7b6ed", "DetectTime": "2023-10-30T13:57:33.282713+02:00", "EventTime": "2023-10-30T13:57:33.282729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CrvtSp3BTwpHolRGc6"]} -{"Format": "IDEA0", "ID": "2de7a2bd-6aa8-4fc0-8689-8c7f52bddbdd", "DetectTime": "2023-10-30T13:57:33.422369+02:00", "EventTime": "2023-10-30T13:57:33.422394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CaW2x73hC9x7VL9hX4", "CYE6Of4flq4M5c0g3i", "CvYAR02oEZ91A1XqTg", "C5ck6HuWl9LAcIep5"]} -{"Format": "IDEA0", "ID": "e9215a1f-ec46-4827-9cb6-8e29b18b1e7a", "DetectTime": "2023-10-30T13:57:33.435994+02:00", "EventTime": "2023-10-30T13:57:33.436010+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CaW2x73hC9x7VL9hX4"]} -{"Format": "IDEA0", "ID": "961c1b82-f550-46ed-a9d8-894a0de4094d", "DetectTime": "2023-10-30T13:57:33.451961+02:00", "EventTime": "2023-10-30T13:57:33.451979+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQVUXi3AYSk7yyau44"]} -{"Format": "IDEA0", "ID": "2de011a0-f649-413c-acb9-9ce4a21a35dc", "DetectTime": "2023-10-30T13:57:33.468011+02:00", "EventTime": "2023-10-30T13:57:33.468027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CyBUOi2tyh2kXAwBWg"]} -{"Format": "IDEA0", "ID": "7fb0ff1a-3b9b-426a-8bd9-71872345d958", "DetectTime": "2023-10-30T13:57:33.518554+02:00", "EventTime": "2023-10-30T13:57:33.518576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["Czb3gl191NJOqv6Sre"]} -{"Format": "IDEA0", "ID": "daf3be79-afcf-458d-b3e7-c8bd479cd9e7", "DetectTime": "2023-10-30T13:57:33.540177+02:00", "EventTime": "2023-10-30T13:57:33.540197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C69L6L2GmJb6Ba6qW9"]} -{"Format": "IDEA0", "ID": "c4cd464c-8621-47b3-a1b2-f134c62dbc8f", "DetectTime": "2023-10-30T13:57:33.585892+02:00", "EventTime": "2023-10-30T13:57:33.585912+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C57Rpv2xDRKe7R1Qi2"]} -{"Format": "IDEA0", "ID": "919b68c3-a4c5-408d-86ae-2235b35ff2d8", "DetectTime": "2023-10-30T13:57:33.601383+02:00", "EventTime": "2023-10-30T13:57:33.601400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CRjCmPchpPqgFIvjf"]} -{"Format": "IDEA0", "ID": "4ba581f2-9aad-4fdb-add8-5833be8ee4f5", "DetectTime": "2023-10-30T13:57:33.649104+02:00", "EventTime": "2023-10-30T13:57:33.649120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["C0YDBk4EgwscWRKVD1"]} -{"Format": "IDEA0", "ID": "c50542bf-5096-4024-aa82-81b4e29b63a2", "DetectTime": "2023-10-30T13:57:33.695318+02:00", "EventTime": "2023-10-30T13:57:33.695342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["Cvzqey3rGtJwitixpk"]} -{"Format": "IDEA0", "ID": "b00682b0-f173-460d-b98d-7761a8b7484a", "DetectTime": "2023-10-30T13:57:33.746709+02:00", "EventTime": "2023-10-30T13:57:33.746736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CsYwRz3BoyA2JmSdVl"]} -{"Format": "Json", "ID": "b00682b0-f173-460d-b98d-7761a8b7484a", "DetectTime": "2023-10-30T13:57:33.746709+02:00", "EventTime": "2023-10-30T13:57:33.746736+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:25:10.215016+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:33.829215)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f08df51-c4b3-4caa-8b2b-4d335ca1519c", "DetectTime": "2023-10-30T13:57:33.834898+02:00", "EventTime": "2023-10-30T13:57:33.834915+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAAMEO2yF6CUoLvu5b"]} -{"Format": "IDEA0", "ID": "05adae60-9472-4814-874a-d5983034afce", "DetectTime": "2023-10-30T13:57:33.852403+02:00", "EventTime": "2023-10-30T13:57:33.852421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CAuDYe2cd0O2XVWrej"]} -{"Format": "IDEA0", "ID": "64ef03a8-4b10-4360-8e5f-7bba6051d0d0", "DetectTime": "2023-10-30T13:57:33.902269+02:00", "EventTime": "2023-10-30T13:57:33.902284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CfMGW74v1o54iRWNq7"]} -{"Format": "IDEA0", "ID": "543e7f87-bbd1-4f04-87a8-36f7a2b71c65", "DetectTime": "2023-10-30T13:57:33.944738+02:00", "EventTime": "2023-10-30T13:57:33.944758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["COiWwP35YgwGtmTmDk"]} -{"Format": "IDEA0", "ID": "840b5df0-acd8-4cca-bce4-8b062c82b01b", "DetectTime": "2023-10-30T13:57:33.987429+02:00", "EventTime": "2023-10-30T13:57:33.987454+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C4XOVD3hIJjg3dNIwh"]} -{"Format": "IDEA0", "ID": "a7904de4-42cc-46d7-b8bd-5da923159812", "DetectTime": "2023-10-30T13:57:34.002844+02:00", "EventTime": "2023-10-30T13:57:34.002861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CnL8jO2HHrMLA0XrO2"]} -{"Format": "IDEA0", "ID": "2898e45e-9cf6-424a-9e0b-bc07d7a2bfe5", "DetectTime": "2023-10-30T13:57:34.046747+02:00", "EventTime": "2023-10-30T13:57:34.046768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CXoTB53FXovECZ7TF6"]} -{"Format": "IDEA0", "ID": "12e49f8d-43fa-4e99-adfc-3bf497fd0590", "DetectTime": "2023-10-30T13:57:34.083603+02:00", "EventTime": "2023-10-30T13:57:34.083614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS346", "ContentType": "text/plain"}], "uids": ["C2MsPl4uXIpRedy6Ac"]} -{"Format": "IDEA0", "ID": "3fd7f985-aeba-41c0-9568-9fbee23dea47", "DetectTime": "2023-10-30T13:57:34.124131+02:00", "EventTime": "2023-10-30T13:57:34.124155+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmnicM2AFgxxMCHoj"]} -{"Format": "IDEA0", "ID": "c2774fbf-1420-4cfd-91d7-63cd3ac1e213", "DetectTime": "2023-10-30T13:57:34.137107+02:00", "EventTime": "2023-10-30T13:57:34.137124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CWKtqs4YZib4PhsRRg"]} -{"Format": "IDEA0", "ID": "8d53f522-db48-49ad-bd65-736cadf17d99", "DetectTime": "2023-10-30T13:57:34.175559+02:00", "EventTime": "2023-10-30T13:57:34.175570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CcuHmH2rt3fr50GZng"]} -{"Format": "Json", "ID": "8d53f522-db48-49ad-bd65-736cadf17d99", "DetectTime": "2023-10-30T13:57:34.175559+02:00", "EventTime": "2023-10-30T13:57:34.175570+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:25:13.782288+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:34.235565)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4c891a9e-d4fb-4502-88c8-c9bbbed88d7e", "DetectTime": "2023-10-30T13:57:34.241403+02:00", "EventTime": "2023-10-30T13:57:34.241419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C16Rp7e0rQtAS6E21"]} -{"Format": "IDEA0", "ID": "7fdcd953-ff55-4314-ae45-39c1413a6d4a", "DetectTime": "2023-10-30T13:57:34.258088+02:00", "EventTime": "2023-10-30T13:57:34.258107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["C1bsGZ29hZ4Rf8Hyv7"]} -{"Format": "IDEA0", "ID": "153005cd-e398-4b25-ad82-9dd9d1583b4b", "DetectTime": "2023-10-30T13:57:34.296254+02:00", "EventTime": "2023-10-30T13:57:34.296273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["Cc2aJ64ClZ8s51RlRe"]} -{"Format": "IDEA0", "ID": "258a4ec8-5d29-4132-8b03-a1f12db0eb7b", "DetectTime": "2023-10-30T13:57:34.341352+02:00", "EventTime": "2023-10-30T13:57:34.341369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CVmzz54ZJNTLlHTPml"]} -{"Format": "IDEA0", "ID": "b43123be-ae08-4ddc-9fbb-0cd544b2ec34", "DetectTime": "2023-10-30T13:57:34.383291+02:00", "EventTime": "2023-10-30T13:57:34.383307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["C30iRZ1CblwAhCOHEb"]} -{"Format": "IDEA0", "ID": "0b026a5d-13a2-4e75-8398-4cb05c178ac8", "DetectTime": "2023-10-30T13:57:34.426895+02:00", "EventTime": "2023-10-30T13:57:34.426912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CxtN3k1WjYo659Ig9"]} -{"Format": "IDEA0", "ID": "90ebc5cf-b658-4675-ad45-28eb11f15352", "DetectTime": "2023-10-30T13:57:34.467763+02:00", "EventTime": "2023-10-30T13:57:34.467780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CwO5gn4A34QFc7HRQ6"]} -{"Format": "IDEA0", "ID": "670afe1a-9cb4-46ed-bc43-b9b91f753d79", "DetectTime": "2023-10-30T13:57:34.508989+02:00", "EventTime": "2023-10-30T13:57:34.509004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CQhMS33hI19bIxrF1f"]} -{"Format": "IDEA0", "ID": "0f83f8fb-1bf3-4f56-aa4d-919e7b40938b", "DetectTime": "2023-10-30T13:57:34.547232+02:00", "EventTime": "2023-10-30T13:57:34.547250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["ClOzMw1GgpZ8cvFBm2"]} -{"Format": "Json", "ID": "0f83f8fb-1bf3-4f56-aa4d-919e7b40938b", "DetectTime": "2023-10-30T13:57:34.547232+02:00", "EventTime": "2023-10-30T13:57:34.547250+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:25:35.583589+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:34.608747)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45419942-2af9-4b60-8ec4-7192c32ffcb6", "DetectTime": "2023-10-30T13:57:34.614170+02:00", "EventTime": "2023-10-30T13:57:34.614185+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNe1pz2QOh26FwIAk4"]} -{"Format": "IDEA0", "ID": "26d4266c-3f38-41dd-8eac-b7c50a94e972", "DetectTime": "2023-10-30T13:57:34.631355+02:00", "EventTime": "2023-10-30T13:57:34.631371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CsnpHv4ZWK1S3wQea8"]} -{"Format": "IDEA0", "ID": "f3baa37c-6042-4e8f-9fa6-f23c3a446956", "DetectTime": "2023-10-30T13:57:34.673976+02:00", "EventTime": "2023-10-30T13:57:34.673991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CfhP4z3dRZOUss6Vc1"]} -{"Format": "IDEA0", "ID": "5d8947c4-0635-4e6e-a4c5-946c2bf036d0", "DetectTime": "2023-10-30T13:57:34.711576+02:00", "EventTime": "2023-10-30T13:57:34.711594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C16Rp7e0rQtAS6E21", "C4XOVD3hIJjg3dNIwh", "C2lTMR1lJz1qTHJqj5", "C57Rpv2xDRKe7R1Qi2"]} -{"Format": "IDEA0", "ID": "964b7b89-8809-4a6a-b874-d055b01ab8c4", "DetectTime": "2023-10-30T13:57:34.727935+02:00", "EventTime": "2023-10-30T13:57:34.727954+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C2lTMR1lJz1qTHJqj5"]} -{"Format": "IDEA0", "ID": "bf1cd018-4319-41e3-b5f1-e47f92361acf", "DetectTime": "2023-10-30T13:57:34.740786+02:00", "EventTime": "2023-10-30T13:57:34.740802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["C6Mhsg39iPlmzjrgkf"]} -{"Format": "IDEA0", "ID": "b72f343f-e1c8-4dad-8d89-0dfd0de01f0a", "DetectTime": "2023-10-30T13:57:34.781969+02:00", "EventTime": "2023-10-30T13:57:34.781981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CRN9ZV3leWmQPwQD92"]} -{"Format": "IDEA0", "ID": "ca1cd116-403c-4f06-897a-3926fbf7e564", "DetectTime": "2023-10-30T13:57:34.820270+02:00", "EventTime": "2023-10-30T13:57:34.820286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C1Ecqb2vwSOL2Nzbbc"]} -{"Format": "IDEA0", "ID": "4c7188ea-3d13-41e3-bb56-5615452390be", "DetectTime": "2023-10-30T13:57:34.858110+02:00", "EventTime": "2023-10-30T13:57:34.858122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CXMDYN15OSk5oCYhM"]} -{"Format": "IDEA0", "ID": "ef1faa20-0014-408d-b239-20be1ed99ff4", "DetectTime": "2023-10-30T13:57:34.896936+02:00", "EventTime": "2023-10-30T13:57:34.896952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CiJLtD4wIHSgQUcVxb"]} -{"Format": "IDEA0", "ID": "297b083a-79a9-4734-b63b-119ec7a1dd55", "DetectTime": "2023-10-30T13:57:34.938662+02:00", "EventTime": "2023-10-30T13:57:34.938679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cidm222RvxBcdUV7a6"]} -{"Format": "Json", "ID": "297b083a-79a9-4734-b63b-119ec7a1dd55", "DetectTime": "2023-10-30T13:57:34.938662+02:00", "EventTime": "2023-10-30T13:57:34.938679+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:55:59.282338+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:35.002897)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "66b6ca60-870b-4b2f-8612-08dad6e67d0a", "DetectTime": "2023-10-30T13:57:35.008626+02:00", "EventTime": "2023-10-30T13:57:35.008645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CYEYX74V0TsfPC5B12"]} -{"Format": "IDEA0", "ID": "fc1945c5-6d90-4d66-8aab-db3a0346561a", "DetectTime": "2023-10-30T13:57:35.050440+02:00", "EventTime": "2023-10-30T13:57:35.050462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CBJSAd12wgPYB1Mj57"]} -{"Format": "IDEA0", "ID": "b33b5cef-04b3-4cd8-9159-5a4f23614e5b", "DetectTime": "2023-10-30T13:57:35.080685+02:00", "EventTime": "2023-10-30T13:57:35.080700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CXEJFD1K5hfY1E9Vxh"]} -{"Format": "IDEA0", "ID": "61c983ef-49dc-43ef-88f0-c8d79480fe00", "DetectTime": "2023-10-30T13:57:35.114839+02:00", "EventTime": "2023-10-30T13:57:35.114855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. ", "ContentType": "text/plain"}], "uids": ["COiakUEmMmrK599Ng"]} -{"Format": "IDEA0", "ID": "e434b064-c4af-4475-bb9b-8753e2234721", "DetectTime": "2023-10-30T13:57:35.145827+02:00", "EventTime": "2023-10-30T13:57:35.145845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CHnVxv4guAg48rxJqf"]} -{"Format": "IDEA0", "ID": "afcb993c-4a18-4034-becb-245e58537b96", "DetectTime": "2023-10-30T13:57:35.172506+02:00", "EventTime": "2023-10-30T13:57:35.172526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CxsnYg33wucSudLdv5"]} -{"Format": "IDEA0", "ID": "b1c4c859-02e9-45cf-b8a4-36c1ee05e2af", "DetectTime": "2023-10-30T13:57:35.200250+02:00", "EventTime": "2023-10-30T13:57:35.200261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CAaymk2nwWWnS1jeAd"]} -{"Format": "IDEA0", "ID": "b0eee16f-645e-4412-b8a8-bd8765790271", "DetectTime": "2023-10-30T13:57:35.236874+02:00", "EventTime": "2023-10-30T13:57:35.236894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["COv8911oL4p8dVtZP4"]} -{"Format": "Json", "ID": "b0eee16f-645e-4412-b8a8-bd8765790271", "DetectTime": "2023-10-30T13:57:35.236874+02:00", "EventTime": "2023-10-30T13:57:35.236894+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:56:01.289974+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:35.300641)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eea2a1e4-cc48-49e8-a6b2-2e341e5b91a5", "DetectTime": "2023-10-30T13:57:35.305690+02:00", "EventTime": "2023-10-30T13:57:35.305705+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvwVlU1lNGoUycDNz7"]} -{"Format": "IDEA0", "ID": "ec7636d4-068a-4b37-941a-63be3d3bbad5", "DetectTime": "2023-10-30T13:57:35.317867+02:00", "EventTime": "2023-10-30T13:57:35.317883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CfQKaG1oIu0HvWsNp2"]} -{"Format": "IDEA0", "ID": "ab6e0fa2-c172-495e-8956-4cd48e8d6aeb", "DetectTime": "2023-10-30T13:57:35.346534+02:00", "EventTime": "2023-10-30T13:57:35.346546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CIFKGj3Nn49SXmaALc"]} -{"Format": "IDEA0", "ID": "77dd6de9-07df-4a30-b3b6-f9eb84eab9ef", "DetectTime": "2023-10-30T13:57:35.375551+02:00", "EventTime": "2023-10-30T13:57:35.375570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CyCxaL4j1TVMUFXLf"]} -{"Format": "IDEA0", "ID": "1e40c931-e91b-49d0-8624-8793a052339d", "DetectTime": "2023-10-30T13:57:35.404628+02:00", "EventTime": "2023-10-30T13:57:35.404645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CV49Uh1Lmyux16Vp01"]} -{"Format": "IDEA0", "ID": "30cf6fda-5d52-4ed9-9901-e2d60eb8734c", "DetectTime": "2023-10-30T13:57:35.433836+02:00", "EventTime": "2023-10-30T13:57:35.433846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["ClBNqxtHfYsc6QZhl"]} -{"Format": "IDEA0", "ID": "6d13cd02-1a97-4fdd-9993-31a0da9e48f9", "DetectTime": "2023-10-30T13:57:35.466374+02:00", "EventTime": "2023-10-30T13:57:35.466394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CMl1mz3XIjNTRATpf"]} -{"Format": "IDEA0", "ID": "2e511fd7-d907-4724-9d72-70d994865aa9", "DetectTime": "2023-10-30T13:57:35.500728+02:00", "EventTime": "2023-10-30T13:57:35.500748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CHnyPs4fG4k8MEFtF9"]} -{"Format": "IDEA0", "ID": "4920b237-7eec-4d15-a42f-7c80c234389a", "DetectTime": "2023-10-30T13:57:35.531955+02:00", "EventTime": "2023-10-30T13:57:35.531972+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C40JPU232iXfJl6EL7"]} -{"Format": "IDEA0", "ID": "1b00ba03-b3f4-48a4-a322-b8f3067f7510", "DetectTime": "2023-10-30T13:57:35.547090+02:00", "EventTime": "2023-10-30T13:57:35.547106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CenBO41qFRoFkOTb1k"]} -{"Format": "Json", "ID": "1b00ba03-b3f4-48a4-a322-b8f3067f7510", "DetectTime": "2023-10-30T13:57:35.547090+02:00", "EventTime": "2023-10-30T13:57:35.547106+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:56:03.413229+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:35.604815)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a71deac6-c646-46f2-bf44-a0e4e1f0d67b", "DetectTime": "2023-10-30T13:57:35.610739+02:00", "EventTime": "2023-10-30T13:57:35.610756+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClqlXw1dgJbd6au9M8"]} -{"Format": "IDEA0", "ID": "2cab1db1-082d-42c6-9b11-40d5f7b23da4", "DetectTime": "2023-10-30T13:57:35.626278+02:00", "EventTime": "2023-10-30T13:57:35.626294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CRBsjN2vfhWtkRzdC7"]} -{"Format": "IDEA0", "ID": "630c7fb8-7f57-42fa-a1e3-75598233d7ed", "DetectTime": "2023-10-30T13:57:35.654403+02:00", "EventTime": "2023-10-30T13:57:35.654417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["ChnPemJB9WxXl7se2"]} -{"Format": "IDEA0", "ID": "51fecbe8-6986-4f51-abc4-81f1b576710e", "DetectTime": "2023-10-30T13:57:35.683096+02:00", "EventTime": "2023-10-30T13:57:35.683110+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cw3z5X3P3FS5XnaMoj"]} -{"Format": "IDEA0", "ID": "b9e071df-94a9-4d0b-a21f-cb40571ba622", "DetectTime": "2023-10-30T13:57:35.696566+02:00", "EventTime": "2023-10-30T13:57:35.696578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CvXmVMvbIUwLnE4Ja"]} -{"Format": "IDEA0", "ID": "128196c7-6540-41c0-830e-c4be0c64bb6f", "DetectTime": "2023-10-30T13:57:35.722382+02:00", "EventTime": "2023-10-30T13:57:35.722399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CO0NP24oC3XJ0GiBfi"]} -{"Format": "IDEA0", "ID": "92bbd3b9-e951-4f6f-85c0-862149bfb45c", "DetectTime": "2023-10-30T13:57:35.750385+02:00", "EventTime": "2023-10-30T13:57:35.750396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20209], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20209/UDP destination IP 180.253.82.119. ", "ContentType": "text/plain"}], "uids": ["Cr5eDi2WAXsAZ0KyZk"]} -{"Format": "IDEA0", "ID": "4c65106e-ae5e-4447-a1dc-3f8a14c7b9b7", "DetectTime": "2023-10-30T13:57:35.776444+02:00", "EventTime": "2023-10-30T13:57:35.776460+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0Jz2R1Hhn73dtOZQ1"]} -{"Format": "IDEA0", "ID": "fb6b0ad1-0591-4756-8298-51e305d6272d", "DetectTime": "2023-10-30T13:57:35.787773+02:00", "EventTime": "2023-10-30T13:57:35.787793+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CvXqVp39oSYaVY1E2f"]} -{"Format": "IDEA0", "ID": "d3d4ef78-3086-431b-b772-36b21aae76bd", "DetectTime": "2023-10-30T13:57:35.799594+02:00", "EventTime": "2023-10-30T13:57:35.799606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CCSROwXj0KkcSoit5"]} -{"Format": "IDEA0", "ID": "618e5c31-8cab-40ed-b80c-dcd3d525159e", "DetectTime": "2023-10-30T13:57:35.816226+02:00", "EventTime": "2023-10-30T13:57:35.816237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5021], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5021/UDP destination IP 218.90.187.38. ", "ContentType": "text/plain"}], "uids": ["C9iTKccrL7TluPb4d"]} -{"Format": "IDEA0", "ID": "972b57aa-0654-446f-b7b2-c3df5c0b6229", "DetectTime": "2023-10-30T13:57:35.845125+02:00", "EventTime": "2023-10-30T13:57:35.845139+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnFLRD3Xqmg5hj5XOd"]} -{"Format": "IDEA0", "ID": "31ebd4cd-b836-4579-bf96-db60ef94e286", "DetectTime": "2023-10-30T13:57:35.856492+02:00", "EventTime": "2023-10-30T13:57:35.856504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CulxNva2qjHnp0ui6"]} -{"Format": "IDEA0", "ID": "bec86de4-fb10-4b93-bd34-d318f550a72c", "DetectTime": "2023-10-30T13:57:35.884380+02:00", "EventTime": "2023-10-30T13:57:35.884398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cw3z5X3P3FS5XnaMoj", "C40JPU232iXfJl6EL7", "CkfbGZ7H4rheSfrr3", "CvXqVp39oSYaVY1E2f"]} -{"Format": "IDEA0", "ID": "8edff312-a03d-4c53-b96b-dc7194bae2d2", "DetectTime": "2023-10-30T13:57:35.896141+02:00", "EventTime": "2023-10-30T13:57:35.896154+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CkfbGZ7H4rheSfrr3"]} -{"Format": "IDEA0", "ID": "d12ecffd-55de-411d-ae70-8916f75f73e0", "DetectTime": "2023-10-30T13:57:35.907538+02:00", "EventTime": "2023-10-30T13:57:35.907549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["CHv6Ax1TQigQYq9kCl"]} -{"Format": "Json", "ID": "d12ecffd-55de-411d-ae70-8916f75f73e0", "DetectTime": "2023-10-30T13:57:35.907538+02:00", "EventTime": "2023-10-30T13:57:35.907549+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:58:44.767543+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:35.955526)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7630c6c9-d9fd-420b-8e07-653b3b1c73a8", "DetectTime": "2023-10-30T13:57:35.961729+02:00", "EventTime": "2023-10-30T13:57:35.961749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. ", "ContentType": "text/plain"}], "uids": ["CiLztw2EHSCIHmbhN6"]} -{"Format": "IDEA0", "ID": "f9763769-d742-4e80-8dde-618b88095cd9", "DetectTime": "2023-10-30T13:57:36.079742+02:00", "EventTime": "2023-10-30T13:57:36.079766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CfVbBlOxrLPyTNQm7"]} -{"Format": "IDEA0", "ID": "eaa5527d-be51-4821-af6e-477f170e9e9b", "DetectTime": "2023-10-30T13:57:36.112827+02:00", "EventTime": "2023-10-30T13:57:36.112844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8825], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. ", "ContentType": "text/plain"}], "uids": ["C2H2Dq2wOaTK26xIv9"]} -{"Format": "IDEA0", "ID": "d01d55a0-5f08-4d3a-8dc5-4c2be411b7d2", "DetectTime": "2023-10-30T13:57:36.142843+02:00", "EventTime": "2023-10-30T13:57:36.142863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. ", "ContentType": "text/plain"}], "uids": ["C33LKW1Cn3BmNF34dk"]} -{"Format": "IDEA0", "ID": "c824fdbc-f041-4012-9d99-5bec4a130c08", "DetectTime": "2023-10-30T13:57:36.170599+02:00", "EventTime": "2023-10-30T13:57:36.170625+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMysYf1dl3KI6U4Fgg"]} -{"Format": "IDEA0", "ID": "094b6d19-7fb4-45f0-bca5-b197c64fea02", "DetectTime": "2023-10-30T13:57:36.185759+02:00", "EventTime": "2023-10-30T13:57:36.185778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["COOBvL356v4F7mkCu9"]} -{"Format": "IDEA0", "ID": "25aaefd6-21ef-46e0-88a4-a5ce845c5c30", "DetectTime": "2023-10-30T13:57:36.215516+02:00", "EventTime": "2023-10-30T13:57:36.215530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["CaeLiD1Y8fd1fkB0Ab"]} -{"Format": "IDEA0", "ID": "e5e02664-cd3d-440b-b175-f58226d60d1b", "DetectTime": "2023-10-30T13:57:36.244607+02:00", "EventTime": "2023-10-30T13:57:36.244623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22233/UDP destination IP 190.235.27.151. ", "ContentType": "text/plain"}], "uids": ["CbxvU12Zgt1arX0Wq2"]} -{"Format": "IDEA0", "ID": "f4fbac60-4b16-4a27-a3ad-6d459451166b", "DetectTime": "2023-10-30T13:57:36.272975+02:00", "EventTime": "2023-10-30T13:57:36.272992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. ", "ContentType": "text/plain"}], "uids": ["CrWHIg3VVBftey8E8e"]} -{"Format": "Json", "ID": "f4fbac60-4b16-4a27-a3ad-6d459451166b", "DetectTime": "2023-10-30T13:57:36.272975+02:00", "EventTime": "2023-10-30T13:57:36.272992+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26966], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:58:55.292584+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:36.323208)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e2258791-4f72-4683-9f94-349e74bd6e24", "DetectTime": "2023-10-30T13:57:36.328691+02:00", "EventTime": "2023-10-30T13:57:36.328708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15547], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15547/UDP destination IP 1.4.129.61. ", "ContentType": "text/plain"}], "uids": ["CM0vFL3FP3yg3ItpXa"]} -{"Format": "IDEA0", "ID": "1bdd2c81-86ca-4ea7-9649-1d1e4d0836fb", "DetectTime": "2023-10-30T13:57:36.357931+02:00", "EventTime": "2023-10-30T13:57:36.357953+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cw7LBq2Thly7D9E6z6"]} -{"Format": "IDEA0", "ID": "5b8e6fae-b8e4-4e58-ad94-5910a7514924", "DetectTime": "2023-10-30T13:57:36.373568+02:00", "EventTime": "2023-10-30T13:57:36.373590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29634], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29634/UDP destination IP 113.165.116.48. ", "ContentType": "text/plain"}], "uids": ["CBEWLn3LN6cUvHmJBh"]} -{"Format": "IDEA0", "ID": "ecd7b457-1f46-48a0-81f1-10dcf3a8a102", "DetectTime": "2023-10-30T13:57:36.402804+02:00", "EventTime": "2023-10-30T13:57:36.402821+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4B5I31bUdF9lU2SIc"]} -{"Format": "IDEA0", "ID": "9f676848-67de-4c9a-9449-1025c1909b8f", "DetectTime": "2023-10-30T13:57:36.416939+02:00", "EventTime": "2023-10-30T13:57:36.416955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25875], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25875/UDP destination IP 41.251.185.113. ", "ContentType": "text/plain"}], "uids": ["CFIeSaCKmsGmIQB6a"]} -{"Format": "IDEA0", "ID": "500d5f7f-cd73-4fb8-be10-d1fb5d4ea38d", "DetectTime": "2023-10-30T13:57:36.444937+02:00", "EventTime": "2023-10-30T13:57:36.444953+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CbrFlh30GqDsce0fa"]} -{"Format": "IDEA0", "ID": "de1df833-595d-464e-8a25-9794caa338ec", "DetectTime": "2023-10-30T13:57:36.459190+02:00", "EventTime": "2023-10-30T13:57:36.459210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. ", "ContentType": "text/plain"}], "uids": ["CkHdTv1LTFyL6TeIci"]} -{"Format": "IDEA0", "ID": "962dd26b-3087-4952-9b6f-70404b15dcdc", "DetectTime": "2023-10-30T13:57:36.483839+02:00", "EventTime": "2023-10-30T13:57:36.483856+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8xHrb3Tmtbdz1e3Rh"]} -{"Format": "IDEA0", "ID": "a713e322-81a6-4484-b1ae-b672af4306f3", "DetectTime": "2023-10-30T13:57:36.499409+02:00", "EventTime": "2023-10-30T13:57:36.499425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["CGMfM34uBg9QuXFrJe"]} -{"Format": "IDEA0", "ID": "cd15291b-c181-40e7-95c7-deee9d3df415", "DetectTime": "2023-10-30T13:57:36.526920+02:00", "EventTime": "2023-10-30T13:57:36.526939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cs0rfO3MaY1t6UPms"]} -{"Format": "IDEA0", "ID": "2de8ffbb-24da-4489-a465-4f156446278c", "DetectTime": "2023-10-30T13:57:36.543573+02:00", "EventTime": "2023-10-30T13:57:36.543593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. ", "ContentType": "text/plain"}], "uids": ["Cx33x51RpZCHZDkHM7"]} -{"Format": "IDEA0", "ID": "2770f881-bf29-426f-b658-52b2644785d9", "DetectTime": "2023-10-30T13:57:36.568932+02:00", "EventTime": "2023-10-30T13:57:36.568947+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIm8Q44xaqQLeauka7"]} -{"Format": "IDEA0", "ID": "ae6deb56-47cb-4dbd-b602-9b34c7a983e2", "DetectTime": "2023-10-30T13:57:36.583182+02:00", "EventTime": "2023-10-30T13:57:36.583198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CkA16o2mzDDlWFql5j"]} -{"Format": "IDEA0", "ID": "32a81b6e-61d2-4594-8ceb-518554ca3e63", "DetectTime": "2023-10-30T13:57:36.608395+02:00", "EventTime": "2023-10-30T13:57:36.608410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["Ca9gQA1pmBESfYnmt4"]} -{"Format": "Json", "ID": "32a81b6e-61d2-4594-8ceb-518554ca3e63", "DetectTime": "2023-10-30T13:57:36.608395+02:00", "EventTime": "2023-10-30T13:57:36.608410+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T07:59:54.911724+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2023/10/30 13:57:36.662870)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "844324e7-aa71-4717-b694-62ccb7d46cdd", "DetectTime": "2023-10-30T13:57:36.668579+02:00", "EventTime": "2023-10-30T13:57:36.668597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CW0yAB1pdA5nRRPP7", "Cw7LBq2Thly7D9E6z6", "Cs0rfO3MaY1t6UPms", "CbrFlh30GqDsce0fa"]} -{"Format": "IDEA0", "ID": "2dd36c90-ea99-4f6e-acc8-c1e1256fd4ff", "DetectTime": "2023-10-30T13:57:36.690593+02:00", "EventTime": "2023-10-30T13:57:36.690611+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CW0yAB1pdA5nRRPP7"]} -{"Format": "IDEA0", "ID": "6f7e2ec0-49b1-463f-b90d-a5e658e7c543", "DetectTime": "2023-10-30T13:57:36.704351+02:00", "EventTime": "2023-10-30T13:57:36.704367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CX9yja3L4CC4X58Lzl"]} -{"Format": "IDEA0", "ID": "98566eb1-dd07-483e-aafa-8d293bb57015", "DetectTime": "2023-10-30T13:57:36.725565+02:00", "EventTime": "2023-10-30T13:57:36.725581+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cvf6wn46UQfiXjjJ6i"]} -{"Format": "IDEA0", "ID": "f8cf54d7-9302-48e2-8425-03aafd67892f", "DetectTime": "2023-10-30T13:57:36.739177+02:00", "EventTime": "2023-10-30T13:57:36.739193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["CeC7eK3yxUa9uzPtg4"]} -{"Format": "IDEA0", "ID": "85b5627a-1f6d-40af-b248-b6debcb07363", "DetectTime": "2023-10-30T13:57:36.782441+02:00", "EventTime": "2023-10-30T13:57:36.782458+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CZowYF1pCLJ9X3l123"]} -{"Format": "IDEA0", "ID": "d8a04d92-3af7-4472-b8f0-71dd302bc4b8", "DetectTime": "2023-10-30T13:57:36.796367+02:00", "EventTime": "2023-10-30T13:57:36.796378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18028], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18028/UDP destination IP 180.244.107.44. ", "ContentType": "text/plain"}], "uids": ["CDaRt74Cib7cnHViI3"]} -{"Format": "IDEA0", "ID": "eb799303-589d-482f-9073-d061c9b7a3a5", "DetectTime": "2023-10-30T13:57:36.835922+02:00", "EventTime": "2023-10-30T13:57:36.835938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["C9Z5rc150ubmbuxu73"]} -{"Format": "IDEA0", "ID": "b9ea948d-2eb9-4224-9431-332222456de2", "DetectTime": "2023-10-30T13:57:36.874675+02:00", "EventTime": "2023-10-30T13:57:36.874688+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI5eh342RLvtEYbb52"]} -{"Format": "IDEA0", "ID": "f790dee9-4748-49b7-98d2-fe640e3cd54f", "DetectTime": "2023-10-30T13:57:36.890061+02:00", "EventTime": "2023-10-30T13:57:36.890086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["CMM33k2hWxzEvM17Y6"]} -{"Format": "IDEA0", "ID": "4706eb04-0e35-45b4-9304-336b2d9f5437", "DetectTime": "2023-10-30T13:57:36.929947+02:00", "EventTime": "2023-10-30T13:57:36.929966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7773], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7773/UDP destination IP 200.119.190.39. ", "ContentType": "text/plain"}], "uids": ["CbcSX52yM34VLdNi1g"]} -{"Format": "IDEA0", "ID": "f4169d9f-8632-4fd4-be25-1b5b77cd881d", "DetectTime": "2023-10-30T13:57:36.969590+02:00", "EventTime": "2023-10-30T13:57:36.969609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["CCPyIp4WkVmGI5o1Zi"]} -{"Format": "IDEA0", "ID": "eb3f0b6d-c8f3-4b0e-83c7-8424b6b3adba", "DetectTime": "2023-10-30T13:57:37.006983+02:00", "EventTime": "2023-10-30T13:57:37.007002+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CQjKrH2bEqoOUDPa1f"]} -{"Format": "IDEA0", "ID": "6db61fa2-7f1a-4593-b94e-168b5f172ffc", "DetectTime": "2023-10-30T13:57:37.021157+02:00", "EventTime": "2023-10-30T13:57:37.021171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28933], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28933/UDP destination IP 103.1.28.117. ", "ContentType": "text/plain"}], "uids": ["CY9Qyvw6r5tlOvPl"]} -{"Format": "Json", "ID": "6db61fa2-7f1a-4593-b94e-168b5f172ffc", "DetectTime": "2023-10-30T13:57:37.021157+02:00", "EventTime": "2023-10-30T13:57:37.021171+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28933], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:01:03.512608+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:37.096581)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3156c18f-52b8-458f-9ca2-c903a02cef3d", "DetectTime": "2023-10-30T13:57:37.101661+02:00", "EventTime": "2023-10-30T13:57:37.101676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["CJbwPc3wDFawtykOFd"]} -{"Format": "IDEA0", "ID": "bb0c334b-1e94-4a64-98c6-8974a71f9d25", "DetectTime": "2023-10-30T13:57:37.137976+02:00", "EventTime": "2023-10-30T13:57:37.137995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16748], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. ", "ContentType": "text/plain"}], "uids": ["CGu9cY20ierkI2SeN3"]} -{"Format": "IDEA0", "ID": "466f8590-d3b4-4f18-893f-0f6d95abdb66", "DetectTime": "2023-10-30T13:57:37.171128+02:00", "EventTime": "2023-10-30T13:57:37.171140+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP9voL1HYD3B2mM071"]} -{"Format": "IDEA0", "ID": "3363f88c-5ebb-4abc-b345-a0343f5b5117", "DetectTime": "2023-10-30T13:57:37.185732+02:00", "EventTime": "2023-10-30T13:57:37.185748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Cdh5w92ojkB8F6ZI7k"]} -{"Format": "IDEA0", "ID": "8bfbc4bf-d03c-4dab-82b7-cdd9fb0d3290", "DetectTime": "2023-10-30T13:57:37.222167+02:00", "EventTime": "2023-10-30T13:57:37.222183+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CArOAX3l7I40b6HW2h"]} -{"Format": "IDEA0", "ID": "80f8a53f-6af8-485c-a80d-1bb97353dce1", "DetectTime": "2023-10-30T13:57:37.234618+02:00", "EventTime": "2023-10-30T13:57:37.234635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CXI8RMTkavDbu7kVi"]} -{"Format": "IDEA0", "ID": "774d16fb-28dd-484b-87e3-c70d129ea946", "DetectTime": "2023-10-30T13:57:37.272480+02:00", "EventTime": "2023-10-30T13:57:37.272503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["C8dDJkzzAXlKO34dd"]} -{"Format": "IDEA0", "ID": "e304614d-1a5b-498d-a5e2-77c60fe9fcf1", "DetectTime": "2023-10-30T13:57:37.312415+02:00", "EventTime": "2023-10-30T13:57:37.312427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CSgIwx4X1OOgfL7mE4"]} -{"Format": "IDEA0", "ID": "90775c0e-1531-459e-a779-bc81ba583a37", "DetectTime": "2023-10-30T13:57:37.348152+02:00", "EventTime": "2023-10-30T13:57:37.348168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CzykXW1DGYlb6FhDHa"]} -{"Format": "IDEA0", "ID": "97ee07b0-db88-42de-9900-bca8fc4b705c", "DetectTime": "2023-10-30T13:57:37.390961+02:00", "EventTime": "2023-10-30T13:57:37.390977+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdWen14PSuzPzuLwNb"]} -{"Format": "IDEA0", "ID": "6abe1023-24b2-480b-a467-11829a059dd2", "DetectTime": "2023-10-30T13:57:37.401390+02:00", "EventTime": "2023-10-30T13:57:37.401409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CJFczr310T5PyxEON6"]} -{"Format": "Json", "ID": "6abe1023-24b2-480b-a467-11829a059dd2", "DetectTime": "2023-10-30T13:57:37.401390+02:00", "EventTime": "2023-10-30T13:57:37.401409+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:31:42.761565+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:37.463453)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3bbd607c-b790-4ffa-94dd-ea7ff3ed6835", "DetectTime": "2023-10-30T13:57:37.470650+02:00", "EventTime": "2023-10-30T13:57:37.470801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CpfFLH2KmdjVl4Rn6b"]} -{"Format": "IDEA0", "ID": "1843514d-a925-4b9a-8463-21b24252286f", "DetectTime": "2023-10-30T13:57:37.506904+02:00", "EventTime": "2023-10-30T13:57:37.506923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQjKrH2bEqoOUDPa1f", "CArOAX3l7I40b6HW2h", "Cv6XbswwkgkLYWiD7", "CZowYF1pCLJ9X3l123"]} -{"Format": "IDEA0", "ID": "213b4b80-cf4d-409d-8507-91a602ce6966", "DetectTime": "2023-10-30T13:57:37.520734+02:00", "EventTime": "2023-10-30T13:57:37.520751+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cv6XbswwkgkLYWiD7"]} -{"Format": "IDEA0", "ID": "5a3287e6-ae15-4a12-bc81-17a1ef868656", "DetectTime": "2023-10-30T13:57:37.533554+02:00", "EventTime": "2023-10-30T13:57:37.533579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CbSgX14k88yBbXWPff"]} -{"Format": "IDEA0", "ID": "6066c993-a214-45be-8a80-1c418e288359", "DetectTime": "2023-10-30T13:57:37.572004+02:00", "EventTime": "2023-10-30T13:57:37.572017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CZSyDv2FwRarPAZ9J8"]} -{"Format": "IDEA0", "ID": "f9a180fc-a7b0-42ca-9370-7ea710310a05", "DetectTime": "2023-10-30T13:57:37.603078+02:00", "EventTime": "2023-10-30T13:57:37.603098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["C4vkzA3Kurpy8SfFb8"]} -{"Format": "IDEA0", "ID": "8774099c-4f95-40e5-9286-1add7af5baca", "DetectTime": "2023-10-30T13:57:37.637178+02:00", "EventTime": "2023-10-30T13:57:37.637198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CLDfQA1NB0M65LNwll"]} -{"Format": "IDEA0", "ID": "f4a41efa-90f1-4f7e-b142-063d59c102b0", "DetectTime": "2023-10-30T13:57:37.671061+02:00", "EventTime": "2023-10-30T13:57:37.671080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CBDWdzuPqyRMHnNVc"]} -{"Format": "IDEA0", "ID": "fe7c68ec-2c1d-4d89-980e-0aaa623f46f0", "DetectTime": "2023-10-30T13:57:37.702167+02:00", "EventTime": "2023-10-30T13:57:37.702183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["Cpppby29uCEHBmyeqg"]} -{"Format": "IDEA0", "ID": "804ff719-a43f-478f-a063-c9f9b7752881", "DetectTime": "2023-10-30T13:57:37.744317+02:00", "EventTime": "2023-10-30T13:57:37.744333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C3oJ8AEOuFzp1uVij"]} -{"Format": "Json", "ID": "804ff719-a43f-478f-a063-c9f9b7752881", "DetectTime": "2023-10-30T13:57:37.744317+02:00", "EventTime": "2023-10-30T13:57:37.744333+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:31:45.092744+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:37.806105)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fcadbc48-b07c-47f7-9d34-1753c9a5364d", "DetectTime": "2023-10-30T13:57:37.812346+02:00", "EventTime": "2023-10-30T13:57:37.812364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CsnGIV31x6N7ysf2Ik"]} -{"Format": "IDEA0", "ID": "1d29bce6-2436-4fd0-8065-0b472f8ba456", "DetectTime": "2023-10-30T13:57:37.838659+02:00", "EventTime": "2023-10-30T13:57:37.838681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["C0ohPP2tESGEYaEm3"]} -{"Format": "IDEA0", "ID": "79a08a0a-8a90-4cb1-9b0a-72018e19dff9", "DetectTime": "2023-10-30T13:57:37.866662+02:00", "EventTime": "2023-10-30T13:57:37.866682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CHmGkq3xim4WKyExe5"]} -{"Format": "IDEA0", "ID": "b20e44d8-9397-4ad7-b5f3-918d2bbd14fb", "DetectTime": "2023-10-30T13:57:37.896672+02:00", "EventTime": "2023-10-30T13:57:37.896692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["C8x89M0Eg5EOYCDBa"]} -{"Format": "IDEA0", "ID": "4900443e-94ab-421b-a153-4917e857de08", "DetectTime": "2023-10-30T13:57:37.929939+02:00", "EventTime": "2023-10-30T13:57:37.929955+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxZBbC3h0XkB5UMjg9"]} -{"Format": "IDEA0", "ID": "c8dde621-15de-45be-806a-29f5f0989479", "DetectTime": "2023-10-30T13:57:37.943193+02:00", "EventTime": "2023-10-30T13:57:37.943204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CQXMGx3wqwDXXOBIa7"]} -{"Format": "IDEA0", "ID": "1379831a-1070-43f0-b7fc-279622ac6be4", "DetectTime": "2023-10-30T13:57:37.972311+02:00", "EventTime": "2023-10-30T13:57:37.972327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CLUBHBTsjV9fpCyW"]} -{"Format": "IDEA0", "ID": "fffa58f8-cba7-4186-a78a-9bfeeb4eaa38", "DetectTime": "2023-10-30T13:57:37.999814+02:00", "EventTime": "2023-10-30T13:57:37.999825+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cb3wAS3ZBBtXI1sd0d"]} -{"Format": "IDEA0", "ID": "6d21d63b-2ee0-40c6-b6ea-a31689f18cf7", "DetectTime": "2023-10-30T13:57:38.012178+02:00", "EventTime": "2023-10-30T13:57:38.012191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CLTQ1LVLqdGAxnI64"]} -{"Format": "IDEA0", "ID": "f15dee7a-af44-4bd6-98f5-6564b18239b1", "DetectTime": "2023-10-30T13:57:38.040123+02:00", "EventTime": "2023-10-30T13:57:38.040141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C8yDvEJXawrSwmT2a"]} -{"Format": "IDEA0", "ID": "7a76b606-d9dd-4368-8c81-83db4b7a4b71", "DetectTime": "2023-10-30T13:57:38.067819+02:00", "EventTime": "2023-10-30T13:57:38.067829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CUOK0a2LfT4eX3BDxc"]} -{"Format": "Json", "ID": "7a76b606-d9dd-4368-8c81-83db4b7a4b71", "DetectTime": "2023-10-30T13:57:38.067819+02:00", "EventTime": "2023-10-30T13:57:38.067829+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:31:46.868099+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:38.114472)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fd259d3c-c552-45b4-bf2e-aed1d75c3d4b", "DetectTime": "2023-10-30T13:57:38.119778+02:00", "EventTime": "2023-10-30T13:57:38.119793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5021], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5021/UDP destination IP 218.90.187.38. ", "ContentType": "text/plain"}], "uids": ["C8n0o11cEnZLYR9oM1"]} -{"Format": "IDEA0", "ID": "44a84c29-ea91-4757-b294-3c14a5f46b05", "DetectTime": "2023-10-30T13:57:38.148369+02:00", "EventTime": "2023-10-30T13:57:38.148384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CjkjNmvWoHZQlGLX4"]} -{"Format": "IDEA0", "ID": "2c1c957e-0e35-49b9-8b1e-9f9484f6636b", "DetectTime": "2023-10-30T13:57:38.179991+02:00", "EventTime": "2023-10-30T13:57:38.180010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["CsvGtu23tXl9O4wAA4"]} -{"Format": "IDEA0", "ID": "3029734f-903f-4ec4-aa6b-931c55e6d05d", "DetectTime": "2023-10-30T13:57:38.209103+02:00", "EventTime": "2023-10-30T13:57:38.209118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. ", "ContentType": "text/plain"}], "uids": ["CY0Z3O2BBDedAPkaqa"]} -{"Format": "IDEA0", "ID": "7a5b47b3-7ed0-4ad3-b4c3-36c90d045de6", "DetectTime": "2023-10-30T13:57:38.233561+02:00", "EventTime": "2023-10-30T13:57:38.233582+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRtSOl1cfW2f5bF605"]} -{"Format": "IDEA0", "ID": "dfb43067-664e-4b47-873a-ce34c3df80f4", "DetectTime": "2023-10-30T13:57:38.246834+02:00", "EventTime": "2023-10-30T13:57:38.246849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8825], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. ", "ContentType": "text/plain"}], "uids": ["CJbMKv2Th7SlwnLxV"]} -{"Format": "IDEA0", "ID": "872aa64f-6f24-473d-8f72-4900fed8a94b", "DetectTime": "2023-10-30T13:57:38.273474+02:00", "EventTime": "2023-10-30T13:57:38.273490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CJFKUowTKycPO75D7"]} -{"Format": "IDEA0", "ID": "fae408dd-359d-4da6-8bf3-cbdbdd99aaff", "DetectTime": "2023-10-30T13:57:38.302427+02:00", "EventTime": "2023-10-30T13:57:38.302443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. ", "ContentType": "text/plain"}], "uids": ["C1KA6q22ALYNPnXLPg"]} -{"Format": "IDEA0", "ID": "ffd008f7-bcd0-42c9-86ce-fd30f079f24f", "DetectTime": "2023-10-30T13:57:38.323649+02:00", "EventTime": "2023-10-30T13:57:38.323666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["CFvSc23gKbAUG1YgPc"]} -{"Format": "Json", "ID": "ffd008f7-bcd0-42c9-86ce-fd30f079f24f", "DetectTime": "2023-10-30T13:57:38.323649+02:00", "EventTime": "2023-10-30T13:57:38.323666+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:32:07.031538+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:38.375810)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9d0c672f-9177-4b8f-b395-59ccad26784e", "DetectTime": "2023-10-30T13:57:38.381161+02:00", "EventTime": "2023-10-30T13:57:38.381176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["CM04Z22UlOO0InPog9"]} -{"Format": "IDEA0", "ID": "54ce5f9a-c22f-4d67-8d75-feefcabc21c7", "DetectTime": "2023-10-30T13:57:38.406669+02:00", "EventTime": "2023-10-30T13:57:38.406681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22233/UDP destination IP 190.235.27.151. ", "ContentType": "text/plain"}], "uids": ["Cp499O3henZsBoucbh"]} -{"Format": "IDEA0", "ID": "26aade80-8a69-46d7-b931-10d215a32b37", "DetectTime": "2023-10-30T13:57:38.431537+02:00", "EventTime": "2023-10-30T13:57:38.431554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15547], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15547/UDP destination IP 1.4.129.61. ", "ContentType": "text/plain"}], "uids": ["CDsnTo2JoLKqVoa8Kf"]} -{"Format": "IDEA0", "ID": "d1269580-92b1-4407-8a58-edce7b55d5c8", "DetectTime": "2023-10-30T13:57:38.456360+02:00", "EventTime": "2023-10-30T13:57:38.456376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. ", "ContentType": "text/plain"}], "uids": ["CCaWEK3sLzndPRh2B3"]} -{"Format": "IDEA0", "ID": "4ea423b9-27f9-40be-bd6e-37b119851b28", "DetectTime": "2023-10-30T13:57:38.478045+02:00", "EventTime": "2023-10-30T13:57:38.478062+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CtB9yK2HmuwbnBHnB7"]} -{"Format": "IDEA0", "ID": "65a2c563-94e8-4319-b58b-41f2fcbc5262", "DetectTime": "2023-10-30T13:57:38.487971+02:00", "EventTime": "2023-10-30T13:57:38.487987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29634], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29634/UDP destination IP 113.165.116.48. ", "ContentType": "text/plain"}], "uids": ["CQj3Ns1X6rF2qL5mUc"]} -{"Format": "IDEA0", "ID": "d9018917-f05e-406a-91a2-66741ad3333b", "DetectTime": "2023-10-30T13:57:38.506728+02:00", "EventTime": "2023-10-30T13:57:38.506745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. ", "ContentType": "text/plain"}], "uids": ["C5WsGC2E9cgNUy9Sa7"]} -{"Format": "IDEA0", "ID": "07846e93-e008-4b5f-a626-a869c9695937", "DetectTime": "2023-10-30T13:57:38.529309+02:00", "EventTime": "2023-10-30T13:57:38.529327+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaxL8ZrTxINd0hbw9"]} -{"Format": "IDEA0", "ID": "b623ac45-e006-4e94-af65-4981453da997", "DetectTime": "2023-10-30T13:57:38.541029+02:00", "EventTime": "2023-10-30T13:57:38.541043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["C1n85vn8NtCcQqNuf"]} -{"Format": "IDEA0", "ID": "04abe78f-1dbc-4dac-9df7-792ae21723bc", "DetectTime": "2023-10-30T13:57:38.568270+02:00", "EventTime": "2023-10-30T13:57:38.568291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. ", "ContentType": "text/plain"}], "uids": ["CnNuvymxVg9yy9L12"]} -{"Format": "Json", "ID": "04abe78f-1dbc-4dac-9df7-792ae21723bc", "DetectTime": "2023-10-30T13:57:38.568270+02:00", "EventTime": "2023-10-30T13:57:38.568291+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:32:10.751653+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:38.616580)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "20d43c82-ab70-42b8-8352-5d6210e26c8f", "DetectTime": "2023-10-30T13:57:38.622311+02:00", "EventTime": "2023-10-30T13:57:38.622327+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CLsgZC2nCplIlOswl2"]} -{"Format": "IDEA0", "ID": "bf2f3a47-310d-4bad-9c5b-0f6efeb4310d", "DetectTime": "2023-10-30T13:57:38.634289+02:00", "EventTime": "2023-10-30T13:57:38.634305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["CadWLpp9jo7uIS0R5"]} -{"Format": "IDEA0", "ID": "69f39895-0282-4ef1-bce3-6db4ebbe0cc8", "DetectTime": "2023-10-30T13:57:38.653473+02:00", "EventTime": "2023-10-30T13:57:38.653489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["C87xQl3uUc4EpwaGP8"]} -{"Format": "IDEA0", "ID": "c9fb90c9-1cc1-43ec-a7e6-be5745e482d8", "DetectTime": "2023-10-30T13:57:38.675903+02:00", "EventTime": "2023-10-30T13:57:38.675919+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cydb0u2LdPjzbn2ZGa"]} -{"Format": "IDEA0", "ID": "186ba937-5edf-49f0-808b-74b2392aff4e", "DetectTime": "2023-10-30T13:57:38.688745+02:00", "EventTime": "2023-10-30T13:57:38.688759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CTP9kS3oJTTUbKxzp7"]} -{"Format": "IDEA0", "ID": "32e7e990-a176-4a15-951f-fe06fb9f4474", "DetectTime": "2023-10-30T13:57:38.709135+02:00", "EventTime": "2023-10-30T13:57:38.709152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["CyYflW2JXYA5yJmuX4"]} -{"Format": "IDEA0", "ID": "b7b93f3c-4ed4-4fac-b91b-d1b1134c4005", "DetectTime": "2023-10-30T13:57:38.729059+02:00", "EventTime": "2023-10-30T13:57:38.729071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CtB9yK2HmuwbnBHnB7", "CLsgZC2nCplIlOswl2", "C2n26a3a6dXSb4P2xb", "Cb3wAS3ZBBtXI1sd0d"]} -{"Format": "IDEA0", "ID": "e2ed8c9f-4abb-44b8-bf03-49b4558516fc", "DetectTime": "2023-10-30T13:57:38.739239+02:00", "EventTime": "2023-10-30T13:57:38.739257+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C2n26a3a6dXSb4P2xb"]} -{"Format": "IDEA0", "ID": "9f67f2ab-cd54-48e4-bae3-e8fe820fad3d", "DetectTime": "2023-10-30T13:57:38.751818+02:00", "EventTime": "2023-10-30T13:57:38.751833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["Cru35fhQa7a6RZ6i9"]} -{"Format": "IDEA0", "ID": "8192eab6-7907-457b-8466-8cacd90a2b7f", "DetectTime": "2023-10-30T13:57:38.775500+02:00", "EventTime": "2023-10-30T13:57:38.775517+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTkESL2zdhg0OdSfqf"]} -{"Format": "IDEA0", "ID": "32a1d2dd-7119-4fad-8e22-9b99ea1c6235", "DetectTime": "2023-10-30T13:57:38.786859+02:00", "EventTime": "2023-10-30T13:57:38.786877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["CnTVZA1JAzjogNcNpi"]} -{"Format": "IDEA0", "ID": "577fff0c-b17d-4c43-96b8-db372046596f", "DetectTime": "2023-10-30T13:57:38.808048+02:00", "EventTime": "2023-10-30T13:57:38.808064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7773], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7773/UDP destination IP 200.119.190.39. ", "ContentType": "text/plain"}], "uids": ["Cho9cV1dlgAiipTygh"]} -{"Format": "IDEA0", "ID": "7b3e730c-6c1a-414e-941b-86481bd74d6a", "DetectTime": "2023-10-30T13:57:38.827934+02:00", "EventTime": "2023-10-30T13:57:38.827951+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C0GrPLp77WBac8YNf"]} -{"Format": "IDEA0", "ID": "d0e7cc43-7dab-4aeb-831f-34d0ef7cf111", "DetectTime": "2023-10-30T13:57:38.842343+02:00", "EventTime": "2023-10-30T13:57:38.842357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["CbI2Ce2MTgEHXsUrx1"]} -{"Format": "Json", "ID": "d0e7cc43-7dab-4aeb-831f-34d0ef7cf111", "DetectTime": "2023-10-30T13:57:38.842343+02:00", "EventTime": "2023-10-30T13:57:38.842357+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T08:32:31.801577+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2023/10/30 13:57:38.885608)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2510b293-d832-4527-a0f4-67d76166df6c", "DetectTime": "2023-10-30T13:57:38.891116+02:00", "EventTime": "2023-10-30T13:57:38.891135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["CGYyhiGM1JxkmPMZd"]} -{"Format": "IDEA0", "ID": "fd6c5847-7cb4-43fc-9687-c681250c96e7", "DetectTime": "2023-10-30T13:57:38.910519+02:00", "EventTime": "2023-10-30T13:57:38.910535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16748], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. ", "ContentType": "text/plain"}], "uids": ["COPq4n2fZgnh9TP6O2"]} -{"Format": "IDEA0", "ID": "c12da96d-93eb-4caf-8c61-84675d245f95", "DetectTime": "2023-10-30T13:57:38.930277+02:00", "EventTime": "2023-10-30T13:57:38.930294+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFg9JS2DuYTv8cJsC1"]} -{"Format": "IDEA0", "ID": "e88db088-b7d9-4d32-8675-f9df2270d01d", "DetectTime": "2023-10-30T13:57:38.943286+02:00", "EventTime": "2023-10-30T13:57:38.943302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CHcHq83z7Tjpnpnpoh"]} -{"Format": "IDEA0", "ID": "00a48952-cb7b-4a51-a943-95fdaee5a176", "DetectTime": "2023-10-30T13:57:38.961772+02:00", "EventTime": "2023-10-30T13:57:38.961794+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C2r7QW38sDwyL35dRf"]} -{"Format": "IDEA0", "ID": "67cf9104-4660-4f15-93ff-21788f32dc5e", "DetectTime": "2023-10-30T13:57:38.976346+02:00", "EventTime": "2023-10-30T13:57:38.976363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CarsJP209uqJkt9vI8"]} -{"Format": "IDEA0", "ID": "5fb38309-5a99-4bbd-b1f4-23ff7435dd1f", "DetectTime": "2023-10-30T13:57:39.028238+02:00", "EventTime": "2023-10-30T13:57:39.028251+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIRxsx4oTSjg9agzM"]} -{"Format": "IDEA0", "ID": "a9f2efba-009b-464e-8d1a-cf61f7279b67", "DetectTime": "2023-10-30T13:57:39.040593+02:00", "EventTime": "2023-10-30T13:57:39.040613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CRJBN019ay2NP7n5Rl"]} -{"Format": "IDEA0", "ID": "fa2e1f06-9765-4942-be84-0506407ddc4b", "DetectTime": "2023-10-30T13:57:39.096474+02:00", "EventTime": "2023-10-30T13:57:39.096499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CavFz330bpqwloSt2d"]} -{"Format": "IDEA0", "ID": "02592708-8ba9-4e90-8227-28450c4c7aa2", "DetectTime": "2023-10-30T13:57:39.146394+02:00", "EventTime": "2023-10-30T13:57:39.146406+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C9y9I22JtyVV3nvLlb"]} -{"Format": "IDEA0", "ID": "88fdb95b-05d7-43f2-b94f-d878a776eff0", "DetectTime": "2023-10-30T13:57:39.157844+02:00", "EventTime": "2023-10-30T13:57:39.157862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CgmemQ13D4w8oa6OUd"]} -{"Format": "IDEA0", "ID": "2034257a-e571-4b22-aea7-7d982e32f151", "DetectTime": "2023-10-30T13:57:39.213100+02:00", "EventTime": "2023-10-30T13:57:39.213116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CNFHU92to8n3lE5njj"]} -{"Format": "IDEA0", "ID": "f775da16-cc9f-4c3f-979f-1673d15ff597", "DetectTime": "2023-10-30T13:57:39.265617+02:00", "EventTime": "2023-10-30T13:57:39.265633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CsAJLV2Wu8SFreEYj"]} -{"Format": "Json", "ID": "f775da16-cc9f-4c3f-979f-1673d15ff597", "DetectTime": "2023-10-30T13:57:39.265617+02:00", "EventTime": "2023-10-30T13:57:39.265633+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:04:11.962447+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:39.377105)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f42c5282-6446-4c8c-8b1d-18c8c61e27b8", "DetectTime": "2023-10-30T13:57:39.382565+02:00", "EventTime": "2023-10-30T13:57:39.382581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["C2pkAV2wxaOSg0bTu8"]} -{"Format": "IDEA0", "ID": "781afa07-5a09-482a-abea-9318b9f62c9f", "DetectTime": "2023-10-30T13:57:39.446956+02:00", "EventTime": "2023-10-30T13:57:39.446979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CE8W8z2aGLiDN9mhwd"]} -{"Format": "IDEA0", "ID": "07f4750a-ae29-4b32-8032-84b8535deb25", "DetectTime": "2023-10-30T13:57:39.508317+02:00", "EventTime": "2023-10-30T13:57:39.508336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["C2xN9LOK2GbAtI7h3"]} -{"Format": "IDEA0", "ID": "e26848c9-a6b0-436e-8ca8-ac67e30984da", "DetectTime": "2023-10-30T13:57:39.562859+02:00", "EventTime": "2023-10-30T13:57:39.562880+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C01o54gh4iwMBVdR8"]} -{"Format": "IDEA0", "ID": "a19f1c1d-a3f7-48e2-b0ac-d2b61d93ef12", "DetectTime": "2023-10-30T13:57:39.577199+02:00", "EventTime": "2023-10-30T13:57:39.577217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CcnMLh1APv3fP5Kun1"]} -{"Format": "IDEA0", "ID": "f1f92b3b-2788-4204-a8dc-ba415f81e6a6", "DetectTime": "2023-10-30T13:57:39.625971+02:00", "EventTime": "2023-10-30T13:57:39.625987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CtRY6G3YxdPJRmB3Qb"]} -{"Format": "IDEA0", "ID": "866b4d90-f0a0-42dd-bf01-8ccc1073761f", "DetectTime": "2023-10-30T13:57:39.677108+02:00", "EventTime": "2023-10-30T13:57:39.677120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2r7QW38sDwyL35dRf", "C9y9I22JtyVV3nvLlb", "C0Pk0wK00UPPb3bUh", "C0GrPLp77WBac8YNf"]} -{"Format": "IDEA0", "ID": "96fc4882-06a2-4d80-9a26-7fdb39bdd605", "DetectTime": "2023-10-30T13:57:39.689527+02:00", "EventTime": "2023-10-30T13:57:39.689543+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C0Pk0wK00UPPb3bUh"]} -{"Format": "IDEA0", "ID": "a3f92a1d-0db1-4d06-b347-b84d491ee3d5", "DetectTime": "2023-10-30T13:57:39.702979+02:00", "EventTime": "2023-10-30T13:57:39.702999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["Cj3K9k2TgWI0BWKEH6"]} -{"Format": "IDEA0", "ID": "4b5ec3ae-00cf-4b1a-9266-eff854d38113", "DetectTime": "2023-10-30T13:57:39.757511+02:00", "EventTime": "2023-10-30T13:57:39.757522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["Cu0g1e2bny5oeV1AS5"]} -{"Format": "IDEA0", "ID": "09ff3df0-7840-4c06-a922-153c027b189c", "DetectTime": "2023-10-30T13:57:39.807454+02:00", "EventTime": "2023-10-30T13:57:39.807472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["ComzJp3qGJzz8nW4R1"]} -{"Format": "Json", "ID": "09ff3df0-7840-4c06-a922-153c027b189c", "DetectTime": "2023-10-30T13:57:39.807454+02:00", "EventTime": "2023-10-30T13:57:39.807472+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:04:14.934381+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:39.890507)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2c6875cc-a13f-469b-8cea-a1cf16554821", "DetectTime": "2023-10-30T13:57:39.895336+02:00", "EventTime": "2023-10-30T13:57:39.895353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CywU6i3RePxv3PnsGf"]} -{"Format": "IDEA0", "ID": "f010239e-921d-4d3f-b90a-9a5815900eda", "DetectTime": "2023-10-30T13:57:39.946005+02:00", "EventTime": "2023-10-30T13:57:39.946021+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZ8ZAH2oltfSHgBLdb"]} -{"Format": "IDEA0", "ID": "397de035-ba50-45e1-9f23-c25c0ca12314", "DetectTime": "2023-10-30T13:57:39.958871+02:00", "EventTime": "2023-10-30T13:57:39.958888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CFA8QE43sJT1Hinqe2"]} -{"Format": "IDEA0", "ID": "78f8944e-979a-46d5-8804-c335a5692054", "DetectTime": "2023-10-30T13:57:39.977875+02:00", "EventTime": "2023-10-30T13:57:39.977885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CkMQvjz7tKuiDPq76"]} -{"Format": "IDEA0", "ID": "d28003f5-bed4-4b6b-a330-80617d9a3e72", "DetectTime": "2023-10-30T13:57:40.024680+02:00", "EventTime": "2023-10-30T13:57:40.024701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["C97zhn45RoIeclcmU3"]} -{"Format": "IDEA0", "ID": "550c7e07-df84-4ce2-803d-eda63f2b4adb", "DetectTime": "2023-10-30T13:57:40.071703+02:00", "EventTime": "2023-10-30T13:57:40.071721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CY5aQO1MLgOruiWwyd"]} -{"Format": "IDEA0", "ID": "3e61f6eb-f492-48b9-996e-cb9e48ae3fdb", "DetectTime": "2023-10-30T13:57:40.120551+02:00", "EventTime": "2023-10-30T13:57:40.120572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CaG4TQ3tD1VqBxubW9"]} -{"Format": "IDEA0", "ID": "354d6b50-9e90-4058-9913-907bf2ae1d05", "DetectTime": "2023-10-30T13:57:40.160261+02:00", "EventTime": "2023-10-30T13:57:40.160284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CHz4Ry3QHMR79rxGT6"]} -{"Format": "IDEA0", "ID": "7b4784c3-6560-453d-90c7-0d5eecf4bd20", "DetectTime": "2023-10-30T13:57:40.199186+02:00", "EventTime": "2023-10-30T13:57:40.199207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["C2eD2c3tE29DuzXEB7"]} -{"Format": "IDEA0", "ID": "96bdd3f2-e124-46db-89a7-248fcfec8ecd", "DetectTime": "2023-10-30T13:57:40.319517+02:00", "EventTime": "2023-10-30T13:57:40.319548+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["Cf0kpg453lIukxJwq9"]} -{"Format": "IDEA0", "ID": "5cb018aa-c3a8-4b2e-ba2f-a5a92e5a7434", "DetectTime": "2023-10-30T13:57:40.334744+02:00", "EventTime": "2023-10-30T13:57:40.334766+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI7fCZ1Nts18vXToHf"]} -{"Format": "IDEA0", "ID": "c479cdb1-ae28-491f-b1b3-3864a92ee44c", "DetectTime": "2023-10-30T13:57:40.348433+02:00", "EventTime": "2023-10-30T13:57:40.348457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CU3KIW2Sv8HkdePF2a"]} -{"Format": "Json", "ID": "c479cdb1-ae28-491f-b1b3-3864a92ee44c", "DetectTime": "2023-10-30T13:57:40.348433+02:00", "EventTime": "2023-10-30T13:57:40.348457+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-01T09:05:28.157129+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:40.439335)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c80732b9-980c-4430-9eb7-960b15c837d7", "DetectTime": "2023-10-30T13:57:40.444512+02:00", "EventTime": "2023-10-30T13:57:40.444532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CgNRWn2i7iMPeB92K1"]} -{"Format": "IDEA0", "ID": "1b0ee3b5-64c6-4fc3-8714-9ea3df1932e1", "DetectTime": "2023-10-30T13:57:40.506517+02:00", "EventTime": "2023-10-30T13:57:40.506536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CKDnIk2d2QUBkIdGNi"]} -{"Format": "IDEA0", "ID": "23541c82-6872-437d-8193-debb21b2d56f", "DetectTime": "2023-10-30T13:57:40.518494+02:00", "EventTime": "2023-10-30T13:57:40.518511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["C42YPnYxZZAHsrmAb"]} -{"Format": "IDEA0", "ID": "c0460907-a5dd-49bd-92cd-41b9c8b6dc53", "DetectTime": "2023-10-30T13:57:40.594590+02:00", "EventTime": "2023-10-30T13:57:40.594607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. ", "ContentType": "text/plain"}], "uids": ["CY9NypUtWAKh9DOcg"]} -{"Format": "IDEA0", "ID": "acfeaef5-0952-462c-9abf-031463f7cc2e", "DetectTime": "2023-10-30T13:57:40.650862+02:00", "EventTime": "2023-10-30T13:57:40.650881+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5fJAe1OdtJ93imGz6"]} -{"Format": "IDEA0", "ID": "1aac5e05-27b3-4576-9dc5-94a9ffd3ba08", "DetectTime": "2023-10-30T13:57:40.667588+02:00", "EventTime": "2023-10-30T13:57:40.667613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8825], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. ", "ContentType": "text/plain"}], "uids": ["CrPbJF4Ned8Bjs8L19"]} -{"Format": "IDEA0", "ID": "97d97fb0-a73e-45d0-b23d-2d2cbd81e6f2", "DetectTime": "2023-10-30T13:57:40.728815+02:00", "EventTime": "2023-10-30T13:57:40.728832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["CE8tox1M5mUwUETNrh"]} -{"Format": "IDEA0", "ID": "4555bbcb-7290-4d4b-8306-cd495e19944b", "DetectTime": "2023-10-30T13:57:40.784297+02:00", "EventTime": "2023-10-30T13:57:40.784316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CAjNUMfWc7Ei0KWR5"]} -{"Format": "IDEA0", "ID": "e908af2d-a938-4c79-a36d-8644b72ae621", "DetectTime": "2023-10-30T13:57:40.801619+02:00", "EventTime": "2023-10-30T13:57:40.801636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CoXRSY2PzHgqjRuoK4"]} -{"Format": "IDEA0", "ID": "23376a04-daed-41ae-b5e1-409ff0b2a494", "DetectTime": "2023-10-30T13:57:40.860495+02:00", "EventTime": "2023-10-30T13:57:40.860511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. ", "ContentType": "text/plain"}], "uids": ["CmfRzf2OEMjWvEdXza"]} -{"Format": "IDEA0", "ID": "cf499eef-70d2-4340-a691-6f05002cdfa4", "DetectTime": "2023-10-30T13:57:40.915274+02:00", "EventTime": "2023-10-30T13:57:40.915294+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiGcAa1Cx3H5uEBVmb"]} -{"Format": "IDEA0", "ID": "7a255cb2-b598-48c0-a56e-07a1af42a418", "DetectTime": "2023-10-30T13:57:40.929032+02:00", "EventTime": "2023-10-30T13:57:40.929052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["CoEaCV39IfV0Flz6Si"]} -{"Format": "Json", "ID": "7a255cb2-b598-48c0-a56e-07a1af42a418", "DetectTime": "2023-10-30T13:57:40.929032+02:00", "EventTime": "2023-10-30T13:57:40.929052+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:04:39.376119+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:41.010859)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0f583aab-41aa-4353-9ab9-fc5656d8c57b", "DetectTime": "2023-10-30T13:57:41.016764+02:00", "EventTime": "2023-10-30T13:57:41.016785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CAjNUMfWc7Ei0KWR5", "CKDnIk2d2QUBkIdGNi", "Cf0kpg453lIukxJwq9", "CeXmQQ31UllE07Gbw1"]} -{"Format": "IDEA0", "ID": "e240cb42-e74f-40fb-8828-1d7d4aa33c5e", "DetectTime": "2023-10-30T13:57:41.034125+02:00", "EventTime": "2023-10-30T13:57:41.034152+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CeXmQQ31UllE07Gbw1"]} -{"Format": "IDEA0", "ID": "08cff2d3-fe38-4439-bd7d-bae66a9a95a6", "DetectTime": "2023-10-30T13:57:41.052087+02:00", "EventTime": "2023-10-30T13:57:41.052105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. ", "ContentType": "text/plain"}], "uids": ["CIGiyxRyVbbHfxT2g"]} -{"Format": "IDEA0", "ID": "04a9a44f-672f-4bd9-a867-924a9fc0b9e1", "DetectTime": "2023-10-30T13:57:41.112640+02:00", "EventTime": "2023-10-30T13:57:41.112657+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPqWng4osAMYs7JsEh"]} -{"Format": "IDEA0", "ID": "1b4014a3-6bfa-46e7-b4f7-5221dbf091cc", "DetectTime": "2023-10-30T13:57:41.128917+02:00", "EventTime": "2023-10-30T13:57:41.128937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29634], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29634/UDP destination IP 113.165.116.48. ", "ContentType": "text/plain"}], "uids": ["C0M34V319ybM9NBV25"]} -{"Format": "IDEA0", "ID": "f021c4ec-1f02-4709-9973-e88a68e7e9a5", "DetectTime": "2023-10-30T13:57:41.183014+02:00", "EventTime": "2023-10-30T13:57:41.183032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["CMklbG3ZbEOMn69dwg"]} -{"Format": "IDEA0", "ID": "13eda816-17c1-413d-b55f-dafb6e94d3a9", "DetectTime": "2023-10-30T13:57:41.245578+02:00", "EventTime": "2023-10-30T13:57:41.245597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. ", "ContentType": "text/plain"}], "uids": ["CfwzDVk9zd8rPvk4f"]} -{"Format": "IDEA0", "ID": "b8c25a0e-e6a3-4ed7-96b3-d65a1f48b8af", "DetectTime": "2023-10-30T13:57:41.303303+02:00", "EventTime": "2023-10-30T13:57:41.303327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["CdoCWY18vnGqYd3cj8"]} -{"Format": "IDEA0", "ID": "d8c48f7d-2574-4e59-a191-dfcdb3afbdf6", "DetectTime": "2023-10-30T13:57:41.362906+02:00", "EventTime": "2023-10-30T13:57:41.362929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. ", "ContentType": "text/plain"}], "uids": ["CVfCOSkEyjpfYfE3k"]} -{"Format": "IDEA0", "ID": "529d680c-aaf4-4831-9a55-ff4f6dbdad35", "DetectTime": "2023-10-30T13:57:41.426750+02:00", "EventTime": "2023-10-30T13:57:41.426767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["C0q9eO17eo887v0K0a"]} -{"Format": "IDEA0", "ID": "f35d4049-684e-4f73-9b6a-ffbf1cca9b0d", "DetectTime": "2023-10-30T13:57:41.491406+02:00", "EventTime": "2023-10-30T13:57:41.491423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CipQfA1rK6dcTZ2af1"]} -{"Format": "Json", "ID": "f35d4049-684e-4f73-9b6a-ffbf1cca9b0d", "DetectTime": "2023-10-30T13:57:41.491406+02:00", "EventTime": "2023-10-30T13:57:41.491423+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:05:18.232412+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:41.581588)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "448e4f66-1e17-4c01-8dd4-04a0e613c541", "DetectTime": "2023-10-30T13:57:41.587469+02:00", "EventTime": "2023-10-30T13:57:41.587490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["CyMwU11lgWcSHM9ND"]} -{"Format": "IDEA0", "ID": "bb647b23-4dc6-4b36-b135-646e5ca811d5", "DetectTime": "2023-10-30T13:57:41.644260+02:00", "EventTime": "2023-10-30T13:57:41.644277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CZNf713lqHwq2jZ9W8"]} -{"Format": "IDEA0", "ID": "0962c812-a7a7-4aac-b570-f300d7ec9a4e", "DetectTime": "2023-10-30T13:57:41.694338+02:00", "EventTime": "2023-10-30T13:57:41.694355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["CvDTss37zFkDnrXaS6"]} -{"Format": "IDEA0", "ID": "8895cf35-a1e4-44e6-857f-3d5971bf5960", "DetectTime": "2023-10-30T13:57:41.749590+02:00", "EventTime": "2023-10-30T13:57:41.749610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["CvlmcH1EuWco8ofowd"]} -{"Format": "IDEA0", "ID": "721e689d-c26e-4e44-8bf6-7f645527e125", "DetectTime": "2023-10-30T13:57:41.802930+02:00", "EventTime": "2023-10-30T13:57:41.802947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["CFQLUm3HFsHPITzKXe"]} -{"Format": "IDEA0", "ID": "1db6471f-6c9f-4f2b-902b-c2276c93d8b7", "DetectTime": "2023-10-30T13:57:41.857332+02:00", "EventTime": "2023-10-30T13:57:41.857351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16748], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. ", "ContentType": "text/plain"}], "uids": ["C6TzYL9sJDJrb65Ff"]} -{"Format": "IDEA0", "ID": "05dcff90-5aad-4af2-b168-05d43dfe54ed", "DetectTime": "2023-10-30T13:57:41.912769+02:00", "EventTime": "2023-10-30T13:57:41.912797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CxQ6P04wQn7EsyfUaa"]} -{"Format": "IDEA0", "ID": "9954803a-3e35-43bc-b237-707f8638ed9d", "DetectTime": "2023-10-30T13:57:41.942573+02:00", "EventTime": "2023-10-30T13:57:41.942589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CgvI9qBYxL0n3PzP7"]} -{"Format": "IDEA0", "ID": "c169e2f6-9204-4ae8-a546-e6609b9a18ff", "DetectTime": "2023-10-30T13:57:41.996775+02:00", "EventTime": "2023-10-30T13:57:41.996791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C5la9g1O2PymXjjW9k"]} -{"Format": "Json", "ID": "c169e2f6-9204-4ae8-a546-e6609b9a18ff", "DetectTime": "2023-10-30T13:57:41.996775+02:00", "EventTime": "2023-10-30T13:57:41.996791+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:36:47.503319+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:42.072061)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "644a12ff-46e0-41b5-85bc-828b29ceaaf5", "DetectTime": "2023-10-30T13:57:42.078040+02:00", "EventTime": "2023-10-30T13:57:42.078059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["Cqu6FR2zOCqFYzfUkk"]} -{"Format": "IDEA0", "ID": "838a34bf-871b-4e4c-9da1-9ad28ed86615", "DetectTime": "2023-10-30T13:57:42.120806+02:00", "EventTime": "2023-10-30T13:57:42.120823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C1jiJQ2k5d5QnvxmS6"]} -{"Format": "IDEA0", "ID": "00e284d7-6ba6-4bf1-8675-d2dab8d564f9", "DetectTime": "2023-10-30T13:57:42.163019+02:00", "EventTime": "2023-10-30T13:57:42.163042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Cc5s6K1rWIHSWN57mi"]} -{"Format": "IDEA0", "ID": "1c97ed88-1ac9-4d85-b007-36367f6777e6", "DetectTime": "2023-10-30T13:57:42.204969+02:00", "EventTime": "2023-10-30T13:57:42.204986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CF0F7B3AR6qbVx6aNl"]} -{"Format": "IDEA0", "ID": "b8c4e12b-b618-4cba-ba93-ea9dc7332b48", "DetectTime": "2023-10-30T13:57:42.248982+02:00", "EventTime": "2023-10-30T13:57:42.249007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CLjBg62sHoYTZSixIj"]} -{"Format": "IDEA0", "ID": "17311e9a-4f9e-4238-afbf-23955707ebb4", "DetectTime": "2023-10-30T13:57:42.290794+02:00", "EventTime": "2023-10-30T13:57:42.290812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CKMEDp2MGi3cZvKdF2"]} -{"Format": "IDEA0", "ID": "242d1bee-80d0-40df-a769-7d3c0047b899", "DetectTime": "2023-10-30T13:57:42.331117+02:00", "EventTime": "2023-10-30T13:57:42.331142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CdXpWy1KE2GCNCTxb4"]} -{"Format": "IDEA0", "ID": "d6456ad6-b10b-4a32-9582-91ca0ae61c75", "DetectTime": "2023-10-30T13:57:42.378053+02:00", "EventTime": "2023-10-30T13:57:42.378069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CZQ8XC1tEMaVs1xu12"]} -{"Format": "Json", "ID": "d6456ad6-b10b-4a32-9582-91ca0ae61c75", "DetectTime": "2023-10-30T13:57:42.378053+02:00", "EventTime": "2023-10-30T13:57:42.378069+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:36:49.916598+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:42.449516)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "593f0420-7a9d-4a98-be85-d0600e5cdc65", "DetectTime": "2023-10-30T13:57:42.456472+02:00", "EventTime": "2023-10-30T13:57:42.456498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["C2umWu4xVmAXCXUTkb"]} -{"Format": "IDEA0", "ID": "b765a0cc-dcaf-4104-b1be-f9813444a315", "DetectTime": "2023-10-30T13:57:42.499600+02:00", "EventTime": "2023-10-30T13:57:42.499616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CSOWI93fWSz93nFAG8"]} -{"Format": "IDEA0", "ID": "28b2c1eb-a6ef-4c53-9185-c59d4d2c6ac6", "DetectTime": "2023-10-30T13:57:42.543803+02:00", "EventTime": "2023-10-30T13:57:42.543824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CtEFgu4CYqWbq32tbi"]} -{"Format": "IDEA0", "ID": "16ffc360-1448-40a4-8667-82b9af1b3920", "DetectTime": "2023-10-30T13:57:42.589344+02:00", "EventTime": "2023-10-30T13:57:42.589366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CSpaYiL0GquhI2n19"]} -{"Format": "IDEA0", "ID": "4ad3d8a8-d523-4cea-a4bb-1dab31e803b1", "DetectTime": "2023-10-30T13:57:42.632841+02:00", "EventTime": "2023-10-30T13:57:42.632856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["C2aKQE3Rud9fir6RJb"]} -{"Format": "IDEA0", "ID": "a723c535-7fd6-45ec-8f72-4a6dd6019d7f", "DetectTime": "2023-10-30T13:57:42.675990+02:00", "EventTime": "2023-10-30T13:57:42.676007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CoGNoB2dFFBZLSVRDe"]} -{"Format": "IDEA0", "ID": "27039450-c218-4592-917b-6596c94ad3e7", "DetectTime": "2023-10-30T13:57:42.718845+02:00", "EventTime": "2023-10-30T13:57:42.718861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["Ci09We1QNCgdUaDE1g"]} -{"Format": "IDEA0", "ID": "b512f96a-4ac3-4aed-9e28-d3996630ab78", "DetectTime": "2023-10-30T13:57:42.768114+02:00", "EventTime": "2023-10-30T13:57:42.768132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CCFmqE4weQ2WSoXRrl"]} -{"Format": "Json", "ID": "b512f96a-4ac3-4aed-9e28-d3996630ab78", "DetectTime": "2023-10-30T13:57:42.768114+02:00", "EventTime": "2023-10-30T13:57:42.768132+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:36:52.516686+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:42.841576)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "70b615fa-9234-4a90-80ba-7177659c8747", "DetectTime": "2023-10-30T13:57:42.847675+02:00", "EventTime": "2023-10-30T13:57:42.847694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CK6Vm54ntX1BXV31Bk"]} -{"Format": "IDEA0", "ID": "1dc3bf28-ddf2-4c7a-8f2c-5c7d38187d8e", "DetectTime": "2023-10-30T13:57:42.962848+02:00", "EventTime": "2023-10-30T13:57:42.962872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Cne9j72oLZbXPlArih"]} -{"Format": "IDEA0", "ID": "a5ddc162-4373-4213-b2da-65f138590e37", "DetectTime": "2023-10-30T13:57:43.009405+02:00", "EventTime": "2023-10-30T13:57:43.009422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CSjbsC4qH61KdW7Rn3"]} -{"Format": "IDEA0", "ID": "d78aaf99-a224-4541-877b-6ee102012988", "DetectTime": "2023-10-30T13:57:43.052277+02:00", "EventTime": "2023-10-30T13:57:43.052317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CtlN8jMrTQEtF3sBf"]} -{"Format": "IDEA0", "ID": "95fa9c8e-7b9c-4de8-9969-ae78d2be0b72", "DetectTime": "2023-10-30T13:57:43.097093+02:00", "EventTime": "2023-10-30T13:57:43.097110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. ", "ContentType": "text/plain"}], "uids": ["CCX43p3MOErST2QeBi"]} -{"Format": "IDEA0", "ID": "31462471-648a-477b-8c8a-de9212854fad", "DetectTime": "2023-10-30T13:57:43.145698+02:00", "EventTime": "2023-10-30T13:57:43.145719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["C8cyjU3Rivf6IuKofh"]} -{"Format": "IDEA0", "ID": "8c9cf43f-dc8c-4d2e-aeb9-2ef319b9245d", "DetectTime": "2023-10-30T13:57:43.189722+02:00", "EventTime": "2023-10-30T13:57:43.189742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CUdLuY14dKiSqigSfj"]} -{"Format": "IDEA0", "ID": "27d68da0-0750-41d0-a309-63ea730c3dbe", "DetectTime": "2023-10-30T13:57:43.236214+02:00", "EventTime": "2023-10-30T13:57:43.236254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8825], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. ", "ContentType": "text/plain"}], "uids": ["CV7Dml46GSZNcgEqp"]} -{"Format": "Json", "ID": "27d68da0-0750-41d0-a309-63ea730c3dbe", "DetectTime": "2023-10-30T13:57:43.236214+02:00", "EventTime": "2023-10-30T13:57:43.236254+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8825], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:36:55.414424+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:43.316075)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6a3856a-6726-4402-aed8-fa13e5c3d20f", "DetectTime": "2023-10-30T13:57:43.320866+02:00", "EventTime": "2023-10-30T13:57:43.320886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CVTKI11ksekVxdtxG4"]} -{"Format": "IDEA0", "ID": "85582311-b813-47d3-a48b-4f385ee4c90e", "DetectTime": "2023-10-30T13:57:43.369594+02:00", "EventTime": "2023-10-30T13:57:43.369618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["C386k632OTWki9qCV5"]} -{"Format": "IDEA0", "ID": "e78bd3a7-4587-4825-b98d-0e213e05940a", "DetectTime": "2023-10-30T13:57:43.408805+02:00", "EventTime": "2023-10-30T13:57:43.408830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["CoM2mn4oNz7jCMWDfi"]} -{"Format": "IDEA0", "ID": "728cd875-3e95-4c2d-91bd-ad51a7f2d3f1", "DetectTime": "2023-10-30T13:57:43.452653+02:00", "EventTime": "2023-10-30T13:57:43.452674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. ", "ContentType": "text/plain"}], "uids": ["CfpWrD3qX705eFglVf"]} -{"Format": "IDEA0", "ID": "2e4f940c-b22d-47f2-a126-13f4c6022037", "DetectTime": "2023-10-30T13:57:43.498865+02:00", "EventTime": "2023-10-30T13:57:43.498882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. ", "ContentType": "text/plain"}], "uids": ["CrCEa24BMDT4Kg5IQc"]} -{"Format": "IDEA0", "ID": "40d5e58b-0cdb-4a66-96fb-f72e046aebbe", "DetectTime": "2023-10-30T13:57:43.545195+02:00", "EventTime": "2023-10-30T13:57:43.545207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["Ci3oTXuotGNFT0JR4"]} -{"Format": "IDEA0", "ID": "4ee45a97-9ee2-4a48-8d95-72dae1d65702", "DetectTime": "2023-10-30T13:57:43.589274+02:00", "EventTime": "2023-10-30T13:57:43.589301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. ", "ContentType": "text/plain"}], "uids": ["CHZzty2KUTYVusiJWf"]} -{"Format": "IDEA0", "ID": "90b979b8-b691-4cf2-a1f3-d7e26b6636ae", "DetectTime": "2023-10-30T13:57:43.630844+02:00", "EventTime": "2023-10-30T13:57:43.630861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. ", "ContentType": "text/plain"}], "uids": ["C2VX8qg975Iutds4a"]} -{"Format": "Json", "ID": "90b979b8-b691-4cf2-a1f3-d7e26b6636ae", "DetectTime": "2023-10-30T13:57:43.630844+02:00", "EventTime": "2023-10-30T13:57:43.630861+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25066], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:37:18.756096+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:43.699802)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "47e84472-ad54-44ab-a902-2fda9c01f815", "DetectTime": "2023-10-30T13:57:43.706217+02:00", "EventTime": "2023-10-30T13:57:43.706239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["CDZEcC1pRYWEw33g5b"]} -{"Format": "IDEA0", "ID": "0b96c384-9c95-4869-9ddf-04d2ccd1eb1e", "DetectTime": "2023-10-30T13:57:43.755623+02:00", "EventTime": "2023-10-30T13:57:43.755640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CMIGPf1VwwfWmPtjwj"]} -{"Format": "IDEA0", "ID": "4a23be11-1656-4a5b-ac14-b93dde750ee4", "DetectTime": "2023-10-30T13:57:43.790244+02:00", "EventTime": "2023-10-30T13:57:43.790259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["Ctm0dLxDEnMAmMR05"]} -{"Format": "IDEA0", "ID": "dc443fd0-afe2-4e3c-a7fa-e3c93a873744", "DetectTime": "2023-10-30T13:57:43.829712+02:00", "EventTime": "2023-10-30T13:57:43.829729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["Cew8S21CuIbmVlFbl"]} -{"Format": "IDEA0", "ID": "3ee4c632-c616-4239-9961-2e07888f9fb2", "DetectTime": "2023-10-30T13:57:43.871267+02:00", "EventTime": "2023-10-30T13:57:43.871518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["C0NTdB0iHRSx4KsCc"]} -{"Format": "IDEA0", "ID": "16a3415f-c7f4-4a78-a6ac-874fd4e5bf62", "DetectTime": "2023-10-30T13:57:43.910345+02:00", "EventTime": "2023-10-30T13:57:43.910366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["C2o30m46S6o5eYuix7"]} -{"Format": "IDEA0", "ID": "1d6e508b-00ca-4936-9069-9a9240670b6e", "DetectTime": "2023-10-30T13:57:43.951310+02:00", "EventTime": "2023-10-30T13:57:43.951331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CP7GLF10jrkn2Sg9Xe"]} -{"Format": "IDEA0", "ID": "655313a3-60d5-41f2-8042-d59aee8894f3", "DetectTime": "2023-10-30T13:57:43.988277+02:00", "EventTime": "2023-10-30T13:57:43.988295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["C4kKrBHkI7Yc0mVAk"]} -{"Format": "IDEA0", "ID": "979b5e7c-5a41-4008-b774-76bf737a605b", "DetectTime": "2023-10-30T13:57:44.028165+02:00", "EventTime": "2023-10-30T13:57:44.028187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["C8giTU4pydIIxsPDf"]} -{"Format": "Json", "ID": "979b5e7c-5a41-4008-b774-76bf737a605b", "DetectTime": "2023-10-30T13:57:44.028165+02:00", "EventTime": "2023-10-30T13:57:44.028187+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T09:37:22.194326+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2023/10/30 13:57:44.096347)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aea911fe-c11b-4f20-89ab-62421a6120a7", "DetectTime": "2023-10-30T13:57:44.102766+02:00", "EventTime": "2023-10-30T13:57:44.102801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CTm3Q82KDOnKK1FFej"]} -{"Format": "IDEA0", "ID": "1538201d-c1e0-44c7-ab60-9c3eb0bec4b9", "DetectTime": "2023-10-30T13:57:44.176002+02:00", "EventTime": "2023-10-30T13:57:44.176019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16748], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. ", "ContentType": "text/plain"}], "uids": ["Cd6IIm1ErlF5ikVIbh"]} -{"Format": "IDEA0", "ID": "35c3b93e-db18-48d7-8f0b-55b1d1ef84e2", "DetectTime": "2023-10-30T13:57:44.238153+02:00", "EventTime": "2023-10-30T13:57:44.238168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CiY033236I7ydeQLOe"]} -{"Format": "IDEA0", "ID": "97f6a066-7cc1-40ab-af79-c1a51c33497b", "DetectTime": "2023-10-30T13:57:44.308923+02:00", "EventTime": "2023-10-30T13:57:44.308947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CJxgE9b9gagNuXsXk"]} -{"Format": "IDEA0", "ID": "2ace16cc-e080-4fd6-8855-d9f3b163ee49", "DetectTime": "2023-10-30T13:57:44.377647+02:00", "EventTime": "2023-10-30T13:57:44.377666+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CyTM6i3k8kY75I7pi6"]} -{"Format": "IDEA0", "ID": "38c0d4f3-6b1a-4b36-a26e-4bca35e09bcc", "DetectTime": "2023-10-30T13:57:44.394717+02:00", "EventTime": "2023-10-30T13:57:44.394733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CkipMT2NRILc67Fl5l"]} -{"Format": "IDEA0", "ID": "9c053b10-8b36-4e2d-a02b-55f951d5d7f6", "DetectTime": "2023-10-30T13:57:44.469804+02:00", "EventTime": "2023-10-30T13:57:44.469821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Ccp4LI2IQzuOcRdhud"]} -{"Format": "IDEA0", "ID": "9485af27-5646-449c-a911-b3b89357e41a", "DetectTime": "2023-10-30T13:57:44.542065+02:00", "EventTime": "2023-10-30T13:57:44.542084+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0uYFa1FTrcozt5nil"]} -{"Format": "IDEA0", "ID": "a2f04ae8-1d4f-48f4-81ca-375de9c8d2ee", "DetectTime": "2023-10-30T13:57:44.555600+02:00", "EventTime": "2023-10-30T13:57:44.555621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CnbXy94LHzUNopvOp7"]} -{"Format": "Json", "ID": "a2f04ae8-1d4f-48f4-81ca-375de9c8d2ee", "DetectTime": "2023-10-30T13:57:44.555600+02:00", "EventTime": "2023-10-30T13:57:44.555621+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:08:25.655141+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:44.683340)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e464dda6-2889-4e01-9ce9-1bdb52fb8cc0", "DetectTime": "2023-10-30T13:57:44.689748+02:00", "EventTime": "2023-10-30T13:57:44.689768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["Cghayk1ikT6mpwXbWc"]} -{"Format": "IDEA0", "ID": "5769be81-49fc-40e3-8716-378d365b9b81", "DetectTime": "2023-10-30T13:57:44.758395+02:00", "EventTime": "2023-10-30T13:57:44.758421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["Ce2rYu2ffz442WlESa"]} -{"Format": "IDEA0", "ID": "8afb7d4f-bbf3-4012-88a7-f7545d2847fb", "DetectTime": "2023-10-30T13:57:44.813792+02:00", "EventTime": "2023-10-30T13:57:44.813811+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CWce8D3QeJtDOXGcz5"]} -{"Format": "IDEA0", "ID": "e465ecb6-406d-44d1-a611-cad572245950", "DetectTime": "2023-10-30T13:57:44.826023+02:00", "EventTime": "2023-10-30T13:57:44.826049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["COv45j1ece5GXPIvLb"]} -{"Format": "IDEA0", "ID": "cfee8669-8169-49eb-be82-750947cc98b2", "DetectTime": "2023-10-30T13:57:44.878927+02:00", "EventTime": "2023-10-30T13:57:44.878952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CFbyHi4fvqpjfaCA28"]} -{"Format": "IDEA0", "ID": "52310e45-1369-4997-bf5d-5e3946320376", "DetectTime": "2023-10-30T13:57:44.933726+02:00", "EventTime": "2023-10-30T13:57:44.933744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["C6ejh92fiuJqhxjJj5"]} -{"Format": "IDEA0", "ID": "5380195f-a4ba-4628-bb1c-15a63bbcf0ee", "DetectTime": "2023-10-30T13:57:44.992630+02:00", "EventTime": "2023-10-30T13:57:44.992655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CuSCbSBnzWkqD6PEf"]} -{"Format": "IDEA0", "ID": "6165b6d6-e8eb-4fdd-8f35-762556871892", "DetectTime": "2023-10-30T13:57:45.048321+02:00", "EventTime": "2023-10-30T13:57:45.048338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CUJI762bk60ZkgOrM3"]} -{"Format": "IDEA0", "ID": "dd3bdbe9-86c0-43ea-b359-77a02bf2ea6f", "DetectTime": "2023-10-30T13:57:45.105472+02:00", "EventTime": "2023-10-30T13:57:45.105488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CaaJ97zj2Id4KYWm"]} -{"Format": "Json", "ID": "dd3bdbe9-86c0-43ea-b359-77a02bf2ea6f", "DetectTime": "2023-10-30T13:57:45.105472+02:00", "EventTime": "2023-10-30T13:57:45.105488+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:08:27.697200+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:45.182842)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "992332e9-e372-4fd1-96d0-8d66d147ff1f", "DetectTime": "2023-10-30T13:57:45.188268+02:00", "EventTime": "2023-10-30T13:57:45.188283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["Cy6CWQ3djUIU5pdqua"]} -{"Format": "IDEA0", "ID": "f0f6cba1-d276-4093-b3cc-51bc6f9bfbae", "DetectTime": "2023-10-30T13:57:45.240816+02:00", "EventTime": "2023-10-30T13:57:45.240837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C1cPv84VXfAKcKXeY2"]} -{"Format": "IDEA0", "ID": "ce3afc93-5302-42d7-a368-fa653eb6c24d", "DetectTime": "2023-10-30T13:57:45.293657+02:00", "EventTime": "2023-10-30T13:57:45.293684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CkTQr817LrZf8ZcePc"]} -{"Format": "IDEA0", "ID": "02cc486b-3178-4bb9-ae42-b13915b7ad2d", "DetectTime": "2023-10-30T13:57:45.355751+02:00", "EventTime": "2023-10-30T13:57:45.355776+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrRj1EjmzoCDGKHG1"]} -{"Format": "IDEA0", "ID": "4caa8872-cd84-4ac0-9baf-c2825fc3596b", "DetectTime": "2023-10-30T13:57:45.368200+02:00", "EventTime": "2023-10-30T13:57:45.368218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CA6BQd2tVJnonGAmv1"]} -{"Format": "IDEA0", "ID": "81018abe-ca03-4cde-a433-adad52b02550", "DetectTime": "2023-10-30T13:57:45.422820+02:00", "EventTime": "2023-10-30T13:57:45.422837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["C1q8h43DR2oYKSqVjg"]} -{"Format": "IDEA0", "ID": "31eb0c92-0070-42f2-9294-c489e332b575", "DetectTime": "2023-10-30T13:57:45.478813+02:00", "EventTime": "2023-10-30T13:57:45.478837+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CzZgVg4EENVS2aT9Zd"]} -{"Format": "IDEA0", "ID": "f4cae334-d893-4f97-b8e0-86c674f62bd9", "DetectTime": "2023-10-30T13:57:45.491735+02:00", "EventTime": "2023-10-30T13:57:45.491760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CH18wV3POkp2yxyPvb"]} -{"Format": "IDEA0", "ID": "49ad2be9-94e0-4c5e-8ff9-3efa15679a66", "DetectTime": "2023-10-30T13:57:45.540808+02:00", "EventTime": "2023-10-30T13:57:45.540827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["C7rTgm1kxJ2gjftLc7"]} -{"Format": "IDEA0", "ID": "b558d2f3-ddf8-4b8c-9dec-823557eed361", "DetectTime": "2023-10-30T13:57:45.594561+02:00", "EventTime": "2023-10-30T13:57:45.594574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. ", "ContentType": "text/plain"}], "uids": ["Ch1YGU2L2BuPxe4ii3"]} -{"Format": "Json", "ID": "b558d2f3-ddf8-4b8c-9dec-823557eed361", "DetectTime": "2023-10-30T13:57:45.594561+02:00", "EventTime": "2023-10-30T13:57:45.594574+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23510], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:08:29.721558+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:45.678294)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6b101356-9b84-4405-926f-08db3c4aaf9e", "DetectTime": "2023-10-30T13:57:45.684684+02:00", "EventTime": "2023-10-30T13:57:45.684707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["Cl5iDG43TbhqBKcwf9"]} -{"Format": "IDEA0", "ID": "ea05c2a6-6296-4ab0-8eaf-688bcbccc049", "DetectTime": "2023-10-30T13:57:45.739627+02:00", "EventTime": "2023-10-30T13:57:45.739654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CE6YJp1n2ZI9VLa225"]} -{"Format": "IDEA0", "ID": "1aae6291-a54d-4b5d-b5fa-2c745e895f92", "DetectTime": "2023-10-30T13:57:45.792913+02:00", "EventTime": "2023-10-30T13:57:45.792953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CR0xnp2mapoEqEEgcg"]} -{"Format": "IDEA0", "ID": "661f075c-1ff3-4b8c-9850-07c4b6a36c49", "DetectTime": "2023-10-30T13:57:45.841835+02:00", "EventTime": "2023-10-30T13:57:45.841854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8825], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. ", "ContentType": "text/plain"}], "uids": ["CNajhc2FVCi1oCCIXj"]} -{"Format": "IDEA0", "ID": "8a253a7f-7a19-4396-9c86-349accbf5024", "DetectTime": "2023-10-30T13:57:45.888385+02:00", "EventTime": "2023-10-30T13:57:45.888403+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMqnmf1vkYZyrmmi8f"]} -{"Format": "IDEA0", "ID": "ebcab6ef-e0f8-4f49-9a98-bd2a404dbedf", "DetectTime": "2023-10-30T13:57:45.899782+02:00", "EventTime": "2023-10-30T13:57:45.899801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["ChBETE3PDLtqYIjF44"]} -{"Format": "IDEA0", "ID": "073fdb26-3174-4300-968b-ddf1e08af085", "DetectTime": "2023-10-30T13:57:45.950614+02:00", "EventTime": "2023-10-30T13:57:45.950633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["C57b2TgRypo77poE9"]} -{"Format": "IDEA0", "ID": "edee1d48-f996-46bc-9220-3e54311f16dd", "DetectTime": "2023-10-30T13:57:46.003306+02:00", "EventTime": "2023-10-30T13:57:46.003330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyTM6i3k8kY75I7pi6", "C60I2Z3MbPs73H880c", "CzZgVg4EENVS2aT9Zd", "CWce8D3QeJtDOXGcz5"]} -{"Format": "IDEA0", "ID": "109e1b01-4163-4b5a-b977-d7c534687d87", "DetectTime": "2023-10-30T13:57:46.016295+02:00", "EventTime": "2023-10-30T13:57:46.016314+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C60I2Z3MbPs73H880c"]} -{"Format": "IDEA0", "ID": "b17e928d-2681-4151-95b8-56c04c72a490", "DetectTime": "2023-10-30T13:57:46.030957+02:00", "EventTime": "2023-10-30T13:57:46.031015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. ", "ContentType": "text/plain"}], "uids": ["CfEcVy4gbJNQhyMDE2"]} -{"Format": "IDEA0", "ID": "f0d3fe7c-a9b2-4359-b5c6-a9aa89160f2f", "DetectTime": "2023-10-30T13:57:46.085100+02:00", "EventTime": "2023-10-30T13:57:46.085115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["Cipod31OKlZ6MPb2qk"]} -{"Format": "Json", "ID": "f0d3fe7c-a9b2-4359-b5c6-a9aa89160f2f", "DetectTime": "2023-10-30T13:57:46.085100+02:00", "EventTime": "2023-10-30T13:57:46.085115+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:08:32.590496+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:46.165781)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "32309fb1-9f20-42ee-bb5d-2c879f1015de", "DetectTime": "2023-10-30T13:57:46.172455+02:00", "EventTime": "2023-10-30T13:57:46.172483+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cj6tpF3BgTcdvLtEH"]} -{"Format": "IDEA0", "ID": "fbb3438f-f592-41b4-96e2-6e590e2f120b", "DetectTime": "2023-10-30T13:57:46.188959+02:00", "EventTime": "2023-10-30T13:57:46.188980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["C0YFYEtzZyykQZrd5"]} -{"Format": "IDEA0", "ID": "2e511324-04a7-4aa4-98d0-984f43ebb936", "DetectTime": "2023-10-30T13:57:46.243302+02:00", "EventTime": "2023-10-30T13:57:46.243323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. ", "ContentType": "text/plain"}], "uids": ["C64yEQDQVuC7U7all"]} -{"Format": "IDEA0", "ID": "e132e599-7a42-4609-bd28-ca7b53807164", "DetectTime": "2023-10-30T13:57:46.295634+02:00", "EventTime": "2023-10-30T13:57:46.295655+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CKA91wb6hyzEitDMi"]} -{"Format": "IDEA0", "ID": "d2f0d60c-98f0-42f7-8f36-b718669d4f7e", "DetectTime": "2023-10-30T13:57:46.308906+02:00", "EventTime": "2023-10-30T13:57:46.308920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CRvkbF4fHzd7H9zTJ5"]} -{"Format": "IDEA0", "ID": "f970e68f-5735-4118-a60e-67d26140be22", "DetectTime": "2023-10-30T13:57:46.365719+02:00", "EventTime": "2023-10-30T13:57:46.365746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["CIpyI93Keqj4lyObg8"]} -{"Format": "IDEA0", "ID": "437e775d-1cd2-4d92-94ac-e8d7f91332d5", "DetectTime": "2023-10-30T13:57:46.432059+02:00", "EventTime": "2023-10-30T13:57:46.432137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CDf0Re3EcnCOaGENT9"]} -{"Format": "IDEA0", "ID": "b4ef2dae-b3d6-4c3d-9c4a-da7762cb0ee1", "DetectTime": "2023-10-30T13:57:46.488909+02:00", "EventTime": "2023-10-30T13:57:46.488931+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnEOI33EU3ICBZxn5b"]} -{"Format": "IDEA0", "ID": "a63a9f46-a473-4e3a-a171-e07f23a5a579", "DetectTime": "2023-10-30T13:57:46.507077+02:00", "EventTime": "2023-10-30T13:57:46.507102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CVumAD1elgWY3aotqj"]} -{"Format": "IDEA0", "ID": "01171dd5-9612-4cef-9e94-bb5855344ecc", "DetectTime": "2023-10-30T13:57:46.567901+02:00", "EventTime": "2023-10-30T13:57:46.567920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["CvUidG1qPjAzh5uNZ8"]} -{"Format": "IDEA0", "ID": "6ecd4024-3307-4f0a-a273-ca507634999f", "DetectTime": "2023-10-30T13:57:46.620898+02:00", "EventTime": "2023-10-30T13:57:46.620916+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CWa7pbiEpJQNJdl5b"]} -{"Format": "IDEA0", "ID": "93550ea7-7a1d-4356-86ce-6b1f7769cb9a", "DetectTime": "2023-10-30T13:57:46.633723+02:00", "EventTime": "2023-10-30T13:57:46.633745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["C0bgtx3bchnzKCeJF2"]} -{"Format": "Json", "ID": "93550ea7-7a1d-4356-86ce-6b1f7769cb9a", "DetectTime": "2023-10-30T13:57:46.633723+02:00", "EventTime": "2023-10-30T13:57:46.633745+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:09:12.602474+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:46.707106)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "05b2bc4d-f023-4416-912f-723b2cfb4f85", "DetectTime": "2023-10-30T13:57:46.714077+02:00", "EventTime": "2023-10-30T13:57:46.714118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["CKeYtj2wsaYwVHzqil"]} -{"Format": "IDEA0", "ID": "8160e5ac-9be0-4ea8-9214-7c910bfbde67", "DetectTime": "2023-10-30T13:57:46.760497+02:00", "EventTime": "2023-10-30T13:57:46.760511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["COo7IY2TMdOLpBo2pi"]} -{"Format": "IDEA0", "ID": "17bf3037-ac4f-4086-bddf-96f2a9afaaa6", "DetectTime": "2023-10-30T13:57:46.907810+02:00", "EventTime": "2023-10-30T13:57:46.907829+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDzoow1mA8EDmBqgna"]} -{"Format": "IDEA0", "ID": "3029fe32-3ed8-42d4-a62e-dae538d12cff", "DetectTime": "2023-10-30T13:57:46.924943+02:00", "EventTime": "2023-10-30T13:57:46.924962+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CBT8eX2Gn4ihulWXmd"]} -{"Format": "IDEA0", "ID": "87664b99-da9b-43f8-8859-2f44c9ba0e1d", "DetectTime": "2023-10-30T13:57:46.942729+02:00", "EventTime": "2023-10-30T13:57:46.942753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["ClGoySYKFik0o2cX5"]} -{"Format": "IDEA0", "ID": "3f275612-f9f6-4279-be74-8e0790791f38", "DetectTime": "2023-10-30T13:57:47.000405+02:00", "EventTime": "2023-10-30T13:57:47.000513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ceoio41fFqxIw2qXoi"]} -{"Format": "IDEA0", "ID": "9269e8e6-08e5-4021-8578-29a96d47fe74", "DetectTime": "2023-10-30T13:57:47.015962+02:00", "EventTime": "2023-10-30T13:57:47.015975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["ChxqdZ2Rnf3vu07194", "CKA91wb6hyzEitDMi", "CWa7pbiEpJQNJdl5b", "CBT8eX2Gn4ihulWXmd"]} -{"Format": "IDEA0", "ID": "2ba37096-5384-452d-a5ef-924def70a859", "DetectTime": "2023-10-30T13:57:47.034676+02:00", "EventTime": "2023-10-30T13:57:47.034695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16748], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. ", "ContentType": "text/plain"}], "uids": ["CPvh37VDcwPpbLSj"]} -{"Format": "IDEA0", "ID": "dd87f3e9-ae74-4a26-bc1d-bc1dcac23efd", "DetectTime": "2023-10-30T13:57:47.085658+02:00", "EventTime": "2023-10-30T13:57:47.085682+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["ChxqdZ2Rnf3vu07194"]} -{"Format": "IDEA0", "ID": "f6cf0f8c-5036-4a02-b41f-f94a074c525c", "DetectTime": "2023-10-30T13:57:47.103226+02:00", "EventTime": "2023-10-30T13:57:47.103251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CPbvCa1xa92C6M85lf"]} -{"Format": "IDEA0", "ID": "132f4933-da49-432c-bded-8b8f6cd36876", "DetectTime": "2023-10-30T13:57:47.153981+02:00", "EventTime": "2023-10-30T13:57:47.154004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CSrKj7zRSAKZoaTd6"]} -{"Format": "IDEA0", "ID": "2d7a4b52-1270-4f9f-86aa-933f70f9e102", "DetectTime": "2023-10-30T13:57:47.204449+02:00", "EventTime": "2023-10-30T13:57:47.204467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CgHBaw3mbzGSWQ1pxb"]} -{"Format": "IDEA0", "ID": "d11716a7-bba5-4b80-9329-19a939cb2693", "DetectTime": "2023-10-30T13:57:47.262324+02:00", "EventTime": "2023-10-30T13:57:47.262341+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCoK3C4dvgVq4sHYhj"]} -{"Format": "IDEA0", "ID": "3034598a-7322-4e68-86f6-003836316859", "DetectTime": "2023-10-30T13:57:47.280008+02:00", "EventTime": "2023-10-30T13:57:47.280035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["C03y502g4zZ6cjskMc"]} -{"Format": "IDEA0", "ID": "9999aed5-4e51-4aa0-a3b4-34f3c0fe51cc", "DetectTime": "2023-10-30T13:57:47.309132+02:00", "EventTime": "2023-10-30T13:57:47.309145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CQc38O3czP8RTuMJRk"]} -{"Format": "Json", "ID": "9999aed5-4e51-4aa0-a3b4-34f3c0fe51cc", "DetectTime": "2023-10-30T13:57:47.309132+02:00", "EventTime": "2023-10-30T13:57:47.309145+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:39:56.553456+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:47.396685)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "22956672-45a7-4de7-ab14-4b85404c2c71", "DetectTime": "2023-10-30T13:57:47.403422+02:00", "EventTime": "2023-10-30T13:57:47.403443+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["CO4E8AynDfpB4laQ4"]} -{"Format": "IDEA0", "ID": "d3812261-df4a-47f3-b73f-6c86edc18fb0", "DetectTime": "2023-10-30T13:57:47.424219+02:00", "EventTime": "2023-10-30T13:57:47.424243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["C6Folg1vjPHrEq2bg4"]} -{"Format": "IDEA0", "ID": "1b381572-4a6c-4314-9530-1f6d623abf3d", "DetectTime": "2023-10-30T13:57:47.476904+02:00", "EventTime": "2023-10-30T13:57:47.476931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CGMqCh4noSAJhqGhU2"]} -{"Format": "IDEA0", "ID": "4a5d9ca4-fa87-443d-b64c-b3c43e729967", "DetectTime": "2023-10-30T13:57:47.526154+02:00", "EventTime": "2023-10-30T13:57:47.526335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CF6mws4XCNnayvPGUa"]} -{"Format": "IDEA0", "ID": "ccebb374-3603-4214-a639-5e94914a62d7", "DetectTime": "2023-10-30T13:57:47.583211+02:00", "EventTime": "2023-10-30T13:57:47.583227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["Cf14WK8eZtbcvNLP7"]} -{"Format": "IDEA0", "ID": "2d32d991-c4f3-4958-b4e9-a48eba5671d8", "DetectTime": "2023-10-30T13:57:47.637124+02:00", "EventTime": "2023-10-30T13:57:47.637146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CuVt2Z3j2ECew9dzM3"]} -{"Format": "IDEA0", "ID": "497ca380-a3c1-4843-894d-7bd1613488b4", "DetectTime": "2023-10-30T13:57:47.692525+02:00", "EventTime": "2023-10-30T13:57:47.692546+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0eqIp4lMDHCogAVwc"]} -{"Format": "IDEA0", "ID": "ddc4702c-7928-494d-a617-ed5ed6366bcd", "DetectTime": "2023-10-30T13:57:47.712383+02:00", "EventTime": "2023-10-30T13:57:47.712407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CiCOsF1wqn8luElrLf"]} -{"Format": "IDEA0", "ID": "b1f17a07-af53-4d9d-aeea-fb0c63b806fe", "DetectTime": "2023-10-30T13:57:47.767397+02:00", "EventTime": "2023-10-30T13:57:47.767422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["ChEETI1oOBhcdPvdTf"]} -{"Format": "IDEA0", "ID": "bad5559f-c31f-4fba-bcd3-1297d5b3e782", "DetectTime": "2023-10-30T13:57:47.818832+02:00", "EventTime": "2023-10-30T13:57:47.818849+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.103"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.103.", "ContentType": "text/plain"}], "uids": ["C3ckwj4jbsvt5iBAD1"]} -{"Format": "IDEA0", "ID": "76c28293-6ff8-4bcc-918e-c942599c2ed5", "DetectTime": "2023-10-30T13:57:47.834743+02:00", "EventTime": "2023-10-30T13:57:47.834761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CvHnuC2HmMSksJnnTa"]} -{"Format": "Json", "ID": "76c28293-6ff8-4bcc-918e-c942599c2ed5", "DetectTime": "2023-10-30T13:57:47.834743+02:00", "EventTime": "2023-10-30T13:57:47.834761+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:40:00.422719+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:47.929367)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2eb08bdf-135b-49e6-888f-4f76ced34eeb", "DetectTime": "2023-10-30T13:57:47.938695+02:00", "EventTime": "2023-10-30T13:57:47.938719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CAiri5o70aSeVVMj9"]} -{"Format": "IDEA0", "ID": "60d26642-8074-455a-a77a-dd2d40dce0e8", "DetectTime": "2023-10-30T13:57:47.991529+02:00", "EventTime": "2023-10-30T13:57:47.991575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CEjiTx4hA2sKbGRlmi"]} -{"Format": "IDEA0", "ID": "48a63fff-f489-4656-8b6f-f8d1a5c50f99", "DetectTime": "2023-10-30T13:57:48.042075+02:00", "EventTime": "2023-10-30T13:57:48.042099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CMXyCF1zakhtYWxBV9"]} -{"Format": "IDEA0", "ID": "d5bc639c-6953-4cbb-8a01-04eb5f4ec39b", "DetectTime": "2023-10-30T13:57:48.095146+02:00", "EventTime": "2023-10-30T13:57:48.095207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CWCjVp4szVB9U5ogk6"]} -{"Format": "IDEA0", "ID": "07d4b99a-8751-4378-bc84-0e92d6a3d886", "DetectTime": "2023-10-30T13:57:48.148503+02:00", "EventTime": "2023-10-30T13:57:48.148524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["C6qYMx2lawl8IVA1v7"]} -{"Format": "IDEA0", "ID": "bbf9678e-966b-44e4-8d1c-70bd6d208e72", "DetectTime": "2023-10-30T13:57:48.201349+02:00", "EventTime": "2023-10-30T13:57:48.201374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CCoxVf1doZu62bxVNf"]} -{"Format": "IDEA0", "ID": "65962dde-2fd7-4cf1-bdcc-10182ca8e45d", "DetectTime": "2023-10-30T13:57:48.252482+02:00", "EventTime": "2023-10-30T13:57:48.252501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CEIyrb1Lat8VkCxyU4"]} -{"Format": "IDEA0", "ID": "94c7495c-d143-400b-aab7-ab5e23ddd443", "DetectTime": "2023-10-30T13:57:48.306334+02:00", "EventTime": "2023-10-30T13:57:48.306358+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqIiil4FinlwVv0l01"]} -{"Format": "IDEA0", "ID": "082769f5-8983-4dda-b608-5bf74c2a04a5", "DetectTime": "2023-10-30T13:57:48.323716+02:00", "EventTime": "2023-10-30T13:57:48.323796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["Ct64Ks4jF4nckPaCX2"]} -{"Format": "Json", "ID": "082769f5-8983-4dda-b608-5bf74c2a04a5", "DetectTime": "2023-10-30T13:57:48.323716+02:00", "EventTime": "2023-10-30T13:57:48.323796+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:40:02.347288+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:48.405998)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b59e5abf-1df0-443e-a1a0-937769a33f6d", "DetectTime": "2023-10-30T13:57:48.413397+02:00", "EventTime": "2023-10-30T13:57:48.413415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CgsMdJ862okKLvrBd"]} -{"Format": "IDEA0", "ID": "91890112-cf10-4851-b4f2-7f3e3c9464de", "DetectTime": "2023-10-30T13:57:48.464787+02:00", "EventTime": "2023-10-30T13:57:48.464808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CDbUgP2SSYIcApIWn4"]} -{"Format": "IDEA0", "ID": "0baa458b-1e8f-4510-9d4b-b0bed3c938f5", "DetectTime": "2023-10-30T13:57:48.509523+02:00", "EventTime": "2023-10-30T13:57:48.509539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CeRVEa2LB7pNN8vnri"]} -{"Format": "IDEA0", "ID": "9a308474-5a34-45f3-84d0-e9e0fd743137", "DetectTime": "2023-10-30T13:57:48.552235+02:00", "EventTime": "2023-10-30T13:57:48.552261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["CBbnEcUTRPXi6d0A"]} -{"Format": "IDEA0", "ID": "bb814a42-c9a7-4651-8ffa-8b5854aa3f22", "DetectTime": "2023-10-30T13:57:48.595606+02:00", "EventTime": "2023-10-30T13:57:48.595627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["C01sMI16L9BxMJ3HXe"]} -{"Format": "IDEA0", "ID": "0afcfcba-47ca-4e1a-8c5b-267215a1443c", "DetectTime": "2023-10-30T13:57:48.635078+02:00", "EventTime": "2023-10-30T13:57:48.635095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. ", "ContentType": "text/plain"}], "uids": ["C29KgU3fCi5yNSxsme"]} -{"Format": "IDEA0", "ID": "393309bc-ddcb-4a3f-982a-d17a098e61de", "DetectTime": "2023-10-30T13:57:48.675721+02:00", "EventTime": "2023-10-30T13:57:48.675750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["C6jOjV1Ri9R22hDmFh"]} -{"Format": "IDEA0", "ID": "6c268fdd-24e7-4ec2-b66f-0ae1cd906aa8", "DetectTime": "2023-10-30T13:57:48.714365+02:00", "EventTime": "2023-10-30T13:57:48.714385+02:00", "Category": ["Anomaly.File"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.154.224.18"], "Type": ["ExecutableMIMEType"]}], "Attach": [{"Content": "download of an executable with mime type: ['application/x-dosexec'] by 10.0.2.19 from 184.154.224.18 .", "ContentType": "text/plain"}], "uids": ["CTKirM1qwBiYoQH50h"]} -{"Format": "IDEA0", "ID": "b080fda9-6408-4011-82b7-284f362dfb90", "DetectTime": "2023-10-30T13:57:48.742057+02:00", "EventTime": "2023-10-30T13:57:48.742082+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.154.224.18"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 184.154.224.18.", "ContentType": "text/plain"}], "uids": ["CTKirM1qwBiYoQH50h"]} -{"Format": "IDEA0", "ID": "8e65633f-489b-439b-aa99-4850c55acb46", "DetectTime": "2023-10-30T13:57:48.761620+02:00", "EventTime": "2023-10-30T13:57:48.761645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. ", "ContentType": "text/plain"}], "uids": ["CAlrwc3r4j5Ph1YGld"]} -{"Format": "Json", "ID": "8e65633f-489b-439b-aa99-4850c55acb46", "DetectTime": "2023-10-30T13:57:48.761620+02:00", "EventTime": "2023-10-30T13:57:48.761645+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2114], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:40:40.936900+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:48.854866)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8c377971-cc1f-4c15-b5e2-9c70a0592e47", "DetectTime": "2023-10-30T13:57:48.862513+02:00", "EventTime": "2023-10-30T13:57:48.862542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["CxhkUN3WPNmEq73id1"]} -{"Format": "IDEA0", "ID": "3ec141be-d1a6-4ae5-8fc4-61a013a4f0c5", "DetectTime": "2023-10-30T13:57:48.919794+02:00", "EventTime": "2023-10-30T13:57:48.919825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["Cnywfp3avurKGiP1pc"]} -{"Format": "IDEA0", "ID": "15dd0a34-d6b9-4bda-9cf5-a0ab9cb17e2c", "DetectTime": "2023-10-30T13:57:48.979286+02:00", "EventTime": "2023-10-30T13:57:48.979307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CTM4EX3Fboz3h95JZj"]} -{"Format": "IDEA0", "ID": "9ddde777-f389-41c5-97fe-3828710ab33e", "DetectTime": "2023-10-30T13:57:49.017379+02:00", "EventTime": "2023-10-30T13:57:49.017397+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsLS1k2vfaqCbE53sh"]} -{"Format": "IDEA0", "ID": "831835d7-9eb4-4de8-9426-8f664f9553fa", "DetectTime": "2023-10-30T13:57:49.030658+02:00", "EventTime": "2023-10-30T13:57:49.030676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CXb7RD2kuY9DZafu59"]} -{"Format": "IDEA0", "ID": "b75f4658-7fa4-4a2a-ae3f-991651acd82c", "DetectTime": "2023-10-30T13:57:49.065265+02:00", "EventTime": "2023-10-30T13:57:49.065292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["Ccs2CT2VWEfJdUiPGi"]} -{"Format": "IDEA0", "ID": "e470fcbb-cb8b-420f-a6b2-73c427fcae7d", "DetectTime": "2023-10-30T13:57:49.111662+02:00", "EventTime": "2023-10-30T13:57:49.111683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["Cbv8zrUAxAxO8gsj3"]} -{"Format": "IDEA0", "ID": "13d4a38b-20ed-442e-8349-cec80d7f8e00", "DetectTime": "2023-10-30T13:57:49.154769+02:00", "EventTime": "2023-10-30T13:57:49.154829+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C68LDy1cL28iDbChNk"]} -{"Format": "IDEA0", "ID": "94041d1d-b6df-4842-ac5d-0e0aba6830e1", "DetectTime": "2023-10-30T13:57:49.172490+02:00", "EventTime": "2023-10-30T13:57:49.172510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["Cg9a9x4cO0CLkuJT4l"]} -{"Format": "IDEA0", "ID": "6e28da1c-1bc6-4f8a-a208-dedc30b90a4e", "DetectTime": "2023-10-30T13:57:49.222021+02:00", "EventTime": "2023-10-30T13:57:49.222044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CsLS1k2vfaqCbE53sh", "C3ckwj4jbsvt5iBAD1", "C2kzUy3LfNNjbCnLcg", "CO4E8AynDfpB4laQ4"]} -{"Format": "IDEA0", "ID": "cd7356f3-14f8-4783-a176-9bc2fa84c82b", "DetectTime": "2023-10-30T13:57:49.249885+02:00", "EventTime": "2023-10-30T13:57:49.249970+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2kzUy3LfNNjbCnLcg"]} -{"Format": "IDEA0", "ID": "f28cac5a-aaec-4334-a978-c5afe937b91e", "DetectTime": "2023-10-30T13:57:49.274962+02:00", "EventTime": "2023-10-30T13:57:49.275006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["C53R8028hVPnN3SJs"]} -{"Format": "Json", "ID": "f28cac5a-aaec-4334-a978-c5afe937b91e", "DetectTime": "2023-10-30T13:57:49.274962+02:00", "EventTime": "2023-10-30T13:57:49.275006+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T10:40:44.395349+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2023/10/30 13:57:49.365684)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb9a5dd0-8aa3-4871-b4cf-440954e5d213", "DetectTime": "2023-10-30T13:57:49.372460+02:00", "EventTime": "2023-10-30T13:57:49.372478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["C00Xvw16StemyUxSUk"]} -{"Format": "IDEA0", "ID": "d21cf7ce-0ed9-475d-ad23-6354bddd1064", "DetectTime": "2023-10-30T13:57:49.412908+02:00", "EventTime": "2023-10-30T13:57:49.412934+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9Rc4H24HQLyG2WJK1"]} -{"Format": "IDEA0", "ID": "5641e449-2ddc-4a6d-9bb1-d05b1fb1b85a", "DetectTime": "2023-10-30T13:57:49.428457+02:00", "EventTime": "2023-10-30T13:57:49.428472+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9IQL01xryaewxkS2"]} -{"Format": "IDEA0", "ID": "d27fd6a3-245f-49c0-bd1a-5ee9829a2836", "DetectTime": "2023-10-30T13:57:49.447102+02:00", "EventTime": "2023-10-30T13:57:49.447124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CVbkIA27CvBmtmbIQ3"]} -{"Format": "IDEA0", "ID": "be07fa42-30a0-4129-b392-23c3ccc0df24", "DetectTime": "2023-10-30T13:57:49.499878+02:00", "EventTime": "2023-10-30T13:57:49.499907+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChG0sP1T2aRhjQ2Ywj"]} -{"Format": "IDEA0", "ID": "aec2faf8-2525-4b32-804e-f6db0c4a2a2b", "DetectTime": "2023-10-30T13:57:49.516487+02:00", "EventTime": "2023-10-30T13:57:49.516649+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFa3PO2n7181ntah8h"]} -{"Format": "IDEA0", "ID": "8313b1db-2a40-4aef-afd1-45b8b7dacb5b", "DetectTime": "2023-10-30T13:57:49.537043+02:00", "EventTime": "2023-10-30T13:57:49.537063+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CH9cdv3enerrphHBG5"]} -{"Format": "IDEA0", "ID": "83eae904-d264-4c2a-b391-09eeb153e322", "DetectTime": "2023-10-30T13:57:49.552815+02:00", "EventTime": "2023-10-30T13:57:49.552842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CpRsMs25UuGh99cGe"]} -{"Format": "IDEA0", "ID": "7c8d7387-a221-4371-960b-81f1c68d75c6", "DetectTime": "2023-10-30T13:57:49.612674+02:00", "EventTime": "2023-10-30T13:57:49.612700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["Cf6DZo23H3GHbnSjll"]} -{"Format": "IDEA0", "ID": "815e55df-4fb3-4ae4-a3a3-4684106e3119", "DetectTime": "2023-10-30T13:57:49.666132+02:00", "EventTime": "2023-10-30T13:57:49.666149+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4J03v3a0nc8Q378w4"]} -{"Format": "IDEA0", "ID": "481ef67d-4436-48b1-a3fd-bcf7ceeb5a81", "DetectTime": "2023-10-30T13:57:49.683658+02:00", "EventTime": "2023-10-30T13:57:49.683676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["Cu8lUA4Ve4VVA86i6j"]} -{"Format": "IDEA0", "ID": "beadee8f-5c55-4cfa-a7d9-9831ed504f13", "DetectTime": "2023-10-30T13:57:49.732105+02:00", "EventTime": "2023-10-30T13:57:49.732125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CFSh4L6iL3cANglg4"]} -{"Format": "IDEA0", "ID": "41ed77f3-270d-4f5d-bd51-f97c6df208b4", "DetectTime": "2023-10-30T13:57:49.784958+02:00", "EventTime": "2023-10-30T13:57:49.784984+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9apHH3Ay03VCe9PQd"]} -{"Format": "IDEA0", "ID": "96aab7b4-b1de-4f51-888f-8f176ab2b9eb", "DetectTime": "2023-10-30T13:57:49.800513+02:00", "EventTime": "2023-10-30T13:57:49.800627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["Cg8tiX1We83r64YJxd"]} -{"Format": "Json", "ID": "96aab7b4-b1de-4f51-888f-8f176ab2b9eb", "DetectTime": "2023-10-30T13:57:49.800513+02:00", "EventTime": "2023-10-30T13:57:49.800627+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:12:05.502937+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:57:50.063687)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7f61db50-48e2-4d50-aec0-0022b7d93f4d", "DetectTime": "2023-10-30T13:57:50.071169+02:00", "EventTime": "2023-10-30T13:57:50.071190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CWJks146Q7zz7H3Kf8"]} -{"Format": "IDEA0", "ID": "49065300-64e5-4f1b-993f-70ff66565d70", "DetectTime": "2023-10-30T13:57:50.144236+02:00", "EventTime": "2023-10-30T13:57:50.144256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9IQL01xryaewxkS2", "CFa3PO2n7181ntah8h", "C4J03v3a0nc8Q378w4", "CqLNG252JqDlQMo3h"]} -{"Format": "IDEA0", "ID": "5dd5c393-9ef6-455a-980f-3ad68d53186a", "DetectTime": "2023-10-30T13:57:50.165825+02:00", "EventTime": "2023-10-30T13:57:50.165981+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqLNG252JqDlQMo3h"]} -{"Format": "IDEA0", "ID": "bf1e9432-193b-4aea-a9f4-f099fbe34bc4", "DetectTime": "2023-10-30T13:57:50.183851+02:00", "EventTime": "2023-10-30T13:57:50.183875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CoHyYN1r6kJoO0Qx87"]} -{"Format": "IDEA0", "ID": "66cdc768-2a52-4f0e-95a4-0c79f1960449", "DetectTime": "2023-10-30T13:57:50.241685+02:00", "EventTime": "2023-10-30T13:57:50.241711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["CNGjk615hdBE0mFNfj"]} -{"Format": "IDEA0", "ID": "fbba12c9-a9a4-4738-ace8-d32caea602a5", "DetectTime": "2023-10-30T13:57:50.294691+02:00", "EventTime": "2023-10-30T13:57:50.294713+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKvgIkkiUCTiLd5q4"]} -{"Format": "IDEA0", "ID": "2fb39abd-4823-4dea-b9e6-b60fd1e47c0c", "DetectTime": "2023-10-30T13:57:50.313736+02:00", "EventTime": "2023-10-30T13:57:50.313810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CvxWtjMuX0wcMfRO7"]} -{"Format": "IDEA0", "ID": "b5d2d72d-09eb-4f7c-93c3-94afe4df47dd", "DetectTime": "2023-10-30T13:57:50.371393+02:00", "EventTime": "2023-10-30T13:57:50.371422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CbT0aw2NGpGXSM4Xfg"]} -{"Format": "IDEA0", "ID": "d03f00dd-664b-4544-ac17-327095dbf743", "DetectTime": "2023-10-30T13:57:50.425238+02:00", "EventTime": "2023-10-30T13:57:50.425257+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzsH0f3lvbcIl12wH4"]} -{"Format": "IDEA0", "ID": "53ff3b15-a868-4e99-b63b-49f93541eb05", "DetectTime": "2023-10-30T13:57:50.454489+02:00", "EventTime": "2023-10-30T13:57:50.454517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. ", "ContentType": "text/plain"}], "uids": ["CftqJoIGLRVVyPhbb"]} -{"Format": "IDEA0", "ID": "110b8348-ec5b-4626-a38e-898877e5cd73", "DetectTime": "2023-10-30T13:57:50.510933+02:00", "EventTime": "2023-10-30T13:57:50.510954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CbQUG91ANQsccqST22"]} -{"Format": "IDEA0", "ID": "76c4ec85-a40b-4e5d-9eeb-261b15e87e84", "DetectTime": "2023-10-30T13:57:50.571936+02:00", "EventTime": "2023-10-30T13:57:50.571956+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBkagU9GpTY6KyVmk"]} -{"Format": "IDEA0", "ID": "b6c1fad7-1372-4df5-a153-0f9c9e2b5d67", "DetectTime": "2023-10-30T13:57:50.590634+02:00", "EventTime": "2023-10-30T13:57:50.590654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. ", "ContentType": "text/plain"}], "uids": ["CGrAaV2PgAnG4qcUt5"]} -{"Format": "Json", "ID": "b6c1fad7-1372-4df5-a153-0f9c9e2b5d67", "DetectTime": "2023-10-30T13:57:50.590634+02:00", "EventTime": "2023-10-30T13:57:50.590654+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:12:23.738928+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:57:50.681676)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a7e22afb-768c-4b24-93ed-8724c376594e", "DetectTime": "2023-10-30T13:57:50.689232+02:00", "EventTime": "2023-10-30T13:57:50.689253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CMgYf53XhDNHjjRR7f"]} -{"Format": "IDEA0", "ID": "46efbb6a-e445-49bb-9629-f32287553c8b", "DetectTime": "2023-10-30T13:57:50.741028+02:00", "EventTime": "2023-10-30T13:57:50.741046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CQQsk839IdQvzWafTa"]} -{"Format": "IDEA0", "ID": "0b1d2cb2-e3ff-4aaf-9614-b1ab9d0b8567", "DetectTime": "2023-10-30T13:57:50.791319+02:00", "EventTime": "2023-10-30T13:57:50.791338+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeZSuD4Uy4Jt18ClE8"]} -{"Format": "IDEA0", "ID": "80ac7bec-59e8-40d4-b6b2-93b02b22ce79", "DetectTime": "2023-10-30T13:57:50.812915+02:00", "EventTime": "2023-10-30T13:57:50.812941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C2N0Ii2xbVj8MggMsi"]} -{"Format": "IDEA0", "ID": "8cf85d92-df49-4097-b177-fb1cd6c83180", "DetectTime": "2023-10-30T13:57:50.862746+02:00", "EventTime": "2023-10-30T13:57:50.862772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CEFu0dd6s3WleYLw3"]} -{"Format": "IDEA0", "ID": "84fa02eb-6682-42f0-8d45-3c9d7a8e7ecd", "DetectTime": "2023-10-30T13:57:50.906141+02:00", "EventTime": "2023-10-30T13:57:50.906165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CvENBI3AK57yjUziP4"]} -{"Format": "IDEA0", "ID": "a74c5002-9bd6-4212-bf03-a4586f74fe68", "DetectTime": "2023-10-30T13:57:50.954514+02:00", "EventTime": "2023-10-30T13:57:50.954543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CTFX4a4eFkxWUDnEMh"]} -{"Format": "IDEA0", "ID": "57e65172-9fd2-4c45-9015-3800359748a2", "DetectTime": "2023-10-30T13:57:51.007497+02:00", "EventTime": "2023-10-30T13:57:51.007535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["Ck4op73Nxviy2YJ6Pd"]} -{"Format": "IDEA0", "ID": "99d6151f-58a2-4bd1-b4ff-42e178111ecd", "DetectTime": "2023-10-30T13:57:51.051132+02:00", "EventTime": "2023-10-30T13:57:51.051149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["CDHR3m1Qg8ybxT7y23"]} -{"Format": "Json", "ID": "99d6151f-58a2-4bd1-b4ff-42e178111ecd", "DetectTime": "2023-10-30T13:57:51.051132+02:00", "EventTime": "2023-10-30T13:57:51.051149+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:12:25.919864+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:57:51.131993)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3874b2b7-8391-4e32-af62-2b65e36d20ad", "DetectTime": "2023-10-30T13:57:51.138649+02:00", "EventTime": "2023-10-30T13:57:51.138668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["Ck3Qed3BoLKl1af278"]} -{"Format": "IDEA0", "ID": "93230f79-cc11-41b8-b3cf-67eaab0bf074", "DetectTime": "2023-10-30T13:57:51.191618+02:00", "EventTime": "2023-10-30T13:57:51.191640+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CskUJ4r174mLjc8u5"]} -{"Format": "IDEA0", "ID": "4abb2e35-0f82-4ddd-bda8-c35f77ca3e58", "DetectTime": "2023-10-30T13:57:51.210065+02:00", "EventTime": "2023-10-30T13:57:51.210141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. ", "ContentType": "text/plain"}], "uids": ["C0ugLo2b8RzguILwof"]} -{"Format": "IDEA0", "ID": "8b7316c4-4561-4f73-ae20-fa84aea6f972", "DetectTime": "2023-10-30T13:57:51.256555+02:00", "EventTime": "2023-10-30T13:57:51.256575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CHDxEJ3wjkHXfQM4If"]} -{"Format": "IDEA0", "ID": "c6a1ad20-d7e1-49b0-8b9e-47d5b241b194", "DetectTime": "2023-10-30T13:57:51.302335+02:00", "EventTime": "2023-10-30T13:57:51.302359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["CezeiN133odmMm7Pmd"]} -{"Format": "IDEA0", "ID": "90790668-affb-47a9-a94b-941843b879a1", "DetectTime": "2023-10-30T13:57:51.351883+02:00", "EventTime": "2023-10-30T13:57:51.351905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["CLkiBQ2oBaxGHCtZMj"]} -{"Format": "IDEA0", "ID": "a119504f-46af-48cb-9dde-46e6d503c3a9", "DetectTime": "2023-10-30T13:57:51.400542+02:00", "EventTime": "2023-10-30T13:57:51.400557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["Ck5INJUAoKPJfjNLh"]} -{"Format": "IDEA0", "ID": "3c49a5f3-3ddb-480e-9273-933ba8ce4163", "DetectTime": "2023-10-30T13:57:51.454494+02:00", "EventTime": "2023-10-30T13:57:51.454511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CmEvwE2JvyHgwyd957"]} -{"Format": "IDEA0", "ID": "94dcc883-b313-43ac-973f-8119f8d21dc3", "DetectTime": "2023-10-30T13:57:51.504968+02:00", "EventTime": "2023-10-30T13:57:51.504984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CLDprwiJh1902tPkb"]} -{"Format": "IDEA0", "ID": "0b39291c-99ca-4b48-bf21-951bc43e6844", "DetectTime": "2023-10-30T13:57:51.534671+02:00", "EventTime": "2023-10-30T13:57:51.534687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CigL3e25uDHlT99o6j"]} -{"Format": "Json", "ID": "0b39291c-99ca-4b48-bf21-951bc43e6844", "DetectTime": "2023-10-30T13:57:51.534671+02:00", "EventTime": "2023-10-30T13:57:51.534687+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:13:05.509132+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:57:51.613236)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a7192fa0-6331-42e4-8190-e014fde8d6cb", "DetectTime": "2023-10-30T13:57:51.623733+02:00", "EventTime": "2023-10-30T13:57:51.623763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["Cxbwrr1sqoScnHWQ46"]} -{"Format": "IDEA0", "ID": "a997eafb-e774-4691-84d4-bc65760ba6f5", "DetectTime": "2023-10-30T13:57:51.673078+02:00", "EventTime": "2023-10-30T13:57:51.673136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["CDJnuw3wqhDJ7ms7ha"]} -{"Format": "IDEA0", "ID": "f24ab1b0-e0c8-4519-ab08-033d167c4249", "DetectTime": "2023-10-30T13:57:51.715551+02:00", "EventTime": "2023-10-30T13:57:51.715569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["CPc4RB33hLgNtmC8Gf"]} -{"Format": "IDEA0", "ID": "7c407798-61be-48f4-a633-20fd4a0e94ee", "DetectTime": "2023-10-30T13:57:51.754877+02:00", "EventTime": "2023-10-30T13:57:51.754906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["CcgXUX1HJ177qmbUec"]} -{"Format": "IDEA0", "ID": "d06e0998-681a-4c98-8728-be76dead1e33", "DetectTime": "2023-10-30T13:57:51.795200+02:00", "EventTime": "2023-10-30T13:57:51.795220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["Csf22I19K0f1OwF2h"]} -{"Format": "IDEA0", "ID": "2d4994f4-9fa7-4ada-a6ac-9f41d75ee879", "DetectTime": "2023-10-30T13:57:51.833294+02:00", "EventTime": "2023-10-30T13:57:51.833322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CbX6832YZ6MTPYsNP3"]} -{"Format": "IDEA0", "ID": "1a54388f-c875-44e4-971c-e18eb91688f9", "DetectTime": "2023-10-30T13:57:51.870374+02:00", "EventTime": "2023-10-30T13:57:51.870396+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiJHHY2hGdjwItCYvl"]} -{"Format": "IDEA0", "ID": "aebeb511-2f3c-41c9-9f0a-ce46c5b4b10d", "DetectTime": "2023-10-30T13:57:51.885860+02:00", "EventTime": "2023-10-30T13:57:51.885887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CA40KZsydkdTItgc9"]} -{"Format": "IDEA0", "ID": "446bbaa7-d140-4499-855b-587717437891", "DetectTime": "2023-10-30T13:57:51.921949+02:00", "EventTime": "2023-10-30T13:57:51.921971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. ", "ContentType": "text/plain"}], "uids": ["CjaiD833OTppy453Og"]} -{"Format": "Json", "ID": "446bbaa7-d140-4499-855b-587717437891", "DetectTime": "2023-10-30T13:57:51.921949+02:00", "EventTime": "2023-10-30T13:57:51.921971+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:44:33.099357+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:57:51.987444)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f7dcbf10-2737-49a4-aff5-fc2f8f66045e", "DetectTime": "2023-10-30T13:57:51.994389+02:00", "EventTime": "2023-10-30T13:57:51.994411+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cxif6Z2H4PthhLKC2d"]} -{"Format": "IDEA0", "ID": "7c8512c8-e850-433c-8438-70e6b63d5b25", "DetectTime": "2023-10-30T13:57:52.012220+02:00", "EventTime": "2023-10-30T13:57:52.012241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CU3p7gtQ8OcJqqR2d"]} -{"Format": "IDEA0", "ID": "068f937e-24db-4134-805e-2c996a67a20d", "DetectTime": "2023-10-30T13:57:52.047280+02:00", "EventTime": "2023-10-30T13:57:52.047300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CyNrqQ3ELSUROyvZcg"]} -{"Format": "IDEA0", "ID": "b27f0c6d-5429-4d76-bc5f-149933ad9737", "DetectTime": "2023-10-30T13:57:52.084673+02:00", "EventTime": "2023-10-30T13:57:52.084691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CiJHHY2hGdjwItCYvl", "CzsH0f3lvbcIl12wH4", "CeZSuD4Uy4Jt18ClE8", "CmUbS83MzoiyWAJN4"]} -{"Format": "IDEA0", "ID": "976a9df2-0895-4c6f-a854-b8af3445ba1d", "DetectTime": "2023-10-30T13:57:52.101393+02:00", "EventTime": "2023-10-30T13:57:52.101415+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmUbS83MzoiyWAJN4"]} -{"Format": "IDEA0", "ID": "d52c5bf4-5f2c-4448-b31f-c8b4af5bf52a", "DetectTime": "2023-10-30T13:57:52.117129+02:00", "EventTime": "2023-10-30T13:57:52.117147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CBQFWZpol9v3fq899"]} -{"Format": "IDEA0", "ID": "2ac85e3b-062a-4342-a532-331e63f6cae7", "DetectTime": "2023-10-30T13:57:52.153919+02:00", "EventTime": "2023-10-30T13:57:52.153947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CIN7K32hMUaq7h3KVb"]} -{"Format": "IDEA0", "ID": "a629db10-6187-467c-9514-95180456e044", "DetectTime": "2023-10-30T13:57:52.187946+02:00", "EventTime": "2023-10-30T13:57:52.187966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. ", "ContentType": "text/plain"}], "uids": ["CvbXRn1T61pq1doBAg"]} -{"Format": "IDEA0", "ID": "44b8a9c5-7cd1-402a-a644-156283f640f4", "DetectTime": "2023-10-30T13:57:52.223078+02:00", "EventTime": "2023-10-30T13:57:52.223095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. ", "ContentType": "text/plain"}], "uids": ["C6aJUw1hzZIaHVThnh"]} -{"Format": "IDEA0", "ID": "6ac994fe-0cf6-44ab-ad5a-8fce112b1923", "DetectTime": "2023-10-30T13:57:52.253517+02:00", "EventTime": "2023-10-30T13:57:52.253530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CKMHPrcleLRvGtIX7"]} -{"Format": "IDEA0", "ID": "e67abd37-9553-4149-aa54-73a0c0f54dc0", "DetectTime": "2023-10-30T13:57:52.288144+02:00", "EventTime": "2023-10-30T13:57:52.288161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["Ca6qnT1NY52lA68KV8"]} -{"Format": "IDEA0", "ID": "04acea88-89d4-4857-9208-c4322e1ede57", "DetectTime": "2023-10-30T13:57:52.315335+02:00", "EventTime": "2023-10-30T13:57:52.315355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["Cunwku1C34sb5Q5T4e"]} -{"Format": "Json", "ID": "04acea88-89d4-4857-9208-c4322e1ede57", "DetectTime": "2023-10-30T13:57:52.315335+02:00", "EventTime": "2023-10-30T13:57:52.315355+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:44:59.840784+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:57:52.377998)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "69c42c4c-7d72-4355-9948-2342fae12f41", "DetectTime": "2023-10-30T13:57:52.384482+02:00", "EventTime": "2023-10-30T13:57:52.384500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CCKuYdpOpq2KHfWZd"]} -{"Format": "IDEA0", "ID": "2638948f-3953-45af-8a94-d307c61aada1", "DetectTime": "2023-10-30T13:57:52.419297+02:00", "EventTime": "2023-10-30T13:57:52.419317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["Cl2zht4uWB2j017WD9"]} -{"Format": "IDEA0", "ID": "2f62ccb3-6868-48fe-8a8e-88b26f3667fc", "DetectTime": "2023-10-30T13:57:52.448956+02:00", "EventTime": "2023-10-30T13:57:52.448975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["C9qqKw2soMtA5c3Ahh"]} -{"Format": "IDEA0", "ID": "2d029e1a-e2fb-46f7-be12-ea71eeb23f99", "DetectTime": "2023-10-30T13:57:52.478176+02:00", "EventTime": "2023-10-30T13:57:52.478205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CNYnL71cQfleJIfB2e"]} -{"Format": "IDEA0", "ID": "de5229c9-8d1d-47c9-a180-59d461d434a4", "DetectTime": "2023-10-30T13:57:52.508325+02:00", "EventTime": "2023-10-30T13:57:52.508342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["C0EByP2sRxsWqSDHE2"]} -{"Format": "IDEA0", "ID": "926e6529-c891-440b-8436-658bc8158643", "DetectTime": "2023-10-30T13:57:52.535991+02:00", "EventTime": "2023-10-30T13:57:52.536009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.68.90.31 ", "ContentType": "text/plain"}], "uids": ["CjsW7x4f6a0bOyXni4"]} -{"Format": "IDEA0", "ID": "77c30299-1e49-40db-ae5a-ab67032471da", "DetectTime": "2023-10-30T13:57:52.561477+02:00", "EventTime": "2023-10-30T13:57:52.561497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CPRs2K3TzljBUW3B6l"]} -{"Format": "IDEA0", "ID": "5ec0ae7c-acc3-4834-a328-815b16e996e5", "DetectTime": "2023-10-30T13:57:52.588774+02:00", "EventTime": "2023-10-30T13:57:52.588792+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHfAXn4pWuvwLI0Lu5"]} -{"Format": "IDEA0", "ID": "9b5aee64-dde1-4b4a-b383-70c82fa47c39", "DetectTime": "2023-10-30T13:57:52.607730+02:00", "EventTime": "2023-10-30T13:57:52.607751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CSMFDV1dJ72g0SKXbf"]} -{"Format": "IDEA0", "ID": "74329658-72e7-4242-bfc5-e5e9d672970e", "DetectTime": "2023-10-30T13:57:52.633566+02:00", "EventTime": "2023-10-30T13:57:52.633590+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCXCSEReHMs4vwKhe"]} -{"Format": "IDEA0", "ID": "b8b259d9-0c78-4aae-a268-5d875895c5d2", "DetectTime": "2023-10-30T13:57:52.647483+02:00", "EventTime": "2023-10-30T13:57:52.647506+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI97SQ2zTEdfLuItzg"]} -{"Format": "IDEA0", "ID": "b4204f77-0846-4c69-925e-b0870d36860e", "DetectTime": "2023-10-30T13:57:52.662120+02:00", "EventTime": "2023-10-30T13:57:52.662139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CPzyr32d28khSZBMcb"]} -{"Format": "IDEA0", "ID": "d24f2ada-a116-486a-a764-d66560df40d9", "DetectTime": "2023-10-30T13:57:52.687772+02:00", "EventTime": "2023-10-30T13:57:52.687796+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cx7io44LEgmUH9mnBb"]} -{"Format": "IDEA0", "ID": "7cb4a92f-027c-44d7-88e6-e4fb75ef08db", "DetectTime": "2023-10-30T13:57:52.704380+02:00", "EventTime": "2023-10-30T13:57:52.704408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CCd4mNLwIhlWgRld1"]} -{"Format": "IDEA0", "ID": "daa7f353-0e35-4d07-bf6d-495082de57ab", "DetectTime": "2023-10-30T13:57:52.734343+02:00", "EventTime": "2023-10-30T13:57:52.734360+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoOE4q1QPhUpg3dXA8"]} -{"Format": "IDEA0", "ID": "03a8d9b4-c2d6-45fd-9dca-47f85daa6517", "DetectTime": "2023-10-30T13:57:52.756689+02:00", "EventTime": "2023-10-30T13:57:52.756740+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cgj9ya24WAcAUW7Roe"]} -{"Format": "IDEA0", "ID": "90cb644f-7115-4897-bb97-9a1053cadb28", "DetectTime": "2023-10-30T13:57:52.806160+02:00", "EventTime": "2023-10-30T13:57:52.806194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CMuJcz4hJTfS3Oyv96"]} -{"Format": "IDEA0", "ID": "1f90f35d-7290-4f56-9fe7-38c0cd57c716", "DetectTime": "2023-10-30T13:57:52.884186+02:00", "EventTime": "2023-10-30T13:57:52.884206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CD2wrjawar799Nlq8"]} -{"Format": "IDEA0", "ID": "a92e9442-49a4-40bc-ad58-ea86bf35ac53", "DetectTime": "2023-10-30T13:57:52.926982+02:00", "EventTime": "2023-10-30T13:57:52.927005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS701", "ContentType": "text/plain"}], "uids": ["CKCBc22Pnmc9GZLVdh"]} -{"Format": "IDEA0", "ID": "3f6055ee-764a-41ba-bbf2-cb1e0340ce28", "DetectTime": "2023-10-30T13:57:52.982057+02:00", "EventTime": "2023-10-30T13:57:52.982080+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyoRot3Zr91D6pnt65"]} -{"Format": "IDEA0", "ID": "32b89478-6cd1-472b-ba5c-7856efa034e5", "DetectTime": "2023-10-30T13:57:52.996583+02:00", "EventTime": "2023-10-30T13:57:52.996611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CSSfEe2Nvjnm8C1VUf"]} -{"Format": "IDEA0", "ID": "de8199ed-8d8a-4e25-a608-dea14451082f", "DetectTime": "2023-10-30T13:57:53.027217+02:00", "EventTime": "2023-10-30T13:57:53.027243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cx7io44LEgmUH9mnBb", "CGkyTgpZaSAdTdSPf", "Cgj9ya24WAcAUW7Roe", "CCXCSEReHMs4vwKhe"]} -{"Format": "IDEA0", "ID": "b31a1705-6bef-4f81-9e0a-5eaf2137292a", "DetectTime": "2023-10-30T13:57:53.042175+02:00", "EventTime": "2023-10-30T13:57:53.042199+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGkyTgpZaSAdTdSPf"]} -{"Format": "IDEA0", "ID": "49a683dc-97af-4eb0-931b-84e225f467fc", "DetectTime": "2023-10-30T13:57:53.056193+02:00", "EventTime": "2023-10-30T13:57:53.056214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CdzsVf3btnRuC5p35"]} -{"Format": "IDEA0", "ID": "0768253e-685c-4a6c-87e2-91ebe40ffb62", "DetectTime": "2023-10-30T13:57:53.086357+02:00", "EventTime": "2023-10-30T13:57:53.086375+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cwq7st1mGF3LnKETv9"]} -{"Format": "IDEA0", "ID": "34bf4632-c2ef-4b8f-944f-aca94b32d25e", "DetectTime": "2023-10-30T13:57:53.108567+02:00", "EventTime": "2023-10-30T13:57:53.108587+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmbkuN1nSR7TOfwCj4"]} -{"Format": "IDEA0", "ID": "69d8d3c9-c685-4f5f-9b81-82e24dac7fe1", "DetectTime": "2023-10-30T13:57:53.123144+02:00", "EventTime": "2023-10-30T13:57:53.123165+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CycGEl4FTEy3IzUb6"]} -{"Format": "IDEA0", "ID": "a241ec40-3650-4b93-a363-d90f4b77646d", "DetectTime": "2023-10-30T13:57:53.135789+02:00", "EventTime": "2023-10-30T13:57:53.135805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CsvLVF3tHRimUYcMV1"]} -{"Format": "IDEA0", "ID": "78989acc-aa22-43d2-b61c-469d108fa2c9", "DetectTime": "2023-10-30T13:57:53.162300+02:00", "EventTime": "2023-10-30T13:57:53.162317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CE7B381GVIutMQoTG6"]} -{"Format": "IDEA0", "ID": "abc3f80c-5d7f-48de-8873-481383469d29", "DetectTime": "2023-10-30T13:57:53.191158+02:00", "EventTime": "2023-10-30T13:57:53.191179+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDL3Ty2XqrpzEPLw2"]} -{"Format": "IDEA0", "ID": "fded8efa-b744-4c76-b209-ec79dd7ae52a", "DetectTime": "2023-10-30T13:57:53.209334+02:00", "EventTime": "2023-10-30T13:57:53.209350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["C4B7rg2R8Wxab1es5f"]} -{"Format": "IDEA0", "ID": "f5506b24-4f72-4698-b28a-bec0f77c6083", "DetectTime": "2023-10-30T13:57:53.237064+02:00", "EventTime": "2023-10-30T13:57:53.237088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Hostname": ["108-74-172-39.lightspeed.lsanca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CSaq6P2uPFhHlRl9S3"]} -{"Format": "IDEA0", "ID": "4965e02a-1644-45e1-9147-f41dbf9acc3c", "DetectTime": "2023-10-30T13:57:53.263654+02:00", "EventTime": "2023-10-30T13:57:53.263680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CGFREN3Cp239JsjCh"]} -{"Format": "IDEA0", "ID": "7bfc21ca-dc88-4016-8ba7-4888e62be32e", "DetectTime": "2023-10-30T13:57:53.297088+02:00", "EventTime": "2023-10-30T13:57:53.297111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CuKTMy2azFXmfPoJKf"]} -{"Format": "IDEA0", "ID": "1eed17f6-c718-4cb4-8949-8bb8830bdeab", "DetectTime": "2023-10-30T13:57:53.323907+02:00", "EventTime": "2023-10-30T13:57:53.323925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CAxWes3ZxNd5skLOQ"]} -{"Format": "IDEA0", "ID": "4d3ce815-82aa-4bb5-ba0a-08750713fccf", "DetectTime": "2023-10-30T13:57:53.351264+02:00", "EventTime": "2023-10-30T13:57:53.351316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CGb1BL1Snp2Fw1nGB8"]} -{"Format": "IDEA0", "ID": "091a98b5-9120-404f-9904-ff21acd3222a", "DetectTime": "2023-10-30T13:57:53.376912+02:00", "EventTime": "2023-10-30T13:57:53.376930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CYQHW71n0CA9EadRbl"]} -{"Format": "IDEA0", "ID": "9d5c3cc7-0e0b-4762-af5f-1873cc78ca4f", "DetectTime": "2023-10-30T13:57:53.409503+02:00", "EventTime": "2023-10-30T13:57:53.409551+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDFTLj2rq3PiBj2O43"]} -{"Format": "IDEA0", "ID": "b2fef547-038a-4d2e-b9e0-5bc0ece3cf70", "DetectTime": "2023-10-30T13:57:53.426058+02:00", "EventTime": "2023-10-30T13:57:53.426086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CH3Auo3sR6YlgTyz7l"]} -{"Format": "IDEA0", "ID": "db16529d-d0c1-4d66-a93c-45e3989ac103", "DetectTime": "2023-10-30T13:57:53.457456+02:00", "EventTime": "2023-10-30T13:57:53.457483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CcpEyo2XWmHTi0ay44"]} -{"Format": "IDEA0", "ID": "76a19074-5f67-4749-aec4-7936657f1259", "DetectTime": "2023-10-30T13:57:53.496840+02:00", "EventTime": "2023-10-30T13:57:53.496865+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C82Avq4drY5S4gA2W8"]} -{"Format": "IDEA0", "ID": "22689fc7-9ae5-484d-8618-a438e09d9745", "DetectTime": "2023-10-30T13:57:53.515683+02:00", "EventTime": "2023-10-30T13:57:53.515706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CcLdZE3ilz8tYeERhi"]} -{"Format": "IDEA0", "ID": "494e7836-4b14-49ce-ac5a-3aa84d2a91ee", "DetectTime": "2023-10-30T13:57:53.543980+02:00", "EventTime": "2023-10-30T13:57:53.544004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CbR78MaMMWbWdTWO"]} -{"Format": "IDEA0", "ID": "5b4fae80-592b-415d-bb18-dff0b57f7f69", "DetectTime": "2023-10-30T13:57:53.572599+02:00", "EventTime": "2023-10-30T13:57:53.572619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["Ck7T6w4sR4ISMjt313"]} -{"Format": "IDEA0", "ID": "39c893c5-b5dc-4d11-906b-365118539873", "DetectTime": "2023-10-30T13:57:53.601900+02:00", "EventTime": "2023-10-30T13:57:53.601916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CQdkA1imjfggRuyPc"]} -{"Format": "IDEA0", "ID": "5b515f94-1e65-494f-9be1-8575977d0c84", "DetectTime": "2023-10-30T13:57:53.634049+02:00", "EventTime": "2023-10-30T13:57:53.634072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C5cxn41OPechXWYSac"]} -{"Format": "IDEA0", "ID": "b741d792-abec-4797-9ae9-4ffc794e64b7", "DetectTime": "2023-10-30T13:57:53.663732+02:00", "EventTime": "2023-10-30T13:57:53.663760+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBrNL24dzi2nG4q25"]} -{"Format": "IDEA0", "ID": "882c36ac-05ae-4d79-9708-de70041f0108", "DetectTime": "2023-10-30T13:57:53.679778+02:00", "EventTime": "2023-10-30T13:57:53.679829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CxMGhFjZuVulvUTJh"]} -{"Format": "IDEA0", "ID": "4f1149c4-0c0d-421d-baf5-5c93b05af575", "DetectTime": "2023-10-30T13:57:53.709239+02:00", "EventTime": "2023-10-30T13:57:53.709375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDL3Ty2XqrpzEPLw2", "CmbkuN1nSR7TOfwCj4", "C82Avq4drY5S4gA2W8", "CFKt0f2LlI67mNgSoc"]} -{"Format": "IDEA0", "ID": "110789e3-ea85-421b-b242-c5d1012bfbe1", "DetectTime": "2023-10-30T13:57:53.728115+02:00", "EventTime": "2023-10-30T13:57:53.728171+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFKt0f2LlI67mNgSoc"]} -{"Format": "IDEA0", "ID": "f4141721-3e28-49ff-b287-4fc37a68f7ef", "DetectTime": "2023-10-30T13:57:53.743951+02:00", "EventTime": "2023-10-30T13:57:53.743967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CU5DCm2AQDSXwQ1ecf"]} -{"Format": "IDEA0", "ID": "528e07d1-e128-49f0-87ba-5533744340f8", "DetectTime": "2023-10-30T13:57:53.769473+02:00", "EventTime": "2023-10-30T13:57:53.769493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CpLAKQ2pZUkVSVIOu"]} -{"Format": "IDEA0", "ID": "423fb080-84ce-4ed4-99eb-965a316b8d54", "DetectTime": "2023-10-30T13:57:53.801100+02:00", "EventTime": "2023-10-30T13:57:53.801124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CQnAghBAw8H5s3qD3"]} -{"Format": "IDEA0", "ID": "e49ca6b8-1c11-4176-bd46-6543776469f0", "DetectTime": "2023-10-30T13:57:53.847439+02:00", "EventTime": "2023-10-30T13:57:53.847459+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4pUog4LzmK8c2A8ul"]} -{"Format": "IDEA0", "ID": "bcc1e0df-3700-4ff1-9f0e-57e1f3a953aa", "DetectTime": "2023-10-30T13:57:53.872729+02:00", "EventTime": "2023-10-30T13:57:53.872746+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJhuHS1dPhhqt2meEe"]} -{"Format": "IDEA0", "ID": "ec2d6736-154e-4515-9c0e-ef96f9337592", "DetectTime": "2023-10-30T13:57:53.889558+02:00", "EventTime": "2023-10-30T13:57:53.889578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CpEMM36ZC0nnAqN9c"]} -{"Format": "IDEA0", "ID": "1cc23c45-fa29-44ab-9668-7cfa5bce694a", "DetectTime": "2023-10-30T13:57:53.925262+02:00", "EventTime": "2023-10-30T13:57:53.925281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CR96sm2qGKBPgWS2Ei"]} -{"Format": "IDEA0", "ID": "8b987e7c-3a9a-4fe2-8507-7a6e95a084b2", "DetectTime": "2023-10-30T13:57:53.970736+02:00", "EventTime": "2023-10-30T13:57:53.970753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C6EFXj22P1xsWhg1P7"]} -{"Format": "IDEA0", "ID": "605700f8-8282-4462-8f94-05aa70a0612f", "DetectTime": "2023-10-30T13:57:54.010111+02:00", "EventTime": "2023-10-30T13:57:54.010130+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzgpFA3d4s05npalo5"]} -{"Format": "IDEA0", "ID": "096e74e3-9ee4-4a1f-b47f-8641a3ef8da7", "DetectTime": "2023-10-30T13:57:54.025122+02:00", "EventTime": "2023-10-30T13:57:54.025144+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCo91m36HzGqdafZD"]} -{"Format": "IDEA0", "ID": "cf45319f-9063-478a-83b1-c7d0817dd2f2", "DetectTime": "2023-10-30T13:57:54.040748+02:00", "EventTime": "2023-10-30T13:57:54.040765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CDVvS01ZLjzQ70I4Wk"]} -{"Format": "IDEA0", "ID": "3c4103f1-1431-471f-a2c0-ce447740adf8", "DetectTime": "2023-10-30T13:57:54.067995+02:00", "EventTime": "2023-10-30T13:57:54.068016+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQ98vN2sxiMg7TGipb"]} -{"Format": "IDEA0", "ID": "02933479-8289-456e-8dd0-973b383fc26e", "DetectTime": "2023-10-30T13:57:54.085235+02:00", "EventTime": "2023-10-30T13:57:54.085256+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYI0fc33IMBNYdN6W4"]} -{"Format": "IDEA0", "ID": "fff44602-b1a3-45e9-a98c-dc4f87be0ce4", "DetectTime": "2023-10-30T13:57:54.101513+02:00", "EventTime": "2023-10-30T13:57:54.101537+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnQHQS3d1gxDEC60v1"]} -{"Format": "IDEA0", "ID": "34ce58e4-2b31-460d-9d27-3f5004f47d1f", "DetectTime": "2023-10-30T13:57:54.117041+02:00", "EventTime": "2023-10-30T13:57:54.117061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYI0fc33IMBNYdN6W4", "CCo91m36HzGqdafZD", "Cu54Ys4xkRzHiTL1s3", "CJhuHS1dPhhqt2meEe"]} -{"Format": "IDEA0", "ID": "817a3f91-6a2e-43dd-ade6-1df8d10c60be", "DetectTime": "2023-10-30T13:57:54.134679+02:00", "EventTime": "2023-10-30T13:57:54.134700+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cu54Ys4xkRzHiTL1s3"]} -{"Format": "IDEA0", "ID": "529ea3f2-b361-4fdb-a382-ed881a55dd61", "DetectTime": "2023-10-30T13:57:54.149937+02:00", "EventTime": "2023-10-30T13:57:54.149955+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CW7N2748OVxfCOilBa"]} -{"Format": "IDEA0", "ID": "ec7e7514-c087-4458-8391-e2fab6615444", "DetectTime": "2023-10-30T13:57:54.170408+02:00", "EventTime": "2023-10-30T13:57:54.170435+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLKq0614x2dyc8AUll"]} -{"Format": "IDEA0", "ID": "7f885518-e27e-45d0-9275-132d4b824b5d", "DetectTime": "2023-10-30T13:57:54.186922+02:00", "EventTime": "2023-10-30T13:57:54.186942+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZLADF4t26vRJMg9S2"]} -{"Format": "IDEA0", "ID": "44692607-c57f-4497-a73c-81dc5b74d43f", "DetectTime": "2023-10-30T13:57:54.203468+02:00", "EventTime": "2023-10-30T13:57:54.203484+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT9rDW3EYUmGN5OZGl"]} -{"Format": "IDEA0", "ID": "4b8669cb-30d7-410b-9a12-bf0b64f7065c", "DetectTime": "2023-10-30T13:57:54.219872+02:00", "EventTime": "2023-10-30T13:57:54.219982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["Cu8de51zmX7hoB6gG1"]} -{"Format": "IDEA0", "ID": "25fd9711-9a32-4cc1-a27b-ed2debc365de", "DetectTime": "2023-10-30T13:57:54.244973+02:00", "EventTime": "2023-10-30T13:57:54.244991+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8D7CF4dAtyFGdDZ1e"]} -{"Format": "IDEA0", "ID": "a06d7a56-e81e-4943-971d-e70ac9457909", "DetectTime": "2023-10-30T13:57:54.260524+02:00", "EventTime": "2023-10-30T13:57:54.260542+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CexWeb4CwV1UuwlHsl"]} -{"Format": "IDEA0", "ID": "84d1bb01-52e9-41b3-b1d7-f6d36ad39898", "DetectTime": "2023-10-30T13:57:54.279039+02:00", "EventTime": "2023-10-30T13:57:54.279064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CTUlBA4BSZO6xVM90c"]} -{"Format": "IDEA0", "ID": "a2b28c10-d74c-4946-ab1b-b98a0ade51d0", "DetectTime": "2023-10-30T13:57:54.307078+02:00", "EventTime": "2023-10-30T13:57:54.307095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CFAnCC3fcTkDAOTzZ"]} -{"Format": "IDEA0", "ID": "fa2d1f66-8517-4782-b8d4-d6452873bc76", "DetectTime": "2023-10-30T13:57:54.337438+02:00", "EventTime": "2023-10-30T13:57:54.337462+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrHqcD1a7DSNPVaGW7"]} -{"Format": "IDEA0", "ID": "ee3d7c36-31f6-4bd4-a8e1-be0bb540131d", "DetectTime": "2023-10-30T13:57:54.353379+02:00", "EventTime": "2023-10-30T13:57:54.353397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLKq0614x2dyc8AUll", "CexWeb4CwV1UuwlHsl", "CT9rDW3EYUmGN5OZGl", "CTJSzj1i7fAvikLiL6"]} -{"Format": "IDEA0", "ID": "16d726c7-97e3-45f7-8935-e3c187b00573", "DetectTime": "2023-10-30T13:57:54.371805+02:00", "EventTime": "2023-10-30T13:57:54.371845+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTJSzj1i7fAvikLiL6"]} -{"Format": "IDEA0", "ID": "92a0aca9-336f-4c86-bad8-7d26fff65609", "DetectTime": "2023-10-30T13:57:54.389863+02:00", "EventTime": "2023-10-30T13:57:54.389883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CNQmY54xBc3tnVSAdh"]} -{"Format": "IDEA0", "ID": "72073464-b908-49e3-883a-1490a4b5c841", "DetectTime": "2023-10-30T13:57:54.420607+02:00", "EventTime": "2023-10-30T13:57:54.420624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CYqUEk4YT2zoRP8XGi"]} -{"Format": "IDEA0", "ID": "d8e9d326-2537-4218-adbe-a98145516bd9", "DetectTime": "2023-10-30T13:57:54.448417+02:00", "EventTime": "2023-10-30T13:57:54.448437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["ChSWWH3NdiTLfHoU8l"]} -{"Format": "IDEA0", "ID": "71e26ac1-6d0a-4b86-8c94-31d1b3937cf4", "DetectTime": "2023-10-30T13:57:54.476003+02:00", "EventTime": "2023-10-30T13:57:54.476028+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZwSuw2AchcAxUsfI7"]} -{"Format": "IDEA0", "ID": "02771ec5-8ceb-4925-9d6a-3e3b6b1e044c", "DetectTime": "2023-10-30T13:57:54.493994+02:00", "EventTime": "2023-10-30T13:57:54.494023+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CF1Y1m1pZQj0k2xan3"]} -{"Format": "IDEA0", "ID": "4a961b13-f962-4198-a3e2-8f8b7dbddddd", "DetectTime": "2023-10-30T13:57:54.509691+02:00", "EventTime": "2023-10-30T13:57:54.509709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Hostname": ["108-74-172-39.lightspeed.lsanca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CZkJUA1cUhVZY2cR5l"]} -{"Format": "IDEA0", "ID": "cdb9aaec-e040-4864-954c-ca2b7fcf47ca", "DetectTime": "2023-10-30T13:57:54.536710+02:00", "EventTime": "2023-10-30T13:57:54.536757+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHn78z1NzSNfwpsehk"]} -{"Format": "IDEA0", "ID": "5c798f61-662d-4abd-985b-0345039dfda4", "DetectTime": "2023-10-30T13:57:54.553526+02:00", "EventTime": "2023-10-30T13:57:54.553552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CZs7Vp1oFOZ6ZKDTgf"]} -{"Format": "IDEA0", "ID": "648f52b1-5b81-413d-aac3-bb9ccae8e9ea", "DetectTime": "2023-10-30T13:57:54.582565+02:00", "EventTime": "2023-10-30T13:57:54.582583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CMZfQ13EZXkshVZQm3"]} -{"Format": "IDEA0", "ID": "467a655d-fae5-40e8-8f33-3d4ab697f892", "DetectTime": "2023-10-30T13:57:54.610214+02:00", "EventTime": "2023-10-30T13:57:54.610238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["C6mnms2pipVD6oMSoe"]} -{"Format": "IDEA0", "ID": "38d9f30b-a1b7-4f82-8d07-7f88f1f9f3fd", "DetectTime": "2023-10-30T13:57:54.636971+02:00", "EventTime": "2023-10-30T13:57:54.636999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["C2camo4IGIWpY1ikRf"]} -{"Format": "IDEA0", "ID": "09eda928-d530-4551-b1e1-49cec65ff629", "DetectTime": "2023-10-30T13:57:54.662734+02:00", "EventTime": "2023-10-30T13:57:54.662752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["C4vAhZ2Qy00d3mLZFa"]} -{"Format": "IDEA0", "ID": "3ce27d2e-4437-4b97-a20d-49e0eefa2a06", "DetectTime": "2023-10-30T13:57:54.687340+02:00", "EventTime": "2023-10-30T13:57:54.687361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CJxgYJ1TdK2MglFOea"]} -{"Format": "IDEA0", "ID": "2dc06e0a-1431-431b-82c0-10fb25900e48", "DetectTime": "2023-10-30T13:57:54.716209+02:00", "EventTime": "2023-10-30T13:57:54.716231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CjP9Wo1aKeO6ZezZL7"]} -{"Format": "IDEA0", "ID": "686c7bb1-66bf-49e6-baf9-8b96960dac27", "DetectTime": "2023-10-30T13:57:54.875850+02:00", "EventTime": "2023-10-30T13:57:54.875867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["C1mwdA4BdJ5xpOfg8b"]} -{"Format": "IDEA0", "ID": "6a902fc2-5f46-4118-b005-98feb7057c0d", "DetectTime": "2023-10-30T13:57:54.905945+02:00", "EventTime": "2023-10-30T13:57:54.906001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ctzih87jVmwtabO5f"]} -{"Format": "IDEA0", "ID": "867c0833-7f9b-4f1c-9175-e563e56ea4a1", "DetectTime": "2023-10-30T13:57:54.924509+02:00", "EventTime": "2023-10-30T13:57:54.924561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["Cz6T7O1ycqntQxrEAa"]} -{"Format": "IDEA0", "ID": "fbdb962a-2c00-45da-91cc-a9a421e3b95a", "DetectTime": "2023-10-30T13:57:54.952361+02:00", "EventTime": "2023-10-30T13:57:54.952385+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP62mT2BeikdUvBr0c"]} -{"Format": "IDEA0", "ID": "ae9af8e6-6e86-4968-ba34-fb10a665c7b2", "DetectTime": "2023-10-30T13:57:54.972033+02:00", "EventTime": "2023-10-30T13:57:54.972970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["C4Nd6S1CAzu4fd55Fg"]} -{"Format": "IDEA0", "ID": "a97399fd-28c5-4ad6-a789-0606b48ac305", "DetectTime": "2023-10-30T13:57:55.010262+02:00", "EventTime": "2023-10-30T13:57:55.010285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Cxe41S1nTqOGmORII1"]} -{"Format": "IDEA0", "ID": "372e5871-bb09-4e5b-91b4-f639b2a5bfd7", "DetectTime": "2023-10-30T13:57:55.040982+02:00", "EventTime": "2023-10-30T13:57:55.041005+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVmif43lohOvRmAoNj"]} -{"Format": "IDEA0", "ID": "cad83b20-bcd2-412a-b0b2-79614a3d8278", "DetectTime": "2023-10-30T13:57:55.058773+02:00", "EventTime": "2023-10-30T13:57:55.058810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CUyxjh1yILdhc4FjXh"]} -{"Format": "IDEA0", "ID": "88fac18c-943f-4c09-a86a-211a98dc2e4f", "DetectTime": "2023-10-30T13:57:55.092563+02:00", "EventTime": "2023-10-30T13:57:55.092592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CwhaOB35BWtqBo3Pa1"]} -{"Format": "IDEA0", "ID": "7805424c-0c43-4179-b189-6db9ef27facd", "DetectTime": "2023-10-30T13:57:55.123268+02:00", "EventTime": "2023-10-30T13:57:55.123296+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3KxrS1Dm3ZTWQRAB8"]} -{"Format": "IDEA0", "ID": "0a692046-dca1-47a2-9591-8382a6da90c4", "DetectTime": "2023-10-30T13:57:55.141704+02:00", "EventTime": "2023-10-30T13:57:55.141729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CkF28P3zI9nQzxaP05"]} -{"Format": "IDEA0", "ID": "896d25b2-20db-4423-bc65-babcf9f8ff5b", "DetectTime": "2023-10-30T13:57:55.172694+02:00", "EventTime": "2023-10-30T13:57:55.172709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CLnQ493RIdhMHaYxn"]} -{"Format": "IDEA0", "ID": "c9fadc08-f41c-451b-bde8-10b5a462e768", "DetectTime": "2023-10-30T13:57:55.208203+02:00", "EventTime": "2023-10-30T13:57:55.208230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CF1Y1m1pZQj0k2xan3", "CVmif43lohOvRmAoNj", "CBHXMD3OzOgwaaQoXh", "Ctzih87jVmwtabO5f"]} -{"Format": "IDEA0", "ID": "f4f42aef-0e0f-4768-8cb8-e00e31eb27a5", "DetectTime": "2023-10-30T13:57:55.229815+02:00", "EventTime": "2023-10-30T13:57:55.229836+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBHXMD3OzOgwaaQoXh"]} -{"Format": "IDEA0", "ID": "5b10aaed-9dcf-47af-b843-9031cd25ef20", "DetectTime": "2023-10-30T13:57:55.249680+02:00", "EventTime": "2023-10-30T13:57:55.249700+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr0Nmp1EImoC55cOXi"]} -{"Format": "IDEA0", "ID": "21946e0d-585e-4a59-8d8b-fdfb6c65b42b", "DetectTime": "2023-10-30T13:57:55.266252+02:00", "EventTime": "2023-10-30T13:57:55.266278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C05kop3KF2HV43WHPf"]} -{"Format": "IDEA0", "ID": "52e34d38-ee57-49ef-b49e-beafada14ec1", "DetectTime": "2023-10-30T13:57:55.300125+02:00", "EventTime": "2023-10-30T13:57:55.300146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CcvvBW2mYQGRHoDss1"]} -{"Format": "IDEA0", "ID": "0cc7d086-80a1-42af-931b-bb69222b2fe1", "DetectTime": "2023-10-30T13:57:55.331463+02:00", "EventTime": "2023-10-30T13:57:55.331851+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeevS74jrSYtPq0JE6"]} -{"Format": "IDEA0", "ID": "a9a5e380-5f4f-4d31-bb1c-6a0c95918a77", "DetectTime": "2023-10-30T13:57:55.355746+02:00", "EventTime": "2023-10-30T13:57:55.355878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["CauWjEcEZxR9o2ZVh"]} -{"Format": "IDEA0", "ID": "8233f60e-fec8-470b-9b9e-b3c81a41698a", "DetectTime": "2023-10-30T13:57:55.385808+02:00", "EventTime": "2023-10-30T13:57:55.385827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CS80Vp27D8kzi41WJa"]} -{"Format": "IDEA0", "ID": "b0c39695-d8f7-464e-b757-76ccb43ea8a9", "DetectTime": "2023-10-30T13:57:55.421670+02:00", "EventTime": "2023-10-30T13:57:55.421692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CQJ4B73c4RA1uqL7kg"]} -{"Format": "IDEA0", "ID": "e8e9046b-a420-45cf-b366-bc3446b54eb7", "DetectTime": "2023-10-30T13:57:55.459253+02:00", "EventTime": "2023-10-30T13:57:55.459281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.53.52.122 ", "ContentType": "text/plain"}], "uids": ["C62UeQ3nk7u9D1EDW2"]} -{"Format": "IDEA0", "ID": "4d9f7704-e543-4564-8d1c-8695bb5da1c5", "DetectTime": "2023-10-30T13:57:55.500939+02:00", "EventTime": "2023-10-30T13:57:55.500964+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3l6AB4duJr43o1PLe"]} -{"Format": "IDEA0", "ID": "7d6c4be6-4db8-4116-b433-2a03260c666d", "DetectTime": "2023-10-30T13:57:55.521134+02:00", "EventTime": "2023-10-30T13:57:55.521161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CAPWLe39htha1Cm2V7"]} -{"Format": "IDEA0", "ID": "b225f182-45dd-4760-8c8d-2c0fef69d9d6", "DetectTime": "2023-10-30T13:57:55.552821+02:00", "EventTime": "2023-10-30T13:57:55.552843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["Cwuyq14cjiJyTf9Tug"]} -{"Format": "IDEA0", "ID": "617f6076-b21a-4352-8121-f684fa87f801", "DetectTime": "2023-10-30T13:57:55.586043+02:00", "EventTime": "2023-10-30T13:57:55.586071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.153.125 ", "ContentType": "text/plain"}], "uids": ["CE7U7N2WAhx7Nm02Oc"]} -{"Format": "IDEA0", "ID": "bf4aa842-5e6e-4f61-9647-bf3966b6589e", "DetectTime": "2023-10-30T13:57:55.615052+02:00", "EventTime": "2023-10-30T13:57:55.615090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CjBFir4yOLM88tXnAa"]} -{"Format": "IDEA0", "ID": "10f417af-41c4-40bc-9a00-16eefa8962e9", "DetectTime": "2023-10-30T13:57:55.644116+02:00", "EventTime": "2023-10-30T13:57:55.644133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.11.116.7 ", "ContentType": "text/plain"}], "uids": ["CHTADe3Th2Ucfhrt2f"]} -{"Format": "IDEA0", "ID": "0d34dc99-fb8e-4014-a677-29159e03ae1b", "DetectTime": "2023-10-30T13:57:55.675239+02:00", "EventTime": "2023-10-30T13:57:55.675265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CTjK4F3JBvelIFFwx"]} -{"Format": "IDEA0", "ID": "cf33795f-580b-4401-9a39-3226ce262b15", "DetectTime": "2023-10-30T13:57:55.706090+02:00", "EventTime": "2023-10-30T13:57:55.706109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CxjUz038JFIPF7DnMd"]} -{"Format": "IDEA0", "ID": "44674a34-c151-4d9e-b912-6b715e9944e3", "DetectTime": "2023-10-30T13:57:55.736319+02:00", "EventTime": "2023-10-30T13:57:55.736409+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzSGT74YrTHTMOzE2h"]} -{"Format": "IDEA0", "ID": "6cf343f7-d104-4aff-a300-587ea675ecf0", "DetectTime": "2023-10-30T13:57:55.762349+02:00", "EventTime": "2023-10-30T13:57:55.762369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CEcTf71NgQT0FER0c6"]} -{"Format": "IDEA0", "ID": "f454bbdd-bf58-4b7e-b66e-d714c622f19f", "DetectTime": "2023-10-30T13:57:55.792902+02:00", "EventTime": "2023-10-30T13:57:55.793525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["C0V8PG1kSfi5cviZYk"]} -{"Format": "IDEA0", "ID": "6ee57b25-673c-4b54-a5f9-dcb0c98e4c55", "DetectTime": "2023-10-30T13:57:55.829229+02:00", "EventTime": "2023-10-30T13:57:55.829255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["Cic3E93lwZczGgjKeh"]} -{"Format": "IDEA0", "ID": "1d49213b-d853-4733-81ff-b21da6f3a52c", "DetectTime": "2023-10-30T13:57:55.862665+02:00", "EventTime": "2023-10-30T13:57:55.862686+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr3ngF1la6ntEABkB2"]} -{"Format": "IDEA0", "ID": "8b3977f7-d52b-44a5-a79b-802c0dbf8a5a", "DetectTime": "2023-10-30T13:57:55.883558+02:00", "EventTime": "2023-10-30T13:57:55.883582+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPL6pr3ORyNFtP6EVe"]} -{"Format": "IDEA0", "ID": "b28edc1f-21fb-47de-a691-ef9a93863f59", "DetectTime": "2023-10-30T13:57:55.907711+02:00", "EventTime": "2023-10-30T13:57:55.907728+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVE0zNZKjHCm9HnSl"]} -{"Format": "IDEA0", "ID": "7827a31a-ccde-4cee-8f0e-65ab673edeba", "DetectTime": "2023-10-30T13:57:55.926471+02:00", "EventTime": "2023-10-30T13:57:55.926488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CaeLrw3yOaoylja1e"]} -{"Format": "IDEA0", "ID": "921af171-1419-4444-8270-3a8f1b6f562b", "DetectTime": "2023-10-30T13:57:55.958122+02:00", "EventTime": "2023-10-30T13:57:55.958234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPL6pr3ORyNFtP6EVe", "CQldli25QbiNI4qdL4", "CzSGT74YrTHTMOzE2h", "CeevS74jrSYtPq0JE6"]} -{"Format": "IDEA0", "ID": "71daefcd-77e4-4991-a8d4-caa5d2753b14", "DetectTime": "2023-10-30T13:57:55.980383+02:00", "EventTime": "2023-10-30T13:57:55.980401+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQldli25QbiNI4qdL4"]} -{"Format": "IDEA0", "ID": "ebf32f03-148b-4915-803c-afb9fa9b0e32", "DetectTime": "2023-10-30T13:57:56.003490+02:00", "EventTime": "2023-10-30T13:57:56.003514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CfQUSA3PTj1nLVNwt7"]} -{"Format": "IDEA0", "ID": "4276a7e7-e101-4553-acca-c460ad814412", "DetectTime": "2023-10-30T13:57:56.032240+02:00", "EventTime": "2023-10-30T13:57:56.032262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CorZoh18mC5EBCSYqh"]} -{"Format": "IDEA0", "ID": "af6cce4b-dfb6-4f45-9b24-9d4d180ea9e1", "DetectTime": "2023-10-30T13:57:56.063256+02:00", "EventTime": "2023-10-30T13:57:56.063269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CN3Bi72VZJFCNdTIWk"]} -{"Format": "IDEA0", "ID": "212191aa-73b4-49f8-a517-61dbc9a871cf", "DetectTime": "2023-10-30T13:57:56.093430+02:00", "EventTime": "2023-10-30T13:57:56.093452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CO9KVg1nWHiYww1Ap4"]} -{"Format": "IDEA0", "ID": "e22705f9-38f2-42a1-beaf-42cd5c5c8704", "DetectTime": "2023-10-30T13:57:56.123663+02:00", "EventTime": "2023-10-30T13:57:56.123681+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuAdqo3yD473usYyv8"]} -{"Format": "IDEA0", "ID": "fa64bfb2-f2f6-45bc-9a81-6ac007e4804f", "DetectTime": "2023-10-30T13:57:56.142315+02:00", "EventTime": "2023-10-30T13:57:56.142332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CMsZJP2f4HDwlzRvC1"]} -{"Format": "IDEA0", "ID": "38a8efd1-8713-4ea0-9c46-338c82fabb2c", "DetectTime": "2023-10-30T13:57:56.173249+02:00", "EventTime": "2023-10-30T13:57:56.173276+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyDtqj3ZtZ9OSr8syg"]} -{"Format": "IDEA0", "ID": "718e2323-3413-4ee8-9a23-2d437e182916", "DetectTime": "2023-10-30T13:57:56.196498+02:00", "EventTime": "2023-10-30T13:57:56.196519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CRSZtHpRsJ7TGXIBb"]} -{"Format": "IDEA0", "ID": "936cf32b-6213-4c0d-9c5e-08c2166f2732", "DetectTime": "2023-10-30T13:57:56.230134+02:00", "EventTime": "2023-10-30T13:57:56.230159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["Cwk9E9wg7yt9wvy72"]} -{"Format": "IDEA0", "ID": "b2e8fd0f-d626-48c3-b66f-fff34082a9b4", "DetectTime": "2023-10-30T13:57:56.259748+02:00", "EventTime": "2023-10-30T13:57:56.259775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CRDg0DPseBv625eh9"]} -{"Format": "IDEA0", "ID": "4b2b0544-d23c-4c07-abbc-bd1ed4e579d4", "DetectTime": "2023-10-30T13:57:56.292284+02:00", "EventTime": "2023-10-30T13:57:56.292304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CrvtSp3BTwpHolRGc6"]} -{"Format": "IDEA0", "ID": "23a4fb8a-a218-4274-a2b6-2fbcdeb40d87", "DetectTime": "2023-10-30T13:57:56.323078+02:00", "EventTime": "2023-10-30T13:57:56.323106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CXoTB53FXovECZ7TF6"]} -{"Format": "IDEA0", "ID": "5951654f-cf83-452f-8976-d433bf08161e", "DetectTime": "2023-10-30T13:57:56.356373+02:00", "EventTime": "2023-10-30T13:57:56.356395+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2pUyQ16uy9sFfJ3U7"]} -{"Format": "IDEA0", "ID": "5a595720-c021-41e1-8285-e53be0dcfb6f", "DetectTime": "2023-10-30T13:57:56.375152+02:00", "EventTime": "2023-10-30T13:57:56.375170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["ChxsHk3Qp3Elw1Jxd9"]} -{"Format": "IDEA0", "ID": "756a141f-7909-4a83-9442-6a5183a3b924", "DetectTime": "2023-10-30T13:57:56.406608+02:00", "EventTime": "2023-10-30T13:57:56.406625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CULYoG2EKBZJvs1xQ1"]} -{"Format": "IDEA0", "ID": "02b8ad4a-3e93-438f-9e41-701e489b9487", "DetectTime": "2023-10-30T13:57:56.433576+02:00", "EventTime": "2023-10-30T13:57:56.433601+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFkldF1drLoSgvXNLf"]} -{"Format": "IDEA0", "ID": "db40129b-39e4-45ac-938e-92de14728915", "DetectTime": "2023-10-30T13:57:56.457845+02:00", "EventTime": "2023-10-30T13:57:56.457862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C7wThD39d2otnnUKm9"]} -{"Format": "IDEA0", "ID": "1d642866-71e3-4a99-b16d-4bbc0b2d4a15", "DetectTime": "2023-10-30T13:57:56.487843+02:00", "EventTime": "2023-10-30T13:57:56.487864+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CeBGQX1tqjdVRz7Bhj"]} -{"Format": "IDEA0", "ID": "b935d7df-3529-4f6d-b31d-da057196cb15", "DetectTime": "2023-10-30T13:57:56.507935+02:00", "EventTime": "2023-10-30T13:57:56.507962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CfMGW74v1o54iRWNq7"]} -{"Format": "IDEA0", "ID": "8c0581d4-494a-4a7e-9937-08bbcc8f2318", "DetectTime": "2023-10-30T13:57:56.541157+02:00", "EventTime": "2023-10-30T13:57:56.541178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["C9uVRD3i8M0YUfPO83"]} -{"Format": "IDEA0", "ID": "8d6cbd41-1d77-4938-9fe1-d1ceae73c159", "DetectTime": "2023-10-30T13:57:56.572658+02:00", "EventTime": "2023-10-30T13:57:56.572682+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CX8Vbl1j3AhzaURSb3"]} -{"Format": "IDEA0", "ID": "611d3286-6409-425c-83f9-986915b59190", "DetectTime": "2023-10-30T13:57:56.590299+02:00", "EventTime": "2023-10-30T13:57:56.590324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CZXNgf3XTcr8ZIG42"]} -{"Format": "IDEA0", "ID": "4cccddbb-029e-4cb5-a356-a11a674dfcbb", "DetectTime": "2023-10-30T13:57:56.622048+02:00", "EventTime": "2023-10-30T13:57:56.622068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcLUYspYey436Ns86"]} -{"Format": "IDEA0", "ID": "88850f77-6800-4555-89e9-b8185a78cdd1", "DetectTime": "2023-10-30T13:57:56.637993+02:00", "EventTime": "2023-10-30T13:57:56.638013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CuZfnj48fYxoAhqKlc", "CX8Vbl1j3AhzaURSb3", "CyDtqj3ZtZ9OSr8syg", "CFkldF1drLoSgvXNLf"]} -{"Format": "IDEA0", "ID": "763287bd-ca31-494e-b50e-d3bbb3452aa6", "DetectTime": "2023-10-30T13:57:56.656833+02:00", "EventTime": "2023-10-30T13:57:56.656854+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuZfnj48fYxoAhqKlc"]} -{"Format": "IDEA0", "ID": "df96bf75-1ba3-4f7d-ab9a-f330ff8fcdbc", "DetectTime": "2023-10-30T13:57:56.675192+02:00", "EventTime": "2023-10-30T13:57:56.675220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CnL8jO2HHrMLA0XrO2"]} -{"Format": "IDEA0", "ID": "86f711ce-46d8-4fa1-b700-3f902d050ac4", "DetectTime": "2023-10-30T13:57:56.704437+02:00", "EventTime": "2023-10-30T13:57:56.704463+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1lCBMr0FDtyu8Eah"]} -{"Format": "IDEA0", "ID": "8a9bafa9-6412-4cff-81b2-2fd8e624b560", "DetectTime": "2023-10-30T13:57:56.720316+02:00", "EventTime": "2023-10-30T13:57:56.720340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CY1mE61ypbBkcNTDzd"]} -{"Format": "IDEA0", "ID": "a95e5c47-ef4d-47e6-9a11-d15daf44e070", "DetectTime": "2023-10-30T13:57:56.736241+02:00", "EventTime": "2023-10-30T13:57:56.736261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CqhnUoNUnhrO1Wmo4"]} -{"Format": "IDEA0", "ID": "62d2de9b-2943-488d-868d-a39ffa858fc0", "DetectTime": "2023-10-30T13:57:56.762465+02:00", "EventTime": "2023-10-30T13:57:56.762490+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMGe3EggLTaDjbDR"]} -{"Format": "IDEA0", "ID": "56a0e908-5223-4a74-8bfc-128d7b98715f", "DetectTime": "2023-10-30T13:57:56.778839+02:00", "EventTime": "2023-10-30T13:57:56.778857+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CieDte3Kv1U02FAHPi"]} -{"Format": "IDEA0", "ID": "bdf830c4-ea78-4c91-b173-b1bc6865261f", "DetectTime": "2023-10-30T13:57:56.795367+02:00", "EventTime": "2023-10-30T13:57:56.795385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Hostname": ["108-74-172-39.lightspeed.lsanca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CLJwaY2GpCff520Lx6"]} -{"Format": "IDEA0", "ID": "d70c9c97-1bfe-4b8e-8b6d-3521662e0bd4", "DetectTime": "2023-10-30T13:57:56.826388+02:00", "EventTime": "2023-10-30T13:57:56.826415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CxtN3k1WjYo659Ig9"]} -{"Format": "IDEA0", "ID": "7f4b5d98-4faf-4b27-8d3a-e0a987c04390", "DetectTime": "2023-10-30T13:57:56.854306+02:00", "EventTime": "2023-10-30T13:57:56.854328+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSHS7OvzgduJlWsGa"]} -{"Format": "IDEA0", "ID": "32a1b695-8463-472f-ad22-2ecc46cb4d53", "DetectTime": "2023-10-30T13:57:56.873541+02:00", "EventTime": "2023-10-30T13:57:56.873557+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ch8H0S2AdbNanicXi7"]} -{"Format": "IDEA0", "ID": "7a639fb1-9301-4bce-9d46-b01884ba8a52", "DetectTime": "2023-10-30T13:57:56.893017+02:00", "EventTime": "2023-10-30T13:57:56.893035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["C4krpp4fTl5bAOYwq"]} -{"Format": "IDEA0", "ID": "35ca4511-af39-4105-a26f-0ec941417d77", "DetectTime": "2023-10-30T13:57:56.923623+02:00", "EventTime": "2023-10-30T13:57:56.923717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CQhMS33hI19bIxrF1f"]} -{"Format": "IDEA0", "ID": "44e664cd-c308-4bf4-a154-a889ecfb9543", "DetectTime": "2023-10-30T13:57:56.951899+02:00", "EventTime": "2023-10-30T13:57:56.951920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CVfIA01YbXiRuQ5Ib1"]} -{"Format": "IDEA0", "ID": "918c989a-ab96-486e-b8e7-7244e3cdba6d", "DetectTime": "2023-10-30T13:57:56.981412+02:00", "EventTime": "2023-10-30T13:57:56.981428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CVmzz54ZJNTLlHTPml"]} -{"Format": "IDEA0", "ID": "4da1c4d7-265d-4f49-9f08-46a01939c2ea", "DetectTime": "2023-10-30T13:57:57.010870+02:00", "EventTime": "2023-10-30T13:57:57.010898+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZ20Ih3Z0znpmlWc38"]} -{"Format": "IDEA0", "ID": "ed5fea07-c709-4bcc-86ae-858416397a0f", "DetectTime": "2023-10-30T13:57:57.029733+02:00", "EventTime": "2023-10-30T13:57:57.029760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C0YDBk4EgwscWRKVD1"]} -{"Format": "IDEA0", "ID": "964a0024-72d8-416c-9a5b-f0ab6cedae9b", "DetectTime": "2023-10-30T13:57:57.060717+02:00", "EventTime": "2023-10-30T13:57:57.060738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["Cn78Tz2O9hpr19OXv2"]} -{"Format": "IDEA0", "ID": "ec3526b3-3b7a-4b8d-9e41-c03869d7b4e3", "DetectTime": "2023-10-30T13:57:57.089048+02:00", "EventTime": "2023-10-30T13:57:57.089066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C91HFm2OxYeNVUy78i", "CieDte3Kv1U02FAHPi", "Ch8H0S2AdbNanicXi7", "CY1mE61ypbBkcNTDzd"]} -{"Format": "IDEA0", "ID": "fb9527cb-eb29-46c2-84a5-a15f0daad120", "DetectTime": "2023-10-30T13:57:57.105635+02:00", "EventTime": "2023-10-30T13:57:57.105660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CAuDYe2cd0O2XVWrej"]} -{"Format": "IDEA0", "ID": "e260b266-c40e-40f4-9853-7af69f219059", "DetectTime": "2023-10-30T13:57:57.132871+02:00", "EventTime": "2023-10-30T13:57:57.132890+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C91HFm2OxYeNVUy78i"]} -{"Format": "IDEA0", "ID": "29611390-57b7-41d2-ab33-936b15e20fae", "DetectTime": "2023-10-30T13:57:57.155103+02:00", "EventTime": "2023-10-30T13:57:57.155126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CwO5gn4A34QFc7HRQ6"]} -{"Format": "IDEA0", "ID": "94211e0e-7293-49c9-b44f-1acc452144f5", "DetectTime": "2023-10-30T13:57:57.182225+02:00", "EventTime": "2023-10-30T13:57:57.182247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CcuHmH2rt3fr50GZng"]} -{"Format": "IDEA0", "ID": "b16467fb-0e28-432e-961d-b90063d15b64", "DetectTime": "2023-10-30T13:57:57.209432+02:00", "EventTime": "2023-10-30T13:57:57.209449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.199.143.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.199.143.102 ", "ContentType": "text/plain"}], "uids": ["ChYlILlAdjTOqW8Kf"]} -{"Format": "IDEA0", "ID": "8632f588-dd6d-44d6-9b81-cd05c0df14e1", "DetectTime": "2023-10-30T13:57:57.238228+02:00", "EventTime": "2023-10-30T13:57:57.238243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["C1bsGZ29hZ4Rf8Hyv7"]} -{"Format": "IDEA0", "ID": "ff79b976-06b6-45c5-b37c-a2e57ca053d4", "DetectTime": "2023-10-30T13:57:57.264327+02:00", "EventTime": "2023-10-30T13:57:57.264342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["ClOzMw1GgpZ8cvFBm2"]} -{"Format": "IDEA0", "ID": "45af4544-c51e-4f77-b3e5-15b7bb312f74", "DetectTime": "2023-10-30T13:57:57.291275+02:00", "EventTime": "2023-10-30T13:57:57.291290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["Cc2aJ64ClZ8s51RlRe"]} -{"Format": "IDEA0", "ID": "7c76f982-577e-424a-bdc2-edeaffaaaa2f", "DetectTime": "2023-10-30T13:57:57.318962+02:00", "EventTime": "2023-10-30T13:57:57.318981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C69L6L2GmJb6Ba6qW9"]} -{"Format": "IDEA0", "ID": "86a31fd5-59ca-4407-b0ec-290ef48cb9f7", "DetectTime": "2023-10-30T13:57:57.347855+02:00", "EventTime": "2023-10-30T13:57:57.347874+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcwOV21WqBIh63ced4"]} -{"Format": "IDEA0", "ID": "1b1aeed5-d0d4-4f1d-a20a-f1463a05fc6b", "DetectTime": "2023-10-30T13:57:57.365199+02:00", "EventTime": "2023-10-30T13:57:57.365222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CyBUOi2tyh2kXAwBWg"]} -{"Format": "IDEA0", "ID": "1cb59b9e-0d66-47a3-8d9a-7f3f9104ae6a", "DetectTime": "2023-10-30T13:57:57.492571+02:00", "EventTime": "2023-10-30T13:57:57.492593+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChDAt5vbnr2MMM4o8"]} -{"Format": "IDEA0", "ID": "3ad49a2a-48eb-4ef9-b200-9387588402b1", "DetectTime": "2023-10-30T13:57:57.513405+02:00", "EventTime": "2023-10-30T13:57:57.513429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CMl1mz3XIjNTRATpf"]} -{"Format": "IDEA0", "ID": "08b61f11-5b6b-416b-802a-bfd851f2127d", "DetectTime": "2023-10-30T13:57:57.548949+02:00", "EventTime": "2023-10-30T13:57:57.548967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["C30iRZ1CblwAhCOHEb"]} -{"Format": "IDEA0", "ID": "16143866-30b4-4b41-869c-b569ac00ca20", "DetectTime": "2023-10-30T13:57:57.582606+02:00", "EventTime": "2023-10-30T13:57:57.582626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CfhP4z3dRZOUss6Vc1"]} -{"Format": "IDEA0", "ID": "b7f6315e-2914-451e-acb3-98ebd927bced", "DetectTime": "2023-10-30T13:57:57.618608+02:00", "EventTime": "2023-10-30T13:57:57.618631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["C6Mhsg39iPlmzjrgkf"]} -{"Format": "IDEA0", "ID": "f48f6c92-b91c-45db-90fb-d697f48f4741", "DetectTime": "2023-10-30T13:57:57.652555+02:00", "EventTime": "2023-10-30T13:57:57.652576+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI6IaW2k358PqMlzQ"]} -{"Format": "IDEA0", "ID": "1a61f37f-a848-4188-be7c-086ee25ccb15", "DetectTime": "2023-10-30T13:57:57.675597+02:00", "EventTime": "2023-10-30T13:57:57.675615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CYEYX74V0TsfPC5B12"]} -{"Format": "IDEA0", "ID": "65b75500-d5e4-4e58-af39-2000d5784afb", "DetectTime": "2023-10-30T13:57:57.712532+02:00", "EventTime": "2023-10-30T13:57:57.712549+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcIFok3PBAl56hydMl"]} -{"Format": "IDEA0", "ID": "596b1445-265b-41c0-b2d3-770712a4f26f", "DetectTime": "2023-10-30T13:57:57.738665+02:00", "EventTime": "2023-10-30T13:57:57.738690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CWKtqs4YZib4PhsRRg"]} -{"Format": "IDEA0", "ID": "444e3bb1-6852-4b9e-849c-af0c045a41be", "DetectTime": "2023-10-30T13:57:57.769430+02:00", "EventTime": "2023-10-30T13:57:57.769453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.216.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.216.94 ", "ContentType": "text/plain"}], "uids": ["ChbNa73k2U8IAA3yW3"]} -{"Format": "IDEA0", "ID": "8d385569-1835-4cf6-a641-1223cdf68217", "DetectTime": "2023-10-30T13:57:57.802212+02:00", "EventTime": "2023-10-30T13:57:57.802234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CsnpHv4ZWK1S3wQea8"]} -{"Format": "IDEA0", "ID": "9af4656a-2e0b-40ae-84a2-977982cdde08", "DetectTime": "2023-10-30T13:57:57.843455+02:00", "EventTime": "2023-10-30T13:57:57.843513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CRBsjN2vfhWtkRzdC7"]} -{"Format": "IDEA0", "ID": "3d978302-d7c3-4d25-85d7-2cebd4c2e530", "DetectTime": "2023-10-30T13:57:57.875377+02:00", "EventTime": "2023-10-30T13:57:57.875406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CsYwRz3BoyA2JmSdVl"]} -{"Format": "IDEA0", "ID": "c3ce4064-ef81-43fe-9837-c6f96a7a5847", "DetectTime": "2023-10-30T13:57:57.910279+02:00", "EventTime": "2023-10-30T13:57:57.910303+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ce9pr74IOWWjrSiNzg"]} -{"Format": "IDEA0", "ID": "31928f8f-a647-4d2d-b300-696b30b7d27e", "DetectTime": "2023-10-30T13:57:57.929512+02:00", "EventTime": "2023-10-30T13:57:57.929538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["COv8911oL4p8dVtZP4"]} -{"Format": "IDEA0", "ID": "1edcd337-0293-4e40-881c-4cd8758eba2a", "DetectTime": "2023-10-30T13:57:57.965606+02:00", "EventTime": "2023-10-30T13:57:57.965627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.217.10.192"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.217.10.192 ", "ContentType": "text/plain"}], "uids": ["CHn8ev1GspspOzgsIg"]} -{"Format": "IDEA0", "ID": "eaf185f9-7f59-499d-a7f4-86e1a2603773", "DetectTime": "2023-10-30T13:57:57.997254+02:00", "EventTime": "2023-10-30T13:57:57.997300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CXEJFD1K5hfY1E9Vxh"]} -{"Format": "IDEA0", "ID": "a58a5ec4-5aca-4ea4-bc91-a5bf251d8f14", "DetectTime": "2023-10-30T13:57:58.027382+02:00", "EventTime": "2023-10-30T13:57:58.027401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CBJSAd12wgPYB1Mj57"]} -{"Format": "IDEA0", "ID": "290e70fd-5628-49be-b231-2a4908f68acc", "DetectTime": "2023-10-30T13:57:58.061998+02:00", "EventTime": "2023-10-30T13:57:58.062026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.71.26.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.71.26.129 ", "ContentType": "text/plain"}], "uids": ["CvakxQPAODFet9vB2"]} -{"Format": "IDEA0", "ID": "0ae16c63-0b56-42d8-881b-bc7f48a26cef", "DetectTime": "2023-10-30T13:57:58.093286+02:00", "EventTime": "2023-10-30T13:57:58.093310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["Cvzqey3rGtJwitixpk"]} -{"Format": "IDEA0", "ID": "e0b6985a-dc31-4a59-b498-2a5f5da18b01", "DetectTime": "2023-10-30T13:57:58.128524+02:00", "EventTime": "2023-10-30T13:57:58.128551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CXMDYN15OSk5oCYhM"]} -{"Format": "IDEA0", "ID": "114c6ee3-e7c3-4458-8704-05741f798976", "DetectTime": "2023-10-30T13:57:58.160009+02:00", "EventTime": "2023-10-30T13:57:58.160027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["COiakUEmMmrK599Ng"]} -{"Format": "IDEA0", "ID": "8329a07c-16a3-4e31-bf11-6793f0ce5556", "DetectTime": "2023-10-30T13:57:58.195528+02:00", "EventTime": "2023-10-30T13:57:58.195555+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3teuB3wsCwACbvMxg"]} -{"Format": "IDEA0", "ID": "da271351-8842-42d5-8434-bdbbed9e19d7", "DetectTime": "2023-10-30T13:57:58.216901+02:00", "EventTime": "2023-10-30T13:57:58.216929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["ChnPemJB9WxXl7se2"]} -{"Format": "IDEA0", "ID": "5ee2683a-d541-4dea-8d1a-0aee3d6a1a79", "DetectTime": "2023-10-30T13:57:58.248626+02:00", "EventTime": "2023-10-30T13:57:58.248644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.167.37.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.167.37.219 ", "ContentType": "text/plain"}], "uids": ["CxDe6X1lcDt52Ql5eg"]} -{"Format": "IDEA0", "ID": "d1e04b11-c355-410d-92ce-68fc898709de", "DetectTime": "2023-10-30T13:57:58.282902+02:00", "EventTime": "2023-10-30T13:57:58.283110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CRN9ZV3leWmQPwQD92"]} -{"Format": "IDEA0", "ID": "4d7a6a09-0028-41b4-9cfe-bd0a4be60c3b", "DetectTime": "2023-10-30T13:57:58.318285+02:00", "EventTime": "2023-10-30T13:57:58.318304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cidm222RvxBcdUV7a6"]} -{"Format": "IDEA0", "ID": "97db4cb9-31ce-4412-b41b-7fa96ae88b35", "DetectTime": "2023-10-30T13:57:58.349284+02:00", "EventTime": "2023-10-30T13:57:58.349301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["ClBNqxtHfYsc6QZhl"]} -{"Format": "IDEA0", "ID": "a2eed985-43c9-4cc4-b1e2-f648d9003af1", "DetectTime": "2023-10-30T13:57:58.382412+02:00", "EventTime": "2023-10-30T13:57:58.382437+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4tfd54PWcqoXZQ3P7"]} -{"Format": "IDEA0", "ID": "d14b7263-7428-4df1-9efa-d3f84b31e684", "DetectTime": "2023-10-30T13:57:58.400489+02:00", "EventTime": "2023-10-30T13:57:58.400509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.126.185.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.126.185.242 ", "ContentType": "text/plain"}], "uids": ["Cf4hDqy4YHDrtazB7"]} -{"Format": "IDEA0", "ID": "647b49d1-9787-4435-9cac-37204c172a6a", "DetectTime": "2023-10-30T13:57:58.429598+02:00", "EventTime": "2023-10-30T13:57:58.429615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.250.198.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.250.198.14 ", "ContentType": "text/plain"}], "uids": ["CkQuya4UGyp5J4wm7b"]} -{"Format": "IDEA0", "ID": "a6825650-79b5-4b47-9b6b-e9980d12e594", "DetectTime": "2023-10-30T13:57:58.461536+02:00", "EventTime": "2023-10-30T13:57:58.461555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["ChDAt5vbnr2MMM4o8", "CcIFok3PBAl56hydMl", "CveI4i3r3pizNaUyPl", "C3teuB3wsCwACbvMxg"]} -{"Format": "IDEA0", "ID": "0b3a8f2a-ae0c-4d85-9ed4-ec9dcb9dfacb", "DetectTime": "2023-10-30T13:57:58.479651+02:00", "EventTime": "2023-10-30T13:57:58.479671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CveI4i3r3pizNaUyPl"]} -{"Format": "IDEA0", "ID": "f9254f10-996f-4e39-ba05-348bf915dd1d", "DetectTime": "2023-10-30T13:57:58.496464+02:00", "EventTime": "2023-10-30T13:57:58.496489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoYhIU1EGPFUKsjeke"]} -{"Format": "IDEA0", "ID": "f1580a99-b5a3-4d14-93fb-08b76dd4f923", "DetectTime": "2023-10-30T13:57:58.514077+02:00", "EventTime": "2023-10-30T13:57:58.514103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CyCxaL4j1TVMUFXLf"]} -{"Format": "IDEA0", "ID": "3493b649-54a4-48cd-882c-ecfc5fb71c2c", "DetectTime": "2023-10-30T13:57:58.550709+02:00", "EventTime": "2023-10-30T13:57:58.550730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.35.33.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.35.33.27 ", "ContentType": "text/plain"}], "uids": ["Cato2T1dJGqVzESTEc"]} -{"Format": "IDEA0", "ID": "f1767dcc-ff5f-4a12-9c77-49e40abb0d31", "DetectTime": "2023-10-30T13:57:58.583569+02:00", "EventTime": "2023-10-30T13:57:58.583596+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQvwjk4bFdwaKel1p4"]} -{"Format": "IDEA0", "ID": "feaf2a23-d106-4271-9e49-f07eac410b87", "DetectTime": "2023-10-30T13:57:58.607002+02:00", "EventTime": "2023-10-30T13:57:58.607023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CulxNva2qjHnp0ui6"]} -{"Format": "IDEA0", "ID": "4f00aa01-98ee-4d9f-b116-b6ea45ce4769", "DetectTime": "2023-10-30T13:57:58.640534+02:00", "EventTime": "2023-10-30T13:57:58.640556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["C33LKW1Cn3BmNF34dk"]} -{"Format": "IDEA0", "ID": "fb95376a-2a72-430d-8f4c-613fc878eb37", "DetectTime": "2023-10-30T13:57:58.674383+02:00", "EventTime": "2023-10-30T13:57:58.674403+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cjcwtq1y1X57hiUTxf"]} -{"Format": "IDEA0", "ID": "8894e25a-13f5-4654-af67-a00a16e3ceb5", "DetectTime": "2023-10-30T13:57:58.691756+02:00", "EventTime": "2023-10-30T13:57:58.691776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CHnyPs4fG4k8MEFtF9"]} -{"Format": "IDEA0", "ID": "f5ad558b-16ba-4633-a819-bb01ba5cafd9", "DetectTime": "2023-10-30T13:57:58.729983+02:00", "EventTime": "2023-10-30T13:57:58.730005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CV49Uh1Lmyux16Vp01"]} -{"Format": "IDEA0", "ID": "1f6bc014-4b8f-47d6-bbeb-ebc018de343c", "DetectTime": "2023-10-30T13:57:58.762312+02:00", "EventTime": "2023-10-30T13:57:58.762340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cks8gh1rNP9zAxaEb3"]} -{"Format": "IDEA0", "ID": "c50f9b30-c178-4619-82c3-e7e86f8d2840", "DetectTime": "2023-10-30T13:57:58.781910+02:00", "EventTime": "2023-10-30T13:57:58.781927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.93.244.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.93.244.19 ", "ContentType": "text/plain"}], "uids": ["CmJDBB4kJsV2Nkgaz5"]} -{"Format": "IDEA0", "ID": "2f2014f9-105c-441b-9510-683235593dbf", "DetectTime": "2023-10-30T13:57:58.813464+02:00", "EventTime": "2023-10-30T13:57:58.813489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["C2MsPl4uXIpRedy6Ac"]} -{"Format": "IDEA0", "ID": "b1089ff2-5f8a-46eb-bd23-bba618b2ba7f", "DetectTime": "2023-10-30T13:57:58.851182+02:00", "EventTime": "2023-10-30T13:57:58.851203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.19.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.19.134 ", "ContentType": "text/plain"}], "uids": ["CreZPlP2ghmxXtv98"]} -{"Format": "IDEA0", "ID": "81ca2536-6b1f-4d92-b7ca-cd30384651ca", "DetectTime": "2023-10-30T13:57:58.884618+02:00", "EventTime": "2023-10-30T13:57:58.884640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CMM33k2hWxzEvM17Y6"]} -{"Format": "IDEA0", "ID": "579d3ed8-b152-444f-a0b8-5ef2aefecca2", "DetectTime": "2023-10-30T13:57:58.919043+02:00", "EventTime": "2023-10-30T13:57:58.919063+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CogN5M1KtMgyJOFMMf"]} -{"Format": "IDEA0", "ID": "cdbb08b9-629e-40e6-856c-2016c3c1c18a", "DetectTime": "2023-10-30T13:57:58.947963+02:00", "EventTime": "2023-10-30T13:57:58.947979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CCPyIp4WkVmGI5o1Zi"]} -{"Format": "IDEA0", "ID": "83f14a1c-71a6-4fd8-8036-0d437299f73c", "DetectTime": "2023-10-30T13:57:58.992736+02:00", "EventTime": "2023-10-30T13:57:58.992760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.200.208.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.200.208.186 ", "ContentType": "text/plain"}], "uids": ["CFxnUt2auN5x2nFXM5"]} -{"Format": "IDEA0", "ID": "a769b357-d4d1-4166-8379-8e2ece1f3955", "DetectTime": "2023-10-30T13:57:59.031944+02:00", "EventTime": "2023-10-30T13:57:59.031966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Hostname": ["108-74-172-39.lightspeed.lsanca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CRjCmPchpPqgFIvjf"]} -{"Format": "IDEA0", "ID": "c844fdf2-e605-4ed1-a45f-e3d68e8ad54a", "DetectTime": "2023-10-30T13:57:59.064990+02:00", "EventTime": "2023-10-30T13:57:59.065008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.27.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.27.151 ", "ContentType": "text/plain"}], "uids": ["CbxvU12Zgt1arX0Wq2"]} -{"Format": "IDEA0", "ID": "3aebe392-4ea5-4b25-98e7-47fcd5c46636", "DetectTime": "2023-10-30T13:57:59.097659+02:00", "EventTime": "2023-10-30T13:57:59.097690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["209.87.253.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 209.87.253.158 ", "ContentType": "text/plain"}], "uids": ["C17hc9cWoas8myHr1"]} -{"Format": "IDEA0", "ID": "dd13ea38-1aa3-479e-b1f5-e2a0ba77e9ce", "DetectTime": "2023-10-30T13:57:59.131384+02:00", "EventTime": "2023-10-30T13:57:59.131401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CxsnYg33wucSudLdv5"]} -{"Format": "IDEA0", "ID": "1bd21441-61b0-4b5f-a6dd-33999abb673b", "DetectTime": "2023-10-30T13:57:59.165721+02:00", "EventTime": "2023-10-30T13:57:59.165866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.107.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.107.44 ", "ContentType": "text/plain"}], "uids": ["CDaRt74Cib7cnHViI3"]} -{"Format": "IDEA0", "ID": "6215d13c-e4cc-45c2-9a6d-94e8989cb085", "DetectTime": "2023-10-30T13:57:59.193287+02:00", "EventTime": "2023-10-30T13:57:59.193313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.253.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.253.45 ", "ContentType": "text/plain"}], "uids": ["CP0DAA3f4NOV6AghEa"]} -{"Format": "IDEA0", "ID": "c1d73857-efe2-4d9c-991d-af27e48c0ee0", "DetectTime": "2023-10-30T13:57:59.218980+02:00", "EventTime": "2023-10-30T13:57:59.218997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["CiLztw2EHSCIHmbhN6"]} -{"Format": "IDEA0", "ID": "d296513d-38db-47cf-b6da-840a31d4a86b", "DetectTime": "2023-10-30T13:57:59.244060+02:00", "EventTime": "2023-10-30T13:57:59.244078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.201.120.6 ", "ContentType": "text/plain"}], "uids": ["CHXvCl42cipnde81h1"]} -{"Format": "IDEA0", "ID": "0509db6b-c788-4a08-b769-da45818616d5", "DetectTime": "2023-10-30T13:57:59.274333+02:00", "EventTime": "2023-10-30T13:57:59.274356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["CfQKaG1oIu0HvWsNp2"]} -{"Format": "IDEA0", "ID": "12cc3a5a-afd3-4a6c-afdf-b1c0e20ba2d3", "DetectTime": "2023-10-30T13:57:59.304017+02:00", "EventTime": "2023-10-30T13:57:59.304037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Hostname": ["108-74-172-39.lightspeed.lsanca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C1Ecqb2vwSOL2Nzbbc"]} -{"Format": "IDEA0", "ID": "010fad64-9de1-48c2-ac11-ed46e95b08a8", "DetectTime": "2023-10-30T13:57:59.338177+02:00", "EventTime": "2023-10-30T13:57:59.338192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CaeLiD1Y8fd1fkB0Ab"]} -{"Format": "IDEA0", "ID": "f3b5afb7-4bd2-43eb-b795-542f0c00face", "DetectTime": "2023-10-30T13:57:59.365436+02:00", "EventTime": "2023-10-30T13:57:59.365468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CIFKGj3Nn49SXmaALc"]} -{"Format": "IDEA0", "ID": "734fedab-1a15-47a5-ba65-f2488b77c090", "DetectTime": "2023-10-30T13:57:59.395700+02:00", "EventTime": "2023-10-30T13:57:59.395718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CJFczr310T5PyxEON6"]} -{"Format": "IDEA0", "ID": "222ff514-cef9-4cd2-a6c8-4212ad66d3c7", "DetectTime": "2023-10-30T13:57:59.419946+02:00", "EventTime": "2023-10-30T13:57:59.419963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CHv6Ax1TQigQYq9kCl"]} -{"Format": "IDEA0", "ID": "f7df7b00-a5dd-4d5a-81d6-fd4b394cf3b6", "DetectTime": "2023-10-30T13:57:59.445545+02:00", "EventTime": "2023-10-30T13:57:59.445572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CiJLtD4wIHSgQUcVxb"]} -{"Format": "IDEA0", "ID": "efd2c787-f33a-4e36-a83a-2ec91e0e4d19", "DetectTime": "2023-10-30T13:57:59.473253+02:00", "EventTime": "2023-10-30T13:57:59.473269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CvXmVMvbIUwLnE4Ja"]} -{"Format": "IDEA0", "ID": "e46c9700-0244-4a8a-846d-b7034a0a55ef", "DetectTime": "2023-10-30T13:57:59.498453+02:00", "EventTime": "2023-10-30T13:57:59.498480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["204.155.62.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 204.155.62.5 ", "ContentType": "text/plain"}], "uids": ["CpfOBjwFBLofPhrIe"]} -{"Format": "IDEA0", "ID": "b4fb133a-4123-4fe9-be20-a04628d22127", "DetectTime": "2023-10-30T13:57:59.521715+02:00", "EventTime": "2023-10-30T13:57:59.521738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.247.221.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.247.221.165 ", "ContentType": "text/plain"}], "uids": ["CCLPa74Qf7trJRHXe"]} -{"Format": "IDEA0", "ID": "20c8d57f-640e-4f56-984d-91d2af840b10", "DetectTime": "2023-10-30T13:57:59.550717+02:00", "EventTime": "2023-10-30T13:57:59.550744+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTsdCiNN2pstieif7"]} -{"Format": "IDEA0", "ID": "8b10cd78-b1ee-4f1c-9cc2-73ae22d9b592", "DetectTime": "2023-10-30T13:57:59.567914+02:00", "EventTime": "2023-10-30T13:57:59.567940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.55.197.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.55.197.94 ", "ContentType": "text/plain"}], "uids": ["CVXop415Xgcrl3VEM9"]} -{"Format": "IDEA0", "ID": "1012397c-93aa-440e-9947-8874d73b6c1e", "DetectTime": "2023-10-30T13:57:59.597074+02:00", "EventTime": "2023-10-30T13:57:59.597094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["C8dDJkzzAXlKO34dd"]} -{"Format": "IDEA0", "ID": "1f28be48-0f85-492b-8513-120a5fe4251d", "DetectTime": "2023-10-30T13:57:59.621603+02:00", "EventTime": "2023-10-30T13:57:59.621624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.253.82.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.253.82.119 ", "ContentType": "text/plain"}], "uids": ["Cr5eDi2WAXsAZ0KyZk"]} -{"Format": "IDEA0", "ID": "18f5b9ba-d135-4e5b-ad23-adb51107cf11", "DetectTime": "2023-10-30T13:57:59.647863+02:00", "EventTime": "2023-10-30T13:57:59.647886+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxJZk12pfRFkTfG25e"]} -{"Format": "IDEA0", "ID": "066adf61-d5bf-410c-82b5-93537521e07c", "DetectTime": "2023-10-30T13:57:59.663762+02:00", "EventTime": "2023-10-30T13:57:59.663778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CAaymk2nwWWnS1jeAd"]} -{"Format": "IDEA0", "ID": "d49fc895-01c8-4c74-9984-19485746fc1e", "DetectTime": "2023-10-30T13:57:59.690863+02:00", "EventTime": "2023-10-30T13:57:59.690882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CjkjNmvWoHZQlGLX4"]} -{"Format": "IDEA0", "ID": "d20cb804-6853-4a95-9a20-73889c36984f", "DetectTime": "2023-10-30T13:57:59.713539+02:00", "EventTime": "2023-10-30T13:57:59.713564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.129.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.129.61 ", "ContentType": "text/plain"}], "uids": ["CM0vFL3FP3yg3ItpXa"]} -{"Format": "IDEA0", "ID": "13ea6637-4ff0-4d3b-aff0-6515c796112e", "DetectTime": "2023-10-30T13:57:59.742428+02:00", "EventTime": "2023-10-30T13:57:59.742454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.94.67.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.94.67.10 ", "ContentType": "text/plain"}], "uids": ["C6NR0prHfDP2tCi0d"]} -{"Format": "IDEA0", "ID": "db541c03-4086-43b0-83c3-fb41bbfaa4be", "DetectTime": "2023-10-30T13:57:59.769634+02:00", "EventTime": "2023-10-30T13:57:59.769650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.250.117.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.250.117.232 ", "ContentType": "text/plain"}], "uids": ["CncpjT2zLjamj7aHC"]} -{"Format": "IDEA0", "ID": "99524fee-8465-4feb-a5fd-8a1fbe896700", "DetectTime": "2023-10-30T13:57:59.797373+02:00", "EventTime": "2023-10-30T13:57:59.797386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.165.116.48 ", "ContentType": "text/plain"}], "uids": ["CQj3Ns1X6rF2qL5mUc"]} -{"Format": "IDEA0", "ID": "6b5055be-d8ed-4311-bfdb-b15b6b09277f", "DetectTime": "2023-10-30T13:57:59.824148+02:00", "EventTime": "2023-10-30T13:57:59.824166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.219.208.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.219.208.219 ", "ContentType": "text/plain"}], "uids": ["CFYKYw1PETFXFklDMk"]} -{"Format": "IDEA0", "ID": "4ec5c9be-8643-45ed-9d75-fff245c4f357", "DetectTime": "2023-10-30T13:57:59.849828+02:00", "EventTime": "2023-10-30T13:57:59.849845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CenBO41qFRoFkOTb1k"]} -{"Format": "IDEA0", "ID": "defcfdc2-002f-45d3-add3-cf32a8db4086", "DetectTime": "2023-10-30T13:57:59.886374+02:00", "EventTime": "2023-10-30T13:57:59.886396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQvwjk4bFdwaKel1p4", "CTsdCiNN2pstieif7", "CcUeU93mmOQ8hKJ048", "Cks8gh1rNP9zAxaEb3"]} -{"Format": "IDEA0", "ID": "b380e3c8-9fc1-4905-9729-7edf1e5bd265", "DetectTime": "2023-10-30T13:57:59.905579+02:00", "EventTime": "2023-10-30T13:57:59.905602+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcUeU93mmOQ8hKJ048"]} -{"Format": "IDEA0", "ID": "9acffd64-b934-4825-97fa-4772916d2cb3", "DetectTime": "2023-10-30T13:57:59.922346+02:00", "EventTime": "2023-10-30T13:57:59.922367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CX9yja3L4CC4X58Lzl"]} -{"Format": "IDEA0", "ID": "890b8c7e-fd25-4ade-a77b-b771e46a5b54", "DetectTime": "2023-10-30T13:57:59.950580+02:00", "EventTime": "2023-10-30T13:57:59.950596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["C9Z5rc150ubmbuxu73"]} -{"Format": "IDEA0", "ID": "cf9aaaef-a504-406f-8e5e-8b75817accfe", "DetectTime": "2023-10-30T13:57:59.976966+02:00", "EventTime": "2023-10-30T13:57:59.976983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.130.55.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.130.55.165 ", "ContentType": "text/plain"}], "uids": ["C6Ta19ovRtn8lexQg"]} -{"Format": "IDEA0", "ID": "a6d2b937-b3cb-4943-956a-366d82e7bd6d", "DetectTime": "2023-10-30T13:58:00.008333+02:00", "EventTime": "2023-10-30T13:58:00.008356+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmuCLn1y8PR6uL0S8i"]} -{"Format": "IDEA0", "ID": "425d7bc3-092f-49ed-a7e9-4941817021ba", "DetectTime": "2023-10-30T13:58:00.025314+02:00", "EventTime": "2023-10-30T13:58:00.025341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.241.115.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.241.115.233 ", "ContentType": "text/plain"}], "uids": ["CA2kJhYcdgS4sO6q6"]} -{"Format": "IDEA0", "ID": "cb45ff8f-900d-4256-989c-e2020a830b9b", "DetectTime": "2023-10-30T13:58:00.051642+02:00", "EventTime": "2023-10-30T13:58:00.051667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CLDfQA1NB0M65LNwll"]} -{"Format": "IDEA0", "ID": "ce9a4c2b-9a09-49ef-bffc-985fe4805d6c", "DetectTime": "2023-10-30T13:58:00.078199+02:00", "EventTime": "2023-10-30T13:58:00.078218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.143.178.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.143.178.97 ", "ContentType": "text/plain"}], "uids": ["C1o2SM1o0lxYyTw5Eh"]} -{"Format": "IDEA0", "ID": "1fe92827-bdcf-40e1-a1a1-fb7ebb8702d2", "DetectTime": "2023-10-30T13:58:00.106520+02:00", "EventTime": "2023-10-30T13:58:00.106540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["C2H2Dq2wOaTK26xIv9"]} -{"Format": "IDEA0", "ID": "ccbb8b54-263e-44cc-8c19-f6cc3c4704e8", "DetectTime": "2023-10-30T13:58:00.137555+02:00", "EventTime": "2023-10-30T13:58:00.137579+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3JNJL3hVJjAObkQN"]} -{"Format": "IDEA0", "ID": "85fc895f-e364-4940-9703-4a7aeefb5253", "DetectTime": "2023-10-30T13:58:00.155434+02:00", "EventTime": "2023-10-30T13:58:00.155459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CXI8RMTkavDbu7kVi"]} -{"Format": "IDEA0", "ID": "0cd0e0e6-22da-4def-bcfa-4b8c90d3f691", "DetectTime": "2023-10-30T13:58:00.183604+02:00", "EventTime": "2023-10-30T13:58:00.183633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CJbwPc3wDFawtykOFd"]} -{"Format": "IDEA0", "ID": "bc73bc27-7a4a-43b0-b70d-81f9fd79f726", "DetectTime": "2023-10-30T13:58:00.211601+02:00", "EventTime": "2023-10-30T13:58:00.211624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 ", "ContentType": "text/plain"}], "uids": ["Cpppby29uCEHBmyeqg"]} -{"Format": "IDEA0", "ID": "5e86d3ea-5635-412e-9a48-334c4df3708c", "DetectTime": "2023-10-30T13:58:00.238314+02:00", "EventTime": "2023-10-30T13:58:00.238342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.114.37 ", "ContentType": "text/plain"}], "uids": ["CrWHIg3VVBftey8E8e"]} -{"Format": "IDEA0", "ID": "07d052f0-ee32-4026-bd93-fd274ce3527e", "DetectTime": "2023-10-30T13:58:00.262818+02:00", "EventTime": "2023-10-30T13:58:00.262838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CBDWdzuPqyRMHnNVc"]} -{"Format": "IDEA0", "ID": "dd6fc633-04c3-45fb-94f5-85886edd828f", "DetectTime": "2023-10-30T13:58:00.289360+02:00", "EventTime": "2023-10-30T13:58:00.289389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CfVbBlOxrLPyTNQm7"]} -{"Format": "IDEA0", "ID": "fc3f4792-04f4-42b6-801a-20ac4e66f2ca", "DetectTime": "2023-10-30T13:58:00.313365+02:00", "EventTime": "2023-10-30T13:58:00.313390+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIamEGgF7Xpjnf60e"]} -{"Format": "IDEA0", "ID": "68ba4ae5-b93c-4dfa-be18-ef2823065381", "DetectTime": "2023-10-30T13:58:00.328381+02:00", "EventTime": "2023-10-30T13:58:00.328407+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C27ZOn20UK20U1SAqc"]} -{"Format": "IDEA0", "ID": "36963b49-36e3-4a39-94dc-8c7100fcfccc", "DetectTime": "2023-10-30T13:58:00.345053+02:00", "EventTime": "2023-10-30T13:58:00.345081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["Cdh5w92ojkB8F6ZI7k"]} -{"Format": "IDEA0", "ID": "a1406252-6530-4c8a-8bcc-a05c2cb26c3c", "DetectTime": "2023-10-30T13:58:00.370708+02:00", "EventTime": "2023-10-30T13:58:00.370735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["CY0Z3O2BBDedAPkaqa"]} -{"Format": "IDEA0", "ID": "cd1e1675-cc1a-463f-804d-b1948caf17c0", "DetectTime": "2023-10-30T13:58:00.397728+02:00", "EventTime": "2023-10-30T13:58:00.397799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CQXMGx3wqwDXXOBIa7"]} -{"Format": "IDEA0", "ID": "ea885e85-d9a8-426a-8d7f-b72ebff0a511", "DetectTime": "2023-10-30T13:58:00.422212+02:00", "EventTime": "2023-10-30T13:58:00.422239+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUdhZ6240wFVfex7Hd"]} -{"Format": "IDEA0", "ID": "31b32a7e-b242-430b-9648-7108f0917098", "DetectTime": "2023-10-30T13:58:00.437465+02:00", "EventTime": "2023-10-30T13:58:00.437486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.92.1.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.92.1.214 ", "ContentType": "text/plain"}], "uids": ["C4IFEE2ZYY5eZ0Zj2e"]} -{"Format": "IDEA0", "ID": "4b3413e6-9fe9-4e15-bba1-0f595997e12c", "DetectTime": "2023-10-30T13:58:00.465457+02:00", "EventTime": "2023-10-30T13:58:00.465476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CO0NP24oC3XJ0GiBfi"]} -{"Format": "IDEA0", "ID": "f2217ae4-08d8-4be0-a199-8d98e5d150d6", "DetectTime": "2023-10-30T13:58:00.491425+02:00", "EventTime": "2023-10-30T13:58:00.491443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["C0ohPP2tESGEYaEm3"]} -{"Format": "IDEA0", "ID": "6c61ebfa-83d0-4bfa-b5ca-0e9b9fad05ec", "DetectTime": "2023-10-30T13:58:00.514931+02:00", "EventTime": "2023-10-30T13:58:00.514954+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7yOk83Po6F0cEhHti"]} -{"Format": "IDEA0", "ID": "08c66f12-ab0a-4120-be2e-c431ff2e52dd", "DetectTime": "2023-10-30T13:58:00.531914+02:00", "EventTime": "2023-10-30T13:58:00.531941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["C1KA6q22ALYNPnXLPg"]} -{"Format": "IDEA0", "ID": "0f807f68-d1f6-483c-a024-c0748826ac5d", "DetectTime": "2023-10-30T13:58:00.558398+02:00", "EventTime": "2023-10-30T13:58:00.558415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["205.210.7.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 205.210.7.254 ", "ContentType": "text/plain"}], "uids": ["CBVCMr1H89Vo3WiAni"]} -{"Format": "IDEA0", "ID": "6dc76ea8-53b6-4d4b-809d-f4ca1f5c094b", "DetectTime": "2023-10-30T13:58:00.583136+02:00", "EventTime": "2023-10-30T13:58:00.583161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CzykXW1DGYlb6FhDHa"]} -{"Format": "IDEA0", "ID": "d7fb9681-8cc3-4540-9337-e3c0dd225208", "DetectTime": "2023-10-30T13:58:00.608612+02:00", "EventTime": "2023-10-30T13:58:00.608636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.152.27.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.152.27.157 ", "ContentType": "text/plain"}], "uids": ["Cc8MQp1zgtoaE3LTb2"]} -{"Format": "IDEA0", "ID": "c97c0b7f-cf9f-45a3-ac1d-5cbe021c5875", "DetectTime": "2023-10-30T13:58:00.634954+02:00", "EventTime": "2023-10-30T13:58:00.634976+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CO81F110LPRLrnlvJj"]} -{"Format": "IDEA0", "ID": "d7defe4a-88b0-4b8f-9699-6a840371329d", "DetectTime": "2023-10-30T13:58:00.649732+02:00", "EventTime": "2023-10-30T13:58:00.649759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.253.82.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.253.82.119 ", "ContentType": "text/plain"}], "uids": ["CCoXPj3jrELG0D2sge"]} -{"Format": "IDEA0", "ID": "dffe2396-a101-4171-8b47-4dd86ea667a4", "DetectTime": "2023-10-30T13:58:00.675718+02:00", "EventTime": "2023-10-30T13:58:00.675740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C27ZOn20UK20U1SAqc", "Cumw292GAVNHQyeQ1a", "C7yOk83Po6F0cEhHti", "C3JNJL3hVJjAObkQN"]} -{"Format": "IDEA0", "ID": "47cae966-d73c-4d39-8b22-a577e653839c", "DetectTime": "2023-10-30T13:58:00.692943+02:00", "EventTime": "2023-10-30T13:58:00.692968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.160.170.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.160.170.26 ", "ContentType": "text/plain"}], "uids": ["C83qLzQolz66Da2u6"]} -{"Format": "IDEA0", "ID": "bef9dbbc-8ff6-4976-958a-b047fae40bff", "DetectTime": "2023-10-30T13:58:00.720755+02:00", "EventTime": "2023-10-30T13:58:00.720782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CJFKUowTKycPO75D7"]} -{"Format": "IDEA0", "ID": "6edea0a0-69ca-4da3-9e6e-fc339d345f97", "DetectTime": "2023-10-30T13:58:00.746054+02:00", "EventTime": "2023-10-30T13:58:00.746073+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cumw292GAVNHQyeQ1a"]} -{"Format": "IDEA0", "ID": "c6d51cc5-2856-4dac-9657-23b03a5a9f54", "DetectTime": "2023-10-30T13:58:00.760989+02:00", "EventTime": "2023-10-30T13:58:00.761017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["61.19.224.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 61.19.224.238 ", "ContentType": "text/plain"}], "uids": ["C1kmmq2fkXJTIkaP6b"]} -{"Format": "IDEA0", "ID": "0489167d-a46b-4fdb-b344-743eed65828a", "DetectTime": "2023-10-30T13:58:00.786166+02:00", "EventTime": "2023-10-30T13:58:00.786190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["C3oJ8AEOuFzp1uVij"]} -{"Format": "IDEA0", "ID": "e418ef92-5201-4674-a3af-66959719ba71", "DetectTime": "2023-10-30T13:58:00.810570+02:00", "EventTime": "2023-10-30T13:58:00.810582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C8yDvEJXawrSwmT2a"]} -{"Format": "IDEA0", "ID": "7f7f4624-4121-440e-904b-f47681941346", "DetectTime": "2023-10-30T13:58:00.834585+02:00", "EventTime": "2023-10-30T13:58:00.834609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.57.162.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.57.162.209 ", "ContentType": "text/plain"}], "uids": ["ChJ4lu2tNFDACUCkN2"]} -{"Format": "IDEA0", "ID": "dfca5cd7-fa20-4085-bf16-5b6ae679e69b", "DetectTime": "2023-10-30T13:58:00.864087+02:00", "EventTime": "2023-10-30T13:58:00.864111+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKfEvB3kT3TeETxZBc"]} -{"Format": "IDEA0", "ID": "c65dc01d-3d4d-480b-bace-4ca2d0b90441", "DetectTime": "2023-10-30T13:58:00.884078+02:00", "EventTime": "2023-10-30T13:58:00.884097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CLUBHBTsjV9fpCyW"]} -{"Format": "IDEA0", "ID": "cc677090-7a36-4adf-8a1d-42dfd287bcb3", "DetectTime": "2023-10-30T13:58:00.908523+02:00", "EventTime": "2023-10-30T13:58:00.908543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CHnVxv4guAg48rxJqf"]} -{"Format": "IDEA0", "ID": "06b49b6c-b48f-4cd3-b590-472623bcde82", "DetectTime": "2023-10-30T13:58:00.934317+02:00", "EventTime": "2023-10-30T13:58:00.934336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.90.187.38 ", "ContentType": "text/plain"}], "uids": ["C9iTKccrL7TluPb4d"]} -{"Format": "IDEA0", "ID": "5308e427-8cb6-491a-8109-9d265d771105", "DetectTime": "2023-10-30T13:58:00.959163+02:00", "EventTime": "2023-10-30T13:58:00.959182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["C1n85vn8NtCcQqNuf"]} -{"Format": "IDEA0", "ID": "00b3fd3e-12c6-493a-890b-cab129ee89d2", "DetectTime": "2023-10-30T13:58:00.983268+02:00", "EventTime": "2023-10-30T13:58:00.983294+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CThF1y3vqd3TORB0G1"]} -{"Format": "IDEA0", "ID": "e87b1460-e6c9-4cb6-9c1d-bfe89a17dae5", "DetectTime": "2023-10-30T13:58:00.999080+02:00", "EventTime": "2023-10-30T13:58:00.999106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.22.228.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.22.228.63 ", "ContentType": "text/plain"}], "uids": ["CX3YRa4j0IjtHhn2L6"]} -{"Format": "IDEA0", "ID": "f3432b98-9db3-40f8-bb80-60005b5ffbdc", "DetectTime": "2023-10-30T13:58:01.025213+02:00", "EventTime": "2023-10-30T13:58:01.025239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.129.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.129.64 ", "ContentType": "text/plain"}], "uids": ["CvUp9Y2RatFf6bfLp9"]} -{"Format": "IDEA0", "ID": "cc40eb2b-88a7-44c0-a84d-ff325582c682", "DetectTime": "2023-10-30T13:58:01.052074+02:00", "EventTime": "2023-10-30T13:58:01.052097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.119.190.39 ", "ContentType": "text/plain"}], "uids": ["CbcSX52yM34VLdNi1g"]} -{"Format": "IDEA0", "ID": "fe070be0-7e8d-44c0-a974-bf84544e1339", "DetectTime": "2023-10-30T13:58:01.096376+02:00", "EventTime": "2023-10-30T13:58:01.096396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.186.228.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.186.228.111 ", "ContentType": "text/plain"}], "uids": ["CZeOY527yEbtsnRZqa"]} -{"Format": "IDEA0", "ID": "0ad6d1ee-a6c0-462a-a01d-0bedf6547c50", "DetectTime": "2023-10-30T13:58:01.127994+02:00", "EventTime": "2023-10-30T13:58:01.128022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["CFvSc23gKbAUG1YgPc"]} -{"Format": "IDEA0", "ID": "8afd7622-d683-4ca6-9356-581b323981fe", "DetectTime": "2023-10-30T13:58:01.157430+02:00", "EventTime": "2023-10-30T13:58:01.157456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CGMfM34uBg9QuXFrJe"]} -{"Format": "IDEA0", "ID": "2512cd8f-0ba9-45f5-81c8-1311a0da365b", "DetectTime": "2023-10-30T13:58:01.191233+02:00", "EventTime": "2023-10-30T13:58:01.191258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["C4vkzA3Kurpy8SfFb8"]} -{"Format": "IDEA0", "ID": "95f0b8bc-d1d2-48cd-897d-f016ceb0ab6b", "DetectTime": "2023-10-30T13:58:01.216587+02:00", "EventTime": "2023-10-30T13:58:01.216609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.1.28.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.1.28.117 ", "ContentType": "text/plain"}], "uids": ["CY9Qyvw6r5tlOvPl"]} -{"Format": "IDEA0", "ID": "223756a1-021e-4441-b2f8-347749bb370f", "DetectTime": "2023-10-30T13:58:01.343987+02:00", "EventTime": "2023-10-30T13:58:01.344060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CLTQ1LVLqdGAxnI64"]} -{"Format": "IDEA0", "ID": "4a72216b-652d-4a75-9348-eecb815b9215", "DetectTime": "2023-10-30T13:58:01.385385+02:00", "EventTime": "2023-10-30T13:58:01.385407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.160.203.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.160.203.71 ", "ContentType": "text/plain"}], "uids": ["CVDEwyRCuBZQ2qs55"]} -{"Format": "IDEA0", "ID": "f3a3be9e-7797-4200-a6e8-eaf5d023c579", "DetectTime": "2023-10-30T13:58:01.426491+02:00", "EventTime": "2023-10-30T13:58:01.426514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["209.12.192.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 209.12.192.228 ", "ContentType": "text/plain"}], "uids": ["CgocH02ZaLijSi17of"]} -{"Format": "IDEA0", "ID": "9eb0ad5e-dc2f-432f-a863-7cda32952b8c", "DetectTime": "2023-10-30T13:58:01.460678+02:00", "EventTime": "2023-10-30T13:58:01.460695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["CGu9cY20ierkI2SeN3"]} -{"Format": "IDEA0", "ID": "e4182119-8b80-4fb8-bcf1-ca3b70e78479", "DetectTime": "2023-10-30T13:58:01.501886+02:00", "EventTime": "2023-10-30T13:58:01.501908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.37.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.37.169 ", "ContentType": "text/plain"}], "uids": ["CC4VdC1iNAwyV9GfOl"]} -{"Format": "IDEA0", "ID": "89cf7367-d2e7-4bed-b91c-c39ec66ebe43", "DetectTime": "2023-10-30T13:58:01.537415+02:00", "EventTime": "2023-10-30T13:58:01.537439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["COOBvL356v4F7mkCu9"]} -{"Format": "IDEA0", "ID": "7786a6f1-1a90-4308-9952-793bca09293e", "DetectTime": "2023-10-30T13:58:01.571371+02:00", "EventTime": "2023-10-30T13:58:01.571396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["CeC7eK3yxUa9uzPtg4"]} -{"Format": "IDEA0", "ID": "4a8db0f7-c457-4d91-b168-2de3a18b42e6", "DetectTime": "2023-10-30T13:58:01.602955+02:00", "EventTime": "2023-10-30T13:58:01.602976+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8eYH92UgFeqcGxSZ3"]} -{"Format": "IDEA0", "ID": "314ac905-32a5-4038-b046-be789662dca1", "DetectTime": "2023-10-30T13:58:01.622031+02:00", "EventTime": "2023-10-30T13:58:01.622049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CHmGkq3xim4WKyExe5"]} -{"Format": "IDEA0", "ID": "6845166e-8773-460b-8b5c-3501f34f386a", "DetectTime": "2023-10-30T13:58:01.664627+02:00", "EventTime": "2023-10-30T13:58:01.664648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["COiWwP35YgwGtmTmDk"]} -{"Format": "IDEA0", "ID": "59678f15-e216-4f50-8a91-cfdc87f555ed", "DetectTime": "2023-10-30T13:58:01.695926+02:00", "EventTime": "2023-10-30T13:58:01.695945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CUOK0a2LfT4eX3BDxc"]} -{"Format": "IDEA0", "ID": "cf508c14-0738-46df-bd7e-a083359c8aa9", "DetectTime": "2023-10-30T13:58:01.728072+02:00", "EventTime": "2023-10-30T13:58:01.728094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.188.52.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.188.52.167 ", "ContentType": "text/plain"}], "uids": ["Cmr1Q448UVP2JTDb2i"]} -{"Format": "IDEA0", "ID": "ef623acb-8258-44de-801d-294c1385ef53", "DetectTime": "2023-10-30T13:58:01.768988+02:00", "EventTime": "2023-10-30T13:58:01.769043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CSgIwx4X1OOgfL7mE4"]} -{"Format": "IDEA0", "ID": "92c5c00b-48fc-40d6-a468-0e1b492f03cd", "DetectTime": "2023-10-30T13:58:01.809399+02:00", "EventTime": "2023-10-30T13:58:01.809423+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBbFN04Uy5rd6jR2sc"]} -{"Format": "IDEA0", "ID": "6db8e9f3-bbfe-4aaf-b888-a89d82c5aa6f", "DetectTime": "2023-10-30T13:58:01.825270+02:00", "EventTime": "2023-10-30T13:58:01.825288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.90.81.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.90.81.197 ", "ContentType": "text/plain"}], "uids": ["CXO8hk3Mmkt9qrDJ7f"]} -{"Format": "IDEA0", "ID": "2dab3669-a9cd-4762-8221-1c248a773677", "DetectTime": "2023-10-30T13:58:01.861061+02:00", "EventTime": "2023-10-30T13:58:01.861079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.172.166.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.172.166.115 ", "ContentType": "text/plain"}], "uids": ["CrhowS2zSQRvNtQ2E2"]} -{"Format": "IDEA0", "ID": "9e1bab96-1580-4576-8f9b-bc7f104786c2", "DetectTime": "2023-10-30T13:58:01.894188+02:00", "EventTime": "2023-10-30T13:58:01.894235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CkA16o2mzDDlWFql5j"]} -{"Format": "IDEA0", "ID": "ae33e5c6-fd1a-4321-ab0f-f56d86e58452", "DetectTime": "2023-10-30T13:58:01.932431+02:00", "EventTime": "2023-10-30T13:58:01.932449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["C8x89M0Eg5EOYCDBa"]} -{"Format": "IDEA0", "ID": "1ca0bd72-b1ec-4f29-881b-6f2e4a9f2ca6", "DetectTime": "2023-10-30T13:58:01.970544+02:00", "EventTime": "2023-10-30T13:58:01.970565+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJ4Br34Nt23Is3Qch8"]} -{"Format": "IDEA0", "ID": "6ea07e44-e3dc-41bb-a772-1c14ddaf84f1", "DetectTime": "2023-10-30T13:58:01.989416+02:00", "EventTime": "2023-10-30T13:58:01.989479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.49.121 ", "ContentType": "text/plain"}], "uids": ["C5WsGC2E9cgNUy9Sa7"]} -{"Format": "IDEA0", "ID": "ad03b192-6139-4c4e-82b5-5b232d4f3f98", "DetectTime": "2023-10-30T13:58:02.028975+02:00", "EventTime": "2023-10-30T13:58:02.028997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.49.121 ", "ContentType": "text/plain"}], "uids": ["CkHdTv1LTFyL6TeIci"]} -{"Format": "IDEA0", "ID": "9612739a-acf2-472a-a4fe-6a8553ab21e6", "DetectTime": "2023-10-30T13:58:02.066381+02:00", "EventTime": "2023-10-30T13:58:02.066399+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cspit92vkc8YYqdzo1"]} -{"Format": "IDEA0", "ID": "85bdbc96-9bae-4542-84ce-a0277d272b30", "DetectTime": "2023-10-30T13:58:02.079107+02:00", "EventTime": "2023-10-30T13:58:02.079124+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqVZFy4BNonA2NC8y5"]} -{"Format": "IDEA0", "ID": "b1b3862a-5f17-45ab-982e-57137d037d6d", "DetectTime": "2023-10-30T13:58:02.094181+02:00", "EventTime": "2023-10-30T13:58:02.094210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.114.37 ", "ContentType": "text/plain"}], "uids": ["CCaWEK3sLzndPRh2B3"]} -{"Format": "IDEA0", "ID": "bafded6b-48b9-464d-ae27-4afca2a41898", "DetectTime": "2023-10-30T13:58:02.115439+02:00", "EventTime": "2023-10-30T13:58:02.115456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CThF1y3vqd3TORB0G1", "Cspit92vkc8YYqdzo1", "Ctyo3d3UlU2Yfw6kQh", "CBbFN04Uy5rd6jR2sc"]} -{"Format": "IDEA0", "ID": "bed0142c-cda1-431e-a006-89db12349bdb", "DetectTime": "2023-10-30T13:58:02.129043+02:00", "EventTime": "2023-10-30T13:58:02.129062+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ctyo3d3UlU2Yfw6kQh"]} -{"Format": "IDEA0", "ID": "8d86c3d1-41fe-4a8f-ad29-df1875e12710", "DetectTime": "2023-10-30T13:58:02.143657+02:00", "EventTime": "2023-10-30T13:58:02.143675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["Cx33x51RpZCHZDkHM7"]} -{"Format": "IDEA0", "ID": "30cf0609-a004-4e3a-8123-51596abb913c", "DetectTime": "2023-10-30T13:58:02.170243+02:00", "EventTime": "2023-10-30T13:58:02.170262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.251.185.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.251.185.113 ", "ContentType": "text/plain"}], "uids": ["CFIeSaCKmsGmIQB6a"]} -{"Format": "IDEA0", "ID": "9319b5db-c1af-4b46-a8ed-d5a187f30732", "DetectTime": "2023-10-30T13:58:02.197044+02:00", "EventTime": "2023-10-30T13:58:02.197056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.1.28.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.1.28.117 ", "ContentType": "text/plain"}], "uids": ["CpGCkv4vDr8mbdC6yk"]} -{"Format": "IDEA0", "ID": "10625555-bc8e-4937-b5a8-b1e1f1a093a3", "DetectTime": "2023-10-30T13:58:02.234223+02:00", "EventTime": "2023-10-30T13:58:02.234246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CsvGtu23tXl9O4wAA4"]} -{"Format": "IDEA0", "ID": "d56feb12-aea1-43de-870e-6b8ac2011cbd", "DetectTime": "2023-10-30T13:58:02.259624+02:00", "EventTime": "2023-10-30T13:58:02.259641+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLlQlV1siL14Ohl4kb"]} -{"Format": "IDEA0", "ID": "31e14a1e-b823-442c-a911-1b8e9be927fb", "DetectTime": "2023-10-30T13:58:02.270312+02:00", "EventTime": "2023-10-30T13:58:02.270330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.90.187.38 ", "ContentType": "text/plain"}], "uids": ["C8n0o11cEnZLYR9oM1"]} -{"Format": "IDEA0", "ID": "9e574e10-c7e2-471e-91ed-aa6a716c7e28", "DetectTime": "2023-10-30T13:58:02.299618+02:00", "EventTime": "2023-10-30T13:58:02.299639+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cvzw122NOdQECtTNrd"]} -{"Format": "IDEA0", "ID": "882099d3-ea7a-4e5f-a19a-d0bddbe3d7ad", "DetectTime": "2023-10-30T13:58:02.312136+02:00", "EventTime": "2023-10-30T13:58:02.312153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.27.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.27.151 ", "ContentType": "text/plain"}], "uids": ["Cp499O3henZsBoucbh"]} -{"Format": "IDEA0", "ID": "25afb6e4-da1b-446a-9df4-87b167d68289", "DetectTime": "2023-10-30T13:58:02.341890+02:00", "EventTime": "2023-10-30T13:58:02.341913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CpfFLH2KmdjVl4Rn6b"]} -{"Format": "IDEA0", "ID": "305d62ea-95e0-454f-9c43-d828042e5ae3", "DetectTime": "2023-10-30T13:58:02.366805+02:00", "EventTime": "2023-10-30T13:58:02.366823+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6ZCri3X1YjlSvvI2i"]} -{"Format": "IDEA0", "ID": "f99f0151-02fd-4a1d-b47b-bc8f58ace07f", "DetectTime": "2023-10-30T13:58:02.383450+02:00", "EventTime": "2023-10-30T13:58:02.383475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CHcHq83z7Tjpnpnpoh"]} -{"Format": "IDEA0", "ID": "15a50bf2-7d29-4aee-be86-1440cc51159c", "DetectTime": "2023-10-30T13:58:02.414308+02:00", "EventTime": "2023-10-30T13:58:02.414328+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPm2iC1yOCiuQk9Xc9"]} -{"Format": "IDEA0", "ID": "8f449134-a3fd-4f75-b5d7-aa0436598f36", "DetectTime": "2023-10-30T13:58:02.427314+02:00", "EventTime": "2023-10-30T13:58:02.427334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["CnNuvymxVg9yy9L12"]} -{"Format": "IDEA0", "ID": "0bade5e3-8fe9-4a28-9ee8-d70c5c2b2975", "DetectTime": "2023-10-30T13:58:02.456034+02:00", "EventTime": "2023-10-30T13:58:02.456053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["CJbMKv2Th7SlwnLxV"]} -{"Format": "IDEA0", "ID": "a942d088-0071-415c-a836-21fe58173f3f", "DetectTime": "2023-10-30T13:58:02.481565+02:00", "EventTime": "2023-10-30T13:58:02.481585+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CILUTg2dkNK0SAXu49"]} -{"Format": "IDEA0", "ID": "4f611279-9a17-4473-874f-97b11e73f672", "DetectTime": "2023-10-30T13:58:02.495663+02:00", "EventTime": "2023-10-30T13:58:02.495682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CZSyDv2FwRarPAZ9J8"]} -{"Format": "IDEA0", "ID": "9fe3d89d-d099-4741-bbcd-a751aee5d0dc", "DetectTime": "2023-10-30T13:58:02.520243+02:00", "EventTime": "2023-10-30T13:58:02.520320+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIGxHY3TcevPZ5Biae"]} -{"Format": "IDEA0", "ID": "d73a777b-9ffd-4cae-9663-6919464d196a", "DetectTime": "2023-10-30T13:58:02.532675+02:00", "EventTime": "2023-10-30T13:58:02.532690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CnTVZA1JAzjogNcNpi"]} -{"Format": "IDEA0", "ID": "82ad3626-f9c6-4120-8c75-afa9110a5948", "DetectTime": "2023-10-30T13:58:02.556538+02:00", "EventTime": "2023-10-30T13:58:02.556554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.119.190.39 ", "ContentType": "text/plain"}], "uids": ["Cho9cV1dlgAiipTygh"]} -{"Format": "IDEA0", "ID": "cb23f023-a99d-4f43-b8c1-b442f4307e42", "DetectTime": "2023-10-30T13:58:02.588735+02:00", "EventTime": "2023-10-30T13:58:02.588759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTm1HN3DCYES0oWaUk"]} -{"Format": "IDEA0", "ID": "a21a006e-7911-4732-9a98-c6d06276ad10", "DetectTime": "2023-10-30T13:58:02.601683+02:00", "EventTime": "2023-10-30T13:58:02.601700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["C87xQl3uUc4EpwaGP8"]} -{"Format": "IDEA0", "ID": "20717df7-5b8e-4db3-9da4-00a2037a238a", "DetectTime": "2023-10-30T13:58:02.627692+02:00", "EventTime": "2023-10-30T13:58:02.627713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["Ca9gQA1pmBESfYnmt4"]} -{"Format": "IDEA0", "ID": "fa25d63b-8d9d-4736-81d9-4c4372386c2f", "DetectTime": "2023-10-30T13:58:02.658717+02:00", "EventTime": "2023-10-30T13:58:02.658739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIGxHY3TcevPZ5Biae", "CPm2iC1yOCiuQk9Xc9", "CbJbBa2FroUqpfUSjk", "Cvzw122NOdQECtTNrd"]} -{"Format": "IDEA0", "ID": "dd2035b5-8ffe-459e-aea9-018feec7472f", "DetectTime": "2023-10-30T13:58:02.674552+02:00", "EventTime": "2023-10-30T13:58:02.674570+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbJbBa2FroUqpfUSjk"]} -{"Format": "IDEA0", "ID": "fb462f8f-d586-4c39-84e4-73a72ebc5653", "DetectTime": "2023-10-30T13:58:02.687876+02:00", "EventTime": "2023-10-30T13:58:02.687896+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CT7hmy4kkXWcwhe27i"]} -{"Format": "IDEA0", "ID": "43651f73-374d-4c16-8c6f-6b5fc8948abe", "DetectTime": "2023-10-30T13:58:02.701103+02:00", "EventTime": "2023-10-30T13:58:02.701121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.165.116.48 ", "ContentType": "text/plain"}], "uids": ["CBEWLn3LN6cUvHmJBh"]} -{"Format": "IDEA0", "ID": "082d6c72-a00d-4954-99db-8fa28c705674", "DetectTime": "2023-10-30T13:58:02.738766+02:00", "EventTime": "2023-10-30T13:58:02.738825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["CadWLpp9jo7uIS0R5"]} -{"Format": "IDEA0", "ID": "42634460-fc09-4fea-9b04-6d781b3a7ad9", "DetectTime": "2023-10-30T13:58:02.765516+02:00", "EventTime": "2023-10-30T13:58:02.765586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CGYyhiGM1JxkmPMZd"]} -{"Format": "IDEA0", "ID": "e4f2653d-bc7c-41e4-814a-4377b076158f", "DetectTime": "2023-10-30T13:58:02.798868+02:00", "EventTime": "2023-10-30T13:58:02.798893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.108.94.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.108.94.108 ", "ContentType": "text/plain"}], "uids": ["CpSPfC4rYb8bR9xUm9"]} -{"Format": "IDEA0", "ID": "566e9e97-49c2-4db7-931b-513f07797267", "DetectTime": "2023-10-30T13:58:02.830884+02:00", "EventTime": "2023-10-30T13:58:02.830900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.129.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.129.61 ", "ContentType": "text/plain"}], "uids": ["CDsnTo2JoLKqVoa8Kf"]} -{"Format": "IDEA0", "ID": "f2da9260-f5ff-4306-a22f-23423e367cc1", "DetectTime": "2023-10-30T13:58:02.860732+02:00", "EventTime": "2023-10-30T13:58:02.860751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["Cru35fhQa7a6RZ6i9"]} -{"Format": "IDEA0", "ID": "f2f3f1ee-bf9e-4354-90f6-ed1d7aae336d", "DetectTime": "2023-10-30T13:58:02.890464+02:00", "EventTime": "2023-10-30T13:58:02.890485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CTP9kS3oJTTUbKxzp7"]} -{"Format": "IDEA0", "ID": "224c5a5d-4d51-4608-879f-aa826b53293e", "DetectTime": "2023-10-30T13:58:02.922957+02:00", "EventTime": "2023-10-30T13:58:02.922984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CM04Z22UlOO0InPog9"]} -{"Format": "IDEA0", "ID": "779b6848-047c-4c40-98cd-f9f4f6951fa9", "DetectTime": "2023-10-30T13:58:02.947408+02:00", "EventTime": "2023-10-30T13:58:02.947423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.107.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.107.44 ", "ContentType": "text/plain"}], "uids": ["CHYkfh34ikt9oJWG5j"]} -{"Format": "IDEA0", "ID": "d886ed8a-157f-43e6-a677-13b19dedaf1d", "DetectTime": "2023-10-30T13:58:02.974208+02:00", "EventTime": "2023-10-30T13:58:02.974237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["COPq4n2fZgnh9TP6O2"]} -{"Format": "IDEA0", "ID": "d8ddd48d-4c95-412f-b2c5-58a104a14d4e", "DetectTime": "2023-10-30T13:58:03.004829+02:00", "EventTime": "2023-10-30T13:58:03.004849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CbSgX14k88yBbXWPff"]} -{"Format": "IDEA0", "ID": "f481df54-aa17-4c75-804b-09c685749c2e", "DetectTime": "2023-10-30T13:58:03.031834+02:00", "EventTime": "2023-10-30T13:58:03.031847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CbI2Ce2MTgEHXsUrx1"]} -{"Format": "IDEA0", "ID": "8d738408-ca11-48be-9e3b-bda4a9f630ba", "DetectTime": "2023-10-30T13:58:03.058652+02:00", "EventTime": "2023-10-30T13:58:03.058670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["CyYflW2JXYA5yJmuX4"]} -{"Format": "IDEA0", "ID": "fcdd3334-d700-4aff-b2a8-62eecccd5555", "DetectTime": "2023-10-30T13:58:03.090458+02:00", "EventTime": "2023-10-30T13:58:03.090476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.183.230.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.183.230.102 ", "ContentType": "text/plain"}], "uids": ["CJc9wg2e4ZXdRJTfF6"]} -{"Format": "IDEA0", "ID": "0dcf8f2a-ad00-42a1-929e-a8668ae46ced", "DetectTime": "2023-10-30T13:58:03.112271+02:00", "EventTime": "2023-10-30T13:58:03.112297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cd6Vma1uqCbJ19Rmee"]} -{"Format": "IDEA0", "ID": "afbe5123-8d55-46ec-8dfe-1302cac9f830", "DetectTime": "2023-10-30T13:58:03.152008+02:00", "EventTime": "2023-10-30T13:58:03.152029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.107.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.107.44 ", "ContentType": "text/plain"}], "uids": ["C6eg1a2qSqm94g5Jvj"]} -{"Format": "IDEA0", "ID": "15818480-048d-4ebe-b578-e73869fb8e02", "DetectTime": "2023-10-30T13:58:03.181965+02:00", "EventTime": "2023-10-30T13:58:03.181979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["Cu0g1e2bny5oeV1AS5"]} -{"Format": "IDEA0", "ID": "7e268651-2469-4244-b7e8-b5b8c0ad1fd3", "DetectTime": "2023-10-30T13:58:03.212070+02:00", "EventTime": "2023-10-30T13:58:03.212087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CkMQvjz7tKuiDPq76"]} -{"Format": "IDEA0", "ID": "9f17ce93-020c-4f51-9e49-191f8b20c835", "DetectTime": "2023-10-30T13:58:03.243070+02:00", "EventTime": "2023-10-30T13:58:03.243090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.114.37 ", "ContentType": "text/plain"}], "uids": ["CIGiyxRyVbbHfxT2g"]} -{"Format": "IDEA0", "ID": "1647275d-c2e1-4090-917e-e0c60293312e", "DetectTime": "2023-10-30T13:58:03.269583+02:00", "EventTime": "2023-10-30T13:58:03.269600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CsAJLV2Wu8SFreEYj"]} -{"Format": "IDEA0", "ID": "a5470459-e427-4c13-a161-854cded77749", "DetectTime": "2023-10-30T13:58:03.298069+02:00", "EventTime": "2023-10-30T13:58:03.298088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CarsJP209uqJkt9vI8"]} -{"Format": "IDEA0", "ID": "f214d4f6-3035-4ce4-ab04-6d3b4dced1b3", "DetectTime": "2023-10-30T13:58:03.331841+02:00", "EventTime": "2023-10-30T13:58:03.331861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["ComzJp3qGJzz8nW4R1"]} -{"Format": "IDEA0", "ID": "b5c2acd7-1185-48b1-acde-19f50cbcae3f", "DetectTime": "2023-10-30T13:58:03.361807+02:00", "EventTime": "2023-10-30T13:58:03.361825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CavFz330bpqwloSt2d"]} -{"Format": "IDEA0", "ID": "36b52110-b757-49d8-8983-9edba2bbd1af", "DetectTime": "2023-10-30T13:58:03.392612+02:00", "EventTime": "2023-10-30T13:58:03.392628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["C0q9eO17eo887v0K0a"]} -{"Format": "IDEA0", "ID": "f4dc7d76-219c-4370-912c-0f2e9b87fd22", "DetectTime": "2023-10-30T13:58:03.421939+02:00", "EventTime": "2023-10-30T13:58:03.421960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CY5aQO1MLgOruiWwyd"]} -{"Format": "IDEA0", "ID": "281c6c5f-3437-4716-913c-db64432a55c9", "DetectTime": "2023-10-30T13:58:03.453158+02:00", "EventTime": "2023-10-30T13:58:03.453179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CgvI9qBYxL0n3PzP7"]} -{"Format": "IDEA0", "ID": "d86f2546-bded-4ce1-bb38-46d5f3fe72cb", "DetectTime": "2023-10-30T13:58:03.477636+02:00", "EventTime": "2023-10-30T13:58:03.477648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CgmemQ13D4w8oa6OUd"]} -{"Format": "IDEA0", "ID": "9cb836da-0dfd-47ae-9778-fce622bf7271", "DetectTime": "2023-10-30T13:58:03.507578+02:00", "EventTime": "2023-10-30T13:58:03.507604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["Cj3K9k2TgWI0BWKEH6"]} -{"Format": "IDEA0", "ID": "f45fd533-c8dc-4aa6-b911-93593f0a5887", "DetectTime": "2023-10-30T13:58:03.538274+02:00", "EventTime": "2023-10-30T13:58:03.538292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CgNRWn2i7iMPeB92K1"]} -{"Format": "IDEA0", "ID": "d6271c44-637f-426b-9829-55b33af9b229", "DetectTime": "2023-10-30T13:58:03.565079+02:00", "EventTime": "2023-10-30T13:58:03.565097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.90.187.38 ", "ContentType": "text/plain"}], "uids": ["C3REFz9QjYuKz28Uc"]} -{"Format": "IDEA0", "ID": "f41a24ed-7e8b-4013-a9a6-8c6f07019e11", "DetectTime": "2023-10-30T13:58:03.588968+02:00", "EventTime": "2023-10-30T13:58:03.588979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C5la9g1O2PymXjjW9k"]} -{"Format": "IDEA0", "ID": "d4f2c3b6-37ce-4661-8369-a1e61e588fe5", "DetectTime": "2023-10-30T13:58:03.615981+02:00", "EventTime": "2023-10-30T13:58:03.615998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["C2eD2c3tE29DuzXEB7"]} -{"Format": "IDEA0", "ID": "a7c90dbd-ef75-4675-b1d3-e2a7266bd5cf", "DetectTime": "2023-10-30T13:58:03.646540+02:00", "EventTime": "2023-10-30T13:58:03.646556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.27.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.27.151 ", "ContentType": "text/plain"}], "uids": ["C9MISkz6WR4k2H5Ok"]} -{"Format": "IDEA0", "ID": "c0f2fef6-3442-4b27-9d14-feb1e349874f", "DetectTime": "2023-10-30T13:58:03.673995+02:00", "EventTime": "2023-10-30T13:58:03.674012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CcnMLh1APv3fP5Kun1"]} -{"Format": "IDEA0", "ID": "a8fe6cdc-3e10-4dd5-9688-0b9ed2447c27", "DetectTime": "2023-10-30T13:58:03.698680+02:00", "EventTime": "2023-10-30T13:58:03.698693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CE8W8z2aGLiDN9mhwd"]} -{"Format": "IDEA0", "ID": "3fa74799-39e6-4135-8b67-d93d4f55bb86", "DetectTime": "2023-10-30T13:58:03.727564+02:00", "EventTime": "2023-10-30T13:58:03.727585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CRJBN019ay2NP7n5Rl"]} -{"Format": "IDEA0", "ID": "7925ee8a-f7b2-42f6-9f30-aec538d6f5d4", "DetectTime": "2023-10-30T13:58:03.757344+02:00", "EventTime": "2023-10-30T13:58:03.757368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["Cy6CWQ3djUIU5pdqua"]} -{"Format": "IDEA0", "ID": "01bc5e87-d26a-4757-9c63-5822bc8d71ca", "DetectTime": "2023-10-30T13:58:03.779752+02:00", "EventTime": "2023-10-30T13:58:03.779769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["CrPbJF4Ned8Bjs8L19"]} -{"Format": "IDEA0", "ID": "94350892-8da1-4ea6-8608-b50addfe9f64", "DetectTime": "2023-10-30T13:58:03.803265+02:00", "EventTime": "2023-10-30T13:58:03.803278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CaG4TQ3tD1VqBxubW9"]} -{"Format": "IDEA0", "ID": "c1c68a3d-6e7d-4841-bea7-29908ccb8e3d", "DetectTime": "2023-10-30T13:58:03.830944+02:00", "EventTime": "2023-10-30T13:58:03.831216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["C2xN9LOK2GbAtI7h3"]} -{"Format": "IDEA0", "ID": "244e627f-a148-41ad-b312-91dfb54a858f", "DetectTime": "2023-10-30T13:58:03.858707+02:00", "EventTime": "2023-10-30T13:58:03.858723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CoEaCV39IfV0Flz6Si"]} -{"Format": "IDEA0", "ID": "620fe4f2-47a3-4ecd-b193-3b513ed2d011", "DetectTime": "2023-10-30T13:58:03.882349+02:00", "EventTime": "2023-10-30T13:58:03.882361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.1.28.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.1.28.117 ", "ContentType": "text/plain"}], "uids": ["CC3KaP3eRK4Cx4kQuc"]} -{"Format": "IDEA0", "ID": "ee3c65bd-da1b-49a4-8028-ded9800aa539", "DetectTime": "2023-10-30T13:58:03.907705+02:00", "EventTime": "2023-10-30T13:58:03.907721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["C97zhn45RoIeclcmU3"]} -{"Format": "IDEA0", "ID": "65a5ff83-5425-4d55-9e99-2af712d38d39", "DetectTime": "2023-10-30T13:58:03.935820+02:00", "EventTime": "2023-10-30T13:58:03.935838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CMklbG3ZbEOMn69dwg"]} -{"Format": "IDEA0", "ID": "5045cf2f-02b9-44c6-aecb-0bc0b09cc8e2", "DetectTime": "2023-10-30T13:58:03.963566+02:00", "EventTime": "2023-10-30T13:58:03.963583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Ccp4LI2IQzuOcRdhud"]} -{"Format": "IDEA0", "ID": "688d3113-623f-4a62-a4ee-e680c62a9542", "DetectTime": "2023-10-30T13:58:03.988501+02:00", "EventTime": "2023-10-30T13:58:03.988512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CHz4Ry3QHMR79rxGT6"]} -{"Format": "IDEA0", "ID": "732328c9-c381-467f-b56d-d649efac9442", "DetectTime": "2023-10-30T13:58:04.012826+02:00", "EventTime": "2023-10-30T13:58:04.012844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["C42YPnYxZZAHsrmAb"]} -{"Format": "IDEA0", "ID": "328c64df-a51b-49eb-bd4a-58fef1c7bc95", "DetectTime": "2023-10-30T13:58:04.040955+02:00", "EventTime": "2023-10-30T13:58:04.040975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["C6TzYL9sJDJrb65Ff"]} -{"Format": "IDEA0", "ID": "d546cb28-7098-48b1-9e6d-7099176b0e03", "DetectTime": "2023-10-30T13:58:04.067985+02:00", "EventTime": "2023-10-30T13:58:04.068000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["CE8tox1M5mUwUETNrh"]} -{"Format": "IDEA0", "ID": "e7be723d-20f7-4a12-91f0-806a1399e44c", "DetectTime": "2023-10-30T13:58:04.091417+02:00", "EventTime": "2023-10-30T13:58:04.091435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CZQ8XC1tEMaVs1xu12"]} -{"Format": "IDEA0", "ID": "371e05c3-3d0d-4aad-9740-6f6e63bb3bdb", "DetectTime": "2023-10-30T13:58:04.115836+02:00", "EventTime": "2023-10-30T13:58:04.115854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CtRY6G3YxdPJRmB3Qb"]} -{"Format": "IDEA0", "ID": "710509fd-4d33-45a7-b12a-d37ed62f603a", "DetectTime": "2023-10-30T13:58:04.223258+02:00", "EventTime": "2023-10-30T13:58:04.223274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CipQfA1rK6dcTZ2af1"]} -{"Format": "IDEA0", "ID": "8a370368-0888-4f3a-976c-7b91adc53fbc", "DetectTime": "2023-10-30T13:58:04.250410+02:00", "EventTime": "2023-10-30T13:58:04.250436+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Csmeub4B2NvnRbBv4l"]} -{"Format": "IDEA0", "ID": "773f694a-8524-470f-b3c6-17e81aebf958", "DetectTime": "2023-10-30T13:58:04.266498+02:00", "EventTime": "2023-10-30T13:58:04.266519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.119.190.39 ", "ContentType": "text/plain"}], "uids": ["CCr1Ye3M7zcZNGMi0j"]} -{"Format": "IDEA0", "ID": "418615e1-34d7-4bb2-a939-5165fc691db0", "DetectTime": "2023-10-30T13:58:04.298573+02:00", "EventTime": "2023-10-30T13:58:04.298619+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNkQT93DHwtkVnKuG3"]} -{"Format": "IDEA0", "ID": "8100bb79-996f-43f8-bf90-00aad0cc077d", "DetectTime": "2023-10-30T13:58:04.321593+02:00", "EventTime": "2023-10-30T13:58:04.321609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.253.82.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.253.82.119 ", "ContentType": "text/plain"}], "uids": ["CyVIqA2XSqFVndInRi"]} -{"Format": "IDEA0", "ID": "724d66b5-6c03-437d-b80c-66e074ef1c6e", "DetectTime": "2023-10-30T13:58:04.348854+02:00", "EventTime": "2023-10-30T13:58:04.348871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["C7rTgm1kxJ2gjftLc7"]} -{"Format": "IDEA0", "ID": "77a42ed7-ee9f-4974-b03f-db54956a2fd4", "DetectTime": "2023-10-30T13:58:04.377586+02:00", "EventTime": "2023-10-30T13:58:04.377604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CSpaYiL0GquhI2n19"]} -{"Format": "IDEA0", "ID": "718f25e3-b051-418c-8716-ba717e88bc8b", "DetectTime": "2023-10-30T13:58:04.408823+02:00", "EventTime": "2023-10-30T13:58:04.408849+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CW96ND2an9gk4gZuG2"]} -{"Format": "IDEA0", "ID": "dd4b868d-5e01-41a1-baaa-c8ff82787c0d", "DetectTime": "2023-10-30T13:58:04.428936+02:00", "EventTime": "2023-10-30T13:58:04.428953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CoXRSY2PzHgqjRuoK4"]} -{"Format": "IDEA0", "ID": "b6daa5f5-19a2-422a-be3f-7c71e445291b", "DetectTime": "2023-10-30T13:58:04.458901+02:00", "EventTime": "2023-10-30T13:58:04.458919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["CY9NypUtWAKh9DOcg"]} -{"Format": "IDEA0", "ID": "af4cc8f9-f21e-4725-a9f6-f33521f2270b", "DetectTime": "2023-10-30T13:58:04.487481+02:00", "EventTime": "2023-10-30T13:58:04.487502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CNFHU92to8n3lE5njj"]} -{"Format": "IDEA0", "ID": "c0425f25-1040-4b43-ae38-13f2791e85be", "DetectTime": "2023-10-30T13:58:04.512482+02:00", "EventTime": "2023-10-30T13:58:04.512500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.90.187.38 ", "ContentType": "text/plain"}], "uids": ["C2xZBT1n8ksqPVFhl7"]} -{"Format": "IDEA0", "ID": "d311bc9e-bd14-494a-8dc5-60f769c31596", "DetectTime": "2023-10-30T13:58:04.542147+02:00", "EventTime": "2023-10-30T13:58:04.542165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CuSCbSBnzWkqD6PEf"]} -{"Format": "IDEA0", "ID": "2888fcfa-a188-4f00-80f6-b9093e46be9b", "DetectTime": "2023-10-30T13:58:04.568043+02:00", "EventTime": "2023-10-30T13:58:04.568060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CTm3Q82KDOnKK1FFej"]} -{"Format": "IDEA0", "ID": "869edb14-b5c1-4777-93c5-25fe8b382d83", "DetectTime": "2023-10-30T13:58:04.592536+02:00", "EventTime": "2023-10-30T13:58:04.592554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CK6Vm54ntX1BXV31Bk"]} -{"Format": "IDEA0", "ID": "f15eb6bc-a6af-4411-bd87-a951ee31bcb6", "DetectTime": "2023-10-30T13:58:04.620366+02:00", "EventTime": "2023-10-30T13:58:04.620383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["C8cyjU3Rivf6IuKofh"]} -{"Format": "IDEA0", "ID": "073b7ff5-ff4d-404c-9010-1687de10c2cb", "DetectTime": "2023-10-30T13:58:04.651547+02:00", "EventTime": "2023-10-30T13:58:04.651564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CvlmcH1EuWco8ofowd"]} -{"Format": "IDEA0", "ID": "f448e85e-f6de-462f-bcd3-21d344d73072", "DetectTime": "2023-10-30T13:58:04.683748+02:00", "EventTime": "2023-10-30T13:58:04.683762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CZNf713lqHwq2jZ9W8"]} -{"Format": "IDEA0", "ID": "043305cf-be77-4024-9d42-da38abf63676", "DetectTime": "2023-10-30T13:58:04.721010+02:00", "EventTime": "2023-10-30T13:58:04.721031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CnbXy94LHzUNopvOp7"]} -{"Format": "IDEA0", "ID": "4e8d0555-f36e-4952-9c78-bdf806e308e3", "DetectTime": "2023-10-30T13:58:04.749762+02:00", "EventTime": "2023-10-30T13:58:04.749782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.49.121 ", "ContentType": "text/plain"}], "uids": ["CfwzDVk9zd8rPvk4f"]} -{"Format": "IDEA0", "ID": "9c649051-7fc8-419d-9b4a-b53a4eafd811", "DetectTime": "2023-10-30T13:58:04.778523+02:00", "EventTime": "2023-10-30T13:58:04.778536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C50VXr195EEQ4XRpTa"]} -{"Format": "IDEA0", "ID": "7996dee6-ae18-4879-8746-42b91358b3bd", "DetectTime": "2023-10-30T13:58:04.794572+02:00", "EventTime": "2023-10-30T13:58:04.794590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["Cd6IIm1ErlF5ikVIbh"]} -{"Format": "IDEA0", "ID": "66f89ba3-0d82-42db-89f0-89969441cbe3", "DetectTime": "2023-10-30T13:58:04.823458+02:00", "EventTime": "2023-10-30T13:58:04.823475+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpbZOi1oatcY85JtBa"]} -{"Format": "IDEA0", "ID": "9ef895ba-9d89-4dcf-9b8c-e5031f2ce8fa", "DetectTime": "2023-10-30T13:58:04.842118+02:00", "EventTime": "2023-10-30T13:58:04.842134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["C0bgtx3bchnzKCeJF2"]} -{"Format": "IDEA0", "ID": "5b9b7084-368e-4f53-9c55-4e76191c20ce", "DetectTime": "2023-10-30T13:58:04.874406+02:00", "EventTime": "2023-10-30T13:58:04.874423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["CmfRzf2OEMjWvEdXza"]} -{"Format": "IDEA0", "ID": "e70f42b9-668b-4c0f-938d-c72396e1cd45", "DetectTime": "2023-10-30T13:58:04.902921+02:00", "EventTime": "2023-10-30T13:58:04.902940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CU3KIW2Sv8HkdePF2a"]} -{"Format": "IDEA0", "ID": "5d067237-f306-4264-a205-08f3d064002f", "DetectTime": "2023-10-30T13:58:04.934350+02:00", "EventTime": "2023-10-30T13:58:04.934372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CR0xnp2mapoEqEEgcg"]} -{"Format": "IDEA0", "ID": "61a520da-9cae-430d-a457-37060eb5b5e9", "DetectTime": "2023-10-30T13:58:04.962146+02:00", "EventTime": "2023-10-30T13:58:04.962162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C1jiJQ2k5d5QnvxmS6"]} -{"Format": "IDEA0", "ID": "406dfaec-1bf0-4942-a5ff-c79629b072e1", "DetectTime": "2023-10-30T13:58:04.986366+02:00", "EventTime": "2023-10-30T13:58:04.986383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CvDTss37zFkDnrXaS6"]} -{"Format": "IDEA0", "ID": "f7d63c44-821f-41ec-87a9-c5ec0bc966de", "DetectTime": "2023-10-30T13:58:05.014688+02:00", "EventTime": "2023-10-30T13:58:05.014704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CDf0Re3EcnCOaGENT9"]} -{"Format": "IDEA0", "ID": "672674e4-2819-4acc-9409-7f4bb7179fd6", "DetectTime": "2023-10-30T13:58:05.038712+02:00", "EventTime": "2023-10-30T13:58:05.038734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["CoHyYN1r6kJoO0Qx87"]} -{"Format": "IDEA0", "ID": "e3fa1f8a-b114-4fc3-a670-ca8bb8d11363", "DetectTime": "2023-10-30T13:58:05.071396+02:00", "EventTime": "2023-10-30T13:58:05.071414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["CIpyI93Keqj4lyObg8"]} -{"Format": "IDEA0", "ID": "83e3b578-8708-4fe1-ad50-e4b62921db84", "DetectTime": "2023-10-30T13:58:05.100309+02:00", "EventTime": "2023-10-30T13:58:05.100330+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgHYsK34QIxedTHsFd"]} -{"Format": "IDEA0", "ID": "12dbef1c-f2e7-4f12-87d9-c0f9284874ab", "DetectTime": "2023-10-30T13:58:05.117648+02:00", "EventTime": "2023-10-30T13:58:05.117665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["CNajhc2FVCi1oCCIXj"]} -{"Format": "IDEA0", "ID": "43d5a4cc-9f43-4c79-81c6-b1f697d516df", "DetectTime": "2023-10-30T13:58:05.146574+02:00", "EventTime": "2023-10-30T13:58:05.146590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.119.190.39 ", "ContentType": "text/plain"}], "uids": ["Cgh5Pw20rcCVXOVfX9"]} -{"Format": "IDEA0", "ID": "2cadb5bf-be5f-407b-bb8e-bc3612643280", "DetectTime": "2023-10-30T13:58:05.174499+02:00", "EventTime": "2023-10-30T13:58:05.174511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["CJxgE9b9gagNuXsXk"]} -{"Format": "IDEA0", "ID": "4dafbf67-b1eb-42f4-963b-14a7544738d9", "DetectTime": "2023-10-30T13:58:05.199662+02:00", "EventTime": "2023-10-30T13:58:05.199677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.165.116.48 ", "ContentType": "text/plain"}], "uids": ["C0M34V319ybM9NBV25"]} -{"Format": "IDEA0", "ID": "0642802c-b711-4461-9924-db0721d34ead", "DetectTime": "2023-10-30T13:58:05.232110+02:00", "EventTime": "2023-10-30T13:58:05.232129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["CVfCOSkEyjpfYfE3k"]} -{"Format": "IDEA0", "ID": "60bc71d4-ae4e-4333-88d4-1c5ab3fe4a56", "DetectTime": "2023-10-30T13:58:05.263445+02:00", "EventTime": "2023-10-30T13:58:05.263467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CVbkIA27CvBmtmbIQ3"]} -{"Format": "IDEA0", "ID": "067e903c-9393-4c00-bd3d-6da36a0e89d5", "DetectTime": "2023-10-30T13:58:05.296521+02:00", "EventTime": "2023-10-30T13:58:05.296539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["Ci3oTXuotGNFT0JR4"]} -{"Format": "IDEA0", "ID": "92504321-166f-4efe-aa59-cf34ec689133", "DetectTime": "2023-10-30T13:58:05.324498+02:00", "EventTime": "2023-10-30T13:58:05.324523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Csmeub4B2NvnRbBv4l", "Ccocyf2Hxj3rmmSuJc", "CW96ND2an9gk4gZuG2", "CpbZOi1oatcY85JtBa"]} -{"Format": "IDEA0", "ID": "bc0ec64a-c74b-4f1a-b15c-0f993cb8701f", "DetectTime": "2023-10-30T13:58:05.341917+02:00", "EventTime": "2023-10-30T13:58:05.341938+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ccocyf2Hxj3rmmSuJc"]} -{"Format": "IDEA0", "ID": "71c2f2ec-7964-424e-904d-0bdbe042065f", "DetectTime": "2023-10-30T13:58:05.360533+02:00", "EventTime": "2023-10-30T13:58:05.360554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CLjBg62sHoYTZSixIj"]} -{"Format": "IDEA0", "ID": "c8d4fcda-05f9-44f8-b7ae-5b89e30cf0fd", "DetectTime": "2023-10-30T13:58:05.389660+02:00", "EventTime": "2023-10-30T13:58:05.389673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["CyMwU11lgWcSHM9ND"]} -{"Format": "IDEA0", "ID": "b4b608f8-628e-4f69-a53e-065689199fb6", "DetectTime": "2023-10-30T13:58:05.417349+02:00", "EventTime": "2023-10-30T13:58:05.417370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["Cipod31OKlZ6MPb2qk"]} -{"Format": "IDEA0", "ID": "b4acf068-c2a2-4d2e-b758-9e7100f1625b", "DetectTime": "2023-10-30T13:58:05.446067+02:00", "EventTime": "2023-10-30T13:58:05.446078+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Czjia91wJJdCsCLAsd"]} -{"Format": "IDEA0", "ID": "25d56556-b6fc-413e-8c70-5d143a156c28", "DetectTime": "2023-10-30T13:58:05.460780+02:00", "EventTime": "2023-10-30T13:58:05.460795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["CbOI1a4OHvSXgmRQV3"]} -{"Format": "IDEA0", "ID": "3c9518d4-7145-41b0-a3d2-fc37ecd82f39", "DetectTime": "2023-10-30T13:58:05.492544+02:00", "EventTime": "2023-10-30T13:58:05.492565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.114.37 ", "ContentType": "text/plain"}], "uids": ["CjvqQW1egBrZrb51Z5"]} -{"Format": "IDEA0", "ID": "f32af822-569a-424b-996d-e8dd6d83049d", "DetectTime": "2023-10-30T13:58:05.514331+02:00", "EventTime": "2023-10-30T13:58:05.514349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["CV7Dml46GSZNcgEqp"]} -{"Format": "IDEA0", "ID": "5d185f4d-9930-4a0c-8d45-a0bbb2e3406b", "DetectTime": "2023-10-30T13:58:05.544488+02:00", "EventTime": "2023-10-30T13:58:05.544508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["ClGoySYKFik0o2cX5"]} -{"Format": "IDEA0", "ID": "70ea2174-1257-4a20-9024-6490251620d4", "DetectTime": "2023-10-30T13:58:05.571573+02:00", "EventTime": "2023-10-30T13:58:05.571590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CYyLGi17UYpVUN6SQ4"]} -{"Format": "IDEA0", "ID": "e54f7bfc-93d0-4b3d-98b3-313c14661d39", "DetectTime": "2023-10-30T13:58:05.603283+02:00", "EventTime": "2023-10-30T13:58:05.603303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["C2pkAV2wxaOSg0bTu8"]} -{"Format": "IDEA0", "ID": "44062221-d48c-49dd-9d00-49b5d5327ebc", "DetectTime": "2023-10-30T13:58:05.634316+02:00", "EventTime": "2023-10-30T13:58:05.634334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CaaJ97zj2Id4KYWm"]} -{"Format": "IDEA0", "ID": "d77e90a9-5402-450a-b828-65e30f716204", "DetectTime": "2023-10-30T13:58:05.662770+02:00", "EventTime": "2023-10-30T13:58:05.662799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CvENBI3AK57yjUziP4"]} -{"Format": "IDEA0", "ID": "0dbc9c79-e831-403d-80ed-bf4b087bb995", "DetectTime": "2023-10-30T13:58:05.694392+02:00", "EventTime": "2023-10-30T13:58:05.694406+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUYxH9UJFoyZ59Hi2"]} -{"Format": "IDEA0", "ID": "f86dc9c9-c85f-4d60-b554-4c8114f58538", "DetectTime": "2023-10-30T13:58:05.711045+02:00", "EventTime": "2023-10-30T13:58:05.711062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 ", "ContentType": "text/plain"}], "uids": ["Cqu6FR2zOCqFYzfUkk"]} -{"Format": "IDEA0", "ID": "35a3ec9b-8891-4ed1-b993-7ba666f0f11a", "DetectTime": "2023-10-30T13:58:05.740262+02:00", "EventTime": "2023-10-30T13:58:05.740279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["C64yEQDQVuC7U7all"]} -{"Format": "IDEA0", "ID": "1951a2ff-4563-4f53-9404-73ede74b9444", "DetectTime": "2023-10-30T13:58:05.768063+02:00", "EventTime": "2023-10-30T13:58:05.768082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CDJnuw3wqhDJ7ms7ha"]} -{"Format": "IDEA0", "ID": "b22e2fae-dfa2-406a-8434-d25d018d9689", "DetectTime": "2023-10-30T13:58:05.800471+02:00", "EventTime": "2023-10-30T13:58:05.800487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.165.116.48 ", "ContentType": "text/plain"}], "uids": ["CrdsIdojxQJq5n2l3"]} -{"Format": "IDEA0", "ID": "dfde9b5c-2d87-48ed-9de3-c9d3e6a4fbff", "DetectTime": "2023-10-30T13:58:05.829321+02:00", "EventTime": "2023-10-30T13:58:05.829341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CywU6i3RePxv3PnsGf"]} -{"Format": "IDEA0", "ID": "eb968194-90c9-4b64-a526-434932c509e1", "DetectTime": "2023-10-30T13:58:05.860674+02:00", "EventTime": "2023-10-30T13:58:05.860692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CoGNoB2dFFBZLSVRDe"]} -{"Format": "IDEA0", "ID": "fab02c24-6934-4603-a235-654b3fe250c3", "DetectTime": "2023-10-30T13:58:05.881866+02:00", "EventTime": "2023-10-30T13:58:05.881882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["C29KgU3fCi5yNSxsme"]} -{"Format": "IDEA0", "ID": "41112b55-d8c8-4b9c-8a11-24e52276dbde", "DetectTime": "2023-10-30T13:58:05.903038+02:00", "EventTime": "2023-10-30T13:58:05.903065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CLkiBQ2oBaxGHCtZMj"]} -{"Format": "IDEA0", "ID": "184af216-6add-4249-8cf2-a5b72a343bf8", "DetectTime": "2023-10-30T13:58:05.928470+02:00", "EventTime": "2023-10-30T13:58:05.928481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CUdLuY14dKiSqigSfj"]} -{"Format": "IDEA0", "ID": "d2f02448-5270-4bae-af17-7ee17b6885c7", "DetectTime": "2023-10-30T13:58:05.953747+02:00", "EventTime": "2023-10-30T13:58:05.953766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.129.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.129.61 ", "ContentType": "text/plain"}], "uids": ["CnqUP44sVdbcEoI3pe"]} -{"Format": "IDEA0", "ID": "81a9c717-9e27-4df7-b4fc-84c894aecdb1", "DetectTime": "2023-10-30T13:58:05.981218+02:00", "EventTime": "2023-10-30T13:58:05.981231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CRvkbF4fHzd7H9zTJ5"]} -{"Format": "IDEA0", "ID": "7a870d04-86cd-4878-835e-fb1a51260911", "DetectTime": "2023-10-30T13:58:06.004980+02:00", "EventTime": "2023-10-30T13:58:06.005001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr8wsY3NL6OFO2PTJ"]} -{"Format": "IDEA0", "ID": "490ec47f-00ca-4971-95d1-0c1b9bdd4439", "DetectTime": "2023-10-30T13:58:06.020805+02:00", "EventTime": "2023-10-30T13:58:06.020824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["CdoCWY18vnGqYd3cj8"]} -{"Format": "IDEA0", "ID": "39745b25-288b-44c1-91f8-4b1794f5cc7b", "DetectTime": "2023-10-30T13:58:06.047636+02:00", "EventTime": "2023-10-30T13:58:06.047653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CSOWI93fWSz93nFAG8"]} -{"Format": "IDEA0", "ID": "189f6ce0-c53d-44dc-8941-d88221a82bc3", "DetectTime": "2023-10-30T13:58:06.075960+02:00", "EventTime": "2023-10-30T13:58:06.075990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CVTKI11ksekVxdtxG4"]} -{"Format": "IDEA0", "ID": "238d367f-b354-440d-8d59-bf16b9b0c5e0", "DetectTime": "2023-10-30T13:58:06.101004+02:00", "EventTime": "2023-10-30T13:58:06.101023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["Cu8lUA4Ve4VVA86i6j"]} -{"Format": "IDEA0", "ID": "3101c7f0-3219-436b-8f6b-e3f60ddba3dc", "DetectTime": "2023-10-30T13:58:06.133066+02:00", "EventTime": "2023-10-30T13:58:06.133084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CHDxEJ3wjkHXfQM4If"]} -{"Format": "IDEA0", "ID": "071ee4bb-6489-46d0-a713-4cbc5e626d65", "DetectTime": "2023-10-30T13:58:06.159647+02:00", "EventTime": "2023-10-30T13:58:06.159659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CEFu0dd6s3WleYLw3"]} -{"Format": "IDEA0", "ID": "11e9d79c-c1f5-4147-a4e2-8e73f421b34d", "DetectTime": "2023-10-30T13:58:06.189843+02:00", "EventTime": "2023-10-30T13:58:06.189860+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0u4HC36OGdUxmU7bk"]} -{"Format": "IDEA0", "ID": "e7195841-7d23-4319-bcd8-05a89e966c1f", "DetectTime": "2023-10-30T13:58:06.205906+02:00", "EventTime": "2023-10-30T13:58:06.205924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CpRsMs25UuGh99cGe"]} -{"Format": "IDEA0", "ID": "7879fbe1-de97-419c-9ea1-5d9c7a796866", "DetectTime": "2023-10-30T13:58:06.237636+02:00", "EventTime": "2023-10-30T13:58:06.237658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CmEvwE2JvyHgwyd957"]} -{"Format": "IDEA0", "ID": "db69700e-d52e-4bf1-9992-7bc94a63db69", "DetectTime": "2023-10-30T13:58:06.265953+02:00", "EventTime": "2023-10-30T13:58:06.265969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["ChBETE3PDLtqYIjF44"]} -{"Format": "IDEA0", "ID": "52950924-fae7-4978-a4d7-76223781f58f", "DetectTime": "2023-10-30T13:58:06.295905+02:00", "EventTime": "2023-10-30T13:58:06.295921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["Ck3Qed3BoLKl1af278"]} -{"Format": "IDEA0", "ID": "2b4515ec-0989-4eda-97c5-4e5f374b6395", "DetectTime": "2023-10-30T13:58:06.332840+02:00", "EventTime": "2023-10-30T13:58:06.332860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["CBOkDH2yAnBuHjkXqb"]} -{"Format": "IDEA0", "ID": "8b112d34-1657-497a-a046-6b4aed254a88", "DetectTime": "2023-10-30T13:58:06.362330+02:00", "EventTime": "2023-10-30T13:58:06.362346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CiCOsF1wqn8luElrLf"]} -{"Format": "IDEA0", "ID": "df247645-690d-4963-beb6-17e23abf4d75", "DetectTime": "2023-10-30T13:58:06.388959+02:00", "EventTime": "2023-10-30T13:58:06.388983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["C2o30m46S6o5eYuix7"]} -{"Format": "IDEA0", "ID": "3a89337f-d7c3-4e05-b358-ce8cdeece396", "DetectTime": "2023-10-30T13:58:06.415709+02:00", "EventTime": "2023-10-30T13:58:06.415733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["CvUidG1qPjAzh5uNZ8"]} -{"Format": "IDEA0", "ID": "46814278-e4e7-44d6-82c2-7d14262b6065", "DetectTime": "2023-10-30T13:58:06.439900+02:00", "EventTime": "2023-10-30T13:58:06.439911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["Cx8V9Vjtl13y1vQ6i"]} -{"Format": "IDEA0", "ID": "725a0d78-44fa-424d-b356-9a3b8b114420", "DetectTime": "2023-10-30T13:58:06.470581+02:00", "EventTime": "2023-10-30T13:58:06.470592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CAiri5o70aSeVVMj9"]} -{"Format": "IDEA0", "ID": "7609b42f-7382-4ea9-80ce-b92a7b86308f", "DetectTime": "2023-10-30T13:58:06.493602+02:00", "EventTime": "2023-10-30T13:58:06.493626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CH18wV3POkp2yxyPvb"]} -{"Format": "IDEA0", "ID": "17b24ce7-4095-4668-be39-48913e49d139", "DetectTime": "2023-10-30T13:58:06.518922+02:00", "EventTime": "2023-10-30T13:58:06.518942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["C01sMI16L9BxMJ3HXe"]} -{"Format": "IDEA0", "ID": "178c8d34-74d6-41a5-b0e9-a5e8ad6d8956", "DetectTime": "2023-10-30T13:58:06.541273+02:00", "EventTime": "2023-10-30T13:58:06.541297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.129.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.129.61 ", "ContentType": "text/plain"}], "uids": ["CfStmW3z7dEnanEjEc"]} -{"Format": "IDEA0", "ID": "6816ab3b-fc99-44cb-ab4d-b6d64baf3ca0", "DetectTime": "2023-10-30T13:58:06.572839+02:00", "EventTime": "2023-10-30T13:58:06.572868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CFbyHi4fvqpjfaCA28"]} -{"Format": "IDEA0", "ID": "2a31aaf2-5d5d-49b5-8b41-9e50431825fd", "DetectTime": "2023-10-30T13:58:06.599940+02:00", "EventTime": "2023-10-30T13:58:06.599961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["Ch1YGU2L2BuPxe4ii3"]} -{"Format": "IDEA0", "ID": "9f3afe7c-45cf-4962-bde8-56507e1a6b28", "DetectTime": "2023-10-30T13:58:06.625951+02:00", "EventTime": "2023-10-30T13:58:06.625967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.165.116.48 ", "ContentType": "text/plain"}], "uids": ["CcWCiW37xB6W8SYLrd"]} -{"Format": "IDEA0", "ID": "ce895c0a-11da-4091-8310-4d8c584da1d3", "DetectTime": "2023-10-30T13:58:06.650655+02:00", "EventTime": "2023-10-30T13:58:06.650674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["C1cPv84VXfAKcKXeY2"]} -{"Format": "IDEA0", "ID": "f974db9c-41c6-4f47-8996-642025e3eca5", "DetectTime": "2023-10-30T13:58:06.672868+02:00", "EventTime": "2023-10-30T13:58:06.672895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CCFmqE4weQ2WSoXRrl"]} -{"Format": "IDEA0", "ID": "0f85e191-8879-4bec-bd73-fca5358ca65c", "DetectTime": "2023-10-30T13:58:06.702016+02:00", "EventTime": "2023-10-30T13:58:06.702035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["CfpWrD3qX705eFglVf"]} -{"Format": "IDEA0", "ID": "9a62af84-94a0-4043-a2ff-392bd615f524", "DetectTime": "2023-10-30T13:58:06.728375+02:00", "EventTime": "2023-10-30T13:58:06.728387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CvxWtjMuX0wcMfRO7"]} -{"Format": "IDEA0", "ID": "257df6f6-7a83-421f-b47f-5bd031bbcf77", "DetectTime": "2023-10-30T13:58:06.756720+02:00", "EventTime": "2023-10-30T13:58:06.756734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["Ci09We1QNCgdUaDE1g"]} -{"Format": "IDEA0", "ID": "beee33a4-2b9d-4bcb-97fa-1cc7bb411ddf", "DetectTime": "2023-10-30T13:58:06.783468+02:00", "EventTime": "2023-10-30T13:58:06.783599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["Ck5INJUAoKPJfjNLh"]} -{"Format": "IDEA0", "ID": "236d7cf2-1821-48c3-b551-9a69894a89de", "DetectTime": "2023-10-30T13:58:06.811102+02:00", "EventTime": "2023-10-30T13:58:06.811119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Cne9j72oLZbXPlArih"]} -{"Format": "IDEA0", "ID": "b6e62fda-fb53-4b89-acef-19e542d6f259", "DetectTime": "2023-10-30T13:58:06.834287+02:00", "EventTime": "2023-10-30T13:58:06.834307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["Ccs2CT2VWEfJdUiPGi"]} -{"Format": "IDEA0", "ID": "0880890f-48c3-4249-8395-1c6fccce3781", "DetectTime": "2023-10-30T13:58:06.863481+02:00", "EventTime": "2023-10-30T13:58:06.863503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["C6ejh92fiuJqhxjJj5"]} -{"Format": "IDEA0", "ID": "203b4ad1-8b95-4b86-ba7e-fb272227e443", "DetectTime": "2023-10-30T13:58:06.888303+02:00", "EventTime": "2023-10-30T13:58:06.888315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 ", "ContentType": "text/plain"}], "uids": ["C386k632OTWki9qCV5"]} -{"Format": "IDEA0", "ID": "28ce7353-edd3-410f-9f15-650718d301b9", "DetectTime": "2023-10-30T13:58:06.911270+02:00", "EventTime": "2023-10-30T13:58:06.911284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["C53R8028hVPnN3SJs"]} -{"Format": "IDEA0", "ID": "c1a6bacc-4115-43fc-a7fc-1b04c60825dc", "DetectTime": "2023-10-30T13:58:06.936101+02:00", "EventTime": "2023-10-30T13:58:06.936117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["C0NTdB0iHRSx4KsCc"]} -{"Format": "IDEA0", "ID": "f67b00a9-4d6c-4bc1-8aaf-06eb004c6669", "DetectTime": "2023-10-30T13:58:06.961830+02:00", "EventTime": "2023-10-30T13:58:06.961847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CKMEDp2MGi3cZvKdF2"]} -{"Format": "IDEA0", "ID": "e2d67f78-03df-4f4e-a90d-beaf7a06a972", "DetectTime": "2023-10-30T13:58:06.989097+02:00", "EventTime": "2023-10-30T13:58:06.989110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["Cl5iDG43TbhqBKcwf9"]} -{"Format": "IDEA0", "ID": "b6f82d95-a48f-4f56-b724-37dbbb824eba", "DetectTime": "2023-10-30T13:58:07.010383+02:00", "EventTime": "2023-10-30T13:58:07.010410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS326", "ContentType": "text/plain"}], "uids": ["CBbnEcUTRPXi6d0A"]} -{"Format": "IDEA0", "ID": "ebce7a3d-d2b2-457d-ae7e-3d3b0df7609d", "DetectTime": "2023-10-30T13:58:07.033761+02:00", "EventTime": "2023-10-30T13:58:07.033781+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEYfjP14Mlfnz154o"]} -{"Format": "IDEA0", "ID": "7c4444fc-2c9f-4963-a95f-0d85b856d0d5", "DetectTime": "2023-10-30T13:58:07.050851+02:00", "EventTime": "2023-10-30T13:58:07.050872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.49.121 ", "ContentType": "text/plain"}], "uids": ["CS3kc43yfRcMHF8Xkk"]} -{"Format": "IDEA0", "ID": "42a0d119-1933-4ba8-8824-9b4b725b3d3c", "DetectTime": "2023-10-30T13:58:07.071746+02:00", "EventTime": "2023-10-30T13:58:07.071766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CbX6832YZ6MTPYsNP3"]} -{"Format": "IDEA0", "ID": "d2102460-a345-46b3-8424-65a05c058a92", "DetectTime": "2023-10-30T13:58:07.104795+02:00", "EventTime": "2023-10-30T13:58:07.104812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["C4kKrBHkI7Yc0mVAk"]} -{"Format": "IDEA0", "ID": "d78e9765-fb92-4bc9-982b-6447e720a764", "DetectTime": "2023-10-30T13:58:07.127911+02:00", "EventTime": "2023-10-30T13:58:07.127923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CF0F7B3AR6qbVx6aNl"]} -{"Format": "IDEA0", "ID": "aafdc1a2-26d6-4122-bc45-7f300b622730", "DetectTime": "2023-10-30T13:58:07.152183+02:00", "EventTime": "2023-10-30T13:58:07.152202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CFSh4L6iL3cANglg4"]} -{"Format": "IDEA0", "ID": "67366e0b-8a38-4d09-87a1-6167f1ee8ebd", "DetectTime": "2023-10-30T13:58:07.178590+02:00", "EventTime": "2023-10-30T13:58:07.178603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CbT0aw2NGpGXSM4Xfg"]} -{"Format": "IDEA0", "ID": "9baf34ec-23cb-45f4-abcc-bb2de5d5bb79", "DetectTime": "2023-10-30T13:58:07.205782+02:00", "EventTime": "2023-10-30T13:58:07.205793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CiY033236I7ydeQLOe"]} -{"Format": "IDEA0", "ID": "ee248bd5-59dd-4880-a1f1-d747a8b27638", "DetectTime": "2023-10-30T13:58:07.226343+02:00", "EventTime": "2023-10-30T13:58:07.226353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CSjbsC4qH61KdW7Rn3"]} -{"Format": "IDEA0", "ID": "15eb98f5-04c6-4e12-b844-8e0f0887cf37", "DetectTime": "2023-10-30T13:58:07.247668+02:00", "EventTime": "2023-10-30T13:58:07.247678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["Ctm0dLxDEnMAmMR05"]} -{"Format": "IDEA0", "ID": "39f23060-45fa-4886-9655-bb04827d308f", "DetectTime": "2023-10-30T13:58:07.273881+02:00", "EventTime": "2023-10-30T13:58:07.273901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["Ct64Ks4jF4nckPaCX2"]} -{"Format": "IDEA0", "ID": "0dfeaefd-dfa1-43e7-a2c1-7c976dfb07e4", "DetectTime": "2023-10-30T13:58:07.298470+02:00", "EventTime": "2023-10-30T13:58:07.298488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CTFX4a4eFkxWUDnEMh"]} -{"Format": "IDEA0", "ID": "f638b742-5595-4edc-9575-034823f5c324", "DetectTime": "2023-10-30T13:58:07.331545+02:00", "EventTime": "2023-10-30T13:58:07.331566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CXb7RD2kuY9DZafu59"]} -{"Format": "IDEA0", "ID": "40fd049e-11f8-470b-bb76-6cc6c06ea1f8", "DetectTime": "2023-10-30T13:58:07.356469+02:00", "EventTime": "2023-10-30T13:58:07.356490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["Cew8S21CuIbmVlFbl"]} -{"Format": "IDEA0", "ID": "b6a6d8b3-b539-40e0-a12b-2984955daed2", "DetectTime": "2023-10-30T13:58:07.384692+02:00", "EventTime": "2023-10-30T13:58:07.384706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CbQUG91ANQsccqST22"]} -{"Format": "IDEA0", "ID": "b8171fc5-d312-4672-a8a8-fd178bcc946c", "DetectTime": "2023-10-30T13:58:07.410241+02:00", "EventTime": "2023-10-30T13:58:07.410252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CVumAD1elgWY3aotqj"]} -{"Format": "IDEA0", "ID": "2d27973c-826e-411a-96f2-84890746c208", "DetectTime": "2023-10-30T13:58:07.432071+02:00", "EventTime": "2023-10-30T13:58:07.432089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["Cghayk1ikT6mpwXbWc"]} -{"Format": "IDEA0", "ID": "b8d503ac-6c0a-49c8-a63f-49c2f3b55903", "DetectTime": "2023-10-30T13:58:07.454525+02:00", "EventTime": "2023-10-30T13:58:07.454537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["C1KVsE47yEL12z99k2"]} -{"Format": "IDEA0", "ID": "e901c944-bf43-4761-82ee-4e6633b38998", "DetectTime": "2023-10-30T13:58:07.478121+02:00", "EventTime": "2023-10-30T13:58:07.478132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CF6mws4XCNnayvPGUa"]} -{"Format": "IDEA0", "ID": "f5b1cdea-b62c-4907-97dd-2400c79f5325", "DetectTime": "2023-10-30T13:58:07.501932+02:00", "EventTime": "2023-10-30T13:58:07.501951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.114.37 ", "ContentType": "text/plain"}], "uids": ["CrCEa24BMDT4Kg5IQc"]} -{"Format": "IDEA0", "ID": "ba7f8aad-9208-4b90-bf74-cec860f7c207", "DetectTime": "2023-10-30T13:58:07.529598+02:00", "EventTime": "2023-10-30T13:58:07.529617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CEjiTx4hA2sKbGRlmi"]} -{"Format": "IDEA0", "ID": "0948763d-096a-4b0d-95f6-d58eba696be2", "DetectTime": "2023-10-30T13:58:07.552131+02:00", "EventTime": "2023-10-30T13:58:07.552147+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjPdgu3ZPizZ2huTt8"]} -{"Format": "IDEA0", "ID": "d178915d-c0cc-4d95-a915-b6873593d07e", "DetectTime": "2023-10-30T13:58:07.566366+02:00", "EventTime": "2023-10-30T13:58:07.566392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CMIGPf1VwwfWmPtjwj"]} -{"Format": "IDEA0", "ID": "0b72a422-989b-49a0-b5d5-a4ede3527b08", "DetectTime": "2023-10-30T13:58:07.594512+02:00", "EventTime": "2023-10-30T13:58:07.594525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["COv45j1ece5GXPIvLb"]} -{"Format": "IDEA0", "ID": "7e2d5d35-adb1-4adf-a387-e89e6141275d", "DetectTime": "2023-10-30T13:58:07.617787+02:00", "EventTime": "2023-10-30T13:58:07.617808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CKMHPrcleLRvGtIX7"]} -{"Format": "IDEA0", "ID": "660973e6-ef20-49ba-bcb7-902fe4e5ba99", "DetectTime": "2023-10-30T13:58:07.644739+02:00", "EventTime": "2023-10-30T13:58:07.644752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["CfEcVy4gbJNQhyMDE2"]} -{"Format": "IDEA0", "ID": "d83b2247-4f2b-4701-8c5b-1f8efbe50de6", "DetectTime": "2023-10-30T13:58:07.666409+02:00", "EventTime": "2023-10-30T13:58:07.666436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 ", "ContentType": "text/plain"}], "uids": ["CdXpWy1KE2GCNCTxb4"]} -{"Format": "IDEA0", "ID": "8d1c8ebf-d0f8-47a7-b983-bef672a83bba", "DetectTime": "2023-10-30T13:58:07.692504+02:00", "EventTime": "2023-10-30T13:58:07.692516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CWCjVp4szVB9U5ogk6"]} -{"Format": "IDEA0", "ID": "1106072a-cbe3-4714-8c39-6be6e8fd4848", "DetectTime": "2023-10-30T13:58:07.711649+02:00", "EventTime": "2023-10-30T13:58:07.711661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["CPvh37VDcwPpbLSj"]} -{"Format": "IDEA0", "ID": "b013e6a0-7d37-4d1b-96b9-144c1e2b65ec", "DetectTime": "2023-10-30T13:58:07.734355+02:00", "EventTime": "2023-10-30T13:58:07.734376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["Cf6DZo23H3GHbnSjll"]} -{"Format": "IDEA0", "ID": "8fb86eaa-a9a7-4081-8e15-97bbf5548106", "DetectTime": "2023-10-30T13:58:07.761773+02:00", "EventTime": "2023-10-30T13:58:07.761792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CTM4EX3Fboz3h95JZj"]} -{"Format": "IDEA0", "ID": "516efa2c-3629-46d4-b8cd-706777acecf7", "DetectTime": "2023-10-30T13:58:07.782241+02:00", "EventTime": "2023-10-30T13:58:07.782255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CFQLUm3HFsHPITzKXe"]} -{"Format": "IDEA0", "ID": "2aaf0250-d1a2-4e59-8a14-1e75c0f4e61d", "DetectTime": "2023-10-30T13:58:07.808462+02:00", "EventTime": "2023-10-30T13:58:07.808479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["C6jOjV1Ri9R22hDmFh"]} -{"Format": "IDEA0", "ID": "831e5dae-f2dd-46b9-90e4-fd0649480575", "DetectTime": "2023-10-30T13:58:07.830031+02:00", "EventTime": "2023-10-30T13:58:07.830047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CvbXRn1T61pq1doBAg"]} -{"Format": "IDEA0", "ID": "bcae8c24-fd7f-4512-bb6e-f1dad830f73e", "DetectTime": "2023-10-30T13:58:07.858969+02:00", "EventTime": "2023-10-30T13:58:07.858987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["Ck4op73Nxviy2YJ6Pd"]} -{"Format": "IDEA0", "ID": "79bbba6d-04b7-484d-93c7-5f1d0a602468", "DetectTime": "2023-10-30T13:58:07.887288+02:00", "EventTime": "2023-10-30T13:58:07.887303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CoM2mn4oNz7jCMWDfi"]} -{"Format": "IDEA0", "ID": "60e5be3d-38ff-46a2-8054-5527fb669d5d", "DetectTime": "2023-10-30T13:58:07.910954+02:00", "EventTime": "2023-10-30T13:58:07.910969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.49.121 ", "ContentType": "text/plain"}], "uids": ["C2VX8qg975Iutds4a"]} -{"Format": "IDEA0", "ID": "d4c2662f-a1a3-47e1-a5c4-7bb5713138d0", "DetectTime": "2023-10-30T13:58:07.935806+02:00", "EventTime": "2023-10-30T13:58:07.935824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["C2N0Ii2xbVj8MggMsi"]} -{"Format": "IDEA0", "ID": "a6a0fcb0-a836-441b-b8b6-f927c82d2b5d", "DetectTime": "2023-10-30T13:58:07.961456+02:00", "EventTime": "2023-10-30T13:58:07.961473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["CXi3bv4ul0R1VFLYHd"]} -{"Format": "IDEA0", "ID": "f3dd6838-3379-4067-b9a1-feb272b40a02", "DetectTime": "2023-10-30T13:58:07.986172+02:00", "EventTime": "2023-10-30T13:58:07.986189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["C1q8h43DR2oYKSqVjg"]} -{"Format": "IDEA0", "ID": "6673ea18-6f1f-4f4b-8677-af4e95743a80", "DetectTime": "2023-10-30T13:58:08.008853+02:00", "EventTime": "2023-10-30T13:58:08.008867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["CSyr3u3Z4ZoeSSQItj"]} -{"Format": "IDEA0", "ID": "bad26e15-3d2b-4eca-9a08-5eb632f86d07", "DetectTime": "2023-10-30T13:58:08.036737+02:00", "EventTime": "2023-10-30T13:58:08.036748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CezeiN133odmMm7Pmd"]} -{"Format": "IDEA0", "ID": "ad036c65-9946-4a1e-a5ec-16c1ec894e1d", "DetectTime": "2023-10-30T13:58:08.063937+02:00", "EventTime": "2023-10-30T13:58:08.063956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CWJks146Q7zz7H3Kf8"]} -{"Format": "IDEA0", "ID": "f31a4095-ed38-4f5e-821c-849887010ad6", "DetectTime": "2023-10-30T13:58:08.090990+02:00", "EventTime": "2023-10-30T13:58:08.091003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["Cunwku1C34sb5Q5T4e"]} -{"Format": "IDEA0", "ID": "fa147bf9-f9ae-48f3-8303-3a05e7a447f8", "DetectTime": "2023-10-30T13:58:08.118892+02:00", "EventTime": "2023-10-30T13:58:08.118909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CQc38O3czP8RTuMJRk"]} -{"Format": "IDEA0", "ID": "63e41383-6ada-469d-88dc-6079ae1c6963", "DetectTime": "2023-10-30T13:58:08.139420+02:00", "EventTime": "2023-10-30T13:58:08.139437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CvHnuC2HmMSksJnnTa"]} -{"Format": "IDEA0", "ID": "40b0a6b6-f070-4d80-8e52-c5153451ebe4", "DetectTime": "2023-10-30T13:58:08.161957+02:00", "EventTime": "2023-10-30T13:58:08.161970+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfzLanqTsag15PlX"]} -{"Format": "IDEA0", "ID": "4a311541-5239-4cae-8160-9f3aac0cd0c7", "DetectTime": "2023-10-30T13:58:08.174913+02:00", "EventTime": "2023-10-30T13:58:08.174932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CxhkUN3WPNmEq73id1"]} -{"Format": "IDEA0", "ID": "fbc1ddb2-9989-4b18-ad5e-d48011cf9b20", "DetectTime": "2023-10-30T13:58:08.197833+02:00", "EventTime": "2023-10-30T13:58:08.197848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CMXyCF1zakhtYWxBV9"]} -{"Format": "IDEA0", "ID": "03c387ae-bab4-497d-a30c-74dd562f8dc2", "DetectTime": "2023-10-30T13:58:08.220530+02:00", "EventTime": "2023-10-30T13:58:08.220541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CCoxVf1doZu62bxVNf"]} -{"Format": "IDEA0", "ID": "ead3b54c-1548-4e35-85f2-d7b18f28659b", "DetectTime": "2023-10-30T13:58:08.244691+02:00", "EventTime": "2023-10-30T13:58:08.244711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CBQFWZpol9v3fq899"]} -{"Format": "IDEA0", "ID": "10649b94-534e-472d-b0aa-c65fbd751e27", "DetectTime": "2023-10-30T13:58:08.277420+02:00", "EventTime": "2023-10-30T13:58:08.277440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CA6BQd2tVJnonGAmv1"]} -{"Format": "IDEA0", "ID": "c4945c59-5c7f-4878-a338-707697fda76d", "DetectTime": "2023-10-30T13:58:08.303928+02:00", "EventTime": "2023-10-30T13:58:08.303945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["C8giTU4pydIIxsPDf"]} -{"Format": "IDEA0", "ID": "f2dad10a-6498-405f-a6f1-cfdf3e885555", "DetectTime": "2023-10-30T13:58:08.333838+02:00", "EventTime": "2023-10-30T13:58:08.333858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["CPc4RB33hLgNtmC8Gf"]} -{"Format": "IDEA0", "ID": "b62a9f82-4f15-4cff-9165-6677df8d9606", "DetectTime": "2023-10-30T13:58:08.425246+02:00", "EventTime": "2023-10-30T13:58:08.425282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.96.161.63 ", "ContentType": "text/plain"}], "uids": ["CFIWLC1TXwe6HNzaTi"]} -{"Format": "IDEA0", "ID": "eacde88b-e21e-467e-8f17-c9bd14a40a33", "DetectTime": "2023-10-30T13:58:08.464762+02:00", "EventTime": "2023-10-30T13:58:08.464783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CcgXUX1HJ177qmbUec"]} -{"Format": "IDEA0", "ID": "569e66fc-4a20-4800-9662-4a3b90953968", "DetectTime": "2023-10-30T13:58:08.499508+02:00", "EventTime": "2023-10-30T13:58:08.499525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["Csf22I19K0f1OwF2h"]} -{"Format": "IDEA0", "ID": "778a382b-c5f1-45e0-828d-961e8e03da7a", "DetectTime": "2023-10-30T13:58:08.529942+02:00", "EventTime": "2023-10-30T13:58:08.529960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["CRR0QN3WTjKLNOuyb6"]} -{"Format": "IDEA0", "ID": "eb49526c-4306-46bf-93fb-c4ddda43c7f8", "DetectTime": "2023-10-30T13:58:08.563607+02:00", "EventTime": "2023-10-30T13:58:08.563622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CNGjk615hdBE0mFNfj"]} -{"Format": "IDEA0", "ID": "70c27613-6785-4c0e-82bb-25f4b9b30b2d", "DetectTime": "2023-10-30T13:58:08.595389+02:00", "EventTime": "2023-10-30T13:58:08.595400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CBQWFa2H7P4fO2ipp5"]} -{"Format": "IDEA0", "ID": "4408039e-1ba1-4a1f-bd8f-e888147a9c07", "DetectTime": "2023-10-30T13:58:08.625047+02:00", "EventTime": "2023-10-30T13:58:08.625063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CUYxH9UJFoyZ59Hi2", "CFV9wS2W0UO5sxVt53", "C0u4HC36OGdUxmU7bk", "CjPdgu3ZPizZ2huTt8"]} -{"Format": "IDEA0", "ID": "86ea42d3-dac3-404e-97b1-e3df37231d2e", "DetectTime": "2023-10-30T13:58:08.641258+02:00", "EventTime": "2023-10-30T13:58:08.641276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["Ce2rYu2ffz442WlESa"]} -{"Format": "IDEA0", "ID": "45376126-05f9-4bda-84ce-a98cb1213c09", "DetectTime": "2023-10-30T13:58:08.662585+02:00", "EventTime": "2023-10-30T13:58:08.662602+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFV9wS2W0UO5sxVt53"]} -{"Format": "IDEA0", "ID": "5f66c558-0cec-45d7-bbd3-6fe390eba743", "DetectTime": "2023-10-30T13:58:08.678222+02:00", "EventTime": "2023-10-30T13:58:08.678239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CkTQr817LrZf8ZcePc"]} -{"Format": "IDEA0", "ID": "5f160ff0-dc0f-4faf-95fb-6a1a4b9e6e37", "DetectTime": "2023-10-30T13:58:08.704210+02:00", "EventTime": "2023-10-30T13:58:08.704227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CkipMT2NRILc67Fl5l"]} -{"Format": "IDEA0", "ID": "5b339440-36c5-4597-9230-0182a12fb7cb", "DetectTime": "2023-10-30T13:58:08.725916+02:00", "EventTime": "2023-10-30T13:58:08.725929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["C57b2TgRypo77poE9"]} -{"Format": "IDEA0", "ID": "caf2fc97-394b-484d-9c52-4d7d1f38c03c", "DetectTime": "2023-10-30T13:58:08.747836+02:00", "EventTime": "2023-10-30T13:58:08.747854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["Cc5s6K1rWIHSWN57mi"]} -{"Format": "IDEA0", "ID": "93b5c7bb-4f0b-431d-b424-238d705b6a5a", "DetectTime": "2023-10-30T13:58:08.775936+02:00", "EventTime": "2023-10-30T13:58:08.775953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["C2umWu4xVmAXCXUTkb"]} -{"Format": "IDEA0", "ID": "bec56163-b3e1-47f5-a0bb-f38680d0cdc7", "DetectTime": "2023-10-30T13:58:08.803405+02:00", "EventTime": "2023-10-30T13:58:08.803416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CDHR3m1Qg8ybxT7y23"]} -{"Format": "IDEA0", "ID": "39390a3c-7178-41a0-a43e-2ad225183191", "DetectTime": "2023-10-30T13:58:08.835829+02:00", "EventTime": "2023-10-30T13:58:08.835846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["CDZEcC1pRYWEw33g5b"]} -{"Format": "IDEA0", "ID": "0eed9143-1046-49d7-b16d-f9859507148b", "DetectTime": "2023-10-30T13:58:08.864619+02:00", "EventTime": "2023-10-30T13:58:08.864636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["CHZzty2KUTYVusiJWf"]} -{"Format": "IDEA0", "ID": "5b65fcb5-d52f-4aa1-8280-2cb2899e5e93", "DetectTime": "2023-10-30T13:58:08.895294+02:00", "EventTime": "2023-10-30T13:58:08.895310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.49.121 ", "ContentType": "text/plain"}], "uids": ["CLB3Fy4Kfcpwk7dQ0c"]} -{"Format": "IDEA0", "ID": "92330377-0e29-472a-8930-f3be49a26403", "DetectTime": "2023-10-30T13:58:08.923350+02:00", "EventTime": "2023-10-30T13:58:08.923362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CSrKj7zRSAKZoaTd6"]} -{"Format": "IDEA0", "ID": "0dd0acfd-1463-47db-8181-df1853e49b72", "DetectTime": "2023-10-30T13:58:08.947075+02:00", "EventTime": "2023-10-30T13:58:08.947093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["Cbv8zrUAxAxO8gsj3"]} -{"Format": "IDEA0", "ID": "d1f83f52-4d1a-4a85-b4ff-670df6ed47a0", "DetectTime": "2023-10-30T13:58:08.973970+02:00", "EventTime": "2023-10-30T13:58:08.973987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CVf0cG2nsTNs5Ei9w3"]} -{"Format": "IDEA0", "ID": "7a149965-8807-43cd-ba2b-002602469b39", "DetectTime": "2023-10-30T13:58:09.012008+02:00", "EventTime": "2023-10-30T13:58:09.012025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["Cg9a9x4cO0CLkuJT4l"]} -{"Format": "IDEA0", "ID": "7bf47836-b1e4-49e3-9cce-c03db3c99bd2", "DetectTime": "2023-10-30T13:58:09.038598+02:00", "EventTime": "2023-10-30T13:58:09.038614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CtEFgu4CYqWbq32tbi"]} -{"Format": "IDEA0", "ID": "322c2a9c-7586-4c38-81aa-ad7c264c7d23", "DetectTime": "2023-10-30T13:58:09.066870+02:00", "EventTime": "2023-10-30T13:58:09.066887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CgHBaw3mbzGSWQ1pxb"]} -{"Format": "IDEA0", "ID": "08aacfbc-b565-444a-9687-ccd71939dc1c", "DetectTime": "2023-10-30T13:58:09.091112+02:00", "EventTime": "2023-10-30T13:58:09.091131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.247.233.74 ", "ContentType": "text/plain"}], "uids": ["CmAjgM28yTSaayYt3d"]} -{"Format": "IDEA0", "ID": "8f77bf0d-7b48-452b-b5d9-b7fa3217931d", "DetectTime": "2023-10-30T13:58:09.125069+02:00", "EventTime": "2023-10-30T13:58:09.125087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CDbUgP2SSYIcApIWn4"]} -{"Format": "IDEA0", "ID": "4f854fd9-ad21-47d7-9461-0aa7f93b4b9d", "DetectTime": "2023-10-30T13:58:09.152096+02:00", "EventTime": "2023-10-30T13:58:09.152113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CtlN8jMrTQEtF3sBf"]} -{"Format": "IDEA0", "ID": "46ce37a7-9992-47a6-89d6-b4aac55b1c76", "DetectTime": "2023-10-30T13:58:09.182548+02:00", "EventTime": "2023-10-30T13:58:09.182570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CyNrqQ3ELSUROyvZcg"]} -{"Format": "IDEA0", "ID": "2a30a759-fe01-466d-957c-d7b9b1b52aa5", "DetectTime": "2023-10-30T13:58:09.217149+02:00", "EventTime": "2023-10-30T13:58:09.217170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["CeRVEa2LB7pNN8vnri"]} -{"Format": "IDEA0", "ID": "c9782ce6-7301-416d-a348-23df5a09aca4", "DetectTime": "2023-10-30T13:58:09.240364+02:00", "EventTime": "2023-10-30T13:58:09.240375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["COo7IY2TMdOLpBo2pi"]} -{"Format": "IDEA0", "ID": "7460209b-878a-47b2-8702-b993cfeeaf16", "DetectTime": "2023-10-30T13:58:09.265339+02:00", "EventTime": "2023-10-30T13:58:09.265357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CKeYtj2wsaYwVHzqil"]} -{"Format": "IDEA0", "ID": "62d67b60-348b-4905-b6a7-60cd9b1f8d9c", "DetectTime": "2023-10-30T13:58:09.293024+02:00", "EventTime": "2023-10-30T13:58:09.293035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["Cnywfp3avurKGiP1pc"]} -{"Format": "IDEA0", "ID": "211f1d51-6656-4475-a54b-a950609c5dbd", "DetectTime": "2023-10-30T13:58:09.318016+02:00", "EventTime": "2023-10-30T13:58:09.318031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CPRs2K3TzljBUW3B6l"]} -{"Format": "IDEA0", "ID": "b0582467-66ad-4950-9da0-d5e4854bf7cd", "DetectTime": "2023-10-30T13:58:09.356026+02:00", "EventTime": "2023-10-30T13:58:09.356046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.27.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.27.151 ", "ContentType": "text/plain"}], "uids": ["CGcYId156iTImt3MOl"]} -{"Format": "IDEA0", "ID": "0a99e497-7bc7-486b-9ef7-46c793a07b02", "DetectTime": "2023-10-30T13:58:09.387843+02:00", "EventTime": "2023-10-30T13:58:09.387857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["CAlrwc3r4j5Ph1YGld"]} -{"Format": "IDEA0", "ID": "62140d74-4d31-403c-8d29-a5c240feb6d0", "DetectTime": "2023-10-30T13:58:09.414501+02:00", "EventTime": "2023-10-30T13:58:09.414523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["C00Xvw16StemyUxSUk"]} -{"Format": "IDEA0", "ID": "a733ca8e-5c60-4c1e-9188-80e946f8d522", "DetectTime": "2023-10-30T13:58:09.447189+02:00", "EventTime": "2023-10-30T13:58:09.447211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["CCX43p3MOErST2QeBi"]} -{"Format": "IDEA0", "ID": "3562f876-26fc-415a-b413-27178ca40d5b", "DetectTime": "2023-10-30T13:58:09.474449+02:00", "EventTime": "2023-10-30T13:58:09.474461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CigL3e25uDHlT99o6j"]} -{"Format": "IDEA0", "ID": "a7097438-4c16-4938-bc1c-1a8e763f8d74", "DetectTime": "2023-10-30T13:58:09.507634+02:00", "EventTime": "2023-10-30T13:58:09.507656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CQQsk839IdQvzWafTa"]} -{"Format": "IDEA0", "ID": "ac21a413-26ac-4fa1-9b8b-c1832abbfbf0", "DetectTime": "2023-10-30T13:58:09.540957+02:00", "EventTime": "2023-10-30T13:58:09.540975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["C0YFYEtzZyykQZrd5"]} -{"Format": "IDEA0", "ID": "7b33f171-bee9-42fa-adf6-2e390999fd09", "DetectTime": "2023-10-30T13:58:09.568340+02:00", "EventTime": "2023-10-30T13:58:09.568359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CMgYf53XhDNHjjRR7f"]} -{"Format": "IDEA0", "ID": "57a42b16-c33c-4454-9ba1-6f1b381ab197", "DetectTime": "2023-10-30T13:58:09.603579+02:00", "EventTime": "2023-10-30T13:58:09.603596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 ", "ContentType": "text/plain"}], "uids": ["Cf14WK8eZtbcvNLP7"]} -{"Format": "IDEA0", "ID": "c33f907e-caae-4bdc-9804-ed0447344f95", "DetectTime": "2023-10-30T13:58:09.630498+02:00", "EventTime": "2023-10-30T13:58:09.630523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CGMqCh4noSAJhqGhU2"]} -{"Format": "IDEA0", "ID": "f8b2a1e7-7c4c-4070-8a97-68d57685be6b", "DetectTime": "2023-10-30T13:58:09.660199+02:00", "EventTime": "2023-10-30T13:58:09.660217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.114.37 ", "ContentType": "text/plain"}], "uids": ["C6zCJ63AX9Lre9cpdj"]} -{"Format": "IDEA0", "ID": "4538cd3e-39e2-4076-8eb3-bcc6d21c46a7", "DetectTime": "2023-10-30T13:58:09.684725+02:00", "EventTime": "2023-10-30T13:58:09.684740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CE6YJp1n2ZI9VLa225"]} -{"Format": "IDEA0", "ID": "8781202c-b352-452b-869c-2455b4c356e2", "DetectTime": "2023-10-30T13:58:09.711067+02:00", "EventTime": "2023-10-30T13:58:09.711089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.67.138 ", "ContentType": "text/plain"}], "uids": ["CIHJLJ3NJZg6eKJIza"]} -{"Format": "IDEA0", "ID": "37f438e0-0261-43fb-8548-186d37a764f0", "DetectTime": "2023-10-30T13:58:09.740227+02:00", "EventTime": "2023-10-30T13:58:09.740248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.120.218.207 ", "ContentType": "text/plain"}], "uids": ["CuvZ67wEjnY2gzLu4"]} -{"Format": "IDEA0", "ID": "42036740-f07c-4aa2-a1c7-2193ebcd048f", "DetectTime": "2023-10-30T13:58:09.769508+02:00", "EventTime": "2023-10-30T13:58:09.769524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["Cg8tiX1We83r64YJxd"]} -{"Format": "IDEA0", "ID": "652827f2-000e-470c-b2bf-ab3ef0c453c1", "DetectTime": "2023-10-30T13:58:09.802234+02:00", "EventTime": "2023-10-30T13:58:09.802251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["Cxbwrr1sqoScnHWQ46"]} -{"Format": "IDEA0", "ID": "41733b61-ea9c-4f8c-b417-198c21bbe55f", "DetectTime": "2023-10-30T13:58:09.835704+02:00", "EventTime": "2023-10-30T13:58:09.835715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CA40KZsydkdTItgc9"]} -{"Format": "IDEA0", "ID": "6ad6ca7d-fd1c-4c3a-8ad0-a99a676eb009", "DetectTime": "2023-10-30T13:58:09.872629+02:00", "EventTime": "2023-10-30T13:58:09.872657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C2aKQE3Rud9fir6RJb"]} -{"Format": "IDEA0", "ID": "bd45a636-27b0-4ed3-a177-feb011dd4a4e", "DetectTime": "2023-10-30T13:58:09.908853+02:00", "EventTime": "2023-10-30T13:58:09.908871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CjaiD833OTppy453Og"]} -{"Format": "IDEA0", "ID": "07d8c4e4-e6fd-412e-b16c-e81ccaf145e3", "DetectTime": "2023-10-30T13:58:09.960995+02:00", "EventTime": "2023-10-30T13:58:09.961018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CPbvCa1xa92C6M85lf"]} -{"Format": "IDEA0", "ID": "78a221c9-a3cc-4d06-bcf5-ee0344809eea", "DetectTime": "2023-10-30T13:58:09.988624+02:00", "EventTime": "2023-10-30T13:58:09.988645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CgsMdJ862okKLvrBd"]} -{"Format": "IDEA0", "ID": "79a5baff-bf3e-4612-9fdc-84939b94f1b0", "DetectTime": "2023-10-30T13:58:10.018930+02:00", "EventTime": "2023-10-30T13:58:10.018947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CuVt2Z3j2ECew9dzM3"]} -{"Format": "IDEA0", "ID": "db228e9c-e6ce-4a0c-bb7a-fe0a153020f7", "DetectTime": "2023-10-30T13:58:10.042661+02:00", "EventTime": "2023-10-30T13:58:10.042672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CUJI762bk60ZkgOrM3"]} -{"Format": "IDEA0", "ID": "f8e6f9ef-dcdf-41a3-868c-8c102a11044e", "DetectTime": "2023-10-30T13:58:10.064585+02:00", "EventTime": "2023-10-30T13:58:10.064599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CEIyrb1Lat8VkCxyU4"]} -{"Format": "IDEA0", "ID": "c5b600bc-6b20-4fae-8482-8e8dfae893a9", "DetectTime": "2023-10-30T13:58:10.088232+02:00", "EventTime": "2023-10-30T13:58:10.088253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C6aJUw1hzZIaHVThnh"]} -{"Format": "IDEA0", "ID": "d2e10198-7ff9-4b29-9236-5d848dfd3b3b", "DetectTime": "2023-10-30T13:58:10.118911+02:00", "EventTime": "2023-10-30T13:58:10.118933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CftqJoIGLRVVyPhbb"]} -{"Format": "IDEA0", "ID": "ae2f74eb-0a9b-4fe6-baa0-efae24dfc45a", "DetectTime": "2023-10-30T13:58:10.147486+02:00", "EventTime": "2023-10-30T13:58:10.147505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C0ugLo2b8RzguILwof"]} -{"Format": "IDEA0", "ID": "de66c415-d914-4f36-97aa-ed0170532619", "DetectTime": "2023-10-30T13:58:10.179131+02:00", "EventTime": "2023-10-30T13:58:10.179145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["C6Folg1vjPHrEq2bg4"]} -{"Format": "IDEA0", "ID": "a2bde9ad-f3af-4e89-86d7-bfb7fe63902b", "DetectTime": "2023-10-30T13:58:10.203623+02:00", "EventTime": "2023-10-30T13:58:10.203641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["ChEETI1oOBhcdPvdTf"]} -{"Format": "IDEA0", "ID": "5c2276fb-498e-4b75-a49b-43c6dc44061d", "DetectTime": "2023-10-30T13:58:10.227563+02:00", "EventTime": "2023-10-30T13:58:10.227580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CGrAaV2PgAnG4qcUt5"]} -{"Format": "IDEA0", "ID": "1ad94eb2-1319-4026-bb89-336d6500f01c", "DetectTime": "2023-10-30T13:58:10.257624+02:00", "EventTime": "2023-10-30T13:58:10.257636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CU3p7gtQ8OcJqqR2d"]} -{"Format": "IDEA0", "ID": "63c2252a-357a-4942-b930-9444cf088af2", "DetectTime": "2023-10-30T13:58:10.290418+02:00", "EventTime": "2023-10-30T13:58:10.290431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CGvFxxkcbforTJCZ3"]} -{"Format": "IDEA0", "ID": "b96cbb0d-aada-4a96-a10d-c466ac446016", "DetectTime": "2023-10-30T13:58:10.317386+02:00", "EventTime": "2023-10-30T13:58:10.317407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CIN7K32hMUaq7h3KVb"]} -{"Format": "IDEA0", "ID": "9d74c978-f8d9-462f-8b26-24a027e95c68", "DetectTime": "2023-10-30T13:58:10.345693+02:00", "EventTime": "2023-10-30T13:58:10.345703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C6qYMx2lawl8IVA1v7"]} -{"Format": "IDEA0", "ID": "d7c3d252-2a67-4540-9ae3-3603cd7460fd", "DetectTime": "2023-10-30T13:58:10.369640+02:00", "EventTime": "2023-10-30T13:58:10.369653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["C0EByP2sRxsWqSDHE2"]} -{"Format": "IDEA0", "ID": "fba17521-c815-43bb-abac-bd147a9b0f08", "DetectTime": "2023-10-30T13:58:10.396290+02:00", "EventTime": "2023-10-30T13:58:10.396302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CD2wrjawar799Nlq8"]} -{"Format": "IDEA0", "ID": "537d47e8-ace9-4160-b57d-7071542ae046", "DetectTime": "2023-10-30T13:58:10.426221+02:00", "EventTime": "2023-10-30T13:58:10.426231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CLINrU1sIYQ6Z4IDS6"]} -{"Format": "IDEA0", "ID": "86866667-a27a-4f12-a362-68c3e500e074", "DetectTime": "2023-10-30T13:58:10.457099+02:00", "EventTime": "2023-10-30T13:58:10.457114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["C2uWdM1GGJTUiPZKq6"]} -{"Format": "IDEA0", "ID": "9af902f2-f1ef-4adb-916b-45a6077dff9f", "DetectTime": "2023-10-30T13:58:10.487001+02:00", "EventTime": "2023-10-30T13:58:10.487023+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUqHdm3eX9zB25Mis3"]} -{"Format": "IDEA0", "ID": "6a8d75ba-1805-4f9b-851f-74feedc17096", "DetectTime": "2023-10-30T13:58:10.503559+02:00", "EventTime": "2023-10-30T13:58:10.503587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["CfPwoU1KaOVPvQaCC4"]} -{"Format": "Json", "ID": "6a8d75ba-1805-4f9b-851f-74feedc17096", "DetectTime": "2023-10-30T13:58:10.503559+02:00", "EventTime": "2023-10-30T13:58:10.503587+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:45:11.470959+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:58:10.560566)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e057e19e-7f43-46db-a2f8-6f430dcffd16", "DetectTime": "2023-10-30T13:58:10.566396+02:00", "EventTime": "2023-10-30T13:58:10.566414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10559], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. ", "ContentType": "text/plain"}], "uids": ["Cf5OwI1CvxzBSY1blj"]} -{"Format": "IDEA0", "ID": "87450944-e8d6-44d5-9412-d0a8b9d0887d", "DetectTime": "2023-10-30T13:58:10.593787+02:00", "EventTime": "2023-10-30T13:58:10.593803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["C5A9jO3FJmmtJM01q6"]} -{"Format": "IDEA0", "ID": "a13814de-f4df-4eb8-bd0b-a360d310ea3d", "DetectTime": "2023-10-30T13:58:10.624748+02:00", "EventTime": "2023-10-30T13:58:10.624764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CslLjr2jh9PSbcbuxf"]} -{"Format": "IDEA0", "ID": "35936a7b-7c01-4286-8f5d-38feb7a5be33", "DetectTime": "2023-10-30T13:58:10.656575+02:00", "EventTime": "2023-10-30T13:58:10.656595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CpEoqn3BryKoYmaW57"]} -{"Format": "IDEA0", "ID": "09186654-6ab0-40ef-8b31-13377e73b233", "DetectTime": "2023-10-30T13:58:10.682792+02:00", "EventTime": "2023-10-30T13:58:10.682812+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSuWLStlwWDkrJAN5"]} -{"Format": "IDEA0", "ID": "e227b7b3-fa3c-4e31-af70-286d0a2cae44", "DetectTime": "2023-10-30T13:58:10.697642+02:00", "EventTime": "2023-10-30T13:58:10.697659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29980], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. ", "ContentType": "text/plain"}], "uids": ["CoiTxRBBOgFMA1rb1"]} -{"Format": "IDEA0", "ID": "2b917aeb-0efe-4ec2-a0a6-109e1e93a210", "DetectTime": "2023-10-30T13:58:10.722224+02:00", "EventTime": "2023-10-30T13:58:10.722241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26145], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. ", "ContentType": "text/plain"}], "uids": ["CIyc8e3QANcjpuoqI"]} -{"Format": "IDEA0", "ID": "989d368f-50a1-4fe0-8f77-af15753eae3d", "DetectTime": "2023-10-30T13:58:10.752700+02:00", "EventTime": "2023-10-30T13:58:10.752712+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cczsxo4QwBU45K9X53"]} -{"Format": "IDEA0", "ID": "de77c0e3-08e5-44b7-9726-e65bca165eb0", "DetectTime": "2023-10-30T13:58:10.764520+02:00", "EventTime": "2023-10-30T13:58:10.764539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CiL4wU7TPinlndjL9"]} -{"Format": "IDEA0", "ID": "94153f45-f1fd-47f7-ba15-66c028ff67e7", "DetectTime": "2023-10-30T13:58:10.789736+02:00", "EventTime": "2023-10-30T13:58:10.789748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CEsgZF1DIU5ue1hDp3"]} -{"Format": "Json", "ID": "94153f45-f1fd-47f7-ba15-66c028ff67e7", "DetectTime": "2023-10-30T13:58:10.789736+02:00", "EventTime": "2023-10-30T13:58:10.789748+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T11:45:14.993261+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2023/10/30 13:58:10.913223)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3a3675f-65e0-4634-8293-98e3d5443a44", "DetectTime": "2023-10-30T13:58:10.919168+02:00", "EventTime": "2023-10-30T13:58:10.919191+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFble6hE2zQwJaph5"]} -{"Format": "IDEA0", "ID": "418176de-fa73-4897-95a0-5ab7b37aff98", "DetectTime": "2023-10-30T13:58:10.938574+02:00", "EventTime": "2023-10-30T13:58:10.938594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["C7rYGv2EEXF4FXYUO4"]} -{"Format": "IDEA0", "ID": "4f4b1e3f-712e-4454-ba0b-cc0bfee7be97", "DetectTime": "2023-10-30T13:58:10.968608+02:00", "EventTime": "2023-10-30T13:58:10.968622+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7uXPJ2JfX3J8gI794"]} -{"Format": "IDEA0", "ID": "8466d8bb-df0e-4385-990b-78bf300ddd1e", "DetectTime": "2023-10-30T13:58:10.982686+02:00", "EventTime": "2023-10-30T13:58:10.982698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["C1AnhB45xyMjKpxjC1"]} -{"Format": "IDEA0", "ID": "d917c2bb-cf7a-4365-871a-e830296513bf", "DetectTime": "2023-10-30T13:58:11.006846+02:00", "EventTime": "2023-10-30T13:58:11.006862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. ", "ContentType": "text/plain"}], "uids": ["CLmcy64p61pWvYbcI6"]} -{"Format": "IDEA0", "ID": "f07d3c37-1ed1-4f89-888b-00c2a2955cfa", "DetectTime": "2023-10-30T13:58:11.038682+02:00", "EventTime": "2023-10-30T13:58:11.038704+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiyRrm4ZJMofkr5xD5"]} -{"Format": "IDEA0", "ID": "90615952-2ef1-4124-bce6-077d86bded85", "DetectTime": "2023-10-30T13:58:11.053163+02:00", "EventTime": "2023-10-30T13:58:11.053182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["Cjk67F1IGAtsdy9P08"]} -{"Format": "IDEA0", "ID": "ecb0ce30-bb77-4ce1-bc93-523e2c67e6ba", "DetectTime": "2023-10-30T13:58:11.078131+02:00", "EventTime": "2023-10-30T13:58:11.078146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["CEABkz2op0JzMLf1Pk"]} -{"Format": "IDEA0", "ID": "4d05338a-9a75-40ac-9c35-b1a6edb67bf9", "DetectTime": "2023-10-30T13:58:11.104465+02:00", "EventTime": "2023-10-30T13:58:11.104476+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbFZH52VVxUl2apl4l"]} -{"Format": "IDEA0", "ID": "1e46a645-ba41-4a2a-9cd0-7f365b4f3645", "DetectTime": "2023-10-30T13:58:11.117429+02:00", "EventTime": "2023-10-30T13:58:11.117447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CMtU7v2q0MudGPUkf2"]} -{"Format": "IDEA0", "ID": "37787c65-c066-4580-b7eb-899b1bb98c4e", "DetectTime": "2023-10-30T13:58:11.161138+02:00", "EventTime": "2023-10-30T13:58:11.161159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CSuWLStlwWDkrJAN5", "CFble6hE2zQwJaph5", "CiyRrm4ZJMofkr5xD5", "Cv2RFL2P5iZlNY36tg"]} -{"Format": "IDEA0", "ID": "49a2e4d9-970a-4d13-b18b-42e1f3fc92f8", "DetectTime": "2023-10-30T13:58:11.178104+02:00", "EventTime": "2023-10-30T13:58:11.178126+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cv2RFL2P5iZlNY36tg"]} -{"Format": "IDEA0", "ID": "d7a8d909-30ec-4297-a917-38eacc6c41ec", "DetectTime": "2023-10-30T13:58:11.196338+02:00", "EventTime": "2023-10-30T13:58:11.196360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CBTXvo2AQiFUiAkR3"]} -{"Format": "IDEA0", "ID": "68200fae-e881-4b7c-96de-f27ac6a16fc6", "DetectTime": "2023-10-30T13:58:11.239434+02:00", "EventTime": "2023-10-30T13:58:11.239451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2527], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. ", "ContentType": "text/plain"}], "uids": ["Cp5yFv4MksgVRoDl0d"]} -{"Format": "IDEA0", "ID": "3b0b2680-5698-440e-82c5-31ddc2017ed1", "DetectTime": "2023-10-30T13:58:11.286086+02:00", "EventTime": "2023-10-30T13:58:11.286106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cn396N1lZn2JPatw9j"]} -{"Format": "IDEA0", "ID": "8327ebc8-5272-4476-bb00-8723cad66cd8", "DetectTime": "2023-10-30T13:58:11.332323+02:00", "EventTime": "2023-10-30T13:58:11.332340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrSwtb3fW2pNSzBJK"]} -{"Format": "IDEA0", "ID": "a4b2f6ad-13e5-4127-89ae-dfdb1a8441d1", "DetectTime": "2023-10-30T13:58:11.347678+02:00", "EventTime": "2023-10-30T13:58:11.347694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CVcR4y2Lw76fGkuNa"]} -{"Format": "IDEA0", "ID": "f83f3741-e756-4fc8-9983-ac64078ffede", "DetectTime": "2023-10-30T13:58:11.388814+02:00", "EventTime": "2023-10-30T13:58:11.388827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CmIGC521khL3IIGFrk"]} -{"Format": "Json", "ID": "f83f3741-e756-4fc8-9983-ac64078ffede", "DetectTime": "2023-10-30T13:58:11.388814+02:00", "EventTime": "2023-10-30T13:58:11.388827+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:15:51.792084+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:11.492247)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6522a41b-5039-40fa-bdd7-eb8403f5d187", "DetectTime": "2023-10-30T13:58:11.496473+02:00", "EventTime": "2023-10-30T13:58:11.496484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["C0V8PG1kSfi5cviZYk"]} -{"Format": "IDEA0", "ID": "65e05d23-cfc2-4f6c-9b58-25e97b85eab0", "DetectTime": "2023-10-30T13:58:11.523386+02:00", "EventTime": "2023-10-30T13:58:11.523401+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFdL672Wcwp0uivwO"]} -{"Format": "IDEA0", "ID": "e58634ff-a594-4dcf-beec-eb95793ff6e6", "DetectTime": "2023-10-30T13:58:11.539700+02:00", "EventTime": "2023-10-30T13:58:11.539715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CjUFC83m6spL4goW75"]} -{"Format": "IDEA0", "ID": "080b0a5a-0ba5-4379-8ae2-ef9f03326b8d", "DetectTime": "2023-10-30T13:58:11.582507+02:00", "EventTime": "2023-10-30T13:58:11.582522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CtRjcJ1K0ZeYQmyiq5"]} -{"Format": "IDEA0", "ID": "7c81c2bc-9f46-4136-9514-e2a4aff5a703", "DetectTime": "2023-10-30T13:58:11.626378+02:00", "EventTime": "2023-10-30T13:58:11.626399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CyT0TB2nh7JmCSI7Rj"]} -{"Format": "IDEA0", "ID": "ad32393b-fbff-4477-87bb-8b3fc58bd511", "DetectTime": "2023-10-30T13:58:11.669408+02:00", "EventTime": "2023-10-30T13:58:11.669428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CC2SG23Wf02ErWvWY1"]} -{"Format": "IDEA0", "ID": "acbcd16f-4903-423f-b2da-07c273d38c18", "DetectTime": "2023-10-30T13:58:11.710660+02:00", "EventTime": "2023-10-30T13:58:11.710676+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXvzQ34vMb2sWRkDlf"]} -{"Format": "IDEA0", "ID": "d4580687-d20b-4f4f-8373-84f69501b0ae", "DetectTime": "2023-10-30T13:58:11.725426+02:00", "EventTime": "2023-10-30T13:58:11.725445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CMcJWE4rU4oYl6hpN5"]} -{"Format": "IDEA0", "ID": "fa8dc733-992d-4fa8-831f-22be2f199e35", "DetectTime": "2023-10-30T13:58:11.764797+02:00", "EventTime": "2023-10-30T13:58:11.764815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CygRWl4Ks3j6ppaLNk"]} -{"Format": "IDEA0", "ID": "794ad2cc-bd38-4ee5-a166-d22b56a348a4", "DetectTime": "2023-10-30T13:58:11.802628+02:00", "EventTime": "2023-10-30T13:58:11.802649+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0VtOi49L5lrwpS2zc"]} -{"Format": "IDEA0", "ID": "9e54cc33-d99c-41e5-be3f-368063169271", "DetectTime": "2023-10-30T13:58:11.815397+02:00", "EventTime": "2023-10-30T13:58:11.815409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["Cvh7H94BMCD2ZZRki2"]} -{"Format": "IDEA0", "ID": "58f71bed-1ade-4d2a-bdc6-9da8c1648d3d", "DetectTime": "2023-10-30T13:58:11.861504+02:00", "EventTime": "2023-10-30T13:58:11.861516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["Cnou844kEBMYIdClRf"]} -{"Format": "Json", "ID": "58f71bed-1ade-4d2a-bdc6-9da8c1648d3d", "DetectTime": "2023-10-30T13:58:11.861504+02:00", "EventTime": "2023-10-30T13:58:11.861516+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:15:55.495215+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:11.931726)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ec153125-7401-4eef-81c4-5066797a521e", "DetectTime": "2023-10-30T13:58:11.937440+02:00", "EventTime": "2023-10-30T13:58:11.937462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CAXgDt2fLq2BC7AKVa"]} -{"Format": "IDEA0", "ID": "e83e56f2-5cac-4234-a931-7041fd936f96", "DetectTime": "2023-10-30T13:58:11.977011+02:00", "EventTime": "2023-10-30T13:58:11.977025+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXtjz332aeRWh8Vjva"]} -{"Format": "IDEA0", "ID": "ea861ac6-0c14-46b3-8945-b80919f64bc9", "DetectTime": "2023-10-30T13:58:11.991953+02:00", "EventTime": "2023-10-30T13:58:11.991971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CoxGko1gtuoNpJJzag"]} -{"Format": "IDEA0", "ID": "da0c7f92-89e5-4db1-a015-b44d3a54c920", "DetectTime": "2023-10-30T13:58:12.029378+02:00", "EventTime": "2023-10-30T13:58:12.029390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CjcAj34NPo19mJepAi"]} -{"Format": "IDEA0", "ID": "fa85564f-b460-4ff6-ba46-db99a0d231d4", "DetectTime": "2023-10-30T13:58:12.071206+02:00", "EventTime": "2023-10-30T13:58:12.071224+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cc34jN1ifBMcVM4kL9"]} -{"Format": "IDEA0", "ID": "18b9e0f1-c2c7-414d-b9a9-aa183d3dcfd2", "DetectTime": "2023-10-30T13:58:12.086888+02:00", "EventTime": "2023-10-30T13:58:12.086904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CK8qUe1J98cAGkqzI"]} -{"Format": "IDEA0", "ID": "b6431226-6d04-4b8a-8a35-cb68e14ce0ae", "DetectTime": "2023-10-30T13:58:12.130674+02:00", "EventTime": "2023-10-30T13:58:12.130694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["Cnf44a4KNS9wRODNWe"]} -{"Format": "IDEA0", "ID": "76a26508-6c08-4a80-87cb-633c7e7dd773", "DetectTime": "2023-10-30T13:58:12.172494+02:00", "EventTime": "2023-10-30T13:58:12.172510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CUfo0v2PKPjzundEWk"]} -{"Format": "IDEA0", "ID": "f0c61bfa-c685-4f52-b0c0-b458bba8e076", "DetectTime": "2023-10-30T13:58:12.221877+02:00", "EventTime": "2023-10-30T13:58:12.221893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C8UdESZl8C3P75qFi"]} -{"Format": "IDEA0", "ID": "8f1fb034-f4c3-4558-9aa0-74ae012338bf", "DetectTime": "2023-10-30T13:58:12.260003+02:00", "EventTime": "2023-10-30T13:58:12.260019+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr8G7a2o1EjB2vT5Cd"]} -{"Format": "IDEA0", "ID": "e24659cd-6023-431b-8c23-c5f87f6a330b", "DetectTime": "2023-10-30T13:58:12.276293+02:00", "EventTime": "2023-10-30T13:58:12.276307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["C1tu8K3AuiQMbFdKE2"]} -{"Format": "Json", "ID": "e24659cd-6023-431b-8c23-c5f87f6a330b", "DetectTime": "2023-10-30T13:58:12.276293+02:00", "EventTime": "2023-10-30T13:58:12.276307+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:15:58.048461+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:12.337485)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed1f4ae9-c38d-475e-a607-f4fc5e5814c5", "DetectTime": "2023-10-30T13:58:12.343644+02:00", "EventTime": "2023-10-30T13:58:12.343670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CUos7p4VnWuMUfVHmd"]} -{"Format": "IDEA0", "ID": "c175339b-761a-4ad3-9197-126d76b18fe7", "DetectTime": "2023-10-30T13:58:12.381884+02:00", "EventTime": "2023-10-30T13:58:12.381902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C52FzJ3myggfophiAa", "C0VtOi49L5lrwpS2zc", "CFdL672Wcwp0uivwO", "Cc34jN1ifBMcVM4kL9"]} -{"Format": "IDEA0", "ID": "02ca54aa-7bb2-4334-bd87-233404feb444", "DetectTime": "2023-10-30T13:58:12.398268+02:00", "EventTime": "2023-10-30T13:58:12.398284+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C52FzJ3myggfophiAa"]} -{"Format": "IDEA0", "ID": "b3e483eb-3e3e-4b14-b8fd-86480bcf4b29", "DetectTime": "2023-10-30T13:58:12.413384+02:00", "EventTime": "2023-10-30T13:58:12.413400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["Cm4BEw3Ar2HMQjVVDe"]} -{"Format": "IDEA0", "ID": "5637248e-389f-4bc4-af15-79ec5444f622", "DetectTime": "2023-10-30T13:58:12.456838+02:00", "EventTime": "2023-10-30T13:58:12.456861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["C7YExL3I0DQXqcKH4f"]} -{"Format": "IDEA0", "ID": "5aef7cd4-d56e-4e12-bb85-fba9121119ee", "DetectTime": "2023-10-30T13:58:12.497342+02:00", "EventTime": "2023-10-30T13:58:12.497357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CKrVPG25UYvQD5Rkck"]} -{"Format": "IDEA0", "ID": "e3a62ed1-8133-4d43-8584-9d1ff733ab57", "DetectTime": "2023-10-30T13:58:12.530993+02:00", "EventTime": "2023-10-30T13:58:12.531014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CYY38H3zYEheoPdQR1"]} -{"Format": "IDEA0", "ID": "bc109edb-87b4-41d0-b355-0ed34e81a132", "DetectTime": "2023-10-30T13:58:12.560941+02:00", "EventTime": "2023-10-30T13:58:12.560953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CPo8Uo3lgQSrZnasq2"]} -{"Format": "IDEA0", "ID": "d388048d-c132-4f12-afbd-24675bf7449c", "DetectTime": "2023-10-30T13:58:12.594394+02:00", "EventTime": "2023-10-30T13:58:12.594409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["CocUflJ8pXnqXzRS4"]} -{"Format": "IDEA0", "ID": "e07a9ad8-3b2d-4be9-b22b-81be551d972c", "DetectTime": "2023-10-30T13:58:12.626303+02:00", "EventTime": "2023-10-30T13:58:12.626318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["CeCC2o1cchY9KDYJuk"]} -{"Format": "Json", "ID": "e07a9ad8-3b2d-4be9-b22b-81be551d972c", "DetectTime": "2023-10-30T13:58:12.626303+02:00", "EventTime": "2023-10-30T13:58:12.626318+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:17:12.897845+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:12.702683)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7bb9e0e0-f0ae-484f-b2c8-a25ecfcaae91", "DetectTime": "2023-10-30T13:58:12.717491+02:00", "EventTime": "2023-10-30T13:58:12.717507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. ", "ContentType": "text/plain"}], "uids": ["CvYUgU3gZ4kxiNARPb"]} -{"Format": "IDEA0", "ID": "c29ac9c7-aafe-4e5f-92c0-4633e17ebe28", "DetectTime": "2023-10-30T13:58:12.762599+02:00", "EventTime": "2023-10-30T13:58:12.762618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["C1qkAZ2wi5d6p7qChh"]} -{"Format": "IDEA0", "ID": "5faac4a5-39f6-49da-b693-6cce3bd6d9fe", "DetectTime": "2023-10-30T13:58:12.835737+02:00", "EventTime": "2023-10-30T13:58:12.835759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBMaR13sVEHf86v2n2"]} -{"Format": "IDEA0", "ID": "8542b334-3a9f-4008-bb96-739c8ecdc802", "DetectTime": "2023-10-30T13:58:12.889788+02:00", "EventTime": "2023-10-30T13:58:12.889815+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Clthir3Bm73bBjMv83"]} -{"Format": "IDEA0", "ID": "58ba108e-c5c8-4a3e-a624-daa9969ae1ea", "DetectTime": "2023-10-30T13:58:12.914405+02:00", "EventTime": "2023-10-30T13:58:12.914422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CuR2NvRWusgDhEfU7"]} -{"Format": "IDEA0", "ID": "97b691ab-fde9-4226-b032-bbdb663d95cd", "DetectTime": "2023-10-30T13:58:12.981131+02:00", "EventTime": "2023-10-30T13:58:12.981152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CB0aNy4YsJev4Vp19d"]} -{"Format": "IDEA0", "ID": "db7b4d9a-e5b1-424a-accb-cbce55064dad", "DetectTime": "2023-10-30T13:58:13.031509+02:00", "EventTime": "2023-10-30T13:58:13.031529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C4DmDgtwq0QEbxxG"]} -{"Format": "IDEA0", "ID": "50329aa6-68ae-4b84-918e-af25d38c4c4c", "DetectTime": "2023-10-30T13:58:13.111473+02:00", "EventTime": "2023-10-30T13:58:13.111500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["Cq5HgY2uLaJ2FuXHO4"]} -{"Format": "IDEA0", "ID": "f3a80a2a-b00c-4678-8d44-4ded0ed76a94", "DetectTime": "2023-10-30T13:58:13.186066+02:00", "EventTime": "2023-10-30T13:58:13.186085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CKmfGjNZfs2XfURh7"]} -{"Format": "IDEA0", "ID": "445ebe61-329a-48ab-98e0-fcd0998e66a2", "DetectTime": "2023-10-30T13:58:13.225026+02:00", "EventTime": "2023-10-30T13:58:13.225051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CP6fURuGFoOWEQyFg"]} -{"Format": "Json", "ID": "445ebe61-329a-48ab-98e0-fcd0998e66a2", "DetectTime": "2023-10-30T13:58:13.225026+02:00", "EventTime": "2023-10-30T13:58:13.225051+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:49:18.748554+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:13.282612)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6fbe26fc-a3a2-49de-b1ff-6f7d2c527961", "DetectTime": "2023-10-30T13:58:13.288556+02:00", "EventTime": "2023-10-30T13:58:13.288568+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdpvoN2aW5VVms7M2k"]} -{"Format": "IDEA0", "ID": "90a08ab9-fee1-4e27-ba75-c084e07f301d", "DetectTime": "2023-10-30T13:58:13.303234+02:00", "EventTime": "2023-10-30T13:58:13.303244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CMoSS63JeDkLhkmtd8"]} -{"Format": "IDEA0", "ID": "1a32a782-aeac-4934-b269-0fa8a32167b3", "DetectTime": "2023-10-30T13:58:13.330951+02:00", "EventTime": "2023-10-30T13:58:13.330968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["Cof63I3AeF3IEdTf18"]} -{"Format": "IDEA0", "ID": "0f279e48-e9a5-4d6b-9da5-bad571a23820", "DetectTime": "2023-10-30T13:58:13.361749+02:00", "EventTime": "2023-10-30T13:58:13.361764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CKqrxo27wSG6e9P8We"]} -{"Format": "IDEA0", "ID": "7eb3620e-66cf-4716-be8d-212a3b08078a", "DetectTime": "2023-10-30T13:58:13.387974+02:00", "EventTime": "2023-10-30T13:58:13.387992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CqU6Xe3XnzOmJhClDh"]} -{"Format": "IDEA0", "ID": "924ea914-bd14-46b9-b448-cda2ed37dc70", "DetectTime": "2023-10-30T13:58:13.412937+02:00", "EventTime": "2023-10-30T13:58:13.412949+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbnDY936zQy8nr6ZPe"]} -{"Format": "IDEA0", "ID": "153a70d1-643f-4277-b80d-9c8cd78bda9b", "DetectTime": "2023-10-30T13:58:13.422184+02:00", "EventTime": "2023-10-30T13:58:13.422201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CUwhtl3MC1FQGTyfg"]} -{"Format": "IDEA0", "ID": "3749e342-19ed-4c69-8029-601e85976ea5", "DetectTime": "2023-10-30T13:58:13.452364+02:00", "EventTime": "2023-10-30T13:58:13.452375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CnShgc1ZQz1Tdy6bgh"]} -{"Format": "IDEA0", "ID": "d30468c0-a3e6-4b26-8e9e-a26df75af50b", "DetectTime": "2023-10-30T13:58:13.480747+02:00", "EventTime": "2023-10-30T13:58:13.480768+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CApVbl2oXm8ywYIOZf"]} -{"Format": "IDEA0", "ID": "b23ec90e-35bc-4d79-aa07-88378886f668", "DetectTime": "2023-10-30T13:58:13.491175+02:00", "EventTime": "2023-10-30T13:58:13.491186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CiISWW2jL5kpSw0qg2"]} -{"Format": "IDEA0", "ID": "cf20ddcb-9ef8-4ad0-8840-fcabf08b048e", "DetectTime": "2023-10-30T13:58:13.518213+02:00", "EventTime": "2023-10-30T13:58:13.518225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CTmoLU1B7dIhgmJxqh"]} -{"Format": "Json", "ID": "cf20ddcb-9ef8-4ad0-8840-fcabf08b048e", "DetectTime": "2023-10-30T13:58:13.518213+02:00", "EventTime": "2023-10-30T13:58:13.518225+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:49:43.868459+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:13.565272)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c5a2720e-171d-4037-8f06-9c223bf8183d", "DetectTime": "2023-10-30T13:58:13.570399+02:00", "EventTime": "2023-10-30T13:58:13.570416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsLxmZ39TwOV5NDzA4"]} -{"Format": "IDEA0", "ID": "4e09adb3-9f7b-426d-a010-a543898aa0da", "DetectTime": "2023-10-30T13:58:13.581048+02:00", "EventTime": "2023-10-30T13:58:13.581063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CSxpyU04NThCYNzWg"]} -{"Format": "IDEA0", "ID": "39ac7399-092d-4509-b5cb-194afa31867b", "DetectTime": "2023-10-30T13:58:13.606746+02:00", "EventTime": "2023-10-30T13:58:13.606758+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9mWg11O8DB6vhiv1a"]} -{"Format": "IDEA0", "ID": "e5c38584-49ba-4054-968d-74148c6fd467", "DetectTime": "2023-10-30T13:58:13.617080+02:00", "EventTime": "2023-10-30T13:58:13.617093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["ClC5MOOiBG7e3NOib"]} -{"Format": "IDEA0", "ID": "1ca45223-3884-49eb-bcef-2aaac9a27392", "DetectTime": "2023-10-30T13:58:13.641385+02:00", "EventTime": "2023-10-30T13:58:13.641402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CsLxmZ39TwOV5NDzA4", "Clthir3Bm73bBjMv83", "CYsDhW22K84gSHKqxi", "CbnDY936zQy8nr6ZPe"]} -{"Format": "IDEA0", "ID": "adea5bb6-002a-4062-a88e-3c0bf4641b3f", "DetectTime": "2023-10-30T13:58:13.652297+02:00", "EventTime": "2023-10-30T13:58:13.652316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYsDhW22K84gSHKqxi"]} -{"Format": "IDEA0", "ID": "92fa9809-53a6-4ae1-8e03-be3a37bed2e9", "DetectTime": "2023-10-30T13:58:13.666024+02:00", "EventTime": "2023-10-30T13:58:13.666042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C5Q3ru1YmjwiFFuVh"]} -{"Format": "IDEA0", "ID": "cc26bf3a-9109-4e3d-ad41-26ca868413bb", "DetectTime": "2023-10-30T13:58:13.690859+02:00", "EventTime": "2023-10-30T13:58:13.690875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CUdWU11iuTdAVHZLc6"]} -{"Format": "IDEA0", "ID": "14be9435-900c-4de9-a7ce-15f8e9d9835f", "DetectTime": "2023-10-30T13:58:13.716036+02:00", "EventTime": "2023-10-30T13:58:13.716055+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0RBU9cu9wcSQZKMa"]} -{"Format": "IDEA0", "ID": "12b4055c-b656-4fdc-8f57-23912eef839f", "DetectTime": "2023-10-30T13:58:13.727517+02:00", "EventTime": "2023-10-30T13:58:13.727534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CWfBEP3dnuNuyFBiDg"]} -{"Format": "IDEA0", "ID": "b9129415-84aa-45ac-a760-a7b4e489cf2e", "DetectTime": "2023-10-30T13:58:13.753124+02:00", "EventTime": "2023-10-30T13:58:13.753135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27744], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. ", "ContentType": "text/plain"}], "uids": ["CmaI8Q2KPz03rMqvsl"]} -{"Format": "IDEA0", "ID": "bc15b3d7-7378-470c-a8ea-21db08726188", "DetectTime": "2023-10-30T13:58:13.778564+02:00", "EventTime": "2023-10-30T13:58:13.778583+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjZQUN1d8XQwepQ91i"]} -{"Format": "IDEA0", "ID": "8935f8db-38f1-42d7-b8ea-318fe6223b1b", "DetectTime": "2023-10-30T13:58:13.787962+02:00", "EventTime": "2023-10-30T13:58:13.787974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CPXjVN29GuPOvVtgCi"]} -{"Format": "IDEA0", "ID": "3a672a87-0d4d-4afb-af4f-9008c6d4051e", "DetectTime": "2023-10-30T13:58:13.809377+02:00", "EventTime": "2023-10-30T13:58:13.809396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["C7vCKw2Optdgnxec4"]} -{"Format": "Json", "ID": "3a672a87-0d4d-4afb-af4f-9008c6d4051e", "DetectTime": "2023-10-30T13:58:13.809377+02:00", "EventTime": "2023-10-30T13:58:13.809396+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T12:50:42.231253+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2023/10/30 13:58:13.858926)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "96d533d7-7aa6-43e3-b0cb-833cf4c26b07", "DetectTime": "2023-10-30T13:58:13.866571+02:00", "EventTime": "2023-10-30T13:58:13.866588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CvnSRj3onluWLVl1jf"]} -{"Format": "IDEA0", "ID": "ba8c026c-97fe-4f7c-b1cc-c4e33dffe068", "DetectTime": "2023-10-30T13:58:13.890251+02:00", "EventTime": "2023-10-30T13:58:13.890262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8696], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. ", "ContentType": "text/plain"}], "uids": ["Cxsnh51vmM5rx4X3Nl"]} -{"Format": "IDEA0", "ID": "22931be3-57d6-491c-9f3d-a57a0269aa2c", "DetectTime": "2023-10-30T13:58:13.912278+02:00", "EventTime": "2023-10-30T13:58:13.912294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. ", "ContentType": "text/plain"}], "uids": ["CRuydy2dLZFCzepbJ8"]} -{"Format": "IDEA0", "ID": "3e08d9d4-16b3-41e7-8035-27d06e327a11", "DetectTime": "2023-10-30T13:58:13.930881+02:00", "EventTime": "2023-10-30T13:58:13.930893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["C1QD9s1H1OvRjFjA4h"]} -{"Format": "IDEA0", "ID": "6d9f5744-6b4b-4bae-8357-1de53047ffd3", "DetectTime": "2023-10-30T13:58:13.971772+02:00", "EventTime": "2023-10-30T13:58:13.971782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CsIa5j31QAGw6dpqQ4"]} -{"Format": "IDEA0", "ID": "d1ea050a-111f-481b-a07d-afd3871b4e13", "DetectTime": "2023-10-30T13:58:14.015970+02:00", "EventTime": "2023-10-30T13:58:14.015989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["Ck20691dfbjUgXysSf"]} -{"Format": "IDEA0", "ID": "18555053-c9e4-4f5b-a75a-b0be93147a44", "DetectTime": "2023-10-30T13:58:14.056738+02:00", "EventTime": "2023-10-30T13:58:14.056754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cvsqwy1mAwmD2BCw6i"]} -{"Format": "IDEA0", "ID": "dbe664cf-5bc2-4621-bb8c-8787ae06c1a1", "DetectTime": "2023-10-30T13:58:14.100344+02:00", "EventTime": "2023-10-30T13:58:14.100360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CyW7NF1eN5bc6WQY1h"]} -{"Format": "IDEA0", "ID": "e969bfac-3722-44c7-8e13-604e4d773854", "DetectTime": "2023-10-30T13:58:14.145282+02:00", "EventTime": "2023-10-30T13:58:14.145294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["C8maUjXBGnChnFmN9"]} -{"Format": "Json", "ID": "e969bfac-3722-44c7-8e13-604e4d773854", "DetectTime": "2023-10-30T13:58:14.145282+02:00", "EventTime": "2023-10-30T13:58:14.145294+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:22:56.148332+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:14.248747)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "79451c64-f831-4f1c-9934-83fecc75c515", "DetectTime": "2023-10-30T13:58:14.254351+02:00", "EventTime": "2023-10-30T13:58:14.254371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CZ0h6N3LNXEwekhSua"]} -{"Format": "IDEA0", "ID": "01106209-8a48-4466-8ecb-414ab77e7524", "DetectTime": "2023-10-30T13:58:14.300845+02:00", "EventTime": "2023-10-30T13:58:14.300865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CNwRI5aEaK2PHwIt2"]} -{"Format": "IDEA0", "ID": "b1f9e18d-a626-40ec-aafb-8796e56623cd", "DetectTime": "2023-10-30T13:58:14.349072+02:00", "EventTime": "2023-10-30T13:58:14.349091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CIstOQ3JDXDuKp60gk"]} -{"Format": "IDEA0", "ID": "f02ac030-2a1f-4699-8941-8f1c985087a5", "DetectTime": "2023-10-30T13:58:14.391566+02:00", "EventTime": "2023-10-30T13:58:14.391580+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJ5yat2vq3oAMkxYM5"]} -{"Format": "IDEA0", "ID": "6f4093a7-fce8-47bb-a91d-0328ced5445c", "DetectTime": "2023-10-30T13:58:14.403528+02:00", "EventTime": "2023-10-30T13:58:14.403544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CEftMf1wqRqFAlmBmc"]} -{"Format": "IDEA0", "ID": "f848c83c-23b4-49fa-85a5-b47d097a70d3", "DetectTime": "2023-10-30T13:58:14.447627+02:00", "EventTime": "2023-10-30T13:58:14.447647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CTeMlNKvNsoWLnHP8"]} -{"Format": "IDEA0", "ID": "1498fa3d-bd75-4c1e-8df7-1064423515f0", "DetectTime": "2023-10-30T13:58:14.491303+02:00", "EventTime": "2023-10-30T13:58:14.491322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CGSeOs13lmYnpeC7Ui"]} -{"Format": "IDEA0", "ID": "db756159-f206-41dc-b8ba-c0f676491a61", "DetectTime": "2023-10-30T13:58:14.530342+02:00", "EventTime": "2023-10-30T13:58:14.530362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CWfQ7A4KpAsFeiIJZ4"]} -{"Format": "IDEA0", "ID": "82d58116-fb49-4115-affc-3306bfac70a6", "DetectTime": "2023-10-30T13:58:14.575483+02:00", "EventTime": "2023-10-30T13:58:14.575503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CZmkX82IMC1NzeDNs2"]} -{"Format": "Json", "ID": "82d58116-fb49-4115-affc-3306bfac70a6", "DetectTime": "2023-10-30T13:58:14.575483+02:00", "EventTime": "2023-10-30T13:58:14.575503+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:23:04.464837+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:14.646648)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b63f397-23bb-47fa-8bc3-d4eeb547c3e1", "DetectTime": "2023-10-30T13:58:14.652558+02:00", "EventTime": "2023-10-30T13:58:14.652578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["C20vi12TJoBAZLGWl1"]} -{"Format": "IDEA0", "ID": "9a3aec41-68ae-4cd1-ba3f-1a62042938ab", "DetectTime": "2023-10-30T13:58:14.692163+02:00", "EventTime": "2023-10-30T13:58:14.692184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpCdWD3iYQ5pl3xtW1"]} -{"Format": "IDEA0", "ID": "84aae436-d1ff-4186-a6a2-0f23f86f768b", "DetectTime": "2023-10-30T13:58:14.704069+02:00", "EventTime": "2023-10-30T13:58:14.704085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CBVRY53UhwKxVOdprd"]} -{"Format": "IDEA0", "ID": "d584504f-222a-4720-9897-76884e07feee", "DetectTime": "2023-10-30T13:58:14.744945+02:00", "EventTime": "2023-10-30T13:58:14.744965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CwYemH2yXryAjvynC1"]} -{"Format": "IDEA0", "ID": "8a0ccb44-d12c-4fc4-a5e8-ce548852254f", "DetectTime": "2023-10-30T13:58:14.782743+02:00", "EventTime": "2023-10-30T13:58:14.782759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYUhw42dObYG65AtKe"]} -{"Format": "IDEA0", "ID": "1a6120eb-b64a-4c5f-8ef8-98c984db2de7", "DetectTime": "2023-10-30T13:58:14.793795+02:00", "EventTime": "2023-10-30T13:58:14.793806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CgfWB74xkkEG6ib2Ii"]} -{"Format": "IDEA0", "ID": "c4b2b14b-cefb-4d02-bec7-5c2c3dcd2d65", "DetectTime": "2023-10-30T13:58:14.830016+02:00", "EventTime": "2023-10-30T13:58:14.830031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CH1BkK3Hd1oyjCMEL4"]} -{"Format": "IDEA0", "ID": "2dbba8fc-1849-4def-8451-b33a415c23cb", "DetectTime": "2023-10-30T13:58:14.866707+02:00", "EventTime": "2023-10-30T13:58:14.866729+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXUAe1OiO6mGCW8M5"]} -{"Format": "IDEA0", "ID": "341cac64-1b0b-411e-8338-a76203d6f81f", "DetectTime": "2023-10-30T13:58:14.879665+02:00", "EventTime": "2023-10-30T13:58:14.879685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Chhl3v2hK2ZZVgIBm6"]} -{"Format": "IDEA0", "ID": "4a0851a1-e0ad-4d64-9a46-28f86c5c0736", "DetectTime": "2023-10-30T13:58:14.928231+02:00", "EventTime": "2023-10-30T13:58:14.928244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["Cqbpr441wdD1ULJk7h"]} -{"Format": "IDEA0", "ID": "6805cd75-3de1-45a7-8df1-705af3a6ed27", "DetectTime": "2023-10-30T13:58:14.963237+02:00", "EventTime": "2023-10-30T13:58:14.963257+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2WnBB1Hozu9IMG2Q1"]} -{"Format": "IDEA0", "ID": "98ff0b1d-739c-431a-8ca5-5680a6e5a984", "DetectTime": "2023-10-30T13:58:14.976121+02:00", "EventTime": "2023-10-30T13:58:14.976133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CXUAe1OiO6mGCW8M5", "CjZQUN1d8XQwepQ91i", "CpCdWD3iYQ5pl3xtW1", "CKlRCe2WoXgQkdpK4"]} -{"Format": "IDEA0", "ID": "7ba56358-476a-4f36-bcd1-01ecb494f3e0", "DetectTime": "2023-10-30T13:58:14.986607+02:00", "EventTime": "2023-10-30T13:58:14.986624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CuhjtO1FfGIBWdAwl9"]} -{"Format": "Json", "ID": "7ba56358-476a-4f36-bcd1-01ecb494f3e0", "DetectTime": "2023-10-30T13:58:14.986607+02:00", "EventTime": "2023-10-30T13:58:14.986624+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:23:42.766225+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:15.051429)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "88dffeb8-385a-40e2-9760-e019796e6b5b", "DetectTime": "2023-10-30T13:58:15.056917+02:00", "EventTime": "2023-10-30T13:58:15.056937+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKlRCe2WoXgQkdpK4"]} -{"Format": "IDEA0", "ID": "1111bf86-4592-45ae-8fd9-420d4141b9ed", "DetectTime": "2023-10-30T13:58:15.067460+02:00", "EventTime": "2023-10-30T13:58:15.067472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CigpDsW8y2CbtGfs9"]} -{"Format": "IDEA0", "ID": "e451b576-5999-4a1c-9f46-950912109305", "DetectTime": "2023-10-30T13:58:15.179249+02:00", "EventTime": "2023-10-30T13:58:15.179268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CvEuMx2lb0HTAeqDQ7"]} -{"Format": "IDEA0", "ID": "ecf7b34d-f352-4111-9578-fa66bfd8c21a", "DetectTime": "2023-10-30T13:58:15.219369+02:00", "EventTime": "2023-10-30T13:58:15.219386+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSlaLe3h05Yk7ZLxk5"]} -{"Format": "IDEA0", "ID": "be061549-dd13-4f34-88a1-2f90fed7b9db", "DetectTime": "2023-10-30T13:58:15.229788+02:00", "EventTime": "2023-10-30T13:58:15.229802+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeUe7M16ScrJ82tov4"]} -{"Format": "IDEA0", "ID": "6fab844d-171a-4e73-abb5-6eb4af0e9982", "DetectTime": "2023-10-30T13:58:15.242956+02:00", "EventTime": "2023-10-30T13:58:15.242969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Cd8C7uJbbZ0wpf6jl"]} -{"Format": "IDEA0", "ID": "a85f52ad-f624-4d8d-965a-b67d660fcd9c", "DetectTime": "2023-10-30T13:58:15.277255+02:00", "EventTime": "2023-10-30T13:58:15.277267+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQtxkP2O9KAGEw28Tl"]} -{"Format": "IDEA0", "ID": "2152ddab-1524-4160-8aaa-b53ac8c778d6", "DetectTime": "2023-10-30T13:58:15.288495+02:00", "EventTime": "2023-10-30T13:58:15.288513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6nNK32oM8QNVfjYye"]} -{"Format": "IDEA0", "ID": "ee41434b-0227-4cc2-8867-45613d7b32b3", "DetectTime": "2023-10-30T13:58:15.300227+02:00", "EventTime": "2023-10-30T13:58:15.300248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CZpmh4161Apo7SQyoi"]} -{"Format": "IDEA0", "ID": "26a7217e-ac3c-40db-8155-15d1a6f9c40e", "DetectTime": "2023-10-30T13:58:15.343755+02:00", "EventTime": "2023-10-30T13:58:15.343776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CqiuN0255Ch5KYQpyi"]} -{"Format": "IDEA0", "ID": "d7a5fcde-073a-46c2-858c-80da32844bcb", "DetectTime": "2023-10-30T13:58:15.384436+02:00", "EventTime": "2023-10-30T13:58:15.384448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CGCHD52wChtDp2NUY5"]} -{"Format": "IDEA0", "ID": "b8e77df0-e71f-4f20-aaf7-bb88fde8b2f1", "DetectTime": "2023-10-30T13:58:15.418482+02:00", "EventTime": "2023-10-30T13:58:15.418497+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMglAc4aaI358bTHxa"]} -{"Format": "IDEA0", "ID": "9414086b-c67e-4f50-adae-79352c7e41f9", "DetectTime": "2023-10-30T13:58:15.429181+02:00", "EventTime": "2023-10-30T13:58:15.429212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CU2QZk29OOcdZ00Ph"]} -{"Format": "IDEA0", "ID": "b8caf6b1-024c-409e-bd3b-b96f849b63e6", "DetectTime": "2023-10-30T13:58:15.468577+02:00", "EventTime": "2023-10-30T13:58:15.468593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["CFAnja1GZVKC6ywfJj"]} -{"Format": "Json", "ID": "b8caf6b1-024c-409e-bd3b-b96f849b63e6", "DetectTime": "2023-10-30T13:58:15.468577+02:00", "EventTime": "2023-10-30T13:58:15.468593+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:55:50.393859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:15.528953)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a4022ed-b7ad-4dc4-b18d-22c69e9c4155", "DetectTime": "2023-10-30T13:58:15.534257+02:00", "EventTime": "2023-10-30T13:58:15.534275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24382], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CnPHJ01V0Muo9sQoW4"]} -{"Format": "IDEA0", "ID": "5f06e0c4-8cbf-4bfc-9e05-74468a65875a", "DetectTime": "2023-10-30T13:58:15.569966+02:00", "EventTime": "2023-10-30T13:58:15.569988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CP6d213H1D5mRMbvwk"]} -{"Format": "IDEA0", "ID": "fd84f0e0-6024-4d8a-96bd-8c1ab5fe8290", "DetectTime": "2023-10-30T13:58:15.581396+02:00", "EventTime": "2023-10-30T13:58:15.581418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["Cl9iYc3mwbPTCImZS6"]} -{"Format": "IDEA0", "ID": "1380a058-47e5-470e-b8c9-271619a3702c", "DetectTime": "2023-10-30T13:58:15.616785+02:00", "EventTime": "2023-10-30T13:58:15.616796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C7IuzPWETsKLKUbwk"]} -{"Format": "IDEA0", "ID": "09102a09-25f6-4b61-be4b-857d317bf810", "DetectTime": "2023-10-30T13:58:15.648839+02:00", "EventTime": "2023-10-30T13:58:15.648856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1002], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CwWHUX1GB47YpDZvlk"]} -{"Format": "IDEA0", "ID": "cd29663f-5901-4657-9006-fb795225778d", "DetectTime": "2023-10-30T13:58:15.683762+02:00", "EventTime": "2023-10-30T13:58:15.683778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CBuw494O6A2CHLn8Jj"]} -{"Format": "IDEA0", "ID": "3d3c570e-2b06-4b09-82e7-6353a6626be4", "DetectTime": "2023-10-30T13:58:15.719214+02:00", "EventTime": "2023-10-30T13:58:15.719225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6474], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CniLPARtBjhvgXYsa"]} -{"Format": "IDEA0", "ID": "bd3007d9-336c-448d-a54b-d764cc51361d", "DetectTime": "2023-10-30T13:58:15.754592+02:00", "EventTime": "2023-10-30T13:58:15.754613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CeKna52tHLEYssHTYc"]} -{"Format": "IDEA0", "ID": "46ee4dad-526d-4987-9200-aa7b7aa05b4f", "DetectTime": "2023-10-30T13:58:15.791451+02:00", "EventTime": "2023-10-30T13:58:15.791467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CLDcpP992Dc1DJ5G8"]} -{"Format": "Json", "ID": "46ee4dad-526d-4987-9200-aa7b7aa05b4f", "DetectTime": "2023-10-30T13:58:15.791451+02:00", "EventTime": "2023-10-30T13:58:15.791467+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:56:11.051844+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:15.847085)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e651a3b3-2c62-4875-809c-e0d407a2725f", "DetectTime": "2023-10-30T13:58:15.852559+02:00", "EventTime": "2023-10-30T13:58:15.852575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C4JAnr3OWyNb86J0el"]} -{"Format": "IDEA0", "ID": "a8d59a83-a89e-451b-a02a-03738ab64c51", "DetectTime": "2023-10-30T13:58:15.889225+02:00", "EventTime": "2023-10-30T13:58:15.889242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CltnzC3fTJ5ueNa7R4"]} -{"Format": "IDEA0", "ID": "f36aedf2-0ebe-48b2-899f-0837b6bccfb6", "DetectTime": "2023-10-30T13:58:15.925193+02:00", "EventTime": "2023-10-30T13:58:15.925209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CmCMHS3hngQI2IMQDl"]} -{"Format": "IDEA0", "ID": "a63ed0d0-4942-4e11-8d75-ce8f5ba19205", "DetectTime": "2023-10-30T13:58:15.955667+02:00", "EventTime": "2023-10-30T13:58:15.955684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CwXQDC1nzMeNCUaFf4"]} -{"Format": "IDEA0", "ID": "754045fa-e982-49c6-831d-1d026e042c2f", "DetectTime": "2023-10-30T13:58:15.991043+02:00", "EventTime": "2023-10-30T13:58:15.991061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CD2fs34ibtKZBP8qJa"]} -{"Format": "IDEA0", "ID": "debbf2c3-24aa-47ac-bfe0-af1796807b24", "DetectTime": "2023-10-30T13:58:16.024689+02:00", "EventTime": "2023-10-30T13:58:16.024704+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAzTes2XR4gkk1DbV4"]} -{"Format": "IDEA0", "ID": "815e7be7-4194-4166-ab48-2165624dd6a6", "DetectTime": "2023-10-30T13:58:16.036004+02:00", "EventTime": "2023-10-30T13:58:16.036018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CXJuyo4Rct2bmgBLyk"]} -{"Format": "IDEA0", "ID": "6f293e86-7c8b-4f60-b312-c769a879e3a1", "DetectTime": "2023-10-30T13:58:16.069128+02:00", "EventTime": "2023-10-30T13:58:16.069144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CAWpnuK05xKBpswO6"]} -{"Format": "IDEA0", "ID": "080fb9ec-e205-483f-94ff-5474b0fb1800", "DetectTime": "2023-10-30T13:58:16.103227+02:00", "EventTime": "2023-10-30T13:58:16.103254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. ", "ContentType": "text/plain"}], "uids": ["CkSxow451x18MTg9Y"]} -{"Format": "Json", "ID": "080fb9ec-e205-483f-94ff-5474b0fb1800", "DetectTime": "2023-10-30T13:58:16.103227+02:00", "EventTime": "2023-10-30T13:58:16.103254+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17103], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:56:13.182649+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:16.159206)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0365b75f-500c-4953-9f31-55b728284ed0", "DetectTime": "2023-10-30T13:58:16.163804+02:00", "EventTime": "2023-10-30T13:58:16.163821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CXaPFE4SIUXDYqsXl7"]} -{"Format": "IDEA0", "ID": "d14702d6-a8e4-4247-a693-0d859a37c2f4", "DetectTime": "2023-10-30T13:58:16.201135+02:00", "EventTime": "2023-10-30T13:58:16.201155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1245], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. ", "ContentType": "text/plain"}], "uids": ["CHuw5d1pq6AQnnBFT8"]} -{"Format": "IDEA0", "ID": "24948592-1a17-4e5f-b42b-6774a6fb1eb4", "DetectTime": "2023-10-30T13:58:16.231646+02:00", "EventTime": "2023-10-30T13:58:16.231661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["C2mJvv4jSWOXJwL51l"]} -{"Format": "IDEA0", "ID": "1bdd7689-824c-4fdf-ba35-424e6c891e68", "DetectTime": "2023-10-30T13:58:16.261805+02:00", "EventTime": "2023-10-30T13:58:16.261820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. ", "ContentType": "text/plain"}], "uids": ["CfDR6k4GnLuqV4yvFf"]} -{"Format": "IDEA0", "ID": "0228d492-a7e4-4faa-a96b-78e70bc8a367", "DetectTime": "2023-10-30T13:58:16.296072+02:00", "EventTime": "2023-10-30T13:58:16.296088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CeUe7M16ScrJ82tov4", "CqK69M3BifXE1cZLv7", "C6nNK32oM8QNVfjYye", "CP6d213H1D5mRMbvwk"]} -{"Format": "IDEA0", "ID": "f822ff3c-d090-4479-8ace-c446aeeecf34", "DetectTime": "2023-10-30T13:58:16.312783+02:00", "EventTime": "2023-10-30T13:58:16.312800+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqK69M3BifXE1cZLv7"]} -{"Format": "IDEA0", "ID": "4520a63b-9f48-4d61-b4da-5d8803f3ecc2", "DetectTime": "2023-10-30T13:58:16.332612+02:00", "EventTime": "2023-10-30T13:58:16.332634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23450], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23450/UDP destination IP 94.64.232.130. ", "ContentType": "text/plain"}], "uids": ["CyK0w5WHpPASoyUcc"]} -{"Format": "IDEA0", "ID": "55917cef-d611-4664-9537-4e39050e7f9b", "DetectTime": "2023-10-30T13:58:16.370531+02:00", "EventTime": "2023-10-30T13:58:16.370554+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSSTVk4CtzgGRVTQjc"]} -{"Format": "IDEA0", "ID": "0c0dd3c4-1b44-4c5e-8c2c-68473c0ebbf5", "DetectTime": "2023-10-30T13:58:16.389007+02:00", "EventTime": "2023-10-30T13:58:16.389022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. ", "ContentType": "text/plain"}], "uids": ["CXpvGm37vXQhmzBIFj"]} -{"Format": "IDEA0", "ID": "95888987-c49d-428f-af8d-bd330f54af62", "DetectTime": "2023-10-30T13:58:16.421191+02:00", "EventTime": "2023-10-30T13:58:16.421208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CPOfQPNDkAaM3U4El"]} -{"Format": "IDEA0", "ID": "88f6265c-abd1-4618-a152-7c29ea286a2a", "DetectTime": "2023-10-30T13:58:16.452040+02:00", "EventTime": "2023-10-30T13:58:16.452070+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWYESp326lTL77pSWe"]} -{"Format": "IDEA0", "ID": "f7c034b6-2c62-4d3c-b75b-ee4ec2914f27", "DetectTime": "2023-10-30T13:58:16.467365+02:00", "EventTime": "2023-10-30T13:58:16.467381+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbcIfG1XZnDx6kiVN2"]} -{"Format": "IDEA0", "ID": "e3ca34c2-64ef-431c-877d-6fa71c37ccb4", "DetectTime": "2023-10-30T13:58:16.484178+02:00", "EventTime": "2023-10-30T13:58:16.484189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["CoGl6f3WR8Olc7BGgj"]} -{"Format": "Json", "ID": "e3ca34c2-64ef-431c-877d-6fa71c37ccb4", "DetectTime": "2023-10-30T13:58:16.484178+02:00", "EventTime": "2023-10-30T13:58:16.484189+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:57:03.320800+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:16.542030)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4bc70155-1cfc-4ef0-97be-da59a91f7fdd", "DetectTime": "2023-10-30T13:58:16.546104+02:00", "EventTime": "2023-10-30T13:58:16.546114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26273], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. ", "ContentType": "text/plain"}], "uids": ["CBFNfS274jfM9bzNPj"]} -{"Format": "IDEA0", "ID": "e557294b-4729-4644-bc09-67d9d6b3cab8", "DetectTime": "2023-10-30T13:58:16.577911+02:00", "EventTime": "2023-10-30T13:58:16.577927+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzVOZPR6DeOOEo1K2"]} -{"Format": "IDEA0", "ID": "fce8c129-ee8d-4be3-9644-bf83dfad5a07", "DetectTime": "2023-10-30T13:58:16.594348+02:00", "EventTime": "2023-10-30T13:58:16.594367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5737], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5737/UDP destination IP 172.190.235.230. ", "ContentType": "text/plain"}], "uids": ["CirKHJ2CyrwKzLmXA4"]} -{"Format": "IDEA0", "ID": "e1f963cc-92a1-4308-b356-9566ea9748f1", "DetectTime": "2023-10-30T13:58:16.625800+02:00", "EventTime": "2023-10-30T13:58:16.625816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CgtG2511kFB7DLdDN9"]} -{"Format": "IDEA0", "ID": "aa080e0c-5530-43ae-8102-9163dbf59e07", "DetectTime": "2023-10-30T13:58:16.656435+02:00", "EventTime": "2023-10-30T13:58:16.656451+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CImHgg1ObLWeN6cBB"]} -{"Format": "IDEA0", "ID": "e2b659e9-aa17-42b7-ae51-563c382b3f80", "DetectTime": "2023-10-30T13:58:16.671793+02:00", "EventTime": "2023-10-30T13:58:16.671811+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1TZc92Q6Ml2KkvYje"]} -{"Format": "IDEA0", "ID": "310d1ff2-4b44-404e-a4b2-aad178634acc", "DetectTime": "2023-10-30T13:58:16.686662+02:00", "EventTime": "2023-10-30T13:58:16.686680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CPk2af1yqzMTinjRn8"]} -{"Format": "IDEA0", "ID": "141d5d78-a3fb-4471-88e9-539aa82429f8", "DetectTime": "2023-10-30T13:58:16.713853+02:00", "EventTime": "2023-10-30T13:58:16.713873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CTeQeE1bTir4qWr7Ff"]} -{"Format": "IDEA0", "ID": "d3eaa186-67e1-45d6-b800-43871365a3fa", "DetectTime": "2023-10-30T13:58:16.743632+02:00", "EventTime": "2023-10-30T13:58:16.743649+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9hiDMjoyA8bFBlJ4"]} -{"Format": "IDEA0", "ID": "bc9ef560-5ab8-4958-bc73-6f25d4339821", "DetectTime": "2023-10-30T13:58:16.762331+02:00", "EventTime": "2023-10-30T13:58:16.762346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CxuEFo3d1UlkSzHD4a"]} -{"Format": "IDEA0", "ID": "632a5e9f-44e6-47dc-8cb1-784af203aad9", "DetectTime": "2023-10-30T13:58:16.790483+02:00", "EventTime": "2023-10-30T13:58:16.790500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cr2TeW3vpAieVTmkJ", "CWYESp326lTL77pSWe", "C1TZc92Q6Ml2KkvYje", "CzVOZPR6DeOOEo1K2"]} -{"Format": "IDEA0", "ID": "5260b5b0-ff6d-459e-85c7-fe916ab25a71", "DetectTime": "2023-10-30T13:58:16.808419+02:00", "EventTime": "2023-10-30T13:58:16.808437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["C2X1cf1hbRkOXKK9Q"]} -{"Format": "IDEA0", "ID": "b3ed87f3-9864-4816-8915-0d848ea5a4d7", "DetectTime": "2023-10-30T13:58:16.843253+02:00", "EventTime": "2023-10-30T13:58:16.843272+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cr2TeW3vpAieVTmkJ"]} -{"Format": "IDEA0", "ID": "cc4897be-45c6-4c66-8584-1f08fb4236aa", "DetectTime": "2023-10-30T13:58:16.862160+02:00", "EventTime": "2023-10-30T13:58:16.862180+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWxucB1uBcFHSvfN01"]} -{"Format": "IDEA0", "ID": "0ac1b55f-f36d-452d-9ae5-72fd238cb79f", "DetectTime": "2023-10-30T13:58:16.879478+02:00", "EventTime": "2023-10-30T13:58:16.879495+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTweOE2zCmteCAHcm3"]} -{"Format": "IDEA0", "ID": "011e09af-e6f7-4645-9aae-8cb5a2fd1d75", "DetectTime": "2023-10-30T13:58:16.894967+02:00", "EventTime": "2023-10-30T13:58:16.894983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24606/UDP destination IP 2.90.50.124. ", "ContentType": "text/plain"}], "uids": ["CbKhBR2RGCiUP7L6xl"]} -{"Format": "Json", "ID": "011e09af-e6f7-4645-9aae-8cb5a2fd1d75", "DetectTime": "2023-10-30T13:58:16.894967+02:00", "EventTime": "2023-10-30T13:58:16.894983+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24606], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T13:59:04.224983+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2023/10/30 13:58:16.942523)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd3b332b-2f24-4285-a5c4-b70d30f85303", "DetectTime": "2023-10-30T13:58:16.947810+02:00", "EventTime": "2023-10-30T13:58:16.947826+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cp0pvD3ES7oOO7wf62"]} -{"Format": "IDEA0", "ID": "b3267e54-88aa-4cb8-a28e-53cdbff6a513", "DetectTime": "2023-10-30T13:58:16.964788+02:00", "EventTime": "2023-10-30T13:58:16.964810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3059], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C97j3l27E1KOwpVmDk"]} -{"Format": "IDEA0", "ID": "62201ff3-7087-442b-bf9b-297cd3bfe7ae", "DetectTime": "2023-10-30T13:58:16.985667+02:00", "EventTime": "2023-10-30T13:58:16.985685+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcNRxF1nFLF3OpyI33"]} -{"Format": "IDEA0", "ID": "de7de9bc-3009-411a-a404-4b01ea5d15c7", "DetectTime": "2023-10-30T13:58:17.000673+02:00", "EventTime": "2023-10-30T13:58:17.000693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29349], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29349/UDP destination IP 41.135.135.193. ", "ContentType": "text/plain"}], "uids": ["ChIOvB1APOB3KFPKTb"]} -{"Format": "IDEA0", "ID": "fd897b0f-7ced-46f4-b43f-f47a12fce26f", "DetectTime": "2023-10-30T13:58:17.025982+02:00", "EventTime": "2023-10-30T13:58:17.025998+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C887si4iLh6wpb8dMb"]} -{"Format": "IDEA0", "ID": "9e84ddb5-53c2-44cd-94fe-2998cd2f9a5e", "DetectTime": "2023-10-30T13:58:17.045820+02:00", "EventTime": "2023-10-30T13:58:17.045835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CyyCfS3VHjERiiIbjd"]} -{"Format": "IDEA0", "ID": "e74ece6a-81b3-4e39-b4dd-5b0bd0a843cc", "DetectTime": "2023-10-30T13:58:17.075523+02:00", "EventTime": "2023-10-30T13:58:17.075540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25811], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. ", "ContentType": "text/plain"}], "uids": ["Cua3ZVYyWkR1G23Uh"]} -{"Format": "IDEA0", "ID": "bde1af66-1425-4994-8c85-c23f77760281", "DetectTime": "2023-10-30T13:58:17.101893+02:00", "EventTime": "2023-10-30T13:58:17.101913+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2rmPz27fYbCgEbGIh"]} -{"Format": "IDEA0", "ID": "93dbeb8e-2710-424a-bd4c-c221b89b61b0", "DetectTime": "2023-10-30T13:58:17.118524+02:00", "EventTime": "2023-10-30T13:58:17.118548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C5obD92jdeKwWyFx8f"]} -{"Format": "IDEA0", "ID": "3748765e-e487-4afe-94f2-72924c2bae59", "DetectTime": "2023-10-30T13:58:17.162222+02:00", "EventTime": "2023-10-30T13:58:17.162239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11344], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11344/UDP destination IP 41.200.82.4. ", "ContentType": "text/plain"}], "uids": ["C0eGst1gQ0rFIsxJDd"]} -{"Format": "IDEA0", "ID": "1f366d85-948d-4db6-a37e-38c93de662f7", "DetectTime": "2023-10-30T13:58:17.207084+02:00", "EventTime": "2023-10-30T13:58:17.207096+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COuhVm1oFhOejNO4wh"]} -{"Format": "IDEA0", "ID": "4490d652-6f13-4865-bd9f-4834f60af2d7", "DetectTime": "2023-10-30T13:58:17.221407+02:00", "EventTime": "2023-10-30T13:58:17.221420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["Cri6qi4sHYUNY9q4E9"]} -{"Format": "IDEA0", "ID": "9b53f816-2ed5-4d92-bc10-f4162c0c41f8", "DetectTime": "2023-10-30T13:58:17.269841+02:00", "EventTime": "2023-10-30T13:58:17.269861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Chb6rz4LIxeHOLpupi"]} -{"Format": "IDEA0", "ID": "7e3d020c-ebc8-4e65-9b7c-111d1bbaaf4a", "DetectTime": "2023-10-30T13:58:17.312607+02:00", "EventTime": "2023-10-30T13:58:17.312617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6383/UDP destination IP 91.137.174.85. ", "ContentType": "text/plain"}], "uids": ["CNMK3jM9273KE9H58"]} -{"Format": "IDEA0", "ID": "cf7a7e65-64e3-4c95-bb88-38a903fdd649", "DetectTime": "2023-10-30T13:58:17.360206+02:00", "EventTime": "2023-10-30T13:58:17.360223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["Cazi8e34zAZtimWOk6"]} -{"Format": "IDEA0", "ID": "0301a9b7-faf7-468c-895f-734205ffefa5", "DetectTime": "2023-10-30T13:58:17.404664+02:00", "EventTime": "2023-10-30T13:58:17.404677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["COlOqM3slZCXKY3FNa"]} -{"Format": "Json", "ID": "0301a9b7-faf7-468c-895f-734205ffefa5", "DetectTime": "2023-10-30T13:58:17.404664+02:00", "EventTime": "2023-10-30T13:58:17.404677+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T14:01:01.016348+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:17.505664)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eff44b60-b026-4e51-b103-dd24ca69e29c", "DetectTime": "2023-10-30T13:58:17.511287+02:00", "EventTime": "2023-10-30T13:58:17.511303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. ", "ContentType": "text/plain"}], "uids": ["CSCS9u2OlPnG1ZKDnk"]} -{"Format": "IDEA0", "ID": "d957ecff-127f-43ac-88ab-2e3a22c5a5b2", "DetectTime": "2023-10-30T13:58:17.564382+02:00", "EventTime": "2023-10-30T13:58:17.564399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CKVpwc4tipITtyLE8h"]} -{"Format": "IDEA0", "ID": "e5d48656-e3b1-4623-958f-ec49999f76fa", "DetectTime": "2023-10-30T13:58:17.608993+02:00", "EventTime": "2023-10-30T13:58:17.609021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CTweOE2zCmteCAHcm3", "CcNRxF1nFLF3OpyI33", "C2rmPz27fYbCgEbGIh", "Crp9xb1zduqWB12dsi"]} -{"Format": "IDEA0", "ID": "a75063e4-bbcb-4a3e-bde4-84f6058f5b63", "DetectTime": "2023-10-30T13:58:17.626935+02:00", "EventTime": "2023-10-30T13:58:17.626952+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Crp9xb1zduqWB12dsi"]} -{"Format": "IDEA0", "ID": "f56b304c-c1d6-4958-823a-7c73d6ce6b88", "DetectTime": "2023-10-30T13:58:17.645934+02:00", "EventTime": "2023-10-30T13:58:17.645956+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkXbQy1NheqLnPwQSj"]} -{"Format": "IDEA0", "ID": "595165d2-c0c5-440d-9441-9b03f726c33e", "DetectTime": "2023-10-30T13:58:17.663054+02:00", "EventTime": "2023-10-30T13:58:17.663071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CQNs2pDpdDODSoKfi"]} -{"Format": "IDEA0", "ID": "1e3a8653-2b06-4683-b40f-a8cff0ccf23c", "DetectTime": "2023-10-30T13:58:17.706658+02:00", "EventTime": "2023-10-30T13:58:17.706679+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeK62G4KMFBg2GaZMh"]} -{"Format": "IDEA0", "ID": "8304d0fa-25ad-47d5-b6a8-3c29a3e78965", "DetectTime": "2023-10-30T13:58:17.724177+02:00", "EventTime": "2023-10-30T13:58:17.724202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CAmRnY2a4IS2YNZRIg"]} -{"Format": "IDEA0", "ID": "c501fc34-24fa-463d-b06e-71d2b0dae8cf", "DetectTime": "2023-10-30T13:58:17.770543+02:00", "EventTime": "2023-10-30T13:58:17.770562+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkWAiW1J8D2CWiRw03"]} -{"Format": "IDEA0", "ID": "52ad0779-1f12-4e6e-ba76-f0ec20c3862a", "DetectTime": "2023-10-30T13:58:17.789127+02:00", "EventTime": "2023-10-30T13:58:17.789143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7057], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CbmWn325syIPUBajGg"]} -{"Format": "IDEA0", "ID": "81913728-ea3d-4808-8e05-2e8e526f2b27", "DetectTime": "2023-10-30T13:58:17.832762+02:00", "EventTime": "2023-10-30T13:58:17.832783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CJN8sl24nAkfQOFDR8"]} -{"Format": "IDEA0", "ID": "39477e03-7ebc-40a2-bd8b-db77b104c2c1", "DetectTime": "2023-10-30T13:58:17.875004+02:00", "EventTime": "2023-10-30T13:58:17.875021+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRGuWE4dwArTGacqaj"]} -{"Format": "IDEA0", "ID": "2c7aeefc-8178-495b-b8ae-734dfd6366d1", "DetectTime": "2023-10-30T13:58:17.891772+02:00", "EventTime": "2023-10-30T13:58:17.891788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21887], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21887/UDP destination IP 149.3.4.183. ", "ContentType": "text/plain"}], "uids": ["CUTshZ2LDxuxpEVZBk"]} -{"Format": "IDEA0", "ID": "0746e2db-60f7-438f-9aa8-8db0b3e51a85", "DetectTime": "2023-10-30T13:58:17.933766+02:00", "EventTime": "2023-10-30T13:58:17.933795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. ", "ContentType": "text/plain"}], "uids": ["CqnjV72TjI0PzGrhsh"]} -{"Format": "Json", "ID": "0746e2db-60f7-438f-9aa8-8db0b3e51a85", "DetectTime": "2023-10-30T13:58:17.933766+02:00", "EventTime": "2023-10-30T13:58:17.933795+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10384], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T14:02:12.127623+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:17.997992)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c70d0d62-857a-435c-ba55-21586701c3af", "DetectTime": "2023-10-30T13:58:18.004176+02:00", "EventTime": "2023-10-30T13:58:18.004193+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUx9Rn4qiQh0SGWlgj"]} -{"Format": "IDEA0", "ID": "9e0dd785-d790-41f1-9a5e-ead2ebd6127e", "DetectTime": "2023-10-30T13:58:18.019784+02:00", "EventTime": "2023-10-30T13:58:18.019801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["CgnxaZ1ZLPlkQ4UhE"]} -{"Format": "IDEA0", "ID": "31f5d726-b8ed-469b-a07d-9ddb29b52c96", "DetectTime": "2023-10-30T13:58:18.060510+02:00", "EventTime": "2023-10-30T13:58:18.060522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. ", "ContentType": "text/plain"}], "uids": ["Ci3dJ54P3KTm784TIb"]} -{"Format": "IDEA0", "ID": "27b41014-9616-41a9-949c-6523868ed4fc", "DetectTime": "2023-10-30T13:58:18.098830+02:00", "EventTime": "2023-10-30T13:58:18.098847+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Clavh52zAqfn2k0uv7"]} -{"Format": "IDEA0", "ID": "3f2587aa-c85f-45be-89e7-3dd4dcbe7789", "DetectTime": "2023-10-30T13:58:18.114955+02:00", "EventTime": "2023-10-30T13:58:18.114971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CX7PWE4s53GI2BC1T6"]} -{"Format": "IDEA0", "ID": "7f4a43ed-35e1-4693-827f-5ee90bdc770f", "DetectTime": "2023-10-30T13:58:18.147379+02:00", "EventTime": "2023-10-30T13:58:18.147398+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CE1MJshdgawk1Tjph"]} -{"Format": "IDEA0", "ID": "8be9ee16-cb3e-4960-8c2d-76919b621589", "DetectTime": "2023-10-30T13:58:18.166935+02:00", "EventTime": "2023-10-30T13:58:18.166952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CWtnCoHFZ6IsgiqL4"]} -{"Format": "IDEA0", "ID": "db026c52-dd98-4c52-b68a-159e3cb38245", "DetectTime": "2023-10-30T13:58:18.200350+02:00", "EventTime": "2023-10-30T13:58:18.200360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Clavh52zAqfn2k0uv7", "CeK62G4KMFBg2GaZMh", "CRGuWE4dwArTGacqaj", "CzP6a049oebICcZqcl"]} -{"Format": "IDEA0", "ID": "87bd0a6a-2d65-4032-88af-545aabca3124", "DetectTime": "2023-10-30T13:58:18.216963+02:00", "EventTime": "2023-10-30T13:58:18.216981+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzP6a049oebICcZqcl"]} -{"Format": "IDEA0", "ID": "e3e5803a-e87c-49fc-8875-ace07af0ca9a", "DetectTime": "2023-10-30T13:58:18.231753+02:00", "EventTime": "2023-10-30T13:58:18.231769+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKfDiB30wIYW59RxD"]} -{"Format": "IDEA0", "ID": "38bd854f-8fec-4731-9638-f91919f0d01a", "DetectTime": "2023-10-30T13:58:18.248635+02:00", "EventTime": "2023-10-30T13:58:18.248651+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMGO5C6yg6xbSVQQc"]} -{"Format": "IDEA0", "ID": "1e9c7aae-9350-453d-bb55-e82c1ea434c1", "DetectTime": "2023-10-30T13:58:18.265552+02:00", "EventTime": "2023-10-30T13:58:18.265577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20394], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. ", "ContentType": "text/plain"}], "uids": ["CWdzdJF72Dsnp0v49"]} -{"Format": "IDEA0", "ID": "fb70ec4f-d060-4aa3-913a-9aecafe88dc1", "DetectTime": "2023-10-30T13:58:18.306750+02:00", "EventTime": "2023-10-30T13:58:18.306769+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdPactGe0rRQgTUSb"]} -{"Format": "IDEA0", "ID": "d168cd2f-45e6-4278-92c7-55d544735e0a", "DetectTime": "2023-10-30T13:58:18.324794+02:00", "EventTime": "2023-10-30T13:58:18.324811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CmAtV21PTymnRpJxm"]} -{"Format": "IDEA0", "ID": "5c2553d1-61c6-4f65-9f0f-d871d5d84e39", "DetectTime": "2023-10-30T13:58:18.367431+02:00", "EventTime": "2023-10-30T13:58:18.367458+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTlBfIfIsvUqyyrl3"]} -{"Format": "IDEA0", "ID": "294448ab-e99c-4d51-b0cb-f54d457e0530", "DetectTime": "2023-10-30T13:58:18.384519+02:00", "EventTime": "2023-10-30T13:58:18.384535+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZctPC2xSLIKEYGQQl"]} -{"Format": "IDEA0", "ID": "06eecb93-f0e1-446c-9197-8d25ef4bf3e6", "DetectTime": "2023-10-30T13:58:18.402860+02:00", "EventTime": "2023-10-30T13:58:18.402881+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cdh05OWu47wBKrU0b"]} -{"Format": "IDEA0", "ID": "15925772-c8e7-4aaa-9527-e59a7334234d", "DetectTime": "2023-10-30T13:58:18.421041+02:00", "EventTime": "2023-10-30T13:58:18.421059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CeHkHZILHqrY1LmWc"]} -{"Format": "IDEA0", "ID": "5383daba-7538-4467-b15e-e5cb422e7888", "DetectTime": "2023-10-30T13:58:18.460803+02:00", "EventTime": "2023-10-30T13:58:18.460815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CHDh003SHvqifZR2Ch"]} -{"Format": "Json", "ID": "5383daba-7538-4467-b15e-e5cb422e7888", "DetectTime": "2023-10-30T13:58:18.460803+02:00", "EventTime": "2023-10-30T13:58:18.460815+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T14:34:35.478993+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:18.614314)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c45ed19d-72e5-403e-a152-0cf29f97d1b5", "DetectTime": "2023-10-30T13:58:18.622075+02:00", "EventTime": "2023-10-30T13:58:18.622094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CeT8Mo42oEGXnNRMRi"]} -{"Format": "IDEA0", "ID": "691b5f18-b248-4fb5-96e2-0211c56a0817", "DetectTime": "2023-10-30T13:58:18.669021+02:00", "EventTime": "2023-10-30T13:58:18.669038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CgDhEy2mk6n2cm5j5"]} -{"Format": "IDEA0", "ID": "924328ac-e9c3-4eaf-af7d-57dae00f57e7", "DetectTime": "2023-10-30T13:58:18.714014+02:00", "EventTime": "2023-10-30T13:58:18.714036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["Cnsa4r3hXPvgeeB3r9"]} -{"Format": "IDEA0", "ID": "5ffd8c2c-a85d-4709-9b52-739a595d9503", "DetectTime": "2023-10-30T13:58:18.767420+02:00", "EventTime": "2023-10-30T13:58:18.767445+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKqkUrdWd4UItfgU7"]} -{"Format": "IDEA0", "ID": "45cb59ac-6d43-4c45-a938-cd643152fc56", "DetectTime": "2023-10-30T13:58:18.785198+02:00", "EventTime": "2023-10-30T13:58:18.785215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CuQbLu2C2NF4SPBZt6"]} -{"Format": "IDEA0", "ID": "a5213020-bf65-413f-9ea6-fe43e09c1787", "DetectTime": "2023-10-30T13:58:18.828464+02:00", "EventTime": "2023-10-30T13:58:18.828482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cdh05OWu47wBKrU0b", "CMGO5C6yg6xbSVQQc", "CTlBfIfIsvUqyyrl3", "CC1tR92XmpmmvaS4G2"]} -{"Format": "IDEA0", "ID": "ac929f51-4958-4122-9d62-f581441180ae", "DetectTime": "2023-10-30T13:58:18.846240+02:00", "EventTime": "2023-10-30T13:58:18.846258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CCPAtu3aMgQfGGCfq6"]} -{"Format": "IDEA0", "ID": "8e4cb3c9-d9b2-488f-ba88-2f316a189198", "DetectTime": "2023-10-30T13:58:18.887854+02:00", "EventTime": "2023-10-30T13:58:18.887878+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CC1tR92XmpmmvaS4G2"]} -{"Format": "IDEA0", "ID": "c4fe846f-5494-4693-a3a9-628ad644de12", "DetectTime": "2023-10-30T13:58:18.907767+02:00", "EventTime": "2023-10-30T13:58:18.907786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CPo5oH2yoEk79XdxJa"]} -{"Format": "IDEA0", "ID": "15362eb1-9af1-4ea7-a128-0290ddc1ec09", "DetectTime": "2023-10-30T13:58:18.965755+02:00", "EventTime": "2023-10-30T13:58:18.965772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C2PE331FJFoNvO4NQk"]} -{"Format": "IDEA0", "ID": "39a9f12f-0ed2-4ec7-8e3b-1b7b7e0a4080", "DetectTime": "2023-10-30T13:58:19.011887+02:00", "EventTime": "2023-10-30T13:58:19.011907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CFUjw22WksbiEaxRD7"]} -{"Format": "Json", "ID": "39a9f12f-0ed2-4ec7-8e3b-1b7b7e0a4080", "DetectTime": "2023-10-30T13:58:19.011887+02:00", "EventTime": "2023-10-30T13:58:19.011907+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T14:35:03.334735+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:19.099609)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1e12815b-48d5-42c4-b6c4-109a47874bbb", "DetectTime": "2023-10-30T13:58:19.105375+02:00", "EventTime": "2023-10-30T13:58:19.105391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CcUdSV3uwo4REXaWdf"]} -{"Format": "IDEA0", "ID": "f683e57d-7fe6-49a2-8b90-abd0136c65c3", "DetectTime": "2023-10-30T13:58:19.167460+02:00", "EventTime": "2023-10-30T13:58:19.167484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["Cnz4ZN29dkYgo67hZ"]} -{"Format": "IDEA0", "ID": "17bbc29b-0422-4030-8e6b-0819c8ca8541", "DetectTime": "2023-10-30T13:58:19.227736+02:00", "EventTime": "2023-10-30T13:58:19.227853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["Cu5DEnzNjwrRLpGLe"]} -{"Format": "IDEA0", "ID": "f25b3ff8-783d-4039-9b73-6b8a2d2a5468", "DetectTime": "2023-10-30T13:58:19.273791+02:00", "EventTime": "2023-10-30T13:58:19.273807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CskWTMUFqwvnxgd63"]} -{"Format": "IDEA0", "ID": "8105d2b0-3ce2-414b-a095-535c36a97462", "DetectTime": "2023-10-30T13:58:19.320999+02:00", "EventTime": "2023-10-30T13:58:19.321021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. ", "ContentType": "text/plain"}], "uids": ["CsHuqi3a3uWOGMlcYc"]} -{"Format": "IDEA0", "ID": "8a6dc897-cbc3-4b35-bd90-94cfb6c28fb0", "DetectTime": "2023-10-30T13:58:19.362179+02:00", "EventTime": "2023-10-30T13:58:19.362201+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CY2JoA2wtVPfdrRgDl"]} -{"Format": "IDEA0", "ID": "14f3f684-b83a-40de-9cc7-cd61e3918f71", "DetectTime": "2023-10-30T13:58:19.380476+02:00", "EventTime": "2023-10-30T13:58:19.380497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. ", "ContentType": "text/plain"}], "uids": ["ClsFIu1BupwK2xVdw3"]} -{"Format": "IDEA0", "ID": "64963279-21f9-47f5-972f-d5ba1a251b13", "DetectTime": "2023-10-30T13:58:19.416722+02:00", "EventTime": "2023-10-30T13:58:19.416739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CJJCPmogmSbeVgwzb"]} -{"Format": "IDEA0", "ID": "c70c10d9-f9e6-4aff-a020-a35da4a1bc19", "DetectTime": "2023-10-30T13:58:19.453319+02:00", "EventTime": "2023-10-30T13:58:19.453336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["Cvp6Na2Aj4ziFHThXf"]} -{"Format": "Json", "ID": "c70c10d9-f9e6-4aff-a020-a35da4a1bc19", "DetectTime": "2023-10-30T13:58:19.453319+02:00", "EventTime": "2023-10-30T13:58:19.453336+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-01T14:36:57.843741+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:19.517942)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed788240-785a-4f88-a9bb-59bd6ac2018d", "DetectTime": "2023-10-30T13:58:19.523194+02:00", "EventTime": "2023-10-30T13:58:19.523212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CMMNSH2d6fpprknqke"]} -{"Format": "IDEA0", "ID": "c89d8c7d-7c31-4704-b266-64e21de2537a", "DetectTime": "2023-10-30T13:58:19.561981+02:00", "EventTime": "2023-10-30T13:58:19.562003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CFZxg437vnpafa7Ya9"]} -{"Format": "IDEA0", "ID": "c65bef9b-00e5-44cd-8867-7d702a89c2e7", "DetectTime": "2023-10-30T13:58:19.600860+02:00", "EventTime": "2023-10-30T13:58:19.600881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CNvcig48lGk9lLJRpi"]} -{"Format": "IDEA0", "ID": "e2b32b96-3c1c-4f90-bf98-402f3b1f0c3e", "DetectTime": "2023-10-30T13:58:19.643549+02:00", "EventTime": "2023-10-30T13:58:19.643568+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxCOHuxxPiSDVSmQf"]} -{"Format": "IDEA0", "ID": "514250bd-08ba-43bd-a65e-12dea158ad1c", "DetectTime": "2023-10-30T13:58:19.659547+02:00", "EventTime": "2023-10-30T13:58:19.659563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["C6r3WbOTkhSugYqT7"]} -{"Format": "IDEA0", "ID": "bcd405bb-10f3-4184-88d6-d36337cbeba9", "DetectTime": "2023-10-30T13:58:19.698414+02:00", "EventTime": "2023-10-30T13:58:19.698433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["CvFAQt3TjVDYpXgCA4"]} -{"Format": "IDEA0", "ID": "1f8146d3-6bd4-4dd0-8361-dd0a4d14cd81", "DetectTime": "2023-10-30T13:58:19.738205+02:00", "EventTime": "2023-10-30T13:58:19.738222+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyAEhl4vHivSronavf"]} -{"Format": "IDEA0", "ID": "9e851178-dfe0-40dc-bd57-c3942014f378", "DetectTime": "2023-10-30T13:58:19.751656+02:00", "EventTime": "2023-10-30T13:58:19.751682+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCpC4c3A1XjuT6w8W5"]} -{"Format": "IDEA0", "ID": "bac77f55-c207-4c4a-ac4f-69ec72b80531", "DetectTime": "2023-10-30T13:58:19.768134+02:00", "EventTime": "2023-10-30T13:58:19.768155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25811], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. ", "ContentType": "text/plain"}], "uids": ["ChPy6v3meJrWCaWg9a"]} -{"Format": "IDEA0", "ID": "cbf9ee33-4eab-425b-b9c3-f18c2dca1a3b", "DetectTime": "2023-10-30T13:58:19.805641+02:00", "EventTime": "2023-10-30T13:58:19.805657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CcE66E46eTb8582HEd"]} -{"Format": "IDEA0", "ID": "1b994dec-4996-4f7a-8e9f-053d2bf9c655", "DetectTime": "2023-10-30T13:58:19.841591+02:00", "EventTime": "2023-10-30T13:58:19.841612+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CURNni3UGDMhO5ti81"]} -{"Format": "IDEA0", "ID": "e94d6964-31e9-4a89-a244-d7bb284cd0e2", "DetectTime": "2023-10-30T13:58:19.853268+02:00", "EventTime": "2023-10-30T13:58:19.853281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CxM1co35bBzvEEyth4"]} -{"Format": "Json", "ID": "e94d6964-31e9-4a89-a244-d7bb284cd0e2", "DetectTime": "2023-10-30T13:58:19.853268+02:00", "EventTime": "2023-10-30T13:58:19.853281+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T14:36:58.223148+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:19.917995)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a26d743b-576a-4e1a-ad02-8e9c0c5dc899", "DetectTime": "2023-10-30T13:58:19.925450+02:00", "EventTime": "2023-10-30T13:58:19.925472+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CP9uO74OCMuK722Xge"]} -{"Format": "IDEA0", "ID": "26c9727e-a7e8-4c13-bfd6-52d044edfd81", "DetectTime": "2023-10-30T13:58:19.939815+02:00", "EventTime": "2023-10-30T13:58:19.939869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CKOQ6r4WcklY0utbtg"]} -{"Format": "IDEA0", "ID": "a0fcd6bc-d1e2-477a-87c1-03ea8b59c57c", "DetectTime": "2023-10-30T13:58:19.976581+02:00", "EventTime": "2023-10-30T13:58:19.976599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CIkdCzdtuYTF17GKb"]} -{"Format": "IDEA0", "ID": "7d1fd2e5-0539-4997-be7e-15168380d65a", "DetectTime": "2023-10-30T13:58:20.011987+02:00", "EventTime": "2023-10-30T13:58:20.012001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2mQic3JiryEsY3vUa"]} -{"Format": "IDEA0", "ID": "5d4a713c-26e7-4c36-8fdd-268984d70917", "DetectTime": "2023-10-30T13:58:20.024728+02:00", "EventTime": "2023-10-30T13:58:20.024875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmDaSFUs5vHKA6n12", "CP9uO74OCMuK722Xge", "CxCOHuxxPiSDVSmQf", "CCpC4c3A1XjuT6w8W5"]} -{"Format": "IDEA0", "ID": "a0be7fc0-1fe8-43aa-85b7-040e94bd8231", "DetectTime": "2023-10-30T13:58:20.037203+02:00", "EventTime": "2023-10-30T13:58:20.037221+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmDaSFUs5vHKA6n12"]} -{"Format": "IDEA0", "ID": "fc36bcaa-c917-4cf5-9975-fb2b3a944021", "DetectTime": "2023-10-30T13:58:20.049041+02:00", "EventTime": "2023-10-30T13:58:20.049060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CL5ZuE4vVfVv24hjG2"]} -{"Format": "IDEA0", "ID": "e4e2c9c1-f3fa-44a0-b5bf-3ac6f69c21fa", "DetectTime": "2023-10-30T13:58:20.082126+02:00", "EventTime": "2023-10-30T13:58:20.082145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. ", "ContentType": "text/plain"}], "uids": ["C8UbfE4bcrZPAuXWlj"]} -{"Format": "IDEA0", "ID": "c5a37f39-d386-45aa-a162-1523a5a7dbc1", "DetectTime": "2023-10-30T13:58:20.116147+02:00", "EventTime": "2023-10-30T13:58:20.116166+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVlmgN1zQl5Qpr0C02"]} -{"Format": "IDEA0", "ID": "cbeb278d-ddec-4772-8da8-d112eeab0fa5", "DetectTime": "2023-10-30T13:58:20.127727+02:00", "EventTime": "2023-10-30T13:58:20.127775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["C5gJc94RN5js5iXG5d"]} -{"Format": "IDEA0", "ID": "15539848-1a17-494e-99a3-aa48d7fc27e6", "DetectTime": "2023-10-30T13:58:20.162257+02:00", "EventTime": "2023-10-30T13:58:20.162284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CrJTfZYkMVrYPKWig"]} -{"Format": "IDEA0", "ID": "f4b0a5a4-d860-46f0-b611-c243bdca3a6e", "DetectTime": "2023-10-30T13:58:20.199786+02:00", "EventTime": "2023-10-30T13:58:20.199808+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDiaHl4PrSm8HXJBp"]} -{"Format": "IDEA0", "ID": "50911cde-b999-4b54-bac1-f70327289a0d", "DetectTime": "2023-10-30T13:58:20.213395+02:00", "EventTime": "2023-10-30T13:58:20.213410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CryZtm3bHsHlRVHzO"]} -{"Format": "IDEA0", "ID": "0c4d0ab9-89b2-48cc-840f-2bf7a9c6069c", "DetectTime": "2023-10-30T13:58:20.250742+02:00", "EventTime": "2023-10-30T13:58:20.250768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CEpEZa3mvv5HaWtWc"]} -{"Format": "Json", "ID": "0c4d0ab9-89b2-48cc-840f-2bf7a9c6069c", "DetectTime": "2023-10-30T13:58:20.250742+02:00", "EventTime": "2023-10-30T13:58:20.250768+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T14:37:38.133898+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2023/10/30 13:58:20.307434)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a28b4f9e-e19c-48a3-880d-51325e37737c", "DetectTime": "2023-10-30T13:58:20.314892+02:00", "EventTime": "2023-10-30T13:58:20.314918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["Cqo0Kr2idMWyEp8ZGj"]} -{"Format": "IDEA0", "ID": "41642fb3-1372-492d-af88-6c0d02aa1c03", "DetectTime": "2023-10-30T13:58:20.343400+02:00", "EventTime": "2023-10-30T13:58:20.343425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. ", "ContentType": "text/plain"}], "uids": ["CypD7k1lnMNKldrK17"]} -{"Format": "IDEA0", "ID": "674c3f60-866c-47a6-92e2-06e9a462bfc4", "DetectTime": "2023-10-30T13:58:20.372685+02:00", "EventTime": "2023-10-30T13:58:20.372702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["CcXkRG1JKf9fyflkAd"]} -{"Format": "IDEA0", "ID": "a99ceba3-f1dd-4b0b-8b2b-e01b7a478657", "DetectTime": "2023-10-30T13:58:20.399844+02:00", "EventTime": "2023-10-30T13:58:20.399866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. ", "ContentType": "text/plain"}], "uids": ["C8aAwk2mjVWDSO1Ud8"]} -{"Format": "IDEA0", "ID": "121482b9-cb6d-404a-8c37-fabc6576b6a1", "DetectTime": "2023-10-30T13:58:20.427546+02:00", "EventTime": "2023-10-30T13:58:20.427559+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5LemI2fDBGOEJ9CJa"]} -{"Format": "IDEA0", "ID": "a46efa8f-72ac-4a6b-8ca1-d57a282c94a4", "DetectTime": "2023-10-30T13:58:20.440888+02:00", "EventTime": "2023-10-30T13:58:20.440912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cuuyul2HtPDx6FXa4l"]} -{"Format": "IDEA0", "ID": "ee230907-2386-42ce-b5a2-7b53518f61b2", "DetectTime": "2023-10-30T13:58:20.469111+02:00", "EventTime": "2023-10-30T13:58:20.469127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CmCvrE2wvUSjmWXIIk"]} -{"Format": "IDEA0", "ID": "2d0c8448-e6b0-42ee-9951-c57cc150a884", "DetectTime": "2023-10-30T13:58:20.499484+02:00", "EventTime": "2023-10-30T13:58:20.499499+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtHXKA3T21nvkshKta"]} -{"Format": "IDEA0", "ID": "3c73e18c-a9be-4221-b5a4-a11a32d47b45", "DetectTime": "2023-10-30T13:58:20.512170+02:00", "EventTime": "2023-10-30T13:58:20.512190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20394], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. ", "ContentType": "text/plain"}], "uids": ["CbUGi94hCeJKZC2hlg"]} -{"Format": "IDEA0", "ID": "ca9f54e5-3fe4-4ff7-81e5-d7160cd69a10", "DetectTime": "2023-10-30T13:58:20.540335+02:00", "EventTime": "2023-10-30T13:58:20.540364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CDAlKi3T1vG4v84xHb"]} -{"Format": "IDEA0", "ID": "f01978cc-0f5f-48ce-88e2-2aa811b52874", "DetectTime": "2023-10-30T13:58:20.604782+02:00", "EventTime": "2023-10-30T13:58:20.604802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CS6ubs3r8XyJQlFimi"]} -{"Format": "IDEA0", "ID": "02fa0eb0-0ca3-4ff3-95d8-bf309039458d", "DetectTime": "2023-10-30T13:58:20.668205+02:00", "EventTime": "2023-10-30T13:58:20.668227+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CG3na2UnLeEj43Rh8"]} -{"Format": "IDEA0", "ID": "973f5231-074f-4d03-b83d-cd45e5604507", "DetectTime": "2023-10-30T13:58:20.680949+02:00", "EventTime": "2023-10-30T13:58:20.680962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CKgS7q3Q3de0CN51G6"]} -{"Format": "IDEA0", "ID": "79c1f3dc-bb39-4060-ae09-a7ec0b7c2f52", "DetectTime": "2023-10-30T13:58:20.749445+02:00", "EventTime": "2023-10-30T13:58:20.749472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["CqOUuX2fJgXMwSjv44"]} -{"Format": "IDEA0", "ID": "b04a1efb-3edd-49e6-b5cc-cc6768b4a96e", "DetectTime": "2023-10-30T13:58:20.808464+02:00", "EventTime": "2023-10-30T13:58:20.808491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26273], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. ", "ContentType": "text/plain"}], "uids": ["CmH36HVtGAneD3oXg"]} -{"Format": "IDEA0", "ID": "11e83e26-3fe8-4595-ac3a-41babc8e6d2b", "DetectTime": "2023-10-30T13:58:20.868238+02:00", "EventTime": "2023-10-30T13:58:20.868254+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcbGv13VGA3nuKbZtk"]} -{"Format": "IDEA0", "ID": "ad8007d2-bff0-4119-a038-53dc1032503d", "DetectTime": "2023-10-30T13:58:20.880620+02:00", "EventTime": "2023-10-30T13:58:20.880633+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cgbslm40uPNHg8sJn8"]} -{"Format": "IDEA0", "ID": "622a1470-b3a9-40d8-93db-e0334198099a", "DetectTime": "2023-10-30T13:58:20.893800+02:00", "EventTime": "2023-10-30T13:58:20.893818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CtWLH81QoW0luxf1k", "CtHXKA3T21nvkshKta", "CDiaHl4PrSm8HXJBp", "CcbGv13VGA3nuKbZtk"]} -{"Format": "IDEA0", "ID": "87a5bf76-0cee-4a2f-8e46-f7feb7194b35", "DetectTime": "2023-10-30T13:58:20.905426+02:00", "EventTime": "2023-10-30T13:58:20.905444+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtWLH81QoW0luxf1k"]} -{"Format": "IDEA0", "ID": "52b78582-74b8-4c16-8850-1b69e3a7834f", "DetectTime": "2023-10-30T13:58:20.918617+02:00", "EventTime": "2023-10-30T13:58:20.918641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CwWaaQyLr8v7F7uuj"]} -{"Format": "Json", "ID": "52b78582-74b8-4c16-8850-1b69e3a7834f", "DetectTime": "2023-10-30T13:58:20.918617+02:00", "EventTime": "2023-10-30T13:58:20.918641+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:10:43.196976+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:21.048159)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a59df15-674c-468e-b830-9cf52a91a48c", "DetectTime": "2023-10-30T13:58:21.054828+02:00", "EventTime": "2023-10-30T13:58:21.054852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CExroG279zK4LHhOZk"]} -{"Format": "IDEA0", "ID": "70e4d9c3-2e7c-4a48-a736-3a7879fb8ebf", "DetectTime": "2023-10-30T13:58:21.117890+02:00", "EventTime": "2023-10-30T13:58:21.117908+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7abpd45os59Kphll6"]} -{"Format": "IDEA0", "ID": "7b6bf834-1b51-4897-941d-62e9b6f8f659", "DetectTime": "2023-10-30T13:58:21.129651+02:00", "EventTime": "2023-10-30T13:58:21.129670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CEWQcxLtjF9oDfEya"]} -{"Format": "IDEA0", "ID": "e57c4c87-278b-428d-99cd-90c06b1b3a77", "DetectTime": "2023-10-30T13:58:21.191634+02:00", "EventTime": "2023-10-30T13:58:21.191650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CW9W8w3ge76IwftvR8"]} -{"Format": "IDEA0", "ID": "89a03eef-7a1d-4ca8-890a-13128203ce95", "DetectTime": "2023-10-30T13:58:21.248575+02:00", "EventTime": "2023-10-30T13:58:21.248588+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFIA0e3nv5fQbiOn99"]} -{"Format": "IDEA0", "ID": "d83f7285-4be4-464f-866e-355a6b41806c", "DetectTime": "2023-10-30T13:58:21.263641+02:00", "EventTime": "2023-10-30T13:58:21.263662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CkwA7j4vkGhAp5LVK4"]} -{"Format": "IDEA0", "ID": "b579c114-025c-4de7-8753-44488c8ea38a", "DetectTime": "2023-10-30T13:58:21.324714+02:00", "EventTime": "2023-10-30T13:58:21.324736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CehZ7a3RDxdit7fVn4"]} -{"Format": "IDEA0", "ID": "c82ae19c-fde8-44a3-b879-52adb8898573", "DetectTime": "2023-10-30T13:58:21.384703+02:00", "EventTime": "2023-10-30T13:58:21.384720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CSFEY5Hd9yJyELSCl"]} -{"Format": "IDEA0", "ID": "c1dd7b48-6057-445f-8e45-51374fca0c82", "DetectTime": "2023-10-30T13:58:21.440165+02:00", "EventTime": "2023-10-30T13:58:21.440177+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8t5DB1eR2wBqIQ4Qf"]} -{"Format": "IDEA0", "ID": "61b5dbd3-ff74-4e74-bf09-1dc4319638f1", "DetectTime": "2023-10-30T13:58:21.455383+02:00", "EventTime": "2023-10-30T13:58:21.455396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CuMRPw34hUQPeGn3ma"]} -{"Format": "IDEA0", "ID": "a1536d62-86e4-4bab-84ff-1791f8e430d3", "DetectTime": "2023-10-30T13:58:21.512268+02:00", "EventTime": "2023-10-30T13:58:21.512286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["COBWfY3nId0ffjTc1b"]} -{"Format": "Json", "ID": "a1536d62-86e4-4bab-84ff-1791f8e430d3", "DetectTime": "2023-10-30T13:58:21.512268+02:00", "EventTime": "2023-10-30T13:58:21.512286+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:10:56.620467+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:21.599774)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "27a81d7d-914a-47b7-afa0-96b0e1510002", "DetectTime": "2023-10-30T13:58:21.605703+02:00", "EventTime": "2023-10-30T13:58:21.605716+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWtIUi12wsra7KzA3b"]} -{"Format": "IDEA0", "ID": "d823c0a8-61f5-4710-8590-3a27cabfdbda", "DetectTime": "2023-10-30T13:58:21.621466+02:00", "EventTime": "2023-10-30T13:58:21.621480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CYz1itGUvRQachx65"]} -{"Format": "IDEA0", "ID": "427e00bb-7e4a-475f-aa80-7426b7ec02cd", "DetectTime": "2023-10-30T13:58:21.679630+02:00", "EventTime": "2023-10-30T13:58:21.679644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["Ct9NaQQYKQjMSnEgd"]} -{"Format": "IDEA0", "ID": "fddfbefe-a505-41a3-877d-428b2e0e341f", "DetectTime": "2023-10-30T13:58:21.737397+02:00", "EventTime": "2023-10-30T13:58:21.737417+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ckk7Zd1jndUaeyIhb"]} -{"Format": "IDEA0", "ID": "80f4e98e-328e-4af5-ae73-7b5758e968d5", "DetectTime": "2023-10-30T13:58:21.752288+02:00", "EventTime": "2023-10-30T13:58:21.752309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CfCemE3gsLwGyfitBd"]} -{"Format": "IDEA0", "ID": "509340f0-9c84-4644-b4d4-ee608650a7f3", "DetectTime": "2023-10-30T13:58:21.816286+02:00", "EventTime": "2023-10-30T13:58:21.816312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. ", "ContentType": "text/plain"}], "uids": ["C29bKu3bK7zoaLyIv3"]} -{"Format": "IDEA0", "ID": "5ec1fde8-fc53-4f49-a5a5-dad145df8c4a", "DetectTime": "2023-10-30T13:58:21.870339+02:00", "EventTime": "2023-10-30T13:58:21.870359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CXKnqT2iIDDNeXd3Il"]} -{"Format": "IDEA0", "ID": "b9b62c64-cc09-4262-968b-647636916521", "DetectTime": "2023-10-30T13:58:21.926788+02:00", "EventTime": "2023-10-30T13:58:21.926808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. ", "ContentType": "text/plain"}], "uids": ["CC5rfD27iMAkWXoMnd"]} -{"Format": "IDEA0", "ID": "b854629e-21a0-42ba-9b58-1f340ec200c2", "DetectTime": "2023-10-30T13:58:21.984649+02:00", "EventTime": "2023-10-30T13:58:21.984676+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2cUWU33QFMpTrMo1e"]} -{"Format": "IDEA0", "ID": "5ed8a179-6d6a-4eaf-abee-10291dc7ad44", "DetectTime": "2023-10-30T13:58:22.002526+02:00", "EventTime": "2023-10-30T13:58:22.002540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CR4eMu4zFu7AX2MOpf"]} -{"Format": "IDEA0", "ID": "1e71d131-535f-47cc-8e71-de42faffccdb", "DetectTime": "2023-10-30T13:58:22.058260+02:00", "EventTime": "2023-10-30T13:58:22.058280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CMEKRH2dB7RdWwAiGj"]} -{"Format": "Json", "ID": "1e71d131-535f-47cc-8e71-de42faffccdb", "DetectTime": "2023-10-30T13:58:22.058260+02:00", "EventTime": "2023-10-30T13:58:22.058280+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:11:26.987845+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:22.149604)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "736d88eb-1152-4118-bd52-00e2cc702deb", "DetectTime": "2023-10-30T13:58:22.156272+02:00", "EventTime": "2023-10-30T13:58:22.156298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CBEtKj1xn4xnTwFqje"]} -{"Format": "IDEA0", "ID": "dd7fcb75-bd71-41a2-b4ed-5f60c1530954", "DetectTime": "2023-10-30T13:58:22.214491+02:00", "EventTime": "2023-10-30T13:58:22.214510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CwHHls4zS1AlgkOe8b"]} -{"Format": "IDEA0", "ID": "9140cab5-6496-4f41-adb1-373a1c3c6011", "DetectTime": "2023-10-30T13:58:22.271057+02:00", "EventTime": "2023-10-30T13:58:22.271075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["CVwXuf46oojW1QlJLj"]} -{"Format": "IDEA0", "ID": "8e26ece1-a109-4721-9e05-f24fb42685a0", "DetectTime": "2023-10-30T13:58:22.324555+02:00", "EventTime": "2023-10-30T13:58:22.324573+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLTpVE23b7gGXUG9pb"]} -{"Format": "IDEA0", "ID": "09907be6-2b29-4db7-b58c-20a7e599cda0", "DetectTime": "2023-10-30T13:58:22.341242+02:00", "EventTime": "2023-10-30T13:58:22.341268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CSJozq25eokBEWgaU9"]} -{"Format": "IDEA0", "ID": "2168bcb2-cf1d-4c63-8542-2dc58501fe3f", "DetectTime": "2023-10-30T13:58:22.393873+02:00", "EventTime": "2023-10-30T13:58:22.393891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25811], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. ", "ContentType": "text/plain"}], "uids": ["COpsqb2DuQLzUFFgh9"]} -{"Format": "IDEA0", "ID": "8511dc93-b7dd-4daf-b0f0-060ecc5102e4", "DetectTime": "2023-10-30T13:58:22.453853+02:00", "EventTime": "2023-10-30T13:58:22.453882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CWtIUi12wsra7KzA3b", "C2cUWU33QFMpTrMo1e", "CFIA0e3nv5fQbiOn99", "CPyRf9Cf2BfqYfRM"]} -{"Format": "IDEA0", "ID": "811770c6-f3ec-491f-ae57-b1fcc0f2086f", "DetectTime": "2023-10-30T13:58:22.470441+02:00", "EventTime": "2023-10-30T13:58:22.470475+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPyRf9Cf2BfqYfRM"]} -{"Format": "IDEA0", "ID": "caf85c6d-6a64-4945-813a-98af32f05b2b", "DetectTime": "2023-10-30T13:58:22.489115+02:00", "EventTime": "2023-10-30T13:58:22.489155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["C2t5yT1DdN6I6tOei5"]} -{"Format": "IDEA0", "ID": "58c892b1-a6cd-4447-9e43-66dfc83ed545", "DetectTime": "2023-10-30T13:58:22.638221+02:00", "EventTime": "2023-10-30T13:58:22.638242+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4g4cV3smz2ae6tyaf"]} -{"Format": "IDEA0", "ID": "5e94bb91-f4bd-4975-b0fe-c8b41af98d0d", "DetectTime": "2023-10-30T13:58:22.656217+02:00", "EventTime": "2023-10-30T13:58:22.656240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C6WFg31oh8E000BJlh"]} -{"Format": "IDEA0", "ID": "a2c3ecf8-d7ac-40d2-a55c-7eb22d21fb46", "DetectTime": "2023-10-30T13:58:22.727055+02:00", "EventTime": "2023-10-30T13:58:22.727083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CyxVhx228jl7zIaK09"]} -{"Format": "Json", "ID": "a2c3ecf8-d7ac-40d2-a55c-7eb22d21fb46", "DetectTime": "2023-10-30T13:58:22.727055+02:00", "EventTime": "2023-10-30T13:58:22.727083+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:11:39.756530+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:22.833830)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2ee6dd17-34d1-40ab-8a9d-d398d0cd919c", "DetectTime": "2023-10-30T13:58:22.841905+02:00", "EventTime": "2023-10-30T13:58:22.841930+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CS2Qf44xM9o9iG2fi8"]} -{"Format": "IDEA0", "ID": "ab2bdcc6-b43b-4e6d-92e2-60ccfdbb451b", "DetectTime": "2023-10-30T13:58:22.868727+02:00", "EventTime": "2023-10-30T13:58:22.868747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C5f2MI3hSYlNmbxhnc"]} -{"Format": "IDEA0", "ID": "fc26dad0-cd17-4217-b917-d78d0f0e9b86", "DetectTime": "2023-10-30T13:58:22.940629+02:00", "EventTime": "2023-10-30T13:58:22.940650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. ", "ContentType": "text/plain"}], "uids": ["CvHhY52bxoL1MhnUyf"]} -{"Format": "IDEA0", "ID": "0aa97baa-a208-4b08-9c72-70180ac6e864", "DetectTime": "2023-10-30T13:58:23.016455+02:00", "EventTime": "2023-10-30T13:58:23.016476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CAN3oEH3Xcj5SbXUj"]} -{"Format": "IDEA0", "ID": "bace6893-5d98-4c72-abd0-bafafe81bf17", "DetectTime": "2023-10-30T13:58:23.077383+02:00", "EventTime": "2023-10-30T13:58:23.077411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["ChwKAy2TuDNbNj8F33"]} -{"Format": "IDEA0", "ID": "1e8cab13-2b30-4537-8076-88586bdea59a", "DetectTime": "2023-10-30T13:58:23.141852+02:00", "EventTime": "2023-10-30T13:58:23.141931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CcFU8e4KZJOEBXNJI4"]} -{"Format": "IDEA0", "ID": "5e550511-fb22-4158-bf1b-64d46030991a", "DetectTime": "2023-10-30T13:58:23.213610+02:00", "EventTime": "2023-10-30T13:58:23.213675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["C7ch19k8jCUERWLic"]} -{"Format": "IDEA0", "ID": "c7a672b1-d910-4c80-b01b-dea8c5ca7040", "DetectTime": "2023-10-30T13:58:23.282746+02:00", "EventTime": "2023-10-30T13:58:23.282764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CmWEYZ2CElAq97Sa7i"]} -{"Format": "IDEA0", "ID": "2c25c969-0e77-4cbd-9dfa-506e9c7392de", "DetectTime": "2023-10-30T13:58:23.356571+02:00", "EventTime": "2023-10-30T13:58:23.356585+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdyJXd1sE1YUkvk831"]} -{"Format": "IDEA0", "ID": "4901abd8-26e8-40af-a620-5a078281b93d", "DetectTime": "2023-10-30T13:58:23.378228+02:00", "EventTime": "2023-10-30T13:58:23.378253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CFbDuj3jgInE8IQruf"]} -{"Format": "Json", "ID": "4901abd8-26e8-40af-a620-5a078281b93d", "DetectTime": "2023-10-30T13:58:23.378228+02:00", "EventTime": "2023-10-30T13:58:23.378253+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:11:52.848574+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:23.484585)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5eaabd29-df0f-4319-982b-97a1fb89b2f9", "DetectTime": "2023-10-30T13:58:23.491029+02:00", "EventTime": "2023-10-30T13:58:23.491054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. ", "ContentType": "text/plain"}], "uids": ["CT2d1q2NppTlyucB47"]} -{"Format": "IDEA0", "ID": "596d71be-6358-48bf-b7ca-d6a5685488cd", "DetectTime": "2023-10-30T13:58:23.559820+02:00", "EventTime": "2023-10-30T13:58:23.559835+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C72Hk92e7clD9hF15d"]} -{"Format": "IDEA0", "ID": "4b427604-f40d-4ed6-89e4-284b718b7f11", "DetectTime": "2023-10-30T13:58:23.578519+02:00", "EventTime": "2023-10-30T13:58:23.578537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["Cfzso92ehwb7D9otCd"]} -{"Format": "IDEA0", "ID": "32879f72-b731-421d-97ab-e4d4c8951133", "DetectTime": "2023-10-30T13:58:23.640015+02:00", "EventTime": "2023-10-30T13:58:23.640042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["Cru2pE399BP54dUWcd"]} -{"Format": "IDEA0", "ID": "a5ccf6c0-abf1-49b4-a355-7a4ffb52e1fd", "DetectTime": "2023-10-30T13:58:23.705806+02:00", "EventTime": "2023-10-30T13:58:23.705823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. ", "ContentType": "text/plain"}], "uids": ["ClSY3p2Ngovu59Lxj5"]} -{"Format": "IDEA0", "ID": "8dfaf1e5-9734-4d7b-9b93-92fb32c1278f", "DetectTime": "2023-10-30T13:58:23.770727+02:00", "EventTime": "2023-10-30T13:58:23.770749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Ce6flm4uwn8z6zx6Nj"]} -{"Format": "IDEA0", "ID": "51c78fb6-cbc1-4b52-a2ae-540ed9da89e2", "DetectTime": "2023-10-30T13:58:23.826710+02:00", "EventTime": "2023-10-30T13:58:23.826733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20394], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. ", "ContentType": "text/plain"}], "uids": ["CJk9WL1dLCaMQ8IjVk"]} -{"Format": "IDEA0", "ID": "1a79739b-472f-46a0-aff7-d008168386ac", "DetectTime": "2023-10-30T13:58:23.885413+02:00", "EventTime": "2023-10-30T13:58:23.885431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CMV3xm4M8pRKubzHk4"]} -{"Format": "IDEA0", "ID": "f9c39ca9-0ec2-4dca-95dc-1eec3796a0e0", "DetectTime": "2023-10-30T13:58:23.947682+02:00", "EventTime": "2023-10-30T13:58:23.947698+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKaS5q236y3MvzkUYe"]} -{"Format": "IDEA0", "ID": "15a8eade-b84c-43ac-9ce7-07be5c329a5c", "DetectTime": "2023-10-30T13:58:23.965697+02:00", "EventTime": "2023-10-30T13:58:23.965723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CuEWdR2egh4TAQDi4"]} -{"Format": "Json", "ID": "15a8eade-b84c-43ac-9ce7-07be5c329a5c", "DetectTime": "2023-10-30T13:58:23.965697+02:00", "EventTime": "2023-10-30T13:58:23.965723+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:42:12.973725+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:24.056638)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fda18527-1362-498e-8543-3aab5ab772ed", "DetectTime": "2023-10-30T13:58:24.062816+02:00", "EventTime": "2023-10-30T13:58:24.062907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CffnTm3B9BSvtSlB27"]} -{"Format": "IDEA0", "ID": "ae8de206-88bc-4045-8598-dc4bcd789011", "DetectTime": "2023-10-30T13:58:24.128209+02:00", "EventTime": "2023-10-30T13:58:24.128233+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBWUAeNUbejcM7kT8"]} -{"Format": "IDEA0", "ID": "bed39063-3fd3-40f9-ad40-697f0d07e2be", "DetectTime": "2023-10-30T13:58:24.147743+02:00", "EventTime": "2023-10-30T13:58:24.147763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["CMYGRf1fYFqrRmpZrd"]} -{"Format": "IDEA0", "ID": "34fcc9b5-8fb3-4df9-9974-7f9297e1f4d5", "DetectTime": "2023-10-30T13:58:24.205062+02:00", "EventTime": "2023-10-30T13:58:24.205082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26273], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. ", "ContentType": "text/plain"}], "uids": ["CB66UbLWd8xHaAo83"]} -{"Format": "IDEA0", "ID": "48bab4e6-36b4-4605-92d3-73103c0a1a3e", "DetectTime": "2023-10-30T13:58:24.266069+02:00", "EventTime": "2023-10-30T13:58:24.266094+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiFsYyH8shZRFBLF7"]} -{"Format": "IDEA0", "ID": "2c76569c-8e82-4734-98ba-2540ddde7d57", "DetectTime": "2023-10-30T13:58:24.295774+02:00", "EventTime": "2023-10-30T13:58:24.295833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CnImt1SW3lLklx4Oi"]} -{"Format": "IDEA0", "ID": "27f862ff-a36f-44ea-b659-bffee72dbacb", "DetectTime": "2023-10-30T13:58:24.361399+02:00", "EventTime": "2023-10-30T13:58:24.361418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C72Hk92e7clD9hF15d", "Cf0wQb3Duwvq3Xzaie", "CBWUAeNUbejcM7kT8", "CS2Qf44xM9o9iG2fi8"]} -{"Format": "IDEA0", "ID": "1de4f26e-6977-4712-b1e5-bf619920d370", "DetectTime": "2023-10-30T13:58:24.377393+02:00", "EventTime": "2023-10-30T13:58:24.377410+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cf0wQb3Duwvq3Xzaie"]} -{"Format": "IDEA0", "ID": "b4510b79-c817-4fd2-91c9-4da975c268c2", "DetectTime": "2023-10-30T13:58:24.394518+02:00", "EventTime": "2023-10-30T13:58:24.394544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CXWG65VXA2STATGx1"]} -{"Format": "IDEA0", "ID": "03fe437f-f059-4d67-8626-8acf9c3003e8", "DetectTime": "2023-10-30T13:58:24.448202+02:00", "EventTime": "2023-10-30T13:58:24.448223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CI4Dah3Oz5AuCzazF8"]} -{"Format": "IDEA0", "ID": "943924c2-affc-4c95-a8b0-9f88d23c3d66", "DetectTime": "2023-10-30T13:58:24.501738+02:00", "EventTime": "2023-10-30T13:58:24.501762+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIa0fr18SVG2Es95Tl"]} -{"Format": "IDEA0", "ID": "9716ec9d-887d-479a-9458-743d70b203cc", "DetectTime": "2023-10-30T13:58:24.519947+02:00", "EventTime": "2023-10-30T13:58:24.519974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CISJEB4ISf0irkBa9c"]} -{"Format": "IDEA0", "ID": "321e5b5e-2e94-4ac0-b2e1-ac5bc1eb8c25", "DetectTime": "2023-10-30T13:58:24.569494+02:00", "EventTime": "2023-10-30T13:58:24.569514+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNn34j2R0GBjGw0BAd"]} -{"Format": "IDEA0", "ID": "d6be3e59-d147-4234-8660-e5c732f5ea54", "DetectTime": "2023-10-30T13:58:24.586367+02:00", "EventTime": "2023-10-30T13:58:24.586394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CDROtT7nSsXkmBPXl"]} -{"Format": "Json", "ID": "d6be3e59-d147-4234-8660-e5c732f5ea54", "DetectTime": "2023-10-30T13:58:24.586367+02:00", "EventTime": "2023-10-30T13:58:24.586394+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:42:16.489793+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:24.668215)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6ec4d507-ef18-42f1-bfe7-a8d0803e4ae0", "DetectTime": "2023-10-30T13:58:24.675157+02:00", "EventTime": "2023-10-30T13:58:24.675182+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C78eFC2PjEJwm6wAI4"]} -{"Format": "IDEA0", "ID": "6e2dfcfa-698a-4df5-9e60-d90457c06bc0", "DetectTime": "2023-10-30T13:58:24.694271+02:00", "EventTime": "2023-10-30T13:58:24.694291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["C1xBRI3y8qGWNO1OFi"]} -{"Format": "IDEA0", "ID": "c8fd51c0-832b-4ca6-afb2-123cb996397d", "DetectTime": "2023-10-30T13:58:24.745198+02:00", "EventTime": "2023-10-30T13:58:24.745223+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYE1nJ2xab6VzaJcbl"]} -{"Format": "IDEA0", "ID": "ba7e5ef2-29fe-445d-8135-314b447b9e31", "DetectTime": "2023-10-30T13:58:24.761034+02:00", "EventTime": "2023-10-30T13:58:24.761046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["ChzyBuBlrKc5FEUM2"]} -{"Format": "IDEA0", "ID": "ceb5d277-df64-4b19-9a93-6d640a9364b9", "DetectTime": "2023-10-30T13:58:24.804585+02:00", "EventTime": "2023-10-30T13:58:24.804604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cd6Vma1uqCbJ19Rmee"]} -{"Format": "IDEA0", "ID": "fca56e55-a9d6-4958-9626-0ccb0cb0bc64", "DetectTime": "2023-10-30T13:58:24.837445+02:00", "EventTime": "2023-10-30T13:58:24.837474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C46oAv4K1plN96cX4b"]} -{"Format": "IDEA0", "ID": "04a20c94-c03a-4df3-9051-9de279330466", "DetectTime": "2023-10-30T13:58:24.880777+02:00", "EventTime": "2023-10-30T13:58:24.880796+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C61Tw64R3cABJwPh8"]} -{"Format": "IDEA0", "ID": "51b993f4-73db-415f-8303-3cf436ccb179", "DetectTime": "2023-10-30T13:58:24.897811+02:00", "EventTime": "2023-10-30T13:58:24.897831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CGkeSo3GpintWJ7ste"]} -{"Format": "IDEA0", "ID": "cb47b7d9-1852-4ef5-bd6f-156aaac7248c", "DetectTime": "2023-10-30T13:58:24.940451+02:00", "EventTime": "2023-10-30T13:58:24.940466+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CScM0c27Z6bvdG98P2"]} -{"Format": "IDEA0", "ID": "90aef134-eb4d-4858-9e97-6132685e8e3e", "DetectTime": "2023-10-30T13:58:24.957973+02:00", "EventTime": "2023-10-30T13:58:24.957989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CyT4iG4wVHWOQg2PC2"]} -{"Format": "IDEA0", "ID": "72e6ad1f-6964-422a-b079-ff880e995abc", "DetectTime": "2023-10-30T13:58:25.006432+02:00", "EventTime": "2023-10-30T13:58:25.006454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CYp07v0MZTxVoiaPe"]} -{"Format": "IDEA0", "ID": "843bd0c0-2516-4960-bebd-3ebf14f09dc0", "DetectTime": "2023-10-30T13:58:25.055102+02:00", "EventTime": "2023-10-30T13:58:25.055127+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNez5g3Te18RQYv7zl"]} -{"Format": "IDEA0", "ID": "b50c3537-88eb-4611-ad5b-155090925d41", "DetectTime": "2023-10-30T13:58:25.072373+02:00", "EventTime": "2023-10-30T13:58:25.072399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. ", "ContentType": "text/plain"}], "uids": ["Cgmerp4tf1NggAGjCk"]} -{"Format": "IDEA0", "ID": "689de79a-214d-44dd-b64f-1d335902724b", "DetectTime": "2023-10-30T13:58:25.125851+02:00", "EventTime": "2023-10-30T13:58:25.125876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CkZ14p2PtJs8Jgrj29"]} -{"Format": "Json", "ID": "689de79a-214d-44dd-b64f-1d335902724b", "DetectTime": "2023-10-30T13:58:25.125851+02:00", "EventTime": "2023-10-30T13:58:25.125876+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:42:35.542670+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:25.208570)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c8f5a5dd-65df-4aab-b876-18996b0d5866", "DetectTime": "2023-10-30T13:58:25.215933+02:00", "EventTime": "2023-10-30T13:58:25.215954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CScM0c27Z6bvdG98P2", "CYE1nJ2xab6VzaJcbl", "CNn34j2R0GBjGw0BAd", "ChSIrhQOMsLmaKJE7"]} -{"Format": "IDEA0", "ID": "bdb5b9fb-56a2-400a-a89a-069fb53d049b", "DetectTime": "2023-10-30T13:58:25.236458+02:00", "EventTime": "2023-10-30T13:58:25.236478+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChSIrhQOMsLmaKJE7"]} -{"Format": "IDEA0", "ID": "c9077328-c7fc-428d-b3f9-c8a98309ce96", "DetectTime": "2023-10-30T13:58:25.254289+02:00", "EventTime": "2023-10-30T13:58:25.254314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. ", "ContentType": "text/plain"}], "uids": ["Ckv7gO1CMMhR6ZedD4"]} -{"Format": "IDEA0", "ID": "084e83f5-0fad-4195-9aaa-f34af3e7f3c8", "DetectTime": "2023-10-30T13:58:25.299312+02:00", "EventTime": "2023-10-30T13:58:25.299329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CuYC8d3mHDBALxMBZc"]} -{"Format": "IDEA0", "ID": "3f040d03-6780-436c-97ae-ab0a4dd78db6", "DetectTime": "2023-10-30T13:58:25.344774+02:00", "EventTime": "2023-10-30T13:58:25.344787+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkEzwS25tUEyO6OuWc"]} -{"Format": "IDEA0", "ID": "45f5e79e-752e-491f-a4c7-a2c0ec2f5c35", "DetectTime": "2023-10-30T13:58:25.362275+02:00", "EventTime": "2023-10-30T13:58:25.362289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CA4LQc3EAezHs1yZBc"]} -{"Format": "IDEA0", "ID": "366fba8c-63d6-44b3-a45e-85f56799494a", "DetectTime": "2023-10-30T13:58:25.406023+02:00", "EventTime": "2023-10-30T13:58:25.406041+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpfQDd2GUwXPfnEsCd"]} -{"Format": "IDEA0", "ID": "75f592a0-8816-41a9-b314-017a04e8dd1b", "DetectTime": "2023-10-30T13:58:25.422757+02:00", "EventTime": "2023-10-30T13:58:25.422796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CAByY44E8KtA4Dpfje"]} -{"Format": "IDEA0", "ID": "1ffad936-e631-4b1c-ab39-933d3f5de52b", "DetectTime": "2023-10-30T13:58:25.471652+02:00", "EventTime": "2023-10-30T13:58:25.471675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CL8VwO3xRpQqAc3IZ5"]} -{"Format": "IDEA0", "ID": "6e901aab-d6ce-4037-a89f-4eaa0ecd4248", "DetectTime": "2023-10-30T13:58:25.515811+02:00", "EventTime": "2023-10-30T13:58:25.515830+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSCPhgJi9eUA5uA4c"]} -{"Format": "IDEA0", "ID": "d1f729e4-ffab-4642-ba9f-b6216e8be74b", "DetectTime": "2023-10-30T13:58:25.531878+02:00", "EventTime": "2023-10-30T13:58:25.531903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["C0ZubxmmaqyMriNSc"]} -{"Format": "IDEA0", "ID": "665c0f3e-314f-4c8c-9ff6-80b9c0fa7451", "DetectTime": "2023-10-30T13:58:25.572401+02:00", "EventTime": "2023-10-30T13:58:25.572426+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJVnfhOOxE8K8Crf2"]} -{"Format": "IDEA0", "ID": "3a9f4177-cc8a-49f0-8d42-7d7cc306ec13", "DetectTime": "2023-10-30T13:58:25.588797+02:00", "EventTime": "2023-10-30T13:58:25.588814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CQdxRF4MUlwIsvyxxc"]} -{"Format": "IDEA0", "ID": "7e670a8e-5c70-42d5-bcaa-a48a2bc1df39", "DetectTime": "2023-10-30T13:58:25.633747+02:00", "EventTime": "2023-10-30T13:58:25.633772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25811], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. ", "ContentType": "text/plain"}], "uids": ["CrZyml0M9fkuFamNg"]} -{"Format": "Json", "ID": "7e670a8e-5c70-42d5-bcaa-a48a2bc1df39", "DetectTime": "2023-10-30T13:58:25.633747+02:00", "EventTime": "2023-10-30T13:58:25.633772+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25811], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:42:37.331091+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:25.805234)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c61e4b3c-bc58-4253-bc1d-72e7bb92a1b2", "DetectTime": "2023-10-30T13:58:25.817066+02:00", "EventTime": "2023-10-30T13:58:25.817096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["COhx9Y4DMsJbSoQj8"]} -{"Format": "IDEA0", "ID": "af72a071-75db-433d-8868-f466d2286de1", "DetectTime": "2023-10-30T13:58:25.871887+02:00", "EventTime": "2023-10-30T13:58:25.871915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["Ch8T3X3UUdru4kyZle"]} -{"Format": "IDEA0", "ID": "2f4e919d-7803-4583-9baf-19536c03e59c", "DetectTime": "2023-10-30T13:58:25.922004+02:00", "EventTime": "2023-10-30T13:58:25.922022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CUwIMw4kG97JwaEwSi"]} -{"Format": "IDEA0", "ID": "aa3494f0-98c5-4b5e-86c2-289186a3238c", "DetectTime": "2023-10-30T13:58:25.971504+02:00", "EventTime": "2023-10-30T13:58:25.971521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CZ6gVh9OsnIBgF7Eb"]} -{"Format": "IDEA0", "ID": "44d119c1-1a05-4430-839a-cb99debf387d", "DetectTime": "2023-10-30T13:58:26.020556+02:00", "EventTime": "2023-10-30T13:58:26.020581+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cryulu2CjeNPinEFqi"]} -{"Format": "IDEA0", "ID": "bd4ffcac-2e27-454d-8b2b-fec2d74e4ec3", "DetectTime": "2023-10-30T13:58:26.041425+02:00", "EventTime": "2023-10-30T13:58:26.041453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. ", "ContentType": "text/plain"}], "uids": ["Co1Ss22VXlbsuF5kdf"]} -{"Format": "IDEA0", "ID": "dcdc07f7-4ef7-468b-9f9c-3ae65691fd29", "DetectTime": "2023-10-30T13:58:26.093432+02:00", "EventTime": "2023-10-30T13:58:26.093459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CmEtHs2xsJhVqkVcFf"]} -{"Format": "IDEA0", "ID": "ef42c8e2-2928-4a11-af6a-ed98982b2333", "DetectTime": "2023-10-30T13:58:26.145279+02:00", "EventTime": "2023-10-30T13:58:26.145350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CSONBH1aqv5B9z1sNc"]} -{"Format": "IDEA0", "ID": "bac533f6-149b-4cf0-bb1f-084af748d13d", "DetectTime": "2023-10-30T13:58:26.191501+02:00", "EventTime": "2023-10-30T13:58:26.191517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["Cz96Ys2vJxGuz2s2n1"]} -{"Format": "Json", "ID": "bac533f6-149b-4cf0-bb1f-084af748d13d", "DetectTime": "2023-10-30T13:58:26.191501+02:00", "EventTime": "2023-10-30T13:58:26.191517+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:42:38.937632+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:26.271758)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ee8d4da3-65e4-4222-9373-a1f66383e784", "DetectTime": "2023-10-30T13:58:26.278317+02:00", "EventTime": "2023-10-30T13:58:26.278335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CADSSn3FlIjdbVVaZb"]} -{"Format": "IDEA0", "ID": "3b4478fa-9eda-4f9a-ad54-670b0f05e154", "DetectTime": "2023-10-30T13:58:26.334896+02:00", "EventTime": "2023-10-30T13:58:26.334949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CqdoboeBKphRJ7iwj"]} -{"Format": "IDEA0", "ID": "fb5b03c0-b447-434a-825e-6f496a7e4f16", "DetectTime": "2023-10-30T13:58:26.380474+02:00", "EventTime": "2023-10-30T13:58:26.380491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. ", "ContentType": "text/plain"}], "uids": ["Clsk8L105aIOox5he4"]} -{"Format": "IDEA0", "ID": "fcbda23e-24c4-46be-a48b-399abff7e07d", "DetectTime": "2023-10-30T13:58:26.433936+02:00", "EventTime": "2023-10-30T13:58:26.433952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["Cy0GTn1geU8GrjB4Zd"]} -{"Format": "IDEA0", "ID": "32dde842-7260-4cf3-ac35-ce2b4a58cf7a", "DetectTime": "2023-10-30T13:58:26.481615+02:00", "EventTime": "2023-10-30T13:58:26.481632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CT3J2klmLlv5eebo6"]} -{"Format": "IDEA0", "ID": "b3a9f7f4-2f00-448a-90be-7266f3573763", "DetectTime": "2023-10-30T13:58:26.534118+02:00", "EventTime": "2023-10-30T13:58:26.534145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. ", "ContentType": "text/plain"}], "uids": ["CihnOz3rjIY04AtTZj"]} -{"Format": "IDEA0", "ID": "d7e315bf-2481-42a3-8be9-dde3db8bdac7", "DetectTime": "2023-10-30T13:58:26.580844+02:00", "EventTime": "2023-10-30T13:58:26.580861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CX97hC2SPMPdpCUhQf"]} -{"Format": "IDEA0", "ID": "4d4a3e3d-9f66-48a5-8529-24632fb2499a", "DetectTime": "2023-10-30T13:58:26.629225+02:00", "EventTime": "2023-10-30T13:58:26.629244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20394], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. ", "ContentType": "text/plain"}], "uids": ["CdhFus1KGqh7tF3CFi"]} -{"Format": "Json", "ID": "4d4a3e3d-9f66-48a5-8529-24632fb2499a", "DetectTime": "2023-10-30T13:58:26.629225+02:00", "EventTime": "2023-10-30T13:58:26.629244+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20394], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T15:42:57.840402+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2023/10/30 13:58:26.737899)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ddda5f71-9b5f-404b-8102-a6d36c68612d", "DetectTime": "2023-10-30T13:58:26.747341+02:00", "EventTime": "2023-10-30T13:58:26.747361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CaWHa246YI85t96r4"]} -{"Format": "IDEA0", "ID": "32a8c999-8545-48b3-87f2-8cfa22606b2f", "DetectTime": "2023-10-30T13:58:26.839415+02:00", "EventTime": "2023-10-30T13:58:26.839436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CHt4dda3oZ6xTRB9k"]} -{"Format": "IDEA0", "ID": "b6fa3096-cfed-4d55-af0f-d6aad552017c", "DetectTime": "2023-10-30T13:58:26.937254+02:00", "EventTime": "2023-10-30T13:58:26.937277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CUxyIn3lgPdcBZtqq8"]} -{"Format": "IDEA0", "ID": "46123bc5-ddbc-489a-b567-34018ef6299a", "DetectTime": "2023-10-30T13:58:27.010643+02:00", "EventTime": "2023-10-30T13:58:27.010670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CO91f73WsE6nqBXbr6"]} -{"Format": "IDEA0", "ID": "e429c54b-af16-4dba-9a94-f055a3b66132", "DetectTime": "2023-10-30T13:58:27.086555+02:00", "EventTime": "2023-10-30T13:58:27.086577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CDbUPahNAroiSWVEc"]} -{"Format": "IDEA0", "ID": "5d0a1edc-8dc9-4ef4-afb4-d5ea18d9b85a", "DetectTime": "2023-10-30T13:58:27.160212+02:00", "EventTime": "2023-10-30T13:58:27.160238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CObz5t3lZEE2SFbXu9"]} -{"Format": "IDEA0", "ID": "c446b4dd-4d5f-4036-abe7-caec6aac6aab", "DetectTime": "2023-10-30T13:58:27.236755+02:00", "EventTime": "2023-10-30T13:58:27.236857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CRm4XR7dGn6pMMAp2"]} -{"Format": "Json", "ID": "c446b4dd-4d5f-4036-abe7-caec6aac6aab", "DetectTime": "2023-10-30T13:58:27.236755+02:00", "EventTime": "2023-10-30T13:58:27.236857+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:13:07.390777+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:27.374555)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5998d629-bb4b-44c1-85c5-ca60c6e3aaff", "DetectTime": "2023-10-30T13:58:27.381891+02:00", "EventTime": "2023-10-30T13:58:27.381908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26273], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. ", "ContentType": "text/plain"}], "uids": ["CRJwG54rDpCflNcyy2"]} -{"Format": "IDEA0", "ID": "6270c3fc-ef5e-4712-8483-568036819a8c", "DetectTime": "2023-10-30T13:58:27.462826+02:00", "EventTime": "2023-10-30T13:58:27.462847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["C5mxt03ocPFYuELkIc"]} -{"Format": "IDEA0", "ID": "757dcba6-917c-4d09-b252-c8e88cbf70aa", "DetectTime": "2023-10-30T13:58:27.545703+02:00", "EventTime": "2023-10-30T13:58:27.545804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["ChA9Ow4h5gfz5EQ2k6"]} -{"Format": "IDEA0", "ID": "02002b9a-4316-4bc5-a55c-777e4992218b", "DetectTime": "2023-10-30T13:58:27.610055+02:00", "EventTime": "2023-10-30T13:58:27.610077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CAlHmreUi6qLmOnTd"]} -{"Format": "IDEA0", "ID": "3aeac5e2-4a1e-45fc-946c-9fc304514afd", "DetectTime": "2023-10-30T13:58:27.679993+02:00", "EventTime": "2023-10-30T13:58:27.680017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CvV8RZ2sSQuG5PmvTg"]} -{"Format": "IDEA0", "ID": "d526de91-f127-4866-84b8-202fdc5725ca", "DetectTime": "2023-10-30T13:58:27.756295+02:00", "EventTime": "2023-10-30T13:58:27.756323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CJTPDhAyBRIRREEqh"]} -{"Format": "IDEA0", "ID": "eaf08d23-016c-4fd4-8f07-d9ce3628dcdf", "DetectTime": "2023-10-30T13:58:27.837960+02:00", "EventTime": "2023-10-30T13:58:27.837981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CEa5A33Us4gTUdiwK2"]} -{"Format": "IDEA0", "ID": "4272ac5f-6245-4526-aa46-8743dd37a6bf", "DetectTime": "2023-10-30T13:58:27.920278+02:00", "EventTime": "2023-10-30T13:58:27.920297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CD4EsH2eMLfbvtOOBd"]} -{"Format": "Json", "ID": "4272ac5f-6245-4526-aa46-8743dd37a6bf", "DetectTime": "2023-10-30T13:58:27.920278+02:00", "EventTime": "2023-10-30T13:58:27.920297+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:13:27.873912+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:28.024158)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "935508fe-22de-4466-940a-f2e631f4194b", "DetectTime": "2023-10-30T13:58:28.030831+02:00", "EventTime": "2023-10-30T13:58:28.030852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CzHalN133edrTKaX89"]} -{"Format": "IDEA0", "ID": "ed0a611a-e1e1-4fc1-a33b-28eee4bbdc74", "DetectTime": "2023-10-30T13:58:28.105267+02:00", "EventTime": "2023-10-30T13:58:28.105289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. ", "ContentType": "text/plain"}], "uids": ["C7tIN43BKNfBtZEH06"]} -{"Format": "IDEA0", "ID": "a17020d6-3e18-4c6e-8e37-e2779ac9d260", "DetectTime": "2023-10-30T13:58:28.167785+02:00", "EventTime": "2023-10-30T13:58:28.167806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CNzXU13lFA4gZzlCRf"]} -{"Format": "IDEA0", "ID": "cfe6047b-d9db-4900-95fb-1b6accfc6634", "DetectTime": "2023-10-30T13:58:28.223451+02:00", "EventTime": "2023-10-30T13:58:28.223469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CQGQ9j3nxfSImYznU2"]} -{"Format": "IDEA0", "ID": "7bc08d74-591a-42be-b829-7fe9235f4d53", "DetectTime": "2023-10-30T13:58:28.283379+02:00", "EventTime": "2023-10-30T13:58:28.283396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CI6bDZ2AOHt9aTqUXj"]} -{"Format": "IDEA0", "ID": "18e5354a-1c9c-49c7-bec7-1306614c5f62", "DetectTime": "2023-10-30T13:58:28.348563+02:00", "EventTime": "2023-10-30T13:58:28.348584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. ", "ContentType": "text/plain"}], "uids": ["CdhTwB4eIPYcqKiDqe"]} -{"Format": "IDEA0", "ID": "b8bf63b7-1178-42ea-8e89-d252ca055381", "DetectTime": "2023-10-30T13:58:28.408772+02:00", "EventTime": "2023-10-30T13:58:28.408799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["Cfy1Vl2scDMClbv4k1"]} -{"Format": "IDEA0", "ID": "79586988-2233-48c8-849a-69ea4a260118", "DetectTime": "2023-10-30T13:58:28.468430+02:00", "EventTime": "2023-10-30T13:58:28.468456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["CZWdqJci3O9UapdBi"]} -{"Format": "Json", "ID": "79586988-2233-48c8-849a-69ea4a260118", "DetectTime": "2023-10-30T13:58:28.468430+02:00", "EventTime": "2023-10-30T13:58:28.468456+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:13:29.795647+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:28.563889)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0a0aa7a3-d598-4941-bdf5-0535c5c658e9", "DetectTime": "2023-10-30T13:58:28.569832+02:00", "EventTime": "2023-10-30T13:58:28.569851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CWwp8amVxnbEbvjpc"]} -{"Format": "IDEA0", "ID": "c70ba0aa-cc25-4c5a-960b-e5c0159683c7", "DetectTime": "2023-10-30T13:58:28.633058+02:00", "EventTime": "2023-10-30T13:58:28.633076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CHKKC81YskBzDUDe3e"]} -{"Format": "IDEA0", "ID": "b7c496ef-d975-427d-a5b2-543c2435f7c2", "DetectTime": "2023-10-30T13:58:28.693440+02:00", "EventTime": "2023-10-30T13:58:28.693458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CW3cNh3CaLM6OmwHTk"]} -{"Format": "IDEA0", "ID": "602cf948-1592-4478-ba04-a7739b70c760", "DetectTime": "2023-10-30T13:58:28.749067+02:00", "EventTime": "2023-10-30T13:58:28.749085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CTQtWi20OrpOHRfr51"]} -{"Format": "IDEA0", "ID": "5eb12f40-b2b4-415e-bd55-387021e2d851", "DetectTime": "2023-10-30T13:58:28.812100+02:00", "EventTime": "2023-10-30T13:58:28.812126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CWZAQxNE7n5NCPW4k"]} -{"Format": "IDEA0", "ID": "9db482e5-13cf-4e06-ad14-5af383fd5515", "DetectTime": "2023-10-30T13:58:28.872509+02:00", "EventTime": "2023-10-30T13:58:28.872530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. ", "ContentType": "text/plain"}], "uids": ["CPpWr93sGyuKUnFgK2"]} -{"Format": "IDEA0", "ID": "7f691e43-326e-49e1-9b07-dd42da62a9d4", "DetectTime": "2023-10-30T13:58:28.934349+02:00", "EventTime": "2023-10-30T13:58:28.934367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CazXbj8xIQwSkUj78"]} -{"Format": "IDEA0", "ID": "8663fe9b-5dc1-4ec9-bda7-fb6ebbe6d70a", "DetectTime": "2023-10-30T13:58:28.993416+02:00", "EventTime": "2023-10-30T13:58:28.993442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CyY1sA1f7fOLxLnAVg"]} -{"Format": "Json", "ID": "8663fe9b-5dc1-4ec9-bda7-fb6ebbe6d70a", "DetectTime": "2023-10-30T13:58:28.993416+02:00", "EventTime": "2023-10-30T13:58:28.993442+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:13:47.293600+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:29.079807)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4cf5686e-79ff-4c48-a450-9fecd74250f6", "DetectTime": "2023-10-30T13:58:29.086041+02:00", "EventTime": "2023-10-30T13:58:29.086062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CVxpxU3FxzqE6GBWYc"]} -{"Format": "IDEA0", "ID": "402f4fa0-34b7-4b4f-b978-be8ad6341445", "DetectTime": "2023-10-30T13:58:29.145716+02:00", "EventTime": "2023-10-30T13:58:29.145738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CT6f8i2QaGlCTqzv61"]} -{"Format": "IDEA0", "ID": "baceaa8e-70a6-47cb-ae7c-a8da483cf45d", "DetectTime": "2023-10-30T13:58:29.212518+02:00", "EventTime": "2023-10-30T13:58:29.212536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CSGfBS1CLpf3dmNyyh"]} -{"Format": "IDEA0", "ID": "ac2f5592-c966-4854-bbaf-4d4714a7c0e9", "DetectTime": "2023-10-30T13:58:29.276033+02:00", "EventTime": "2023-10-30T13:58:29.276056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["C4S3fa27YhmpuBj2ic"]} -{"Format": "IDEA0", "ID": "215a4914-14dc-4fa0-8c75-8c00828d1f95", "DetectTime": "2023-10-30T13:58:29.345626+02:00", "EventTime": "2023-10-30T13:58:29.345646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["C7ccpJ37IDLU3SPC2"]} -{"Format": "IDEA0", "ID": "4c0ed3d1-7a2f-4780-b794-89863090efff", "DetectTime": "2023-10-30T13:58:29.400643+02:00", "EventTime": "2023-10-30T13:58:29.400656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["C8zdGh44YsEkyly2Pe"]} -{"Format": "IDEA0", "ID": "c5b327d6-86c3-4de9-a876-747b3171d402", "DetectTime": "2023-10-30T13:58:29.461071+02:00", "EventTime": "2023-10-30T13:58:29.461085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. ", "ContentType": "text/plain"}], "uids": ["CCf97U2uNPzft2Mau6"]} -{"Format": "IDEA0", "ID": "a4ee296a-a91c-4a5f-85d2-bb85723d60f4", "DetectTime": "2023-10-30T13:58:29.521972+02:00", "EventTime": "2023-10-30T13:58:29.521991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["CgFfa64BNkoUbmKHbl"]} -{"Format": "Json", "ID": "a4ee296a-a91c-4a5f-85d2-bb85723d60f4", "DetectTime": "2023-10-30T13:58:29.521972+02:00", "EventTime": "2023-10-30T13:58:29.521991+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:14:04.826804+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:29.716749)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7fb95244-f5d9-4fab-a980-4e14cd264fc8", "DetectTime": "2023-10-30T13:58:29.724731+02:00", "EventTime": "2023-10-30T13:58:29.724755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C4AFWE369OoTTzAukh"]} -{"Format": "IDEA0", "ID": "b83c8bed-f20e-4838-aa46-44bf8fe6b23a", "DetectTime": "2023-10-30T13:58:29.787559+02:00", "EventTime": "2023-10-30T13:58:29.787581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20394], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. ", "ContentType": "text/plain"}], "uids": ["Cx5qVm4O480i6qKUN8"]} -{"Format": "IDEA0", "ID": "e5f1065d-5a6e-461e-b4eb-fa2c2ee34d57", "DetectTime": "2023-10-30T13:58:29.846195+02:00", "EventTime": "2023-10-30T13:58:29.846214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CvPzCw30KjdzFxjFPc"]} -{"Format": "IDEA0", "ID": "8a31df25-ec84-4752-bdb0-39a47d63e515", "DetectTime": "2023-10-30T13:58:29.911259+02:00", "EventTime": "2023-10-30T13:58:29.911280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CpCUR63iOHUWNbiZal"]} -{"Format": "IDEA0", "ID": "829a38ee-9a2b-43bb-a9c0-27b81ae826e2", "DetectTime": "2023-10-30T13:58:30.007706+02:00", "EventTime": "2023-10-30T13:58:30.007736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["ClEu2P1iymTczZ5nPc"]} -{"Format": "IDEA0", "ID": "196b120a-d127-4111-9c53-53695a44b74e", "DetectTime": "2023-10-30T13:58:30.122647+02:00", "EventTime": "2023-10-30T13:58:30.122668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CWpCao42yI4tANCrcc"]} -{"Format": "IDEA0", "ID": "5e02b297-f66c-406f-99f8-72a1e8f57751", "DetectTime": "2023-10-30T13:58:30.205280+02:00", "EventTime": "2023-10-30T13:58:30.205296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CGHxug2LXuxLxZIJPi"]} -{"Format": "IDEA0", "ID": "df036396-d635-4d23-ac9d-49bf785e6da1", "DetectTime": "2023-10-30T13:58:30.265225+02:00", "EventTime": "2023-10-30T13:58:30.265246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CI1Ngybvn8G54Memk"]} -{"Format": "Json", "ID": "df036396-d635-4d23-ac9d-49bf785e6da1", "DetectTime": "2023-10-30T13:58:30.265225+02:00", "EventTime": "2023-10-30T13:58:30.265246+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:45:02.643176+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:30.368559)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d302cadd-143e-455d-a87d-b79c3891ce0c", "DetectTime": "2023-10-30T13:58:30.377386+02:00", "EventTime": "2023-10-30T13:58:30.377403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CZRfrL17RGO3JJLGM"]} -{"Format": "IDEA0", "ID": "1f5c8c16-bf7d-477b-925d-5faeb0bb3b5a", "DetectTime": "2023-10-30T13:58:30.437464+02:00", "EventTime": "2023-10-30T13:58:30.437482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CBNkvv41yhcylMreLd"]} -{"Format": "IDEA0", "ID": "99fa17c9-39d1-40a3-8b8a-9904eb382bcd", "DetectTime": "2023-10-30T13:58:30.489651+02:00", "EventTime": "2023-10-30T13:58:30.489674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CB87dV2PcwuK30OENj"]} -{"Format": "IDEA0", "ID": "c6392ce1-63de-4cff-b7dc-25ce91682185", "DetectTime": "2023-10-30T13:58:30.555523+02:00", "EventTime": "2023-10-30T13:58:30.555545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26273], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. ", "ContentType": "text/plain"}], "uids": ["CBWBQn20GKco6uPOT3"]} -{"Format": "IDEA0", "ID": "49d8c906-52b2-469f-9c77-48d579ec9b66", "DetectTime": "2023-10-30T13:58:30.611647+02:00", "EventTime": "2023-10-30T13:58:30.611673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["Cw7Nlp12LrCNqebfHg"]} -{"Format": "IDEA0", "ID": "6ff91ce2-0968-47a6-b649-e2fa0dd72cf2", "DetectTime": "2023-10-30T13:58:30.668234+02:00", "EventTime": "2023-10-30T13:58:30.668251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CCQEpalLuGcq6xUHh"]} -{"Format": "IDEA0", "ID": "1ba53996-0c53-423a-8796-2f263b8d3c42", "DetectTime": "2023-10-30T13:58:30.722015+02:00", "EventTime": "2023-10-30T13:58:30.722043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CEx6Vm4puTvxnI0P7j"]} -{"Format": "IDEA0", "ID": "5d6bf86c-2eac-41e4-bf9b-67937b90f3db", "DetectTime": "2023-10-30T13:58:30.778289+02:00", "EventTime": "2023-10-30T13:58:30.778307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CE2sKW3NCxxsX9gG0g"]} -{"Format": "Json", "ID": "5d6bf86c-2eac-41e4-bf9b-67937b90f3db", "DetectTime": "2023-10-30T13:58:30.778289+02:00", "EventTime": "2023-10-30T13:58:30.778307+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:45:04.816234+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:30.866946)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7c58fad2-6c11-4305-8f00-e940ab22ceee", "DetectTime": "2023-10-30T13:58:30.875916+02:00", "EventTime": "2023-10-30T13:58:30.875936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. ", "ContentType": "text/plain"}], "uids": ["C46bs01dFwULvbiB"]} -{"Format": "IDEA0", "ID": "6f68b273-c791-4999-8c79-62bd3763d9af", "DetectTime": "2023-10-30T13:58:30.935013+02:00", "EventTime": "2023-10-30T13:58:30.935030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CYVpY4icnLaEqkDkl"]} -{"Format": "IDEA0", "ID": "1d761695-f25a-4e28-8b96-f83c57c6ba8f", "DetectTime": "2023-10-30T13:58:30.983283+02:00", "EventTime": "2023-10-30T13:58:30.983302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4092], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. ", "ContentType": "text/plain"}], "uids": ["CdKCm339QLd2agcN9c"]} -{"Format": "IDEA0", "ID": "9565e609-0478-47fa-9599-1a9f8a3aee3a", "DetectTime": "2023-10-30T13:58:31.035718+02:00", "EventTime": "2023-10-30T13:58:31.035763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C5nZjS2PIGWxEb4nQ8"]} -{"Format": "IDEA0", "ID": "28898cfc-ed61-44b4-8fd4-458c65b2d17d", "DetectTime": "2023-10-30T13:58:31.085990+02:00", "EventTime": "2023-10-30T13:58:31.086019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["C2oBMkoo8Ii2EH111"]} -{"Format": "IDEA0", "ID": "41115f1e-28bb-4e46-9263-59769a94bbb4", "DetectTime": "2023-10-30T13:58:31.138261+02:00", "EventTime": "2023-10-30T13:58:31.138448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CtwmE326bz7AjkOPJl"]} -{"Format": "IDEA0", "ID": "16f77e06-6590-4777-990c-06e3f4a35bf7", "DetectTime": "2023-10-30T13:58:31.191420+02:00", "EventTime": "2023-10-30T13:58:31.191531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CxliSeMOr6rvaoPa3"]} -{"Format": "IDEA0", "ID": "c79eea43-8110-40d3-8139-7bce5e47904f", "DetectTime": "2023-10-30T13:58:31.238608+02:00", "EventTime": "2023-10-30T13:58:31.238630+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZQ5zT3yafal5HyFWb"]} -{"Format": "IDEA0", "ID": "c8d6d825-5384-4999-afe4-59049e41f8a6", "DetectTime": "2023-10-30T13:58:31.261625+02:00", "EventTime": "2023-10-30T13:58:31.261651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["CHq2lD377PkN0dpMA4"]} -{"Format": "Json", "ID": "c8d6d825-5384-4999-afe4-59049e41f8a6", "DetectTime": "2023-10-30T13:58:31.261625+02:00", "EventTime": "2023-10-30T13:58:31.261651+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:45:23.374791+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:31.346594)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8168e7a9-a806-4c04-9b90-96760b263a76", "DetectTime": "2023-10-30T13:58:31.354697+02:00", "EventTime": "2023-10-30T13:58:31.354853+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjukwN1LRLyxBasS4j"]} -{"Format": "IDEA0", "ID": "a61da2ca-2373-4d81-88e1-f86997790e64", "DetectTime": "2023-10-30T13:58:31.378010+02:00", "EventTime": "2023-10-30T13:58:31.378036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CHnvVq4DsrTyE78v27"]} -{"Format": "IDEA0", "ID": "bbccc0dc-3c78-4845-b79a-7343678a6f3b", "DetectTime": "2023-10-30T13:58:31.423735+02:00", "EventTime": "2023-10-30T13:58:31.423753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CkA8Kn1z3yQqp1wKw7"]} -{"Format": "IDEA0", "ID": "3ed82a58-504c-4fc7-a080-62a1065496ca", "DetectTime": "2023-10-30T13:58:31.475698+02:00", "EventTime": "2023-10-30T13:58:31.475972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["C6I8NuvMTIJrnrGzj"]} -{"Format": "IDEA0", "ID": "c6d5f494-cace-467b-8708-831d5a929c81", "DetectTime": "2023-10-30T13:58:31.528261+02:00", "EventTime": "2023-10-30T13:58:31.528324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIxo081MwY2cdvurdc", "CJVnfhOOxE8K8Crf2", "CZQ5zT3yafal5HyFWb", "CpfQDd2GUwXPfnEsCd"]} -{"Format": "IDEA0", "ID": "f6c0eadb-8952-416c-910d-2c0e02d2b745", "DetectTime": "2023-10-30T13:58:31.552352+02:00", "EventTime": "2023-10-30T13:58:31.552376+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIxo081MwY2cdvurdc"]} -{"Format": "IDEA0", "ID": "0d440d04-8c3d-4db0-b1fc-f3c11bf241b1", "DetectTime": "2023-10-30T13:58:31.575015+02:00", "EventTime": "2023-10-30T13:58:31.575034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["Citboo2qZZlua9QNlj"]} -{"Format": "IDEA0", "ID": "4f9d82d4-555a-4ff5-a380-7307570f932d", "DetectTime": "2023-10-30T13:58:31.619304+02:00", "EventTime": "2023-10-30T13:58:31.619326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CrNEae1Einid9ypUMa"]} -{"Format": "IDEA0", "ID": "d9fc56ae-5c46-4357-9091-3376f7a40ce2", "DetectTime": "2023-10-30T13:58:31.660045+02:00", "EventTime": "2023-10-30T13:58:31.660068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C98JSK10qvftPrw4w9"]} -{"Format": "IDEA0", "ID": "c3e8e771-147c-49aa-ab01-cf02685f2455", "DetectTime": "2023-10-30T13:58:31.679557+02:00", "EventTime": "2023-10-30T13:58:31.679573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CFJowr26jv7qNu5Dyc"]} -{"Format": "IDEA0", "ID": "78434ced-004c-4ea0-bd08-4934ea65800b", "DetectTime": "2023-10-30T13:58:31.720604+02:00", "EventTime": "2023-10-30T13:58:31.720626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C3Pes31vSDPOZuN43d"]} -{"Format": "IDEA0", "ID": "de907f6b-aaff-4e83-b3ae-4ad12e0f8da0", "DetectTime": "2023-10-30T13:58:31.765463+02:00", "EventTime": "2023-10-30T13:58:31.765488+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCNVfB2avDQqaGLXYa"]} -{"Format": "IDEA0", "ID": "cd813900-4211-488d-9f1d-6e9d97de0013", "DetectTime": "2023-10-30T13:58:31.785804+02:00", "EventTime": "2023-10-30T13:58:31.785824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CQz5v9VSAmUh4HwNd"]} -{"Format": "Json", "ID": "cd813900-4211-488d-9f1d-6e9d97de0013", "DetectTime": "2023-10-30T13:58:31.785804+02:00", "EventTime": "2023-10-30T13:58:31.785824+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:45:41.053536+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:31.863902)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b088b1a9-538d-4f7f-b18e-88417ff270d5", "DetectTime": "2023-10-30T13:58:31.871767+02:00", "EventTime": "2023-10-30T13:58:31.871790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CZgRbl111LmEVVCsP"]} -{"Format": "IDEA0", "ID": "f3a791b5-53c3-467b-9a17-4fc601cad940", "DetectTime": "2023-10-30T13:58:31.921400+02:00", "EventTime": "2023-10-30T13:58:31.921432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CWeeGZ1Ad7vbD1vtN2"]} -{"Format": "IDEA0", "ID": "06a8fb1a-1d62-47e0-bf30-7140704b0923", "DetectTime": "2023-10-30T13:58:31.963931+02:00", "EventTime": "2023-10-30T13:58:31.963954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["Cxx2ua3dSdrNC2lbef"]} -{"Format": "IDEA0", "ID": "0d0a12e4-950d-4fe9-bd5b-68501dc8efe0", "DetectTime": "2023-10-30T13:58:32.003367+02:00", "EventTime": "2023-10-30T13:58:32.003395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CuQnNW2iCMpCOIeDG1"]} -{"Format": "IDEA0", "ID": "92bbdf4e-4c70-4388-b3e8-3911935c4796", "DetectTime": "2023-10-30T13:58:32.047014+02:00", "EventTime": "2023-10-30T13:58:32.047038+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpsUr24Y1XFywVgdf5"]} -{"Format": "IDEA0", "ID": "0e0ceacb-74e4-4702-80eb-72ac95319537", "DetectTime": "2023-10-30T13:58:32.068808+02:00", "EventTime": "2023-10-30T13:58:32.068830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["C8LGrm4HAR358fyE95"]} -{"Format": "IDEA0", "ID": "e7b3a773-cd72-477c-874c-445a05664a74", "DetectTime": "2023-10-30T13:58:32.106661+02:00", "EventTime": "2023-10-30T13:58:32.106685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["Cr29oH3v3SndsJZYOc"]} -{"Format": "IDEA0", "ID": "8eda61da-2d37-4f69-9356-fdc48f6064ab", "DetectTime": "2023-10-30T13:58:32.152143+02:00", "EventTime": "2023-10-30T13:58:32.152171+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUKVeo2OwzCzJObn53"]} -{"Format": "IDEA0", "ID": "f2ca66f0-0e95-4be7-b4d5-76414e6a91d7", "DetectTime": "2023-10-30T13:58:32.174658+02:00", "EventTime": "2023-10-30T13:58:32.174715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["C9TNk61hGweXlE0CDf"]} -{"Format": "IDEA0", "ID": "623aa4c3-a84f-4f79-b453-3aefbc261547", "DetectTime": "2023-10-30T13:58:32.216964+02:00", "EventTime": "2023-10-30T13:58:32.216983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["ComWG339f6plRZHbvf"]} -{"Format": "Json", "ID": "623aa4c3-a84f-4f79-b453-3aefbc261547", "DetectTime": "2023-10-30T13:58:32.216964+02:00", "EventTime": "2023-10-30T13:58:32.216983+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T16:46:01.189292+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2023/10/30 13:58:32.296955)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9252a4c4-daaa-4dd0-b52a-c9f279241cb2", "DetectTime": "2023-10-30T13:58:32.303686+02:00", "EventTime": "2023-10-30T13:58:32.303702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CGvFxxkcbforTJCZ3"]} -{"Format": "IDEA0", "ID": "e9f79ad9-2a2c-4e53-885b-4fc3a2648392", "DetectTime": "2023-10-30T13:58:32.354720+02:00", "EventTime": "2023-10-30T13:58:32.354738+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiLL0VBHAFZrcalw9"]} -{"Format": "IDEA0", "ID": "456663db-03f2-4e19-b456-5d645c540e79", "DetectTime": "2023-10-30T13:58:32.379917+02:00", "EventTime": "2023-10-30T13:58:32.379940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. ", "ContentType": "text/plain"}], "uids": ["CQKX7o43YgPh3B9284"]} -{"Format": "IDEA0", "ID": "3745776e-ed65-4211-bfe7-058c1cd888ab", "DetectTime": "2023-10-30T13:58:32.403991+02:00", "EventTime": "2023-10-30T13:58:32.404016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CLINrU1sIYQ6Z4IDS6"]} -{"Format": "IDEA0", "ID": "be8c7d9f-f9bb-4456-b5c8-5767f143031d", "DetectTime": "2023-10-30T13:58:32.558007+02:00", "EventTime": "2023-10-30T13:58:32.558035+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKEvrc3Gu5g2LadpN"]} -{"Format": "IDEA0", "ID": "23b0ae64-3dab-4fa8-9c8a-d30b171698a1", "DetectTime": "2023-10-30T13:58:32.580890+02:00", "EventTime": "2023-10-30T13:58:32.580949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["C2uWdM1GGJTUiPZKq6"]} -{"Format": "IDEA0", "ID": "2639ce17-b5e2-4b2a-81e4-31889e8e2f49", "DetectTime": "2023-10-30T13:58:32.625849+02:00", "EventTime": "2023-10-30T13:58:32.625866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CfPwoU1KaOVPvQaCC4"]} -{"Format": "IDEA0", "ID": "1159b926-7039-4559-b4e6-ecd3d1510534", "DetectTime": "2023-10-30T13:58:32.670805+02:00", "EventTime": "2023-10-30T13:58:32.670823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["Cf5OwI1CvxzBSY1blj"]} -{"Format": "IDEA0", "ID": "08818d36-d2a4-44cc-8c07-5ebc58dfb55f", "DetectTime": "2023-10-30T13:58:32.714102+02:00", "EventTime": "2023-10-30T13:58:32.714120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["C5A9jO3FJmmtJM01q6"]} -{"Format": "IDEA0", "ID": "e0ffd4ca-f605-490f-8773-beb588a659ef", "DetectTime": "2023-10-30T13:58:32.759198+02:00", "EventTime": "2023-10-30T13:58:32.759216+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CE5PgB1pjTfivZbZnb"]} -{"Format": "IDEA0", "ID": "5752b38a-34c8-4f76-bd55-b349a9d3acdf", "DetectTime": "2023-10-30T13:58:32.783469+02:00", "EventTime": "2023-10-30T13:58:32.783537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CpEoqn3BryKoYmaW57"]} -{"Format": "IDEA0", "ID": "cd3dde9f-4f1e-4d4b-bc34-5acb11566cdf", "DetectTime": "2023-10-30T13:58:32.829521+02:00", "EventTime": "2023-10-30T13:58:32.829550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CIyc8e3QANcjpuoqI"]} -{"Format": "IDEA0", "ID": "71026c4c-2faa-4f0a-802d-cf61b91f1513", "DetectTime": "2023-10-30T13:58:32.875661+02:00", "EventTime": "2023-10-30T13:58:32.875682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CslLjr2jh9PSbcbuxf"]} -{"Format": "IDEA0", "ID": "1eeab9f6-1f4b-4022-9007-8111fa1ce8e8", "DetectTime": "2023-10-30T13:58:32.925191+02:00", "EventTime": "2023-10-30T13:58:32.925217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CoiTxRBBOgFMA1rb1"]} -{"Format": "IDEA0", "ID": "36b46a1f-43f1-4e1e-bc02-3341f9c7f762", "DetectTime": "2023-10-30T13:58:32.966006+02:00", "EventTime": "2023-10-30T13:58:32.966030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCNVfB2avDQqaGLXYa", "Ckucff1LSAAhdWyDS8", "CUKVeo2OwzCzJObn53", "CKEvrc3Gu5g2LadpN"]} -{"Format": "IDEA0", "ID": "d4da81fa-e743-41ed-a302-b9ec629cf81b", "DetectTime": "2023-10-30T13:58:32.990276+02:00", "EventTime": "2023-10-30T13:58:32.990303+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ckucff1LSAAhdWyDS8"]} -{"Format": "IDEA0", "ID": "0977349c-5b4b-41fd-b044-d819fff63bf5", "DetectTime": "2023-10-30T13:58:33.012158+02:00", "EventTime": "2023-10-30T13:58:33.012179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CiL4wU7TPinlndjL9"]} -{"Format": "IDEA0", "ID": "5e95b83e-b6eb-40a5-b22e-a06884d67d74", "DetectTime": "2023-10-30T13:58:33.058169+02:00", "EventTime": "2023-10-30T13:58:33.058192+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnGI5g2uEUeTmmdmlh"]} -{"Format": "IDEA0", "ID": "ca2be730-40ef-4f5f-afa4-755ac86f8bfc", "DetectTime": "2023-10-30T13:58:33.082944+02:00", "EventTime": "2023-10-30T13:58:33.082971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CEsgZF1DIU5ue1hDp3"]} -{"Format": "IDEA0", "ID": "88d01abf-2b68-451c-9b40-7e4c58a7dac7", "DetectTime": "2023-10-30T13:58:33.129415+02:00", "EventTime": "2023-10-30T13:58:33.129433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["C7rYGv2EEXF4FXYUO4"]} -{"Format": "IDEA0", "ID": "e2ed5ac4-9810-4542-9844-aac94b4841e2", "DetectTime": "2023-10-30T13:58:33.176014+02:00", "EventTime": "2023-10-30T13:58:33.176037+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CS3q2f1nGYupHixtvh"]} -{"Format": "IDEA0", "ID": "05b74e6e-0a9c-47a5-9527-4bd2343626a1", "DetectTime": "2023-10-30T13:58:33.200123+02:00", "EventTime": "2023-10-30T13:58:33.200138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["C1AnhB45xyMjKpxjC1"]} -{"Format": "IDEA0", "ID": "deaa85c5-5ac9-48ce-bbb5-5e4fa8bbc268", "DetectTime": "2023-10-30T13:58:33.244727+02:00", "EventTime": "2023-10-30T13:58:33.244743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CwRkWX133kQu253IUd"]} -{"Format": "IDEA0", "ID": "21780e22-af29-4459-9808-8ed7277c9cbb", "DetectTime": "2023-10-30T13:58:33.267416+02:00", "EventTime": "2023-10-30T13:58:33.267441+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUhIdq31O1VCl6xG44"]} -{"Format": "IDEA0", "ID": "04a9a32f-2045-44bb-a371-288564ecfbf9", "DetectTime": "2023-10-30T13:58:33.291917+02:00", "EventTime": "2023-10-30T13:58:33.291965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CLmcy64p61pWvYbcI6"]} -{"Format": "IDEA0", "ID": "2c071d9d-c864-47de-9dc9-6a9a746d607f", "DetectTime": "2023-10-30T13:58:33.335615+02:00", "EventTime": "2023-10-30T13:58:33.335636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["Cjk67F1IGAtsdy9P08"]} -{"Format": "IDEA0", "ID": "1d4db05d-f2aa-47bd-ae93-8e4bfbd3b9a5", "DetectTime": "2023-10-30T13:58:33.384373+02:00", "EventTime": "2023-10-30T13:58:33.384393+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Csm6kpSAWNF8euf6f"]} -{"Format": "IDEA0", "ID": "fea3aece-5828-4a35-a1b5-1410a854354d", "DetectTime": "2023-10-30T13:58:33.405742+02:00", "EventTime": "2023-10-30T13:58:33.405764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["Cyhhkt2mrXiaaVuju6"]} -{"Format": "IDEA0", "ID": "9423b41d-8360-46b0-845c-79f4854380ef", "DetectTime": "2023-10-30T13:58:33.454353+02:00", "EventTime": "2023-10-30T13:58:33.454382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CdAuKu2DvaRdDZTOeh"]} -{"Format": "IDEA0", "ID": "c9265fcc-c98d-4b6a-ac75-0d2fcaed9f84", "DetectTime": "2023-10-30T13:58:33.482851+02:00", "EventTime": "2023-10-30T13:58:33.482868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CEABkz2op0JzMLf1Pk"]} -{"Format": "IDEA0", "ID": "efbd41eb-39ab-40d6-859e-d92740e4482d", "DetectTime": "2023-10-30T13:58:33.529384+02:00", "EventTime": "2023-10-30T13:58:33.529399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CMtU7v2q0MudGPUkf2"]} -{"Format": "IDEA0", "ID": "42eafc69-386b-470e-ac18-4736159eda77", "DetectTime": "2023-10-30T13:58:33.575241+02:00", "EventTime": "2023-10-30T13:58:33.575261+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cgha6d1fdiD99o48S"]} -{"Format": "IDEA0", "ID": "c84f3ac2-9fbe-47a0-a65f-b40dbab6fe21", "DetectTime": "2023-10-30T13:58:33.603601+02:00", "EventTime": "2023-10-30T13:58:33.603625+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Clq9m319d9KGYYJDv2"]} -{"Format": "IDEA0", "ID": "2f9a7abc-2e91-4f07-a8c8-323d145798b3", "DetectTime": "2023-10-30T13:58:33.629377+02:00", "EventTime": "2023-10-30T13:58:33.629398+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPpHnW3qQgHiHEHrV2"]} -{"Format": "IDEA0", "ID": "a577e59e-f1a6-40eb-a9c7-112a1f54b8d9", "DetectTime": "2023-10-30T13:58:33.656394+02:00", "EventTime": "2023-10-30T13:58:33.656410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Clq9m319d9KGYYJDv2", "Csm6kpSAWNF8euf6f", "CaoqaJ2ZhBQfNmYSvl", "CS3q2f1nGYupHixtvh"]} -{"Format": "IDEA0", "ID": "373011e9-09e6-4718-8cb0-3487e5721c8d", "DetectTime": "2023-10-30T13:58:33.676292+02:00", "EventTime": "2023-10-30T13:58:33.676312+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaoqaJ2ZhBQfNmYSvl"]} -{"Format": "IDEA0", "ID": "2459ec7a-0896-4711-925e-f1d41e686c7a", "DetectTime": "2023-10-30T13:58:33.699370+02:00", "EventTime": "2023-10-30T13:58:33.699389+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5s3oZ3kvROJsfOZJ6"]} -{"Format": "IDEA0", "ID": "a63b7f3b-54d5-4c4a-a878-6e733f09caca", "DetectTime": "2023-10-30T13:58:33.722043+02:00", "EventTime": "2023-10-30T13:58:33.722060+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2xCMm2TVgYymcOIf7"]} -{"Format": "IDEA0", "ID": "305f983e-85b9-4e9f-a968-479c83f49751", "DetectTime": "2023-10-30T13:58:33.749390+02:00", "EventTime": "2023-10-30T13:58:33.749410+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CC88cz3q0pqwANm1dg"]} -{"Format": "IDEA0", "ID": "10dd15c6-0a6c-4c5d-aace-7e0af9f7f1b9", "DetectTime": "2023-10-30T13:58:33.771036+02:00", "EventTime": "2023-10-30T13:58:33.771057+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CajOaJ1nfl4QzVYUFl"]} -{"Format": "IDEA0", "ID": "baf895d7-59ea-4dd4-8d8f-7d2c6b0d654c", "DetectTime": "2023-10-30T13:58:33.792530+02:00", "EventTime": "2023-10-30T13:58:33.792549+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpN2Dc3ecblEtxhVK6"]} -{"Format": "IDEA0", "ID": "7ee7ba0d-dd03-497a-9524-7853e01ada6f", "DetectTime": "2023-10-30T13:58:33.812345+02:00", "EventTime": "2023-10-30T13:58:33.812394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CBTXvo2AQiFUiAkR3"]} -{"Format": "IDEA0", "ID": "e0892fbf-e65a-452e-bd3e-f48e60f3a152", "DetectTime": "2023-10-30T13:58:33.852418+02:00", "EventTime": "2023-10-30T13:58:33.852441+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7unmkNNZVU1c0FAa"]} -{"Format": "IDEA0", "ID": "d4dbef20-3d38-4e59-bffd-f5dcc5b2ed24", "DetectTime": "2023-10-30T13:58:33.873297+02:00", "EventTime": "2023-10-30T13:58:33.873316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CZl5tC1WwYHf0EZIJb"]} -{"Format": "IDEA0", "ID": "e2dabc44-7380-4ba2-a3bc-cc8409717d57", "DetectTime": "2023-10-30T13:58:33.898062+02:00", "EventTime": "2023-10-30T13:58:33.898081+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cd8xYe3AQjnThyqJoi"]} -{"Format": "IDEA0", "ID": "02f613ba-a2e9-4399-ad76-b796e536864b", "DetectTime": "2023-10-30T13:58:33.922270+02:00", "EventTime": "2023-10-30T13:58:33.922295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2xCMm2TVgYymcOIf7", "C7unmkNNZVU1c0FAa", "CSSirn1aUEwwUCIl8l", "CajOaJ1nfl4QzVYUFl"]} -{"Format": "IDEA0", "ID": "516e39f2-8d06-49ed-99b4-cd209262a5a2", "DetectTime": "2023-10-30T13:58:33.946445+02:00", "EventTime": "2023-10-30T13:58:33.946467+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSSirn1aUEwwUCIl8l"]} -{"Format": "IDEA0", "ID": "fb8e9b8b-362a-4ac6-9c5c-419c53673814", "DetectTime": "2023-10-30T13:58:33.975762+02:00", "EventTime": "2023-10-30T13:58:33.975780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["Cp5yFv4MksgVRoDl0d"]} -{"Format": "IDEA0", "ID": "c4ed8be3-100f-4dcc-bfd9-aa41053d6fc1", "DetectTime": "2023-10-30T13:58:34.012573+02:00", "EventTime": "2023-10-30T13:58:34.012590+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPpvxp4kCXP6nMi9e"]} -{"Format": "IDEA0", "ID": "d856f877-853e-4616-83fb-e426c02b1965", "DetectTime": "2023-10-30T13:58:34.041276+02:00", "EventTime": "2023-10-30T13:58:34.041303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cn396N1lZn2JPatw9j"]} -{"Format": "IDEA0", "ID": "9902babc-2b48-43d0-adf5-d5c587ddb763", "DetectTime": "2023-10-30T13:58:34.086032+02:00", "EventTime": "2023-10-30T13:58:34.086057+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjBcU11t0dPhHsNcm8"]} -{"Format": "IDEA0", "ID": "7b6e6b01-8ff4-4337-91c1-5a0c3950afd2", "DetectTime": "2023-10-30T13:58:34.108830+02:00", "EventTime": "2023-10-30T13:58:34.108857+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfJTuk3atum7ZXjXAh"]} -{"Format": "IDEA0", "ID": "985c1894-7ef5-4913-8c03-beb20db54261", "DetectTime": "2023-10-30T13:58:34.132790+02:00", "EventTime": "2023-10-30T13:58:34.132816+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5PUxY1VGMs3x2STAf"]} -{"Format": "IDEA0", "ID": "07aa7c62-336e-4a37-849b-90d5476cce97", "DetectTime": "2023-10-30T13:58:34.166283+02:00", "EventTime": "2023-10-30T13:58:34.166307+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUF9D44y3WpZddgt93"]} -{"Format": "IDEA0", "ID": "b60fb540-aea1-4f5c-a884-427d1afcce47", "DetectTime": "2023-10-30T13:58:34.197724+02:00", "EventTime": "2023-10-30T13:58:34.197762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CjUFC83m6spL4goW75"]} -{"Format": "IDEA0", "ID": "5320805c-d78d-4bc1-b4a2-a7fdaa11d24f", "DetectTime": "2023-10-30T13:58:34.233207+02:00", "EventTime": "2023-10-30T13:58:34.233235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CVcR4y2Lw76fGkuNa"]} -{"Format": "IDEA0", "ID": "719a5c5b-46b9-420d-8910-da3f2e9dcc4f", "DetectTime": "2023-10-30T13:58:34.274439+02:00", "EventTime": "2023-10-30T13:58:34.274464+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEIsqK5WZu60ZF2d4"]} -{"Format": "IDEA0", "ID": "dcbee8e0-ee9b-47e8-bcfa-23de8ba15969", "DetectTime": "2023-10-30T13:58:34.301280+02:00", "EventTime": "2023-10-30T13:58:34.301306+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBEWXW3OAEyGuofBl"]} -{"Format": "IDEA0", "ID": "0f993929-30c0-4385-868b-4e5e6625ed9d", "DetectTime": "2023-10-30T13:58:34.332505+02:00", "EventTime": "2023-10-30T13:58:34.332528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5PUxY1VGMs3x2STAf", "CjBcU11t0dPhHsNcm8", "CEIsqK5WZu60ZF2d4", "CN56fE3EJubAHDMXYf"]} -{"Format": "IDEA0", "ID": "527276b3-44e6-4a52-9406-33d06418eede", "DetectTime": "2023-10-30T13:58:34.362812+02:00", "EventTime": "2023-10-30T13:58:34.362847+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CN56fE3EJubAHDMXYf"]} -{"Format": "IDEA0", "ID": "c3909439-988f-400f-b226-a32966453a31", "DetectTime": "2023-10-30T13:58:34.396175+02:00", "EventTime": "2023-10-30T13:58:34.396198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CyT0TB2nh7JmCSI7Rj"]} -{"Format": "IDEA0", "ID": "b0ce7eda-56c1-4750-86f5-cd7e4ebf383b", "DetectTime": "2023-10-30T13:58:34.431220+02:00", "EventTime": "2023-10-30T13:58:34.431244+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiRKpx1tIViLWGjDub"]} -{"Format": "IDEA0", "ID": "5e308d85-22db-4756-a92f-ee6c09be3543", "DetectTime": "2023-10-30T13:58:34.459923+02:00", "EventTime": "2023-10-30T13:58:34.459941+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CglbW24qeOUP30KHBk"]} -{"Format": "IDEA0", "ID": "8715de03-d859-4b4d-8b63-52679f38a3d0", "DetectTime": "2023-10-30T13:58:34.485342+02:00", "EventTime": "2023-10-30T13:58:34.485457+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmTyMF32YQa1CFbkpc"]} -{"Format": "IDEA0", "ID": "783bbf94-d6a3-44c7-8ff5-6593656712cf", "DetectTime": "2023-10-30T13:58:34.510200+02:00", "EventTime": "2023-10-30T13:58:34.510225+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpkeTt1qnJjq3wd0O6"]} -{"Format": "IDEA0", "ID": "9017e569-67c8-4697-9832-2444dc8f2e70", "DetectTime": "2023-10-30T13:58:34.535423+02:00", "EventTime": "2023-10-30T13:58:34.535507+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpvHKP21TLoiav2ice"]} -{"Format": "IDEA0", "ID": "23a9394c-e92b-449c-ac77-e449a156e5fc", "DetectTime": "2023-10-30T13:58:34.557550+02:00", "EventTime": "2023-10-30T13:58:34.557567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CmIGC521khL3IIGFrk"]} -{"Format": "IDEA0", "ID": "2879b032-d8ca-4960-8d60-5491cc9ee40f", "DetectTime": "2023-10-30T13:58:34.588937+02:00", "EventTime": "2023-10-30T13:58:34.588957+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEEMiG1WS3xEpXiAR7"]} -{"Format": "IDEA0", "ID": "5791bbf0-a509-4786-9043-8f36d2b06d7f", "DetectTime": "2023-10-30T13:58:34.612239+02:00", "EventTime": "2023-10-30T13:58:34.612263+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKxQqOaZM7HY340E5"]} -{"Format": "IDEA0", "ID": "29b63c2b-a4c0-44fe-81f9-913993744491", "DetectTime": "2023-10-30T13:58:34.636434+02:00", "EventTime": "2023-10-30T13:58:34.636448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CtRjcJ1K0ZeYQmyiq5"]} -{"Format": "IDEA0", "ID": "31ecc9fd-809c-4a23-96c7-e2eb89746464", "DetectTime": "2023-10-30T13:58:34.670237+02:00", "EventTime": "2023-10-30T13:58:34.670253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cdfxbh1o6QK9yRLMci", "CglbW24qeOUP30KHBk", "CEEMiG1WS3xEpXiAR7", "CpkeTt1qnJjq3wd0O6"]} -{"Format": "IDEA0", "ID": "8d11182a-afa5-4263-818b-998a40123c25", "DetectTime": "2023-10-30T13:58:34.695133+02:00", "EventTime": "2023-10-30T13:58:34.695156+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cdfxbh1o6QK9yRLMci"]} -{"Format": "IDEA0", "ID": "1e9edd47-f398-41e8-9ad1-c7e68224cf2a", "DetectTime": "2023-10-30T13:58:34.718067+02:00", "EventTime": "2023-10-30T13:58:34.718086+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDhKJ71p1LjhxlgmE"]} -{"Format": "IDEA0", "ID": "91c362d4-dd94-4163-b452-d89c6fdf3b7b", "DetectTime": "2023-10-30T13:58:34.740330+02:00", "EventTime": "2023-10-30T13:58:34.740350+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CY8XT83EGp6q5f8LJ4"]} -{"Format": "IDEA0", "ID": "5920c1fd-f83e-49a5-bf06-d220a267d069", "DetectTime": "2023-10-30T13:58:34.765550+02:00", "EventTime": "2023-10-30T13:58:34.765562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CjcAj34NPo19mJepAi"]} -{"Format": "IDEA0", "ID": "ce066996-7b90-40c0-96e0-0e4d1a5c1dc6", "DetectTime": "2023-10-30T13:58:34.806090+02:00", "EventTime": "2023-10-30T13:58:34.806115+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBBgJC1NPBqFjWz2I5"]} -{"Format": "IDEA0", "ID": "a558f491-f26c-48c1-b6bc-7adb68c8ed94", "DetectTime": "2023-10-30T13:58:34.828057+02:00", "EventTime": "2023-10-30T13:58:34.828077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CoxGko1gtuoNpJJzag"]} -{"Format": "IDEA0", "ID": "46d8dbb1-d431-4fc2-9a95-0316cb6b50f8", "DetectTime": "2023-10-30T13:58:34.866108+02:00", "EventTime": "2023-10-30T13:58:34.866135+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCEszo2rrjrRHChj6e"]} -{"Format": "IDEA0", "ID": "02cb7b5b-21d3-40f1-b9a2-7de37b9e0d35", "DetectTime": "2023-10-30T13:58:34.892971+02:00", "EventTime": "2023-10-30T13:58:34.892994+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRThDp4woFsiPe9Bkh"]} -{"Format": "IDEA0", "ID": "2555798f-6d57-470d-96d4-df35c549b3db", "DetectTime": "2023-10-30T13:58:34.922151+02:00", "EventTime": "2023-10-30T13:58:34.922176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["Cvh7H94BMCD2ZZRki2"]} -{"Format": "IDEA0", "ID": "c9607c3c-b529-4498-848c-98e6a4b03505", "DetectTime": "2023-10-30T13:58:34.954881+02:00", "EventTime": "2023-10-30T13:58:34.954900+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEQpQM2lXMyVGUD0Kc"]} -{"Format": "IDEA0", "ID": "8ccb0d2d-88dc-44ed-b085-f08b0d40dfd8", "DetectTime": "2023-10-30T13:58:34.976952+02:00", "EventTime": "2023-10-30T13:58:34.976972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CAXgDt2fLq2BC7AKVa"]} -{"Format": "IDEA0", "ID": "040a1d0f-bf28-401f-a731-371cba1e2033", "DetectTime": "2023-10-30T13:58:35.008534+02:00", "EventTime": "2023-10-30T13:58:35.008552+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYdK373pBVUK14GI5a"]} -{"Format": "IDEA0", "ID": "074d81f0-7bbc-4369-a959-b0111e43563c", "DetectTime": "2023-10-30T13:58:35.036690+02:00", "EventTime": "2023-10-30T13:58:35.036716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CEQpQM2lXMyVGUD0Kc", "CCEszo2rrjrRHChj6e", "CD9u0wJKWsi2W6pKk", "CY8XT83EGp6q5f8LJ4"]} -{"Format": "IDEA0", "ID": "5523c529-9a49-4a35-a1f1-0aabe13aa1f6", "DetectTime": "2023-10-30T13:58:35.062361+02:00", "EventTime": "2023-10-30T13:58:35.062382+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CD9u0wJKWsi2W6pKk"]} -{"Format": "IDEA0", "ID": "26100da1-7eb8-45a8-8d30-6c5a45e5134c", "DetectTime": "2023-10-30T13:58:35.089312+02:00", "EventTime": "2023-10-30T13:58:35.089330+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CA1rQr1iHGeKaqWOT6"]} -{"Format": "IDEA0", "ID": "b34ae332-6e29-4f26-8563-c4f657f17543", "DetectTime": "2023-10-30T13:58:35.127429+02:00", "EventTime": "2023-10-30T13:58:35.127448+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLLoC21cmZMc5zP73"]} -{"Format": "IDEA0", "ID": "aa19639a-60b4-40fb-b46f-08c5411c81b4", "DetectTime": "2023-10-30T13:58:35.162322+02:00", "EventTime": "2023-10-30T13:58:35.162345+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWkIFr1RsD4ZVGUtYg"]} -{"Format": "IDEA0", "ID": "e35a42d8-676d-478b-af82-08bfcd3824dd", "DetectTime": "2023-10-30T13:58:35.193080+02:00", "EventTime": "2023-10-30T13:58:35.193096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CygRWl4Ks3j6ppaLNk"]} -{"Format": "IDEA0", "ID": "e255f071-e545-4691-b56e-c630088d15b7", "DetectTime": "2023-10-30T13:58:35.237796+02:00", "EventTime": "2023-10-30T13:58:35.237819+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBLScJAI0ummTQH4i"]} -{"Format": "IDEA0", "ID": "6d3d401f-59ce-4b57-9b27-14b87d9d7559", "DetectTime": "2023-10-30T13:58:35.265677+02:00", "EventTime": "2023-10-30T13:58:35.265692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CC2SG23Wf02ErWvWY1"]} -{"Format": "IDEA0", "ID": "baf8b727-568d-4836-bdf9-da8fc7ca9e89", "DetectTime": "2023-10-30T13:58:35.301267+02:00", "EventTime": "2023-10-30T13:58:35.301290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CUfo0v2PKPjzundEWk"]} -{"Format": "IDEA0", "ID": "72771b77-36ff-44bf-88d1-9c185bb6e44c", "DetectTime": "2023-10-30T13:58:35.337826+02:00", "EventTime": "2023-10-30T13:58:35.337887+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHbaVj3qr53DMJuLmd"]} -{"Format": "IDEA0", "ID": "71d051a6-b254-4eff-98c2-fbe9bf6e32f8", "DetectTime": "2023-10-30T13:58:35.363175+02:00", "EventTime": "2023-10-30T13:58:35.363194+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5C5jU2I7MbzVMSi3d"]} -{"Format": "IDEA0", "ID": "01c1fdb1-21af-4a15-b9f3-1abf78fcf4b7", "DetectTime": "2023-10-30T13:58:35.385737+02:00", "EventTime": "2023-10-30T13:58:35.385756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["Cm4BEw3Ar2HMQjVVDe"]} -{"Format": "IDEA0", "ID": "54ffdbb1-2222-4645-bca2-472992a62520", "DetectTime": "2023-10-30T13:58:35.417646+02:00", "EventTime": "2023-10-30T13:58:35.417717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["CocUflJ8pXnqXzRS4"]} -{"Format": "IDEA0", "ID": "62928bed-6df8-42fe-b49f-ec8190ed7172", "DetectTime": "2023-10-30T13:58:35.449619+02:00", "EventTime": "2023-10-30T13:58:35.449636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["Cnf44a4KNS9wRODNWe"]} -{"Format": "IDEA0", "ID": "9ec783dc-feac-45e6-90df-71210b504f73", "DetectTime": "2023-10-30T13:58:35.481408+02:00", "EventTime": "2023-10-30T13:58:35.481434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["ChpLn84BEGI356UXYk"]} -{"Format": "IDEA0", "ID": "d0693f1a-b757-4d67-aa47-5bed05907b85", "DetectTime": "2023-10-30T13:58:35.522641+02:00", "EventTime": "2023-10-30T13:58:35.522668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CMcJWE4rU4oYl6hpN5"]} -{"Format": "IDEA0", "ID": "d4a4cdfa-e2b9-4dbb-b7b3-29b22e5d9127", "DetectTime": "2023-10-30T13:58:35.560993+02:00", "EventTime": "2023-10-30T13:58:35.561015+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CExnay1OxT9vImI3W"]} -{"Format": "IDEA0", "ID": "016969bd-73af-4a4b-8a66-557ee4d816fc", "DetectTime": "2023-10-30T13:58:35.584882+02:00", "EventTime": "2023-10-30T13:58:35.584899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["C7YExL3I0DQXqcKH4f"]} -{"Format": "IDEA0", "ID": "9c814dbf-bfa3-4475-9f92-021f4232308e", "DetectTime": "2023-10-30T13:58:35.615529+02:00", "EventTime": "2023-10-30T13:58:35.615544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CetyDB1Hxg9pVbiGi2"]} -{"Format": "IDEA0", "ID": "5168e1b8-247a-4940-8211-d6bb1edc5d45", "DetectTime": "2023-10-30T13:58:35.636707+02:00", "EventTime": "2023-10-30T13:58:35.636728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLLoC21cmZMc5zP73", "CBLScJAI0ummTQH4i", "CiIjFjvUHvUNb4Wa2", "C5C5jU2I7MbzVMSi3d"]} -{"Format": "IDEA0", "ID": "1731fa74-65da-42e4-aad4-f143227123b8", "DetectTime": "2023-10-30T13:58:35.664268+02:00", "EventTime": "2023-10-30T13:58:35.664288+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiIjFjvUHvUNb4Wa2"]} -{"Format": "IDEA0", "ID": "fc802952-c97e-43ea-8e8e-797f656c2b8a", "DetectTime": "2023-10-30T13:58:35.688258+02:00", "EventTime": "2023-10-30T13:58:35.688283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CPo8Uo3lgQSrZnasq2"]} -{"Format": "IDEA0", "ID": "95cb9521-00a8-48b0-87a7-21c3c3a4f665", "DetectTime": "2023-10-30T13:58:35.718583+02:00", "EventTime": "2023-10-30T13:58:35.718602+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClFgosgQk3AIYSOD8"]} -{"Format": "IDEA0", "ID": "2874ebcb-5e01-4359-bfc2-984124b060b9", "DetectTime": "2023-10-30T13:58:35.746140+02:00", "EventTime": "2023-10-30T13:58:35.746184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CodOXQ1hG6RtD73NB4"]} -{"Format": "IDEA0", "ID": "5136bf42-6a3d-49f9-a617-0133a1ad4842", "DetectTime": "2023-10-30T13:58:35.771208+02:00", "EventTime": "2023-10-30T13:58:35.771230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C8UdESZl8C3P75qFi"]} -{"Format": "IDEA0", "ID": "be7b0c00-e21a-4791-a423-88f47ef83284", "DetectTime": "2023-10-30T13:58:35.803476+02:00", "EventTime": "2023-10-30T13:58:35.803497+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQ4Y851A65BBokCXe5"]} -{"Format": "IDEA0", "ID": "2f329d5b-02c9-4356-b56b-444776551e70", "DetectTime": "2023-10-30T13:58:35.828375+02:00", "EventTime": "2023-10-30T13:58:35.828394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["C1tu8K3AuiQMbFdKE2"]} -{"Format": "IDEA0", "ID": "d65c1d96-56c4-4d11-917b-c12aecd760e5", "DetectTime": "2023-10-30T13:58:35.863079+02:00", "EventTime": "2023-10-30T13:58:35.863101+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9AF0wkWLgDWekWUi"]} -{"Format": "IDEA0", "ID": "dee81c94-fd20-446e-aacc-61e7c91c023c", "DetectTime": "2023-10-30T13:58:35.888603+02:00", "EventTime": "2023-10-30T13:58:35.888625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.72.103.199 ", "ContentType": "text/plain"}], "uids": ["Cw396K0BcQ2E64Nd4"]} -{"Format": "IDEA0", "ID": "6c19761d-186c-44f8-897e-068d5b5277e0", "DetectTime": "2023-10-30T13:58:35.918261+02:00", "EventTime": "2023-10-30T13:58:35.918278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CvYUgU3gZ4kxiNARPb"]} -{"Format": "IDEA0", "ID": "5a9d2beb-6345-41ee-9b35-a59dce1f4691", "DetectTime": "2023-10-30T13:58:35.951683+02:00", "EventTime": "2023-10-30T13:58:35.951701+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cp9Rls4xw0BZp9NYOc"]} -{"Format": "IDEA0", "ID": "f38999a5-da1c-409c-b090-4d774479401e", "DetectTime": "2023-10-30T13:58:36.076546+02:00", "EventTime": "2023-10-30T13:58:36.076588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["CqnTfE3Lu3VJolrjnb"]} -{"Format": "IDEA0", "ID": "56536067-7dd5-4e95-ba66-3b491a5501d6", "DetectTime": "2023-10-30T13:58:36.117934+02:00", "EventTime": "2023-10-30T13:58:36.117951+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeoGqa4I7VGGhJsHl"]} -{"Format": "IDEA0", "ID": "617c6149-4934-4966-95b0-7d90e52de7d6", "DetectTime": "2023-10-30T13:58:36.145916+02:00", "EventTime": "2023-10-30T13:58:36.145939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cwtxhb1ugXwhhkmwJ5"]} -{"Format": "IDEA0", "ID": "8cab2c8e-355e-438c-8471-7869a65f3368", "DetectTime": "2023-10-30T13:58:36.174899+02:00", "EventTime": "2023-10-30T13:58:36.174920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.248.65 ", "ContentType": "text/plain"}], "uids": ["Cg3b2f1Qe9zJbbT7D3"]} -{"Format": "IDEA0", "ID": "b7608d01-65b2-4278-b9b0-52545bdbb79e", "DetectTime": "2023-10-30T13:58:36.214086+02:00", "EventTime": "2023-10-30T13:58:36.214111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CKrVPG25UYvQD5Rkck"]} -{"Format": "IDEA0", "ID": "34d48738-9197-4b09-8163-343ac5f5f522", "DetectTime": "2023-10-30T13:58:36.251671+02:00", "EventTime": "2023-10-30T13:58:36.251689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CYY38H3zYEheoPdQR1"]} -{"Format": "IDEA0", "ID": "27d9dca9-6c2f-42dc-8640-a9027a3547d7", "DetectTime": "2023-10-30T13:58:36.287699+02:00", "EventTime": "2023-10-30T13:58:36.287726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CeoGqa4I7VGGhJsHl", "CodOXQ1hG6RtD73NB4", "CltnmSlXF3XIo1Wja", "C9AF0wkWLgDWekWUi"]} -{"Format": "IDEA0", "ID": "d8118bd4-d12e-4430-a7cc-c49787fa3c03", "DetectTime": "2023-10-30T13:58:36.315718+02:00", "EventTime": "2023-10-30T13:58:36.315738+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CltnmSlXF3XIo1Wja"]} -{"Format": "IDEA0", "ID": "575dcc37-5215-4467-aa01-df42f80025e1", "DetectTime": "2023-10-30T13:58:36.343328+02:00", "EventTime": "2023-10-30T13:58:36.343346+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnYhi63nJCgTVKUcZi"]} -{"Format": "IDEA0", "ID": "0f0c8ba4-77d1-454c-ade0-f82362967644", "DetectTime": "2023-10-30T13:58:36.372683+02:00", "EventTime": "2023-10-30T13:58:36.372703+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyhQCCxhhZ6c6jgc4"]} -{"Format": "IDEA0", "ID": "de7a6ef9-7e02-4fde-b3ca-0e104d0e6fed", "DetectTime": "2023-10-30T13:58:36.405525+02:00", "EventTime": "2023-10-30T13:58:36.405545+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIgbeD3svEr01IXDq8"]} -{"Format": "IDEA0", "ID": "7b1a82b7-977c-4385-ba9d-856c57f137c7", "DetectTime": "2023-10-30T13:58:36.432643+02:00", "EventTime": "2023-10-30T13:58:36.432665+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3wjp7418WeTsGtnff"]} -{"Format": "IDEA0", "ID": "62bc5867-1afc-4a84-8bd4-f161c597660b", "DetectTime": "2023-10-30T13:58:36.460764+02:00", "EventTime": "2023-10-30T13:58:36.460789+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7dxpu2Vp03dceyqb9"]} -{"Format": "IDEA0", "ID": "fc44a234-b116-40e3-8c34-4ad30f184501", "DetectTime": "2023-10-30T13:58:36.490595+02:00", "EventTime": "2023-10-30T13:58:36.490618+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cyw0AL1kRyds913ef9"]} -{"Format": "IDEA0", "ID": "17fb3bbe-8d73-488c-9877-f05457839e48", "DetectTime": "2023-10-30T13:58:36.516828+02:00", "EventTime": "2023-10-30T13:58:36.516846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["Cnou844kEBMYIdClRf"]} -{"Format": "IDEA0", "ID": "7a27380d-f8f2-474d-a245-f23b5161bb59", "DetectTime": "2023-10-30T13:58:36.552892+02:00", "EventTime": "2023-10-30T13:58:36.552914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CK8qUe1J98cAGkqzI"]} -{"Format": "IDEA0", "ID": "c7b0f383-2f46-45d0-bc7e-7d9d6dd849b2", "DetectTime": "2023-10-30T13:58:36.592301+02:00", "EventTime": "2023-10-30T13:58:36.592328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CeCC2o1cchY9KDYJuk"]} -{"Format": "IDEA0", "ID": "0a51280e-eae8-4e3c-9b85-1ad575d45b1c", "DetectTime": "2023-10-30T13:58:36.631679+02:00", "EventTime": "2023-10-30T13:58:36.631698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["C1qkAZ2wi5d6p7qChh"]} -{"Format": "IDEA0", "ID": "adc304d4-2a0d-4803-9c41-49a7543f3f43", "DetectTime": "2023-10-30T13:58:36.672623+02:00", "EventTime": "2023-10-30T13:58:36.672643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CZ0sCG33xM84qBMbCe"]} -{"Format": "IDEA0", "ID": "2ddc1b49-7303-4368-b2d2-0136a81eb3c4", "DetectTime": "2023-10-30T13:58:36.712310+02:00", "EventTime": "2023-10-30T13:58:36.712335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CUos7p4VnWuMUfVHmd"]} -{"Format": "IDEA0", "ID": "eaa4f94f-441f-4fe5-84ac-591d2061f506", "DetectTime": "2023-10-30T13:58:36.755747+02:00", "EventTime": "2023-10-30T13:58:36.755771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CuR2NvRWusgDhEfU7"]} -{"Format": "IDEA0", "ID": "997f94f1-63ff-4720-a3bd-51aa2c931607", "DetectTime": "2023-10-30T13:58:36.789917+02:00", "EventTime": "2023-10-30T13:58:36.789930+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZCGe74PyQXo2PDhcd"]} -{"Format": "IDEA0", "ID": "f9ef36dd-4b94-4c70-a237-59035d188e79", "DetectTime": "2023-10-30T13:58:36.817695+02:00", "EventTime": "2023-10-30T13:58:36.817733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.24.79.246 ", "ContentType": "text/plain"}], "uids": ["CYouxD1xNVqGCP0qff"]} -{"Format": "IDEA0", "ID": "5161d845-6733-476f-a1f3-04bc569581d3", "DetectTime": "2023-10-30T13:58:36.855989+02:00", "EventTime": "2023-10-30T13:58:36.856006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C3wjp7418WeTsGtnff", "CyhQCCxhhZ6c6jgc4", "Cyw0AL1kRyds913ef9", "CvTTep4c7jnJYnNBT3"]} -{"Format": "IDEA0", "ID": "cd65c0c1-e7ca-4b43-921f-851622568af4", "DetectTime": "2023-10-30T13:58:36.870899+02:00", "EventTime": "2023-10-30T13:58:36.870923+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvTTep4c7jnJYnNBT3"]} -{"Format": "IDEA0", "ID": "3a7457ae-e28b-46a3-b2e6-ab319ccaee75", "DetectTime": "2023-10-30T13:58:36.885400+02:00", "EventTime": "2023-10-30T13:58:36.885419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQMWxY1Kw7wlo4vCY6"]} -{"Format": "IDEA0", "ID": "414a0f24-c310-4921-95e0-a66f4e9ddb68", "DetectTime": "2023-10-30T13:58:36.897726+02:00", "EventTime": "2023-10-30T13:58:36.897743+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjmtGm1vWbVJemSO02"]} -{"Format": "IDEA0", "ID": "36d15dbf-6448-434e-b3b9-13f994f06c39", "DetectTime": "2023-10-30T13:58:36.911967+02:00", "EventTime": "2023-10-30T13:58:36.912008+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVmcW94lfE3iXfEAGl"]} -{"Format": "IDEA0", "ID": "cb85af95-7405-4087-8829-7ad1e16d40a6", "DetectTime": "2023-10-30T13:58:36.931292+02:00", "EventTime": "2023-10-30T13:58:36.931307+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClyCNgu6OF6aq0H0l"]} -{"Format": "IDEA0", "ID": "0e378259-40ae-4828-8a2b-f6af9d39e518", "DetectTime": "2023-10-30T13:58:36.946927+02:00", "EventTime": "2023-10-30T13:58:36.946956+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRdXoF2msIM6qvJ1c8"]} -{"Format": "IDEA0", "ID": "92c8e261-a0dd-428e-a500-d31a7466ed15", "DetectTime": "2023-10-30T13:58:36.962195+02:00", "EventTime": "2023-10-30T13:58:36.962221+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDNbK11EfX6yQkuFB"]} -{"Format": "IDEA0", "ID": "502a0cb9-c658-43a5-a56e-d56d86388e5d", "DetectTime": "2023-10-30T13:58:36.975110+02:00", "EventTime": "2023-10-30T13:58:36.975136+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBMmiW2YgUJU4NWrpf"]} -{"Format": "IDEA0", "ID": "ef17cf26-a833-47a7-82c7-c3024148a972", "DetectTime": "2023-10-30T13:58:36.993619+02:00", "EventTime": "2023-10-30T13:58:36.993638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CB0aNy4YsJev4Vp19d"]} -{"Format": "IDEA0", "ID": "c22ad212-d6f1-4f33-a6d0-8e886a798fa5", "DetectTime": "2023-10-30T13:58:37.040587+02:00", "EventTime": "2023-10-30T13:58:37.040606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cnlp8p3LDoHbGoSJHl", "CjmtGm1vWbVJemSO02", "ClyCNgu6OF6aq0H0l", "CDNbK11EfX6yQkuFB"]} -{"Format": "IDEA0", "ID": "c8e882a3-fa77-492a-b2d2-166c867f71d7", "DetectTime": "2023-10-30T13:58:37.055885+02:00", "EventTime": "2023-10-30T13:58:37.055940+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cnlp8p3LDoHbGoSJHl"]} -{"Format": "IDEA0", "ID": "3396a0c5-d8d8-443a-966a-1c1250a56ef6", "DetectTime": "2023-10-30T13:58:37.073224+02:00", "EventTime": "2023-10-30T13:58:37.073244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CS9dT11XWuVr5Bwp9d"]} -{"Format": "IDEA0", "ID": "64df57e6-8142-4451-89ab-92161680b137", "DetectTime": "2023-10-30T13:58:37.116758+02:00", "EventTime": "2023-10-30T13:58:37.116781+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7M1MJ3g41Doyw4TJb"]} -{"Format": "IDEA0", "ID": "1d1ede9b-7cf4-42df-9374-cea6169a0853", "DetectTime": "2023-10-30T13:58:37.132099+02:00", "EventTime": "2023-10-30T13:58:37.132121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 222.124.64.87 ", "ContentType": "text/plain"}], "uids": ["CCX2e54XnA9PSyCMM"]} -{"Format": "IDEA0", "ID": "1a4e6c48-f603-47ea-9780-482814face30", "DetectTime": "2023-10-30T13:58:37.169973+02:00", "EventTime": "2023-10-30T13:58:37.170001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuqKn04no2JBgnQCW5"]} -{"Format": "IDEA0", "ID": "ea8e6716-3d43-4cda-becb-d8779eeeacaa", "DetectTime": "2023-10-30T13:58:37.187978+02:00", "EventTime": "2023-10-30T13:58:37.188006+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CancOP3t1tIroy3Qi6"]} -{"Format": "IDEA0", "ID": "398ec200-edf2-4a6e-81da-29dd91efbbeb", "DetectTime": "2023-10-30T13:58:37.203326+02:00", "EventTime": "2023-10-30T13:58:37.203345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CiISWW2jL5kpSw0qg2"]} -{"Format": "IDEA0", "ID": "d9e23b7f-3c9a-458e-b9ff-426c2c6e1992", "DetectTime": "2023-10-30T13:58:37.245488+02:00", "EventTime": "2023-10-30T13:58:37.245514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CqU6Xe3XnzOmJhClDh"]} -{"Format": "IDEA0", "ID": "fffe9ef8-18d8-4262-abb9-1174df9ad195", "DetectTime": "2023-10-30T13:58:37.283777+02:00", "EventTime": "2023-10-30T13:58:37.283804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CP6fURuGFoOWEQyFg"]} -{"Format": "IDEA0", "ID": "94bcee87-9663-4b45-b0e5-6e292a2b9c12", "DetectTime": "2023-10-30T13:58:37.323272+02:00", "EventTime": "2023-10-30T13:58:37.323299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["ClC5MOOiBG7e3NOib"]} -{"Format": "IDEA0", "ID": "e0fdbbe4-2632-4549-92f6-4396c3238da5", "DetectTime": "2023-10-30T13:58:37.365833+02:00", "EventTime": "2023-10-30T13:58:37.365851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CSxpyU04NThCYNzWg"]} -{"Format": "IDEA0", "ID": "1ad0a555-9136-4b0c-82c8-2bb563dfcabf", "DetectTime": "2023-10-30T13:58:37.405604+02:00", "EventTime": "2023-10-30T13:58:37.405623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CKmfGjNZfs2XfURh7"]} -{"Format": "IDEA0", "ID": "c3dc7c5c-f9ff-4989-bb39-b59d9b83de85", "DetectTime": "2023-10-30T13:58:37.439848+02:00", "EventTime": "2023-10-30T13:58:37.439868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["Cq5HgY2uLaJ2FuXHO4"]} -{"Format": "IDEA0", "ID": "dbd3e2a9-8b81-49ad-b64c-c8f9b25cc25a", "DetectTime": "2023-10-30T13:58:37.474717+02:00", "EventTime": "2023-10-30T13:58:37.474739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CqeSxs1wzfeXicnSWa"]} -{"Format": "IDEA0", "ID": "af796cbb-dc7a-485b-af54-3bc6f9164f2d", "DetectTime": "2023-10-30T13:58:37.511595+02:00", "EventTime": "2023-10-30T13:58:37.511615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CMoSS63JeDkLhkmtd8"]} -{"Format": "IDEA0", "ID": "6c0bc912-5b6f-4d07-a486-6e941c13d18d", "DetectTime": "2023-10-30T13:58:37.549471+02:00", "EventTime": "2023-10-30T13:58:37.549499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["C5ICmp30IwdrUDVixe"]} -{"Format": "IDEA0", "ID": "5ef5aa46-2dc4-4869-9dc3-07211a4add93", "DetectTime": "2023-10-30T13:58:37.585524+02:00", "EventTime": "2023-10-30T13:58:37.585548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CUwhtl3MC1FQGTyfg"]} -{"Format": "IDEA0", "ID": "5e9b1a95-174b-4930-b797-2c17b1e8582e", "DetectTime": "2023-10-30T13:58:37.621168+02:00", "EventTime": "2023-10-30T13:58:37.621186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C4DmDgtwq0QEbxxG"]} -{"Format": "IDEA0", "ID": "5c1bd2ad-e0e3-4f37-9f6e-03b748501505", "DetectTime": "2023-10-30T13:58:37.663497+02:00", "EventTime": "2023-10-30T13:58:37.663515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C5Q3ru1YmjwiFFuVh"]} -{"Format": "IDEA0", "ID": "0dfcd333-27b9-4758-a689-b09d24fcd864", "DetectTime": "2023-10-30T13:58:37.704815+02:00", "EventTime": "2023-10-30T13:58:37.704832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CnShgc1ZQz1Tdy6bgh"]} -{"Format": "IDEA0", "ID": "63bc3d76-9b5b-42a3-a33b-1a7378e6fd28", "DetectTime": "2023-10-30T13:58:37.745877+02:00", "EventTime": "2023-10-30T13:58:37.745895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CmaI8Q2KPz03rMqvsl"]} -{"Format": "IDEA0", "ID": "8fe20629-22a2-49de-beba-4a4b1778f40e", "DetectTime": "2023-10-30T13:58:37.780346+02:00", "EventTime": "2023-10-30T13:58:37.780371+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUc3OH33NdEf02OpT"]} -{"Format": "IDEA0", "ID": "2ed693c7-8016-4f9a-9eab-e1e7c53cea98", "DetectTime": "2023-10-30T13:58:37.802089+02:00", "EventTime": "2023-10-30T13:58:37.802107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CKqrxo27wSG6e9P8We"]} -{"Format": "IDEA0", "ID": "9ba940f8-a269-44ac-b396-7f0267689524", "DetectTime": "2023-10-30T13:58:37.845494+02:00", "EventTime": "2023-10-30T13:58:37.845519+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPsaun3YSrG29ZDed4"]} -{"Format": "IDEA0", "ID": "b3b0af55-d382-45e3-a203-6fe9970d4b69", "DetectTime": "2023-10-30T13:58:37.866666+02:00", "EventTime": "2023-10-30T13:58:37.866689+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDc2BO1U4MR3zcsR2b"]} -{"Format": "IDEA0", "ID": "6d08a560-190d-4c67-ae19-1e31971f3a3d", "DetectTime": "2023-10-30T13:58:37.889379+02:00", "EventTime": "2023-10-30T13:58:37.889395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CWfBEP3dnuNuyFBiDg"]} -{"Format": "IDEA0", "ID": "0695cc09-ecce-4ce3-8021-4d41b2dbf794", "DetectTime": "2023-10-30T13:58:37.928389+02:00", "EventTime": "2023-10-30T13:58:37.928408+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C75aJv3RVi0a1gHpW4"]} -{"Format": "IDEA0", "ID": "49c77ed2-db74-481f-b159-e2145775c344", "DetectTime": "2023-10-30T13:58:37.950704+02:00", "EventTime": "2023-10-30T13:58:37.950719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CTmoLU1B7dIhgmJxqh"]} -{"Format": "IDEA0", "ID": "65217245-d240-473c-92ef-d3b1b81c8551", "DetectTime": "2023-10-30T13:58:37.984625+02:00", "EventTime": "2023-10-30T13:58:37.984648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["Ck20691dfbjUgXysSf"]} -{"Format": "IDEA0", "ID": "82dfb4a4-e733-449d-a6c3-3a4ad9a6c9e4", "DetectTime": "2023-10-30T13:58:38.016058+02:00", "EventTime": "2023-10-30T13:58:38.016075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDc2BO1U4MR3zcsR2b", "Ct6ZtW15DmAsBCW1H", "CuqKn04no2JBgnQCW5", "CUc3OH33NdEf02OpT"]} -{"Format": "IDEA0", "ID": "d23e50a1-c341-492e-bdba-815d4592174a", "DetectTime": "2023-10-30T13:58:38.032406+02:00", "EventTime": "2023-10-30T13:58:38.032432+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ct6ZtW15DmAsBCW1H"]} -{"Format": "IDEA0", "ID": "f62b503f-0209-4bab-a44c-07c164a419fd", "DetectTime": "2023-10-30T13:58:38.051221+02:00", "EventTime": "2023-10-30T13:58:38.051243+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C31v93KbtsynOP4B3"]} -{"Format": "IDEA0", "ID": "2a4aeb75-6655-4c7e-a0e4-c7e2ab3dea7f", "DetectTime": "2023-10-30T13:58:38.070869+02:00", "EventTime": "2023-10-30T13:58:38.070891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["C1QD9s1H1OvRjFjA4h"]} -{"Format": "IDEA0", "ID": "0aacf4a3-01f4-402e-a579-68560fceb1e1", "DetectTime": "2023-10-30T13:58:38.105124+02:00", "EventTime": "2023-10-30T13:58:38.105145+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cpateof2wU2uaRSA2"]} -{"Format": "IDEA0", "ID": "719fad18-35fb-4dc0-9386-ebd6fd8d05c5", "DetectTime": "2023-10-30T13:58:38.124198+02:00", "EventTime": "2023-10-30T13:58:38.124214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CvnSRj3onluWLVl1jf"]} -{"Format": "IDEA0", "ID": "8a53f5e4-2711-4180-b07a-83cbe0065913", "DetectTime": "2023-10-30T13:58:38.155418+02:00", "EventTime": "2023-10-30T13:58:38.155444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CPXjVN29GuPOvVtgCi"]} -{"Format": "IDEA0", "ID": "157f4735-2aa3-4ce5-9a2e-b2e054f102e3", "DetectTime": "2023-10-30T13:58:38.188156+02:00", "EventTime": "2023-10-30T13:58:38.188181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["CNvTc91murRlrkGJk"]} -{"Format": "IDEA0", "ID": "c3aa3222-ef83-4644-add3-d663013ff407", "DetectTime": "2023-10-30T13:58:38.218999+02:00", "EventTime": "2023-10-30T13:58:38.219020+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5YM7D1OcOfRy8oPB3"]} -{"Format": "IDEA0", "ID": "99c7a612-9669-44cc-8b98-1531ca51fa93", "DetectTime": "2023-10-30T13:58:38.237871+02:00", "EventTime": "2023-10-30T13:58:38.237888+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CX9CvA5oAsqxq8BWg"]} -{"Format": "IDEA0", "ID": "1156a2f2-7db2-4872-b7d4-410686327c8b", "DetectTime": "2023-10-30T13:58:38.255235+02:00", "EventTime": "2023-10-30T13:58:38.255262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["Cof63I3AeF3IEdTf18"]} -{"Format": "IDEA0", "ID": "8d7d72c4-d3e6-4134-835c-cfdfe325235a", "DetectTime": "2023-10-30T13:58:38.284343+02:00", "EventTime": "2023-10-30T13:58:38.284370+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0FAt53SEHjbQ8Vzah"]} -{"Format": "IDEA0", "ID": "296a9848-9f3f-481c-aaff-a19e1447c0c7", "DetectTime": "2023-10-30T13:58:38.302207+02:00", "EventTime": "2023-10-30T13:58:38.302232+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwnfQ42za18d3CQXB"]} -{"Format": "IDEA0", "ID": "eef97b79-7b24-47b4-b281-2fab1e474648", "DetectTime": "2023-10-30T13:58:38.319271+02:00", "EventTime": "2023-10-30T13:58:38.319290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["Ck7OrrqQsoJFc0vvh"]} -{"Format": "Json", "ID": "eef97b79-7b24-47b4-b281-2fab1e474648", "DetectTime": "2023-10-30T13:58:38.319271+02:00", "EventTime": "2023-10-30T13:58:38.319290+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:18:15.492898+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:38.413870)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8493cd99-9941-4cd9-88b6-f6eab0f30dfa", "DetectTime": "2023-10-30T13:58:38.420289+02:00", "EventTime": "2023-10-30T13:58:38.420315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["Cxsnh51vmM5rx4X3Nl"]} -{"Format": "IDEA0", "ID": "078f83af-eb38-41c7-a331-5a979dd2d920", "DetectTime": "2023-10-30T13:58:38.453755+02:00", "EventTime": "2023-10-30T13:58:38.453775+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ce9GQDs6FPChHultk"]} -{"Format": "IDEA0", "ID": "52504d54-4cf9-4863-b537-392328db49dd", "DetectTime": "2023-10-30T13:58:38.468760+02:00", "EventTime": "2023-10-30T13:58:38.468776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["C7vCKw2Optdgnxec4"]} -{"Format": "IDEA0", "ID": "51f5027b-ab14-4bc8-8a3a-016019314eff", "DetectTime": "2023-10-30T13:58:38.500263+02:00", "EventTime": "2023-10-30T13:58:38.500278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CX9CvA5oAsqxq8BWg", "C9ZWyTca3XPPXsOua", "Cpateof2wU2uaRSA2", "CwnfQ42za18d3CQXB"]} -{"Format": "IDEA0", "ID": "9f5be488-4c6c-44ab-8edf-b702b30860a1", "DetectTime": "2023-10-30T13:58:38.518410+02:00", "EventTime": "2023-10-30T13:58:38.518434+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9ZWyTca3XPPXsOua"]} -{"Format": "IDEA0", "ID": "bc4cd565-e482-46b5-b1e3-7687f96908e2", "DetectTime": "2023-10-30T13:58:38.538214+02:00", "EventTime": "2023-10-30T13:58:38.538240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CGSeOs13lmYnpeC7Ui"]} -{"Format": "IDEA0", "ID": "30a84d6f-f441-49e7-b984-82ae658ad4cf", "DetectTime": "2023-10-30T13:58:38.571966+02:00", "EventTime": "2023-10-30T13:58:38.571982+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2gpv3QeJYXDWq033"]} -{"Format": "IDEA0", "ID": "bff264f9-a7a4-423b-bdf1-dc45dac7e80b", "DetectTime": "2023-10-30T13:58:38.588684+02:00", "EventTime": "2023-10-30T13:58:38.588700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CRuydy2dLZFCzepbJ8"]} -{"Format": "IDEA0", "ID": "598e51ba-cf3d-4526-a201-9086241d7798", "DetectTime": "2023-10-30T13:58:38.620894+02:00", "EventTime": "2023-10-30T13:58:38.620912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CUdWU11iuTdAVHZLc6"]} -{"Format": "IDEA0", "ID": "e6b99693-eb1a-4956-bd45-8bac2b55ac46", "DetectTime": "2023-10-30T13:58:38.653484+02:00", "EventTime": "2023-10-30T13:58:38.653511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Ci8EnO33VmdLjtMW16"]} -{"Format": "IDEA0", "ID": "155b2d87-190f-469e-a777-b7b80f569039", "DetectTime": "2023-10-30T13:58:38.687776+02:00", "EventTime": "2023-10-30T13:58:38.687820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CUtjpH1atcmKMFf4i4"]} -{"Format": "IDEA0", "ID": "3cf9c08b-3f46-41a2-926a-bf5937a5fe62", "DetectTime": "2023-10-30T13:58:38.719994+02:00", "EventTime": "2023-10-30T13:58:38.720019+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiTYMh2AU4d8OiRwT8"]} -{"Format": "IDEA0", "ID": "089ee7e4-9487-4321-ba70-5ec70464c29d", "DetectTime": "2023-10-30T13:58:38.738554+02:00", "EventTime": "2023-10-30T13:58:38.738583+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0bRdt18Ts9CINsGM"]} -{"Format": "IDEA0", "ID": "8f1e654c-c61f-441a-a90f-76766172fe6c", "DetectTime": "2023-10-30T13:58:38.759682+02:00", "EventTime": "2023-10-30T13:58:38.759702+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6OEBa29mPeGGEvL11"]} -{"Format": "IDEA0", "ID": "2486311a-9de4-444f-a788-11c0d9003f96", "DetectTime": "2023-10-30T13:58:38.776192+02:00", "EventTime": "2023-10-30T13:58:38.776216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.82.20.14 ", "ContentType": "text/plain"}], "uids": ["C3jKah48P6vaT34AN5"]} -{"Format": "IDEA0", "ID": "dc9e353e-babc-4de3-af9b-819d38fce5fc", "DetectTime": "2023-10-30T13:58:38.804259+02:00", "EventTime": "2023-10-30T13:58:38.804280+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CB0adH1rJpTwBtSRr"]} -{"Format": "IDEA0", "ID": "a3e6a897-4295-4ca9-961f-986f3f3b5419", "DetectTime": "2023-10-30T13:58:38.821839+02:00", "EventTime": "2023-10-30T13:58:38.821861+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzEWpx42yydngyInai"]} -{"Format": "IDEA0", "ID": "a640e689-7a29-43cb-accf-8d0c579eafdd", "DetectTime": "2023-10-30T13:58:38.840570+02:00", "EventTime": "2023-10-30T13:58:38.840589+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcKqKB4BRUldv5JEYi"]} -{"Format": "IDEA0", "ID": "ed8cbbc2-dde4-4667-9841-c688e0a48c57", "DetectTime": "2023-10-30T13:58:38.858891+02:00", "EventTime": "2023-10-30T13:58:38.858907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C6OEBa29mPeGGEvL11", "CiTYMh2AU4d8OiRwT8", "CzEWpx42yydngyInai", "CFiGgu309QLGzsZY85"]} -{"Format": "IDEA0", "ID": "626b88d3-8d24-43b2-b8d9-decc5a7d88be", "DetectTime": "2023-10-30T13:58:38.874579+02:00", "EventTime": "2023-10-30T13:58:38.874595+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFiGgu309QLGzsZY85"]} -{"Format": "IDEA0", "ID": "a8da9486-1ab2-4317-b7f7-7c8eb9ca43fc", "DetectTime": "2023-10-30T13:58:38.889699+02:00", "EventTime": "2023-10-30T13:58:38.889723+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChnzzayUpP85XSR39"]} -{"Format": "IDEA0", "ID": "af270329-0c39-4046-a471-867bde87e501", "DetectTime": "2023-10-30T13:58:38.906434+02:00", "EventTime": "2023-10-30T13:58:38.906454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["C20vi12TJoBAZLGWl1"]} -{"Format": "IDEA0", "ID": "71a7b7e7-fe43-4a3d-80fd-74bd7f266884", "DetectTime": "2023-10-30T13:58:38.937216+02:00", "EventTime": "2023-10-30T13:58:38.937239+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6KVotU8H3nR7mog5"]} -{"Format": "IDEA0", "ID": "77b285d0-339f-4aa6-8fd1-8bf5945201e8", "DetectTime": "2023-10-30T13:58:39.038963+02:00", "EventTime": "2023-10-30T13:58:39.038990+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQe3PRzH8PlXa54Uh"]} -{"Format": "IDEA0", "ID": "67dbc0e3-ec64-412c-a6e0-b1a4e7f94706", "DetectTime": "2023-10-30T13:58:39.067579+02:00", "EventTime": "2023-10-30T13:58:39.067599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CWfQ7A4KpAsFeiIJZ4"]} -{"Format": "IDEA0", "ID": "1246b563-7b7b-464e-b0c0-7e26bca286f4", "DetectTime": "2023-10-30T13:58:39.108552+02:00", "EventTime": "2023-10-30T13:58:39.108575+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEKr7n3qqxV38KssNa"]} -{"Format": "IDEA0", "ID": "babc25cc-555c-4fef-82b8-c6f01771e20b", "DetectTime": "2023-10-30T13:58:39.128416+02:00", "EventTime": "2023-10-30T13:58:39.128442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["Cir27S3I3WKwUXWmJa"]} -{"Format": "IDEA0", "ID": "dc4729e4-7d0c-41eb-ae60-2beb6e089caa", "DetectTime": "2023-10-30T13:58:39.166311+02:00", "EventTime": "2023-10-30T13:58:39.166339+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CayHWJ3M5eugVe7Q7e"]} -{"Format": "IDEA0", "ID": "e56486ac-0d05-4e86-9be0-7d659acfdeea", "DetectTime": "2023-10-30T13:58:39.186496+02:00", "EventTime": "2023-10-30T13:58:39.186520+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C60BOJ2vCDO3z4AOH1"]} -{"Format": "IDEA0", "ID": "dd920e0d-0712-4aff-9585-426434f30995", "DetectTime": "2023-10-30T13:58:39.207528+02:00", "EventTime": "2023-10-30T13:58:39.207541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CgfWB74xkkEG6ib2Ii"]} -{"Format": "IDEA0", "ID": "bfe22d01-17b0-4e2f-8b23-ad71e9054b6d", "DetectTime": "2023-10-30T13:58:39.245729+02:00", "EventTime": "2023-10-30T13:58:39.245749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CZ0h6N3LNXEwekhSua"]} -{"Format": "IDEA0", "ID": "ebb609c8-bbb5-4b38-adfa-81e2afb301f8", "DetectTime": "2023-10-30T13:58:39.285660+02:00", "EventTime": "2023-10-30T13:58:39.285677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["C6CedL2Jrub6zSnIu3"]} -{"Format": "IDEA0", "ID": "0f5d2c1c-5376-4496-9575-5036ca3eaee4", "DetectTime": "2023-10-30T13:58:39.330026+02:00", "EventTime": "2023-10-30T13:58:39.330046+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0FKlFCDUxMcVnp7h"]} -{"Format": "IDEA0", "ID": "71e58b6d-49dc-43d2-bc71-ca90230037ad", "DetectTime": "2023-10-30T13:58:39.349295+02:00", "EventTime": "2023-10-30T13:58:39.349312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["Cvsqwy1mAwmD2BCw6i"]} -{"Format": "IDEA0", "ID": "aef2636a-ad44-48ee-bf8a-0bbf429ab812", "DetectTime": "2023-10-30T13:58:39.385998+02:00", "EventTime": "2023-10-30T13:58:39.386024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CH1BkK3Hd1oyjCMEL4"]} -{"Format": "IDEA0", "ID": "c2bc354d-c179-4d21-9262-c1fc9399d90b", "DetectTime": "2023-10-30T13:58:39.421440+02:00", "EventTime": "2023-10-30T13:58:39.421460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CsIa5j31QAGw6dpqQ4"]} -{"Format": "IDEA0", "ID": "eac0842b-1263-49a3-839b-7db07d669813", "DetectTime": "2023-10-30T13:58:39.460441+02:00", "EventTime": "2023-10-30T13:58:39.460465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.65.129 ", "ContentType": "text/plain"}], "uids": ["CnfhqB3R8HnOKT5Y3a"]} -{"Format": "IDEA0", "ID": "8cd142d8-7b48-464a-a030-64a4b1995d41", "DetectTime": "2023-10-30T13:58:39.498165+02:00", "EventTime": "2023-10-30T13:58:39.498290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CFQRVA1nBI6PmLTOGh"]} -{"Format": "IDEA0", "ID": "4fe63f64-b855-4cca-847b-8e11b11b4679", "DetectTime": "2023-10-30T13:58:39.532375+02:00", "EventTime": "2023-10-30T13:58:39.532392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["C8maUjXBGnChnFmN9"]} -{"Format": "IDEA0", "ID": "3866f817-ae3e-42f9-baf0-f689eb4b87ce", "DetectTime": "2023-10-30T13:58:39.572139+02:00", "EventTime": "2023-10-30T13:58:39.572161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C60BOJ2vCDO3z4AOH1", "CI4NCs2zMITJJJG2Qk", "CEKr7n3qqxV38KssNa", "C6KVotU8H3nR7mog5"]} -{"Format": "IDEA0", "ID": "8701085c-0528-4cb6-a778-07b6b495c513", "DetectTime": "2023-10-30T13:58:39.589909+02:00", "EventTime": "2023-10-30T13:58:39.589938+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CI4NCs2zMITJJJG2Qk"]} -{"Format": "IDEA0", "ID": "13f2eeb5-9779-4807-8162-bd07f090a91e", "DetectTime": "2023-10-30T13:58:39.606742+02:00", "EventTime": "2023-10-30T13:58:39.606770+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CybKSAeVgUWQxBxae"]} -{"Format": "IDEA0", "ID": "0a2dc773-119e-4acf-a3c7-42ab6e005802", "DetectTime": "2023-10-30T13:58:39.625050+02:00", "EventTime": "2023-10-30T13:58:39.625070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CNwRI5aEaK2PHwIt2"]} -{"Format": "IDEA0", "ID": "c7b23706-04d0-4f17-b3e4-933584d8871a", "DetectTime": "2023-10-30T13:58:39.663230+02:00", "EventTime": "2023-10-30T13:58:39.663254+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT41ilHWNHIKAZCJ"]} -{"Format": "IDEA0", "ID": "32de6c5e-c6cb-4110-aad3-fe22d22c5f31", "DetectTime": "2023-10-30T13:58:39.682711+02:00", "EventTime": "2023-10-30T13:58:39.682732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CvEuMx2lb0HTAeqDQ7"]} -{"Format": "IDEA0", "ID": "fbbfbbfa-52eb-4b1d-a30a-3a206fcac3f0", "DetectTime": "2023-10-30T13:58:39.722932+02:00", "EventTime": "2023-10-30T13:58:39.722958+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrDBDa4km9468Z9OVc"]} -{"Format": "IDEA0", "ID": "c07119b3-ee1d-4566-82ea-c73fa53e8bcc", "DetectTime": "2023-10-30T13:58:39.760696+02:00", "EventTime": "2023-10-30T13:58:39.760727+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cy0ewq1cOK3E9AoOT1"]} -{"Format": "IDEA0", "ID": "9cff938a-2341-454d-af5c-549596b3e231", "DetectTime": "2023-10-30T13:58:39.786615+02:00", "EventTime": "2023-10-30T13:58:39.786641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CZmkX82IMC1NzeDNs2"]} -{"Format": "IDEA0", "ID": "74842ffc-2fbc-432a-b84d-af86b14ec807", "DetectTime": "2023-10-30T13:58:39.831934+02:00", "EventTime": "2023-10-30T13:58:39.831952+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGvXor2NVF0i9iFUei"]} -{"Format": "IDEA0", "ID": "32780cdf-5922-4699-9165-6a1d5ef6b046", "DetectTime": "2023-10-30T13:58:39.854057+02:00", "EventTime": "2023-10-30T13:58:39.854078+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrOUHv34lpL3L91KCl"]} -{"Format": "IDEA0", "ID": "8dbb88fc-0167-451d-9cde-c95d2c0c2613", "DetectTime": "2023-10-30T13:58:39.873560+02:00", "EventTime": "2023-10-30T13:58:39.873576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CXaPFE4SIUXDYqsXl7"]} -{"Format": "IDEA0", "ID": "c0c02175-8352-4f12-aae0-6b4d987973a3", "DetectTime": "2023-10-30T13:58:39.912977+02:00", "EventTime": "2023-10-30T13:58:39.913001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFKDKp49JpZgafQic9"]} -{"Format": "IDEA0", "ID": "c4953d48-70ef-4179-b2f7-27910bf2998c", "DetectTime": "2023-10-30T13:58:39.928184+02:00", "EventTime": "2023-10-30T13:58:39.928200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CPOfQPNDkAaM3U4El"]} -{"Format": "IDEA0", "ID": "9fad7876-431f-4657-842b-fce7661d1c0c", "DetectTime": "2023-10-30T13:58:39.967377+02:00", "EventTime": "2023-10-30T13:58:39.967399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cy0ewq1cOK3E9AoOT1", "CDpe5Mgq4qiN7Gcm", "CT41ilHWNHIKAZCJ", "CrOUHv34lpL3L91KCl"]} -{"Format": "IDEA0", "ID": "de87c2ec-c0ac-46f3-87a7-a975bacd4772", "DetectTime": "2023-10-30T13:58:39.989629+02:00", "EventTime": "2023-10-30T13:58:39.989656+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDpe5Mgq4qiN7Gcm"]} -{"Format": "IDEA0", "ID": "8cb98656-537b-4cad-9436-47efe7172910", "DetectTime": "2023-10-30T13:58:40.008238+02:00", "EventTime": "2023-10-30T13:58:40.008259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CwYemH2yXryAjvynC1"]} -{"Format": "IDEA0", "ID": "5fb4dda5-a30e-4814-8133-921eed67abee", "DetectTime": "2023-10-30T13:58:40.043161+02:00", "EventTime": "2023-10-30T13:58:40.043179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CZpmh4161Apo7SQyoi"]} -{"Format": "IDEA0", "ID": "77b67367-160f-471e-aa7f-f5bfc8d123bb", "DetectTime": "2023-10-30T13:58:40.080657+02:00", "EventTime": "2023-10-30T13:58:40.080684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CLDcpP992Dc1DJ5G8"]} -{"Format": "IDEA0", "ID": "f5cc0d2a-cca4-4547-9eb7-cd73c0cba0be", "DetectTime": "2023-10-30T13:58:40.119725+02:00", "EventTime": "2023-10-30T13:58:40.119743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.67.41 ", "ContentType": "text/plain"}], "uids": ["CGr0HXIXTdvKbcBq7"]} -{"Format": "IDEA0", "ID": "444432e5-127d-4c0a-83e3-b5e2e7703491", "DetectTime": "2023-10-30T13:58:40.159648+02:00", "EventTime": "2023-10-30T13:58:40.159668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFqNS03MVJJbbkwxq9"]} -{"Format": "IDEA0", "ID": "85daa0af-8678-486a-b227-abe78619abd1", "DetectTime": "2023-10-30T13:58:40.177381+02:00", "EventTime": "2023-10-30T13:58:40.177670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.232.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.232.130 ", "ContentType": "text/plain"}], "uids": ["CyK0w5WHpPASoyUcc"]} -{"Format": "IDEA0", "ID": "081c7933-a8ae-4d48-adb6-1919a68a439c", "DetectTime": "2023-10-30T13:58:40.212256+02:00", "EventTime": "2023-10-30T13:58:40.212278+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvGGus3t6KYtjFd6uc"]} -{"Format": "IDEA0", "ID": "ae986cce-197d-4060-bae4-c732bcf2e92f", "DetectTime": "2023-10-30T13:58:40.228221+02:00", "EventTime": "2023-10-30T13:58:40.228245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CTeMlNKvNsoWLnHP8"]} -{"Format": "IDEA0", "ID": "6c8dd2e6-5354-49fe-9ecd-00c01beff445", "DetectTime": "2023-10-30T13:58:40.263721+02:00", "EventTime": "2023-10-30T13:58:40.263738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["Cd8C7uJbbZ0wpf6jl"]} -{"Format": "IDEA0", "ID": "c0207aba-8748-4748-ac15-dd90befaf5e2", "DetectTime": "2023-10-30T13:58:40.299144+02:00", "EventTime": "2023-10-30T13:58:40.299169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["Cqbpr441wdD1ULJk7h"]} -{"Format": "IDEA0", "ID": "a1168320-d776-4cbe-8017-75188900d2f9", "DetectTime": "2023-10-30T13:58:40.338218+02:00", "EventTime": "2023-10-30T13:58:40.338739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CBVRY53UhwKxVOdprd"]} -{"Format": "IDEA0", "ID": "a7a6d7ff-6345-450d-b5d1-a5842aa70fe2", "DetectTime": "2023-10-30T13:58:40.373919+02:00", "EventTime": "2023-10-30T13:58:40.373978+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CD4kxX2iET7ctf21N5"]} -{"Format": "IDEA0", "ID": "a992d2d7-8f11-4806-9d4b-58d9fb072dcf", "DetectTime": "2023-10-30T13:58:40.391173+02:00", "EventTime": "2023-10-30T13:58:40.391200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CqiuN0255Ch5KYQpyi"]} -{"Format": "IDEA0", "ID": "2d7d5894-566e-43ca-991b-fe86c0cd1a5f", "DetectTime": "2023-10-30T13:58:40.425484+02:00", "EventTime": "2023-10-30T13:58:40.425510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CBuw494O6A2CHLn8Jj"]} -{"Format": "IDEA0", "ID": "0218ca4e-d119-4bc8-9f50-598c3af904eb", "DetectTime": "2023-10-30T13:58:40.460936+02:00", "EventTime": "2023-10-30T13:58:40.460954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.85.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.85.34 ", "ContentType": "text/plain"}], "uids": ["C4QX5l38fweTsP3Eik"]} -{"Format": "IDEA0", "ID": "1bc21d33-e061-4d53-9281-ea1bdaa13203", "DetectTime": "2023-10-30T13:58:40.492262+02:00", "EventTime": "2023-10-30T13:58:40.492297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CuhjtO1FfGIBWdAwl9"]} -{"Format": "IDEA0", "ID": "ebabf22f-0174-4835-9dea-ae28ec04ab4d", "DetectTime": "2023-10-30T13:58:40.525428+02:00", "EventTime": "2023-10-30T13:58:40.525449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 ", "ContentType": "text/plain"}], "uids": ["CIstOQ3JDXDuKp60gk"]} -{"Format": "IDEA0", "ID": "a16ac43d-de51-4f42-ba1c-e5e6b80aa776", "DetectTime": "2023-10-30T13:58:40.564767+02:00", "EventTime": "2023-10-30T13:58:40.564787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CigpDsW8y2CbtGfs9"]} -{"Format": "IDEA0", "ID": "f170bc68-f16e-4c48-b810-74388d07af41", "DetectTime": "2023-10-30T13:58:40.596907+02:00", "EventTime": "2023-10-30T13:58:40.596924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CyW7NF1eN5bc6WQY1h"]} -{"Format": "IDEA0", "ID": "6f9f856a-8422-448c-bca6-bc472ea8cc27", "DetectTime": "2023-10-30T13:58:40.626184+02:00", "EventTime": "2023-10-30T13:58:40.626208+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ca3cBKDOH4mnxOppg"]} -{"Format": "IDEA0", "ID": "2fca95c0-e45f-4f29-ab8a-b700c7b67ca8", "DetectTime": "2023-10-30T13:58:40.641852+02:00", "EventTime": "2023-10-30T13:58:40.641872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["Cl9iYc3mwbPTCImZS6"]} -{"Format": "IDEA0", "ID": "ab579a4f-e1d9-4846-b147-4532def727d9", "DetectTime": "2023-10-30T13:58:40.676552+02:00", "EventTime": "2023-10-30T13:58:40.676566+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CF9Q3W2cal2DHTD4V9"]} -{"Format": "IDEA0", "ID": "67e42e62-b343-4fbc-ad21-cab8a88a09cc", "DetectTime": "2023-10-30T13:58:40.693341+02:00", "EventTime": "2023-10-30T13:58:40.693362+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFpcvp4YQuNgDTq043"]} -{"Format": "IDEA0", "ID": "87fbd244-40f9-4f9b-8b8b-c06397312b5f", "DetectTime": "2023-10-30T13:58:40.708799+02:00", "EventTime": "2023-10-30T13:58:40.708826+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrOJcL2fpYgU7kIbPi"]} -{"Format": "IDEA0", "ID": "481a55a4-2cb9-407d-82c2-d42b4604cad6", "DetectTime": "2023-10-30T13:58:40.725071+02:00", "EventTime": "2023-10-30T13:58:40.725096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CFAnja1GZVKC6ywfJj"]} -{"Format": "IDEA0", "ID": "c5e22c4d-cbaf-4050-88aa-9b6d5eda4efb", "DetectTime": "2023-10-30T13:58:40.758523+02:00", "EventTime": "2023-10-30T13:58:40.758538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["91.137.174.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 91.137.174.85 ", "ContentType": "text/plain"}], "uids": ["CNMK3jM9273KE9H58"]} -{"Format": "IDEA0", "ID": "de0d6623-f137-499b-8f19-c507d4f6bdfa", "DetectTime": "2023-10-30T13:58:40.790304+02:00", "EventTime": "2023-10-30T13:58:40.790325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CTeLiMzf3mcRRozWf", "Ca3cBKDOH4mnxOppg", "CvGGus3t6KYtjFd6uc", "CFpcvp4YQuNgDTq043"]} -{"Format": "IDEA0", "ID": "068cfad3-d1eb-41dc-bebb-2418f9f11f47", "DetectTime": "2023-10-30T13:58:40.804235+02:00", "EventTime": "2023-10-30T13:58:40.804258+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTeLiMzf3mcRRozWf"]} -{"Format": "IDEA0", "ID": "22e78078-7c6a-4b06-82a7-9a6a17abce84", "DetectTime": "2023-10-30T13:58:40.816589+02:00", "EventTime": "2023-10-30T13:58:40.816617+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJkTWS3JcFeYmYPPh8"]} -{"Format": "IDEA0", "ID": "8eb94e92-f973-4c83-961b-4726656c5fc6", "DetectTime": "2023-10-30T13:58:40.830386+02:00", "EventTime": "2023-10-30T13:58:40.830406+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cvjhov39WpbUV246j7"]} -{"Format": "IDEA0", "ID": "b990b8ca-1e19-4b69-a743-f64904a9ad7f", "DetectTime": "2023-10-30T13:58:40.844864+02:00", "EventTime": "2023-10-30T13:58:40.844880+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMXCfUiFUXnxsViCg"]} -{"Format": "IDEA0", "ID": "c2eb5fa5-155c-450f-9058-9e9404fa9a03", "DetectTime": "2023-10-30T13:58:40.858335+02:00", "EventTime": "2023-10-30T13:58:40.858353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.90.187.38 ", "ContentType": "text/plain"}], "uids": ["CuKL5x1FDOkfSUkiwh"]} -{"Format": "IDEA0", "ID": "f01704d9-b977-4d81-ba58-bcfc9cce45dc", "DetectTime": "2023-10-30T13:58:40.885195+02:00", "EventTime": "2023-10-30T13:58:40.885211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["CXJ1xX1jaXL3cNzokj"]} -{"Format": "IDEA0", "ID": "a6877628-8f63-41a2-818d-3f4ff6a4cda9", "DetectTime": "2023-10-30T13:58:40.912183+02:00", "EventTime": "2023-10-30T13:58:40.912197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.15.162.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.15.162.66 ", "ContentType": "text/plain"}], "uids": ["CVYoRw1pqNBKaXNoz7"]} -{"Format": "IDEA0", "ID": "63262b22-79e1-482d-a36d-995430d9e457", "DetectTime": "2023-10-30T13:58:40.944841+02:00", "EventTime": "2023-10-30T13:58:40.944861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.238.126.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.238.126.195 ", "ContentType": "text/plain"}], "uids": ["CixgVv4YjKVwbI4I2h"]} -{"Format": "IDEA0", "ID": "e92f0ceb-f49c-4ad5-ac0c-4469e79a30fc", "DetectTime": "2023-10-30T13:58:40.973290+02:00", "EventTime": "2023-10-30T13:58:40.973317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C5KTTGdZuSf78dMp6"]} -{"Format": "IDEA0", "ID": "6bbd122c-44c1-4373-ab09-6da5a5ad83ff", "DetectTime": "2023-10-30T13:58:41.004022+02:00", "EventTime": "2023-10-30T13:58:41.004039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CEftMf1wqRqFAlmBmc"]} -{"Format": "IDEA0", "ID": "7d005803-00f4-4ec7-91f8-6beeae9a9993", "DetectTime": "2023-10-30T13:58:41.031463+02:00", "EventTime": "2023-10-30T13:58:41.031479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS1652", "ContentType": "text/plain"}], "uids": ["CnPHJ01V0Muo9sQoW4"]} -{"Format": "IDEA0", "ID": "6befdd56-4817-45c1-b9d9-29e342a84c73", "DetectTime": "2023-10-30T13:58:41.058806+02:00", "EventTime": "2023-10-30T13:58:41.058833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CmCMHS3hngQI2IMQDl"]} -{"Format": "IDEA0", "ID": "f563a6c4-312e-4243-a84b-2437c2f7be0c", "DetectTime": "2023-10-30T13:58:41.160291+02:00", "EventTime": "2023-10-30T13:58:41.160316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CD2fs34ibtKZBP8qJa"]} -{"Format": "IDEA0", "ID": "8628139f-5ca8-4ced-b096-095bbc7a555e", "DetectTime": "2023-10-30T13:58:41.194202+02:00", "EventTime": "2023-10-30T13:58:41.194215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.168.10.20 AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net", "ContentType": "text/plain"}], "uids": ["CwWHUX1GB47YpDZvlk"]} -{"Format": "IDEA0", "ID": "f367df4a-0830-4ea9-a6b7-7d5eea51b660", "DetectTime": "2023-10-30T13:58:41.225494+02:00", "EventTime": "2023-10-30T13:58:41.225550+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CgzrVl0UmzTTDuA1"]} -{"Format": "IDEA0", "ID": "f2a7fcd0-14e0-49ba-9419-13a0d5cba7cd", "DetectTime": "2023-10-30T13:58:41.241453+02:00", "EventTime": "2023-10-30T13:58:41.241471+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cc4tQo4TVm2H0OR5Wg"]} -{"Format": "IDEA0", "ID": "e371bb88-f3ff-4344-a084-762e83024f34", "DetectTime": "2023-10-30T13:58:41.254873+02:00", "EventTime": "2023-10-30T13:58:41.254890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.173.193.63 ", "ContentType": "text/plain"}], "uids": ["CkSxow451x18MTg9Y"]} -{"Format": "IDEA0", "ID": "20dc138d-f439-46ce-a5aa-fab79c506ac6", "DetectTime": "2023-10-30T13:58:41.282602+02:00", "EventTime": "2023-10-30T13:58:41.282618+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4xpmw1Gmi3bz9mql4"]} -{"Format": "IDEA0", "ID": "a4233520-dcf8-4b07-b32a-ca186627959f", "DetectTime": "2023-10-30T13:58:41.301293+02:00", "EventTime": "2023-10-30T13:58:41.301314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C5obD92jdeKwWyFx8f"]} -{"Format": "IDEA0", "ID": "f2f4e8d8-25f4-40f8-8029-9e25a02d3541", "DetectTime": "2023-10-30T13:58:41.339813+02:00", "EventTime": "2023-10-30T13:58:41.339832+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Czf9Dk22BhlASYMVh1"]} -{"Format": "IDEA0", "ID": "fbfcc0b6-2b97-4c97-b8d8-8ff54110f23a", "DetectTime": "2023-10-30T13:58:41.356865+02:00", "EventTime": "2023-10-30T13:58:41.356881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CblwqC2gXpr0ezoVc8", "C4xpmw1Gmi3bz9mql4", "Cvjhov39WpbUV246j7", "CgzrVl0UmzTTDuA1"]} -{"Format": "IDEA0", "ID": "5e6c69bf-d63b-42b2-8dfe-976594ec5f3d", "DetectTime": "2023-10-30T13:58:41.373094+02:00", "EventTime": "2023-10-30T13:58:41.373111+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CblwqC2gXpr0ezoVc8"]} -{"Format": "IDEA0", "ID": "e6642e3c-cbb3-4a71-a78d-9969971da7fb", "DetectTime": "2023-10-30T13:58:41.387051+02:00", "EventTime": "2023-10-30T13:58:41.387071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CltnzC3fTJ5ueNa7R4"]} -{"Format": "IDEA0", "ID": "eeb666d2-9f66-4409-9c13-ce935e5dcf76", "DetectTime": "2023-10-30T13:58:41.421435+02:00", "EventTime": "2023-10-30T13:58:41.421451+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNjcI821J5EfwWQhc5"]} -{"Format": "IDEA0", "ID": "b87a7bb0-20fb-4705-94a8-5efa1f774661", "DetectTime": "2023-10-30T13:58:41.435275+02:00", "EventTime": "2023-10-30T13:58:41.435295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.235.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.235.230 ", "ContentType": "text/plain"}], "uids": ["CirKHJ2CyrwKzLmXA4"]} -{"Format": "IDEA0", "ID": "6e245e41-f1f0-4fc6-8625-5424317a392c", "DetectTime": "2023-10-30T13:58:41.465558+02:00", "EventTime": "2023-10-30T13:58:41.465575+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYvfIN3qTMauwQYiG8"]} -{"Format": "IDEA0", "ID": "0738210f-b589-4aef-a302-df5d00e122dc", "DetectTime": "2023-10-30T13:58:41.476317+02:00", "EventTime": "2023-10-30T13:58:41.476333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CoGl6f3WR8Olc7BGgj"]} -{"Format": "IDEA0", "ID": "25d64881-f3ac-4931-8bd1-b2d8bdc38847", "DetectTime": "2023-10-30T13:58:41.503786+02:00", "EventTime": "2023-10-30T13:58:41.503804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["C4JAnr3OWyNb86J0el"]} -{"Format": "IDEA0", "ID": "dd826019-9921-4938-8cc4-125edc9359e0", "DetectTime": "2023-10-30T13:58:41.533518+02:00", "EventTime": "2023-10-30T13:58:41.533540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Chhl3v2hK2ZZVgIBm6"]} -{"Format": "IDEA0", "ID": "5ace6aca-37f1-4177-9228-c79d96103e71", "DetectTime": "2023-10-30T13:58:41.558239+02:00", "EventTime": "2023-10-30T13:58:41.558254+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZx2no2CSRDs8GJSg2"]} -{"Format": "IDEA0", "ID": "a8461984-fe10-4c7d-b232-b8e3cfd09c76", "DetectTime": "2023-10-30T13:58:41.572054+02:00", "EventTime": "2023-10-30T13:58:41.572070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.226.236.123"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.226.236.123 ", "ContentType": "text/plain"}], "uids": ["CCSwqC3dvNUijgWuf5"]} -{"Format": "IDEA0", "ID": "d33fc87e-513e-4483-be73-fd61190ea351", "DetectTime": "2023-10-30T13:58:41.595401+02:00", "EventTime": "2023-10-30T13:58:41.595415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.19.109.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.19.109.35 ", "ContentType": "text/plain"}], "uids": ["CC1Svi4QfWaezww2gh"]} -{"Format": "IDEA0", "ID": "e6e5ce8d-f2db-4949-8499-56595cd50bb5", "DetectTime": "2023-10-30T13:58:41.620035+02:00", "EventTime": "2023-10-30T13:58:41.620052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["Cri6qi4sHYUNY9q4E9"]} -{"Format": "IDEA0", "ID": "d6f541e6-f375-478d-8a56-ae0e2d5bfca3", "DetectTime": "2023-10-30T13:58:41.646473+02:00", "EventTime": "2023-10-30T13:58:41.646495+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmpZbN3Iidf8VJIaY6"]} -{"Format": "IDEA0", "ID": "a64151f6-f54f-4c77-9701-fb8db693862c", "DetectTime": "2023-10-30T13:58:41.660039+02:00", "EventTime": "2023-10-30T13:58:41.660054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.234.126.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.234.126.36 ", "ContentType": "text/plain"}], "uids": ["CMpXQP2jxkbLT5K38h"]} -{"Format": "IDEA0", "ID": "8d19bb72-0a0d-478c-815f-50b0eecf9c69", "DetectTime": "2023-10-30T13:58:41.686237+02:00", "EventTime": "2023-10-30T13:58:41.686249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.225.175.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.225.175.68 ", "ContentType": "text/plain"}], "uids": ["CjegdN1VFdqclqUN68"]} -{"Format": "IDEA0", "ID": "52fcedcd-bd33-49f4-b3c1-d6c4c87131b5", "DetectTime": "2023-10-30T13:58:41.712053+02:00", "EventTime": "2023-10-30T13:58:41.712064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.224.115 ", "ContentType": "text/plain"}], "uids": ["CqeiRxKokIWzf66D5"]} -{"Format": "IDEA0", "ID": "369603ea-6947-4e4e-9daf-c6e97c3a6360", "DetectTime": "2023-10-30T13:58:41.741083+02:00", "EventTime": "2023-10-30T13:58:41.741102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["CSCS9u2OlPnG1ZKDnk"]} -{"Format": "IDEA0", "ID": "cd20af9c-d73e-40c4-a9ca-4a0f39f447d0", "DetectTime": "2023-10-30T13:58:41.770031+02:00", "EventTime": "2023-10-30T13:58:41.770052+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmP6LX3KNTM2hIMsOh"]} -{"Format": "IDEA0", "ID": "e3d2c98d-9c19-4d37-b97f-7a48bea365e8", "DetectTime": "2023-10-30T13:58:41.786197+02:00", "EventTime": "2023-10-30T13:58:41.786214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.104.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.104.2 ", "ContentType": "text/plain"}], "uids": ["ChZFlF4rEt53EIg5Md"]} -{"Format": "IDEA0", "ID": "330776f2-8484-4cda-a3ac-a309c9dd8440", "DetectTime": "2023-10-30T13:58:41.813277+02:00", "EventTime": "2023-10-30T13:58:41.813296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.19.57.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.19.57.90 ", "ContentType": "text/plain"}], "uids": ["CCxSXX1663vY3xLi1"]} -{"Format": "IDEA0", "ID": "1bd825ad-1b60-4382-b944-43a9160af504", "DetectTime": "2023-10-30T13:58:41.843087+02:00", "EventTime": "2023-10-30T13:58:41.843101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["C2X1cf1hbRkOXKK9Q"]} -{"Format": "IDEA0", "ID": "f076413c-7201-4923-a14f-f585aee417dc", "DetectTime": "2023-10-30T13:58:41.867811+02:00", "EventTime": "2023-10-30T13:58:41.867827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.131.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.131.242 ", "ContentType": "text/plain"}], "uids": ["CZtcCy4tNtPvKH3aR2"]} -{"Format": "IDEA0", "ID": "770e87fb-0c45-4067-9532-1b456a32d45f", "DetectTime": "2023-10-30T13:58:41.897331+02:00", "EventTime": "2023-10-30T13:58:41.897348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.19.92.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.19.92.194 ", "ContentType": "text/plain"}], "uids": ["CeVIH14yWwch2YrLal"]} -{"Format": "IDEA0", "ID": "271944ea-7cdc-45a1-9341-917f38d430c5", "DetectTime": "2023-10-30T13:58:41.922686+02:00", "EventTime": "2023-10-30T13:58:41.922702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.28.99.184"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.28.99.184 ", "ContentType": "text/plain"}], "uids": ["CUsl9h4LiE2ce3ELCa"]} -{"Format": "IDEA0", "ID": "713704c4-3254-4c21-ad8a-60ff7b54c110", "DetectTime": "2023-10-30T13:58:41.951213+02:00", "EventTime": "2023-10-30T13:58:41.951230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CKVpwc4tipITtyLE8h"]} -{"Format": "IDEA0", "ID": "052b6932-97cc-4ce6-b24e-8a5538731097", "DetectTime": "2023-10-30T13:58:41.979102+02:00", "EventTime": "2023-10-30T13:58:41.979116+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CU4Mqc3QI0Lvgr4R23"]} -{"Format": "IDEA0", "ID": "74509182-3591-41c2-8f27-42727f4bea32", "DetectTime": "2023-10-30T13:58:41.991306+02:00", "EventTime": "2023-10-30T13:58:41.991322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CwXQDC1nzMeNCUaFf4"]} -{"Format": "IDEA0", "ID": "df5d93bc-33c3-459c-9612-6c092df21184", "DetectTime": "2023-10-30T13:58:42.019317+02:00", "EventTime": "2023-10-30T13:58:42.019339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.65.37.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.65.37.77 ", "ContentType": "text/plain"}], "uids": ["COdFxl2TLruwDWirSl"]} -{"Format": "IDEA0", "ID": "9dd2c5fd-8c32-4c22-aed2-8cbc4a428f81", "DetectTime": "2023-10-30T13:58:42.046910+02:00", "EventTime": "2023-10-30T13:58:42.046929+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUTRg31p5bzeDAVZK7"]} -{"Format": "IDEA0", "ID": "cf11904c-7509-48d1-b862-d49dc8bbdb54", "DetectTime": "2023-10-30T13:58:42.064657+02:00", "EventTime": "2023-10-30T13:58:42.064668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["C679vr4EUmar3P8Mo8"]} -{"Format": "IDEA0", "ID": "e65a372f-3df7-4fd6-b0e2-248cc4e2dceb", "DetectTime": "2023-10-30T13:58:42.088631+02:00", "EventTime": "2023-10-30T13:58:42.088649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"], "Hostname": ["2-230-133-66.ip202.fastwebnet.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.230.133.66 AS: FASTWEB, IT AS12874 rDNS: 2-230-133-66.ip202.fastwebnet.it", "ContentType": "text/plain"}], "uids": ["CniLPARtBjhvgXYsa"]} -{"Format": "IDEA0", "ID": "5c7bad62-1e21-4d21-8295-c761c059a414", "DetectTime": "2023-10-30T13:58:42.115908+02:00", "EventTime": "2023-10-30T13:58:42.115923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["Cazi8e34zAZtimWOk6"]} -{"Format": "IDEA0", "ID": "fcff7fed-a90d-4605-ae96-64b40c972bbf", "DetectTime": "2023-10-30T13:58:42.141748+02:00", "EventTime": "2023-10-30T13:58:42.141764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmpZbN3Iidf8VJIaY6", "CCxw6g3lTb3o2WUQeb", "CYvfIN3qTMauwQYiG8", "CU4Mqc3QI0Lvgr4R23"]} -{"Format": "IDEA0", "ID": "9c0741d9-aae2-48df-8327-58f8a1dc3475", "DetectTime": "2023-10-30T13:58:42.155342+02:00", "EventTime": "2023-10-30T13:58:42.155367+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCxw6g3lTb3o2WUQeb"]} -{"Format": "IDEA0", "ID": "460cb8ce-f05e-4395-88be-83885e18f00f", "DetectTime": "2023-10-30T13:58:42.169168+02:00", "EventTime": "2023-10-30T13:58:42.169187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CxuEFo3d1UlkSzHD4a"]} -{"Format": "IDEA0", "ID": "8fbe4e6b-66e0-41fc-bdcf-4afe5f8aebe6", "DetectTime": "2023-10-30T13:58:42.196403+02:00", "EventTime": "2023-10-30T13:58:42.196423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CU2QZk29OOcdZ00Ph"]} -{"Format": "IDEA0", "ID": "623fcfd8-438f-4a75-aa43-498bade97439", "DetectTime": "2023-10-30T13:58:42.222921+02:00", "EventTime": "2023-10-30T13:58:42.222943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.67.62.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.67.62.148 ", "ContentType": "text/plain"}], "uids": ["Cls3ggkYOpiuYqAl2"]} -{"Format": "IDEA0", "ID": "510276dc-4b6a-4ccd-980f-71a98a76caa4", "DetectTime": "2023-10-30T13:58:42.249245+02:00", "EventTime": "2023-10-30T13:58:42.249262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CcUdSV3uwo4REXaWdf"]} -{"Format": "IDEA0", "ID": "2e2f066a-591c-4efe-af19-366c0c7da519", "DetectTime": "2023-10-30T13:58:42.271473+02:00", "EventTime": "2023-10-30T13:58:42.271485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.21.73.216 ", "ContentType": "text/plain"}], "uids": ["CHuw5d1pq6AQnnBFT8"]} -{"Format": "IDEA0", "ID": "44a7b2db-a02f-4341-a871-f912dcbb9f3e", "DetectTime": "2023-10-30T13:58:42.292757+02:00", "EventTime": "2023-10-30T13:58:42.292768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.108.94.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.108.94.108 ", "ContentType": "text/plain"}], "uids": ["CXNrq54nPhzT2TJy4h"]} -{"Format": "IDEA0", "ID": "5206c3ac-c957-49d9-b077-e8c0fa32edd5", "DetectTime": "2023-10-30T13:58:42.320403+02:00", "EventTime": "2023-10-30T13:58:42.320430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.0.130.4 ", "ContentType": "text/plain"}], "uids": ["ClN3AVVad4stvkL7j"]} -{"Format": "IDEA0", "ID": "55530cd2-fe89-4ee7-8396-891a9ac9daae", "DetectTime": "2023-10-30T13:58:42.348977+02:00", "EventTime": "2023-10-30T13:58:42.348994+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ca7p4XVfAF8T4qfU"]} -{"Format": "IDEA0", "ID": "f8b41952-a446-4165-9b48-1d31e661d7c5", "DetectTime": "2023-10-30T13:58:42.363727+02:00", "EventTime": "2023-10-30T13:58:42.363746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.3.157.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.3.157.95 ", "ContentType": "text/plain"}], "uids": ["CbrRxe1EOYLoo4u2Lh"]} -{"Format": "IDEA0", "ID": "6aa982e7-9e73-472a-8bcc-55def84e4085", "DetectTime": "2023-10-30T13:58:42.390456+02:00", "EventTime": "2023-10-30T13:58:42.390473+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmC77h3PPLINMrZNAc"]} -{"Format": "IDEA0", "ID": "902c0708-01a6-4bbb-b0a5-cb042cb62bfa", "DetectTime": "2023-10-30T13:58:42.404648+02:00", "EventTime": "2023-10-30T13:58:42.404664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["CXpvGm37vXQhmzBIFj"]} -{"Format": "IDEA0", "ID": "24325e08-639b-4505-b698-9d25528ab70b", "DetectTime": "2023-10-30T13:58:42.433656+02:00", "EventTime": "2023-10-30T13:58:42.433679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CTeQeE1bTir4qWr7Ff"]} -{"Format": "IDEA0", "ID": "e735422d-2a5d-493b-a190-6d4287b6f106", "DetectTime": "2023-10-30T13:58:42.461993+02:00", "EventTime": "2023-10-30T13:58:42.462014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.147.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.147.224.10 ", "ContentType": "text/plain"}], "uids": ["CVMgA51vcozvxuNVg6"]} -{"Format": "IDEA0", "ID": "07659a1b-fa2e-42e1-b6cd-07221423af06", "DetectTime": "2023-10-30T13:58:42.492939+02:00", "EventTime": "2023-10-30T13:58:42.492957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CeKna52tHLEYssHTYc"]} -{"Format": "IDEA0", "ID": "5e59855c-0276-4308-b5f0-3d5915c1e668", "DetectTime": "2023-10-30T13:58:42.520121+02:00", "EventTime": "2023-10-30T13:58:42.520138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.227.238.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.227.238.19 ", "ContentType": "text/plain"}], "uids": ["C2BEyW1jWBL2rr1q6a"]} -{"Format": "IDEA0", "ID": "6a1d529e-fdc7-4be2-ac95-019d124e6130", "DetectTime": "2023-10-30T13:58:42.548996+02:00", "EventTime": "2023-10-30T13:58:42.549023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CAWpnuK05xKBpswO6"]} -{"Format": "IDEA0", "ID": "e9285e23-0860-472e-b0b2-238cd3a9cca1", "DetectTime": "2023-10-30T13:58:42.574482+02:00", "EventTime": "2023-10-30T13:58:42.574498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.65.66 ", "ContentType": "text/plain"}], "uids": ["Cua3ZVYyWkR1G23Uh"]} -{"Format": "IDEA0", "ID": "0bc84c07-4f76-4de6-a232-1b7b5daa00b0", "DetectTime": "2023-10-30T13:58:42.604174+02:00", "EventTime": "2023-10-30T13:58:42.604192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.7.103.29 ", "ContentType": "text/plain"}], "uids": ["C82gE41r5maiEcMjf"]} -{"Format": "IDEA0", "ID": "1ca88105-8b26-49e5-a261-b6983a7123a4", "DetectTime": "2023-10-30T13:58:42.632945+02:00", "EventTime": "2023-10-30T13:58:42.632962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.192.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.192.181 ", "ContentType": "text/plain"}], "uids": ["Cw84K71PdmbQCY09X9"]} -{"Format": "IDEA0", "ID": "2c2ecd38-9858-4003-b858-d2374999b593", "DetectTime": "2023-10-30T13:58:42.657550+02:00", "EventTime": "2023-10-30T13:58:42.657568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["C2mJvv4jSWOXJwL51l"]} -{"Format": "IDEA0", "ID": "1dc5919d-3d0d-4c92-98df-a7afefbad69d", "DetectTime": "2023-10-30T13:58:42.684605+02:00", "EventTime": "2023-10-30T13:58:42.684621+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxbM5A4eLHcSY2ZlYh"]} -{"Format": "IDEA0", "ID": "48dacd71-da29-43ce-b2cb-7eaf2dfb7c78", "DetectTime": "2023-10-30T13:58:42.698261+02:00", "EventTime": "2023-10-30T13:58:42.698279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["CWdzdJF72Dsnp0v49"]} -{"Format": "IDEA0", "ID": "df5dfb4b-4cc3-4b85-b940-10cb55ecf49d", "DetectTime": "2023-10-30T13:58:42.724204+02:00", "EventTime": "2023-10-30T13:58:42.724222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.62.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.62.90 ", "ContentType": "text/plain"}], "uids": ["CPluLc1dxyUrkL7ZYa"]} -{"Format": "IDEA0", "ID": "414f6d7e-e6b8-4fa4-967d-04542dc769a9", "DetectTime": "2023-10-30T13:58:42.748588+02:00", "EventTime": "2023-10-30T13:58:42.748604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CWtnCoHFZ6IsgiqL4"]} -{"Format": "IDEA0", "ID": "548b2f4a-0374-4e4a-97be-42a7be2cd2a6", "DetectTime": "2023-10-30T13:58:42.773226+02:00", "EventTime": "2023-10-30T13:58:42.773243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.67.131.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.67.131.119 ", "ContentType": "text/plain"}], "uids": ["Cp9DGW1L6gV38PMjZ5"]} -{"Format": "IDEA0", "ID": "335fea06-5bc1-488e-abc9-f6e3e29c5515", "DetectTime": "2023-10-30T13:58:42.799254+02:00", "EventTime": "2023-10-30T13:58:42.799273+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfEC5JSR7pfqilC93"]} -{"Format": "IDEA0", "ID": "61e49d1f-0c05-4f26-bf41-8bcc28ecb053", "DetectTime": "2023-10-30T13:58:42.810252+02:00", "EventTime": "2023-10-30T13:58:42.810264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.235.49.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.235.49.244 ", "ContentType": "text/plain"}], "uids": ["CEFgDn2V5R81yUURf2"]} -{"Format": "IDEA0", "ID": "8e0e2f74-d83c-4906-8c6e-b6449e664525", "DetectTime": "2023-10-30T13:58:42.834205+02:00", "EventTime": "2023-10-30T13:58:42.834223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 ", "ContentType": "text/plain"}], "uids": ["CsHuqi3a3uWOGMlcYc"]} -{"Format": "IDEA0", "ID": "9125ac3e-9d44-4b42-9bf7-3a9085187423", "DetectTime": "2023-10-30T13:58:42.860047+02:00", "EventTime": "2023-10-30T13:58:42.860065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 ", "ContentType": "text/plain"}], "uids": ["CfDR6k4GnLuqV4yvFf"]} -{"Format": "IDEA0", "ID": "57fc2646-4dcc-420a-9325-d3bb123244d4", "DetectTime": "2023-10-30T13:58:42.883016+02:00", "EventTime": "2023-10-30T13:58:42.883038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.143.178.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.143.178.97 ", "ContentType": "text/plain"}], "uids": ["CQAllFm437XXbJd75"]} -{"Format": "IDEA0", "ID": "006e0cfa-7bff-4a30-ad0c-e14de687201a", "DetectTime": "2023-10-30T13:58:42.906633+02:00", "EventTime": "2023-10-30T13:58:42.906646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["CBFNfS274jfM9bzNPj"]} -{"Format": "IDEA0", "ID": "91b397dc-29e7-4e72-95a9-fc5155a36510", "DetectTime": "2023-10-30T13:58:42.929890+02:00", "EventTime": "2023-10-30T13:58:42.929912+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQTjj4LUEiytmi8Ih"]} -{"Format": "IDEA0", "ID": "071669a8-60cc-47d0-8993-9769055c851d", "DetectTime": "2023-10-30T13:58:42.942332+02:00", "EventTime": "2023-10-30T13:58:42.942348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.22.24.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.22.24.78 ", "ContentType": "text/plain"}], "uids": ["CqmUo1IF9NIh34XHk"]} -{"Format": "IDEA0", "ID": "f67ef379-3097-4fb2-9480-6afbfe4cdcb0", "DetectTime": "2023-10-30T13:58:42.968084+02:00", "EventTime": "2023-10-30T13:58:42.968095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.156.171.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.156.171.127 ", "ContentType": "text/plain"}], "uids": ["CNepT91zUlOmKbvGVh"]} -{"Format": "IDEA0", "ID": "b29b845f-2953-4c37-a905-5cc3f7bfbce9", "DetectTime": "2023-10-30T13:58:42.991871+02:00", "EventTime": "2023-10-30T13:58:42.991887+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cm765v2NBGZquOg5qj"]} -{"Format": "IDEA0", "ID": "a6394dec-e38f-41ec-8bd0-0a8d4642204f", "DetectTime": "2023-10-30T13:58:43.004249+02:00", "EventTime": "2023-10-30T13:58:43.004264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.101 ", "ContentType": "text/plain"}], "uids": ["CkXY2EPU4mYgIRUS"]} -{"Format": "IDEA0", "ID": "e973e81f-59a7-4427-a54a-2eb55a19dde1", "DetectTime": "2023-10-30T13:58:43.029585+02:00", "EventTime": "2023-10-30T13:58:43.029602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CPk2af1yqzMTinjRn8"]} -{"Format": "IDEA0", "ID": "89b954f2-516c-4b5e-93a5-f6c98ffb632c", "DetectTime": "2023-10-30T13:58:43.054660+02:00", "EventTime": "2023-10-30T13:58:43.054684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.210.133.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.210.133.235 ", "ContentType": "text/plain"}], "uids": ["CLl5VC1Yz8htAUjVDf"]} -{"Format": "IDEA0", "ID": "344d8da3-4a27-446b-97bb-4343ef8ed05c", "DetectTime": "2023-10-30T13:58:43.076548+02:00", "EventTime": "2023-10-30T13:58:43.076564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.253.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.253.41 ", "ContentType": "text/plain"}], "uids": ["CoWFuU35Zyv73Kl02g"]} -{"Format": "IDEA0", "ID": "87ba3008-231c-45d9-a1e6-86cdd79e8133", "DetectTime": "2023-10-30T13:58:43.098067+02:00", "EventTime": "2023-10-30T13:58:43.098087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.90.50.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.90.50.124 ", "ContentType": "text/plain"}], "uids": ["CbKhBR2RGCiUP7L6xl"]} -{"Format": "IDEA0", "ID": "59ee3d46-2e4a-4c29-a9cd-6ee85f2de8b1", "DetectTime": "2023-10-30T13:58:43.126426+02:00", "EventTime": "2023-10-30T13:58:43.126444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.228.140.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.228.140.114 ", "ContentType": "text/plain"}], "uids": ["CpXwnI3NqgM1sJhTla"]} -{"Format": "IDEA0", "ID": "a54483ea-db58-4014-81e5-5728336a798d", "DetectTime": "2023-10-30T13:58:43.154494+02:00", "EventTime": "2023-10-30T13:58:43.154522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C7IuzPWETsKLKUbwk"]} -{"Format": "IDEA0", "ID": "50abb81a-6ae8-4ff7-9be1-e5f57cee6f31", "DetectTime": "2023-10-30T13:58:43.177803+02:00", "EventTime": "2023-10-30T13:58:43.177815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CYuVRM3F1vghD841Cg"]} -{"Format": "IDEA0", "ID": "119ef8a8-dde9-4cff-8630-08e3832771de", "DetectTime": "2023-10-30T13:58:43.198360+02:00", "EventTime": "2023-10-30T13:58:43.198380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.149.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.198.149.73 ", "ContentType": "text/plain"}], "uids": ["CmMiIGwu2Cj5fGdr1"]} -{"Format": "IDEA0", "ID": "803b9e30-ab87-4d11-9965-3f45f4f5b9a3", "DetectTime": "2023-10-30T13:58:43.224542+02:00", "EventTime": "2023-10-30T13:58:43.224560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.251.66.43"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.251.66.43 ", "ContentType": "text/plain"}], "uids": ["CBPDwC2QpSy9m7X2Mj"]} -{"Format": "IDEA0", "ID": "f94c5104-c1c7-4574-a02d-b7bbc48fbda6", "DetectTime": "2023-10-30T13:58:43.247424+02:00", "EventTime": "2023-10-30T13:58:43.247441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.22.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.22.199 ", "ContentType": "text/plain"}], "uids": ["CrBwui1pnDA3PB5kY9"]} -{"Format": "IDEA0", "ID": "0496846f-7afd-4d59-8d9f-94c55b908179", "DetectTime": "2023-10-30T13:58:43.267319+02:00", "EventTime": "2023-10-30T13:58:43.267335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.54.51.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.54.51.84 ", "ContentType": "text/plain"}], "uids": ["CGsUPd2s5ViS9IwMw4"]} -{"Format": "IDEA0", "ID": "b9b33533-8d53-4644-9090-e5590b4c933a", "DetectTime": "2023-10-30T13:58:43.290147+02:00", "EventTime": "2023-10-30T13:58:43.290163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.112.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.165.112.128 ", "ContentType": "text/plain"}], "uids": ["CzhB0b565pZJmAQsk"]} -{"Format": "IDEA0", "ID": "72de913a-3373-4c94-9340-b8bc084e321d", "DetectTime": "2023-10-30T13:58:43.312140+02:00", "EventTime": "2023-10-30T13:58:43.312163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.41.99.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.41.99.7 ", "ContentType": "text/plain"}], "uids": ["CTK1FI3A2N1aC8Kbq1"]} -{"Format": "IDEA0", "ID": "8da1080d-aa56-49e4-b483-0c1d95808fac", "DetectTime": "2023-10-30T13:58:43.338576+02:00", "EventTime": "2023-10-30T13:58:43.338593+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEhsWasOK3h8Ntgrd"]} -{"Format": "IDEA0", "ID": "5bcfeaa0-b951-4afb-b185-690635bbe07b", "DetectTime": "2023-10-30T13:58:43.352641+02:00", "EventTime": "2023-10-30T13:58:43.352660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.216.253.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.216.253.233 ", "ContentType": "text/plain"}], "uids": ["CDwftu9SOh0Xzfcya"]} -{"Format": "IDEA0", "ID": "be5fac0a-47db-4aeb-a015-476bfcb6ce3d", "DetectTime": "2023-10-30T13:58:43.376047+02:00", "EventTime": "2023-10-30T13:58:43.376058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CgtG2511kFB7DLdDN9"]} -{"Format": "IDEA0", "ID": "8b53c931-b043-44f4-8c36-1f0f1ede6a6d", "DetectTime": "2023-10-30T13:58:43.399208+02:00", "EventTime": "2023-10-30T13:58:43.399229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.57.162.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.57.162.209 ", "ContentType": "text/plain"}], "uids": ["C7Blsu3zdVrGOwRIl8"]} -{"Format": "IDEA0", "ID": "dd110dc4-2592-401a-bdc1-e59ba782cb56", "DetectTime": "2023-10-30T13:58:43.423450+02:00", "EventTime": "2023-10-30T13:58:43.423460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CfEC5JSR7pfqilC93", "CDvEYv3Lu4SGVdEvP6", "Cm765v2NBGZquOg5qj", "CmC77h3PPLINMrZNAc"]} -{"Format": "IDEA0", "ID": "2664eee2-6d1d-4d33-b128-d2b169dc2360", "DetectTime": "2023-10-30T13:58:43.435488+02:00", "EventTime": "2023-10-30T13:58:43.435504+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDvEYv3Lu4SGVdEvP6"]} -{"Format": "IDEA0", "ID": "9663b8af-b8f5-49c4-a042-2c159510dd39", "DetectTime": "2023-10-30T13:58:43.446796+02:00", "EventTime": "2023-10-30T13:58:43.446820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CQNs2pDpdDODSoKfi"]} -{"Format": "IDEA0", "ID": "e2f3b2ba-999a-4ae4-9359-1f2815a7fe13", "DetectTime": "2023-10-30T13:58:43.471713+02:00", "EventTime": "2023-10-30T13:58:43.471731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.137.25.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.137.25.33 ", "ContentType": "text/plain"}], "uids": ["C3ihK3lGnZ64Ct80i"]} -{"Format": "IDEA0", "ID": "82033766-b88e-440c-b8db-eff9cf09f444", "DetectTime": "2023-10-30T13:58:43.493649+02:00", "EventTime": "2023-10-30T13:58:43.493665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["ClsFIu1BupwK2xVdw3"]} -{"Format": "IDEA0", "ID": "5ac82c64-0880-4cc8-bf1c-5312c3099c9c", "DetectTime": "2023-10-30T13:58:43.518976+02:00", "EventTime": "2023-10-30T13:58:43.518996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.74.88.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.74.88.48 ", "ContentType": "text/plain"}], "uids": ["Cjro6b4T7fvaWKXesi"]} -{"Format": "IDEA0", "ID": "40f44891-62ce-49ee-a0e4-09da147dc724", "DetectTime": "2023-10-30T13:58:43.545085+02:00", "EventTime": "2023-10-30T13:58:43.545101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.238.90.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.238.90.149 ", "ContentType": "text/plain"}], "uids": ["CH6rek2t1r2OrKYI88"]} -{"Format": "IDEA0", "ID": "dc6ae893-37b0-4b26-9f41-58eb2adee68b", "DetectTime": "2023-10-30T13:58:43.569361+02:00", "EventTime": "2023-10-30T13:58:43.569389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.77.238.196"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.77.238.196 ", "ContentType": "text/plain"}], "uids": ["Co2pnT3kBIbiFwQ54c"]} -{"Format": "IDEA0", "ID": "a9154381-133b-4252-951b-e53d4b86043e", "DetectTime": "2023-10-30T13:58:43.593552+02:00", "EventTime": "2023-10-30T13:58:43.593568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.206.15.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.206.15.133 ", "ContentType": "text/plain"}], "uids": ["Cdfb1l1Ong76vfC5bb"]} -{"Format": "IDEA0", "ID": "ae699200-83a5-42af-b21c-0f1e396a61cf", "DetectTime": "2023-10-30T13:58:43.611894+02:00", "EventTime": "2023-10-30T13:58:43.611906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.34.7.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.34.7.46 ", "ContentType": "text/plain"}], "uids": ["CxmOKo2pu4ENY5RGy3"]} -{"Format": "IDEA0", "ID": "101c2932-def3-4cad-a6eb-8a5076d6ca51", "DetectTime": "2023-10-30T13:58:43.633881+02:00", "EventTime": "2023-10-30T13:58:43.633898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.8.181.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.8.181.18 ", "ContentType": "text/plain"}], "uids": ["CaaHyp3im3vClShnfl"]} -{"Format": "IDEA0", "ID": "d3b82b92-d5bf-449e-a2e5-09d75bc269e8", "DetectTime": "2023-10-30T13:58:43.657757+02:00", "EventTime": "2023-10-30T13:58:43.657774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.0.89.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.0.89.165 ", "ContentType": "text/plain"}], "uids": ["CFKB3n2mR6sKtEkWtc"]} -{"Format": "IDEA0", "ID": "cc8b81bd-de1e-453a-b654-ee546edf4edf", "DetectTime": "2023-10-30T13:58:43.681431+02:00", "EventTime": "2023-10-30T13:58:43.681447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["149.3.4.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 149.3.4.183 ", "ContentType": "text/plain"}], "uids": ["CUTshZ2LDxuxpEVZBk"]} -{"Format": "IDEA0", "ID": "0844617a-d89d-456d-a23e-aff9f0402123", "DetectTime": "2023-10-30T13:58:43.708026+02:00", "EventTime": "2023-10-30T13:58:43.708047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.123.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.123.33 ", "ContentType": "text/plain"}], "uids": ["CibQ6C3B673ExyQv6f"]} -{"Format": "IDEA0", "ID": "d9fede62-d304-4850-86ce-fe91c8d717a0", "DetectTime": "2023-10-30T13:58:43.734089+02:00", "EventTime": "2023-10-30T13:58:43.734106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CJN8sl24nAkfQOFDR8"]} -{"Format": "IDEA0", "ID": "e2b225e2-a248-44a6-aa34-09f114faab22", "DetectTime": "2023-10-30T13:58:43.755920+02:00", "EventTime": "2023-10-30T13:58:43.755936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CPo5oH2yoEk79XdxJa"]} -{"Format": "IDEA0", "ID": "8dd54c30-ba89-4d10-8427-ea0464556344", "DetectTime": "2023-10-30T13:58:43.780713+02:00", "EventTime": "2023-10-30T13:58:43.780737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.200.82.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.200.82.4 ", "ContentType": "text/plain"}], "uids": ["C0eGst1gQ0rFIsxJDd"]} -{"Format": "IDEA0", "ID": "81c9c0e7-8660-45c4-ae7a-393789b3616f", "DetectTime": "2023-10-30T13:58:43.802982+02:00", "EventTime": "2023-10-30T13:58:43.802997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CyyCfS3VHjERiiIbjd"]} -{"Format": "IDEA0", "ID": "37cca5ec-e103-4e50-8588-09039a37ec56", "DetectTime": "2023-10-30T13:58:43.830444+02:00", "EventTime": "2023-10-30T13:58:43.830465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.10.163.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.10.163.44 ", "ContentType": "text/plain"}], "uids": ["CzbvN543xrxhQL8oUl"]} -{"Format": "IDEA0", "ID": "c66c6fba-d0e1-4e45-83cd-03879d2e64df", "DetectTime": "2023-10-30T13:58:43.856161+02:00", "EventTime": "2023-10-30T13:58:43.856181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CL3549hJETlXVrP76"]} -{"Format": "IDEA0", "ID": "54cc165f-9086-4233-adb1-3b9c6378dfdf", "DetectTime": "2023-10-30T13:58:43.869163+02:00", "EventTime": "2023-10-30T13:58:43.869178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.135.135.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.135.135.193 ", "ContentType": "text/plain"}], "uids": ["ChIOvB1APOB3KFPKTb"]} -{"Format": "IDEA0", "ID": "e8d7fb63-c2a9-412d-af0d-b805f7b5e546", "DetectTime": "2023-10-30T13:58:43.894091+02:00", "EventTime": "2023-10-30T13:58:43.894108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.92.101.126 ", "ContentType": "text/plain"}], "uids": ["CqnjV72TjI0PzGrhsh"]} -{"Format": "IDEA0", "ID": "40ecff23-dd68-40fa-a16c-b044ac06a707", "DetectTime": "2023-10-30T13:58:43.917758+02:00", "EventTime": "2023-10-30T13:58:43.917775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.94.191.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.94.191.11 ", "ContentType": "text/plain"}], "uids": ["C0FH0c3VVOLkplzOfi"]} -{"Format": "IDEA0", "ID": "6cb0a3b6-cb2f-4343-9e75-ad07913b5232", "DetectTime": "2023-10-30T13:58:43.944422+02:00", "EventTime": "2023-10-30T13:58:43.944441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CskWTMUFqwvnxgd63"]} -{"Format": "IDEA0", "ID": "ff161335-d243-46cb-a799-766a4eb82e22", "DetectTime": "2023-10-30T13:58:43.971693+02:00", "EventTime": "2023-10-30T13:58:43.971709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["39.230.140.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 39.230.140.48 ", "ContentType": "text/plain"}], "uids": ["C4DYR74sr4oL3v8xA3"]} -{"Format": "IDEA0", "ID": "cffb539e-7d3e-40ee-8ff5-52b335bb8377", "DetectTime": "2023-10-30T13:58:43.994676+02:00", "EventTime": "2023-10-30T13:58:43.994693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.241.115.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.241.115.233 ", "ContentType": "text/plain"}], "uids": ["CMWbuJYw8mXXCn7cl"]} -{"Format": "IDEA0", "ID": "cf043579-831a-4d0a-bb99-bcd5ad0f1547", "DetectTime": "2023-10-30T13:58:44.018626+02:00", "EventTime": "2023-10-30T13:58:44.018638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.135.135.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.135.135.193 ", "ContentType": "text/plain"}], "uids": ["CHpWU03WmTL5dO2Zh2"]} -{"Format": "IDEA0", "ID": "460fd62b-20ec-49a5-9c14-6aade7683c9f", "DetectTime": "2023-10-30T13:58:44.042882+02:00", "EventTime": "2023-10-30T13:58:44.042895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.138.219.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.138.219.91 ", "ContentType": "text/plain"}], "uids": ["Ce9lyo4YikONo1t6sh"]} -{"Format": "IDEA0", "ID": "a52628fd-0bea-44a2-9ae6-024da981964f", "DetectTime": "2023-10-30T13:58:44.069012+02:00", "EventTime": "2023-10-30T13:58:44.069042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.112.175.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.112.175.202 ", "ContentType": "text/plain"}], "uids": ["CnZgiB1BJGORF0yz2"]} -{"Format": "IDEA0", "ID": "1030dc36-f151-4015-a8a3-99549d5bfd57", "DetectTime": "2023-10-30T13:58:44.094242+02:00", "EventTime": "2023-10-30T13:58:44.094259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["C1fErt4AXMyJlQpKkk"]} -{"Format": "IDEA0", "ID": "936d98e8-4a24-40d6-a054-2942ab15eaa5", "DetectTime": "2023-10-30T13:58:44.119871+02:00", "EventTime": "2023-10-30T13:58:44.119890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.243.228.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.243.228.116 ", "ContentType": "text/plain"}], "uids": ["CgL0QV1oq2bCljTOsk"]} -{"Format": "IDEA0", "ID": "d6c40d12-7034-451d-a591-dafa401ad8ee", "DetectTime": "2023-10-30T13:58:44.145153+02:00", "EventTime": "2023-10-30T13:58:44.145165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["Cnsa4r3hXPvgeeB3r9"]} -{"Format": "IDEA0", "ID": "3b06c769-f723-46ab-a7bd-12263219fcb4", "DetectTime": "2023-10-30T13:58:44.169986+02:00", "EventTime": "2023-10-30T13:58:44.170006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CJJCPmogmSbeVgwzb"]} -{"Format": "IDEA0", "ID": "a6205dbf-3b8f-4495-8d57-f8fb6e956547", "DetectTime": "2023-10-30T13:58:44.196233+02:00", "EventTime": "2023-10-30T13:58:44.196251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.225.116.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.225.116.174 ", "ContentType": "text/plain"}], "uids": ["Ced0u18k54iPVZ5T4"]} -{"Format": "IDEA0", "ID": "5606efd5-fe2c-46f7-acc0-32e9ced275f8", "DetectTime": "2023-10-30T13:58:44.221367+02:00", "EventTime": "2023-10-30T13:58:44.221394+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwcwOV3CjA9wR8s3Ij"]} -{"Format": "IDEA0", "ID": "02c9da27-f268-4acf-b9ed-bdd8780a9571", "DetectTime": "2023-10-30T13:58:44.231136+02:00", "EventTime": "2023-10-30T13:58:44.231152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CcE66E46eTb8582HEd"]} -{"Format": "IDEA0", "ID": "7795904b-25a5-4b66-b0f1-7eeae046e514", "DetectTime": "2023-10-30T13:58:44.253473+02:00", "EventTime": "2023-10-30T13:58:44.253485+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRQcry3NKwdrDjxff6"]} -{"Format": "IDEA0", "ID": "3e7fa9de-a552-4412-81d2-a2f3061cc21f", "DetectTime": "2023-10-30T13:58:44.262456+02:00", "EventTime": "2023-10-30T13:58:44.262467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CeT8Mo42oEGXnNRMRi"]} -{"Format": "IDEA0", "ID": "68ff595d-f885-492d-b167-5c57450eafb1", "DetectTime": "2023-10-30T13:58:44.285030+02:00", "EventTime": "2023-10-30T13:58:44.285046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"], "Hostname": ["107-217-117-139.lightspeed.irvnca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.217.117.139 AS: ATT-INTERNET4, US AS7018 rDNS: 107-217-117-139.lightspeed.irvnca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CGCHD52wChtDp2NUY5"]} -{"Format": "IDEA0", "ID": "f5831bbd-fb76-40dc-8674-272a4286f864", "DetectTime": "2023-10-30T13:58:44.306295+02:00", "EventTime": "2023-10-30T13:58:44.306313+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBQfJe1MLMkV6KTtqk"]} -{"Format": "IDEA0", "ID": "9949d64e-a219-4aef-ac29-16627e946c32", "DetectTime": "2023-10-30T13:58:44.317514+02:00", "EventTime": "2023-10-30T13:58:44.317534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CmAtV21PTymnRpJxm"]} -{"Format": "IDEA0", "ID": "05cab32f-b94d-4148-a843-1ab8a8b02dc3", "DetectTime": "2023-10-30T13:58:44.340568+02:00", "EventTime": "2023-10-30T13:58:44.340584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["C8UbfE4bcrZPAuXWlj"]} -{"Format": "IDEA0", "ID": "023f6407-94b2-498b-9805-d0494a60d320", "DetectTime": "2023-10-30T13:58:44.474825+02:00", "EventTime": "2023-10-30T13:58:44.474847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["Cqo0Kr2idMWyEp8ZGj"]} -{"Format": "IDEA0", "ID": "344e5462-539f-4bfa-8529-6002f450cfe2", "DetectTime": "2023-10-30T13:58:44.510489+02:00", "EventTime": "2023-10-30T13:58:44.510507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CDwKZfQvYU6Wz5bwi"]} -{"Format": "IDEA0", "ID": "dd99ada6-dc14-4f9b-8dd7-19a02555aff7", "DetectTime": "2023-10-30T13:58:44.536241+02:00", "EventTime": "2023-10-30T13:58:44.536258+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcA5ku1uDzOloUaJH"]} -{"Format": "IDEA0", "ID": "06a7791a-3a3f-48ec-b66a-4c59a8baa8be", "DetectTime": "2023-10-30T13:58:44.545454+02:00", "EventTime": "2023-10-30T13:58:44.545468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.213.229.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.213.229.78 ", "ContentType": "text/plain"}], "uids": ["CXLvgY1IPfuAbKkmI7"]} -{"Format": "IDEA0", "ID": "871d434f-d3dc-422b-ba9d-bba41879332f", "DetectTime": "2023-10-30T13:58:44.571009+02:00", "EventTime": "2023-10-30T13:58:44.571033+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CynF9nskWSX6DXWr3"]} -{"Format": "IDEA0", "ID": "1588eae8-2918-4d01-9c20-05dd2be1a941", "DetectTime": "2023-10-30T13:58:44.581441+02:00", "EventTime": "2023-10-30T13:58:44.581457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CFdefFYNanjWew3Tj"]} -{"Format": "IDEA0", "ID": "7251cbb0-a960-4fbb-bb21-c600d0082ba6", "DetectTime": "2023-10-30T13:58:44.604986+02:00", "EventTime": "2023-10-30T13:58:44.604997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["CgnxaZ1ZLPlkQ4UhE"]} -{"Format": "IDEA0", "ID": "d0440545-488e-4ab2-bfaf-d203c324dd3b", "DetectTime": "2023-10-30T13:58:44.628264+02:00", "EventTime": "2023-10-30T13:58:44.628282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.223.90.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.223.90.86 ", "ContentType": "text/plain"}], "uids": ["CHtCQV2mSYQDfndHih"]} -{"Format": "IDEA0", "ID": "b259bbc0-a38b-493a-9af3-57c40c4adfe4", "DetectTime": "2023-10-30T13:58:44.650709+02:00", "EventTime": "2023-10-30T13:58:44.650725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.134.236.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.134.236.183 ", "ContentType": "text/plain"}], "uids": ["CgCXltv0ky4SXMaN9"]} -{"Format": "IDEA0", "ID": "de8c46cf-3bff-423b-83dd-a0697546ca39", "DetectTime": "2023-10-30T13:58:44.673061+02:00", "EventTime": "2023-10-30T13:58:44.673078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CuQbLu2C2NF4SPBZt6"]} -{"Format": "IDEA0", "ID": "f4baae3b-5d7b-4509-900f-7ea375836375", "DetectTime": "2023-10-30T13:58:44.695657+02:00", "EventTime": "2023-10-30T13:58:44.695676+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtcCjq1mwStkfhs0ub"]} -{"Format": "IDEA0", "ID": "2fabcdc3-2eac-45e0-be2c-362ea71a5948", "DetectTime": "2023-10-30T13:58:44.704519+02:00", "EventTime": "2023-10-30T13:58:44.704530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["COlOqM3slZCXKY3FNa"]} -{"Format": "IDEA0", "ID": "d191159b-eb31-4a32-a1ed-b46aed1e1b19", "DetectTime": "2023-10-30T13:58:44.730007+02:00", "EventTime": "2023-10-30T13:58:44.730028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.102.220.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.102.220.160 ", "ContentType": "text/plain"}], "uids": ["C7VRiW3HCPmsslaDzh"]} -{"Format": "IDEA0", "ID": "3662bcbd-ff40-440f-979c-d0dbdbf506af", "DetectTime": "2023-10-30T13:58:44.755922+02:00", "EventTime": "2023-10-30T13:58:44.755932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"], "Hostname": ["108-74-172-39.lightspeed.lsanca.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.74.172.39 AS: ATT-INTERNET4, US AS7018 rDNS: 108-74-172-39.lightspeed.lsanca.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C97j3l27E1KOwpVmDk"]} -{"Format": "IDEA0", "ID": "7359aea1-f5bf-425c-900a-1973a8b7c71b", "DetectTime": "2023-10-30T13:58:44.781661+02:00", "EventTime": "2023-10-30T13:58:44.781677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CdpdjX18jMwt9mXEI", "CBQfJe1MLMkV6KTtqk", "CwcwOV3CjA9wR8s3Ij", "CynF9nskWSX6DXWr3"]} -{"Format": "IDEA0", "ID": "ce34a268-63e4-409c-a84b-ca708d55739f", "DetectTime": "2023-10-30T13:58:44.791753+02:00", "EventTime": "2023-10-30T13:58:44.791769+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdpdjX18jMwt9mXEI"]} -{"Format": "IDEA0", "ID": "d2283993-8197-4092-91a6-f1792d4fc72c", "DetectTime": "2023-10-30T13:58:44.800266+02:00", "EventTime": "2023-10-30T13:58:44.800278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CC1ULp1WP1Kx3q676d"]} -{"Format": "IDEA0", "ID": "9ffd1385-3bf0-4079-b0d0-d898d6604bba", "DetectTime": "2023-10-30T13:58:44.841806+02:00", "EventTime": "2023-10-30T13:58:44.841831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.140.209.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.140.209.239 ", "ContentType": "text/plain"}], "uids": ["ColB1N3sgbFHKlmEqk"]} -{"Format": "IDEA0", "ID": "7adfde4d-9bee-4087-8c9a-d72804eb1477", "DetectTime": "2023-10-30T13:58:44.867124+02:00", "EventTime": "2023-10-30T13:58:44.867138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Hostname": ["ip-109-193-194-029.um39.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.194.29 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CbmWn325syIPUBajGg"]} -{"Format": "IDEA0", "ID": "3ad0904d-6546-4c74-8118-ecf66d9becae", "DetectTime": "2023-10-30T13:58:44.888780+02:00", "EventTime": "2023-10-30T13:58:44.888791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["91.137.174.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 91.137.174.85 ", "ContentType": "text/plain"}], "uids": ["CPWKFO37WnkD2MtAre"]} -{"Format": "IDEA0", "ID": "bbb9ac81-f37b-4138-ab86-73388cb29af2", "DetectTime": "2023-10-30T13:58:44.910939+02:00", "EventTime": "2023-10-30T13:58:44.910956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.90.33.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.90.33.81 ", "ContentType": "text/plain"}], "uids": ["CzPva31OkMxnVn8obc"]} -{"Format": "IDEA0", "ID": "c3f6f655-1b4b-4598-9545-cd3c744db71e", "DetectTime": "2023-10-30T13:58:44.939038+02:00", "EventTime": "2023-10-30T13:58:44.939060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CXJuyo4Rct2bmgBLyk"]} -{"Format": "IDEA0", "ID": "88ea81ac-e9c5-4f3d-b753-d8b769ec277e", "DetectTime": "2023-10-30T13:58:44.965535+02:00", "EventTime": "2023-10-30T13:58:44.965553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["CvFAQt3TjVDYpXgCA4"]} -{"Format": "IDEA0", "ID": "93d1c2e3-7153-4ed4-ae24-ff72229500da", "DetectTime": "2023-10-30T13:58:44.989105+02:00", "EventTime": "2023-10-30T13:58:44.989124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.169.229.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.169.229.240 ", "ContentType": "text/plain"}], "uids": ["Ct7bCS39TnOZlIJMle"]} -{"Format": "IDEA0", "ID": "71a5d33d-b6af-468d-aebd-d5204eccebc6", "DetectTime": "2023-10-30T13:58:45.017521+02:00", "EventTime": "2023-10-30T13:58:45.017538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["Ci3dJ54P3KTm784TIb"]} -{"Format": "IDEA0", "ID": "9d14fa27-456f-436e-9c69-7937efde360c", "DetectTime": "2023-10-30T13:58:45.041863+02:00", "EventTime": "2023-10-30T13:58:45.041884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.141.203.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.141.203.245 ", "ContentType": "text/plain"}], "uids": ["ClW6lL3oO8wbRNvLz"]} -{"Format": "IDEA0", "ID": "53a61878-3701-4f47-a141-84872d38071d", "DetectTime": "2023-10-30T13:58:45.066314+02:00", "EventTime": "2023-10-30T13:58:45.066326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CrJTfZYkMVrYPKWig"]} -{"Format": "IDEA0", "ID": "18ae73c2-ab3b-447e-afcd-190765b9d86d", "DetectTime": "2023-10-30T13:58:45.093480+02:00", "EventTime": "2023-10-30T13:58:45.093492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CxM1co35bBzvEEyth4"]} -{"Format": "IDEA0", "ID": "d9ae39ae-e854-4721-a493-84f0c5d2ff82", "DetectTime": "2023-10-30T13:58:45.114204+02:00", "EventTime": "2023-10-30T13:58:45.114216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CCPAtu3aMgQfGGCfq6"]} -{"Format": "IDEA0", "ID": "bbf7e6f2-2c40-46f9-9813-177613cbb45c", "DetectTime": "2023-10-30T13:58:45.137089+02:00", "EventTime": "2023-10-30T13:58:45.137115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.232.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.232.130 ", "ContentType": "text/plain"}], "uids": ["CwMyuR2IcmdVBhrw8a"]} -{"Format": "IDEA0", "ID": "21d56dbd-4459-49d6-a5a6-d9fee1f411f9", "DetectTime": "2023-10-30T13:58:45.166145+02:00", "EventTime": "2023-10-30T13:58:45.166162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["CbUGi94hCeJKZC2hlg"]} -{"Format": "IDEA0", "ID": "b3d10dfb-7f43-4fc1-8d16-26abcbb4a957", "DetectTime": "2023-10-30T13:58:45.190894+02:00", "EventTime": "2023-10-30T13:58:45.190911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["CSxJ8C4gCcd51yVByg"]} -{"Format": "IDEA0", "ID": "18bb926a-26a3-44b0-8750-9f6749ae8537", "DetectTime": "2023-10-30T13:58:45.231929+02:00", "EventTime": "2023-10-30T13:58:45.231948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.200.82.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.200.82.4 ", "ContentType": "text/plain"}], "uids": ["Ci3vxA1aUOXo0W59Cg"]} -{"Format": "IDEA0", "ID": "cfa6d573-c8c3-463d-8734-141d0adc2608", "DetectTime": "2023-10-30T13:58:45.261857+02:00", "EventTime": "2023-10-30T13:58:45.261877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CKOQ6r4WcklY0utbtg"]} -{"Format": "IDEA0", "ID": "5363700e-5dd1-41b1-a3a7-a2bf16caff74", "DetectTime": "2023-10-30T13:58:45.289597+02:00", "EventTime": "2023-10-30T13:58:45.289608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CMMNSH2d6fpprknqke"]} -{"Format": "IDEA0", "ID": "ccf3a079-9a9f-441d-ade7-1a194f1ce5c7", "DetectTime": "2023-10-30T13:58:45.314228+02:00", "EventTime": "2023-10-30T13:58:45.314247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["C5gJc94RN5js5iXG5d"]} -{"Format": "IDEA0", "ID": "d4a50c48-382f-42f3-b15c-c16e178e5652", "DetectTime": "2023-10-30T13:58:45.337944+02:00", "EventTime": "2023-10-30T13:58:45.337962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.90.50.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.90.50.124 ", "ContentType": "text/plain"}], "uids": ["CX40dL1Hh4XysXUPz4"]} -{"Format": "IDEA0", "ID": "e4c7dd06-3574-44c5-9291-d53060008df9", "DetectTime": "2023-10-30T13:58:45.367197+02:00", "EventTime": "2023-10-30T13:58:45.367215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgDhEy2mk6n2cm5j5"]} -{"Format": "IDEA0", "ID": "c3c8aff1-fcee-444f-8ca6-352da80fb596", "DetectTime": "2023-10-30T13:58:45.391776+02:00", "EventTime": "2023-10-30T13:58:45.391796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CAmRnY2a4IS2YNZRIg"]} -{"Format": "IDEA0", "ID": "dea5374a-20de-4f40-85f4-31bae9d6259f", "DetectTime": "2023-10-30T13:58:45.420080+02:00", "EventTime": "2023-10-30T13:58:45.420097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CmCvrE2wvUSjmWXIIk"]} -{"Format": "IDEA0", "ID": "bb048f1a-c7fc-46f8-9a5f-72395feb4b2d", "DetectTime": "2023-10-30T13:58:45.445105+02:00", "EventTime": "2023-10-30T13:58:45.445248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["CZeUh62hNWf7B4s519"]} -{"Format": "IDEA0", "ID": "022866ca-f19d-4644-837b-e47444c7de37", "DetectTime": "2023-10-30T13:58:45.485037+02:00", "EventTime": "2023-10-30T13:58:45.485061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.235.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.235.230 ", "ContentType": "text/plain"}], "uids": ["CfhwyT1kykVMOyGj9e"]} -{"Format": "IDEA0", "ID": "0052afb0-9a91-4758-9ec5-3ad3cca4314c", "DetectTime": "2023-10-30T13:58:45.508192+02:00", "EventTime": "2023-10-30T13:58:45.508207+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9S4hH3FnEkb46ivej"]} -{"Format": "IDEA0", "ID": "5397d74f-76b6-4002-9825-a0c20c0d3c90", "DetectTime": "2023-10-30T13:58:45.519886+02:00", "EventTime": "2023-10-30T13:58:45.519897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CFUjw22WksbiEaxRD7"]} -{"Format": "IDEA0", "ID": "dfc27b97-4335-41b4-a856-e6c4d0cd3f78", "DetectTime": "2023-10-30T13:58:45.547722+02:00", "EventTime": "2023-10-30T13:58:45.547738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CL5ZuE4vVfVv24hjG2"]} -{"Format": "IDEA0", "ID": "28ff9360-1567-4dc9-997e-3373b8b539be", "DetectTime": "2023-10-30T13:58:45.575195+02:00", "EventTime": "2023-10-30T13:58:45.575213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CryZtm3bHsHlRVHzO"]} -{"Format": "IDEA0", "ID": "ed1c9043-e24c-4933-a386-fe2d6a933027", "DetectTime": "2023-10-30T13:58:45.598205+02:00", "EventTime": "2023-10-30T13:58:45.598226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["Cnz4ZN29dkYgo67hZ"]} -{"Format": "IDEA0", "ID": "40e6a8b4-7563-4f98-9f23-7293c6daf0fc", "DetectTime": "2023-10-30T13:58:45.624962+02:00", "EventTime": "2023-10-30T13:58:45.624977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["Cu5DEnzNjwrRLpGLe"]} -{"Format": "IDEA0", "ID": "447bd1a6-045e-4f96-b5b8-c3836b49f259", "DetectTime": "2023-10-30T13:58:45.650562+02:00", "EventTime": "2023-10-30T13:58:45.650580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CeHkHZILHqrY1LmWc"]} -{"Format": "IDEA0", "ID": "d92d8a80-8da3-49d7-a567-ea767d2af51c", "DetectTime": "2023-10-30T13:58:45.678730+02:00", "EventTime": "2023-10-30T13:58:45.678755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CZl5tC1WwYHf0EZIJb"]} -{"Format": "IDEA0", "ID": "b7717e74-1b3d-4b65-bca7-02c054939c1f", "DetectTime": "2023-10-30T13:58:45.724786+02:00", "EventTime": "2023-10-30T13:58:45.724802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.65.66 ", "ContentType": "text/plain"}], "uids": ["ChPy6v3meJrWCaWg9a"]} -{"Format": "IDEA0", "ID": "c21862db-3d7f-42d9-a44c-fb608fbbbcb8", "DetectTime": "2023-10-30T13:58:45.750734+02:00", "EventTime": "2023-10-30T13:58:45.750754+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CgD19X1y7do0eZ5h31"]} -{"Format": "IDEA0", "ID": "0b78c8b1-bda3-428c-9144-bc3335acd8d1", "DetectTime": "2023-10-30T13:58:45.761159+02:00", "EventTime": "2023-10-30T13:58:45.761176+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJdGn5Aa4tyDxUJ6i"]} -{"Format": "IDEA0", "ID": "a7aaa772-c4ba-4d84-b8db-bf3af0ba979e", "DetectTime": "2023-10-30T13:58:45.773883+02:00", "EventTime": "2023-10-30T13:58:45.773898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["CcXkRG1JKf9fyflkAd"]} -{"Format": "IDEA0", "ID": "149872a4-5cd1-4ac6-9d53-f7ed5b48e070", "DetectTime": "2023-10-30T13:58:45.799359+02:00", "EventTime": "2023-10-30T13:58:45.799376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CNvcig48lGk9lLJRpi"]} -{"Format": "IDEA0", "ID": "2b7d4754-da9a-4b3c-b6d0-533bcbad5067", "DetectTime": "2023-10-30T13:58:45.822258+02:00", "EventTime": "2023-10-30T13:58:45.822275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CFZxg437vnpafa7Ya9"]} -{"Format": "IDEA0", "ID": "941fc39d-28b6-451d-a098-4afa9f18ccda", "DetectTime": "2023-10-30T13:58:45.846676+02:00", "EventTime": "2023-10-30T13:58:45.846695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.92.101.126 ", "ContentType": "text/plain"}], "uids": ["CypD7k1lnMNKldrK17"]} -{"Format": "IDEA0", "ID": "1a2b78cb-b4f4-4906-8d2b-f44ab48d94f2", "DetectTime": "2023-10-30T13:58:45.871046+02:00", "EventTime": "2023-10-30T13:58:45.871065+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSgeBJ2RDumFxK3Bs3"]} -{"Format": "IDEA0", "ID": "2e0e83bb-0e06-446c-87c7-88c1fc64c9ab", "DetectTime": "2023-10-30T13:58:45.879671+02:00", "EventTime": "2023-10-30T13:58:45.879692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["C6r3WbOTkhSugYqT7"]} -{"Format": "IDEA0", "ID": "58d2b019-9fda-4756-92e7-4e22dcd33927", "DetectTime": "2023-10-30T13:58:45.905186+02:00", "EventTime": "2023-10-30T13:58:45.905203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["CmH36HVtGAneD3oXg"]} -{"Format": "IDEA0", "ID": "df595092-a413-46e4-b633-34bf7e74e155", "DetectTime": "2023-10-30T13:58:45.932634+02:00", "EventTime": "2023-10-30T13:58:45.932649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CX7PWE4s53GI2BC1T6"]} -{"Format": "IDEA0", "ID": "0e669e03-b8e7-4aa0-8374-ab99337987ee", "DetectTime": "2023-10-30T13:58:45.957775+02:00", "EventTime": "2023-10-30T13:58:45.957791+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIG5804bDLXa5iKKdj"]} -{"Format": "IDEA0", "ID": "767aebce-9e5d-423f-89a2-ab7af2e701d0", "DetectTime": "2023-10-30T13:58:45.969184+02:00", "EventTime": "2023-10-30T13:58:45.969200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["CZx0H31frTUAYVkyO2"]} -{"Format": "IDEA0", "ID": "a225816d-f5cc-4d89-862b-6ad1e8cf9b32", "DetectTime": "2023-10-30T13:58:46.009909+02:00", "EventTime": "2023-10-30T13:58:46.009924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.90.50.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.90.50.124 ", "ContentType": "text/plain"}], "uids": ["CO7glb4s5lPd0iyt8k"]} -{"Format": "IDEA0", "ID": "89b056f7-eb4d-4b19-a48e-a3bf6bdf494b", "DetectTime": "2023-10-30T13:58:46.034635+02:00", "EventTime": "2023-10-30T13:58:46.034648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ckhcth1B154IeuKm7j"]} -{"Format": "IDEA0", "ID": "1a23646d-185a-4be2-b5b2-d254ccd97f58", "DetectTime": "2023-10-30T13:58:46.043591+02:00", "EventTime": "2023-10-30T13:58:46.043604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CHDh003SHvqifZR2Ch"]} -{"Format": "IDEA0", "ID": "9796784c-a827-40a3-ade5-9a32c0984174", "DetectTime": "2023-10-30T13:58:46.065098+02:00", "EventTime": "2023-10-30T13:58:46.065115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["C8aAwk2mjVWDSO1Ud8"]} -{"Format": "IDEA0", "ID": "8ae5c3dc-f96c-4125-9e24-34d9a21e0437", "DetectTime": "2023-10-30T13:58:46.087471+02:00", "EventTime": "2023-10-30T13:58:46.087489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Chb6rz4LIxeHOLpupi"]} -{"Format": "IDEA0", "ID": "dec9ee4a-f109-45c0-9b8b-af9dd045aa9b", "DetectTime": "2023-10-30T13:58:46.116990+02:00", "EventTime": "2023-10-30T13:58:46.117006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQKX7o43YgPh3B9284"]} -{"Format": "IDEA0", "ID": "70f284f8-f30f-4c39-98c9-204ff5d153c3", "DetectTime": "2023-10-30T13:58:46.161767+02:00", "EventTime": "2023-10-30T13:58:46.161787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CdAuKu2DvaRdDZTOeh"]} -{"Format": "IDEA0", "ID": "0c8a997c-e542-4e4c-a600-e11d5d2037ec", "DetectTime": "2023-10-30T13:58:46.206287+02:00", "EventTime": "2023-10-30T13:58:46.206304+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CN26gd2RmrMiZcCp7d"]} -{"Format": "IDEA0", "ID": "c2d6b428-6afe-45a7-a9da-f5d8bba1d8ce", "DetectTime": "2023-10-30T13:58:46.216301+02:00", "EventTime": "2023-10-30T13:58:46.216317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cvp6Na2Aj4ziFHThXf"]} -{"Format": "IDEA0", "ID": "06eb64d9-9797-4fa1-8134-ecce6bd2041e", "DetectTime": "2023-10-30T13:58:46.240400+02:00", "EventTime": "2023-10-30T13:58:46.240418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CrHAIU3gfqdJCWnpDl"]} -{"Format": "IDEA0", "ID": "8adfb683-8380-41f9-bf42-5863dde94ae8", "DetectTime": "2023-10-30T13:58:46.284497+02:00", "EventTime": "2023-10-30T13:58:46.285326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["91.137.174.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 91.137.174.85 ", "ContentType": "text/plain"}], "uids": ["CC9f7x3w1EQKnvmQhd"]} -{"Format": "IDEA0", "ID": "5fd98e13-9b9a-4c8c-9e79-91abf5e0582f", "DetectTime": "2023-10-30T13:58:46.313982+02:00", "EventTime": "2023-10-30T13:58:46.314003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C6WFg31oh8E000BJlh"]} -{"Format": "IDEA0", "ID": "54036ccc-69b3-4e0e-b9b9-d360184f5531", "DetectTime": "2023-10-30T13:58:46.338494+02:00", "EventTime": "2023-10-30T13:58:46.338516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.232.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.232.130 ", "ContentType": "text/plain"}], "uids": ["C02KLc37dMXa5tP1He"]} -{"Format": "IDEA0", "ID": "0e268ed2-551b-45c1-8f25-80156cdb5cc8", "DetectTime": "2023-10-30T13:58:46.365248+02:00", "EventTime": "2023-10-30T13:58:46.365263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["Cru2pE399BP54dUWcd"]} -{"Format": "IDEA0", "ID": "cbab2d55-52e7-4930-8ba3-16aed540c758", "DetectTime": "2023-10-30T13:58:46.388200+02:00", "EventTime": "2023-10-30T13:58:46.388210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C2PE331FJFoNvO4NQk"]} -{"Format": "IDEA0", "ID": "bb2d3106-0a9d-45fc-8eb8-e96eb9cde347", "DetectTime": "2023-10-30T13:58:46.409722+02:00", "EventTime": "2023-10-30T13:58:46.409735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["CWboRC4kuAlEkmhj87"]} -{"Format": "IDEA0", "ID": "abe52df5-81de-4058-b6a5-b608211c3b21", "DetectTime": "2023-10-30T13:58:46.445996+02:00", "EventTime": "2023-10-30T13:58:46.446017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.200.82.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.200.82.4 ", "ContentType": "text/plain"}], "uids": ["CTdKir4galodxoBahf"]} -{"Format": "IDEA0", "ID": "fee7fb56-cb1c-47d9-a5d4-a10096f6d51e", "DetectTime": "2023-10-30T13:58:46.472535+02:00", "EventTime": "2023-10-30T13:58:46.472550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["149.3.4.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 149.3.4.183 ", "ContentType": "text/plain"}], "uids": ["C1qm8p2wymQnljxt1k"]} -{"Format": "IDEA0", "ID": "7496ff63-cd90-444f-aff1-cc99fa7ce062", "DetectTime": "2023-10-30T13:58:46.494426+02:00", "EventTime": "2023-10-30T13:58:46.494444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CSFEY5Hd9yJyELSCl"]} -{"Format": "IDEA0", "ID": "2403b226-1182-477f-ba36-90d9044f4d6b", "DetectTime": "2023-10-30T13:58:46.518574+02:00", "EventTime": "2023-10-30T13:58:46.518590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CBEtKj1xn4xnTwFqje"]} -{"Format": "IDEA0", "ID": "8619b3ef-6a4c-4d0e-bad2-e72656e2d31b", "DetectTime": "2023-10-30T13:58:46.545078+02:00", "EventTime": "2023-10-30T13:58:46.545096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.92.101.126 ", "ContentType": "text/plain"}], "uids": ["CT2d1q2NppTlyucB47"]} -{"Format": "IDEA0", "ID": "510efc80-1426-48a6-95de-816de4c73465", "DetectTime": "2023-10-30T13:58:46.571708+02:00", "EventTime": "2023-10-30T13:58:46.571724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.135.135.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.135.135.193 ", "ContentType": "text/plain"}], "uids": ["C28rKn1r8VTrNcfwRc"]} -{"Format": "IDEA0", "ID": "e5e228a4-57ae-4dca-8853-51793a5aeeb1", "DetectTime": "2023-10-30T13:58:46.598680+02:00", "EventTime": "2023-10-30T13:58:46.598706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CwRkWX133kQu253IUd"]} -{"Format": "IDEA0", "ID": "eed77584-7fb3-45ac-8e3e-26f9de8b17ed", "DetectTime": "2023-10-30T13:58:46.643221+02:00", "EventTime": "2023-10-30T13:58:46.643238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CuMRPw34hUQPeGn3ma"]} -{"Format": "IDEA0", "ID": "41c5c6b8-0af0-46f2-af59-738281a11337", "DetectTime": "2023-10-30T13:58:46.668651+02:00", "EventTime": "2023-10-30T13:58:46.668667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cuuyul2HtPDx6FXa4l"]} -{"Format": "IDEA0", "ID": "1aefea1a-e5b7-45fd-91a1-61f947d6ba29", "DetectTime": "2023-10-30T13:58:46.691151+02:00", "EventTime": "2023-10-30T13:58:46.691162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CqOUuX2fJgXMwSjv44"]} -{"Format": "IDEA0", "ID": "36748134-8bce-484b-9664-8f0688e2e238", "DetectTime": "2023-10-30T13:58:46.716699+02:00", "EventTime": "2023-10-30T13:58:46.716710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CcFU8e4KZJOEBXNJI4"]} -{"Format": "IDEA0", "ID": "72cfadf2-f94a-4e0d-9a46-9baa5f108a5b", "DetectTime": "2023-10-30T13:58:46.743401+02:00", "EventTime": "2023-10-30T13:58:46.743422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CehZ7a3RDxdit7fVn4"]} -{"Format": "IDEA0", "ID": "fa08aa52-47da-4a32-b0b9-db258b1e89f3", "DetectTime": "2023-10-30T13:58:46.769413+02:00", "EventTime": "2023-10-30T13:58:46.769425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CkwA7j4vkGhAp5LVK4"]} -{"Format": "IDEA0", "ID": "1b73e14c-8245-4b14-b2eb-4bf15aa75f91", "DetectTime": "2023-10-30T13:58:46.796828+02:00", "EventTime": "2023-10-30T13:58:46.796848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CS6ubs3r8XyJQlFimi"]} -{"Format": "IDEA0", "ID": "4d67f647-3d8f-47c0-90c5-d7ee39115d61", "DetectTime": "2023-10-30T13:58:46.825375+02:00", "EventTime": "2023-10-30T13:58:46.825390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CR4eMu4zFu7AX2MOpf"]} -{"Format": "IDEA0", "ID": "99106bda-9925-4a38-9666-c7f66feb6607", "DetectTime": "2023-10-30T13:58:46.852655+02:00", "EventTime": "2023-10-30T13:58:46.852666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["Ct9NaQQYKQjMSnEgd"]} -{"Format": "IDEA0", "ID": "21f9e2f0-ef3d-43db-8619-711c695fa9d9", "DetectTime": "2023-10-30T13:58:46.877195+02:00", "EventTime": "2023-10-30T13:58:46.877209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CIkdCzdtuYTF17GKb"]} -{"Format": "IDEA0", "ID": "d3a5ee29-75d1-49de-9eb3-1e14449da121", "DetectTime": "2023-10-30T13:58:46.899103+02:00", "EventTime": "2023-10-30T13:58:46.899114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CMYGRf1fYFqrRmpZrd"]} -{"Format": "IDEA0", "ID": "210eaed3-3c84-4a01-9cb2-fe0e5d8b62d6", "DetectTime": "2023-10-30T13:58:46.924520+02:00", "EventTime": "2023-10-30T13:58:46.924536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CKgS7q3Q3de0CN51G6"]} -{"Format": "IDEA0", "ID": "52cc7e30-9182-4c03-bbc2-75d3ece09869", "DetectTime": "2023-10-30T13:58:46.950680+02:00", "EventTime": "2023-10-30T13:58:46.950696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CDbUPahNAroiSWVEc"]} -{"Format": "IDEA0", "ID": "455c2d34-56ce-449d-8d07-639623cc6650", "DetectTime": "2023-10-30T13:58:46.972396+02:00", "EventTime": "2023-10-30T13:58:46.972407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CwWaaQyLr8v7F7uuj"]} -{"Format": "IDEA0", "ID": "5ed86911-6961-463d-9e7a-d92e91b8b603", "DetectTime": "2023-10-30T13:58:46.999763+02:00", "EventTime": "2023-10-30T13:58:46.999780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CEWQcxLtjF9oDfEya"]} -{"Format": "IDEA0", "ID": "77b5e5e3-9b77-4c5c-af6a-78a1826fae61", "DetectTime": "2023-10-30T13:58:47.026573+02:00", "EventTime": "2023-10-30T13:58:47.026587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CI3wby4PMSlTl8s0rl"]} -{"Format": "IDEA0", "ID": "94e38429-54f4-4ca1-a7f8-39df37df2d41", "DetectTime": "2023-10-30T13:58:47.070614+02:00", "EventTime": "2023-10-30T13:58:47.070628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CEpEZa3mvv5HaWtWc"]} -{"Format": "IDEA0", "ID": "a2c2e620-edf4-44fa-90fd-c040f745ae9f", "DetectTime": "2023-10-30T13:58:47.096573+02:00", "EventTime": "2023-10-30T13:58:47.096592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CfCemE3gsLwGyfitBd"]} -{"Format": "IDEA0", "ID": "66c9c511-b598-4b01-94c9-5efe66d67d9e", "DetectTime": "2023-10-30T13:58:47.117559+02:00", "EventTime": "2023-10-30T13:58:47.117574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["149.3.4.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 149.3.4.183 ", "ContentType": "text/plain"}], "uids": ["CyM9ot1Suz8GNMJO25"]} -{"Format": "IDEA0", "ID": "e05ceeb5-6551-4f5f-b27a-3d6f78d3585c", "DetectTime": "2023-10-30T13:58:47.145059+02:00", "EventTime": "2023-10-30T13:58:47.145070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["CvHhY52bxoL1MhnUyf"]} -{"Format": "IDEA0", "ID": "0c01ccfb-2fe4-43cd-a132-2a2c3b9fd285", "DetectTime": "2023-10-30T13:58:47.238014+02:00", "EventTime": "2023-10-30T13:58:47.238037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CSJozq25eokBEWgaU9"]} -{"Format": "IDEA0", "ID": "929c9a58-03f2-49aa-8e09-b43144f930f6", "DetectTime": "2023-10-30T13:58:47.268692+02:00", "EventTime": "2023-10-30T13:58:47.268716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CwHHls4zS1AlgkOe8b"]} -{"Format": "IDEA0", "ID": "2ca1e325-3fad-490d-9c91-8a16356a8954", "DetectTime": "2023-10-30T13:58:47.297858+02:00", "EventTime": "2023-10-30T13:58:47.297876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CyxVhx228jl7zIaK09"]} -{"Format": "IDEA0", "ID": "03e47c8e-d1be-4284-96b8-a7be5e77a5e5", "DetectTime": "2023-10-30T13:58:47.325697+02:00", "EventTime": "2023-10-30T13:58:47.325713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["ChwKAy2TuDNbNj8F33"]} -{"Format": "IDEA0", "ID": "586f43f6-4d7e-44c1-bc12-357f0e39d783", "DetectTime": "2023-10-30T13:58:47.357434+02:00", "EventTime": "2023-10-30T13:58:47.357454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.65.66 ", "ContentType": "text/plain"}], "uids": ["COpsqb2DuQLzUFFgh9"]} -{"Format": "IDEA0", "ID": "6cbdfdc2-7768-471a-b926-c4d5ae0e2747", "DetectTime": "2023-10-30T13:58:47.385572+02:00", "EventTime": "2023-10-30T13:58:47.385593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CVxpxU3FxzqE6GBWYc"]} -{"Format": "IDEA0", "ID": "5e851ca3-2be6-4645-9a41-a51182a4c962", "DetectTime": "2023-10-30T13:58:47.416567+02:00", "EventTime": "2023-10-30T13:58:47.416585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CAN3oEH3Xcj5SbXUj"]} -{"Format": "IDEA0", "ID": "77a0ace8-7c6b-4626-ab10-7698ae3430b2", "DetectTime": "2023-10-30T13:58:47.449147+02:00", "EventTime": "2023-10-30T13:58:47.449171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CA4LQc3EAezHs1yZBc"]} -{"Format": "IDEA0", "ID": "806e7c87-447c-4181-9868-ad97dda1f331", "DetectTime": "2023-10-30T13:58:47.477417+02:00", "EventTime": "2023-10-30T13:58:47.477433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CO91f73WsE6nqBXbr6"]} -{"Format": "IDEA0", "ID": "bc19df91-2e7f-4ef7-be1d-f57b6eecb178", "DetectTime": "2023-10-30T13:58:47.506300+02:00", "EventTime": "2023-10-30T13:58:47.506321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CHKKC81YskBzDUDe3e"]} -{"Format": "IDEA0", "ID": "2a9126eb-c9e4-4fdc-97b5-d3f82d7caeec", "DetectTime": "2023-10-30T13:58:47.535366+02:00", "EventTime": "2023-10-30T13:58:47.535383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C3Pes31vSDPOZuN43d"]} -{"Format": "IDEA0", "ID": "4874781c-beea-4bdc-9816-b89d0847e43d", "DetectTime": "2023-10-30T13:58:47.564018+02:00", "EventTime": "2023-10-30T13:58:47.564034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.65.66 ", "ContentType": "text/plain"}], "uids": ["CuYb2IakQ4bq3KIle"]} -{"Format": "IDEA0", "ID": "21eaeef4-cfc5-4a77-aee4-5444ecee8b79", "DetectTime": "2023-10-30T13:58:47.590331+02:00", "EventTime": "2023-10-30T13:58:47.590354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["C1xBRI3y8qGWNO1OFi"]} -{"Format": "IDEA0", "ID": "8183fbe7-2772-4cb5-8095-5dc4a36ab385", "DetectTime": "2023-10-30T13:58:47.621834+02:00", "EventTime": "2023-10-30T13:58:47.621851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CJTPDhAyBRIRREEqh"]} -{"Format": "IDEA0", "ID": "8bd6d0ff-ef7f-483c-b999-0613cfd6c1e8", "DetectTime": "2023-10-30T13:58:47.649368+02:00", "EventTime": "2023-10-30T13:58:47.649380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CkMQ3r2er5oYxevl89"]} -{"Format": "IDEA0", "ID": "75157786-a73e-4dc9-acc1-feae5a4d0189", "DetectTime": "2023-10-30T13:58:47.677905+02:00", "EventTime": "2023-10-30T13:58:47.677920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CYz1itGUvRQachx65"]} -{"Format": "IDEA0", "ID": "54bc9c2f-0366-40a2-b776-395a9a19855b", "DetectTime": "2023-10-30T13:58:47.706306+02:00", "EventTime": "2023-10-30T13:58:47.706324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C7ch19k8jCUERWLic"]} -{"Format": "IDEA0", "ID": "2b321187-325b-47a0-ae51-a845f943a75d", "DetectTime": "2023-10-30T13:58:47.736211+02:00", "EventTime": "2023-10-30T13:58:47.736232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CyY1sA1f7fOLxLnAVg"]} -{"Format": "IDEA0", "ID": "2f615f20-8e4b-46ff-96e7-b7897fcb8316", "DetectTime": "2023-10-30T13:58:47.764882+02:00", "EventTime": "2023-10-30T13:58:47.764893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["C8zdGh44YsEkyly2Pe"]} -{"Format": "IDEA0", "ID": "5e33ec46-86b8-4ec3-9fc6-e0b623373f18", "DetectTime": "2023-10-30T13:58:47.786803+02:00", "EventTime": "2023-10-30T13:58:47.786825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CXKnqT2iIDDNeXd3Il"]} -{"Format": "IDEA0", "ID": "7eb0f2e5-2235-4cfe-a8f1-7c5de8b18597", "DetectTime": "2023-10-30T13:58:47.817487+02:00", "EventTime": "2023-10-30T13:58:47.817505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CTQtWi20OrpOHRfr51"]} -{"Format": "IDEA0", "ID": "f776156e-d1a8-4a66-9fad-960bccf66830", "DetectTime": "2023-10-30T13:58:47.844923+02:00", "EventTime": "2023-10-30T13:58:47.844935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.235.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.235.230 ", "ContentType": "text/plain"}], "uids": ["CPZWG56ohvF6eqmH7"]} -{"Format": "IDEA0", "ID": "904fef94-bf65-426b-8fe6-37e2330e395f", "DetectTime": "2023-10-30T13:58:47.871788+02:00", "EventTime": "2023-10-30T13:58:47.871807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CMEKRH2dB7RdWwAiGj"]} -{"Format": "IDEA0", "ID": "a5f40d6e-70ff-4a8c-a571-b71161a1862d", "DetectTime": "2023-10-30T13:58:47.899843+02:00", "EventTime": "2023-10-30T13:58:47.899863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CAlHmreUi6qLmOnTd"]} -{"Format": "IDEA0", "ID": "d0e80b97-e91c-4090-a5ee-ebd0df380b2a", "DetectTime": "2023-10-30T13:58:47.928217+02:00", "EventTime": "2023-10-30T13:58:47.928237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CYp07v0MZTxVoiaPe"]} -{"Format": "IDEA0", "ID": "6a0e94fa-779d-4e8e-809b-b25b024e5bb6", "DetectTime": "2023-10-30T13:58:47.958110+02:00", "EventTime": "2023-10-30T13:58:47.958130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["CC5rfD27iMAkWXoMnd"]} -{"Format": "IDEA0", "ID": "c3311ffe-b36c-4387-8c0a-350b53f38027", "DetectTime": "2023-10-30T13:58:47.991457+02:00", "EventTime": "2023-10-30T13:58:47.991479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CGkeSo3GpintWJ7ste"]} -{"Format": "IDEA0", "ID": "d6e7f560-462b-4fd0-90f7-4ae787caa842", "DetectTime": "2023-10-30T13:58:48.021660+02:00", "EventTime": "2023-10-30T13:58:48.021678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["CdhTwB4eIPYcqKiDqe"]} -{"Format": "IDEA0", "ID": "ea7c2086-90f3-47a9-9d9d-b680b53663be", "DetectTime": "2023-10-30T13:58:48.050711+02:00", "EventTime": "2023-10-30T13:58:48.050728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CvV8RZ2sSQuG5PmvTg"]} -{"Format": "IDEA0", "ID": "d7a1db60-7c68-4382-b8d2-690fc4b455c7", "DetectTime": "2023-10-30T13:58:48.076912+02:00", "EventTime": "2023-10-30T13:58:48.076930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["Cfy1Vl2scDMClbv4k1"]} -{"Format": "IDEA0", "ID": "a616dac7-ec44-4cfc-bbeb-2aacf56d93ba", "DetectTime": "2023-10-30T13:58:48.102935+02:00", "EventTime": "2023-10-30T13:58:48.102952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CHnvVq4DsrTyE78v27"]} -{"Format": "IDEA0", "ID": "f922a90a-934f-4e17-aeb6-71e03bd3cfd1", "DetectTime": "2023-10-30T13:58:48.129714+02:00", "EventTime": "2023-10-30T13:58:48.129730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CPMCSk1TC1LS5l8p03"]} -{"Format": "IDEA0", "ID": "d40f7414-b7bb-4dbb-9424-6b61a350a5ab", "DetectTime": "2023-10-30T13:58:48.158247+02:00", "EventTime": "2023-10-30T13:58:48.158262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CmWEYZ2CElAq97Sa7i"]} -{"Format": "IDEA0", "ID": "bb17550c-ab15-4529-b057-0982542bfee0", "DetectTime": "2023-10-30T13:58:48.183964+02:00", "EventTime": "2023-10-30T13:58:48.183980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CkZ14p2PtJs8Jgrj29"]} -{"Format": "IDEA0", "ID": "93c5b743-7d62-425f-9765-0bf1599d8f3a", "DetectTime": "2023-10-30T13:58:48.211271+02:00", "EventTime": "2023-10-30T13:58:48.211282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CzHalN133edrTKaX89"]} -{"Format": "IDEA0", "ID": "8173e5d8-0ff7-47c5-839d-cfabf129690e", "DetectTime": "2023-10-30T13:58:48.236152+02:00", "EventTime": "2023-10-30T13:58:48.236168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["CJk9WL1dLCaMQ8IjVk"]} -{"Format": "IDEA0", "ID": "502a5bba-e1ed-4dd4-b0ef-509d805bef4d", "DetectTime": "2023-10-30T13:58:48.261824+02:00", "EventTime": "2023-10-30T13:58:48.261841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CuEWdR2egh4TAQDi4"]} -{"Format": "IDEA0", "ID": "3ee69b88-a084-4b99-b90c-095cee65d84e", "DetectTime": "2023-10-30T13:58:48.291809+02:00", "EventTime": "2023-10-30T13:58:48.291824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CFbDuj3jgInE8IQruf"]} -{"Format": "IDEA0", "ID": "1402c3cb-d50a-40c9-9c76-50ef2819aad3", "DetectTime": "2023-10-30T13:58:48.321764+02:00", "EventTime": "2023-10-30T13:58:48.321781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["CRJwG54rDpCflNcyy2"]} -{"Format": "IDEA0", "ID": "e29f763d-1e76-4a16-ba1e-cc006441c3dc", "DetectTime": "2023-10-30T13:58:48.353513+02:00", "EventTime": "2023-10-30T13:58:48.353530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["ChzyBuBlrKc5FEUM2"]} -{"Format": "IDEA0", "ID": "be0a14eb-1d31-4830-97ba-16d3294c3562", "DetectTime": "2023-10-30T13:58:48.389844+02:00", "EventTime": "2023-10-30T13:58:48.389864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["ChA9Ow4h5gfz5EQ2k6"]} -{"Format": "IDEA0", "ID": "a9d360a4-f4cb-4f7c-8194-fc9e4babd4c8", "DetectTime": "2023-10-30T13:58:48.419486+02:00", "EventTime": "2023-10-30T13:58:48.419507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CB87dV2PcwuK30OENj"]} -{"Format": "IDEA0", "ID": "90d9f9f7-9b85-4fd5-94ca-a20397a7d41f", "DetectTime": "2023-10-30T13:58:48.455836+02:00", "EventTime": "2023-10-30T13:58:48.455856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["COBWfY3nId0ffjTc1b"]} -{"Format": "IDEA0", "ID": "5507e3fb-89e0-43bf-bcea-dba18dc632f2", "DetectTime": "2023-10-30T13:58:48.484776+02:00", "EventTime": "2023-10-30T13:58:48.484804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["CPpWr93sGyuKUnFgK2"]} -{"Format": "IDEA0", "ID": "b3dd46e8-2c4c-43a1-b626-64a322a6baf8", "DetectTime": "2023-10-30T13:58:48.510752+02:00", "EventTime": "2023-10-30T13:58:48.510768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["Cfzso92ehwb7D9otCd"]} -{"Format": "IDEA0", "ID": "e3342fec-3e74-47fc-ae1e-137c80c6a435", "DetectTime": "2023-10-30T13:58:48.537562+02:00", "EventTime": "2023-10-30T13:58:48.537578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C29bKu3bK7zoaLyIv3"]} -{"Format": "IDEA0", "ID": "cfa540ad-705f-4b6d-b791-b5f1199300a8", "DetectTime": "2023-10-30T13:58:48.566132+02:00", "EventTime": "2023-10-30T13:58:48.566143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CD4EsH2eMLfbvtOOBd"]} -{"Format": "IDEA0", "ID": "f7920512-2b5f-4d8f-ae5b-f5be82fe7197", "DetectTime": "2023-10-30T13:58:48.587256+02:00", "EventTime": "2023-10-30T13:58:48.587268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["ClEu2P1iymTczZ5nPc"]} -{"Format": "IDEA0", "ID": "e76f172e-13b0-4fbd-b0b9-eb040c60d1db", "DetectTime": "2023-10-30T13:58:48.609233+02:00", "EventTime": "2023-10-30T13:58:48.609249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.92.101.126 ", "ContentType": "text/plain"}], "uids": ["CQdk9m4GGnnUBCBuQ3"]} -{"Format": "IDEA0", "ID": "f7bbb99b-2aad-424d-9592-4681a512a65d", "DetectTime": "2023-10-30T13:58:48.633312+02:00", "EventTime": "2023-10-30T13:58:48.633328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CUwIMw4kG97JwaEwSi"]} -{"Format": "IDEA0", "ID": "eadc946c-f49d-46f7-b812-b184c3dfb73c", "DetectTime": "2023-10-30T13:58:48.659959+02:00", "EventTime": "2023-10-30T13:58:48.659974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["CCf97U2uNPzft2Mau6"]} -{"Format": "IDEA0", "ID": "fb3fc1b3-2601-4b3d-9163-da02ee03c163", "DetectTime": "2023-10-30T13:58:48.684659+02:00", "EventTime": "2023-10-30T13:58:48.684676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["C7ccpJ37IDLU3SPC2"]} -{"Format": "IDEA0", "ID": "fe8f1a3c-31da-43c6-a298-b005ffb1a962", "DetectTime": "2023-10-30T13:58:48.712279+02:00", "EventTime": "2023-10-30T13:58:48.712295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CQdxRF4MUlwIsvyxxc"]} -{"Format": "IDEA0", "ID": "de9c55a5-111f-445b-aa72-d61ee38a820b", "DetectTime": "2023-10-30T13:58:48.749380+02:00", "EventTime": "2023-10-30T13:58:48.749392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CYVpY4icnLaEqkDkl"]} -{"Format": "IDEA0", "ID": "feb8b18a-e6e7-4450-b919-d081be3df593", "DetectTime": "2023-10-30T13:58:48.774202+02:00", "EventTime": "2023-10-30T13:58:48.774219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CW9W8w3ge76IwftvR8"]} -{"Format": "IDEA0", "ID": "ac4dc7dc-a768-476d-a286-73eb65f33995", "DetectTime": "2023-10-30T13:58:48.800045+02:00", "EventTime": "2023-10-30T13:58:48.800063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["C2t5yT1DdN6I6tOei5"]} -{"Format": "IDEA0", "ID": "4738cd7c-4cfc-47ec-8996-ac111099485f", "DetectTime": "2023-10-30T13:58:48.827099+02:00", "EventTime": "2023-10-30T13:58:48.827117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["CihnOz3rjIY04AtTZj"]} -{"Format": "IDEA0", "ID": "9bb999b5-1e7f-41ec-86de-f6096e5039af", "DetectTime": "2023-10-30T13:58:48.862141+02:00", "EventTime": "2023-10-30T13:58:48.862163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CT6f8i2QaGlCTqzv61"]} -{"Format": "IDEA0", "ID": "96728af4-0383-4060-bcc6-0fcd29bcff1c", "DetectTime": "2023-10-30T13:58:48.898394+02:00", "EventTime": "2023-10-30T13:58:48.898412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CDROtT7nSsXkmBPXl"]} -{"Format": "IDEA0", "ID": "80f66edb-fac5-453a-b504-74f331c7f551", "DetectTime": "2023-10-30T13:58:48.935270+02:00", "EventTime": "2023-10-30T13:58:48.935288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 ", "ContentType": "text/plain"}], "uids": ["CGHxug2LXuxLxZIJPi"]} -{"Format": "IDEA0", "ID": "60ab7862-2527-41ab-aec3-557984c71fcd", "DetectTime": "2023-10-30T13:58:48.963515+02:00", "EventTime": "2023-10-30T13:58:48.963531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CUxyIn3lgPdcBZtqq8"]} -{"Format": "IDEA0", "ID": "db54cf97-0072-4e07-9070-4e8c569b5303", "DetectTime": "2023-10-30T13:58:48.990213+02:00", "EventTime": "2023-10-30T13:58:48.990231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 ", "ContentType": "text/plain"}], "uids": ["CdKCm339QLd2agcN9c"]} -{"Format": "IDEA0", "ID": "1ebde374-a401-4ed5-b116-1239cc57b553", "DetectTime": "2023-10-30T13:58:49.019369+02:00", "EventTime": "2023-10-30T13:58:49.019388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["ClSY3p2Ngovu59Lxj5"]} -{"Format": "IDEA0", "ID": "b92e7568-b547-471d-b5a7-afc8e8bb37b6", "DetectTime": "2023-10-30T13:58:49.057742+02:00", "EventTime": "2023-10-30T13:58:49.057762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CaSi9a2QkVpOsP67Ca"]} -{"Format": "IDEA0", "ID": "50aa4cb6-4388-4872-af53-22d0a90a4957", "DetectTime": "2023-10-30T13:58:49.099586+02:00", "EventTime": "2023-10-30T13:58:49.099613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CuYC8d3mHDBALxMBZc"]} -{"Format": "IDEA0", "ID": "5c6e741d-9f1a-4053-a82e-b613c7e2a735", "DetectTime": "2023-10-30T13:58:49.137155+02:00", "EventTime": "2023-10-30T13:58:49.137174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["Cw7Nlp12LrCNqebfHg"]} -{"Format": "IDEA0", "ID": "1f7a0b0b-aa25-4d12-845c-bfebe11c7c64", "DetectTime": "2023-10-30T13:58:49.165888+02:00", "EventTime": "2023-10-30T13:58:49.165911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CCQEpalLuGcq6xUHh"]} -{"Format": "IDEA0", "ID": "fb485b19-4df5-4648-aab8-bad0fd57c313", "DetectTime": "2023-10-30T13:58:49.190314+02:00", "EventTime": "2023-10-30T13:58:49.190330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C7tIN43BKNfBtZEH06"]} -{"Format": "IDEA0", "ID": "f345de9f-8956-49f7-81b3-4849843aeaba", "DetectTime": "2023-10-30T13:58:49.215384+02:00", "EventTime": "2023-10-30T13:58:49.215394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CADSSn3FlIjdbVVaZb"]} -{"Format": "IDEA0", "ID": "e791ffc0-23d3-45d1-ac3b-61d4a6a88ba3", "DetectTime": "2023-10-30T13:58:49.241216+02:00", "EventTime": "2023-10-30T13:58:49.241228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["C0ZubxmmaqyMriNSc"]} -{"Format": "IDEA0", "ID": "6fb42a73-3381-405f-a8e8-9c7091d9c572", "DetectTime": "2023-10-30T13:58:49.264556+02:00", "EventTime": "2023-10-30T13:58:49.264571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CxliSeMOr6rvaoPa3"]} -{"Format": "IDEA0", "ID": "e74e511e-c0f6-4f6a-9b02-7d48fa323277", "DetectTime": "2023-10-30T13:58:49.288829+02:00", "EventTime": "2023-10-30T13:58:49.288851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["CgFfa64BNkoUbmKHbl"]} -{"Format": "IDEA0", "ID": "0034aa8c-13a2-46b6-b1cf-1e89fe9a374a", "DetectTime": "2023-10-30T13:58:49.315083+02:00", "EventTime": "2023-10-30T13:58:49.315099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C5f2MI3hSYlNmbxhnc"]} -{"Format": "IDEA0", "ID": "d69cb145-c104-4400-8a0f-c1fac0ef81fe", "DetectTime": "2023-10-30T13:58:49.339500+02:00", "EventTime": "2023-10-30T13:58:49.339515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["Cx5qVm4O480i6qKUN8"]} -{"Format": "IDEA0", "ID": "e6016ca3-292a-49b4-8ead-122c76c780fa", "DetectTime": "2023-10-30T13:58:49.363184+02:00", "EventTime": "2023-10-30T13:58:49.363202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.65.66 ", "ContentType": "text/plain"}], "uids": ["C7tUah4THpmwzdFlQk"]} -{"Format": "IDEA0", "ID": "bf7a1e26-057d-45dd-8702-c7f47852fcce", "DetectTime": "2023-10-30T13:58:49.384009+02:00", "EventTime": "2023-10-30T13:58:49.384022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDAlKi3T1vG4v84xHb"]} -{"Format": "IDEA0", "ID": "3a4bd568-1fae-4d06-98ed-c92d67f0ee21", "DetectTime": "2023-10-30T13:58:49.407267+02:00", "EventTime": "2023-10-30T13:58:49.407285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["CB66UbLWd8xHaAo83"]} -{"Format": "IDEA0", "ID": "64d5569e-541c-40b2-8433-65a3ab1f714b", "DetectTime": "2023-10-30T13:58:49.431503+02:00", "EventTime": "2023-10-30T13:58:49.431519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["CBWBQn20GKco6uPOT3"]} -{"Format": "IDEA0", "ID": "f5c09c4e-659e-41d1-955b-184693bce727", "DetectTime": "2023-10-30T13:58:49.452390+02:00", "EventTime": "2023-10-30T13:58:49.452405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CHt4dda3oZ6xTRB9k"]} -{"Format": "IDEA0", "ID": "b87530db-17a3-4ce7-803a-ce24e5876fcb", "DetectTime": "2023-10-30T13:58:49.476107+02:00", "EventTime": "2023-10-30T13:58:49.476123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CI6bDZ2AOHt9aTqUXj"]} -{"Format": "IDEA0", "ID": "8b9fb7f6-4122-47f3-bc1c-12f63869bc35", "DetectTime": "2023-10-30T13:58:49.500147+02:00", "EventTime": "2023-10-30T13:58:49.500162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["CdhFus1KGqh7tF3CFi"]} -{"Format": "IDEA0", "ID": "c3e06db3-c6f8-40e0-829a-73bab3b964c8", "DetectTime": "2023-10-30T13:58:49.526264+02:00", "EventTime": "2023-10-30T13:58:49.526280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CffnTm3B9BSvtSlB27"]} -{"Format": "IDEA0", "ID": "d07dca47-df31-4eb3-b64c-be99cff5175f", "DetectTime": "2023-10-30T13:58:49.549633+02:00", "EventTime": "2023-10-30T13:58:49.549655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CAByY44E8KtA4Dpfje"]} -{"Format": "IDEA0", "ID": "bbc7985f-c940-43b0-a646-d82e0adcf293", "DetectTime": "2023-10-30T13:58:49.575030+02:00", "EventTime": "2023-10-30T13:58:49.575042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.65.66 ", "ContentType": "text/plain"}], "uids": ["CrZyml0M9fkuFamNg"]} -{"Format": "IDEA0", "ID": "440159a0-2043-4387-b517-3b6ae61a72b7", "DetectTime": "2023-10-30T13:58:49.598099+02:00", "EventTime": "2023-10-30T13:58:49.598111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["C6I8NuvMTIJrnrGzj"]} -{"Format": "IDEA0", "ID": "2221ae55-3129-4ef8-81ec-eb4e50ce9916", "DetectTime": "2023-10-30T13:58:49.622953+02:00", "EventTime": "2023-10-30T13:58:49.622970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["Cy0GTn1geU8GrjB4Zd"]} -{"Format": "IDEA0", "ID": "b5e9378d-396d-4d67-9c9c-972d8563bf78", "DetectTime": "2023-10-30T13:58:49.649451+02:00", "EventTime": "2023-10-30T13:58:49.649468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["C9TNk61hGweXlE0CDf"]} -{"Format": "IDEA0", "ID": "c3bb9bfb-9051-4c4e-b243-618e8abd66f5", "DetectTime": "2023-10-30T13:58:49.677075+02:00", "EventTime": "2023-10-30T13:58:49.677095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["C5mxt03ocPFYuELkIc"]} -{"Format": "IDEA0", "ID": "a1f63fc5-cb17-4e59-84f2-ac9397deed2a", "DetectTime": "2023-10-30T13:58:49.702594+02:00", "EventTime": "2023-10-30T13:58:49.702610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CmEtHs2xsJhVqkVcFf"]} -{"Format": "IDEA0", "ID": "905c74d8-2c52-4f38-8ff7-1264a0bcf133", "DetectTime": "2023-10-30T13:58:49.734533+02:00", "EventTime": "2023-10-30T13:58:49.734554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CazXbj8xIQwSkUj78"]} -{"Format": "IDEA0", "ID": "999ff686-da84-47b7-a585-1c8441465188", "DetectTime": "2023-10-30T13:58:49.761189+02:00", "EventTime": "2023-10-30T13:58:49.761209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["CqOyO44JTGavD3VqSa"]} -{"Format": "IDEA0", "ID": "3bde78e5-e89b-4910-bdfc-6faed08d02a7", "DetectTime": "2023-10-30T13:58:49.788975+02:00", "EventTime": "2023-10-30T13:58:49.788988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CExroG279zK4LHhOZk"]} -{"Format": "IDEA0", "ID": "8f07339c-176a-4748-b3dc-007d47eca359", "DetectTime": "2023-10-30T13:58:49.814240+02:00", "EventTime": "2023-10-30T13:58:49.814262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.224.242.149 ", "ContentType": "text/plain"}], "uids": ["CeeOl2OsCJnZ80Ycg"]} -{"Format": "IDEA0", "ID": "e89132ed-4c30-4fff-893a-2a4235f2f440", "DetectTime": "2023-10-30T13:58:49.835003+02:00", "EventTime": "2023-10-30T13:58:49.835015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CEx6Vm4puTvxnI0P7j"]} -{"Format": "IDEA0", "ID": "540852d5-0734-46fa-a4d7-2e2b7934cfa9", "DetectTime": "2023-10-30T13:58:49.858179+02:00", "EventTime": "2023-10-30T13:58:49.858195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["Ckv7gO1CMMhR6ZedD4"]} -{"Format": "IDEA0", "ID": "62a84748-8d9b-401c-88d0-218ee995381a", "DetectTime": "2023-10-30T13:58:49.880070+02:00", "EventTime": "2023-10-30T13:58:49.880095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["CZWdqJci3O9UapdBi"]} -{"Format": "IDEA0", "ID": "4bef7a55-26b3-4dd4-9bdf-a29831fb1264", "DetectTime": "2023-10-30T13:58:49.904517+02:00", "EventTime": "2023-10-30T13:58:49.904535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["C2oBMkoo8Ii2EH111"]} -{"Format": "IDEA0", "ID": "da8562d7-8a11-4ae8-a771-d03f184a83f8", "DetectTime": "2023-10-30T13:58:49.928817+02:00", "EventTime": "2023-10-30T13:58:49.928834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["Cz96Ys2vJxGuz2s2n1"]} -{"Format": "IDEA0", "ID": "3504ff1b-7ed1-4bd0-a1b9-91c85dbea970", "DetectTime": "2023-10-30T13:58:49.955526+02:00", "EventTime": "2023-10-30T13:58:49.955539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CyT4iG4wVHWOQg2PC2"]} -{"Format": "IDEA0", "ID": "1d2fc84a-9420-47a9-8940-1458c64eb75e", "DetectTime": "2023-10-30T13:58:49.979140+02:00", "EventTime": "2023-10-30T13:58:49.979157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.92.101.126 ", "ContentType": "text/plain"}], "uids": ["CNpMFp4clMp6du2AJ9"]} -{"Format": "IDEA0", "ID": "87d21904-c264-4427-94dd-bcd304cf5d74", "DetectTime": "2023-10-30T13:58:50.002004+02:00", "EventTime": "2023-10-30T13:58:50.002023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CtwmE326bz7AjkOPJl"]} -{"Format": "IDEA0", "ID": "5107ce21-834f-4323-93bf-67a08c9ba7f7", "DetectTime": "2023-10-30T13:58:50.021461+02:00", "EventTime": "2023-10-30T13:58:50.021488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.21.76 ", "ContentType": "text/plain"}], "uids": ["Co1Ss22VXlbsuF5kdf"]} -{"Format": "IDEA0", "ID": "7bd78120-acc6-473a-ba2d-bb5df3214f9a", "DetectTime": "2023-10-30T13:58:50.046997+02:00", "EventTime": "2023-10-30T13:58:50.047013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CObz5t3lZEE2SFbXu9"]} -{"Format": "IDEA0", "ID": "ff5e9cbf-d61e-471e-a9d5-9b15bfdbb320", "DetectTime": "2023-10-30T13:58:50.065861+02:00", "EventTime": "2023-10-30T13:58:50.065877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CrNEae1Einid9ypUMa"]} -{"Format": "IDEA0", "ID": "76170b82-42b8-46ba-a1a4-ccad9d0fb7a4", "DetectTime": "2023-10-30T13:58:50.085449+02:00", "EventTime": "2023-10-30T13:58:50.085465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CISJEB4ISf0irkBa9c"]} -{"Format": "IDEA0", "ID": "72e3add6-6c28-475a-add4-77e2b9ad0568", "DetectTime": "2023-10-30T13:58:50.109664+02:00", "EventTime": "2023-10-30T13:58:50.109680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CqdoboeBKphRJ7iwj"]} -{"Format": "IDEA0", "ID": "4ee9a19a-d02f-47a1-b381-f5ffda938685", "DetectTime": "2023-10-30T13:58:50.139120+02:00", "EventTime": "2023-10-30T13:58:50.139143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CEa5A33Us4gTUdiwK2"]} -{"Format": "IDEA0", "ID": "30593276-6233-403a-97ff-d79048a33411", "DetectTime": "2023-10-30T13:58:50.162279+02:00", "EventTime": "2023-10-30T13:58:50.162299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CnImt1SW3lLklx4Oi"]} -{"Format": "IDEA0", "ID": "e29e6031-89e1-45f0-a12d-67de6e41f327", "DetectTime": "2023-10-30T13:58:50.190292+02:00", "EventTime": "2023-10-30T13:58:50.190310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CXVxSb2ptDZfL2YDA7"]} -{"Format": "IDEA0", "ID": "a3dd4534-98a3-40e1-8f73-87e03a783f95", "DetectTime": "2023-10-30T13:58:50.231956+02:00", "EventTime": "2023-10-30T13:58:50.231973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CW3cNh3CaLM6OmwHTk"]} -{"Format": "IDEA0", "ID": "e5f4c8ad-b2f0-4257-b54a-94fd4931bacd", "DetectTime": "2023-10-30T13:58:50.252925+02:00", "EventTime": "2023-10-30T13:58:50.252936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CSGfBS1CLpf3dmNyyh"]} -{"Format": "IDEA0", "ID": "caba23dd-fbea-46b7-ba48-c50523d53c43", "DetectTime": "2023-10-30T13:58:50.272110+02:00", "EventTime": "2023-10-30T13:58:50.272127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CQGQ9j3nxfSImYznU2"]} -{"Format": "IDEA0", "ID": "856d96c2-0d24-48fc-8a46-9f8c16f74b5f", "DetectTime": "2023-10-30T13:58:50.292758+02:00", "EventTime": "2023-10-30T13:58:50.292775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CFJowr26jv7qNu5Dyc"]} -{"Format": "IDEA0", "ID": "378cff3c-cd94-4e35-9abb-c04ae73e3fa2", "DetectTime": "2023-10-30T13:58:50.318766+02:00", "EventTime": "2023-10-30T13:58:50.318801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CL8VwO3xRpQqAc3IZ5"]} -{"Format": "IDEA0", "ID": "2113348b-7a67-4a3c-8a72-475433b6f3d9", "DetectTime": "2023-10-30T13:58:50.345740+02:00", "EventTime": "2023-10-30T13:58:50.345755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CkA8Kn1z3yQqp1wKw7"]} -{"Format": "IDEA0", "ID": "60048b06-9b0a-4fb0-a2b4-6141143a5c3b", "DetectTime": "2023-10-30T13:58:50.372524+02:00", "EventTime": "2023-10-30T13:58:50.372539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CI1Ngybvn8G54Memk"]} -{"Format": "IDEA0", "ID": "3c450059-7b02-416a-bef8-096c6baa950d", "DetectTime": "2023-10-30T13:58:50.396068+02:00", "EventTime": "2023-10-30T13:58:50.396084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CetyDB1Hxg9pVbiGi2"]} -{"Format": "IDEA0", "ID": "d5203b3d-57ef-4322-9902-7d4133e1f001", "DetectTime": "2023-10-30T13:58:50.435236+02:00", "EventTime": "2023-10-30T13:58:50.435258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["CHq2lD377PkN0dpMA4"]} -{"Format": "IDEA0", "ID": "d312e396-271e-437e-a409-6ed8ba78a679", "DetectTime": "2023-10-30T13:58:50.477370+02:00", "EventTime": "2023-10-30T13:58:50.477437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaWHa246YI85t96r4"]} -{"Format": "IDEA0", "ID": "d34c7be7-3a66-471a-beac-4d156f9cb111", "DetectTime": "2023-10-30T13:58:50.516305+02:00", "EventTime": "2023-10-30T13:58:50.516328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["ComWG339f6plRZHbvf"]} -{"Format": "IDEA0", "ID": "afdc0d45-501b-4d36-9252-43f0199497dd", "DetectTime": "2023-10-30T13:58:50.556798+02:00", "EventTime": "2023-10-30T13:58:50.556821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CI4Dah3Oz5AuCzazF8"]} -{"Format": "IDEA0", "ID": "bebfee3b-c18d-4e26-b52f-f8846b56caa3", "DetectTime": "2023-10-30T13:58:50.584694+02:00", "EventTime": "2023-10-30T13:58:50.584711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CNzXU13lFA4gZzlCRf"]} -{"Format": "IDEA0", "ID": "0857be2b-9b45-4530-b71a-d3bfe0ad1ebf", "DetectTime": "2023-10-30T13:58:50.612797+02:00", "EventTime": "2023-10-30T13:58:50.612816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpCUR63iOHUWNbiZal"]} -{"Format": "IDEA0", "ID": "e3906949-4575-4898-920f-dbd1bf6a99cb", "DetectTime": "2023-10-30T13:58:50.636194+02:00", "EventTime": "2023-10-30T13:58:50.636211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C5nZjS2PIGWxEb4nQ8"]} -{"Format": "IDEA0", "ID": "b968202d-18c8-4189-8f33-5f905e04b0bb", "DetectTime": "2023-10-30T13:58:50.657621+02:00", "EventTime": "2023-10-30T13:58:50.657639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["C4S3fa27YhmpuBj2ic"]} -{"Format": "IDEA0", "ID": "caa9c35f-a864-4ce0-9e79-e3bc36ce6fca", "DetectTime": "2023-10-30T13:58:50.679822+02:00", "EventTime": "2023-10-30T13:58:50.679836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMV3xm4M8pRKubzHk4"]} -{"Format": "IDEA0", "ID": "2d0666fa-f5b1-491a-a967-d1f1528bf0de", "DetectTime": "2023-10-30T13:58:50.705660+02:00", "EventTime": "2023-10-30T13:58:50.705676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["Ch8T3X3UUdru4kyZle"]} -{"Format": "IDEA0", "ID": "2cdcefc8-67d4-4e41-ae31-e246c0c738e0", "DetectTime": "2023-10-30T13:58:50.734079+02:00", "EventTime": "2023-10-30T13:58:50.734091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Ce6flm4uwn8z6zx6Nj"]} -{"Format": "IDEA0", "ID": "047c3f20-f653-43b8-b2c2-9395a9d5e9a0", "DetectTime": "2023-10-30T13:58:50.759459+02:00", "EventTime": "2023-10-30T13:58:50.759476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CSONBH1aqv5B9z1sNc"]} -{"Format": "IDEA0", "ID": "269d65ed-120b-4cab-a113-2185ce6c2c55", "DetectTime": "2023-10-30T13:58:50.784658+02:00", "EventTime": "2023-10-30T13:58:50.784673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CWwp8amVxnbEbvjpc"]} -{"Format": "IDEA0", "ID": "a5d5c2c1-2fb2-4ce1-a959-5b4bc7970575", "DetectTime": "2023-10-30T13:58:50.806037+02:00", "EventTime": "2023-10-30T13:58:50.806054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["CVwXuf46oojW1QlJLj"]} -{"Format": "IDEA0", "ID": "0c29b9cd-8549-422e-af3f-91830596ef9a", "DetectTime": "2023-10-30T13:58:50.827540+02:00", "EventTime": "2023-10-30T13:58:50.827552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CZRfrL17RGO3JJLGM"]} -{"Format": "IDEA0", "ID": "395542cb-b647-4653-a64b-72d0ba058e4d", "DetectTime": "2023-10-30T13:58:50.851610+02:00", "EventTime": "2023-10-30T13:58:50.851621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CE2sKW3NCxxsX9gG0g"]} -{"Format": "IDEA0", "ID": "572bbead-7696-4118-aba9-1a8ebef9cf70", "DetectTime": "2023-10-30T13:58:50.874456+02:00", "EventTime": "2023-10-30T13:58:50.874468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["Citboo2qZZlua9QNlj"]} -{"Format": "IDEA0", "ID": "ac889e9b-ae34-4c60-ad24-56a39cd46c66", "DetectTime": "2023-10-30T13:58:50.901371+02:00", "EventTime": "2023-10-30T13:58:50.901390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CBNkvv41yhcylMreLd"]} -{"Format": "IDEA0", "ID": "f9c0590f-b935-4f27-94da-3e686f34b0e2", "DetectTime": "2023-10-30T13:58:50.925765+02:00", "EventTime": "2023-10-30T13:58:50.925785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["C8LGrm4HAR358fyE95"]} -{"Format": "IDEA0", "ID": "0854e46c-61c5-40f7-beb7-67e2e6a04964", "DetectTime": "2023-10-30T13:58:50.951074+02:00", "EventTime": "2023-10-30T13:58:50.951092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CWZAQxNE7n5NCPW4k"]} -{"Format": "IDEA0", "ID": "252fdcfe-7970-4a78-8465-201cd0487bfb", "DetectTime": "2023-10-30T13:58:50.975704+02:00", "EventTime": "2023-10-30T13:58:50.975719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C46oAv4K1plN96cX4b"]} -{"Format": "IDEA0", "ID": "37e67e4d-206f-4b44-94cf-d57f61df496b", "DetectTime": "2023-10-30T13:58:51.001696+02:00", "EventTime": "2023-10-30T13:58:51.001708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CT3J2klmLlv5eebo6"]} -{"Format": "IDEA0", "ID": "875aa944-1071-47be-9616-a6062206f4ab", "DetectTime": "2023-10-30T13:58:51.025992+02:00", "EventTime": "2023-10-30T13:58:51.026002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.164.36.164 ", "ContentType": "text/plain"}], "uids": ["CjZ1VG2cdFA1I8rA1i"]} -{"Format": "IDEA0", "ID": "c19d5cb8-342d-4198-ad48-e7b9300384bd", "DetectTime": "2023-10-30T13:58:51.047408+02:00", "EventTime": "2023-10-30T13:58:51.047429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CRm4XR7dGn6pMMAp2"]} -{"Format": "IDEA0", "ID": "e74b976f-b769-49b3-8967-125455c58b6d", "DetectTime": "2023-10-30T13:58:51.075808+02:00", "EventTime": "2023-10-30T13:58:51.075825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["COhx9Y4DMsJbSoQj8"]} -{"Format": "IDEA0", "ID": "e823487e-56f7-41f2-8f6f-6a8ff7ab54fd", "DetectTime": "2023-10-30T13:58:51.106864+02:00", "EventTime": "2023-10-30T13:58:51.106880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CZ6gVh9OsnIBgF7Eb"]} -{"Format": "IDEA0", "ID": "21989e35-6c89-4c9a-a0a3-1e8db29901e1", "DetectTime": "2023-10-30T13:58:51.137651+02:00", "EventTime": "2023-10-30T13:58:51.137672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CWeeGZ1Ad7vbD1vtN2"]} -{"Format": "IDEA0", "ID": "4607dc58-dce8-48a1-bd50-22a19eebf3b5", "DetectTime": "2023-10-30T13:58:51.159168+02:00", "EventTime": "2023-10-30T13:58:51.159184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cgmerp4tf1NggAGjCk"]} -{"Format": "IDEA0", "ID": "cf0eca57-bba5-4be1-9e7c-700132c48579", "DetectTime": "2023-10-30T13:58:51.189615+02:00", "EventTime": "2023-10-30T13:58:51.189633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CWpCao42yI4tANCrcc"]} -{"Format": "IDEA0", "ID": "b35f3372-0a35-4f87-be5a-8ab4c6173e7a", "DetectTime": "2023-10-30T13:58:51.210812+02:00", "EventTime": "2023-10-30T13:58:51.210834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CQz5v9VSAmUh4HwNd"]} -{"Format": "IDEA0", "ID": "7a425ca9-9b0f-4021-a410-6e5ff77e230b", "DetectTime": "2023-10-30T13:58:51.235208+02:00", "EventTime": "2023-10-30T13:58:51.235228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvPzCw30KjdzFxjFPc"]} -{"Format": "IDEA0", "ID": "ab8ff306-0023-4bd4-b12b-e8707c11393b", "DetectTime": "2023-10-30T13:58:51.262767+02:00", "EventTime": "2023-10-30T13:58:51.262802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ca0Eys4SHhNYJZkH1k"]} -{"Format": "IDEA0", "ID": "7b2f842f-e4e2-47bd-969f-a336db58c650", "DetectTime": "2023-10-30T13:58:51.287629+02:00", "EventTime": "2023-10-30T13:58:51.287649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["Cr29oH3v3SndsJZYOc"]} -{"Format": "IDEA0", "ID": "8444d930-2a31-4067-85b2-43a24a194028", "DetectTime": "2023-10-30T13:58:51.311747+02:00", "EventTime": "2023-10-30T13:58:51.311765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CZgRbl111LmEVVCsP"]} -{"Format": "IDEA0", "ID": "529b409b-0265-4422-be9a-f5397a62a733", "DetectTime": "2023-10-30T13:58:51.335522+02:00", "EventTime": "2023-10-30T13:58:51.335544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CXWG65VXA2STATGx1"]} -{"Format": "IDEA0", "ID": "dd7af17c-dd72-4b9f-a5a8-7a9060fcc616", "DetectTime": "2023-10-30T13:58:51.359657+02:00", "EventTime": "2023-10-30T13:58:51.359669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CuQnNW2iCMpCOIeDG1"]} -{"Format": "IDEA0", "ID": "2d042870-9fc8-426f-88a6-f89710bcc8f6", "DetectTime": "2023-10-30T13:58:51.379174+02:00", "EventTime": "2023-10-30T13:58:51.379185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.92.101.126 ", "ContentType": "text/plain"}], "uids": ["Clsk8L105aIOox5he4"]} -{"Format": "IDEA0", "ID": "84c28aae-6550-4293-af3f-08058fc10678", "DetectTime": "2023-10-30T13:58:51.405384+02:00", "EventTime": "2023-10-30T13:58:51.405400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.237.84 ", "ContentType": "text/plain"}], "uids": ["C7YCPn2nwAMYWEf13c"]} -{"Format": "IDEA0", "ID": "441098a8-a44b-4fea-be41-318866369049", "DetectTime": "2023-10-30T13:58:51.427981+02:00", "EventTime": "2023-10-30T13:58:51.427997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C46bs01dFwULvbiB"]} -{"Format": "IDEA0", "ID": "bdcdd4e4-aebd-4336-98e9-bbeecf54f4c7", "DetectTime": "2023-10-30T13:58:51.452192+02:00", "EventTime": "2023-10-30T13:58:51.452209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C4AFWE369OoTTzAukh"]} -{"Format": "IDEA0", "ID": "39a6dad1-fe4b-4c16-b737-4a7f0e69c1c5", "DetectTime": "2023-10-30T13:58:51.545396+02:00", "EventTime": "2023-10-30T13:58:51.545432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CX97hC2SPMPdpCUhQf"]} -{"Format": "IDEA0", "ID": "97808000-39c0-4e4e-be07-c0dc8eb906f2", "DetectTime": "2023-10-30T13:58:51.581439+02:00", "EventTime": "2023-10-30T13:58:51.581456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["Cxx2ua3dSdrNC2lbef"]} -{"Format": "IDEA0", "ID": "db750d62-3382-4c2e-8ac7-d7fb4ba4f08c", "DetectTime": "2023-10-30T13:58:51.610245+02:00", "EventTime": "2023-10-30T13:58:51.610261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["Cr6Ius4R3Xqylxq544"]} -{"Format": "IDEA0", "ID": "d68f78d3-14ff-4a41-8a68-99244b933eea", "DetectTime": "2023-10-30T13:58:51.659252+02:00", "EventTime": "2023-10-30T13:58:51.659271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CYSQD82VK3aIXfNTDf"]} -{"Format": "IDEA0", "ID": "87b69a74-c7c0-440e-9000-9d159a8402a2", "DetectTime": "2023-10-30T13:58:51.709096+02:00", "EventTime": "2023-10-30T13:58:51.709113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CT6C7x4nxW70tRWsQ"]} -{"Format": "IDEA0", "ID": "730325cc-cb5b-491a-a9c0-ddc02d7de4a0", "DetectTime": "2023-10-30T13:58:51.757542+02:00", "EventTime": "2023-10-30T13:58:51.757553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CCTZnk3Z7GIbmRR8Wk"]} -{"Format": "IDEA0", "ID": "5042f4d7-0a94-40d6-9a3f-7bf07fb2a215", "DetectTime": "2023-10-30T13:58:51.806060+02:00", "EventTime": "2023-10-30T13:58:51.806076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["Cl8mcM1KcamZCtk65j"]} -{"Format": "IDEA0", "ID": "3202284e-f310-4f41-bcf3-f572ad89ca29", "DetectTime": "2023-10-30T13:58:51.854201+02:00", "EventTime": "2023-10-30T13:58:51.854221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cq5jq01SrN2dnSRhs5"]} -{"Format": "IDEA0", "ID": "19aa0011-95e4-4750-951d-51b29f672a19", "DetectTime": "2023-10-30T13:58:51.900295+02:00", "EventTime": "2023-10-30T13:58:51.900311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CS8a2s1C7VYqqmnei"]} -{"Format": "IDEA0", "ID": "b0342499-4682-40e7-ae8e-cd170d72e9ea", "DetectTime": "2023-10-30T13:58:51.949138+02:00", "EventTime": "2023-10-30T13:58:51.949155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CtYgOH3P05FfqUXRX1"]} -{"Format": "Json", "ID": "b0342499-4682-40e7-ae8e-cd170d72e9ea", "DetectTime": "2023-10-30T13:58:51.949138+02:00", "EventTime": "2023-10-30T13:58:51.949155+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:18:53.888352+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:52.032718)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "56e7d132-f532-449c-8ed6-fff170e3bf90", "DetectTime": "2023-10-30T13:58:52.038520+02:00", "EventTime": "2023-10-30T13:58:52.038537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CUVUVF3EqgW8ysOMji"]} -{"Format": "IDEA0", "ID": "5d688b7d-4178-4b0f-9114-2916f864aa11", "DetectTime": "2023-10-30T13:58:52.084408+02:00", "EventTime": "2023-10-30T13:58:52.084421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["C2nOFH8FW3nuEl4Xi"]} -{"Format": "IDEA0", "ID": "676f4b71-0275-4a2d-9745-8dff85c2119f", "DetectTime": "2023-10-30T13:58:52.129009+02:00", "EventTime": "2023-10-30T13:58:52.129027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CtpwFM24CvtwomdPS8"]} -{"Format": "IDEA0", "ID": "1fbac25d-63ac-485a-8749-c7bdaef5cf57", "DetectTime": "2023-10-30T13:58:52.173077+02:00", "EventTime": "2023-10-30T13:58:52.173091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CvJLAt44VMKKFSysKh"]} -{"Format": "IDEA0", "ID": "962ea526-290b-47db-b5a4-eb07bdff77c1", "DetectTime": "2023-10-30T13:58:52.220262+02:00", "EventTime": "2023-10-30T13:58:52.220278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CXkOEISx7CbDcoild"]} -{"Format": "IDEA0", "ID": "bf249351-af37-492a-ab3d-5d375ca3e703", "DetectTime": "2023-10-30T13:58:52.266594+02:00", "EventTime": "2023-10-30T13:58:52.266620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CHtX7747fDV3pyIL42"]} -{"Format": "IDEA0", "ID": "e1bffbec-e960-4276-ac12-5c7e873a01f6", "DetectTime": "2023-10-30T13:58:52.315824+02:00", "EventTime": "2023-10-30T13:58:52.315842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["CXmFep3UWUWhAIGdvh"]} -{"Format": "IDEA0", "ID": "f976c7bc-08fa-4dbd-bfc8-19898c0f4497", "DetectTime": "2023-10-30T13:58:52.372970+02:00", "EventTime": "2023-10-30T13:58:52.372990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CHOSZ33Cr3IzeiowFg"]} -{"Format": "Json", "ID": "f976c7bc-08fa-4dbd-bfc8-19898c0f4497", "DetectTime": "2023-10-30T13:58:52.372970+02:00", "EventTime": "2023-10-30T13:58:52.372990+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:18:55.291982+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:52.467580)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ca4d3083-1303-483a-a7d8-30b4b38f73e5", "DetectTime": "2023-10-30T13:58:52.472845+02:00", "EventTime": "2023-10-30T13:58:52.472858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CU2ite3qx0klhhmVE4"]} -{"Format": "IDEA0", "ID": "282636ea-a733-447b-b48c-567d4fccbef5", "DetectTime": "2023-10-30T13:58:52.517635+02:00", "EventTime": "2023-10-30T13:58:52.517655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C41K7e3D9hqnEzhaSa"]} -{"Format": "IDEA0", "ID": "22d03e6b-a9b7-4fae-8dd8-5069ea459f27", "DetectTime": "2023-10-30T13:58:52.557051+02:00", "EventTime": "2023-10-30T13:58:52.557068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CMMyoQ1TLoB8Gu6Hsl"]} -{"Format": "IDEA0", "ID": "3381c3da-ca89-45ed-b29d-6254076bf34c", "DetectTime": "2023-10-30T13:58:52.600194+02:00", "EventTime": "2023-10-30T13:58:52.600212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CdYOod4bjmLiLsXte"]} -{"Format": "IDEA0", "ID": "1d3d9f9e-4636-4440-813c-1e34b31cc611", "DetectTime": "2023-10-30T13:58:52.642195+02:00", "EventTime": "2023-10-30T13:58:52.642216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CbzsNT1Tlsv4SzawEb"]} -{"Format": "IDEA0", "ID": "7da59c26-b71c-41c0-a6cf-2a975dd6a45e", "DetectTime": "2023-10-30T13:58:52.682518+02:00", "EventTime": "2023-10-30T13:58:52.682537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["ClZut31aq8pduj1jle"]} -{"Format": "IDEA0", "ID": "ca4b5dd6-4b59-421d-9ff1-d7bc21cd0274", "DetectTime": "2023-10-30T13:58:52.713456+02:00", "EventTime": "2023-10-30T13:58:52.713472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CR7SnN211ypxz1mzsc"]} -{"Format": "IDEA0", "ID": "48600f15-f7b6-4792-82bb-052d25654c24", "DetectTime": "2023-10-30T13:58:52.755123+02:00", "EventTime": "2023-10-30T13:58:52.755139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CGzwFhGCNWR1hVCA5"]} -{"Format": "Json", "ID": "48600f15-f7b6-4792-82bb-052d25654c24", "DetectTime": "2023-10-30T13:58:52.755123+02:00", "EventTime": "2023-10-30T13:58:52.755139+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:18:56.858437+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:52.821154)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "80c7b5a3-b4e6-428f-9467-c274133d0b19", "DetectTime": "2023-10-30T13:58:52.827121+02:00", "EventTime": "2023-10-30T13:58:52.827142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["CUaKvr326VFh6xaz21"]} -{"Format": "IDEA0", "ID": "49534e22-042e-4066-9b69-77857d69043d", "DetectTime": "2023-10-30T13:58:52.871136+02:00", "EventTime": "2023-10-30T13:58:52.871156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CrXMmm4vhNV1WGrZwb"]} -{"Format": "IDEA0", "ID": "91a4e325-6ead-40b0-b091-a96e8e1808d8", "DetectTime": "2023-10-30T13:58:52.915130+02:00", "EventTime": "2023-10-30T13:58:52.915388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFoM492dI7usrCrYN9"]} -{"Format": "IDEA0", "ID": "cf314d4f-2b2b-4925-95ba-9494c2e638dc", "DetectTime": "2023-10-30T13:58:52.952406+02:00", "EventTime": "2023-10-30T13:58:52.952430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2081], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQI4apMwpWB2oxhEf"]} -{"Format": "IDEA0", "ID": "3de1be16-33eb-450c-9705-322c3226ee15", "DetectTime": "2023-10-30T13:58:52.991628+02:00", "EventTime": "2023-10-30T13:58:52.991649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C9VIZHufMN9WRXGha"]} -{"Format": "IDEA0", "ID": "47fa6b4a-b38f-4e52-a7e9-0a4313ed5eaa", "DetectTime": "2023-10-30T13:58:53.031072+02:00", "EventTime": "2023-10-30T13:58:53.031090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CthGzo3nrUEEyON8G3"]} -{"Format": "IDEA0", "ID": "773be9ba-19ba-4b34-a38b-148ca917d755", "DetectTime": "2023-10-30T13:58:53.071782+02:00", "EventTime": "2023-10-30T13:58:53.071802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CXI10V2yJpkfNHEilj"]} -{"Format": "IDEA0", "ID": "fbbac900-57be-498d-9534-10c53bb7a886", "DetectTime": "2023-10-30T13:58:53.128410+02:00", "EventTime": "2023-10-30T13:58:53.128432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CLgvgt3aMiJcTUN6B4"]} -{"Format": "Json", "ID": "fbbac900-57be-498d-9534-10c53bb7a886", "DetectTime": "2023-10-30T13:58:53.128410+02:00", "EventTime": "2023-10-30T13:58:53.128432+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:50:20.634848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:53.206952)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93ca8bc9-5c8a-4d7a-97f5-206f9602a0e5", "DetectTime": "2023-10-30T13:58:53.211634+02:00", "EventTime": "2023-10-30T13:58:53.211645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CFCHza4LXA13DDykl9"]} -{"Format": "IDEA0", "ID": "d36b8a60-d012-4e09-8514-1dc9a9430c41", "DetectTime": "2023-10-30T13:58:53.259504+02:00", "EventTime": "2023-10-30T13:58:53.259522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CidlnY1rGegTI8DGqa"]} -{"Format": "IDEA0", "ID": "522ca784-d3e5-4a84-968f-d79c79d9d18a", "DetectTime": "2023-10-30T13:58:53.289650+02:00", "EventTime": "2023-10-30T13:58:53.289668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CivmaC2LxA0lgZ8GB8"]} -{"Format": "IDEA0", "ID": "1bbc22c9-e79d-4632-a98d-f59767e74c6f", "DetectTime": "2023-10-30T13:58:53.319776+02:00", "EventTime": "2023-10-30T13:58:53.319787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CVWPom14SeBCpdHFca"]} -{"Format": "IDEA0", "ID": "ba5e26e8-3885-460d-9a27-6dee6ceb72de", "DetectTime": "2023-10-30T13:58:53.353476+02:00", "EventTime": "2023-10-30T13:58:53.353493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["CnPgYrL5aHZYwZw49"]} -{"Format": "IDEA0", "ID": "323447db-0941-4f89-a6ed-a6929ff0636a", "DetectTime": "2023-10-30T13:58:53.381517+02:00", "EventTime": "2023-10-30T13:58:53.381539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["C8e55b46BCiSv7Hr02"]} -{"Format": "IDEA0", "ID": "3c73b21f-31f2-4518-8128-4260217ab765", "DetectTime": "2023-10-30T13:58:53.409036+02:00", "EventTime": "2023-10-30T13:58:53.409047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CUopBy1iK7uYSceQTf"]} -{"Format": "IDEA0", "ID": "6ec5e93f-2351-461f-bbb9-517f60337c3c", "DetectTime": "2023-10-30T13:58:53.442359+02:00", "EventTime": "2023-10-30T13:58:53.442374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CO5JyhoSgTAqGQINb", "Ckhcth1B154IeuKm7j", "CSgeBJ2RDumFxK3Bs3", "CgD19X1y7do0eZ5h31"]} -{"Format": "IDEA0", "ID": "3781d7b2-efb2-4636-8c78-03157ed44787", "DetectTime": "2023-10-30T13:58:53.452529+02:00", "EventTime": "2023-10-30T13:58:53.452545+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CO5JyhoSgTAqGQINb"]} -{"Format": "IDEA0", "ID": "164d9d25-191a-44a7-b753-ad8a8dc1e310", "DetectTime": "2023-10-30T13:58:53.462248+02:00", "EventTime": "2023-10-30T13:58:53.462259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CLsh7w274UJiEBAWH5"]} -{"Format": "Json", "ID": "164d9d25-191a-44a7-b753-ad8a8dc1e310", "DetectTime": "2023-10-30T13:58:53.462248+02:00", "EventTime": "2023-10-30T13:58:53.462259+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:50:22.390902+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:53.519919)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e90a8c78-0391-49d2-b9f7-f4e39d06f5a4", "DetectTime": "2023-10-30T13:58:53.523760+02:00", "EventTime": "2023-10-30T13:58:53.523770+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6ruEP34TDzJHWeGra"]} -{"Format": "IDEA0", "ID": "d14e11ad-ff32-4353-8984-6a7dc83b5b16", "DetectTime": "2023-10-30T13:58:53.534190+02:00", "EventTime": "2023-10-30T13:58:53.534214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CydGoMbKIBr0j4Ifj"]} -{"Format": "IDEA0", "ID": "7161aa83-78a3-4d30-8f3c-6db45f4b2fde", "DetectTime": "2023-10-30T13:58:53.562757+02:00", "EventTime": "2023-10-30T13:58:53.562772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CU75SC2mpCx51CFDB8"]} -{"Format": "IDEA0", "ID": "54684c8d-85dc-4baf-80bc-0aff893514e4", "DetectTime": "2023-10-30T13:58:53.592337+02:00", "EventTime": "2023-10-30T13:58:53.592353+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CR0yIY3zqXPvcescLf"]} -{"Format": "IDEA0", "ID": "71827712-6102-4c63-a21e-90c9df60be77", "DetectTime": "2023-10-30T13:58:53.602092+02:00", "EventTime": "2023-10-30T13:58:53.602104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CKjqqW2C11CaRhHxF2"]} -{"Format": "IDEA0", "ID": "9f43e005-755d-4833-aaad-21a0cc0528dc", "DetectTime": "2023-10-30T13:58:53.626347+02:00", "EventTime": "2023-10-30T13:58:53.626363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. ", "ContentType": "text/plain"}], "uids": ["C7uEN54rlGfzNeGlq3"]} -{"Format": "IDEA0", "ID": "fee821e4-25e4-48e2-982a-5d0541e127be", "DetectTime": "2023-10-30T13:58:53.654288+02:00", "EventTime": "2023-10-30T13:58:53.654307+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COEQKd4KFJtP9j2dvd"]} -{"Format": "IDEA0", "ID": "7b14c843-4eb6-456a-a1ed-1b438dfb781b", "DetectTime": "2023-10-30T13:58:53.664401+02:00", "EventTime": "2023-10-30T13:58:53.664416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CCLuuP3I2lHle85WS4"]} -{"Format": "IDEA0", "ID": "8e34931f-8ccb-4e26-8253-f30ea86ca1f8", "DetectTime": "2023-10-30T13:58:53.691209+02:00", "EventTime": "2023-10-30T13:58:53.691225+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4jRWn4XNyzF47I4m1"]} -{"Format": "IDEA0", "ID": "4acd5546-e792-4d13-9969-b7798ab1e1e7", "DetectTime": "2023-10-30T13:58:53.700619+02:00", "EventTime": "2023-10-30T13:58:53.700629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["COvQIj222ASxQtorb1"]} -{"Format": "IDEA0", "ID": "b9ee8801-1e08-4b78-a318-05683dcbe424", "DetectTime": "2023-10-30T13:58:53.731594+02:00", "EventTime": "2023-10-30T13:58:53.731614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["Cyx3darfP6UjknBc9"]} -{"Format": "IDEA0", "ID": "a930ef3d-138d-4e5a-8c8a-5bcda7b34915", "DetectTime": "2023-10-30T13:58:53.762067+02:00", "EventTime": "2023-10-30T13:58:53.762078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CzWQUw7OutF0rdBve"]} -{"Format": "Json", "ID": "a930ef3d-138d-4e5a-8c8a-5bcda7b34915", "DetectTime": "2023-10-30T13:58:53.762067+02:00", "EventTime": "2023-10-30T13:58:53.762078+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:50:40.716322+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:53.823751)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1c5fc3a1-4009-4b71-b5e9-566b00d73367", "DetectTime": "2023-10-30T13:58:53.828489+02:00", "EventTime": "2023-10-30T13:58:53.828503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["Ch7WZV14LNtbRVPpvc"]} -{"Format": "IDEA0", "ID": "3869c3e0-585e-4338-a075-74dedacc011d", "DetectTime": "2023-10-30T13:58:53.856861+02:00", "EventTime": "2023-10-30T13:58:53.856878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CMYZ5w1XXacr0lg9d8"]} -{"Format": "IDEA0", "ID": "c22ced27-b67c-4695-9e16-4f80452a1a8e", "DetectTime": "2023-10-30T13:58:53.886271+02:00", "EventTime": "2023-10-30T13:58:53.886292+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3OxSR3jr6aDjns3Vg"]} -{"Format": "IDEA0", "ID": "86b54223-02d8-442c-9121-8abd057bd44a", "DetectTime": "2023-10-30T13:58:53.896664+02:00", "EventTime": "2023-10-30T13:58:53.896684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["Cr69xQ9RApxzcyjsl"]} -{"Format": "IDEA0", "ID": "8c4614c0-519e-4ad6-9f72-7a879a254180", "DetectTime": "2023-10-30T13:58:53.923377+02:00", "EventTime": "2023-10-30T13:58:53.923387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C7cnqM74yNaRLByM9"]} -{"Format": "IDEA0", "ID": "f44ba718-9ee3-4b34-8675-ad006fc80c59", "DetectTime": "2023-10-30T13:58:53.952313+02:00", "EventTime": "2023-10-30T13:58:53.952332+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBxmRRtTfRDwnE9kh"]} -{"Format": "IDEA0", "ID": "14f87aa7-1143-4d05-9dfe-5110bc961a66", "DetectTime": "2023-10-30T13:58:53.961936+02:00", "EventTime": "2023-10-30T13:58:53.961949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CGyWysHvPphu4Sx9"]} -{"Format": "IDEA0", "ID": "c97b1c62-1642-49af-ad2d-1f7f3b2bda11", "DetectTime": "2023-10-30T13:58:53.988031+02:00", "EventTime": "2023-10-30T13:58:53.988043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CtjGXFAIdWXPtrm8e"]} -{"Format": "IDEA0", "ID": "4838cca6-ebe0-4915-8ae0-f9752bab0b26", "DetectTime": "2023-10-30T13:58:54.014262+02:00", "EventTime": "2023-10-30T13:58:54.014285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. ", "ContentType": "text/plain"}], "uids": ["CUWpwy1ZAarkF3PhCf"]} -{"Format": "IDEA0", "ID": "ca9f7520-373d-4366-bcbc-bafd44b16b22", "DetectTime": "2023-10-30T13:58:54.042772+02:00", "EventTime": "2023-10-30T13:58:54.042808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CJBc5p2hORushnIchg"]} -{"Format": "Json", "ID": "ca9f7520-373d-4366-bcbc-bafd44b16b22", "DetectTime": "2023-10-30T13:58:54.042772+02:00", "EventTime": "2023-10-30T13:58:54.042808+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T17:50:42.373778+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2023/10/30 13:58:54.092511)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ca1b8553-9339-4724-800e-2283e915283a", "DetectTime": "2023-10-30T13:58:54.097905+02:00", "EventTime": "2023-10-30T13:58:54.097930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4627], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. ", "ContentType": "text/plain"}], "uids": ["CreVDC1dEPB3lZ65pf"]} -{"Format": "IDEA0", "ID": "3cdf44e5-cb0a-4baa-8bc4-4c6d786e1baa", "DetectTime": "2023-10-30T13:58:54.128879+02:00", "EventTime": "2023-10-30T13:58:54.128899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CIn5lR3jjzKwrdnAzb"]} -{"Format": "IDEA0", "ID": "3f4285ed-0bd5-4bba-a00e-f3174feed206", "DetectTime": "2023-10-30T13:58:54.153037+02:00", "EventTime": "2023-10-30T13:58:54.153054+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEoGm62vkhEl0R6Ot9"]} -{"Format": "IDEA0", "ID": "c20605d5-9c24-4fce-9b52-e09134ce0b2d", "DetectTime": "2023-10-30T13:58:54.163812+02:00", "EventTime": "2023-10-30T13:58:54.163829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CCInNCN1ZwEkkIRs"]} -{"Format": "IDEA0", "ID": "9c51ca9a-693c-4999-8676-4d7ced95a65c", "DetectTime": "2023-10-30T13:58:54.252860+02:00", "EventTime": "2023-10-30T13:58:54.252879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CR0yIY3zqXPvcescLf", "C4jRWn4XNyzF47I4m1", "Cj3ay91js5V6UK1xx3", "CBxmRRtTfRDwnE9kh"]} -{"Format": "IDEA0", "ID": "59a28655-6cf9-464f-a4dd-6c685ea59148", "DetectTime": "2023-10-30T13:58:54.264608+02:00", "EventTime": "2023-10-30T13:58:54.264632+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cj3ay91js5V6UK1xx3"]} -{"Format": "IDEA0", "ID": "f9791b0c-e591-489d-82e2-0b69a53fc0c2", "DetectTime": "2023-10-30T13:58:54.276013+02:00", "EventTime": "2023-10-30T13:58:54.276030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CzmTiK1tHSHQzZP1jk"]} -{"Format": "IDEA0", "ID": "3e0c557a-acda-4cda-86b3-8eafcd638cb1", "DetectTime": "2023-10-30T13:58:54.310213+02:00", "EventTime": "2023-10-30T13:58:54.310235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKs0sJ2ARXweyN1DC9"]} -{"Format": "IDEA0", "ID": "24f21617-619a-467b-82b9-db88904a97a6", "DetectTime": "2023-10-30T13:58:54.364386+02:00", "EventTime": "2023-10-30T13:58:54.364410+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxayK13KItOQ1JzYOd"]} -{"Format": "IDEA0", "ID": "d25ad094-e910-4110-908e-c36853845aea", "DetectTime": "2023-10-30T13:58:54.375894+02:00", "EventTime": "2023-10-30T13:58:54.375913+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYmi9VofWRpP5BJj1"]} -{"Format": "IDEA0", "ID": "e0880380-77ee-4b1b-b272-44ded8880ce5", "DetectTime": "2023-10-30T13:58:54.387660+02:00", "EventTime": "2023-10-30T13:58:54.387679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CGTJFl1NtQxAI5C3u4"]} -{"Format": "IDEA0", "ID": "12095ee9-5887-4a4d-9adb-9c65a4c26fa0", "DetectTime": "2023-10-30T13:58:54.435272+02:00", "EventTime": "2023-10-30T13:58:54.435284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C3sviH1Qk95dMp22j9"]} -{"Format": "IDEA0", "ID": "860e4da1-fb9e-40a0-acc1-b7ff55e73247", "DetectTime": "2023-10-30T13:58:54.484642+02:00", "EventTime": "2023-10-30T13:58:54.484656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CcPfyE1XAkJL8T9GEh"]} -{"Format": "IDEA0", "ID": "2c3b525d-15f8-428e-b484-6ccc0a193907", "DetectTime": "2023-10-30T13:58:54.530749+02:00", "EventTime": "2023-10-30T13:58:54.530766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["C6Fi9e1NfQZVdqzisi"]} -{"Format": "IDEA0", "ID": "95726ff4-abe8-4667-8435-0cf65c4346fe", "DetectTime": "2023-10-30T13:58:54.577265+02:00", "EventTime": "2023-10-30T13:58:54.577281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CAG8qk1wGDz5V3IAV"]} -{"Format": "Json", "ID": "95726ff4-abe8-4667-8435-0cf65c4346fe", "DetectTime": "2023-10-30T13:58:54.577265+02:00", "EventTime": "2023-10-30T13:58:54.577281+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:21:11.639630+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:54.690286)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2a6aa3ea-159c-43e2-a0ba-ce174f91a635", "DetectTime": "2023-10-30T13:58:54.695261+02:00", "EventTime": "2023-10-30T13:58:54.695277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CRltHY9om0HdhA2O2"]} -{"Format": "IDEA0", "ID": "e23ddfca-047a-429a-a7cb-69a09a032f7d", "DetectTime": "2023-10-30T13:58:54.740992+02:00", "EventTime": "2023-10-30T13:58:54.741015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C6Eixg1aZOxiq5M9k3"]} -{"Format": "IDEA0", "ID": "519b347d-e60e-4e11-9870-2ff2cd291ca1", "DetectTime": "2023-10-30T13:58:54.785601+02:00", "EventTime": "2023-10-30T13:58:54.785618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["Cqr0f82hfp3QvcLnZc"]} -{"Format": "IDEA0", "ID": "152a9d64-b9b6-45ec-9c33-7516d55159ab", "DetectTime": "2023-10-30T13:58:54.832348+02:00", "EventTime": "2023-10-30T13:58:54.832366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5689], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. ", "ContentType": "text/plain"}], "uids": ["CAEejS1VGvzEo2Jin1"]} -{"Format": "IDEA0", "ID": "83183949-325d-423e-928d-35400c24431b", "DetectTime": "2023-10-30T13:58:54.876946+02:00", "EventTime": "2023-10-30T13:58:54.876962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CvwS3G3dTjlRYC0H59"]} -{"Format": "IDEA0", "ID": "3f06bff1-2ddb-48d7-b7d4-bc3c77428952", "DetectTime": "2023-10-30T13:58:54.921890+02:00", "EventTime": "2023-10-30T13:58:54.921906+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cup9Wh35XghGEaqMT2"]} -{"Format": "IDEA0", "ID": "0eb603d3-cfb9-4307-9942-8e1be947eb26", "DetectTime": "2023-10-30T13:58:54.932560+02:00", "EventTime": "2023-10-30T13:58:54.932583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CvMt9g4v47FxTBjFBj"]} -{"Format": "IDEA0", "ID": "ac283884-4b7b-4aea-a968-fbcb1c3a370f", "DetectTime": "2023-10-30T13:58:54.978707+02:00", "EventTime": "2023-10-30T13:58:54.978726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C0c4A71QSkvaI6Cp77"]} -{"Format": "IDEA0", "ID": "09a17a6f-65e6-4151-9484-baabc6f80736", "DetectTime": "2023-10-30T13:58:55.021607+02:00", "EventTime": "2023-10-30T13:58:55.021620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["CMy1JY2wrLsE2Pv94i"]} -{"Format": "Json", "ID": "09a17a6f-65e6-4151-9484-baabc6f80736", "DetectTime": "2023-10-30T13:58:55.021607+02:00", "EventTime": "2023-10-30T13:58:55.021620+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:21:13.347956+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:55.103584)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bf8bb4ec-48ab-4b6b-8006-8e208c998a91", "DetectTime": "2023-10-30T13:58:55.109139+02:00", "EventTime": "2023-10-30T13:58:55.109155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["C3HWXS2gV9NVmUY8e9"]} -{"Format": "IDEA0", "ID": "d62f46ca-4339-4e2e-96b4-7299aa5166e6", "DetectTime": "2023-10-30T13:58:55.169913+02:00", "EventTime": "2023-10-30T13:58:55.169930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CiESw4eEOhMC67xXd"]} -{"Format": "IDEA0", "ID": "0648763a-ae2f-4cb7-9128-0865da9c6f1c", "DetectTime": "2023-10-30T13:58:55.212308+02:00", "EventTime": "2023-10-30T13:58:55.212330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CkQFn632MRJ9YhGyd9"]} -{"Format": "IDEA0", "ID": "2009ea9d-cf0c-445d-97a7-0a8280813ed2", "DetectTime": "2023-10-30T13:58:55.249796+02:00", "EventTime": "2023-10-30T13:58:55.249815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["Cy4hrP2otyuOqeACNl"]} -{"Format": "IDEA0", "ID": "25eb427f-b74b-4ad7-8c0b-4e093cd7e694", "DetectTime": "2023-10-30T13:58:55.292822+02:00", "EventTime": "2023-10-30T13:58:55.292841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CHtNC24WjD1DDXn8Yg"]} -{"Format": "IDEA0", "ID": "d06e8635-6a9d-41c9-811d-a61c08304e3f", "DetectTime": "2023-10-30T13:58:55.331076+02:00", "EventTime": "2023-10-30T13:58:55.331090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CAkN3Hg899i7vxGZe"]} -{"Format": "IDEA0", "ID": "87abdb99-c90e-4c2a-b73c-3a966d056b91", "DetectTime": "2023-10-30T13:58:55.369274+02:00", "EventTime": "2023-10-30T13:58:55.369290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8864], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. ", "ContentType": "text/plain"}], "uids": ["Cn315m2foman2jLRmg"]} -{"Format": "IDEA0", "ID": "632238da-7057-4994-b2ae-d79e40bcb1d7", "DetectTime": "2023-10-30T13:58:55.407615+02:00", "EventTime": "2023-10-30T13:58:55.407628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. ", "ContentType": "text/plain"}], "uids": ["CCEghWyd0aLVmpdG8"]} -{"Format": "Json", "ID": "632238da-7057-4994-b2ae-d79e40bcb1d7", "DetectTime": "2023-10-30T13:58:55.407615+02:00", "EventTime": "2023-10-30T13:58:55.407628+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9292], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:21:31.723058+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:55.469337)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "115484e4-3393-444f-8fd1-a4fab4e42804", "DetectTime": "2023-10-30T13:58:55.474569+02:00", "EventTime": "2023-10-30T13:58:55.474586+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C68aPs2m4vEmLM4DXc"]} -{"Format": "IDEA0", "ID": "f07c7231-400a-4e86-9aab-94b882df636e", "DetectTime": "2023-10-30T13:58:55.487246+02:00", "EventTime": "2023-10-30T13:58:55.487265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["ClvuCB2eRTQx8ike7i"]} -{"Format": "IDEA0", "ID": "e5879903-9aa5-4dd1-8748-f911f9c2b4eb", "DetectTime": "2023-10-30T13:58:55.526352+02:00", "EventTime": "2023-10-30T13:58:55.526367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CaPN8a3oX9cESs3XP1"]} -{"Format": "IDEA0", "ID": "b948bed6-8c9c-4e84-9dd5-3f797f1416e3", "DetectTime": "2023-10-30T13:58:55.560496+02:00", "EventTime": "2023-10-30T13:58:55.560517+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuWK1KckBSuoTHExe"]} -{"Format": "IDEA0", "ID": "ae85f2ae-0321-4e66-ae56-fe37d94fe31f", "DetectTime": "2023-10-30T13:58:55.571572+02:00", "EventTime": "2023-10-30T13:58:55.571594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["C6Zg42oRbbk8w2Xb"]} -{"Format": "IDEA0", "ID": "48f0232f-c988-4716-a9f8-4eb6cd97bc52", "DetectTime": "2023-10-30T13:58:55.610712+02:00", "EventTime": "2023-10-30T13:58:55.610734+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjDoA72A8foEZqWexb"]} -{"Format": "IDEA0", "ID": "98416d94-b02c-4085-a7b9-0b5ea29f5ea4", "DetectTime": "2023-10-30T13:58:55.620790+02:00", "EventTime": "2023-10-30T13:58:55.620806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CNnskw4GgcM6j3LoLi"]} -{"Format": "IDEA0", "ID": "34f2683a-2a99-48ba-a1fd-a8b29a46ad4c", "DetectTime": "2023-10-30T13:58:55.654636+02:00", "EventTime": "2023-10-30T13:58:55.654657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["ClJMJr1vETAuVyLxj1"]} -{"Format": "IDEA0", "ID": "81bedf97-0c44-4cb7-819a-9009cd17a653", "DetectTime": "2023-10-30T13:58:55.692237+02:00", "EventTime": "2023-10-30T13:58:55.692254+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdbpZB2px8wkWioFq9"]} -{"Format": "IDEA0", "ID": "d0f7dfb0-5d58-40f1-a6d6-65800e44fc9d", "DetectTime": "2023-10-30T13:58:55.700894+02:00", "EventTime": "2023-10-30T13:58:55.700909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CUM1tl2rY78Vhzbj96"]} -{"Format": "IDEA0", "ID": "ad354880-e09f-4736-b0b0-4a595c3de5f4", "DetectTime": "2023-10-30T13:58:55.742463+02:00", "EventTime": "2023-10-30T13:58:55.742482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYmi9VofWRpP5BJj1", "CjsJt01KVFRQtcsMA3", "CjDoA72A8foEZqWexb", "C68aPs2m4vEmLM4DXc"]} -{"Format": "IDEA0", "ID": "1943191b-4622-4b18-9277-e2f56a41ef2d", "DetectTime": "2023-10-30T13:58:55.752807+02:00", "EventTime": "2023-10-30T13:58:55.752824+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjsJt01KVFRQtcsMA3"]} -{"Format": "IDEA0", "ID": "5f303f56-d595-4de2-b655-6f796236cbe2", "DetectTime": "2023-10-30T13:58:55.766526+02:00", "EventTime": "2023-10-30T13:58:55.766543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CxJoWm20AZggyaiOTa"]} -{"Format": "IDEA0", "ID": "dda965e6-882c-48eb-a217-771332b8b3e2", "DetectTime": "2023-10-30T13:58:55.808136+02:00", "EventTime": "2023-10-30T13:58:55.808155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Caz0fUN5Q2Ky7mqtb"]} -{"Format": "Json", "ID": "dda965e6-882c-48eb-a217-771332b8b3e2", "DetectTime": "2023-10-30T13:58:55.808136+02:00", "EventTime": "2023-10-30T13:58:55.808155+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:22:08.187502+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:55.878302)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c51c498-dca8-4dca-8087-a51c1e0079c7", "DetectTime": "2023-10-30T13:58:55.884011+02:00", "EventTime": "2023-10-30T13:58:55.884027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CVAwrh1rxk8bPKEFN5"]} -{"Format": "IDEA0", "ID": "03928cb4-44c3-4947-b14b-4b44f7ee27b4", "DetectTime": "2023-10-30T13:58:55.917641+02:00", "EventTime": "2023-10-30T13:58:55.917664+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Chi7wphEdZhxmiy5h"]} -{"Format": "IDEA0", "ID": "e5340ab5-04f5-4bc0-8d4d-6c96187d707b", "DetectTime": "2023-10-30T13:58:55.928020+02:00", "EventTime": "2023-10-30T13:58:55.928040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["C1c7kO1Wzmho7RzXAg"]} -{"Format": "IDEA0", "ID": "dc2b7a84-abdb-4263-b22b-72a8713216ba", "DetectTime": "2023-10-30T13:58:55.961744+02:00", "EventTime": "2023-10-30T13:58:55.961763+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CURD7EQSJIV0czhqd"]} -{"Format": "IDEA0", "ID": "f988335c-5138-4df0-a328-7d2823e0fa13", "DetectTime": "2023-10-30T13:58:55.972422+02:00", "EventTime": "2023-10-30T13:58:55.972441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CICrcKHuOc9cEpmc4"]} -{"Format": "IDEA0", "ID": "8a3e1e0d-e969-478f-ab9e-d3e0156fb011", "DetectTime": "2023-10-30T13:58:56.006016+02:00", "EventTime": "2023-10-30T13:58:56.006033+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2pLbj1G9PQ7Bszyt1"]} -{"Format": "IDEA0", "ID": "07cded88-f1db-4740-9452-bd685c4c1f62", "DetectTime": "2023-10-30T13:58:56.016549+02:00", "EventTime": "2023-10-30T13:58:56.016567+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT6JUp2xbHNQ6AFPch"]} -{"Format": "IDEA0", "ID": "0d164d55-15c5-4233-babe-e7392a0bc2b8", "DetectTime": "2023-10-30T13:58:56.025343+02:00", "EventTime": "2023-10-30T13:58:56.025370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CSr8Wq4OMojMnxoM3j"]} -{"Format": "IDEA0", "ID": "17b5260f-59c0-4987-9b33-5d2501a30b0f", "DetectTime": "2023-10-30T13:58:56.057916+02:00", "EventTime": "2023-10-30T13:58:56.057927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["Cns3174BW3xUS6ceh"]} -{"Format": "IDEA0", "ID": "44c6b5f7-47f9-42d9-aa5e-e500e2ff0a5b", "DetectTime": "2023-10-30T13:58:56.088035+02:00", "EventTime": "2023-10-30T13:58:56.088051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cg0wlF1SDZKWIlX6z4"]} -{"Format": "IDEA0", "ID": "cf80d6ea-63bd-438b-8f33-6abc59591e91", "DetectTime": "2023-10-30T13:58:56.120749+02:00", "EventTime": "2023-10-30T13:58:56.120766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CiG6kc4YBIjQ74jeE9"]} -{"Format": "IDEA0", "ID": "10096888-2215-4ad0-b85c-c2a34a219617", "DetectTime": "2023-10-30T13:58:56.151726+02:00", "EventTime": "2023-10-30T13:58:56.151737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CL6nfG1LbdQicG4s6f"]} -{"Format": "Json", "ID": "10096888-2215-4ad0-b85c-c2a34a219617", "DetectTime": "2023-10-30T13:58:56.151726+02:00", "EventTime": "2023-10-30T13:58:56.151737+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:53:31.349260+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:56.207236)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "80f6cd0e-82e5-4172-bafd-b539f847435f", "DetectTime": "2023-10-30T13:58:56.213077+02:00", "EventTime": "2023-10-30T13:58:56.213094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CiGOxg4IvYGO3aVMOl"]} -{"Format": "IDEA0", "ID": "63401483-e117-4c0e-8937-afe946aec445", "DetectTime": "2023-10-30T13:58:56.248401+02:00", "EventTime": "2023-10-30T13:58:56.248423+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAP6xs410S8VpWLICa"]} -{"Format": "IDEA0", "ID": "c55a4dd8-0aac-4bd4-af35-befb1dd84490", "DetectTime": "2023-10-30T13:58:56.256728+02:00", "EventTime": "2023-10-30T13:58:56.256739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CUnbsQ1SLOuLMShcX1"]} -{"Format": "IDEA0", "ID": "a9eb708e-d6d2-4a15-85ec-80d63a900d80", "DetectTime": "2023-10-30T13:58:56.285284+02:00", "EventTime": "2023-10-30T13:58:56.285301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C57YIc2y9KUTWucnLg"]} -{"Format": "IDEA0", "ID": "b7deb91d-0302-4ac5-bf01-8d34a20c797a", "DetectTime": "2023-10-30T13:58:56.319934+02:00", "EventTime": "2023-10-30T13:58:56.319952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["ChQbbR2IO3LNRxf8U"]} -{"Format": "IDEA0", "ID": "882efd0c-260b-4ea2-9cb9-910a1c36317a", "DetectTime": "2023-10-30T13:58:56.345693+02:00", "EventTime": "2023-10-30T13:58:56.345712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["C8VyRX33iKfUBQFfbe"]} -{"Format": "IDEA0", "ID": "0965a3be-c12e-4382-bd5c-722b304c043c", "DetectTime": "2023-10-30T13:58:56.378453+02:00", "EventTime": "2023-10-30T13:58:56.378479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cv0yvtP5FMAOKhnz6"]} -{"Format": "IDEA0", "ID": "d72fd28e-355f-4b0f-90c9-486b766d1356", "DetectTime": "2023-10-30T13:58:56.408026+02:00", "EventTime": "2023-10-30T13:58:56.408042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["CXdZsNFFxAfr5CKR4"]} -{"Format": "IDEA0", "ID": "3f096a48-4329-4de1-aa2f-669ceadfa316", "DetectTime": "2023-10-30T13:58:56.437917+02:00", "EventTime": "2023-10-30T13:58:56.437930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["C44bWQ1lj302eLGQF2"]} -{"Format": "Json", "ID": "3f096a48-4329-4de1-aa2f-669ceadfa316", "DetectTime": "2023-10-30T13:58:56.437917+02:00", "EventTime": "2023-10-30T13:58:56.437930+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:53:51.620648+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:56.507956)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aecda800-ab70-4a70-8809-93eefc75a4a3", "DetectTime": "2023-10-30T13:58:56.513857+02:00", "EventTime": "2023-10-30T13:58:56.513874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CGZm9S3WKIDeYM4G7f"]} -{"Format": "IDEA0", "ID": "4e9a5ab4-f186-42e4-b3b2-0873bdd32417", "DetectTime": "2023-10-30T13:58:56.546214+02:00", "EventTime": "2023-10-30T13:58:56.546263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["Ck7OrrqQsoJFc0vvh"]} -{"Format": "IDEA0", "ID": "8aed9723-6313-4026-8dd3-0b58d1bab99f", "DetectTime": "2023-10-30T13:58:56.577741+02:00", "EventTime": "2023-10-30T13:58:56.577758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["CSCNg32CPKYbJqeFZi"]} -{"Format": "IDEA0", "ID": "389bb814-1b78-4856-a291-0121c8c1ac1e", "DetectTime": "2023-10-30T13:58:56.614948+02:00", "EventTime": "2023-10-30T13:58:56.614968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CEdj4sD2kiMi4oWk5"]} -{"Format": "IDEA0", "ID": "555ee829-63c7-43d4-ae45-60ece50b0f70", "DetectTime": "2023-10-30T13:58:56.650986+02:00", "EventTime": "2023-10-30T13:58:56.651001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["C17XvEueJMInKKyo8"]} -{"Format": "IDEA0", "ID": "b29ec64a-1017-4602-bda5-ffbca190ae96", "DetectTime": "2023-10-30T13:58:56.680329+02:00", "EventTime": "2023-10-30T13:58:56.680345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CG4C8a2nEBfntQnkRb"]} -{"Format": "IDEA0", "ID": "314d5f2d-4da6-40b7-ab89-7da69b84ca6a", "DetectTime": "2023-10-30T13:58:56.706300+02:00", "EventTime": "2023-10-30T13:58:56.706317+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtVC4l3qoSWvsK1dC8"]} -{"Format": "IDEA0", "ID": "a93f5c3e-b3ba-4ee5-8534-cb6d2400135a", "DetectTime": "2023-10-30T13:58:56.716641+02:00", "EventTime": "2023-10-30T13:58:56.716657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5772], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5772/TCP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CBbGitH1gK9lhtab9"]} -{"Format": "IDEA0", "ID": "15aa7d99-76da-4f00-97f3-c9ffe136a2ec", "DetectTime": "2023-10-30T13:58:56.749510+02:00", "EventTime": "2023-10-30T13:58:56.749527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CNWAVS36uncpcVtev5"]} -{"Format": "IDEA0", "ID": "aa99e016-e3aa-444c-85e7-7de2e183d6c3", "DetectTime": "2023-10-30T13:58:56.777218+02:00", "EventTime": "2023-10-30T13:58:56.777231+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQpZTe2Hoo5yusksv"]} -{"Format": "IDEA0", "ID": "5cf76f8a-277d-44db-9a14-30c34647fd2b", "DetectTime": "2023-10-30T13:58:56.787397+02:00", "EventTime": "2023-10-30T13:58:56.787417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CY6bzk4KSMg8r0llaa"]} -{"Format": "Json", "ID": "5cf76f8a-277d-44db-9a14-30c34647fd2b", "DetectTime": "2023-10-30T13:58:56.787397+02:00", "EventTime": "2023-10-30T13:58:56.787417+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T18:54:09.140046+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2023/10/30 13:58:56.838308)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eabb8f6f-2bfd-4f5f-8de4-9224eddffac8", "DetectTime": "2023-10-30T13:58:56.843416+02:00", "EventTime": "2023-10-30T13:58:56.843432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CsZOYO3IgXbVH270P5"]} -{"Format": "IDEA0", "ID": "56ddadc3-1d80-48db-bbcc-e01fb70e4766", "DetectTime": "2023-10-30T13:58:56.868104+02:00", "EventTime": "2023-10-30T13:58:56.868118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6863], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6863/TCP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CNSUfE257lHubv2GDa"]} -{"Format": "IDEA0", "ID": "11c8c844-1f1e-4df0-9b6c-eb0060e6b3f2", "DetectTime": "2023-10-30T13:58:56.899132+02:00", "EventTime": "2023-10-30T13:58:56.899153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CVFpBL1bM9EXn7ZTL7"]} -{"Format": "IDEA0", "ID": "324d4168-59e3-46ec-862b-31377a7eda1c", "DetectTime": "2023-10-30T13:58:56.928542+02:00", "EventTime": "2023-10-30T13:58:56.928559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CTgjgx3vW7hWMs5zol"]} -{"Format": "IDEA0", "ID": "9c04d477-226e-40f1-b237-d6faf7a3187a", "DetectTime": "2023-10-30T13:58:56.954374+02:00", "EventTime": "2023-10-30T13:58:56.954391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CSzgs62IsGCgsV7y1"]} -{"Format": "IDEA0", "ID": "5c6923f1-f7ce-4212-92c1-cff74b0df161", "DetectTime": "2023-10-30T13:58:56.984156+02:00", "EventTime": "2023-10-30T13:58:56.984177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CXprF31FcrmMte5hO5"]} -{"Format": "IDEA0", "ID": "82c4d09d-6754-4a3e-a698-f31ded1eabf9", "DetectTime": "2023-10-30T13:58:57.015561+02:00", "EventTime": "2023-10-30T13:58:57.015585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["C4Lz66o0Yh5wS3Lw5"]} -{"Format": "IDEA0", "ID": "c520d478-1ec7-4db0-8b48-78b45c0aece9", "DetectTime": "2023-10-30T13:58:57.045670+02:00", "EventTime": "2023-10-30T13:58:57.045689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cl1rnVjSfxRMGBUNd"]} -{"Format": "IDEA0", "ID": "3cd05c3b-5b6d-48bd-9faf-14d7bd13476a", "DetectTime": "2023-10-30T13:58:57.085846+02:00", "EventTime": "2023-10-30T13:58:57.085863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C3Zp3RqaPmV2OS3uf"]} -{"Format": "IDEA0", "ID": "4c201a9d-712a-4ad8-ab09-35776540b70c", "DetectTime": "2023-10-30T13:58:57.124849+02:00", "EventTime": "2023-10-30T13:58:57.124863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["CTKo4P1mR9fRUrKDoc"]} -{"Format": "IDEA0", "ID": "50c44deb-b7ec-4d14-b101-b63e9b6354ac", "DetectTime": "2023-10-30T13:58:57.169592+02:00", "EventTime": "2023-10-30T13:58:57.169611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CmucsU3MhXdnmNzxqd"]} -{"Format": "IDEA0", "ID": "d07d282f-d4c6-4cfa-b190-cef0422720bf", "DetectTime": "2023-10-30T13:58:57.212752+02:00", "EventTime": "2023-10-30T13:58:57.212763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CVT0KdsKeSCueigsb"]} -{"Format": "IDEA0", "ID": "7b41e49b-9810-4051-b576-e83d0645158d", "DetectTime": "2023-10-30T13:58:57.247098+02:00", "EventTime": "2023-10-30T13:58:57.247117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CZ88g3IsFNzWaaPAa"]} -{"Format": "Json", "ID": "7b41e49b-9810-4051-b576-e83d0645158d", "DetectTime": "2023-10-30T13:58:57.247098+02:00", "EventTime": "2023-10-30T13:58:57.247117+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1787], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T19:26:39.321119+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2023/10/30 13:58:57.353596)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c4761f97-155a-41b2-838c-1e895c717a50", "DetectTime": "2023-10-30T13:58:57.359093+02:00", "EventTime": "2023-10-30T13:58:57.359111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CocRq441LrYMCyESPj"]} -{"Format": "IDEA0", "ID": "79598912-9e09-443f-90c4-dadaade52adb", "DetectTime": "2023-10-30T13:58:57.409260+02:00", "EventTime": "2023-10-30T13:58:57.409285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C79C5z14aqtxPC4k2"]} -{"Format": "IDEA0", "ID": "5131e1e8-b38c-4a39-8d86-870bb67fdc4c", "DetectTime": "2023-10-30T13:58:57.448252+02:00", "EventTime": "2023-10-30T13:58:57.448269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7605], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C9J4Ik4JsGwGZFXUV8"]} -{"Format": "IDEA0", "ID": "a971f5be-919a-47b6-9679-35beec57cf1f", "DetectTime": "2023-10-30T13:58:57.486414+02:00", "EventTime": "2023-10-30T13:58:57.486434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CnBuMm1Dz3agz59UNl"]} -{"Format": "IDEA0", "ID": "58aa9d41-e014-4f3c-b35d-232160171dac", "DetectTime": "2023-10-30T13:58:57.525510+02:00", "EventTime": "2023-10-30T13:58:57.525531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C2y19d4DJPwWajPVm7"]} -{"Format": "IDEA0", "ID": "0e310a0d-e11c-4d3d-9d12-14f910134d93", "DetectTime": "2023-10-30T13:58:57.564064+02:00", "EventTime": "2023-10-30T13:58:57.564083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CZJO6t3lxLewoEC924"]} -{"Format": "IDEA0", "ID": "4940c80a-d93a-4b63-b04e-8e17729c2fb3", "DetectTime": "2023-10-30T13:58:57.604205+02:00", "EventTime": "2023-10-30T13:58:57.604224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. ", "ContentType": "text/plain"}], "uids": ["COp4aY1JX2UG4IJtW2"]} -{"Format": "IDEA0", "ID": "268ccbb5-9bd3-4f6b-9d34-28453ac7f765", "DetectTime": "2023-10-30T13:58:57.641029+02:00", "EventTime": "2023-10-30T13:58:57.641049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C5jE8W3dViQwsIsS58"]} -{"Format": "Json", "ID": "268ccbb5-9bd3-4f6b-9d34-28453ac7f765", "DetectTime": "2023-10-30T13:58:57.641029+02:00", "EventTime": "2023-10-30T13:58:57.641049+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T19:26:42.798375+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2023/10/30 13:58:57.707245)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2df3db65-783b-4006-8239-57dd5ca36d12", "DetectTime": "2023-10-30T13:58:57.714055+02:00", "EventTime": "2023-10-30T13:58:57.714076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CtVC4l3qoSWvsK1dC8", "CxzlyQ3Yg5IVPAQ6fd", "CURD7EQSJIV0czhqd", "CT6JUp2xbHNQ6AFPch"]} -{"Format": "IDEA0", "ID": "2cf03061-dd46-43e1-8849-cb194127bc31", "DetectTime": "2023-10-30T13:58:57.835151+02:00", "EventTime": "2023-10-30T13:58:57.835172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxzlyQ3Yg5IVPAQ6fd"]} -{"Format": "IDEA0", "ID": "caded284-1ca7-4f55-9a81-f9498c34ac62", "DetectTime": "2023-10-30T13:58:57.849749+02:00", "EventTime": "2023-10-30T13:58:57.849768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2583], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. ", "ContentType": "text/plain"}], "uids": ["C0HxrgF55SNravS6a"]} -{"Format": "IDEA0", "ID": "139f0e53-4581-428e-adf1-1979d720b9e5", "DetectTime": "2023-10-30T13:58:57.891150+02:00", "EventTime": "2023-10-30T13:58:57.891171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CRXWDK3tty9WIyoK7e"]} -{"Format": "IDEA0", "ID": "783cceca-8058-4125-af3f-e928dcd6dd25", "DetectTime": "2023-10-30T13:58:57.939248+02:00", "EventTime": "2023-10-30T13:58:57.939274+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CM8R0q3Hz5rJ8mE3ni"]} -{"Format": "IDEA0", "ID": "6e23b5e4-5bf5-49e6-91ae-f4c7de1a44b8", "DetectTime": "2023-10-30T13:58:57.953459+02:00", "EventTime": "2023-10-30T13:58:57.953481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. ", "ContentType": "text/plain"}], "uids": ["CEmGMR3zTbXQ1UGjq5"]} -{"Format": "IDEA0", "ID": "f09dc912-11ba-4864-8999-2a04aafedc17", "DetectTime": "2023-10-30T13:58:58.000022+02:00", "EventTime": "2023-10-30T13:58:58.000042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CXykjL1OIu57u7gdY1"]} -{"Format": "IDEA0", "ID": "eeebf63a-9e9e-46c7-bb43-1d0a23f26f46", "DetectTime": "2023-10-30T13:58:58.042654+02:00", "EventTime": "2023-10-30T13:58:58.042671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChLRUbQhLyq8lnDFk"]} -{"Format": "IDEA0", "ID": "98609598-041e-4845-847f-8a07f3332c59", "DetectTime": "2023-10-30T13:58:58.057266+02:00", "EventTime": "2023-10-30T13:58:58.057285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CyWzNA12BGo4EqaPj9"]} -{"Format": "IDEA0", "ID": "2a3aaaeb-7b9f-4fd1-9b4b-3f41b64e4e76", "DetectTime": "2023-10-30T13:58:58.099831+02:00", "EventTime": "2023-10-30T13:58:58.099848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CR6VQQ31QTl6T7Ks3e"]} -{"Format": "IDEA0", "ID": "2772c62c-b4b2-440b-ab95-75be84ab967c", "DetectTime": "2023-10-30T13:58:58.138587+02:00", "EventTime": "2023-10-30T13:58:58.138606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["C9xnHP3CqXPGX6jB6i"]} -{"Format": "IDEA0", "ID": "73dd188e-5f00-42c3-8622-7ac3f1479d32", "DetectTime": "2023-10-30T13:58:58.181937+02:00", "EventTime": "2023-10-30T13:58:58.181954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CP0ddZfCcPuiJuRTi"]} -{"Format": "Json", "ID": "73dd188e-5f00-42c3-8622-7ac3f1479d32", "DetectTime": "2023-10-30T13:58:58.181937+02:00", "EventTime": "2023-10-30T13:58:58.181954+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T19:26:44.436161+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2023/10/30 13:58:58.249574)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "177409b3-bc1d-4570-950d-0140301e0cbf", "DetectTime": "2023-10-30T13:58:58.258131+02:00", "EventTime": "2023-10-30T13:58:58.258150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CZJxtq1UEDypGvi36b"]} -{"Format": "IDEA0", "ID": "41ea66f7-a798-4d5e-9dcf-0ad00a5997fc", "DetectTime": "2023-10-30T13:58:58.297456+02:00", "EventTime": "2023-10-30T13:58:58.297479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CBlDpm2dKJyY4l5cZ"]} -{"Format": "IDEA0", "ID": "fa48e252-6e72-4b2d-93f9-2434bbc02052", "DetectTime": "2023-10-30T13:58:58.337583+02:00", "EventTime": "2023-10-30T13:58:58.337610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CJMKPx2AOarBovzn22"]} -{"Format": "IDEA0", "ID": "ad2d68b4-10c3-4cf4-9eb3-42e8efea10e2", "DetectTime": "2023-10-30T13:58:58.373737+02:00", "EventTime": "2023-10-30T13:58:58.373755+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cu1QKgbW9a3PK7Zf"]} -{"Format": "IDEA0", "ID": "8d0e6a5d-ae3a-46f7-ade9-31b7c7849104", "DetectTime": "2023-10-30T13:58:58.385351+02:00", "EventTime": "2023-10-30T13:58:58.385369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CTL7S13r47E9hY4t95"]} -{"Format": "IDEA0", "ID": "329aaeb0-dc7a-4dfc-83c8-c1966b552d2d", "DetectTime": "2023-10-30T13:58:58.422301+02:00", "EventTime": "2023-10-30T13:58:58.422320+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwVUQShWR7Cxffv0i"]} -{"Format": "IDEA0", "ID": "91e11c63-a788-4563-af75-e5c7efb1f514", "DetectTime": "2023-10-30T13:58:58.434290+02:00", "EventTime": "2023-10-30T13:58:58.434311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14502], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. ", "ContentType": "text/plain"}], "uids": ["CafEnx7gUIcSjD6n6"]} -{"Format": "IDEA0", "ID": "0baaaa80-4cc1-45b3-b3a6-2689d2cdba9e", "DetectTime": "2023-10-30T13:58:58.472026+02:00", "EventTime": "2023-10-30T13:58:58.472041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CiPtlu2MgZk2OsaSKl"]} -{"Format": "IDEA0", "ID": "e08a418e-6257-4eb7-b2aa-bed7b02defbc", "DetectTime": "2023-10-30T13:58:58.511999+02:00", "EventTime": "2023-10-30T13:58:58.512020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIu4ii28TCopzGyo7e"]} -{"Format": "IDEA0", "ID": "92690333-caad-4f8d-b025-878141f5b09e", "DetectTime": "2023-10-30T13:58:58.551988+02:00", "EventTime": "2023-10-30T13:58:58.552013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cnuzhm1pBQSbwr5NO5"]} -{"Format": "Json", "ID": "92690333-caad-4f8d-b025-878141f5b09e", "DetectTime": "2023-10-30T13:58:58.551988+02:00", "EventTime": "2023-10-30T13:58:58.552013+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T19:56:56.257111+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2023/10/30 13:58:58.621821)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1e6645a5-d07a-4193-9200-d40256989fee", "DetectTime": "2023-10-30T13:58:58.630015+02:00", "EventTime": "2023-10-30T13:58:58.630032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CXvFov1DydGYVkY2H"]} -{"Format": "IDEA0", "ID": "edc17414-1c4b-4686-8224-e3787b7106c5", "DetectTime": "2023-10-30T13:58:58.668329+02:00", "EventTime": "2023-10-30T13:58:58.668344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4636], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. ", "ContentType": "text/plain"}], "uids": ["C7sLLUWKyDmZfnNJe"]} -{"Format": "IDEA0", "ID": "01ae55e9-8785-4f52-a7e0-0b4216dcbccf", "DetectTime": "2023-10-30T13:58:58.700236+02:00", "EventTime": "2023-10-30T13:58:58.700258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["C1MnUB4WfPMU4bilP5"]} -{"Format": "IDEA0", "ID": "c2b18903-d2fd-465c-843b-05313b67e704", "DetectTime": "2023-10-30T13:58:58.738365+02:00", "EventTime": "2023-10-30T13:58:58.738387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. ", "ContentType": "text/plain"}], "uids": ["CcEa85PSqUtQOQXoc"]} -{"Format": "IDEA0", "ID": "23412304-8390-418d-a4e2-cc4ab6fed3a3", "DetectTime": "2023-10-30T13:58:58.776572+02:00", "EventTime": "2023-10-30T13:58:58.776598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CbIPTf2RmvATUfaIch"]} -{"Format": "IDEA0", "ID": "e587147d-731f-423c-b78f-51320561d5f3", "DetectTime": "2023-10-30T13:58:58.808769+02:00", "EventTime": "2023-10-30T13:58:58.808786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C4s6Pz37BmvOy8hXEg"]} -{"Format": "IDEA0", "ID": "13c619eb-e01c-45c2-9b6c-67d34098274a", "DetectTime": "2023-10-30T13:58:58.843746+02:00", "EventTime": "2023-10-30T13:58:58.843822+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CN89Ds4HWdn6M6MUvj"]} -{"Format": "IDEA0", "ID": "8326e889-9395-488c-9fc5-4961a7f1d396", "DetectTime": "2023-10-30T13:58:58.857393+02:00", "EventTime": "2023-10-30T13:58:58.857411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["CJPRoH3jizsT7QMgd"]} -{"Format": "IDEA0", "ID": "6089b6e9-2360-40e2-81bf-ec1aa07e9c23", "DetectTime": "2023-10-30T13:58:58.889017+02:00", "EventTime": "2023-10-30T13:58:58.889036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["Cq6ilQ3YJ41MjBm118"]} -{"Format": "Json", "ID": "6089b6e9-2360-40e2-81bf-ec1aa07e9c23", "DetectTime": "2023-10-30T13:58:58.889017+02:00", "EventTime": "2023-10-30T13:58:58.889036+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T19:57:49.043760+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2023/10/30 13:58:58.969430)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae8f0064-a9bc-4d23-85f0-70344776a902", "DetectTime": "2023-10-30T13:58:58.975522+02:00", "EventTime": "2023-10-30T13:58:58.975539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cj3O9d1EIOA66qASG5"]} -{"Format": "IDEA0", "ID": "6b842f89-cc06-45f3-9b17-6a4704e1771f", "DetectTime": "2023-10-30T13:58:59.010129+02:00", "EventTime": "2023-10-30T13:58:59.010151+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLpPQm1gBVjPdMpmJh"]} -{"Format": "IDEA0", "ID": "6b6ea1d1-fa2a-4d04-b637-fb82155dafa1", "DetectTime": "2023-10-30T13:58:59.023135+02:00", "EventTime": "2023-10-30T13:58:59.023153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["Cp6n7X2pDpCIbk3yE4"]} -{"Format": "IDEA0", "ID": "f2bd4534-f1d5-4c20-aad5-77de320f269d", "DetectTime": "2023-10-30T13:58:59.055753+02:00", "EventTime": "2023-10-30T13:58:59.055776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CzkIUg4RzCZoTVes1g"]} -{"Format": "IDEA0", "ID": "599625e5-ab5e-4e4a-ad77-35db316cdfbb", "DetectTime": "2023-10-30T13:58:59.089682+02:00", "EventTime": "2023-10-30T13:58:59.089704+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUeSRd1r9Gl6zL86Bb"]} -{"Format": "IDEA0", "ID": "afe2a664-55af-497c-8b39-b3be5501079e", "DetectTime": "2023-10-30T13:58:59.104994+02:00", "EventTime": "2023-10-30T13:58:59.105013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["C1ZHNI2L1QkhQM6E2g"]} -{"Format": "IDEA0", "ID": "0010ca92-be8f-4897-8dea-b9857948edb9", "DetectTime": "2023-10-30T13:58:59.135203+02:00", "EventTime": "2023-10-30T13:58:59.135221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CFR1Zh1JRDISFYs7og"]} -{"Format": "IDEA0", "ID": "aa8d8fd9-03e8-473c-9187-9ba2a152318e", "DetectTime": "2023-10-30T13:58:59.174754+02:00", "EventTime": "2023-10-30T13:58:59.174774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLpPQm1gBVjPdMpmJh", "ChLRUbQhLyq8lnDFk", "CwVUQShWR7Cxffv0i", "CyxFylfxrPSEx0L8e"]} -{"Format": "IDEA0", "ID": "1c033747-a5f2-4219-8fdc-338609577ae3", "DetectTime": "2023-10-30T13:58:59.191248+02:00", "EventTime": "2023-10-30T13:58:59.191268+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyxFylfxrPSEx0L8e"]} -{"Format": "IDEA0", "ID": "49e5070f-c45d-4f81-9a10-22993b8a1f34", "DetectTime": "2023-10-30T13:58:59.209238+02:00", "EventTime": "2023-10-30T13:58:59.209254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["Cyler23SvTT8Mzo2Pk"]} -{"Format": "IDEA0", "ID": "8c2a01fd-bea0-457f-8fa2-724898334d50", "DetectTime": "2023-10-30T13:58:59.240201+02:00", "EventTime": "2023-10-30T13:58:59.240212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBkEam3KNOlJzDs7E4"]} -{"Format": "IDEA0", "ID": "28695db7-16a3-4cc4-bc1b-c70db65860cc", "DetectTime": "2023-10-30T13:58:59.253110+02:00", "EventTime": "2023-10-30T13:58:59.253130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CnMXzg4YA3zN5tkUpg"]} -{"Format": "IDEA0", "ID": "1a93e3c9-1506-40af-a795-b7b1571f7ea8", "DetectTime": "2023-10-30T13:58:59.289034+02:00", "EventTime": "2023-10-30T13:58:59.289053+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUxww52cnVDvycFYW3"]} -{"Format": "IDEA0", "ID": "fe265c0d-38ce-4d8d-bc45-216257b9bf2a", "DetectTime": "2023-10-30T13:58:59.301497+02:00", "EventTime": "2023-10-30T13:58:59.301514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CRvFid1exQMl2O3v1g"]} -{"Format": "Json", "ID": "fe265c0d-38ce-4d8d-bc45-216257b9bf2a", "DetectTime": "2023-10-30T13:58:59.301497+02:00", "EventTime": "2023-10-30T13:58:59.301514+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T19:58:41.982614+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2023/10/30 13:58:59.369707)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f30c7863-e5db-48d6-b099-8c62f51de75d", "DetectTime": "2023-10-30T13:58:59.375152+02:00", "EventTime": "2023-10-30T13:58:59.375170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["Cm4gP2lYGfbgFIINb"]} -{"Format": "IDEA0", "ID": "46ecb4b5-4123-470d-9623-64ed329f59ae", "DetectTime": "2023-10-30T13:58:59.410794+02:00", "EventTime": "2023-10-30T13:58:59.410818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CWtvL56vzRPihRx9h"]} -{"Format": "IDEA0", "ID": "c5b93425-ebfa-4cf2-9fab-d868fdea122e", "DetectTime": "2023-10-30T13:58:59.451474+02:00", "EventTime": "2023-10-30T13:58:59.451497+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8SWSU1GqjsKaa4TE9"]} -{"Format": "IDEA0", "ID": "54ba275c-d89c-4149-bae2-c8d30495c5df", "DetectTime": "2023-10-30T13:58:59.468052+02:00", "EventTime": "2023-10-30T13:58:59.468074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["C7FMGR1hCG4ZDx561l"]} -{"Format": "IDEA0", "ID": "852d9320-2a61-4bb9-a9f8-9afb051764f0", "DetectTime": "2023-10-30T13:58:59.512452+02:00", "EventTime": "2023-10-30T13:58:59.512470+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CV2JdD1Dsp6KXLWAz6"]} -{"Format": "IDEA0", "ID": "7fd40570-c344-449f-85e0-442865237796", "DetectTime": "2023-10-30T13:58:59.530992+02:00", "EventTime": "2023-10-30T13:58:59.531207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CZvttt4rvDB03Xkf0e"]} -{"Format": "IDEA0", "ID": "53070069-bb1c-4165-bbfc-7e5dd682f8f4", "DetectTime": "2023-10-30T13:58:59.563146+02:00", "EventTime": "2023-10-30T13:58:59.563164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcDrbm2LJ7urxngft3"]} -{"Format": "IDEA0", "ID": "9103aa52-1638-48a7-ada7-29d1fe215992", "DetectTime": "2023-10-30T13:58:59.631880+02:00", "EventTime": "2023-10-30T13:58:59.631904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["C3kLY34BsbmrZkgPef"]} -{"Format": "IDEA0", "ID": "9e2e0232-5b1e-4cfb-90d1-8c2ccd632ab1", "DetectTime": "2023-10-30T13:58:59.681038+02:00", "EventTime": "2023-10-30T13:58:59.681061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8711], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 8711/TCP destination IP 176.73.147.65. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["C7PaqBes7n95asAf4"]} -{"Format": "IDEA0", "ID": "bb6c3d3a-975a-4c49-9fc5-19862bdd30f0", "DetectTime": "2023-10-30T13:58:59.731747+02:00", "EventTime": "2023-10-30T13:58:59.731768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. ", "ContentType": "text/plain"}], "uids": ["CaBU6x17SG4Sx63ATc"]} -{"Format": "IDEA0", "ID": "03e039b7-0ea1-4b41-a054-64f2076453dd", "DetectTime": "2023-10-30T13:58:59.785022+02:00", "EventTime": "2023-10-30T13:58:59.785037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1684], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CV1UCB1j74Q0VgtP6b"]} -{"Format": "IDEA0", "ID": "bd108c72-df91-4622-a1a4-709b5439aad2", "DetectTime": "2023-10-30T13:58:59.831791+02:00", "EventTime": "2023-10-30T13:58:59.831808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7520], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CSS4Kj4Vs0Du0SZPNb"]} -{"Format": "IDEA0", "ID": "5339b176-e9ac-4278-a457-a8077692b654", "DetectTime": "2023-10-30T13:58:59.882939+02:00", "EventTime": "2023-10-30T13:58:59.882956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. ", "ContentType": "text/plain"}], "uids": ["CNEw6W32xSyAaLLmrb"]} -{"Format": "Json", "ID": "5339b176-e9ac-4278-a457-a8077692b654", "DetectTime": "2023-10-30T13:58:59.882939+02:00", "EventTime": "2023-10-30T13:58:59.882956+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1332], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:31:22.730269+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:58:59.990589)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f937b1d7-3c8f-46a6-8e26-8b9d7d60884f", "DetectTime": "2023-10-30T13:58:59.996638+02:00", "EventTime": "2023-10-30T13:58:59.996666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3319], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["Cpg9mG2kKphoBSic24"]} -{"Format": "IDEA0", "ID": "6d93aa94-fd97-4cf5-8e16-c711970ea797", "DetectTime": "2023-10-30T13:59:00.042933+02:00", "EventTime": "2023-10-30T13:59:00.042953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7158], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. ", "ContentType": "text/plain"}], "uids": ["CJu51yU5dVc54MB8a"]} -{"Format": "IDEA0", "ID": "2e823063-b07b-488e-ae68-4dd039668c29", "DetectTime": "2023-10-30T13:59:00.090072+02:00", "EventTime": "2023-10-30T13:59:00.090089+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2WNoD2ChDloYdk1t7"]} -{"Format": "IDEA0", "ID": "92c80eaa-a033-484e-87c9-73efb88b02a9", "DetectTime": "2023-10-30T13:59:00.102236+02:00", "EventTime": "2023-10-30T13:59:00.102257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28269], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CIlEU32TsK3rcVRNqg"]} -{"Format": "IDEA0", "ID": "364d70f5-42ee-40d6-8445-45025527c7a8", "DetectTime": "2023-10-30T13:59:00.151561+02:00", "EventTime": "2023-10-30T13:59:00.151587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. ", "ContentType": "text/plain"}], "uids": ["C3weBDjrrqEHyHDWg"]} -{"Format": "IDEA0", "ID": "99dc35e8-8232-4b0d-adb0-ff9c51886725", "DetectTime": "2023-10-30T13:59:00.206463+02:00", "EventTime": "2023-10-30T13:59:00.206491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7051], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. ", "ContentType": "text/plain"}], "uids": ["CEgK1c47Mqw4s7H61g"]} -{"Format": "IDEA0", "ID": "76928771-e4c7-496b-a014-7920e53885aa", "DetectTime": "2023-10-30T13:59:00.255373+02:00", "EventTime": "2023-10-30T13:59:00.255394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4826], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CnIGqo2s5fKnUVAJbl"]} -{"Format": "IDEA0", "ID": "0468834e-4b41-4272-98bd-15d04d15a250", "DetectTime": "2023-10-30T13:59:00.301383+02:00", "EventTime": "2023-10-30T13:59:00.301405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. ", "ContentType": "text/plain"}], "uids": ["CgLv3CPkA02exX0Zg"]} -{"Format": "IDEA0", "ID": "af96187c-b248-49c7-acf6-dd0961f700d0", "DetectTime": "2023-10-30T13:59:00.343566+02:00", "EventTime": "2023-10-30T13:59:00.343585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CEXjQt3yoftRuBeHQ8"]} -{"Format": "Json", "ID": "af96187c-b248-49c7-acf6-dd0961f700d0", "DetectTime": "2023-10-30T13:59:00.343566+02:00", "EventTime": "2023-10-30T13:59:00.343585+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:31:25.410614+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:00.416405)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c9e6fcf3-239c-4033-9668-940112d464e6", "DetectTime": "2023-10-30T13:59:00.422257+02:00", "EventTime": "2023-10-30T13:59:00.422273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CDWat5t6X3RdIqhbf"]} -{"Format": "IDEA0", "ID": "7e2c8704-5257-4ba0-a715-4717f3e5400e", "DetectTime": "2023-10-30T13:59:00.558185+02:00", "EventTime": "2023-10-30T13:59:00.558206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CXaWMq3VPtnCcWsoBa"]} -{"Format": "IDEA0", "ID": "6b2958ca-70bb-4957-8342-6f10a7b94b44", "DetectTime": "2023-10-30T13:59:00.609039+02:00", "EventTime": "2023-10-30T13:59:00.609065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Cj7l9Z2xsrveQz9WN9"]} -{"Format": "IDEA0", "ID": "5718aef4-b820-4439-9135-e8253cfbc796", "DetectTime": "2023-10-30T13:59:00.655670+02:00", "EventTime": "2023-10-30T13:59:00.655705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["Ckin8G1hOCBdRHKabd"]} -{"Format": "IDEA0", "ID": "d1cddc11-77c2-42df-a142-920ed678aba5", "DetectTime": "2023-10-30T13:59:00.710034+02:00", "EventTime": "2023-10-30T13:59:00.710052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CaIArw4pH9iSO7q3ja"]} -{"Format": "IDEA0", "ID": "09979699-244a-4888-9597-a941c0c4cf27", "DetectTime": "2023-10-30T13:59:00.763820+02:00", "EventTime": "2023-10-30T13:59:00.763837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CiqJTp1R0I9jAQrww6"]} -{"Format": "IDEA0", "ID": "2311d7d3-38d9-47b7-8427-f8f08ef8ec9a", "DetectTime": "2023-10-30T13:59:00.814922+02:00", "EventTime": "2023-10-30T13:59:00.814939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["ChwqQH25za2tU7XeD6"]} -{"Format": "IDEA0", "ID": "8bef3c58-e12c-4b5c-82b0-673e96545438", "DetectTime": "2023-10-30T13:59:00.868392+02:00", "EventTime": "2023-10-30T13:59:00.868416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CGJoI633kd8W1zZvx8"]} -{"Format": "Json", "ID": "8bef3c58-e12c-4b5c-82b0-673e96545438", "DetectTime": "2023-10-30T13:59:00.868392+02:00", "EventTime": "2023-10-30T13:59:00.868416+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:31:27.136792+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:00.958730)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "72ef70e3-276d-47f3-b295-78a71bbf3e23", "DetectTime": "2023-10-30T13:59:00.966746+02:00", "EventTime": "2023-10-30T13:59:00.966767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CZFPOx2kVtkOdeLYxe"]} -{"Format": "IDEA0", "ID": "8cebdc94-693c-4303-a94e-5fe45eadecaf", "DetectTime": "2023-10-30T13:59:01.018380+02:00", "EventTime": "2023-10-30T13:59:01.018398+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT6ukX1kwK32CQ7HB6"]} -{"Format": "IDEA0", "ID": "0870b039-0eef-44e2-8ed6-a490ed21f801", "DetectTime": "2023-10-30T13:59:01.034541+02:00", "EventTime": "2023-10-30T13:59:01.034560+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVwV982XUuCfmnDb6l"]} -{"Format": "IDEA0", "ID": "e309e2aa-4816-4aea-a42a-5aee36ae5319", "DetectTime": "2023-10-30T13:59:01.048855+02:00", "EventTime": "2023-10-30T13:59:01.048921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CT6ukX1kwK32CQ7HB6", "CTKPkgm2rwuLsBn67", "CV2JdD1Dsp6KXLWAz6", "CUxww52cnVDvycFYW3"]} -{"Format": "IDEA0", "ID": "ac86399c-7ce9-4ab2-b06b-f37093c17691", "DetectTime": "2023-10-30T13:59:01.064119+02:00", "EventTime": "2023-10-30T13:59:01.064146+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTKPkgm2rwuLsBn67"]} -{"Format": "IDEA0", "ID": "f786c731-30da-4e76-b558-26503e788acb", "DetectTime": "2023-10-30T13:59:01.077377+02:00", "EventTime": "2023-10-30T13:59:01.077400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1244/UDP destination IP 151.45.57.114. ", "ContentType": "text/plain"}], "uids": ["CfpHJW15rOy7gaZmQh"]} -{"Format": "IDEA0", "ID": "31659f81-03a3-46e3-9767-4cded803107f", "DetectTime": "2023-10-30T13:59:01.124186+02:00", "EventTime": "2023-10-30T13:59:01.124213+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cw5sVX2c2mJNBNjpMa"]} -{"Format": "IDEA0", "ID": "e2337f97-084e-4096-bb12-d4e3d949abe3", "DetectTime": "2023-10-30T13:59:01.139877+02:00", "EventTime": "2023-10-30T13:59:01.139897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cq5ybz3dYctI4qzFuk"]} -{"Format": "IDEA0", "ID": "9609bcff-3d17-48d2-b1b7-5cd8df0b4dd9", "DetectTime": "2023-10-30T13:59:01.189872+02:00", "EventTime": "2023-10-30T13:59:01.189890+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTFPBZzaZ6bPriG95"]} -{"Format": "IDEA0", "ID": "f95a8383-f8d2-42aa-bae0-10ce77a8606c", "DetectTime": "2023-10-30T13:59:01.202475+02:00", "EventTime": "2023-10-30T13:59:01.202496+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUaM0g2NsYQyRXFT9g"]} -{"Format": "IDEA0", "ID": "51973ed0-876d-4580-bbf3-dde3657a5641", "DetectTime": "2023-10-30T13:59:01.220007+02:00", "EventTime": "2023-10-30T13:59:01.220033+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5Yr302bvj89RDhrVe"]} -{"Format": "IDEA0", "ID": "0fd667d0-b80a-4645-a448-58dd9e2c727b", "DetectTime": "2023-10-30T13:59:01.234250+02:00", "EventTime": "2023-10-30T13:59:01.234279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["C4PcRK2S0IbNT0Oclf"]} -{"Format": "IDEA0", "ID": "9746b338-f022-4d51-b987-d2e4a1bcb28a", "DetectTime": "2023-10-30T13:59:01.281678+02:00", "EventTime": "2023-10-30T13:59:01.281700+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVDbZYSOESCpiV09e"]} -{"Format": "IDEA0", "ID": "2ef5d683-f63e-41a8-82d7-260847967a33", "DetectTime": "2023-10-30T13:59:01.296321+02:00", "EventTime": "2023-10-30T13:59:01.296338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. ", "ContentType": "text/plain"}], "uids": ["Cuos5a4zL1F9l8Vy8"]} -{"Format": "IDEA0", "ID": "97d938b6-6a83-4c8e-ba65-6f2afbf6fce5", "DetectTime": "2023-10-30T13:59:01.343293+02:00", "EventTime": "2023-10-30T13:59:01.343316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYmvLZQjKiQHENt5c"]} -{"Format": "IDEA0", "ID": "0be3868d-87bb-44e1-ae08-37c1116581b3", "DetectTime": "2023-10-30T13:59:01.359613+02:00", "EventTime": "2023-10-30T13:59:01.359635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CqIWNm2FBtQQOe1aNc"]} -{"Format": "IDEA0", "ID": "1cb0c6e9-b842-45b8-a012-a7b72a85daca", "DetectTime": "2023-10-30T13:59:01.409036+02:00", "EventTime": "2023-10-30T13:59:01.409053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5281], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5281/UDP destination IP 68.162.252.216. ", "ContentType": "text/plain"}], "uids": ["CRNGRg3Dv2HE13uu0e"]} -{"Format": "IDEA0", "ID": "5662b941-fe39-4787-ad99-b9818cbb45f3", "DetectTime": "2023-10-30T13:59:01.464048+02:00", "EventTime": "2023-10-30T13:59:01.464068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CPUxrq3kKDBZqw8lRg"]} -{"Format": "Json", "ID": "5662b941-fe39-4787-ad99-b9818cbb45f3", "DetectTime": "2023-10-30T13:59:01.464048+02:00", "EventTime": "2023-10-30T13:59:01.464068+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:34:56.435535+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:01.543807)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8c8c98c1-9ab6-425d-8e1a-9d03ba2c05c4", "DetectTime": "2023-10-30T13:59:01.550143+02:00", "EventTime": "2023-10-30T13:59:01.550164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. ", "ContentType": "text/plain"}], "uids": ["CjqimB3Hln32Jzqyl4"]} -{"Format": "IDEA0", "ID": "0b0bab2e-4f63-444d-82be-f2a6fbfed2e6", "DetectTime": "2023-10-30T13:59:01.598213+02:00", "EventTime": "2023-10-30T13:59:01.598229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1868], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. ", "ContentType": "text/plain"}], "uids": ["CQ9P6mjNjmryWSz2i"]} -{"Format": "IDEA0", "ID": "9ecd3bdf-7b85-446f-b02d-b7bce4a6470b", "DetectTime": "2023-10-30T13:59:01.642277+02:00", "EventTime": "2023-10-30T13:59:01.642297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["C5YlBURgx8L10f28e"]} -{"Format": "IDEA0", "ID": "933ba99b-96a1-4e63-99d1-567ca74ef2de", "DetectTime": "2023-10-30T13:59:01.698464+02:00", "EventTime": "2023-10-30T13:59:01.698530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["Cla1FIFHQjwyRDOx8"]} -{"Format": "IDEA0", "ID": "f0541d71-97a5-42bf-bb11-6d34b1c79bbd", "DetectTime": "2023-10-30T13:59:01.742489+02:00", "EventTime": "2023-10-30T13:59:01.742506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. ", "ContentType": "text/plain"}], "uids": ["CkxFXf4ClZPEoisLSd"]} -{"Format": "IDEA0", "ID": "a8f89444-faac-44d9-8d8e-2ebf25d7b4e9", "DetectTime": "2023-10-30T13:59:01.784748+02:00", "EventTime": "2023-10-30T13:59:01.784774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["CoQMvw27amTpViXjsg"]} -{"Format": "IDEA0", "ID": "96da5f76-89bf-45b8-a2ef-1eef484251e0", "DetectTime": "2023-10-30T13:59:01.832544+02:00", "EventTime": "2023-10-30T13:59:01.832567+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cv7dAx2LJs7KzqbTdh"]} -{"Format": "IDEA0", "ID": "9e1010d1-4962-4326-930c-c890ceba50c1", "DetectTime": "2023-10-30T13:59:01.848046+02:00", "EventTime": "2023-10-30T13:59:01.848067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CXFBB64Lm6DFVoRX7"]} -{"Format": "IDEA0", "ID": "d9e1a500-8683-4430-9dc0-bd31110fe7d0", "DetectTime": "2023-10-30T13:59:01.895520+02:00", "EventTime": "2023-10-30T13:59:01.895543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. ", "ContentType": "text/plain"}], "uids": ["CT1Aer2IBs5Lki7r3g"]} -{"Format": "Json", "ID": "d9e1a500-8683-4430-9dc0-bd31110fe7d0", "DetectTime": "2023-10-30T13:59:01.895520+02:00", "EventTime": "2023-10-30T13:59:01.895543+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:35:35.941596+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:01.975947)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "43737f01-4170-4404-b8d6-310e9f50135b", "DetectTime": "2023-10-30T13:59:01.985008+02:00", "EventTime": "2023-10-30T13:59:01.985032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["CtYRwd11A4Qs0uCGZ1"]} -{"Format": "IDEA0", "ID": "6d151419-740f-4d83-ab68-07545ee57e6e", "DetectTime": "2023-10-30T13:59:02.031471+02:00", "EventTime": "2023-10-30T13:59:02.031494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["CGeRYM3lgpKE0NEyk"]} -{"Format": "IDEA0", "ID": "c37e7046-609b-4d0f-9384-2cfd16e9c3e0", "DetectTime": "2023-10-30T13:59:02.071387+02:00", "EventTime": "2023-10-30T13:59:02.071413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["Cp1MPX2spiLsvCEsM5"]} -{"Format": "IDEA0", "ID": "1e2d04df-078b-46c1-a503-f44b8b55eb52", "DetectTime": "2023-10-30T13:59:02.110266+02:00", "EventTime": "2023-10-30T13:59:02.110288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5675], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5675/UDP destination IP 186.191.16.250. ", "ContentType": "text/plain"}], "uids": ["COFoNX3Y6liBL0u2pa"]} -{"Format": "IDEA0", "ID": "754717fa-e6f9-4760-aac5-c5d75122c034", "DetectTime": "2023-10-30T13:59:02.149449+02:00", "EventTime": "2023-10-30T13:59:02.149466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["C2sX8k1LzLI3tnIBZd"]} -{"Format": "IDEA0", "ID": "29b537c4-b1fd-4c3a-9f50-aa3ee0168cfa", "DetectTime": "2023-10-30T13:59:02.190206+02:00", "EventTime": "2023-10-30T13:59:02.190231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CdRogd29exrvzZgJ1e"]} -{"Format": "IDEA0", "ID": "32861a07-4a68-4257-bdf7-00da39f7172d", "DetectTime": "2023-10-30T13:59:02.238245+02:00", "EventTime": "2023-10-30T13:59:02.238266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDbcMf3OTZHfITTR79", "C5Yr302bvj89RDhrVe", "CTFPBZzaZ6bPriG95", "CYmvLZQjKiQHENt5c"]} -{"Format": "IDEA0", "ID": "81aab8f4-a55a-4e97-b90e-6b0a77ead2a8", "DetectTime": "2023-10-30T13:59:02.252409+02:00", "EventTime": "2023-10-30T13:59:02.252431+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDbcMf3OTZHfITTR79"]} -{"Format": "IDEA0", "ID": "148d7f24-dbb8-4737-866e-9fafae80b57c", "DetectTime": "2023-10-30T13:59:02.266540+02:00", "EventTime": "2023-10-30T13:59:02.266565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10407], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10407/UDP destination IP 188.169.253.12. ", "ContentType": "text/plain"}], "uids": ["CYIfFr4LmDTk9CIqTa"]} -{"Format": "IDEA0", "ID": "c368bd97-92ce-49a6-a6ae-e3717a0adb81", "DetectTime": "2023-10-30T13:59:02.303318+02:00", "EventTime": "2023-10-30T13:59:02.303333+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRpVRRzWJyKsdWQre"]} -{"Format": "IDEA0", "ID": "f0bd4eec-968b-4fae-a913-61baad4d3ad5", "DetectTime": "2023-10-30T13:59:02.316567+02:00", "EventTime": "2023-10-30T13:59:02.316580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CFkzCF1LiHPCnRcrZ8"]} -{"Format": "Json", "ID": "f0bd4eec-968b-4fae-a913-61baad4d3ad5", "DetectTime": "2023-10-30T13:59:02.316567+02:00", "EventTime": "2023-10-30T13:59:02.316580+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:36:15.889726+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:02.379243)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "68cbe737-d9f0-4aa0-a22e-de5b1a9d0836", "DetectTime": "2023-10-30T13:59:02.384838+02:00", "EventTime": "2023-10-30T13:59:02.384855+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrtTxB4o6a58rbJ40i"]} -{"Format": "IDEA0", "ID": "df50d39c-24e0-4e4b-9946-6b7cb8564ee1", "DetectTime": "2023-10-30T13:59:02.398393+02:00", "EventTime": "2023-10-30T13:59:02.398412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11036], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. ", "ContentType": "text/plain"}], "uids": ["CiI6K1LXdZlcEIfEa"]} -{"Format": "IDEA0", "ID": "634446d7-ae2e-42ca-a555-07c8b2a739d1", "DetectTime": "2023-10-30T13:59:02.435483+02:00", "EventTime": "2023-10-30T13:59:02.435507+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cehx2J21MHIbrKxJih"]} -{"Format": "IDEA0", "ID": "fd23f237-64cf-4932-8710-0a1d05f8bafd", "DetectTime": "2023-10-30T13:59:02.448801+02:00", "EventTime": "2023-10-30T13:59:02.448823+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvjnER2cSa9M8TXKme"]} -{"Format": "IDEA0", "ID": "286e6312-69f7-4812-9c76-2f2c120bd0af", "DetectTime": "2023-10-30T13:59:02.462062+02:00", "EventTime": "2023-10-30T13:59:02.462086+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHlwbl4dPe0A4pMbB3"]} -{"Format": "IDEA0", "ID": "7cacf66d-e8fd-4c19-927e-9eff3251b36e", "DetectTime": "2023-10-30T13:59:02.475235+02:00", "EventTime": "2023-10-30T13:59:02.475264+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9OB9z3f8FU9zKoUi8"]} -{"Format": "IDEA0", "ID": "09586b75-2cb9-469d-997c-eb49f962c9d0", "DetectTime": "2023-10-30T13:59:02.490572+02:00", "EventTime": "2023-10-30T13:59:02.490589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CeGEQG2T3hI79AoM1h"]} -{"Format": "IDEA0", "ID": "511ff5ac-ff24-437d-a68e-5085d60f3b2c", "DetectTime": "2023-10-30T13:59:02.522747+02:00", "EventTime": "2023-10-30T13:59:02.522772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6693], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6693/UDP destination IP 5.98.202.140. ", "ContentType": "text/plain"}], "uids": ["CebSam3oU3aXQEg9Xj"]} -{"Format": "IDEA0", "ID": "ff162d66-7a0c-42d9-a6f9-032e2dcd8013", "DetectTime": "2023-10-30T13:59:02.559379+02:00", "EventTime": "2023-10-30T13:59:02.559401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["C04Zwe3jfgIcYCZhNg"]} -{"Format": "IDEA0", "ID": "ff37b3ae-76cc-4733-b443-49880a54df31", "DetectTime": "2023-10-30T13:59:02.590362+02:00", "EventTime": "2023-10-30T13:59:02.590387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CCXEG41BPlCyyDTI8"]} -{"Format": "IDEA0", "ID": "71810403-0ec0-4eac-9be7-3b0c58e369f8", "DetectTime": "2023-10-30T13:59:02.622338+02:00", "EventTime": "2023-10-30T13:59:02.622366+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnVsrxAJURtzySe5e"]} -{"Format": "IDEA0", "ID": "74cf58bd-1729-4e8a-a2b7-7d2a00aabaa5", "DetectTime": "2023-10-30T13:59:02.635599+02:00", "EventTime": "2023-10-30T13:59:02.635619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["Cv4Ofx3cmkuTb8f7df"]} -{"Format": "IDEA0", "ID": "3a6d0899-45bd-4848-94a7-2476f321612d", "DetectTime": "2023-10-30T13:59:02.671654+02:00", "EventTime": "2023-10-30T13:59:02.671678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["CLdzpX1V7qkljAbWZi"]} -{"Format": "IDEA0", "ID": "93187b52-5736-456e-aa9d-94d0212f3086", "DetectTime": "2023-10-30T13:59:02.707055+02:00", "EventTime": "2023-10-30T13:59:02.707076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["C9Uo1u4NuLj6UzeSKf"]} -{"Format": "Json", "ID": "93187b52-5736-456e-aa9d-94d0212f3086", "DetectTime": "2023-10-30T13:59:02.707055+02:00", "EventTime": "2023-10-30T13:59:02.707076+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:39:03.809044+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:02.777903)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9e0f0c7f-f78e-42ed-9685-ba40b47ea55c", "DetectTime": "2023-10-30T13:59:02.784658+02:00", "EventTime": "2023-10-30T13:59:02.784678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. ", "ContentType": "text/plain"}], "uids": ["CcIj1WeozZmfVGU0c"]} -{"Format": "IDEA0", "ID": "31d5e498-8a63-4ed9-90e3-6055596906ee", "DetectTime": "2023-10-30T13:59:02.823792+02:00", "EventTime": "2023-10-30T13:59:02.823807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["C9Lf2v3NsnfgXN46Uc"]} -{"Format": "IDEA0", "ID": "8eb94a11-1491-4fa0-b025-be0ec7e65c0c", "DetectTime": "2023-10-30T13:59:02.860126+02:00", "EventTime": "2023-10-30T13:59:02.860147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["CPtkfk3cedEoxGQbWa"]} -{"Format": "IDEA0", "ID": "25e143ce-ed97-43af-95b2-9e1902606aee", "DetectTime": "2023-10-30T13:59:02.902531+02:00", "EventTime": "2023-10-30T13:59:02.902578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10223], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10223/UDP destination IP 178.88.57.242. ", "ContentType": "text/plain"}], "uids": ["CFgTXy40qXhrxPnOG4"]} -{"Format": "IDEA0", "ID": "f7752716-2fbe-4dfc-8438-546cb4bc3ea6", "DetectTime": "2023-10-30T13:59:02.936484+02:00", "EventTime": "2023-10-30T13:59:02.936510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["Cs7X9v1KYlOgqv572"]} -{"Format": "IDEA0", "ID": "3d647f51-8c61-4a0a-9503-178d10caf62e", "DetectTime": "2023-10-30T13:59:02.967344+02:00", "EventTime": "2023-10-30T13:59:02.967369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CeWMYfxThtgmYBEgf"]} -{"Format": "IDEA0", "ID": "4f001152-5177-497f-9bd2-58083e27312e", "DetectTime": "2023-10-30T13:59:02.999359+02:00", "EventTime": "2023-10-30T13:59:02.999376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CvjnER2cSa9M8TXKme", "C9OB9z3f8FU9zKoUi8", "CZd4lK39TBHSXj32B1", "CrtTxB4o6a58rbJ40i"]} -{"Format": "IDEA0", "ID": "0b2c5217-dfb6-4547-84ea-3d2aaca3fd78", "DetectTime": "2023-10-30T13:59:03.011570+02:00", "EventTime": "2023-10-30T13:59:03.011595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CO0ti93DvuX63EEZkf"]} -{"Format": "IDEA0", "ID": "895d5ab0-7763-44eb-a0d9-8751c6d9c3fe", "DetectTime": "2023-10-30T13:59:03.040451+02:00", "EventTime": "2023-10-30T13:59:03.040472+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZd4lK39TBHSXj32B1"]} -{"Format": "IDEA0", "ID": "0a9d76f9-feda-4280-b1e1-26f43e6ddac4", "DetectTime": "2023-10-30T13:59:03.054124+02:00", "EventTime": "2023-10-30T13:59:03.054138+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CevfK1IpuMLYjnjk4"]} -{"Format": "IDEA0", "ID": "7e0e412b-d212-4141-bcf5-69ee9b29377e", "DetectTime": "2023-10-30T13:59:03.066894+02:00", "EventTime": "2023-10-30T13:59:03.066912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["C7Mdg93QYwjmzYrxFc"]} -{"Format": "Json", "ID": "7e0e412b-d212-4141-bcf5-69ee9b29377e", "DetectTime": "2023-10-30T13:59:03.066894+02:00", "EventTime": "2023-10-30T13:59:03.066912+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T20:40:39.759028+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2023/10/30 13:59:03.126656)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f7c97136-15f3-474c-b597-70d808eb17c3", "DetectTime": "2023-10-30T13:59:03.133726+02:00", "EventTime": "2023-10-30T13:59:03.133754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CAN9lh205ZAjRwGcp3"]} -{"Format": "IDEA0", "ID": "142d2bae-ce10-441d-b3c6-75c98b7b04a9", "DetectTime": "2023-10-30T13:59:03.162399+02:00", "EventTime": "2023-10-30T13:59:03.162422+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWJNzF4sc6zdfldDX8"]} -{"Format": "IDEA0", "ID": "352b5704-a544-49a8-9859-cc15d4aba28b", "DetectTime": "2023-10-30T13:59:03.175259+02:00", "EventTime": "2023-10-30T13:59:03.175274+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCjnp5sTBvWcs6N4d"]} -{"Format": "IDEA0", "ID": "d3c54a85-b4fc-436b-8ee2-cbeaeffe7c04", "DetectTime": "2023-10-30T13:59:03.187980+02:00", "EventTime": "2023-10-30T13:59:03.187994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10348/UDP destination IP 95.156.161.47. ", "ContentType": "text/plain"}], "uids": ["C7IXQ32OCInpv8Owtk"]} -{"Format": "IDEA0", "ID": "29fc530d-60ce-4687-9287-182d28074585", "DetectTime": "2023-10-30T13:59:03.214804+02:00", "EventTime": "2023-10-30T13:59:03.214818+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSZh20487fF4omhPpl"]} -{"Format": "IDEA0", "ID": "bb535aec-6096-4675-8756-82380a5fc2ac", "DetectTime": "2023-10-30T13:59:03.226269+02:00", "EventTime": "2023-10-30T13:59:03.226283+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP7WPl3AJb44rNFE8i"]} -{"Format": "IDEA0", "ID": "02a653c2-e6e6-406c-a115-82f7cb427178", "DetectTime": "2023-10-30T13:59:03.239950+02:00", "EventTime": "2023-10-30T13:59:03.239974+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtkiIzFNJbQXgQ9Bh"]} -{"Format": "IDEA0", "ID": "f56dad86-527e-4def-8cf8-c9cc0e5c09b6", "DetectTime": "2023-10-30T13:59:03.253633+02:00", "EventTime": "2023-10-30T13:59:03.253653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C8lQIT3P7ZEuROiMc9"]} -{"Format": "IDEA0", "ID": "e6c6b39f-37f7-4a14-b381-eb9b15f99041", "DetectTime": "2023-10-30T13:59:03.323696+02:00", "EventTime": "2023-10-30T13:59:03.323713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CoXp854pvgOBNdkGT4"]} -{"Format": "IDEA0", "ID": "dcf10ccc-9ee8-46ba-835f-fcd0bb85bbcb", "DetectTime": "2023-10-30T13:59:03.391905+02:00", "EventTime": "2023-10-30T13:59:03.391923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CIMlJo5fqaEjwJkYd"]} -{"Format": "IDEA0", "ID": "dc72e600-e2f5-4fbd-bd81-17f2829adbdb", "DetectTime": "2023-10-30T13:59:03.469523+02:00", "EventTime": "2023-10-30T13:59:03.469541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["C13uDSKpDZrF6em5g"]} -{"Format": "IDEA0", "ID": "c567e295-0e72-4f06-b638-b85c618ccdc1", "DetectTime": "2023-10-30T13:59:03.542167+02:00", "EventTime": "2023-10-30T13:59:03.542184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["C1CxuoRMbIAuYB5Qc"]} -{"Format": "IDEA0", "ID": "088628c4-420a-4ad2-a1c8-ae705794545c", "DetectTime": "2023-10-30T13:59:03.607841+02:00", "EventTime": "2023-10-30T13:59:03.607857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CE6lvP2spDJJ4kZRo5"]} -{"Format": "Json", "ID": "088628c4-420a-4ad2-a1c8-ae705794545c", "DetectTime": "2023-10-30T13:59:03.607841+02:00", "EventTime": "2023-10-30T13:59:03.607857+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:12:28.977558+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:03.775588)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ba2b10ec-0f68-49ae-a43a-ea248c471c96", "DetectTime": "2023-10-30T13:59:03.782624+02:00", "EventTime": "2023-10-30T13:59:03.782672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CWrGvd1BoqogpG1C81"]} -{"Format": "IDEA0", "ID": "21d2c911-ca14-4eec-ac62-92c7f90c3946", "DetectTime": "2023-10-30T13:59:03.853595+02:00", "EventTime": "2023-10-30T13:59:03.853637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CHBhQT3foL1rVHnNyh"]} -{"Format": "IDEA0", "ID": "627a5c99-8673-45e2-8cdc-01728fb0353b", "DetectTime": "2023-10-30T13:59:03.920344+02:00", "EventTime": "2023-10-30T13:59:03.920366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C6TWG93lHHHZeqKBue"]} -{"Format": "IDEA0", "ID": "74a8d450-c642-4a70-bf97-79298ef323c8", "DetectTime": "2023-10-30T13:59:03.990224+02:00", "EventTime": "2023-10-30T13:59:03.990253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["CcSUzQ2ug1nEzPpd65"]} -{"Format": "IDEA0", "ID": "b148944b-f35b-4cee-8c3a-5460cf619119", "DetectTime": "2023-10-30T13:59:04.074682+02:00", "EventTime": "2023-10-30T13:59:04.074703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CKI8cu4O9PZmR2RYZ1"]} -{"Format": "IDEA0", "ID": "ac8b6582-0457-4419-9ed9-7a5dd7f48bf7", "DetectTime": "2023-10-30T13:59:04.279828+02:00", "EventTime": "2023-10-30T13:59:04.279857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Ct7XiD4V5gHsyWDDri"]} -{"Format": "IDEA0", "ID": "74915b5a-532a-4b8a-877d-50de54060c3f", "DetectTime": "2023-10-30T13:59:04.383636+02:00", "EventTime": "2023-10-30T13:59:04.383660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CdezdH2IbRjlyro7Il"]} -{"Format": "IDEA0", "ID": "b839d84f-a1fb-4e0b-b4df-62e6d3188b0a", "DetectTime": "2023-10-30T13:59:04.484395+02:00", "EventTime": "2023-10-30T13:59:04.484419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. ", "ContentType": "text/plain"}], "uids": ["C146u03DLsMalQYfNg"]} -{"Format": "Json", "ID": "b839d84f-a1fb-4e0b-b4df-62e6d3188b0a", "DetectTime": "2023-10-30T13:59:04.484395+02:00", "EventTime": "2023-10-30T13:59:04.484419+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:12:48.678010+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:04.636930)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5db624d8-6d6c-493c-905a-10f969f38c27", "DetectTime": "2023-10-30T13:59:04.650480+02:00", "EventTime": "2023-10-30T13:59:04.650501+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjJw304tC0SRZD11t8"]} -{"Format": "IDEA0", "ID": "2410f38e-3815-4a40-9f1b-905cd98b5bd7", "DetectTime": "2023-10-30T13:59:04.676252+02:00", "EventTime": "2023-10-30T13:59:04.676273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CJAjqU2cQ2sGFXt7q6"]} -{"Format": "IDEA0", "ID": "3e413e26-ce91-4924-8eea-e4d86ce17a7c", "DetectTime": "2023-10-30T13:59:04.773975+02:00", "EventTime": "2023-10-30T13:59:04.773998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CR2SGe2yXj3x9E2FLh"]} -{"Format": "IDEA0", "ID": "2462a3fa-0453-4bb7-a160-f36ed2c8dd49", "DetectTime": "2023-10-30T13:59:04.870478+02:00", "EventTime": "2023-10-30T13:59:04.870505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCdyJX3BHAXLmwbrij", "CWJNzF4sc6zdfldDX8", "CSZh20487fF4omhPpl", "CtkiIzFNJbQXgQ9Bh"]} -{"Format": "IDEA0", "ID": "9d4b8335-64f8-4c7a-8b3a-90cf8d198c73", "DetectTime": "2023-10-30T13:59:04.889423+02:00", "EventTime": "2023-10-30T13:59:04.889441+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCdyJX3BHAXLmwbrij"]} -{"Format": "IDEA0", "ID": "4ebe8afc-ba99-49aa-a29e-9710905551fa", "DetectTime": "2023-10-30T13:59:04.905427+02:00", "EventTime": "2023-10-30T13:59:04.905442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1868], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. ", "ContentType": "text/plain"}], "uids": ["CFHcPn3f3CF55dRLke"]} -{"Format": "IDEA0", "ID": "05d6ff42-490c-434c-a342-de343ba0244c", "DetectTime": "2023-10-30T13:59:05.020090+02:00", "EventTime": "2023-10-30T13:59:05.020119+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGSgo940LFNEZV0wC3"]} -{"Format": "IDEA0", "ID": "670b286a-9ee8-468a-a6c9-afa38544d4df", "DetectTime": "2023-10-30T13:59:05.043527+02:00", "EventTime": "2023-10-30T13:59:05.043550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CH7iCI1KGskkqbfJb5"]} -{"Format": "IDEA0", "ID": "444136f3-739c-41c3-afa6-6b726df25836", "DetectTime": "2023-10-30T13:59:05.140242+02:00", "EventTime": "2023-10-30T13:59:05.140260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["Cdkxf10AoEAgpfiF3"]} -{"Format": "IDEA0", "ID": "84e75017-00cf-46f5-89e5-67c72d2e500f", "DetectTime": "2023-10-30T13:59:05.247593+02:00", "EventTime": "2023-10-30T13:59:05.247619+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFiEVK3rhAQQDpaty1"]} -{"Format": "IDEA0", "ID": "465f80ab-4aeb-4b4f-86fe-3d194a757c23", "DetectTime": "2023-10-30T13:59:05.263312+02:00", "EventTime": "2023-10-30T13:59:05.263338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. ", "ContentType": "text/plain"}], "uids": ["CgWDR9ULTL5KJFrUe"]} -{"Format": "IDEA0", "ID": "e834d627-466f-455b-97e2-2a4c80cd9893", "DetectTime": "2023-10-30T13:59:05.369599+02:00", "EventTime": "2023-10-30T13:59:05.369614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CZEHgH239QaxyLIlvi"]} -{"Format": "IDEA0", "ID": "56c1bca0-22b9-4fc4-a5f1-cca54f4cd4d2", "DetectTime": "2023-10-30T13:59:05.486511+02:00", "EventTime": "2023-10-30T13:59:05.486528+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CESeBtZ5Hv8xjKVri"]} -{"Format": "IDEA0", "ID": "b419775b-dd57-4a5f-8021-4bf3f8be3e9f", "DetectTime": "2023-10-30T13:59:05.507624+02:00", "EventTime": "2023-10-30T13:59:05.507651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["C8svQN1x23BiFFwmIc"]} -{"Format": "Json", "ID": "b419775b-dd57-4a5f-8021-4bf3f8be3e9f", "DetectTime": "2023-10-30T13:59:05.507624+02:00", "EventTime": "2023-10-30T13:59:05.507651+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:13:27.921551+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:05.644610)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "60365d94-d520-4deb-b917-b530fae9d79f", "DetectTime": "2023-10-30T13:59:05.653388+02:00", "EventTime": "2023-10-30T13:59:05.653406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. ", "ContentType": "text/plain"}], "uids": ["CKxFyB2QpiyQL069ti"]} -{"Format": "IDEA0", "ID": "bf59137d-778d-468f-b8ca-1c2880edf1e9", "DetectTime": "2023-10-30T13:59:05.768032+02:00", "EventTime": "2023-10-30T13:59:05.768060+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChHCmL1RuVwr12gsW7"]} -{"Format": "IDEA0", "ID": "e11735ee-7a20-4d75-9a9b-c8f7068f1e83", "DetectTime": "2023-10-30T13:59:05.782947+02:00", "EventTime": "2023-10-30T13:59:05.782972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["ChlUX71H0MtXovnjB9"]} -{"Format": "IDEA0", "ID": "96dfc92c-bc0b-4189-9281-d189392c134b", "DetectTime": "2023-10-30T13:59:05.866986+02:00", "EventTime": "2023-10-30T13:59:05.867007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["CcOJJytkrjrrQsZg1"]} -{"Format": "IDEA0", "ID": "89ca1c5d-2c70-44ec-8672-26b404598892", "DetectTime": "2023-10-30T13:59:05.953944+02:00", "EventTime": "2023-10-30T13:59:05.953966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CrwYqM3V00KtgL0K55"]} -{"Format": "IDEA0", "ID": "37a433af-c356-4160-a7ee-0bf1dd494772", "DetectTime": "2023-10-30T13:59:06.040887+02:00", "EventTime": "2023-10-30T13:59:06.040909+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyOMtA1IarjWawgWDk"]} -{"Format": "IDEA0", "ID": "9ab92cb0-63e3-42f9-b77e-c170321afb7f", "DetectTime": "2023-10-30T13:59:06.059815+02:00", "EventTime": "2023-10-30T13:59:06.059836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CgFcG12VrZt6Rp7zb"]} -{"Format": "IDEA0", "ID": "a809e28e-e366-4c0f-9dd2-458f1eb9fefc", "DetectTime": "2023-10-30T13:59:06.153105+02:00", "EventTime": "2023-10-30T13:59:06.153133+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiZKVE3P7HA3C2dLOk"]} -{"Format": "IDEA0", "ID": "6fcfc007-ba9b-4aee-9abd-dec1626911d0", "DetectTime": "2023-10-30T13:59:06.171325+02:00", "EventTime": "2023-10-30T13:59:06.171345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CRMuyz2K4oCEzxPlP8"]} -{"Format": "IDEA0", "ID": "b17a427e-dfd5-4b05-a6fe-47bd63f62efe", "DetectTime": "2023-10-30T13:59:06.255022+02:00", "EventTime": "2023-10-30T13:59:06.255046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CaZXKOxJRnQfnSzS3"]} -{"Format": "IDEA0", "ID": "65edddc5-7ad6-434a-8b64-fae1717e404a", "DetectTime": "2023-10-30T13:59:06.333015+02:00", "EventTime": "2023-10-30T13:59:06.333038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11036], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. ", "ContentType": "text/plain"}], "uids": ["CIrfrU2m3mNNBcU1Bc"]} -{"Format": "Json", "ID": "65edddc5-7ad6-434a-8b64-fae1717e404a", "DetectTime": "2023-10-30T13:59:06.333015+02:00", "EventTime": "2023-10-30T13:59:06.333038+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11036], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:14:03.068136+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:06.473673)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "14e0beca-bb34-4a3c-bfad-1ba487f75587", "DetectTime": "2023-10-30T13:59:06.482266+02:00", "EventTime": "2023-10-30T13:59:06.482293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CZcQUC1j0rf303FgQf"]} -{"Format": "IDEA0", "ID": "3b23462c-fc06-4a47-8d4b-c814595cbc85", "DetectTime": "2023-10-30T13:59:06.565189+02:00", "EventTime": "2023-10-30T13:59:06.565217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CGwVmh3Ob56gF0iaA3"]} -{"Format": "IDEA0", "ID": "b92bcf67-d381-4eff-ae98-26b7baa37d87", "DetectTime": "2023-10-30T13:59:06.647599+02:00", "EventTime": "2023-10-30T13:59:06.647622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["CD7biP1v5TXb0Vqo25"]} -{"Format": "IDEA0", "ID": "5d644a29-fd9a-4ddb-94c8-aeb41988e471", "DetectTime": "2023-10-30T13:59:06.717415+02:00", "EventTime": "2023-10-30T13:59:06.717431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["Cq8cVVoRpcGC5aei4"]} -{"Format": "IDEA0", "ID": "09aa54a9-2b0f-4cd2-9435-479864173440", "DetectTime": "2023-10-30T13:59:06.781103+02:00", "EventTime": "2023-10-30T13:59:06.781128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CKyhwz4DRAnpOwJNhg"]} -{"Format": "IDEA0", "ID": "c70e6624-1d72-4c09-972e-66c53a199d7e", "DetectTime": "2023-10-30T13:59:06.842944+02:00", "EventTime": "2023-10-30T13:59:06.842966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. ", "ContentType": "text/plain"}], "uids": ["C0kPxZ1rOhZzIehrz2"]} -{"Format": "IDEA0", "ID": "b210ff31-225b-46c3-9d7b-027942de16be", "DetectTime": "2023-10-30T13:59:06.906423+02:00", "EventTime": "2023-10-30T13:59:06.906513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CJU7xg10h0DM4nMrE7"]} -{"Format": "IDEA0", "ID": "33d0870c-3cd9-46c2-bd3e-d4a19afba6ad", "DetectTime": "2023-10-30T13:59:06.972682+02:00", "EventTime": "2023-10-30T13:59:06.972697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["C5NOJf3z6WgD3qzdyl"]} -{"Format": "Json", "ID": "33d0870c-3cd9-46c2-bd3e-d4a19afba6ad", "DetectTime": "2023-10-30T13:59:06.972682+02:00", "EventTime": "2023-10-30T13:59:06.972697+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:14:22.926504+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:07.070962)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2b3a0f41-9032-4956-96be-fed1c2f9c7c6", "DetectTime": "2023-10-30T13:59:07.078472+02:00", "EventTime": "2023-10-30T13:59:07.078491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10223], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10223/UDP destination IP 178.88.57.242. ", "ContentType": "text/plain"}], "uids": ["C4GgEOK0BkvIr2KL1"]} -{"Format": "IDEA0", "ID": "05245598-1908-4714-94a3-74ae482f0d11", "DetectTime": "2023-10-30T13:59:07.275503+02:00", "EventTime": "2023-10-30T13:59:07.275529+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCDyxO3YVT4VXmIfr6"]} -{"Format": "IDEA0", "ID": "e323cf0b-0ed4-4399-a06e-edeb4c2a5ed5", "DetectTime": "2023-10-30T13:59:07.292365+02:00", "EventTime": "2023-10-30T13:59:07.292382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CTbMPG2druk4hlnQ2h"]} -{"Format": "IDEA0", "ID": "39e1d3d8-6910-4778-a231-8b3be818c7cc", "DetectTime": "2023-10-30T13:59:07.361419+02:00", "EventTime": "2023-10-30T13:59:07.361440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CCDZqq2dA5qYSTXmZ7"]} -{"Format": "IDEA0", "ID": "8aa48590-282a-4f9a-96e5-83ed2b168d2a", "DetectTime": "2023-10-30T13:59:07.427814+02:00", "EventTime": "2023-10-30T13:59:07.427835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CZEmbE3tXX7zlz3TC4"]} -{"Format": "IDEA0", "ID": "a48c1408-cdb0-4183-9845-23a61d89201f", "DetectTime": "2023-10-30T13:59:07.499216+02:00", "EventTime": "2023-10-30T13:59:07.499321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CdgI5LGoT8fOkwcI6"]} -{"Format": "IDEA0", "ID": "c039f0c9-e33a-4627-8838-390edd261687", "DetectTime": "2023-10-30T13:59:07.568822+02:00", "EventTime": "2023-10-30T13:59:07.568843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZLQCV2xQIuJZyBXU5"]} -{"Format": "IDEA0", "ID": "8f1890ac-68d6-41c0-b444-1ce97c1484ba", "DetectTime": "2023-10-30T13:59:07.635916+02:00", "EventTime": "2023-10-30T13:59:07.635933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CFiEVK3rhAQQDpaty1", "ChHCmL1RuVwr12gsW7", "CfmuGv4nPCCSPcISK6", "CiZKVE3P7HA3C2dLOk"]} -{"Format": "IDEA0", "ID": "e4ea015b-d36b-443e-9df9-616db473be35", "DetectTime": "2023-10-30T13:59:07.646670+02:00", "EventTime": "2023-10-30T13:59:07.646694+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfmuGv4nPCCSPcISK6"]} -{"Format": "IDEA0", "ID": "921e867f-1c5a-456d-acac-f3d70789bb7d", "DetectTime": "2023-10-30T13:59:07.657228+02:00", "EventTime": "2023-10-30T13:59:07.657247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5281], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5281/UDP destination IP 68.162.252.216. ", "ContentType": "text/plain"}], "uids": ["C64r461Mxy1QiYD3i2"]} -{"Format": "IDEA0", "ID": "b1b167cf-03a6-48c0-a92c-a34d34647433", "DetectTime": "2023-10-30T13:59:07.725341+02:00", "EventTime": "2023-10-30T13:59:07.725358+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cmrmg22m3Eu4fHewVl"]} -{"Format": "IDEA0", "ID": "7adc4e79-dac0-439e-89a1-114b7109406b", "DetectTime": "2023-10-30T13:59:07.738685+02:00", "EventTime": "2023-10-30T13:59:07.738701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["Ce6pWn1Dc8MjRAwQVa"]} -{"Format": "Json", "ID": "7adc4e79-dac0-439e-89a1-114b7109406b", "DetectTime": "2023-10-30T13:59:07.738685+02:00", "EventTime": "2023-10-30T13:59:07.738701+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:46:46.047833+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:07.841705)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7d5ccdcf-16e7-4606-a00b-e36e0142ee64", "DetectTime": "2023-10-30T13:59:07.849994+02:00", "EventTime": "2023-10-30T13:59:07.850013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CIjQ2424vh2vnIjLN2"]} -{"Format": "IDEA0", "ID": "6fd085ac-b9c4-43f1-8dc5-19b412967091", "DetectTime": "2023-10-30T13:59:07.917481+02:00", "EventTime": "2023-10-30T13:59:07.917503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CXTOYz2nJjo5AKTMDk"]} -{"Format": "IDEA0", "ID": "78ca4bcf-9e91-482a-82be-8ae18e6b54dd", "DetectTime": "2023-10-30T13:59:07.991111+02:00", "EventTime": "2023-10-30T13:59:07.991210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["C5ZYtS1MIigKOahyV7"]} -{"Format": "IDEA0", "ID": "885653ab-9173-4cb6-a334-2d597d093c4e", "DetectTime": "2023-10-30T13:59:08.054838+02:00", "EventTime": "2023-10-30T13:59:08.054869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CC1ULp1WP1Kx3q676d"]} -{"Format": "IDEA0", "ID": "eacb49bb-fd30-45bc-8d76-ae914b8d6000", "DetectTime": "2023-10-30T13:59:08.090608+02:00", "EventTime": "2023-10-30T13:59:08.090840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CjpbtD4XAFp1zMZW36"]} -{"Format": "IDEA0", "ID": "3ac45a0f-9636-4071-b9d0-e65f115a1aee", "DetectTime": "2023-10-30T13:59:08.156431+02:00", "EventTime": "2023-10-30T13:59:08.156457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CNId9140X4C8CBr7K3"]} -{"Format": "IDEA0", "ID": "872ed9ea-5907-4833-af7d-c28b561591a0", "DetectTime": "2023-10-30T13:59:08.225844+02:00", "EventTime": "2023-10-30T13:59:08.225863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. ", "ContentType": "text/plain"}], "uids": ["CIgtkuD2r8dGYXiuc"]} -{"Format": "IDEA0", "ID": "d6c16111-3750-472c-8a2f-8cb167dc9a9c", "DetectTime": "2023-10-30T13:59:08.294507+02:00", "EventTime": "2023-10-30T13:59:08.294529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["Cn18hJ3ru5459pw5md"]} -{"Format": "IDEA0", "ID": "50ae6d7d-304a-4f85-8486-1ac40066f9fb", "DetectTime": "2023-10-30T13:59:08.362362+02:00", "EventTime": "2023-10-30T13:59:08.362385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CtI7Nw69G4KW9gAAh"]} -{"Format": "Json", "ID": "50ae6d7d-304a-4f85-8486-1ac40066f9fb", "DetectTime": "2023-10-30T13:59:08.362362+02:00", "EventTime": "2023-10-30T13:59:08.362385+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:47:05.509529+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:08.467211)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ccb56832-745e-4f83-a5cd-25e296cbe1e8", "DetectTime": "2023-10-30T13:59:08.473704+02:00", "EventTime": "2023-10-30T13:59:08.473721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["Cg8sAC4kzCZJsVWASf"]} -{"Format": "IDEA0", "ID": "62955ba0-7ad8-41e6-b0e2-47a882913dcb", "DetectTime": "2023-10-30T13:59:08.544522+02:00", "EventTime": "2023-10-30T13:59:08.544540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CRMKk24cWwLMrcQHZi"]} -{"Format": "IDEA0", "ID": "9eaea103-1a22-4319-942a-b43d37450bb4", "DetectTime": "2023-10-30T13:59:08.608951+02:00", "EventTime": "2023-10-30T13:59:08.608973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CCpmAn4YzHUrk6Ca7i"]} -{"Format": "IDEA0", "ID": "7b28f1e6-42d2-4bf1-b517-8871e5a6d806", "DetectTime": "2023-10-30T13:59:08.672559+02:00", "EventTime": "2023-10-30T13:59:08.672582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CKqGqj3LYWkEwZS7od"]} -{"Format": "IDEA0", "ID": "b8855e5c-4bc9-4101-a464-b83a7c6b7668", "DetectTime": "2023-10-30T13:59:08.737584+02:00", "EventTime": "2023-10-30T13:59:08.737613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["Cw21Ik4wT42HwWcXjk"]} -{"Format": "IDEA0", "ID": "fd7b847d-79f2-4efe-83df-fe7ecb92ca65", "DetectTime": "2023-10-30T13:59:08.808652+02:00", "EventTime": "2023-10-30T13:59:08.808806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. ", "ContentType": "text/plain"}], "uids": ["CYqKJr40q0fTQtvQQi"]} -{"Format": "IDEA0", "ID": "7b6fea52-5046-4884-907f-6c6961ad8788", "DetectTime": "2023-10-30T13:59:08.872939+02:00", "EventTime": "2023-10-30T13:59:08.872960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CGsd6p1hmmmefe28Jc"]} -{"Format": "IDEA0", "ID": "0c9b85d6-ee01-47a3-aae8-3e9303cadaec", "DetectTime": "2023-10-30T13:59:08.941879+02:00", "EventTime": "2023-10-30T13:59:08.941896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["Cqfb3U35XtLXIcl8ug"]} -{"Format": "Json", "ID": "0c9b85d6-ee01-47a3-aae8-3e9303cadaec", "DetectTime": "2023-10-30T13:59:08.941879+02:00", "EventTime": "2023-10-30T13:59:08.941896+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:47:07.318509+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:09.038882)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3744c150-7782-438a-aeb2-744c9726977d", "DetectTime": "2023-10-30T13:59:09.048137+02:00", "EventTime": "2023-10-30T13:59:09.048213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CccVJl16CxwbHQKuO8"]} -{"Format": "IDEA0", "ID": "53647459-f26f-4e54-a169-d9d8fe06ace5", "DetectTime": "2023-10-30T13:59:09.113388+02:00", "EventTime": "2023-10-30T13:59:09.113412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["CsIhhl1kGXpUjia52l"]} -{"Format": "IDEA0", "ID": "50910b59-40c8-48fe-b8e6-fe74402a339d", "DetectTime": "2023-10-30T13:59:09.162116+02:00", "EventTime": "2023-10-30T13:59:09.162138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1868], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. ", "ContentType": "text/plain"}], "uids": ["CCU06SdEI007FIkt1"]} -{"Format": "IDEA0", "ID": "0f46f1a1-c3fc-4c1d-a709-d7c6028e8dbc", "DetectTime": "2023-10-30T13:59:09.221322+02:00", "EventTime": "2023-10-30T13:59:09.221338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["CAcvyj3GmAKffXJSz6"]} -{"Format": "IDEA0", "ID": "7e820849-49f5-4037-ac49-19781298e3f4", "DetectTime": "2023-10-30T13:59:09.268898+02:00", "EventTime": "2023-10-30T13:59:09.268920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["C6bRH0185zwudEglDj"]} -{"Format": "IDEA0", "ID": "0d451114-eaa6-4398-9d47-49b9e3d0b301", "DetectTime": "2023-10-30T13:59:09.323158+02:00", "EventTime": "2023-10-30T13:59:09.323177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["Cz7UR32JZeC3EfdbJ3"]} -{"Format": "IDEA0", "ID": "629e42b7-d467-4052-b73e-42f56e7db5df", "DetectTime": "2023-10-30T13:59:09.373862+02:00", "EventTime": "2023-10-30T13:59:09.373891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. ", "ContentType": "text/plain"}], "uids": ["CGE5Sp48FMzqortCif"]} -{"Format": "IDEA0", "ID": "7b12a921-cf25-4402-96c9-469edb6098e9", "DetectTime": "2023-10-30T13:59:09.423394+02:00", "EventTime": "2023-10-30T13:59:09.423416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["CC2xvJ32nclLOC3m2h"]} -{"Format": "IDEA0", "ID": "092a1cb5-1ebf-4fb9-a35c-c2240e539313", "DetectTime": "2023-10-30T13:59:09.473134+02:00", "EventTime": "2023-10-30T13:59:09.473160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. ", "ContentType": "text/plain"}], "uids": ["CrkerL1NntvmQFEdN9"]} -{"Format": "Json", "ID": "092a1cb5-1ebf-4fb9-a35c-c2240e539313", "DetectTime": "2023-10-30T13:59:09.473134+02:00", "EventTime": "2023-10-30T13:59:09.473160+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:47:08.886555+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:09.563068)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "60de7ae0-4077-423b-9d80-5810d7029050", "DetectTime": "2023-10-30T13:59:09.570845+02:00", "EventTime": "2023-10-30T13:59:09.570864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CfkCwl2KviDaUU5rm4"]} -{"Format": "IDEA0", "ID": "36b11162-dc97-40b4-817d-982b66e43a18", "DetectTime": "2023-10-30T13:59:09.624033+02:00", "EventTime": "2023-10-30T13:59:09.624061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CLmiKZ1ETSy22titDj"]} -{"Format": "IDEA0", "ID": "7c7382d6-6936-4eba-8365-9fa72450406a", "DetectTime": "2023-10-30T13:59:09.669807+02:00", "EventTime": "2023-10-30T13:59:09.669834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11036], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. ", "ContentType": "text/plain"}], "uids": ["CwGiYL36vIykfxlXIb"]} -{"Format": "IDEA0", "ID": "45139139-70bd-4ab4-a909-490c7e741eb6", "DetectTime": "2023-10-30T13:59:09.717571+02:00", "EventTime": "2023-10-30T13:59:09.717583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CASwq44gSj0DeoRZl9"]} -{"Format": "IDEA0", "ID": "31b0c6a9-f00f-405b-ba32-dec6797a1717", "DetectTime": "2023-10-30T13:59:09.772678+02:00", "EventTime": "2023-10-30T13:59:09.772703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["C0I5HM3dcTnWwvmtjj"]} -{"Format": "IDEA0", "ID": "b2c25e8b-1df2-4892-bd91-d6f08eb1892c", "DetectTime": "2023-10-30T13:59:09.823947+02:00", "EventTime": "2023-10-30T13:59:09.823963+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcXCpG3Ibs6uEE5vhc"]} -{"Format": "IDEA0", "ID": "a5d28f4a-a996-49d2-a2bb-36ebefa42144", "DetectTime": "2023-10-30T13:59:09.839850+02:00", "EventTime": "2023-10-30T13:59:09.839874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["CxKHXi1iJw28E6AR1"]} -{"Format": "IDEA0", "ID": "6e05cf27-9e4d-4430-8654-c2f0f18ebf7b", "DetectTime": "2023-10-30T13:59:09.894588+02:00", "EventTime": "2023-10-30T13:59:09.894932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["Cd4CLI30jVRl7M3B2g"]} -{"Format": "IDEA0", "ID": "d652b8e6-33b5-4d9f-9a68-4f16702b9ef3", "DetectTime": "2023-10-30T13:59:09.960787+02:00", "EventTime": "2023-10-30T13:59:09.960807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["Cj4G6a3JVRcmg7DOuk"]} -{"Format": "Json", "ID": "d652b8e6-33b5-4d9f-9a68-4f16702b9ef3", "DetectTime": "2023-10-30T13:59:09.960787+02:00", "EventTime": "2023-10-30T13:59:09.960807+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T21:47:45.909473+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2023/10/30 13:59:10.077367)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dd497b9c-bbc0-4c88-9590-dbe39cc0e226", "DetectTime": "2023-10-30T13:59:10.084931+02:00", "EventTime": "2023-10-30T13:59:10.084960+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPF9S32JRc2AYqVXGj"]} -{"Format": "IDEA0", "ID": "1e3ffbf1-8b40-4fbf-9fc0-e7928e506844", "DetectTime": "2023-10-30T13:59:10.102337+02:00", "EventTime": "2023-10-30T13:59:10.102356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CI1NqX1Cby0m7HtcBl"]} -{"Format": "IDEA0", "ID": "dd430eb7-6782-46ff-9d4d-054b0f531efd", "DetectTime": "2023-10-30T13:59:10.153737+02:00", "EventTime": "2023-10-30T13:59:10.153762+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CETGo2Qq86OXOsFj5"]} -{"Format": "IDEA0", "ID": "69186f87-96df-40c6-b202-6b3f783ae43a", "DetectTime": "2023-10-30T13:59:10.177100+02:00", "EventTime": "2023-10-30T13:59:10.177128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["Cp23e02TAujzbrXeG4"]} -{"Format": "IDEA0", "ID": "4bd65a0c-064d-45b5-a540-9019df29df1a", "DetectTime": "2023-10-30T13:59:10.230765+02:00", "EventTime": "2023-10-30T13:59:10.230852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["CxoWOA316wkCjjIbFg"]} -{"Format": "IDEA0", "ID": "077178d7-6c67-4df3-af7b-2243c291c0c1", "DetectTime": "2023-10-30T13:59:10.276075+02:00", "EventTime": "2023-10-30T13:59:10.276093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. ", "ContentType": "text/plain"}], "uids": ["CNYw4W1W6pIc0RHb7l"]} -{"Format": "IDEA0", "ID": "aff70120-034e-47c5-bbef-83d530fbf553", "DetectTime": "2023-10-30T13:59:10.322976+02:00", "EventTime": "2023-10-30T13:59:10.322992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CPdubt3GN1D22L915f"]} -{"Format": "IDEA0", "ID": "24b2f0f6-2f42-44f3-86a6-082edddc2d3e", "DetectTime": "2023-10-30T13:59:10.366016+02:00", "EventTime": "2023-10-30T13:59:10.366068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoPRR14fqm361ES7F1"]} -{"Format": "IDEA0", "ID": "72b760f9-2f1d-421b-aa74-a536231ded0b", "DetectTime": "2023-10-30T13:59:10.381407+02:00", "EventTime": "2023-10-30T13:59:10.381425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["Cs7V4FTtjCdmDzLMh"]} -{"Format": "IDEA0", "ID": "aa99e490-7439-4c0c-8de9-0c14a9cf93bd", "DetectTime": "2023-10-30T13:59:10.429140+02:00", "EventTime": "2023-10-30T13:59:10.429163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChlqYl2qWuN1u3Z0Bb"]} -{"Format": "IDEA0", "ID": "a8824f0e-bdb4-4433-b270-4ef532a5b319", "DetectTime": "2023-10-30T13:59:10.446827+02:00", "EventTime": "2023-10-30T13:59:10.446848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CxcgXx3Ajgjn7vB4ga"]} -{"Format": "IDEA0", "ID": "8036b251-8fc9-4370-88ca-97ea2a2a3204", "DetectTime": "2023-10-30T13:59:10.499764+02:00", "EventTime": "2023-10-30T13:59:10.499792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5Cx9T3N9oDLH9iRf4"]} -{"Format": "IDEA0", "ID": "dfaf60f3-37d2-422e-85d9-7b6f8347203e", "DetectTime": "2023-10-30T13:59:10.558674+02:00", "EventTime": "2023-10-30T13:59:10.558702+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKipsJ1yTXSaMZaol7"]} -{"Format": "IDEA0", "ID": "e1d7e759-ab19-4a83-887c-0a68272f9c64", "DetectTime": "2023-10-30T13:59:10.575199+02:00", "EventTime": "2023-10-30T13:59:10.575221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CBYK0k3dBBWYuUo4W1"]} -{"Format": "IDEA0", "ID": "884fa2f0-9623-404f-839f-40428fa4aa25", "DetectTime": "2023-10-30T13:59:10.626660+02:00", "EventTime": "2023-10-30T13:59:10.626681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CETGo2Qq86OXOsFj5", "CFJjw047z1SuuNgVw8", "CcXCpG3Ibs6uEE5vhc", "ChlqYl2qWuN1u3Z0Bb"]} -{"Format": "IDEA0", "ID": "9a58d80f-09e9-48fd-94c7-02125a0cfa8c", "DetectTime": "2023-10-30T13:59:10.644920+02:00", "EventTime": "2023-10-30T13:59:10.644939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["C3KZZm3pIWoJP4C3f3"]} -{"Format": "IDEA0", "ID": "6e8cc4b8-583e-4c7b-a2fd-5ed9a2ea6c7f", "DetectTime": "2023-10-30T13:59:10.700016+02:00", "EventTime": "2023-10-30T13:59:10.700046+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFJjw047z1SuuNgVw8"]} -{"Format": "IDEA0", "ID": "1484627a-95d1-4b82-91ec-f73a068f04f9", "DetectTime": "2023-10-30T13:59:10.717687+02:00", "EventTime": "2023-10-30T13:59:10.717707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CveFdD1k6vEcjCAeLk"]} -{"Format": "IDEA0", "ID": "91fd8ffa-711e-4822-b0ca-41adf071716a", "DetectTime": "2023-10-30T13:59:10.763402+02:00", "EventTime": "2023-10-30T13:59:10.763426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C6KzVw3gYBt3N5KcL6"]} -{"Format": "IDEA0", "ID": "d7a434a1-0588-4300-804d-6d078cd9ee7d", "DetectTime": "2023-10-30T13:59:10.839040+02:00", "EventTime": "2023-10-30T13:59:10.839058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CnfQwn5RKBAuY3yI"]} -{"Format": "IDEA0", "ID": "3556d9ce-5536-43a7-9cce-41b8aa57c2c6", "DetectTime": "2023-10-30T13:59:10.884471+02:00", "EventTime": "2023-10-30T13:59:10.884500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CJi8ma3ixxNGH1nDui"]} -{"Format": "Json", "ID": "3556d9ce-5536-43a7-9cce-41b8aa57c2c6", "DetectTime": "2023-10-30T13:59:10.884471+02:00", "EventTime": "2023-10-30T13:59:10.884500+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:19:18.291891+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:10.994127)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1d4f60c2-7334-400c-b87a-7b050b72dfd1", "DetectTime": "2023-10-30T13:59:11.001303+02:00", "EventTime": "2023-10-30T13:59:11.001361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CESj7o17HYI8SA9cce"]} -{"Format": "IDEA0", "ID": "168836d7-3a1f-4148-98c6-d0869912115b", "DetectTime": "2023-10-30T13:59:11.049414+02:00", "EventTime": "2023-10-30T13:59:11.049436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["C8ReuD2BiRzNOtMusi"]} -{"Format": "IDEA0", "ID": "da5d76cf-ecf6-49e8-9d55-3de18bec8eb0", "DetectTime": "2023-10-30T13:59:11.098401+02:00", "EventTime": "2023-10-30T13:59:11.098426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CEgqwF2fSGrYINe7nj"]} -{"Format": "IDEA0", "ID": "aa3942a7-d969-40d3-bacc-487e849da0d0", "DetectTime": "2023-10-30T13:59:11.149882+02:00", "EventTime": "2023-10-30T13:59:11.149908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CtGgo94zigXReaBv1h"]} -{"Format": "IDEA0", "ID": "0fbee834-4c71-4bd1-9243-44b20c4cceed", "DetectTime": "2023-10-30T13:59:11.194535+02:00", "EventTime": "2023-10-30T13:59:11.194555+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cq5o8n3pkXI3yrrhMa"]} -{"Format": "IDEA0", "ID": "745549eb-a9ed-4c3d-8c82-f07445ba034d", "DetectTime": "2023-10-30T13:59:11.210965+02:00", "EventTime": "2023-10-30T13:59:11.211026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. ", "ContentType": "text/plain"}], "uids": ["CPNa1m4sbd1n1QHkka"]} -{"Format": "IDEA0", "ID": "4000eb4a-7f76-45a2-b890-4ce88a5e0611", "DetectTime": "2023-10-30T13:59:11.250452+02:00", "EventTime": "2023-10-30T13:59:11.250467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["ClTpmmoAgPDzXrHG1"]} -{"Format": "IDEA0", "ID": "a0a39a9e-367b-4855-adce-befe4591ddef", "DetectTime": "2023-10-30T13:59:11.296991+02:00", "EventTime": "2023-10-30T13:59:11.297017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CWHpIh1kFhcww6DJng"]} -{"Format": "IDEA0", "ID": "951fbf9a-dcab-457e-a3b7-b6519e92ccb7", "DetectTime": "2023-10-30T13:59:11.342487+02:00", "EventTime": "2023-10-30T13:59:11.342519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CpSI3J1AtsNSC3vyu6"]} -{"Format": "Json", "ID": "951fbf9a-dcab-457e-a3b7-b6519e92ccb7", "DetectTime": "2023-10-30T13:59:11.342487+02:00", "EventTime": "2023-10-30T13:59:11.342519+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:19:19.623991+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:11.417637)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "33edf035-95bb-4d00-a638-53ba824230ed", "DetectTime": "2023-10-30T13:59:11.424453+02:00", "EventTime": "2023-10-30T13:59:11.424476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CUzr1BKYVJTNMBmFg"]} -{"Format": "IDEA0", "ID": "66deb132-8152-4a9a-bb75-57a93090ddcf", "DetectTime": "2023-10-30T13:59:11.464758+02:00", "EventTime": "2023-10-30T13:59:11.464783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["COb4GR1l4yar4dFyyi"]} -{"Format": "IDEA0", "ID": "b524a367-d2a1-439a-b8d2-675adc15b03c", "DetectTime": "2023-10-30T13:59:11.502337+02:00", "EventTime": "2023-10-30T13:59:11.502360+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLHZho4BxCZPNqUJ7g"]} -{"Format": "IDEA0", "ID": "4ea11c15-9842-4133-8522-72c39c781369", "DetectTime": "2023-10-30T13:59:11.524661+02:00", "EventTime": "2023-10-30T13:59:11.524681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. ", "ContentType": "text/plain"}], "uids": ["CafP7YE9QjaIgqcMi"]} -{"Format": "IDEA0", "ID": "e549f8f9-85c8-443d-a065-7e713b51f731", "DetectTime": "2023-10-30T13:59:11.566976+02:00", "EventTime": "2023-10-30T13:59:11.566998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CYkG3V2Mho1TBvQpW"]} -{"Format": "IDEA0", "ID": "70da8fff-02cd-4cc1-90be-7726f4f645c5", "DetectTime": "2023-10-30T13:59:11.603038+02:00", "EventTime": "2023-10-30T13:59:11.603063+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqCncma0ozdvxyvw5"]} -{"Format": "IDEA0", "ID": "8b3d822e-148c-4a64-a6f7-f022bd443de4", "DetectTime": "2023-10-30T13:59:11.620120+02:00", "EventTime": "2023-10-30T13:59:11.620142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["CnGS0D1977dp7rCRWi"]} -{"Format": "IDEA0", "ID": "39473346-38cc-45d2-b586-bd7e987dce58", "DetectTime": "2023-10-30T13:59:11.658546+02:00", "EventTime": "2023-10-30T13:59:11.658570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CemdZT2Hnm7X0UxA87"]} -{"Format": "IDEA0", "ID": "de13ddc6-b6d4-4086-bdc3-9a9601c0911a", "DetectTime": "2023-10-30T13:59:11.695057+02:00", "EventTime": "2023-10-30T13:59:11.695084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["C7y7PblDZQTgODog9"]} -{"Format": "IDEA0", "ID": "e13b9d4f-e677-40e2-a8aa-4c9d2013dbbf", "DetectTime": "2023-10-30T13:59:11.743028+02:00", "EventTime": "2023-10-30T13:59:11.743191+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKY7CjoJkEWhMyrU8"]} -{"Format": "IDEA0", "ID": "7e4309a8-c08b-4317-a70b-4baac8d500fb", "DetectTime": "2023-10-30T13:59:11.760447+02:00", "EventTime": "2023-10-30T13:59:11.760470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1868], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. ", "ContentType": "text/plain"}], "uids": ["CKtD803I9JLhJV8g8g"]} -{"Format": "Json", "ID": "7e4309a8-c08b-4317-a70b-4baac8d500fb", "DetectTime": "2023-10-30T13:59:11.760447+02:00", "EventTime": "2023-10-30T13:59:11.760470+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1868], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:19:21.566021+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:11.846936)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e0422a5-f65c-4a74-948f-02bedcc74b1c", "DetectTime": "2023-10-30T13:59:11.857963+02:00", "EventTime": "2023-10-30T13:59:11.857990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CRHiwR1NulMxdS8di3"]} -{"Format": "IDEA0", "ID": "262d8cb1-9979-4c6e-8bdc-8d643204f733", "DetectTime": "2023-10-30T13:59:11.910103+02:00", "EventTime": "2023-10-30T13:59:11.910132+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2QqvN2ZxWID4YUiH9"]} -{"Format": "IDEA0", "ID": "f9f12b3d-38a6-4ecb-b6b6-a6228a63bccf", "DetectTime": "2023-10-30T13:59:11.938089+02:00", "EventTime": "2023-10-30T13:59:11.938146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["C6himL1al3Y0vplJpf"]} -{"Format": "IDEA0", "ID": "d21c3ff8-2b89-4d23-bdc1-8e62a8c045a2", "DetectTime": "2023-10-30T13:59:11.977798+02:00", "EventTime": "2023-10-30T13:59:11.977822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. ", "ContentType": "text/plain"}], "uids": ["CKB07HotbcH4EO47b"]} -{"Format": "IDEA0", "ID": "1e2d5404-da8b-43bb-8618-49eeb958200a", "DetectTime": "2023-10-30T13:59:12.015251+02:00", "EventTime": "2023-10-30T13:59:12.015279+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwvuQQ1ydFzjBAFlt7"]} -{"Format": "IDEA0", "ID": "aa84d66f-08e8-4237-a054-ecaae160595b", "DetectTime": "2023-10-30T13:59:12.029894+02:00", "EventTime": "2023-10-30T13:59:12.029911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["C1H2t8pSo6ZS8elIi"]} -{"Format": "IDEA0", "ID": "8f50aa07-f792-4b9e-82ff-7596be8f3f44", "DetectTime": "2023-10-30T13:59:12.064464+02:00", "EventTime": "2023-10-30T13:59:12.064523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7140], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. ", "ContentType": "text/plain"}], "uids": ["CPYLly2V9g8iytu49b"]} -{"Format": "IDEA0", "ID": "5522a4b1-06ba-47a5-8acf-27966cf35d9a", "DetectTime": "2023-10-30T13:59:12.099247+02:00", "EventTime": "2023-10-30T13:59:12.099263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["Cmt7pf3gzwS7wJqVL5"]} -{"Format": "IDEA0", "ID": "5ed27ce1-593d-404d-8adb-b2f87ae69223", "DetectTime": "2023-10-30T13:59:12.139487+02:00", "EventTime": "2023-10-30T13:59:12.139537+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZgtj33nHxhXf5wFk9"]} -{"Format": "IDEA0", "ID": "1ca17e7b-1f4f-4c03-a3a3-1fa2a156fee5", "DetectTime": "2023-10-30T13:59:12.153825+02:00", "EventTime": "2023-10-30T13:59:12.153849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11036], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. ", "ContentType": "text/plain"}], "uids": ["CaBlT14BZNRgT3XRAk"]} -{"Format": "IDEA0", "ID": "a692d586-c9ad-4b68-9761-879ab7d13268", "DetectTime": "2023-10-30T13:59:12.192421+02:00", "EventTime": "2023-10-30T13:59:12.192445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CP4kpB4DMbnyAfcCj7"]} -{"Format": "Json", "ID": "a692d586-c9ad-4b68-9761-879ab7d13268", "DetectTime": "2023-10-30T13:59:12.192421+02:00", "EventTime": "2023-10-30T13:59:12.192445+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:19:23.170860+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:12.293142)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3a5b988c-99d0-4459-8f69-680ed4471541", "DetectTime": "2023-10-30T13:59:12.301765+02:00", "EventTime": "2023-10-30T13:59:12.301794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CKY7CjoJkEWhMyrU8", "CLHZho4BxCZPNqUJ7g", "CwvuQQ1ydFzjBAFlt7", "CKOjEW2p3BfarVBWsd"]} -{"Format": "IDEA0", "ID": "766f2b1e-ba1f-4bbb-b60d-4104911af467", "DetectTime": "2023-10-30T13:59:12.324082+02:00", "EventTime": "2023-10-30T13:59:12.324163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKOjEW2p3BfarVBWsd"]} -{"Format": "IDEA0", "ID": "fe82dae7-88f2-4be4-8b0c-98d7ca0af53d", "DetectTime": "2023-10-30T13:59:12.344135+02:00", "EventTime": "2023-10-30T13:59:12.344163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["CytUXGDCXB1BQ1wb9"]} -{"Format": "IDEA0", "ID": "b79e029f-08ec-4580-8240-b6bedd85ba2e", "DetectTime": "2023-10-30T13:59:12.378612+02:00", "EventTime": "2023-10-30T13:59:12.378636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CIApL73ztwPt1M1K1j"]} -{"Format": "IDEA0", "ID": "568496bd-e8bf-4e93-9320-59c9c64793e4", "DetectTime": "2023-10-30T13:59:12.413631+02:00", "EventTime": "2023-10-30T13:59:12.413656+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxuiukjpZBMLgI97"]} -{"Format": "IDEA0", "ID": "0070f0f7-7fc8-41a0-8f7d-577e1609d2a7", "DetectTime": "2023-10-30T13:59:12.432105+02:00", "EventTime": "2023-10-30T13:59:12.432132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CXVxSb2ptDZfL2YDA7"]} -{"Format": "IDEA0", "ID": "4e7148cb-d632-4e68-95b3-af76acd620e5", "DetectTime": "2023-10-30T13:59:12.482963+02:00", "EventTime": "2023-10-30T13:59:12.482988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CAlCEQRWFfJhxOub8"]} -{"Format": "IDEA0", "ID": "b87deae8-37d7-4037-bd4c-8ea5a0086b5b", "DetectTime": "2023-10-30T13:59:12.516754+02:00", "EventTime": "2023-10-30T13:59:12.516774+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CguLgZqCvYtGSgv8l"]} -{"Format": "IDEA0", "ID": "67eed1a1-96f4-4f82-ba76-f03aac8a669d", "DetectTime": "2023-10-30T13:59:12.532590+02:00", "EventTime": "2023-10-30T13:59:12.532616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["CpSZgi3qe2Mn4lUZgd"]} -{"Format": "IDEA0", "ID": "1d38da1a-01c5-4676-b879-75dff33b82b7", "DetectTime": "2023-10-30T13:59:12.563589+02:00", "EventTime": "2023-10-30T13:59:12.563611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CX2kEj1nbRYWvSDLNj"]} -{"Format": "IDEA0", "ID": "9407b06a-9a41-4b8f-a6c9-cd4e9f194183", "DetectTime": "2023-10-30T13:59:12.600837+02:00", "EventTime": "2023-10-30T13:59:12.600863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CccIhxK4QM8Rgqt9c"]} -{"Format": "IDEA0", "ID": "3898d524-3d49-46f1-9cac-5e46150df5c8", "DetectTime": "2023-10-30T13:59:12.637234+02:00", "EventTime": "2023-10-30T13:59:12.637263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["Cr6Ius4R3Xqylxq544"]} -{"Format": "IDEA0", "ID": "80a43290-b0db-4d3e-9259-0858e0ef84e6", "DetectTime": "2023-10-30T13:59:12.675650+02:00", "EventTime": "2023-10-30T13:59:12.675670+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDfpPXm2pqJDvNM72"]} -{"Format": "IDEA0", "ID": "fcfde5ce-0482-4eae-9af3-c73dd00e31c2", "DetectTime": "2023-10-30T13:59:12.697566+02:00", "EventTime": "2023-10-30T13:59:12.697585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CYSQD82VK3aIXfNTDf"]} -{"Format": "IDEA0", "ID": "238cbd5d-7ed7-4050-919d-d96d4c6626d6", "DetectTime": "2023-10-30T13:59:12.741297+02:00", "EventTime": "2023-10-30T13:59:12.741318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["C8mG0o4mFtZwRVu7Ne"]} -{"Format": "IDEA0", "ID": "80c07b7b-d62f-4e2c-9247-0e856cc0e441", "DetectTime": "2023-10-30T13:59:12.772719+02:00", "EventTime": "2023-10-30T13:59:12.772737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CT6C7x4nxW70tRWsQ"]} -{"Format": "IDEA0", "ID": "db83b44c-478c-4cb1-a653-607d44f82a53", "DetectTime": "2023-10-30T13:59:12.814331+02:00", "EventTime": "2023-10-30T13:59:12.814358+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqNpgo4tS9pPV8ZZfj"]} -{"Format": "IDEA0", "ID": "e2d826d6-048e-4bea-bde2-9e0e813c9b0c", "DetectTime": "2023-10-30T13:59:12.825202+02:00", "EventTime": "2023-10-30T13:59:12.825222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CCTZnk3Z7GIbmRR8Wk"]} -{"Format": "IDEA0", "ID": "44f807f4-422e-43d6-8d5e-831ace6cbd8c", "DetectTime": "2023-10-30T13:59:12.866066+02:00", "EventTime": "2023-10-30T13:59:12.866093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net", "ContentType": "text/plain"}], "uids": ["CFsK9Q17FYkEghH8sd"]} -{"Format": "IDEA0", "ID": "8998a3ed-c256-4878-873d-b89ee2faaa5b", "DetectTime": "2023-10-30T13:59:12.905522+02:00", "EventTime": "2023-10-30T13:59:12.905538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CS8a2s1C7VYqqmnei"]} -{"Format": "IDEA0", "ID": "2d96be3b-11fa-4ac3-8f08-b5258970ac3a", "DetectTime": "2023-10-30T13:59:12.946066+02:00", "EventTime": "2023-10-30T13:59:12.946088+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRKIhq47ReXqB3kGue"]} -{"Format": "IDEA0", "ID": "267f9244-7c8f-4fee-9a55-72e48872bc46", "DetectTime": "2023-10-30T13:59:12.956187+02:00", "EventTime": "2023-10-30T13:59:12.956211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["Cl8mcM1KcamZCtk65j"]} -{"Format": "IDEA0", "ID": "650cd75c-cac8-491e-b483-3cf733c50e90", "DetectTime": "2023-10-30T13:59:12.999147+02:00", "EventTime": "2023-10-30T13:59:12.999197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CtYgOH3P05FfqUXRX1"]} -{"Format": "IDEA0", "ID": "aa26d6b1-e4fe-4031-a476-17af571649d3", "DetectTime": "2023-10-30T13:59:13.040847+02:00", "EventTime": "2023-10-30T13:59:13.040866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["C2nOFH8FW3nuEl4Xi"]} -{"Format": "IDEA0", "ID": "8787ee3d-4ea7-487a-ac5c-e409e0a97d64", "DetectTime": "2023-10-30T13:59:13.082603+02:00", "EventTime": "2023-10-30T13:59:13.082631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CUVUVF3EqgW8ysOMji"]} -{"Format": "IDEA0", "ID": "0580a6f6-a16e-4d04-b6bc-97a03081ec2d", "DetectTime": "2023-10-30T13:59:13.123216+02:00", "EventTime": "2023-10-30T13:59:13.123238+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGbJNa2awL50JGpSn8"]} -{"Format": "IDEA0", "ID": "c74d0e43-6df1-42c3-b3bc-c5cae1c5b017", "DetectTime": "2023-10-30T13:59:13.133193+02:00", "EventTime": "2023-10-30T13:59:13.133214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CtpwFM24CvtwomdPS8"]} -{"Format": "IDEA0", "ID": "1b4096bb-b929-46ea-a018-256f4708e45d", "DetectTime": "2023-10-30T13:59:13.172471+02:00", "EventTime": "2023-10-30T13:59:13.172492+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJYTBF1jp50m0xMM49"]} -{"Format": "IDEA0", "ID": "477bcbe0-cf0b-4e95-97f5-004389747aba", "DetectTime": "2023-10-30T13:59:13.182472+02:00", "EventTime": "2023-10-30T13:59:13.182536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CvJLAt44VMKKFSysKh"]} -{"Format": "IDEA0", "ID": "c1cc66c7-f894-44cc-8b35-8c6194149ce6", "DetectTime": "2023-10-30T13:59:13.223103+02:00", "EventTime": "2023-10-30T13:59:13.223161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cq5jq01SrN2dnSRhs5"]} -{"Format": "IDEA0", "ID": "4b616f62-8c98-4165-a0d2-cc55c41ccf38", "DetectTime": "2023-10-30T13:59:13.267946+02:00", "EventTime": "2023-10-30T13:59:13.267966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CXkOEISx7CbDcoild"]} -{"Format": "IDEA0", "ID": "d5e74dc8-558f-4f9c-bfdf-c7a4899a9906", "DetectTime": "2023-10-30T13:59:13.306984+02:00", "EventTime": "2023-10-30T13:59:13.307006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CHtX7747fDV3pyIL42"]} -{"Format": "IDEA0", "ID": "8395ee30-3c1f-4abb-9422-abe2c0ca77ce", "DetectTime": "2023-10-30T13:59:13.354055+02:00", "EventTime": "2023-10-30T13:59:13.354112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CHOSZ33Cr3IzeiowFg"]} -{"Format": "IDEA0", "ID": "36a64106-1585-4b1e-9b98-c958f3e681f0", "DetectTime": "2023-10-30T13:59:13.403057+02:00", "EventTime": "2023-10-30T13:59:13.403077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CqNpgo4tS9pPV8ZZfj", "CHI2vx4MGxtsVhtwo", "CguLgZqCvYtGSgv8l", "CGbJNa2awL50JGpSn8"]} -{"Format": "IDEA0", "ID": "31b8bc5b-f62b-4757-a404-f4fcb21defb8", "DetectTime": "2023-10-30T13:59:13.414885+02:00", "EventTime": "2023-10-30T13:59:13.414910+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHI2vx4MGxtsVhtwo"]} -{"Format": "IDEA0", "ID": "164c8c94-c664-4aa7-a981-26324bcb5790", "DetectTime": "2023-10-30T13:59:13.425455+02:00", "EventTime": "2023-10-30T13:59:13.425480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CXmFep3UWUWhAIGdvh"]} -{"Format": "IDEA0", "ID": "7d42d2df-948d-4298-bf8c-47a39db1185b", "DetectTime": "2023-10-30T13:59:13.461525+02:00", "EventTime": "2023-10-30T13:59:13.461550+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfSAvWc968dRcRn3c"]} -{"Format": "IDEA0", "ID": "d58c80c0-9fbd-4a1d-b4ae-15e2086d39c4", "DetectTime": "2023-10-30T13:59:13.473189+02:00", "EventTime": "2023-10-30T13:59:13.473210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CbzsNT1Tlsv4SzawEb"]} -{"Format": "IDEA0", "ID": "f3d12f6f-33f9-4d40-b6c6-1eda9804903e", "DetectTime": "2023-10-30T13:59:13.510462+02:00", "EventTime": "2023-10-30T13:59:13.510483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C41K7e3D9hqnEzhaSa"]} -{"Format": "IDEA0", "ID": "21f06d23-df3d-49d4-9a77-8ec403641178", "DetectTime": "2023-10-30T13:59:13.552747+02:00", "EventTime": "2023-10-30T13:59:13.552773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CaFxPS2zTobCFb4UDi"]} -{"Format": "Json", "ID": "21f06d23-df3d-49d4-9a77-8ec403641178", "DetectTime": "2023-10-30T13:59:13.552747+02:00", "EventTime": "2023-10-30T13:59:13.552773+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:19:39.957173+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:13.623884)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a1eda565-88fe-4c2c-be83-31f864f7cf26", "DetectTime": "2023-10-30T13:59:13.631538+02:00", "EventTime": "2023-10-30T13:59:13.631564+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPtdM63ihdgNlXknKd"]} -{"Format": "IDEA0", "ID": "77604e84-f067-4a4e-9e7a-bde25580be76", "DetectTime": "2023-10-30T13:59:13.646199+02:00", "EventTime": "2023-10-30T13:59:13.646217+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpeJVH2RAdXSimpKH8"]} -{"Format": "IDEA0", "ID": "27d06622-4ff3-4ef8-a5d5-443fef2fb51f", "DetectTime": "2023-10-30T13:59:13.658444+02:00", "EventTime": "2023-10-30T13:59:13.658469+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ce74QX3rPEOGQlpVt7"]} -{"Format": "IDEA0", "ID": "0802b1e7-5d5c-4af5-85c1-c29065723e8d", "DetectTime": "2023-10-30T13:59:13.670370+02:00", "EventTime": "2023-10-30T13:59:13.670387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CR7SnN211ypxz1mzsc"]} -{"Format": "IDEA0", "ID": "7271ffd5-0216-4399-9d44-8257bb6dcbc0", "DetectTime": "2023-10-30T13:59:13.719077+02:00", "EventTime": "2023-10-30T13:59:13.719103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CU2ite3qx0klhhmVE4"]} -{"Format": "IDEA0", "ID": "022dc7ff-6c49-41c3-a46c-d553c8ae8bf4", "DetectTime": "2023-10-30T13:59:13.763269+02:00", "EventTime": "2023-10-30T13:59:13.763296+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLD0Pn1SA6UFJ04zJe"]} -{"Format": "IDEA0", "ID": "863e8e85-deb9-4f77-9db2-f09ad72be791", "DetectTime": "2023-10-30T13:59:13.776036+02:00", "EventTime": "2023-10-30T13:59:13.776067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CGzwFhGCNWR1hVCA5"]} -{"Format": "IDEA0", "ID": "80bdfa4e-769b-4c00-af36-d3aba71cc7e9", "DetectTime": "2023-10-30T13:59:13.824180+02:00", "EventTime": "2023-10-30T13:59:13.824207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CdYOod4bjmLiLsXte"]} -{"Format": "IDEA0", "ID": "f83281a2-6f53-4a3e-b993-d3795843354b", "DetectTime": "2023-10-30T13:59:13.865621+02:00", "EventTime": "2023-10-30T13:59:13.865644+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjDQZ8UEk7Fo0uRAj"]} -{"Format": "IDEA0", "ID": "002c249a-af06-41fb-bd74-177c5dbc75a2", "DetectTime": "2023-10-30T13:59:13.875909+02:00", "EventTime": "2023-10-30T13:59:13.875952+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXlOcn2bxOM3WtcSPl"]} -{"Format": "IDEA0", "ID": "d6b97211-25db-47d2-9a49-622773b438fa", "DetectTime": "2023-10-30T13:59:13.890848+02:00", "EventTime": "2023-10-30T13:59:13.890875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C8eScHNuXTJ6MO9nb", "Ce74QX3rPEOGQlpVt7", "CjDQZ8UEk7Fo0uRAj", "CPtdM63ihdgNlXknKd"]} -{"Format": "IDEA0", "ID": "d9f01595-f5f7-45a5-9e77-c61abb603341", "DetectTime": "2023-10-30T13:59:13.905214+02:00", "EventTime": "2023-10-30T13:59:13.905237+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8eScHNuXTJ6MO9nb"]} -{"Format": "IDEA0", "ID": "3cf80262-c728-447f-a380-4286592feea4", "DetectTime": "2023-10-30T13:59:13.919337+02:00", "EventTime": "2023-10-30T13:59:13.919361+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCVqaE2ZripkSWuQlf"]} -{"Format": "IDEA0", "ID": "8205a2ed-360e-4140-89cb-53f81c7c326f", "DetectTime": "2023-10-30T13:59:13.931535+02:00", "EventTime": "2023-10-30T13:59:13.931572+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVVhKL3ypMlcTwxfpc"]} -{"Format": "IDEA0", "ID": "96a080a6-ce43-4689-8c00-7a0236e8f73d", "DetectTime": "2023-10-30T13:59:13.943929+02:00", "EventTime": "2023-10-30T13:59:13.943948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["ClZut31aq8pduj1jle"]} -{"Format": "IDEA0", "ID": "dc364fb8-a369-43a0-8d7c-fafc8fef0642", "DetectTime": "2023-10-30T13:59:13.982912+02:00", "EventTime": "2023-10-30T13:59:13.982936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["CUaKvr326VFh6xaz21"]} -{"Format": "IDEA0", "ID": "d69066ba-c9be-4bc0-8616-f445b169b3e3", "DetectTime": "2023-10-30T13:59:14.031060+02:00", "EventTime": "2023-10-30T13:59:14.031082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CMMyoQ1TLoB8Gu6Hsl"]} -{"Format": "IDEA0", "ID": "f50eb476-68df-4a4d-bdca-7f63f63f4b7c", "DetectTime": "2023-10-30T13:59:14.071399+02:00", "EventTime": "2023-10-30T13:59:14.071425+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEBAY018aRXqp2dR8j"]} -{"Format": "IDEA0", "ID": "f162ac44-d0e8-444e-b8f5-4897dc4b6dbc", "DetectTime": "2023-10-30T13:59:14.083644+02:00", "EventTime": "2023-10-30T13:59:14.083671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQTgXjdNaKkgLLcec"]} -{"Format": "IDEA0", "ID": "006dc3b5-9009-4f87-9925-3b572e56a42d", "DetectTime": "2023-10-30T13:59:14.097095+02:00", "EventTime": "2023-10-30T13:59:14.097124+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJTcJi4BM4IHSIOnAb"]} -{"Format": "IDEA0", "ID": "6aa73a0a-30d8-4d23-b7e8-f087bff2095b", "DetectTime": "2023-10-30T13:59:14.113367+02:00", "EventTime": "2023-10-30T13:59:14.113392+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8oNCJ34quICYr4Hpc"]} -{"Format": "IDEA0", "ID": "044bcd81-62e6-4e9b-9b77-dfb85cf88aa8", "DetectTime": "2023-10-30T13:59:14.127337+02:00", "EventTime": "2023-10-30T13:59:14.127356+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4HVBm4QajwVBrxRga"]} -{"Format": "IDEA0", "ID": "415cdb55-7116-4b1f-af91-15004890f857", "DetectTime": "2023-10-30T13:59:14.140070+02:00", "EventTime": "2023-10-30T13:59:14.140094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQTgXjdNaKkgLLcec", "C8oNCJ34quICYr4Hpc", "CVVhKL3ypMlcTwxfpc", "CMlG3a3deFVSG8K6Xd"]} -{"Format": "IDEA0", "ID": "99d606af-de18-49eb-b058-7131bc53f299", "DetectTime": "2023-10-30T13:59:14.150591+02:00", "EventTime": "2023-10-30T13:59:14.150618+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMlG3a3deFVSG8K6Xd"]} -{"Format": "IDEA0", "ID": "3c98cdcb-e0ca-4521-9851-bb888e22266e", "DetectTime": "2023-10-30T13:59:14.163806+02:00", "EventTime": "2023-10-30T13:59:14.163829+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDuZwi1ZfmCkLa7qt1"]} -{"Format": "IDEA0", "ID": "03e67deb-bb0f-4f80-af3b-1e969e0dc827", "DetectTime": "2023-10-30T13:59:14.173966+02:00", "EventTime": "2023-10-30T13:59:14.173996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CrXMmm4vhNV1WGrZwb"]} -{"Format": "IDEA0", "ID": "77d7b11d-f7ce-45b0-a5cf-01d3fcc622c2", "DetectTime": "2023-10-30T13:59:14.212661+02:00", "EventTime": "2023-10-30T13:59:14.212683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["CivmaC2LxA0lgZ8GB8"]} -{"Format": "IDEA0", "ID": "5c40673e-8e72-4965-9378-9d04bb75b6fd", "DetectTime": "2023-10-30T13:59:14.263368+02:00", "EventTime": "2023-10-30T13:59:14.263387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFoM492dI7usrCrYN9"]} -{"Format": "IDEA0", "ID": "4d2f3277-e7be-41ca-a21d-aee29a3b0c78", "DetectTime": "2023-10-30T13:59:14.319358+02:00", "EventTime": "2023-10-30T13:59:14.319443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CU75SC2mpCx51CFDB8"]} -{"Format": "IDEA0", "ID": "481b3f19-a05e-4280-ad30-cb5aaa0859d8", "DetectTime": "2023-10-30T13:59:14.362463+02:00", "EventTime": "2023-10-30T13:59:14.362491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQI4apMwpWB2oxhEf"]} -{"Format": "IDEA0", "ID": "0ed8027b-1f61-4b52-9254-dbfdee271fa1", "DetectTime": "2023-10-30T13:59:14.400709+02:00", "EventTime": "2023-10-30T13:59:14.400730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CVWPom14SeBCpdHFca"]} -{"Format": "IDEA0", "ID": "58e5841c-922d-48a0-b200-2fd875ca7220", "DetectTime": "2023-10-30T13:59:14.436283+02:00", "EventTime": "2023-10-30T13:59:14.436301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CidlnY1rGegTI8DGqa"]} -{"Format": "IDEA0", "ID": "4411f6f0-f844-417b-a286-8becfa675c16", "DetectTime": "2023-10-30T13:59:14.470754+02:00", "EventTime": "2023-10-30T13:59:14.470884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C9VIZHufMN9WRXGha"]} -{"Format": "IDEA0", "ID": "4ee37966-ad20-48d9-ab99-c3b8db22cc48", "DetectTime": "2023-10-30T13:59:14.511218+02:00", "EventTime": "2023-10-30T13:59:14.511241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.245.129.225 ", "ContentType": "text/plain"}], "uids": ["C6pB3F3ReS2uBViyr6"]} -{"Format": "IDEA0", "ID": "1d829438-0c10-433e-a21f-2f5ce9e1eb03", "DetectTime": "2023-10-30T13:59:14.558022+02:00", "EventTime": "2023-10-30T13:59:14.558100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CFCHza4LXA13DDykl9"]} -{"Format": "IDEA0", "ID": "0d600c1d-9e53-417e-9377-74a9066b8b7a", "DetectTime": "2023-10-30T13:59:14.602221+02:00", "EventTime": "2023-10-30T13:59:14.602241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CKjqqW2C11CaRhHxF2"]} -{"Format": "IDEA0", "ID": "3edbb917-25c8-4cfe-99e3-f533fe14546b", "DetectTime": "2023-10-30T13:59:14.654497+02:00", "EventTime": "2023-10-30T13:59:14.654542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["COvQIj222ASxQtorb1"]} -{"Format": "IDEA0", "ID": "72d34a33-de8f-4df4-b8eb-38b4c0ab2ea4", "DetectTime": "2023-10-30T13:59:14.703528+02:00", "EventTime": "2023-10-30T13:59:14.703577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 ", "ContentType": "text/plain"}], "uids": ["CthGzo3nrUEEyON8G3"]} -{"Format": "IDEA0", "ID": "944afa6b-6071-4dd6-a86a-3a2b9d291952", "DetectTime": "2023-10-30T13:59:14.758099+02:00", "EventTime": "2023-10-30T13:59:14.758151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["CXI10V2yJpkfNHEilj"]} -{"Format": "IDEA0", "ID": "f79d5449-89bf-4c1e-bc6c-01c80c8eb467", "DetectTime": "2023-10-30T13:59:14.800154+02:00", "EventTime": "2023-10-30T13:59:14.800181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["C7uEN54rlGfzNeGlq3"]} -{"Format": "IDEA0", "ID": "d7d4b92b-35c5-4766-a8ef-42ca2c9be9fc", "DetectTime": "2023-10-30T13:59:14.841380+02:00", "EventTime": "2023-10-30T13:59:14.841427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["Cc7KOL2l0DytVU4btd"]} -{"Format": "IDEA0", "ID": "cd1c5934-1ef5-4ce5-8a69-cc9f3dc10f93", "DetectTime": "2023-10-30T13:59:14.869950+02:00", "EventTime": "2023-10-30T13:59:14.869971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CydGoMbKIBr0j4Ifj"]} -{"Format": "IDEA0", "ID": "a1d42e51-265b-4487-83c7-b590036a257e", "DetectTime": "2023-10-30T13:59:14.910296+02:00", "EventTime": "2023-10-30T13:59:14.910318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C7cnqM74yNaRLByM9"]} -{"Format": "IDEA0", "ID": "5151553d-d61e-461a-8c71-197932268154", "DetectTime": "2023-10-30T13:59:14.950122+02:00", "EventTime": "2023-10-30T13:59:14.950141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CLsh7w274UJiEBAWH5"]} -{"Format": "IDEA0", "ID": "36428a66-36aa-412f-9c34-19ce590431d9", "DetectTime": "2023-10-30T13:59:14.988923+02:00", "EventTime": "2023-10-30T13:59:14.988941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["Ch7WZV14LNtbRVPpvc"]} -{"Format": "IDEA0", "ID": "489caabf-8ccb-43fd-829e-c9b27718edeb", "DetectTime": "2023-10-30T13:59:15.032034+02:00", "EventTime": "2023-10-30T13:59:15.032062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CLgvgt3aMiJcTUN6B4"]} -{"Format": "IDEA0", "ID": "e85e9a59-e2d5-4bae-a0dc-d8199418078d", "DetectTime": "2023-10-30T13:59:15.068426+02:00", "EventTime": "2023-10-30T13:59:15.068445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CCLuuP3I2lHle85WS4"]} -{"Format": "IDEA0", "ID": "c266cdca-1327-4404-afc5-a68bd7dd1907", "DetectTime": "2023-10-30T13:59:15.104986+02:00", "EventTime": "2023-10-30T13:59:15.105002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["C8e55b46BCiSv7Hr02"]} -{"Format": "IDEA0", "ID": "f1b11d2d-bfe7-41ce-a438-1cae639cbabf", "DetectTime": "2023-10-30T13:59:15.144497+02:00", "EventTime": "2023-10-30T13:59:15.144523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CUopBy1iK7uYSceQTf"]} -{"Format": "IDEA0", "ID": "46467413-0138-463d-a61e-4ae75f38aa9f", "DetectTime": "2023-10-30T13:59:15.185966+02:00", "EventTime": "2023-10-30T13:59:15.185995+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNEnPA2bYBvKgIsWy9"]} -{"Format": "IDEA0", "ID": "69f75971-b561-470b-9916-8a7d77fe157f", "DetectTime": "2023-10-30T13:59:15.214007+02:00", "EventTime": "2023-10-30T13:59:15.214029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["CreVDC1dEPB3lZ65pf"]} -{"Format": "IDEA0", "ID": "2cc164f7-e090-4706-b896-bfd6f6ff7094", "DetectTime": "2023-10-30T13:59:15.256393+02:00", "EventTime": "2023-10-30T13:59:15.256420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.252.131.148 AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net", "ContentType": "text/plain"}], "uids": ["CmmB9R3Dvgg0dpQQSf"]} -{"Format": "IDEA0", "ID": "58972f69-ea2d-44f7-98a3-1ae918f5d91a", "DetectTime": "2023-10-30T13:59:15.295168+02:00", "EventTime": "2023-10-30T13:59:15.295190+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8H9Kf4I2zqxVb2HLc"]} -{"Format": "IDEA0", "ID": "023eae9a-c931-4a65-9194-91c8cd8daad4", "DetectTime": "2023-10-30T13:59:15.319871+02:00", "EventTime": "2023-10-30T13:59:15.319890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CUWpwy1ZAarkF3PhCf"]} -{"Format": "IDEA0", "ID": "c7e53ed8-2ee9-4d49-b8fe-d248a240204c", "DetectTime": "2023-10-30T13:59:15.359559+02:00", "EventTime": "2023-10-30T13:59:15.359588+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcqycD1TwoxKdG7sqg"]} -{"Format": "IDEA0", "ID": "74b2aa20-740e-42c0-924e-90fa0c913286", "DetectTime": "2023-10-30T13:59:15.383266+02:00", "EventTime": "2023-10-30T13:59:15.383285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CzWQUw7OutF0rdBve"]} -{"Format": "IDEA0", "ID": "69f72ec5-2325-418c-a8e6-7b74ba80d798", "DetectTime": "2023-10-30T13:59:15.427417+02:00", "EventTime": "2023-10-30T13:59:15.427448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CnPgYrL5aHZYwZw49"]} -{"Format": "IDEA0", "ID": "bcad37d8-578d-4382-a808-2a72eb1581e6", "DetectTime": "2023-10-30T13:59:15.468816+02:00", "EventTime": "2023-10-30T13:59:15.468833+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIfnoL2GBncVppLfke"]} -{"Format": "IDEA0", "ID": "7eee9606-342d-4a22-aa5b-5606497d51d4", "DetectTime": "2023-10-30T13:59:15.494571+02:00", "EventTime": "2023-10-30T13:59:15.494587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CvwS3G3dTjlRYC0H59"]} -{"Format": "IDEA0", "ID": "8ed5594c-a535-48b6-a126-cb5d34846989", "DetectTime": "2023-10-30T13:59:15.529603+02:00", "EventTime": "2023-10-30T13:59:15.529626+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDhFjh1JQ3kf2UGZTk"]} -{"Format": "IDEA0", "ID": "3cdc539d-6657-4ce0-b299-eb53487b3c3c", "DetectTime": "2023-10-30T13:59:15.553007+02:00", "EventTime": "2023-10-30T13:59:15.553132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CAEejS1VGvzEo2Jin1"]} -{"Format": "IDEA0", "ID": "76de06fa-564f-4ee5-85cf-b22c31a2c92e", "DetectTime": "2023-10-30T13:59:15.591623+02:00", "EventTime": "2023-10-30T13:59:15.591651+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cw7T8j3niqIUBCByKd"]} -{"Format": "IDEA0", "ID": "c57dace9-9e05-40f6-af14-bfa3fee29b50", "DetectTime": "2023-10-30T13:59:15.614916+02:00", "EventTime": "2023-10-30T13:59:15.614936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CNEnPA2bYBvKgIsWy9", "CDhFjh1JQ3kf2UGZTk", "C5c4vO2YQ8BXnSTbIj", "CcqycD1TwoxKdG7sqg"]} -{"Format": "IDEA0", "ID": "a9d341df-8c8b-4abb-91f4-afe09388b87e", "DetectTime": "2023-10-30T13:59:15.639986+02:00", "EventTime": "2023-10-30T13:59:15.640007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5c4vO2YQ8BXnSTbIj"]} -{"Format": "IDEA0", "ID": "a522c051-e348-4f2d-ae86-b277f7c5f0a3", "DetectTime": "2023-10-30T13:59:15.663789+02:00", "EventTime": "2023-10-30T13:59:15.663809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CkQFn632MRJ9YhGyd9"]} -{"Format": "IDEA0", "ID": "f80c3291-93c9-4d36-9cd6-a3cd665effcb", "DetectTime": "2023-10-30T13:59:15.699562+02:00", "EventTime": "2023-10-30T13:59:15.699580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["Cyx3darfP6UjknBc9"]} -{"Format": "IDEA0", "ID": "eb1c4c09-9157-4ede-9141-8d905bd63c58", "DetectTime": "2023-10-30T13:59:15.734207+02:00", "EventTime": "2023-10-30T13:59:15.734227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C0c4A71QSkvaI6Cp77"]} -{"Format": "IDEA0", "ID": "1c742321-ed2c-4d20-a655-f8743905c446", "DetectTime": "2023-10-30T13:59:15.771518+02:00", "EventTime": "2023-10-30T13:59:15.771546+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Caz8DsEIxtFGCjc2e"]} -{"Format": "IDEA0", "ID": "63537e20-7d41-45a0-b9ff-46235b496568", "DetectTime": "2023-10-30T13:59:15.794225+02:00", "EventTime": "2023-10-30T13:59:15.794244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["Cn315m2foman2jLRmg"]} -{"Format": "IDEA0", "ID": "0fbdd52f-5353-46d5-a953-6e66d8ee83c7", "DetectTime": "2023-10-30T13:59:15.836854+02:00", "EventTime": "2023-10-30T13:59:15.836878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CKXsbr3FXsI1kny5C8"]} -{"Format": "IDEA0", "ID": "e059ff25-fa86-40f8-9849-b32d280d45df", "DetectTime": "2023-10-30T13:59:15.875899+02:00", "EventTime": "2023-10-30T13:59:15.875922+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHVBSK1P0wTDQq86di"]} -{"Format": "IDEA0", "ID": "c8875fbf-45e8-4c68-953e-efba618b0810", "DetectTime": "2023-10-30T13:59:15.896746+02:00", "EventTime": "2023-10-30T13:59:15.896772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["C6Fi9e1NfQZVdqzisi"]} -{"Format": "IDEA0", "ID": "45ad7283-82a1-4496-8fdb-8e5cdea9c74a", "DetectTime": "2023-10-30T13:59:15.932696+02:00", "EventTime": "2023-10-30T13:59:15.932715+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cp8lzW1aiNJc7E6QH5"]} -{"Format": "IDEA0", "ID": "4fa9f424-2943-45b3-82db-df550e33bbab", "DetectTime": "2023-10-30T13:59:15.950456+02:00", "EventTime": "2023-10-30T13:59:15.950479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["Cr69xQ9RApxzcyjsl"]} -{"Format": "IDEA0", "ID": "2ceb5e02-0380-4076-a097-74a854855865", "DetectTime": "2023-10-30T13:59:15.983969+02:00", "EventTime": "2023-10-30T13:59:15.983997+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CenIbb1mGQWZW90Kb"]} -{"Format": "IDEA0", "ID": "9f463fcd-1c12-40bd-905a-aace39ec8e5f", "DetectTime": "2023-10-30T13:59:16.002361+02:00", "EventTime": "2023-10-30T13:59:16.002381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CzmTiK1tHSHQzZP1jk"]} -{"Format": "IDEA0", "ID": "e291b9d5-c00d-4ad6-8616-337fe3058deb", "DetectTime": "2023-10-30T13:59:16.165463+02:00", "EventTime": "2023-10-30T13:59:16.165482+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CL3lMs4mvTxoD7K1Nb"]} -{"Format": "IDEA0", "ID": "f4610d7d-51b0-43e9-9758-fe525148d7a2", "DetectTime": "2023-10-30T13:59:16.189033+02:00", "EventTime": "2023-10-30T13:59:16.189090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CtjGXFAIdWXPtrm8e"]} -{"Format": "IDEA0", "ID": "d56f459a-c47b-4e8b-993b-9a4d6fe1cd63", "DetectTime": "2023-10-30T13:59:16.230903+02:00", "EventTime": "2023-10-30T13:59:16.230926+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqYLbVnc01PFKgMT1"]} -{"Format": "IDEA0", "ID": "4ccb6a77-ef09-4e8a-af1f-1ff94f09b65c", "DetectTime": "2023-10-30T13:59:16.256072+02:00", "EventTime": "2023-10-30T13:59:16.256089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CJBc5p2hORushnIchg"]} -{"Format": "IDEA0", "ID": "531423d2-0bb4-47fc-9d3d-5be635dcc310", "DetectTime": "2023-10-30T13:59:16.300662+02:00", "EventTime": "2023-10-30T13:59:16.300684+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5hGL14oJkwcLtRekk"]} -{"Format": "IDEA0", "ID": "6b184a2d-8c85-4444-a00f-64c1f1df6a37", "DetectTime": "2023-10-30T13:59:16.325258+02:00", "EventTime": "2023-10-30T13:59:16.325282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CenIbb1mGQWZW90Kb", "CHVBSK1P0wTDQq86di", "CVRnZCn7n45i5HZ0h", "CqYLbVnc01PFKgMT1"]} -{"Format": "IDEA0", "ID": "af6ea2f7-489f-451f-ba10-2685f4018510", "DetectTime": "2023-10-30T13:59:16.349601+02:00", "EventTime": "2023-10-30T13:59:16.349621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["C3HWXS2gV9NVmUY8e9"]} -{"Format": "IDEA0", "ID": "5bda6fc8-e7e5-44f1-8982-106a71c55eb4", "DetectTime": "2023-10-30T13:59:16.394209+02:00", "EventTime": "2023-10-30T13:59:16.394298+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVRnZCn7n45i5HZ0h"]} -{"Format": "IDEA0", "ID": "5a0ef61b-d9a3-4d1a-ad28-b050a91efce2", "DetectTime": "2023-10-30T13:59:16.420790+02:00", "EventTime": "2023-10-30T13:59:16.420810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CRltHY9om0HdhA2O2"]} -{"Format": "IDEA0", "ID": "28a99352-dda6-4c00-9f06-77b3065efe04", "DetectTime": "2023-10-30T13:59:16.465418+02:00", "EventTime": "2023-10-30T13:59:16.465663+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfdZxt3yZ9ZbGRYi9e"]} -{"Format": "IDEA0", "ID": "12166b43-107f-4ce1-bc5f-800c14a1f289", "DetectTime": "2023-10-30T13:59:16.487846+02:00", "EventTime": "2023-10-30T13:59:16.487868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CSOdQa4JTbWVpMI9ec"]} -{"Format": "IDEA0", "ID": "d167bd07-902d-48ed-b762-9051212a972c", "DetectTime": "2023-10-30T13:59:16.532141+02:00", "EventTime": "2023-10-30T13:59:16.532157+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7cRAu6fm0iUuvQ53"]} -{"Format": "IDEA0", "ID": "d022324c-3dee-4186-bc16-debe59e00663", "DetectTime": "2023-10-30T13:59:16.554490+02:00", "EventTime": "2023-10-30T13:59:16.554510+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAfDw13ju7NXrgjdCl"]} -{"Format": "IDEA0", "ID": "f15c0f77-bc62-46cc-8579-cb1153029a7e", "DetectTime": "2023-10-30T13:59:16.581629+02:00", "EventTime": "2023-10-30T13:59:16.581656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CIn5lR3jjzKwrdnAzb"]} -{"Format": "IDEA0", "ID": "2874a484-d579-438b-8742-af737d2c2b93", "DetectTime": "2023-10-30T13:59:16.624686+02:00", "EventTime": "2023-10-30T13:59:16.624706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["C6Zg42oRbbk8w2Xb"]} -{"Format": "IDEA0", "ID": "98b05435-a7fe-42e0-bdbe-6dacfcedb19c", "DetectTime": "2023-10-30T13:59:16.668290+02:00", "EventTime": "2023-10-30T13:59:16.668318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CNnskw4GgcM6j3LoLi"]} -{"Format": "IDEA0", "ID": "893dbde7-78a0-430f-a2f7-58105cad43ac", "DetectTime": "2023-10-30T13:59:16.708130+02:00", "EventTime": "2023-10-30T13:59:16.708155+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFu0V216vNtty9wANa"]} -{"Format": "IDEA0", "ID": "eb161332-be7e-484f-9092-7a0b93844b91", "DetectTime": "2023-10-30T13:59:16.736725+02:00", "EventTime": "2023-10-30T13:59:16.736751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CAkN3Hg899i7vxGZe"]} -{"Format": "IDEA0", "ID": "45e2d5bd-6292-4944-b094-c39ee4c270df", "DetectTime": "2023-10-30T13:59:16.778085+02:00", "EventTime": "2023-10-30T13:59:16.778104+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRXMNq4LL4P0MNy3jg"]} -{"Format": "IDEA0", "ID": "ad57a589-61f4-4e6b-b80a-fde486ca7977", "DetectTime": "2023-10-30T13:59:16.801441+02:00", "EventTime": "2023-10-30T13:59:16.801458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CiESw4eEOhMC67xXd"]} -{"Format": "IDEA0", "ID": "60e6339c-6a04-4777-a9a8-ef61b6e2b576", "DetectTime": "2023-10-30T13:59:16.838530+02:00", "EventTime": "2023-10-30T13:59:16.838547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CGTJFl1NtQxAI5C3u4"]} -{"Format": "IDEA0", "ID": "b3b15a85-b599-41af-87e0-8f116fa6e63e", "DetectTime": "2023-10-30T13:59:16.881857+02:00", "EventTime": "2023-10-30T13:59:16.881882+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBFzDCUH27WzM2fbj"]} -{"Format": "IDEA0", "ID": "4ffe3d1a-8495-47f8-a0f8-c66b36a4ad33", "DetectTime": "2023-10-30T13:59:16.904942+02:00", "EventTime": "2023-10-30T13:59:16.904969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Hostname": ["fiber.htshostings.be"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 AS: EDPNET, BE AS9031 rDNS: fiber.htshostings.be", "ContentType": "text/plain"}], "uids": ["CAG8qk1wGDz5V3IAV"]} -{"Format": "IDEA0", "ID": "00278afa-90e6-4598-97a0-c70034294f5a", "DetectTime": "2023-10-30T13:59:16.949384+02:00", "EventTime": "2023-10-30T13:59:16.949413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["Cj2imn3I2wDIXBp93g"]} -{"Format": "IDEA0", "ID": "1579e0e9-a818-4e82-860e-02386cd6ce0b", "DetectTime": "2023-10-30T13:59:16.986258+02:00", "EventTime": "2023-10-30T13:59:16.986277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CMYZ5w1XXacr0lg9d8"]} -{"Format": "IDEA0", "ID": "6f45aef6-7b9b-4c05-9a35-2282518b0084", "DetectTime": "2023-10-30T13:59:17.026583+02:00", "EventTime": "2023-10-30T13:59:17.026601+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYxJGz2CkQ9BPmdSDk"]} -{"Format": "IDEA0", "ID": "02923412-eb4d-4624-9d09-a644f2591ac8", "DetectTime": "2023-10-30T13:59:17.051616+02:00", "EventTime": "2023-10-30T13:59:17.051637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["C44bWQ1lj302eLGQF2"]} -{"Format": "IDEA0", "ID": "6fb41ef6-d2a2-4fe8-9d81-be184f2be2e3", "DetectTime": "2023-10-30T13:59:17.089876+02:00", "EventTime": "2023-10-30T13:59:17.089896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKs0sJ2ARXweyN1DC9"]} -{"Format": "IDEA0", "ID": "95a61b9a-84a6-4cde-894b-cc643d1c4b34", "DetectTime": "2023-10-30T13:59:17.128082+02:00", "EventTime": "2023-10-30T13:59:17.128103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CBFzDCUH27WzM2fbj", "C7cRAu6fm0iUuvQ53", "CA9VVEgaROuxrzJTb", "CFu0V216vNtty9wANa"]} -{"Format": "IDEA0", "ID": "b40cc403-43d1-44b3-a462-94962fc524a8", "DetectTime": "2023-10-30T13:59:17.154607+02:00", "EventTime": "2023-10-30T13:59:17.154624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["Cqr0f82hfp3QvcLnZc"]} -{"Format": "IDEA0", "ID": "05140b02-6bdb-46a7-9c49-7a032c40c20e", "DetectTime": "2023-10-30T13:59:17.194956+02:00", "EventTime": "2023-10-30T13:59:17.194979+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CA9VVEgaROuxrzJTb"]} -{"Format": "IDEA0", "ID": "0e2f8811-db50-42fd-a651-c41bdebbf78d", "DetectTime": "2023-10-30T13:59:17.216261+02:00", "EventTime": "2023-10-30T13:59:17.216287+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXdDsG4BLontVX6VPi"]} -{"Format": "IDEA0", "ID": "95905bdf-2f61-47d6-a938-b8f051864c3c", "DetectTime": "2023-10-30T13:59:17.241061+02:00", "EventTime": "2023-10-30T13:59:17.241083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["C3sviH1Qk95dMp22j9"]} -{"Format": "IDEA0", "ID": "560c0ee8-1f90-4373-b419-ce5f0842157d", "DetectTime": "2023-10-30T13:59:17.282220+02:00", "EventTime": "2023-10-30T13:59:17.282242+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWSQZ54CkbsgoiTLsk"]} -{"Format": "IDEA0", "ID": "30233fcd-be71-40fa-8994-8ac6626f3d82", "DetectTime": "2023-10-30T13:59:17.308954+02:00", "EventTime": "2023-10-30T13:59:17.309028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CMy1JY2wrLsE2Pv94i"]} -{"Format": "IDEA0", "ID": "12d49417-c9a5-4849-a735-48607c1cb9c9", "DetectTime": "2023-10-30T13:59:17.349409+02:00", "EventTime": "2023-10-30T13:59:17.349437+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CviDnw2Ygpgr0sn4tb"]} -{"Format": "IDEA0", "ID": "8994b2d1-2808-45e0-acf2-02179da16087", "DetectTime": "2023-10-30T13:59:17.375583+02:00", "EventTime": "2023-10-30T13:59:17.375605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CcPfyE1XAkJL8T9GEh"]} -{"Format": "IDEA0", "ID": "fe45ea4a-5082-42e6-8e24-d52c23c2a729", "DetectTime": "2023-10-30T13:59:17.414530+02:00", "EventTime": "2023-10-30T13:59:17.414553+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Coq0Vw2Y03pEwuCGo"]} -{"Format": "IDEA0", "ID": "f212b821-610f-49e7-9f9e-5afa64d9b27f", "DetectTime": "2023-10-30T13:59:17.436308+02:00", "EventTime": "2023-10-30T13:59:17.436330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CaPN8a3oX9cESs3XP1"]} -{"Format": "IDEA0", "ID": "d996383c-885b-4b4b-964f-24ebc5b50ca6", "DetectTime": "2023-10-30T13:59:17.473176+02:00", "EventTime": "2023-10-30T13:59:17.473193+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CldtPL1jixs2QaOlP5"]} -{"Format": "IDEA0", "ID": "d9d89b14-d673-4725-8ad0-56515eb98925", "DetectTime": "2023-10-30T13:59:17.495165+02:00", "EventTime": "2023-10-30T13:59:17.495199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBormc3q2BdsTqXtsl"]} -{"Format": "IDEA0", "ID": "3478d1d6-de1e-477c-b627-a59532115f80", "DetectTime": "2023-10-30T13:59:17.533704+02:00", "EventTime": "2023-10-30T13:59:17.533769+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7ptIV1p5E0lAW74l5"]} -{"Format": "IDEA0", "ID": "ac9c2b82-f2b5-4962-993f-b6fe261d8ca0", "DetectTime": "2023-10-30T13:59:17.560272+02:00", "EventTime": "2023-10-30T13:59:17.560339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["ClX9x43FBLHWXARQp5"]} -{"Format": "IDEA0", "ID": "917e8585-f59f-4f2f-85a1-6dac9ab128f5", "DetectTime": "2023-10-30T13:59:17.602129+02:00", "EventTime": "2023-10-30T13:59:17.602151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CCEghWyd0aLVmpdG8"]} -{"Format": "IDEA0", "ID": "dcf3406f-a82b-4ebf-9480-ebcc97eec8f1", "DetectTime": "2023-10-30T13:59:17.641422+02:00", "EventTime": "2023-10-30T13:59:17.641445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["ChQbbR2IO3LNRxf8U"]} -{"Format": "IDEA0", "ID": "ef977d49-6608-4f9d-a241-d9ef3a4dfc3a", "DetectTime": "2023-10-30T13:59:17.685912+02:00", "EventTime": "2023-10-30T13:59:17.685938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CHtNC24WjD1DDXn8Yg"]} -{"Format": "IDEA0", "ID": "bfaf6e4e-0b3e-47e1-8ced-f6aa2fb916ad", "DetectTime": "2023-10-30T13:59:17.726744+02:00", "EventTime": "2023-10-30T13:59:17.726849+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C739UQ3mjfeGFPDTk2"]} -{"Format": "IDEA0", "ID": "3d8084fa-cdf1-4a2b-94d1-907a195975dc", "DetectTime": "2023-10-30T13:59:17.750871+02:00", "EventTime": "2023-10-30T13:59:17.750891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["ClvuCB2eRTQx8ike7i"]} -{"Format": "IDEA0", "ID": "98a32ea4-d9f9-41b0-bfc8-c9238781c5a3", "DetectTime": "2023-10-30T13:59:17.791791+02:00", "EventTime": "2023-10-30T13:59:17.791820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CBzYWm3UNrgQcBopa1", "CWSQZ54CkbsgoiTLsk", "C7ptIV1p5E0lAW74l5", "Coq0Vw2Y03pEwuCGo"]} -{"Format": "IDEA0", "ID": "a066b440-acfe-4960-8fcb-d646670961ff", "DetectTime": "2023-10-30T13:59:17.817086+02:00", "EventTime": "2023-10-30T13:59:17.817114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CvMt9g4v47FxTBjFBj"]} -{"Format": "IDEA0", "ID": "6d991de6-42be-4e3b-8d15-381723dedf1a", "DetectTime": "2023-10-30T13:59:17.858461+02:00", "EventTime": "2023-10-30T13:59:17.858481+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBzYWm3UNrgQcBopa1"]} -{"Format": "IDEA0", "ID": "766c7b45-5691-4814-a192-ff8e50c24f96", "DetectTime": "2023-10-30T13:59:17.883731+02:00", "EventTime": "2023-10-30T13:59:17.883750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CUM1tl2rY78Vhzbj96"]} -{"Format": "IDEA0", "ID": "6dea1c98-cc88-4c6d-8250-53298a94f359", "DetectTime": "2023-10-30T13:59:17.922801+02:00", "EventTime": "2023-10-30T13:59:17.922817+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C40q3R1YFOEsVx12nf"]} -{"Format": "IDEA0", "ID": "7a73101f-9d11-4977-8f0e-ac89451074ed", "DetectTime": "2023-10-30T13:59:17.944589+02:00", "EventTime": "2023-10-30T13:59:17.944607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CCInNCN1ZwEkkIRs"]} -{"Format": "IDEA0", "ID": "f3496004-f48a-4fe9-957b-27d58abf165b", "DetectTime": "2023-10-30T13:59:17.979733+02:00", "EventTime": "2023-10-30T13:59:17.979750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CafEnx7gUIcSjD6n6"]} -{"Format": "IDEA0", "ID": "4ad56d91-c27b-4da3-86b0-c41a24be1295", "DetectTime": "2023-10-30T13:59:18.009672+02:00", "EventTime": "2023-10-30T13:59:18.009698+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXCzf6s8oCa7MAvW9"]} -{"Format": "IDEA0", "ID": "784e6e3e-8047-4e8c-80f6-153ed4ec8d52", "DetectTime": "2023-10-30T13:59:18.028303+02:00", "EventTime": "2023-10-30T13:59:18.028322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.191.37.41 ", "ContentType": "text/plain"}], "uids": ["CVunPS3UV01RffRlQ5"]} -{"Format": "IDEA0", "ID": "fc5ba698-4e93-4bc3-8490-8fffb785fbd0", "DetectTime": "2023-10-30T13:59:18.062405+02:00", "EventTime": "2023-10-30T13:59:18.062455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["Cy4hrP2otyuOqeACNl"]} -{"Format": "IDEA0", "ID": "9536b68d-ea5e-4fd4-8809-47c842545d4b", "DetectTime": "2023-10-30T13:59:18.095470+02:00", "EventTime": "2023-10-30T13:59:18.095496+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtZlkP16hiuNKqrNf3"]} -{"Format": "IDEA0", "ID": "7c02bece-ae4c-4822-8bb2-fae5549b1b19", "DetectTime": "2023-10-30T13:59:18.113528+02:00", "EventTime": "2023-10-30T13:59:18.113551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CSCNg32CPKYbJqeFZi"]} -{"Format": "IDEA0", "ID": "b3f5e367-6727-4e83-8ca0-91d89ef53df3", "DetectTime": "2023-10-30T13:59:18.145477+02:00", "EventTime": "2023-10-30T13:59:18.145498+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrKxLu1v9AbnEpLRS2"]} -{"Format": "IDEA0", "ID": "3ff0c991-0a70-41d2-82aa-1a1cc014b75b", "DetectTime": "2023-10-30T13:59:18.165391+02:00", "EventTime": "2023-10-30T13:59:18.165413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["Cap95d2sitNzZM1BMh"]} -{"Format": "IDEA0", "ID": "b5563497-cba4-4545-9151-ef3431064421", "DetectTime": "2023-10-30T13:59:18.195281+02:00", "EventTime": "2023-10-30T13:59:18.195308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3mp3q1BDcJna8KaGl"]} -{"Format": "IDEA0", "ID": "9ca1c919-1210-45fd-b304-437184307d74", "DetectTime": "2023-10-30T13:59:18.213867+02:00", "EventTime": "2023-10-30T13:59:18.213888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CxJoWm20AZggyaiOTa"]} -{"Format": "IDEA0", "ID": "e4869266-d78d-4a4e-b0e5-ed660a4929ee", "DetectTime": "2023-10-30T13:59:18.246493+02:00", "EventTime": "2023-10-30T13:59:18.246516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CGyWysHvPphu4Sx9"]} -{"Format": "IDEA0", "ID": "d90ca70a-c5b6-4b68-b8ce-a7a07ccb8e07", "DetectTime": "2023-10-30T13:59:18.283086+02:00", "EventTime": "2023-10-30T13:59:18.283108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjYrY1omzqTq1Rqy6"]} -{"Format": "IDEA0", "ID": "7ab687dd-4d14-4bfc-95a5-1695d7fbb70e", "DetectTime": "2023-10-30T13:59:18.300904+02:00", "EventTime": "2023-10-30T13:59:18.300921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CTqS5Y3nnT1glMr2wj"]} -{"Format": "IDEA0", "ID": "abbae17a-edb0-4ca1-9969-d4d599aac0d9", "DetectTime": "2023-10-30T13:59:18.328676+02:00", "EventTime": "2023-10-30T13:59:18.328703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CmucsU3MhXdnmNzxqd"]} -{"Format": "IDEA0", "ID": "bea286d5-7ed0-45aa-ae25-35a14cd1570c", "DetectTime": "2023-10-30T13:59:18.355136+02:00", "EventTime": "2023-10-30T13:59:18.355153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQmVe43pVdmmnjc0gc"]} -{"Format": "IDEA0", "ID": "2800ed8a-4047-4bf7-b099-d6ae255e1470", "DetectTime": "2023-10-30T13:59:18.388470+02:00", "EventTime": "2023-10-30T13:59:18.388486+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUzmbx2EkKb9patmbl"]} -{"Format": "IDEA0", "ID": "3bf96457-1a2c-47e8-ab33-1c6621513bd9", "DetectTime": "2023-10-30T13:59:18.404177+02:00", "EventTime": "2023-10-30T13:59:18.404195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["C8VyRX33iKfUBQFfbe"]} -{"Format": "IDEA0", "ID": "c4b7b565-283e-4871-8ec4-e7d3c9a30ee0", "DetectTime": "2023-10-30T13:59:18.438457+02:00", "EventTime": "2023-10-30T13:59:18.438474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.16.187 ", "ContentType": "text/plain"}], "uids": ["CybxPb2WMufRdHxpwi"]} -{"Format": "IDEA0", "ID": "5e0a3350-cc26-4103-8040-e049a3ce1568", "DetectTime": "2023-10-30T13:59:18.468636+02:00", "EventTime": "2023-10-30T13:59:18.468661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CjYrY1omzqTq1Rqy6", "CrKxLu1v9AbnEpLRS2", "CT7xVQ1w590XrePkM5", "CXCzf6s8oCa7MAvW9"]} -{"Format": "IDEA0", "ID": "e373923c-4ef8-42cb-bf6c-c894aaf7d593", "DetectTime": "2023-10-30T13:59:18.484881+02:00", "EventTime": "2023-10-30T13:59:18.484901+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT7xVQ1w590XrePkM5"]} -{"Format": "IDEA0", "ID": "a2d3bad9-f0f8-408b-aa65-734379f7fa8c", "DetectTime": "2023-10-30T13:59:18.501001+02:00", "EventTime": "2023-10-30T13:59:18.501020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["Cns3174BW3xUS6ceh"]} -{"Format": "IDEA0", "ID": "f03bd900-2b8d-4fd5-ac53-71f129fc91d0", "DetectTime": "2023-10-30T13:59:18.533575+02:00", "EventTime": "2023-10-30T13:59:18.533598+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxKSrQ3ElZfM8pnEK8"]} -{"Format": "IDEA0", "ID": "8ebcc76c-02b6-441e-8494-1a88adff23be", "DetectTime": "2023-10-30T13:59:18.552110+02:00", "EventTime": "2023-10-30T13:59:18.552137+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTFhDb4rlXy5NR0gYc"]} -{"Format": "IDEA0", "ID": "bb376af3-e2f7-4a5d-acdf-1aef14c13a2c", "DetectTime": "2023-10-30T13:59:18.569389+02:00", "EventTime": "2023-10-30T13:59:18.569405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CudmhZ3EkcXAqjiXqb"]} -{"Format": "IDEA0", "ID": "51da3254-8973-4aff-8d75-5f856b6e3176", "DetectTime": "2023-10-30T13:59:18.601060+02:00", "EventTime": "2023-10-30T13:59:18.601084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CTKo4P1mR9fRUrKDoc"]} -{"Format": "IDEA0", "ID": "c88ca0ad-1948-4b04-885f-1949813413ac", "DetectTime": "2023-10-30T13:59:18.627524+02:00", "EventTime": "2023-10-30T13:59:18.627544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["C5ZOjx40IaKpOtqIei"]} -{"Format": "IDEA0", "ID": "624fa292-6a82-4c84-832d-4505cb9a3de9", "DetectTime": "2023-10-30T13:59:18.656136+02:00", "EventTime": "2023-10-30T13:59:18.656157+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTI0MWHmhZm2zhLed"]} -{"Format": "IDEA0", "ID": "744af769-6337-405b-beb8-f88d63950c0e", "DetectTime": "2023-10-30T13:59:18.680590+02:00", "EventTime": "2023-10-30T13:59:18.680613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.108.28.135 ", "ContentType": "text/plain"}], "uids": ["CKQVd32ZD6GUcYLjge"]} -{"Format": "IDEA0", "ID": "03244974-423e-4bc0-ad8b-4b7b830d3db7", "DetectTime": "2023-10-30T13:59:18.719781+02:00", "EventTime": "2023-10-30T13:59:18.719803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CEmGMR3zTbXQ1UGjq5"]} -{"Format": "IDEA0", "ID": "b69a0b1c-3876-4212-8820-75fa5ba01fb2", "DetectTime": "2023-10-30T13:59:18.759159+02:00", "EventTime": "2023-10-30T13:59:18.759187+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVTxAh1MXFmK3AWOx8"]} -{"Format": "IDEA0", "ID": "46e9e441-7ad3-41e9-a9bf-985628ce9cb3", "DetectTime": "2023-10-30T13:59:18.780858+02:00", "EventTime": "2023-10-30T13:59:18.780875+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCSsNtqcXWoWRnAJa"]} -{"Format": "IDEA0", "ID": "a0554243-982f-493e-abca-66aa5fbe22e9", "DetectTime": "2023-10-30T13:59:18.796243+02:00", "EventTime": "2023-10-30T13:59:18.796262+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7c3Yr1JzbWnJnWnA7"]} -{"Format": "IDEA0", "ID": "6fecd594-281d-4563-872d-30e2b86a536d", "DetectTime": "2023-10-30T13:59:18.814240+02:00", "EventTime": "2023-10-30T13:59:18.814252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["ClJMJr1vETAuVyLxj1"]} -{"Format": "IDEA0", "ID": "da11a732-038e-41ae-9c9d-b812545d8dbe", "DetectTime": "2023-10-30T13:59:18.844262+02:00", "EventTime": "2023-10-30T13:59:18.844280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CVAwrh1rxk8bPKEFN5"]} -{"Format": "IDEA0", "ID": "a5bbc9ec-44ff-4c5c-83d2-0b7b1f0b3685", "DetectTime": "2023-10-30T13:59:18.872312+02:00", "EventTime": "2023-10-30T13:59:18.872326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["C1c7kO1Wzmho7RzXAg"]} -{"Format": "IDEA0", "ID": "9503007c-14e2-4028-ba89-c85d6416c282", "DetectTime": "2023-10-30T13:59:18.899362+02:00", "EventTime": "2023-10-30T13:59:18.899382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CNSUfE257lHubv2GDa"]} -{"Format": "IDEA0", "ID": "c7339faa-c859-4bfc-b276-c576ff5778fb", "DetectTime": "2023-10-30T13:59:18.933559+02:00", "EventTime": "2023-10-30T13:59:18.933580+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSyuMi4eGoKO8jnG9j"]} -{"Format": "IDEA0", "ID": "af1110d7-df92-4ef4-8914-968a6af2a2e3", "DetectTime": "2023-10-30T13:59:18.958899+02:00", "EventTime": "2023-10-30T13:59:18.958920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyNX9T3h3XPbPUqyNj", "CTFhDb4rlXy5NR0gYc", "C7c3Yr1JzbWnJnWnA7", "CVTxAh1MXFmK3AWOx8"]} -{"Format": "IDEA0", "ID": "86fe7f09-b3e7-4ef9-bdb5-8aa9037fbf12", "DetectTime": "2023-10-30T13:59:18.984237+02:00", "EventTime": "2023-10-30T13:59:18.984257+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyNX9T3h3XPbPUqyNj"]} -{"Format": "IDEA0", "ID": "0a318aa4-9447-4c7c-b3fb-7ccec2883685", "DetectTime": "2023-10-30T13:59:19.003835+02:00", "EventTime": "2023-10-30T13:59:19.003860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["CVT0KdsKeSCueigsb"]} -{"Format": "IDEA0", "ID": "09e47b76-8523-4672-94c2-e2d2daa9ca0e", "DetectTime": "2023-10-30T13:59:19.036667+02:00", "EventTime": "2023-10-30T13:59:19.036687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CsZOYO3IgXbVH270P5"]} -{"Format": "IDEA0", "ID": "823fb86d-f8e3-454c-a89d-8c52dec1d688", "DetectTime": "2023-10-30T13:59:19.077925+02:00", "EventTime": "2023-10-30T13:59:19.077946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["CiG6kc4YBIjQ74jeE9"]} -{"Format": "IDEA0", "ID": "d5682d31-3d66-4b65-a748-5fc9cac0328e", "DetectTime": "2023-10-30T13:59:19.114586+02:00", "EventTime": "2023-10-30T13:59:19.114643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CY6bzk4KSMg8r0llaa"]} -{"Format": "IDEA0", "ID": "43afcc8e-75e7-4187-8c3e-48785ed3e433", "DetectTime": "2023-10-30T13:59:19.155202+02:00", "EventTime": "2023-10-30T13:59:19.155223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CGZm9S3WKIDeYM4G7f"]} -{"Format": "IDEA0", "ID": "6ee3b69c-d500-4bca-8118-a38d84c60116", "DetectTime": "2023-10-30T13:59:19.199691+02:00", "EventTime": "2023-10-30T13:59:19.199719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CVFpBL1bM9EXn7ZTL7"]} -{"Format": "IDEA0", "ID": "667d9a07-d2f0-4b15-a34d-a967a6d1fa41", "DetectTime": "2023-10-30T13:59:19.243156+02:00", "EventTime": "2023-10-30T13:59:19.243176+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C81cbS1jIcYXdS0o5"]} -{"Format": "IDEA0", "ID": "02b6272a-b91e-4dec-b9f1-56289fdd163b", "DetectTime": "2023-10-30T13:59:19.265680+02:00", "EventTime": "2023-10-30T13:59:19.265701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CyWzNA12BGo4EqaPj9"]} -{"Format": "IDEA0", "ID": "942ba33f-dd0a-4e24-926c-b56f5e974515", "DetectTime": "2023-10-30T13:59:19.308672+02:00", "EventTime": "2023-10-30T13:59:19.308692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["CenqdNBQBkiTdkqP2"]} -{"Format": "IDEA0", "ID": "8277cb8e-999a-4b8f-8a53-e7c444e2764d", "DetectTime": "2023-10-30T13:59:19.357211+02:00", "EventTime": "2023-10-30T13:59:19.357230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CR6VQQ31QTl6T7Ks3e"]} -{"Format": "IDEA0", "ID": "5ea65855-d911-410f-a3ee-efc8cebc33b1", "DetectTime": "2023-10-30T13:59:19.394445+02:00", "EventTime": "2023-10-30T13:59:19.394473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C2y19d4DJPwWajPVm7"]} -{"Format": "IDEA0", "ID": "d9aa73b6-a7db-4288-bc38-ec39b93dc18b", "DetectTime": "2023-10-30T13:59:19.422004+02:00", "EventTime": "2023-10-30T13:59:19.422017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["C0HxrgF55SNravS6a"]} -{"Format": "IDEA0", "ID": "9636eb51-fd5d-4c75-a3ff-aa61bcdd8581", "DetectTime": "2023-10-30T13:59:19.445185+02:00", "EventTime": "2023-10-30T13:59:19.445196+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cw22N44ANhTE5XKpLb"]} -{"Format": "IDEA0", "ID": "9ea1af19-a8a4-434d-b4b5-d93e9461d861", "DetectTime": "2023-10-30T13:59:19.458692+02:00", "EventTime": "2023-10-30T13:59:19.458710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.220.199 ", "ContentType": "text/plain"}], "uids": ["CHoYmC3lbt7Skx9Wfl"]} -{"Format": "IDEA0", "ID": "391c2ce8-8c12-480b-b447-bd3fe09451a3", "DetectTime": "2023-10-30T13:59:19.488671+02:00", "EventTime": "2023-10-30T13:59:19.488696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.53.158.246 ", "ContentType": "text/plain"}], "uids": ["CiEmWmHMmUgS2Aw5f"]} -{"Format": "IDEA0", "ID": "9cc686db-2527-46ec-9426-92a4b3931f7d", "DetectTime": "2023-10-30T13:59:19.519837+02:00", "EventTime": "2023-10-30T13:59:19.519859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CXdZsNFFxAfr5CKR4"]} -{"Format": "IDEA0", "ID": "b450c2ef-864c-42c3-91c4-c6573c46c37d", "DetectTime": "2023-10-30T13:59:19.548799+02:00", "EventTime": "2023-10-30T13:59:19.548823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CiPtlu2MgZk2OsaSKl"]} -{"Format": "IDEA0", "ID": "388ea218-146a-4c49-9af8-60c805d1c4de", "DetectTime": "2023-10-30T13:59:19.572095+02:00", "EventTime": "2023-10-30T13:59:19.572111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C5jE8W3dViQwsIsS58"]} -{"Format": "IDEA0", "ID": "be7bbcec-b129-4994-a82b-0856b2e63743", "DetectTime": "2023-10-30T13:59:19.595578+02:00", "EventTime": "2023-10-30T13:59:19.595600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cl1rnVjSfxRMGBUNd"]} -{"Format": "IDEA0", "ID": "481c4619-392d-40e1-b511-1b2a028febc2", "DetectTime": "2023-10-30T13:59:19.619444+02:00", "EventTime": "2023-10-30T13:59:19.619470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C4s6Pz37BmvOy8hXEg"]} -{"Format": "IDEA0", "ID": "72da93db-eac7-407c-aea5-535b5016b5f0", "DetectTime": "2023-10-30T13:59:19.644471+02:00", "EventTime": "2023-10-30T13:59:19.644496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CZJxtq1UEDypGvi36b"]} -{"Format": "IDEA0", "ID": "04133011-ee0f-4a4d-adbb-69b589bbae84", "DetectTime": "2023-10-30T13:59:19.666768+02:00", "EventTime": "2023-10-30T13:59:19.666861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CSzgs62IsGCgsV7y1"]} -{"Format": "IDEA0", "ID": "66be71d1-c345-4e8e-9861-83cd235dcca0", "DetectTime": "2023-10-30T13:59:19.697444+02:00", "EventTime": "2023-10-30T13:59:19.697468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CICrcKHuOc9cEpmc4"]} -{"Format": "IDEA0", "ID": "ece94925-326b-44b5-b218-cf31115edf7c", "DetectTime": "2023-10-30T13:59:19.727877+02:00", "EventTime": "2023-10-30T13:59:19.727897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C8sxRb3WPGRa2XtHpk"]} -{"Format": "IDEA0", "ID": "bdc68d71-5c4b-42ca-b83a-ad0a5c3bda84", "DetectTime": "2023-10-30T13:59:19.755897+02:00", "EventTime": "2023-10-30T13:59:19.755916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C6Eixg1aZOxiq5M9k3"]} -{"Format": "IDEA0", "ID": "f87d22a2-3865-4a1e-8d10-7bbc8c814233", "DetectTime": "2023-10-30T13:59:19.781665+02:00", "EventTime": "2023-10-30T13:59:19.781690+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBDxvX2D0CP9uyw4Jb"]} -{"Format": "IDEA0", "ID": "ee8b6d56-f1ca-4d1c-86fc-38922d2ddb53", "DetectTime": "2023-10-30T13:59:19.797200+02:00", "EventTime": "2023-10-30T13:59:19.797219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["C9xnHP3CqXPGX6jB6i"]} -{"Format": "IDEA0", "ID": "9d7f6183-c5c6-46c0-8ebb-a62030cdf8d9", "DetectTime": "2023-10-30T13:59:19.902664+02:00", "EventTime": "2023-10-30T13:59:19.902681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cv0yvtP5FMAOKhnz6"]} -{"Format": "IDEA0", "ID": "c91d30ed-ad02-4873-903b-1a908dccdbfd", "DetectTime": "2023-10-30T13:59:19.948642+02:00", "EventTime": "2023-10-30T13:59:19.948667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CXykjL1OIu57u7gdY1"]} -{"Format": "IDEA0", "ID": "92ab9b52-7445-43b7-a88f-718a59d090e7", "DetectTime": "2023-10-30T13:59:19.981151+02:00", "EventTime": "2023-10-30T13:59:19.981166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["C79C5z14aqtxPC4k2"]} -{"Format": "IDEA0", "ID": "2cd575be-e87b-4021-a46d-431028dc59d5", "DetectTime": "2023-10-30T13:59:20.014881+02:00", "EventTime": "2023-10-30T13:59:20.014906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 AS: NV-ASN CELLCOM ltd., IL AS168", "ContentType": "text/plain"}], "uids": ["CZJO6t3lxLewoEC924"]} -{"Format": "IDEA0", "ID": "19cefaf8-5bba-4bed-92f3-003fc3836c61", "DetectTime": "2023-10-30T13:59:20.042562+02:00", "EventTime": "2023-10-30T13:59:20.042588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CzkIUg4RzCZoTVes1g"]} -{"Format": "IDEA0", "ID": "1af8e4fb-a24f-4b51-bf0e-5b7e4fdcef5b", "DetectTime": "2023-10-30T13:59:20.070639+02:00", "EventTime": "2023-10-30T13:59:20.070657+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CycFmF3c9ST5IZLhh1"]} -{"Format": "IDEA0", "ID": "d42f6b41-ff18-441e-addf-c189cf3428a3", "DetectTime": "2023-10-30T13:59:20.087291+02:00", "EventTime": "2023-10-30T13:59:20.087307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["CtsUw01vvyTfVOTqB7"]} -{"Format": "IDEA0", "ID": "bc982242-24c4-47f3-bcd1-9e85290f223c", "DetectTime": "2023-10-30T13:59:20.113008+02:00", "EventTime": "2023-10-30T13:59:20.113034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Caz0fUN5Q2Ky7mqtb"]} -{"Format": "IDEA0", "ID": "ce602457-028e-4367-9223-2cc015aa039a", "DetectTime": "2023-10-30T13:59:20.139871+02:00", "EventTime": "2023-10-30T13:59:20.139892+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CB4KIY3fob5Jnfpobe"]} -{"Format": "IDEA0", "ID": "66191fc3-69ca-47b0-aa1e-322a01c72316", "DetectTime": "2023-10-30T13:59:20.155826+02:00", "EventTime": "2023-10-30T13:59:20.155851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cg0wlF1SDZKWIlX6z4"]} -{"Format": "IDEA0", "ID": "59095f0b-67b5-4e17-9830-33d2a97817cd", "DetectTime": "2023-10-30T13:59:20.184101+02:00", "EventTime": "2023-10-30T13:59:20.184117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CP0ddZfCcPuiJuRTi"]} -{"Format": "IDEA0", "ID": "d68362a1-2e31-4c62-b20a-4b21d6598235", "DetectTime": "2023-10-30T13:59:20.203174+02:00", "EventTime": "2023-10-30T13:59:20.203187+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C59Hax4P8fTNgfUKF3"]} -{"Format": "IDEA0", "ID": "101be85d-73be-4ca3-9798-9fb3bdb60b9f", "DetectTime": "2023-10-30T13:59:20.218422+02:00", "EventTime": "2023-10-30T13:59:20.218449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CXvFov1DydGYVkY2H"]} -{"Format": "IDEA0", "ID": "2a2603b8-6faa-48b5-8f00-7c721aa5e28e", "DetectTime": "2023-10-30T13:59:20.242478+02:00", "EventTime": "2023-10-30T13:59:20.242501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CRXWDK3tty9WIyoK7e"]} -{"Format": "IDEA0", "ID": "30628657-7b13-42f3-ad05-beb0f02f0473", "DetectTime": "2023-10-30T13:59:20.265662+02:00", "EventTime": "2023-10-30T13:59:20.265679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CXprF31FcrmMte5hO5"]} -{"Format": "IDEA0", "ID": "38ec0080-46a4-411b-a1ba-ff607ddb1b6e", "DetectTime": "2023-10-30T13:59:20.290463+02:00", "EventTime": "2023-10-30T13:59:20.290481+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGrBPIDyS3PcvKUC3"]} -{"Format": "IDEA0", "ID": "fbab0d42-68d2-4945-b971-59ff2af6a7be", "DetectTime": "2023-10-30T13:59:20.308482+02:00", "EventTime": "2023-10-30T13:59:20.308498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["C1ZHNI2L1QkhQM6E2g"]} -{"Format": "IDEA0", "ID": "5a65a2f9-7790-49c5-9a95-b9094d180243", "DetectTime": "2023-10-30T13:59:20.330222+02:00", "EventTime": "2023-10-30T13:59:20.330238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["COp4aY1JX2UG4IJtW2"]} -{"Format": "IDEA0", "ID": "19d585a9-7fa2-434f-a668-945635768a4e", "DetectTime": "2023-10-30T13:59:20.355854+02:00", "EventTime": "2023-10-30T13:59:20.355870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 AS: NV-ASN CELLCOM ltd., IL AS168", "ContentType": "text/plain"}], "uids": ["CJPRoH3jizsT7QMgd"]} -{"Format": "IDEA0", "ID": "091eed31-8403-438d-b88f-3fa047005362", "DetectTime": "2023-10-30T13:59:20.379611+02:00", "EventTime": "2023-10-30T13:59:20.379622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYm81Cd6eRZGWsMQi", "Cw22N44ANhTE5XKpLb", "CycFmF3c9ST5IZLhh1", "C59Hax4P8fTNgfUKF3"]} -{"Format": "IDEA0", "ID": "32227945-9fba-4308-8510-23c15e739f2f", "DetectTime": "2023-10-30T13:59:20.395323+02:00", "EventTime": "2023-10-30T13:59:20.395340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYm81Cd6eRZGWsMQi"]} -{"Format": "IDEA0", "ID": "68c84732-182f-4c2f-9d67-7ed125c419eb", "DetectTime": "2023-10-30T13:59:20.411202+02:00", "EventTime": "2023-10-30T13:59:20.411216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CSr8Wq4OMojMnxoM3j"]} -{"Format": "IDEA0", "ID": "edba1b3b-8a9c-40fc-983f-ed4917dd520a", "DetectTime": "2023-10-30T13:59:20.437642+02:00", "EventTime": "2023-10-30T13:59:20.437660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["C1MnUB4WfPMU4bilP5"]} -{"Format": "IDEA0", "ID": "c44a0954-a1d5-4bff-931e-5fb24ebcf77d", "DetectTime": "2023-10-30T13:59:20.466023+02:00", "EventTime": "2023-10-30T13:59:20.466042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CUnbsQ1SLOuLMShcX1"]} -{"Format": "IDEA0", "ID": "1f2f889e-7d7b-4bde-ba3c-dd1688e1582c", "DetectTime": "2023-10-30T13:59:20.508740+02:00", "EventTime": "2023-10-30T13:59:20.508760+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0c02K1lcFlFngz1vk"]} -{"Format": "IDEA0", "ID": "4b9f10fa-8ed9-4a5d-81d6-decc6aa23097", "DetectTime": "2023-10-30T13:59:20.532100+02:00", "EventTime": "2023-10-30T13:59:20.532171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Hostname": ["fiber.htshostings.be"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 AS: EDPNET, BE AS9031 rDNS: fiber.htshostings.be", "ContentType": "text/plain"}], "uids": ["CL6nfG1LbdQicG4s6f"]} -{"Format": "IDEA0", "ID": "30e0c1ca-9549-4a5b-b26e-fc3d21a4566e", "DetectTime": "2023-10-30T13:59:20.567052+02:00", "EventTime": "2023-10-30T13:59:20.567070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 ", "ContentType": "text/plain"}], "uids": ["C57YIc2y9KUTWucnLg"]} -{"Format": "IDEA0", "ID": "b316238e-3e96-49cd-b9cb-86ff5a13a79e", "DetectTime": "2023-10-30T13:59:20.594448+02:00", "EventTime": "2023-10-30T13:59:20.594468+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT6GMZ3PbofQg5bILd"]} -{"Format": "IDEA0", "ID": "3d1c1bdb-48fb-47f1-b1a5-f5fe3169f85c", "DetectTime": "2023-10-30T13:59:20.610910+02:00", "EventTime": "2023-10-30T13:59:20.610928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["C7sLLUWKyDmZfnNJe"]} -{"Format": "IDEA0", "ID": "eebbe103-322c-4248-8a1d-a27649c31d0d", "DetectTime": "2023-10-30T13:59:20.629766+02:00", "EventTime": "2023-10-30T13:59:20.629776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CG4C8a2nEBfntQnkRb"]} -{"Format": "IDEA0", "ID": "54adba36-c7c2-4849-b29e-cad21e48a762", "DetectTime": "2023-10-30T13:59:20.657671+02:00", "EventTime": "2023-10-30T13:59:20.657699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.138.111 ", "ContentType": "text/plain"}], "uids": ["Cm0LoD2FuQDMKoNyr8"]} -{"Format": "IDEA0", "ID": "19cef22a-a15c-44d6-9926-e7ce8c4a7d8e", "DetectTime": "2023-10-30T13:59:20.689590+02:00", "EventTime": "2023-10-30T13:59:20.689607+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBS84FpBFYMUeWr24"]} -{"Format": "IDEA0", "ID": "2aea3920-dc07-4abe-a49f-e377d1432e18", "DetectTime": "2023-10-30T13:59:20.705398+02:00", "EventTime": "2023-10-30T13:59:20.705415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CtPWwu2WabokdeU749"]} -{"Format": "IDEA0", "ID": "4dfdc7fc-0e85-4ae3-a238-ec99990bda41", "DetectTime": "2023-10-30T13:59:20.730150+02:00", "EventTime": "2023-10-30T13:59:20.730168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["C7FMGR1hCG4ZDx561l"]} -{"Format": "IDEA0", "ID": "855f1f36-e4e4-4f28-9b22-80bfffc3d62c", "DetectTime": "2023-10-30T13:59:20.754500+02:00", "EventTime": "2023-10-30T13:59:20.754513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["C17XvEueJMInKKyo8"]} -{"Format": "IDEA0", "ID": "b1900ec3-c47f-4325-9471-20fdb0a24253", "DetectTime": "2023-10-30T13:59:20.783586+02:00", "EventTime": "2023-10-30T13:59:20.783614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["Cq6ilQ3YJ41MjBm118"]} -{"Format": "IDEA0", "ID": "328066e4-120a-413f-a13c-b90fce8e4b04", "DetectTime": "2023-10-30T13:59:20.808730+02:00", "EventTime": "2023-10-30T13:59:20.808755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CBlDpm2dKJyY4l5cZ"]} -{"Format": "IDEA0", "ID": "a37fd97b-4687-4dc2-a331-231ecf7ed501", "DetectTime": "2023-10-30T13:59:20.834181+02:00", "EventTime": "2023-10-30T13:59:20.834199+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGaZf11qsNRi7m0Fp3"]} -{"Format": "IDEA0", "ID": "9f4a94e1-aac9-4906-bdb2-9f4bc7f105e6", "DetectTime": "2023-10-30T13:59:20.851757+02:00", "EventTime": "2023-10-30T13:59:20.851783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["CcEa85PSqUtQOQXoc"]} -{"Format": "IDEA0", "ID": "8c7b2830-41d1-4156-98e4-535e5a2b90a2", "DetectTime": "2023-10-30T13:59:20.883682+02:00", "EventTime": "2023-10-30T13:59:20.883700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CnBuMm1Dz3agz59UNl"]} -{"Format": "IDEA0", "ID": "92d6f43a-5ad7-4333-867e-ded2f035aa0b", "DetectTime": "2023-10-30T13:59:20.909952+02:00", "EventTime": "2023-10-30T13:59:20.909973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CMTMbg1S6XQ5y97egh"]} -{"Format": "IDEA0", "ID": "c950587a-54e2-4ba3-b44d-1f1d201f9ae2", "DetectTime": "2023-10-30T13:59:20.936137+02:00", "EventTime": "2023-10-30T13:59:20.936162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CfZetp4pqqjHX6qx1i"]} -{"Format": "IDEA0", "ID": "8a676645-302b-42ca-b3bd-a3b1d28b6d0c", "DetectTime": "2023-10-30T13:59:20.956782+02:00", "EventTime": "2023-10-30T13:59:20.956792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Hostname": ["fiber.htshostings.be"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 AS: EDPNET, BE AS9031 rDNS: fiber.htshostings.be", "ContentType": "text/plain"}], "uids": ["CocRq441LrYMCyESPj"]} -{"Format": "IDEA0", "ID": "8cdbd4c9-9fbb-4cca-b064-1f350daeec4c", "DetectTime": "2023-10-30T13:59:20.981533+02:00", "EventTime": "2023-10-30T13:59:20.981549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["Cp6n7X2pDpCIbk3yE4"]} -{"Format": "IDEA0", "ID": "fdcc2a21-7c00-4ed4-919c-6dac3c248a9d", "DetectTime": "2023-10-30T13:59:21.006966+02:00", "EventTime": "2023-10-30T13:59:21.006983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CxJ5jc39w6nqLBySC2"]} -{"Format": "IDEA0", "ID": "25c74b44-7cea-4e5b-b74e-97b177eaa721", "DetectTime": "2023-10-30T13:59:21.029728+02:00", "EventTime": "2023-10-30T13:59:21.029753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CTL7S13r47E9hY4t95"]} -{"Format": "IDEA0", "ID": "0779d546-d9b4-48b5-99fc-cdb3dd4a96be", "DetectTime": "2023-10-30T13:59:21.055532+02:00", "EventTime": "2023-10-30T13:59:21.055551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["ChwqQH25za2tU7XeD6"]} -{"Format": "IDEA0", "ID": "b7281048-0187-453b-b04b-33bda77593ec", "DetectTime": "2023-10-30T13:59:21.079235+02:00", "EventTime": "2023-10-30T13:59:21.079255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["C9J4Ik4JsGwGZFXUV8"]} -{"Format": "IDEA0", "ID": "ee5c5443-5024-436e-ab1f-70618373f096", "DetectTime": "2023-10-30T13:59:21.100221+02:00", "EventTime": "2023-10-30T13:59:21.100238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["C4Lz66o0Yh5wS3Lw5"]} -{"Format": "IDEA0", "ID": "0f7f1984-3c5e-4509-9fdd-c70d2e6eae51", "DetectTime": "2023-10-30T13:59:21.130194+02:00", "EventTime": "2023-10-30T13:59:21.130211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.49.56.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.49.56.170 ", "ContentType": "text/plain"}], "uids": ["CezZYACXNj8IVVLt6"]} -{"Format": "IDEA0", "ID": "c20a4073-dff3-4e70-8b74-42891cfede3d", "DetectTime": "2023-10-30T13:59:21.154368+02:00", "EventTime": "2023-10-30T13:59:21.154384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CNWAVS36uncpcVtev5"]} -{"Format": "IDEA0", "ID": "68d0720b-c4e0-4d90-b4cd-e0f046f48673", "DetectTime": "2023-10-30T13:59:21.180468+02:00", "EventTime": "2023-10-30T13:59:21.180479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CEdj4sD2kiMi4oWk5"]} -{"Format": "IDEA0", "ID": "b548a1e3-ed95-4a1b-98e6-90671acf536e", "DetectTime": "2023-10-30T13:59:21.208990+02:00", "EventTime": "2023-10-30T13:59:21.209012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["CaBU6x17SG4Sx63ATc"]} -{"Format": "IDEA0", "ID": "f46f18bc-77f7-43be-bc56-5c28a8628701", "DetectTime": "2023-10-30T13:59:21.231176+02:00", "EventTime": "2023-10-30T13:59:21.231196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CaIArw4pH9iSO7q3ja"]} -{"Format": "IDEA0", "ID": "f60cede9-5a4c-4885-b8fc-dbaf43a014a3", "DetectTime": "2023-10-30T13:59:21.258149+02:00", "EventTime": "2023-10-30T13:59:21.258176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C3Zp3RqaPmV2OS3uf"]} -{"Format": "IDEA0", "ID": "4a521849-814c-40c8-8640-c1959a47e51f", "DetectTime": "2023-10-30T13:59:21.281993+02:00", "EventTime": "2023-10-30T13:59:21.282006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cj3O9d1EIOA66qASG5"]} -{"Format": "IDEA0", "ID": "0213ec35-441e-43de-9534-4e60af8a04e4", "DetectTime": "2023-10-30T13:59:21.305815+02:00", "EventTime": "2023-10-30T13:59:21.305843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CF7cGR1pNhYwQYITwc"]} -{"Format": "IDEA0", "ID": "f83cdd33-c48f-4f6b-b118-d2e3c895fe0d", "DetectTime": "2023-10-30T13:59:21.328648+02:00", "EventTime": "2023-10-30T13:59:21.328664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CBbGitH1gK9lhtab9"]} -{"Format": "IDEA0", "ID": "0613d4fa-e106-4954-ae26-8a1a7aa2d9c5", "DetectTime": "2023-10-30T13:59:21.359896+02:00", "EventTime": "2023-10-30T13:59:21.359980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CFR1Zh1JRDISFYs7og"]} -{"Format": "IDEA0", "ID": "a710f63c-6a3b-49e1-b468-970368483838", "DetectTime": "2023-10-30T13:59:21.381576+02:00", "EventTime": "2023-10-30T13:59:21.381595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.67.185.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.67.185.152 ", "ContentType": "text/plain"}], "uids": ["CigB8T3tBaxeL2n9vf"]} -{"Format": "IDEA0", "ID": "40b14058-4fcc-4e21-9ce1-fe53b1c2fa07", "DetectTime": "2023-10-30T13:59:21.405945+02:00", "EventTime": "2023-10-30T13:59:21.405962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CJMKPx2AOarBovzn22"]} -{"Format": "IDEA0", "ID": "8beffde4-2aa8-411f-9601-fcdfe69d21ee", "DetectTime": "2023-10-30T13:59:21.432043+02:00", "EventTime": "2023-10-30T13:59:21.432064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.152.56 ", "ContentType": "text/plain"}], "uids": ["CnkvGC4MNWBLMXTMb9"]} -{"Format": "IDEA0", "ID": "5b15fa67-af62-4172-852c-64300ca721f5", "DetectTime": "2023-10-30T13:59:21.455569+02:00", "EventTime": "2023-10-30T13:59:21.455593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CzMqRt1RlaWWFioK2b"]} -{"Format": "IDEA0", "ID": "9a899a3c-9373-4bda-a993-4ed45f32201e", "DetectTime": "2023-10-30T13:59:21.479715+02:00", "EventTime": "2023-10-30T13:59:21.479733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CRvFid1exQMl2O3v1g"]} -{"Format": "IDEA0", "ID": "6e5e0290-b820-4b19-ba90-a3bfc5d278a9", "DetectTime": "2023-10-30T13:59:21.505252+02:00", "EventTime": "2023-10-30T13:59:21.505268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["Cpg9mG2kKphoBSic24"]} -{"Format": "IDEA0", "ID": "4e2c9b82-24f5-4264-9bdc-015651938156", "DetectTime": "2023-10-30T13:59:21.536695+02:00", "EventTime": "2023-10-30T13:59:21.536710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIu4ii28TCopzGyo7e"]} -{"Format": "IDEA0", "ID": "47ac2e3f-2fa5-457b-8e1e-aea17e49cbfc", "DetectTime": "2023-10-30T13:59:21.559627+02:00", "EventTime": "2023-10-30T13:59:21.559648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CEXjQt3yoftRuBeHQ8"]} -{"Format": "IDEA0", "ID": "9429b89a-a8cf-4831-bee0-3d17d47474f1", "DetectTime": "2023-10-30T13:59:21.577829+02:00", "EventTime": "2023-10-30T13:59:21.577845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CnMXzg4YA3zN5tkUpg"]} -{"Format": "IDEA0", "ID": "d36c6353-c3f4-4e85-a916-b83c23bade8e", "DetectTime": "2023-10-30T13:59:21.602875+02:00", "EventTime": "2023-10-30T13:59:21.602887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CZFPOx2kVtkOdeLYxe"]} -{"Format": "IDEA0", "ID": "afbb92b0-0d60-42bc-a083-76a5241f589c", "DetectTime": "2023-10-30T13:59:21.626696+02:00", "EventTime": "2023-10-30T13:59:21.626707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.14.192.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.14.192.40 ", "ContentType": "text/plain"}], "uids": ["CGPQmi2ePzbYhAgeie"]} -{"Format": "IDEA0", "ID": "b664ccd0-d9f0-40c1-9754-9470b74f49e6", "DetectTime": "2023-10-30T13:59:21.646650+02:00", "EventTime": "2023-10-30T13:59:21.646661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.93.177 ", "ContentType": "text/plain"}], "uids": ["CeovMG1ONtacU8lXJ8"]} -{"Format": "IDEA0", "ID": "7e5a5bec-80ad-43da-bf0f-9e9224302390", "DetectTime": "2023-10-30T13:59:21.666880+02:00", "EventTime": "2023-10-30T13:59:21.666896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.78.204.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.78.204.180 ", "ContentType": "text/plain"}], "uids": ["C9A0Eraony8qIt953"]} -{"Format": "IDEA0", "ID": "9670120a-5059-420d-900b-9ce8894ea72d", "DetectTime": "2023-10-30T13:59:21.687322+02:00", "EventTime": "2023-10-30T13:59:21.687342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.124.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.124.244 ", "ContentType": "text/plain"}], "uids": ["CDDcRy3lpbBIeXuPB8"]} -{"Format": "IDEA0", "ID": "4d5da3cd-899f-4e8a-baff-d1cf53691a58", "DetectTime": "2023-10-30T13:59:21.707767+02:00", "EventTime": "2023-10-30T13:59:21.707778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CZ88g3IsFNzWaaPAa"]} -{"Format": "IDEA0", "ID": "be7f7622-b37a-47ad-9763-8ab3e20acc30", "DetectTime": "2023-10-30T13:59:21.727533+02:00", "EventTime": "2023-10-30T13:59:21.727549+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cm9dCT3NKVYPffwqol"]} -{"Format": "IDEA0", "ID": "9c98dfa2-0f0e-47ed-af62-9f02b6eac936", "DetectTime": "2023-10-30T13:59:21.742651+02:00", "EventTime": "2023-10-30T13:59:21.742671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["Cyler23SvTT8Mzo2Pk"]} -{"Format": "IDEA0", "ID": "082149bc-8ee5-4d09-bb6b-ac95b23f3267", "DetectTime": "2023-10-30T13:59:21.765976+02:00", "EventTime": "2023-10-30T13:59:21.765999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Hostname": ["fiber.htshostings.be"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 AS: EDPNET, BE AS9031 rDNS: fiber.htshostings.be", "ContentType": "text/plain"}], "uids": ["CbIPTf2RmvATUfaIch"]} -{"Format": "IDEA0", "ID": "e664d4e0-108c-41cd-86ee-ee83782acf77", "DetectTime": "2023-10-30T13:59:21.786948+02:00", "EventTime": "2023-10-30T13:59:21.786966+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C19OYp2Ip5uDWrFWDf"]} -{"Format": "IDEA0", "ID": "3c3f8f75-b484-40c8-8b02-29a60ac3bbc4", "DetectTime": "2023-10-30T13:59:21.800549+02:00", "EventTime": "2023-10-30T13:59:21.800565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.230.122.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.230.122.110 ", "ContentType": "text/plain"}], "uids": ["C4pbXy1gE5X6TFTobj"]} -{"Format": "IDEA0", "ID": "4dcd82bd-021f-447d-bc78-0602404200c9", "DetectTime": "2023-10-30T13:59:21.824246+02:00", "EventTime": "2023-10-30T13:59:21.824261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CiGOxg4IvYGO3aVMOl"]} -{"Format": "IDEA0", "ID": "ee00b00e-45a5-4384-9f46-abf157845b01", "DetectTime": "2023-10-30T13:59:21.850845+02:00", "EventTime": "2023-10-30T13:59:21.850862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.147.65 AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS2077", "ContentType": "text/plain"}], "uids": ["C7PaqBes7n95asAf4"]} -{"Format": "IDEA0", "ID": "eef35c51-4641-4620-a000-0efed6565dad", "DetectTime": "2023-10-30T13:59:21.871054+02:00", "EventTime": "2023-10-30T13:59:21.871072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["Cm4gP2lYGfbgFIINb"]} -{"Format": "IDEA0", "ID": "e2173cd3-c6c3-40b7-9841-6ccf2d1f8a6b", "DetectTime": "2023-10-30T13:59:21.889828+02:00", "EventTime": "2023-10-30T13:59:21.889844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CDWat5t6X3RdIqhbf"]} -{"Format": "IDEA0", "ID": "d1dc2a91-f51e-4d84-9591-f7518c281bce", "DetectTime": "2023-10-30T13:59:21.909582+02:00", "EventTime": "2023-10-30T13:59:21.909599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.37.238 ", "ContentType": "text/plain"}], "uids": ["CcUv3E4IUpGlhRqM66"]} -{"Format": "IDEA0", "ID": "cc2610a7-c698-4fba-8259-0dc420ba3145", "DetectTime": "2023-10-30T13:59:21.930281+02:00", "EventTime": "2023-10-30T13:59:21.930297+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4zIDq1TZeY6se6e82"]} -{"Format": "IDEA0", "ID": "c7c224f2-963f-42ba-91af-9ea22f309144", "DetectTime": "2023-10-30T13:59:21.944050+02:00", "EventTime": "2023-10-30T13:59:21.944065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.100.38.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.100.38.245 ", "ContentType": "text/plain"}], "uids": ["Cs7L4B4mYo2QNMsLz5"]} -{"Format": "IDEA0", "ID": "bcea72cd-c372-4d8b-86ce-5c3d721a4478", "DetectTime": "2023-10-30T13:59:21.966959+02:00", "EventTime": "2023-10-30T13:59:21.966979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcDrbm2LJ7urxngft3"]} -{"Format": "IDEA0", "ID": "d9b0c90e-3afc-46bb-90d9-9783aab6173c", "DetectTime": "2023-10-30T13:59:21.990284+02:00", "EventTime": "2023-10-30T13:59:21.990303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CGaZf11qsNRi7m0Fp3", "CT6GMZ3PbofQg5bILd", "C19OYp2Ip5uDWrFWDf", "ChXXxl2SQFF7avBVN7"]} -{"Format": "IDEA0", "ID": "4efe6194-cd5b-4bbf-bcdd-6038eeafac7f", "DetectTime": "2023-10-30T13:59:22.004953+02:00", "EventTime": "2023-10-30T13:59:22.004969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS804", "ContentType": "text/plain"}], "uids": ["CIlEU32TsK3rcVRNqg"]} -{"Format": "IDEA0", "ID": "d18db836-4b19-493b-8ab4-2b9d7f2c1aad", "DetectTime": "2023-10-30T13:59:22.029056+02:00", "EventTime": "2023-10-30T13:59:22.029068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChXXxl2SQFF7avBVN7"]} -{"Format": "IDEA0", "ID": "acddebf0-1848-4279-b68f-ed2f1b1d6bc6", "DetectTime": "2023-10-30T13:59:22.040622+02:00", "EventTime": "2023-10-30T13:59:22.040638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["COY9fD2DKAUbzSpKq4"]} -{"Format": "IDEA0", "ID": "02664008-aee6-4ec8-8745-126b9e54e60c", "DetectTime": "2023-10-30T13:59:22.080702+02:00", "EventTime": "2023-10-30T13:59:22.080722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["Ckin8G1hOCBdRHKabd"]} -{"Format": "IDEA0", "ID": "fb03ebc0-e4d3-4bf0-8df4-3351c691b09f", "DetectTime": "2023-10-30T13:59:22.103657+02:00", "EventTime": "2023-10-30T13:59:22.103674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.36.77.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.36.77.163 ", "ContentType": "text/plain"}], "uids": ["CMe8WW3e62HYjyQEle"]} -{"Format": "IDEA0", "ID": "0294ba64-d2a2-4fc3-b128-9c6147b07bee", "DetectTime": "2023-10-30T13:59:22.128582+02:00", "EventTime": "2023-10-30T13:59:22.128602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["Cp1MPX2spiLsvCEsM5"]} -{"Format": "IDEA0", "ID": "0946a93f-aa99-474a-9079-d5baaec9eb99", "DetectTime": "2023-10-30T13:59:22.152999+02:00", "EventTime": "2023-10-30T13:59:22.153020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.136.52.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.136.52.21 ", "ContentType": "text/plain"}], "uids": ["CBrixT1MLDEcnc5XLg"]} -{"Format": "IDEA0", "ID": "fbec71ed-8608-4491-adc6-a3003b155358", "DetectTime": "2023-10-30T13:59:22.176490+02:00", "EventTime": "2023-10-30T13:59:22.176510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CdRogd29exrvzZgJ1e"]} -{"Format": "IDEA0", "ID": "257b6d3e-fad6-4fd8-a452-963f2394ed6d", "DetectTime": "2023-10-30T13:59:22.199834+02:00", "EventTime": "2023-10-30T13:59:22.199845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CqIWNm2FBtQQOe1aNc"]} -{"Format": "IDEA0", "ID": "15602494-9ac6-4045-8e07-9d4aa20feb0a", "DetectTime": "2023-10-30T13:59:22.220044+02:00", "EventTime": "2023-10-30T13:59:22.220059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.35.134.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.35.134.209 ", "ContentType": "text/plain"}], "uids": ["Cz6yec4f9VgrUHsHEj"]} -{"Format": "IDEA0", "ID": "aa50720a-50c0-46f4-9de1-36fca59f2d3d", "DetectTime": "2023-10-30T13:59:22.240324+02:00", "EventTime": "2023-10-30T13:59:22.240334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.251.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.251.54 ", "ContentType": "text/plain"}], "uids": ["C7Cwcc2F9JHxgFWRjb"]} -{"Format": "IDEA0", "ID": "9fbf38ae-a556-478d-bc4a-1c9965dd04c1", "DetectTime": "2023-10-30T13:59:22.260034+02:00", "EventTime": "2023-10-30T13:59:22.260046+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUmM7M32ebGdsfINT2"]} -{"Format": "IDEA0", "ID": "a192038c-b0df-4ee1-9433-55b00ad80c51", "DetectTime": "2023-10-30T13:59:22.273769+02:00", "EventTime": "2023-10-30T13:59:22.273786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["CT1Aer2IBs5Lki7r3g"]} -{"Format": "IDEA0", "ID": "4a6d33a1-a6aa-408e-bc4d-40d3e71a68fb", "DetectTime": "2023-10-30T13:59:22.295458+02:00", "EventTime": "2023-10-30T13:59:22.295475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.24.145.94 ", "ContentType": "text/plain"}], "uids": ["CNEw6W32xSyAaLLmrb"]} -{"Format": "IDEA0", "ID": "5679f288-711c-4c5a-a284-69448f3b537e", "DetectTime": "2023-10-30T13:59:22.316815+02:00", "EventTime": "2023-10-30T13:59:22.316827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CZvttt4rvDB03Xkf0e"]} -{"Format": "IDEA0", "ID": "0738dc50-2ffe-4d43-89ac-5ffb7eb85f49", "DetectTime": "2023-10-30T13:59:22.340167+02:00", "EventTime": "2023-10-30T13:59:22.340184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["Cla1FIFHQjwyRDOx8"]} -{"Format": "IDEA0", "ID": "23dbd90c-2b53-4173-b832-4492dd40a820", "DetectTime": "2023-10-30T13:59:22.364886+02:00", "EventTime": "2023-10-30T13:59:22.364904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.151.42.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.151.42.78 ", "ContentType": "text/plain"}], "uids": ["CMDzWNxXcdHQJhh7e"]} -{"Format": "IDEA0", "ID": "681d8353-b3eb-4eea-81ea-d759164f9156", "DetectTime": "2023-10-30T13:59:22.388820+02:00", "EventTime": "2023-10-30T13:59:22.388835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CiqJTp1R0I9jAQrww6"]} -{"Format": "IDEA0", "ID": "387d3605-121c-4e1d-bad1-07a5955fa486", "DetectTime": "2023-10-30T13:59:22.411506+02:00", "EventTime": "2023-10-30T13:59:22.411533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cnuzhm1pBQSbwr5NO5"]} -{"Format": "IDEA0", "ID": "542d4d97-f1fa-4f3e-a8b0-0a39e041903c", "DetectTime": "2023-10-30T13:59:22.431937+02:00", "EventTime": "2023-10-30T13:59:22.431952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CGJoI633kd8W1zZvx8"]} -{"Format": "IDEA0", "ID": "e189d731-5ac9-4568-99df-49e15927355b", "DetectTime": "2023-10-30T13:59:22.457364+02:00", "EventTime": "2023-10-30T13:59:22.457377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CTgjgx3vW7hWMs5zol"]} -{"Format": "IDEA0", "ID": "e55527c0-0d13-42c1-be77-a08df1eea4d9", "DetectTime": "2023-10-30T13:59:22.486237+02:00", "EventTime": "2023-10-30T13:59:22.486253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CWtvL56vzRPihRx9h"]} -{"Format": "IDEA0", "ID": "f9ff73bf-f4d9-4b1b-8a07-34eb92ee64f4", "DetectTime": "2023-10-30T13:59:22.507781+02:00", "EventTime": "2023-10-30T13:59:22.507794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CdVUxR38FoR9K0sp44"]} -{"Format": "IDEA0", "ID": "1e749447-0251-462e-9397-1940fc8bb9e9", "DetectTime": "2023-10-30T13:59:22.530535+02:00", "EventTime": "2023-10-30T13:59:22.530550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.132.237.117 AS: NV-ASN CELLCOM ltd., IL AS168", "ContentType": "text/plain"}], "uids": ["C3weBDjrrqEHyHDWg"]} -{"Format": "IDEA0", "ID": "83b12ab7-f29e-4873-aa79-b5a875194a1a", "DetectTime": "2023-10-30T13:59:22.551491+02:00", "EventTime": "2023-10-30T13:59:22.551507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.238.65.44 ", "ContentType": "text/plain"}], "uids": ["CPd2Xi3XzDkI3a1wbh"]} -{"Format": "IDEA0", "ID": "e205c3fb-48b9-4fc8-816a-3271059f0fcb", "DetectTime": "2023-10-30T13:59:22.573851+02:00", "EventTime": "2023-10-30T13:59:22.573869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.78.76.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.78.76.87 ", "ContentType": "text/plain"}], "uids": ["CYOwEw1I1MZ3xAJnm7"]} -{"Format": "IDEA0", "ID": "450b91d1-58ec-41c3-b238-53b316bcca2b", "DetectTime": "2023-10-30T13:59:22.594867+02:00", "EventTime": "2023-10-30T13:59:22.594884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.54.105.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.54.105.83 ", "ContentType": "text/plain"}], "uids": ["C7Fepq6gFkzES7Pw"]} -{"Format": "IDEA0", "ID": "a9290125-d989-47cf-b3ef-1147fbd1e86d", "DetectTime": "2023-10-30T13:59:22.616799+02:00", "EventTime": "2023-10-30T13:59:22.616811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CeGEQG2T3hI79AoM1h"]} -{"Format": "IDEA0", "ID": "402e7915-43ac-411f-87d0-0c0874b6b0bb", "DetectTime": "2023-10-30T13:59:22.635322+02:00", "EventTime": "2023-10-30T13:59:22.635333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.41.37.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.41.37.148 ", "ContentType": "text/plain"}], "uids": ["CCaKNy4JErxCTVxQhh"]} -{"Format": "IDEA0", "ID": "6e02ddbc-3722-449a-9245-ac8741719f41", "DetectTime": "2023-10-30T13:59:22.656293+02:00", "EventTime": "2023-10-30T13:59:22.656307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CPUxrq3kKDBZqw8lRg"]} -{"Format": "IDEA0", "ID": "b203193a-3ea4-4f87-9502-7243e1847c39", "DetectTime": "2023-10-30T13:59:22.677874+02:00", "EventTime": "2023-10-30T13:59:22.677885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.85.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.85.34 ", "ContentType": "text/plain"}], "uids": ["Cyjm9r3KFjeQ3L7ZRd"]} -{"Format": "IDEA0", "ID": "3da8365a-0b9a-46cf-898c-ee9838593a44", "DetectTime": "2023-10-30T13:59:22.698320+02:00", "EventTime": "2023-10-30T13:59:22.698333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.55.163 ", "ContentType": "text/plain"}], "uids": ["CQ9P6mjNjmryWSz2i"]} -{"Format": "IDEA0", "ID": "6f462f2d-e5db-4860-abb7-7c35ba9bb20e", "DetectTime": "2023-10-30T13:59:22.722642+02:00", "EventTime": "2023-10-30T13:59:22.722662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.56.174.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.56.174.85 ", "ContentType": "text/plain"}], "uids": ["C9D2jI2CeDLWDBPLSe"]} -{"Format": "IDEA0", "ID": "c8dd819b-3c21-4087-a417-14e9431da499", "DetectTime": "2023-10-30T13:59:22.745985+02:00", "EventTime": "2023-10-30T13:59:22.746003+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBHzjI3gycc2ujLYwf"]} -{"Format": "IDEA0", "ID": "52020a8e-cac6-4272-98a8-873f5e1c4469", "DetectTime": "2023-10-30T13:59:22.757678+02:00", "EventTime": "2023-10-30T13:59:22.757693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Cj7l9Z2xsrveQz9WN9"]} -{"Format": "IDEA0", "ID": "4ffbd532-f1f0-4582-8bd6-58c178a18b5c", "DetectTime": "2023-10-30T13:59:22.779829+02:00", "EventTime": "2023-10-30T13:59:22.779849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["CLdzpX1V7qkljAbWZi"]} -{"Format": "IDEA0", "ID": "4e3c5a29-c619-4e23-92c3-8eced1170b1c", "DetectTime": "2023-10-30T13:59:22.799688+02:00", "EventTime": "2023-10-30T13:59:22.799702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CGeRYM3lgpKE0NEyk"]} -{"Format": "IDEA0", "ID": "9f29b57c-5b50-4dd6-9dca-ad6168632009", "DetectTime": "2023-10-30T13:59:22.821323+02:00", "EventTime": "2023-10-30T13:59:22.821338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CXaWMq3VPtnCcWsoBa"]} -{"Format": "IDEA0", "ID": "a1216736-c076-46bb-a3a5-81b1b56fbed5", "DetectTime": "2023-10-30T13:59:22.846018+02:00", "EventTime": "2023-10-30T13:59:22.846034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.33.151.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.33.151.168 ", "ContentType": "text/plain"}], "uids": ["CiPzX63SWO4TJrNDZ1"]} -{"Format": "IDEA0", "ID": "c0e8527b-3f74-46b2-a7c8-90de46870355", "DetectTime": "2023-10-30T13:59:22.868648+02:00", "EventTime": "2023-10-30T13:59:22.868666+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI46rX2Eeh4AT7AUO5"]} -{"Format": "IDEA0", "ID": "cd57d4b4-e388-4eea-8489-8e5d3d31bd16", "DetectTime": "2023-10-30T13:59:22.878704+02:00", "EventTime": "2023-10-30T13:59:22.878724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.127.75.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.127.75.214 ", "ContentType": "text/plain"}], "uids": ["CMHXAq215siEQb38r5"]} -{"Format": "IDEA0", "ID": "d966180a-4027-49b2-ae1d-a59b9599134e", "DetectTime": "2023-10-30T13:59:22.901624+02:00", "EventTime": "2023-10-30T13:59:22.901640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.200.223.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.200.223.19 ", "ContentType": "text/plain"}], "uids": ["CzZySI3Fq0CD07tp6e"]} -{"Format": "IDEA0", "ID": "f303b36f-f5ba-4595-9fbf-efb3ece441af", "DetectTime": "2023-10-30T13:59:22.924013+02:00", "EventTime": "2023-10-30T13:59:22.924030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.11.65 ", "ContentType": "text/plain"}], "uids": ["C3kLY34BsbmrZkgPef"]} -{"Format": "IDEA0", "ID": "7f5d3974-177b-4e1f-b8f9-11eeac44fc50", "DetectTime": "2023-10-30T13:59:22.948540+02:00", "EventTime": "2023-10-30T13:59:22.948557+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cu8n4c4xuRFRzEcnNb"]} -{"Format": "IDEA0", "ID": "5ce2b1c4-4862-44aa-b4a2-ec60d73d2ab2", "DetectTime": "2023-10-30T13:59:22.960745+02:00", "EventTime": "2023-10-30T13:59:22.960762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.13.176 ", "ContentType": "text/plain"}], "uids": ["CQLgJT1KQlzbyT5My2"]} -{"Format": "IDEA0", "ID": "94a9b171-4b28-4d2d-ad2c-098d70784e44", "DetectTime": "2023-10-30T13:59:22.983158+02:00", "EventTime": "2023-10-30T13:59:22.983174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.10.166.23"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.10.166.23 ", "ContentType": "text/plain"}], "uids": ["CTObme234qRGw67Ba"]} -{"Format": "IDEA0", "ID": "be7e0d65-87d7-4c24-8554-4ba049e03eb8", "DetectTime": "2023-10-30T13:59:23.006939+02:00", "EventTime": "2023-10-30T13:59:23.006961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.162.252.216 ", "ContentType": "text/plain"}], "uids": ["CRNGRg3Dv2HE13uu0e"]} -{"Format": "IDEA0", "ID": "83984423-8d96-4382-bdce-1384b9de135c", "DetectTime": "2023-10-30T13:59:23.028350+02:00", "EventTime": "2023-10-30T13:59:23.028362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["C5YlBURgx8L10f28e"]} -{"Format": "IDEA0", "ID": "1fd5bb66-8b73-4de5-a155-756b5453ce91", "DetectTime": "2023-10-30T13:59:23.051275+02:00", "EventTime": "2023-10-30T13:59:23.051292+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXEzvF4l3MkNuiWPLh"]} -{"Format": "IDEA0", "ID": "98691055-1ba4-4247-b38b-1f99e33ed41e", "DetectTime": "2023-10-30T13:59:23.062832+02:00", "EventTime": "2023-10-30T13:59:23.062850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.206.184.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.206.184.151 ", "ContentType": "text/plain"}], "uids": ["CYRU0N38b5c6PGKwa4"]} -{"Format": "IDEA0", "ID": "c9d48dfc-b81f-434f-95ca-bfc9c133db69", "DetectTime": "2023-10-30T13:59:23.082277+02:00", "EventTime": "2023-10-30T13:59:23.082289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.65.55.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.65.55.186 ", "ContentType": "text/plain"}], "uids": ["CVyVrd4xKF1ZjXpG1k"]} -{"Format": "IDEA0", "ID": "59136c76-715d-482f-8f4e-5ba33f6aec79", "DetectTime": "2023-10-30T13:59:23.105496+02:00", "EventTime": "2023-10-30T13:59:23.105522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.107.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.107.35 ", "ContentType": "text/plain"}], "uids": ["Ck0ymE2QM9AsiDFoa9"]} -{"Format": "IDEA0", "ID": "d877861b-76ca-4f48-8c40-f16b1ecad5d1", "DetectTime": "2023-10-30T13:59:23.132377+02:00", "EventTime": "2023-10-30T13:59:23.132398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.241.115.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.241.115.233 ", "ContentType": "text/plain"}], "uids": ["CL3mfP1MsX1m36bf4i"]} -{"Format": "IDEA0", "ID": "294eddcf-a5d7-4752-a146-9c9c06122ae9", "DetectTime": "2023-10-30T13:59:23.163055+02:00", "EventTime": "2023-10-30T13:59:23.163082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.204.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.58.204.34 ", "ContentType": "text/plain"}], "uids": ["Cn7Cj74ABxJTLpabIb"]} -{"Format": "IDEA0", "ID": "69bcb71d-0892-4351-880b-4de81c9bbbe9", "DetectTime": "2023-10-30T13:59:23.188736+02:00", "EventTime": "2023-10-30T13:59:23.188757+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CC2Wer3zsBAk6viu19"]} -{"Format": "IDEA0", "ID": "ac9e37af-d1b3-4623-aee3-7f9e5ff9abbf", "DetectTime": "2023-10-30T13:59:23.201822+02:00", "EventTime": "2023-10-30T13:59:23.201841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.204.12 ", "ContentType": "text/plain"}], "uids": ["CEgK1c47Mqw4s7H61g"]} -{"Format": "IDEA0", "ID": "c16cf97b-5d93-406c-9db6-d6873faa28ea", "DetectTime": "2023-10-30T13:59:23.224728+02:00", "EventTime": "2023-10-30T13:59:23.224744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["Cd6aZe3goHuUI2kTk9"]} -{"Format": "IDEA0", "ID": "659963a9-88b3-4d59-824a-84ffc7fcb4b3", "DetectTime": "2023-10-30T13:59:23.246502+02:00", "EventTime": "2023-10-30T13:59:23.246517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.247.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.247.226 ", "ContentType": "text/plain"}], "uids": ["CYKA651TBqmqN6NStj"]} -{"Format": "IDEA0", "ID": "a17981e1-dd6c-48ac-aaef-147a40129da7", "DetectTime": "2023-10-30T13:59:23.263045+02:00", "EventTime": "2023-10-30T13:59:23.263059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"], "Hostname": ["fiber.htshostings.be"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.219.135.113 AS: EDPNET, BE AS9031 rDNS: fiber.htshostings.be", "ContentType": "text/plain"}], "uids": ["CJu51yU5dVc54MB8a"]} -{"Format": "IDEA0", "ID": "359bc998-4734-4c31-9279-c81ac41a92e4", "DetectTime": "2023-10-30T13:59:23.285823+02:00", "EventTime": "2023-10-30T13:59:23.285834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.198.175.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.198.175.145 ", "ContentType": "text/plain"}], "uids": ["Cgd52m2pOYkePmOtPj"]} -{"Format": "IDEA0", "ID": "7d442fde-11d3-490b-a9ad-54d2297653e0", "DetectTime": "2023-10-30T13:59:23.306061+02:00", "EventTime": "2023-10-30T13:59:23.306078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.254.232.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.254.232.31 ", "ContentType": "text/plain"}], "uids": ["C5uxPF2EIoUKlm7Rsf"]} -{"Format": "IDEA0", "ID": "bb7d8c92-8b60-49d9-be1e-7eac382d37ba", "DetectTime": "2023-10-30T13:59:23.328738+02:00", "EventTime": "2023-10-30T13:59:23.328756+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2J4E81jhYvgUwafv1"]} -{"Format": "IDEA0", "ID": "a5091276-94cc-475d-afe3-40e5c47e2783", "DetectTime": "2023-10-30T13:59:23.339110+02:00", "EventTime": "2023-10-30T13:59:23.339121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.202.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.202.140 ", "ContentType": "text/plain"}], "uids": ["CebSam3oU3aXQEg9Xj"]} -{"Format": "IDEA0", "ID": "a491cf3d-0efd-4fd8-90dd-779d77af0536", "DetectTime": "2023-10-30T13:59:23.355643+02:00", "EventTime": "2023-10-30T13:59:23.355654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CnIGqo2s5fKnUVAJbl"]} -{"Format": "IDEA0", "ID": "154e9176-756e-4749-99bf-225e46b18028", "DetectTime": "2023-10-30T13:59:23.377797+02:00", "EventTime": "2023-10-30T13:59:23.377818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cu8n4c4xuRFRzEcnNb", "CC2Wer3zsBAk6viu19", "CevtOE3G4ZUhdS02nc", "CBHzjI3gycc2ujLYwf"]} -{"Format": "IDEA0", "ID": "e0613634-e315-47a7-b65f-496b3c83d7be", "DetectTime": "2023-10-30T13:59:23.389191+02:00", "EventTime": "2023-10-30T13:59:23.389207+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CevtOE3G4ZUhdS02nc"]} -{"Format": "IDEA0", "ID": "297b73df-4969-4e63-a600-756544d42446", "DetectTime": "2023-10-30T13:59:23.400972+02:00", "EventTime": "2023-10-30T13:59:23.400988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.15.51.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.15.51.149 ", "ContentType": "text/plain"}], "uids": ["CGsJW63RHLgCFCG0ka"]} -{"Format": "IDEA0", "ID": "a88ce4e9-c5f6-4b17-93c3-2cd735111b48", "DetectTime": "2023-10-30T13:59:23.422989+02:00", "EventTime": "2023-10-30T13:59:23.423015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["C9Lf2v3NsnfgXN46Uc"]} -{"Format": "IDEA0", "ID": "bb5097bd-45b3-4af9-bc07-1ba9b232d85d", "DetectTime": "2023-10-30T13:59:23.448686+02:00", "EventTime": "2023-10-30T13:59:23.448702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.106.113.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.106.113.244 ", "ContentType": "text/plain"}], "uids": ["CR24VmktIMiQSQiji"]} -{"Format": "IDEA0", "ID": "160c0f98-c82e-42a6-8c05-2d3b0a82e802", "DetectTime": "2023-10-30T13:59:23.472059+02:00", "EventTime": "2023-10-30T13:59:23.472079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["Cz6VES1Xupba5tOHS"]} -{"Format": "IDEA0", "ID": "5edfc78e-6fca-4642-98fe-5ccde4cdabaf", "DetectTime": "2023-10-30T13:59:23.492394+02:00", "EventTime": "2023-10-30T13:59:23.492422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.92.13.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.92.13.177 ", "ContentType": "text/plain"}], "uids": ["CzbHiX1B3bkWxC0K72"]} -{"Format": "IDEA0", "ID": "537651f3-f7a2-4d38-a3fe-75d885f08162", "DetectTime": "2023-10-30T13:59:23.515017+02:00", "EventTime": "2023-10-30T13:59:23.515029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de", "ContentType": "text/plain"}], "uids": ["CCWEi9432IjegQXfXg"]} -{"Format": "IDEA0", "ID": "eaef8fd0-334b-4652-9f74-95afa5ec75ed", "DetectTime": "2023-10-30T13:59:23.535211+02:00", "EventTime": "2023-10-30T13:59:23.535227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.57.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.57.114 ", "ContentType": "text/plain"}], "uids": ["CfpHJW15rOy7gaZmQh"]} -{"Format": "IDEA0", "ID": "9b515b8e-49e2-4193-9cbd-cc28ddb32f8d", "DetectTime": "2023-10-30T13:59:23.556336+02:00", "EventTime": "2023-10-30T13:59:23.556354+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZC6dk1vKJFfrHL83i"]} -{"Format": "IDEA0", "ID": "53699102-f2fa-4a7a-a335-c6d70e7199c5", "DetectTime": "2023-10-30T13:59:23.568143+02:00", "EventTime": "2023-10-30T13:59:23.568159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.59.245.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.59.245.10 ", "ContentType": "text/plain"}], "uids": ["C6Jbrs3S2DYggPabKg"]} -{"Format": "IDEA0", "ID": "417fc811-fbba-4cdb-8ab5-609e680aa41d", "DetectTime": "2023-10-30T13:59:23.586345+02:00", "EventTime": "2023-10-30T13:59:23.586360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.21.76.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.21.76.133 ", "ContentType": "text/plain"}], "uids": ["CUPQOu36qlCeV2Megb"]} -{"Format": "IDEA0", "ID": "0d2b8417-b5d5-4587-bb83-ec878e906c75", "DetectTime": "2023-10-30T13:59:23.606090+02:00", "EventTime": "2023-10-30T13:59:23.606109+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKCUCb85vDAGMG5z5"]} -{"Format": "IDEA0", "ID": "1bde535a-1174-4beb-b5ed-561b2152d7dd", "DetectTime": "2023-10-30T13:59:23.618160+02:00", "EventTime": "2023-10-30T13:59:23.618184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.186.13.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.186.13.109 ", "ContentType": "text/plain"}], "uids": ["CnvOL51zSIhqQklJH7"]} -{"Format": "IDEA0", "ID": "2308443b-f679-41b5-8511-6791d535e429", "DetectTime": "2023-10-30T13:59:23.638998+02:00", "EventTime": "2023-10-30T13:59:23.639010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.132.224.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.132.224.91 ", "ContentType": "text/plain"}], "uids": ["Cs3B2NAI5tQ9vJP7k"]} -{"Format": "IDEA0", "ID": "7fc13f7a-589a-4c05-a854-db5e921c9b58", "DetectTime": "2023-10-30T13:59:23.662933+02:00", "EventTime": "2023-10-30T13:59:23.662954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.11.143.89"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.11.143.89 ", "ContentType": "text/plain"}], "uids": ["CiY86pyfi7ZXpUde5"]} -{"Format": "IDEA0", "ID": "9b400190-76f5-4085-9e05-2c9c9f11ca3f", "DetectTime": "2023-10-30T13:59:23.683338+02:00", "EventTime": "2023-10-30T13:59:23.683351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.204.79.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.204.79.47 ", "ContentType": "text/plain"}], "uids": ["ChTsdUeem8m1zVfOj"]} -{"Format": "IDEA0", "ID": "b9d938db-ee3f-4717-a6c5-c18e044a4780", "DetectTime": "2023-10-30T13:59:23.703200+02:00", "EventTime": "2023-10-30T13:59:23.703219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.191.16.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.191.16.250 ", "ContentType": "text/plain"}], "uids": ["COFoNX3Y6liBL0u2pa"]} -{"Format": "IDEA0", "ID": "58df38f8-2a17-424d-af22-72e7800fec3c", "DetectTime": "2023-10-30T13:59:23.723984+02:00", "EventTime": "2023-10-30T13:59:23.724005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.137.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.137.28 ", "ContentType": "text/plain"}], "uids": ["C47LKT1nDHiQsk8wLc"]} -{"Format": "IDEA0", "ID": "a55e7d65-f1fc-4b2b-8080-6bbb8c9b4d96", "DetectTime": "2023-10-30T13:59:23.744470+02:00", "EventTime": "2023-10-30T13:59:23.744482+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzM63Q3TnilsceMTCg"]} -{"Format": "IDEA0", "ID": "2295d8f6-3b67-4d56-8cfa-752d03dc4075", "DetectTime": "2023-10-30T13:59:23.755031+02:00", "EventTime": "2023-10-30T13:59:23.755044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.233.236.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.233.236.118 ", "ContentType": "text/plain"}], "uids": ["Cj1kVw3Vdp078fwJK1"]} -{"Format": "IDEA0", "ID": "617851c0-a967-457c-9f4d-0344362443e1", "DetectTime": "2023-10-30T13:59:23.776722+02:00", "EventTime": "2023-10-30T13:59:23.776750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["C3KZZm3pIWoJP4C3f3"]} -{"Format": "IDEA0", "ID": "dfaeefa9-5a35-4085-a974-fdac636e5992", "DetectTime": "2023-10-30T13:59:23.816074+02:00", "EventTime": "2023-10-30T13:59:23.816091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CP4kpB4DMbnyAfcCj7"]} -{"Format": "IDEA0", "ID": "af297fe6-830c-49fe-b936-852489008be1", "DetectTime": "2023-10-30T13:59:23.854127+02:00", "EventTime": "2023-10-30T13:59:23.854144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.253.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.253.12 ", "ContentType": "text/plain"}], "uids": ["CYIfFr4LmDTk9CIqTa"]} -{"Format": "IDEA0", "ID": "2c089d05-be0b-4b6e-ac29-d1b02700e199", "DetectTime": "2023-10-30T13:59:23.875824+02:00", "EventTime": "2023-10-30T13:59:23.875839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CtGgo94zigXReaBv1h"]} -{"Format": "IDEA0", "ID": "6e00a386-a07f-45e5-97a6-5dafda9be60d", "DetectTime": "2023-10-30T13:59:23.914110+02:00", "EventTime": "2023-10-30T13:59:23.914134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.241.67.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.241.67.28 ", "ContentType": "text/plain"}], "uids": ["CsnN6f2ec9NuB5Zz4h"]} -{"Format": "IDEA0", "ID": "99334ca4-a85e-45dd-8226-e0686dfd6b7e", "DetectTime": "2023-10-30T13:59:23.937496+02:00", "EventTime": "2023-10-30T13:59:23.937511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.233.38.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.233.38.152 ", "ContentType": "text/plain"}], "uids": ["Cm5xxVj9TL5NwqpHh"]} -{"Format": "IDEA0", "ID": "4fb68055-3964-46a6-812a-7f5f7b750d31", "DetectTime": "2023-10-30T13:59:23.959920+02:00", "EventTime": "2023-10-30T13:59:23.959941+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cw67lG4Qi0pm7nKuPd"]} -{"Format": "IDEA0", "ID": "0b358e76-cf2d-4e7b-ae81-8c34d47334eb", "DetectTime": "2023-10-30T13:59:23.973524+02:00", "EventTime": "2023-10-30T13:59:23.973542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.46.210.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.46.210.10 ", "ContentType": "text/plain"}], "uids": ["CPRo2z4EDJlwHXs7v8"]} -{"Format": "IDEA0", "ID": "f810fc3a-4f93-4121-9ca0-865f8d1a0cd7", "DetectTime": "2023-10-30T13:59:23.996127+02:00", "EventTime": "2023-10-30T13:59:23.996143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.133.20.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.133.20.125 ", "ContentType": "text/plain"}], "uids": ["C3gIr92BTGbyPe5U94"]} -{"Format": "IDEA0", "ID": "5662de25-e76e-46c4-8023-d47fb30073f8", "DetectTime": "2023-10-30T13:59:24.019065+02:00", "EventTime": "2023-10-30T13:59:24.019077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it", "ContentType": "text/plain"}], "uids": ["CSS4Kj4Vs0Du0SZPNb"]} -{"Format": "IDEA0", "ID": "8b9b43b7-7182-4f2f-8798-77618e7e8708", "DetectTime": "2023-10-30T13:59:24.039399+02:00", "EventTime": "2023-10-30T13:59:24.039412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CXFBB64Lm6DFVoRX7"]} -{"Format": "IDEA0", "ID": "6e7549bc-478f-4ac9-8c8a-5684c3bc7f74", "DetectTime": "2023-10-30T13:59:24.057948+02:00", "EventTime": "2023-10-30T13:59:24.057965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.136.115.72 ", "ContentType": "text/plain"}], "uids": ["CgLv3CPkA02exX0Zg"]} -{"Format": "IDEA0", "ID": "a49a389a-b53e-4765-ab43-dcfb47f27a22", "DetectTime": "2023-10-30T13:59:24.079794+02:00", "EventTime": "2023-10-30T13:59:24.079806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.149.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.149.63 ", "ContentType": "text/plain"}], "uids": ["CtRx9s4IPEwKbm72Ch"]} -{"Format": "IDEA0", "ID": "4ee7f622-79ae-4d12-9aaf-b5edc18392cd", "DetectTime": "2023-10-30T13:59:24.099106+02:00", "EventTime": "2023-10-30T13:59:24.099117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.59.76.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.59.76.104 ", "ContentType": "text/plain"}], "uids": ["CnaZpb2u2NlVYoKcEd"]} -{"Format": "IDEA0", "ID": "86e0a6ce-fdf2-4ff6-9847-af8540999733", "DetectTime": "2023-10-30T13:59:24.119891+02:00", "EventTime": "2023-10-30T13:59:24.119909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["CPtkfk3cedEoxGQbWa"]} -{"Format": "IDEA0", "ID": "6327286e-9317-402f-8c90-e71d1e0ba5bb", "DetectTime": "2023-10-30T13:59:24.140887+02:00", "EventTime": "2023-10-30T13:59:24.140904+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAzxMw1PaEjHlObhQ"]} -{"Format": "IDEA0", "ID": "ff6d5a2a-5559-4c16-a97c-a6325b0de5e9", "DetectTime": "2023-10-30T13:59:24.153021+02:00", "EventTime": "2023-10-30T13:59:24.153045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.236.185.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.236.185.221 ", "ContentType": "text/plain"}], "uids": ["CPLekf4TLcUCcMahWd"]} -{"Format": "IDEA0", "ID": "4ac08ba3-e5c5-440a-8591-57d2a0da141d", "DetectTime": "2023-10-30T13:59:24.174053+02:00", "EventTime": "2023-10-30T13:59:24.174069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.242.237.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.242.237.42 ", "ContentType": "text/plain"}], "uids": ["C4DPVB4kPPwZkXSwwj"]} -{"Format": "IDEA0", "ID": "a601ed73-b4f7-4325-a392-ac7569d2b9ad", "DetectTime": "2023-10-30T13:59:24.196112+02:00", "EventTime": "2023-10-30T13:59:24.196129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["C04Zwe3jfgIcYCZhNg"]} -{"Format": "IDEA0", "ID": "83edfeec-9775-4ff5-a595-6774cf8d09f7", "DetectTime": "2023-10-30T13:59:24.216090+02:00", "EventTime": "2023-10-30T13:59:24.216114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CO0ti93DvuX63EEZkf"]} -{"Format": "IDEA0", "ID": "b2ef2a18-ac7f-437c-8339-60a049034e08", "DetectTime": "2023-10-30T13:59:24.239098+02:00", "EventTime": "2023-10-30T13:59:24.239117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.129.120.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.129.120.2 ", "ContentType": "text/plain"}], "uids": ["CFMBwQ2fhSr4AAEbw7"]} -{"Format": "IDEA0", "ID": "f8fe6278-5bf0-4729-9ce4-2f9e09c0ce8b", "DetectTime": "2023-10-30T13:59:24.261591+02:00", "EventTime": "2023-10-30T13:59:24.261602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["Cuos5a4zL1F9l8Vy8"]} -{"Format": "IDEA0", "ID": "f79491f6-ece9-48e9-b387-8a54467d97b8", "DetectTime": "2023-10-30T13:59:24.282634+02:00", "EventTime": "2023-10-30T13:59:24.282650+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cv76vWFO2wPMzkpKk"]} -{"Format": "IDEA0", "ID": "d87cb055-cc6b-4de9-9015-89757cfce81e", "DetectTime": "2023-10-30T13:59:24.294870+02:00", "EventTime": "2023-10-30T13:59:24.294887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.134.184.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.134.184.81 ", "ContentType": "text/plain"}], "uids": ["CvsNqZ25qlOv28ZNDk"]} -{"Format": "IDEA0", "ID": "339f8641-f0bd-4af1-a0dd-8d041c8ad896", "DetectTime": "2023-10-30T13:59:24.320621+02:00", "EventTime": "2023-10-30T13:59:24.320632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.57.242 ", "ContentType": "text/plain"}], "uids": ["CFgTXy40qXhrxPnOG4"]} -{"Format": "IDEA0", "ID": "ef4edca1-28f0-4402-aa9b-16f5fd346705", "DetectTime": "2023-10-30T13:59:24.339843+02:00", "EventTime": "2023-10-30T13:59:24.339856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.121.4.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.121.4.95 ", "ContentType": "text/plain"}], "uids": ["CRikR22WTx1GOf2Nv9"]} -{"Format": "IDEA0", "ID": "971d5d97-ab20-4fa0-9963-4be715724b83", "DetectTime": "2023-10-30T13:59:24.362348+02:00", "EventTime": "2023-10-30T13:59:24.362364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CiI6K1LXdZlcEIfEa"]} -{"Format": "IDEA0", "ID": "3f04f427-a77f-4b46-a002-a10ba70308bc", "DetectTime": "2023-10-30T13:59:24.387581+02:00", "EventTime": "2023-10-30T13:59:24.387600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CAN9lh205ZAjRwGcp3"]} -{"Format": "IDEA0", "ID": "8e1ce17b-d153-40cb-8248-85032a47de1f", "DetectTime": "2023-10-30T13:59:24.411515+02:00", "EventTime": "2023-10-30T13:59:24.411538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.105.9 ", "ContentType": "text/plain"}], "uids": ["CMsIQW1fT7Ge9lrQl8"]} -{"Format": "IDEA0", "ID": "9d7f7410-116c-41d0-a64b-d88ae12daaed", "DetectTime": "2023-10-30T13:59:24.433186+02:00", "EventTime": "2023-10-30T13:59:24.433209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.67.62.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.67.62.130 ", "ContentType": "text/plain"}], "uids": ["C73ljZ1kypMduC7tB4"]} -{"Format": "IDEA0", "ID": "36a62f71-6e17-4f6f-9d0c-0d4ede38fcb7", "DetectTime": "2023-10-30T13:59:24.456643+02:00", "EventTime": "2023-10-30T13:59:24.456659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.227.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.203.227.190 ", "ContentType": "text/plain"}], "uids": ["CvvtDz2Oeaw4mhhVJ1"]} -{"Format": "IDEA0", "ID": "095bb26c-07a0-49c7-910b-cc79fdf9508e", "DetectTime": "2023-10-30T13:59:24.481001+02:00", "EventTime": "2023-10-30T13:59:24.481021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["C4PcRK2S0IbNT0Oclf"]} -{"Format": "IDEA0", "ID": "54fd57db-3137-410a-ba09-0aba064e1919", "DetectTime": "2023-10-30T13:59:24.502494+02:00", "EventTime": "2023-10-30T13:59:24.502511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.18.54.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.18.54.55 ", "ContentType": "text/plain"}], "uids": ["COaNYz3fuJBvVmK5P5"]} -{"Format": "IDEA0", "ID": "08d4bfb2-180f-4494-b4c4-c70c2a65381e", "DetectTime": "2023-10-30T13:59:24.525600+02:00", "EventTime": "2023-10-30T13:59:24.525616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.15.209.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.15.209.174 ", "ContentType": "text/plain"}], "uids": ["CqiafswipYeziWBM4"]} -{"Format": "IDEA0", "ID": "83e58198-9bc7-4f7e-9e16-b6c0eaf8b428", "DetectTime": "2023-10-30T13:59:24.547318+02:00", "EventTime": "2023-10-30T13:59:24.547334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CFkzCF1LiHPCnRcrZ8"]} -{"Format": "IDEA0", "ID": "3a7bcf5b-faad-48c3-bbeb-451dbeccf8f6", "DetectTime": "2023-10-30T13:59:24.567888+02:00", "EventTime": "2023-10-30T13:59:24.567907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.106.41.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.106.41.197 ", "ContentType": "text/plain"}], "uids": ["CQpv0T1tlBsjBBM3C2"]} -{"Format": "IDEA0", "ID": "79974d6d-05a6-4630-866c-0836cde38d73", "DetectTime": "2023-10-30T13:59:24.589200+02:00", "EventTime": "2023-10-30T13:59:24.589211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["CytUXGDCXB1BQ1wb9"]} -{"Format": "IDEA0", "ID": "b0046867-c214-4590-8968-bf72ba7a9cfa", "DetectTime": "2023-10-30T13:59:24.628245+02:00", "EventTime": "2023-10-30T13:59:24.628267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.162.252.216 ", "ContentType": "text/plain"}], "uids": ["CzQRjw3Up6hrJZZoc4"]} -{"Format": "IDEA0", "ID": "eafa8204-0612-4a21-ab25-e940d96d25ec", "DetectTime": "2023-10-30T13:59:24.668804+02:00", "EventTime": "2023-10-30T13:59:24.668816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CoQMvw27amTpViXjsg"]} -{"Format": "IDEA0", "ID": "3febd05b-0eb4-4f43-8ce8-d8912cd2d395", "DetectTime": "2023-10-30T13:59:24.690630+02:00", "EventTime": "2023-10-30T13:59:24.690646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.249.112.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.249.112.117 ", "ContentType": "text/plain"}], "uids": ["Cgi95Oy2L8d3UXrF7"]} -{"Format": "IDEA0", "ID": "d38d3850-83b6-4756-b3d9-bd45e3de661f", "DetectTime": "2023-10-30T13:59:24.713579+02:00", "EventTime": "2023-10-30T13:59:24.713595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.104.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.104.33 ", "ContentType": "text/plain"}], "uids": ["CotBcA3m2wei9Ncsb3"]} -{"Format": "IDEA0", "ID": "428de63a-6b7d-4721-91ea-5a5a32953298", "DetectTime": "2023-10-30T13:59:24.735968+02:00", "EventTime": "2023-10-30T13:59:24.735984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["C8mG0o4mFtZwRVu7Ne"]} -{"Format": "IDEA0", "ID": "3529e0f1-33a8-45ba-9d65-5204c3c297ed", "DetectTime": "2023-10-30T13:59:24.772103+02:00", "EventTime": "2023-10-30T13:59:24.772119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CoIYgZ32XVT2CFnXyl"]} -{"Format": "IDEA0", "ID": "cf807b9f-a6aa-423f-b75f-1d925a677e87", "DetectTime": "2023-10-30T13:59:24.810752+02:00", "EventTime": "2023-10-30T13:59:24.810770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.161.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.161.47 ", "ContentType": "text/plain"}], "uids": ["C7IXQ32OCInpv8Owtk"]} -{"Format": "IDEA0", "ID": "e967b515-522e-4f3c-b398-99b5937e990d", "DetectTime": "2023-10-30T13:59:24.830179+02:00", "EventTime": "2023-10-30T13:59:24.830198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.142.9.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.142.9.12 ", "ContentType": "text/plain"}], "uids": ["CbacXa8XDlgaUrkrd"]} -{"Format": "IDEA0", "ID": "7f79737e-2be5-4f82-9806-8b2ef8a83a70", "DetectTime": "2023-10-30T13:59:24.849546+02:00", "EventTime": "2023-10-30T13:59:24.849564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.57.242 ", "ContentType": "text/plain"}], "uids": ["CeEvO83AopEx4DZ0S7"]} -{"Format": "IDEA0", "ID": "16232b69-21a4-4ae9-abca-21efebd90dcd", "DetectTime": "2023-10-30T13:59:24.884386+02:00", "EventTime": "2023-10-30T13:59:24.884403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp3DHU3Od81vhAshTf"]} -{"Format": "IDEA0", "ID": "2293d295-c5e8-4ed3-bac6-130ba4522931", "DetectTime": "2023-10-30T13:59:24.906055+02:00", "EventTime": "2023-10-30T13:59:24.906076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["134.90.1.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 134.90.1.39 ", "ContentType": "text/plain"}], "uids": ["CJ1udy3FWThBCfTcnb"]} -{"Format": "IDEA0", "ID": "b2c85ec4-9f0b-4e49-8225-ea866bceca37", "DetectTime": "2023-10-30T13:59:24.931471+02:00", "EventTime": "2023-10-30T13:59:24.931489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.250.125.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.250.125.77 ", "ContentType": "text/plain"}], "uids": ["CbvTIT3yGris6hfHAg"]} -{"Format": "IDEA0", "ID": "9d2b3641-0a0a-4aec-8960-cf8351ddcfca", "DetectTime": "2023-10-30T13:59:24.952555+02:00", "EventTime": "2023-10-30T13:59:24.952571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.78.174.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.78.174.62 ", "ContentType": "text/plain"}], "uids": ["C61jKb1HUwJvYYcRp5"]} -{"Format": "IDEA0", "ID": "57157d32-bdad-401f-9c34-b4f945adc156", "DetectTime": "2023-10-30T13:59:24.974531+02:00", "EventTime": "2023-10-30T13:59:24.974554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.25.211.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.25.211.21 ", "ContentType": "text/plain"}], "uids": ["CyPHXo2LBwDGH8wO6l"]} -{"Format": "IDEA0", "ID": "397b3013-0741-4ee2-a7db-ef824b268d45", "DetectTime": "2023-10-30T13:59:24.999425+02:00", "EventTime": "2023-10-30T13:59:24.999452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CveFdD1k6vEcjCAeLk"]} -{"Format": "IDEA0", "ID": "d6ba5662-ac19-4eae-b8ef-4a6df7c5a0a7", "DetectTime": "2023-10-30T13:59:25.035284+02:00", "EventTime": "2023-10-30T13:59:25.035295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["C1H2t8pSo6ZS8elIi"]} -{"Format": "IDEA0", "ID": "405bddf4-f7c0-4bcd-b8e2-f81230259093", "DetectTime": "2023-10-30T13:59:25.067833+02:00", "EventTime": "2023-10-30T13:59:25.067845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.39.123.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.39.123.148 ", "ContentType": "text/plain"}], "uids": ["CLte6r3p4oPpgpZJjc"]} -{"Format": "IDEA0", "ID": "491367e0-ae61-456b-94c1-64ff7cf36c7d", "DetectTime": "2023-10-30T13:59:25.088409+02:00", "EventTime": "2023-10-30T13:59:25.088426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.224.10.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.224.10.194 ", "ContentType": "text/plain"}], "uids": ["CFIuFI2dt2MiSMNcT5"]} -{"Format": "IDEA0", "ID": "dffe2ec3-2271-4adf-85a8-fa3e1108fa2c", "DetectTime": "2023-10-30T13:59:25.110050+02:00", "EventTime": "2023-10-30T13:59:25.110066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["COb4GR1l4yar4dFyyi"]} -{"Format": "IDEA0", "ID": "5cdcdcd5-7fdd-4130-b8e1-a8dc5cbf8aa4", "DetectTime": "2023-10-30T13:59:25.148263+02:00", "EventTime": "2023-10-30T13:59:25.148279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["Cs7X9v1KYlOgqv572"]} -{"Format": "IDEA0", "ID": "417203b4-8d87-4206-88d5-ef2328674fb0", "DetectTime": "2023-10-30T13:59:25.170890+02:00", "EventTime": "2023-10-30T13:59:25.170907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.162.118.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.162.118.39 ", "ContentType": "text/plain"}], "uids": ["C0C5qTyZfpIKarN6l"]} -{"Format": "IDEA0", "ID": "dd2184a8-de35-40a5-a722-c23eeb26366f", "DetectTime": "2023-10-30T13:59:25.193658+02:00", "EventTime": "2023-10-30T13:59:25.193670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["CEgqwF2fSGrYINe7nj"]} -{"Format": "IDEA0", "ID": "ea12536f-5788-4dd7-834a-9afb9dd8581f", "DetectTime": "2023-10-30T13:59:25.231107+02:00", "EventTime": "2023-10-30T13:59:25.231117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CtYRwd11A4Qs0uCGZ1"]} -{"Format": "IDEA0", "ID": "e4673b3f-1ec5-4788-9e8a-dab5323d8a6f", "DetectTime": "2023-10-30T13:59:25.249374+02:00", "EventTime": "2023-10-30T13:59:25.249391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["CcIj1WeozZmfVGU0c"]} -{"Format": "IDEA0", "ID": "7897f59a-36dc-4bf5-a097-e86a9ec31c75", "DetectTime": "2023-10-30T13:59:25.271008+02:00", "EventTime": "2023-10-30T13:59:25.271020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["Cv4Ofx3cmkuTb8f7df"]} -{"Format": "IDEA0", "ID": "7294487b-4bab-4500-a2a5-8552489a8d38", "DetectTime": "2023-10-30T13:59:25.294817+02:00", "EventTime": "2023-10-30T13:59:25.294838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CjqimB3Hln32Jzqyl4"]} -{"Format": "IDEA0", "ID": "f25e9013-af56-4032-a663-5d95805ad073", "DetectTime": "2023-10-30T13:59:25.318088+02:00", "EventTime": "2023-10-30T13:59:25.318098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CV1UCB1j74Q0VgtP6b"]} -{"Format": "IDEA0", "ID": "4c708205-c073-40ea-8bea-f7be38c3cdc2", "DetectTime": "2023-10-30T13:59:25.339498+02:00", "EventTime": "2023-10-30T13:59:25.339513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CX2kEj1nbRYWvSDLNj"]} -{"Format": "IDEA0", "ID": "866f8bd4-13c3-4a3e-8cbb-f5d7b4eea521", "DetectTime": "2023-10-30T13:59:25.377575+02:00", "EventTime": "2023-10-30T13:59:25.377596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.47.25.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.47.25.69 ", "ContentType": "text/plain"}], "uids": ["C4Ixyk1k3mKQaGCuS3"]} -{"Format": "IDEA0", "ID": "3fa9b579-3b67-43f8-9e86-1ab8a5c53e96", "DetectTime": "2023-10-30T13:59:25.401796+02:00", "EventTime": "2023-10-30T13:59:25.401822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CeWMYfxThtgmYBEgf"]} -{"Format": "IDEA0", "ID": "71236091-f8b5-4382-b7a9-4c0782d930ac", "DetectTime": "2023-10-30T13:59:25.424155+02:00", "EventTime": "2023-10-30T13:59:25.424174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["209.12.192.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 209.12.192.228 AS: LEVEL3, US AS335", "ContentType": "text/plain"}], "uids": ["CDOOBrdMr6RoiYj5d"]} -{"Format": "IDEA0", "ID": "5f50c0d8-7a1a-49e2-ab10-98b0aa5735be", "DetectTime": "2023-10-30T13:59:25.448036+02:00", "EventTime": "2023-10-30T13:59:25.448049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.21.61.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.21.61.195 ", "ContentType": "text/plain"}], "uids": ["C0Shdu17IoqUizXCUi"]} -{"Format": "IDEA0", "ID": "101efb90-2673-4354-9acf-e0f0745829f4", "DetectTime": "2023-10-30T13:59:25.542213+02:00", "EventTime": "2023-10-30T13:59:25.542231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CJi8ma3ixxNGH1nDui"]} -{"Format": "IDEA0", "ID": "e1ba2316-aada-4830-a473-f8fd7e78987f", "DetectTime": "2023-10-30T13:59:25.583710+02:00", "EventTime": "2023-10-30T13:59:25.583735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CnfQwn5RKBAuY3yI"]} -{"Format": "IDEA0", "ID": "9b58866d-2cc5-420b-836f-09efeeaf32b1", "DetectTime": "2023-10-30T13:59:25.621501+02:00", "EventTime": "2023-10-30T13:59:25.621514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.70.36.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.70.36.18 ", "ContentType": "text/plain"}], "uids": ["CO1uMw3diR0815VCA2"]} -{"Format": "IDEA0", "ID": "93fec154-eed9-4a2f-9845-55bec1cb0258", "DetectTime": "2023-10-30T13:59:25.641485+02:00", "EventTime": "2023-10-30T13:59:25.641509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.81.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.81.199 ", "ContentType": "text/plain"}], "uids": ["CsLIAC4w6scpgeL4di"]} -{"Format": "IDEA0", "ID": "0d1ea0b0-0d4c-457d-8b81-efd2d1b382af", "DetectTime": "2023-10-30T13:59:25.665194+02:00", "EventTime": "2023-10-30T13:59:25.665213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["ClTpmmoAgPDzXrHG1"]} -{"Format": "IDEA0", "ID": "b346646d-05b9-4533-b8fc-ef7ff89b9775", "DetectTime": "2023-10-30T13:59:25.702210+02:00", "EventTime": "2023-10-30T13:59:25.702224+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2HbYM3fRBF6HN9n53"]} -{"Format": "IDEA0", "ID": "10c06796-94b6-4b72-862e-0576fd91a590", "DetectTime": "2023-10-30T13:59:25.715605+02:00", "EventTime": "2023-10-30T13:59:25.715629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["8.14.69.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 8.14.69.26 ", "ContentType": "text/plain"}], "uids": ["CWOJO31zBqjNlRwMP1"]} -{"Format": "IDEA0", "ID": "be02c71c-3b7f-4b4e-810b-432d576281e2", "DetectTime": "2023-10-30T13:59:25.739907+02:00", "EventTime": "2023-10-30T13:59:25.739924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cq5ybz3dYctI4qzFuk"]} -{"Format": "IDEA0", "ID": "6c1f292c-7a0b-4e5d-8d9f-d1caa60e9ab2", "DetectTime": "2023-10-30T13:59:25.765783+02:00", "EventTime": "2023-10-30T13:59:25.765799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.138.17.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.138.17.51 ", "ContentType": "text/plain"}], "uids": ["CGyUi21mMrF6BmRcU1"]} -{"Format": "IDEA0", "ID": "40168bb5-c5ac-4d85-a198-91ab879eda1c", "DetectTime": "2023-10-30T13:59:25.785853+02:00", "EventTime": "2023-10-30T13:59:25.785864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.93.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.89.93.133 ", "ContentType": "text/plain"}], "uids": ["Cr5FJo194TcY3ooQol"]} -{"Format": "IDEA0", "ID": "4f917089-f384-426b-aa5d-294e6ee9f67c", "DetectTime": "2023-10-30T13:59:25.805548+02:00", "EventTime": "2023-10-30T13:59:25.805565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.72.218.171"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.72.218.171 ", "ContentType": "text/plain"}], "uids": ["C78yCh4DQ0K8GFGhd9"]} -{"Format": "IDEA0", "ID": "bce3fef2-e8b7-4a1e-b121-8925609e7e2a", "DetectTime": "2023-10-30T13:59:25.833116+02:00", "EventTime": "2023-10-30T13:59:25.833131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.58.25 ", "ContentType": "text/plain"}], "uids": ["CPYLly2V9g8iytu49b"]} -{"Format": "IDEA0", "ID": "64a545a6-64b4-41c3-a86e-87f9290a3ca2", "DetectTime": "2023-10-30T13:59:25.869201+02:00", "EventTime": "2023-10-30T13:59:25.869216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.191.232.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.191.232.162 ", "ContentType": "text/plain"}], "uids": ["CgYiZi4wT5kyDMF3Lh"]} -{"Format": "IDEA0", "ID": "c725db69-5c67-4043-ba5b-6f66c76665fe", "DetectTime": "2023-10-30T13:59:25.891124+02:00", "EventTime": "2023-10-30T13:59:25.891149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.115.182.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.115.182.80 ", "ContentType": "text/plain"}], "uids": ["C7y3ru1lUEl8sMu9u"]} -{"Format": "IDEA0", "ID": "ddba5f92-cb2c-429b-8cbd-5c4668cd5e37", "DetectTime": "2023-10-30T13:59:25.913618+02:00", "EventTime": "2023-10-30T13:59:25.913634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["CKB07HotbcH4EO47b"]} -{"Format": "IDEA0", "ID": "2be176f9-8a37-447c-82ea-58e1f206f894", "DetectTime": "2023-10-30T13:59:25.958048+02:00", "EventTime": "2023-10-30T13:59:25.958068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.162.143.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.162.143.17 ", "ContentType": "text/plain"}], "uids": ["CYKfOr2gufnreq5NQd"]} -{"Format": "IDEA0", "ID": "3ecb6ff2-e511-49b1-9b26-bcba8052e139", "DetectTime": "2023-10-30T13:59:25.980464+02:00", "EventTime": "2023-10-30T13:59:25.980476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["CpSZgi3qe2Mn4lUZgd"]} -{"Format": "IDEA0", "ID": "34398063-ac89-4831-adc1-abf9a8c3bf37", "DetectTime": "2023-10-30T13:59:26.016905+02:00", "EventTime": "2023-10-30T13:59:26.016925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CafP7YE9QjaIgqcMi"]} -{"Format": "IDEA0", "ID": "89357b38-4842-4f3b-9b07-bf628c2d553d", "DetectTime": "2023-10-30T13:59:26.054581+02:00", "EventTime": "2023-10-30T13:59:26.054597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.58.25 ", "ContentType": "text/plain"}], "uids": ["CkxFXf4ClZPEoisLSd"]} -{"Format": "IDEA0", "ID": "f128dbd4-5459-456b-a7fc-26723b46f9cc", "DetectTime": "2023-10-30T13:59:26.079169+02:00", "EventTime": "2023-10-30T13:59:26.079186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.55.163 ", "ContentType": "text/plain"}], "uids": ["CKtD803I9JLhJV8g8g"]} -{"Format": "IDEA0", "ID": "4fd1ca87-639d-4beb-849f-358d4bec77bc", "DetectTime": "2023-10-30T13:59:26.120904+02:00", "EventTime": "2023-10-30T13:59:26.120929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["Cmt7pf3gzwS7wJqVL5"]} -{"Format": "IDEA0", "ID": "598b6cfa-c8f6-410f-ba4b-83b22151e09d", "DetectTime": "2023-10-30T13:59:26.166893+02:00", "EventTime": "2023-10-30T13:59:26.166912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["C9Uo1u4NuLj6UzeSKf"]} -{"Format": "IDEA0", "ID": "557f0bf0-3721-47ee-9fb9-3f65dfcb1854", "DetectTime": "2023-10-30T13:59:26.190952+02:00", "EventTime": "2023-10-30T13:59:26.190968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.232.178.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.232.178.124 ", "ContentType": "text/plain"}], "uids": ["CmnRl53xrXctJyLbW5"]} -{"Format": "IDEA0", "ID": "b144857e-54c2-494a-ac2f-0cbcaca02ba1", "DetectTime": "2023-10-30T13:59:26.215323+02:00", "EventTime": "2023-10-30T13:59:26.215341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CPNa1m4sbd1n1QHkka"]} -{"Format": "IDEA0", "ID": "319a5f11-a2cb-45ef-b10f-d6978c0f22b2", "DetectTime": "2023-10-30T13:59:26.256149+02:00", "EventTime": "2023-10-30T13:59:26.256163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CWHpIh1kFhcww6DJng"]} -{"Format": "IDEA0", "ID": "c111faa0-da9a-4405-b84c-fd5606650c92", "DetectTime": "2023-10-30T13:59:26.288844+02:00", "EventTime": "2023-10-30T13:59:26.288861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["C7Mdg93QYwjmzYrxFc"]} -{"Format": "IDEA0", "ID": "1d17b904-8e78-4a5f-9809-b5d8b49b7275", "DetectTime": "2023-10-30T13:59:26.314404+02:00", "EventTime": "2023-10-30T13:59:26.314417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CaBlT14BZNRgT3XRAk"]} -{"Format": "IDEA0", "ID": "1acc6aa2-8caa-4cf5-83f1-09bca7e71fde", "DetectTime": "2023-10-30T13:59:26.352662+02:00", "EventTime": "2023-10-30T13:59:26.352682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["C7y7PblDZQTgODog9"]} -{"Format": "IDEA0", "ID": "67189c03-ef45-4090-ad3b-e6f10839f838", "DetectTime": "2023-10-30T13:59:26.391991+02:00", "EventTime": "2023-10-30T13:59:26.392011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["C6himL1al3Y0vplJpf"]} -{"Format": "IDEA0", "ID": "66360987-6584-46e3-bbb3-b3410297390c", "DetectTime": "2023-10-30T13:59:26.429678+02:00", "EventTime": "2023-10-30T13:59:26.429697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C6KzVw3gYBt3N5KcL6"]} -{"Format": "IDEA0", "ID": "2eba7525-5acf-41ae-bbc1-a319166d686a", "DetectTime": "2023-10-30T13:59:26.468182+02:00", "EventTime": "2023-10-30T13:59:26.468197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.155.171.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.155.171.95 ", "ContentType": "text/plain"}], "uids": ["CRVFtP1SQn0GqiySC1"]} -{"Format": "IDEA0", "ID": "4eb9ce48-361c-4e67-858d-725c470ee2c8", "DetectTime": "2023-10-30T13:59:26.492140+02:00", "EventTime": "2023-10-30T13:59:26.492156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CccIhxK4QM8Rgqt9c"]} -{"Format": "IDEA0", "ID": "87b42fc1-8f32-4eff-9b75-5a55825f78ce", "DetectTime": "2023-10-30T13:59:26.526657+02:00", "EventTime": "2023-10-30T13:59:26.526676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["C8ReuD2BiRzNOtMusi"]} -{"Format": "IDEA0", "ID": "6ad81510-9772-4082-93e7-ba3b1fdf1c48", "DetectTime": "2023-10-30T13:59:26.570718+02:00", "EventTime": "2023-10-30T13:59:26.570738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cv76vWFO2wPMzkpKk", "Cw67lG4Qi0pm7nKuPd", "Cclm9ISzpylUswnvl", "CKCUCb85vDAGMG5z5"]} -{"Format": "IDEA0", "ID": "2750a4c7-d3ef-447c-9875-093c4336e3fe", "DetectTime": "2023-10-30T13:59:26.583298+02:00", "EventTime": "2023-10-30T13:59:26.583319+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cclm9ISzpylUswnvl"]} -{"Format": "IDEA0", "ID": "4a0b30d7-cc9a-433c-acd5-b7ea9b6fb350", "DetectTime": "2023-10-30T13:59:26.596734+02:00", "EventTime": "2023-10-30T13:59:26.596751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CYkG3V2Mho1TBvQpW"]} -{"Format": "IDEA0", "ID": "0486297a-ecdf-4594-8a37-2a509a978d2c", "DetectTime": "2023-10-30T13:59:26.638352+02:00", "EventTime": "2023-10-30T13:59:26.638368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CnGS0D1977dp7rCRWi"]} -{"Format": "IDEA0", "ID": "9524bd40-8a75-4d77-9911-0971a76dc9ec", "DetectTime": "2023-10-30T13:59:26.681000+02:00", "EventTime": "2023-10-30T13:59:26.681017+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVR2WA41wAZ44kbotg"]} -{"Format": "IDEA0", "ID": "a0e859d3-ba69-459e-b9aa-005e879168fc", "DetectTime": "2023-10-30T13:59:26.693403+02:00", "EventTime": "2023-10-30T13:59:26.693419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CCXEG41BPlCyyDTI8"]} -{"Format": "IDEA0", "ID": "92e3fe84-60d2-4cc2-96eb-71f26816ab79", "DetectTime": "2023-10-30T13:59:26.718872+02:00", "EventTime": "2023-10-30T13:59:26.718893+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAJda11hcGaiR9kfah"]} -{"Format": "IDEA0", "ID": "d8c3921c-9671-44ca-82cb-50c6a6c4caf9", "DetectTime": "2023-10-30T13:59:26.732574+02:00", "EventTime": "2023-10-30T13:59:26.732591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CRHiwR1NulMxdS8di3"]} -{"Format": "IDEA0", "ID": "dddbaf80-5deb-4493-a513-5f246e7dec5c", "DetectTime": "2023-10-30T13:59:26.770031+02:00", "EventTime": "2023-10-30T13:59:26.770046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CcSUzQ2ug1nEzPpd65"]} -{"Format": "IDEA0", "ID": "c1815071-ee1e-4782-8ceb-812df0b32cc4", "DetectTime": "2023-10-30T13:59:26.806384+02:00", "EventTime": "2023-10-30T13:59:26.806404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CUzr1BKYVJTNMBmFg"]} -{"Format": "IDEA0", "ID": "38999ed4-a4e1-4b55-8ddc-b23fc391928c", "DetectTime": "2023-10-30T13:59:26.847854+02:00", "EventTime": "2023-10-30T13:59:26.847867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.20.226.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.20.226.85 ", "ContentType": "text/plain"}], "uids": ["CNTgSa1sppI239mV7i"]} -{"Format": "IDEA0", "ID": "6d15cac8-90ef-448b-b062-99f6ee654ba4", "DetectTime": "2023-10-30T13:59:26.875189+02:00", "EventTime": "2023-10-30T13:59:26.875212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqmHp9BeWVTgpW2R5"]} -{"Format": "IDEA0", "ID": "4158ed39-0829-4b9b-a109-b4f84d0375e5", "DetectTime": "2023-10-30T13:59:26.887277+02:00", "EventTime": "2023-10-30T13:59:26.887292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CKI8cu4O9PZmR2RYZ1"]} -{"Format": "IDEA0", "ID": "8b9f0d64-d854-44ae-982e-4ff94751428e", "DetectTime": "2023-10-30T13:59:26.923798+02:00", "EventTime": "2023-10-30T13:59:26.923811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CESj7o17HYI8SA9cce"]} -{"Format": "IDEA0", "ID": "6ec0968c-ab87-42d4-88bd-902a42b90bc3", "DetectTime": "2023-10-30T13:59:26.957069+02:00", "EventTime": "2023-10-30T13:59:26.957079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CpSI3J1AtsNSC3vyu6"]} -{"Format": "IDEA0", "ID": "e0732bd0-6970-46e3-8be9-11a2c3fe5f97", "DetectTime": "2023-10-30T13:59:26.994508+02:00", "EventTime": "2023-10-30T13:59:26.994525+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CA6x39loBQJUNDJfc"]} -{"Format": "IDEA0", "ID": "a5de7757-1c63-4634-829c-09c356f5902c", "DetectTime": "2023-10-30T13:59:27.009322+02:00", "EventTime": "2023-10-30T13:59:27.009344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CAlCEQRWFfJhxOub8"]} -{"Format": "IDEA0", "ID": "66e1d444-e9ef-4cc9-92ea-77d8f5dab29b", "DetectTime": "2023-10-30T13:59:27.044049+02:00", "EventTime": "2023-10-30T13:59:27.044071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.55.197.94"], "Hostname": ["adsl-75-55-197-94.dsl.pltn13.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.55.197.94 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-75-55-197-94.dsl.pltn13.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C6hLf2YQShgiqjRu8"]} -{"Format": "IDEA0", "ID": "4eeb325a-c0e2-4ded-aec4-f411a59c5ac9", "DetectTime": "2023-10-30T13:59:27.070998+02:00", "EventTime": "2023-10-30T13:59:27.071016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CIApL73ztwPt1M1K1j"]} -{"Format": "IDEA0", "ID": "7abfe129-4a3c-486e-8494-a02c7329b10f", "DetectTime": "2023-10-30T13:59:27.108786+02:00", "EventTime": "2023-10-30T13:59:27.108806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["Cnx1P81NtLB5k11zae"]} -{"Format": "IDEA0", "ID": "9b8eb314-be55-446a-af10-d3fbfca972d8", "DetectTime": "2023-10-30T13:59:27.143808+02:00", "EventTime": "2023-10-30T13:59:27.143827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CemdZT2Hnm7X0UxA87"]} -{"Format": "IDEA0", "ID": "179aacdc-a07c-4cf2-99e8-b3e5a9627551", "DetectTime": "2023-10-30T13:59:27.177301+02:00", "EventTime": "2023-10-30T13:59:27.177312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CIMlJo5fqaEjwJkYd"]} -{"Format": "IDEA0", "ID": "1daf464f-5e00-4ba2-be3b-3a1f6cd24989", "DetectTime": "2023-10-30T13:59:27.206240+02:00", "EventTime": "2023-10-30T13:59:27.206257+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCrewe3YkZzNwLcu2e"]} -{"Format": "IDEA0", "ID": "bbc1ef2a-5da6-4208-9fdc-bfc11451cc4b", "DetectTime": "2023-10-30T13:59:27.218820+02:00", "EventTime": "2023-10-30T13:59:27.218837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.191.16.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.191.16.250 ", "ContentType": "text/plain"}], "uids": ["CC22KR19cMxrfdEuEd"]} -{"Format": "IDEA0", "ID": "e901ca76-ab91-49a8-b3d4-2c64fa4e4b3d", "DetectTime": "2023-10-30T13:59:27.248819+02:00", "EventTime": "2023-10-30T13:59:27.248832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CTbMPG2druk4hlnQ2h"]} -{"Format": "IDEA0", "ID": "9fb7febf-aaab-4432-a813-03f796ff7c79", "DetectTime": "2023-10-30T13:59:27.279146+02:00", "EventTime": "2023-10-30T13:59:27.279157+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.57.220"], "Hostname": ["adsl-ull-220-57.45-151.wind.it Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 151.45.57.220 from 10.0.2.19. blacklisted IP AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-220-57.45-151.wind.it Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CFhxskAPu7WOsrhE3"]} -{"Format": "IDEA0", "ID": "bd28a5f1-8bdf-4e0e-84e6-c3b17b562945", "DetectTime": "2023-10-30T13:59:27.308698+02:00", "EventTime": "2023-10-30T13:59:27.308718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.206.0.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.206.0.25 ", "ContentType": "text/plain"}], "uids": ["CecHwe1o11cJuhu399"]} -{"Format": "IDEA0", "ID": "1454a628-fbfe-4635-9af6-c7fad0ad7f8f", "DetectTime": "2023-10-30T13:59:27.326698+02:00", "EventTime": "2023-10-30T13:59:27.326709+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtjKRlmjPc00tVSQ"]} -{"Format": "IDEA0", "ID": "43990448-fa2e-48a3-9fc6-054a6f53c143", "DetectTime": "2023-10-30T13:59:27.336975+02:00", "EventTime": "2023-10-30T13:59:27.336988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["C1CxuoRMbIAuYB5Qc"]} -{"Format": "IDEA0", "ID": "26b8564c-624f-4a68-bc06-fdc82c0eec8b", "DetectTime": "2023-10-30T13:59:27.363182+02:00", "EventTime": "2023-10-30T13:59:27.363200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5Cx9T3N9oDLH9iRf4"]} -{"Format": "IDEA0", "ID": "3255292b-6ffd-49ce-aa2d-d12e32d40c13", "DetectTime": "2023-10-30T13:59:27.392988+02:00", "EventTime": "2023-10-30T13:59:27.392999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.57.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.57.114 ", "ContentType": "text/plain"}], "uids": ["Cailr33xXKJD7NbSqi"]} -{"Format": "IDEA0", "ID": "434b980e-58dc-4660-8ac3-563896612c11", "DetectTime": "2023-10-30T13:59:27.414627+02:00", "EventTime": "2023-10-30T13:59:27.414638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["Cqfb3U35XtLXIcl8ug"]} -{"Format": "IDEA0", "ID": "933f15e9-1d61-41e5-809a-8c89d41c432c", "DetectTime": "2023-10-30T13:59:27.444545+02:00", "EventTime": "2023-10-30T13:59:27.444555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.57.242 ", "ContentType": "text/plain"}], "uids": ["C4GgEOK0BkvIr2KL1"]} -{"Format": "IDEA0", "ID": "c26289f1-9b6c-4f0b-a649-ab53d2f3199d", "DetectTime": "2023-10-30T13:59:27.471606+02:00", "EventTime": "2023-10-30T13:59:27.471618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CHBhQT3foL1rVHnNyh"]} -{"Format": "IDEA0", "ID": "5a7f40f1-7732-4df6-b2ea-4d2623705a5d", "DetectTime": "2023-10-30T13:59:27.569689+02:00", "EventTime": "2023-10-30T13:59:27.569705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CH7iCI1KGskkqbfJb5"]} -{"Format": "IDEA0", "ID": "09a4a86f-dd6e-4ca1-9375-51df9ebeb88b", "DetectTime": "2023-10-30T13:59:27.603994+02:00", "EventTime": "2023-10-30T13:59:27.604011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CIrfrU2m3mNNBcU1Bc"]} -{"Format": "IDEA0", "ID": "0879db91-9194-490d-98ee-8483d29b42b0", "DetectTime": "2023-10-30T13:59:27.636877+02:00", "EventTime": "2023-10-30T13:59:27.636897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CGwVmh3Ob56gF0iaA3"]} -{"Format": "IDEA0", "ID": "919219a8-204d-4b89-b8db-b5f08fe09dbb", "DetectTime": "2023-10-30T13:59:27.674055+02:00", "EventTime": "2023-10-30T13:59:27.674075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.58.25 ", "ContentType": "text/plain"}], "uids": ["CGE5Sp48FMzqortCif"]} -{"Format": "IDEA0", "ID": "32ce2eea-e062-4425-94c4-3b265c0768e9", "DetectTime": "2023-10-30T13:59:27.707401+02:00", "EventTime": "2023-10-30T13:59:27.707418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CdezdH2IbRjlyro7Il"]} -{"Format": "IDEA0", "ID": "bb04fb0b-b8f9-44b7-9392-0d122b6818c2", "DetectTime": "2023-10-30T13:59:27.740522+02:00", "EventTime": "2023-10-30T13:59:27.740541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["C146u03DLsMalQYfNg"]} -{"Format": "IDEA0", "ID": "2ac86501-9cf5-4daa-806c-8dbd06d14312", "DetectTime": "2023-10-30T13:59:27.777172+02:00", "EventTime": "2023-10-30T13:59:27.777192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["C5NOJf3z6WgD3qzdyl"]} -{"Format": "IDEA0", "ID": "f9b4f523-ce0e-4eed-85c9-3ad6b6e61404", "DetectTime": "2023-10-30T13:59:27.806690+02:00", "EventTime": "2023-10-30T13:59:27.806703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.253.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.253.12 ", "ContentType": "text/plain"}], "uids": ["CSR0pO1Xe7pI8NVrt8"]} -{"Format": "IDEA0", "ID": "decac2fb-9aa0-425f-93b2-e36096b9c0ca", "DetectTime": "2023-10-30T13:59:27.840314+02:00", "EventTime": "2023-10-30T13:59:27.840331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["C6bRH0185zwudEglDj"]} -{"Format": "IDEA0", "ID": "6521ab4b-e356-4b98-9201-1b64694a6948", "DetectTime": "2023-10-30T13:59:27.872288+02:00", "EventTime": "2023-10-30T13:59:27.872299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CZcQUC1j0rf303FgQf"]} -{"Format": "IDEA0", "ID": "6823a6c2-fe4e-4a02-ac9f-44a65ac3f6db", "DetectTime": "2023-10-30T13:59:27.905404+02:00", "EventTime": "2023-10-30T13:59:27.905425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["C13uDSKpDZrF6em5g"]} -{"Format": "IDEA0", "ID": "70902500-7f7d-4f9e-bf1b-732476ef7389", "DetectTime": "2023-10-30T13:59:27.937906+02:00", "EventTime": "2023-10-30T13:59:27.937922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CXTOYz2nJjo5AKTMDk"]} -{"Format": "IDEA0", "ID": "198b2d26-44b4-4241-ad17-e5cfd08b8113", "DetectTime": "2023-10-30T13:59:27.976551+02:00", "EventTime": "2023-10-30T13:59:27.976567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CWrGvd1BoqogpG1C81"]} -{"Format": "IDEA0", "ID": "d6f6d242-b619-4579-bf8b-78f5f96d341d", "DetectTime": "2023-10-30T13:59:28.014588+02:00", "EventTime": "2023-10-30T13:59:28.014605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CC2xvJ32nclLOC3m2h"]} -{"Format": "IDEA0", "ID": "1f763f88-5d93-44a9-b33d-a246ffba13cd", "DetectTime": "2023-10-30T13:59:28.051136+02:00", "EventTime": "2023-10-30T13:59:28.051153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CrwYqM3V00KtgL0K55"]} -{"Format": "IDEA0", "ID": "28f16b52-a52b-4c34-8ba4-ecbe54199066", "DetectTime": "2023-10-30T13:59:28.089098+02:00", "EventTime": "2023-10-30T13:59:28.089119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CJU7xg10h0DM4nMrE7"]} -{"Format": "IDEA0", "ID": "fdf44da8-5f71-4128-9fca-3c66ebb0786d", "DetectTime": "2023-10-30T13:59:28.121920+02:00", "EventTime": "2023-10-30T13:59:28.121940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["C0I5HM3dcTnWwvmtjj"]} -{"Format": "IDEA0", "ID": "8466b7e9-f30e-4bbc-873a-2be24846ccd0", "DetectTime": "2023-10-30T13:59:28.161982+02:00", "EventTime": "2023-10-30T13:59:28.162008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["Cz7UR32JZeC3EfdbJ3"]} -{"Format": "IDEA0", "ID": "92306543-9f27-45ad-b523-7ea1401af381", "DetectTime": "2023-10-30T13:59:28.193636+02:00", "EventTime": "2023-10-30T13:59:28.193651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CZEHgH239QaxyLIlvi"]} -{"Format": "IDEA0", "ID": "7ffbeb75-e831-47e0-ac76-1fd126709ea9", "DetectTime": "2023-10-30T13:59:28.222775+02:00", "EventTime": "2023-10-30T13:59:28.222807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.58.25 ", "ContentType": "text/plain"}], "uids": ["CgWDR9ULTL5KJFrUe"]} -{"Format": "IDEA0", "ID": "edbeab9c-897d-4a9c-8092-07d1a694d03e", "DetectTime": "2023-10-30T13:59:28.262624+02:00", "EventTime": "2023-10-30T13:59:28.262643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CcOJJytkrjrrQsZg1"]} -{"Format": "IDEA0", "ID": "d414b205-8d0a-4907-815e-4da1e53962aa", "DetectTime": "2023-10-30T13:59:28.297857+02:00", "EventTime": "2023-10-30T13:59:28.297879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["Cg8sAC4kzCZJsVWASf"]} -{"Format": "IDEA0", "ID": "49c3d759-55de-464f-b0cf-8a1583dc7a08", "DetectTime": "2023-10-30T13:59:28.333151+02:00", "EventTime": "2023-10-30T13:59:28.333171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CaFxPS2zTobCFb4UDi"]} -{"Format": "IDEA0", "ID": "8c3f1069-b6f1-4af1-931f-4aedf724a999", "DetectTime": "2023-10-30T13:59:28.372979+02:00", "EventTime": "2023-10-30T13:59:28.372991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CPLRrM2ZwWAbJHe3T6"]} -{"Format": "IDEA0", "ID": "364b2043-5a6f-4301-9887-410984241a0d", "DetectTime": "2023-10-30T13:59:28.411749+02:00", "EventTime": "2023-10-30T13:59:28.411760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CRMKk24cWwLMrcQHZi"]} -{"Format": "IDEA0", "ID": "958752e8-dbe8-4246-880e-e19ed616f317", "DetectTime": "2023-10-30T13:59:28.444749+02:00", "EventTime": "2023-10-30T13:59:28.444766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["CxKHXi1iJw28E6AR1"]} -{"Format": "IDEA0", "ID": "9b1b7aa6-672c-449a-a84b-feb9bd553c66", "DetectTime": "2023-10-30T13:59:28.478749+02:00", "EventTime": "2023-10-30T13:59:28.478770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C6TWG93lHHHZeqKBue"]} -{"Format": "IDEA0", "ID": "42df55c4-1407-4482-9618-40b5fcf728b1", "DetectTime": "2023-10-30T13:59:28.517797+02:00", "EventTime": "2023-10-30T13:59:28.517819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["Cw21Ik4wT42HwWcXjk"]} -{"Format": "IDEA0", "ID": "457ff992-9aec-4cef-b24d-5c3678bfd70a", "DetectTime": "2023-10-30T13:59:28.552055+02:00", "EventTime": "2023-10-30T13:59:28.552074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CE6lvP2spDJJ4kZRo5"]} -{"Format": "IDEA0", "ID": "630f9b1d-c6b4-4c5e-8032-a57409d471bb", "DetectTime": "2023-10-30T13:59:28.590838+02:00", "EventTime": "2023-10-30T13:59:28.590854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.161.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.161.47 ", "ContentType": "text/plain"}], "uids": ["CaKbcC2nPBSRycLIV7"]} -{"Format": "IDEA0", "ID": "5a260a51-2ff5-417c-b155-b9f2dbb77574", "DetectTime": "2023-10-30T13:59:28.628606+02:00", "EventTime": "2023-10-30T13:59:28.628625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Ct7XiD4V5gHsyWDDri"]} -{"Format": "IDEA0", "ID": "5daf3e23-f5f7-41f0-a860-7e2775fa2da3", "DetectTime": "2023-10-30T13:59:28.668169+02:00", "EventTime": "2023-10-30T13:59:28.668181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 ", "ContentType": "text/plain"}], "uids": ["CKqGqj3LYWkEwZS7od"]} -{"Format": "IDEA0", "ID": "2c83cf11-ae20-431b-a98b-e077703cc750", "DetectTime": "2023-10-30T13:59:28.701127+02:00", "EventTime": "2023-10-30T13:59:28.701144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CNId9140X4C8CBr7K3"]} -{"Format": "IDEA0", "ID": "e4e93ff4-b7b3-499b-9499-032b22bd0147", "DetectTime": "2023-10-30T13:59:28.733249+02:00", "EventTime": "2023-10-30T13:59:28.733265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.57.242 ", "ContentType": "text/plain"}], "uids": ["CHN4ee4qV9qszIEBzc"]} -{"Format": "IDEA0", "ID": "1c57f589-7bdb-4a83-a345-60463ee432ca", "DetectTime": "2023-10-30T13:59:28.768625+02:00", "EventTime": "2023-10-30T13:59:28.768644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CcdnQE1PNyqkmcNHXa"]} -{"Format": "IDEA0", "ID": "afdc3b03-aa1b-4a03-9b67-9de4f847ea81", "DetectTime": "2023-10-30T13:59:28.802741+02:00", "EventTime": "2023-10-30T13:59:28.802755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CJAjqU2cQ2sGFXt7q6"]} -{"Format": "IDEA0", "ID": "9e6224a3-dc9e-4405-be79-f26b5acde455", "DetectTime": "2023-10-30T13:59:28.835023+02:00", "EventTime": "2023-10-30T13:59:28.835040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CCDZqq2dA5qYSTXmZ7"]} -{"Format": "IDEA0", "ID": "6dc0ab7b-0069-483e-a678-f3702e2c016e", "DetectTime": "2023-10-30T13:59:28.869929+02:00", "EventTime": "2023-10-30T13:59:28.869945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CI1NqX1Cby0m7HtcBl"]} -{"Format": "IDEA0", "ID": "b64369fc-1cef-4109-b25c-d101e98a2cc7", "DetectTime": "2023-10-30T13:59:28.902828+02:00", "EventTime": "2023-10-30T13:59:28.902844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CKyhwz4DRAnpOwJNhg"]} -{"Format": "IDEA0", "ID": "5d94c717-829f-449f-8e5a-2070c7097df9", "DetectTime": "2023-10-30T13:59:28.936670+02:00", "EventTime": "2023-10-30T13:59:28.936687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["ChlUX71H0MtXovnjB9"]} -{"Format": "IDEA0", "ID": "126b7412-2bfc-4ede-9dda-65aebb39d75c", "DetectTime": "2023-10-30T13:59:28.967641+02:00", "EventTime": "2023-10-30T13:59:28.967658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CjpbtD4XAFp1zMZW36"]} -{"Format": "IDEA0", "ID": "9b30566a-45c1-45b3-954b-59eb91fbc0ca", "DetectTime": "2023-10-30T13:59:29.004910+02:00", "EventTime": "2023-10-30T13:59:29.004926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["Cq8cVVoRpcGC5aei4"]} -{"Format": "IDEA0", "ID": "911211cf-a92f-4d18-b304-ceebc54c0115", "DetectTime": "2023-10-30T13:59:29.043049+02:00", "EventTime": "2023-10-30T13:59:29.043075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CLmiKZ1ETSy22titDj"]} -{"Format": "IDEA0", "ID": "71458348-4371-471d-b166-1ca69fcb1000", "DetectTime": "2023-10-30T13:59:29.078597+02:00", "EventTime": "2023-10-30T13:59:29.078616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.55.163 ", "ContentType": "text/plain"}], "uids": ["CFHcPn3f3CF55dRLke"]} -{"Format": "IDEA0", "ID": "f660406f-1f97-426a-801a-fd0b00b82bea", "DetectTime": "2023-10-30T13:59:29.113521+02:00", "EventTime": "2023-10-30T13:59:29.113537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CRMuyz2K4oCEzxPlP8"]} -{"Format": "IDEA0", "ID": "e9602705-fa46-4aa0-ac83-d99ca6418393", "DetectTime": "2023-10-30T13:59:29.140861+02:00", "EventTime": "2023-10-30T13:59:29.140875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CYqKJr40q0fTQtvQQi"]} -{"Format": "IDEA0", "ID": "a172f659-10a6-4ced-ab67-3256bd2dd8d2", "DetectTime": "2023-10-30T13:59:29.172018+02:00", "EventTime": "2023-10-30T13:59:29.172039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CZEmbE3tXX7zlz3TC4"]} -{"Format": "IDEA0", "ID": "a92ccf92-ca57-4c5c-9d15-b82f75708a34", "DetectTime": "2023-10-30T13:59:29.205202+02:00", "EventTime": "2023-10-30T13:59:29.205217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CaZXKOxJRnQfnSzS3"]} -{"Format": "IDEA0", "ID": "7001d670-191e-499c-8166-f33bc593e49c", "DetectTime": "2023-10-30T13:59:29.235075+02:00", "EventTime": "2023-10-30T13:59:29.235088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["Ce6pWn1Dc8MjRAwQVa"]} -{"Format": "IDEA0", "ID": "ea136efd-72d6-428f-a75e-32f930a4c390", "DetectTime": "2023-10-30T13:59:29.264706+02:00", "EventTime": "2023-10-30T13:59:29.264718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CUN6vr1NyjAM1lm8h7"]} -{"Format": "IDEA0", "ID": "851d31e6-02bb-43fa-b016-4394736e1b30", "DetectTime": "2023-10-30T13:59:29.290121+02:00", "EventTime": "2023-10-30T13:59:29.290134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CoXp854pvgOBNdkGT4"]} -{"Format": "IDEA0", "ID": "70741b8a-37f8-48c4-a4c6-8261515f3fc9", "DetectTime": "2023-10-30T13:59:29.323977+02:00", "EventTime": "2023-10-30T13:59:29.323995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.162.252.216 ", "ContentType": "text/plain"}], "uids": ["C64r461Mxy1QiYD3i2"]} -{"Format": "IDEA0", "ID": "2f14f0d5-6600-4f7b-b2f6-5a8f54919028", "DetectTime": "2023-10-30T13:59:29.355033+02:00", "EventTime": "2023-10-30T13:59:29.355055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["Cp23e02TAujzbrXeG4"]} -{"Format": "IDEA0", "ID": "b17b2c7e-f428-46ba-878b-b3ce448cb892", "DetectTime": "2023-10-30T13:59:29.387938+02:00", "EventTime": "2023-10-30T13:59:29.387954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 ", "ContentType": "text/plain"}], "uids": ["C5ZYtS1MIigKOahyV7"]} -{"Format": "IDEA0", "ID": "414db7cb-fbfb-4cb1-8d6b-b0b1d6ea9017", "DetectTime": "2023-10-30T13:59:29.420808+02:00", "EventTime": "2023-10-30T13:59:29.420828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CwGiYL36vIykfxlXIb"]} -{"Format": "IDEA0", "ID": "9f981bff-033e-498d-88a7-c759d3c1792c", "DetectTime": "2023-10-30T13:59:29.449804+02:00", "EventTime": "2023-10-30T13:59:29.449817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.172.99.119 ", "ContentType": "text/plain"}], "uids": ["CxrLXkTWmNB6w1HVk"]} -{"Format": "IDEA0", "ID": "aa1a40cc-a917-4a7e-9017-b9bc3d5f191f", "DetectTime": "2023-10-30T13:59:29.474827+02:00", "EventTime": "2023-10-30T13:59:29.474848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["Cdkxf10AoEAgpfiF3"]} -{"Format": "IDEA0", "ID": "7e06381b-d396-4ebd-8ad1-51e1a483feaf", "DetectTime": "2023-10-30T13:59:29.508222+02:00", "EventTime": "2023-10-30T13:59:29.508242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["CIgtkuD2r8dGYXiuc"]} -{"Format": "IDEA0", "ID": "70e0c0c3-f938-4f19-9af7-e72a246d5625", "DetectTime": "2023-10-30T13:59:29.611821+02:00", "EventTime": "2023-10-30T13:59:29.611838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CdgI5LGoT8fOkwcI6"]} -{"Format": "IDEA0", "ID": "1eb8ff45-a253-4d77-a73c-7a5432b402fc", "DetectTime": "2023-10-30T13:59:29.648354+02:00", "EventTime": "2023-10-30T13:59:29.648371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["CNYw4W1W6pIc0RHb7l"]} -{"Format": "IDEA0", "ID": "92d6d226-70fb-4614-a0c0-e7c51110d768", "DetectTime": "2023-10-30T13:59:29.678747+02:00", "EventTime": "2023-10-30T13:59:29.678763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.57.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.57.114 ", "ContentType": "text/plain"}], "uids": ["CZM34OvGLSTke5qI4"]} -{"Format": "IDEA0", "ID": "933c7861-2db5-4079-892f-f608eb5528cf", "DetectTime": "2023-10-30T13:59:29.712954+02:00", "EventTime": "2023-10-30T13:59:29.712970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CxcgXx3Ajgjn7vB4ga"]} -{"Format": "IDEA0", "ID": "137655d6-93ab-492e-bb91-57f609bcfde9", "DetectTime": "2023-10-30T13:59:29.749999+02:00", "EventTime": "2023-10-30T13:59:29.750014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CAcvyj3GmAKffXJSz6"]} -{"Format": "IDEA0", "ID": "5ca0f705-2561-4dd1-bbf0-95520c2662af", "DetectTime": "2023-10-30T13:59:29.787024+02:00", "EventTime": "2023-10-30T13:59:29.787041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CccVJl16CxwbHQKuO8"]} -{"Format": "IDEA0", "ID": "5cc0ae88-4b8a-49cd-b246-43dfb097563e", "DetectTime": "2023-10-30T13:59:29.828109+02:00", "EventTime": "2023-10-30T13:59:29.828124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["CKxFyB2QpiyQL069ti"]} -{"Format": "IDEA0", "ID": "37de91b6-030f-4734-aa51-ed0a5c14f557", "DetectTime": "2023-10-30T13:59:29.878704+02:00", "EventTime": "2023-10-30T13:59:29.878720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["CD7biP1v5TXb0Vqo25"]} -{"Format": "IDEA0", "ID": "b1c0ee94-7081-4e7d-9c5a-5bc78fb3bd01", "DetectTime": "2023-10-30T13:59:29.920596+02:00", "EventTime": "2023-10-30T13:59:29.920614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CR2SGe2yXj3x9E2FLh"]} -{"Format": "IDEA0", "ID": "edbdd404-2e00-4213-96a1-493f7e2f9e24", "DetectTime": "2023-10-30T13:59:29.961299+02:00", "EventTime": "2023-10-30T13:59:29.961321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.161.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.161.47 ", "ContentType": "text/plain"}], "uids": ["C7Hs4eG4PTWsEqj4k"]} -{"Format": "IDEA0", "ID": "5d5011e2-3a1f-4298-a4b9-64ecd3687ce4", "DetectTime": "2023-10-30T13:59:30.000834+02:00", "EventTime": "2023-10-30T13:59:30.000850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["Cn18hJ3ru5459pw5md"]} -{"Format": "IDEA0", "ID": "6256f0a0-12f8-4825-9a98-6e206801eee7", "DetectTime": "2023-10-30T13:59:30.031874+02:00", "EventTime": "2023-10-30T13:59:30.031887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["Cs7V4FTtjCdmDzLMh"]} -{"Format": "IDEA0", "ID": "dba3f1a9-c8a5-4e4c-8ba1-169b096930bb", "DetectTime": "2023-10-30T13:59:30.065160+02:00", "EventTime": "2023-10-30T13:59:30.065176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["CrkerL1NntvmQFEdN9"]} -{"Format": "IDEA0", "ID": "53e2ff67-7925-4148-a1a7-f0e5c6b98020", "DetectTime": "2023-10-30T13:59:30.101772+02:00", "EventTime": "2023-10-30T13:59:30.101792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.202.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.202.140 ", "ContentType": "text/plain"}], "uids": ["CwkuyzzXcezjxGPM6"]} -{"Format": "IDEA0", "ID": "9824165d-cb35-4a4d-bd08-5bcccdbdceea", "DetectTime": "2023-10-30T13:59:30.133855+02:00", "EventTime": "2023-10-30T13:59:30.133867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.253.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.253.12 ", "ContentType": "text/plain"}], "uids": ["CUKpQs1tgYl1RiFc"]} -{"Format": "IDEA0", "ID": "47222418-447e-4c8f-97b4-ef133f2d387e", "DetectTime": "2023-10-30T13:59:30.165659+02:00", "EventTime": "2023-10-30T13:59:30.165761+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkvPN41Mo9BjHRJHf8"]} -{"Format": "IDEA0", "ID": "2ed40d3f-0f3f-4c0a-a932-ce1c8c41d2e4", "DetectTime": "2023-10-30T13:59:30.179709+02:00", "EventTime": "2023-10-30T13:59:30.179728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.202.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.202.140 ", "ContentType": "text/plain"}], "uids": ["C0MIfYAVCF7VnFzfk"]} -{"Format": "IDEA0", "ID": "41bc180a-86be-413b-8777-eebe0d4a8651", "DetectTime": "2023-10-30T13:59:30.216082+02:00", "EventTime": "2023-10-30T13:59:30.216098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CGsd6p1hmmmefe28Jc"]} -{"Format": "IDEA0", "ID": "0e7dc7b8-6fc4-4dde-a880-f0912d094acd", "DetectTime": "2023-10-30T13:59:30.254953+02:00", "EventTime": "2023-10-30T13:59:30.254974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["C8svQN1x23BiFFwmIc"]} -{"Format": "IDEA0", "ID": "7ee1e28b-d49c-4bd1-94b5-ae4179a409e2", "DetectTime": "2023-10-30T13:59:30.291326+02:00", "EventTime": "2023-10-30T13:59:30.291347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CfkCwl2KviDaUU5rm4"]} -{"Format": "IDEA0", "ID": "884f7a3a-c8c5-4f1a-8b6f-a78c70922cc2", "DetectTime": "2023-10-30T13:59:30.327691+02:00", "EventTime": "2023-10-30T13:59:30.327709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C8lQIT3P7ZEuROiMc9"]} -{"Format": "IDEA0", "ID": "f5a9d993-c8c2-48fb-9848-f4a74a5aed44", "DetectTime": "2023-10-30T13:59:30.364663+02:00", "EventTime": "2023-10-30T13:59:30.364679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CASwq44gSj0DeoRZl9"]} -{"Format": "IDEA0", "ID": "6a0ae2a4-d0d1-49e7-bfdc-0cdd9903329a", "DetectTime": "2023-10-30T13:59:30.400174+02:00", "EventTime": "2023-10-30T13:59:30.400189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZLQCV2xQIuJZyBXU5"]} -{"Format": "IDEA0", "ID": "263ff75b-885e-4e3e-8a63-0875fbf000da", "DetectTime": "2023-10-30T13:59:30.436589+02:00", "EventTime": "2023-10-30T13:59:30.436610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["CxoWOA316wkCjjIbFg"]} -{"Format": "IDEA0", "ID": "dd7d93ab-3fb9-4f5a-b9cd-5c90f256697e", "DetectTime": "2023-10-30T13:59:30.476125+02:00", "EventTime": "2023-10-30T13:59:30.476140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.191.16.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.191.16.250 ", "ContentType": "text/plain"}], "uids": ["C4EGJR3xQ4BYYrdRF2"]} -{"Format": "IDEA0", "ID": "b92dd139-1853-44e2-b308-0db48166b499", "DetectTime": "2023-10-30T13:59:30.512180+02:00", "EventTime": "2023-10-30T13:59:30.512196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["C0kPxZ1rOhZzIehrz2"]} -{"Format": "IDEA0", "ID": "8a1ba717-b8f4-40e6-8a68-964623e63411", "DetectTime": "2023-10-30T13:59:30.551188+02:00", "EventTime": "2023-10-30T13:59:30.551207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.55.163 ", "ContentType": "text/plain"}], "uids": ["CCU06SdEI007FIkt1"]} -{"Format": "IDEA0", "ID": "5dc5559b-c00c-4e44-83af-88d043890c3e", "DetectTime": "2023-10-30T13:59:30.584214+02:00", "EventTime": "2023-10-30T13:59:30.584226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.162.252.216 ", "ContentType": "text/plain"}], "uids": ["CsyNwb44pDMkVn13Zf"]} -{"Format": "IDEA0", "ID": "3b489dc4-5d9b-42d8-a91e-0ca57bd7deb4", "DetectTime": "2023-10-30T13:59:30.618953+02:00", "EventTime": "2023-10-30T13:59:30.618973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CtI7Nw69G4KW9gAAh"]} -{"Format": "IDEA0", "ID": "ca15f33b-76af-465a-a62d-c1ced122caf7", "DetectTime": "2023-10-30T13:59:30.662113+02:00", "EventTime": "2023-10-30T13:59:30.662134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["Cd4CLI30jVRl7M3B2g"]} -{"Format": "IDEA0", "ID": "b612eb21-e0fd-4cfc-bec8-a13d764b1668", "DetectTime": "2023-10-30T13:59:30.697253+02:00", "EventTime": "2023-10-30T13:59:30.697268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CPdubt3GN1D22L915f"]} -{"Format": "IDEA0", "ID": "a334543b-c73f-459e-86e7-4fe755bde6a8", "DetectTime": "2023-10-30T13:59:30.734642+02:00", "EventTime": "2023-10-30T13:59:30.734658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CIjQ2424vh2vnIjLN2"]} -{"Format": "IDEA0", "ID": "338c0791-60d3-4686-876a-4c140ce3fac5", "DetectTime": "2023-10-30T13:59:30.775998+02:00", "EventTime": "2023-10-30T13:59:30.776018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CCpmAn4YzHUrk6Ca7i"]} -{"Format": "IDEA0", "ID": "011456b1-f82e-431e-bba6-7c26522e4307", "DetectTime": "2023-10-30T13:59:30.810438+02:00", "EventTime": "2023-10-30T13:59:30.810457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["Cj4G6a3JVRcmg7DOuk"]} -{"Format": "IDEA0", "ID": "17fdd097-83b7-4ff3-bc06-6cecfb72bcde", "DetectTime": "2023-10-30T13:59:30.844134+02:00", "EventTime": "2023-10-30T13:59:30.844153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN3oUj3fGftszONeSg"]} -{"Format": "IDEA0", "ID": "b974011d-3064-4c27-a3ac-58670e176a90", "DetectTime": "2023-10-30T13:59:30.880335+02:00", "EventTime": "2023-10-30T13:59:30.880348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CA6x39loBQJUNDJfc", "CPPU3G4rUU0kg1EAl3", "CAJda11hcGaiR9kfah", "CtjKRlmjPc00tVSQ"]} -{"Format": "IDEA0", "ID": "56af4335-4a2f-4317-a6e5-d7e5e1a18fd9", "DetectTime": "2023-10-30T13:59:30.892037+02:00", "EventTime": "2023-10-30T13:59:30.892054+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPPU3G4rUU0kg1EAl3"]} -{"Format": "IDEA0", "ID": "2babf054-0a45-4aba-9a10-844c299ad018", "DetectTime": "2023-10-30T13:59:30.903865+02:00", "EventTime": "2023-10-30T13:59:30.903880+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuuCEJ1K24KhFE6IDa"]} -{"Format": "IDEA0", "ID": "e0ad8bc6-15c0-4a0c-a547-5cc354a89dde", "DetectTime": "2023-10-30T13:59:30.919635+02:00", "EventTime": "2023-10-30T13:59:30.919648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPDJfl1R6DqpTy0x4b"]} -{"Format": "IDEA0", "ID": "5b54fb06-00a1-4e96-86a3-189fe7f5e15a", "DetectTime": "2023-10-30T13:59:30.930133+02:00", "EventTime": "2023-10-30T13:59:30.930144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. ", "ContentType": "text/plain"}], "uids": ["CiLbXX2AFhPnjXl9E4"]} -{"Format": "IDEA0", "ID": "6a96b704-907d-4a14-9a8c-4df3bf17f38c", "DetectTime": "2023-10-30T13:59:30.965778+02:00", "EventTime": "2023-10-30T13:59:30.965790+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGyIVO3g1DSp3fe8Kb"]} -{"Format": "IDEA0", "ID": "42a9ab83-3acb-4a1f-a2df-a0d3ec38ee3b", "DetectTime": "2023-10-30T13:59:30.977550+02:00", "EventTime": "2023-10-30T13:59:30.977562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["Cw9I6N335vZnxodPX9"]} -{"Format": "IDEA0", "ID": "b1de5748-d338-4c1d-9af1-4d1b83eee48a", "DetectTime": "2023-10-30T13:59:31.009553+02:00", "EventTime": "2023-10-30T13:59:31.009564+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHWPee4IPlQKEmi1kd"]} -{"Format": "IDEA0", "ID": "2899015b-1f41-490c-bb29-a565c2ba3c32", "DetectTime": "2023-10-30T13:59:31.020112+02:00", "EventTime": "2023-10-30T13:59:31.020128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["C1OzG04B469eaUZfei"]} -{"Format": "IDEA0", "ID": "01346f93-ccea-4c00-ba36-27dde2525915", "DetectTime": "2023-10-30T13:59:31.060139+02:00", "EventTime": "2023-10-30T13:59:31.060155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C2QWkB4uLIpYRnZTS8"]} -{"Format": "IDEA0", "ID": "461244f5-aa08-4aa1-906c-49c27bd99e97", "DetectTime": "2023-10-30T13:59:31.096461+02:00", "EventTime": "2023-10-30T13:59:31.096473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. ", "ContentType": "text/plain"}], "uids": ["CI5LQE2aGGfU21pd45"]} -{"Format": "IDEA0", "ID": "3a99bf5e-54df-486b-ba6f-2c8dfc886b0a", "DetectTime": "2023-10-30T13:59:31.137272+02:00", "EventTime": "2023-10-30T13:59:31.137289+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWoTUb1QICSiV2mzQc"]} -{"Format": "IDEA0", "ID": "400a8228-a2e1-419a-bc94-d439f3c5f665", "DetectTime": "2023-10-30T13:59:31.150423+02:00", "EventTime": "2023-10-30T13:59:31.150440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CUAn0GgTHLkf0uab"]} -{"Format": "Json", "ID": "400a8228-a2e1-419a-bc94-d439f3c5f665", "DetectTime": "2023-10-30T13:59:31.150423+02:00", "EventTime": "2023-10-30T13:59:31.150440+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:50:42.092147+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:31.220135)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9a11c6cf-896b-4435-96d2-fd187be4b97a", "DetectTime": "2023-10-30T13:59:31.224443+02:00", "EventTime": "2023-10-30T13:59:31.224455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CywPhE4JRkk0jtGNI3"]} -{"Format": "IDEA0", "ID": "4e252ac6-749f-479c-842a-a3c33601b5f0", "DetectTime": "2023-10-30T13:59:31.262975+02:00", "EventTime": "2023-10-30T13:59:31.262993+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWT8Sx3rNL7aD0jj7g"]} -{"Format": "IDEA0", "ID": "0612abf2-8293-43e5-9f95-01ae1dbc35c7", "DetectTime": "2023-10-30T13:59:31.275183+02:00", "EventTime": "2023-10-30T13:59:31.275199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CvAX071xpC9nLHCmbe"]} -{"Format": "IDEA0", "ID": "4dfbd313-9df3-4517-9c18-1f5fe0343f43", "DetectTime": "2023-10-30T13:59:31.311416+02:00", "EventTime": "2023-10-30T13:59:31.311429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. ", "ContentType": "text/plain"}], "uids": ["CpxaDr1mLzcf8tvoF5"]} -{"Format": "IDEA0", "ID": "b536453a-ec14-4571-8102-720240637aad", "DetectTime": "2023-10-30T13:59:31.348060+02:00", "EventTime": "2023-10-30T13:59:31.348077+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIveZd4DQMGBt7MVGe"]} -{"Format": "IDEA0", "ID": "43bb7acc-5652-4ac5-8a2f-063d1e8d25a7", "DetectTime": "2023-10-30T13:59:31.360908+02:00", "EventTime": "2023-10-30T13:59:31.360926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16838], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. ", "ContentType": "text/plain"}], "uids": ["CLeVLZ1Yeax9FQq5f3"]} -{"Format": "IDEA0", "ID": "270b2ee2-e598-4508-b910-37391fd8684e", "DetectTime": "2023-10-30T13:59:31.397484+02:00", "EventTime": "2023-10-30T13:59:31.397504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPDJfl1R6DqpTy0x4b", "CWT8Sx3rNL7aD0jj7g", "CAfLcd1O6uWg0pvz9j", "CHWPee4IPlQKEmi1kd"]} -{"Format": "IDEA0", "ID": "a023afe9-c9ed-458e-afc3-c81739dbba18", "DetectTime": "2023-10-30T13:59:31.408911+02:00", "EventTime": "2023-10-30T13:59:31.408928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9752], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. ", "ContentType": "text/plain"}], "uids": ["C5QdTud6i9K9Joxz4"]} -{"Format": "IDEA0", "ID": "14ed3ce1-b6a9-43f1-a111-fecb24404cc8", "DetectTime": "2023-10-30T13:59:31.443123+02:00", "EventTime": "2023-10-30T13:59:31.443137+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAfLcd1O6uWg0pvz9j"]} -{"Format": "IDEA0", "ID": "86d24a4a-e346-4971-93b1-6ee9149eb88e", "DetectTime": "2023-10-30T13:59:31.455384+02:00", "EventTime": "2023-10-30T13:59:31.455513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["ChTmGs1ANCScn628ra"]} -{"Format": "IDEA0", "ID": "73f7e58b-d0a4-4ac1-8d10-6b71cab9f97f", "DetectTime": "2023-10-30T13:59:31.490071+02:00", "EventTime": "2023-10-30T13:59:31.490082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CpBhNX2inMhW3Yuah7"]} -{"Format": "IDEA0", "ID": "bc4a6691-db0a-4a92-9714-2baec45357c9", "DetectTime": "2023-10-30T13:59:31.524157+02:00", "EventTime": "2023-10-30T13:59:31.524173+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ci7R9T3eIkLa7erp8j"]} -{"Format": "IDEA0", "ID": "7b0e47b0-c6c7-4e39-851e-2e021960d09f", "DetectTime": "2023-10-30T13:59:31.535934+02:00", "EventTime": "2023-10-30T13:59:31.535951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CfT1mZCIUqSeaMp9l"]} -{"Format": "Json", "ID": "7b0e47b0-c6c7-4e39-851e-2e021960d09f", "DetectTime": "2023-10-30T13:59:31.535934+02:00", "EventTime": "2023-10-30T13:59:31.535951+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:50:43.420106+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:31.595430)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fad6f5ca-e3cb-4e07-b53b-11fa8ff09e89", "DetectTime": "2023-10-30T13:59:31.599379+02:00", "EventTime": "2023-10-30T13:59:31.599389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. ", "ContentType": "text/plain"}], "uids": ["CZ6wAzeFVc0XUepfa"]} -{"Format": "IDEA0", "ID": "4ac2dc50-7b2f-49d5-a778-469185a12e8f", "DetectTime": "2023-10-30T13:59:31.633925+02:00", "EventTime": "2023-10-30T13:59:31.633937+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQ65hTk8AojtwPTAe"]} -{"Format": "IDEA0", "ID": "62416560-0b35-4051-be78-7a723966133a", "DetectTime": "2023-10-30T13:59:31.645825+02:00", "EventTime": "2023-10-30T13:59:31.645840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CpItsu1modY7wlG2R5"]} -{"Format": "IDEA0", "ID": "a5d7997f-72c1-433b-8966-84b357a0ff5c", "DetectTime": "2023-10-30T13:59:31.675059+02:00", "EventTime": "2023-10-30T13:59:31.675077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["Cpw1NQ1k9bZ1KfqcUi"]} -{"Format": "IDEA0", "ID": "591ee9ef-65a3-4580-9f3e-79dc20cca95d", "DetectTime": "2023-10-30T13:59:31.705381+02:00", "EventTime": "2023-10-30T13:59:31.705398+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcfnNz4ps1hjPE4DHj"]} -{"Format": "IDEA0", "ID": "e42778fe-d764-4fda-96e1-74d700211a78", "DetectTime": "2023-10-30T13:59:31.715502+02:00", "EventTime": "2023-10-30T13:59:31.715522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["C9j5ozAWn2NzUToC7"]} -{"Format": "IDEA0", "ID": "8d61dcde-218d-4194-9e1f-2ee7454b7dab", "DetectTime": "2023-10-30T13:59:31.747555+02:00", "EventTime": "2023-10-30T13:59:31.747571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["Cet43C3Q2qFIx5ewE"]} -{"Format": "IDEA0", "ID": "5c03292e-425a-4be0-a293-64695d4a2384", "DetectTime": "2023-10-30T13:59:31.781594+02:00", "EventTime": "2023-10-30T13:59:31.781614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CItrwA1PnkncXDVazi"]} -{"Format": "IDEA0", "ID": "fe4bb2b8-1fdf-41d4-9de5-c30656f4ee3a", "DetectTime": "2023-10-30T13:59:31.812151+02:00", "EventTime": "2023-10-30T13:59:31.812162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["Cn3XVF1lnD8zikvXee"]} -{"Format": "IDEA0", "ID": "57c9285f-b114-4d5e-b4c4-ed25dda2723f", "DetectTime": "2023-10-30T13:59:31.842904+02:00", "EventTime": "2023-10-30T13:59:31.842915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CCzusx19QJIGEcnr8a"]} -{"Format": "Json", "ID": "57c9285f-b114-4d5e-b4c4-ed25dda2723f", "DetectTime": "2023-10-30T13:59:31.842904+02:00", "EventTime": "2023-10-30T13:59:31.842915+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4384], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:50:45.377365+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:31.892053)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2bd31316-373d-4226-9fa3-1a80f204850c", "DetectTime": "2023-10-30T13:59:31.897619+02:00", "EventTime": "2023-10-30T13:59:31.897635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. ", "ContentType": "text/plain"}], "uids": ["C5zOy2AJsYgOOgGs6"]} -{"Format": "IDEA0", "ID": "e60d9930-0df9-46ee-84f4-6ae02c172c5f", "DetectTime": "2023-10-30T13:59:31.932586+02:00", "EventTime": "2023-10-30T13:59:31.932608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["C9KPvH8ynVbVnSyhj"]} -{"Format": "IDEA0", "ID": "9937d448-ab3f-4df3-9463-d1892e36527f", "DetectTime": "2023-10-30T13:59:31.964492+02:00", "EventTime": "2023-10-30T13:59:31.964513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11036], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. ", "ContentType": "text/plain"}], "uids": ["CaDKvq4AEGFY2fD3sg"]} -{"Format": "IDEA0", "ID": "a7a8c779-10e6-48f7-b814-9a4868859e61", "DetectTime": "2023-10-30T13:59:31.997461+02:00", "EventTime": "2023-10-30T13:59:31.997480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["Cj4ZkXs88tPu8xZif"]} -{"Format": "IDEA0", "ID": "fe21813d-dcab-49a9-a50c-925941ee5717", "DetectTime": "2023-10-30T13:59:32.026485+02:00", "EventTime": "2023-10-30T13:59:32.026502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["CiB3AAxYrXoZP86l1"]} -{"Format": "IDEA0", "ID": "dc482049-cb58-4447-a1d3-b0a57ce7843a", "DetectTime": "2023-10-30T13:59:32.053964+02:00", "EventTime": "2023-10-30T13:59:32.053981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CEFZha1VvLP4N7s1o2"]} -{"Format": "IDEA0", "ID": "274d323d-648c-4838-a2ca-40dea9922568", "DetectTime": "2023-10-30T13:59:32.079662+02:00", "EventTime": "2023-10-30T13:59:32.079681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CflAjc4rIHXQmei9zc"]} -{"Format": "IDEA0", "ID": "b80b2b40-e055-4c95-b27e-9b4c1b141519", "DetectTime": "2023-10-30T13:59:32.110641+02:00", "EventTime": "2023-10-30T13:59:32.110657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CvmOBY1WBAxXYBLdV5"]} -{"Format": "Json", "ID": "b80b2b40-e055-4c95-b27e-9b4c1b141519", "DetectTime": "2023-10-30T13:59:32.110641+02:00", "EventTime": "2023-10-30T13:59:32.110657+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T22:51:38.096582+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2023/10/30 13:59:32.165324)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "190dd977-697a-4408-a68b-c59ad53bc0e5", "DetectTime": "2023-10-30T13:59:32.170915+02:00", "EventTime": "2023-10-30T13:59:32.170927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["CyBe5u190BziSM9Qoj"]} -{"Format": "IDEA0", "ID": "64e53afe-8ff8-42cd-a335-7ec83d672cc0", "DetectTime": "2023-10-30T13:59:32.199101+02:00", "EventTime": "2023-10-30T13:59:32.199119+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcVI8UBsIpe3oag8i"]} -{"Format": "IDEA0", "ID": "60efe5dd-b03b-4f0c-9280-58f1c3e11618", "DetectTime": "2023-10-30T13:59:32.214441+02:00", "EventTime": "2023-10-30T13:59:32.214463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CE84uvZcwRkBMfACh"]} -{"Format": "IDEA0", "ID": "09a247b7-fc39-4183-a1ab-442a247d4b7f", "DetectTime": "2023-10-30T13:59:32.244308+02:00", "EventTime": "2023-10-30T13:59:32.244325+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cc5f9O31YK4qeXysQ3"]} -{"Format": "IDEA0", "ID": "520f9808-b65d-415a-8d04-1328df5223b5", "DetectTime": "2023-10-30T13:59:32.253407+02:00", "EventTime": "2023-10-30T13:59:32.253419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["C20Bh73ptaP4q1OGj"]} -{"Format": "IDEA0", "ID": "d5f66d56-0a87-4f94-8ef8-c94c45258ea2", "DetectTime": "2023-10-30T13:59:32.282220+02:00", "EventTime": "2023-10-30T13:59:32.282240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["Ca9ZXGYL2FU5Wydc"]} -{"Format": "IDEA0", "ID": "033a3ec0-8a48-4230-82a5-bd4957581ea7", "DetectTime": "2023-10-30T13:59:32.311292+02:00", "EventTime": "2023-10-30T13:59:32.311315+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJsKUa2ykozS8BDphh"]} -{"Format": "IDEA0", "ID": "e6193063-567d-4d66-896e-3c8ca325ac52", "DetectTime": "2023-10-30T13:59:32.329137+02:00", "EventTime": "2023-10-30T13:59:32.329155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CAjSvI3k0AGzhBL4I"]} -{"Format": "IDEA0", "ID": "b80c44df-c9a7-4199-ab55-b37cd9f5b647", "DetectTime": "2023-10-30T13:59:32.357287+02:00", "EventTime": "2023-10-30T13:59:32.357307+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cforrk1dRUTnCGJ92d"]} -{"Format": "IDEA0", "ID": "8f43c4e2-c2bf-4831-9c88-ca2930dcee0a", "DetectTime": "2023-10-30T13:59:32.369703+02:00", "EventTime": "2023-10-30T13:59:32.369719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CCPAYp4iLy96QBTGMi"]} -{"Format": "IDEA0", "ID": "9fa607f9-2127-4252-b2d6-6eaa20e746f8", "DetectTime": "2023-10-30T13:59:32.396928+02:00", "EventTime": "2023-10-30T13:59:32.396953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CJsKUa2ykozS8BDphh", "CQ65hTk8AojtwPTAe", "CYCZT73Fu2dZGbMQ6h", "CcVI8UBsIpe3oag8i"]} -{"Format": "IDEA0", "ID": "88a3bbf3-a276-4917-9fea-5c52a2f81be5", "DetectTime": "2023-10-30T13:59:32.408692+02:00", "EventTime": "2023-10-30T13:59:32.408704+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYCZT73Fu2dZGbMQ6h"]} -{"Format": "IDEA0", "ID": "5fbd86cd-4b90-4194-aa3d-58a0a441d5aa", "DetectTime": "2023-10-30T13:59:32.420520+02:00", "EventTime": "2023-10-30T13:59:32.420543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CBimDI3AN1TJAfnlM1"]} -{"Format": "IDEA0", "ID": "d2046bfd-4110-49b1-b1b0-560e1ca2b56f", "DetectTime": "2023-10-30T13:59:32.445899+02:00", "EventTime": "2023-10-30T13:59:32.445912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CHbGl73oXDrrdLvuFi"]} -{"Format": "IDEA0", "ID": "7d186965-7863-47c8-90f6-380200b55e5d", "DetectTime": "2023-10-30T13:59:32.485375+02:00", "EventTime": "2023-10-30T13:59:32.485388+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyS6Km3JaRL9sRA03g"]} -{"Format": "IDEA0", "ID": "6f327717-7ef2-4aa5-9fe7-23b7d472856a", "DetectTime": "2023-10-30T13:59:32.497944+02:00", "EventTime": "2023-10-30T13:59:32.497960+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUdER118TFBPtzb6Ql"]} -{"Format": "IDEA0", "ID": "05d4bbc3-4677-463b-9516-8192c8259666", "DetectTime": "2023-10-30T13:59:32.510328+02:00", "EventTime": "2023-10-30T13:59:32.510345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CBvTXh23MWKQkmom9d"]} -{"Format": "IDEA0", "ID": "faf5bb58-e27c-4bbe-a7e7-1659c77e1610", "DetectTime": "2023-10-30T13:59:32.559145+02:00", "EventTime": "2023-10-30T13:59:32.559155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["Cp4FGy24v7jTghbyg8"]} -{"Format": "IDEA0", "ID": "bc4950c7-0a3a-4b6b-ad69-2e6feeed6cdc", "DetectTime": "2023-10-30T13:59:32.595241+02:00", "EventTime": "2023-10-30T13:59:32.595257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. ", "ContentType": "text/plain"}], "uids": ["CvqMFe3XVyInR7FV8b"]} -{"Format": "IDEA0", "ID": "46ccff3a-6fe3-4891-ba13-3e93c61824b0", "DetectTime": "2023-10-30T13:59:32.640343+02:00", "EventTime": "2023-10-30T13:59:32.640357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CzLdf91g9GQALHm03e"]} -{"Format": "Json", "ID": "46ccff3a-6fe3-4891-ba13-3e93c61824b0", "DetectTime": "2023-10-30T13:59:32.640343+02:00", "EventTime": "2023-10-30T13:59:32.640357+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:22:22.424567+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:32.772396)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0c59df69-d7a7-4c1d-b1e0-48fa7f3e7fb3", "DetectTime": "2023-10-30T13:59:32.777667+02:00", "EventTime": "2023-10-30T13:59:32.777683+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkOs3K3rgbxksMZ7Zg"]} -{"Format": "IDEA0", "ID": "c637ce91-752a-47a8-b0ec-e85451b7d734", "DetectTime": "2023-10-30T13:59:32.789302+02:00", "EventTime": "2023-10-30T13:59:32.789319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CDCH3q4nQqNBPm0Sdl"]} -{"Format": "IDEA0", "ID": "72d62c2c-24b2-4321-b8bd-b44dc75ec01a", "DetectTime": "2023-10-30T13:59:32.830393+02:00", "EventTime": "2023-10-30T13:59:32.830410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CgmVRf5JckTBVZum4"]} -{"Format": "IDEA0", "ID": "bae621ba-d79b-469a-b97f-948eed3d7ee7", "DetectTime": "2023-10-30T13:59:32.872001+02:00", "EventTime": "2023-10-30T13:59:32.872017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C64ZbW2nSnmO3nd7Yg"]} -{"Format": "IDEA0", "ID": "590bc3b9-d9f6-485c-99d2-b62885d764dd", "DetectTime": "2023-10-30T13:59:32.914086+02:00", "EventTime": "2023-10-30T13:59:32.914103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["C2vsbp1qGW775cQzMf"]} -{"Format": "IDEA0", "ID": "543c03f8-d8d8-4595-97f0-3330c1eb8952", "DetectTime": "2023-10-30T13:59:32.956294+02:00", "EventTime": "2023-10-30T13:59:32.956314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CPclzaiJwP3DWcQul"]} -{"Format": "IDEA0", "ID": "14b021e1-a8bd-4812-b3eb-37b7aff95411", "DetectTime": "2023-10-30T13:59:33.001537+02:00", "EventTime": "2023-10-30T13:59:33.001547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["C6Gytl2yKuCzYslN05"]} -{"Format": "IDEA0", "ID": "da7e0eee-13df-4f86-b650-082891036cb8", "DetectTime": "2023-10-30T13:59:33.043672+02:00", "EventTime": "2023-10-30T13:59:33.043697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C3TTbQ1Anvi3jjlD3g"]} -{"Format": "IDEA0", "ID": "25c1cc5f-4206-4d61-89b0-73896a0d0d6e", "DetectTime": "2023-10-30T13:59:33.085292+02:00", "EventTime": "2023-10-30T13:59:33.085304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CbIUHh3yfxQrR73395"]} -{"Format": "Json", "ID": "25c1cc5f-4206-4d61-89b0-73896a0d0d6e", "DetectTime": "2023-10-30T13:59:33.085292+02:00", "EventTime": "2023-10-30T13:59:33.085304+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:23:18.229610+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:33.149894)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "49f40020-7e91-4413-acaa-0bfaad2758c8", "DetectTime": "2023-10-30T13:59:33.153927+02:00", "EventTime": "2023-10-30T13:59:33.153938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["CU0oIp1iyhSvsWjjtj"]} -{"Format": "IDEA0", "ID": "20ab1686-4dc7-4e16-84ce-0f3dce018419", "DetectTime": "2023-10-30T13:59:33.195356+02:00", "EventTime": "2023-10-30T13:59:33.195376+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4M9rx1NGkV6xlBygf"]} -{"Format": "IDEA0", "ID": "c74f8329-181d-4035-bcf1-b7e9b9c68183", "DetectTime": "2023-10-30T13:59:33.204029+02:00", "EventTime": "2023-10-30T13:59:33.204040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1318], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. ", "ContentType": "text/plain"}], "uids": ["CEurmv4xeA3V39iGKf"]} -{"Format": "IDEA0", "ID": "703f68ca-020c-4f48-8665-81170e7a9187", "DetectTime": "2023-10-30T13:59:33.250425+02:00", "EventTime": "2023-10-30T13:59:33.250438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CqKicmr2xinGJhfxk"]} -{"Format": "IDEA0", "ID": "5bca6105-0127-4dab-9d34-82ec96620a04", "DetectTime": "2023-10-30T13:59:33.285748+02:00", "EventTime": "2023-10-30T13:59:33.285759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBpMp92OXVy6sIqfhb"]} -{"Format": "IDEA0", "ID": "2ab7a893-04f6-4c58-8a02-69194a80de32", "DetectTime": "2023-10-30T13:59:33.295124+02:00", "EventTime": "2023-10-30T13:59:33.295141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CNBRfk2hQ8wOvmrlPf"]} -{"Format": "IDEA0", "ID": "f920359d-e80e-4024-846f-4d2b9b61dc9d", "DetectTime": "2023-10-30T13:59:33.330172+02:00", "EventTime": "2023-10-30T13:59:33.330192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CnwTR6zJVt2PY2KZ8"]} -{"Format": "IDEA0", "ID": "78ba725b-190b-4a3f-983d-60e2914fdc9c", "DetectTime": "2023-10-30T13:59:33.370048+02:00", "EventTime": "2023-10-30T13:59:33.370065+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2lWrj4HuLlyLHTHu1"]} -{"Format": "IDEA0", "ID": "04a61423-b889-4d07-a065-43c2b3acd16e", "DetectTime": "2023-10-30T13:59:33.377865+02:00", "EventTime": "2023-10-30T13:59:33.377881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["CUWswY29Sups2OyiI"]} -{"Format": "IDEA0", "ID": "df84f2c4-ca71-42dc-859a-5877e8f24cd3", "DetectTime": "2023-10-30T13:59:33.411306+02:00", "EventTime": "2023-10-30T13:59:33.411322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["C9hyVi4nkcCQ1yEwhc"]} -{"Format": "IDEA0", "ID": "e8cb886e-f1b5-477b-8c49-d9e0cc4a33ca", "DetectTime": "2023-10-30T13:59:33.450942+02:00", "EventTime": "2023-10-30T13:59:33.450962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["CyvgrH3dGon6tHAvE7"]} -{"Format": "Json", "ID": "e8cb886e-f1b5-477b-8c49-d9e0cc4a33ca", "DetectTime": "2023-10-30T13:59:33.450942+02:00", "EventTime": "2023-10-30T13:59:33.450962+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:23:55.761103+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:33.520869)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e40ce7d7-5130-4d18-bb36-e103edc589ad", "DetectTime": "2023-10-30T13:59:33.526015+02:00", "EventTime": "2023-10-30T13:59:33.526032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3181], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. ", "ContentType": "text/plain"}], "uids": ["CYIEvpnkzNrXbqMLl"]} -{"Format": "IDEA0", "ID": "441f72f6-5fd9-4533-a9fc-981ed9c02939", "DetectTime": "2023-10-30T13:59:33.577285+02:00", "EventTime": "2023-10-30T13:59:33.577298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CnYUPa281cbnIdhL94"]} -{"Format": "IDEA0", "ID": "dacb7938-0ab4-4201-b0f4-bf46e769fbaf", "DetectTime": "2023-10-30T13:59:33.616633+02:00", "EventTime": "2023-10-30T13:59:33.616650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["ChY2g44wGmQz509eKg"]} -{"Format": "IDEA0", "ID": "7eed70c9-851f-4275-a1bd-2b893db557b4", "DetectTime": "2023-10-30T13:59:33.659124+02:00", "EventTime": "2023-10-30T13:59:33.659142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CDXLxfr8crmB1PVta"]} -{"Format": "IDEA0", "ID": "55508c11-c78e-416c-a5d6-278100bc4af9", "DetectTime": "2023-10-30T13:59:33.694494+02:00", "EventTime": "2023-10-30T13:59:33.694510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CKbTHT22kmh9Pn5Gh7"]} -{"Format": "IDEA0", "ID": "66b7f3cf-2d62-4479-b14f-002f45d2983e", "DetectTime": "2023-10-30T13:59:33.733826+02:00", "EventTime": "2023-10-30T13:59:33.733839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["C33faT1Ca18WsAi7t4"]} -{"Format": "IDEA0", "ID": "01496723-4598-4541-81af-b36e0d36c82c", "DetectTime": "2023-10-30T13:59:33.772005+02:00", "EventTime": "2023-10-30T13:59:33.772025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CWwEphpWUJEf8toCb"]} -{"Format": "IDEA0", "ID": "ae80934c-5b49-4ded-a60a-94f1bb451e87", "DetectTime": "2023-10-30T13:59:33.811880+02:00", "EventTime": "2023-10-30T13:59:33.811893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["C9BYI42o8yPVOc1xw3"]} -{"Format": "Json", "ID": "ae80934c-5b49-4ded-a60a-94f1bb451e87", "DetectTime": "2023-10-30T13:59:33.811880+02:00", "EventTime": "2023-10-30T13:59:33.811893+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:24:13.759771+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:33.872183)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "674b3c10-6d8e-4a78-8422-045ecb3f5517", "DetectTime": "2023-10-30T13:59:33.878272+02:00", "EventTime": "2023-10-30T13:59:33.878286+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr6LkW3UqSbCe3k2bg"]} -{"Format": "IDEA0", "ID": "fbe4de92-df3f-450f-b6de-e03945c2343c", "DetectTime": "2023-10-30T13:59:33.887727+02:00", "EventTime": "2023-10-30T13:59:33.887748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CLh2kz2INk3vhFO0R4"]} -{"Format": "IDEA0", "ID": "2973bc88-1231-4b39-a49e-7e14df0f0b95", "DetectTime": "2023-10-30T13:59:33.921208+02:00", "EventTime": "2023-10-30T13:59:33.921219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CKgCyRMY8rsSmT7G1"]} -{"Format": "IDEA0", "ID": "295c22f5-55ee-46fc-a7cf-17bf18b2ed26", "DetectTime": "2023-10-30T13:59:33.953540+02:00", "EventTime": "2023-10-30T13:59:33.953551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CGptOo4IGqarREYyra"]} -{"Format": "IDEA0", "ID": "d7f027c4-7198-41e9-b4df-678c36f7d001", "DetectTime": "2023-10-30T13:59:33.987863+02:00", "EventTime": "2023-10-30T13:59:33.987877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["C7kn7U5XqhhEQ1B2"]} -{"Format": "IDEA0", "ID": "70ddda4c-73f8-420f-b72c-692f68b394ce", "DetectTime": "2023-10-30T13:59:34.019414+02:00", "EventTime": "2023-10-30T13:59:34.019426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CWweTu32uS3FJqKFq4"]} -{"Format": "IDEA0", "ID": "423f440b-98d0-4b0e-ab54-c3c3dfb3833d", "DetectTime": "2023-10-30T13:59:34.056173+02:00", "EventTime": "2023-10-30T13:59:34.056189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjX4E81kWx2BgplO1b"]} -{"Format": "IDEA0", "ID": "a4943cd4-84ef-47fd-aa30-65b42211956c", "DetectTime": "2023-10-30T13:59:34.090916+02:00", "EventTime": "2023-10-30T13:59:34.090934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2lWrj4HuLlyLHTHu1", "CBoBIQ1YloQyWYeECd", "CUdER118TFBPtzb6Ql", "C4M9rx1NGkV6xlBygf"]} -{"Format": "IDEA0", "ID": "5ebea6bd-3a34-458c-a037-cef56f16a1ca", "DetectTime": "2023-10-30T13:59:34.099414+02:00", "EventTime": "2023-10-30T13:59:34.099427+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBoBIQ1YloQyWYeECd"]} -{"Format": "IDEA0", "ID": "cac1cd53-bebe-43e4-bf71-d82b7a7c261c", "DetectTime": "2023-10-30T13:59:34.106548+02:00", "EventTime": "2023-10-30T13:59:34.106565+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6Zp4G1C0XlbILbJB5"]} -{"Format": "IDEA0", "ID": "1d3d839b-ad0f-41f6-aba8-91f4d8fad99e", "DetectTime": "2023-10-30T13:59:34.115201+02:00", "EventTime": "2023-10-30T13:59:34.115213+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKJuim25X59b4yiDT1"]} -{"Format": "IDEA0", "ID": "9aba2550-707d-4872-8e4a-a0e93ab79993", "DetectTime": "2023-10-30T13:59:34.123999+02:00", "EventTime": "2023-10-30T13:59:34.124020+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9cAF520KLPZPkg7rj"]} -{"Format": "IDEA0", "ID": "b2d430ed-0d62-4f45-9ea9-cfbd39121b49", "DetectTime": "2023-10-30T13:59:34.133752+02:00", "EventTime": "2023-10-30T13:59:34.133768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["Cc7KOL2l0DytVU4btd"]} -{"Format": "IDEA0", "ID": "7a969596-e773-4a5f-8413-f0c18fcb22cd", "DetectTime": "2023-10-30T13:59:34.160662+02:00", "EventTime": "2023-10-30T13:59:34.160675+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWkDjF1VH3gvpuylt9"]} -{"Format": "IDEA0", "ID": "3a5de1e2-6819-4bd0-8e9f-a76d6834fb08", "DetectTime": "2023-10-30T13:59:34.168910+02:00", "EventTime": "2023-10-30T13:59:34.168924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CGYmeA1qG3P4CKHSIk"]} -{"Format": "IDEA0", "ID": "6d7a5cd8-55ae-401c-a4b3-835add9deca6", "DetectTime": "2023-10-30T13:59:34.205077+02:00", "EventTime": "2023-10-30T13:59:34.205094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CX9J4p1QBjMnWfxPSg"]} -{"Format": "Json", "ID": "6d7a5cd8-55ae-401c-a4b3-835add9deca6", "DetectTime": "2023-10-30T13:59:34.205077+02:00", "EventTime": "2023-10-30T13:59:34.205094+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:56:11.359266+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:34.261569)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "28e16fee-9da8-4c12-9045-ee6a169186b2", "DetectTime": "2023-10-30T13:59:34.267349+02:00", "EventTime": "2023-10-30T13:59:34.267367+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8YjgI2jUfFy9DzEj3"]} -{"Format": "IDEA0", "ID": "7deba2ca-0e75-492d-a790-c2d4f0dc4a4c", "DetectTime": "2023-10-30T13:59:34.278192+02:00", "EventTime": "2023-10-30T13:59:34.278219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CrbaAy4ICuCslnbxsa"]} -{"Format": "IDEA0", "ID": "ea741983-7a91-4600-9bd9-eec8c06e71be", "DetectTime": "2023-10-30T13:59:34.311156+02:00", "EventTime": "2023-10-30T13:59:34.311179+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZdbZGBLNIsgXyk84"]} -{"Format": "IDEA0", "ID": "c8e5d5b0-7538-436d-8dc4-f64cf6477628", "DetectTime": "2023-10-30T13:59:34.320718+02:00", "EventTime": "2023-10-30T13:59:34.320734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CD2sxp3rsHQ416Fljl"]} -{"Format": "IDEA0", "ID": "8e667be5-eb9a-4948-ab1a-083e45fdccfd", "DetectTime": "2023-10-30T13:59:34.354881+02:00", "EventTime": "2023-10-30T13:59:34.354897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CfQxcS1ujjQatqf2X6"]} -{"Format": "IDEA0", "ID": "e1771ded-59b7-42df-8d63-1396c6c0ff29", "DetectTime": "2023-10-30T13:59:34.389504+02:00", "EventTime": "2023-10-30T13:59:34.389519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["Cs0sS3dwTRTO8syU5"]} -{"Format": "IDEA0", "ID": "9490cf43-1796-4a8d-b50e-9fe61146718b", "DetectTime": "2023-10-30T13:59:34.424794+02:00", "EventTime": "2023-10-30T13:59:34.424818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["CGZ44m3WsBAEt8ey5h"]} -{"Format": "IDEA0", "ID": "ec0b0221-dc6e-4e10-931b-b1c09b75c3fa", "DetectTime": "2023-10-30T13:59:34.456089+02:00", "EventTime": "2023-10-30T13:59:34.456105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CgT28T1dlPs3HDL5lf"]} -{"Format": "IDEA0", "ID": "363da71a-9108-499e-9693-a2187d98a494", "DetectTime": "2023-10-30T13:59:34.488517+02:00", "EventTime": "2023-10-30T13:59:34.488537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CjU4au4snzgd2NCo3c"]} -{"Format": "IDEA0", "ID": "4e605831-8793-434e-ab75-abb6575d2d7b", "DetectTime": "2023-10-30T13:59:34.527158+02:00", "EventTime": "2023-10-30T13:59:34.527178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CfHyC2cG49MTjwaId"]} -{"Format": "Json", "ID": "4e605831-8793-434e-ab75-abb6575d2d7b", "DetectTime": "2023-10-30T13:59:34.527158+02:00", "EventTime": "2023-10-30T13:59:34.527178+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:56:29.432734+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:34.585693)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab78a9df-f9cf-4545-8881-fc9b00246249", "DetectTime": "2023-10-30T13:59:34.589668+02:00", "EventTime": "2023-10-30T13:59:34.589678+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClVOun1B8geNXvugG6"]} -{"Format": "IDEA0", "ID": "d1a8f4ce-94b5-47c3-b1fe-ac329eaa6571", "DetectTime": "2023-10-30T13:59:34.597850+02:00", "EventTime": "2023-10-30T13:59:34.597869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CSqMFg2OxfRYVsIRy9"]} -{"Format": "IDEA0", "ID": "4ce6a42f-27f0-4545-8713-40fd80c5db73", "DetectTime": "2023-10-30T13:59:34.633268+02:00", "EventTime": "2023-10-30T13:59:34.633289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["CVck9n4dtrGWMaIAV5"]} -{"Format": "IDEA0", "ID": "d21629e6-285e-43ae-afe1-522ed58ceb48", "DetectTime": "2023-10-30T13:59:34.663633+02:00", "EventTime": "2023-10-30T13:59:34.663651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CUu9PK2J0stOekblm1"]} -{"Format": "IDEA0", "ID": "229b0bc3-caa4-4fe6-9dbe-7ed6cdc493fe", "DetectTime": "2023-10-30T13:59:34.693287+02:00", "EventTime": "2023-10-30T13:59:34.693304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["C6QCB8MRPmSh4JY1a"]} -{"Format": "IDEA0", "ID": "93bd5e7e-21f4-4712-b1ea-b57267585218", "DetectTime": "2023-10-30T13:59:34.727084+02:00", "EventTime": "2023-10-30T13:59:34.727100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3981], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Chnwmz2MQYMqelcQl9"]} -{"Format": "IDEA0", "ID": "07388b0f-874d-4796-a449-d193c3b55669", "DetectTime": "2023-10-30T13:59:34.758349+02:00", "EventTime": "2023-10-30T13:59:34.758368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZdbZGBLNIsgXyk84", "Cvae4MBdbf7YjNMt9", "CWkDjF1VH3gvpuylt9", "CKJuim25X59b4yiDT1"]} -{"Format": "IDEA0", "ID": "10d760c8-3361-4e17-9b7e-74bdea9c762e", "DetectTime": "2023-10-30T13:59:34.768604+02:00", "EventTime": "2023-10-30T13:59:34.768620+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cvae4MBdbf7YjNMt9"]} -{"Format": "IDEA0", "ID": "84782cfd-3a5a-4d0d-b01e-37ccdd67de57", "DetectTime": "2023-10-30T13:59:34.779234+02:00", "EventTime": "2023-10-30T13:59:34.779246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["CqUVts1jALjJ2reYy2"]} -{"Format": "IDEA0", "ID": "2630d960-b596-4212-aeea-bc2f8abd334e", "DetectTime": "2023-10-30T13:59:34.808547+02:00", "EventTime": "2023-10-30T13:59:34.808563+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZDyIT33XTz2yaPy6f"]} -{"Format": "IDEA0", "ID": "c845a125-bc53-4732-9343-6bdbf85791f2", "DetectTime": "2023-10-30T13:59:34.819312+02:00", "EventTime": "2023-10-30T13:59:34.819329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["Cd0jc64t6qUXk21flb"]} -{"Format": "IDEA0", "ID": "68f984d1-d1b6-4f1b-89b0-1ae5825c72a9", "DetectTime": "2023-10-30T13:59:34.850239+02:00", "EventTime": "2023-10-30T13:59:34.850252+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVZdXCEbedfnVMKub"]} -{"Format": "IDEA0", "ID": "2d272a79-6891-4861-921f-cc7b357cbe74", "DetectTime": "2023-10-30T13:59:34.858969+02:00", "EventTime": "2023-10-30T13:59:34.858988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. ", "ContentType": "text/plain"}], "uids": ["CWhzSL3I7pXxovvZz4"]} -{"Format": "Json", "ID": "2d272a79-6891-4861-921f-cc7b357cbe74", "DetectTime": "2023-10-30T13:59:34.858969+02:00", "EventTime": "2023-10-30T13:59:34.858988+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11453], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:57:08.319806+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:34.910349)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7a4bfaa7-2587-4ef4-9399-cd1e31add5f5", "DetectTime": "2023-10-30T13:59:34.916311+02:00", "EventTime": "2023-10-30T13:59:34.916333+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Czh9FNASfOY1PaCr5"]} -{"Format": "IDEA0", "ID": "1908798b-1f56-460a-ac0a-9c7fd359df08", "DetectTime": "2023-10-30T13:59:34.928548+02:00", "EventTime": "2023-10-30T13:59:34.928565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CRwQBy4jVWDKmvQoM8"]} -{"Format": "IDEA0", "ID": "acf01654-6e9c-4553-87c2-e23320de9dbd", "DetectTime": "2023-10-30T13:59:34.954959+02:00", "EventTime": "2023-10-30T13:59:34.954972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. ", "ContentType": "text/plain"}], "uids": ["Cb9cP91f0L2p97MVN3"]} -{"Format": "IDEA0", "ID": "7cdfe7bc-643d-4e7c-884c-35f5d4ad62e5", "DetectTime": "2023-10-30T13:59:34.982959+02:00", "EventTime": "2023-10-30T13:59:34.982980+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUbyt74EBZ0bZtRRL1"]} -{"Format": "IDEA0", "ID": "4858e7c2-55e5-421b-a509-dddd14cfe8cb", "DetectTime": "2023-10-30T13:59:34.994143+02:00", "EventTime": "2023-10-30T13:59:34.994163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CHY4N12PG5EQQi9Z43"]} -{"Format": "IDEA0", "ID": "c2f9106b-3d65-42fc-98eb-be383852f3c7", "DetectTime": "2023-10-30T13:59:35.025719+02:00", "EventTime": "2023-10-30T13:59:35.025741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CatJuW3JspVeLtXu0a"]} -{"Format": "IDEA0", "ID": "340350d9-2ec3-4652-b6ec-204b49f61feb", "DetectTime": "2023-10-30T13:59:35.056476+02:00", "EventTime": "2023-10-30T13:59:35.056490+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3kXlz3gcKncFOVE37"]} -{"Format": "IDEA0", "ID": "7b888464-2034-42f5-9a9c-d822eb2220b8", "DetectTime": "2023-10-30T13:59:35.064830+02:00", "EventTime": "2023-10-30T13:59:35.064841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["Cf5uAI1ViOWMOBqRzb"]} -{"Format": "IDEA0", "ID": "5a15cd9e-ad00-4e9c-be29-c7e93d387a08", "DetectTime": "2023-10-30T13:59:35.092907+02:00", "EventTime": "2023-10-30T13:59:35.092933+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ci0Ma13WLIOz0JQYa6"]} -{"Format": "IDEA0", "ID": "9387f012-2ac8-494d-9325-a3c946d3bcd4", "DetectTime": "2023-10-30T13:59:35.103601+02:00", "EventTime": "2023-10-30T13:59:35.103617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CboWq64xtzwXZg7G2j"]} -{"Format": "IDEA0", "ID": "74541cae-f039-4530-995b-335b9f0575e4", "DetectTime": "2023-10-30T13:59:35.137802+02:00", "EventTime": "2023-10-30T13:59:35.137822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["Ceycc53Fat5FVW1fK5"]} -{"Format": "IDEA0", "ID": "48d5816a-5cb5-4383-b159-2d60e67e824a", "DetectTime": "2023-10-30T13:59:35.167688+02:00", "EventTime": "2023-10-30T13:59:35.167703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["ChOauq3HYoQ23bRuOa"]} -{"Format": "Json", "ID": "48d5816a-5cb5-4383-b159-2d60e67e824a", "DetectTime": "2023-10-30T13:59:35.167688+02:00", "EventTime": "2023-10-30T13:59:35.167703+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-01T23:57:10.315907+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2023/10/30 13:59:35.225217)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1930a83c-c984-4ef2-a32e-e81cb8f5e8be", "DetectTime": "2023-10-30T13:59:35.231000+02:00", "EventTime": "2023-10-30T13:59:35.231014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZIfX53TiMY6zAlBWe"]} -{"Format": "IDEA0", "ID": "18454af4-76cf-4a4b-9a6d-230df8a621d5", "DetectTime": "2023-10-30T13:59:35.241115+02:00", "EventTime": "2023-10-30T13:59:35.241139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CwBaSr3rGyhmj4KL32"]} -{"Format": "IDEA0", "ID": "166a8de8-92b1-4841-aa3c-68e9d6731464", "DetectTime": "2023-10-30T13:59:35.276120+02:00", "EventTime": "2023-10-30T13:59:35.276135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["C3vLoS14NnmTVBQepf"]} -{"Format": "IDEA0", "ID": "afc0c410-0b7a-4e62-bd96-0464dd03ed41", "DetectTime": "2023-10-30T13:59:35.308476+02:00", "EventTime": "2023-10-30T13:59:35.308498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CFFYTjzwA1qsGehak"]} -{"Format": "IDEA0", "ID": "b9b639b1-dcf7-499b-bfaf-256f4061cd10", "DetectTime": "2023-10-30T13:59:35.340055+02:00", "EventTime": "2023-10-30T13:59:35.340073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["CfY0pf20R7oECAIUIi"]} -{"Format": "IDEA0", "ID": "47a2f275-b0e0-42f7-9e7e-6d746096b12b", "DetectTime": "2023-10-30T13:59:35.367689+02:00", "EventTime": "2023-10-30T13:59:35.367706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLnPisclEm27iz675"]} -{"Format": "IDEA0", "ID": "54d8ad3b-9a02-4972-b56b-4d9fb153ce45", "DetectTime": "2023-10-30T13:59:35.394358+02:00", "EventTime": "2023-10-30T13:59:35.394383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CWsM1K1w4avHa5T4V3"]} -{"Format": "IDEA0", "ID": "e30b6abd-2351-4195-b2b7-1a2947d8a170", "DetectTime": "2023-10-30T13:59:35.422510+02:00", "EventTime": "2023-10-30T13:59:35.422532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CWr1nn3oSfks9eqPc5"]} -{"Format": "IDEA0", "ID": "de9c1bcc-cf64-4177-812d-e25613f43ddc", "DetectTime": "2023-10-30T13:59:35.455611+02:00", "EventTime": "2023-10-30T13:59:35.455630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CQHsHw2Gqg1lMBFGE4"]} -{"Format": "IDEA0", "ID": "5b83f1bf-f6ed-4b82-b22d-d7e7cbc457b5", "DetectTime": "2023-10-30T13:59:35.489214+02:00", "EventTime": "2023-10-30T13:59:35.489233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5457], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. ", "ContentType": "text/plain"}], "uids": ["ChoTu413MTuMFLLQe2"]} -{"Format": "IDEA0", "ID": "151bf5c0-6bfd-4e1d-9e12-dc8a7dbd0a35", "DetectTime": "2023-10-30T13:59:35.519214+02:00", "EventTime": "2023-10-30T13:59:35.519229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CIhsLY2JkMOLia9IFd"]} -{"Format": "IDEA0", "ID": "21779210-db70-48cd-886d-798e26a4684b", "DetectTime": "2023-10-30T13:59:35.549443+02:00", "EventTime": "2023-10-30T13:59:35.549461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CwMcGS2jGYaBxn8wLb"]} -{"Format": "Json", "ID": "21779210-db70-48cd-886d-798e26a4684b", "DetectTime": "2023-10-30T13:59:35.549443+02:00", "EventTime": "2023-10-30T13:59:35.549461+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T00:28:29.472987+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 23. (real time 2023/10/30 13:59:35.633906)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4e115894-767e-42f1-865f-ec8838e99114", "DetectTime": "2023-10-30T13:59:35.640730+02:00", "EventTime": "2023-10-30T13:59:35.640749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CGVRE1yZVKMgO9JL1"]} -{"Format": "IDEA0", "ID": "8e166ddd-1da0-4cdd-8d3b-89f8a8c122a9", "DetectTime": "2023-10-30T13:59:35.670014+02:00", "EventTime": "2023-10-30T13:59:35.670031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C7Gw2B41qvmdzLRL9g"]} -{"Format": "IDEA0", "ID": "f5d729c8-4cbf-42e5-883c-8b8451a1ec0c", "DetectTime": "2023-10-30T13:59:35.696719+02:00", "EventTime": "2023-10-30T13:59:35.696739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CDsqCg3jcz8hUJuyF8"]} -{"Format": "IDEA0", "ID": "8ff02a49-5e25-4edb-bb35-fa0d4a80205e", "DetectTime": "2023-10-30T13:59:35.722550+02:00", "EventTime": "2023-10-30T13:59:35.722575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["C1YiuL3Fp0gZpDf5Hl"]} -{"Format": "IDEA0", "ID": "9822513e-2591-4502-aa07-81f61ca99832", "DetectTime": "2023-10-30T13:59:35.748341+02:00", "EventTime": "2023-10-30T13:59:35.748362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["ChkLdh1Q35uk7glT8"]} -{"Format": "IDEA0", "ID": "5a7124e7-1128-4c18-9503-73a90bf8dca3", "DetectTime": "2023-10-30T13:59:35.773522+02:00", "EventTime": "2023-10-30T13:59:35.773543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["C7LGrw3HkWkVL8TUWj"]} -{"Format": "IDEA0", "ID": "492bf2fa-17d9-4190-88a3-e17271065a72", "DetectTime": "2023-10-30T13:59:35.798056+02:00", "EventTime": "2023-10-30T13:59:35.798071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CCljA52RNfGIUwgPM7"]} -{"Format": "IDEA0", "ID": "c4d779b1-8f6c-4367-aa83-38109f80e15e", "DetectTime": "2023-10-30T13:59:35.818726+02:00", "EventTime": "2023-10-30T13:59:35.818743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["C07MkC2aZPDF7nprmh"]} -{"Format": "Json", "ID": "c4d779b1-8f6c-4367-aa83-38109f80e15e", "DetectTime": "2023-10-30T13:59:35.818726+02:00", "EventTime": "2023-10-30T13:59:35.818743+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T00:28:51.663479+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 23. (real time 2023/10/30 13:59:35.873674)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e1b2ee5f-4e20-4b5c-8d37-ea280f8a922f", "DetectTime": "2023-10-30T13:59:35.880520+02:00", "EventTime": "2023-10-30T13:59:35.880537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["C1Falu4poHYM0cbtU9"]} -{"Format": "IDEA0", "ID": "726088c1-65db-438d-8831-e2985741fe11", "DetectTime": "2023-10-30T13:59:35.903327+02:00", "EventTime": "2023-10-30T13:59:35.903343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. ", "ContentType": "text/plain"}], "uids": ["CwyQcj1027jgTWbHnl"]} -{"Format": "IDEA0", "ID": "2d8deb7c-44f7-4c16-b99c-8a9833a46376", "DetectTime": "2023-10-30T13:59:35.925142+02:00", "EventTime": "2023-10-30T13:59:35.925160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CU9W9N35SwcUlpuJba"]} -{"Format": "IDEA0", "ID": "e308d4d4-2345-4819-937d-924299f1342d", "DetectTime": "2023-10-30T13:59:35.945895+02:00", "EventTime": "2023-10-30T13:59:35.945915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CYBixs2aUFNpF6eIu8"]} -{"Format": "IDEA0", "ID": "ed3f787f-adf0-4cef-ae5b-0932959673cc", "DetectTime": "2023-10-30T13:59:35.969064+02:00", "EventTime": "2023-10-30T13:59:35.969081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["C00b1biaLCwdE8la7"]} -{"Format": "IDEA0", "ID": "619aa3e5-d811-4458-ba82-a7c83eb771c5", "DetectTime": "2023-10-30T13:59:35.990157+02:00", "EventTime": "2023-10-30T13:59:35.990180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19831], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. ", "ContentType": "text/plain"}], "uids": ["Cr9AUx3RB9avQ9Xx2d"]} -{"Format": "IDEA0", "ID": "a419ec7d-e046-4b09-9237-6cee86465e8f", "DetectTime": "2023-10-30T13:59:36.010078+02:00", "EventTime": "2023-10-30T13:59:36.010090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12439], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. ", "ContentType": "text/plain"}], "uids": ["CPFNTZ2HUqhgpf3lTg"]} -{"Format": "IDEA0", "ID": "d68e6bb5-d667-47f2-8c9e-67d7242a0486", "DetectTime": "2023-10-30T13:59:36.029429+02:00", "EventTime": "2023-10-30T13:59:36.029448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CgfO0C2jk2AjS7Uh9l"]} -{"Format": "Json", "ID": "d68e6bb5-d667-47f2-8c9e-67d7242a0486", "DetectTime": "2023-10-30T13:59:36.029429+02:00", "EventTime": "2023-10-30T13:59:36.029448+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T00:29:29.226540+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 23. (real time 2023/10/30 13:59:36.076487)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "be27362a-a6dd-41da-a9d1-77d9ed93f8ac", "DetectTime": "2023-10-30T13:59:36.082192+02:00", "EventTime": "2023-10-30T13:59:36.082210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["CGxO55pCgMGHCjXf1"]} -{"Format": "IDEA0", "ID": "0cf44f64-40d0-49ec-9820-8d2cda49e5d8", "DetectTime": "2023-10-30T13:59:36.101100+02:00", "EventTime": "2023-10-30T13:59:36.101116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CJZ2G11rIVyFy141O1"]} -{"Format": "IDEA0", "ID": "c9fe6f69-5940-4976-862b-2dd8f6b84cb6", "DetectTime": "2023-10-30T13:59:36.119301+02:00", "EventTime": "2023-10-30T13:59:36.119320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28569], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. ", "ContentType": "text/plain"}], "uids": ["CmI36W1F8IvqJiFzDe"]} -{"Format": "IDEA0", "ID": "e2d5adf7-0393-471d-be0d-403e989a0eb3", "DetectTime": "2023-10-30T13:59:36.137591+02:00", "EventTime": "2023-10-30T13:59:36.137606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["C12Ogg223v1DjLQNo8"]} -{"Format": "IDEA0", "ID": "c092a023-d8f0-4330-959d-adf2b01f863f", "DetectTime": "2023-10-30T13:59:36.157348+02:00", "EventTime": "2023-10-30T13:59:36.157368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CrOI2n4IsXSHnLagB1"]} -{"Format": "IDEA0", "ID": "bf151941-a215-4c83-a3bb-7cd604e15aeb", "DetectTime": "2023-10-30T13:59:36.179399+02:00", "EventTime": "2023-10-30T13:59:36.179417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CHwpD32MfF94Besl3i"]} -{"Format": "IDEA0", "ID": "837d779b-0a97-45e0-be0f-938d7544c7c4", "DetectTime": "2023-10-30T13:59:36.197268+02:00", "EventTime": "2023-10-30T13:59:36.197284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CmsDsp39VFtZkpBDd8"]} -{"Format": "IDEA0", "ID": "3f651450-6bc3-41a1-bb50-f0c7c230ab49", "DetectTime": "2023-10-30T13:59:36.249342+02:00", "EventTime": "2023-10-30T13:59:36.249360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CEy6Id2dwheVYaLqT9"]} -{"Format": "IDEA0", "ID": "4aef3af8-75d4-4ea9-b603-68de0fde02d8", "DetectTime": "2023-10-30T13:59:36.303964+02:00", "EventTime": "2023-10-30T13:59:36.303980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11097], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. ", "ContentType": "text/plain"}], "uids": ["CE1oKS368opb6F171k"]} -{"Format": "IDEA0", "ID": "a3c4d1fa-02b0-4a52-84fb-a2eb315db570", "DetectTime": "2023-10-30T13:59:36.354184+02:00", "EventTime": "2023-10-30T13:59:36.354204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["C89QsDKHH2o5qm4A7"]} -{"Format": "IDEA0", "ID": "2f022d4f-1ecf-48f3-b04b-28d18eb56dec", "DetectTime": "2023-10-30T13:59:36.407264+02:00", "EventTime": "2023-10-30T13:59:36.407278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["Ct0ThrrAdSh5WqJMl"]} -{"Format": "IDEA0", "ID": "63bda1b2-6dec-41a0-8dce-4c74206032f3", "DetectTime": "2023-10-30T13:59:36.458935+02:00", "EventTime": "2023-10-30T13:59:36.458957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C3Xp213nVDvFZEqNcc"]} -{"Format": "Json", "ID": "63bda1b2-6dec-41a0-8dce-4c74206032f3", "DetectTime": "2023-10-30T13:59:36.458935+02:00", "EventTime": "2023-10-30T13:59:36.458957+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:00:43.824076+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:36.576115)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "08227cce-8fa4-40a7-8262-32246c06dc7f", "DetectTime": "2023-10-30T13:59:36.581598+02:00", "EventTime": "2023-10-30T13:59:36.581619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CvVrNq1ts2QH4GwFGf"]} -{"Format": "IDEA0", "ID": "74728f12-1b04-4711-833d-2fae0170bff4", "DetectTime": "2023-10-30T13:59:36.628460+02:00", "EventTime": "2023-10-30T13:59:36.628477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5162], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. ", "ContentType": "text/plain"}], "uids": ["CrxPgB1Q9Ku9zs3Znj"]} -{"Format": "IDEA0", "ID": "d2942cf6-7bd9-432c-83df-51744874dd00", "DetectTime": "2023-10-30T13:59:36.674339+02:00", "EventTime": "2023-10-30T13:59:36.674357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CjVRp42sNfdd1JVx2a"]} -{"Format": "IDEA0", "ID": "07604253-6b2d-4cad-aa0b-f6548f38344f", "DetectTime": "2023-10-30T13:59:36.719028+02:00", "EventTime": "2023-10-30T13:59:36.719053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CDhZw84UmWpe4c7qw9"]} -{"Format": "IDEA0", "ID": "826f4122-aa8d-496e-8f17-b17d9bcf048d", "DetectTime": "2023-10-30T13:59:36.764979+02:00", "EventTime": "2023-10-30T13:59:36.765002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CM5jFp23XktI7e3CO7"]} -{"Format": "IDEA0", "ID": "8977db1d-38c2-4ea2-bcee-348a30da5c8f", "DetectTime": "2023-10-30T13:59:36.812036+02:00", "EventTime": "2023-10-30T13:59:36.812055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CWtmN92dzG1Y1hMEmd"]} -{"Format": "IDEA0", "ID": "3b7b3a34-4661-493a-8ea4-d36dac8e14c6", "DetectTime": "2023-10-30T13:59:36.860118+02:00", "EventTime": "2023-10-30T13:59:36.860140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CYnx1C3vQ9Fh2HUki5"]} -{"Format": "IDEA0", "ID": "9c98be12-893b-4ad6-8812-aeee63e116be", "DetectTime": "2023-10-30T13:59:36.909090+02:00", "EventTime": "2023-10-30T13:59:36.909112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["C2Tric16S13RerwB2h"]} -{"Format": "Json", "ID": "9c98be12-893b-4ad6-8812-aeee63e116be", "DetectTime": "2023-10-30T13:59:36.909090+02:00", "EventTime": "2023-10-30T13:59:36.909112+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:00:45.901602+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:36.984099)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86fa3441-bdc5-49dc-8e35-19be8f0e131c", "DetectTime": "2023-10-30T13:59:36.989488+02:00", "EventTime": "2023-10-30T13:59:36.989508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CTCmrC17H5sNwhwEX7"]} -{"Format": "IDEA0", "ID": "ff6de54a-72a8-4181-958c-43f61f28daa4", "DetectTime": "2023-10-30T13:59:37.040630+02:00", "EventTime": "2023-10-30T13:59:37.040647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CJEGd64VphQe745O57"]} -{"Format": "IDEA0", "ID": "e0269fcc-12d7-46e6-b3c8-bb2139fc14b6", "DetectTime": "2023-10-30T13:59:37.088420+02:00", "EventTime": "2023-10-30T13:59:37.088433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CUbyt74EBZ0bZtRRL1", "Ci0Ma13WLIOz0JQYa6", "CVZdXCEbedfnVMKub", "CU9wXjeY1m9d7MSm6"]} -{"Format": "IDEA0", "ID": "dfef9a5e-22bd-48e4-b899-fa389b4696d8", "DetectTime": "2023-10-30T13:59:37.099553+02:00", "EventTime": "2023-10-30T13:59:37.099566+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CU9wXjeY1m9d7MSm6"]} -{"Format": "IDEA0", "ID": "704488bd-15a5-4f21-886e-bcca59728ce3", "DetectTime": "2023-10-30T13:59:37.110024+02:00", "EventTime": "2023-10-30T13:59:37.110045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["C4RBiK2m50XE9TKrp2"]} -{"Format": "IDEA0", "ID": "6f1b6bab-4d86-4863-8cdb-530c1b70b7c6", "DetectTime": "2023-10-30T13:59:37.154323+02:00", "EventTime": "2023-10-30T13:59:37.154344+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJnZKu2MZ8ei2Rgsz7"]} -{"Format": "IDEA0", "ID": "b11404b6-8b60-4ffa-bdae-48d3dbbdc437", "DetectTime": "2023-10-30T13:59:37.164102+02:00", "EventTime": "2023-10-30T13:59:37.164124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CzOlGe2DO1evpduV22"]} -{"Format": "IDEA0", "ID": "19feec9e-dab6-48c1-a44d-446512197872", "DetectTime": "2023-10-30T13:59:37.208606+02:00", "EventTime": "2023-10-30T13:59:37.208625+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHPhQb2bWjvonN60A6"]} -{"Format": "IDEA0", "ID": "baaff961-23f2-46fc-a989-2d6b5dee6f30", "DetectTime": "2023-10-30T13:59:37.220629+02:00", "EventTime": "2023-10-30T13:59:37.220653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["Cv60gu3xaDWCZAt7f3"]} -{"Format": "IDEA0", "ID": "2d31741f-afa9-47e5-9249-7c4bfe2f8d54", "DetectTime": "2023-10-30T13:59:37.266797+02:00", "EventTime": "2023-10-30T13:59:37.266814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["C30fM54e21s46IsiZ6"]} -{"Format": "IDEA0", "ID": "049b9c57-2298-4d10-95e3-b2226f2fad0e", "DetectTime": "2023-10-30T13:59:37.309678+02:00", "EventTime": "2023-10-30T13:59:37.309699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CpuaX4sjSYZ65D3b"]} -{"Format": "IDEA0", "ID": "579a892d-abe4-41a2-82f5-d43a1ebdfb89", "DetectTime": "2023-10-30T13:59:37.368876+02:00", "EventTime": "2023-10-30T13:59:37.368897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CdIWWs8BsF0PWtcV4"]} -{"Format": "Json", "ID": "579a892d-abe4-41a2-82f5-d43a1ebdfb89", "DetectTime": "2023-10-30T13:59:37.368876+02:00", "EventTime": "2023-10-30T13:59:37.368897+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:01:39.454693+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:37.445497)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bbf8a238-956e-4aa6-a562-358b82708afe", "DetectTime": "2023-10-30T13:59:37.451513+02:00", "EventTime": "2023-10-30T13:59:37.451531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrHWu93e9YfnWXlvh5"]} -{"Format": "IDEA0", "ID": "d9ecfcaa-774f-4b7f-965f-0be42ad90ec8", "DetectTime": "2023-10-30T13:59:37.492074+02:00", "EventTime": "2023-10-30T13:59:37.492100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C3AyAzcPcVgPgHmhg"]} -{"Format": "IDEA0", "ID": "6b53f9b2-74b4-4c8e-b805-929a11bf2edf", "DetectTime": "2023-10-30T13:59:37.534971+02:00", "EventTime": "2023-10-30T13:59:37.534993+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCPKYg2sF1pPzsbB2e"]} -{"Format": "IDEA0", "ID": "788327e9-dbe3-4d02-816e-4bff81705e1a", "DetectTime": "2023-10-30T13:59:37.547472+02:00", "EventTime": "2023-10-30T13:59:37.547492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CQ8DmK3F6hBo4CVjUb"]} -{"Format": "IDEA0", "ID": "78064c00-ddd1-4e3c-b07a-d6728c2c6fc4", "DetectTime": "2023-10-30T13:59:37.592867+02:00", "EventTime": "2023-10-30T13:59:37.592897+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cr6KSe1DVDQugSuOUk"]} -{"Format": "IDEA0", "ID": "fa3a431a-8301-4353-a621-4da62c51de47", "DetectTime": "2023-10-30T13:59:37.604402+02:00", "EventTime": "2023-10-30T13:59:37.604418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CtE3GI29QduNQjEp4i"]} -{"Format": "IDEA0", "ID": "78d3369f-4b5e-4317-9c02-c55795599efd", "DetectTime": "2023-10-30T13:59:37.652389+02:00", "EventTime": "2023-10-30T13:59:37.652405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["C3uwAd37zJQBsP0hYk"]} -{"Format": "IDEA0", "ID": "881bb0f2-a576-4de4-8ba9-970ab395dc69", "DetectTime": "2023-10-30T13:59:37.698128+02:00", "EventTime": "2023-10-30T13:59:37.698150+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C87sLB4SZjiNmm3gNg"]} -{"Format": "IDEA0", "ID": "990c563d-bbed-419d-b7bf-3b13334158df", "DetectTime": "2023-10-30T13:59:37.710425+02:00", "EventTime": "2023-10-30T13:59:37.710445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cs4X2G3UBHVPoclGWa"]} -{"Format": "IDEA0", "ID": "1c4bf49c-ec45-4702-847a-72f2dd5a6535", "DetectTime": "2023-10-30T13:59:37.751327+02:00", "EventTime": "2023-10-30T13:59:37.751339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CVgjMj2IJUJIU9JAek"]} -{"Format": "IDEA0", "ID": "407abf2b-11b4-4454-9b21-f007bad7070b", "DetectTime": "2023-10-30T13:59:37.792813+02:00", "EventTime": "2023-10-30T13:59:37.792830+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdF1f41M1ApfRWFrO1"]} -{"Format": "IDEA0", "ID": "8c5f94ad-2fe1-4e85-bb3b-7d15b01e4909", "DetectTime": "2023-10-30T13:59:37.805044+02:00", "EventTime": "2023-10-30T13:59:37.805067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Ccw79ajIGw66Mv1cl"]} -{"Format": "Json", "ID": "8c5f94ad-2fe1-4e85-bb3b-7d15b01e4909", "DetectTime": "2023-10-30T13:59:37.805044+02:00", "EventTime": "2023-10-30T13:59:37.805067+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:34:32.420783+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:37.879262)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9d9bdee9-a326-4bf4-91af-2cd29841fbb4", "DetectTime": "2023-10-30T13:59:37.884899+02:00", "EventTime": "2023-10-30T13:59:37.884915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["Cj43O927OPeAa9Fv58"]} -{"Format": "IDEA0", "ID": "673fde2f-7d0b-4edf-b308-02aba7719142", "DetectTime": "2023-10-30T13:59:37.929419+02:00", "EventTime": "2023-10-30T13:59:37.929440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CoEzOX2090FEE5sgQl"]} -{"Format": "IDEA0", "ID": "354a2e2f-f48b-48e8-baa1-5f70fea11a0a", "DetectTime": "2023-10-30T13:59:37.970976+02:00", "EventTime": "2023-10-30T13:59:37.970994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["C3HOaM1XvN1Toi6gQc"]} -{"Format": "IDEA0", "ID": "e51533d2-79ec-4120-a1c1-b509c91e5857", "DetectTime": "2023-10-30T13:59:38.016974+02:00", "EventTime": "2023-10-30T13:59:38.016993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["C3m8pH3cTFLQ8wk9ld"]} -{"Format": "IDEA0", "ID": "3a52f7e1-62b2-4856-8be3-599f1ae9555e", "DetectTime": "2023-10-30T13:59:38.058871+02:00", "EventTime": "2023-10-30T13:59:38.058893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["Cb0vfi3MM76QedhaGe"]} -{"Format": "IDEA0", "ID": "8f492b5d-4731-457b-81c9-6b4bd925dc4d", "DetectTime": "2023-10-30T13:59:38.097305+02:00", "EventTime": "2023-10-30T13:59:38.097325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["Cfrhym1NiHrPDGncL3"]} -{"Format": "IDEA0", "ID": "a7f19134-091c-4f6d-8661-ca269e013328", "DetectTime": "2023-10-30T13:59:38.134722+02:00", "EventTime": "2023-10-30T13:59:38.134741+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXlfiI23nD0PoJ1tu5"]} -{"Format": "IDEA0", "ID": "7c0464c6-b482-40da-8216-211de035a6ac", "DetectTime": "2023-10-30T13:59:38.146337+02:00", "EventTime": "2023-10-30T13:59:38.146353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["C9c2Tp3OvcjTuo6K6b"]} -{"Format": "IDEA0", "ID": "1e66a349-5034-4fb6-8f9a-65fc3c3e8e6d", "DetectTime": "2023-10-30T13:59:38.185688+02:00", "EventTime": "2023-10-30T13:59:38.185701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["Co1gbYVjqXQuVFko3"]} -{"Format": "Json", "ID": "1e66a349-5034-4fb6-8f9a-65fc3c3e8e6d", "DetectTime": "2023-10-30T13:59:38.185688+02:00", "EventTime": "2023-10-30T13:59:38.185701+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:34:34.231328+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:38.246882)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "172f9b08-cfbd-409a-8d62-a3e5a6c6110d", "DetectTime": "2023-10-30T13:59:38.252211+02:00", "EventTime": "2023-10-30T13:59:38.252236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["Cv13b11FQCXf4G3hR6"]} -{"Format": "IDEA0", "ID": "813f2b81-70e7-4485-84fa-b7fc5d9263cb", "DetectTime": "2023-10-30T13:59:38.291330+02:00", "EventTime": "2023-10-30T13:59:38.291644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5375], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. ", "ContentType": "text/plain"}], "uids": ["Cg2Y3d32TThmdQcrMd"]} -{"Format": "IDEA0", "ID": "31f376c0-b176-447b-832b-414262cb5e6a", "DetectTime": "2023-10-30T13:59:38.330519+02:00", "EventTime": "2023-10-30T13:59:38.330531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CosRqj47egP4JVO4C"]} -{"Format": "IDEA0", "ID": "945393a4-a960-4d6e-a53d-1cdef815ca5b", "DetectTime": "2023-10-30T13:59:38.371995+02:00", "EventTime": "2023-10-30T13:59:38.372010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CykHLwOTZfu36GJG8"]} -{"Format": "IDEA0", "ID": "3fc85507-cc78-473d-b1d0-a5f43870c638", "DetectTime": "2023-10-30T13:59:38.409755+02:00", "EventTime": "2023-10-30T13:59:38.409773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmC78l10cBBdZEGwg6", "CHPhQb2bWjvonN60A6", "Cr6KSe1DVDQugSuOUk", "CdF1f41M1ApfRWFrO1"]} -{"Format": "IDEA0", "ID": "fd5b3634-e19b-4d4f-9e6e-f448abc736b5", "DetectTime": "2023-10-30T13:59:38.421229+02:00", "EventTime": "2023-10-30T13:59:38.421241+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmC78l10cBBdZEGwg6"]} -{"Format": "IDEA0", "ID": "9d93e49a-09ff-4397-8422-5ad3d03d3fb5", "DetectTime": "2023-10-30T13:59:38.432325+02:00", "EventTime": "2023-10-30T13:59:38.432341+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9Y4Bn4x0KyUZvf7Xh"]} -{"Format": "IDEA0", "ID": "76215422-19e6-475a-a43d-d7e12e477119", "DetectTime": "2023-10-30T13:59:38.444465+02:00", "EventTime": "2023-10-30T13:59:38.444482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16896], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16896/UDP destination IP 188.169.27.248. ", "ContentType": "text/plain"}], "uids": ["Cp7y6C1djALlXsFyV3"]} -{"Format": "IDEA0", "ID": "7b4e52d7-e3d9-4269-8a4c-e07cd7cc72f0", "DetectTime": "2023-10-30T13:59:38.478937+02:00", "EventTime": "2023-10-30T13:59:38.478949+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4E3RE1F3bOgVGm7d6"]} -{"Format": "IDEA0", "ID": "e10fed69-72d4-41a8-aeb6-65da92c48a7e", "DetectTime": "2023-10-30T13:59:38.490713+02:00", "EventTime": "2023-10-30T13:59:38.490735+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiMrFV124zkU6hPSwj"]} -{"Format": "IDEA0", "ID": "91ed8c27-f5a8-41c8-8ff1-b6a06fd6c91c", "DetectTime": "2023-10-30T13:59:38.502494+02:00", "EventTime": "2023-10-30T13:59:38.502514+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIMEBU1MiCKCagcQhh"]} -{"Format": "IDEA0", "ID": "9ec7e0e5-46b5-4cbf-9419-7032fb2bf39a", "DetectTime": "2023-10-30T13:59:38.513556+02:00", "EventTime": "2023-10-30T13:59:38.513572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22369], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22369/UDP destination IP 78.173.238.41. ", "ContentType": "text/plain"}], "uids": ["CVxO7F4E9E3mSnUFL5"]} -{"Format": "IDEA0", "ID": "263f68c4-f699-43cd-a930-4c25382e0d9c", "DetectTime": "2023-10-30T13:59:38.547938+02:00", "EventTime": "2023-10-30T13:59:38.547957+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYLVB83fRR02tCUxof"]} -{"Format": "IDEA0", "ID": "887a57a0-8026-4c8a-b759-c2c75ddc04ad", "DetectTime": "2023-10-30T13:59:38.558455+02:00", "EventTime": "2023-10-30T13:59:38.558475+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3XM252qOSqFc6eXr7"]} -{"Format": "IDEA0", "ID": "f73242b7-352a-4ed9-adda-4ed9114020cf", "DetectTime": "2023-10-30T13:59:38.569883+02:00", "EventTime": "2023-10-30T13:59:38.569903+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxOMjY32T559hzNCW1"]} -{"Format": "IDEA0", "ID": "accb8f2d-954f-4ed0-b8d2-5d466fd515a4", "DetectTime": "2023-10-30T13:59:38.581004+02:00", "EventTime": "2023-10-30T13:59:38.581019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIMEBU1MiCKCagcQhh", "Cb5pmF2DpiXGlPgdd4", "C4E3RE1F3bOgVGm7d6", "C3XM252qOSqFc6eXr7"]} -{"Format": "IDEA0", "ID": "6c37f42a-4007-4a2c-bfc5-27aafca6cfbb", "DetectTime": "2023-10-30T13:59:38.590535+02:00", "EventTime": "2023-10-30T13:59:38.590546+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cb5pmF2DpiXGlPgdd4"]} -{"Format": "IDEA0", "ID": "a9c8cf79-a127-4b58-8979-967fb32b1042", "DetectTime": "2023-10-30T13:59:38.603163+02:00", "EventTime": "2023-10-30T13:59:38.603181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVvS4p1ilPv1QA42Qh"]} -{"Format": "IDEA0", "ID": "13e32d20-4d8e-4eab-acd8-452db7a242fc", "DetectTime": "2023-10-30T13:59:38.616931+02:00", "EventTime": "2023-10-30T13:59:38.616952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4736], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4736/UDP destination IP 78.92.75.150. ", "ContentType": "text/plain"}], "uids": ["CZNhaT3HLtzt9z1Yb2"]} -{"Format": "IDEA0", "ID": "ecb73a3e-414c-42a1-9a96-f02c04b07dbb", "DetectTime": "2023-10-30T13:59:38.652294+02:00", "EventTime": "2023-10-30T13:59:38.652310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. ", "ContentType": "text/plain"}], "uids": ["CfaeJE3Qr7eDtcLrji"]} -{"Format": "Json", "ID": "ecb73a3e-414c-42a1-9a96-f02c04b07dbb", "DetectTime": "2023-10-30T13:59:38.652294+02:00", "EventTime": "2023-10-30T13:59:38.652310+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8651], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:38:46.506356+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:38.711610)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa717702-a192-4cd8-b051-e7af343be146", "DetectTime": "2023-10-30T13:59:38.717535+02:00", "EventTime": "2023-10-30T13:59:38.717550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 49.49.17.72. ", "ContentType": "text/plain"}], "uids": ["CkwcpR3avAipr5Edga"]} -{"Format": "IDEA0", "ID": "0ef3c1dd-e18a-46b6-bcf2-ccab0e5d9437", "DetectTime": "2023-10-30T13:59:38.753137+02:00", "EventTime": "2023-10-30T13:59:38.753166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.183.152. ", "ContentType": "text/plain"}], "uids": ["C7ByKJ2Acp2BJvD8F2"]} -{"Format": "IDEA0", "ID": "f9342a20-7cc2-41c0-9fcf-bec3356216d6", "DetectTime": "2023-10-30T13:59:38.787742+02:00", "EventTime": "2023-10-30T13:59:38.787758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27958], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27958/UDP destination IP 109.93.140.11. ", "ContentType": "text/plain"}], "uids": ["CjRf1uC1bEeVqS6mj"]} -{"Format": "IDEA0", "ID": "bcbb1d19-a043-4d7e-9c4b-6b15741af545", "DetectTime": "2023-10-30T13:59:38.819161+02:00", "EventTime": "2023-10-30T13:59:38.819172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CE6kOG33TG6MoGntSc"]} -{"Format": "IDEA0", "ID": "66519861-2bab-41be-9d68-097215edeb14", "DetectTime": "2023-10-30T13:59:38.851193+02:00", "EventTime": "2023-10-30T13:59:38.851205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["C8BLS93gkt8FvCzczf"]} -{"Format": "IDEA0", "ID": "595f8440-a54b-464c-bf76-47a40e0d18cd", "DetectTime": "2023-10-30T13:59:38.883930+02:00", "EventTime": "2023-10-30T13:59:38.883945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CF6Mci4dRJpvmaCS79"]} -{"Format": "IDEA0", "ID": "6994cb69-e2f9-4e60-bd04-4e0107163a6a", "DetectTime": "2023-10-30T13:59:38.917185+02:00", "EventTime": "2023-10-30T13:59:38.917197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["CgTH8f24fmgLDjzvRa"]} -{"Format": "IDEA0", "ID": "262bb9a4-2a0e-49be-aa03-ab1449939a5a", "DetectTime": "2023-10-30T13:59:38.947822+02:00", "EventTime": "2023-10-30T13:59:38.947842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CkRiY14Gqks0DMRm8c"]} -{"Format": "Json", "ID": "262bb9a4-2a0e-49be-aa03-ab1449939a5a", "DetectTime": "2023-10-30T13:59:38.947822+02:00", "EventTime": "2023-10-30T13:59:38.947842+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:39:36.230487+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:39.005552)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8a32a38a-3fdf-40fa-84f5-084bd8496ef6", "DetectTime": "2023-10-30T13:59:39.011476+02:00", "EventTime": "2023-10-30T13:59:39.011493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C85FgD4L6Kfwc9tcwc"]} -{"Format": "IDEA0", "ID": "dd80d144-fc02-4257-8c16-503caa3315ac", "DetectTime": "2023-10-30T13:59:39.045229+02:00", "EventTime": "2023-10-30T13:59:39.045249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22106], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22106/UDP destination IP 85.75.38.248. ", "ContentType": "text/plain"}], "uids": ["CTeTry4ZJrrIfaHVY8"]} -{"Format": "IDEA0", "ID": "eba8f6af-0dd8-48be-8c32-bd9d5f4ad5eb", "DetectTime": "2023-10-30T13:59:39.074008+02:00", "EventTime": "2023-10-30T13:59:39.074027+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CENi484XMOETFHmYk6"]} -{"Format": "IDEA0", "ID": "0f8eaada-4699-47d3-a8ec-abf116d567d8", "DetectTime": "2023-10-30T13:59:39.084820+02:00", "EventTime": "2023-10-30T13:59:39.084832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28353], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28353/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["CfaSVEUHGuwVnUFC9"]} -{"Format": "IDEA0", "ID": "afae9186-caa0-45d5-938f-b684ca83e78b", "DetectTime": "2023-10-30T13:59:39.112527+02:00", "EventTime": "2023-10-30T13:59:39.112546+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CO5py12HiOoz1jt5zh"]} -{"Format": "IDEA0", "ID": "ab5a53c1-292b-4e99-80d9-70be17ff6fe0", "DetectTime": "2023-10-30T13:59:39.122938+02:00", "EventTime": "2023-10-30T13:59:39.122951+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6ujBzzDiaokDnNqh"]} -{"Format": "IDEA0", "ID": "a79b8920-3d4a-449a-a179-644c0383d2b6", "DetectTime": "2023-10-30T13:59:39.134799+02:00", "EventTime": "2023-10-30T13:59:39.134820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8045], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8045/UDP destination IP 177.189.51.187. ", "ContentType": "text/plain"}], "uids": ["C5UA7z1jydhr6Yqpa1"]} -{"Format": "IDEA0", "ID": "7e000e13-4944-4217-8934-cf4596cb56ae", "DetectTime": "2023-10-30T13:59:39.169791+02:00", "EventTime": "2023-10-30T13:59:39.169810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CqlVQs2ZLpbZTSSN1"]} -{"Format": "IDEA0", "ID": "e9aa8b25-3b55-4fad-85e2-593edcbbd084", "DetectTime": "2023-10-30T13:59:39.201835+02:00", "EventTime": "2023-10-30T13:59:39.201849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["Cg5XZN2SuGwb3wMFU5"]} -{"Format": "IDEA0", "ID": "17031db9-0e80-4f0c-8f2d-eb599ce93c12", "DetectTime": "2023-10-30T13:59:39.231884+02:00", "EventTime": "2023-10-30T13:59:39.231901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4013], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4013/UDP destination IP 95.77.231.101. ", "ContentType": "text/plain"}], "uids": ["CtDTPi2frQMx5w5ipg"]} -{"Format": "IDEA0", "ID": "92b37195-2c55-49eb-b382-70a2b15aa0c1", "DetectTime": "2023-10-30T13:59:39.265895+02:00", "EventTime": "2023-10-30T13:59:39.265914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5857/UDP destination IP 46.237.70.170. ", "ContentType": "text/plain"}], "uids": ["C6yab41U9Ty5h9mDT1"]} -{"Format": "Json", "ID": "92b37195-2c55-49eb-b382-70a2b15aa0c1", "DetectTime": "2023-10-30T13:59:39.265895+02:00", "EventTime": "2023-10-30T13:59:39.265914+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5857], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T01:42:32.961513+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2023/10/30 13:59:39.323754)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3f4605d7-3dd7-4b47-a355-02226c59c8e6", "DetectTime": "2023-10-30T13:59:39.329638+02:00", "EventTime": "2023-10-30T13:59:39.329656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["COiFQ63WI6KyiG6O6c"]} -{"Format": "IDEA0", "ID": "99692996-6297-4874-92f6-896afcf81c94", "DetectTime": "2023-10-30T13:59:39.366741+02:00", "EventTime": "2023-10-30T13:59:39.366760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CzOwr51az4AaAvpec1"]} -{"Format": "IDEA0", "ID": "729d91cf-fb09-4f38-b263-2115fadd9d7e", "DetectTime": "2023-10-30T13:59:39.393537+02:00", "EventTime": "2023-10-30T13:59:39.393559+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1OHSwmfZt51ZtaPk"]} -{"Format": "IDEA0", "ID": "05583ad7-e7d0-4316-9a78-b70ee158813f", "DetectTime": "2023-10-30T13:59:39.404740+02:00", "EventTime": "2023-10-30T13:59:39.404758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8552], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8552/UDP destination IP 117.198.86.63. ", "ContentType": "text/plain"}], "uids": ["CPGihR2a5y6lcIrQ79"]} -{"Format": "IDEA0", "ID": "6e7df805-f9b4-4a49-b493-016ed9d3448e", "DetectTime": "2023-10-30T13:59:39.429628+02:00", "EventTime": "2023-10-30T13:59:39.429649+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1boyB3ys4Ib3xJEJ6"]} -{"Format": "IDEA0", "ID": "74fb31a9-e634-4e4f-95b8-29639abb4465", "DetectTime": "2023-10-30T13:59:39.442449+02:00", "EventTime": "2023-10-30T13:59:39.442516+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cyg2x64BUfMNuOe5k1"]} -{"Format": "IDEA0", "ID": "8d19c2f1-e261-46d1-a6f1-28d3ae16f14e", "DetectTime": "2023-10-30T13:59:39.455256+02:00", "EventTime": "2023-10-30T13:59:39.455273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp8ynd311nUfFXA1Wf"]} -{"Format": "IDEA0", "ID": "1acd3fe6-624e-405c-a897-0bf868b30fdf", "DetectTime": "2023-10-30T13:59:39.508428+02:00", "EventTime": "2023-10-30T13:59:39.508449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CENi484XMOETFHmYk6", "CqF5WL2HQ7cnBIWb19", "C6ujBzzDiaokDnNqh", "C1boyB3ys4Ib3xJEJ6"]} -{"Format": "IDEA0", "ID": "48c00334-ed5f-466e-b2c5-8895911331e0", "DetectTime": "2023-10-30T13:59:39.520190+02:00", "EventTime": "2023-10-30T13:59:39.520207+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqF5WL2HQ7cnBIWb19"]} -{"Format": "IDEA0", "ID": "e65be5dc-54d6-4cdf-b9e8-7f8ed8a4fe3a", "DetectTime": "2023-10-30T13:59:39.532723+02:00", "EventTime": "2023-10-30T13:59:39.532743+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI3z0I2zsMzTLdOe3k"]} -{"Format": "IDEA0", "ID": "d312caac-5254-4a97-a255-1a11cfe2a0a9", "DetectTime": "2023-10-30T13:59:39.545630+02:00", "EventTime": "2023-10-30T13:59:39.545646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CFMaVE3141AmSzboJl"]} -{"Format": "IDEA0", "ID": "df5a904c-15b3-411a-a649-3fc3c3bf0337", "DetectTime": "2023-10-30T13:59:39.599339+02:00", "EventTime": "2023-10-30T13:59:39.599359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["Cf0yDG1xwwZHqgdrg1"]} -{"Format": "IDEA0", "ID": "4690bc26-2a3c-443e-9605-4a6914801ce6", "DetectTime": "2023-10-30T13:59:39.656177+02:00", "EventTime": "2023-10-30T13:59:39.656201+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPatAD4jpCMd9KYQDl"]} -{"Format": "IDEA0", "ID": "f084fc38-7ed0-44b2-a77b-5429834ccc22", "DetectTime": "2023-10-30T13:59:39.666739+02:00", "EventTime": "2023-10-30T13:59:39.666762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CaXLK1btmINWYT064"]} -{"Format": "IDEA0", "ID": "cc9fc866-8623-4fb2-9cf2-0cd9220a0690", "DetectTime": "2023-10-30T13:59:39.722141+02:00", "EventTime": "2023-10-30T13:59:39.722158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CK2rrg3dz25J4Nkdle"]} -{"Format": "IDEA0", "ID": "37760fc5-83df-49fd-96bb-05df6e7ae26f", "DetectTime": "2023-10-30T13:59:39.776873+02:00", "EventTime": "2023-10-30T13:59:39.776884+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWszM02vS6vlsx7PL1"]} -{"Format": "IDEA0", "ID": "2cad4770-25e9-437c-a325-205a6753ca20", "DetectTime": "2023-10-30T13:59:39.789911+02:00", "EventTime": "2023-10-30T13:59:39.789935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CRyLZJlia4lDaIuZi"]} -{"Format": "Json", "ID": "2cad4770-25e9-437c-a325-205a6753ca20", "DetectTime": "2023-10-30T13:59:39.789911+02:00", "EventTime": "2023-10-30T13:59:39.789935+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:14:58.346068+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:39.940028)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "459aca88-9d61-46ad-aa40-3b15499670c6", "DetectTime": "2023-10-30T13:59:39.947507+02:00", "EventTime": "2023-10-30T13:59:39.947538+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGjGxy1gKJLpV2vea7"]} -{"Format": "IDEA0", "ID": "73073a33-d05f-4550-bad7-caa03747985c", "DetectTime": "2023-10-30T13:59:39.967561+02:00", "EventTime": "2023-10-30T13:59:39.967586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["C1C0vD20rnsrfswa9g"]} -{"Format": "IDEA0", "ID": "3caa9327-a762-4efc-9958-b6a999e39c19", "DetectTime": "2023-10-30T13:59:40.059127+02:00", "EventTime": "2023-10-30T13:59:40.059155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18670], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. ", "ContentType": "text/plain"}], "uids": ["CGvDYO1OJUs7ej8hOl"]} -{"Format": "IDEA0", "ID": "53e18f05-60de-4c4e-b948-9fce2f2b5ae9", "DetectTime": "2023-10-30T13:59:40.140657+02:00", "EventTime": "2023-10-30T13:59:40.140754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["ChucfW2Cbk1nkAkdfh"]} -{"Format": "IDEA0", "ID": "b08683b6-0a5b-49e5-a63e-99398b44438d", "DetectTime": "2023-10-30T13:59:40.205274+02:00", "EventTime": "2023-10-30T13:59:40.205297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CeGOrc8xHe7HklpBk"]} -{"Format": "IDEA0", "ID": "0570c0da-2064-4ebc-99de-735a2e183691", "DetectTime": "2023-10-30T13:59:40.260118+02:00", "EventTime": "2023-10-30T13:59:40.260131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CsSoqk1zaCcmiRKLG7"]} -{"Format": "IDEA0", "ID": "9a097651-115f-4246-918e-a1f47449ef19", "DetectTime": "2023-10-30T13:59:40.314118+02:00", "EventTime": "2023-10-30T13:59:40.314139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["Cjkoq31ONNRgKQDEAa"]} -{"Format": "IDEA0", "ID": "a4750332-43ad-4469-bd15-bcdbfd99d07d", "DetectTime": "2023-10-30T13:59:40.364663+02:00", "EventTime": "2023-10-30T13:59:40.364675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["C7C5kx376kn1ZtFMDe"]} -{"Format": "IDEA0", "ID": "62e4aa09-927a-46a7-9d38-5ee64c8dd0b3", "DetectTime": "2023-10-30T13:59:40.419795+02:00", "EventTime": "2023-10-30T13:59:40.419812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["C7TrZP2mcr3psXp9gf"]} -{"Format": "Json", "ID": "62e4aa09-927a-46a7-9d38-5ee64c8dd0b3", "DetectTime": "2023-10-30T13:59:40.419795+02:00", "EventTime": "2023-10-30T13:59:40.419812+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:15:00.342015+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:40.498062)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "383555ff-172f-4604-bbbc-223ce0cabac8", "DetectTime": "2023-10-30T13:59:40.503720+02:00", "EventTime": "2023-10-30T13:59:40.503740+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CESDe54c2jAJyjbT62"]} -{"Format": "IDEA0", "ID": "5f15a9c4-c3c0-41ce-9411-5fe7e9b2ac6c", "DetectTime": "2023-10-30T13:59:40.518820+02:00", "EventTime": "2023-10-30T13:59:40.518840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CwzqZN34CVp6kI3K7d"]} -{"Format": "IDEA0", "ID": "db14e4a2-1c02-488c-bfc2-e90e1aecb7f1", "DetectTime": "2023-10-30T13:59:40.569753+02:00", "EventTime": "2023-10-30T13:59:40.569770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CrqeHO1g0mGlcuLJd4"]} -{"Format": "IDEA0", "ID": "4e686867-d54a-449e-af1f-60969e5149c7", "DetectTime": "2023-10-30T13:59:40.623560+02:00", "EventTime": "2023-10-30T13:59:40.623579+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGDyQt1fSNHY1BSr92"]} -{"Format": "IDEA0", "ID": "a64cf73f-f6b7-4c0c-a33b-5e83489a4428", "DetectTime": "2023-10-30T13:59:40.642997+02:00", "EventTime": "2023-10-30T13:59:40.643022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CIXWum3lppP7J4yBYb"]} -{"Format": "IDEA0", "ID": "91b66207-7aad-43f1-9d74-37e1c289b432", "DetectTime": "2023-10-30T13:59:40.708231+02:00", "EventTime": "2023-10-30T13:59:40.708254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CS4b7S1sdTyNNCmmU"]} -{"Format": "IDEA0", "ID": "d4779c3f-1bed-4b2d-9ea5-027ea43acc88", "DetectTime": "2023-10-30T13:59:40.757772+02:00", "EventTime": "2023-10-30T13:59:40.757793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CrD3EC1O2C0tdJXXk4"]} -{"Format": "IDEA0", "ID": "bddbfe4c-857f-4499-9d68-74b5d059924c", "DetectTime": "2023-10-30T13:59:40.807783+02:00", "EventTime": "2023-10-30T13:59:40.807835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16896], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16896/UDP destination IP 188.169.27.248. ", "ContentType": "text/plain"}], "uids": ["CZBXLH2TBqnXwgCXa2"]} -{"Format": "IDEA0", "ID": "53bd677f-dd3c-4661-b3ca-534d27531321", "DetectTime": "2023-10-30T13:59:40.855166+02:00", "EventTime": "2023-10-30T13:59:40.855186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4736], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4736/UDP destination IP 78.92.75.150. ", "ContentType": "text/plain"}], "uids": ["CWArKg4gv5SDTr7d82"]} -{"Format": "IDEA0", "ID": "e08451a0-ac08-45f2-a6e4-516e8f8e707a", "DetectTime": "2023-10-30T13:59:40.901869+02:00", "EventTime": "2023-10-30T13:59:40.901887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 49.49.17.72. ", "ContentType": "text/plain"}], "uids": ["CECyxt4kOmyR6Jmt5c"]} -{"Format": "Json", "ID": "e08451a0-ac08-45f2-a6e4-516e8f8e707a", "DetectTime": "2023-10-30T13:59:40.901869+02:00", "EventTime": "2023-10-30T13:59:40.901887+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:15:35.133728+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:40.982962)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ce413669-09dd-41ec-88e7-905e92e4b759", "DetectTime": "2023-10-30T13:59:40.989111+02:00", "EventTime": "2023-10-30T13:59:40.989124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. ", "ContentType": "text/plain"}], "uids": ["CmR88H18tBzl6irwCl"]} -{"Format": "IDEA0", "ID": "6687b47a-19c0-4d0f-9c13-0b7448f7dc36", "DetectTime": "2023-10-30T13:59:41.038085+02:00", "EventTime": "2023-10-30T13:59:41.038103+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClkYZp4bzl2GpOjlVg"]} -{"Format": "IDEA0", "ID": "eaf4c147-df98-4d1f-87f7-ea414d7f4707", "DetectTime": "2023-10-30T13:59:41.056062+02:00", "EventTime": "2023-10-30T13:59:41.056084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1728], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.183.152. ", "ContentType": "text/plain"}], "uids": ["CUHqBi3pT5YbgE8u29"]} -{"Format": "IDEA0", "ID": "85546d4d-c241-4d0b-ae97-8faebfe41c23", "DetectTime": "2023-10-30T13:59:41.104769+02:00", "EventTime": "2023-10-30T13:59:41.104796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27958], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27958/UDP destination IP 109.93.140.11. ", "ContentType": "text/plain"}], "uids": ["CyCzkc3G9SLYzsFll"]} -{"Format": "IDEA0", "ID": "eac8f8d8-b1dd-4444-9ac4-6343442f95a2", "DetectTime": "2023-10-30T13:59:41.149480+02:00", "EventTime": "2023-10-30T13:59:41.149501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPatAD4jpCMd9KYQDl", "Cj9dY3EkVUMNCBgtd", "CGjGxy1gKJLpV2vea7", "CGDyQt1fSNHY1BSr92"]} -{"Format": "IDEA0", "ID": "954ef41f-e840-4458-b031-544148a27381", "DetectTime": "2023-10-30T13:59:41.162803+02:00", "EventTime": "2023-10-30T13:59:41.162820+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cj9dY3EkVUMNCBgtd"]} -{"Format": "IDEA0", "ID": "6d2142c8-22ed-4e2f-8113-2057e83650ab", "DetectTime": "2023-10-30T13:59:41.175201+02:00", "EventTime": "2023-10-30T13:59:41.175216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CBnW0I1GH8r0q9y734"]} -{"Format": "IDEA0", "ID": "095dbae1-b325-458d-a9aa-af793e157590", "DetectTime": "2023-10-30T13:59:41.225991+02:00", "EventTime": "2023-10-30T13:59:41.226018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CAyQQb3RBrqZwJ54A4"]} -{"Format": "IDEA0", "ID": "aa04f64b-2239-421d-9ec0-c523521e2e3d", "DetectTime": "2023-10-30T13:59:41.278142+02:00", "EventTime": "2023-10-30T13:59:41.278168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CpMVIA4P6CxUhXUrIg"]} -{"Format": "IDEA0", "ID": "e294d545-0ab5-461d-a526-6e19952b091e", "DetectTime": "2023-10-30T13:59:41.335890+02:00", "EventTime": "2023-10-30T13:59:41.335916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["CudyEj3sYQ9NTiZtj8"]} -{"Format": "IDEA0", "ID": "92a60e2f-5bd0-4b84-b12d-a17b079429c9", "DetectTime": "2023-10-30T13:59:41.387526+02:00", "EventTime": "2023-10-30T13:59:41.387544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CS4iI3Nxk7FV7K9xl"]} -{"Format": "Json", "ID": "92a60e2f-5bd0-4b84-b12d-a17b079429c9", "DetectTime": "2023-10-30T13:59:41.387526+02:00", "EventTime": "2023-10-30T13:59:41.387544+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:15:37.353797+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:41.470135)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9b52eee7-8131-44b7-ad41-1763f7184182", "DetectTime": "2023-10-30T13:59:41.476487+02:00", "EventTime": "2023-10-30T13:59:41.476505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8045], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8045/UDP destination IP 177.189.51.187. ", "ContentType": "text/plain"}], "uids": ["CXTw683wEFNpKei0Vf"]} -{"Format": "IDEA0", "ID": "dc52c886-50d6-4cd2-b249-99af26acd666", "DetectTime": "2023-10-30T13:59:41.520768+02:00", "EventTime": "2023-10-30T13:59:41.520785+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUvjpR1JNLM344YXCf"]} -{"Format": "IDEA0", "ID": "87b61b7e-1c11-46dd-8e89-a20706fb4918", "DetectTime": "2023-10-30T13:59:41.532766+02:00", "EventTime": "2023-10-30T13:59:41.532780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CowIcW1jIw0md0G06e"]} -{"Format": "IDEA0", "ID": "a96d7bb4-a2fb-45b1-9087-713c25008334", "DetectTime": "2023-10-30T13:59:41.572492+02:00", "EventTime": "2023-10-30T13:59:41.572509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4013], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4013/UDP destination IP 95.77.231.101. ", "ContentType": "text/plain"}], "uids": ["CSA7vC3pc2xQ57SXSl"]} -{"Format": "IDEA0", "ID": "9c7d6196-3d3e-45c0-9d6f-6494bec16aea", "DetectTime": "2023-10-30T13:59:41.614494+02:00", "EventTime": "2023-10-30T13:59:41.614506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["Cp0UNnEvroQWgp3vk"]} -{"Format": "IDEA0", "ID": "71bccb77-b937-42e1-a5f2-5ea87b075bb0", "DetectTime": "2023-10-30T13:59:41.658213+02:00", "EventTime": "2023-10-30T13:59:41.658233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5857/UDP destination IP 46.237.70.170. ", "ContentType": "text/plain"}], "uids": ["CvBpQMwUaIutHK7Se"]} -{"Format": "IDEA0", "ID": "2b511ee9-c9d8-4a9c-944b-c8684a8a6141", "DetectTime": "2023-10-30T13:59:41.703511+02:00", "EventTime": "2023-10-30T13:59:41.703538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CYNQKH1L7exfuYQdp7"]} -{"Format": "IDEA0", "ID": "e5340a48-78ab-4614-b3e2-941fa1dfe38a", "DetectTime": "2023-10-30T13:59:41.752369+02:00", "EventTime": "2023-10-30T13:59:41.752380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["C7pxFa1BItZDHUkvj2"]} -{"Format": "IDEA0", "ID": "5038c1c9-d092-4dc0-ab22-68525b5c83d0", "DetectTime": "2023-10-30T13:59:41.792020+02:00", "EventTime": "2023-10-30T13:59:41.792042+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5oT1O3vVai9SI2Pt8"]} -{"Format": "IDEA0", "ID": "91630165-dc1b-4e74-9e35-d9b736bc8e12", "DetectTime": "2023-10-30T13:59:41.804700+02:00", "EventTime": "2023-10-30T13:59:41.804726+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgCTNYhJejURQqQ5f"]} -{"Format": "IDEA0", "ID": "62b90e59-00df-43c3-a7da-d86caa77ee5a", "DetectTime": "2023-10-30T13:59:41.818134+02:00", "EventTime": "2023-10-30T13:59:41.818156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CfDhyV37xcyKrWUsKc"]} -{"Format": "Json", "ID": "62b90e59-00df-43c3-a7da-d86caa77ee5a", "DetectTime": "2023-10-30T13:59:41.818134+02:00", "EventTime": "2023-10-30T13:59:41.818156+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-02T02:40:44.291996+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:41.892700)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86589236-166b-411a-a4f1-9d095df85ce8", "DetectTime": "2023-10-30T13:59:41.898621+02:00", "EventTime": "2023-10-30T13:59:41.898645+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNmrmG1LYrHtZbBWXj"]} -{"Format": "IDEA0", "ID": "960f6775-2dd1-4deb-a69b-b47a81e6b711", "DetectTime": "2023-10-30T13:59:41.913995+02:00", "EventTime": "2023-10-30T13:59:41.914021+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1CIM03xUY1Lu8nHpf"]} -{"Format": "IDEA0", "ID": "1816b8ae-f689-46b3-af65-c5f8617bcd25", "DetectTime": "2023-10-30T13:59:41.931846+02:00", "EventTime": "2023-10-30T13:59:41.931865+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKYlkd2pSDkYPiz4Kf"]} -{"Format": "IDEA0", "ID": "419c3df0-6b11-4d33-a3f5-02fb2aa2e4c9", "DetectTime": "2023-10-30T13:59:41.946312+02:00", "EventTime": "2023-10-30T13:59:41.946339+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3fVrI1o3aoOECnG2f"]} -{"Format": "IDEA0", "ID": "77a08393-bd3b-447e-9cb8-dd2ad15fe080", "DetectTime": "2023-10-30T13:59:41.959375+02:00", "EventTime": "2023-10-30T13:59:41.959395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5oT1O3vVai9SI2Pt8", "CNmrmG1LYrHtZbBWXj", "Cz4H2u483H3GzvUzwe", "CKYlkd2pSDkYPiz4Kf"]} -{"Format": "IDEA0", "ID": "ca7af8e0-7b59-4f1a-8ca7-ea32b48f6299", "DetectTime": "2023-10-30T13:59:41.971845+02:00", "EventTime": "2023-10-30T13:59:41.971862+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cz4H2u483H3GzvUzwe"]} -{"Format": "IDEA0", "ID": "4dffac75-e72d-47d0-a519-f97265c22ea3", "DetectTime": "2023-10-30T13:59:41.986122+02:00", "EventTime": "2023-10-30T13:59:41.986140+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr5tW3F6uO8fer5ig"]} -{"Format": "IDEA0", "ID": "adfdfead-4dcb-4737-942a-0830fcc4c9c9", "DetectTime": "2023-10-30T13:59:41.999231+02:00", "EventTime": "2023-10-30T13:59:41.999253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CVTyoi2s62jtIjharj"]} -{"Format": "IDEA0", "ID": "59690a51-ee35-4474-b7cf-b7f37d31ac67", "DetectTime": "2023-10-30T13:59:42.041100+02:00", "EventTime": "2023-10-30T13:59:42.041114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["Cy003O2T1Lwo8ezmvf"]} -{"Format": "IDEA0", "ID": "ad434180-71dc-4a40-8753-73ec89886037", "DetectTime": "2023-10-30T13:59:42.082054+02:00", "EventTime": "2023-10-30T13:59:42.082093+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRPaF53aX5ZfU9edgg"]} -{"Format": "IDEA0", "ID": "fdbb007f-acfc-4764-8b55-302b2eee86de", "DetectTime": "2023-10-30T13:59:42.094594+02:00", "EventTime": "2023-10-30T13:59:42.094606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CVuGaN3BgqpN8PeEc5"]} -{"Format": "IDEA0", "ID": "f3459d40-ac93-4724-9ef2-fa2eb0bfd1ce", "DetectTime": "2023-10-30T13:59:42.137749+02:00", "EventTime": "2023-10-30T13:59:42.137769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18202], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. ", "ContentType": "text/plain"}], "uids": ["CEhWbzMbq8UOLYLMf"]} -{"Format": "IDEA0", "ID": "2dbdcbf3-5ccf-48ab-af83-5873a3bc8416", "DetectTime": "2023-10-30T13:59:42.179299+02:00", "EventTime": "2023-10-30T13:59:42.179325+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEfSPi1trnJyHAVfNd"]} -{"Format": "IDEA0", "ID": "a9b92818-af0e-471a-bb03-761c18fd4a93", "DetectTime": "2023-10-30T13:59:42.191414+02:00", "EventTime": "2023-10-30T13:59:42.191427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C9jff42JIOU8lWghWj"]} -{"Format": "IDEA0", "ID": "7d7c3ac2-61e6-4ccc-af3d-73c6cc15bbf1", "DetectTime": "2023-10-30T13:59:42.233749+02:00", "EventTime": "2023-10-30T13:59:42.233766+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmQ9u11pqFONzsDHAg"]} -{"Format": "IDEA0", "ID": "7271e4fd-eaca-4232-929b-3ff77f3b296e", "DetectTime": "2023-10-30T13:59:42.249575+02:00", "EventTime": "2023-10-30T13:59:42.249599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["Cs6qOa1k7g9OisapSi"]} -{"Format": "IDEA0", "ID": "9a53a1e4-7cd2-4803-a486-e1f4eea21f26", "DetectTime": "2023-10-30T13:59:42.285966+02:00", "EventTime": "2023-10-30T13:59:42.285984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CIUxhv4pAWASdgITC7"]} -{"Format": "IDEA0", "ID": "990b6171-5ca0-4aed-a064-87d2eb3e5feb", "DetectTime": "2023-10-30T13:59:42.329693+02:00", "EventTime": "2023-10-30T13:59:42.329712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["Cm10DtWh2vgrcc1V6"]} -{"Format": "Json", "ID": "990b6171-5ca0-4aed-a064-87d2eb3e5feb", "DetectTime": "2023-10-30T13:59:42.329693+02:00", "EventTime": "2023-10-30T13:59:42.329712+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:48:33.369604+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:42.397376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b75e8b2e-8eda-4a7f-a272-6c2292f3445e", "DetectTime": "2023-10-30T13:59:42.402748+02:00", "EventTime": "2023-10-30T13:59:42.402759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CWBOsQ3UaIwodSjZXc"]} -{"Format": "IDEA0", "ID": "b0019761-c2f0-488e-8e0c-0f15b8ecc86e", "DetectTime": "2023-10-30T13:59:42.443195+02:00", "EventTime": "2023-10-30T13:59:42.443212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CVV3ED4HIEPPDGmvt1"]} -{"Format": "IDEA0", "ID": "7a8597f4-950f-46ab-96da-2c9c69115b42", "DetectTime": "2023-10-30T13:59:42.485820+02:00", "EventTime": "2023-10-30T13:59:42.485846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CTFsCr1nFtLRxxw3hc"]} -{"Format": "IDEA0", "ID": "b54dae38-185a-4eea-be8b-43fa83a93b17", "DetectTime": "2023-10-30T13:59:42.522623+02:00", "EventTime": "2023-10-30T13:59:42.522637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["C4koL23T2kpuXovzJe"]} -{"Format": "IDEA0", "ID": "9c2c141d-a71f-4576-a294-dd314c414fed", "DetectTime": "2023-10-30T13:59:42.562919+02:00", "EventTime": "2023-10-30T13:59:42.562956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. ", "ContentType": "text/plain"}], "uids": ["CHuxAc4x3NjpmjWX9f"]} -{"Format": "IDEA0", "ID": "376e9490-d3d1-4ef3-b5b3-61a1e525e02e", "DetectTime": "2023-10-30T13:59:42.601252+02:00", "EventTime": "2023-10-30T13:59:42.601274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CDqpxq3NvfL8Oupifb"]} -{"Format": "IDEA0", "ID": "5059f911-51fd-4b59-b62c-2f56d99c51c7", "DetectTime": "2023-10-30T13:59:42.640710+02:00", "EventTime": "2023-10-30T13:59:42.640728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["Ch2tWR11cM1AByNQ68"]} -{"Format": "IDEA0", "ID": "98820f7e-c0ba-490b-b309-988748f0d2f2", "DetectTime": "2023-10-30T13:59:42.678931+02:00", "EventTime": "2023-10-30T13:59:42.678958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["C8LghN3Pl1ZezoRXG6"]} -{"Format": "Json", "ID": "98820f7e-c0ba-490b-b309-988748f0d2f2", "DetectTime": "2023-10-30T13:59:42.678931+02:00", "EventTime": "2023-10-30T13:59:42.678958+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:48:35.406385+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:42.741349)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d3f75c8f-3679-4b31-910c-8041bd17bc6f", "DetectTime": "2023-10-30T13:59:42.747496+02:00", "EventTime": "2023-10-30T13:59:42.747523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["Cr9fS62WAZPHykPui5"]} -{"Format": "IDEA0", "ID": "d0612854-185c-4369-9b9b-430297c004c9", "DetectTime": "2023-10-30T13:59:42.787487+02:00", "EventTime": "2023-10-30T13:59:42.787513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 49.49.17.72. ", "ContentType": "text/plain"}], "uids": ["CKkcbswErxqUj9PPi"]} -{"Format": "IDEA0", "ID": "fc52f7d0-35d5-44a7-bea1-0752857170c2", "DetectTime": "2023-10-30T13:59:42.825210+02:00", "EventTime": "2023-10-30T13:59:42.825233+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAShFB4VUYIjSFr8ti"]} -{"Format": "IDEA0", "ID": "c47bdeca-3047-4d5b-8ec3-af0831ac005a", "DetectTime": "2023-10-30T13:59:42.838317+02:00", "EventTime": "2023-10-30T13:59:42.838333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27958], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27958/UDP destination IP 109.93.140.11. ", "ContentType": "text/plain"}], "uids": ["CYznpHSnRNzJkdlVi"]} -{"Format": "IDEA0", "ID": "37d65d4a-9426-4a4c-bd7e-f242fc25c478", "DetectTime": "2023-10-30T13:59:42.883844+02:00", "EventTime": "2023-10-30T13:59:42.883865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["C3mR022fUsGMEX0xAe"]} -{"Format": "IDEA0", "ID": "41fb1a2e-3b3c-485a-bc67-b98896e47ad1", "DetectTime": "2023-10-30T13:59:42.919411+02:00", "EventTime": "2023-10-30T13:59:42.919428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. ", "ContentType": "text/plain"}], "uids": ["CT3GJC3C7OWoMfFTL8"]} -{"Format": "IDEA0", "ID": "c96f0604-2603-4a98-88a9-bdb64ff740c1", "DetectTime": "2023-10-30T13:59:42.954675+02:00", "EventTime": "2023-10-30T13:59:42.954697+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CESE1o3FyoJwBHXwak"]} -{"Format": "IDEA0", "ID": "e3f01bac-c22f-4ac0-bc33-286f01273265", "DetectTime": "2023-10-30T13:59:42.969193+02:00", "EventTime": "2023-10-30T13:59:42.969218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["Cfnjlq4XFBtHB9kzU1"]} -{"Format": "IDEA0", "ID": "efadf930-a7ce-4dd9-adc5-74ca9d7fdea5", "DetectTime": "2023-10-30T13:59:43.007736+02:00", "EventTime": "2023-10-30T13:59:43.007760+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRtWTp4Rm56tRhCSfa"]} -{"Format": "IDEA0", "ID": "5222814a-0a34-4ff2-bd32-7aaf2ea4b86f", "DetectTime": "2023-10-30T13:59:43.019731+02:00", "EventTime": "2023-10-30T13:59:43.019752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["CKzZzd2IMMDqbSWkD8"]} -{"Format": "IDEA0", "ID": "2b4e11db-8d00-4045-886c-3cae60ddba08", "DetectTime": "2023-10-30T13:59:43.058184+02:00", "EventTime": "2023-10-30T13:59:43.058204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CpngW63u4zMSxQZPEb"]} -{"Format": "Json", "ID": "2b4e11db-8d00-4045-886c-3cae60ddba08", "DetectTime": "2023-10-30T13:59:43.058184+02:00", "EventTime": "2023-10-30T13:59:43.058204+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T02:49:27.525714+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2023/10/30 13:59:43.119810)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3450f35f-fca0-4951-ad66-559abf31912b", "DetectTime": "2023-10-30T13:59:43.125881+02:00", "EventTime": "2023-10-30T13:59:43.125895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CESE1o3FyoJwBHXwak", "CmQ9u11pqFONzsDHAg", "CRPaF53aX5ZfU9edgg", "C6qzUp4Fvupbey62Ek"]} -{"Format": "IDEA0", "ID": "51a2c1f4-1c4e-4ffb-9c0d-b9a73691a2f3", "DetectTime": "2023-10-30T13:59:43.139061+02:00", "EventTime": "2023-10-30T13:59:43.139086+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6qzUp4Fvupbey62Ek"]} -{"Format": "IDEA0", "ID": "f0123e5b-e0a4-4faf-b9ec-27e533f94978", "DetectTime": "2023-10-30T13:59:43.153321+02:00", "EventTime": "2023-10-30T13:59:43.153347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CnaByh2vUfiQbrZ8ci"]} -{"Format": "IDEA0", "ID": "4e4bf763-7392-49cd-a2c8-fee31f17bbde", "DetectTime": "2023-10-30T13:59:43.194328+02:00", "EventTime": "2023-10-30T13:59:43.194358+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6tSGYf5qGLWyq7Vk"]} -{"Format": "IDEA0", "ID": "2b8e08e9-cec3-4e0f-a4dc-2871a7e5a860", "DetectTime": "2023-10-30T13:59:43.212649+02:00", "EventTime": "2023-10-30T13:59:43.212679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CkS1F13WisFAplLpu5"]} -{"Format": "IDEA0", "ID": "c02c885c-20c1-489e-8931-4a38195f8210", "DetectTime": "2023-10-30T13:59:43.249243+02:00", "EventTime": "2023-10-30T13:59:43.249266+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ck9nWV3BxQSXPFKbW6"]} -{"Format": "IDEA0", "ID": "f1fe32ab-62ab-4d8b-be76-a82da033bf3a", "DetectTime": "2023-10-30T13:59:43.262992+02:00", "EventTime": "2023-10-30T13:59:43.263011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5857/UDP destination IP 46.237.70.170. ", "ContentType": "text/plain"}], "uids": ["CzUWP3RgGINrjYeic"]} -{"Format": "IDEA0", "ID": "325f311e-04b1-45d8-aba0-2a19df667a06", "DetectTime": "2023-10-30T13:59:43.295928+02:00", "EventTime": "2023-10-30T13:59:43.295946+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNNHXN15KNMDmjc3U4"]} -{"Format": "IDEA0", "ID": "e738c622-5167-47b7-8cfd-840d261a7c3e", "DetectTime": "2023-10-30T13:59:43.310004+02:00", "EventTime": "2023-10-30T13:59:43.310023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["Cibuvp4Bznrc6aD1r1"]} -{"Format": "IDEA0", "ID": "6190bffb-55ce-45da-802a-405c7ff68f8f", "DetectTime": "2023-10-30T13:59:43.342482+02:00", "EventTime": "2023-10-30T13:59:43.342500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["COY9fD2DKAUbzSpKq4"]} -{"Format": "IDEA0", "ID": "670cdeaf-022a-4ce9-ac5b-bbd78abfecd9", "DetectTime": "2023-10-30T13:59:43.378246+02:00", "EventTime": "2023-10-30T13:59:43.378271+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkTTSL9DCqB7LdlMe"]} -{"Format": "IDEA0", "ID": "ec4aa3e0-1f41-4e5c-9f5e-209a56de21b0", "DetectTime": "2023-10-30T13:59:43.396721+02:00", "EventTime": "2023-10-30T13:59:43.396737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["C4LORW1BrS9sXJBz95"]} -{"Format": "IDEA0", "ID": "abf097d1-0647-49f5-b68a-b141949b3454", "DetectTime": "2023-10-30T13:59:43.428270+02:00", "EventTime": "2023-10-30T13:59:43.428283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CwfEBN1bLI8c6FZlyc"]} -{"Format": "IDEA0", "ID": "36ede807-4af4-4b22-ac65-c76b3c8b8aff", "DetectTime": "2023-10-30T13:59:43.462340+02:00", "EventTime": "2023-10-30T13:59:43.462365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLI6lm2KLOal9oZJW6"]} -{"Format": "IDEA0", "ID": "52109d2d-ee8f-46be-bec2-c07df50de57c", "DetectTime": "2023-10-30T13:59:43.511784+02:00", "EventTime": "2023-10-30T13:59:43.511816+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CeqBVPtACaisyPBZ8"]} -{"Format": "IDEA0", "ID": "7c7c3c0a-ed3e-4ad3-8b03-471f0e28f6e5", "DetectTime": "2023-10-30T13:59:43.524371+02:00", "EventTime": "2023-10-30T13:59:43.524398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CsbMfZ15swvWtTL0d"]} -{"Format": "IDEA0", "ID": "0ef2d932-6440-48dd-a14f-6f96fb49184e", "DetectTime": "2023-10-30T13:59:43.569138+02:00", "EventTime": "2023-10-30T13:59:43.569153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CwJq6B3bvgqoM0YHy9"]} -{"Format": "IDEA0", "ID": "2ebddddc-04c4-4535-891d-85e8d2544d49", "DetectTime": "2023-10-30T13:59:43.616461+02:00", "EventTime": "2023-10-30T13:59:43.616473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CRoj5zrhUndhwpyga"]} -{"Format": "IDEA0", "ID": "f9783b58-eeb5-4986-8634-c09bff05494a", "DetectTime": "2023-10-30T13:59:43.663513+02:00", "EventTime": "2023-10-30T13:59:43.663532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CbPQmc2Mzl5BEHpjj8"]} -{"Format": "Json", "ID": "f9783b58-eeb5-4986-8634-c09bff05494a", "DetectTime": "2023-10-30T13:59:43.663513+02:00", "EventTime": "2023-10-30T13:59:43.663532+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T03:22:02.041234+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2023/10/30 13:59:43.798903)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6df809ea-9970-462d-a431-9559e598e59b", "DetectTime": "2023-10-30T13:59:43.804261+02:00", "EventTime": "2023-10-30T13:59:43.804278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CECiHKpArjFLUA3h2"]} -{"Format": "IDEA0", "ID": "a47e0f44-792f-4dd4-abc1-3f3d0f0ff30a", "DetectTime": "2023-10-30T13:59:43.849115+02:00", "EventTime": "2023-10-30T13:59:43.849172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwTSsn33DexnqZ2eMg"]} -{"Format": "IDEA0", "ID": "a7e8f588-96bd-4d35-9d76-eeb8fc2c6602", "DetectTime": "2023-10-30T13:59:43.862364+02:00", "EventTime": "2023-10-30T13:59:43.862389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["Ce8adLncwCC7pEt3j"]} -{"Format": "IDEA0", "ID": "8d048f8c-4486-4c4a-a610-acf6096b1ea7", "DetectTime": "2023-10-30T13:59:43.912782+02:00", "EventTime": "2023-10-30T13:59:43.912807+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPqCC5MfmID2sMJkh"]} -{"Format": "IDEA0", "ID": "eb22bca6-2c92-48b7-9907-c1111b0ea563", "DetectTime": "2023-10-30T13:59:43.925950+02:00", "EventTime": "2023-10-30T13:59:43.925971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18734], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. ", "ContentType": "text/plain"}], "uids": ["CqxivI2JwdzE0k34Ll"]} -{"Format": "IDEA0", "ID": "1b4c7ad3-a0b9-47f3-a2cf-bf5da180e805", "DetectTime": "2023-10-30T13:59:43.971036+02:00", "EventTime": "2023-10-30T13:59:43.971047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6760], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. ", "ContentType": "text/plain"}], "uids": ["CGpW991dzJo1rE57Gf"]} -{"Format": "IDEA0", "ID": "87cc161e-9fb0-4df5-b44b-8ef68ba08a29", "DetectTime": "2023-10-30T13:59:44.015905+02:00", "EventTime": "2023-10-30T13:59:44.015930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQ52yt3Bw2lGRl1Uwi", "Ck9nWV3BxQSXPFKbW6", "CwTSsn33DexnqZ2eMg", "CkTTSL9DCqB7LdlMe"]} -{"Format": "IDEA0", "ID": "1031bee1-cd2d-4560-aa2a-bc3c038e4eb4", "DetectTime": "2023-10-30T13:59:44.030641+02:00", "EventTime": "2023-10-30T13:59:44.030670+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQ52yt3Bw2lGRl1Uwi"]} -{"Format": "IDEA0", "ID": "a999005d-9b73-4fe4-ad77-47897cb5ca3b", "DetectTime": "2023-10-30T13:59:44.043002+02:00", "EventTime": "2023-10-30T13:59:44.043026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CBQjsO2sfe5AdSvP94"]} -{"Format": "IDEA0", "ID": "63c0c6ee-c384-454d-8fab-3ec9603160af", "DetectTime": "2023-10-30T13:59:44.091843+02:00", "EventTime": "2023-10-30T13:59:44.091869+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjrAbQ3X174xKRphzl"]} -{"Format": "IDEA0", "ID": "5d01e286-15ff-4a30-8091-452a92980b31", "DetectTime": "2023-10-30T13:59:44.105063+02:00", "EventTime": "2023-10-30T13:59:44.105079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CljZNn1Sbukm9WIMg9"]} -{"Format": "IDEA0", "ID": "6d9d1dde-7c69-473a-8023-0541ccfaf9f5", "DetectTime": "2023-10-30T13:59:44.150244+02:00", "EventTime": "2023-10-30T13:59:44.150269+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwPgi1440q64yXplU6"]} -{"Format": "IDEA0", "ID": "f755d947-70fc-458e-8427-5dcfbc15f1f1", "DetectTime": "2023-10-30T13:59:44.162337+02:00", "EventTime": "2023-10-30T13:59:44.162363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CD59SF3SkLaJqaxEM9"]} -{"Format": "IDEA0", "ID": "0d4af0fb-a9a5-4297-b4ac-f89d807a6fcd", "DetectTime": "2023-10-30T13:59:44.216544+02:00", "EventTime": "2023-10-30T13:59:44.216570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CcLpC33xBrUp6TemGa"]} -{"Format": "Json", "ID": "0d4af0fb-a9a5-4297-b4ac-f89d807a6fcd", "DetectTime": "2023-10-30T13:59:44.216544+02:00", "EventTime": "2023-10-30T13:59:44.216570+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T03:23:12.352416+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2023/10/30 13:59:44.287034)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "057f08b6-92f5-401e-b63f-04763e28d740", "DetectTime": "2023-10-30T13:59:44.293292+02:00", "EventTime": "2023-10-30T13:59:44.293317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["Cb3nR8uWj5wcvdIT7"]} -{"Format": "IDEA0", "ID": "257f94e5-0f73-42b4-8a7c-8748da2c0078", "DetectTime": "2023-10-30T13:59:44.341719+02:00", "EventTime": "2023-10-30T13:59:44.341739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["CTSMr22daDWaQ0Dyfe"]} -{"Format": "IDEA0", "ID": "c042d4d2-9631-4ae3-838b-e35b330ab9bc", "DetectTime": "2023-10-30T13:59:44.384615+02:00", "EventTime": "2023-10-30T13:59:44.384641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CbOX2J30wsX2Axse7k"]} -{"Format": "IDEA0", "ID": "b6516ac5-8cdb-4f46-9a81-646de322e9ad", "DetectTime": "2023-10-30T13:59:44.428593+02:00", "EventTime": "2023-10-30T13:59:44.428619+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CylRYj31AOQAIQ5Ux2"]} -{"Format": "IDEA0", "ID": "ef3f1be0-6721-4794-bc55-a56441b5fcbb", "DetectTime": "2023-10-30T13:59:44.442014+02:00", "EventTime": "2023-10-30T13:59:44.442035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CqplBU2GEOwF1aH8zj"]} -{"Format": "IDEA0", "ID": "ad608672-2897-423d-bc31-e8f6b572f0fd", "DetectTime": "2023-10-30T13:59:44.483918+02:00", "EventTime": "2023-10-30T13:59:44.483940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. ", "ContentType": "text/plain"}], "uids": ["CbooqD1q53qNa7Wlia"]} -{"Format": "IDEA0", "ID": "36af417c-b856-45b2-86ad-5e14afc566d0", "DetectTime": "2023-10-30T13:59:44.529634+02:00", "EventTime": "2023-10-30T13:59:44.529659+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT9yGe1FJqobj0pXw7"]} -{"Format": "IDEA0", "ID": "2973cc32-7166-462e-bf9e-7bc5ee63340d", "DetectTime": "2023-10-30T13:59:44.543312+02:00", "EventTime": "2023-10-30T13:59:44.543337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["C0xP7E1Jh2v66FMFSa"]} -{"Format": "IDEA0", "ID": "c496a5bb-4f65-4a28-a5dd-9ea84a0727b6", "DetectTime": "2023-10-30T13:59:44.589680+02:00", "EventTime": "2023-10-30T13:59:44.589701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CyG25r318o3gR0Zic2"]} -{"Format": "IDEA0", "ID": "b5d6a9f1-4513-4c6b-96fc-f0da8ee6ac10", "DetectTime": "2023-10-30T13:59:44.645915+02:00", "EventTime": "2023-10-30T13:59:44.645940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["C8pYHj3Y0VcGPJts23"]} -{"Format": "Json", "ID": "b5d6a9f1-4513-4c6b-96fc-f0da8ee6ac10", "DetectTime": "2023-10-30T13:59:44.645915+02:00", "EventTime": "2023-10-30T13:59:44.645940+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T03:23:48.849493+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2023/10/30 13:59:44.735155)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cc5878d2-f7fb-4644-a52f-4c423fca0f25", "DetectTime": "2023-10-30T13:59:44.742261+02:00", "EventTime": "2023-10-30T13:59:44.742286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CeoUir1xcAyG4swXje"]} -{"Format": "IDEA0", "ID": "72fc7851-9465-4924-a475-968e7f7dd994", "DetectTime": "2023-10-30T13:59:44.791764+02:00", "EventTime": "2023-10-30T13:59:44.791785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CviK1b435grcBs3Mme"]} -{"Format": "IDEA0", "ID": "1625a532-05a5-478a-b207-fa7ccf5943a9", "DetectTime": "2023-10-30T13:59:44.831177+02:00", "EventTime": "2023-10-30T13:59:44.831192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["C8B3JVDBT9DRn9z33"]} -{"Format": "IDEA0", "ID": "457348df-f1fe-414a-b32d-641cc6afa9b7", "DetectTime": "2023-10-30T13:59:44.869296+02:00", "EventTime": "2023-10-30T13:59:44.869343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFTZlX1KxSjgvKWcE7"]} -{"Format": "IDEA0", "ID": "373fee73-8d48-468f-ae85-2bdf1531f333", "DetectTime": "2023-10-30T13:59:44.909210+02:00", "EventTime": "2023-10-30T13:59:44.909235+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4yHbV1VhD8zHWQGbd"]} -{"Format": "IDEA0", "ID": "f277b6a0-0ceb-4b65-a01a-d791387ecd0f", "DetectTime": "2023-10-30T13:59:44.924192+02:00", "EventTime": "2023-10-30T13:59:44.924219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["C7i0fa4FWT40ASxPI7"]} -{"Format": "IDEA0", "ID": "35a4af45-ca61-4fdf-9cc5-87f515e97701", "DetectTime": "2023-10-30T13:59:44.961321+02:00", "EventTime": "2023-10-30T13:59:44.961368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4510], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CTirJn25Jun4iMmVvl"]} -{"Format": "IDEA0", "ID": "c549c553-f434-428b-985e-5ccda1f0eb31", "DetectTime": "2023-10-30T13:59:45.002959+02:00", "EventTime": "2023-10-30T13:59:45.003044+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CItzId3iDv8dQjUWHe"]} -{"Format": "IDEA0", "ID": "3b100190-8529-41f6-8f6c-a2e6cf93f7fa", "DetectTime": "2023-10-30T13:59:45.016378+02:00", "EventTime": "2023-10-30T13:59:45.016402+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkzCj53zrdNLTMQyM2"]} -{"Format": "IDEA0", "ID": "ad2275af-7765-4788-b995-ab9edf0ef9a1", "DetectTime": "2023-10-30T13:59:45.032390+02:00", "EventTime": "2023-10-30T13:59:45.032405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDGUMF4QraXgsoR6l", "CwPgi1440q64yXplU6", "CItzId3iDv8dQjUWHe", "CT9yGe1FJqobj0pXw7"]} -{"Format": "IDEA0", "ID": "a552d25e-75fd-48fa-934d-5df6d47f7064", "DetectTime": "2023-10-30T13:59:45.045135+02:00", "EventTime": "2023-10-30T13:59:45.045158+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDGUMF4QraXgsoR6l"]} -{"Format": "IDEA0", "ID": "0d34568d-6618-46a7-8a74-fc7486767c94", "DetectTime": "2023-10-30T13:59:45.058534+02:00", "EventTime": "2023-10-30T13:59:45.058554+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ch1CIPp7TJlE8Oxuk"]} -{"Format": "IDEA0", "ID": "7034855a-7477-4ebf-beda-cc1750774054", "DetectTime": "2023-10-30T13:59:45.071772+02:00", "EventTime": "2023-10-30T13:59:45.071797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["Cs7bJb21ADYsg3mC3k"]} -{"Format": "IDEA0", "ID": "9526f783-2279-4a93-8f57-1c7b161d2ba3", "DetectTime": "2023-10-30T13:59:45.110556+02:00", "EventTime": "2023-10-30T13:59:45.110580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CwJMZNAScSrrVeepk"]} -{"Format": "Json", "ID": "9526f783-2279-4a93-8f57-1c7b161d2ba3", "DetectTime": "2023-10-30T13:59:45.110556+02:00", "EventTime": "2023-10-30T13:59:45.110580+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T03:55:48.709477+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2023/10/30 13:59:45.186775)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d3a569e9-d345-4fc5-9c76-5685a96d7a25", "DetectTime": "2023-10-30T13:59:45.194365+02:00", "EventTime": "2023-10-30T13:59:45.194388+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3Dm2d47Tx8sdqFIGi"]} -{"Format": "IDEA0", "ID": "fb7e44a2-5b4f-430c-af1a-deabc260da98", "DetectTime": "2023-10-30T13:59:45.209521+02:00", "EventTime": "2023-10-30T13:59:45.209541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C46Gvf3U713jr3KI15"]} -{"Format": "IDEA0", "ID": "d7620cb1-a166-41c1-9a7c-679572cffb83", "DetectTime": "2023-10-30T13:59:45.253126+02:00", "EventTime": "2023-10-30T13:59:45.253151+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmkWJl3D6YZtM6eXGi"]} -{"Format": "IDEA0", "ID": "65943e05-7f64-4cc1-a5f5-83b5342d5856", "DetectTime": "2023-10-30T13:59:45.267884+02:00", "EventTime": "2023-10-30T13:59:45.267909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CNSmij4N21PyrNCJ04"]} -{"Format": "IDEA0", "ID": "9528b9ea-7657-4e61-8b41-730bebfb2086", "DetectTime": "2023-10-30T13:59:45.303689+02:00", "EventTime": "2023-10-30T13:59:45.303708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CswkLXgkwUjxQuP7e"]} -{"Format": "IDEA0", "ID": "8e006a2d-243a-4236-a4ad-a08f58c85e1f", "DetectTime": "2023-10-30T13:59:45.340717+02:00", "EventTime": "2023-10-30T13:59:45.340729+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ct4W0ko3qrunJpwg2"]} -{"Format": "IDEA0", "ID": "3efc16a7-7cbc-4f2a-90c6-a7155340f22f", "DetectTime": "2023-10-30T13:59:45.353436+02:00", "EventTime": "2023-10-30T13:59:45.353467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CrWWbA4lKLGAxgdxAd"]} -{"Format": "IDEA0", "ID": "d2e7951c-587d-4e61-a7a7-f5e3cd7fa70d", "DetectTime": "2023-10-30T13:59:45.390660+02:00", "EventTime": "2023-10-30T13:59:45.390892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CuhAUCSGM4dSwgo59"]} -{"Format": "IDEA0", "ID": "878436b5-85a6-4b5a-835c-eba9af126da3", "DetectTime": "2023-10-30T13:59:45.432155+02:00", "EventTime": "2023-10-30T13:59:45.432177+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Co2rzes7BXP2kalgk"]} -{"Format": "IDEA0", "ID": "3343e454-82f0-4e7d-bed7-fbc2f047f10d", "DetectTime": "2023-10-30T13:59:45.447218+02:00", "EventTime": "2023-10-30T13:59:45.447238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CaPrdB1PwnjNkzEdc1"]} -{"Format": "IDEA0", "ID": "7a2a3c7a-5364-445b-b94e-8c746158436b", "DetectTime": "2023-10-30T13:59:45.485242+02:00", "EventTime": "2023-10-30T13:59:45.485268+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1iEJs18pzG9Br9WYe"]} -{"Format": "IDEA0", "ID": "9f7d66fd-e05a-47aa-aa42-adff9018a628", "DetectTime": "2023-10-30T13:59:45.500683+02:00", "EventTime": "2023-10-30T13:59:45.500703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CWgJJC2TmTYIF2DsU6"]} -{"Format": "IDEA0", "ID": "4b05e3e1-b60c-4230-b547-f2c0d45dc5d6", "DetectTime": "2023-10-30T13:59:45.537468+02:00", "EventTime": "2023-10-30T13:59:45.537493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["C1yIEf1urk10vRYcBj"]} -{"Format": "Json", "ID": "4b05e3e1-b60c-4230-b547-f2c0d45dc5d6", "DetectTime": "2023-10-30T13:59:45.537468+02:00", "EventTime": "2023-10-30T13:59:45.537493+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T03:56:24.165325+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2023/10/30 13:59:45.609516)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "13cf09d8-608c-48bc-baa2-997d9fb6173f", "DetectTime": "2023-10-30T13:59:45.616933+02:00", "EventTime": "2023-10-30T13:59:45.616958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CQTEBk44hjHyN4f4Ca"]} -{"Format": "IDEA0", "ID": "c9c85a5c-c257-40bb-875e-13a3f8e8ce0e", "DetectTime": "2023-10-30T13:59:45.657784+02:00", "EventTime": "2023-10-30T13:59:45.657806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CjyEkR3RcUEVBSn83"]} -{"Format": "IDEA0", "ID": "b63dcd37-ab51-4fbb-b799-b442a2c101a6", "DetectTime": "2023-10-30T13:59:45.695633+02:00", "EventTime": "2023-10-30T13:59:45.695651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["Czr5Hi10oTAUPYw9he"]} -{"Format": "IDEA0", "ID": "ad2f8e0a-c675-4dce-b86d-5a4056cefa69", "DetectTime": "2023-10-30T13:59:45.730939+02:00", "EventTime": "2023-10-30T13:59:45.730954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CHSNp92Cmi6Orm1dRi"]} -{"Format": "IDEA0", "ID": "c3c29ebe-cd56-4194-9dcc-b68ea739fdba", "DetectTime": "2023-10-30T13:59:45.773497+02:00", "EventTime": "2023-10-30T13:59:45.773523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CUbjk21IEMAh3CXBf3"]} -{"Format": "IDEA0", "ID": "47ea8463-e132-4a80-b350-649f241b1599", "DetectTime": "2023-10-30T13:59:45.814440+02:00", "EventTime": "2023-10-30T13:59:45.814464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CRJwgsWoWeSzzEp32"]} -{"Format": "IDEA0", "ID": "13616b52-f45c-4639-85fc-a7d91001b368", "DetectTime": "2023-10-30T13:59:45.855011+02:00", "EventTime": "2023-10-30T13:59:45.855038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CNVouiTl60cofpP22"]} -{"Format": "IDEA0", "ID": "fa84fc44-3ac7-45c3-b63b-262d71a5ac57", "DetectTime": "2023-10-30T13:59:45.894382+02:00", "EventTime": "2023-10-30T13:59:45.894402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["Cct2yB1ohRneI6Z4Vl"]} -{"Format": "Json", "ID": "fa84fc44-3ac7-45c3-b63b-262d71a5ac57", "DetectTime": "2023-10-30T13:59:45.894382+02:00", "EventTime": "2023-10-30T13:59:45.894402+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T03:56:43.846877+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2023/10/30 13:59:45.975825)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "21647e0b-3ece-4501-9de6-059f470009ef", "DetectTime": "2023-10-30T13:59:45.981592+02:00", "EventTime": "2023-10-30T13:59:45.981610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["C4LBpl3C5bSDsBfec"]} -{"Format": "IDEA0", "ID": "48b14147-3850-4ae8-b338-e329a0f5ed73", "DetectTime": "2023-10-30T13:59:46.020158+02:00", "EventTime": "2023-10-30T13:59:46.020182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CmtHWk2aouyKtJlNLe"]} -{"Format": "IDEA0", "ID": "10f13604-2d0d-4e8c-9178-5851df294c98", "DetectTime": "2023-10-30T13:59:46.062628+02:00", "EventTime": "2023-10-30T13:59:46.062648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiOwaw2zlWfRT5LUCf"]} -{"Format": "IDEA0", "ID": "10f01bf1-edf0-484c-ac71-c0a16e0a0e4e", "DetectTime": "2023-10-30T13:59:46.095188+02:00", "EventTime": "2023-10-30T13:59:46.095211+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6MwV83QyVMXLPjEcl"]} -{"Format": "IDEA0", "ID": "46cfc8b3-a99c-4f73-a2e4-b9c485a3abd0", "DetectTime": "2023-10-30T13:59:46.111334+02:00", "EventTime": "2023-10-30T13:59:46.111352+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"Hostname": ["dns.msftncsi.com"]}], "Attach": [{"Content": "domain dns.msftncsi.com resolved with no connection", "ContentType": "text/plain"}], "uids": ["CgI3DMWfuSPkmzroj"]} -{"Format": "IDEA0", "ID": "0ae9073f-a121-438a-9cfd-3dbbfcd29c7d", "DetectTime": "2023-10-30T13:59:46.128515+02:00", "EventTime": "2023-10-30T13:59:46.128618+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"Hostname": ["dns.msftncsi.com"]}], "Attach": [{"Content": "domain dns.msftncsi.com resolved with no connection", "ContentType": "text/plain"}], "uids": ["CF8zjpBrYi5hGOsIe"]} -{"Format": "IDEA0", "ID": "6ebe5b81-3ed8-42ad-9d68-5ea86cac9c21", "DetectTime": "2023-10-30T13:59:46.145971+02:00", "EventTime": "2023-10-30T13:59:46.145994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cf12X1r56kPtNdhA", "Ct4W0ko3qrunJpwg2", "C3Dm2d47Tx8sdqFIGi", "C1iEJs18pzG9Br9WYe"]} -{"Format": "IDEA0", "ID": "3bfc65e0-ebcd-4c5d-ab7e-b6ecedcc900f", "DetectTime": "2023-10-30T13:59:46.162139+02:00", "EventTime": "2023-10-30T13:59:46.162161+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cf12X1r56kPtNdhA"]} -{"Format": "IDEA0", "ID": "8ef444a7-c99b-4d1b-bdfe-a7ad56b4bc41", "DetectTime": "2023-10-30T13:59:46.179088+02:00", "EventTime": "2023-10-30T13:59:46.179109+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkaMhO1vRCqThE9QLa"]} -{"Format": "IDEA0", "ID": "7e5d9aa2-5994-4087-991c-e26abc99837b", "DetectTime": "2023-10-30T13:59:46.196288+02:00", "EventTime": "2023-10-30T13:59:46.196307+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cx6M7UoXOJCwljUka"]} -{"Format": "IDEA0", "ID": "e07c0ce4-5cf8-4c79-8b5c-a518862d4906", "DetectTime": "2023-10-30T13:59:46.211956+02:00", "EventTime": "2023-10-30T13:59:46.211983+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Clo5NZ24aqruCl1cp"]} -{"Format": "IDEA0", "ID": "cb41fff3-6225-4d5c-ad61-01b76bae234c", "DetectTime": "2023-10-30T13:59:46.229055+02:00", "EventTime": "2023-10-30T13:59:46.229082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15180], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. ", "ContentType": "text/plain"}], "uids": ["CozVfL2rZ3Lo1Bmc07"]} -{"Format": "IDEA0", "ID": "9522b094-ae37-41be-a154-e9000e7c4e09", "DetectTime": "2023-10-30T13:59:46.252813+02:00", "EventTime": "2023-10-30T13:59:46.252837+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5Gu1x25agZcBekeo7"]} -{"Format": "IDEA0", "ID": "a09ce02c-04f1-4c22-9b8d-0c3a6053136b", "DetectTime": "2023-10-30T13:59:46.269316+02:00", "EventTime": "2023-10-30T13:59:46.269332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN3oUj3fGftszONeSg"]} -{"Format": "IDEA0", "ID": "7cde9bc5-3f79-4781-aa33-ecb1a3a358ac", "DetectTime": "2023-10-30T13:59:46.313077+02:00", "EventTime": "2023-10-30T13:59:46.313098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CL0R7o4TdFHYz90xC7"]} -{"Format": "IDEA0", "ID": "5bfc9423-8dc3-4442-9cec-22fe2458efcc", "DetectTime": "2023-10-30T13:59:46.342542+02:00", "EventTime": "2023-10-30T13:59:46.342573+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFJK5P3xCX7Lajp098"]} -{"Format": "IDEA0", "ID": "8cf321f9-8596-4c8c-bec9-29219a4145af", "DetectTime": "2023-10-30T13:59:46.357050+02:00", "EventTime": "2023-10-30T13:59:46.357069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.162.252.216 ", "ContentType": "text/plain"}], "uids": ["Cq2DtnQsfFKKtyagk"]} -{"Format": "IDEA0", "ID": "0f9eaac1-36d2-450f-bbf1-fefc00fd80ef", "DetectTime": "2023-10-30T13:59:46.400944+02:00", "EventTime": "2023-10-30T13:59:46.400969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CZN2ue1xiVTbNL2ofi"]} -{"Format": "IDEA0", "ID": "c4fb54d9-4f7c-4023-9cf9-e254c70d6513", "DetectTime": "2023-10-30T13:59:46.427747+02:00", "EventTime": "2023-10-30T13:59:46.427767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.240.106 ", "ContentType": "text/plain"}], "uids": ["COI1vb434WTUeiI712"]} -{"Format": "IDEA0", "ID": "5c8b1887-15e8-4ba0-803c-3d98c9937b8b", "DetectTime": "2023-10-30T13:59:46.477159+02:00", "EventTime": "2023-10-30T13:59:46.477183+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQBYamQLofKbQ4zy2"]} -{"Format": "IDEA0", "ID": "fc73b399-9319-4da5-beae-a071f42c307c", "DetectTime": "2023-10-30T13:59:46.492751+02:00", "EventTime": "2023-10-30T13:59:46.492773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["CKSt5A2mbgp3N1X67d"]} -{"Format": "IDEA0", "ID": "f48a6ebd-e7a3-4ec6-bc4d-558ce1967434", "DetectTime": "2023-10-30T13:59:46.516349+02:00", "EventTime": "2023-10-30T13:59:46.516372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["CiLbXX2AFhPnjXl9E4"]} -{"Format": "IDEA0", "ID": "4eeb4281-cd91-4d56-a6fe-fcb7e680c1b4", "DetectTime": "2023-10-30T13:59:46.553029+02:00", "EventTime": "2023-10-30T13:59:46.553056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CjTO3q1t1GJ8BCas3"]} -{"Format": "IDEA0", "ID": "d9232fad-9572-4152-9279-87f536e939cc", "DetectTime": "2023-10-30T13:59:46.578120+02:00", "EventTime": "2023-10-30T13:59:46.578142+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1uTp5YFP8EUbabW8"]} -{"Format": "IDEA0", "ID": "2ca4049e-52c0-473e-9cfc-1de8534e000c", "DetectTime": "2023-10-30T13:59:46.593749+02:00", "EventTime": "2023-10-30T13:59:46.593777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CpwUng3lFUnAcTYBO7"]} -{"Format": "Json", "ID": "2ca4049e-52c0-473e-9cfc-1de8534e000c", "DetectTime": "2023-10-30T13:59:46.593749+02:00", "EventTime": "2023-10-30T13:59:46.593777+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T04:28:56.832258+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2023/10/30 13:59:46.677943)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86b09b5c-957d-4fa5-b9b5-2627b777761a", "DetectTime": "2023-10-30T13:59:46.685213+02:00", "EventTime": "2023-10-30T13:59:46.685230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5Gu1x25agZcBekeo7", "Cx7lf63OAYnQH6GlG", "CQBYamQLofKbQ4zy2", "Cx6M7UoXOJCwljUka"]} -{"Format": "IDEA0", "ID": "9f9da6f1-8303-481b-8ac6-255e10a9e60c", "DetectTime": "2023-10-30T13:59:46.703079+02:00", "EventTime": "2023-10-30T13:59:46.703099+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cx7lf63OAYnQH6GlG"]} -{"Format": "IDEA0", "ID": "7b90fdfc-7e1b-4099-a136-acb80f098e18", "DetectTime": "2023-10-30T13:59:46.717996+02:00", "EventTime": "2023-10-30T13:59:46.718022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["Cw9I6N335vZnxodPX9"]} -{"Format": "IDEA0", "ID": "1daff1f7-e712-4878-9838-5a62e8ca248e", "DetectTime": "2023-10-30T13:59:46.758646+02:00", "EventTime": "2023-10-30T13:59:46.758671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cc6k0d3CZybhtYU9U3"]} -{"Format": "IDEA0", "ID": "5d5c8be0-d5bf-4a96-8099-7c5e1d44b045", "DetectTime": "2023-10-30T13:59:46.772196+02:00", "EventTime": "2023-10-30T13:59:46.772213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CPuG574FJtjszx3QKj"]} -{"Format": "IDEA0", "ID": "59b743e5-a9ce-4344-9e13-73c0df85a073", "DetectTime": "2023-10-30T13:59:46.791451+02:00", "EventTime": "2023-10-30T13:59:46.791473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["C1OzG04B469eaUZfei"]} -{"Format": "IDEA0", "ID": "45fd0c0f-6aa7-4be2-92f0-be7bb7869c2c", "DetectTime": "2023-10-30T13:59:46.828673+02:00", "EventTime": "2023-10-30T13:59:46.828694+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CC796J2DoKY8y1vD8d"]} -{"Format": "IDEA0", "ID": "06491dd0-e82d-4cab-ad7c-0b0974346030", "DetectTime": "2023-10-30T13:59:46.845737+02:00", "EventTime": "2023-10-30T13:59:46.845765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CL9tiE2crtngECN8P6"]} -{"Format": "IDEA0", "ID": "f6c88200-9951-4766-aa38-cf2e844a39bd", "DetectTime": "2023-10-30T13:59:46.864783+02:00", "EventTime": "2023-10-30T13:59:46.864799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CI5LQE2aGGfU21pd45"]} -{"Format": "IDEA0", "ID": "583a49a9-cc5b-4963-bc79-d22e72c88059", "DetectTime": "2023-10-30T13:59:46.902892+02:00", "EventTime": "2023-10-30T13:59:46.902920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CUAn0GgTHLkf0uab"]} -{"Format": "IDEA0", "ID": "1adc6caa-a4e2-440b-883c-f78033322bb6", "DetectTime": "2023-10-30T13:59:46.939625+02:00", "EventTime": "2023-10-30T13:59:46.939650+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNHKgu3itTjD93tBe7"]} -{"Format": "IDEA0", "ID": "9f059cfd-60ac-4dd0-a6f0-9fbc81d459b8", "DetectTime": "2023-10-30T13:59:46.954181+02:00", "EventTime": "2023-10-30T13:59:46.954210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CYG4wc1kUQMXujzdfj"]} -{"Format": "IDEA0", "ID": "24c7a185-7e20-4570-bf7b-39ae2ce8aef3", "DetectTime": "2023-10-30T13:59:46.974986+02:00", "EventTime": "2023-10-30T13:59:46.975010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CywPhE4JRkk0jtGNI3"]} -{"Format": "IDEA0", "ID": "554256e7-8819-458f-b658-3a3b278ba706", "DetectTime": "2023-10-30T13:59:47.013049+02:00", "EventTime": "2023-10-30T13:59:47.013074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C2QWkB4uLIpYRnZTS8"]} -{"Format": "IDEA0", "ID": "288c14ab-b6bf-4286-acac-6df653638810", "DetectTime": "2023-10-30T13:59:47.048222+02:00", "EventTime": "2023-10-30T13:59:47.048241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CpxaDr1mLzcf8tvoF5"]} -{"Format": "IDEA0", "ID": "0e0b4aef-ccbf-44e2-9d89-d217c5833a5b", "DetectTime": "2023-10-30T13:59:47.090890+02:00", "EventTime": "2023-10-30T13:59:47.090911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CvAX071xpC9nLHCmbe"]} -{"Format": "IDEA0", "ID": "6dce9b92-2928-460f-8fa4-36b19a9f8858", "DetectTime": "2023-10-30T13:59:47.128056+02:00", "EventTime": "2023-10-30T13:59:47.128079+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWKIe41ADo7Bdf2UA2"]} -{"Format": "IDEA0", "ID": "d016f0f2-2265-4f6d-b26f-cf3d62aab1a6", "DetectTime": "2023-10-30T13:59:47.142617+02:00", "EventTime": "2023-10-30T13:59:47.142637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CLeVLZ1Yeax9FQq5f3"]} -{"Format": "IDEA0", "ID": "100fb322-97d2-4e00-bc81-5fcab78d44ee", "DetectTime": "2023-10-30T13:59:47.187373+02:00", "EventTime": "2023-10-30T13:59:47.187424+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMBzaC3SZLEhPOhFw3"]} -{"Format": "IDEA0", "ID": "86d4abaf-93bc-417f-b59e-0045ef76d7fb", "DetectTime": "2023-10-30T13:59:47.203509+02:00", "EventTime": "2023-10-30T13:59:47.203522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["C5QdTud6i9K9Joxz4"]} -{"Format": "IDEA0", "ID": "f4e6bb15-ec4b-45c2-a629-1b7927c2c7d7", "DetectTime": "2023-10-30T13:59:47.238810+02:00", "EventTime": "2023-10-30T13:59:47.238836+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cimxzl3UC2Y2v4CaWi"]} -{"Format": "IDEA0", "ID": "be7f8bc1-6bbf-4c04-b62e-f37b075afed8", "DetectTime": "2023-10-30T13:59:47.253817+02:00", "EventTime": "2023-10-30T13:59:47.253842+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCXRXlwhaSylRH0ri"]} -{"Format": "IDEA0", "ID": "e5d00c07-c83f-476e-98cb-f0a96ada9721", "DetectTime": "2023-10-30T13:59:47.268842+02:00", "EventTime": "2023-10-30T13:59:47.268860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["ChTmGs1ANCScn628ra"]} -{"Format": "IDEA0", "ID": "4834bead-d6dd-4428-9e09-b46008e9cfe0", "DetectTime": "2023-10-30T13:59:47.305651+02:00", "EventTime": "2023-10-30T13:59:47.305687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CPdCym2V8fTzPVLmc4"]} -{"Format": "IDEA0", "ID": "9cde1eed-6d9f-448c-b23e-ab19441b6309", "DetectTime": "2023-10-30T13:59:47.327957+02:00", "EventTime": "2023-10-30T13:59:47.327978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CWKIe41ADo7Bdf2UA2", "Cimxzl3UC2Y2v4CaWi", "CC796J2DoKY8y1vD8d", "CCK03O3JZbqU4bGCf5"]} -{"Format": "IDEA0", "ID": "51abab9c-892d-4495-9c53-97395f363c2d", "DetectTime": "2023-10-30T13:59:47.341174+02:00", "EventTime": "2023-10-30T13:59:47.341200+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCK03O3JZbqU4bGCf5"]} -{"Format": "IDEA0", "ID": "693843b3-d667-4893-bc64-2e2f15bb3a26", "DetectTime": "2023-10-30T13:59:47.355814+02:00", "EventTime": "2023-10-30T13:59:47.355860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CZ6wAzeFVc0XUepfa"]} -{"Format": "IDEA0", "ID": "e69c0cb8-dcaa-4d29-87e6-a682ebc4e578", "DetectTime": "2023-10-30T13:59:47.395643+02:00", "EventTime": "2023-10-30T13:59:47.395668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CfT1mZCIUqSeaMp9l"]} -{"Format": "IDEA0", "ID": "029b0401-9da6-42ba-a376-3c469bdea864", "DetectTime": "2023-10-30T13:59:47.441172+02:00", "EventTime": "2023-10-30T13:59:47.441199+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPmmcF4s3eOTNY41de"]} -{"Format": "IDEA0", "ID": "c9fb2345-1f39-4992-8481-de12abd4cc9d", "DetectTime": "2023-10-30T13:59:47.454915+02:00", "EventTime": "2023-10-30T13:59:47.454939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["Cet43C3Q2qFIx5ewE"]} -{"Format": "IDEA0", "ID": "6d8725e9-79e7-463d-9d8f-18cf61081e94", "DetectTime": "2023-10-30T13:59:47.494383+02:00", "EventTime": "2023-10-30T13:59:47.494404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["Cpw1NQ1k9bZ1KfqcUi"]} -{"Format": "IDEA0", "ID": "7535875d-8c71-4c6f-ab50-4e0112ca88ca", "DetectTime": "2023-10-30T13:59:47.534362+02:00", "EventTime": "2023-10-30T13:59:47.534386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CpBhNX2inMhW3Yuah7"]} -{"Format": "IDEA0", "ID": "e7460ca0-67ba-411f-9164-9d3d6a5dc23f", "DetectTime": "2023-10-30T13:59:47.571701+02:00", "EventTime": "2023-10-30T13:59:47.571721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CItrwA1PnkncXDVazi"]} -{"Format": "IDEA0", "ID": "ad645d4e-e377-4b37-9e55-0091d063992e", "DetectTime": "2023-10-30T13:59:47.609195+02:00", "EventTime": "2023-10-30T13:59:47.609216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CPusxY1xbAgYAFqFsc"]} -{"Format": "IDEA0", "ID": "4819fcdb-b769-463b-8fdc-818a9171285c", "DetectTime": "2023-10-30T13:59:47.628270+02:00", "EventTime": "2023-10-30T13:59:47.628290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CpItsu1modY7wlG2R5"]} -{"Format": "IDEA0", "ID": "52223bce-8450-40c2-8ed0-4e31edfa246d", "DetectTime": "2023-10-30T13:59:47.662377+02:00", "EventTime": "2023-10-30T13:59:47.662408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["C9KPvH8ynVbVnSyhj"]} -{"Format": "IDEA0", "ID": "e506c83d-0fe8-427f-b8cd-5203a8c66a35", "DetectTime": "2023-10-30T13:59:47.702010+02:00", "EventTime": "2023-10-30T13:59:47.702037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["C9j5ozAWn2NzUToC7"]} -{"Format": "IDEA0", "ID": "2dffff61-533f-423b-bc62-4d3288af1808", "DetectTime": "2023-10-30T13:59:47.740527+02:00", "EventTime": "2023-10-30T13:59:47.740690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CIjXUP24Dy8kg5Jrf3"]} -{"Format": "IDEA0", "ID": "ffc939c8-ddf0-4248-a99f-fa21a60cc6b6", "DetectTime": "2023-10-30T13:59:47.776261+02:00", "EventTime": "2023-10-30T13:59:47.776284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.55.163 ", "ContentType": "text/plain"}], "uids": ["CVrDsc4wN6Y6sLXyt"]} -{"Format": "IDEA0", "ID": "d405466f-cbb4-4d69-a473-664a7b26a8dc", "DetectTime": "2023-10-30T13:59:47.814299+02:00", "EventTime": "2023-10-30T13:59:47.814321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CCzusx19QJIGEcnr8a"]} -{"Format": "IDEA0", "ID": "38fd5716-6bef-4310-add2-aa546a39c7c0", "DetectTime": "2023-10-30T13:59:47.853894+02:00", "EventTime": "2023-10-30T13:59:47.853920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["Cn3XVF1lnD8zikvXee"]} -{"Format": "IDEA0", "ID": "028ffdb8-4e30-46c3-a5ba-828da81b71b0", "DetectTime": "2023-10-30T13:59:47.891892+02:00", "EventTime": "2023-10-30T13:59:47.891914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["C5zOy2AJsYgOOgGs6"]} -{"Format": "IDEA0", "ID": "98924cc6-afdd-445d-bdbd-70c72ab1135d", "DetectTime": "2023-10-30T13:59:47.929501+02:00", "EventTime": "2023-10-30T13:59:47.929516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CaDKvq4AEGFY2fD3sg"]} -{"Format": "IDEA0", "ID": "eaf4380a-ddf1-4f72-9d5e-1143f93caf4f", "DetectTime": "2023-10-30T13:59:47.967920+02:00", "EventTime": "2023-10-30T13:59:47.967981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["Cj4ZkXs88tPu8xZif"]} -{"Format": "IDEA0", "ID": "43a641d0-4968-4d8a-b0bc-20c924086933", "DetectTime": "2023-10-30T13:59:48.004241+02:00", "EventTime": "2023-10-30T13:59:48.004256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CEFZha1VvLP4N7s1o2"]} -{"Format": "IDEA0", "ID": "72eb4954-88c6-414a-9dc0-549fbb2408ec", "DetectTime": "2023-10-30T13:59:48.046881+02:00", "EventTime": "2023-10-30T13:59:48.046907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["CiB3AAxYrXoZP86l1"]} -{"Format": "IDEA0", "ID": "1d30f8f0-a0f1-44c4-aec9-1ba331db69af", "DetectTime": "2023-10-30T13:59:48.085835+02:00", "EventTime": "2023-10-30T13:59:48.085852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CflAjc4rIHXQmei9zc"]} -{"Format": "IDEA0", "ID": "0f6a8c02-3342-4def-88a0-f4b9c17fe5b7", "DetectTime": "2023-10-30T13:59:48.124544+02:00", "EventTime": "2023-10-30T13:59:48.124566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CeFGYq1nOICkwHj0J5"]} -{"Format": "IDEA0", "ID": "b3e73b48-33ba-427d-a6e9-dd947f00f5a5", "DetectTime": "2023-10-30T13:59:48.145203+02:00", "EventTime": "2023-10-30T13:59:48.145229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.58.25 ", "ContentType": "text/plain"}], "uids": ["CT6DUh4oZ8czya3OY"]} -{"Format": "IDEA0", "ID": "47a2b83b-1219-4c14-91af-3bd342b376b5", "DetectTime": "2023-10-30T13:59:48.187171+02:00", "EventTime": "2023-10-30T13:59:48.187192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["C20Bh73ptaP4q1OGj"]} -{"Format": "IDEA0", "ID": "68a61ad9-19f2-47d2-9299-c68b11796a4a", "DetectTime": "2023-10-30T13:59:48.229331+02:00", "EventTime": "2023-10-30T13:59:48.229352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CvmOBY1WBAxXYBLdV5"]} -{"Format": "IDEA0", "ID": "2696a7e9-0d1a-40bb-9b4a-209c0d5f770a", "DetectTime": "2023-10-30T13:59:48.266464+02:00", "EventTime": "2023-10-30T13:59:48.266477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CE84uvZcwRkBMfACh"]} -{"Format": "IDEA0", "ID": "bd445709-8964-4026-9f2c-f8c4fdff4fbf", "DetectTime": "2023-10-30T13:59:48.304393+02:00", "EventTime": "2023-10-30T13:59:48.304413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["CyBe5u190BziSM9Qoj"]} -{"Format": "IDEA0", "ID": "f82d6e89-7718-48c6-8717-38974d751f47", "DetectTime": "2023-10-30T13:59:48.342078+02:00", "EventTime": "2023-10-30T13:59:48.342124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["Ca9ZXGYL2FU5Wydc"]} -{"Format": "IDEA0", "ID": "65c5a623-3a32-44f9-8421-105f97236b24", "DetectTime": "2023-10-30T13:59:48.379016+02:00", "EventTime": "2023-10-30T13:59:48.379041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CCPAYp4iLy96QBTGMi"]} -{"Format": "IDEA0", "ID": "ba29c863-8f1f-4a50-a01f-a1041b98b460", "DetectTime": "2023-10-30T13:59:48.417795+02:00", "EventTime": "2023-10-30T13:59:48.417821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CAjSvI3k0AGzhBL4I"]} -{"Format": "IDEA0", "ID": "1b204503-badf-454f-981a-96fa7e6a28c0", "DetectTime": "2023-10-30T13:59:48.458354+02:00", "EventTime": "2023-10-30T13:59:48.458375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CBimDI3AN1TJAfnlM1"]} -{"Format": "IDEA0", "ID": "e7fdc5f0-10b0-42ee-8aa4-c33f676e5eb6", "DetectTime": "2023-10-30T13:59:48.501436+02:00", "EventTime": "2023-10-30T13:59:48.501457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["C2ylYQ3rsza25lrzpi"]} -{"Format": "IDEA0", "ID": "98fc65ed-98ee-445c-a86f-02add28dcae8", "DetectTime": "2023-10-30T13:59:48.526260+02:00", "EventTime": "2023-10-30T13:59:48.526278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["Cp4FGy24v7jTghbyg8"]} -{"Format": "IDEA0", "ID": "2a341831-e755-4947-be02-3e3da1d05071", "DetectTime": "2023-10-30T13:59:48.563549+02:00", "EventTime": "2023-10-30T13:59:48.563575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CHbGl73oXDrrdLvuFi"]} -{"Format": "IDEA0", "ID": "46c34d62-012f-4139-b648-f5c82a60a887", "DetectTime": "2023-10-30T13:59:48.605820+02:00", "EventTime": "2023-10-30T13:59:48.605838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["CvqMFe3XVyInR7FV8b"]} -{"Format": "IDEA0", "ID": "2c0c9a35-1a1d-41fa-bc5a-cb2024562358", "DetectTime": "2023-10-30T13:59:48.646491+02:00", "EventTime": "2023-10-30T13:59:48.646513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.58.25 ", "ContentType": "text/plain"}], "uids": ["CLXeBF3OItNdw1J1g7"]} -{"Format": "IDEA0", "ID": "49fc33a7-159b-4c18-bce3-95dad5348a4c", "DetectTime": "2023-10-30T13:59:48.692360+02:00", "EventTime": "2023-10-30T13:59:48.692386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CzLdf91g9GQALHm03e"]} -{"Format": "IDEA0", "ID": "8380a50f-c55e-456d-bf61-4320df61f94f", "DetectTime": "2023-10-30T13:59:48.735559+02:00", "EventTime": "2023-10-30T13:59:48.735581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.6.55.163 ", "ContentType": "text/plain"}], "uids": ["CSfiZB3qiHaYHvXm78"]} -{"Format": "IDEA0", "ID": "4efce678-9db4-4250-b072-a631e9fcee23", "DetectTime": "2023-10-30T13:59:48.770750+02:00", "EventTime": "2023-10-30T13:59:48.770766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C64ZbW2nSnmO3nd7Yg"]} -{"Format": "IDEA0", "ID": "170a20e7-0fa3-4d75-aae1-24bcc5a7686d", "DetectTime": "2023-10-30T13:59:48.809481+02:00", "EventTime": "2023-10-30T13:59:48.809496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["C2vsbp1qGW775cQzMf"]} -{"Format": "IDEA0", "ID": "544cbefc-c0e3-4786-ada8-755dfa5934fc", "DetectTime": "2023-10-30T13:59:48.850253+02:00", "EventTime": "2023-10-30T13:59:48.850274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CDCH3q4nQqNBPm0Sdl"]} -{"Format": "IDEA0", "ID": "4276ad42-000f-463d-b4a1-d5a05051b040", "DetectTime": "2023-10-30T13:59:48.888039+02:00", "EventTime": "2023-10-30T13:59:48.888059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["CPzjc91kq7OnuvnSW3"]} -{"Format": "IDEA0", "ID": "3de2e898-2756-4f80-964e-9672b534136b", "DetectTime": "2023-10-30T13:59:48.934117+02:00", "EventTime": "2023-10-30T13:59:48.934406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CgmVRf5JckTBVZum4"]} -{"Format": "IDEA0", "ID": "e30113b3-ec08-442a-9475-b175db005497", "DetectTime": "2023-10-30T13:59:48.991878+02:00", "EventTime": "2023-10-30T13:59:48.991896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["C6Gytl2yKuCzYslN05"]} -{"Format": "IDEA0", "ID": "f6f9add4-aba8-4c07-a105-6cbbc49d40cc", "DetectTime": "2023-10-30T13:59:49.042287+02:00", "EventTime": "2023-10-30T13:59:49.042313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CEurmv4xeA3V39iGKf"]} -{"Format": "IDEA0", "ID": "998d4a2e-0c06-4bf3-b660-0d8564e8ae44", "DetectTime": "2023-10-30T13:59:49.090808+02:00", "EventTime": "2023-10-30T13:59:49.091126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["CzZwrt4tntqn6vAFf9"]} -{"Format": "Json", "ID": "998d4a2e-0c06-4bf3-b660-0d8564e8ae44", "DetectTime": "2023-10-30T13:59:49.090808+02:00", "EventTime": "2023-10-30T13:59:49.091126+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T04:28:58.463695+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2023/10/30 13:59:49.182672)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e4424de1-5b9e-4b36-a776-4a2ff0e46c8c", "DetectTime": "2023-10-30T13:59:49.195222+02:00", "EventTime": "2023-10-30T13:59:49.195254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CioTvlwOYVjJ2Mw06"]} -{"Format": "IDEA0", "ID": "d8c39b67-b7fd-47c5-a270-50d3d8f9ff6e", "DetectTime": "2023-10-30T13:59:49.248158+02:00", "EventTime": "2023-10-30T13:59:49.248185+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDKuwj2iJyhRNE0M71"]} -{"Format": "IDEA0", "ID": "418b661c-2a40-4a0c-927c-c24b2f7cdc15", "DetectTime": "2023-10-30T13:59:49.264782+02:00", "EventTime": "2023-10-30T13:59:49.264802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["CYIEvpnkzNrXbqMLl"]} -{"Format": "IDEA0", "ID": "29ba0472-25ec-433a-a470-d3cc6fb9bf4d", "DetectTime": "2023-10-30T13:59:49.302795+02:00", "EventTime": "2023-10-30T13:59:49.302818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CNBRfk2hQ8wOvmrlPf"]} -{"Format": "IDEA0", "ID": "f3ff4b07-cc05-4ae2-b0f8-c59c704262d0", "DetectTime": "2023-10-30T13:59:49.346114+02:00", "EventTime": "2023-10-30T13:59:49.346134+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTpXe33zYgOFHQTe61"]} -{"Format": "IDEA0", "ID": "d1539b6e-30f9-4ce2-b1e8-d8a112f6575d", "DetectTime": "2023-10-30T13:59:49.360516+02:00", "EventTime": "2023-10-30T13:59:49.360536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6sYjc3deYrWQrtd05"]} -{"Format": "IDEA0", "ID": "e07509e6-3478-4aaf-b361-7ed29f9da97d", "DetectTime": "2023-10-30T13:59:49.375249+02:00", "EventTime": "2023-10-30T13:59:49.375267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Caiaxv4ImVoM6KcXB8"]} -{"Format": "IDEA0", "ID": "704f41ad-6d06-4a54-8810-df3275137c68", "DetectTime": "2023-10-30T13:59:49.410931+02:00", "EventTime": "2023-10-30T13:59:49.410952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CU0oIp1iyhSvsWjjtj"]} -{"Format": "IDEA0", "ID": "f841ea7f-59fb-40ee-8f72-d2dacd48ada6", "DetectTime": "2023-10-30T13:59:49.444743+02:00", "EventTime": "2023-10-30T13:59:49.444765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CUWswY29Sups2OyiI"]} -{"Format": "IDEA0", "ID": "44950702-cad8-45e6-9f73-4a7c6bb35170", "DetectTime": "2023-10-30T13:59:49.479880+02:00", "EventTime": "2023-10-30T13:59:49.479904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["C9hyVi4nkcCQ1yEwhc"]} -{"Format": "IDEA0", "ID": "d2edcdec-87e7-4b6c-a729-28f3fcf13bf5", "DetectTime": "2023-10-30T13:59:49.521302+02:00", "EventTime": "2023-10-30T13:59:49.521321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CbIUHh3yfxQrR73395"]} -{"Format": "IDEA0", "ID": "3d73d2ba-26bf-44fd-8d51-d8c4638b28ed", "DetectTime": "2023-10-30T13:59:49.560031+02:00", "EventTime": "2023-10-30T13:59:49.560052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CDwxYO3WANKr4gYL34"]} -{"Format": "IDEA0", "ID": "4c03122e-36a7-46cc-b03d-727382b56f34", "DetectTime": "2023-10-30T13:59:49.595851+02:00", "EventTime": "2023-10-30T13:59:49.595869+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSjnA32B8eIhBLOKyf"]} -{"Format": "IDEA0", "ID": "634b07c0-5c31-4442-9a45-8139f911a36f", "DetectTime": "2023-10-30T13:59:49.611066+02:00", "EventTime": "2023-10-30T13:59:49.611093+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMj7V431lmObUvy1d5"]} -{"Format": "IDEA0", "ID": "228dd28e-52a7-4f85-b5f9-42dc34e07e44", "DetectTime": "2023-10-30T13:59:49.625375+02:00", "EventTime": "2023-10-30T13:59:49.625425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CyvgrH3dGon6tHAvE7"]} -{"Format": "IDEA0", "ID": "4d0d2fb0-4622-43f3-8f8d-f94d857e746f", "DetectTime": "2023-10-30T13:59:49.657029+02:00", "EventTime": "2023-10-30T13:59:49.657046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CyQafe1Wp9aaWPGfW4"]} -{"Format": "IDEA0", "ID": "40244ae9-22c3-4153-8094-d9018536fe48", "DetectTime": "2023-10-30T13:59:49.692723+02:00", "EventTime": "2023-10-30T13:59:49.692741+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvOU7D2LY8Ohwws1Bi"]} -{"Format": "IDEA0", "ID": "27fa430c-3a1f-4ff6-9004-41395bc1d47a", "DetectTime": "2023-10-30T13:59:49.706790+02:00", "EventTime": "2023-10-30T13:59:49.706815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CPclzaiJwP3DWcQul"]} -{"Format": "IDEA0", "ID": "479cb4c9-0e30-4fef-b299-30be35d30851", "DetectTime": "2023-10-30T13:59:49.742686+02:00", "EventTime": "2023-10-30T13:59:49.742702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CnwTR6zJVt2PY2KZ8"]} -{"Format": "IDEA0", "ID": "eb6660e5-8ba1-4535-a520-b9618fc8ca69", "DetectTime": "2023-10-30T13:59:49.780447+02:00", "EventTime": "2023-10-30T13:59:49.780464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CTm3na3xju8ePW2OZ1", "CDKuwj2iJyhRNE0M71", "C6sYjc3deYrWQrtd05", "CMj7V431lmObUvy1d5"]} -{"Format": "IDEA0", "ID": "1879f18e-18f6-42e5-abd5-40e6636a8c5f", "DetectTime": "2023-10-30T13:59:49.796192+02:00", "EventTime": "2023-10-30T13:59:49.796215+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTm3na3xju8ePW2OZ1"]} -{"Format": "IDEA0", "ID": "41769930-cd37-46bf-b826-7793bce0a6df", "DetectTime": "2023-10-30T13:59:49.812896+02:00", "EventTime": "2023-10-30T13:59:49.812917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CDXLxfr8crmB1PVta"]} -{"Format": "IDEA0", "ID": "fc7fb107-b854-43b6-b0c4-fded9e8db68d", "DetectTime": "2023-10-30T13:59:49.851273+02:00", "EventTime": "2023-10-30T13:59:49.851294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CnYUPa281cbnIdhL94"]} -{"Format": "IDEA0", "ID": "45f33a31-208b-40dc-a7a5-f15e714efcfb", "DetectTime": "2023-10-30T13:59:49.888270+02:00", "EventTime": "2023-10-30T13:59:49.888287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CANKhz1iR4eBgcbOOe"]} -{"Format": "IDEA0", "ID": "1ded4c9d-a9b7-4939-976b-b0fb910e53da", "DetectTime": "2023-10-30T13:59:49.927842+02:00", "EventTime": "2023-10-30T13:59:49.927857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CqKicmr2xinGJhfxk"]} -{"Format": "IDEA0", "ID": "ba636d60-daf1-47af-85fc-8c4411c9fe85", "DetectTime": "2023-10-30T13:59:49.967479+02:00", "EventTime": "2023-10-30T13:59:49.967500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CLh2kz2INk3vhFO0R4"]} -{"Format": "IDEA0", "ID": "45e50a4b-a217-4290-be16-e8f3a369c97e", "DetectTime": "2023-10-30T13:59:50.002920+02:00", "EventTime": "2023-10-30T13:59:50.002946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CWwEphpWUJEf8toCb"]} -{"Format": "IDEA0", "ID": "23606cfa-18a8-419f-afef-4ebf6d6efb9e", "DetectTime": "2023-10-30T13:59:50.040756+02:00", "EventTime": "2023-10-30T13:59:50.040779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CGptOo4IGqarREYyra"]} -{"Format": "IDEA0", "ID": "077ba738-b594-463f-9c90-2780b800bfd7", "DetectTime": "2023-10-30T13:59:50.078272+02:00", "EventTime": "2023-10-30T13:59:50.078289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CKbTHT22kmh9Pn5Gh7"]} -{"Format": "IDEA0", "ID": "26e0a81a-2dfb-4190-8f40-cdf069120ad7", "DetectTime": "2023-10-30T13:59:50.118031+02:00", "EventTime": "2023-10-30T13:59:50.118056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["C9BYI42o8yPVOc1xw3"]} -{"Format": "IDEA0", "ID": "4a9ebe88-f6c7-4ce1-8b0c-a15d7c523e22", "DetectTime": "2023-10-30T13:59:50.156400+02:00", "EventTime": "2023-10-30T13:59:50.156425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C3TTbQ1Anvi3jjlD3g"]} -{"Format": "IDEA0", "ID": "345997f7-cfde-41d7-a4f7-2e0a7ce5a129", "DetectTime": "2023-10-30T13:59:50.191536+02:00", "EventTime": "2023-10-30T13:59:50.191600+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFnRr22FkC1DJ9QBIe"]} -{"Format": "IDEA0", "ID": "d4ba3959-f23d-4130-900d-7d4da56b4877", "DetectTime": "2023-10-30T13:59:50.208238+02:00", "EventTime": "2023-10-30T13:59:50.208266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["ChY2g44wGmQz509eKg"]} -{"Format": "IDEA0", "ID": "ba206482-0896-4baa-9154-7b83cf240931", "DetectTime": "2023-10-30T13:59:50.240383+02:00", "EventTime": "2023-10-30T13:59:50.240442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["C7kn7U5XqhhEQ1B2"]} -{"Format": "IDEA0", "ID": "20d60b32-1868-4216-b963-70930cb45bca", "DetectTime": "2023-10-30T13:59:50.273967+02:00", "EventTime": "2023-10-30T13:59:50.274111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["C33faT1Ca18WsAi7t4"]} -{"Format": "IDEA0", "ID": "3209f206-22fd-4e93-929f-6ddbd6d07813", "DetectTime": "2023-10-30T13:59:50.308891+02:00", "EventTime": "2023-10-30T13:59:50.308929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.36.20 ", "ContentType": "text/plain"}], "uids": ["CKwlHC1W8VrARsKqw1"]} -{"Format": "IDEA0", "ID": "a6ef2319-ad49-4d84-8571-e3025d47cc99", "DetectTime": "2023-10-30T13:59:50.342663+02:00", "EventTime": "2023-10-30T13:59:50.342678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.10.18.143 ", "ContentType": "text/plain"}], "uids": ["CnLHn414EaPKp96fVj"]} -{"Format": "IDEA0", "ID": "758ec146-de75-44d5-aea0-b0be36f4214f", "DetectTime": "2023-10-30T13:59:50.376641+02:00", "EventTime": "2023-10-30T13:59:50.376692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CWweTu32uS3FJqKFq4"]} -{"Format": "IDEA0", "ID": "26111a55-b5a3-4903-9fc0-99fb812ba4ca", "DetectTime": "2023-10-30T13:59:50.413357+02:00", "EventTime": "2023-10-30T13:59:50.413383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CKgCyRMY8rsSmT7G1"]} -{"Format": "IDEA0", "ID": "19497a03-fcad-417f-9842-6a6a1e87b5da", "DetectTime": "2023-10-30T13:59:50.468836+02:00", "EventTime": "2023-10-30T13:59:50.468864+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cd67nZ1pYtMLyQ3A23"]} -{"Format": "IDEA0", "ID": "91950816-0d3e-43b6-bfc5-28f10b834ef5", "DetectTime": "2023-10-30T13:59:50.486363+02:00", "EventTime": "2023-10-30T13:59:50.486391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.105.114 ", "ContentType": "text/plain"}], "uids": ["CHGZlzQEmb5aAYTj9"]} -{"Format": "IDEA0", "ID": "e37de574-d513-4a91-9a08-86f1aeb1d163", "DetectTime": "2023-10-30T13:59:50.523646+02:00", "EventTime": "2023-10-30T13:59:50.523663+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHOlx6456duk9whB3j"]} -{"Format": "IDEA0", "ID": "20746d56-e675-4fcc-b0fc-8251cd097fae", "DetectTime": "2023-10-30T13:59:50.543831+02:00", "EventTime": "2023-10-30T13:59:50.543854+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwwFUt4ckqe9kW85Y"]} -{"Format": "IDEA0", "ID": "2407a8b4-9248-4079-b686-ed168b1f981e", "DetectTime": "2023-10-30T13:59:50.558905+02:00", "EventTime": "2023-10-30T13:59:50.558939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaJeFmYexKjyHal99"]} -{"Format": "IDEA0", "ID": "64805ef2-e1e2-4598-b514-52069e35d116", "DetectTime": "2023-10-30T13:59:50.574822+02:00", "EventTime": "2023-10-30T13:59:50.574845+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCutrC27Re1x4iCKE3"]} -{"Format": "IDEA0", "ID": "f13267bb-243f-425b-ba44-e6f9cfb09dc0", "DetectTime": "2023-10-30T13:59:50.590341+02:00", "EventTime": "2023-10-30T13:59:50.590363+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCYySb10cRnXPV8iQg"]} -{"Format": "IDEA0", "ID": "24168a2d-f348-45e1-8691-d3b8d9c94798", "DetectTime": "2023-10-30T13:59:50.611844+02:00", "EventTime": "2023-10-30T13:59:50.611874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCutrC27Re1x4iCKE3", "CwwFUt4ckqe9kW85Y", "Cd67nZ1pYtMLyQ3A23", "CzfJWP27fzoItSP8ag"]} -{"Format": "IDEA0", "ID": "5eed9045-cd62-47a2-abf0-ae58f10ef176", "DetectTime": "2023-10-30T13:59:50.629263+02:00", "EventTime": "2023-10-30T13:59:50.629314+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzfJWP27fzoItSP8ag"]} -{"Format": "IDEA0", "ID": "5ca03339-a59a-450e-b90e-1a1a62081cc1", "DetectTime": "2023-10-30T13:59:50.647937+02:00", "EventTime": "2023-10-30T13:59:50.648025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["ChFVuD1DttO8l1kpd4"]} -{"Format": "IDEA0", "ID": "cdaf068a-8b46-4162-b88e-c263dff22467", "DetectTime": "2023-10-30T13:59:50.670742+02:00", "EventTime": "2023-10-30T13:59:50.670763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["CGoWLj390oAF9vKDij"]} -{"Format": "IDEA0", "ID": "c061cccc-6b76-4127-8abb-0156eb933475", "DetectTime": "2023-10-30T13:59:50.709778+02:00", "EventTime": "2023-10-30T13:59:50.709807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CrbaAy4ICuCslnbxsa"]} -{"Format": "IDEA0", "ID": "3384448c-9be4-4828-8a70-155bcce0e91e", "DetectTime": "2023-10-30T13:59:50.749195+02:00", "EventTime": "2023-10-30T13:59:50.749212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cd32vU56yaQMYBLJf"]} -{"Format": "IDEA0", "ID": "a19db980-cf62-4b4c-bf99-9ef58c0c6e93", "DetectTime": "2023-10-30T13:59:50.764337+02:00", "EventTime": "2023-10-30T13:59:50.764364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.232.143 ", "ContentType": "text/plain"}], "uids": ["COUqEl2ZX5TzGpYA4g"]} -{"Format": "IDEA0", "ID": "b0d124a8-ceb5-40f1-8f5e-4fc2eb148fa4", "DetectTime": "2023-10-30T13:59:50.801959+02:00", "EventTime": "2023-10-30T13:59:50.801988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNgOUw4XND165KqQR2"]} -{"Format": "IDEA0", "ID": "fa2d28bb-362c-4e78-938d-ec1858535494", "DetectTime": "2023-10-30T13:59:50.817138+02:00", "EventTime": "2023-10-30T13:59:50.817158+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CG1Hg13S9zl2YJTBwb"]} -{"Format": "IDEA0", "ID": "de50cf3e-7d30-4caa-a6db-77a8b9879f27", "DetectTime": "2023-10-30T13:59:50.830763+02:00", "EventTime": "2023-10-30T13:59:50.830809+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyLyBc3EhlQGqphIW9"]} -{"Format": "IDEA0", "ID": "ff8e1f77-890e-466c-896f-39f529d8cc25", "DetectTime": "2023-10-30T13:59:50.845535+02:00", "EventTime": "2023-10-30T13:59:50.845558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CD2sxp3rsHQ416Fljl"]} -{"Format": "IDEA0", "ID": "dfb0f391-f837-4c50-a9c1-d5b56ebde28a", "DetectTime": "2023-10-30T13:59:50.884041+02:00", "EventTime": "2023-10-30T13:59:50.884064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CwcNT42qpOZBzyVfE"]} -{"Format": "IDEA0", "ID": "e3f72bab-3099-4d15-be54-9409fcfe38ba", "DetectTime": "2023-10-30T13:59:50.922589+02:00", "EventTime": "2023-10-30T13:59:50.922713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CX9J4p1QBjMnWfxPSg"]} -{"Format": "IDEA0", "ID": "58fd58d5-c608-439e-a719-a4aa2b88a77d", "DetectTime": "2023-10-30T13:59:50.958486+02:00", "EventTime": "2023-10-30T13:59:50.958508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.121.218.120 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CnaUTl2IlntWRCwl6f"]} -{"Format": "IDEA0", "ID": "32e1fa6a-4083-4588-a93c-7db75ac06ce3", "DetectTime": "2023-10-30T13:59:50.993935+02:00", "EventTime": "2023-10-30T13:59:50.993955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjX4E81kWx2BgplO1b"]} -{"Format": "IDEA0", "ID": "7267f4ad-fd1b-4d36-a488-51138c78471a", "DetectTime": "2023-10-30T13:59:51.031947+02:00", "EventTime": "2023-10-30T13:59:51.031972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CQHsHw2Gqg1lMBFGE4"]} -{"Format": "IDEA0", "ID": "bf354356-0946-4f84-bd05-d7740295ca51", "DetectTime": "2023-10-30T13:59:51.055969+02:00", "EventTime": "2023-10-30T13:59:51.056055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["Cs0sS3dwTRTO8syU5"]} -{"Format": "IDEA0", "ID": "c4e15717-f724-4b44-a010-f80ba77e06c7", "DetectTime": "2023-10-30T13:59:51.092173+02:00", "EventTime": "2023-10-30T13:59:51.092192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CC2zJz1qlpEsuAOa7b"]} -{"Format": "IDEA0", "ID": "8956c3d5-a502-4a05-a865-f89d77834ea3", "DetectTime": "2023-10-30T13:59:51.114064+02:00", "EventTime": "2023-10-30T13:59:51.114085+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3JpSO2OI3StoX9rv"]} -{"Format": "IDEA0", "ID": "2976da47-2a30-45ee-a84d-a15d62ccb3d6", "DetectTime": "2023-10-30T13:59:51.129986+02:00", "EventTime": "2023-10-30T13:59:51.130006+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7OhGtoXqmUOD7Yn6"]} -{"Format": "IDEA0", "ID": "5086e09a-8a4b-4934-9a55-cc56224d52b1", "DetectTime": "2023-10-30T13:59:51.148379+02:00", "EventTime": "2023-10-30T13:59:51.148402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CGVRE1yZVKMgO9JL1"]} -{"Format": "IDEA0", "ID": "dbf6d77d-ebd9-4ff8-884e-520f8d3e5e60", "DetectTime": "2023-10-30T13:59:51.169572+02:00", "EventTime": "2023-10-30T13:59:51.169587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["Cf3aIg4GGaTHwTXAag"]} -{"Format": "IDEA0", "ID": "8df818ea-cbfa-4cd4-a49c-ccd77efdc2d0", "DetectTime": "2023-10-30T13:59:51.191585+02:00", "EventTime": "2023-10-30T13:59:51.191605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CwMcGS2jGYaBxn8wLb"]} -{"Format": "IDEA0", "ID": "44f67e84-61af-438f-947c-7f32077d218c", "DetectTime": "2023-10-30T13:59:51.212427+02:00", "EventTime": "2023-10-30T13:59:51.212448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CqUVts1jALjJ2reYy2"]} -{"Format": "IDEA0", "ID": "02eca12d-bf9d-4b05-9e86-8e648c347c5f", "DetectTime": "2023-10-30T13:59:51.243645+02:00", "EventTime": "2023-10-30T13:59:51.243662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.157.40 ", "ContentType": "text/plain"}], "uids": ["CuU8lV3VZKPF4PlPA8"]} -{"Format": "IDEA0", "ID": "89a1adff-affd-416e-8082-5a94469e4a98", "DetectTime": "2023-10-30T13:59:51.265930+02:00", "EventTime": "2023-10-30T13:59:51.265958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CWr1nn3oSfks9eqPc5"]} -{"Format": "IDEA0", "ID": "c58123a1-4b88-48b4-a1bd-8f8f99c2f402", "DetectTime": "2023-10-30T13:59:51.289185+02:00", "EventTime": "2023-10-30T13:59:51.289206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["C1YiuL3Fp0gZpDf5Hl"]} -{"Format": "IDEA0", "ID": "3ed32ee5-9f82-4017-86ef-818bad1435a2", "DetectTime": "2023-10-30T13:59:51.312449+02:00", "EventTime": "2023-10-30T13:59:51.312469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["C7LGrw3HkWkVL8TUWj"]} -{"Format": "IDEA0", "ID": "31824a9b-1342-478f-8f29-9668bf13ea39", "DetectTime": "2023-10-30T13:59:51.337073+02:00", "EventTime": "2023-10-30T13:59:51.337092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CCljA52RNfGIUwgPM7"]} -{"Format": "IDEA0", "ID": "9d165259-4833-475e-8adf-41df1ef18589", "DetectTime": "2023-10-30T13:59:51.358994+02:00", "EventTime": "2023-10-30T13:59:51.359054+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1JXMb1Xz45rI22MD4"]} -{"Format": "IDEA0", "ID": "8f0fef9e-3be8-4ee4-bc9c-bb9e27b3497f", "DetectTime": "2023-10-30T13:59:51.372521+02:00", "EventTime": "2023-10-30T13:59:51.372538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C7Gw2B41qvmdzLRL9g"]} -{"Format": "IDEA0", "ID": "35e50e40-e5c2-4d53-8ceb-b6058c37cbda", "DetectTime": "2023-10-30T13:59:51.397468+02:00", "EventTime": "2023-10-30T13:59:51.397486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["ChkLdh1Q35uk7glT8"]} -{"Format": "IDEA0", "ID": "f75cd544-bcbe-4ff0-b9fa-a215639230eb", "DetectTime": "2023-10-30T13:59:51.417129+02:00", "EventTime": "2023-10-30T13:59:51.417147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CIhsLY2JkMOLia9IFd"]} -{"Format": "IDEA0", "ID": "4094a487-d6f3-4cc6-9098-2702a6888b22", "DetectTime": "2023-10-30T13:59:51.440211+02:00", "EventTime": "2023-10-30T13:59:51.440236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyLyBc3EhlQGqphIW9", "CNgOUw4XND165KqQR2", "C8yBKP1RGuZgc1qb68", "C7OhGtoXqmUOD7Yn6"]} -{"Format": "IDEA0", "ID": "7d57f1b4-4af9-4f2f-8a7b-a31d4ebaf227", "DetectTime": "2023-10-30T13:59:51.462378+02:00", "EventTime": "2023-10-30T13:59:51.462395+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8yBKP1RGuZgc1qb68"]} -{"Format": "IDEA0", "ID": "3b78c7cc-730d-43de-9b51-4a3b7b091b64", "DetectTime": "2023-10-30T13:59:51.483277+02:00", "EventTime": "2023-10-30T13:59:51.483294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CVck9n4dtrGWMaIAV5"]} -{"Format": "IDEA0", "ID": "2ad14e28-42f0-49ed-a635-ee83b80a3ac5", "DetectTime": "2023-10-30T13:59:51.517721+02:00", "EventTime": "2023-10-30T13:59:51.517742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLnPisclEm27iz675"]} -{"Format": "IDEA0", "ID": "ca6ffd3c-1a78-4aaf-8769-0591240eb6c2", "DetectTime": "2023-10-30T13:59:51.539676+02:00", "EventTime": "2023-10-30T13:59:51.539690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["C1Falu4poHYM0cbtU9"]} -{"Format": "IDEA0", "ID": "a43c9f56-c345-4aa6-a0bb-600a47713133", "DetectTime": "2023-10-30T13:59:51.563478+02:00", "EventTime": "2023-10-30T13:59:51.563502+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkvoRr2xEGsA28SPm3"]} -{"Format": "IDEA0", "ID": "9fd4fcff-d367-460d-8734-9b50601076b3", "DetectTime": "2023-10-30T13:59:51.588410+02:00", "EventTime": "2023-10-30T13:59:51.588436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["ChoTu413MTuMFLLQe2"]} -{"Format": "IDEA0", "ID": "adeccd18-0d3a-4fa8-826f-13427727d2d2", "DetectTime": "2023-10-30T13:59:51.612035+02:00", "EventTime": "2023-10-30T13:59:51.612051+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfylIo3zka5TBcsylc"]} -{"Format": "IDEA0", "ID": "25cd7a6b-56b8-485b-88be-85ecdbbfdb59", "DetectTime": "2023-10-30T13:59:51.632303+02:00", "EventTime": "2023-10-30T13:59:51.632329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.121 ", "ContentType": "text/plain"}], "uids": ["CaJK6K2yNRJFJIu8kd"]} -{"Format": "IDEA0", "ID": "274f18a3-1577-4a9c-b35e-34824a3663a2", "DetectTime": "2023-10-30T13:59:51.674811+02:00", "EventTime": "2023-10-30T13:59:51.674837+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4X1BQ3HTsA58ZryGh"]} -{"Format": "IDEA0", "ID": "877118ac-db00-471e-a860-a5810d13fc9d", "DetectTime": "2023-10-30T13:59:51.697059+02:00", "EventTime": "2023-10-30T13:59:51.697078+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChhJoE1V7gXaAxk4Sk"]} -{"Format": "IDEA0", "ID": "411e39c4-65f9-4de1-9480-89356a62447e", "DetectTime": "2023-10-30T13:59:51.718375+02:00", "EventTime": "2023-10-30T13:59:51.718390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CmSnHy32Eg8yg8cz0i"]} -{"Format": "IDEA0", "ID": "c2716927-7ab1-46ae-b570-d5c9d19655d0", "DetectTime": "2023-10-30T13:59:51.752007+02:00", "EventTime": "2023-10-30T13:59:51.752025+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Co8bgD2MKhWgzBHL4l"]} -{"Format": "IDEA0", "ID": "1d865265-c395-4428-9778-383c99879ad9", "DetectTime": "2023-10-30T13:59:51.772597+02:00", "EventTime": "2023-10-30T13:59:51.772614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CU9W9N35SwcUlpuJba"]} -{"Format": "IDEA0", "ID": "5d3b9517-5002-489a-b18b-60b5c5330149", "DetectTime": "2023-10-30T13:59:51.794556+02:00", "EventTime": "2023-10-30T13:59:51.794581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["C07MkC2aZPDF7nprmh"]} -{"Format": "IDEA0", "ID": "f51b8a50-0995-4da9-a6ea-25cd40954083", "DetectTime": "2023-10-30T13:59:51.818576+02:00", "EventTime": "2023-10-30T13:59:51.818602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CwyQcj1027jgTWbHnl"]} -{"Format": "IDEA0", "ID": "65e9168c-c898-4b42-8c53-ad809b41d366", "DetectTime": "2023-10-30T13:59:51.841642+02:00", "EventTime": "2023-10-30T13:59:51.841668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5ZS3e2izNSo8LupJ"]} -{"Format": "IDEA0", "ID": "fd8e7538-ab65-4696-9f47-221b2de84e78", "DetectTime": "2023-10-30T13:59:51.863188+02:00", "EventTime": "2023-10-30T13:59:51.863210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["C12Ogg223v1DjLQNo8"]} -{"Format": "IDEA0", "ID": "3ebf9179-3f9d-4a82-98ba-693b5ef472d5", "DetectTime": "2023-10-30T13:59:51.888300+02:00", "EventTime": "2023-10-30T13:59:51.888401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CJZ2G11rIVyFy141O1"]} -{"Format": "IDEA0", "ID": "b47f5721-0eff-43fa-ac82-270dffd60777", "DetectTime": "2023-10-30T13:59:51.917506+02:00", "EventTime": "2023-10-30T13:59:51.917519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CGZ44m3WsBAEt8ey5h"]} -{"Format": "IDEA0", "ID": "22668c66-2565-48ee-9f20-5f096abe83b6", "DetectTime": "2023-10-30T13:59:51.958872+02:00", "EventTime": "2023-10-30T13:59:51.958890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CWhzSL3I7pXxovvZz4"]} -{"Format": "IDEA0", "ID": "b3e834e6-4e5d-4fb7-ba5d-2e606a8fbf9c", "DetectTime": "2023-10-30T13:59:52.007177+02:00", "EventTime": "2023-10-30T13:59:52.007202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CfQxcS1ujjQatqf2X6"]} -{"Format": "IDEA0", "ID": "b38c5a4c-873c-4ca3-96f3-44c3de0bfef5", "DetectTime": "2023-10-30T13:59:52.048641+02:00", "EventTime": "2023-10-30T13:59:52.048667+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMkyQP3ZDr6dT8zxRj"]} -{"Format": "IDEA0", "ID": "35877775-18eb-4367-81e1-d184c5953e4f", "DetectTime": "2023-10-30T13:59:52.069779+02:00", "EventTime": "2023-10-30T13:59:52.069799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CSgbAq3VNLjHc2B8X2"]} -{"Format": "IDEA0", "ID": "3d443072-cee1-4183-815c-9da5870db282", "DetectTime": "2023-10-30T13:59:52.094048+02:00", "EventTime": "2023-10-30T13:59:52.094075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CUu9PK2J0stOekblm1"]} -{"Format": "IDEA0", "ID": "677a91df-37a7-46d9-886f-5c3c12a5146e", "DetectTime": "2023-10-30T13:59:52.127428+02:00", "EventTime": "2023-10-30T13:59:52.127448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CgfO0C2jk2AjS7Uh9l"]} -{"Format": "IDEA0", "ID": "03f5d468-3566-45f3-981f-bf13e3a13f1c", "DetectTime": "2023-10-30T13:59:52.150448+02:00", "EventTime": "2023-10-30T13:59:52.150475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.231.146 ", "ContentType": "text/plain"}], "uids": ["CSpTnFKGJzGVZuwVj"]} -{"Format": "IDEA0", "ID": "92fd8dd4-2e95-412e-84c3-17dfb9d5d8d1", "DetectTime": "2023-10-30T13:59:52.172650+02:00", "EventTime": "2023-10-30T13:59:52.172668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["C00b1biaLCwdE8la7"]} -{"Format": "IDEA0", "ID": "faaa0eab-ec5f-45b0-88ca-b145a977f619", "DetectTime": "2023-10-30T13:59:52.198792+02:00", "EventTime": "2023-10-30T13:59:52.198813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CjU4au4snzgd2NCo3c"]} -{"Format": "IDEA0", "ID": "a012a655-48fd-4f14-9f40-3eca4f50e610", "DetectTime": "2023-10-30T13:59:52.242080+02:00", "EventTime": "2023-10-30T13:59:52.242213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["CmI36W1F8IvqJiFzDe"]} -{"Format": "IDEA0", "ID": "a3085ebf-7c02-4243-aab1-987f2c1cd754", "DetectTime": "2023-10-30T13:59:52.271127+02:00", "EventTime": "2023-10-30T13:59:52.271146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CfylIo3zka5TBcsylc", "CnBNBF4AqQURe2GJff", "ChhJoE1V7gXaAxk4Sk", "C5ZS3e2izNSo8LupJ"]} -{"Format": "IDEA0", "ID": "835cefbd-6e96-4fd0-b506-7f7009327a58", "DetectTime": "2023-10-30T13:59:52.297034+02:00", "EventTime": "2023-10-30T13:59:52.297058+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnBNBF4AqQURe2GJff"]} -{"Format": "IDEA0", "ID": "552e3b50-12c9-4711-a385-afa1755e94d4", "DetectTime": "2023-10-30T13:59:52.321245+02:00", "EventTime": "2023-10-30T13:59:52.321268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CrOI2n4IsXSHnLagB1"]} -{"Format": "IDEA0", "ID": "c4e27f6f-db05-4ac8-9215-ce3b85b87166", "DetectTime": "2023-10-30T13:59:52.350163+02:00", "EventTime": "2023-10-30T13:59:52.350189+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDIpfv2cJHeWu2N12g"]} -{"Format": "IDEA0", "ID": "d1813934-1039-44ef-85d8-b55e65862a67", "DetectTime": "2023-10-30T13:59:52.375652+02:00", "EventTime": "2023-10-30T13:59:52.375677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CYBixs2aUFNpF6eIu8"]} -{"Format": "IDEA0", "ID": "c2d5d718-86f1-447b-aa34-f181622d3268", "DetectTime": "2023-10-30T13:59:52.400781+02:00", "EventTime": "2023-10-30T13:59:52.400801+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwVwcuzhNqDhA1Fhb"]} -{"Format": "IDEA0", "ID": "46856c67-72f3-472e-8a30-347e4ef55cf4", "DetectTime": "2023-10-30T13:59:52.422130+02:00", "EventTime": "2023-10-30T13:59:52.422151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CatJuW3JspVeLtXu0a"]} -{"Format": "IDEA0", "ID": "e5fb4df6-1712-405a-bf13-fe6a2548c699", "DetectTime": "2023-10-30T13:59:52.457637+02:00", "EventTime": "2023-10-30T13:59:52.457660+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnO1Ng4Zqeoj5VPXO5"]} -{"Format": "IDEA0", "ID": "7e46df8e-82f9-4bc9-bec9-743b58f7af9f", "DetectTime": "2023-10-30T13:59:52.479078+02:00", "EventTime": "2023-10-30T13:59:52.479099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CgT28T1dlPs3HDL5lf"]} -{"Format": "IDEA0", "ID": "e34fad2e-e168-4865-b2fd-2f7f6e6ae9e6", "DetectTime": "2023-10-30T13:59:52.515305+02:00", "EventTime": "2023-10-30T13:59:52.515326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CDsqCg3jcz8hUJuyF8"]} -{"Format": "IDEA0", "ID": "6a3687f2-5a0e-41eb-8234-a98307905eb0", "DetectTime": "2023-10-30T13:59:52.537062+02:00", "EventTime": "2023-10-30T13:59:52.537086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["Cqux1zcTStRxCLtW3"]} -{"Format": "IDEA0", "ID": "beea08cb-cdee-42cf-b5dd-373a8a4b5d53", "DetectTime": "2023-10-30T13:59:52.558985+02:00", "EventTime": "2023-10-30T13:59:52.559007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CM7iic1XeqNmYOdJcc"]} -{"Format": "IDEA0", "ID": "1dc954c5-53f8-4733-9492-66e6a98b638a", "DetectTime": "2023-10-30T13:59:52.580556+02:00", "EventTime": "2023-10-30T13:59:52.580578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CPFNTZ2HUqhgpf3lTg"]} -{"Format": "IDEA0", "ID": "f7f67d72-7d40-4c6b-b7ea-46be53812cb5", "DetectTime": "2023-10-30T13:59:52.601235+02:00", "EventTime": "2023-10-30T13:59:52.601261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["CGxO55pCgMGHCjXf1"]} -{"Format": "IDEA0", "ID": "8a7c872f-b89a-4397-9509-c05eada5fbc8", "DetectTime": "2023-10-30T13:59:52.622489+02:00", "EventTime": "2023-10-30T13:59:52.622507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["C6QCB8MRPmSh4JY1a"]} -{"Format": "IDEA0", "ID": "76ec4933-bc4a-4d6f-a50b-6ee768c3a68d", "DetectTime": "2023-10-30T13:59:52.657601+02:00", "EventTime": "2023-10-30T13:59:52.657617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Chnwmz2MQYMqelcQl9"]} -{"Format": "IDEA0", "ID": "0cb8f52b-7d21-4c17-867e-f6f79927835c", "DetectTime": "2023-10-30T13:59:52.695201+02:00", "EventTime": "2023-10-30T13:59:52.695224+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxTuUP1Vq5o0nOS06c"]} -{"Format": "IDEA0", "ID": "4762531c-2b13-4ea4-add2-c9969826882d", "DetectTime": "2023-10-30T13:59:52.717569+02:00", "EventTime": "2023-10-30T13:59:52.717595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CHY4N12PG5EQQi9Z43"]} -{"Format": "IDEA0", "ID": "1be0454c-fc38-489a-9e55-cdbe70260c8d", "DetectTime": "2023-10-30T13:59:52.752459+02:00", "EventTime": "2023-10-30T13:59:52.752478+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C22Rf74DSQLRn5fDKi"]} -{"Format": "IDEA0", "ID": "1269efab-4a31-48af-ba0c-e460c9464b72", "DetectTime": "2023-10-30T13:59:52.773217+02:00", "EventTime": "2023-10-30T13:59:52.773234+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CN2AXB3lRySuJ82Pp6"]} -{"Format": "IDEA0", "ID": "597e7707-34d9-419e-86ac-27b763609596", "DetectTime": "2023-10-30T13:59:52.796223+02:00", "EventTime": "2023-10-30T13:59:52.796244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CwBaSr3rGyhmj4KL32"]} -{"Format": "IDEA0", "ID": "15ba8458-e355-4939-b708-9406e0b9dd04", "DetectTime": "2023-10-30T13:59:52.831331+02:00", "EventTime": "2023-10-30T13:59:52.831355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C22Rf74DSQLRn5fDKi", "CK4pBd187mVi0XiKNj", "CwVwcuzhNqDhA1Fhb", "CM7iic1XeqNmYOdJcc"]} -{"Format": "IDEA0", "ID": "4d05e290-9a8e-4215-b50b-ac19c16d3d42", "DetectTime": "2023-10-30T13:59:52.850610+02:00", "EventTime": "2023-10-30T13:59:52.850624+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CK4pBd187mVi0XiKNj"]} -{"Format": "IDEA0", "ID": "59f5f941-c578-4654-bd09-8096babcf9a9", "DetectTime": "2023-10-30T13:59:52.872072+02:00", "EventTime": "2023-10-30T13:59:52.872099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CRwQBy4jVWDKmvQoM8"]} -{"Format": "IDEA0", "ID": "fe84cb05-edf9-49f8-850e-c765bf26e094", "DetectTime": "2023-10-30T13:59:52.913220+02:00", "EventTime": "2023-10-30T13:59:52.913238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CfHyC2cG49MTjwaId"]} -{"Format": "IDEA0", "ID": "302182c4-efb0-4c38-800e-c7afc19e0c0d", "DetectTime": "2023-10-30T13:59:52.946562+02:00", "EventTime": "2023-10-30T13:59:52.946574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["Cr9AUx3RB9avQ9Xx2d"]} -{"Format": "IDEA0", "ID": "af9ceb08-0b9a-45de-a451-b68491e82d03", "DetectTime": "2023-10-30T13:59:52.966181+02:00", "EventTime": "2023-10-30T13:59:52.966196+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNFQs11cVTmNjrZPTe"]} -{"Format": "IDEA0", "ID": "e573168a-95a9-4f85-94b9-09781dcdb7c1", "DetectTime": "2023-10-30T13:59:52.988540+02:00", "EventTime": "2023-10-30T13:59:52.988561+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cy8oay2e54U400udtf"]} -{"Format": "IDEA0", "ID": "aeb3f93a-3376-4f9a-abaa-9462a0a89cc1", "DetectTime": "2023-10-30T13:59:53.015551+02:00", "EventTime": "2023-10-30T13:59:53.015578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["Cb9cP91f0L2p97MVN3"]} -{"Format": "IDEA0", "ID": "24dc6c15-525d-4143-8f52-a67f601a1683", "DetectTime": "2023-10-30T13:59:53.049335+02:00", "EventTime": "2023-10-30T13:59:53.049357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CHOCdW3frQSfNDyN0c"]} -{"Format": "IDEA0", "ID": "39184900-cd50-424f-89f1-ff43c131f1ca", "DetectTime": "2023-10-30T13:59:53.072523+02:00", "EventTime": "2023-10-30T13:59:53.072543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CboWq64xtzwXZg7G2j"]} -{"Format": "IDEA0", "ID": "811d0203-949b-40bd-932b-9eb26912f317", "DetectTime": "2023-10-30T13:59:53.111573+02:00", "EventTime": "2023-10-30T13:59:53.111591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CJrf053HZWGpZJmM0f"]} -{"Format": "IDEA0", "ID": "adfc2b20-a93b-4cd2-b642-99bb41159bef", "DetectTime": "2023-10-30T13:59:53.128472+02:00", "EventTime": "2023-10-30T13:59:53.128488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["C3vLoS14NnmTVBQepf"]} -{"Format": "IDEA0", "ID": "4ef7376f-e758-48d8-a012-e9bddecf550a", "DetectTime": "2023-10-30T13:59:53.162194+02:00", "EventTime": "2023-10-30T13:59:53.162215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["ChOauq3HYoQ23bRuOa"]} -{"Format": "IDEA0", "ID": "975529ef-6d20-415c-9204-a6cfa18118a9", "DetectTime": "2023-10-30T13:59:53.198715+02:00", "EventTime": "2023-10-30T13:59:53.198735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CHwpD32MfF94Besl3i"]} -{"Format": "IDEA0", "ID": "106153fc-1f77-429c-a0f3-e031da327af7", "DetectTime": "2023-10-30T13:59:53.223950+02:00", "EventTime": "2023-10-30T13:59:53.223975+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9CgkH3S1OKsDEqVF6"]} -{"Format": "IDEA0", "ID": "105ff498-bef9-4372-a805-3f86da465f89", "DetectTime": "2023-10-30T13:59:53.244491+02:00", "EventTime": "2023-10-30T13:59:53.244511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CSqMFg2OxfRYVsIRy9"]} -{"Format": "IDEA0", "ID": "99fe6208-2dda-4bf2-ad20-1d9734a81502", "DetectTime": "2023-10-30T13:59:53.276785+02:00", "EventTime": "2023-10-30T13:59:53.276808+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["COVDPf2oftrynCtlt8"]} -{"Format": "IDEA0", "ID": "5ea895c5-bb12-49df-8681-81387c5ec7d4", "DetectTime": "2023-10-30T13:59:53.297981+02:00", "EventTime": "2023-10-30T13:59:53.297998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.120.125 ", "ContentType": "text/plain"}], "uids": ["CENeJp4AdIbUychvk6"]} -{"Format": "IDEA0", "ID": "bdc3ae1e-669f-4c4f-87a7-224f0a0665f9", "DetectTime": "2023-10-30T13:59:53.322309+02:00", "EventTime": "2023-10-30T13:59:53.322340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CE1nfh2QJKOQoyQhBe"]} -{"Format": "IDEA0", "ID": "da9a5fef-47a4-41d9-a239-0be86913d653", "DetectTime": "2023-10-30T13:59:53.343973+02:00", "EventTime": "2023-10-30T13:59:53.343995+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIKCqW3YtuFceq9QY6"]} -{"Format": "IDEA0", "ID": "157083f0-5b42-4b16-8e43-78cb6136135c", "DetectTime": "2023-10-30T13:59:53.363931+02:00", "EventTime": "2023-10-30T13:59:53.363981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["Cf5uAI1ViOWMOBqRzb"]} -{"Format": "IDEA0", "ID": "6eb4ef06-33ac-49cc-ba13-18c77d2bdd05", "DetectTime": "2023-10-30T13:59:53.398505+02:00", "EventTime": "2023-10-30T13:59:53.398523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["Cd0jc64t6qUXk21flb"]} -{"Format": "IDEA0", "ID": "a9536f2d-9256-437d-8bbb-274e535e5591", "DetectTime": "2023-10-30T13:59:53.432418+02:00", "EventTime": "2023-10-30T13:59:53.432435+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJsrwfK9Agz5zmj35"]} -{"Format": "IDEA0", "ID": "e0629418-f04c-4f39-b835-9f12f3267090", "DetectTime": "2023-10-30T13:59:53.452280+02:00", "EventTime": "2023-10-30T13:59:53.452303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["CfY0pf20R7oECAIUIi"]} -{"Format": "IDEA0", "ID": "4a443a4d-235c-4369-a785-b3f5308264c6", "DetectTime": "2023-10-30T13:59:53.487248+02:00", "EventTime": "2023-10-30T13:59:53.487264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cy8oay2e54U400udtf", "COVDPf2oftrynCtlt8", "CIKCqW3YtuFceq9QY6", "C990oG4FmpocAPTd3i"]} -{"Format": "IDEA0", "ID": "395a5ce2-78ec-42b7-a0e2-e5aa923a2f8f", "DetectTime": "2023-10-30T13:59:53.507652+02:00", "EventTime": "2023-10-30T13:59:53.507671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C990oG4FmpocAPTd3i"]} -{"Format": "IDEA0", "ID": "ce154a5d-9fba-47c3-9308-173cef046b02", "DetectTime": "2023-10-30T13:59:53.527968+02:00", "EventTime": "2023-10-30T13:59:53.527989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["Ceycc53Fat5FVW1fK5"]} -{"Format": "IDEA0", "ID": "a5433a1d-a855-4e9b-8d85-3d6d335a510d", "DetectTime": "2023-10-30T13:59:53.562467+02:00", "EventTime": "2023-10-30T13:59:53.562485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"], "Hostname": ["107-193-222-108.lightspeed.austtx.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CbCQHp3UmFITUa6et8"]} -{"Format": "IDEA0", "ID": "4c45d408-a96b-408d-bd83-021c8639ff51", "DetectTime": "2023-10-30T13:59:53.584024+02:00", "EventTime": "2023-10-30T13:59:53.584039+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7GsZl3L4FA1c1Tik"]} -{"Format": "IDEA0", "ID": "7324c2cc-8efe-490b-b117-361f299eee12", "DetectTime": "2023-10-30T13:59:53.604774+02:00", "EventTime": "2023-10-30T13:59:53.604800+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5OIwc497Puw5lP8yb"]} -{"Format": "IDEA0", "ID": "fa39b29d-dfe6-4ec1-9ed9-4fda3cc7114d", "DetectTime": "2023-10-30T13:59:53.624601+02:00", "EventTime": "2023-10-30T13:59:53.624621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CFFYTjzwA1qsGehak"]} -{"Format": "IDEA0", "ID": "ae8a04a4-b853-4617-9bc0-93b77b32fb93", "DetectTime": "2023-10-30T13:59:53.658513+02:00", "EventTime": "2023-10-30T13:59:53.658533+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtiJCe3p0xp2iRUzre"]} -{"Format": "IDEA0", "ID": "8515538a-572b-4ac4-ba79-def3f36cbf2c", "DetectTime": "2023-10-30T13:59:53.678394+02:00", "EventTime": "2023-10-30T13:59:53.678412+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1KmME1MXfBe1QnALc"]} -{"Format": "IDEA0", "ID": "2201d83f-a438-4e3b-91d5-b01a0dd3271f", "DetectTime": "2023-10-30T13:59:53.697677+02:00", "EventTime": "2023-10-30T13:59:53.697700+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGvXam4TK7koXZ5CH2"]} -{"Format": "IDEA0", "ID": "26225d81-ed98-423e-a6cb-abc54039a264", "DetectTime": "2023-10-30T13:59:53.717556+02:00", "EventTime": "2023-10-30T13:59:53.717652+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPvp4223vzLf9e4m0g"]} -{"Format": "IDEA0", "ID": "c3204274-2467-4c8c-ab2a-571cee16eb9a", "DetectTime": "2023-10-30T13:59:53.738730+02:00", "EventTime": "2023-10-30T13:59:53.738756+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUIPbm26acYCkNQFj"]} -{"Format": "IDEA0", "ID": "d6b0885f-fbce-4563-9f72-cb4633f85943", "DetectTime": "2023-10-30T13:59:53.760794+02:00", "EventTime": "2023-10-30T13:59:53.760822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPvp4223vzLf9e4m0g", "C5OIwc497Puw5lP8yb", "C1KmME1MXfBe1QnALc", "CnJQEz3U6ooQOxukd1"]} -{"Format": "IDEA0", "ID": "3c4e7547-ec70-4b79-8609-bf836b57e92a", "DetectTime": "2023-10-30T13:59:53.782472+02:00", "EventTime": "2023-10-30T13:59:53.782493+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnJQEz3U6ooQOxukd1"]} -{"Format": "IDEA0", "ID": "03c48b5b-fdbc-4fc2-ac82-eea196e3f635", "DetectTime": "2023-10-30T13:59:53.806160+02:00", "EventTime": "2023-10-30T13:59:53.806184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CYnx1C3vQ9Fh2HUki5"]} -{"Format": "IDEA0", "ID": "8cee7aa0-2a17-4fe8-9012-202a36c2e5bb", "DetectTime": "2023-10-30T13:59:53.840111+02:00", "EventTime": "2023-10-30T13:59:53.840131+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWVWaK1GQhduKNNHKk"]} -{"Format": "IDEA0", "ID": "1e22dce1-d16f-41a7-9904-b9262794f1d0", "DetectTime": "2023-10-30T13:59:53.861210+02:00", "EventTime": "2023-10-30T13:59:53.861232+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cl9rQe2X6Sem0GPUke"]} -{"Format": "IDEA0", "ID": "62aa59cf-b238-4687-b301-e3836cb4326f", "DetectTime": "2023-10-30T13:59:53.881615+02:00", "EventTime": "2023-10-30T13:59:53.881647+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEDr1KaFUzz91kdd5"]} -{"Format": "IDEA0", "ID": "1d9b98a0-925a-458d-98d7-35437d64736e", "DetectTime": "2023-10-30T13:59:53.900621+02:00", "EventTime": "2023-10-30T13:59:53.900640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CEy6Id2dwheVYaLqT9"]} -{"Format": "IDEA0", "ID": "3c05400d-64ea-4469-8859-813f8c2bde0a", "DetectTime": "2023-10-30T13:59:53.930330+02:00", "EventTime": "2023-10-30T13:59:53.930349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["C89QsDKHH2o5qm4A7"]} -{"Format": "IDEA0", "ID": "3efce3cf-9bd0-4adf-b878-c2da3b17f464", "DetectTime": "2023-10-30T13:59:53.961043+02:00", "EventTime": "2023-10-30T13:59:53.961071+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZHMBN3bnXa56DSfyd"]} -{"Format": "IDEA0", "ID": "cd3266bf-3d03-4e19-9569-37cd10dfbafa", "DetectTime": "2023-10-30T13:59:53.979528+02:00", "EventTime": "2023-10-30T13:59:53.979553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CE1oKS368opb6F171k"]} -{"Format": "IDEA0", "ID": "eae07e68-8bea-4527-b7cd-3cf6850562ab", "DetectTime": "2023-10-30T13:59:54.008965+02:00", "EventTime": "2023-10-30T13:59:54.008986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["ClqtYA36nAbTaHUroc"]} -{"Format": "IDEA0", "ID": "dabd5b2e-c476-4a1b-9882-99806d60caa6", "DetectTime": "2023-10-30T13:59:54.041492+02:00", "EventTime": "2023-10-30T13:59:54.041505+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0G2Po1Ui3T1aa6uy3"]} -{"Format": "IDEA0", "ID": "cabbc066-b7ea-4dce-a06b-2f34c228a13a", "DetectTime": "2023-10-30T13:59:54.061338+02:00", "EventTime": "2023-10-30T13:59:54.061358+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtXe33hzeevzpTI8f"]} -{"Format": "IDEA0", "ID": "dce24c0b-c800-4a8d-8924-aa26ae875c5d", "DetectTime": "2023-10-30T13:59:54.074540+02:00", "EventTime": "2023-10-30T13:59:54.074561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CzOlGe2DO1evpduV22"]} -{"Format": "IDEA0", "ID": "d9771262-70f2-44f4-ad87-b0f2e0452b93", "DetectTime": "2023-10-30T13:59:54.104714+02:00", "EventTime": "2023-10-30T13:59:54.104734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CQ2J5V1Ndni2JOrSkk"]} -{"Format": "IDEA0", "ID": "5195acbd-8fe6-4f5a-b24a-a0de75b5a549", "DetectTime": "2023-10-30T13:59:54.136165+02:00", "EventTime": "2023-10-30T13:59:54.136191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CvVrNq1ts2QH4GwFGf"]} -{"Format": "IDEA0", "ID": "430f30ac-c5f0-4b1a-8d61-0879de66b439", "DetectTime": "2023-10-30T13:59:54.165193+02:00", "EventTime": "2023-10-30T13:59:54.165208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["Cv60gu3xaDWCZAt7f3"]} -{"Format": "IDEA0", "ID": "ce652845-7b0f-4b47-954f-104c1bf8ae95", "DetectTime": "2023-10-30T13:59:54.196549+02:00", "EventTime": "2023-10-30T13:59:54.196569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["C5oOwf2Su59Xk1zbk7"]} -{"Format": "IDEA0", "ID": "9f8ce654-9d91-4c4c-be99-d3ffde87005a", "DetectTime": "2023-10-30T13:59:54.229048+02:00", "EventTime": "2023-10-30T13:59:54.229075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CDhZw84UmWpe4c7qw9"]} -{"Format": "IDEA0", "ID": "cfe98191-a14f-4906-8e16-1e4c570bf11d", "DetectTime": "2023-10-30T13:59:54.259355+02:00", "EventTime": "2023-10-30T13:59:54.259376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["Ct0ThrrAdSh5WqJMl"]} -{"Format": "IDEA0", "ID": "23520eea-8bed-4faf-9db5-287a623a8bc5", "DetectTime": "2023-10-30T13:59:54.289381+02:00", "EventTime": "2023-10-30T13:59:54.289403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CJEGd64VphQe745O57"]} -{"Format": "IDEA0", "ID": "0df33e8b-6cf2-4e19-8c33-714dcc415882", "DetectTime": "2023-10-30T13:59:54.327781+02:00", "EventTime": "2023-10-30T13:59:54.327800+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNAIZYoKuG73z9AMg"]} -{"Format": "IDEA0", "ID": "6757b27b-98de-4f1c-9ac1-0186e465d027", "DetectTime": "2023-10-30T13:59:54.339826+02:00", "EventTime": "2023-10-30T13:59:54.339847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["C2Tric16S13RerwB2h"]} -{"Format": "IDEA0", "ID": "c01b5b30-00e3-4c7d-b5e2-50311282a9fe", "DetectTime": "2023-10-30T13:59:54.375283+02:00", "EventTime": "2023-10-30T13:59:54.375308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CoEzOX2090FEE5sgQl"]} -{"Format": "IDEA0", "ID": "e0e3c888-4eae-487e-952d-22c5c2830c5d", "DetectTime": "2023-10-30T13:59:54.402757+02:00", "EventTime": "2023-10-30T13:59:54.402769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CLtuxX13Cb9Pvz2xm7"]} -{"Format": "IDEA0", "ID": "a2aeea9c-9022-40c7-935b-830060550440", "DetectTime": "2023-10-30T13:59:54.420319+02:00", "EventTime": "2023-10-30T13:59:54.420344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDtQJq1saJrYifnMI7", "CtXe33hzeevzpTI8f", "Cl9rQe2X6Sem0GPUke", "CZHMBN3bnXa56DSfyd"]} -{"Format": "IDEA0", "ID": "ad4e19c5-55db-4033-94a7-ee3197f068b7", "DetectTime": "2023-10-30T13:59:54.432720+02:00", "EventTime": "2023-10-30T13:59:54.432745+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDtQJq1saJrYifnMI7"]} -{"Format": "IDEA0", "ID": "09255d86-7da7-4b29-9324-ce3872577e10", "DetectTime": "2023-10-30T13:59:54.445951+02:00", "EventTime": "2023-10-30T13:59:54.445971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["C30fM54e21s46IsiZ6"]} -{"Format": "IDEA0", "ID": "80d35845-92d3-48e5-85fd-9793c664fc22", "DetectTime": "2023-10-30T13:59:54.477171+02:00", "EventTime": "2023-10-30T13:59:54.477190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.44.87 ", "ContentType": "text/plain"}], "uids": ["CsPKbh3W10gdLUz0ng"]} -{"Format": "IDEA0", "ID": "286daadf-2023-43cc-b4b2-f7c8c3f6034a", "DetectTime": "2023-10-30T13:59:54.505717+02:00", "EventTime": "2023-10-30T13:59:54.505746+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COx3r22zwatU7CAFM9"]} -{"Format": "IDEA0", "ID": "956d726b-43e6-4c62-b985-23ced3549497", "DetectTime": "2023-10-30T13:59:54.516898+02:00", "EventTime": "2023-10-30T13:59:54.516912+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwMsUD4yiMKso0Bs7f"]} -{"Format": "IDEA0", "ID": "da29aeb4-996c-409c-a360-c1b5971e9562", "DetectTime": "2023-10-30T13:59:54.528589+02:00", "EventTime": "2023-10-30T13:59:54.528606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CpuaX4sjSYZ65D3b"]} -{"Format": "IDEA0", "ID": "5ac499fe-2692-4e44-bd6f-9346bcc64fdb", "DetectTime": "2023-10-30T13:59:54.561317+02:00", "EventTime": "2023-10-30T13:59:54.561330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["CrxPgB1Q9Ku9zs3Znj"]} -{"Format": "IDEA0", "ID": "56ed1e44-8088-4138-a3b8-2fe98395c4b7", "DetectTime": "2023-10-30T13:59:54.590906+02:00", "EventTime": "2023-10-30T13:59:54.590937+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAWUuf144kWegPSZW7"]} -{"Format": "IDEA0", "ID": "12ab0381-1c08-4243-b869-51f8bd303409", "DetectTime": "2023-10-30T13:59:54.603111+02:00", "EventTime": "2023-10-30T13:59:54.603130+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cyyqot4GeoBwSS3w27"]} -{"Format": "IDEA0", "ID": "968caf71-b7e3-414a-ba04-a5cc0a67065c", "DetectTime": "2023-10-30T13:59:54.618414+02:00", "EventTime": "2023-10-30T13:59:54.618436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.6.136.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.6.136.20 ", "ContentType": "text/plain"}], "uids": ["CGIH3A1jnPs5DHxJO8"]} -{"Format": "IDEA0", "ID": "1d0b2b98-8504-4550-bc73-84a58cba973c", "DetectTime": "2023-10-30T13:59:54.649672+02:00", "EventTime": "2023-10-30T13:59:54.649685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CWtmN92dzG1Y1hMEmd"]} -{"Format": "IDEA0", "ID": "6e4f9fdd-864e-4f58-ae3c-6719676455e8", "DetectTime": "2023-10-30T13:59:54.679224+02:00", "EventTime": "2023-10-30T13:59:54.679248+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHaLLQ4S9iivxq5Zc"]} -{"Format": "IDEA0", "ID": "5ff3cf85-f4ee-46d8-8257-ee84184379b4", "DetectTime": "2023-10-30T13:59:54.689905+02:00", "EventTime": "2023-10-30T13:59:54.689928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.156.8 ", "ContentType": "text/plain"}], "uids": ["CM4iLatQD5BaWjYml"]} -{"Format": "IDEA0", "ID": "68bb048f-c4e5-42a9-a31e-683d98b07c61", "DetectTime": "2023-10-30T13:59:54.718378+02:00", "EventTime": "2023-10-30T13:59:54.718465+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C04MVy4EoqxE40hAi9"]} -{"Format": "IDEA0", "ID": "e15102f7-226d-46bf-a8a4-b474345d21df", "DetectTime": "2023-10-30T13:59:54.730024+02:00", "EventTime": "2023-10-30T13:59:54.730042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["Cfrhym1NiHrPDGncL3"]} -{"Format": "IDEA0", "ID": "31bddee9-2f1a-4e2e-a0b5-ad18478d9b4b", "DetectTime": "2023-10-30T13:59:54.756057+02:00", "EventTime": "2023-10-30T13:59:54.756076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CM5jFp23XktI7e3CO7"]} -{"Format": "IDEA0", "ID": "ee490319-9877-43dc-9d56-d9f770bdee11", "DetectTime": "2023-10-30T13:59:54.783141+02:00", "EventTime": "2023-10-30T13:59:54.783159+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaMEMJ1EufalEu0upf"]} -{"Format": "IDEA0", "ID": "e0b737d8-30f3-47e6-aeca-a2a6389c64cf", "DetectTime": "2023-10-30T13:59:54.793908+02:00", "EventTime": "2023-10-30T13:59:54.793926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.182 ", "ContentType": "text/plain"}], "uids": ["CjLbIF4HsoH2uqPDNk"]} -{"Format": "IDEA0", "ID": "2bbc5952-7a83-404f-b1a9-c0fbdabfd8fe", "DetectTime": "2023-10-30T13:59:54.820241+02:00", "EventTime": "2023-10-30T13:59:54.820260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.30.151 ", "ContentType": "text/plain"}], "uids": ["Cw7f76igb4RGPXbT3"]} -{"Format": "IDEA0", "ID": "91a1cf2e-b4a1-4c49-8164-f3f2d0d241a3", "DetectTime": "2023-10-30T13:59:54.850161+02:00", "EventTime": "2023-10-30T13:59:54.850178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZlLgmSx0oeSgCvRg", "C04MVy4EoqxE40hAi9", "Cyyqot4GeoBwSS3w27", "CwMsUD4yiMKso0Bs7f"]} -{"Format": "IDEA0", "ID": "e07121c6-15ed-40bf-a989-92b18b1e8afb", "DetectTime": "2023-10-30T13:59:54.861492+02:00", "EventTime": "2023-10-30T13:59:54.861514+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZlLgmSx0oeSgCvRg"]} -{"Format": "IDEA0", "ID": "7ea9182d-6c95-4d61-96d5-1f7365ac5ac5", "DetectTime": "2023-10-30T13:59:54.872710+02:00", "EventTime": "2023-10-30T13:59:54.872724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["C3uwAd37zJQBsP0hYk"]} -{"Format": "IDEA0", "ID": "89748fa5-73a2-49c8-b934-5d145d5257eb", "DetectTime": "2023-10-30T13:59:54.899397+02:00", "EventTime": "2023-10-30T13:59:54.899417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C3Xp213nVDvFZEqNcc"]} -{"Format": "IDEA0", "ID": "582e015e-0253-44c8-ae41-71ee2e68f2d9", "DetectTime": "2023-10-30T13:59:54.928575+02:00", "EventTime": "2023-10-30T13:59:54.928590+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJaKRkzQdwLYOa6b5"]} -{"Format": "IDEA0", "ID": "6891ee5a-28c1-40cb-8e41-8024cb24e46f", "DetectTime": "2023-10-30T13:59:54.939771+02:00", "EventTime": "2023-10-30T13:59:54.939788+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHoJb44WjaNZElAAm7"]} -{"Format": "IDEA0", "ID": "0a334890-b8a5-4bfc-8e42-006d875b3b13", "DetectTime": "2023-10-30T13:59:54.952893+02:00", "EventTime": "2023-10-30T13:59:54.952915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["Cn95AW3tGrke5yjzNf"]} -{"Format": "IDEA0", "ID": "1f6f2723-2f2c-43cc-b8ae-9deea6148cd6", "DetectTime": "2023-10-30T13:59:54.979566+02:00", "EventTime": "2023-10-30T13:59:54.979582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["CZqnzV2RuBAlzNnKG4"]} -{"Format": "IDEA0", "ID": "9d6334c6-c927-4678-ba6d-e0e02bf37d00", "DetectTime": "2023-10-30T13:59:55.008742+02:00", "EventTime": "2023-10-30T13:59:55.008767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CdIWWs8BsF0PWtcV4"]} -{"Format": "IDEA0", "ID": "4308b91a-7e89-4f31-a357-ee6871a9721a", "DetectTime": "2023-10-30T13:59:55.036822+02:00", "EventTime": "2023-10-30T13:59:55.036838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["C3m8pH3cTFLQ8wk9ld"]} -{"Format": "IDEA0", "ID": "7bb913c9-cfcc-465e-a027-b0cd5993be8b", "DetectTime": "2023-10-30T13:59:55.065590+02:00", "EventTime": "2023-10-30T13:59:55.065615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CTCmrC17H5sNwhwEX7"]} -{"Format": "IDEA0", "ID": "f446ea4e-3e17-449d-b520-31e14fddb48e", "DetectTime": "2023-10-30T13:59:55.098003+02:00", "EventTime": "2023-10-30T13:59:55.098023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CtE3GI29QduNQjEp4i"]} -{"Format": "IDEA0", "ID": "d00d030d-e78b-4f7d-afb1-c48828be4793", "DetectTime": "2023-10-30T13:59:55.126328+02:00", "EventTime": "2023-10-30T13:59:55.126347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.60.95.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.60.95.2 ", "ContentType": "text/plain"}], "uids": ["CPoApj2HVEFeYVpTn"]} -{"Format": "IDEA0", "ID": "90c44aa0-60b3-46d8-ad2e-b258e7e2121e", "DetectTime": "2023-10-30T13:59:55.156927+02:00", "EventTime": "2023-10-30T13:59:55.156939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.147.182.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.147.182.182 ", "ContentType": "text/plain"}], "uids": ["Cuzco5luYSW6GwBIh"]} -{"Format": "IDEA0", "ID": "a7f0d7e8-5166-46b4-b82e-752aaaf22851", "DetectTime": "2023-10-30T13:59:55.184215+02:00", "EventTime": "2023-10-30T13:59:55.184231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CjVRp42sNfdd1JVx2a"]} -{"Format": "IDEA0", "ID": "2739526e-bd5e-454a-813b-a7c1cd8da1e2", "DetectTime": "2023-10-30T13:59:55.210960+02:00", "EventTime": "2023-10-30T13:59:55.210976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["C4RBiK2m50XE9TKrp2"]} -{"Format": "IDEA0", "ID": "c53d3121-3cbc-419c-bacf-2ec284e01ad7", "DetectTime": "2023-10-30T13:59:55.233367+02:00", "EventTime": "2023-10-30T13:59:55.233382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.89.85 ", "ContentType": "text/plain"}], "uids": ["CIeMvD2NmubHGjcSq1"]} -{"Format": "IDEA0", "ID": "d6a1c526-9aad-4c37-a912-9550ac334e2c", "DetectTime": "2023-10-30T13:59:55.258727+02:00", "EventTime": "2023-10-30T13:59:55.258745+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtZONy2K0oU7JSCpo3"]} -{"Format": "IDEA0", "ID": "4cc6d023-cafa-4d20-bf01-231dc08a0c35", "DetectTime": "2023-10-30T13:59:55.268054+02:00", "EventTime": "2023-10-30T13:59:55.268064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CQ8DmK3F6hBo4CVjUb"]} -{"Format": "IDEA0", "ID": "ebe36a3b-bd87-4d15-afa5-de8d82cbe898", "DetectTime": "2023-10-30T13:59:55.292166+02:00", "EventTime": "2023-10-30T13:59:55.292191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.44.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.44.69 ", "ContentType": "text/plain"}], "uids": ["CpDNt52SOlgLbfkWrd"]} -{"Format": "IDEA0", "ID": "45beae22-c15f-4ba4-a0f6-698fee3351ef", "DetectTime": "2023-10-30T13:59:55.325229+02:00", "EventTime": "2023-10-30T13:59:55.325246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["Cj43O927OPeAa9Fv58"]} -{"Format": "IDEA0", "ID": "5bc2ce99-6b26-4ad6-b81b-cbdc57374f69", "DetectTime": "2023-10-30T13:59:55.346459+02:00", "EventTime": "2023-10-30T13:59:55.346480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.68.167.108 ", "ContentType": "text/plain"}], "uids": ["CY49go3dy0iS0nkwih"]} -{"Format": "IDEA0", "ID": "87c335bd-b486-4813-beca-dfee189daae8", "DetectTime": "2023-10-30T13:59:55.374017+02:00", "EventTime": "2023-10-30T13:59:55.374037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.190.93.78 ", "ContentType": "text/plain"}], "uids": ["CRPo6l3twvPGDVpZie"]} -{"Format": "IDEA0", "ID": "a2bc20af-d74f-4a70-8ec2-84e189bcc164", "DetectTime": "2023-10-30T13:59:55.401193+02:00", "EventTime": "2023-10-30T13:59:55.401213+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYfM143pyo9nepCh21"]} -{"Format": "IDEA0", "ID": "69c368fc-f2ca-4606-9c4c-bb0fa55483d5", "DetectTime": "2023-10-30T13:59:55.415867+02:00", "EventTime": "2023-10-30T13:59:55.415885+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ci2g9B1EZgnuqqX3Tb"]} -{"Format": "IDEA0", "ID": "7a37245e-149b-42b8-bfed-faccb211897a", "DetectTime": "2023-10-30T13:59:55.433013+02:00", "EventTime": "2023-10-30T13:59:55.433033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.232.196.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.232.196.228 ", "ContentType": "text/plain"}], "uids": ["Ci93r91oHQGtvhoy22"]} -{"Format": "IDEA0", "ID": "8603192f-ebea-4238-b485-b8d903921507", "DetectTime": "2023-10-30T13:59:55.462076+02:00", "EventTime": "2023-10-30T13:59:55.462093+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIOlBf2cRvAB4u5b6j"]} -{"Format": "IDEA0", "ID": "e706475e-e85c-4cd0-aa27-a4b0f1fd2333", "DetectTime": "2023-10-30T13:59:55.475237+02:00", "EventTime": "2023-10-30T13:59:55.475249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CykHLwOTZfu36GJG8"]} -{"Format": "IDEA0", "ID": "023185f5-4d7f-4877-845f-8bf49b93bd1e", "DetectTime": "2023-10-30T13:59:55.504023+02:00", "EventTime": "2023-10-30T13:59:55.504040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["Co1gbYVjqXQuVFko3"]} -{"Format": "IDEA0", "ID": "5f3c2d36-628d-4c3a-be68-e35815173a46", "DetectTime": "2023-10-30T13:59:55.599807+02:00", "EventTime": "2023-10-30T13:59:55.599823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrHWu93e9YfnWXlvh5"]} -{"Format": "IDEA0", "ID": "71202746-4d10-4aff-aff1-0a9ba9cf5da9", "DetectTime": "2023-10-30T13:59:55.630640+02:00", "EventTime": "2023-10-30T13:59:55.630658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["C3HOaM1XvN1Toi6gQc"]} -{"Format": "IDEA0", "ID": "b62b0c72-3f68-431c-93f1-b160736bda38", "DetectTime": "2023-10-30T13:59:55.656367+02:00", "EventTime": "2023-10-30T13:59:55.656383+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCfqGd4fiY5OZ71tJ7"]} -{"Format": "IDEA0", "ID": "5f8df070-9512-4468-b316-8ef11ddf23db", "DetectTime": "2023-10-30T13:59:55.671957+02:00", "EventTime": "2023-10-30T13:59:55.671977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.2.156.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.2.156.79 ", "ContentType": "text/plain"}], "uids": ["CcRdoj3PpM61lK2av1"]} -{"Format": "IDEA0", "ID": "da2c6ec7-97dd-4d4a-b63b-81a59fed9613", "DetectTime": "2023-10-30T13:59:55.706491+02:00", "EventTime": "2023-10-30T13:59:55.706512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C3AyAzcPcVgPgHmhg"]} -{"Format": "IDEA0", "ID": "da1afc4f-cbbe-4087-a35f-5f292d950e65", "DetectTime": "2023-10-30T13:59:55.739651+02:00", "EventTime": "2023-10-30T13:59:55.739666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYfM143pyo9nepCh21", "CIOlBf2cRvAB4u5b6j", "CrUQAP3vEACgsbyNzj", "CHoJb44WjaNZElAAm7"]} -{"Format": "IDEA0", "ID": "3c0a9dc0-9fc9-41f8-80ba-3c524df409c5", "DetectTime": "2023-10-30T13:59:55.756623+02:00", "EventTime": "2023-10-30T13:59:55.756648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrUQAP3vEACgsbyNzj"]} -{"Format": "IDEA0", "ID": "5db43c2f-3ed1-4ad0-8d7e-e004aefd5e0e", "DetectTime": "2023-10-30T13:59:55.773616+02:00", "EventTime": "2023-10-30T13:59:55.773631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CVgjMj2IJUJIU9JAek"]} -{"Format": "IDEA0", "ID": "c769a33c-2f20-4086-b0b3-25cf1c09fa3e", "DetectTime": "2023-10-30T13:59:55.801235+02:00", "EventTime": "2023-10-30T13:59:55.801252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.151.250.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.151.250.100 ", "ContentType": "text/plain"}], "uids": ["CmSJQo1mp3k9G3ZDz2"]} -{"Format": "IDEA0", "ID": "920be903-5ae6-4dd4-a5ea-a339190d4402", "DetectTime": "2023-10-30T13:59:55.822465+02:00", "EventTime": "2023-10-30T13:59:55.822481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["Cg2Y3d32TThmdQcrMd"]} -{"Format": "IDEA0", "ID": "5eed74f2-4253-4a46-a1a8-98e26892d5e2", "DetectTime": "2023-10-30T13:59:55.849965+02:00", "EventTime": "2023-10-30T13:59:55.849979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.33.151.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.33.151.168 ", "ContentType": "text/plain"}], "uids": ["CfF6C42Zrexwymgsea"]} -{"Format": "IDEA0", "ID": "8fb06381-a8cb-4aec-8d8b-08514035dfa2", "DetectTime": "2023-10-30T13:59:55.879201+02:00", "EventTime": "2023-10-30T13:59:55.879220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.138.17.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.138.17.51 ", "ContentType": "text/plain"}], "uids": ["ClT8mi4vV509LtqyDi"]} -{"Format": "IDEA0", "ID": "032cfa22-e584-4961-abe5-a800a99170cc", "DetectTime": "2023-10-30T13:59:55.906709+02:00", "EventTime": "2023-10-30T13:59:55.906730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["208.2.86.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 208.2.86.27 ", "ContentType": "text/plain"}], "uids": ["CeMhVv2kew1quoCuej"]} -{"Format": "IDEA0", "ID": "343e4438-d214-4cb4-8b36-0684ce376c98", "DetectTime": "2023-10-30T13:59:55.931784+02:00", "EventTime": "2023-10-30T13:59:55.931796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.198.175.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.198.175.145 ", "ContentType": "text/plain"}], "uids": ["CeYqN01ZRx4r8KhDYf"]} -{"Format": "IDEA0", "ID": "d44a495c-ffec-4ae4-800d-ecc32e728cd0", "DetectTime": "2023-10-30T13:59:55.957760+02:00", "EventTime": "2023-10-30T13:59:55.957778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CosRqj47egP4JVO4C"]} -{"Format": "IDEA0", "ID": "0b365e05-8c9c-42b2-a3fc-8bfcc49df991", "DetectTime": "2023-10-30T13:59:55.986280+02:00", "EventTime": "2023-10-30T13:59:55.986295+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbWBxJ2iZB4vp1iUbj"]} -{"Format": "IDEA0", "ID": "9d239551-f3aa-405a-b988-f6bfdca048aa", "DetectTime": "2023-10-30T13:59:56.003825+02:00", "EventTime": "2023-10-30T13:59:56.003880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["Cb0vfi3MM76QedhaGe"]} -{"Format": "IDEA0", "ID": "9455973f-f6ad-4483-89f2-6b352ddfe874", "DetectTime": "2023-10-30T13:59:56.032052+02:00", "EventTime": "2023-10-30T13:59:56.032072+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5nPTL2PgTU4fiLrCk"]} -{"Format": "IDEA0", "ID": "d9e1b4d8-e5c8-4679-b835-b0f15d24fda1", "DetectTime": "2023-10-30T13:59:56.047050+02:00", "EventTime": "2023-10-30T13:59:56.047066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.110.178.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.110.178.147 ", "ContentType": "text/plain"}], "uids": ["CNYUqo26ihIPqncdNc"]} -{"Format": "IDEA0", "ID": "ebc692b8-d5d9-426b-9045-fb086d7d52e9", "DetectTime": "2023-10-30T13:59:56.072915+02:00", "EventTime": "2023-10-30T13:59:56.072931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["C9c2Tp3OvcjTuo6K6b"]} -{"Format": "IDEA0", "ID": "86c7e70b-9d3b-4d33-93fe-47e902154a38", "DetectTime": "2023-10-30T13:59:56.100433+02:00", "EventTime": "2023-10-30T13:59:56.100448+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCL9BA163o4741lgof"]} -{"Format": "IDEA0", "ID": "d89ce085-1e83-4c37-8e8b-da12648b92f4", "DetectTime": "2023-10-30T13:59:56.115865+02:00", "EventTime": "2023-10-30T13:59:56.115879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.9.154.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.9.154.197 ", "ContentType": "text/plain"}], "uids": ["CmJJb14bR5jzW3RWP6"]} -{"Format": "IDEA0", "ID": "f458fb91-4d85-4740-9c73-5920e2445c8b", "DetectTime": "2023-10-30T13:59:56.144607+02:00", "EventTime": "2023-10-30T13:59:56.144624+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHG00n2NvhfFjUJbyc"]} -{"Format": "IDEA0", "ID": "8e2c9bee-3d1f-4965-8621-7fddf7cd2b51", "DetectTime": "2023-10-30T13:59:56.160848+02:00", "EventTime": "2023-10-30T13:59:56.160872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.199.127.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.199.127.93 ", "ContentType": "text/plain"}], "uids": ["CFiEDjBa88P5p2KSf"]} -{"Format": "IDEA0", "ID": "fee14d0e-1eed-4271-a654-7928fe6e22af", "DetectTime": "2023-10-30T13:59:56.196932+02:00", "EventTime": "2023-10-30T13:59:56.196954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.46.210.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.46.210.10 ", "ContentType": "text/plain"}], "uids": ["CtecfS3GRrFG9KYZr8"]} -{"Format": "IDEA0", "ID": "530f59e9-34ab-42a2-9cae-b6d94b75b39e", "DetectTime": "2023-10-30T13:59:56.222621+02:00", "EventTime": "2023-10-30T13:59:56.222637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.130.195.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.130.195.231 ", "ContentType": "text/plain"}], "uids": ["Ckl2qv1DCaJUXXJClj"]} -{"Format": "IDEA0", "ID": "d6fea3a7-485d-408c-b94e-25fd216e7ca1", "DetectTime": "2023-10-30T13:59:56.249852+02:00", "EventTime": "2023-10-30T13:59:56.249875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.52.51.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.52.51.102 ", "ContentType": "text/plain"}], "uids": ["C9MI1a3P3x3BhPy5bc"]} -{"Format": "IDEA0", "ID": "82ad3c40-e46c-4385-9d33-9e01109d7ae6", "DetectTime": "2023-10-30T13:59:56.278027+02:00", "EventTime": "2023-10-30T13:59:56.278045+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cf3s2s1pP2s0bpr0D6"]} -{"Format": "IDEA0", "ID": "d5b515cb-6bbb-4845-8d5d-0d97b77d6257", "DetectTime": "2023-10-30T13:59:56.295675+02:00", "EventTime": "2023-10-30T13:59:56.295701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.171.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.171.106 ", "ContentType": "text/plain"}], "uids": ["Cbayjf12ackPndYn8c"]} -{"Format": "IDEA0", "ID": "9d792ab2-3792-4fd1-871a-0b474f9a573c", "DetectTime": "2023-10-30T13:59:56.323154+02:00", "EventTime": "2023-10-30T13:59:56.323176+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHXlFw1WEmMLGOfAz7"]} -{"Format": "IDEA0", "ID": "659a1c5a-42b2-4328-83a8-3b9d7b0e8b9d", "DetectTime": "2023-10-30T13:59:56.338468+02:00", "EventTime": "2023-10-30T13:59:56.338480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.49.45.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.49.45.200 ", "ContentType": "text/plain"}], "uids": ["CdMqZo1BH5RaUOOx3g"]} -{"Format": "IDEA0", "ID": "a078a81e-8a1a-49cc-8b51-25d8f5416e87", "DetectTime": "2023-10-30T13:59:56.369864+02:00", "EventTime": "2023-10-30T13:59:56.369880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.173.238.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.173.238.41 ", "ContentType": "text/plain"}], "uids": ["CVxO7F4E9E3mSnUFL5"]} -{"Format": "IDEA0", "ID": "117c4fda-43f8-4184-8a51-325059a1eb55", "DetectTime": "2023-10-30T13:59:56.397195+02:00", "EventTime": "2023-10-30T13:59:56.397213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.46.172.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.46.172.13 ", "ContentType": "text/plain"}], "uids": ["Ce6yBJ3GfIC2AO8PTf"]} -{"Format": "IDEA0", "ID": "b727cc26-b21c-4391-a3c0-57133fede85e", "DetectTime": "2023-10-30T13:59:56.422574+02:00", "EventTime": "2023-10-30T13:59:56.422593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.27.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.27.248 ", "ContentType": "text/plain"}], "uids": ["Cp7y6C1djALlXsFyV3"]} -{"Format": "IDEA0", "ID": "0c930060-17c1-49be-8748-ce56e13fe7f6", "DetectTime": "2023-10-30T13:59:56.451848+02:00", "EventTime": "2023-10-30T13:59:56.451869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.233.38.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.233.38.152 ", "ContentType": "text/plain"}], "uids": ["CursVF2Qtm5qQxZUM4"]} -{"Format": "IDEA0", "ID": "f4ae236f-4963-46ad-a781-714627055d14", "DetectTime": "2023-10-30T13:59:56.477167+02:00", "EventTime": "2023-10-30T13:59:56.477184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cl3Et031K4ILl6kNLg"]} -{"Format": "IDEA0", "ID": "93a12a0d-20d6-49ab-9e28-bf74f7e4d842", "DetectTime": "2023-10-30T13:59:56.492443+02:00", "EventTime": "2023-10-30T13:59:56.492464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.235.76.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.235.76.4 ", "ContentType": "text/plain"}], "uids": ["Cv02Ec1t0V8F1Zwgp"]} -{"Format": "IDEA0", "ID": "e8d25cd8-d383-450a-9b5c-fd3b885ce3b0", "DetectTime": "2023-10-30T13:59:56.523654+02:00", "EventTime": "2023-10-30T13:59:56.523674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.183.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.183.152 ", "ContentType": "text/plain"}], "uids": ["C7ByKJ2Acp2BJvD8F2"]} -{"Format": "IDEA0", "ID": "656f509d-f1a0-4538-ab8b-576b101d26c1", "DetectTime": "2023-10-30T13:59:56.552027+02:00", "EventTime": "2023-10-30T13:59:56.552046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CHXlFw1WEmMLGOfAz7", "CHG00n2NvhfFjUJbyc", "CykTjO33hzQ3p8UJh2", "C5nPTL2PgTU4fiLrCk"]} -{"Format": "IDEA0", "ID": "cfe4aca6-0ebe-4bd6-bb92-6905ca0e9021", "DetectTime": "2023-10-30T13:59:56.569962+02:00", "EventTime": "2023-10-30T13:59:56.569979+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CykTjO33hzQ3p8UJh2"]} -{"Format": "IDEA0", "ID": "a1d2c323-6466-49e5-bdfb-8223ab2f9af9", "DetectTime": "2023-10-30T13:59:56.586040+02:00", "EventTime": "2023-10-30T13:59:56.586056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.214.16.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.214.16.151 ", "ContentType": "text/plain"}], "uids": ["CRwLqdHGPLGybQdt8"]} -{"Format": "IDEA0", "ID": "5d1b2e5c-f2e8-4e9f-82b0-865b20ea72b7", "DetectTime": "2023-10-30T13:59:56.613463+02:00", "EventTime": "2023-10-30T13:59:56.613479+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPGfan1ZjZOBc8SGGl"]} -{"Format": "IDEA0", "ID": "2cd6b6ea-f3a4-4cd9-a512-d03649353598", "DetectTime": "2023-10-30T13:59:56.631368+02:00", "EventTime": "2023-10-30T13:59:56.631390+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHuDLoFYb4Oyt6Kg6"]} -{"Format": "IDEA0", "ID": "f834c51b-7fe0-43de-a698-f6c6f17e1b10", "DetectTime": "2023-10-30T13:59:56.649651+02:00", "EventTime": "2023-10-30T13:59:56.649677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["39.32.142.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 39.32.142.180 ", "ContentType": "text/plain"}], "uids": ["CNn2514MCGuYLjiuc"]} -{"Format": "IDEA0", "ID": "0695bdef-0519-40d1-838d-0f1bfa1405f8", "DetectTime": "2023-10-30T13:59:56.677077+02:00", "EventTime": "2023-10-30T13:59:56.677096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["204.155.61.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 204.155.61.5 ", "ContentType": "text/plain"}], "uids": ["CwmX0I3DGCdgFGaISk"]} -{"Format": "IDEA0", "ID": "9dfcc3d7-ae2e-472c-91a4-6149648fbd26", "DetectTime": "2023-10-30T13:59:56.705448+02:00", "EventTime": "2023-10-30T13:59:56.705464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.230.140.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.230.140.231 ", "ContentType": "text/plain"}], "uids": ["CTx7fK10NIcnSBY1wc"]} -{"Format": "IDEA0", "ID": "f1c3b6f8-d707-48aa-a958-fed72324e70c", "DetectTime": "2023-10-30T13:59:56.735080+02:00", "EventTime": "2023-10-30T13:59:56.735097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.232.28.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.232.28.15 ", "ContentType": "text/plain"}], "uids": ["CQxggG1LwHaYfcSjTl"]} -{"Format": "IDEA0", "ID": "2f57ce39-4c55-432c-a09f-a52d4fbb24aa", "DetectTime": "2023-10-30T13:59:56.761497+02:00", "EventTime": "2023-10-30T13:59:56.761514+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyXLC33D9qgEiSRBIg"]} -{"Format": "IDEA0", "ID": "1d18768d-8e75-4732-8253-9253146ba991", "DetectTime": "2023-10-30T13:59:56.776882+02:00", "EventTime": "2023-10-30T13:59:56.776893+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDVoLI1rA88QQ1ujC5"]} -{"Format": "IDEA0", "ID": "a256c18e-be0d-4b58-a985-61601bf42523", "DetectTime": "2023-10-30T13:59:56.790534+02:00", "EventTime": "2023-10-30T13:59:56.790555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CF6Mci4dRJpvmaCS79"]} -{"Format": "IDEA0", "ID": "38754d77-d5b0-4fce-8550-63123eb3c242", "DetectTime": "2023-10-30T13:59:56.817858+02:00", "EventTime": "2023-10-30T13:59:56.817877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.208.123.138 ", "ContentType": "text/plain"}], "uids": ["CfaeJE3Qr7eDtcLrji"]} -{"Format": "IDEA0", "ID": "85d333e9-195f-4446-a39a-826f28b2a90c", "DetectTime": "2023-10-30T13:59:56.846193+02:00", "EventTime": "2023-10-30T13:59:56.846209+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMkZSQ1D3ZMMxkd076"]} -{"Format": "IDEA0", "ID": "9f9c0b69-067c-41e1-be49-a74ea262f361", "DetectTime": "2023-10-30T13:59:56.864083+02:00", "EventTime": "2023-10-30T13:59:56.864104+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7RZ2h3UnAtH9vb2o2"]} -{"Format": "IDEA0", "ID": "50796e99-848f-4e19-bdb0-aeacafd55a3a", "DetectTime": "2023-10-30T13:59:56.879297+02:00", "EventTime": "2023-10-30T13:59:56.879307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Cs4X2G3UBHVPoclGWa"]} -{"Format": "IDEA0", "ID": "c4361d5a-00fc-429a-9f29-b4407e1e98e1", "DetectTime": "2023-10-30T13:59:56.909496+02:00", "EventTime": "2023-10-30T13:59:56.909513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CROIgp3FpHfi2cq26i"]} -{"Format": "IDEA0", "ID": "ec6a6782-3b33-4f36-afa5-50c53a7247e0", "DetectTime": "2023-10-30T13:59:56.927736+02:00", "EventTime": "2023-10-30T13:59:56.927754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.233.116.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.233.116.80 ", "ContentType": "text/plain"}], "uids": ["ChLaFD4BhFB23T4V8i"]} -{"Format": "IDEA0", "ID": "2f318581-b64a-4cf6-8532-589b760439eb", "DetectTime": "2023-10-30T13:59:56.955829+02:00", "EventTime": "2023-10-30T13:59:56.955846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C7RZ2h3UnAtH9vb2o2", "CJQcgj4JLJspDleWn", "CDVoLI1rA88QQ1ujC5", "CHuDLoFYb4Oyt6Kg6"]} -{"Format": "IDEA0", "ID": "4cdcc2a6-2fb4-4f1b-8e55-1584df0c652a", "DetectTime": "2023-10-30T13:59:56.971010+02:00", "EventTime": "2023-10-30T13:59:56.971026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.191.232.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.191.232.162 ", "ContentType": "text/plain"}], "uids": ["C90pbg4uEytHNOp7ea"]} -{"Format": "IDEA0", "ID": "7b7b6adc-0d87-44d2-8592-fd4de0116fa2", "DetectTime": "2023-10-30T13:59:56.997895+02:00", "EventTime": "2023-10-30T13:59:56.997914+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJQcgj4JLJspDleWn"]} -{"Format": "IDEA0", "ID": "18aa1242-ffe2-4a79-ad98-13c17c1ae1ed", "DetectTime": "2023-10-30T13:59:57.019971+02:00", "EventTime": "2023-10-30T13:59:57.019992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["Cv13b11FQCXf4G3hR6"]} -{"Format": "IDEA0", "ID": "f42cdeda-6601-4d62-8499-0d8f5f4aa20d", "DetectTime": "2023-10-30T13:59:57.049939+02:00", "EventTime": "2023-10-30T13:59:57.049959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.93.140.11 ", "ContentType": "text/plain"}], "uids": ["CjRf1uC1bEeVqS6mj"]} -{"Format": "IDEA0", "ID": "c4fcfc67-e4e6-414c-8af0-df913d965bc2", "DetectTime": "2023-10-30T13:59:57.082912+02:00", "EventTime": "2023-10-30T13:59:57.082929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.145.211"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.145.211 ", "ContentType": "text/plain"}], "uids": ["CVMLur4kVCa5jXF7Le"]} -{"Format": "IDEA0", "ID": "de803e53-f0f4-4cb0-96c4-aa477d9adde0", "DetectTime": "2023-10-30T13:59:57.110608+02:00", "EventTime": "2023-10-30T13:59:57.110621+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cpqvy88S6khiKQHz7"]} -{"Format": "IDEA0", "ID": "75e412a9-62bf-49b5-95c5-2e98f8041203", "DetectTime": "2023-10-30T13:59:57.125722+02:00", "EventTime": "2023-10-30T13:59:57.125734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.121.4.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.121.4.95 ", "ContentType": "text/plain"}], "uids": ["Cumtjz34CL6GpRcSe3"]} -{"Format": "IDEA0", "ID": "9f3d2955-bc13-496d-99b7-e35949d56821", "DetectTime": "2023-10-30T13:59:57.153605+02:00", "EventTime": "2023-10-30T13:59:57.153618+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxXsoX1dlLkdyQ6Cp7"]} -{"Format": "IDEA0", "ID": "9e18110c-cff9-41fa-8de9-3ba51becfbe0", "DetectTime": "2023-10-30T13:59:57.168166+02:00", "EventTime": "2023-10-30T13:59:57.168186+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJ9Qzn1jxnjajvuPY8"]} -{"Format": "IDEA0", "ID": "6cbd3848-e109-48c9-92f6-990e9a1c0fdf", "DetectTime": "2023-10-30T13:59:57.185685+02:00", "EventTime": "2023-10-30T13:59:57.185704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.69.138.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.69.138.127 ", "ContentType": "text/plain"}], "uids": ["Cj5riU1oHw70ux76a5"]} -{"Format": "IDEA0", "ID": "3ef8b51c-036c-40b9-8286-e40aa048d78a", "DetectTime": "2023-10-30T13:59:57.212791+02:00", "EventTime": "2023-10-30T13:59:57.212814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CfaSVEUHGuwVnUFC9"]} -{"Format": "IDEA0", "ID": "34d7c879-21c1-4b6a-aa83-cbb9f94b82a5", "DetectTime": "2023-10-30T13:59:57.239762+02:00", "EventTime": "2023-10-30T13:59:57.239787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.56.118.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.56.118.106 ", "ContentType": "text/plain"}], "uids": ["C6tAMHsLHm4oGMP44"]} -{"Format": "IDEA0", "ID": "2af8ba78-1509-4b44-9baf-1477c73c56c3", "DetectTime": "2023-10-30T13:59:57.265006+02:00", "EventTime": "2023-10-30T13:59:57.265023+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cyf0I54YHp6op3ord4"]} -{"Format": "IDEA0", "ID": "f05911a8-d742-4453-a1f5-970026983959", "DetectTime": "2023-10-30T13:59:57.281762+02:00", "EventTime": "2023-10-30T13:59:57.281783+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSliRE3GGR8YYyuLec"]} -{"Format": "IDEA0", "ID": "16052724-372b-4e4d-932d-32d95e6e0bc8", "DetectTime": "2023-10-30T13:59:57.295650+02:00", "EventTime": "2023-10-30T13:59:57.295663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.138.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.138.33 ", "ContentType": "text/plain"}], "uids": ["CvlS6X3X8zMngioph9"]} -{"Format": "IDEA0", "ID": "330a279b-0658-4131-82a1-04da816b1a54", "DetectTime": "2023-10-30T13:59:57.318737+02:00", "EventTime": "2023-10-30T13:59:57.318753+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C39UvIxSN75ozUHyj"]} -{"Format": "IDEA0", "ID": "3c629ac5-2290-4144-9aaf-2cf551f61e12", "DetectTime": "2023-10-30T13:59:57.336318+02:00", "EventTime": "2023-10-30T13:59:57.336330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.92.75.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.92.75.150 ", "ContentType": "text/plain"}], "uids": ["CZNhaT3HLtzt9z1Yb2"]} -{"Format": "IDEA0", "ID": "15442282-3257-428a-88f6-0b624a9a6927", "DetectTime": "2023-10-30T13:59:57.356254+02:00", "EventTime": "2023-10-30T13:59:57.356265+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CN8aVW1bMZK6RMuTGj"]} -{"Format": "IDEA0", "ID": "a04c4936-1770-4dc0-b840-a25156982e28", "DetectTime": "2023-10-30T13:59:57.371428+02:00", "EventTime": "2023-10-30T13:59:57.371454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.149.98.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.149.98.57 ", "ContentType": "text/plain"}], "uids": ["CF6Pe94hhEXEkSxl9"]} -{"Format": "IDEA0", "ID": "c03db211-706b-4ed2-b411-55108dc26b93", "DetectTime": "2023-10-30T13:59:57.401889+02:00", "EventTime": "2023-10-30T13:59:57.401905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.248.150.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.248.150.48 ", "ContentType": "text/plain"}], "uids": ["CJH3Ay1nQ2h8SivZR3"]} -{"Format": "IDEA0", "ID": "41c85ebd-5dbb-4fd2-b7c5-66b4c1cabd5a", "DetectTime": "2023-10-30T13:59:57.424630+02:00", "EventTime": "2023-10-30T13:59:57.424648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.146.8.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.146.8.154 ", "ContentType": "text/plain"}], "uids": ["CdBcKE3aAuHsUvzkeg"]} -{"Format": "IDEA0", "ID": "7eab0a40-d336-47a1-961b-feb1c7752a81", "DetectTime": "2023-10-30T13:59:57.449906+02:00", "EventTime": "2023-10-30T13:59:57.449921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cyf0I54YHp6op3ord4", "CNAW2Eh0uu4VCehG2", "C39UvIxSN75ozUHyj", "CxXsoX1dlLkdyQ6Cp7"]} -{"Format": "IDEA0", "ID": "28694611-e20e-4773-8aa1-297f888b2db5", "DetectTime": "2023-10-30T13:59:57.464900+02:00", "EventTime": "2023-10-30T13:59:57.464917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.136.48.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.136.48.204 ", "ContentType": "text/plain"}], "uids": ["CT0e0i1PtfAQVHtdM9"]} -{"Format": "IDEA0", "ID": "0fe24d67-08ea-4f5d-8aa7-f7773f8b0360", "DetectTime": "2023-10-30T13:59:57.493330+02:00", "EventTime": "2023-10-30T13:59:57.493347+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNAW2Eh0uu4VCehG2"]} -{"Format": "IDEA0", "ID": "314f38b2-4f8d-4e68-ba16-bbfacae1fe1b", "DetectTime": "2023-10-30T13:59:57.508796+02:00", "EventTime": "2023-10-30T13:59:57.508818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.80.15.32"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.80.15.32 ", "ContentType": "text/plain"}], "uids": ["C7PchFrXBSgxeiQMk"]} -{"Format": "IDEA0", "ID": "09fe6258-037d-4ebd-b953-a63ab7e6049a", "DetectTime": "2023-10-30T13:59:57.532224+02:00", "EventTime": "2023-10-30T13:59:57.532243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.237.70.170 ", "ContentType": "text/plain"}], "uids": ["C6yab41U9Ty5h9mDT1"]} -{"Format": "IDEA0", "ID": "ed11cd95-3776-4b62-a34a-33ff08c1e8ef", "DetectTime": "2023-10-30T13:59:57.559778+02:00", "EventTime": "2023-10-30T13:59:57.559797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.37.223.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.37.223.51 ", "ContentType": "text/plain"}], "uids": ["Cxt3clE1H5YsHk6i1"]} -{"Format": "IDEA0", "ID": "f080c721-54ac-49e4-9baf-577362ab141a", "DetectTime": "2023-10-30T13:59:57.586466+02:00", "EventTime": "2023-10-30T13:59:57.586478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.61.30.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.61.30.24 ", "ContentType": "text/plain"}], "uids": ["C83jn92kykeOykqo81"]} -{"Format": "IDEA0", "ID": "7a110aa7-9515-4c10-94dc-93a09d7e49ed", "DetectTime": "2023-10-30T13:59:57.612979+02:00", "EventTime": "2023-10-30T13:59:57.613007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYZ7EI2YeLzBVU2At4"]} -{"Format": "IDEA0", "ID": "085c016b-f50c-4140-a95d-d250b8318396", "DetectTime": "2023-10-30T13:59:57.628418+02:00", "EventTime": "2023-10-30T13:59:57.628434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.148.188.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.148.188.0 ", "ContentType": "text/plain"}], "uids": ["CwrUZQ2VIhkcv18fd"]} -{"Format": "IDEA0", "ID": "74d55f67-d077-4037-9194-5f4158b05c89", "DetectTime": "2023-10-30T13:59:57.652405+02:00", "EventTime": "2023-10-30T13:59:57.652420+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVHJrC4ozlZN0t2oZj"]} -{"Format": "IDEA0", "ID": "0e46580f-4f1a-425f-a43a-d865e680451e", "DetectTime": "2023-10-30T13:59:57.667214+02:00", "EventTime": "2023-10-30T13:59:57.667229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.76.136.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.76.136.162 ", "ContentType": "text/plain"}], "uids": ["CzBnFDDRWWLWGmlXf"]} -{"Format": "IDEA0", "ID": "fafb5e8b-a316-425a-a5c8-e0db1e3d6d15", "DetectTime": "2023-10-30T13:59:57.756057+02:00", "EventTime": "2023-10-30T13:59:57.756078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.104.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.104.33 ", "ContentType": "text/plain"}], "uids": ["CsZd4w3MosezkMTdq3"]} -{"Format": "IDEA0", "ID": "8ebda2bb-f33d-4163-acd7-4e7d232557e9", "DetectTime": "2023-10-30T13:59:57.787101+02:00", "EventTime": "2023-10-30T13:59:57.787119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.158.193.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.158.193.82 ", "ContentType": "text/plain"}], "uids": ["COAisyEf3m0LPc1Za"]} -{"Format": "IDEA0", "ID": "9af625cc-d6b8-4b40-9262-17ba468d4bcf", "DetectTime": "2023-10-30T13:59:57.815706+02:00", "EventTime": "2023-10-30T13:59:57.815723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.106.107.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.106.107.14 ", "ContentType": "text/plain"}], "uids": ["C1ld8B37OEbzYijQp2"]} -{"Format": "IDEA0", "ID": "445f6f07-f496-4593-9851-3ee230b3f4d1", "DetectTime": "2023-10-30T13:59:57.844203+02:00", "EventTime": "2023-10-30T13:59:57.844219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.149.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.193.149.63 ", "ContentType": "text/plain"}], "uids": ["Cdkas83x35uad3Mb2d"]} -{"Format": "IDEA0", "ID": "cc9b987d-69b6-4e52-9198-ed77056d38ac", "DetectTime": "2023-10-30T13:59:57.873701+02:00", "EventTime": "2023-10-30T13:59:57.873735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.17.72 ", "ContentType": "text/plain"}], "uids": ["CkwcpR3avAipr5Edga"]} -{"Format": "IDEA0", "ID": "ce22d8a8-c96d-484d-b277-3f5a6a2c0122", "DetectTime": "2023-10-30T13:59:57.899520+02:00", "EventTime": "2023-10-30T13:59:57.899536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.214.92.208"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.214.92.208 ", "ContentType": "text/plain"}], "uids": ["CgEnEz3hEpab9VyOLb"]} -{"Format": "IDEA0", "ID": "da8632cc-72ca-4946-87d1-b496ad5a51d0", "DetectTime": "2023-10-30T13:59:57.927108+02:00", "EventTime": "2023-10-30T13:59:57.927125+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTnpUy3Y213dXFC4Kk"]} -{"Format": "IDEA0", "ID": "531d5e5d-b0cb-4b47-8aad-9baa12b5e415", "DetectTime": "2023-10-30T13:59:57.942717+02:00", "EventTime": "2023-10-30T13:59:57.942732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CkRiY14Gqks0DMRm8c"]} -{"Format": "IDEA0", "ID": "597b2116-cb63-4a19-8071-110f63d6bb1a", "DetectTime": "2023-10-30T13:59:57.969911+02:00", "EventTime": "2023-10-30T13:59:57.969928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.231.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.231.100 ", "ContentType": "text/plain"}], "uids": ["CBaskg1BwbAyUsJGSd"]} -{"Format": "IDEA0", "ID": "384580b5-cabb-45b6-836c-f2da736ce41d", "DetectTime": "2023-10-30T13:59:58.000048+02:00", "EventTime": "2023-10-30T13:59:58.000064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.97.35.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.97.35.111 ", "ContentType": "text/plain"}], "uids": ["CsN62IilcO3cynCig"]} -{"Format": "IDEA0", "ID": "f3448541-741d-4b62-9658-045cb8eaa013", "DetectTime": "2023-10-30T13:59:58.032366+02:00", "EventTime": "2023-10-30T13:59:58.032383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CqlVQs2ZLpbZTSSN1"]} -{"Format": "IDEA0", "ID": "634fb9c9-9d78-41ac-b709-cb56de091a69", "DetectTime": "2023-10-30T13:59:58.061486+02:00", "EventTime": "2023-10-30T13:59:58.061502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.65.190.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.65.190.144 ", "ContentType": "text/plain"}], "uids": ["CkZpdGhjcc0Xrp5lk"]} -{"Format": "IDEA0", "ID": "ee697c88-be39-4218-80d7-b1ded0015026", "DetectTime": "2023-10-30T13:59:58.094498+02:00", "EventTime": "2023-10-30T13:59:58.094510+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cx5uHl4gvXcukp8Pa6"]} -{"Format": "IDEA0", "ID": "124e16eb-f144-47e7-91f8-218d80312bb9", "DetectTime": "2023-10-30T13:59:58.113259+02:00", "EventTime": "2023-10-30T13:59:58.113271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.253.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.253.100 ", "ContentType": "text/plain"}], "uids": ["CVJ9733JdMveWRYw4g"]} -{"Format": "IDEA0", "ID": "d1724fea-2bd0-431a-bf88-4906d2119ac3", "DetectTime": "2023-10-30T13:59:58.144337+02:00", "EventTime": "2023-10-30T13:59:58.144354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.243.180.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.243.180.176 ", "ContentType": "text/plain"}], "uids": ["CAyrCM38aeVESCh45a"]} -{"Format": "IDEA0", "ID": "8e3dbfc4-13cc-462a-965c-ac83531cc41a", "DetectTime": "2023-10-30T13:59:58.175004+02:00", "EventTime": "2023-10-30T13:59:58.175021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.2.156.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.2.156.19 ", "ContentType": "text/plain"}], "uids": ["Cqb4Y922mmpUKAbo23"]} -{"Format": "IDEA0", "ID": "33c474bb-d839-4ac5-a707-0e9b8fdad926", "DetectTime": "2023-10-30T13:59:58.203034+02:00", "EventTime": "2023-10-30T13:59:58.203053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.77.231.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.77.231.101 ", "ContentType": "text/plain"}], "uids": ["CtDTPi2frQMx5w5ipg"]} -{"Format": "IDEA0", "ID": "ad1fb530-93c2-4df6-925b-5f5c1c2b7de6", "DetectTime": "2023-10-30T13:59:58.233398+02:00", "EventTime": "2023-10-30T13:59:58.233417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.58.78.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.58.78.249 ", "ContentType": "text/plain"}], "uids": ["Cs7rFf47yxdWljIK06"]} -{"Format": "IDEA0", "ID": "517d9eba-bcd4-41cb-beb1-14f02e295006", "DetectTime": "2023-10-30T13:59:58.262942+02:00", "EventTime": "2023-10-30T13:59:58.262956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.155.171.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.155.171.95 ", "ContentType": "text/plain"}], "uids": ["CWdUwz1OWTXZHg46o2"]} -{"Format": "IDEA0", "ID": "fbdf2815-bb0e-4f1e-b1bc-7037d14f3948", "DetectTime": "2023-10-30T13:59:58.293267+02:00", "EventTime": "2023-10-30T13:59:58.293282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["Cq7Uii3qRV3boNfaXi"]} -{"Format": "IDEA0", "ID": "5b94579c-6789-4d3c-905e-ffa925509fa6", "DetectTime": "2023-10-30T13:59:58.322833+02:00", "EventTime": "2023-10-30T13:59:58.322850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CE6kOG33TG6MoGntSc"]} -{"Format": "IDEA0", "ID": "d418260e-5351-4d42-abf5-83875ac631d9", "DetectTime": "2023-10-30T13:59:58.355323+02:00", "EventTime": "2023-10-30T13:59:58.355344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.233.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.233.106 ", "ContentType": "text/plain"}], "uids": ["CukunD3MB5muUMAwv1"]} -{"Format": "IDEA0", "ID": "7c2d9fb5-00c0-4196-9eb7-960fa30b04df", "DetectTime": "2023-10-30T13:59:58.381676+02:00", "EventTime": "2023-10-30T13:59:58.381692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CzOwr51az4AaAvpec1"]} -{"Format": "IDEA0", "ID": "fc169e21-e534-4866-8f6b-147d87a00415", "DetectTime": "2023-10-30T13:59:58.409952+02:00", "EventTime": "2023-10-30T13:59:58.409970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.226.153.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.226.153.179 ", "ContentType": "text/plain"}], "uids": ["CV2i9b4Wk46mT3r9Aa"]} -{"Format": "IDEA0", "ID": "897c5520-f154-479c-b96a-a8406c418de7", "DetectTime": "2023-10-30T13:59:58.436982+02:00", "EventTime": "2023-10-30T13:59:58.436998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["COiFQ63WI6KyiG6O6c"]} -{"Format": "IDEA0", "ID": "a00b6c5f-313c-4351-8963-5e9f5f124790", "DetectTime": "2023-10-30T13:59:58.463217+02:00", "EventTime": "2023-10-30T13:59:58.463237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["C8BLS93gkt8FvCzczf"]} -{"Format": "IDEA0", "ID": "d302c0f3-8c9f-49fa-9fd1-3d1e25effd01", "DetectTime": "2023-10-30T13:59:58.495297+02:00", "EventTime": "2023-10-30T13:59:58.495317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.172.186.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.172.186.28 ", "ContentType": "text/plain"}], "uids": ["CaZwq7Jl1UsHxea75"]} -{"Format": "IDEA0", "ID": "889a50a8-4c4c-49e2-afaf-0266b08f6f6d", "DetectTime": "2023-10-30T13:59:58.524827+02:00", "EventTime": "2023-10-30T13:59:58.524847+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C11vRC1EL582nLIx4"]} -{"Format": "IDEA0", "ID": "5407015f-c350-4661-8b86-358934dc6fe1", "DetectTime": "2023-10-30T13:59:58.543760+02:00", "EventTime": "2023-10-30T13:59:58.543777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.73.241.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.73.241.194 ", "ContentType": "text/plain"}], "uids": ["CRvvC641Ty9NGcyIBg"]} -{"Format": "IDEA0", "ID": "36c86d21-3fbe-480e-9e5f-09ae2314cd97", "DetectTime": "2023-10-30T13:59:58.573679+02:00", "EventTime": "2023-10-30T13:59:58.573698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.67.62.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.67.62.130 ", "ContentType": "text/plain"}], "uids": ["CbfEh73XKJdJ7XayO9"]} -{"Format": "IDEA0", "ID": "5506fc1f-2253-45c8-ab30-50074b631419", "DetectTime": "2023-10-30T13:59:58.604189+02:00", "EventTime": "2023-10-30T13:59:58.604206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.189.51.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.189.51.187 ", "ContentType": "text/plain"}], "uids": ["C5UA7z1jydhr6Yqpa1"]} -{"Format": "IDEA0", "ID": "857f2395-ebe6-4380-b65b-6626af28e040", "DetectTime": "2023-10-30T13:59:58.633225+02:00", "EventTime": "2023-10-30T13:59:58.633252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.43.15.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.43.15.169 ", "ContentType": "text/plain"}], "uids": ["CLDoYj1fYXaTxqoX37"]} -{"Format": "IDEA0", "ID": "88227c5e-1113-479f-a45d-ee84e11ac8e9", "DetectTime": "2023-10-30T13:59:58.663312+02:00", "EventTime": "2023-10-30T13:59:58.663327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["Cg5XZN2SuGwb3wMFU5"]} -{"Format": "IDEA0", "ID": "8d65f1b4-c669-4114-988e-6b411564c82e", "DetectTime": "2023-10-30T13:59:58.697156+02:00", "EventTime": "2023-10-30T13:59:58.697171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Ccw79ajIGw66Mv1cl"]} -{"Format": "IDEA0", "ID": "9c97b6b0-40c9-478a-8817-16f3574cd737", "DetectTime": "2023-10-30T13:59:58.722941+02:00", "EventTime": "2023-10-30T13:59:58.722963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["CgTH8f24fmgLDjzvRa"]} -{"Format": "IDEA0", "ID": "cbec117a-30cc-4092-a3c7-08832643732f", "DetectTime": "2023-10-30T13:59:58.752495+02:00", "EventTime": "2023-10-30T13:59:58.752511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.219.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.219.254 ", "ContentType": "text/plain"}], "uids": ["CDfSZq4lLcC58gvSr8"]} -{"Format": "IDEA0", "ID": "a943a925-1839-44e8-855c-e716f62f9010", "DetectTime": "2023-10-30T13:59:58.780985+02:00", "EventTime": "2023-10-30T13:59:58.781005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.90.122.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.90.122.248 ", "ContentType": "text/plain"}], "uids": ["CEMppVf2HmD8ik0y4"]} -{"Format": "IDEA0", "ID": "437e8954-aeb5-4d64-9164-0d7e7e213969", "DetectTime": "2023-10-30T13:59:58.811376+02:00", "EventTime": "2023-10-30T13:59:58.811394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["198.57.81.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 198.57.81.145 ", "ContentType": "text/plain"}], "uids": ["CdPdsc2tB00dL6T4s9"]} -{"Format": "IDEA0", "ID": "7fe7f358-3729-4c4c-ba84-cef6242f6ce1", "DetectTime": "2023-10-30T13:59:58.836619+02:00", "EventTime": "2023-10-30T13:59:58.836636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.86.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.86.63 ", "ContentType": "text/plain"}], "uids": ["CPGihR2a5y6lcIrQ79"]} -{"Format": "IDEA0", "ID": "34a3f49b-7e67-492b-89d8-667c423d74a2", "DetectTime": "2023-10-30T13:59:58.866073+02:00", "EventTime": "2023-10-30T13:59:58.866084+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiZiz314EjKERvwXA8"]} -{"Format": "IDEA0", "ID": "1b21d60f-a1ef-4b50-9059-5edef6738bcc", "DetectTime": "2023-10-30T13:59:58.874696+02:00", "EventTime": "2023-10-30T13:59:58.874712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.200.130.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.200.130.5 ", "ContentType": "text/plain"}], "uids": ["Cpeq9t2ETYavt9F9Gl"]} -{"Format": "IDEA0", "ID": "bd29af58-4558-49bf-922a-3692e16f2adb", "DetectTime": "2023-10-30T13:59:58.901442+02:00", "EventTime": "2023-10-30T13:59:58.901459+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CK6Bwh1jibgp2CzqY4"]} -{"Format": "IDEA0", "ID": "9ac5195e-1da4-4ff2-bc9f-8cebea3bdff6", "DetectTime": "2023-10-30T13:59:58.909676+02:00", "EventTime": "2023-10-30T13:59:58.909688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.137.45.123"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.137.45.123 ", "ContentType": "text/plain"}], "uids": ["CK38C81OifS0mZjrAc"]} -{"Format": "IDEA0", "ID": "da5011c0-10aa-4357-80d2-43d2d97bdc73", "DetectTime": "2023-10-30T13:59:58.936112+02:00", "EventTime": "2023-10-30T13:59:58.936129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CVHJrC4ozlZN0t2oZj", "Cx5uHl4gvXcukp8Pa6", "CL3zdD8DxUM8d96Sk", "CiZiz314EjKERvwXA8"]} -{"Format": "IDEA0", "ID": "166cd491-2f34-4538-badc-877b0eca4d43", "DetectTime": "2023-10-30T13:59:58.944649+02:00", "EventTime": "2023-10-30T13:59:58.944668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.162.78.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.162.78.229 ", "ContentType": "text/plain"}], "uids": ["C8MwCH3dAZ4B6dDGed"]} -{"Format": "IDEA0", "ID": "eadb539b-b789-402d-baf3-e6c490ad8dc0", "DetectTime": "2023-10-30T13:59:58.974090+02:00", "EventTime": "2023-10-30T13:59:58.974103+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CL3zdD8DxUM8d96Sk"]} -{"Format": "IDEA0", "ID": "0a29c494-77d8-4b26-8313-7afa5f8654e2", "DetectTime": "2023-10-30T13:59:58.982604+02:00", "EventTime": "2023-10-30T13:59:58.982624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.148.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.148.158 ", "ContentType": "text/plain"}], "uids": ["C27nTI2TrTyabwujt1"]} -{"Format": "IDEA0", "ID": "0602f5f7-96d5-4a65-a3fc-5c93c614bc17", "DetectTime": "2023-10-30T13:59:59.011098+02:00", "EventTime": "2023-10-30T13:59:59.011114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.183.105.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.183.105.68 ", "ContentType": "text/plain"}], "uids": ["C8Z6t12k9oqVptGPo1"]} -{"Format": "IDEA0", "ID": "49a5ee35-ac32-4023-9c91-0247a996ca5d", "DetectTime": "2023-10-30T13:59:59.035114+02:00", "EventTime": "2023-10-30T13:59:59.035130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.37.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.37.241 ", "ContentType": "text/plain"}], "uids": ["CigpiX2MNW7kqoqPG6"]} -{"Format": "IDEA0", "ID": "c516dc23-ce57-430c-b727-2cdf5c389cb4", "DetectTime": "2023-10-30T13:59:59.062047+02:00", "EventTime": "2023-10-30T13:59:59.062067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CGvDYO1OJUs7ej8hOl"]} -{"Format": "IDEA0", "ID": "d81a12bf-1cbb-4bf3-8ae0-13318c055b9b", "DetectTime": "2023-10-30T13:59:59.094499+02:00", "EventTime": "2023-10-30T13:59:59.094519+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAYyxT1eUgC9ZCYJdf"]} -{"Format": "IDEA0", "ID": "714cee7f-1a66-4537-89b6-786a39bb9b89", "DetectTime": "2023-10-30T13:59:59.102242+02:00", "EventTime": "2023-10-30T13:59:59.102261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.38.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.38.248 ", "ContentType": "text/plain"}], "uids": ["CTeTry4ZJrrIfaHVY8"]} -{"Format": "IDEA0", "ID": "ce0d0071-c41f-488f-84c9-f7d6039c5b48", "DetectTime": "2023-10-30T13:59:59.128945+02:00", "EventTime": "2023-10-30T13:59:59.128960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.158.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.158.188 ", "ContentType": "text/plain"}], "uids": ["CYr9xv1T6uNOeG1Pkj"]} -{"Format": "IDEA0", "ID": "3693d6b2-ec7a-4d73-980e-4337a54a3ced", "DetectTime": "2023-10-30T13:59:59.152604+02:00", "EventTime": "2023-10-30T13:59:59.152616+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLoPau4LJq90LdlRD3"]} -{"Format": "IDEA0", "ID": "d964c764-c7a1-441e-b769-7d1b8bde88f7", "DetectTime": "2023-10-30T13:59:59.160008+02:00", "EventTime": "2023-10-30T13:59:59.160022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.25.211.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.25.211.21 ", "ContentType": "text/plain"}], "uids": ["Ck0g57NkAKbTqgB7k"]} -{"Format": "IDEA0", "ID": "58a4039d-381f-40b1-a57e-0735e1d12cf0", "DetectTime": "2023-10-30T13:59:59.192527+02:00", "EventTime": "2023-10-30T13:59:59.192545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.97.95.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.97.95.18 ", "ContentType": "text/plain"}], "uids": ["CpYiXD16MOA3V67suf"]} -{"Format": "IDEA0", "ID": "1a9b7b04-9cbc-407f-87c3-55a25b50d820", "DetectTime": "2023-10-30T13:59:59.221323+02:00", "EventTime": "2023-10-30T13:59:59.221341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.89.55.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.89.55.16 ", "ContentType": "text/plain"}], "uids": ["C8hoHO2uataXA1SLdd"]} -{"Format": "IDEA0", "ID": "a47fddda-0204-40f5-92e1-a1f2f51a75f4", "DetectTime": "2023-10-30T13:59:59.249743+02:00", "EventTime": "2023-10-30T13:59:59.249759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.64.9.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.64.9.183 ", "ContentType": "text/plain"}], "uids": ["CzDZYI2lnSbJNaW9Kb"]} -{"Format": "IDEA0", "ID": "b4bbcaf3-c42f-48c0-b4b7-dccf7141b31c", "DetectTime": "2023-10-30T13:59:59.276958+02:00", "EventTime": "2023-10-30T13:59:59.276974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.97.122.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.97.122.157 ", "ContentType": "text/plain"}], "uids": ["C6MqLM17nawAArrB1c"]} -{"Format": "IDEA0", "ID": "7444ffe1-988e-4017-a372-c1627098c4fe", "DetectTime": "2023-10-30T13:59:59.302665+02:00", "EventTime": "2023-10-30T13:59:59.302682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C85FgD4L6Kfwc9tcwc"]} -{"Format": "IDEA0", "ID": "5c4822bc-1c6e-4ac9-bc2e-02814011538e", "DetectTime": "2023-10-30T13:59:59.333165+02:00", "EventTime": "2023-10-30T13:59:59.333184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHevDApm3JzUSGjyg"]} -{"Format": "IDEA0", "ID": "942cc6df-683a-4abd-8f43-04fc2b27312d", "DetectTime": "2023-10-30T13:59:59.342569+02:00", "EventTime": "2023-10-30T13:59:59.342585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.91.137.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.91.137.209 ", "ContentType": "text/plain"}], "uids": ["CUE4Sw1M5SQ8yJXiz"]} -{"Format": "IDEA0", "ID": "4101d80a-7541-4e81-afc6-2e3a4c967eb0", "DetectTime": "2023-10-30T13:59:59.368059+02:00", "EventTime": "2023-10-30T13:59:59.368075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["Cjkoq31ONNRgKQDEAa"]} -{"Format": "IDEA0", "ID": "01ccb67d-a757-49fd-8f65-2b92ebf2fdbe", "DetectTime": "2023-10-30T13:59:59.394497+02:00", "EventTime": "2023-10-30T13:59:59.394511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.176.133.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.176.133.96 ", "ContentType": "text/plain"}], "uids": ["CBbnEv4zePV10IElq9"]} -{"Format": "IDEA0", "ID": "4b06f4e0-2893-4b99-bc05-794a68d83178", "DetectTime": "2023-10-30T13:59:59.420253+02:00", "EventTime": "2023-10-30T13:59:59.420273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CK2rrg3dz25J4Nkdle"]} -{"Format": "IDEA0", "ID": "ce331b56-37fa-4c26-8603-813f993efabd", "DetectTime": "2023-10-30T13:59:59.448097+02:00", "EventTime": "2023-10-30T13:59:59.448117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CFMaVE3141AmSzboJl"]} -{"Format": "IDEA0", "ID": "9d840c2c-f492-41ed-b507-951efee8ef2f", "DetectTime": "2023-10-30T13:59:59.476258+02:00", "EventTime": "2023-10-30T13:59:59.476290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.59.98.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.59.98.143 ", "ContentType": "text/plain"}], "uids": ["CHEHBp36dJofSMvLMb"]} -{"Format": "IDEA0", "ID": "3a186673-6ddb-4c09-b887-fd41d96d6e98", "DetectTime": "2023-10-30T13:59:59.501407+02:00", "EventTime": "2023-10-30T13:59:59.501423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["206.108.130.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 206.108.130.250 ", "ContentType": "text/plain"}], "uids": ["CBCFf34IQGQZh4qhIa"]} -{"Format": "IDEA0", "ID": "3e80a066-3cfd-4e76-8d27-82dfa1e74591", "DetectTime": "2023-10-30T13:59:59.525355+02:00", "EventTime": "2023-10-30T13:59:59.525367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CL9tiE2crtngECN8P6"]} -{"Format": "IDEA0", "ID": "9bd1339d-185a-49c2-9276-714bcd32a564", "DetectTime": "2023-10-30T13:59:59.549192+02:00", "EventTime": "2023-10-30T13:59:59.549209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CIXWum3lppP7J4yBYb"]} -{"Format": "IDEA0", "ID": "3e0bab26-6e1c-42bf-9c69-7529cdb26c37", "DetectTime": "2023-10-30T13:59:59.576168+02:00", "EventTime": "2023-10-30T13:59:59.576180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CZN2ue1xiVTbNL2ofi"]} -{"Format": "IDEA0", "ID": "4a708772-d86b-474c-9bd7-cd234e027b42", "DetectTime": "2023-10-30T13:59:59.599964+02:00", "EventTime": "2023-10-30T13:59:59.599980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.252.146.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.252.146.27 ", "ContentType": "text/plain"}], "uids": ["CP5crrFQvibvJHGge"]} -{"Format": "IDEA0", "ID": "f0d4a130-bb51-4a05-85d3-0cb9a6a37992", "DetectTime": "2023-10-30T13:59:59.625925+02:00", "EventTime": "2023-10-30T13:59:59.625942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["C4koL23T2kpuXovzJe"]} -{"Format": "IDEA0", "ID": "fc2f6724-88ad-4ed8-902e-5fd5cc78096c", "DetectTime": "2023-10-30T13:59:59.653470+02:00", "EventTime": "2023-10-30T13:59:59.653481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["C7TrZP2mcr3psXp9gf"]} -{"Format": "IDEA0", "ID": "a0e2eabd-b580-43f9-b648-f2751a68e1b7", "DetectTime": "2023-10-30T13:59:59.682054+02:00", "EventTime": "2023-10-30T13:59:59.682070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.131.39.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.131.39.246 ", "ContentType": "text/plain"}], "uids": ["CcnKGW2TD7vrDOeFSi"]} -{"Format": "IDEA0", "ID": "3e7055db-3c8c-4d3b-a1ad-f12520c81b01", "DetectTime": "2023-10-30T13:59:59.711664+02:00", "EventTime": "2023-10-30T13:59:59.711685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CsSoqk1zaCcmiRKLG7"]} -{"Format": "IDEA0", "ID": "2e603edf-5432-42e8-95fc-657e15869a99", "DetectTime": "2023-10-30T13:59:59.738846+02:00", "EventTime": "2023-10-30T13:59:59.738860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CrD3EC1O2C0tdJXXk4"]} -{"Format": "IDEA0", "ID": "5626bab4-3d16-41e5-901f-6ee3582aaefa", "DetectTime": "2023-10-30T13:59:59.764771+02:00", "EventTime": "2023-10-30T13:59:59.764787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.27.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.27.248 ", "ContentType": "text/plain"}], "uids": ["CZBXLH2TBqnXwgCXa2"]} -{"Format": "IDEA0", "ID": "aa8680c5-81f2-496a-8c85-b62657c4635e", "DetectTime": "2023-10-30T13:59:59.792340+02:00", "EventTime": "2023-10-30T13:59:59.792358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CBnW0I1GH8r0q9y734"]} -{"Format": "IDEA0", "ID": "d62daf23-fa3e-4d7d-81ed-6363498c8885", "DetectTime": "2023-10-30T13:59:59.818064+02:00", "EventTime": "2023-10-30T13:59:59.818081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CjTO3q1t1GJ8BCas3"]} -{"Format": "IDEA0", "ID": "4ead4a8b-a38f-479f-bd66-3ed0a2302303", "DetectTime": "2023-10-30T13:59:59.837531+02:00", "EventTime": "2023-10-30T13:59:59.837548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CH1nBl2yPMI39n6p81"]} -{"Format": "IDEA0", "ID": "754bed27-720d-485a-ba7a-c111621b0b4f", "DetectTime": "2023-10-30T13:59:59.861972+02:00", "EventTime": "2023-10-30T13:59:59.861984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CKSt5A2mbgp3N1X67d"]} -{"Format": "IDEA0", "ID": "4d39e786-91dd-449b-a1c9-4fc8e6bd9e47", "DetectTime": "2023-10-30T13:59:59.883566+02:00", "EventTime": "2023-10-30T13:59:59.883582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CozVfL2rZ3Lo1Bmc07"]} -{"Format": "IDEA0", "ID": "80671138-d788-4b89-9831-a447a6817567", "DetectTime": "2023-10-30T13:59:59.904162+02:00", "EventTime": "2023-10-30T13:59:59.904182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CPuG574FJtjszx3QKj"]} -{"Format": "IDEA0", "ID": "2c0c14f0-f6a6-4040-ba0a-e74d6e4fda82", "DetectTime": "2023-10-30T13:59:59.931375+02:00", "EventTime": "2023-10-30T13:59:59.931397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CpwUng3lFUnAcTYBO7"]} -{"Format": "IDEA0", "ID": "35c7eaec-4c35-40a5-a6ea-50322af890a7", "DetectTime": "2023-10-30T13:59:59.955697+02:00", "EventTime": "2023-10-30T13:59:59.955720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CwzqZN34CVp6kI3K7d"]} -{"Format": "IDEA0", "ID": "1610b5c4-61f1-4581-b917-02f14dbc7233", "DetectTime": "2023-10-30T13:59:59.982890+02:00", "EventTime": "2023-10-30T13:59:59.982906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["Cwm3jS11OLZCin2SF9"]} -{"Format": "IDEA0", "ID": "06eee09b-6c72-42e9-90b3-c2a35744f9df", "DetectTime": "2023-10-30T14:00:00.012487+02:00", "EventTime": "2023-10-30T14:00:00.012503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.237.70.170 ", "ContentType": "text/plain"}], "uids": ["CvBpQMwUaIutHK7Se"]} -{"Format": "IDEA0", "ID": "80618a47-6dd3-4169-b1e8-0b94e003dfc6", "DetectTime": "2023-10-30T14:00:00.038927+02:00", "EventTime": "2023-10-30T14:00:00.038945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CaXLK1btmINWYT064"]} -{"Format": "IDEA0", "ID": "34801aba-b0c4-4024-b022-39838902adea", "DetectTime": "2023-10-30T14:00:00.068182+02:00", "EventTime": "2023-10-30T14:00:00.068196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.208.123.138 ", "ContentType": "text/plain"}], "uids": ["C8VmU511nIo4jdSPE8"]} -{"Format": "IDEA0", "ID": "03e2197f-ce05-4a39-84ed-ba4e7d6f56ce", "DetectTime": "2023-10-30T14:00:00.090533+02:00", "EventTime": "2023-10-30T14:00:00.090559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.208.123.138 ", "ContentType": "text/plain"}], "uids": ["CmR88H18tBzl6irwCl"]} -{"Format": "IDEA0", "ID": "c17d055b-4101-4f18-a1a0-9680bf5036c5", "DetectTime": "2023-10-30T14:00:00.123159+02:00", "EventTime": "2023-10-30T14:00:00.123185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CrqeHO1g0mGlcuLJd4"]} -{"Format": "IDEA0", "ID": "9c88c96d-1c95-468d-b3e3-d49388219d98", "DetectTime": "2023-10-30T14:00:00.151100+02:00", "EventTime": "2023-10-30T14:00:00.151124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CpMVIA4P6CxUhXUrIg"]} -{"Format": "IDEA0", "ID": "31fee8fc-2f56-4fab-af73-1e7b826cb83a", "DetectTime": "2023-10-30T14:00:00.182461+02:00", "EventTime": "2023-10-30T14:00:00.182479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.93.140.11 ", "ContentType": "text/plain"}], "uids": ["CyCzkc3G9SLYzsFll"]} -{"Format": "IDEA0", "ID": "9498c033-3901-4570-b63b-ac8e5deb6164", "DetectTime": "2023-10-30T14:00:00.208367+02:00", "EventTime": "2023-10-30T14:00:00.208383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CZifEw22O5ttVTUc2l"]} -{"Format": "IDEA0", "ID": "a9c674bc-93bc-452e-8826-4aa0c6f81074", "DetectTime": "2023-10-30T14:00:00.228624+02:00", "EventTime": "2023-10-30T14:00:00.228637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CAyQQb3RBrqZwJ54A4"]} -{"Format": "IDEA0", "ID": "d6efc1f3-450e-40b5-9483-edd1b5ca7597", "DetectTime": "2023-10-30T14:00:00.249520+02:00", "EventTime": "2023-10-30T14:00:00.249532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CPdCym2V8fTzPVLmc4"]} -{"Format": "IDEA0", "ID": "88e95ef4-19f6-426f-a14a-640d9b0b366d", "DetectTime": "2023-10-30T14:00:00.268852+02:00", "EventTime": "2023-10-30T14:00:00.268869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CeGOrc8xHe7HklpBk"]} -{"Format": "IDEA0", "ID": "bf6dd8be-1ac3-4998-9774-5f012de6e76d", "DetectTime": "2023-10-30T14:00:00.297803+02:00", "EventTime": "2023-10-30T14:00:00.297819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp8ynd311nUfFXA1Wf"]} -{"Format": "IDEA0", "ID": "07956295-7463-4265-8bd4-a0b6cc4770f2", "DetectTime": "2023-10-30T14:00:00.324131+02:00", "EventTime": "2023-10-30T14:00:00.324147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.77.231.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.77.231.101 ", "ContentType": "text/plain"}], "uids": ["CSA7vC3pc2xQ57SXSl"]} -{"Format": "IDEA0", "ID": "7577de1c-b33c-4d2e-8ec3-7076195cc492", "DetectTime": "2023-10-30T14:00:00.350233+02:00", "EventTime": "2023-10-30T14:00:00.350250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["Ca0Cdp3PIcOnsMTMxc"]} -{"Format": "IDEA0", "ID": "5e5bb9de-5535-46aa-8b12-f1320c1e6765", "DetectTime": "2023-10-30T14:00:00.373325+02:00", "EventTime": "2023-10-30T14:00:00.373353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.92.75.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.92.75.150 ", "ContentType": "text/plain"}], "uids": ["CWArKg4gv5SDTr7d82"]} -{"Format": "IDEA0", "ID": "81749a42-60b3-45df-aa34-4a72b5604ad9", "DetectTime": "2023-10-30T14:00:00.399598+02:00", "EventTime": "2023-10-30T14:00:00.399617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CYG4wc1kUQMXujzdfj"]} -{"Format": "IDEA0", "ID": "45f22173-bab4-4171-9575-5432f8be17c6", "DetectTime": "2023-10-30T14:00:00.422992+02:00", "EventTime": "2023-10-30T14:00:00.423014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CVV3ED4HIEPPDGmvt1"]} -{"Format": "IDEA0", "ID": "492e0a33-4afa-411e-9e8e-9b0c31244a97", "DetectTime": "2023-10-30T14:00:00.448462+02:00", "EventTime": "2023-10-30T14:00:00.448482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["C4LORW1BrS9sXJBz95"]} -{"Format": "IDEA0", "ID": "40e06b66-92cd-489a-bda6-bcbf831bc657", "DetectTime": "2023-10-30T14:00:00.476780+02:00", "EventTime": "2023-10-30T14:00:00.476797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["Ch2tWR11cM1AByNQ68"]} -{"Format": "IDEA0", "ID": "160aa4fe-df1d-44cf-a26b-d27f72761d1b", "DetectTime": "2023-10-30T14:00:00.502854+02:00", "EventTime": "2023-10-30T14:00:00.502866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CX4GdQ3sWX5qzrzM82"]} -{"Format": "IDEA0", "ID": "606952ca-53b8-44c2-afac-3dd4e5cd858b", "DetectTime": "2023-10-30T14:00:00.525374+02:00", "EventTime": "2023-10-30T14:00:00.525393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.177.70.33 ", "ContentType": "text/plain"}], "uids": ["Cj5NRQwlvN1eIo1W4"]} -{"Format": "IDEA0", "ID": "f6ea30f5-f354-4383-b390-0f15f982dbba", "DetectTime": "2023-10-30T14:00:00.553389+02:00", "EventTime": "2023-10-30T14:00:00.553405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["C7JuKD4v3pHeSLDjqd"]} -{"Format": "IDEA0", "ID": "418dd717-10b6-4400-aeaf-2e10e8d66cc7", "DetectTime": "2023-10-30T14:00:00.581150+02:00", "EventTime": "2023-10-30T14:00:00.581168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CS4b7S1sdTyNNCmmU"]} -{"Format": "IDEA0", "ID": "f55abb4d-8d94-4ba6-b30f-11ffa447c487", "DetectTime": "2023-10-30T14:00:00.607289+02:00", "EventTime": "2023-10-30T14:00:00.607306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["C7C5kx376kn1ZtFMDe"]} -{"Format": "IDEA0", "ID": "435ae608-ca51-4326-b002-f2d0f5209068", "DetectTime": "2023-10-30T14:00:00.636839+02:00", "EventTime": "2023-10-30T14:00:00.636858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.189.51.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.189.51.187 ", "ContentType": "text/plain"}], "uids": ["CXTw683wEFNpKei0Vf"]} -{"Format": "IDEA0", "ID": "a01af595-c210-424f-b9c9-c2787407f42c", "DetectTime": "2023-10-30T14:00:00.665585+02:00", "EventTime": "2023-10-30T14:00:00.665601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["Cf0yDG1xwwZHqgdrg1"]} -{"Format": "IDEA0", "ID": "32088b4c-be79-41c1-aa8b-d9d9e82dac96", "DetectTime": "2023-10-30T14:00:00.692908+02:00", "EventTime": "2023-10-30T14:00:00.692928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["C1C0vD20rnsrfswa9g"]} -{"Format": "IDEA0", "ID": "28fe5f86-4691-4239-a193-4abd030039fd", "DetectTime": "2023-10-30T14:00:00.718740+02:00", "EventTime": "2023-10-30T14:00:00.718757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CowIcW1jIw0md0G06e"]} -{"Format": "IDEA0", "ID": "f0b34132-c222-4b75-970c-25fcf1afb842", "DetectTime": "2023-10-30T14:00:00.749175+02:00", "EventTime": "2023-10-30T14:00:00.749193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.86.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.86.63 ", "ContentType": "text/plain"}], "uids": ["CdW5yD44WGb4XC7Eo"]} -{"Format": "IDEA0", "ID": "9768ae5a-1522-4696-a54b-0fb73948760e", "DetectTime": "2023-10-30T14:00:00.776351+02:00", "EventTime": "2023-10-30T14:00:00.776369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["CudyEj3sYQ9NTiZtj8"]} -{"Format": "IDEA0", "ID": "6190aa92-9201-486d-9967-f02ed2101a13", "DetectTime": "2023-10-30T14:00:00.803649+02:00", "EventTime": "2023-10-30T14:00:00.803660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["ChucfW2Cbk1nkAkdfh"]} -{"Format": "IDEA0", "ID": "3d67eb9d-83ad-4e1f-a06c-baeda176d5c4", "DetectTime": "2023-10-30T14:00:00.828806+02:00", "EventTime": "2023-10-30T14:00:00.828818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["Cm10DtWh2vgrcc1V6"]} -{"Format": "IDEA0", "ID": "1c740862-0aa5-4c07-b743-53c6d9591ebf", "DetectTime": "2023-10-30T14:00:00.857197+02:00", "EventTime": "2023-10-30T14:00:00.857213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.173.238.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.173.238.41 ", "ContentType": "text/plain"}], "uids": ["CnC4QZ2QPg0sQvURj4"]} -{"Format": "IDEA0", "ID": "b04557a0-7ab9-4234-bc87-bfb3c1591c7b", "DetectTime": "2023-10-30T14:00:00.880606+02:00", "EventTime": "2023-10-30T14:00:00.880626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.183.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.183.152 ", "ContentType": "text/plain"}], "uids": ["CUHqBi3pT5YbgE8u29"]} -{"Format": "IDEA0", "ID": "720422b5-c2a9-4554-8295-fd1d38dabead", "DetectTime": "2023-10-30T14:00:00.907336+02:00", "EventTime": "2023-10-30T14:00:00.907353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiOwaw2zlWfRT5LUCf"]} -{"Format": "IDEA0", "ID": "8a92db29-8720-4d2e-92e8-4d47e7949d4c", "DetectTime": "2023-10-30T14:00:00.929002+02:00", "EventTime": "2023-10-30T14:00:00.929018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CRyLZJlia4lDaIuZi"]} -{"Format": "IDEA0", "ID": "a16c7785-879b-4237-bf26-408bbcd59033", "DetectTime": "2023-10-30T14:00:00.953604+02:00", "EventTime": "2023-10-30T14:00:00.953617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.38.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.38.248 ", "ContentType": "text/plain"}], "uids": ["CXJlKF4DlrkFe0Tjig"]} -{"Format": "IDEA0", "ID": "66069086-ce65-48a2-8afc-6fd34c6af9df", "DetectTime": "2023-10-30T14:00:00.984679+02:00", "EventTime": "2023-10-30T14:00:00.984696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.238.16 ", "ContentType": "text/plain"}], "uids": ["CuCmG92AtNQWwYZS29"]} -{"Format": "IDEA0", "ID": "e30bac43-587f-4510-b044-ce57c0bdbee1", "DetectTime": "2023-10-30T14:00:01.013152+02:00", "EventTime": "2023-10-30T14:00:01.013170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["Cs6qOa1k7g9OisapSi"]} -{"Format": "IDEA0", "ID": "00faad7c-f5cb-4161-9e8b-6a5095ccb797", "DetectTime": "2023-10-30T14:00:01.038002+02:00", "EventTime": "2023-10-30T14:00:01.038020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["Cfnjlq4XFBtHB9kzU1"]} -{"Format": "IDEA0", "ID": "f6163970-bd00-4af6-b255-c89fe5514267", "DetectTime": "2023-10-30T14:00:01.064229+02:00", "EventTime": "2023-10-30T14:00:01.064244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["Cp0UNnEvroQWgp3vk"]} -{"Format": "IDEA0", "ID": "2386c1c5-a2d8-4de8-af0e-5380d55278e9", "DetectTime": "2023-10-30T14:00:01.091983+02:00", "EventTime": "2023-10-30T14:00:01.092001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.183.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.183.152 ", "ContentType": "text/plain"}], "uids": ["Cxvvd81lvQRhYUDgok"]} -{"Format": "IDEA0", "ID": "4782d10a-5ec9-41c9-ae23-598493b96911", "DetectTime": "2023-10-30T14:00:01.111584+02:00", "EventTime": "2023-10-30T14:00:01.111596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.27.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.27.248 ", "ContentType": "text/plain"}], "uids": ["CgvLfaKHbTeP4xTDi"]} -{"Format": "IDEA0", "ID": "028332a5-6e40-4397-b436-463fa17d1348", "DetectTime": "2023-10-30T14:00:01.137105+02:00", "EventTime": "2023-10-30T14:00:01.137123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["Ce8adLncwCC7pEt3j"]} -{"Format": "IDEA0", "ID": "9bc2684a-c4c9-464b-ae7e-476f80ffcb0f", "DetectTime": "2023-10-30T14:00:01.161732+02:00", "EventTime": "2023-10-30T14:00:01.161748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.38.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.38.248 ", "ContentType": "text/plain"}], "uids": ["CktXM94IrZpYxPyfoi"]} -{"Format": "IDEA0", "ID": "4d93620e-7563-44fb-8221-ed82f0cc4f29", "DetectTime": "2023-10-30T14:00:01.192119+02:00", "EventTime": "2023-10-30T14:00:01.192135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CS4iI3Nxk7FV7K9xl"]} -{"Format": "IDEA0", "ID": "bf915327-b414-4044-823d-b1f489e18cef", "DetectTime": "2023-10-30T14:00:01.220692+02:00", "EventTime": "2023-10-30T14:00:01.220712+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLuyGN1vwY9VaiLYEe"]} -{"Format": "IDEA0", "ID": "616000ac-de97-45a5-a2e3-266cf95f291c", "DetectTime": "2023-10-30T14:00:01.230057+02:00", "EventTime": "2023-10-30T14:00:01.230073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CEhWbzMbq8UOLYLMf"]} -{"Format": "IDEA0", "ID": "f266afdd-4ac7-4524-862e-5850e90c1560", "DetectTime": "2023-10-30T14:00:01.257823+02:00", "EventTime": "2023-10-30T14:00:01.257839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CVTyoi2s62jtIjharj"]} -{"Format": "IDEA0", "ID": "bd358b31-035c-4498-b3e1-3dfc0544ca24", "DetectTime": "2023-10-30T14:00:01.284696+02:00", "EventTime": "2023-10-30T14:00:01.284710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CkS1F13WisFAplLpu5"]} -{"Format": "IDEA0", "ID": "e0a64ad8-9767-4683-9e56-f2a09f43a5a2", "DetectTime": "2023-10-30T14:00:01.309748+02:00", "EventTime": "2023-10-30T14:00:01.309760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.237.70.170 ", "ContentType": "text/plain"}], "uids": ["C04SlM2ooGveDTkDO7"]} -{"Format": "IDEA0", "ID": "c93bd437-d2db-438c-8a62-3860279e97cd", "DetectTime": "2023-10-30T14:00:01.331371+02:00", "EventTime": "2023-10-30T14:00:01.331389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["CKzZzd2IMMDqbSWkD8"]} -{"Format": "IDEA0", "ID": "52db6125-06db-4e77-81a3-492008ce618e", "DetectTime": "2023-10-30T14:00:01.353678+02:00", "EventTime": "2023-10-30T14:00:01.353692+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Csdkuv1524VmbdZLK2"]} -{"Format": "IDEA0", "ID": "8359d7fd-38a1-4b2f-b64c-a455f28b3e73", "DetectTime": "2023-10-30T14:00:01.364224+02:00", "EventTime": "2023-10-30T14:00:01.364241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CsbMfZ15swvWtTL0d"]} -{"Format": "IDEA0", "ID": "4cb3cbc0-e51b-49ab-ad85-bad38e832368", "DetectTime": "2023-10-30T14:00:01.384173+02:00", "EventTime": "2023-10-30T14:00:01.384185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["C6c8CJ3SVQXRklJzJ4"]} -{"Format": "IDEA0", "ID": "606ba2cd-6767-4a32-9ca9-43faf4585a7e", "DetectTime": "2023-10-30T14:00:01.405568+02:00", "EventTime": "2023-10-30T14:00:01.405585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CDqpxq3NvfL8Oupifb"]} -{"Format": "IDEA0", "ID": "b5ecd333-22bc-4e19-b123-966a9d14a316", "DetectTime": "2023-10-30T14:00:01.429566+02:00", "EventTime": "2023-10-30T14:00:01.429578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CD59SF3SkLaJqaxEM9"]} -{"Format": "IDEA0", "ID": "2bfd0d2f-e113-484c-82b6-ec31abeb6b79", "DetectTime": "2023-10-30T14:00:01.454386+02:00", "EventTime": "2023-10-30T14:00:01.454414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CU7CencBx2BUvNZk3"]} -{"Format": "IDEA0", "ID": "3de4668f-3afe-4ac8-8551-9c5aeb562656", "DetectTime": "2023-10-30T14:00:01.483242+02:00", "EventTime": "2023-10-30T14:00:01.483257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CfDhyV37xcyKrWUsKc"]} -{"Format": "IDEA0", "ID": "2ed2cd8a-b45e-4fc1-8a51-8027ad0a379f", "DetectTime": "2023-10-30T14:00:01.511862+02:00", "EventTime": "2023-10-30T14:00:01.511879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CYNQKH1L7exfuYQdp7"]} -{"Format": "IDEA0", "ID": "37feebca-b116-408a-8891-736e58a17e82", "DetectTime": "2023-10-30T14:00:01.536193+02:00", "EventTime": "2023-10-30T14:00:01.536211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CRoj5zrhUndhwpyga"]} -{"Format": "IDEA0", "ID": "eeb0b327-96fa-4636-b422-5da2a899b4ed", "DetectTime": "2023-10-30T14:00:01.558735+02:00", "EventTime": "2023-10-30T14:00:01.558748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CcLpC33xBrUp6TemGa"]} -{"Format": "IDEA0", "ID": "b6b5b999-9bc9-4e8d-ba38-96a0b4f2697d", "DetectTime": "2023-10-30T14:00:01.583440+02:00", "EventTime": "2023-10-30T14:00:01.583458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CsHflAglfn7Mo0ce"]} -{"Format": "IDEA0", "ID": "4ca89334-3e09-4d60-9469-305e1dfb81f4", "DetectTime": "2023-10-30T14:00:01.608875+02:00", "EventTime": "2023-10-30T14:00:01.608897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.27.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.27.248 ", "ContentType": "text/plain"}], "uids": ["CryQjW1JO9HskNKSee"]} -{"Format": "IDEA0", "ID": "11a54df3-589a-447b-9a63-48325db092cf", "DetectTime": "2023-10-30T14:00:01.634966+02:00", "EventTime": "2023-10-30T14:00:01.634986+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2KkJ71sWi2c0Bp9pg"]} -{"Format": "IDEA0", "ID": "3011f7f5-0e6f-4060-b963-64152bcdd67e", "DetectTime": "2023-10-30T14:00:01.645281+02:00", "EventTime": "2023-10-30T14:00:01.645299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.208.123.138 ", "ContentType": "text/plain"}], "uids": ["CT3GJC3C7OWoMfFTL8"]} -{"Format": "IDEA0", "ID": "8f5ded09-9f5d-486c-9cbf-3ab7187c130a", "DetectTime": "2023-10-30T14:00:01.667061+02:00", "EventTime": "2023-10-30T14:00:01.667078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CeFGYq1nOICkwHj0J5"]} -{"Format": "IDEA0", "ID": "e45d68ed-c814-434f-a288-b91c2b47fabd", "DetectTime": "2023-10-30T14:00:01.689794+02:00", "EventTime": "2023-10-30T14:00:01.689810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.173.238.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.173.238.41 ", "ContentType": "text/plain"}], "uids": ["CnVcEB4F89NU95ke22"]} -{"Format": "IDEA0", "ID": "fb48666e-3b0b-47fd-a911-f82c5e884a9c", "DetectTime": "2023-10-30T14:00:01.716469+02:00", "EventTime": "2023-10-30T14:00:01.716488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CbPQmc2Mzl5BEHpjj8"]} -{"Format": "IDEA0", "ID": "0d39b379-c6c0-4943-be63-28a9f81a2de8", "DetectTime": "2023-10-30T14:00:01.742809+02:00", "EventTime": "2023-10-30T14:00:01.742831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CBQjsO2sfe5AdSvP94"]} -{"Format": "IDEA0", "ID": "58cc15b2-c569-4d47-b14d-351596b1b88c", "DetectTime": "2023-10-30T14:00:01.769550+02:00", "EventTime": "2023-10-30T14:00:01.769566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["C8LghN3Pl1ZezoRXG6"]} -{"Format": "IDEA0", "ID": "4557c65f-43cf-457f-9e9c-055b5f3cf3e5", "DetectTime": "2023-10-30T14:00:01.797791+02:00", "EventTime": "2023-10-30T14:00:01.797808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CL0R7o4TdFHYz90xC7"]} -{"Format": "IDEA0", "ID": "231debc2-ac82-4607-9c37-12c8cab5b6e7", "DetectTime": "2023-10-30T14:00:01.818203+02:00", "EventTime": "2023-10-30T14:00:01.818219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.183.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.135.183.152 ", "ContentType": "text/plain"}], "uids": ["CkFan12dfZKOtl1iPj"]} -{"Format": "IDEA0", "ID": "48b8ccfb-a98f-4fce-ba7c-529fdb93a458", "DetectTime": "2023-10-30T14:00:01.846360+02:00", "EventTime": "2023-10-30T14:00:01.846376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["C7pxFa1BItZDHUkvj2"]} -{"Format": "IDEA0", "ID": "3de1a5ab-334e-49a4-929f-5992f5d16038", "DetectTime": "2023-10-30T14:00:01.871298+02:00", "EventTime": "2023-10-30T14:00:01.871310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.77.231.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.77.231.101 ", "ContentType": "text/plain"}], "uids": ["Chgzq54WroHtoQMcfc"]} -{"Format": "IDEA0", "ID": "b615bcc9-2ef5-4ad4-ac6a-5f4a98cd3b27", "DetectTime": "2023-10-30T14:00:01.895765+02:00", "EventTime": "2023-10-30T14:00:01.895777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["Cibuvp4Bznrc6aD1r1"]} -{"Format": "IDEA0", "ID": "ef6a1f00-2af0-4d23-8e51-497a4bc5a927", "DetectTime": "2023-10-30T14:00:01.919955+02:00", "EventTime": "2023-10-30T14:00:01.919965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.92.75.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.92.75.150 ", "ContentType": "text/plain"}], "uids": ["CCpO3y3F7AEYGo13a9"]} -{"Format": "IDEA0", "ID": "7b9e226b-fea6-4cd5-a67c-fc7c1723aa3d", "DetectTime": "2023-10-30T14:00:01.950215+02:00", "EventTime": "2023-10-30T14:00:01.950232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CljZNn1Sbukm9WIMg9"]} -{"Format": "IDEA0", "ID": "a8d9fb52-5459-4c5a-ba68-db53586f6dfb", "DetectTime": "2023-10-30T14:00:01.978054+02:00", "EventTime": "2023-10-30T14:00:01.978070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CPusxY1xbAgYAFqFsc"]} -{"Format": "IDEA0", "ID": "d9edf1ba-8da7-44fa-afb4-3f3b2b295cb8", "DetectTime": "2023-10-30T14:00:01.999063+02:00", "EventTime": "2023-10-30T14:00:01.999079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CTFsCr1nFtLRxxw3hc"]} -{"Format": "IDEA0", "ID": "d28c40d3-87fd-434d-9890-bd43996acc1f", "DetectTime": "2023-10-30T14:00:02.025093+02:00", "EventTime": "2023-10-30T14:00:02.025105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CWBOsQ3UaIwodSjZXc"]} -{"Format": "IDEA0", "ID": "1d2f5410-7fb3-48f4-a472-6d5771a272f3", "DetectTime": "2023-10-30T14:00:02.052946+02:00", "EventTime": "2023-10-30T14:00:02.052958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CVuGaN3BgqpN8PeEc5"]} -{"Format": "IDEA0", "ID": "1a6da155-92ed-40e2-aef6-07285aea045e", "DetectTime": "2023-10-30T14:00:02.078213+02:00", "EventTime": "2023-10-30T14:00:02.078229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["Cy003O2T1Lwo8ezmvf"]} -{"Format": "IDEA0", "ID": "b7ec51ad-cae4-49ae-8eb0-b55caf9e5344", "DetectTime": "2023-10-30T14:00:02.108869+02:00", "EventTime": "2023-10-30T14:00:02.108885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CJBPkp48ZPg2YwUwsj"]} -{"Format": "IDEA0", "ID": "027c960c-8b40-4458-845e-d2044a05e225", "DetectTime": "2023-10-30T14:00:02.134329+02:00", "EventTime": "2023-10-30T14:00:02.134345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["Cb3nR8uWj5wcvdIT7"]} -{"Format": "IDEA0", "ID": "2a23c14e-f506-42b3-b41e-27e0ee6afe2c", "DetectTime": "2023-10-30T14:00:02.158676+02:00", "EventTime": "2023-10-30T14:00:02.158694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLI6lm2KLOal9oZJW6"]} -{"Format": "IDEA0", "ID": "7e534500-b0a0-4681-a1af-09b6088e3791", "DetectTime": "2023-10-30T14:00:02.179288+02:00", "EventTime": "2023-10-30T14:00:02.179300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CqxivI2JwdzE0k34Ll"]} -{"Format": "IDEA0", "ID": "81bee5ee-2c3e-45c5-b92f-1d2ff989fbec", "DetectTime": "2023-10-30T14:00:02.201164+02:00", "EventTime": "2023-10-30T14:00:02.201186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CECiHKpArjFLUA3h2"]} -{"Format": "IDEA0", "ID": "b1e67061-15af-4cc6-89ac-9c27b88c4ee1", "DetectTime": "2023-10-30T14:00:02.228083+02:00", "EventTime": "2023-10-30T14:00:02.228096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.93.140.11 ", "ContentType": "text/plain"}], "uids": ["CYznpHSnRNzJkdlVi"]} -{"Format": "IDEA0", "ID": "7b199e4f-85cc-42fe-91a7-dc67c70dac29", "DetectTime": "2023-10-30T14:00:02.257826+02:00", "EventTime": "2023-10-30T14:00:02.257845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.17.72 ", "ContentType": "text/plain"}], "uids": ["CECyxt4kOmyR6Jmt5c"]} -{"Format": "IDEA0", "ID": "b852d486-8b58-46a8-ad17-68dd2ee75ed8", "DetectTime": "2023-10-30T14:00:02.289525+02:00", "EventTime": "2023-10-30T14:00:02.289546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CRJwgsWoWeSzzEp32"]} -{"Format": "IDEA0", "ID": "bb475ca2-bdac-4eb5-8c9d-7a8fe9dc5a53", "DetectTime": "2023-10-30T14:00:02.315541+02:00", "EventTime": "2023-10-30T14:00:02.315561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CviK1b435grcBs3Mme"]} -{"Format": "IDEA0", "ID": "4b289ba9-cc42-45b7-a956-45fd2b6f15b0", "DetectTime": "2023-10-30T14:00:02.343675+02:00", "EventTime": "2023-10-30T14:00:02.343696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CIUxhv4pAWASdgITC7"]} -{"Format": "IDEA0", "ID": "94b4a0df-7ef4-4c0c-aa79-10a88ec38feb", "DetectTime": "2023-10-30T14:00:02.376018+02:00", "EventTime": "2023-10-30T14:00:02.376039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CGpW991dzJo1rE57Gf"]} -{"Format": "IDEA0", "ID": "d7f731ac-0267-47ea-95d2-f096f243388b", "DetectTime": "2023-10-30T14:00:02.399792+02:00", "EventTime": "2023-10-30T14:00:02.399804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.237.70.170 ", "ContentType": "text/plain"}], "uids": ["CzUWP3RgGINrjYeic"]} -{"Format": "IDEA0", "ID": "86646829-b1f3-4bee-b61c-44e18e022b41", "DetectTime": "2023-10-30T14:00:02.426800+02:00", "EventTime": "2023-10-30T14:00:02.426818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.208.123.138 ", "ContentType": "text/plain"}], "uids": ["CbooqD1q53qNa7Wlia"]} -{"Format": "IDEA0", "ID": "6cb6cb75-2272-40f0-bc46-45d92bec9c1d", "DetectTime": "2023-10-30T14:00:02.453127+02:00", "EventTime": "2023-10-30T14:00:02.453145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.17.72 ", "ContentType": "text/plain"}], "uids": ["CwhV9L2PwOxB98n00h"]} -{"Format": "IDEA0", "ID": "d4f8cbbc-306d-48ba-82af-c6087ab188d2", "DetectTime": "2023-10-30T14:00:02.480239+02:00", "EventTime": "2023-10-30T14:00:02.480256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CLIn3l4SrkziwALr9g"]} -{"Format": "IDEA0", "ID": "2f0535b1-dc9d-4fc7-91b1-52aa87eaf4b4", "DetectTime": "2023-10-30T14:00:02.505547+02:00", "EventTime": "2023-10-30T14:00:02.505564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CqplBU2GEOwF1aH8zj"]} -{"Format": "IDEA0", "ID": "6c160b4e-64dd-4c6a-809e-8d9faef07817", "DetectTime": "2023-10-30T14:00:02.530373+02:00", "EventTime": "2023-10-30T14:00:02.530390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CnaByh2vUfiQbrZ8ci"]} -{"Format": "IDEA0", "ID": "3a5bd439-6276-4e07-a0b9-6690228f6553", "DetectTime": "2023-10-30T14:00:02.555666+02:00", "EventTime": "2023-10-30T14:00:02.555678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.93.140.11 ", "ContentType": "text/plain"}], "uids": ["C6XP0E17xLZZu7JkV1"]} -{"Format": "IDEA0", "ID": "1e5a513d-85d7-43c1-9677-4ce89b162336", "DetectTime": "2023-10-30T14:00:02.580142+02:00", "EventTime": "2023-10-30T14:00:02.580158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CNPt2l2RKcIAZUIZh3"]} -{"Format": "IDEA0", "ID": "3feab8d6-02f7-4df7-b8e5-46da54231d8d", "DetectTime": "2023-10-30T14:00:02.601112+02:00", "EventTime": "2023-10-30T14:00:02.601129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.86.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.86.63 ", "ContentType": "text/plain"}], "uids": ["CXFki34SUw1AjSrFgi"]} -{"Format": "IDEA0", "ID": "af0988a7-e73c-4445-8e40-b8e0d5978eba", "DetectTime": "2023-10-30T14:00:02.627180+02:00", "EventTime": "2023-10-30T14:00:02.627199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.17.72 ", "ContentType": "text/plain"}], "uids": ["CKkcbswErxqUj9PPi"]} -{"Format": "IDEA0", "ID": "cd4532cf-259a-4dfd-bcdf-fd48e468403e", "DetectTime": "2023-10-30T14:00:02.655978+02:00", "EventTime": "2023-10-30T14:00:02.655999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CwJq6B3bvgqoM0YHy9"]} -{"Format": "IDEA0", "ID": "a95819be-84c5-4c4b-942e-ef8efe966051", "DetectTime": "2023-10-30T14:00:02.680260+02:00", "EventTime": "2023-10-30T14:00:02.680272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CNVouiTl60cofpP22"]} -{"Format": "IDEA0", "ID": "a0493788-72f5-446b-8a54-7ee10110f651", "DetectTime": "2023-10-30T14:00:02.705375+02:00", "EventTime": "2023-10-30T14:00:02.705396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CeoUir1xcAyG4swXje"]} -{"Format": "IDEA0", "ID": "de9ca8e4-039f-473f-a377-2b59568aaf0f", "DetectTime": "2023-10-30T14:00:02.729070+02:00", "EventTime": "2023-10-30T14:00:02.729082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.189.51.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.189.51.187 ", "ContentType": "text/plain"}], "uids": ["Cj2wMZ1oA3MCxUAmqj"]} -{"Format": "IDEA0", "ID": "f0bf22d8-af6b-4766-b588-24737c1f63ef", "DetectTime": "2023-10-30T14:00:02.757331+02:00", "EventTime": "2023-10-30T14:00:02.757343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CrWWbA4lKLGAxgdxAd"]} -{"Format": "IDEA0", "ID": "5b5e8453-44fa-4e93-a97a-f1323c5143b0", "DetectTime": "2023-10-30T14:00:02.780537+02:00", "EventTime": "2023-10-30T14:00:02.780552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["C7i0fa4FWT40ASxPI7"]} -{"Format": "IDEA0", "ID": "73bb571e-1ab0-4b5b-8b85-03329aa43bbb", "DetectTime": "2023-10-30T14:00:02.803040+02:00", "EventTime": "2023-10-30T14:00:02.803057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["C3mR022fUsGMEX0xAe"]} -{"Format": "IDEA0", "ID": "dbecbafc-e72d-4d5b-af49-f099ea3c1434", "DetectTime": "2023-10-30T14:00:02.828120+02:00", "EventTime": "2023-10-30T14:00:02.828135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["C2ylYQ3rsza25lrzpi"]} -{"Format": "IDEA0", "ID": "96564186-5a86-43bc-97fd-72ec62edae95", "DetectTime": "2023-10-30T14:00:02.851446+02:00", "EventTime": "2023-10-30T14:00:02.851459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["C8B3JVDBT9DRn9z33"]} -{"Format": "IDEA0", "ID": "4f344054-e1a4-440d-a7e8-903697823fd9", "DetectTime": "2023-10-30T14:00:02.879146+02:00", "EventTime": "2023-10-30T14:00:02.879168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.92.75.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.92.75.150 ", "ContentType": "text/plain"}], "uids": ["CfYdBG2AiGd1vWJWk"]} -{"Format": "IDEA0", "ID": "0c7dd4ce-8aac-4282-8f29-5b28b91d6cdf", "DetectTime": "2023-10-30T14:00:02.906184+02:00", "EventTime": "2023-10-30T14:00:02.906204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C46Gvf3U713jr3KI15"]} -{"Format": "IDEA0", "ID": "2ebb7b9f-99ee-48d6-b9cb-d9f2ad5e7cca", "DetectTime": "2023-10-30T14:00:02.930249+02:00", "EventTime": "2023-10-30T14:00:02.930266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.77.231.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.77.231.101 ", "ContentType": "text/plain"}], "uids": ["CFJzQf4CvtodE1lQT8"]} -{"Format": "IDEA0", "ID": "1b10579d-9396-46e1-970c-b827b21f2cef", "DetectTime": "2023-10-30T14:00:02.955879+02:00", "EventTime": "2023-10-30T14:00:02.955895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["C0xP7E1Jh2v66FMFSa"]} -{"Format": "IDEA0", "ID": "1aa92290-94d7-46ce-bb67-113d782757f4", "DetectTime": "2023-10-30T14:00:02.980414+02:00", "EventTime": "2023-10-30T14:00:02.980436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CpngW63u4zMSxQZPEb"]} -{"Format": "IDEA0", "ID": "e0d5e984-1fa4-4835-bb31-760164ba5e0b", "DetectTime": "2023-10-30T14:00:03.011111+02:00", "EventTime": "2023-10-30T14:00:03.011131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CyG25r318o3gR0Zic2"]} -{"Format": "IDEA0", "ID": "e67ec1db-84bd-4035-9fc0-a2500740c872", "DetectTime": "2023-10-30T14:00:03.035488+02:00", "EventTime": "2023-10-30T14:00:03.035505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.17.72 ", "ContentType": "text/plain"}], "uids": ["C0tjF71moiO8gMGws3"]} -{"Format": "IDEA0", "ID": "a0b91960-e9d4-4d23-8f51-80b32032b152", "DetectTime": "2023-10-30T14:00:03.062552+02:00", "EventTime": "2023-10-30T14:00:03.062574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C9jff42JIOU8lWghWj"]} -{"Format": "IDEA0", "ID": "78d098d9-2ea0-43b2-9023-45f4d284076a", "DetectTime": "2023-10-30T14:00:03.092450+02:00", "EventTime": "2023-10-30T14:00:03.092467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["Cr9fS62WAZPHykPui5"]} -{"Format": "IDEA0", "ID": "7070b0a2-d768-460c-9d02-c95002ebf016", "DetectTime": "2023-10-30T14:00:03.121456+02:00", "EventTime": "2023-10-30T14:00:03.121472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["C4LBpl3C5bSDsBfec"]} -{"Format": "IDEA0", "ID": "951700a9-8c7d-4eca-b55d-60afac0f3eb3", "DetectTime": "2023-10-30T14:00:03.145986+02:00", "EventTime": "2023-10-30T14:00:03.146005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CWgJJC2TmTYIF2DsU6"]} -{"Format": "IDEA0", "ID": "9dafdaec-cac9-4e92-8b0b-fcdcac6e1862", "DetectTime": "2023-10-30T14:00:03.177209+02:00", "EventTime": "2023-10-30T14:00:03.177234+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoFlO53P7arTYFzbZf"]} -{"Format": "IDEA0", "ID": "73850469-cdff-43a9-811e-dd499d1dccfc", "DetectTime": "2023-10-30T14:00:03.189169+02:00", "EventTime": "2023-10-30T14:00:03.189195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CwfEBN1bLI8c6FZlyc"]} -{"Format": "IDEA0", "ID": "20e5dedb-932b-4f40-ab9f-9568deda948d", "DetectTime": "2023-10-30T14:00:03.217574+02:00", "EventTime": "2023-10-30T14:00:03.217586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CUbjk21IEMAh3CXBf3"]} -{"Format": "IDEA0", "ID": "d96c0ba7-01e3-4274-b0cb-4c10852af162", "DetectTime": "2023-10-30T14:00:03.243604+02:00", "EventTime": "2023-10-30T14:00:03.243625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["Czr5Hi10oTAUPYw9he"]} -{"Format": "IDEA0", "ID": "dd9bbc29-2b1a-45db-9b9d-57d5719c0832", "DetectTime": "2023-10-30T14:00:03.267823+02:00", "EventTime": "2023-10-30T14:00:03.267844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["C8pYHj3Y0VcGPJts23"]} -{"Format": "IDEA0", "ID": "ef7cc98b-f14e-4153-9b2c-84c6b52de585", "DetectTime": "2023-10-30T14:00:03.290620+02:00", "EventTime": "2023-10-30T14:00:03.290641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.237.70.170 ", "ContentType": "text/plain"}], "uids": ["C2BMZs1iNWvEkYhWI"]} -{"Format": "IDEA0", "ID": "31dc41a7-43fd-4b3f-8221-737f95fbd873", "DetectTime": "2023-10-30T14:00:03.315038+02:00", "EventTime": "2023-10-30T14:00:03.315058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["CTSMr22daDWaQ0Dyfe"]} -{"Format": "IDEA0", "ID": "d0ea6bd2-9862-45e9-a959-f13521669d68", "DetectTime": "2023-10-30T14:00:03.340749+02:00", "EventTime": "2023-10-30T14:00:03.340765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CQTEBk44hjHyN4f4Ca"]} -{"Format": "IDEA0", "ID": "57f5bdce-6b6a-45ba-9037-039beedf7bce", "DetectTime": "2023-10-30T14:00:03.366536+02:00", "EventTime": "2023-10-30T14:00:03.366557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CwJMZNAScSrrVeepk"]} -{"Format": "IDEA0", "ID": "36f56ef0-9f5e-4aad-b98c-015ac50bb4a5", "DetectTime": "2023-10-30T14:00:03.394208+02:00", "EventTime": "2023-10-30T14:00:03.394224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CswkLXgkwUjxQuP7e"]} -{"Format": "IDEA0", "ID": "9249c192-bd9c-4165-84cc-1c4dcc06bc46", "DetectTime": "2023-10-30T14:00:03.421556+02:00", "EventTime": "2023-10-30T14:00:03.421580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CuhAUCSGM4dSwgo59"]} -{"Format": "IDEA0", "ID": "94a1c838-0919-4f8c-9a8c-b39faa552766", "DetectTime": "2023-10-30T14:00:03.448990+02:00", "EventTime": "2023-10-30T14:00:03.449008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.4.149.160 ", "ContentType": "text/plain"}], "uids": ["CHuxAc4x3NjpmjWX9f"]} -{"Format": "IDEA0", "ID": "ec8b1b18-a1f4-43ff-b181-bff9c42a8b65", "DetectTime": "2023-10-30T14:00:03.478737+02:00", "EventTime": "2023-10-30T14:00:03.478754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.75.11.60 ", "ContentType": "text/plain"}], "uids": ["CooITI1l4agAicnHh3"]} -{"Format": "IDEA0", "ID": "8a6c5b08-b857-43f1-8e4e-2b94809431f1", "DetectTime": "2023-10-30T14:00:03.502524+02:00", "EventTime": "2023-10-30T14:00:03.502542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.231.69.224 ", "ContentType": "text/plain"}], "uids": ["CCSVLy46NbyEumWu7j"]} -{"Format": "IDEA0", "ID": "fd04fdb6-c3ac-4983-99d4-f0729477cf75", "DetectTime": "2023-10-30T14:00:03.531469+02:00", "EventTime": "2023-10-30T14:00:03.531490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["C70rza1FiRmija9oC4"]} -{"Format": "IDEA0", "ID": "dcf62774-6261-4f03-9ba5-b69408959fde", "DetectTime": "2023-10-30T14:00:03.555993+02:00", "EventTime": "2023-10-30T14:00:03.556010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.189.51.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.189.51.187 ", "ContentType": "text/plain"}], "uids": ["CbyUAR3wQY7YtYSJV1"]} -{"Format": "IDEA0", "ID": "f43b7be3-f9e8-4eb7-b259-73b5bbb4399b", "DetectTime": "2023-10-30T14:00:03.580096+02:00", "EventTime": "2023-10-30T14:00:03.580119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.208.123.138 ", "ContentType": "text/plain"}], "uids": ["CVIx3J3bWjP0jCKzxi"]} -{"Format": "IDEA0", "ID": "d32a75e6-61c1-4d20-99f8-a44bc38cb808", "DetectTime": "2023-10-30T14:00:03.600363+02:00", "EventTime": "2023-10-30T14:00:03.600375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.93.140.11 ", "ContentType": "text/plain"}], "uids": ["C6bRHr491tAPHZWYrd"]} -{"Format": "IDEA0", "ID": "d7e4dc52-c85d-489b-ae05-4940c4507c84", "DetectTime": "2023-10-30T14:00:03.626840+02:00", "EventTime": "2023-10-30T14:00:03.626863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["Cs7bJb21ADYsg3mC3k"]} -{"Format": "IDEA0", "ID": "70665281-9ac7-48f9-8425-9832f0fdf4e7", "DetectTime": "2023-10-30T14:00:03.656661+02:00", "EventTime": "2023-10-30T14:00:03.656684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CmtHWk2aouyKtJlNLe"]} -{"Format": "IDEA0", "ID": "c50b1326-4ffe-482d-b505-1929d24c2efe", "DetectTime": "2023-10-30T14:00:03.681526+02:00", "EventTime": "2023-10-30T14:00:03.681539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["CTirJn25Jun4iMmVvl"]} -{"Format": "IDEA0", "ID": "ff266b44-bbf5-4211-89ab-0ef1d8416210", "DetectTime": "2023-10-30T14:00:03.705613+02:00", "EventTime": "2023-10-30T14:00:03.705639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFTZlX1KxSjgvKWcE7"]} -{"Format": "IDEA0", "ID": "16be1883-af6e-4c01-890f-5608a48be802", "DetectTime": "2023-10-30T14:00:03.729651+02:00", "EventTime": "2023-10-30T14:00:03.729671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx", "ContentType": "text/plain"}], "uids": ["C88oJZ3EgaQqWNwW42"]} -{"Format": "IDEA0", "ID": "c2b22589-80a0-4fd1-972c-22633377c3db", "DetectTime": "2023-10-30T14:00:03.753371+02:00", "EventTime": "2023-10-30T14:00:03.753383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CbOX2J30wsX2Axse7k"]} -{"Format": "IDEA0", "ID": "87f90fbc-79cf-4921-bfbf-1e7b0df649b8", "DetectTime": "2023-10-30T14:00:03.774682+02:00", "EventTime": "2023-10-30T14:00:03.774693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["Cct2yB1ohRneI6Z4Vl"]} -{"Format": "IDEA0", "ID": "7559d8ef-2efc-48b5-9559-5438b652e2cd", "DetectTime": "2023-10-30T14:00:03.798321+02:00", "EventTime": "2023-10-30T14:00:03.798334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CjyEkR3RcUEVBSn83"]} -{"Format": "IDEA0", "ID": "218737fb-0a84-4d37-ad35-6bef15ec2ba6", "DetectTime": "2023-10-30T14:00:03.821735+02:00", "EventTime": "2023-10-30T14:00:03.821751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["C1yIEf1urk10vRYcBj"]} -{"Format": "IDEA0", "ID": "675af9e4-b913-4ab8-9d0d-da2667c04475", "DetectTime": "2023-10-30T14:00:03.844963+02:00", "EventTime": "2023-10-30T14:00:03.844974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CaPrdB1PwnjNkzEdc1"]} -{"Format": "IDEA0", "ID": "82f5704b-efee-410f-8f4d-68debbb73fc0", "DetectTime": "2023-10-30T14:00:03.870874+02:00", "EventTime": "2023-10-30T14:00:03.870894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CNSmij4N21PyrNCJ04"]} -{"Format": "IDEA0", "ID": "78b3f9aa-5dbb-4b5e-b498-be851fde8551", "DetectTime": "2023-10-30T14:00:03.897854+02:00", "EventTime": "2023-10-30T14:00:03.897875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CHSNp92Cmi6Orm1dRi"]} -{"Format": "IDEA0", "ID": "474375be-6d21-424f-8006-60925fce1050", "DetectTime": "2023-10-30T14:00:03.923894+02:00", "EventTime": "2023-10-30T14:00:03.923910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["CzZwrt4tntqn6vAFf9"]} -{"Format": "IDEA0", "ID": "5625ba0f-9a9a-4ecb-bc65-7eb58557b8a4", "DetectTime": "2023-10-30T14:00:03.945924+02:00", "EventTime": "2023-10-30T14:00:03.945941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CNtGo71iaQtTmoLCci"]} -{"Format": "IDEA0", "ID": "7421438b-3bd9-4700-9ea1-f0d07a183e5e", "DetectTime": "2023-10-30T14:00:03.966602+02:00", "EventTime": "2023-10-30T14:00:03.966613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CQT0CGKzoyNnigFj"]} -{"Format": "IDEA0", "ID": "0d358bf8-1b77-493a-8e6e-3f8ebcb5064e", "DetectTime": "2023-10-30T14:00:03.990739+02:00", "EventTime": "2023-10-30T14:00:03.990756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLoPau4LJq90LdlRD3", "CThzm23VBESaEIigC6", "CLuyGN1vwY9VaiLYEe", "C2KkJ71sWi2c0Bp9pg"]} -{"Format": "IDEA0", "ID": "0368d6dd-f863-448a-ad3d-036727462f6c", "DetectTime": "2023-10-30T14:00:04.001571+02:00", "EventTime": "2023-10-30T14:00:04.001588+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CThzm23VBESaEIigC6"]} -{"Format": "IDEA0", "ID": "e3d1e688-18e1-420a-821e-a4bbf145de9d", "DetectTime": "2023-10-30T14:00:04.013181+02:00", "EventTime": "2023-10-30T14:00:04.013203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5675], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5675/UDP destination IP 181.117.66.104. ", "ContentType": "text/plain"}], "uids": ["C7zIF34Q2kW98rjDd2"]} -{"Format": "IDEA0", "ID": "d2d96dd1-64ae-470a-af0d-1121329f417a", "DetectTime": "2023-10-30T14:00:04.038150+02:00", "EventTime": "2023-10-30T14:00:04.038172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cwy5Qd1jkS7zn0Mnh2"]} -{"Format": "IDEA0", "ID": "2a0cb6be-b218-4b66-9870-4b372277ed39", "DetectTime": "2023-10-30T14:00:04.049970+02:00", "EventTime": "2023-10-30T14:00:04.049992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CkkRXQYhJEokzOutd"]} -{"Format": "Json", "ID": "2a0cb6be-b218-4b66-9870-4b372277ed39", "DetectTime": "2023-10-30T14:00:04.049970+02:00", "EventTime": "2023-10-30T14:00:04.049992+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T04:29:37.013786+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2023/10/30 14:00:04.098370)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e7bd3c61-ead5-4b24-8c63-a3492beb8b94", "DetectTime": "2023-10-30T14:00:04.103574+02:00", "EventTime": "2023-10-30T14:00:04.103591+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7utMc1M45dOYJedF9"]} -{"Format": "IDEA0", "ID": "c9514ea0-a598-4397-8f0a-c91c23e03429", "DetectTime": "2023-10-30T14:00:04.116282+02:00", "EventTime": "2023-10-30T14:00:04.116299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12298/UDP destination IP 187.232.5.137. ", "ContentType": "text/plain"}], "uids": ["CqEyu722EVl4dBDR84"]} -{"Format": "IDEA0", "ID": "c998580d-4741-4b5f-addc-b754cef4b267", "DetectTime": "2023-10-30T14:00:04.142490+02:00", "EventTime": "2023-10-30T14:00:04.142514+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJnI2W2mbB8vZhhaVb"]} -{"Format": "IDEA0", "ID": "e7ef2e99-414d-4393-998d-3184a6e1d5de", "DetectTime": "2023-10-30T14:00:04.155367+02:00", "EventTime": "2023-10-30T14:00:04.155389+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CV0azC3z6m81FLCKPi"]} -{"Format": "IDEA0", "ID": "37293469-70c6-4349-837d-579c7a637999", "DetectTime": "2023-10-30T14:00:04.167504+02:00", "EventTime": "2023-10-30T14:00:04.167525+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbkMMM1hTYrnNYA3j2"]} -{"Format": "IDEA0", "ID": "9d34dc2e-b092-4f71-b7c6-2ca43911eb32", "DetectTime": "2023-10-30T14:00:04.179548+02:00", "EventTime": "2023-10-30T14:00:04.179565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4792], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4792/UDP destination IP 76.232.9.206. ", "ContentType": "text/plain"}], "uids": ["CQvjS01jY0Vn5a8932"]} -{"Format": "IDEA0", "ID": "ee8fafce-11b1-4cc2-9991-53c54101de54", "DetectTime": "2023-10-30T14:00:04.202222+02:00", "EventTime": "2023-10-30T14:00:04.202245+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaOcTA1eYT7ZioUfg"]} -{"Format": "IDEA0", "ID": "c62edd1d-ef3d-43e9-b089-6d6bd40808c5", "DetectTime": "2023-10-30T14:00:04.214750+02:00", "EventTime": "2023-10-30T14:00:04.214771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["Carlp71aQ1o1138YK3"]} -{"Format": "IDEA0", "ID": "584dc468-377d-4aec-ae1f-0fa092f48d66", "DetectTime": "2023-10-30T14:00:04.238126+02:00", "EventTime": "2023-10-30T14:00:04.238147+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["CsQcG43VkERfnpwT4"]} -{"Format": "IDEA0", "ID": "32d16061-2878-4a66-acb8-df9e2c3d8746", "DetectTime": "2023-10-30T14:00:04.246855+02:00", "EventTime": "2023-10-30T14:00:04.246869+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CN0oWT3QceSR3DJ0wb"]} -{"Format": "IDEA0", "ID": "c55b79b8-9ae3-450e-801c-1d12efef18cf", "DetectTime": "2023-10-30T14:00:04.257667+02:00", "EventTime": "2023-10-30T14:00:04.257689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["CCnfGH3uf6dAJQtz6f"]} -{"Format": "IDEA0", "ID": "6ee46af3-6583-4a51-b031-1f03d07e180a", "DetectTime": "2023-10-30T14:00:04.278859+02:00", "EventTime": "2023-10-30T14:00:04.278879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20658/UDP destination IP 2.136.52.21. ", "ContentType": "text/plain"}], "uids": ["CCAmyF2gw6yrvDWaTa"]} -{"Format": "IDEA0", "ID": "e9d6fc9d-c8a8-4212-85bf-f94be8d59418", "DetectTime": "2023-10-30T14:00:04.298321+02:00", "EventTime": "2023-10-30T14:00:04.298338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPANrz2msFsfLhxaA3", "C7utMc1M45dOYJedF9", "CaOcTA1eYT7ZioUfg", "CV0azC3z6m81FLCKPi"]} -{"Format": "IDEA0", "ID": "a0b77012-ce01-45bb-94f8-c22478135f15", "DetectTime": "2023-10-30T14:00:04.308623+02:00", "EventTime": "2023-10-30T14:00:04.308639+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPANrz2msFsfLhxaA3"]} -{"Format": "IDEA0", "ID": "7cdd6958-cb2c-4be1-a581-85921e87d7f1", "DetectTime": "2023-10-30T14:00:04.323063+02:00", "EventTime": "2023-10-30T14:00:04.323084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CXL2E87YpiLq6Zgkg"]} -{"Format": "IDEA0", "ID": "58c36c20-d8af-4f0f-92bd-9227092d680c", "DetectTime": "2023-10-30T14:00:04.346845+02:00", "EventTime": "2023-10-30T14:00:04.346872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["CeRuD829BxowFb74v8"]} -{"Format": "IDEA0", "ID": "860c3942-b578-4e8e-92ca-79a5e80fcc90", "DetectTime": "2023-10-30T14:00:04.370225+02:00", "EventTime": "2023-10-30T14:00:04.370245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4931], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. ", "ContentType": "text/plain"}], "uids": ["CkA9feUk2B5ZxsxEk"]} -{"Format": "Json", "ID": "860c3942-b578-4e8e-92ca-79a5e80fcc90", "DetectTime": "2023-10-30T14:00:04.370225+02:00", "EventTime": "2023-10-30T14:00:04.370245+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4931], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T04:31:39.181468+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2023/10/30 14:00:04.417357)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed229e4d-7146-4d4d-ae6d-eaa5efbaceec", "DetectTime": "2023-10-30T14:00:04.423170+02:00", "EventTime": "2023-10-30T14:00:04.423183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1134/UDP destination IP 78.154.84.83. ", "ContentType": "text/plain"}], "uids": ["CDgPIi3e01tNRSs6z7"]} -{"Format": "IDEA0", "ID": "f3f5db32-e709-4614-b934-749791011e63", "DetectTime": "2023-10-30T14:00:04.443673+02:00", "EventTime": "2023-10-30T14:00:04.443691+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CedVlB3Msw5ur8Psjd"]} -{"Format": "IDEA0", "ID": "de458d79-059f-4807-accd-ab8b185e4841", "DetectTime": "2023-10-30T14:00:04.453929+02:00", "EventTime": "2023-10-30T14:00:04.453945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16086], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. ", "ContentType": "text/plain"}], "uids": ["CtmoXa4bjqNUPI7MDk"]} -{"Format": "IDEA0", "ID": "3584a7da-4a52-4d44-a1a7-1e46fb8ed330", "DetectTime": "2023-10-30T14:00:04.473347+02:00", "EventTime": "2023-10-30T14:00:04.473370+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7SkdH3iVao9jIQPDk"]} -{"Format": "IDEA0", "ID": "201057c0-8d0c-4718-abea-8c3a16c1db1c", "DetectTime": "2023-10-30T14:00:04.485678+02:00", "EventTime": "2023-10-30T14:00:04.485691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8632], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. ", "ContentType": "text/plain"}], "uids": ["CK5sSyn3wVDcYwqek"]} -{"Format": "IDEA0", "ID": "448bf854-9b51-47bb-99a6-4a1290add870", "DetectTime": "2023-10-30T14:00:04.503060+02:00", "EventTime": "2023-10-30T14:00:04.503080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5220], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. ", "ContentType": "text/plain"}], "uids": ["CAxUkE2b6FwFf4Qkv2"]} -{"Format": "IDEA0", "ID": "c0f60140-6de2-469c-aa83-e6b7a27c4646", "DetectTime": "2023-10-30T14:00:04.525715+02:00", "EventTime": "2023-10-30T14:00:04.525728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CJ20Cz4H8euv1zreAd"]} -{"Format": "IDEA0", "ID": "0aec3fa9-e85c-4e34-b4f8-7899e46eeae8", "DetectTime": "2023-10-30T14:00:04.543873+02:00", "EventTime": "2023-10-30T14:00:04.543894+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["C3HAKj4WP1xFO7cixl"]} -{"Format": "IDEA0", "ID": "c27f34f2-5449-48f0-8591-c31b6ea692cc", "DetectTime": "2023-10-30T14:00:04.553049+02:00", "EventTime": "2023-10-30T14:00:04.553070+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["Cz7Lzb33KJbmcZe6mc"]} -{"Format": "IDEA0", "ID": "1d22dfa5-12b4-4737-9599-862d8841a2e6", "DetectTime": "2023-10-30T14:00:04.561910+02:00", "EventTime": "2023-10-30T14:00:04.561925+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMvFkX1gZq2ccIZjvi"]} -{"Format": "IDEA0", "ID": "6cbd3f67-46c9-4d3b-91b2-966b6377ac41", "DetectTime": "2023-10-30T14:00:04.572528+02:00", "EventTime": "2023-10-30T14:00:04.572544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["CmjMw1Vr0vmfjygc1"]} -{"Format": "IDEA0", "ID": "3672b5aa-29ef-422f-a366-058a02716447", "DetectTime": "2023-10-30T14:00:04.592384+02:00", "EventTime": "2023-10-30T14:00:04.592405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtMlMP3bWjAT0cNPib"]} -{"Format": "IDEA0", "ID": "0846d64e-55da-42bc-86e1-3b489565d266", "DetectTime": "2023-10-30T14:00:04.613507+02:00", "EventTime": "2023-10-30T14:00:04.613529+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfOCta19deuDpKmpcj"]} -{"Format": "IDEA0", "ID": "043082b3-0740-4267-afb2-e10655f59d5b", "DetectTime": "2023-10-30T14:00:04.628619+02:00", "EventTime": "2023-10-30T14:00:04.628643+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cv7HXz208WAzMaTr68"]} -{"Format": "IDEA0", "ID": "2b7d666f-58ec-48a1-91f2-77cfa1168438", "DetectTime": "2023-10-30T14:00:04.642098+02:00", "EventTime": "2023-10-30T14:00:04.642120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["ChFVuD1DttO8l1kpd4"]} -{"Format": "IDEA0", "ID": "00fce82d-839a-4ea4-a453-067106980b35", "DetectTime": "2023-10-30T14:00:04.663381+02:00", "EventTime": "2023-10-30T14:00:04.663400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CCtpNm21XEf9RWWG0i"]} -{"Format": "IDEA0", "ID": "ff0aed32-efc6-4824-9159-5b145dfd73be", "DetectTime": "2023-10-30T14:00:04.703872+02:00", "EventTime": "2023-10-30T14:00:04.703887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CO67MS2ple7uYtcbG6"]} -{"Format": "IDEA0", "ID": "67c3cdc1-177b-4043-a47b-02e54b5af5b5", "DetectTime": "2023-10-30T14:00:04.749516+02:00", "EventTime": "2023-10-30T14:00:04.749537+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVdErw3FVTLPkvWoig"]} -{"Format": "IDEA0", "ID": "ba882751-383b-42b2-91f3-ef394610bf43", "DetectTime": "2023-10-30T14:00:04.762452+02:00", "EventTime": "2023-10-30T14:00:04.762472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. ", "ContentType": "text/plain"}], "uids": ["C9lshB3JrrVyJDjpX1"]} -{"Format": "IDEA0", "ID": "9b6d6d31-03ae-4e82-955c-660b14f489c7", "DetectTime": "2023-10-30T14:00:04.807674+02:00", "EventTime": "2023-10-30T14:00:04.807692+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzlQPqJmJYz0dit6"]} -{"Format": "IDEA0", "ID": "afe75c66-33d7-473a-bce5-3158a3721c06", "DetectTime": "2023-10-30T14:00:04.819704+02:00", "EventTime": "2023-10-30T14:00:04.819720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["C6AH653SHLi0uCHKmd"]} -{"Format": "IDEA0", "ID": "f832540b-e7ea-4523-8b82-8e9d35fc5da3", "DetectTime": "2023-10-30T14:00:04.932322+02:00", "EventTime": "2023-10-30T14:00:04.932343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C86dlq4LmzMMl3XqEl"]} -{"Format": "IDEA0", "ID": "a280dadf-45f9-4159-9376-eac56cb47d88", "DetectTime": "2023-10-30T14:00:04.979208+02:00", "EventTime": "2023-10-30T14:00:04.979226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C7SkdH3iVao9jIQPDk", "CfOCta19deuDpKmpcj", "CnnSEq2XfN5IOXGkue", "CVdErw3FVTLPkvWoig"]} -{"Format": "IDEA0", "ID": "472a3dd6-9641-4e48-bb37-f446fded9237", "DetectTime": "2023-10-30T14:00:04.994054+02:00", "EventTime": "2023-10-30T14:00:04.994070+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnnSEq2XfN5IOXGkue"]} -{"Format": "IDEA0", "ID": "f9196b05-bed1-4df8-8ad8-7a09037f39a7", "DetectTime": "2023-10-30T14:00:05.007866+02:00", "EventTime": "2023-10-30T14:00:05.007886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["C2H8ef1gKWrYI3V4Bd"]} -{"Format": "Json", "ID": "f9196b05-bed1-4df8-8ad8-7a09037f39a7", "DetectTime": "2023-10-30T14:00:05.007866+02:00", "EventTime": "2023-10-30T14:00:05.007886+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:04:01.568988+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:05.124307)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cfa99af4-b735-4f60-a971-e8bdd73bc474", "DetectTime": "2023-10-30T14:00:05.128613+02:00", "EventTime": "2023-10-30T14:00:05.128626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["COusw12K9fgtSYnbY6"]} -{"Format": "IDEA0", "ID": "513c940b-8b7f-4a2b-801f-77b43fa89f8b", "DetectTime": "2023-10-30T14:00:05.180227+02:00", "EventTime": "2023-10-30T14:00:05.180243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CUAuZv4hQpkoSgsKT2"]} -{"Format": "IDEA0", "ID": "1c54c5c5-2d47-4bb7-8edd-67c9bbfd5129", "DetectTime": "2023-10-30T14:00:05.220149+02:00", "EventTime": "2023-10-30T14:00:05.220161+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAbSRw28blnm0I1foa"]} -{"Format": "IDEA0", "ID": "2bde9b87-0349-4e6a-960f-2666ec3a18c2", "DetectTime": "2023-10-30T14:00:05.233584+02:00", "EventTime": "2023-10-30T14:00:05.233602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CU92zV17xdxz6Q2Aa8"]} -{"Format": "IDEA0", "ID": "74af34e4-7208-450d-b184-68251a09f9a4", "DetectTime": "2023-10-30T14:00:05.281910+02:00", "EventTime": "2023-10-30T14:00:05.281927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CcfXUh4hJaMVYh60Sk"]} -{"Format": "IDEA0", "ID": "5c727644-8551-4365-801f-2b2b64cf7726", "DetectTime": "2023-10-30T14:00:05.330669+02:00", "EventTime": "2023-10-30T14:00:05.330691+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeY5Iu3yNRGfzExDIl"]} -{"Format": "IDEA0", "ID": "6ec994d9-b51c-4d4d-9831-5f12c30973c8", "DetectTime": "2023-10-30T14:00:05.345454+02:00", "EventTime": "2023-10-30T14:00:05.345474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CRm1cw4IeKeMt80ZSj"]} -{"Format": "IDEA0", "ID": "cbfa4b64-9be4-4be4-906e-545875c7e894", "DetectTime": "2023-10-30T14:00:05.390978+02:00", "EventTime": "2023-10-30T14:00:05.391000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["C6EQKA4A8A9cs0T44i"]} -{"Format": "IDEA0", "ID": "dde1f4e8-52c3-42a0-aebf-d63d7387a117", "DetectTime": "2023-10-30T14:00:05.440269+02:00", "EventTime": "2023-10-30T14:00:05.440293+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaVHF53iONlJCPsF08"]} -{"Format": "IDEA0", "ID": "c6a6827d-7e13-4aea-a3b4-8abf20034c3b", "DetectTime": "2023-10-30T14:00:05.455412+02:00", "EventTime": "2023-10-30T14:00:05.455432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["C1UPM53WIrFknyZXqf"]} -{"Format": "IDEA0", "ID": "85432d5a-de6c-4e81-8fc1-ca97688203f7", "DetectTime": "2023-10-30T14:00:05.500977+02:00", "EventTime": "2023-10-30T14:00:05.500990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CEB0bQ0FoBYoWdVkg"]} -{"Format": "Json", "ID": "85432d5a-de6c-4e81-8fc1-ca97688203f7", "DetectTime": "2023-10-30T14:00:05.500977+02:00", "EventTime": "2023-10-30T14:00:05.500990+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:04:02.698928+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:05.574018)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f185084e-9f7c-4f1b-b17d-ab0a724334ea", "DetectTime": "2023-10-30T14:00:05.579608+02:00", "EventTime": "2023-10-30T14:00:05.579625+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cddgnj4qfJLHCjzn03"]} -{"Format": "IDEA0", "ID": "c2472376-0d56-47b2-975a-eadba42114a5", "DetectTime": "2023-10-30T14:00:05.594426+02:00", "EventTime": "2023-10-30T14:00:05.594452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["Czu23D1soYlw9I178"]} -{"Format": "IDEA0", "ID": "4302d89d-b18a-4656-ade5-fe41dbb188a8", "DetectTime": "2023-10-30T14:00:05.642446+02:00", "EventTime": "2023-10-30T14:00:05.642465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CCDYAX2RYYvFotcNXg"]} -{"Format": "IDEA0", "ID": "ec99217b-cf62-46d2-93b4-b985d9ce249e", "DetectTime": "2023-10-30T14:00:05.693739+02:00", "EventTime": "2023-10-30T14:00:05.693761+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CalkKd4EIGj1WDycZb"]} -{"Format": "IDEA0", "ID": "fe8c06b1-b83c-4a19-a253-7e55dcee7ad0", "DetectTime": "2023-10-30T14:00:05.710204+02:00", "EventTime": "2023-10-30T14:00:05.710223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CpWo0347smpy6zvfIj"]} -{"Format": "IDEA0", "ID": "ac950403-ef64-498e-a8fd-12527ce312f9", "DetectTime": "2023-10-30T14:00:05.772650+02:00", "EventTime": "2023-10-30T14:00:05.772668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CYVJDjbNSSl2tzhdc"]} -{"Format": "IDEA0", "ID": "47323af0-bee4-4f3e-aa2f-c3314047ed92", "DetectTime": "2023-10-30T14:00:05.824008+02:00", "EventTime": "2023-10-30T14:00:05.824035+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTji3fXaq4RtsPtQ7"]} -{"Format": "IDEA0", "ID": "1646dcbc-9eed-4164-bf48-91a853187f9d", "DetectTime": "2023-10-30T14:00:05.837439+02:00", "EventTime": "2023-10-30T14:00:05.837456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CPE8eaBX2dztOOAwd"]} -{"Format": "IDEA0", "ID": "5d253d35-7ed6-4f99-9b48-0d67d188ea05", "DetectTime": "2023-10-30T14:00:05.883643+02:00", "EventTime": "2023-10-30T14:00:05.883656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["C5Oa47c1DlEkVGKP6"]} -{"Format": "IDEA0", "ID": "56ad3613-1069-42a1-8a48-713a7ee91e18", "DetectTime": "2023-10-30T14:00:05.924875+02:00", "EventTime": "2023-10-30T14:00:05.925012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["CdgXVg2bEYUN7NkSAj"]} -{"Format": "IDEA0", "ID": "8a099792-6e27-44ce-8776-3b21a2ee88f6", "DetectTime": "2023-10-30T14:00:05.969962+02:00", "EventTime": "2023-10-30T14:00:05.969978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12298/UDP destination IP 187.232.5.137. ", "ContentType": "text/plain"}], "uids": ["CnTYYH3Y9ZtGwEiREe"]} -{"Format": "Json", "ID": "8a099792-6e27-44ce-8776-3b21a2ee88f6", "DetectTime": "2023-10-30T14:00:05.969962+02:00", "EventTime": "2023-10-30T14:00:05.969978+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12298], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:04:19.620187+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:06.043874)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "159d8641-48bf-4d29-aff5-ae16b505a0e0", "DetectTime": "2023-10-30T14:00:06.049203+02:00", "EventTime": "2023-10-30T14:00:06.049219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CRZxzB2s3bnwfsBbQg"]} -{"Format": "IDEA0", "ID": "cd1d485a-d102-48f8-96df-e11c2fe42f6e", "DetectTime": "2023-10-30T14:00:06.100541+02:00", "EventTime": "2023-10-30T14:00:06.100558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["CbJLvq4j0nmchFjOV2"]} -{"Format": "IDEA0", "ID": "0fae349b-c45a-4ac8-bb65-f25e90791763", "DetectTime": "2023-10-30T14:00:06.144370+02:00", "EventTime": "2023-10-30T14:00:06.144387+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvVgcA4J5vsLKTWgE6"]} -{"Format": "IDEA0", "ID": "c0e2bd39-9e72-4405-b7b9-2b049bf577d6", "DetectTime": "2023-10-30T14:00:06.158509+02:00", "EventTime": "2023-10-30T14:00:06.158525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CfR6fIQj0bVpVluk"]} -{"Format": "IDEA0", "ID": "d76f4661-ed48-46f2-ada6-a2c4a944d4b2", "DetectTime": "2023-10-30T14:00:06.201994+02:00", "EventTime": "2023-10-30T14:00:06.202013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CGFouc1GsY81DojXph", "Cddgnj4qfJLHCjzn03", "CeY5Iu3yNRGfzExDIl", "CTji3fXaq4RtsPtQ7"]} -{"Format": "IDEA0", "ID": "b2d9355f-6a42-4b4b-ae77-73817767b314", "DetectTime": "2023-10-30T14:00:06.216264+02:00", "EventTime": "2023-10-30T14:00:06.216286+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGFouc1GsY81DojXph"]} -{"Format": "IDEA0", "ID": "5ac5b7a0-6134-47e5-9f0a-7a84cbc3ef4d", "DetectTime": "2023-10-30T14:00:06.230562+02:00", "EventTime": "2023-10-30T14:00:06.230585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4931], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. ", "ContentType": "text/plain"}], "uids": ["Ca4mvQ3i8COucLk9uj"]} -{"Format": "IDEA0", "ID": "11a2d0e1-b0cc-4114-b40c-ce9e491f1b61", "DetectTime": "2023-10-30T14:00:06.277113+02:00", "EventTime": "2023-10-30T14:00:06.277130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["CZHsKi1YWE7aZzvQZ"]} -{"Format": "IDEA0", "ID": "ccf0c83b-6495-4896-b184-d15739971339", "DetectTime": "2023-10-30T14:00:06.317883+02:00", "EventTime": "2023-10-30T14:00:06.317900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16086], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. ", "ContentType": "text/plain"}], "uids": ["CmCgwy1kDpIU1NMF71"]} -{"Format": "IDEA0", "ID": "67f12630-7b19-4e87-9486-54ee53410156", "DetectTime": "2023-10-30T14:00:06.358207+02:00", "EventTime": "2023-10-30T14:00:06.358225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8632], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. ", "ContentType": "text/plain"}], "uids": ["CnKp7C1fA2wNL1oKga"]} -{"Format": "IDEA0", "ID": "ab1c2c96-79fe-4ce3-ab1a-163232a79e85", "DetectTime": "2023-10-30T14:00:06.400508+02:00", "EventTime": "2023-10-30T14:00:06.400526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CPi4Wr3RP5XEse1Su7"]} -{"Format": "Json", "ID": "ab1c2c96-79fe-4ce3-ab1a-163232a79e85", "DetectTime": "2023-10-30T14:00:06.400508+02:00", "EventTime": "2023-10-30T14:00:06.400526+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:05:52.702485+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:06.465144)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4c46cd34-d0e4-4e10-bc98-e341dc07b1d8", "DetectTime": "2023-10-30T14:00:06.470839+02:00", "EventTime": "2023-10-30T14:00:06.470864+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0mwUwP1iJd5MZsej"]} -{"Format": "IDEA0", "ID": "2ba59764-c32c-46b0-b028-eedfd609689e", "DetectTime": "2023-10-30T14:00:06.486742+02:00", "EventTime": "2023-10-30T14:00:06.486761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6781], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. ", "ContentType": "text/plain"}], "uids": ["CUbsvh2zFJpJQf3VJd"]} -{"Format": "IDEA0", "ID": "bf57992a-4213-4ce5-bc5c-6fd345be52e5", "DetectTime": "2023-10-30T14:00:06.525913+02:00", "EventTime": "2023-10-30T14:00:06.525934+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["C5Hg2m1tDjfWRxyEtb"]} -{"Format": "IDEA0", "ID": "3d760360-3a50-4bb3-b9f6-2b85a7178d3d", "DetectTime": "2023-10-30T14:00:06.536325+02:00", "EventTime": "2023-10-30T14:00:06.536347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["CsGV4a2oIN64ZMIZTl"]} -{"Format": "IDEA0", "ID": "7477dc33-5948-4677-9611-d2803d91570d", "DetectTime": "2023-10-30T14:00:06.574330+02:00", "EventTime": "2023-10-30T14:00:06.574356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZdL2S38AUXwzDKyBi"]} -{"Format": "IDEA0", "ID": "fe89abfe-f757-41ae-89c1-03f277dc42c8", "DetectTime": "2023-10-30T14:00:06.613538+02:00", "EventTime": "2023-10-30T14:00:06.613556+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cm8Vu34j6WCKHNhKm4"]} -{"Format": "IDEA0", "ID": "10e8c511-e94a-4e6c-884d-56a1218cd53d", "DetectTime": "2023-10-30T14:00:06.626900+02:00", "EventTime": "2023-10-30T14:00:06.626915+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChLSkY2aH51scF5k01"]} -{"Format": "IDEA0", "ID": "9fff7efa-a17b-418b-9684-ea403b37d638", "DetectTime": "2023-10-30T14:00:06.641177+02:00", "EventTime": "2023-10-30T14:00:06.641194+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cvcl7727CIOdCBgPCb"]} -{"Format": "IDEA0", "ID": "0e7d6cfa-feda-4f85-8ca1-663028d3074a", "DetectTime": "2023-10-30T14:00:06.653997+02:00", "EventTime": "2023-10-30T14:00:06.654018+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBIT2E1Ryhtrf5YyLg"]} -{"Format": "IDEA0", "ID": "ea50ce14-2006-4414-9fa5-159a11561e0c", "DetectTime": "2023-10-30T14:00:06.665119+02:00", "EventTime": "2023-10-30T14:00:06.665131+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ci5AX22h2vjcX0bRC8"]} -{"Format": "IDEA0", "ID": "3eb20997-47d2-4980-95c7-942c77a11a71", "DetectTime": "2023-10-30T14:00:06.676866+02:00", "EventTime": "2023-10-30T14:00:06.676885+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDoaEc1uwvU8vMXbob"]} -{"Format": "IDEA0", "ID": "a9eb7680-e104-445e-bf99-5ce27bd27edd", "DetectTime": "2023-10-30T14:00:06.691244+02:00", "EventTime": "2023-10-30T14:00:06.691261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5220], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. ", "ContentType": "text/plain"}], "uids": ["CFXhFy2Y2YTuEyq6J7"]} -{"Format": "IDEA0", "ID": "63f06863-9328-41e8-ac15-9cfe070818bb", "DetectTime": "2023-10-30T14:00:06.727576+02:00", "EventTime": "2023-10-30T14:00:06.727595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cvcl7727CIOdCBgPCb", "Cm8Vu34j6WCKHNhKm4", "Ci5AX22h2vjcX0bRC8", "CxVeaJ2Ts13tQqmWp1"]} -{"Format": "IDEA0", "ID": "dadd1cf5-6066-43f8-9f29-7af59048345c", "DetectTime": "2023-10-30T14:00:06.739732+02:00", "EventTime": "2023-10-30T14:00:06.739754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CE5vVkk5LdfVGR1Xc"]} -{"Format": "IDEA0", "ID": "6232b868-4302-4019-a1cf-6d4e8e097c4d", "DetectTime": "2023-10-30T14:00:06.773289+02:00", "EventTime": "2023-10-30T14:00:06.773310+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxVeaJ2Ts13tQqmWp1"]} -{"Format": "IDEA0", "ID": "92bed4d9-d383-4592-8e72-a2676ac11da4", "DetectTime": "2023-10-30T14:00:06.786977+02:00", "EventTime": "2023-10-30T14:00:06.786994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CNaifP1l5COLMCfTf"]} -{"Format": "IDEA0", "ID": "9c1eb7a4-8b13-409b-85ec-ff7d70a016bb", "DetectTime": "2023-10-30T14:00:06.826270+02:00", "EventTime": "2023-10-30T14:00:06.826286+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C91Hde2FtqHcYTLn3"]} -{"Format": "IDEA0", "ID": "cac69d52-b268-4adb-a41d-ba36331771c2", "DetectTime": "2023-10-30T14:00:06.841189+02:00", "EventTime": "2023-10-30T14:00:06.841206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["Cx58DryA30WtgiRNg"]} -{"Format": "IDEA0", "ID": "245dcd86-1627-4af7-8ae8-7d936785b3f3", "DetectTime": "2023-10-30T14:00:06.870749+02:00", "EventTime": "2023-10-30T14:00:06.870770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CXOQIMlIekW8WsJol"]} -{"Format": "Json", "ID": "245dcd86-1627-4af7-8ae8-7d936785b3f3", "DetectTime": "2023-10-30T14:00:06.870749+02:00", "EventTime": "2023-10-30T14:00:06.870770+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:37:55.451271+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:06.930224)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8537cb17-215c-4ecc-88c1-fdf2abf7587e", "DetectTime": "2023-10-30T14:00:06.935277+02:00", "EventTime": "2023-10-30T14:00:06.935295+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQiNTI3uomG25CPy5"]} -{"Format": "IDEA0", "ID": "4f02fc95-5f8a-433c-833e-3dcc91df62ec", "DetectTime": "2023-10-30T14:00:06.949192+02:00", "EventTime": "2023-10-30T14:00:06.949211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CYYico1keW93JgDiOh"]} -{"Format": "IDEA0", "ID": "ed0483e8-da47-459e-82e5-c303f6329577", "DetectTime": "2023-10-30T14:00:06.977467+02:00", "EventTime": "2023-10-30T14:00:06.977480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CLFCo61loc9boqw9Fe"]} -{"Format": "IDEA0", "ID": "3babe1f1-9c33-4ac4-be26-fbe9e5df9d20", "DetectTime": "2023-10-30T14:00:07.010387+02:00", "EventTime": "2023-10-30T14:00:07.010403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CTHZ2i3djIChZJhdXf"]} -{"Format": "IDEA0", "ID": "4556b839-c050-4632-a223-a1924f1eb316", "DetectTime": "2023-10-30T14:00:07.052059+02:00", "EventTime": "2023-10-30T14:00:07.052255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CMtFJq29GkUTm2LsQ6"]} -{"Format": "IDEA0", "ID": "89a68b43-3c02-447c-a5e8-1821c9777502", "DetectTime": "2023-10-30T14:00:07.214366+02:00", "EventTime": "2023-10-30T14:00:07.214384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CM87to2wU6hFNdjsn6"]} -{"Format": "IDEA0", "ID": "1ad50421-a385-45d9-8d07-d261964b6707", "DetectTime": "2023-10-30T14:00:07.261424+02:00", "EventTime": "2023-10-30T14:00:07.261451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CyA6OH2wEtJXnkMEz4"]} -{"Format": "IDEA0", "ID": "29148cbe-26c8-4450-a155-429cdd40324a", "DetectTime": "2023-10-30T14:00:07.300465+02:00", "EventTime": "2023-10-30T14:00:07.300484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["C9kwwU16eK0kD0SFm8"]} -{"Format": "IDEA0", "ID": "5594238a-9b0e-4958-a8cb-008432e98c20", "DetectTime": "2023-10-30T14:00:07.349331+02:00", "EventTime": "2023-10-30T14:00:07.349349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. ", "ContentType": "text/plain"}], "uids": ["CAZGTk1gycUM0jmj05"]} -{"Format": "Json", "ID": "5594238a-9b0e-4958-a8cb-008432e98c20", "DetectTime": "2023-10-30T14:00:07.349331+02:00", "EventTime": "2023-10-30T14:00:07.349349+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5526], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:37:56.704049+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:07.422026)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a792d36-45ba-4da8-bfa4-76edfc801d65", "DetectTime": "2023-10-30T14:00:07.427756+02:00", "EventTime": "2023-10-30T14:00:07.427776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CVOfNy1pNcm3BeHkxl"]} -{"Format": "IDEA0", "ID": "be6732e8-bd06-4c38-af15-c913090c4330", "DetectTime": "2023-10-30T14:00:07.472393+02:00", "EventTime": "2023-10-30T14:00:07.472409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["C9KfqG3sTTFLzudWZc"]} -{"Format": "IDEA0", "ID": "4561a076-f7ff-4dcc-b4ac-10a1f31bc2f3", "DetectTime": "2023-10-30T14:00:07.517132+02:00", "EventTime": "2023-10-30T14:00:07.517152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CVPhtv4wXgkyXsCMng"]} -{"Format": "IDEA0", "ID": "514d7167-d5aa-40c4-b6f7-ba87387b6c4a", "DetectTime": "2023-10-30T14:00:07.563397+02:00", "EventTime": "2023-10-30T14:00:07.563416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9h6874eJO52UzU23f"]} -{"Format": "IDEA0", "ID": "91ea8064-e6c9-4a71-b15f-05adbaa7407f", "DetectTime": "2023-10-30T14:00:07.581352+02:00", "EventTime": "2023-10-30T14:00:07.581377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["ChIrKo1KZX2lFvoLVf"]} -{"Format": "IDEA0", "ID": "3a07c2a0-554d-446c-b0c8-f8a767354c95", "DetectTime": "2023-10-30T14:00:07.623506+02:00", "EventTime": "2023-10-30T14:00:07.623528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CiDtFC2CB4OTR3pa21"]} -{"Format": "IDEA0", "ID": "6f255c1b-68fe-4fa1-9e56-660870fdd517", "DetectTime": "2023-10-30T14:00:07.663629+02:00", "EventTime": "2023-10-30T14:00:07.663646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["C0HhHx4VJ6b9kQds62"]} -{"Format": "IDEA0", "ID": "f0f7b986-d0a3-44e5-8d06-7ae00625b60e", "DetectTime": "2023-10-30T14:00:07.702985+02:00", "EventTime": "2023-10-30T14:00:07.703002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["C0tk902fq6xStvIpB2"]} -{"Format": "IDEA0", "ID": "ab186700-e7e9-4cb3-9c91-3c41396399d0", "DetectTime": "2023-10-30T14:00:07.743604+02:00", "EventTime": "2023-10-30T14:00:07.743626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CjmAx02jXP9ENR1lN"]} -{"Format": "Json", "ID": "ab186700-e7e9-4cb3-9c91-3c41396399d0", "DetectTime": "2023-10-30T14:00:07.743604+02:00", "EventTime": "2023-10-30T14:00:07.743626+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:38:13.271893+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:07.816076)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b8f4c1b0-6b27-4fcc-b9fb-1e78eb8793dd", "DetectTime": "2023-10-30T14:00:07.823040+02:00", "EventTime": "2023-10-30T14:00:07.823059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12298/UDP destination IP 187.232.5.137. ", "ContentType": "text/plain"}], "uids": ["Cm3iWd4qIUBtDEDMak"]} -{"Format": "IDEA0", "ID": "dcdce634-f4bf-4749-b372-24fdb442e781", "DetectTime": "2023-10-30T14:00:07.857986+02:00", "EventTime": "2023-10-30T14:00:07.857998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["C0hAlfwGFTUOLR4A7"]} -{"Format": "IDEA0", "ID": "e1f163ed-2a64-4aab-b435-9bb2563e507c", "DetectTime": "2023-10-30T14:00:07.894368+02:00", "EventTime": "2023-10-30T14:00:07.894380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CveUcW3uR6Es3YzdA7"]} -{"Format": "IDEA0", "ID": "f94e1612-c9a1-473d-9ba7-4b6d74111b2b", "DetectTime": "2023-10-30T14:00:07.925643+02:00", "EventTime": "2023-10-30T14:00:07.925661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4931], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. ", "ContentType": "text/plain"}], "uids": ["CB8CrQ1HoyhLkyFWXa"]} -{"Format": "IDEA0", "ID": "c0f5f8b9-e8e3-48ea-a2ce-e6af6f61a991", "DetectTime": "2023-10-30T14:00:07.965604+02:00", "EventTime": "2023-10-30T14:00:07.965625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["CGAy0iq2DXl5KiUvl"]} -{"Format": "IDEA0", "ID": "53940bf7-66d7-4331-bf9d-947e5bb99abf", "DetectTime": "2023-10-30T14:00:08.007964+02:00", "EventTime": "2023-10-30T14:00:08.007985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16086], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. ", "ContentType": "text/plain"}], "uids": ["CPIIYi2jANhaWyciKj"]} -{"Format": "IDEA0", "ID": "4dce7fd8-238c-4219-a374-8ea8f98eb328", "DetectTime": "2023-10-30T14:00:08.039373+02:00", "EventTime": "2023-10-30T14:00:08.039393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8632], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. ", "ContentType": "text/plain"}], "uids": ["CtXIJH3dn3ZIs5NIx3"]} -{"Format": "IDEA0", "ID": "a31acfd8-b912-4910-8d88-8d58abcad826", "DetectTime": "2023-10-30T14:00:08.073498+02:00", "EventTime": "2023-10-30T14:00:08.073513+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["CJeUlc3z6BxBV8Jm36"]} -{"Format": "IDEA0", "ID": "22e1ff0e-3d76-435a-85b5-5bb13e295f44", "DetectTime": "2023-10-30T14:00:08.080939+02:00", "EventTime": "2023-10-30T14:00:08.080956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["Cm4ZbU1fAP4uE4xQe8"]} -{"Format": "Json", "ID": "22e1ff0e-3d76-435a-85b5-5bb13e295f44", "DetectTime": "2023-10-30T14:00:08.080939+02:00", "EventTime": "2023-10-30T14:00:08.080956+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T05:38:16.377151+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2023/10/30 14:00:08.166092)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d321414b-2caa-4bc4-bb6f-f433e8dc5960", "DetectTime": "2023-10-30T14:00:08.171704+02:00", "EventTime": "2023-10-30T14:00:08.171730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CPCy8412IHKSm66Mx6"]} -{"Format": "IDEA0", "ID": "4df4c87b-0102-4907-9b44-9041a95efeaa", "DetectTime": "2023-10-30T14:00:08.204710+02:00", "EventTime": "2023-10-30T14:00:08.204723+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["CkKGJL23CSvNzAa9Ol"]} -{"Format": "IDEA0", "ID": "02462839-a252-41be-96cb-002c9c571c5b", "DetectTime": "2023-10-30T14:00:08.214285+02:00", "EventTime": "2023-10-30T14:00:08.214303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CmwLdV3le33WLYZcEg"]} -{"Format": "IDEA0", "ID": "4cdc99f7-a695-4f5d-8d69-6fc80ce4dd4e", "DetectTime": "2023-10-30T14:00:08.243782+02:00", "EventTime": "2023-10-30T14:00:08.243796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CJrf053HZWGpZJmM0f"]} -{"Format": "IDEA0", "ID": "84fd4879-a514-4b0c-a70b-21815954f8ed", "DetectTime": "2023-10-30T14:00:08.271080+02:00", "EventTime": "2023-10-30T14:00:08.271099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["C7cA631uq4opvF2zI6"]} -{"Format": "IDEA0", "ID": "73418d26-c297-4a0b-81fc-068fc4a0da17", "DetectTime": "2023-10-30T14:00:08.321566+02:00", "EventTime": "2023-10-30T14:00:08.321582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5220], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. ", "ContentType": "text/plain"}], "uids": ["CvqQg94iqDgj7BARk3"]} -{"Format": "IDEA0", "ID": "bc379359-df3e-44ad-9f28-a62527223b51", "DetectTime": "2023-10-30T14:00:08.370565+02:00", "EventTime": "2023-10-30T14:00:08.370585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["C19xVF2WRlHjbeLy8e"]} -{"Format": "IDEA0", "ID": "8c53ecfa-ddb9-4aee-933d-52c6cd6ffb25", "DetectTime": "2023-10-30T14:00:08.432691+02:00", "EventTime": "2023-10-30T14:00:08.432707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CYQloi1wxqpoA00Vc5"]} -{"Format": "IDEA0", "ID": "c0f31d58-db62-4525-8a8b-248519e3598d", "DetectTime": "2023-10-30T14:00:08.487215+02:00", "EventTime": "2023-10-30T14:00:08.487232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["Cryeeo4qKx2asN3hKf"]} -{"Format": "IDEA0", "ID": "9c148b03-111d-44ad-b7fb-bc8b827d1592", "DetectTime": "2023-10-30T14:00:08.548199+02:00", "EventTime": "2023-10-30T14:00:08.548304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CWmSzm2urb3cJG5rJ8"]} -{"Format": "Json", "ID": "9c148b03-111d-44ad-b7fb-bc8b827d1592", "DetectTime": "2023-10-30T14:00:08.548199+02:00", "EventTime": "2023-10-30T14:00:08.548304+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:09:11.461058+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:08.688955)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "71ce5c50-6d99-4606-80d0-1a93820c83ec", "DetectTime": "2023-10-30T14:00:08.694206+02:00", "EventTime": "2023-10-30T14:00:08.694223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["C55M6YUcj5YI9Z0z9"]} -{"Format": "IDEA0", "ID": "ef70a6c0-a19a-4a8a-957d-cd07e91ae0e8", "DetectTime": "2023-10-30T14:00:08.745508+02:00", "EventTime": "2023-10-30T14:00:08.745530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CftVd42tq14VD5MvYk"]} -{"Format": "IDEA0", "ID": "9e76827d-6e86-47c6-9a83-ac0dd89c64c3", "DetectTime": "2023-10-30T14:00:08.796706+02:00", "EventTime": "2023-10-30T14:00:08.796725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CuLaNH2MTStjJdiIPf"]} -{"Format": "IDEA0", "ID": "65f433c3-0165-4c4d-8176-aeab5dff3a59", "DetectTime": "2023-10-30T14:00:08.836510+02:00", "EventTime": "2023-10-30T14:00:08.836526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CXRdNr4jq46KyLdmw2"]} -{"Format": "IDEA0", "ID": "3513399c-66b1-47ef-9d5d-ce41ca183283", "DetectTime": "2023-10-30T14:00:08.890615+02:00", "EventTime": "2023-10-30T14:00:08.890633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["C2gSRE3v5V45EjZSwl"]} -{"Format": "IDEA0", "ID": "b427be78-50a3-4dfa-b074-c095cdde2a44", "DetectTime": "2023-10-30T14:00:08.929858+02:00", "EventTime": "2023-10-30T14:00:08.929878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CK38Id2VPmJ9bgH6lf"]} -{"Format": "IDEA0", "ID": "893ac03e-f24b-4f6e-b220-44b0700f8a34", "DetectTime": "2023-10-30T14:00:08.972282+02:00", "EventTime": "2023-10-30T14:00:08.972307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CJoLC74ZU1A0G5fKpd"]} -{"Format": "IDEA0", "ID": "1abdeb5d-f947-401b-9805-d3e76a0ad7ba", "DetectTime": "2023-10-30T14:00:09.016345+02:00", "EventTime": "2023-10-30T14:00:09.016360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CVj2R5225E7IkVYfQ5"]} -{"Format": "Json", "ID": "1abdeb5d-f947-401b-9805-d3e76a0ad7ba", "DetectTime": "2023-10-30T14:00:09.016345+02:00", "EventTime": "2023-10-30T14:00:09.016360+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:09:12.798971+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:09.082509)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "29aacccd-733e-4ecf-89bd-e6d848bd7f4d", "DetectTime": "2023-10-30T14:00:09.087351+02:00", "EventTime": "2023-10-30T14:00:09.087362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CJuywP3IFZCyrYVbka"]} -{"Format": "IDEA0", "ID": "e08c9098-4e63-4ea1-b89b-53abdc229e63", "DetectTime": "2023-10-30T14:00:09.128600+02:00", "EventTime": "2023-10-30T14:00:09.128625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CLc3Ad3iq22XKskZu2"]} -{"Format": "IDEA0", "ID": "fc4e8276-cca3-483f-acfa-721087993104", "DetectTime": "2023-10-30T14:00:09.165780+02:00", "EventTime": "2023-10-30T14:00:09.165797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CUECoF0472VKvnQsj"]} -{"Format": "IDEA0", "ID": "ee4b5b8d-639d-4a4e-86e8-89fb1ae031fa", "DetectTime": "2023-10-30T14:00:09.205892+02:00", "EventTime": "2023-10-30T14:00:09.205913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CpskDu01t9dIKCaG5"]} -{"Format": "IDEA0", "ID": "54d3959f-771e-483a-872d-11f05dc5de3b", "DetectTime": "2023-10-30T14:00:09.242069+02:00", "EventTime": "2023-10-30T14:00:09.242085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CfQdt31DS7QFQaSe3"]} -{"Format": "IDEA0", "ID": "dfa26abc-2ecd-42f9-b5ff-514a342d2a6e", "DetectTime": "2023-10-30T14:00:09.277453+02:00", "EventTime": "2023-10-30T14:00:09.277474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["ChoNAV30PCLhUFrCxk"]} -{"Format": "IDEA0", "ID": "c97b478e-d31b-42a2-8b6d-5b91ca88c501", "DetectTime": "2023-10-30T14:00:09.321736+02:00", "EventTime": "2023-10-30T14:00:09.321752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4931], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. ", "ContentType": "text/plain"}], "uids": ["CnXAHjG0L69PbtJMd"]} -{"Format": "IDEA0", "ID": "586ef285-956e-4068-a459-c42d8e204aae", "DetectTime": "2023-10-30T14:00:09.359147+02:00", "EventTime": "2023-10-30T14:00:09.359171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["C2BTAY3jz7YV3AJVZb"]} -{"Format": "Json", "ID": "586ef285-956e-4068-a459-c42d8e204aae", "DetectTime": "2023-10-30T14:00:09.359147+02:00", "EventTime": "2023-10-30T14:00:09.359171+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:10:04.159671+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:09.431184)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e9bd4dd-acee-4685-868e-642bdb883d85", "DetectTime": "2023-10-30T14:00:09.436281+02:00", "EventTime": "2023-10-30T14:00:09.436297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["CTZc1e41MhfuZSiXuc"]} -{"Format": "IDEA0", "ID": "c665a908-8455-43d2-994a-0c5f31c1f2f8", "DetectTime": "2023-10-30T14:00:09.476712+02:00", "EventTime": "2023-10-30T14:00:09.476736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["Cw12wwjcjVCoUc3H1"]} -{"Format": "IDEA0", "ID": "32beceb4-7efd-4323-9677-38c5527c6f15", "DetectTime": "2023-10-30T14:00:09.512991+02:00", "EventTime": "2023-10-30T14:00:09.513007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16086], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. ", "ContentType": "text/plain"}], "uids": ["Ch2Zmv2lRuiKL5ruQh"]} -{"Format": "IDEA0", "ID": "910579fe-a169-4c9b-9b0a-78dc0fd02523", "DetectTime": "2023-10-30T14:00:09.546374+02:00", "EventTime": "2023-10-30T14:00:09.546387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8632], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. ", "ContentType": "text/plain"}], "uids": ["C9tmnB2oMTAjpllik2"]} -{"Format": "IDEA0", "ID": "aeab289f-52e0-4ee7-b106-2d369a734ec3", "DetectTime": "2023-10-30T14:00:09.578383+02:00", "EventTime": "2023-10-30T14:00:09.578395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CSedNk8d0wlqNGmg2"]} -{"Format": "IDEA0", "ID": "32ceabac-fcfe-40f4-87b4-623b99e2107b", "DetectTime": "2023-10-30T14:00:09.613447+02:00", "EventTime": "2023-10-30T14:00:09.613463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6781], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. ", "ContentType": "text/plain"}], "uids": ["C1JaaD4QdaHSnmzPvb"]} -{"Format": "IDEA0", "ID": "7b9ba359-aebd-4548-81b2-96bf14021995", "DetectTime": "2023-10-30T14:00:09.646037+02:00", "EventTime": "2023-10-30T14:00:09.646050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwaFN72mvSrcIFGrO2"]} -{"Format": "IDEA0", "ID": "1272e26a-6436-40c3-9da1-b6cf5ce0c2e1", "DetectTime": "2023-10-30T14:00:09.673945+02:00", "EventTime": "2023-10-30T14:00:09.673956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CyLt4FPOeNhAIr8M2"]} -{"Format": "Json", "ID": "1272e26a-6436-40c3-9da1-b6cf5ce0c2e1", "DetectTime": "2023-10-30T14:00:09.673945+02:00", "EventTime": "2023-10-30T14:00:09.673956+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:40:48.892325+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:09.732409)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cc34e5a0-7c52-405e-a616-ed96e02b9103", "DetectTime": "2023-10-30T14:00:09.737273+02:00", "EventTime": "2023-10-30T14:00:09.737291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["Ced8414x3jKSFOAgTl"]} -{"Format": "IDEA0", "ID": "606eb3c4-ae1d-4325-a738-11a9d50ed1a4", "DetectTime": "2023-10-30T14:00:09.764674+02:00", "EventTime": "2023-10-30T14:00:09.764693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoCg6k3dhFMur5bned"]} -{"Format": "IDEA0", "ID": "3a6ad6ef-5dba-40e2-a0a6-747e4208c5bc", "DetectTime": "2023-10-30T14:00:09.788792+02:00", "EventTime": "2023-10-30T14:00:09.788812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CRZYHa2JaqDVJvg9j7"]} -{"Format": "IDEA0", "ID": "6ed052cd-4969-46a1-8a31-2c769d64b09b", "DetectTime": "2023-10-30T14:00:09.814017+02:00", "EventTime": "2023-10-30T14:00:09.814028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CNeqwP1FgAEM9ndzJl"]} -{"Format": "IDEA0", "ID": "ff9c7140-78a0-4f1f-abe5-9a64e80c099e", "DetectTime": "2023-10-30T14:00:09.840897+02:00", "EventTime": "2023-10-30T14:00:09.840908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5220], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. ", "ContentType": "text/plain"}], "uids": ["CRiy6rcvVm7kcT5ya"]} -{"Format": "IDEA0", "ID": "7be0bc49-b4d0-4375-9d00-b8d3db2d3a5f", "DetectTime": "2023-10-30T14:00:09.865398+02:00", "EventTime": "2023-10-30T14:00:09.865415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C91saZAADnuPdXXQ7"]} -{"Format": "IDEA0", "ID": "7865b6ff-6e97-4d93-a6fb-463ac383513f", "DetectTime": "2023-10-30T14:00:09.890375+02:00", "EventTime": "2023-10-30T14:00:09.890390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CgHiRo4Y1Rc12iVF1k"]} -{"Format": "IDEA0", "ID": "c0b6b810-66f1-42bc-89c2-56207814348f", "DetectTime": "2023-10-30T14:00:09.914948+02:00", "EventTime": "2023-10-30T14:00:09.914968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CezFGJHtoOv8yewf8"]} -{"Format": "Json", "ID": "c0b6b810-66f1-42bc-89c2-56207814348f", "DetectTime": "2023-10-30T14:00:09.914948+02:00", "EventTime": "2023-10-30T14:00:09.914968+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:41:44.055683+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:09.981695)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "412846a3-670d-4358-b8b5-99c38d26b20e", "DetectTime": "2023-10-30T14:00:09.988584+02:00", "EventTime": "2023-10-30T14:00:09.988603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CrVOyl49WDfyB3ltGf"]} -{"Format": "IDEA0", "ID": "941601cc-9d80-4205-a804-f732d85fa681", "DetectTime": "2023-10-30T14:00:10.027653+02:00", "EventTime": "2023-10-30T14:00:10.027673+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5UD6323hxP3Y9o7ce"]} -{"Format": "IDEA0", "ID": "3d7eb54f-ae47-4f3e-bde3-da06f8cfd657", "DetectTime": "2023-10-30T14:00:10.038879+02:00", "EventTime": "2023-10-30T14:00:10.038896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CBXtS5315FKR2fT3N4"]} -{"Format": "IDEA0", "ID": "7cdcdf79-aa40-469d-b848-d67158831521", "DetectTime": "2023-10-30T14:00:10.065227+02:00", "EventTime": "2023-10-30T14:00:10.065239+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPin0reIHlHic0Klf"]} -{"Format": "IDEA0", "ID": "f1f6085b-0eaf-4bc9-939a-2727f717afed", "DetectTime": "2023-10-30T14:00:10.075185+02:00", "EventTime": "2023-10-30T14:00:10.075206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CLjZ224FqhCNkPaoP6"]} -{"Format": "IDEA0", "ID": "7f753efe-f2c7-42fc-bbb6-ab244411261d", "DetectTime": "2023-10-30T14:00:10.099708+02:00", "EventTime": "2023-10-30T14:00:10.099726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CPuqhW2Xnc9NCvbA0l"]} -{"Format": "IDEA0", "ID": "05eded26-4b0e-4791-9435-a1c9ddb343fd", "DetectTime": "2023-10-30T14:00:10.125010+02:00", "EventTime": "2023-10-30T14:00:10.125031+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9l3YO2ORS0zJ1JrD7"]} -{"Format": "IDEA0", "ID": "853e47c0-ee25-428b-bbc9-59f2a29bdaa2", "DetectTime": "2023-10-30T14:00:10.134371+02:00", "EventTime": "2023-10-30T14:00:10.134387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CLT0UD2gybQEnFb0z2"]} -{"Format": "IDEA0", "ID": "d1249791-2f6b-4168-854d-9e42caccfb33", "DetectTime": "2023-10-30T14:00:10.158545+02:00", "EventTime": "2023-10-30T14:00:10.158558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["Ck5TJc4woH9zGy1nPc"]} -{"Format": "IDEA0", "ID": "ff90ee58-0f71-4937-8d0c-f80c7bf1a626", "DetectTime": "2023-10-30T14:00:10.188749+02:00", "EventTime": "2023-10-30T14:00:10.188768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["Ca2G1v4tzbflwmfpWd"]} -{"Format": "IDEA0", "ID": "651764e1-6c94-49e5-920c-9961bd4c36a3", "DetectTime": "2023-10-30T14:00:10.216301+02:00", "EventTime": "2023-10-30T14:00:10.216317+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ci9ZU31hTAanxq36dc"]} -{"Format": "IDEA0", "ID": "d0d801ae-f600-4cfe-91c0-18e0e068d23b", "DetectTime": "2023-10-30T14:00:10.227509+02:00", "EventTime": "2023-10-30T14:00:10.227523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CXNplX27vf2gAN5WV4"]} -{"Format": "Json", "ID": "d0d801ae-f600-4cfe-91c0-18e0e068d23b", "DetectTime": "2023-10-30T14:00:10.227509+02:00", "EventTime": "2023-10-30T14:00:10.227523+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:41:45.277375+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:10.281614)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b0a4ff9d-1bab-489c-ab86-adc14d29d713", "DetectTime": "2023-10-30T14:00:10.289447+02:00", "EventTime": "2023-10-30T14:00:10.289470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["Cv7hgL36buLlbESmdl"]} -{"Format": "IDEA0", "ID": "a309992c-2da1-43c6-b718-5b8a04a5f430", "DetectTime": "2023-10-30T14:00:10.319864+02:00", "EventTime": "2023-10-30T14:00:10.319888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5UD6323hxP3Y9o7ce", "C9l3YO2ORS0zJ1JrD7", "CFOCP53l0JAwHU1jP3", "CQiNTI3uomG25CPy5"]} -{"Format": "IDEA0", "ID": "e49a14b7-7fee-41cd-a95c-b23c980ece8f", "DetectTime": "2023-10-30T14:00:10.333104+02:00", "EventTime": "2023-10-30T14:00:10.333123+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFOCP53l0JAwHU1jP3"]} -{"Format": "IDEA0", "ID": "8920bf79-b4c9-4686-a27b-b7d6605b99ae", "DetectTime": "2023-10-30T14:00:10.344886+02:00", "EventTime": "2023-10-30T14:00:10.344903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["Ci0wtS29ye680qLww8"]} -{"Format": "IDEA0", "ID": "4f0e0cb8-0ead-47ad-a6b5-d52f88c20f82", "DetectTime": "2023-10-30T14:00:10.373162+02:00", "EventTime": "2023-10-30T14:00:10.373179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CbUuSF4e24TkfSODFg"]} -{"Format": "IDEA0", "ID": "e1d35bea-d422-4608-ab3e-f55ef37f8d83", "DetectTime": "2023-10-30T14:00:10.399522+02:00", "EventTime": "2023-10-30T14:00:10.399542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["C9B5Pc4F1sTB2cZa65"]} -{"Format": "IDEA0", "ID": "798b7827-b117-4d44-aaa6-c4d5feb24eb3", "DetectTime": "2023-10-30T14:00:10.428591+02:00", "EventTime": "2023-10-30T14:00:10.428610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CVXSgs2PFF92VIVKE"]} -{"Format": "IDEA0", "ID": "e375ce1e-1e04-4b8d-aaaa-55179bb8a1ad", "DetectTime": "2023-10-30T14:00:10.458544+02:00", "EventTime": "2023-10-30T14:00:10.458561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CP2S861zb5czeuIgC7"]} -{"Format": "IDEA0", "ID": "3e3cdbec-d200-4d17-ac17-87d25bfede09", "DetectTime": "2023-10-30T14:00:10.484435+02:00", "EventTime": "2023-10-30T14:00:10.484454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4931], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. ", "ContentType": "text/plain"}], "uids": ["CSxLCyl8tfFLIGyE6"]} -{"Format": "IDEA0", "ID": "c54701c2-9cec-48cf-9d3a-3a6f4e7de891", "DetectTime": "2023-10-30T14:00:10.512897+02:00", "EventTime": "2023-10-30T14:00:10.512919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["CwsIl22rB5HYFwK6Xc"]} -{"Format": "Json", "ID": "c54701c2-9cec-48cf-9d3a-3a6f4e7de891", "DetectTime": "2023-10-30T14:00:10.512897+02:00", "EventTime": "2023-10-30T14:00:10.512919+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T06:41:46.900490+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2023/10/30 14:00:10.577665)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "35cb311b-bd65-4b85-98ea-782c71eef1cf", "DetectTime": "2023-10-30T14:00:10.583217+02:00", "EventTime": "2023-10-30T14:00:10.583236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["C3uFkC1nsohUBctfc9"]} -{"Format": "IDEA0", "ID": "c7d5b8f8-6d18-4535-aa2a-4c6d1cb9a4f8", "DetectTime": "2023-10-30T14:00:10.607904+02:00", "EventTime": "2023-10-30T14:00:10.607922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["CCgr3A4JEQpGgOlLQa"]} -{"Format": "IDEA0", "ID": "6052bb10-4476-4840-98d0-478c7e5f0d00", "DetectTime": "2023-10-30T14:00:10.635751+02:00", "EventTime": "2023-10-30T14:00:10.635770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["Cr0Q9d2YbiAKPKMae4"]} -{"Format": "IDEA0", "ID": "a363f219-539c-49e3-a08a-2b57f042b089", "DetectTime": "2023-10-30T14:00:10.662689+02:00", "EventTime": "2023-10-30T14:00:10.662707+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["CcdCPA32sKtLpqUH3"]} -{"Format": "IDEA0", "ID": "2a2ea93a-af92-47c6-a8e9-210c74647a83", "DetectTime": "2023-10-30T14:00:10.668736+02:00", "EventTime": "2023-10-30T14:00:10.668761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16086], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. ", "ContentType": "text/plain"}], "uids": ["CaDz6c10fPftNwycCj"]} -{"Format": "IDEA0", "ID": "0fb06aee-1c62-406c-b32c-9825bd95f10c", "DetectTime": "2023-10-30T14:00:10.698841+02:00", "EventTime": "2023-10-30T14:00:10.698861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkFADh1fuoLFAhBMr3"]} -{"Format": "IDEA0", "ID": "ed8f6f7a-7f7d-4c52-8e44-1ec93e549b42", "DetectTime": "2023-10-30T14:00:10.738375+02:00", "EventTime": "2023-10-30T14:00:10.738397+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmnFXKDlLAljWBM5i"]} -{"Format": "IDEA0", "ID": "dae67618-5f00-421c-bc1d-382014f7982d", "DetectTime": "2023-10-30T14:00:10.750942+02:00", "EventTime": "2023-10-30T14:00:10.750963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CqeSUi1OGRZDoXlaG3"]} -{"Format": "IDEA0", "ID": "59cceab1-bf25-448e-bf9d-b327f4ea424d", "DetectTime": "2023-10-30T14:00:10.790548+02:00", "EventTime": "2023-10-30T14:00:10.790572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["C5sNSOwONTgSNgfY1"]} -{"Format": "IDEA0", "ID": "c898f1d6-023d-4234-95be-73eaf53327a1", "DetectTime": "2023-10-30T14:00:10.828144+02:00", "EventTime": "2023-10-30T14:00:10.828162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CeSClT39JR9G7jeRfl"]} -{"Format": "IDEA0", "ID": "3a231e86-8c02-406b-9481-57199ab89bc2", "DetectTime": "2023-10-30T14:00:10.867528+02:00", "EventTime": "2023-10-30T14:00:10.867539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CNVpoo4nHmc4bTf4p1"]} -{"Format": "IDEA0", "ID": "1ea51235-f242-4730-87d9-fc6314740d64", "DetectTime": "2023-10-30T14:00:10.909632+02:00", "EventTime": "2023-10-30T14:00:10.909651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CA9gUG2dpN8ZifMiQe"]} -{"Format": "Json", "ID": "1ea51235-f242-4730-87d9-fc6314740d64", "DetectTime": "2023-10-30T14:00:10.909632+02:00", "EventTime": "2023-10-30T14:00:10.909651+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T07:13:09.380768+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2023/10/30 14:00:11.128625)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c74fa584-a4d3-43e8-9848-a0e8e049c8be", "DetectTime": "2023-10-30T14:00:11.135056+02:00", "EventTime": "2023-10-30T14:00:11.135073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["Cy2YMAxsBs4kAAPxj"]} -{"Format": "IDEA0", "ID": "66daa9a9-bdef-4fae-a204-4b9924c2861e", "DetectTime": "2023-10-30T14:00:11.182378+02:00", "EventTime": "2023-10-30T14:00:11.182394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CzodD93rru9KpAnff4"]} -{"Format": "IDEA0", "ID": "d29e9e86-9e0e-46ae-96f7-74a0fde666e4", "DetectTime": "2023-10-30T14:00:11.227912+02:00", "EventTime": "2023-10-30T14:00:11.227931+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CX1KeU2kfZ9QCi7dA8"]} -{"Format": "IDEA0", "ID": "8289c915-6279-4477-9120-ad01ef6f76fe", "DetectTime": "2023-10-30T14:00:11.241254+02:00", "EventTime": "2023-10-30T14:00:11.241282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CkV767hptZ9nne9Lj"]} -{"Format": "IDEA0", "ID": "4d675506-4c32-4951-b1b1-b85d37003bab", "DetectTime": "2023-10-30T14:00:11.282001+02:00", "EventTime": "2023-10-30T14:00:11.282017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. ", "ContentType": "text/plain"}], "uids": ["CVl1kP3qw0uQC9ZyJ3"]} -{"Format": "IDEA0", "ID": "5e84ab78-37d7-4798-92ed-df28f047bb56", "DetectTime": "2023-10-30T14:00:11.329310+02:00", "EventTime": "2023-10-30T14:00:11.329332+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ct76Gb3ET2DPOHsco2"]} -{"Format": "IDEA0", "ID": "f367522c-5085-4108-bae6-3113a9f45055", "DetectTime": "2023-10-30T14:00:11.346557+02:00", "EventTime": "2023-10-30T14:00:11.346574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CPQWw42OYK54UpBPa7"]} -{"Format": "IDEA0", "ID": "7261553a-4479-4ff6-81a8-1beb5c5cb21a", "DetectTime": "2023-10-30T14:00:11.391594+02:00", "EventTime": "2023-10-30T14:00:11.391613+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Clhcvp28zJ5uDR2AM5"]} -{"Format": "IDEA0", "ID": "aa360985-d669-4700-8416-23d6fdbfde5b", "DetectTime": "2023-10-30T14:00:11.407661+02:00", "EventTime": "2023-10-30T14:00:11.407679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CsILCe32zUFT9SQSEe"]} -{"Format": "IDEA0", "ID": "5068d5a6-17e7-4809-9f3b-8889ac4349f3", "DetectTime": "2023-10-30T14:00:11.447972+02:00", "EventTime": "2023-10-30T14:00:11.447993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CJEACD4RwL3CHvazk"]} -{"Format": "IDEA0", "ID": "db77dacc-13f1-4f91-8721-314ce84ec2fe", "DetectTime": "2023-10-30T14:00:11.489892+02:00", "EventTime": "2023-10-30T14:00:11.489915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CBAFIqdgULryZiGvb"]} -{"Format": "Json", "ID": "db77dacc-13f1-4f91-8721-314ce84ec2fe", "DetectTime": "2023-10-30T14:00:11.489892+02:00", "EventTime": "2023-10-30T14:00:11.489915+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T07:13:47.081332+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2023/10/30 14:00:11.564480)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "01bcc40a-2003-4e41-b82f-6bacd7178b23", "DetectTime": "2023-10-30T14:00:11.570511+02:00", "EventTime": "2023-10-30T14:00:11.570529+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0KYzv1pi0QeCrS441"]} -{"Format": "IDEA0", "ID": "3f870340-66da-4837-a6d6-92ad033e1c6a", "DetectTime": "2023-10-30T14:00:11.584661+02:00", "EventTime": "2023-10-30T14:00:11.584679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CLJT302rmXMiJQSSRl"]} -{"Format": "IDEA0", "ID": "05be0a41-bc08-437a-aafb-13af771e137e", "DetectTime": "2023-10-30T14:00:11.625349+02:00", "EventTime": "2023-10-30T14:00:11.625368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CccJZfdTHimOepbmf"]} -{"Format": "IDEA0", "ID": "ff13c519-9043-4d16-80ca-4f2a544288d9", "DetectTime": "2023-10-30T14:00:11.666497+02:00", "EventTime": "2023-10-30T14:00:11.666518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxQQREt650YFK1D0l"]} -{"Format": "IDEA0", "ID": "db70bbbd-d329-4f4a-8248-0b480e30b617", "DetectTime": "2023-10-30T14:00:11.679434+02:00", "EventTime": "2023-10-30T14:00:11.679452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CHQRGfmqO8mtVz7ik"]} -{"Format": "IDEA0", "ID": "67e21cd1-18be-4cc1-911a-ebf6f17b03ea", "DetectTime": "2023-10-30T14:00:11.716145+02:00", "EventTime": "2023-10-30T14:00:11.716171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CLOqUp4tKxWj21QvFb"]} -{"Format": "IDEA0", "ID": "e27184d6-8a0b-4031-ac4f-3d2fa8bd1cb2", "DetectTime": "2023-10-30T14:00:11.756916+02:00", "EventTime": "2023-10-30T14:00:11.756934+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbKPsD27X58kXtLHAa"]} -{"Format": "IDEA0", "ID": "41c64dfd-5f8a-4b63-bb6e-01313633e79b", "DetectTime": "2023-10-30T14:00:11.767113+02:00", "EventTime": "2023-10-30T14:00:11.767128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CCPSqV286YGWWRYogj"]} -{"Format": "IDEA0", "ID": "3df63cac-54db-4aae-aa6b-565c4bc3b399", "DetectTime": "2023-10-30T14:00:11.808777+02:00", "EventTime": "2023-10-30T14:00:11.808805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CQRFgL2R94iv1TA5G4"]} -{"Format": "IDEA0", "ID": "dfc7f942-4acb-4c8f-9ca7-21cf7c364ffa", "DetectTime": "2023-10-30T14:00:11.849819+02:00", "EventTime": "2023-10-30T14:00:11.849837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CxQQREt650YFK1D0l", "CghDYA1mjYt6OHVHhc", "CX1KeU2kfZ9QCi7dA8", "Clhcvp28zJ5uDR2AM5"]} -{"Format": "IDEA0", "ID": "b8c1ab7e-58b1-4853-a355-ae55728525b2", "DetectTime": "2023-10-30T14:00:11.862918+02:00", "EventTime": "2023-10-30T14:00:11.862938+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CghDYA1mjYt6OHVHhc"]} -{"Format": "IDEA0", "ID": "e0aa0e8c-b26c-43f0-8c16-3fbe5149b001", "DetectTime": "2023-10-30T14:00:11.876091+02:00", "EventTime": "2023-10-30T14:00:11.876119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["CwEK632uzeyujcmRag"]} -{"Format": "IDEA0", "ID": "dba7cb18-5da2-4dfb-a789-66db4e7cc5b5", "DetectTime": "2023-10-30T14:00:11.914045+02:00", "EventTime": "2023-10-30T14:00:11.914072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["CZ4cPl4M67FWrLXvpd"]} -{"Format": "Json", "ID": "dba7cb18-5da2-4dfb-a789-66db4e7cc5b5", "DetectTime": "2023-10-30T14:00:11.914045+02:00", "EventTime": "2023-10-30T14:00:11.914072+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T07:14:06.466555+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2023/10/30 14:00:11.991963)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8f791cdd-ec4b-4ed5-ab5b-fa83efde8024", "DetectTime": "2023-10-30T14:00:11.998053+02:00", "EventTime": "2023-10-30T14:00:11.998073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["CqXyOU4vKVe6bh0W1"]} -{"Format": "IDEA0", "ID": "0186a14e-4b36-4744-97df-23790a1f57ac", "DetectTime": "2023-10-30T14:00:12.033087+02:00", "EventTime": "2023-10-30T14:00:12.033107+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["CrF1Eq1XPLXGH2aImg"]} -{"Format": "IDEA0", "ID": "839685a0-67e0-4804-81be-90887f1c15de", "DetectTime": "2023-10-30T14:00:12.040709+02:00", "EventTime": "2023-10-30T14:00:12.040725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["Ce5dIt2128YtsPN5W2"]} -{"Format": "IDEA0", "ID": "a9d1458f-bcbe-4e69-a7f4-272593bdd064", "DetectTime": "2023-10-30T14:00:12.083026+02:00", "EventTime": "2023-10-30T14:00:12.083047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16086], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. ", "ContentType": "text/plain"}], "uids": ["CMC0Yo3jSIB9Njjjdj"]} -{"Format": "IDEA0", "ID": "1c6d4ec6-ef85-41ef-a0ac-c350e482a0f8", "DetectTime": "2023-10-30T14:00:12.119638+02:00", "EventTime": "2023-10-30T14:00:12.119656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5UfXl3WHxzxtyPEz3"]} -{"Format": "IDEA0", "ID": "be2c2c5e-e213-4613-acdd-4db3fcaddf70", "DetectTime": "2023-10-30T14:00:12.158366+02:00", "EventTime": "2023-10-30T14:00:12.158384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CrLJuM3YPxhNTcdJEc"]} -{"Format": "IDEA0", "ID": "1957b160-91e4-4cef-9956-ca6247f01271", "DetectTime": "2023-10-30T14:00:12.196659+02:00", "EventTime": "2023-10-30T14:00:12.196675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CPy7qU10dQoOaekpIh"]} -{"Format": "IDEA0", "ID": "7658d076-6e17-40f5-8784-bd6102f1c3ec", "DetectTime": "2023-10-30T14:00:12.232887+02:00", "EventTime": "2023-10-30T14:00:12.232907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CCfXQe16LYLs2TRcv7"]} -{"Format": "IDEA0", "ID": "6fae842f-27d4-449a-b4d3-8f1e4d423d7e", "DetectTime": "2023-10-30T14:00:12.271499+02:00", "EventTime": "2023-10-30T14:00:12.271525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CiIM1y2cbDy5zUrIN8"]} -{"Format": "Json", "ID": "6fae842f-27d4-449a-b4d3-8f1e4d423d7e", "DetectTime": "2023-10-30T14:00:12.271499+02:00", "EventTime": "2023-10-30T14:00:12.271525+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T07:45:05.015045+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2023/10/30 14:00:12.343807)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "97359ab6-c823-4efb-b9b7-62ffcfe78be0", "DetectTime": "2023-10-30T14:00:12.352702+02:00", "EventTime": "2023-10-30T14:00:12.352727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CQgm6B2yyNqGMcbn1"]} -{"Format": "IDEA0", "ID": "7b44542c-998d-45f6-92cf-1370d75a4414", "DetectTime": "2023-10-30T14:00:12.391809+02:00", "EventTime": "2023-10-30T14:00:12.391829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["COIrXF4RfCajNrVBya"]} -{"Format": "IDEA0", "ID": "5412a490-0b1f-41d2-a71d-15356926c71f", "DetectTime": "2023-10-30T14:00:12.425802+02:00", "EventTime": "2023-10-30T14:00:12.425820+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSsLFY3EUOvzc7ekNg"]} -{"Format": "IDEA0", "ID": "4e51fac8-8ac7-48d7-aaa0-b338d03edb14", "DetectTime": "2023-10-30T14:00:12.438263+02:00", "EventTime": "2023-10-30T14:00:12.438284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CIaf0B3Lsfv1WiVGjd"]} -{"Format": "IDEA0", "ID": "c9961fbe-5248-46a9-a96f-c8e7af557508", "DetectTime": "2023-10-30T14:00:12.477668+02:00", "EventTime": "2023-10-30T14:00:12.477687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CbjjCV2HePusZw6eLb"]} -{"Format": "IDEA0", "ID": "ae994c75-2fd6-490a-8880-0c9da276cb01", "DetectTime": "2023-10-30T14:00:12.513770+02:00", "EventTime": "2023-10-30T14:00:12.513789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10390], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. ", "ContentType": "text/plain"}], "uids": ["CNhXur4OSikh88nZg"]} -{"Format": "IDEA0", "ID": "3c7cfbdc-a11f-4a49-9c8e-ca5c44a64192", "DetectTime": "2023-10-30T14:00:12.547549+02:00", "EventTime": "2023-10-30T14:00:12.547562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CtriPgsvn6kXmaVWd"]} -{"Format": "IDEA0", "ID": "9b20cd23-b311-4b37-965d-d771a62ae559", "DetectTime": "2023-10-30T14:00:12.585504+02:00", "EventTime": "2023-10-30T14:00:12.585522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CRQswb28ZIWvuhl2Vb"]} -{"Format": "IDEA0", "ID": "b7b40310-d210-484f-b95c-18ac5f9296d7", "DetectTime": "2023-10-30T14:00:12.617595+02:00", "EventTime": "2023-10-30T14:00:12.617613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CKquHb2o8ffzo9h5s2"]} -{"Format": "Json", "ID": "b7b40310-d210-484f-b95c-18ac5f9296d7", "DetectTime": "2023-10-30T14:00:12.617595+02:00", "EventTime": "2023-10-30T14:00:12.617613+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T07:45:06.158760+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2023/10/30 14:00:12.685206)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eddd3a1d-7515-4da7-89e4-63d3371b9cce", "DetectTime": "2023-10-30T14:00:12.691719+02:00", "EventTime": "2023-10-30T14:00:12.691740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["CL2HcJ17QKkCO7cbhg"]} -{"Format": "IDEA0", "ID": "2856d262-2e59-4136-9964-4b144ffd507f", "DetectTime": "2023-10-30T14:00:12.723657+02:00", "EventTime": "2023-10-30T14:00:12.723679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["Cm6j473i5lR0o3IbGi"]} -{"Format": "IDEA0", "ID": "13c378b3-5bf2-4f4f-a5e5-bb3ed01072b5", "DetectTime": "2023-10-30T14:00:12.752552+02:00", "EventTime": "2023-10-30T14:00:12.752578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CSL2BN1dBbk50f31Ld"]} -{"Format": "IDEA0", "ID": "5c9cf222-aaf8-442c-afd2-e9bf4b47b4f6", "DetectTime": "2023-10-30T14:00:12.779431+02:00", "EventTime": "2023-10-30T14:00:12.779453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CkfQWXR6jLN1760ih"]} -{"Format": "IDEA0", "ID": "9e44ed3c-f5a4-4069-89ff-48117673e4c3", "DetectTime": "2023-10-30T14:00:12.804719+02:00", "EventTime": "2023-10-30T14:00:12.804739+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeLzKF1RNg8PlRBBnl"]} -{"Format": "IDEA0", "ID": "175e1734-55a3-4cad-8556-a0f8855cfb76", "DetectTime": "2023-10-30T14:00:12.819657+02:00", "EventTime": "2023-10-30T14:00:12.819674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CH9VElhvxVoCVo1t3"]} -{"Format": "IDEA0", "ID": "1da137fc-9f95-4588-b71a-0ae52d3331a8", "DetectTime": "2023-10-30T14:00:12.845050+02:00", "EventTime": "2023-10-30T14:00:12.845071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CrC44zQmV9vKqLyvb"]} -{"Format": "IDEA0", "ID": "c6b34f5c-7d99-4c20-9101-e6762f3cdc21", "DetectTime": "2023-10-30T14:00:12.872626+02:00", "EventTime": "2023-10-30T14:00:12.872654+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0RPNX1zuLH6GIZ5jg"]} -{"Format": "IDEA0", "ID": "009e9ce7-9913-4fa2-876e-37ee1a475684", "DetectTime": "2023-10-30T14:00:12.888978+02:00", "EventTime": "2023-10-30T14:00:12.888998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CqBefZ1VgQkeVAPJbi"]} -{"Format": "IDEA0", "ID": "2a699e31-ae59-40ba-962f-40df2619c109", "DetectTime": "2023-10-30T14:00:12.916419+02:00", "EventTime": "2023-10-30T14:00:12.916438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CLtuxX13Cb9Pvz2xm7"]} -{"Format": "IDEA0", "ID": "d1c19267-b5cd-495b-9d9d-0be538af50ec", "DetectTime": "2023-10-30T14:00:12.941950+02:00", "EventTime": "2023-10-30T14:00:12.941970+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJLLro3hvrFkJF1df"]} -{"Format": "IDEA0", "ID": "6b83a73f-83be-40b7-9355-ff3fca55bd0e", "DetectTime": "2023-10-30T14:00:12.958083+02:00", "EventTime": "2023-10-30T14:00:12.958110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["CfxVwgCIIhrQKUuLh"]} -{"Format": "Json", "ID": "6b83a73f-83be-40b7-9355-ff3fca55bd0e", "DetectTime": "2023-10-30T14:00:12.958083+02:00", "EventTime": "2023-10-30T14:00:12.958110+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T07:45:26.057718+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2023/10/30 14:00:13.010866)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2a4144ee-6427-469c-931d-c9f2fba561ac", "DetectTime": "2023-10-30T14:00:13.015217+02:00", "EventTime": "2023-10-30T14:00:13.015244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6781], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. ", "ContentType": "text/plain"}], "uids": ["CjbxmE3J2Pm0U2gSla"]} -{"Format": "IDEA0", "ID": "ecd96516-818d-4896-a9bc-ac21b93660db", "DetectTime": "2023-10-30T14:00:13.041507+02:00", "EventTime": "2023-10-30T14:00:13.041527+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COpWjD43fM5QezFKb"]} -{"Format": "IDEA0", "ID": "9234d102-0ca6-4f12-84c0-9c873028248c", "DetectTime": "2023-10-30T14:00:13.055084+02:00", "EventTime": "2023-10-30T14:00:13.055103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. ", "ContentType": "text/plain"}], "uids": ["C9x3w23CRttH4f5lKk"]} -{"Format": "IDEA0", "ID": "80eabecf-ebc3-4c56-909d-696548e29bc3", "DetectTime": "2023-10-30T14:00:13.078230+02:00", "EventTime": "2023-10-30T14:00:13.078250+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZtuXY1XSSu6NVqD0f"]} -{"Format": "IDEA0", "ID": "3a1b4e89-aa8d-4ed3-ad7f-30421f909a03", "DetectTime": "2023-10-30T14:00:13.092711+02:00", "EventTime": "2023-10-30T14:00:13.092732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CvVh9A1BsaW0YSye71"]} -{"Format": "IDEA0", "ID": "eae0a1f7-2c15-4510-86b8-0e385f7107c6", "DetectTime": "2023-10-30T14:00:13.117642+02:00", "EventTime": "2023-10-30T14:00:13.117662+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3lTks3fo6jv0exW12"]} -{"Format": "IDEA0", "ID": "654a1210-fcc7-4647-95f3-a2190b4019b3", "DetectTime": "2023-10-30T14:00:13.132482+02:00", "EventTime": "2023-10-30T14:00:13.132499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5W16b2Zsj2QRyurk7"]} -{"Format": "IDEA0", "ID": "4385eca5-71eb-4f56-afef-c3064a6f1415", "DetectTime": "2023-10-30T14:00:13.286305+02:00", "EventTime": "2023-10-30T14:00:13.286322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZtuXY1XSSu6NVqD0f", "CJLLro3hvrFkJF1df", "CeLzKF1RNg8PlRBBnl", "CbUMJsX4UmR7FO4M"]} -{"Format": "IDEA0", "ID": "0ccd9d28-d25d-419e-b0f7-536cce416b8a", "DetectTime": "2023-10-30T14:00:13.302224+02:00", "EventTime": "2023-10-30T14:00:13.302242+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbUMJsX4UmR7FO4M"]} -{"Format": "IDEA0", "ID": "d4797c9b-420f-43c2-aa7a-9c7f7047a6e2", "DetectTime": "2023-10-30T14:00:13.317431+02:00", "EventTime": "2023-10-30T14:00:13.317457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["C93X354d1McAIqclui"]} -{"Format": "IDEA0", "ID": "191e2b91-8cc5-4cff-ad4c-62ee278d6e34", "DetectTime": "2023-10-30T14:00:13.393409+02:00", "EventTime": "2023-10-30T14:00:13.393432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["ChsFOi4hGdu2lRJigh"]} -{"Format": "IDEA0", "ID": "266d18bd-c49e-4a08-881f-ebe6f2179645", "DetectTime": "2023-10-30T14:00:13.485879+02:00", "EventTime": "2023-10-30T14:00:13.485907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CZwEpJ882GUhK4aHl"]} -{"Format": "IDEA0", "ID": "61fe4052-9440-4ba1-a6b7-882599dc2735", "DetectTime": "2023-10-30T14:00:13.562473+02:00", "EventTime": "2023-10-30T14:00:13.562494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CSwukK2v82L3rRNtB"]} -{"Format": "IDEA0", "ID": "284bf747-92f5-4dcc-9994-9e241f3e0e97", "DetectTime": "2023-10-30T14:00:13.641183+02:00", "EventTime": "2023-10-30T14:00:13.641200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["Cxdtvx3oerauTJwPVk"]} -{"Format": "IDEA0", "ID": "130a8613-603a-4307-9cf9-c1dc29ec5af9", "DetectTime": "2023-10-30T14:00:13.716411+02:00", "EventTime": "2023-10-30T14:00:13.716428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["C00Mq01sGw3aGoH024"]} -{"Format": "Json", "ID": "130a8613-603a-4307-9cf9-c1dc29ec5af9", "DetectTime": "2023-10-30T14:00:13.716411+02:00", "EventTime": "2023-10-30T14:00:13.716428+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:16:42.768232+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:13.838224)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a545823-57c6-4c93-b55d-1239923e8232", "DetectTime": "2023-10-30T14:00:13.845626+02:00", "EventTime": "2023-10-30T14:00:13.845646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CDxQEN1MzzCGCgdHmi"]} -{"Format": "IDEA0", "ID": "daac6624-150d-4530-b2dd-6227d3d00e78", "DetectTime": "2023-10-30T14:00:13.929103+02:00", "EventTime": "2023-10-30T14:00:13.929132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["C7EIpB4m5AxXuJcQ2"]} -{"Format": "IDEA0", "ID": "1d7efa17-5f16-4698-b307-2e45e098482a", "DetectTime": "2023-10-30T14:00:14.006109+02:00", "EventTime": "2023-10-30T14:00:14.006130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CVfJRs4akvaDJT0gG"]} -{"Format": "IDEA0", "ID": "7c752a83-4d52-483b-9102-d09963248f30", "DetectTime": "2023-10-30T14:00:14.076941+02:00", "EventTime": "2023-10-30T14:00:14.077132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["CSGesZ17MWylier8c3"]} -{"Format": "IDEA0", "ID": "dae650ad-a26d-472d-982d-0f48a95d368e", "DetectTime": "2023-10-30T14:00:14.152876+02:00", "EventTime": "2023-10-30T14:00:14.152897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["CPjRWN3mJbepHEGIg2"]} -{"Format": "IDEA0", "ID": "4a16ac9d-95d8-49bb-b297-b1c2136fef78", "DetectTime": "2023-10-30T14:00:14.222672+02:00", "EventTime": "2023-10-30T14:00:14.222693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CJ14RP1k0Tc72CUD0g"]} -{"Format": "IDEA0", "ID": "9596435d-8101-4af9-b173-0bc98ea339a7", "DetectTime": "2023-10-30T14:00:14.299072+02:00", "EventTime": "2023-10-30T14:00:14.299085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CvHi0E2Xwp1eeRIynh"]} -{"Format": "IDEA0", "ID": "2f523c98-249a-4586-8756-13a2f9194297", "DetectTime": "2023-10-30T14:00:14.378906+02:00", "EventTime": "2023-10-30T14:00:14.378925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["Cb9r1evJdeYCof9"]} -{"Format": "Json", "ID": "2f523c98-249a-4586-8756-13a2f9194297", "DetectTime": "2023-10-30T14:00:14.378906+02:00", "EventTime": "2023-10-30T14:00:14.378925+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:17:01.516512+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:14.491821)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "06b3733e-39bd-4072-808f-74978321b79b", "DetectTime": "2023-10-30T14:00:14.498290+02:00", "EventTime": "2023-10-30T14:00:14.498316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CdyC1D4WVJPTpioBp5"]} -{"Format": "IDEA0", "ID": "a68b127d-65c6-4e37-ac70-9046590d3b89", "DetectTime": "2023-10-30T14:00:14.576435+02:00", "EventTime": "2023-10-30T14:00:14.576453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["CwXE4x3YJD0dtoxMsl"]} -{"Format": "IDEA0", "ID": "21c2db18-91dd-4eec-9cee-29e8eda0a844", "DetectTime": "2023-10-30T14:00:14.643829+02:00", "EventTime": "2023-10-30T14:00:14.643857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CWzI2A32kzNnvLEoO3"]} -{"Format": "IDEA0", "ID": "858908fe-7720-4d03-a4e4-a3d10f6fd987", "DetectTime": "2023-10-30T14:00:14.717467+02:00", "EventTime": "2023-10-30T14:00:14.717486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["C1qNeS3NGxRTaXuovl"]} -{"Format": "IDEA0", "ID": "2c7d3512-d75e-49e0-9f26-4a56ca8e2ad3", "DetectTime": "2023-10-30T14:00:14.786654+02:00", "EventTime": "2023-10-30T14:00:14.786691+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7rHh61YsfSeo0Ajyh"]} -{"Format": "IDEA0", "ID": "e7cb894c-42fb-4aae-93d1-40e8435084f8", "DetectTime": "2023-10-30T14:00:14.802543+02:00", "EventTime": "2023-10-30T14:00:14.802560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CGxr4o26A540hPrMp9"]} -{"Format": "IDEA0", "ID": "0e0fbb8f-3f7e-4348-bca7-be87c4ba11f6", "DetectTime": "2023-10-30T14:00:14.878261+02:00", "EventTime": "2023-10-30T14:00:14.878285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CZRtuC25HdgZghndx8"]} -{"Format": "IDEA0", "ID": "34fe890b-ca79-4f79-9597-52c8022036c8", "DetectTime": "2023-10-30T14:00:14.945752+02:00", "EventTime": "2023-10-30T14:00:14.945770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["Cfdhbd3qud3auN31Qa"]} -{"Format": "IDEA0", "ID": "50c31d15-b528-4e62-bb00-2a214fb915fc", "DetectTime": "2023-10-30T14:00:15.008160+02:00", "EventTime": "2023-10-30T14:00:15.008180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6781], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. ", "ContentType": "text/plain"}], "uids": ["CkJRcX16Hg1r8AwqT4"]} -{"Format": "Json", "ID": "50c31d15-b528-4e62-bb00-2a214fb915fc", "DetectTime": "2023-10-30T14:00:15.008160+02:00", "EventTime": "2023-10-30T14:00:15.008180+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6781], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:17:03.350230+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:15.096271)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "582cf633-d31b-44b1-ad1c-cc24975e3bb1", "DetectTime": "2023-10-30T14:00:15.102005+02:00", "EventTime": "2023-10-30T14:00:15.102030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CbXdqh13s7yuPDCnxg"]} -{"Format": "IDEA0", "ID": "e69bccfc-6665-419d-a5fd-f5ad1beed329", "DetectTime": "2023-10-30T14:00:15.164166+02:00", "EventTime": "2023-10-30T14:00:15.164188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSjKDT3XSOc4H2nHL5"]} -{"Format": "IDEA0", "ID": "f532573f-e979-4a72-8bca-09ae53483a5d", "DetectTime": "2023-10-30T14:00:15.227004+02:00", "EventTime": "2023-10-30T14:00:15.227022+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHdpSe4WswKwukKmqb"]} -{"Format": "IDEA0", "ID": "3d64db27-84ca-442f-984c-727783543c72", "DetectTime": "2023-10-30T14:00:15.241670+02:00", "EventTime": "2023-10-30T14:00:15.241688+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3hOsK19jpQpGe8x0f"]} -{"Format": "IDEA0", "ID": "327585c4-84d3-4978-af70-b9412aae1dea", "DetectTime": "2023-10-30T14:00:15.255544+02:00", "EventTime": "2023-10-30T14:00:15.255566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. ", "ContentType": "text/plain"}], "uids": ["CSR6Gf2UR84AMrrP4"]} -{"Format": "IDEA0", "ID": "63cfebe9-fffe-4e26-9d86-cca4568b893e", "DetectTime": "2023-10-30T14:00:15.312032+02:00", "EventTime": "2023-10-30T14:00:15.312051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. ", "ContentType": "text/plain"}], "uids": ["C8Jc8e2AJrwL5B2UW7"]} -{"Format": "IDEA0", "ID": "ec8a7f8b-488d-44e9-8f3b-6f29c2635f1a", "DetectTime": "2023-10-30T14:00:15.371382+02:00", "EventTime": "2023-10-30T14:00:15.371407+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQWKpf1pBfXa5MgqY5"]} -{"Format": "IDEA0", "ID": "f6172488-bfdc-4253-8f53-c7a418eda6af", "DetectTime": "2023-10-30T14:00:15.385604+02:00", "EventTime": "2023-10-30T14:00:15.385621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20374], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. ", "ContentType": "text/plain"}], "uids": ["CCLKBNrk3SQ1VMqae"]} -{"Format": "IDEA0", "ID": "6513e2dd-88ea-477b-9817-b1f6dc50b60c", "DetectTime": "2023-10-30T14:00:15.441920+02:00", "EventTime": "2023-10-30T14:00:15.441933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5787], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. ", "ContentType": "text/plain"}], "uids": ["CZofYy30TySOPak8K9"]} -{"Format": "IDEA0", "ID": "83b2308c-bfbb-4575-929a-9bfbcf25d549", "DetectTime": "2023-10-30T14:00:15.500306+02:00", "EventTime": "2023-10-30T14:00:15.500329+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnJ4zX1YDxGdBcaVH1"]} -{"Format": "IDEA0", "ID": "4733546e-fd06-428f-ad28-7e98a128bf90", "DetectTime": "2023-10-30T14:00:15.514565+02:00", "EventTime": "2023-10-30T14:00:15.514592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. ", "ContentType": "text/plain"}], "uids": ["C4oUZW1hMDfq5vuzv2"]} -{"Format": "IDEA0", "ID": "0d75b056-6e84-4985-b7de-294d79bb0752", "DetectTime": "2023-10-30T14:00:15.569065+02:00", "EventTime": "2023-10-30T14:00:15.569082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. ", "ContentType": "text/plain"}], "uids": ["CBUUE91QtZjbOZKJGc"]} -{"Format": "Json", "ID": "0d75b056-6e84-4985-b7de-294d79bb0752", "DetectTime": "2023-10-30T14:00:15.569065+02:00", "EventTime": "2023-10-30T14:00:15.569082+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6581], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:48:26.760857+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:15.654808)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c9ff4d34-3e9a-4a8a-ba58-b7c8575d5a66", "DetectTime": "2023-10-30T14:00:15.660385+02:00", "EventTime": "2023-10-30T14:00:15.660403+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaMKOR2o4mE3G7h1Ng"]} -{"Format": "IDEA0", "ID": "41cacb0b-2db7-4274-bb38-4bb01e8f3155", "DetectTime": "2023-10-30T14:00:15.674840+02:00", "EventTime": "2023-10-30T14:00:15.674860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. ", "ContentType": "text/plain"}], "uids": ["CD5zfz1N9rHjA8FJZg"]} -{"Format": "IDEA0", "ID": "5ae2c429-367b-4c46-b1c7-4ace2eb9fe9d", "DetectTime": "2023-10-30T14:00:15.727080+02:00", "EventTime": "2023-10-30T14:00:15.727102+02:00", "Category": ["Recon"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.2"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701", "ContentType": "text/plain"}], "uids": ["CWSjA02aGUYDaVjHia"]} -{"Format": "IDEA0", "ID": "69e2099c-aac3-4cb9-b9d6-cfdd4c0b088c", "DetectTime": "2023-10-30T14:00:15.735243+02:00", "EventTime": "2023-10-30T14:00:15.735265+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoDZfN3oCwfklFZfo1"]} -{"Format": "IDEA0", "ID": "dbca4d6f-2bd2-45ad-b0f0-2940ff2a6fb5", "DetectTime": "2023-10-30T14:00:15.747663+02:00", "EventTime": "2023-10-30T14:00:15.747676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. ", "ContentType": "text/plain"}], "uids": ["CD0GR320INfew7H8N7"]} -{"Format": "IDEA0", "ID": "9771a8f2-968a-4a91-9a8b-135d9e971f38", "DetectTime": "2023-10-30T14:00:15.796854+02:00", "EventTime": "2023-10-30T14:00:15.796872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2843], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. ", "ContentType": "text/plain"}], "uids": ["CbUjlq3qxXRBYqQqX2"]} -{"Format": "IDEA0", "ID": "591cac5a-8f8f-4b1f-9dd5-379e92d55946", "DetectTime": "2023-10-30T14:00:15.853415+02:00", "EventTime": "2023-10-30T14:00:15.853442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CeIIMo2JjVT1qiF205", "CHdpSe4WswKwukKmqb", "CQWKpf1pBfXa5MgqY5", "CaMKOR2o4mE3G7h1Ng"]} -{"Format": "IDEA0", "ID": "bd83c1a6-bc21-4e87-adad-65189bfcf127", "DetectTime": "2023-10-30T14:00:15.865879+02:00", "EventTime": "2023-10-30T14:00:15.865896+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeIIMo2JjVT1qiF205"]} -{"Format": "IDEA0", "ID": "da0ccdbd-3e80-4364-8f0a-1364ba7f9444", "DetectTime": "2023-10-30T14:00:15.880498+02:00", "EventTime": "2023-10-30T14:00:15.880524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22323], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. ", "ContentType": "text/plain"}], "uids": ["C87oZz32AfPhwbaFb1"]} -{"Format": "IDEA0", "ID": "9ffeb8e9-baa9-4011-9e0e-a28c61c3eaed", "DetectTime": "2023-10-30T14:00:15.938575+02:00", "EventTime": "2023-10-30T14:00:15.938603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3529], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. ", "ContentType": "text/plain"}], "uids": ["C774r8wwCmDcT9o9k"]} -{"Format": "IDEA0", "ID": "665ae1a4-0573-4bd1-90ea-abe3e6e067ac", "DetectTime": "2023-10-30T14:00:15.994623+02:00", "EventTime": "2023-10-30T14:00:15.994648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CV9iQ42t8HaWAHSGr4"]} -{"Format": "IDEA0", "ID": "0d01842d-8cde-4bfa-b87a-ac03384ee1d3", "DetectTime": "2023-10-30T14:00:16.009369+02:00", "EventTime": "2023-10-30T14:00:16.009387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8387], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C1UbnIPwx6dYJGj0f"]} -{"Format": "IDEA0", "ID": "51d155f2-d640-448a-b025-33b5d59f5dad", "DetectTime": "2023-10-30T14:00:16.062854+02:00", "EventTime": "2023-10-30T14:00:16.062873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. ", "ContentType": "text/plain"}], "uids": ["CbWlgO1y7399j5CfTl"]} -{"Format": "IDEA0", "ID": "e0a16b75-1f48-488d-a82f-f2307f25c1c8", "DetectTime": "2023-10-30T14:00:16.117437+02:00", "EventTime": "2023-10-30T14:00:16.117466+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8lsCvb8Q7iwR3da7"]} -{"Format": "IDEA0", "ID": "49383be6-b7e3-4a05-8a2e-00cd37d728fc", "DetectTime": "2023-10-30T14:00:16.132693+02:00", "EventTime": "2023-10-30T14:00:16.132719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. ", "ContentType": "text/plain"}], "uids": ["CesR3i1nDDZvJHuCkd"]} -{"Format": "Json", "ID": "49383be6-b7e3-4a05-8a2e-00cd37d728fc", "DetectTime": "2023-10-30T14:00:16.132693+02:00", "EventTime": "2023-10-30T14:00:16.132719+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5068], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:48:24.824101+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:16.211255)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a1a0cbc5-e892-4b05-8225-853b8117d93c", "DetectTime": "2023-10-30T14:00:16.218074+02:00", "EventTime": "2023-10-30T14:00:16.218095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13897], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. ", "ContentType": "text/plain"}], "uids": ["CY7pjt3DYJ3jhyh5S2"]} -{"Format": "IDEA0", "ID": "d9b85d1b-a1c5-43d8-907f-bfbf0d21cd46", "DetectTime": "2023-10-30T14:00:16.274924+02:00", "EventTime": "2023-10-30T14:00:16.274951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. ", "ContentType": "text/plain"}], "uids": ["CYk5j321QYbbRAvJbb"]} -{"Format": "IDEA0", "ID": "221f6c72-682d-49a0-a217-ac3d5ae04702", "DetectTime": "2023-10-30T14:00:16.325375+02:00", "EventTime": "2023-10-30T14:00:16.325392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6925], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. ", "ContentType": "text/plain"}], "uids": ["C4T1bo3Dka1pvycjs"]} -{"Format": "IDEA0", "ID": "46553376-6159-4f0a-a998-1e0b3053752d", "DetectTime": "2023-10-30T14:00:16.378990+02:00", "EventTime": "2023-10-30T14:00:16.379012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. ", "ContentType": "text/plain"}], "uids": ["CTgCM33D7GfpPSvZd"]} -{"Format": "IDEA0", "ID": "01baa1c9-ddde-4bc0-bb86-2d16d88a5a78", "DetectTime": "2023-10-30T14:00:16.429729+02:00", "EventTime": "2023-10-30T14:00:16.429747+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CF8kpl1EtjimoHpUx8"]} -{"Format": "IDEA0", "ID": "deb86200-f9d6-4632-9b23-445ecc3b8b33", "DetectTime": "2023-10-30T14:00:16.445658+02:00", "EventTime": "2023-10-30T14:00:16.445671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. ", "ContentType": "text/plain"}], "uids": ["CRjCMF1soGGhtBYI4"]} -{"Format": "IDEA0", "ID": "9e75def4-c76a-49ee-82c0-0143a5db0a7b", "DetectTime": "2023-10-30T14:00:16.498826+02:00", "EventTime": "2023-10-30T14:00:16.498845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10247], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. ", "ContentType": "text/plain"}], "uids": ["Cu60Eu176i3tI54g6c"]} -{"Format": "IDEA0", "ID": "9cf0fdeb-b808-4474-9362-055c2573b1b2", "DetectTime": "2023-10-30T14:00:16.548910+02:00", "EventTime": "2023-10-30T14:00:16.548931+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbIYLa49GP6SH53ZSb"]} -{"Format": "IDEA0", "ID": "b340aae6-b1f7-4fa8-99b3-c33e42b21a62", "DetectTime": "2023-10-30T14:00:16.562118+02:00", "EventTime": "2023-10-30T14:00:16.562135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10957], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. ", "ContentType": "text/plain"}], "uids": ["CaNQrJ2oMXahUule84"]} -{"Format": "IDEA0", "ID": "f7a83638-eb03-441c-8851-8cccfccae290", "DetectTime": "2023-10-30T14:00:16.619526+02:00", "EventTime": "2023-10-30T14:00:16.619550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. ", "ContentType": "text/plain"}], "uids": ["CMpqB8AdPw4HwgWuj"]} -{"Format": "Json", "ID": "f7a83638-eb03-441c-8851-8cccfccae290", "DetectTime": "2023-10-30T14:00:16.619526+02:00", "EventTime": "2023-10-30T14:00:16.619550+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2668], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:48:25.901031+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:16.701969)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "23891e16-94b4-4591-8431-e77468a5c536", "DetectTime": "2023-10-30T14:00:16.707901+02:00", "EventTime": "2023-10-30T14:00:16.707932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CJUXDs1eGJ6lJnZ11"]} -{"Format": "IDEA0", "ID": "a0bd5017-d1fc-4fa6-b8d3-02a7f0317a14", "DetectTime": "2023-10-30T14:00:16.761094+02:00", "EventTime": "2023-10-30T14:00:16.761117+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2D483stiw4BLMg4i"]} -{"Format": "IDEA0", "ID": "3e496cf8-5565-4398-87ac-e35b28efc6aa", "DetectTime": "2023-10-30T14:00:16.775695+02:00", "EventTime": "2023-10-30T14:00:16.775718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17994], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17994/UDP destination IP 118.96.97.217. ", "ContentType": "text/plain"}], "uids": ["C1UDtZ1hkVqXyMRFG5"]} -{"Format": "IDEA0", "ID": "7cf825d1-c964-4264-bd3f-45d2a645e891", "DetectTime": "2023-10-30T14:00:16.824642+02:00", "EventTime": "2023-10-30T14:00:16.824681+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyO8dv3GguVnpKeCwf"]} -{"Format": "IDEA0", "ID": "67ba062c-591f-4f3a-87bd-f35cc792d9ca", "DetectTime": "2023-10-30T14:00:16.839588+02:00", "EventTime": "2023-10-30T14:00:16.839608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1327], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1327/UDP destination IP 124.105.251.166. ", "ContentType": "text/plain"}], "uids": ["CPQfzd1oqPLct5y6ii"]} -{"Format": "IDEA0", "ID": "905f8b39-8056-46e7-9183-4466ba3486f6", "DetectTime": "2023-10-30T14:00:16.887158+02:00", "EventTime": "2023-10-30T14:00:16.887180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2115], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2115/UDP destination IP 176.73.148.5. ", "ContentType": "text/plain"}], "uids": ["C0niBG1EZmshVjraFe"]} -{"Format": "IDEA0", "ID": "0fdfe95d-68eb-47d4-800f-5e0a876c08c9", "DetectTime": "2023-10-30T14:00:16.933199+02:00", "EventTime": "2023-10-30T14:00:16.933220+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CueIyw21MAKAlYjPYe"]} -{"Format": "IDEA0", "ID": "16d2aa06-31fa-4787-bdc3-503001bbb814", "DetectTime": "2023-10-30T14:00:16.947860+02:00", "EventTime": "2023-10-30T14:00:16.947887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CYqwXK2GiSMGDtLxnc"]} -{"Format": "IDEA0", "ID": "dfa66658-202f-497d-a4af-85069035befe", "DetectTime": "2023-10-30T14:00:17.005239+02:00", "EventTime": "2023-10-30T14:00:17.005255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKTPQL3beACsTNRNMe"]} -{"Format": "IDEA0", "ID": "6b8c3572-3c43-4d05-af42-93e2c17e5758", "DetectTime": "2023-10-30T14:00:17.059162+02:00", "EventTime": "2023-10-30T14:00:17.059190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CxziZ74nzE5D903Jcc"]} -{"Format": "IDEA0", "ID": "26ca3371-af0c-4b69-945a-9b5de112e450", "DetectTime": "2023-10-30T14:00:17.112438+02:00", "EventTime": "2023-10-30T14:00:17.112460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyO8dv3GguVnpKeCwf", "CbIYLa49GP6SH53ZSb", "C8lsCvb8Q7iwR3da7", "CvLBSW3zntooBOQOfe"]} -{"Format": "IDEA0", "ID": "8d029c14-d4dd-49eb-93f3-f305cc047023", "DetectTime": "2023-10-30T14:00:17.126247+02:00", "EventTime": "2023-10-30T14:00:17.126345+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvLBSW3zntooBOQOfe"]} -{"Format": "IDEA0", "ID": "5de9f9a7-ec27-4db2-9f98-0f32878b68cb", "DetectTime": "2023-10-30T14:00:17.140027+02:00", "EventTime": "2023-10-30T14:00:17.140053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["Cdm0a01PMpNcfRtWce"]} -{"Format": "Json", "ID": "5de9f9a7-ec27-4db2-9f98-0f32878b68cb", "DetectTime": "2023-10-30T14:00:17.140027+02:00", "EventTime": "2023-10-30T14:00:17.140053+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:51:02.105190+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:17.221084)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5caefe9c-96a2-4a24-9123-86e8dfda001e", "DetectTime": "2023-10-30T14:00:17.226679+02:00", "EventTime": "2023-10-30T14:00:17.226696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. ", "ContentType": "text/plain"}], "uids": ["C5nKrL3Hsjx1WSVpa9"]} -{"Format": "IDEA0", "ID": "48adf654-51aa-4f3a-aaf9-d9a7b0173c24", "DetectTime": "2023-10-30T14:00:17.278533+02:00", "EventTime": "2023-10-30T14:00:17.278547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["COHFHP1Gj5eSBJhBgj"]} -{"Format": "IDEA0", "ID": "448fc2c6-a73a-40f6-adb6-b5d09f6c3a8e", "DetectTime": "2023-10-30T14:00:17.322740+02:00", "EventTime": "2023-10-30T14:00:17.322766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CmUTLP2cPROK6CtZr3"]} -{"Format": "IDEA0", "ID": "fe3744f3-23dc-4196-ba9d-828d80678db6", "DetectTime": "2023-10-30T14:00:17.371896+02:00", "EventTime": "2023-10-30T14:00:17.371923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18052], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CQ5tKC3UWJCKDsWlhl"]} -{"Format": "IDEA0", "ID": "b739d9ae-5e4b-4663-9323-6b7ef30f8c2b", "DetectTime": "2023-10-30T14:00:17.419395+02:00", "EventTime": "2023-10-30T14:00:17.419416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CtJWRu4KoyeKQd2Esj"]} -{"Format": "IDEA0", "ID": "b99dd6c0-e6e5-4c8d-b956-9e6ab709eee5", "DetectTime": "2023-10-30T14:00:17.469118+02:00", "EventTime": "2023-10-30T14:00:17.469132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23509], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. ", "ContentType": "text/plain"}], "uids": ["C3RL2e1b75N6Ay7Ru8"]} -{"Format": "IDEA0", "ID": "47037b11-1a5d-4777-8856-687b452d974a", "DetectTime": "2023-10-30T14:00:17.517388+02:00", "EventTime": "2023-10-30T14:00:17.517410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["C4NBDr2fBYPqppqdC1"]} -{"Format": "IDEA0", "ID": "6433e0ec-ee53-48ae-be7f-9f53a5982d90", "DetectTime": "2023-10-30T14:00:17.566294+02:00", "EventTime": "2023-10-30T14:00:17.566316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CEVLfkHmyQiZYnoBa"]} -{"Format": "Json", "ID": "6433e0ec-ee53-48ae-be7f-9f53a5982d90", "DetectTime": "2023-10-30T14:00:17.566294+02:00", "EventTime": "2023-10-30T14:00:17.566316+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:51:43.896346+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:17.638039)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7587f6be-3507-4bc8-a5f4-271204b5d8af", "DetectTime": "2023-10-30T14:00:17.644187+02:00", "EventTime": "2023-10-30T14:00:17.644201+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrC55z2OL8NcddhfKd"]} -{"Format": "IDEA0", "ID": "610d79b8-a8de-4261-ab44-cce13d9d5055", "DetectTime": "2023-10-30T14:00:17.662258+02:00", "EventTime": "2023-10-30T14:00:17.662285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["C0HHTB48zlYFRmq2g"]} -{"Format": "IDEA0", "ID": "2b47532d-55d4-4d2a-8f99-0385f769373e", "DetectTime": "2023-10-30T14:00:17.708618+02:00", "EventTime": "2023-10-30T14:00:17.708646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["C7fNhm3gzHlHOIK0d4"]} -{"Format": "IDEA0", "ID": "a8b926aa-d5f5-4225-91a4-7feeb01b790f", "DetectTime": "2023-10-30T14:00:17.755573+02:00", "EventTime": "2023-10-30T14:00:17.755594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6q4eK2YACjLczFGW6"]} -{"Format": "IDEA0", "ID": "99921376-d74b-4762-ac77-542d04ced922", "DetectTime": "2023-10-30T14:00:17.800230+02:00", "EventTime": "2023-10-30T14:00:17.800243+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAaT834e88PgIhPQ5j"]} -{"Format": "IDEA0", "ID": "2e1466df-aa74-46da-a058-be39451924c9", "DetectTime": "2023-10-30T14:00:17.814216+02:00", "EventTime": "2023-10-30T14:00:17.814235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CS1rkg1OzEMR8tUJzj"]} -{"Format": "IDEA0", "ID": "d30d5643-810b-4431-9e93-090a2c4c02e4", "DetectTime": "2023-10-30T14:00:17.860360+02:00", "EventTime": "2023-10-30T14:00:17.860382+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cfnb82HLNiVQkwN3d"]} -{"Format": "IDEA0", "ID": "5c94d889-e549-4e42-a393-7b0db69aea5e", "DetectTime": "2023-10-30T14:00:17.871837+02:00", "EventTime": "2023-10-30T14:00:17.871856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CanxTi1WmhwHNRxivh"]} -{"Format": "IDEA0", "ID": "779866a9-d1b9-48da-a0d7-1237a3fedaa9", "DetectTime": "2023-10-30T14:00:17.914392+02:00", "EventTime": "2023-10-30T14:00:17.914404+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cnw3EF5byElbMGU9b"]} -{"Format": "IDEA0", "ID": "a77e0799-1f73-40f7-9779-d4e90698e441", "DetectTime": "2023-10-30T14:00:17.925917+02:00", "EventTime": "2023-10-30T14:00:17.925943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6169], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. ", "ContentType": "text/plain"}], "uids": ["Ci14JC2Nvlf45mdeYl"]} -{"Format": "IDEA0", "ID": "b8601093-d7b4-45d0-b990-44647eab70a7", "DetectTime": "2023-10-30T14:00:17.971724+02:00", "EventTime": "2023-10-30T14:00:17.971744+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ct6PyqjbqSvHpd5Nh"]} -{"Format": "IDEA0", "ID": "c6828baa-55eb-4a9c-bd97-b9fe4ff51fae", "DetectTime": "2023-10-30T14:00:17.983104+02:00", "EventTime": "2023-10-30T14:00:17.983123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C5fww21XwmTZ3HS6re"]} -{"Format": "IDEA0", "ID": "f9ce10b7-4072-4768-a00c-18d503f8344b", "DetectTime": "2023-10-30T14:00:18.030244+02:00", "EventTime": "2023-10-30T14:00:18.030264+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnBaRERcotgCjHzxc"]} -{"Format": "IDEA0", "ID": "f67a52db-2378-4652-b949-cfeffa2c8384", "DetectTime": "2023-10-30T14:00:18.045332+02:00", "EventTime": "2023-10-30T14:00:18.045364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CIajt23K5VdCvhFOGh"]} -{"Format": "Json", "ID": "f67a52db-2378-4652-b949-cfeffa2c8384", "DetectTime": "2023-10-30T14:00:18.045332+02:00", "EventTime": "2023-10-30T14:00:18.045364+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:53:00.544040+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:18.127104)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c054e77-1144-4d60-bbdb-bc465f4c2c53", "DetectTime": "2023-10-30T14:00:18.132370+02:00", "EventTime": "2023-10-30T14:00:18.132389+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cn1yjkOvcmFAEHwSf"]} -{"Format": "IDEA0", "ID": "3faac82b-e8bd-4398-9082-afb20e6a69a2", "DetectTime": "2023-10-30T14:00:18.146427+02:00", "EventTime": "2023-10-30T14:00:18.146441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. ", "ContentType": "text/plain"}], "uids": ["ChdCSgitkQLMnvRbf"]} -{"Format": "IDEA0", "ID": "6a7576fc-4833-479c-a2c2-e8a8a307ec2e", "DetectTime": "2023-10-30T14:00:18.193277+02:00", "EventTime": "2023-10-30T14:00:18.193307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cnw3EF5byElbMGU9b", "CnBaRERcotgCjHzxc", "CZhOft4dxIPBcdMQPb", "CAaT834e88PgIhPQ5j"]} -{"Format": "IDEA0", "ID": "d5045c7c-2dc9-42fa-bc56-142dacb810b9", "DetectTime": "2023-10-30T14:00:18.205758+02:00", "EventTime": "2023-10-30T14:00:18.205786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8108], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8108/UDP destination IP 124.253.163.131. ", "ContentType": "text/plain"}], "uids": ["CBiUav3j3UGlnpiWvk"]} -{"Format": "IDEA0", "ID": "2c90cc05-0e3d-4a4d-92ec-3dca08bb58fb", "DetectTime": "2023-10-30T14:00:18.245273+02:00", "EventTime": "2023-10-30T14:00:18.245296+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZhOft4dxIPBcdMQPb"]} -{"Format": "IDEA0", "ID": "da450294-66a8-456d-b49e-42c26db353af", "DetectTime": "2023-10-30T14:00:18.260794+02:00", "EventTime": "2023-10-30T14:00:18.260814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CTTO7F1MtpEw3CYmmk"]} -{"Format": "IDEA0", "ID": "4edbe4b2-454f-4635-bd26-b509ab8b0ed1", "DetectTime": "2023-10-30T14:00:18.307028+02:00", "EventTime": "2023-10-30T14:00:18.307053+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIkVp5RI9L84ByUEk"]} -{"Format": "IDEA0", "ID": "1860247e-2f0f-4776-a108-af39d06bcb5a", "DetectTime": "2023-10-30T14:00:18.319674+02:00", "EventTime": "2023-10-30T14:00:18.319687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["CBEJVh2ijmHvQNMG8i"]} -{"Format": "IDEA0", "ID": "5ad9918c-c953-4169-b98e-78d0b40a656a", "DetectTime": "2023-10-30T14:00:18.362456+02:00", "EventTime": "2023-10-30T14:00:18.362476+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2ujlovaAU9vxh3l8"]} -{"Format": "IDEA0", "ID": "5ae2e800-8354-4188-9050-31735c6d1375", "DetectTime": "2023-10-30T14:00:18.376679+02:00", "EventTime": "2023-10-30T14:00:18.376695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Czmsf61i0ZUfTvKhJ7"]} -{"Format": "IDEA0", "ID": "495b6a9e-d6be-4f7e-b230-4a82440aa078", "DetectTime": "2023-10-30T14:00:18.419725+02:00", "EventTime": "2023-10-30T14:00:18.419751+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CThE064dQ2Y7yQRTgc"]} -{"Format": "IDEA0", "ID": "7f771b9b-5398-4140-8a43-c288568d2536", "DetectTime": "2023-10-30T14:00:18.432361+02:00", "EventTime": "2023-10-30T14:00:18.432385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C5T8xE3AmrqZjE5Co7"]} -{"Format": "IDEA0", "ID": "b65d46d7-8d2b-4353-9890-8c8cdfcd45c7", "DetectTime": "2023-10-30T14:00:18.478868+02:00", "EventTime": "2023-10-30T14:00:18.478891+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZaH3FzgL05PRo3S9"]} -{"Format": "IDEA0", "ID": "ca7a2e5f-53f6-47fa-9501-ee4ab14571d0", "DetectTime": "2023-10-30T14:00:18.493440+02:00", "EventTime": "2023-10-30T14:00:18.493457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CuFh4A2UVk2vVLnN9l"]} -{"Format": "IDEA0", "ID": "899eafa4-93d8-4cb8-a1ad-6139d6539f44", "DetectTime": "2023-10-30T14:00:18.536317+02:00", "EventTime": "2023-10-30T14:00:18.536331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C61bjB3yEZGBMKuzpe"]} -{"Format": "Json", "ID": "899eafa4-93d8-4cb8-a1ad-6139d6539f44", "DetectTime": "2023-10-30T14:00:18.536317+02:00", "EventTime": "2023-10-30T14:00:18.536331+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:53:41.223427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:18.607968)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1e1d2911-c9e7-4912-a605-43285c9d54d8", "DetectTime": "2023-10-30T14:00:18.614258+02:00", "EventTime": "2023-10-30T14:00:18.614274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CaO7Ml2FYfhbZyrw22"]} -{"Format": "IDEA0", "ID": "e2041fae-6421-4f7e-9f3b-04ae0b23af10", "DetectTime": "2023-10-30T14:00:18.653914+02:00", "EventTime": "2023-10-30T14:00:18.653939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CeMBd81aMR7hIDB5Da"]} -{"Format": "IDEA0", "ID": "5bf8dd99-3c04-4ad3-a4c4-9e4d7ebd8a00", "DetectTime": "2023-10-30T14:00:18.666232+02:00", "EventTime": "2023-10-30T14:00:18.666246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20786/UDP destination IP 94.64.205.60. ", "ContentType": "text/plain"}], "uids": ["CnYxcV2wqaTkn2Gak2"]} -{"Format": "IDEA0", "ID": "271cdf08-8f51-497f-af14-50ff503dd525", "DetectTime": "2023-10-30T14:00:18.712348+02:00", "EventTime": "2023-10-30T14:00:18.712370+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cr6qYN1uSHksBcQoH6"]} -{"Format": "IDEA0", "ID": "99dc76db-bcb5-48d8-92ee-8f7a5cb91633", "DetectTime": "2023-10-30T14:00:18.727414+02:00", "EventTime": "2023-10-30T14:00:18.727431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Cq0ql42DNvgxDJaebg"]} -{"Format": "IDEA0", "ID": "e1eb72eb-1996-4a4d-990d-f7edcda7b091", "DetectTime": "2023-10-30T14:00:18.771811+02:00", "EventTime": "2023-10-30T14:00:18.771838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["Cpko5u476OnsOa2gi1"]} -{"Format": "IDEA0", "ID": "f5d80f82-acf4-45a4-acbc-d63bad955a9f", "DetectTime": "2023-10-30T14:00:18.816147+02:00", "EventTime": "2023-10-30T14:00:18.816171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C0gXwv4UL7C5KunYmh"]} -{"Format": "IDEA0", "ID": "c29a01df-d829-42d2-8bec-285a619a7cd8", "DetectTime": "2023-10-30T14:00:18.860030+02:00", "EventTime": "2023-10-30T14:00:18.860051+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClVS8nVVVPvuoR267"]} -{"Format": "IDEA0", "ID": "3ba6b7ca-ebd7-44a3-a501-abe51d571386", "DetectTime": "2023-10-30T14:00:18.874608+02:00", "EventTime": "2023-10-30T14:00:18.874627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CbPj8p1mMOn1Kd5tnh"]} -{"Format": "IDEA0", "ID": "3718e31d-e424-4e96-9c7b-127bf94375bc", "DetectTime": "2023-10-30T14:00:18.915334+02:00", "EventTime": "2023-10-30T14:00:18.915356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C4FXLI1IbG6hsAIO9f"]} -{"Format": "IDEA0", "ID": "aecde5a6-0ed6-425b-9ab0-9eff23e6b7d8", "DetectTime": "2023-10-30T14:00:18.975165+02:00", "EventTime": "2023-10-30T14:00:18.975189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQhuwk4HD880NFvKKj", "C2ujlovaAU9vxh3l8", "Cr6qYN1uSHksBcQoH6", "CZaH3FzgL05PRo3S9"]} -{"Format": "IDEA0", "ID": "c0c9cd64-ff91-4298-8468-803b49a193ab", "DetectTime": "2023-10-30T14:00:18.993718+02:00", "EventTime": "2023-10-30T14:00:18.993739+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQhuwk4HD880NFvKKj"]} -{"Format": "IDEA0", "ID": "3883ee24-d0fa-485e-bb16-587dcde491f1", "DetectTime": "2023-10-30T14:00:19.013222+02:00", "EventTime": "2023-10-30T14:00:19.013246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. ", "ContentType": "text/plain"}], "uids": ["C09b0y2AYdVkrjpRi7"]} -{"Format": "Json", "ID": "3883ee24-d0fa-485e-bb16-587dcde491f1", "DetectTime": "2023-10-30T14:00:19.013222+02:00", "EventTime": "2023-10-30T14:00:19.013246+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:54:12.229091+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:19.109059)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2b413d1c-1008-4d18-9baf-01dfee53ed93", "DetectTime": "2023-10-30T14:00:19.117095+02:00", "EventTime": "2023-10-30T14:00:19.117118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14730/UDP destination IP 122.170.98.24. ", "ContentType": "text/plain"}], "uids": ["C3XKcf3WVIVHRCE2sl"]} -{"Format": "IDEA0", "ID": "1d5a0dd8-b322-4f87-952b-aa983d18e62a", "DetectTime": "2023-10-30T14:00:19.176923+02:00", "EventTime": "2023-10-30T14:00:19.176952+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYzrL1UIWy7jFJkd"]} -{"Format": "IDEA0", "ID": "81b64b00-02e0-4487-af7f-f5d0380ff03c", "DetectTime": "2023-10-30T14:00:19.194327+02:00", "EventTime": "2023-10-30T14:00:19.194345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7743], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. ", "ContentType": "text/plain"}], "uids": ["Cst9Yj12ImAqERHMHf"]} -{"Format": "IDEA0", "ID": "da690333-57a3-41f8-b203-564708a3f4b0", "DetectTime": "2023-10-30T14:00:19.235168+02:00", "EventTime": "2023-10-30T14:00:19.235187+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMdqtTXunBbIcydN5"]} -{"Format": "IDEA0", "ID": "8697a918-75ae-460b-ab0e-8cbe13941f00", "DetectTime": "2023-10-30T14:00:19.250309+02:00", "EventTime": "2023-10-30T14:00:19.250329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1976], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1976/UDP destination IP 112.134.193.60. ", "ContentType": "text/plain"}], "uids": ["CIHYX31g5i4l5NSZC8"]} -{"Format": "IDEA0", "ID": "ca17e7aa-e10c-4fa7-8818-1b40a3955f1a", "DetectTime": "2023-10-30T14:00:19.288941+02:00", "EventTime": "2023-10-30T14:00:19.288955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9155], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. ", "ContentType": "text/plain"}], "uids": ["CiY8HR1Br0LN7RwZHk"]} -{"Format": "IDEA0", "ID": "2a86078a-30e2-453b-a2a7-829d27ab1e48", "DetectTime": "2023-10-30T14:00:19.329226+02:00", "EventTime": "2023-10-30T14:00:19.329254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["C2Pf6i4oQEzY4j4ZP7"]} -{"Format": "IDEA0", "ID": "bcc9d495-4a21-45ad-ac53-c2a4e6fc4a89", "DetectTime": "2023-10-30T14:00:19.371000+02:00", "EventTime": "2023-10-30T14:00:19.371073+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CeVO2I2nDLdJOSlcmf"]} -{"Format": "IDEA0", "ID": "4c9fb2b3-ec29-48db-add1-1cec7e192eac", "DetectTime": "2023-10-30T14:00:19.385392+02:00", "EventTime": "2023-10-30T14:00:19.385413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CxFGwG3zlyHET1IZx7"]} -{"Format": "IDEA0", "ID": "d7e7417b-7066-4761-87ff-1e1457d8e2f6", "DetectTime": "2023-10-30T14:00:19.423396+02:00", "EventTime": "2023-10-30T14:00:19.423423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CO1ok54TjtcCXkyQgg"]} -{"Format": "IDEA0", "ID": "122beb02-6341-4ed1-bce7-c5a86f6fdbb1", "DetectTime": "2023-10-30T14:00:19.463746+02:00", "EventTime": "2023-10-30T14:00:19.463764+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cwsenr4y5tRmTXMLdg"]} -{"Format": "IDEA0", "ID": "a51ffe48-bf19-4284-8a87-ca747bd2de07", "DetectTime": "2023-10-30T14:00:19.478684+02:00", "EventTime": "2023-10-30T14:00:19.478704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["CkVeeN1tnfbC7l4UTf"]} -{"Format": "Json", "ID": "a51ffe48-bf19-4284-8a87-ca747bd2de07", "DetectTime": "2023-10-30T14:00:19.478684+02:00", "EventTime": "2023-10-30T14:00:19.478704+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T08:56:01.051523+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2023/10/30 14:00:19.553485)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "06fa1d0a-71f2-40f4-a0b7-311c7207b084", "DetectTime": "2023-10-30T14:00:19.560998+02:00", "EventTime": "2023-10-30T14:00:19.561019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CPROaR2VnOImJ7lwL1"]} -{"Format": "IDEA0", "ID": "ed78b7c6-8aaf-42ec-86ab-529d267f9e6c", "DetectTime": "2023-10-30T14:00:19.608440+02:00", "EventTime": "2023-10-30T14:00:19.608458+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CU8GOC3B9aw87uqIfj"]} -{"Format": "IDEA0", "ID": "261975c7-d244-4862-b1bb-d2c206be83a2", "DetectTime": "2023-10-30T14:00:19.622599+02:00", "EventTime": "2023-10-30T14:00:19.622623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CRDrHt3QlsPoYrYND"]} -{"Format": "IDEA0", "ID": "e7d6aead-167e-4ebc-a157-5f85afe39040", "DetectTime": "2023-10-30T14:00:19.662683+02:00", "EventTime": "2023-10-30T14:00:19.662709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CYPVNY2FjhnHQidoRh"]} -{"Format": "IDEA0", "ID": "49f95786-fd36-4a24-a990-a4a32ec0b083", "DetectTime": "2023-10-30T14:00:19.706907+02:00", "EventTime": "2023-10-30T14:00:19.706928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CGahwr3m9Ff1YKlpe"]} -{"Format": "IDEA0", "ID": "3ef5564d-08d3-4b57-bfea-e1378fb88980", "DetectTime": "2023-10-30T14:00:19.744833+02:00", "EventTime": "2023-10-30T14:00:19.744846+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ck9ZmVnFThdLi1Ic"]} -{"Format": "IDEA0", "ID": "42edcebc-7568-48c2-8a3f-28d8faddc3fd", "DetectTime": "2023-10-30T14:00:19.762750+02:00", "EventTime": "2023-10-30T14:00:19.762773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["Cq7Uii3qRV3boNfaXi"]} -{"Format": "IDEA0", "ID": "164d0f32-e190-4766-9e11-d036412a0738", "DetectTime": "2023-10-30T14:00:19.791931+02:00", "EventTime": "2023-10-30T14:00:19.791948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C41Dz8uZLkgsmjTZd"]} -{"Format": "IDEA0", "ID": "6a3bc642-6202-4173-b348-675e12487116", "DetectTime": "2023-10-30T14:00:19.824427+02:00", "EventTime": "2023-10-30T14:00:19.824446+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxmVcoLwBWwxXnJ39"]} -{"Format": "IDEA0", "ID": "2418c43d-d877-4062-a9c3-4531f23fd161", "DetectTime": "2023-10-30T14:00:19.842507+02:00", "EventTime": "2023-10-30T14:00:19.842520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CMdqtTXunBbIcydN5", "Cwsenr4y5tRmTXMLdg", "CEQaiy27japPz4qVRl", "Ck9ZmVnFThdLi1Ic"]} -{"Format": "IDEA0", "ID": "6d8dd438-f031-47dd-b1aa-aa52c04811f5", "DetectTime": "2023-10-30T14:00:19.859607+02:00", "EventTime": "2023-10-30T14:00:19.859632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cbr2LC2AaORjIYTtQa"]} -{"Format": "IDEA0", "ID": "302172a5-765f-4534-9e37-a1cd2dcd8988", "DetectTime": "2023-10-30T14:00:19.896871+02:00", "EventTime": "2023-10-30T14:00:19.896897+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEQaiy27japPz4qVRl"]} -{"Format": "IDEA0", "ID": "bfa53d07-90a4-42ed-b860-a6a5a891e4d2", "DetectTime": "2023-10-30T14:00:19.916138+02:00", "EventTime": "2023-10-30T14:00:19.916156+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyFMqZ33RTzbtVthf5"]} -{"Format": "IDEA0", "ID": "fd90dba8-7f2e-4b51-98a1-ee2f0d5da925", "DetectTime": "2023-10-30T14:00:19.938103+02:00", "EventTime": "2023-10-30T14:00:19.938129+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CK2Utx0TLVersSJk8"]} -{"Format": "IDEA0", "ID": "0d7d0248-96cd-4251-99d2-00615ce26a0d", "DetectTime": "2023-10-30T14:00:19.955319+02:00", "EventTime": "2023-10-30T14:00:19.955343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CSjfCXgul1R8tmiUf"]} -{"Format": "IDEA0", "ID": "32cca8ae-4cf5-451e-801a-fe333726f672", "DetectTime": "2023-10-30T14:00:19.997423+02:00", "EventTime": "2023-10-30T14:00:19.997438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CmjWjD324BrS0f0XS8"]} -{"Format": "IDEA0", "ID": "3adc2a51-036b-4059-9ef3-91aa68e21b36", "DetectTime": "2023-10-30T14:00:20.033810+02:00", "EventTime": "2023-10-30T14:00:20.033824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CKlqwu8wQsAkr77Eg"]} -{"Format": "IDEA0", "ID": "688ffa66-019e-43dc-9094-e970aab62624", "DetectTime": "2023-10-30T14:00:20.074267+02:00", "EventTime": "2023-10-30T14:00:20.074290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CvtlBC1fhqXriG9nLd"]} -{"Format": "IDEA0", "ID": "ff4abd91-e82f-4ce1-a68d-71918c9ed3e1", "DetectTime": "2023-10-30T14:00:20.117948+02:00", "EventTime": "2023-10-30T14:00:20.117968+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBhNgT2PrSu8ZDl3Pj"]} -{"Format": "IDEA0", "ID": "9acc2fcf-1cb6-4994-8bc9-1974579c01bc", "DetectTime": "2023-10-30T14:00:20.135943+02:00", "EventTime": "2023-10-30T14:00:20.135964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CzAXyw1G9dSpTT6n3g"]} -{"Format": "IDEA0", "ID": "ef8991da-e9cc-4bd9-b515-608cfbe716c0", "DetectTime": "2023-10-30T14:00:20.174909+02:00", "EventTime": "2023-10-30T14:00:20.174935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Cd5sUR2TzKPVkDE4o1"]} -{"Format": "Json", "ID": "ef8991da-e9cc-4bd9-b515-608cfbe716c0", "DetectTime": "2023-10-30T14:00:20.174909+02:00", "EventTime": "2023-10-30T14:00:20.174935+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T09:28:15.879485+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2023/10/30 14:00:20.272547)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cdb36422-8426-4b3c-86e4-bf06a266c363", "DetectTime": "2023-10-30T14:00:20.277137+02:00", "EventTime": "2023-10-30T14:00:20.277149+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiyYDCrv2zgfHdWHe"]} -{"Format": "IDEA0", "ID": "6d50c8ad-c0d8-455f-a913-66067e971ff5", "DetectTime": "2023-10-30T14:00:20.300482+02:00", "EventTime": "2023-10-30T14:00:20.300502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["ChpsRU3r3TuccJdmch"]} -{"Format": "IDEA0", "ID": "71cab82c-58ad-485e-98e5-a82b448b91ef", "DetectTime": "2023-10-30T14:00:20.337013+02:00", "EventTime": "2023-10-30T14:00:20.337037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18052], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CzBofn1SlaQ3zoMmEl"]} -{"Format": "IDEA0", "ID": "b2fde61c-2f61-40a7-ad96-74b9196ff929", "DetectTime": "2023-10-30T14:00:20.375526+02:00", "EventTime": "2023-10-30T14:00:20.375548+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CK96R6Emv9M0fHJm9"]} -{"Format": "IDEA0", "ID": "a386849c-694b-4142-9df5-1c0045642d1a", "DetectTime": "2023-10-30T14:00:20.397908+02:00", "EventTime": "2023-10-30T14:00:20.397934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CbqpsJJcGQrAyfz5"]} -{"Format": "IDEA0", "ID": "930817e2-2bcb-4871-9b64-2fcf08b1a686", "DetectTime": "2023-10-30T14:00:20.436414+02:00", "EventTime": "2023-10-30T14:00:20.436434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23509], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. ", "ContentType": "text/plain"}], "uids": ["CHBLgq1WHYqE7TVK1j"]} -{"Format": "IDEA0", "ID": "d766bd93-d97d-4089-8bd4-b03821ce1d17", "DetectTime": "2023-10-30T14:00:20.469267+02:00", "EventTime": "2023-10-30T14:00:20.469295+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyZudB2x2nr5davkZ3"]} -{"Format": "IDEA0", "ID": "dc4f5e94-45ed-469b-b4fb-47052e6319af", "DetectTime": "2023-10-30T14:00:20.485512+02:00", "EventTime": "2023-10-30T14:00:20.485531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["C08EvkH2sdhZuYOd"]} -{"Format": "IDEA0", "ID": "c46fb005-28b9-4d6a-9c66-b860b37955b7", "DetectTime": "2023-10-30T14:00:20.526425+02:00", "EventTime": "2023-10-30T14:00:20.526445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CZKAzg4Q0irJ6Aj054"]} -{"Format": "IDEA0", "ID": "2f3f69ad-2af4-4122-8a23-f9a4c2fc06d6", "DetectTime": "2023-10-30T14:00:20.567840+02:00", "EventTime": "2023-10-30T14:00:20.567869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CQkTB01ng2FjNSqFY6"]} -{"Format": "IDEA0", "ID": "bc1cf8b7-ae71-484c-adbd-87cc62d4619c", "DetectTime": "2023-10-30T14:00:20.611933+02:00", "EventTime": "2023-10-30T14:00:20.611952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CLBk24De1T9krbWY1"]} -{"Format": "Json", "ID": "bc1cf8b7-ae71-484c-adbd-87cc62d4619c", "DetectTime": "2023-10-30T14:00:20.611933+02:00", "EventTime": "2023-10-30T14:00:20.611952+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T09:28:18.142382+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2023/10/30 14:00:20.674450)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0c93f0f8-6e36-4619-8960-b7f90085f081", "DetectTime": "2023-10-30T14:00:20.679714+02:00", "EventTime": "2023-10-30T14:00:20.679739+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ca5vbR2b9qccX5KQ0c"]} -{"Format": "IDEA0", "ID": "eb637937-0821-44fd-b903-9b3207e74399", "DetectTime": "2023-10-30T14:00:20.701076+02:00", "EventTime": "2023-10-30T14:00:20.701100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CLUN1l2e1gKR4AOub8"]} -{"Format": "IDEA0", "ID": "937cfecf-baa9-4ee9-81f7-4fa1baf9c3fd", "DetectTime": "2023-10-30T14:00:20.738032+02:00", "EventTime": "2023-10-30T14:00:20.738052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CXlQTO2FCQ87smI95h"]} -{"Format": "IDEA0", "ID": "7f9d9ae6-c8a1-4a5d-806b-ccc045032076", "DetectTime": "2023-10-30T14:00:20.767790+02:00", "EventTime": "2023-10-30T14:00:20.767810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C1VICo4JApUC1tszyk"]} -{"Format": "IDEA0", "ID": "7631624b-bb7a-4367-b730-9bbdd46e7217", "DetectTime": "2023-10-30T14:00:20.800898+02:00", "EventTime": "2023-10-30T14:00:20.801327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CTE7kU1DyPRYDw5Rpg"]} -{"Format": "IDEA0", "ID": "db834ee6-04fe-4882-84e7-a987572b6b4b", "DetectTime": "2023-10-30T14:00:20.833684+02:00", "EventTime": "2023-10-30T14:00:20.833701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyZudB2x2nr5davkZ3", "CiyYDCrv2zgfHdWHe", "CK2Utx0TLVersSJk8", "CgXxKX3GSeL3jaf6w8"]} -{"Format": "IDEA0", "ID": "5c168ca4-278a-4cbf-bb3b-df943a92d973", "DetectTime": "2023-10-30T14:00:20.854827+02:00", "EventTime": "2023-10-30T14:00:20.854848+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CgXxKX3GSeL3jaf6w8"]} -{"Format": "IDEA0", "ID": "8017215c-287e-4bd5-8350-86d3cdf7c431", "DetectTime": "2023-10-30T14:00:20.871777+02:00", "EventTime": "2023-10-30T14:00:20.871857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cdermt2Amu0TPLFf27"]} -{"Format": "IDEA0", "ID": "982f9c5d-cfcb-4205-bee0-ab4641536b10", "DetectTime": "2023-10-30T14:00:20.905739+02:00", "EventTime": "2023-10-30T14:00:20.905759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. ", "ContentType": "text/plain"}], "uids": ["CA3qAp2PHeVDN3TKt"]} -{"Format": "IDEA0", "ID": "8485b927-8f50-41d5-a461-0c0ca67ba519", "DetectTime": "2023-10-30T14:00:20.942062+02:00", "EventTime": "2023-10-30T14:00:20.942087+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxI1gs2tLN7uxq9Wuf"]} -{"Format": "IDEA0", "ID": "cfaebee2-077b-4cf4-a2ab-15ac3225f9c0", "DetectTime": "2023-10-30T14:00:20.960096+02:00", "EventTime": "2023-10-30T14:00:20.960120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["Chmc0jFakg1Ot91v9"]} -{"Format": "IDEA0", "ID": "ed7132e4-b9a3-4507-a548-6143dd23cad1", "DetectTime": "2023-10-30T14:00:20.994551+02:00", "EventTime": "2023-10-30T14:00:20.994570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CNILJwJq6DO1YfT94"]} -{"Format": "Json", "ID": "ed7132e4-b9a3-4507-a548-6143dd23cad1", "DetectTime": "2023-10-30T14:00:20.994551+02:00", "EventTime": "2023-10-30T14:00:20.994570+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T09:28:53.769569+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2023/10/30 14:00:21.058024)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "94203687-6a44-44fc-a382-cc6bfe259cc1", "DetectTime": "2023-10-30T14:00:21.064095+02:00", "EventTime": "2023-10-30T14:00:21.064112+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9pduV2yTqDOSuQFEc"]} -{"Format": "IDEA0", "ID": "d777c6b8-c404-496d-9a54-66fe0e4995d2", "DetectTime": "2023-10-30T14:00:21.089926+02:00", "EventTime": "2023-10-30T14:00:21.089949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CATpvo1SFQ5A4jbF1k"]} -{"Format": "IDEA0", "ID": "5978e777-e217-47d0-9217-f7520a61bea5", "DetectTime": "2023-10-30T14:00:21.122716+02:00", "EventTime": "2023-10-30T14:00:21.122728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CYY5X52w55QCtsSUtc"]} -{"Format": "IDEA0", "ID": "ceead901-f214-4b81-a564-0634f3b15e0c", "DetectTime": "2023-10-30T14:00:21.155162+02:00", "EventTime": "2023-10-30T14:00:21.155183+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChlPnd3xvgJiMsKQH3"]} -{"Format": "IDEA0", "ID": "65f6c024-bcef-4625-a93c-bd66455f7358", "DetectTime": "2023-10-30T14:00:21.174137+02:00", "EventTime": "2023-10-30T14:00:21.174163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C79uFk38QDcjO0hSN5"]} -{"Format": "IDEA0", "ID": "58251a06-97a1-4a1a-be4e-fadb7d43465a", "DetectTime": "2023-10-30T14:00:21.201196+02:00", "EventTime": "2023-10-30T14:00:21.201210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CrqDKqh4cJw7UfRQ6"]} -{"Format": "IDEA0", "ID": "b9576eb1-03e9-426f-83a4-3559e83813a6", "DetectTime": "2023-10-30T14:00:21.231430+02:00", "EventTime": "2023-10-30T14:00:21.231450+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjRnXE40VjGW3lAjwa"]} -{"Format": "IDEA0", "ID": "d3b27b87-7904-400f-aa4a-35dac66f070d", "DetectTime": "2023-10-30T14:00:21.249504+02:00", "EventTime": "2023-10-30T14:00:21.249532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C47UWM1G1tEYVEuS1h"]} -{"Format": "IDEA0", "ID": "05ebfecb-8460-4a96-b131-0e45bf453b7a", "DetectTime": "2023-10-30T14:00:21.276936+02:00", "EventTime": "2023-10-30T14:00:21.276952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20786/UDP destination IP 94.64.205.60. ", "ContentType": "text/plain"}], "uids": ["C6hFQc3vHfV4VAIike"]} -{"Format": "IDEA0", "ID": "eb0c7ed8-f2cc-4081-9331-08435793a5ae", "DetectTime": "2023-10-30T14:00:21.312755+02:00", "EventTime": "2023-10-30T14:00:21.312774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CL3tpQ1cKE2kaUXok6"]} -{"Format": "IDEA0", "ID": "f1157c60-1012-4dc0-ac93-c792784c422e", "DetectTime": "2023-10-30T14:00:21.349095+02:00", "EventTime": "2023-10-30T14:00:21.349121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["CKF3CR3wSK0NHPW1Xa"]} -{"Format": "Json", "ID": "f1157c60-1012-4dc0-ac93-c792784c422e", "DetectTime": "2023-10-30T14:00:21.349095+02:00", "EventTime": "2023-10-30T14:00:21.349121+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T09:28:54.817181+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2023/10/30 14:00:21.414355)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "55fc79f9-fd30-46c8-baf9-fd009958aa69", "DetectTime": "2023-10-30T14:00:21.420732+02:00", "EventTime": "2023-10-30T14:00:21.420759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuLv9n2ddvYYBRJqQ3"]} -{"Format": "IDEA0", "ID": "55c64948-80c3-40e0-887e-1e7ca6efe5b9", "DetectTime": "2023-10-30T14:00:21.446196+02:00", "EventTime": "2023-10-30T14:00:21.446213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C9Uxh813z5gzHkeMhg"]} -{"Format": "IDEA0", "ID": "db37e99d-df7b-43c4-822c-2efd75bcddae", "DetectTime": "2023-10-30T14:00:21.475298+02:00", "EventTime": "2023-10-30T14:00:21.475316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CgVbbN3WOkfmKswxLg"]} -{"Format": "IDEA0", "ID": "142bc19c-2e07-434f-9043-1cc0e6142d59", "DetectTime": "2023-10-30T14:00:21.505564+02:00", "EventTime": "2023-10-30T14:00:21.505584+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcLS6c1VnrRDWkW3P1"]} -{"Format": "IDEA0", "ID": "a83ede7e-79e2-4413-aa2b-5bd790f1d02a", "DetectTime": "2023-10-30T14:00:21.523865+02:00", "EventTime": "2023-10-30T14:00:21.523890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["C9jVQB3Fyx6MkzlCn3"]} -{"Format": "IDEA0", "ID": "a7fc6dfe-9c03-4d8c-a6dc-b96522bb6f2f", "DetectTime": "2023-10-30T14:00:21.550746+02:00", "EventTime": "2023-10-30T14:00:21.550831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7743], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. ", "ContentType": "text/plain"}], "uids": ["CNk6FB4JiPRvleBV2"]} -{"Format": "IDEA0", "ID": "687436ce-fcba-4d7c-80da-17041d8dd245", "DetectTime": "2023-10-30T14:00:21.579185+02:00", "EventTime": "2023-10-30T14:00:21.579203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9155], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. ", "ContentType": "text/plain"}], "uids": ["CMysEs3VSQUYd14Jp6"]} -{"Format": "IDEA0", "ID": "7773f94a-8d08-4d47-bef7-13687d35bd91", "DetectTime": "2023-10-30T14:00:21.608696+02:00", "EventTime": "2023-10-30T14:00:21.608725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["CojTGI1CvMFedSqFv4"]} -{"Format": "IDEA0", "ID": "871cf7ea-f168-49b9-bb2d-d0e97d06755d", "DetectTime": "2023-10-30T14:00:21.634329+02:00", "EventTime": "2023-10-30T14:00:21.634349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["ChZKqA1thJRZL5cjhb"]} -{"Format": "IDEA0", "ID": "561eec3c-21e7-4372-9bf2-9ec6af117b18", "DetectTime": "2023-10-30T14:00:21.662590+02:00", "EventTime": "2023-10-30T14:00:21.662616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["CgrYiZ3xhDbZK3IA9g"]} -{"Format": "Json", "ID": "561eec3c-21e7-4372-9bf2-9ec6af117b18", "DetectTime": "2023-10-30T14:00:21.662590+02:00", "EventTime": "2023-10-30T14:00:21.662616+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T09:29:43.717800+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2023/10/30 14:00:21.721331)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e21040e-4213-4559-9219-e3471e6c8de2", "DetectTime": "2023-10-30T14:00:21.727079+02:00", "EventTime": "2023-10-30T14:00:21.727100+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIZ6HIDaqALwNOkS2"]} -{"Format": "IDEA0", "ID": "99dd1907-20d9-4567-9f84-503d3c0a8375", "DetectTime": "2023-10-30T14:00:21.748512+02:00", "EventTime": "2023-10-30T14:00:21.748538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CAbJ3u68GP5gHhida"]} -{"Format": "IDEA0", "ID": "6c98dd61-cea3-40f8-82b6-8a75279b40be", "DetectTime": "2023-10-30T14:00:21.773613+02:00", "EventTime": "2023-10-30T14:00:21.773673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CG2iBM3V5NZtKE8Kee"]} -{"Format": "IDEA0", "ID": "2c8163c2-0a43-447c-8d64-533b31a2e054", "DetectTime": "2023-10-30T14:00:21.798621+02:00", "EventTime": "2023-10-30T14:00:21.798643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CnRtY73GG4dM0zpAef"]} -{"Format": "IDEA0", "ID": "bab3639c-39ac-4958-b316-2e316ae178cb", "DetectTime": "2023-10-30T14:00:21.823617+02:00", "EventTime": "2023-10-30T14:00:21.823644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9pduV2yTqDOSuQFEc", "CcLS6c1VnrRDWkW3P1", "CjRnXE40VjGW3lAjwa", "CtaQZl23nmVzAcE8zf"]} -{"Format": "IDEA0", "ID": "57ca3764-fdd2-4a89-b019-5cb2608e76f7", "DetectTime": "2023-10-30T14:00:21.839905+02:00", "EventTime": "2023-10-30T14:00:21.839923+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtaQZl23nmVzAcE8zf"]} -{"Format": "IDEA0", "ID": "f85b22da-dd4e-4592-8cfa-433e37b65e7a", "DetectTime": "2023-10-30T14:00:21.860806+02:00", "EventTime": "2023-10-30T14:00:21.860832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C0hgURE5lEfU7M8wg"]} -{"Format": "IDEA0", "ID": "913e7f6b-ed7b-4a46-84a9-7db828877bb5", "DetectTime": "2023-10-30T14:00:21.885946+02:00", "EventTime": "2023-10-30T14:00:21.885964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CDRwKQ379AJCgMH2H2"]} -{"Format": "IDEA0", "ID": "79fc97d7-3d30-4e88-aca7-3d28833e8313", "DetectTime": "2023-10-30T14:00:21.910685+02:00", "EventTime": "2023-10-30T14:00:21.910711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CQ3Rdl3VXVlS8CSyyc"]} -{"Format": "IDEA0", "ID": "071d85d8-c919-4844-a7ad-2faae2bda455", "DetectTime": "2023-10-30T14:00:21.933495+02:00", "EventTime": "2023-10-30T14:00:21.933515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C19Qp93ycOMh9Dxb5i"]} -{"Format": "IDEA0", "ID": "351f63c0-1a3f-46a7-bbea-536b3b8e8fdb", "DetectTime": "2023-10-30T14:00:21.960957+02:00", "EventTime": "2023-10-30T14:00:21.960978+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cnnf983kk9mDh7JjJc"]} -{"Format": "IDEA0", "ID": "a8067a5f-011d-4aff-8620-3f7eac941c0c", "DetectTime": "2023-10-30T14:00:21.984437+02:00", "EventTime": "2023-10-30T14:00:21.984454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. ", "ContentType": "text/plain"}], "uids": ["CQ5PsIi5WhqJ7e56f"]} -{"Format": "IDEA0", "ID": "c17fa4ba-5531-4317-9065-b274c5ecdad6", "DetectTime": "2023-10-30T14:00:22.015851+02:00", "EventTime": "2023-10-30T14:00:22.015867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. ", "ContentType": "text/plain"}], "uids": ["CvWrlF4WczwpkBaDh"]} -{"Format": "IDEA0", "ID": "ea449a33-f5c0-4bfa-bef4-a12b333d8c71", "DetectTime": "2023-10-30T14:00:22.043276+02:00", "EventTime": "2023-10-30T14:00:22.043303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ck5C1e1yd7IbhTKXOf"]} -{"Format": "IDEA0", "ID": "752e087f-bf54-4a62-bf0a-6a64e944b4b1", "DetectTime": "2023-10-30T14:00:22.074142+02:00", "EventTime": "2023-10-30T14:00:22.074161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CVlnMq1JzIUngAwSTb"]} -{"Format": "IDEA0", "ID": "e0beb741-e659-471d-9474-845b79c9ed9f", "DetectTime": "2023-10-30T14:00:22.101819+02:00", "EventTime": "2023-10-30T14:00:22.101846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CpcTqG1FbGwGDxvmZ8"]} -{"Format": "IDEA0", "ID": "22187d06-60b5-4b46-9b30-469f1d9d59a2", "DetectTime": "2023-10-30T14:00:22.133303+02:00", "EventTime": "2023-10-30T14:00:22.133328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CEMjQGfOPuYNCCik7"]} -{"Format": "IDEA0", "ID": "72cd8cef-96da-4f62-a5f4-8b8b1235bcee", "DetectTime": "2023-10-30T14:00:22.165013+02:00", "EventTime": "2023-10-30T14:00:22.165032+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ca6fKg4HXDvSIPogPk"]} -{"Format": "IDEA0", "ID": "1e56bc21-3fd6-493e-af5f-65bee32d27af", "DetectTime": "2023-10-30T14:00:22.182000+02:00", "EventTime": "2023-10-30T14:00:22.182018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CPIbEP8tFHVolClO9"]} -{"Format": "Json", "ID": "1e56bc21-3fd6-493e-af5f-65bee32d27af", "DetectTime": "2023-10-30T14:00:22.182000+02:00", "EventTime": "2023-10-30T14:00:22.182018+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:01:24.809441+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:22.259652)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1cf89986-893f-4cf9-bc47-517adc54e598", "DetectTime": "2023-10-30T14:00:22.265262+02:00", "EventTime": "2023-10-30T14:00:22.265281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CRcWKB1JSSQ4Hnchr5"]} -{"Format": "IDEA0", "ID": "a2297fe3-224f-4659-addb-067a9d45daf3", "DetectTime": "2023-10-30T14:00:22.293076+02:00", "EventTime": "2023-10-30T14:00:22.293098+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1zMCkqlxKu0u11Pg"]} -{"Format": "IDEA0", "ID": "d58216d6-4560-46b4-8a50-0516fc15ad6e", "DetectTime": "2023-10-30T14:00:22.311143+02:00", "EventTime": "2023-10-30T14:00:22.311169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CUymNk26o4PmnJFhXb"]} -{"Format": "IDEA0", "ID": "7594fe3e-56e2-4074-9b52-805db2d1fedd", "DetectTime": "2023-10-30T14:00:22.333943+02:00", "EventTime": "2023-10-30T14:00:22.333961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18052], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CpbtkB4irrwrUq6MOg"]} -{"Format": "IDEA0", "ID": "d46398ab-6ab8-4bfe-969d-2b9051d3002b", "DetectTime": "2023-10-30T14:00:22.360718+02:00", "EventTime": "2023-10-30T14:00:22.360743+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CgNmx03cS1e7VtPxba"]} -{"Format": "IDEA0", "ID": "f4b5111e-15ae-4683-a444-9d1ed8fb9c1f", "DetectTime": "2023-10-30T14:00:22.381739+02:00", "EventTime": "2023-10-30T14:00:22.381759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CLIn3l4SrkziwALr9g"]} -{"Format": "IDEA0", "ID": "2d6f1ba7-4eec-40f6-9a20-03765fc9f714", "DetectTime": "2023-10-30T14:00:22.412595+02:00", "EventTime": "2023-10-30T14:00:22.412622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23509], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. ", "ContentType": "text/plain"}], "uids": ["CKSK61KEcyaVEY3x2"]} -{"Format": "IDEA0", "ID": "d600a121-6d17-4bc7-8e5f-7b1848df4fb4", "DetectTime": "2023-10-30T14:00:22.442213+02:00", "EventTime": "2023-10-30T14:00:22.442237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CZt3fl76Ua0TT1M5"]} -{"Format": "IDEA0", "ID": "84b62a20-86c2-4276-a839-4792bcaa3972", "DetectTime": "2023-10-30T14:00:22.469567+02:00", "EventTime": "2023-10-30T14:00:22.469596+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7z8me3MBI0l9fVgui"]} -{"Format": "IDEA0", "ID": "49cc23be-21b3-430c-aec6-db665f9537c3", "DetectTime": "2023-10-30T14:00:22.491442+02:00", "EventTime": "2023-10-30T14:00:22.491467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CEmtCq34NbgZ6nXEef"]} -{"Format": "IDEA0", "ID": "2221de30-38cb-4783-9b1d-5274f196bd6a", "DetectTime": "2023-10-30T14:00:22.518074+02:00", "EventTime": "2023-10-30T14:00:22.518207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["Ch4ktb39Jt8hhfwpGb"]} -{"Format": "IDEA0", "ID": "e75324bb-8cc6-46d4-b6dc-d9292050ef9a", "DetectTime": "2023-10-30T14:00:22.542305+02:00", "EventTime": "2023-10-30T14:00:22.542332+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CY68aC1i4wIoFtpbK4"]} -{"Format": "IDEA0", "ID": "606647b9-4616-4390-9e62-188d8c7fc305", "DetectTime": "2023-10-30T14:00:22.560025+02:00", "EventTime": "2023-10-30T14:00:22.560038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CXfulE9M0qWneE6Rl"]} -{"Format": "Json", "ID": "606647b9-4616-4390-9e62-188d8c7fc305", "DetectTime": "2023-10-30T14:00:22.560025+02:00", "EventTime": "2023-10-30T14:00:22.560038+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:01:30.605969+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:22.621360)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d17fff55-30a7-4ba3-b23f-e79129b4c732", "DetectTime": "2023-10-30T14:00:22.628019+02:00", "EventTime": "2023-10-30T14:00:22.628040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CFPUamCpeeXMGyVe7"]} -{"Format": "IDEA0", "ID": "3f329df1-c97a-4c70-bee2-683e3c3fa465", "DetectTime": "2023-10-30T14:00:22.653548+02:00", "EventTime": "2023-10-30T14:00:22.653570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CjKFi24LK1KYc7Cz2b"]} -{"Format": "IDEA0", "ID": "0c127720-2547-4def-bdea-0ede0d879b66", "DetectTime": "2023-10-30T14:00:22.677852+02:00", "EventTime": "2023-10-30T14:00:22.677870+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8848s2v7cQry3LSWh"]} -{"Format": "IDEA0", "ID": "b0e5b01b-d15f-48f9-85f9-abcc38cd587e", "DetectTime": "2023-10-30T14:00:22.697254+02:00", "EventTime": "2023-10-30T14:00:22.697278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["ClCfpJ1cTezPhWqld4"]} -{"Format": "IDEA0", "ID": "b2ba408e-ffac-4691-96b5-31f11f470c1e", "DetectTime": "2023-10-30T14:00:22.719979+02:00", "EventTime": "2023-10-30T14:00:22.720047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CY68aC1i4wIoFtpbK4", "Ca6fKg4HXDvSIPogPk", "Cp0Qb83ztiGXIo3MZk", "CgNmx03cS1e7VtPxba"]} -{"Format": "IDEA0", "ID": "b125540f-d84f-46fc-9c55-5aa3eb10efd2", "DetectTime": "2023-10-30T14:00:22.738571+02:00", "EventTime": "2023-10-30T14:00:22.738588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CNtGo71iaQtTmoLCci"]} -{"Format": "IDEA0", "ID": "ef61f3a6-4ee9-43a0-8114-9dc44ffcf79f", "DetectTime": "2023-10-30T14:00:22.762228+02:00", "EventTime": "2023-10-30T14:00:22.762254+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cp0Qb83ztiGXIo3MZk"]} -{"Format": "IDEA0", "ID": "1070191b-020c-4eff-9c2a-ecfa8e5f28e4", "DetectTime": "2023-10-30T14:00:22.780698+02:00", "EventTime": "2023-10-30T14:00:22.780715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CvL3Ne3EiYeqAdQDal"]} -{"Format": "IDEA0", "ID": "52ba1fc3-9d12-43ca-bfb2-043c68cbaa92", "DetectTime": "2023-10-30T14:00:22.804046+02:00", "EventTime": "2023-10-30T14:00:22.804068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAyEro1UthzjKaivj"]} -{"Format": "IDEA0", "ID": "f9a298b8-a732-4bfe-8519-612e0bf8e2ec", "DetectTime": "2023-10-30T14:00:22.822128+02:00", "EventTime": "2023-10-30T14:00:22.822172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeyOAXLZFhJ8dmO65"]} -{"Format": "IDEA0", "ID": "c7e2aa55-784d-4e5d-985c-52d676f86f7c", "DetectTime": "2023-10-30T14:00:22.840544+02:00", "EventTime": "2023-10-30T14:00:22.840557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CQT0CGKzoyNnigFj"]} -{"Format": "IDEA0", "ID": "d07725e3-4b6b-4f51-bff0-e93833fb65da", "DetectTime": "2023-10-30T14:00:22.865086+02:00", "EventTime": "2023-10-30T14:00:22.865108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.199.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.199.8 ", "ContentType": "text/plain"}], "uids": ["CklMDSFjjCiVbJwSl"]} -{"Format": "IDEA0", "ID": "b10ad935-05af-4ff6-8a04-9c81cd64a6c4", "DetectTime": "2023-10-30T14:00:22.893279+02:00", "EventTime": "2023-10-30T14:00:22.893361+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkmCF83RnPDQucOhGk"]} -{"Format": "IDEA0", "ID": "843ab057-42b5-4311-9e02-6f197a234e80", "DetectTime": "2023-10-30T14:00:22.914769+02:00", "EventTime": "2023-10-30T14:00:22.914806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.217.72.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.217.72.166 ", "ContentType": "text/plain"}], "uids": ["CvggjhUKN4mMa7Ta5"]} -{"Format": "IDEA0", "ID": "f28790c9-e9cc-4d2f-8589-23a32e31108d", "DetectTime": "2023-10-30T14:00:22.942207+02:00", "EventTime": "2023-10-30T14:00:22.942225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.117.66.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.117.66.104 ", "ContentType": "text/plain"}], "uids": ["C7zIF34Q2kW98rjDd2"]} -{"Format": "IDEA0", "ID": "99be912c-03c2-4c80-bc51-a9da8c7e70b2", "DetectTime": "2023-10-30T14:00:22.969809+02:00", "EventTime": "2023-10-30T14:00:22.969833+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTFZ1A3tQR189jJr11"]} -{"Format": "IDEA0", "ID": "5dfd58bf-09b8-4882-b744-942a97e6f5b9", "DetectTime": "2023-10-30T14:00:22.988642+02:00", "EventTime": "2023-10-30T14:00:22.988663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.110.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.103.110.113 ", "ContentType": "text/plain"}], "uids": ["Cxwmwo4y51bnXaYPK5"]} -{"Format": "IDEA0", "ID": "0d1e8f3b-35fd-4a65-96cd-a365d815a1da", "DetectTime": "2023-10-30T14:00:23.016974+02:00", "EventTime": "2023-10-30T14:00:23.017020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["198.2.5.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 198.2.5.106 ", "ContentType": "text/plain"}], "uids": ["CUK7AB1WojyJtIoCg"]} -{"Format": "IDEA0", "ID": "497e9250-8288-4ad5-b13d-e1c08e442489", "DetectTime": "2023-10-30T14:00:23.046429+02:00", "EventTime": "2023-10-30T14:00:23.046478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CewXI11Leb8tCBukK2"]} -{"Format": "IDEA0", "ID": "fbfee980-73fb-4a38-bb76-4c07816a8747", "DetectTime": "2023-10-30T14:00:23.072762+02:00", "EventTime": "2023-10-30T14:00:23.072789+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1oDMw1dJ2GDnthljl"]} -{"Format": "IDEA0", "ID": "14afd4c0-8b09-4e1e-ab1f-8d37d4707bff", "DetectTime": "2023-10-30T14:00:23.092926+02:00", "EventTime": "2023-10-30T14:00:23.092948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.156.122.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.156.122.62 ", "ContentType": "text/plain"}], "uids": ["C97okcOIjVZKDxrVf"]} -{"Format": "IDEA0", "ID": "0a8056e2-2f9f-46fa-b9c7-8eb200906dee", "DetectTime": "2023-10-30T14:00:23.120626+02:00", "EventTime": "2023-10-30T14:00:23.120642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.235.76.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.235.76.4 ", "ContentType": "text/plain"}], "uids": ["C8q65638ClLTJOOdi5"]} -{"Format": "IDEA0", "ID": "3d7003c0-523e-4c27-9e0d-57008a5fb4a0", "DetectTime": "2023-10-30T14:00:23.148855+02:00", "EventTime": "2023-10-30T14:00:23.148910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.147.182.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.147.182.182 ", "ContentType": "text/plain"}], "uids": ["CsPS62avqXKmdv7mg"]} -{"Format": "IDEA0", "ID": "08baefd3-2dfe-4b1d-bc9c-1a96d81eb8e8", "DetectTime": "2023-10-30T14:00:23.178071+02:00", "EventTime": "2023-10-30T14:00:23.178094+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeGVrs2KTsOrWVpShb"]} -{"Format": "IDEA0", "ID": "12f95f8c-c230-45c7-8dd0-4d1b235d32c6", "DetectTime": "2023-10-30T14:00:23.196870+02:00", "EventTime": "2023-10-30T14:00:23.196891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.232.5.137 ", "ContentType": "text/plain"}], "uids": ["CqEyu722EVl4dBDR84"]} -{"Format": "IDEA0", "ID": "25fc58e6-69a6-47f8-8a11-0c2e7e3f1532", "DetectTime": "2023-10-30T14:00:23.223086+02:00", "EventTime": "2023-10-30T14:00:23.223112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["166.102.225.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 166.102.225.140 ", "ContentType": "text/plain"}], "uids": ["Ca0wascmF0COPb8x1"]} -{"Format": "IDEA0", "ID": "131b9571-5961-436a-b24c-a2b0857f6232", "DetectTime": "2023-10-30T14:00:23.248652+02:00", "EventTime": "2023-10-30T14:00:23.248668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.248.68.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.248.68.241 ", "ContentType": "text/plain"}], "uids": ["COtoI32gJ4IV8bqJ3e"]} -{"Format": "IDEA0", "ID": "a5a0e213-cef7-45df-a582-a8113a867ae3", "DetectTime": "2023-10-30T14:00:23.273671+02:00", "EventTime": "2023-10-30T14:00:23.273690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CmHEgw2DxNQE7VPhZb"]} -{"Format": "IDEA0", "ID": "ea2dae80-65fa-47fd-b772-f0a6a4d5a00a", "DetectTime": "2023-10-30T14:00:23.298331+02:00", "EventTime": "2023-10-30T14:00:23.298346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.178.233.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.178.233.253 ", "ContentType": "text/plain"}], "uids": ["CXvx8eg7UYVrwEVea"]} -{"Format": "IDEA0", "ID": "cfd2df24-6cd2-46f5-8fb3-39a1557898da", "DetectTime": "2023-10-30T14:00:23.325883+02:00", "EventTime": "2023-10-30T14:00:23.325910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.195.58.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.195.58.96 ", "ContentType": "text/plain"}], "uids": ["Cw7vn41foWbL0hSvkg"]} -{"Format": "IDEA0", "ID": "4cdd3449-f93d-4351-9536-4508580bfef0", "DetectTime": "2023-10-30T14:00:23.352129+02:00", "EventTime": "2023-10-30T14:00:23.352147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.46.210.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.46.210.10 ", "ContentType": "text/plain"}], "uids": ["CDrC8heHHVUTSwepl"]} -{"Format": "IDEA0", "ID": "0ca1b8e9-5787-4c25-9912-3bdb9e973abc", "DetectTime": "2023-10-30T14:00:23.378745+02:00", "EventTime": "2023-10-30T14:00:23.378762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.37.188.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.37.188.110 ", "ContentType": "text/plain"}], "uids": ["C4IQ5K2IvFH0clL9x9"]} -{"Format": "IDEA0", "ID": "ef0c5310-4d5a-4cdc-b001-26a5c3c81521", "DetectTime": "2023-10-30T14:00:23.404071+02:00", "EventTime": "2023-10-30T14:00:23.404096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.113.108.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.113.108.237 ", "ContentType": "text/plain"}], "uids": ["CbUat83WO1c8s8Ns6a"]} -{"Format": "IDEA0", "ID": "e99cc043-b6e5-4692-8e82-3cdf311ef6b4", "DetectTime": "2023-10-30T14:00:23.430734+02:00", "EventTime": "2023-10-30T14:00:23.430751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.43.222.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.43.222.66 ", "ContentType": "text/plain"}], "uids": ["C9aRQN3i41QrjuFCf9"]} -{"Format": "IDEA0", "ID": "e6021ff5-2461-4a1f-b2d6-fa6c0a02b668", "DetectTime": "2023-10-30T14:00:23.460500+02:00", "EventTime": "2023-10-30T14:00:23.460518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.232.9.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.232.9.206 ", "ContentType": "text/plain"}], "uids": ["CQvjS01jY0Vn5a8932"]} -{"Format": "IDEA0", "ID": "59fc1cf0-1389-4c04-b0dc-702dd01e017d", "DetectTime": "2023-10-30T14:00:23.486038+02:00", "EventTime": "2023-10-30T14:00:23.486070+02:00", "Category": ["Malware"], "Confidence": 0.5, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Type": ["Malware"], "Hash": ["md5:3cc2754fb2ecb3e3d68c3cd7214e20db"]}], "Size": 35840, "uids": ["NWUwMDU0ZGIyMzZhYzA4OTQx"]} -{"Format": "IDEA0", "ID": "b6185604-bde8-4743-9ffa-3ae01979b6d5", "DetectTime": "2023-10-30T14:00:23.520446+02:00", "EventTime": "2023-10-30T14:00:23.520463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.138.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.138.33 ", "ContentType": "text/plain"}], "uids": ["CMWzFf4zxEOtn4xrj2"]} -{"Format": "IDEA0", "ID": "b906c03e-eab7-4cca-a9d3-8269663178b8", "DetectTime": "2023-10-30T14:00:23.549130+02:00", "EventTime": "2023-10-30T14:00:23.549156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. ", "ContentType": "text/plain"}], "uids": ["CzTHZm3PELPcu8fuul"]} -{"Format": "IDEA0", "ID": "aa3dea80-d865-40b8-9db9-5f75c1aa3d1b", "DetectTime": "2023-10-30T14:00:23.575276+02:00", "EventTime": "2023-10-30T14:00:23.575292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["Carlp71aQ1o1138YK3"]} -{"Format": "IDEA0", "ID": "4cfdbe56-38e6-49a9-bc08-02191b3488c0", "DetectTime": "2023-10-30T14:00:23.601731+02:00", "EventTime": "2023-10-30T14:00:23.601759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["CCnfGH3uf6dAJQtz6f"]} -{"Format": "IDEA0", "ID": "2d883236-dac7-42d1-a581-59bdc12b76a5", "DetectTime": "2023-10-30T14:00:23.631211+02:00", "EventTime": "2023-10-30T14:00:23.631236+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmicCi1FhdLH3ldg2a"]} -{"Format": "IDEA0", "ID": "d46a7941-0e5d-4d67-93e8-6f04c0bb3a48", "DetectTime": "2023-10-30T14:00:23.649257+02:00", "EventTime": "2023-10-30T14:00:23.649289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.136.52.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.136.52.21 ", "ContentType": "text/plain"}], "uids": ["CCAmyF2gw6yrvDWaTa"]} -{"Format": "IDEA0", "ID": "64d5fd86-2778-479b-8443-a7f8370a348a", "DetectTime": "2023-10-30T14:00:23.675499+02:00", "EventTime": "2023-10-30T14:00:23.675526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.33.151.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.33.151.168 ", "ContentType": "text/plain"}], "uids": ["CSe31D1enS2ycPSdh7"]} -{"Format": "IDEA0", "ID": "2391d057-740c-4bf6-835f-c1a21d375cbf", "DetectTime": "2023-10-30T14:00:23.701151+02:00", "EventTime": "2023-10-30T14:00:23.701171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.104.81.106 ", "ContentType": "text/plain"}], "uids": ["CPJCUV26tdS2HZDHh8"]} -{"Format": "IDEA0", "ID": "5efe02ba-e276-4e3f-b248-5465b5e29cb5", "DetectTime": "2023-10-30T14:00:23.727393+02:00", "EventTime": "2023-10-30T14:00:23.727407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CeyOAXLZFhJ8dmO65", "CTFZ1A3tQR189jJr11", "CNmnUt2n5zUMYVa4b", "CeGVrs2KTsOrWVpShb"]} -{"Format": "IDEA0", "ID": "9d8cc402-7052-45a4-8ab2-dd0be11dca7e", "DetectTime": "2023-10-30T14:00:23.742597+02:00", "EventTime": "2023-10-30T14:00:23.742623+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNmnUt2n5zUMYVa4b"]} -{"Format": "IDEA0", "ID": "42a39da7-30c0-4cf8-abbc-7e3ac8848425", "DetectTime": "2023-10-30T14:00:23.756160+02:00", "EventTime": "2023-10-30T14:00:23.756181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXTUcm3AN8MdME8Zb8"]} -{"Format": "IDEA0", "ID": "9ac080fe-7ffb-497c-bdd3-8f1475510888", "DetectTime": "2023-10-30T14:00:23.771338+02:00", "EventTime": "2023-10-30T14:00:23.771361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.56.118.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.56.118.106 ", "ContentType": "text/plain"}], "uids": ["CxlJjZ3fykmagbPckg"]} -{"Format": "IDEA0", "ID": "93449ba8-1783-4c55-97c1-6c99f3c1b5b3", "DetectTime": "2023-10-30T14:00:23.797252+02:00", "EventTime": "2023-10-30T14:00:23.797275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CXL2E87YpiLq6Zgkg"]} -{"Format": "IDEA0", "ID": "0063d49a-c7c7-4c1a-8b8d-73a02b1577b3", "DetectTime": "2023-10-30T14:00:23.823078+02:00", "EventTime": "2023-10-30T14:00:23.823100+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrqPEF3WdNsOsZkEm6"]} -{"Format": "IDEA0", "ID": "0ea11b0d-1275-4c11-a64b-9a4e4fcb1abd", "DetectTime": "2023-10-30T14:00:23.836496+02:00", "EventTime": "2023-10-30T14:00:23.836524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.80.15.32"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.80.15.32 ", "ContentType": "text/plain"}], "uids": ["C583J74rKj5ol12uic"]} -{"Format": "IDEA0", "ID": "c70f7b42-6887-43f9-b360-6ab5b99d0acc", "DetectTime": "2023-10-30T14:00:23.864628+02:00", "EventTime": "2023-10-30T14:00:23.864647+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkGh5z7nl48KD4Jf9"]} -{"Format": "IDEA0", "ID": "045366aa-a8e4-4c58-a4b1-77cdbd39b4f1", "DetectTime": "2023-10-30T14:00:23.879352+02:00", "EventTime": "2023-10-30T14:00:23.879380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.69.138.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.69.138.127 ", "ContentType": "text/plain"}], "uids": ["CVJQAy1JahGG58HnO5"]} -{"Format": "IDEA0", "ID": "29c3226a-6faf-400c-a32a-849a5dffe5e2", "DetectTime": "2023-10-30T14:00:23.904601+02:00", "EventTime": "2023-10-30T14:00:23.904621+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CF56Zh1DVDdTGynZyh"]} -{"Format": "IDEA0", "ID": "e45d9dbe-9832-4850-a6a0-695804a804be", "DetectTime": "2023-10-30T14:00:23.917444+02:00", "EventTime": "2023-10-30T14:00:23.917487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.92.142.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.92.142.51 ", "ContentType": "text/plain"}], "uids": ["CZnvV31jV9AG4IwUD"]} -{"Format": "IDEA0", "ID": "f25ab3e7-e022-4149-999a-662f20fb58fd", "DetectTime": "2023-10-30T14:00:23.944972+02:00", "EventTime": "2023-10-30T14:00:23.944993+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHe7ks3J3Mk2tPL5va"]} -{"Format": "IDEA0", "ID": "24cb97f2-ccf8-4067-9829-1b550593131d", "DetectTime": "2023-10-30T14:00:23.958422+02:00", "EventTime": "2023-10-30T14:00:23.958440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["CeRuD829BxowFb74v8"]} -{"Format": "IDEA0", "ID": "ca4f88f8-20af-477d-be0a-c12436ae2aa3", "DetectTime": "2023-10-30T14:00:23.989361+02:00", "EventTime": "2023-10-30T14:00:23.989384+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPGYSp4FnHRux0lUk2"]} -{"Format": "IDEA0", "ID": "ab1c504a-19d2-422b-afd0-4c61847fa066", "DetectTime": "2023-10-30T14:00:24.005048+02:00", "EventTime": "2023-10-30T14:00:24.005067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["CsWbs23wW1pyssFzT2"]} -{"Format": "Json", "ID": "ab1c504a-19d2-422b-afd0-4c61847fa066", "DetectTime": "2023-10-30T14:00:24.005048+02:00", "EventTime": "2023-10-30T14:00:24.005067+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:01:32.811133+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:24.058585)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "377dc7a4-9af6-4b17-a754-bdeaf598068f", "DetectTime": "2023-10-30T14:00:24.065339+02:00", "EventTime": "2023-10-30T14:00:24.065366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.97.35.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.97.35.111 ", "ContentType": "text/plain"}], "uids": ["CQJdjajGrfJWD2M6g"]} -{"Format": "IDEA0", "ID": "248c414f-6dd3-4968-aa8d-f35948bef563", "DetectTime": "2023-10-30T14:00:24.098156+02:00", "EventTime": "2023-10-30T14:00:24.098173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["CkA9feUk2B5ZxsxEk"]} -{"Format": "IDEA0", "ID": "ee4d6276-8c46-4323-b1c1-85672338573c", "DetectTime": "2023-10-30T14:00:24.126141+02:00", "EventTime": "2023-10-30T14:00:24.126158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.106.107.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.106.107.14 ", "ContentType": "text/plain"}], "uids": ["CvLizp35voEfFZGzg8"]} -{"Format": "IDEA0", "ID": "60ee30e9-ebfd-42bb-bc59-e4bee096a319", "DetectTime": "2023-10-30T14:00:24.152643+02:00", "EventTime": "2023-10-30T14:00:24.152662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.191.232.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.191.232.162 ", "ContentType": "text/plain"}], "uids": ["CTSxZu14z9Gyi7Z1d6"]} -{"Format": "IDEA0", "ID": "138ff41a-e9d2-460b-b201-f40a3a21162a", "DetectTime": "2023-10-30T14:00:24.178535+02:00", "EventTime": "2023-10-30T14:00:24.178583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.131.39.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.131.39.246 ", "ContentType": "text/plain"}], "uids": ["CTuBcG3gPCI84mUhV3"]} -{"Format": "IDEA0", "ID": "5fd1ce47-d043-415c-bc9b-b2c85922d281", "DetectTime": "2023-10-30T14:00:24.207585+02:00", "EventTime": "2023-10-30T14:00:24.207615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.104.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.104.86 ", "ContentType": "text/plain"}], "uids": ["CzBCfj4f6zpSCLpwck"]} -{"Format": "IDEA0", "ID": "fd7ea873-328d-443e-a825-fa7f3fd991a5", "DetectTime": "2023-10-30T14:00:24.233939+02:00", "EventTime": "2023-10-30T14:00:24.233966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.198.175.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.198.175.145 ", "ContentType": "text/plain"}], "uids": ["CdG9Jv4WvwOsMf5lw2"]} -{"Format": "IDEA0", "ID": "7fb66882-7fe7-4dae-830a-d071ea3ac24c", "DetectTime": "2023-10-30T14:00:24.262972+02:00", "EventTime": "2023-10-30T14:00:24.262991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.154.84.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.154.84.83 ", "ContentType": "text/plain"}], "uids": ["CDgPIi3e01tNRSs6z7"]} -{"Format": "IDEA0", "ID": "9f1bd369-e1c2-411d-86bf-61e1a3b5b33f", "DetectTime": "2023-10-30T14:00:24.288693+02:00", "EventTime": "2023-10-30T14:00:24.288719+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUzSJB4WKgaTj8Wvd1"]} -{"Format": "IDEA0", "ID": "755177c7-1e83-4df9-bf41-74f5adbcf695", "DetectTime": "2023-10-30T14:00:24.304199+02:00", "EventTime": "2023-10-30T14:00:24.304223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.222.140 ", "ContentType": "text/plain"}], "uids": ["CK5sSyn3wVDcYwqek"]} -{"Format": "IDEA0", "ID": "2005634b-de3f-41ee-b8d9-f20f40740bb3", "DetectTime": "2023-10-30T14:00:24.336898+02:00", "EventTime": "2023-10-30T14:00:24.336922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["CAxUkE2b6FwFf4Qkv2"]} -{"Format": "IDEA0", "ID": "ed7ccad9-c2b5-45e0-9417-6f0611c73b50", "DetectTime": "2023-10-30T14:00:24.362663+02:00", "EventTime": "2023-10-30T14:00:24.362680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.42.171.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.42.171.118 ", "ContentType": "text/plain"}], "uids": ["CrOLzJ2Xcil5OJn5d3"]} -{"Format": "IDEA0", "ID": "9975873f-504d-493e-a20a-62a9363eaef9", "DetectTime": "2023-10-30T14:00:24.393425+02:00", "EventTime": "2023-10-30T14:00:24.393451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.142.148.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.142.148.22 ", "ContentType": "text/plain"}], "uids": ["CmiTO82aZh9OayYz09"]} -{"Format": "IDEA0", "ID": "348d3d67-cf07-43ed-8f46-83866c5972d4", "DetectTime": "2023-10-30T14:00:24.425775+02:00", "EventTime": "2023-10-30T14:00:24.425792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.25.211.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.25.211.21 ", "ContentType": "text/plain"}], "uids": ["CFtgq145tM1B1X00Ok"]} -{"Format": "IDEA0", "ID": "a0c5adb6-f128-468c-a750-78cd5fa938d3", "DetectTime": "2023-10-30T14:00:24.456683+02:00", "EventTime": "2023-10-30T14:00:24.456710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.104.67.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.104.67.214 ", "ContentType": "text/plain"}], "uids": ["CuKhkG2EUA88cbfiQ5"]} -{"Format": "IDEA0", "ID": "b338a91c-1384-4258-8943-722d0bffd0b9", "DetectTime": "2023-10-30T14:00:24.483976+02:00", "EventTime": "2023-10-30T14:00:24.483994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.81.12.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.81.12.202 ", "ContentType": "text/plain"}], "uids": ["CXPg0s1t8c7dfCe0z4"]} -{"Format": "IDEA0", "ID": "924969ee-84cb-4f24-8beb-58ff0e52c747", "DetectTime": "2023-10-30T14:00:24.513597+02:00", "EventTime": "2023-10-30T14:00:24.513621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CtmoXa4bjqNUPI7MDk"]} -{"Format": "IDEA0", "ID": "9f235a5d-b68d-465e-9e72-f52fe76af9ee", "DetectTime": "2023-10-30T14:00:24.540481+02:00", "EventTime": "2023-10-30T14:00:24.540541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["Caf25OgntBPIBCP05"]} -{"Format": "IDEA0", "ID": "41b98121-635f-48b5-8eed-7a8a8626eff8", "DetectTime": "2023-10-30T14:00:24.566184+02:00", "EventTime": "2023-10-30T14:00:24.566222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CJ20Cz4H8euv1zreAd"]} -{"Format": "IDEA0", "ID": "07481a73-e0be-4098-907a-11e80a93135d", "DetectTime": "2023-10-30T14:00:24.591847+02:00", "EventTime": "2023-10-30T14:00:24.591863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.8.2.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.8.2.27 ", "ContentType": "text/plain"}], "uids": ["Ck7W334C2Ycbk6eICb"]} -{"Format": "IDEA0", "ID": "c3446403-d45c-4745-8119-090f8f43a5fd", "DetectTime": "2023-10-30T14:00:24.618145+02:00", "EventTime": "2023-10-30T14:00:24.618166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.0.20.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.0.20.96 ", "ContentType": "text/plain"}], "uids": ["CLSGm83nQPlB436Gma"]} -{"Format": "IDEA0", "ID": "3f20f12b-2b52-4ac0-8a01-1559f3cc7ce7", "DetectTime": "2023-10-30T14:00:24.650117+02:00", "EventTime": "2023-10-30T14:00:24.650139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.227.151.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.227.151.150 ", "ContentType": "text/plain"}], "uids": ["CmjcQg160NJYGug5Rh"]} -{"Format": "IDEA0", "ID": "69ab93d3-b6b2-4941-a359-474d2b4ae6f0", "DetectTime": "2023-10-30T14:00:24.676271+02:00", "EventTime": "2023-10-30T14:00:24.676296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.245.135.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.245.135.238 ", "ContentType": "text/plain"}], "uids": ["C3sSD93IC1C94BoWhc"]} -{"Format": "IDEA0", "ID": "7fb7effa-bec3-4e8e-81ed-55f13a472ca0", "DetectTime": "2023-10-30T14:00:24.702905+02:00", "EventTime": "2023-10-30T14:00:24.702932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.233.116.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.233.116.80 ", "ContentType": "text/plain"}], "uids": ["CsFv35wzvDnzYwlrd"]} -{"Format": "IDEA0", "ID": "305c20a3-5c26-466b-888d-980af0a4dfea", "DetectTime": "2023-10-30T14:00:24.733124+02:00", "EventTime": "2023-10-30T14:00:24.733152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CubAI41l4shH8Ik9p3", "CrqPEF3WdNsOsZkEm6", "CF56Zh1DVDdTGynZyh", "CPGYSp4FnHRux0lUk2"]} -{"Format": "IDEA0", "ID": "254a67b9-040d-41cd-b4b2-4c708063824a", "DetectTime": "2023-10-30T14:00:24.748695+02:00", "EventTime": "2023-10-30T14:00:24.748722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.176.133.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.176.133.96 ", "ContentType": "text/plain"}], "uids": ["CWlFhy3BZkQMm6r538"]} -{"Format": "IDEA0", "ID": "e390eb95-5982-45eb-b0e9-ea2b35a4c2c4", "DetectTime": "2023-10-30T14:00:24.779519+02:00", "EventTime": "2023-10-30T14:00:24.779539+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CubAI41l4shH8Ik9p3"]} -{"Format": "IDEA0", "ID": "b45f210f-da63-4d2c-85e7-0d808acaf28e", "DetectTime": "2023-10-30T14:00:24.794412+02:00", "EventTime": "2023-10-30T14:00:24.794515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CmjMw1Vr0vmfjygc1"]} -{"Format": "IDEA0", "ID": "6e701a44-ee98-43ad-b6a3-5122e152c555", "DetectTime": "2023-10-30T14:00:24.829888+02:00", "EventTime": "2023-10-30T14:00:24.829908+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHgvqx4bQE8qEDliD2"]} -{"Format": "IDEA0", "ID": "7ec7b4ae-8862-43dc-8d1f-68837a9c2ca9", "DetectTime": "2023-10-30T14:00:24.848013+02:00", "EventTime": "2023-10-30T14:00:24.848040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.138.187.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.138.187.77 ", "ContentType": "text/plain"}], "uids": ["CCVIoI3uJU1l7WgGhi"]} -{"Format": "IDEA0", "ID": "0a45573f-ff06-461f-939b-2debbbbdb873", "DetectTime": "2023-10-30T14:00:24.879592+02:00", "EventTime": "2023-10-30T14:00:24.879635+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuL1pKkwSWLS5y9Yi"]} -{"Format": "IDEA0", "ID": "e37a0718-25a7-40ac-8993-d9465de48620", "DetectTime": "2023-10-30T14:00:24.897600+02:00", "EventTime": "2023-10-30T14:00:24.897621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.200.130.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.200.130.5 ", "ContentType": "text/plain"}], "uids": ["CBxBeO20YbEGJii7y7"]} -{"Format": "IDEA0", "ID": "632221d1-790c-4736-ad14-943589bb209a", "DetectTime": "2023-10-30T14:00:24.928778+02:00", "EventTime": "2023-10-30T14:00:24.928801+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7UBTPcVMFWw1tJ2j"]} -{"Format": "IDEA0", "ID": "3b2471e9-ba74-41eb-b6af-39986f28a2c8", "DetectTime": "2023-10-30T14:00:24.943429+02:00", "EventTime": "2023-10-30T14:00:24.943459+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cqt6B42D50PogTQwQe"]} -{"Format": "IDEA0", "ID": "7763122b-92b9-4324-92a8-808af5657f53", "DetectTime": "2023-10-30T14:00:24.958532+02:00", "EventTime": "2023-10-30T14:00:24.958559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtMlMP3bWjAT0cNPib"]} -{"Format": "IDEA0", "ID": "9b492f02-d8f8-4ca1-97e5-35b080faa4de", "DetectTime": "2023-10-30T14:00:24.985216+02:00", "EventTime": "2023-10-30T14:00:24.985242+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr0qL84nOIWBRzpkD3"]} -{"Format": "IDEA0", "ID": "5404e0b5-ef2d-4fea-8d17-058e206bb462", "DetectTime": "2023-10-30T14:00:25.001799+02:00", "EventTime": "2023-10-30T14:00:25.001823+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CgIeUY1VDsaI3onS2h"]} -{"Format": "IDEA0", "ID": "a9bfb5db-1e1f-498f-aba8-4e0a54f3564b", "DetectTime": "2023-10-30T14:00:25.016558+02:00", "EventTime": "2023-10-30T14:00:25.016602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["ChDm9S31HhlgHqg3Hj"]} -{"Format": "IDEA0", "ID": "3a4c159f-d6e5-4b89-8d3d-ff7c57ef525f", "DetectTime": "2023-10-30T14:00:25.038281+02:00", "EventTime": "2023-10-30T14:00:25.038316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8UfzJ1XL0F4hX9s89"]} -{"Format": "IDEA0", "ID": "423f7906-a38a-4ebe-ae46-aecb492aeb12", "DetectTime": "2023-10-30T14:00:25.055077+02:00", "EventTime": "2023-10-30T14:00:25.055102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.18.68 ", "ContentType": "text/plain"}], "uids": ["CTao6nX68AcIZkl4g"]} -{"Format": "IDEA0", "ID": "b7fdeab2-6038-4e55-9f91-28ceb5e74aa0", "DetectTime": "2023-10-30T14:00:25.090077+02:00", "EventTime": "2023-10-30T14:00:25.090099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CuL1pKkwSWLS5y9Yi", "CSxd14rMbHkHGJHvh", "Cqt6B42D50PogTQwQe", "CgIeUY1VDsaI3onS2h"]} -{"Format": "IDEA0", "ID": "c5d9c109-8665-4b86-b133-4df5dd03ce4f", "DetectTime": "2023-10-30T14:00:25.105010+02:00", "EventTime": "2023-10-30T14:00:25.105027+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSxd14rMbHkHGJHvh"]} -{"Format": "IDEA0", "ID": "ca2613a4-d74d-4d86-9796-b030035d2b4f", "DetectTime": "2023-10-30T14:00:25.121020+02:00", "EventTime": "2023-10-30T14:00:25.121036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CRm1cw4IeKeMt80ZSj"]} -{"Format": "IDEA0", "ID": "54de853c-ffac-4adf-ae36-d9966bc84dbe", "DetectTime": "2023-10-30T14:00:25.154332+02:00", "EventTime": "2023-10-30T14:00:25.154355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["C2H8ef1gKWrYI3V4Bd"]} -{"Format": "IDEA0", "ID": "148bdcc3-af01-4579-98ff-ee3a3137c9d4", "DetectTime": "2023-10-30T14:00:25.186998+02:00", "EventTime": "2023-10-30T14:00:25.187019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["C9lshB3JrrVyJDjpX1"]} -{"Format": "IDEA0", "ID": "0e101487-4145-42c4-84fc-58631983a50a", "DetectTime": "2023-10-30T14:00:25.217572+02:00", "EventTime": "2023-10-30T14:00:25.217591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["COusw12K9fgtSYnbY6"]} -{"Format": "IDEA0", "ID": "95010033-e3ad-4411-b6d3-30793f50224f", "DetectTime": "2023-10-30T14:00:25.251076+02:00", "EventTime": "2023-10-30T14:00:25.251104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CU92zV17xdxz6Q2Aa8"]} -{"Format": "IDEA0", "ID": "e29e7017-f29e-479b-85ce-b2389ff78c4c", "DetectTime": "2023-10-30T14:00:25.284691+02:00", "EventTime": "2023-10-30T14:00:25.284709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C86dlq4LmzMMl3XqEl"]} -{"Format": "IDEA0", "ID": "95b06ccb-2b02-4095-a853-0239804e1f26", "DetectTime": "2023-10-30T14:00:25.322610+02:00", "EventTime": "2023-10-30T14:00:25.322638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["Czu23D1soYlw9I178"]} -{"Format": "IDEA0", "ID": "c81a289d-8b8b-49a7-a817-3c4dc2e2f8bb", "DetectTime": "2023-10-30T14:00:25.359759+02:00", "EventTime": "2023-10-30T14:00:25.359781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CCtpNm21XEf9RWWG0i"]} -{"Format": "IDEA0", "ID": "b0edf8db-d34b-4c82-a02e-60f061b09a86", "DetectTime": "2023-10-30T14:00:25.395733+02:00", "EventTime": "2023-10-30T14:00:25.395749+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CO7yxW9M6BV0EYcmc"]} -{"Format": "IDEA0", "ID": "9c4255ac-6df5-41b6-b8e2-b3384034338b", "DetectTime": "2023-10-30T14:00:25.412031+02:00", "EventTime": "2023-10-30T14:00:25.412051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["C6AH653SHLi0uCHKmd"]} -{"Format": "IDEA0", "ID": "2b192107-1b39-4704-9612-244bb3621072", "DetectTime": "2023-10-30T14:00:25.443932+02:00", "EventTime": "2023-10-30T14:00:25.443958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CO67MS2ple7uYtcbG6"]} -{"Format": "IDEA0", "ID": "09d9e95d-4717-451f-8289-a86306388ccf", "DetectTime": "2023-10-30T14:00:25.477952+02:00", "EventTime": "2023-10-30T14:00:25.477970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["C1UPM53WIrFknyZXqf"]} -{"Format": "IDEA0", "ID": "a39b5d6b-8f4d-42c4-a582-a169e187715d", "DetectTime": "2023-10-30T14:00:25.512123+02:00", "EventTime": "2023-10-30T14:00:25.512176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CUAuZv4hQpkoSgsKT2"]} -{"Format": "IDEA0", "ID": "f79a068f-e338-4cf0-b120-bfaa0898547d", "DetectTime": "2023-10-30T14:00:25.547945+02:00", "EventTime": "2023-10-30T14:00:25.547972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CEB0bQ0FoBYoWdVkg"]} -{"Format": "IDEA0", "ID": "4334c7e6-81ce-4c2c-811a-784dc35ebd62", "DetectTime": "2023-10-30T14:00:25.586258+02:00", "EventTime": "2023-10-30T14:00:25.586312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CRZxzB2s3bnwfsBbQg"]} -{"Format": "IDEA0", "ID": "2367c537-98d5-4241-988d-49f5f0cfcc89", "DetectTime": "2023-10-30T14:00:25.621218+02:00", "EventTime": "2023-10-30T14:00:25.621233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CPE8eaBX2dztOOAwd"]} -{"Format": "IDEA0", "ID": "9e191b64-615a-47ae-9452-aeddff9a2e6f", "DetectTime": "2023-10-30T14:00:25.655582+02:00", "EventTime": "2023-10-30T14:00:25.655602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CpWo0347smpy6zvfIj"]} -{"Format": "IDEA0", "ID": "1a21fee9-f512-47db-8fdb-162b400a1549", "DetectTime": "2023-10-30T14:00:25.688301+02:00", "EventTime": "2023-10-30T14:00:25.688320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["C6EQKA4A8A9cs0T44i"]} -{"Format": "IDEA0", "ID": "471ea562-ebcd-4226-b6ea-6652adbb68b9", "DetectTime": "2023-10-30T14:00:25.718749+02:00", "EventTime": "2023-10-30T14:00:25.718774+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBE5JSOGdvdreMnn5"]} -{"Format": "IDEA0", "ID": "d52a0240-cbff-48b6-a87e-ad029bf6ec14", "DetectTime": "2023-10-30T14:00:25.734273+02:00", "EventTime": "2023-10-30T14:00:25.734300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CCDYAX2RYYvFotcNXg"]} -{"Format": "IDEA0", "ID": "c5d11b57-aed7-4353-846e-3e4e90730905", "DetectTime": "2023-10-30T14:00:25.767941+02:00", "EventTime": "2023-10-30T14:00:25.767959+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CydkBE3arW9BFRKVo3"]} -{"Format": "IDEA0", "ID": "7285c5ff-b113-4a3a-8e92-d6ffe205b116", "DetectTime": "2023-10-30T14:00:25.783319+02:00", "EventTime": "2023-10-30T14:00:25.783346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.117.66.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.117.66.104 ", "ContentType": "text/plain"}], "uids": ["CPEj1o4ufCam3RDpRd"]} -{"Format": "IDEA0", "ID": "439d9c5e-7947-458c-b808-460a69a0a7ce", "DetectTime": "2023-10-30T14:00:25.818006+02:00", "EventTime": "2023-10-30T14:00:25.818022+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Culjq83mXc2g1cnEJ2"]} -{"Format": "IDEA0", "ID": "f36a4d02-3ade-445b-8bc1-202680511bd0", "DetectTime": "2023-10-30T14:00:25.831742+02:00", "EventTime": "2023-10-30T14:00:25.831759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CcfXUh4hJaMVYh60Sk"]} -{"Format": "IDEA0", "ID": "e71fc271-dc72-4dd7-b416-9e8442d3770e", "DetectTime": "2023-10-30T14:00:25.869958+02:00", "EventTime": "2023-10-30T14:00:25.870105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.136.52.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.136.52.21 ", "ContentType": "text/plain"}], "uids": ["CmooU9AQNeEc6f0Z8"]} -{"Format": "IDEA0", "ID": "7f956d2e-2d70-449e-b25a-4eabd396d3e5", "DetectTime": "2023-10-30T14:00:25.905171+02:00", "EventTime": "2023-10-30T14:00:25.905193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.154.84.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.154.84.83 ", "ContentType": "text/plain"}], "uids": ["CUOlu91NsGkU6MWuNb"]} -{"Format": "IDEA0", "ID": "0feca296-f9af-4396-80e1-bb9663dd9dfb", "DetectTime": "2023-10-30T14:00:25.934769+02:00", "EventTime": "2023-10-30T14:00:25.934851+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgsmRChvasjgKTaK3"]} -{"Format": "IDEA0", "ID": "70dd5be6-f61b-4e77-b9d2-eaa5950464c3", "DetectTime": "2023-10-30T14:00:25.950004+02:00", "EventTime": "2023-10-30T14:00:25.950023+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpjkH41MQOltgyBT2l"]} -{"Format": "IDEA0", "ID": "998cc025-b301-4886-88a7-769083368d3a", "DetectTime": "2023-10-30T14:00:25.964453+02:00", "EventTime": "2023-10-30T14:00:25.964469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["CZHsKi1YWE7aZzvQZ"]} -{"Format": "IDEA0", "ID": "2b934044-ac3d-417f-aebf-5b4d68213b7e", "DetectTime": "2023-10-30T14:00:25.996175+02:00", "EventTime": "2023-10-30T14:00:25.996193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["CbJLvq4j0nmchFjOV2"]} -{"Format": "IDEA0", "ID": "147b647a-d17c-4ed3-8bc2-5f50eaccd15e", "DetectTime": "2023-10-30T14:00:26.029471+02:00", "EventTime": "2023-10-30T14:00:26.029500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CVCqbyQrVgx9slsSk"]} -{"Format": "IDEA0", "ID": "8addc423-4591-4388-ba5e-c1916d1796e9", "DetectTime": "2023-10-30T14:00:26.052763+02:00", "EventTime": "2023-10-30T14:00:26.052787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.232.5.137 ", "ContentType": "text/plain"}], "uids": ["CnTYYH3Y9ZtGwEiREe"]} -{"Format": "IDEA0", "ID": "c751e2a3-d32d-4ab8-a51f-31389a894f74", "DetectTime": "2023-10-30T14:00:26.090484+02:00", "EventTime": "2023-10-30T14:00:26.090513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.138.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.138.33 ", "ContentType": "text/plain"}], "uids": ["CRiT3S398L4ZrhCM09"]} -{"Format": "IDEA0", "ID": "62f0d977-6aec-4f85-8b52-a4317c49eb6f", "DetectTime": "2023-10-30T14:00:26.120242+02:00", "EventTime": "2023-10-30T14:00:26.120262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CfR6fIQj0bVpVluk"]} -{"Format": "IDEA0", "ID": "76a908a7-ad5c-4855-9ab7-2c5a90e17c1e", "DetectTime": "2023-10-30T14:00:26.151064+02:00", "EventTime": "2023-10-30T14:00:26.151083+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsXw9234xUjYPAHgne"]} -{"Format": "IDEA0", "ID": "21ce0e66-5031-4982-a8a0-c706c35882d3", "DetectTime": "2023-10-30T14:00:26.164241+02:00", "EventTime": "2023-10-30T14:00:26.164258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CPi4Wr3RP5XEse1Su7"]} -{"Format": "IDEA0", "ID": "c44e1f4d-20ed-4657-a443-a86e36fdf656", "DetectTime": "2023-10-30T14:00:26.198472+02:00", "EventTime": "2023-10-30T14:00:26.198499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["CSxmqY2a1BdNB39k59"]} -{"Format": "IDEA0", "ID": "d12ecae0-ed26-46cb-85d4-a4806498573a", "DetectTime": "2023-10-30T14:00:26.230321+02:00", "EventTime": "2023-10-30T14:00:26.230343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.232.9.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.232.9.206 ", "ContentType": "text/plain"}], "uids": ["CZWUa13kovTMQz29q8"]} -{"Format": "IDEA0", "ID": "c26e5277-6f31-4f4d-830b-826c1d3d391f", "DetectTime": "2023-10-30T14:00:26.262837+02:00", "EventTime": "2023-10-30T14:00:26.262864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CYVJDjbNSSl2tzhdc"]} -{"Format": "IDEA0", "ID": "abfc1d7c-a35b-45b9-9296-6e455aa6b4aa", "DetectTime": "2023-10-30T14:00:26.298064+02:00", "EventTime": "2023-10-30T14:00:26.298081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Culjq83mXc2g1cnEJ2", "CBE5JSOGdvdreMnn5", "CjIlZz4tD3STVTIjBd", "CpjkH41MQOltgyBT2l"]} -{"Format": "IDEA0", "ID": "ae13eacb-cc2f-4890-b742-71b5fb2b974a", "DetectTime": "2023-10-30T14:00:26.312550+02:00", "EventTime": "2023-10-30T14:00:26.312568+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjIlZz4tD3STVTIjBd"]} -{"Format": "IDEA0", "ID": "a02a629f-6295-4fab-9af5-30b93e53104d", "DetectTime": "2023-10-30T14:00:26.328464+02:00", "EventTime": "2023-10-30T14:00:26.328482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["Ca4mvQ3i8COucLk9uj"]} -{"Format": "IDEA0", "ID": "69c30162-0c12-4426-b7fa-20e8b10188e6", "DetectTime": "2023-10-30T14:00:26.357554+02:00", "EventTime": "2023-10-30T14:00:26.357584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.222.140 ", "ContentType": "text/plain"}], "uids": ["CnKp7C1fA2wNL1oKga"]} -{"Format": "IDEA0", "ID": "1cf3af11-9b18-4569-ae05-4e15ad4f6680", "DetectTime": "2023-10-30T14:00:26.390768+02:00", "EventTime": "2023-10-30T14:00:26.390854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.176.133.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.176.133.96 ", "ContentType": "text/plain"}], "uids": ["CDcj5Kj1Do1LPaiYb"]} -{"Format": "IDEA0", "ID": "8b8e388a-81d6-411b-9d98-dd993561199e", "DetectTime": "2023-10-30T14:00:26.421873+02:00", "EventTime": "2023-10-30T14:00:26.421902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["C5Oa47c1DlEkVGKP6"]} -{"Format": "IDEA0", "ID": "14c47d23-e695-4644-9fbd-fbd3e90e3af2", "DetectTime": "2023-10-30T14:00:26.455223+02:00", "EventTime": "2023-10-30T14:00:26.455236+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4bjks2U44CXU4pWhb"]} -{"Format": "IDEA0", "ID": "39a32da6-fc03-4c47-a573-29136be27a36", "DetectTime": "2023-10-30T14:00:26.467101+02:00", "EventTime": "2023-10-30T14:00:26.467117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CmCgwy1kDpIU1NMF71"]} -{"Format": "IDEA0", "ID": "cd9a5d9c-7330-4697-ba78-20d0b76e6d44", "DetectTime": "2023-10-30T14:00:26.498776+02:00", "EventTime": "2023-10-30T14:00:26.498806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CsGV4a2oIN64ZMIZTl"]} -{"Format": "IDEA0", "ID": "9586f1b2-acfa-46be-861f-542382dd44c4", "DetectTime": "2023-10-30T14:00:26.533258+02:00", "EventTime": "2023-10-30T14:00:26.533284+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT9kj93eqHESWyTQz3"]} -{"Format": "IDEA0", "ID": "fd1794ad-50b8-40c0-8d05-1936c31fecfa", "DetectTime": "2023-10-30T14:00:26.548176+02:00", "EventTime": "2023-10-30T14:00:26.548200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZdL2S38AUXwzDKyBi"]} -{"Format": "IDEA0", "ID": "2bb8ac39-9d42-44c0-92d0-0fe44377d73c", "DetectTime": "2023-10-30T14:00:26.581609+02:00", "EventTime": "2023-10-30T14:00:26.581632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["CUbsvh2zFJpJQf3VJd"]} -{"Format": "IDEA0", "ID": "66711585-e9d1-4f3e-9ca8-5409ed304541", "DetectTime": "2023-10-30T14:00:26.617390+02:00", "EventTime": "2023-10-30T14:00:26.617413+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfZpw84nIleDxaSoj8"]} -{"Format": "IDEA0", "ID": "ad2729aa-6429-4b1b-821e-1dbd54c61ef1", "DetectTime": "2023-10-30T14:00:26.632215+02:00", "EventTime": "2023-10-30T14:00:26.632239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["CFXhFy2Y2YTuEyq6J7"]} -{"Format": "IDEA0", "ID": "e6cc8626-9004-42ef-a5da-5a3eb790e093", "DetectTime": "2023-10-30T14:00:26.663673+02:00", "EventTime": "2023-10-30T14:00:26.663701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.117.66.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.117.66.104 ", "ContentType": "text/plain"}], "uids": ["CjysfX3MSwxk0Qwzh3"]} -{"Format": "IDEA0", "ID": "738d6438-580c-4d7a-a826-ec0453030283", "DetectTime": "2023-10-30T14:00:26.696473+02:00", "EventTime": "2023-10-30T14:00:26.696491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.136.52.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.136.52.21 ", "ContentType": "text/plain"}], "uids": ["CSvzzP3OWtuMXSGQUl"]} -{"Format": "IDEA0", "ID": "c438250d-a08c-4579-891b-93080c2ff495", "DetectTime": "2023-10-30T14:00:26.728531+02:00", "EventTime": "2023-10-30T14:00:26.728548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.138.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.138.33 ", "ContentType": "text/plain"}], "uids": ["C7wmsm4Gs6I66zsqA6"]} -{"Format": "IDEA0", "ID": "1744e577-47cc-4c93-a0ee-32eab73f91a1", "DetectTime": "2023-10-30T14:00:26.760500+02:00", "EventTime": "2023-10-30T14:00:26.760533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.232.9.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.232.9.206 ", "ContentType": "text/plain"}], "uids": ["C2f2pc3nIHGgobvCTk"]} -{"Format": "IDEA0", "ID": "567efa63-7180-4a0a-b97f-87fc0eda58e5", "DetectTime": "2023-10-30T14:00:26.796177+02:00", "EventTime": "2023-10-30T14:00:26.796194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CiOhsOHhyYJhDZ3r5"]} -{"Format": "IDEA0", "ID": "7f804630-fe3a-4201-a24a-2c9958292432", "DetectTime": "2023-10-30T14:00:26.830979+02:00", "EventTime": "2023-10-30T14:00:26.831004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["Cx58DryA30WtgiRNg"]} -{"Format": "IDEA0", "ID": "65bc54e5-cb17-4c88-8387-993d078cd4b2", "DetectTime": "2023-10-30T14:00:26.864498+02:00", "EventTime": "2023-10-30T14:00:26.864519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CYYico1keW93JgDiOh"]} -{"Format": "IDEA0", "ID": "ee76afda-3278-4ece-9b7c-c18ac9306815", "DetectTime": "2023-10-30T14:00:26.897371+02:00", "EventTime": "2023-10-30T14:00:26.897389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.154.84.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.154.84.83 ", "ContentType": "text/plain"}], "uids": ["CpHzCW24jzzGA2Mi2g"]} -{"Format": "IDEA0", "ID": "436b7e74-408f-48bc-aa9b-e8e0c7fd0bc1", "DetectTime": "2023-10-30T14:00:26.927621+02:00", "EventTime": "2023-10-30T14:00:26.927641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CE5vVkk5LdfVGR1Xc"]} -{"Format": "IDEA0", "ID": "dd63d994-a9a9-41e7-8ab2-2c5f013baac1", "DetectTime": "2023-10-30T14:00:26.960603+02:00", "EventTime": "2023-10-30T14:00:26.960617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CNaifP1l5COLMCfTf"]} -{"Format": "IDEA0", "ID": "a546027a-5eac-4e64-ba01-d8ec5f9e4fc2", "DetectTime": "2023-10-30T14:00:26.992018+02:00", "EventTime": "2023-10-30T14:00:26.992043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CXOQIMlIekW8WsJol"]} -{"Format": "IDEA0", "ID": "e1b4b367-f186-4fb5-8d68-2afb7cfdd567", "DetectTime": "2023-10-30T14:00:27.025293+02:00", "EventTime": "2023-10-30T14:00:27.025337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CMtFJq29GkUTm2LsQ6"]} -{"Format": "IDEA0", "ID": "5def31c4-99ac-4db7-87a4-f6dd6fbbd0fa", "DetectTime": "2023-10-30T14:00:27.060686+02:00", "EventTime": "2023-10-30T14:00:27.060704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CM87to2wU6hFNdjsn6"]} -{"Format": "IDEA0", "ID": "fbd21ee8-00ba-4613-b8cc-c9c8e6b78f30", "DetectTime": "2023-10-30T14:00:27.093982+02:00", "EventTime": "2023-10-30T14:00:27.094013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["C9KfqG3sTTFLzudWZc"]} -{"Format": "IDEA0", "ID": "9cf2723e-f232-4d36-82bf-76c9c7fdfa76", "DetectTime": "2023-10-30T14:00:27.124805+02:00", "EventTime": "2023-10-30T14:00:27.124825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CTHZ2i3djIChZJhdXf"]} -{"Format": "IDEA0", "ID": "ec91303e-26e8-4e65-b9c6-50a516a2cf8a", "DetectTime": "2023-10-30T14:00:27.155787+02:00", "EventTime": "2023-10-30T14:00:27.155805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CVPhtv4wXgkyXsCMng"]} -{"Format": "IDEA0", "ID": "7bb845c2-b629-4aba-9555-82e42ca490d7", "DetectTime": "2023-10-30T14:00:27.187034+02:00", "EventTime": "2023-10-30T14:00:27.187059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CVOfNy1pNcm3BeHkxl"]} -{"Format": "IDEA0", "ID": "7210fd8f-fe7a-4976-b338-e02d0236777b", "DetectTime": "2023-10-30T14:00:27.219841+02:00", "EventTime": "2023-10-30T14:00:27.219862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["C38ONJ2WXdA8by7DHd"]} -{"Format": "IDEA0", "ID": "bf4c3868-837d-4715-98da-ef9c2970935d", "DetectTime": "2023-10-30T14:00:27.238266+02:00", "EventTime": "2023-10-30T14:00:27.238291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CLFCo61loc9boqw9Fe"]} -{"Format": "IDEA0", "ID": "9ecd8b76-cd53-445b-9536-1ed7225c574a", "DetectTime": "2023-10-30T14:00:27.270128+02:00", "EventTime": "2023-10-30T14:00:27.270148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CveUcW3uR6Es3YzdA7"]} -{"Format": "IDEA0", "ID": "2bf1f362-4079-4cbb-9512-288beddaa631", "DetectTime": "2023-10-30T14:00:27.301488+02:00", "EventTime": "2023-10-30T14:00:27.301512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["C9kwwU16eK0kD0SFm8"]} -{"Format": "IDEA0", "ID": "65bf8560-aabd-416c-8014-563fb1f36f17", "DetectTime": "2023-10-30T14:00:27.333795+02:00", "EventTime": "2023-10-30T14:00:27.333820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CiDtFC2CB4OTR3pa21"]} -{"Format": "IDEA0", "ID": "4603ae26-2483-407e-b4f3-3c4ed2314da3", "DetectTime": "2023-10-30T14:00:27.363992+02:00", "EventTime": "2023-10-30T14:00:27.364039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["C0HhHx4VJ6b9kQds62"]} -{"Format": "IDEA0", "ID": "3bacdc5f-61cd-4021-8baf-04a3848ba59f", "DetectTime": "2023-10-30T14:00:27.407400+02:00", "EventTime": "2023-10-30T14:00:27.407428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CyA6OH2wEtJXnkMEz4"]} -{"Format": "IDEA0", "ID": "0be1e0cf-25f8-4fca-8570-865a12c6f6fc", "DetectTime": "2023-10-30T14:00:27.439228+02:00", "EventTime": "2023-10-30T14:00:27.439243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["ChIrKo1KZX2lFvoLVf"]} -{"Format": "IDEA0", "ID": "edaa7ee8-04b9-41bd-b616-280b79c5cd13", "DetectTime": "2023-10-30T14:00:27.470170+02:00", "EventTime": "2023-10-30T14:00:27.470203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["CAZGTk1gycUM0jmj05"]} -{"Format": "IDEA0", "ID": "7151e9f1-b383-4c98-aa59-50d4e4311082", "DetectTime": "2023-10-30T14:00:27.507433+02:00", "EventTime": "2023-10-30T14:00:27.507459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["CGAy0iq2DXl5KiUvl"]} -{"Format": "IDEA0", "ID": "29b2c180-e1b2-4f7f-8c78-af0bebf2b2fa", "DetectTime": "2023-10-30T14:00:27.538329+02:00", "EventTime": "2023-10-30T14:00:27.538353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.232.5.137 ", "ContentType": "text/plain"}], "uids": ["Cm3iWd4qIUBtDEDMak"]} -{"Format": "IDEA0", "ID": "a04da0d0-f582-4270-873b-e2628394f199", "DetectTime": "2023-10-30T14:00:27.571899+02:00", "EventTime": "2023-10-30T14:00:27.571917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["C0hAlfwGFTUOLR4A7"]} -{"Format": "IDEA0", "ID": "32aeb375-84fb-4ff6-ada6-efe063262fb4", "DetectTime": "2023-10-30T14:00:27.604290+02:00", "EventTime": "2023-10-30T14:00:27.604311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["C95djb4bIBCK1Nki3a"]} -{"Format": "IDEA0", "ID": "b81d077e-5443-4d91-9d42-e247f089659e", "DetectTime": "2023-10-30T14:00:27.635099+02:00", "EventTime": "2023-10-30T14:00:27.635122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["COZDFi284ce07Vie5d"]} -{"Format": "IDEA0", "ID": "191f6572-193e-4add-9ce5-11e71a0a862f", "DetectTime": "2023-10-30T14:00:27.669511+02:00", "EventTime": "2023-10-30T14:00:27.669537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.163.112.113 ", "ContentType": "text/plain"}], "uids": ["CJpm9T1qmDoGOCm41l"]} -{"Format": "IDEA0", "ID": "7e958516-7864-4736-8ce0-b2e786945081", "DetectTime": "2023-10-30T14:00:27.700094+02:00", "EventTime": "2023-10-30T14:00:27.700122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CjmAx02jXP9ENR1lN"]} -{"Format": "IDEA0", "ID": "ae995b05-bbf4-4fa0-a8e8-a84c50404f51", "DetectTime": "2023-10-30T14:00:27.729109+02:00", "EventTime": "2023-10-30T14:00:27.729129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.176.133.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.176.133.96 ", "ContentType": "text/plain"}], "uids": ["C6gkme3n4Ggv7miLNj"]} -{"Format": "IDEA0", "ID": "9cc79170-5a36-4b2a-912c-84cdb69fe1ca", "DetectTime": "2023-10-30T14:00:27.761277+02:00", "EventTime": "2023-10-30T14:00:27.761302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.222.140 ", "ContentType": "text/plain"}], "uids": ["CtXIJH3dn3ZIs5NIx3"]} -{"Format": "IDEA0", "ID": "a9e0e38a-b386-44b3-a056-749eaa728906", "DetectTime": "2023-10-30T14:00:27.792495+02:00", "EventTime": "2023-10-30T14:00:27.792515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["CvqQg94iqDgj7BARk3"]} -{"Format": "IDEA0", "ID": "1bb939f8-9945-447f-a81d-3ce568abb279", "DetectTime": "2023-10-30T14:00:27.824126+02:00", "EventTime": "2023-10-30T14:00:27.824153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CPCy8412IHKSm66Mx6"]} -{"Format": "IDEA0", "ID": "a92d3a78-3fe0-42ba-a5d6-0df4096db3f6", "DetectTime": "2023-10-30T14:00:27.854602+02:00", "EventTime": "2023-10-30T14:00:27.854624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["C19xVF2WRlHjbeLy8e"]} -{"Format": "IDEA0", "ID": "98ac2b37-f33e-4f26-b8eb-c4cd51ed6f7a", "DetectTime": "2023-10-30T14:00:27.882190+02:00", "EventTime": "2023-10-30T14:00:27.882216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CPIIYi2jANhaWyciKj"]} -{"Format": "IDEA0", "ID": "fdff4036-b0b4-49ee-9721-da5cfd5cd863", "DetectTime": "2023-10-30T14:00:27.915304+02:00", "EventTime": "2023-10-30T14:00:27.915320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CYQloi1wxqpoA00Vc5"]} -{"Format": "IDEA0", "ID": "bb5d8cca-3bf2-425d-bffa-78653ba300aa", "DetectTime": "2023-10-30T14:00:27.946344+02:00", "EventTime": "2023-10-30T14:00:27.946359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["C7cA631uq4opvF2zI6"]} -{"Format": "IDEA0", "ID": "b8e20279-31db-4897-a8d5-e788ed0feb49", "DetectTime": "2023-10-30T14:00:27.975614+02:00", "EventTime": "2023-10-30T14:00:27.975644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["CB8CrQ1HoyhLkyFWXa"]} -{"Format": "IDEA0", "ID": "0a755906-58dd-48b8-84fe-26de90428c5a", "DetectTime": "2023-10-30T14:00:28.007230+02:00", "EventTime": "2023-10-30T14:00:28.007245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["Cm4ZbU1fAP4uE4xQe8"]} -{"Format": "IDEA0", "ID": "1fde1718-9d0b-46ab-9be7-d8bb7158aa96", "DetectTime": "2023-10-30T14:00:28.041067+02:00", "EventTime": "2023-10-30T14:00:28.041085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CezvhW3J3nLt5U96va"]} -{"Format": "IDEA0", "ID": "c8cfe765-04f6-4e31-bbea-266f20be852b", "DetectTime": "2023-10-30T14:00:28.074801+02:00", "EventTime": "2023-10-30T14:00:28.074822+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.122.62.185"], "Hostname": ["4F7A3EB9.dsl.pool.telekom.hu Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.122.62.185 from 10.0.2.19. blacklisted IP AS: MAGYAR-TELEKOM-MAIN-AS Magyar Telekom Nyrt., HU AS5483 rDNS: 4F7A3EB9.dsl.pool.telekom.hu Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CW0e3u3jIoOsgpAjkj"]} -{"Format": "IDEA0", "ID": "baedbf67-9d3e-43f6-86ce-f504dee4c941", "DetectTime": "2023-10-30T14:00:28.122322+02:00", "EventTime": "2023-10-30T14:00:28.122347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CVj2R5225E7IkVYfQ5"]} -{"Format": "IDEA0", "ID": "245b873c-cd18-4171-b580-90bd0847e772", "DetectTime": "2023-10-30T14:00:28.149144+02:00", "EventTime": "2023-10-30T14:00:28.149164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CK38Id2VPmJ9bgH6lf"]} -{"Format": "IDEA0", "ID": "1209b015-ea2a-42ae-9b48-4c773446677c", "DetectTime": "2023-10-30T14:00:28.178298+02:00", "EventTime": "2023-10-30T14:00:28.178318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["C2gSRE3v5V45EjZSwl"]} -{"Format": "IDEA0", "ID": "57a8522b-8d21-4e36-87d1-09fac0ca18e0", "DetectTime": "2023-10-30T14:00:28.206568+02:00", "EventTime": "2023-10-30T14:00:28.206584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CuLaNH2MTStjJdiIPf"]} -{"Format": "IDEA0", "ID": "36edd523-0e8c-40e8-8cf9-a898eb81c244", "DetectTime": "2023-10-30T14:00:28.234016+02:00", "EventTime": "2023-10-30T14:00:28.234028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CpskDu01t9dIKCaG5"]} -{"Format": "IDEA0", "ID": "c88638b8-2e1d-4dc4-96f7-40a8c82b7b3f", "DetectTime": "2023-10-30T14:00:28.260295+02:00", "EventTime": "2023-10-30T14:00:28.260316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["C55M6YUcj5YI9Z0z9"]} -{"Format": "IDEA0", "ID": "efbe895b-38cc-4223-bcbe-215dbdc6bc24", "DetectTime": "2023-10-30T14:00:28.286804+02:00", "EventTime": "2023-10-30T14:00:28.286826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CLc3Ad3iq22XKskZu2"]} -{"Format": "IDEA0", "ID": "1e89adda-dddc-4c5f-8513-5f5c90ee6a65", "DetectTime": "2023-10-30T14:00:28.313925+02:00", "EventTime": "2023-10-30T14:00:28.313951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CWmSzm2urb3cJG5rJ8"]} -{"Format": "IDEA0", "ID": "531bcd9c-c053-476d-a732-ef6b6a8915d0", "DetectTime": "2023-10-30T14:00:28.345023+02:00", "EventTime": "2023-10-30T14:00:28.345048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["Cryeeo4qKx2asN3hKf"]} -{"Format": "IDEA0", "ID": "e7ea795f-f29c-46ac-87dc-95a4a0dd4224", "DetectTime": "2023-10-30T14:00:28.373288+02:00", "EventTime": "2023-10-30T14:00:28.373314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CftVd42tq14VD5MvYk"]} -{"Format": "IDEA0", "ID": "dc841640-2cbd-44fa-9319-d28ec4d9e927", "DetectTime": "2023-10-30T14:00:28.403264+02:00", "EventTime": "2023-10-30T14:00:28.403284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CfQdt31DS7QFQaSe3"]} -{"Format": "IDEA0", "ID": "4ef433b5-9392-473e-9436-ab256ff55398", "DetectTime": "2023-10-30T14:00:28.433807+02:00", "EventTime": "2023-10-30T14:00:28.433830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CXRdNr4jq46KyLdmw2"]} -{"Format": "IDEA0", "ID": "cb660a69-c0b6-4c6a-8ee0-30eb00defd24", "DetectTime": "2023-10-30T14:00:28.465174+02:00", "EventTime": "2023-10-30T14:00:28.465193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CUECoF0472VKvnQsj"]} -{"Format": "IDEA0", "ID": "f28f3605-dd52-40a2-865d-cc4cc2af86d6", "DetectTime": "2023-10-30T14:00:28.494827+02:00", "EventTime": "2023-10-30T14:00:28.494847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["C2BTAY3jz7YV3AJVZb"]} -{"Format": "IDEA0", "ID": "341ca5fd-15dd-4cb5-a817-607db2de2ed1", "DetectTime": "2023-10-30T14:00:28.522634+02:00", "EventTime": "2023-10-30T14:00:28.522663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["C2r6pF1UyS2l0jmO7g"]} -{"Format": "IDEA0", "ID": "e392b71e-9196-4aef-86f2-079453a364e4", "DetectTime": "2023-10-30T14:00:28.552357+02:00", "EventTime": "2023-10-30T14:00:28.552380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["CnXAHjG0L69PbtJMd"]} -{"Format": "IDEA0", "ID": "49731a98-6933-49ae-927b-f10ab37477fd", "DetectTime": "2023-10-30T14:00:28.578104+02:00", "EventTime": "2023-10-30T14:00:28.578129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.176.133.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.176.133.96 ", "ContentType": "text/plain"}], "uids": ["CzEtYN3q8SjArbUlPe"]} -{"Format": "IDEA0", "ID": "0e7ef2ed-836c-4e93-94c0-81eda6d06afd", "DetectTime": "2023-10-30T14:00:28.605456+02:00", "EventTime": "2023-10-30T14:00:28.605478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CJoLC74ZU1A0G5fKpd"]} -{"Format": "IDEA0", "ID": "deea0920-f9c6-4282-9096-79f097274371", "DetectTime": "2023-10-30T14:00:28.631792+02:00", "EventTime": "2023-10-30T14:00:28.631816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.232.5.137 ", "ContentType": "text/plain"}], "uids": ["Co6cXF3FBgoBrh5jPg"]} -{"Format": "IDEA0", "ID": "2a076ffd-902c-448a-96c7-923db2128fd3", "DetectTime": "2023-10-30T14:00:28.663423+02:00", "EventTime": "2023-10-30T14:00:28.663443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["CTZc1e41MhfuZSiXuc"]} -{"Format": "IDEA0", "ID": "4268cecd-ea28-4781-8a2c-e2a321b83a65", "DetectTime": "2023-10-30T14:00:28.692866+02:00", "EventTime": "2023-10-30T14:00:28.692883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CJuywP3IFZCyrYVbka"]} -{"Format": "IDEA0", "ID": "54be6b16-3ec5-40d1-95d2-54fc2a390fca", "DetectTime": "2023-10-30T14:00:28.725217+02:00", "EventTime": "2023-10-30T14:00:28.725236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["C1JaaD4QdaHSnmzPvb"]} -{"Format": "IDEA0", "ID": "8e0f1d88-fbb0-4cba-bc00-92f27d409ea2", "DetectTime": "2023-10-30T14:00:28.756262+02:00", "EventTime": "2023-10-30T14:00:28.756336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["Ch2Zmv2lRuiKL5ruQh"]} -{"Format": "IDEA0", "ID": "09229f12-ef38-4010-b2d1-aa41a2b24798", "DetectTime": "2023-10-30T14:00:28.786107+02:00", "EventTime": "2023-10-30T14:00:28.786131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CmwLdV3le33WLYZcEg"]} -{"Format": "IDEA0", "ID": "e77fcf04-9236-4fee-9f76-1af7ab889321", "DetectTime": "2023-10-30T14:00:28.815207+02:00", "EventTime": "2023-10-30T14:00:28.815224+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSwMWw2ceAgWpGVXVk"]} -{"Format": "IDEA0", "ID": "57e14613-1743-4668-9171-4ae83713e879", "DetectTime": "2023-10-30T14:00:28.832737+02:00", "EventTime": "2023-10-30T14:00:28.832902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.222.140 ", "ContentType": "text/plain"}], "uids": ["C9tmnB2oMTAjpllik2"]} -{"Format": "IDEA0", "ID": "617317b2-ee85-4d06-b20d-ee60c5953f00", "DetectTime": "2023-10-30T14:00:28.862834+02:00", "EventTime": "2023-10-30T14:00:28.862849+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7E0L729LwDkmeu6B5"]} -{"Format": "IDEA0", "ID": "a43be09f-9756-4664-929f-9556c95994e8", "DetectTime": "2023-10-30T14:00:28.875287+02:00", "EventTime": "2023-10-30T14:00:28.875305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CSedNk8d0wlqNGmg2"]} -{"Format": "IDEA0", "ID": "357e2808-0fd2-4e80-9985-488cc33e8657", "DetectTime": "2023-10-30T14:00:28.900970+02:00", "EventTime": "2023-10-30T14:00:28.900998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["CRiy6rcvVm7kcT5ya"]} -{"Format": "IDEA0", "ID": "f27ff1e0-e216-4aef-a32f-8a2fc83abe8e", "DetectTime": "2023-10-30T14:00:28.926637+02:00", "EventTime": "2023-10-30T14:00:28.926659+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5oRuF2A0yuzEYuJva"]} -{"Format": "IDEA0", "ID": "82559021-47f8-4510-b689-98fbb7590aa3", "DetectTime": "2023-10-30T14:00:28.940127+02:00", "EventTime": "2023-10-30T14:00:28.940143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["Cw12wwjcjVCoUc3H1"]} -{"Format": "IDEA0", "ID": "d98cbb59-ac40-43eb-b4c5-2e1f8884518f", "DetectTime": "2023-10-30T14:00:28.964405+02:00", "EventTime": "2023-10-30T14:00:28.964417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CgHiRo4Y1Rc12iVF1k"]} -{"Format": "IDEA0", "ID": "add9c33a-45ec-43a2-8429-e46dba27e83f", "DetectTime": "2023-10-30T14:00:28.990661+02:00", "EventTime": "2023-10-30T14:00:28.990685+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTor0l44Ytey9XHHSa"]} -{"Format": "IDEA0", "ID": "dc5cb90f-3b8b-49fa-b079-e6588d753df9", "DetectTime": "2023-10-30T14:00:29.003759+02:00", "EventTime": "2023-10-30T14:00:29.003770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CUnW8Y2g8yoxHxIKt8"]} -{"Format": "IDEA0", "ID": "6db7aa66-df65-4566-83a3-0088e06b4726", "DetectTime": "2023-10-30T14:00:29.020960+02:00", "EventTime": "2023-10-30T14:00:29.020977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CSwMWw2ceAgWpGVXVk", "CT9kj93eqHESWyTQz3", "Cjcncp4Ci0NBTlWIr6", "C5oRuF2A0yuzEYuJva"]} -{"Format": "IDEA0", "ID": "b23b91ff-b7b5-4d44-8917-dc7dd402e871", "DetectTime": "2023-10-30T14:00:29.033788+02:00", "EventTime": "2023-10-30T14:00:29.033807+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cjcncp4Ci0NBTlWIr6"]} -{"Format": "IDEA0", "ID": "e5b39877-5953-4343-a326-ec0828a6d6f4", "DetectTime": "2023-10-30T14:00:29.048681+02:00", "EventTime": "2023-10-30T14:00:29.048699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CRZYHa2JaqDVJvg9j7"]} -{"Format": "IDEA0", "ID": "d2d1eebe-f98c-4f8e-9611-888465db9b4a", "DetectTime": "2023-10-30T14:00:29.075317+02:00", "EventTime": "2023-10-30T14:00:29.075334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["Ck5TJc4woH9zGy1nPc"]} -{"Format": "IDEA0", "ID": "fc4b24ed-e4f2-4e69-b47c-47de6a5beca0", "DetectTime": "2023-10-30T14:00:29.099038+02:00", "EventTime": "2023-10-30T14:00:29.099053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CBXtS5315FKR2fT3N4"]} -{"Format": "IDEA0", "ID": "553be296-7f3c-4b24-8ec9-075b7afc108a", "DetectTime": "2023-10-30T14:00:29.121379+02:00", "EventTime": "2023-10-30T14:00:29.121390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["ChoNAV30PCLhUFrCxk"]} -{"Format": "IDEA0", "ID": "ce8c6168-3310-4229-b2c0-95f05ab90609", "DetectTime": "2023-10-30T14:00:29.143287+02:00", "EventTime": "2023-10-30T14:00:29.143304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CyLt4FPOeNhAIr8M2"]} -{"Format": "IDEA0", "ID": "5992991d-cda8-4db0-93e9-062ebbe837a1", "DetectTime": "2023-10-30T14:00:29.164098+02:00", "EventTime": "2023-10-30T14:00:29.164115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.232.5.137 ", "ContentType": "text/plain"}], "uids": ["C1x07l1MknmEea3gel"]} -{"Format": "IDEA0", "ID": "8befed23-8b2a-40d8-b36a-715469b3e1f6", "DetectTime": "2023-10-30T14:00:29.187370+02:00", "EventTime": "2023-10-30T14:00:29.187387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CezFGJHtoOv8yewf8"]} -{"Format": "IDEA0", "ID": "5b88a80d-9f80-4bd6-a1fd-797d20f1d7fa", "DetectTime": "2023-10-30T14:00:29.209347+02:00", "EventTime": "2023-10-30T14:00:29.209365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwaFN72mvSrcIFGrO2"]} -{"Format": "IDEA0", "ID": "8831e663-149f-4822-a8b5-c4567f0d89df", "DetectTime": "2023-10-30T14:00:29.228399+02:00", "EventTime": "2023-10-30T14:00:29.228415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CrVOyl49WDfyB3ltGf"]} -{"Format": "IDEA0", "ID": "db66f783-2d29-4c25-b7c1-425bb0530efb", "DetectTime": "2023-10-30T14:00:29.248658+02:00", "EventTime": "2023-10-30T14:00:29.248669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["Ca2G1v4tzbflwmfpWd"]} -{"Format": "IDEA0", "ID": "31f3626f-0009-4b48-959c-9b7dfe4f738e", "DetectTime": "2023-10-30T14:00:29.271537+02:00", "EventTime": "2023-10-30T14:00:29.271561+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Hostname": ["adsl-ull-200-9.45-151.wind.it Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 151.45.9.200 from 10.0.2.19. blacklisted IP AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cw38NF3scB3FQP6Ja"]} -{"Format": "IDEA0", "ID": "77f6fc8d-7c89-4369-8707-a5d95e8c6614", "DetectTime": "2023-10-30T14:00:29.307689+02:00", "EventTime": "2023-10-30T14:00:29.307715+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Czsvig2fNjopfSXG6k"]} -{"Format": "IDEA0", "ID": "de2b74f1-93ca-47b8-82fc-f119fbae7177", "DetectTime": "2023-10-30T14:00:29.322401+02:00", "EventTime": "2023-10-30T14:00:29.322419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C91saZAADnuPdXXQ7"]} -{"Format": "IDEA0", "ID": "18c2f6d2-1bc5-4f7e-8b5c-3a921065a623", "DetectTime": "2023-10-30T14:00:29.342969+02:00", "EventTime": "2023-10-30T14:00:29.342981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CNeqwP1FgAEM9ndzJl"]} -{"Format": "IDEA0", "ID": "9ae8631d-da5d-4533-a5ff-5a29bb852072", "DetectTime": "2023-10-30T14:00:29.366893+02:00", "EventTime": "2023-10-30T14:00:29.366914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["CSxLCyl8tfFLIGyE6"]} -{"Format": "IDEA0", "ID": "6112f57e-bdc8-4d4b-bb2f-8605bfce4349", "DetectTime": "2023-10-30T14:00:29.390212+02:00", "EventTime": "2023-10-30T14:00:29.390224+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPQdkc2itxecStLei9"]} -{"Format": "IDEA0", "ID": "bd81e07a-7aaf-45d9-987d-7051c9dc1656", "DetectTime": "2023-10-30T14:00:29.401521+02:00", "EventTime": "2023-10-30T14:00:29.401539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.176.133.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.176.133.96 ", "ContentType": "text/plain"}], "uids": ["C35lYy4nQf48jbvetg"]} -{"Format": "IDEA0", "ID": "274f22a5-6693-4feb-9e06-3806f38048e1", "DetectTime": "2023-10-30T14:00:29.423615+02:00", "EventTime": "2023-10-30T14:00:29.423634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.242.59.94 ", "ContentType": "text/plain"}], "uids": ["C5zVNg1cTJyspylsI1"]} -{"Format": "IDEA0", "ID": "4e32c869-d37b-4f0f-b7ca-1d3a2dafc8b8", "DetectTime": "2023-10-30T14:00:29.446091+02:00", "EventTime": "2023-10-30T14:00:29.446108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmVDe13scht5Zyodv1"]} -{"Format": "IDEA0", "ID": "fc9c9046-5ff0-4996-8186-4f12e6a769e3", "DetectTime": "2023-10-30T14:00:29.457574+02:00", "EventTime": "2023-10-30T14:00:29.457590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["Ci0wtS29ye680qLww8"]} -{"Format": "IDEA0", "ID": "9bc76346-3cb3-44f3-b22b-26b374655a35", "DetectTime": "2023-10-30T14:00:29.480808+02:00", "EventTime": "2023-10-30T14:00:29.480826+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCJP6t4nP0r8WjJzTg"]} -{"Format": "IDEA0", "ID": "5ad3b9b3-6d4d-4ed0-b18f-81791ce2e124", "DetectTime": "2023-10-30T14:00:29.490720+02:00", "EventTime": "2023-10-30T14:00:29.490731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.222.140 ", "ContentType": "text/plain"}], "uids": ["CJnakg30KK7S84U8Wc"]} -{"Format": "IDEA0", "ID": "22374407-7d69-4d97-9848-cf96a58c31eb", "DetectTime": "2023-10-30T14:00:29.508122+02:00", "EventTime": "2023-10-30T14:00:29.508145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.222.140 ", "ContentType": "text/plain"}], "uids": ["CDidUy40bVIiw0SeP5"]} -{"Format": "IDEA0", "ID": "9c7d862f-8ebb-4990-aced-1251dc5d0e71", "DetectTime": "2023-10-30T14:00:29.527188+02:00", "EventTime": "2023-10-30T14:00:29.527205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["Cv7hgL36buLlbESmdl"]} -{"Format": "IDEA0", "ID": "1238f6c5-c293-45bf-947d-34f3a7e2a2ed", "DetectTime": "2023-10-30T14:00:29.548139+02:00", "EventTime": "2023-10-30T14:00:29.548160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CP2S861zb5czeuIgC7"]} -{"Format": "IDEA0", "ID": "3941bcf5-5f08-48c5-bc2a-4c9463eb7d75", "DetectTime": "2023-10-30T14:00:29.566584+02:00", "EventTime": "2023-10-30T14:00:29.566604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CXNplX27vf2gAN5WV4"]} -{"Format": "IDEA0", "ID": "c97da435-7a5e-4ed1-bf33-e4d6562bde88", "DetectTime": "2023-10-30T14:00:29.591543+02:00", "EventTime": "2023-10-30T14:00:29.591555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoCg6k3dhFMur5bned"]} -{"Format": "IDEA0", "ID": "d7c31446-2a66-4825-b9c2-ca204049a8d3", "DetectTime": "2023-10-30T14:00:29.614939+02:00", "EventTime": "2023-10-30T14:00:29.614959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CNVpoo4nHmc4bTf4p1"]} -{"Format": "IDEA0", "ID": "a8cfb806-d8f8-4384-b871-175bb1a372bc", "DetectTime": "2023-10-30T14:00:29.635517+02:00", "EventTime": "2023-10-30T14:00:29.635540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CLT0UD2gybQEnFb0z2"]} -{"Format": "IDEA0", "ID": "4749a8cf-7be7-4a94-8058-54bab515f686", "DetectTime": "2023-10-30T14:00:29.660104+02:00", "EventTime": "2023-10-30T14:00:29.660115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CbUuSF4e24TkfSODFg"]} -{"Format": "IDEA0", "ID": "b5309e19-5987-47a3-a978-6f8e54e802b9", "DetectTime": "2023-10-30T14:00:29.683505+02:00", "EventTime": "2023-10-30T14:00:29.683531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CLjZ224FqhCNkPaoP6"]} -{"Format": "IDEA0", "ID": "442d9908-531a-490a-a77c-3066087dd2ea", "DetectTime": "2023-10-30T14:00:29.705154+02:00", "EventTime": "2023-10-30T14:00:29.705170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CPuqhW2Xnc9NCvbA0l"]} -{"Format": "IDEA0", "ID": "d33a09f9-06eb-4c9e-8b20-389542ba437c", "DetectTime": "2023-10-30T14:00:29.727639+02:00", "EventTime": "2023-10-30T14:00:29.727654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CVXSgs2PFF92VIVKE"]} -{"Format": "IDEA0", "ID": "9bd43302-721f-486c-9a74-973205597260", "DetectTime": "2023-10-30T14:00:29.750839+02:00", "EventTime": "2023-10-30T14:00:29.750857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CVl1kP3qw0uQC9ZyJ3"]} -{"Format": "IDEA0", "ID": "8f4bc9e9-47d7-4e4a-9213-d3783d4ff4cd", "DetectTime": "2023-10-30T14:00:29.771826+02:00", "EventTime": "2023-10-30T14:00:29.771843+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIVDxq2xkstylk3Qqf"]} -{"Format": "IDEA0", "ID": "eea2d0a9-43ef-4cf1-966d-5499da8fdaa6", "DetectTime": "2023-10-30T14:00:29.782247+02:00", "EventTime": "2023-10-30T14:00:29.782258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CeSClT39JR9G7jeRfl"]} -{"Format": "IDEA0", "ID": "4643496e-843d-473f-ae31-49b4ccef0c88", "DetectTime": "2023-10-30T14:00:29.805619+02:00", "EventTime": "2023-10-30T14:00:29.805638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["C9B5Pc4F1sTB2cZa65"]} -{"Format": "IDEA0", "ID": "2f6b0256-1dcb-460d-addc-89e3805a81e9", "DetectTime": "2023-10-30T14:00:29.826576+02:00", "EventTime": "2023-10-30T14:00:29.826604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CDYjK02PFwOAEWocmd"]} -{"Format": "IDEA0", "ID": "9a3c18f7-34d4-47d8-8745-e87ae85bf1fa", "DetectTime": "2023-10-30T14:00:29.846329+02:00", "EventTime": "2023-10-30T14:00:29.846348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["C3uFkC1nsohUBctfc9"]} -{"Format": "IDEA0", "ID": "6f9b73d7-ae7f-44f9-9694-5539179a4a86", "DetectTime": "2023-10-30T14:00:29.869773+02:00", "EventTime": "2023-10-30T14:00:29.869798+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Hostname": ["157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.154.42.157 from 10.0.2.19. blacklisted IP AS: TELEFONICA_DE_ESPANA, ES AS3352 rDNS: 157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COevIB2sFGxMnDGr2"]} -{"Format": "IDEA0", "ID": "a724b535-608e-4b15-9060-41bbe8f333e3", "DetectTime": "2023-10-30T14:00:29.906396+02:00", "EventTime": "2023-10-30T14:00:29.906413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["CWQhSP3hIFWI4iIyAa"]} -{"Format": "IDEA0", "ID": "26198e8a-cbe4-4d55-b4f2-4fc55309fed1", "DetectTime": "2023-10-30T14:00:29.928268+02:00", "EventTime": "2023-10-30T14:00:29.928279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CaDz6c10fPftNwycCj"]} -{"Format": "IDEA0", "ID": "03660ef1-1a99-4d69-add4-fae6b5ddb94d", "DetectTime": "2023-10-30T14:00:29.956319+02:00", "EventTime": "2023-10-30T14:00:29.956342+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CV5DKJuT8R3ifLMC8"]} -{"Format": "IDEA0", "ID": "95d38735-0554-435a-b029-a85f84b235e8", "DetectTime": "2023-10-30T14:00:29.969230+02:00", "EventTime": "2023-10-30T14:00:29.969247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CqeSUi1OGRZDoXlaG3"]} -{"Format": "IDEA0", "ID": "58bb6aca-572b-4df6-b574-0733b6b6bc4b", "DetectTime": "2023-10-30T14:00:29.991880+02:00", "EventTime": "2023-10-30T14:00:29.991901+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKoMju4HbW5e8AOJHb"]} -{"Format": "IDEA0", "ID": "23cf9f38-e1ba-4b6f-a115-1c5763a9a424", "DetectTime": "2023-10-30T14:00:30.006144+02:00", "EventTime": "2023-10-30T14:00:30.006160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CV5DKJuT8R3ifLMC8", "CCJP6t4nP0r8WjJzTg", "Cz1KZ03FvG1tAt9hT8", "CPQdkc2itxecStLei9"]} -{"Format": "IDEA0", "ID": "4c47ea85-be18-4de6-b541-51cd5e77d378", "DetectTime": "2023-10-30T14:00:30.018820+02:00", "EventTime": "2023-10-30T14:00:30.018842+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cz1KZ03FvG1tAt9hT8"]} -{"Format": "IDEA0", "ID": "1ce198dc-d9e8-4fed-82ba-4ccfaa9ce3e2", "DetectTime": "2023-10-30T14:00:30.028033+02:00", "EventTime": "2023-10-30T14:00:30.028050+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDKpXr2DuDR7Gt15pc"]} -{"Format": "IDEA0", "ID": "79f4b253-703e-4352-9f1a-f84e3ac5b3c4", "DetectTime": "2023-10-30T14:00:30.040708+02:00", "EventTime": "2023-10-30T14:00:30.040726+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDsBCGljDnLdQeD2d"]} -{"Format": "IDEA0", "ID": "e4bfd9a4-8f38-45a2-8807-c30b889810c8", "DetectTime": "2023-10-30T14:00:30.051757+02:00", "EventTime": "2023-10-30T14:00:30.051782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["Cy2YMAxsBs4kAAPxj"]} -{"Format": "IDEA0", "ID": "a6090faa-2a04-44d7-9c3f-89ca89be7b6f", "DetectTime": "2023-10-30T14:00:30.074206+02:00", "EventTime": "2023-10-30T14:00:30.074222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CHQRGfmqO8mtVz7ik"]} -{"Format": "IDEA0", "ID": "a8076828-b252-4866-969c-a0641d4c8478", "DetectTime": "2023-10-30T14:00:30.096033+02:00", "EventTime": "2023-10-30T14:00:30.096055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CCgr3A4JEQpGgOlLQa"]} -{"Format": "IDEA0", "ID": "d766dd5e-de2b-4b11-a04b-fd50bb401344", "DetectTime": "2023-10-30T14:00:30.119926+02:00", "EventTime": "2023-10-30T14:00:30.119947+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cod81M1ohSyGJTvySk"]} -{"Format": "IDEA0", "ID": "66fcdf23-b7b6-4327-b769-b979cad2d73c", "DetectTime": "2023-10-30T14:00:30.133151+02:00", "EventTime": "2023-10-30T14:00:30.133163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CCPSqV286YGWWRYogj"]} -{"Format": "IDEA0", "ID": "cf5bf441-780b-4f39-bd70-475db5a46f5d", "DetectTime": "2023-10-30T14:00:30.151715+02:00", "EventTime": "2023-10-30T14:00:30.151742+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5bc7K2q0FDKNw9LRj"]} -{"Format": "IDEA0", "ID": "26823668-bd84-4000-b3fe-0009bc5b1de0", "DetectTime": "2023-10-30T14:00:30.165523+02:00", "EventTime": "2023-10-30T14:00:30.165537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["C5XYCr2WEJ6AYyYE8l"]} -{"Format": "IDEA0", "ID": "9b05040e-815c-419e-beca-930bdfc978ef", "DetectTime": "2023-10-30T14:00:30.183729+02:00", "EventTime": "2023-10-30T14:00:30.183747+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHVPC14p3kOAXY2qC5"]} -{"Format": "IDEA0", "ID": "65442574-f637-4017-9f6b-ab8a283a3646", "DetectTime": "2023-10-30T14:00:30.195571+02:00", "EventTime": "2023-10-30T14:00:30.195587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CsILCe32zUFT9SQSEe"]} -{"Format": "IDEA0", "ID": "ef51b656-4350-48e3-83fe-0d3061b5350e", "DetectTime": "2023-10-30T14:00:30.216587+02:00", "EventTime": "2023-10-30T14:00:30.216606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["CwsIl22rB5HYFwK6Xc"]} -{"Format": "IDEA0", "ID": "e53f9420-40db-4211-8d5b-df4ef20d9455", "DetectTime": "2023-10-30T14:00:30.239576+02:00", "EventTime": "2023-10-30T14:00:30.239593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CA9gUG2dpN8ZifMiQe"]} -{"Format": "IDEA0", "ID": "1043616c-70a5-4f46-bd58-941c155b7aa8", "DetectTime": "2023-10-30T14:00:30.263160+02:00", "EventTime": "2023-10-30T14:00:30.263181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CW5McLobXFy24OCfk"]} -{"Format": "IDEA0", "ID": "ca542dfe-c5b8-400c-95db-5204dcc63fd1", "DetectTime": "2023-10-30T14:00:30.274135+02:00", "EventTime": "2023-10-30T14:00:30.274146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["Cr0Q9d2YbiAKPKMae4"]} -{"Format": "IDEA0", "ID": "d99fc380-1090-40f4-a1bf-0010b5fc2cd7", "DetectTime": "2023-10-30T14:00:30.295411+02:00", "EventTime": "2023-10-30T14:00:30.295422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["CYrAww2J8Ac0oArS34"]} -{"Format": "IDEA0", "ID": "3022f7f6-b43a-49d3-ad8c-54ced4b39b63", "DetectTime": "2023-10-30T14:00:30.316904+02:00", "EventTime": "2023-10-30T14:00:30.316919+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Hostname": ["157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.154.42.157 from 10.0.2.19. blacklisted IP AS: TELEFONICA_DE_ESPANA, ES AS3352 rDNS: 157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CsgT0YUwBD0xfQmCl"]} -{"Format": "IDEA0", "ID": "ae3a5012-4255-4756-b2fd-71e84135151f", "DetectTime": "2023-10-30T14:00:30.349614+02:00", "EventTime": "2023-10-30T14:00:30.349636+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Czj68s3A1hMvzLeNmi"]} -{"Format": "IDEA0", "ID": "a23db713-687d-46d8-8f69-e12d87c881b8", "DetectTime": "2023-10-30T14:00:30.361504+02:00", "EventTime": "2023-10-30T14:00:30.361515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CJEACD4RwL3CHvazk"]} -{"Format": "IDEA0", "ID": "0518b082-75c1-42d8-82e6-48b554d0b22a", "DetectTime": "2023-10-30T14:00:30.381644+02:00", "EventTime": "2023-10-30T14:00:30.381661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CW5McLobXFy24OCfk", "CmTqTo1X7SAoDtcWW9", "CDsBCGljDnLdQeD2d", "C5bc7K2q0FDKNw9LRj"]} -{"Format": "IDEA0", "ID": "067e7d70-50af-4e00-8008-fe5e3d0b7d87", "DetectTime": "2023-10-30T14:00:30.393911+02:00", "EventTime": "2023-10-30T14:00:30.393931+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmTqTo1X7SAoDtcWW9"]} -{"Format": "IDEA0", "ID": "3daf5f01-1915-42d0-9913-b9fd228f1d78", "DetectTime": "2023-10-30T14:00:30.406721+02:00", "EventTime": "2023-10-30T14:00:30.406738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CPQWw42OYK54UpBPa7"]} -{"Format": "IDEA0", "ID": "b7445fc7-072d-4ddd-9884-02d206c3c3d4", "DetectTime": "2023-10-30T14:00:30.426108+02:00", "EventTime": "2023-10-30T14:00:30.426119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CzodD93rru9KpAnff4"]} -{"Format": "IDEA0", "ID": "74cf2929-4069-45e1-a4d7-e9dab05d1720", "DetectTime": "2023-10-30T14:00:30.447561+02:00", "EventTime": "2023-10-30T14:00:30.447584+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2Dcc42OkpAVWqz7Ki"]} -{"Format": "IDEA0", "ID": "b3c9b5d2-dcc7-4cb9-befb-b3b10c87d9ef", "DetectTime": "2023-10-30T14:00:30.463300+02:00", "EventTime": "2023-10-30T14:00:30.463312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["Ce5dIt2128YtsPN5W2"]} -{"Format": "IDEA0", "ID": "ad9b0997-abf7-45bb-8dba-95f79a43d3b6", "DetectTime": "2023-10-30T14:00:30.483084+02:00", "EventTime": "2023-10-30T14:00:30.483101+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cd0tNC41TupmqTGRK1"]} -{"Format": "IDEA0", "ID": "cb58f231-1929-41e7-bcf0-bb6dcb239b42", "DetectTime": "2023-10-30T14:00:30.495456+02:00", "EventTime": "2023-10-30T14:00:30.495468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CLJT302rmXMiJQSSRl"]} -{"Format": "IDEA0", "ID": "8764a845-5a70-4a4e-8d46-93e37938b135", "DetectTime": "2023-10-30T14:00:30.514796+02:00", "EventTime": "2023-10-30T14:00:30.514810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CkV767hptZ9nne9Lj"]} -{"Format": "IDEA0", "ID": "a389add0-9622-4372-827c-0415616ce135", "DetectTime": "2023-10-30T14:00:30.548227+02:00", "EventTime": "2023-10-30T14:00:30.548257+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgYgGlqilTFMGR4ta"]} -{"Format": "IDEA0", "ID": "74c9c89b-6d20-4811-a489-d3a5063e5186", "DetectTime": "2023-10-30T14:00:30.564806+02:00", "EventTime": "2023-10-30T14:00:30.564822+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeBPGR3GBtATZhYUt"]} -{"Format": "IDEA0", "ID": "44530740-8fe8-4005-a10f-fd04d0ba00c9", "DetectTime": "2023-10-30T14:00:30.579653+02:00", "EventTime": "2023-10-30T14:00:30.579680+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C97WsL1XKi4lLRTclb"]} -{"Format": "IDEA0", "ID": "2a7241fc-4bc9-4b30-9ba2-a84273f8b3f7", "DetectTime": "2023-10-30T14:00:30.595287+02:00", "EventTime": "2023-10-30T14:00:30.595307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CIaf0B3Lsfv1WiVGjd"]} -{"Format": "IDEA0", "ID": "2dfb9495-18de-4df9-8053-290073bf199a", "DetectTime": "2023-10-30T14:00:30.614674+02:00", "EventTime": "2023-10-30T14:00:30.614693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["CZ4cPl4M67FWrLXvpd"]} -{"Format": "IDEA0", "ID": "9ca6bebc-e55a-4123-9c67-67f0e9f12677", "DetectTime": "2023-10-30T14:00:30.637264+02:00", "EventTime": "2023-10-30T14:00:30.637286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CrLJuM3YPxhNTcdJEc"]} -{"Format": "IDEA0", "ID": "c70df9e1-3f3b-46ad-9262-fc2d69bd46fc", "DetectTime": "2023-10-30T14:00:30.657192+02:00", "EventTime": "2023-10-30T14:00:30.657213+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFlRY62uY5u27FKoja"]} -{"Format": "IDEA0", "ID": "25ae6fe6-f64e-4056-9e72-cbb697e1a8fb", "DetectTime": "2023-10-30T14:00:30.670911+02:00", "EventTime": "2023-10-30T14:00:30.670933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["Cm6j473i5lR0o3IbGi"]} -{"Format": "IDEA0", "ID": "dd0d54a5-3c03-47fa-bed6-0aee913beea3", "DetectTime": "2023-10-30T14:00:30.689848+02:00", "EventTime": "2023-10-30T14:00:30.689864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkFADh1fuoLFAhBMr3"]} -{"Format": "IDEA0", "ID": "898b97a5-7cb3-44b6-a587-6c4e90aafd81", "DetectTime": "2023-10-30T14:00:30.713495+02:00", "EventTime": "2023-10-30T14:00:30.713511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CNhXur4OSikh88nZg"]} -{"Format": "IDEA0", "ID": "ba8de0c8-7b10-4fe7-8de0-fc02f5d73cbf", "DetectTime": "2023-10-30T14:00:30.735822+02:00", "EventTime": "2023-10-30T14:00:30.735842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CtriPgsvn6kXmaVWd"]} -{"Format": "IDEA0", "ID": "d5a8f08c-04d4-4136-b76d-393312180762", "DetectTime": "2023-10-30T14:00:30.757741+02:00", "EventTime": "2023-10-30T14:00:30.757759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CrC44zQmV9vKqLyvb"]} -{"Format": "IDEA0", "ID": "ffe9a57d-f567-447e-a9c3-ade403a31d8a", "DetectTime": "2023-10-30T14:00:30.780358+02:00", "EventTime": "2023-10-30T14:00:30.780377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CBAFIqdgULryZiGvb"]} -{"Format": "IDEA0", "ID": "28aad226-531e-4fc9-b9eb-b5b974f707c8", "DetectTime": "2023-10-30T14:00:30.800315+02:00", "EventTime": "2023-10-30T14:00:30.800330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CbjhAt4zdY21iR97u5"]} -{"Format": "IDEA0", "ID": "0c92f4eb-06d1-49bc-8961-3152bbac431c", "DetectTime": "2023-10-30T14:00:30.842776+02:00", "EventTime": "2023-10-30T14:00:30.842840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CLOqUp4tKxWj21QvFb"]} -{"Format": "IDEA0", "ID": "0865a454-dd57-429e-b132-a1c9b128cf56", "DetectTime": "2023-10-30T14:00:30.864072+02:00", "EventTime": "2023-10-30T14:00:30.864094+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaT94s3x3FEonaYCTk"]} -{"Format": "IDEA0", "ID": "402d4994-3afb-47e4-9a87-ebc910655bd0", "DetectTime": "2023-10-30T14:00:30.878392+02:00", "EventTime": "2023-10-30T14:00:30.878405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["CwEK632uzeyujcmRag"]} -{"Format": "IDEA0", "ID": "098ee212-e406-4be3-9095-6c421d9dcb3a", "DetectTime": "2023-10-30T14:00:30.901019+02:00", "EventTime": "2023-10-30T14:00:30.901039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cd0tNC41TupmqTGRK1", "CeBPGR3GBtATZhYUt", "CuQPXF2RB3aSWTAQeh", "CFlRY62uY5u27FKoja"]} -{"Format": "IDEA0", "ID": "06861b52-b144-49ae-820d-f0b04abf8ed7", "DetectTime": "2023-10-30T14:00:30.914462+02:00", "EventTime": "2023-10-30T14:00:30.914478+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuQPXF2RB3aSWTAQeh"]} -{"Format": "IDEA0", "ID": "16154f2d-f9e8-438e-8846-39aca85555a3", "DetectTime": "2023-10-30T14:00:30.927081+02:00", "EventTime": "2023-10-30T14:00:30.927100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CqXyOU4vKVe6bh0W1"]} -{"Format": "IDEA0", "ID": "e6e7b9c9-2211-4711-a32f-4f60559cc6d3", "DetectTime": "2023-10-30T14:00:30.951082+02:00", "EventTime": "2023-10-30T14:00:30.951098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.102.120.85 ", "ContentType": "text/plain"}], "uids": ["ChCAlV31eqZEM1GNP3"]} -{"Format": "IDEA0", "ID": "57e983f1-5605-486d-af65-bd2e404eeb45", "DetectTime": "2023-10-30T14:00:30.973917+02:00", "EventTime": "2023-10-30T14:00:30.973929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CQRFgL2R94iv1TA5G4"]} -{"Format": "IDEA0", "ID": "42464121-6a34-4d0a-91b8-53ed86d1334b", "DetectTime": "2023-10-30T14:00:30.991976+02:00", "EventTime": "2023-10-30T14:00:30.991994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.127.137.33 ", "ContentType": "text/plain"}], "uids": ["C8foM847KoS7eFyIh7"]} -{"Format": "IDEA0", "ID": "47dfa3be-a58c-411c-a6f9-f95ecd8d5f2e", "DetectTime": "2023-10-30T14:00:31.013288+02:00", "EventTime": "2023-10-30T14:00:31.013310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["Ckt0CO1R2eIClXjIA4"]} -{"Format": "IDEA0", "ID": "53acdbca-3e24-44f2-aa73-6aa6ce819a83", "DetectTime": "2023-10-30T14:00:31.032519+02:00", "EventTime": "2023-10-30T14:00:31.032535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CccJZfdTHimOepbmf"]} -{"Format": "IDEA0", "ID": "5355064d-ebce-4986-a5a2-7c796cab6f4f", "DetectTime": "2023-10-30T14:00:31.053491+02:00", "EventTime": "2023-10-30T14:00:31.053514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["Ckcgss4OnMerLzO1Qa"]} -{"Format": "IDEA0", "ID": "89451a4c-4a1a-4e90-bf67-d30e1b67e43c", "DetectTime": "2023-10-30T14:00:31.073168+02:00", "EventTime": "2023-10-30T14:00:31.073180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CMC0Yo3jSIB9Njjjdj"]} -{"Format": "IDEA0", "ID": "1f3dfdf1-0ea6-4577-b598-560009b7eafb", "DetectTime": "2023-10-30T14:00:31.090539+02:00", "EventTime": "2023-10-30T14:00:31.090551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CKquHb2o8ffzo9h5s2"]} -{"Format": "IDEA0", "ID": "18a3dad5-1099-4073-9f72-877af114c4b5", "DetectTime": "2023-10-30T14:00:31.108664+02:00", "EventTime": "2023-10-30T14:00:31.108676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CiIM1y2cbDy5zUrIN8"]} -{"Format": "IDEA0", "ID": "b3240bc5-1fdd-4fd1-b9cb-75cf636d436c", "DetectTime": "2023-10-30T14:00:31.126916+02:00", "EventTime": "2023-10-30T14:00:31.126933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CRQswb28ZIWvuhl2Vb"]} -{"Format": "IDEA0", "ID": "1ea8ffd9-dd0d-4030-b599-6f4b523174b4", "DetectTime": "2023-10-30T14:00:31.148383+02:00", "EventTime": "2023-10-30T14:00:31.148400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["COIrXF4RfCajNrVBya"]} -{"Format": "IDEA0", "ID": "a92668c9-136a-42b8-bae5-ad63f87315de", "DetectTime": "2023-10-30T14:00:31.169997+02:00", "EventTime": "2023-10-30T14:00:31.170017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["C9x3w23CRttH4f5lKk"]} -{"Format": "IDEA0", "ID": "2b769761-eb1f-4abd-a036-30edc54b0022", "DetectTime": "2023-10-30T14:00:31.191499+02:00", "EventTime": "2023-10-30T14:00:31.191521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CCfXQe16LYLs2TRcv7"]} -{"Format": "IDEA0", "ID": "1a5f6f9a-c62a-4cc4-9725-69f3590d7799", "DetectTime": "2023-10-30T14:00:31.214667+02:00", "EventTime": "2023-10-30T14:00:31.214682+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRbT9V3ChdRgA8PND5"]} -{"Format": "IDEA0", "ID": "1f5e244a-05c5-4f5b-8c9d-2289868b4533", "DetectTime": "2023-10-30T14:00:31.228730+02:00", "EventTime": "2023-10-30T14:00:31.228747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CbjjCV2HePusZw6eLb"]} -{"Format": "IDEA0", "ID": "875b3f81-f962-4620-9d98-398a46807172", "DetectTime": "2023-10-30T14:00:31.248960+02:00", "EventTime": "2023-10-30T14:00:31.248974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CH9VElhvxVoCVo1t3"]} -{"Format": "IDEA0", "ID": "0abebb49-521a-487f-892e-202bcfb8e5af", "DetectTime": "2023-10-30T14:00:31.270920+02:00", "EventTime": "2023-10-30T14:00:31.270939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfbthJ3te7aVgfji7c"]} -{"Format": "IDEA0", "ID": "3e341cba-c9e9-4255-a565-3542425d4533", "DetectTime": "2023-10-30T14:00:31.282648+02:00", "EventTime": "2023-10-30T14:00:31.282666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["CL2HcJ17QKkCO7cbhg"]} -{"Format": "IDEA0", "ID": "fdc74d4c-16f7-4019-ad3c-011208e42b70", "DetectTime": "2023-10-30T14:00:31.302555+02:00", "EventTime": "2023-10-30T14:00:31.302566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CSL2BN1dBbk50f31Ld"]} -{"Format": "IDEA0", "ID": "aaee7133-5d26-4adf-aefd-d11f8155d77a", "DetectTime": "2023-10-30T14:00:31.324353+02:00", "EventTime": "2023-10-30T14:00:31.324374+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CicMUs4x67b0skcJUc"]} -{"Format": "IDEA0", "ID": "34fbd910-f9f7-4140-ad97-c25d6fe6b494", "DetectTime": "2023-10-30T14:00:31.338496+02:00", "EventTime": "2023-10-30T14:00:31.338516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5UfXl3WHxzxtyPEz3"]} -{"Format": "IDEA0", "ID": "d7a1e6ad-f979-4c91-a5bb-f84c7b1ab3e7", "DetectTime": "2023-10-30T14:00:31.357015+02:00", "EventTime": "2023-10-30T14:00:31.357035+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTvcmJ1BIVz4otuLt3"]} -{"Format": "IDEA0", "ID": "5527eb57-a57b-4234-a34a-94355da4aa79", "DetectTime": "2023-10-30T14:00:31.369191+02:00", "EventTime": "2023-10-30T14:00:31.369213+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CreSUj2D1B6N7i25i"]} -{"Format": "IDEA0", "ID": "22685b02-0d75-477d-8442-663684b4f38d", "DetectTime": "2023-10-30T14:00:31.383741+02:00", "EventTime": "2023-10-30T14:00:31.383759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["CjbxmE3J2Pm0U2gSla"]} -{"Format": "IDEA0", "ID": "e239a54a-ae11-4600-ab32-ea4c12e247bd", "DetectTime": "2023-10-30T14:00:31.404848+02:00", "EventTime": "2023-10-30T14:00:31.404870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CkfQWXR6jLN1760ih"]} -{"Format": "IDEA0", "ID": "3bd3d7a6-eadc-4ae9-accd-6d7009c723b7", "DetectTime": "2023-10-30T14:00:31.427971+02:00", "EventTime": "2023-10-30T14:00:31.427990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["CfxVwgCIIhrQKUuLh"]} -{"Format": "IDEA0", "ID": "e754690a-0652-4c04-9f69-8bdcebe24f6b", "DetectTime": "2023-10-30T14:00:31.451324+02:00", "EventTime": "2023-10-30T14:00:31.451340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CflVhtljYtiK4o5"]} -{"Format": "IDEA0", "ID": "42cd468d-1ee5-4233-9955-ce9a1902e90d", "DetectTime": "2023-10-30T14:00:31.463366+02:00", "EventTime": "2023-10-30T14:00:31.463385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CsMK7jg9FeMEaEBU7"]} -{"Format": "IDEA0", "ID": "f1e44529-51ee-49ee-833a-d62196793c1f", "DetectTime": "2023-10-30T14:00:31.489065+02:00", "EventTime": "2023-10-30T14:00:31.489085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["COPaur2OO9I7c8Ia44"]} -{"Format": "IDEA0", "ID": "38984962-9ec1-4043-8d88-b37dc1cfe185", "DetectTime": "2023-10-30T14:00:31.513015+02:00", "EventTime": "2023-10-30T14:00:31.513032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CQgm6B2yyNqGMcbn1"]} -{"Format": "IDEA0", "ID": "e0e9587d-e5d4-4fa8-b6ad-712152ac65f8", "DetectTime": "2023-10-30T14:00:31.539423+02:00", "EventTime": "2023-10-30T14:00:31.539438+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCd8bM1Xs0dqZQ2Ly6"]} -{"Format": "IDEA0", "ID": "4ab7d1ee-c0fe-4058-94b1-0b82578fb309", "DetectTime": "2023-10-30T14:00:31.549731+02:00", "EventTime": "2023-10-30T14:00:31.549743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CvVh9A1BsaW0YSye71"]} -{"Format": "IDEA0", "ID": "ee8a28f7-0522-4197-96a9-7008bcef9d98", "DetectTime": "2023-10-30T14:00:31.568591+02:00", "EventTime": "2023-10-30T14:00:31.568609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CflVhtljYtiK4o5", "CTvcmJ1BIVz4otuLt3", "CfbthJ3te7aVgfji7c", "C2Vjkx1iVdWoUc0Jgi"]} -{"Format": "IDEA0", "ID": "caeb96ec-eca4-4e2a-8781-b2e2fcd5da8e", "DetectTime": "2023-10-30T14:00:31.578751+02:00", "EventTime": "2023-10-30T14:00:31.578763+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2Vjkx1iVdWoUc0Jgi"]} -{"Format": "IDEA0", "ID": "bd79e06d-41a1-4939-aa8a-f48d4037c2c5", "DetectTime": "2023-10-30T14:00:31.588891+02:00", "EventTime": "2023-10-30T14:00:31.588902+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZuYbc3cUJgvKX2ekk"]} -{"Format": "IDEA0", "ID": "c4d7d4ca-5fad-457e-be0a-6c81a5590e7b", "DetectTime": "2023-10-30T14:00:31.599608+02:00", "EventTime": "2023-10-30T14:00:31.599620+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPkAYg1qsQkfXSHRGh"]} -{"Format": "IDEA0", "ID": "6645bb10-33a6-4fc5-ba4d-de89e8bac335", "DetectTime": "2023-10-30T14:00:31.611598+02:00", "EventTime": "2023-10-30T14:00:31.611612+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUnjLu4ZRPsHqtQAE2"]} -{"Format": "IDEA0", "ID": "cebe5f9f-4148-403b-b401-53aacb591885", "DetectTime": "2023-10-30T14:00:31.623234+02:00", "EventTime": "2023-10-30T14:00:31.623253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CqBefZ1VgQkeVAPJbi"]} -{"Format": "IDEA0", "ID": "693a7418-6ab1-4a36-842a-1fc6b35e13bf", "DetectTime": "2023-10-30T14:00:31.645038+02:00", "EventTime": "2023-10-30T14:00:31.645050+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpzYI237SpG6hhPXad"]} -{"Format": "IDEA0", "ID": "26e1af1d-21f6-452f-a285-8f8053c5847d", "DetectTime": "2023-10-30T14:00:31.658037+02:00", "EventTime": "2023-10-30T14:00:31.658048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["CDfj5r14z9uxoHj1D9"]} -{"Format": "IDEA0", "ID": "d0acd69e-7737-480a-bd31-2fcaa18a3335", "DetectTime": "2023-10-30T14:00:31.678063+02:00", "EventTime": "2023-10-30T14:00:31.678080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CPy7qU10dQoOaekpIh"]} -{"Format": "IDEA0", "ID": "157a6246-e64f-4908-b608-d2cd19394b62", "DetectTime": "2023-10-30T14:00:31.701889+02:00", "EventTime": "2023-10-30T14:00:31.701911+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJjwTKSFJLUp6VJF8"]} -{"Format": "IDEA0", "ID": "57735779-d421-4ff1-b6b5-31d9ac63f493", "DetectTime": "2023-10-30T14:00:31.713763+02:00", "EventTime": "2023-10-30T14:00:31.713779+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5RrlN1GPdUzLx5gQl"]} -{"Format": "IDEA0", "ID": "1b9fd8f8-7c68-4001-a8f8-4220ccbb6435", "DetectTime": "2023-10-30T14:00:31.730709+02:00", "EventTime": "2023-10-30T14:00:31.730728+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNlp2o2g9QzmPZzd0b"]} -{"Format": "IDEA0", "ID": "d51b6cef-098a-4193-853c-e0c7ba0e7c40", "DetectTime": "2023-10-30T14:00:31.745111+02:00", "EventTime": "2023-10-30T14:00:31.745131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5RrlN1GPdUzLx5gQl", "CpzYI237SpG6hhPXad", "CPkAYg1qsQkfXSHRGh", "CLHyvj3Ln7c22MK5C7"]} -{"Format": "IDEA0", "ID": "863915b0-3d3e-4493-bd95-d5383c925f82", "DetectTime": "2023-10-30T14:00:31.757161+02:00", "EventTime": "2023-10-30T14:00:31.757181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLHyvj3Ln7c22MK5C7"]} -{"Format": "IDEA0", "ID": "9e451706-b16a-4f7c-af56-c25248730f78", "DetectTime": "2023-10-30T14:00:31.768502+02:00", "EventTime": "2023-10-30T14:00:31.768521+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxYkF02Q55A0XTh371"]} -{"Format": "IDEA0", "ID": "8f281ccd-daaa-4a8f-ba78-7a05b5fc74d7", "DetectTime": "2023-10-30T14:00:31.784790+02:00", "EventTime": "2023-10-30T14:00:31.784812+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cc0G5R3gZQACHS3ng"]} -{"Format": "IDEA0", "ID": "22016a78-1fa4-4162-b7bf-8d51b3af4a22", "DetectTime": "2023-10-30T14:00:31.800272+02:00", "EventTime": "2023-10-30T14:00:31.800295+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPz3bi3IowX6AWhdz5"]} -{"Format": "IDEA0", "ID": "0774902d-548f-43a5-9a7b-f221fa4616f1", "DetectTime": "2023-10-30T14:00:31.816653+02:00", "EventTime": "2023-10-30T14:00:31.816674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["CQ1MM62fjGswlyhED3"]} -{"Format": "IDEA0", "ID": "504aa50a-8c06-4f66-a45a-f6c6e1e0b915", "DetectTime": "2023-10-30T14:00:31.865488+02:00", "EventTime": "2023-10-30T14:00:31.865501+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJHnjK3YjVVbaUB9u6"]} -{"Format": "IDEA0", "ID": "19e03e77-2992-4f54-82eb-3326f6100c16", "DetectTime": "2023-10-30T14:00:31.878190+02:00", "EventTime": "2023-10-30T14:00:31.878210+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBELTTwxz7o7MpfCj"]} -{"Format": "IDEA0", "ID": "e4d1f895-7084-4b9e-bd90-5761311952e9", "DetectTime": "2023-10-30T14:00:31.893070+02:00", "EventTime": "2023-10-30T14:00:31.893087+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmV7mo6n3Q8t6coOk"]} -{"Format": "IDEA0", "ID": "360bec22-e5fa-4d14-8b12-436727e3fcc8", "DetectTime": "2023-10-30T14:00:31.908609+02:00", "EventTime": "2023-10-30T14:00:31.908629+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChWfSo34VO1YdBByXk"]} -{"Format": "IDEA0", "ID": "e36b4ec2-1b8f-4a5e-8b1f-47c70602a199", "DetectTime": "2023-10-30T14:00:31.924041+02:00", "EventTime": "2023-10-30T14:00:31.924059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cc0G5R3gZQACHS3ng", "CmV7mo6n3Q8t6coOk", "Cy3bct4OubxhGQAgni", "CJHnjK3YjVVbaUB9u6"]} -{"Format": "IDEA0", "ID": "04d9e02d-c60e-43bd-a5ba-d7d13afae2c4", "DetectTime": "2023-10-30T14:00:31.935852+02:00", "EventTime": "2023-10-30T14:00:31.935867+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cy3bct4OubxhGQAgni"]} -{"Format": "IDEA0", "ID": "3ef1c75e-609c-4a4f-8aad-8aa004004e93", "DetectTime": "2023-10-30T14:00:31.950690+02:00", "EventTime": "2023-10-30T14:00:31.950709+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CB2hP61EhUpCjgqADh"]} -{"Format": "IDEA0", "ID": "90d3d7c9-5c72-4f98-9a02-9d866fcafa93", "DetectTime": "2023-10-30T14:00:31.964830+02:00", "EventTime": "2023-10-30T14:00:31.964850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["C7EIpB4m5AxXuJcQ2"]} -{"Format": "IDEA0", "ID": "74b1e172-76e6-4322-8b4f-04d70b2088b3", "DetectTime": "2023-10-30T14:00:31.994933+02:00", "EventTime": "2023-10-30T14:00:31.994950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.40.169.168 ", "ContentType": "text/plain"}], "uids": ["CGDN0n2xtYXfpJGIFh"]} -{"Format": "IDEA0", "ID": "aaf3774f-a365-4862-9a0b-27f86edcd392", "DetectTime": "2023-10-30T14:00:32.027173+02:00", "EventTime": "2023-10-30T14:00:32.027199+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CK2f1c4V1nOAKTIBJ1"]} -{"Format": "IDEA0", "ID": "d03df8b4-5a61-4cd8-a33a-057945404bc9", "DetectTime": "2023-10-30T14:00:32.042285+02:00", "EventTime": "2023-10-30T14:00:32.042302+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2kXxo1xpIE3wfvWb1"]} -{"Format": "IDEA0", "ID": "9d1b0986-e44b-4a88-8d79-a6a02f2e9dbd", "DetectTime": "2023-10-30T14:00:32.055454+02:00", "EventTime": "2023-10-30T14:00:32.055471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.121.50.50 ", "ContentType": "text/plain"}], "uids": ["CifnXC2gUASpp4bSb7"]} -{"Format": "IDEA0", "ID": "efc917ca-9f0a-48c7-832b-421ec8b95cc3", "DetectTime": "2023-10-30T14:00:32.083263+02:00", "EventTime": "2023-10-30T14:00:32.083280+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTlTz616hhEvQekN9h"]} -{"Format": "IDEA0", "ID": "ec3b2bf7-df97-4a9d-83d3-d81a00121dbb", "DetectTime": "2023-10-30T14:00:32.097274+02:00", "EventTime": "2023-10-30T14:00:32.097291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["C00Mq01sGw3aGoH024"]} -{"Format": "IDEA0", "ID": "57e20e8c-6354-4d45-bb63-da9a4dac2651", "DetectTime": "2023-10-30T14:00:32.125871+02:00", "EventTime": "2023-10-30T14:00:32.125884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CDxQEN1MzzCGCgdHmi"]} -{"Format": "IDEA0", "ID": "c37198bd-6cdd-4a7a-85c3-cf8d1b2023b9", "DetectTime": "2023-10-30T14:00:32.152147+02:00", "EventTime": "2023-10-30T14:00:32.152159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CVfJRs4akvaDJT0gG"]} -{"Format": "IDEA0", "ID": "0f3b670b-d280-4ba6-ba56-d77a1b0a2c75", "DetectTime": "2023-10-30T14:00:32.177858+02:00", "EventTime": "2023-10-30T14:00:32.177872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CdyC1D4WVJPTpioBp5"]} -{"Format": "IDEA0", "ID": "71a9225e-603b-46c0-a314-768c5506b6a1", "DetectTime": "2023-10-30T14:00:32.207468+02:00", "EventTime": "2023-10-30T14:00:32.207480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["Cxdtvx3oerauTJwPVk"]} -{"Format": "IDEA0", "ID": "9b7ae4ef-9a20-4a0e-a023-b4695ad742e6", "DetectTime": "2023-10-30T14:00:32.236816+02:00", "EventTime": "2023-10-30T14:00:32.236829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["CSGesZ17MWylier8c3"]} -{"Format": "IDEA0", "ID": "86e4d4da-480c-4495-80ca-84734fec3e16", "DetectTime": "2023-10-30T14:00:32.263495+02:00", "EventTime": "2023-10-30T14:00:32.263506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CZwEpJ882GUhK4aHl"]} -{"Format": "IDEA0", "ID": "b20ca631-a822-439d-becf-45abd9a58bdc", "DetectTime": "2023-10-30T14:00:32.290576+02:00", "EventTime": "2023-10-30T14:00:32.290600+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHWd4G1oElazd1KLad"]} -{"Format": "IDEA0", "ID": "d17acd9c-8394-4fb6-a7e2-57a72a22a2fc", "DetectTime": "2023-10-30T14:00:32.304760+02:00", "EventTime": "2023-10-30T14:00:32.304784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CVgig81B0CJs4QRwbb"]} -{"Format": "IDEA0", "ID": "874a9509-9fbd-4aaa-81ad-4d1eb51a48dc", "DetectTime": "2023-10-30T14:00:32.334970+02:00", "EventTime": "2023-10-30T14:00:32.334986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["CPjRWN3mJbepHEGIg2"]} -{"Format": "IDEA0", "ID": "fd95b08d-f466-490c-b5ae-983fe904ed7e", "DetectTime": "2023-10-30T14:00:32.365926+02:00", "EventTime": "2023-10-30T14:00:32.365947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CSR6Gf2UR84AMrrP4"]} -{"Format": "IDEA0", "ID": "0f8cae16-97eb-49b8-8a26-a1d744693ced", "DetectTime": "2023-10-30T14:00:32.396908+02:00", "EventTime": "2023-10-30T14:00:32.396920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.37.198.197 ", "ContentType": "text/plain"}], "uids": ["CYk5j321QYbbRAvJbb"]} -{"Format": "IDEA0", "ID": "3bb1f5cb-4ccb-4f9d-b0af-cb089099a83c", "DetectTime": "2023-10-30T14:00:32.421024+02:00", "EventTime": "2023-10-30T14:00:32.421041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CJ14RP1k0Tc72CUD0g"]} -{"Format": "IDEA0", "ID": "d1e3e8ee-01a4-42c9-83d4-caec2e2c1ba6", "DetectTime": "2023-10-30T14:00:32.444705+02:00", "EventTime": "2023-10-30T14:00:32.444716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["C1qNeS3NGxRTaXuovl"]} -{"Format": "IDEA0", "ID": "2e622bf6-751e-4c0f-9c4d-dadad412aa53", "DetectTime": "2023-10-30T14:00:32.474009+02:00", "EventTime": "2023-10-30T14:00:32.474031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["CwXE4x3YJD0dtoxMsl"]} -{"Format": "IDEA0", "ID": "5e967e42-75d2-439b-8014-3206b17ca653", "DetectTime": "2023-10-30T14:00:32.503058+02:00", "EventTime": "2023-10-30T14:00:32.503075+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CA2HgW199ZCQWHLICg"]} -{"Format": "IDEA0", "ID": "c8a73d60-fd0b-45eb-90ec-b8b1f0c410e7", "DetectTime": "2023-10-30T14:00:32.512491+02:00", "EventTime": "2023-10-30T14:00:32.512509+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdKQCf4EmqBoqvSD02"]} -{"Format": "IDEA0", "ID": "6b323eca-3df4-4164-a320-b4315e65e605", "DetectTime": "2023-10-30T14:00:32.523352+02:00", "EventTime": "2023-10-30T14:00:32.523372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["Cb9r1evJdeYCof9"]} -{"Format": "IDEA0", "ID": "c6cbd01f-f482-442a-a9c0-c99c3a2a1dca", "DetectTime": "2023-10-30T14:00:32.553381+02:00", "EventTime": "2023-10-30T14:00:32.553404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["CkJRcX16Hg1r8AwqT4"]} -{"Format": "IDEA0", "ID": "93e830b9-10cb-472b-8701-fc005b43ebc8", "DetectTime": "2023-10-30T14:00:32.586211+02:00", "EventTime": "2023-10-30T14:00:32.586232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CJUXDs1eGJ6lJnZ11"]} -{"Format": "IDEA0", "ID": "d8a4fb55-6ffa-4cb7-a992-f8d5edff920d", "DetectTime": "2023-10-30T14:00:32.620965+02:00", "EventTime": "2023-10-30T14:00:32.620982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CTlTz616hhEvQekN9h", "CWtqzI3mVIwlTZ0pJc", "CA2HgW199ZCQWHLICg", "CK2f1c4V1nOAKTIBJ1"]} -{"Format": "IDEA0", "ID": "7449c5f6-3dc2-4752-97df-d79e1e8f6b03", "DetectTime": "2023-10-30T14:00:32.632367+02:00", "EventTime": "2023-10-30T14:00:32.632387+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWtqzI3mVIwlTZ0pJc"]} -{"Format": "IDEA0", "ID": "e30424f5-4103-4309-afa2-4b03080195c9", "DetectTime": "2023-10-30T14:00:32.644139+02:00", "EventTime": "2023-10-30T14:00:32.644156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["ChsFOi4hGdu2lRJigh"]} -{"Format": "IDEA0", "ID": "c0b61516-fba8-451b-84c6-72ae1a9a3d95", "DetectTime": "2023-10-30T14:00:32.678988+02:00", "EventTime": "2023-10-30T14:00:32.679008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["CHz80DSnSI5aMokd9"]} -{"Format": "IDEA0", "ID": "1139a8be-f1f6-4016-be9b-d9e39a8c2708", "DetectTime": "2023-10-30T14:00:32.708139+02:00", "EventTime": "2023-10-30T14:00:32.708163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSA7Pk2svH0fINaRC3"]} -{"Format": "IDEA0", "ID": "edd57c45-aae4-4cda-8247-b9215700479f", "DetectTime": "2023-10-30T14:00:32.719951+02:00", "EventTime": "2023-10-30T14:00:32.719971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.6.122.34 ", "ContentType": "text/plain"}], "uids": ["C8Jc8e2AJrwL5B2UW7"]} -{"Format": "IDEA0", "ID": "7e0f0ed1-2f5e-4db7-ac07-fba09caa3fe5", "DetectTime": "2023-10-30T14:00:32.748868+02:00", "EventTime": "2023-10-30T14:00:32.748884+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.165.6.146"], "Hostname": ["adsl190-165-6-146.epm.net.co Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.165.6.146 from 10.0.2.19. blacklisted IP AS: EPM Telecomunicaciones S.A. E.S.P., CO AS13489 rDNS: adsl190-165-6-146.epm.net.co Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CJgUU9v9TWYWqp5m6"]} -{"Format": "IDEA0", "ID": "c122b309-6843-4228-9e4e-9afed51cfd3c", "DetectTime": "2023-10-30T14:00:32.783715+02:00", "EventTime": "2023-10-30T14:00:32.783730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CGxr4o26A540hPrMp9"]} -{"Format": "IDEA0", "ID": "dd30434f-3a38-46bc-b9c9-7303b96e1fb4", "DetectTime": "2023-10-30T14:00:32.811781+02:00", "EventTime": "2023-10-30T14:00:32.811792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CD0GR320INfew7H8N7"]} -{"Format": "IDEA0", "ID": "a3a04cb1-1231-4416-b833-47b371a0b883", "DetectTime": "2023-10-30T14:00:32.837912+02:00", "EventTime": "2023-10-30T14:00:32.837929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CD5zfz1N9rHjA8FJZg"]} -{"Format": "IDEA0", "ID": "9b27b5f9-d8b0-4572-9046-b5b88e8935b2", "DetectTime": "2023-10-30T14:00:32.862704+02:00", "EventTime": "2023-10-30T14:00:32.862721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CvHi0E2Xwp1eeRIynh"]} -{"Format": "IDEA0", "ID": "230f899f-91f1-4dbc-a8d1-9d02c2de3d5b", "DetectTime": "2023-10-30T14:00:32.887803+02:00", "EventTime": "2023-10-30T14:00:32.887819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5W16b2Zsj2QRyurk7"]} -{"Format": "IDEA0", "ID": "67c441e0-a744-4f7d-b0f6-0911cb19f009", "DetectTime": "2023-10-30T14:00:32.913142+02:00", "EventTime": "2023-10-30T14:00:32.913162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.214.216.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.214.216.239 ", "ContentType": "text/plain"}], "uids": ["C83FaCHZNg9dvvrrh"]} -{"Format": "IDEA0", "ID": "ee4c0b1a-ab0c-4283-b884-89aadbf65d01", "DetectTime": "2023-10-30T14:00:32.943240+02:00", "EventTime": "2023-10-30T14:00:32.943257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.79.75.84 ", "ContentType": "text/plain"}], "uids": ["CmOAAy4Jvtl5xNa6j"]} -{"Format": "IDEA0", "ID": "be3a0b91-fa31-4815-a8e5-69f7faaa98e6", "DetectTime": "2023-10-30T14:00:32.973798+02:00", "EventTime": "2023-10-30T14:00:32.973814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["CBUUE91QtZjbOZKJGc"]} -{"Format": "IDEA0", "ID": "d65713f5-32cc-42d7-9405-20c94bc58804", "DetectTime": "2023-10-30T14:00:33.002612+02:00", "EventTime": "2023-10-30T14:00:33.002639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.243.93 ", "ContentType": "text/plain"}], "uids": ["C4oUZW1hMDfq5vuzv2"]} -{"Format": "IDEA0", "ID": "9f98aed3-3c2a-47c6-80dd-bae91c27490a", "DetectTime": "2023-10-30T14:00:33.031096+02:00", "EventTime": "2023-10-30T14:00:33.031117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.26.189.165 ", "ContentType": "text/plain"}], "uids": ["CY7pjt3DYJ3jhyh5S2"]} -{"Format": "IDEA0", "ID": "f61dc4b7-d791-4922-95fa-586e628ab698", "DetectTime": "2023-10-30T14:00:33.059254+02:00", "EventTime": "2023-10-30T14:00:33.059266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.238.0 ", "ContentType": "text/plain"}], "uids": ["CZRtuC25HdgZghndx8"]} -{"Format": "IDEA0", "ID": "22aeb209-8be3-45f3-8a24-417f8ccc33c2", "DetectTime": "2023-10-30T14:00:33.085308+02:00", "EventTime": "2023-10-30T14:00:33.085324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.161.209.67 ", "ContentType": "text/plain"}], "uids": ["CbCdPu1yaNx8GkKjf7"]} -{"Format": "IDEA0", "ID": "a83404b9-c1ae-4816-9965-392b3e73cc64", "DetectTime": "2023-10-30T14:00:33.112897+02:00", "EventTime": "2023-10-30T14:00:33.112911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.156.174.151 ", "ContentType": "text/plain"}], "uids": ["CWzI2A32kzNnvLEoO3"]} -{"Format": "IDEA0", "ID": "ed261a91-e33b-476b-8f1a-b1eeaec277f5", "DetectTime": "2023-10-30T14:00:33.138144+02:00", "EventTime": "2023-10-30T14:00:33.138162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.77.164 ", "ContentType": "text/plain"}], "uids": ["CesR3i1nDDZvJHuCkd"]} -{"Format": "IDEA0", "ID": "ea54b68a-e03b-405f-93c0-c606304c2164", "DetectTime": "2023-10-30T14:00:33.167578+02:00", "EventTime": "2023-10-30T14:00:33.167599+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQvyV52OfCTvxdE1e"]} -{"Format": "IDEA0", "ID": "8b005836-e5e4-4f54-a8e0-9974a0652caa", "DetectTime": "2023-10-30T14:00:33.180080+02:00", "EventTime": "2023-10-30T14:00:33.180103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.196.220.248 ", "ContentType": "text/plain"}], "uids": ["CbWlgO1y7399j5CfTl"]} -{"Format": "IDEA0", "ID": "6b673d50-89f5-4312-8e2d-a42b55e6c0fc", "DetectTime": "2023-10-30T14:00:33.215520+02:00", "EventTime": "2023-10-30T14:00:33.215536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.75.180.21 ", "ContentType": "text/plain"}], "uids": ["Cfdhbd3qud3auN31Qa"]} -{"Format": "IDEA0", "ID": "7826c370-157e-4606-9316-91d1356933ec", "DetectTime": "2023-10-30T14:00:33.242852+02:00", "EventTime": "2023-10-30T14:00:33.242869+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClfxAo3ettrX6lvqYe"]} -{"Format": "IDEA0", "ID": "79198864-1af9-445d-b963-887b4b0722cc", "DetectTime": "2023-10-30T14:00:33.251725+02:00", "EventTime": "2023-10-30T14:00:33.251738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.64.162.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.64.162.117 ", "ContentType": "text/plain"}], "uids": ["CbB8jFSGX8jK21iW1"]} -{"Format": "IDEA0", "ID": "3d58a403-6a37-4e13-b3f7-3cbee85e720d", "DetectTime": "2023-10-30T14:00:33.281627+02:00", "EventTime": "2023-10-30T14:00:33.281641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.152.23.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.152.23.249 ", "ContentType": "text/plain"}], "uids": ["CdEFEMp27aCJbeHld"]} -{"Format": "IDEA0", "ID": "dc9308ec-8761-4ad3-a72a-301353366ecf", "DetectTime": "2023-10-30T14:00:33.309171+02:00", "EventTime": "2023-10-30T14:00:33.309188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.9.50 ", "ContentType": "text/plain"}], "uids": ["Cu60Eu176i3tI54g6c"]} -{"Format": "IDEA0", "ID": "dd97f335-b40e-43cd-a7c2-87e8dcdfdf72", "DetectTime": "2023-10-30T14:00:33.335948+02:00", "EventTime": "2023-10-30T14:00:33.335970+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqOBcZ2loWZ6BGVW2i"]} -{"Format": "IDEA0", "ID": "872fc5df-1043-4f49-8fb4-e737f39e4841", "DetectTime": "2023-10-30T14:00:33.347946+02:00", "EventTime": "2023-10-30T14:00:33.347966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.168.6 ", "ContentType": "text/plain"}], "uids": ["C3mBL541PmtTbN3eS2"]} -{"Format": "IDEA0", "ID": "3ac3a064-edef-47bb-bc49-2633ecd3a39e", "DetectTime": "2023-10-30T14:00:33.376791+02:00", "EventTime": "2023-10-30T14:00:33.376802+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwY0Pk4rqETczQztMc"]} -{"Format": "IDEA0", "ID": "e5888312-906f-4534-aa13-b0e0da23e47f", "DetectTime": "2023-10-30T14:00:33.385682+02:00", "EventTime": "2023-10-30T14:00:33.385705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.133.83.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.133.83.119 ", "ContentType": "text/plain"}], "uids": ["CL5zBi4bVucRG5X074"]} -{"Format": "IDEA0", "ID": "cbccddec-a782-4dad-84a3-a8c3c3e15ba4", "DetectTime": "2023-10-30T14:00:33.416621+02:00", "EventTime": "2023-10-30T14:00:33.416633+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CCiQDh2uFJb09HdD38"]} -{"Format": "IDEA0", "ID": "b9ecf5af-5309-4af7-b1fb-7efa74b0651a", "DetectTime": "2023-10-30T14:00:33.455265+02:00", "EventTime": "2023-10-30T14:00:33.455276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.105.251.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.105.251.166 ", "ContentType": "text/plain"}], "uids": ["CPQfzd1oqPLct5y6ii"]} -{"Format": "IDEA0", "ID": "2eb08ef0-8697-44fb-b34b-1d6d366ecafb", "DetectTime": "2023-10-30T14:00:33.484481+02:00", "EventTime": "2023-10-30T14:00:33.484499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.80.247.223 ", "ContentType": "text/plain"}], "uids": ["CbUjlq3qxXRBYqQqX2"]} -{"Format": "IDEA0", "ID": "d3046481-f1c1-41d5-a47f-b69c52d8bcb7", "DetectTime": "2023-10-30T14:00:33.512613+02:00", "EventTime": "2023-10-30T14:00:33.512625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.246.172.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.246.172.98 ", "ContentType": "text/plain"}], "uids": ["CJClmG4MrljBi94or2"]} -{"Format": "IDEA0", "ID": "636b730e-78cd-4a02-9c3e-c174cd67c8c4", "DetectTime": "2023-10-30T14:00:33.542429+02:00", "EventTime": "2023-10-30T14:00:33.542448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.148.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.148.5 ", "ContentType": "text/plain"}], "uids": ["C0niBG1EZmshVjraFe"]} -{"Format": "IDEA0", "ID": "463f4869-a0ec-475e-ae00-45fab105570c", "DetectTime": "2023-10-30T14:00:33.575282+02:00", "EventTime": "2023-10-30T14:00:33.575299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.64.148.78 ", "ContentType": "text/plain"}], "uids": ["CZofYy30TySOPak8K9"]} -{"Format": "IDEA0", "ID": "cc19e79b-cbf2-4092-9a01-8f69467edfcd", "DetectTime": "2023-10-30T14:00:33.606217+02:00", "EventTime": "2023-10-30T14:00:33.606234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.96.97.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.96.97.217 ", "ContentType": "text/plain"}], "uids": ["C1UDtZ1hkVqXyMRFG5"]} -{"Format": "IDEA0", "ID": "240a79a5-acc6-4697-a9c8-23f1ec980c02", "DetectTime": "2023-10-30T14:00:33.632281+02:00", "EventTime": "2023-10-30T14:00:33.632298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.193.223 ", "ContentType": "text/plain"}], "uids": ["CCLKBNrk3SQ1VMqae"]} -{"Format": "IDEA0", "ID": "f4d00634-736e-49b7-9166-d9e386ad58b0", "DetectTime": "2023-10-30T14:00:33.661644+02:00", "EventTime": "2023-10-30T14:00:33.661660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.162.43.171"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.162.43.171 ", "ContentType": "text/plain"}], "uids": ["C07ceU3KLJDPqsZR37"]} -{"Format": "IDEA0", "ID": "d06cf049-eda7-4dd5-be98-a7cf1c597ceb", "DetectTime": "2023-10-30T14:00:33.691675+02:00", "EventTime": "2023-10-30T14:00:33.691691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.103.123.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.103.123.234 ", "ContentType": "text/plain"}], "uids": ["Cg55SnAwSkt0XyDk5"]} -{"Format": "IDEA0", "ID": "31107355-7992-4ab7-926d-5084ce7808fd", "DetectTime": "2023-10-30T14:00:33.722961+02:00", "EventTime": "2023-10-30T14:00:33.722978+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDkZX44vSZfu1txlxa"]} -{"Format": "IDEA0", "ID": "f21057a6-a379-4f3c-aaee-89344a76097d", "DetectTime": "2023-10-30T14:00:33.734442+02:00", "EventTime": "2023-10-30T14:00:33.734459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.148.51.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.148.51.180 ", "ContentType": "text/plain"}], "uids": ["ClwCzycrqBqtyWaSi"]} -{"Format": "IDEA0", "ID": "e4645ed7-78fa-4dcb-9b1b-50bf25191c23", "DetectTime": "2023-10-30T14:00:33.763294+02:00", "EventTime": "2023-10-30T14:00:33.763316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.150.49 ", "ContentType": "text/plain"}], "uids": ["CbXdqh13s7yuPDCnxg"]} -{"Format": "IDEA0", "ID": "1528f4a5-e64b-4163-9fbd-ea56aa44cd59", "DetectTime": "2023-10-30T14:00:33.788583+02:00", "EventTime": "2023-10-30T14:00:33.788601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["CSwukK2v82L3rRNtB"]} -{"Format": "IDEA0", "ID": "05c159c5-cff4-457f-9c1a-17e1a3583d20", "DetectTime": "2023-10-30T14:00:33.816513+02:00", "EventTime": "2023-10-30T14:00:33.816533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["61.114.81.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 61.114.81.227 ", "ContentType": "text/plain"}], "uids": ["C1DCRQ2waWF0tMjvh4"]} -{"Format": "IDEA0", "ID": "048ac818-bb6c-4e94-a143-475f4e0355b3", "DetectTime": "2023-10-30T14:00:33.846238+02:00", "EventTime": "2023-10-30T14:00:33.846250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.25.1.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.25.1.180 ", "ContentType": "text/plain"}], "uids": ["CJ4nqm1iWpAaF1zLq1"]} -{"Format": "IDEA0", "ID": "7731289f-5391-4827-a65c-4f3c7f21e59e", "DetectTime": "2023-10-30T14:00:33.873128+02:00", "EventTime": "2023-10-30T14:00:33.873141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.166.163.154 ", "ContentType": "text/plain"}], "uids": ["CRjCMF1soGGhtBYI4"]} -{"Format": "IDEA0", "ID": "7a1e3360-9edf-4045-954d-174d4c8c818d", "DetectTime": "2023-10-30T14:00:33.897687+02:00", "EventTime": "2023-10-30T14:00:33.897704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKTPQL3beACsTNRNMe"]} -{"Format": "IDEA0", "ID": "87d93e66-7edd-45df-bad2-e2e78de193b4", "DetectTime": "2023-10-30T14:00:33.922354+02:00", "EventTime": "2023-10-30T14:00:33.922368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CS1rkg1OzEMR8tUJzj"]} -{"Format": "IDEA0", "ID": "68885c10-f30e-4dca-94f9-87b2fc55b176", "DetectTime": "2023-10-30T14:00:33.947191+02:00", "EventTime": "2023-10-30T14:00:33.947204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.134.33.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.134.33.26 ", "ContentType": "text/plain"}], "uids": ["C9YT1Z1KVBdbHl27Ui"]} -{"Format": "IDEA0", "ID": "8462ddb4-2ffb-4ec7-b814-f96b90fec8e6", "DetectTime": "2023-10-30T14:00:33.973008+02:00", "EventTime": "2023-10-30T14:00:33.973019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSjKDT3XSOc4H2nHL5"]} -{"Format": "IDEA0", "ID": "f5ea5122-fa8f-459d-a785-350fe9002244", "DetectTime": "2023-10-30T14:00:33.997997+02:00", "EventTime": "2023-10-30T14:00:33.998018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.147.159.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.147.159.1 ", "ContentType": "text/plain"}], "uids": ["C6dReoOCaaA0BWr4i"]} -{"Format": "IDEA0", "ID": "4b24a100-1420-49dc-bee0-b2e469941eff", "DetectTime": "2023-10-30T14:00:34.027565+02:00", "EventTime": "2023-10-30T14:00:34.027582+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiwGn04Cf5oVwih7Kd"]} -{"Format": "IDEA0", "ID": "b645f689-2cb2-4a09-b7b8-f055ca6bfae6", "DetectTime": "2023-10-30T14:00:34.038064+02:00", "EventTime": "2023-10-30T14:00:34.038086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.75.115.103 ", "ContentType": "text/plain"}], "uids": ["CTgCM33D7GfpPSvZd"]} -{"Format": "IDEA0", "ID": "3f3dbbe9-9d1a-4b29-a4c3-9f5f1b45ddd7", "DetectTime": "2023-10-30T14:00:34.068410+02:00", "EventTime": "2023-10-30T14:00:34.068422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["COHFHP1Gj5eSBJhBgj"]} -{"Format": "IDEA0", "ID": "a7665f7f-6bab-4f97-a23c-fbced7fb51f1", "DetectTime": "2023-10-30T14:00:34.093947+02:00", "EventTime": "2023-10-30T14:00:34.093964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["208.180.143.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 208.180.143.44 ", "ContentType": "text/plain"}], "uids": ["C1Cw2pMRt71Me96G9"]} -{"Format": "IDEA0", "ID": "d5fec6ef-ea32-48fc-aa53-8b7ed5f3eafd", "DetectTime": "2023-10-30T14:00:34.122653+02:00", "EventTime": "2023-10-30T14:00:34.122674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDkZX44vSZfu1txlxa", "CS0kru1zDjZvHStpvh", "CqOBcZ2loWZ6BGVW2i", "CQvyV52OfCTvxdE1e"]} -{"Format": "IDEA0", "ID": "17a1c1ae-3d1f-447c-88ec-f282d65fa5bb", "DetectTime": "2023-10-30T14:00:34.132242+02:00", "EventTime": "2023-10-30T14:00:34.132254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["C5nKrL3Hsjx1WSVpa9"]} -{"Format": "IDEA0", "ID": "ea9731a3-2f0e-454c-9f24-a6d902e4db55", "DetectTime": "2023-10-30T14:00:34.161566+02:00", "EventTime": "2023-10-30T14:00:34.161593+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CS0kru1zDjZvHStpvh"]} -{"Format": "IDEA0", "ID": "a6977b42-53a7-4745-8692-7cfbd629d6ff", "DetectTime": "2023-10-30T14:00:34.172574+02:00", "EventTime": "2023-10-30T14:00:34.172585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CEVLfkHmyQiZYnoBa"]} -{"Format": "IDEA0", "ID": "914b220c-7512-414c-a7cf-b9dd0e48afe1", "DetectTime": "2023-10-30T14:00:34.196004+02:00", "EventTime": "2023-10-30T14:00:34.196021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.239.58.25 ", "ContentType": "text/plain"}], "uids": ["C4T1bo3Dka1pvycjs"]} -{"Format": "IDEA0", "ID": "3871a24b-350f-4ae3-ac2f-d1d16f57c718", "DetectTime": "2023-10-30T14:00:34.222558+02:00", "EventTime": "2023-10-30T14:00:34.222571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.238.214.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.238.214.94 ", "ContentType": "text/plain"}], "uids": ["CUzCz716UYnlpWEDu7"]} -{"Format": "IDEA0", "ID": "2730e73e-7ec6-40d9-84dc-2290a8dea698", "DetectTime": "2023-10-30T14:00:34.248820+02:00", "EventTime": "2023-10-30T14:00:34.248834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.185.52.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.185.52.242 ", "ContentType": "text/plain"}], "uids": ["Cv5qsIUD4LxDzea32"]} -{"Format": "IDEA0", "ID": "a8154a52-0cf8-4613-b539-9bdfec92f232", "DetectTime": "2023-10-30T14:00:34.280111+02:00", "EventTime": "2023-10-30T14:00:34.280132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.210.104.179 ", "ContentType": "text/plain"}], "uids": ["C87oZz32AfPhwbaFb1"]} -{"Format": "IDEA0", "ID": "2fb3ef16-7054-4648-a90c-e4be98b4d587", "DetectTime": "2023-10-30T14:00:34.309908+02:00", "EventTime": "2023-10-30T14:00:34.309926+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRKBBD1HtDI9gG6Kq3"]} -{"Format": "IDEA0", "ID": "f03a133b-d112-49e3-90a5-251e436d2707", "DetectTime": "2023-10-30T14:00:34.322859+02:00", "EventTime": "2023-10-30T14:00:34.322876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"], "Hostname": ["108-234-133-110.lightspeed.milwwi.sbcglobal.net"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net", "ContentType": "text/plain"}], "uids": ["C1UbnIPwx6dYJGj0f"]} -{"Format": "IDEA0", "ID": "c21fac27-b4b0-46a7-b29a-b8a3f5888bac", "DetectTime": "2023-10-30T14:00:34.355536+02:00", "EventTime": "2023-10-30T14:00:34.355555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CYqwXK2GiSMGDtLxnc"]} -{"Format": "IDEA0", "ID": "93e15d65-73a3-41cb-9254-e5e5d6852db9", "DetectTime": "2023-10-30T14:00:34.381120+02:00", "EventTime": "2023-10-30T14:00:34.381131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CKlqwu8wQsAkr77Eg"]} -{"Format": "IDEA0", "ID": "506fbef0-1a06-4a93-b12d-20bc0f6fb885", "DetectTime": "2023-10-30T14:00:34.402651+02:00", "EventTime": "2023-10-30T14:00:34.402668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKBO1bnhczSp7PzAa"]} -{"Format": "IDEA0", "ID": "3c51753a-d7e2-4a47-a500-c4477e1ee96f", "DetectTime": "2023-10-30T14:00:34.412910+02:00", "EventTime": "2023-10-30T14:00:34.412926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CvtlBC1fhqXriG9nLd"]} -{"Format": "IDEA0", "ID": "ab9de03e-6912-4b0d-82fc-3580ae4ad1f0", "DetectTime": "2023-10-30T14:00:34.432009+02:00", "EventTime": "2023-10-30T14:00:34.432025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.1.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.1.247 ", "ContentType": "text/plain"}], "uids": ["CHLWDJ2VhtnTaM2Tb7"]} -{"Format": "IDEA0", "ID": "a4e3d7bc-b360-4e5a-9c17-b0f285e2f92b", "DetectTime": "2023-10-30T14:00:34.460422+02:00", "EventTime": "2023-10-30T14:00:34.460441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["C0HHTB48zlYFRmq2g"]} -{"Format": "IDEA0", "ID": "009821f4-7299-4b25-87f6-caae3678c1f5", "DetectTime": "2023-10-30T14:00:34.491562+02:00", "EventTime": "2023-10-30T14:00:34.491580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.64.215.24 ", "ContentType": "text/plain"}], "uids": ["CMpqB8AdPw4HwgWuj"]} -{"Format": "IDEA0", "ID": "d2f7dab6-7d6a-406b-bcc9-115a03c77078", "DetectTime": "2023-10-30T14:00:34.518502+02:00", "EventTime": "2023-10-30T14:00:34.518520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6q4eK2YACjLczFGW6"]} -{"Format": "IDEA0", "ID": "99511828-4e67-4138-b43c-5835c2ee853d", "DetectTime": "2023-10-30T14:00:34.548324+02:00", "EventTime": "2023-10-30T14:00:34.548345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.160.32.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.160.32.93 ", "ContentType": "text/plain"}], "uids": ["CB4Sse2v1L5sJk5Jd2"]} -{"Format": "IDEA0", "ID": "74f29a04-164d-4cce-9bc0-dd2570febe32", "DetectTime": "2023-10-30T14:00:34.579200+02:00", "EventTime": "2023-10-30T14:00:34.579213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["C7fNhm3gzHlHOIK0d4"]} -{"Format": "IDEA0", "ID": "b4bf66ff-f5df-48df-947b-49c10d4afb3c", "DetectTime": "2023-10-30T14:00:34.609144+02:00", "EventTime": "2023-10-30T14:00:34.609161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.80.197.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.80.197.50 ", "ContentType": "text/plain"}], "uids": ["CQ692q3foL251fkGn9"]} -{"Format": "IDEA0", "ID": "5981b298-eeee-4fda-93ce-956f30b8b1f1", "DetectTime": "2023-10-30T14:00:34.637672+02:00", "EventTime": "2023-10-30T14:00:34.637685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.49.66.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.49.66.149 ", "ContentType": "text/plain"}], "uids": ["CNGJ9CLX1zkXjKxC"]} -{"Format": "IDEA0", "ID": "aa615c9c-1070-4318-8eca-2554ee555578", "DetectTime": "2023-10-30T14:00:34.663660+02:00", "EventTime": "2023-10-30T14:00:34.663674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["Cdm0a01PMpNcfRtWce"]} -{"Format": "IDEA0", "ID": "e6d7f1ba-074e-4922-a8ab-106f85b63b06", "DetectTime": "2023-10-30T14:00:34.694656+02:00", "EventTime": "2023-10-30T14:00:34.694675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.215.7.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.215.7.62 ", "ContentType": "text/plain"}], "uids": ["CwxuJh2W8p1YxJxs2b"]} -{"Format": "IDEA0", "ID": "9d327c48-1e68-464f-bc93-abb9c7970cc7", "DetectTime": "2023-10-30T14:00:34.723250+02:00", "EventTime": "2023-10-30T14:00:34.723267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["100.43.246.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 100.43.246.210 ", "ContentType": "text/plain"}], "uids": ["CC9V8L1bwhqlKdn3n8"]} -{"Format": "IDEA0", "ID": "e8702531-9ca9-4e7f-aa67-f17e8cf75bf9", "DetectTime": "2023-10-30T14:00:34.752160+02:00", "EventTime": "2023-10-30T14:00:34.752183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CQkTB01ng2FjNSqFY6"]} -{"Format": "IDEA0", "ID": "e8dd23c7-c62e-4507-afb5-5eb728ba6e66", "DetectTime": "2023-10-30T14:00:34.773923+02:00", "EventTime": "2023-10-30T14:00:34.773944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.100.43.218 ", "ContentType": "text/plain"}], "uids": ["CaNQrJ2oMXahUule84"]} -{"Format": "IDEA0", "ID": "059b0966-45ea-4af9-9476-d49ff1bf44f0", "DetectTime": "2023-10-30T14:00:34.803771+02:00", "EventTime": "2023-10-30T14:00:34.803788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.59.75.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.59.75.97 ", "ContentType": "text/plain"}], "uids": ["C6aRF72mt0CJ1OSux2"]} -{"Format": "IDEA0", "ID": "cd979d40-8d82-43cc-8a36-8d3722a2d70e", "DetectTime": "2023-10-30T14:00:34.830572+02:00", "EventTime": "2023-10-30T14:00:34.830590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.142.135.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.142.135.83 ", "ContentType": "text/plain"}], "uids": ["CnpjHn1lfFHWcwEwY"]} -{"Format": "IDEA0", "ID": "fc9c5c79-59f3-431f-ab12-1f2a2266aee2", "DetectTime": "2023-10-30T14:00:34.859216+02:00", "EventTime": "2023-10-30T14:00:34.859233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CmUTLP2cPROK6CtZr3"]} -{"Format": "IDEA0", "ID": "39c9bbc7-14e6-4534-949a-22e014da6d96", "DetectTime": "2023-10-30T14:00:34.888671+02:00", "EventTime": "2023-10-30T14:00:34.888687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["ChpsRU3r3TuccJdmch"]} -{"Format": "IDEA0", "ID": "347147d2-3f9c-4da4-bda2-aa461af263eb", "DetectTime": "2023-10-30T14:00:34.905091+02:00", "EventTime": "2023-10-30T14:00:34.905102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["C7Xvm533kSnlM5bvH2"]} -{"Format": "IDEA0", "ID": "d0747041-7f95-4624-8148-71dd79c4b268", "DetectTime": "2023-10-30T14:00:34.928642+02:00", "EventTime": "2023-10-30T14:00:34.928661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.74.86.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.74.86.94 ", "ContentType": "text/plain"}], "uids": ["CI5FS53WqOvuyXjMd3"]} -{"Format": "IDEA0", "ID": "13f4d629-c84f-46be-9f8a-5b3cd7f310ca", "DetectTime": "2023-10-30T14:00:34.958413+02:00", "EventTime": "2023-10-30T14:00:34.958437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CQ5tKC3UWJCKDsWlhl"]} -{"Format": "IDEA0", "ID": "afcaccda-05b7-490f-9e47-11963abaf25b", "DetectTime": "2023-10-30T14:00:34.992570+02:00", "EventTime": "2023-10-30T14:00:34.992587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.54.27.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.54.27.220 ", "ContentType": "text/plain"}], "uids": ["CwL6gy3XIaRtWQqM86"]} -{"Format": "IDEA0", "ID": "995b54fe-a2a7-43c3-bf6a-e9d917c78964", "DetectTime": "2023-10-30T14:00:35.026255+02:00", "EventTime": "2023-10-30T14:00:35.026278+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiTGQt3Dmdv509fGGd"]} -{"Format": "IDEA0", "ID": "c31e5e7f-2bdb-41fd-a7d7-5a85d5da6d05", "DetectTime": "2023-10-30T14:00:35.037995+02:00", "EventTime": "2023-10-30T14:00:35.038017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CanxTi1WmhwHNRxivh"]} -{"Format": "IDEA0", "ID": "185d80be-d3a3-407a-abf8-9dcffa13c0a3", "DetectTime": "2023-10-30T14:00:35.066855+02:00", "EventTime": "2023-10-30T14:00:35.066872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.197.8.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.197.8.133 ", "ContentType": "text/plain"}], "uids": ["CHPQKy4Oob6EWcc2Vd"]} -{"Format": "IDEA0", "ID": "a6a4f90e-6038-4150-b397-70e614a7c0d9", "DetectTime": "2023-10-30T14:00:35.095030+02:00", "EventTime": "2023-10-30T14:00:35.095043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["159.63.191.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 159.63.191.35 ", "ContentType": "text/plain"}], "uids": ["CbEgLMVNptNWCCxif"]} -{"Format": "IDEA0", "ID": "857101b3-c05f-48d1-8234-5a8923e2e2a8", "DetectTime": "2023-10-30T14:00:35.116234+02:00", "EventTime": "2023-10-30T14:00:35.116248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["C1tCDs2OR2OUditVh"]} -{"Format": "IDEA0", "ID": "e631563a-98c1-46d6-b2e6-e4f7631337b8", "DetectTime": "2023-10-30T14:00:35.156676+02:00", "EventTime": "2023-10-30T14:00:35.156693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Cd5sUR2TzKPVkDE4o1"]} -{"Format": "IDEA0", "ID": "3f2097db-ac79-4313-9aaf-5360e1e61d7d", "DetectTime": "2023-10-30T14:00:35.176641+02:00", "EventTime": "2023-10-30T14:00:35.176658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CbqpsJJcGQrAyfz5"]} -{"Format": "IDEA0", "ID": "bb6094e1-1e68-4616-9777-e491eeff1a75", "DetectTime": "2023-10-30T14:00:35.196413+02:00", "EventTime": "2023-10-30T14:00:35.196430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["C8c6rQkIxULLgngna"]} -{"Format": "IDEA0", "ID": "687dbec0-de42-43ae-b889-749e329ae830", "DetectTime": "2023-10-30T14:00:35.244303+02:00", "EventTime": "2023-10-30T14:00:35.244321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.91.179.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.91.179.180 ", "ContentType": "text/plain"}], "uids": ["CCA0eD3FghYgUxazkb"]} -{"Format": "IDEA0", "ID": "8a386574-7edf-49fa-a057-a29c61db6148", "DetectTime": "2023-10-30T14:00:35.275955+02:00", "EventTime": "2023-10-30T14:00:35.275967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CzAXyw1G9dSpTT6n3g"]} -{"Format": "IDEA0", "ID": "6c5086c7-a610-44c9-8839-ce857a687b6c", "DetectTime": "2023-10-30T14:00:35.296309+02:00", "EventTime": "2023-10-30T14:00:35.296326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CXlQTO2FCQ87smI95h"]} -{"Format": "IDEA0", "ID": "b37bd7e4-9b6f-4801-80c8-1e27ea1b2843", "DetectTime": "2023-10-30T14:00:35.314953+02:00", "EventTime": "2023-10-30T14:00:35.314971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["CoRqK23mvIBcRclw2d"]} -{"Format": "IDEA0", "ID": "1a8852b1-5883-46ba-b7b1-3207c3684071", "DetectTime": "2023-10-30T14:00:35.331298+02:00", "EventTime": "2023-10-30T14:00:35.331310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C1VICo4JApUC1tszyk"]} -{"Format": "IDEA0", "ID": "43550b31-4685-41ca-8415-da87b11f9fc3", "DetectTime": "2023-10-30T14:00:35.351331+02:00", "EventTime": "2023-10-30T14:00:35.351352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ck5C1e1yd7IbhTKXOf"]} -{"Format": "IDEA0", "ID": "86aac7f7-fb31-45cb-80af-b554a2ca6f87", "DetectTime": "2023-10-30T14:00:35.395028+02:00", "EventTime": "2023-10-30T14:00:35.395054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.7.167 ", "ContentType": "text/plain"}], "uids": ["C3RL2e1b75N6Ay7Ru8"]} -{"Format": "IDEA0", "ID": "0ff37bc0-b5fa-479c-afa1-8893a96d4dbf", "DetectTime": "2023-10-30T14:00:35.423781+02:00", "EventTime": "2023-10-30T14:00:35.423792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["Ci14JC2Nvlf45mdeYl"]} -{"Format": "IDEA0", "ID": "2fd90fbd-0681-48da-a3dc-32ea20018755", "DetectTime": "2023-10-30T14:00:35.449532+02:00", "EventTime": "2023-10-30T14:00:35.449543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CLUN1l2e1gKR4AOub8"]} -{"Format": "IDEA0", "ID": "4c62c905-6f62-419a-99e3-6685355d2695", "DetectTime": "2023-10-30T14:00:35.466259+02:00", "EventTime": "2023-10-30T14:00:35.466272+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CM9Egp2Ls2wu8lCDof"]} -{"Format": "IDEA0", "ID": "fdf339ad-0a4f-4e03-ba84-8bdd8791d592", "DetectTime": "2023-10-30T14:00:35.480980+02:00", "EventTime": "2023-10-30T14:00:35.480996+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CPZoPo11kEffgNHe19"]} -{"Format": "IDEA0", "ID": "d410f94b-2d09-4eee-859d-fa1f1550853a", "DetectTime": "2023-10-30T14:00:35.523394+02:00", "EventTime": "2023-10-30T14:00:35.523415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.83.174.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.83.174.86 ", "ContentType": "text/plain"}], "uids": ["CNQ5HY8hXJmLrw6ae"]} -{"Format": "IDEA0", "ID": "03f5fd35-2ad6-414c-834e-a5f729910d9e", "DetectTime": "2023-10-30T14:00:35.555154+02:00", "EventTime": "2023-10-30T14:00:35.555171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.253.163.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.253.163.131 ", "ContentType": "text/plain"}], "uids": ["CBiUav3j3UGlnpiWvk"]} -{"Format": "IDEA0", "ID": "f25d5ce9-e0a0-4b81-acac-816af860302b", "DetectTime": "2023-10-30T14:00:35.592213+02:00", "EventTime": "2023-10-30T14:00:35.592234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C79uFk38QDcjO0hSN5"]} -{"Format": "IDEA0", "ID": "b439c8e7-196e-49c2-be65-13ec35bc926f", "DetectTime": "2023-10-30T14:00:35.613909+02:00", "EventTime": "2023-10-30T14:00:35.613927+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvxBCF3lSTy5xtagJ1"]} -{"Format": "IDEA0", "ID": "8fb0b228-d713-4163-abaa-3281e0681061", "DetectTime": "2023-10-30T14:00:35.626475+02:00", "EventTime": "2023-10-30T14:00:35.626487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CtJWRu4KoyeKQd2Esj"]} -{"Format": "IDEA0", "ID": "b360f34c-2a3c-4eb7-91b9-282a7a1aeeb6", "DetectTime": "2023-10-30T14:00:35.655366+02:00", "EventTime": "2023-10-30T14:00:35.655380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.253.163.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.253.163.131 ", "ContentType": "text/plain"}], "uids": ["C0HUsU290e2jUefq25"]} -{"Format": "IDEA0", "ID": "a72dd798-99bf-4b12-8c6f-795926fb6c55", "DetectTime": "2023-10-30T14:00:35.694559+02:00", "EventTime": "2023-10-30T14:00:35.694578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.25.99.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.25.99.82 ", "ContentType": "text/plain"}], "uids": ["CvpfY14Eyg6DyJdqJi"]} -{"Format": "IDEA0", "ID": "c6cae082-ca3c-42aa-9adc-d54a2b49bd29", "DetectTime": "2023-10-30T14:00:35.721409+02:00", "EventTime": "2023-10-30T14:00:35.721427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CgrYiZ3xhDbZK3IA9g"]} -{"Format": "IDEA0", "ID": "7cfe94b2-a7e4-4dde-9b32-753f89a1687a", "DetectTime": "2023-10-30T14:00:35.741890+02:00", "EventTime": "2023-10-30T14:00:35.741905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CYY5X52w55QCtsSUtc"]} -{"Format": "IDEA0", "ID": "a29afef0-df04-45c6-b6a6-779cccbb3e58", "DetectTime": "2023-10-30T14:00:35.759531+02:00", "EventTime": "2023-10-30T14:00:35.759544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.7.167 ", "ContentType": "text/plain"}], "uids": ["CHBLgq1WHYqE7TVK1j"]} -{"Format": "IDEA0", "ID": "62ca4747-529d-45a9-82d7-2f49085f5fe4", "DetectTime": "2023-10-30T14:00:35.778755+02:00", "EventTime": "2023-10-30T14:00:35.778774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.205.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.205.60 ", "ContentType": "text/plain"}], "uids": ["C6hFQc3vHfV4VAIike"]} -{"Format": "IDEA0", "ID": "d949fa55-e2dd-42a9-b3b8-c816e8368ab1", "DetectTime": "2023-10-30T14:00:35.797352+02:00", "EventTime": "2023-10-30T14:00:35.797368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CxziZ74nzE5D903Jcc"]} -{"Format": "IDEA0", "ID": "af71bad4-aa61-4c76-b86e-985f2487c6f5", "DetectTime": "2023-10-30T14:00:35.822080+02:00", "EventTime": "2023-10-30T14:00:35.822097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.207.189.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.207.189.134 ", "ContentType": "text/plain"}], "uids": ["C9cZTRpaO5qNE6LEe"]} -{"Format": "IDEA0", "ID": "6a58377d-541a-4b50-8a65-5adbf6c2c08a", "DetectTime": "2023-10-30T14:00:35.849701+02:00", "EventTime": "2023-10-30T14:00:35.849712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Cq0ql42DNvgxDJaebg"]} -{"Format": "IDEA0", "ID": "768a7e09-c17e-4602-b169-2bd948f2457d", "DetectTime": "2023-10-30T14:00:35.879697+02:00", "EventTime": "2023-10-30T14:00:35.879709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.131.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.131.162 ", "ContentType": "text/plain"}], "uids": ["CXuJQ63CT0YOtfvbr2"]} -{"Format": "IDEA0", "ID": "dac8b62d-19b8-4b00-8ee5-c0c8057effec", "DetectTime": "2023-10-30T14:00:35.913379+02:00", "EventTime": "2023-10-30T14:00:35.913402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CuFh4A2UVk2vVLnN9l"]} -{"Format": "IDEA0", "ID": "16074123-3d66-46e8-881c-ccc4e153f8a9", "DetectTime": "2023-10-30T14:00:35.945296+02:00", "EventTime": "2023-10-30T14:00:35.945312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.7.167 ", "ContentType": "text/plain"}], "uids": ["CKSK61KEcyaVEY3x2"]} -{"Format": "IDEA0", "ID": "55c2b58e-531d-47ab-b0b2-990784956aea", "DetectTime": "2023-10-30T14:00:35.996087+02:00", "EventTime": "2023-10-30T14:00:35.996106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CaO7Ml2FYfhbZyrw22"]} -{"Format": "IDEA0", "ID": "690c7066-8ab0-4008-9374-85eaafd48090", "DetectTime": "2023-10-30T14:00:36.025594+02:00", "EventTime": "2023-10-30T14:00:36.025614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.143.38.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.143.38.124 ", "ContentType": "text/plain"}], "uids": ["CggW5w2arfj3MpDe32"]} -{"Format": "IDEA0", "ID": "24b6bd2e-2285-4394-900e-73e962b5d721", "DetectTime": "2023-10-30T14:00:36.055497+02:00", "EventTime": "2023-10-30T14:00:36.055515+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAkXCn1T8RjNmlimOj"]} -{"Format": "IDEA0", "ID": "158611a1-95a1-4779-898d-19f152de5300", "DetectTime": "2023-10-30T14:00:36.068443+02:00", "EventTime": "2023-10-30T14:00:36.068469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CmjWjD324BrS0f0XS8"]} -{"Format": "IDEA0", "ID": "0fbe3c67-9fcd-4361-9e9d-6cbf68ba92bc", "DetectTime": "2023-10-30T14:00:36.088730+02:00", "EventTime": "2023-10-30T14:00:36.088745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.129.124.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.129.124.228 ", "ContentType": "text/plain"}], "uids": ["Ck9151153A4U3DTi35"]} -{"Format": "IDEA0", "ID": "49cf5e5e-302e-439a-ba40-85f4ef2f27eb", "DetectTime": "2023-10-30T14:00:36.119311+02:00", "EventTime": "2023-10-30T14:00:36.119334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CEmtCq34NbgZ6nXEef"]} -{"Format": "IDEA0", "ID": "8fb205c3-2a34-429c-a217-1d16da004a5d", "DetectTime": "2023-10-30T14:00:36.165774+02:00", "EventTime": "2023-10-30T14:00:36.165794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CLBk24De1T9krbWY1"]} -{"Format": "IDEA0", "ID": "4a9a06b9-3531-4966-9cfb-217f63e12a60", "DetectTime": "2023-10-30T14:00:36.183102+02:00", "EventTime": "2023-10-30T14:00:36.183114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["CQ5PsIi5WhqJ7e56f"]} -{"Format": "IDEA0", "ID": "a1868ce5-3289-4fdf-8518-ab9b4a65e155", "DetectTime": "2023-10-30T14:00:36.227319+02:00", "EventTime": "2023-10-30T14:00:36.227336+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYfrAF16W7B9CGfuIb"]} -{"Format": "IDEA0", "ID": "af25d17a-6ba4-441d-a05c-4f6ccdf4b92f", "DetectTime": "2023-10-30T14:00:36.239429+02:00", "EventTime": "2023-10-30T14:00:36.239447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.98.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.98.24 ", "ContentType": "text/plain"}], "uids": ["CgvbZw1moBBFzruBXc"]} -{"Format": "IDEA0", "ID": "4ce775ab-0b9e-4a06-a312-90620a47e77f", "DetectTime": "2023-10-30T14:00:36.281027+02:00", "EventTime": "2023-10-30T14:00:36.281043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C5T8xE3AmrqZjE5Co7"]} -{"Format": "IDEA0", "ID": "5afb3124-d373-488c-9c90-802cef96b5d4", "DetectTime": "2023-10-30T14:00:36.308164+02:00", "EventTime": "2023-10-30T14:00:36.308183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C9Uxh813z5gzHkeMhg"]} -{"Format": "IDEA0", "ID": "f8e4a25f-63bb-400e-9de5-cb0b4e988883", "DetectTime": "2023-10-30T14:00:36.328512+02:00", "EventTime": "2023-10-30T14:00:36.328533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["61.183.129.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 61.183.129.18 ", "ContentType": "text/plain"}], "uids": ["CSVuRg2GW8eja2m779"]} -{"Format": "IDEA0", "ID": "d33710e3-236e-4052-840c-d20991ec493d", "DetectTime": "2023-10-30T14:00:36.355630+02:00", "EventTime": "2023-10-30T14:00:36.355642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["CvWrlF4WczwpkBaDh"]} -{"Format": "IDEA0", "ID": "cfea9b6b-c421-4bf7-a788-267b6bd233c2", "DetectTime": "2023-10-30T14:00:36.398886+02:00", "EventTime": "2023-10-30T14:00:36.398904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.161.231.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.161.231.103 ", "ContentType": "text/plain"}], "uids": ["CR766H11Qn0XGq2FN1"]} -{"Format": "IDEA0", "ID": "9d511f52-f7cc-4a59-851a-4afd5f84f53f", "DetectTime": "2023-10-30T14:00:36.425299+02:00", "EventTime": "2023-10-30T14:00:36.425311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2FmWl3iHla30pkJz8", "CM9Egp2Ls2wu8lCDof", "CKBO1bnhczSp7PzAa", "CAkXCn1T8RjNmlimOj"]} -{"Format": "IDEA0", "ID": "21ea51e1-69e8-4601-b9f7-e36ad7e05b15", "DetectTime": "2023-10-30T14:00:36.438979+02:00", "EventTime": "2023-10-30T14:00:36.438997+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2FmWl3iHla30pkJz8"]} -{"Format": "IDEA0", "ID": "b08e0a52-bb05-40a9-87ed-e37f496de772", "DetectTime": "2023-10-30T14:00:36.449744+02:00", "EventTime": "2023-10-30T14:00:36.449764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CVlnMq1JzIUngAwSTb"]} -{"Format": "IDEA0", "ID": "d931a3f8-05ab-4b85-b33c-3de421d3a367", "DetectTime": "2023-10-30T14:00:36.489212+02:00", "EventTime": "2023-10-30T14:00:36.489225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CFPUamCpeeXMGyVe7"]} -{"Format": "IDEA0", "ID": "8ac265b1-d667-4a97-97db-45564545be85", "DetectTime": "2023-10-30T14:00:36.531126+02:00", "EventTime": "2023-10-30T14:00:36.531147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CpcTqG1FbGwGDxvmZ8"]} -{"Format": "IDEA0", "ID": "5a1b7ec0-4235-45e0-832f-52678a28eb22", "DetectTime": "2023-10-30T14:00:36.574067+02:00", "EventTime": "2023-10-30T14:00:36.574087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CTTO7F1MtpEw3CYmmk"]} -{"Format": "IDEA0", "ID": "b6e2e9a6-9272-4874-8a47-bd490c1cf286", "DetectTime": "2023-10-30T14:00:36.606593+02:00", "EventTime": "2023-10-30T14:00:36.606613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["Ch4ktb39Jt8hhfwpGb"]} -{"Format": "IDEA0", "ID": "72ca76d5-f56e-48ea-bb5e-061f9dd003e2", "DetectTime": "2023-10-30T14:00:36.653698+02:00", "EventTime": "2023-10-30T14:00:36.653716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CzBofn1SlaQ3zoMmEl"]} -{"Format": "IDEA0", "ID": "016cb030-995a-4b11-bd8f-3dc7cb81942e", "DetectTime": "2023-10-30T14:00:36.673146+02:00", "EventTime": "2023-10-30T14:00:36.673163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CBEJVh2ijmHvQNMG8i"]} -{"Format": "IDEA0", "ID": "af9cc1d7-274d-4ac8-a308-4b685ae97e8f", "DetectTime": "2023-10-30T14:00:36.704766+02:00", "EventTime": "2023-10-30T14:00:36.704782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["C9jVQB3Fyx6MkzlCn3"]} -{"Format": "IDEA0", "ID": "531546ec-3098-4b93-b3e7-0fb820d51f37", "DetectTime": "2023-10-30T14:00:36.724605+02:00", "EventTime": "2023-10-30T14:00:36.724617+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cgd7jz1FbrMphbDsrb"]} -{"Format": "IDEA0", "ID": "d282e7a0-caeb-4486-95bf-600d56fc83b2", "DetectTime": "2023-10-30T14:00:36.737000+02:00", "EventTime": "2023-10-30T14:00:36.737020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CSjfCXgul1R8tmiUf"]} -{"Format": "IDEA0", "ID": "403439b0-7091-46f6-b72a-91b8c0d49dd5", "DetectTime": "2023-10-30T14:00:36.756416+02:00", "EventTime": "2023-10-30T14:00:36.756428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CPIbEP8tFHVolClO9"]} -{"Format": "IDEA0", "ID": "854432dd-db09-4648-8f23-b10c1fe8c55d", "DetectTime": "2023-10-30T14:00:36.794687+02:00", "EventTime": "2023-10-30T14:00:36.794703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CrqDKqh4cJw7UfRQ6"]} -{"Format": "IDEA0", "ID": "aafbcc98-df5c-4acb-b957-c32561823d4b", "DetectTime": "2023-10-30T14:00:36.813583+02:00", "EventTime": "2023-10-30T14:00:36.813596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CO1ok54TjtcCXkyQgg"]} -{"Format": "IDEA0", "ID": "e6d374a7-dfb7-4157-8556-747560f68e2b", "DetectTime": "2023-10-30T14:00:36.843709+02:00", "EventTime": "2023-10-30T14:00:36.843726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.218.243.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.218.243.51 ", "ContentType": "text/plain"}], "uids": ["CWYE9j4eIKzuYuZO62"]} -{"Format": "IDEA0", "ID": "86829536-fed1-46bd-8420-e0c760a21aa9", "DetectTime": "2023-10-30T14:00:36.872262+02:00", "EventTime": "2023-10-30T14:00:36.872281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["C4NBDr2fBYPqppqdC1"]} -{"Format": "IDEA0", "ID": "c96c6e97-eca9-4b65-8f39-2be1e153bfd0", "DetectTime": "2023-10-30T14:00:36.898931+02:00", "EventTime": "2023-10-30T14:00:36.898944+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ct5uEYNBGXhgK2Py9"]} -{"Format": "IDEA0", "ID": "65557090-0509-455c-9df6-bd5b649bf603", "DetectTime": "2023-10-30T14:00:36.912205+02:00", "EventTime": "2023-10-30T14:00:36.912220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.213.189.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.213.189.250 ", "ContentType": "text/plain"}], "uids": ["CYijMyqkrZ6onPTJe"]} -{"Format": "IDEA0", "ID": "a334353a-1f65-490f-bc90-b41f8b0f9270", "DetectTime": "2023-10-30T14:00:36.938600+02:00", "EventTime": "2023-10-30T14:00:36.938617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["CA3qAp2PHeVDN3TKt"]} -{"Format": "IDEA0", "ID": "62cedf01-2f49-492f-a42a-390827e8f13e", "DetectTime": "2023-10-30T14:00:36.955908+02:00", "EventTime": "2023-10-30T14:00:36.955927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CjKFi24LK1KYc7Cz2b"]} -{"Format": "IDEA0", "ID": "4820118a-ba1c-42f5-abc2-566aa03571bd", "DetectTime": "2023-10-30T14:00:36.993577+02:00", "EventTime": "2023-10-30T14:00:36.993594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CDRwKQ379AJCgMH2H2"]} -{"Format": "IDEA0", "ID": "85904601-29fd-4e17-8d37-2cff6260fedd", "DetectTime": "2023-10-30T14:00:37.011425+02:00", "EventTime": "2023-10-30T14:00:37.011442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.134.193.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.134.193.60 ", "ContentType": "text/plain"}], "uids": ["CzMjwa1UDwyGrZsKc"]} -{"Format": "IDEA0", "ID": "5585584b-29e2-49fc-87d6-6fd75f485c25", "DetectTime": "2023-10-30T14:00:37.055885+02:00", "EventTime": "2023-10-30T14:00:37.055899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CATpvo1SFQ5A4jbF1k"]} -{"Format": "IDEA0", "ID": "2af9edf6-291a-45eb-9e57-1a68231193d3", "DetectTime": "2023-10-30T14:00:37.074652+02:00", "EventTime": "2023-10-30T14:00:37.074675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.205.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.205.60 ", "ContentType": "text/plain"}], "uids": ["CnYxcV2wqaTkn2Gak2"]} -{"Format": "IDEA0", "ID": "7cb8e6c9-791f-4b2d-abae-d7b908cd9f19", "DetectTime": "2023-10-30T14:00:37.105063+02:00", "EventTime": "2023-10-30T14:00:37.105083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.97.149.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.97.149.245 ", "ContentType": "text/plain"}], "uids": ["CVHhSa31wkt3uzHhN8"]} -{"Format": "IDEA0", "ID": "17e1b37f-6ded-4864-9704-15e0fa200f0f", "DetectTime": "2023-10-30T14:00:37.131248+02:00", "EventTime": "2023-10-30T14:00:37.131260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CTE7kU1DyPRYDw5Rpg"]} -{"Format": "IDEA0", "ID": "6a329def-ba38-4602-8db3-30b247d8601d", "DetectTime": "2023-10-30T14:00:37.150129+02:00", "EventTime": "2023-10-30T14:00:37.150141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CRcWKB1JSSQ4Hnchr5"]} -{"Format": "IDEA0", "ID": "3ff74496-636d-4d3f-9acf-98247035cc0f", "DetectTime": "2023-10-30T14:00:37.193375+02:00", "EventTime": "2023-10-30T14:00:37.193386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["C6J9Ap1uyGjqtEii7d"]} -{"Format": "IDEA0", "ID": "cd568b22-7e54-490a-b33f-4785c95d6403", "DetectTime": "2023-10-30T14:00:37.212538+02:00", "EventTime": "2023-10-30T14:00:37.212555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.62.204.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.62.204.15 ", "ContentType": "text/plain"}], "uids": ["C74ntO28QdD2F8ihog"]} -{"Format": "IDEA0", "ID": "f7468222-825b-49a0-83d9-949f80409863", "DetectTime": "2023-10-30T14:00:37.239746+02:00", "EventTime": "2023-10-30T14:00:37.239766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CvL3Ne3EiYeqAdQDal"]} -{"Format": "IDEA0", "ID": "e5f7aa36-4fb0-4b4e-bb62-aafc69d237d6", "DetectTime": "2023-10-30T14:00:37.285610+02:00", "EventTime": "2023-10-30T14:00:37.285624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["C08EvkH2sdhZuYOd"]} -{"Format": "IDEA0", "ID": "575e7996-1c7b-492c-8244-f4099c22809e", "DetectTime": "2023-10-30T14:00:37.303667+02:00", "EventTime": "2023-10-30T14:00:37.303683+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChpVcz2c26EsQiFi98"]} -{"Format": "IDEA0", "ID": "8f7a743a-b95d-48d0-ae75-6ca6ef4e429d", "DetectTime": "2023-10-30T14:00:37.314594+02:00", "EventTime": "2023-10-30T14:00:37.314611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CewXI11Leb8tCBukK2"]} -{"Format": "IDEA0", "ID": "5d69d820-da53-4bfd-93d0-e471dc7be463", "DetectTime": "2023-10-30T14:00:37.358660+02:00", "EventTime": "2023-10-30T14:00:37.358672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CojTGI1CvMFedSqFv4"]} -{"Format": "IDEA0", "ID": "b5a7fd52-640f-40b6-9629-8b790ade2aef", "DetectTime": "2023-10-30T14:00:37.374487+02:00", "EventTime": "2023-10-30T14:00:37.374500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cbr2LC2AaORjIYTtQa"]} -{"Format": "IDEA0", "ID": "c6d03ef4-7304-4ea4-8755-095b533bfa91", "DetectTime": "2023-10-30T14:00:37.396722+02:00", "EventTime": "2023-10-30T14:00:37.396738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CnRtY73GG4dM0zpAef"]} -{"Format": "IDEA0", "ID": "30fca77b-517f-41b9-a0a8-f2f88dab291f", "DetectTime": "2023-10-30T14:00:37.417205+02:00", "EventTime": "2023-10-30T14:00:37.417219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CIajt23K5VdCvhFOGh"]} -{"Format": "IDEA0", "ID": "68452e44-5eb2-4b36-952f-27f0018ffb88", "DetectTime": "2023-10-30T14:00:37.443905+02:00", "EventTime": "2023-10-30T14:00:37.443924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["ClCfpJ1cTezPhWqld4"]} -{"Format": "IDEA0", "ID": "7c4e2475-78df-4e5d-8f88-2343c3aff3f7", "DetectTime": "2023-10-30T14:00:37.486085+02:00", "EventTime": "2023-10-30T14:00:37.486097+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLYn0w4pedsnkuLiU8"]} -{"Format": "IDEA0", "ID": "9e3933ae-d98c-4282-8218-aa729bc4f8a2", "DetectTime": "2023-10-30T14:00:37.496538+02:00", "EventTime": "2023-10-30T14:00:37.496555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C0gXwv4UL7C5KunYmh"]} -{"Format": "IDEA0", "ID": "6b1f2749-ebb1-441a-8677-f6b2d8842c1b", "DetectTime": "2023-10-30T14:00:37.518954+02:00", "EventTime": "2023-10-30T14:00:37.518966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.12.253.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.12.253.228 ", "ContentType": "text/plain"}], "uids": ["ClkfJm4WWJQZNBfpC1"]} -{"Format": "IDEA0", "ID": "feacab4f-9014-4df1-b36c-5a0f3a1ca3fa", "DetectTime": "2023-10-30T14:00:37.541922+02:00", "EventTime": "2023-10-30T14:00:37.541934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["C09b0y2AYdVkrjpRi7"]} -{"Format": "IDEA0", "ID": "76b660f3-ea16-4939-9022-e8a8d571fec9", "DetectTime": "2023-10-30T14:00:37.569889+02:00", "EventTime": "2023-10-30T14:00:37.569907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["Chmc0jFakg1Ot91v9"]} -{"Format": "IDEA0", "ID": "4908e2a2-3da2-45bb-b01c-679c7d1c08e7", "DetectTime": "2023-10-30T14:00:37.584427+02:00", "EventTime": "2023-10-30T14:00:37.584438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C5fww21XwmTZ3HS6re"]} -{"Format": "IDEA0", "ID": "87d5c8de-e38b-452f-b060-e299f42b0da4", "DetectTime": "2023-10-30T14:00:37.608568+02:00", "EventTime": "2023-10-30T14:00:37.608587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CNILJwJq6DO1YfT94"]} -{"Format": "IDEA0", "ID": "8846ae01-5d3f-407d-bd2b-83b212f0127c", "DetectTime": "2023-10-30T14:00:37.626586+02:00", "EventTime": "2023-10-30T14:00:37.626604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["Cpko5u476OnsOa2gi1"]} -{"Format": "IDEA0", "ID": "427fa5e5-9f6b-4c93-ac84-9d2d73dca6e0", "DetectTime": "2023-10-30T14:00:37.650167+02:00", "EventTime": "2023-10-30T14:00:37.650180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.132.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.132.82 ", "ContentType": "text/plain"}], "uids": ["CQQrP5cthXcqy9mQ9"]} -{"Format": "IDEA0", "ID": "1efb36ad-0626-4d29-805a-9981936812d0", "DetectTime": "2023-10-30T14:00:37.676553+02:00", "EventTime": "2023-10-30T14:00:37.676569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CmHEgw2DxNQE7VPhZb"]} -{"Format": "IDEA0", "ID": "0f724231-9e12-4158-bb73-3bf3cf023639", "DetectTime": "2023-10-30T14:00:37.722250+02:00", "EventTime": "2023-10-30T14:00:37.722268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CZt3fl76Ua0TT1M5"]} -{"Format": "IDEA0", "ID": "35a5d35e-9c5c-49b4-a0c8-2199124f246b", "DetectTime": "2023-10-30T14:00:37.763450+02:00", "EventTime": "2023-10-30T14:00:37.763467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.253.163.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.253.163.131 ", "ContentType": "text/plain"}], "uids": ["CWvSt720GiLzMrqfs3"]} -{"Format": "IDEA0", "ID": "7884e86b-9d62-43ea-9e82-507032e692de", "DetectTime": "2023-10-30T14:00:37.782412+02:00", "EventTime": "2023-10-30T14:00:37.782430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cdermt2Amu0TPLFf27"]} -{"Format": "IDEA0", "ID": "dfd6ad06-00ea-479f-b6d7-d8effb756a11", "DetectTime": "2023-10-30T14:00:37.802741+02:00", "EventTime": "2023-10-30T14:00:37.802758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.134.193.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.134.193.60 ", "ContentType": "text/plain"}], "uids": ["CIHYX31g5i4l5NSZC8"]} -{"Format": "IDEA0", "ID": "096d94c3-c411-4cd7-b503-9397ed0cb827", "DetectTime": "2023-10-30T14:00:37.829648+02:00", "EventTime": "2023-10-30T14:00:37.829663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Czmsf61i0ZUfTvKhJ7"]} -{"Format": "IDEA0", "ID": "d7cf3fcb-f2cd-4153-a341-69a3b5fc13e5", "DetectTime": "2023-10-30T14:00:37.857517+02:00", "EventTime": "2023-10-30T14:00:37.857529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C4FXLI1IbG6hsAIO9f"]} -{"Format": "IDEA0", "ID": "d821a37a-f995-4a5a-ba67-97e5ceeb13d1", "DetectTime": "2023-10-30T14:00:37.884839+02:00", "EventTime": "2023-10-30T14:00:37.884861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["CKF3CR3wSK0NHPW1Xa"]} -{"Format": "IDEA0", "ID": "bf9e614d-0afb-49d7-bf2a-7dcd25247b16", "DetectTime": "2023-10-30T14:00:37.903589+02:00", "EventTime": "2023-10-30T14:00:37.903610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CAbJ3u68GP5gHhida"]} -{"Format": "IDEA0", "ID": "a1f98fcd-34a1-4384-8574-fef35b0b762d", "DetectTime": "2023-10-30T14:00:37.922487+02:00", "EventTime": "2023-10-30T14:00:37.922509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.197.81.95 ", "ContentType": "text/plain"}], "uids": ["CMysEs3VSQUYd14Jp6"]} -{"Format": "IDEA0", "ID": "05901ea4-a2bd-421e-afda-15bc46263688", "DetectTime": "2023-10-30T14:00:37.940764+02:00", "EventTime": "2023-10-30T14:00:37.940775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["CNk6FB4JiPRvleBV2"]} -{"Format": "IDEA0", "ID": "3ca21a88-f5e8-4b80-b73f-3809f0de1fe5", "DetectTime": "2023-10-30T14:00:37.958248+02:00", "EventTime": "2023-10-30T14:00:37.958259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.79.52.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.79.52.220 ", "ContentType": "text/plain"}], "uids": ["CVyJMqD5kOJDp2XMk"]} -{"Format": "IDEA0", "ID": "208408a3-169a-48cd-8a78-dd8c5c0023a8", "DetectTime": "2023-10-30T14:00:37.986611+02:00", "EventTime": "2023-10-30T14:00:37.986626+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqTTVuKYWPz6k6euc"]} -{"Format": "IDEA0", "ID": "d74216a5-bb26-4ded-aafb-e75223e82c83", "DetectTime": "2023-10-30T14:00:37.998997+02:00", "EventTime": "2023-10-30T14:00:37.999018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CQ3Rdl3VXVlS8CSyyc"]} -{"Format": "IDEA0", "ID": "65f52110-6382-48f2-9032-74c523bb9717", "DetectTime": "2023-10-30T14:00:38.018474+02:00", "EventTime": "2023-10-30T14:00:38.018493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["ChZKqA1thJRZL5cjhb"]} -{"Format": "IDEA0", "ID": "88b156ac-44c2-41d7-a286-3c2b27c90f36", "DetectTime": "2023-10-30T14:00:38.038372+02:00", "EventTime": "2023-10-30T14:00:38.038390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.42.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.42.213 ", "ContentType": "text/plain"}], "uids": ["CAcBRd29G5wecedsX9"]} -{"Format": "IDEA0", "ID": "9e5977bd-fac2-41e8-8b81-86be36001d17", "DetectTime": "2023-10-30T14:00:38.067422+02:00", "EventTime": "2023-10-30T14:00:38.067439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.118.193.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.118.193.177 ", "ContentType": "text/plain"}], "uids": ["C57Uta4jEdoylbVWak"]} -{"Format": "IDEA0", "ID": "36791e7b-7a61-4427-90c4-b60fd2fcb1f2", "DetectTime": "2023-10-30T14:00:38.094094+02:00", "EventTime": "2023-10-30T14:00:38.094110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CgVbbN3WOkfmKswxLg"]} -{"Format": "IDEA0", "ID": "b5b6ebb7-1f9c-46c8-b1c5-169db2b7eda0", "DetectTime": "2023-10-30T14:00:38.114034+02:00", "EventTime": "2023-10-30T14:00:38.114045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.229.23.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.229.23.220 ", "ContentType": "text/plain"}], "uids": ["CdrENmeW1tQJMVsTj"]} -{"Format": "IDEA0", "ID": "b888e62f-d4aa-4bfc-9106-703e44bca69f", "DetectTime": "2023-10-30T14:00:38.139289+02:00", "EventTime": "2023-10-30T14:00:38.139306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CEMjQGfOPuYNCCik7"]} -{"Format": "IDEA0", "ID": "83ebfd81-7313-4c26-aaae-56c88cb34ea4", "DetectTime": "2023-10-30T14:00:38.184515+02:00", "EventTime": "2023-10-30T14:00:38.184536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C0hgURE5lEfU7M8wg"]} -{"Format": "IDEA0", "ID": "894e020b-aefa-4a8d-91d1-e435d0e8dd2b", "DetectTime": "2023-10-30T14:00:38.205700+02:00", "EventTime": "2023-10-30T14:00:38.205716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CZKAzg4Q0irJ6Aj054"]} -{"Format": "IDEA0", "ID": "a5da48fc-a9e2-49f5-bc66-fcaffc9bd8d5", "DetectTime": "2023-10-30T14:00:38.223901+02:00", "EventTime": "2023-10-30T14:00:38.223912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.197.81.95 ", "ContentType": "text/plain"}], "uids": ["CiY8HR1Br0LN7RwZHk"]} -{"Format": "IDEA0", "ID": "554c6063-c871-4409-9b07-92581e44ff72", "DetectTime": "2023-10-30T14:00:38.252460+02:00", "EventTime": "2023-10-30T14:00:38.252478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.116.204.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.116.204.1 ", "ContentType": "text/plain"}], "uids": ["CG1XWG2kDyBIAmu5qh"]} -{"Format": "IDEA0", "ID": "0f342dcb-3fc9-41d3-8de0-b19b290b8c83", "DetectTime": "2023-10-30T14:00:38.276917+02:00", "EventTime": "2023-10-30T14:00:38.276932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C47UWM1G1tEYVEuS1h"]} -{"Format": "IDEA0", "ID": "e49fabcd-618a-4362-affc-b1cc0afcdfb2", "DetectTime": "2023-10-30T14:00:38.293807+02:00", "EventTime": "2023-10-30T14:00:38.293818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.134.193.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.134.193.60 ", "ContentType": "text/plain"}], "uids": ["CQKYg81quB5QqMpFoa"]} -{"Format": "IDEA0", "ID": "db7a1cc5-5add-49df-bc50-43d0cec3035e", "DetectTime": "2023-10-30T14:00:38.312696+02:00", "EventTime": "2023-10-30T14:00:38.312711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["Cst9Yj12ImAqERHMHf"]} -{"Format": "IDEA0", "ID": "831e8de8-5a70-47c2-b797-b833a5848496", "DetectTime": "2023-10-30T14:00:38.338426+02:00", "EventTime": "2023-10-30T14:00:38.338445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.123.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.123.224 ", "ContentType": "text/plain"}], "uids": ["C14iea2rOEGI9FWbfi"]} -{"Format": "IDEA0", "ID": "c7a3fdbf-989b-42f9-9e1a-b0830c188420", "DetectTime": "2023-10-30T14:00:38.365656+02:00", "EventTime": "2023-10-30T14:00:38.365681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["ChdCSgitkQLMnvRbf"]} -{"Format": "IDEA0", "ID": "06c6dcfe-ed29-4622-a8ca-117163b6c840", "DetectTime": "2023-10-30T14:00:38.393197+02:00", "EventTime": "2023-10-30T14:00:38.393224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.64.114.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.64.114.138 ", "ContentType": "text/plain"}], "uids": ["CHnZhX1jTGugDhGepj"]} -{"Format": "IDEA0", "ID": "8fdb1f5f-fc2c-4b7c-940b-13e136dff2d6", "DetectTime": "2023-10-30T14:00:38.420158+02:00", "EventTime": "2023-10-30T14:00:38.420176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C61bjB3yEZGBMKuzpe"]} -{"Format": "IDEA0", "ID": "db8f81e0-7e48-49a1-8958-e9738c6d41e8", "DetectTime": "2023-10-30T14:00:38.446838+02:00", "EventTime": "2023-10-30T14:00:38.446855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.235.174.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.235.174.22 ", "ContentType": "text/plain"}], "uids": ["CFzsVF4ANdzAIBPeD"]} -{"Format": "IDEA0", "ID": "080e5643-65ed-445d-bf8f-2daf15ea30fc", "DetectTime": "2023-10-30T14:00:38.474349+02:00", "EventTime": "2023-10-30T14:00:38.474362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.98.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.98.24 ", "ContentType": "text/plain"}], "uids": ["C2ps3O2bFzWo507whi"]} -{"Format": "IDEA0", "ID": "c988207e-8f29-4e81-aa86-ce8b554459d6", "DetectTime": "2023-10-30T14:00:38.493115+02:00", "EventTime": "2023-10-30T14:00:38.493127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["C2Pf6i4oQEzY4j4ZP7"]} -{"Format": "IDEA0", "ID": "9102df58-ffaa-4115-9de8-bf7daaad3662", "DetectTime": "2023-10-30T14:00:38.517852+02:00", "EventTime": "2023-10-30T14:00:38.517865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.98.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.98.24 ", "ContentType": "text/plain"}], "uids": ["C3XKcf3WVIVHRCE2sl"]} -{"Format": "IDEA0", "ID": "708d3c37-3a82-44f8-b25d-7eb9505e5606", "DetectTime": "2023-10-30T14:00:38.543040+02:00", "EventTime": "2023-10-30T14:00:38.543058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CUymNk26o4PmnJFhXb"]} -{"Format": "IDEA0", "ID": "16723def-7fbe-449c-89d7-9d3501d25a9f", "DetectTime": "2023-10-30T14:00:38.586214+02:00", "EventTime": "2023-10-30T14:00:38.586229+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiejgZ335uPAF4wfJ4"]} -{"Format": "IDEA0", "ID": "20f78e99-75ac-40c2-a438-0e51e61cd662", "DetectTime": "2023-10-30T14:00:38.596453+02:00", "EventTime": "2023-10-30T14:00:38.596464+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.96.126.57 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CJfKvo4r1OKriRO9p3"]} -{"Format": "IDEA0", "ID": "fafa7603-978c-456d-9270-aff3a466e1e7", "DetectTime": "2023-10-30T14:00:38.630052+02:00", "EventTime": "2023-10-30T14:00:38.630070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.72.145.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.72.145.186 ", "ContentType": "text/plain"}], "uids": ["C7VCjSYmXzm1idYnk"]} -{"Format": "IDEA0", "ID": "d97b62a1-d6b2-4f67-a66b-6808c2b49ac0", "DetectTime": "2023-10-30T14:00:38.656953+02:00", "EventTime": "2023-10-30T14:00:38.656965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.246.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.246.218 ", "ContentType": "text/plain"}], "uids": ["C0l3li41ObBrpaSvQ6"]} -{"Format": "IDEA0", "ID": "5c3a80c3-6218-4769-bbb9-b55ebb880c97", "DetectTime": "2023-10-30T14:00:38.680046+02:00", "EventTime": "2023-10-30T14:00:38.680058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["CzTHZm3PELPcu8fuul"]} -{"Format": "IDEA0", "ID": "cec623ac-0c95-41f5-83d1-e424e21f3836", "DetectTime": "2023-10-30T14:00:38.728452+02:00", "EventTime": "2023-10-30T14:00:38.728471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.134.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.134.87 ", "ContentType": "text/plain"}], "uids": ["CTBlT94oVV73wgDXga"]} -{"Format": "IDEA0", "ID": "45409d17-e4f5-46d5-ae49-e051f8987268", "DetectTime": "2023-10-30T14:00:38.756490+02:00", "EventTime": "2023-10-30T14:00:38.756508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.248.253.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.248.253.118 ", "ContentType": "text/plain"}], "uids": ["CRTjZI1Cuw4vhLGwKe"]} -{"Format": "IDEA0", "ID": "9c22592a-2010-4ff8-b29a-60ca321280fa", "DetectTime": "2023-10-30T14:00:38.781723+02:00", "EventTime": "2023-10-30T14:00:38.781739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CG2iBM3V5NZtKE8Kee"]} -{"Format": "IDEA0", "ID": "b3a6caa1-926e-4436-a01a-55fe33534b82", "DetectTime": "2023-10-30T14:00:38.799752+02:00", "EventTime": "2023-10-30T14:00:38.799764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CbPj8p1mMOn1Kd5tnh"]} -{"Format": "IDEA0", "ID": "29e258a9-0229-4c26-9919-0a9e59029854", "DetectTime": "2023-10-30T14:00:38.827861+02:00", "EventTime": "2023-10-30T14:00:38.827873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CXfulE9M0qWneE6Rl"]} -{"Format": "IDEA0", "ID": "9dbea694-7dd9-4ff6-9f64-c8ecb7678c16", "DetectTime": "2023-10-30T14:00:38.868055+02:00", "EventTime": "2023-10-30T14:00:38.868065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.105.31.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.105.31.39 ", "ContentType": "text/plain"}], "uids": ["CDHUecJE0S5fH0U7c"]} -{"Format": "IDEA0", "ID": "d04ab758-57ab-4c79-a28f-dfa80ec693b1", "DetectTime": "2023-10-30T14:00:38.894795+02:00", "EventTime": "2023-10-30T14:00:38.894809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.193.78.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.193.78.226 ", "ContentType": "text/plain"}], "uids": ["CSvzaP2OrujET3mdz5"]} -{"Format": "IDEA0", "ID": "d3c9231f-ea32-4f18-af6f-33cbdb7eb134", "DetectTime": "2023-10-30T14:00:38.921988+02:00", "EventTime": "2023-10-30T14:00:38.922002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["CyKV6H16bZfVTJEyP4"]} -{"Format": "IDEA0", "ID": "ca170958-60da-4852-9ff2-8d2ed2d92ee8", "DetectTime": "2023-10-30T14:00:38.941488+02:00", "EventTime": "2023-10-30T14:00:38.941501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CpbtkB4irrwrUq6MOg"]} -{"Format": "IDEA0", "ID": "7a229e53-fc92-4fce-b89f-ee215337af4b", "DetectTime": "2023-10-30T14:00:38.986255+02:00", "EventTime": "2023-10-30T14:00:38.986276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.142.65.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.142.65.193 ", "ContentType": "text/plain"}], "uids": ["CHhPtj1N19Rbhu0648"]} -{"Format": "IDEA0", "ID": "d57c6962-dbc7-4640-a098-af75db5470ea", "DetectTime": "2023-10-30T14:00:39.014059+02:00", "EventTime": "2023-10-30T14:00:39.014075+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDRksd44Mc1INVq7U3"]} -{"Format": "IDEA0", "ID": "bba9817a-3a5f-47a3-b660-16dfc1b73394", "DetectTime": "2023-10-30T14:00:39.027013+02:00", "EventTime": "2023-10-30T14:00:39.027030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.179.11.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.179.11.58 ", "ContentType": "text/plain"}], "uids": ["CHYQMH2FdenUMibyVh"]} -{"Format": "IDEA0", "ID": "181e3ed3-aa7b-4a39-b58c-42058f70ba7c", "DetectTime": "2023-10-30T14:00:39.057297+02:00", "EventTime": "2023-10-30T14:00:39.057313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CL3tpQ1cKE2kaUXok6"]} -{"Format": "IDEA0", "ID": "188fefcb-2b0e-4729-a404-37b03d145574", "DetectTime": "2023-10-30T14:00:39.077482+02:00", "EventTime": "2023-10-30T14:00:39.077497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.192.94.172"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.192.94.172 ", "ContentType": "text/plain"}], "uids": ["Ckhkaa19W06B4T0C3b"]} -{"Format": "IDEA0", "ID": "24cd1f90-1562-40c7-8163-166f0de197bd", "DetectTime": "2023-10-30T14:00:39.106836+02:00", "EventTime": "2023-10-30T14:00:39.106859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CxFGwG3zlyHET1IZx7"]} -{"Format": "IDEA0", "ID": "3c339caf-922b-4710-915f-aefe6ee2a12e", "DetectTime": "2023-10-30T14:00:39.135456+02:00", "EventTime": "2023-10-30T14:00:39.135469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.222.80.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.222.80.6 ", "ContentType": "text/plain"}], "uids": ["CeFJA22BYjOmxkMLDd"]} -{"Format": "IDEA0", "ID": "e5a25eec-5c00-4132-837f-9d8496750615", "DetectTime": "2023-10-30T14:00:39.163342+02:00", "EventTime": "2023-10-30T14:00:39.163355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.145.81.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.145.81.144 ", "ContentType": "text/plain"}], "uids": ["CrwBnf1nUOELkrMsY6"]} -{"Format": "IDEA0", "ID": "11f4ecbd-e9de-426d-8eff-f618cc75c64a", "DetectTime": "2023-10-30T14:00:39.188337+02:00", "EventTime": "2023-10-30T14:00:39.188360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["106.51.157.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 106.51.157.142 ", "ContentType": "text/plain"}], "uids": ["CAHH3q2nIzzMAUlLi8"]} -{"Format": "IDEA0", "ID": "b48e0440-d08d-44b5-a8d0-3825050abd3d", "DetectTime": "2023-10-30T14:00:39.217852+02:00", "EventTime": "2023-10-30T14:00:39.217867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.27.131.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.27.131.77 ", "ContentType": "text/plain"}], "uids": ["CZtJi41n4vLLhjmNcb"]} -{"Format": "IDEA0", "ID": "b3377ec4-d6f1-4036-b9c8-c034ff92d8cb", "DetectTime": "2023-10-30T14:00:39.248032+02:00", "EventTime": "2023-10-30T14:00:39.248058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.163.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.163.114.250 ", "ContentType": "text/plain"}], "uids": ["Cybjo12mQiElFT2Efj"]} -{"Format": "IDEA0", "ID": "a4bee7b5-7fad-42a4-a5bd-b8f3c3a4955a", "DetectTime": "2023-10-30T14:00:39.275802+02:00", "EventTime": "2023-10-30T14:00:39.275821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLYn0w4pedsnkuLiU8", "CiejgZ335uPAF4wfJ4", "CdxQcC2Ok5jaHWXjdf", "Ct5uEYNBGXhgK2Py9"]} -{"Format": "IDEA0", "ID": "0c7dbf8c-ba7b-485d-9bbf-58007c9fbc01", "DetectTime": "2023-10-30T14:00:39.288413+02:00", "EventTime": "2023-10-30T14:00:39.288441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.77.4.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.77.4.212 ", "ContentType": "text/plain"}], "uids": ["Chshr2p3LL780i5Vk"]} -{"Format": "IDEA0", "ID": "c1117019-3653-474d-bb13-20934fff9412", "DetectTime": "2023-10-30T14:00:39.318516+02:00", "EventTime": "2023-10-30T14:00:39.318539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CkVeeN1tnfbC7l4UTf"]} -{"Format": "IDEA0", "ID": "6cad464b-b6f9-4770-b91d-703995bf619e", "DetectTime": "2023-10-30T14:00:39.348722+02:00", "EventTime": "2023-10-30T14:00:39.348744+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdxQcC2Ok5jaHWXjdf"]} -{"Format": "IDEA0", "ID": "d5d0f6da-4a77-4c9b-bc92-2827c5761507", "DetectTime": "2023-10-30T14:00:39.360833+02:00", "EventTime": "2023-10-30T14:00:39.360850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.150.209.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.150.209.241 ", "ContentType": "text/plain"}], "uids": ["CswJnn4Y2wlzGB5T9e"]} -{"Format": "IDEA0", "ID": "a68c873d-c5e6-40ce-8f3a-3430c3273c42", "DetectTime": "2023-10-30T14:00:39.390469+02:00", "EventTime": "2023-10-30T14:00:39.390491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CPROaR2VnOImJ7lwL1"]} -{"Format": "IDEA0", "ID": "e5bfe1e7-f764-4718-8105-9572b9f9ecdf", "DetectTime": "2023-10-30T14:00:39.422127+02:00", "EventTime": "2023-10-30T14:00:39.422149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.245.191.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.245.191.3 ", "ContentType": "text/plain"}], "uids": ["CoNxueo0G0r1AMbch"]} -{"Format": "IDEA0", "ID": "691ce9d4-a3e3-4f36-b86d-dd18ea501d3c", "DetectTime": "2023-10-30T14:00:39.456029+02:00", "EventTime": "2023-10-30T14:00:39.456046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.121.10.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.121.10.87 ", "ContentType": "text/plain"}], "uids": ["CKd9IoQEB0uFWPX6d"]} -{"Format": "IDEA0", "ID": "8291ae81-679a-467f-a9a8-fa30c0302385", "DetectTime": "2023-10-30T14:00:39.485145+02:00", "EventTime": "2023-10-30T14:00:39.485171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C19Qp93ycOMh9Dxb5i"]} -{"Format": "IDEA0", "ID": "bb41c873-2460-4b85-b811-25756e804d41", "DetectTime": "2023-10-30T14:00:39.504565+02:00", "EventTime": "2023-10-30T14:00:39.504578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.22.218.43"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.22.218.43 ", "ContentType": "text/plain"}], "uids": ["C3JG0k19nyOJSIJ5u"]} -{"Format": "IDEA0", "ID": "6380f4d0-9874-4679-bf4a-90585c243abb", "DetectTime": "2023-10-30T14:00:39.533252+02:00", "EventTime": "2023-10-30T14:00:39.533268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CYPVNY2FjhnHQidoRh"]} -{"Format": "IDEA0", "ID": "46626338-f1a7-461e-a663-267468d69d44", "DetectTime": "2023-10-30T14:00:39.560700+02:00", "EventTime": "2023-10-30T14:00:39.560715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CRDrHt3QlsPoYrYND"]} -{"Format": "IDEA0", "ID": "ad1f319e-c882-4834-ad10-63eaba984917", "DetectTime": "2023-10-30T14:00:39.586265+02:00", "EventTime": "2023-10-30T14:00:39.586285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.160.175.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.160.175.150 ", "ContentType": "text/plain"}], "uids": ["CGMIBG4nM0z8yrbZy1"]} -{"Format": "IDEA0", "ID": "7a8eefdd-66f5-461a-9ee8-a4953a8dff69", "DetectTime": "2023-10-30T14:00:39.613302+02:00", "EventTime": "2023-10-30T14:00:39.613313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.56.147.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.56.147.241 ", "ContentType": "text/plain"}], "uids": ["CbErAE2mfhkTth3Nx7"]} -{"Format": "IDEA0", "ID": "2e4823b4-c367-4dcb-b462-97ebfa7a726b", "DetectTime": "2023-10-30T14:00:39.642340+02:00", "EventTime": "2023-10-30T14:00:39.642356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CsWbs23wW1pyssFzT2"]} -{"Format": "IDEA0", "ID": "5be580c2-3c6e-4b1d-a988-5bb670ebceb1", "DetectTime": "2023-10-30T14:00:39.691012+02:00", "EventTime": "2023-10-30T14:00:39.691024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C41Dz8uZLkgsmjTZd"]} -{"Format": "IDEA0", "ID": "8c01658c-32e8-4f2f-856f-e53af5e9e635", "DetectTime": "2023-10-30T14:00:39.718692+02:00", "EventTime": "2023-10-30T14:00:39.718714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.131.229.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.131.229.120 ", "ContentType": "text/plain"}], "uids": ["CQ2gYK3cHCWMCb7GId"]} -{"Format": "IDEA0", "ID": "97f33c3d-666f-4c9b-bdec-cf12198a4342", "DetectTime": "2023-10-30T14:00:39.747220+02:00", "EventTime": "2023-10-30T14:00:39.747234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.91.186.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.91.186.20 ", "ContentType": "text/plain"}], "uids": ["CCGhEz4qOi12hftvrc"]} -{"Format": "IDEA0", "ID": "01590e1a-cec5-434f-802b-e1184281b184", "DetectTime": "2023-10-30T14:00:39.777889+02:00", "EventTime": "2023-10-30T14:00:39.777912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CGahwr3m9Ff1YKlpe"]} -{"Format": "IDEA0", "ID": "128145fb-6b03-4687-a74c-21fa6ffd0193", "DetectTime": "2023-10-30T14:00:39.807749+02:00", "EventTime": "2023-10-30T14:00:39.807762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CsbZl62R9q92ZoeKJk"]} -{"Format": "IDEA0", "ID": "f02e14a7-937e-4dd4-8807-9426b1332102", "DetectTime": "2023-10-30T14:00:39.849083+02:00", "EventTime": "2023-10-30T14:00:39.849100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["ChDm9S31HhlgHqg3Hj"]} -{"Format": "IDEA0", "ID": "03b7d748-aacd-4d19-ab6c-6a58f89a7dff", "DetectTime": "2023-10-30T14:00:39.897641+02:00", "EventTime": "2023-10-30T14:00:39.897660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CJz6xn4JJxfZcVpOyg"]} -{"Format": "IDEA0", "ID": "a80a2cb5-1fa1-4490-a646-a0600948d414", "DetectTime": "2023-10-30T14:00:39.944564+02:00", "EventTime": "2023-10-30T14:00:39.944583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["Cp6paa1EgtHe6Yntgf"]} -{"Format": "Json", "ID": "a80a2cb5-1fa1-4490-a646-a0600948d414", "DetectTime": "2023-10-30T14:00:39.944564+02:00", "EventTime": "2023-10-30T14:00:39.944583+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:01:49.707565+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:40.015074)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b2d1d0cd-0050-4c38-a241-64301829894a", "DetectTime": "2023-10-30T14:00:40.020958+02:00", "EventTime": "2023-10-30T14:00:40.020982+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7gavNFYJ2JvMQd78"]} -{"Format": "IDEA0", "ID": "95c34c0e-20ca-494e-907d-4884ee2d5a54", "DetectTime": "2023-10-30T14:00:40.036068+02:00", "EventTime": "2023-10-30T14:00:40.036086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CdwUJx14JIxAHiCWTg"]} -{"Format": "IDEA0", "ID": "5af659b5-8fde-4e4e-8137-1a003e20b933", "DetectTime": "2023-10-30T14:00:40.078526+02:00", "EventTime": "2023-10-30T14:00:40.078543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7743], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. ", "ContentType": "text/plain"}], "uids": ["CtCMxy1wNhYFqMJvm8"]} -{"Format": "IDEA0", "ID": "7a68445b-c904-414c-a3d7-17ae7a744891", "DetectTime": "2023-10-30T14:00:40.120122+02:00", "EventTime": "2023-10-30T14:00:40.120140+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXY8vr2Sh44fbxC0a"]} -{"Format": "IDEA0", "ID": "ca9d66fa-42ba-4b85-9f24-152ad90ffbeb", "DetectTime": "2023-10-30T14:00:40.131229+02:00", "EventTime": "2023-10-30T14:00:40.131248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["Cfqt2QnnR3VegS2pe"]} -{"Format": "IDEA0", "ID": "eca2d4e1-924c-48c4-8194-94d574f57666", "DetectTime": "2023-10-30T14:00:40.177632+02:00", "EventTime": "2023-10-30T14:00:40.177649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CYgaoKLWtXbhsVUvl"]} -{"Format": "IDEA0", "ID": "5e0015e0-8a68-43ec-9905-17051fd21c70", "DetectTime": "2023-10-30T14:00:40.229471+02:00", "EventTime": "2023-10-30T14:00:40.229491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9155], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. ", "ContentType": "text/plain"}], "uids": ["CEqD9C3yXB274q95Zk"]} -{"Format": "IDEA0", "ID": "7b2a01a1-2189-4635-8ebb-5386240de1b0", "DetectTime": "2023-10-30T14:00:40.277849+02:00", "EventTime": "2023-10-30T14:00:40.277865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["ClM6Zk2zU6cQ6yQ4Q2"]} -{"Format": "IDEA0", "ID": "17b63a91-6e0d-4c7e-8028-ff101df36151", "DetectTime": "2023-10-30T14:00:40.324237+02:00", "EventTime": "2023-10-30T14:00:40.324254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CsUhYk4SADh7J9q6hg"]} -{"Format": "IDEA0", "ID": "9e8aac2b-3b6f-4421-992f-b88f02429c1c", "DetectTime": "2023-10-30T14:00:40.367849+02:00", "EventTime": "2023-10-30T14:00:40.367868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CkmyHXqWKdC9gIo8i"]} -{"Format": "Json", "ID": "9e8aac2b-3b6f-4421-992f-b88f02429c1c", "DetectTime": "2023-10-30T14:00:40.367849+02:00", "EventTime": "2023-10-30T14:00:40.367868+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:01:51.281289+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:40.432993)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4d2ea098-aa20-4c8e-8334-af112a1bbf68", "DetectTime": "2023-10-30T14:00:40.439107+02:00", "EventTime": "2023-10-30T14:00:40.439126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["ClobDf2bHlN4o3SBLj"]} -{"Format": "IDEA0", "ID": "8e2d23c4-7f20-4943-aa7d-319cbabd5d1f", "DetectTime": "2023-10-30T14:00:40.483647+02:00", "EventTime": "2023-10-30T14:00:40.483661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CNnv7A4rIgKSPnCb3a"]} -{"Format": "IDEA0", "ID": "32433fb3-64f3-49c2-b666-1ec442a7545f", "DetectTime": "2023-10-30T14:00:40.523582+02:00", "EventTime": "2023-10-30T14:00:40.523594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CcRZ913d0L0NUgYxJl"]} -{"Format": "IDEA0", "ID": "c012c1d4-e61b-488e-b142-ae5966a6113a", "DetectTime": "2023-10-30T14:00:40.563614+02:00", "EventTime": "2023-10-30T14:00:40.563625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["Cp0s9L1tjKexSRHvBf"]} -{"Format": "IDEA0", "ID": "2fc99bde-7655-4a8f-a879-1bed1bbb9bb3", "DetectTime": "2023-10-30T14:00:40.603054+02:00", "EventTime": "2023-10-30T14:00:40.603073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CVCqbyQrVgx9slsSk"]} -{"Format": "IDEA0", "ID": "532323da-ccec-494a-8b89-3581550412f6", "DetectTime": "2023-10-30T14:00:40.644785+02:00", "EventTime": "2023-10-30T14:00:40.644801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkSvEezKzeljYjCia"]} -{"Format": "IDEA0", "ID": "bd16b8c7-00e1-447d-8923-5b135bc8a688", "DetectTime": "2023-10-30T14:00:40.686290+02:00", "EventTime": "2023-10-30T14:00:40.686313+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSNUGC241EeSQ0k94b"]} -{"Format": "IDEA0", "ID": "522bd705-e309-4ffc-b549-7ce20cb59a6c", "DetectTime": "2023-10-30T14:00:40.699856+02:00", "EventTime": "2023-10-30T14:00:40.699876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. ", "ContentType": "text/plain"}], "uids": ["Cn14S44XXMgh2ZcQs1"]} -{"Format": "IDEA0", "ID": "a0ebd6f8-8c60-4b0d-900c-e087331b1b74", "DetectTime": "2023-10-30T14:00:40.744269+02:00", "EventTime": "2023-10-30T14:00:40.744285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. ", "ContentType": "text/plain"}], "uids": ["C6QvxKSrWUwkzESJ6"]} -{"Format": "IDEA0", "ID": "2c091e09-89c5-41de-88aa-eb77dde986bd", "DetectTime": "2023-10-30T14:00:40.785965+02:00", "EventTime": "2023-10-30T14:00:40.785977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CmR64d36McTkLaspmb"]} -{"Format": "Json", "ID": "2c091e09-89c5-41de-88aa-eb77dde986bd", "DetectTime": "2023-10-30T14:00:40.785965+02:00", "EventTime": "2023-10-30T14:00:40.785977+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:32:26.788680+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:40.847857)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "21744fd8-ff2d-4b8c-a5ab-256e913064fa", "DetectTime": "2023-10-30T14:00:40.853634+02:00", "EventTime": "2023-10-30T14:00:40.853655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CVKuSlNuf6C6SkBPd"]} -{"Format": "IDEA0", "ID": "1c3b74d1-cb56-4bba-83de-e9cb36a13e5b", "DetectTime": "2023-10-30T14:00:40.899215+02:00", "EventTime": "2023-10-30T14:00:40.899231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.205.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.205.60 ", "ContentType": "text/plain"}], "uids": ["CXQhO736WT9HiS8L3e"]} -{"Format": "IDEA0", "ID": "253d3dac-0392-4cab-83b2-8de4338c45ee", "DetectTime": "2023-10-30T14:00:40.936936+02:00", "EventTime": "2023-10-30T14:00:40.936952+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAwJew79MqzGpLyu"]} -{"Format": "IDEA0", "ID": "5b9f6952-9109-48dc-bcdf-c52b3570e94f", "DetectTime": "2023-10-30T14:00:40.949460+02:00", "EventTime": "2023-10-30T14:00:40.949475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CXCyCzni0lu81wTJ4"]} -{"Format": "IDEA0", "ID": "29c843be-696e-4f04-aa68-d1bb940b45d5", "DetectTime": "2023-10-30T14:00:40.986136+02:00", "EventTime": "2023-10-30T14:00:40.986153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CaoV213TCCkKo0oJd5"]} -{"Format": "IDEA0", "ID": "09516719-3660-42f6-a78a-2f711c7d3a91", "DetectTime": "2023-10-30T14:00:41.025318+02:00", "EventTime": "2023-10-30T14:00:41.025341+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cmvwq8ueufS77NI21"]} -{"Format": "IDEA0", "ID": "56f72de7-4673-4fbd-9f3a-345b88b29430", "DetectTime": "2023-10-30T14:00:41.038893+02:00", "EventTime": "2023-10-30T14:00:41.038909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CnkuMk4mRcXyAhI9Kj"]} -{"Format": "IDEA0", "ID": "6de00f89-2a4a-4137-80cc-ef351f34b3d0", "DetectTime": "2023-10-30T14:00:41.078273+02:00", "EventTime": "2023-10-30T14:00:41.078294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C83aBd4WPWePLcUUy4"]} -{"Format": "IDEA0", "ID": "cac93b92-703a-4eec-90e5-04de304308ec", "DetectTime": "2023-10-30T14:00:41.119882+02:00", "EventTime": "2023-10-30T14:00:41.119902+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDkPaB2dvij3mbuEKf"]} -{"Format": "IDEA0", "ID": "3c8170d1-dde6-46a3-ab0c-a518e4982603", "DetectTime": "2023-10-30T14:00:41.131615+02:00", "EventTime": "2023-10-30T14:00:41.131630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["ChOrEm18UCptRmH1c"]} -{"Format": "IDEA0", "ID": "26074741-d197-47bb-8a78-eee6420f4708", "DetectTime": "2023-10-30T14:00:41.171096+02:00", "EventTime": "2023-10-30T14:00:41.171115+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8tRmk21eJ3JJyZrWh"]} -{"Format": "IDEA0", "ID": "737cf143-ab64-4c3e-b271-6101e976fb0d", "DetectTime": "2023-10-30T14:00:41.183920+02:00", "EventTime": "2023-10-30T14:00:41.183937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18052], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["Cpo5w03YIm5rJntxz5"]} -{"Format": "IDEA0", "ID": "397fbda8-5931-47c0-b2ff-d1bd722f64bb", "DetectTime": "2023-10-30T14:00:41.223098+02:00", "EventTime": "2023-10-30T14:00:41.223118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23509], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. ", "ContentType": "text/plain"}], "uids": ["CT1QiW1Dscwlw2Nol9"]} -{"Format": "IDEA0", "ID": "fd565ca3-6285-48f0-b3c1-32894940299e", "DetectTime": "2023-10-30T14:00:41.263249+02:00", "EventTime": "2023-10-30T14:00:41.263266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CAwJew79MqzGpLyu", "CDkPaB2dvij3mbuEKf", "CXY8vr2Sh44fbxC0a", "C4p9TU2lw9HWH3IkKk"]} -{"Format": "IDEA0", "ID": "f50a5db4-5f7e-4085-94e1-ef28daa6b78c", "DetectTime": "2023-10-30T14:00:41.276180+02:00", "EventTime": "2023-10-30T14:00:41.276198+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4p9TU2lw9HWH3IkKk"]} -{"Format": "IDEA0", "ID": "4a83afa9-95ec-409b-92ba-bbc9d91f413e", "DetectTime": "2023-10-30T14:00:41.290148+02:00", "EventTime": "2023-10-30T14:00:41.290168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["C70oIx1NYISuBhDgKc"]} -{"Format": "Json", "ID": "4a83afa9-95ec-409b-92ba-bbc9d91f413e", "DetectTime": "2023-10-30T14:00:41.290148+02:00", "EventTime": "2023-10-30T14:00:41.290168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:32:28.451362+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:41.348432)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07968212-a92d-43ea-9ccd-fb5e4002acde", "DetectTime": "2023-10-30T14:00:41.353605+02:00", "EventTime": "2023-10-30T14:00:41.353621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CKkjUo3yOs2HHX87mb"]} -{"Format": "IDEA0", "ID": "24066ffa-4c96-46dd-b51e-e1c0db52b4e2", "DetectTime": "2023-10-30T14:00:41.390579+02:00", "EventTime": "2023-10-30T14:00:41.390593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["Crhq5Y2G9m2eC1mff4"]} -{"Format": "IDEA0", "ID": "8b2faa2a-90aa-4d5b-9162-86c6a96276c3", "DetectTime": "2023-10-30T14:00:41.423166+02:00", "EventTime": "2023-10-30T14:00:41.423184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiWcrAHIPdwr2CGpj"]} -{"Format": "IDEA0", "ID": "84b3fd25-0f38-46bc-b6cd-14b9cd449ddf", "DetectTime": "2023-10-30T14:00:41.433276+02:00", "EventTime": "2023-10-30T14:00:41.433296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["C210ksSsobwqB9Pl1"]} -{"Format": "IDEA0", "ID": "83747674-f9fa-4558-8dc3-b69c5e8660a1", "DetectTime": "2023-10-30T14:00:41.467422+02:00", "EventTime": "2023-10-30T14:00:41.467436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CMmx2L3s4cRNu0yo0a"]} -{"Format": "IDEA0", "ID": "558026da-fc4e-4c89-93bf-8bdea8946a49", "DetectTime": "2023-10-30T14:00:41.497975+02:00", "EventTime": "2023-10-30T14:00:41.497987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CheSvP3ltKlkhUCk74"]} -{"Format": "IDEA0", "ID": "b8c74698-e254-4350-9c9c-b7b3906fe293", "DetectTime": "2023-10-30T14:00:41.529393+02:00", "EventTime": "2023-10-30T14:00:41.529409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CurZKN3gr66v7H0A"]} -{"Format": "IDEA0", "ID": "107cb61c-c453-43fd-b985-4d03135cd233", "DetectTime": "2023-10-30T14:00:41.560403+02:00", "EventTime": "2023-10-30T14:00:41.560414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. ", "ContentType": "text/plain"}], "uids": ["CIdl7x4WPi5jrdjz4d"]} -{"Format": "IDEA0", "ID": "94162805-55d5-4dc3-a647-e334c4baa9ac", "DetectTime": "2023-10-30T14:00:41.590432+02:00", "EventTime": "2023-10-30T14:00:41.590443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cwql3yg633TAPFQqj"]} -{"Format": "Json", "ID": "94162805-55d5-4dc3-a647-e334c4baa9ac", "DetectTime": "2023-10-30T14:00:41.590432+02:00", "EventTime": "2023-10-30T14:00:41.590443+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:32:30.931558+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:41.643606)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eb07c2bd-4e2a-44ab-be6a-edcc90317ee1", "DetectTime": "2023-10-30T14:00:41.647854+02:00", "EventTime": "2023-10-30T14:00:41.647870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CBrAe237wcsKjZEYqa"]} -{"Format": "IDEA0", "ID": "3a1472aa-beac-4c01-9138-32a5e3d33ccd", "DetectTime": "2023-10-30T14:00:41.679088+02:00", "EventTime": "2023-10-30T14:00:41.679104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["Cq557o48aYenFSH0ck"]} -{"Format": "IDEA0", "ID": "6beff4bc-27eb-40af-b630-03e3392ce937", "DetectTime": "2023-10-30T14:00:41.718349+02:00", "EventTime": "2023-10-30T14:00:41.718369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CkpW6C2fcRtLK62Vc3"]} -{"Format": "IDEA0", "ID": "ddd060fa-018e-4212-907d-aac49729a210", "DetectTime": "2023-10-30T14:00:41.754335+02:00", "EventTime": "2023-10-30T14:00:41.754351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Cxjg3B1DHgDcv2Pl92"]} -{"Format": "IDEA0", "ID": "45dd30c8-e6bd-4c5f-b44f-e3e6aafc0c40", "DetectTime": "2023-10-30T14:00:41.788506+02:00", "EventTime": "2023-10-30T14:00:41.788521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["Cx6zZB2yXLDVub7syh"]} -{"Format": "IDEA0", "ID": "e16f45b0-314f-4278-abc3-2585a70cdeac", "DetectTime": "2023-10-30T14:00:41.823952+02:00", "EventTime": "2023-10-30T14:00:41.823979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CctXjn2nO3ZbHYT74e"]} -{"Format": "IDEA0", "ID": "64b1bc81-bcc5-48c8-ae6e-9dfeeb40da7f", "DetectTime": "2023-10-30T14:00:41.858383+02:00", "EventTime": "2023-10-30T14:00:41.858399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C4IvqoEl43HlQnPx8"]} -{"Format": "IDEA0", "ID": "8d9c510a-3eac-4233-9f4d-99355fb1e235", "DetectTime": "2023-10-30T14:00:41.888817+02:00", "EventTime": "2023-10-30T14:00:41.888840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CDf2MC2bP0zNK4loqb"]} -{"Format": "Json", "ID": "8d9c510a-3eac-4233-9f4d-99355fb1e235", "DetectTime": "2023-10-30T14:00:41.888817+02:00", "EventTime": "2023-10-30T14:00:41.888840+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:32:32.706467+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:41.950099)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5a7002f9-ff90-4a81-8bce-40ed0675dfa0", "DetectTime": "2023-10-30T14:00:41.956657+02:00", "EventTime": "2023-10-30T14:00:41.956679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CGkXUv4VgDmzKohRUb"]} -{"Format": "IDEA0", "ID": "330a911a-7711-4c1e-a8b1-ac26b0cf7d06", "DetectTime": "2023-10-30T14:00:41.991738+02:00", "EventTime": "2023-10-30T14:00:41.991760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CMGzCL1qaNtFqdInli"]} -{"Format": "IDEA0", "ID": "58098305-fdbf-4794-8430-79126514752f", "DetectTime": "2023-10-30T14:00:42.024708+02:00", "EventTime": "2023-10-30T14:00:42.024727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CCK9c93U3DjJtrpzog"]} -{"Format": "IDEA0", "ID": "ef86c7b3-8def-4f62-ade1-c2d49c27c15b", "DetectTime": "2023-10-30T14:00:42.051636+02:00", "EventTime": "2023-10-30T14:00:42.051652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CQTrLj1oFnxZ6CTYA2"]} -{"Format": "IDEA0", "ID": "4063365d-6cd9-43ff-b842-b631ceca3d04", "DetectTime": "2023-10-30T14:00:42.078241+02:00", "EventTime": "2023-10-30T14:00:42.078253+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CW4T9O2409zPkXznr1"]} -{"Format": "IDEA0", "ID": "32d38d67-3513-4e48-839e-597d56cebdd2", "DetectTime": "2023-10-30T14:00:42.084951+02:00", "EventTime": "2023-10-30T14:00:42.084976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["CI3KwUiCQrpbRBd74"]} -{"Format": "IDEA0", "ID": "cd0c2fd7-5285-434c-b2b2-5978bcd67db5", "DetectTime": "2023-10-30T14:00:42.114484+02:00", "EventTime": "2023-10-30T14:00:42.114505+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.106.248.231"], "Hostname": ["host-190-106-248-231.supernet.com.bo Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.106.248.231 from 10.0.2.19. blacklisted IP AS: Comteco Ltda, BO AS27839 rDNS: host-190-106-248-231.supernet.com.bo Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CUoMOE25o1uA9fGxOb"]} -{"Format": "IDEA0", "ID": "659f7f85-808e-4563-b502-5e2f5ab1ed3a", "DetectTime": "2023-10-30T14:00:42.154717+02:00", "EventTime": "2023-10-30T14:00:42.154728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CEApiM21sNmfzVQ5Sd"]} -{"Format": "IDEA0", "ID": "39a81c86-91ed-4a78-8b7c-1e770d4c98a4", "DetectTime": "2023-10-30T14:00:42.185702+02:00", "EventTime": "2023-10-30T14:00:42.185718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7743], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. ", "ContentType": "text/plain"}], "uids": ["CSyA7W3RW7Z9wT0t9i"]} -{"Format": "IDEA0", "ID": "6119a7cb-e869-4a58-9b91-10fcc9207e0d", "DetectTime": "2023-10-30T14:00:42.219538+02:00", "EventTime": "2023-10-30T14:00:42.219554+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CItjE2ABHw4EWEv82"]} -{"Format": "IDEA0", "ID": "39378189-0c37-4301-b84b-cce8f739688b", "DetectTime": "2023-10-30T14:00:42.226661+02:00", "EventTime": "2023-10-30T14:00:42.226674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["Cvnbhx3Zl1Mh23HOQl"]} -{"Format": "Json", "ID": "39378189-0c37-4301-b84b-cce8f739688b", "DetectTime": "2023-10-30T14:00:42.226661+02:00", "EventTime": "2023-10-30T14:00:42.226674+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:32:34.176638+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:42.286179)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a1ffb958-e9e7-4ae8-94f3-d3c0450789ef", "DetectTime": "2023-10-30T14:00:42.290009+02:00", "EventTime": "2023-10-30T14:00:42.290020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CpojY9OzbNOj59PK"]} -{"Format": "IDEA0", "ID": "a6cc3311-fc80-41c7-a115-f57b9cc037c7", "DetectTime": "2023-10-30T14:00:42.319893+02:00", "EventTime": "2023-10-30T14:00:42.319906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CCmJxN25ckqfhSsIWe"]} -{"Format": "IDEA0", "ID": "07f2c43a-ea80-4b31-a50a-95062c7ff23c", "DetectTime": "2023-10-30T14:00:42.349200+02:00", "EventTime": "2023-10-30T14:00:42.349221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CmFDasA8dMYMbYi17"]} -{"Format": "IDEA0", "ID": "361b0c3b-ba9f-4b06-b827-4acaf9a7c965", "DetectTime": "2023-10-30T14:00:42.379494+02:00", "EventTime": "2023-10-30T14:00:42.379514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9155], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. ", "ContentType": "text/plain"}], "uids": ["Ca8K084fkudaccl2Je"]} -{"Format": "IDEA0", "ID": "a60ac12a-b02b-4324-9f14-0c507507d4d9", "DetectTime": "2023-10-30T14:00:42.410076+02:00", "EventTime": "2023-10-30T14:00:42.410096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CAr7DmdyVPo7N5dZg"]} -{"Format": "IDEA0", "ID": "34c2647c-bbf8-4718-9403-3f0eecc98076", "DetectTime": "2023-10-30T14:00:42.441155+02:00", "EventTime": "2023-10-30T14:00:42.441177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CUAq1W1F8lgiVbbv69"]} -{"Format": "IDEA0", "ID": "e50c59ac-9257-4ba3-8ba4-12690392e459", "DetectTime": "2023-10-30T14:00:42.470972+02:00", "EventTime": "2023-10-30T14:00:42.470989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C1VNgB2NDnaM36kZ0a"]} -{"Format": "IDEA0", "ID": "ccf2aba5-bd43-49e7-96a7-efc0a34f7a89", "DetectTime": "2023-10-30T14:00:42.501112+02:00", "EventTime": "2023-10-30T14:00:42.501125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["Cwnqhf1z2JahZIONKg"]} -{"Format": "Json", "ID": "ccf2aba5-bd43-49e7-96a7-efc0a34f7a89", "DetectTime": "2023-10-30T14:00:42.501112+02:00", "EventTime": "2023-10-30T14:00:42.501125+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T10:32:35.631312+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2023/10/30 14:00:42.554774)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e2c8a2a1-5f78-451f-adce-3b3d165ae1c6", "DetectTime": "2023-10-30T14:00:42.559629+02:00", "EventTime": "2023-10-30T14:00:42.559645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CXCFjs4uRLxspbJCGd"]} -{"Format": "IDEA0", "ID": "a405a2c2-8f1c-4881-9a94-e2cb38d015c2", "DetectTime": "2023-10-30T14:00:42.589112+02:00", "EventTime": "2023-10-30T14:00:42.589130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqtMfw2ps91qAHvYAh"]} -{"Format": "IDEA0", "ID": "3cabe6e8-7cb6-41e2-9810-7f585aa6376a", "DetectTime": "2023-10-30T14:00:42.616566+02:00", "EventTime": "2023-10-30T14:00:42.616590+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyOBpetr7XP55xTb1"]} -{"Format": "IDEA0", "ID": "7ddaf4d8-bb5b-4eca-8fd2-58d98c68a270", "DetectTime": "2023-10-30T14:00:42.626431+02:00", "EventTime": "2023-10-30T14:00:42.626451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. ", "ContentType": "text/plain"}], "uids": ["CQ7bMf1XRlSfN9VNBc"]} -{"Format": "IDEA0", "ID": "2237ddea-89d3-4871-af5e-75fd1aa561be", "DetectTime": "2023-10-30T14:00:42.676135+02:00", "EventTime": "2023-10-30T14:00:42.676152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. ", "ContentType": "text/plain"}], "uids": ["C7tfhj3ZLCQnnjV6j"]} -{"Format": "IDEA0", "ID": "aa1ca35a-de32-454e-a6e1-417f5c508adb", "DetectTime": "2023-10-30T14:00:42.725438+02:00", "EventTime": "2023-10-30T14:00:42.725456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CcD5aeYjWvuJquO3i"]} -{"Format": "IDEA0", "ID": "8ec8b95b-9d29-41d9-a50d-c415bbec24d7", "DetectTime": "2023-10-30T14:00:42.774089+02:00", "EventTime": "2023-10-30T14:00:42.774110+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFeUF62CsjQwj4F2e7"]} -{"Format": "IDEA0", "ID": "b694dcdd-09da-4e60-b22f-f45aaee4f140", "DetectTime": "2023-10-30T14:00:42.783586+02:00", "EventTime": "2023-10-30T14:00:42.783607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CeVRLpINtD25qFg76"]} -{"Format": "IDEA0", "ID": "ed2605fd-e6ce-40c1-8be1-eca46674b31e", "DetectTime": "2023-10-30T14:00:42.838385+02:00", "EventTime": "2023-10-30T14:00:42.838401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C90HhE1RNA1haB4EFb"]} -{"Format": "IDEA0", "ID": "1534f1e9-0595-4226-a394-d61b0b4dbc47", "DetectTime": "2023-10-30T14:00:42.887799+02:00", "EventTime": "2023-10-30T14:00:42.887827+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvRw8YN4p5pKUtJCe"]} -{"Format": "IDEA0", "ID": "097e7f73-9d83-409c-9501-7749a47a5b2c", "DetectTime": "2023-10-30T14:00:42.895985+02:00", "EventTime": "2023-10-30T14:00:42.896000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CuF9rG2xyWBZHUex24"]} -{"Format": "IDEA0", "ID": "84af5549-6263-4269-8ef5-22ebd6179b86", "DetectTime": "2023-10-30T14:00:42.947496+02:00", "EventTime": "2023-10-30T14:00:42.947508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CnthKw2RFsm8zh3KMg"]} -{"Format": "Json", "ID": "84af5549-6263-4269-8ef5-22ebd6179b86", "DetectTime": "2023-10-30T14:00:42.947496+02:00", "EventTime": "2023-10-30T14:00:42.947508+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:02:44.468005+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:43.053502)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a23c5892-5c2d-4ca0-9620-8de5782e070a", "DetectTime": "2023-10-30T14:00:43.059904+02:00", "EventTime": "2023-10-30T14:00:43.059921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Csd52b2D4bzMZvPOJj"]} -{"Format": "IDEA0", "ID": "caa03977-624c-468a-a326-17bed0f4d44e", "DetectTime": "2023-10-30T14:00:43.109157+02:00", "EventTime": "2023-10-30T14:00:43.109174+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cvq7PQ31j25pQkjkM2"]} -{"Format": "IDEA0", "ID": "06e93d1e-d9a1-4097-bd08-d6456946b5d1", "DetectTime": "2023-10-30T14:00:43.117324+02:00", "EventTime": "2023-10-30T14:00:43.117348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["Cv0pzS35PfGXQ8KRKa"]} -{"Format": "IDEA0", "ID": "72091766-7b59-478b-94d2-0c5175652c3f", "DetectTime": "2023-10-30T14:00:43.173428+02:00", "EventTime": "2023-10-30T14:00:43.173445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyOBpetr7XP55xTb1", "CSGcb41e4LUjWhZAQ2", "CvRw8YN4p5pKUtJCe", "CW4T9O2409zPkXznr1"]} -{"Format": "IDEA0", "ID": "32567c56-4a2d-41f0-ad44-c24a32e167db", "DetectTime": "2023-10-30T14:00:43.181921+02:00", "EventTime": "2023-10-30T14:00:43.181938+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSGcb41e4LUjWhZAQ2"]} -{"Format": "IDEA0", "ID": "cfde6a55-79e7-4b46-998f-36cf05ad90b1", "DetectTime": "2023-10-30T14:00:43.191953+02:00", "EventTime": "2023-10-30T14:00:43.191967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["Cp1nv91C95IsOhwTs2"]} -{"Format": "IDEA0", "ID": "f721236d-2512-40f6-9ab9-dd9381a18b54", "DetectTime": "2023-10-30T14:00:43.235051+02:00", "EventTime": "2023-10-30T14:00:43.235069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["C03zBW3vcHe2lQO6mi"]} -{"Format": "IDEA0", "ID": "fcc469f7-f6da-451f-8793-5335675787bc", "DetectTime": "2023-10-30T14:00:43.279001+02:00", "EventTime": "2023-10-30T14:00:43.279014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["C38ONJ2WXdA8by7DHd"]} -{"Format": "IDEA0", "ID": "e7fac9c7-2b6d-4270-a2a6-482bb2fdf34f", "DetectTime": "2023-10-30T14:00:43.303970+02:00", "EventTime": "2023-10-30T14:00:43.303981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CsHpGrDVANEmxspd1"]} -{"Format": "IDEA0", "ID": "60f8bd74-9c68-4152-a60f-b7ee416dcaf0", "DetectTime": "2023-10-30T14:00:43.350431+02:00", "EventTime": "2023-10-30T14:00:43.350444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CmmYoL2Qs46OF3mul9"]} -{"Format": "IDEA0", "ID": "914e09f2-d1e0-46a0-8b35-0e241ee5c6b0", "DetectTime": "2023-10-30T14:00:43.396728+02:00", "EventTime": "2023-10-30T14:00:43.396748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["C3CvRwmjB87cAHVBd"]} -{"Format": "IDEA0", "ID": "655807fb-e989-43c1-b8f4-a7f8ec6061c1", "DetectTime": "2023-10-30T14:00:43.445472+02:00", "EventTime": "2023-10-30T14:00:43.445485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6LYKh4XUGVpD8lBRd"]} -{"Format": "Json", "ID": "655807fb-e989-43c1-b8f4-a7f8ec6061c1", "DetectTime": "2023-10-30T14:00:43.445472+02:00", "EventTime": "2023-10-30T14:00:43.445485+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:03:21.423991+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:43.529920)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c9e1dedb-f2ab-4c68-8149-8b528415d83d", "DetectTime": "2023-10-30T14:00:43.535035+02:00", "EventTime": "2023-10-30T14:00:43.535056+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Hostname": ["188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 188.169.52.202 from 10.0.2.19. blacklisted IP AS: SILKNET-AS Silknet Autonomous System, GE AS35805 rDNS: 188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COBsKd239UfGcD4oH"]} -{"Format": "IDEA0", "ID": "7383a3a8-61cc-49b2-8590-03b002844c0c", "DetectTime": "2023-10-30T14:00:43.581550+02:00", "EventTime": "2023-10-30T14:00:43.581567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["C1Tvfk3EYwgPqhABLc"]} -{"Format": "IDEA0", "ID": "799a5b3f-30c7-4080-b4fd-4a0357d3c428", "DetectTime": "2023-10-30T14:00:43.625430+02:00", "EventTime": "2023-10-30T14:00:43.625459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. ", "ContentType": "text/plain"}], "uids": ["ClSIs71KapQQlk4Djc"]} -{"Format": "IDEA0", "ID": "7def508e-5f2e-436e-800e-87087c868652", "DetectTime": "2023-10-30T14:00:43.670600+02:00", "EventTime": "2023-10-30T14:00:43.670628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CUsrca3gEUEWFX6jtk"]} -{"Format": "IDEA0", "ID": "deff1812-6a70-4ad1-85e9-765b5317c68e", "DetectTime": "2023-10-30T14:00:43.713271+02:00", "EventTime": "2023-10-30T14:00:43.713284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CSEU0c3IeN60bsqOW7"]} -{"Format": "IDEA0", "ID": "cc8d0765-c28b-409b-97ba-4798c99179f9", "DetectTime": "2023-10-30T14:00:43.759644+02:00", "EventTime": "2023-10-30T14:00:43.759663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CG8mdY3ewFWnTWHy25"]} -{"Format": "IDEA0", "ID": "8a33c9cc-102b-4419-8b30-dd1cf33fcf3c", "DetectTime": "2023-10-30T14:00:43.804268+02:00", "EventTime": "2023-10-30T14:00:43.804291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C61Ms53nLnHhwF0Dc3"]} -{"Format": "IDEA0", "ID": "2d42f0c7-db4b-4992-9728-62c210dcb614", "DetectTime": "2023-10-30T14:00:43.849129+02:00", "EventTime": "2023-10-30T14:00:43.849146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CGqOB13YMr4tP6n2w"]} -{"Format": "IDEA0", "ID": "e01c4199-9bae-4ca5-8145-b35de3e82f60", "DetectTime": "2023-10-30T14:00:43.890182+02:00", "EventTime": "2023-10-30T14:00:43.890199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["CWf2Ygph8tVJ07ik2"]} -{"Format": "Json", "ID": "e01c4199-9bae-4ca5-8145-b35de3e82f60", "DetectTime": "2023-10-30T14:00:43.890182+02:00", "EventTime": "2023-10-30T14:00:43.890199+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:03:23.388164+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:43.959097)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a7f3a8a3-38e4-4b22-a621-c10adb5518f3", "DetectTime": "2023-10-30T14:00:43.965039+02:00", "EventTime": "2023-10-30T14:00:43.965055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["Cqaf1e3h4mL8Co7W6g"]} -{"Format": "IDEA0", "ID": "64877b71-8acb-49ad-aea5-e6059939cfb1", "DetectTime": "2023-10-30T14:00:44.014227+02:00", "EventTime": "2023-10-30T14:00:44.014240+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CobVdzuqGP1xvkyd8"]} -{"Format": "IDEA0", "ID": "f62428f5-ea07-4084-96b7-cc2a87275a18", "DetectTime": "2023-10-30T14:00:44.023056+02:00", "EventTime": "2023-10-30T14:00:44.023070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CMhvR444p5TO3LFZP2"]} -{"Format": "IDEA0", "ID": "4d44855a-b35e-4db1-bbdd-847f87e930fe", "DetectTime": "2023-10-30T14:00:44.064332+02:00", "EventTime": "2023-10-30T14:00:44.064344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C2fU7k3u3q8cUd1H41"]} -{"Format": "IDEA0", "ID": "e78dd000-2dde-44e7-bdc7-1278158d8eef", "DetectTime": "2023-10-30T14:00:44.111387+02:00", "EventTime": "2023-10-30T14:00:44.111403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CZnk8g4atpcgpWvSJe"]} -{"Format": "IDEA0", "ID": "876ef573-503e-4ded-96a6-5261e9227f2f", "DetectTime": "2023-10-30T14:00:44.157422+02:00", "EventTime": "2023-10-30T14:00:44.157434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CVEW0z1s735EGCFvbe"]} -{"Format": "IDEA0", "ID": "37236209-a7a0-43a1-b2da-51619d1d7e08", "DetectTime": "2023-10-30T14:00:44.204323+02:00", "EventTime": "2023-10-30T14:00:44.204335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C0irTTfxGiOfNnrVf"]} -{"Format": "IDEA0", "ID": "b8ca2787-72f2-4b50-8d78-912edd74296e", "DetectTime": "2023-10-30T14:00:44.253800+02:00", "EventTime": "2023-10-30T14:00:44.253822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CplSjp1xmONOb0t7c1"]} -{"Format": "IDEA0", "ID": "5188eec7-2d07-4c33-ab4b-c09a0759f089", "DetectTime": "2023-10-30T14:00:44.300284+02:00", "EventTime": "2023-10-30T14:00:44.300301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["C0vKWb4f7rf4pe8HYe"]} -{"Format": "Json", "ID": "5188eec7-2d07-4c33-ab4b-c09a0759f089", "DetectTime": "2023-10-30T14:00:44.300284+02:00", "EventTime": "2023-10-30T14:00:44.300301+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:03:24.632676+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:44.377623)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bc15cfe2-19dc-43f2-8191-c8ebc249a883", "DetectTime": "2023-10-30T14:00:44.383004+02:00", "EventTime": "2023-10-30T14:00:44.383021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CembkPipjR9iSkgz6"]} -{"Format": "IDEA0", "ID": "428b149c-ea68-4fad-8463-5a309ed9ee10", "DetectTime": "2023-10-30T14:00:44.432263+02:00", "EventTime": "2023-10-30T14:00:44.432288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7743], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. ", "ContentType": "text/plain"}], "uids": ["CbrjeMcSlxTe9vgfk"]} -{"Format": "IDEA0", "ID": "a663d4cc-b1c0-4176-bf17-87a3cd4b6f9b", "DetectTime": "2023-10-30T14:00:44.481136+02:00", "EventTime": "2023-10-30T14:00:44.481150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["CkOJih2U35ych1Fgn4"]} -{"Format": "IDEA0", "ID": "bd6fe75c-8d18-417f-89ef-9e7246d41034", "DetectTime": "2023-10-30T14:00:44.526630+02:00", "EventTime": "2023-10-30T14:00:44.526648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["COhCw6EeurAnSpqRi"]} -{"Format": "IDEA0", "ID": "c4116ac9-b885-4623-8f21-924f24a1e848", "DetectTime": "2023-10-30T14:00:44.537781+02:00", "EventTime": "2023-10-30T14:00:44.537794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["C8FNvo11ce1nFmNJCg"]} -{"Format": "IDEA0", "ID": "e68ee5ea-29e6-4094-90a2-aa97141c2192", "DetectTime": "2023-10-30T14:00:44.579647+02:00", "EventTime": "2023-10-30T14:00:44.579663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["C6cJOr3dNuNn2H8KFb"]} -{"Format": "IDEA0", "ID": "dfa2217a-cae7-4214-aed5-ca238054f8e0", "DetectTime": "2023-10-30T14:00:44.627615+02:00", "EventTime": "2023-10-30T14:00:44.627633+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ccgy5L3qh8iBtmAX29"]} -{"Format": "IDEA0", "ID": "3df43186-e9d5-4a79-8cb3-0981356e67a9", "DetectTime": "2023-10-30T14:00:44.639030+02:00", "EventTime": "2023-10-30T14:00:44.639049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CgRQP24pG9TU4PR7gg"]} -{"Format": "IDEA0", "ID": "4af814fe-27b4-4771-abbf-3839717f1927", "DetectTime": "2023-10-30T14:00:44.685077+02:00", "EventTime": "2023-10-30T14:00:44.685090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CpXJMBoDcQ69Pfcl8"]} -{"Format": "IDEA0", "ID": "3a5bb066-c672-4250-996c-5daedec99f3c", "DetectTime": "2023-10-30T14:00:44.731012+02:00", "EventTime": "2023-10-30T14:00:44.731030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C17zI13d9TsUNxG3fc"]} -{"Format": "Json", "ID": "3a5bb066-c672-4250-996c-5daedec99f3c", "DetectTime": "2023-10-30T14:00:44.731012+02:00", "EventTime": "2023-10-30T14:00:44.731030+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:03:26.257069+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:44.803651)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "235daeb9-2103-4c5c-8403-19c520cb4540", "DetectTime": "2023-10-30T14:00:44.808904+02:00", "EventTime": "2023-10-30T14:00:44.808921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CjU5102KT00JIVPPof"]} -{"Format": "IDEA0", "ID": "d677c9a2-f09f-47b0-88d2-8fe0d8845b80", "DetectTime": "2023-10-30T14:00:44.856208+02:00", "EventTime": "2023-10-30T14:00:44.856230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["CuKRCx4WMW8Z5QAvme"]} -{"Format": "IDEA0", "ID": "8075e1b2-4845-4c2e-8edb-c47086c55957", "DetectTime": "2023-10-30T14:00:44.902157+02:00", "EventTime": "2023-10-30T14:00:44.902174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CJs5803nbw3vvubEMi"]} -{"Format": "IDEA0", "ID": "55cfbc12-eb91-4579-94ba-d2a21a9b2a95", "DetectTime": "2023-10-30T14:00:44.946694+02:00", "EventTime": "2023-10-30T14:00:44.946719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C1K40w4HRu5o7Ic3C1"]} -{"Format": "IDEA0", "ID": "320f034c-81c4-461d-918d-d79fd7a7d6ef", "DetectTime": "2023-10-30T14:00:44.989831+02:00", "EventTime": "2023-10-30T14:00:44.989848+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.232.130"], "Hostname": ["ppp-94-64-232-130.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 94.64.232.130 from 10.0.2.19. blacklisted IP AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-64-232-130.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CTrJaD3nEEtVqnO372"]} -{"Format": "IDEA0", "ID": "63f8691e-06d4-4037-b940-9dda6b9177ab", "DetectTime": "2023-10-30T14:00:45.037001+02:00", "EventTime": "2023-10-30T14:00:45.037021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. ", "ContentType": "text/plain"}], "uids": ["CRZLdidpozswy64Ek"]} -{"Format": "IDEA0", "ID": "3a6190ed-656e-41bd-afd8-954f8d4f13c2", "DetectTime": "2023-10-30T14:00:45.089053+02:00", "EventTime": "2023-10-30T14:00:45.089075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cexh501EjsNC6uoS29"]} -{"Format": "IDEA0", "ID": "1bf03210-265c-49ef-8980-c7ed92639f60", "DetectTime": "2023-10-30T14:00:45.134002+02:00", "EventTime": "2023-10-30T14:00:45.134018+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyJtrE2H8ITRsUN3W5"]} -{"Format": "IDEA0", "ID": "abf3d663-24a2-41b1-a4ea-139cf1c93d39", "DetectTime": "2023-10-30T14:00:45.145838+02:00", "EventTime": "2023-10-30T14:00:45.145864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CzanEVCkdwmNkf90h"]} -{"Format": "IDEA0", "ID": "273b531f-22d1-4896-a36e-c2e18922eca3", "DetectTime": "2023-10-30T14:00:45.190546+02:00", "EventTime": "2023-10-30T14:00:45.190563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C74ujZjIoB6uYMzR"]} -{"Format": "Json", "ID": "273b531f-22d1-4896-a36e-c2e18922eca3", "DetectTime": "2023-10-30T14:00:45.190546+02:00", "EventTime": "2023-10-30T14:00:45.190563+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:34:36.979411+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:45.273587)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cf1f6983-6173-41af-a70d-db0fc534680a", "DetectTime": "2023-10-30T14:00:45.279191+02:00", "EventTime": "2023-10-30T14:00:45.279215+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C879bH1Udma1bulSAl"]} -{"Format": "IDEA0", "ID": "089698c4-5e19-4a2f-91a8-30c5d5ed25f5", "DetectTime": "2023-10-30T14:00:45.292184+02:00", "EventTime": "2023-10-30T14:00:45.292204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CLBQp02Mu79sTvOYRf"]} -{"Format": "IDEA0", "ID": "2d3be5be-22aa-4f3d-9755-33eff1c6601a", "DetectTime": "2023-10-30T14:00:45.339432+02:00", "EventTime": "2023-10-30T14:00:45.339453+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cg1Nd8LUgYbhEXq5e"]} -{"Format": "IDEA0", "ID": "446aa732-0d85-4f72-a690-aad7802fea96", "DetectTime": "2023-10-30T14:00:45.351735+02:00", "EventTime": "2023-10-30T14:00:45.351755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. ", "ContentType": "text/plain"}], "uids": ["CS6cfq2IYw5vKAzCB"]} -{"Format": "IDEA0", "ID": "a3e2b464-cca0-4787-a18a-cdbdb0a3493b", "DetectTime": "2023-10-30T14:00:45.399505+02:00", "EventTime": "2023-10-30T14:00:45.399523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CFO9cb1MsO4utZoUr"]} -{"Format": "IDEA0", "ID": "8d0b3ece-91da-45d7-97b5-6bc5a4cf9bab", "DetectTime": "2023-10-30T14:00:45.440352+02:00", "EventTime": "2023-10-30T14:00:45.440375+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChhiOf1G918CMd8Z4"]} -{"Format": "IDEA0", "ID": "31471c3c-6ca0-4376-8e1e-9276671cfe59", "DetectTime": "2023-10-30T14:00:45.451360+02:00", "EventTime": "2023-10-30T14:00:45.451380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CAJwdR2LJARun5YXXc"]} -{"Format": "IDEA0", "ID": "ac6f36e6-1020-4d7c-a907-3c23c888eac2", "DetectTime": "2023-10-30T14:00:45.492318+02:00", "EventTime": "2023-10-30T14:00:45.492340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Co1csm4ulhSBCrXE21"]} -{"Format": "IDEA0", "ID": "61bc6445-5065-4f77-9aee-195d9a0ccf5b", "DetectTime": "2023-10-30T14:00:45.536703+02:00", "EventTime": "2023-10-30T14:00:45.536719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CJ4jrx3xmtI9X4O414"]} -{"Format": "IDEA0", "ID": "33afd408-7f4e-4b4a-b8ce-d3fa70a4fac7", "DetectTime": "2023-10-30T14:00:45.582351+02:00", "EventTime": "2023-10-30T14:00:45.582370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["COhCw6EeurAnSpqRi", "Cg1Nd8LUgYbhEXq5e", "CU2A393MPrqQiJ8Bm1", "CyJtrE2H8ITRsUN3W5"]} -{"Format": "IDEA0", "ID": "6ff341dd-53ed-4c0f-8784-48e53f448a35", "DetectTime": "2023-10-30T14:00:45.594655+02:00", "EventTime": "2023-10-30T14:00:45.594681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CJ7flv2pAdwJ4Ltkf3"]} -{"Format": "IDEA0", "ID": "cb7a8e93-ef32-43c4-aed0-d44d35006189", "DetectTime": "2023-10-30T14:00:45.636497+02:00", "EventTime": "2023-10-30T14:00:45.636512+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CU2A393MPrqQiJ8Bm1"]} -{"Format": "IDEA0", "ID": "feab229a-a52d-4a91-b6a2-5046d23cfc5e", "DetectTime": "2023-10-30T14:00:45.647597+02:00", "EventTime": "2023-10-30T14:00:45.647614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CET3Rw2qiOPKvPrSfh"]} -{"Format": "Json", "ID": "feab229a-a52d-4a91-b6a2-5046d23cfc5e", "DetectTime": "2023-10-30T14:00:45.647597+02:00", "EventTime": "2023-10-30T14:00:45.647614+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:34:38.740430+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:45.713015)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "829ade58-8724-41a4-99cf-b0063a3929fe", "DetectTime": "2023-10-30T14:00:45.719275+02:00", "EventTime": "2023-10-30T14:00:45.719291+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjcowPyvglvtKJrpk"]} -{"Format": "IDEA0", "ID": "22cbcfa7-c9f2-4cbb-80c8-9c55f7f3143b", "DetectTime": "2023-10-30T14:00:45.737990+02:00", "EventTime": "2023-10-30T14:00:45.738012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["C6Dg0N2IWRnW2W4Lu3"]} -{"Format": "IDEA0", "ID": "e1eb358f-d4f2-4f1e-87f4-55d2db595c57", "DetectTime": "2023-10-30T14:00:45.775479+02:00", "EventTime": "2023-10-30T14:00:45.775492+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRdwDBcc7no19PBQg"]} -{"Format": "IDEA0", "ID": "02ffc1b1-3da3-4a33-a687-7773af511085", "DetectTime": "2023-10-30T14:00:45.787162+02:00", "EventTime": "2023-10-30T14:00:45.787178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C3dqAE170drWAb9dp5"]} -{"Format": "IDEA0", "ID": "efeb419b-3c5a-44b2-96fa-bcb7cf115dc2", "DetectTime": "2023-10-30T14:00:45.826437+02:00", "EventTime": "2023-10-30T14:00:45.826452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CsOuzZ1oL7T2bZPC6i"]} -{"Format": "IDEA0", "ID": "6761a749-b7e9-4526-9198-841ab7bc59af", "DetectTime": "2023-10-30T14:00:45.865849+02:00", "EventTime": "2023-10-30T14:00:45.865865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CiMWe4Hw2y4otOZe3"]} -{"Format": "IDEA0", "ID": "fcd1ef1f-b905-4bc7-81f1-efe36449c1c6", "DetectTime": "2023-10-30T14:00:45.907327+02:00", "EventTime": "2023-10-30T14:00:45.907350+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ch3JtwmS9q1YdvkH1"]} -{"Format": "IDEA0", "ID": "71536a08-049e-47ec-98cd-dfe3d5bdcd20", "DetectTime": "2023-10-30T14:00:45.922204+02:00", "EventTime": "2023-10-30T14:00:45.922223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. ", "ContentType": "text/plain"}], "uids": ["CvEDTc18XxSXtSS3q2"]} -{"Format": "IDEA0", "ID": "b274bbe2-41bb-4851-894d-03c4a289c382", "DetectTime": "2023-10-30T14:00:45.963369+02:00", "EventTime": "2023-10-30T14:00:45.963391+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CP4Fix2oOn9vzNLqe4"]} -{"Format": "IDEA0", "ID": "cc60e88d-69c2-4567-9af8-967c6c9b446c", "DetectTime": "2023-10-30T14:00:45.974023+02:00", "EventTime": "2023-10-30T14:00:45.974048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["C4Iufh2X02mXVI6We5"]} -{"Format": "IDEA0", "ID": "12eeab08-471c-41a7-9092-3961f59db32f", "DetectTime": "2023-10-30T14:00:46.010940+02:00", "EventTime": "2023-10-30T14:00:46.010959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C67tdo9W8TFBO03N1"]} -{"Format": "IDEA0", "ID": "33c2b634-9208-4bed-8d23-b9394081075b", "DetectTime": "2023-10-30T14:00:46.048061+02:00", "EventTime": "2023-10-30T14:00:46.048081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CmYKFIStK5Mlaie0b"]} -{"Format": "Json", "ID": "33c2b634-9208-4bed-8d23-b9394081075b", "DetectTime": "2023-10-30T14:00:46.048061+02:00", "EventTime": "2023-10-30T14:00:46.048081+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:34:40.863307+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:46.115446)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e4bac0ac-0e43-41e6-bef0-4fa1733bddcc", "DetectTime": "2023-10-30T14:00:46.122185+02:00", "EventTime": "2023-10-30T14:00:46.122217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C5gos84iSgo96J9sL7"]} -{"Format": "IDEA0", "ID": "59ba2acd-9159-4090-bd73-23b32b9a8ad3", "DetectTime": "2023-10-30T14:00:46.160929+02:00", "EventTime": "2023-10-30T14:00:46.160950+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYJatY3JxFrSSmpKkb"]} -{"Format": "IDEA0", "ID": "c3f77ef8-1f3c-4cce-8768-165c6755c09b", "DetectTime": "2023-10-30T14:00:46.170797+02:00", "EventTime": "2023-10-30T14:00:46.170822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["ChMs0Z3MAlV3jpR7Ge"]} -{"Format": "IDEA0", "ID": "31a08606-001a-47f1-abd3-ef070d7fc044", "DetectTime": "2023-10-30T14:00:46.204575+02:00", "EventTime": "2023-10-30T14:00:46.204596+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6Axe34GZlg2gykQ2e"]} -{"Format": "IDEA0", "ID": "5e218436-c825-4eaf-9915-78d4f06d2f4e", "DetectTime": "2023-10-30T14:00:46.217112+02:00", "EventTime": "2023-10-30T14:00:46.217139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CBbFCb30sJ0vP82B3e"]} -{"Format": "IDEA0", "ID": "7d1a430e-c78b-413c-9702-40ecddfe770f", "DetectTime": "2023-10-30T14:00:46.253181+02:00", "EventTime": "2023-10-30T14:00:46.253197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CQIfvo2mXICvHrksui"]} -{"Format": "IDEA0", "ID": "3651fbc7-f111-4d82-91c4-72e44b8bf15b", "DetectTime": "2023-10-30T14:00:46.288950+02:00", "EventTime": "2023-10-30T14:00:46.288969+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cmvo8g37E3faqXLyPb"]} -{"Format": "IDEA0", "ID": "c0835f25-4d70-4ed3-b172-56034a067be2", "DetectTime": "2023-10-30T14:00:46.302187+02:00", "EventTime": "2023-10-30T14:00:46.302204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CmScSH2PWgJsAiShT"]} -{"Format": "IDEA0", "ID": "d0525b21-7ddf-4b8e-b556-c04213070041", "DetectTime": "2023-10-30T14:00:46.337288+02:00", "EventTime": "2023-10-30T14:00:46.337315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C6Axe34GZlg2gykQ2e", "CRdwDBcc7no19PBQg", "CmLfPvxarBif09Oq5", "CP4Fix2oOn9vzNLqe4"]} -{"Format": "IDEA0", "ID": "552ec34c-a4bd-46c8-b76e-1fb0cfdf4d66", "DetectTime": "2023-10-30T14:00:46.349598+02:00", "EventTime": "2023-10-30T14:00:46.349618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CWXO9Q3WHPAPYN9Tpk"]} -{"Format": "IDEA0", "ID": "3468c3ff-2241-4c8a-911f-351aa9036bdd", "DetectTime": "2023-10-30T14:00:46.387053+02:00", "EventTime": "2023-10-30T14:00:46.387072+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmLfPvxarBif09Oq5"]} -{"Format": "IDEA0", "ID": "77e01b1e-c08a-4e28-a27d-7481bd015d45", "DetectTime": "2023-10-30T14:00:46.398278+02:00", "EventTime": "2023-10-30T14:00:46.398296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["CsoB913fG6vLE0ZVve"]} -{"Format": "IDEA0", "ID": "68cdd43d-149e-4b97-ac72-00bbd55cfc63", "DetectTime": "2023-10-30T14:00:46.434466+02:00", "EventTime": "2023-10-30T14:00:46.434483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CpwLdz4wWRHwWL2iE6"]} -{"Format": "Json", "ID": "68cdd43d-149e-4b97-ac72-00bbd55cfc63", "DetectTime": "2023-10-30T14:00:46.434466+02:00", "EventTime": "2023-10-30T14:00:46.434483+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:34:42.044898+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:46.500001)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e8b9173-80df-4396-8fd3-85d9da0ca416", "DetectTime": "2023-10-30T14:00:46.504838+02:00", "EventTime": "2023-10-30T14:00:46.504856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["CdpEYf3ywxAKYpAyke"]} -{"Format": "IDEA0", "ID": "316c932c-3940-4166-8c02-d5b85cc0e848", "DetectTime": "2023-10-30T14:00:46.542766+02:00", "EventTime": "2023-10-30T14:00:46.542808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CZSIdQ36RuF4ITxjT6"]} -{"Format": "IDEA0", "ID": "22d6fe84-1a41-4691-9ebf-d7ef1f2ff47e", "DetectTime": "2023-10-30T14:00:46.574805+02:00", "EventTime": "2023-10-30T14:00:46.574823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["Cc7eHk43ZeYzLZXiD3"]} -{"Format": "IDEA0", "ID": "9d9b123f-d946-4ace-948a-6a99b273bc3d", "DetectTime": "2023-10-30T14:00:46.604963+02:00", "EventTime": "2023-10-30T14:00:46.604980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CVpjK14uZ17t7SRCoh"]} -{"Format": "IDEA0", "ID": "8fac1228-4748-4681-b99d-a74eb2e36672", "DetectTime": "2023-10-30T14:00:46.638075+02:00", "EventTime": "2023-10-30T14:00:46.638094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["CnJTyP25vkuCHm271a"]} -{"Format": "IDEA0", "ID": "7eeca6f0-ceab-4978-84e1-7a876131ab12", "DetectTime": "2023-10-30T14:00:46.668777+02:00", "EventTime": "2023-10-30T14:00:46.668794+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ccu0xK1NrS0B0V9XH"]} -{"Format": "IDEA0", "ID": "64e7a4e0-a168-409f-9f1d-2a3ee0d9fda2", "DetectTime": "2023-10-30T14:00:46.679982+02:00", "EventTime": "2023-10-30T14:00:46.680007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C5RWDG1kCO4qaSrqu1"]} -{"Format": "IDEA0", "ID": "d0b50de8-f32b-4a4a-966f-9e49cabb0d78", "DetectTime": "2023-10-30T14:00:46.714174+02:00", "EventTime": "2023-10-30T14:00:46.714195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["Ckzd0n1FAQR8HFEbna"]} -{"Format": "IDEA0", "ID": "0dd82a4e-bdc1-4c81-9bdd-4d93e1a946bb", "DetectTime": "2023-10-30T14:00:46.745742+02:00", "EventTime": "2023-10-30T14:00:46.745754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CUnW8Y2g8yoxHxIKt8"]} -{"Format": "IDEA0", "ID": "5c05a5c4-ba2f-40ac-99eb-4886bbec391e", "DetectTime": "2023-10-30T14:00:46.778075+02:00", "EventTime": "2023-10-30T14:00:46.778091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CzgQrM3Jj7TXapvhgh"]} -{"Format": "Json", "ID": "5c05a5c4-ba2f-40ac-99eb-4886bbec391e", "DetectTime": "2023-10-30T14:00:46.778075+02:00", "EventTime": "2023-10-30T14:00:46.778091+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T11:35:02.101958+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2023/10/30 14:00:46.835489)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9605bb57-fa92-4f11-8414-163cec991620", "DetectTime": "2023-10-30T14:00:46.840480+02:00", "EventTime": "2023-10-30T14:00:46.840500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CFdlH42a04YGeW0sZ1"]} -{"Format": "IDEA0", "ID": "fd6a3834-ab84-4cbd-a9f9-3a8df2eb2f3d", "DetectTime": "2023-10-30T14:00:46.872167+02:00", "EventTime": "2023-10-30T14:00:46.872183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CNUBdI2KWTztjY5P34"]} -{"Format": "IDEA0", "ID": "713941d6-064f-4cc3-a0e4-3aeeb2dfea45", "DetectTime": "2023-10-30T14:00:46.902582+02:00", "EventTime": "2023-10-30T14:00:46.902611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["C1Vi0T2kHRHePAyare"]} -{"Format": "IDEA0", "ID": "0776e1f3-536e-4efd-87a4-fad316a1a705", "DetectTime": "2023-10-30T14:00:46.935333+02:00", "EventTime": "2023-10-30T14:00:46.935353+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChHLsEMNOUtsL9m4c"]} -{"Format": "IDEA0", "ID": "9583b2e8-e9d0-4efe-a9ba-baf198049af9", "DetectTime": "2023-10-30T14:00:46.951224+02:00", "EventTime": "2023-10-30T14:00:46.951248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["CCFiqS14ziNPsQ2Mpc"]} -{"Format": "IDEA0", "ID": "ee26e3d3-a903-4614-83fa-f582ab6faabb", "DetectTime": "2023-10-30T14:00:46.982641+02:00", "EventTime": "2023-10-30T14:00:46.982663+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.233.22.243"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.233.22.243 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CFO9xM1Lnqtnk1udn9"]} -{"Format": "IDEA0", "ID": "62fad67b-08bf-43ff-be43-97dc5adcbeec", "DetectTime": "2023-10-30T14:00:47.027108+02:00", "EventTime": "2023-10-30T14:00:47.027134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C9v3iC2ND4Nfuq5iWb"]} -{"Format": "IDEA0", "ID": "da4cc495-32ad-416b-a36b-298614b9987a", "DetectTime": "2023-10-30T14:00:47.057754+02:00", "EventTime": "2023-10-30T14:00:47.057771+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFNWtM1x7fdY1GLeS5"]} -{"Format": "IDEA0", "ID": "d29da86c-6026-486a-a8b3-65d720fbc26f", "DetectTime": "2023-10-30T14:00:47.072026+02:00", "EventTime": "2023-10-30T14:00:47.072052+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBzIuO2H3u2twXZfB2"]} -{"Format": "IDEA0", "ID": "1b217e9d-63fb-4732-9613-e5c54cd9efc4", "DetectTime": "2023-10-30T14:00:47.087306+02:00", "EventTime": "2023-10-30T14:00:47.087328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVpwh927th0HxIwct"]} -{"Format": "IDEA0", "ID": "e87975fe-5c77-48e5-8ceb-773df9138e7b", "DetectTime": "2023-10-30T14:00:47.118349+02:00", "EventTime": "2023-10-30T14:00:47.118370+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C599q34H98xs1Z4wek"]} -{"Format": "IDEA0", "ID": "316b3d9d-0f1d-4222-ba00-6801835ef77c", "DetectTime": "2023-10-30T14:00:47.133240+02:00", "EventTime": "2023-10-30T14:00:47.133264+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqFkRQ1aAcCizA3wO1"]} -{"Format": "IDEA0", "ID": "24d7ad12-e6ba-412e-89b1-9a18f61f50b6", "DetectTime": "2023-10-30T14:00:47.147694+02:00", "EventTime": "2023-10-30T14:00:47.147714+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjXSzq2ZQV3LbVYief"]} -{"Format": "IDEA0", "ID": "9bb42e1e-0970-4259-947b-65b98f58db4c", "DetectTime": "2023-10-30T14:00:47.162115+02:00", "EventTime": "2023-10-30T14:00:47.162134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["ChHLsEMNOUtsL9m4c", "Ca8CRr4JbeojKS4Mt3", "CBzIuO2H3u2twXZfB2", "CqFkRQ1aAcCizA3wO1"]} -{"Format": "IDEA0", "ID": "530b32ab-0737-417a-80e0-7cf5762f1f2c", "DetectTime": "2023-10-30T14:00:47.176399+02:00", "EventTime": "2023-10-30T14:00:47.176419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ca8CRr4JbeojKS4Mt3"]} -{"Format": "IDEA0", "ID": "7584c628-340c-4dd2-a7fb-c687fbd0bebe", "DetectTime": "2023-10-30T14:00:47.190181+02:00", "EventTime": "2023-10-30T14:00:47.190198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CMS6Iz2mIhJsAIIJM9"]} -{"Format": "IDEA0", "ID": "84956a64-d94a-4188-93c6-4f2cf4b75221", "DetectTime": "2023-10-30T14:00:47.242410+02:00", "EventTime": "2023-10-30T14:00:47.242438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CTN2dr3Wy6ZxycIGo8"]} -{"Format": "IDEA0", "ID": "3009406f-ded7-4278-b233-6a8e502bdb8e", "DetectTime": "2023-10-30T14:00:47.296518+02:00", "EventTime": "2023-10-30T14:00:47.296533+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdJd5d2gB0JpINqiJh"]} -{"Format": "IDEA0", "ID": "f24f7416-13e0-4d72-90f2-8e05fa787bee", "DetectTime": "2023-10-30T14:00:47.311195+02:00", "EventTime": "2023-10-30T14:00:47.311215+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cqv9bW1x9wVc2NVO7f"]} -{"Format": "IDEA0", "ID": "ec0f8c11-f381-4a2c-8db2-55a1bd75dfe3", "DetectTime": "2023-10-30T14:00:47.325675+02:00", "EventTime": "2023-10-30T14:00:47.325695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CW8kju12LwSF0nXtO2"]} -{"Format": "IDEA0", "ID": "11f299f5-20d6-4788-922d-439d3aef810c", "DetectTime": "2023-10-30T14:00:47.382424+02:00", "EventTime": "2023-10-30T14:00:47.382442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CQiTnl1eq5Sf9qjX81"]} -{"Format": "IDEA0", "ID": "6eaaa65a-3f32-43d5-928e-556bb83482db", "DetectTime": "2023-10-30T14:00:47.438255+02:00", "EventTime": "2023-10-30T14:00:47.438276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CEMNEG4zxGSTQimMAl"]} -{"Format": "IDEA0", "ID": "1fd6633b-401d-4ee2-9164-cdd703befd6c", "DetectTime": "2023-10-30T14:00:47.495243+02:00", "EventTime": "2023-10-30T14:00:47.495260+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQIAdlOPCaBL63nMj"]} -{"Format": "IDEA0", "ID": "810e6a9a-6a7b-4487-a427-8512b3792bde", "DetectTime": "2023-10-30T14:00:47.509322+02:00", "EventTime": "2023-10-30T14:00:47.509347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CawSkC1mSb3Pd6saq3"]} -{"Format": "IDEA0", "ID": "942aafed-5406-4efa-85bc-031e02201d24", "DetectTime": "2023-10-30T14:00:47.570692+02:00", "EventTime": "2023-10-30T14:00:47.570719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["Cz3FXy2umKXKd86in6"]} -{"Format": "Json", "ID": "942aafed-5406-4efa-85bc-031e02201d24", "DetectTime": "2023-10-30T14:00:47.570692+02:00", "EventTime": "2023-10-30T14:00:47.570719+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:06:10.909079+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:47.692966)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "46e50749-5b3e-48b9-bb4c-c21410028dc3", "DetectTime": "2023-10-30T14:00:47.697555+02:00", "EventTime": "2023-10-30T14:00:47.697570+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLGTjV9ZUWKUHt3C9"]} -{"Format": "IDEA0", "ID": "a497c6cd-5c3f-4140-b498-860a734af63f", "DetectTime": "2023-10-30T14:00:47.716469+02:00", "EventTime": "2023-10-30T14:00:47.716489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CGrKuS24U5ZFqq1wF6"]} -{"Format": "IDEA0", "ID": "28db15c4-3446-45e5-8ffd-3e4b01a3b3c0", "DetectTime": "2023-10-30T14:00:47.771374+02:00", "EventTime": "2023-10-30T14:00:47.771392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CeVoOS5Vz2YbxDcc"]} -{"Format": "IDEA0", "ID": "bc53f7e8-1f56-43bb-8399-43064f3a9611", "DetectTime": "2023-10-30T14:00:47.822417+02:00", "EventTime": "2023-10-30T14:00:47.822436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["Cft9L4hAnehiWcwR7"]} -{"Format": "IDEA0", "ID": "5f5304b7-d825-4401-a75e-667c19537ff9", "DetectTime": "2023-10-30T14:00:47.873097+02:00", "EventTime": "2023-10-30T14:00:47.873123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CNBa3m2NPZAmYmNeG5"]} -{"Format": "IDEA0", "ID": "49e85af2-da73-4745-8e89-b863aa2cd4aa", "DetectTime": "2023-10-30T14:00:47.922185+02:00", "EventTime": "2023-10-30T14:00:47.922207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CPOTbk28TD2JZfII93"]} -{"Format": "IDEA0", "ID": "a4c3d3af-23a3-46ad-bd10-4e65390915f8", "DetectTime": "2023-10-30T14:00:47.976472+02:00", "EventTime": "2023-10-30T14:00:47.976498+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuCQrd2zWf9YEF8SS5"]} -{"Format": "IDEA0", "ID": "0db15be7-384d-425e-be9d-79ef8bd10afa", "DetectTime": "2023-10-30T14:00:47.992321+02:00", "EventTime": "2023-10-30T14:00:47.992341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CsKETj4uvKrpmThxj1"]} -{"Format": "IDEA0", "ID": "af5e0888-aae3-435d-bd62-656cfcac423f", "DetectTime": "2023-10-30T14:00:48.051745+02:00", "EventTime": "2023-10-30T14:00:48.051764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CdcJ0bnyC9VoQW2Cl"]} -{"Format": "IDEA0", "ID": "4f29faa3-bdbf-4ff4-b038-52322c3741e8", "DetectTime": "2023-10-30T14:00:48.103819+02:00", "EventTime": "2023-10-30T14:00:48.103842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C8RdcY1g41U5XTXSE6"]} -{"Format": "Json", "ID": "4f29faa3-bdbf-4ff4-b038-52322c3741e8", "DetectTime": "2023-10-30T14:00:48.103819+02:00", "EventTime": "2023-10-30T14:00:48.103842+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:06:29.898362+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:48.187769)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5c02aeca-eb60-42d7-93ec-dd5f04c705fd", "DetectTime": "2023-10-30T14:00:48.193192+02:00", "EventTime": "2023-10-30T14:00:48.193205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C55rJO1iJMGUSjgW9j"]} -{"Format": "IDEA0", "ID": "f3882cbc-29d4-4e8c-bcb9-dd09dbb1ad40", "DetectTime": "2023-10-30T14:00:48.247807+02:00", "EventTime": "2023-10-30T14:00:48.247834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CJIT8v4WIM4aG8NtUa"]} -{"Format": "IDEA0", "ID": "150434a5-1d5c-4273-a0d5-6cff0cfff15c", "DetectTime": "2023-10-30T14:00:48.295078+02:00", "EventTime": "2023-10-30T14:00:48.295096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CpWgt21BQC22FvMkYk"]} -{"Format": "IDEA0", "ID": "50069530-b83c-4c73-bf2c-358ce9da6c94", "DetectTime": "2023-10-30T14:00:48.347464+02:00", "EventTime": "2023-10-30T14:00:48.347481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CuYv7T1LRbma69DPXc"]} -{"Format": "IDEA0", "ID": "9e986b50-15c6-40ef-8949-95de1abb48c5", "DetectTime": "2023-10-30T14:00:48.394221+02:00", "EventTime": "2023-10-30T14:00:48.394242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CfItektRG3MEwdpF2"]} -{"Format": "IDEA0", "ID": "1cba7f8b-d7d6-4623-b036-56c8bb5c3dc8", "DetectTime": "2023-10-30T14:00:48.442940+02:00", "EventTime": "2023-10-30T14:00:48.442961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CDAu4Kclvm3EeF25c"]} -{"Format": "IDEA0", "ID": "e9f5a877-f7f1-4b75-bc6b-7e1cae11e5c4", "DetectTime": "2023-10-30T14:00:48.492886+02:00", "EventTime": "2023-10-30T14:00:48.492904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["C8s8Dy4sgzKhRDDUPc"]} -{"Format": "IDEA0", "ID": "06176388-0318-4b6c-8d6f-4a3ef85745b8", "DetectTime": "2023-10-30T14:00:48.546311+02:00", "EventTime": "2023-10-30T14:00:48.546332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["CRald9rfLWe2s0mv"]} -{"Format": "Json", "ID": "06176388-0318-4b6c-8d6f-4a3ef85745b8", "DetectTime": "2023-10-30T14:00:48.546311+02:00", "EventTime": "2023-10-30T14:00:48.546332+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:06:31.115807+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:48.633098)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8aeab064-bf46-4841-b0bf-6d847af61f97", "DetectTime": "2023-10-30T14:00:48.639611+02:00", "EventTime": "2023-10-30T14:00:48.639627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CmOHGn25QatiEqQMj2"]} -{"Format": "IDEA0", "ID": "a791a9a2-8332-4147-801f-3445b1b21754", "DetectTime": "2023-10-30T14:00:48.688536+02:00", "EventTime": "2023-10-30T14:00:48.688552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CJy4mA35xTbi1q6rtc"]} -{"Format": "IDEA0", "ID": "342ef87d-d9f5-44c9-97ff-62cc9d631efa", "DetectTime": "2023-10-30T14:00:48.744007+02:00", "EventTime": "2023-10-30T14:00:48.744030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C8ES5vRx0D5lNh3Fk"]} -{"Format": "IDEA0", "ID": "3d9ed995-5272-4ce5-b821-9369b260dcd7", "DetectTime": "2023-10-30T14:00:48.795385+02:00", "EventTime": "2023-10-30T14:00:48.795401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["C2sPSE4P0vqMAzD6Oe"]} -{"Format": "IDEA0", "ID": "39343214-46e6-4f76-8494-b1f468ca0d85", "DetectTime": "2023-10-30T14:00:48.856025+02:00", "EventTime": "2023-10-30T14:00:48.856046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["CE1Jiv1lkKjtzoLAma"]} -{"Format": "IDEA0", "ID": "023448ea-1160-4da8-81dc-fcc034ba860e", "DetectTime": "2023-10-30T14:00:48.915683+02:00", "EventTime": "2023-10-30T14:00:48.915706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CYZDdLQYMcurjtKmh"]} -{"Format": "IDEA0", "ID": "03a54438-235e-4c84-97c9-6a4accd6ba7f", "DetectTime": "2023-10-30T14:00:48.962960+02:00", "EventTime": "2023-10-30T14:00:48.962979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CszudBFAOXN9xvPPg"]} -{"Format": "IDEA0", "ID": "a1015547-3261-4430-8f8e-d72e658291e1", "DetectTime": "2023-10-30T14:00:49.011595+02:00", "EventTime": "2023-10-30T14:00:49.011613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CyanCzaazJJCS8XNh"]} -{"Format": "Json", "ID": "a1015547-3261-4430-8f8e-d72e658291e1", "DetectTime": "2023-10-30T14:00:49.011595+02:00", "EventTime": "2023-10-30T14:00:49.011613+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:06:51.944957+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:49.088677)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c780ec3c-0d7b-4690-a293-67816e698876", "DetectTime": "2023-10-30T14:00:49.094757+02:00", "EventTime": "2023-10-30T14:00:49.094771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CVsuGu15EB6IGXjo7"]} -{"Format": "IDEA0", "ID": "4c4d8f5a-d7a3-4afd-8991-56055e084a4c", "DetectTime": "2023-10-30T14:00:49.145351+02:00", "EventTime": "2023-10-30T14:00:49.145373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CoEViQ7DGEDYpfGG2"]} -{"Format": "IDEA0", "ID": "8d56844c-def2-47c2-894d-73994aafaa8a", "DetectTime": "2023-10-30T14:00:49.218537+02:00", "EventTime": "2023-10-30T14:00:49.218563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["C6z5SBnvRpKUik6N9"]} -{"Format": "IDEA0", "ID": "04fe2d8f-712c-4573-bb86-8ad59b2553ec", "DetectTime": "2023-10-30T14:00:49.274259+02:00", "EventTime": "2023-10-30T14:00:49.274282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CnvA8iUjzT0s8UPrd"]} -{"Format": "IDEA0", "ID": "063f93f7-5591-4a75-95d3-26888d087238", "DetectTime": "2023-10-30T14:00:49.331613+02:00", "EventTime": "2023-10-30T14:00:49.331644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["CTdc3k3FRdpT4Dg4J9"]} -{"Format": "IDEA0", "ID": "fd7dbe37-50f5-49b7-87a9-decc134280f2", "DetectTime": "2023-10-30T14:00:49.403998+02:00", "EventTime": "2023-10-30T14:00:49.404234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CPXVIn3OcIUHQHs42b"]} -{"Format": "IDEA0", "ID": "f9d257f6-6049-4024-b80f-a9005746bd7a", "DetectTime": "2023-10-30T14:00:49.458907+02:00", "EventTime": "2023-10-30T14:00:49.458926+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.42.211.201"], "Hostname": ["adsl-ull-201-211.42-151.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 151.42.211.201 from 10.0.2.19. blacklisted IP AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-201-211.42-151.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cyw3ad2UsjtkaNcTOl"]} -{"Format": "IDEA0", "ID": "05890bed-388f-4bf1-9bb5-19235573f9a6", "DetectTime": "2023-10-30T14:00:49.510844+02:00", "EventTime": "2023-10-30T14:00:49.510864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C2x00v30AuCyoaEltl"]} -{"Format": "IDEA0", "ID": "80809314-a0b0-4b06-bd16-ff43c5723cd6", "DetectTime": "2023-10-30T14:00:49.567192+02:00", "EventTime": "2023-10-30T14:00:49.567216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. ", "ContentType": "text/plain"}], "uids": ["Cq3FOFtrYNwP9GlTe"]} -{"Format": "Json", "ID": "80809314-a0b0-4b06-bd16-ff43c5723cd6", "DetectTime": "2023-10-30T14:00:49.567192+02:00", "EventTime": "2023-10-30T14:00:49.567216+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21990], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:37:50.013450+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:49.649293)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ba22f16f-dca3-4c8d-b7d6-1af64193a7d8", "DetectTime": "2023-10-30T14:00:49.656967+02:00", "EventTime": "2023-10-30T14:00:49.656985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPyX7r2ydIo2KyeWF4"]} -{"Format": "IDEA0", "ID": "f9ca6096-3f77-4a8e-b136-e6033d5a5bbe", "DetectTime": "2023-10-30T14:00:49.705030+02:00", "EventTime": "2023-10-30T14:00:49.705049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CQRcnW2A399Etr49Ok"]} -{"Format": "IDEA0", "ID": "7f0f099a-3f62-42a5-a33d-dd90b1901654", "DetectTime": "2023-10-30T14:00:49.746496+02:00", "EventTime": "2023-10-30T14:00:49.746520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cm4x6y2fXuueG0nfUi"]} -{"Format": "IDEA0", "ID": "9f06d25e-5683-4599-bbaa-e43d426a821a", "DetectTime": "2023-10-30T14:00:49.791036+02:00", "EventTime": "2023-10-30T14:00:49.791051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CKQk3W2ge6rVhuDZHg"]} -{"Format": "IDEA0", "ID": "3be66a5b-b03b-4936-9c9a-99298dcf6a03", "DetectTime": "2023-10-30T14:00:49.830758+02:00", "EventTime": "2023-10-30T14:00:49.830792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cm3ftcGzAV9reSp33"]} -{"Format": "IDEA0", "ID": "7ae608dc-67f6-4a3e-abd8-df0a19a3f1e3", "DetectTime": "2023-10-30T14:00:49.874427+02:00", "EventTime": "2023-10-30T14:00:49.874448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CAy9ju4YAOmlTOo608"]} -{"Format": "IDEA0", "ID": "2ff5d7d8-05b0-44fe-9468-2ee80045abc0", "DetectTime": "2023-10-30T14:00:49.917520+02:00", "EventTime": "2023-10-30T14:00:49.917535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["C5BS454jYq7FQkUPTe"]} -{"Format": "IDEA0", "ID": "eaec8584-4be3-42fc-9e23-0e4f01bc8c7a", "DetectTime": "2023-10-30T14:00:49.962964+02:00", "EventTime": "2023-10-30T14:00:49.962983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CoV7fq2zBVZiSNctPj"]} -{"Format": "Json", "ID": "eaec8584-4be3-42fc-9e23-0e4f01bc8c7a", "DetectTime": "2023-10-30T14:00:49.962964+02:00", "EventTime": "2023-10-30T14:00:49.962983+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:37:51.624384+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:50.036020)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "848620fa-67ff-4315-99f7-cb8e24ca4cc3", "DetectTime": "2023-10-30T14:00:50.041778+02:00", "EventTime": "2023-10-30T14:00:50.041793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CjvEqQ1dyMGmrKHYF7"]} -{"Format": "IDEA0", "ID": "e5a62215-07f5-4e6e-ae6c-fe67e48da074", "DetectTime": "2023-10-30T14:00:50.083693+02:00", "EventTime": "2023-10-30T14:00:50.083713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CkcZq44QfGIOufaA75"]} -{"Format": "IDEA0", "ID": "f551289d-a311-4a2d-8bca-38675d8096d3", "DetectTime": "2023-10-30T14:00:50.124967+02:00", "EventTime": "2023-10-30T14:00:50.124984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cho4WX1nRwczOJFR71"]} -{"Format": "IDEA0", "ID": "3814289a-9627-42b1-85d0-e8c9bb3f036b", "DetectTime": "2023-10-30T14:00:50.163187+02:00", "EventTime": "2023-10-30T14:00:50.163215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CWPimfUta3ukeY2Fb"]} -{"Format": "IDEA0", "ID": "73015428-644c-4ff7-b4e6-82aa70ba06b2", "DetectTime": "2023-10-30T14:00:50.199720+02:00", "EventTime": "2023-10-30T14:00:50.199741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C2Agfv4vk6wWAefte6"]} -{"Format": "IDEA0", "ID": "e8241e28-ea95-47aa-8d21-af098a72213b", "DetectTime": "2023-10-30T14:00:50.234303+02:00", "EventTime": "2023-10-30T14:00:50.234320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C0Ihb31AUnJVZStxcb"]} -{"Format": "IDEA0", "ID": "4ed5f946-99d1-4032-95f4-78c620deccbe", "DetectTime": "2023-10-30T14:00:50.269794+02:00", "EventTime": "2023-10-30T14:00:50.269814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CPWdxy4emCc3s0Cyb8"]} -{"Format": "IDEA0", "ID": "e80d5b70-13cd-4848-aec8-957ada0b6089", "DetectTime": "2023-10-30T14:00:50.305807+02:00", "EventTime": "2023-10-30T14:00:50.305826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CppDnK2W78IZfImaf2"]} -{"Format": "Json", "ID": "e80d5b70-13cd-4848-aec8-957ada0b6089", "DetectTime": "2023-10-30T14:00:50.305807+02:00", "EventTime": "2023-10-30T14:00:50.305826+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:38:10.948704+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:50.380239)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b41d5481-9597-4ff0-8555-42801183162f", "DetectTime": "2023-10-30T14:00:50.387916+02:00", "EventTime": "2023-10-30T14:00:50.387933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CGvWHD3hNP891YkDXc"]} -{"Format": "IDEA0", "ID": "34552842-fee0-46b3-b8cb-aee25c2c548a", "DetectTime": "2023-10-30T14:00:50.425697+02:00", "EventTime": "2023-10-30T14:00:50.425709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CfK9rX1BKf3zIGPNoc"]} -{"Format": "IDEA0", "ID": "c09c175a-b2f4-4749-bbe1-cc88b9c3eb23", "DetectTime": "2023-10-30T14:00:50.471368+02:00", "EventTime": "2023-10-30T14:00:50.471391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C4YbYUI5l5samExl2"]} -{"Format": "IDEA0", "ID": "5b83440a-25e0-4615-888f-622da7737cbf", "DetectTime": "2023-10-30T14:00:50.511195+02:00", "EventTime": "2023-10-30T14:00:50.511221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CTbSDd13KIJXUENVbg"]} -{"Format": "IDEA0", "ID": "ea2e4480-855e-41dd-88c3-2a3c12eface3", "DetectTime": "2023-10-30T14:00:50.549798+02:00", "EventTime": "2023-10-30T14:00:50.549823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cdr4M941MiPPIs4fci"]} -{"Format": "IDEA0", "ID": "520d5a3e-7df8-462f-ad46-590e7b0be2ca", "DetectTime": "2023-10-30T14:00:50.586553+02:00", "EventTime": "2023-10-30T14:00:50.586571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C11d223Ie5HSQEHAe"]} -{"Format": "IDEA0", "ID": "8e30b44f-cc47-4a1e-8103-eac1ffab2b3a", "DetectTime": "2023-10-30T14:00:50.621739+02:00", "EventTime": "2023-10-30T14:00:50.621761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CXw4J54BYN78t0ciYc"]} -{"Format": "IDEA0", "ID": "6d8b9e19-27bc-4972-ab43-6f7465338870", "DetectTime": "2023-10-30T14:00:50.657358+02:00", "EventTime": "2023-10-30T14:00:50.657376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. ", "ContentType": "text/plain"}], "uids": ["CKhQS94jBssFAjBfP"]} -{"Format": "Json", "ID": "6d8b9e19-27bc-4972-ab43-6f7465338870", "DetectTime": "2023-10-30T14:00:50.657358+02:00", "EventTime": "2023-10-30T14:00:50.657376+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24577], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:38:12.220326+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:50.723095)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2afdb32f-f9c6-4dbf-9b5d-ea72810bb8c1", "DetectTime": "2023-10-30T14:00:50.728915+02:00", "EventTime": "2023-10-30T14:00:50.728934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["Cd4H7xEq2NmEWlSb2"]} -{"Format": "IDEA0", "ID": "bcf727ee-66a8-4865-a800-610f71c65c46", "DetectTime": "2023-10-30T14:00:50.761776+02:00", "EventTime": "2023-10-30T14:00:50.761795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["ChTxUB1PbU5h77Ith"]} -{"Format": "IDEA0", "ID": "fdd00468-ca9a-46bc-8a6b-ff20dab25195", "DetectTime": "2023-10-30T14:00:50.796691+02:00", "EventTime": "2023-10-30T14:00:50.796707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["CIJE97430oKWh7LB37"]} -{"Format": "IDEA0", "ID": "40ae75fc-49ec-4411-9a27-f200e2e95402", "DetectTime": "2023-10-30T14:00:50.829725+02:00", "EventTime": "2023-10-30T14:00:50.829743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["ClvoAT20NfxpDNS1ki"]} -{"Format": "IDEA0", "ID": "3b2a7ea1-c63f-4e97-a482-41a201fb7665", "DetectTime": "2023-10-30T14:00:50.860621+02:00", "EventTime": "2023-10-30T14:00:50.860638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["C5HawW3yITUzkSXw6a"]} -{"Format": "IDEA0", "ID": "0ae255a6-1c37-4e89-97f9-24c38475c35b", "DetectTime": "2023-10-30T14:00:50.891225+02:00", "EventTime": "2023-10-30T14:00:50.891240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CwjwyKwgiPYfD9Ph2"]} -{"Format": "IDEA0", "ID": "cdd556a5-0c62-436d-b2a8-7a9360967b46", "DetectTime": "2023-10-30T14:00:50.924023+02:00", "EventTime": "2023-10-30T14:00:50.924040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["C7KGnv1rEBcVo5roT"]} -{"Format": "IDEA0", "ID": "64a2e889-9f37-4f0a-bd49-7d2607662d13", "DetectTime": "2023-10-30T14:00:50.956302+02:00", "EventTime": "2023-10-30T14:00:50.956325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CbrRvP3pmB3LZUn2ha"]} -{"Format": "Json", "ID": "64a2e889-9f37-4f0a-bd49-7d2607662d13", "DetectTime": "2023-10-30T14:00:50.956302+02:00", "EventTime": "2023-10-30T14:00:50.956325+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T12:38:13.902529+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2023/10/30 14:00:51.020504)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "235f586b-6da8-4203-a9da-e0642278be9f", "DetectTime": "2023-10-30T14:00:51.027117+02:00", "EventTime": "2023-10-30T14:00:51.027133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CWQnth3bg3d09SRhNl"]} -{"Format": "IDEA0", "ID": "aa2ad767-0af9-4ede-ad3a-dd63b0448319", "DetectTime": "2023-10-30T14:00:51.061047+02:00", "EventTime": "2023-10-30T14:00:51.061068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CSgGj9i5yCO0QKdWe"]} -{"Format": "IDEA0", "ID": "b28d99e4-0951-48a1-9574-ae2951f4027a", "DetectTime": "2023-10-30T14:00:51.090967+02:00", "EventTime": "2023-10-30T14:00:51.090986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CMxKE52ccAJlykxYol"]} -{"Format": "IDEA0", "ID": "8aa11391-b8b2-45c0-a8c4-b703b0111dc9", "DetectTime": "2023-10-30T14:00:51.118684+02:00", "EventTime": "2023-10-30T14:00:51.118702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12619], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. ", "ContentType": "text/plain"}], "uids": ["Cpp5ni1rr4Gm8ecVxb"]} -{"Format": "IDEA0", "ID": "a48f03c6-bce4-499d-aa02-27133522b672", "DetectTime": "2023-10-30T14:00:51.153317+02:00", "EventTime": "2023-10-30T14:00:51.153339+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5Px4m2qnVqnb30Ikk"]} -{"Format": "IDEA0", "ID": "1956bfc5-84d3-4944-bce4-be6cf83f9014", "DetectTime": "2023-10-30T14:00:51.169122+02:00", "EventTime": "2023-10-30T14:00:51.169141+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLWDBX2hYwpwOGFbg9"]} -{"Format": "IDEA0", "ID": "b1eb964f-faed-422e-bbda-0822dc5376fc", "DetectTime": "2023-10-30T14:00:51.182840+02:00", "EventTime": "2023-10-30T14:00:51.182866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtTEhn1VSYeosv1P91"]} -{"Format": "IDEA0", "ID": "36b6ecbf-c012-4139-9cdf-2d5092cf4b96", "DetectTime": "2023-10-30T14:00:51.213398+02:00", "EventTime": "2023-10-30T14:00:51.213416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLGTjV9ZUWKUHt3C9", "Cqv9bW1x9wVc2NVO7f", "CMfyNpLZpUjemizRj", "C5Px4m2qnVqnb30Ikk"]} -{"Format": "IDEA0", "ID": "b5968dbf-1844-466b-9cb2-39db89601547", "DetectTime": "2023-10-30T14:00:51.227397+02:00", "EventTime": "2023-10-30T14:00:51.227410+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMfyNpLZpUjemizRj"]} -{"Format": "IDEA0", "ID": "72700f8b-ebfb-470f-8658-1be3efdd0c57", "DetectTime": "2023-10-30T14:00:51.244963+02:00", "EventTime": "2023-10-30T14:00:51.244983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["Cu9eYA4nA5YclFHjpf"]} -{"Format": "IDEA0", "ID": "4c6147f2-eca0-47d1-8114-cce791ded7e7", "DetectTime": "2023-10-30T14:00:51.300774+02:00", "EventTime": "2023-10-30T14:00:51.300794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CbjhAt4zdY21iR97u5"]} -{"Format": "IDEA0", "ID": "545649ae-4ac6-48d2-8cfb-29e512400160", "DetectTime": "2023-10-30T14:00:51.334944+02:00", "EventTime": "2023-10-30T14:00:51.334961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CH6IbH1h6lsMS12iC3"]} -{"Format": "IDEA0", "ID": "3ec75199-ef9f-4f78-a737-b050b370b51f", "DetectTime": "2023-10-30T14:00:51.387357+02:00", "EventTime": "2023-10-30T14:00:51.387370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CCQV3J3r4Jws5Q01Pe"]} -{"Format": "IDEA0", "ID": "693ae440-1464-4707-8788-ca14c0ac34e2", "DetectTime": "2023-10-30T14:00:51.440768+02:00", "EventTime": "2023-10-30T14:00:51.440783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CZwrzL174kQXNcnK8k"]} -{"Format": "IDEA0", "ID": "3ae18c03-d9d8-4fb1-beae-37e08d925680", "DetectTime": "2023-10-30T14:00:51.495042+02:00", "EventTime": "2023-10-30T14:00:51.495058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CvZ9s919rf5Yt8bZZb"]} -{"Format": "IDEA0", "ID": "6a4c9576-7581-4a9c-abc5-8a6a74f260d5", "DetectTime": "2023-10-30T14:00:51.547737+02:00", "EventTime": "2023-10-30T14:00:51.547766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CE5GlJ31cyTMUUPYSe"]} -{"Format": "IDEA0", "ID": "265a8d67-f236-4f2a-a27e-8e8c5de649fb", "DetectTime": "2023-10-30T14:00:51.600869+02:00", "EventTime": "2023-10-30T14:00:51.600891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cymgbv337MZWEnz8W7"]} -{"Format": "Json", "ID": "265a8d67-f236-4f2a-a27e-8e8c5de649fb", "DetectTime": "2023-10-30T14:00:51.600869+02:00", "EventTime": "2023-10-30T14:00:51.600891+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:09:12.104368+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:51.724412)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "db91a447-f017-4f0e-ab49-c9547eb6a3fb", "DetectTime": "2023-10-30T14:00:51.730070+02:00", "EventTime": "2023-10-30T14:00:51.730088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CUBQA42UEab0DhxKwg"]} -{"Format": "IDEA0", "ID": "6cdd3541-b59f-4551-a5d8-40e562ed9a63", "DetectTime": "2023-10-30T14:00:51.789798+02:00", "EventTime": "2023-10-30T14:00:51.789819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CRqKhp29eg9ecMlMgi"]} -{"Format": "IDEA0", "ID": "23db165a-0000-4cf3-aed0-338263b227f8", "DetectTime": "2023-10-30T14:00:51.852208+02:00", "EventTime": "2023-10-30T14:00:51.852233+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzWPzD3qqYmaQe6Dkd"]} -{"Format": "IDEA0", "ID": "35d6b78b-614b-4aa7-b64e-71ceb7af81a5", "DetectTime": "2023-10-30T14:00:51.866603+02:00", "EventTime": "2023-10-30T14:00:51.866620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CBzftg8UrZETHtVu6"]} -{"Format": "IDEA0", "ID": "4af89136-658f-4435-a12d-01a7181f85f3", "DetectTime": "2023-10-30T14:00:51.915415+02:00", "EventTime": "2023-10-30T14:00:51.915433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CiBX1L1JNNDLdbb67f"]} -{"Format": "IDEA0", "ID": "89faa745-d95f-4778-8517-cc759d0dbacb", "DetectTime": "2023-10-30T14:00:51.962487+02:00", "EventTime": "2023-10-30T14:00:51.962514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["Cx25Uz1K1RKRUbZe5b"]} -{"Format": "IDEA0", "ID": "aef17c25-f5fc-49f8-b728-168e92e2820f", "DetectTime": "2023-10-30T14:00:52.012594+02:00", "EventTime": "2023-10-30T14:00:52.012612+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjP4Y82PTSNu8EvZEb"]} -{"Format": "IDEA0", "ID": "db3159d0-aff5-44c2-a3b1-05efe3f41a0e", "DetectTime": "2023-10-30T14:00:52.028243+02:00", "EventTime": "2023-10-30T14:00:52.028265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CNdrt34A2IzVxVY4U"]} -{"Format": "IDEA0", "ID": "cf55da94-5f14-4883-b95f-95cdd242adae", "DetectTime": "2023-10-30T14:00:52.079666+02:00", "EventTime": "2023-10-30T14:00:52.079686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CaphJx1lm37TWBKvV2"]} -{"Format": "IDEA0", "ID": "f644a80e-cfd0-42f0-abc3-ab69f0fe6e11", "DetectTime": "2023-10-30T14:00:52.129594+02:00", "EventTime": "2023-10-30T14:00:52.129619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["Cw6RX71TP71rL7I3B"]} -{"Format": "Json", "ID": "f644a80e-cfd0-42f0-abc3-ab69f0fe6e11", "DetectTime": "2023-10-30T14:00:52.129594+02:00", "EventTime": "2023-10-30T14:00:52.129619+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:09:13.617107+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:52.205674)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45ebe91d-4a24-4858-b57a-551d6cb3f880", "DetectTime": "2023-10-30T14:00:52.211280+02:00", "EventTime": "2023-10-30T14:00:52.211298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C0S3zB1dFwfV3qMMxg"]} -{"Format": "IDEA0", "ID": "709c7385-6b53-42cd-9c37-e215f16175da", "DetectTime": "2023-10-30T14:00:52.259532+02:00", "EventTime": "2023-10-30T14:00:52.259557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Cv8XQN39ymkq1nEWJ9"]} -{"Format": "IDEA0", "ID": "6833a365-0c6c-4352-ac0b-69eb836f3dc6", "DetectTime": "2023-10-30T14:00:52.309102+02:00", "EventTime": "2023-10-30T14:00:52.309130+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLAoUfjFN9RwPTPOj"]} -{"Format": "IDEA0", "ID": "e610d3f8-c5d6-441b-9465-5f25f255f3f0", "DetectTime": "2023-10-30T14:00:52.324548+02:00", "EventTime": "2023-10-30T14:00:52.324569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CKzpSW137prP9uoM8b"]} -{"Format": "IDEA0", "ID": "57f01f3a-6b3f-439d-afc0-cced52ce31e7", "DetectTime": "2023-10-30T14:00:52.372970+02:00", "EventTime": "2023-10-30T14:00:52.372985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C9wzQX1IrvoN1Ebyw1"]} -{"Format": "IDEA0", "ID": "42fe6a1c-f27d-4d7b-87cb-892dd7dc54c5", "DetectTime": "2023-10-30T14:00:52.418313+02:00", "EventTime": "2023-10-30T14:00:52.418339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CmR5GE1OcXxgynFEDd"]} -{"Format": "IDEA0", "ID": "2f809c87-7d7a-40e3-9556-bedd1f36a16f", "DetectTime": "2023-10-30T14:00:52.468262+02:00", "EventTime": "2023-10-30T14:00:52.468289+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpGZFlnhPA9gQlP19"]} -{"Format": "IDEA0", "ID": "381959b7-5afc-4ae0-b02e-280bb979b95d", "DetectTime": "2023-10-30T14:00:52.483491+02:00", "EventTime": "2023-10-30T14:00:52.483509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CCDLh01wwOMCyZ1Zt1"]} -{"Format": "IDEA0", "ID": "c69d70b7-0b0b-4c7a-9416-6107a90abc44", "DetectTime": "2023-10-30T14:00:52.531742+02:00", "EventTime": "2023-10-30T14:00:52.531769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["CooFvl4vICnvdy1oSc"]} -{"Format": "IDEA0", "ID": "c8767696-4cc4-4678-ba02-6fae94b4679a", "DetectTime": "2023-10-30T14:00:52.580372+02:00", "EventTime": "2023-10-30T14:00:52.580399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CtCDr32Jcx8MAVPGQ7"]} -{"Format": "Json", "ID": "c8767696-4cc4-4678-ba02-6fae94b4679a", "DetectTime": "2023-10-30T14:00:52.580372+02:00", "EventTime": "2023-10-30T14:00:52.580399+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:09:31.042260+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:52.659608)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "43651b26-50fc-4658-8c94-bf2ee75fad14", "DetectTime": "2023-10-30T14:00:52.664286+02:00", "EventTime": "2023-10-30T14:00:52.664311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["Ck5WCb2zQm1hCYS1yj"]} -{"Format": "IDEA0", "ID": "6882da62-be4c-4fe7-9cf1-81beb1d39685", "DetectTime": "2023-10-30T14:00:52.713601+02:00", "EventTime": "2023-10-30T14:00:52.713621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CGVcmj2k4n6o5DGIv1"]} -{"Format": "IDEA0", "ID": "b61776fa-bcf1-4265-abd0-4ae35e4648c2", "DetectTime": "2023-10-30T14:00:52.758142+02:00", "EventTime": "2023-10-30T14:00:52.758165+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cs3jd34ihuURRS2fg6"]} -{"Format": "IDEA0", "ID": "9049e16d-0570-4faa-aa4d-c41ac23fcab4", "DetectTime": "2023-10-30T14:00:52.772622+02:00", "EventTime": "2023-10-30T14:00:52.772640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["ClMJGASeKI7CF8ihe"]} -{"Format": "IDEA0", "ID": "67683f86-f9db-4cd6-96de-3048d44c79e9", "DetectTime": "2023-10-30T14:00:52.820131+02:00", "EventTime": "2023-10-30T14:00:52.820148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. ", "ContentType": "text/plain"}], "uids": ["CH3NuC1QvY9W8bS4B3"]} -{"Format": "IDEA0", "ID": "8b5f1d26-dd9f-4c5c-b084-8ea260fc216d", "DetectTime": "2023-10-30T14:00:52.867021+02:00", "EventTime": "2023-10-30T14:00:52.867042+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIuWLd3EUPVpytnCR5"]} -{"Format": "IDEA0", "ID": "bddafc41-3aa4-45d0-acf4-b6b79a2b4b58", "DetectTime": "2023-10-30T14:00:52.881541+02:00", "EventTime": "2023-10-30T14:00:52.881558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CTB2ml4sbahxxja9j1"]} -{"Format": "IDEA0", "ID": "34197b18-593e-475a-bed2-abfccf24ba19", "DetectTime": "2023-10-30T14:00:52.923028+02:00", "EventTime": "2023-10-30T14:00:52.923048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CpVLwX1YN3mDK6NMB9"]} -{"Format": "IDEA0", "ID": "812855f6-f426-4c07-a898-1c5d42238465", "DetectTime": "2023-10-30T14:00:52.970180+02:00", "EventTime": "2023-10-30T14:00:52.970208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C6EH5L1kdaM3O7QAmg"]} -{"Format": "IDEA0", "ID": "c848c200-68ab-4fc3-8954-75aadb156239", "DetectTime": "2023-10-30T14:00:53.025543+02:00", "EventTime": "2023-10-30T14:00:53.025562+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaJgJh4ZC0cDOTZ6Ie"]} -{"Format": "IDEA0", "ID": "45cc80e6-0512-4f7f-9d21-5cd666941a3e", "DetectTime": "2023-10-30T14:00:53.043882+02:00", "EventTime": "2023-10-30T14:00:53.043900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CihF9o3vT7ZLNNvI6j"]} -{"Format": "Json", "ID": "45cc80e6-0512-4f7f-9d21-5cd666941a3e", "DetectTime": "2023-10-30T14:00:53.043882+02:00", "EventTime": "2023-10-30T14:00:53.043900+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:09:32.655580+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:53.132675)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab19a62b-11bd-4e18-8cae-b62cc0959bc9", "DetectTime": "2023-10-30T14:00:53.139655+02:00", "EventTime": "2023-10-30T14:00:53.139674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CFjkwG593VowIzG98"]} -{"Format": "IDEA0", "ID": "9a7a6778-458f-407f-9951-35b0a9454e1b", "DetectTime": "2023-10-30T14:00:53.186736+02:00", "EventTime": "2023-10-30T14:00:53.186758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIuWLd3EUPVpytnCR5", "CpGZFlnhPA9gQlP19", "CbLs9K3KGOAcNODH9j", "CjP4Y82PTSNu8EvZEb"]} -{"Format": "IDEA0", "ID": "34724865-9fb1-4e1c-965b-408d9e5d2a6c", "DetectTime": "2023-10-30T14:00:53.202389+02:00", "EventTime": "2023-10-30T14:00:53.202410+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbLs9K3KGOAcNODH9j"]} -{"Format": "IDEA0", "ID": "9b3a27b3-c645-45d5-81ec-4543a6459b1e", "DetectTime": "2023-10-30T14:00:53.218393+02:00", "EventTime": "2023-10-30T14:00:53.218413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C49oaG1o1XRsHMAiN3"]} -{"Format": "IDEA0", "ID": "33311955-bd22-4994-92e5-1f60920707bf", "DetectTime": "2023-10-30T14:00:53.272320+02:00", "EventTime": "2023-10-30T14:00:53.272336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CU2M7B2PIthwN3whC5"]} -{"Format": "IDEA0", "ID": "e84c16d3-f615-474a-8ef8-2b4868a374f5", "DetectTime": "2023-10-30T14:00:53.313164+02:00", "EventTime": "2023-10-30T14:00:53.313190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQmBi417aqdNsQfYTf"]} -{"Format": "IDEA0", "ID": "d8393a9c-bae6-41cd-9ed1-5cb81ffb3378", "DetectTime": "2023-10-30T14:00:53.353072+02:00", "EventTime": "2023-10-30T14:00:53.353091+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cn9ghUKda0xw1FUCe"]} -{"Format": "IDEA0", "ID": "88381404-a955-43e6-b3a5-248e29ae2398", "DetectTime": "2023-10-30T14:00:53.367427+02:00", "EventTime": "2023-10-30T14:00:53.367452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CfSan1iyuLEkziaj5"]} -{"Format": "IDEA0", "ID": "bcb6c63d-ca69-490a-9f8a-89c125ff17d7", "DetectTime": "2023-10-30T14:00:53.406966+02:00", "EventTime": "2023-10-30T14:00:53.406988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Ce6ZG32tgugLri8DZj"]} -{"Format": "IDEA0", "ID": "183227cf-a3e6-4cb3-a0da-c08a89674105", "DetectTime": "2023-10-30T14:00:53.450928+02:00", "EventTime": "2023-10-30T14:00:53.450975+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTIFuh3LuLn2LjDbrh"]} -{"Format": "IDEA0", "ID": "9f601c27-09b6-4cbe-9b10-03e6d476d9d7", "DetectTime": "2023-10-30T14:00:53.461915+02:00", "EventTime": "2023-10-30T14:00:53.461937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CVyZcT2NnPQjoE4b64"]} -{"Format": "IDEA0", "ID": "dec7b7e6-f468-4546-850a-fc0a7622f0d1", "DetectTime": "2023-10-30T14:00:53.505950+02:00", "EventTime": "2023-10-30T14:00:53.505972+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKenNxuI5WZKMIMz9"]} -{"Format": "IDEA0", "ID": "35d605b1-230f-41f7-9cc0-e6d9c306c353", "DetectTime": "2023-10-30T14:00:53.517457+02:00", "EventTime": "2023-10-30T14:00:53.517483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CxV2DG4XXejolieoXe"]} -{"Format": "Json", "ID": "35d605b1-230f-41f7-9cc0-e6d9c306c353", "DetectTime": "2023-10-30T14:00:53.517457+02:00", "EventTime": "2023-10-30T14:00:53.517483+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:41:10.256296+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:53.587857)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d6822658-fc14-42dc-9a43-a43f58fa4cf7", "DetectTime": "2023-10-30T14:00:53.593962+02:00", "EventTime": "2023-10-30T14:00:53.593982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cxb1pDcmDtPkyKn34"]} -{"Format": "IDEA0", "ID": "a425e3cc-1936-4b17-b847-fe4f7eb9c25c", "DetectTime": "2023-10-30T14:00:53.636925+02:00", "EventTime": "2023-10-30T14:00:53.636946+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXsYXG3nHzVpXBhe7c"]} -{"Format": "IDEA0", "ID": "2d9b628e-f382-457b-b1b5-7d6206bc13e4", "DetectTime": "2023-10-30T14:00:53.647717+02:00", "EventTime": "2023-10-30T14:00:53.647745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["CN3r9T2l5ouYfcI5nj"]} -{"Format": "IDEA0", "ID": "6150745e-3c3a-4f8b-b132-39b7821b57a1", "DetectTime": "2023-10-30T14:00:53.686453+02:00", "EventTime": "2023-10-30T14:00:53.686476+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClLMkA3u8yZrMrMBKc"]} -{"Format": "IDEA0", "ID": "809c437d-89cf-4612-bccb-52b923cc8c0f", "DetectTime": "2023-10-30T14:00:53.696762+02:00", "EventTime": "2023-10-30T14:00:53.696779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CXF0CXgnrvP2Em05e"]} -{"Format": "IDEA0", "ID": "c8abf72a-ccb8-4870-919d-c262337139a5", "DetectTime": "2023-10-30T14:00:53.734956+02:00", "EventTime": "2023-10-30T14:00:53.734974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CzxbuT2X4yQNVJA8ai"]} -{"Format": "IDEA0", "ID": "bb5971f3-f113-4e50-9607-18008dc5414a", "DetectTime": "2023-10-30T14:00:53.772340+02:00", "EventTime": "2023-10-30T14:00:53.772359+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CO3ORM1l2qjlHO9BJb"]} -{"Format": "IDEA0", "ID": "5db38c26-19fd-4754-8e7d-d42aa5584b0f", "DetectTime": "2023-10-30T14:00:53.782382+02:00", "EventTime": "2023-10-30T14:00:53.782397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CIt0764IRqg62llJ9k"]} -{"Format": "IDEA0", "ID": "cc0c03f0-eadb-4145-bdfc-072651f24674", "DetectTime": "2023-10-30T14:00:53.817547+02:00", "EventTime": "2023-10-30T14:00:53.817567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CAo6so3OsC5DbNStE2"]} -{"Format": "IDEA0", "ID": "6fbab01f-8461-42d0-b993-df2c1dd6fe87", "DetectTime": "2023-10-30T14:00:53.857743+02:00", "EventTime": "2023-10-30T14:00:53.857766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C5UiAP1dfL8SLFd6y"]} -{"Format": "IDEA0", "ID": "500dc334-476b-4a94-a31e-897a1327d04e", "DetectTime": "2023-10-30T14:00:53.895263+02:00", "EventTime": "2023-10-30T14:00:53.895280+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyQTNd2I6hTNKj2I6h"]} -{"Format": "IDEA0", "ID": "86a3ffad-330a-4827-bea4-2b474d1e4ec8", "DetectTime": "2023-10-30T14:00:53.907687+02:00", "EventTime": "2023-10-30T14:00:53.907705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CUJnPy4WJ2zYRswT19"]} -{"Format": "Json", "ID": "86a3ffad-330a-4827-bea4-2b474d1e4ec8", "DetectTime": "2023-10-30T14:00:53.907687+02:00", "EventTime": "2023-10-30T14:00:53.907705+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:41:12.410259+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:53.982121)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "74d5b437-58e6-45c9-b7b6-071f635173ac", "DetectTime": "2023-10-30T14:00:53.988128+02:00", "EventTime": "2023-10-30T14:00:53.988141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CTIFuh3LuLn2LjDbrh", "CO3ORM1l2qjlHO9BJb", "CXsYXG3nHzVpXBhe7c", "CsKQdP1YJCSRCYfpp1"]} -{"Format": "IDEA0", "ID": "cf776432-5657-4383-8406-b43873b4a0aa", "DetectTime": "2023-10-30T14:00:53.999291+02:00", "EventTime": "2023-10-30T14:00:53.999309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CbF3JW2ZLiQ9zlf0S8"]} -{"Format": "IDEA0", "ID": "6ed1c749-6909-4f85-8ca7-433d9ae50ef6", "DetectTime": "2023-10-30T14:00:54.035350+02:00", "EventTime": "2023-10-30T14:00:54.035370+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsKQdP1YJCSRCYfpp1"]} -{"Format": "IDEA0", "ID": "7b4eedbd-1a68-4ced-965d-c90f82b0ae1b", "DetectTime": "2023-10-30T14:00:54.049396+02:00", "EventTime": "2023-10-30T14:00:54.049425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CNgdcIyCIaWr1Z11l"]} -{"Format": "IDEA0", "ID": "145553bd-f806-4738-8d11-aa1709756903", "DetectTime": "2023-10-30T14:00:54.085710+02:00", "EventTime": "2023-10-30T14:00:54.085730+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKmJIn4usyV4ndrc52"]} -{"Format": "IDEA0", "ID": "fca08338-58df-414f-a289-c5a25e66c094", "DetectTime": "2023-10-30T14:00:54.096864+02:00", "EventTime": "2023-10-30T14:00:54.096886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CobDAHzvr7vv4WxJa"]} -{"Format": "IDEA0", "ID": "c08d636d-2381-4d52-a1a5-607dc256cd7f", "DetectTime": "2023-10-30T14:00:54.131555+02:00", "EventTime": "2023-10-30T14:00:54.131573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["Csjizl4EVHF2KskkO6"]} -{"Format": "IDEA0", "ID": "e647eac7-0112-4828-963a-a0fa7180ab4e", "DetectTime": "2023-10-30T14:00:54.168644+02:00", "EventTime": "2023-10-30T14:00:54.168686+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6UpGWzYVOL81Grzg"]} -{"Format": "IDEA0", "ID": "05c86464-9ace-4aa3-afcb-c0e75e2d56b6", "DetectTime": "2023-10-30T14:00:54.179546+02:00", "EventTime": "2023-10-30T14:00:54.179572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CVmbn01oeO46WO4Tm9"]} -{"Format": "IDEA0", "ID": "cb31af8b-ba11-40ad-9e05-d17369495071", "DetectTime": "2023-10-30T14:00:54.213179+02:00", "EventTime": "2023-10-30T14:00:54.213205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CVco692KICC43mG8M"]} -{"Format": "IDEA0", "ID": "eda4a90e-cba1-497c-9fd4-2cee0dd21567", "DetectTime": "2023-10-30T14:00:54.247230+02:00", "EventTime": "2023-10-30T14:00:54.247253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CcKMQZ3FA2Za1YyMDh"]} -{"Format": "IDEA0", "ID": "6c1b053d-fc8b-45bc-9bd5-2a563f7c4ea8", "DetectTime": "2023-10-30T14:00:54.278544+02:00", "EventTime": "2023-10-30T14:00:54.278556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CSgpVY3aVW9t9SR9y8"]} -{"Format": "Json", "ID": "6c1b053d-fc8b-45bc-9bd5-2a563f7c4ea8", "DetectTime": "2023-10-30T14:00:54.278544+02:00", "EventTime": "2023-10-30T14:00:54.278556+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:41:13.321806+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:54.352421)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc203f56-3e36-4c01-9d65-eb72e1e0dc2c", "DetectTime": "2023-10-30T14:00:54.358941+02:00", "EventTime": "2023-10-30T14:00:54.358972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CIQa2X23VEvMLas2S2"]} -{"Format": "IDEA0", "ID": "ff27aab2-bd90-463e-bd3b-abf2acf49a88", "DetectTime": "2023-10-30T14:00:54.394497+02:00", "EventTime": "2023-10-30T14:00:54.394524+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjD0Vg33wGhqX0lBu6"]} -{"Format": "IDEA0", "ID": "d59fec35-e937-4fc1-aa0d-cf937755d09e", "DetectTime": "2023-10-30T14:00:54.406822+02:00", "EventTime": "2023-10-30T14:00:54.406848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CHnjoz3eLYEzeFUNk5"]} -{"Format": "IDEA0", "ID": "52c51f45-015f-4155-b666-078a985fb783", "DetectTime": "2023-10-30T14:00:54.439892+02:00", "EventTime": "2023-10-30T14:00:54.439906+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXBpOx13Enehtgcppk"]} -{"Format": "IDEA0", "ID": "6b47a28e-0398-42cd-84fc-dc7fe9eed3c8", "DetectTime": "2023-10-30T14:00:54.451279+02:00", "EventTime": "2023-10-30T14:00:54.451304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["C4xppA2hgavDdXcCEb"]} -{"Format": "IDEA0", "ID": "21382d5f-6a71-4248-8f6e-291dcebf63a3", "DetectTime": "2023-10-30T14:00:54.484771+02:00", "EventTime": "2023-10-30T14:00:54.484793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["Cnl8tq1rmLPdjXdjv"]} -{"Format": "IDEA0", "ID": "1c67592b-3e02-45a0-a23e-92bafeb6c2e1", "DetectTime": "2023-10-30T14:00:54.518242+02:00", "EventTime": "2023-10-30T14:00:54.518314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cjhe5YzlPuNQLn1N3"]} -{"Format": "IDEA0", "ID": "a3837005-8077-4eb6-a496-a5466cd14f17", "DetectTime": "2023-10-30T14:00:54.549862+02:00", "EventTime": "2023-10-30T14:00:54.549877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CxDVO54PRYgqkjMxZ3"]} -{"Format": "IDEA0", "ID": "92558ce0-e5b3-475f-800e-9147578a22a1", "DetectTime": "2023-10-30T14:00:54.582424+02:00", "EventTime": "2023-10-30T14:00:54.582450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["CJwLXr2vMqWaThx49f"]} -{"Format": "IDEA0", "ID": "6d7ff37a-4465-4089-a046-c5fe19d6e942", "DetectTime": "2023-10-30T14:00:54.615379+02:00", "EventTime": "2023-10-30T14:00:54.615396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CaHNCp4tqEQTMhp633"]} -{"Format": "Json", "ID": "6d7ff37a-4465-4089-a046-c5fe19d6e942", "DetectTime": "2023-10-30T14:00:54.615379+02:00", "EventTime": "2023-10-30T14:00:54.615396+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T13:41:30.174488+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2023/10/30 14:00:54.678536)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93caa453-78c9-4672-b9bc-b7a80b3286ba", "DetectTime": "2023-10-30T14:00:54.684815+02:00", "EventTime": "2023-10-30T14:00:54.684840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["Cjm15Z13nuuOaGLzO2"]} -{"Format": "IDEA0", "ID": "2e2b2161-6883-46fb-8c04-2bcfb8e9f303", "DetectTime": "2023-10-30T14:00:54.715824+02:00", "EventTime": "2023-10-30T14:00:54.715846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CUtGlE2DpehlANqObf"]} -{"Format": "IDEA0", "ID": "23b37a62-2469-4a38-bd2c-1822ff4b3cb7", "DetectTime": "2023-10-30T14:00:54.746232+02:00", "EventTime": "2023-10-30T14:00:54.746254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CpmBPA2qRgHycGNsAc"]} -{"Format": "IDEA0", "ID": "0ee06bb1-0153-4f4c-acbc-434855f5b48c", "DetectTime": "2023-10-30T14:00:54.776447+02:00", "EventTime": "2023-10-30T14:00:54.776465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CaRnQ3RemiJBe14G1"]} -{"Format": "IDEA0", "ID": "902c1fe1-d5c0-4ff2-9f22-68a43492e177", "DetectTime": "2023-10-30T14:00:54.806320+02:00", "EventTime": "2023-10-30T14:00:54.806337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cb3Z25B8qipNSkFe6"]} -{"Format": "IDEA0", "ID": "6097d4d7-2750-4dad-bbfd-ad1f50f6c89b", "DetectTime": "2023-10-30T14:00:54.836815+02:00", "EventTime": "2023-10-30T14:00:54.836833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEDOOf4iaH9NA7dDX6"]} -{"Format": "IDEA0", "ID": "a165ecb0-97d7-4973-b9d0-de1ccfd2b162", "DetectTime": "2023-10-30T14:00:54.865008+02:00", "EventTime": "2023-10-30T14:00:54.865024+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZGLQ73ZK4auhyBGJ9"]} -{"Format": "IDEA0", "ID": "ac3e51aa-ad04-4c2b-9b2a-49561e320857", "DetectTime": "2023-10-30T14:00:54.876734+02:00", "EventTime": "2023-10-30T14:00:54.876752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CuhJSH3jmp4yG7yAMc"]} -{"Format": "IDEA0", "ID": "c23d45c6-9926-4d96-bb3b-b6a2f63c48e9", "DetectTime": "2023-10-30T14:00:54.924463+02:00", "EventTime": "2023-10-30T14:00:54.924485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CKZOBotNt0gN8S58e"]} -{"Format": "IDEA0", "ID": "87c2a3d6-8c08-4c21-9034-51c6f00f536f", "DetectTime": "2023-10-30T14:00:54.977512+02:00", "EventTime": "2023-10-30T14:00:54.977529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CykBZd1G26iHmz8Eie"]} -{"Format": "IDEA0", "ID": "f091f50f-49ab-41b9-88fd-3edebcc4100a", "DetectTime": "2023-10-30T14:00:55.031195+02:00", "EventTime": "2023-10-30T14:00:55.031214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CgAfoD3v65xkPXY0W9"]} -{"Format": "IDEA0", "ID": "72272d80-189f-4a9a-b253-1fb6dc1d778d", "DetectTime": "2023-10-30T14:00:55.087320+02:00", "EventTime": "2023-10-30T14:00:55.087341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CpHDOl3i2nydfm9foe"]} -{"Format": "IDEA0", "ID": "697c6ad7-c72d-4310-900d-1d4a33ff7ccf", "DetectTime": "2023-10-30T14:00:55.145982+02:00", "EventTime": "2023-10-30T14:00:55.146000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CwHJOn2q6hoe36fP54"]} -{"Format": "IDEA0", "ID": "7bc648f4-bcbd-45df-9891-4fdf43cb9cf1", "DetectTime": "2023-10-30T14:00:55.194885+02:00", "EventTime": "2023-10-30T14:00:55.194903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cbau5F2xOAHpPSrtkf"]} -{"Format": "Json", "ID": "7bc648f4-bcbd-45df-9891-4fdf43cb9cf1", "DetectTime": "2023-10-30T14:00:55.194885+02:00", "EventTime": "2023-10-30T14:00:55.194903+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:12:03.192724+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:55.292966)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "27ba0d90-b8d0-4a8b-954e-6721385d993c", "DetectTime": "2023-10-30T14:00:55.300191+02:00", "EventTime": "2023-10-30T14:00:55.300216+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Card1f14N2sXOd6UF1"]} -{"Format": "IDEA0", "ID": "7b30376f-e087-44c0-9a72-f5eb27606345", "DetectTime": "2023-10-30T14:00:55.320260+02:00", "EventTime": "2023-10-30T14:00:55.320279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["Cg2wg62ngmP4cNVGI1"]} -{"Format": "IDEA0", "ID": "63edf58d-6373-41e3-bf96-036f8f2bed28", "DetectTime": "2023-10-30T14:00:55.368966+02:00", "EventTime": "2023-10-30T14:00:55.368991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CzL3CpTTXmAunlvRb"]} -{"Format": "IDEA0", "ID": "6387ee5c-e887-45fd-8d62-7056958eec79", "DetectTime": "2023-10-30T14:00:55.414672+02:00", "EventTime": "2023-10-30T14:00:55.414698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["C9pMIS2rr1T827QfI9"]} -{"Format": "IDEA0", "ID": "c6280305-0ea0-49b9-9b9a-dc3e5d530ded", "DetectTime": "2023-10-30T14:00:55.467968+02:00", "EventTime": "2023-10-30T14:00:55.467993+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CK7oNz4ylMSbSIyaj8"]} -{"Format": "IDEA0", "ID": "e5af5504-1691-4fb8-8a35-82c8c71d6395", "DetectTime": "2023-10-30T14:00:55.486025+02:00", "EventTime": "2023-10-30T14:00:55.486052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CNjE7m1TP8sfgDJazj"]} -{"Format": "IDEA0", "ID": "f3252e81-93fe-4a0e-87a5-aa07eb318482", "DetectTime": "2023-10-30T14:00:55.533163+02:00", "EventTime": "2023-10-30T14:00:55.533184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CsiRVK3RtMte703fic"]} -{"Format": "IDEA0", "ID": "fcbcbe38-4e13-47b2-bf51-b3231661c608", "DetectTime": "2023-10-30T14:00:55.582658+02:00", "EventTime": "2023-10-30T14:00:55.582680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["COJX0n13uvvgCsoEmg", "Card1f14N2sXOd6UF1", "C6UpGWzYVOL81Grzg", "CXBpOx13Enehtgcppk"]} -{"Format": "IDEA0", "ID": "9cd774a4-cc29-4dff-bb84-e6b5b509f1b8", "DetectTime": "2023-10-30T14:00:55.599405+02:00", "EventTime": "2023-10-30T14:00:55.599419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["COJX0n13uvvgCsoEmg"]} -{"Format": "IDEA0", "ID": "943e3c90-2dba-41c1-b39b-c062ce5b821a", "DetectTime": "2023-10-30T14:00:55.616434+02:00", "EventTime": "2023-10-30T14:00:55.616463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CKFwAhNPaWwNpYMV8"]} -{"Format": "IDEA0", "ID": "41bb7d11-7734-4129-b3f0-b029a76a0ddc", "DetectTime": "2023-10-30T14:00:55.668742+02:00", "EventTime": "2023-10-30T14:00:55.668772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CXZ7AI2N4JosPh6Mnb"]} -{"Format": "IDEA0", "ID": "9cef3ae1-8f81-46df-8316-f0a5bac85824", "DetectTime": "2023-10-30T14:00:55.718321+02:00", "EventTime": "2023-10-30T14:00:55.718340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMlWL62IJUkBu2SMBk"]} -{"Format": "IDEA0", "ID": "d339605e-6aa5-4a92-ad02-83ae5c804ecd", "DetectTime": "2023-10-30T14:00:55.736508+02:00", "EventTime": "2023-10-30T14:00:55.736532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CTpXXU3Ng359cC0cy4"]} -{"Format": "Json", "ID": "d339605e-6aa5-4a92-ad02-83ae5c804ecd", "DetectTime": "2023-10-30T14:00:55.736508+02:00", "EventTime": "2023-10-30T14:00:55.736532+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:12:04.627721+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:55.809783)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ace53902-ae0e-4803-a510-ab28ea081944", "DetectTime": "2023-10-30T14:00:55.816085+02:00", "EventTime": "2023-10-30T14:00:55.816104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Csysn54bUCH9tIdF16"]} -{"Format": "IDEA0", "ID": "10fb8e75-6961-4fb2-89d0-ef133d91c85a", "DetectTime": "2023-10-30T14:00:55.870364+02:00", "EventTime": "2023-10-30T14:00:55.870385+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CB0i4v28Lqiv9J4452"]} -{"Format": "IDEA0", "ID": "cf16465c-8170-400e-a8d0-87130c19a0a1", "DetectTime": "2023-10-30T14:00:55.887266+02:00", "EventTime": "2023-10-30T14:00:55.887284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CmdAmgs497rUL51Y7"]} -{"Format": "IDEA0", "ID": "86aa6bec-bf7f-4064-8623-905cbe2020cd", "DetectTime": "2023-10-30T14:00:55.929236+02:00", "EventTime": "2023-10-30T14:00:55.929256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CueH5F1i0iusTs5Nud"]} -{"Format": "IDEA0", "ID": "ceca401d-9482-47ae-9f9e-6071689981ed", "DetectTime": "2023-10-30T14:00:55.978390+02:00", "EventTime": "2023-10-30T14:00:55.978412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CHwlTn2U9z7PL4qB6j"]} -{"Format": "IDEA0", "ID": "03f0d5e6-1822-41ab-94b9-89b118b54b08", "DetectTime": "2023-10-30T14:00:56.022915+02:00", "EventTime": "2023-10-30T14:00:56.022936+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjEpk53PlW7GHpCyJg"]} -{"Format": "IDEA0", "ID": "652aefd3-5470-4fd6-8138-d0090613ee16", "DetectTime": "2023-10-30T14:00:56.040659+02:00", "EventTime": "2023-10-30T14:00:56.040678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C8moq44Q9kMf18owO8"]} -{"Format": "IDEA0", "ID": "ccf8880e-cd9a-4dff-a977-ad55a30a6717", "DetectTime": "2023-10-30T14:00:56.088531+02:00", "EventTime": "2023-10-30T14:00:56.088559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CKGBP7PliSitNqSH2"]} -{"Format": "IDEA0", "ID": "c1564f73-1370-4e22-b877-2f4bf5b386d5", "DetectTime": "2023-10-30T14:00:56.133616+02:00", "EventTime": "2023-10-30T14:00:56.133636+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIH97F3gVkJjweyDF7"]} -{"Format": "IDEA0", "ID": "b749e4cf-8e40-474f-ae6c-1ae54b13e006", "DetectTime": "2023-10-30T14:00:56.150290+02:00", "EventTime": "2023-10-30T14:00:56.150311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CQC9kn4yJWfIHToE15"]} -{"Format": "IDEA0", "ID": "af610edf-ad96-4b22-934a-a90c391558f1", "DetectTime": "2023-10-30T14:00:56.194523+02:00", "EventTime": "2023-10-30T14:00:56.194543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C2O7yO1BkOzjvx6Q4d"]} -{"Format": "Json", "ID": "af610edf-ad96-4b22-934a-a90c391558f1", "DetectTime": "2023-10-30T14:00:56.194523+02:00", "EventTime": "2023-10-30T14:00:56.194543+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:12:05.930124+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:56.272265)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c0315368-0351-4e66-9044-83c73575ab61", "DetectTime": "2023-10-30T14:00:56.278122+02:00", "EventTime": "2023-10-30T14:00:56.278139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CzF97R3HeLR0qXUDi"]} -{"Format": "IDEA0", "ID": "7c06dfae-9bdb-4fd2-a697-a429f18a6c95", "DetectTime": "2023-10-30T14:00:56.328447+02:00", "EventTime": "2023-10-30T14:00:56.328462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["CbSpkF3uUKNTZjewV5"]} -{"Format": "IDEA0", "ID": "29d5b6ca-96d0-4cf5-94b5-685d0586915f", "DetectTime": "2023-10-30T14:00:56.378430+02:00", "EventTime": "2023-10-30T14:00:56.378448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CGlgcu4cwwPnH9wMrg"]} -{"Format": "IDEA0", "ID": "16d90ce6-270f-4ef4-821d-72146453501a", "DetectTime": "2023-10-30T14:00:56.426490+02:00", "EventTime": "2023-10-30T14:00:56.426510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["Ctrn0oeZifHRsMeng"]} -{"Format": "IDEA0", "ID": "ece84702-6d2a-4402-955b-9cd7182a683d", "DetectTime": "2023-10-30T14:00:56.475650+02:00", "EventTime": "2023-10-30T14:00:56.475678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C01ZoE4YW8sxM1cxAc"]} -{"Format": "IDEA0", "ID": "55f957ae-dab1-4c73-b5eb-7cce6d06c1bf", "DetectTime": "2023-10-30T14:00:56.534605+02:00", "EventTime": "2023-10-30T14:00:56.534623+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6hVnv1pxIDkiEYaZj"]} -{"Format": "IDEA0", "ID": "664d50dd-fb19-422e-a244-dcef974607f7", "DetectTime": "2023-10-30T14:00:56.555190+02:00", "EventTime": "2023-10-30T14:00:56.555410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CFziAc2LTuXodo5oY9"]} -{"Format": "IDEA0", "ID": "898d341f-0e70-4e09-9ad5-e1b45c1d0d1b", "DetectTime": "2023-10-30T14:00:56.604005+02:00", "EventTime": "2023-10-30T14:00:56.604030+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cm32sf383EXeUhChMb"]} -{"Format": "IDEA0", "ID": "768d2dd1-5b54-4633-b51c-398fa8e5773c", "DetectTime": "2023-10-30T14:00:56.624254+02:00", "EventTime": "2023-10-30T14:00:56.624278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["CvdrgP2ZIxBoEb7rNg"]} -{"Format": "IDEA0", "ID": "c734101b-2bc3-459a-a72f-af40f0d141f8", "DetectTime": "2023-10-30T14:00:56.665096+02:00", "EventTime": "2023-10-30T14:00:56.665118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CAfGI54seca1XS6Irb"]} -{"Format": "Json", "ID": "c734101b-2bc3-459a-a72f-af40f0d141f8", "DetectTime": "2023-10-30T14:00:56.665096+02:00", "EventTime": "2023-10-30T14:00:56.665118+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:12:07.457622+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:56.741702)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e1648332-91e2-4aa1-a7a0-ffc77b5eb0e1", "DetectTime": "2023-10-30T14:00:56.747349+02:00", "EventTime": "2023-10-30T14:00:56.747366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CWTjRC3avkktl3hDe2"]} -{"Format": "IDEA0", "ID": "7a2e3fe2-37c7-4e4d-9f0d-48c8ae67e1df", "DetectTime": "2023-10-30T14:00:56.795626+02:00", "EventTime": "2023-10-30T14:00:56.795651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CIJ3bU3gft1VXITDFd"]} -{"Format": "IDEA0", "ID": "47b2c060-3d95-41d2-a656-bb9b0047cf60", "DetectTime": "2023-10-30T14:00:56.838002+02:00", "EventTime": "2023-10-30T14:00:56.838030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C26m1P2mmtec1VuEMh"]} -{"Format": "IDEA0", "ID": "17033e46-939f-42db-9ee7-824ab7580055", "DetectTime": "2023-10-30T14:00:56.876146+02:00", "EventTime": "2023-10-30T14:00:56.876170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CQ1MM62fjGswlyhED3"]} -{"Format": "IDEA0", "ID": "283a5d67-2dfb-42a8-bf81-0fad90607a18", "DetectTime": "2023-10-30T14:00:56.914921+02:00", "EventTime": "2023-10-30T14:00:56.914939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CkOzCq35SfVKb7BAfj"]} -{"Format": "IDEA0", "ID": "3a7f4c8e-7ba8-457e-b513-af73e8e0dfce", "DetectTime": "2023-10-30T14:00:56.954956+02:00", "EventTime": "2023-10-30T14:00:56.954985+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COVHlE1BQMBVCyrAy"]} -{"Format": "IDEA0", "ID": "aa8a7c52-8022-4a85-ba32-134a1c0783e9", "DetectTime": "2023-10-30T14:00:56.972307+02:00", "EventTime": "2023-10-30T14:00:56.972327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CE5NJX2t8Rhcjen1Hg"]} -{"Format": "IDEA0", "ID": "11cc0352-dc5c-41e4-88c7-1f52b83ce40f", "DetectTime": "2023-10-30T14:00:57.010806+02:00", "EventTime": "2023-10-30T14:00:57.010833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["C2GPGj4uz7dPsizZI3"]} -{"Format": "IDEA0", "ID": "3f3fb371-85ab-4db3-950e-2589cc3b856e", "DetectTime": "2023-10-30T14:00:57.049519+02:00", "EventTime": "2023-10-30T14:00:57.049546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CB0i4v28Lqiv9J4452", "Cm32sf383EXeUhChMb", "CIH97F3gVkJjweyDF7", "CFkDjR1nZQzMQx2Rua"]} -{"Format": "IDEA0", "ID": "dd592cfb-3544-4a39-b0ed-54a8e0c04305", "DetectTime": "2023-10-30T14:00:57.067777+02:00", "EventTime": "2023-10-30T14:00:57.067797+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFkDjR1nZQzMQx2Rua"]} -{"Format": "IDEA0", "ID": "384368a9-4397-4337-89c2-724c2ab0832e", "DetectTime": "2023-10-30T14:00:57.089226+02:00", "EventTime": "2023-10-30T14:00:57.089239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CyMyMa7oHPD5BrcRl"]} -{"Format": "IDEA0", "ID": "2e6187ad-0c6d-4927-8f80-0c89861202a7", "DetectTime": "2023-10-30T14:00:57.129162+02:00", "EventTime": "2023-10-30T14:00:57.129182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cgz8Vd3vOBRIL9S6P7"]} -{"Format": "Json", "ID": "2e6187ad-0c6d-4927-8f80-0c89861202a7", "DetectTime": "2023-10-30T14:00:57.129162+02:00", "EventTime": "2023-10-30T14:00:57.129182+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:42:14.593465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:57.197379)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5133d573-83a5-41ba-a981-2bb798991ace", "DetectTime": "2023-10-30T14:00:57.203297+02:00", "EventTime": "2023-10-30T14:00:57.203311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CbhLdl3Mi7XUjhBCze"]} -{"Format": "IDEA0", "ID": "11242291-9b0c-430c-a4c0-ed4a0f333fb3", "DetectTime": "2023-10-30T14:00:57.244521+02:00", "EventTime": "2023-10-30T14:00:57.244542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CMDVmo3RpkajN1RHX2"]} -{"Format": "IDEA0", "ID": "0e397c0b-46c6-4fbd-af4c-8090d8487b19", "DetectTime": "2023-10-30T14:00:57.283546+02:00", "EventTime": "2023-10-30T14:00:57.283572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. ", "ContentType": "text/plain"}], "uids": ["COeFJ73Hh4iVdXFcya"]} -{"Format": "IDEA0", "ID": "1928307b-9925-4f1d-95c4-8ab863d67722", "DetectTime": "2023-10-30T14:00:57.322463+02:00", "EventTime": "2023-10-30T14:00:57.322485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C0arnvwGsP7nKvAZd"]} -{"Format": "IDEA0", "ID": "0760d035-8de3-462b-b504-59c46c98332c", "DetectTime": "2023-10-30T14:00:57.360031+02:00", "EventTime": "2023-10-30T14:00:57.360050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["Cz7vf31UIQvhINjn3l"]} -{"Format": "IDEA0", "ID": "e43899d7-fe66-4c1b-9c8d-41d4c85cac0d", "DetectTime": "2023-10-30T14:00:57.395886+02:00", "EventTime": "2023-10-30T14:00:57.395959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["ChWp7u4tcsHD344hRj"]} -{"Format": "IDEA0", "ID": "4fc8ec36-bde6-4542-a110-d14558045e70", "DetectTime": "2023-10-30T14:00:57.431047+02:00", "EventTime": "2023-10-30T14:00:57.431070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CknWyhxBpCm5rDOn9"]} -{"Format": "IDEA0", "ID": "705919ad-769a-4c34-a5ed-98e2a4810774", "DetectTime": "2023-10-30T14:00:57.470228+02:00", "EventTime": "2023-10-30T14:00:57.470260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C6TD2t2amMnuJoF8j9"]} -{"Format": "Json", "ID": "705919ad-769a-4c34-a5ed-98e2a4810774", "DetectTime": "2023-10-30T14:00:57.470228+02:00", "EventTime": "2023-10-30T14:00:57.470260+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:42:15.684981+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:57.534392)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8997a8fe-106f-4b3e-9032-9fff9b5d7649", "DetectTime": "2023-10-30T14:00:57.541187+02:00", "EventTime": "2023-10-30T14:00:57.541209+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COLohl3ycWeuU2Z1I2"]} -{"Format": "IDEA0", "ID": "25ed419f-6265-45aa-bf03-da2b04e55cb9", "DetectTime": "2023-10-30T14:00:57.561535+02:00", "EventTime": "2023-10-30T14:00:57.561550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["Ck9xQx1L53haP8vb3f"]} -{"Format": "IDEA0", "ID": "fb32d97a-2790-48c0-925f-6c0fe002e2c3", "DetectTime": "2023-10-30T14:00:57.593335+02:00", "EventTime": "2023-10-30T14:00:57.593355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7313], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. ", "ContentType": "text/plain"}], "uids": ["CiIHja4O5ZHHY29dx3"]} -{"Format": "IDEA0", "ID": "5f8a4da4-26bf-423f-a0e5-23cf01425d61", "DetectTime": "2023-10-30T14:00:57.624077+02:00", "EventTime": "2023-10-30T14:00:57.624103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CN8r5Z2nbHdSdTD3Pb"]} -{"Format": "IDEA0", "ID": "dab17a5e-3ca2-4b2c-8557-c4106ad30a89", "DetectTime": "2023-10-30T14:00:57.656102+02:00", "EventTime": "2023-10-30T14:00:57.656119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CCyJAa1g3AFo2MPPpc"]} -{"Format": "IDEA0", "ID": "20385c13-b1f2-46fb-a489-b6aff06273bf", "DetectTime": "2023-10-30T14:00:57.690514+02:00", "EventTime": "2023-10-30T14:00:57.690538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Ct3pEn2lNz9ZGbmHna"]} -{"Format": "IDEA0", "ID": "e8af71e8-6eb7-44f1-856c-dcd28cdc59f1", "DetectTime": "2023-10-30T14:00:57.727800+02:00", "EventTime": "2023-10-30T14:00:57.727817+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C942xj1e46TDt2he06"]} -{"Format": "IDEA0", "ID": "d06c1cb4-245e-4408-b3e7-13da093fc3f5", "DetectTime": "2023-10-30T14:00:57.749332+02:00", "EventTime": "2023-10-30T14:00:57.749358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CocprF2X1HCBIhfFeg"]} -{"Format": "IDEA0", "ID": "c8a147ed-2455-4bee-8c00-70aa8fee1d16", "DetectTime": "2023-10-30T14:00:57.786553+02:00", "EventTime": "2023-10-30T14:00:57.786573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["ChpLaX14Vmb8fw0UKl"]} -{"Format": "IDEA0", "ID": "a7aa711e-6b5d-4a24-836f-891bea368ed9", "DetectTime": "2023-10-30T14:00:57.825479+02:00", "EventTime": "2023-10-30T14:00:57.825501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CGsk5J1i2aPHL3V3d8"]} -{"Format": "Json", "ID": "a7aa711e-6b5d-4a24-836f-891bea368ed9", "DetectTime": "2023-10-30T14:00:57.825479+02:00", "EventTime": "2023-10-30T14:00:57.825501+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:42:17.230658+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:57.893089)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ad9d4e3c-5b41-4065-948b-bd976c18f124", "DetectTime": "2023-10-30T14:00:57.899776+02:00", "EventTime": "2023-10-30T14:00:57.899828+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQD8At1cUk7yb1TJJd"]} -{"Format": "IDEA0", "ID": "92de36ae-982d-4e19-8a45-6adce9a9dfd8", "DetectTime": "2023-10-30T14:00:57.924405+02:00", "EventTime": "2023-10-30T14:00:57.924432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["Cp3StV3IVIEDiuyptf"]} -{"Format": "IDEA0", "ID": "ec73ffd3-9a5c-4fcf-9bc9-e30cfefc98a0", "DetectTime": "2023-10-30T14:00:57.956607+02:00", "EventTime": "2023-10-30T14:00:57.956622+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1xGOh1plWaAtIZ8Ig"]} -{"Format": "IDEA0", "ID": "03e60eb2-8e2a-439b-8f7c-f0e6ced1d47f", "DetectTime": "2023-10-30T14:00:57.978423+02:00", "EventTime": "2023-10-30T14:00:57.978447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["CHANWM3TUtYSzfmyye"]} -{"Format": "IDEA0", "ID": "c8323bdc-391c-4b15-bb86-c6ed7fef2874", "DetectTime": "2023-10-30T14:00:58.013903+02:00", "EventTime": "2023-10-30T14:00:58.013923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["Cz60FvDvl4aIDL5bj"]} -{"Format": "IDEA0", "ID": "bc66c2fc-42ce-4b26-87b5-7405c8f4bf45", "DetectTime": "2023-10-30T14:00:58.044484+02:00", "EventTime": "2023-10-30T14:00:58.044511+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP7DFL1L7x8gYsgxMi"]} -{"Format": "IDEA0", "ID": "2580b0cf-b26d-4a69-8c5a-4962cbd7e915", "DetectTime": "2023-10-30T14:00:58.062290+02:00", "EventTime": "2023-10-30T14:00:58.062311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5361], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. ", "ContentType": "text/plain"}], "uids": ["CgFoG5BiwdQLpnsSd"]} -{"Format": "IDEA0", "ID": "122f4be5-db7b-4e5e-a0c3-3e83d6ce6a9e", "DetectTime": "2023-10-30T14:00:58.095315+02:00", "EventTime": "2023-10-30T14:00:58.095335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cbxh2n3pZVFVt7pLD4"]} -{"Format": "IDEA0", "ID": "7f715918-fa04-4e6d-91a4-6e7a94d712bf", "DetectTime": "2023-10-30T14:00:58.128283+02:00", "EventTime": "2023-10-30T14:00:58.128308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPY6c54AYPsvrsluW8"]} -{"Format": "IDEA0", "ID": "771d51cf-5e5a-4c57-a763-9ef44f04675a", "DetectTime": "2023-10-30T14:00:58.145493+02:00", "EventTime": "2023-10-30T14:00:58.145511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CdOVJn1qzT7V0ptfw"]} -{"Format": "IDEA0", "ID": "37ffc7fc-be0c-45aa-920a-615047026396", "DetectTime": "2023-10-30T14:00:58.177825+02:00", "EventTime": "2023-10-30T14:00:58.177844+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.19.92.194"], "Hostname": ["c-76-19-92-194.hsd1.ct.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.19.92.194 from 10.0.2.19. blacklisted IP AS: COMCAST-7922, US AS7922 rDNS: c-76-19-92-194.hsd1.ct.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CzZw3mAzXfUBXB6X3"]} -{"Format": "IDEA0", "ID": "5c723188-9028-4759-8c96-b4b8b21b6f05", "DetectTime": "2023-10-30T14:00:58.233173+02:00", "EventTime": "2023-10-30T14:00:58.233201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C3n3Mv1CXb8xeagHzf"]} -{"Format": "IDEA0", "ID": "6ebab2f1-9d32-4c1b-a37f-b13f7a7faf41", "DetectTime": "2023-10-30T14:00:58.270275+02:00", "EventTime": "2023-10-30T14:00:58.270306+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6fXfQiS8g5kyuFY7"]} -{"Format": "IDEA0", "ID": "43d74745-9020-482c-b57c-517ea79b938d", "DetectTime": "2023-10-30T14:00:58.288352+02:00", "EventTime": "2023-10-30T14:00:58.288378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CBsJ5g2NKJ3dnJ8sZg"]} -{"Format": "Json", "ID": "43d74745-9020-482c-b57c-517ea79b938d", "DetectTime": "2023-10-30T14:00:58.288352+02:00", "EventTime": "2023-10-30T14:00:58.288378+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T14:42:18.630541+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2023/10/30 14:00:58.354012)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a61d3c21-c01b-4750-83bb-f2fa3cd922f8", "DetectTime": "2023-10-30T14:00:58.362023+02:00", "EventTime": "2023-10-30T14:00:58.362047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C942xj1e46TDt2he06", "C1xGOh1plWaAtIZ8Ig", "CPY6c54AYPsvrsluW8", "CJa5jW3MFsAovYURm6"]} -{"Format": "IDEA0", "ID": "f04f0e7a-6166-4101-a536-10378897e138", "DetectTime": "2023-10-30T14:00:58.383473+02:00", "EventTime": "2023-10-30T14:00:58.383493+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJa5jW3MFsAovYURm6"]} -{"Format": "IDEA0", "ID": "c71fa32d-0e86-4528-a2d5-5df8fc1540ef", "DetectTime": "2023-10-30T14:00:58.401531+02:00", "EventTime": "2023-10-30T14:00:58.401554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6839], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. ", "ContentType": "text/plain"}], "uids": ["Cm0IGZ3o1yTfNovg7i"]} -{"Format": "IDEA0", "ID": "9cf853a8-1001-49a8-a785-11c50098bdda", "DetectTime": "2023-10-30T14:00:58.430997+02:00", "EventTime": "2023-10-30T14:00:58.431068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CPJ8OyPUc6MYHpWsi"]} -{"Format": "IDEA0", "ID": "ae36014e-06f4-4534-be52-d553f6ef6235", "DetectTime": "2023-10-30T14:00:58.456773+02:00", "EventTime": "2023-10-30T14:00:58.456798+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ce0sRu1nMi99XYAnZk"]} -{"Format": "IDEA0", "ID": "1c453983-ef91-4796-827a-5e5f7cd3f98c", "DetectTime": "2023-10-30T14:00:58.474140+02:00", "EventTime": "2023-10-30T14:00:58.474154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CEWcT43ZRoQBuB2Zg1"]} -{"Format": "IDEA0", "ID": "4411320f-1979-45a0-9d2d-613318a26772", "DetectTime": "2023-10-30T14:00:58.497795+02:00", "EventTime": "2023-10-30T14:00:58.497812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CtPyOfRyhY5mfdoV"]} -{"Format": "IDEA0", "ID": "1c521a0d-031a-434c-9613-f8346c979f31", "DetectTime": "2023-10-30T14:00:58.522323+02:00", "EventTime": "2023-10-30T14:00:58.522342+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnilHB3l8NUVML0Oqj"]} -{"Format": "IDEA0", "ID": "80a9cd5f-1ec7-4db0-b398-a4cd81f1f0c1", "DetectTime": "2023-10-30T14:00:58.540116+02:00", "EventTime": "2023-10-30T14:00:58.540136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiDsITt9fk4Sts0H2"]} -{"Format": "IDEA0", "ID": "5078a015-12cc-4758-803f-e7c638e8c95b", "DetectTime": "2023-10-30T14:00:58.568302+02:00", "EventTime": "2023-10-30T14:00:58.568322+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4q1hRCa1YP1FUmGb"]} -{"Format": "IDEA0", "ID": "7373a474-33c1-415b-9044-20f965aec4c2", "DetectTime": "2023-10-30T14:00:58.585938+02:00", "EventTime": "2023-10-30T14:00:58.585959+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcTxUa16lKLUxOYbA2"]} -{"Format": "IDEA0", "ID": "050af9ef-eedf-4dfa-b9a9-ed4ba2a8ce73", "DetectTime": "2023-10-30T14:00:58.604297+02:00", "EventTime": "2023-10-30T14:00:58.604325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CoxFtD1aVqiwqwAgcd"]} -{"Format": "IDEA0", "ID": "a6774c46-a68b-4151-878f-dd61561c6349", "DetectTime": "2023-10-30T14:00:58.655561+02:00", "EventTime": "2023-10-30T14:00:58.655588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["C78Sf12eoFkOz5dGx5"]} -{"Format": "IDEA0", "ID": "0fceb7f4-d509-4338-ae5a-0140d419915c", "DetectTime": "2023-10-30T14:00:58.707899+02:00", "EventTime": "2023-10-30T14:00:58.707928+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoBKsB3IoEFry1ZFek"]} -{"Format": "IDEA0", "ID": "d15aa11a-a3c3-4ced-9dbf-4b3eee20920e", "DetectTime": "2023-10-30T14:00:58.725461+02:00", "EventTime": "2023-10-30T14:00:58.725489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CfFLR01INmQhYZa0E8"]} -{"Format": "IDEA0", "ID": "39113b90-d5b9-43a5-be54-fb7f83aed211", "DetectTime": "2023-10-30T14:00:58.783003+02:00", "EventTime": "2023-10-30T14:00:58.783029+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVEfBb2IyaKtzQz67"]} -{"Format": "IDEA0", "ID": "1094f0c3-c422-4752-ba0d-f6b85d8d0810", "DetectTime": "2023-10-30T14:00:58.803643+02:00", "EventTime": "2023-10-30T14:00:58.803701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CU2byl2uc74fyuCOz"]} -{"Format": "IDEA0", "ID": "843f6bf3-4e84-485f-9c8e-f0c93da7d3e7", "DetectTime": "2023-10-30T14:00:58.855734+02:00", "EventTime": "2023-10-30T14:00:58.855753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CgFWxQqX9tvW2iI42"]} -{"Format": "IDEA0", "ID": "a3b9dedc-c349-40a0-9845-2dde2996a5d1", "DetectTime": "2023-10-30T14:00:58.910597+02:00", "EventTime": "2023-10-30T14:00:58.910617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CSBbV13XYvLIogquB8"]} -{"Format": "IDEA0", "ID": "19904074-6fb4-4023-a4b4-29bc0537ed34", "DetectTime": "2023-10-30T14:00:58.963216+02:00", "EventTime": "2023-10-30T14:00:58.963239+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4Gdz83hjjrG9DGrA3"]} -{"Format": "IDEA0", "ID": "d1363ef4-d56c-49db-a18b-d562ec449bba", "DetectTime": "2023-10-30T14:00:58.984018+02:00", "EventTime": "2023-10-30T14:00:58.984039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C1mVJ34vIbDO25Kz34"]} -{"Format": "Json", "ID": "d1363ef4-d56c-49db-a18b-d562ec449bba", "DetectTime": "2023-10-30T14:00:58.984018+02:00", "EventTime": "2023-10-30T14:00:58.984039+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T15:12:49.932288+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:00:59.099481)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "780f5c4a-7a7e-4943-bd0e-cb5487847942", "DetectTime": "2023-10-30T14:00:59.105238+02:00", "EventTime": "2023-10-30T14:00:59.105264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CVGqxZ1JXmAotaShEa", "CVEfBb2IyaKtzQz67", "CnilHB3l8NUVML0Oqj", "CcTxUa16lKLUxOYbA2"]} -{"Format": "IDEA0", "ID": "a33f3aff-24d1-4281-8be6-2f2d1a719d9f", "DetectTime": "2023-10-30T14:00:59.126972+02:00", "EventTime": "2023-10-30T14:00:59.126994+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVGqxZ1JXmAotaShEa"]} -{"Format": "IDEA0", "ID": "9454b7b9-8fea-4d84-94dd-0ccc3348f4e6", "DetectTime": "2023-10-30T14:00:59.145920+02:00", "EventTime": "2023-10-30T14:00:59.145942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CeFUPv1pYpeGGFQKg7"]} -{"Format": "IDEA0", "ID": "24e907fb-ed4c-4d06-8bc7-36e7edeeb272", "DetectTime": "2023-10-30T14:00:59.203001+02:00", "EventTime": "2023-10-30T14:00:59.203022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CupMrg1tr3Urb1OCa7"]} -{"Format": "IDEA0", "ID": "770a2aee-8a7c-443c-9b8a-61736ddbf702", "DetectTime": "2023-10-30T14:00:59.251194+02:00", "EventTime": "2023-10-30T14:00:59.251212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C0WrK73nhJVtH5K6A7"]} -{"Format": "IDEA0", "ID": "d742f09d-ed3a-4986-87a8-a347776e09bc", "DetectTime": "2023-10-30T14:00:59.301265+02:00", "EventTime": "2023-10-30T14:00:59.301284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["Cy2KxbqVxS1f0SjP9"]} -{"Format": "IDEA0", "ID": "b20b7407-1e39-4128-9418-13961b4cd10d", "DetectTime": "2023-10-30T14:00:59.353784+02:00", "EventTime": "2023-10-30T14:00:59.353798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CLob7i1ub153D872P"]} -{"Format": "IDEA0", "ID": "6ce1dabf-0937-4611-930e-93e031d64c81", "DetectTime": "2023-10-30T14:00:59.408144+02:00", "EventTime": "2023-10-30T14:00:59.408167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["C9mvb14ky3Iw1LSf"]} -{"Format": "IDEA0", "ID": "10c57fb8-1730-4223-a8b7-bd0cdf95239f", "DetectTime": "2023-10-30T14:00:59.453022+02:00", "EventTime": "2023-10-30T14:00:59.453048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CmaxEg3V1yZ3WB6oXe"]} -{"Format": "IDEA0", "ID": "72762fe2-371c-469a-86f0-9fb821b862c2", "DetectTime": "2023-10-30T14:00:59.508266+02:00", "EventTime": "2023-10-30T14:00:59.508292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CrnLNH2Sylm8BV95t7"]} -{"Format": "Json", "ID": "72762fe2-371c-469a-86f0-9fb821b862c2", "DetectTime": "2023-10-30T14:00:59.508266+02:00", "EventTime": "2023-10-30T14:00:59.508292+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T15:13:26.861633+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:00:59.592024)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6063514a-5ef0-4b90-b9fe-ed4af0dbfbd1", "DetectTime": "2023-10-30T14:00:59.598670+02:00", "EventTime": "2023-10-30T14:00:59.598696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C6Sryo3IFg3RWU033c"]} -{"Format": "IDEA0", "ID": "b3330af4-1560-44b5-8485-2475f50396ac", "DetectTime": "2023-10-30T14:00:59.651307+02:00", "EventTime": "2023-10-30T14:00:59.651325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CLBCYi4vipIW9NtHEl"]} -{"Format": "IDEA0", "ID": "a9d4aaae-5c50-4a2a-9a36-cff8c3d43594", "DetectTime": "2023-10-30T14:00:59.694292+02:00", "EventTime": "2023-10-30T14:00:59.694314+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8EXFUeGGVI93UeA7"]} -{"Format": "IDEA0", "ID": "ab2fadbf-48b6-46bf-88d4-f838b3acdfad", "DetectTime": "2023-10-30T14:00:59.712417+02:00", "EventTime": "2023-10-30T14:00:59.712436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CMPv7A28YxG4EllqFe"]} -{"Format": "IDEA0", "ID": "985ce3d6-fa26-4a66-81ce-378fa5945e09", "DetectTime": "2023-10-30T14:00:59.758479+02:00", "EventTime": "2023-10-30T14:00:59.758530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C734No1s3t5Ygq61x1"]} -{"Format": "IDEA0", "ID": "276f889a-19af-4c8e-b06f-9d2170266fe2", "DetectTime": "2023-10-30T14:00:59.804046+02:00", "EventTime": "2023-10-30T14:00:59.804075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["C8CFUk1xYGQphQtaaj"]} -{"Format": "IDEA0", "ID": "2caee519-e9ce-4275-92bb-920e1bfd4da1", "DetectTime": "2023-10-30T14:00:59.850888+02:00", "EventTime": "2023-10-30T14:00:59.850905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CzrsMH1MBHuN9GmU62"]} -{"Format": "IDEA0", "ID": "6f7614a8-54ff-4154-8e18-fb10544e1b3e", "DetectTime": "2023-10-30T14:00:59.893648+02:00", "EventTime": "2023-10-30T14:00:59.893668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CRXzeH13c1irud7ms4"]} -{"Format": "IDEA0", "ID": "5c5e42da-facf-43df-80c7-09ca9991a2d5", "DetectTime": "2023-10-30T14:00:59.942237+02:00", "EventTime": "2023-10-30T14:00:59.942254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CltdkX1SdK2dKVUxJd"]} -{"Format": "Json", "ID": "5c5e42da-facf-43df-80c7-09ca9991a2d5", "DetectTime": "2023-10-30T14:00:59.942237+02:00", "EventTime": "2023-10-30T14:00:59.942254+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T15:13:45.217967+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:01:00.024723)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e129cb19-81a9-4d4f-ba18-d3f4cdcb782c", "DetectTime": "2023-10-30T14:01:00.031308+02:00", "EventTime": "2023-10-30T14:01:00.031326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CD7qHK9wM8pEVwiIl"]} -{"Format": "IDEA0", "ID": "b0818710-d2d1-4fb5-a5ab-f072fb304991", "DetectTime": "2023-10-30T14:01:00.079696+02:00", "EventTime": "2023-10-30T14:01:00.079716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C46cWw2pvC0iHb3vZb"]} -{"Format": "IDEA0", "ID": "b0e55a6e-e0b0-4acc-9893-d16a1f604f0b", "DetectTime": "2023-10-30T14:01:00.120851+02:00", "EventTime": "2023-10-30T14:01:00.120870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CwPyAr1YnPd2rcILXd"]} -{"Format": "IDEA0", "ID": "57c5506a-116d-4703-ba2e-7bc65a379e9f", "DetectTime": "2023-10-30T14:01:00.165700+02:00", "EventTime": "2023-10-30T14:01:00.165724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C3Eyy62YYXeUzphr33"]} -{"Format": "IDEA0", "ID": "3796a2b8-4666-4962-b8b1-91dc274f514c", "DetectTime": "2023-10-30T14:01:00.206197+02:00", "EventTime": "2023-10-30T14:01:00.206219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["C5nQ1WDuNIRPcdAH1"]} -{"Format": "IDEA0", "ID": "f99683ba-0d7f-4eed-bd69-6467e96458a0", "DetectTime": "2023-10-30T14:01:00.245866+02:00", "EventTime": "2023-10-30T14:01:00.245886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CINlGA2VlbEW7ciU93"]} -{"Format": "IDEA0", "ID": "54d04151-b6c1-43d5-b0e8-11c179981858", "DetectTime": "2023-10-30T14:01:00.305146+02:00", "EventTime": "2023-10-30T14:01:00.305172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CnnRom1NAXXfQXYzYb"]} -{"Format": "IDEA0", "ID": "71f1cabe-2734-48e0-9d68-2f3bee8662a6", "DetectTime": "2023-10-30T14:01:00.352646+02:00", "EventTime": "2023-10-30T14:01:00.352671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCpI591HWtTdXEATA1"]} -{"Format": "IDEA0", "ID": "7711e902-9dce-483f-b377-c3673668c722", "DetectTime": "2023-10-30T14:01:00.365814+02:00", "EventTime": "2023-10-30T14:01:00.365840+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClwqHdobG2lBcIXk4"]} -{"Format": "IDEA0", "ID": "958527b6-6c11-4054-aec5-5be70a5a0ef8", "DetectTime": "2023-10-30T14:01:00.380465+02:00", "EventTime": "2023-10-30T14:01:00.380489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDBAAYZKXiajmCUk2"]} -{"Format": "Json", "ID": "958527b6-6c11-4054-aec5-5be70a5a0ef8", "DetectTime": "2023-10-30T14:01:00.380465+02:00", "EventTime": "2023-10-30T14:01:00.380489+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-02T15:44:44.324281+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:01:00.449928)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "71f88f0a-b833-4bac-abff-f169df6ea9c1", "DetectTime": "2023-10-30T14:01:00.455982+02:00", "EventTime": "2023-10-30T14:01:00.455996+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxC9n7465grx6wTVSc"]} -{"Format": "IDEA0", "ID": "08aaedf7-a178-45b1-88e6-32fcf71625c3", "DetectTime": "2023-10-30T14:01:00.472563+02:00", "EventTime": "2023-10-30T14:01:00.472591+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXRO0i1QCvbGS3GQs4"]} -{"Format": "IDEA0", "ID": "52589839-24df-4b4f-aab1-ededcdcf7076", "DetectTime": "2023-10-30T14:01:00.487586+02:00", "EventTime": "2023-10-30T14:01:00.487610+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPAStF1WkFWyi0KPP2"]} -{"Format": "IDEA0", "ID": "e15a8176-8420-4e2b-8497-689a4f75a387", "DetectTime": "2023-10-30T14:01:00.502654+02:00", "EventTime": "2023-10-30T14:01:00.502677+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuLuftkxAhzoEIWRj"]} -{"Format": "IDEA0", "ID": "29f75720-a00f-40e9-a248-cf6668deecd5", "DetectTime": "2023-10-30T14:01:00.516048+02:00", "EventTime": "2023-10-30T14:01:00.516214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CAfyjJ6af9hMU7Xlf"]} -{"Format": "IDEA0", "ID": "ab1aaa6d-101f-4f2b-8481-71e088798373", "DetectTime": "2023-10-30T14:01:00.557975+02:00", "EventTime": "2023-10-30T14:01:00.557997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCpI591HWtTdXEATA1", "CPAStF1WkFWyi0KPP2", "CxC9n7465grx6wTVSc", "CPjXlxaJkERUWDIPj"]} -{"Format": "IDEA0", "ID": "7aa847af-4226-4c34-bbba-4335bf5be97e", "DetectTime": "2023-10-30T14:01:00.575048+02:00", "EventTime": "2023-10-30T14:01:00.575073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C1H5z12rnkprjyHlL3"]} -{"Format": "IDEA0", "ID": "32dd6d2a-33a7-428a-b739-7a00233a4ef3", "DetectTime": "2023-10-30T14:01:00.614832+02:00", "EventTime": "2023-10-30T14:01:00.614858+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPjXlxaJkERUWDIPj"]} -{"Format": "IDEA0", "ID": "c4a79d0a-7883-4f8e-bac5-4899fbb6ab39", "DetectTime": "2023-10-30T14:01:00.630720+02:00", "EventTime": "2023-10-30T14:01:00.630732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CPtayT1MpJo64OqKe"]} -{"Format": "IDEA0", "ID": "7310b3eb-16a0-42a5-91cf-ae0562d58cea", "DetectTime": "2023-10-30T14:01:00.666023+02:00", "EventTime": "2023-10-30T14:01:00.666046+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cx3YwW3GxcmyFPtcoc"]} -{"Format": "IDEA0", "ID": "3f78a81c-3492-4c94-a5ea-9097640129b2", "DetectTime": "2023-10-30T14:01:00.683076+02:00", "EventTime": "2023-10-30T14:01:00.683096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CatimoxWgE6e1HYL2"]} -{"Format": "IDEA0", "ID": "5a0705fe-d4eb-4bd4-8981-24fcd1cc3164", "DetectTime": "2023-10-30T14:01:00.726501+02:00", "EventTime": "2023-10-30T14:01:00.726517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CrqTxg4IXs1IeiBSw4"]} -{"Format": "IDEA0", "ID": "5d1f59e8-e576-4aaf-93e6-b5fa7682c2af", "DetectTime": "2023-10-30T14:01:00.765457+02:00", "EventTime": "2023-10-30T14:01:00.765484+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2XoUL2Nt4bOAfTPmg"]} -{"Format": "IDEA0", "ID": "6ec1f26c-afce-4ebd-bd4d-6071ff5151b5", "DetectTime": "2023-10-30T14:01:00.783656+02:00", "EventTime": "2023-10-30T14:01:00.783676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CjAv7R1LVJf9yq1kX6"]} -{"Format": "IDEA0", "ID": "30525181-87ea-46d3-94cb-fb9f913a7dcd", "DetectTime": "2023-10-30T14:01:00.824174+02:00", "EventTime": "2023-10-30T14:01:00.824197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["C1B3ik2i612dCd90F9"]} -{"Format": "IDEA0", "ID": "00a40b0e-4c40-41d7-9978-882461488c73", "DetectTime": "2023-10-30T14:01:00.863188+02:00", "EventTime": "2023-10-30T14:01:00.863218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CPmnWD1rb5w09e9Asb"]} -{"Format": "Json", "ID": "00a40b0e-4c40-41d7-9978-882461488c73", "DetectTime": "2023-10-30T14:01:00.863188+02:00", "EventTime": "2023-10-30T14:01:00.863218+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T15:45:29.894636+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:01:00.936842)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6549f16a-f0db-40d7-a6d5-ed887242cf96", "DetectTime": "2023-10-30T14:01:00.942756+02:00", "EventTime": "2023-10-30T14:01:00.942770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C54Txh3P96xhzpDPn5"]} -{"Format": "IDEA0", "ID": "b845fd50-4113-4e2f-85cc-7666eaf22e23", "DetectTime": "2023-10-30T14:01:00.977530+02:00", "EventTime": "2023-10-30T14:01:00.977551+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWrPGZEdxPJkNW6s4"]} -{"Format": "IDEA0", "ID": "d749cfda-1c07-4fdc-826a-96b40f540dad", "DetectTime": "2023-10-30T14:01:00.991626+02:00", "EventTime": "2023-10-30T14:01:00.991651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["C02kBF4L44KqBtnW1l"]} -{"Format": "IDEA0", "ID": "6ad6c6b8-4f54-4b37-a418-df06699e92bb", "DetectTime": "2023-10-30T14:01:01.024471+02:00", "EventTime": "2023-10-30T14:01:01.024497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CgeMj5pdNiX4Vbg8h"]} -{"Format": "IDEA0", "ID": "6a04db41-5e7e-43e4-a6ca-69f32dbeea78", "DetectTime": "2023-10-30T14:01:01.056310+02:00", "EventTime": "2023-10-30T14:01:01.056330+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ca3Stq34LfILn8xqyb"]} -{"Format": "IDEA0", "ID": "adbfd798-2861-419f-9a74-17097a13445a", "DetectTime": "2023-10-30T14:01:01.070138+02:00", "EventTime": "2023-10-30T14:01:01.070159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CFrdiD2tAH6eO3ep4"]} -{"Format": "IDEA0", "ID": "15253867-9471-4db5-adcd-bdb45198bd57", "DetectTime": "2023-10-30T14:01:01.102882+02:00", "EventTime": "2023-10-30T14:01:01.102910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CXtViX6bakqZuOWH8"]} -{"Format": "IDEA0", "ID": "ded8d21b-abfa-4645-b7fd-855a2f3f0ff7", "DetectTime": "2023-10-30T14:01:01.136277+02:00", "EventTime": "2023-10-30T14:01:01.136299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. ", "ContentType": "text/plain"}], "uids": ["C5xVLA1w1NR9XrdzA2"]} -{"Format": "IDEA0", "ID": "0d0fd052-286d-40d6-a718-70629180b05c", "DetectTime": "2023-10-30T14:01:01.168172+02:00", "EventTime": "2023-10-30T14:01:01.168198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CVgpDV3TxBqMZ36HL9"]} -{"Format": "IDEA0", "ID": "03ea5d48-8470-42a4-a609-bfcb2fdd57e5", "DetectTime": "2023-10-30T14:01:01.201424+02:00", "EventTime": "2023-10-30T14:01:01.201452+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.151.170.232"], "Hostname": ["dsl-187-151-170-232-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 187.151.170.232 from 10.0.2.19. blacklisted IP AS: Uninet S.A. de C.V. AS8151 rDNS: dsl-187-151-170-232-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CqVwUO191FOwtAQV3a"]} -{"Format": "IDEA0", "ID": "a2917034-351e-402c-b174-5477b64e3272", "DetectTime": "2023-10-30T14:01:01.257701+02:00", "EventTime": "2023-10-30T14:01:01.257749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CyFSl54i1663OVOFqj"]} -{"Format": "Json", "ID": "a2917034-351e-402c-b174-5477b64e3272", "DetectTime": "2023-10-30T14:01:01.257701+02:00", "EventTime": "2023-10-30T14:01:01.257749+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T15:45:49.274010+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:01:01.320132)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d96176af-5e6f-4502-9fef-07015fe33868", "DetectTime": "2023-10-30T14:01:01.326558+02:00", "EventTime": "2023-10-30T14:01:01.326580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CAjtXji23g2wi0vMd"]} -{"Format": "IDEA0", "ID": "d56b48f6-4cc9-472c-b055-e45e8df9fcfa", "DetectTime": "2023-10-30T14:01:01.360658+02:00", "EventTime": "2023-10-30T14:01:01.360675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CjfIUV3uC4uOiAHpP"]} -{"Format": "IDEA0", "ID": "483efeeb-29e6-46db-ba7b-61b1f08bd4f5", "DetectTime": "2023-10-30T14:01:01.389910+02:00", "EventTime": "2023-10-30T14:01:01.389935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CCmhKw1S13Uqx1G8Jb"]} -{"Format": "IDEA0", "ID": "9beee716-e03b-4066-9786-0a5f3972a4d8", "DetectTime": "2023-10-30T14:01:01.418792+02:00", "EventTime": "2023-10-30T14:01:01.418811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CS2vtO3rCGzyiArYX1"]} -{"Format": "IDEA0", "ID": "d0b682c6-ca49-4907-b730-42a1e86b72f3", "DetectTime": "2023-10-30T14:01:01.449951+02:00", "EventTime": "2023-10-30T14:01:01.449981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CxPlTz2BYf49DCLY22"]} -{"Format": "IDEA0", "ID": "42ff9f31-c3a9-4262-a39c-ea139b3e647d", "DetectTime": "2023-10-30T14:01:01.481046+02:00", "EventTime": "2023-10-30T14:01:01.481064+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrEyUp1Q7nLNsUU5L2"]} -{"Format": "IDEA0", "ID": "4236b891-abb7-40ac-b3d1-8d95669b0ffe", "DetectTime": "2023-10-30T14:01:01.496432+02:00", "EventTime": "2023-10-30T14:01:01.496461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CkQCysWmL304FYz9c"]} -{"Format": "IDEA0", "ID": "0c5b2e5e-8055-4fc3-8f5d-f520d5a4db39", "DetectTime": "2023-10-30T14:01:01.527250+02:00", "EventTime": "2023-10-30T14:01:01.527277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CSm7NG3YOp2xzHH43"]} -{"Format": "IDEA0", "ID": "c54a5975-59f9-4d60-962d-1998ef413c91", "DetectTime": "2023-10-30T14:01:01.560065+02:00", "EventTime": "2023-10-30T14:01:01.560091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CkJ6bZBe2vDDPjXb"]} -{"Format": "Json", "ID": "c54a5975-59f9-4d60-962d-1998ef413c91", "DetectTime": "2023-10-30T14:01:01.560065+02:00", "EventTime": "2023-10-30T14:01:01.560091+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T15:45:50.510621+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2023/10/30 14:01:01.624623)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed0c80f5-dd1d-4b04-8009-2804468f5ebd", "DetectTime": "2023-10-30T14:01:01.630622+02:00", "EventTime": "2023-10-30T14:01:01.630636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CJQ3041mtkccghapnf"]} -{"Format": "IDEA0", "ID": "340735cd-b12c-4326-9d2a-01af303d4703", "DetectTime": "2023-10-30T14:01:01.662232+02:00", "EventTime": "2023-10-30T14:01:01.662252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CcQmIb4ajsW8eu1Gwa"]} -{"Format": "IDEA0", "ID": "738e076b-4891-4ef5-92ba-d1bf95cd7f68", "DetectTime": "2023-10-30T14:01:01.692004+02:00", "EventTime": "2023-10-30T14:01:01.692023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CzUdODHuLTakOP9rj"]} -{"Format": "IDEA0", "ID": "56175f4f-779a-4e32-9822-d1ee3e6730bc", "DetectTime": "2023-10-30T14:01:01.719521+02:00", "EventTime": "2023-10-30T14:01:01.719547+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXYXo81yr3o1yo0582"]} -{"Format": "IDEA0", "ID": "c74b5e05-b850-4f8e-8850-836bbd2eb823", "DetectTime": "2023-10-30T14:01:01.734374+02:00", "EventTime": "2023-10-30T14:01:01.734391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CsUKMh26vDH2OabLZd"]} -{"Format": "IDEA0", "ID": "a55c1b29-c513-4fbd-b8d5-1a7db7843198", "DetectTime": "2023-10-30T14:01:01.764198+02:00", "EventTime": "2023-10-30T14:01:01.764225+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZfD7u2ppqdRbMZdh7"]} -{"Format": "IDEA0", "ID": "afe09867-b948-4b36-bebb-51faceb88f3e", "DetectTime": "2023-10-30T14:01:01.778550+02:00", "EventTime": "2023-10-30T14:01:01.778576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3LuXx1ZLqaFys2XDd"]} -{"Format": "IDEA0", "ID": "97a97fb8-6558-4d87-8e87-ad544cb5be01", "DetectTime": "2023-10-30T14:01:01.822627+02:00", "EventTime": "2023-10-30T14:01:01.822646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmLXzm3B3UNjuakNkj", "C2XoUL2Nt4bOAfTPmg", "Ca3Stq34LfILn8xqyb", "CXYXo81yr3o1yo0582"]} -{"Format": "IDEA0", "ID": "968c3535-8f80-4084-8153-deac56520935", "DetectTime": "2023-10-30T14:01:01.836988+02:00", "EventTime": "2023-10-30T14:01:01.837007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmLXzm3B3UNjuakNkj"]} -{"Format": "IDEA0", "ID": "29c2f205-23e5-49a3-b4ad-fc5eeb805d39", "DetectTime": "2023-10-30T14:01:01.849134+02:00", "EventTime": "2023-10-30T14:01:01.849153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CIBZt43Poio5GPppJc"]} -{"Format": "IDEA0", "ID": "39213abf-e366-4e10-879c-27dba85cc114", "DetectTime": "2023-10-30T14:01:01.891236+02:00", "EventTime": "2023-10-30T14:01:01.891258+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFy0IuYYiLqVTK0i5"]} -{"Format": "IDEA0", "ID": "da6060b5-ddf6-4516-b162-f2c777d60977", "DetectTime": "2023-10-30T14:01:01.905212+02:00", "EventTime": "2023-10-30T14:01:01.905231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIOUIt17iKRCqz0HIb"]} -{"Format": "IDEA0", "ID": "2454c524-4b54-4418-b4e8-6dbfb6eeb87b", "DetectTime": "2023-10-30T14:01:01.948496+02:00", "EventTime": "2023-10-30T14:01:01.948519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["C8W05mRdwETEb4jo9"]} -{"Format": "IDEA0", "ID": "5ce0b69f-992b-4c17-b58f-8b01211e7e6d", "DetectTime": "2023-10-30T14:01:01.992469+02:00", "EventTime": "2023-10-30T14:01:01.992494+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cxcy2n4cPRchK6wt86"]} -{"Format": "IDEA0", "ID": "c159c3e7-2e18-4401-9c3c-4ace94c05d7a", "DetectTime": "2023-10-30T14:01:02.006158+02:00", "EventTime": "2023-10-30T14:01:02.006176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CwRBkV2rlMjrdaUPZ9"]} -{"Format": "IDEA0", "ID": "6bbba67a-1488-416c-a1cb-89dde88c1ef4", "DetectTime": "2023-10-30T14:01:02.053202+02:00", "EventTime": "2023-10-30T14:01:02.053225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CkhYTC1SLgrc2K6grh"]} -{"Format": "IDEA0", "ID": "094befc5-5b80-4831-85f3-9123539156d9", "DetectTime": "2023-10-30T14:01:02.096602+02:00", "EventTime": "2023-10-30T14:01:02.096628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["C4kOnU2nmKiomweQF6"]} -{"Format": "IDEA0", "ID": "a1d408fb-1af1-4c8f-b9b7-e7f226932490", "DetectTime": "2023-10-30T14:01:02.139856+02:00", "EventTime": "2023-10-30T14:01:02.139877+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6syILvBZtKUHMSK1"]} -{"Format": "IDEA0", "ID": "01ca242e-e72e-4310-9f13-a4ec6581c9a5", "DetectTime": "2023-10-30T14:01:02.153513+02:00", "EventTime": "2023-10-30T14:01:02.153531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Ck4NKT1KX4lX7QvZ6d"]} -{"Format": "Json", "ID": "01ca242e-e72e-4310-9f13-a4ec6581c9a5", "DetectTime": "2023-10-30T14:01:02.153513+02:00", "EventTime": "2023-10-30T14:01:02.153531+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:15:52.575708+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:02.224545)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f67fb162-1c4b-4f8e-bca8-4db860f7f3a6", "DetectTime": "2023-10-30T14:01:02.229777+02:00", "EventTime": "2023-10-30T14:01:02.229789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CiZGVG1gXCfGzjuxFg"]} -{"Format": "IDEA0", "ID": "7466523d-37cb-4487-a465-c551e03e7480", "DetectTime": "2023-10-30T14:01:02.271391+02:00", "EventTime": "2023-10-30T14:01:02.271412+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUZIoX2IPIu8pIrB0d"]} -{"Format": "IDEA0", "ID": "3bf16e32-83be-49f2-be59-a6d9abe570c1", "DetectTime": "2023-10-30T14:01:02.285244+02:00", "EventTime": "2023-10-30T14:01:02.285265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CF5FOW3078a0R54Oih"]} -{"Format": "IDEA0", "ID": "5d766f80-a685-4013-bfa3-8285b70b3d32", "DetectTime": "2023-10-30T14:01:02.323354+02:00", "EventTime": "2023-10-30T14:01:02.323372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CFd8fG1gnQPzB1oRyb"]} -{"Format": "IDEA0", "ID": "9e46d31f-9ff8-4ee2-8043-8e1be42fa4ae", "DetectTime": "2023-10-30T14:01:02.362383+02:00", "EventTime": "2023-10-30T14:01:02.362403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CBx8zR3jdsuYjT453c"]} -{"Format": "IDEA0", "ID": "5798582a-f7d5-42ff-9571-4e74c9d01c0c", "DetectTime": "2023-10-30T14:01:02.405193+02:00", "EventTime": "2023-10-30T14:01:02.405210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CvXvzPVKq5uWETOQ8"]} -{"Format": "IDEA0", "ID": "a5320cc6-90b2-4db0-9f34-a2d7fca70aa6", "DetectTime": "2023-10-30T14:01:02.445710+02:00", "EventTime": "2023-10-30T14:01:02.445736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CNZOF12iV7R7o5H1T9"]} -{"Format": "IDEA0", "ID": "4c170340-d4f8-461a-b32d-4754c2bf23ea", "DetectTime": "2023-10-30T14:01:02.481323+02:00", "EventTime": "2023-10-30T14:01:02.481349+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiG9hdhngVD6Ygv6j"]} -{"Format": "IDEA0", "ID": "d8bc08cd-90c9-4c2e-8315-c357ddc202e6", "DetectTime": "2023-10-30T14:01:02.494722+02:00", "EventTime": "2023-10-30T14:01:02.494734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Cd320uOqSoXTY55A1"]} -{"Format": "IDEA0", "ID": "e4252b61-4d3f-4234-8940-6e8bf3bad2f9", "DetectTime": "2023-10-30T14:01:02.528348+02:00", "EventTime": "2023-10-30T14:01:02.528365+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUjk8J1eGaUX3bcv84"]} -{"Format": "IDEA0", "ID": "1f3755d4-9345-4033-9829-d7b2d3b4d8b8", "DetectTime": "2023-10-30T14:01:02.541335+02:00", "EventTime": "2023-10-30T14:01:02.541348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["C7SODS2acE0wdqsm06"]} -{"Format": "Json", "ID": "1f3755d4-9345-4033-9829-d7b2d3b4d8b8", "DetectTime": "2023-10-30T14:01:02.541335+02:00", "EventTime": "2023-10-30T14:01:02.541348+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:16:10.653062+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:02.603240)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "419e66e5-8d2e-40eb-8956-224524d7f71c", "DetectTime": "2023-10-30T14:01:02.608625+02:00", "EventTime": "2023-10-30T14:01:02.608640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CKa0u11sxS8vEEcKJ7"]} -{"Format": "IDEA0", "ID": "d5e4e244-dca7-4df3-9619-291334b6c5c8", "DetectTime": "2023-10-30T14:01:02.641900+02:00", "EventTime": "2023-10-30T14:01:02.641912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C6xCiNYyFZjDiDbU5"]} -{"Format": "IDEA0", "ID": "cf89bb71-ec5a-4066-a9a7-693d6f540a3e", "DetectTime": "2023-10-30T14:01:02.671559+02:00", "EventTime": "2023-10-30T14:01:02.671571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C0DMy633KuVVPWm4t8"]} -{"Format": "IDEA0", "ID": "93cef437-7527-49b2-adfa-548ec4f558c1", "DetectTime": "2023-10-30T14:01:02.701736+02:00", "EventTime": "2023-10-30T14:01:02.701752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CdFNoqM8wYxi160Eb"]} -{"Format": "IDEA0", "ID": "d2779b29-321f-4a8a-ab71-90d369f766cf", "DetectTime": "2023-10-30T14:01:02.728286+02:00", "EventTime": "2023-10-30T14:01:02.728306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CP1lOZ13wiYGPNaPp2"]} -{"Format": "IDEA0", "ID": "2b780f4e-fb4f-41e0-a531-9c6f4c513e1d", "DetectTime": "2023-10-30T14:01:02.760015+02:00", "EventTime": "2023-10-30T14:01:02.760031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["ChOnQ218rtiewrcuR3"]} -{"Format": "IDEA0", "ID": "635d2ba6-9d2f-4eab-8825-f7e832106120", "DetectTime": "2023-10-30T14:01:02.785313+02:00", "EventTime": "2023-10-30T14:01:02.785332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CGYalG1RRbBKGQedvf"]} -{"Format": "IDEA0", "ID": "07e8f365-9fbe-4e85-abf4-30f4d6229e19", "DetectTime": "2023-10-30T14:01:02.810756+02:00", "EventTime": "2023-10-30T14:01:02.810768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["Cw6iSz3aZ0NWMaGY3f"]} -{"Format": "Json", "ID": "07e8f365-9fbe-4e85-abf4-30f4d6229e19", "DetectTime": "2023-10-30T14:01:02.810756+02:00", "EventTime": "2023-10-30T14:01:02.810768+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:16:11.844110+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:02.864206)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f5b1bc25-76ab-468b-9653-ca47aeed9f5d", "DetectTime": "2023-10-30T14:01:02.869574+02:00", "EventTime": "2023-10-30T14:01:02.869591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C1vJNK2G0xjTicIJBi"]} -{"Format": "IDEA0", "ID": "d0549fba-ef0e-4ec2-aeff-6378ce0ab467", "DetectTime": "2023-10-30T14:01:02.900062+02:00", "EventTime": "2023-10-30T14:01:02.900085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["Cs6OqieSUqsYeVLXa"]} -{"Format": "IDEA0", "ID": "66585056-8c0e-4dd5-bf0f-79c2cc549732", "DetectTime": "2023-10-30T14:01:02.930834+02:00", "EventTime": "2023-10-30T14:01:02.930847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CkbgcXBKTGWbMJIa4"]} -{"Format": "IDEA0", "ID": "93510f32-8a8f-4015-8b12-a37aad4fef3e", "DetectTime": "2023-10-30T14:01:02.961262+02:00", "EventTime": "2023-10-30T14:01:02.961283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CUL4uR3JlKYPeAnAGb"]} -{"Format": "IDEA0", "ID": "044a3f33-1056-4e1e-b5f9-dae361a2c0fc", "DetectTime": "2023-10-30T14:01:02.989004+02:00", "EventTime": "2023-10-30T14:01:02.989023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CMV84d3GmnExULlxR"]} -{"Format": "IDEA0", "ID": "7b729bd1-70c9-4247-a5ce-d800945f93b7", "DetectTime": "2023-10-30T14:01:03.012407+02:00", "EventTime": "2023-10-30T14:01:03.012419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvXmNk4C9tF0pNhnQj"]} -{"Format": "IDEA0", "ID": "61188779-89ca-4af8-9dfa-ef37c3296ac2", "DetectTime": "2023-10-30T14:01:03.041195+02:00", "EventTime": "2023-10-30T14:01:03.041212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cw0K1q1VwskxvhZ6Ud"]} -{"Format": "IDEA0", "ID": "b33de50f-9fbf-4444-9baa-79d63ec891a5", "DetectTime": "2023-10-30T14:01:03.051943+02:00", "EventTime": "2023-10-30T14:01:03.051955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["C1zbyE3JfAM9bKJNU8"]} -{"Format": "IDEA0", "ID": "e11db9b5-139a-4a9d-a666-e7a1d3c8b1db", "DetectTime": "2023-10-30T14:01:03.083183+02:00", "EventTime": "2023-10-30T14:01:03.083199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CxqFiw2A4WwGpViIxc"]} -{"Format": "Json", "ID": "e11db9b5-139a-4a9d-a666-e7a1d3c8b1db", "DetectTime": "2023-10-30T14:01:03.083183+02:00", "EventTime": "2023-10-30T14:01:03.083199+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:46:54.238623+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:03.137663)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f13bbc83-1e98-4f8b-8025-7310d503b76e", "DetectTime": "2023-10-30T14:01:03.142953+02:00", "EventTime": "2023-10-30T14:01:03.142966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CHTICp1b7DOTih9FH2"]} -{"Format": "IDEA0", "ID": "a346543a-beac-4f62-884b-4e4b04c55708", "DetectTime": "2023-10-30T14:01:03.170826+02:00", "EventTime": "2023-10-30T14:01:03.170838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CAqX6v4CDUN0uUPnql"]} -{"Format": "IDEA0", "ID": "08a2fe1f-3160-4ef1-a271-1f7c6d80ab96", "DetectTime": "2023-10-30T14:01:03.197905+02:00", "EventTime": "2023-10-30T14:01:03.197928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["C8c6rQkIxULLgngna"]} -{"Format": "IDEA0", "ID": "e37390d5-d70b-472a-b76b-19493baf3557", "DetectTime": "2023-10-30T14:01:03.225457+02:00", "EventTime": "2023-10-30T14:01:03.225468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CF4JdY38aKL6VM6107"]} -{"Format": "IDEA0", "ID": "977d81e3-54f5-4427-9898-00d5ecc48a0c", "DetectTime": "2023-10-30T14:01:03.252676+02:00", "EventTime": "2023-10-30T14:01:03.252693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CtiWt43KwzmMv6zaBj"]} -{"Format": "IDEA0", "ID": "d162a835-21b3-4a5c-bc6f-ac3882c00bcd", "DetectTime": "2023-10-30T14:01:03.282529+02:00", "EventTime": "2023-10-30T14:01:03.282548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cwy4SB3dgLaIXdctTl", "Cxcy2n4cPRchK6wt86", "CUjk8J1eGaUX3bcv84", "CUZIoX2IPIu8pIrB0d"]} -{"Format": "IDEA0", "ID": "093c4cac-e185-45b8-b5cf-659e77ddae38", "DetectTime": "2023-10-30T14:01:03.295543+02:00", "EventTime": "2023-10-30T14:01:03.295557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CnVHGc3l4DHWopdEVd"]} -{"Format": "IDEA0", "ID": "80ebdf13-b1c1-4be1-a1b9-a3fd169a90ec", "DetectTime": "2023-10-30T14:01:03.326174+02:00", "EventTime": "2023-10-30T14:01:03.326203+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cwy4SB3dgLaIXdctTl"]} -{"Format": "IDEA0", "ID": "86d757d7-4218-4c16-b3a7-d9beb47e6038", "DetectTime": "2023-10-30T14:01:03.339269+02:00", "EventTime": "2023-10-30T14:01:03.339289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CPJ7Fo41EC78p6l9F7"]} -{"Format": "IDEA0", "ID": "d5285eef-57c9-453e-af61-20454d2dcb30", "DetectTime": "2023-10-30T14:01:03.362698+02:00", "EventTime": "2023-10-30T14:01:03.362712+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFukLj2xBoPkOJAMbe"]} -{"Format": "IDEA0", "ID": "3a369d16-dcca-4661-b834-73fb85c889ba", "DetectTime": "2023-10-30T14:01:03.374245+02:00", "EventTime": "2023-10-30T14:01:03.374257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["Cctgfy2rKBe2N75Q57"]} -{"Format": "IDEA0", "ID": "a8d72d2b-2a67-471e-b5da-6be1c35f5c8b", "DetectTime": "2023-10-30T14:01:03.396031+02:00", "EventTime": "2023-10-30T14:01:03.396048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["CaCtPG1d15x0FZPKe7"]} -{"Format": "Json", "ID": "a8d72d2b-2a67-471e-b5da-6be1c35f5c8b", "DetectTime": "2023-10-30T14:01:03.396031+02:00", "EventTime": "2023-10-30T14:01:03.396048+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:46:55.559129+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:03.456469)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "215c84b0-dae1-43e7-a8ca-106c15030537", "DetectTime": "2023-10-30T14:01:03.461028+02:00", "EventTime": "2023-10-30T14:01:03.461045+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKmLdk1Yt4nbv9JOFj"]} -{"Format": "IDEA0", "ID": "e1fe531d-007f-431f-8b93-075ffaee81cb", "DetectTime": "2023-10-30T14:01:03.472168+02:00", "EventTime": "2023-10-30T14:01:03.472182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CFaVB41If4jV5IshZ"]} -{"Format": "IDEA0", "ID": "1068b1bd-7fd9-466c-ae84-88b6b248f40f", "DetectTime": "2023-10-30T14:01:03.496978+02:00", "EventTime": "2023-10-30T14:01:03.496996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CxjIlU3AKQHVM5Sawf"]} -{"Format": "IDEA0", "ID": "b7a2b664-fddb-42dc-8895-72b201ddd62a", "DetectTime": "2023-10-30T14:01:03.518476+02:00", "EventTime": "2023-10-30T14:01:03.518489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjYNeqCdafymAC7fc"]} -{"Format": "IDEA0", "ID": "c7f5b78e-4b17-4189-8374-4f5068b98462", "DetectTime": "2023-10-30T14:01:03.528362+02:00", "EventTime": "2023-10-30T14:01:03.528381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CaQHWB4GqzTYmfXMPf"]} -{"Format": "IDEA0", "ID": "f42ad443-a36d-4f74-a4f4-415efe5a4681", "DetectTime": "2023-10-30T14:01:03.552603+02:00", "EventTime": "2023-10-30T14:01:03.552624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CAQ5TC2522IgInoHMd"]} -{"Format": "IDEA0", "ID": "8e216ce8-2633-4938-9efb-be2670994c2f", "DetectTime": "2023-10-30T14:01:03.577775+02:00", "EventTime": "2023-10-30T14:01:03.577799+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnPnNcbBfu1X7Ljnk"]} -{"Format": "IDEA0", "ID": "853dd750-8fce-4002-9fe0-12d3518845d4", "DetectTime": "2023-10-30T14:01:03.588887+02:00", "EventTime": "2023-10-30T14:01:03.588910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["C3Moar41sIFlyTMCRd"]} -{"Format": "IDEA0", "ID": "c5d8ca5b-cf15-4b39-8fc2-81c7b0ba07bb", "DetectTime": "2023-10-30T14:01:03.610717+02:00", "EventTime": "2023-10-30T14:01:03.610728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Ckas4S2icC5rWGnTXd"]} -{"Format": "IDEA0", "ID": "b23e4182-413a-49f4-9a26-a5d8d74d1248", "DetectTime": "2023-10-30T14:01:03.634136+02:00", "EventTime": "2023-10-30T14:01:03.634148+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZBfl43z1Cf7jCYVA6"]} -{"Format": "IDEA0", "ID": "a64d42cc-48b3-46af-b9d7-51a372a0a420", "DetectTime": "2023-10-30T14:01:03.642807+02:00", "EventTime": "2023-10-30T14:01:03.642819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["Cz75K92OAEOHWsPsF1"]} -{"Format": "IDEA0", "ID": "eb8aea39-253a-45a3-87a1-83c6ac0f8192", "DetectTime": "2023-10-30T14:01:03.665071+02:00", "EventTime": "2023-10-30T14:01:03.665092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["Cd9FYb3Fq1f0SrlsJ8"]} -{"Format": "Json", "ID": "eb8aea39-253a-45a3-87a1-83c6ac0f8192", "DetectTime": "2023-10-30T14:01:03.665071+02:00", "EventTime": "2023-10-30T14:01:03.665092+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:46:56.684209+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:03.717044)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0bca6889-5cd5-42b7-bfab-a3218dbc680a", "DetectTime": "2023-10-30T14:01:03.722088+02:00", "EventTime": "2023-10-30T14:01:03.722110+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHekC12biVqnsPQfT7"]} -{"Format": "IDEA0", "ID": "65ee6110-6973-444f-aa6c-f0bb2977e3c5", "DetectTime": "2023-10-30T14:01:03.735781+02:00", "EventTime": "2023-10-30T14:01:03.735798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CSewM87wXT4ugTuOj"]} -{"Format": "IDEA0", "ID": "494b0514-b364-4936-adf8-77f5575b2d75", "DetectTime": "2023-10-30T14:01:03.757990+02:00", "EventTime": "2023-10-30T14:01:03.758008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CzJW1e23Tolvhwh3Yl"]} -{"Format": "IDEA0", "ID": "319cf709-1ebc-40e3-bf68-4caa10d02b92", "DetectTime": "2023-10-30T14:01:03.778272+02:00", "EventTime": "2023-10-30T14:01:03.778284+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CllsL9hKNqRAEhcN9"]} -{"Format": "IDEA0", "ID": "36c69a03-c1f2-48a0-a5fd-4079abeb104b", "DetectTime": "2023-10-30T14:01:03.789143+02:00", "EventTime": "2023-10-30T14:01:03.789156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CKKfdThP95yNtk8w7"]} -{"Format": "IDEA0", "ID": "d33eefc2-b579-40e2-8706-5d5f30196b31", "DetectTime": "2023-10-30T14:01:03.810094+02:00", "EventTime": "2023-10-30T14:01:03.810114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CHRCBZ1UyF1OmeDje8"]} -{"Format": "IDEA0", "ID": "d4c3bfc6-84dd-4fb5-9946-c928ace501fb", "DetectTime": "2023-10-30T14:01:03.832765+02:00", "EventTime": "2023-10-30T14:01:03.832788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CFzFW538wQk4swpgm5", "CHekC12biVqnsPQfT7", "CnPnNcbBfu1X7Ljnk", "CKmLdk1Yt4nbv9JOFj"]} -{"Format": "IDEA0", "ID": "8a16656f-2220-4fe0-8bc3-90fdfd0c292f", "DetectTime": "2023-10-30T14:01:03.845951+02:00", "EventTime": "2023-10-30T14:01:03.845972+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFzFW538wQk4swpgm5"]} -{"Format": "IDEA0", "ID": "b92ffffe-874a-466b-a285-05c4caf9ed2a", "DetectTime": "2023-10-30T14:01:03.859713+02:00", "EventTime": "2023-10-30T14:01:03.859735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["Cd1WVn12xMy3EOfoTc"]} -{"Format": "IDEA0", "ID": "3b27546b-fa33-43f4-aec3-b59b721c28c3", "DetectTime": "2023-10-30T14:01:03.883836+02:00", "EventTime": "2023-10-30T14:01:03.883848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CUwO1HQ8rmu427FSb"]} -{"Format": "IDEA0", "ID": "990f8611-4a57-4f56-8dbe-4bc04d1b0c1a", "DetectTime": "2023-10-30T14:01:03.902109+02:00", "EventTime": "2023-10-30T14:01:03.902132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CHAqeMsDA0tpyqNz4"]} -{"Format": "IDEA0", "ID": "ff1d6da6-a99a-43d2-8332-06e677fcbd3a", "DetectTime": "2023-10-30T14:01:03.921678+02:00", "EventTime": "2023-10-30T14:01:03.921695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CVfEbxRz8GmOCek3"]} -{"Format": "Json", "ID": "ff1d6da6-a99a-43d2-8332-06e677fcbd3a", "DetectTime": "2023-10-30T14:01:03.921678+02:00", "EventTime": "2023-10-30T14:01:03.921695+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T16:46:58.006626+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2023/10/30 14:01:03.971568)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "475d4b50-a755-4899-8402-47aa156833e9", "DetectTime": "2023-10-30T14:01:03.976105+02:00", "EventTime": "2023-10-30T14:01:03.976116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CZutyj2HSbzs8IUmwi"]} -{"Format": "IDEA0", "ID": "da234328-561f-4cba-912c-b63ddfbe9066", "DetectTime": "2023-10-30T14:01:03.996959+02:00", "EventTime": "2023-10-30T14:01:03.996971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CsbZl62R9q92ZoeKJk"]} -{"Format": "IDEA0", "ID": "bb205833-7acc-4905-8fdc-ef3ed9297abe", "DetectTime": "2023-10-30T14:01:04.021549+02:00", "EventTime": "2023-10-30T14:01:04.021564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["C2AOrJ3Na993OAdXXf"]} -{"Format": "IDEA0", "ID": "e9a96896-2d6a-489b-9b82-7482cf7fbbc4", "DetectTime": "2023-10-30T14:01:04.040079+02:00", "EventTime": "2023-10-30T14:01:04.040097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CJz6xn4JJxfZcVpOyg"]} -{"Format": "IDEA0", "ID": "fd0bb54a-8a71-450c-a3bb-25ef9f2bd6e8", "DetectTime": "2023-10-30T14:01:04.072186+02:00", "EventTime": "2023-10-30T14:01:04.072203+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1YRmD3IJQdFdOvqvb"]} -{"Format": "IDEA0", "ID": "1cbc40a8-c993-49cc-8362-69f62a3a869a", "DetectTime": "2023-10-30T14:01:04.084404+02:00", "EventTime": "2023-10-30T14:01:04.084419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["Cp6paa1EgtHe6Yntgf"]} -{"Format": "IDEA0", "ID": "c0303dd3-f048-4a72-bf33-798d4f727ca3", "DetectTime": "2023-10-30T14:01:04.117046+02:00", "EventTime": "2023-10-30T14:01:04.117066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CdwUJx14JIxAHiCWTg"]} -{"Format": "IDEA0", "ID": "4d18a3bc-26aa-4cfc-a62b-36838920d4f2", "DetectTime": "2023-10-30T14:01:04.144676+02:00", "EventTime": "2023-10-30T14:01:04.144687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["CtCMxy1wNhYFqMJvm8"]} -{"Format": "IDEA0", "ID": "0e3d7665-36c0-427f-bc78-aea3e8e634ff", "DetectTime": "2023-10-30T14:01:04.170449+02:00", "EventTime": "2023-10-30T14:01:04.170474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C35vlu4eJIZQNVOjk8"]} -{"Format": "IDEA0", "ID": "be3d1ed4-14c3-4a39-a96b-9a243a5b4bbe", "DetectTime": "2023-10-30T14:01:04.205288+02:00", "EventTime": "2023-10-30T14:01:04.205307+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CApw7g9SDvJaNJooh"]} -{"Format": "IDEA0", "ID": "b68937a9-313d-48e8-906f-59e05601a05b", "DetectTime": "2023-10-30T14:01:04.217604+02:00", "EventTime": "2023-10-30T14:01:04.217620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["Cfqt2QnnR3VegS2pe"]} -{"Format": "IDEA0", "ID": "9104a18c-50fd-48d5-b255-2ef1a551a78e", "DetectTime": "2023-10-30T14:01:04.245581+02:00", "EventTime": "2023-10-30T14:01:04.245593+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6erQ31v2hVbuDJlId"]} -{"Format": "IDEA0", "ID": "ce428fca-bbed-49c1-8a81-98c987670613", "DetectTime": "2023-10-30T14:01:04.257886+02:00", "EventTime": "2023-10-30T14:01:04.257903+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C643xy1nAcVpHnpODh"]} -{"Format": "IDEA0", "ID": "a8f1772f-717d-406c-9d5b-26ead0d61ae2", "DetectTime": "2023-10-30T14:01:04.270827+02:00", "EventTime": "2023-10-30T14:01:04.270844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CYgaoKLWtXbhsVUvl"]} -{"Format": "IDEA0", "ID": "876fe171-b474-41d6-b84b-9dd25168cc6c", "DetectTime": "2023-10-30T14:01:04.300125+02:00", "EventTime": "2023-10-30T14:01:04.300151+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1uRBx3oehhuNQoBo4"]} -{"Format": "IDEA0", "ID": "0f7820ce-3bba-4327-9bdd-fdea6de6e59b", "DetectTime": "2023-10-30T14:01:04.313841+02:00", "EventTime": "2023-10-30T14:01:04.313865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["ClM6Zk2zU6cQ6yQ4Q2"]} -{"Format": "IDEA0", "ID": "19aed74d-22d0-4708-a9a1-55d73ce50c29", "DetectTime": "2023-10-30T14:01:04.343332+02:00", "EventTime": "2023-10-30T14:01:04.343352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.197.81.95 ", "ContentType": "text/plain"}], "uids": ["CEqD9C3yXB274q95Zk"]} -{"Format": "IDEA0", "ID": "77a0b5af-04f3-4835-b917-5894c30dcaaa", "DetectTime": "2023-10-30T14:01:04.377707+02:00", "EventTime": "2023-10-30T14:01:04.377731+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjqtA5FvzvTa1IZc7"]} -{"Format": "IDEA0", "ID": "128c2d9f-4c40-4566-8f4a-3a5d2f98256d", "DetectTime": "2023-10-30T14:01:04.390483+02:00", "EventTime": "2023-10-30T14:01:04.390505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CsUhYk4SADh7J9q6hg"]} -{"Format": "IDEA0", "ID": "a06c463f-a021-47b6-a642-eb1fe5044810", "DetectTime": "2023-10-30T14:01:04.421169+02:00", "EventTime": "2023-10-30T14:01:04.421190+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Clmh9f23H4KK8l0tpi"]} -{"Format": "IDEA0", "ID": "fdc73a33-0a40-48c4-b504-86f86e2f9e46", "DetectTime": "2023-10-30T14:01:04.434585+02:00", "EventTime": "2023-10-30T14:01:04.434607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C643xy1nAcVpHnpODh", "CjqtA5FvzvTa1IZc7", "CApw7g9SDvJaNJooh", "CALB3d2soP0FkzDj61"]} -{"Format": "IDEA0", "ID": "bc13ef01-b87c-495d-acc6-911544ab850c", "DetectTime": "2023-10-30T14:01:04.446999+02:00", "EventTime": "2023-10-30T14:01:04.447020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CkmyHXqWKdC9gIo8i"]} -{"Format": "IDEA0", "ID": "fb836d0e-5415-4658-bad7-c99b78119aee", "DetectTime": "2023-10-30T14:01:04.476724+02:00", "EventTime": "2023-10-30T14:01:04.476743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["ClobDf2bHlN4o3SBLj"]} -{"Format": "IDEA0", "ID": "137259dd-c997-4d67-a973-758984fbc614", "DetectTime": "2023-10-30T14:01:04.506442+02:00", "EventTime": "2023-10-30T14:01:04.506458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvvqAD4ytNGCAUbIvh"]} -{"Format": "IDEA0", "ID": "f1f24d0b-9d53-469e-bfd7-a394f0ca2b3d", "DetectTime": "2023-10-30T14:01:04.540702+02:00", "EventTime": "2023-10-30T14:01:04.540719+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CALB3d2soP0FkzDj61"]} -{"Format": "IDEA0", "ID": "3bb335fb-4fb6-43dc-8c87-ee8596f461bf", "DetectTime": "2023-10-30T14:01:04.551450+02:00", "EventTime": "2023-10-30T14:01:04.551468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CcRZ913d0L0NUgYxJl"]} -{"Format": "IDEA0", "ID": "90c3760a-3cfc-44ce-b312-813c1a02594a", "DetectTime": "2023-10-30T14:01:04.578429+02:00", "EventTime": "2023-10-30T14:01:04.578445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CNnv7A4rIgKSPnCb3a"]} -{"Format": "IDEA0", "ID": "a30d056f-00c6-43e7-928b-690d0bcfdf66", "DetectTime": "2023-10-30T14:01:04.605454+02:00", "EventTime": "2023-10-30T14:01:04.605473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["Cp0s9L1tjKexSRHvBf"]} -{"Format": "IDEA0", "ID": "f28b278a-ce2b-4367-bed2-50c06593f6d1", "DetectTime": "2023-10-30T14:01:04.636732+02:00", "EventTime": "2023-10-30T14:01:04.636755+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIo81K3MOJdTmeeseh"]} -{"Format": "IDEA0", "ID": "9cccbd26-2bc0-4715-ba63-c4a946479dae", "DetectTime": "2023-10-30T14:01:04.649621+02:00", "EventTime": "2023-10-30T14:01:04.649642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CDI1l52VCGxnsMG2Ca"]} -{"Format": "IDEA0", "ID": "572bc90a-41e2-4dea-9766-994f1e21769f", "DetectTime": "2023-10-30T14:01:04.684617+02:00", "EventTime": "2023-10-30T14:01:04.684635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.205.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.205.60 ", "ContentType": "text/plain"}], "uids": ["C4rsLY1m9IuJO8aFs3"]} -{"Format": "IDEA0", "ID": "d2c8e968-01e6-4806-95e0-3f1310af6800", "DetectTime": "2023-10-30T14:01:04.713595+02:00", "EventTime": "2023-10-30T14:01:04.713609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["Cn14S44XXMgh2ZcQs1"]} -{"Format": "IDEA0", "ID": "9248869d-4219-408f-92c4-ef524c7a9f89", "DetectTime": "2023-10-30T14:01:04.739540+02:00", "EventTime": "2023-10-30T14:01:04.739551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkSvEezKzeljYjCia"]} -{"Format": "IDEA0", "ID": "439cb305-c74d-4876-a3ed-1d0d9cbdb86a", "DetectTime": "2023-10-30T14:01:04.765332+02:00", "EventTime": "2023-10-30T14:01:04.765350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["C6QvxKSrWUwkzESJ6"]} -{"Format": "IDEA0", "ID": "55b7faba-10ae-4cca-87b0-7275977e532b", "DetectTime": "2023-10-30T14:01:04.794614+02:00", "EventTime": "2023-10-30T14:01:04.794629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CmR64d36McTkLaspmb"]} -{"Format": "IDEA0", "ID": "30cdb478-2887-4e6d-abba-79789d030670", "DetectTime": "2023-10-30T14:01:04.828755+02:00", "EventTime": "2023-10-30T14:01:04.828771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CVKuSlNuf6C6SkBPd"]} -{"Format": "IDEA0", "ID": "1ef497bb-f156-4202-8be6-ba79945fa0fe", "DetectTime": "2023-10-30T14:01:04.859106+02:00", "EventTime": "2023-10-30T14:01:04.859124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CXCyCzni0lu81wTJ4"]} -{"Format": "IDEA0", "ID": "04060fc5-e3f6-4595-8b1f-bec4c6409976", "DetectTime": "2023-10-30T14:01:04.887446+02:00", "EventTime": "2023-10-30T14:01:04.887457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CbSIuq3YKwZg16QsN6"]} -{"Format": "IDEA0", "ID": "74b0ed9a-a42f-4509-9897-7ca6bbced3c6", "DetectTime": "2023-10-30T14:01:04.919522+02:00", "EventTime": "2023-10-30T14:01:04.919535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CaoV213TCCkKo0oJd5"]} -{"Format": "IDEA0", "ID": "9a272d91-316e-4d18-84b3-e7f6feec9e2d", "DetectTime": "2023-10-30T14:01:04.951107+02:00", "EventTime": "2023-10-30T14:01:04.951123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CnkuMk4mRcXyAhI9Kj"]} -{"Format": "IDEA0", "ID": "6d75858d-5020-494d-b27e-d159b7a3ff05", "DetectTime": "2023-10-30T14:01:04.981338+02:00", "EventTime": "2023-10-30T14:01:04.981353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C83aBd4WPWePLcUUy4"]} -{"Format": "IDEA0", "ID": "67f683af-00ca-43c6-83f7-4f1675c47738", "DetectTime": "2023-10-30T14:01:05.009696+02:00", "EventTime": "2023-10-30T14:01:05.009717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["ChOrEm18UCptRmH1c"]} -{"Format": "IDEA0", "ID": "d7f0fca4-b297-4f58-8531-f73ad6bce4fa", "DetectTime": "2023-10-30T14:01:05.041290+02:00", "EventTime": "2023-10-30T14:01:05.041310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CKkjUo3yOs2HHX87mb"]} -{"Format": "IDEA0", "ID": "bc6b08a2-19e0-435a-aaab-ee77755e4ad4", "DetectTime": "2023-10-30T14:01:05.071764+02:00", "EventTime": "2023-10-30T14:01:05.071784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["C70oIx1NYISuBhDgKc"]} -{"Format": "IDEA0", "ID": "c68d61a0-bb52-484c-b3a7-6d7f37872624", "DetectTime": "2023-10-30T14:01:05.102318+02:00", "EventTime": "2023-10-30T14:01:05.102334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["Cpo5w03YIm5rJntxz5"]} -{"Format": "IDEA0", "ID": "580d08e9-a774-4a6d-8226-cb388f548044", "DetectTime": "2023-10-30T14:01:05.127999+02:00", "EventTime": "2023-10-30T14:01:05.128017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.7.167 ", "ContentType": "text/plain"}], "uids": ["CT1QiW1Dscwlw2Nol9"]} -{"Format": "IDEA0", "ID": "79246f78-5cb7-493b-8eb3-8bdd5b8340ff", "DetectTime": "2023-10-30T14:01:05.155344+02:00", "EventTime": "2023-10-30T14:01:05.155358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["C8nI284iwVlTu2Z3Tj"]} -{"Format": "IDEA0", "ID": "970bc4df-23bc-4b50-a4e2-a95147dbe3da", "DetectTime": "2023-10-30T14:01:05.189253+02:00", "EventTime": "2023-10-30T14:01:05.189268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["Crhq5Y2G9m2eC1mff4"]} -{"Format": "IDEA0", "ID": "7f7f8afa-5f6a-4adc-8f4d-db020756ac5b", "DetectTime": "2023-10-30T14:01:05.217778+02:00", "EventTime": "2023-10-30T14:01:05.217793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CMmx2L3s4cRNu0yo0a"]} -{"Format": "IDEA0", "ID": "db6a72f3-a859-466e-941c-06170a607795", "DetectTime": "2023-10-30T14:01:05.241476+02:00", "EventTime": "2023-10-30T14:01:05.241495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["C210ksSsobwqB9Pl1"]} -{"Format": "IDEA0", "ID": "d118dbb0-643c-488f-82e2-1aace70c9952", "DetectTime": "2023-10-30T14:01:05.272855+02:00", "EventTime": "2023-10-30T14:01:05.272873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CheSvP3ltKlkhUCk74"]} -{"Format": "IDEA0", "ID": "a9b79ab0-7ed3-498d-8536-7e03bb53cd4e", "DetectTime": "2023-10-30T14:01:05.300464+02:00", "EventTime": "2023-10-30T14:01:05.300476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["CIdl7x4WPi5jrdjz4d"]} -{"Format": "IDEA0", "ID": "05cb22e7-744c-4aa3-b3be-0b10d9f69a18", "DetectTime": "2023-10-30T14:01:05.327409+02:00", "EventTime": "2023-10-30T14:01:05.327425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CurZKN3gr66v7H0A"]} -{"Format": "IDEA0", "ID": "46e8c7ab-3ea4-4923-8ad6-1af877f41ac1", "DetectTime": "2023-10-30T14:01:05.356430+02:00", "EventTime": "2023-10-30T14:01:05.356442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cwql3yg633TAPFQqj"]} -{"Format": "IDEA0", "ID": "7da69ceb-d390-4022-8757-3164761e44d8", "DetectTime": "2023-10-30T14:01:05.386365+02:00", "EventTime": "2023-10-30T14:01:05.386383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CBrAe237wcsKjZEYqa"]} -{"Format": "IDEA0", "ID": "fd68662b-47f7-491a-bb1e-c6e1617cfde9", "DetectTime": "2023-10-30T14:01:05.412767+02:00", "EventTime": "2023-10-30T14:01:05.412784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["Cq557o48aYenFSH0ck"]} -{"Format": "IDEA0", "ID": "de5e2ab8-2512-4bad-b03a-806680404776", "DetectTime": "2023-10-30T14:01:05.440812+02:00", "EventTime": "2023-10-30T14:01:05.440829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CTg93g2BVvin7lw97d"]} -{"Format": "IDEA0", "ID": "b999dd56-1b70-451f-89be-a46063505a1a", "DetectTime": "2023-10-30T14:01:05.476883+02:00", "EventTime": "2023-10-30T14:01:05.476904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Cxjg3B1DHgDcv2Pl92"]} -{"Format": "IDEA0", "ID": "f1d19c84-bb88-4560-9979-b7c0aa38e83f", "DetectTime": "2023-10-30T14:01:05.507018+02:00", "EventTime": "2023-10-30T14:01:05.507040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["Cx6zZB2yXLDVub7syh"]} -{"Format": "IDEA0", "ID": "e2922e53-4dd1-426a-acc1-fc951a6758ed", "DetectTime": "2023-10-30T14:01:05.535835+02:00", "EventTime": "2023-10-30T14:01:05.535852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CctXjn2nO3ZbHYT74e"]} -{"Format": "IDEA0", "ID": "6e4edaa4-c8a6-45bc-b6d1-8fe49a839efc", "DetectTime": "2023-10-30T14:01:05.565028+02:00", "EventTime": "2023-10-30T14:01:05.565044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CkpW6C2fcRtLK62Vc3"]} -{"Format": "IDEA0", "ID": "5ac5165a-fcf1-41af-8fe1-100a271141e6", "DetectTime": "2023-10-30T14:01:05.596830+02:00", "EventTime": "2023-10-30T14:01:05.596856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C4IvqoEl43HlQnPx8"]} -{"Format": "IDEA0", "ID": "2a08badb-a679-40da-932a-dd55f6d68839", "DetectTime": "2023-10-30T14:01:05.621962+02:00", "EventTime": "2023-10-30T14:01:05.621974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CDf2MC2bP0zNK4loqb"]} -{"Format": "IDEA0", "ID": "7a92aefd-22da-41fc-9243-47a03eb06f0b", "DetectTime": "2023-10-30T14:01:05.645613+02:00", "EventTime": "2023-10-30T14:01:05.645625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CMGzCL1qaNtFqdInli"]} -{"Format": "IDEA0", "ID": "e904d1a6-7228-4ed7-8335-d38b850f66e3", "DetectTime": "2023-10-30T14:01:05.672626+02:00", "EventTime": "2023-10-30T14:01:05.672701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CGkXUv4VgDmzKohRUb"]} -{"Format": "IDEA0", "ID": "eb44ff1f-261a-4f83-8176-41c229836525", "DetectTime": "2023-10-30T14:01:05.703329+02:00", "EventTime": "2023-10-30T14:01:05.703344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CXplFm2A3dVEYDiAyb"]} -{"Format": "Json", "ID": "eb44ff1f-261a-4f83-8176-41c229836525", "DetectTime": "2023-10-30T14:01:05.703329+02:00", "EventTime": "2023-10-30T14:01:05.703344+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T17:17:19.443317+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2023/10/30 14:01:05.776380)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b7b0be01-231e-43a6-b3d4-2b44db66bb6c", "DetectTime": "2023-10-30T14:01:05.781812+02:00", "EventTime": "2023-10-30T14:01:05.781830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CQTrLj1oFnxZ6CTYA2"]} -{"Format": "IDEA0", "ID": "717d6290-a45c-4b32-99c7-39b363f40c09", "DetectTime": "2023-10-30T14:01:05.815138+02:00", "EventTime": "2023-10-30T14:01:05.815158+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cosig33aWzKGjwehl8"]} -{"Format": "IDEA0", "ID": "ce97e9dc-d609-43ac-b321-7dafdeca2b32", "DetectTime": "2023-10-30T14:01:05.830966+02:00", "EventTime": "2023-10-30T14:01:05.830987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CCK9c93U3DjJtrpzog"]} -{"Format": "IDEA0", "ID": "f6cb5251-b68b-4a2e-a77d-aacc484c580f", "DetectTime": "2023-10-30T14:01:05.859099+02:00", "EventTime": "2023-10-30T14:01:05.859121+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVZohl2A0hvBWcCnI7"]} -{"Format": "IDEA0", "ID": "dcbac875-9c57-4315-b204-083a6a1dded7", "DetectTime": "2023-10-30T14:01:05.873462+02:00", "EventTime": "2023-10-30T14:01:05.873487+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClPHDR2bb0Bxbzcsc5"]} -{"Format": "IDEA0", "ID": "8902d7b2-4a71-4fdc-9320-83df64240b06", "DetectTime": "2023-10-30T14:01:05.886980+02:00", "EventTime": "2023-10-30T14:01:05.886999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CEApiM21sNmfzVQ5Sd"]} -{"Format": "IDEA0", "ID": "7bfdda96-3844-4ed3-81c7-f39bda31b221", "DetectTime": "2023-10-30T14:01:05.912445+02:00", "EventTime": "2023-10-30T14:01:05.912457+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cyq8fH3eRpftLfc8Cf"]} -{"Format": "IDEA0", "ID": "ea4c5a35-1dd6-4d09-bf96-84ca4196405f", "DetectTime": "2023-10-30T14:01:05.926550+02:00", "EventTime": "2023-10-30T14:01:05.926561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["CI3KwUiCQrpbRBd74"]} -{"Format": "IDEA0", "ID": "e47c7219-33fb-4ca3-8bbe-1a1fc84324c5", "DetectTime": "2023-10-30T14:01:05.951245+02:00", "EventTime": "2023-10-30T14:01:05.951266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["Cvnbhx3Zl1Mh23HOQl"]} -{"Format": "IDEA0", "ID": "8dbd7266-7587-4e2d-b9c6-cb18f7aa1c16", "DetectTime": "2023-10-30T14:01:05.980433+02:00", "EventTime": "2023-10-30T14:01:05.980449+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzxpcK3Q7bLCuI5hTj"]} -{"Format": "IDEA0", "ID": "d7c426d4-54b9-44ec-9064-f8403e683dc7", "DetectTime": "2023-10-30T14:01:05.997642+02:00", "EventTime": "2023-10-30T14:01:05.997660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["CSyA7W3RW7Z9wT0t9i"]} -{"Format": "IDEA0", "ID": "cf219c27-d17b-49d9-a037-4fd0e6ea8595", "DetectTime": "2023-10-30T14:01:06.025031+02:00", "EventTime": "2023-10-30T14:01:06.025047+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1xPRehtXkf5Reuoe"]} -{"Format": "IDEA0", "ID": "1f079b83-e434-464f-a5bc-0347a54eafa0", "DetectTime": "2023-10-30T14:01:06.042737+02:00", "EventTime": "2023-10-30T14:01:06.042759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["ClPHDR2bb0Bxbzcsc5", "Copb4T3QGnKuQm3YTj", "Cosig33aWzKGjwehl8", "CzxpcK3Q7bLCuI5hTj"]} -{"Format": "IDEA0", "ID": "5df2f463-01d6-466c-88e6-1219ff0ae381", "DetectTime": "2023-10-30T14:01:06.058708+02:00", "EventTime": "2023-10-30T14:01:06.058725+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Copb4T3QGnKuQm3YTj"]} -{"Format": "IDEA0", "ID": "83a64aeb-fa86-445a-8583-086ac8570192", "DetectTime": "2023-10-30T14:01:06.075016+02:00", "EventTime": "2023-10-30T14:01:06.075034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CpojY9OzbNOj59PK"]} -{"Format": "IDEA0", "ID": "f70b4320-9a03-43b1-8faa-33d270fe7e4c", "DetectTime": "2023-10-30T14:01:06.103376+02:00", "EventTime": "2023-10-30T14:01:06.103393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CCmJxN25ckqfhSsIWe"]} -{"Format": "IDEA0", "ID": "ed6d3df0-9e47-4a77-807d-2410d00990a5", "DetectTime": "2023-10-30T14:01:06.128776+02:00", "EventTime": "2023-10-30T14:01:06.128798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CmFDasA8dMYMbYi17"]} -{"Format": "IDEA0", "ID": "badf484c-b613-4b42-a625-40da2a7f28b9", "DetectTime": "2023-10-30T14:01:06.156532+02:00", "EventTime": "2023-10-30T14:01:06.156552+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoF0ap2BdA3Psy7j62"]} -{"Format": "IDEA0", "ID": "dded9751-483e-4819-8da0-11b5ca24d6c5", "DetectTime": "2023-10-30T14:01:06.172383+02:00", "EventTime": "2023-10-30T14:01:06.172408+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPBcdu2uJjkyIiESYb"]} -{"Format": "IDEA0", "ID": "c2cefc1c-129c-4d44-8a10-8de05733e973", "DetectTime": "2023-10-30T14:01:06.187625+02:00", "EventTime": "2023-10-30T14:01:06.187643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CAr7DmdyVPo7N5dZg"]} -{"Format": "IDEA0", "ID": "8d6d12df-339a-4db2-a966-acbd9a20b18d", "DetectTime": "2023-10-30T14:01:06.216118+02:00", "EventTime": "2023-10-30T14:01:06.216143+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cg2p4n4KKQqvWqrJue"]} -{"Format": "IDEA0", "ID": "166a9103-46e8-4915-90fc-d06b3c2a9d16", "DetectTime": "2023-10-30T14:01:06.232043+02:00", "EventTime": "2023-10-30T14:01:06.232060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Ci8QCK2FR6cLfK4Hsi"]} -{"Format": "IDEA0", "ID": "69b37e75-6ab6-424a-8791-d9e292e94e44", "DetectTime": "2023-10-30T14:01:06.264485+02:00", "EventTime": "2023-10-30T14:01:06.264509+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLQvczhE3tFgRkBp"]} -{"Format": "IDEA0", "ID": "69068c5e-e5f3-4ec5-8a66-8a9e7f20ccef", "DetectTime": "2023-10-30T14:01:06.278905+02:00", "EventTime": "2023-10-30T14:01:06.278923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CXCFjs4uRLxspbJCGd"]} -{"Format": "IDEA0", "ID": "ac212550-3175-48f7-8d96-d271eaab9c47", "DetectTime": "2023-10-30T14:01:06.312542+02:00", "EventTime": "2023-10-30T14:01:06.312554+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9FBZmHy8qaZ3LNga"]} -{"Format": "IDEA0", "ID": "c0281f20-d517-4e14-8c1c-16df78445e30", "DetectTime": "2023-10-30T14:01:06.328399+02:00", "EventTime": "2023-10-30T14:01:06.328416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.197.81.95 ", "ContentType": "text/plain"}], "uids": ["Ca8K084fkudaccl2Je"]} -{"Format": "IDEA0", "ID": "df9ef0a7-fd00-45e8-b8b2-585fa72d9f84", "DetectTime": "2023-10-30T14:01:06.354385+02:00", "EventTime": "2023-10-30T14:01:06.354403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CUAq1W1F8lgiVbbv69"]} -{"Format": "IDEA0", "ID": "19690d70-2bb9-4d72-8e44-677bbd8db473", "DetectTime": "2023-10-30T14:01:06.379078+02:00", "EventTime": "2023-10-30T14:01:06.379103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C1VNgB2NDnaM36kZ0a"]} -{"Format": "IDEA0", "ID": "a4185ba5-efeb-4981-ba1c-70d797c98419", "DetectTime": "2023-10-30T14:01:06.407691+02:00", "EventTime": "2023-10-30T14:01:06.407707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["Cwnqhf1z2JahZIONKg"]} -{"Format": "IDEA0", "ID": "48d7f593-5005-409c-aec2-4a6c6039138b", "DetectTime": "2023-10-30T14:01:06.436522+02:00", "EventTime": "2023-10-30T14:01:06.436545+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1LKT21D8TyScKIJl4"]} -{"Format": "IDEA0", "ID": "ee567c7e-4dc1-4042-9856-2f0140d87f0f", "DetectTime": "2023-10-30T14:01:06.452369+02:00", "EventTime": "2023-10-30T14:01:06.452385+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6Qq8a4zU2yn4G2Hp5"]} -{"Format": "IDEA0", "ID": "281d2f69-70dc-428a-bedd-7d02e5f3d843", "DetectTime": "2023-10-30T14:01:06.464936+02:00", "EventTime": "2023-10-30T14:01:06.464949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C1LKT21D8TyScKIJl4", "CLQvczhE3tFgRkBp", "CPBcdu2uJjkyIiESYb", "COJTbLdeCGdHV0Tzb"]} -{"Format": "IDEA0", "ID": "51b42bbc-21d4-4212-8c35-1dfe33256d3e", "DetectTime": "2023-10-30T14:01:06.478556+02:00", "EventTime": "2023-10-30T14:01:06.478574+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["COJTbLdeCGdHV0Tzb"]} -{"Format": "IDEA0", "ID": "e88134b2-0e74-4d16-9322-fa243d64a138", "DetectTime": "2023-10-30T14:01:06.493430+02:00", "EventTime": "2023-10-30T14:01:06.493449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["C7tfhj3ZLCQnnjV6j"]} -{"Format": "IDEA0", "ID": "328f6aba-fa4d-4295-a351-c1d9449b75ee", "DetectTime": "2023-10-30T14:01:06.519996+02:00", "EventTime": "2023-10-30T14:01:06.520014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CviSM12Ca4FhEgzXTi"]} -{"Format": "IDEA0", "ID": "842f28b7-66f2-4534-a581-638c4302ae34", "DetectTime": "2023-10-30T14:01:06.534524+02:00", "EventTime": "2023-10-30T14:01:06.534542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CeVRLpINtD25qFg76"]} -{"Format": "IDEA0", "ID": "65d09210-8810-4217-a1f3-380948b27b88", "DetectTime": "2023-10-30T14:01:06.559552+02:00", "EventTime": "2023-10-30T14:01:06.559565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["CQ7bMf1XRlSfN9VNBc"]} -{"Format": "IDEA0", "ID": "8d36b4f5-6fd8-4b0e-991b-135fd237c4c0", "DetectTime": "2023-10-30T14:01:06.585534+02:00", "EventTime": "2023-10-30T14:01:06.585551+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3Yq571zdZAJZ3QI41"]} -{"Format": "IDEA0", "ID": "ca27cb58-80ec-4b8c-876f-ffe9154fcbb7", "DetectTime": "2023-10-30T14:01:06.601078+02:00", "EventTime": "2023-10-30T14:01:06.601098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CcD5aeYjWvuJquO3i"]} -{"Format": "IDEA0", "ID": "dc6a90a9-db17-4d3f-a803-200c469ba142", "DetectTime": "2023-10-30T14:01:06.627002+02:00", "EventTime": "2023-10-30T14:01:06.627021+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpJJ8M2HtlmP12iKje"]} -{"Format": "IDEA0", "ID": "87e01846-a579-4865-ab1b-d5775ca68da7", "DetectTime": "2023-10-30T14:01:06.641077+02:00", "EventTime": "2023-10-30T14:01:06.641098+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfmA2y2w3A8t3arr31"]} -{"Format": "IDEA0", "ID": "dd8113a3-6489-44f5-ab8d-52f43e36cf61", "DetectTime": "2023-10-30T14:01:06.657716+02:00", "EventTime": "2023-10-30T14:01:06.657743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["Cp1nv91C95IsOhwTs2"]} -{"Format": "IDEA0", "ID": "8a5321c8-3828-4ecb-b200-9be10dd01f8c", "DetectTime": "2023-10-30T14:01:06.680189+02:00", "EventTime": "2023-10-30T14:01:06.680208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C90HhE1RNA1haB4EFb"]} -{"Format": "IDEA0", "ID": "9cc62471-6186-4b75-bf2c-dad5e3d4eb07", "DetectTime": "2023-10-30T14:01:06.707660+02:00", "EventTime": "2023-10-30T14:01:06.707679+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1IGzu2b71RjgAlAh7"]} -{"Format": "IDEA0", "ID": "e8e7f028-2f0b-41cf-a6a9-715a174305e7", "DetectTime": "2023-10-30T14:01:06.723274+02:00", "EventTime": "2023-10-30T14:01:06.723290+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.250.117.232"], "Hostname": ["c-98-250-117-232.hsd1.mi.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 98.250.117.232 from 10.0.2.19. blacklisted IP AS: COMCAST-7922, US AS7922 rDNS: c-98-250-117-232.hsd1.mi.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChzQ2DmM1yofQTPa4"]} -{"Format": "IDEA0", "ID": "1a129546-1fe0-48f5-9445-57fad14100c1", "DetectTime": "2023-10-30T14:01:06.765665+02:00", "EventTime": "2023-10-30T14:01:06.765681+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8AW8nRqT0eWOmt53"]} -{"Format": "IDEA0", "ID": "1cf8f49c-561d-49dc-a7e0-4826e3ce4dbd", "DetectTime": "2023-10-30T14:01:06.780043+02:00", "EventTime": "2023-10-30T14:01:06.780058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CmmYoL2Qs46OF3mul9"]} -{"Format": "IDEA0", "ID": "71e4e566-36cf-4baa-82d4-085e62c32dff", "DetectTime": "2023-10-30T14:01:06.807909+02:00", "EventTime": "2023-10-30T14:01:06.807926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["Cv0pzS35PfGXQ8KRKa"]} -{"Format": "IDEA0", "ID": "424e879d-88bb-4d51-980a-e3d38509f436", "DetectTime": "2023-10-30T14:01:06.840509+02:00", "EventTime": "2023-10-30T14:01:06.840531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CuF9rG2xyWBZHUex24"]} -{"Format": "IDEA0", "ID": "a0d0ce80-9cb9-48f7-8318-b209749ebd64", "DetectTime": "2023-10-30T14:01:06.864246+02:00", "EventTime": "2023-10-30T14:01:06.864263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CrxLOW3TD4FEOOORv5"]} -{"Format": "IDEA0", "ID": "23ebe55a-c91f-4a11-8ea0-2edbbe9f52bd", "DetectTime": "2023-10-30T14:01:06.898056+02:00", "EventTime": "2023-10-30T14:01:06.898074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Csd52b2D4bzMZvPOJj"]} -{"Format": "IDEA0", "ID": "749db542-50ee-4a2a-850d-154f4a11b155", "DetectTime": "2023-10-30T14:01:06.925541+02:00", "EventTime": "2023-10-30T14:01:06.925553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CnthKw2RFsm8zh3KMg"]} -{"Format": "IDEA0", "ID": "05c05417-71e6-4906-a4eb-8e77f5a5e558", "DetectTime": "2023-10-30T14:01:06.953376+02:00", "EventTime": "2023-10-30T14:01:06.953392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.7.167 ", "ContentType": "text/plain"}], "uids": ["ClRCem3GoQ460kYCI3"]} -{"Format": "IDEA0", "ID": "b8cea6f4-ffbf-4529-b374-e74d438c676f", "DetectTime": "2023-10-30T14:01:06.980620+02:00", "EventTime": "2023-10-30T14:01:06.980635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CSEU0c3IeN60bsqOW7"]} -{"Format": "IDEA0", "ID": "b6d33b39-5279-4b92-a978-60773b68b2ac", "DetectTime": "2023-10-30T14:01:07.002041+02:00", "EventTime": "2023-10-30T14:01:07.002056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["C0FzBb3ukwuQWYVGxf"]} -{"Format": "IDEA0", "ID": "bcf22682-85c7-49d4-b6df-9af0e9ed2365", "DetectTime": "2023-10-30T14:01:07.024796+02:00", "EventTime": "2023-10-30T14:01:07.024808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CsHpGrDVANEmxspd1"]} -{"Format": "IDEA0", "ID": "42047e34-d71c-44b1-835b-21e09c66c0ab", "DetectTime": "2023-10-30T14:01:07.047812+02:00", "EventTime": "2023-10-30T14:01:07.047823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqtMfw2ps91qAHvYAh"]} -{"Format": "IDEA0", "ID": "db235cde-506b-4ea4-a74a-be2e7cb645aa", "DetectTime": "2023-10-30T14:01:07.075386+02:00", "EventTime": "2023-10-30T14:01:07.075397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["C1Tvfk3EYwgPqhABLc"]} -{"Format": "IDEA0", "ID": "4b267cee-583f-47a5-b22f-55a2e518a4c0", "DetectTime": "2023-10-30T14:01:07.099960+02:00", "EventTime": "2023-10-30T14:01:07.099970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["C3CvRwmjB87cAHVBd"]} -{"Format": "IDEA0", "ID": "5ed42a76-610c-4988-af32-655d320d8eb2", "DetectTime": "2023-10-30T14:01:07.126416+02:00", "EventTime": "2023-10-30T14:01:07.126433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["ClSIs71KapQQlk4Djc"]} -{"Format": "IDEA0", "ID": "bf933788-00bd-4dc5-a119-736637042191", "DetectTime": "2023-10-30T14:01:07.150527+02:00", "EventTime": "2023-10-30T14:01:07.150544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CG8mdY3ewFWnTWHy25"]} -{"Format": "IDEA0", "ID": "2d6ed412-5e1a-41c6-917b-d188d64b6910", "DetectTime": "2023-10-30T14:01:07.171779+02:00", "EventTime": "2023-10-30T14:01:07.171794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CUsrca3gEUEWFX6jtk"]} -{"Format": "IDEA0", "ID": "3239cc79-fea7-40d8-9c26-cfbb9ce2760b", "DetectTime": "2023-10-30T14:01:07.195946+02:00", "EventTime": "2023-10-30T14:01:07.195963+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CV5A3aBHhDP0puco5"]} -{"Format": "IDEA0", "ID": "4ab17fe4-af12-4ce3-974a-e2cfa5de3f0f", "DetectTime": "2023-10-30T14:01:07.210056+02:00", "EventTime": "2023-10-30T14:01:07.210074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CVEW0z1s735EGCFvbe"]} -{"Format": "IDEA0", "ID": "f2a1e0c0-04a2-431d-ae48-caf03643217d", "DetectTime": "2023-10-30T14:01:07.239457+02:00", "EventTime": "2023-10-30T14:01:07.239470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CGqOB13YMr4tP6n2w"]} -{"Format": "IDEA0", "ID": "097738a9-f9ea-4f4d-8824-2acf3e6fce1f", "DetectTime": "2023-10-30T14:01:07.267087+02:00", "EventTime": "2023-10-30T14:01:07.267106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6LYKh4XUGVpD8lBRd"]} -{"Format": "IDEA0", "ID": "c618ca89-3853-4bc0-83a0-9e62f0095d0d", "DetectTime": "2023-10-30T14:01:07.290627+02:00", "EventTime": "2023-10-30T14:01:07.290644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["C03zBW3vcHe2lQO6mi"]} -{"Format": "IDEA0", "ID": "40236ff0-f1b6-403c-bcfb-fb5e4bfb5d65", "DetectTime": "2023-10-30T14:01:07.313668+02:00", "EventTime": "2023-10-30T14:01:07.313681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CplSjp1xmONOb0t7c1"]} -{"Format": "IDEA0", "ID": "26f362fb-adf0-4db8-b481-16c085a84c84", "DetectTime": "2023-10-30T14:01:07.336586+02:00", "EventTime": "2023-10-30T14:01:07.336606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C61Ms53nLnHhwF0Dc3"]} -{"Format": "IDEA0", "ID": "89a0124c-002d-47ec-b2ee-09dae2cbf449", "DetectTime": "2023-10-30T14:01:07.362909+02:00", "EventTime": "2023-10-30T14:01:07.362926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["Cqaf1e3h4mL8Co7W6g"]} -{"Format": "IDEA0", "ID": "d8d3b51d-8944-4f8c-a00d-6992f3883be7", "DetectTime": "2023-10-30T14:01:07.389871+02:00", "EventTime": "2023-10-30T14:01:07.389884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CZnk8g4atpcgpWvSJe"]} -{"Format": "IDEA0", "ID": "017fbe8b-a951-4cbe-9d9e-17431541eba2", "DetectTime": "2023-10-30T14:01:07.414311+02:00", "EventTime": "2023-10-30T14:01:07.414329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CMhvR444p5TO3LFZP2"]} -{"Format": "IDEA0", "ID": "cf4d819f-47ab-420e-bb36-51bcdb5dc1a0", "DetectTime": "2023-10-30T14:01:07.440787+02:00", "EventTime": "2023-10-30T14:01:07.440804+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CtvBa64gMKxv0rWUz5"]} -{"Format": "IDEA0", "ID": "3ba3f49e-1320-4013-8494-9b53ce8eebb0", "DetectTime": "2023-10-30T14:01:07.480062+02:00", "EventTime": "2023-10-30T14:01:07.480074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["C8FNvo11ce1nFmNJCg"]} -{"Format": "IDEA0", "ID": "3b5f940f-11d2-4692-9edf-54ba802c100b", "DetectTime": "2023-10-30T14:01:07.509926+02:00", "EventTime": "2023-10-30T14:01:07.509939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C8AW8nRqT0eWOmt53", "CfmA2y2w3A8t3arr31", "C3Yq571zdZAJZ3QI41", "CWkl5h1FYzTAGsGNK"]} -{"Format": "IDEA0", "ID": "811eef58-6c1e-4cde-bdaf-b068bec87493", "DetectTime": "2023-10-30T14:01:07.526000+02:00", "EventTime": "2023-10-30T14:01:07.526019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CWf2Ygph8tVJ07ik2"]} -{"Format": "IDEA0", "ID": "e839dc3b-3b44-4314-9b5c-955c13c818ce", "DetectTime": "2023-10-30T14:01:07.549606+02:00", "EventTime": "2023-10-30T14:01:07.549630+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWkl5h1FYzTAGsGNK"]} -{"Format": "IDEA0", "ID": "3866e46d-4a52-4b64-8bb9-ace371e50317", "DetectTime": "2023-10-30T14:01:07.566970+02:00", "EventTime": "2023-10-30T14:01:07.567000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C2fU7k3u3q8cUd1H41"]} -{"Format": "IDEA0", "ID": "2f44a983-e584-4f70-9683-bcb1958878af", "DetectTime": "2023-10-30T14:01:07.592241+02:00", "EventTime": "2023-10-30T14:01:07.592261+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnT3W03BKT5LuVUXud"]} -{"Format": "IDEA0", "ID": "e047cca4-a551-4611-a168-5e90d0a13aa9", "DetectTime": "2023-10-30T14:01:07.607127+02:00", "EventTime": "2023-10-30T14:01:07.607143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["C0vKWb4f7rf4pe8HYe"]} -{"Format": "IDEA0", "ID": "da4c59fb-9fa1-4458-8b18-a87b9374316a", "DetectTime": "2023-10-30T14:01:07.629659+02:00", "EventTime": "2023-10-30T14:01:07.629671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CembkPipjR9iSkgz6"]} -{"Format": "IDEA0", "ID": "290344fd-2fe9-4150-8f60-38c15efd18c3", "DetectTime": "2023-10-30T14:01:07.656165+02:00", "EventTime": "2023-10-30T14:01:07.656184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRO6EZ1WhUd9lyn7nf"]} -{"Format": "IDEA0", "ID": "c8ec840d-98dc-451c-af0a-07f162b87d45", "DetectTime": "2023-10-30T14:01:07.671834+02:00", "EventTime": "2023-10-30T14:01:07.671849+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaxxoOcagrFLN2tc6"]} -{"Format": "IDEA0", "ID": "0a6c09ec-5373-48c3-a5c9-f5e6c728e69d", "DetectTime": "2023-10-30T14:01:07.685940+02:00", "EventTime": "2023-10-30T14:01:07.685952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C0irTTfxGiOfNnrVf"]} -{"Format": "IDEA0", "ID": "58d01aca-313d-4613-8af8-dbd2a8c257c8", "DetectTime": "2023-10-30T14:01:07.709972+02:00", "EventTime": "2023-10-30T14:01:07.709984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C17zI13d9TsUNxG3fc"]} -{"Format": "IDEA0", "ID": "4ac9fa22-eac5-43f9-96e5-09d7c79d9bb5", "DetectTime": "2023-10-30T14:01:07.736744+02:00", "EventTime": "2023-10-30T14:01:07.736760+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkIFULiTjZbxRoFyb"]} -{"Format": "IDEA0", "ID": "07070f2c-cb63-4232-bddf-c9caf1e0b997", "DetectTime": "2023-10-30T14:01:07.752510+02:00", "EventTime": "2023-10-30T14:01:07.752530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CpXJMBoDcQ69Pfcl8"]} -{"Format": "IDEA0", "ID": "ab56ab3a-42cb-45b1-a00f-df5c83778b8d", "DetectTime": "2023-10-30T14:01:07.779217+02:00", "EventTime": "2023-10-30T14:01:07.779238+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClCuIq1x2Q0SIurrVl"]} -{"Format": "IDEA0", "ID": "6d80e31f-90ca-494b-81b4-a3e56dc64391", "DetectTime": "2023-10-30T14:01:07.795789+02:00", "EventTime": "2023-10-30T14:01:07.795806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["CbrjeMcSlxTe9vgfk"]} -{"Format": "IDEA0", "ID": "884813cb-7d45-4bd9-a254-f52f6d2d6eaa", "DetectTime": "2023-10-30T14:01:07.820424+02:00", "EventTime": "2023-10-30T14:01:07.820443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CgRQP24pG9TU4PR7gg"]} -{"Format": "IDEA0", "ID": "f6f72503-9c5b-4524-981c-fa2084feb29d", "DetectTime": "2023-10-30T14:01:07.847056+02:00", "EventTime": "2023-10-30T14:01:07.847079+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CO4Sx434Jzys4tVpI"]} -{"Format": "IDEA0", "ID": "ce3a4205-93a9-436f-a336-a56d51ccadc2", "DetectTime": "2023-10-30T14:01:07.863390+02:00", "EventTime": "2023-10-30T14:01:07.863410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CkOJih2U35ych1Fgn4"]} -{"Format": "IDEA0", "ID": "cbfb57c8-5f14-4b16-9629-dfa5cc82be2f", "DetectTime": "2023-10-30T14:01:07.892333+02:00", "EventTime": "2023-10-30T14:01:07.892349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. ", "ContentType": "text/plain"}], "uids": ["C88ulVFaDCokgPiT1"]} -{"Format": "IDEA0", "ID": "8aa5fd36-d477-474e-be65-bfd150a855c2", "DetectTime": "2023-10-30T14:01:07.926570+02:00", "EventTime": "2023-10-30T14:01:07.926592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CJs5803nbw3vvubEMi"]} -{"Format": "IDEA0", "ID": "e7fffab3-1d83-4c45-9767-c6478086ac18", "DetectTime": "2023-10-30T14:01:07.959945+02:00", "EventTime": "2023-10-30T14:01:07.959961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.197.81.95 ", "ContentType": "text/plain"}], "uids": ["CP5IBr2bweRf5b9sog"]} -{"Format": "IDEA0", "ID": "0c312cfd-497d-4074-8158-89bc498dc5e7", "DetectTime": "2023-10-30T14:01:07.992011+02:00", "EventTime": "2023-10-30T14:01:07.992027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.7.167 ", "ContentType": "text/plain"}], "uids": ["CDzFz03GaWQGRarMZh"]} -{"Format": "IDEA0", "ID": "3842cdee-8f8d-4e35-8a47-21784884506f", "DetectTime": "2023-10-30T14:01:08.022772+02:00", "EventTime": "2023-10-30T14:01:08.022806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["C6cJOr3dNuNn2H8KFb"]} -{"Format": "IDEA0", "ID": "ff04f3f2-2541-49ae-be24-f56033ab9f21", "DetectTime": "2023-10-30T14:01:08.055730+02:00", "EventTime": "2023-10-30T14:01:08.055752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CjU5102KT00JIVPPof"]} -{"Format": "IDEA0", "ID": "37ffa820-814d-4278-8f7b-669ff6626ee0", "DetectTime": "2023-10-30T14:01:08.080340+02:00", "EventTime": "2023-10-30T14:01:08.080361+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClVYCxGMuhK93xC1"]} -{"Format": "IDEA0", "ID": "70a6484e-7f0d-49e3-ac78-d750a8b484ad", "DetectTime": "2023-10-30T14:01:08.096667+02:00", "EventTime": "2023-10-30T14:01:08.096681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CRO6EZ1WhUd9lyn7nf", "CkIFULiTjZbxRoFyb", "CO4Sx434Jzys4tVpI", "CEnXKgAjMoKhOG2e3"]} -{"Format": "IDEA0", "ID": "1d8bf27f-b9b6-41cb-a1f0-f0b8edd59a7e", "DetectTime": "2023-10-30T14:01:08.112266+02:00", "EventTime": "2023-10-30T14:01:08.112283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CuKRCx4WMW8Z5QAvme"]} -{"Format": "IDEA0", "ID": "f705a1b6-ddd6-4ddc-9cfe-1f1f6289af29", "DetectTime": "2023-10-30T14:01:08.139721+02:00", "EventTime": "2023-10-30T14:01:08.139739+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEnXKgAjMoKhOG2e3"]} -{"Format": "IDEA0", "ID": "173c20f1-9a28-4cc6-a51c-bb457a813010", "DetectTime": "2023-10-30T14:01:08.156042+02:00", "EventTime": "2023-10-30T14:01:08.156058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CklDqRAN8FeEA8Wf6"]} -{"Format": "IDEA0", "ID": "ddad9202-61eb-4212-8fba-e4bb0166e281", "DetectTime": "2023-10-30T14:01:08.183435+02:00", "EventTime": "2023-10-30T14:01:08.183453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["CS6cfq2IYw5vKAzCB"]} -{"Format": "IDEA0", "ID": "aa4d2d1f-47aa-49b7-aafd-1402c7d85871", "DetectTime": "2023-10-30T14:01:08.210148+02:00", "EventTime": "2023-10-30T14:01:08.210159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.197.81.95 ", "ContentType": "text/plain"}], "uids": ["CuBV4f1dZkXlbTqlu8"]} -{"Format": "IDEA0", "ID": "88378473-48d5-4e3b-b274-367d00c357ba", "DetectTime": "2023-10-30T14:01:08.238943+02:00", "EventTime": "2023-10-30T14:01:08.238962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["CRZLdidpozswy64Ek"]} -{"Format": "IDEA0", "ID": "3fa38eee-d408-473c-93be-5d2080b05c8f", "DetectTime": "2023-10-30T14:01:08.265021+02:00", "EventTime": "2023-10-30T14:01:08.265043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CLBQp02Mu79sTvOYRf"]} -{"Format": "IDEA0", "ID": "5d4c672e-b02b-49ad-ad2a-df900486bd85", "DetectTime": "2023-10-30T14:01:08.294996+02:00", "EventTime": "2023-10-30T14:01:08.295014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDVJnCr1A71JQXPY3"]} -{"Format": "IDEA0", "ID": "b69ca88a-157b-4829-89ba-64f486afbdfa", "DetectTime": "2023-10-30T14:01:08.314703+02:00", "EventTime": "2023-10-30T14:01:08.314719+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CejJ1e2mU4xiFQLf52"]} -{"Format": "IDEA0", "ID": "248d3fed-2252-4723-b93a-912cc4bc4038", "DetectTime": "2023-10-30T14:01:08.331647+02:00", "EventTime": "2023-10-30T14:01:08.331663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Co1csm4ulhSBCrXE21"]} -{"Format": "IDEA0", "ID": "8fc74a3f-080f-487a-9fdf-57cd9f44eeba", "DetectTime": "2023-10-30T14:01:08.358550+02:00", "EventTime": "2023-10-30T14:01:08.358570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cexh501EjsNC6uoS29"]} -{"Format": "IDEA0", "ID": "fca90b88-387b-4ca2-954f-c537d68605ed", "DetectTime": "2023-10-30T14:01:08.380194+02:00", "EventTime": "2023-10-30T14:01:08.380213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CzanEVCkdwmNkf90h"]} -{"Format": "IDEA0", "ID": "ef57984b-0c55-4b02-b6ba-5a8e890cdcce", "DetectTime": "2023-10-30T14:01:08.406660+02:00", "EventTime": "2023-10-30T14:01:08.406676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C74ujZjIoB6uYMzR"]} -{"Format": "IDEA0", "ID": "11568ee0-e386-450a-816e-2e7a9609a196", "DetectTime": "2023-10-30T14:01:08.434147+02:00", "EventTime": "2023-10-30T14:01:08.434169+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Crs45k2rfPlTOSMpp3"]} -{"Format": "IDEA0", "ID": "0acdd4af-53db-42a8-91d9-bdaabdcd8b26", "DetectTime": "2023-10-30T14:01:08.450738+02:00", "EventTime": "2023-10-30T14:01:08.450762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C1K40w4HRu5o7Ic3C1"]} -{"Format": "IDEA0", "ID": "cb486e48-613d-49f1-bbc4-cd989e4e43d9", "DetectTime": "2023-10-30T14:01:08.474624+02:00", "EventTime": "2023-10-30T14:01:08.474641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C3dqAE170drWAb9dp5"]} -{"Format": "IDEA0", "ID": "54245bb5-d721-4365-887d-274b32d439c9", "DetectTime": "2023-10-30T14:01:08.502566+02:00", "EventTime": "2023-10-30T14:01:08.502587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["C6Dg0N2IWRnW2W4Lu3"]} -{"Format": "IDEA0", "ID": "24451b80-7713-43cb-a430-f2b37d02ca7b", "DetectTime": "2023-10-30T14:01:08.526719+02:00", "EventTime": "2023-10-30T14:01:08.526731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CQIfvo2mXICvHrksui"]} -{"Format": "IDEA0", "ID": "c1dc5780-3c3c-4ae3-8b72-8fc05d17878a", "DetectTime": "2023-10-30T14:01:08.553295+02:00", "EventTime": "2023-10-30T14:01:08.553312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CJ4jrx3xmtI9X4O414"]} -{"Format": "IDEA0", "ID": "8288c8c8-f1bf-419c-91fc-a449042cf3e3", "DetectTime": "2023-10-30T14:01:08.579049+02:00", "EventTime": "2023-10-30T14:01:08.579067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CJ7flv2pAdwJ4Ltkf3"]} -{"Format": "IDEA0", "ID": "c711b084-7f67-47b5-a98b-c08d5c26368a", "DetectTime": "2023-10-30T14:01:08.608922+02:00", "EventTime": "2023-10-30T14:01:08.608940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CFO9cb1MsO4utZoUr"]} -{"Format": "IDEA0", "ID": "9e7e0af3-e29c-4cd1-bf9c-d8c888f9d3ca", "DetectTime": "2023-10-30T14:01:08.633657+02:00", "EventTime": "2023-10-30T14:01:08.633679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CAJwdR2LJARun5YXXc"]} -{"Format": "IDEA0", "ID": "1f948e96-e2a9-41a5-a32e-87c37b4d88ea", "DetectTime": "2023-10-30T14:01:08.658918+02:00", "EventTime": "2023-10-30T14:01:08.658936+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqQMPE2q1gUy3UmQe6"]} -{"Format": "IDEA0", "ID": "4dbbf7ab-510b-4aa7-8abe-038956ec2da6", "DetectTime": "2023-10-30T14:01:08.669291+02:00", "EventTime": "2023-10-30T14:01:08.669309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CsOuzZ1oL7T2bZPC6i"]} -{"Format": "IDEA0", "ID": "9ad74669-ac88-407b-bddf-7ffd0299ffaf", "DetectTime": "2023-10-30T14:01:08.696161+02:00", "EventTime": "2023-10-30T14:01:08.696182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["C4Iufh2X02mXVI6We5"]} -{"Format": "IDEA0", "ID": "dd70512a-9415-41a5-817a-fb36b2a9534c", "DetectTime": "2023-10-30T14:01:08.723259+02:00", "EventTime": "2023-10-30T14:01:08.723276+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CV6mOC3ar1BbpAoAx9"]} -{"Format": "IDEA0", "ID": "ad7714de-30d1-4c1a-92d3-2d10b5dcbefe", "DetectTime": "2023-10-30T14:01:08.732470+02:00", "EventTime": "2023-10-30T14:01:08.732490+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZgux83SifxR9bJF1f"]} -{"Format": "IDEA0", "ID": "3922933a-1495-44a4-882b-b8b14b71c6e2", "DetectTime": "2023-10-30T14:01:08.742719+02:00", "EventTime": "2023-10-30T14:01:08.742736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CET3Rw2qiOPKvPrSfh"]} -{"Format": "IDEA0", "ID": "8e62c1de-9a7a-4fd6-a1e2-cda79517fd8f", "DetectTime": "2023-10-30T14:01:08.769516+02:00", "EventTime": "2023-10-30T14:01:08.769536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTYJ5k1h8hODuaDTa3"]} -{"Format": "IDEA0", "ID": "21298980-45d1-4341-baf0-d41979049088", "DetectTime": "2023-10-30T14:01:08.779544+02:00", "EventTime": "2023-10-30T14:01:08.779564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C67tdo9W8TFBO03N1"]} -{"Format": "IDEA0", "ID": "e36368f8-545d-4d18-9dd9-0ba83d5ed013", "DetectTime": "2023-10-30T14:01:08.806132+02:00", "EventTime": "2023-10-30T14:01:08.806158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CmYKFIStK5Mlaie0b"]} -{"Format": "IDEA0", "ID": "3585527f-d969-4a38-bebb-b89b6a59c77b", "DetectTime": "2023-10-30T14:01:08.832444+02:00", "EventTime": "2023-10-30T14:01:08.832456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CejJ1e2mU4xiFQLf52", "CZgux83SifxR9bJF1f", "CqQMPE2q1gUy3UmQe6", "CuUAI53QOHAmlB6l92"]} -{"Format": "IDEA0", "ID": "de39103a-806a-4a59-a883-f3e351a6b703", "DetectTime": "2023-10-30T14:01:08.841639+02:00", "EventTime": "2023-10-30T14:01:08.841656+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuUAI53QOHAmlB6l92"]} -{"Format": "IDEA0", "ID": "b2e00d02-ed25-4bce-a73f-62dde75f6dca", "DetectTime": "2023-10-30T14:01:08.854346+02:00", "EventTime": "2023-10-30T14:01:08.854358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["CvEDTc18XxSXtSS3q2"]} -{"Format": "IDEA0", "ID": "40d4ccec-24ba-4a9c-b39e-7dc2e2ac6be4", "DetectTime": "2023-10-30T14:01:08.877482+02:00", "EventTime": "2023-10-30T14:01:08.877493+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUKPu6MRIhZMdomch"]} -{"Format": "IDEA0", "ID": "eb05d034-6623-4814-9ad5-99660b24534e", "DetectTime": "2023-10-30T14:01:08.885861+02:00", "EventTime": "2023-10-30T14:01:08.885879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CE6cLF4zEzkLdyDQxh"]} -{"Format": "IDEA0", "ID": "f215acc4-676a-42d7-a090-c2fe1140f450", "DetectTime": "2023-10-30T14:01:08.920002+02:00", "EventTime": "2023-10-30T14:01:08.920018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CmScSH2PWgJsAiShT"]} -{"Format": "IDEA0", "ID": "13b32261-53bb-4787-b4ac-892fad10cf4f", "DetectTime": "2023-10-30T14:01:08.949464+02:00", "EventTime": "2023-10-30T14:01:08.949481+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmbVlr3Mg2QfdCV6Qk"]} -{"Format": "IDEA0", "ID": "bcccdc68-8c96-4faa-906f-9064b9b71bdc", "DetectTime": "2023-10-30T14:01:08.960890+02:00", "EventTime": "2023-10-30T14:01:08.960910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["Cuwvui2lg2oShgro5j"]} -{"Format": "IDEA0", "ID": "9b502044-640d-4fd6-99b0-f590577f92e3", "DetectTime": "2023-10-30T14:01:08.988448+02:00", "EventTime": "2023-10-30T14:01:08.988469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CdpEYf3ywxAKYpAyke"]} -{"Format": "IDEA0", "ID": "0a7c0532-9a40-439b-84d2-86eaf907aa5e", "DetectTime": "2023-10-30T14:01:09.012173+02:00", "EventTime": "2023-10-30T14:01:09.012184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CBbFCb30sJ0vP82B3e"]} -{"Format": "IDEA0", "ID": "dc169f0a-6f88-41f6-9949-525a41543e22", "DetectTime": "2023-10-30T14:01:09.038110+02:00", "EventTime": "2023-10-30T14:01:09.038123+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfYZSx2J8uYRIQHVec"]} -{"Format": "IDEA0", "ID": "c688fc79-9e83-48b8-b1bb-ed3ca7a0f305", "DetectTime": "2023-10-30T14:01:09.045945+02:00", "EventTime": "2023-10-30T14:01:09.045957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CiMWe4Hw2y4otOZe3"]} -{"Format": "IDEA0", "ID": "b1ba0a68-6dda-4711-b590-19c098a7f3bb", "DetectTime": "2023-10-30T14:01:09.072344+02:00", "EventTime": "2023-10-30T14:01:09.072361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["ChMs0Z3MAlV3jpR7Ge"]} -{"Format": "IDEA0", "ID": "ad211f39-15c4-4892-a857-3259d402237d", "DetectTime": "2023-10-30T14:01:09.098498+02:00", "EventTime": "2023-10-30T14:01:09.098515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CVpjK14uZ17t7SRCoh"]} -{"Format": "IDEA0", "ID": "e49cb391-d90f-4323-bd1b-12540b3665f0", "DetectTime": "2023-10-30T14:01:09.124595+02:00", "EventTime": "2023-10-30T14:01:09.124607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CWXO9Q3WHPAPYN9Tpk"]} -{"Format": "IDEA0", "ID": "9392999f-6486-447d-9750-c213d46bfccd", "DetectTime": "2023-10-30T14:01:09.149950+02:00", "EventTime": "2023-10-30T14:01:09.149967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CpwLdz4wWRHwWL2iE6"]} -{"Format": "IDEA0", "ID": "3c85d13d-f0be-4821-aadf-2f316e8f2f39", "DetectTime": "2023-10-30T14:01:09.177317+02:00", "EventTime": "2023-10-30T14:01:09.177333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CsoB913fG6vLE0ZVve"]} -{"Format": "IDEA0", "ID": "3ddd209f-67d0-4501-b252-123fd5f30a21", "DetectTime": "2023-10-30T14:01:09.208308+02:00", "EventTime": "2023-10-30T14:01:09.208325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C5gos84iSgo96J9sL7"]} -{"Format": "IDEA0", "ID": "974d848d-8b64-4ecb-8a82-083c0db59429", "DetectTime": "2023-10-30T14:01:09.237483+02:00", "EventTime": "2023-10-30T14:01:09.237502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CzgQrM3Jj7TXapvhgh"]} -{"Format": "IDEA0", "ID": "07cb51db-17ea-4f25-98dd-1c2548dbbe8e", "DetectTime": "2023-10-30T14:01:09.267078+02:00", "EventTime": "2023-10-30T14:01:09.267095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["Cc7eHk43ZeYzLZXiD3"]} -{"Format": "IDEA0", "ID": "a4da9a11-e29a-4ca0-b381-39eefcfc42be", "DetectTime": "2023-10-30T14:01:09.291406+02:00", "EventTime": "2023-10-30T14:01:09.291417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["CnJTyP25vkuCHm271a"]} -{"Format": "IDEA0", "ID": "7329ef90-0c27-4781-a127-d6882aaff96f", "DetectTime": "2023-10-30T14:01:09.317733+02:00", "EventTime": "2023-10-30T14:01:09.317760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CCFiqS14ziNPsQ2Mpc"]} -{"Format": "IDEA0", "ID": "a9ec4392-cff1-409f-a932-6ea9e52744cc", "DetectTime": "2023-10-30T14:01:09.344776+02:00", "EventTime": "2023-10-30T14:01:09.344792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["Ckzd0n1FAQR8HFEbna"]} -{"Format": "IDEA0", "ID": "622a9073-1f9a-4f4c-bc94-9e97e163690d", "DetectTime": "2023-10-30T14:01:09.367142+02:00", "EventTime": "2023-10-30T14:01:09.367154+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CvL8ak3jI5qRBUKTg2"]} -{"Format": "IDEA0", "ID": "61a6f983-55a0-4d69-a0c1-144747f5a62b", "DetectTime": "2023-10-30T14:01:09.403143+02:00", "EventTime": "2023-10-30T14:01:09.403167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C5RWDG1kCO4qaSrqu1"]} -{"Format": "IDEA0", "ID": "6a2afdaa-8693-4ff7-b7f1-a0cec5b5d133", "DetectTime": "2023-10-30T14:01:09.428572+02:00", "EventTime": "2023-10-30T14:01:09.428584+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C70vzy4latK7xbNo9f"]} -{"Format": "IDEA0", "ID": "16ca054c-4a7f-4094-9a40-e5dcbfa5d786", "DetectTime": "2023-10-30T14:01:09.438042+02:00", "EventTime": "2023-10-30T14:01:09.438060+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUb3iG4EIK0kK2rJFi"]} -{"Format": "IDEA0", "ID": "52f11d79-dcda-4345-a1c9-74995ed3de93", "DetectTime": "2023-10-30T14:01:09.446948+02:00", "EventTime": "2023-10-30T14:01:09.446960+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJ5Pu636PAhCaCIv9d"]} -{"Format": "IDEA0", "ID": "3cf1d96a-ea5f-4c28-a501-d9d42aedcf27", "DetectTime": "2023-10-30T14:01:09.456727+02:00", "EventTime": "2023-10-30T14:01:09.456746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["C1Vi0T2kHRHePAyare"]} -{"Format": "IDEA0", "ID": "00e284c9-9ae0-48fa-b3cd-f6356894d505", "DetectTime": "2023-10-30T14:01:09.484942+02:00", "EventTime": "2023-10-30T14:01:09.484958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C9v3iC2ND4Nfuq5iWb"]} -{"Format": "IDEA0", "ID": "8cdcf3eb-4345-498a-b623-da3da568e77c", "DetectTime": "2023-10-30T14:01:09.510306+02:00", "EventTime": "2023-10-30T14:01:09.510321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CFdlH42a04YGeW0sZ1"]} -{"Format": "IDEA0", "ID": "5e5ed86e-fc38-4675-8479-5f4653c4c98b", "DetectTime": "2023-10-30T14:01:09.533407+02:00", "EventTime": "2023-10-30T14:01:09.533421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CZSIdQ36RuF4ITxjT6"]} -{"Format": "IDEA0", "ID": "e05992cc-db06-4e52-957a-f1323abb0692", "DetectTime": "2023-10-30T14:01:09.559073+02:00", "EventTime": "2023-10-30T14:01:09.559085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CeVoOS5Vz2YbxDcc"]} -{"Format": "IDEA0", "ID": "4c1630aa-68d1-4016-bfde-4b92f06fe153", "DetectTime": "2023-10-30T14:01:09.584358+02:00", "EventTime": "2023-10-30T14:01:09.584378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["CuyYQL1UCAzexgHjgf"]} -{"Format": "IDEA0", "ID": "a4babf3d-c14d-4f81-8b55-194e632c0828", "DetectTime": "2023-10-30T14:01:09.612413+02:00", "EventTime": "2023-10-30T14:01:09.612429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CNBa3m2NPZAmYmNeG5"]} -{"Format": "IDEA0", "ID": "4b0ae18f-9c95-4509-9954-ce8de1bd0616", "DetectTime": "2023-10-30T14:01:09.639166+02:00", "EventTime": "2023-10-30T14:01:09.639177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CW8kju12LwSF0nXtO2"]} -{"Format": "IDEA0", "ID": "f3b96b28-4ca3-426e-9fa6-be955f428ca1", "DetectTime": "2023-10-30T14:01:09.667528+02:00", "EventTime": "2023-10-30T14:01:09.667541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CNUBdI2KWTztjY5P34"]} -{"Format": "IDEA0", "ID": "36740f92-71fb-4295-a26d-7aa92b9e8b55", "DetectTime": "2023-10-30T14:01:09.693051+02:00", "EventTime": "2023-10-30T14:01:09.693064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.63.18 ", "ContentType": "text/plain"}], "uids": ["CLhmIXTZXo7RyZ7G4"]} -{"Format": "IDEA0", "ID": "60d45939-3481-4517-98c9-8908d0b911c9", "DetectTime": "2023-10-30T14:01:09.716004+02:00", "EventTime": "2023-10-30T14:01:09.716028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CTN2dr3Wy6ZxycIGo8"]} -{"Format": "IDEA0", "ID": "359caa52-cad4-47d5-a013-60da4e0aeb03", "DetectTime": "2023-10-30T14:01:09.738282+02:00", "EventTime": "2023-10-30T14:01:09.738301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["Cz4LXi2ruyAaOWDJw7"]} -{"Format": "IDEA0", "ID": "81de3e5e-a269-4cb6-a3cc-1facceea341e", "DetectTime": "2023-10-30T14:01:09.760390+02:00", "EventTime": "2023-10-30T14:01:09.760408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CJIT8v4WIM4aG8NtUa"]} -{"Format": "IDEA0", "ID": "7c964741-c570-45ac-8e3a-f265189a3ee3", "DetectTime": "2023-10-30T14:01:09.785109+02:00", "EventTime": "2023-10-30T14:01:09.785126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CPOTbk28TD2JZfII93"]} -{"Format": "IDEA0", "ID": "a179b489-3bdc-4d90-9028-e9af8bb39702", "DetectTime": "2023-10-30T14:01:09.812060+02:00", "EventTime": "2023-10-30T14:01:09.812076+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJNW98Mz2puBUtc8k"]} -{"Format": "IDEA0", "ID": "653247f8-ffee-4240-9b93-ba9fa272375e", "DetectTime": "2023-10-30T14:01:09.821631+02:00", "EventTime": "2023-10-30T14:01:09.821648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CEMNEG4zxGSTQimMAl"]} -{"Format": "IDEA0", "ID": "f5f0581f-8b40-4e8b-b1fd-343f7f99668d", "DetectTime": "2023-10-30T14:01:09.850594+02:00", "EventTime": "2023-10-30T14:01:09.850723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["Cft9L4hAnehiWcwR7"]} -{"Format": "IDEA0", "ID": "0311918f-2c8c-41d3-b0fd-a738dc6c737a", "DetectTime": "2023-10-30T14:01:09.885213+02:00", "EventTime": "2023-10-30T14:01:09.885230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVpwh927th0HxIwct"]} -{"Format": "IDEA0", "ID": "ff1c8038-7fbf-48d3-b413-1f70bb42ca6a", "DetectTime": "2023-10-30T14:01:09.912425+02:00", "EventTime": "2023-10-30T14:01:09.912437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CdcJ0bnyC9VoQW2Cl"]} -{"Format": "IDEA0", "ID": "1be5575f-6feb-4f19-8029-c08944404cbe", "DetectTime": "2023-10-30T14:01:09.942040+02:00", "EventTime": "2023-10-30T14:01:09.942056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CMS6Iz2mIhJsAIIJM9"]} -{"Format": "IDEA0", "ID": "691d1341-901f-4b6d-9f55-d153648f24bf", "DetectTime": "2023-10-30T14:01:09.975989+02:00", "EventTime": "2023-10-30T14:01:09.976006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CzWfW111qtIcIxCUj9"]} -{"Format": "IDEA0", "ID": "979d4cac-25dd-4639-a244-af64dae62555", "DetectTime": "2023-10-30T14:01:10.015029+02:00", "EventTime": "2023-10-30T14:01:10.015050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["Caj3rhNKn46r4IHsa"]} -{"Format": "IDEA0", "ID": "012a6f0b-6fbf-4c8d-8f67-1ae541879460", "DetectTime": "2023-10-30T14:01:10.054564+02:00", "EventTime": "2023-10-30T14:01:10.054583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CawSkC1mSb3Pd6saq3"]} -{"Format": "IDEA0", "ID": "2cfd92a7-e45c-44ac-a1e3-6f1cfff223f7", "DetectTime": "2023-10-30T14:01:10.081003+02:00", "EventTime": "2023-10-30T14:01:10.081020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C55rJO1iJMGUSjgW9j"]} -{"Format": "IDEA0", "ID": "3080a998-c941-43b0-aef8-1719ae58d3a6", "DetectTime": "2023-10-30T14:01:10.110853+02:00", "EventTime": "2023-10-30T14:01:10.110875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CpWgt21BQC22FvMkYk"]} -{"Format": "IDEA0", "ID": "dc8fad33-8449-4f1d-9dc7-a9331d517d19", "DetectTime": "2023-10-30T14:01:10.142825+02:00", "EventTime": "2023-10-30T14:01:10.142849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CJ5Pu636PAhCaCIv9d", "C70vzy4latK7xbNo9f", "C84Nj81FhgaLS2YPg7", "CmbVlr3Mg2QfdCV6Qk"]} -{"Format": "IDEA0", "ID": "5491a7bc-043f-408c-b949-34064715b81e", "DetectTime": "2023-10-30T14:01:10.155885+02:00", "EventTime": "2023-10-30T14:01:10.155902+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C84Nj81FhgaLS2YPg7"]} -{"Format": "IDEA0", "ID": "fdb28e16-0d4c-463a-b997-7aef504e51f3", "DetectTime": "2023-10-30T14:01:10.167222+02:00", "EventTime": "2023-10-30T14:01:10.167238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CGrKuS24U5ZFqq1wF6"]} -{"Format": "IDEA0", "ID": "927594ac-f6d3-40b8-a46e-e1391acccbbf", "DetectTime": "2023-10-30T14:01:10.195633+02:00", "EventTime": "2023-10-30T14:01:10.195654+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClRKdD3pkAM0lgV88"]} -{"Format": "IDEA0", "ID": "ec012b7c-61c4-4473-8e1a-465846bb4ad4", "DetectTime": "2023-10-30T14:01:10.207852+02:00", "EventTime": "2023-10-30T14:01:10.207867+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CwTMUc3J4NVOa24Wgd"]} -{"Format": "IDEA0", "ID": "a61c7ccb-035d-46b8-9dfe-3fb7bad22038", "DetectTime": "2023-10-30T14:01:10.259213+02:00", "EventTime": "2023-10-30T14:01:10.259231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["Cz3FXy2umKXKd86in6"]} -{"Format": "IDEA0", "ID": "0f2da9a8-223b-4e96-ae9c-8c0ccc565d6f", "DetectTime": "2023-10-30T14:01:10.288082+02:00", "EventTime": "2023-10-30T14:01:10.288101+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVJSiH2qoYLHh4gd94"]} -{"Format": "IDEA0", "ID": "3cd53468-3cd6-4f1b-8aee-eea8fb0d6834", "DetectTime": "2023-10-30T14:01:10.297841+02:00", "EventTime": "2023-10-30T14:01:10.297860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CsKETj4uvKrpmThxj1"]} -{"Format": "IDEA0", "ID": "b821e54c-8d68-409c-aed7-0b1ded0c6e9f", "DetectTime": "2023-10-30T14:01:10.326032+02:00", "EventTime": "2023-10-30T14:01:10.326049+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cbb7ax1CDSufJPM6Kk"]} -{"Format": "IDEA0", "ID": "cc4e70eb-0b73-4a41-80ce-4e4c4dff63ba", "DetectTime": "2023-10-30T14:01:10.336951+02:00", "EventTime": "2023-10-30T14:01:10.336968+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiekCk3M3Kd3SGgpRe"]} -{"Format": "IDEA0", "ID": "03ec0b03-70ed-4ed1-8564-619f20380676", "DetectTime": "2023-10-30T14:01:10.349350+02:00", "EventTime": "2023-10-30T14:01:10.349367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CQiTnl1eq5Sf9qjX81"]} -{"Format": "IDEA0", "ID": "cbb9b10b-4126-467f-b605-6d77ca78d814", "DetectTime": "2023-10-30T14:01:10.382029+02:00", "EventTime": "2023-10-30T14:01:10.382044+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkpUcD2PLFFnF72mTk"]} -{"Format": "IDEA0", "ID": "1f5a094e-5484-44e9-a41a-09bcefcc6af7", "DetectTime": "2023-10-30T14:01:10.391740+02:00", "EventTime": "2023-10-30T14:01:10.391753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CDAu4Kclvm3EeF25c"]} -{"Format": "IDEA0", "ID": "baa57dc3-9ffd-4843-adec-4853017f97c9", "DetectTime": "2023-10-30T14:01:10.424416+02:00", "EventTime": "2023-10-30T14:01:10.424437+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQgsK93kWNwiFWEs99"]} -{"Format": "IDEA0", "ID": "a6a18b90-f428-47da-b498-4de395d1c9b5", "DetectTime": "2023-10-30T14:01:10.439890+02:00", "EventTime": "2023-10-30T14:01:10.439914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CJy4mA35xTbi1q6rtc"]} -{"Format": "IDEA0", "ID": "30c6694e-d558-47af-85f3-8ee15c5b9942", "DetectTime": "2023-10-30T14:01:10.468152+02:00", "EventTime": "2023-10-30T14:01:10.468162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C8ES5vRx0D5lNh3Fk"]} -{"Format": "IDEA0", "ID": "3b0c5420-a2e3-4934-b33a-9fb1bf44d7dd", "DetectTime": "2023-10-30T14:01:10.495508+02:00", "EventTime": "2023-10-30T14:01:10.495525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["C8s8Dy4sgzKhRDDUPc"]} -{"Format": "IDEA0", "ID": "a150445c-02d4-44e5-a580-8efc0cb75c22", "DetectTime": "2023-10-30T14:01:10.527316+02:00", "EventTime": "2023-10-30T14:01:10.527338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CmOHGn25QatiEqQMj2"]} -{"Format": "IDEA0", "ID": "00a65d3b-b904-4082-a4ee-4905691aa04b", "DetectTime": "2023-10-30T14:01:10.559028+02:00", "EventTime": "2023-10-30T14:01:10.559045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CRald9rfLWe2s0mv"]} -{"Format": "IDEA0", "ID": "752e41a5-a279-4425-8100-98ec9475ce55", "DetectTime": "2023-10-30T14:01:10.592828+02:00", "EventTime": "2023-10-30T14:01:10.592845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["Cq3FOFtrYNwP9GlTe"]} -{"Format": "IDEA0", "ID": "270d1d3a-2725-47ef-8e72-8176ffaae65f", "DetectTime": "2023-10-30T14:01:10.620545+02:00", "EventTime": "2023-10-30T14:01:10.620560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CuYv7T1LRbma69DPXc"]} -{"Format": "IDEA0", "ID": "f3f90d74-7686-4873-bea5-bf4c1e33d352", "DetectTime": "2023-10-30T14:01:10.649147+02:00", "EventTime": "2023-10-30T14:01:10.649175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CKQk3W2ge6rVhuDZHg"]} -{"Format": "IDEA0", "ID": "29888adc-9e7d-47c1-8b28-6d6a91ca917c", "DetectTime": "2023-10-30T14:01:10.683330+02:00", "EventTime": "2023-10-30T14:01:10.683355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CnvA8iUjzT0s8UPrd"]} -{"Format": "IDEA0", "ID": "1ffd2109-30a1-4c03-b4c3-2f88ce0577ca", "DetectTime": "2023-10-30T14:01:10.709437+02:00", "EventTime": "2023-10-30T14:01:10.709450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CE1Jiv1lkKjtzoLAma"]} -{"Format": "IDEA0", "ID": "ddd7f031-7550-46f0-8c04-28e36631ad4a", "DetectTime": "2023-10-30T14:01:10.734531+02:00", "EventTime": "2023-10-30T14:01:10.734551+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cno0FU1LQcmyyQ0Sn1"]} -{"Format": "IDEA0", "ID": "e91c308e-426b-462c-8858-d8cf06de0f98", "DetectTime": "2023-10-30T14:01:10.744216+02:00", "EventTime": "2023-10-30T14:01:10.744228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CTdc3k3FRdpT4Dg4J9"]} -{"Format": "IDEA0", "ID": "63201d8f-614d-4464-bbcc-36a432c5053c", "DetectTime": "2023-10-30T14:01:10.771420+02:00", "EventTime": "2023-10-30T14:01:10.771436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CyanCzaazJJCS8XNh"]} -{"Format": "IDEA0", "ID": "82038be8-d9cf-4d27-b0cc-b177292a3fa4", "DetectTime": "2023-10-30T14:01:10.799127+02:00", "EventTime": "2023-10-30T14:01:10.799150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CVJSiH2qoYLHh4gd94", "CRbJ9121bsWpxuCN04", "CiekCk3M3Kd3SGgpRe", "CQgsK93kWNwiFWEs99"]} -{"Format": "IDEA0", "ID": "d4e45f56-8f38-4db7-9eb2-5ce3f49a7708", "DetectTime": "2023-10-30T14:01:10.809729+02:00", "EventTime": "2023-10-30T14:01:10.809741+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRbJ9121bsWpxuCN04"]} -{"Format": "IDEA0", "ID": "634d673d-b640-4cd2-902c-db8075a392d1", "DetectTime": "2023-10-30T14:01:10.820010+02:00", "EventTime": "2023-10-30T14:01:10.820023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CYZDdLQYMcurjtKmh"]} -{"Format": "IDEA0", "ID": "e9d0070c-bbe6-4e98-bd27-1f0cb26c2ffd", "DetectTime": "2023-10-30T14:01:10.850230+02:00", "EventTime": "2023-10-30T14:01:10.850246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CfItektRG3MEwdpF2"]} -{"Format": "IDEA0", "ID": "c5fb192f-536c-42c3-8b69-0d2934dc5a11", "DetectTime": "2023-10-30T14:01:10.882727+02:00", "EventTime": "2023-10-30T14:01:10.882746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CszudBFAOXN9xvPPg"]} -{"Format": "IDEA0", "ID": "a8d91cff-57d8-4ba9-8ea3-3d90e0207dad", "DetectTime": "2023-10-30T14:01:10.909221+02:00", "EventTime": "2023-10-30T14:01:10.909232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CVsuGu15EB6IGXjo7"]} -{"Format": "IDEA0", "ID": "a185546b-ec3e-4799-a8e5-9b9708dbefc1", "DetectTime": "2023-10-30T14:01:10.938452+02:00", "EventTime": "2023-10-30T14:01:10.938471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["C2sPSE4P0vqMAzD6Oe"]} -{"Format": "IDEA0", "ID": "47fe7e85-c4f6-4606-9406-274004230ec7", "DetectTime": "2023-10-30T14:01:10.967196+02:00", "EventTime": "2023-10-30T14:01:10.967219+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2HWnb19ljaFVZn3cc"]} -{"Format": "IDEA0", "ID": "477e9e82-f16a-49cf-bb2d-2c10e4c385f7", "DetectTime": "2023-10-30T14:01:10.978427+02:00", "EventTime": "2023-10-30T14:01:10.978453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C8RdcY1g41U5XTXSE6"]} -{"Format": "IDEA0", "ID": "fcf0c796-64aa-410f-8f91-ad34e4fcdc64", "DetectTime": "2023-10-30T14:01:11.008029+02:00", "EventTime": "2023-10-30T14:01:11.008045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["CEB5zF1zVLd9oieYDf"]} -{"Format": "IDEA0", "ID": "4fd7f14c-2abb-41bb-b13c-66bf8ee40122", "DetectTime": "2023-10-30T14:01:11.035731+02:00", "EventTime": "2023-10-30T14:01:11.035749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.90.227 ", "ContentType": "text/plain"}], "uids": ["C59Mqd17qonPBy3xS8"]} -{"Format": "IDEA0", "ID": "5ac66e4a-5f7f-4795-b4f7-110f6ef796cf", "DetectTime": "2023-10-30T14:01:11.061719+02:00", "EventTime": "2023-10-30T14:01:11.061736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["C6z5SBnvRpKUik6N9"]} -{"Format": "IDEA0", "ID": "f4f2b1ae-64e7-4f36-bebb-e2997103c7eb", "DetectTime": "2023-10-30T14:01:11.093404+02:00", "EventTime": "2023-10-30T14:01:11.093420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CPXVIn3OcIUHQHs42b"]} -{"Format": "IDEA0", "ID": "8777d2fb-dde2-4769-b459-ee1d15676d00", "DetectTime": "2023-10-30T14:01:11.120891+02:00", "EventTime": "2023-10-30T14:01:11.120906+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.232.61.59"], "Hostname": ["88.232.61.59.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 88.232.61.59 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 88.232.61.59.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CDzsef18YmEOmnF01f"]} -{"Format": "IDEA0", "ID": "17198c30-bea7-4ece-8d85-57806fa4eeb7", "DetectTime": "2023-10-30T14:01:11.165676+02:00", "EventTime": "2023-10-30T14:01:11.165693+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3zkMp29bGVDAroCY2"]} -{"Format": "IDEA0", "ID": "a2123a95-8aab-4111-a676-ec3f81d326d2", "DetectTime": "2023-10-30T14:01:11.179799+02:00", "EventTime": "2023-10-30T14:01:11.179821+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZUTbu1dhIh67aHdJd"]} -{"Format": "IDEA0", "ID": "7ee0dad3-04e6-447d-99b9-815ae4521175", "DetectTime": "2023-10-30T14:01:11.191364+02:00", "EventTime": "2023-10-30T14:01:11.191386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["C26qfb4drIGvIVqPf6"]} -{"Format": "IDEA0", "ID": "799c6c0d-757b-438b-96f7-31b5a244c6b5", "DetectTime": "2023-10-30T14:01:11.230461+02:00", "EventTime": "2023-10-30T14:01:11.230477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CjvEqQ1dyMGmrKHYF7"]} -{"Format": "IDEA0", "ID": "4746e52b-cd74-41d4-adba-ce0c00a25ae0", "DetectTime": "2023-10-30T14:01:11.261210+02:00", "EventTime": "2023-10-30T14:01:11.261224+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSEf5CU1YzM0pabHf"]} -{"Format": "IDEA0", "ID": "ee232356-f0e2-4768-b5f9-eb23012115c8", "DetectTime": "2023-10-30T14:01:11.272601+02:00", "EventTime": "2023-10-30T14:01:11.272623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cm3ftcGzAV9reSp33"]} -{"Format": "IDEA0", "ID": "1fca62e9-16ba-4a37-9f3f-65fc90456737", "DetectTime": "2023-10-30T14:01:11.306179+02:00", "EventTime": "2023-10-30T14:01:11.306196+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChcJRF36BtIj1mP781"]} -{"Format": "IDEA0", "ID": "eed615f1-f65b-4c04-8c91-062c1ce465e6", "DetectTime": "2023-10-30T14:01:11.316846+02:00", "EventTime": "2023-10-30T14:01:11.316863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPyX7r2ydIo2KyeWF4"]} -{"Format": "IDEA0", "ID": "2830780f-3f0c-401f-a0e0-d6107581b96a", "DetectTime": "2023-10-30T14:01:11.343369+02:00", "EventTime": "2023-10-30T14:01:11.343386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CQRcnW2A399Etr49Ok"]} -{"Format": "IDEA0", "ID": "45407c1a-a6e6-425c-8f72-cdcb3da5b51c", "DetectTime": "2023-10-30T14:01:11.369551+02:00", "EventTime": "2023-10-30T14:01:11.369568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.125.211.49 ", "ContentType": "text/plain"}], "uids": ["C19U084yLqyFrvwpx1"]} -{"Format": "IDEA0", "ID": "6afc5952-51c9-4bd1-ab3f-65938efc9c8b", "DetectTime": "2023-10-30T14:01:11.398518+02:00", "EventTime": "2023-10-30T14:01:11.398537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CoEViQ7DGEDYpfGG2"]} -{"Format": "IDEA0", "ID": "e867f565-1a43-4315-be6d-9e4eb5b309a2", "DetectTime": "2023-10-30T14:01:11.426461+02:00", "EventTime": "2023-10-30T14:01:11.426478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.48.67.41 ", "ContentType": "text/plain"}], "uids": ["CxQqxG2QNYGD6xQ0z8"]} -{"Format": "IDEA0", "ID": "1be3fb85-2386-4c36-a155-5323e6fe9678", "DetectTime": "2023-10-30T14:01:11.453215+02:00", "EventTime": "2023-10-30T14:01:11.453236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CwQcJNVgOhxFIZb4b"]} -{"Format": "IDEA0", "ID": "04aa5610-bcd1-4a88-a218-8c6f7ce154f7", "DetectTime": "2023-10-30T14:01:11.479833+02:00", "EventTime": "2023-10-30T14:01:11.479852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C2Agfv4vk6wWAefte6"]} -{"Format": "IDEA0", "ID": "21a6459b-11b3-4a78-9f46-7ddc2ae09887", "DetectTime": "2023-10-30T14:01:11.508753+02:00", "EventTime": "2023-10-30T14:01:11.508771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CoV7fq2zBVZiSNctPj"]} -{"Format": "IDEA0", "ID": "ed34c25b-36fd-4a26-9b82-50f12cb0cb5e", "DetectTime": "2023-10-30T14:01:11.537909+02:00", "EventTime": "2023-10-30T14:01:11.537926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CAy9ju4YAOmlTOo608"]} -{"Format": "IDEA0", "ID": "e83842a1-35e2-460c-ba9b-d21b04f7e362", "DetectTime": "2023-10-30T14:01:11.563167+02:00", "EventTime": "2023-10-30T14:01:11.563183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["C5BS454jYq7FQkUPTe"]} -{"Format": "IDEA0", "ID": "c8267736-0992-4f70-afab-8ac4e7caa73f", "DetectTime": "2023-10-30T14:01:11.588908+02:00", "EventTime": "2023-10-30T14:01:11.588925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cho4WX1nRwczOJFR71"]} -{"Format": "IDEA0", "ID": "3e635cf2-e8a1-4ba7-bc54-12b58c61c44d", "DetectTime": "2023-10-30T14:01:11.611850+02:00", "EventTime": "2023-10-30T14:01:11.611875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["ClvoAT20NfxpDNS1ki"]} -{"Format": "IDEA0", "ID": "accdd5b9-eed3-4982-b628-be6f1d5919d7", "DetectTime": "2023-10-30T14:01:11.641657+02:00", "EventTime": "2023-10-30T14:01:11.641676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C11d223Ie5HSQEHAe"]} -{"Format": "IDEA0", "ID": "450b9b69-9aeb-4240-8728-065617c9ae64", "DetectTime": "2023-10-30T14:01:11.668829+02:00", "EventTime": "2023-10-30T14:01:11.668845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["C7KGnv1rEBcVo5roT"]} -{"Format": "IDEA0", "ID": "3add25ee-7879-4dc6-a525-096ac1308e9b", "DetectTime": "2023-10-30T14:01:11.693868+02:00", "EventTime": "2023-10-30T14:01:11.693886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CkcZq44QfGIOufaA75"]} -{"Format": "IDEA0", "ID": "caae6a4f-fa2b-4272-aeec-48d12e5061f1", "DetectTime": "2023-10-30T14:01:11.723095+02:00", "EventTime": "2023-10-30T14:01:11.723114+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2uTuH3M4h5kACEqO4"]} -{"Format": "IDEA0", "ID": "161fb9e8-b438-4526-919b-7235b91fa161", "DetectTime": "2023-10-30T14:01:11.730976+02:00", "EventTime": "2023-10-30T14:01:11.730996+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVSm5x4v6nZq4pUZvk"]} -{"Format": "IDEA0", "ID": "cd70c0e0-d88f-4e21-b28c-173a45864c0b", "DetectTime": "2023-10-30T14:01:11.739596+02:00", "EventTime": "2023-10-30T14:01:11.739612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C4YbYUI5l5samExl2"]} -{"Format": "IDEA0", "ID": "cf28c3c7-4d0e-4a29-a972-276b2e5fdd41", "DetectTime": "2023-10-30T14:01:11.768270+02:00", "EventTime": "2023-10-30T14:01:11.768290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["Cd4H7xEq2NmEWlSb2"]} -{"Format": "IDEA0", "ID": "f40da27d-bdbc-4926-9808-74c060b3ee3d", "DetectTime": "2023-10-30T14:01:11.796986+02:00", "EventTime": "2023-10-30T14:01:11.797008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPPi463HlJ1AiJFMTe", "CSEf5CU1YzM0pabHf", "C3zkMp29bGVDAroCY2", "C2uTuH3M4h5kACEqO4"]} -{"Format": "IDEA0", "ID": "626c7c5f-7689-4e22-95ea-ae67a8c8fb07", "DetectTime": "2023-10-30T14:01:11.807936+02:00", "EventTime": "2023-10-30T14:01:11.807954+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPPi463HlJ1AiJFMTe"]} -{"Format": "IDEA0", "ID": "dc5495bd-8407-46ce-9aec-4b8175c339ad", "DetectTime": "2023-10-30T14:01:11.817755+02:00", "EventTime": "2023-10-30T14:01:11.817774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CKhQS94jBssFAjBfP"]} -{"Format": "IDEA0", "ID": "ebe361bb-1fbf-4b13-b3bc-5d11c8927931", "DetectTime": "2023-10-30T14:01:11.844540+02:00", "EventTime": "2023-10-30T14:01:11.844560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C0Ihb31AUnJVZStxcb"]} -{"Format": "IDEA0", "ID": "c7814f38-6ed5-4b4a-8320-13df22c41454", "DetectTime": "2023-10-30T14:01:11.873859+02:00", "EventTime": "2023-10-30T14:01:11.873876+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.125.106.103"], "Hostname": ["host103.186-125-106.telecom.net.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 186.125.106.103 from 10.0.2.19. blacklisted IP AS: Telecom Argentina S.A., AR AS7303 rDNS: host103.186-125-106.telecom.net.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CNSfZe3WHB3K3WLJ05"]} -{"Format": "IDEA0", "ID": "1a1589b5-91f8-4b78-aa14-981511ea5417", "DetectTime": "2023-10-30T14:01:11.918469+02:00", "EventTime": "2023-10-30T14:01:11.918486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CWPimfUta3ukeY2Fb"]} -{"Format": "IDEA0", "ID": "941d6f19-eeb1-45af-b333-67047e6fdb9d", "DetectTime": "2023-10-30T14:01:11.944745+02:00", "EventTime": "2023-10-30T14:01:11.944765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cm4x6y2fXuueG0nfUi"]} -{"Format": "IDEA0", "ID": "07cb362a-3c68-4170-bd13-e85c0ce4234c", "DetectTime": "2023-10-30T14:01:11.970409+02:00", "EventTime": "2023-10-30T14:01:11.970430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CGvWHD3hNP891YkDXc"]} -{"Format": "IDEA0", "ID": "fdb0f5c4-2694-4643-9474-bb8f9e4b91ec", "DetectTime": "2023-10-30T14:01:11.995788+02:00", "EventTime": "2023-10-30T14:01:11.995805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CfK9rX1BKf3zIGPNoc"]} -{"Format": "IDEA0", "ID": "05cf244a-ba15-49d0-9f76-fe19181515ad", "DetectTime": "2023-10-30T14:01:12.023108+02:00", "EventTime": "2023-10-30T14:01:12.023125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CXw4J54BYN78t0ciYc"]} -{"Format": "IDEA0", "ID": "0b149544-ce7f-40d2-b29a-c665a3789fbc", "DetectTime": "2023-10-30T14:01:12.046038+02:00", "EventTime": "2023-10-30T14:01:12.046054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CPWdxy4emCc3s0Cyb8"]} -{"Format": "IDEA0", "ID": "760f8401-a513-47d0-b83b-909ae559da20", "DetectTime": "2023-10-30T14:01:12.072669+02:00", "EventTime": "2023-10-30T14:01:12.072686+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CErYE9I3GF9qi1Dh9"]} -{"Format": "IDEA0", "ID": "338b993a-1c72-4797-a9bf-e0ef73327e8f", "DetectTime": "2023-10-30T14:01:12.082127+02:00", "EventTime": "2023-10-30T14:01:12.082146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CwjwyKwgiPYfD9Ph2"]} -{"Format": "IDEA0", "ID": "9c952d30-59bd-4637-8554-f49b077d2798", "DetectTime": "2023-10-30T14:01:12.107844+02:00", "EventTime": "2023-10-30T14:01:12.107861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C2x00v30AuCyoaEltl"]} -{"Format": "IDEA0", "ID": "92f2d623-c4a5-4826-b8f3-abb96b21c4ab", "DetectTime": "2023-10-30T14:01:12.136645+02:00", "EventTime": "2023-10-30T14:01:12.136662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CE5GlJ31cyTMUUPYSe"]} -{"Format": "IDEA0", "ID": "98719d97-9e5d-4ed9-a814-2fc5a8b5890f", "DetectTime": "2023-10-30T14:01:12.163794+02:00", "EventTime": "2023-10-30T14:01:12.163834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CWQnth3bg3d09SRhNl"]} -{"Format": "IDEA0", "ID": "1cab2aee-a11f-4ba8-8e01-a3904b399fd4", "DetectTime": "2023-10-30T14:01:12.191728+02:00", "EventTime": "2023-10-30T14:01:12.191743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CIJE97430oKWh7LB37"]} -{"Format": "IDEA0", "ID": "749ebdcb-721f-426d-9c2c-46c518c640d8", "DetectTime": "2023-10-30T14:01:12.219962+02:00", "EventTime": "2023-10-30T14:01:12.219984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CSgGj9i5yCO0QKdWe"]} -{"Format": "IDEA0", "ID": "83c6d53d-1454-4230-9e4d-69fbf7c27084", "DetectTime": "2023-10-30T14:01:12.258566+02:00", "EventTime": "2023-10-30T14:01:12.258583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CTbSDd13KIJXUENVbg"]} -{"Format": "IDEA0", "ID": "47407cb3-3962-498a-b11a-eaa47142f482", "DetectTime": "2023-10-30T14:01:12.291468+02:00", "EventTime": "2023-10-30T14:01:12.291568+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CR8AHO2sd2t5AmE9vh"]} -{"Format": "IDEA0", "ID": "9253b47a-f349-454f-bb86-5bad80044dfe", "DetectTime": "2023-10-30T14:01:12.301275+02:00", "EventTime": "2023-10-30T14:01:12.301296+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJEFvY3xhKXqkZI0Hf"]} -{"Format": "IDEA0", "ID": "98b8cea1-2cb8-418d-98e2-7f8d0a0ce32d", "DetectTime": "2023-10-30T14:01:12.312913+02:00", "EventTime": "2023-10-30T14:01:12.312934+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiP6OG3QckUkToJGF5"]} -{"Format": "IDEA0", "ID": "70001043-c3a7-4c72-b47c-51e26861bb6a", "DetectTime": "2023-10-30T14:01:12.322321+02:00", "EventTime": "2023-10-30T14:01:12.322338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CRqKhp29eg9ecMlMgi"]} -{"Format": "IDEA0", "ID": "26eb2512-0d88-4bcc-87b6-383838b1c470", "DetectTime": "2023-10-30T14:01:12.353864+02:00", "EventTime": "2023-10-30T14:01:12.353883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["ChTxUB1PbU5h77Ith"]} -{"Format": "IDEA0", "ID": "1eff713c-50b5-48c0-9ca1-98994098c9b8", "DetectTime": "2023-10-30T14:01:12.381371+02:00", "EventTime": "2023-10-30T14:01:12.381390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CppDnK2W78IZfImaf2"]} -{"Format": "IDEA0", "ID": "1e300975-0e02-4202-8089-063b0053844d", "DetectTime": "2023-10-30T14:01:12.406219+02:00", "EventTime": "2023-10-30T14:01:12.406239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["Cx25Uz1K1RKRUbZe5b"]} -{"Format": "IDEA0", "ID": "b4af9714-8c67-4876-b835-2db02ea784c4", "DetectTime": "2023-10-30T14:01:12.433147+02:00", "EventTime": "2023-10-30T14:01:12.433169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CH6IbH1h6lsMS12iC3"]} -{"Format": "IDEA0", "ID": "d60b38c7-baf1-49de-b6d6-0ca1d2281cf8", "DetectTime": "2023-10-30T14:01:12.459927+02:00", "EventTime": "2023-10-30T14:01:12.459944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cdr4M941MiPPIs4fci"]} -{"Format": "IDEA0", "ID": "0971b4e8-1606-4ffa-803e-c099057af9f1", "DetectTime": "2023-10-30T14:01:12.489565+02:00", "EventTime": "2023-10-30T14:01:12.489583+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjGlrC3wZMxLbGlROg"]} -{"Format": "IDEA0", "ID": "211a3551-826d-43d6-8399-06b9a85bfa82", "DetectTime": "2023-10-30T14:01:12.499306+02:00", "EventTime": "2023-10-30T14:01:12.499322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CZwrzL174kQXNcnK8k"]} -{"Format": "IDEA0", "ID": "d416f03b-55f5-4e81-aa4c-fa0c8d5769cd", "DetectTime": "2023-10-30T14:01:12.525853+02:00", "EventTime": "2023-10-30T14:01:12.525869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CaphJx1lm37TWBKvV2"]} -{"Format": "IDEA0", "ID": "b06f2716-4efe-4ee8-90f8-5e2fcacbb4e1", "DetectTime": "2023-10-30T14:01:12.552205+02:00", "EventTime": "2023-10-30T14:01:12.552228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CCQV3J3r4Jws5Q01Pe"]} -{"Format": "IDEA0", "ID": "e37c0fec-1203-441e-aec2-7a42f0c230d4", "DetectTime": "2023-10-30T14:01:12.579225+02:00", "EventTime": "2023-10-30T14:01:12.579247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CMxKE52ccAJlykxYol"]} -{"Format": "IDEA0", "ID": "30716316-e2a0-4186-b18a-449809c5a622", "DetectTime": "2023-10-30T14:01:12.610014+02:00", "EventTime": "2023-10-30T14:01:12.610030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["CvUpdA1Obl2yu10xX1"]} -{"Format": "IDEA0", "ID": "cf4f4dda-ade3-409e-b081-bb0824dc5376", "DetectTime": "2023-10-30T14:01:12.634105+02:00", "EventTime": "2023-10-30T14:01:12.634132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["C5HawW3yITUzkSXw6a"]} -{"Format": "IDEA0", "ID": "87148d12-9660-4487-8b3c-6815d60d6a95", "DetectTime": "2023-10-30T14:01:12.663617+02:00", "EventTime": "2023-10-30T14:01:12.663634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CehQtlxEdh24B3Bsd"]} -{"Format": "IDEA0", "ID": "b1bcb879-0193-4c02-b403-3914d62a0daa", "DetectTime": "2023-10-30T14:01:12.698629+02:00", "EventTime": "2023-10-30T14:01:12.698651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CrpjSK1yNExUR5EIK6"]} -{"Format": "IDEA0", "ID": "e5ea6997-7810-49df-8d44-18303764cb89", "DetectTime": "2023-10-30T14:01:12.724169+02:00", "EventTime": "2023-10-30T14:01:12.724186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CUBQA42UEab0DhxKwg"]} -{"Format": "IDEA0", "ID": "52292630-baa5-4c41-ab3b-771fd7bb2c82", "DetectTime": "2023-10-30T14:01:12.754379+02:00", "EventTime": "2023-10-30T14:01:12.754400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cymgbv337MZWEnz8W7"]} -{"Format": "IDEA0", "ID": "0a032739-800e-4e96-a5c8-b75245d28398", "DetectTime": "2023-10-30T14:01:12.779739+02:00", "EventTime": "2023-10-30T14:01:12.779750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CooFvl4vICnvdy1oSc"]} -{"Format": "IDEA0", "ID": "cb7cd6dd-db1c-4548-b459-690bbdca61a7", "DetectTime": "2023-10-30T14:01:12.801434+02:00", "EventTime": "2023-10-30T14:01:12.801446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Cw6RX71TP71rL7I3B"]} -{"Format": "IDEA0", "ID": "3c4adb00-9f52-4c67-bc0e-76e6b19f2152", "DetectTime": "2023-10-30T14:01:12.825601+02:00", "EventTime": "2023-10-30T14:01:12.825613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CihF9o3vT7ZLNNvI6j"]} -{"Format": "IDEA0", "ID": "a32af5a8-6ed4-4466-b424-d70043e7f0bf", "DetectTime": "2023-10-30T14:01:12.850920+02:00", "EventTime": "2023-10-30T14:01:12.850941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C9wzQX1IrvoN1Ebyw1"]} -{"Format": "IDEA0", "ID": "8e17aca5-ca7e-436a-aa84-eb6ac583c26a", "DetectTime": "2023-10-30T14:01:12.874769+02:00", "EventTime": "2023-10-30T14:01:12.874800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C0S3zB1dFwfV3qMMxg"]} -{"Format": "IDEA0", "ID": "3642d8d1-a5d4-4b59-a83b-a938dc2e013b", "DetectTime": "2023-10-30T14:01:12.896159+02:00", "EventTime": "2023-10-30T14:01:12.896178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CNdrt34A2IzVxVY4U"]} -{"Format": "IDEA0", "ID": "2d88f71c-fe40-4b8e-89d7-f9807ac11995", "DetectTime": "2023-10-30T14:01:12.920806+02:00", "EventTime": "2023-10-30T14:01:12.920822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CvZ9s919rf5Yt8bZZb"]} -{"Format": "IDEA0", "ID": "82dbb7db-ac8c-4f90-bf0a-2d646b0ec44a", "DetectTime": "2023-10-30T14:01:12.946467+02:00", "EventTime": "2023-10-30T14:01:12.946484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["Cpp5ni1rr4Gm8ecVxb"]} -{"Format": "IDEA0", "ID": "fff1a0c9-f65a-4b6f-b017-467c2e272153", "DetectTime": "2023-10-30T14:01:12.973529+02:00", "EventTime": "2023-10-30T14:01:12.973550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["Cm26Ro2sD0RIw9Srk5"]} -{"Format": "IDEA0", "ID": "b343d07b-55d0-4961-ae17-ef3368237e07", "DetectTime": "2023-10-30T14:01:12.996785+02:00", "EventTime": "2023-10-30T14:01:12.996804+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.3.27"], "Hostname": ["node-m3.pool-118-173.dynamic.totinternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 118.173.3.27 from 10.0.2.19. blacklisted IP AS: TOT-NET TOT Public Company Limited, TH AS23969 rDNS: node-m3.pool-118-173.dynamic.totinternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C8Onbo3qldHgSBrmkd"]} -{"Format": "IDEA0", "ID": "e46fc7b5-b71a-4820-a160-9fb201a541e8", "DetectTime": "2023-10-30T14:01:13.039371+02:00", "EventTime": "2023-10-30T14:01:13.039388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CbrRvP3pmB3LZUn2ha"]} -{"Format": "IDEA0", "ID": "bd6636e4-6de1-4974-84a4-ca8f63f047e3", "DetectTime": "2023-10-30T14:01:13.069633+02:00", "EventTime": "2023-10-30T14:01:13.069650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["ClMJGASeKI7CF8ihe"]} -{"Format": "IDEA0", "ID": "f33842e6-cb07-4586-a21e-a58e32168c97", "DetectTime": "2023-10-30T14:01:13.095788+02:00", "EventTime": "2023-10-30T14:01:13.095808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CTB2ml4sbahxxja9j1"]} -{"Format": "IDEA0", "ID": "9b929017-4a97-4789-86b7-a8d19dcbc93d", "DetectTime": "2023-10-30T14:01:13.119855+02:00", "EventTime": "2023-10-30T14:01:13.119867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CmR5GE1OcXxgynFEDd"]} -{"Format": "IDEA0", "ID": "282a7a33-3e53-4b18-9130-6511cfdab358", "DetectTime": "2023-10-30T14:01:13.141025+02:00", "EventTime": "2023-10-30T14:01:13.141039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CiBX1L1JNNDLdbb67f"]} -{"Format": "IDEA0", "ID": "05d0a123-19f9-4ceb-bd4c-74b8a428d03e", "DetectTime": "2023-10-30T14:01:13.164696+02:00", "EventTime": "2023-10-30T14:01:13.164716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CIt0764IRqg62llJ9k"]} -{"Format": "IDEA0", "ID": "6dbf6df5-d7f8-43b3-9890-df40b147c89f", "DetectTime": "2023-10-30T14:01:13.190312+02:00", "EventTime": "2023-10-30T14:01:13.190334+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpP3e1KirnOUMezJ6"]} -{"Format": "IDEA0", "ID": "5a65dcf4-4e19-4260-bdf1-0e2ad0a6bd4f", "DetectTime": "2023-10-30T14:01:13.200274+02:00", "EventTime": "2023-10-30T14:01:13.200295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["Cu9eYA4nA5YclFHjpf"]} -{"Format": "IDEA0", "ID": "1927574b-4a61-47d9-be42-72a1922081b0", "DetectTime": "2023-10-30T14:01:13.226582+02:00", "EventTime": "2023-10-30T14:01:13.226595+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYa9r56SSRswXMQj4"]} -{"Format": "IDEA0", "ID": "84350054-6c5b-4f17-bfb4-36c6d87803f3", "DetectTime": "2023-10-30T14:01:13.234109+02:00", "EventTime": "2023-10-30T14:01:13.234125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Cv8XQN39ymkq1nEWJ9"]} -{"Format": "IDEA0", "ID": "208e94e1-3850-446c-87b6-0864aba92fc1", "DetectTime": "2023-10-30T14:01:13.257483+02:00", "EventTime": "2023-10-30T14:01:13.257501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CU2M7B2PIthwN3whC5"]} -{"Format": "IDEA0", "ID": "e52056fd-e702-4c10-b29a-ec0a5f942a23", "DetectTime": "2023-10-30T14:01:13.280447+02:00", "EventTime": "2023-10-30T14:01:13.280468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CGVcmj2k4n6o5DGIv1"]} -{"Format": "IDEA0", "ID": "4cb8b44d-1175-4920-b77f-d20def68cdcd", "DetectTime": "2023-10-30T14:01:13.308792+02:00", "EventTime": "2023-10-30T14:01:13.308808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C0do2y1EfZEWSwL1O1", "CiP6OG3QckUkToJGF5", "CR8AHO2sd2t5AmE9vh", "CpP3e1KirnOUMezJ6"]} -{"Format": "IDEA0", "ID": "3afba887-5e16-481f-9fca-6bf8379dbb7f", "DetectTime": "2023-10-30T14:01:13.318262+02:00", "EventTime": "2023-10-30T14:01:13.318280+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0do2y1EfZEWSwL1O1"]} -{"Format": "IDEA0", "ID": "27b7945f-dcde-492d-b524-c1783ea1d59e", "DetectTime": "2023-10-30T14:01:13.325134+02:00", "EventTime": "2023-10-30T14:01:13.325145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CByF5E1ZVLDZI6CU1d"]} -{"Format": "IDEA0", "ID": "523767fb-e9bd-44a5-a2d6-2b99673cc0fc", "DetectTime": "2023-10-30T14:01:13.346428+02:00", "EventTime": "2023-10-30T14:01:13.346448+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLYWrZ2a3PIa2zZroc"]} -{"Format": "IDEA0", "ID": "4d77217c-e451-436c-bdc9-1de81f6b52bd", "DetectTime": "2023-10-30T14:01:13.353516+02:00", "EventTime": "2023-10-30T14:01:13.353527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtTEhn1VSYeosv1P91"]} -{"Format": "IDEA0", "ID": "68833dd7-f8c2-4bcd-ba49-3a8a98ce47bb", "DetectTime": "2023-10-30T14:01:13.379927+02:00", "EventTime": "2023-10-30T14:01:13.379946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CtCDr32Jcx8MAVPGQ7"]} -{"Format": "IDEA0", "ID": "3c66a872-1525-4b79-bd46-902f524b2ad4", "DetectTime": "2023-10-30T14:01:13.404495+02:00", "EventTime": "2023-10-30T14:01:13.404508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C49oaG1o1XRsHMAiN3"]} -{"Format": "IDEA0", "ID": "377d5b16-dda8-4164-87a2-ed9ba78bd4de", "DetectTime": "2023-10-30T14:01:13.428142+02:00", "EventTime": "2023-10-30T14:01:13.428158+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CH0xGN6ffV7rhRwv7"]} -{"Format": "IDEA0", "ID": "3ecec0a8-de59-414f-94a4-966bd6e7b754", "DetectTime": "2023-10-30T14:01:13.436541+02:00", "EventTime": "2023-10-30T14:01:13.436557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CpVLwX1YN3mDK6NMB9"]} -{"Format": "IDEA0", "ID": "9e7013b4-97b3-4d72-adbd-c66d12b230fd", "DetectTime": "2023-10-30T14:01:13.461377+02:00", "EventTime": "2023-10-30T14:01:13.461394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CKzpSW137prP9uoM8b"]} -{"Format": "IDEA0", "ID": "cab0be80-d9f3-4d9d-b689-9a1cd2882869", "DetectTime": "2023-10-30T14:01:13.485732+02:00", "EventTime": "2023-10-30T14:01:13.485748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C6EH5L1kdaM3O7QAmg"]} -{"Format": "IDEA0", "ID": "e3a43781-00af-4dae-a59c-f0fe78fecf9b", "DetectTime": "2023-10-30T14:01:13.509453+02:00", "EventTime": "2023-10-30T14:01:13.509470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["Ck5WCb2zQm1hCYS1yj"]} -{"Format": "IDEA0", "ID": "6c04bd57-4db1-4503-846c-e3f06f083bf6", "DetectTime": "2023-10-30T14:01:13.533421+02:00", "EventTime": "2023-10-30T14:01:13.533437+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.253.45"], "Hostname": ["45.253.56.190.static.intelnet.net.gt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.56.253.45 from 10.0.2.19. blacklisted IP AS: Telgua, GT AS14754 rDNS: 45.253.56.190.static.intelnet.net.gt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CPCpqTPJ8bQ4OkFR6"]} -{"Format": "IDEA0", "ID": "dadc8f98-93f6-40d2-a44f-1084426a05f4", "DetectTime": "2023-10-30T14:01:13.578587+02:00", "EventTime": "2023-10-30T14:01:13.578607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CXF0CXgnrvP2Em05e"]} -{"Format": "IDEA0", "ID": "370cf8a7-8f96-4b2d-b3c0-b22644ad920a", "DetectTime": "2023-10-30T14:01:13.605990+02:00", "EventTime": "2023-10-30T14:01:13.606016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CCDLh01wwOMCyZ1Zt1"]} -{"Format": "IDEA0", "ID": "68215785-689b-41ad-8530-56bc2abf439d", "DetectTime": "2023-10-30T14:01:13.629977+02:00", "EventTime": "2023-10-30T14:01:13.629992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.15.81 ", "ContentType": "text/plain"}], "uids": ["Cawc9G2iPXKFQQNI6a"]} -{"Format": "IDEA0", "ID": "718195ba-5d8a-4aca-96ff-f1ee4524dcb0", "DetectTime": "2023-10-30T14:01:13.654775+02:00", "EventTime": "2023-10-30T14:01:13.654813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CykBZd1G26iHmz8Eie"]} -{"Format": "IDEA0", "ID": "9d57e0c7-1f92-4215-9421-29f0e3efbab7", "DetectTime": "2023-10-30T14:01:13.675269+02:00", "EventTime": "2023-10-30T14:01:13.675282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.71.4 ", "ContentType": "text/plain"}], "uids": ["CHeKWje1EahYacXFd"]} -{"Format": "IDEA0", "ID": "db0f365a-4995-4494-9835-a7ba7c18943a", "DetectTime": "2023-10-30T14:01:13.698593+02:00", "EventTime": "2023-10-30T14:01:13.698614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cxb1pDcmDtPkyKn34"]} -{"Format": "IDEA0", "ID": "c316f236-d447-4b2c-ab21-3171a6a5b774", "DetectTime": "2023-10-30T14:01:13.728712+02:00", "EventTime": "2023-10-30T14:01:13.728730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CKZOBotNt0gN8S58e"]} -{"Format": "IDEA0", "ID": "cd96a4b5-f273-4d54-b3e1-618f889f7a79", "DetectTime": "2023-10-30T14:01:13.749691+02:00", "EventTime": "2023-10-30T14:01:13.749709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CH3NuC1QvY9W8bS4B3"]} -{"Format": "IDEA0", "ID": "26a6aff8-4d0c-4cd3-879b-75f7e79bda5e", "DetectTime": "2023-10-30T14:01:13.773951+02:00", "EventTime": "2023-10-30T14:01:13.773969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CBzftg8UrZETHtVu6"]} -{"Format": "IDEA0", "ID": "189084f4-561b-42b9-9cd4-1db20a0460e8", "DetectTime": "2023-10-30T14:01:13.797725+02:00", "EventTime": "2023-10-30T14:01:13.797748+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cxb1qE1CQYRvTuikX5"]} -{"Format": "IDEA0", "ID": "eb486020-340c-47f9-8ecc-55d1b011f9c3", "DetectTime": "2023-10-30T14:01:13.806601+02:00", "EventTime": "2023-10-30T14:01:13.806627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CUJnPy4WJ2zYRswT19"]} -{"Format": "IDEA0", "ID": "0cf95ccd-0af0-4ab3-a8d7-3558c8fc5a27", "DetectTime": "2023-10-30T14:01:13.833608+02:00", "EventTime": "2023-10-30T14:01:13.833625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CN3r9T2l5ouYfcI5nj"]} -{"Format": "IDEA0", "ID": "2139e64d-9998-4279-bc99-348d85c0df82", "DetectTime": "2023-10-30T14:01:13.857925+02:00", "EventTime": "2023-10-30T14:01:13.857942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C5UiAP1dfL8SLFd6y"]} -{"Format": "IDEA0", "ID": "1e542156-c36f-4ff2-ae8d-7100a36adf57", "DetectTime": "2023-10-30T14:01:13.884727+02:00", "EventTime": "2023-10-30T14:01:13.884746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CAo6so3OsC5DbNStE2"]} -{"Format": "IDEA0", "ID": "4783b124-4990-48f0-a7a4-2648cc76d53a", "DetectTime": "2023-10-30T14:01:13.910494+02:00", "EventTime": "2023-10-30T14:01:13.910514+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYMzne4qmSzlIWyGA4"]} -{"Format": "IDEA0", "ID": "ba201c41-27ce-40d8-be1f-e5524e626f01", "DetectTime": "2023-10-30T14:01:13.918460+02:00", "EventTime": "2023-10-30T14:01:13.918480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.205.53.114 ", "ContentType": "text/plain"}], "uids": ["Cyk2ni4FUuqBO4bSQe"]} -{"Format": "IDEA0", "ID": "492b531f-a89b-4bf1-a85e-8f60cfe84f25", "DetectTime": "2023-10-30T14:01:13.947025+02:00", "EventTime": "2023-10-30T14:01:13.947052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CfSan1iyuLEkziaj5"]} -{"Format": "IDEA0", "ID": "1b67682a-6126-4c19-a390-6e4cc9b8148c", "DetectTime": "2023-10-30T14:01:13.971616+02:00", "EventTime": "2023-10-30T14:01:13.971635+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C87LEz3fqf9Ax5MIwa"]} -{"Format": "IDEA0", "ID": "9011acb2-81a0-4e87-8895-fdf03958ab13", "DetectTime": "2023-10-30T14:01:13.978984+02:00", "EventTime": "2023-10-30T14:01:13.979002+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbjSBnc7L9MRIhhdd"]} -{"Format": "IDEA0", "ID": "c1960cdf-6a03-4a70-aa6f-3778c2da1be6", "DetectTime": "2023-10-30T14:01:13.986023+02:00", "EventTime": "2023-10-30T14:01:13.986050+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COPiwTBgamUbwmD7d"]} -{"Format": "IDEA0", "ID": "833fe95e-5bbe-40c9-a306-04c69db6d171", "DetectTime": "2023-10-30T14:01:13.993183+02:00", "EventTime": "2023-10-30T14:01:13.993201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CwHJOn2q6hoe36fP54"]} -{"Format": "IDEA0", "ID": "9b7d8dc3-c2c4-4f34-978e-89e516e38138", "DetectTime": "2023-10-30T14:01:14.015851+02:00", "EventTime": "2023-10-30T14:01:14.015869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CVyZcT2NnPQjoE4b64"]} -{"Format": "IDEA0", "ID": "5e47bba7-9833-43cd-a1c6-e1d1c40b63ef", "DetectTime": "2023-10-30T14:01:14.039628+02:00", "EventTime": "2023-10-30T14:01:14.039645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Ce6ZG32tgugLri8DZj"]} -{"Format": "IDEA0", "ID": "1b3c1322-04de-4aa9-8e8c-e144ccae17dd", "DetectTime": "2023-10-30T14:01:14.058895+02:00", "EventTime": "2023-10-30T14:01:14.058911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CuhJSH3jmp4yG7yAMc"]} -{"Format": "IDEA0", "ID": "68685fd6-40e0-4009-80c0-dc10e0374287", "DetectTime": "2023-10-30T14:01:14.079702+02:00", "EventTime": "2023-10-30T14:01:14.079719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["Cnl8tq1rmLPdjXdjv"]} -{"Format": "IDEA0", "ID": "80b33f1b-585e-4fe2-85eb-2d33e2475302", "DetectTime": "2023-10-30T14:01:14.104688+02:00", "EventTime": "2023-10-30T14:01:14.104707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CxV2DG4XXejolieoXe"]} -{"Format": "IDEA0", "ID": "f5d9f937-fac2-4adf-879e-435b3c8b403b", "DetectTime": "2023-10-30T14:01:14.131988+02:00", "EventTime": "2023-10-30T14:01:14.132004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CsiRVK3RtMte703fic"]} -{"Format": "IDEA0", "ID": "36999d1b-778d-4220-a33e-ebdcb68cc08e", "DetectTime": "2023-10-30T14:01:14.154049+02:00", "EventTime": "2023-10-30T14:01:14.154069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CNjE7m1TP8sfgDJazj"]} -{"Format": "IDEA0", "ID": "3d64aabc-dc21-4b4b-9d87-56c06b3925ed", "DetectTime": "2023-10-30T14:01:14.177325+02:00", "EventTime": "2023-10-30T14:01:14.177345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQmBi417aqdNsQfYTf"]} -{"Format": "IDEA0", "ID": "21b7048b-ab7e-4351-af5f-4544100e154a", "DetectTime": "2023-10-30T14:01:14.201894+02:00", "EventTime": "2023-10-30T14:01:14.201911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cbau5F2xOAHpPSrtkf"]} -{"Format": "IDEA0", "ID": "3106c358-3b23-4536-8020-c4defc3586c8", "DetectTime": "2023-10-30T14:01:14.222042+02:00", "EventTime": "2023-10-30T14:01:14.222054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CIQa2X23VEvMLas2S2"]} -{"Format": "IDEA0", "ID": "29b95fd6-61cb-4424-9c5e-1dfafebb8eaa", "DetectTime": "2023-10-30T14:01:14.246286+02:00", "EventTime": "2023-10-30T14:01:14.246304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cjhe5YzlPuNQLn1N3"]} -{"Format": "IDEA0", "ID": "629a8c15-576e-4b1e-b0ac-a91d4086c987", "DetectTime": "2023-10-30T14:01:14.266997+02:00", "EventTime": "2023-10-30T14:01:14.267010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CNgdcIyCIaWr1Z11l"]} -{"Format": "IDEA0", "ID": "2b2fa143-338c-41a2-af70-b76cff9b7ba6", "DetectTime": "2023-10-30T14:01:14.288029+02:00", "EventTime": "2023-10-30T14:01:14.288047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CJwLXr2vMqWaThx49f"]} -{"Format": "IDEA0", "ID": "8e509861-7636-439e-99ee-c96470619fcc", "DetectTime": "2023-10-30T14:01:14.312620+02:00", "EventTime": "2023-10-30T14:01:14.312642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CHwlTn2U9z7PL4qB6j"]} -{"Format": "IDEA0", "ID": "4b63b22e-d3a9-422a-ad06-5b7269f943a1", "DetectTime": "2023-10-30T14:01:14.333415+02:00", "EventTime": "2023-10-30T14:01:14.333426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CKGBP7PliSitNqSH2"]} -{"Format": "IDEA0", "ID": "81c78854-378a-426b-bc57-980f48dd0169", "DetectTime": "2023-10-30T14:01:14.353324+02:00", "EventTime": "2023-10-30T14:01:14.353336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CVmbn01oeO46WO4Tm9"]} -{"Format": "IDEA0", "ID": "0a00e6f3-f7cc-4ad5-b51d-2635ee9127a9", "DetectTime": "2023-10-30T14:01:14.374089+02:00", "EventTime": "2023-10-30T14:01:14.374105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CbF3JW2ZLiQ9zlf0S8"]} -{"Format": "IDEA0", "ID": "c2a78f8e-4eba-473d-b478-4b05ce8dcd4c", "DetectTime": "2023-10-30T14:01:14.399349+02:00", "EventTime": "2023-10-30T14:01:14.399365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CHnjoz3eLYEzeFUNk5"]} -{"Format": "IDEA0", "ID": "447da76b-fd84-461a-87b7-27f7583fd1d1", "DetectTime": "2023-10-30T14:01:14.423412+02:00", "EventTime": "2023-10-30T14:01:14.423438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CzxbuT2X4yQNVJA8ai"]} -{"Format": "IDEA0", "ID": "bf76f051-9fb3-4b94-a030-6c0e38ae6012", "DetectTime": "2023-10-30T14:01:14.449455+02:00", "EventTime": "2023-10-30T14:01:14.449467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C8moq44Q9kMf18owO8"]} -{"Format": "IDEA0", "ID": "73257978-149a-40df-8a2b-4115393b9c3d", "DetectTime": "2023-10-30T14:01:14.468257+02:00", "EventTime": "2023-10-30T14:01:14.468274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CSgpVY3aVW9t9SR9y8"]} -{"Format": "IDEA0", "ID": "7c99029f-0da6-416d-b91e-7af4bf6ff871", "DetectTime": "2023-10-30T14:01:14.492436+02:00", "EventTime": "2023-10-30T14:01:14.492458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CFjkwG593VowIzG98"]} -{"Format": "IDEA0", "ID": "ad8c6b15-a4b1-49ea-a384-85befccd4aaf", "DetectTime": "2023-10-30T14:01:14.519035+02:00", "EventTime": "2023-10-30T14:01:14.519056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["C5zOQI1jEtrWo0maGc"]} -{"Format": "IDEA0", "ID": "381b2003-036c-433f-ac7a-5798bf63bee5", "DetectTime": "2023-10-30T14:01:14.541994+02:00", "EventTime": "2023-10-30T14:01:14.542011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CpHDOl3i2nydfm9foe"]} -{"Format": "IDEA0", "ID": "cb6132a1-8ba5-4e36-9716-0bff6fd9e623", "DetectTime": "2023-10-30T14:01:14.562883+02:00", "EventTime": "2023-10-30T14:01:14.562899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CVco692KICC43mG8M"]} -{"Format": "IDEA0", "ID": "5f9a52da-63fe-44c1-a3bb-e2356c94914a", "DetectTime": "2023-10-30T14:01:14.586553+02:00", "EventTime": "2023-10-30T14:01:14.586574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cb3Z25B8qipNSkFe6"]} -{"Format": "IDEA0", "ID": "a570137c-3d2a-4fdc-b1b8-31421c64cbdb", "DetectTime": "2023-10-30T14:01:14.611570+02:00", "EventTime": "2023-10-30T14:01:14.611585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CueH5F1i0iusTs5Nud"]} -{"Format": "IDEA0", "ID": "6a1e2560-b801-406b-b7e9-34c0d96ae6b7", "DetectTime": "2023-10-30T14:01:14.633848+02:00", "EventTime": "2023-10-30T14:01:14.633862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CgAfoD3v65xkPXY0W9"]} -{"Format": "IDEA0", "ID": "2ef138ab-b172-4a7f-9db6-598f6f70e982", "DetectTime": "2023-10-30T14:01:14.656568+02:00", "EventTime": "2023-10-30T14:01:14.656584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CzL3CpTTXmAunlvRb"]} -{"Format": "IDEA0", "ID": "061adfb3-a25d-4f4f-85a7-6d8270053138", "DetectTime": "2023-10-30T14:01:14.676872+02:00", "EventTime": "2023-10-30T14:01:14.676889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CcKMQZ3FA2Za1YyMDh"]} -{"Format": "IDEA0", "ID": "e4799b32-7fb6-4cde-a72e-19392e107c42", "DetectTime": "2023-10-30T14:01:14.701047+02:00", "EventTime": "2023-10-30T14:01:14.701065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CobDAHzvr7vv4WxJa"]} -{"Format": "IDEA0", "ID": "9f27d8dc-e591-4da5-afe8-da9b32ddf1f0", "DetectTime": "2023-10-30T14:01:14.727580+02:00", "EventTime": "2023-10-30T14:01:14.727599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["Cg2wg62ngmP4cNVGI1"]} -{"Format": "IDEA0", "ID": "16241046-6345-4a42-b8e2-271066c31529", "DetectTime": "2023-10-30T14:01:14.748940+02:00", "EventTime": "2023-10-30T14:01:14.748956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["C9pMIS2rr1T827QfI9"]} -{"Format": "IDEA0", "ID": "28baea05-bc6f-4191-a4d5-24c8a002104b", "DetectTime": "2023-10-30T14:01:14.768649+02:00", "EventTime": "2023-10-30T14:01:14.768670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CIJ3bU3gft1VXITDFd"]} -{"Format": "IDEA0", "ID": "363a693d-11fb-42b9-bc7f-825f0ad48146", "DetectTime": "2023-10-30T14:01:14.790052+02:00", "EventTime": "2023-10-30T14:01:14.790076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CXZ7AI2N4JosPh6Mnb"]} -{"Format": "IDEA0", "ID": "58fe3a94-9a76-4077-9c40-13e0b15e7e85", "DetectTime": "2023-10-30T14:01:14.812149+02:00", "EventTime": "2023-10-30T14:01:14.812171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C01ZoE4YW8sxM1cxAc"]} -{"Format": "IDEA0", "ID": "a0783d99-18b5-4caa-9fb3-7d175b6cfd56", "DetectTime": "2023-10-30T14:01:14.834718+02:00", "EventTime": "2023-10-30T14:01:14.834730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["Csjizl4EVHF2KskkO6"]} -{"Format": "IDEA0", "ID": "ea99a5ff-bba7-412b-973c-604cd5c7ac93", "DetectTime": "2023-10-30T14:01:14.855458+02:00", "EventTime": "2023-10-30T14:01:14.855474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.135.160 ", "ContentType": "text/plain"}], "uids": ["CmubE51aLo6Ycb9qNa"]} -{"Format": "IDEA0", "ID": "2c8340d5-0d11-4830-aa06-e812d7eff634", "DetectTime": "2023-10-30T14:01:14.878449+02:00", "EventTime": "2023-10-30T14:01:14.878463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Csysn54bUCH9tIdF16"]} -{"Format": "IDEA0", "ID": "cfab5f42-ef87-49ae-bf15-8283025ab520", "DetectTime": "2023-10-30T14:01:14.905742+02:00", "EventTime": "2023-10-30T14:01:14.905765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CWTjRC3avkktl3hDe2"]} -{"Format": "IDEA0", "ID": "4a98e1b0-8390-4315-9bad-8026e3fb13fd", "DetectTime": "2023-10-30T14:01:14.927994+02:00", "EventTime": "2023-10-30T14:01:14.928012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CmdAmgs497rUL51Y7"]} -{"Format": "IDEA0", "ID": "930285b7-7a00-4df0-b69f-992c7b48c492", "DetectTime": "2023-10-30T14:01:14.950594+02:00", "EventTime": "2023-10-30T14:01:14.950611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CzF97R3HeLR0qXUDi"]} -{"Format": "IDEA0", "ID": "a808df3f-147a-4034-9e65-f9460c7d8e48", "DetectTime": "2023-10-30T14:01:14.969087+02:00", "EventTime": "2023-10-30T14:01:14.969104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["ChWp7u4tcsHD344hRj"]} -{"Format": "IDEA0", "ID": "b24c0823-9f4f-41f9-b52c-0a73e94755b0", "DetectTime": "2023-10-30T14:01:14.983900+02:00", "EventTime": "2023-10-30T14:01:14.983914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["Ctrn0oeZifHRsMeng"]} -{"Format": "IDEA0", "ID": "ddc97ad8-ebe4-45fd-bc9b-f38669664351", "DetectTime": "2023-10-30T14:01:15.005502+02:00", "EventTime": "2023-10-30T14:01:15.005524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CUtGlE2DpehlANqObf"]} -{"Format": "IDEA0", "ID": "ea2210cf-3b96-4199-a00c-9e57abb7bb0e", "DetectTime": "2023-10-30T14:01:15.029154+02:00", "EventTime": "2023-10-30T14:01:15.029176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cgz8Vd3vOBRIL9S6P7"]} -{"Format": "IDEA0", "ID": "4d34a0c9-1f88-4355-87fd-ec47b52d19fe", "DetectTime": "2023-10-30T14:01:15.048715+02:00", "EventTime": "2023-10-30T14:01:15.048742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["C4xppA2hgavDdXcCEb"]} -{"Format": "IDEA0", "ID": "381934f9-ab9e-4457-a2bb-8d943bb57d53", "DetectTime": "2023-10-30T14:01:15.073210+02:00", "EventTime": "2023-10-30T14:01:15.073224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C2O7yO1BkOzjvx6Q4d"]} -{"Format": "IDEA0", "ID": "fbe334d8-c68b-447c-b20c-a34131574894", "DetectTime": "2023-10-30T14:01:15.092634+02:00", "EventTime": "2023-10-30T14:01:15.092646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CxDVO54PRYgqkjMxZ3"]} -{"Format": "IDEA0", "ID": "96d3b534-ba48-4714-9636-878bdd8bd8a6", "DetectTime": "2023-10-30T14:01:15.113874+02:00", "EventTime": "2023-10-30T14:01:15.113894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CTpXXU3Ng359cC0cy4"]} -{"Format": "IDEA0", "ID": "7ee6a6cb-842c-46ef-8bfc-5bee20f35162", "DetectTime": "2023-10-30T14:01:15.132091+02:00", "EventTime": "2023-10-30T14:01:15.132110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CKFwAhNPaWwNpYMV8"]} -{"Format": "IDEA0", "ID": "4d7c6880-91de-4b81-9815-fccba1da7e4a", "DetectTime": "2023-10-30T14:01:15.150638+02:00", "EventTime": "2023-10-30T14:01:15.150650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CyMyMa7oHPD5BrcRl"]} -{"Format": "IDEA0", "ID": "1ef35896-520f-4c3c-933f-f287ba9416ee", "DetectTime": "2023-10-30T14:01:15.171125+02:00", "EventTime": "2023-10-30T14:01:15.171145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CbSpkF3uUKNTZjewV5"]} -{"Format": "IDEA0", "ID": "eda5298c-efdd-4acc-a26a-100cc7ed0964", "DetectTime": "2023-10-30T14:01:15.192539+02:00", "EventTime": "2023-10-30T14:01:15.192556+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.40.213.191"], "Hostname": ["c-68-40-213-191.hsd1.mi.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 68.40.213.191 from 10.0.2.19. blacklisted IP AS: COMCAST-7922, US AS7922 rDNS: c-68-40-213-191.hsd1.mi.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2T1vy1y9MxXEWNJt6"]} -{"Format": "IDEA0", "ID": "3cf3ee50-d834-43aa-8793-85858bbe7e7b", "DetectTime": "2023-10-30T14:01:15.234267+02:00", "EventTime": "2023-10-30T14:01:15.234285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CQC9kn4yJWfIHToE15"]} -{"Format": "IDEA0", "ID": "e6c27a52-e0e9-4646-a27c-c34631c331dd", "DetectTime": "2023-10-30T14:01:15.256910+02:00", "EventTime": "2023-10-30T14:01:15.256931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CFziAc2LTuXodo5oY9"]} -{"Format": "IDEA0", "ID": "6c3ed6d4-2172-4c8c-8df8-f08e5309a28e", "DetectTime": "2023-10-30T14:01:15.278279+02:00", "EventTime": "2023-10-30T14:01:15.278297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CpmBPA2qRgHycGNsAc"]} -{"Format": "IDEA0", "ID": "71b9e250-f224-4ed1-bafd-a16b6e8fe6d8", "DetectTime": "2023-10-30T14:01:15.301129+02:00", "EventTime": "2023-10-30T14:01:15.301140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CGlgcu4cwwPnH9wMrg"]} -{"Format": "IDEA0", "ID": "fe0018f7-e03d-4b0d-a0a2-404d21a949f0", "DetectTime": "2023-10-30T14:01:15.320722+02:00", "EventTime": "2023-10-30T14:01:15.320745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CSNN5c3viqZVubMhu3"]} -{"Format": "Json", "ID": "fe0018f7-e03d-4b0d-a0a2-404d21a949f0", "DetectTime": "2023-10-30T14:01:15.320722+02:00", "EventTime": "2023-10-30T14:01:15.320745+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T17:17:38.197368+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2023/10/30 14:01:15.384155)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9d1d5ab3-ddc2-49d9-9090-d791938be2e5", "DetectTime": "2023-10-30T14:01:15.389430+02:00", "EventTime": "2023-10-30T14:01:15.389445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CCyJAa1g3AFo2MPPpc"]} -{"Format": "IDEA0", "ID": "b1fd7e49-e173-4a14-91d4-cc5b076655d1", "DetectTime": "2023-10-30T14:01:15.411259+02:00", "EventTime": "2023-10-30T14:01:15.411285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CE5NJX2t8Rhcjen1Hg"]} -{"Format": "IDEA0", "ID": "f088653c-2592-469a-b73a-c337a9a57c8d", "DetectTime": "2023-10-30T14:01:15.433428+02:00", "EventTime": "2023-10-30T14:01:15.433446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CocprF2X1HCBIhfFeg"]} -{"Format": "IDEA0", "ID": "ef8f80c8-7bf3-4a24-88ed-e96949637387", "DetectTime": "2023-10-30T14:01:15.456637+02:00", "EventTime": "2023-10-30T14:01:15.456648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C6TD2t2amMnuJoF8j9"]} -{"Format": "IDEA0", "ID": "b282fcdf-71ee-4a80-a192-0d2ccf955952", "DetectTime": "2023-10-30T14:01:15.481332+02:00", "EventTime": "2023-10-30T14:01:15.481353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C0arnvwGsP7nKvAZd"]} -{"Format": "IDEA0", "ID": "bb952a94-3865-4e8b-8731-ddd41c306067", "DetectTime": "2023-10-30T14:01:15.505237+02:00", "EventTime": "2023-10-30T14:01:15.505254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CaHNCp4tqEQTMhp633"]} -{"Format": "IDEA0", "ID": "008775ea-b379-4e75-a762-c3c561c24fe4", "DetectTime": "2023-10-30T14:01:15.536279+02:00", "EventTime": "2023-10-30T14:01:15.536300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["C2GPGj4uz7dPsizZI3"]} -{"Format": "IDEA0", "ID": "b3a04892-4b99-4ff3-8435-3b412bb03558", "DetectTime": "2023-10-30T14:01:15.559824+02:00", "EventTime": "2023-10-30T14:01:15.559839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CaRnQ3RemiJBe14G1"]} -{"Format": "IDEA0", "ID": "1572f9f3-1296-495c-9682-dfced8ab3f95", "DetectTime": "2023-10-30T14:01:15.587307+02:00", "EventTime": "2023-10-30T14:01:15.587326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["COeFJ73Hh4iVdXFcya"]} -{"Format": "IDEA0", "ID": "49589a4d-9fee-4cbf-8ca0-c649c15d1c6a", "DetectTime": "2023-10-30T14:01:15.612538+02:00", "EventTime": "2023-10-30T14:01:15.612557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CbhLdl3Mi7XUjhBCze"]} -{"Format": "IDEA0", "ID": "a9a0157c-cc97-475a-abf5-48ed56345e9c", "DetectTime": "2023-10-30T14:01:15.636653+02:00", "EventTime": "2023-10-30T14:01:15.636665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CkOzCq35SfVKb7BAfj"]} -{"Format": "IDEA0", "ID": "95732a00-3b3d-4186-80cd-9dcaeec9b187", "DetectTime": "2023-10-30T14:01:15.656289+02:00", "EventTime": "2023-10-30T14:01:15.656315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["Ck9xQx1L53haP8vb3f"]} -{"Format": "IDEA0", "ID": "321d2d14-74c9-49e0-ba0a-7d3eb7d973df", "DetectTime": "2023-10-30T14:01:15.674896+02:00", "EventTime": "2023-10-30T14:01:15.674912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CO2Hsq31dfZOhms5S1"]} -{"Format": "IDEA0", "ID": "fb99c7b7-2b0a-4737-806d-26bec4ed476d", "DetectTime": "2023-10-30T14:01:15.698885+02:00", "EventTime": "2023-10-30T14:01:15.698904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["Cp3StV3IVIEDiuyptf"]} -{"Format": "IDEA0", "ID": "f57be419-9bc7-4874-af8c-cb9816e8d099", "DetectTime": "2023-10-30T14:01:15.720613+02:00", "EventTime": "2023-10-30T14:01:15.720626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CknWyhxBpCm5rDOn9"]} -{"Format": "IDEA0", "ID": "01e5fb57-8aa6-422c-af3c-b85fa9728bc0", "DetectTime": "2023-10-30T14:01:15.742503+02:00", "EventTime": "2023-10-30T14:01:15.742513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CAfGI54seca1XS6Irb"]} -{"Format": "IDEA0", "ID": "c713182b-9aa9-439e-bc19-430a8fc93ca8", "DetectTime": "2023-10-30T14:01:15.765874+02:00", "EventTime": "2023-10-30T14:01:15.765900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["Cz7vf31UIQvhINjn3l"]} -{"Format": "IDEA0", "ID": "fbdde012-648d-488b-aee8-289b3706d37a", "DetectTime": "2023-10-30T14:01:15.788487+02:00", "EventTime": "2023-10-30T14:01:15.788503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CvdrgP2ZIxBoEb7rNg"]} -{"Format": "IDEA0", "ID": "bebc8243-a34d-4870-8cf5-05a49fae4079", "DetectTime": "2023-10-30T14:01:15.810265+02:00", "EventTime": "2023-10-30T14:01:15.810277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C26m1P2mmtec1VuEMh"]} -{"Format": "IDEA0", "ID": "5c4d4964-6f2c-4612-a118-4af05786824b", "DetectTime": "2023-10-30T14:01:15.832883+02:00", "EventTime": "2023-10-30T14:01:15.832903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CN8r5Z2nbHdSdTD3Pb"]} -{"Format": "IDEA0", "ID": "0f0e0ab2-ba52-47bb-8460-bf0a6ddb1558", "DetectTime": "2023-10-30T14:01:15.852175+02:00", "EventTime": "2023-10-30T14:01:15.852196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CMDVmo3RpkajN1RHX2"]} -{"Format": "IDEA0", "ID": "1c148475-888b-4315-b58e-236ec73fefcf", "DetectTime": "2023-10-30T14:01:15.875945+02:00", "EventTime": "2023-10-30T14:01:15.875964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["Cz60FvDvl4aIDL5bj"]} -{"Format": "IDEA0", "ID": "ebe4dc0a-fd6b-4137-877c-a22530941ec3", "DetectTime": "2023-10-30T14:01:15.896266+02:00", "EventTime": "2023-10-30T14:01:15.896278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CdOVJn1qzT7V0ptfw"]} -{"Format": "IDEA0", "ID": "8dd5d10a-db1d-48ee-86dd-acc3ee0e9b33", "DetectTime": "2023-10-30T14:01:15.915749+02:00", "EventTime": "2023-10-30T14:01:15.915765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Ct3pEn2lNz9ZGbmHna"]} -{"Format": "IDEA0", "ID": "09526ce3-fd1a-4feb-877e-8282904bec9c", "DetectTime": "2023-10-30T14:01:15.935456+02:00", "EventTime": "2023-10-30T14:01:15.935480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C3n3Mv1CXb8xeagHzf"]} -{"Format": "IDEA0", "ID": "a97f92b2-f192-4e8a-ad60-c70df22749d9", "DetectTime": "2023-10-30T14:01:15.958172+02:00", "EventTime": "2023-10-30T14:01:15.958194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CiIHja4O5ZHHY29dx3"]} -{"Format": "IDEA0", "ID": "2bbf41bc-5e85-4240-9486-8e256984d973", "DetectTime": "2023-10-30T14:01:15.981657+02:00", "EventTime": "2023-10-30T14:01:15.981678+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.184.109.119"], "Hostname": ["072-184-109-119.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 72.184.109.119 from 10.0.2.19. blacklisted IP AS: BHN-33363, US AS33363 rDNS: 072-184-109-119.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChW6GX24l8nPLGwdIg"]} -{"Format": "IDEA0", "ID": "ce3ccf9a-954b-4bbb-95bc-71686e85b679", "DetectTime": "2023-10-30T14:01:16.026360+02:00", "EventTime": "2023-10-30T14:01:16.026375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CBsJ5g2NKJ3dnJ8sZg"]} -{"Format": "IDEA0", "ID": "b3196d56-bfa2-414d-9aae-2852fd33bf63", "DetectTime": "2023-10-30T14:01:16.049873+02:00", "EventTime": "2023-10-30T14:01:16.049889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["Cjm15Z13nuuOaGLzO2"]} -{"Format": "IDEA0", "ID": "ed160c8d-1a1a-4a99-b0c2-a88c9c893c4f", "DetectTime": "2023-10-30T14:01:16.071392+02:00", "EventTime": "2023-10-30T14:01:16.071404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Cy2KxbqVxS1f0SjP9"]} -{"Format": "IDEA0", "ID": "198aad8f-7fdf-49ef-b735-615ac94d125b", "DetectTime": "2023-10-30T14:01:16.096094+02:00", "EventTime": "2023-10-30T14:01:16.096113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CGsk5J1i2aPHL3V3d8"]} -{"Format": "IDEA0", "ID": "c8fcba44-81b7-4e9f-846b-7a40c58f2941", "DetectTime": "2023-10-30T14:01:16.112940+02:00", "EventTime": "2023-10-30T14:01:16.112951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CgFoG5BiwdQLpnsSd"]} -{"Format": "IDEA0", "ID": "7064b052-eca2-4da8-b44f-5996d0f4df64", "DetectTime": "2023-10-30T14:01:16.134126+02:00", "EventTime": "2023-10-30T14:01:16.134143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["ChpLaX14Vmb8fw0UKl"]} -{"Format": "IDEA0", "ID": "dde7e782-8d5e-4aab-92a1-195b55671700", "DetectTime": "2023-10-30T14:01:16.157453+02:00", "EventTime": "2023-10-30T14:01:16.157465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CEWcT43ZRoQBuB2Zg1"]} -{"Format": "IDEA0", "ID": "22556c1e-4532-40e1-83a9-f1ef8e047e46", "DetectTime": "2023-10-30T14:01:16.180014+02:00", "EventTime": "2023-10-30T14:01:16.180027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["C9mvb14ky3Iw1LSf"]} -{"Format": "IDEA0", "ID": "eba1ada7-3849-4b21-a531-77742e5e2086", "DetectTime": "2023-10-30T14:01:16.200306+02:00", "EventTime": "2023-10-30T14:01:16.200327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CHANWM3TUtYSzfmyye"]} -{"Format": "IDEA0", "ID": "3d109f35-8045-4a9f-875b-3b02caef1772", "DetectTime": "2023-10-30T14:01:16.223274+02:00", "EventTime": "2023-10-30T14:01:16.223298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cbxh2n3pZVFVt7pLD4"]} -{"Format": "IDEA0", "ID": "40f7e4dd-c6a2-4c5f-ad8a-505ded7612f1", "DetectTime": "2023-10-30T14:01:16.247124+02:00", "EventTime": "2023-10-30T14:01:16.247140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CPJ8OyPUc6MYHpWsi"]} -{"Format": "IDEA0", "ID": "85698075-be16-4456-820a-2bb5146e03f7", "DetectTime": "2023-10-30T14:01:16.267698+02:00", "EventTime": "2023-10-30T14:01:16.267715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CfFLR01INmQhYZa0E8"]} -{"Format": "IDEA0", "ID": "261e7ecb-8d94-4328-b436-c80c049c5ca6", "DetectTime": "2023-10-30T14:01:16.290868+02:00", "EventTime": "2023-10-30T14:01:16.290888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CtPyOfRyhY5mfdoV"]} -{"Format": "IDEA0", "ID": "0e547871-007f-4a61-b78a-70658fb9715a", "DetectTime": "2023-10-30T14:01:16.309976+02:00", "EventTime": "2023-10-30T14:01:16.309993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["C78Sf12eoFkOz5dGx5"]} -{"Format": "IDEA0", "ID": "2be656cc-a62c-436b-9c9a-0ce7f44b7464", "DetectTime": "2023-10-30T14:01:16.333444+02:00", "EventTime": "2023-10-30T14:01:16.333461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEDOOf4iaH9NA7dDX6"]} -{"Format": "IDEA0", "ID": "685238f4-8c51-482d-871f-b59dedf09992", "DetectTime": "2023-10-30T14:01:16.356706+02:00", "EventTime": "2023-10-30T14:01:16.356723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CoxFtD1aVqiwqwAgcd"]} -{"Format": "IDEA0", "ID": "8487323e-08f4-421b-a778-b9edc3fc7f69", "DetectTime": "2023-10-30T14:01:16.383887+02:00", "EventTime": "2023-10-30T14:01:16.383904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CupMrg1tr3Urb1OCa7"]} -{"Format": "IDEA0", "ID": "327382a2-819d-4ead-b887-a63823d37e25", "DetectTime": "2023-10-30T14:01:16.405672+02:00", "EventTime": "2023-10-30T14:01:16.405684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CSBbV13XYvLIogquB8"]} -{"Format": "IDEA0", "ID": "798aa2b3-4122-40ac-93f7-ff324c3709f1", "DetectTime": "2023-10-30T14:01:16.426940+02:00", "EventTime": "2023-10-30T14:01:16.426954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CgFWxQqX9tvW2iI42"]} -{"Format": "IDEA0", "ID": "a3c7b806-37e9-45c6-9f74-1af2fe51642c", "DetectTime": "2023-10-30T14:01:16.446168+02:00", "EventTime": "2023-10-30T14:01:16.446183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C1mVJ34vIbDO25Kz34"]} -{"Format": "IDEA0", "ID": "cf4d5cb7-ff2a-4cad-9e11-c57fa1808cc3", "DetectTime": "2023-10-30T14:01:16.467468+02:00", "EventTime": "2023-10-30T14:01:16.467490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CyBdBi19gMVF2OvRCg"]} -{"Format": "IDEA0", "ID": "bef4e04c-7813-4c79-a261-e05c066b6cdb", "DetectTime": "2023-10-30T14:01:16.489569+02:00", "EventTime": "2023-10-30T14:01:16.489586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["CcT3g21giKNHrq33T9"]} -{"Format": "IDEA0", "ID": "2c37e6a9-7e35-40e5-8112-36d601915448", "DetectTime": "2023-10-30T14:01:16.510358+02:00", "EventTime": "2023-10-30T14:01:16.510374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CLob7i1ub153D872P"]} -{"Format": "IDEA0", "ID": "c624b7da-4a71-4ace-937f-72ee5dbded01", "DetectTime": "2023-10-30T14:01:16.535344+02:00", "EventTime": "2023-10-30T14:01:16.535361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C0WrK73nhJVtH5K6A7"]} -{"Format": "IDEA0", "ID": "81fcd800-f80a-4f5a-bea9-3ea90732ee1b", "DetectTime": "2023-10-30T14:01:16.559395+02:00", "EventTime": "2023-10-30T14:01:16.559419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["Cm0IGZ3o1yTfNovg7i"]} -{"Format": "IDEA0", "ID": "62e78288-9879-4764-b90c-42419ea6f7d6", "DetectTime": "2023-10-30T14:01:16.581187+02:00", "EventTime": "2023-10-30T14:01:16.581203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CmaxEg3V1yZ3WB6oXe"]} -{"Format": "IDEA0", "ID": "3d470d8d-3caa-42a9-b17e-d751c7dd673f", "DetectTime": "2023-10-30T14:01:16.604217+02:00", "EventTime": "2023-10-30T14:01:16.604237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CLBCYi4vipIW9NtHEl"]} -{"Format": "IDEA0", "ID": "fb550fd5-60b9-4bae-85ed-58f4d7d56f74", "DetectTime": "2023-10-30T14:01:16.628134+02:00", "EventTime": "2023-10-30T14:01:16.628146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CMPv7A28YxG4EllqFe"]} -{"Format": "IDEA0", "ID": "5716251e-b1cb-4425-b7bb-7fc9ca4dca63", "DetectTime": "2023-10-30T14:01:16.649827+02:00", "EventTime": "2023-10-30T14:01:16.649848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CwRBkV2rlMjrdaUPZ9"]} -{"Format": "IDEA0", "ID": "bb129991-cf14-44be-ad12-a325cb428f32", "DetectTime": "2023-10-30T14:01:16.670299+02:00", "EventTime": "2023-10-30T14:01:16.670319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CU2byl2uc74fyuCOz"]} -{"Format": "IDEA0", "ID": "b7fb1f60-47ac-4920-8f9e-d65f1808b9d9", "DetectTime": "2023-10-30T14:01:16.693202+02:00", "EventTime": "2023-10-30T14:01:16.693215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CRXzeH13c1irud7ms4"]} -{"Format": "IDEA0", "ID": "c3cd97e3-03e9-4804-99b3-fb2f3b03bc16", "DetectTime": "2023-10-30T14:01:16.714316+02:00", "EventTime": "2023-10-30T14:01:16.714338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CxQxZk2IMNS0cytRzg"]} -{"Format": "IDEA0", "ID": "5b31164b-cd48-4058-b2cd-76f8d42ff3b7", "DetectTime": "2023-10-30T14:01:16.730189+02:00", "EventTime": "2023-10-30T14:01:16.730202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CWZ8rw1jljlXfkIfFf"]} -{"Format": "IDEA0", "ID": "7fc9d355-0111-4fac-814d-9b3dddc2fb0f", "DetectTime": "2023-10-30T14:01:16.753838+02:00", "EventTime": "2023-10-30T14:01:16.753849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CIBZt43Poio5GPppJc"]} -{"Format": "IDEA0", "ID": "ea87315e-6f45-4d53-b927-78617ae78c85", "DetectTime": "2023-10-30T14:01:16.770481+02:00", "EventTime": "2023-10-30T14:01:16.770493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.63.216.247 ", "ContentType": "text/plain"}], "uids": ["C8IWoq4vstH6l989m4"]} -{"Format": "IDEA0", "ID": "f7ca8372-2f3b-461e-991a-c4fa5f197e0c", "DetectTime": "2023-10-30T14:01:16.791444+02:00", "EventTime": "2023-10-30T14:01:16.791462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CnYPwU36mSwgYM9yzd"]} -{"Format": "IDEA0", "ID": "ddc9a5d9-5545-4892-a55c-4f8107f2506e", "DetectTime": "2023-10-30T14:01:16.817654+02:00", "EventTime": "2023-10-30T14:01:16.817695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CkhYTC1SLgrc2K6grh"]} -{"Format": "IDEA0", "ID": "200d7dc5-6bdd-4ee3-b1e3-bd0de0f1f35d", "DetectTime": "2023-10-30T14:01:16.837658+02:00", "EventTime": "2023-10-30T14:01:16.837680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CzrsMH1MBHuN9GmU62"]} -{"Format": "IDEA0", "ID": "0f873130-d2e2-467d-b40b-3c80c93a8fd1", "DetectTime": "2023-10-30T14:01:16.864350+02:00", "EventTime": "2023-10-30T14:01:16.864375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CjAv7R1LVJf9yq1kX6"]} -{"Format": "IDEA0", "ID": "da877813-4c64-4a23-84d0-850a378d162f", "DetectTime": "2023-10-30T14:01:16.887761+02:00", "EventTime": "2023-10-30T14:01:16.887784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CAfyjJ6af9hMU7Xlf"]} -{"Format": "IDEA0", "ID": "8c8436df-d3a6-4de0-a677-00619fcde9f6", "DetectTime": "2023-10-30T14:01:16.915234+02:00", "EventTime": "2023-10-30T14:01:16.915251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CwPyAr1YnPd2rcILXd"]} -{"Format": "IDEA0", "ID": "a3177e7a-9505-48dc-abea-f7755ec08846", "DetectTime": "2023-10-30T14:01:16.939462+02:00", "EventTime": "2023-10-30T14:01:16.939481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["C5nQ1WDuNIRPcdAH1"]} -{"Format": "IDEA0", "ID": "69eb317c-286d-45bf-b72d-802cfc789630", "DetectTime": "2023-10-30T14:01:16.960265+02:00", "EventTime": "2023-10-30T14:01:16.960287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["C8CFUk1xYGQphQtaaj"]} -{"Format": "IDEA0", "ID": "0bd3880c-6646-49cf-9bf9-fa91cd575346", "DetectTime": "2023-10-30T14:01:16.980609+02:00", "EventTime": "2023-10-30T14:01:16.980627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C6xCiNYyFZjDiDbU5"]} -{"Format": "IDEA0", "ID": "e6e397d8-5d44-4ed2-a9ac-12e47de53f7c", "DetectTime": "2023-10-30T14:01:16.997185+02:00", "EventTime": "2023-10-30T14:01:16.997203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CnnRom1NAXXfQXYzYb"]} -{"Format": "IDEA0", "ID": "c1af066f-9bfd-4089-b00e-58c870994fb0", "DetectTime": "2023-10-30T14:01:17.021541+02:00", "EventTime": "2023-10-30T14:01:17.021558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CD7qHK9wM8pEVwiIl"]} -{"Format": "IDEA0", "ID": "2318d111-f0dc-4554-b5ef-59bb658cf1b6", "DetectTime": "2023-10-30T14:01:17.046348+02:00", "EventTime": "2023-10-30T14:01:17.046365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CzUdODHuLTakOP9rj"]} -{"Format": "IDEA0", "ID": "9f93c05e-f7f8-4585-a3cf-e99682f56225", "DetectTime": "2023-10-30T14:01:17.070691+02:00", "EventTime": "2023-10-30T14:01:17.070708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CsqotJ3LFFrkkndTv2"]} -{"Format": "IDEA0", "ID": "9a9be3ad-dac2-45a4-ab3e-9ab8eb895413", "DetectTime": "2023-10-30T14:01:17.092080+02:00", "EventTime": "2023-10-30T14:01:17.092098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C3Eyy62YYXeUzphr33"]} -{"Format": "IDEA0", "ID": "e419b5f3-47ca-48db-9863-d0773387cbd9", "DetectTime": "2023-10-30T14:01:17.113629+02:00", "EventTime": "2023-10-30T14:01:17.113647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CVfEbxRz8GmOCek3"]} -{"Format": "IDEA0", "ID": "aef58674-f035-4545-b528-d31c418722a2", "DetectTime": "2023-10-30T14:01:17.131880+02:00", "EventTime": "2023-10-30T14:01:17.131895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvvqAD4ytNGCAUbIvh"]} -{"Format": "IDEA0", "ID": "46e3f974-9b4a-4d87-9f2e-82af74285440", "DetectTime": "2023-10-30T14:01:17.160650+02:00", "EventTime": "2023-10-30T14:01:17.160667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C6Sryo3IFg3RWU033c"]} -{"Format": "IDEA0", "ID": "7aa87255-691e-4fab-8ee3-d866966fc3fb", "DetectTime": "2023-10-30T14:01:17.185770+02:00", "EventTime": "2023-10-30T14:01:17.185787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiDsITt9fk4Sts0H2"]} -{"Format": "IDEA0", "ID": "a40ce039-5969-4313-a88d-219e3dd81430", "DetectTime": "2023-10-30T14:01:17.207325+02:00", "EventTime": "2023-10-30T14:01:17.207343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Cd320uOqSoXTY55A1"]} -{"Format": "IDEA0", "ID": "9bee75dc-cf0a-4f1d-84a1-0c00d96d19e0", "DetectTime": "2023-10-30T14:01:17.225552+02:00", "EventTime": "2023-10-30T14:01:17.225568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CXtViX6bakqZuOWH8"]} -{"Format": "IDEA0", "ID": "487405a6-9598-4d02-8d68-5741435cf4b8", "DetectTime": "2023-10-30T14:01:17.245682+02:00", "EventTime": "2023-10-30T14:01:17.245700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CDI1l52VCGxnsMG2Ca"]} -{"Format": "IDEA0", "ID": "31eb1ab4-8b8d-44f6-a7eb-ce8be7e3bf89", "DetectTime": "2023-10-30T14:01:17.274081+02:00", "EventTime": "2023-10-30T14:01:17.274094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C2puVG33MyKawWEt94"]} -{"Format": "IDEA0", "ID": "8caf5860-c294-49d8-aeb9-2922dd1f71f7", "DetectTime": "2023-10-30T14:01:17.304181+02:00", "EventTime": "2023-10-30T14:01:17.304194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CiMich1GChhXLnn5A7", "CbjSBnc7L9MRIhhdd", "CYMzne4qmSzlIWyGA4", "CH0xGN6ffV7rhRwv7"]} -{"Format": "IDEA0", "ID": "0f87bb0e-4a1f-44ae-8b45-a4710dc7161d", "DetectTime": "2023-10-30T14:01:17.319909+02:00", "EventTime": "2023-10-30T14:01:17.319939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiMich1GChhXLnn5A7"]} -{"Format": "IDEA0", "ID": "0057f65d-3792-46e3-abaf-d3d85c13e39c", "DetectTime": "2023-10-30T14:01:17.338208+02:00", "EventTime": "2023-10-30T14:01:17.338224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CSD4bt22H3bP8oC1rd"]} -{"Format": "IDEA0", "ID": "8417f7aa-cd51-497c-bd22-e90847430a2b", "DetectTime": "2023-10-30T14:01:17.369125+02:00", "EventTime": "2023-10-30T14:01:17.369147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.162.239.239 ", "ContentType": "text/plain"}], "uids": ["CdRQm63qtbqol4eszl"]} -{"Format": "IDEA0", "ID": "14c7ee55-9c1c-424f-86ea-9d90612a1555", "DetectTime": "2023-10-30T14:01:17.394332+02:00", "EventTime": "2023-10-30T14:01:17.394347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CrnLNH2Sylm8BV95t7"]} -{"Format": "IDEA0", "ID": "baf6ffa0-bd63-443a-9974-6348e680b3f4", "DetectTime": "2023-10-30T14:01:17.417703+02:00", "EventTime": "2023-10-30T14:01:17.417721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CF5FOW3078a0R54Oih"]} -{"Format": "IDEA0", "ID": "0d37e578-6d14-4190-974b-cdf8fa03b971", "DetectTime": "2023-10-30T14:01:17.439062+02:00", "EventTime": "2023-10-30T14:01:17.439085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CrqTxg4IXs1IeiBSw4"]} -{"Format": "IDEA0", "ID": "9d5bca5a-0014-4b67-bbba-a4dc323af525", "DetectTime": "2023-10-30T14:01:17.461394+02:00", "EventTime": "2023-10-30T14:01:17.461409+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1lyAd2GRNdDSpLDGf"]} -{"Format": "IDEA0", "ID": "e38403eb-6f78-4478-9550-2b93e192699e", "DetectTime": "2023-10-30T14:01:17.482340+02:00", "EventTime": "2023-10-30T14:01:17.482364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CgeMj5pdNiX4Vbg8h"]} -{"Format": "IDEA0", "ID": "b718c9c5-763e-4207-88c8-af256ad2225c", "DetectTime": "2023-10-30T14:01:17.507446+02:00", "EventTime": "2023-10-30T14:01:17.507470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CFd8fG1gnQPzB1oRyb"]} -{"Format": "IDEA0", "ID": "b658501b-e9d0-46ce-a6e4-2b55b394a472", "DetectTime": "2023-10-30T14:01:17.528284+02:00", "EventTime": "2023-10-30T14:01:17.528300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CltdkX1SdK2dKVUxJd"]} -{"Format": "IDEA0", "ID": "3525fe33-cef5-4cf5-80b4-eaf724949413", "DetectTime": "2023-10-30T14:01:17.554565+02:00", "EventTime": "2023-10-30T14:01:17.554586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CeFUPv1pYpeGGFQKg7"]} -{"Format": "IDEA0", "ID": "a23382f8-b209-40dc-99e5-ef118f88e9f9", "DetectTime": "2023-10-30T14:01:17.582456+02:00", "EventTime": "2023-10-30T14:01:17.582482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["CwMsnD2gLWGBKmXu0i"]} -{"Format": "IDEA0", "ID": "59b40734-86ce-4396-83ba-ce4660aea5eb", "DetectTime": "2023-10-30T14:01:17.602093+02:00", "EventTime": "2023-10-30T14:01:17.602113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CNZOF12iV7R7o5H1T9"]} -{"Format": "IDEA0", "ID": "268644fb-3103-4e89-8b88-80bfa994128a", "DetectTime": "2023-10-30T14:01:17.622157+02:00", "EventTime": "2023-10-30T14:01:17.622178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIOUIt17iKRCqz0HIb"]} -{"Format": "IDEA0", "ID": "94f69db3-dc56-46e5-9772-ebb8a9040e2f", "DetectTime": "2023-10-30T14:01:17.641073+02:00", "EventTime": "2023-10-30T14:01:17.641086+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYZ4wE36z22HUIFvVe"]} -{"Format": "IDEA0", "ID": "9a9df752-2b56-420e-852d-1ca767c1ec12", "DetectTime": "2023-10-30T14:01:17.661936+02:00", "EventTime": "2023-10-30T14:01:17.661957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["C1B3ik2i612dCd90F9"]} -{"Format": "IDEA0", "ID": "bca7e303-e5c9-4937-a096-d7783302a55d", "DetectTime": "2023-10-30T14:01:17.692992+02:00", "EventTime": "2023-10-30T14:01:17.693010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CGYalG1RRbBKGQedvf"]} -{"Format": "IDEA0", "ID": "4c11b827-f060-4f5a-b541-3409d6f1b49e", "DetectTime": "2023-10-30T14:01:17.717942+02:00", "EventTime": "2023-10-30T14:01:17.717958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CyFSl54i1663OVOFqj"]} -{"Format": "IDEA0", "ID": "fc6f8471-9ef5-40ee-bca8-300c37d41257", "DetectTime": "2023-10-30T14:01:17.745292+02:00", "EventTime": "2023-10-30T14:01:17.745319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C734No1s3t5Ygq61x1"]} -{"Format": "IDEA0", "ID": "1c2f3571-e96b-4444-bb6a-97dc055566d8", "DetectTime": "2023-10-30T14:01:17.769192+02:00", "EventTime": "2023-10-30T14:01:17.769210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CsUKMh26vDH2OabLZd"]} -{"Format": "IDEA0", "ID": "5c4b113f-7832-48e4-8e69-2e8aaf01fa6f", "DetectTime": "2023-10-30T14:01:17.796062+02:00", "EventTime": "2023-10-30T14:01:17.796087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Ck4NKT1KX4lX7QvZ6d"]} -{"Format": "IDEA0", "ID": "e289e2ad-f4c9-4555-84dc-ee5b44e18760", "DetectTime": "2023-10-30T14:01:17.816760+02:00", "EventTime": "2023-10-30T14:01:17.816778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CnVHGc3l4DHWopdEVd"]} -{"Format": "IDEA0", "ID": "7c75bf87-15f1-4a8c-8641-f8bd2f37e68b", "DetectTime": "2023-10-30T14:01:17.835010+02:00", "EventTime": "2023-10-30T14:01:17.835029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CvXvzPVKq5uWETOQ8"]} -{"Format": "IDEA0", "ID": "3c87c897-bdbe-4183-8964-8959660687c3", "DetectTime": "2023-10-30T14:01:17.854748+02:00", "EventTime": "2023-10-30T14:01:17.854760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["Cw6iSz3aZ0NWMaGY3f"]} -{"Format": "IDEA0", "ID": "d9d522a6-7740-4f04-a32a-70389ace0c71", "DetectTime": "2023-10-30T14:01:17.874583+02:00", "EventTime": "2023-10-30T14:01:17.874608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CBx8zR3jdsuYjT453c"]} -{"Format": "IDEA0", "ID": "b8c663d9-3279-4547-b53b-001367387036", "DetectTime": "2023-10-30T14:01:17.896315+02:00", "EventTime": "2023-10-30T14:01:17.896332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ca5yeo4m1kndDNkemh"]} -{"Format": "IDEA0", "ID": "69abb5b1-9b37-4cbe-a83b-a3b4aaae0609", "DetectTime": "2023-10-30T14:01:17.922431+02:00", "EventTime": "2023-10-30T14:01:17.922452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["Cs6OqieSUqsYeVLXa"]} -{"Format": "IDEA0", "ID": "0d7cdb91-8632-4bbe-8dcb-558dc1a0ee83", "DetectTime": "2023-10-30T14:01:17.942258+02:00", "EventTime": "2023-10-30T14:01:17.942277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CKa0u11sxS8vEEcKJ7"]} -{"Format": "IDEA0", "ID": "d03608f1-6a3d-46b0-a122-aed308d780da", "DetectTime": "2023-10-30T14:01:17.962991+02:00", "EventTime": "2023-10-30T14:01:17.963012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CkbgcXBKTGWbMJIa4"]} -{"Format": "IDEA0", "ID": "c7367fa9-c961-49aa-9a45-0a6c3269b3c3", "DetectTime": "2023-10-30T14:01:17.983554+02:00", "EventTime": "2023-10-30T14:01:17.983575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CZutyj2HSbzs8IUmwi"]} -{"Format": "IDEA0", "ID": "c0da28ee-9e87-4714-b77b-ce657adf80dc", "DetectTime": "2023-10-30T14:01:18.003960+02:00", "EventTime": "2023-10-30T14:01:18.003972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CaQHWB4GqzTYmfXMPf"]} -{"Format": "IDEA0", "ID": "aa3981fd-4259-4062-857c-ef35c7971cd4", "DetectTime": "2023-10-30T14:01:18.022290+02:00", "EventTime": "2023-10-30T14:01:18.022313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C1H5z12rnkprjyHlL3"]} -{"Format": "IDEA0", "ID": "624229bd-4fb8-4040-bf55-f5f8ed5d4fe4", "DetectTime": "2023-10-30T14:01:18.048682+02:00", "EventTime": "2023-10-30T14:01:18.048701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CHTICp1b7DOTih9FH2"]} -{"Format": "IDEA0", "ID": "13dae88a-28d3-45c9-9a28-4bab015e5709", "DetectTime": "2023-10-30T14:01:18.067206+02:00", "EventTime": "2023-10-30T14:01:18.067217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CdFNoqM8wYxi160Eb"]} -{"Format": "IDEA0", "ID": "dc259884-9b91-4a4d-892e-4c52414de41e", "DetectTime": "2023-10-30T14:01:18.087291+02:00", "EventTime": "2023-10-30T14:01:18.087307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.103.182 ", "ContentType": "text/plain"}], "uids": ["C5xVLA1w1NR9XrdzA2"]} -{"Format": "IDEA0", "ID": "eae34bff-57ea-4ed8-b922-f2b2427b34a6", "DetectTime": "2023-10-30T14:01:18.118322+02:00", "EventTime": "2023-10-30T14:01:18.118341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CPmnWD1rb5w09e9Asb"]} -{"Format": "IDEA0", "ID": "2f723d8f-7845-46e7-83d9-37e9b606edc2", "DetectTime": "2023-10-30T14:01:18.147383+02:00", "EventTime": "2023-10-30T14:01:18.147403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["C8W05mRdwETEb4jo9"]} -{"Format": "IDEA0", "ID": "c5d069f8-8226-4d5b-8f89-41ee6f75f3a1", "DetectTime": "2023-10-30T14:01:18.165927+02:00", "EventTime": "2023-10-30T14:01:18.165947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEIsVI2KxyhA87wW92"]} -{"Format": "IDEA0", "ID": "d0de7158-d09d-4aca-bcf7-cdcefbcf23ae", "DetectTime": "2023-10-30T14:01:18.187447+02:00", "EventTime": "2023-10-30T14:01:18.187471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CzJW1e23Tolvhwh3Yl"]} -{"Format": "IDEA0", "ID": "35796693-6049-47cb-be71-e35155c09d7c", "DetectTime": "2023-10-30T14:01:18.210688+02:00", "EventTime": "2023-10-30T14:01:18.210705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CPJ7Fo41EC78p6l9F7"]} -{"Format": "IDEA0", "ID": "d28e77bb-daf2-45f9-a191-9b4a392b0869", "DetectTime": "2023-10-30T14:01:18.233131+02:00", "EventTime": "2023-10-30T14:01:18.233185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CbSIuq3YKwZg16QsN6"]} -{"Format": "IDEA0", "ID": "d7184b4f-0b13-4d0a-a0b3-aff865c0307d", "DetectTime": "2023-10-30T14:01:18.266329+02:00", "EventTime": "2023-10-30T14:01:18.266355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Ckas4S2icC5rWGnTXd"]} -{"Format": "IDEA0", "ID": "9bbdf508-2b20-4c25-82a6-8a482d1e4c0a", "DetectTime": "2023-10-30T14:01:18.286996+02:00", "EventTime": "2023-10-30T14:01:18.287019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["Cz75K92OAEOHWsPsF1"]} -{"Format": "IDEA0", "ID": "505c0856-6114-4637-b282-a74a663dc711", "DetectTime": "2023-10-30T14:01:18.308909+02:00", "EventTime": "2023-10-30T14:01:18.308926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CUwO1HQ8rmu427FSb"]} -{"Format": "IDEA0", "ID": "a5cb4f53-8eeb-4d74-8598-71f64e33e8a1", "DetectTime": "2023-10-30T14:01:18.333150+02:00", "EventTime": "2023-10-30T14:01:18.333175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["C4kOnU2nmKiomweQF6"]} -{"Format": "IDEA0", "ID": "e9a4a161-85d4-4ad4-91ab-c8f5bc405d44", "DetectTime": "2023-10-30T14:01:18.352674+02:00", "EventTime": "2023-10-30T14:01:18.352694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CAjtXji23g2wi0vMd"]} -{"Format": "IDEA0", "ID": "03d50557-5cd6-4137-b4fd-47cabd9d5826", "DetectTime": "2023-10-30T14:01:18.378707+02:00", "EventTime": "2023-10-30T14:01:18.378726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CCmhKw1S13Uqx1G8Jb"]} -{"Format": "IDEA0", "ID": "fd31f91a-a7b1-4e42-ab85-c9e9074bc001", "DetectTime": "2023-10-30T14:01:18.404457+02:00", "EventTime": "2023-10-30T14:01:18.404474+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwYbPG1ew8Fy2KBvM2"]} -{"Format": "IDEA0", "ID": "fba5eaf5-e43b-4e67-8940-f390d84282ed", "DetectTime": "2023-10-30T14:01:18.426289+02:00", "EventTime": "2023-10-30T14:01:18.426313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["C02kBF4L44KqBtnW1l"]} -{"Format": "IDEA0", "ID": "d1518adc-eaea-430b-927d-1319574e625f", "DetectTime": "2023-10-30T14:01:18.455803+02:00", "EventTime": "2023-10-30T14:01:18.455824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["C7SODS2acE0wdqsm06"]} -{"Format": "IDEA0", "ID": "9484fc13-ed6a-47d9-ad3b-58c547429c43", "DetectTime": "2023-10-30T14:01:18.477475+02:00", "EventTime": "2023-10-30T14:01:18.477498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.192.162 ", "ContentType": "text/plain"}], "uids": ["CHLExAZ4jXbUs18g7"]} -{"Format": "IDEA0", "ID": "e42fc341-9b10-4359-8af6-c08fef0b0871", "DetectTime": "2023-10-30T14:01:18.502935+02:00", "EventTime": "2023-10-30T14:01:18.502951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C54Txh3P96xhzpDPn5"]} -{"Format": "IDEA0", "ID": "638a2d31-f6dc-4296-bc5f-c3b7130e8768", "DetectTime": "2023-10-30T14:01:18.527600+02:00", "EventTime": "2023-10-30T14:01:18.527621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.223.129.15 ", "ContentType": "text/plain"}], "uids": ["CtcHjzFLtGzxmFyXf"]} -{"Format": "IDEA0", "ID": "0cac161a-ab75-4db1-b274-21e1080af4f3", "DetectTime": "2023-10-30T14:01:18.553990+02:00", "EventTime": "2023-10-30T14:01:18.554004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CiZGVG1gXCfGzjuxFg"]} -{"Format": "IDEA0", "ID": "152e0786-b6a1-4241-b554-3f8049b1184b", "DetectTime": "2023-10-30T14:01:18.573623+02:00", "EventTime": "2023-10-30T14:01:18.573641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CtiWt43KwzmMv6zaBj"]} -{"Format": "IDEA0", "ID": "1fdc19f1-0442-4ada-b28c-45320aed55a1", "DetectTime": "2023-10-30T14:01:18.593401+02:00", "EventTime": "2023-10-30T14:01:18.593418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CxPlTz2BYf49DCLY22"]} -{"Format": "IDEA0", "ID": "c33050ee-ba28-4b56-b069-a488755409be", "DetectTime": "2023-10-30T14:01:18.616787+02:00", "EventTime": "2023-10-30T14:01:18.616811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CSm7NG3YOp2xzHH43"]} -{"Format": "IDEA0", "ID": "1873543d-2bf3-4621-9ba2-a642d71b3ff3", "DetectTime": "2023-10-30T14:01:18.642591+02:00", "EventTime": "2023-10-30T14:01:18.642615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CUL4uR3JlKYPeAnAGb"]} -{"Format": "IDEA0", "ID": "a7daa560-0409-4369-86dd-2f0248073daa", "DetectTime": "2023-10-30T14:01:18.666168+02:00", "EventTime": "2023-10-30T14:01:18.666189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CHRCBZ1UyF1OmeDje8"]} -{"Format": "IDEA0", "ID": "df81ecb7-8e15-4e90-9826-fd2a0b9c3b2a", "DetectTime": "2023-10-30T14:01:18.686703+02:00", "EventTime": "2023-10-30T14:01:18.686722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["C1zbyE3JfAM9bKJNU8"]} -{"Format": "IDEA0", "ID": "45790ed0-60ca-4596-b02f-7163399769a6", "DetectTime": "2023-10-30T14:01:18.706239+02:00", "EventTime": "2023-10-30T14:01:18.706261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CFrdiD2tAH6eO3ep4"]} -{"Format": "IDEA0", "ID": "47d8ee48-1d09-48a5-aee8-5f621455df79", "DetectTime": "2023-10-30T14:01:18.736530+02:00", "EventTime": "2023-10-30T14:01:18.736549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["ChOnQ218rtiewrcuR3"]} -{"Format": "IDEA0", "ID": "e1a5b55f-62d5-4909-b205-54b678ad3927", "DetectTime": "2023-10-30T14:01:18.759725+02:00", "EventTime": "2023-10-30T14:01:18.759741+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGGz4G25RsirNTFSn8"]} -{"Format": "IDEA0", "ID": "26cca392-1574-43ee-855a-e514d3891b77", "DetectTime": "2023-10-30T14:01:18.780149+02:00", "EventTime": "2023-10-30T14:01:18.780171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C0DMy633KuVVPWm4t8"]} -{"Format": "IDEA0", "ID": "203fbfa6-ab22-4756-a4a4-671653cea70c", "DetectTime": "2023-10-30T14:01:18.800666+02:00", "EventTime": "2023-10-30T14:01:18.800684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CxjIlU3AKQHVM5Sawf"]} -{"Format": "IDEA0", "ID": "c38dea17-ed82-4e79-87f4-5dcb2eba1365", "DetectTime": "2023-10-30T14:01:18.822775+02:00", "EventTime": "2023-10-30T14:01:18.822810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CUXLv81RuEl9xhtJXg"]} -{"Format": "IDEA0", "ID": "9342a12d-d459-4482-af09-2b51ed033b7d", "DetectTime": "2023-10-30T14:01:18.851418+02:00", "EventTime": "2023-10-30T14:01:18.851439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CJQ3041mtkccghapnf"]} -{"Format": "IDEA0", "ID": "44002c44-03fd-4c27-a6be-c2c483b27d20", "DetectTime": "2023-10-30T14:01:18.876431+02:00", "EventTime": "2023-10-30T14:01:18.876444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CPtayT1MpJo64OqKe"]} -{"Format": "IDEA0", "ID": "b38f7f2e-6d66-49d9-ba2c-8475ad56af15", "DetectTime": "2023-10-30T14:01:18.901361+02:00", "EventTime": "2023-10-30T14:01:18.901383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CkQCysWmL304FYz9c"]} -{"Format": "IDEA0", "ID": "1cdc2588-4946-463c-9896-d4ae18a3f822", "DetectTime": "2023-10-30T14:01:18.927483+02:00", "EventTime": "2023-10-30T14:01:18.927500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CAqX6v4CDUN0uUPnql"]} -{"Format": "IDEA0", "ID": "f212d1a1-51e4-4580-820d-dfee9f04a6a8", "DetectTime": "2023-10-30T14:01:18.948640+02:00", "EventTime": "2023-10-30T14:01:18.948661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["C8nI284iwVlTu2Z3Tj"]} -{"Format": "IDEA0", "ID": "0854aea3-fc3f-4e90-9018-f66f706db0b5", "DetectTime": "2023-10-30T14:01:18.983707+02:00", "EventTime": "2023-10-30T14:01:18.983723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["C3Moar41sIFlyTMCRd"]} -{"Format": "IDEA0", "ID": "86689bd2-63b4-454a-b51f-42396c4e4cfb", "DetectTime": "2023-10-30T14:01:19.014259+02:00", "EventTime": "2023-10-30T14:01:19.014280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C1vJNK2G0xjTicIJBi"]} -{"Format": "IDEA0", "ID": "c0b8b8f2-c3a2-40cd-ac1a-b40667741c1e", "DetectTime": "2023-10-30T14:01:19.043093+02:00", "EventTime": "2023-10-30T14:01:19.043115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CaCtPG1d15x0FZPKe7"]} -{"Format": "IDEA0", "ID": "36035db6-571f-4712-a2c6-246e5e41b055", "DetectTime": "2023-10-30T14:01:19.070983+02:00", "EventTime": "2023-10-30T14:01:19.071003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C46cWw2pvC0iHb3vZb"]} -{"Format": "IDEA0", "ID": "c5896936-cf9e-4ea5-9505-a1a4016dd541", "DetectTime": "2023-10-30T14:01:19.106246+02:00", "EventTime": "2023-10-30T14:01:19.106264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CP1lOZ13wiYGPNaPp2"]} -{"Format": "IDEA0", "ID": "73178631-be0d-4fb4-84aa-076732cd5312", "DetectTime": "2023-10-30T14:01:19.139307+02:00", "EventTime": "2023-10-30T14:01:19.139325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3LuXx1ZLqaFys2XDd"]} -{"Format": "IDEA0", "ID": "377602b6-d725-4dc7-9cc2-0c2151d5a239", "DetectTime": "2023-10-30T14:01:19.180280+02:00", "EventTime": "2023-10-30T14:01:19.180300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CkJ6bZBe2vDDPjXb"]} -{"Format": "IDEA0", "ID": "1978246e-97a9-4c8c-9160-c8f39045ced6", "DetectTime": "2023-10-30T14:01:19.224857+02:00", "EventTime": "2023-10-30T14:01:19.224879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CxqFiw2A4WwGpViIxc"]} -{"Format": "IDEA0", "ID": "f187eda9-6e9e-4739-8326-339b205aff19", "DetectTime": "2023-10-30T14:01:19.264666+02:00", "EventTime": "2023-10-30T14:01:19.264686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CS2vtO3rCGzyiArYX1"]} -{"Format": "IDEA0", "ID": "3f28f8d6-3e53-429f-a80d-8b63c8915a30", "DetectTime": "2023-10-30T14:01:19.298965+02:00", "EventTime": "2023-10-30T14:01:19.298988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CKKfdThP95yNtk8w7"]} -{"Format": "IDEA0", "ID": "12126e7a-4b40-43dc-9e54-408d6a2414e7", "DetectTime": "2023-10-30T14:01:19.323515+02:00", "EventTime": "2023-10-30T14:01:19.323534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CAQ5TC2522IgInoHMd"]} -{"Format": "IDEA0", "ID": "960cacf7-ea02-4883-a528-9cf764b56b76", "DetectTime": "2023-10-30T14:01:19.347749+02:00", "EventTime": "2023-10-30T14:01:19.347766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CatimoxWgE6e1HYL2"]} -{"Format": "IDEA0", "ID": "d65659b3-e5bc-48b0-83ee-05382409a24c", "DetectTime": "2023-10-30T14:01:19.379001+02:00", "EventTime": "2023-10-30T14:01:19.379020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CHAqeMsDA0tpyqNz4"]} -{"Format": "IDEA0", "ID": "c7ce047f-4aff-4384-a809-9b2090eaab61", "DetectTime": "2023-10-30T14:01:19.406106+02:00", "EventTime": "2023-10-30T14:01:19.406129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDBAAYZKXiajmCUk2"]} -{"Format": "IDEA0", "ID": "f9aa9ff6-abe3-43f0-b42a-9f18b040532b", "DetectTime": "2023-10-30T14:01:19.430351+02:00", "EventTime": "2023-10-30T14:01:19.430376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["Cd1WVn12xMy3EOfoTc"]} -{"Format": "IDEA0", "ID": "055c297c-8d68-4acf-bb88-e06129fbebe6", "DetectTime": "2023-10-30T14:01:19.450625+02:00", "EventTime": "2023-10-30T14:01:19.450642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CcQmIb4ajsW8eu1Gwa"]} -{"Format": "IDEA0", "ID": "886552c6-b76d-4afa-ba60-c2e42a65f9cc", "DetectTime": "2023-10-30T14:01:19.474796+02:00", "EventTime": "2023-10-30T14:01:19.474816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["Cctgfy2rKBe2N75Q57"]} -{"Format": "IDEA0", "ID": "eced92dd-9f22-4b3d-975e-9e91a2045b26", "DetectTime": "2023-10-30T14:01:19.497302+02:00", "EventTime": "2023-10-30T14:01:19.497314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CVgpDV3TxBqMZ36HL9"]} -{"Format": "IDEA0", "ID": "5199f232-814f-42e2-996f-4e0007998e47", "DetectTime": "2023-10-30T14:01:19.522951+02:00", "EventTime": "2023-10-30T14:01:19.522966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CINlGA2VlbEW7ciU93"]} -{"Format": "IDEA0", "ID": "e45931af-bd08-46e7-b1f5-1155fe4445be", "DetectTime": "2023-10-30T14:01:19.547710+02:00", "EventTime": "2023-10-30T14:01:19.547732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CF4JdY38aKL6VM6107"]} -{"Format": "IDEA0", "ID": "0a43c67d-c9f1-4658-a28f-ec6ed8db0cf4", "DetectTime": "2023-10-30T14:01:19.569159+02:00", "EventTime": "2023-10-30T14:01:19.569366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CjfIUV3uC4uOiAHpP"]} -{"Format": "IDEA0", "ID": "937d739e-b057-4d08-8705-7d26f5325634", "DetectTime": "2023-10-30T14:01:19.599745+02:00", "EventTime": "2023-10-30T14:01:19.599763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CMV84d3GmnExULlxR"]} -{"Format": "IDEA0", "ID": "a1c4b2a1-aedf-4578-b9cd-8e9c4bc95e61", "DetectTime": "2023-10-30T14:01:19.621347+02:00", "EventTime": "2023-10-30T14:01:19.621377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C35vlu4eJIZQNVOjk8"]} -{"Format": "IDEA0", "ID": "8bd96b88-2a08-4744-921d-e87bd3656ff7", "DetectTime": "2023-10-30T14:01:19.661200+02:00", "EventTime": "2023-10-30T14:01:19.661221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CFaVB41If4jV5IshZ"]} -{"Format": "IDEA0", "ID": "e93b2fdd-ad7b-48c1-8774-e98aef61aa72", "DetectTime": "2023-10-30T14:01:19.679732+02:00", "EventTime": "2023-10-30T14:01:19.679747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CIY0u51AiKOPI1wzff"]} -{"Format": "IDEA0", "ID": "65c4452b-61aa-46ff-ad96-912ce408aacb", "DetectTime": "2023-10-30T14:01:19.701384+02:00", "EventTime": "2023-10-30T14:01:19.701401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CSewM87wXT4ugTuOj"]} -{"Format": "IDEA0", "ID": "211cd291-3642-4d69-9ba4-42fd889c5b2e", "DetectTime": "2023-10-30T14:01:19.722022+02:00", "EventTime": "2023-10-30T14:01:19.722039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["Cd9FYb3Fq1f0SrlsJ8"]} -{"Format": "IDEA0", "ID": "eaa072c6-f5b5-46ae-8e34-8371ac85b69a", "DetectTime": "2023-10-30T14:01:19.743070+02:00", "EventTime": "2023-10-30T14:01:19.743093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CTg93g2BVvin7lw97d"]} -{"Format": "IDEA0", "ID": "cdca9636-2411-4bc8-8ce5-83c6f77cd046", "DetectTime": "2023-10-30T14:01:19.779246+02:00", "EventTime": "2023-10-30T14:01:19.779268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvXmNk4C9tF0pNhnQj"]} -{"Format": "IDEA0", "ID": "a82980c5-866d-46e1-8479-2e4966297089", "DetectTime": "2023-10-30T14:01:19.802611+02:00", "EventTime": "2023-10-30T14:01:19.802635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["C2AOrJ3Na993OAdXXf"]} -{"Format": "IDEA0", "ID": "338b9f03-75ce-41c0-8108-106971413506", "DetectTime": "2023-10-30T14:01:19.825174+02:00", "EventTime": "2023-10-30T14:01:19.825194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CyfmoR1TSWXUJVGnth"]} -{"Format": "IDEA0", "ID": "f4fe143f-797d-45e5-ae2a-1f522cefc4ef", "DetectTime": "2023-10-30T14:01:19.862277+02:00", "EventTime": "2023-10-30T14:01:19.862298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CXplFm2A3dVEYDiAyb"]} -{"Format": "IDEA0", "ID": "c27fbf3d-306d-4160-99de-c74d44c5852e", "DetectTime": "2023-10-30T14:01:19.895955+02:00", "EventTime": "2023-10-30T14:01:19.895975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C3unen4jjeSBQI03Ei"]} -{"Format": "IDEA0", "ID": "b02d7b5e-499d-41e4-896e-a648be641a05", "DetectTime": "2023-10-30T14:01:19.936768+02:00", "EventTime": "2023-10-30T14:01:19.936781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C3CONI1LLXlmCTfBof"]} -{"Format": "IDEA0", "ID": "f6989068-3771-4375-890c-5e0b9a6df974", "DetectTime": "2023-10-30T14:01:19.974098+02:00", "EventTime": "2023-10-30T14:01:19.974118+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChoKkTA0cPi6yN3Xc"]} -{"Format": "IDEA0", "ID": "351c1af1-0102-408f-8c64-16bb2fc733b9", "DetectTime": "2023-10-30T14:01:19.995861+02:00", "EventTime": "2023-10-30T14:01:19.995879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CbmsMX10ZgBD0LKkfb"]} -{"Format": "IDEA0", "ID": "f5b3899f-066c-41b4-987c-552a5d847fc3", "DetectTime": "2023-10-30T14:01:20.034568+02:00", "EventTime": "2023-10-30T14:01:20.034589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Ci8QCK2FR6cLfK4Hsi"]} -{"Format": "IDEA0", "ID": "55b362f7-471d-4acb-9864-95ee7f6718b1", "DetectTime": "2023-10-30T14:01:20.070623+02:00", "EventTime": "2023-10-30T14:01:20.070640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CNkt6a18IMYcYTeCZe"]} -{"Format": "IDEA0", "ID": "404cacb8-fc1e-4cf6-b027-4976a59e57ff", "DetectTime": "2023-10-30T14:01:20.105116+02:00", "EventTime": "2023-10-30T14:01:20.105141+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHw2FXlI4mRCgRHcd"]} -{"Format": "IDEA0", "ID": "82ead0d7-f767-46cf-afc9-59ed77803af4", "DetectTime": "2023-10-30T14:01:20.125371+02:00", "EventTime": "2023-10-30T14:01:20.125395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CwBJRF412K4zOiVT05"]} -{"Format": "IDEA0", "ID": "ead35348-3897-4f81-a6cf-16bdd1fadd26", "DetectTime": "2023-10-30T14:01:20.159715+02:00", "EventTime": "2023-10-30T14:01:20.159736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CPnDcw4MKYg3mW9m7j"]} -{"Format": "IDEA0", "ID": "efdbfd14-1f4a-4fdf-a3a5-43fd41610a5d", "DetectTime": "2023-10-30T14:01:20.197478+02:00", "EventTime": "2023-10-30T14:01:20.197501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CNcVCsMdQ00BLfmud"]} -{"Format": "Json", "ID": "efdbfd14-1f4a-4fdf-a3a5-43fd41610a5d", "DetectTime": "2023-10-30T14:01:20.197478+02:00", "EventTime": "2023-10-30T14:01:20.197501+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T17:17:39.498774+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2023/10/30 14:01:20.275614)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3f412a3d-1575-4680-bd31-8c3d9c65931b", "DetectTime": "2023-10-30T14:01:20.281678+02:00", "EventTime": "2023-10-30T14:01:20.281703+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGJmwsFYxU4707Sp4"]} -{"Format": "IDEA0", "ID": "30759245-6a78-4b2b-9316-945358da1a56", "DetectTime": "2023-10-30T14:01:20.303361+02:00", "EventTime": "2023-10-30T14:01:20.303377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CURfaZ1gFpOpVD1w94"]} -{"Format": "IDEA0", "ID": "1a538376-741b-4854-ba5b-4082221d5463", "DetectTime": "2023-10-30T14:01:20.341329+02:00", "EventTime": "2023-10-30T14:01:20.341342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CojfZiZf20EgIau2l"]} -{"Format": "IDEA0", "ID": "8841ad73-89fc-4de2-9c06-7735ab8b23e0", "DetectTime": "2023-10-30T14:01:20.376680+02:00", "EventTime": "2023-10-30T14:01:20.376698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYZ4wE36z22HUIFvVe", "C8pUnj1L5ySZ1KU9O3", "CGGz4G25RsirNTFSn8", "CHw2FXlI4mRCgRHcd"]} -{"Format": "IDEA0", "ID": "f48debbd-027d-4271-9314-aa59e3528da0", "DetectTime": "2023-10-30T14:01:20.398927+02:00", "EventTime": "2023-10-30T14:01:20.398949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CFEAUv2eG7GpOPY9Dg"]} -{"Format": "IDEA0", "ID": "b334854c-fdf1-4745-b857-40fa3c883c14", "DetectTime": "2023-10-30T14:01:20.439430+02:00", "EventTime": "2023-10-30T14:01:20.439447+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8pUnj1L5ySZ1KU9O3"]} -{"Format": "IDEA0", "ID": "a9c9161e-52f3-452e-b417-3f84322eec37", "DetectTime": "2023-10-30T14:01:20.460685+02:00", "EventTime": "2023-10-30T14:01:20.460702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CwXt0T31XxjxXgcGNa"]} -{"Format": "IDEA0", "ID": "37b6b374-3694-4aa3-b36e-758ecd97a024", "DetectTime": "2023-10-30T14:01:20.519611+02:00", "EventTime": "2023-10-30T14:01:20.519635+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.96.185"], "Hostname": ["ip68-7-96-185.sd.sd.cox.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 68.7.96.185 from 10.0.2.19. blacklisted IP AS: ASN-CXA-ALL-CCI-22773-RDC, US AS22773 rDNS: ip68-7-96-185.sd.sd.cox.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CWpgYK3YVlW3jeUmg7"]} -{"Format": "IDEA0", "ID": "f832ac30-ad14-4657-a9de-81c5007d90c9", "DetectTime": "2023-10-30T14:01:20.605192+02:00", "EventTime": "2023-10-30T14:01:20.605211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDSyguchIQIGXEy4b"]} -{"Format": "IDEA0", "ID": "50d8a2be-af87-4c22-9186-95211e26bfff", "DetectTime": "2023-10-30T14:01:20.666459+02:00", "EventTime": "2023-10-30T14:01:20.666480+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgdMTF3TDXiBI1qW7k"]} -{"Format": "IDEA0", "ID": "3ee88d01-4255-4501-a15a-e27975445fc3", "DetectTime": "2023-10-30T14:01:20.687027+02:00", "EventTime": "2023-10-30T14:01:20.687048+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmECdD35YUalBK3jXk"]} -{"Format": "IDEA0", "ID": "f99247f9-f65c-4fae-bc91-26f218b7e763", "DetectTime": "2023-10-30T14:01:20.705281+02:00", "EventTime": "2023-10-30T14:01:20.705301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cq5tvd2OR8dcNs6xhj"]} -{"Format": "IDEA0", "ID": "665fe1d2-6ea6-4929-9981-52ec3b019441", "DetectTime": "2023-10-30T14:01:20.735524+02:00", "EventTime": "2023-10-30T14:01:20.735543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CZMtDx20kd02CzzVWj"]} -{"Format": "IDEA0", "ID": "79b41dbb-81a5-4cd4-bcc6-d27d43f01a69", "DetectTime": "2023-10-30T14:01:20.773519+02:00", "EventTime": "2023-10-30T14:01:20.773532+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CF4sVx1O7LJk81we81"]} -{"Format": "IDEA0", "ID": "b6a9c286-b0e7-4b9f-b58f-544a6e5d1901", "DetectTime": "2023-10-30T14:01:20.792663+02:00", "EventTime": "2023-10-30T14:01:20.792679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cd6mmb1YEUJq3ECgS2"]} -{"Format": "Json", "ID": "b6a9c286-b0e7-4b9f-b58f-544a6e5d1901", "DetectTime": "2023-10-30T14:01:20.792663+02:00", "EventTime": "2023-10-30T14:01:20.792679+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T17:48:05.865689+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2023/10/30 14:01:20.853012)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c588ea42-2185-4b5c-8a91-a9fac3eb68c4", "DetectTime": "2023-10-30T14:01:20.858272+02:00", "EventTime": "2023-10-30T14:01:20.858287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CEUTCv1tKaVyyJTPhg"]} -{"Format": "IDEA0", "ID": "50a20c9b-b13f-40d7-8c4d-c1db532e5c78", "DetectTime": "2023-10-30T14:01:20.893175+02:00", "EventTime": "2023-10-30T14:01:20.893192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CtMzUHX6B6P3QKATk"]} -{"Format": "IDEA0", "ID": "d1507c02-827e-4d88-9acf-a531fbf1c726", "DetectTime": "2023-10-30T14:01:20.928920+02:00", "EventTime": "2023-10-30T14:01:20.928940+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzKXWP1eeicnM5S2G6"]} -{"Format": "IDEA0", "ID": "30fca58d-5ca5-4f10-983e-efd8fa4a313d", "DetectTime": "2023-10-30T14:01:20.952055+02:00", "EventTime": "2023-10-30T14:01:20.952070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C7k7RX1KBRlliAZBM8"]} -{"Format": "IDEA0", "ID": "22363b31-d488-4b86-a559-446abed14ca4", "DetectTime": "2023-10-30T14:01:20.986179+02:00", "EventTime": "2023-10-30T14:01:20.986199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CLQ7cl1CxXeuEebj2i"]} -{"Format": "IDEA0", "ID": "77ae1f47-6226-4872-963f-e98d8ef17ea5", "DetectTime": "2023-10-30T14:01:21.019992+02:00", "EventTime": "2023-10-30T14:01:21.020006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CCAKok2Vsb6MODGYk4"]} -{"Format": "IDEA0", "ID": "25df92f9-f83f-4a63-ad70-d806534719d8", "DetectTime": "2023-10-30T14:01:21.052204+02:00", "EventTime": "2023-10-30T14:01:21.052215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CfsaV23BFd49U1ZcWl"]} -{"Format": "IDEA0", "ID": "841150dc-3131-4852-bba2-dda8edafd5f6", "DetectTime": "2023-10-30T14:01:21.082927+02:00", "EventTime": "2023-10-30T14:01:21.082941+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5oFsc3fgV3ui9zov4"]} -{"Format": "IDEA0", "ID": "cf01bccc-1eb7-47c6-802c-682a3f8a2bce", "DetectTime": "2023-10-30T14:01:21.103646+02:00", "EventTime": "2023-10-30T14:01:21.103663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["C8n6eT1TP8GmefhXu1"]} -{"Format": "IDEA0", "ID": "4878bd61-a881-437a-bad2-08a94c719520", "DetectTime": "2023-10-30T14:01:21.136025+02:00", "EventTime": "2023-10-30T14:01:21.136054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["C0K2jq3WfVLYzJ2eOg"]} -{"Format": "Json", "ID": "4878bd61-a881-437a-bad2-08a94c719520", "DetectTime": "2023-10-30T14:01:21.136025+02:00", "EventTime": "2023-10-30T14:01:21.136054+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T17:48:25.502230+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2023/10/30 14:01:21.198685)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c015df63-63c7-4895-89b1-b53c6316f5f7", "DetectTime": "2023-10-30T14:01:21.204816+02:00", "EventTime": "2023-10-30T14:01:21.204832+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpjzlX1MmJlcUsAvOe"]} -{"Format": "IDEA0", "ID": "28006142-aa9e-47e1-9466-fc3c9d2c9937", "DetectTime": "2023-10-30T14:01:21.226326+02:00", "EventTime": "2023-10-30T14:01:21.226343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CBbug74ZYdQ1bH1ig"]} -{"Format": "IDEA0", "ID": "41c7cbf6-0743-4946-a68b-ad9317696926", "DetectTime": "2023-10-30T14:01:21.254109+02:00", "EventTime": "2023-10-30T14:01:21.254123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CTprw814jiansrgWG9"]} -{"Format": "IDEA0", "ID": "b4e9821e-f68d-4bfc-85b4-e570e8a129e2", "DetectTime": "2023-10-30T14:01:21.286629+02:00", "EventTime": "2023-10-30T14:01:21.286653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["ChdtTj4QsMngfoyaL7"]} -{"Format": "IDEA0", "ID": "fe51084f-ada4-4bc3-bfc8-45d2bcebc13a", "DetectTime": "2023-10-30T14:01:21.311235+02:00", "EventTime": "2023-10-30T14:01:21.311251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CSFeEo2HgfEiRtrWf1"]} -{"Format": "IDEA0", "ID": "377b8e75-fd56-445e-b4b9-d6cab3fc9449", "DetectTime": "2023-10-30T14:01:21.340142+02:00", "EventTime": "2023-10-30T14:01:21.340167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CXUdCJ1qqiKLPJoo6j"]} -{"Format": "IDEA0", "ID": "423ef3c9-6f40-420e-ab71-821177e09b55", "DetectTime": "2023-10-30T14:01:21.365929+02:00", "EventTime": "2023-10-30T14:01:21.365945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C9U13F4I3VK1sqXlHg"]} -{"Format": "IDEA0", "ID": "9536101e-1d97-4993-aa76-214fd946cc69", "DetectTime": "2023-10-30T14:01:21.396395+02:00", "EventTime": "2023-10-30T14:01:21.396410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["C4issZ1ifMv5WF7Cr1"]} -{"Format": "IDEA0", "ID": "bd2b4522-dd1b-48b5-8892-f85b07ecf18e", "DetectTime": "2023-10-30T14:01:21.424756+02:00", "EventTime": "2023-10-30T14:01:21.424778+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiidCb30oOKYnThtCj"]} -{"Format": "IDEA0", "ID": "a642a5a0-f075-477f-9eba-32d0cea08834", "DetectTime": "2023-10-30T14:01:21.446228+02:00", "EventTime": "2023-10-30T14:01:21.446249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CrxLOW3TD4FEOOORv5"]} -{"Format": "IDEA0", "ID": "3cf93c3a-125e-477d-9799-5a55bb13cd9e", "DetectTime": "2023-10-30T14:01:21.475464+02:00", "EventTime": "2023-10-30T14:01:21.475480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CLseIE2F4p4oYte7z7"]} -{"Format": "IDEA0", "ID": "aa418a23-1d66-4a4d-a2c4-816b793d7cbb", "DetectTime": "2023-10-30T14:01:21.503833+02:00", "EventTime": "2023-10-30T14:01:21.503851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CEPXYo3UJVZG9Tafbh"]} -{"Format": "Json", "ID": "aa418a23-1d66-4a4d-a2c4-816b793d7cbb", "DetectTime": "2023-10-30T14:01:21.503833+02:00", "EventTime": "2023-10-30T14:01:21.503851+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T17:48:26.700146+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2023/10/30 14:01:21.561619)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1ab552e0-2510-4d8d-b17d-9a0ef6f7f3a0", "DetectTime": "2023-10-30T14:01:21.568406+02:00", "EventTime": "2023-10-30T14:01:21.568428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CzKXWP1eeicnM5S2G6", "CpjzlX1MmJlcUsAvOe", "CmECdD35YUalBK3jXk", "CRjPaL1DN1UeVv2Xca"]} -{"Format": "IDEA0", "ID": "ddda6385-0ae2-4f2e-91ae-c585059343b1", "DetectTime": "2023-10-30T14:01:21.595479+02:00", "EventTime": "2023-10-30T14:01:21.595502+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRjPaL1DN1UeVv2Xca"]} -{"Format": "IDEA0", "ID": "b0d74d28-5637-4a03-8d31-0e4707330f7c", "DetectTime": "2023-10-30T14:01:21.618431+02:00", "EventTime": "2023-10-30T14:01:21.618451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["CcZ9xq20hOao2fbBQ7"]} -{"Format": "IDEA0", "ID": "76f30bd1-e8eb-4c95-86b5-97b24f432e84", "DetectTime": "2023-10-30T14:01:21.644770+02:00", "EventTime": "2023-10-30T14:01:21.644786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cz1my54yyhP8FHS96b"]} -{"Format": "IDEA0", "ID": "61198319-3574-4bf3-a566-59aaccce7d4c", "DetectTime": "2023-10-30T14:01:21.672278+02:00", "EventTime": "2023-10-30T14:01:21.672302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CJtXlj3opE2fkgM4Jd"]} -{"Format": "IDEA0", "ID": "d6fe53f3-5fea-42d8-8e9b-52574f04d662", "DetectTime": "2023-10-30T14:01:21.708367+02:00", "EventTime": "2023-10-30T14:01:21.708390+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cv5fuX1LFDsaM9K6pj"]} -{"Format": "IDEA0", "ID": "cea8937d-88ba-4c84-a838-082a1cbd6e7b", "DetectTime": "2023-10-30T14:01:21.734298+02:00", "EventTime": "2023-10-30T14:01:21.734319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["C8qfKl3V6Julh5EURd"]} -{"Format": "IDEA0", "ID": "4dafcb51-9f50-43ff-afb8-e5699f7e69bd", "DetectTime": "2023-10-30T14:01:21.762468+02:00", "EventTime": "2023-10-30T14:01:21.762486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CjJzma3PlPXStMSudf"]} -{"Format": "IDEA0", "ID": "e346ef2b-f8d8-495e-9fc9-d6a62e6e2632", "DetectTime": "2023-10-30T14:01:21.792727+02:00", "EventTime": "2023-10-30T14:01:21.792744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["Ce0bhgWPGgnfLd8ei"]} -{"Format": "IDEA0", "ID": "35f40621-6a13-43ce-9b43-632eb53fcfd8", "DetectTime": "2023-10-30T14:01:21.817679+02:00", "EventTime": "2023-10-30T14:01:21.817704+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWNq7d4VdyX81AJdw1"]} -{"Format": "IDEA0", "ID": "6277e98c-f88e-48e8-a0c7-c82f27335123", "DetectTime": "2023-10-30T14:01:21.836441+02:00", "EventTime": "2023-10-30T14:01:21.836463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CY2cGf4BVe6eJNvvJ1"]} -{"Format": "IDEA0", "ID": "a9979e88-e362-4ab8-8d3e-19e4ee96c92d", "DetectTime": "2023-10-30T14:01:21.858125+02:00", "EventTime": "2023-10-30T14:01:21.858143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Chi8sXAlZe5M4SqD5"]} -{"Format": "IDEA0", "ID": "682cf48d-fc1e-4d55-a99d-86a6e597d2ea", "DetectTime": "2023-10-30T14:01:21.896122+02:00", "EventTime": "2023-10-30T14:01:21.896138+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.38.41.24"], "Hostname": ["190-38-41-24.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.38.41.24 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-38-41-24.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CQxSQK3otefmwGTrQb"]} -{"Format": "IDEA0", "ID": "0673d277-f25a-42eb-988e-5b77ffe84338", "DetectTime": "2023-10-30T14:01:21.952339+02:00", "EventTime": "2023-10-30T14:01:21.952357+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CydTlV3Gx5JhwVw2Lh"]} -{"Format": "IDEA0", "ID": "2467edd3-547b-47c3-a955-c8e8656a0646", "DetectTime": "2023-10-30T14:01:21.972560+02:00", "EventTime": "2023-10-30T14:01:21.972579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CkzW9iE2RC3JkaQ0g"]} -{"Format": "IDEA0", "ID": "6981b67a-4d15-41de-a025-1d3cecd910a7", "DetectTime": "2023-10-30T14:01:22.012370+02:00", "EventTime": "2023-10-30T14:01:22.012391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Ch3jIL1HuECbYiwav4"]} -{"Format": "IDEA0", "ID": "dc6cf2c5-d51f-4955-b772-6b72c9d873e8", "DetectTime": "2023-10-30T14:01:22.051482+02:00", "EventTime": "2023-10-30T14:01:22.051496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CMlZ6F3L0uDX0Qa6t8"]} -{"Format": "IDEA0", "ID": "8d5c3951-d934-46cc-bbb0-7a464544d26f", "DetectTime": "2023-10-30T14:01:22.089668+02:00", "EventTime": "2023-10-30T14:01:22.089684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Cw8QlS2d4hzuaefwf8"]} -{"Format": "IDEA0", "ID": "779674be-d297-4784-9883-45d51b93255b", "DetectTime": "2023-10-30T14:01:22.128691+02:00", "EventTime": "2023-10-30T14:01:22.128711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27410], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. ", "ContentType": "text/plain"}], "uids": ["CxAQOt3W2zKMipZsI6"]} -{"Format": "IDEA0", "ID": "d2a113d5-7f5f-4e9d-a05d-0b9b4ad48458", "DetectTime": "2023-10-30T14:01:22.166475+02:00", "EventTime": "2023-10-30T14:01:22.166491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C7M7gw1jYFyGpXEsq3"]} -{"Format": "Json", "ID": "d2a113d5-7f5f-4e9d-a05d-0b9b4ad48458", "DetectTime": "2023-10-30T14:01:22.166475+02:00", "EventTime": "2023-10-30T14:01:22.166491+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T18:19:23.329127+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2023/10/30 14:01:22.245290)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cd405a59-031f-4f87-afcd-6de5f22854a9", "DetectTime": "2023-10-30T14:01:22.250266+02:00", "EventTime": "2023-10-30T14:01:22.250290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CDypmBJ0K2RDTVQH1"]} -{"Format": "IDEA0", "ID": "633f3281-677a-469d-b42a-c967f712b16e", "DetectTime": "2023-10-30T14:01:22.289006+02:00", "EventTime": "2023-10-30T14:01:22.289030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C80Yf54pO5ztdOLJXf"]} -{"Format": "IDEA0", "ID": "8cd18d08-22ac-438f-b955-a40c0110fb6e", "DetectTime": "2023-10-30T14:01:22.326405+02:00", "EventTime": "2023-10-30T14:01:22.326422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Cw1KXo21054z5ySsZc"]} -{"Format": "IDEA0", "ID": "ea010941-4b71-4c72-97f1-bb149b961b90", "DetectTime": "2023-10-30T14:01:22.368045+02:00", "EventTime": "2023-10-30T14:01:22.368068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMuhFK3SwoYwhNaubc"]} -{"Format": "IDEA0", "ID": "8e7cf252-03a7-4791-897d-1b1206130f24", "DetectTime": "2023-10-30T14:01:22.392070+02:00", "EventTime": "2023-10-30T14:01:22.392086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CE0LMTmn5Vl0LoRpd"]} -{"Format": "IDEA0", "ID": "014d2619-d6fb-4db4-9360-49566fc447bb", "DetectTime": "2023-10-30T14:01:22.429481+02:00", "EventTime": "2023-10-30T14:01:22.429506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CC4IXM1SXaYENnuItl"]} -{"Format": "IDEA0", "ID": "8d173eb2-8aa8-4e2a-9766-07bbd9b52cc7", "DetectTime": "2023-10-30T14:01:22.465641+02:00", "EventTime": "2023-10-30T14:01:22.465654+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ca0ECb1xjmfTX2ulIa"]} -{"Format": "IDEA0", "ID": "e1a0a6ba-7fde-4793-bdd1-1f65f499b2dc", "DetectTime": "2023-10-30T14:01:22.486818+02:00", "EventTime": "2023-10-30T14:01:22.486836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CpJu942QjBnBBLBQDj"]} -{"Format": "IDEA0", "ID": "2cf4551b-0e1c-4d8b-8830-89eb1f9a9cc4", "DetectTime": "2023-10-30T14:01:22.521771+02:00", "EventTime": "2023-10-30T14:01:22.521787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["C1sV6uACzLxrcQsI4"]} -{"Format": "IDEA0", "ID": "6e38f9df-54b6-422f-aac0-275ce18e1570", "DetectTime": "2023-10-30T14:01:22.559058+02:00", "EventTime": "2023-10-30T14:01:22.559080+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeNXR3317APl26seFd"]} -{"Format": "IDEA0", "ID": "ba8659d3-04e7-4fd3-a2f1-6e2ec6cdf6e3", "DetectTime": "2023-10-30T14:01:22.579959+02:00", "EventTime": "2023-10-30T14:01:22.579971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["C8RHqG3Iu10sKLIs0d"]} -{"Format": "Json", "ID": "ba8659d3-04e7-4fd3-a2f1-6e2ec6cdf6e3", "DetectTime": "2023-10-30T14:01:22.579959+02:00", "EventTime": "2023-10-30T14:01:22.579971+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T18:19:24.389736+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2023/10/30 14:01:22.649227)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4a9f5c95-8b18-4f79-bc40-88c7d5cc915e", "DetectTime": "2023-10-30T14:01:22.657552+02:00", "EventTime": "2023-10-30T14:01:22.657567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["ChU3Nh1dSksQTHv554"]} -{"Format": "IDEA0", "ID": "a4b1582e-f2da-408c-87f2-827ca6e42def", "DetectTime": "2023-10-30T14:01:22.700304+02:00", "EventTime": "2023-10-30T14:01:22.700325+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRVSv53GI3yR5iqh95"]} -{"Format": "IDEA0", "ID": "9e0e4689-88de-4815-91fb-3561171a1d94", "DetectTime": "2023-10-30T14:01:22.723340+02:00", "EventTime": "2023-10-30T14:01:22.723366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CJ5bRd2rCKnlS8Mize"]} -{"Format": "IDEA0", "ID": "cff94380-55d7-4540-93ca-5ab9199918c5", "DetectTime": "2023-10-30T14:01:22.767549+02:00", "EventTime": "2023-10-30T14:01:22.767571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CwGzDy19yB6ngcrrb"]} -{"Format": "IDEA0", "ID": "33ae0745-5ed7-435d-a75e-55a8bb8fe174", "DetectTime": "2023-10-30T14:01:22.812688+02:00", "EventTime": "2023-10-30T14:01:22.812719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CMuhFK3SwoYwhNaubc", "CWNq7d4VdyX81AJdw1", "CeNXR3317APl26seFd", "CDwM9L373ebHCgfSS1"]} -{"Format": "IDEA0", "ID": "bab22594-ab40-4c62-a281-1a3c4065e133", "DetectTime": "2023-10-30T14:01:22.836276+02:00", "EventTime": "2023-10-30T14:01:22.836292+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDwM9L373ebHCgfSS1"]} -{"Format": "IDEA0", "ID": "81ec9d4f-72d8-41ab-9806-6e76b305b646", "DetectTime": "2023-10-30T14:01:22.857391+02:00", "EventTime": "2023-10-30T14:01:22.857420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CniLtM1V2ZE9vTEOP6"]} -{"Format": "IDEA0", "ID": "17af3eed-b804-4eec-b9ac-df83aef6186f", "DetectTime": "2023-10-30T14:01:22.894873+02:00", "EventTime": "2023-10-30T14:01:22.894891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CyWkxC1mBteQT4s1ck"]} -{"Format": "IDEA0", "ID": "8be443a1-d1a8-4a5b-a9f0-57fa5f7ce56e", "DetectTime": "2023-10-30T14:01:22.929042+02:00", "EventTime": "2023-10-30T14:01:22.929060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CHKXdz2ZLkeHlSsiNf"]} -{"Format": "IDEA0", "ID": "7c2429cc-a79e-4f44-980a-398c2782c57f", "DetectTime": "2023-10-30T14:01:22.964707+02:00", "EventTime": "2023-10-30T14:01:22.964724+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChSa9m4RChdwB2By06"]} -{"Format": "IDEA0", "ID": "5bdc74e5-fcd1-4841-85ce-1aca6e1a6231", "DetectTime": "2023-10-30T14:01:22.986236+02:00", "EventTime": "2023-10-30T14:01:22.986250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C9bdSZ2mKCVaM1QuAk"]} -{"Format": "IDEA0", "ID": "7ca819cf-fe2a-416e-8969-5b206c5be375", "DetectTime": "2023-10-30T14:01:23.022399+02:00", "EventTime": "2023-10-30T14:01:23.022418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CMyB6NlLTSVbwgs7j"]} -{"Format": "Json", "ID": "7ca819cf-fe2a-416e-8969-5b206c5be375", "DetectTime": "2023-10-30T14:01:23.022399+02:00", "EventTime": "2023-10-30T14:01:23.022418+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T18:19:25.565886+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2023/10/30 14:01:23.087078)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab4e8ba6-7a2e-4fd0-a3f1-7b288c88dd43", "DetectTime": "2023-10-30T14:01:23.093171+02:00", "EventTime": "2023-10-30T14:01:23.093187+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkuQUO3tqAflj5hJg3"]} -{"Format": "IDEA0", "ID": "f0ca5db4-c656-4612-9695-2b9e5b6b688b", "DetectTime": "2023-10-30T14:01:23.120032+02:00", "EventTime": "2023-10-30T14:01:23.120053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CpOHsw471ozz7nsFme"]} -{"Format": "IDEA0", "ID": "c5c177de-5803-4631-ba86-e099ea3add61", "DetectTime": "2023-10-30T14:01:23.154905+02:00", "EventTime": "2023-10-30T14:01:23.154928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CJvml23pRLVKeDcJ28"]} -{"Format": "IDEA0", "ID": "74c14dad-8edb-4a20-8dd5-3ae602612953", "DetectTime": "2023-10-30T14:01:23.189250+02:00", "EventTime": "2023-10-30T14:01:23.189274+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWc1EB3U124gotTED4"]} -{"Format": "IDEA0", "ID": "4a28ed81-b7b8-40d6-8cca-b4edb7e66b86", "DetectTime": "2023-10-30T14:01:23.212937+02:00", "EventTime": "2023-10-30T14:01:23.212951+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWtiY12OSbq3RrSkX8"]} -{"Format": "IDEA0", "ID": "4bf04719-2b31-4ce9-bbc8-f5177d38ee9f", "DetectTime": "2023-10-30T14:01:23.233426+02:00", "EventTime": "2023-10-30T14:01:23.233452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDWsqm314ar9v2MIOa"]} -{"Format": "IDEA0", "ID": "62abc296-b3e6-4577-994a-5b0f99b2aaaa", "DetectTime": "2023-10-30T14:01:23.262437+02:00", "EventTime": "2023-10-30T14:01:23.262461+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEuWwFYt0l7gGMw2c"]} -{"Format": "IDEA0", "ID": "04263bc8-e0c3-4e85-b8ab-186429db2611", "DetectTime": "2023-10-30T14:01:23.281276+02:00", "EventTime": "2023-10-30T14:01:23.281301+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqYi5QvYtGg9gGjh3"]} -{"Format": "IDEA0", "ID": "c99fe7dc-3665-4524-9fd5-5d98bec3f2a6", "DetectTime": "2023-10-30T14:01:23.303318+02:00", "EventTime": "2023-10-30T14:01:23.303338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C3Odhh3lSVARfxRYOl"]} -{"Format": "IDEA0", "ID": "9adc9ec8-5757-472a-8cd4-f26b35de5dad", "DetectTime": "2023-10-30T14:01:23.337240+02:00", "EventTime": "2023-10-30T14:01:23.337258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CU6Dzx4ycnc8bnwj8d"]} -{"Format": "IDEA0", "ID": "2e890bf1-e5fa-4783-b945-74999e016d66", "DetectTime": "2023-10-30T14:01:23.370760+02:00", "EventTime": "2023-10-30T14:01:23.370809+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkQFwK3L2SXRxeWlU1"]} -{"Format": "IDEA0", "ID": "d44baa59-3b34-41a6-bb8f-1b776ca44c3a", "DetectTime": "2023-10-30T14:01:23.390774+02:00", "EventTime": "2023-10-30T14:01:23.390803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["Ce3vnbllijrOoG0Gh"]} -{"Format": "IDEA0", "ID": "fac6d673-6f59-4c6b-944f-57fa00887614", "DetectTime": "2023-10-30T14:01:23.425579+02:00", "EventTime": "2023-10-30T14:01:23.425605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cvsiph0p3zjUH3bN5"]} -{"Format": "IDEA0", "ID": "0f588254-e176-4495-bd27-e43f739370e8", "DetectTime": "2023-10-30T14:01:23.460084+02:00", "EventTime": "2023-10-30T14:01:23.460101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CqYi5QvYtGg9gGjh3", "CbXtF42CPaf1s25bUb", "CWtiY12OSbq3RrSkX8", "CkuQUO3tqAflj5hJg3"]} -{"Format": "IDEA0", "ID": "c4e26b3f-76d9-4cc1-b34e-bc62f6bc63c5", "DetectTime": "2023-10-30T14:01:23.480190+02:00", "EventTime": "2023-10-30T14:01:23.480211+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbXtF42CPaf1s25bUb"]} -{"Format": "IDEA0", "ID": "6d827d58-44d4-4fa2-be8c-4d00b476e6c5", "DetectTime": "2023-10-30T14:01:23.501708+02:00", "EventTime": "2023-10-30T14:01:23.501730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cp7cN1zdP9OgJmZa"]} -{"Format": "Json", "ID": "6d827d58-44d4-4fa2-be8c-4d00b476e6c5", "DetectTime": "2023-10-30T14:01:23.501708+02:00", "EventTime": "2023-10-30T14:01:23.501730+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T18:50:19.206928+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2023/10/30 14:01:23.563584)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "df9db684-df01-4bc5-8b89-e37911c94451", "DetectTime": "2023-10-30T14:01:23.569850+02:00", "EventTime": "2023-10-30T14:01:23.569871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CpjKXB1PuIdlUr66uk"]} -{"Format": "IDEA0", "ID": "423f5bb9-5b9c-468f-8e67-21077b1ddf89", "DetectTime": "2023-10-30T14:01:23.601141+02:00", "EventTime": "2023-10-30T14:01:23.601159+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4FL2m48itMhPDfIa2"]} -{"Format": "IDEA0", "ID": "e0296454-52a7-4d1d-bbd2-f76c5b4d3556", "DetectTime": "2023-10-30T14:01:23.622972+02:00", "EventTime": "2023-10-30T14:01:23.622992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C8Rw513MyC5d09hPak"]} -{"Format": "IDEA0", "ID": "41764644-9781-4f64-a0b8-46ce972c1716", "DetectTime": "2023-10-30T14:01:23.652626+02:00", "EventTime": "2023-10-30T14:01:23.652654+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5W96g5Qisxs25MSj"]} -{"Format": "IDEA0", "ID": "a4bd5fa8-445b-4c9a-97fd-3fd39fa50320", "DetectTime": "2023-10-30T14:01:23.672521+02:00", "EventTime": "2023-10-30T14:01:23.672532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C7E2pU3LK5dmTvUNpj"]} -{"Format": "IDEA0", "ID": "bc6879d5-257f-45eb-b5a7-65ea52e81061", "DetectTime": "2023-10-30T14:01:23.700339+02:00", "EventTime": "2023-10-30T14:01:23.700357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CDWlFL1h58jLjTnFz3"]} -{"Format": "IDEA0", "ID": "fe43c975-e756-4720-877d-091f981ac746", "DetectTime": "2023-10-30T14:01:23.731337+02:00", "EventTime": "2023-10-30T14:01:23.731364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["Ck3F1Q8WhOEZvsy0b"]} -{"Format": "IDEA0", "ID": "b562bc16-f181-49a5-81e6-a03d93d35178", "DetectTime": "2023-10-30T14:01:23.759466+02:00", "EventTime": "2023-10-30T14:01:23.759482+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSaLQl4r1lz4XfrNo9"]} -{"Format": "IDEA0", "ID": "20a2b9ee-9d9d-4182-a5bf-4f82f5d3946e", "DetectTime": "2023-10-30T14:01:23.780740+02:00", "EventTime": "2023-10-30T14:01:23.780756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CQGqNChH5cUMVKIU5"]} -{"Format": "IDEA0", "ID": "31695dbb-d1b6-45a5-8bb5-3c514a7c0886", "DetectTime": "2023-10-30T14:01:23.810039+02:00", "EventTime": "2023-10-30T14:01:23.810057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CAIoNv2owR7yRp1Z81"]} -{"Format": "IDEA0", "ID": "d3813f94-e069-40bc-9c08-9dfd9f5e5222", "DetectTime": "2023-10-30T14:01:23.840148+02:00", "EventTime": "2023-10-30T14:01:23.840173+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxuqiP1MZjTnU6wqHe"]} -{"Format": "IDEA0", "ID": "5319760e-cd6b-4caa-90c8-54e6243943fd", "DetectTime": "2023-10-30T14:01:23.861402+02:00", "EventTime": "2023-10-30T14:01:23.861420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["Cxjima3GwtA5oVmYoc"]} -{"Format": "Json", "ID": "5319760e-cd6b-4caa-90c8-54e6243943fd", "DetectTime": "2023-10-30T14:01:23.861402+02:00", "EventTime": "2023-10-30T14:01:23.861420+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T18:50:37.050917+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2023/10/30 14:01:23.915851)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7c6b68eb-07ff-4eff-a368-9e41aa8a16a7", "DetectTime": "2023-10-30T14:01:23.921578+02:00", "EventTime": "2023-10-30T14:01:23.921601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CLN8Zv3AHfT9WTgOWk"]} -{"Format": "IDEA0", "ID": "bfae7828-f720-4db9-a8d7-fb1587941ca3", "DetectTime": "2023-10-30T14:01:23.952423+02:00", "EventTime": "2023-10-30T14:01:23.952450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["C88ulVFaDCokgPiT1"]} -{"Format": "IDEA0", "ID": "2a9e8bb7-c49e-432d-bd88-9b75ef425692", "DetectTime": "2023-10-30T14:01:23.981328+02:00", "EventTime": "2023-10-30T14:01:23.981344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CqSYpW21CNLtdmnH4h"]} -{"Format": "IDEA0", "ID": "fb573a2c-f1a7-4cdf-a9f2-486dbd41d4f1", "DetectTime": "2023-10-30T14:01:24.006583+02:00", "EventTime": "2023-10-30T14:01:24.006607+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChYYtJ43XbqgylNe5"]} -{"Format": "IDEA0", "ID": "39fdf8e1-4703-4021-8e8a-34196387ae1f", "DetectTime": "2023-10-30T14:01:24.027393+02:00", "EventTime": "2023-10-30T14:01:24.027411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["CGATRf4Y117kpGBrk6"]} -{"Format": "IDEA0", "ID": "91f3cadf-6f32-423a-9727-d4e81c5bb48e", "DetectTime": "2023-10-30T14:01:24.052766+02:00", "EventTime": "2023-10-30T14:01:24.052789+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTld7344abTE0dFKcf"]} -{"Format": "IDEA0", "ID": "7a48088a-58e4-4fea-a9a5-070d7cf19830", "DetectTime": "2023-10-30T14:01:24.076596+02:00", "EventTime": "2023-10-30T14:01:24.076615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CiuWsw4l0FUYiWyfg"]} -{"Format": "IDEA0", "ID": "8af7c9f0-2ce4-4c4e-ad8a-a2468556aa0d", "DetectTime": "2023-10-30T14:01:24.101051+02:00", "EventTime": "2023-10-30T14:01:24.101071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C63Mes1chNbl9rc5yd"]} -{"Format": "IDEA0", "ID": "f32c19e5-4eac-43e2-9121-b2ef17eecd41", "DetectTime": "2023-10-30T14:01:24.129045+02:00", "EventTime": "2023-10-30T14:01:24.129070+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cl2tB917z4d0mmpFBi"]} -{"Format": "IDEA0", "ID": "47c81a4a-7e9c-44ca-a7f3-d705e2281553", "DetectTime": "2023-10-30T14:01:24.152513+02:00", "EventTime": "2023-10-30T14:01:24.152538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CC113P1kYqeCulBdtl"]} -{"Format": "IDEA0", "ID": "aace8b8a-1b53-448d-ab5b-b63b79f4f6c2", "DetectTime": "2023-10-30T14:01:24.175847+02:00", "EventTime": "2023-10-30T14:01:24.175859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CnS1sV2Nyuw0J5SUQl"]} -{"Format": "IDEA0", "ID": "e6b73786-394b-4c4d-9a59-1bf6157fef32", "DetectTime": "2023-10-30T14:01:24.205037+02:00", "EventTime": "2023-10-30T14:01:24.205057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5W96g5Qisxs25MSj", "CuZYbt4J1aaVBRgvEg", "CxuqiP1MZjTnU6wqHe", "CTld7344abTE0dFKcf"]} -{"Format": "IDEA0", "ID": "6ae352a4-7ada-4738-b8d3-51c0b8cf5af7", "DetectTime": "2023-10-30T14:01:24.225757+02:00", "EventTime": "2023-10-30T14:01:24.225773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CEj6U7243zs6Nrzvsh"]} -{"Format": "Json", "ID": "6ae352a4-7ada-4738-b8d3-51c0b8cf5af7", "DetectTime": "2023-10-30T14:01:24.225757+02:00", "EventTime": "2023-10-30T14:01:24.225773+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T18:50:38.398806+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2023/10/30 14:01:24.283374)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "46da2992-b7ba-42db-85e5-f8afa92df9d7", "DetectTime": "2023-10-30T14:01:24.289268+02:00", "EventTime": "2023-10-30T14:01:24.289294+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuZYbt4J1aaVBRgvEg"]} -{"Format": "IDEA0", "ID": "6892fb44-b463-4c97-a97f-47d7f09d64fa", "DetectTime": "2023-10-30T14:01:24.316770+02:00", "EventTime": "2023-10-30T14:01:24.316791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CPSPDQ1XSUSZBmZAH4"]} -{"Format": "IDEA0", "ID": "cb9eed3a-759b-4772-88f1-d3425582a56e", "DetectTime": "2023-10-30T14:01:24.340076+02:00", "EventTime": "2023-10-30T14:01:24.340089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CbNjwx2dcIckMoGdhf"]} -{"Format": "IDEA0", "ID": "dcb029e2-863a-4857-9433-baf4dcb4b803", "DetectTime": "2023-10-30T14:01:24.360579+02:00", "EventTime": "2023-10-30T14:01:24.360602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["Cqi4281o5bZXWxwOP4"]} -{"Format": "IDEA0", "ID": "60787ca6-6195-4495-9950-6964fc1fdbe0", "DetectTime": "2023-10-30T14:01:24.381420+02:00", "EventTime": "2023-10-30T14:01:24.381436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CetVFK32LgZjo6kiqj"]} -{"Format": "IDEA0", "ID": "c35aacd9-1743-4e7e-844d-b187708b2b33", "DetectTime": "2023-10-30T14:01:24.421330+02:00", "EventTime": "2023-10-30T14:01:24.421348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CtMS5z1DaQ5VX3xOWl"]} -{"Format": "IDEA0", "ID": "ab9f9c18-5665-4713-b70c-f2c3ecf71a30", "DetectTime": "2023-10-30T14:01:24.465427+02:00", "EventTime": "2023-10-30T14:01:24.465450+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.238.8.184"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 71.238.8.184 from 10.0.2.19. blacklisted IP AS: COMCAST-7922, US AS792 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CkratzWvrkoTuN4C2"]} -{"Format": "IDEA0", "ID": "5ed62dd3-51f1-4c30-820f-295155726d30", "DetectTime": "2023-10-30T14:01:24.512875+02:00", "EventTime": "2023-10-30T14:01:24.512974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CIKFOAmdgcS5LVpm3"]} -{"Format": "IDEA0", "ID": "4af71a31-92df-4dc5-8526-8f7178beb692", "DetectTime": "2023-10-30T14:01:24.558916+02:00", "EventTime": "2023-10-30T14:01:24.558933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CLDVdW3BHsR5zLtogf"]} -{"Format": "IDEA0", "ID": "82402d52-c7a9-4800-8a95-ea9f1776452c", "DetectTime": "2023-10-30T14:01:24.605643+02:00", "EventTime": "2023-10-30T14:01:24.605664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CT5FHf3Fw4y9awWnMi"]} -{"Format": "IDEA0", "ID": "5412613f-1d9e-486d-a862-1a84a9eae96e", "DetectTime": "2023-10-30T14:01:24.648981+02:00", "EventTime": "2023-10-30T14:01:24.649007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEXrFz1Kzwut3oq1o6"]} -{"Format": "IDEA0", "ID": "5169bcf3-d85d-4749-8cd1-4ba6fddd70ac", "DetectTime": "2023-10-30T14:01:24.672970+02:00", "EventTime": "2023-10-30T14:01:24.672995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C2obEGwveoh1rO3M8"]} -{"Format": "IDEA0", "ID": "3017ee9b-8de5-4a38-9b20-5b7bd713ca7b", "DetectTime": "2023-10-30T14:01:24.720787+02:00", "EventTime": "2023-10-30T14:01:24.720807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. ", "ContentType": "text/plain"}], "uids": ["C7im4t2TeHL6L1NOM4"]} -{"Format": "Json", "ID": "3017ee9b-8de5-4a38-9b20-5b7bd713ca7b", "DetectTime": "2023-10-30T14:01:24.720787+02:00", "EventTime": "2023-10-30T14:01:24.720807+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9898], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:21:19.727160+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:24.811929)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0da23314-1503-4bae-8c15-3f04f484cafb", "DetectTime": "2023-10-30T14:01:24.818791+02:00", "EventTime": "2023-10-30T14:01:24.818811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CKKUI94wzrFCr8b6c4"]} -{"Format": "IDEA0", "ID": "166780b9-843d-4740-987f-39168e41a53f", "DetectTime": "2023-10-30T14:01:24.863632+02:00", "EventTime": "2023-10-30T14:01:24.863655+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChQTYJ2fqXaZfMvEEc"]} -{"Format": "IDEA0", "ID": "158b3aa2-9681-4d7e-b467-e8aee23919ec", "DetectTime": "2023-10-30T14:01:24.883820+02:00", "EventTime": "2023-10-30T14:01:24.883860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CKS32FSa6BQmEMlvl"]} -{"Format": "IDEA0", "ID": "bf3f5dab-2a04-4b3f-ba85-88c9ec8b2445", "DetectTime": "2023-10-30T14:01:24.924631+02:00", "EventTime": "2023-10-30T14:01:24.924651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CKrTKHOKItHxPA9O7"]} -{"Format": "IDEA0", "ID": "5073ce45-e6d2-4304-b106-f9d72aa1da35", "DetectTime": "2023-10-30T14:01:24.967956+02:00", "EventTime": "2023-10-30T14:01:24.967978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CqpsxK1EFb7dHgK5df"]} -{"Format": "IDEA0", "ID": "f89ef6db-41cd-482e-b6c0-c7f9b56b3f99", "DetectTime": "2023-10-30T14:01:25.010013+02:00", "EventTime": "2023-10-30T14:01:25.010034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5805], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. ", "ContentType": "text/plain"}], "uids": ["CsFYbs3oqOFiXs85Xc"]} -{"Format": "IDEA0", "ID": "57d6e22c-4775-4f51-8d89-ee15cbd3a482", "DetectTime": "2023-10-30T14:01:25.049401+02:00", "EventTime": "2023-10-30T14:01:25.049417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CFzhS23Rtzir7QcQb9"]} -{"Format": "IDEA0", "ID": "57c34368-c693-4128-bbd2-b65e2ed3b556", "DetectTime": "2023-10-30T14:01:25.086577+02:00", "EventTime": "2023-10-30T14:01:25.086599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. ", "ContentType": "text/plain"}], "uids": ["CmuEk83dCqpSkkVvQd"]} -{"Format": "IDEA0", "ID": "fadfa6dd-5245-435d-84fb-55eb398c4776", "DetectTime": "2023-10-30T14:01:25.126949+02:00", "EventTime": "2023-10-30T14:01:25.126966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CobyTt31hucE2hO4Z2"]} -{"Format": "Json", "ID": "fadfa6dd-5245-435d-84fb-55eb398c4776", "DetectTime": "2023-10-30T14:01:25.126949+02:00", "EventTime": "2023-10-30T14:01:25.126966+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:21:20.885272+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:25.198138)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9d6441a5-4764-4c0e-858b-05c6e163cf97", "DetectTime": "2023-10-30T14:01:25.203180+02:00", "EventTime": "2023-10-30T14:01:25.203200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CWpuavTThFcAumI37"]} -{"Format": "IDEA0", "ID": "3a5becf4-3965-4374-b13b-065ba8a09fd0", "DetectTime": "2023-10-30T14:01:25.245151+02:00", "EventTime": "2023-10-30T14:01:25.245180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25400], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. ", "ContentType": "text/plain"}], "uids": ["C9VqgF2pQWDs8lW4Hj"]} -{"Format": "IDEA0", "ID": "4f6e0ab7-bcb8-4f14-a72b-af2ad56fdbe6", "DetectTime": "2023-10-30T14:01:25.280430+02:00", "EventTime": "2023-10-30T14:01:25.280450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CVzfZX2z7kG1DrZIdi"]} -{"Format": "IDEA0", "ID": "dc6b0f87-c353-4108-a673-52c898caa6e6", "DetectTime": "2023-10-30T14:01:25.319636+02:00", "EventTime": "2023-10-30T14:01:25.319661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CPjL0M35mCL3UymGm2"]} -{"Format": "IDEA0", "ID": "a5882df0-adac-4059-ac01-2cfd1b8ec9d9", "DetectTime": "2023-10-30T14:01:25.356051+02:00", "EventTime": "2023-10-30T14:01:25.356070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["C8gqz31IQlN7s1ORii"]} -{"Format": "IDEA0", "ID": "fd9348f6-2ed7-48fc-ae6f-d98fec02292f", "DetectTime": "2023-10-30T14:01:25.400935+02:00", "EventTime": "2023-10-30T14:01:25.400956+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdD8fX2O8QNdwU36dd"]} -{"Format": "IDEA0", "ID": "c120b47f-e8da-40fe-919b-af0c43755f60", "DetectTime": "2023-10-30T14:01:25.420153+02:00", "EventTime": "2023-10-30T14:01:25.420170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CzPATC4VEniHsL1kCa"]} -{"Format": "IDEA0", "ID": "6c490efb-044b-49fd-bbad-add42c3ca6a7", "DetectTime": "2023-10-30T14:01:25.457881+02:00", "EventTime": "2023-10-30T14:01:25.457907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CLRp9B1VjXjmI5stDb"]} -{"Format": "IDEA0", "ID": "a8e14ad2-1e23-4099-8714-7f02870dccd8", "DetectTime": "2023-10-30T14:01:25.494157+02:00", "EventTime": "2023-10-30T14:01:25.494177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CR2Q7T2Wx7cpzLbTPg"]} -{"Format": "Json", "ID": "a8e14ad2-1e23-4099-8714-7f02870dccd8", "DetectTime": "2023-10-30T14:01:25.494157+02:00", "EventTime": "2023-10-30T14:01:25.494177+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:21:22.286282+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:25.556363)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c5f9439a-679b-4080-a2cf-d515e4e518aa", "DetectTime": "2023-10-30T14:01:25.560828+02:00", "EventTime": "2023-10-30T14:01:25.560855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CanadOSxLRutuLIea"]} -{"Format": "IDEA0", "ID": "612750a0-6588-4b60-b2e3-d4842b040469", "DetectTime": "2023-10-30T14:01:25.598440+02:00", "EventTime": "2023-10-30T14:01:25.598459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CrFG2i4F7vHu4wLjz5"]} -{"Format": "IDEA0", "ID": "bbd474d9-10c4-4c90-ba9c-cf894743e218", "DetectTime": "2023-10-30T14:01:25.638314+02:00", "EventTime": "2023-10-30T14:01:25.638337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CkSFa33i5xhVOkYpI1"]} -{"Format": "IDEA0", "ID": "7d8cf6c5-dc3c-427f-b759-b0dd9316e83a", "DetectTime": "2023-10-30T14:01:25.677590+02:00", "EventTime": "2023-10-30T14:01:25.677609+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbW1UV2svOCDvhFAY3"]} -{"Format": "IDEA0", "ID": "a8f34b70-c33d-4822-b32b-c79ab18a90c6", "DetectTime": "2023-10-30T14:01:25.691342+02:00", "EventTime": "2023-10-30T14:01:25.691358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["Ct7lw62rcuWfvfxAdg"]} -{"Format": "IDEA0", "ID": "a5c1441b-bcdd-46b2-b232-11d90ce1fe0e", "DetectTime": "2023-10-30T14:01:25.728400+02:00", "EventTime": "2023-10-30T14:01:25.728419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKKaCg13QyqaMsRPCg"]} -{"Format": "IDEA0", "ID": "eea67c69-9638-4e94-9181-3ae8ef3868e3", "DetectTime": "2023-10-30T14:01:25.745485+02:00", "EventTime": "2023-10-30T14:01:25.745505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4286], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4286/UDP destination IP 42.61.221.194. ", "ContentType": "text/plain"}], "uids": ["CsEEY64BxUEHI3jJh5"]} -{"Format": "IDEA0", "ID": "d8045742-4614-4598-a022-088c4af37cdf", "DetectTime": "2023-10-30T14:01:25.781987+02:00", "EventTime": "2023-10-30T14:01:25.781999+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9OjxY11v5MchSEI0g"]} -{"Format": "IDEA0", "ID": "e7f9e8a2-3efd-43c2-9d93-65f260c93db1", "DetectTime": "2023-10-30T14:01:25.795600+02:00", "EventTime": "2023-10-30T14:01:25.795616+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfEfHJ1rzfjWz1euG6"]} -{"Format": "IDEA0", "ID": "7db945bc-8589-45ff-a244-b31225f779f1", "DetectTime": "2023-10-30T14:01:25.809602+02:00", "EventTime": "2023-10-30T14:01:25.809629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["COGdeX2So95rMN7WQa"]} -{"Format": "IDEA0", "ID": "c9c881fa-115b-4ef1-83ee-993691c17674", "DetectTime": "2023-10-30T14:01:25.853144+02:00", "EventTime": "2023-10-30T14:01:25.853160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. ", "ContentType": "text/plain"}], "uids": ["CloqhCQqGG6OuwPO3"]} -{"Format": "IDEA0", "ID": "e1fddcf7-f7ba-4439-b789-37c9594bd571", "DetectTime": "2023-10-30T14:01:25.892693+02:00", "EventTime": "2023-10-30T14:01:25.892712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CbW1UV2svOCDvhFAY3", "CG8ZvG1CgU8V68oMs6", "C9OjxY11v5MchSEI0g", "ChQTYJ2fqXaZfMvEEc"]} -{"Format": "IDEA0", "ID": "16f97e2f-5465-4643-9862-9ffbb69b5863", "DetectTime": "2023-10-30T14:01:25.906314+02:00", "EventTime": "2023-10-30T14:01:25.906328+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CG8ZvG1CgU8V68oMs6"]} -{"Format": "IDEA0", "ID": "ee3f1b68-3d2a-46e3-af68-103109527067", "DetectTime": "2023-10-30T14:01:25.920350+02:00", "EventTime": "2023-10-30T14:01:25.920366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["Cl4Ah133JPnuuNy0Ld"]} -{"Format": "Json", "ID": "ee3f1b68-3d2a-46e3-af68-103109527067", "DetectTime": "2023-10-30T14:01:25.920350+02:00", "EventTime": "2023-10-30T14:01:25.920366+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:23:04.228719+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:25.987890)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b9447433-2038-4f82-b585-6b262b08ede1", "DetectTime": "2023-10-30T14:01:25.993227+02:00", "EventTime": "2023-10-30T14:01:25.993246+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4LOAifrLjvr1EkW1"]} -{"Format": "IDEA0", "ID": "50b0dbe5-b1b7-4bd1-81fd-e32736cef0a7", "DetectTime": "2023-10-30T14:01:26.016857+02:00", "EventTime": "2023-10-30T14:01:26.016874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CE6cLF4zEzkLdyDQxh"]} -{"Format": "IDEA0", "ID": "c09c3505-c8b7-451a-ac70-52dcd33d88ab", "DetectTime": "2023-10-30T14:01:26.047997+02:00", "EventTime": "2023-10-30T14:01:26.049084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CBAKdA4nvpMVhkDmE3"]} -{"Format": "IDEA0", "ID": "b9495a5e-cb35-48d9-82cc-b136a62122c8", "DetectTime": "2023-10-30T14:01:26.086918+02:00", "EventTime": "2023-10-30T14:01:26.086937+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQFrdK1WKtcK4mGHZd"]} -{"Format": "IDEA0", "ID": "76b6a2c7-2606-4733-a844-31530c61a705", "DetectTime": "2023-10-30T14:01:26.105102+02:00", "EventTime": "2023-10-30T14:01:26.105118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. ", "ContentType": "text/plain"}], "uids": ["CiJ1ln1uxgqnaUweab"]} -{"Format": "IDEA0", "ID": "563055a9-e9fd-45b7-a64d-283169b61237", "DetectTime": "2023-10-30T14:01:26.142942+02:00", "EventTime": "2023-10-30T14:01:26.142969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["C0cAj534LynAXZHa61"]} -{"Format": "IDEA0", "ID": "fe15d636-c43e-47c0-8dbb-5dcda3a1f76c", "DetectTime": "2023-10-30T14:01:26.178693+02:00", "EventTime": "2023-10-30T14:01:26.178715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18100], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18100/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["C0s5NF4fPbHw9ZUO5e"]} -{"Format": "IDEA0", "ID": "60c25ad7-a579-4849-be15-4b0eccaa3e8c", "DetectTime": "2023-10-30T14:01:26.210096+02:00", "EventTime": "2023-10-30T14:01:26.210112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["Cqb941FyJePdMnUx8"]} -{"Format": "IDEA0", "ID": "80efef12-09ae-41cb-a36d-ebdc466a9884", "DetectTime": "2023-10-30T14:01:26.245341+02:00", "EventTime": "2023-10-30T14:01:26.245355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CWxFItTw1TOodanM7"]} -{"Format": "IDEA0", "ID": "305182ea-0589-4196-8adf-25089c62a20d", "DetectTime": "2023-10-30T14:01:26.278214+02:00", "EventTime": "2023-10-30T14:01:26.278232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CuKBzS1dPvQegi0ht2"]} -{"Format": "IDEA0", "ID": "90fd72f4-5e61-4ee8-a890-6f100f995a7d", "DetectTime": "2023-10-30T14:01:26.312411+02:00", "EventTime": "2023-10-30T14:01:26.312427+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIyBE53xmDqGHVEl09"]} -{"Format": "IDEA0", "ID": "a0250c42-8d0e-4dc7-9379-ad89ce841f6a", "DetectTime": "2023-10-30T14:01:26.325978+02:00", "EventTime": "2023-10-30T14:01:26.326005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CdEjO33kabcT4G10aa"]} -{"Format": "Json", "ID": "a0250c42-8d0e-4dc7-9379-ad89ce841f6a", "DetectTime": "2023-10-30T14:01:26.325978+02:00", "EventTime": "2023-10-30T14:01:26.326005+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:25:18.702760+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:26.392239)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f524aa90-43eb-40aa-83e1-9d217e819945", "DetectTime": "2023-10-30T14:01:26.397517+02:00", "EventTime": "2023-10-30T14:01:26.397535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CU9g9F2UQeGcPgX0y8"]} -{"Format": "IDEA0", "ID": "9a69990b-a4de-4829-9719-36866d18050a", "DetectTime": "2023-10-30T14:01:26.433931+02:00", "EventTime": "2023-10-30T14:01:26.434032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13870], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13870/UDP destination IP 92.54.229.42. ", "ContentType": "text/plain"}], "uids": ["ClCuHO1JFLfK83l25"]} -{"Format": "IDEA0", "ID": "54de134e-ef71-4c96-b76b-254a8397111b", "DetectTime": "2023-10-30T14:01:26.466593+02:00", "EventTime": "2023-10-30T14:01:26.466645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22322], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. ", "ContentType": "text/plain"}], "uids": ["CrlugG1RUbeSuDGq3d"]} -{"Format": "IDEA0", "ID": "2e84fe93-9099-439b-80e4-329d83c4271c", "DetectTime": "2023-10-30T14:01:26.497640+02:00", "EventTime": "2023-10-30T14:01:26.497653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["Cy0T1EOtUS0z1ahKe"]} -{"Format": "IDEA0", "ID": "a2c61805-142f-4416-b2fa-0c026faad0f6", "DetectTime": "2023-10-30T14:01:26.526207+02:00", "EventTime": "2023-10-30T14:01:26.526236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["Cefvg930X4WZlfIgTg"]} -{"Format": "IDEA0", "ID": "c229d7de-9258-4f15-8445-493d85a8b972", "DetectTime": "2023-10-30T14:01:26.558062+02:00", "EventTime": "2023-10-30T14:01:26.558082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21005/UDP destination IP 41.108.40.143. ", "ContentType": "text/plain"}], "uids": ["C9xqLy4g8m2TgF4UE5"]} -{"Format": "IDEA0", "ID": "9bbd81b6-892d-4a56-8921-72525e4c6bdd", "DetectTime": "2023-10-30T14:01:26.589759+02:00", "EventTime": "2023-10-30T14:01:26.589784+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyfL98x0m3Cofz8v8"]} -{"Format": "IDEA0", "ID": "4f7a18ed-287a-4c07-aa73-5cd1d74ccde0", "DetectTime": "2023-10-30T14:01:26.604642+02:00", "EventTime": "2023-10-30T14:01:26.604658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27560], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. ", "ContentType": "text/plain"}], "uids": ["CZjMtO2HLsEi5d85Z4"]} -{"Format": "IDEA0", "ID": "1a2abda2-849d-4410-8b70-994bf5ea5fc2", "DetectTime": "2023-10-30T14:01:26.632408+02:00", "EventTime": "2023-10-30T14:01:26.632424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29021], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29021/UDP destination IP 200.25.212.195. ", "ContentType": "text/plain"}], "uids": ["CkeFje2lEbVqKqknc4"]} -{"Format": "Json", "ID": "1a2abda2-849d-4410-8b70-994bf5ea5fc2", "DetectTime": "2023-10-30T14:01:26.632408+02:00", "EventTime": "2023-10-30T14:01:26.632424+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29021], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:26:08.654232+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:26.691177)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9b2702ee-ed70-47f1-aca8-e39d2ef86c61", "DetectTime": "2023-10-30T14:01:26.697205+02:00", "EventTime": "2023-10-30T14:01:26.697223+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8dmA2ta74l35anNd"]} -{"Format": "IDEA0", "ID": "52ce862c-90bc-449e-977a-e14630905e77", "DetectTime": "2023-10-30T14:01:26.713564+02:00", "EventTime": "2023-10-30T14:01:26.713589+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ccb3PIvcUT88vNwB6"]} -{"Format": "IDEA0", "ID": "395c375f-e7ac-4664-bb2a-f911b6bd6cfa", "DetectTime": "2023-10-30T14:01:26.728464+02:00", "EventTime": "2023-10-30T14:01:26.728478+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck0I3C1dPS0nmVThUk"]} -{"Format": "IDEA0", "ID": "11163288-45aa-48e7-958c-3ab7de065ade", "DetectTime": "2023-10-30T14:01:26.743686+02:00", "EventTime": "2023-10-30T14:01:26.743708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8025], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8025/UDP destination IP 189.134.36.148. ", "ContentType": "text/plain"}], "uids": ["CVC6NP2zVT4neUEt84"]} -{"Format": "IDEA0", "ID": "7a9a639c-7638-4d77-9e65-d33df390e50e", "DetectTime": "2023-10-30T14:01:26.773434+02:00", "EventTime": "2023-10-30T14:01:26.773459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQFrdK1WKtcK4mGHZd", "Ccb3PIvcUT88vNwB6", "CyfL98x0m3Cofz8v8", "C6mxXG1Fwz5ZXAmGOh"]} -{"Format": "IDEA0", "ID": "fb96c0c2-d15c-4d17-93f5-8e9ae2cc6816", "DetectTime": "2023-10-30T14:01:26.786466+02:00", "EventTime": "2023-10-30T14:01:26.786479+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6mxXG1Fwz5ZXAmGOh"]} -{"Format": "IDEA0", "ID": "1b3493c0-9270-416b-8136-4155344cb781", "DetectTime": "2023-10-30T14:01:26.801470+02:00", "EventTime": "2023-10-30T14:01:26.801497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["CLO7hHyUZq2iKqWk5"]} -{"Format": "IDEA0", "ID": "00dc7894-f1e8-4403-8eaf-2956b5b7596a", "DetectTime": "2023-10-30T14:01:26.830831+02:00", "EventTime": "2023-10-30T14:01:26.830848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. ", "ContentType": "text/plain"}], "uids": ["CDR28BRx1q6Y4jPM9"]} -{"Format": "IDEA0", "ID": "155f022f-dc14-4fc5-b019-cdac54e526cd", "DetectTime": "2023-10-30T14:01:26.857208+02:00", "EventTime": "2023-10-30T14:01:26.857233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1554/UDP destination IP 176.73.190.199. ", "ContentType": "text/plain"}], "uids": ["CvhuP14kX28dvKslrj"]} -{"Format": "IDEA0", "ID": "57be2cc4-3d6c-4115-a884-725574474784", "DetectTime": "2023-10-30T14:01:26.882919+02:00", "EventTime": "2023-10-30T14:01:26.882940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5541], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. ", "ContentType": "text/plain"}], "uids": ["CYInFH2KGSp5o5qZb8"]} -{"Format": "IDEA0", "ID": "88a20c0a-0dc2-4df5-84cc-63ff6d3fae25", "DetectTime": "2023-10-30T14:01:26.908617+02:00", "EventTime": "2023-10-30T14:01:26.908634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6924/UDP destination IP 178.88.132.202. ", "ContentType": "text/plain"}], "uids": ["CsSNTidecJLs90Ncg"]} -{"Format": "IDEA0", "ID": "59c2f524-11ba-483d-b6b2-0b038f4f9bb6", "DetectTime": "2023-10-30T14:01:26.937151+02:00", "EventTime": "2023-10-30T14:01:26.937169+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CziZ111OD8izqwXwY4"]} -{"Format": "IDEA0", "ID": "2e98bb2c-904e-4e07-b65a-e0ec89232461", "DetectTime": "2023-10-30T14:01:26.950026+02:00", "EventTime": "2023-10-30T14:01:26.950044+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ca04gy3w5HfOrawoJ7"]} -{"Format": "IDEA0", "ID": "30df50de-74a4-4b71-b003-422512672140", "DetectTime": "2023-10-30T14:01:26.965702+02:00", "EventTime": "2023-10-30T14:01:26.965724+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6fl6x4UxH0FpGimn2"]} -{"Format": "IDEA0", "ID": "7e010643-cb84-4591-bac3-bf2d70f757c8", "DetectTime": "2023-10-30T14:01:26.980547+02:00", "EventTime": "2023-10-30T14:01:26.980566+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtVlEP3Fq2FptnExVd"]} -{"Format": "IDEA0", "ID": "27d78b4f-4c8d-4628-910a-4347798a6230", "DetectTime": "2023-10-30T14:01:26.994497+02:00", "EventTime": "2023-10-30T14:01:26.994532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7557], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7557/UDP destination IP 180.73.4.190. ", "ContentType": "text/plain"}], "uids": ["C8nohIlWYXeeDFO6g"]} -{"Format": "IDEA0", "ID": "81debbbd-12cd-4088-b3db-1af67734d93c", "DetectTime": "2023-10-30T14:01:27.021117+02:00", "EventTime": "2023-10-30T14:01:27.021134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19132], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. ", "ContentType": "text/plain"}], "uids": ["CSCUMZ2VjchS9W26W9"]} -{"Format": "Json", "ID": "81debbbd-12cd-4088-b3db-1af67734d93c", "DetectTime": "2023-10-30T14:01:27.021117+02:00", "EventTime": "2023-10-30T14:01:27.021134+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19132], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T19:30:02.999145+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2023/10/30 14:01:27.080159)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "571a1b14-4401-4274-acfd-fe142a0b0b1b", "DetectTime": "2023-10-30T14:01:27.085544+02:00", "EventTime": "2023-10-30T14:01:27.085568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24967], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24967/UDP destination IP 180.254.84.17. ", "ContentType": "text/plain"}], "uids": ["C1Vjy54LCTmZ1H3at9"]} -{"Format": "IDEA0", "ID": "323f74ee-68fd-4270-9da6-91fcf16adc31", "DetectTime": "2023-10-30T14:01:27.113773+02:00", "EventTime": "2023-10-30T14:01:27.113795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. ", "ContentType": "text/plain"}], "uids": ["CdXWup1SS7qA0Sk6ih"]} -{"Format": "IDEA0", "ID": "d1b23572-468a-4f32-9e62-b45738e7694c", "DetectTime": "2023-10-30T14:01:27.137428+02:00", "EventTime": "2023-10-30T14:01:27.137446+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKoMGV1wRxGRJuvzBe"]} -{"Format": "IDEA0", "ID": "58a0b628-d477-49e1-963c-2ed2487aad6c", "DetectTime": "2023-10-30T14:01:27.151724+02:00", "EventTime": "2023-10-30T14:01:27.151752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CDkq5M2o2KHaZ1Yj6g"]} -{"Format": "IDEA0", "ID": "0e4c4010-a5a9-41b3-9416-3ef69a38244e", "DetectTime": "2023-10-30T14:01:27.177191+02:00", "EventTime": "2023-10-30T14:01:27.177212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cb6pdf1HexZzWrBjo8"]} -{"Format": "IDEA0", "ID": "e4bb4d99-b073-435c-9915-d7c28e6bda15", "DetectTime": "2023-10-30T14:01:27.194206+02:00", "EventTime": "2023-10-30T14:01:27.194229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CzWfW111qtIcIxCUj9"]} -{"Format": "IDEA0", "ID": "c3fe65bf-e914-44e0-8a4b-4f1b462849e2", "DetectTime": "2023-10-30T14:01:27.221520+02:00", "EventTime": "2023-10-30T14:01:27.221546+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7A4Uk126Ga1TPMOs1"]} -{"Format": "IDEA0", "ID": "2b8af279-8d99-4cbe-b44f-11dccb6b9a31", "DetectTime": "2023-10-30T14:01:27.235633+02:00", "EventTime": "2023-10-30T14:01:27.235656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25218/UDP destination IP 78.189.109.9. ", "ContentType": "text/plain"}], "uids": ["CFTXh84MA4j8Lq6bXk"]} -{"Format": "IDEA0", "ID": "d6fccaaa-ae61-42f3-9e32-960031a06232", "DetectTime": "2023-10-30T14:01:27.260050+02:00", "EventTime": "2023-10-30T14:01:27.260062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CppkFX1SwWn5Jrzqi", "Cb6pdf1HexZzWrBjo8", "CtVlEP3Fq2FptnExVd", "Ca04gy3w5HfOrawoJ7"]} -{"Format": "IDEA0", "ID": "9f05c3f0-37cd-47a2-9b61-4d2e1fe4e439", "DetectTime": "2023-10-30T14:01:27.272913+02:00", "EventTime": "2023-10-30T14:01:27.272939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CppkFX1SwWn5Jrzqi"]} -{"Format": "IDEA0", "ID": "7ad4ab6d-d4ba-43e3-a4a8-46b2a0d5c08a", "DetectTime": "2023-10-30T14:01:27.287994+02:00", "EventTime": "2023-10-30T14:01:27.288008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CDyhoX3ybDxmA3mtQc"]} -{"Format": "IDEA0", "ID": "c1f3f01b-5208-4a73-971d-a66df3281d9f", "DetectTime": "2023-10-30T14:01:27.314948+02:00", "EventTime": "2023-10-30T14:01:27.314970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZcaV1E9NBnpt8aJ7"]} -{"Format": "IDEA0", "ID": "191dd786-0f40-4f32-85ce-fed606f4c3a0", "DetectTime": "2023-10-30T14:01:27.337066+02:00", "EventTime": "2023-10-30T14:01:27.337093+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CC6jRZ33hHdu3B7x47"]} -{"Format": "IDEA0", "ID": "5192a004-c9ff-41a2-b155-243fc743d2ef", "DetectTime": "2023-10-30T14:01:27.351470+02:00", "EventTime": "2023-10-30T14:01:27.351488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CMOTPl4bPwUPZBoW65"]} -{"Format": "IDEA0", "ID": "ab9bdee9-b7b9-4251-8594-7f8c508c7a05", "DetectTime": "2023-10-30T14:01:27.422688+02:00", "EventTime": "2023-10-30T14:01:27.422716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CJ2BcE14S7Xz2txIPj"]} -{"Format": "IDEA0", "ID": "aeec05ba-6210-422d-8158-aa66dc34e8ce", "DetectTime": "2023-10-30T14:01:27.489021+02:00", "EventTime": "2023-10-30T14:01:27.489039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CCwVhptpQ4BJ3Hmbi"]} -{"Format": "IDEA0", "ID": "a375a739-1723-4af4-85b8-b3a8f465e814", "DetectTime": "2023-10-30T14:01:27.554333+02:00", "EventTime": "2023-10-30T14:01:27.554348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CtMFX11rhBEWyEw1I8"]} -{"Format": "IDEA0", "ID": "101a6e5d-eac9-4725-b123-c64f427b22b5", "DetectTime": "2023-10-30T14:01:27.622810+02:00", "EventTime": "2023-10-30T14:01:27.622836+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvX9Hz3JZQRVPnk0Ll"]} -{"Format": "IDEA0", "ID": "09d7e58a-b3b2-40e0-9e9b-45520fe88df4", "DetectTime": "2023-10-30T14:01:27.637206+02:00", "EventTime": "2023-10-30T14:01:27.637291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CFisTAbJA1HZ5syB2"]} -{"Format": "IDEA0", "ID": "800583b4-b177-45d9-afe0-8b62485aabb7", "DetectTime": "2023-10-30T14:01:27.704394+02:00", "EventTime": "2023-10-30T14:01:27.704419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CL5h0v1Dxcvga2tSJe"]} -{"Format": "Json", "ID": "800583b4-b177-45d9-afe0-8b62485aabb7", "DetectTime": "2023-10-30T14:01:27.704394+02:00", "EventTime": "2023-10-30T14:01:27.704419+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:01:24.172358+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:27.874229)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5c45b634-40e3-4d49-8a42-473d50a01053", "DetectTime": "2023-10-30T14:01:27.878416+02:00", "EventTime": "2023-10-30T14:01:27.878434+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChgTu02gQl0giXu2Ij"]} -{"Format": "IDEA0", "ID": "a1014b4b-0b76-4b2a-882a-bb93d7578e2e", "DetectTime": "2023-10-30T14:01:27.894087+02:00", "EventTime": "2023-10-30T14:01:27.894112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CiGYaG1L0DiGsSymvj"]} -{"Format": "IDEA0", "ID": "87da5027-7f08-4df2-afc1-ad206e094d76", "DetectTime": "2023-10-30T14:01:27.959917+02:00", "EventTime": "2023-10-30T14:01:27.959944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CoHKFI2kBnuN9Lmpy5"]} -{"Format": "IDEA0", "ID": "ec5df8c3-e63c-4b58-bca7-fcbfac83a530", "DetectTime": "2023-10-30T14:01:28.018600+02:00", "EventTime": "2023-10-30T14:01:28.018629+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cs4a203BfQBVUcpDJa"]} -{"Format": "IDEA0", "ID": "9380b8d4-5270-4c93-b658-628d70c24340", "DetectTime": "2023-10-30T14:01:28.034422+02:00", "EventTime": "2023-10-30T14:01:28.034440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CNzEgf3oTqkN44ky7l"]} -{"Format": "IDEA0", "ID": "72a4fe01-08b3-4676-987f-bed458967652", "DetectTime": "2023-10-30T14:01:28.094211+02:00", "EventTime": "2023-10-30T14:01:28.094242+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnuE9Y3UVtJGRDgJqb"]} -{"Format": "IDEA0", "ID": "9976b17a-e965-4942-8c11-e8ee3fc63068", "DetectTime": "2023-10-30T14:01:28.109231+02:00", "EventTime": "2023-10-30T14:01:28.109251+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBo9ms4ZGp8imiX9T2"]} -{"Format": "IDEA0", "ID": "0a33fe42-2199-47cd-906c-c7011339fa76", "DetectTime": "2023-10-30T14:01:28.124264+02:00", "EventTime": "2023-10-30T14:01:28.124282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CIlmR84QOOaE7LKQxb"]} -{"Format": "IDEA0", "ID": "9734da36-a342-4f4d-b8ad-e075e9943cd0", "DetectTime": "2023-10-30T14:01:28.195403+02:00", "EventTime": "2023-10-30T14:01:28.195423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["C9Kqs03uHtoajoXrpj"]} -{"Format": "IDEA0", "ID": "cee7fa86-ffe9-4111-bfea-74190a4964c5", "DetectTime": "2023-10-30T14:01:28.259913+02:00", "EventTime": "2023-10-30T14:01:28.259927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CoLCsB1tWpvPCDJXWd"]} -{"Format": "IDEA0", "ID": "760baf9e-ff18-4fe0-9992-0d530f955c17", "DetectTime": "2023-10-30T14:01:28.323519+02:00", "EventTime": "2023-10-30T14:01:28.323545+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKUrvn4ttP5440NPV1"]} -{"Format": "IDEA0", "ID": "8423eb05-b66a-46fe-875b-83619b29de3c", "DetectTime": "2023-10-30T14:01:28.340724+02:00", "EventTime": "2023-10-30T14:01:28.340744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C2yZ7O371ZT5YX3bv7"]} -{"Format": "IDEA0", "ID": "00b018a9-62ca-4e24-a7be-5db915bedb69", "DetectTime": "2023-10-30T14:01:28.414280+02:00", "EventTime": "2023-10-30T14:01:28.414301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cs4a203BfQBVUcpDJa", "CvX9Hz3JZQRVPnk0Ll", "CiuqEN3GSHx0iVUKLg", "CBo9ms4ZGp8imiX9T2"]} -{"Format": "IDEA0", "ID": "88e524af-2703-4ad9-918a-168a920eeef6", "DetectTime": "2023-10-30T14:01:28.428808+02:00", "EventTime": "2023-10-30T14:01:28.428825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["Cc2dy61UYYKDEOwVn"]} -{"Format": "Json", "ID": "88e524af-2703-4ad9-918a-168a920eeef6", "DetectTime": "2023-10-30T14:01:28.428808+02:00", "EventTime": "2023-10-30T14:01:28.428825+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:01:44.190920+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:28.522205)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2a830f66-a6d9-494f-9abc-f8808e367700", "DetectTime": "2023-10-30T14:01:28.527797+02:00", "EventTime": "2023-10-30T14:01:28.527815+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiuqEN3GSHx0iVUKLg"]} -{"Format": "IDEA0", "ID": "2eea8759-ee9c-43af-a6d9-71c1d7dda810", "DetectTime": "2023-10-30T14:01:28.545491+02:00", "EventTime": "2023-10-30T14:01:28.545517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CrslAQ3gVV1L45cbSj"]} -{"Format": "IDEA0", "ID": "3ec69f38-bdcb-49c7-8cb3-357159a6a4c9", "DetectTime": "2023-10-30T14:01:28.606572+02:00", "EventTime": "2023-10-30T14:01:28.606591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CM5Ti54Mx3BI37qIZ1"]} -{"Format": "IDEA0", "ID": "6124a5c5-112a-49c7-8544-bc8a15241739", "DetectTime": "2023-10-30T14:01:28.667868+02:00", "EventTime": "2023-10-30T14:01:28.667886+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvBcgf4dE8pwLI2Dve"]} -{"Format": "IDEA0", "ID": "455589c8-fce4-4b9b-be14-486ad2c08abd", "DetectTime": "2023-10-30T14:01:28.683043+02:00", "EventTime": "2023-10-30T14:01:28.683062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CM8pDt3N8WiZyH7Sle"]} -{"Format": "IDEA0", "ID": "052cc85f-9b4b-40b8-85bf-213e69fb667b", "DetectTime": "2023-10-30T14:01:28.743938+02:00", "EventTime": "2023-10-30T14:01:28.743965+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1uJi24rdvgevMhW4j"]} -{"Format": "IDEA0", "ID": "cb5c3894-c56d-40fd-a137-dfa23f8fb160", "DetectTime": "2023-10-30T14:01:28.760451+02:00", "EventTime": "2023-10-30T14:01:28.760473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4286], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4286/UDP destination IP 42.61.221.194. ", "ContentType": "text/plain"}], "uids": ["CzHGew4eC9CAeR8Tqj"]} -{"Format": "IDEA0", "ID": "c823f5a9-a2d5-4a7d-8e93-092d92914288", "DetectTime": "2023-10-30T14:01:28.821824+02:00", "EventTime": "2023-10-30T14:01:28.821846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. ", "ContentType": "text/plain"}], "uids": ["CVbSDt2yMtzAa18LSc"]} -{"Format": "IDEA0", "ID": "9a98b984-3014-48af-ac38-4850328ef142", "DetectTime": "2023-10-30T14:01:28.880647+02:00", "EventTime": "2023-10-30T14:01:28.880663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CLQ98a2IkwlejGk7k"]} -{"Format": "IDEA0", "ID": "b79a1281-250e-495b-8e8f-f8d3948f96dd", "DetectTime": "2023-10-30T14:01:28.941145+02:00", "EventTime": "2023-10-30T14:01:28.941172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRK8NH1lcQp141TXs5"]} -{"Format": "IDEA0", "ID": "44ac23e3-12a1-4caf-8cec-63d905c00d95", "DetectTime": "2023-10-30T14:01:28.957179+02:00", "EventTime": "2023-10-30T14:01:28.957202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CwAbAhZkUNiPc8mGg"]} -{"Format": "IDEA0", "ID": "88174628-45a2-403c-b302-7c1224684cdb", "DetectTime": "2023-10-30T14:01:29.021905+02:00", "EventTime": "2023-10-30T14:01:29.021931+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CgeLx9DJ8ynqt1Tbf"]} -{"Format": "IDEA0", "ID": "b9658102-c7f1-4d90-a6f8-5cf79b4302fc", "DetectTime": "2023-10-30T14:01:29.038560+02:00", "EventTime": "2023-10-30T14:01:29.038571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CJZgzs4tfGdUn6pTW"]} -{"Format": "Json", "ID": "b9658102-c7f1-4d90-a6f8-5cf79b4302fc", "DetectTime": "2023-10-30T14:01:29.038560+02:00", "EventTime": "2023-10-30T14:01:29.038571+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:01:45.571872+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:29.135763)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d4de06d0-a167-4070-9da4-e87b921aa961", "DetectTime": "2023-10-30T14:01:29.142216+02:00", "EventTime": "2023-10-30T14:01:29.142239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. ", "ContentType": "text/plain"}], "uids": ["C3WCt649yd2qPmvDPh"]} -{"Format": "IDEA0", "ID": "40a6d1a4-c0e0-41b8-bf2b-62a59ab878db", "DetectTime": "2023-10-30T14:01:29.203048+02:00", "EventTime": "2023-10-30T14:01:29.203070+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQlrGC4bU90lqfS3Ua"]} -{"Format": "IDEA0", "ID": "7cff8ff8-9f4f-4bd6-8134-1f89ea5bdb8d", "DetectTime": "2023-10-30T14:01:29.219217+02:00", "EventTime": "2023-10-30T14:01:29.219238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18100], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18100/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CgVf5A371gCmdbeh76"]} -{"Format": "IDEA0", "ID": "857c00c9-16c6-471d-bcb5-309c71d0003d", "DetectTime": "2023-10-30T14:01:29.291894+02:00", "EventTime": "2023-10-30T14:01:29.291916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CUzfZ828cbGvfpKulc"]} -{"Format": "IDEA0", "ID": "5b5a739e-1b0b-4ebb-964b-3c0e6f7648ac", "DetectTime": "2023-10-30T14:01:29.354192+02:00", "EventTime": "2023-10-30T14:01:29.354212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEZA1l1qnmBGWaalBe"]} -{"Format": "IDEA0", "ID": "67625109-9671-4d81-87bc-816e576b4f20", "DetectTime": "2023-10-30T14:01:29.369685+02:00", "EventTime": "2023-10-30T14:01:29.369700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["CSzSRk3CAXXBRzlSF6"]} -{"Format": "IDEA0", "ID": "067ec815-11df-4264-80a1-35e211f362fb", "DetectTime": "2023-10-30T14:01:29.426627+02:00", "EventTime": "2023-10-30T14:01:29.426653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CFtTLq4J45RYGtkJd9"]} -{"Format": "IDEA0", "ID": "63a32f8e-4234-4e91-870d-2be08670bda3", "DetectTime": "2023-10-30T14:01:29.487592+02:00", "EventTime": "2023-10-30T14:01:29.487616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CmhCl33bcfvrGMUPec"]} -{"Format": "IDEA0", "ID": "67760fc1-b774-4039-b895-83bff35e8ea5", "DetectTime": "2023-10-30T14:01:29.558209+02:00", "EventTime": "2023-10-30T14:01:29.558235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CVCbjb17KyAvFeYCa6"]} -{"Format": "IDEA0", "ID": "7ee37e94-da83-418f-a466-0418c013c935", "DetectTime": "2023-10-30T14:01:29.632984+02:00", "EventTime": "2023-10-30T14:01:29.633001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CUxgFk4ycwwP2NAo2j"]} -{"Format": "Json", "ID": "7ee37e94-da83-418f-a466-0418c013c935", "DetectTime": "2023-10-30T14:01:29.632984+02:00", "EventTime": "2023-10-30T14:01:29.633001+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:01:47.542920+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:29.733172)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "027b551a-70c6-47fa-858c-887103a233ff", "DetectTime": "2023-10-30T14:01:29.738558+02:00", "EventTime": "2023-10-30T14:01:29.738598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22322], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. ", "ContentType": "text/plain"}], "uids": ["CaFd5M2eP6V6Lxcw78"]} -{"Format": "IDEA0", "ID": "34aba241-1280-4b67-85fb-0ee3e3e37289", "DetectTime": "2023-10-30T14:01:29.800048+02:00", "EventTime": "2023-10-30T14:01:29.800071+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbRmq94G79aBrdIGN1"]} -{"Format": "IDEA0", "ID": "3f79c93b-7e97-44cc-83eb-27d3ece05c3e", "DetectTime": "2023-10-30T14:01:29.815342+02:00", "EventTime": "2023-10-30T14:01:29.815363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["COak6g3PTKGvGEaGE1"]} -{"Format": "IDEA0", "ID": "a7207515-86c1-4726-8189-e7f3ad2e802f", "DetectTime": "2023-10-30T14:01:29.873621+02:00", "EventTime": "2023-10-30T14:01:29.873645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["CgH3XT1cPu9yyaGCRk"]} -{"Format": "IDEA0", "ID": "689fd67f-6091-42ed-9133-bcf1571df31a", "DetectTime": "2023-10-30T14:01:29.929744+02:00", "EventTime": "2023-10-30T14:01:29.929806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cb3zFB3T5hlfE4zM5", "CgeLx9DJ8ynqt1Tbf", "C1uJi24rdvgevMhW4j", "CEZA1l1qnmBGWaalBe"]} -{"Format": "IDEA0", "ID": "11e3a8b3-aed3-42bb-97ba-9b78ac5cbc74", "DetectTime": "2023-10-30T14:01:29.947992+02:00", "EventTime": "2023-10-30T14:01:29.948019+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cb3zFB3T5hlfE4zM5"]} -{"Format": "IDEA0", "ID": "74b334a9-7200-4717-9f12-5d26e130f14d", "DetectTime": "2023-10-30T14:01:29.971042+02:00", "EventTime": "2023-10-30T14:01:29.971062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21005], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21005/UDP destination IP 41.108.40.143. ", "ContentType": "text/plain"}], "uids": ["Cqr6ivGVruI7DLzef"]} -{"Format": "IDEA0", "ID": "732d4c51-29a1-4338-9b0c-f6bd7ff92560", "DetectTime": "2023-10-30T14:01:30.029520+02:00", "EventTime": "2023-10-30T14:01:30.029543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27560], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. ", "ContentType": "text/plain"}], "uids": ["CQo5ZfYJO3G9RxdN3"]} -{"Format": "IDEA0", "ID": "a5e54e67-f00c-44ed-9888-014b9372c426", "DetectTime": "2023-10-30T14:01:30.083941+02:00", "EventTime": "2023-10-30T14:01:30.083953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29021], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29021/UDP destination IP 200.25.212.195. ", "ContentType": "text/plain"}], "uids": ["CtMYZcEtBaVLsv1R1"]} -{"Format": "IDEA0", "ID": "274cac66-a9c6-4871-bd50-7fde366039cd", "DetectTime": "2023-10-30T14:01:30.138987+02:00", "EventTime": "2023-10-30T14:01:30.139009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["CYXy4q3qbi6y3Wxs5c"]} -{"Format": "IDEA0", "ID": "57c6664e-7b8e-43b5-9f9b-9d80cd2cf14e", "DetectTime": "2023-10-30T14:01:30.197683+02:00", "EventTime": "2023-10-30T14:01:30.197703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. ", "ContentType": "text/plain"}], "uids": ["CWmQcKwCR2aJNreG5"]} -{"Format": "Json", "ID": "57c6664e-7b8e-43b5-9f9b-9d80cd2cf14e", "DetectTime": "2023-10-30T14:01:30.197683+02:00", "EventTime": "2023-10-30T14:01:30.197703+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:02:22.353818+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:30.290415)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d8736fab-6f06-4e86-8209-985fb0fa65a4", "DetectTime": "2023-10-30T14:01:30.296834+02:00", "EventTime": "2023-10-30T14:01:30.296857+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Clc7Ak4ZQOrXLkM6P5"]} -{"Format": "IDEA0", "ID": "68948086-0b3c-46ab-af1b-4503b947a748", "DetectTime": "2023-10-30T14:01:30.317343+02:00", "EventTime": "2023-10-30T14:01:30.317372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5541], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. ", "ContentType": "text/plain"}], "uids": ["C0LSXa3HlnakxdMbOb"]} -{"Format": "IDEA0", "ID": "87a94827-f974-4612-8871-5debc5c44dff", "DetectTime": "2023-10-30T14:01:30.372714+02:00", "EventTime": "2023-10-30T14:01:30.372747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19132], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. ", "ContentType": "text/plain"}], "uids": ["CwQBSe4NmgyZ5uT13i"]} -{"Format": "IDEA0", "ID": "0afdcec0-5875-434c-905f-b9cb5cf71a68", "DetectTime": "2023-10-30T14:01:30.432552+02:00", "EventTime": "2023-10-30T14:01:30.432575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24967], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24967/UDP destination IP 180.254.84.17. ", "ContentType": "text/plain"}], "uids": ["CfjR4G3wuGsRJoFbgc"]} -{"Format": "IDEA0", "ID": "fdac1340-23c9-4352-9d55-e8747a482ef3", "DetectTime": "2023-10-30T14:01:30.486683+02:00", "EventTime": "2023-10-30T14:01:30.486701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. ", "ContentType": "text/plain"}], "uids": ["CHXfiQ1IyZqE3oiyQj"]} -{"Format": "IDEA0", "ID": "5e430934-db7e-4313-ab5e-ca934eb2eedb", "DetectTime": "2023-10-30T14:01:30.537856+02:00", "EventTime": "2023-10-30T14:01:30.537879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CqhFpj3L55qjbwDBgi"]} -{"Format": "IDEA0", "ID": "dcde0c1f-71da-472e-b29d-6c51b27006a3", "DetectTime": "2023-10-30T14:01:30.594106+02:00", "EventTime": "2023-10-30T14:01:30.594122+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSj7sbctWuJ27wl02"]} -{"Format": "IDEA0", "ID": "cb1ebbdd-58dd-407e-9178-68a681e54570", "DetectTime": "2023-10-30T14:01:30.612477+02:00", "EventTime": "2023-10-30T14:01:30.612495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CcPHAj1zU68JuRgzDg"]} -{"Format": "IDEA0", "ID": "a78eea94-780e-4e35-884e-d0d54db05daf", "DetectTime": "2023-10-30T14:01:30.666065+02:00", "EventTime": "2023-10-30T14:01:30.666078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBJe6O3J3KmOpv009l"]} -{"Format": "IDEA0", "ID": "b613d066-bc2c-407c-8a7c-f64bca03015e", "DetectTime": "2023-10-30T14:01:30.719705+02:00", "EventTime": "2023-10-30T14:01:30.719729+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cm9IdT1Y9ga2mQrvvj"]} -{"Format": "IDEA0", "ID": "769ce2ff-0429-4e9e-a71f-211b3332b65b", "DetectTime": "2023-10-30T14:01:30.735048+02:00", "EventTime": "2023-10-30T14:01:30.735066+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbW61xzO0gRdARE7f"]} -{"Format": "IDEA0", "ID": "00313142-38c0-4597-bd41-ce0176b2ace0", "DetectTime": "2023-10-30T14:01:30.751919+02:00", "EventTime": "2023-10-30T14:01:30.751965+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2IxMV1V05SjslUsA"]} -{"Format": "IDEA0", "ID": "8bc59681-243a-4402-b3f7-66ebedec6d27", "DetectTime": "2023-10-30T14:01:30.767147+02:00", "EventTime": "2023-10-30T14:01:30.767166+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWuD1g4qHQ7mFwQXdc"]} -{"Format": "IDEA0", "ID": "1e9052e9-3584-42aa-a63e-8dd019c466df", "DetectTime": "2023-10-30T14:01:30.782354+02:00", "EventTime": "2023-10-30T14:01:30.782383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["C26qfb4drIGvIVqPf6"]} -{"Format": "IDEA0", "ID": "99e24410-020c-46ea-a10d-288333085922", "DetectTime": "2023-10-30T14:01:30.815485+02:00", "EventTime": "2023-10-30T14:01:30.815513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7FOLCVGwC4hYgG68"]} -{"Format": "IDEA0", "ID": "83e83cc2-3ae1-40e4-9eb8-d024334b9108", "DetectTime": "2023-10-30T14:01:30.831941+02:00", "EventTime": "2023-10-30T14:01:30.831954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CbW61xzO0gRdARE7f", "CWuD1g4qHQ7mFwQXdc", "C2Ejas2daial6wxVxc", "CSj7sbctWuJ27wl02"]} -{"Format": "IDEA0", "ID": "95fc0820-7793-4817-af49-bd3cb23df400", "DetectTime": "2023-10-30T14:01:30.847658+02:00", "EventTime": "2023-10-30T14:01:30.847683+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2Ejas2daial6wxVxc"]} -{"Format": "IDEA0", "ID": "2817c844-beaa-4245-9c43-d717209a3a16", "DetectTime": "2023-10-30T14:01:30.864350+02:00", "EventTime": "2023-10-30T14:01:30.864369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["Cib0PtVAzuLNQy7gi"]} -{"Format": "Json", "ID": "2817c844-beaa-4245-9c43-d717209a3a16", "DetectTime": "2023-10-30T14:01:30.864350+02:00", "EventTime": "2023-10-30T14:01:30.864369+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:34:55.050885+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:30.949994)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0ec8e913-e273-4908-ad8c-82315d4b7c78", "DetectTime": "2023-10-30T14:01:30.955627+02:00", "EventTime": "2023-10-30T14:01:30.955647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CciWsj2D32sjdJ1HAh"]} -{"Format": "IDEA0", "ID": "59c2c261-149a-4ac7-a3cb-d20051c9c509", "DetectTime": "2023-10-30T14:01:31.011029+02:00", "EventTime": "2023-10-30T14:01:31.011054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cu87av4gElkVYgwAma"]} -{"Format": "IDEA0", "ID": "544b7d68-df0f-4c62-a6ed-f0d774411ba0", "DetectTime": "2023-10-30T14:01:31.062376+02:00", "EventTime": "2023-10-30T14:01:31.062397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Ceu25RQ5YfpRjBVKd"]} -{"Format": "IDEA0", "ID": "58c1ed83-d9d5-476a-9fd0-b2ff9bc3cc93", "DetectTime": "2023-10-30T14:01:31.112832+02:00", "EventTime": "2023-10-30T14:01:31.112853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["COxYx02W0kwsoDMuul"]} -{"Format": "IDEA0", "ID": "ad12c459-d12a-43e5-948b-c1a77ac8bb3d", "DetectTime": "2023-10-30T14:01:31.166995+02:00", "EventTime": "2023-10-30T14:01:31.167016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CAeTJk2DHyfusrqTqh"]} -{"Format": "IDEA0", "ID": "98332efc-2f75-4422-b566-c916178e068f", "DetectTime": "2023-10-30T14:01:31.218183+02:00", "EventTime": "2023-10-30T14:01:31.218203+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7Trgw25Mzc5zFwDR8"]} -{"Format": "IDEA0", "ID": "66b8fa09-73e6-46b8-8af5-3188cceebb0e", "DetectTime": "2023-10-30T14:01:31.236761+02:00", "EventTime": "2023-10-30T14:01:31.236785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CHlJNq39qB4y7Q9ez7"]} -{"Format": "IDEA0", "ID": "7898575f-ed8d-4127-9d81-b0afa8dd3bb7", "DetectTime": "2023-10-30T14:01:31.292572+02:00", "EventTime": "2023-10-30T14:01:31.292585+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQIMbJ1bLhCmtPTdXg"]} -{"Format": "IDEA0", "ID": "42700427-5a86-449f-b603-7b3bc970528d", "DetectTime": "2023-10-30T14:01:31.307840+02:00", "EventTime": "2023-10-30T14:01:31.307858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CzB36G2livx9cPpYS"]} -{"Format": "IDEA0", "ID": "e44efb26-c650-4d0a-beb7-48e8339432eb", "DetectTime": "2023-10-30T14:01:31.357322+02:00", "EventTime": "2023-10-30T14:01:31.357347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CswLR02YkP2rkfsOvj"]} -{"Format": "Json", "ID": "e44efb26-c650-4d0a-beb7-48e8339432eb", "DetectTime": "2023-10-30T14:01:31.357322+02:00", "EventTime": "2023-10-30T14:01:31.357347+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:34:56.076967+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:31.441973)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0ac847bd-d86e-4d73-bdb4-4b70f938e2e9", "DetectTime": "2023-10-30T14:01:31.448845+02:00", "EventTime": "2023-10-30T14:01:31.448864+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.178.163.118"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 2.178.163.118 from 10.0.2.19. blacklisted IP AS: TCI, IR AS5822 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CNpTlv2Mbfw2f38juf"]} -{"Format": "IDEA0", "ID": "113dbcb8-1fc0-4041-a195-dcee543e9235", "DetectTime": "2023-10-30T14:01:31.512573+02:00", "EventTime": "2023-10-30T14:01:31.512598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CZO2C3r8H63yR0J7c"]} -{"Format": "IDEA0", "ID": "4920df5a-7023-4fe7-9060-4ea7ad55fd25", "DetectTime": "2023-10-30T14:01:31.561832+02:00", "EventTime": "2023-10-30T14:01:31.561918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CrQnhJ38AiWZ6NjOU4"]} -{"Format": "IDEA0", "ID": "433f2986-901b-444b-929c-e953f7425cc4", "DetectTime": "2023-10-30T14:01:31.610486+02:00", "EventTime": "2023-10-30T14:01:31.610508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CCGRy64SPo9IYn0qx2"]} -{"Format": "IDEA0", "ID": "31d151ac-168f-440e-9a37-b61fe1953a72", "DetectTime": "2023-10-30T14:01:31.659878+02:00", "EventTime": "2023-10-30T14:01:31.659904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CEA7GU3eNpA4OG17fd"]} -{"Format": "IDEA0", "ID": "494d45da-1a2c-408f-ac86-503030aa082b", "DetectTime": "2023-10-30T14:01:31.715728+02:00", "EventTime": "2023-10-30T14:01:31.715748+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIqDoWQrDBtuGMnS8"]} -{"Format": "IDEA0", "ID": "ce7e73ba-ad1f-4694-89de-b404f12d74b8", "DetectTime": "2023-10-30T14:01:31.733097+02:00", "EventTime": "2023-10-30T14:01:31.733115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CPG7O8kU4qbf12Oej"]} -{"Format": "IDEA0", "ID": "f1de9bdb-46a6-4ff0-ac51-43a1b96900fe", "DetectTime": "2023-10-30T14:01:31.782153+02:00", "EventTime": "2023-10-30T14:01:31.782170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CZzaqW1YJ31Hbtpnh5"]} -{"Format": "IDEA0", "ID": "97e8ebbc-8327-43c5-a8c8-fd197fd97498", "DetectTime": "2023-10-30T14:01:31.828084+02:00", "EventTime": "2023-10-30T14:01:31.828100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C5STG2wBTltRRuQ1f"]} -{"Format": "IDEA0", "ID": "e9d55f11-3c1d-497d-8e3e-c2a1c8c3695a", "DetectTime": "2023-10-30T14:01:31.875284+02:00", "EventTime": "2023-10-30T14:01:31.875312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["C5ZgGA1cOGk7k8Rcd7"]} -{"Format": "Json", "ID": "e9d55f11-3c1d-497d-8e3e-c2a1c8c3695a", "DetectTime": "2023-10-30T14:01:31.875284+02:00", "EventTime": "2023-10-30T14:01:31.875312+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:34:57.254305+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:31.961756)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "859459cc-5ee7-4af1-8856-6b14baca62a1", "DetectTime": "2023-10-30T14:01:31.967600+02:00", "EventTime": "2023-10-30T14:01:31.967613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. ", "ContentType": "text/plain"}], "uids": ["Cibduq3O7f7IiszCYa"]} -{"Format": "IDEA0", "ID": "5ae34523-4d9b-4c03-a57d-d78bae542ff2", "DetectTime": "2023-10-30T14:01:32.018299+02:00", "EventTime": "2023-10-30T14:01:32.018385+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqNKNu1yAoiUwOtuPg"]} -{"Format": "IDEA0", "ID": "a8954fd2-9e22-49a9-ab8f-da0274036f1c", "DetectTime": "2023-10-30T14:01:32.029608+02:00", "EventTime": "2023-10-30T14:01:32.029631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CEl2rw3aahyMl0fcD4"]} -{"Format": "IDEA0", "ID": "b38a8573-e683-4b97-b78f-8aa75e20a8ef", "DetectTime": "2023-10-30T14:01:32.073988+02:00", "EventTime": "2023-10-30T14:01:32.074008+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1pICj2EWSadOmGLtk"]} -{"Format": "IDEA0", "ID": "f207e80b-fed0-4096-a94c-d5258233dcb8", "DetectTime": "2023-10-30T14:01:32.087240+02:00", "EventTime": "2023-10-30T14:01:32.087260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CCIanYU41GRkq9E36"]} -{"Format": "IDEA0", "ID": "3bbd397d-9552-4b95-80d8-16fcc0b89832", "DetectTime": "2023-10-30T14:01:32.137475+02:00", "EventTime": "2023-10-30T14:01:32.137491+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjB0lB1ozmAejpXF04"]} -{"Format": "IDEA0", "ID": "cd7db40e-03b3-46e6-bec4-024b6b8a9901", "DetectTime": "2023-10-30T14:01:32.147697+02:00", "EventTime": "2023-10-30T14:01:32.147709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["CEQe1dLXYJSun0WL"]} -{"Format": "IDEA0", "ID": "fe9b194a-bbe6-4ff6-8c29-f20048dce95d", "DetectTime": "2023-10-30T14:01:32.190043+02:00", "EventTime": "2023-10-30T14:01:32.190060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CNpRCK2b927ecZsmv8"]} -{"Format": "IDEA0", "ID": "1f380280-21cb-42d3-95f1-e837666a2540", "DetectTime": "2023-10-30T14:01:32.235861+02:00", "EventTime": "2023-10-30T14:01:32.235883+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWtRc428O1ubbkREEj"]} -{"Format": "IDEA0", "ID": "ead67c47-2f5a-498f-b3e8-90f8e99288e2", "DetectTime": "2023-10-30T14:01:32.248349+02:00", "EventTime": "2023-10-30T14:01:32.248365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CQIMbJ1bLhCmtPTdXg", "CqNKNu1yAoiUwOtuPg", "C0WGXg27sYS7QflbWk", "CjB0lB1ozmAejpXF04"]} -{"Format": "IDEA0", "ID": "cfa0eeaa-4a83-45e7-8c97-063886d81489", "DetectTime": "2023-10-30T14:01:32.258983+02:00", "EventTime": "2023-10-30T14:01:32.259006+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0WGXg27sYS7QflbWk"]} -{"Format": "IDEA0", "ID": "4b1ed30b-f950-4360-96f9-6edb8665fc11", "DetectTime": "2023-10-30T14:01:32.270400+02:00", "EventTime": "2023-10-30T14:01:32.270430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. ", "ContentType": "text/plain"}], "uids": ["CRGDDi2e176jas8aPe"]} -{"Format": "IDEA0", "ID": "e577986b-17b3-4b28-9cf4-133a9e259601", "DetectTime": "2023-10-30T14:01:32.314508+02:00", "EventTime": "2023-10-30T14:01:32.314525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CMKTVG1sLDTRKuONuj"]} -{"Format": "IDEA0", "ID": "c3ff6e25-b588-45bc-983f-910d2b2b6dfc", "DetectTime": "2023-10-30T14:01:32.359582+02:00", "EventTime": "2023-10-30T14:01:32.359603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CJFWq42VbXrkOEARub"]} -{"Format": "Json", "ID": "c3ff6e25-b588-45bc-983f-910d2b2b6dfc", "DetectTime": "2023-10-30T14:01:32.359582+02:00", "EventTime": "2023-10-30T14:01:32.359603+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:35:49.877609+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:32.439583)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6dd85154-64f3-4d7b-b15a-c12147598f41", "DetectTime": "2023-10-30T14:01:32.447350+02:00", "EventTime": "2023-10-30T14:01:32.447373+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2pODUSztdrW2Cma8"]} -{"Format": "IDEA0", "ID": "9df96005-bbfe-45a8-b715-71cf921e20be", "DetectTime": "2023-10-30T14:01:32.459804+02:00", "EventTime": "2023-10-30T14:01:32.459855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CjOErA4FlJqKbgBYs5"]} -{"Format": "IDEA0", "ID": "9d2f2d7a-2d82-4aae-97d7-d74b66eea994", "DetectTime": "2023-10-30T14:01:32.501363+02:00", "EventTime": "2023-10-30T14:01:32.501376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22322], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. ", "ContentType": "text/plain"}], "uids": ["Cy3Zag4l2Wb5VXPyc8"]} -{"Format": "IDEA0", "ID": "4aeff36c-8e20-42d1-9ab6-50b0ad21d940", "DetectTime": "2023-10-30T14:01:32.544961+02:00", "EventTime": "2023-10-30T14:01:32.544986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["Cxk2RRZlfWOL5mI8b"]} -{"Format": "IDEA0", "ID": "19004882-a68f-412b-9933-c191f40ffb6f", "DetectTime": "2023-10-30T14:01:32.589057+02:00", "EventTime": "2023-10-30T14:01:32.589077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["CZRq4a4iZnqJ1Qihh"]} -{"Format": "IDEA0", "ID": "f132978a-4ace-4775-9d23-c2b661d9d01a", "DetectTime": "2023-10-30T14:01:32.632208+02:00", "EventTime": "2023-10-30T14:01:32.632233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29021], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29021/UDP destination IP 200.25.212.195. ", "ContentType": "text/plain"}], "uids": ["CY3keU3sc8jLTt8hll"]} -{"Format": "IDEA0", "ID": "1a6e9334-4236-47d9-a08c-f712c8390d48", "DetectTime": "2023-10-30T14:01:32.673749+02:00", "EventTime": "2023-10-30T14:01:32.673779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27560], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. ", "ContentType": "text/plain"}], "uids": ["CVyk6G3TGlxLOpfCQ9"]} -{"Format": "IDEA0", "ID": "8ca5bfcd-75b7-4be8-8add-f8154af8cf45", "DetectTime": "2023-10-30T14:01:32.719855+02:00", "EventTime": "2023-10-30T14:01:32.719875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["CcyCN71HtQqO4lmFAa"]} -{"Format": "IDEA0", "ID": "d74e8715-6727-478b-b569-0006e3e5ceec", "DetectTime": "2023-10-30T14:01:32.762184+02:00", "EventTime": "2023-10-30T14:01:32.762205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5541], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. ", "ContentType": "text/plain"}], "uids": ["CMbtxM3BZFPr5ecIYj"]} -{"Format": "Json", "ID": "d74e8715-6727-478b-b569-0006e3e5ceec", "DetectTime": "2023-10-30T14:01:32.762184+02:00", "EventTime": "2023-10-30T14:01:32.762205+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5541], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T20:36:25.830413+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2023/10/30 14:01:32.835483)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0e8ab244-6df9-49fb-8b82-701c251e84ca", "DetectTime": "2023-10-30T14:01:32.841001+02:00", "EventTime": "2023-10-30T14:01:32.841018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. ", "ContentType": "text/plain"}], "uids": ["Cd9vTu41k7gdLURG2d"]} -{"Format": "IDEA0", "ID": "9d47144c-e399-4785-ae0d-30fc24ce78bd", "DetectTime": "2023-10-30T14:01:32.881479+02:00", "EventTime": "2023-10-30T14:01:32.881506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19132], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. ", "ContentType": "text/plain"}], "uids": ["CgyPb43fwvoCxDKRrh"]} -{"Format": "IDEA0", "ID": "00968cfe-1f6f-466f-a0f0-ada138850611", "DetectTime": "2023-10-30T14:01:32.919124+02:00", "EventTime": "2023-10-30T14:01:32.919180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. ", "ContentType": "text/plain"}], "uids": ["ConrNL1MTLtZ1X8T89"]} -{"Format": "IDEA0", "ID": "2f8fc082-7e0e-4e7b-ba61-160403e8fa4a", "DetectTime": "2023-10-30T14:01:32.956441+02:00", "EventTime": "2023-10-30T14:01:32.956469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24967], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24967/UDP destination IP 180.254.84.17. ", "ContentType": "text/plain"}], "uids": ["C9XRXG1prPKAG6iBol"]} -{"Format": "IDEA0", "ID": "8dae67b2-705a-4a03-8bb7-11e10f7e7c85", "DetectTime": "2023-10-30T14:01:32.996062+02:00", "EventTime": "2023-10-30T14:01:32.996084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CQCIuG4QijtBx076Nf"]} -{"Format": "IDEA0", "ID": "dd4c5d97-7dec-4092-ab16-d06862bc3905", "DetectTime": "2023-10-30T14:01:33.038893+02:00", "EventTime": "2023-10-30T14:01:33.038920+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CytznksGrmkUNE4Kh"]} -{"Format": "IDEA0", "ID": "d887bc5f-796f-4f91-b377-f12675bb32cd", "DetectTime": "2023-10-30T14:01:33.050540+02:00", "EventTime": "2023-10-30T14:01:33.050559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CGSS3B3hGIDdtHqHo1"]} -{"Format": "IDEA0", "ID": "b03265a4-1d42-49bb-aca9-26bd2bded129", "DetectTime": "2023-10-30T14:01:33.089219+02:00", "EventTime": "2023-10-30T14:01:33.089238+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWKkxzGH88Mly2kR6"]} -{"Format": "IDEA0", "ID": "72091e1a-c7ff-4ca5-9ef6-863d21708561", "DetectTime": "2023-10-30T14:01:33.099346+02:00", "EventTime": "2023-10-30T14:01:33.099366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqrXkc2fuAxmL4Gos5"]} -{"Format": "IDEA0", "ID": "0936f72c-ba10-460d-b4a9-28de2b32a6f8", "DetectTime": "2023-10-30T14:01:33.139644+02:00", "EventTime": "2023-10-30T14:01:33.139660+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C89eCX4WMPMKTcGGh"]} -{"Format": "IDEA0", "ID": "c841a450-37a8-439d-950e-343a606b6a9d", "DetectTime": "2023-10-30T14:01:33.151212+02:00", "EventTime": "2023-10-30T14:01:33.151240+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsedyQ16mkHimVnK7k"]} -{"Format": "IDEA0", "ID": "542205b5-348e-48b8-b083-3ca25597315d", "DetectTime": "2023-10-30T14:01:33.162696+02:00", "EventTime": "2023-10-30T14:01:33.162950+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CA7Vtm4SOtMawmMiTf"]} -{"Format": "IDEA0", "ID": "9f5ac20a-ec38-4f5b-8e7f-323cc28b4d0f", "DetectTime": "2023-10-30T14:01:33.173724+02:00", "EventTime": "2023-10-30T14:01:33.173742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CMF8z9m1Duxh46MV7"]} -{"Format": "IDEA0", "ID": "04ce9dd5-5f8c-4f2f-90fb-f27a7d59f73a", "DetectTime": "2023-10-30T14:01:33.233746+02:00", "EventTime": "2023-10-30T14:01:33.233841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CehQtlxEdh24B3Bsd"]} -{"Format": "IDEA0", "ID": "c97a98d7-f556-4245-a7c5-598f5a92372b", "DetectTime": "2023-10-30T14:01:33.262375+02:00", "EventTime": "2023-10-30T14:01:33.262399+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtqRkH1WYE8P25Ln37"]} -{"Format": "IDEA0", "ID": "0be66892-f074-4cb2-8cb8-f1d1ff55bc61", "DetectTime": "2023-10-30T14:01:33.272456+02:00", "EventTime": "2023-10-30T14:01:33.272474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CBHqbr2yx8VEieohyj"]} -{"Format": "IDEA0", "ID": "092b23c7-4dfe-4efa-a9cb-03baac3a1a70", "DetectTime": "2023-10-30T14:01:33.329253+02:00", "EventTime": "2023-10-30T14:01:33.329270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CthfBq1VnjkVHPQaki"]} -{"Format": "IDEA0", "ID": "a0601f0e-da82-46a1-afc0-b882aff867dd", "DetectTime": "2023-10-30T14:01:33.391307+02:00", "EventTime": "2023-10-30T14:01:33.391321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CblPk11R6MsZseG7D3"]} -{"Format": "IDEA0", "ID": "0798a9ee-a86c-4be0-96c7-67f14e25228a", "DetectTime": "2023-10-30T14:01:33.452362+02:00", "EventTime": "2023-10-30T14:01:33.452384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Ch6TIH2AlE9v76yhia"]} -{"Format": "IDEA0", "ID": "3681e8fe-0ce3-42f0-9cc8-3b0968acd07c", "DetectTime": "2023-10-30T14:01:33.511508+02:00", "EventTime": "2023-10-30T14:01:33.511525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CRYo892oClQZhWFIWl"]} -{"Format": "Json", "ID": "3681e8fe-0ce3-42f0-9cc8-3b0968acd07c", "DetectTime": "2023-10-30T14:01:33.511508+02:00", "EventTime": "2023-10-30T14:01:33.511525+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:07:43.992508+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:33.663607)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "53ef7020-79be-42b2-9888-8749d1467609", "DetectTime": "2023-10-30T14:01:33.669953+02:00", "EventTime": "2023-10-30T14:01:33.669980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CHPcVl3htT0tujJFCb"]} -{"Format": "IDEA0", "ID": "7218d4ec-ab91-4fd5-a90a-ae2629f6a694", "DetectTime": "2023-10-30T14:01:33.731028+02:00", "EventTime": "2023-10-30T14:01:33.731047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["C33sHa4teSZw9n8tfg"]} -{"Format": "IDEA0", "ID": "ef759e2a-5667-4da1-bc01-37bf939f09da", "DetectTime": "2023-10-30T14:01:33.792707+02:00", "EventTime": "2023-10-30T14:01:33.792735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Ca4tU92exoLbDR5uH4"]} -{"Format": "IDEA0", "ID": "fb9f65db-c0bb-4a16-9ce2-ede12fe21ec2", "DetectTime": "2023-10-30T14:01:33.852099+02:00", "EventTime": "2023-10-30T14:01:33.852123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CTZJPa2sa0iDEByWN7"]} -{"Format": "IDEA0", "ID": "1f905939-390c-4272-a709-8682eec3d196", "DetectTime": "2023-10-30T14:01:33.912087+02:00", "EventTime": "2023-10-30T14:01:33.912115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CdFzL34ksHujDtgB9b"]} -{"Format": "IDEA0", "ID": "8cda42c2-8044-42de-83a9-f18e3af89b3c", "DetectTime": "2023-10-30T14:01:33.973669+02:00", "EventTime": "2023-10-30T14:01:33.973692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Cj940OT3RPSMxucJ3"]} -{"Format": "IDEA0", "ID": "26f7a300-e50e-444d-9b37-0febb3b793b0", "DetectTime": "2023-10-30T14:01:34.029292+02:00", "EventTime": "2023-10-30T14:01:34.029314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CH4vYB4gkarHby3p8a"]} -{"Format": "IDEA0", "ID": "6012c661-a9a9-4804-a0eb-ae7ba9ed9ac3", "DetectTime": "2023-10-30T14:01:34.087006+02:00", "EventTime": "2023-10-30T14:01:34.087091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C6Vii74477rRN80Aj2"]} -{"Format": "Json", "ID": "6012c661-a9a9-4804-a0eb-ae7ba9ed9ac3", "DetectTime": "2023-10-30T14:01:34.087006+02:00", "EventTime": "2023-10-30T14:01:34.087091+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:07:45.045914+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:34.181392)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b09479e4-d2f9-47e0-9038-dcbb94229486", "DetectTime": "2023-10-30T14:01:34.187282+02:00", "EventTime": "2023-10-30T14:01:34.187300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CPZIDl1gmaym5LWnof"]} -{"Format": "IDEA0", "ID": "5216951e-a990-49ee-9497-7303c3615320", "DetectTime": "2023-10-30T14:01:34.252076+02:00", "EventTime": "2023-10-30T14:01:34.252098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CiJkqc2WM4d5e5tcQa"]} -{"Format": "IDEA0", "ID": "e3e9fa37-38c8-4a47-a88d-119ee6f46c77", "DetectTime": "2023-10-30T14:01:34.305094+02:00", "EventTime": "2023-10-30T14:01:34.305109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CiBHuqlKIV2FEXmoc"]} -{"Format": "IDEA0", "ID": "26067563-2ebe-4155-8ccb-ed82a3adc1a7", "DetectTime": "2023-10-30T14:01:34.364649+02:00", "EventTime": "2023-10-30T14:01:34.364675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CIyCmN39GtP24nOOS6"]} -{"Format": "IDEA0", "ID": "a4c465fa-7f18-4c49-94ca-55cf5b6ce8ea", "DetectTime": "2023-10-30T14:01:34.418241+02:00", "EventTime": "2023-10-30T14:01:34.418267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C4siDX1sLwRTEhOt9", "CA7Vtm4SOtMawmMiTf", "C89eCX4WMPMKTcGGh", "CytznksGrmkUNE4Kh"]} -{"Format": "IDEA0", "ID": "b9145529-34af-494b-b3a7-d4dfb3f893d4", "DetectTime": "2023-10-30T14:01:34.431040+02:00", "EventTime": "2023-10-30T14:01:34.431064+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4siDX1sLwRTEhOt9"]} -{"Format": "IDEA0", "ID": "f651714c-acf5-4cd6-988a-9098ff6533ff", "DetectTime": "2023-10-30T14:01:34.446739+02:00", "EventTime": "2023-10-30T14:01:34.446762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CrDVEm47IBWc3rgKw4"]} -{"Format": "IDEA0", "ID": "916d8a0d-0187-4b96-8ef1-a8c3de6d0325", "DetectTime": "2023-10-30T14:01:34.498246+02:00", "EventTime": "2023-10-30T14:01:34.498266+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cr62B43unwuTqieSv4"]} -{"Format": "IDEA0", "ID": "6d220a6a-4010-4e89-8412-fbe97bdab407", "DetectTime": "2023-10-30T14:01:34.510844+02:00", "EventTime": "2023-10-30T14:01:34.510870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. ", "ContentType": "text/plain"}], "uids": ["CZqYlR2BdF8DyKVsCc"]} -{"Format": "IDEA0", "ID": "79d66f7f-e1c4-4fdc-ad96-a836120256df", "DetectTime": "2023-10-30T14:01:34.564649+02:00", "EventTime": "2023-10-30T14:01:34.564668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cv6PMl2G1PM7bPF2Jj"]} -{"Format": "IDEA0", "ID": "aca97ab8-b21a-41d8-94e2-b485606f7e61", "DetectTime": "2023-10-30T14:01:34.575880+02:00", "EventTime": "2023-10-30T14:01:34.575969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["CYHBsc1LWgjttf5OH7"]} -{"Format": "IDEA0", "ID": "da1295ef-024f-4c58-bea0-1befbb7f9575", "DetectTime": "2023-10-30T14:01:34.628420+02:00", "EventTime": "2023-10-30T14:01:34.628443+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.132.36.119"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 115.132.36.119 from 10.0.2.19. blacklisted IP AS: TTSSB-MY TM TECHNOLOGY SERVICES SDN. BHD., MY AS478 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CAe1H82Pm4ZyyaDY73"]} -{"Format": "IDEA0", "ID": "ac7e8bdf-5772-49b6-8eb3-a0415769bf64", "DetectTime": "2023-10-30T14:01:34.688375+02:00", "EventTime": "2023-10-30T14:01:34.688391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CBw6ms4K0hY8Tjxsuc"]} -{"Format": "Json", "ID": "ac7e8bdf-5772-49b6-8eb3-a0415769bf64", "DetectTime": "2023-10-30T14:01:34.688375+02:00", "EventTime": "2023-10-30T14:01:34.688391+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:08:02.448969+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:34.775010)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ddce9bea-cd5e-4799-a8f0-3c608dd2bc2d", "DetectTime": "2023-10-30T14:01:34.781190+02:00", "EventTime": "2023-10-30T14:01:34.781215+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsP4ks4COyEpKRbjrj"]} -{"Format": "IDEA0", "ID": "01656c7b-3355-429b-8601-33fcd72540f0", "DetectTime": "2023-10-30T14:01:34.792580+02:00", "EventTime": "2023-10-30T14:01:34.792598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. ", "ContentType": "text/plain"}], "uids": ["CKSNys2o58kixHIDu3"]} -{"Format": "IDEA0", "ID": "cf138289-4b58-477b-84ca-5a20a7814794", "DetectTime": "2023-10-30T14:01:34.845111+02:00", "EventTime": "2023-10-30T14:01:34.845128+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpzeJD4chInMQt0BRb"]} -{"Format": "IDEA0", "ID": "8772ca7e-679a-4a2b-bcc2-fa190ac5625e", "DetectTime": "2023-10-30T14:01:34.856310+02:00", "EventTime": "2023-10-30T14:01:34.856333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["Cp0FZk15FPnuykNQd8"]} -{"Format": "IDEA0", "ID": "189142d4-164a-4c43-9dce-5e58ebcc8da8", "DetectTime": "2023-10-30T14:01:34.903284+02:00", "EventTime": "2023-10-30T14:01:34.903304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C6enZZ3LZH9OnoXsqf"]} -{"Format": "IDEA0", "ID": "f30a2da0-3412-4e49-b7aa-3d4680b578ce", "DetectTime": "2023-10-30T14:01:34.951805+02:00", "EventTime": "2023-10-30T14:01:34.951826+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjCQUq4x7m4IYTlY0h"]} -{"Format": "IDEA0", "ID": "ff37fe59-18ff-4af3-82d7-e85dbd2786c3", "DetectTime": "2023-10-30T14:01:34.964698+02:00", "EventTime": "2023-10-30T14:01:34.964726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22322], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. ", "ContentType": "text/plain"}], "uids": ["CiMUuA2z0LLfTXg6Me"]} -{"Format": "IDEA0", "ID": "e1e2e0b0-18d4-4f45-b44d-504275dd2b50", "DetectTime": "2023-10-30T14:01:35.016841+02:00", "EventTime": "2023-10-30T14:01:35.016863+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7SSGaBL7FXW0TsK7"]} -{"Format": "IDEA0", "ID": "c4ad3ca9-8f02-4891-bf34-e9ee2db3a3b7", "DetectTime": "2023-10-30T14:01:35.028980+02:00", "EventTime": "2023-10-30T14:01:35.029001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["CnRIKV2XKsvdeROwHd"]} -{"Format": "IDEA0", "ID": "28b0b955-34e8-4db4-a67c-7feebe4c4681", "DetectTime": "2023-10-30T14:01:35.084962+02:00", "EventTime": "2023-10-30T14:01:35.084983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["Cuym421KBdBAivVMQk"]} -{"Format": "IDEA0", "ID": "4dd5e134-f30a-4e98-9f8a-bec389f66aa6", "DetectTime": "2023-10-30T14:01:35.130438+02:00", "EventTime": "2023-10-30T14:01:35.130456+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjMMWs3OzuGgVGlfTi"]} -{"Format": "IDEA0", "ID": "bc637f86-84bc-4887-bff0-0a04d7705812", "DetectTime": "2023-10-30T14:01:35.141834+02:00", "EventTime": "2023-10-30T14:01:35.141850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27560], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. ", "ContentType": "text/plain"}], "uids": ["CdIBapKN6x04PcOCh"]} -{"Format": "IDEA0", "ID": "f8671bce-6a5a-4e87-91be-916c404ab760", "DetectTime": "2023-10-30T14:01:35.191547+02:00", "EventTime": "2023-10-30T14:01:35.191574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CyzZey1OElRCDhZIdb", "Cv6PMl2G1PM7bPF2Jj", "C7SSGaBL7FXW0TsK7", "CpzeJD4chInMQt0BRb"]} -{"Format": "IDEA0", "ID": "41a61c41-29ac-4590-99af-6767e19657e3", "DetectTime": "2023-10-30T14:01:35.203126+02:00", "EventTime": "2023-10-30T14:01:35.203152+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyzZey1OElRCDhZIdb"]} -{"Format": "IDEA0", "ID": "7a799087-34b5-4b48-a560-73d799942a34", "DetectTime": "2023-10-30T14:01:35.214481+02:00", "EventTime": "2023-10-30T14:01:35.214499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["C4eIa62fAMniwZm13l"]} -{"Format": "Json", "ID": "7a799087-34b5-4b48-a560-73d799942a34", "DetectTime": "2023-10-30T14:01:35.214481+02:00", "EventTime": "2023-10-30T14:01:35.214499+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:08:41.262373+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:35.295699)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b24c075f-d3b8-4c58-8f69-7719b8d7a294", "DetectTime": "2023-10-30T14:01:35.302106+02:00", "EventTime": "2023-10-30T14:01:35.302134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19132], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. ", "ContentType": "text/plain"}], "uids": ["CWCEuV3sVUAWX0ckw9"]} -{"Format": "IDEA0", "ID": "a400cbac-e9b2-4096-bf15-d80231b1bf95", "DetectTime": "2023-10-30T14:01:35.349867+02:00", "EventTime": "2023-10-30T14:01:35.349888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. ", "ContentType": "text/plain"}], "uids": ["C9ZHNh2pv4P4ijCu6l"]} -{"Format": "IDEA0", "ID": "ceb9bbc5-855e-43d5-9542-f9f3122df189", "DetectTime": "2023-10-30T14:01:35.392998+02:00", "EventTime": "2023-10-30T14:01:35.393011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5541], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. ", "ContentType": "text/plain"}], "uids": ["CSqRBq2zCov9hLQfll"]} -{"Format": "IDEA0", "ID": "1a36aff2-744c-423d-aced-b0092e8c530e", "DetectTime": "2023-10-30T14:01:35.442285+02:00", "EventTime": "2023-10-30T14:01:35.442311+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Curnmz1luRLb9q18R4"]} -{"Format": "IDEA0", "ID": "d4b115d7-aaeb-4545-af6c-1ce265263906", "DetectTime": "2023-10-30T14:01:35.457876+02:00", "EventTime": "2023-10-30T14:01:35.457904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. ", "ContentType": "text/plain"}], "uids": ["CsoYQp4Q9VXNS52I3h"]} -{"Format": "IDEA0", "ID": "cf24de9a-9a22-48da-930b-c4e666ccd270", "DetectTime": "2023-10-30T14:01:35.508194+02:00", "EventTime": "2023-10-30T14:01:35.508211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["C98Ylb2Up9gBM3sdu6"]} -{"Format": "IDEA0", "ID": "294a2588-210e-4730-a5fc-b8fc14ce6344", "DetectTime": "2023-10-30T14:01:35.549262+02:00", "EventTime": "2023-10-30T14:01:35.549282+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVTeXZYvT4fwiGRT6"]} -{"Format": "IDEA0", "ID": "a8340271-5f59-4cce-b3c0-da1f66c11fe1", "DetectTime": "2023-10-30T14:01:35.560733+02:00", "EventTime": "2023-10-30T14:01:35.560750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["Cv9oza2O2oaMeqZPo7"]} -{"Format": "IDEA0", "ID": "3951115b-edca-438e-b38c-d602ec579f76", "DetectTime": "2023-10-30T14:01:35.602739+02:00", "EventTime": "2023-10-30T14:01:35.602757+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEQlxr1efgQjZDDtX4"]} -{"Format": "IDEA0", "ID": "52498b7f-e4d9-4b14-9e12-efe28c41f9e9", "DetectTime": "2023-10-30T14:01:35.613740+02:00", "EventTime": "2023-10-30T14:01:35.613757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cq6mWt3rBBISqa6hC5"]} -{"Format": "IDEA0", "ID": "4414df74-0cb4-4270-8168-b6a9d05ec09c", "DetectTime": "2023-10-30T14:01:35.653939+02:00", "EventTime": "2023-10-30T14:01:35.653957+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfBxcR3jGMzxurZEvb"]} -{"Format": "IDEA0", "ID": "a6f56fe0-404d-4933-9197-5bd1918fd8ea", "DetectTime": "2023-10-30T14:01:35.663813+02:00", "EventTime": "2023-10-30T14:01:35.663824+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmkVlalfYcUjFzWj4"]} -{"Format": "IDEA0", "ID": "da4332a9-b205-4b4d-a4da-7fefd486f5bf", "DetectTime": "2023-10-30T14:01:35.673910+02:00", "EventTime": "2023-10-30T14:01:35.673926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CSmmnq4jyyvJBvCzLj"]} -{"Format": "Json", "ID": "da4332a9-b205-4b4d-a4da-7fefd486f5bf", "DetectTime": "2023-10-30T14:01:35.673910+02:00", "EventTime": "2023-10-30T14:01:35.673926+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:39:11.883141+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:35.736345)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7ceb7098-11cb-47c8-b834-c53aa63bc905", "DetectTime": "2023-10-30T14:01:35.740614+02:00", "EventTime": "2023-10-30T14:01:35.740625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CGiUDs4zxZHdjBJmE3"]} -{"Format": "IDEA0", "ID": "8aab0dfd-9b1d-4223-9d6a-b070e4bfad52", "DetectTime": "2023-10-30T14:01:35.778458+02:00", "EventTime": "2023-10-30T14:01:35.778475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CXfPyp1Y3TybIYJJ61"]} -{"Format": "IDEA0", "ID": "2a8f7a18-1398-44e0-a770-fde23e5107de", "DetectTime": "2023-10-30T14:01:35.812840+02:00", "EventTime": "2023-10-30T14:01:35.812858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CTcZDk2c9F4zSmu8x7"]} -{"Format": "IDEA0", "ID": "2583be1b-f978-4e26-951d-242b418c7e5a", "DetectTime": "2023-10-30T14:01:35.847799+02:00", "EventTime": "2023-10-30T14:01:35.847815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CrCOTq1LSNewBc8pfj"]} -{"Format": "IDEA0", "ID": "99c064e7-46ef-465c-813f-e52874db3148", "DetectTime": "2023-10-30T14:01:35.883673+02:00", "EventTime": "2023-10-30T14:01:35.883690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CquMCuhh7JkOROd2"]} -{"Format": "IDEA0", "ID": "f137b8b4-4983-4e48-b21a-0f47c7737fda", "DetectTime": "2023-10-30T14:01:35.919497+02:00", "EventTime": "2023-10-30T14:01:35.919511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CBnPaw1HBXm1TmvaLc"]} -{"Format": "IDEA0", "ID": "c334c6bf-d13d-4409-aecb-25172923f615", "DetectTime": "2023-10-30T14:01:35.954306+02:00", "EventTime": "2023-10-30T14:01:35.954325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["ClRqs619k4lS17AWUk"]} -{"Format": "IDEA0", "ID": "1189c261-e6f5-401e-abc8-9d2cbd3cdb88", "DetectTime": "2023-10-30T14:01:35.991563+02:00", "EventTime": "2023-10-30T14:01:35.991576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["Cc1wuD1HeaAtFMRYe8"]} -{"Format": "Json", "ID": "1189c261-e6f5-401e-abc8-9d2cbd3cdb88", "DetectTime": "2023-10-30T14:01:35.991563+02:00", "EventTime": "2023-10-30T14:01:35.991576+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:39:44.586665+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:36.055121)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "569d6e5c-a197-4a47-bc04-39ec99b848d5", "DetectTime": "2023-10-30T14:01:36.060566+02:00", "EventTime": "2023-10-30T14:01:36.060581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CTcl7M2s5AoxguFAm"]} -{"Format": "IDEA0", "ID": "201864af-fb7a-4b4f-8bb2-b6583f6ec84b", "DetectTime": "2023-10-30T14:01:36.097135+02:00", "EventTime": "2023-10-30T14:01:36.097153+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.240.76.121"], "Hostname": ["client-201.240.76.121.speedy.net.pe Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 201.240.76.121 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS6147 rDNS: client-201.240.76.121.speedy.net.pe Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CnKiAu37jdBN0fjwji"]} -{"Format": "IDEA0", "ID": "f2bd30a9-9d20-4c71-b48f-5bc8ddcfad8c", "DetectTime": "2023-10-30T14:01:36.143635+02:00", "EventTime": "2023-10-30T14:01:36.143656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6dMnM3Xi1fdK3Bgr5"]} -{"Format": "IDEA0", "ID": "323fd9c9-0314-4d4e-8c33-0bfd47718492", "DetectTime": "2023-10-30T14:01:36.179677+02:00", "EventTime": "2023-10-30T14:01:36.179696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CZdUnjZYSpF3CaF29"]} -{"Format": "IDEA0", "ID": "0671de67-a446-436e-b799-9b1cfa7caddf", "DetectTime": "2023-10-30T14:01:36.215051+02:00", "EventTime": "2023-10-30T14:01:36.215063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Cu0QUs4enhm4JBOox4"]} -{"Format": "IDEA0", "ID": "0973049c-44c4-49fb-a431-15169859abf8", "DetectTime": "2023-10-30T14:01:36.251245+02:00", "EventTime": "2023-10-30T14:01:36.251261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["ClgPUB12RQDkaMyy39"]} -{"Format": "IDEA0", "ID": "30cdd20c-1f55-46df-874a-c08490d74aa2", "DetectTime": "2023-10-30T14:01:36.287424+02:00", "EventTime": "2023-10-30T14:01:36.287438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCaEwpSPXhLj0yTdc"]} -{"Format": "IDEA0", "ID": "500228cd-1304-4070-8ba7-f41a8a1a29b4", "DetectTime": "2023-10-30T14:01:36.320225+02:00", "EventTime": "2023-10-30T14:01:36.320236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CuxD3MHfF5VZmej3g"]} -{"Format": "IDEA0", "ID": "595361e3-9d23-4a25-b809-e5f0eec36dfd", "DetectTime": "2023-10-30T14:01:36.355470+02:00", "EventTime": "2023-10-30T14:01:36.355482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C288rU2TNY9jfbUKFa"]} -{"Format": "Json", "ID": "595361e3-9d23-4a25-b809-e5f0eec36dfd", "DetectTime": "2023-10-30T14:01:36.355470+02:00", "EventTime": "2023-10-30T14:01:36.355482+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:39:45.781708+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:36.419280)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a035b75a-212f-481e-9c01-e0bc2789b053", "DetectTime": "2023-10-30T14:01:36.424923+02:00", "EventTime": "2023-10-30T14:01:36.424937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C6J6CT3HF6EyTicjM6"]} -{"Format": "IDEA0", "ID": "5b1c54a6-2a22-48e5-bcb6-4b4a23bd70e0", "DetectTime": "2023-10-30T14:01:36.458062+02:00", "EventTime": "2023-10-30T14:01:36.458079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["COe5dO2Plv12taZtae"]} -{"Format": "IDEA0", "ID": "e0144a14-6460-43ee-9493-d4d3ec621007", "DetectTime": "2023-10-30T14:01:36.485300+02:00", "EventTime": "2023-10-30T14:01:36.485317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CIuZD73VFbsGs0Js29"]} -{"Format": "IDEA0", "ID": "5ba7ac1c-1611-4696-91f0-2e588943b56c", "DetectTime": "2023-10-30T14:01:36.518171+02:00", "EventTime": "2023-10-30T14:01:36.518184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CHb1z839jcn1jyEGs7"]} -{"Format": "IDEA0", "ID": "27ea2a89-606f-4055-affc-e01b978202f8", "DetectTime": "2023-10-30T14:01:36.545716+02:00", "EventTime": "2023-10-30T14:01:36.545736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CNHgtA330sk0FLtZqb"]} -{"Format": "IDEA0", "ID": "dfd95f93-da25-4820-a466-9b47f7fb3960", "DetectTime": "2023-10-30T14:01:36.573829+02:00", "EventTime": "2023-10-30T14:01:36.573847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["C1XjQ034n0UbSbIjR1"]} -{"Format": "IDEA0", "ID": "b008d369-993c-40fb-8614-49179b1506eb", "DetectTime": "2023-10-30T14:01:36.606525+02:00", "EventTime": "2023-10-30T14:01:36.606542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. ", "ContentType": "text/plain"}], "uids": ["CeQEiI3rlVZpphVwPf"]} -{"Format": "IDEA0", "ID": "5a2879cf-6936-4b66-b184-af6f5667297d", "DetectTime": "2023-10-30T14:01:36.638148+02:00", "EventTime": "2023-10-30T14:01:36.638169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. ", "ContentType": "text/plain"}], "uids": ["C4hLDBNIAJ1cRemti"]} -{"Format": "Json", "ID": "5a2879cf-6936-4b66-b184-af6f5667297d", "DetectTime": "2023-10-30T14:01:36.638148+02:00", "EventTime": "2023-10-30T14:01:36.638169+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4008], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:39:46.878745+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:36.695914)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f6c3dfd6-6ca9-44fe-ad8f-dea77c69ef24", "DetectTime": "2023-10-30T14:01:36.701202+02:00", "EventTime": "2023-10-30T14:01:36.701219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CmEwov1PAZshVez881"]} -{"Format": "IDEA0", "ID": "92fb8909-f3fb-4a4e-8964-ef07d8994eae", "DetectTime": "2023-10-30T14:01:36.732843+02:00", "EventTime": "2023-10-30T14:01:36.732864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["C0PAQo1ljE059GZbJf"]} -{"Format": "IDEA0", "ID": "f02f527d-6efe-49f8-9feb-2dec7691448e", "DetectTime": "2023-10-30T14:01:36.763426+02:00", "EventTime": "2023-10-30T14:01:36.763446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["Cj0UT240nZ7I7UPSCg"]} -{"Format": "IDEA0", "ID": "e219f4ce-06f1-4f1f-aafb-1100a9f1d63e", "DetectTime": "2023-10-30T14:01:36.791681+02:00", "EventTime": "2023-10-30T14:01:36.791691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["CaVoND3RBjPkvIUhF3"]} -{"Format": "IDEA0", "ID": "a0e56899-0554-4cec-b429-601c1889dff7", "DetectTime": "2023-10-30T14:01:36.814693+02:00", "EventTime": "2023-10-30T14:01:36.814710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["Cgnhmx2Aw2p6RDVpUa"]} -{"Format": "IDEA0", "ID": "cda2e27f-e6f6-4d6d-be27-80a7ea4484c2", "DetectTime": "2023-10-30T14:01:36.841761+02:00", "EventTime": "2023-10-30T14:01:36.841776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. ", "ContentType": "text/plain"}], "uids": ["CYUMuB4Nr9XEV0guCa"]} -{"Format": "IDEA0", "ID": "60d6f899-503c-41af-b20c-52113ad725c8", "DetectTime": "2023-10-30T14:01:36.871550+02:00", "EventTime": "2023-10-30T14:01:36.871570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CYddRYumC4qjOMIr3"]} -{"Format": "IDEA0", "ID": "b177fc6f-785c-42da-94f3-f1ad20f7cee4", "DetectTime": "2023-10-30T14:01:36.901643+02:00", "EventTime": "2023-10-30T14:01:36.901654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CvuaVMHLJKF97ti1f"]} -{"Format": "Json", "ID": "b177fc6f-785c-42da-94f3-f1ad20f7cee4", "DetectTime": "2023-10-30T14:01:36.901643+02:00", "EventTime": "2023-10-30T14:01:36.901654+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T21:41:09.132193+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2023/10/30 14:01:36.959634)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e23be680-322d-4cbf-bec2-262762ed2fc3", "DetectTime": "2023-10-30T14:01:36.965378+02:00", "EventTime": "2023-10-30T14:01:36.965398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CnGtpP11CCeFjRqwie"]} -{"Format": "IDEA0", "ID": "d1a86fd5-aee4-474c-8bbb-9ef0d1baaad5", "DetectTime": "2023-10-30T14:01:36.997703+02:00", "EventTime": "2023-10-30T14:01:36.997721+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.236.84.133"], "Hostname": ["p4fec5485.dip0.t-ipconnect.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.236.84.133 from 10.0.2.19. blacklisted IP AS: DTAG Internet service provider operations, DE AS3320 rDNS: p4fec5485.dip0.t-ipconnect.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CdYBRX2wvFpfVdB8Ii"]} -{"Format": "IDEA0", "ID": "822fb5c6-fa7b-40c4-87b0-84ee10022988", "DetectTime": "2023-10-30T14:01:37.035944+02:00", "EventTime": "2023-10-30T14:01:37.035965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CAHTSO3JlGaMckWuWj"]} -{"Format": "IDEA0", "ID": "ff5d1e4f-4626-4ae7-9e4f-4791e42114cc", "DetectTime": "2023-10-30T14:01:37.080580+02:00", "EventTime": "2023-10-30T14:01:37.080599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CGTJZA1X6MslyIfj4"]} -{"Format": "IDEA0", "ID": "abc1c00a-88ce-47a8-965d-de69bf814a4d", "DetectTime": "2023-10-30T14:01:37.118718+02:00", "EventTime": "2023-10-30T14:01:37.118734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C7NwR63HPFeMoMHvi3"]} -{"Format": "IDEA0", "ID": "e759f4f3-f5ae-49d2-8ee7-c3679ca24953", "DetectTime": "2023-10-30T14:01:37.160960+02:00", "EventTime": "2023-10-30T14:01:37.160980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CJbTOq7jydKeZcgm5"]} -{"Format": "IDEA0", "ID": "98ea6342-dfc7-4779-8e05-a0e845a650fc", "DetectTime": "2023-10-30T14:01:37.202447+02:00", "EventTime": "2023-10-30T14:01:37.202468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C5t7cz3FVHJgFhoRzh"]} -{"Format": "IDEA0", "ID": "0991fc10-4ba8-473c-aa1d-797c514e7ccc", "DetectTime": "2023-10-30T14:01:37.243415+02:00", "EventTime": "2023-10-30T14:01:37.243431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["C61zmE4H8poPJ89cGf"]} -{"Format": "IDEA0", "ID": "9d8c39d1-e8b7-44f6-ab8a-db603344810f", "DetectTime": "2023-10-30T14:01:37.283211+02:00", "EventTime": "2023-10-30T14:01:37.283231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CYUtzkQtmWcFnP7Y6"]} -{"Format": "Json", "ID": "9d8c39d1-e8b7-44f6-ab8a-db603344810f", "DetectTime": "2023-10-30T14:01:37.283211+02:00", "EventTime": "2023-10-30T14:01:37.283231+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:12:57.317275+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:37.375643)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "530fb90d-36a7-483c-94d8-bd34e5b3c84d", "DetectTime": "2023-10-30T14:01:37.381157+02:00", "EventTime": "2023-10-30T14:01:37.381175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C0TQ6w4Rlk6gOuJY9h"]} -{"Format": "IDEA0", "ID": "88e5eaca-c9b1-4fe0-aaec-1334cca5e0a8", "DetectTime": "2023-10-30T14:01:37.420660+02:00", "EventTime": "2023-10-30T14:01:37.420677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CpbQ8Mfp7F4gR9xuk"]} -{"Format": "IDEA0", "ID": "900dea8c-f7b7-41bf-b362-452fd8073e7b", "DetectTime": "2023-10-30T14:01:37.457475+02:00", "EventTime": "2023-10-30T14:01:37.457486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CDRFJPeN1jGuz4k45"]} -{"Format": "IDEA0", "ID": "9e6a5e33-fde7-4714-87ee-1caf1344836f", "DetectTime": "2023-10-30T14:01:37.499853+02:00", "EventTime": "2023-10-30T14:01:37.499873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CIbbSE4wJ3f5UcA2od"]} -{"Format": "IDEA0", "ID": "89e4d8ed-4430-44d8-b03b-ce03e785f00a", "DetectTime": "2023-10-30T14:01:37.541877+02:00", "EventTime": "2023-10-30T14:01:37.541897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CyVqJn12UQil1sTt0l"]} -{"Format": "IDEA0", "ID": "be14497a-cc10-481e-8f52-2b1c0a2983dd", "DetectTime": "2023-10-30T14:01:37.583510+02:00", "EventTime": "2023-10-30T14:01:37.583527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cs2puw4KWAd1MxMoHj"]} -{"Format": "IDEA0", "ID": "b4548cad-1ed8-431d-a7b7-2d651ac72279", "DetectTime": "2023-10-30T14:01:37.622233+02:00", "EventTime": "2023-10-30T14:01:37.622255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CKU2TE1cJiTZfCLk07"]} -{"Format": "IDEA0", "ID": "10813a67-5206-4f4a-bd85-439f8b1cacf9", "DetectTime": "2023-10-30T14:01:37.663386+02:00", "EventTime": "2023-10-30T14:01:37.663406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["Cc2hMb24zR2TKivNP"]} -{"Format": "Json", "ID": "10813a67-5206-4f4a-bd85-439f8b1cacf9", "DetectTime": "2023-10-30T14:01:37.663386+02:00", "EventTime": "2023-10-30T14:01:37.663406+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:12:58.363270+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:37.731687)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6d223f2a-fb17-4687-aa36-050219e9f03e", "DetectTime": "2023-10-30T14:01:37.737108+02:00", "EventTime": "2023-10-30T14:01:37.737124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C2NkOS15j1GzKoIGp7"]} -{"Format": "IDEA0", "ID": "d334aaad-f3f1-496d-8832-e749b5e2b3dd", "DetectTime": "2023-10-30T14:01:37.777007+02:00", "EventTime": "2023-10-30T14:01:37.777027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CZDzPd4DVahoOBvNEc"]} -{"Format": "IDEA0", "ID": "3587e395-2f65-4320-bef8-af64a94d0e09", "DetectTime": "2023-10-30T14:01:37.817614+02:00", "EventTime": "2023-10-30T14:01:37.817630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CtufKi1UNhwGriZbek"]} -{"Format": "IDEA0", "ID": "3f6a99cd-6ec2-4590-ac0f-f294e98eb289", "DetectTime": "2023-10-30T14:01:37.852740+02:00", "EventTime": "2023-10-30T14:01:37.852754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C011z23EvIRflZ3gT"]} -{"Format": "IDEA0", "ID": "b5eda4f1-ad6a-40f0-a5c2-a4688f4efc61", "DetectTime": "2023-10-30T14:01:37.888723+02:00", "EventTime": "2023-10-30T14:01:37.888736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C7TKCe2ORsKFPfuBO8"]} -{"Format": "IDEA0", "ID": "6b46a6b0-29f0-40cb-9105-4ecaae5ce199", "DetectTime": "2023-10-30T14:01:37.928799+02:00", "EventTime": "2023-10-30T14:01:37.928827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["CnCfVRL5OuKwVawv4"]} -{"Format": "IDEA0", "ID": "6653400a-1936-4d1d-8c56-a5854ece7279", "DetectTime": "2023-10-30T14:01:37.969089+02:00", "EventTime": "2023-10-30T14:01:37.969102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CuiZOD1EiOhSOSi2h"]} -{"Format": "IDEA0", "ID": "a1f8604e-bbac-4832-9a9c-78436e7504ab", "DetectTime": "2023-10-30T14:01:38.011397+02:00", "EventTime": "2023-10-30T14:01:38.011419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. ", "ContentType": "text/plain"}], "uids": ["CWggofbmfixCEpmo"]} -{"Format": "Json", "ID": "a1f8604e-bbac-4832-9a9c-78436e7504ab", "DetectTime": "2023-10-30T14:01:38.011397+02:00", "EventTime": "2023-10-30T14:01:38.011419+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8336], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:12:59.634664+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:38.077169)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8e951c80-de91-4943-bdef-1545033309fd", "DetectTime": "2023-10-30T14:01:38.082839+02:00", "EventTime": "2023-10-30T14:01:38.082858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CWyYjg2dYNyrYQs8l"]} -{"Format": "IDEA0", "ID": "850f8a14-4d83-4671-a385-4500b17d55c5", "DetectTime": "2023-10-30T14:01:38.124927+02:00", "EventTime": "2023-10-30T14:01:38.124948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C31yJg3oxWuikHnaB5"]} -{"Format": "IDEA0", "ID": "7efa113d-0cce-4636-a1aa-9fcd9ec815a7", "DetectTime": "2023-10-30T14:01:38.159355+02:00", "EventTime": "2023-10-30T14:01:38.159371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["CQDHVd4pdop4xizEgd"]} -{"Format": "IDEA0", "ID": "345ef9e9-9740-4335-8710-417d5e5d1539", "DetectTime": "2023-10-30T14:01:38.192962+02:00", "EventTime": "2023-10-30T14:01:38.192978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["Cx3vzf1FbXEmbSAD1h"]} -{"Format": "IDEA0", "ID": "b38865e9-48da-4702-9e51-663c88db2670", "DetectTime": "2023-10-30T14:01:38.229409+02:00", "EventTime": "2023-10-30T14:01:38.229431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["Cl2gr32xswu6jKRxWd"]} -{"Format": "IDEA0", "ID": "cf22ed19-6e52-4a2f-8361-9a1a3f1c6d6b", "DetectTime": "2023-10-30T14:01:38.261112+02:00", "EventTime": "2023-10-30T14:01:38.261128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C6qfHExl8LV7qOZL6"]} -{"Format": "IDEA0", "ID": "2375d30c-e20c-4db0-8397-49103bbdc35e", "DetectTime": "2023-10-30T14:01:38.296762+02:00", "EventTime": "2023-10-30T14:01:38.296785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21114], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. ", "ContentType": "text/plain"}], "uids": ["Cjodde45ZTWOXmZ7dc"]} -{"Format": "IDEA0", "ID": "22d04a20-1dc2-486a-9e96-4795cde5514f", "DetectTime": "2023-10-30T14:01:38.339127+02:00", "EventTime": "2023-10-30T14:01:38.339145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CSNN5c3viqZVubMhu3"]} -{"Format": "IDEA0", "ID": "68aa2937-f469-4c60-98e0-57738474b3d2", "DetectTime": "2023-10-30T14:01:38.366537+02:00", "EventTime": "2023-10-30T14:01:38.366559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CZwGTY1gRFU2OPQUoh"]} -{"Format": "Json", "ID": "68aa2937-f469-4c60-98e0-57738474b3d2", "DetectTime": "2023-10-30T14:01:38.366537+02:00", "EventTime": "2023-10-30T14:01:38.366559+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:13:17.898354+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:38.424097)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "075f63f7-77db-457e-a6f8-23098abd3f79", "DetectTime": "2023-10-30T14:01:38.430569+02:00", "EventTime": "2023-10-30T14:01:38.430645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpfaLo2ZJjFqjxv06c"]} -{"Format": "IDEA0", "ID": "4d984629-92ba-44ba-b5a7-628e559fca90", "DetectTime": "2023-10-30T14:01:38.463071+02:00", "EventTime": "2023-10-30T14:01:38.463088+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.97.194"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 118.174.97.194 from 10.0.2.19. blacklisted IP AS: TOT-NET TOT Public Company Limited, TH AS2396 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CWZRVCI7d80EdJD88"]} -{"Format": "IDEA0", "ID": "091cd567-dea2-4522-8f1e-fca73b5cdc84", "DetectTime": "2023-10-30T14:01:38.508859+02:00", "EventTime": "2023-10-30T14:01:38.508873+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxljFy2SV5Dq7JfG3l"]} -{"Format": "IDEA0", "ID": "f9c1590c-f497-43ff-9c9c-542ad7510d24", "DetectTime": "2023-10-30T14:01:38.525133+02:00", "EventTime": "2023-10-30T14:01:38.525155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CQkKi22Y0Xjj19HG8l"]} -{"Format": "IDEA0", "ID": "6b234321-7c48-4f42-8b78-17e8b2e0b5fb", "DetectTime": "2023-10-30T14:01:38.564621+02:00", "EventTime": "2023-10-30T14:01:38.564639+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyjgDX19JXQk1oaDrb"]} -{"Format": "IDEA0", "ID": "c3f2c253-e942-46c8-8f4c-2b9d7805aa94", "DetectTime": "2023-10-30T14:01:38.577985+02:00", "EventTime": "2023-10-30T14:01:38.578003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CJVHXo1nsA8ecglCkd"]} -{"Format": "IDEA0", "ID": "53e4f6db-42e4-4fd0-b735-ae469fc0cf23", "DetectTime": "2023-10-30T14:01:38.612337+02:00", "EventTime": "2023-10-30T14:01:38.612358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CVTeXZYvT4fwiGRT6", "CxljFy2SV5Dq7JfG3l", "CfBxcR3jGMzxurZEvb", "CieQ3S26cpOUqW8v0g"]} -{"Format": "IDEA0", "ID": "2368d646-4b24-4d95-a685-40081fe2c025", "DetectTime": "2023-10-30T14:01:38.624273+02:00", "EventTime": "2023-10-30T14:01:38.624293+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CieQ3S26cpOUqW8v0g"]} -{"Format": "IDEA0", "ID": "03ab58cb-0332-4596-b234-b49343306df0", "DetectTime": "2023-10-30T14:01:38.638312+02:00", "EventTime": "2023-10-30T14:01:38.638330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C0RyQ83wd9Q0Hm8UU2"]} -{"Format": "IDEA0", "ID": "8f14648e-3f43-4be9-831b-186705c291f3", "DetectTime": "2023-10-30T14:01:38.672784+02:00", "EventTime": "2023-10-30T14:01:38.672801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Chr2gEC6MSMKbWsd9"]} -{"Format": "IDEA0", "ID": "c663ceac-69f3-460d-a833-4e41a23556d5", "DetectTime": "2023-10-30T14:01:38.706693+02:00", "EventTime": "2023-10-30T14:01:38.706709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CSxv1y4A8L5zVftXxc"]} -{"Format": "IDEA0", "ID": "22e78841-01a3-4e48-88e6-86fe8e182603", "DetectTime": "2023-10-30T14:01:38.737477+02:00", "EventTime": "2023-10-30T14:01:38.737498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CIBP08390gjCh5Bch8"]} -{"Format": "IDEA0", "ID": "0ed12e0a-587a-4168-a7c1-ebc37a76af18", "DetectTime": "2023-10-30T14:01:38.774815+02:00", "EventTime": "2023-10-30T14:01:38.774833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["C5Pxj1dw7BU2TVf4a"]} -{"Format": "Json", "ID": "0ed12e0a-587a-4168-a7c1-ebc37a76af18", "DetectTime": "2023-10-30T14:01:38.774815+02:00", "EventTime": "2023-10-30T14:01:38.774833+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:43:45.680644+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:38.831743)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e79d8bb-0236-4c3e-a448-d96689508535", "DetectTime": "2023-10-30T14:01:38.837771+02:00", "EventTime": "2023-10-30T14:01:38.837792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["COPjIKReVocKhbHAj"]} -{"Format": "IDEA0", "ID": "4997569e-89ca-440d-ac83-e977b1a75a60", "DetectTime": "2023-10-30T14:01:38.869503+02:00", "EventTime": "2023-10-30T14:01:38.869520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CHEmUA4Q8CR29wKFOe"]} -{"Format": "IDEA0", "ID": "3064d612-3a23-484e-a4a1-efcc3ae6a81a", "DetectTime": "2023-10-30T14:01:38.899441+02:00", "EventTime": "2023-10-30T14:01:38.899452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CjuuUs4kbbBlu1B5i6"]} -{"Format": "IDEA0", "ID": "541fd24f-e5d5-474a-a072-d515b1b26e2d", "DetectTime": "2023-10-30T14:01:38.928177+02:00", "EventTime": "2023-10-30T14:01:38.928200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0rmX92LSO9qt3GxY2"]} -{"Format": "IDEA0", "ID": "eeb9bd08-6bf9-47c2-a976-e452fd7f41dc", "DetectTime": "2023-10-30T14:01:38.955318+02:00", "EventTime": "2023-10-30T14:01:38.955335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cbi5qF3VdXcgxuw4l1"]} -{"Format": "IDEA0", "ID": "ceefa3a5-1f2c-419e-bf7f-d769ad5850e7", "DetectTime": "2023-10-30T14:01:38.983641+02:00", "EventTime": "2023-10-30T14:01:38.983655+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C06m8D2WAoNLngjtZ3"]} -{"Format": "IDEA0", "ID": "d4d06b3d-b838-4bb0-a5df-337a7c0077d4", "DetectTime": "2023-10-30T14:01:38.994921+02:00", "EventTime": "2023-10-30T14:01:38.994940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CeKdSF2oeQr73V73s4"]} -{"Format": "IDEA0", "ID": "17257805-05e9-49bb-8417-f6a40913e8b4", "DetectTime": "2023-10-30T14:01:39.022165+02:00", "EventTime": "2023-10-30T14:01:39.022183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CU1IjR1IEzQM4PJDw"]} -{"Format": "IDEA0", "ID": "3a3e9106-6233-499e-8ec4-c542a3413d29", "DetectTime": "2023-10-30T14:01:39.047616+02:00", "EventTime": "2023-10-30T14:01:39.047638+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLroXrpxc42TESYRf"]} -{"Format": "IDEA0", "ID": "d634514a-0326-4bd8-850e-ca6cd11752ce", "DetectTime": "2023-10-30T14:01:39.058627+02:00", "EventTime": "2023-10-30T14:01:39.058643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CtAxAL1XTQQ4UKraOl"]} -{"Format": "Json", "ID": "d634514a-0326-4bd8-850e-ca6cd11752ce", "DetectTime": "2023-10-30T14:01:39.058627+02:00", "EventTime": "2023-10-30T14:01:39.058643+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:44:05.816641+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:39.116644)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "74e79a5c-5c5c-46be-aba3-854d1376b1b3", "DetectTime": "2023-10-30T14:01:39.122079+02:00", "EventTime": "2023-10-30T14:01:39.122095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C9Emp82aS9utpcGv96"]} -{"Format": "IDEA0", "ID": "ad278ef0-52db-4ea7-82cb-d33d332e7216", "DetectTime": "2023-10-30T14:01:39.152701+02:00", "EventTime": "2023-10-30T14:01:39.152711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CxhUDu33BDIxIRZcq2"]} -{"Format": "IDEA0", "ID": "60b2a773-210d-443d-aff2-4aee26c2c077", "DetectTime": "2023-10-30T14:01:39.179516+02:00", "EventTime": "2023-10-30T14:01:39.179542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CM5SNy2ZayKfu9eH69"]} -{"Format": "IDEA0", "ID": "6a0760ed-68d5-47bf-a0b5-5f313c136b00", "DetectTime": "2023-10-30T14:01:39.203557+02:00", "EventTime": "2023-10-30T14:01:39.203575+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CApTKl3sLT4uVlCkc"]} -{"Format": "IDEA0", "ID": "9eeebb2d-1f16-448e-98bf-f3eb09fffe43", "DetectTime": "2023-10-30T14:01:39.214498+02:00", "EventTime": "2023-10-30T14:01:39.214515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2700], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. ", "ContentType": "text/plain"}], "uids": ["Cmhrrw3aBo8AvVu3Za"]} -{"Format": "IDEA0", "ID": "c8421416-c4e8-4155-b5c3-ffe46cb1e28b", "DetectTime": "2023-10-30T14:01:39.237105+02:00", "EventTime": "2023-10-30T14:01:39.237124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["Crdk122W2BGRIWGAUi"]} -{"Format": "IDEA0", "ID": "6848cb54-f9f2-481a-a7f8-198106903f38", "DetectTime": "2023-10-30T14:01:39.263297+02:00", "EventTime": "2023-10-30T14:01:39.263314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CXe6Pu2hjh3Wv0Cod2"]} -{"Format": "IDEA0", "ID": "909bb5cb-a73f-4bcc-beec-a388b879dfea", "DetectTime": "2023-10-30T14:01:39.288886+02:00", "EventTime": "2023-10-30T14:01:39.288904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CPMbRh1LH4smgTxOz2"]} -{"Format": "IDEA0", "ID": "1340a82a-f25a-40bc-878d-949d6748e25b", "DetectTime": "2023-10-30T14:01:39.315140+02:00", "EventTime": "2023-10-30T14:01:39.315158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C0fvDc13OCmmT9aJ4d"]} -{"Format": "Json", "ID": "1340a82a-f25a-40bc-878d-949d6748e25b", "DetectTime": "2023-10-30T14:01:39.315140+02:00", "EventTime": "2023-10-30T14:01:39.315158+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T22:44:06.807615+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2023/10/30 14:01:39.364853)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d54fa048-97aa-49c0-b025-6d5e267d520b", "DetectTime": "2023-10-30T14:01:39.369647+02:00", "EventTime": "2023-10-30T14:01:39.369663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CyMbRt2AwGq40TTgNi"]} -{"Format": "IDEA0", "ID": "fab29a9e-b664-4834-ae75-357cb2c22759", "DetectTime": "2023-10-30T14:01:39.391345+02:00", "EventTime": "2023-10-30T14:01:39.391359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["CmPCL5BhQ6p4rqnij"]} -{"Format": "IDEA0", "ID": "8f16062b-8724-404a-b9ac-5a912e13030a", "DetectTime": "2023-10-30T14:01:39.410630+02:00", "EventTime": "2023-10-30T14:01:39.410641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C6zIpz2xF0DzE1Tqj5"]} -{"Format": "IDEA0", "ID": "235320ec-7596-4a3d-beac-c0c40cbf8296", "DetectTime": "2023-10-30T14:01:39.431329+02:00", "EventTime": "2023-10-30T14:01:39.431351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28398], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. ", "ContentType": "text/plain"}], "uids": ["CLJ7iI2Kf7c3eVnwRe"]} -{"Format": "IDEA0", "ID": "3ef88534-01f4-474d-a81a-a9268ec301ba", "DetectTime": "2023-10-30T14:01:39.456868+02:00", "EventTime": "2023-10-30T14:01:39.456886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["COtqUr2U4iA6m0JYVb"]} -{"Format": "IDEA0", "ID": "92cc48a0-164c-4b92-8680-25e106244ec9", "DetectTime": "2023-10-30T14:01:39.480079+02:00", "EventTime": "2023-10-30T14:01:39.480095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CQtNI04P84VjbiSWl1"]} -{"Format": "IDEA0", "ID": "88de6f0d-f4ac-4e3d-869a-7df522a06e17", "DetectTime": "2023-10-30T14:01:39.504839+02:00", "EventTime": "2023-10-30T14:01:39.504853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CigIobNk33JyDVxeb"]} -{"Format": "IDEA0", "ID": "4fc62662-c2bd-447d-a54f-9738dda0b045", "DetectTime": "2023-10-30T14:01:39.526306+02:00", "EventTime": "2023-10-30T14:01:39.526325+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPBV1715Cw0T7d9Y47"]} -{"Format": "IDEA0", "ID": "62d4e7b9-03e8-4382-9420-2091efc464fb", "DetectTime": "2023-10-30T14:01:39.540619+02:00", "EventTime": "2023-10-30T14:01:39.540635+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCXrI02ExkHaUDerud"]} -{"Format": "IDEA0", "ID": "7a58cf37-9edd-4b49-84b7-07d3a16f7205", "DetectTime": "2023-10-30T14:01:39.554164+02:00", "EventTime": "2023-10-30T14:01:39.554182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CSD4bt22H3bP8oC1rd"]} -{"Format": "IDEA0", "ID": "76c6d0bb-a453-4b9e-84c4-4e20d2f3961d", "DetectTime": "2023-10-30T14:01:39.576335+02:00", "EventTime": "2023-10-30T14:01:39.576350+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxpRSS2WDHWspGG3Uc"]} -{"Format": "IDEA0", "ID": "567b0206-0d79-41f0-8860-2eb224f0ba41", "DetectTime": "2023-10-30T14:01:39.591985+02:00", "EventTime": "2023-10-30T14:01:39.591997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CTq4H5q0yC2cDwP9"]} -{"Format": "IDEA0", "ID": "691c4cca-1228-426e-82de-557e7cd4afa1", "DetectTime": "2023-10-30T14:01:39.629518+02:00", "EventTime": "2023-10-30T14:01:39.629538+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COqUAUNj0PLvioq27"]} -{"Format": "IDEA0", "ID": "0715c9ad-6dcc-4067-a393-4781c45a53ac", "DetectTime": "2023-10-30T14:01:39.644529+02:00", "EventTime": "2023-10-30T14:01:39.644551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CWymXm2pPpApDO0f84", "CxpRSS2WDHWspGG3Uc", "CPBV1715Cw0T7d9Y47", "CLroXrpxc42TESYRf"]} -{"Format": "IDEA0", "ID": "c90014c1-647e-4187-aa7f-f289803fa0dc", "DetectTime": "2023-10-30T14:01:39.657555+02:00", "EventTime": "2023-10-30T14:01:39.657567+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWymXm2pPpApDO0f84"]} -{"Format": "IDEA0", "ID": "dc749436-de16-4453-857c-2feb557a8b27", "DetectTime": "2023-10-30T14:01:39.672472+02:00", "EventTime": "2023-10-30T14:01:39.672493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5181], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5181/TCP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Czkjaq2OnzqElEwPf6"]} -{"Format": "IDEA0", "ID": "1c2744a6-3ca9-41ae-be52-23f714d5bfed", "DetectTime": "2023-10-30T14:01:39.710856+02:00", "EventTime": "2023-10-30T14:01:39.710868+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKsj7w4Y8ZufnQunl"]} -{"Format": "IDEA0", "ID": "4fddbd79-1bcb-4fcf-b9af-7040aa8aaf66", "DetectTime": "2023-10-30T14:01:39.722755+02:00", "EventTime": "2023-10-30T14:01:39.722770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CzCbuM1TOXLXJ0QI8h"]} -{"Format": "IDEA0", "ID": "24cd099b-d880-4535-92cd-49610526d8ad", "DetectTime": "2023-10-30T14:01:39.761218+02:00", "EventTime": "2023-10-30T14:01:39.761232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CtfzaGuTpu5In8M2"]} -{"Format": "IDEA0", "ID": "ecf2251e-be65-4908-b01b-64fcf4cb56ce", "DetectTime": "2023-10-30T14:01:39.802915+02:00", "EventTime": "2023-10-30T14:01:39.802932+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjQjZH38xnGNhSTvqb"]} -{"Format": "IDEA0", "ID": "fed17a4a-b20d-4be8-a698-5fcf214dcd0e", "DetectTime": "2023-10-30T14:01:39.817488+02:00", "EventTime": "2023-10-30T14:01:39.817504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CtgdAJZssY9gOsEHd"]} -{"Format": "IDEA0", "ID": "7789ad7f-f565-402d-ab95-65e83ab7445f", "DetectTime": "2023-10-30T14:01:39.859337+02:00", "EventTime": "2023-10-30T14:01:39.859359+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cbx21a1PhmGZoVozq6"]} -{"Format": "IDEA0", "ID": "bd9948bd-27a6-4fa3-be48-16ddd36a4e78", "DetectTime": "2023-10-30T14:01:39.873483+02:00", "EventTime": "2023-10-30T14:01:39.873503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CcpWi21q5FVd7B7HQf"]} -{"Format": "Json", "ID": "bd9948bd-27a6-4fa3-be48-16ddd36a4e78", "DetectTime": "2023-10-30T14:01:39.873483+02:00", "EventTime": "2023-10-30T14:01:39.873503+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:16:02.318595+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:39.978223)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bc233082-f43a-4f58-8a95-913db873d29a", "DetectTime": "2023-10-30T14:01:39.983368+02:00", "EventTime": "2023-10-30T14:01:39.983385+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdFXuiWn40OeswEfc"]} -{"Format": "IDEA0", "ID": "95dbef8d-7b7e-418c-b09b-ceb04b493da9", "DetectTime": "2023-10-30T14:01:39.993122+02:00", "EventTime": "2023-10-30T14:01:39.993134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CyfmoR1TSWXUJVGnth"]} -{"Format": "IDEA0", "ID": "b273b552-8e13-4391-ac8f-a08716409d37", "DetectTime": "2023-10-30T14:01:40.023021+02:00", "EventTime": "2023-10-30T14:01:40.023032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C3unen4jjeSBQI03Ei"]} -{"Format": "IDEA0", "ID": "5e005f2e-b084-4c34-9e6c-5d46625a6dcd", "DetectTime": "2023-10-30T14:01:40.044320+02:00", "EventTime": "2023-10-30T14:01:40.044342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C3CONI1LLXlmCTfBof"]} -{"Format": "IDEA0", "ID": "13faefca-c63f-4f45-b7e8-f02d976412d1", "DetectTime": "2023-10-30T14:01:40.068258+02:00", "EventTime": "2023-10-30T14:01:40.068276+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPuelc2ZNYFQA7wFn1"]} -{"Format": "IDEA0", "ID": "56df3925-1962-4c02-aece-8a4ca0b9c5c9", "DetectTime": "2023-10-30T14:01:40.080613+02:00", "EventTime": "2023-10-30T14:01:40.080627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLPjv447zFPIo8URic"]} -{"Format": "IDEA0", "ID": "caa01c38-a973-4461-a934-41d39a93b95e", "DetectTime": "2023-10-30T14:01:40.113667+02:00", "EventTime": "2023-10-30T14:01:40.113687+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZYCYr1GR1EubI46qj"]} -{"Format": "IDEA0", "ID": "35a526b0-8dff-4076-af1a-7e2f8401baa4", "DetectTime": "2023-10-30T14:01:40.127426+02:00", "EventTime": "2023-10-30T14:01:40.127444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CbmsMX10ZgBD0LKkfb"]} -{"Format": "IDEA0", "ID": "fb0cb617-937b-464d-8eaa-95fc1698831d", "DetectTime": "2023-10-30T14:01:40.147592+02:00", "EventTime": "2023-10-30T14:01:40.147608+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.110.135.243"], "Hostname": ["pool-74-110-135-243.rcmdva.fios.verizon.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 74.110.135.243 from 10.0.2.19. blacklisted IP AS: UUNET, US AS701 rDNS: pool-74-110-135-243.rcmdva.fios.verizon.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CWOCys35JDMZZoiZId"]} -{"Format": "IDEA0", "ID": "66717c1b-cf48-485f-bd2c-7d28b80ce47e", "DetectTime": "2023-10-30T14:01:40.193357+02:00", "EventTime": "2023-10-30T14:01:40.193384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CNkt6a18IMYcYTeCZe"]} -{"Format": "IDEA0", "ID": "81a3db81-b659-41b1-86a6-6784d198f3ec", "DetectTime": "2023-10-30T14:01:40.222261+02:00", "EventTime": "2023-10-30T14:01:40.222279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CPnDcw4MKYg3mW9m7j"]} -{"Format": "IDEA0", "ID": "0ec34b01-a91f-41e0-b7ae-5b4983ce8e86", "DetectTime": "2023-10-30T14:01:40.254053+02:00", "EventTime": "2023-10-30T14:01:40.254074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CTT76U29gDn0cJOBaa"]} -{"Format": "IDEA0", "ID": "56ce2f0f-f90e-41fa-bcd0-bb26e38a8101", "DetectTime": "2023-10-30T14:01:40.298699+02:00", "EventTime": "2023-10-30T14:01:40.298719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CwBJRF412K4zOiVT05"]} -{"Format": "IDEA0", "ID": "cf3a3150-564b-40ed-afdc-5edca401866b", "DetectTime": "2023-10-30T14:01:40.320569+02:00", "EventTime": "2023-10-30T14:01:40.320588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CNcVCsMdQ00BLfmud"]} -{"Format": "IDEA0", "ID": "645c06eb-295f-4920-856e-003bd5ca68d3", "DetectTime": "2023-10-30T14:01:40.343729+02:00", "EventTime": "2023-10-30T14:01:40.343741+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cl4LciP6f4dBpn8Cb"]} -{"Format": "IDEA0", "ID": "ccaa9fd8-383d-4456-b24a-c92cd326ed36", "DetectTime": "2023-10-30T14:01:40.357017+02:00", "EventTime": "2023-10-30T14:01:40.357029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CURfaZ1gFpOpVD1w94"]} -{"Format": "IDEA0", "ID": "e366c3de-a6b3-484c-8f17-5b6a4968925b", "DetectTime": "2023-10-30T14:01:40.383984+02:00", "EventTime": "2023-10-30T14:01:40.384006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CojfZiZf20EgIau2l"]} -{"Format": "IDEA0", "ID": "84cdb8c2-67e0-400f-af64-ed452e60549c", "DetectTime": "2023-10-30T14:01:40.405830+02:00", "EventTime": "2023-10-30T14:01:40.405842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZYCYr1GR1EubI46qj", "CFUbBj1Sq7zmxwZz3f", "CjQjZH38xnGNhSTvqb", "CdFXuiWn40OeswEfc"]} -{"Format": "IDEA0", "ID": "64bb1248-eed4-4b18-8081-f8555d097be4", "DetectTime": "2023-10-30T14:01:40.417919+02:00", "EventTime": "2023-10-30T14:01:40.417936+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFUbBj1Sq7zmxwZz3f"]} -{"Format": "IDEA0", "ID": "69e57a55-514b-46d2-b045-022f7812dc5a", "DetectTime": "2023-10-30T14:01:40.428267+02:00", "EventTime": "2023-10-30T14:01:40.428280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CFEAUv2eG7GpOPY9Dg"]} -{"Format": "IDEA0", "ID": "93e66d93-73c6-4a1d-aaa9-f923fff6275f", "DetectTime": "2023-10-30T14:01:40.449994+02:00", "EventTime": "2023-10-30T14:01:40.450010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CwXt0T31XxjxXgcGNa"]} -{"Format": "IDEA0", "ID": "a14a8519-1311-4ca6-bfd6-0f7ac0239323", "DetectTime": "2023-10-30T14:01:40.474018+02:00", "EventTime": "2023-10-30T14:01:40.474034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CxbUCD1YQx23oKmmVj"]} -{"Format": "IDEA0", "ID": "0cf8a02d-7202-4ca9-9ce6-f1eb34e8d8c6", "DetectTime": "2023-10-30T14:01:40.505043+02:00", "EventTime": "2023-10-30T14:01:40.505056+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFZ2IC433Su9rIP91i"]} -{"Format": "IDEA0", "ID": "d4c24828-d52b-48ca-a88a-0bd3954f5e76", "DetectTime": "2023-10-30T14:01:40.516586+02:00", "EventTime": "2023-10-30T14:01:40.516598+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEoyhF1r6pUJdFIQ96"]} -{"Format": "IDEA0", "ID": "f17f6054-7309-49af-99d1-061d94b2cca7", "DetectTime": "2023-10-30T14:01:40.527167+02:00", "EventTime": "2023-10-30T14:01:40.527180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cq5tvd2OR8dcNs6xhj"]} -{"Format": "IDEA0", "ID": "a27f479f-0370-4089-9a29-00823535b38d", "DetectTime": "2023-10-30T14:01:40.550397+02:00", "EventTime": "2023-10-30T14:01:40.550408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CN6i9Q1v2ElGtHHeCd"]} -{"Format": "IDEA0", "ID": "9a64aaee-66d2-4c55-82c5-b15be5d561d1", "DetectTime": "2023-10-30T14:01:40.569607+02:00", "EventTime": "2023-10-30T14:01:40.569620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CZMtDx20kd02CzzVWj"]} -{"Format": "IDEA0", "ID": "e8f3cb21-a87e-4a59-8fce-87a431fef78d", "DetectTime": "2023-10-30T14:01:40.587588+02:00", "EventTime": "2023-10-30T14:01:40.587605+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2bMtY3qxdLeFAURCa"]} -{"Format": "IDEA0", "ID": "d9113eaa-4fb9-4311-9a11-810b178ee624", "DetectTime": "2023-10-30T14:01:40.599973+02:00", "EventTime": "2023-10-30T14:01:40.599989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C5WBU13xeAa3mCKBTd"]} -{"Format": "IDEA0", "ID": "98b0eaa9-7c69-4fac-bd8e-71521c3930d4", "DetectTime": "2023-10-30T14:01:40.620829+02:00", "EventTime": "2023-10-30T14:01:40.620841+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtCoV347FoEH6w7l8a"]} -{"Format": "IDEA0", "ID": "0222b98d-1e3b-4682-8b60-1cda47af6353", "DetectTime": "2023-10-30T14:01:40.633333+02:00", "EventTime": "2023-10-30T14:01:40.633344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDSyguchIQIGXEy4b"]} -{"Format": "IDEA0", "ID": "a5beeffb-0058-4864-bd29-2187e0d57a51", "DetectTime": "2023-10-30T14:01:40.656925+02:00", "EventTime": "2023-10-30T14:01:40.656937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cd6mmb1YEUJq3ECgS2"]} -{"Format": "IDEA0", "ID": "d7be3864-6afe-4a17-9417-ea5c62e1dadb", "DetectTime": "2023-10-30T14:01:40.680176+02:00", "EventTime": "2023-10-30T14:01:40.680193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CtMzUHX6B6P3QKATk"]} -{"Format": "IDEA0", "ID": "aee68e6d-28bb-4c9f-9b60-9c904970dd8f", "DetectTime": "2023-10-30T14:01:40.702159+02:00", "EventTime": "2023-10-30T14:01:40.702170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CqpZuT3gji8VzLK0a"]} -{"Format": "IDEA0", "ID": "11588917-d887-44e8-b138-5b280a8f1e9d", "DetectTime": "2023-10-30T14:01:40.736634+02:00", "EventTime": "2023-10-30T14:01:40.736651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CEUTCv1tKaVyyJTPhg"]} -{"Format": "IDEA0", "ID": "7b4ac554-8c09-4708-93f9-888b62fba39d", "DetectTime": "2023-10-30T14:01:40.757770+02:00", "EventTime": "2023-10-30T14:01:40.757788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C7k7RX1KBRlliAZBM8"]} -{"Format": "IDEA0", "ID": "755ac1a2-9f56-49f3-ab18-cc0d82cf3735", "DetectTime": "2023-10-30T14:01:40.778888+02:00", "EventTime": "2023-10-30T14:01:40.778900+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CTZv7r3zolfaglQV8"]} -{"Format": "IDEA0", "ID": "c830b595-3ec0-4936-b455-7a5fdca4f337", "DetectTime": "2023-10-30T14:01:40.821762+02:00", "EventTime": "2023-10-30T14:01:40.821781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CCAKok2Vsb6MODGYk4"]} -{"Format": "IDEA0", "ID": "ea3bd6a0-1ed4-4099-ab7f-86724ac1b949", "DetectTime": "2023-10-30T14:01:40.844107+02:00", "EventTime": "2023-10-30T14:01:40.844126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CLQ7cl1CxXeuEebj2i"]} -{"Format": "IDEA0", "ID": "a84c4b57-cd17-4dcb-a7cd-26583e846a9a", "DetectTime": "2023-10-30T14:01:40.862967+02:00", "EventTime": "2023-10-30T14:01:40.862989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CMJIKP3KDjgSYgkVCl"]} -{"Format": "IDEA0", "ID": "7138f06d-d80c-421c-87ff-99ccfe98623b", "DetectTime": "2023-10-30T14:01:40.886579+02:00", "EventTime": "2023-10-30T14:01:40.886594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CfsaV23BFd49U1ZcWl"]} -{"Format": "IDEA0", "ID": "c1c3cc6b-b70e-46f3-b56f-7d68b1455971", "DetectTime": "2023-10-30T14:01:40.910539+02:00", "EventTime": "2023-10-30T14:01:40.910562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CBbug74ZYdQ1bH1ig"]} -{"Format": "IDEA0", "ID": "75cb2a9d-dbe8-4791-ac65-c24b7cf739bd", "DetectTime": "2023-10-30T14:01:40.933328+02:00", "EventTime": "2023-10-30T14:01:40.933345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["C8n6eT1TP8GmefhXu1"]} -{"Format": "IDEA0", "ID": "a0ac9d6c-496f-4e07-9fd2-081dbecfd3df", "DetectTime": "2023-10-30T14:01:40.957366+02:00", "EventTime": "2023-10-30T14:01:40.957387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CTprw814jiansrgWG9"]} -{"Format": "IDEA0", "ID": "f068f540-7b6e-4c1e-9c45-b7e1605735ed", "DetectTime": "2023-10-30T14:01:40.982975+02:00", "EventTime": "2023-10-30T14:01:40.982992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CSFeEo2HgfEiRtrWf1"]} -{"Format": "IDEA0", "ID": "b609dfb4-6cb5-43c2-9328-fe3c9100952c", "DetectTime": "2023-10-30T14:01:41.007599+02:00", "EventTime": "2023-10-30T14:01:41.007613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["C0K2jq3WfVLYzJ2eOg"]} -{"Format": "IDEA0", "ID": "5b8dbc82-1c3b-4a3b-b579-ad7057569233", "DetectTime": "2023-10-30T14:01:41.034720+02:00", "EventTime": "2023-10-30T14:01:41.034738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["ChdtTj4QsMngfoyaL7"]} -{"Format": "IDEA0", "ID": "4ce63953-fb86-4b0a-a88a-0f75b4ae4077", "DetectTime": "2023-10-30T14:01:41.059167+02:00", "EventTime": "2023-10-30T14:01:41.059183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["C4issZ1ifMv5WF7Cr1"]} -{"Format": "IDEA0", "ID": "2d0adca3-965e-45bf-87fb-90f397a9a689", "DetectTime": "2023-10-30T14:01:41.081593+02:00", "EventTime": "2023-10-30T14:01:41.081605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cid8XX23pKH873fKRi"]} -{"Format": "IDEA0", "ID": "d4a9c43c-3f32-4590-ba15-7c2756a448f6", "DetectTime": "2023-10-30T14:01:41.115797+02:00", "EventTime": "2023-10-30T14:01:41.115809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C9U13F4I3VK1sqXlHg"]} -{"Format": "IDEA0", "ID": "57868ffd-08c5-46a5-8f99-1dfde403b512", "DetectTime": "2023-10-30T14:01:41.137351+02:00", "EventTime": "2023-10-30T14:01:41.137367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CXUdCJ1qqiKLPJoo6j"]} -{"Format": "IDEA0", "ID": "413b24f0-0650-444e-b31b-6c139e5dfb6b", "DetectTime": "2023-10-30T14:01:41.160132+02:00", "EventTime": "2023-10-30T14:01:41.160151+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsQZ9v4ut0UWJszQ31"]} -{"Format": "IDEA0", "ID": "d01f18c7-d5ed-49e2-bad0-0d49e535565f", "DetectTime": "2023-10-30T14:01:41.172614+02:00", "EventTime": "2023-10-30T14:01:41.172630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CLseIE2F4p4oYte7z7"]} -{"Format": "IDEA0", "ID": "e4490439-a7ae-4d04-a520-b1db92ab1ed5", "DetectTime": "2023-10-30T14:01:41.190332+02:00", "EventTime": "2023-10-30T14:01:41.190346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CEPXYo3UJVZG9Tafbh"]} -{"Format": "IDEA0", "ID": "8a76a628-9fd5-4fb1-8490-0fb607655a54", "DetectTime": "2023-10-30T14:01:41.209946+02:00", "EventTime": "2023-10-30T14:01:41.209963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CcZ9xq20hOao2fbBQ7"]} -{"Format": "IDEA0", "ID": "834d6725-d01c-4ea3-bde7-2d9e4a744884", "DetectTime": "2023-10-30T14:01:41.228655+02:00", "EventTime": "2023-10-30T14:01:41.228667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cz1my54yyhP8FHS96b"]} -{"Format": "IDEA0", "ID": "cf61eb9d-7217-430d-b253-ec9b07a36918", "DetectTime": "2023-10-30T14:01:41.245809+02:00", "EventTime": "2023-10-30T14:01:41.245820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CJtXlj3opE2fkgM4Jd"]} -{"Format": "IDEA0", "ID": "45650dc2-9da5-4f3d-9eb6-02c0f2aa8340", "DetectTime": "2023-10-30T14:01:41.265660+02:00", "EventTime": "2023-10-30T14:01:41.265673+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDeLUP3fRKooKdBZ71"]} -{"Format": "IDEA0", "ID": "d3f9af23-fb41-4584-b7f8-46a2c7e4210c", "DetectTime": "2023-10-30T14:01:41.281097+02:00", "EventTime": "2023-10-30T14:01:41.281114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCkGry3s1MciNqKlJk"]} -{"Format": "IDEA0", "ID": "04438c37-2d1b-455f-b04b-e7d291b5214a", "DetectTime": "2023-10-30T14:01:41.317801+02:00", "EventTime": "2023-10-30T14:01:41.317818+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdcV6n0a8LaA82Aai"]} -{"Format": "IDEA0", "ID": "c5fd3f3c-ebc9-44e8-8ab1-5b305b23c28d", "DetectTime": "2023-10-30T14:01:41.333891+02:00", "EventTime": "2023-10-30T14:01:41.333917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["Ce0bhgWPGgnfLd8ei"]} -{"Format": "IDEA0", "ID": "d4eb0566-5d7b-4176-9fd7-5c0882f5b426", "DetectTime": "2023-10-30T14:01:41.360088+02:00", "EventTime": "2023-10-30T14:01:41.360105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CjJzma3PlPXStMSudf"]} -{"Format": "IDEA0", "ID": "3e16099e-b557-4dbf-bc8a-a0586540113e", "DetectTime": "2023-10-30T14:01:41.383085+02:00", "EventTime": "2023-10-30T14:01:41.383103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CY2cGf4BVe6eJNvvJ1"]} -{"Format": "IDEA0", "ID": "db5e7f71-c2a4-434a-a82a-81fffcb9c7cd", "DetectTime": "2023-10-30T14:01:41.405450+02:00", "EventTime": "2023-10-30T14:01:41.405466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDeLUP3fRKooKdBZ71", "CtCoV347FoEH6w7l8a", "CDM6Xy4M5Zk5FkVo74", "CEoyhF1r6pUJdFIQ96"]} -{"Format": "IDEA0", "ID": "31b91724-77c8-48f2-87ed-770b6f2873df", "DetectTime": "2023-10-30T14:01:41.421111+02:00", "EventTime": "2023-10-30T14:01:41.421128+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDM6Xy4M5Zk5FkVo74"]} -{"Format": "IDEA0", "ID": "505f56ed-a582-417b-8bf4-35b39ed9e192", "DetectTime": "2023-10-30T14:01:41.435379+02:00", "EventTime": "2023-10-30T14:01:41.435405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.159.92 ", "ContentType": "text/plain"}], "uids": ["CG7xVK1onCI0tPlA7l"]} -{"Format": "IDEA0", "ID": "6de4f660-602a-4e57-80da-e67d099391b3", "DetectTime": "2023-10-30T14:01:41.449957+02:00", "EventTime": "2023-10-30T14:01:41.449968+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck68i9FQibEfWjC92"]} -{"Format": "IDEA0", "ID": "679cd450-790b-47b2-9167-89f36bea78db", "DetectTime": "2023-10-30T14:01:41.466420+02:00", "EventTime": "2023-10-30T14:01:41.466436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Chi8sXAlZe5M4SqD5"]} -{"Format": "IDEA0", "ID": "fc0bc422-3d5f-4132-ad86-cafce8504dab", "DetectTime": "2023-10-30T14:01:41.488219+02:00", "EventTime": "2023-10-30T14:01:41.488241+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHO8by41GD4RvsFQIg"]} -{"Format": "IDEA0", "ID": "4c685c7b-def5-44a4-a498-68bcf4549ffd", "DetectTime": "2023-10-30T14:01:41.504343+02:00", "EventTime": "2023-10-30T14:01:41.504364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CS6kKL20wpxGcPctcc"]} -{"Format": "IDEA0", "ID": "43416e86-ef41-4ce5-b74a-95b242d0f76b", "DetectTime": "2023-10-30T14:01:41.524860+02:00", "EventTime": "2023-10-30T14:01:41.524880+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.16.140"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 181.65.16.140 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CVLsIS3TeEvUNSlGjd"]} -{"Format": "IDEA0", "ID": "bdae367e-2bec-4346-b3cb-25bb1c4fb33f", "DetectTime": "2023-10-30T14:01:41.570613+02:00", "EventTime": "2023-10-30T14:01:41.570625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CkzW9iE2RC3JkaQ0g"]} -{"Format": "IDEA0", "ID": "27c69e35-d51a-4098-9fcf-9bf8124e84da", "DetectTime": "2023-10-30T14:01:41.587826+02:00", "EventTime": "2023-10-30T14:01:41.587843+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cl3PPc1vgkLCsGFkqc"]} -{"Format": "IDEA0", "ID": "43d10deb-d8b3-452f-a0f2-42c6c81ed006", "DetectTime": "2023-10-30T14:01:41.602685+02:00", "EventTime": "2023-10-30T14:01:41.602699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CMlZ6F3L0uDX0Qa6t8"]} -{"Format": "IDEA0", "ID": "1c0ca8a7-b09f-4311-8375-6ac947a4a131", "DetectTime": "2023-10-30T14:01:41.619839+02:00", "EventTime": "2023-10-30T14:01:41.619858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Ch3jIL1HuECbYiwav4"]} -{"Format": "IDEA0", "ID": "bb2c61a1-12af-4dfe-b51d-e151affe53e7", "DetectTime": "2023-10-30T14:01:41.638735+02:00", "EventTime": "2023-10-30T14:01:41.638757+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvjZIkuG4zWgmjeYi"]} -{"Format": "IDEA0", "ID": "6011caaa-20e1-41e9-9c5d-88acea6ab704", "DetectTime": "2023-10-30T14:01:41.653760+02:00", "EventTime": "2023-10-30T14:01:41.653773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CxT8Wn1SlJJ3J3Nji7"]} -{"Format": "IDEA0", "ID": "d7dabeb1-c525-499a-90d1-5cac86c3ddee", "DetectTime": "2023-10-30T14:01:41.691573+02:00", "EventTime": "2023-10-30T14:01:41.691589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Cw8QlS2d4hzuaefwf8"]} -{"Format": "IDEA0", "ID": "45ae33b6-3fb6-40e4-8449-5b4d22a9bd82", "DetectTime": "2023-10-30T14:01:41.711640+02:00", "EventTime": "2023-10-30T14:01:41.711656+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCNXaz4EAkTMQTZuEh"]} -{"Format": "IDEA0", "ID": "06e004d9-5579-4186-a905-163c9c67753f", "DetectTime": "2023-10-30T14:01:41.725374+02:00", "EventTime": "2023-10-30T14:01:41.725393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CsFpdM2M5k9WTL7L12"]} -{"Format": "IDEA0", "ID": "e77f6180-d8f3-4432-bdde-d8e65928f1f2", "DetectTime": "2023-10-30T14:01:41.745318+02:00", "EventTime": "2023-10-30T14:01:41.745340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["CxAQOt3W2zKMipZsI6"]} -{"Format": "IDEA0", "ID": "ec8bea76-40a1-4c21-9546-d7ce97320d00", "DetectTime": "2023-10-30T14:01:41.763348+02:00", "EventTime": "2023-10-30T14:01:41.763367+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSiHt23shj8SmfI2z8"]} -{"Format": "IDEA0", "ID": "45706853-4a35-4cdf-81e6-ec4be2ab6ccd", "DetectTime": "2023-10-30T14:01:41.779330+02:00", "EventTime": "2023-10-30T14:01:41.779353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CDypmBJ0K2RDTVQH1"]} -{"Format": "IDEA0", "ID": "c55f0d93-10fc-4d40-a2f1-d8ccf8f049dc", "DetectTime": "2023-10-30T14:01:41.798343+02:00", "EventTime": "2023-10-30T14:01:41.798360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C7M7gw1jYFyGpXEsq3"]} -{"Format": "IDEA0", "ID": "0fb5a8cc-792d-4a9f-8d52-25fd4b432ecc", "DetectTime": "2023-10-30T14:01:41.816985+02:00", "EventTime": "2023-10-30T14:01:41.817008+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHkgBhWfpOMAtzV26"]} -{"Format": "IDEA0", "ID": "9a0b488b-cdbc-4530-8686-b43354cb4b7f", "DetectTime": "2023-10-30T14:01:41.831627+02:00", "EventTime": "2023-10-30T14:01:41.831656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CSiHt23shj8SmfI2z8", "C1dP1745hQ1nBYrLrg", "CvjZIkuG4zWgmjeYi", "CHO8by41GD4RvsFQIg"]} -{"Format": "IDEA0", "ID": "3d2f5c0d-5315-4349-96ad-8cf2e9752f61", "DetectTime": "2023-10-30T14:01:41.844280+02:00", "EventTime": "2023-10-30T14:01:41.844298+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1dP1745hQ1nBYrLrg"]} -{"Format": "IDEA0", "ID": "1d6d7a36-8327-4f93-8fbf-ac65cdae1816", "DetectTime": "2023-10-30T14:01:41.860450+02:00", "EventTime": "2023-10-30T14:01:41.860466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["C1sV6uACzLxrcQsI4"]} -{"Format": "IDEA0", "ID": "885c3e18-eaf4-48ef-b480-9b2382faed31", "DetectTime": "2023-10-30T14:01:41.877554+02:00", "EventTime": "2023-10-30T14:01:41.877575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C80Yf54pO5ztdOLJXf"]} -{"Format": "IDEA0", "ID": "9a10eb5c-04f6-4f16-a0c3-38ebda62a51a", "DetectTime": "2023-10-30T14:01:41.898454+02:00", "EventTime": "2023-10-30T14:01:41.898472+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjHFU723EEQVWceUQc"]} -{"Format": "IDEA0", "ID": "bd6b4642-6ed9-4976-a197-e48066442f3d", "DetectTime": "2023-10-30T14:01:41.913306+02:00", "EventTime": "2023-10-30T14:01:41.913324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["C8RHqG3Iu10sKLIs0d"]} -{"Format": "IDEA0", "ID": "c699042f-e1be-4b87-97b7-8354e4709f56", "DetectTime": "2023-10-30T14:01:41.932624+02:00", "EventTime": "2023-10-30T14:01:41.932641+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUrMyp1xc79PokamOg"]} -{"Format": "IDEA0", "ID": "96ed969b-8273-424e-a21b-ac060baaf8c7", "DetectTime": "2023-10-30T14:01:41.947617+02:00", "EventTime": "2023-10-30T14:01:41.947635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Cw1KXo21054z5ySsZc"]} -{"Format": "IDEA0", "ID": "365eabfd-3efc-4046-a48a-cfccc9260d10", "DetectTime": "2023-10-30T14:01:41.964575+02:00", "EventTime": "2023-10-30T14:01:41.964592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CC4IXM1SXaYENnuItl"]} -{"Format": "IDEA0", "ID": "ea101f17-7054-455e-ad81-978c2c1a428d", "DetectTime": "2023-10-30T14:01:41.983257+02:00", "EventTime": "2023-10-30T14:01:41.983274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CE0LMTmn5Vl0LoRpd"]} -{"Format": "IDEA0", "ID": "a5565207-c318-44b3-90d1-001abd360c4c", "DetectTime": "2023-10-30T14:01:41.999285+02:00", "EventTime": "2023-10-30T14:01:41.999303+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZDc6I34nWK5ZT1QBg"]} -{"Format": "IDEA0", "ID": "a5000d97-ff27-403e-ac3c-481c39216a58", "DetectTime": "2023-10-30T14:01:42.010707+02:00", "EventTime": "2023-10-30T14:01:42.010727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["ChU3Nh1dSksQTHv554"]} -{"Format": "IDEA0", "ID": "278dccca-0e23-4883-b604-b852a9003fc0", "DetectTime": "2023-10-30T14:01:42.031897+02:00", "EventTime": "2023-10-30T14:01:42.031920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CJ5bRd2rCKnlS8Mize"]} -{"Format": "IDEA0", "ID": "f8a62345-b847-4b4e-b4e8-3211770e95fe", "DetectTime": "2023-10-30T14:01:42.050307+02:00", "EventTime": "2023-10-30T14:01:42.050329+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cde5VO1B748fbx7Obe"]} -{"Format": "IDEA0", "ID": "64a4d26a-ab1a-4af3-8553-2c9ff1f860d4", "DetectTime": "2023-10-30T14:01:42.065863+02:00", "EventTime": "2023-10-30T14:01:42.065876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CpJu942QjBnBBLBQDj"]} -{"Format": "IDEA0", "ID": "53b723ce-c634-460c-b3be-a032da562b2d", "DetectTime": "2023-10-30T14:01:42.081683+02:00", "EventTime": "2023-10-30T14:01:42.081694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CyWkxC1mBteQT4s1ck"]} -{"Format": "IDEA0", "ID": "445c9f3d-2a8e-4a83-bd19-ad4cde2575df", "DetectTime": "2023-10-30T14:01:42.103697+02:00", "EventTime": "2023-10-30T14:01:42.103713+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsUjUV25QFnW0dUhij"]} -{"Format": "IDEA0", "ID": "ded11f13-c214-44b8-8ad8-14e4610290fe", "DetectTime": "2023-10-30T14:01:42.118979+02:00", "EventTime": "2023-10-30T14:01:42.118991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CwGzDy19yB6ngcrrb"]} -{"Format": "IDEA0", "ID": "9a5b8e02-c846-4efc-a74b-7cb0fcb17af4", "DetectTime": "2023-10-30T14:01:42.133609+02:00", "EventTime": "2023-10-30T14:01:42.133621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CHKXdz2ZLkeHlSsiNf"]} -{"Format": "IDEA0", "ID": "d8dffe9c-2385-492f-9b59-a6ce7c17a54b", "DetectTime": "2023-10-30T14:01:42.149796+02:00", "EventTime": "2023-10-30T14:01:42.149812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["CaFR9u1mKLAbnkp6Vk"]} -{"Format": "IDEA0", "ID": "2092bb0a-5173-4e6b-a7b4-c5fb48e05fe8", "DetectTime": "2023-10-30T14:01:42.167989+02:00", "EventTime": "2023-10-30T14:01:42.168006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CJvml23pRLVKeDcJ28"]} -{"Format": "IDEA0", "ID": "7d63c3e5-39dc-4b61-a3ab-15f40afafdc0", "DetectTime": "2023-10-30T14:01:42.186648+02:00", "EventTime": "2023-10-30T14:01:42.186668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CniLtM1V2ZE9vTEOP6"]} -{"Format": "IDEA0", "ID": "1ad82a58-8f93-4f48-a1f1-1827d6e43440", "DetectTime": "2023-10-30T14:01:42.206222+02:00", "EventTime": "2023-10-30T14:01:42.206239+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C38rwJydMvCYoihV"]} -{"Format": "IDEA0", "ID": "e085932c-ba63-4b65-8637-447ae4b25b6c", "DetectTime": "2023-10-30T14:01:42.226715+02:00", "EventTime": "2023-10-30T14:01:42.226731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CMyB6NlLTSVbwgs7j"]} -{"Format": "IDEA0", "ID": "fe895cb6-5eda-4808-aff3-ff06ce629172", "DetectTime": "2023-10-30T14:01:42.248408+02:00", "EventTime": "2023-10-30T14:01:42.248424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C9bdSZ2mKCVaM1QuAk"]} -{"Format": "IDEA0", "ID": "db30ca0b-9178-4b1a-83fb-5e3a9629680e", "DetectTime": "2023-10-30T14:01:42.267075+02:00", "EventTime": "2023-10-30T14:01:42.267093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cr3xhI3x45qevIa7Ch"]} -{"Format": "Json", "ID": "db30ca0b-9178-4b1a-83fb-5e3a9629680e", "DetectTime": "2023-10-30T14:01:42.267075+02:00", "EventTime": "2023-10-30T14:01:42.267093+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:16:18.623783+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:42.334769)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "088865a0-50c4-48f0-a202-99391b259cac", "DetectTime": "2023-10-30T14:01:42.339061+02:00", "EventTime": "2023-10-30T14:01:42.339075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CpOHsw471ozz7nsFme"]} -{"Format": "IDEA0", "ID": "c395c748-67a1-4c7d-af27-6886c9f1108c", "DetectTime": "2023-10-30T14:01:42.362400+02:00", "EventTime": "2023-10-30T14:01:42.362421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CtVweH38MyJAwiP2Bc"]} -{"Format": "IDEA0", "ID": "d6019cb2-ee7f-4485-9798-58844fede20e", "DetectTime": "2023-10-30T14:01:42.382698+02:00", "EventTime": "2023-10-30T14:01:42.382717+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ClbQlj2iGv97ChsEj"]} -{"Format": "IDEA0", "ID": "b1d47634-3062-464c-a2d7-e424d352e55f", "DetectTime": "2023-10-30T14:01:42.422284+02:00", "EventTime": "2023-10-30T14:01:42.422299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CU6Dzx4ycnc8bnwj8d"]} -{"Format": "IDEA0", "ID": "63098bae-0d33-42cf-a164-cf9401e8c63a", "DetectTime": "2023-10-30T14:01:42.441607+02:00", "EventTime": "2023-10-30T14:01:42.441622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CduiAc3V5NYqkkPmo8"]} -{"Format": "IDEA0", "ID": "8882e284-1f16-4f26-beab-b01ff77ada59", "DetectTime": "2023-10-30T14:01:42.463273+02:00", "EventTime": "2023-10-30T14:01:42.463293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDWsqm314ar9v2MIOa"]} -{"Format": "IDEA0", "ID": "ab4084a4-b488-4610-8522-df245684be14", "DetectTime": "2023-10-30T14:01:42.483546+02:00", "EventTime": "2023-10-30T14:01:42.483558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C3Odhh3lSVARfxRYOl"]} -{"Format": "IDEA0", "ID": "882d12a3-2e87-4601-bb60-c6205cdcb603", "DetectTime": "2023-10-30T14:01:42.502060+02:00", "EventTime": "2023-10-30T14:01:42.502081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Ce3vnbllijrOoG0Gh"]} -{"Format": "IDEA0", "ID": "ffc5950d-f316-4708-8337-f9797451a77a", "DetectTime": "2023-10-30T14:01:42.520214+02:00", "EventTime": "2023-10-30T14:01:42.520230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cp7cN1zdP9OgJmZa"]} -{"Format": "IDEA0", "ID": "950d5b3b-5d63-4398-bdbf-a57f12ebff91", "DetectTime": "2023-10-30T14:01:42.538764+02:00", "EventTime": "2023-10-30T14:01:42.538856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cvsiph0p3zjUH3bN5"]} -{"Format": "IDEA0", "ID": "2e5df4c8-bc06-476b-a823-c8de77e435f0", "DetectTime": "2023-10-30T14:01:42.557385+02:00", "EventTime": "2023-10-30T14:01:42.557401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C8Rw513MyC5d09hPak"]} -{"Format": "IDEA0", "ID": "de994ed1-f6c8-4a6d-ad5a-723dabcdd76a", "DetectTime": "2023-10-30T14:01:42.576849+02:00", "EventTime": "2023-10-30T14:01:42.576864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["Ck3F1Q8WhOEZvsy0b"]} -{"Format": "IDEA0", "ID": "6343304a-3c91-4281-8a35-bdd9ecb89efa", "DetectTime": "2023-10-30T14:01:42.593237+02:00", "EventTime": "2023-10-30T14:01:42.593255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CpjKXB1PuIdlUr66uk"]} -{"Format": "IDEA0", "ID": "9b376fdb-44e4-41a6-947a-842c9883b260", "DetectTime": "2023-10-30T14:01:42.615295+02:00", "EventTime": "2023-10-30T14:01:42.615311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["C1xgci2sjUy6jbAGaa"]} -{"Format": "IDEA0", "ID": "132cff95-e915-4130-afd5-9e1e26a6ae33", "DetectTime": "2023-10-30T14:01:42.637723+02:00", "EventTime": "2023-10-30T14:01:42.637740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CAIoNv2owR7yRp1Z81"]} -{"Format": "IDEA0", "ID": "74870a1f-856d-460c-92da-efc0cd39e3f1", "DetectTime": "2023-10-30T14:01:42.657458+02:00", "EventTime": "2023-10-30T14:01:42.657475+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CU4ixl4YZXCGtwT0m5"]} -{"Format": "IDEA0", "ID": "65a396f0-439d-4379-bde9-54f698d44cc1", "DetectTime": "2023-10-30T14:01:42.672264+02:00", "EventTime": "2023-10-30T14:01:42.672284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C7E2pU3LK5dmTvUNpj"]} -{"Format": "IDEA0", "ID": "3fc0e795-c5ae-4f18-b1ab-c57c722f246f", "DetectTime": "2023-10-30T14:01:42.691871+02:00", "EventTime": "2023-10-30T14:01:42.691888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["Cxjima3GwtA5oVmYoc"]} -{"Format": "IDEA0", "ID": "790a31f0-69a6-4b1c-b344-57cb2b3342a5", "DetectTime": "2023-10-30T14:01:42.709742+02:00", "EventTime": "2023-10-30T14:01:42.709759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CDWlFL1h58jLjTnFz3"]} -{"Format": "IDEA0", "ID": "075ea45b-bb78-4740-aa33-7532b944b246", "DetectTime": "2023-10-30T14:01:42.730302+02:00", "EventTime": "2023-10-30T14:01:42.730321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CLN8Zv3AHfT9WTgOWk"]} -{"Format": "IDEA0", "ID": "2777ec42-9d03-4d8d-9c34-76474001e6b9", "DetectTime": "2023-10-30T14:01:42.753305+02:00", "EventTime": "2023-10-30T14:01:42.753323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CQGqNChH5cUMVKIU5"]} -{"Format": "IDEA0", "ID": "8e767307-4a33-48dd-af6e-df5b9e1868aa", "DetectTime": "2023-10-30T14:01:42.774722+02:00", "EventTime": "2023-10-30T14:01:42.774747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C2XeRc2wQ548QsvUHi"]} -{"Format": "IDEA0", "ID": "39a7915e-b927-495b-9176-b3ace2700020", "DetectTime": "2023-10-30T14:01:42.807042+02:00", "EventTime": "2023-10-30T14:01:42.807057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CGATRf4Y117kpGBrk6"]} -{"Format": "IDEA0", "ID": "eb51d19e-3d77-4594-9e46-e78ebbe58dfb", "DetectTime": "2023-10-30T14:01:42.824755+02:00", "EventTime": "2023-10-30T14:01:42.824767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cde5VO1B748fbx7Obe", "CEKM8mGZO450MyIck", "CUrMyp1xc79PokamOg", "C38rwJydMvCYoihV"]} -{"Format": "IDEA0", "ID": "94c2b51a-53c8-4c00-b36d-90f29cc7d323", "DetectTime": "2023-10-30T14:01:42.839564+02:00", "EventTime": "2023-10-30T14:01:42.839583+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEKM8mGZO450MyIck"]} -{"Format": "IDEA0", "ID": "9ec86ef8-770c-40bb-b50a-37cb4c5f312d", "DetectTime": "2023-10-30T14:01:42.853319+02:00", "EventTime": "2023-10-30T14:01:42.853333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CiuWsw4l0FUYiWyfg"]} -{"Format": "IDEA0", "ID": "103e5e22-d9ea-456c-b9bf-35e33d1ecfe1", "DetectTime": "2023-10-30T14:01:42.869760+02:00", "EventTime": "2023-10-30T14:01:42.869776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CC113P1kYqeCulBdtl"]} -{"Format": "IDEA0", "ID": "3b45d0c1-13c1-4cbf-8d2b-e8bfab4f7f63", "DetectTime": "2023-10-30T14:01:42.884558+02:00", "EventTime": "2023-10-30T14:01:42.884569+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8NWac2WYSDJjKu7j9"]} -{"Format": "IDEA0", "ID": "622d0e8f-bf2f-475d-8e08-b7a52a7d9808", "DetectTime": "2023-10-30T14:01:42.897149+02:00", "EventTime": "2023-10-30T14:01:42.897168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CqSYpW21CNLtdmnH4h"]} -{"Format": "IDEA0", "ID": "2398e13c-ccb2-4dde-aed3-d5193e50a199", "DetectTime": "2023-10-30T14:01:42.915069+02:00", "EventTime": "2023-10-30T14:01:42.915090+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLVQk33yJKBaJDY8Fg"]} -{"Format": "IDEA0", "ID": "7df19a9a-4638-4dd3-978a-4d0140c0059b", "DetectTime": "2023-10-30T14:01:42.928642+02:00", "EventTime": "2023-10-30T14:01:42.928661+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C78RYD3hkIilLDL9Rk"]} -{"Format": "IDEA0", "ID": "c53112da-376b-45cc-8d34-3780a4ff40ab", "DetectTime": "2023-10-30T14:01:42.943514+02:00", "EventTime": "2023-10-30T14:01:42.943533+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYKZqg36VePxBF3GWj"]} -{"Format": "IDEA0", "ID": "a7cfdfe8-5229-415c-8e7e-300414c5c715", "DetectTime": "2023-10-30T14:01:42.956855+02:00", "EventTime": "2023-10-30T14:01:42.956866+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CmdH5o1kIXBgDDx7M6"]} -{"Format": "IDEA0", "ID": "15f464ee-b996-430b-ae18-455c32e4924a", "DetectTime": "2023-10-30T14:01:42.969935+02:00", "EventTime": "2023-10-30T14:01:42.969953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C63Mes1chNbl9rc5yd"]} -{"Format": "IDEA0", "ID": "0a16cd13-1dd9-406f-b134-24a44f079e1c", "DetectTime": "2023-10-30T14:01:42.988057+02:00", "EventTime": "2023-10-30T14:01:42.988070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CEj6U7243zs6Nrzvsh"]} -{"Format": "IDEA0", "ID": "c191ea69-04b9-4bb3-8602-94b38114f065", "DetectTime": "2023-10-30T14:01:43.006011+02:00", "EventTime": "2023-10-30T14:01:43.006023+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaQzR53iCiEeTNsIph"]} -{"Format": "IDEA0", "ID": "0ef3be10-3039-4dad-9986-4b3133e4df72", "DetectTime": "2023-10-30T14:01:43.017965+02:00", "EventTime": "2023-10-30T14:01:43.017986+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWLlJg1fsYd0I5ofxa"]} -{"Format": "IDEA0", "ID": "589dc3e7-16ba-48fe-bae8-17bc13af8eef", "DetectTime": "2023-10-30T14:01:43.040341+02:00", "EventTime": "2023-10-30T14:01:43.040353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CLVQk33yJKBaJDY8Fg", "CaQzR53iCiEeTNsIph", "CYKZqg36VePxBF3GWj", "Cqbn6E2ch327r5ivo"]} -{"Format": "IDEA0", "ID": "37ecf73e-77b5-4afa-aee0-449c403637ee", "DetectTime": "2023-10-30T14:01:43.052906+02:00", "EventTime": "2023-10-30T14:01:43.052920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CPSPDQ1XSUSZBmZAH4"]} -{"Format": "IDEA0", "ID": "08db7c97-4c0d-42c5-881b-cf529ac07db8", "DetectTime": "2023-10-30T14:01:43.069365+02:00", "EventTime": "2023-10-30T14:01:43.069378+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cqbn6E2ch327r5ivo"]} -{"Format": "IDEA0", "ID": "f96ce3d7-c3e1-4b78-9849-670fd6a412da", "DetectTime": "2023-10-30T14:01:43.083188+02:00", "EventTime": "2023-10-30T14:01:43.083204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CIKFOAmdgcS5LVpm3"]} -{"Format": "IDEA0", "ID": "4525793c-4515-4d21-8aaa-c4731b5d127d", "DetectTime": "2023-10-30T14:01:43.102463+02:00", "EventTime": "2023-10-30T14:01:43.102483+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVx3RC1ORaXR3Dfd53"]} -{"Format": "IDEA0", "ID": "d819ab40-e534-486d-8f65-7b37c222fe88", "DetectTime": "2023-10-30T14:01:43.116184+02:00", "EventTime": "2023-10-30T14:01:43.116196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CbNjwx2dcIckMoGdhf"]} -{"Format": "IDEA0", "ID": "94afc273-59c7-45b9-9f4f-237eac59985e", "DetectTime": "2023-10-30T14:01:43.135693+02:00", "EventTime": "2023-10-30T14:01:43.135712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CnS1sV2Nyuw0J5SUQl"]} -{"Format": "IDEA0", "ID": "cf276052-7315-4741-85ad-0ec7f0bae47e", "DetectTime": "2023-10-30T14:01:43.153489+02:00", "EventTime": "2023-10-30T14:01:43.153507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CtMS5z1DaQ5VX3xOWl"]} -{"Format": "IDEA0", "ID": "8726a4af-6edc-433f-abc0-a4fb5076015b", "DetectTime": "2023-10-30T14:01:43.171038+02:00", "EventTime": "2023-10-30T14:01:43.171052+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCa5hn2e1zzRoDfX76"]} -{"Format": "IDEA0", "ID": "6aa628f2-1e07-49d7-a26f-a831208c5b07", "DetectTime": "2023-10-30T14:01:43.184249+02:00", "EventTime": "2023-10-30T14:01:43.184259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["Cqi4281o5bZXWxwOP4"]} -{"Format": "IDEA0", "ID": "56d88631-6137-49f2-8bbe-c5771eafbf6d", "DetectTime": "2023-10-30T14:01:43.201410+02:00", "EventTime": "2023-10-30T14:01:43.201427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CT5FHf3Fw4y9awWnMi"]} -{"Format": "IDEA0", "ID": "9132fd37-4ad1-4975-a791-899538f88822", "DetectTime": "2023-10-30T14:01:43.221111+02:00", "EventTime": "2023-10-30T14:01:43.221127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.171.27.14 ", "ContentType": "text/plain"}], "uids": ["Cro5PU1dbbOpzrzc94"]} -{"Format": "IDEA0", "ID": "876ed030-32b6-43bd-a5f8-f2c62c36c3a4", "DetectTime": "2023-10-30T14:01:43.239298+02:00", "EventTime": "2023-10-30T14:01:43.239314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CKxW143be07yzs6x02"]} -{"Format": "IDEA0", "ID": "ba9af79f-e69a-422d-917e-97200beea00b", "DetectTime": "2023-10-30T14:01:43.259471+02:00", "EventTime": "2023-10-30T14:01:43.259487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CetVFK32LgZjo6kiqj"]} -{"Format": "IDEA0", "ID": "1b607075-fb96-4828-8dc7-245abcd6650c", "DetectTime": "2023-10-30T14:01:43.276099+02:00", "EventTime": "2023-10-30T14:01:43.276111+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChO7Ev3HI2cAbO3Gti"]} -{"Format": "IDEA0", "ID": "aa4e88cd-0f38-4da2-88f2-2b47756f6122", "DetectTime": "2023-10-30T14:01:43.289701+02:00", "EventTime": "2023-10-30T14:01:43.289712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CLDVdW3BHsR5zLtogf"]} -{"Format": "IDEA0", "ID": "63f69da5-f927-4428-8367-25ffecbc7d52", "DetectTime": "2023-10-30T14:01:43.307024+02:00", "EventTime": "2023-10-30T14:01:43.307038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.13.87.74 ", "ContentType": "text/plain"}], "uids": ["C7im4t2TeHL6L1NOM4"]} -{"Format": "IDEA0", "ID": "0d37aca9-0d85-420c-9ad2-578c6755efe2", "DetectTime": "2023-10-30T14:01:43.326975+02:00", "EventTime": "2023-10-30T14:01:43.326988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaoWZq2vLeCAUO0Vvf"]} -{"Format": "IDEA0", "ID": "5a69e1b5-d2b6-4bb1-8c0f-24be48bf888b", "DetectTime": "2023-10-30T14:01:43.341166+02:00", "EventTime": "2023-10-30T14:01:43.341183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CKKUI94wzrFCr8b6c4"]} -{"Format": "IDEA0", "ID": "8585a8ee-41fa-4d77-8871-7ad33b849661", "DetectTime": "2023-10-30T14:01:43.362632+02:00", "EventTime": "2023-10-30T14:01:43.362650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CFzhS23Rtzir7QcQb9"]} -{"Format": "IDEA0", "ID": "6c218b58-20dc-4358-860c-50ebba6697dc", "DetectTime": "2023-10-30T14:01:43.381349+02:00", "EventTime": "2023-10-30T14:01:43.381369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CqpsxK1EFb7dHgK5df"]} -{"Format": "IDEA0", "ID": "62e3bd7c-45ad-4055-b1a1-bcbc1626aa53", "DetectTime": "2023-10-30T14:01:43.405321+02:00", "EventTime": "2023-10-30T14:01:43.405338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CKS32FSa6BQmEMlvl"]} -{"Format": "IDEA0", "ID": "e8b3bbcf-2c6c-481b-8ec5-859f02212a77", "DetectTime": "2023-10-30T14:01:43.423621+02:00", "EventTime": "2023-10-30T14:01:43.423640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CobyTt31hucE2hO4Z2"]} -{"Format": "IDEA0", "ID": "67a7c131-a910-4c7b-9db4-329afcf028fc", "DetectTime": "2023-10-30T14:01:43.445797+02:00", "EventTime": "2023-10-30T14:01:43.445822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.180.109 ", "ContentType": "text/plain"}], "uids": ["CsFYbs3oqOFiXs85Xc"]} -{"Format": "IDEA0", "ID": "37ca5778-b950-4324-8bab-f8dbf89b444a", "DetectTime": "2023-10-30T14:01:43.471286+02:00", "EventTime": "2023-10-30T14:01:43.471306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CKrTKHOKItHxPA9O7"]} -{"Format": "IDEA0", "ID": "a9db3089-8d16-4609-ac75-32c2746aee69", "DetectTime": "2023-10-30T14:01:43.495639+02:00", "EventTime": "2023-10-30T14:01:43.495655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C2obEGwveoh1rO3M8"]} -{"Format": "IDEA0", "ID": "2f9a351c-0626-4adb-9f87-817da1746ed7", "DetectTime": "2023-10-30T14:01:43.518189+02:00", "EventTime": "2023-10-30T14:01:43.518210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CrFG2i4F7vHu4wLjz5"]} -{"Format": "IDEA0", "ID": "93a1e74a-da1c-44a1-985f-97b0eb4775c8", "DetectTime": "2023-10-30T14:01:43.540696+02:00", "EventTime": "2023-10-30T14:01:43.540714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.35.49 ", "ContentType": "text/plain"}], "uids": ["CmuEk83dCqpSkkVvQd"]} -{"Format": "IDEA0", "ID": "cfd06757-a259-4b3c-afdd-39d0bcd73fcd", "DetectTime": "2023-10-30T14:01:43.562238+02:00", "EventTime": "2023-10-30T14:01:43.562255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["C9VqgF2pQWDs8lW4Hj"]} -{"Format": "IDEA0", "ID": "7f7c6344-cc08-4d34-9971-0c11903ef7ec", "DetectTime": "2023-10-30T14:01:43.582215+02:00", "EventTime": "2023-10-30T14:01:43.582235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CWpuavTThFcAumI37"]} -{"Format": "IDEA0", "ID": "493fdc63-2dd9-416c-a9f2-30afed1e8f2b", "DetectTime": "2023-10-30T14:01:43.604325+02:00", "EventTime": "2023-10-30T14:01:43.604342+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cc3hIS1C0sZCZSx3ib"]} -{"Format": "IDEA0", "ID": "6c798660-d5a0-402e-85c6-16cfb5597cec", "DetectTime": "2023-10-30T14:01:43.621182+02:00", "EventTime": "2023-10-30T14:01:43.621199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBn7261pfaNc0Pk64b"]} -{"Format": "IDEA0", "ID": "a0337e37-13a9-466f-97de-e49e01b696e6", "DetectTime": "2023-10-30T14:01:43.656100+02:00", "EventTime": "2023-10-30T14:01:43.656111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CR2Q7T2Wx7cpzLbTPg"]} -{"Format": "IDEA0", "ID": "055de471-0841-466d-bf4f-d9d2637608ce", "DetectTime": "2023-10-30T14:01:43.676331+02:00", "EventTime": "2023-10-30T14:01:43.676351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CPjL0M35mCL3UymGm2"]} -{"Format": "IDEA0", "ID": "5d214759-d9d4-4234-9baf-cdfce3910f71", "DetectTime": "2023-10-30T14:01:43.698913+02:00", "EventTime": "2023-10-30T14:01:43.698933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CanadOSxLRutuLIea"]} -{"Format": "IDEA0", "ID": "033ab70b-c9fd-450a-8b58-f6a193b94669", "DetectTime": "2023-10-30T14:01:43.721628+02:00", "EventTime": "2023-10-30T14:01:43.721651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CzPATC4VEniHsL1kCa"]} -{"Format": "IDEA0", "ID": "ff901e53-0b0c-4292-99ca-7e4b99cf0d96", "DetectTime": "2023-10-30T14:01:43.742968+02:00", "EventTime": "2023-10-30T14:01:43.742986+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C38s2r4YWTrGj6Rf99"]} -{"Format": "IDEA0", "ID": "ab107144-663c-4c89-9b05-552eb89f6030", "DetectTime": "2023-10-30T14:01:43.751859+02:00", "EventTime": "2023-10-30T14:01:43.751871+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNXcnZ1sPzZ8OB0Z6i"]} -{"Format": "IDEA0", "ID": "298ac3ac-6ed0-4280-8c42-27d4614bbd0c", "DetectTime": "2023-10-30T14:01:43.760376+02:00", "EventTime": "2023-10-30T14:01:43.760387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.96.180.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.96.180.226 ", "ContentType": "text/plain"}], "uids": ["Cr4cbKvvQ2576aQvi"]} -{"Format": "IDEA0", "ID": "ab32fd43-e1e5-4489-82b8-7e5e1943b083", "DetectTime": "2023-10-30T14:01:43.783348+02:00", "EventTime": "2023-10-30T14:01:43.783368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C38s2r4YWTrGj6Rf99", "CeN9KC3SXRucb6kRw6", "CCa5hn2e1zzRoDfX76", "CaoWZq2vLeCAUO0Vvf"]} -{"Format": "IDEA0", "ID": "f36dc86a-3685-4bc6-b863-71377d412437", "DetectTime": "2023-10-30T14:01:43.791927+02:00", "EventTime": "2023-10-30T14:01:43.791939+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeN9KC3SXRucb6kRw6"]} -{"Format": "IDEA0", "ID": "d85f04b1-873c-4b5c-b67f-832edf7a313c", "DetectTime": "2023-10-30T14:01:43.800583+02:00", "EventTime": "2023-10-30T14:01:43.800593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CVzfZX2z7kG1DrZIdi"]} -{"Format": "IDEA0", "ID": "0800f3f8-61e2-42c0-9e6f-3b7cadfb2f15", "DetectTime": "2023-10-30T14:01:43.821093+02:00", "EventTime": "2023-10-30T14:01:43.821109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.18.101.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.18.101.127 ", "ContentType": "text/plain"}], "uids": ["CsNchd11YVWMA43UP4"]} -{"Format": "IDEA0", "ID": "532a534b-2e26-4018-89a5-3afcc579700c", "DetectTime": "2023-10-30T14:01:43.843396+02:00", "EventTime": "2023-10-30T14:01:43.843413+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsUSFw1RUJmHN38VX9"]} -{"Format": "IDEA0", "ID": "54251102-3647-4172-b65f-a29acc1b68b0", "DetectTime": "2023-10-30T14:01:43.852888+02:00", "EventTime": "2023-10-30T14:01:43.852907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["C8gqz31IQlN7s1ORii"]} -{"Format": "IDEA0", "ID": "afb556ab-d700-4fc6-a2a3-b64e0693cf9b", "DetectTime": "2023-10-30T14:01:43.877026+02:00", "EventTime": "2023-10-30T14:01:43.877052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.51.90.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.51.90.119 ", "ContentType": "text/plain"}], "uids": ["CWnbcZ3ApkMpRehDIa"]} -{"Format": "IDEA0", "ID": "402555b7-f058-4adf-a354-47e959230d48", "DetectTime": "2023-10-30T14:01:43.901468+02:00", "EventTime": "2023-10-30T14:01:43.901481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.49.45.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.49.45.200 ", "ContentType": "text/plain"}], "uids": ["Cnf7j81Khbl3ZUq3v8"]} -{"Format": "IDEA0", "ID": "9a1105fd-fad1-4278-ad0c-fafd04fe2224", "DetectTime": "2023-10-30T14:01:43.921526+02:00", "EventTime": "2023-10-30T14:01:43.921546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CkSFa33i5xhVOkYpI1"]} -{"Format": "IDEA0", "ID": "fa9015ff-1063-490b-9e62-b01f9844bd2a", "DetectTime": "2023-10-30T14:01:43.940860+02:00", "EventTime": "2023-10-30T14:01:43.940876+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CReM1cOIerbnIGxPf"]} -{"Format": "IDEA0", "ID": "4100ad11-3298-4cd7-b206-32a9b05ea531", "DetectTime": "2023-10-30T14:01:43.950871+02:00", "EventTime": "2023-10-30T14:01:43.950889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.45.73.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.45.73.57 ", "ContentType": "text/plain"}], "uids": ["ChFdqA2eOn7Ms3T0na"]} -{"Format": "IDEA0", "ID": "d0e127cb-e344-43c4-a777-a4d23d42b6f4", "DetectTime": "2023-10-30T14:01:43.970092+02:00", "EventTime": "2023-10-30T14:01:43.970109+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ct9yYM37yhMhVtYgl"]} -{"Format": "IDEA0", "ID": "0bab43ce-763e-45c8-973d-24dd33ba9e71", "DetectTime": "2023-10-30T14:01:43.980879+02:00", "EventTime": "2023-10-30T14:01:43.980903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.2.30.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.2.30.15 ", "ContentType": "text/plain"}], "uids": ["Cblog74VbKiKKNzpb6"]} -{"Format": "IDEA0", "ID": "9b88cfc9-a201-4f62-b1a6-8f68895e9ba8", "DetectTime": "2023-10-30T14:01:44.002005+02:00", "EventTime": "2023-10-30T14:01:44.002021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CLRp9B1VjXjmI5stDb"]} -{"Format": "IDEA0", "ID": "df96fa78-0da5-4dc7-a3bf-07076e29a411", "DetectTime": "2023-10-30T14:01:44.021075+02:00", "EventTime": "2023-10-30T14:01:44.021088+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQOebAB8j5SKhXHx2"]} -{"Format": "IDEA0", "ID": "b9e23822-6228-41a6-89af-fe8d6883be71", "DetectTime": "2023-10-30T14:01:44.028993+02:00", "EventTime": "2023-10-30T14:01:44.029010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.223.188.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.223.188.71 ", "ContentType": "text/plain"}], "uids": ["CtDedbmkns4PHzdVc"]} -{"Format": "IDEA0", "ID": "9922513c-afe8-4ab3-9f2a-b134b4a22bc6", "DetectTime": "2023-10-30T14:01:44.054977+02:00", "EventTime": "2023-10-30T14:01:44.054998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CrexIM1RYmWDtZiR7c"]} -{"Format": "IDEA0", "ID": "15a5eef9-4e7d-4ef9-95b8-0ee1c5100293", "DetectTime": "2023-10-30T14:01:44.077145+02:00", "EventTime": "2023-10-30T14:01:44.077171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.132.172.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.132.172.233 ", "ContentType": "text/plain"}], "uids": ["C9AJrZ2ss3gU8gJMX2"]} -{"Format": "IDEA0", "ID": "9932fbb4-e923-4e92-b859-ef5801b9728a", "DetectTime": "2023-10-30T14:01:44.095258+02:00", "EventTime": "2023-10-30T14:01:44.095275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.192.26.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.192.26.126 ", "ContentType": "text/plain"}], "uids": ["CJKo7h29x2fN4wckt6"]} -{"Format": "IDEA0", "ID": "bd2d601a-7105-42e7-a0ab-2f44f4d69c36", "DetectTime": "2023-10-30T14:01:44.114644+02:00", "EventTime": "2023-10-30T14:01:44.114663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.57.245.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.57.245.155 ", "ContentType": "text/plain"}], "uids": ["CJpEZJ2vT4Szb7BoD3"]} -{"Format": "IDEA0", "ID": "c64fd9e6-45ad-4716-b1bc-f2b762220e96", "DetectTime": "2023-10-30T14:01:44.137366+02:00", "EventTime": "2023-10-30T14:01:44.137391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["Cl4Ah133JPnuuNy0Ld"]} -{"Format": "IDEA0", "ID": "9405626d-9f2a-4829-ae72-e13da7dee218", "DetectTime": "2023-10-30T14:01:44.160094+02:00", "EventTime": "2023-10-30T14:01:44.160109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["CloqhCQqGG6OuwPO3"]} -{"Format": "IDEA0", "ID": "7a55e2ec-7a38-4a30-82d7-71274c5ed570", "DetectTime": "2023-10-30T14:01:44.181279+02:00", "EventTime": "2023-10-30T14:01:44.181296+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcVP837YkxncESL45"]} -{"Format": "IDEA0", "ID": "d798d210-e3d2-45f1-a6ba-45300b9c767f", "DetectTime": "2023-10-30T14:01:44.192795+02:00", "EventTime": "2023-10-30T14:01:44.192813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["Ct7lw62rcuWfvfxAdg"]} -{"Format": "IDEA0", "ID": "f535d307-5b9e-4e14-b2ce-14b33963992f", "DetectTime": "2023-10-30T14:01:44.214275+02:00", "EventTime": "2023-10-30T14:01:44.214286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.246.198.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.246.198.185 ", "ContentType": "text/plain"}], "uids": ["Cd2hYv1la2suN9pIP6"]} -{"Format": "IDEA0", "ID": "cbe3cb7d-8aeb-40e9-8173-9715b7b7b7b1", "DetectTime": "2023-10-30T14:01:44.231019+02:00", "EventTime": "2023-10-30T14:01:44.231035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["COGdeX2So95rMN7WQa"]} -{"Format": "IDEA0", "ID": "ce700290-a581-40b1-b759-ac1b641d2a69", "DetectTime": "2023-10-30T14:01:44.249917+02:00", "EventTime": "2023-10-30T14:01:44.249934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.42.7.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.42.7.227 ", "ContentType": "text/plain"}], "uids": ["C61Wf84xURANQg35Df"]} -{"Format": "IDEA0", "ID": "348a4d48-9131-412b-bb05-86e450001118", "DetectTime": "2023-10-30T14:01:44.269671+02:00", "EventTime": "2023-10-30T14:01:44.269688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.110.95.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.110.95.186 ", "ContentType": "text/plain"}], "uids": ["CyL41C4HoMWgTRiqL9"]} -{"Format": "IDEA0", "ID": "b6dc4e5a-b620-40ed-aec8-ca04a159f643", "DetectTime": "2023-10-30T14:01:44.289417+02:00", "EventTime": "2023-10-30T14:01:44.289436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["C0s5NF4fPbHw9ZUO5e"]} -{"Format": "IDEA0", "ID": "a95d5427-530d-4c10-a296-d81f039ac6a1", "DetectTime": "2023-10-30T14:01:44.307857+02:00", "EventTime": "2023-10-30T14:01:44.307869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.107.159.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.107.159.117 ", "ContentType": "text/plain"}], "uids": ["CIP1iY2R8ckNAQE6ya"]} -{"Format": "IDEA0", "ID": "162fb627-0f49-45f6-8aaa-517a3245a845", "DetectTime": "2023-10-30T14:01:44.331011+02:00", "EventTime": "2023-10-30T14:01:44.331030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.111.78.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.111.78.121 ", "ContentType": "text/plain"}], "uids": ["CItURl3noOJo14VXX9"]} -{"Format": "IDEA0", "ID": "444830bc-5cd0-48c9-840d-7893d7101cd0", "DetectTime": "2023-10-30T14:01:44.350376+02:00", "EventTime": "2023-10-30T14:01:44.350393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.190.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.190.82 ", "ContentType": "text/plain"}], "uids": ["C7X0xg1Gi9tu7UnUwl"]} -{"Format": "IDEA0", "ID": "52b11338-8b9c-486d-bddc-b6c0b4ecfb62", "DetectTime": "2023-10-30T14:01:44.366825+02:00", "EventTime": "2023-10-30T14:01:44.366839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.131.102.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.131.102.142 ", "ContentType": "text/plain"}], "uids": ["ChdekW2LMfuaeFRzK"]} -{"Format": "IDEA0", "ID": "8169c369-e9e9-4388-82b0-9b1250202b29", "DetectTime": "2023-10-30T14:01:44.385367+02:00", "EventTime": "2023-10-30T14:01:44.385379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.32.136.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.32.136.96 ", "ContentType": "text/plain"}], "uids": ["Csy2Tp4UtyngG93sc4"]} -{"Format": "IDEA0", "ID": "30089095-33f3-46aa-be46-1f094b5b46ed", "DetectTime": "2023-10-30T14:01:44.404061+02:00", "EventTime": "2023-10-30T14:01:44.404072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.8.70.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.8.70.38 ", "ContentType": "text/plain"}], "uids": ["C4gFtQh89uPAYwxL2"]} -{"Format": "IDEA0", "ID": "187d1cbf-b391-4d0a-a1c9-9e0097b2de4a", "DetectTime": "2023-10-30T14:01:44.422040+02:00", "EventTime": "2023-10-30T14:01:44.422057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.15.22.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.15.22.31 ", "ContentType": "text/plain"}], "uids": ["CxVldu3msgfZlJnb72"]} -{"Format": "IDEA0", "ID": "e1e94284-9121-41d6-b024-058ab02155e2", "DetectTime": "2023-10-30T14:01:44.439071+02:00", "EventTime": "2023-10-30T14:01:44.439085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.212.161.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.212.161.30 ", "ContentType": "text/plain"}], "uids": ["CstrrP100xfntExLIk"]} -{"Format": "IDEA0", "ID": "b561157d-4e2e-495f-90a8-5c6de614ea37", "DetectTime": "2023-10-30T14:01:44.457837+02:00", "EventTime": "2023-10-30T14:01:44.457847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.61.221.194 ", "ContentType": "text/plain"}], "uids": ["CsEEY64BxUEHI3jJh5"]} -{"Format": "IDEA0", "ID": "d87e42b1-a89c-4715-9ff4-17c42eba76f7", "DetectTime": "2023-10-30T14:01:44.473253+02:00", "EventTime": "2023-10-30T14:01:44.473268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["Cqb941FyJePdMnUx8"]} -{"Format": "IDEA0", "ID": "e336dc23-cb66-4390-903f-a48503283317", "DetectTime": "2023-10-30T14:01:44.494029+02:00", "EventTime": "2023-10-30T14:01:44.494046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.168.128.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.168.128.138 ", "ContentType": "text/plain"}], "uids": ["COaSZp4bY5wIqVioFk"]} -{"Format": "IDEA0", "ID": "b1ca23e3-09a8-4d95-87fa-cd5c29aa477d", "DetectTime": "2023-10-30T14:01:44.514190+02:00", "EventTime": "2023-10-30T14:01:44.514211+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCi2Z33o0BdpUpJaak"]} -{"Format": "IDEA0", "ID": "d53a3850-0796-4c5b-8095-bf9111153c5b", "DetectTime": "2023-10-30T14:01:44.524170+02:00", "EventTime": "2023-10-30T14:01:44.524181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.105.6.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.105.6.90 ", "ContentType": "text/plain"}], "uids": ["ClZlbo4H8yLUSgLJ5h"]} -{"Format": "IDEA0", "ID": "e31e20d0-fd57-42ef-995b-df695c0abc8f", "DetectTime": "2023-10-30T14:01:44.543302+02:00", "EventTime": "2023-10-30T14:01:44.543315+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CR3huo2Wt3kFUXDe9f"]} -{"Format": "IDEA0", "ID": "691d1917-50e8-4cf7-97f5-c794381af21b", "DetectTime": "2023-10-30T14:01:44.552168+02:00", "EventTime": "2023-10-30T14:01:44.552179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.59.178.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.59.178.147 ", "ContentType": "text/plain"}], "uids": ["CnfOd01MvYq2zEcjMd"]} -{"Format": "IDEA0", "ID": "40544330-fc64-40bc-87ea-a0f65d0c4ad8", "DetectTime": "2023-10-30T14:01:44.573955+02:00", "EventTime": "2023-10-30T14:01:44.573971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CCi2Z33o0BdpUpJaak", "C9R8vyOQAQPo8vloh", "CQOebAB8j5SKhXHx2", "CReM1cOIerbnIGxPf"]} -{"Format": "IDEA0", "ID": "b28b53e9-7a79-4b44-9d9a-3e8e63e88cd2", "DetectTime": "2023-10-30T14:01:44.583824+02:00", "EventTime": "2023-10-30T14:01:44.583840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["C0cAj534LynAXZHa61"]} -{"Format": "IDEA0", "ID": "3bb1ee15-c58e-4119-8e49-14b9f18441aa", "DetectTime": "2023-10-30T14:01:44.607755+02:00", "EventTime": "2023-10-30T14:01:44.607777+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9R8vyOQAQPo8vloh"]} -{"Format": "IDEA0", "ID": "0caee453-ddb6-4992-9d14-0f6864d05c12", "DetectTime": "2023-10-30T14:01:44.619646+02:00", "EventTime": "2023-10-30T14:01:44.619665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CBAKdA4nvpMVhkDmE3"]} -{"Format": "IDEA0", "ID": "1c4764ca-aabc-4d7b-9414-5abc4a5bfce6", "DetectTime": "2023-10-30T14:01:44.641842+02:00", "EventTime": "2023-10-30T14:01:44.641859+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPPUwv4YWgPNaeHpjf"]} -{"Format": "IDEA0", "ID": "cf003677-6857-4b9a-904e-d6389f3bb0f5", "DetectTime": "2023-10-30T14:01:44.650927+02:00", "EventTime": "2023-10-30T14:01:44.650953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.110.19.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.110.19.20 ", "ContentType": "text/plain"}], "uids": ["CV1Ost38Tg3KpeoMj5"]} -{"Format": "IDEA0", "ID": "035821cf-b301-4d94-9e48-8d300b54fc5d", "DetectTime": "2023-10-30T14:01:44.670820+02:00", "EventTime": "2023-10-30T14:01:44.670836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["CiJ1ln1uxgqnaUweab"]} -{"Format": "IDEA0", "ID": "72d96e9f-940b-4270-9757-2e5b37ba719f", "DetectTime": "2023-10-30T14:01:44.691899+02:00", "EventTime": "2023-10-30T14:01:44.691915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.88.76.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.88.76.155 ", "ContentType": "text/plain"}], "uids": ["CENfHR2gEHHCEC2sS5"]} -{"Format": "IDEA0", "ID": "0a686bad-a9c7-473a-90eb-ea364605a115", "DetectTime": "2023-10-30T14:01:44.713961+02:00", "EventTime": "2023-10-30T14:01:44.713972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CWxFItTw1TOodanM7"]} -{"Format": "IDEA0", "ID": "411ac0db-1475-4f8c-99b8-c7a00fe24872", "DetectTime": "2023-10-30T14:01:44.733676+02:00", "EventTime": "2023-10-30T14:01:44.733703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.207.189.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.207.189.134 ", "ContentType": "text/plain"}], "uids": ["CcGUY82bk5TkbjfNO8"]} -{"Format": "IDEA0", "ID": "06e4fe25-1ceb-4c1e-827c-0af44dda0008", "DetectTime": "2023-10-30T14:01:44.749242+02:00", "EventTime": "2023-10-30T14:01:44.749254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.58.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.58.134 ", "ContentType": "text/plain"}], "uids": ["CtEBl335UFdZSErTJ8"]} -{"Format": "IDEA0", "ID": "60300740-2312-4c14-8261-ff4071d014ba", "DetectTime": "2023-10-30T14:01:44.769647+02:00", "EventTime": "2023-10-30T14:01:44.769664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.250.18.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.250.18.93 ", "ContentType": "text/plain"}], "uids": ["CYbogidrEJbcpF5D6"]} -{"Format": "IDEA0", "ID": "7d28ab4f-3c7a-4e28-8aea-efbf9c4ca62a", "DetectTime": "2023-10-30T14:01:44.789608+02:00", "EventTime": "2023-10-30T14:01:44.789621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.193.80.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.193.80.102 ", "ContentType": "text/plain"}], "uids": ["Cq1tn22D8MeAl4cB2g"]} -{"Format": "IDEA0", "ID": "27808553-2645-4c9c-b622-a9e7b274c574", "DetectTime": "2023-10-30T14:01:44.809344+02:00", "EventTime": "2023-10-30T14:01:44.809366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.168.104.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.168.104.77 ", "ContentType": "text/plain"}], "uids": ["CI9jxW2g2dGIz8X77a"]} -{"Format": "IDEA0", "ID": "a684248f-57eb-47e5-b849-2df1bee13f0f", "DetectTime": "2023-10-30T14:01:44.831301+02:00", "EventTime": "2023-10-30T14:01:44.831327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.229.13.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.229.13.232 ", "ContentType": "text/plain"}], "uids": ["C2sJED4bUJCmXWBdu1"]} -{"Format": "IDEA0", "ID": "37eb2c32-4884-465c-ad86-8013607105fb", "DetectTime": "2023-10-30T14:01:44.852657+02:00", "EventTime": "2023-10-30T14:01:44.852674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.184.128.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.184.128.160 ", "ContentType": "text/plain"}], "uids": ["CHLo7M2YDm21KwWNxd"]} -{"Format": "IDEA0", "ID": "224bde58-6aff-47ad-bd1c-b77473c6965a", "DetectTime": "2023-10-30T14:01:44.876641+02:00", "EventTime": "2023-10-30T14:01:44.876664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CuKBzS1dPvQegi0ht2"]} -{"Format": "IDEA0", "ID": "bed161fd-e356-4d65-80c8-b4c0b9ff2dc0", "DetectTime": "2023-10-30T14:01:44.900636+02:00", "EventTime": "2023-10-30T14:01:44.900655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.76.103.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.76.103.170 ", "ContentType": "text/plain"}], "uids": ["Cs3hF646KnU5vDbBjg"]} -{"Format": "IDEA0", "ID": "4a3d8514-7b2b-4c47-815d-26d36c860b61", "DetectTime": "2023-10-30T14:01:44.924155+02:00", "EventTime": "2023-10-30T14:01:44.924171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.61.86.78 ", "ContentType": "text/plain"}], "uids": ["CZjMtO2HLsEi5d85Z4"]} -{"Format": "IDEA0", "ID": "69387e2d-b553-4712-bc70-23ab83d4019d", "DetectTime": "2023-10-30T14:01:44.947436+02:00", "EventTime": "2023-10-30T14:01:44.947450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.97.55 ", "ContentType": "text/plain"}], "uids": ["CrlugG1RUbeSuDGq3d"]} -{"Format": "IDEA0", "ID": "6bddf348-97f6-4c9e-9164-2edd266fe1af", "DetectTime": "2023-10-30T14:01:44.967053+02:00", "EventTime": "2023-10-30T14:01:44.967066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.220.133.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.220.133.254 ", "ContentType": "text/plain"}], "uids": ["CEa42u1RP2tHCfNxwg"]} -{"Format": "IDEA0", "ID": "25cf8399-49ac-458c-adf6-f84d246bbf43", "DetectTime": "2023-10-30T14:01:45.097275+02:00", "EventTime": "2023-10-30T14:01:45.097309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["Cy0T1EOtUS0z1ahKe"]} -{"Format": "IDEA0", "ID": "15d2979f-5149-44fc-9df2-b17f2cba8064", "DetectTime": "2023-10-30T14:01:45.119115+02:00", "EventTime": "2023-10-30T14:01:45.119135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.15.173.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.15.173.122 ", "ContentType": "text/plain"}], "uids": ["CXTiQF1tpBke3E5lV3"]} -{"Format": "IDEA0", "ID": "f8c0a96a-cfde-4978-a7df-b33fcd6f4844", "DetectTime": "2023-10-30T14:01:45.142521+02:00", "EventTime": "2023-10-30T14:01:45.142536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.134.148.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.134.148.46 ", "ContentType": "text/plain"}], "uids": ["ClpFFcfhN3go9KHv3"]} -{"Format": "IDEA0", "ID": "a0d12e4b-0a86-4d15-a75e-9feffc3c0cd4", "DetectTime": "2023-10-30T14:01:45.164450+02:00", "EventTime": "2023-10-30T14:01:45.164466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CU9g9F2UQeGcPgX0y8"]} -{"Format": "IDEA0", "ID": "f06d9269-7b78-4773-adb6-ec3a5759f74d", "DetectTime": "2023-10-30T14:01:45.183994+02:00", "EventTime": "2023-10-30T14:01:45.184009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.32.95.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.32.95.225 ", "ContentType": "text/plain"}], "uids": ["C80fNe35fywL0mkRlh"]} -{"Format": "IDEA0", "ID": "f2068702-bca7-4fc3-8e58-176b7f211024", "DetectTime": "2023-10-30T14:01:45.207314+02:00", "EventTime": "2023-10-30T14:01:45.207331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.229.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.229.42 ", "ContentType": "text/plain"}], "uids": ["ClCuHO1JFLfK83l25"]} -{"Format": "IDEA0", "ID": "7361496a-f8c2-4b75-8414-e6bc44f5af35", "DetectTime": "2023-10-30T14:01:45.232026+02:00", "EventTime": "2023-10-30T14:01:45.232041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.204.139.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.204.139.14 ", "ContentType": "text/plain"}], "uids": ["CaCgN93yLRQ5NYjii9"]} -{"Format": "IDEA0", "ID": "ca049b68-7462-4cd4-b7d5-0e134ee31daf", "DetectTime": "2023-10-30T14:01:45.254839+02:00", "EventTime": "2023-10-30T14:01:45.254856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CBHhPG1nsfCVr08tG9"]} -{"Format": "IDEA0", "ID": "5ef886f7-ad9f-441b-8e37-c3dacca5e795", "DetectTime": "2023-10-30T14:01:45.291793+02:00", "EventTime": "2023-10-30T14:01:45.291810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.143.72.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.143.72.15 ", "ContentType": "text/plain"}], "uids": ["CHVyo51BXPtMUDgUo1"]} -{"Format": "IDEA0", "ID": "5961bf09-3ca4-488f-bc18-cbd859e8b85f", "DetectTime": "2023-10-30T14:01:45.319446+02:00", "EventTime": "2023-10-30T14:01:45.319464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.108.40.143 ", "ContentType": "text/plain"}], "uids": ["C9xqLy4g8m2TgF4UE5"]} -{"Format": "IDEA0", "ID": "cc339012-fe77-4f14-9aa7-0839949599b5", "DetectTime": "2023-10-30T14:01:45.340862+02:00", "EventTime": "2023-10-30T14:01:45.340879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CLO7hHyUZq2iKqWk5"]} -{"Format": "IDEA0", "ID": "094d7e2f-e004-4e21-8270-e08ed67ae1a3", "DetectTime": "2023-10-30T14:01:45.362637+02:00", "EventTime": "2023-10-30T14:01:45.362659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.222.233.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.222.233.238 ", "ContentType": "text/plain"}], "uids": ["C8VjuE2qlj0TOZIGw6"]} -{"Format": "IDEA0", "ID": "cfd22a76-9267-4eed-bf65-b7297a2d0837", "DetectTime": "2023-10-30T14:01:45.383806+02:00", "EventTime": "2023-10-30T14:01:45.383822+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBcFTp2TZ3uDGMxTad"]} -{"Format": "IDEA0", "ID": "8aa9550c-d857-44ed-ae51-9990ef275771", "DetectTime": "2023-10-30T14:01:45.392405+02:00", "EventTime": "2023-10-30T14:01:45.392419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CdEjO33kabcT4G10aa"]} -{"Format": "IDEA0", "ID": "fb3ae83a-53bf-4723-bca9-4ef08cedeb67", "DetectTime": "2023-10-30T14:01:45.416212+02:00", "EventTime": "2023-10-30T14:01:45.416230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.174.70.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.174.70.176 ", "ContentType": "text/plain"}], "uids": ["CyGwCG262lxsgkcPDf"]} -{"Format": "IDEA0", "ID": "28538872-f237-4858-af56-647c9e0008c2", "DetectTime": "2023-10-30T14:01:45.440583+02:00", "EventTime": "2023-10-30T14:01:45.440599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.187.205.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.187.205.230 ", "ContentType": "text/plain"}], "uids": ["Cyg4164vVJyYN73dI8"]} -{"Format": "IDEA0", "ID": "1ad24903-729c-4195-96be-23ebb9574b08", "DetectTime": "2023-10-30T14:01:45.465755+02:00", "EventTime": "2023-10-30T14:01:45.465774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["204.76.196.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 204.76.196.114 ", "ContentType": "text/plain"}], "uids": ["Cp5uQl4V1pKLnnLdLg"]} -{"Format": "IDEA0", "ID": "2d798389-aba7-498d-8f9b-ae9e866961a9", "DetectTime": "2023-10-30T14:01:45.486379+02:00", "EventTime": "2023-10-30T14:01:45.486395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["Cefvg930X4WZlfIgTg"]} -{"Format": "IDEA0", "ID": "694df0f2-90ff-4a39-bbb9-699a376c37f6", "DetectTime": "2023-10-30T14:01:45.507258+02:00", "EventTime": "2023-10-30T14:01:45.507275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.132.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.132.202 ", "ContentType": "text/plain"}], "uids": ["CsSNTidecJLs90Ncg"]} -{"Format": "IDEA0", "ID": "c025f56a-4c27-4aa3-8c79-65284aa47c01", "DetectTime": "2023-10-30T14:01:45.529735+02:00", "EventTime": "2023-10-30T14:01:45.529752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.36.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.152.36.73 ", "ContentType": "text/plain"}], "uids": ["Cw30rI258snJlU0PJj"]} -{"Format": "IDEA0", "ID": "af530ba3-46de-42d5-ab10-15ca49cb282c", "DetectTime": "2023-10-30T14:01:45.549772+02:00", "EventTime": "2023-10-30T14:01:45.549790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.89.170.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.89.170.4 ", "ContentType": "text/plain"}], "uids": ["CQSuSC21T0QF6NzDgc"]} -{"Format": "IDEA0", "ID": "1bb23149-6d24-4f0d-a4ce-06b9bf30fd57", "DetectTime": "2023-10-30T14:01:45.571987+02:00", "EventTime": "2023-10-30T14:01:45.572005+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2gTro4PmMfPY9Lk1b"]} -{"Format": "IDEA0", "ID": "16237c02-6fd5-4ff9-8092-5e19faf0fde2", "DetectTime": "2023-10-30T14:01:45.582900+02:00", "EventTime": "2023-10-30T14:01:45.582926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["207.86.132.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 207.86.132.170 ", "ContentType": "text/plain"}], "uids": ["CijOHw4T9fGGJbV1Gd"]} -{"Format": "IDEA0", "ID": "2c1f88f0-dc92-4b35-aa3a-089615055aca", "DetectTime": "2023-10-30T14:01:45.606182+02:00", "EventTime": "2023-10-30T14:01:45.606199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.62.100.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.62.100.247 ", "ContentType": "text/plain"}], "uids": ["CCkfVt41omfQ6UAzW1"]} -{"Format": "IDEA0", "ID": "432a16b2-52a1-45c0-9edd-cb35a5413b4b", "DetectTime": "2023-10-30T14:01:45.627796+02:00", "EventTime": "2023-10-30T14:01:45.627814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["CDR28BRx1q6Y4jPM9"]} -{"Format": "IDEA0", "ID": "2e91406d-1bde-4d04-9cae-7e519cd04671", "DetectTime": "2023-10-30T14:01:45.652850+02:00", "EventTime": "2023-10-30T14:01:45.652865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.25.212.195 ", "ContentType": "text/plain"}], "uids": ["CkeFje2lEbVqKqknc4"]} -{"Format": "IDEA0", "ID": "d80b8e87-94d6-4542-ab54-0289c16467fe", "DetectTime": "2023-10-30T14:01:45.677329+02:00", "EventTime": "2023-10-30T14:01:45.677350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.134.25.43"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.134.25.43 ", "ContentType": "text/plain"}], "uids": ["CVf8Dcus5pkbfGeWi"]} -{"Format": "IDEA0", "ID": "610d5f73-e14f-46c5-b1b0-8f6aac18d1ba", "DetectTime": "2023-10-30T14:01:45.697374+02:00", "EventTime": "2023-10-30T14:01:45.697392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["61.83.99.123"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 61.83.99.123 ", "ContentType": "text/plain"}], "uids": ["Cy1Zjd1eMV2lnKfkFi"]} -{"Format": "IDEA0", "ID": "501c8515-8712-42cc-ac8e-2f6418f1e8fe", "DetectTime": "2023-10-30T14:01:45.717583+02:00", "EventTime": "2023-10-30T14:01:45.717599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.14.232.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.14.232.12 ", "ContentType": "text/plain"}], "uids": ["C0DBjh2UeLnsp5EqQ9"]} -{"Format": "IDEA0", "ID": "f31fa650-5857-49dc-9f19-a242351129c8", "DetectTime": "2023-10-30T14:01:45.740856+02:00", "EventTime": "2023-10-30T14:01:45.740872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.151.117.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.151.117.97 ", "ContentType": "text/plain"}], "uids": ["CH2U7K1NzOThGg4jgc"]} -{"Format": "IDEA0", "ID": "36211265-979a-4183-837a-38bc96c58999", "DetectTime": "2023-10-30T14:01:45.765227+02:00", "EventTime": "2023-10-30T14:01:45.765258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.178.136.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.178.136.244 ", "ContentType": "text/plain"}], "uids": ["Ch05Ti2BTjVyEIrYUg"]} -{"Format": "IDEA0", "ID": "f5ab66be-6208-4e84-8d38-c35f3c4799de", "DetectTime": "2023-10-30T14:01:45.785739+02:00", "EventTime": "2023-10-30T14:01:45.785760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.127.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.127.103 ", "ContentType": "text/plain"}], "uids": ["C3ulth3edXUewIfJMg"]} -{"Format": "IDEA0", "ID": "dbd824c8-fdb1-4606-9c4a-740f7bb6a443", "DetectTime": "2023-10-30T14:01:45.807691+02:00", "EventTime": "2023-10-30T14:01:45.807707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["111.118.248.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 111.118.248.126 ", "ContentType": "text/plain"}], "uids": ["CTYNmx3dSpQZfogvF5"]} -{"Format": "IDEA0", "ID": "bc29562d-a763-4326-b91f-d6100ae5a69a", "DetectTime": "2023-10-30T14:01:45.828667+02:00", "EventTime": "2023-10-30T14:01:45.828684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.95.174.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.95.174.120 ", "ContentType": "text/plain"}], "uids": ["CtsERg2mKERCtmhjk5"]} -{"Format": "IDEA0", "ID": "f3b282d3-053a-41fa-9d92-7b78e9e6d282", "DetectTime": "2023-10-30T14:01:45.851256+02:00", "EventTime": "2023-10-30T14:01:45.851270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.134.36.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.134.36.148 ", "ContentType": "text/plain"}], "uids": ["CVC6NP2zVT4neUEt84"]} -{"Format": "IDEA0", "ID": "7f60817d-e817-4e87-8bf1-1ba82bb6c02f", "DetectTime": "2023-10-30T14:01:45.872149+02:00", "EventTime": "2023-10-30T14:01:45.872168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.229.208.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.229.208.221 ", "ContentType": "text/plain"}], "uids": ["Cx9Nky3aJpjjC6Y625"]} -{"Format": "IDEA0", "ID": "3687f85d-2ced-43ea-9909-42d05937c793", "DetectTime": "2023-10-30T14:01:45.898286+02:00", "EventTime": "2023-10-30T14:01:45.898307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.54.0.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.54.0.76 ", "ContentType": "text/plain"}], "uids": ["CD2Vaf2Iybgobg5Mwl"]} -{"Format": "IDEA0", "ID": "e469ac19-c9dd-4576-b382-ca9edfc9168a", "DetectTime": "2023-10-30T14:01:45.919915+02:00", "EventTime": "2023-10-30T14:01:45.919932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.228.253.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.228.253.216 ", "ContentType": "text/plain"}], "uids": ["CetmXX3DvqJCpa4m4e"]} -{"Format": "IDEA0", "ID": "7b2c512a-9385-4f79-96c7-bba942a8dc01", "DetectTime": "2023-10-30T14:01:45.944948+02:00", "EventTime": "2023-10-30T14:01:45.944972+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBqlvS3UgB2QZ0yPa"]} -{"Format": "IDEA0", "ID": "7e4f0de1-a792-4233-b606-5d7af5ecd667", "DetectTime": "2023-10-30T14:01:45.955512+02:00", "EventTime": "2023-10-30T14:01:45.955528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.160.175.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.160.175.150 ", "ContentType": "text/plain"}], "uids": ["CQwn9T10PrvcvXvgpd"]} -{"Format": "IDEA0", "ID": "74150f99-3c8d-4ecf-8d20-f6c4c0e267f4", "DetectTime": "2023-10-30T14:01:45.977136+02:00", "EventTime": "2023-10-30T14:01:45.977152+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cj1CaR2AyGt7L0lP5l"]} -{"Format": "IDEA0", "ID": "dd5eedff-db5b-498b-9449-f031ee9b4424", "DetectTime": "2023-10-30T14:01:45.986927+02:00", "EventTime": "2023-10-30T14:01:45.986944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.188.50 ", "ContentType": "text/plain"}], "uids": ["CYInFH2KGSp5o5qZb8"]} -{"Format": "IDEA0", "ID": "24865dca-2db1-49a1-9800-7b7365216be7", "DetectTime": "2023-10-30T14:01:46.012129+02:00", "EventTime": "2023-10-30T14:01:46.012151+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cg0ECZ2BWylSqbe2kg"]} -{"Format": "IDEA0", "ID": "8b56bb39-9547-4dba-b862-e4c21acc8245", "DetectTime": "2023-10-30T14:01:46.021289+02:00", "EventTime": "2023-10-30T14:01:46.021305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.240.108.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.240.108.7 ", "ContentType": "text/plain"}], "uids": ["Cfp6vLaCy70gaVe9"]} -{"Format": "IDEA0", "ID": "c20c8a4b-af1c-4542-b5b3-a7d60078f6bc", "DetectTime": "2023-10-30T14:01:46.047677+02:00", "EventTime": "2023-10-30T14:01:46.047693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.110.162.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.110.162.193 ", "ContentType": "text/plain"}], "uids": ["CtQ9sW1zJkSOMoB6cl"]} -{"Format": "IDEA0", "ID": "0db3363a-537b-4760-a858-8d766c63c13a", "DetectTime": "2023-10-30T14:01:46.068041+02:00", "EventTime": "2023-10-30T14:01:46.068064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.35.208"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.35.208 ", "ContentType": "text/plain"}], "uids": ["C3B8Ek2P7tVozsIb16"]} -{"Format": "IDEA0", "ID": "059eb7ce-f8ad-4c1d-865a-04f3dca87a83", "DetectTime": "2023-10-30T14:01:46.091011+02:00", "EventTime": "2023-10-30T14:01:46.091033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.152.133.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.152.133.137 ", "ContentType": "text/plain"}], "uids": ["CQDPki1hLFcIPzxLC1"]} -{"Format": "IDEA0", "ID": "976fc04f-cfe9-4282-8ef7-844ce7a4582f", "DetectTime": "2023-10-30T14:01:46.115155+02:00", "EventTime": "2023-10-30T14:01:46.115173+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTqqw52TPpIplAnHDe"]} -{"Format": "IDEA0", "ID": "cc61ab71-8754-4a6a-bcc1-0dcdf29a27fc", "DetectTime": "2023-10-30T14:01:46.124748+02:00", "EventTime": "2023-10-30T14:01:46.124764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.193.78.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.193.78.226 ", "ContentType": "text/plain"}], "uids": ["C2HSIX3QqpAOJrjYP6"]} -{"Format": "IDEA0", "ID": "d45225fe-adca-454d-9c04-21f4afec5e7e", "DetectTime": "2023-10-30T14:01:46.147789+02:00", "EventTime": "2023-10-30T14:01:46.147806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.70.165.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.70.165.37 ", "ContentType": "text/plain"}], "uids": ["CP4wqu4A5Fz3jfC0qh"]} -{"Format": "IDEA0", "ID": "79c34df1-86c7-4014-aa0f-a438012c0749", "DetectTime": "2023-10-30T14:01:46.170830+02:00", "EventTime": "2023-10-30T14:01:46.170847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.190.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.190.199 ", "ContentType": "text/plain"}], "uids": ["CvhuP14kX28dvKslrj"]} -{"Format": "IDEA0", "ID": "7714d358-8087-4bd3-9fbf-cfd0f4472763", "DetectTime": "2023-10-30T14:01:46.192536+02:00", "EventTime": "2023-10-30T14:01:46.192552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.248.253.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.248.253.118 ", "ContentType": "text/plain"}], "uids": ["CZwCQ42epYD1qBk7f9"]} -{"Format": "IDEA0", "ID": "13acfe12-a60f-407e-b0ac-73a02641dc65", "DetectTime": "2023-10-30T14:01:46.219111+02:00", "EventTime": "2023-10-30T14:01:46.219128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.236.50.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.236.50.134 ", "ContentType": "text/plain"}], "uids": ["ChZ7Jp1zsweqaXvB2c"]} -{"Format": "IDEA0", "ID": "5d948cc8-a027-4f2a-a0eb-e280dceaf35e", "DetectTime": "2023-10-30T14:01:46.241613+02:00", "EventTime": "2023-10-30T14:01:46.241626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cg0ECZ2BWylSqbe2kg", "CN87BO3a2e7FF1ecAe", "CBqlvS3UgB2QZ0yPa", "CBcFTp2TZ3uDGMxTad"]} -{"Format": "IDEA0", "ID": "92a1d67e-fbde-4777-a03f-06f4d07aea4d", "DetectTime": "2023-10-30T14:01:46.251939+02:00", "EventTime": "2023-10-30T14:01:46.251962+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CN87BO3a2e7FF1ecAe"]} -{"Format": "IDEA0", "ID": "daf1d9cf-0134-45b5-a772-027fd0c897c0", "DetectTime": "2023-10-30T14:01:46.264147+02:00", "EventTime": "2023-10-30T14:01:46.264168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.218.94.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.218.94.160 ", "ContentType": "text/plain"}], "uids": ["CNcicU2NG2WSWVYAt3"]} -{"Format": "IDEA0", "ID": "9add7af2-99b5-439c-ace3-da7095fbabeb", "DetectTime": "2023-10-30T14:01:46.286724+02:00", "EventTime": "2023-10-30T14:01:46.286740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.57.12.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.57.12.144 ", "ContentType": "text/plain"}], "uids": ["Ctumqc1o91uj9j7Rf1"]} -{"Format": "IDEA0", "ID": "963740f7-19f8-4b1b-a141-4e06e4e045e0", "DetectTime": "2023-10-30T14:01:46.313063+02:00", "EventTime": "2023-10-30T14:01:46.313084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.101.27.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.101.27.15 ", "ContentType": "text/plain"}], "uids": ["CibUVW3GTel9ceIAab"]} -{"Format": "IDEA0", "ID": "bb7d7139-34e3-40e8-9734-0006ef9fe163", "DetectTime": "2023-10-30T14:01:46.337058+02:00", "EventTime": "2023-10-30T14:01:46.337082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.73.4.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.73.4.190 ", "ContentType": "text/plain"}], "uids": ["C8nohIlWYXeeDFO6g"]} -{"Format": "IDEA0", "ID": "985381ab-26eb-4b96-a96b-ca8381b59a8e", "DetectTime": "2023-10-30T14:01:46.364136+02:00", "EventTime": "2023-10-30T14:01:46.364156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.185.232.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.185.232.67 ", "ContentType": "text/plain"}], "uids": ["CkZHMLOlxvqXMLScf"]} -{"Format": "IDEA0", "ID": "b6776a0e-10aa-462a-940c-1c335fbbb697", "DetectTime": "2023-10-30T14:01:46.385586+02:00", "EventTime": "2023-10-30T14:01:46.385602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.252.47.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.252.47.213 ", "ContentType": "text/plain"}], "uids": ["CqQPHcGJQYJ7Wpzok"]} -{"Format": "IDEA0", "ID": "5de99da4-52cc-4039-ac35-7d7826208ec9", "DetectTime": "2023-10-30T14:01:46.408355+02:00", "EventTime": "2023-10-30T14:01:46.408371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.180.20.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.180.20.214 ", "ContentType": "text/plain"}], "uids": ["CTlVUL2bbEwyD3TxM"]} -{"Format": "IDEA0", "ID": "d72906a4-944d-41a9-9d62-428ecd7d8405", "DetectTime": "2023-10-30T14:01:46.432162+02:00", "EventTime": "2023-10-30T14:01:46.432180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.195.133.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.195.133.216 ", "ContentType": "text/plain"}], "uids": ["CYjJGo28oE0sezJqd2"]} -{"Format": "IDEA0", "ID": "0369be3d-00c0-429b-880b-0b5e6a87a752", "DetectTime": "2023-10-30T14:01:46.454859+02:00", "EventTime": "2023-10-30T14:01:46.454872+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1xmfP3SyeA0N3UFte"]} -{"Format": "IDEA0", "ID": "57d92806-ad06-4a25-bec2-1179921fd409", "DetectTime": "2023-10-30T14:01:46.464964+02:00", "EventTime": "2023-10-30T14:01:46.464981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CDyhoX3ybDxmA3mtQc"]} -{"Format": "IDEA0", "ID": "34eb131c-14fa-4aed-9bf0-2073c9f95b5b", "DetectTime": "2023-10-30T14:01:46.488074+02:00", "EventTime": "2023-10-30T14:01:46.488093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.59.53.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.59.53.144 ", "ContentType": "text/plain"}], "uids": ["CYciBD21dHyRVVS6be"]} -{"Format": "IDEA0", "ID": "9f29f866-ce40-4228-97e5-8b4ee907c296", "DetectTime": "2023-10-30T14:01:46.512966+02:00", "EventTime": "2023-10-30T14:01:46.512982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.235.201"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.235.201 ", "ContentType": "text/plain"}], "uids": ["CeccnJ2wXUU8uEeFa2"]} -{"Format": "IDEA0", "ID": "adecc946-f27b-4b60-bb99-8abc50657f0f", "DetectTime": "2023-10-30T14:01:46.536065+02:00", "EventTime": "2023-10-30T14:01:46.536082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["208.29.231.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 208.29.231.98 ", "ContentType": "text/plain"}], "uids": ["CGSFON3nRHegQx31G7"]} -{"Format": "IDEA0", "ID": "df0f39c1-c4bb-4a6c-a9d3-4511c83848d0", "DetectTime": "2023-10-30T14:01:46.558371+02:00", "EventTime": "2023-10-30T14:01:46.558393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.65.185.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.65.185.173 ", "ContentType": "text/plain"}], "uids": ["CCvBFT3KuEPC9d201l"]} -{"Format": "IDEA0", "ID": "e3bc09a0-80ff-4e41-afd3-e03206c5ff02", "DetectTime": "2023-10-30T14:01:46.581886+02:00", "EventTime": "2023-10-30T14:01:46.581906+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJW7MS2cRiPzluiCb6"]} -{"Format": "IDEA0", "ID": "1bc472ce-f79c-49d2-bb2c-f8fa7ad22cb4", "DetectTime": "2023-10-30T14:01:46.592425+02:00", "EventTime": "2023-10-30T14:01:46.592444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.254.84.17 ", "ContentType": "text/plain"}], "uids": ["C1Vjy54LCTmZ1H3at9"]} -{"Format": "IDEA0", "ID": "4239d626-3c52-4671-ae0b-79e49c7aab52", "DetectTime": "2023-10-30T14:01:46.617985+02:00", "EventTime": "2023-10-30T14:01:46.618007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.38.247.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.38.247.71 ", "ContentType": "text/plain"}], "uids": ["Cfpo1k2MqnPeF6Sku2"]} -{"Format": "IDEA0", "ID": "ec568a39-d92f-401f-9e9f-585d3a677904", "DetectTime": "2023-10-30T14:01:46.643566+02:00", "EventTime": "2023-10-30T14:01:46.643583+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDHwXz25hKybomxfW9"]} -{"Format": "IDEA0", "ID": "112626f1-9a37-475d-bdf3-b26cbbf16c1e", "DetectTime": "2023-10-30T14:01:46.654139+02:00", "EventTime": "2023-10-30T14:01:46.654156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.144 ", "ContentType": "text/plain"}], "uids": ["CSCUMZ2VjchS9W26W9"]} -{"Format": "IDEA0", "ID": "cedd420a-252d-4fb5-b8df-ef64e633ddaa", "DetectTime": "2023-10-30T14:01:46.675520+02:00", "EventTime": "2023-10-30T14:01:46.675537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.140.158.40 ", "ContentType": "text/plain"}], "uids": ["CdXWup1SS7qA0Sk6ih"]} -{"Format": "IDEA0", "ID": "5bfe20b4-b28c-465a-a685-63894a0ab42d", "DetectTime": "2023-10-30T14:01:46.695340+02:00", "EventTime": "2023-10-30T14:01:46.695355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.22.180.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.22.180.9 ", "ContentType": "text/plain"}], "uids": ["Cz3QE04ROaEem8rqN6"]} -{"Format": "IDEA0", "ID": "f3df30eb-bcfb-4363-8775-062a0275c103", "DetectTime": "2023-10-30T14:01:46.720344+02:00", "EventTime": "2023-10-30T14:01:46.720363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CDkq5M2o2KHaZ1Yj6g"]} -{"Format": "IDEA0", "ID": "003fb958-35a7-44ca-9152-58f6e1afc7df", "DetectTime": "2023-10-30T14:01:46.742497+02:00", "EventTime": "2023-10-30T14:01:46.742515+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUBwOu1AFOqfrKd3tb"]} -{"Format": "IDEA0", "ID": "d7a4ac64-d286-4a4b-bdf4-9fb53815fbe9", "DetectTime": "2023-10-30T14:01:46.752171+02:00", "EventTime": "2023-10-30T14:01:46.752187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.109.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.109.9 ", "ContentType": "text/plain"}], "uids": ["CFTXh84MA4j8Lq6bXk"]} -{"Format": "IDEA0", "ID": "0bf682ef-0eeb-41b1-a38b-7199c36c5ea0", "DetectTime": "2023-10-30T14:01:46.770845+02:00", "EventTime": "2023-10-30T14:01:46.770861+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9gjnp2ul78Lczyaei"]} -{"Format": "IDEA0", "ID": "0b732232-ac24-48c2-a8d3-a4849440b875", "DetectTime": "2023-10-30T14:01:46.779030+02:00", "EventTime": "2023-10-30T14:01:46.779047+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cpz8mC4leZeOnzBH3c"]} -{"Format": "IDEA0", "ID": "a05bf16b-6960-4fd5-b70a-55063f4070d5", "DetectTime": "2023-10-30T14:01:46.788815+02:00", "EventTime": "2023-10-30T14:01:46.788831+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqW0bu1qqAJB0eOsg2"]} -{"Format": "IDEA0", "ID": "ea6f1130-f50d-4cad-a88e-3900162e87f1", "DetectTime": "2023-10-30T14:01:46.800759+02:00", "EventTime": "2023-10-30T14:01:46.800780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZcaV1E9NBnpt8aJ7"]} -{"Format": "IDEA0", "ID": "30912113-df64-4d43-baa0-c392efd53350", "DetectTime": "2023-10-30T14:01:46.818605+02:00", "EventTime": "2023-10-30T14:01:46.818616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CUBwOu1AFOqfrKd3tb", "Cpz8mC4leZeOnzBH3c", "CJW7MS2cRiPzluiCb6", "ChMM4cbOjQqdrsuh9"]} -{"Format": "IDEA0", "ID": "7409f539-d943-48ee-8c44-d4044b712ccf", "DetectTime": "2023-10-30T14:01:46.827085+02:00", "EventTime": "2023-10-30T14:01:46.827098+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChMM4cbOjQqdrsuh9"]} -{"Format": "IDEA0", "ID": "79e9b2a1-093f-49a2-8135-ca50bccc7270", "DetectTime": "2023-10-30T14:01:46.837419+02:00", "EventTime": "2023-10-30T14:01:46.837434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["Cc2dy61UYYKDEOwVn"]} -{"Format": "IDEA0", "ID": "700f9512-7595-4f67-acac-e002a87f8d95", "DetectTime": "2023-10-30T14:01:46.869442+02:00", "EventTime": "2023-10-30T14:01:46.869458+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQ4rNn1pTyRNLKBrE"]} -{"Format": "IDEA0", "ID": "f438d04b-53c1-407c-8d3f-7c2427a75678", "DetectTime": "2023-10-30T14:01:46.880814+02:00", "EventTime": "2023-10-30T14:01:46.880827+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFPD9C42VO4wxrdwOc"]} -{"Format": "IDEA0", "ID": "4a932570-db7f-4ccd-874a-16520d13e59d", "DetectTime": "2023-10-30T14:01:46.892237+02:00", "EventTime": "2023-10-30T14:01:46.892258+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cs7bf02BQzRhr69Lj5"]} -{"Format": "IDEA0", "ID": "d92b549f-9c32-4000-9184-39339fa21c0f", "DetectTime": "2023-10-30T14:01:46.903706+02:00", "EventTime": "2023-10-30T14:01:46.903732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CZnEWx2E4Kr9vQu9jh"]} -{"Format": "IDEA0", "ID": "dd361ac5-0950-47cc-9d36-ad4b0d8a8df1", "DetectTime": "2023-10-30T14:01:46.932680+02:00", "EventTime": "2023-10-30T14:01:46.932692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CM5Ti54Mx3BI37qIZ1"]} -{"Format": "IDEA0", "ID": "9ba4839e-9cb8-4bd5-ade7-bfee238eeb5c", "DetectTime": "2023-10-30T14:01:46.962056+02:00", "EventTime": "2023-10-30T14:01:46.962073+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxL9oM1dO2QNeiMBkh"]} -{"Format": "IDEA0", "ID": "075c053e-a946-49c4-8f64-152f94b71a54", "DetectTime": "2023-10-30T14:01:46.972291+02:00", "EventTime": "2023-10-30T14:01:46.972308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMaHgr4g51AOLPdpke"]} -{"Format": "IDEA0", "ID": "ef781f73-2d44-451d-8b5f-37bc1f72d62a", "DetectTime": "2023-10-30T14:01:46.981719+02:00", "EventTime": "2023-10-30T14:01:46.981736+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8V9C842280vRhkyW4"]} -{"Format": "IDEA0", "ID": "1d3ba33b-49a9-40cd-9758-74992c21fb40", "DetectTime": "2023-10-30T14:01:46.990400+02:00", "EventTime": "2023-10-30T14:01:46.990416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.61.221.194 ", "ContentType": "text/plain"}], "uids": ["CzHGew4eC9CAeR8Tqj"]} -{"Format": "IDEA0", "ID": "a245bf40-10d0-428e-a494-6593d622244d", "DetectTime": "2023-10-30T14:01:47.017303+02:00", "EventTime": "2023-10-30T14:01:47.017322+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiDadkAeGJ9XZaOvb"]} -{"Format": "IDEA0", "ID": "10eb6ac5-1a09-4e24-ab84-a17d0f9e4bab", "DetectTime": "2023-10-30T14:01:47.026014+02:00", "EventTime": "2023-10-30T14:01:47.026033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C2yZ7O371ZT5YX3bv7"]} -{"Format": "IDEA0", "ID": "16442d47-160a-434b-9f58-828b4ca097e0", "DetectTime": "2023-10-30T14:01:47.055313+02:00", "EventTime": "2023-10-30T14:01:47.055335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CoHKFI2kBnuN9Lmpy5"]} -{"Format": "IDEA0", "ID": "7c223df5-4c26-4663-900f-09bd3e63989d", "DetectTime": "2023-10-30T14:01:47.088370+02:00", "EventTime": "2023-10-30T14:01:47.088387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2vLG29bAQsLnJul9", "CxL9oM1dO2QNeiMBkh", "C8V9C842280vRhkyW4", "CFPD9C42VO4wxrdwOc"]} -{"Format": "IDEA0", "ID": "6b47e73e-3ac1-4f63-b3b7-65b1bc8d0d77", "DetectTime": "2023-10-30T14:01:47.099813+02:00", "EventTime": "2023-10-30T14:01:47.099838+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2vLG29bAQsLnJul9"]} -{"Format": "IDEA0", "ID": "f0bfa45c-6570-4d2c-ab80-21a01ebf821a", "DetectTime": "2023-10-30T14:01:47.110123+02:00", "EventTime": "2023-10-30T14:01:47.110135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CJ2BcE14S7Xz2txIPj"]} -{"Format": "IDEA0", "ID": "e5e94589-d6d0-4cbf-8aa4-2d3980ffe4fa", "DetectTime": "2023-10-30T14:01:47.143255+02:00", "EventTime": "2023-10-30T14:01:47.143272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CL5h0v1Dxcvga2tSJe"]} -{"Format": "IDEA0", "ID": "49e97423-db2c-4b26-b5a2-5182f54860f5", "DetectTime": "2023-10-30T14:01:47.175027+02:00", "EventTime": "2023-10-30T14:01:47.175044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CJZgzs4tfGdUn6pTW"]} -{"Format": "IDEA0", "ID": "81c1239a-9668-4013-a598-5e77c17b8ac8", "DetectTime": "2023-10-30T14:01:47.200472+02:00", "EventTime": "2023-10-30T14:01:47.200484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CtMFX11rhBEWyEw1I8"]} -{"Format": "IDEA0", "ID": "2f7dfc47-bd0b-42f5-84f2-4d7333747eed", "DetectTime": "2023-10-30T14:01:47.232221+02:00", "EventTime": "2023-10-30T14:01:47.232237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CFisTAbJA1HZ5syB2"]} -{"Format": "IDEA0", "ID": "dad5fee5-7724-4ed7-9297-44ccce0d1d15", "DetectTime": "2023-10-30T14:01:47.258530+02:00", "EventTime": "2023-10-30T14:01:47.258546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CrslAQ3gVV1L45cbSj"]} -{"Format": "IDEA0", "ID": "12f6eed8-1839-4c35-a9d7-567b122c7d80", "DetectTime": "2023-10-30T14:01:47.289104+02:00", "EventTime": "2023-10-30T14:01:47.289121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CIlmR84QOOaE7LKQxb"]} -{"Format": "IDEA0", "ID": "36c3dbca-9dfb-4afa-b053-bb27062908aa", "DetectTime": "2023-10-30T14:01:47.320402+02:00", "EventTime": "2023-10-30T14:01:47.320418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["CSzSRk3CAXXBRzlSF6"]} -{"Format": "IDEA0", "ID": "a2533f7e-ee8e-4f7a-86e8-4cf9696f0779", "DetectTime": "2023-10-30T14:01:47.352493+02:00", "EventTime": "2023-10-30T14:01:47.352509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CLQ98a2IkwlejGk7k"]} -{"Format": "IDEA0", "ID": "30f05b13-d1aa-47e4-8fa4-cf63679e1e67", "DetectTime": "2023-10-30T14:01:47.379204+02:00", "EventTime": "2023-10-30T14:01:47.379215+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4FcTj3mV500HFlcIb"]} -{"Format": "IDEA0", "ID": "4adedb50-de91-4dcb-bc8d-fec8c5094ad9", "DetectTime": "2023-10-30T14:01:47.388962+02:00", "EventTime": "2023-10-30T14:01:47.388978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CLHRfC4bsOfnWO9J0h"]} -{"Format": "IDEA0", "ID": "27728b35-a8f9-401e-9626-f7ac441855d8", "DetectTime": "2023-10-30T14:01:47.419742+02:00", "EventTime": "2023-10-30T14:01:47.419759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CCwVhptpQ4BJ3Hmbi"]} -{"Format": "IDEA0", "ID": "f2fbe11f-7d1d-46d7-b8e2-981529c34a84", "DetectTime": "2023-10-30T14:01:47.446291+02:00", "EventTime": "2023-10-30T14:01:47.446312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["CVbSDt2yMtzAa18LSc"]} -{"Format": "IDEA0", "ID": "16270b4a-d7b3-4cee-abaf-1fae2b6bb7f4", "DetectTime": "2023-10-30T14:01:47.475170+02:00", "EventTime": "2023-10-30T14:01:47.475182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["C9Kqs03uHtoajoXrpj"]} -{"Format": "IDEA0", "ID": "90eb5334-5cce-4bc3-b01b-432bc2d78a0b", "DetectTime": "2023-10-30T14:01:47.507942+02:00", "EventTime": "2023-10-30T14:01:47.507961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["C9WYwYuBEmtRbm3jh"]} -{"Format": "IDEA0", "ID": "ee0c40f3-9c4a-406d-b75e-5908b902a251", "DetectTime": "2023-10-30T14:01:47.536419+02:00", "EventTime": "2023-10-30T14:01:47.536429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.229.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.229.42 ", "ContentType": "text/plain"}], "uids": ["CJCH544HMT9FYUx2fa"]} -{"Format": "IDEA0", "ID": "546884f4-2c9e-4986-beb3-6e9c46510aac", "DetectTime": "2023-10-30T14:01:47.567415+02:00", "EventTime": "2023-10-30T14:01:47.567432+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cy9zS01hut0sHfMFQ1"]} -{"Format": "IDEA0", "ID": "590bdb57-ae29-4360-a8a1-da9fc392a389", "DetectTime": "2023-10-30T14:01:47.577902+02:00", "EventTime": "2023-10-30T14:01:47.577921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.144 ", "ContentType": "text/plain"}], "uids": ["CwQBSe4NmgyZ5uT13i"]} -{"Format": "IDEA0", "ID": "d38b8919-ff94-4c76-9c51-f73ab8b437c2", "DetectTime": "2023-10-30T14:01:47.607730+02:00", "EventTime": "2023-10-30T14:01:47.607746+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXUqto3c1O34gZebXf"]} -{"Format": "IDEA0", "ID": "cfcf4a6d-04e9-4ad6-b1ac-1c6c74e72c85", "DetectTime": "2023-10-30T14:01:47.618277+02:00", "EventTime": "2023-10-30T14:01:47.618294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CVCbjb17KyAvFeYCa6"]} -{"Format": "IDEA0", "ID": "d1c461d4-8cb1-4dc8-8135-c18c880c6858", "DetectTime": "2023-10-30T14:01:47.652446+02:00", "EventTime": "2023-10-30T14:01:47.652463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CgV1yz4PdhEWM1pjUh"]} -{"Format": "IDEA0", "ID": "82f79335-c80f-4ed9-8278-ac21cbfd354e", "DetectTime": "2023-10-30T14:01:47.681695+02:00", "EventTime": "2023-10-30T14:01:47.681712+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CncUMP1l9PSgLXOsHf"]} -{"Format": "IDEA0", "ID": "55387395-8fcc-4302-8573-c264449b91e0", "DetectTime": "2023-10-30T14:01:47.691599+02:00", "EventTime": "2023-10-30T14:01:47.691611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CiGYaG1L0DiGsSymvj"]} -{"Format": "IDEA0", "ID": "981f0870-20e3-4e9b-b3cd-c1639ab0cea2", "DetectTime": "2023-10-30T14:01:47.799502+02:00", "EventTime": "2023-10-30T14:01:47.799519+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyYVhD4nCtCWfWPlY3"]} -{"Format": "IDEA0", "ID": "2c35810a-6f16-409d-92db-91cad7b80694", "DetectTime": "2023-10-30T14:01:47.811469+02:00", "EventTime": "2023-10-30T14:01:47.811490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CFtTLq4J45RYGtkJd9"]} -{"Format": "IDEA0", "ID": "2528e4f1-bff0-408e-806d-4d4fb9fd2d29", "DetectTime": "2023-10-30T14:01:47.844293+02:00", "EventTime": "2023-10-30T14:01:47.844309+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYSX731O5GNOrOO8w7"]} -{"Format": "IDEA0", "ID": "7bb0e9aa-ec69-4a07-bfce-9091d45cf76c", "DetectTime": "2023-10-30T14:01:47.858463+02:00", "EventTime": "2023-10-30T14:01:47.858483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CwAbAhZkUNiPc8mGg"]} -{"Format": "IDEA0", "ID": "4d34fbcd-2a71-4fbf-892f-57957725bb4e", "DetectTime": "2023-10-30T14:01:47.896484+02:00", "EventTime": "2023-10-30T14:01:47.896501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CMOTPl4bPwUPZBoW65"]} -{"Format": "IDEA0", "ID": "2de91936-933c-4fb0-994c-bce5fa8d2930", "DetectTime": "2023-10-30T14:01:47.931954+02:00", "EventTime": "2023-10-30T14:01:47.931975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.134.36.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.134.36.148 ", "ContentType": "text/plain"}], "uids": ["C6thze41RH4vCsWNN"]} -{"Format": "IDEA0", "ID": "7baddd24-f1c0-4e3e-8310-fe86793fa93a", "DetectTime": "2023-10-30T14:01:47.968670+02:00", "EventTime": "2023-10-30T14:01:47.968692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.132.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.132.202 ", "ContentType": "text/plain"}], "uids": ["CEDoJ23NjqZgq1Ymfh"]} -{"Format": "IDEA0", "ID": "6eb0f23a-fb05-4c04-a0d9-56e256fa8736", "DetectTime": "2023-10-30T14:01:48.001984+02:00", "EventTime": "2023-10-30T14:01:48.002004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CNzEgf3oTqkN44ky7l"]} -{"Format": "IDEA0", "ID": "1c24f2d6-01a3-4341-aacb-74461d61d42d", "DetectTime": "2023-10-30T14:01:48.038705+02:00", "EventTime": "2023-10-30T14:01:48.038725+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtD4TT16cjv1NgfE28"]} -{"Format": "IDEA0", "ID": "63ea9100-3923-4c5d-9a8a-6e3f35d6b7ac", "DetectTime": "2023-10-30T14:01:48.051276+02:00", "EventTime": "2023-10-30T14:01:48.051293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CoLCsB1tWpvPCDJXWd"]} -{"Format": "IDEA0", "ID": "d1bc706d-fd26-4d96-a367-df9d40fa8995", "DetectTime": "2023-10-30T14:01:48.087222+02:00", "EventTime": "2023-10-30T14:01:48.087249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.97.55 ", "ContentType": "text/plain"}], "uids": ["CaFd5M2eP6V6Lxcw78"]} -{"Format": "IDEA0", "ID": "39d13e52-8581-4818-a376-5cd90f902922", "DetectTime": "2023-10-30T14:01:48.122398+02:00", "EventTime": "2023-10-30T14:01:48.122414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYSX731O5GNOrOO8w7", "CKb0iD4W6XRK2s8God", "CncUMP1l9PSgLXOsHf", "Cy9zS01hut0sHfMFQ1"]} -{"Format": "IDEA0", "ID": "ee502d26-f8cd-4fd0-bcef-f603d86a53aa", "DetectTime": "2023-10-30T14:01:48.136549+02:00", "EventTime": "2023-10-30T14:01:48.136568+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKb0iD4W6XRK2s8God"]} -{"Format": "IDEA0", "ID": "23e256ef-d5b0-433e-a3a2-72ac14a61904", "DetectTime": "2023-10-30T14:01:48.148954+02:00", "EventTime": "2023-10-30T14:01:48.148972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.73.4.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.73.4.190 ", "ContentType": "text/plain"}], "uids": ["CT5roB2QfvC3KaBCzh"]} -{"Format": "IDEA0", "ID": "e3bc4e03-fc54-4013-8c64-ce7847f6bee4", "DetectTime": "2023-10-30T14:01:48.180286+02:00", "EventTime": "2023-10-30T14:01:48.180303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.61.86.78 ", "ContentType": "text/plain"}], "uids": ["CQo5ZfYJO3G9RxdN3"]} -{"Format": "IDEA0", "ID": "82d8f05d-50f5-4187-8f1f-09ec79d860af", "DetectTime": "2023-10-30T14:01:48.212168+02:00", "EventTime": "2023-10-30T14:01:48.212180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.188.50 ", "ContentType": "text/plain"}], "uids": ["C0LSXa3HlnakxdMbOb"]} -{"Format": "IDEA0", "ID": "df362254-81f9-4dcc-88e3-29016f45618c", "DetectTime": "2023-10-30T14:01:48.240367+02:00", "EventTime": "2023-10-30T14:01:48.240393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CgVf5A371gCmdbeh76"]} -{"Format": "IDEA0", "ID": "0258649f-1e0d-4b3e-a29a-5bb36a547d43", "DetectTime": "2023-10-30T14:01:48.274015+02:00", "EventTime": "2023-10-30T14:01:48.274034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CM8pDt3N8WiZyH7Sle"]} -{"Format": "IDEA0", "ID": "df75fd68-5b84-4e4a-b495-11167a03f608", "DetectTime": "2023-10-30T14:01:48.309122+02:00", "EventTime": "2023-10-30T14:01:48.309222+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMBmqu4IXeoLwLVny3"]} -{"Format": "IDEA0", "ID": "91558bec-931b-4e2c-9cb7-b98195e6ebf6", "DetectTime": "2023-10-30T14:01:48.322271+02:00", "EventTime": "2023-10-30T14:01:48.322283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CmhCl33bcfvrGMUPec"]} -{"Format": "IDEA0", "ID": "2f192d36-519c-42b4-9a61-afb5423d2b17", "DetectTime": "2023-10-30T14:01:48.355867+02:00", "EventTime": "2023-10-30T14:01:48.355889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["C3WCt649yd2qPmvDPh"]} -{"Format": "IDEA0", "ID": "f615c1f0-481f-447b-989b-811d6c433608", "DetectTime": "2023-10-30T14:01:48.395344+02:00", "EventTime": "2023-10-30T14:01:48.395365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CUzfZ828cbGvfpKulc"]} -{"Format": "IDEA0", "ID": "6ce0fe4f-0515-4cba-bdff-a7f4fe1680d0", "DetectTime": "2023-10-30T14:01:48.428771+02:00", "EventTime": "2023-10-30T14:01:48.428793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["CWmQcKwCR2aJNreG5"]} -{"Format": "IDEA0", "ID": "a7ac3d97-d2b9-4cda-8895-ef4ec782de0b", "DetectTime": "2023-10-30T14:01:48.465656+02:00", "EventTime": "2023-10-30T14:01:48.465678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["CgH3XT1cPu9yyaGCRk"]} -{"Format": "IDEA0", "ID": "654d6b4b-fd77-4491-8e9d-8aa472bb42dd", "DetectTime": "2023-10-30T14:01:48.498384+02:00", "EventTime": "2023-10-30T14:01:48.498408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.25.212.195 ", "ContentType": "text/plain"}], "uids": ["CtMYZcEtBaVLsv1R1"]} -{"Format": "IDEA0", "ID": "b5993237-0622-4324-899c-bf970460e78e", "DetectTime": "2023-10-30T14:01:48.529860+02:00", "EventTime": "2023-10-30T14:01:48.529882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CYXy4q3qbi6y3Wxs5c"]} -{"Format": "IDEA0", "ID": "ecb8a16e-2a1d-462d-ba1c-81c3dcadd28a", "DetectTime": "2023-10-30T14:01:48.562411+02:00", "EventTime": "2023-10-30T14:01:48.562434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CqhFpj3L55qjbwDBgi"]} -{"Format": "IDEA0", "ID": "aff500e3-087d-4a39-b46a-04812e5bb46e", "DetectTime": "2023-10-30T14:01:48.594958+02:00", "EventTime": "2023-10-30T14:01:48.594983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.254.84.17 ", "ContentType": "text/plain"}], "uids": ["CfjR4G3wuGsRJoFbgc"]} -{"Format": "IDEA0", "ID": "59328254-7ae2-4d23-903e-97e8b429e3b0", "DetectTime": "2023-10-30T14:01:48.632768+02:00", "EventTime": "2023-10-30T14:01:48.632790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cu87av4gElkVYgwAma"]} -{"Format": "IDEA0", "ID": "0a8beef0-5991-4a53-b2a2-ddd515a4354f", "DetectTime": "2023-10-30T14:01:48.670343+02:00", "EventTime": "2023-10-30T14:01:48.670363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["COak6g3PTKGvGEaGE1"]} -{"Format": "IDEA0", "ID": "25688040-91ca-4c42-85fa-2280c62f1041", "DetectTime": "2023-10-30T14:01:48.710194+02:00", "EventTime": "2023-10-30T14:01:48.710212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.108.40.143 ", "ContentType": "text/plain"}], "uids": ["Cqr6ivGVruI7DLzef"]} -{"Format": "IDEA0", "ID": "40495eec-494c-4d8d-bd3c-bd4bd513f57e", "DetectTime": "2023-10-30T14:01:48.747210+02:00", "EventTime": "2023-10-30T14:01:48.747226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.134.36.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.134.36.148 ", "ContentType": "text/plain"}], "uids": ["CG6AzD3akCSwPm63tc"]} -{"Format": "IDEA0", "ID": "6d65b105-bf34-4ac6-95db-d68573446a9c", "DetectTime": "2023-10-30T14:01:48.785015+02:00", "EventTime": "2023-10-30T14:01:48.785040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVfmbh1AlCzN9TyRlk"]} -{"Format": "IDEA0", "ID": "81aa51d9-9ac8-4914-be92-0a01dbda573e", "DetectTime": "2023-10-30T14:01:48.822185+02:00", "EventTime": "2023-10-30T14:01:48.822204+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2kzVUOi3GRKu7nuc"]} -{"Format": "IDEA0", "ID": "84be7f2e-5c9d-4d12-859f-06cc55ca2ce0", "DetectTime": "2023-10-30T14:01:48.838239+02:00", "EventTime": "2023-10-30T14:01:48.838257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CAeTJk2DHyfusrqTqh"]} -{"Format": "IDEA0", "ID": "7c2854fa-1dad-4c69-9b03-7c0218514225", "DetectTime": "2023-10-30T14:01:48.883800+02:00", "EventTime": "2023-10-30T14:01:48.883821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.109.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.109.9 ", "ContentType": "text/plain"}], "uids": ["Ch1pMX1CgqTo0dAfJd"]} -{"Format": "IDEA0", "ID": "138c864b-8f7f-4e0a-b495-ec2d664ffcb9", "DetectTime": "2023-10-30T14:01:48.933888+02:00", "EventTime": "2023-10-30T14:01:48.933918+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJJqj7w9x9CthaG86"]} -{"Format": "IDEA0", "ID": "08a6f77e-065c-48e5-9e55-0db41cd643cd", "DetectTime": "2023-10-30T14:01:48.948694+02:00", "EventTime": "2023-10-30T14:01:48.948709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CUxgFk4ycwwP2NAo2j"]} -{"Format": "IDEA0", "ID": "53f67cda-2f50-461a-b56a-bb80298746dd", "DetectTime": "2023-10-30T14:01:48.985700+02:00", "EventTime": "2023-10-30T14:01:48.985725+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPU4xF31RRRF6HgFob"]} -{"Format": "IDEA0", "ID": "24567099-f35c-4eb3-a1f2-9b6c84c26a01", "DetectTime": "2023-10-30T14:01:48.999526+02:00", "EventTime": "2023-10-30T14:01:48.999543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.132.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.132.202 ", "ContentType": "text/plain"}], "uids": ["CrsTR11VuuA0QWg9Fj"]} -{"Format": "IDEA0", "ID": "00922a58-6e38-4c7a-97ef-558587018d0a", "DetectTime": "2023-10-30T14:01:49.038886+02:00", "EventTime": "2023-10-30T14:01:49.038902+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwmjEJ3U6u3IIxc3P5"]} -{"Format": "IDEA0", "ID": "6909203b-cc3d-4f86-b567-213beb8af72a", "DetectTime": "2023-10-30T14:01:49.054222+02:00", "EventTime": "2023-10-30T14:01:49.054238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CcPHAj1zU68JuRgzDg"]} -{"Format": "IDEA0", "ID": "6a72771d-9b6c-43ad-b115-36ab343c9285", "DetectTime": "2023-10-30T14:01:49.098695+02:00", "EventTime": "2023-10-30T14:01:49.098721+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJ08YGw02PCZIrrD4"]} -{"Format": "IDEA0", "ID": "1394413c-0de3-4fbe-9e69-8cf15bbb9edc", "DetectTime": "2023-10-30T14:01:49.114685+02:00", "EventTime": "2023-10-30T14:01:49.114703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.109.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.109.9 ", "ContentType": "text/plain"}], "uids": ["CReCK9eGDUf73KDK5"]} -{"Format": "IDEA0", "ID": "99868e55-99dc-4de2-8d5f-f2ef621367a1", "DetectTime": "2023-10-30T14:01:49.149020+02:00", "EventTime": "2023-10-30T14:01:49.149038+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAt4mX32XeoXsohhZ2"]} -{"Format": "IDEA0", "ID": "f2bfa242-bcbd-43b1-b964-251e164e1fee", "DetectTime": "2023-10-30T14:01:49.161167+02:00", "EventTime": "2023-10-30T14:01:49.161183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.229.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.229.42 ", "ContentType": "text/plain"}], "uids": ["CazP9U37OR0zGuJeY9"]} -{"Format": "IDEA0", "ID": "4484367c-75e9-494e-a70f-27dd332ff825", "DetectTime": "2023-10-30T14:01:49.196546+02:00", "EventTime": "2023-10-30T14:01:49.196573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["COxYx02W0kwsoDMuul"]} -{"Format": "IDEA0", "ID": "b224c2eb-d0d1-4161-8f0f-c817b00844a0", "DetectTime": "2023-10-30T14:01:49.236402+02:00", "EventTime": "2023-10-30T14:01:49.236424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CJa8q642RjBeh1l3X7", "CJ08YGw02PCZIrrD4", "C2kzVUOi3GRKu7nuc", "CPU4xF31RRRF6HgFob"]} -{"Format": "IDEA0", "ID": "03a7a446-f274-4d9d-97ef-4aa94ed42ad3", "DetectTime": "2023-10-30T14:01:49.252753+02:00", "EventTime": "2023-10-30T14:01:49.252772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.174.187.66 ", "ContentType": "text/plain"}], "uids": ["CxUYI61h3dxboL0wV7"]} -{"Format": "IDEA0", "ID": "6110ec0e-9513-471d-a6ee-af7cf923cf23", "DetectTime": "2023-10-30T14:01:49.294266+02:00", "EventTime": "2023-10-30T14:01:49.294286+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJa8q642RjBeh1l3X7"]} -{"Format": "IDEA0", "ID": "776ae8b6-6936-44fb-885f-8a3534b5435e", "DetectTime": "2023-10-30T14:01:49.309152+02:00", "EventTime": "2023-10-30T14:01:49.309168+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbBDi38ZEV4VQkWi7"]} -{"Format": "IDEA0", "ID": "24ce0b65-03ab-4766-b2cc-1bcd53cf68cc", "DetectTime": "2023-10-30T14:01:49.328675+02:00", "EventTime": "2023-10-30T14:01:49.328695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CHlJNq39qB4y7Q9ez7"]} -{"Format": "IDEA0", "ID": "80cc2911-e73f-4972-81f3-88fa95723ff9", "DetectTime": "2023-10-30T14:01:49.378969+02:00", "EventTime": "2023-10-30T14:01:49.378998+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvkmND4FALKzXHXLC8"]} -{"Format": "IDEA0", "ID": "61ffc44f-b438-457e-a49f-5929483de271", "DetectTime": "2023-10-30T14:01:49.398749+02:00", "EventTime": "2023-10-30T14:01:49.398772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.140.158.40 ", "ContentType": "text/plain"}], "uids": ["CHXfiQ1IyZqE3oiyQj"]} -{"Format": "IDEA0", "ID": "ee3c9ee9-2452-4fe5-b473-956fef45a287", "DetectTime": "2023-10-30T14:01:49.448668+02:00", "EventTime": "2023-10-30T14:01:49.448690+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CG8nIm1eYglxckpyE5"]} -{"Format": "IDEA0", "ID": "6e505d40-2fbe-4449-8d55-873b2ef0b336", "DetectTime": "2023-10-30T14:01:49.463350+02:00", "EventTime": "2023-10-30T14:01:49.463369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CBjjiM1NFwM1GM2u0j"]} -{"Format": "IDEA0", "ID": "a1222d77-b2d9-4372-aa6a-fb1733ad9582", "DetectTime": "2023-10-30T14:01:49.492164+02:00", "EventTime": "2023-10-30T14:01:49.492191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["ClUK6MZvGxx8mxoT1"]} -{"Format": "IDEA0", "ID": "47d3c7d2-4faa-40db-b5c5-2e1d7da62a93", "DetectTime": "2023-10-30T14:01:49.528034+02:00", "EventTime": "2023-10-30T14:01:49.528054+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CszZNw31Cn5A3UIBr9"]} -{"Format": "IDEA0", "ID": "4b09d3d6-7c9d-48f6-8ebb-bf7de78731e5", "DetectTime": "2023-10-30T14:01:49.541090+02:00", "EventTime": "2023-10-30T14:01:49.541107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBJe6O3J3KmOpv009l"]} -{"Format": "IDEA0", "ID": "f2fced00-678b-43bf-9f07-dac5abb0c5bf", "DetectTime": "2023-10-30T14:01:49.567935+02:00", "EventTime": "2023-10-30T14:01:49.567955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CzB36G2livx9cPpYS"]} -{"Format": "IDEA0", "ID": "15fdc13a-11a1-44a9-a834-a3ae26c211fe", "DetectTime": "2023-10-30T14:01:49.600469+02:00", "EventTime": "2023-10-30T14:01:49.600487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CCGRy64SPo9IYn0qx2"]} -{"Format": "IDEA0", "ID": "b87d8775-7178-4533-8c9e-ede1e84c917c", "DetectTime": "2023-10-30T14:01:49.626593+02:00", "EventTime": "2023-10-30T14:01:49.626608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["C5ZgGA1cOGk7k8Rcd7"]} -{"Format": "IDEA0", "ID": "0442ce90-bf3d-4aca-8dd5-7e97fab30470", "DetectTime": "2023-10-30T14:01:49.661393+02:00", "EventTime": "2023-10-30T14:01:49.661420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Cib0PtVAzuLNQy7gi"]} -{"Format": "IDEA0", "ID": "e0857712-32f3-4138-8cdf-54b591385b74", "DetectTime": "2023-10-30T14:01:49.693059+02:00", "EventTime": "2023-10-30T14:01:49.693088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.73.4.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.73.4.190 ", "ContentType": "text/plain"}], "uids": ["CwRPcz4vrelbduwyfg"]} -{"Format": "IDEA0", "ID": "03ac2058-146e-4951-95ff-7675014fcbd1", "DetectTime": "2023-10-30T14:01:49.726386+02:00", "EventTime": "2023-10-30T14:01:49.726403+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7Lm5lahx5mtkqTPl"]} -{"Format": "IDEA0", "ID": "319e06bc-88f0-42e8-9372-ec354d11c88e", "DetectTime": "2023-10-30T14:01:49.737964+02:00", "EventTime": "2023-10-30T14:01:49.737981+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZoWv43vVeTAPtYwXc"]} -{"Format": "IDEA0", "ID": "8d8f3bac-ed76-4a36-a832-dcc26751e7ef", "DetectTime": "2023-10-30T14:01:49.750017+02:00", "EventTime": "2023-10-30T14:01:49.750028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Ceu25RQ5YfpRjBVKd"]} -{"Format": "IDEA0", "ID": "23949535-8f2e-44e9-800d-2db66171293b", "DetectTime": "2023-10-30T14:01:49.783298+02:00", "EventTime": "2023-10-30T14:01:49.783320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CswLR02YkP2rkfsOvj"]} -{"Format": "IDEA0", "ID": "f566bdfc-a3bf-4569-aa8d-148eaaefdd9c", "DetectTime": "2023-10-30T14:01:49.816501+02:00", "EventTime": "2023-10-30T14:01:49.816518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsAGWA2Hicc4fNfuA7"]} -{"Format": "IDEA0", "ID": "d81d85f7-593e-4c1c-93b6-7df05dfb70bd", "DetectTime": "2023-10-30T14:01:49.829909+02:00", "EventTime": "2023-10-30T14:01:49.829930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CciWsj2D32sjdJ1HAh"]} -{"Format": "IDEA0", "ID": "742a2801-ba94-4444-b1d2-e1da46e62e30", "DetectTime": "2023-10-30T14:01:49.861792+02:00", "EventTime": "2023-10-30T14:01:49.861812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["CEQe1dLXYJSun0WL"]} -{"Format": "IDEA0", "ID": "640f462f-1ed9-46e7-bb28-33e50790b9ef", "DetectTime": "2023-10-30T14:01:49.895588+02:00", "EventTime": "2023-10-30T14:01:49.895609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CMKTVG1sLDTRKuONuj"]} -{"Format": "IDEA0", "ID": "8fc334e9-89fa-42ac-b873-745a8c44867f", "DetectTime": "2023-10-30T14:01:49.927162+02:00", "EventTime": "2023-10-30T14:01:49.927184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CPG7O8kU4qbf12Oej"]} -{"Format": "IDEA0", "ID": "9c0dde03-85e4-4c9e-a5e0-546c3166b12e", "DetectTime": "2023-10-30T14:01:49.962175+02:00", "EventTime": "2023-10-30T14:01:49.962192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CszZNw31Cn5A3UIBr9", "CvkmND4FALKzXHXLC8", "CnhJ3i3mdqT6RK9ev1", "CZoWv43vVeTAPtYwXc"]} -{"Format": "IDEA0", "ID": "e05cb23e-f14a-4014-a32b-e3d0598f1684", "DetectTime": "2023-10-30T14:01:49.974213+02:00", "EventTime": "2023-10-30T14:01:49.974234+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnhJ3i3mdqT6RK9ev1"]} -{"Format": "IDEA0", "ID": "2a2a1446-aba9-4bc8-b657-96fc5b17a399", "DetectTime": "2023-10-30T14:01:49.986475+02:00", "EventTime": "2023-10-30T14:01:49.986489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.61.221.194 ", "ContentType": "text/plain"}], "uids": ["C8fAxY2r0fgsBLqJe9"]} -{"Format": "IDEA0", "ID": "780dc4a0-d48a-47d7-a8c7-7bc83748682b", "DetectTime": "2023-10-30T14:01:50.018564+02:00", "EventTime": "2023-10-30T14:01:50.018581+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXGeyq2u9ozi48nUMh"]} -{"Format": "IDEA0", "ID": "81bb250a-b71d-4b76-a71a-34263715cf4a", "DetectTime": "2023-10-30T14:01:50.030345+02:00", "EventTime": "2023-10-30T14:01:50.030424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CrQnhJ38AiWZ6NjOU4"]} -{"Format": "IDEA0", "ID": "c755aa38-09c1-4578-bc4b-49239b005cb5", "DetectTime": "2023-10-30T14:01:50.058946+02:00", "EventTime": "2023-10-30T14:01:50.058970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CZzaqW1YJ31Hbtpnh5"]} -{"Format": "IDEA0", "ID": "12b5d7ea-75e9-4fdd-9188-322fd736b980", "DetectTime": "2023-10-30T14:01:50.090543+02:00", "EventTime": "2023-10-30T14:01:50.090561+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPU8A73UbDGcXCYq6l"]} -{"Format": "IDEA0", "ID": "935f7442-3926-403a-905d-c5a0c5274ebc", "DetectTime": "2023-10-30T14:01:50.105963+02:00", "EventTime": "2023-10-30T14:01:50.105980+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJ6YjWcjqCgmkYUn9"]} -{"Format": "IDEA0", "ID": "193f1d12-9900-40c9-8e9a-16979f7e9e66", "DetectTime": "2023-10-30T14:01:50.143326+02:00", "EventTime": "2023-10-30T14:01:50.143353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CjOErA4FlJqKbgBYs5"]} -{"Format": "IDEA0", "ID": "4b19357d-2264-49ba-99ab-6593847f6530", "DetectTime": "2023-10-30T14:01:50.206826+02:00", "EventTime": "2023-10-30T14:01:50.206847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CZO2C3r8H63yR0J7c"]} -{"Format": "IDEA0", "ID": "5e82d058-4d50-4d17-a8d2-4a220f04643c", "DetectTime": "2023-10-30T14:01:50.254703+02:00", "EventTime": "2023-10-30T14:01:50.254726+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CV5DXq4kakEpdEnKna"]} -{"Format": "IDEA0", "ID": "12d42b91-3280-4936-aa06-9225f716c6e1", "DetectTime": "2023-10-30T14:01:50.286150+02:00", "EventTime": "2023-10-30T14:01:50.286179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CCIanYU41GRkq9E36"]} -{"Format": "IDEA0", "ID": "6bfacf20-a93f-4c24-a840-ed2609df0024", "DetectTime": "2023-10-30T14:01:50.371460+02:00", "EventTime": "2023-10-30T14:01:50.371487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["CchF4o2vzBzo7Wma2f"]} -{"Format": "IDEA0", "ID": "db79a8a9-d988-4c88-a306-ed0099bea98a", "DetectTime": "2023-10-30T14:01:50.476211+02:00", "EventTime": "2023-10-30T14:01:50.476242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CEA7GU3eNpA4OG17fd"]} -{"Format": "IDEA0", "ID": "163591e5-1633-4fb7-951c-dec0e325f348", "DetectTime": "2023-10-30T14:01:50.520706+02:00", "EventTime": "2023-10-30T14:01:50.520775+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CG9x6oUnOl0CV1yJ5"]} -{"Format": "IDEA0", "ID": "c9904ceb-6446-4391-8a07-4f9015b511bc", "DetectTime": "2023-10-30T14:01:50.540705+02:00", "EventTime": "2023-10-30T14:01:50.540728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C5STG2wBTltRRuQ1f"]} -{"Format": "IDEA0", "ID": "c616ff57-acd6-4276-ae99-42c86bd73e6d", "DetectTime": "2023-10-30T14:01:50.576549+02:00", "EventTime": "2023-10-30T14:01:50.576562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["CZRq4a4iZnqJ1Qihh"]} -{"Format": "IDEA0", "ID": "eedced3f-33ce-4621-9168-aeca129811de", "DetectTime": "2023-10-30T14:01:50.608567+02:00", "EventTime": "2023-10-30T14:01:50.608584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["CRGDDi2e176jas8aPe"]} -{"Format": "IDEA0", "ID": "cf279270-0de2-4720-a948-fae34c800f59", "DetectTime": "2023-10-30T14:01:50.643317+02:00", "EventTime": "2023-10-30T14:01:50.643345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CwkxfninYIOHXUYtl"]} -{"Format": "IDEA0", "ID": "c90925e1-0d40-43eb-b955-fb2d4b084948", "DetectTime": "2023-10-30T14:01:50.677770+02:00", "EventTime": "2023-10-30T14:01:50.677787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CcyCN71HtQqO4lmFAa"]} -{"Format": "IDEA0", "ID": "2ef49330-2712-4949-a9d5-52f52c1df863", "DetectTime": "2023-10-30T14:01:50.716792+02:00", "EventTime": "2023-10-30T14:01:50.716813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CEl2rw3aahyMl0fcD4"]} -{"Format": "IDEA0", "ID": "59cc9d70-9f80-4bfe-b390-0532cde6f0f3", "DetectTime": "2023-10-30T14:01:50.755099+02:00", "EventTime": "2023-10-30T14:01:50.755112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["Cibduq3O7f7IiszCYa"]} -{"Format": "IDEA0", "ID": "27e18e01-4215-4f69-8a68-b434f681a4a7", "DetectTime": "2023-10-30T14:01:50.788351+02:00", "EventTime": "2023-10-30T14:01:50.788370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.108.40.143 ", "ContentType": "text/plain"}], "uids": ["C8K8mH2Y0UdcIXcbs9"]} -{"Format": "IDEA0", "ID": "60c21ef5-016c-4a82-96d5-24969ed055ce", "DetectTime": "2023-10-30T14:01:50.815412+02:00", "EventTime": "2023-10-30T14:01:50.815429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.25.212.195 ", "ContentType": "text/plain"}], "uids": ["CY3keU3sc8jLTt8hll"]} -{"Format": "IDEA0", "ID": "5bc6e8cc-68f0-4bf8-b8fa-7d384a04b49d", "DetectTime": "2023-10-30T14:01:50.851132+02:00", "EventTime": "2023-10-30T14:01:50.851149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CNpRCK2b927ecZsmv8"]} -{"Format": "IDEA0", "ID": "d0fdf8a8-3c80-4599-8e9b-0de1a9492455", "DetectTime": "2023-10-30T14:01:50.885813+02:00", "EventTime": "2023-10-30T14:01:50.885828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.61.221.194 ", "ContentType": "text/plain"}], "uids": ["Cqq6RD496Se2HPK8sl"]} -{"Format": "IDEA0", "ID": "ce7c856c-3172-4beb-ad30-674fbff669d6", "DetectTime": "2023-10-30T14:01:50.914081+02:00", "EventTime": "2023-10-30T14:01:50.914094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["Cd9vTu41k7gdLURG2d"]} -{"Format": "IDEA0", "ID": "ba5957e5-5c8a-4cfe-8c18-539e8e93d1ac", "DetectTime": "2023-10-30T14:01:50.948523+02:00", "EventTime": "2023-10-30T14:01:50.948538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.97.55 ", "ContentType": "text/plain"}], "uids": ["Cy3Zag4l2Wb5VXPyc8"]} -{"Format": "IDEA0", "ID": "8800f68a-fb97-4f55-b700-3f366c1e7390", "DetectTime": "2023-10-30T14:01:50.982223+02:00", "EventTime": "2023-10-30T14:01:50.982237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.254.84.17 ", "ContentType": "text/plain"}], "uids": ["C9XRXG1prPKAG6iBol"]} -{"Format": "IDEA0", "ID": "8c6b5fc7-6ca1-408c-9edd-3fa72f6dc831", "DetectTime": "2023-10-30T14:01:51.019928+02:00", "EventTime": "2023-10-30T14:01:51.019949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CJYtzU2ZDIwBwmiW7i"]} -{"Format": "IDEA0", "ID": "7dce4f42-09f9-439b-a197-afcafa7539aa", "DetectTime": "2023-10-30T14:01:51.052042+02:00", "EventTime": "2023-10-30T14:01:51.052056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CH4vYB4gkarHby3p8a"]} -{"Format": "IDEA0", "ID": "483610b0-c90f-4c60-a4a4-305ffc2755f7", "DetectTime": "2023-10-30T14:01:51.083883+02:00", "EventTime": "2023-10-30T14:01:51.083910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CESsf31o6lPcB3P7p3"]} -{"Format": "IDEA0", "ID": "c80c4852-6744-43f1-af86-953b5a68c473", "DetectTime": "2023-10-30T14:01:51.114248+02:00", "EventTime": "2023-10-30T14:01:51.114274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["Cd7VJ436r8N2YeEpu6"]} -{"Format": "IDEA0", "ID": "2599e851-298f-4c46-b8ab-bc446f421657", "DetectTime": "2023-10-30T14:01:51.151102+02:00", "EventTime": "2023-10-30T14:01:51.151125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.188.50 ", "ContentType": "text/plain"}], "uids": ["CMbtxM3BZFPr5ecIYj"]} -{"Format": "IDEA0", "ID": "23ad31c8-5bf9-4355-ab5e-ec69cb6bab77", "DetectTime": "2023-10-30T14:01:51.182628+02:00", "EventTime": "2023-10-30T14:01:51.182647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CJFWq42VbXrkOEARub"]} -{"Format": "IDEA0", "ID": "bd102410-48b1-4726-b4a1-0da611021db7", "DetectTime": "2023-10-30T14:01:51.215342+02:00", "EventTime": "2023-10-30T14:01:51.215360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.144 ", "ContentType": "text/plain"}], "uids": ["CgyPb43fwvoCxDKRrh"]} -{"Format": "IDEA0", "ID": "cabf0fc3-20b6-4f2d-9e8b-59e495840f6f", "DetectTime": "2023-10-30T14:01:51.250995+02:00", "EventTime": "2023-10-30T14:01:51.251014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Ch6TIH2AlE9v76yhia"]} -{"Format": "IDEA0", "ID": "1aa919cd-0640-44bf-b3ac-5d1348977139", "DetectTime": "2023-10-30T14:01:51.279737+02:00", "EventTime": "2023-10-30T14:01:51.279753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CGSS3B3hGIDdtHqHo1"]} -{"Format": "IDEA0", "ID": "285d619e-206a-43bd-bbe8-54cc0ccd7b58", "DetectTime": "2023-10-30T14:01:51.312784+02:00", "EventTime": "2023-10-30T14:01:51.312800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.108.40.143 ", "ContentType": "text/plain"}], "uids": ["CjXy6o2h46zgmQEiei"]} -{"Format": "IDEA0", "ID": "76146cee-c323-46da-b37a-ff5ebe046ec7", "DetectTime": "2023-10-30T14:01:51.348776+02:00", "EventTime": "2023-10-30T14:01:51.348799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.140.158.40 ", "ContentType": "text/plain"}], "uids": ["ConrNL1MTLtZ1X8T89"]} -{"Format": "IDEA0", "ID": "c32d0819-34e8-48f5-a4fd-16175938ec70", "DetectTime": "2023-10-30T14:01:51.383565+02:00", "EventTime": "2023-10-30T14:01:51.383583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CdFzL34ksHujDtgB9b"]} -{"Format": "IDEA0", "ID": "64d6bc33-5024-4696-9a91-e429292ffc7e", "DetectTime": "2023-10-30T14:01:51.412086+02:00", "EventTime": "2023-10-30T14:01:51.412104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CblPk11R6MsZseG7D3"]} -{"Format": "IDEA0", "ID": "4f98bc13-d900-4350-9db6-c287862258dd", "DetectTime": "2023-10-30T14:01:51.437563+02:00", "EventTime": "2023-10-30T14:01:51.437575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CHPcVl3htT0tujJFCb"]} -{"Format": "IDEA0", "ID": "0f8043bd-d22a-49c7-91f6-41663716e3f2", "DetectTime": "2023-10-30T14:01:51.464961+02:00", "EventTime": "2023-10-30T14:01:51.464980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["Cxk2RRZlfWOL5mI8b"]} -{"Format": "IDEA0", "ID": "b563a08c-658f-47da-95fc-cd836749c413", "DetectTime": "2023-10-30T14:01:51.499108+02:00", "EventTime": "2023-10-30T14:01:51.499127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CiBHuqlKIV2FEXmoc"]} -{"Format": "IDEA0", "ID": "0a6f0b27-650d-441f-98f9-52e250dbe0bc", "DetectTime": "2023-10-30T14:01:51.525766+02:00", "EventTime": "2023-10-30T14:01:51.525791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CQCIuG4QijtBx076Nf"]} -{"Format": "IDEA0", "ID": "174c1714-2ead-495f-8407-2deeba4abc6e", "DetectTime": "2023-10-30T14:01:51.557343+02:00", "EventTime": "2023-10-30T14:01:51.557370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CMF8z9m1Duxh46MV7"]} -{"Format": "IDEA0", "ID": "8e9860db-7093-475e-9f93-9afb8c663c88", "DetectTime": "2023-10-30T14:01:51.585142+02:00", "EventTime": "2023-10-30T14:01:51.585159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.61.86.78 ", "ContentType": "text/plain"}], "uids": ["CVyk6G3TGlxLOpfCQ9"]} -{"Format": "IDEA0", "ID": "39c6f16b-b389-419a-a8d9-b77af8d01319", "DetectTime": "2023-10-30T14:01:51.620242+02:00", "EventTime": "2023-10-30T14:01:51.620261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CTZJPa2sa0iDEByWN7"]} -{"Format": "IDEA0", "ID": "27984cd5-680d-40d9-84d9-edbed3a8e951", "DetectTime": "2023-10-30T14:01:51.649645+02:00", "EventTime": "2023-10-30T14:01:51.649661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CRYo892oClQZhWFIWl"]} -{"Format": "IDEA0", "ID": "6646b59f-b5eb-4cd0-b52e-f85cdba168bf", "DetectTime": "2023-10-30T14:01:51.681421+02:00", "EventTime": "2023-10-30T14:01:51.681439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CskIIW2nwCdhysNSJk"]} -{"Format": "IDEA0", "ID": "c4631d74-3e72-43eb-98e7-e637f5e404bc", "DetectTime": "2023-10-30T14:01:51.708841+02:00", "EventTime": "2023-10-30T14:01:51.708852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CP6ZOy2F7pXvXk9V72"]} -{"Format": "IDEA0", "ID": "3dd8a4df-fd1d-4ea4-9c3a-c15c24e0fd79", "DetectTime": "2023-10-30T14:01:51.738084+02:00", "EventTime": "2023-10-30T14:01:51.738103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CBHqbr2yx8VEieohyj"]} -{"Format": "IDEA0", "ID": "d923e0d4-7bcb-4d9b-832f-301ec797cc3a", "DetectTime": "2023-10-30T14:01:51.767367+02:00", "EventTime": "2023-10-30T14:01:51.767382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CiJkqc2WM4d5e5tcQa"]} -{"Format": "IDEA0", "ID": "d85a0c60-81a5-402a-af1f-a074c89b4a07", "DetectTime": "2023-10-30T14:01:51.797196+02:00", "EventTime": "2023-10-30T14:01:51.797214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CPZIDl1gmaym5LWnof"]} -{"Format": "IDEA0", "ID": "0d6a94c1-3bfa-4d53-8d68-1ff218d9fe46", "DetectTime": "2023-10-30T14:01:51.825986+02:00", "EventTime": "2023-10-30T14:01:51.826008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Ca6xn91ui4ndenTEfe"]} -{"Format": "IDEA0", "ID": "db005473-9d16-440a-b347-69985f782d37", "DetectTime": "2023-10-30T14:01:51.851438+02:00", "EventTime": "2023-10-30T14:01:51.851454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CthfBq1VnjkVHPQaki"]} -{"Format": "IDEA0", "ID": "783baf2c-0ce2-4788-91f3-219989e83a28", "DetectTime": "2023-10-30T14:01:51.877301+02:00", "EventTime": "2023-10-30T14:01:51.877318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["C33sHa4teSZw9n8tfg"]} -{"Format": "IDEA0", "ID": "203f990b-f77c-4814-b9a3-70853b5982f8", "DetectTime": "2023-10-30T14:01:51.901776+02:00", "EventTime": "2023-10-30T14:01:51.901793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Cj940OT3RPSMxucJ3"]} -{"Format": "IDEA0", "ID": "dab9a6d9-ff3e-4932-9b12-014e8df4980c", "DetectTime": "2023-10-30T14:01:51.927089+02:00", "EventTime": "2023-10-30T14:01:51.927106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.97.55 ", "ContentType": "text/plain"}], "uids": ["CiMUuA2z0LLfTXg6Me"]} -{"Format": "IDEA0", "ID": "a1086088-7834-4165-b81d-5ab3c9d75400", "DetectTime": "2023-10-30T14:01:51.955318+02:00", "EventTime": "2023-10-30T14:01:51.955333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C6enZZ3LZH9OnoXsqf"]} -{"Format": "IDEA0", "ID": "584ffcd1-d511-4cbd-ba80-b370254d76c3", "DetectTime": "2023-10-30T14:01:51.983770+02:00", "EventTime": "2023-10-30T14:01:51.983784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.144 ", "ContentType": "text/plain"}], "uids": ["CWCEuV3sVUAWX0ckw9"]} -{"Format": "IDEA0", "ID": "d08e09e0-da75-49e6-8272-68bc8f652d68", "DetectTime": "2023-10-30T14:01:52.013991+02:00", "EventTime": "2023-10-30T14:01:52.014006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["CKSNys2o58kixHIDu3"]} -{"Format": "IDEA0", "ID": "66f108b9-2f4f-44b2-aa7f-614ad3ae5bd1", "DetectTime": "2023-10-30T14:01:52.042938+02:00", "EventTime": "2023-10-30T14:01:52.042966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.61.86.78 ", "ContentType": "text/plain"}], "uids": ["CdIBapKN6x04PcOCh"]} -{"Format": "IDEA0", "ID": "4358c8e2-6ebd-4443-9a27-f8f5ebf352af", "DetectTime": "2023-10-30T14:01:52.071885+02:00", "EventTime": "2023-10-30T14:01:52.071902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["Cuym421KBdBAivVMQk"]} -{"Format": "IDEA0", "ID": "51c54c97-1e2e-468b-84e2-d0709f37ee2c", "DetectTime": "2023-10-30T14:01:52.107375+02:00", "EventTime": "2023-10-30T14:01:52.107391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C6Vii74477rRN80Aj2"]} -{"Format": "IDEA0", "ID": "5aa06932-824f-4c78-b2a2-dedacfed8bc5", "DetectTime": "2023-10-30T14:01:52.140532+02:00", "EventTime": "2023-10-30T14:01:52.140548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CLeQ4WsBPLAOt6uy"]} -{"Format": "IDEA0", "ID": "768575e4-174a-4f23-80c7-468616c4d459", "DetectTime": "2023-10-30T14:01:52.166750+02:00", "EventTime": "2023-10-30T14:01:52.166768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CGTJZA1X6MslyIfj4"]} -{"Format": "IDEA0", "ID": "1b43ede7-ad22-47a7-975e-686fff1b2c10", "DetectTime": "2023-10-30T14:01:52.192842+02:00", "EventTime": "2023-10-30T14:01:52.192859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["COorhN7F1A6sBgeBf"]} -{"Format": "IDEA0", "ID": "00483696-d248-4f17-8986-c1e8d17161e6", "DetectTime": "2023-10-30T14:01:52.234609+02:00", "EventTime": "2023-10-30T14:01:52.234629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["Cp0FZk15FPnuykNQd8"]} -{"Format": "IDEA0", "ID": "6366c274-ee12-47ea-961d-8f73287afe81", "DetectTime": "2023-10-30T14:01:52.263523+02:00", "EventTime": "2023-10-30T14:01:52.263539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CIyCmN39GtP24nOOS6"]} -{"Format": "IDEA0", "ID": "38aabc4d-3af1-45f0-8c1f-c10c21d342c9", "DetectTime": "2023-10-30T14:01:52.289973+02:00", "EventTime": "2023-10-30T14:01:52.289993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CTcl7M2s5AoxguFAm"]} -{"Format": "IDEA0", "ID": "3bbf901a-f91d-4415-9007-193165adec27", "DetectTime": "2023-10-30T14:01:52.319983+02:00", "EventTime": "2023-10-30T14:01:52.320004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Cc1wuD1HeaAtFMRYe8"]} -{"Format": "IDEA0", "ID": "08379455-54db-4ac0-a5d7-67e48e159a43", "DetectTime": "2023-10-30T14:01:52.346441+02:00", "EventTime": "2023-10-30T14:01:52.346461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.254.84.17 ", "ContentType": "text/plain"}], "uids": ["CnHTHF1LnAcAd5Aotd"]} -{"Format": "IDEA0", "ID": "0c042de4-6861-4e0d-99c3-641da63f04cc", "DetectTime": "2023-10-30T14:01:52.377210+02:00", "EventTime": "2023-10-30T14:01:52.377228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.25.212.195 ", "ContentType": "text/plain"}], "uids": ["CESKRE3Pw97XxJ16md"]} -{"Format": "IDEA0", "ID": "ab9451a1-3f57-4bde-abf9-d46033db284f", "DetectTime": "2023-10-30T14:01:52.405492+02:00", "EventTime": "2023-10-30T14:01:52.405511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["CZqYlR2BdF8DyKVsCc"]} -{"Format": "IDEA0", "ID": "79618ee3-fa29-457f-9332-58e76b1b54b9", "DetectTime": "2023-10-30T14:01:52.435424+02:00", "EventTime": "2023-10-30T14:01:52.435438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.25.212.195 ", "ContentType": "text/plain"}], "uids": ["CKHh4y3JOSPQTFffFg"]} -{"Format": "IDEA0", "ID": "50ebefa3-b989-438a-ad9c-c8e2ebe3d54b", "DetectTime": "2023-10-30T14:01:52.461959+02:00", "EventTime": "2023-10-30T14:01:52.461974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["CnRIKV2XKsvdeROwHd"]} -{"Format": "IDEA0", "ID": "6db9b6e8-606d-48e8-83cf-28765f8ac625", "DetectTime": "2023-10-30T14:01:52.488547+02:00", "EventTime": "2023-10-30T14:01:52.488563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CrDVEm47IBWc3rgKw4"]} -{"Format": "IDEA0", "ID": "720005eb-ffc0-467a-ba0e-adbbb4a2a6f0", "DetectTime": "2023-10-30T14:01:52.515168+02:00", "EventTime": "2023-10-30T14:01:52.515186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Ca4tU92exoLbDR5uH4"]} -{"Format": "IDEA0", "ID": "db040776-5be0-4fba-9deb-5072d3f17697", "DetectTime": "2023-10-30T14:01:52.545795+02:00", "EventTime": "2023-10-30T14:01:52.545814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["CYHBsc1LWgjttf5OH7"]} -{"Format": "IDEA0", "ID": "8f0e1267-e639-47ff-b954-cb1f81b20c14", "DetectTime": "2023-10-30T14:01:52.573998+02:00", "EventTime": "2023-10-30T14:01:52.574015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CXfPyp1Y3TybIYJJ61"]} -{"Format": "IDEA0", "ID": "133acca0-d4ac-44e1-98de-07c3d7782d47", "DetectTime": "2023-10-30T14:01:52.604526+02:00", "EventTime": "2023-10-30T14:01:52.604543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["ClRqs619k4lS17AWUk"]} -{"Format": "IDEA0", "ID": "692c4029-5b7e-4a44-a2aa-450880bcc71c", "DetectTime": "2023-10-30T14:01:52.632780+02:00", "EventTime": "2023-10-30T14:01:52.632794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CuxD3MHfF5VZmej3g"]} -{"Format": "IDEA0", "ID": "7e2cf363-48e0-4657-9bd8-7e17ba484ebb", "DetectTime": "2023-10-30T14:01:52.662741+02:00", "EventTime": "2023-10-30T14:01:52.662771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.254.84.17 ", "ContentType": "text/plain"}], "uids": ["CGApw38FItceF6GOk"]} -{"Format": "IDEA0", "ID": "f4da2f22-f7b4-4e69-80a3-f4ca942e8bc5", "DetectTime": "2023-10-30T14:01:52.689170+02:00", "EventTime": "2023-10-30T14:01:52.689182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.140.158.40 ", "ContentType": "text/plain"}], "uids": ["C9ZHNh2pv4P4ijCu6l"]} -{"Format": "IDEA0", "ID": "0515af6d-7624-4e71-9f4e-a1d9f35f3a19", "DetectTime": "2023-10-30T14:01:52.718563+02:00", "EventTime": "2023-10-30T14:01:52.718576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CGiUDs4zxZHdjBJmE3"]} -{"Format": "IDEA0", "ID": "07254f14-84f9-4b0e-87f6-8e76fa591b03", "DetectTime": "2023-10-30T14:01:52.747294+02:00", "EventTime": "2023-10-30T14:01:52.747327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CJbTOq7jydKeZcgm5"]} -{"Format": "IDEA0", "ID": "54148e34-4709-431f-87e4-9b5d6ced5dd6", "DetectTime": "2023-10-30T14:01:52.774895+02:00", "EventTime": "2023-10-30T14:01:52.774920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CTcZDk2c9F4zSmu8x7"]} -{"Format": "IDEA0", "ID": "2eb66241-8e5c-4497-aece-7f6a25aa80c8", "DetectTime": "2023-10-30T14:01:52.803537+02:00", "EventTime": "2023-10-30T14:01:52.803554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["Cng5IXEPFZqNUhPXl"]} -{"Format": "IDEA0", "ID": "5de03717-2b93-479d-812f-0516918813da", "DetectTime": "2023-10-30T14:01:52.848807+02:00", "EventTime": "2023-10-30T14:01:52.848827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCaEwpSPXhLj0yTdc"]} -{"Format": "IDEA0", "ID": "2f923732-159f-4f0f-b76d-816b991d9ca7", "DetectTime": "2023-10-30T14:01:52.883744+02:00", "EventTime": "2023-10-30T14:01:52.883760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Cu0QUs4enhm4JBOox4"]} -{"Format": "IDEA0", "ID": "a1b3ad34-0fa1-43a2-9cb7-b8e76bff19e0", "DetectTime": "2023-10-30T14:01:52.911911+02:00", "EventTime": "2023-10-30T14:01:52.911942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CSmmnq4jyyvJBvCzLj"]} -{"Format": "IDEA0", "ID": "2b7102c8-dd7b-4d22-8832-8594b69d40d5", "DetectTime": "2023-10-30T14:01:52.942825+02:00", "EventTime": "2023-10-30T14:01:52.942847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["C4eIa62fAMniwZm13l"]} -{"Format": "IDEA0", "ID": "d2672d26-7138-4649-ba9f-38df55e37c04", "DetectTime": "2023-10-30T14:01:52.972774+02:00", "EventTime": "2023-10-30T14:01:52.972791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["Cv9oza2O2oaMeqZPo7"]} -{"Format": "IDEA0", "ID": "47fcfbd3-eb93-44e4-9389-8714b51c8806", "DetectTime": "2023-10-30T14:01:53.003673+02:00", "EventTime": "2023-10-30T14:01:53.003703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["ClgPUB12RQDkaMyy39"]} -{"Format": "IDEA0", "ID": "594f90b4-83c4-4ba4-b68b-f90a8fd6d1a0", "DetectTime": "2023-10-30T14:01:53.035039+02:00", "EventTime": "2023-10-30T14:01:53.035065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CBw6ms4K0hY8Tjxsuc"]} -{"Format": "IDEA0", "ID": "eb3c7c41-3189-4177-9e50-c51a91988d98", "DetectTime": "2023-10-30T14:01:53.067897+02:00", "EventTime": "2023-10-30T14:01:53.067918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CrCOTq1LSNewBc8pfj"]} -{"Format": "IDEA0", "ID": "8ab8a571-9a39-4d8b-afc0-8ace6877b8c4", "DetectTime": "2023-10-30T14:01:53.101132+02:00", "EventTime": "2023-10-30T14:01:53.101149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["C98Ylb2Up9gBM3sdu6"]} -{"Format": "IDEA0", "ID": "a81ed6ae-1e68-4674-b4b5-fedd2bcbae51", "DetectTime": "2023-10-30T14:01:53.131442+02:00", "EventTime": "2023-10-30T14:01:53.131462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["CsoYQp4Q9VXNS52I3h"]} -{"Format": "IDEA0", "ID": "bd382315-bf4f-423e-9d68-f754edb48efa", "DetectTime": "2023-10-30T14:01:53.162977+02:00", "EventTime": "2023-10-30T14:01:53.162998+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9yk8l4naz4CYFaqle"]} -{"Format": "IDEA0", "ID": "2b472042-8b05-4991-a216-4919a6621748", "DetectTime": "2023-10-30T14:01:53.176218+02:00", "EventTime": "2023-10-30T14:01:53.176235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CquMCuhh7JkOROd2"]} -{"Format": "IDEA0", "ID": "b888a68c-0b8c-4fc8-a7b9-4dd25000695d", "DetectTime": "2023-10-30T14:01:53.207488+02:00", "EventTime": "2023-10-30T14:01:53.207505+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYggYx3TfQTSp9VEyi"]} -{"Format": "IDEA0", "ID": "32252244-5bd5-41a5-8482-9d0dfcefb1cb", "DetectTime": "2023-10-30T14:01:53.220114+02:00", "EventTime": "2023-10-30T14:01:53.220131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CZdUnjZYSpF3CaF29"]} -{"Format": "IDEA0", "ID": "96af9ebc-50b1-40ae-a093-fef2f03f6d23", "DetectTime": "2023-10-30T14:01:53.247926+02:00", "EventTime": "2023-10-30T14:01:53.247943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPU8A73UbDGcXCYq6l", "C9yk8l4naz4CYFaqle", "CovG4i3b5ynxI0LAll", "CV5DXq4kakEpdEnKna"]} -{"Format": "IDEA0", "ID": "9f7b3e3a-3d65-4d83-af87-84e809790ee3", "DetectTime": "2023-10-30T14:01:53.261950+02:00", "EventTime": "2023-10-30T14:01:53.261972+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CovG4i3b5ynxI0LAll"]} -{"Format": "IDEA0", "ID": "31287690-93ff-43af-a7f7-ce9afbce8bd6", "DetectTime": "2023-10-30T14:01:53.277787+02:00", "EventTime": "2023-10-30T14:01:53.277809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C7NwR63HPFeMoMHvi3"]} -{"Format": "IDEA0", "ID": "f2cf8ae2-7966-4159-80d0-33b4696b968c", "DetectTime": "2023-10-30T14:01:53.309734+02:00", "EventTime": "2023-10-30T14:01:53.309783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cq6mWt3rBBISqa6hC5"]} -{"Format": "IDEA0", "ID": "676bb378-28e7-493e-9656-d30d828a94ee", "DetectTime": "2023-10-30T14:01:53.339489+02:00", "EventTime": "2023-10-30T14:01:53.339515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqrXkc2fuAxmL4Gos5"]} -{"Format": "IDEA0", "ID": "5f926abb-e3e6-4935-a091-50b73943326d", "DetectTime": "2023-10-30T14:01:53.375239+02:00", "EventTime": "2023-10-30T14:01:53.375303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CmEwov1PAZshVez881"]} -{"Format": "IDEA0", "ID": "55996057-f531-4818-b356-de5a7bb6d5ac", "DetectTime": "2023-10-30T14:01:53.403567+02:00", "EventTime": "2023-10-30T14:01:53.403582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CNHgtA330sk0FLtZqb"]} -{"Format": "IDEA0", "ID": "7afd72fe-8c37-41a6-a2de-605ba5a10aaa", "DetectTime": "2023-10-30T14:01:53.434201+02:00", "EventTime": "2023-10-30T14:01:53.434214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.188.50 ", "ContentType": "text/plain"}], "uids": ["CTzk4gSwX5ajlwBYe"]} -{"Format": "IDEA0", "ID": "9f0d4d62-b378-47b7-8abf-56b8ef67ddd8", "DetectTime": "2023-10-30T14:01:53.462479+02:00", "EventTime": "2023-10-30T14:01:53.462501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CDCawP2mJr6564w4vk"]} -{"Format": "IDEA0", "ID": "003506e9-31b9-47d1-93bd-17614a839931", "DetectTime": "2023-10-30T14:01:53.494537+02:00", "EventTime": "2023-10-30T14:01:53.494560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.188.50 ", "ContentType": "text/plain"}], "uids": ["CSqRBq2zCov9hLQfll"]} -{"Format": "IDEA0", "ID": "4b213bba-366f-4a8e-83bb-b7c9b1294783", "DetectTime": "2023-10-30T14:01:53.524937+02:00", "EventTime": "2023-10-30T14:01:53.524954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CAHTSO3JlGaMckWuWj"]} -{"Format": "IDEA0", "ID": "fe4d4c30-3c47-4eea-ad58-d1d71bf1ac86", "DetectTime": "2023-10-30T14:01:53.551767+02:00", "EventTime": "2023-10-30T14:01:53.551787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.144 ", "ContentType": "text/plain"}], "uids": ["CsrA2G3ExBFeAlbYzj"]} -{"Format": "IDEA0", "ID": "d0c0da02-ee4d-4219-b748-c87e793fa64c", "DetectTime": "2023-10-30T14:01:53.582184+02:00", "EventTime": "2023-10-30T14:01:53.582205+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1OzFj24NPQRcEaEB1"]} -{"Format": "IDEA0", "ID": "3a1434ed-39e1-4822-ba7a-fe2e9c6fa271", "DetectTime": "2023-10-30T14:01:53.595303+02:00", "EventTime": "2023-10-30T14:01:53.595326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cs2puw4KWAd1MxMoHj"]} -{"Format": "IDEA0", "ID": "757ef0ac-fc8b-4b17-92b1-ec78dbed934c", "DetectTime": "2023-10-30T14:01:53.620534+02:00", "EventTime": "2023-10-30T14:01:53.620547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6dMnM3Xi1fdK3Bgr5"]} -{"Format": "IDEA0", "ID": "e8709a8d-830d-4903-a728-8a5377d5a285", "DetectTime": "2023-10-30T14:01:53.651252+02:00", "EventTime": "2023-10-30T14:01:53.651270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CHb1z839jcn1jyEGs7"]} -{"Format": "IDEA0", "ID": "4a39f913-964c-49f0-ad0a-8fb6eba7bada", "DetectTime": "2023-10-30T14:01:53.682091+02:00", "EventTime": "2023-10-30T14:01:53.682113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["COe5dO2Plv12taZtae"]} -{"Format": "IDEA0", "ID": "49804806-cb9f-46f7-965e-c72ee3d116d9", "DetectTime": "2023-10-30T14:01:53.711476+02:00", "EventTime": "2023-10-30T14:01:53.711498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["CWggofbmfixCEpmo"]} -{"Format": "IDEA0", "ID": "1e42bcb9-37f2-440b-a0ee-60722369359d", "DetectTime": "2023-10-30T14:01:53.741764+02:00", "EventTime": "2023-10-30T14:01:53.741787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C288rU2TNY9jfbUKFa"]} -{"Format": "IDEA0", "ID": "87dcb72c-3ed8-4c4a-b497-2a8cad7f9705", "DetectTime": "2023-10-30T14:01:53.770826+02:00", "EventTime": "2023-10-30T14:01:53.770853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CBnPaw1HBXm1TmvaLc"]} -{"Format": "IDEA0", "ID": "7baf84de-357b-43ef-a413-a3bf236c7b56", "DetectTime": "2023-10-30T14:01:53.800579+02:00", "EventTime": "2023-10-30T14:01:53.800611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CDRFJPeN1jGuz4k45"]} -{"Format": "IDEA0", "ID": "f278deb0-c31b-4d2e-a248-d515805bf05d", "DetectTime": "2023-10-30T14:01:53.827644+02:00", "EventTime": "2023-10-30T14:01:53.827670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C6J6CT3HF6EyTicjM6"]} -{"Format": "IDEA0", "ID": "b5f3ccf4-03ff-41ee-9273-1aaa0dade73e", "DetectTime": "2023-10-30T14:01:53.857735+02:00", "EventTime": "2023-10-30T14:01:53.857749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.140.158.40 ", "ContentType": "text/plain"}], "uids": ["CkEr7214LOlHlwauJ2"]} -{"Format": "IDEA0", "ID": "a92d9fb8-bc80-4563-b63c-9690cb3f9056", "DetectTime": "2023-10-30T14:01:53.884534+02:00", "EventTime": "2023-10-30T14:01:53.884545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Czkjaq2OnzqElEwPf6"]} -{"Format": "IDEA0", "ID": "dd20c04b-85fb-4e3f-ae63-b25f866653a6", "DetectTime": "2023-10-30T14:01:53.927757+02:00", "EventTime": "2023-10-30T14:01:53.927777+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHIw6XSRWWWROQVO1"]} -{"Format": "IDEA0", "ID": "211dd1c1-06e8-465f-b39d-3c310fc902c8", "DetectTime": "2023-10-30T14:01:53.941484+02:00", "EventTime": "2023-10-30T14:01:53.941509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CtfzaGuTpu5In8M2"]} -{"Format": "IDEA0", "ID": "a4ee5cfd-451f-479a-b162-356f4e4c0bb5", "DetectTime": "2023-10-30T14:01:53.982999+02:00", "EventTime": "2023-10-30T14:01:53.983017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["CaVoND3RBjPkvIUhF3"]} -{"Format": "IDEA0", "ID": "6628af9c-5dcd-4763-bf98-cb01e6bf3f1f", "DetectTime": "2023-10-30T14:01:54.011986+02:00", "EventTime": "2023-10-30T14:01:54.012036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["Cdw2nj337vGGnsatMh"]} -{"Format": "IDEA0", "ID": "72b79ffd-0be2-41fa-b44d-bf078f38f19f", "DetectTime": "2023-10-30T14:01:54.054313+02:00", "EventTime": "2023-10-30T14:01:54.054334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.97.55 ", "ContentType": "text/plain"}], "uids": ["CIq2n42Qq462pT3r3b"]} -{"Format": "IDEA0", "ID": "5342740f-e463-491c-bb1d-9d667c2c65d8", "DetectTime": "2023-10-30T14:01:54.084772+02:00", "EventTime": "2023-10-30T14:01:54.084786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.61.86.78 ", "ContentType": "text/plain"}], "uids": ["CYn21h4ZXlKk1n8zQj"]} -{"Format": "IDEA0", "ID": "34e35f0d-6c45-46a8-bf74-a6a4b5168c28", "DetectTime": "2023-10-30T14:01:54.112127+02:00", "EventTime": "2023-10-30T14:01:54.112150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C2NkOS15j1GzKoIGp7"]} -{"Format": "IDEA0", "ID": "9b4b52de-c8a0-4bc8-ab11-61b067336dce", "DetectTime": "2023-10-30T14:01:54.139512+02:00", "EventTime": "2023-10-30T14:01:54.139529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C2XTPX3tl4xfkIqPC"]} -{"Format": "IDEA0", "ID": "9977674b-5b69-4167-b6df-7d5e9430642c", "DetectTime": "2023-10-30T14:01:54.167928+02:00", "EventTime": "2023-10-30T14:01:54.167950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CtufKi1UNhwGriZbek"]} -{"Format": "IDEA0", "ID": "b0dbc4e9-dc0e-4f13-a78a-287b9ee6cfde", "DetectTime": "2023-10-30T14:01:54.200413+02:00", "EventTime": "2023-10-30T14:01:54.200432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["Cj0UT240nZ7I7UPSCg"]} -{"Format": "IDEA0", "ID": "a46dc890-0b16-472b-b16b-f203c7a35717", "DetectTime": "2023-10-30T14:01:54.235513+02:00", "EventTime": "2023-10-30T14:01:54.235579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CfMsSL2OQiyRWOz0Kb"]} -{"Format": "IDEA0", "ID": "fe3789a3-9978-4801-ab96-a622e83ee34c", "DetectTime": "2023-10-30T14:01:54.282330+02:00", "EventTime": "2023-10-30T14:01:54.282358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["COmTvw876lDvT6GJ2"]} -{"Format": "IDEA0", "ID": "1720f74c-1e87-4ee6-b4ec-8838b280428e", "DetectTime": "2023-10-30T14:01:54.333188+02:00", "EventTime": "2023-10-30T14:01:54.333208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CIuZD73VFbsGs0Js29"]} -{"Format": "IDEA0", "ID": "ae030688-1420-494f-b338-0c967a930af1", "DetectTime": "2023-10-30T14:01:54.365989+02:00", "EventTime": "2023-10-30T14:01:54.366010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["C1qF1s4TrNSt104E85"]} -{"Format": "IDEA0", "ID": "9ab7386e-dfd8-453d-82bb-4c95c3defefa", "DetectTime": "2023-10-30T14:01:54.395035+02:00", "EventTime": "2023-10-30T14:01:54.395056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CzCbuM1TOXLXJ0QI8h"]} -{"Format": "IDEA0", "ID": "0d225980-0c2c-4255-a664-bb57b89dcbc3", "DetectTime": "2023-10-30T14:01:54.437708+02:00", "EventTime": "2023-10-30T14:01:54.437736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["CeQEiI3rlVZpphVwPf"]} -{"Format": "IDEA0", "ID": "39ebc5d2-7e2a-4e61-a069-f22f7a9ea8b1", "DetectTime": "2023-10-30T14:01:54.468519+02:00", "EventTime": "2023-10-30T14:01:54.468538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["CYUMuB4Nr9XEV0guCa"]} -{"Format": "IDEA0", "ID": "d5b120ba-6875-4e67-acf8-1ee6a54aec32", "DetectTime": "2023-10-30T14:01:54.497025+02:00", "EventTime": "2023-10-30T14:01:54.497042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CyVqJn12UQil1sTt0l"]} -{"Format": "IDEA0", "ID": "ee1b32f0-be23-4c77-a0b5-fb9495056b2f", "DetectTime": "2023-10-30T14:01:54.528193+02:00", "EventTime": "2023-10-30T14:01:54.528212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CTT76U29gDn0cJOBaa"]} -{"Format": "IDEA0", "ID": "81d7f783-52e0-4de4-945e-f0085d67fa74", "DetectTime": "2023-10-30T14:01:54.564657+02:00", "EventTime": "2023-10-30T14:01:54.564674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.140.158.40 ", "ContentType": "text/plain"}], "uids": ["Cvzucs4rxU3MR5mfDj"]} -{"Format": "IDEA0", "ID": "081cb96a-dcc5-45f6-b6d2-929c5d0f70ae", "DetectTime": "2023-10-30T14:01:54.594312+02:00", "EventTime": "2023-10-30T14:01:54.594333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CYddRYumC4qjOMIr3"]} -{"Format": "IDEA0", "ID": "beea3285-b001-48f4-a0de-3ed76e484bb4", "DetectTime": "2023-10-30T14:01:54.621967+02:00", "EventTime": "2023-10-30T14:01:54.621988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CT5CcfgFNEyAMAC64"]} -{"Format": "IDEA0", "ID": "711bae45-0b6c-4c17-b330-bc8756364023", "DetectTime": "2023-10-30T14:01:54.636407+02:00", "EventTime": "2023-10-30T14:01:54.636420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["Cg0JMC4OmxqpJFYaK2"]} -{"Format": "IDEA0", "ID": "730d17c0-36aa-4902-bdb6-8216884e9ff0", "DetectTime": "2023-10-30T14:01:54.669486+02:00", "EventTime": "2023-10-30T14:01:54.669501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["C4hLDBNIAJ1cRemti"]} -{"Format": "IDEA0", "ID": "a174d787-c9e0-4557-8aac-c6f3e3e740a9", "DetectTime": "2023-10-30T14:01:54.699470+02:00", "EventTime": "2023-10-30T14:01:54.699487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CZDzPd4DVahoOBvNEc"]} -{"Format": "IDEA0", "ID": "7c16e84d-7cd4-4a6a-8517-d8eab5a7d9c4", "DetectTime": "2023-10-30T14:01:54.727912+02:00", "EventTime": "2023-10-30T14:01:54.727932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["C61zmE4H8poPJ89cGf"]} -{"Format": "IDEA0", "ID": "7fedc5c0-9e09-4409-ae31-78782153cacb", "DetectTime": "2023-10-30T14:01:54.755670+02:00", "EventTime": "2023-10-30T14:01:54.755686+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIYa1r6tRwAYT5JCb"]} -{"Format": "IDEA0", "ID": "689cf604-e4b9-4774-bf08-ba00a8994c10", "DetectTime": "2023-10-30T14:01:54.770523+02:00", "EventTime": "2023-10-30T14:01:54.770541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.144 ", "ContentType": "text/plain"}], "uids": ["Cuj8Rj1xpRxdqooErh"]} -{"Format": "IDEA0", "ID": "4a60a9e9-0cd9-4a06-aa07-147e52b140d1", "DetectTime": "2023-10-30T14:01:54.799848+02:00", "EventTime": "2023-10-30T14:01:54.799860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CTq4H5q0yC2cDwP9"]} -{"Format": "IDEA0", "ID": "5514a02a-aed2-4d37-84a3-347da0e98179", "DetectTime": "2023-10-30T14:01:54.842723+02:00", "EventTime": "2023-10-30T14:01:54.842743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CuiZOD1EiOhSOSi2h"]} -{"Format": "IDEA0", "ID": "8672a0dc-2240-4201-9702-a96e24346b6d", "DetectTime": "2023-10-30T14:01:54.870936+02:00", "EventTime": "2023-10-30T14:01:54.870955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CKU2TE1cJiTZfCLk07"]} -{"Format": "IDEA0", "ID": "deea2b67-6f96-47d6-b8e8-050298d7bf6a", "DetectTime": "2023-10-30T14:01:54.898282+02:00", "EventTime": "2023-10-30T14:01:54.898301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.188.50 ", "ContentType": "text/plain"}], "uids": ["CBJEIz2DgOQ3rqN8Ki"]} -{"Format": "IDEA0", "ID": "7636c88d-3dc0-455e-abfa-9f5da4d4643c", "DetectTime": "2023-10-30T14:01:54.925113+02:00", "EventTime": "2023-10-30T14:01:54.925134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.131.97.55 ", "ContentType": "text/plain"}], "uids": ["CgZaul1L0XAUHERiQ4"]} -{"Format": "IDEA0", "ID": "8c48544a-37c1-4d3b-b272-1defc8ce6396", "DetectTime": "2023-10-30T14:01:54.953994+02:00", "EventTime": "2023-10-30T14:01:54.954020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CYUtzkQtmWcFnP7Y6"]} -{"Format": "IDEA0", "ID": "c006cd67-7ce7-4ea2-acd2-94e9cea92de9", "DetectTime": "2023-10-30T14:01:54.982718+02:00", "EventTime": "2023-10-30T14:01:54.982735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CJVHXo1nsA8ecglCkd"]} -{"Format": "IDEA0", "ID": "a6bec614-6e31-4eed-8b7a-8d42701d30ac", "DetectTime": "2023-10-30T14:01:55.008928+02:00", "EventTime": "2023-10-30T14:01:55.008947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C5t7cz3FVHJgFhoRzh"]} -{"Format": "IDEA0", "ID": "c4d579cf-ce72-4a65-9515-9ffa689b78fb", "DetectTime": "2023-10-30T14:01:55.037187+02:00", "EventTime": "2023-10-30T14:01:55.037199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["CnCfVRL5OuKwVawv4"]} -{"Format": "IDEA0", "ID": "c7c054b9-102b-40f7-944f-734df52ee333", "DetectTime": "2023-10-30T14:01:55.064315+02:00", "EventTime": "2023-10-30T14:01:55.064334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CtgdAJZssY9gOsEHd"]} -{"Format": "IDEA0", "ID": "cb7aaab7-7ad3-4a86-b637-1b3a22ff880a", "DetectTime": "2023-10-30T14:01:55.106438+02:00", "EventTime": "2023-10-30T14:01:55.106455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CxbUCD1YQx23oKmmVj"]} -{"Format": "IDEA0", "ID": "7985f42c-853f-489c-8d72-e56477b8f404", "DetectTime": "2023-10-30T14:01:55.148603+02:00", "EventTime": "2023-10-30T14:01:55.148628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CauWW827iV6cnmGpWf"]} -{"Format": "IDEA0", "ID": "547d6538-d513-4a62-9608-ac414ce69762", "DetectTime": "2023-10-30T14:01:55.178703+02:00", "EventTime": "2023-10-30T14:01:55.178726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CpbQ8Mfp7F4gR9xuk"]} -{"Format": "IDEA0", "ID": "111d806d-766a-4d74-93bf-9fa48cdbbe44", "DetectTime": "2023-10-30T14:01:55.207823+02:00", "EventTime": "2023-10-30T14:01:55.207842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["C1XjQ034n0UbSbIjR1"]} -{"Format": "IDEA0", "ID": "f9165ffa-f935-4f7f-a9b5-43b841c76ffc", "DetectTime": "2023-10-30T14:01:55.236130+02:00", "EventTime": "2023-10-30T14:01:55.236148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CvuaVMHLJKF97ti1f"]} -{"Format": "IDEA0", "ID": "bdb20f3c-9cb7-4cb6-befa-047ffa4c0d5b", "DetectTime": "2023-10-30T14:01:55.267147+02:00", "EventTime": "2023-10-30T14:01:55.267167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["Cjodde45ZTWOXmZ7dc"]} -{"Format": "IDEA0", "ID": "16f168aa-3e71-43a8-a81a-bd05c098e66c", "DetectTime": "2023-10-30T14:01:55.297090+02:00", "EventTime": "2023-10-30T14:01:55.297105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.61.86.78 ", "ContentType": "text/plain"}], "uids": ["CwH1FEb1GMb7hfXre"]} -{"Format": "IDEA0", "ID": "20ac77ed-78eb-463a-b68d-b759aeff426c", "DetectTime": "2023-10-30T14:01:55.324892+02:00", "EventTime": "2023-10-30T14:01:55.324908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CqpZuT3gji8VzLK0a"]} -{"Format": "IDEA0", "ID": "ceef12b1-23de-473b-b471-ef1fe8e64e7f", "DetectTime": "2023-10-30T14:01:55.365559+02:00", "EventTime": "2023-10-30T14:01:55.365577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CZwGTY1gRFU2OPQUoh"]} -{"Format": "IDEA0", "ID": "763a43c2-a410-408b-b14f-5af7ca1c75d1", "DetectTime": "2023-10-30T14:01:55.395482+02:00", "EventTime": "2023-10-30T14:01:55.395506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CWyYjg2dYNyrYQs8l"]} -{"Format": "IDEA0", "ID": "96e7c8fe-c6d2-4b5c-8201-acb22bbcf327", "DetectTime": "2023-10-30T14:01:55.423349+02:00", "EventTime": "2023-10-30T14:01:55.423374+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjXdmWj1IKdiDaMil"]} -{"Format": "IDEA0", "ID": "f3b5a914-fbfc-4eff-81da-10d3211ffa60", "DetectTime": "2023-10-30T14:01:55.437045+02:00", "EventTime": "2023-10-30T14:01:55.437057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["Cl2gr32xswu6jKRxWd"]} -{"Format": "IDEA0", "ID": "0429a26a-c737-4804-be2f-6a0aa3870f8b", "DetectTime": "2023-10-30T14:01:55.465178+02:00", "EventTime": "2023-10-30T14:01:55.465196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CHEmUA4Q8CR29wKFOe"]} -{"Format": "IDEA0", "ID": "d9e386c3-07b1-4128-afaf-c1ac749c647c", "DetectTime": "2023-10-30T14:01:55.493572+02:00", "EventTime": "2023-10-30T14:01:55.493588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CQkKi22Y0Xjj19HG8l"]} -{"Format": "IDEA0", "ID": "7b40bfb8-0cf7-4fea-89a4-8611d011d751", "DetectTime": "2023-10-30T14:01:55.522508+02:00", "EventTime": "2023-10-30T14:01:55.522535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["C0PAQo1ljE059GZbJf"]} -{"Format": "IDEA0", "ID": "c345d3d7-c58b-4ea5-ba6d-fa953af54210", "DetectTime": "2023-10-30T14:01:55.553525+02:00", "EventTime": "2023-10-30T14:01:55.553551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CcpWi21q5FVd7B7HQf"]} -{"Format": "IDEA0", "ID": "06cc9112-58a6-42e5-b86f-be530e2008ea", "DetectTime": "2023-10-30T14:01:55.601047+02:00", "EventTime": "2023-10-30T14:01:55.601074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CIBP08390gjCh5Bch8"]} -{"Format": "IDEA0", "ID": "66bcf6a3-9f2e-47c6-a7d8-7ce2ded2829b", "DetectTime": "2023-10-30T14:01:55.630118+02:00", "EventTime": "2023-10-30T14:01:55.630137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C0TQ6w4Rlk6gOuJY9h"]} -{"Format": "IDEA0", "ID": "5e53512d-e9b9-4128-8ab7-030005ab1b2d", "DetectTime": "2023-10-30T14:01:55.657372+02:00", "EventTime": "2023-10-30T14:01:55.657391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CIbbSE4wJ3f5UcA2od"]} -{"Format": "IDEA0", "ID": "92969167-6eb9-4d3d-9567-6976ea2d452c", "DetectTime": "2023-10-30T14:01:55.684229+02:00", "EventTime": "2023-10-30T14:01:55.684244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["Cgnhmx2Aw2p6RDVpUa"]} -{"Format": "IDEA0", "ID": "c5d5294f-179f-4227-9aed-472b162f1070", "DetectTime": "2023-10-30T14:01:55.712255+02:00", "EventTime": "2023-10-30T14:01:55.712274+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CX79Dz2A3LnvtThmkd"]} -{"Format": "IDEA0", "ID": "37bad97a-28e7-4e53-9a63-bbd38ce70d5f", "DetectTime": "2023-10-30T14:01:55.724849+02:00", "EventTime": "2023-10-30T14:01:55.724862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CyMbRt2AwGq40TTgNi"]} -{"Format": "IDEA0", "ID": "838ac1ad-1223-4de9-80ac-932a22e1101c", "DetectTime": "2023-10-30T14:01:55.753677+02:00", "EventTime": "2023-10-30T14:01:55.753696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["CQDHVd4pdop4xizEgd"]} -{"Format": "IDEA0", "ID": "b49b85cc-7923-4786-9ff9-b2a7cd6393ff", "DetectTime": "2023-10-30T14:01:55.781878+02:00", "EventTime": "2023-10-30T14:01:55.781895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CxhUDu33BDIxIRZcq2"]} -{"Format": "IDEA0", "ID": "723cfe2d-9bd6-479a-b594-6df8ca5c3a6d", "DetectTime": "2023-10-30T14:01:55.810606+02:00", "EventTime": "2023-10-30T14:01:55.810631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C6zIpz2xF0DzE1Tqj5"]} -{"Format": "IDEA0", "ID": "b87f4e82-e31f-467d-a6fe-d62dfcfac01e", "DetectTime": "2023-10-30T14:01:55.838271+02:00", "EventTime": "2023-10-30T14:01:55.838288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["Cmhrrw3aBo8AvVu3Za"]} -{"Format": "IDEA0", "ID": "5c86e6cc-31d1-49c5-8d07-cfe003dbfe59", "DetectTime": "2023-10-30T14:01:55.867377+02:00", "EventTime": "2023-10-30T14:01:55.867396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["COtqUr2U4iA6m0JYVb"]} -{"Format": "IDEA0", "ID": "cd1b2d34-07bc-45dc-9eee-9614776c0f87", "DetectTime": "2023-10-30T14:01:55.893850+02:00", "EventTime": "2023-10-30T14:01:55.893876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["Cc2hMb24zR2TKivNP"]} -{"Format": "IDEA0", "ID": "08067820-56da-45f3-b86c-92526d0ddc61", "DetectTime": "2023-10-30T14:01:55.924095+02:00", "EventTime": "2023-10-30T14:01:55.924115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CSxv1y4A8L5zVftXxc"]} -{"Format": "IDEA0", "ID": "4c76a4e7-d570-4b91-a085-9ddd7b8c67a1", "DetectTime": "2023-10-30T14:01:55.951750+02:00", "EventTime": "2023-10-30T14:01:55.951766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C0RyQ83wd9Q0Hm8UU2"]} -{"Format": "IDEA0", "ID": "7e9452be-d0a9-4b14-b7da-890a4249d74d", "DetectTime": "2023-10-30T14:01:55.979411+02:00", "EventTime": "2023-10-30T14:01:55.979426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C0fvDc13OCmmT9aJ4d"]} -{"Format": "IDEA0", "ID": "a7cfe22c-7fc4-434c-aa0e-ecff76594bad", "DetectTime": "2023-10-30T14:01:56.005125+02:00", "EventTime": "2023-10-30T14:01:56.005137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C011z23EvIRflZ3gT"]} -{"Format": "IDEA0", "ID": "51595916-94ed-46f8-a988-15751e2248b1", "DetectTime": "2023-10-30T14:01:56.035539+02:00", "EventTime": "2023-10-30T14:01:56.035559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["Cx3vzf1FbXEmbSAD1h"]} -{"Format": "IDEA0", "ID": "edd911bb-f435-4c94-897d-638c26933af4", "DetectTime": "2023-10-30T14:01:56.063107+02:00", "EventTime": "2023-10-30T14:01:56.063125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CyAMKJ2FDZCOjVYFBi"]} -{"Format": "IDEA0", "ID": "d863892a-1cd8-4744-8e97-40c16cc88147", "DetectTime": "2023-10-30T14:01:56.102917+02:00", "EventTime": "2023-10-30T14:01:56.102938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C6qfHExl8LV7qOZL6"]} -{"Format": "IDEA0", "ID": "8e3a85d8-f5f1-4adb-bc90-90762a4af729", "DetectTime": "2023-10-30T14:01:56.131574+02:00", "EventTime": "2023-10-30T14:01:56.131593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CjuuUs4kbbBlu1B5i6"]} -{"Format": "IDEA0", "ID": "c0d706af-22e5-444b-8315-7d77c17958dc", "DetectTime": "2023-10-30T14:01:56.161138+02:00", "EventTime": "2023-10-30T14:01:56.161154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cbi5qF3VdXcgxuw4l1"]} -{"Format": "IDEA0", "ID": "c15064ba-71e7-4970-823d-d97b905806d3", "DetectTime": "2023-10-30T14:01:56.189386+02:00", "EventTime": "2023-10-30T14:01:56.189401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Chr2gEC6MSMKbWsd9"]} -{"Format": "IDEA0", "ID": "2f737902-8f09-424f-8661-6c2eaa0f740e", "DetectTime": "2023-10-30T14:01:56.217071+02:00", "EventTime": "2023-10-30T14:01:56.217089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CXe6Pu2hjh3Wv0Cod2"]} -{"Format": "IDEA0", "ID": "be747881-8c54-4a03-b625-14a98bd36eac", "DetectTime": "2023-10-30T14:01:56.246223+02:00", "EventTime": "2023-10-30T14:01:56.246246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C31yJg3oxWuikHnaB5"]} -{"Format": "IDEA0", "ID": "b1a2e5a5-2282-465f-901f-4de09a01af13", "DetectTime": "2023-10-30T14:01:56.274028+02:00", "EventTime": "2023-10-30T14:01:56.274045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLPjv447zFPIo8URic"]} -{"Format": "IDEA0", "ID": "bc9bc073-86f7-4baa-9e5f-75964ebe1203", "DetectTime": "2023-10-30T14:01:56.318640+02:00", "EventTime": "2023-10-30T14:01:56.318660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["COPjIKReVocKhbHAj"]} -{"Format": "IDEA0", "ID": "26d2102d-7001-4e31-8638-9d14a8cbead1", "DetectTime": "2023-10-30T14:01:56.346678+02:00", "EventTime": "2023-10-30T14:01:56.346706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C9Emp82aS9utpcGv96"]} -{"Format": "IDEA0", "ID": "006f2c1c-67d9-409a-b5d8-817e8c78b83f", "DetectTime": "2023-10-30T14:01:56.378693+02:00", "EventTime": "2023-10-30T14:01:56.378719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CUwgPW3cHUNmMXmMZd"]} -{"Format": "IDEA0", "ID": "52d96d7e-5488-4a54-9622-aa0c63fa3516", "DetectTime": "2023-10-30T14:01:56.409373+02:00", "EventTime": "2023-10-30T14:01:56.409396+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CX0fyw1KDkoKMgkDa7"]} -{"Format": "IDEA0", "ID": "cbdb002d-adf9-45ee-aa54-2bdabb645b15", "DetectTime": "2023-10-30T14:01:56.423474+02:00", "EventTime": "2023-10-30T14:01:56.423501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CmPCL5BhQ6p4rqnij"]} -{"Format": "IDEA0", "ID": "f70a0100-d34c-44e2-8a5a-e9477f8da667", "DetectTime": "2023-10-30T14:01:56.451949+02:00", "EventTime": "2023-10-30T14:01:56.451973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CPMbRh1LH4smgTxOz2"]} -{"Format": "IDEA0", "ID": "19386eda-8106-4eb4-986a-273d36944260", "DetectTime": "2023-10-30T14:01:56.482201+02:00", "EventTime": "2023-10-30T14:01:56.482224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["C713U13tMxIj6JhqZa"]} -{"Format": "IDEA0", "ID": "f659026e-e1cd-4bd6-bc99-b6468c2624ce", "DetectTime": "2023-10-30T14:01:56.514152+02:00", "EventTime": "2023-10-30T14:01:56.514174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C7TKCe2ORsKFPfuBO8"]} -{"Format": "IDEA0", "ID": "da1180d5-8e1d-43f6-a369-a0f4ddcd25c8", "DetectTime": "2023-10-30T14:01:56.543025+02:00", "EventTime": "2023-10-30T14:01:56.543046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CeKdSF2oeQr73V73s4"]} -{"Format": "IDEA0", "ID": "bde9bf5e-4eb6-43b0-affb-9aaf5bed8200", "DetectTime": "2023-10-30T14:01:56.572728+02:00", "EventTime": "2023-10-30T14:01:56.572746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.161.19.18 ", "ContentType": "text/plain"}], "uids": ["CG2VI74hmS2zeHAHB6"]} -{"Format": "IDEA0", "ID": "9235e41b-9388-4941-a238-fe2cafd675b6", "DetectTime": "2023-10-30T14:01:56.600563+02:00", "EventTime": "2023-10-30T14:01:56.600588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0rmX92LSO9qt3GxY2"]} -{"Format": "IDEA0", "ID": "0724f185-ff6e-4ed5-ba0b-8f51f4b9e395", "DetectTime": "2023-10-30T14:01:56.629015+02:00", "EventTime": "2023-10-30T14:01:56.629035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["C5Pxj1dw7BU2TVf4a"]} -{"Format": "IDEA0", "ID": "61412fc2-35e1-4184-941c-3bf609092b7a", "DetectTime": "2023-10-30T14:01:56.657083+02:00", "EventTime": "2023-10-30T14:01:56.657100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CnGtpP11CCeFjRqwie"]} -{"Format": "IDEA0", "ID": "f94ef5be-750e-4e75-988d-be497273da84", "DetectTime": "2023-10-30T14:01:56.686584+02:00", "EventTime": "2023-10-30T14:01:56.686601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C4hsTy3g7IneBxxH77", "CIYa1r6tRwAYT5JCb", "CHIw6XSRWWWROQVO1", "CX79Dz2A3LnvtThmkd"]} -{"Format": "IDEA0", "ID": "e746a00e-6dd5-43cd-9b01-c2608a59d2c8", "DetectTime": "2023-10-30T14:01:56.699216+02:00", "EventTime": "2023-10-30T14:01:56.699236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CM5SNy2ZayKfu9eH69"]} -{"Format": "IDEA0", "ID": "31a9598a-fcbc-486f-8d40-af41b1377368", "DetectTime": "2023-10-30T14:01:56.729286+02:00", "EventTime": "2023-10-30T14:01:56.729302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.140.64.3 ", "ContentType": "text/plain"}], "uids": ["Cekqqs2IFKNamsOEw6"]} -{"Format": "IDEA0", "ID": "4b02b734-a767-458c-b568-787813f26c46", "DetectTime": "2023-10-30T14:01:56.757712+02:00", "EventTime": "2023-10-30T14:01:56.757726+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4hsTy3g7IneBxxH77"]} -{"Format": "IDEA0", "ID": "c941a629-cb79-49bc-8cb8-22607eadbef7", "DetectTime": "2023-10-30T14:01:56.774410+02:00", "EventTime": "2023-10-30T14:01:56.774431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpfaLo2ZJjFqjxv06c"]} -{"Format": "IDEA0", "ID": "16d2930f-0a05-4bf0-8ed1-303c554dd89e", "DetectTime": "2023-10-30T14:01:56.803004+02:00", "EventTime": "2023-10-30T14:01:56.803021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CtAxAL1XTQQ4UKraOl"]} -{"Format": "IDEA0", "ID": "68fd14f9-c695-434b-9727-f76c6db9acd2", "DetectTime": "2023-10-30T14:01:56.831004+02:00", "EventTime": "2023-10-30T14:01:56.831022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CQtNI04P84VjbiSWl1"]} -{"Format": "IDEA0", "ID": "0672c9eb-3094-4749-acaa-7855887709d6", "DetectTime": "2023-10-30T14:01:56.862044+02:00", "EventTime": "2023-10-30T14:01:56.862062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CU1IjR1IEzQM4PJDw"]} -{"Format": "IDEA0", "ID": "d68f133b-68be-4a95-b2f2-1fd7179aeb1c", "DetectTime": "2023-10-30T14:01:56.895312+02:00", "EventTime": "2023-10-30T14:01:56.895334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCkGry3s1MciNqKlJk"]} -{"Format": "IDEA0", "ID": "11db2bb2-79b4-4299-9bf5-c77f7cf375d5", "DetectTime": "2023-10-30T14:01:56.940108+02:00", "EventTime": "2023-10-30T14:01:56.940121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["CLJ7iI2Kf7c3eVnwRe"]} -{"Format": "IDEA0", "ID": "70c022df-bb73-4d31-969c-7b4ae1ba2ea8", "DetectTime": "2023-10-30T14:01:56.972526+02:00", "EventTime": "2023-10-30T14:01:56.972543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["Crdk122W2BGRIWGAUi"]} -{"Format": "IDEA0", "ID": "77472396-feb8-4230-beaf-a63a0f477c3d", "DetectTime": "2023-10-30T14:01:57.001509+02:00", "EventTime": "2023-10-30T14:01:57.001528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.121.78 ", "ContentType": "text/plain"}], "uids": ["Cvqnwh3iTuOCeL5E25"]} -{"Format": "IDEA0", "ID": "dc5410c7-db35-4bb3-a3fc-cc0b2f8f5e5b", "DetectTime": "2023-10-30T14:01:57.028940+02:00", "EventTime": "2023-10-30T14:01:57.028957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cid8XX23pKH873fKRi"]} -{"Format": "IDEA0", "ID": "322f82a6-eeb0-41fb-843b-8ca963e4bf3d", "DetectTime": "2023-10-30T14:01:57.067496+02:00", "EventTime": "2023-10-30T14:01:57.067516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CigIobNk33JyDVxeb"]} -{"Format": "IDEA0", "ID": "14301d47-7165-4774-b2b3-22c25117dd21", "DetectTime": "2023-10-30T14:01:57.100256+02:00", "EventTime": "2023-10-30T14:01:57.100276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CxT8Wn1SlJJ3J3Nji7"]} -{"Format": "IDEA0", "ID": "a687fe20-dbf2-44f9-bcec-ee3e8c83ae48", "DetectTime": "2023-10-30T14:01:57.142088+02:00", "EventTime": "2023-10-30T14:01:57.142107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cr3xhI3x45qevIa7Ch"]} -{"Format": "IDEA0", "ID": "4e68fe56-ba50-48c7-8fa7-730d3b343db5", "DetectTime": "2023-10-30T14:01:57.180253+02:00", "EventTime": "2023-10-30T14:01:57.180271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CKRJ5E11VIAC6KnRsc"]} -{"Format": "IDEA0", "ID": "15ad3e9f-0b3d-4314-88c0-5de1382ab752", "DetectTime": "2023-10-30T14:01:57.223215+02:00", "EventTime": "2023-10-30T14:01:57.223235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CtJQKU1m3yjrIJmSul"]} -{"Format": "Json", "ID": "15ad3e9f-0b3d-4314-88c0-5de1382ab752", "DetectTime": "2023-10-30T14:01:57.223215+02:00", "EventTime": "2023-10-30T14:01:57.223235+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:16:35.089330+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:57.298230)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "284387da-e4a7-494a-9b2f-e65a3829172e", "DetectTime": "2023-10-30T14:01:57.304740+02:00", "EventTime": "2023-10-30T14:01:57.304768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CxqDcp30R3AwvPafGj"]} -{"Format": "IDEA0", "ID": "87f2198c-db6d-485b-b03d-4eaa13844f66", "DetectTime": "2023-10-30T14:01:57.347506+02:00", "EventTime": "2023-10-30T14:01:57.347524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["CRc4RN50CCKblwNfg"]} -{"Format": "IDEA0", "ID": "d28d6402-ec00-43f8-9a5e-6894804f5405", "DetectTime": "2023-10-30T14:01:57.386618+02:00", "EventTime": "2023-10-30T14:01:57.386648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9Lk1XxY3AOtGiAS"]} -{"Format": "IDEA0", "ID": "f7d3e58f-32b2-4e09-84c3-93ac07677c50", "DetectTime": "2023-10-30T14:01:57.402819+02:00", "EventTime": "2023-10-30T14:01:57.402840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CXfW3m2aSg3u5FonQa"]} -{"Format": "IDEA0", "ID": "0b8e369b-024a-4f07-b62e-45daf4ebf34d", "DetectTime": "2023-10-30T14:01:57.454277+02:00", "EventTime": "2023-10-30T14:01:57.454298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["CPHCVrYIChFN8Mcz3"]} -{"Format": "IDEA0", "ID": "57b8407c-2f01-40c6-b9b4-b3755f82e40f", "DetectTime": "2023-10-30T14:01:57.496609+02:00", "EventTime": "2023-10-30T14:01:57.496631+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJArc81XKSIl7S7oDd"]} -{"Format": "IDEA0", "ID": "ff09bb79-3d18-4147-87b8-a2cac02601e8", "DetectTime": "2023-10-30T14:01:57.508895+02:00", "EventTime": "2023-10-30T14:01:57.508919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["Cw2cym4mOo5Lp2wal5"]} -{"Format": "IDEA0", "ID": "b66bc219-168c-4103-8566-0c79f8147555", "DetectTime": "2023-10-30T14:01:57.553833+02:00", "EventTime": "2023-10-30T14:01:57.553853+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0J9LT2nGyXZYzOuA9"]} -{"Format": "IDEA0", "ID": "c30876d6-fa94-4326-a477-92043a34dca8", "DetectTime": "2023-10-30T14:01:57.568454+02:00", "EventTime": "2023-10-30T14:01:57.568471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXDKbE2dwk3Tx1kwo3"]} -{"Format": "IDEA0", "ID": "d49e85dd-bb33-41d0-843f-591b6d5aeb2f", "DetectTime": "2023-10-30T14:01:57.609602+02:00", "EventTime": "2023-10-30T14:01:57.609620+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZ86gdYzsTuqKBrB"]} -{"Format": "IDEA0", "ID": "573aa8e4-f800-4ff9-a7e8-23790e66bc42", "DetectTime": "2023-10-30T14:01:57.623881+02:00", "EventTime": "2023-10-30T14:01:57.623901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CpLlcs3dO3ZbrhaK99"]} -{"Format": "IDEA0", "ID": "c273df58-233d-4a8d-8e02-14052e5fb118", "DetectTime": "2023-10-30T14:01:57.666339+02:00", "EventTime": "2023-10-30T14:01:57.666359+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cj8Pcy1b96VGsLIj67"]} -{"Format": "IDEA0", "ID": "f46ff8a7-b5be-4218-b478-c23fd9912a46", "DetectTime": "2023-10-30T14:01:57.679543+02:00", "EventTime": "2023-10-30T14:01:57.679556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C23YTL2fsF65tYqNRe"]} -{"Format": "Json", "ID": "f46ff8a7-b5be-4218-b478-c23fd9912a46", "DetectTime": "2023-10-30T14:01:57.679543+02:00", "EventTime": "2023-10-30T14:01:57.679556+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:48:12.574852+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:57.754558)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "178b90b9-b791-49c8-b7aa-b83e326d127a", "DetectTime": "2023-10-30T14:01:57.762415+02:00", "EventTime": "2023-10-30T14:01:57.762437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CTXgSC2agPZbWxtRic"]} -{"Format": "IDEA0", "ID": "63314eea-622b-463c-b0f3-60e105f58b3f", "DetectTime": "2023-10-30T14:01:57.803613+02:00", "EventTime": "2023-10-30T14:01:57.803627+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvyeSz34VYArJShBC2"]} -{"Format": "IDEA0", "ID": "f355df84-1394-4bb2-a604-18b66d832054", "DetectTime": "2023-10-30T14:01:57.817191+02:00", "EventTime": "2023-10-30T14:01:57.817207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CsrxvC3jfH88w5OHp1"]} -{"Format": "IDEA0", "ID": "f81bb4d7-45e6-46a3-bfd7-00769c749270", "DetectTime": "2023-10-30T14:01:57.855423+02:00", "EventTime": "2023-10-30T14:01:57.855445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C2XeRc2wQ548QsvUHi"]} -{"Format": "IDEA0", "ID": "cc95d8cd-ff08-46ff-b0dc-e4cfb8b43267", "DetectTime": "2023-10-30T14:01:57.892777+02:00", "EventTime": "2023-10-30T14:01:57.892798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CmQF7j2qF42GZGA6J7"]} -{"Format": "IDEA0", "ID": "357fa93e-f7b3-49e6-906f-f6dd4474d082", "DetectTime": "2023-10-30T14:01:57.930228+02:00", "EventTime": "2023-10-30T14:01:57.930253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C1wMC044NvtAJIOFBb"]} -{"Format": "IDEA0", "ID": "ddd0afdc-b079-4f00-9c6c-9556b168a87a", "DetectTime": "2023-10-30T14:01:57.963557+02:00", "EventTime": "2023-10-30T14:01:57.963585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CfgJuj4VGLcEHHZkOg"]} -{"Format": "IDEA0", "ID": "ccbb412a-c421-4560-8837-33021003b72e", "DetectTime": "2023-10-30T14:01:58.003694+02:00", "EventTime": "2023-10-30T14:01:58.003715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CgE3Nd3Vfy8Dd6x93j"]} -{"Format": "IDEA0", "ID": "61b7db42-dd15-4bc6-84be-f9673148ff08", "DetectTime": "2023-10-30T14:01:58.040240+02:00", "EventTime": "2023-10-30T14:01:58.040264+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkCX123KRpfHlKgSE8"]} -{"Format": "IDEA0", "ID": "e470ac68-b22f-4648-81da-93e8f75bed4b", "DetectTime": "2023-10-30T14:01:58.054046+02:00", "EventTime": "2023-10-30T14:01:58.054064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CBTZIE1WRGRpVj55uf"]} -{"Format": "IDEA0", "ID": "5f0f1ec9-ac46-4980-9aa3-25215fc4744e", "DetectTime": "2023-10-30T14:01:58.091237+02:00", "EventTime": "2023-10-30T14:01:58.091254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CiNqTw1oiQMiTeiZh7"]} -{"Format": "Json", "ID": "5f0f1ec9-ac46-4980-9aa3-25215fc4744e", "DetectTime": "2023-10-30T14:01:58.091237+02:00", "EventTime": "2023-10-30T14:01:58.091254+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:48:32.403350+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:58.165091)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "418a0b67-3f8b-4ae5-add7-ef28f355798c", "DetectTime": "2023-10-30T14:01:58.170089+02:00", "EventTime": "2023-10-30T14:01:58.170107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CTwp7B3E45rFBpq2Ed"]} -{"Format": "IDEA0", "ID": "b5d72261-4887-49e6-beb1-1623dba91aea", "DetectTime": "2023-10-30T14:01:58.207302+02:00", "EventTime": "2023-10-30T14:01:58.207318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C2Gl0A2s70iDWhIfga"]} -{"Format": "IDEA0", "ID": "b8bed838-57db-4be7-b197-5fd19ec824bf", "DetectTime": "2023-10-30T14:01:58.240182+02:00", "EventTime": "2023-10-30T14:01:58.240200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CEvv7RlArGzaQTz6g"]} -{"Format": "IDEA0", "ID": "f90b9843-7f05-41ed-9f89-6cf4c4e90cc3", "DetectTime": "2023-10-30T14:01:58.273618+02:00", "EventTime": "2023-10-30T14:01:58.273638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C1IZLC4jgKYn4ohsZ8"]} -{"Format": "IDEA0", "ID": "eb8b3559-fc53-49d9-91ea-28de4167d670", "DetectTime": "2023-10-30T14:01:58.308130+02:00", "EventTime": "2023-10-30T14:01:58.308156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CI0ioS3qm0lXhnbc05"]} -{"Format": "IDEA0", "ID": "25e3607f-7036-440f-ae2c-3208b47a5245", "DetectTime": "2023-10-30T14:01:58.346213+02:00", "EventTime": "2023-10-30T14:01:58.346235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CpaaRe2TZdsozs4Zrc"]} -{"Format": "IDEA0", "ID": "6c0a2c31-e631-4d2a-8868-d1db2c9206a9", "DetectTime": "2023-10-30T14:01:58.383091+02:00", "EventTime": "2023-10-30T14:01:58.383110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CwWbDV1ShX9kTmxOM6", "CvyeSz34VYArJShBC2", "CZ86gdYzsTuqKBrB", "CJArc81XKSIl7S7oDd"]} -{"Format": "IDEA0", "ID": "2d1f1aec-e42d-41c4-9940-ebf73c6c1931", "DetectTime": "2023-10-30T14:01:58.411461+02:00", "EventTime": "2023-10-30T14:01:58.411486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CqViyQ1Zt4NJFE8pKd"]} -{"Format": "IDEA0", "ID": "dce0b0f4-0cfe-4f77-a05f-489e1e6a1f15", "DetectTime": "2023-10-30T14:01:58.448602+02:00", "EventTime": "2023-10-30T14:01:58.448621+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwWbDV1ShX9kTmxOM6"]} -{"Format": "IDEA0", "ID": "9b2e4ca5-5775-41c1-9fb4-db91a978b75d", "DetectTime": "2023-10-30T14:01:58.472493+02:00", "EventTime": "2023-10-30T14:01:58.472520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CtPB0u2mdHGBs1LrT4"]} -{"Format": "Json", "ID": "9b2e4ca5-5775-41c1-9fb4-db91a978b75d", "DetectTime": "2023-10-30T14:01:58.472493+02:00", "EventTime": "2023-10-30T14:01:58.472520+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:48:33.882590+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:58.545007)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a10e38e9-e5c2-4ee3-bef3-58a59d93e695", "DetectTime": "2023-10-30T14:01:58.550999+02:00", "EventTime": "2023-10-30T14:01:58.551018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CI5yBa2r6XtK0OvvF"]} -{"Format": "IDEA0", "ID": "9909833a-2dd7-4cdd-b515-9d3519ecb700", "DetectTime": "2023-10-30T14:01:58.583470+02:00", "EventTime": "2023-10-30T14:01:58.583489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkNUZO29zlZPAVT4Q4"]} -{"Format": "IDEA0", "ID": "43001b4d-9b42-4e16-a78b-fbb5028594ff", "DetectTime": "2023-10-30T14:01:58.606721+02:00", "EventTime": "2023-10-30T14:01:58.606734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Co1jiWN06MpbNcOnf"]} -{"Format": "IDEA0", "ID": "8c1493f5-9575-46b6-b5e7-cdc6de006cea", "DetectTime": "2023-10-30T14:01:58.637957+02:00", "EventTime": "2023-10-30T14:01:58.637971+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPHg3D4zdADj9JS6lg"]} -{"Format": "IDEA0", "ID": "6fce8f82-3818-4294-a72d-12b26e60feae", "DetectTime": "2023-10-30T14:01:58.661506+02:00", "EventTime": "2023-10-30T14:01:58.661536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3201], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. ", "ContentType": "text/plain"}], "uids": ["C1Prw9ltU09HsdVQ9"]} -{"Format": "IDEA0", "ID": "96fad1e0-23d2-436b-b695-3efaa745aaa4", "DetectTime": "2023-10-30T14:01:58.693206+02:00", "EventTime": "2023-10-30T14:01:58.693255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CGQgat4CpWbFe43U53"]} -{"Format": "IDEA0", "ID": "d9cefc26-7863-443d-bce9-e59a3f364c3e", "DetectTime": "2023-10-30T14:01:58.725773+02:00", "EventTime": "2023-10-30T14:01:58.725794+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cbm1up4EgaKtFT9Hma"]} -{"Format": "IDEA0", "ID": "e32277d0-f0ab-4e23-ba4c-a39e5ceba636", "DetectTime": "2023-10-30T14:01:58.751102+02:00", "EventTime": "2023-10-30T14:01:58.751121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CID2PE2nmjQ6dKR5ik"]} -{"Format": "IDEA0", "ID": "e57ce63a-c32d-437d-9e95-ec599e9506ab", "DetectTime": "2023-10-30T14:01:58.786676+02:00", "EventTime": "2023-10-30T14:01:58.786701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["C74V9n44ia3lzZcpDl"]} -{"Format": "IDEA0", "ID": "866b1a2f-74e2-4f18-b164-3c63ac96ead1", "DetectTime": "2023-10-30T14:01:58.824849+02:00", "EventTime": "2023-10-30T14:01:58.824870+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQAOxJ1b2UGHNxXH1k"]} -{"Format": "IDEA0", "ID": "0c63dcc8-7908-4d64-aa2a-1e01f3da422c", "DetectTime": "2023-10-30T14:01:58.852159+02:00", "EventTime": "2023-10-30T14:01:58.852184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C7rzXp3aKOpurX0Qd3"]} -{"Format": "IDEA0", "ID": "c0bea5b2-6066-47c5-b7ee-ba888e6857d6", "DetectTime": "2023-10-30T14:01:58.890332+02:00", "EventTime": "2023-10-30T14:01:58.890351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CIRZD4qgEL3pkN6Mc"]} -{"Format": "Json", "ID": "c0bea5b2-6066-47c5-b7ee-ba888e6857d6", "DetectTime": "2023-10-30T14:01:58.890332+02:00", "EventTime": "2023-10-30T14:01:58.890351+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-02T23:48:35.088934+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2023/10/30 14:01:58.969642)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "114ca726-576d-4984-908d-47b57c62480c", "DetectTime": "2023-10-30T14:01:58.975608+02:00", "EventTime": "2023-10-30T14:01:58.975626+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Co0gK23tcMSXJ5ZnG1"]} -{"Format": "IDEA0", "ID": "d7bd85ac-2c92-47ad-8db6-7a5539c608f6", "DetectTime": "2023-10-30T14:01:59.005451+02:00", "EventTime": "2023-10-30T14:01:59.005474+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfvrP5nb8kTrfXQje"]} -{"Format": "IDEA0", "ID": "b7b53f56-dd36-4c45-b5f0-899670cbee8c", "DetectTime": "2023-10-30T14:01:59.032376+02:00", "EventTime": "2023-10-30T14:01:59.032401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcFW2cES8LSE4uCl5"]} -{"Format": "IDEA0", "ID": "b2582d6a-a905-424d-a0ac-5274b2aece1d", "DetectTime": "2023-10-30T14:01:59.069781+02:00", "EventTime": "2023-10-30T14:01:59.069803+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIB6feCBOYy2oyRS8"]} -{"Format": "IDEA0", "ID": "b5cbb3d5-f860-4faf-a1f9-ad5da30ce224", "DetectTime": "2023-10-30T14:01:59.095582+02:00", "EventTime": "2023-10-30T14:01:59.095611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CXmMzF4iz6LrCjFCpi", "CfvrP5nb8kTrfXQje", "CPHg3D4zdADj9JS6lg", "CQAOxJ1b2UGHNxXH1k"]} -{"Format": "IDEA0", "ID": "1c8d17f4-add2-412a-ac9e-fc0bc8067a61", "DetectTime": "2023-10-30T14:01:59.119442+02:00", "EventTime": "2023-10-30T14:01:59.119462+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXmMzF4iz6LrCjFCpi"]} -{"Format": "IDEA0", "ID": "8fdb798c-b8b1-4a05-92de-3d9a9e259f98", "DetectTime": "2023-10-30T14:01:59.145560+02:00", "EventTime": "2023-10-30T14:01:59.145578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CXrvn91xC50H7zHGv9"]} -{"Format": "IDEA0", "ID": "422e956b-f89d-4d5b-a621-928f75fea27f", "DetectTime": "2023-10-30T14:01:59.184062+02:00", "EventTime": "2023-10-30T14:01:59.184082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C7Ty9rwfRQx6LauD4"]} -{"Format": "IDEA0", "ID": "edeec0aa-e12c-4eea-883e-be34053a40ca", "DetectTime": "2023-10-30T14:01:59.220209+02:00", "EventTime": "2023-10-30T14:01:59.220229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CqG4xo2fqDeKjHEsK1"]} -{"Format": "IDEA0", "ID": "0ed025eb-a5c5-4ac3-a76c-a142f186fccd", "DetectTime": "2023-10-30T14:01:59.265902+02:00", "EventTime": "2023-10-30T14:01:59.265920+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsP1DN2DonjhZUBNtl"]} -{"Format": "IDEA0", "ID": "33e67c1f-11f3-4114-8e42-736b9ad495ad", "DetectTime": "2023-10-30T14:01:59.288654+02:00", "EventTime": "2023-10-30T14:01:59.288672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["Cgoxpv9Gk3m6NxUL8"]} -{"Format": "IDEA0", "ID": "4078488e-925b-4fcd-b525-537e20785a79", "DetectTime": "2023-10-30T14:01:59.335294+02:00", "EventTime": "2023-10-30T14:01:59.335448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CC56Wd3PlBXEnWTvTf"]} -{"Format": "IDEA0", "ID": "07629ef3-f0f9-4599-9ea3-38ae327b9d0a", "DetectTime": "2023-10-30T14:01:59.374624+02:00", "EventTime": "2023-10-30T14:01:59.374643+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcjPAJ31tct6Pc5w3k"]} -{"Format": "IDEA0", "ID": "8d2cddd6-fe8e-42b3-8764-896358e60063", "DetectTime": "2023-10-30T14:01:59.399342+02:00", "EventTime": "2023-10-30T14:01:59.399368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Csie694Eiw3X5JsZ2a"]} -{"Format": "Json", "ID": "8d2cddd6-fe8e-42b3-8764-896358e60063", "DetectTime": "2023-10-30T14:01:59.399342+02:00", "EventTime": "2023-10-30T14:01:59.399368+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T00:19:02.085407+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2023/10/30 14:01:59.479869)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6150cf81-13be-4e48-952f-f5ac989ce8f0", "DetectTime": "2023-10-30T14:01:59.484467+02:00", "EventTime": "2023-10-30T14:01:59.484491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["C1xba64KrawdeouW4i"]} -{"Format": "IDEA0", "ID": "db938858-3737-4b68-b95c-db9e48fd5329", "DetectTime": "2023-10-30T14:01:59.524334+02:00", "EventTime": "2023-10-30T14:01:59.524356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CpmjaK2jQ6MKHJnu52"]} -{"Format": "IDEA0", "ID": "13b31c5b-c92a-4af2-816d-46f50134792f", "DetectTime": "2023-10-30T14:01:59.566957+02:00", "EventTime": "2023-10-30T14:01:59.566975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CbTV623Wt7lrawDonk"]} -{"Format": "IDEA0", "ID": "f7e327b9-fd47-4f48-a861-1c537d92fc61", "DetectTime": "2023-10-30T14:01:59.606385+02:00", "EventTime": "2023-10-30T14:01:59.606409+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwoxhM3hIHFYb5WZHh"]} -{"Format": "IDEA0", "ID": "c2264ea5-dcb7-473b-b75c-b759ea4aa9d0", "DetectTime": "2023-10-30T14:01:59.632348+02:00", "EventTime": "2023-10-30T14:01:59.632366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C0cjzZgmv5ODEiOSk"]} -{"Format": "IDEA0", "ID": "e0595071-36ef-456a-9f90-2f5f08000946", "DetectTime": "2023-10-30T14:01:59.678740+02:00", "EventTime": "2023-10-30T14:01:59.678762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CfJyOd3JDB7ksLSxG7"]} -{"Format": "IDEA0", "ID": "d20e66d0-32fc-4cf8-bce6-52e08c2c6a32", "DetectTime": "2023-10-30T14:01:59.716504+02:00", "EventTime": "2023-10-30T14:01:59.716521+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4GyAu2pJ8COL8kuR3"]} -{"Format": "IDEA0", "ID": "f1fac015-da82-4592-ad98-3c77b4a94c07", "DetectTime": "2023-10-30T14:01:59.743726+02:00", "EventTime": "2023-10-30T14:01:59.743747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C7GysqwYWUikKf4rd"]} -{"Format": "IDEA0", "ID": "e30f3277-ed97-45a9-82e0-fdc8979151fc", "DetectTime": "2023-10-30T14:01:59.783075+02:00", "EventTime": "2023-10-30T14:01:59.783096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CV1pmm2HsLZSiiV9f5"]} -{"Format": "IDEA0", "ID": "68edcb38-d1e6-4668-95fb-8756aeea2959", "DetectTime": "2023-10-30T14:01:59.822319+02:00", "EventTime": "2023-10-30T14:01:59.822345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQwNSu49Of3VTWApj1"]} -{"Format": "Json", "ID": "68edcb38-d1e6-4668-95fb-8756aeea2959", "DetectTime": "2023-10-30T14:01:59.822319+02:00", "EventTime": "2023-10-30T14:01:59.822345+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T00:19:03.953130+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2023/10/30 14:01:59.897483)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "abc10451-409f-498f-9eab-3da91b5b33a4", "DetectTime": "2023-10-30T14:01:59.902890+02:00", "EventTime": "2023-10-30T14:01:59.902904+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cth4pB3iYIKI0YlzHc"]} -{"Format": "IDEA0", "ID": "3dfcf42b-0cd2-432b-9944-6b56dab58173", "DetectTime": "2023-10-30T14:01:59.930200+02:00", "EventTime": "2023-10-30T14:01:59.930228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C0m1mT1G8qgIjHOFw4"]} -{"Format": "IDEA0", "ID": "5d3a5c7a-8089-4804-a570-3fde3c7fa9f4", "DetectTime": "2023-10-30T14:01:59.969623+02:00", "EventTime": "2023-10-30T14:01:59.969646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CAOHaY2joC54tB04w6"]} -{"Format": "IDEA0", "ID": "a596f928-7922-4083-aa7a-3151eeb03252", "DetectTime": "2023-10-30T14:02:00.006739+02:00", "EventTime": "2023-10-30T14:02:00.006759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5nCG84rFtloZTTXQd"]} -{"Format": "IDEA0", "ID": "4e566d2c-4081-4e76-9ab6-ab0ef4ceaffa", "DetectTime": "2023-10-30T14:02:00.033004+02:00", "EventTime": "2023-10-30T14:02:00.033024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. ", "ContentType": "text/plain"}], "uids": ["CTvkY13g48yiZVO4Q6"]} -{"Format": "IDEA0", "ID": "73c938ff-82db-4764-9a2f-e8c99380c0c0", "DetectTime": "2023-10-30T14:02:00.072222+02:00", "EventTime": "2023-10-30T14:02:00.072249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CDE4oD1w3WCLR9ZWce"]} -{"Format": "IDEA0", "ID": "282e7b6e-b60f-4a9f-93b9-b82969de2f2f", "DetectTime": "2023-10-30T14:02:00.107522+02:00", "EventTime": "2023-10-30T14:02:00.107538+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8WnFT2W5X7igbAz0j"]} -{"Format": "IDEA0", "ID": "0de43e7e-ef71-4daf-bf3e-013b723c547c", "DetectTime": "2023-10-30T14:02:00.133571+02:00", "EventTime": "2023-10-30T14:02:00.133597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CVkOke179WdeIDJ5L3"]} -{"Format": "IDEA0", "ID": "df59e5a9-6119-45cf-8bbb-0b3b585f739d", "DetectTime": "2023-10-30T14:02:00.169736+02:00", "EventTime": "2023-10-30T14:02:00.169764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CWkvqLj5jBf0T1rI3"]} -{"Format": "IDEA0", "ID": "4a9bf522-6425-4825-ac27-93929abde100", "DetectTime": "2023-10-30T14:02:00.205775+02:00", "EventTime": "2023-10-30T14:02:00.205787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CjsPcH3hK6lyAVMi94", "CcjPAJ31tct6Pc5w3k", "C4GyAu2pJ8COL8kuR3", "C5nCG84rFtloZTTXQd"]} -{"Format": "IDEA0", "ID": "a0bdfdf6-e8c8-4ad9-9e8b-91c3b4e7c708", "DetectTime": "2023-10-30T14:02:00.233167+02:00", "EventTime": "2023-10-30T14:02:00.233185+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjsPcH3hK6lyAVMi94"]} -{"Format": "IDEA0", "ID": "d342beb4-d64d-4c9d-8105-2a16fb4704ab", "DetectTime": "2023-10-30T14:02:00.259699+02:00", "EventTime": "2023-10-30T14:02:00.259723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Cc82uk1h8d6FeoXpW1"]} -{"Format": "IDEA0", "ID": "736f5d32-c271-43ad-a25b-ab349efc93fe", "DetectTime": "2023-10-30T14:02:00.297747+02:00", "EventTime": "2023-10-30T14:02:00.297774+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPEVS52y8kZiqRLBPf"]} -{"Format": "IDEA0", "ID": "e8187c12-ab51-4263-a581-d4e44e53e9a6", "DetectTime": "2023-10-30T14:02:00.324049+02:00", "EventTime": "2023-10-30T14:02:00.324091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CWluTG28KkaIyyq8S4"]} -{"Format": "Json", "ID": "e8187c12-ab51-4263-a581-d4e44e53e9a6", "DetectTime": "2023-10-30T14:02:00.324049+02:00", "EventTime": "2023-10-30T14:02:00.324091+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T00:19:21.090120+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2023/10/30 14:02:00.394831)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c2ec3e23-bdd9-4aeb-a6c8-8b3deb3f7731", "DetectTime": "2023-10-30T14:02:00.401624+02:00", "EventTime": "2023-10-30T14:02:00.401641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CYHbts2FpF8Dxbg1ib"]} -{"Format": "IDEA0", "ID": "83d91e0d-70a3-4a16-aff8-44ff9a9cbc50", "DetectTime": "2023-10-30T14:02:00.437021+02:00", "EventTime": "2023-10-30T14:02:00.437038+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAjhxE2d3ZorbZ2XDk"]} -{"Format": "IDEA0", "ID": "431abbaa-2ac8-43d6-b09a-b46bb51569c6", "DetectTime": "2023-10-30T14:02:00.462079+02:00", "EventTime": "2023-10-30T14:02:00.462100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CLy5wm4ZrO9mfbXZuf"]} -{"Format": "IDEA0", "ID": "5d373185-9652-4e46-9689-8d669656398f", "DetectTime": "2023-10-30T14:02:00.491920+02:00", "EventTime": "2023-10-30T14:02:00.491936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5549], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. ", "ContentType": "text/plain"}], "uids": ["Clx2WZ1hQpNpNYVV51"]} -{"Format": "IDEA0", "ID": "1b8e09af-b0d2-4144-badb-9d300cc91b5d", "DetectTime": "2023-10-30T14:02:00.528950+02:00", "EventTime": "2023-10-30T14:02:00.528979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxNTYj4WeAjqk5gWDi"]} -{"Format": "IDEA0", "ID": "9cba1593-6b4f-4c40-b1ec-e24633b4b985", "DetectTime": "2023-10-30T14:02:00.567408+02:00", "EventTime": "2023-10-30T14:02:00.567438+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHXXZk2FQka3apUuu1"]} -{"Format": "IDEA0", "ID": "561c70cb-721e-4072-b52f-8fe6ebaffa1e", "DetectTime": "2023-10-30T14:02:00.591171+02:00", "EventTime": "2023-10-30T14:02:00.591188+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMg1uk4DpxAP5TVSN8"]} -{"Format": "IDEA0", "ID": "e50f9c42-1513-4097-bbbc-e0e410d1f19d", "DetectTime": "2023-10-30T14:02:00.618959+02:00", "EventTime": "2023-10-30T14:02:00.618984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CRqRr51cBPU8jHfhs5"]} -{"Format": "IDEA0", "ID": "78ab08bd-8691-4577-9434-47cbd3fd3461", "DetectTime": "2023-10-30T14:02:00.652054+02:00", "EventTime": "2023-10-30T14:02:00.652077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CDKsZL2zxHqpGnkoX3"]} -{"Format": "IDEA0", "ID": "5e737b9c-201f-487e-9f6d-303bf34ca6c2", "DetectTime": "2023-10-30T14:02:00.684857+02:00", "EventTime": "2023-10-30T14:02:00.684879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CbUn863nzy2T1jL1f9"]} -{"Format": "IDEA0", "ID": "47874b9b-4729-4ec5-b054-94760a496ceb", "DetectTime": "2023-10-30T14:02:00.720116+02:00", "EventTime": "2023-10-30T14:02:00.720134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CTwrmvpvdcSKOZQp6"]} -{"Format": "Json", "ID": "47874b9b-4729-4ec5-b054-94760a496ceb", "DetectTime": "2023-10-30T14:02:00.720116+02:00", "EventTime": "2023-10-30T14:02:00.720134+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T00:49:55.808410+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2023/10/30 14:02:00.781068)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "431b6794-d878-4065-90ee-010e2b750092", "DetectTime": "2023-10-30T14:02:00.787177+02:00", "EventTime": "2023-10-30T14:02:00.787196+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHhJAm1wuA6wA0rw88"]} -{"Format": "IDEA0", "ID": "cd2b7b76-a90c-4f48-bfea-93b8d680db39", "DetectTime": "2023-10-30T14:02:00.816840+02:00", "EventTime": "2023-10-30T14:02:00.816854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CbHXFL1m3w89fHhmLb"]} -{"Format": "IDEA0", "ID": "e775dbb4-ac13-46aa-bff3-d366b7b6dbbf", "DetectTime": "2023-10-30T14:02:00.847654+02:00", "EventTime": "2023-10-30T14:02:00.847675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CXhleZ3GtBPB20oopf"]} -{"Format": "IDEA0", "ID": "39df8f03-2150-41a3-a855-b2174e1a2f97", "DetectTime": "2023-10-30T14:02:00.874038+02:00", "EventTime": "2023-10-30T14:02:00.874058+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcC3pR2lNidbAf3Ruh"]} -{"Format": "IDEA0", "ID": "cb1fe4d2-3a98-4e3b-b78b-1b43e38921a5", "DetectTime": "2023-10-30T14:02:00.899380+02:00", "EventTime": "2023-10-30T14:02:00.899406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CscUhJSkJDwGKmUC3"]} -{"Format": "IDEA0", "ID": "ef697ec0-5d5d-41ea-b906-7fb865d3532c", "DetectTime": "2023-10-30T14:02:00.928384+02:00", "EventTime": "2023-10-30T14:02:00.928407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CzUicl3jF5zy4J626j"]} -{"Format": "IDEA0", "ID": "be7dfbf2-17d2-42ec-b87d-7a95b5864793", "DetectTime": "2023-10-30T14:02:00.956627+02:00", "EventTime": "2023-10-30T14:02:00.956651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["Cx9Cfj37WIRRkLsJFf"]} -{"Format": "IDEA0", "ID": "852532f9-0d27-4df9-9351-027a28be83f2", "DetectTime": "2023-10-30T14:02:00.985865+02:00", "EventTime": "2023-10-30T14:02:00.985895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cma9XWHaNB4j04ns8"]} -{"Format": "IDEA0", "ID": "f3085196-ac54-4c5a-9207-12b5f314db4f", "DetectTime": "2023-10-30T14:02:01.015476+02:00", "EventTime": "2023-10-30T14:02:01.015503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CUqppXOrH46BOh25"]} -{"Format": "IDEA0", "ID": "8022c831-b490-4689-b73d-77970d0ee0b4", "DetectTime": "2023-10-30T14:02:01.046496+02:00", "EventTime": "2023-10-30T14:02:01.046522+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNMJFp1bDTm164H2kf"]} -{"Format": "IDEA0", "ID": "552c4e36-b3e2-47c7-9aec-b4ac189206e1", "DetectTime": "2023-10-30T14:02:01.073039+02:00", "EventTime": "2023-10-30T14:02:01.073062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CVpGqy1Ka3bAfIafab"]} -{"Format": "Json", "ID": "552c4e36-b3e2-47c7-9aec-b4ac189206e1", "DetectTime": "2023-10-30T14:02:01.073039+02:00", "EventTime": "2023-10-30T14:02:01.073062+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T00:49:57.331549+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2023/10/30 14:02:01.155155)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3500c47f-ac5c-48d1-8a0c-6d0d3325613d", "DetectTime": "2023-10-30T14:02:01.162096+02:00", "EventTime": "2023-10-30T14:02:01.162112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIc3yI1VAPE2J5dlwa", "CAjhxE2d3ZorbZ2XDk", "CcC3pR2lNidbAf3Ruh", "CMg1uk4DpxAP5TVSN8"]} -{"Format": "IDEA0", "ID": "3f6337cf-dce2-4771-9b70-49f7b308e765", "DetectTime": "2023-10-30T14:02:01.190226+02:00", "EventTime": "2023-10-30T14:02:01.190252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CL8d5h1guOkVKa3cxi"]} -{"Format": "IDEA0", "ID": "600b7032-9434-421b-b63a-b754be27c2ae", "DetectTime": "2023-10-30T14:02:01.216661+02:00", "EventTime": "2023-10-30T14:02:01.216679+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIc3yI1VAPE2J5dlwa"]} -{"Format": "IDEA0", "ID": "ec2c31b4-2f94-47d1-8f73-eeba79948aeb", "DetectTime": "2023-10-30T14:02:01.245053+02:00", "EventTime": "2023-10-30T14:02:01.245080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["Chm29S2LT4h0Q1xwQi"]} -{"Format": "IDEA0", "ID": "22cf9f71-a7df-4c24-aac0-0fc3641bb9c0", "DetectTime": "2023-10-30T14:02:01.271485+02:00", "EventTime": "2023-10-30T14:02:01.271509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CNamGx1pjXrGHc4Dzf"]} -{"Format": "IDEA0", "ID": "25168eb9-cbf4-4e3e-81ac-d573f10c6eac", "DetectTime": "2023-10-30T14:02:01.298870+02:00", "EventTime": "2023-10-30T14:02:01.298891+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9zVS130ra2xea6753"]} -{"Format": "IDEA0", "ID": "78b9202e-d376-42ef-affc-7b18f9a412fd", "DetectTime": "2023-10-30T14:02:01.323508+02:00", "EventTime": "2023-10-30T14:02:01.323524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBn7261pfaNc0Pk64b"]} -{"Format": "IDEA0", "ID": "d8197ea2-e9cf-4362-ab2b-2b09d8cf0864", "DetectTime": "2023-10-30T14:02:01.354668+02:00", "EventTime": "2023-10-30T14:02:01.354694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C1Bfyc1DSt8XXAyxxb"]} -{"Format": "IDEA0", "ID": "771d0388-b621-4ee6-8b33-b6b730abba3e", "DetectTime": "2023-10-30T14:02:01.380987+02:00", "EventTime": "2023-10-30T14:02:01.381008+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGQi0N3v3m5Fd0AXX6"]} -{"Format": "IDEA0", "ID": "aaa265bf-6952-4a7c-9f6a-8c42fa8f25fe", "DetectTime": "2023-10-30T14:02:01.404909+02:00", "EventTime": "2023-10-30T14:02:01.404928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CM3kIP3K9LyO0IhsU1"]} -{"Format": "IDEA0", "ID": "8bd9eb58-e32d-4d41-8b51-b0631d4f8173", "DetectTime": "2023-10-30T14:02:01.432036+02:00", "EventTime": "2023-10-30T14:02:01.432060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cq2Skh8M2VHCn0LN3"]} -{"Format": "IDEA0", "ID": "a0c1c6c9-a866-4287-ae76-c8c6836e9e72", "DetectTime": "2023-10-30T14:02:01.461778+02:00", "EventTime": "2023-10-30T14:02:01.461796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CyYcku3BKqUXZMDXj4"]} -{"Format": "IDEA0", "ID": "55224dce-e882-46fa-a0ca-02d7da2557dd", "DetectTime": "2023-10-30T14:02:01.486770+02:00", "EventTime": "2023-10-30T14:02:01.486841+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWZFLn2UbByUjpsN6c"]} -{"Format": "IDEA0", "ID": "51e18e30-517b-42c2-bb27-7f74cc5ee61a", "DetectTime": "2023-10-30T14:02:01.511577+02:00", "EventTime": "2023-10-30T14:02:01.511599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CBp5biI68CXKmBLD8"]} -{"Format": "Json", "ID": "51e18e30-517b-42c2-bb27-7f74cc5ee61a", "DetectTime": "2023-10-30T14:02:01.511577+02:00", "EventTime": "2023-10-30T14:02:01.511599+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T00:50:17.970497+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2023/10/30 14:02:01.563804)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e9e04cb5-0fb7-4665-b231-f482c8c82f81", "DetectTime": "2023-10-30T14:02:01.569982+02:00", "EventTime": "2023-10-30T14:02:01.570007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT5wji3djjS9axNFy7"]} -{"Format": "IDEA0", "ID": "5bb152b7-f859-4511-a539-97234fbcede4", "DetectTime": "2023-10-30T14:02:01.602895+02:00", "EventTime": "2023-10-30T14:02:01.602923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Ci0KJF2fVwFppdM27h"]} -{"Format": "IDEA0", "ID": "6c74f90c-d118-45ea-a521-571bcffa8263", "DetectTime": "2023-10-30T14:02:01.624839+02:00", "EventTime": "2023-10-30T14:02:01.624859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CO34OK2SaQv908L2L1"]} -{"Format": "IDEA0", "ID": "91d11b85-2f7d-4f8f-8277-8af3a9c114c2", "DetectTime": "2023-10-30T14:02:01.649257+02:00", "EventTime": "2023-10-30T14:02:01.649279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cyk2Wh1bLSp4HgWPy3"]} -{"Format": "IDEA0", "ID": "f5326d07-c3e9-4f09-84fa-bafcf5713777", "DetectTime": "2023-10-30T14:02:01.716813+02:00", "EventTime": "2023-10-30T14:02:01.716837+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUOlZf4yyx4PaSh01f"]} -{"Format": "IDEA0", "ID": "11da39a3-db18-4f2a-a01c-998e7e13e306", "DetectTime": "2023-10-30T14:02:01.740757+02:00", "EventTime": "2023-10-30T14:02:01.740774+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.48.165"], "Hostname": ["cpe-188-129-48-165.dynamic.amis.hr Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 188.129.48.165 from 10.0.2.19. blacklisted IP AS: AMIS, HR AS29485 rDNS: cpe-188-129-48-165.dynamic.amis.hr Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CvkwUweMO2JetnOB8"]} -{"Format": "IDEA0", "ID": "9d0c481b-73f1-49f0-8ef6-247b50b6f84c", "DetectTime": "2023-10-30T14:02:01.794892+02:00", "EventTime": "2023-10-30T14:02:01.794911+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCUcfd2RAv4GVP4XR"]} -{"Format": "IDEA0", "ID": "93ed97d9-ce2b-4957-aa39-3ceb945dc6ec", "DetectTime": "2023-10-30T14:02:01.819636+02:00", "EventTime": "2023-10-30T14:02:01.819661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CKaI6z2oCchSG5IU0e"]} -{"Format": "IDEA0", "ID": "28882fc6-3339-4a47-a586-2ae668b2c215", "DetectTime": "2023-10-30T14:02:01.880454+02:00", "EventTime": "2023-10-30T14:02:01.880478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CNzOjN3PfkYZ0wpJb6"]} -{"Format": "IDEA0", "ID": "72d1f828-3383-420a-8e65-d20a8cd510c1", "DetectTime": "2023-10-30T14:02:01.943653+02:00", "EventTime": "2023-10-30T14:02:01.943680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CYtRsQ2XPHh2ZbeoAd"]} -{"Format": "IDEA0", "ID": "1e37b97b-1f5e-4bdc-afaf-59e9a4856070", "DetectTime": "2023-10-30T14:02:02.006298+02:00", "EventTime": "2023-10-30T14:02:02.006313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CPYxPAUfb5nXkfGOe"]} -{"Format": "IDEA0", "ID": "27f71652-504a-489f-bd63-5b45265b7e8a", "DetectTime": "2023-10-30T14:02:02.068247+02:00", "EventTime": "2023-10-30T14:02:02.068265+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKgshp4FtbAmCiFzGl"]} -{"Format": "IDEA0", "ID": "5385d237-c20a-4dc2-b188-399980efab68", "DetectTime": "2023-10-30T14:02:02.094515+02:00", "EventTime": "2023-10-30T14:02:02.094567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CE1RRV1CITfIPZjEeb"]} -{"Format": "IDEA0", "ID": "a0a0df17-a43a-4822-b6d3-6307227b73d2", "DetectTime": "2023-10-30T14:02:02.154474+02:00", "EventTime": "2023-10-30T14:02:02.154503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CYj0aK1Ii2eu21iWJd"]} -{"Format": "Json", "ID": "a0a0df17-a43a-4822-b6d3-6307227b73d2", "DetectTime": "2023-10-30T14:02:02.154474+02:00", "EventTime": "2023-10-30T14:02:02.154503+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:22:28.273169+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:02.272487)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a371444d-8e11-4a8c-85e8-ab81c441126a", "DetectTime": "2023-10-30T14:02:02.278397+02:00", "EventTime": "2023-10-30T14:02:02.278413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CeGWQi1BZfpcf2g506"]} -{"Format": "IDEA0", "ID": "688302b3-1ee6-4e24-857a-31cda28c960b", "DetectTime": "2023-10-30T14:02:02.335547+02:00", "EventTime": "2023-10-30T14:02:02.335564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CTHNSk3noXKKMKD2tk"]} -{"Format": "IDEA0", "ID": "a702d66a-f411-4867-b8f3-6965dd511355", "DetectTime": "2023-10-30T14:02:02.389953+02:00", "EventTime": "2023-10-30T14:02:02.389972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CRS5qg3tuJnROmkVml"]} -{"Format": "IDEA0", "ID": "7a4f0f6a-64b2-478a-be77-41ab246406b8", "DetectTime": "2023-10-30T14:02:02.454859+02:00", "EventTime": "2023-10-30T14:02:02.454879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C2vOLxmbWEHlgaq6k"]} -{"Format": "IDEA0", "ID": "cfe2a40e-585e-44ad-a5aa-4b69d929a4b8", "DetectTime": "2023-10-30T14:02:02.516147+02:00", "EventTime": "2023-10-30T14:02:02.516165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CUJCg34zrICwyfHLT9"]} -{"Format": "IDEA0", "ID": "48d3b3cf-496b-4a5f-bb7f-196c0e0a8c60", "DetectTime": "2023-10-30T14:02:02.577218+02:00", "EventTime": "2023-10-30T14:02:02.577245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CptpsD2G9GcMx6o20l"]} -{"Format": "IDEA0", "ID": "f7a7ba27-362d-45f8-99f5-e609d2b59abd", "DetectTime": "2023-10-30T14:02:02.633900+02:00", "EventTime": "2023-10-30T14:02:02.633919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CiqB621nmHICSkyrm2"]} -{"Format": "IDEA0", "ID": "42c4fe31-90fd-4444-ac53-14d3a8be5285", "DetectTime": "2023-10-30T14:02:02.689086+02:00", "EventTime": "2023-10-30T14:02:02.689112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CU9i8D32fae5WDGg83"]} -{"Format": "Json", "ID": "42c4fe31-90fd-4444-ac53-14d3a8be5285", "DetectTime": "2023-10-30T14:02:02.689086+02:00", "EventTime": "2023-10-30T14:02:02.689112+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:22:29.249222+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:02.773848)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d5294f47-3027-4850-a04f-fe16c8d5beac", "DetectTime": "2023-10-30T14:02:02.780792+02:00", "EventTime": "2023-10-30T14:02:02.780816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CvmfOGzjzuqDe6TSj", "CCUcfd2RAv4GVP4XR", "CT5wji3djjS9axNFy7", "CGQi0N3v3m5Fd0AXX6"]} -{"Format": "IDEA0", "ID": "7900087e-cec3-4e46-96e5-980d039483ca", "DetectTime": "2023-10-30T14:02:02.806739+02:00", "EventTime": "2023-10-30T14:02:02.806759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvmfOGzjzuqDe6TSj"]} -{"Format": "IDEA0", "ID": "a2dccc8f-9235-4533-a79e-cb65f4e22ac2", "DetectTime": "2023-10-30T14:02:02.839115+02:00", "EventTime": "2023-10-30T14:02:02.839141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CtotjM2YwlkyUg7Hf4"]} -{"Format": "IDEA0", "ID": "970d9786-1022-4cd0-960e-dd2c1e13d901", "DetectTime": "2023-10-30T14:02:02.897720+02:00", "EventTime": "2023-10-30T14:02:02.897746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CWC7pG2Yrz4WZnnowc"]} -{"Format": "IDEA0", "ID": "ff08ba78-f8c4-4454-b628-f486f6368df6", "DetectTime": "2023-10-30T14:02:02.953377+02:00", "EventTime": "2023-10-30T14:02:02.953397+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cse6RN3DQbceHb3UOh"]} -{"Format": "IDEA0", "ID": "ab014b65-13d6-4223-a02f-cf61a88f8008", "DetectTime": "2023-10-30T14:02:02.977754+02:00", "EventTime": "2023-10-30T14:02:02.977776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRIBrgZSfmPIsVLsl"]} -{"Format": "IDEA0", "ID": "50286a8e-5dc1-4f46-a7d4-fe99e46d12a0", "DetectTime": "2023-10-30T14:02:03.032326+02:00", "EventTime": "2023-10-30T14:02:03.032351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["C5JGcrsZDa5HxqBN6"]} -{"Format": "IDEA0", "ID": "074410cf-bc90-4489-9a8e-283d5263a5bd", "DetectTime": "2023-10-30T14:02:03.085572+02:00", "EventTime": "2023-10-30T14:02:03.085592+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5y5s73aRkccVS93l4"]} -{"Format": "IDEA0", "ID": "f5075deb-e2b0-4022-b15f-98bc41b2cb33", "DetectTime": "2023-10-30T14:02:03.110218+02:00", "EventTime": "2023-10-30T14:02:03.110235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["C9S6Ul2IzvtbBzaLVj"]} -{"Format": "IDEA0", "ID": "ed170231-5d7f-450c-9ea8-b76af96063f3", "DetectTime": "2023-10-30T14:02:03.171480+02:00", "EventTime": "2023-10-30T14:02:03.171502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CAF2Z42pgbepSPzm04"]} -{"Format": "IDEA0", "ID": "e4fc8983-a4f3-4836-a881-3e805dbbd628", "DetectTime": "2023-10-30T14:02:03.230278+02:00", "EventTime": "2023-10-30T14:02:03.230297+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CD33s31qKKD4ImyBQb"]} -{"Format": "IDEA0", "ID": "bdb14e4b-fece-45c2-a4ad-166e147c74db", "DetectTime": "2023-10-30T14:02:03.261275+02:00", "EventTime": "2023-10-30T14:02:03.261297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["Ct60DO1Jmselbxi4o8"]} -{"Format": "IDEA0", "ID": "f136738f-e8e6-4809-9794-245fc18859a7", "DetectTime": "2023-10-30T14:02:03.327523+02:00", "EventTime": "2023-10-30T14:02:03.327561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["Crhj913rI9h4ioMYm6"]} -{"Format": "Json", "ID": "f136738f-e8e6-4809-9794-245fc18859a7", "DetectTime": "2023-10-30T14:02:03.327523+02:00", "EventTime": "2023-10-30T14:02:03.327561+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:22:29.627860+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:03.434457)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0bd8c5c1-d600-46c2-83d2-2c799f69bc70", "DetectTime": "2023-10-30T14:02:03.441662+02:00", "EventTime": "2023-10-30T14:02:03.441684+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cd5J4w2tb6rxnc4nl1"]} -{"Format": "IDEA0", "ID": "2125322b-66bb-4de0-830c-607266f18bb1", "DetectTime": "2023-10-30T14:02:03.474645+02:00", "EventTime": "2023-10-30T14:02:03.474667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["CoRsRx2DwLLL5mzoD5"]} -{"Format": "IDEA0", "ID": "3e117f0a-4eaa-4786-8629-6c46af9cfaa1", "DetectTime": "2023-10-30T14:02:03.530853+02:00", "EventTime": "2023-10-30T14:02:03.530876+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGllPr4YcsmnESB3i"]} -{"Format": "IDEA0", "ID": "58789e7a-5a65-412e-9846-ff321355510c", "DetectTime": "2023-10-30T14:02:03.555025+02:00", "EventTime": "2023-10-30T14:02:03.555043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CnOl8dJNxq6XlaKug"]} -{"Format": "IDEA0", "ID": "3f063328-293c-47be-bcce-6bf34ad35157", "DetectTime": "2023-10-30T14:02:03.606263+02:00", "EventTime": "2023-10-30T14:02:03.606297+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C83qLY3hEw3Xth7ABe"]} -{"Format": "IDEA0", "ID": "d33cbc05-58f1-4bcf-a1b8-39a4ee2e3e7f", "DetectTime": "2023-10-30T14:02:03.630597+02:00", "EventTime": "2023-10-30T14:02:03.630668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpcyAq17A12pZl9Zqi"]} -{"Format": "IDEA0", "ID": "28601d64-eb6f-4e51-8825-653275f94be7", "DetectTime": "2023-10-30T14:02:03.659117+02:00", "EventTime": "2023-10-30T14:02:03.659139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CkKGwEUYmDYgD2Eug"]} -{"Format": "IDEA0", "ID": "052a2234-6882-4e29-b5f5-531a6e398e6b", "DetectTime": "2023-10-30T14:02:03.715711+02:00", "EventTime": "2023-10-30T14:02:03.715739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C83qLY3hEw3Xth7ABe", "Cd5J4w2tb6rxnc4nl1", "C5y5s73aRkccVS93l4", "CvOJEE4OGkCqh1wtcg"]} -{"Format": "IDEA0", "ID": "55f3aabf-b2c6-402d-9be1-449337645e0b", "DetectTime": "2023-10-30T14:02:03.743464+02:00", "EventTime": "2023-10-30T14:02:03.743489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvOJEE4OGkCqh1wtcg"]} -{"Format": "IDEA0", "ID": "299d341f-eac9-4a07-b95a-5a8a9535773c", "DetectTime": "2023-10-30T14:02:03.767930+02:00", "EventTime": "2023-10-30T14:02:03.767949+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSq1py4GNetVbTklw"]} -{"Format": "IDEA0", "ID": "99dbf353-fb31-49d7-91a9-e7e4f22642eb", "DetectTime": "2023-10-30T14:02:03.794939+02:00", "EventTime": "2023-10-30T14:02:03.794964+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZFGWx1HFpEXhBfbYh"]} -{"Format": "IDEA0", "ID": "8c65caa3-98e3-498c-8f74-543d365f274d", "DetectTime": "2023-10-30T14:02:03.821531+02:00", "EventTime": "2023-10-30T14:02:03.821559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. ", "ContentType": "text/plain"}], "uids": ["C5XyypX85h0WrSnDf"]} -{"Format": "IDEA0", "ID": "1ce60a47-5af2-4bf0-8d89-e927d9e9c8e5", "DetectTime": "2023-10-30T14:02:03.881646+02:00", "EventTime": "2023-10-30T14:02:03.881666+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnxmWU3LVjBv29bUk8"]} -{"Format": "IDEA0", "ID": "4f1b6ff3-bc48-4fba-a753-8989528cf5b3", "DetectTime": "2023-10-30T14:02:03.908575+02:00", "EventTime": "2023-10-30T14:02:03.908605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CORLL41YZpYXTUm2ai"]} -{"Format": "IDEA0", "ID": "80ed74ac-5685-48a7-a0d6-0d643229bf89", "DetectTime": "2023-10-30T14:02:03.962995+02:00", "EventTime": "2023-10-30T14:02:03.963068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfFjOp3uxjr9GOGIs3"]} -{"Format": "IDEA0", "ID": "c392f7e4-378e-4980-acc0-fd01990adf24", "DetectTime": "2023-10-30T14:02:03.991328+02:00", "EventTime": "2023-10-30T14:02:03.991352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14100], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14100/UDP destination IP 49.49.4.205. ", "ContentType": "text/plain"}], "uids": ["CW0dax4tC9eZL6ke3"]} -{"Format": "IDEA0", "ID": "190346b0-89db-486c-83c2-a97c9e90d9eb", "DetectTime": "2023-10-30T14:02:04.047492+02:00", "EventTime": "2023-10-30T14:02:04.047518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COSLQ72VwXvEEkhTac"]} -{"Format": "IDEA0", "ID": "30bdb67a-12c3-4fe1-b4d6-2ac8c5b0f594", "DetectTime": "2023-10-30T14:02:04.071069+02:00", "EventTime": "2023-10-30T14:02:04.071088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["COb3gE1lpmWnU3jnZ"]} -{"Format": "IDEA0", "ID": "f6617563-ab2d-4f90-8d50-4cee2394ff11", "DetectTime": "2023-10-30T14:02:04.126912+02:00", "EventTime": "2023-10-30T14:02:04.126976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CYcpUm2boByF2gaUpi"]} -{"Format": "Json", "ID": "f6617563-ab2d-4f90-8d50-4cee2394ff11", "DetectTime": "2023-10-30T14:02:04.126912+02:00", "EventTime": "2023-10-30T14:02:04.126976+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:25:21.740484+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:04.220242)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea8f9a80-5c18-4543-9456-6007bca17362", "DetectTime": "2023-10-30T14:02:04.225823+02:00", "EventTime": "2023-10-30T14:02:04.225841+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsWGv34jqSG8Otjg08"]} -{"Format": "IDEA0", "ID": "94fda25a-1b1d-4e32-b4cb-3fd9af08aef8", "DetectTime": "2023-10-30T14:02:04.255443+02:00", "EventTime": "2023-10-30T14:02:04.255470+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFFQVW919HXA4MuRl"]} -{"Format": "IDEA0", "ID": "a72b59fe-8f09-433f-9f23-88353abb4589", "DetectTime": "2023-10-30T14:02:04.283133+02:00", "EventTime": "2023-10-30T14:02:04.283148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18326/UDP destination IP 49.144.13.22. ", "ContentType": "text/plain"}], "uids": ["Csg5mZ2ArHjDipH9R4"]} -{"Format": "IDEA0", "ID": "8c18ce42-342c-43b5-a5a6-be5cc1910113", "DetectTime": "2023-10-30T14:02:04.341623+02:00", "EventTime": "2023-10-30T14:02:04.341642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZFGWx1HFpEXhBfbYh", "CfFjOp3uxjr9GOGIs3", "C82MHqXGp9t232rPj", "CsWGv34jqSG8Otjg08"]} -{"Format": "IDEA0", "ID": "41ef08d6-1eb1-4fd1-8f27-423fdb809b96", "DetectTime": "2023-10-30T14:02:04.367520+02:00", "EventTime": "2023-10-30T14:02:04.367544+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C82MHqXGp9t232rPj"]} -{"Format": "IDEA0", "ID": "3c6eb6b6-3dc0-4651-ae8b-cdaf2def77b3", "DetectTime": "2023-10-30T14:02:04.393282+02:00", "EventTime": "2023-10-30T14:02:04.393308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C5FWKV2RMYvwxMzsvc"]} -{"Format": "IDEA0", "ID": "b611a40b-330f-40b2-bfe2-4c5c5362ebf0", "DetectTime": "2023-10-30T14:02:04.447713+02:00", "EventTime": "2023-10-30T14:02:04.447742+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4A8Zw4t904k2Lg1Z1"]} -{"Format": "IDEA0", "ID": "11b320c6-9b46-48a7-989f-d3cfff75429e", "DetectTime": "2023-10-30T14:02:04.475869+02:00", "EventTime": "2023-10-30T14:02:04.475891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CepEUq4xiLNjVt2RT5"]} -{"Format": "IDEA0", "ID": "c1281c6a-411d-4f33-b005-a7c29edac93d", "DetectTime": "2023-10-30T14:02:04.529463+02:00", "EventTime": "2023-10-30T14:02:04.529490+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C49I033zjn05h26gij"]} -{"Format": "IDEA0", "ID": "32f56f77-ec62-48a7-9916-5839a3719aa4", "DetectTime": "2023-10-30T14:02:04.554960+02:00", "EventTime": "2023-10-30T14:02:04.554988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. ", "ContentType": "text/plain"}], "uids": ["CS1YyQ1EBByzATFtRd"]} -{"Format": "IDEA0", "ID": "169f2645-ed90-4b5a-bc07-5a77a4b807ea", "DetectTime": "2023-10-30T14:02:04.609775+02:00", "EventTime": "2023-10-30T14:02:04.609793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CVo5cI3qwYRFGpC3Wd"]} -{"Format": "IDEA0", "ID": "1d7e4bd0-e018-4fad-bded-0c1b3e234fa9", "DetectTime": "2023-10-30T14:02:04.663897+02:00", "EventTime": "2023-10-30T14:02:04.663916+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsEj654tx2BNBguKYb"]} -{"Format": "IDEA0", "ID": "b0224841-cc5a-4687-afd9-c009edcffc65", "DetectTime": "2023-10-30T14:02:04.694942+02:00", "EventTime": "2023-10-30T14:02:04.694969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24715], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. ", "ContentType": "text/plain"}], "uids": ["CyLIna3cZHdo7lJ2r6"]} -{"Format": "IDEA0", "ID": "1994c8a5-cccf-4943-afa0-954343196541", "DetectTime": "2023-10-30T14:02:04.744642+02:00", "EventTime": "2023-10-30T14:02:04.744667+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.87.241.241"], "Hostname": ["ppp-115-87-241-241.revip4.asianet.co.th Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 115.87.241.241 from 10.0.2.19. blacklisted IP AS: TRUEONLINE-AS-AP True Online, TH AS17552 rDNS: ppp-115-87-241-241.revip4.asianet.co.th Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cd1qP24aA8mAsAxN1e"]} -{"Format": "IDEA0", "ID": "a603177a-f795-45f4-a9e8-a7e1184f7bb7", "DetectTime": "2023-10-30T14:02:04.799588+02:00", "EventTime": "2023-10-30T14:02:04.799607+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CPEK2s1Kmg0xtdBKR9"]} -{"Format": "IDEA0", "ID": "5e1f531f-5da5-48bb-924e-006769ea9eda", "DetectTime": "2023-10-30T14:02:04.823700+02:00", "EventTime": "2023-10-30T14:02:04.823718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. ", "ContentType": "text/plain"}], "uids": ["CzegZ63zKNsJbwBGAc"]} -{"Format": "IDEA0", "ID": "57b97a76-fafb-42a9-a850-128c81b2575c", "DetectTime": "2023-10-30T14:02:04.874941+02:00", "EventTime": "2023-10-30T14:02:04.874961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["C0MtDZAVcjufPIgsj"]} -{"Format": "Json", "ID": "57b97a76-fafb-42a9-a850-128c81b2575c", "DetectTime": "2023-10-30T14:02:04.874941+02:00", "EventTime": "2023-10-30T14:02:04.874961+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:26:49.137971+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:04.955835)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b9ffcce1-87eb-49c1-a140-94771071ad17", "DetectTime": "2023-10-30T14:02:04.962671+02:00", "EventTime": "2023-10-30T14:02:04.962698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["CrkbmL1YuexGxiPTC5"]} -{"Format": "IDEA0", "ID": "4e09663d-ec5e-4730-a11b-e7edc2fb012c", "DetectTime": "2023-10-30T14:02:05.012577+02:00", "EventTime": "2023-10-30T14:02:05.012601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22806], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22806/UDP destination IP 85.164.5.210. ", "ContentType": "text/plain"}], "uids": ["CvorWd3J6lnTxruxA4"]} -{"Format": "IDEA0", "ID": "88ca614f-8525-4490-902e-facce405523f", "DetectTime": "2023-10-30T14:02:05.058889+02:00", "EventTime": "2023-10-30T14:02:05.058909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23479], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23479/UDP destination IP 122.168.30.58. ", "ContentType": "text/plain"}], "uids": ["Cn3BtU3kumRig8Ekeg"]} -{"Format": "IDEA0", "ID": "75b652fd-3723-4ecb-b64a-706775209b59", "DetectTime": "2023-10-30T14:02:05.104838+02:00", "EventTime": "2023-10-30T14:02:05.104851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CGr68A4SegNo95mG1h"]} -{"Format": "IDEA0", "ID": "43c1ecae-6c50-44fb-82cd-61cadf13be36", "DetectTime": "2023-10-30T14:02:05.150674+02:00", "EventTime": "2023-10-30T14:02:05.150693+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ch707X1LTDW2Q7Xqhk"]} -{"Format": "IDEA0", "ID": "ed77a94a-d8bd-45fd-a1a1-01086c066e97", "DetectTime": "2023-10-30T14:02:05.181027+02:00", "EventTime": "2023-10-30T14:02:05.181052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CEACrV1s3yfssQoOD3"]} -{"Format": "IDEA0", "ID": "67fe43b2-68fc-4b77-957a-ea9e7543d9ae", "DetectTime": "2023-10-30T14:02:05.230572+02:00", "EventTime": "2023-10-30T14:02:05.230601+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeYcDN3BgeUj0MT6o8"]} -{"Format": "IDEA0", "ID": "8ce28661-8dcf-48cc-94a7-745499f513b7", "DetectTime": "2023-10-30T14:02:05.255380+02:00", "EventTime": "2023-10-30T14:02:05.255408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CBHhPG1nsfCVr08tG9"]} -{"Format": "IDEA0", "ID": "15a0117a-051d-4e04-a992-8669f9a5173f", "DetectTime": "2023-10-30T14:02:05.284130+02:00", "EventTime": "2023-10-30T14:02:05.284156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBCbO43p25TUWZZ744"]} -{"Format": "IDEA0", "ID": "1b9f1734-e1a5-4584-ae9c-6deead6e035f", "DetectTime": "2023-10-30T14:02:05.330904+02:00", "EventTime": "2023-10-30T14:02:05.330930+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgpOBC4HiqgF0YznW9"]} -{"Format": "IDEA0", "ID": "2d7e613b-706a-4e30-86df-933b3b7196c3", "DetectTime": "2023-10-30T14:02:05.354108+02:00", "EventTime": "2023-10-30T14:02:05.354129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CpJjj81Q7LuiFfyzUk"]} -{"Format": "IDEA0", "ID": "09caa43a-b480-44fa-b324-6ff3bd08c03e", "DetectTime": "2023-10-30T14:02:05.399625+02:00", "EventTime": "2023-10-30T14:02:05.399645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CLzac7UDMKVHzFS87"]} -{"Format": "Json", "ID": "09caa43a-b480-44fa-b324-6ff3bd08c03e", "DetectTime": "2023-10-30T14:02:05.399625+02:00", "EventTime": "2023-10-30T14:02:05.399645+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:59:21.739522+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:05.469664)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07f2c6b6-a49f-438d-af79-cbf7ca10b1d9", "DetectTime": "2023-10-30T14:02:05.475236+02:00", "EventTime": "2023-10-30T14:02:05.475260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C7N69DaSd5ZDJKMm4"]} -{"Format": "IDEA0", "ID": "2173c880-2e20-4ed1-8c39-207911abe2fd", "DetectTime": "2023-10-30T14:02:05.521355+02:00", "EventTime": "2023-10-30T14:02:05.521369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CMkePOc4YPAeC13Zc"]} -{"Format": "IDEA0", "ID": "4d621fa6-193e-4d99-8728-b810610dfb56", "DetectTime": "2023-10-30T14:02:05.563918+02:00", "EventTime": "2023-10-30T14:02:05.563938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CPEK2s1Kmg0xtdBKR9", "C49I033zjn05h26gij", "CeYcDN3BgeUj0MT6o8", "CqcnbW3BPfJRF3N8x4"]} -{"Format": "IDEA0", "ID": "c4f73791-2cf5-426e-b3b6-4c69b07b1aa0", "DetectTime": "2023-10-30T14:02:05.577283+02:00", "EventTime": "2023-10-30T14:02:05.577308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqcnbW3BPfJRF3N8x4"]} -{"Format": "IDEA0", "ID": "7ac2970c-c74e-4b4a-988e-24537737ce51", "DetectTime": "2023-10-30T14:02:05.593512+02:00", "EventTime": "2023-10-30T14:02:05.593535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CdqI7A3Tls1D0f1TV5"]} -{"Format": "IDEA0", "ID": "859cc5f6-dd86-4bc2-8ded-9142b647b883", "DetectTime": "2023-10-30T14:02:05.638101+02:00", "EventTime": "2023-10-30T14:02:05.638123+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBY6Ye3H6uORMnG6Md"]} -{"Format": "IDEA0", "ID": "0a42c93d-926a-4562-9080-2b8cb73587b2", "DetectTime": "2023-10-30T14:02:05.652178+02:00", "EventTime": "2023-10-30T14:02:05.652204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cakcs9KW3Hq8Leu1i"]} -{"Format": "IDEA0", "ID": "b10d3b45-4c0c-4097-a95c-5d90bb142693", "DetectTime": "2023-10-30T14:02:05.695465+02:00", "EventTime": "2023-10-30T14:02:05.695492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CH6NtB3UMq69fiECe"]} -{"Format": "IDEA0", "ID": "577ca66c-abc3-4507-8d40-8bbe52649e22", "DetectTime": "2023-10-30T14:02:05.739028+02:00", "EventTime": "2023-10-30T14:02:05.739049+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CH33aT2m1r3A06jig8"]} -{"Format": "IDEA0", "ID": "718d1fb6-3115-46c4-9fd2-a02ade6cba39", "DetectTime": "2023-10-30T14:02:05.752575+02:00", "EventTime": "2023-10-30T14:02:05.752589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CFXqzd4zzzhGJ8nC7j"]} -{"Format": "IDEA0", "ID": "f06d922e-c094-49f0-8343-1b9c7149d23f", "DetectTime": "2023-10-30T14:02:05.794033+02:00", "EventTime": "2023-10-30T14:02:05.794074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["CG7d6jT9328RemsFd"]} -{"Format": "IDEA0", "ID": "1981c953-6fa5-49a5-bf1e-126d4df22183", "DetectTime": "2023-10-30T14:02:05.821014+02:00", "EventTime": "2023-10-30T14:02:05.821028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C9juW63sahBJhTofEb"]} -{"Format": "IDEA0", "ID": "3600192e-a7ed-4cf9-a9be-e539e2b2127b", "DetectTime": "2023-10-30T14:02:05.863648+02:00", "EventTime": "2023-10-30T14:02:05.863668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBRTzG4ImwxJO71qE7"]} -{"Format": "IDEA0", "ID": "ef03f7e9-f3a7-469f-b293-5b246a60b264", "DetectTime": "2023-10-30T14:02:05.876622+02:00", "EventTime": "2023-10-30T14:02:05.876649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CoswP21qUKZq0Nno19"]} -{"Format": "Json", "ID": "ef03f7e9-f3a7-469f-b293-5b246a60b264", "DetectTime": "2023-10-30T14:02:05.876622+02:00", "EventTime": "2023-10-30T14:02:05.876649+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:59:22.669900+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:05.949240)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d9a0df8c-ce0b-4e43-a156-3a5a7abf2467", "DetectTime": "2023-10-30T14:02:05.955541+02:00", "EventTime": "2023-10-30T14:02:05.955558+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CO8peX2Zoyv7CTCAJ"]} -{"Format": "IDEA0", "ID": "0bcb71f4-ec71-4426-bd94-363e4fc09a5b", "DetectTime": "2023-10-30T14:02:05.972271+02:00", "EventTime": "2023-10-30T14:02:05.972292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CRNaiN0INJbkgy1cb"]} -{"Format": "IDEA0", "ID": "eeb13b20-0ed0-4478-8d0c-577e81ec366a", "DetectTime": "2023-10-30T14:02:06.009812+02:00", "EventTime": "2023-10-30T14:02:06.009836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Cdq4ED3os6XZOeHr4a"]} -{"Format": "IDEA0", "ID": "766f5c4b-1b40-4bc7-9ae7-058783d76d8e", "DetectTime": "2023-10-30T14:02:06.048986+02:00", "EventTime": "2023-10-30T14:02:06.049003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cr8YOk2CWNzVWNxZff"]} -{"Format": "IDEA0", "ID": "c2bb03d8-5353-44cd-8baf-56379b059dae", "DetectTime": "2023-10-30T14:02:06.083771+02:00", "EventTime": "2023-10-30T14:02:06.083786+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMHtd617qzWFZOhvYb"]} -{"Format": "IDEA0", "ID": "a3518e42-fd45-42d1-a048-5f6970177c9c", "DetectTime": "2023-10-30T14:02:06.097172+02:00", "EventTime": "2023-10-30T14:02:06.097188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["C9mhn53Ca3ZWICBfud"]} -{"Format": "IDEA0", "ID": "5e5adc3a-eb49-42b7-aa2f-3011bd31a73c", "DetectTime": "2023-10-30T14:02:06.137846+02:00", "EventTime": "2023-10-30T14:02:06.137871+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWaJKt1aVdAQQHcEl"]} -{"Format": "IDEA0", "ID": "0e82213e-84f7-4be1-9d85-fcc867a1407f", "DetectTime": "2023-10-30T14:02:06.156484+02:00", "EventTime": "2023-10-30T14:02:06.156500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["ClErlG3RLGiMBeLmZ6"]} -{"Format": "IDEA0", "ID": "66fa6367-15c5-4d88-9c56-214da6c1afa0", "DetectTime": "2023-10-30T14:02:06.195010+02:00", "EventTime": "2023-10-30T14:02:06.195028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CysVD38Ufm2zbOXPj"]} -{"Format": "IDEA0", "ID": "a7542f30-3625-4887-8119-c242387b137f", "DetectTime": "2023-10-30T14:02:06.233534+02:00", "EventTime": "2023-10-30T14:02:06.233550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CxVFnM3pV8r2T5uu3d"]} -{"Format": "IDEA0", "ID": "f79582da-19db-47d1-83dd-967089b6acc6", "DetectTime": "2023-10-30T14:02:06.273150+02:00", "EventTime": "2023-10-30T14:02:06.273170+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGgRvX1AIo3ZpxOEmd"]} -{"Format": "IDEA0", "ID": "5c5762d5-fa3d-47a3-8f34-7b70c448d81f", "DetectTime": "2023-10-30T14:02:06.286934+02:00", "EventTime": "2023-10-30T14:02:06.286951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CvRUrO2QDOFvU5bsNe"]} -{"Format": "Json", "ID": "5c5762d5-fa3d-47a3-8f34-7b70c448d81f", "DetectTime": "2023-10-30T14:02:06.286934+02:00", "EventTime": "2023-10-30T14:02:06.286951+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:59:23.958182+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:06.361872)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "db02954f-17b2-4d08-8546-5112e054eeb2", "DetectTime": "2023-10-30T14:02:06.368225+02:00", "EventTime": "2023-10-30T14:02:06.368250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CWaJKt1aVdAQQHcEl", "CH33aT2m1r3A06jig8", "CO8peX2Zoyv7CTCAJ", "CuilxF0VZc4jSYyU8"]} -{"Format": "IDEA0", "ID": "6deb1509-dc35-49c3-b465-a581de32d9cc", "DetectTime": "2023-10-30T14:02:06.383485+02:00", "EventTime": "2023-10-30T14:02:06.383503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["C5cM9I1rCucRV5EZ6g"]} -{"Format": "IDEA0", "ID": "3676a04d-1a32-459c-9220-c040a0e59910", "DetectTime": "2023-10-30T14:02:06.420202+02:00", "EventTime": "2023-10-30T14:02:06.420228+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuilxF0VZc4jSYyU8"]} -{"Format": "IDEA0", "ID": "e9aaec42-017f-485a-ba21-705e637ffc5f", "DetectTime": "2023-10-30T14:02:06.434171+02:00", "EventTime": "2023-10-30T14:02:06.434196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CPPs6C1PY1TWpgDqW"]} -{"Format": "IDEA0", "ID": "4521a635-786a-4353-a7af-0982cb856eab", "DetectTime": "2023-10-30T14:02:06.470165+02:00", "EventTime": "2023-10-30T14:02:06.470193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C7M88N2X0DmrKJFwAb"]} -{"Format": "IDEA0", "ID": "fc9a5774-e9fd-4062-98d6-f2234b771a91", "DetectTime": "2023-10-30T14:02:06.504048+02:00", "EventTime": "2023-10-30T14:02:06.504064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C6jybk3fbxaLA0Ile"]} -{"Format": "IDEA0", "ID": "c7242089-b77e-421a-8863-9a789ca3ba43", "DetectTime": "2023-10-30T14:02:06.537784+02:00", "EventTime": "2023-10-30T14:02:06.537798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CYkUXq3eSHLCw7H5je"]} -{"Format": "IDEA0", "ID": "86269cf1-e7b2-4dbe-83ef-5281aa154c75", "DetectTime": "2023-10-30T14:02:06.570689+02:00", "EventTime": "2023-10-30T14:02:06.570716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["Cao6a3iWlm8UOBb4a"]} -{"Format": "IDEA0", "ID": "b07c6772-0e23-4b66-ab92-a3adea2b069a", "DetectTime": "2023-10-30T14:02:06.605632+02:00", "EventTime": "2023-10-30T14:02:06.605651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CjgiFBXxy5TE7XXcg"]} -{"Format": "IDEA0", "ID": "d155d693-70fd-4ce2-865d-730f6de32bb7", "DetectTime": "2023-10-30T14:02:06.642637+02:00", "EventTime": "2023-10-30T14:02:06.642662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. ", "ContentType": "text/plain"}], "uids": ["C6KMFP2Lh4eKXGiStd"]} -{"Format": "Json", "ID": "d155d693-70fd-4ce2-865d-730f6de32bb7", "DetectTime": "2023-10-30T14:02:06.642637+02:00", "EventTime": "2023-10-30T14:02:06.642662+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T01:59:27.849348+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:06.716139)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc0ff272-5686-44e9-8134-526ce1b7e06e", "DetectTime": "2023-10-30T14:02:06.721443+02:00", "EventTime": "2023-10-30T14:02:06.721459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["Cu79aY3yxGGO4hztZh"]} -{"Format": "IDEA0", "ID": "1fbdbe93-47ba-4977-8986-c204c4d08a05", "DetectTime": "2023-10-30T14:02:06.756915+02:00", "EventTime": "2023-10-30T14:02:06.756933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CWcn6njCP2DUA1AV3"]} -{"Format": "IDEA0", "ID": "dae72aa8-c346-4323-92a3-b9a3256a4249", "DetectTime": "2023-10-30T14:02:06.791425+02:00", "EventTime": "2023-10-30T14:02:06.791446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CpbOsi3tu7idb5DyX5"]} -{"Format": "IDEA0", "ID": "dd18af70-1b82-4116-a201-c570df2cf5fc", "DetectTime": "2023-10-30T14:02:06.824544+02:00", "EventTime": "2023-10-30T14:02:06.824556+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CQRlmJ3lZDzFHDWRhj"]} -{"Format": "IDEA0", "ID": "74a78e53-ebbd-4e3b-9be7-ea1d34af1069", "DetectTime": "2023-10-30T14:02:06.838392+02:00", "EventTime": "2023-10-30T14:02:06.838414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CA2pYi1pUSb78PUi94"]} -{"Format": "IDEA0", "ID": "1348a7a8-8b0c-48e4-a08a-146d8363cab6", "DetectTime": "2023-10-30T14:02:06.874868+02:00", "EventTime": "2023-10-30T14:02:06.874888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CGHGaK2aCZlwt4Q1g9"]} -{"Format": "IDEA0", "ID": "893ec424-ff19-4144-822b-e6d02852cf85", "DetectTime": "2023-10-30T14:02:06.907602+02:00", "EventTime": "2023-10-30T14:02:06.907620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CL2KXE1WxkVYWU2Mp1"]} -{"Format": "IDEA0", "ID": "7a1b7df4-7c50-4687-b055-8abb6a6ccbe9", "DetectTime": "2023-10-30T14:02:06.940339+02:00", "EventTime": "2023-10-30T14:02:06.940355+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClT2fm3kC1u0a7FFgh"]} -{"Format": "IDEA0", "ID": "48713fe1-5785-4e60-ad5b-99abb28bd981", "DetectTime": "2023-10-30T14:02:06.955323+02:00", "EventTime": "2023-10-30T14:02:06.955340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. ", "ContentType": "text/plain"}], "uids": ["CFFF5S2uZixlKYedsg"]} -{"Format": "IDEA0", "ID": "c9f10e3b-b724-4159-afd7-d78d1c62b07d", "DetectTime": "2023-10-30T14:02:06.987797+02:00", "EventTime": "2023-10-30T14:02:06.987816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. ", "ContentType": "text/plain"}], "uids": ["C1Cvq8FBljrO1w7Wl"]} -{"Format": "Json", "ID": "c9f10e3b-b724-4159-afd7-d78d1c62b07d", "DetectTime": "2023-10-30T14:02:06.987797+02:00", "EventTime": "2023-10-30T14:02:06.987816+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T02:00:04.657814+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2023/10/30 14:02:07.053958)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "89d3d83b-7cf6-4175-91f9-f12913b6a6d8", "DetectTime": "2023-10-30T14:02:07.060533+02:00", "EventTime": "2023-10-30T14:02:07.060553+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsP5j71ZutL7twmAh1"]} -{"Format": "IDEA0", "ID": "9441870f-809f-4d56-8840-0eca5a73010f", "DetectTime": "2023-10-30T14:02:07.075050+02:00", "EventTime": "2023-10-30T14:02:07.075083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24715], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. ", "ContentType": "text/plain"}], "uids": ["CSza6c4pGVzuYeAWG8"]} -{"Format": "IDEA0", "ID": "db7fae80-57c3-4d28-ac90-dc31941a328c", "DetectTime": "2023-10-30T14:02:07.106207+02:00", "EventTime": "2023-10-30T14:02:07.106225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CPcLx92k2ifShs6MXj"]} -{"Format": "IDEA0", "ID": "f02432d7-94d6-47a5-ba4e-ca0c08d44fa6", "DetectTime": "2023-10-30T14:02:07.133339+02:00", "EventTime": "2023-10-30T14:02:07.133355+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRPz4g9AiA2pSORO8"]} -{"Format": "IDEA0", "ID": "59fbfab0-14f6-4c23-aca1-72fb63085eb3", "DetectTime": "2023-10-30T14:02:07.150066+02:00", "EventTime": "2023-10-30T14:02:07.150094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["Co3HCU2GJoPf08O6Mf"]} -{"Format": "IDEA0", "ID": "eb587db9-6cd0-45cd-891c-8085ee5b413e", "DetectTime": "2023-10-30T14:02:07.189084+02:00", "EventTime": "2023-10-30T14:02:07.189101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CSBcE42iGUlQit2d89"]} -{"Format": "IDEA0", "ID": "2081c295-b59f-4179-9f1a-da228954ce94", "DetectTime": "2023-10-30T14:02:07.224953+02:00", "EventTime": "2023-10-30T14:02:07.224967+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CT9vUj1V7M8CSEx1m"]} -{"Format": "IDEA0", "ID": "19d311fe-a699-4a46-9a05-b6a04b08d2af", "DetectTime": "2023-10-30T14:02:07.239049+02:00", "EventTime": "2023-10-30T14:02:07.239076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CJFXrg4dYpa0YH1Hzc"]} -{"Format": "IDEA0", "ID": "61dfec62-cdb2-48ba-884b-a840dca50eb5", "DetectTime": "2023-10-30T14:02:07.281963+02:00", "EventTime": "2023-10-30T14:02:07.281983+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUzBC23SStyfaXTV0a"]} -{"Format": "IDEA0", "ID": "04b2435f-2c1c-45da-bb72-309cd9f078a9", "DetectTime": "2023-10-30T14:02:07.299622+02:00", "EventTime": "2023-10-30T14:02:07.299645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CzWjpP1g0wlDzPFWRe"]} -{"Format": "IDEA0", "ID": "fefa6eea-d78d-4be7-884d-ee6e680aba4e", "DetectTime": "2023-10-30T14:02:07.348626+02:00", "EventTime": "2023-10-30T14:02:07.348643+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9l3ZPdiLtbmnDDi9"]} -{"Format": "IDEA0", "ID": "addcea4a-47e9-4d7c-9afd-f273f4c1cce0", "DetectTime": "2023-10-30T14:02:07.365744+02:00", "EventTime": "2023-10-30T14:02:07.365768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CETJp12AtZn9LL8SC3", "CRPz4g9AiA2pSORO8", "CUzBC23SStyfaXTV0a", "ClT2fm3kC1u0a7FFgh"]} -{"Format": "IDEA0", "ID": "19cc497f-2598-4a18-9887-86f4a780e5ff", "DetectTime": "2023-10-30T14:02:07.383447+02:00", "EventTime": "2023-10-30T14:02:07.383474+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CETJp12AtZn9LL8SC3"]} -{"Format": "IDEA0", "ID": "6df8cbe8-8afa-48d1-8011-cc6867b61c15", "DetectTime": "2023-10-30T14:02:07.400939+02:00", "EventTime": "2023-10-30T14:02:07.400965+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CK0WiL2uIiSKYibAC8"]} -{"Format": "IDEA0", "ID": "dc25e512-c542-463f-b2c9-b85d1002e65d", "DetectTime": "2023-10-30T14:02:07.419317+02:00", "EventTime": "2023-10-30T14:02:07.419340+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmKAQy2BWit2g74sN5"]} -{"Format": "IDEA0", "ID": "cd85ecfb-652f-447b-83d4-2b0f701e6cce", "DetectTime": "2023-10-30T14:02:07.434250+02:00", "EventTime": "2023-10-30T14:02:07.434266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CGW5x33yR5s3ur7Gci"]} -{"Format": "IDEA0", "ID": "a108887b-4cb8-4df4-910e-8dfcea78a057", "DetectTime": "2023-10-30T14:02:07.471944+02:00", "EventTime": "2023-10-30T14:02:07.471969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C860233JeZciEjSw0j"]} -{"Format": "IDEA0", "ID": "87136081-1d63-4d7c-8969-8b507aaf07cf", "DetectTime": "2023-10-30T14:02:07.508577+02:00", "EventTime": "2023-10-30T14:02:07.508598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CWJgYN7z1qUzqGSvh"]} -{"Format": "Json", "ID": "87136081-1d63-4d7c-8969-8b507aaf07cf", "DetectTime": "2023-10-30T14:02:07.508577+02:00", "EventTime": "2023-10-30T14:02:07.508598+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T02:32:10.449570+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2023/10/30 14:02:07.603225)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fed39946-7122-4aba-84bd-5c5ecb267908", "DetectTime": "2023-10-30T14:02:07.609637+02:00", "EventTime": "2023-10-30T14:02:07.609658+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNnBdC40nx6JdCWFz7"]} -{"Format": "IDEA0", "ID": "e782bd24-fb68-474a-a346-b794903e010f", "DetectTime": "2023-10-30T14:02:07.630723+02:00", "EventTime": "2023-10-30T14:02:07.630747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C0soH94pYSSGTHWuJj"]} -{"Format": "IDEA0", "ID": "2f66e6ae-77b0-4cfd-b0ff-25a5bfdc3af0", "DetectTime": "2023-10-30T14:02:07.667092+02:00", "EventTime": "2023-10-30T14:02:07.667113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cv4Pjvyx6HpmushLg"]} -{"Format": "IDEA0", "ID": "201b09a7-755a-42da-9f3c-1db9236f06e6", "DetectTime": "2023-10-30T14:02:07.703117+02:00", "EventTime": "2023-10-30T14:02:07.703141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cra4S9cXtkh8cFVFl"]} -{"Format": "IDEA0", "ID": "f194c649-2157-4a02-a6fc-b27ca6c4545c", "DetectTime": "2023-10-30T14:02:07.736041+02:00", "EventTime": "2023-10-30T14:02:07.736058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CLnaV12yiYc43NjVsh"]} -{"Format": "IDEA0", "ID": "d74b8c15-957a-44a6-b3ea-6e2cb020d304", "DetectTime": "2023-10-30T14:02:07.769694+02:00", "EventTime": "2023-10-30T14:02:07.769710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CYgwne3iiyfsiP8iWi"]} -{"Format": "IDEA0", "ID": "474e64b8-5623-4c6a-bf31-2fec5b1362f5", "DetectTime": "2023-10-30T14:02:07.797786+02:00", "EventTime": "2023-10-30T14:02:07.797797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CtCgsc4IaGAkjUpieg"]} -{"Format": "IDEA0", "ID": "8d026cf1-f1c7-4ffe-9455-7dc2bf158929", "DetectTime": "2023-10-30T14:02:07.822963+02:00", "EventTime": "2023-10-30T14:02:07.822985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CPqrUp15D125lLFoj7"]} -{"Format": "IDEA0", "ID": "7a968ac4-d1b8-4e94-814d-80a485f249df", "DetectTime": "2023-10-30T14:02:07.852573+02:00", "EventTime": "2023-10-30T14:02:07.852594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CqlV7V39CCKRy2jlXj"]} -{"Format": "Json", "ID": "7a968ac4-d1b8-4e94-814d-80a485f249df", "DetectTime": "2023-10-30T14:02:07.852573+02:00", "EventTime": "2023-10-30T14:02:07.852594+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T02:32:29.499358+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2023/10/30 14:02:07.905958)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "59fd31e3-dbd8-4419-a620-87f3a330e4b9", "DetectTime": "2023-10-30T14:02:07.910353+02:00", "EventTime": "2023-10-30T14:02:07.910370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C5IyBp4NvDuL3BIsJi"]} -{"Format": "IDEA0", "ID": "9064a7f8-4c05-41a8-afb8-7be74b1d6916", "DetectTime": "2023-10-30T14:02:07.937473+02:00", "EventTime": "2023-10-30T14:02:07.937485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CrPSdb11l89piG0Cgb"]} -{"Format": "IDEA0", "ID": "08a9b2bd-96f7-42ec-8948-77d10270f0a5", "DetectTime": "2023-10-30T14:02:07.964259+02:00", "EventTime": "2023-10-30T14:02:07.964281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CTZm9s2vtMbs5LUfxl"]} -{"Format": "IDEA0", "ID": "0acd00f6-e3c2-4953-84a2-7746fe2972e6", "DetectTime": "2023-10-30T14:02:07.992556+02:00", "EventTime": "2023-10-30T14:02:07.992583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["Cr6IPj19rOxJvvIKu5"]} -{"Format": "IDEA0", "ID": "1ce795f4-caf0-439f-896e-0c48a7639fb0", "DetectTime": "2023-10-30T14:02:08.020010+02:00", "EventTime": "2023-10-30T14:02:08.020026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["C44dYT3C5OjQPklMB"]} -{"Format": "IDEA0", "ID": "871a8bb6-4a97-494e-b7f0-77b567f635a2", "DetectTime": "2023-10-30T14:02:08.046220+02:00", "EventTime": "2023-10-30T14:02:08.046238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CGNa1h3CBIV0ylBIBl"]} -{"Format": "IDEA0", "ID": "ddab518f-1263-45e8-9068-e2291c546007", "DetectTime": "2023-10-30T14:02:08.068326+02:00", "EventTime": "2023-10-30T14:02:08.068340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CZwAlE3904ShpEmn44"]} -{"Format": "IDEA0", "ID": "f46d2fe9-2422-4cdc-b0d7-a3dd2bf2e31b", "DetectTime": "2023-10-30T14:02:08.092307+02:00", "EventTime": "2023-10-30T14:02:08.092323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CIW4ZV3EYaJInfXb3j"]} -{"Format": "Json", "ID": "f46d2fe9-2422-4cdc-b0d7-a3dd2bf2e31b", "DetectTime": "2023-10-30T14:02:08.092307+02:00", "EventTime": "2023-10-30T14:02:08.092323+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T02:32:30.810982+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2023/10/30 14:02:08.149521)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "604faef1-8cc9-42d5-a225-41689898e34b", "DetectTime": "2023-10-30T14:02:08.156866+02:00", "EventTime": "2023-10-30T14:02:08.156882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7888], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. ", "ContentType": "text/plain"}], "uids": ["CrLje04BuzvsBnvFd7"]} -{"Format": "IDEA0", "ID": "f50d0312-27f3-4617-9e7d-b2e30435f5f6", "DetectTime": "2023-10-30T14:02:08.186511+02:00", "EventTime": "2023-10-30T14:02:08.186528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CYU1Wc4cUdS8mhq3ah"]} -{"Format": "IDEA0", "ID": "c2a36986-8ab3-4cdc-8b29-62a1776d43a1", "DetectTime": "2023-10-30T14:02:08.209160+02:00", "EventTime": "2023-10-30T14:02:08.209178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C4fBxOaOgkMUMicW5"]} -{"Format": "IDEA0", "ID": "8a4b063b-248f-4271-87c5-e70a4b16b00c", "DetectTime": "2023-10-30T14:02:08.230302+02:00", "EventTime": "2023-10-30T14:02:08.230313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CZnEWx2E4Kr9vQu9jh"]} -{"Format": "IDEA0", "ID": "48925e30-1a63-46bb-a3d8-a9f86becd8d9", "DetectTime": "2023-10-30T14:02:08.250409+02:00", "EventTime": "2023-10-30T14:02:08.250428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CAqbeA0jfa80D0MC6"]} -{"Format": "IDEA0", "ID": "168b9b89-b50d-4dde-aca0-dd87a4f548b2", "DetectTime": "2023-10-30T14:02:08.277273+02:00", "EventTime": "2023-10-30T14:02:08.277291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["Ckalzx2z5iIaRYUiA4"]} -{"Format": "IDEA0", "ID": "a7f75a6e-be4a-4ebf-843e-5fa0c1160c64", "DetectTime": "2023-10-30T14:02:08.302320+02:00", "EventTime": "2023-10-30T14:02:08.302339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CM8Pj04U60Xj5JWe8l"]} -{"Format": "IDEA0", "ID": "b321d912-83d7-4c1f-bdb3-df9968dceca7", "DetectTime": "2023-10-30T14:02:08.325336+02:00", "EventTime": "2023-10-30T14:02:08.325353+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cyyp8B4wk18FP17e3g"]} -{"Format": "IDEA0", "ID": "2bf6e9a1-f0cc-486b-abef-7ba1e68c8920", "DetectTime": "2023-10-30T14:02:08.334161+02:00", "EventTime": "2023-10-30T14:02:08.334172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CcfK9i3GwOcJ2a603e"]} -{"Format": "IDEA0", "ID": "5b959d00-5825-4558-a18b-1cf34943b920", "DetectTime": "2023-10-30T14:02:08.352517+02:00", "EventTime": "2023-10-30T14:02:08.352535+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C14tut1p2VgTL45iDi"]} -{"Format": "IDEA0", "ID": "4f6dc8b7-17c2-4259-919f-1e3d3b327f3d", "DetectTime": "2023-10-30T14:02:08.362091+02:00", "EventTime": "2023-10-30T14:02:08.362113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CsbB402pHfS0NiNtp8"]} -{"Format": "Json", "ID": "4f6dc8b7-17c2-4259-919f-1e3d3b327f3d", "DetectTime": "2023-10-30T14:02:08.362091+02:00", "EventTime": "2023-10-30T14:02:08.362113+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T02:32:35.109192+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2023/10/30 14:02:08.415522)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2fb8ffeb-d0a6-4ee4-a806-736537d7d198", "DetectTime": "2023-10-30T14:02:08.420948+02:00", "EventTime": "2023-10-30T14:02:08.420960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. ", "ContentType": "text/plain"}], "uids": ["CweJjD4YYYpQIuzUyi"]} -{"Format": "IDEA0", "ID": "3a14d110-193b-4373-ae87-3eee112edc6f", "DetectTime": "2023-10-30T14:02:08.446347+02:00", "EventTime": "2023-10-30T14:02:08.446364+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLt2eA2sIgp9IASQMl"]} -{"Format": "IDEA0", "ID": "0337bf72-7e53-4614-9f22-19ff45c30ba7", "DetectTime": "2023-10-30T14:02:08.457140+02:00", "EventTime": "2023-10-30T14:02:08.457155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. ", "ContentType": "text/plain"}], "uids": ["CjrLYF1B6BsBlZygye"]} -{"Format": "IDEA0", "ID": "d41679c1-5c41-41f9-9647-fda19311c760", "DetectTime": "2023-10-30T14:02:08.481333+02:00", "EventTime": "2023-10-30T14:02:08.481349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. ", "ContentType": "text/plain"}], "uids": ["C2Nc29Acxveq81375"]} -{"Format": "IDEA0", "ID": "b07ac71e-adf4-450e-9629-0c946156ab29", "DetectTime": "2023-10-30T14:02:08.499723+02:00", "EventTime": "2023-10-30T14:02:08.499743+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJe8v58j4qoxA42b7"]} -{"Format": "IDEA0", "ID": "3017658f-b26f-4a22-b152-c36e3e5e91c0", "DetectTime": "2023-10-30T14:02:08.509331+02:00", "EventTime": "2023-10-30T14:02:08.509354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CHc6MS3kUiXgLh4s31"]} -{"Format": "IDEA0", "ID": "0a54e333-4db4-4385-8873-2b6bd1cfb844", "DetectTime": "2023-10-30T14:02:08.531631+02:00", "EventTime": "2023-10-30T14:02:08.531655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CygHVM4LOzSQpuNyg"]} -{"Format": "IDEA0", "ID": "23e9f8e2-063c-495c-a232-0263afced57d", "DetectTime": "2023-10-30T14:02:08.552116+02:00", "EventTime": "2023-10-30T14:02:08.552132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cyyp8B4wk18FP17e3g", "Cesg0jGY46hHkWQsj", "CmKAQy2BWit2g74sN5", "CLt2eA2sIgp9IASQMl"]} -{"Format": "IDEA0", "ID": "392896b4-b36e-4041-a69e-60199812d488", "DetectTime": "2023-10-30T14:02:08.561182+02:00", "EventTime": "2023-10-30T14:02:08.561201+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cesg0jGY46hHkWQsj"]} -{"Format": "IDEA0", "ID": "53b4e13d-4f9b-4a5b-9a72-e2b8a7d49e1a", "DetectTime": "2023-10-30T14:02:08.571691+02:00", "EventTime": "2023-10-30T14:02:08.571706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["C3yr9I3PjifCIUBxM1"]} -{"Format": "IDEA0", "ID": "108f77fd-b88b-48d3-8ac1-0bfe3c5274b6", "DetectTime": "2023-10-30T14:02:08.594171+02:00", "EventTime": "2023-10-30T14:02:08.594187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CafxK18piS5L25gW6"]} -{"Format": "IDEA0", "ID": "1d67ec17-76dc-4884-95e4-a15ec6997638", "DetectTime": "2023-10-30T14:02:08.618396+02:00", "EventTime": "2023-10-30T14:02:08.618417+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGcU0v1WRjJ2wJwdE6"]} -{"Format": "IDEA0", "ID": "561efbc4-5bb8-4a9b-814a-8b33852488e4", "DetectTime": "2023-10-30T14:02:08.629514+02:00", "EventTime": "2023-10-30T14:02:08.629532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24715], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. ", "ContentType": "text/plain"}], "uids": ["CH670C35cQmWeerd5a"]} -{"Format": "Json", "ID": "561efbc4-5bb8-4a9b-814a-8b33852488e4", "DetectTime": "2023-10-30T14:02:08.629514+02:00", "EventTime": "2023-10-30T14:02:08.629532+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24715], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T02:32:36.582043+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2023/10/30 14:02:08.674640)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6e3eee91-8d60-4735-a39b-d50582d16eae", "DetectTime": "2023-10-30T14:02:08.679234+02:00", "EventTime": "2023-10-30T14:02:08.679251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["Ce0SQv1QMWUnnGXs13"]} -{"Format": "IDEA0", "ID": "15de4ed9-dc89-4447-9e6d-9fd6e323832e", "DetectTime": "2023-10-30T14:02:08.700974+02:00", "EventTime": "2023-10-30T14:02:08.700992+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cr8xzS1ciIspp3nCDg"]} -{"Format": "IDEA0", "ID": "b6144428-7033-4125-90ae-85864cb16ab8", "DetectTime": "2023-10-30T14:02:08.711330+02:00", "EventTime": "2023-10-30T14:02:08.711353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["ClOvcb1FpxEycQpeV7"]} -{"Format": "IDEA0", "ID": "82e55e86-35a5-44e8-a0a4-356d0b445509", "DetectTime": "2023-10-30T14:02:08.730388+02:00", "EventTime": "2023-10-30T14:02:08.730414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CDQX3T1Jlwrl4HdPk2"]} -{"Format": "IDEA0", "ID": "f693a2f2-6cdc-4f11-bbaa-c01f11a6be6d", "DetectTime": "2023-10-30T14:02:08.747569+02:00", "EventTime": "2023-10-30T14:02:08.747585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZEW4kTCuhL2hJ319"]} -{"Format": "IDEA0", "ID": "4742cd9b-f277-4921-90aa-39c831f0c499", "DetectTime": "2023-10-30T14:02:08.766507+02:00", "EventTime": "2023-10-30T14:02:08.766520+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcqIxA2R0Ytikf7sF5"]} -{"Format": "IDEA0", "ID": "a29e53cf-b578-4a37-b315-e26be4b7c928", "DetectTime": "2023-10-30T14:02:08.775723+02:00", "EventTime": "2023-10-30T14:02:08.775735+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CC0g18ofFITqoiAG6"]} -{"Format": "IDEA0", "ID": "04089e62-abdd-4bb1-a11e-d0afbe1338f8", "DetectTime": "2023-10-30T14:02:08.785123+02:00", "EventTime": "2023-10-30T14:02:08.785140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CzFbAb1a1PKLihPeIc"]} -{"Format": "IDEA0", "ID": "87150f57-3934-435b-a995-bbcd7f942940", "DetectTime": "2023-10-30T14:02:08.825487+02:00", "EventTime": "2023-10-30T14:02:08.825506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CNTjwD2bf6KXp5qoYl"]} -{"Format": "IDEA0", "ID": "8b59326c-22e1-4b17-b353-ba033784e0f4", "DetectTime": "2023-10-30T14:02:08.868198+02:00", "EventTime": "2023-10-30T14:02:08.868214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CeztVH1QFbaBUbl4Lj"]} -{"Format": "IDEA0", "ID": "0b70a359-a47a-4283-b59d-e82a522c9dd2", "DetectTime": "2023-10-30T14:02:08.913743+02:00", "EventTime": "2023-10-30T14:02:08.913755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CMWnlQ1m0hjYARyhnj"]} -{"Format": "IDEA0", "ID": "816905bf-ca29-4c1c-84fc-9e8f9f0b37b1", "DetectTime": "2023-10-30T14:02:08.951525+02:00", "EventTime": "2023-10-30T14:02:08.951542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CzH5Wv4yK5BIh3Z3w"]} -{"Format": "IDEA0", "ID": "bd44560b-d68c-488c-bf18-ee6ee5d33d36", "DetectTime": "2023-10-30T14:02:08.993716+02:00", "EventTime": "2023-10-30T14:02:08.993732+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6kKW84pYSo9mlpBTg"]} -{"Format": "IDEA0", "ID": "96d3db16-fcc4-4c65-9247-578da31ec21e", "DetectTime": "2023-10-30T14:02:09.005066+02:00", "EventTime": "2023-10-30T14:02:09.005082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CjDMrzlYjF0c2THRh"]} -{"Format": "IDEA0", "ID": "da1c7b40-0a7d-4951-87cd-e9bcd5914c44", "DetectTime": "2023-10-30T14:02:09.053713+02:00", "EventTime": "2023-10-30T14:02:09.053734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CylIO83pTKGmM1CmB"]} -{"Format": "Json", "ID": "da1c7b40-0a7d-4951-87cd-e9bcd5914c44", "DetectTime": "2023-10-30T14:02:09.053713+02:00", "EventTime": "2023-10-30T14:02:09.053734+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:03:06.001670+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:09.146095)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "872a28d2-ea7d-408c-a812-eae4c3390e6f", "DetectTime": "2023-10-30T14:02:09.150185+02:00", "EventTime": "2023-10-30T14:02:09.150196+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cm1z4N2BYcdOVWYwDb"]} -{"Format": "IDEA0", "ID": "d8954920-6955-4e52-90cb-aa9fc00e70d2", "DetectTime": "2023-10-30T14:02:09.158609+02:00", "EventTime": "2023-10-30T14:02:09.158623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CNlDqNIFAup9fc2q4"]} -{"Format": "IDEA0", "ID": "2ecd9bb0-f032-44f0-b244-139bc8363e57", "DetectTime": "2023-10-30T14:02:09.202224+02:00", "EventTime": "2023-10-30T14:02:09.202235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C6QL321xIjhxACwCs6"]} -{"Format": "IDEA0", "ID": "8131c808-dc67-4b05-a3f3-f19001b3aebb", "DetectTime": "2023-10-30T14:02:09.246468+02:00", "EventTime": "2023-10-30T14:02:09.246484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22009], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. ", "ContentType": "text/plain"}], "uids": ["CvFP8E4hs51X17WkGl"]} -{"Format": "IDEA0", "ID": "dd13f2cc-efaf-4d06-bbc0-86c3afa2c4af", "DetectTime": "2023-10-30T14:02:09.288959+02:00", "EventTime": "2023-10-30T14:02:09.288975+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"Hostname": ["dns.msftncsi.com"]}], "Attach": [{"Content": "domain dns.msftncsi.com resolved with no connection", "ContentType": "text/plain"}], "uids": ["CWgEJig6JK6pXGZTb"]} -{"Format": "IDEA0", "ID": "2b857262-79bb-4135-ba95-1a2dc8ef576e", "DetectTime": "2023-10-30T14:02:09.306938+02:00", "EventTime": "2023-10-30T14:02:09.306953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CqntMu2dpIYNTJ4qx2"]} -{"Format": "IDEA0", "ID": "d0366632-2ffb-4f4b-acc0-387e26d95465", "DetectTime": "2023-10-30T14:02:09.349212+02:00", "EventTime": "2023-10-30T14:02:09.349234+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXYRcX2rPIzJ4BA023"]} -{"Format": "IDEA0", "ID": "65931048-8a6e-4231-b781-b092a465e8dd", "DetectTime": "2023-10-30T14:02:09.360090+02:00", "EventTime": "2023-10-30T14:02:09.360106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CffHr03qjfge4AAGZb"]} -{"Format": "IDEA0", "ID": "710ae82b-c4a5-4e63-9fb0-96c8e8f10bb1", "DetectTime": "2023-10-30T14:02:09.397819+02:00", "EventTime": "2023-10-30T14:02:09.397840+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"Hostname": ["dns.msftncsi.com"]}], "Attach": [{"Content": "domain dns.msftncsi.com resolved with no connection", "ContentType": "text/plain"}], "uids": ["Cz0Hgz2JnAUZKwrTd1"]} -{"Format": "IDEA0", "ID": "135da991-c7c7-4aca-b33a-4c2a113d9dff", "DetectTime": "2023-10-30T14:02:09.415423+02:00", "EventTime": "2023-10-30T14:02:09.415444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CRaU5v2srp2Vj37QAe"]} -{"Format": "IDEA0", "ID": "b3071caa-c019-4b7a-94bb-1ea786208f7e", "DetectTime": "2023-10-30T14:02:09.458234+02:00", "EventTime": "2023-10-30T14:02:09.458254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CC0g18ofFITqoiAG6", "Cm1z4N2BYcdOVWYwDb", "CH7Ub3TPS0ikE5AZ9", "Cr8xzS1ciIspp3nCDg"]} -{"Format": "IDEA0", "ID": "eff40f0d-6cff-4ba2-9a9c-5a66a8ff1ef9", "DetectTime": "2023-10-30T14:02:09.467880+02:00", "EventTime": "2023-10-30T14:02:09.467895+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CH7Ub3TPS0ikE5AZ9"]} -{"Format": "IDEA0", "ID": "d5f2291a-4760-41d2-b9bf-2d6c32a0253d", "DetectTime": "2023-10-30T14:02:09.479992+02:00", "EventTime": "2023-10-30T14:02:09.480014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C5Rach1VNk64KmQY6"]} -{"Format": "IDEA0", "ID": "0ee20c94-e750-4f53-baa1-52f79ec5f502", "DetectTime": "2023-10-30T14:02:09.522150+02:00", "EventTime": "2023-10-30T14:02:09.522168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CGgsHc2aGXieURuCCi"]} -{"Format": "Json", "ID": "0ee20c94-e750-4f53-baa1-52f79ec5f502", "DetectTime": "2023-10-30T14:02:09.522150+02:00", "EventTime": "2023-10-30T14:02:09.522168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:03:07.135711+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:09.589985)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3bab8609-413e-46be-a006-ab53034a0220", "DetectTime": "2023-10-30T14:02:09.595030+02:00", "EventTime": "2023-10-30T14:02:09.595049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CJ4Bbr30fKZYmt6OJa"]} -{"Format": "IDEA0", "ID": "a4ad28cc-5c24-4348-9fbb-ce4fbfe1df49", "DetectTime": "2023-10-30T14:02:09.634752+02:00", "EventTime": "2023-10-30T14:02:09.634763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CiciS32mYmaAA6BMab"]} -{"Format": "IDEA0", "ID": "f0f38b3a-6c14-489c-a7c8-92a14d78ce86", "DetectTime": "2023-10-30T14:02:09.675340+02:00", "EventTime": "2023-10-30T14:02:09.675366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7819], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. ", "ContentType": "text/plain"}], "uids": ["CnCBQt2Arz8XgWbKh"]} -{"Format": "IDEA0", "ID": "e27e288e-a596-4321-b923-f890523d0840", "DetectTime": "2023-10-30T14:02:09.710738+02:00", "EventTime": "2023-10-30T14:02:09.710755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CJqOD630RfjfoN2bRk"]} -{"Format": "IDEA0", "ID": "a87bf722-5b4c-4796-a4a4-b4614df7b3a4", "DetectTime": "2023-10-30T14:02:09.749749+02:00", "EventTime": "2023-10-30T14:02:09.749763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["C3kUOZxI1g15pqwf"]} -{"Format": "IDEA0", "ID": "77a8194a-8d23-4efa-9eda-ac089610770a", "DetectTime": "2023-10-30T14:02:09.783030+02:00", "EventTime": "2023-10-30T14:02:09.783044+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cba2TV1XB72d7yyz8"]} -{"Format": "IDEA0", "ID": "0f15a199-432f-4e4a-90ca-2ed7ed457dc2", "DetectTime": "2023-10-30T14:02:09.790199+02:00", "EventTime": "2023-10-30T14:02:09.790210+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 181.65.3.210 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9eXgz19E7Jdgp8Sc9"]} -{"Format": "IDEA0", "ID": "38c7ffc7-b9d6-4ee9-93d7-6235058905a9", "DetectTime": "2023-10-30T14:02:09.827425+02:00", "EventTime": "2023-10-30T14:02:09.827446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CYsiOV1MVUhjkPkUt1"]} -{"Format": "IDEA0", "ID": "7295a8b1-2381-4ac7-9a27-5949b825f92f", "DetectTime": "2023-10-30T14:02:09.870996+02:00", "EventTime": "2023-10-30T14:02:09.871019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Czm8jZ3de6ZAuuSAmk"]} -{"Format": "IDEA0", "ID": "ab5d3746-628d-4905-a4d3-da524cf2d059", "DetectTime": "2023-10-30T14:02:09.913135+02:00", "EventTime": "2023-10-30T14:02:09.913154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["CQS7Cu1MT0KpxJMKG3"]} -{"Format": "Json", "ID": "ab5d3746-628d-4905-a4d3-da524cf2d059", "DetectTime": "2023-10-30T14:02:09.913135+02:00", "EventTime": "2023-10-30T14:02:09.913154+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:03:08.502032+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:09.983939)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f138273a-75b7-4d67-8f19-472931ea4dbd", "DetectTime": "2023-10-30T14:02:09.989516+02:00", "EventTime": "2023-10-30T14:02:09.989532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CRk51v4pe6Ob3ebPJ3"]} -{"Format": "IDEA0", "ID": "dc0eb95e-b5a4-41f5-b871-0e75b5557d91", "DetectTime": "2023-10-30T14:02:10.038126+02:00", "EventTime": "2023-10-30T14:02:10.038145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CFQpPo3whRgrDHFBn"]} -{"Format": "IDEA0", "ID": "93791d9e-0eee-4c31-83ca-631ed800fc75", "DetectTime": "2023-10-30T14:02:10.075796+02:00", "EventTime": "2023-10-30T14:02:10.075817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CqDqDK1AXaQP2glPLk"]} -{"Format": "IDEA0", "ID": "51b321f3-037e-4dd9-98bc-1a9dbc4cc552", "DetectTime": "2023-10-30T14:02:10.103771+02:00", "EventTime": "2023-10-30T14:02:10.103784+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"Hostname": ["dns.msftncsi.com"]}], "Attach": [{"Content": "domain dns.msftncsi.com resolved with no connection", "ContentType": "text/plain"}], "uids": ["CzAakX1y0aq8mqfKLh"]} -{"Format": "IDEA0", "ID": "9509b3d0-9dde-4798-9bc6-0f684d9e65e1", "DetectTime": "2023-10-30T14:02:10.119621+02:00", "EventTime": "2023-10-30T14:02:10.119637+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqaiXb3HjCHiQTCCEd"]} -{"Format": "IDEA0", "ID": "128eb95a-bb66-47b0-aad0-1e30642390ce", "DetectTime": "2023-10-30T14:02:10.131197+02:00", "EventTime": "2023-10-30T14:02:10.131208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CisCqj2OZ1kyzWyrd3"]} -{"Format": "IDEA0", "ID": "27cca69d-684b-4e72-8928-23db6056346b", "DetectTime": "2023-10-30T14:02:10.166399+02:00", "EventTime": "2023-10-30T14:02:10.166416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"Hostname": ["dns.msftncsi.com"]}], "Attach": [{"Content": "domain dns.msftncsi.com resolved with no connection", "ContentType": "text/plain"}], "uids": ["CqAssL10OurGhj5Hxa"]} -{"Format": "IDEA0", "ID": "7b7ba59e-29df-4956-b857-34e8b594740c", "DetectTime": "2023-10-30T14:02:10.183188+02:00", "EventTime": "2023-10-30T14:02:10.183200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. ", "ContentType": "text/plain"}], "uids": ["Cc5pUh2A2jF9BBqn85"]} -{"Format": "IDEA0", "ID": "4245a1d8-ad7f-48b1-8c56-d7b92613637c", "DetectTime": "2023-10-30T14:02:10.218931+02:00", "EventTime": "2023-10-30T14:02:10.218943+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzIfBr3VbZaEJ961Lf"]} -{"Format": "IDEA0", "ID": "644be529-ec2a-4e31-af07-4da0d3c0560a", "DetectTime": "2023-10-30T14:02:10.229969+02:00", "EventTime": "2023-10-30T14:02:10.229990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. ", "ContentType": "text/plain"}], "uids": ["CkficUXCOOj58MlJb"]} -{"Format": "IDEA0", "ID": "69a671fe-0bfe-4fde-b74e-f4e138aba202", "DetectTime": "2023-10-30T14:02:10.262236+02:00", "EventTime": "2023-10-30T14:02:10.262246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. ", "ContentType": "text/plain"}], "uids": ["CD27iT1e4aPWC48Y0b"]} -{"Format": "IDEA0", "ID": "dfb94950-06b0-4190-acaf-239a8343a406", "DetectTime": "2023-10-30T14:02:10.295649+02:00", "EventTime": "2023-10-30T14:02:10.295667+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxlLaC3twphuFdGM63"]} -{"Format": "IDEA0", "ID": "7812ce0d-34ec-4b4f-808e-760a2660b0de", "DetectTime": "2023-10-30T14:02:10.308466+02:00", "EventTime": "2023-10-30T14:02:10.308486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["Cxou8o3yF9cJToJC96"]} -{"Format": "Json", "ID": "7812ce0d-34ec-4b4f-808e-760a2660b0de", "DetectTime": "2023-10-30T14:02:10.308466+02:00", "EventTime": "2023-10-30T14:02:10.308486+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:03:29.423083+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:10.368929)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "325acfc1-65dd-4719-95f5-2341f613f63a", "DetectTime": "2023-10-30T14:02:10.374167+02:00", "EventTime": "2023-10-30T14:02:10.374183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CIJ4Nc1bcBu1aK05id"]} -{"Format": "IDEA0", "ID": "b3e1cb4b-8a98-414c-8a05-69e9beede731", "DetectTime": "2023-10-30T14:02:10.409474+02:00", "EventTime": "2023-10-30T14:02:10.409498+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGAf8p6pFlqOak2ug"]} -{"Format": "IDEA0", "ID": "76cdfbad-d2ac-4eda-baa2-45cf846edc57", "DetectTime": "2023-10-30T14:02:10.422255+02:00", "EventTime": "2023-10-30T14:02:10.422274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CIR7EezCaF3WlFYw1"]} -{"Format": "IDEA0", "ID": "2655a04a-03cc-47fd-85da-f0a4c318ceaf", "DetectTime": "2023-10-30T14:02:10.460746+02:00", "EventTime": "2023-10-30T14:02:10.460763+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7vNVu2biBaO4pv2A2"]} -{"Format": "IDEA0", "ID": "c983ac98-0e4f-460a-86f5-ff8a1ca67dd7", "DetectTime": "2023-10-30T14:02:10.471402+02:00", "EventTime": "2023-10-30T14:02:10.471414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CP9jlr2BtYsOPT5Rml"]} -{"Format": "IDEA0", "ID": "e936a844-5dd9-4f77-afdd-09adff2456ea", "DetectTime": "2023-10-30T14:02:10.508331+02:00", "EventTime": "2023-10-30T14:02:10.508359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CVupwc3dl60Q5RKM4f"]} -{"Format": "IDEA0", "ID": "d37b77cf-8005-4fac-ab58-5fbca2a1b1c3", "DetectTime": "2023-10-30T14:02:10.544104+02:00", "EventTime": "2023-10-30T14:02:10.544122+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1by2C1S6utaIPUKve"]} -{"Format": "IDEA0", "ID": "aa90d98e-273a-41cf-8730-47cc39d441ef", "DetectTime": "2023-10-30T14:02:10.555184+02:00", "EventTime": "2023-10-30T14:02:10.555196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24715], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. ", "ContentType": "text/plain"}], "uids": ["CpVQw73dQKnW9YNJJf"]} -{"Format": "IDEA0", "ID": "70183ba7-7a96-4a23-8cc2-f77467b7b9cf", "DetectTime": "2023-10-30T14:02:10.583105+02:00", "EventTime": "2023-10-30T14:02:10.583127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["ClEyAr2DPpkA5LiI2g"]} -{"Format": "IDEA0", "ID": "e94982e3-4bb6-491f-8f20-e24d9ca1c69e", "DetectTime": "2023-10-30T14:02:10.622369+02:00", "EventTime": "2023-10-30T14:02:10.622386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C7vNVu2biBaO4pv2A2", "CxlLaC3twphuFdGM63", "CqaiXb3HjCHiQTCCEd", "C02EiD2M9naIS2bXt2"]} -{"Format": "IDEA0", "ID": "9588674f-9e1a-4ca2-9d5a-5304ad42af71", "DetectTime": "2023-10-30T14:02:10.636137+02:00", "EventTime": "2023-10-30T14:02:10.636164+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C02EiD2M9naIS2bXt2"]} -{"Format": "IDEA0", "ID": "7998b467-6f72-4a45-ac61-fe4a99c4b45a", "DetectTime": "2023-10-30T14:02:10.650093+02:00", "EventTime": "2023-10-30T14:02:10.650114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjTO8KxKFzEAdC355"]} -{"Format": "IDEA0", "ID": "602a2e70-8dcc-42a8-aa38-850538c7c562", "DetectTime": "2023-10-30T14:02:10.688945+02:00", "EventTime": "2023-10-30T14:02:10.688963+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtnTKTwp0ptEmutth"]} -{"Format": "IDEA0", "ID": "9ae9d093-1db5-4e7b-8813-f7ee7e6428f7", "DetectTime": "2023-10-30T14:02:10.707123+02:00", "EventTime": "2023-10-30T14:02:10.707144+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cehvtr4B5XlkM17az"]} -{"Format": "IDEA0", "ID": "8adfaa57-6e80-4611-be94-07f7557cdca3", "DetectTime": "2023-10-30T14:02:10.720781+02:00", "EventTime": "2023-10-30T14:02:10.720799+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5Zfnv2snZwISGgTR5"]} -{"Format": "IDEA0", "ID": "f41bee97-4d91-4b6b-b542-2f79ea082fe2", "DetectTime": "2023-10-30T14:02:10.734377+02:00", "EventTime": "2023-10-30T14:02:10.734389+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C24tk21PZXSFCMmmG3"]} -{"Format": "IDEA0", "ID": "ea5eaa89-2bc8-4591-b5ad-d2e9b41d892d", "DetectTime": "2023-10-30T14:02:10.746663+02:00", "EventTime": "2023-10-30T14:02:10.746675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["C6wxYG2YU4wrtfg0u5"]} -{"Format": "Json", "ID": "ea5eaa89-2bc8-4591-b5ad-d2e9b41d892d", "DetectTime": "2023-10-30T14:02:10.746663+02:00", "EventTime": "2023-10-30T14:02:10.746675+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:34:07.125859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:10.805510)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "81ed641d-66ab-4909-8a9e-159f13baf3f5", "DetectTime": "2023-10-30T14:02:10.811079+02:00", "EventTime": "2023-10-30T14:02:10.811090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CX5PU04xOxxF5m5Oh"]} -{"Format": "IDEA0", "ID": "8fab846d-33be-4958-93c4-66069889acea", "DetectTime": "2023-10-30T14:02:10.841674+02:00", "EventTime": "2023-10-30T14:02:10.841692+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVZOql3hDPgmxO2hdi"]} -{"Format": "IDEA0", "ID": "ebda2e64-e718-4705-b906-f476c5a4f384", "DetectTime": "2023-10-30T14:02:10.853626+02:00", "EventTime": "2023-10-30T14:02:10.853638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C6iMiMYeAUrEJ6Q63"]} -{"Format": "IDEA0", "ID": "9347038f-be9b-4cd1-9fcc-863326343669", "DetectTime": "2023-10-30T14:02:10.883169+02:00", "EventTime": "2023-10-30T14:02:10.883182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C7HHFB2ibxjqFPcrZc"]} -{"Format": "IDEA0", "ID": "c2a64249-fdea-4a59-90bc-6a1ad5c611c2", "DetectTime": "2023-10-30T14:02:10.912489+02:00", "EventTime": "2023-10-30T14:02:10.912509+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcM2rf1CYiha6Md8Xe"]} -{"Format": "IDEA0", "ID": "0ff21ce5-ff95-402d-8a2b-b3b08afc54ac", "DetectTime": "2023-10-30T14:02:10.924123+02:00", "EventTime": "2023-10-30T14:02:10.924135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CGBBEg3no2PBNRyIhh"]} -{"Format": "IDEA0", "ID": "96703274-0cfc-46f6-8ea2-416b7ac5d34d", "DetectTime": "2023-10-30T14:02:10.952159+02:00", "EventTime": "2023-10-30T14:02:10.952170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CiNlBA36knNfYqggg5"]} -{"Format": "IDEA0", "ID": "c9caad36-1838-453d-b485-993a85dd677c", "DetectTime": "2023-10-30T14:02:10.982307+02:00", "EventTime": "2023-10-30T14:02:10.982324+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoVmvP1AIXtieYfFkb"]} -{"Format": "IDEA0", "ID": "f9cd23a6-15ab-47ce-bd32-b31575db03c6", "DetectTime": "2023-10-30T14:02:10.995090+02:00", "EventTime": "2023-10-30T14:02:10.995107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CIv7g74EJoNhTyRTsd"]} -{"Format": "IDEA0", "ID": "0942f7ee-3243-49fb-a664-6c90611646d0", "DetectTime": "2023-10-30T14:02:11.025805+02:00", "EventTime": "2023-10-30T14:02:11.025825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CKIKb136q6OOx2WiAi"]} -{"Format": "IDEA0", "ID": "050a6b49-b013-4ba2-86c2-d9593269d137", "DetectTime": "2023-10-30T14:02:11.130198+02:00", "EventTime": "2023-10-30T14:02:11.130215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CU2qZN3OLBtdDaFVO8"]} -{"Format": "Json", "ID": "050a6b49-b013-4ba2-86c2-d9593269d137", "DetectTime": "2023-10-30T14:02:11.130198+02:00", "EventTime": "2023-10-30T14:02:11.130215+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:34:25.487768+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:11.203967)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b21a4fde-adcc-4bca-88e8-10f1c57410a0", "DetectTime": "2023-10-30T14:02:11.209326+02:00", "EventTime": "2023-10-30T14:02:11.209345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C4iSqd2KvI600AHgJ2"]} -{"Format": "IDEA0", "ID": "ed413872-ea23-430f-a269-0021ec7840f3", "DetectTime": "2023-10-30T14:02:11.243483+02:00", "EventTime": "2023-10-30T14:02:11.243499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C3QDwa19nQ1l1LZ062"]} -{"Format": "IDEA0", "ID": "e4c07e9e-d25b-4856-891a-db8c59a19480", "DetectTime": "2023-10-30T14:02:11.271638+02:00", "EventTime": "2023-10-30T14:02:11.271655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJKIAa4aDMz7WRYbLi"]} -{"Format": "IDEA0", "ID": "f3855866-c8be-49db-9044-4567067140cc", "DetectTime": "2023-10-30T14:02:11.306191+02:00", "EventTime": "2023-10-30T14:02:11.306212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CgAGNx1NqeMRzjXkO7"]} -{"Format": "IDEA0", "ID": "c9ad9ec6-5904-47db-be40-2f34c8550fb8", "DetectTime": "2023-10-30T14:02:11.340658+02:00", "EventTime": "2023-10-30T14:02:11.340672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CCcNFd3MipqfWuI6p8"]} -{"Format": "IDEA0", "ID": "cc8ff1eb-277d-499e-a400-e3fca86c6248", "DetectTime": "2023-10-30T14:02:11.370600+02:00", "EventTime": "2023-10-30T14:02:11.370617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CwYoX91fOC0s0rqY7i"]} -{"Format": "IDEA0", "ID": "434818c3-8550-488f-bcd6-06f5d150a4e8", "DetectTime": "2023-10-30T14:02:11.404780+02:00", "EventTime": "2023-10-30T14:02:11.404800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C1Bfk1203Y1u3xZOT"]} -{"Format": "IDEA0", "ID": "8f5dabe9-c0e5-44bf-9630-f9f8008284a6", "DetectTime": "2023-10-30T14:02:11.437796+02:00", "EventTime": "2023-10-30T14:02:11.437806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CpXnRNs7maAQo9W9"]} -{"Format": "Json", "ID": "8f5dabe9-c0e5-44bf-9630-f9f8008284a6", "DetectTime": "2023-10-30T14:02:11.437796+02:00", "EventTime": "2023-10-30T14:02:11.437806+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:34:26.889595+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:11.499532)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd83c5f5-8861-4862-97bb-d0c3c458f97e", "DetectTime": "2023-10-30T14:02:11.504874+02:00", "EventTime": "2023-10-30T14:02:11.504890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C1pr8U1mDIV3CxRqSh"]} -{"Format": "IDEA0", "ID": "66e81a2b-4062-42f6-9fca-500b798a4884", "DetectTime": "2023-10-30T14:02:11.539411+02:00", "EventTime": "2023-10-30T14:02:11.539427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CcAnt41KFdmAQAKzzf"]} -{"Format": "IDEA0", "ID": "e600b749-0b4f-4b55-92e8-e71f660757a0", "DetectTime": "2023-10-30T14:02:11.571625+02:00", "EventTime": "2023-10-30T14:02:11.571643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["Cc8LCR1maV4MQvxvyl"]} -{"Format": "IDEA0", "ID": "6ed634f4-7d23-438a-89ba-9add911c0f81", "DetectTime": "2023-10-30T14:02:11.608430+02:00", "EventTime": "2023-10-30T14:02:11.608450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CdWgOZfKsambnlmv4"]} -{"Format": "IDEA0", "ID": "36f62130-eac4-4833-905d-8c124f810fde", "DetectTime": "2023-10-30T14:02:11.641080+02:00", "EventTime": "2023-10-30T14:02:11.641097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CtIztk1D0xj2GyqGk6"]} -{"Format": "IDEA0", "ID": "c297cfec-64cd-4d60-a442-a1f96f011c6b", "DetectTime": "2023-10-30T14:02:11.668994+02:00", "EventTime": "2023-10-30T14:02:11.669010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CwC29R1KqKYsnZ60xb"]} -{"Format": "IDEA0", "ID": "a90f9d0a-6f80-46ad-bdf0-fc04545f3590", "DetectTime": "2023-10-30T14:02:11.702960+02:00", "EventTime": "2023-10-30T14:02:11.702977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["Cqhm4x2gmzs1M6RV21"]} -{"Format": "IDEA0", "ID": "437362d0-e0f6-4b3a-bc8e-276d11f1af75", "DetectTime": "2023-10-30T14:02:11.736017+02:00", "EventTime": "2023-10-30T14:02:11.736038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CcGxqxfXNsjtQ5Akk"]} -{"Format": "Json", "ID": "437362d0-e0f6-4b3a-bc8e-276d11f1af75", "DetectTime": "2023-10-30T14:02:11.736017+02:00", "EventTime": "2023-10-30T14:02:11.736038+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:35:00.987516+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:11.800531)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "12112cde-643f-4efa-8a99-f2a99d8a2f64", "DetectTime": "2023-10-30T14:02:11.804639+02:00", "EventTime": "2023-10-30T14:02:11.804650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CZrBjb2yHsIhS4kb6a"]} -{"Format": "IDEA0", "ID": "730fbb83-b600-40e9-9b11-977204741a5c", "DetectTime": "2023-10-30T14:02:11.836416+02:00", "EventTime": "2023-10-30T14:02:11.836433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["C7vcYe2pbpeedzinw1"]} -{"Format": "IDEA0", "ID": "d2d6c440-052e-41dd-bf36-556f1ad926fe", "DetectTime": "2023-10-30T14:02:11.865234+02:00", "EventTime": "2023-10-30T14:02:11.865254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["ClUK6MZvGxx8mxoT1"]} -{"Format": "IDEA0", "ID": "055d8cc5-4c63-4db8-b3bb-a380820ab9ff", "DetectTime": "2023-10-30T14:02:11.894193+02:00", "EventTime": "2023-10-30T14:02:11.894211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. ", "ContentType": "text/plain"}], "uids": ["CuUyrN39znjrZHBWDl"]} -{"Format": "IDEA0", "ID": "2c181b58-6d56-43d8-8352-6f6ffdc13679", "DetectTime": "2023-10-30T14:02:11.919414+02:00", "EventTime": "2023-10-30T14:02:11.919430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CcYXhd3HorksnMysJk"]} -{"Format": "IDEA0", "ID": "d74ac4f6-83ac-4da1-9442-9c17faa64557", "DetectTime": "2023-10-30T14:02:11.950284+02:00", "EventTime": "2023-10-30T14:02:11.950301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CsNLlnnJPQNAGAsI1"]} -{"Format": "IDEA0", "ID": "8df4db5b-7d50-445e-822b-424cee47a0dc", "DetectTime": "2023-10-30T14:02:11.977339+02:00", "EventTime": "2023-10-30T14:02:11.977358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CmfKBQ1XvfjlE9mPWg"]} -{"Format": "IDEA0", "ID": "f6908a15-531e-42b1-aa37-b4bc8123374f", "DetectTime": "2023-10-30T14:02:12.003086+02:00", "EventTime": "2023-10-30T14:02:12.003105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24715], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. ", "ContentType": "text/plain"}], "uids": ["CimbGx3SosYRwu3fZ1"]} -{"Format": "IDEA0", "ID": "3be4751b-9a4f-489c-af99-29642710095e", "DetectTime": "2023-10-30T14:02:12.030708+02:00", "EventTime": "2023-10-30T14:02:12.030724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["CZZVn44IUDxKUNSCml"]} -{"Format": "Json", "ID": "3be4751b-9a4f-489c-af99-29642710095e", "DetectTime": "2023-10-30T14:02:12.030708+02:00", "EventTime": "2023-10-30T14:02:12.030724+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T03:35:36.049158+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2023/10/30 14:02:12.090805)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb93a5d0-d74b-4388-9da9-595160cea048", "DetectTime": "2023-10-30T14:02:12.096643+02:00", "EventTime": "2023-10-30T14:02:12.096660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRpijiZp51vGyu5ij"]} -{"Format": "IDEA0", "ID": "d0ab28f3-dd88-4de8-90ae-8df3c00a1f68", "DetectTime": "2023-10-30T14:02:12.128415+02:00", "EventTime": "2023-10-30T14:02:12.128429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CG6nxw3xmQGRKvYPe3"]} -{"Format": "IDEA0", "ID": "e9318431-2033-4277-bb25-11abaa085cbf", "DetectTime": "2023-10-30T14:02:12.175919+02:00", "EventTime": "2023-10-30T14:02:12.175948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CVLr9d2ktickTgJWDk"]} -{"Format": "IDEA0", "ID": "b5461f50-4a40-4272-9d1f-62e99465aa12", "DetectTime": "2023-10-30T14:02:12.232066+02:00", "EventTime": "2023-10-30T14:02:12.232084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CdaUKu1m9X2hfBrEce"]} -{"Format": "IDEA0", "ID": "c1313cef-c671-439b-b6b6-fc289a2112fd", "DetectTime": "2023-10-30T14:02:12.277710+02:00", "EventTime": "2023-10-30T14:02:12.277722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CSbBDD58bC0QfQjM2"]} -{"Format": "IDEA0", "ID": "86c2ebc7-13b3-42b5-b894-fea42f357f00", "DetectTime": "2023-10-30T14:02:12.327545+02:00", "EventTime": "2023-10-30T14:02:12.327562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cg2Xcw3mZJICWMKeWg"]} -{"Format": "IDEA0", "ID": "26e7d8e2-101c-4235-a701-f3e28020eff5", "DetectTime": "2023-10-30T14:02:12.374809+02:00", "EventTime": "2023-10-30T14:02:12.374831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CEtJk2pz3OyVENLj8"]} -{"Format": "IDEA0", "ID": "84c8e48f-fa01-4edf-877e-6a6596598732", "DetectTime": "2023-10-30T14:02:12.425056+02:00", "EventTime": "2023-10-30T14:02:12.425074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CMLTMbGlfYjip4JDi"]} -{"Format": "Json", "ID": "84c8e48f-fa01-4edf-877e-6a6596598732", "DetectTime": "2023-10-30T14:02:12.425056+02:00", "EventTime": "2023-10-30T14:02:12.425074+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:07:07.258352+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:12.528188)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e0c5b22-5b16-43f2-904b-67e8c6a29dbc", "DetectTime": "2023-10-30T14:02:12.534165+02:00", "EventTime": "2023-10-30T14:02:12.534187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CQ2d433y3ZkPzx2rU3"]} -{"Format": "IDEA0", "ID": "757ec397-e642-4c3d-9bd0-7d2f7cf6593f", "DetectTime": "2023-10-30T14:02:12.578144+02:00", "EventTime": "2023-10-30T14:02:12.578166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CaD2jl1dYqL0AMKxe4"]} -{"Format": "IDEA0", "ID": "656a22d2-f3de-4a06-8a5c-acbcd4cfbbe2", "DetectTime": "2023-10-30T14:02:12.617889+02:00", "EventTime": "2023-10-30T14:02:12.617907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CoxOc621O4jquB8ju4"]} -{"Format": "IDEA0", "ID": "63f3704d-e0fc-48b0-a521-34f51d6c3844", "DetectTime": "2023-10-30T14:02:12.663807+02:00", "EventTime": "2023-10-30T14:02:12.663824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CSP57F40IuYlN2Xmn8"]} -{"Format": "IDEA0", "ID": "2a50977e-86f0-4759-ab8e-df84b7eadb48", "DetectTime": "2023-10-30T14:02:12.705468+02:00", "EventTime": "2023-10-30T14:02:12.705487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["ClKBCs2WceVbShlLX6"]} -{"Format": "IDEA0", "ID": "b1800c34-af21-42fd-b350-22e4224f2008", "DetectTime": "2023-10-30T14:02:12.749821+02:00", "EventTime": "2023-10-30T14:02:12.749842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CFYG663PDDQlUrcYoj"]} -{"Format": "IDEA0", "ID": "52ddbdf7-d912-42cf-bae5-b29ae5a154d6", "DetectTime": "2023-10-30T14:02:12.787908+02:00", "EventTime": "2023-10-30T14:02:12.787920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["CzehgA4vITjjXIHGP8"]} -{"Format": "IDEA0", "ID": "57144c99-fdc4-490c-8d57-0bc26582f542", "DetectTime": "2023-10-30T14:02:12.828146+02:00", "EventTime": "2023-10-30T14:02:12.828163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CENpXC3g1qI8Hlgofb"]} -{"Format": "Json", "ID": "57144c99-fdc4-490c-8d57-0bc26582f542", "DetectTime": "2023-10-30T14:02:12.828146+02:00", "EventTime": "2023-10-30T14:02:12.828163+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:07:09.193278+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:12.890675)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6ecfc448-e370-45ed-aa55-dee43a18a98a", "DetectTime": "2023-10-30T14:02:12.896365+02:00", "EventTime": "2023-10-30T14:02:12.896382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CdHwk62pcXvBtiJPO2"]} -{"Format": "IDEA0", "ID": "9af94f9f-224d-48e7-b19a-5637a7e1f28c", "DetectTime": "2023-10-30T14:02:12.936390+02:00", "EventTime": "2023-10-30T14:02:12.936401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["Ceudfq4Nbs6LgDadhe"]} -{"Format": "IDEA0", "ID": "1d87c9af-c8a9-41ca-bc55-c83a8e3a21d9", "DetectTime": "2023-10-30T14:02:12.973831+02:00", "EventTime": "2023-10-30T14:02:12.973843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Cv4OmV3lP7g8EQcdf9"]} -{"Format": "IDEA0", "ID": "15ec96c4-3802-45b6-b7ad-b353775ff7df", "DetectTime": "2023-10-30T14:02:13.008297+02:00", "EventTime": "2023-10-30T14:02:13.008324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CPMDMo1h7JKPEoLjJa"]} -{"Format": "IDEA0", "ID": "81af2d79-f0ec-4355-ba31-f7150b125a85", "DetectTime": "2023-10-30T14:02:13.066542+02:00", "EventTime": "2023-10-30T14:02:13.066565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["Ckrwgj2jXDWCf4qbqf"]} -{"Format": "IDEA0", "ID": "596ecfb6-4623-4736-adce-c314ba0af817", "DetectTime": "2023-10-30T14:02:13.111618+02:00", "EventTime": "2023-10-30T14:02:13.111639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CqguU6LgBT30e0iR4"]} -{"Format": "IDEA0", "ID": "6cd1c165-8d46-434c-9dc7-28ec7609df30", "DetectTime": "2023-10-30T14:02:13.238540+02:00", "EventTime": "2023-10-30T14:02:13.238561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["Ccyujy2isnO6iLYiRh"]} -{"Format": "IDEA0", "ID": "1a38587d-e622-4134-a1d2-f92c9192c329", "DetectTime": "2023-10-30T14:02:13.282321+02:00", "EventTime": "2023-10-30T14:02:13.282346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CmUgzR3ywORBAGdNwl"]} -{"Format": "Json", "ID": "1a38587d-e622-4134-a1d2-f92c9192c329", "DetectTime": "2023-10-30T14:02:13.282321+02:00", "EventTime": "2023-10-30T14:02:13.282346+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:07:14.139944+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:13.370095)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3bbf98f-be04-42ce-ac3f-2072e5ad2ee9", "DetectTime": "2023-10-30T14:02:13.375746+02:00", "EventTime": "2023-10-30T14:02:13.375769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["Cijjd335QmcNK4aG8i"]} -{"Format": "IDEA0", "ID": "1cab74ae-4c3c-4344-b2dc-cc68cfbe1d1b", "DetectTime": "2023-10-30T14:02:13.425872+02:00", "EventTime": "2023-10-30T14:02:13.425888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CqZykKSsWbaGCYco9"]} -{"Format": "IDEA0", "ID": "40ae034e-6f33-45a8-ad81-e6223e3f651d", "DetectTime": "2023-10-30T14:02:13.470504+02:00", "EventTime": "2023-10-30T14:02:13.470525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CE9xsh1IJH2fFRI4v6"]} -{"Format": "IDEA0", "ID": "3ea59e96-6c81-4a77-8d4c-774dd25d90b4", "DetectTime": "2023-10-30T14:02:13.521533+02:00", "EventTime": "2023-10-30T14:02:13.521547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CEwllN20x68rFaGF7g"]} -{"Format": "IDEA0", "ID": "758d8c65-7a9f-417d-8159-8f116c28abdd", "DetectTime": "2023-10-30T14:02:13.567499+02:00", "EventTime": "2023-10-30T14:02:13.567519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5554], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. ", "ContentType": "text/plain"}], "uids": ["CeBRY428q3zLMU9e89"]} -{"Format": "IDEA0", "ID": "befc24c8-1dcb-4585-9a1c-90c2f4c9c796", "DetectTime": "2023-10-30T14:02:13.616190+02:00", "EventTime": "2023-10-30T14:02:13.616207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["COJSoe4cYHa12G4zk1"]} -{"Format": "IDEA0", "ID": "d95dc1ee-3dcd-4153-954f-66a962897f65", "DetectTime": "2023-10-30T14:02:13.656693+02:00", "EventTime": "2023-10-30T14:02:13.656716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CB2NpW2MTqUSa4ehLk"]} -{"Format": "IDEA0", "ID": "29245c13-0bbc-4125-a2fb-491d47e2bc3c", "DetectTime": "2023-10-30T14:02:13.704198+02:00", "EventTime": "2023-10-30T14:02:13.704216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CPLP801vIIlcBD0zsh"]} -{"Format": "Json", "ID": "29245c13-0bbc-4125-a2fb-491d47e2bc3c", "DetectTime": "2023-10-30T14:02:13.704198+02:00", "EventTime": "2023-10-30T14:02:13.704216+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:07:15.856667+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:13.783139)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "36770399-e831-40c6-81ab-6cea58c536e6", "DetectTime": "2023-10-30T14:02:13.789167+02:00", "EventTime": "2023-10-30T14:02:13.789190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["CnGqvd47LvbuZSikG1"]} -{"Format": "IDEA0", "ID": "af9f9d32-f753-4d3a-9d60-9d615d460942", "DetectTime": "2023-10-30T14:02:13.844058+02:00", "EventTime": "2023-10-30T14:02:13.844080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkicyW2JGLgiCrdgCb"]} -{"Format": "IDEA0", "ID": "2dad2123-5a71-4db6-bb10-3f2731f01ced", "DetectTime": "2023-10-30T14:02:13.885539+02:00", "EventTime": "2023-10-30T14:02:13.885555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CodTR5hQiQbxSf6i2"]} -{"Format": "IDEA0", "ID": "ad6a1690-c5ab-4c58-9851-72111c97faa6", "DetectTime": "2023-10-30T14:02:13.930048+02:00", "EventTime": "2023-10-30T14:02:13.930072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CbrvgV1xggnuh6shZg"]} -{"Format": "IDEA0", "ID": "5457676c-aa33-418c-8f5b-d7cb3e488e6b", "DetectTime": "2023-10-30T14:02:13.968542+02:00", "EventTime": "2023-10-30T14:02:13.968564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CPBhqS1MeHLwVeNBz2"]} -{"Format": "IDEA0", "ID": "422addd4-9a4c-4162-ad6c-8eb3f723dd60", "DetectTime": "2023-10-30T14:02:14.007575+02:00", "EventTime": "2023-10-30T14:02:14.007592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["ClKjBpVEmk5unimsh"]} -{"Format": "IDEA0", "ID": "a141d352-a31b-424b-bb05-00eb5ce49419", "DetectTime": "2023-10-30T14:02:14.049529+02:00", "EventTime": "2023-10-30T14:02:14.049545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C85xuD4gcedI32F9t5"]} -{"Format": "IDEA0", "ID": "e207b86b-b3fe-4c4f-8a9b-338c2ee74ace", "DetectTime": "2023-10-30T14:02:14.091089+02:00", "EventTime": "2023-10-30T14:02:14.091113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CjoSnKmDz4yVu5gr2"]} -{"Format": "Json", "ID": "e207b86b-b3fe-4c4f-8a9b-338c2ee74ace", "DetectTime": "2023-10-30T14:02:14.091089+02:00", "EventTime": "2023-10-30T14:02:14.091113+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:38:32.329497+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:14.189179)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "431d1adc-35d0-475e-a05c-e2f2ca874273", "DetectTime": "2023-10-30T14:02:14.196054+02:00", "EventTime": "2023-10-30T14:02:14.196072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CHT9hH2FOr1A3rWV56"]} -{"Format": "IDEA0", "ID": "e55b820e-da33-43e6-8f91-a42d477a95d8", "DetectTime": "2023-10-30T14:02:14.237458+02:00", "EventTime": "2023-10-30T14:02:14.237475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["Ck9tFlXqc1ZyGyi81"]} -{"Format": "IDEA0", "ID": "0b7909be-2864-4bae-b61e-ead6b0d827ca", "DetectTime": "2023-10-30T14:02:14.279116+02:00", "EventTime": "2023-10-30T14:02:14.279133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CfjEkm1zJpu8OLwx28"]} -{"Format": "IDEA0", "ID": "7de13a4e-b57e-43b5-922f-0f0cb68528e4", "DetectTime": "2023-10-30T14:02:14.312632+02:00", "EventTime": "2023-10-30T14:02:14.312653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CxUf1h4R64arGfhZr2"]} -{"Format": "IDEA0", "ID": "cfc7ec0b-b2d9-433e-9ab8-921ed92de080", "DetectTime": "2023-10-30T14:02:14.361817+02:00", "EventTime": "2023-10-30T14:02:14.361835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CcWwrK3b3gX4MPyZ6i"]} -{"Format": "IDEA0", "ID": "d895cb18-45af-46fa-91c3-94aa763e0e0a", "DetectTime": "2023-10-30T14:02:14.398905+02:00", "EventTime": "2023-10-30T14:02:14.398924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CrQdIJ3dQeyIH7Imz"]} -{"Format": "IDEA0", "ID": "74368b98-70f5-4298-bb7b-9632ee6d5410", "DetectTime": "2023-10-30T14:02:14.438142+02:00", "EventTime": "2023-10-30T14:02:14.438164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CvelMd2eGiab4gYEb4"]} -{"Format": "IDEA0", "ID": "f55f443e-cd12-4b11-b9aa-49bb459754b8", "DetectTime": "2023-10-30T14:02:14.497638+02:00", "EventTime": "2023-10-30T14:02:14.497657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. ", "ContentType": "text/plain"}], "uids": ["C0jxLv1jD9lILq1sQ8"]} -{"Format": "Json", "ID": "f55f443e-cd12-4b11-b9aa-49bb459754b8", "DetectTime": "2023-10-30T14:02:14.497638+02:00", "EventTime": "2023-10-30T14:02:14.497657+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:38:34.062900+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:14.581418)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "252c0a06-09bc-4c98-8290-8af5c02547eb", "DetectTime": "2023-10-30T14:02:14.586996+02:00", "EventTime": "2023-10-30T14:02:14.587013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CWpB4736Bb391z5M7"]} -{"Format": "IDEA0", "ID": "a0aece5a-ff6c-4374-8078-e8c1f4f36f54", "DetectTime": "2023-10-30T14:02:14.626953+02:00", "EventTime": "2023-10-30T14:02:14.626972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CMiCxj2886irmrQzyk"]} -{"Format": "IDEA0", "ID": "d5590407-c562-441e-8333-2cec225cbd1d", "DetectTime": "2023-10-30T14:02:14.669458+02:00", "EventTime": "2023-10-30T14:02:14.669476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CETGf92YS0CC0NIn8g"]} -{"Format": "IDEA0", "ID": "8be68f88-85ae-4350-bfe2-15ca5ed51f28", "DetectTime": "2023-10-30T14:02:14.713270+02:00", "EventTime": "2023-10-30T14:02:14.713294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CWOpTF3k5DoDniOt2a"]} -{"Format": "IDEA0", "ID": "de676c68-965d-424c-aea9-4755c19cf76b", "DetectTime": "2023-10-30T14:02:14.748231+02:00", "EventTime": "2023-10-30T14:02:14.748248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CgfYQl1gLrGeVqgfzj"]} -{"Format": "IDEA0", "ID": "caf5a980-55b8-4b46-8570-c8ca4de59727", "DetectTime": "2023-10-30T14:02:14.782151+02:00", "EventTime": "2023-10-30T14:02:14.782168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["CKsfHd1fRdsCAGr0Ha"]} -{"Format": "IDEA0", "ID": "51ceecbd-1301-4c41-b786-f2f3913cab23", "DetectTime": "2023-10-30T14:02:14.816808+02:00", "EventTime": "2023-10-30T14:02:14.816825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CERXxe4N3ET6LGRP3d"]} -{"Format": "IDEA0", "ID": "758c8c0f-0aa3-4e6f-bb31-b844a5c20ec3", "DetectTime": "2023-10-30T14:02:14.854825+02:00", "EventTime": "2023-10-30T14:02:14.854850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cehvtr4B5XlkM17az", "C24tk21PZXSFCMmmG3", "CcM2rf1CYiha6Md8Xe", "C03c4h1Hvg9focBoCf"]} -{"Format": "IDEA0", "ID": "f6217903-3b56-4c53-ab21-bef9a0ba3723", "DetectTime": "2023-10-30T14:02:14.872797+02:00", "EventTime": "2023-10-30T14:02:14.872819+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C03c4h1Hvg9focBoCf"]} -{"Format": "IDEA0", "ID": "35e4c7ba-ae5a-41c6-abed-3a244bdd9dc3", "DetectTime": "2023-10-30T14:02:14.888567+02:00", "EventTime": "2023-10-30T14:02:14.888585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["Ca0fuZ1DlV7sxC1a4h"]} -{"Format": "Json", "ID": "35e4c7ba-ae5a-41c6-abed-3a244bdd9dc3", "DetectTime": "2023-10-30T14:02:14.888567+02:00", "EventTime": "2023-10-30T14:02:14.888585+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T04:38:35.880919+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:14.955510)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cdec871e-e44b-40b9-ae6a-3a4c8b9adc20", "DetectTime": "2023-10-30T14:02:14.960272+02:00", "EventTime": "2023-10-30T14:02:14.960289+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGyEQc1gsPhUvED9w"]} -{"Format": "IDEA0", "ID": "fae00c26-2bf1-4490-a096-0616be1327cc", "DetectTime": "2023-10-30T14:02:14.977143+02:00", "EventTime": "2023-10-30T14:02:14.977156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["ClhUYG3Z6zlkPdrmTi"]} -{"Format": "IDEA0", "ID": "b4e4e28c-9a7b-43b5-9450-ffe238d29ebe", "DetectTime": "2023-10-30T14:02:15.002200+02:00", "EventTime": "2023-10-30T14:02:15.002217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["C308KKAuucpAuw7Cf"]} -{"Format": "IDEA0", "ID": "f4c14dae-3c18-4a6f-b1bf-6d78e247cd4c", "DetectTime": "2023-10-30T14:02:15.029787+02:00", "EventTime": "2023-10-30T14:02:15.029807+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5ZhHq3oSR9bCcreS6"]} -{"Format": "IDEA0", "ID": "4e0f2d7b-d0c0-41e9-9c95-ac964314c140", "DetectTime": "2023-10-30T14:02:15.041161+02:00", "EventTime": "2023-10-30T14:02:15.041182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CBPwgf2LtkcmlmTaz6"]} -{"Format": "IDEA0", "ID": "815e49bb-63b1-430a-80a6-2b628b82e43f", "DetectTime": "2023-10-30T14:02:15.065119+02:00", "EventTime": "2023-10-30T14:02:15.065137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CgIdFs3srYnrtAIgNh"]} -{"Format": "IDEA0", "ID": "c0952cd7-4468-47ee-990a-1b54a041275d", "DetectTime": "2023-10-30T14:02:15.090455+02:00", "EventTime": "2023-10-30T14:02:15.090475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CPVJZz4SFcYaXMbB6b"]} -{"Format": "IDEA0", "ID": "b798a363-904e-41e6-b6ee-3f012aede255", "DetectTime": "2023-10-30T14:02:15.116008+02:00", "EventTime": "2023-10-30T14:02:15.116023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CsrNFYKEt8lYJsNG5"]} -{"Format": "IDEA0", "ID": "7a55657c-51ab-4eff-9f92-74caeb2e2675", "DetectTime": "2023-10-30T14:02:15.140462+02:00", "EventTime": "2023-10-30T14:02:15.140474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25401], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. ", "ContentType": "text/plain"}], "uids": ["CGhU8n2EKWgY0fIuBc"]} -{"Format": "IDEA0", "ID": "9b574adc-6116-404c-a384-23d44008c83c", "DetectTime": "2023-10-30T14:02:15.163324+02:00", "EventTime": "2023-10-30T14:02:15.163337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjZl4z1OaMRZhEMWg3"]} -{"Format": "Json", "ID": "9b574adc-6116-404c-a384-23d44008c83c", "DetectTime": "2023-10-30T14:02:15.163324+02:00", "EventTime": "2023-10-30T14:02:15.163337+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-03T04:47:42.258219+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2023/10/30 14:02:15.227666)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "876609c2-1e13-4e80-a58b-b72948506203", "DetectTime": "2023-10-30T14:02:15.232366+02:00", "EventTime": "2023-10-30T14:02:15.232384+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjExBa2WJ8qjQ45092"]} -{"Format": "IDEA0", "ID": "7a334441-b629-4a4c-8bd6-03cd05b9a04f", "DetectTime": "2023-10-30T14:02:15.247648+02:00", "EventTime": "2023-10-30T14:02:15.247667+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ch05I12vdxdjKxaeC4"]} -{"Format": "IDEA0", "ID": "a9c07d2b-a564-40f8-81fd-9c8d1673d8e8", "DetectTime": "2023-10-30T14:02:15.261294+02:00", "EventTime": "2023-10-30T14:02:15.261314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CgqTke4wfaxMWyXBRc"]} -{"Format": "IDEA0", "ID": "aa0daebf-d681-4b82-9e1b-1e8f2ed1fbaf", "DetectTime": "2023-10-30T14:02:15.300984+02:00", "EventTime": "2023-10-30T14:02:15.301003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CoYVZd2EHFRNwQz5Eg"]} -{"Format": "IDEA0", "ID": "b7b211c9-a1f7-4ded-b2fd-d74e151ac254", "DetectTime": "2023-10-30T14:02:15.344737+02:00", "EventTime": "2023-10-30T14:02:15.344758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CviEST3Szm2v3imCd4"]} -{"Format": "IDEA0", "ID": "4d9f5f63-d555-46bb-a97f-2d5a1f0d3440", "DetectTime": "2023-10-30T14:02:15.387903+02:00", "EventTime": "2023-10-30T14:02:15.387923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["C9ANNZ3C13UPwK2p85"]} -{"Format": "IDEA0", "ID": "df8ead4b-aea5-4421-9942-aa3f46857f9e", "DetectTime": "2023-10-30T14:02:15.434225+02:00", "EventTime": "2023-10-30T14:02:15.434243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CY9ejV1KjtL38aJO17"]} -{"Format": "IDEA0", "ID": "5880c161-bb89-4cc6-af96-05d8116d4fc9", "DetectTime": "2023-10-30T14:02:15.478865+02:00", "EventTime": "2023-10-30T14:02:15.478887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CbXBee4MfWnFs1g0l1"]} -{"Format": "IDEA0", "ID": "86c2d8ad-0fcb-4915-a85d-fb3f62b55721", "DetectTime": "2023-10-30T14:02:15.521479+02:00", "EventTime": "2023-10-30T14:02:15.521505+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C73Pz22TXbmBTKuJDg"]} -{"Format": "IDEA0", "ID": "e5808e91-e7b2-49f4-9343-6be56c8cc52e", "DetectTime": "2023-10-30T14:02:15.537068+02:00", "EventTime": "2023-10-30T14:02:15.537085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CW3az33HkxSM8nRiud"]} -{"Format": "Json", "ID": "e5808e91-e7b2-49f4-9343-6be56c8cc52e", "DetectTime": "2023-10-30T14:02:15.537068+02:00", "EventTime": "2023-10-30T14:02:15.537085+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:09:32.436432+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:15.652917)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ca95d8d6-e2a1-41f5-a547-db808199ca68", "DetectTime": "2023-10-30T14:02:15.659310+02:00", "EventTime": "2023-10-30T14:02:15.659336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["C3cS5gTs0rrKQWJD6"]} -{"Format": "IDEA0", "ID": "33a4539e-fb1b-45d3-ac6f-517d8d5a9f9e", "DetectTime": "2023-10-30T14:02:15.702752+02:00", "EventTime": "2023-10-30T14:02:15.702788+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CR82Lp1y1GRItM06of"]} -{"Format": "IDEA0", "ID": "c7ec741a-b776-4ae6-8b87-3ea72fc04994", "DetectTime": "2023-10-30T14:02:15.716308+02:00", "EventTime": "2023-10-30T14:02:15.716321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cl9mnp1EmweiCzd0tb"]} -{"Format": "IDEA0", "ID": "39afd1e6-9f56-456a-83c4-b7654f7c3e86", "DetectTime": "2023-10-30T14:02:15.755151+02:00", "EventTime": "2023-10-30T14:02:15.755172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CPJLD41hSb1ZgXm8ye"]} -{"Format": "IDEA0", "ID": "9d094280-e89d-4162-b4f6-9c136f9cd2c9", "DetectTime": "2023-10-30T14:02:15.795242+02:00", "EventTime": "2023-10-30T14:02:15.795262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CMcSeX1ITdJ2IiXiJj"]} -{"Format": "IDEA0", "ID": "0c0a5d5c-3167-4e59-9218-cb4ff6f85503", "DetectTime": "2023-10-30T14:02:15.831786+02:00", "EventTime": "2023-10-30T14:02:15.831807+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqFTOr18aNLNQ3Cmv4"]} -{"Format": "IDEA0", "ID": "e31207a4-a54d-4f7b-a692-ce3cd79bacc4", "DetectTime": "2023-10-30T14:02:15.845846+02:00", "EventTime": "2023-10-30T14:02:15.845864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6VFWFsYOtfJJnIxi"]} -{"Format": "IDEA0", "ID": "b939790f-5481-4b5f-b17d-60bcc1e54b05", "DetectTime": "2023-10-30T14:02:15.883664+02:00", "EventTime": "2023-10-30T14:02:15.883687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CaNRbf2VIZ3jzqhTs3"]} -{"Format": "IDEA0", "ID": "34a38beb-eca3-4fc3-a1fd-a41b88f191c9", "DetectTime": "2023-10-30T14:02:15.922043+02:00", "EventTime": "2023-10-30T14:02:15.922061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5ZhHq3oSR9bCcreS6", "CfzcSu3FdquNiATfo2", "Ch05I12vdxdjKxaeC4", "CR82Lp1y1GRItM06of"]} -{"Format": "IDEA0", "ID": "6e2dc4b0-8e67-4c9b-8a25-490ffa0fb38b", "DetectTime": "2023-10-30T14:02:15.938693+02:00", "EventTime": "2023-10-30T14:02:15.938715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C8c3ij3NKmmsxFONNf"]} -{"Format": "IDEA0", "ID": "6290ae4c-5ee2-4ab0-821a-61918b524ed0", "DetectTime": "2023-10-30T14:02:15.979466+02:00", "EventTime": "2023-10-30T14:02:15.979484+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfzcSu3FdquNiATfo2"]} -{"Format": "IDEA0", "ID": "abbd0741-fd2a-40bf-996d-afc16a5d1d8a", "DetectTime": "2023-10-30T14:02:15.989861+02:00", "EventTime": "2023-10-30T14:02:15.989880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJuIGvmODRTi2G7L8"]} -{"Format": "Json", "ID": "abbd0741-fd2a-40bf-996d-afc16a5d1d8a", "DetectTime": "2023-10-30T14:02:15.989861+02:00", "EventTime": "2023-10-30T14:02:15.989880+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:09:49.963121+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:16.048633)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "23044c64-de15-4423-ad91-ecb3474023ab", "DetectTime": "2023-10-30T14:02:16.054052+02:00", "EventTime": "2023-10-30T14:02:16.054067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CBVeHc2jRdzJrvyoN5"]} -{"Format": "IDEA0", "ID": "9bc069b4-3bf3-4910-b7f1-2b9653257ed9", "DetectTime": "2023-10-30T14:02:16.091542+02:00", "EventTime": "2023-10-30T14:02:16.091565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CPdbb91hHJAzoYsab2"]} -{"Format": "IDEA0", "ID": "34f00631-766f-481f-b57f-6e27bd72c8b7", "DetectTime": "2023-10-30T14:02:16.126606+02:00", "EventTime": "2023-10-30T14:02:16.126627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6233], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. ", "ContentType": "text/plain"}], "uids": ["CtT5SXiCmOalV19P5"]} -{"Format": "IDEA0", "ID": "04db6d6a-bf6b-41dd-bae6-8720b0647873", "DetectTime": "2023-10-30T14:02:16.160984+02:00", "EventTime": "2023-10-30T14:02:16.161001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["CIn0Wd4nlGU6M3RxU7"]} -{"Format": "IDEA0", "ID": "52b2bada-e08f-41d2-9d24-6c4330fca998", "DetectTime": "2023-10-30T14:02:16.190556+02:00", "EventTime": "2023-10-30T14:02:16.190568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CCMfYh1wcwiCxZPY3"]} -{"Format": "IDEA0", "ID": "54a87097-2723-42f4-b2a1-effb19939dde", "DetectTime": "2023-10-30T14:02:16.222383+02:00", "EventTime": "2023-10-30T14:02:16.222401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C6XpUE44cZOQH512cb"]} -{"Format": "IDEA0", "ID": "0f96cf3d-6375-4922-8ba2-f00ac6482081", "DetectTime": "2023-10-30T14:02:16.258315+02:00", "EventTime": "2023-10-30T14:02:16.258336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CZh9wC3FfKiXxNRHIe"]} -{"Format": "IDEA0", "ID": "47a74bf7-da83-4d7a-b37f-0c8550e5ac8a", "DetectTime": "2023-10-30T14:02:16.291145+02:00", "EventTime": "2023-10-30T14:02:16.291160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CcXrMQ2J6rcblsOZ8b"]} -{"Format": "Json", "ID": "47a74bf7-da83-4d7a-b37f-0c8550e5ac8a", "DetectTime": "2023-10-30T14:02:16.291145+02:00", "EventTime": "2023-10-30T14:02:16.291160+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:09:51.212958+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:16.345596)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c02195a-08d7-4445-8daa-65be5012793a", "DetectTime": "2023-10-30T14:02:16.351658+02:00", "EventTime": "2023-10-30T14:02:16.351679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CDhE9A2LvRBI5p2Bv"]} -{"Format": "IDEA0", "ID": "57e61e98-47af-4f08-a9d7-a42f424f24d9", "DetectTime": "2023-10-30T14:02:16.385436+02:00", "EventTime": "2023-10-30T14:02:16.385453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CnXBAn1TQM0aD8JBT8"]} -{"Format": "IDEA0", "ID": "71097088-e254-443e-8d35-04b050523a4b", "DetectTime": "2023-10-30T14:02:16.414583+02:00", "EventTime": "2023-10-30T14:02:16.414601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CAwrs2vUgQ8c3bU2b"]} -{"Format": "IDEA0", "ID": "220606ea-2a4f-48f9-9357-ea3e58363b65", "DetectTime": "2023-10-30T14:02:16.445059+02:00", "EventTime": "2023-10-30T14:02:16.445076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CJpARE47pxLXG2oXTk"]} -{"Format": "IDEA0", "ID": "89c024f0-b1ef-40fb-ad69-8a3346b95363", "DetectTime": "2023-10-30T14:02:16.477231+02:00", "EventTime": "2023-10-30T14:02:16.477252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5149], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. ", "ContentType": "text/plain"}], "uids": ["CgIJ4D14bNg22fSEr7"]} -{"Format": "IDEA0", "ID": "76886ebf-e1be-4bfa-932a-ef021729b0b0", "DetectTime": "2023-10-30T14:02:16.509031+02:00", "EventTime": "2023-10-30T14:02:16.509053+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CL1OBg3oXTjS7NI22h"]} -{"Format": "IDEA0", "ID": "f9569063-5c74-4b5b-b4de-bc7a6dc2611c", "DetectTime": "2023-10-30T14:02:16.520741+02:00", "EventTime": "2023-10-30T14:02:16.520757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwuL7t441a0WkOVACh"]} -{"Format": "IDEA0", "ID": "473b4807-730f-467b-9546-c54f07b1cff0", "DetectTime": "2023-10-30T14:02:16.551543+02:00", "EventTime": "2023-10-30T14:02:16.551564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["COorhN7F1A6sBgeBf"]} -{"Format": "IDEA0", "ID": "e861e515-d759-4a49-8c70-5d42f035758e", "DetectTime": "2023-10-30T14:02:16.575401+02:00", "EventTime": "2023-10-30T14:02:16.575427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CmqQo5sZjMKGY9JS3"]} -{"Format": "IDEA0", "ID": "c70b87a0-0935-4b1d-a77e-851e1eccb93f", "DetectTime": "2023-10-30T14:02:16.608042+02:00", "EventTime": "2023-10-30T14:02:16.608059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C3VKu84B4y4dpiyrp7"]} -{"Format": "Json", "ID": "c70b87a0-0935-4b1d-a77e-851e1eccb93f", "DetectTime": "2023-10-30T14:02:16.608042+02:00", "EventTime": "2023-10-30T14:02:16.608059+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:41:23.092467+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:16.668583)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "35eeb712-cfaf-4788-9e4c-1d769ef5af50", "DetectTime": "2023-10-30T14:02:16.674154+02:00", "EventTime": "2023-10-30T14:02:16.674174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CemoSbHmAx3rWcz4i"]} -{"Format": "IDEA0", "ID": "9b52d161-34a9-4275-8f4a-b93d69ce9408", "DetectTime": "2023-10-30T14:02:16.705455+02:00", "EventTime": "2023-10-30T14:02:16.705472+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cgl0QDLJdrP8LVo3c"]} -{"Format": "IDEA0", "ID": "af5c9aca-448b-4e07-a9ad-8ae1a2cff3bf", "DetectTime": "2023-10-30T14:02:16.717295+02:00", "EventTime": "2023-10-30T14:02:16.717320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CUt226Rq4SLatnct4"]} -{"Format": "IDEA0", "ID": "73eb6db5-183f-40ab-9526-7843205a73a0", "DetectTime": "2023-10-30T14:02:16.746499+02:00", "EventTime": "2023-10-30T14:02:16.746516+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C45xcv48zn1pLvxKJh"]} -{"Format": "IDEA0", "ID": "6ab2066b-ec75-4b9e-98e6-8f4942c89467", "DetectTime": "2023-10-30T14:02:16.756091+02:00", "EventTime": "2023-10-30T14:02:16.756103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CwHMMy2au9wPq89KAi"]} -{"Format": "IDEA0", "ID": "63615afc-f2d4-4070-a3b5-3f0cb3a63310", "DetectTime": "2023-10-30T14:02:16.785029+02:00", "EventTime": "2023-10-30T14:02:16.785045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CjqbeH3jmnjh8Go1f9"]} -{"Format": "IDEA0", "ID": "369690d8-9109-422d-8403-dba99fe1330e", "DetectTime": "2023-10-30T14:02:16.815089+02:00", "EventTime": "2023-10-30T14:02:16.815102+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqKwo84WfHm1tDFPne"]} -{"Format": "IDEA0", "ID": "97018f08-6a5e-4301-9f0a-da80a4e470c9", "DetectTime": "2023-10-30T14:02:16.827801+02:00", "EventTime": "2023-10-30T14:02:16.827837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["CORlnD44psliUNB2T3"]} -{"Format": "IDEA0", "ID": "e4fe5ccc-e80e-4dd8-8813-dd3f5ae14c0c", "DetectTime": "2023-10-30T14:02:16.859592+02:00", "EventTime": "2023-10-30T14:02:16.859612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CQVidd3yUa4RsEy7Ig"]} -{"Format": "IDEA0", "ID": "a192820f-efc9-483a-882b-c842473bd80e", "DetectTime": "2023-10-30T14:02:16.888105+02:00", "EventTime": "2023-10-30T14:02:16.888119+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZL1bUv5wI7N5EH84"]} -{"Format": "IDEA0", "ID": "2f6cd918-1406-41e3-887e-15e5d001af88", "DetectTime": "2023-10-30T14:02:16.899621+02:00", "EventTime": "2023-10-30T14:02:16.899639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cv7m0K2QMydZca1G2l"]} -{"Format": "IDEA0", "ID": "e61bcc3b-85d0-4dc9-a3e9-3bb7ba925e92", "DetectTime": "2023-10-30T14:02:16.923344+02:00", "EventTime": "2023-10-30T14:02:16.923369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C7FSt018045PNlDb6e"]} -{"Format": "Json", "ID": "e61bcc3b-85d0-4dc9-a3e9-3bb7ba925e92", "DetectTime": "2023-10-30T14:02:16.923344+02:00", "EventTime": "2023-10-30T14:02:16.923369+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:41:24.364184+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:16.983170)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "85405842-a037-416c-a3aa-6e989126e17c", "DetectTime": "2023-10-30T14:02:16.987473+02:00", "EventTime": "2023-10-30T14:02:16.987485+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAjAdSVIKh7UA9UVd"]} -{"Format": "IDEA0", "ID": "35eaa3f2-22c3-4e66-9368-b977021a4341", "DetectTime": "2023-10-30T14:02:16.999474+02:00", "EventTime": "2023-10-30T14:02:16.999494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CpIC5g4MNUby8ffEJj"]} -{"Format": "IDEA0", "ID": "c706e8d3-0492-4daf-9c51-ed282d040218", "DetectTime": "2023-10-30T14:02:17.026324+02:00", "EventTime": "2023-10-30T14:02:17.026344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7037], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. ", "ContentType": "text/plain"}], "uids": ["CQaTC21772wN4Mbkoc"]} -{"Format": "IDEA0", "ID": "36313347-829e-4405-98e3-d31f477a21e4", "DetectTime": "2023-10-30T14:02:17.049599+02:00", "EventTime": "2023-10-30T14:02:17.049617+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsoeQA2xoL6SOcmjIc"]} -{"Format": "IDEA0", "ID": "8c813f09-f85b-4e1b-856c-1e82f84fec82", "DetectTime": "2023-10-30T14:02:17.061105+02:00", "EventTime": "2023-10-30T14:02:17.061127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CmHuVs1TdUk2MDw5be"]} -{"Format": "IDEA0", "ID": "802efebc-10f3-487f-a909-6e2bbc43ab7f", "DetectTime": "2023-10-30T14:02:17.088271+02:00", "EventTime": "2023-10-30T14:02:17.088287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9RqlWkPuxIqlejge", "Cgl0QDLJdrP8LVo3c", "CAjAdSVIKh7UA9UVd", "CqKwo84WfHm1tDFPne"]} -{"Format": "IDEA0", "ID": "ddc9e78d-798c-47ba-9fa4-f762cdebc49a", "DetectTime": "2023-10-30T14:02:17.100147+02:00", "EventTime": "2023-10-30T14:02:17.100163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9RqlWkPuxIqlejge"]} -{"Format": "IDEA0", "ID": "d5638187-b7f3-4a2c-8f26-fd93468d9c42", "DetectTime": "2023-10-30T14:02:17.112290+02:00", "EventTime": "2023-10-30T14:02:17.112311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CLFnCD4JACg9is0tEi"]} -{"Format": "IDEA0", "ID": "f5453387-fab9-42f8-b744-1c1821e1239b", "DetectTime": "2023-10-30T14:02:17.139795+02:00", "EventTime": "2023-10-30T14:02:17.139813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CfyQIl4u1dDaNypfc9"]} -{"Format": "IDEA0", "ID": "c55c1c5b-23af-440c-b66c-374e4ef2e82b", "DetectTime": "2023-10-30T14:02:17.170231+02:00", "EventTime": "2023-10-30T14:02:17.170249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C3dHyP3ePEWRYWFqik"]} -{"Format": "IDEA0", "ID": "4c625ce5-3720-4b38-9fe0-f9eace51b5c2", "DetectTime": "2023-10-30T14:02:17.208882+02:00", "EventTime": "2023-10-30T14:02:17.208901+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYzAPs3LS3SS3YtZB6"]} -{"Format": "IDEA0", "ID": "d107e9c6-2da0-46bf-8278-a239d5336ade", "DetectTime": "2023-10-30T14:02:17.221635+02:00", "EventTime": "2023-10-30T14:02:17.221651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. ", "ContentType": "text/plain"}], "uids": ["CE6kg32wrSjUjYg8Tk"]} -{"Format": "IDEA0", "ID": "febf453d-72f9-4ff5-bc83-0219698138f6", "DetectTime": "2023-10-30T14:02:17.253484+02:00", "EventTime": "2023-10-30T14:02:17.253507+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C10kYC3UOoxPHZEtaa"]} -{"Format": "IDEA0", "ID": "5f304208-f76a-482a-8e2e-dcd323d2927a", "DetectTime": "2023-10-30T14:02:17.267855+02:00", "EventTime": "2023-10-30T14:02:17.267873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CKazQQ3kCWIFTiAQp9"]} -{"Format": "Json", "ID": "5f304208-f76a-482a-8e2e-dcd323d2927a", "DetectTime": "2023-10-30T14:02:17.267855+02:00", "EventTime": "2023-10-30T14:02:17.267873+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:41:25.758600+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:17.333050)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f5b7d387-0219-45f1-a8ba-980134b5ce38", "DetectTime": "2023-10-30T14:02:17.337107+02:00", "EventTime": "2023-10-30T14:02:17.337120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CtVSnc2gLsWW9M5xdc"]} -{"Format": "IDEA0", "ID": "1bdc39f4-dce5-421b-bd74-4744beb57825", "DetectTime": "2023-10-30T14:02:17.363233+02:00", "EventTime": "2023-10-30T14:02:17.363255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CfoyXehvVi5bcNArc"]} -{"Format": "IDEA0", "ID": "d68c1fd8-4afb-47cf-b172-b4d935306304", "DetectTime": "2023-10-30T14:02:17.386326+02:00", "EventTime": "2023-10-30T14:02:17.386344+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CheBvr3yZY55u58una"]} -{"Format": "IDEA0", "ID": "9c61a267-f4f3-4dad-961e-bd4ba3b23ee7", "DetectTime": "2023-10-30T14:02:17.398454+02:00", "EventTime": "2023-10-30T14:02:17.398469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C5WVaI2IiHxOFRdxYh"]} -{"Format": "IDEA0", "ID": "25484b79-a65a-414e-9062-8e2d1452420f", "DetectTime": "2023-10-30T14:02:17.420438+02:00", "EventTime": "2023-10-30T14:02:17.420456+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CG9WZ94I7bCLcdTVn9"]} -{"Format": "IDEA0", "ID": "8d84e6d2-3e9e-4349-ad43-bef1c9c02bf7", "DetectTime": "2023-10-30T14:02:17.432068+02:00", "EventTime": "2023-10-30T14:02:17.432090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["COI8AW3XvksfgsbsJd"]} -{"Format": "IDEA0", "ID": "4ececf94-3540-4ae7-be62-7325da6c96ec", "DetectTime": "2023-10-30T14:02:17.453154+02:00", "EventTime": "2023-10-30T14:02:17.453166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CKaUpY24hzWUXgMwS9"]} -{"Format": "IDEA0", "ID": "c7ead664-d174-471f-964b-6297fdc0948e", "DetectTime": "2023-10-30T14:02:17.477766+02:00", "EventTime": "2023-10-30T14:02:17.477785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. ", "ContentType": "text/plain"}], "uids": ["CMZ9bp2zwMdJfxKA3a"]} -{"Format": "IDEA0", "ID": "d668d621-9498-4f3a-b54d-7aa121d62055", "DetectTime": "2023-10-30T14:02:17.499909+02:00", "EventTime": "2023-10-30T14:02:17.499920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["Ca8Zj41S6bdiC0FQ1c"]} -{"Format": "IDEA0", "ID": "5fb09e88-ec73-49b3-9e9b-d9f079736f89", "DetectTime": "2023-10-30T14:02:17.524004+02:00", "EventTime": "2023-10-30T14:02:17.524025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CdCoLp4b7PQXnmbi0g"]} -{"Format": "Json", "ID": "5fb09e88-ec73-49b3-9e9b-d9f079736f89", "DetectTime": "2023-10-30T14:02:17.524004+02:00", "EventTime": "2023-10-30T14:02:17.524025+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T05:41:58.733171+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2023/10/30 14:02:17.581245)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cbc92ee1-5328-460e-b129-88456dbd9070", "DetectTime": "2023-10-30T14:02:17.587156+02:00", "EventTime": "2023-10-30T14:02:17.587177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CUMhon1MU2YWrFkMo1"]} -{"Format": "IDEA0", "ID": "fecbbd09-17e0-41f8-8b82-c27b5c30b3d4", "DetectTime": "2023-10-30T14:02:17.611020+02:00", "EventTime": "2023-10-30T14:02:17.611038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CGdIHd2ciiWAiCh1b5"]} -{"Format": "IDEA0", "ID": "bac37f88-2194-47ce-91b6-9ea839447355", "DetectTime": "2023-10-30T14:02:17.659910+02:00", "EventTime": "2023-10-30T14:02:17.659933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CyAMKJ2FDZCOjVYFBi"]} -{"Format": "IDEA0", "ID": "e45a5556-1647-47bd-b266-272bebff7da6", "DetectTime": "2023-10-30T14:02:17.685047+02:00", "EventTime": "2023-10-30T14:02:17.685059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["C0avWq411FdxsVaFYb"]} -{"Format": "IDEA0", "ID": "7d50f5df-194b-4341-b5f4-9889cd5faaf4", "DetectTime": "2023-10-30T14:02:17.735042+02:00", "EventTime": "2023-10-30T14:02:17.735060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CYTj903D28a7yehzhk"]} -{"Format": "IDEA0", "ID": "0a0ddc4e-fa88-444f-9f34-c3abab6cd189", "DetectTime": "2023-10-30T14:02:17.780171+02:00", "EventTime": "2023-10-30T14:02:17.780186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CYk4C01c2NTowvIC3l"]} -{"Format": "IDEA0", "ID": "5e68fe99-e82c-4996-a5f9-6319764d51f3", "DetectTime": "2023-10-30T14:02:17.831806+02:00", "EventTime": "2023-10-30T14:02:17.831826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CKRJ5E11VIAC6KnRsc"]} -{"Format": "IDEA0", "ID": "eefea846-cbfd-46e1-926a-ea12fc2870cf", "DetectTime": "2023-10-30T14:02:17.852261+02:00", "EventTime": "2023-10-30T14:02:17.852280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CwDgUKRjpeuJXkQRa"]} -{"Format": "IDEA0", "ID": "a170062c-4355-4a0a-85d9-2fe9ddf24b63", "DetectTime": "2023-10-30T14:02:17.903192+02:00", "EventTime": "2023-10-30T14:02:17.903209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CtJQKU1m3yjrIJmSul"]} -{"Format": "IDEA0", "ID": "c51b0476-4aaf-4ed8-9bbe-3130fde10668", "DetectTime": "2023-10-30T14:02:17.926841+02:00", "EventTime": "2023-10-30T14:02:17.926855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CxqDcp30R3AwvPafGj"]} -{"Format": "IDEA0", "ID": "7d9d48d0-a590-459f-a4f7-073c503ee746", "DetectTime": "2023-10-30T14:02:17.947740+02:00", "EventTime": "2023-10-30T14:02:17.947770+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COyxE7zXWJNhGWpDb"]} -{"Format": "IDEA0", "ID": "864b4420-64bf-409e-9fb0-0de3b8bcdee8", "DetectTime": "2023-10-30T14:02:17.958550+02:00", "EventTime": "2023-10-30T14:02:17.958564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["CRc4RN50CCKblwNfg"]} -{"Format": "IDEA0", "ID": "bae1e8f5-b373-42e0-925b-45274555be7d", "DetectTime": "2023-10-30T14:02:17.983748+02:00", "EventTime": "2023-10-30T14:02:17.983765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CPHCVrYIChFN8Mcz3"]} -{"Format": "IDEA0", "ID": "f473c707-5a86-4955-90eb-2c2a99f4e2ca", "DetectTime": "2023-10-30T14:02:18.007907+02:00", "EventTime": "2023-10-30T14:02:18.007925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CXfW3m2aSg3u5FonQa"]} -{"Format": "IDEA0", "ID": "53e1ac57-32d5-4f70-ac37-c8b9e8c332c9", "DetectTime": "2023-10-30T14:02:18.029577+02:00", "EventTime": "2023-10-30T14:02:18.029589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CamlTU2MoPSDo8pCak"]} -{"Format": "Json", "ID": "53e1ac57-32d5-4f70-ac37-c8b9e8c332c9", "DetectTime": "2023-10-30T14:02:18.029577+02:00", "EventTime": "2023-10-30T14:02:18.029589+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:13:02.464559+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:18.147544)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4ca92633-1f15-479e-a74b-555e48cbb60b", "DetectTime": "2023-10-30T14:02:18.152995+02:00", "EventTime": "2023-10-30T14:02:18.153011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["C1GP1u4vcJCABimipg"]} -{"Format": "IDEA0", "ID": "1ddcb239-6c0d-4775-b23d-7a7b1b1e4089", "DetectTime": "2023-10-30T14:02:18.178041+02:00", "EventTime": "2023-10-30T14:02:18.178063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["Cw2cym4mOo5Lp2wal5"]} -{"Format": "IDEA0", "ID": "34f72fef-dd2a-493e-956a-01af9ef5d5b0", "DetectTime": "2023-10-30T14:02:18.204207+02:00", "EventTime": "2023-10-30T14:02:18.204226+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXg6QW2UjNQEy3pCk6"]} -{"Format": "IDEA0", "ID": "cca075e1-8ebd-4d5d-91f4-09a7db986cb8", "DetectTime": "2023-10-30T14:02:18.218809+02:00", "EventTime": "2023-10-30T14:02:18.218844+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.229.84.207"], "Hostname": ["host207.190-229-84.telecom.net.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.229.84.207 from 10.0.2.19. blacklisted IP AS: Telecom Argentina S.A., AR AS7303 rDNS: host207.190-229-84.telecom.net.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CNuk6d241kxdKXm2ye"]} -{"Format": "IDEA0", "ID": "5c6a7214-df49-48f8-ae78-278a0bfe008a", "DetectTime": "2023-10-30T14:02:18.266138+02:00", "EventTime": "2023-10-30T14:02:18.266149+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9VEmI10g2EasebS9f"]} -{"Format": "IDEA0", "ID": "84c31df7-821b-49fa-bba3-39e830c27ddf", "DetectTime": "2023-10-30T14:02:18.276263+02:00", "EventTime": "2023-10-30T14:02:18.276288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXDKbE2dwk3Tx1kwo3"]} -{"Format": "IDEA0", "ID": "fbc027c5-d2e8-49f7-86db-46769920945c", "DetectTime": "2023-10-30T14:02:18.298029+02:00", "EventTime": "2023-10-30T14:02:18.298054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CKdeEc109Goc1Jl6i7", "CXg6QW2UjNQEy3pCk6", "CG9WZ94I7bCLcdTVn9", "C10kYC3UOoxPHZEtaa"]} -{"Format": "IDEA0", "ID": "3afea2b6-e41c-444c-825f-2dbc96cb09c9", "DetectTime": "2023-10-30T14:02:18.310891+02:00", "EventTime": "2023-10-30T14:02:18.310914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.183.130.8 ", "ContentType": "text/plain"}], "uids": ["Cjxsh52J0Qn2BWgD0a"]} -{"Format": "IDEA0", "ID": "19d6fb6b-705c-49f3-bd8a-1dd313185352", "DetectTime": "2023-10-30T14:02:18.334232+02:00", "EventTime": "2023-10-30T14:02:18.334248+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKdeEc109Goc1Jl6i7"]} -{"Format": "IDEA0", "ID": "a6017435-7d05-4eb4-a77e-388871c55025", "DetectTime": "2023-10-30T14:02:18.344698+02:00", "EventTime": "2023-10-30T14:02:18.344716+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdRYc12cliHdoSpUH1"]} -{"Format": "IDEA0", "ID": "8467dcc2-b1f4-4ccd-8d6c-6906d1dd07ed", "DetectTime": "2023-10-30T14:02:18.354324+02:00", "EventTime": "2023-10-30T14:02:18.354336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CpLlcs3dO3ZbrhaK99"]} -{"Format": "IDEA0", "ID": "313bb6e9-a715-4367-b87c-25ecb0eec23f", "DetectTime": "2023-10-30T14:02:18.379861+02:00", "EventTime": "2023-10-30T14:02:18.379877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["Cm0KXb3eOvbgJCILQ2"]} -{"Format": "IDEA0", "ID": "c208533d-d681-44fd-b9c7-ed942ebc4437", "DetectTime": "2023-10-30T14:02:18.401120+02:00", "EventTime": "2023-10-30T14:02:18.401137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.97.115 ", "ContentType": "text/plain"}], "uids": ["CChloy2Zw5FRAS6Ub6"]} -{"Format": "IDEA0", "ID": "a6464049-5a39-46ff-9908-57995148da47", "DetectTime": "2023-10-30T14:02:18.424742+02:00", "EventTime": "2023-10-30T14:02:18.424759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaBumdcJk7x73Z5p7"]} -{"Format": "IDEA0", "ID": "cd5bf343-a370-4ce7-913a-a65a3a0a1431", "DetectTime": "2023-10-30T14:02:18.436297+02:00", "EventTime": "2023-10-30T14:02:18.436313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CqNuEfYm7Stbblye9"]} -{"Format": "IDEA0", "ID": "60c03e42-4bb2-4d3f-bfdd-0e9b59d16b47", "DetectTime": "2023-10-30T14:02:18.482963+02:00", "EventTime": "2023-10-30T14:02:18.482983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CsrxvC3jfH88w5OHp1"]} -{"Format": "IDEA0", "ID": "bf6d1e20-3d27-41dc-b010-fe9a2f944608", "DetectTime": "2023-10-30T14:02:18.502324+02:00", "EventTime": "2023-10-30T14:02:18.502339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CTXgSC2agPZbWxtRic"]} -{"Format": "IDEA0", "ID": "565244c1-e7b5-4ae8-a8f9-45be3ceb3c31", "DetectTime": "2023-10-30T14:02:18.526344+02:00", "EventTime": "2023-10-30T14:02:18.526367+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cvk4Xf4RA2HZRJ3xci"]} -{"Format": "IDEA0", "ID": "c5e1be36-5d3c-442c-9163-1dc7110f6ac7", "DetectTime": "2023-10-30T14:02:18.538934+02:00", "EventTime": "2023-10-30T14:02:18.538959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C23YTL2fsF65tYqNRe"]} -{"Format": "IDEA0", "ID": "60c6a92f-7a6c-4266-8118-fccf62a93872", "DetectTime": "2023-10-30T14:02:18.558082+02:00", "EventTime": "2023-10-30T14:02:18.558094+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C8p8nc4nJ76OqQkYL4"]} -{"Format": "IDEA0", "ID": "f7c75009-d500-40b8-9520-604675dc1712", "DetectTime": "2023-10-30T14:02:18.570462+02:00", "EventTime": "2023-10-30T14:02:18.570475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CmQF7j2qF42GZGA6J7"]} -{"Format": "IDEA0", "ID": "770365cb-0a8a-42cd-ac34-51ec97c7277f", "DetectTime": "2023-10-30T14:02:18.593345+02:00", "EventTime": "2023-10-30T14:02:18.593364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C1wMC044NvtAJIOFBb"]} -{"Format": "IDEA0", "ID": "0e9baeb5-b7bd-4598-ba4f-ea87a9a3dbaf", "DetectTime": "2023-10-30T14:02:18.611905+02:00", "EventTime": "2023-10-30T14:02:18.611920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CfgJuj4VGLcEHHZkOg"]} -{"Format": "IDEA0", "ID": "a1de83d2-aec1-402e-980b-96ba505609fb", "DetectTime": "2023-10-30T14:02:18.634792+02:00", "EventTime": "2023-10-30T14:02:18.634813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CVe3lt4H1XWcoHOabc"]} -{"Format": "IDEA0", "ID": "fab61c7b-9abd-401b-b69a-41253555b89a", "DetectTime": "2023-10-30T14:02:18.680859+02:00", "EventTime": "2023-10-30T14:02:18.680876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CgE3Nd3Vfy8Dd6x93j"]} -{"Format": "IDEA0", "ID": "e4bfd0c8-58f1-4815-9a95-d1a23111afd6", "DetectTime": "2023-10-30T14:02:18.703120+02:00", "EventTime": "2023-10-30T14:02:18.703135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["ChUjso1jCVI5JVGoTa"]} -{"Format": "IDEA0", "ID": "fdc50689-38eb-4f2e-a235-29b94122e724", "DetectTime": "2023-10-30T14:02:18.733776+02:00", "EventTime": "2023-10-30T14:02:18.733798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CBTZIE1WRGRpVj55uf"]} -{"Format": "IDEA0", "ID": "64d89a94-4eeb-4562-b731-fac2f199db4a", "DetectTime": "2023-10-30T14:02:18.761302+02:00", "EventTime": "2023-10-30T14:02:18.761319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CTwp7B3E45rFBpq2Ed"]} -{"Format": "IDEA0", "ID": "03589746-6252-4324-9fff-99da614b6c7f", "DetectTime": "2023-10-30T14:02:18.783999+02:00", "EventTime": "2023-10-30T14:02:18.784016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CiNqTw1oiQMiTeiZh7"]} -{"Format": "IDEA0", "ID": "11811977-0e86-46ab-a2ef-4718c7f02885", "DetectTime": "2023-10-30T14:02:18.809487+02:00", "EventTime": "2023-10-30T14:02:18.809510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C1IZLC4jgKYn4ohsZ8"]} -{"Format": "IDEA0", "ID": "ec75aef5-cc8f-4943-a52b-6ae519e996d3", "DetectTime": "2023-10-30T14:02:18.832690+02:00", "EventTime": "2023-10-30T14:02:18.832706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CEvv7RlArGzaQTz6g"]} -{"Format": "IDEA0", "ID": "f686eb75-45ac-4fcc-b72c-2fef64ece84b", "DetectTime": "2023-10-30T14:02:18.855699+02:00", "EventTime": "2023-10-30T14:02:18.855715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C2Gl0A2s70iDWhIfga"]} -{"Format": "IDEA0", "ID": "6318daae-5018-4e37-ba3a-09cf529069c5", "DetectTime": "2023-10-30T14:02:18.874392+02:00", "EventTime": "2023-10-30T14:02:18.874420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CI0ioS3qm0lXhnbc05"]} -{"Format": "IDEA0", "ID": "7146e1e7-3c61-4dc4-9264-361274ef216b", "DetectTime": "2023-10-30T14:02:18.898614+02:00", "EventTime": "2023-10-30T14:02:18.898626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CpaaRe2TZdsozs4Zrc"]} -{"Format": "IDEA0", "ID": "dd0fe411-881c-40c1-bcc0-de7c34f25306", "DetectTime": "2023-10-30T14:02:18.922792+02:00", "EventTime": "2023-10-30T14:02:18.922810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CO6a2C1PxR3eERvul2"]} -{"Format": "IDEA0", "ID": "026549aa-adec-4986-8f4b-62154ebe4e01", "DetectTime": "2023-10-30T14:02:18.988246+02:00", "EventTime": "2023-10-30T14:02:18.988266+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3cnbE4xGjkP7r5664"]} -{"Format": "IDEA0", "ID": "2df12c25-44cb-414e-8dbc-07783e774bd1", "DetectTime": "2023-10-30T14:02:19.005118+02:00", "EventTime": "2023-10-30T14:02:19.005132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CqViyQ1Zt4NJFE8pKd"]} -{"Format": "IDEA0", "ID": "e8c98314-5bdf-418f-bb81-c1e0905f679d", "DetectTime": "2023-10-30T14:02:19.031952+02:00", "EventTime": "2023-10-30T14:02:19.031968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CI5yBa2r6XtK0OvvF"]} -{"Format": "IDEA0", "ID": "0a00ee8c-35cb-470c-8103-790a735a6be0", "DetectTime": "2023-10-30T14:02:19.061489+02:00", "EventTime": "2023-10-30T14:02:19.061509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CtPB0u2mdHGBs1LrT4"]} -{"Format": "IDEA0", "ID": "e7782478-dde4-439e-8956-666ead0526b1", "DetectTime": "2023-10-30T14:02:19.087770+02:00", "EventTime": "2023-10-30T14:02:19.087782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["C1Prw9ltU09HsdVQ9"]} -{"Format": "IDEA0", "ID": "b50956f9-6e55-4124-848e-48b2a4658c76", "DetectTime": "2023-10-30T14:02:19.115592+02:00", "EventTime": "2023-10-30T14:02:19.115608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CID2PE2nmjQ6dKR5ik"]} -{"Format": "IDEA0", "ID": "f7462a93-a1aa-446b-ae0a-2cd48d23a6cc", "DetectTime": "2023-10-30T14:02:19.142261+02:00", "EventTime": "2023-10-30T14:02:19.142279+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.54.47.53"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 60.54.47.53 from 10.0.2.19. blacklisted IP AS: TTSSB-MY TM TECHNOLOGY SERVICES SDN. BHD., MY AS478 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CLhVUD1RzFQh9MVLs5"]} -{"Format": "IDEA0", "ID": "0b167170-2ad5-425a-bb8a-7c1a228ab919", "DetectTime": "2023-10-30T14:02:19.208405+02:00", "EventTime": "2023-10-30T14:02:19.208428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Co1jiWN06MpbNcOnf"]} -{"Format": "IDEA0", "ID": "3206f396-e839-4806-80d7-abac12aee426", "DetectTime": "2023-10-30T14:02:19.236779+02:00", "EventTime": "2023-10-30T14:02:19.236801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CGQgat4CpWbFe43U53"]} -{"Format": "IDEA0", "ID": "df2ae3b7-4d22-4f2c-b5be-2583f51ea7db", "DetectTime": "2023-10-30T14:02:19.262929+02:00", "EventTime": "2023-10-30T14:02:19.262946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["C74V9n44ia3lzZcpDl"]} -{"Format": "IDEA0", "ID": "9f6441a5-c86c-4143-a128-8814ebe7aa05", "DetectTime": "2023-10-30T14:02:19.289286+02:00", "EventTime": "2023-10-30T14:02:19.289305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CLhsNygiWL0CxHHPk"]} -{"Format": "IDEA0", "ID": "deec4d62-c6d6-4c15-9c3d-e7866a42b306", "DetectTime": "2023-10-30T14:02:19.340818+02:00", "EventTime": "2023-10-30T14:02:19.340832+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNCstA1h5U5lhDv9x9"]} -{"Format": "IDEA0", "ID": "9abfdaf0-f7cb-4a99-9647-a5ab93888e72", "DetectTime": "2023-10-30T14:02:19.352937+02:00", "EventTime": "2023-10-30T14:02:19.352953+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfhvaB47JTyCkJKrt6"]} -{"Format": "IDEA0", "ID": "b468d513-17c7-41e4-95ee-3b06ede4dd7e", "DetectTime": "2023-10-30T14:02:19.365912+02:00", "EventTime": "2023-10-30T14:02:19.365931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CIRZD4qgEL3pkN6Mc"]} -{"Format": "IDEA0", "ID": "f19c89bd-40c3-476f-9502-fae52639ca20", "DetectTime": "2023-10-30T14:02:19.388229+02:00", "EventTime": "2023-10-30T14:02:19.388248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CNCstA1h5U5lhDv9x9", "CaBumdcJk7x73Z5p7", "CYCZ2xcBRoBiMgd3l", "C8p8nc4nJ76OqQkYL4"]} -{"Format": "IDEA0", "ID": "9fed12e3-4edb-4e75-bfe9-1b0aab86d864", "DetectTime": "2023-10-30T14:02:19.401871+02:00", "EventTime": "2023-10-30T14:02:19.401887+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYCZ2xcBRoBiMgd3l"]} -{"Format": "IDEA0", "ID": "6b65c8e8-ec44-4a40-a56f-06a768ca7763", "DetectTime": "2023-10-30T14:02:19.415003+02:00", "EventTime": "2023-10-30T14:02:19.415023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CmSVwi3XDNFlK9NtY"]} -{"Format": "IDEA0", "ID": "b0ccc6f5-01be-4bab-a8a8-cf04a7e03b8e", "DetectTime": "2023-10-30T14:02:19.435964+02:00", "EventTime": "2023-10-30T14:02:19.435983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcFW2cES8LSE4uCl5"]} -{"Format": "IDEA0", "ID": "2c819500-28b3-4e96-98f3-8e0061bd4890", "DetectTime": "2023-10-30T14:02:19.454164+02:00", "EventTime": "2023-10-30T14:02:19.454176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CXrvn91xC50H7zHGv9"]} -{"Format": "IDEA0", "ID": "fe4f3892-50cf-4495-8858-02d29c3827d4", "DetectTime": "2023-10-30T14:02:19.470553+02:00", "EventTime": "2023-10-30T14:02:19.470573+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbmqDP1bmTc1mNvGfl"]} -{"Format": "IDEA0", "ID": "02578d92-a253-4b21-97e6-9628a54b814a", "DetectTime": "2023-10-30T14:02:19.484379+02:00", "EventTime": "2023-10-30T14:02:19.484395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C7rzXp3aKOpurX0Qd3"]} -{"Format": "IDEA0", "ID": "27f5bde5-55db-4970-ae32-ed32ce0bf8a5", "DetectTime": "2023-10-30T14:02:19.507806+02:00", "EventTime": "2023-10-30T14:02:19.507820+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CalnUl1ca1rCWBMyCg"]} -{"Format": "IDEA0", "ID": "311b665d-2874-422a-b421-3a0cdb8f78f0", "DetectTime": "2023-10-30T14:02:19.518616+02:00", "EventTime": "2023-10-30T14:02:19.518627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CC56Wd3PlBXEnWTvTf"]} -{"Format": "IDEA0", "ID": "350fc9ee-7ad7-435d-9291-daf4584d2dd8", "DetectTime": "2023-10-30T14:02:19.538315+02:00", "EventTime": "2023-10-30T14:02:19.538332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["C1xba64KrawdeouW4i"]} -{"Format": "IDEA0", "ID": "1f503444-d912-4398-8155-8e85e1cff6ed", "DetectTime": "2023-10-30T14:02:19.557187+02:00", "EventTime": "2023-10-30T14:02:19.557206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Cgoxpv9Gk3m6NxUL8"]} -{"Format": "IDEA0", "ID": "c4b31c08-5d83-4083-821b-5737c02efaae", "DetectTime": "2023-10-30T14:02:19.576482+02:00", "EventTime": "2023-10-30T14:02:19.576497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C7Ty9rwfRQx6LauD4"]} -{"Format": "IDEA0", "ID": "8ef3c7df-5a6e-4336-bf19-6bbcd039c127", "DetectTime": "2023-10-30T14:02:19.594567+02:00", "EventTime": "2023-10-30T14:02:19.594589+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSDN6KPtJ7t9PQNA8"]} -{"Format": "IDEA0", "ID": "f4657091-ed74-4c34-b3ba-fc6b82db4175", "DetectTime": "2023-10-30T14:02:19.605713+02:00", "EventTime": "2023-10-30T14:02:19.605728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CpmjaK2jQ6MKHJnu52"]} -{"Format": "IDEA0", "ID": "d59f6c75-b3c4-44ed-8c8a-a39b5a812985", "DetectTime": "2023-10-30T14:02:19.622686+02:00", "EventTime": "2023-10-30T14:02:19.622698+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNnctUSlodd3LQ2yf"]} -{"Format": "IDEA0", "ID": "bb634376-604d-45bb-a169-854a57cbf440", "DetectTime": "2023-10-30T14:02:19.635911+02:00", "EventTime": "2023-10-30T14:02:19.635927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CqG4xo2fqDeKjHEsK1"]} -{"Format": "IDEA0", "ID": "d55aab79-f04d-474d-aad6-6b615ef11ce1", "DetectTime": "2023-10-30T14:02:19.653884+02:00", "EventTime": "2023-10-30T14:02:19.653894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C0cjzZgmv5ODEiOSk"]} -{"Format": "IDEA0", "ID": "f564b1b8-c9c4-4826-907b-23de7f9731d2", "DetectTime": "2023-10-30T14:02:19.672825+02:00", "EventTime": "2023-10-30T14:02:19.672846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Csie694Eiw3X5JsZ2a"]} -{"Format": "IDEA0", "ID": "b641ff8f-26af-41a6-b46a-2b2b91b12d6e", "DetectTime": "2023-10-30T14:02:19.696976+02:00", "EventTime": "2023-10-30T14:02:19.696992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CbTV623Wt7lrawDonk"]} -{"Format": "IDEA0", "ID": "bd19df24-d36b-42c1-b52d-2361797106c5", "DetectTime": "2023-10-30T14:02:19.716693+02:00", "EventTime": "2023-10-30T14:02:19.716710+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYribe2jd6MFNxHaY1"]} -{"Format": "IDEA0", "ID": "cd4fb143-8f95-4be6-9b9d-6b952cfa737a", "DetectTime": "2023-10-30T14:02:19.729947+02:00", "EventTime": "2023-10-30T14:02:19.729959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CV1pmm2HsLZSiiV9f5"]} -{"Format": "IDEA0", "ID": "596db69c-ee45-4c54-a5bd-25d2a15616a4", "DetectTime": "2023-10-30T14:02:19.744777+02:00", "EventTime": "2023-10-30T14:02:19.744788+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2cKdS3dSu8H6Ahta7"]} -{"Format": "IDEA0", "ID": "e5c0276c-8c83-46b3-9b33-6c8988a47122", "DetectTime": "2023-10-30T14:02:19.754547+02:00", "EventTime": "2023-10-30T14:02:19.754558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CfJyOd3JDB7ksLSxG7"]} -{"Format": "IDEA0", "ID": "08ff55d6-ce70-4193-a52e-335d6e4046b3", "DetectTime": "2023-10-30T14:02:19.770645+02:00", "EventTime": "2023-10-30T14:02:19.770659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["CE2EK91D9sShE1JY8e"]} -{"Format": "IDEA0", "ID": "4c279513-a0b0-42c3-b92d-cd349a7aa7fc", "DetectTime": "2023-10-30T14:02:19.817188+02:00", "EventTime": "2023-10-30T14:02:19.817211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQwNSu49Of3VTWApj1"]} -{"Format": "IDEA0", "ID": "86c46939-edc3-4b6a-877e-8afb264bbcc6", "DetectTime": "2023-10-30T14:02:19.838610+02:00", "EventTime": "2023-10-30T14:02:19.838640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C7GysqwYWUikKf4rd"]} -{"Format": "IDEA0", "ID": "5baf903f-eb07-4cc5-8f48-bf248de83935", "DetectTime": "2023-10-30T14:02:19.856961+02:00", "EventTime": "2023-10-30T14:02:19.856977+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CM1ilw1rmwx4t56hA5"]} -{"Format": "IDEA0", "ID": "fa39c6c2-760a-44cc-a0c1-fc167a8b2585", "DetectTime": "2023-10-30T14:02:19.869620+02:00", "EventTime": "2023-10-30T14:02:19.869636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C0m1mT1G8qgIjHOFw4"]} -{"Format": "IDEA0", "ID": "66517537-de36-46a3-bdff-7e3d623c0da7", "DetectTime": "2023-10-30T14:02:19.891018+02:00", "EventTime": "2023-10-30T14:02:19.891040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CalnUl1ca1rCWBMyCg", "CL28c3261s4sL570Th", "CNnctUSlodd3LQ2yf", "C2cKdS3dSu8H6Ahta7"]} -{"Format": "IDEA0", "ID": "11493d24-bb11-4980-a1ae-8d0b41a85b97", "DetectTime": "2023-10-30T14:02:19.906138+02:00", "EventTime": "2023-10-30T14:02:19.906161+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CL28c3261s4sL570Th"]} -{"Format": "IDEA0", "ID": "c32b0a02-863a-435b-a623-dce3c815378d", "DetectTime": "2023-10-30T14:02:19.920098+02:00", "EventTime": "2023-10-30T14:02:19.920113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CAOHaY2joC54tB04w6"]} -{"Format": "IDEA0", "ID": "d6dd1eb1-dde6-42da-a5f5-ce0bd93bb384", "DetectTime": "2023-10-30T14:02:19.936864+02:00", "EventTime": "2023-10-30T14:02:19.936876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CVkOke179WdeIDJ5L3"]} -{"Format": "IDEA0", "ID": "dd599cd7-8f7c-46ae-b774-8453ada481f1", "DetectTime": "2023-10-30T14:02:19.954596+02:00", "EventTime": "2023-10-30T14:02:19.954612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CDE4oD1w3WCLR9ZWce"]} -{"Format": "IDEA0", "ID": "3b33fbc5-782b-4feb-a8f8-3c11a262d38e", "DetectTime": "2023-10-30T14:02:19.976334+02:00", "EventTime": "2023-10-30T14:02:19.976350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Cc82uk1h8d6FeoXpW1"]} -{"Format": "IDEA0", "ID": "2c795af3-268f-45b0-941f-d37126891eef", "DetectTime": "2023-10-30T14:02:19.995991+02:00", "EventTime": "2023-10-30T14:02:19.996011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CTvkY13g48yiZVO4Q6"]} -{"Format": "IDEA0", "ID": "446a441c-be65-493c-af58-7484f7d18537", "DetectTime": "2023-10-30T14:02:20.016532+02:00", "EventTime": "2023-10-30T14:02:20.016553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CWkvqLj5jBf0T1rI3"]} -{"Format": "IDEA0", "ID": "076d7743-0f3c-4822-8be2-22634be286df", "DetectTime": "2023-10-30T14:02:20.036299+02:00", "EventTime": "2023-10-30T14:02:20.036313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CWluTG28KkaIyyq8S4"]} -{"Format": "IDEA0", "ID": "6ddd9592-fe98-4a2b-889e-59fc2ab76d61", "DetectTime": "2023-10-30T14:02:20.059229+02:00", "EventTime": "2023-10-30T14:02:20.059244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["CPRwT2486AxOpzyFg3"]} -{"Format": "IDEA0", "ID": "24ece6ff-5c75-44d1-b700-fbe39bda04cb", "DetectTime": "2023-10-30T14:02:20.077516+02:00", "EventTime": "2023-10-30T14:02:20.077536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["Clx2WZ1hQpNpNYVV51"]} -{"Format": "IDEA0", "ID": "cc342e48-49db-4100-9b96-2fb29ba388e1", "DetectTime": "2023-10-30T14:02:20.094146+02:00", "EventTime": "2023-10-30T14:02:20.094167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CLy5wm4ZrO9mfbXZuf"]} -{"Format": "IDEA0", "ID": "49e1a59c-e303-4dfa-8895-d91f5bfdf899", "DetectTime": "2023-10-30T14:02:20.112751+02:00", "EventTime": "2023-10-30T14:02:20.112775+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.15.162.66"], "Hostname": ["66.162.access.ttknet.ru Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 85.15.162.66 from 10.0.2.19. blacklisted IP AS: ROSTELECOM-AS, RU AS12389 rDNS: 66.162.access.ttknet.ru Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CuFGIj395DTcTSNvPg"]} -{"Format": "IDEA0", "ID": "4e812ce1-02ed-4bf1-a222-39443569d3bf", "DetectTime": "2023-10-30T14:02:20.164596+02:00", "EventTime": "2023-10-30T14:02:20.164616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CYHbts2FpF8Dxbg1ib"]} -{"Format": "IDEA0", "ID": "c3d63956-118d-4028-a5bb-8af5d4b1b56a", "DetectTime": "2023-10-30T14:02:20.184529+02:00", "EventTime": "2023-10-30T14:02:20.184541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CJaJkQ137Sux03EsX"]} -{"Format": "IDEA0", "ID": "b42717b1-1675-490d-9678-a42116bdfa3c", "DetectTime": "2023-10-30T14:02:20.241726+02:00", "EventTime": "2023-10-30T14:02:20.241745+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cw69sB4J3P1eFAKRF4"]} -{"Format": "IDEA0", "ID": "68e52bad-e5ce-4fdc-8fba-41f5aa0db5cf", "DetectTime": "2023-10-30T14:02:20.254142+02:00", "EventTime": "2023-10-30T14:02:20.254159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.160.95.162 ", "ContentType": "text/plain"}], "uids": ["CYhQgI00TBcIcvyth"]} -{"Format": "IDEA0", "ID": "866eea0c-671f-43dc-9f78-1eff39093908", "DetectTime": "2023-10-30T14:02:20.274126+02:00", "EventTime": "2023-10-30T14:02:20.274147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CbUn863nzy2T1jL1f9"]} -{"Format": "IDEA0", "ID": "c5c3ab8f-8a6a-49cb-acbc-8f6797cf097a", "DetectTime": "2023-10-30T14:02:20.294503+02:00", "EventTime": "2023-10-30T14:02:20.294523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CRqRr51cBPU8jHfhs5"]} -{"Format": "IDEA0", "ID": "13415c13-1eed-44e9-9a1a-6b194a2c5941", "DetectTime": "2023-10-30T14:02:20.315742+02:00", "EventTime": "2023-10-30T14:02:20.315761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxNTYj4WeAjqk5gWDi"]} -{"Format": "IDEA0", "ID": "90f6aa6a-a4a7-4bce-8919-11d62a5f0b40", "DetectTime": "2023-10-30T14:02:20.337932+02:00", "EventTime": "2023-10-30T14:02:20.337951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CTwrmvpvdcSKOZQp6"]} -{"Format": "IDEA0", "ID": "4cd72e6b-d8d9-48c1-a0cd-43ca7f7964df", "DetectTime": "2023-10-30T14:02:20.363835+02:00", "EventTime": "2023-10-30T14:02:20.363851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CDKsZL2zxHqpGnkoX3"]} -{"Format": "IDEA0", "ID": "f574d172-0e22-4369-a3b8-ed1b6775edb2", "DetectTime": "2023-10-30T14:02:20.382245+02:00", "EventTime": "2023-10-30T14:02:20.382268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CXhleZ3GtBPB20oopf"]} -{"Format": "IDEA0", "ID": "253c77c0-6782-48b9-b75f-f02387919a37", "DetectTime": "2023-10-30T14:02:20.404111+02:00", "EventTime": "2023-10-30T14:02:20.404131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["Cx9Cfj37WIRRkLsJFf"]} -{"Format": "IDEA0", "ID": "88db6f89-630e-4ad8-baa2-6bee6823ebfd", "DetectTime": "2023-10-30T14:02:20.425151+02:00", "EventTime": "2023-10-30T14:02:20.425176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CscUhJSkJDwGKmUC3"]} -{"Format": "IDEA0", "ID": "74d1a28c-8759-424f-92c3-f36696ad5157", "DetectTime": "2023-10-30T14:02:20.446367+02:00", "EventTime": "2023-10-30T14:02:20.446388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CzUicl3jF5zy4J626j"]} -{"Format": "IDEA0", "ID": "b8252a0e-d156-4fb7-a49c-c19d6ad87a89", "DetectTime": "2023-10-30T14:02:20.467721+02:00", "EventTime": "2023-10-30T14:02:20.467737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CbHXFL1m3w89fHhmLb"]} -{"Format": "IDEA0", "ID": "d3cdf890-740c-42e7-97e0-56883899aca4", "DetectTime": "2023-10-30T14:02:20.486325+02:00", "EventTime": "2023-10-30T14:02:20.486343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CVpGqy1Ka3bAfIafab"]} -{"Format": "IDEA0", "ID": "4b23c9df-06cc-4382-9e1f-e71a5100263a", "DetectTime": "2023-10-30T14:02:20.505343+02:00", "EventTime": "2023-10-30T14:02:20.505360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CUqppXOrH46BOh25"]} -{"Format": "IDEA0", "ID": "1fddfd23-6fdb-43f4-a5e8-a2af451c1a2a", "DetectTime": "2023-10-30T14:02:20.524766+02:00", "EventTime": "2023-10-30T14:02:20.524791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cma9XWHaNB4j04ns8"]} -{"Format": "IDEA0", "ID": "a0a4c766-fc8d-44bb-a7d5-a7573293f838", "DetectTime": "2023-10-30T14:02:20.545467+02:00", "EventTime": "2023-10-30T14:02:20.545492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["Chm29S2LT4h0Q1xwQi"]} -{"Format": "IDEA0", "ID": "2ba343be-84fe-4812-b420-c2a350e1c8e0", "DetectTime": "2023-10-30T14:02:20.567571+02:00", "EventTime": "2023-10-30T14:02:20.567588+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJ1km5iLijZSMSmya"]} -{"Format": "IDEA0", "ID": "c29aa64a-2767-4754-9006-92bdbfd4be95", "DetectTime": "2023-10-30T14:02:20.581396+02:00", "EventTime": "2023-10-30T14:02:20.581413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CL8d5h1guOkVKa3cxi"]} -{"Format": "IDEA0", "ID": "7ffd394f-45cb-4118-a0c6-a5eeb3836580", "DetectTime": "2023-10-30T14:02:20.602248+02:00", "EventTime": "2023-10-30T14:02:20.602261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CwVMxA28EnTSgdjVfk"]} -{"Format": "IDEA0", "ID": "923a3fc8-19ff-4ae8-94b7-483ef8c29939", "DetectTime": "2023-10-30T14:02:20.619542+02:00", "EventTime": "2023-10-30T14:02:20.619559+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CElzCqQMbds4Qhesf"]} -{"Format": "IDEA0", "ID": "9986a8dc-0086-49a3-afef-e84da4ab736b", "DetectTime": "2023-10-30T14:02:20.632653+02:00", "EventTime": "2023-10-30T14:02:20.632668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cq2Skh8M2VHCn0LN3"]} -{"Format": "IDEA0", "ID": "6fd90ff5-3a7a-45a8-a4fc-14191340abfe", "DetectTime": "2023-10-30T14:02:20.651852+02:00", "EventTime": "2023-10-30T14:02:20.651874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CM3kIP3K9LyO0IhsU1"]} -{"Format": "IDEA0", "ID": "68896714-5e16-4b08-ae29-3083d30cf9d5", "DetectTime": "2023-10-30T14:02:20.670737+02:00", "EventTime": "2023-10-30T14:02:20.670757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CNamGx1pjXrGHc4Dzf"]} -{"Format": "IDEA0", "ID": "5cd8a8e1-e73b-4fe9-a160-557db643952a", "DetectTime": "2023-10-30T14:02:20.692499+02:00", "EventTime": "2023-10-30T14:02:20.692519+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEAEX82wSy10pHKEr4"]} -{"Format": "IDEA0", "ID": "ecc6e5ab-e01b-4e20-b81e-c57e32845641", "DetectTime": "2023-10-30T14:02:20.708388+02:00", "EventTime": "2023-10-30T14:02:20.708410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C1Bfyc1DSt8XXAyxxb"]} -{"Format": "IDEA0", "ID": "2a37fe78-c30b-430f-ade8-4cabe3d523c6", "DetectTime": "2023-10-30T14:02:20.728482+02:00", "EventTime": "2023-10-30T14:02:20.728495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CyYcku3BKqUXZMDXj4"]} -{"Format": "IDEA0", "ID": "e8813eb0-805f-4732-b34c-aa88192ff33a", "DetectTime": "2023-10-30T14:02:20.744585+02:00", "EventTime": "2023-10-30T14:02:20.744607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cr0Fim35jGCV9dp7W8"]} -{"Format": "IDEA0", "ID": "c3a84071-be38-47b2-a7fb-7d6ebbd7473d", "DetectTime": "2023-10-30T14:02:20.788666+02:00", "EventTime": "2023-10-30T14:02:20.788690+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1G9Sj29NyN9Xbxadi"]} -{"Format": "IDEA0", "ID": "12ec8c18-de09-45cf-aec4-4018437f7a23", "DetectTime": "2023-10-30T14:02:20.800613+02:00", "EventTime": "2023-10-30T14:02:20.800629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CBBsC027NhMlsPxYSi"]} -{"Format": "IDEA0", "ID": "49f0ba4d-4660-49d5-9ee7-82f4201e629b", "DetectTime": "2023-10-30T14:02:20.822299+02:00", "EventTime": "2023-10-30T14:02:20.822318+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CktYPRSsyfDLxmXE6"]} -{"Format": "IDEA0", "ID": "9c43145f-002d-497f-8f51-f981d66eea3b", "DetectTime": "2023-10-30T14:02:20.834916+02:00", "EventTime": "2023-10-30T14:02:20.834934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CBp5biI68CXKmBLD8"]} -{"Format": "IDEA0", "ID": "2a10e1da-3a18-4eae-b18c-a08c7a5a056d", "DetectTime": "2023-10-30T14:02:20.853667+02:00", "EventTime": "2023-10-30T14:02:20.853679+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtHPx04JCbMvgmi5Ek"]} -{"Format": "IDEA0", "ID": "5fa6feac-afac-4079-a6b3-f2b980fb22fd", "DetectTime": "2023-10-30T14:02:20.864575+02:00", "EventTime": "2023-10-30T14:02:20.864594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CTm7fz32kYUO00Nfab"]} -{"Format": "IDEA0", "ID": "5881600a-b767-42ba-9a1b-f96c306a6a52", "DetectTime": "2023-10-30T14:02:20.883925+02:00", "EventTime": "2023-10-30T14:02:20.883941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Ci0KJF2fVwFppdM27h"]} -{"Format": "IDEA0", "ID": "23b15151-2b22-48fd-862d-75d2f40043cb", "DetectTime": "2023-10-30T14:02:20.903399+02:00", "EventTime": "2023-10-30T14:02:20.903415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CJ1km5iLijZSMSmya", "CEAEX82wSy10pHKEr4", "CktYPRSsyfDLxmXE6", "ClbVJM2i1ONpN6OBtl"]} -{"Format": "IDEA0", "ID": "4cd1a101-ded6-428d-9391-fa5a561c5c7f", "DetectTime": "2023-10-30T14:02:20.914802+02:00", "EventTime": "2023-10-30T14:02:20.914819+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClbVJM2i1ONpN6OBtl"]} -{"Format": "IDEA0", "ID": "7ae0baf7-6bce-4358-b436-f02569381c5b", "DetectTime": "2023-10-30T14:02:20.926976+02:00", "EventTime": "2023-10-30T14:02:20.926999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CO34OK2SaQv908L2L1"]} -{"Format": "IDEA0", "ID": "f8e013d2-40af-40c6-a4a4-c7f6e32565ae", "DetectTime": "2023-10-30T14:02:20.944376+02:00", "EventTime": "2023-10-30T14:02:20.944388+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKZCxMwdXk549Cdad"]} -{"Format": "IDEA0", "ID": "48f0cedd-fb96-46a8-9c5c-5dba83e5cd02", "DetectTime": "2023-10-30T14:02:20.960553+02:00", "EventTime": "2023-10-30T14:02:20.960571+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CC8wxodlqamRpcina"]} -{"Format": "IDEA0", "ID": "c550f07e-1836-4475-b7bf-827c22d29097", "DetectTime": "2023-10-30T14:02:20.973246+02:00", "EventTime": "2023-10-30T14:02:20.973275+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKwlVb4zFrMH6a65Xd"]} -{"Format": "IDEA0", "ID": "7dc6f123-22fe-4990-81df-1360f2a6fa0f", "DetectTime": "2023-10-30T14:02:20.988236+02:00", "EventTime": "2023-10-30T14:02:20.988253+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIZUFW2pWKq5hf4qv5"]} -{"Format": "IDEA0", "ID": "cdca98e5-e9fd-4d7d-80ed-dee16ffe444c", "DetectTime": "2023-10-30T14:02:21.000534+02:00", "EventTime": "2023-10-30T14:02:21.000554+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CI9kzr2V4L51fn3op"]} -{"Format": "IDEA0", "ID": "22dcaa2a-5f45-4d4d-9470-fb15259ad559", "DetectTime": "2023-10-30T14:02:21.012655+02:00", "EventTime": "2023-10-30T14:02:21.012671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CzbIxJ2qlt2PnWj63j"]} -{"Format": "Json", "ID": "22dcaa2a-5f45-4d4d-9470-fb15259ad559", "DetectTime": "2023-10-30T14:02:21.012655+02:00", "EventTime": "2023-10-30T14:02:21.012671+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:13:19.566300+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:21.088089)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cd0ebd28-1398-4d06-9ca7-3acac27b92ce", "DetectTime": "2023-10-30T14:02:21.093454+02:00", "EventTime": "2023-10-30T14:02:21.093467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.137.169.235 ", "ContentType": "text/plain"}], "uids": ["CxS8OR3RfpLbCx7pIh"]} -{"Format": "IDEA0", "ID": "222b7c97-a4b0-47a0-b059-cffae7e221bd", "DetectTime": "2023-10-30T14:02:21.116545+02:00", "EventTime": "2023-10-30T14:02:21.116558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.20.80.35 ", "ContentType": "text/plain"}], "uids": ["CYtlTH2QlYlDDujIk"]} -{"Format": "IDEA0", "ID": "32a1ddac-4eba-452a-9541-ff67d166f371", "DetectTime": "2023-10-30T14:02:21.138753+02:00", "EventTime": "2023-10-30T14:02:21.138772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CKaI6z2oCchSG5IU0e"]} -{"Format": "IDEA0", "ID": "bacf4a81-978c-4169-88c5-3489fb3a65ba", "DetectTime": "2023-10-30T14:02:21.161643+02:00", "EventTime": "2023-10-30T14:02:21.161660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CYtRsQ2XPHh2ZbeoAd"]} -{"Format": "IDEA0", "ID": "dc075893-bd46-4a37-915f-6528ca4754a9", "DetectTime": "2023-10-30T14:02:21.187067+02:00", "EventTime": "2023-10-30T14:02:21.187083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cyk2Wh1bLSp4HgWPy3"]} -{"Format": "IDEA0", "ID": "a5629c3e-4157-4346-b439-314b89af3532", "DetectTime": "2023-10-30T14:02:21.214463+02:00", "EventTime": "2023-10-30T14:02:21.214485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C2vOLxmbWEHlgaq6k"]} -{"Format": "IDEA0", "ID": "f2f71692-b679-41da-9302-347563656bff", "DetectTime": "2023-10-30T14:02:21.245861+02:00", "EventTime": "2023-10-30T14:02:21.245880+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpZVNv27kg0h2x7SOg"]} -{"Format": "IDEA0", "ID": "be4a5211-5ef0-4b98-a493-38d01a7a2e08", "DetectTime": "2023-10-30T14:02:21.256454+02:00", "EventTime": "2023-10-30T14:02:21.256469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Ckt9DjoanFLeayF84"]} -{"Format": "IDEA0", "ID": "3523931f-8a14-4313-a657-ecc499470fd9", "DetectTime": "2023-10-30T14:02:21.281388+02:00", "EventTime": "2023-10-30T14:02:21.281405+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7Tdrt4h0YkRJLsZg9"]} -{"Format": "IDEA0", "ID": "dc8fcffa-8fe1-4691-8be0-d047c1d5192d", "DetectTime": "2023-10-30T14:02:21.291533+02:00", "EventTime": "2023-10-30T14:02:21.291546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CNzOjN3PfkYZ0wpJb6"]} -{"Format": "IDEA0", "ID": "8c34e2e7-ab7b-47a4-9186-578563343fc0", "DetectTime": "2023-10-30T14:02:21.318000+02:00", "EventTime": "2023-10-30T14:02:21.318026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CpZVNv27kg0h2x7SOg", "C0UnZC3p2eLyVyFT87", "CIZUFW2pWKq5hf4qv5", "CC8wxodlqamRpcina"]} -{"Format": "IDEA0", "ID": "48b3cfad-86e8-4083-ae41-6ab65d0195de", "DetectTime": "2023-10-30T14:02:21.330003+02:00", "EventTime": "2023-10-30T14:02:21.330023+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0UnZC3p2eLyVyFT87"]} -{"Format": "IDEA0", "ID": "00a1cb33-e79c-490b-8059-6c02e726ee5f", "DetectTime": "2023-10-30T14:02:21.341499+02:00", "EventTime": "2023-10-30T14:02:21.341520+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8ooN23XDCDr3sUF05"]} -{"Format": "IDEA0", "ID": "993b22c4-9827-41de-9021-10c36894754f", "DetectTime": "2023-10-30T14:02:21.352364+02:00", "EventTime": "2023-10-30T14:02:21.352374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CYj0aK1Ii2eu21iWJd"]} -{"Format": "IDEA0", "ID": "3d8934fa-ed06-4547-838e-e1780ebe384a", "DetectTime": "2023-10-30T14:02:21.375978+02:00", "EventTime": "2023-10-30T14:02:21.375995+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbRj3M2FCXn2wqtkk1"]} -{"Format": "IDEA0", "ID": "c7657d60-8156-4528-8b31-600bb5f8ef2d", "DetectTime": "2023-10-30T14:02:21.387209+02:00", "EventTime": "2023-10-30T14:02:21.387227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CPYxPAUfb5nXkfGOe"]} -{"Format": "IDEA0", "ID": "935f2bd7-a4bf-4c1d-aede-3f5c732aa577", "DetectTime": "2023-10-30T14:02:21.412964+02:00", "EventTime": "2023-10-30T14:02:21.412987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CeGWQi1BZfpcf2g506"]} -{"Format": "IDEA0", "ID": "86b1341c-f5bb-47c7-afee-d64f3047b7f3", "DetectTime": "2023-10-30T14:02:21.439936+02:00", "EventTime": "2023-10-30T14:02:21.439956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CE1RRV1CITfIPZjEeb"]} -{"Format": "IDEA0", "ID": "59700e7e-b24c-4b5c-863b-37c2a457aafd", "DetectTime": "2023-10-30T14:02:21.465046+02:00", "EventTime": "2023-10-30T14:02:21.465064+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C6BM7d3Eu3woko0AC8"]} -{"Format": "IDEA0", "ID": "3bdacd6c-9e31-40ed-9b63-65dba0b64760", "DetectTime": "2023-10-30T14:02:21.475906+02:00", "EventTime": "2023-10-30T14:02:21.475926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CiqB621nmHICSkyrm2"]} -{"Format": "IDEA0", "ID": "2ccfbc75-104c-48ea-b773-1cfdd6661bcd", "DetectTime": "2023-10-30T14:02:21.505900+02:00", "EventTime": "2023-10-30T14:02:21.505923+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1YGLBYC1LBOUQMh"]} -{"Format": "IDEA0", "ID": "ae457938-8a6e-4201-bca5-d746a7c25a7d", "DetectTime": "2023-10-30T14:02:21.517483+02:00", "EventTime": "2023-10-30T14:02:21.517503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRIBrgZSfmPIsVLsl"]} -{"Format": "IDEA0", "ID": "6c6b2a12-7530-40d7-a72e-aef82fa58edf", "DetectTime": "2023-10-30T14:02:21.542404+02:00", "EventTime": "2023-10-30T14:02:21.542416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.146.148.217"], "Hostname": ["static-ip-186146148217.cable.net.co Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 186.146.148.217 from 10.0.2.19. blacklisted IP AS: Telmex Colombia S.A., CO AS10620 rDNS: static-ip-186146148217.cable.net.co Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CnUU1a4z45iLGv7yY6"]} -{"Format": "IDEA0", "ID": "d1147612-c3aa-41a3-8454-2059a5954c2f", "DetectTime": "2023-10-30T14:02:21.587366+02:00", "EventTime": "2023-10-30T14:02:21.587382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CUJCg34zrICwyfHLT9"]} -{"Format": "IDEA0", "ID": "0e37b7c0-f142-49a3-9380-dd42f25c1b12", "DetectTime": "2023-10-30T14:02:21.614003+02:00", "EventTime": "2023-10-30T14:02:21.614019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CTHNSk3noXKKMKD2tk"]} -{"Format": "IDEA0", "ID": "0202af82-931d-48c4-8bd1-80b1faf36f69", "DetectTime": "2023-10-30T14:02:21.644213+02:00", "EventTime": "2023-10-30T14:02:21.644230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CWC7pG2Yrz4WZnnowc"]} -{"Format": "IDEA0", "ID": "6f440548-4665-4ac7-b10b-31f591c2dbd8", "DetectTime": "2023-10-30T14:02:21.670930+02:00", "EventTime": "2023-10-30T14:02:21.670953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CptpsD2G9GcMx6o20l"]} -{"Format": "IDEA0", "ID": "35862580-81f9-4fee-8d01-05dbc5f4765a", "DetectTime": "2023-10-30T14:02:21.699337+02:00", "EventTime": "2023-10-30T14:02:21.699352+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChUiTC1Z8AP5703xZj"]} -{"Format": "IDEA0", "ID": "cc61ff39-905d-48db-84a6-a1e5cc9784d7", "DetectTime": "2023-10-30T14:02:21.711159+02:00", "EventTime": "2023-10-30T14:02:21.711182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CRS5qg3tuJnROmkVml"]} -{"Format": "IDEA0", "ID": "eb52f445-a80c-4a5f-a23f-809df5bdc123", "DetectTime": "2023-10-30T14:02:21.739280+02:00", "EventTime": "2023-10-30T14:02:21.739305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CAF2Z42pgbepSPzm04"]} -{"Format": "IDEA0", "ID": "d31c9c96-b928-44de-9084-a47ef2602c7f", "DetectTime": "2023-10-30T14:02:21.769583+02:00", "EventTime": "2023-10-30T14:02:21.769607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["C5JGcrsZDa5HxqBN6"]} -{"Format": "IDEA0", "ID": "719d9583-a627-43f8-8c2f-53ec2db8fbdf", "DetectTime": "2023-10-30T14:02:21.799992+02:00", "EventTime": "2023-10-30T14:02:21.800009+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ct4uIu2a7H5iDexYN2"]} -{"Format": "IDEA0", "ID": "dda67029-7da2-45a0-8977-92c039f27a35", "DetectTime": "2023-10-30T14:02:21.811507+02:00", "EventTime": "2023-10-30T14:02:21.811529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["C9S6Ul2IzvtbBzaLVj"]} -{"Format": "IDEA0", "ID": "ea119d0d-2e7b-421f-bc7b-00800e414851", "DetectTime": "2023-10-30T14:02:21.835940+02:00", "EventTime": "2023-10-30T14:02:21.835960+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTkVzOZwR6BhuZC8e"]} -{"Format": "IDEA0", "ID": "e1b2aef3-8cb2-4ccf-927d-a4725196b5b1", "DetectTime": "2023-10-30T14:02:21.846645+02:00", "EventTime": "2023-10-30T14:02:21.846665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CoRsRx2DwLLL5mzoD5"]} -{"Format": "IDEA0", "ID": "132a489c-de51-45a4-ad28-43ff8e6cbff2", "DetectTime": "2023-10-30T14:02:21.867921+02:00", "EventTime": "2023-10-30T14:02:21.867946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CtotjM2YwlkyUg7Hf4"]} -{"Format": "IDEA0", "ID": "c0e35714-6eee-4631-b356-d4c607f28c91", "DetectTime": "2023-10-30T14:02:21.897107+02:00", "EventTime": "2023-10-30T14:02:21.897123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.42.16.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.42.16.38 ", "ContentType": "text/plain"}], "uids": ["CpNDoE16V6GEMYKjfh"]} -{"Format": "IDEA0", "ID": "8986037f-f52a-4e30-a9d0-140962baee2e", "DetectTime": "2023-10-30T14:02:21.924939+02:00", "EventTime": "2023-10-30T14:02:21.924954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.184.50.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.184.50.84 ", "ContentType": "text/plain"}], "uids": ["CFQaz82sH328TsBQsg"]} -{"Format": "IDEA0", "ID": "edfabd5a-bb7f-4774-86a0-d2f2086375c1", "DetectTime": "2023-10-30T14:02:21.952461+02:00", "EventTime": "2023-10-30T14:02:21.952477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CXhbgV2by70vkCHWei", "CbRj3M2FCXn2wqtkk1", "Ct4uIu2a7H5iDexYN2", "C1YGLBYC1LBOUQMh"]} -{"Format": "IDEA0", "ID": "5f27282d-f75d-4179-befa-347adb023816", "DetectTime": "2023-10-30T14:02:21.962695+02:00", "EventTime": "2023-10-30T14:02:21.962706+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXhbgV2by70vkCHWei"]} -{"Format": "IDEA0", "ID": "85257f94-f0d4-44dc-b4b1-f1b077eb6bfa", "DetectTime": "2023-10-30T14:02:21.971928+02:00", "EventTime": "2023-10-30T14:02:21.971942+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvgDEf3431eYUhuDTc"]} -{"Format": "IDEA0", "ID": "a73cfc24-9db0-4f25-b534-2163a4581fff", "DetectTime": "2023-10-30T14:02:21.983515+02:00", "EventTime": "2023-10-30T14:02:21.983526+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4Ip2m3gXBCM3bOTad"]} -{"Format": "IDEA0", "ID": "b3734e7a-fae3-43c4-9d48-30a84641d258", "DetectTime": "2023-10-30T14:02:21.992379+02:00", "EventTime": "2023-10-30T14:02:21.992389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CU9i8D32fae5WDGg83"]} -{"Format": "IDEA0", "ID": "f17d98e3-508a-4135-9421-31d78c57d814", "DetectTime": "2023-10-30T14:02:22.017680+02:00", "EventTime": "2023-10-30T14:02:22.017692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.244.46.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.244.46.205 ", "ContentType": "text/plain"}], "uids": ["CFdbB12UhI5LijB1"]} -{"Format": "IDEA0", "ID": "d2803998-68e4-438e-8a50-15676131d1ee", "DetectTime": "2023-10-30T14:02:22.044590+02:00", "EventTime": "2023-10-30T14:02:22.044607+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8ux9JoeY2BOFnnWk"]} -{"Format": "IDEA0", "ID": "4dea1d3d-f84d-4980-a64e-864511627d6e", "DetectTime": "2023-10-30T14:02:22.055553+02:00", "EventTime": "2023-10-30T14:02:22.055569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.60.118.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.60.118.20 ", "ContentType": "text/plain"}], "uids": ["CZJlLJ2cbz7yFnvPNl"]} -{"Format": "IDEA0", "ID": "8cfd3049-9f59-421d-a4eb-4962e271f27f", "DetectTime": "2023-10-30T14:02:22.080886+02:00", "EventTime": "2023-10-30T14:02:22.080908+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFrHeD1chBIaJcHQIb"]} -{"Format": "IDEA0", "ID": "c136780f-8b2a-4c9e-b9ee-899335ba00b2", "DetectTime": "2023-10-30T14:02:22.095678+02:00", "EventTime": "2023-10-30T14:02:22.095698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.61.221.194 ", "ContentType": "text/plain"}], "uids": ["CBguyb3DqWuAF5WOG8"]} -{"Format": "IDEA0", "ID": "26f99d8f-6986-4de1-b6c4-979de0166bdc", "DetectTime": "2023-10-30T14:02:22.120197+02:00", "EventTime": "2023-10-30T14:02:22.120208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.198.227.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.198.227.169 ", "ContentType": "text/plain"}], "uids": ["CIrMF23N3PbGgjx6F8"]} -{"Format": "IDEA0", "ID": "4ddb3c39-e97e-47ff-9cc8-75a21f02c529", "DetectTime": "2023-10-30T14:02:22.145771+02:00", "EventTime": "2023-10-30T14:02:22.145784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["Ct60DO1Jmselbxi4o8"]} -{"Format": "IDEA0", "ID": "0a3b84c1-7ff4-4750-a9cb-2da2c7f88610", "DetectTime": "2023-10-30T14:02:22.165741+02:00", "EventTime": "2023-10-30T14:02:22.165767+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIbgQSEQ64BtMavrk"]} -{"Format": "IDEA0", "ID": "e0118fd6-40a6-4af1-a394-787944425569", "DetectTime": "2023-10-30T14:02:22.176225+02:00", "EventTime": "2023-10-30T14:02:22.176243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.141.117.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.141.117.232 ", "ContentType": "text/plain"}], "uids": ["Cmjw4m7n1XMCk4PJ3"]} -{"Format": "IDEA0", "ID": "21a5de9d-f86e-4189-8a0f-cf0a8d8b725c", "DetectTime": "2023-10-30T14:02:22.200032+02:00", "EventTime": "2023-10-30T14:02:22.200049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CnOl8dJNxq6XlaKug"]} -{"Format": "IDEA0", "ID": "b210b6f6-cbed-4d28-82c6-9d448f52a65d", "DetectTime": "2023-10-30T14:02:22.229974+02:00", "EventTime": "2023-10-30T14:02:22.229992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["38.118.129.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 38.118.129.170 ", "ContentType": "text/plain"}], "uids": ["CZ6Eiq9u1YuEBzwWd"]} -{"Format": "IDEA0", "ID": "50eba5df-fde3-4249-8870-3fe6a9340bc1", "DetectTime": "2023-10-30T14:02:22.252244+02:00", "EventTime": "2023-10-30T14:02:22.252260+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Csd1nA3BzKcqPvpXGl"]} -{"Format": "IDEA0", "ID": "a6253d48-2049-4527-a828-414da8aebecf", "DetectTime": "2023-10-30T14:02:22.260109+02:00", "EventTime": "2023-10-30T14:02:22.260126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["Crhj913rI9h4ioMYm6"]} -{"Format": "IDEA0", "ID": "099b0ef8-8abb-4ad4-8f06-ce87459d6d4d", "DetectTime": "2023-10-30T14:02:22.283399+02:00", "EventTime": "2023-10-30T14:02:22.283417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["CM50Il3fmEdNNB8Mb9"]} -{"Format": "IDEA0", "ID": "ffb1cd0a-40a8-40e6-b719-297054f0ff51", "DetectTime": "2023-10-30T14:02:22.308450+02:00", "EventTime": "2023-10-30T14:02:22.308467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CkKGwEUYmDYgD2Eug"]} -{"Format": "IDEA0", "ID": "651c716f-6534-4917-a64c-514c02d3a4f9", "DetectTime": "2023-10-30T14:02:22.331624+02:00", "EventTime": "2023-10-30T14:02:22.331649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.107.159.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.107.159.117 ", "ContentType": "text/plain"}], "uids": ["CIlAtPoQrI37dpCC4"]} -{"Format": "IDEA0", "ID": "8ad9c5a8-c775-45ec-8697-070d2e8f96f3", "DetectTime": "2023-10-30T14:02:22.355887+02:00", "EventTime": "2023-10-30T14:02:22.355904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.184.128.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.184.128.160 ", "ContentType": "text/plain"}], "uids": ["CWLrAP1Ihgy2ZqMP8i"]} -{"Format": "IDEA0", "ID": "1063846b-8994-4c87-9491-b0310b7514e5", "DetectTime": "2023-10-30T14:02:22.382438+02:00", "EventTime": "2023-10-30T14:02:22.382455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.147.133.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.147.133.194 ", "ContentType": "text/plain"}], "uids": ["CI1rRNK6wCebReCZ"]} -{"Format": "IDEA0", "ID": "c5de8b2c-bb9b-42e0-be8f-b8cf6808ac8f", "DetectTime": "2023-10-30T14:02:22.408992+02:00", "EventTime": "2023-10-30T14:02:22.409013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.79.52.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.79.52.220 ", "ContentType": "text/plain"}], "uids": ["C1Q5AX2GZYKxBMdLy3"]} -{"Format": "IDEA0", "ID": "ac7e208b-7f7a-411c-97df-f0adff0f3cc7", "DetectTime": "2023-10-30T14:02:22.434795+02:00", "EventTime": "2023-10-30T14:02:22.434812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.111.78.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.111.78.121 ", "ContentType": "text/plain"}], "uids": ["CqDt3WNP8ZWqJg1Fl"]} -{"Format": "IDEA0", "ID": "383b3725-94d2-4e59-a809-3e9ebf624dd2", "DetectTime": "2023-10-30T14:02:22.461913+02:00", "EventTime": "2023-10-30T14:02:22.461929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CKOrnA2WSVTbCfNRB2"]} -{"Format": "IDEA0", "ID": "493ebfc9-2c63-488d-a643-2e6a288373d4", "DetectTime": "2023-10-30T14:02:22.505962+02:00", "EventTime": "2023-10-30T14:02:22.505978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.111.224.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.111.224.156 ", "ContentType": "text/plain"}], "uids": ["CGU7dw2XTn3YtKr2tl"]} -{"Format": "IDEA0", "ID": "f367689d-56ba-42da-b55e-1266e6b4622d", "DetectTime": "2023-10-30T14:02:22.529972+02:00", "EventTime": "2023-10-30T14:02:22.529997+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEQ8iZ13fPIy2zveAi"]} -{"Format": "IDEA0", "ID": "8007b361-ca4f-46a5-b142-6b9f9347ac86", "DetectTime": "2023-10-30T14:02:22.537594+02:00", "EventTime": "2023-10-30T14:02:22.537608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.21.13.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.21.13.138 ", "ContentType": "text/plain"}], "uids": ["CVInug4c8zcMRSZJLb"]} -{"Format": "IDEA0", "ID": "b5c9da18-066c-45e6-986c-df92fdf91499", "DetectTime": "2023-10-30T14:02:22.560244+02:00", "EventTime": "2023-10-30T14:02:22.560261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CORLL41YZpYXTUm2ai"]} -{"Format": "IDEA0", "ID": "349a2fb0-d57c-44ea-a67d-556144f23796", "DetectTime": "2023-10-30T14:02:22.584860+02:00", "EventTime": "2023-10-30T14:02:22.584885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.0.1.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.0.1.161 ", "ContentType": "text/plain"}], "uids": ["CJTkvB1hsEvXZyzC4g"]} -{"Format": "IDEA0", "ID": "6a8e2b76-7199-419d-8c66-7c2860f10eb9", "DetectTime": "2023-10-30T14:02:22.606688+02:00", "EventTime": "2023-10-30T14:02:22.606705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.57.245.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.57.245.155 ", "ContentType": "text/plain"}], "uids": ["CaEwOU3D2lAYh6fY0i"]} -{"Format": "IDEA0", "ID": "ce8306e1-e210-41d5-b48a-29ec0a06d96e", "DetectTime": "2023-10-30T14:02:22.629444+02:00", "EventTime": "2023-10-30T14:02:22.629461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.190.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.190.82 ", "ContentType": "text/plain"}], "uids": ["CXhn3y2KugQtLVV6G9"]} -{"Format": "IDEA0", "ID": "8cef3bc3-0997-4ae3-ad63-a0fa2be3994a", "DetectTime": "2023-10-30T14:02:22.654653+02:00", "EventTime": "2023-10-30T14:02:22.654669+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CbL6Ce2qEEaG4aFiO9"]} -{"Format": "IDEA0", "ID": "2f88b0de-12e3-42e4-935e-881b34d70c96", "DetectTime": "2023-10-30T14:02:22.698543+02:00", "EventTime": "2023-10-30T14:02:22.698559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.4.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.4.205 ", "ContentType": "text/plain"}], "uids": ["CW0dax4tC9eZL6ke3"]} -{"Format": "IDEA0", "ID": "3b89e17d-bd8f-4976-a293-4e04c0a0ab3d", "DetectTime": "2023-10-30T14:02:22.724936+02:00", "EventTime": "2023-10-30T14:02:22.724956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.180.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.180.241 ", "ContentType": "text/plain"}], "uids": ["Cn0V7ljD99BzE6M68"]} -{"Format": "IDEA0", "ID": "3eceda08-d03d-494a-b62f-a55c8d7d6966", "DetectTime": "2023-10-30T14:02:22.748153+02:00", "EventTime": "2023-10-30T14:02:22.748171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C4Ip2m3gXBCM3bOTad", "CFrHeD1chBIaJcHQIb", "Csd1nA3BzKcqPvpXGl", "CwtWYm0i6sTmZ7SV5"]} -{"Format": "IDEA0", "ID": "361c0972-870a-41d3-9837-8eb8cd47b5df", "DetectTime": "2023-10-30T14:02:22.755574+02:00", "EventTime": "2023-10-30T14:02:22.755597+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwtWYm0i6sTmZ7SV5"]} -{"Format": "IDEA0", "ID": "fdbdc455-c8cf-42ca-9b00-cc9ef9e9b161", "DetectTime": "2023-10-30T14:02:22.763576+02:00", "EventTime": "2023-10-30T14:02:22.763594+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cc9L3btMiYftvT5z"]} -{"Format": "IDEA0", "ID": "6439f6a5-d68a-4078-bb5e-de3c6854908c", "DetectTime": "2023-10-30T14:02:22.770820+02:00", "EventTime": "2023-10-30T14:02:22.770837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.67.85.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.67.85.122 ", "ContentType": "text/plain"}], "uids": ["CI5HNr1OJYFNSWw2Kg"]} -{"Format": "IDEA0", "ID": "d93de641-1b69-4da8-9772-bce2c5b3f6d5", "DetectTime": "2023-10-30T14:02:22.795624+02:00", "EventTime": "2023-10-30T14:02:22.795637+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CntPJ12AgzOe3TNYmh"]} -{"Format": "IDEA0", "ID": "7c965256-9849-433c-92fa-da9bef4cb83c", "DetectTime": "2023-10-30T14:02:22.803065+02:00", "EventTime": "2023-10-30T14:02:22.803077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.1.245.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.1.245.238 ", "ContentType": "text/plain"}], "uids": ["CaXWeZV2CkdwmLpAe"]} -{"Format": "IDEA0", "ID": "b076d4f4-d73b-4bb3-95e8-4d58107c5835", "DetectTime": "2023-10-30T14:02:22.829146+02:00", "EventTime": "2023-10-30T14:02:22.829163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CYcpUm2boByF2gaUpi"]} -{"Format": "IDEA0", "ID": "df6aad10-2de1-4f15-8ae9-703e5619da8d", "DetectTime": "2023-10-30T14:02:22.853408+02:00", "EventTime": "2023-10-30T14:02:22.853419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C5FWKV2RMYvwxMzsvc"]} -{"Format": "IDEA0", "ID": "4e03053b-8319-4658-b227-9be663dd512b", "DetectTime": "2023-10-30T14:02:22.879050+02:00", "EventTime": "2023-10-30T14:02:22.879069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.138.18.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.138.18.221 ", "ContentType": "text/plain"}], "uids": ["CjhZiy3EFWCCx75MD6"]} -{"Format": "IDEA0", "ID": "9547ce33-fe73-43b9-935c-5cb644ee6b2d", "DetectTime": "2023-10-30T14:02:22.905361+02:00", "EventTime": "2023-10-30T14:02:22.905373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["COb3gE1lpmWnU3jnZ"]} -{"Format": "IDEA0", "ID": "e205221c-e89e-4417-9843-760a39b84cc8", "DetectTime": "2023-10-30T14:02:22.935302+02:00", "EventTime": "2023-10-30T14:02:22.935319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.224.17 ", "ContentType": "text/plain"}], "uids": ["C5XyypX85h0WrSnDf"]} -{"Format": "IDEA0", "ID": "05cdfe2a-93ff-49c4-8429-91cb564fc44b", "DetectTime": "2023-10-30T14:02:22.965055+02:00", "EventTime": "2023-10-30T14:02:22.965071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.223.188.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.223.188.71 ", "ContentType": "text/plain"}], "uids": ["CKhlwu4XSaoYnF75Qf"]} -{"Format": "IDEA0", "ID": "375ddc57-f6d5-45ac-ad77-edec9d99ad31", "DetectTime": "2023-10-30T14:02:22.992150+02:00", "EventTime": "2023-10-30T14:02:22.992175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.144.13.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.144.13.22 ", "ContentType": "text/plain"}], "uids": ["Csg5mZ2ArHjDipH9R4"]} -{"Format": "IDEA0", "ID": "8f56645f-51f9-43f4-bddf-386acea1b7e3", "DetectTime": "2023-10-30T14:02:23.017955+02:00", "EventTime": "2023-10-30T14:02:23.017971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.157.42.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.157.42.42 ", "ContentType": "text/plain"}], "uids": ["CWTcoRnsthcjHP7Dd"]} -{"Format": "IDEA0", "ID": "95240434-b2d7-42de-b6dd-d7c00662c1ed", "DetectTime": "2023-10-30T14:02:23.046071+02:00", "EventTime": "2023-10-30T14:02:23.046133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.248.253.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.248.253.118 ", "ContentType": "text/plain"}], "uids": ["CtZePe1lhLiVSPiAPl"]} -{"Format": "IDEA0", "ID": "99da2fa7-48ca-40e0-9bba-137d7a4e6fde", "DetectTime": "2023-10-30T14:02:23.070831+02:00", "EventTime": "2023-10-30T14:02:23.070849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["C0MtDZAVcjufPIgsj"]} -{"Format": "IDEA0", "ID": "f29479b9-2a13-48ba-a544-7c99038b3d6e", "DetectTime": "2023-10-30T14:02:23.098083+02:00", "EventTime": "2023-10-30T14:02:23.098105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.207.189.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.207.189.134 ", "ContentType": "text/plain"}], "uids": ["CIDnQLuv8cdOELk72"]} -{"Format": "IDEA0", "ID": "289a8061-19fe-4c43-8263-02f628fb34c9", "DetectTime": "2023-10-30T14:02:23.125125+02:00", "EventTime": "2023-10-30T14:02:23.125144+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4h9hx2i5dYafG7wP9"]} -{"Format": "IDEA0", "ID": "b3f306c0-7bae-483e-a8df-724987eca32f", "DetectTime": "2023-10-30T14:02:23.135936+02:00", "EventTime": "2023-10-30T14:02:23.135962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.8.177.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.8.177.82 ", "ContentType": "text/plain"}], "uids": ["C8sgQF4ZBiAqjuSzQg"]} -{"Format": "IDEA0", "ID": "a6fca19b-a331-4571-bfa2-5d16f64ac5ee", "DetectTime": "2023-10-30T14:02:23.163170+02:00", "EventTime": "2023-10-30T14:02:23.163191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CzegZ63zKNsJbwBGAc"]} -{"Format": "IDEA0", "ID": "4ea12fb4-b99c-4426-8edd-47bdd1211558", "DetectTime": "2023-10-30T14:02:23.190147+02:00", "EventTime": "2023-10-30T14:02:23.190172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CVo5cI3qwYRFGpC3Wd"]} -{"Format": "IDEA0", "ID": "c8b17b61-cfc1-4be7-8a8c-e3f182bff64c", "DetectTime": "2023-10-30T14:02:23.220312+02:00", "EventTime": "2023-10-30T14:02:23.220326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.254.149.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.254.149.10 ", "ContentType": "text/plain"}], "uids": ["C52jyE2m8XAcVfVOS4"]} -{"Format": "IDEA0", "ID": "f34c86e2-c56c-4157-b61b-48b2d3c08d2f", "DetectTime": "2023-10-30T14:02:23.252752+02:00", "EventTime": "2023-10-30T14:02:23.252770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.168.104.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.168.104.77 ", "ContentType": "text/plain"}], "uids": ["CkPq8S1POr1fEnTTBl"]} -{"Format": "IDEA0", "ID": "f7eda1d6-2164-44a5-9082-14f927ed6933", "DetectTime": "2023-10-30T14:02:23.281909+02:00", "EventTime": "2023-10-30T14:02:23.281935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.220.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.220.87 ", "ContentType": "text/plain"}], "uids": ["ClElfq404UxQ8yl6vd"]} -{"Format": "IDEA0", "ID": "fdd52955-bfce-4339-b1a2-2ec2e9bc56e9", "DetectTime": "2023-10-30T14:02:23.310168+02:00", "EventTime": "2023-10-30T14:02:23.310188+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaHwzQ2WBCO6gS8WPe"]} -{"Format": "IDEA0", "ID": "1b66f93f-f10d-419f-856c-7d8a5701f482", "DetectTime": "2023-10-30T14:02:23.317864+02:00", "EventTime": "2023-10-30T14:02:23.317881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.123.111 ", "ContentType": "text/plain"}], "uids": ["CS1YyQ1EBByzATFtRd"]} -{"Format": "IDEA0", "ID": "03c6ec61-733b-4ad1-b432-0ae70389c6d6", "DetectTime": "2023-10-30T14:02:23.344929+02:00", "EventTime": "2023-10-30T14:02:23.344947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.135.63.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.135.63.226 ", "ContentType": "text/plain"}], "uids": ["CuuS0F16pcuqBbG7c9"]} -{"Format": "IDEA0", "ID": "6e425d9a-7f07-4818-823e-32e9104c9e1c", "DetectTime": "2023-10-30T14:02:23.370165+02:00", "EventTime": "2023-10-30T14:02:23.370181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.212.161.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.212.161.30 ", "ContentType": "text/plain"}], "uids": ["COOXIu3Ky1vPnve6b8"]} -{"Format": "IDEA0", "ID": "36214c22-5226-4006-bbef-72dea7c1fbd8", "DetectTime": "2023-10-30T14:02:23.398145+02:00", "EventTime": "2023-10-30T14:02:23.398165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.114.234.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.114.234.198 ", "ContentType": "text/plain"}], "uids": ["CWfA0R3FNu1qFoYl3g"]} -{"Format": "IDEA0", "ID": "637b3b00-a35d-4043-bfd2-f770126f8054", "DetectTime": "2023-10-30T14:02:23.423475+02:00", "EventTime": "2023-10-30T14:02:23.423494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CepEUq4xiLNjVt2RT5"]} -{"Format": "IDEA0", "ID": "768b2723-4a1c-4d9a-b57c-88e0ba355bc1", "DetectTime": "2023-10-30T14:02:23.451598+02:00", "EventTime": "2023-10-30T14:02:23.451618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.95.174.120"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.95.174.120 ", "ContentType": "text/plain"}], "uids": ["CzSQbPepezV7oiLgc"]} -{"Format": "IDEA0", "ID": "e73cec36-3445-4179-9e60-caee30e758a5", "DetectTime": "2023-10-30T14:02:23.475784+02:00", "EventTime": "2023-10-30T14:02:23.475804+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoyUFC3PCyS2L30zhg"]} -{"Format": "IDEA0", "ID": "ae828a3b-78a1-4986-8b00-89db53395b65", "DetectTime": "2023-10-30T14:02:23.483326+02:00", "EventTime": "2023-10-30T14:02:23.483339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["100.1.75.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 100.1.75.230 ", "ContentType": "text/plain"}], "uids": ["Cmttn82zKDHvODFTO6"]} -{"Format": "IDEA0", "ID": "a461a694-af6b-48bb-85e6-a3bb084c340e", "DetectTime": "2023-10-30T14:02:23.514036+02:00", "EventTime": "2023-10-30T14:02:23.514059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["CrkbmL1YuexGxiPTC5"]} -{"Format": "IDEA0", "ID": "0d9fb87c-fde2-4503-a5a1-5fe2c9b34ec2", "DetectTime": "2023-10-30T14:02:23.541033+02:00", "EventTime": "2023-10-30T14:02:23.541056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["208.180.242.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 208.180.242.247 ", "ContentType": "text/plain"}], "uids": ["Ci8iVx1LZbnkw8ogcb"]} -{"Format": "IDEA0", "ID": "4a7a3aa2-a108-45a7-b360-665bbd44a328", "DetectTime": "2023-10-30T14:02:23.569211+02:00", "EventTime": "2023-10-30T14:02:23.569230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.202.249.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.202.249.140 ", "ContentType": "text/plain"}], "uids": ["CuN6mE3XnRO5EaIyX5"]} -{"Format": "IDEA0", "ID": "1e2d220d-0fac-494b-b5bd-25e6f351a0da", "DetectTime": "2023-10-30T14:02:23.596153+02:00", "EventTime": "2023-10-30T14:02:23.596169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.168.30.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.168.30.58 ", "ContentType": "text/plain"}], "uids": ["Cn3BtU3kumRig8Ekeg"]} -{"Format": "IDEA0", "ID": "2464d984-bb9f-4117-8ba9-5c9ce2e11ddf", "DetectTime": "2023-10-30T14:02:23.625980+02:00", "EventTime": "2023-10-30T14:02:23.625998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.248.138.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.248.138.228 ", "ContentType": "text/plain"}], "uids": ["CQbleFTgL9JllTGg2"]} -{"Format": "IDEA0", "ID": "ae19b332-e6b4-4943-b37e-45e1653a58a5", "DetectTime": "2023-10-30T14:02:23.653632+02:00", "EventTime": "2023-10-30T14:02:23.653650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.164.5.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.164.5.210 ", "ContentType": "text/plain"}], "uids": ["CvorWd3J6lnTxruxA4"]} -{"Format": "IDEA0", "ID": "efb23c74-64ab-43e9-8389-4ee5b794d3c5", "DetectTime": "2023-10-30T14:02:23.683571+02:00", "EventTime": "2023-10-30T14:02:23.683590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["198.2.54.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 198.2.54.18 ", "ContentType": "text/plain"}], "uids": ["CIBrvlPi55DeVDozh"]} -{"Format": "IDEA0", "ID": "9fa6b0d5-d270-4616-b752-9f6dabc8725c", "DetectTime": "2023-10-30T14:02:23.714474+02:00", "EventTime": "2023-10-30T14:02:23.714503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CyLIna3cZHdo7lJ2r6"]} -{"Format": "IDEA0", "ID": "5f97d412-47f8-4e43-9457-f791f871a7ac", "DetectTime": "2023-10-30T14:02:23.743882+02:00", "EventTime": "2023-10-30T14:02:23.743909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.193.78.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.193.78.226 ", "ContentType": "text/plain"}], "uids": ["CruAlX3fyO2gQe8eyj"]} -{"Format": "IDEA0", "ID": "b86fc93a-4ec2-4841-bbde-51bce9004d2c", "DetectTime": "2023-10-30T14:02:23.771327+02:00", "EventTime": "2023-10-30T14:02:23.771360+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CqmMd52QdxMatbmDfd"]} -{"Format": "IDEA0", "ID": "7c8f3ac1-4c2a-46ad-ac7f-2ea64ab5ce40", "DetectTime": "2023-10-30T14:02:23.827723+02:00", "EventTime": "2023-10-30T14:02:23.827739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CEACrV1s3yfssQoOD3"]} -{"Format": "IDEA0", "ID": "1f9f9839-96be-4e74-92a5-5236e90666c1", "DetectTime": "2023-10-30T14:02:23.853515+02:00", "EventTime": "2023-10-30T14:02:23.853533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.151.196.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.151.196.165 ", "ContentType": "text/plain"}], "uids": ["CUGAsd3C3opQClU68d"]} -{"Format": "IDEA0", "ID": "553262ee-c8e4-443f-8a43-e4d7d5919595", "DetectTime": "2023-10-30T14:02:23.879661+02:00", "EventTime": "2023-10-30T14:02:23.879675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.207.108.171"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.207.108.171 ", "ContentType": "text/plain"}], "uids": ["Cm9Qtg196r53dLLuua"]} -{"Format": "IDEA0", "ID": "1ffa6c85-fdf0-42b7-8169-7cb9ff1de3e3", "DetectTime": "2023-10-30T14:02:23.905923+02:00", "EventTime": "2023-10-30T14:02:23.905945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.53.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.40.53.113 ", "ContentType": "text/plain"}], "uids": ["CSIw5H3nZVPChd9tdj"]} -{"Format": "IDEA0", "ID": "679bf2d9-2d9d-4b1f-9a68-3c89b8272ac5", "DetectTime": "2023-10-30T14:02:23.930806+02:00", "EventTime": "2023-10-30T14:02:23.930822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["209.112.181.236"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 209.112.181.236 ", "ContentType": "text/plain"}], "uids": ["ClzbKLOGL4b0m8qZh"]} -{"Format": "IDEA0", "ID": "ab780f54-0dbc-4db8-b5f6-fd800a427b0f", "DetectTime": "2023-10-30T14:02:23.955421+02:00", "EventTime": "2023-10-30T14:02:23.955436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.92.237.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.92.237.39 ", "ContentType": "text/plain"}], "uids": ["CZwbhC1IqCl8hAWgYk"]} -{"Format": "IDEA0", "ID": "d7a1cb0e-b28d-49d6-97c6-699284ef8e79", "DetectTime": "2023-10-30T14:02:23.980533+02:00", "EventTime": "2023-10-30T14:02:23.980551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.57.194.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.57.194.72 ", "ContentType": "text/plain"}], "uids": ["CWT3kQ3umjgn4zWA73"]} -{"Format": "IDEA0", "ID": "f435cef9-62d5-43be-bffa-a0c756559aed", "DetectTime": "2023-10-30T14:02:24.008426+02:00", "EventTime": "2023-10-30T14:02:24.008449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.57.12.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.57.12.144 ", "ContentType": "text/plain"}], "uids": ["CBQR7U145zkWMgFqM2"]} -{"Format": "IDEA0", "ID": "98954818-807b-4afe-80be-d866272a5fe5", "DetectTime": "2023-10-30T14:02:24.034281+02:00", "EventTime": "2023-10-30T14:02:24.034306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CpJjj81Q7LuiFfyzUk"]} -{"Format": "IDEA0", "ID": "caf06a83-1547-4cf5-8975-b4cde4c70047", "DetectTime": "2023-10-30T14:02:24.060915+02:00", "EventTime": "2023-10-30T14:02:24.060933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CGr68A4SegNo95mG1h"]} -{"Format": "IDEA0", "ID": "4245b645-9615-4d64-93ec-f832fb227d24", "DetectTime": "2023-10-30T14:02:24.089530+02:00", "EventTime": "2023-10-30T14:02:24.089548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CLzac7UDMKVHzFS87"]} -{"Format": "IDEA0", "ID": "76367850-be40-4ff0-8f79-f66bce6e9b7d", "DetectTime": "2023-10-30T14:02:24.115577+02:00", "EventTime": "2023-10-30T14:02:24.115595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Cdq4ED3os6XZOeHr4a"]} -{"Format": "IDEA0", "ID": "ee7c3021-80b8-4d76-a634-c6c51fa9300f", "DetectTime": "2023-10-30T14:02:24.142934+02:00", "EventTime": "2023-10-30T14:02:24.142946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["C5cAfP1Edhu0cJKg29"]} -{"Format": "IDEA0", "ID": "56420768-41a8-4378-87f8-6467d17d3466", "DetectTime": "2023-10-30T14:02:24.167433+02:00", "EventTime": "2023-10-30T14:02:24.167458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.42.193.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.42.193.223 ", "ContentType": "text/plain"}], "uids": ["Cm4Czz3A80iIRJmKb9"]} -{"Format": "IDEA0", "ID": "c523ef09-8c24-4b04-ab9e-6eef932602ef", "DetectTime": "2023-10-30T14:02:24.193714+02:00", "EventTime": "2023-10-30T14:02:24.193738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.120.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.120.249 ", "ContentType": "text/plain"}], "uids": ["CQWClbpVjDMMgxv1b"]} -{"Format": "IDEA0", "ID": "1c3bb8dd-a481-47df-bede-e4c5904d26a1", "DetectTime": "2023-10-30T14:02:24.220690+02:00", "EventTime": "2023-10-30T14:02:24.220716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["C9mhn53Ca3ZWICBfud"]} -{"Format": "IDEA0", "ID": "6f2f1a46-66d2-424e-9373-91fb11174825", "DetectTime": "2023-10-30T14:02:24.248913+02:00", "EventTime": "2023-10-30T14:02:24.248935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.146.132.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.146.132.216 ", "ContentType": "text/plain"}], "uids": ["CyZK0l1yPgefu6OLR8"]} -{"Format": "IDEA0", "ID": "cb3d32ba-34af-4790-a296-891bb26bde55", "DetectTime": "2023-10-30T14:02:24.274032+02:00", "EventTime": "2023-10-30T14:02:24.274056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CFXqzd4zzzhGJ8nC7j"]} -{"Format": "IDEA0", "ID": "7288066c-207a-4051-8503-a1d01991c735", "DetectTime": "2023-10-30T14:02:24.301595+02:00", "EventTime": "2023-10-30T14:02:24.301612+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9eeeu49XLjAYyTE6e"]} -{"Format": "IDEA0", "ID": "06ccb8eb-7b36-4507-b6ca-f43244ac6bfb", "DetectTime": "2023-10-30T14:02:24.317018+02:00", "EventTime": "2023-10-30T14:02:24.317040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.94.186.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.94.186.233 ", "ContentType": "text/plain"}], "uids": ["C8K8Ph1Jsv9WN6LpB1"]} -{"Format": "IDEA0", "ID": "bb4656e6-1f69-4910-82fc-21765ca2e67a", "DetectTime": "2023-10-30T14:02:24.345358+02:00", "EventTime": "2023-10-30T14:02:24.345372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.160.175.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.160.175.150 ", "ContentType": "text/plain"}], "uids": ["Ccb4wp3QmOSzw3PaYh"]} -{"Format": "IDEA0", "ID": "8472dcd7-78f2-47ec-bf25-4d674f358bfd", "DetectTime": "2023-10-30T14:02:24.368766+02:00", "EventTime": "2023-10-30T14:02:24.368792+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEEzfEtS7M4YHS6hc"]} -{"Format": "IDEA0", "ID": "c4957b89-ae0e-45d5-9e83-54be571e9389", "DetectTime": "2023-10-30T14:02:24.382015+02:00", "EventTime": "2023-10-30T14:02:24.382028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CdqI7A3Tls1D0f1TV5"]} -{"Format": "IDEA0", "ID": "544e358e-6597-4f59-bf64-d82190592a7e", "DetectTime": "2023-10-30T14:02:24.410391+02:00", "EventTime": "2023-10-30T14:02:24.410412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CePnoC2I6MlXAqMTZk", "CntPJ12AgzOe3TNYmh", "CaHwzQ2WBCO6gS8WPe", "C9eeeu49XLjAYyTE6e"]} -{"Format": "IDEA0", "ID": "1cea494f-82d1-47cb-bda1-a7f6f9285982", "DetectTime": "2023-10-30T14:02:24.424526+02:00", "EventTime": "2023-10-30T14:02:24.424539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.23.159.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.23.159.40 ", "ContentType": "text/plain"}], "uids": ["CBhKGv2z5XB3P1RBK"]} -{"Format": "IDEA0", "ID": "33907690-1d55-475f-9c2f-de62ec3f0187", "DetectTime": "2023-10-30T14:02:24.450151+02:00", "EventTime": "2023-10-30T14:02:24.450169+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CePnoC2I6MlXAqMTZk"]} -{"Format": "IDEA0", "ID": "5b9ec868-0c37-475f-9241-23f6fa2aefc8", "DetectTime": "2023-10-30T14:02:24.465182+02:00", "EventTime": "2023-10-30T14:02:24.465208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.124.162.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.124.162.47 ", "ContentType": "text/plain"}], "uids": ["CrGogO3zu5l7vkwtEi"]} -{"Format": "IDEA0", "ID": "d25a2757-735a-4b64-a310-026d9f70404d", "DetectTime": "2023-10-30T14:02:24.490168+02:00", "EventTime": "2023-10-30T14:02:24.490194+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cazghk27t1MdlGKGf5"]} -{"Format": "IDEA0", "ID": "8801f93f-cf69-44cb-af27-f3032610de6b", "DetectTime": "2023-10-30T14:02:24.507197+02:00", "EventTime": "2023-10-30T14:02:24.507216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CysVD38Ufm2zbOXPj"]} -{"Format": "IDEA0", "ID": "32079ee4-393b-48eb-8254-3eddc3abb70f", "DetectTime": "2023-10-30T14:02:24.536075+02:00", "EventTime": "2023-10-30T14:02:24.536090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBCbO43p25TUWZZ744"]} -{"Format": "IDEA0", "ID": "22b2dba1-6964-4697-ad2a-4f9c49ec80a1", "DetectTime": "2023-10-30T14:02:24.563937+02:00", "EventTime": "2023-10-30T14:02:24.563951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CxVFnM3pV8r2T5uu3d"]} -{"Format": "IDEA0", "ID": "eb8c57ea-c7fe-4e15-90bc-e065ef60bc1c", "DetectTime": "2023-10-30T14:02:24.590709+02:00", "EventTime": "2023-10-30T14:02:24.590735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cakcs9KW3Hq8Leu1i"]} -{"Format": "IDEA0", "ID": "9ece7372-fc5b-4ea3-ba27-6f86dd3977e3", "DetectTime": "2023-10-30T14:02:24.619785+02:00", "EventTime": "2023-10-30T14:02:24.619808+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Chuygr2FACOMbE5G5j"]} -{"Format": "IDEA0", "ID": "b5f17600-4e4d-49c7-b1de-a2e5cdd6bfe2", "DetectTime": "2023-10-30T14:02:24.634996+02:00", "EventTime": "2023-10-30T14:02:24.635016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.144.13.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.144.13.22 ", "ContentType": "text/plain"}], "uids": ["C1ZhF61W0hwEziS228"]} -{"Format": "IDEA0", "ID": "71b3528a-0508-401e-aecf-214ae15c1122", "DetectTime": "2023-10-30T14:02:24.658297+02:00", "EventTime": "2023-10-30T14:02:24.658323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CFLIdz3M8W7pguCVzl"]} -{"Format": "IDEA0", "ID": "95746d67-276f-4991-8ff8-756f365d1b6c", "DetectTime": "2023-10-30T14:02:24.707657+02:00", "EventTime": "2023-10-30T14:02:24.707674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CKy0oG2gvCqJWDFsX1"]} -{"Format": "IDEA0", "ID": "f59f6041-f016-4aba-addb-a7850d1bfbf5", "DetectTime": "2023-10-30T14:02:24.736578+02:00", "EventTime": "2023-10-30T14:02:24.736600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CMkePOc4YPAeC13Zc"]} -{"Format": "IDEA0", "ID": "2f925884-0d04-4176-81a8-444d6798b2bf", "DetectTime": "2023-10-30T14:02:24.762349+02:00", "EventTime": "2023-10-30T14:02:24.762370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.168.30.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.168.30.58 ", "ContentType": "text/plain"}], "uids": ["C61CYH2V8aTHkMPgG1"]} -{"Format": "IDEA0", "ID": "827dddfb-6f9e-4a41-9541-fb09b5191476", "DetectTime": "2023-10-30T14:02:24.784946+02:00", "EventTime": "2023-10-30T14:02:24.784965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CJFXrg4dYpa0YH1Hzc"]} -{"Format": "IDEA0", "ID": "015077a0-8133-45ec-90d3-346c6abe2f78", "DetectTime": "2023-10-30T14:02:24.805640+02:00", "EventTime": "2023-10-30T14:02:24.805656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CRNaiN0INJbkgy1cb"]} -{"Format": "IDEA0", "ID": "29bc4dfa-fcb8-4bfb-b9a0-934b7c4357f6", "DetectTime": "2023-10-30T14:02:24.834377+02:00", "EventTime": "2023-10-30T14:02:24.834394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CYkUXq3eSHLCw7H5je"]} -{"Format": "IDEA0", "ID": "5833a4b6-8be8-4d4a-9369-ba2ed77ac8e1", "DetectTime": "2023-10-30T14:02:24.862999+02:00", "EventTime": "2023-10-30T14:02:24.863026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["C5cM9I1rCucRV5EZ6g"]} -{"Format": "IDEA0", "ID": "761f9607-66f4-40bf-9d34-01f70cfcf588", "DetectTime": "2023-10-30T14:02:24.890955+02:00", "EventTime": "2023-10-30T14:02:24.890972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.168.30.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.168.30.58 ", "ContentType": "text/plain"}], "uids": ["CTtojx1zS6gihviSve"]} -{"Format": "IDEA0", "ID": "034797de-e377-4832-9ca0-6d4b0b251ea0", "DetectTime": "2023-10-30T14:02:24.911647+02:00", "EventTime": "2023-10-30T14:02:24.911662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.4.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.4.205 ", "ContentType": "text/plain"}], "uids": ["CQfU2h40io0ZNnhimg"]} -{"Format": "IDEA0", "ID": "c9243f7d-b141-4ef1-b33d-a8a14f3d6ad5", "DetectTime": "2023-10-30T14:02:24.933870+02:00", "EventTime": "2023-10-30T14:02:24.933888+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpSYdV3qcZjR54D4Yi"]} -{"Format": "IDEA0", "ID": "23dad62c-8d6a-40e9-ae1c-2d0ddf20a9ef", "DetectTime": "2023-10-30T14:02:24.947939+02:00", "EventTime": "2023-10-30T14:02:24.947960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CGW5x33yR5s3ur7Gci"]} -{"Format": "IDEA0", "ID": "1d896855-4352-442b-8a5f-08b0e6773fcc", "DetectTime": "2023-10-30T14:02:24.970630+02:00", "EventTime": "2023-10-30T14:02:24.970653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.164.5.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.164.5.210 ", "ContentType": "text/plain"}], "uids": ["CdL6sv2wd5WwULxuI7"]} -{"Format": "IDEA0", "ID": "246cc54b-93f1-4dff-8eff-a59087249283", "DetectTime": "2023-10-30T14:02:24.990542+02:00", "EventTime": "2023-10-30T14:02:24.990562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C6jybk3fbxaLA0Ile"]} -{"Format": "IDEA0", "ID": "e97b3580-7e5c-481c-97d5-2bbe39280b64", "DetectTime": "2023-10-30T14:02:25.019242+02:00", "EventTime": "2023-10-30T14:02:25.019268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C5IyBp4NvDuL3BIsJi"]} -{"Format": "IDEA0", "ID": "871c37df-bbf1-41a8-9fc0-f6a43e07b99e", "DetectTime": "2023-10-30T14:02:25.044473+02:00", "EventTime": "2023-10-30T14:02:25.044493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CEcf1L1XFxgixl3sVj"]} -{"Format": "IDEA0", "ID": "4ae4758f-3c5e-4dac-bd45-12fd5c9bf11c", "DetectTime": "2023-10-30T14:02:25.066080+02:00", "EventTime": "2023-10-30T14:02:25.066096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CLnaV12yiYc43NjVsh"]} -{"Format": "IDEA0", "ID": "5eb1031e-e690-4fa4-baf8-4ba1a5893637", "DetectTime": "2023-10-30T14:02:25.088441+02:00", "EventTime": "2023-10-30T14:02:25.088457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["Co3HCU2GJoPf08O6Mf"]} -{"Format": "IDEA0", "ID": "0812dc37-2575-4b5f-8ce2-a08c8b034aef", "DetectTime": "2023-10-30T14:02:25.111144+02:00", "EventTime": "2023-10-30T14:02:25.111160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CWcn6njCP2DUA1AV3"]} -{"Format": "IDEA0", "ID": "46b3c094-9170-45df-971d-e9eae7b57644", "DetectTime": "2023-10-30T14:02:25.142816+02:00", "EventTime": "2023-10-30T14:02:25.142831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C7N69DaSd5ZDJKMm4"]} -{"Format": "IDEA0", "ID": "2a2d322f-b0ce-4ebb-b71b-5fe6bbdf205e", "DetectTime": "2023-10-30T14:02:25.167315+02:00", "EventTime": "2023-10-30T14:02:25.167343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CPPs6C1PY1TWpgDqW"]} -{"Format": "IDEA0", "ID": "c03639de-e07d-4759-ba19-913bd06af3d7", "DetectTime": "2023-10-30T14:02:25.193279+02:00", "EventTime": "2023-10-30T14:02:25.193301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cr8YOk2CWNzVWNxZff"]} -{"Format": "IDEA0", "ID": "ad6e2959-8040-4a82-a684-ee50179a65e9", "DetectTime": "2023-10-30T14:02:25.220085+02:00", "EventTime": "2023-10-30T14:02:25.220103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C7M88N2X0DmrKJFwAb"]} -{"Format": "IDEA0", "ID": "5b33db77-ab7d-49e9-84c0-93fed9c6158f", "DetectTime": "2023-10-30T14:02:25.250936+02:00", "EventTime": "2023-10-30T14:02:25.250954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CtCgsc4IaGAkjUpieg"]} -{"Format": "IDEA0", "ID": "accf66e2-6900-488e-9ad1-08923d9802ef", "DetectTime": "2023-10-30T14:02:25.271563+02:00", "EventTime": "2023-10-30T14:02:25.271579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C9juW63sahBJhTofEb"]} -{"Format": "IDEA0", "ID": "4d1a116f-19b3-48a4-83da-e3b182bc2220", "DetectTime": "2023-10-30T14:02:25.300224+02:00", "EventTime": "2023-10-30T14:02:25.300243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CoswP21qUKZq0Nno19"]} -{"Format": "IDEA0", "ID": "54232708-6829-4a86-a3c5-d309c2165223", "DetectTime": "2023-10-30T14:02:25.326192+02:00", "EventTime": "2023-10-30T14:02:25.326212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CZwAlE3904ShpEmn44"]} -{"Format": "IDEA0", "ID": "906f89e2-132e-464f-aa93-9a73756b95dc", "DetectTime": "2023-10-30T14:02:25.348763+02:00", "EventTime": "2023-10-30T14:02:25.348782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cv4Pjvyx6HpmushLg"]} -{"Format": "IDEA0", "ID": "41578226-9602-457a-8b6d-b733c0dd83a2", "DetectTime": "2023-10-30T14:02:25.370371+02:00", "EventTime": "2023-10-30T14:02:25.370386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CH6NtB3UMq69fiECe"]} -{"Format": "IDEA0", "ID": "04406820-9f15-4335-a002-64536e922571", "DetectTime": "2023-10-30T14:02:25.398135+02:00", "EventTime": "2023-10-30T14:02:25.398162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C860233JeZciEjSw0j"]} -{"Format": "IDEA0", "ID": "88c8a867-35fc-493a-a1e1-40ce74f39d1a", "DetectTime": "2023-10-30T14:02:25.417073+02:00", "EventTime": "2023-10-30T14:02:25.417090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CPqrUp15D125lLFoj7"]} -{"Format": "IDEA0", "ID": "0c253bb5-8a43-43ef-bd75-baa3cd006206", "DetectTime": "2023-10-30T14:02:25.437177+02:00", "EventTime": "2023-10-30T14:02:25.437196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["Cao6a3iWlm8UOBb4a"]} -{"Format": "IDEA0", "ID": "631cae93-7f90-4a9a-a10c-0f689bc47126", "DetectTime": "2023-10-30T14:02:25.468332+02:00", "EventTime": "2023-10-30T14:02:25.468348+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYwql41NDz9g9RZJ52"]} -{"Format": "IDEA0", "ID": "0d4c250b-30c8-4e5c-8bad-79e2b6eac987", "DetectTime": "2023-10-30T14:02:25.482978+02:00", "EventTime": "2023-10-30T14:02:25.482996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CSBcE42iGUlQit2d89"]} -{"Format": "IDEA0", "ID": "e8b23bd3-f1ed-4586-a91e-f99adbcf2601", "DetectTime": "2023-10-30T14:02:25.504498+02:00", "EventTime": "2023-10-30T14:02:25.504508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CjrLYF1B6BsBlZygye"]} -{"Format": "IDEA0", "ID": "23c0f454-9e88-474a-b647-4d05be8f3d47", "DetectTime": "2023-10-30T14:02:25.526188+02:00", "EventTime": "2023-10-30T14:02:25.526205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CqlV7V39CCKRy2jlXj"]} -{"Format": "IDEA0", "ID": "e47f93af-7d00-45b4-ade7-cf0b238c293d", "DetectTime": "2023-10-30T14:02:25.547869+02:00", "EventTime": "2023-10-30T14:02:25.547888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.4.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.4.205 ", "ContentType": "text/plain"}], "uids": ["CXMjLH1M9TY6ltqkgc"]} -{"Format": "IDEA0", "ID": "8307c00f-6aec-4b3e-baa1-a8b3ed05dafd", "DetectTime": "2023-10-30T14:02:25.575880+02:00", "EventTime": "2023-10-30T14:02:25.575898+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVusn3901ETPZgN3g"]} -{"Format": "IDEA0", "ID": "7f3fca9f-8739-443d-83a8-2df5bbe306da", "DetectTime": "2023-10-30T14:02:25.590660+02:00", "EventTime": "2023-10-30T14:02:25.590680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["Cu79aY3yxGGO4hztZh"]} -{"Format": "IDEA0", "ID": "6334a154-7c43-4c0f-a0f2-e6320b05a542", "DetectTime": "2023-10-30T14:02:25.618805+02:00", "EventTime": "2023-10-30T14:02:25.618818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CGNa1h3CBIV0ylBIBl"]} -{"Format": "IDEA0", "ID": "71bdd4e1-dba6-413d-96b7-05f697266853", "DetectTime": "2023-10-30T14:02:25.637145+02:00", "EventTime": "2023-10-30T14:02:25.637163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWmwY719YKq4jkN7ze"]} -{"Format": "IDEA0", "ID": "7ca17c6b-9a4f-4c8e-aaec-7594ad8806c0", "DetectTime": "2023-10-30T14:02:25.652943+02:00", "EventTime": "2023-10-30T14:02:25.652964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CTZm9s2vtMbs5LUfxl"]} -{"Format": "IDEA0", "ID": "d4c1909e-47f7-45f7-b970-d1c94457776b", "DetectTime": "2023-10-30T14:02:25.676779+02:00", "EventTime": "2023-10-30T14:02:25.676796+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ctt9ltt2H1Djii6E"]} -{"Format": "IDEA0", "ID": "ee81abf2-1fdc-4a41-84e3-879cba2caf47", "DetectTime": "2023-10-30T14:02:25.692375+02:00", "EventTime": "2023-10-30T14:02:25.692397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CcfK9i3GwOcJ2a603e"]} -{"Format": "IDEA0", "ID": "e0a88f8c-7d4f-46a5-905e-a8e66f46dea4", "DetectTime": "2023-10-30T14:02:25.716069+02:00", "EventTime": "2023-10-30T14:02:25.716087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CWJgYN7z1qUzqGSvh"]} -{"Format": "IDEA0", "ID": "2551b25b-2545-4d07-ac46-a70b5d991e3f", "DetectTime": "2023-10-30T14:02:25.737660+02:00", "EventTime": "2023-10-30T14:02:25.737688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["C1Cvq8FBljrO1w7Wl"]} -{"Format": "IDEA0", "ID": "056103fd-c098-4cbd-ab71-1270101c4c76", "DetectTime": "2023-10-30T14:02:25.765823+02:00", "EventTime": "2023-10-30T14:02:25.765841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CvRUrO2QDOFvU5bsNe"]} -{"Format": "IDEA0", "ID": "3fa3d07a-ac96-4316-ba11-851bbd53aaa2", "DetectTime": "2023-10-30T14:02:25.794881+02:00", "EventTime": "2023-10-30T14:02:25.794898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.224.17 ", "ContentType": "text/plain"}], "uids": ["C6KMFP2Lh4eKXGiStd"]} -{"Format": "IDEA0", "ID": "d6b1d64f-a795-42df-b997-6acfd0a3c755", "DetectTime": "2023-10-30T14:02:25.823350+02:00", "EventTime": "2023-10-30T14:02:25.823372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.144.13.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.144.13.22 ", "ContentType": "text/plain"}], "uids": ["CunDnU11khlnnEOfP2"]} -{"Format": "IDEA0", "ID": "ae847397-e5ac-4ebd-abc9-968ed92dff08", "DetectTime": "2023-10-30T14:02:25.850525+02:00", "EventTime": "2023-10-30T14:02:25.850536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CH670C35cQmWeerd5a"]} -{"Format": "IDEA0", "ID": "d7ec1aff-6341-445c-98d6-db113ca73485", "DetectTime": "2023-10-30T14:02:25.874571+02:00", "EventTime": "2023-10-30T14:02:25.874594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CM16rN2xCHVDLk6qUh", "Chuygr2FACOMbE5G5j", "CYwql41NDz9g9RZJ52", "CWmwY719YKq4jkN7ze"]} -{"Format": "IDEA0", "ID": "5d43f5b4-e9e7-4593-8b7c-21d4b9f6bb79", "DetectTime": "2023-10-30T14:02:25.890192+02:00", "EventTime": "2023-10-30T14:02:25.890211+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.231.62.73 from 10.0.2.19. blacklisted IP AS: KOBA-AS Polish ISP, PL AS3452 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CU6KLE1u7iNpwEYvh1"]} -{"Format": "IDEA0", "ID": "cdd29109-e896-43e9-9f07-3d3642db5ec5", "DetectTime": "2023-10-30T14:02:25.946277+02:00", "EventTime": "2023-10-30T14:02:25.946295+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CM16rN2xCHVDLk6qUh"]} -{"Format": "IDEA0", "ID": "9d00f5f8-30a8-47c2-a40d-abc15fb00726", "DetectTime": "2023-10-30T14:02:25.960346+02:00", "EventTime": "2023-10-30T14:02:25.960396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CGHGaK2aCZlwt4Q1g9"]} -{"Format": "IDEA0", "ID": "697508a8-163b-42ab-bfb2-eaf2ab75f36e", "DetectTime": "2023-10-30T14:02:25.987386+02:00", "EventTime": "2023-10-30T14:02:25.987399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cra4S9cXtkh8cFVFl"]} -{"Format": "IDEA0", "ID": "a764c63c-da33-4fb6-993c-1a828f647f00", "DetectTime": "2023-10-30T14:02:26.011804+02:00", "EventTime": "2023-10-30T14:02:26.011825+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClLnJF2FMYOCEUljGb"]} -{"Format": "IDEA0", "ID": "dcac8eab-065e-4164-b071-d85569535a73", "DetectTime": "2023-10-30T14:02:26.026867+02:00", "EventTime": "2023-10-30T14:02:26.026888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CsbB402pHfS0NiNtp8"]} -{"Format": "IDEA0", "ID": "42960404-c96b-41b1-9c2c-68dc05f76492", "DetectTime": "2023-10-30T14:02:26.050243+02:00", "EventTime": "2023-10-30T14:02:26.050265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CA2pYi1pUSb78PUi94"]} -{"Format": "IDEA0", "ID": "56ecb420-29f2-4be1-b29f-710610f633a6", "DetectTime": "2023-10-30T14:02:26.077455+02:00", "EventTime": "2023-10-30T14:02:26.077475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["ClErlG3RLGiMBeLmZ6"]} -{"Format": "IDEA0", "ID": "f26440b2-fac2-4645-9f6f-6e7fd9f68ad5", "DetectTime": "2023-10-30T14:02:26.106921+02:00", "EventTime": "2023-10-30T14:02:26.106942+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C08xqt31ggDMnrwAch"]} -{"Format": "IDEA0", "ID": "bd8e1334-5d39-42a3-a3d7-767a6d40a199", "DetectTime": "2023-10-30T14:02:26.122407+02:00", "EventTime": "2023-10-30T14:02:26.122420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CYgwne3iiyfsiP8iWi"]} -{"Format": "IDEA0", "ID": "6d847185-c26e-40cf-a57f-88e6675a5ceb", "DetectTime": "2023-10-30T14:02:26.145191+02:00", "EventTime": "2023-10-30T14:02:26.145219+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5v4Ja3ES3arCKJAIb"]} -{"Format": "IDEA0", "ID": "ef58ba0a-3ee6-40e1-8cc7-8261e22814b5", "DetectTime": "2023-10-30T14:02:26.159199+02:00", "EventTime": "2023-10-30T14:02:26.159220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C3yr9I3PjifCIUBxM1"]} -{"Format": "IDEA0", "ID": "d4f8d4e6-e709-43d9-a2d3-becec73bc0b8", "DetectTime": "2023-10-30T14:02:26.182847+02:00", "EventTime": "2023-10-30T14:02:26.182870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CpbOsi3tu7idb5DyX5"]} -{"Format": "IDEA0", "ID": "9cb1a6bc-c7f2-4073-9d0b-7584e63f0c40", "DetectTime": "2023-10-30T14:02:26.212657+02:00", "EventTime": "2023-10-30T14:02:26.212769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CzWjpP1g0wlDzPFWRe"]} -{"Format": "IDEA0", "ID": "947990aa-3e1d-4c11-8ffd-a524fefe9e55", "DetectTime": "2023-10-30T14:02:26.236001+02:00", "EventTime": "2023-10-30T14:02:26.236016+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkRa2C4i9oz0AfFwAf"]} -{"Format": "IDEA0", "ID": "ff2c1f58-d361-44e4-831c-8e8cea043d64", "DetectTime": "2023-10-30T14:02:26.254142+02:00", "EventTime": "2023-10-30T14:02:26.254155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.123.111 ", "ContentType": "text/plain"}], "uids": ["CFFF5S2uZixlKYedsg"]} -{"Format": "IDEA0", "ID": "ce59789d-f84d-4636-b8f9-98059b4d55ad", "DetectTime": "2023-10-30T14:02:26.280221+02:00", "EventTime": "2023-10-30T14:02:26.280279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["Cr6IPj19rOxJvvIKu5"]} -{"Format": "IDEA0", "ID": "19f18e22-3733-4591-9839-807e69764d5d", "DetectTime": "2023-10-30T14:02:26.301391+02:00", "EventTime": "2023-10-30T14:02:26.301409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["Ckalzx2z5iIaRYUiA4"]} -{"Format": "IDEA0", "ID": "2ec2b9e2-97ae-450d-ab7f-dfa391cd6b33", "DetectTime": "2023-10-30T14:02:26.325571+02:00", "EventTime": "2023-10-30T14:02:26.325595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C0soH94pYSSGTHWuJj"]} -{"Format": "IDEA0", "ID": "f2f306f8-a331-407e-be57-14a623f10cf8", "DetectTime": "2023-10-30T14:02:26.348699+02:00", "EventTime": "2023-10-30T14:02:26.348726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CSza6c4pGVzuYeAWG8"]} -{"Format": "IDEA0", "ID": "14dfbc1e-b11f-494e-91cf-e1853f740832", "DetectTime": "2023-10-30T14:02:26.377200+02:00", "EventTime": "2023-10-30T14:02:26.377217+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUUwtZ2PByU8Qfqpf5"]} -{"Format": "IDEA0", "ID": "4ae0b8f0-7b40-48ec-b86c-56b874bad7ec", "DetectTime": "2023-10-30T14:02:26.391886+02:00", "EventTime": "2023-10-30T14:02:26.391906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.164.5.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.164.5.210 ", "ContentType": "text/plain"}], "uids": ["C3f8hWpA3loEzVlIl"]} -{"Format": "IDEA0", "ID": "2e89cbaf-3534-415e-afc0-fae95ffb4dd9", "DetectTime": "2023-10-30T14:02:26.416835+02:00", "EventTime": "2023-10-30T14:02:26.416850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CPcLx92k2ifShs6MXj"]} -{"Format": "IDEA0", "ID": "b314e0fb-2052-4fae-86b3-c45f8efc7d26", "DetectTime": "2023-10-30T14:02:26.445230+02:00", "EventTime": "2023-10-30T14:02:26.445259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C4fBxOaOgkMUMicW5"]} -{"Format": "IDEA0", "ID": "5cedafd4-9cbb-4019-975e-b21eb2a149e7", "DetectTime": "2023-10-30T14:02:26.467117+02:00", "EventTime": "2023-10-30T14:02:26.467139+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbF2cz2CEPbIFVMnh8"]} -{"Format": "IDEA0", "ID": "02ffb51a-ddc7-4d09-b61c-07f029a79bd3", "DetectTime": "2023-10-30T14:02:26.482342+02:00", "EventTime": "2023-10-30T14:02:26.482360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["C44dYT3C5OjQPklMB"]} -{"Format": "IDEA0", "ID": "f3b157e3-2c5c-4810-a8ec-c0e6fdd46712", "DetectTime": "2023-10-30T14:02:26.504886+02:00", "EventTime": "2023-10-30T14:02:26.504904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CYU1Wc4cUdS8mhq3ah"]} -{"Format": "IDEA0", "ID": "8a9b6965-61d4-4026-bfba-b9cac76c8b0f", "DetectTime": "2023-10-30T14:02:26.528327+02:00", "EventTime": "2023-10-30T14:02:26.528347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CafxK18piS5L25gW6"]} -{"Format": "IDEA0", "ID": "cf3657ec-8fa9-4080-b65f-a40caa6da967", "DetectTime": "2023-10-30T14:02:26.549643+02:00", "EventTime": "2023-10-30T14:02:26.549661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.123.111 ", "ContentType": "text/plain"}], "uids": ["C2Nc29Acxveq81375"]} -{"Format": "IDEA0", "ID": "9e3fc1cb-9488-4d1a-add6-01a5be28b085", "DetectTime": "2023-10-30T14:02:26.571460+02:00", "EventTime": "2023-10-30T14:02:26.571557+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLnrAyqOGu8k1N3ik"]} -{"Format": "IDEA0", "ID": "8fd73c4e-96a1-4073-9c8b-5bb4a3c53f47", "DetectTime": "2023-10-30T14:02:26.587636+02:00", "EventTime": "2023-10-30T14:02:26.587658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CjgiFBXxy5TE7XXcg"]} -{"Format": "IDEA0", "ID": "34b15d26-bdb1-4299-8331-2df2af820689", "DetectTime": "2023-10-30T14:02:26.616534+02:00", "EventTime": "2023-10-30T14:02:26.616551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CbF2cz2CEPbIFVMnh8", "CkRa2C4i9oz0AfFwAf", "C08xqt31ggDMnrwAch", "CvAt411ynyz36x1X3g"]} -{"Format": "IDEA0", "ID": "abad49e2-ab44-47af-854f-20930ca3acf2", "DetectTime": "2023-10-30T14:02:26.632078+02:00", "EventTime": "2023-10-30T14:02:26.632098+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvAt411ynyz36x1X3g"]} -{"Format": "IDEA0", "ID": "ea6672f4-9e41-4f4b-957c-0a1b24615af4", "DetectTime": "2023-10-30T14:02:26.647490+02:00", "EventTime": "2023-10-30T14:02:26.647509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CrLje04BuzvsBnvFd7"]} -{"Format": "IDEA0", "ID": "2ecaf1b7-17ae-4265-aec5-5f6bf471331b", "DetectTime": "2023-10-30T14:02:26.670021+02:00", "EventTime": "2023-10-30T14:02:26.670042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CIW4ZV3EYaJInfXb3j"]} -{"Format": "IDEA0", "ID": "ac03e8b6-f875-434d-ad51-5777a241abdf", "DetectTime": "2023-10-30T14:02:26.690735+02:00", "EventTime": "2023-10-30T14:02:26.690753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CAqbeA0jfa80D0MC6"]} -{"Format": "IDEA0", "ID": "7a3d7c41-f0e2-4cfa-8865-a1de40673852", "DetectTime": "2023-10-30T14:02:26.716926+02:00", "EventTime": "2023-10-30T14:02:26.716947+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMkBQxlcoPLxemvLb"]} -{"Format": "IDEA0", "ID": "3005dafa-d634-4783-a41e-11e2600feb2e", "DetectTime": "2023-10-30T14:02:26.733493+02:00", "EventTime": "2023-10-30T14:02:26.733523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CM8Pj04U60Xj5JWe8l"]} -{"Format": "IDEA0", "ID": "a1278d89-c7f0-4e6d-9108-30f6f014c536", "DetectTime": "2023-10-30T14:02:26.755648+02:00", "EventTime": "2023-10-30T14:02:26.755672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CygHVM4LOzSQpuNyg"]} -{"Format": "IDEA0", "ID": "bc701ce5-db2a-4f9a-8392-c8db8da3105d", "DetectTime": "2023-10-30T14:02:26.778393+02:00", "EventTime": "2023-10-30T14:02:26.778417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.224.17 ", "ContentType": "text/plain"}], "uids": ["CweJjD4YYYpQIuzUyi"]} -{"Format": "IDEA0", "ID": "167ac5b1-c316-4cad-b09e-24852a6811bd", "DetectTime": "2023-10-30T14:02:26.801021+02:00", "EventTime": "2023-10-30T14:02:26.801048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["Ce0SQv1QMWUnnGXs13"]} -{"Format": "IDEA0", "ID": "19b91f71-c259-42c7-9322-95f9ab83b5b5", "DetectTime": "2023-10-30T14:02:26.822892+02:00", "EventTime": "2023-10-30T14:02:26.822911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["ClOvcb1FpxEycQpeV7"]} -{"Format": "IDEA0", "ID": "b417e728-b445-4163-957d-b157eefddf5c", "DetectTime": "2023-10-30T14:02:26.844745+02:00", "EventTime": "2023-10-30T14:02:26.844762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CDQX3T1Jlwrl4HdPk2"]} -{"Format": "IDEA0", "ID": "9f977210-60ba-4a41-9d6b-088473706a9a", "DetectTime": "2023-10-30T14:02:26.867194+02:00", "EventTime": "2023-10-30T14:02:26.867211+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMpiVMeihBr4FRZh8"]} -{"Format": "IDEA0", "ID": "08317cad-d65b-47f1-8fe6-1ff33b40c1f2", "DetectTime": "2023-10-30T14:02:26.882555+02:00", "EventTime": "2023-10-30T14:02:26.882573+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ckuk1t3CKniZJzFz99"]} -{"Format": "IDEA0", "ID": "dc6d0517-4ae7-4bc1-8458-a4cf9492f8af", "DetectTime": "2023-10-30T14:02:26.897681+02:00", "EventTime": "2023-10-30T14:02:26.897710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CrPSdb11l89piG0Cgb"]} -{"Format": "IDEA0", "ID": "f1414756-3f09-4d94-a977-3ca1b02836d6", "DetectTime": "2023-10-30T14:02:26.920496+02:00", "EventTime": "2023-10-30T14:02:26.920520+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcwkCAjnNQDf61U42"]} -{"Format": "IDEA0", "ID": "86fbf7d1-f062-4d45-a742-0fbed7e0352d", "DetectTime": "2023-10-30T14:02:26.936384+02:00", "EventTime": "2023-10-30T14:02:26.936401+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cj3R9B4KAaLcg5Po7k"]} -{"Format": "IDEA0", "ID": "40672d12-db48-4ccf-baa2-bde3a851b283", "DetectTime": "2023-10-30T14:02:26.952006+02:00", "EventTime": "2023-10-30T14:02:26.952030+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWEQv34JbltZwiMWej"]} -{"Format": "IDEA0", "ID": "2b43e081-4885-4780-b906-b7074b045213", "DetectTime": "2023-10-30T14:02:26.967367+02:00", "EventTime": "2023-10-30T14:02:26.967391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CL2KXE1WxkVYWU2Mp1"]} -{"Format": "IDEA0", "ID": "845d10c8-37bf-48bc-ae4d-29cb2addff6a", "DetectTime": "2023-10-30T14:02:26.994937+02:00", "EventTime": "2023-10-30T14:02:26.994963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CHc6MS3kUiXgLh4s31"]} -{"Format": "IDEA0", "ID": "621ba74d-0676-457d-856f-35e28d00ae7e", "DetectTime": "2023-10-30T14:02:27.016553+02:00", "EventTime": "2023-10-30T14:02:27.016571+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfMxwF4ICOzNWrFeu4"]} -{"Format": "IDEA0", "ID": "35bd317e-517c-4668-bc3c-48a09baa1226", "DetectTime": "2023-10-30T14:02:27.030697+02:00", "EventTime": "2023-10-30T14:02:27.030715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CzFbAb1a1PKLihPeIc"]} -{"Format": "IDEA0", "ID": "bb91a121-d75a-4d42-afb6-179135611063", "DetectTime": "2023-10-30T14:02:27.056415+02:00", "EventTime": "2023-10-30T14:02:27.056430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CMWnlQ1m0hjYARyhnj"]} -{"Format": "IDEA0", "ID": "712199cf-2217-4268-bd6e-b46f2fd49109", "DetectTime": "2023-10-30T14:02:27.085529+02:00", "EventTime": "2023-10-30T14:02:27.085548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CH5Xzf25EqcCI6IwR9"]} -{"Format": "IDEA0", "ID": "50fed50a-6eb3-4f31-9442-1e3acf85b5c1", "DetectTime": "2023-10-30T14:02:27.142202+02:00", "EventTime": "2023-10-30T14:02:27.142224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CNTjwD2bf6KXp5qoYl"]} -{"Format": "IDEA0", "ID": "3e33bccb-2ed0-406c-95b6-c43ca66dd5ad", "DetectTime": "2023-10-30T14:02:27.169488+02:00", "EventTime": "2023-10-30T14:02:27.169513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZEW4kTCuhL2hJ319"]} -{"Format": "IDEA0", "ID": "4dc5a0c2-12ba-4c6d-9136-977ca4a2dc15", "DetectTime": "2023-10-30T14:02:27.189837+02:00", "EventTime": "2023-10-30T14:02:27.189858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["C3kUOZxI1g15pqwf"]} -{"Format": "IDEA0", "ID": "bccf094c-0f76-48ae-8bc4-2b2cf77f58a7", "DetectTime": "2023-10-30T14:02:27.216464+02:00", "EventTime": "2023-10-30T14:02:27.216481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C6QL321xIjhxACwCs6"]} -{"Format": "IDEA0", "ID": "b7c31754-9c13-46ff-8fd3-2fc7c421b4f2", "DetectTime": "2023-10-30T14:02:27.242046+02:00", "EventTime": "2023-10-30T14:02:27.242072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CprUgX3ItGzCWfj0qd", "CMpiVMeihBr4FRZh8", "CcwkCAjnNQDf61U42", "CWEQv34JbltZwiMWej"]} -{"Format": "IDEA0", "ID": "fd574a73-2291-4838-8f0e-9c373b25ddbe", "DetectTime": "2023-10-30T14:02:27.253060+02:00", "EventTime": "2023-10-30T14:02:27.253083+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CprUgX3ItGzCWfj0qd"]} -{"Format": "IDEA0", "ID": "758b7243-1414-408a-85c4-07406b41b5f8", "DetectTime": "2023-10-30T14:02:27.262308+02:00", "EventTime": "2023-10-30T14:02:27.262326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CNlDqNIFAup9fc2q4"]} -{"Format": "IDEA0", "ID": "a6b22397-f210-4de3-8ad0-5b3f8d266627", "DetectTime": "2023-10-30T14:02:27.289951+02:00", "EventTime": "2023-10-30T14:02:27.289973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CjDMrzlYjF0c2THRh"]} -{"Format": "IDEA0", "ID": "27693eba-2ab6-403e-9dc6-df5b07b87838", "DetectTime": "2023-10-30T14:02:27.316394+02:00", "EventTime": "2023-10-30T14:02:27.316411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.224.17 ", "ContentType": "text/plain"}], "uids": ["Cc5pUh2A2jF9BBqn85"]} -{"Format": "IDEA0", "ID": "c3d1dcb3-8f9d-47a7-895d-3ed0379ca71f", "DetectTime": "2023-10-30T14:02:27.343013+02:00", "EventTime": "2023-10-30T14:02:27.343033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CIR7EezCaF3WlFYw1"]} -{"Format": "IDEA0", "ID": "070d1a6a-3b93-41d1-986e-47dbbe629835", "DetectTime": "2023-10-30T14:02:27.372578+02:00", "EventTime": "2023-10-30T14:02:27.372598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CJqOD630RfjfoN2bRk"]} -{"Format": "IDEA0", "ID": "80db7c2a-174e-4aa1-a828-41bb5abda3da", "DetectTime": "2023-10-30T14:02:27.399540+02:00", "EventTime": "2023-10-30T14:02:27.399555+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuFdSE1aembVdUTWM6"]} -{"Format": "IDEA0", "ID": "3766947a-9700-4376-8d58-e4c919824dab", "DetectTime": "2023-10-30T14:02:27.408553+02:00", "EventTime": "2023-10-30T14:02:27.408576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CylIO83pTKGmM1CmB"]} -{"Format": "IDEA0", "ID": "6c7f9fb8-06e1-41d8-9ae6-a506e3a9c647", "DetectTime": "2023-10-30T14:02:27.431398+02:00", "EventTime": "2023-10-30T14:02:27.431419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CvFP8E4hs51X17WkGl"]} -{"Format": "IDEA0", "ID": "ee602251-1295-4a05-bc02-ff67b7757e10", "DetectTime": "2023-10-30T14:02:27.460709+02:00", "EventTime": "2023-10-30T14:02:27.460736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CYsiOV1MVUhjkPkUt1"]} -{"Format": "IDEA0", "ID": "b37767ea-a466-499f-8ca6-88278dd4e33f", "DetectTime": "2023-10-30T14:02:27.486393+02:00", "EventTime": "2023-10-30T14:02:27.486406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Czm8jZ3de6ZAuuSAmk"]} -{"Format": "IDEA0", "ID": "636bda5f-2f2b-4dba-af32-5244897d0123", "DetectTime": "2023-10-30T14:02:27.516381+02:00", "EventTime": "2023-10-30T14:02:27.516402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["ClEyAr2DPpkA5LiI2g"]} -{"Format": "IDEA0", "ID": "fdf4a07d-f941-4a51-8bf3-0892230a9e08", "DetectTime": "2023-10-30T14:02:27.544365+02:00", "EventTime": "2023-10-30T14:02:27.544383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["C6i5OB279Yza4IIq5"]} -{"Format": "IDEA0", "ID": "1fe48932-bd1d-4bd4-9b8a-352001884159", "DetectTime": "2023-10-30T14:02:27.571083+02:00", "EventTime": "2023-10-30T14:02:27.571098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CkficUXCOOj58MlJb"]} -{"Format": "IDEA0", "ID": "b492ea79-7728-4de9-b805-325ea208e62c", "DetectTime": "2023-10-30T14:02:27.599098+02:00", "EventTime": "2023-10-30T14:02:27.599116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CffHr03qjfge4AAGZb"]} -{"Format": "IDEA0", "ID": "fdf89289-868a-41e9-91f6-7a359627df95", "DetectTime": "2023-10-30T14:02:27.626446+02:00", "EventTime": "2023-10-30T14:02:27.626539+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9bh4l3RifLArObuRf"]} -{"Format": "IDEA0", "ID": "02d555b2-152f-4387-b2c1-07a50aff5a35", "DetectTime": "2023-10-30T14:02:27.634885+02:00", "EventTime": "2023-10-30T14:02:27.634899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CnCBQt2Arz8XgWbKh"]} -{"Format": "IDEA0", "ID": "9d7d1595-6e10-4ad5-9268-9839db9636f6", "DetectTime": "2023-10-30T14:02:27.660927+02:00", "EventTime": "2023-10-30T14:02:27.660948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CQS7Cu1MT0KpxJMKG3"]} -{"Format": "IDEA0", "ID": "bf8b5e48-6429-4221-b2de-7899903f4bb5", "DetectTime": "2023-10-30T14:02:27.688010+02:00", "EventTime": "2023-10-30T14:02:27.688033+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvMfGT19lTjdmZOaji"]} -{"Format": "IDEA0", "ID": "bcd206b0-5b75-4075-8753-727ff55a76f7", "DetectTime": "2023-10-30T14:02:27.697403+02:00", "EventTime": "2023-10-30T14:02:27.697428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CeztVH1QFbaBUbl4Lj"]} -{"Format": "IDEA0", "ID": "f1293e53-2e49-44fb-840c-067ec23df3b7", "DetectTime": "2023-10-30T14:02:27.729471+02:00", "EventTime": "2023-10-30T14:02:27.729512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CisCqj2OZ1kyzWyrd3"]} -{"Format": "IDEA0", "ID": "d94becb0-073e-4152-86c3-4f03fe9253fc", "DetectTime": "2023-10-30T14:02:27.756282+02:00", "EventTime": "2023-10-30T14:02:27.756305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CCloC12nsnJuySQzv5"]} -{"Format": "IDEA0", "ID": "8c688116-2d85-4361-9337-cbbe3704e44a", "DetectTime": "2023-10-30T14:02:27.788801+02:00", "EventTime": "2023-10-30T14:02:27.788819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CzH5Wv4yK5BIh3Z3w"]} -{"Format": "IDEA0", "ID": "a94e4e15-3ece-4481-8e90-7199e6937f06", "DetectTime": "2023-10-30T14:02:27.818399+02:00", "EventTime": "2023-10-30T14:02:27.818412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CFQpPo3whRgrDHFBn"]} -{"Format": "IDEA0", "ID": "88911d66-dfce-4ffe-ae76-4a4bbb072413", "DetectTime": "2023-10-30T14:02:27.844512+02:00", "EventTime": "2023-10-30T14:02:27.844539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["Cxou8o3yF9cJToJC96"]} -{"Format": "IDEA0", "ID": "6b8fb50c-4df9-484f-888d-0431d35fd2ba", "DetectTime": "2023-10-30T14:02:27.868885+02:00", "EventTime": "2023-10-30T14:02:27.868909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CGgsHc2aGXieURuCCi"]} -{"Format": "IDEA0", "ID": "adf971e1-dab5-498a-b241-dae6e4f3231b", "DetectTime": "2023-10-30T14:02:27.894332+02:00", "EventTime": "2023-10-30T14:02:27.894350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C4iSqd2KvI600AHgJ2"]} -{"Format": "IDEA0", "ID": "20d4a8a8-1ae9-45b8-bedb-3782799a4cc2", "DetectTime": "2023-10-30T14:02:27.922057+02:00", "EventTime": "2023-10-30T14:02:27.922083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CpVQw73dQKnW9YNJJf"]} -{"Format": "IDEA0", "ID": "eb479c45-c2a2-47d8-9927-9a7d745f1c88", "DetectTime": "2023-10-30T14:02:27.949430+02:00", "EventTime": "2023-10-30T14:02:27.949446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CJ4Bbr30fKZYmt6OJa"]} -{"Format": "IDEA0", "ID": "8f15a1ca-30fc-4889-bb7b-f9844aff9f01", "DetectTime": "2023-10-30T14:02:27.976687+02:00", "EventTime": "2023-10-30T14:02:27.976713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CRaU5v2srp2Vj37QAe"]} -{"Format": "IDEA0", "ID": "b6291164-1db1-4ed9-8fb3-a236ffe2414d", "DetectTime": "2023-10-30T14:02:28.001138+02:00", "EventTime": "2023-10-30T14:02:28.001154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CU2qZN3OLBtdDaFVO8"]} -{"Format": "IDEA0", "ID": "c2700e80-4e8b-4cfc-8be6-0900d725db85", "DetectTime": "2023-10-30T14:02:28.029410+02:00", "EventTime": "2023-10-30T14:02:28.029431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CRk51v4pe6Ob3ebPJ3"]} -{"Format": "IDEA0", "ID": "65b850ec-098c-4682-83b6-1bc8bf200be4", "DetectTime": "2023-10-30T14:02:28.057876+02:00", "EventTime": "2023-10-30T14:02:28.057895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CCcNFd3MipqfWuI6p8"]} -{"Format": "IDEA0", "ID": "1f557804-a35e-46d7-a17c-ffc6f7bd35db", "DetectTime": "2023-10-30T14:02:28.084027+02:00", "EventTime": "2023-10-30T14:02:28.084046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CVupwc3dl60Q5RKM4f"]} -{"Format": "IDEA0", "ID": "7cc67cf1-30dc-4ade-a732-2fe42df11436", "DetectTime": "2023-10-30T14:02:28.109222+02:00", "EventTime": "2023-10-30T14:02:28.109242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C6wxYG2YU4wrtfg0u5"]} -{"Format": "IDEA0", "ID": "9cb1dc54-214c-4fee-a9bd-c2758804df84", "DetectTime": "2023-10-30T14:02:28.136716+02:00", "EventTime": "2023-10-30T14:02:28.136734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.123.111 ", "ContentType": "text/plain"}], "uids": ["CD27iT1e4aPWC48Y0b"]} -{"Format": "IDEA0", "ID": "4e22afb9-051a-4add-890b-bf4610cf56f3", "DetectTime": "2023-10-30T14:02:28.165032+02:00", "EventTime": "2023-10-30T14:02:28.165049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CP9jlr2BtYsOPT5Rml"]} -{"Format": "IDEA0", "ID": "f8c8c3e1-e83b-448c-8158-3eab544ff2a9", "DetectTime": "2023-10-30T14:02:28.193547+02:00", "EventTime": "2023-10-30T14:02:28.193567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C5Rach1VNk64KmQY6"]} -{"Format": "IDEA0", "ID": "ea2106cc-f730-4034-aab1-01073bd2dc2f", "DetectTime": "2023-10-30T14:02:28.222680+02:00", "EventTime": "2023-10-30T14:02:28.222706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CiciS32mYmaAA6BMab"]} -{"Format": "IDEA0", "ID": "a00fcaf1-bc05-473a-9218-5f9d6ce08378", "DetectTime": "2023-10-30T14:02:28.251101+02:00", "EventTime": "2023-10-30T14:02:28.251118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.190.23.202 ", "ContentType": "text/plain"}], "uids": ["CoyNbU3wOWaTtYM17"]} -{"Format": "IDEA0", "ID": "f1ba52c3-4f92-43de-a406-1f56c5d67982", "DetectTime": "2023-10-30T14:02:28.278077+02:00", "EventTime": "2023-10-30T14:02:28.278093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CIJ4Nc1bcBu1aK05id"]} -{"Format": "IDEA0", "ID": "78609c8e-3ea8-484a-bb13-d0293c252bcf", "DetectTime": "2023-10-30T14:02:28.302128+02:00", "EventTime": "2023-10-30T14:02:28.302143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CcGxqxfXNsjtQ5Akk"]} -{"Format": "IDEA0", "ID": "7cca7efb-7113-41c9-8766-439ed19a6d91", "DetectTime": "2023-10-30T14:02:28.326560+02:00", "EventTime": "2023-10-30T14:02:28.326572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CqntMu2dpIYNTJ4qx2"]} -{"Format": "IDEA0", "ID": "e28898ff-1f1c-4ed9-855d-d4adf1ed07f7", "DetectTime": "2023-10-30T14:02:28.353882+02:00", "EventTime": "2023-10-30T14:02:28.353899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CiNlBA36knNfYqggg5"]} -{"Format": "IDEA0", "ID": "1c390e4f-0b94-4757-b840-fbad0a7725cd", "DetectTime": "2023-10-30T14:02:28.382247+02:00", "EventTime": "2023-10-30T14:02:28.382432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CpXnRNs7maAQo9W9"]} -{"Format": "IDEA0", "ID": "f692873f-1bc6-485c-9173-c8838a2a18c6", "DetectTime": "2023-10-30T14:02:28.412619+02:00", "EventTime": "2023-10-30T14:02:28.412640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C7HHFB2ibxjqFPcrZc"]} -{"Format": "IDEA0", "ID": "53ae7f65-43e3-494b-ab43-bff29a0e360c", "DetectTime": "2023-10-30T14:02:28.440686+02:00", "EventTime": "2023-10-30T14:02:28.440706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C3QDwa19nQ1l1LZ062"]} -{"Format": "IDEA0", "ID": "836048a4-7ef7-41ee-a42e-703f4e467ac5", "DetectTime": "2023-10-30T14:02:28.468676+02:00", "EventTime": "2023-10-30T14:02:28.468693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["Cc8LCR1maV4MQvxvyl"]} -{"Format": "IDEA0", "ID": "3b2f6851-1eee-4790-980b-a3ecb296b768", "DetectTime": "2023-10-30T14:02:28.497313+02:00", "EventTime": "2023-10-30T14:02:28.497342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C7XEyK2zwq82awbkf"]} -{"Format": "IDEA0", "ID": "2a68ea2a-5dc8-47a1-ba95-11bb0c391b4a", "DetectTime": "2023-10-30T14:02:28.528925+02:00", "EventTime": "2023-10-30T14:02:28.528950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CqDqDK1AXaQP2glPLk"]} -{"Format": "IDEA0", "ID": "9f1264fe-0577-4af0-af81-8dfcfc8029fd", "DetectTime": "2023-10-30T14:02:28.556502+02:00", "EventTime": "2023-10-30T14:02:28.556518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C1pr8U1mDIV3CxRqSh"]} -{"Format": "IDEA0", "ID": "04aff9f1-5946-4349-80ab-7b05cd3670af", "DetectTime": "2023-10-30T14:02:28.583771+02:00", "EventTime": "2023-10-30T14:02:28.583795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJKIAa4aDMz7WRYbLi"]} -{"Format": "IDEA0", "ID": "7e6baa34-6232-4d3e-8f96-44f8eee9b498", "DetectTime": "2023-10-30T14:02:28.610176+02:00", "EventTime": "2023-10-30T14:02:28.610197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjTO8KxKFzEAdC355"]} -{"Format": "IDEA0", "ID": "543a3457-b31e-4731-aad8-c17286a7852c", "DetectTime": "2023-10-30T14:02:28.636918+02:00", "EventTime": "2023-10-30T14:02:28.636937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CwYoX91fOC0s0rqY7i"]} -{"Format": "IDEA0", "ID": "85be579a-fa4a-4126-9382-e9b33f30969e", "DetectTime": "2023-10-30T14:02:28.664555+02:00", "EventTime": "2023-10-30T14:02:28.664572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CKIKb136q6OOx2WiAi"]} -{"Format": "IDEA0", "ID": "cb6bfddd-3865-4e0e-b723-b144ab5cd7b1", "DetectTime": "2023-10-30T14:02:28.694170+02:00", "EventTime": "2023-10-30T14:02:28.694187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CcAnt41KFdmAQAKzzf"]} -{"Format": "IDEA0", "ID": "ade30909-3e00-4ae4-b803-ab201fc772c9", "DetectTime": "2023-10-30T14:02:28.720614+02:00", "EventTime": "2023-10-30T14:02:28.720636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C1Bfk1203Y1u3xZOT"]} -{"Format": "IDEA0", "ID": "a49b7300-2053-47f4-be30-8bf9cb256b14", "DetectTime": "2023-10-30T14:02:28.750275+02:00", "EventTime": "2023-10-30T14:02:28.750298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C6iMiMYeAUrEJ6Q63"]} -{"Format": "IDEA0", "ID": "221f25db-d1d2-447a-9f06-1aea9d6da88c", "DetectTime": "2023-10-30T14:02:28.777752+02:00", "EventTime": "2023-10-30T14:02:28.777774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CX5PU04xOxxF5m5Oh"]} -{"Format": "IDEA0", "ID": "e67da41e-f004-481a-a7a7-1c2f1f2c46ff", "DetectTime": "2023-10-30T14:02:28.806892+02:00", "EventTime": "2023-10-30T14:02:28.806910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.224.17 ", "ContentType": "text/plain"}], "uids": ["CrX5uA32gcLAV4gUX4"]} -{"Format": "IDEA0", "ID": "eec90539-8389-4e48-badc-a23dd4efdd98", "DetectTime": "2023-10-30T14:02:28.833501+02:00", "EventTime": "2023-10-30T14:02:28.833525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CZrBjb2yHsIhS4kb6a"]} -{"Format": "IDEA0", "ID": "75b6a105-fc38-4a4c-b29d-1aedd07b7e96", "DetectTime": "2023-10-30T14:02:28.862313+02:00", "EventTime": "2023-10-30T14:02:28.862335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CgAGNx1NqeMRzjXkO7"]} -{"Format": "IDEA0", "ID": "b7eacdb8-6dca-4d1f-b281-2bf5b14aa81f", "DetectTime": "2023-10-30T14:02:28.890160+02:00", "EventTime": "2023-10-30T14:02:28.890179+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cp4SWrFVnAFQNsa2i"]} -{"Format": "IDEA0", "ID": "2b751154-33b9-4892-a977-efe91e8b8e8e", "DetectTime": "2023-10-30T14:02:28.898270+02:00", "EventTime": "2023-10-30T14:02:28.898312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CtIztk1D0xj2GyqGk6"]} -{"Format": "IDEA0", "ID": "01e969e6-a9ad-4e0e-b507-8b6d1fc92faf", "DetectTime": "2023-10-30T14:02:28.928245+02:00", "EventTime": "2023-10-30T14:02:28.928266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CIv7g74EJoNhTyRTsd"]} -{"Format": "IDEA0", "ID": "bf107624-7f70-47fe-b4fe-96e8ac1eb83d", "DetectTime": "2023-10-30T14:02:28.955044+02:00", "EventTime": "2023-10-30T14:02:28.955064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["Cqhm4x2gmzs1M6RV21"]} -{"Format": "IDEA0", "ID": "fb495a64-c3f4-4f4b-97c3-deaadbb58572", "DetectTime": "2023-10-30T14:02:28.982206+02:00", "EventTime": "2023-10-30T14:02:28.982231+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9tFop2CH1oi6MIWa6"]} -{"Format": "IDEA0", "ID": "91526eb3-7201-478e-a6de-4adc980941d6", "DetectTime": "2023-10-30T14:02:28.989459+02:00", "EventTime": "2023-10-30T14:02:28.989483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CsNLlnnJPQNAGAsI1"]} -{"Format": "IDEA0", "ID": "c48c873b-d42c-408f-ba4b-0f5529143705", "DetectTime": "2023-10-30T14:02:29.019771+02:00", "EventTime": "2023-10-30T14:02:29.019789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["C7vcYe2pbpeedzinw1"]} -{"Format": "IDEA0", "ID": "706e9142-229e-4e67-8efc-d4472f3208f3", "DetectTime": "2023-10-30T14:02:29.048641+02:00", "EventTime": "2023-10-30T14:02:29.048658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CpzPR9Hh6wOuWqwkb"]} -{"Format": "IDEA0", "ID": "3706eafe-f715-454f-b3af-d2564d87fad9", "DetectTime": "2023-10-30T14:02:29.073337+02:00", "EventTime": "2023-10-30T14:02:29.073349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CD9dyT3LVNENmspsN8"]} -{"Format": "IDEA0", "ID": "89b09ddd-3ae1-47cc-90e7-c046745c9702", "DetectTime": "2023-10-30T14:02:29.100385+02:00", "EventTime": "2023-10-30T14:02:29.100409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CdWgOZfKsambnlmv4"]} -{"Format": "IDEA0", "ID": "5ebde38a-032b-4c0f-bac3-134bb292cb42", "DetectTime": "2023-10-30T14:02:29.132254+02:00", "EventTime": "2023-10-30T14:02:29.132274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CVLr9d2ktickTgJWDk"]} -{"Format": "IDEA0", "ID": "709b054e-0861-4338-9d27-6014873f9530", "DetectTime": "2023-10-30T14:02:29.157081+02:00", "EventTime": "2023-10-30T14:02:29.157104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CPMDMo1h7JKPEoLjJa"]} -{"Format": "IDEA0", "ID": "bc0410d4-d27a-426c-88e6-4ae818de8783", "DetectTime": "2023-10-30T14:02:29.181575+02:00", "EventTime": "2023-10-30T14:02:29.181596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CcYXhd3HorksnMysJk"]} -{"Format": "IDEA0", "ID": "b9110001-13a0-4262-9fe3-d36ecbeabfbb", "DetectTime": "2023-10-30T14:02:29.209453+02:00", "EventTime": "2023-10-30T14:02:29.209474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.123.111 ", "ContentType": "text/plain"}], "uids": ["C4IB3C2Rl1fadIm585"]} -{"Format": "IDEA0", "ID": "33694df3-600b-4497-b3ea-4e4e617f5fc5", "DetectTime": "2023-10-30T14:02:29.234141+02:00", "EventTime": "2023-10-30T14:02:29.234160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["CZZVn44IUDxKUNSCml"]} -{"Format": "IDEA0", "ID": "4bb7e7ea-0cb1-41f6-a683-784ae735a601", "DetectTime": "2023-10-30T14:02:29.264889+02:00", "EventTime": "2023-10-30T14:02:29.264906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Cv4OmV3lP7g8EQcdf9"]} -{"Format": "IDEA0", "ID": "d73313d5-fc00-4f8d-99eb-1d3b55c20581", "DetectTime": "2023-10-30T14:02:29.289340+02:00", "EventTime": "2023-10-30T14:02:29.289359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CimbGx3SosYRwu3fZ1"]} -{"Format": "IDEA0", "ID": "a989941b-67a8-456e-9e99-38feac4bbdca", "DetectTime": "2023-10-30T14:02:29.316678+02:00", "EventTime": "2023-10-30T14:02:29.316706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.72.123.111 ", "ContentType": "text/plain"}], "uids": ["CswD6v1wmsOiUJPRv9"]} -{"Format": "IDEA0", "ID": "014950fa-2d0e-4554-8654-f99a2a75efd2", "DetectTime": "2023-10-30T14:02:29.345773+02:00", "EventTime": "2023-10-30T14:02:29.345914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CdaUKu1m9X2hfBrEce"]} -{"Format": "IDEA0", "ID": "d38353fe-49bf-40a2-ba08-1bd65d74688f", "DetectTime": "2023-10-30T14:02:29.371412+02:00", "EventTime": "2023-10-30T14:02:29.371430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CE9xsh1IJH2fFRI4v6"]} -{"Format": "IDEA0", "ID": "d37fa9ab-8f02-4139-8ea6-7c809f003dac", "DetectTime": "2023-10-30T14:02:29.395877+02:00", "EventTime": "2023-10-30T14:02:29.395888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CoxOc621O4jquB8ju4"]} -{"Format": "IDEA0", "ID": "e9134064-0ed5-4704-b936-f4c71ee1616f", "DetectTime": "2023-10-30T14:02:29.421795+02:00", "EventTime": "2023-10-30T14:02:29.421817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C2hqa348REEK7Ot2S2"]} -{"Format": "IDEA0", "ID": "50ef5237-91f0-41a6-a746-dd163f0f2cef", "DetectTime": "2023-10-30T14:02:29.449659+02:00", "EventTime": "2023-10-30T14:02:29.449686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CuUyrN39znjrZHBWDl"]} -{"Format": "IDEA0", "ID": "04a2560a-93ae-4708-bf07-88042ec8d752", "DetectTime": "2023-10-30T14:02:29.482490+02:00", "EventTime": "2023-10-30T14:02:29.482511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CmfKBQ1XvfjlE9mPWg"]} -{"Format": "IDEA0", "ID": "ebdb1bb1-59a6-4da7-a74f-fe6c2436b4a9", "DetectTime": "2023-10-30T14:02:29.510556+02:00", "EventTime": "2023-10-30T14:02:29.510574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CQ2d433y3ZkPzx2rU3"]} -{"Format": "IDEA0", "ID": "458db89a-d0ee-4db2-ab2c-9aacdd0d26b9", "DetectTime": "2023-10-30T14:02:29.539578+02:00", "EventTime": "2023-10-30T14:02:29.539600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CG6nxw3xmQGRKvYPe3"]} -{"Format": "IDEA0", "ID": "d415f24a-254d-4e87-9339-69bd1b60f988", "DetectTime": "2023-10-30T14:02:29.566936+02:00", "EventTime": "2023-10-30T14:02:29.566956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CEwllN20x68rFaGF7g"]} -{"Format": "IDEA0", "ID": "4c821d82-0e53-4501-9fd5-38d2691de442", "DetectTime": "2023-10-30T14:02:29.590516+02:00", "EventTime": "2023-10-30T14:02:29.590633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CSP57F40IuYlN2Xmn8"]} -{"Format": "IDEA0", "ID": "17d94360-ef52-4808-87bf-3afd61a135e0", "DetectTime": "2023-10-30T14:02:29.615264+02:00", "EventTime": "2023-10-30T14:02:29.615284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.224.17 ", "ContentType": "text/plain"}], "uids": ["CieXHT1JAYu78UpqM7"]} -{"Format": "IDEA0", "ID": "b8dea9dc-a008-4246-8a2d-9f46d48c46c3", "DetectTime": "2023-10-30T14:02:29.643293+02:00", "EventTime": "2023-10-30T14:02:29.643310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CaD2jl1dYqL0AMKxe4"]} -{"Format": "IDEA0", "ID": "e9a01eaa-87d5-4692-b090-309c90f43657", "DetectTime": "2023-10-30T14:02:29.669807+02:00", "EventTime": "2023-10-30T14:02:29.669828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CENpXC3g1qI8Hlgofb"]} -{"Format": "IDEA0", "ID": "4bae1fd9-d513-4757-85c0-6636e7e903ef", "DetectTime": "2023-10-30T14:02:29.698600+02:00", "EventTime": "2023-10-30T14:02:29.698618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CqguU6LgBT30e0iR4"]} -{"Format": "IDEA0", "ID": "dd9eab13-cebc-41d7-a7b9-4ce439fa398e", "DetectTime": "2023-10-30T14:02:29.733437+02:00", "EventTime": "2023-10-30T14:02:29.733458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.32.176.169 ", "ContentType": "text/plain"}], "uids": ["CwxoC12VbcAy8HFsSf"]} -{"Format": "IDEA0", "ID": "677c2031-2883-4c10-9b21-94db6a999bcf", "DetectTime": "2023-10-30T14:02:29.772307+02:00", "EventTime": "2023-10-30T14:02:29.772332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CeBRY428q3zLMU9e89"]} -{"Format": "IDEA0", "ID": "0285b392-ddc6-418b-9a27-609adf6b63ab", "DetectTime": "2023-10-30T14:02:29.805219+02:00", "EventTime": "2023-10-30T14:02:29.805242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CwC29R1KqKYsnZ60xb"]} -{"Format": "IDEA0", "ID": "17e6e667-7fc0-48ce-a3df-3a2af4c2a07c", "DetectTime": "2023-10-30T14:02:29.836581+02:00", "EventTime": "2023-10-30T14:02:29.836601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CzehgA4vITjjXIHGP8"]} -{"Format": "IDEA0", "ID": "69e1c630-9c1a-4fe1-9ce0-bf11aa8c74af", "DetectTime": "2023-10-30T14:02:29.863456+02:00", "EventTime": "2023-10-30T14:02:29.863477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C73r2it2K8RV9w2Sc"]} -{"Format": "IDEA0", "ID": "6d3433af-8863-4d93-ab73-eb4008a058f6", "DetectTime": "2023-10-30T14:02:29.896994+02:00", "EventTime": "2023-10-30T14:02:29.897011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["Ceudfq4Nbs6LgDadhe"]} -{"Format": "IDEA0", "ID": "7f74adef-f4c2-4671-88af-e109fae2139e", "DetectTime": "2023-10-30T14:02:29.922978+02:00", "EventTime": "2023-10-30T14:02:29.923003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CqZykKSsWbaGCYco9"]} -{"Format": "IDEA0", "ID": "09221630-8278-4c58-92a1-0a556ee5dc54", "DetectTime": "2023-10-30T14:02:29.947143+02:00", "EventTime": "2023-10-30T14:02:29.947163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CRiKsy4dHfhjGu4UQc"]} -{"Format": "IDEA0", "ID": "96a5c554-89c4-4c0b-af66-98dc850fe1b4", "DetectTime": "2023-10-30T14:02:29.976201+02:00", "EventTime": "2023-10-30T14:02:29.976222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CPLP801vIIlcBD0zsh"]} -{"Format": "IDEA0", "ID": "5ecbabf1-b555-4db4-87c0-139176616299", "DetectTime": "2023-10-30T14:02:30.001128+02:00", "EventTime": "2023-10-30T14:02:30.001151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CMLTMbGlfYjip4JDi"]} -{"Format": "IDEA0", "ID": "da27eea7-1358-462b-9e9c-4976c6871a82", "DetectTime": "2023-10-30T14:02:30.026659+02:00", "EventTime": "2023-10-30T14:02:30.026677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CSbBDD58bC0QfQjM2"]} -{"Format": "IDEA0", "ID": "46591126-de52-4b74-bed1-aec729ce1aaa", "DetectTime": "2023-10-30T14:02:30.053706+02:00", "EventTime": "2023-10-30T14:02:30.053723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CdHwk62pcXvBtiJPO2"]} -{"Format": "IDEA0", "ID": "79cb6434-1119-4cf7-9975-c3f894dea973", "DetectTime": "2023-10-30T14:02:30.078507+02:00", "EventTime": "2023-10-30T14:02:30.078523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.190.233 ", "ContentType": "text/plain"}], "uids": ["CvqlcNVOaPmW7eis3"]} -{"Format": "IDEA0", "ID": "755b224c-0d62-4051-9810-3f8af68ca6d4", "DetectTime": "2023-10-30T14:02:30.103868+02:00", "EventTime": "2023-10-30T14:02:30.103885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["ClKBCs2WceVbShlLX6"]} -{"Format": "IDEA0", "ID": "77ae2723-5cf5-40c3-9893-0111f6f2361e", "DetectTime": "2023-10-30T14:02:30.128440+02:00", "EventTime": "2023-10-30T14:02:30.128458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CDT20q1gLgoTZNnnUf"]} -{"Format": "IDEA0", "ID": "68994134-b9f4-4c1e-8bee-3db3830a61b7", "DetectTime": "2023-10-30T14:02:30.153082+02:00", "EventTime": "2023-10-30T14:02:30.153101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CEtJk2pz3OyVENLj8"]} -{"Format": "IDEA0", "ID": "67432427-b52a-405a-be64-67a62d1c9c4c", "DetectTime": "2023-10-30T14:02:30.180729+02:00", "EventTime": "2023-10-30T14:02:30.180746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cg2Xcw3mZJICWMKeWg"]} -{"Format": "IDEA0", "ID": "1be89e85-1c41-49a2-8b98-1719bf42ba89", "DetectTime": "2023-10-30T14:02:30.206030+02:00", "EventTime": "2023-10-30T14:02:30.206046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CFYG663PDDQlUrcYoj"]} -{"Format": "IDEA0", "ID": "8e2d4b2c-210a-439b-b759-68a45f8d5f4b", "DetectTime": "2023-10-30T14:02:30.233743+02:00", "EventTime": "2023-10-30T14:02:30.233766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["Cijjd335QmcNK4aG8i"]} -{"Format": "IDEA0", "ID": "44827529-72a3-492a-8708-656f2a3927a3", "DetectTime": "2023-10-30T14:02:30.261697+02:00", "EventTime": "2023-10-30T14:02:30.261724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CGBBEg3no2PBNRyIhh"]} -{"Format": "IDEA0", "ID": "839db440-862d-4b56-8c34-0efabce6af6c", "DetectTime": "2023-10-30T14:02:30.294119+02:00", "EventTime": "2023-10-30T14:02:30.294137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["CnGqvd47LvbuZSikG1"]} -{"Format": "IDEA0", "ID": "1063d432-87d1-4034-98d4-f8224e82008b", "DetectTime": "2023-10-30T14:02:30.318855+02:00", "EventTime": "2023-10-30T14:02:30.318872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.222.31.42 ", "ContentType": "text/plain"}], "uids": ["CTMxzx23PPaHalu3R7"]} -{"Format": "IDEA0", "ID": "06455045-358b-473b-9365-ad427986d641", "DetectTime": "2023-10-30T14:02:30.343086+02:00", "EventTime": "2023-10-30T14:02:30.343105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CkSo8c3d4Q65uuKA93"]} -{"Format": "IDEA0", "ID": "c7882c3b-a8f8-4f5e-b802-f2dec203fd15", "DetectTime": "2023-10-30T14:02:30.400407+02:00", "EventTime": "2023-10-30T14:02:30.400432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CbrvgV1xggnuh6shZg"]} -{"Format": "IDEA0", "ID": "c86486af-788e-4a2d-8722-309d11b4b02b", "DetectTime": "2023-10-30T14:02:30.424487+02:00", "EventTime": "2023-10-30T14:02:30.424507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["C0jxLv1jD9lILq1sQ8"]} -{"Format": "IDEA0", "ID": "8ce98765-f085-4ef0-89de-2728b9ac5246", "DetectTime": "2023-10-30T14:02:30.450093+02:00", "EventTime": "2023-10-30T14:02:30.450113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["COJSoe4cYHa12G4zk1"]} -{"Format": "IDEA0", "ID": "337c0dce-34bc-42c4-bc2f-b78eab7c6501", "DetectTime": "2023-10-30T14:02:30.475651+02:00", "EventTime": "2023-10-30T14:02:30.475688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["Ck9tFlXqc1ZyGyi81"]} -{"Format": "IDEA0", "ID": "e5254c0c-c946-480b-a078-620c1d2efae8", "DetectTime": "2023-10-30T14:02:30.501759+02:00", "EventTime": "2023-10-30T14:02:30.501774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRpijiZp51vGyu5ij"]} -{"Format": "IDEA0", "ID": "1d709405-6f44-4c17-92b6-df794433709a", "DetectTime": "2023-10-30T14:02:30.529745+02:00", "EventTime": "2023-10-30T14:02:30.529764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["Ccyujy2isnO6iLYiRh"]} -{"Format": "IDEA0", "ID": "1504d304-00b9-43d7-8b01-3ced7e67ad3f", "DetectTime": "2023-10-30T14:02:30.554377+02:00", "EventTime": "2023-10-30T14:02:30.554390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["Ckrwgj2jXDWCf4qbqf"]} -{"Format": "IDEA0", "ID": "6e1f7566-df90-4805-a1bb-7d0ff17ca8d3", "DetectTime": "2023-10-30T14:02:30.580486+02:00", "EventTime": "2023-10-30T14:02:30.580503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CB2NpW2MTqUSa4ehLk"]} -{"Format": "IDEA0", "ID": "0d6d4e08-3ab7-4c10-85ec-bf32487004b7", "DetectTime": "2023-10-30T14:02:30.606741+02:00", "EventTime": "2023-10-30T14:02:30.606762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CmUgzR3ywORBAGdNwl"]} -{"Format": "IDEA0", "ID": "89191dd4-0df4-4815-b7f6-608eda68a236", "DetectTime": "2023-10-30T14:02:30.634741+02:00", "EventTime": "2023-10-30T14:02:30.634764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CPBhqS1MeHLwVeNBz2"]} -{"Format": "IDEA0", "ID": "aaf5e242-2fe0-478c-8d23-c7603c337b7b", "DetectTime": "2023-10-30T14:02:30.663761+02:00", "EventTime": "2023-10-30T14:02:30.663778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CodTR5hQiQbxSf6i2"]} -{"Format": "IDEA0", "ID": "d00c64c2-3505-4bde-8dfc-bba143f6f442", "DetectTime": "2023-10-30T14:02:30.693307+02:00", "EventTime": "2023-10-30T14:02:30.693337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CKsfHd1fRdsCAGr0Ha"]} -{"Format": "IDEA0", "ID": "e952a423-cb46-4bb8-aae5-22fde8abeb7c", "DetectTime": "2023-10-30T14:02:30.721964+02:00", "EventTime": "2023-10-30T14:02:30.721985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CvelMd2eGiab4gYEb4"]} -{"Format": "IDEA0", "ID": "707106a7-bf6a-4c3e-aeb2-11d26880ec91", "DetectTime": "2023-10-30T14:02:30.749264+02:00", "EventTime": "2023-10-30T14:02:30.749281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CjoSnKmDz4yVu5gr2"]} -{"Format": "IDEA0", "ID": "9d190870-fa1a-42e9-b760-c38bba2b476d", "DetectTime": "2023-10-30T14:02:30.775466+02:00", "EventTime": "2023-10-30T14:02:30.775487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CMiCxj2886irmrQzyk"]} -{"Format": "IDEA0", "ID": "055cde50-f67a-4df9-8032-541db7c4d1fe", "DetectTime": "2023-10-30T14:02:30.802438+02:00", "EventTime": "2023-10-30T14:02:30.802457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C85xuD4gcedI32F9t5"]} -{"Format": "IDEA0", "ID": "b818b20d-1b67-4f0b-9534-45ee7ee8245e", "DetectTime": "2023-10-30T14:02:30.829799+02:00", "EventTime": "2023-10-30T14:02:30.829822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CETGf92YS0CC0NIn8g"]} -{"Format": "IDEA0", "ID": "6ae4580d-1c49-4e62-8979-bbf2ce5f87cf", "DetectTime": "2023-10-30T14:02:30.854617+02:00", "EventTime": "2023-10-30T14:02:30.854643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CcWwrK3b3gX4MPyZ6i"]} -{"Format": "IDEA0", "ID": "37e48187-076a-46aa-9f2c-6cf6c1989588", "DetectTime": "2023-10-30T14:02:30.880246+02:00", "EventTime": "2023-10-30T14:02:30.880264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CDhE9A2LvRBI5p2Bv"]} -{"Format": "IDEA0", "ID": "449e8ab6-4802-4d07-8ddd-9c0ac718a24e", "DetectTime": "2023-10-30T14:02:30.905209+02:00", "EventTime": "2023-10-30T14:02:30.905222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CxUf1h4R64arGfhZr2"]} -{"Format": "IDEA0", "ID": "7322740d-229f-49a7-843b-5ecb94e9c00c", "DetectTime": "2023-10-30T14:02:30.929154+02:00", "EventTime": "2023-10-30T14:02:30.929171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CWpB4736Bb391z5M7"]} -{"Format": "IDEA0", "ID": "89b9fb89-4818-4462-b6f2-e7fc627a6b83", "DetectTime": "2023-10-30T14:02:30.960465+02:00", "EventTime": "2023-10-30T14:02:30.960489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CrQdIJ3dQeyIH7Imz"]} -{"Format": "IDEA0", "ID": "86658938-dcd6-4f1a-8bd8-68dfd1f1e380", "DetectTime": "2023-10-30T14:02:30.989531+02:00", "EventTime": "2023-10-30T14:02:30.989554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CWOpTF3k5DoDniOt2a"]} -{"Format": "IDEA0", "ID": "a48acfb3-a4d9-46e7-a894-2c62bebefd93", "DetectTime": "2023-10-30T14:02:31.016340+02:00", "EventTime": "2023-10-30T14:02:31.016357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CoYVZd2EHFRNwQz5Eg"]} -{"Format": "IDEA0", "ID": "517b9de1-f09a-483b-91b4-94c42225f0d4", "DetectTime": "2023-10-30T14:02:31.044777+02:00", "EventTime": "2023-10-30T14:02:31.044804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cl9mnp1EmweiCzd0tb"]} -{"Format": "IDEA0", "ID": "dfb350da-5b3c-4d7f-855d-58db2ec6cbed", "DetectTime": "2023-10-30T14:02:31.072261+02:00", "EventTime": "2023-10-30T14:02:31.072290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CIn0Wd4nlGU6M3RxU7"]} -{"Format": "IDEA0", "ID": "0a0d7ff2-dd23-49b0-8c43-f5d7babf6f69", "DetectTime": "2023-10-30T14:02:31.097461+02:00", "EventTime": "2023-10-30T14:02:31.097483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CdXIVB1DCCinZFpcFg"]} -{"Format": "IDEA0", "ID": "85f626c8-df1f-4c1b-a15b-917e9e1f8280", "DetectTime": "2023-10-30T14:02:31.157828+02:00", "EventTime": "2023-10-30T14:02:31.157852+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLaP6R1pqkM1V6Fr0i"]} -{"Format": "IDEA0", "ID": "47494d35-f52c-4f0e-933b-3ad47341ef40", "DetectTime": "2023-10-30T14:02:31.170693+02:00", "EventTime": "2023-10-30T14:02:31.170719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CviEST3Szm2v3imCd4"]} -{"Format": "IDEA0", "ID": "5600bb28-114c-48cc-850b-6832a3b666bc", "DetectTime": "2023-10-30T14:02:31.197591+02:00", "EventTime": "2023-10-30T14:02:31.197609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CHT9hH2FOr1A3rWV56"]} -{"Format": "IDEA0", "ID": "477704db-4312-4363-a436-778f5222178d", "DetectTime": "2023-10-30T14:02:31.222437+02:00", "EventTime": "2023-10-30T14:02:31.222459+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0ocCz4n3oJWjeTWCh"]} -{"Format": "IDEA0", "ID": "fdf31ec3-2d22-467d-8b12-072164ce7724", "DetectTime": "2023-10-30T14:02:31.234281+02:00", "EventTime": "2023-10-30T14:02:31.234299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CERXxe4N3ET6LGRP3d"]} -{"Format": "IDEA0", "ID": "f39d508c-6bf9-483b-a052-68bfd5f44112", "DetectTime": "2023-10-30T14:02:31.259806+02:00", "EventTime": "2023-10-30T14:02:31.259819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CsrNFYKEt8lYJsNG5"]} -{"Format": "IDEA0", "ID": "90704abb-1a48-4215-a6c4-0dd5a92018d3", "DetectTime": "2023-10-30T14:02:31.286806+02:00", "EventTime": "2023-10-30T14:02:31.286825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CgfYQl1gLrGeVqgfzj"]} -{"Format": "IDEA0", "ID": "ef30592d-42be-4c5e-b719-8a6b2ed64df8", "DetectTime": "2023-10-30T14:02:31.311530+02:00", "EventTime": "2023-10-30T14:02:31.311553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["C308KKAuucpAuw7Cf"]} -{"Format": "IDEA0", "ID": "86efdaf8-5070-4911-8fdc-bc34b3e2077e", "DetectTime": "2023-10-30T14:02:31.336810+02:00", "EventTime": "2023-10-30T14:02:31.336823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CPqpVM13wnoS6sazg7"]} -{"Format": "IDEA0", "ID": "203540ee-e5cb-4852-be52-1aaffe499f93", "DetectTime": "2023-10-30T14:02:31.398375+02:00", "EventTime": "2023-10-30T14:02:31.398401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C7hf482igHQP1ByTA4", "Cp4SWrFVnAFQNsa2i", "C9bh4l3RifLArObuRf", "CLaP6R1pqkM1V6Fr0i"]} -{"Format": "IDEA0", "ID": "3d4a9a2e-6a8d-4d05-b850-33536b424700", "DetectTime": "2023-10-30T14:02:31.410635+02:00", "EventTime": "2023-10-30T14:02:31.410656+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7hf482igHQP1ByTA4"]} -{"Format": "IDEA0", "ID": "d75da00e-834b-4cbd-8a59-deb3ce069ea0", "DetectTime": "2023-10-30T14:02:31.422714+02:00", "EventTime": "2023-10-30T14:02:31.422741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CaNRbf2VIZ3jzqhTs3"]} -{"Format": "IDEA0", "ID": "f090feba-04ca-47ea-a672-c4bab45a544f", "DetectTime": "2023-10-30T14:02:31.448502+02:00", "EventTime": "2023-10-30T14:02:31.448521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CPJLD41hSb1ZgXm8ye"]} -{"Format": "IDEA0", "ID": "79491d36-9eef-40bd-a89a-021e05556192", "DetectTime": "2023-10-30T14:02:31.473460+02:00", "EventTime": "2023-10-30T14:02:31.473484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["C3cS5gTs0rrKQWJD6"]} -{"Format": "IDEA0", "ID": "3056cb96-f71d-4cb9-985b-51bde51eb3f6", "DetectTime": "2023-10-30T14:02:31.502617+02:00", "EventTime": "2023-10-30T14:02:31.502634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CfjEkm1zJpu8OLwx28"]} -{"Format": "IDEA0", "ID": "c1650bca-6eca-474b-862f-f24fc3480415", "DetectTime": "2023-10-30T14:02:31.530006+02:00", "EventTime": "2023-10-30T14:02:31.530033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CZh9wC3FfKiXxNRHIe"]} -{"Format": "IDEA0", "ID": "739f54f7-5c3c-4a59-9615-a482f505c500", "DetectTime": "2023-10-30T14:02:31.553221+02:00", "EventTime": "2023-10-30T14:02:31.553237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CGdIHd2ciiWAiCh1b5"]} -{"Format": "IDEA0", "ID": "91e02661-3578-4915-8278-2040d0ebda16", "DetectTime": "2023-10-30T14:02:31.612197+02:00", "EventTime": "2023-10-30T14:02:31.612225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["CGhU8n2EKWgY0fIuBc"]} -{"Format": "IDEA0", "ID": "01a4a42f-ff92-4c64-aa9c-c1af139883d6", "DetectTime": "2023-10-30T14:02:31.637875+02:00", "EventTime": "2023-10-30T14:02:31.637901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CMcSeX1ITdJ2IiXiJj"]} -{"Format": "IDEA0", "ID": "52106edb-4b73-49b3-8208-7173f56d15a1", "DetectTime": "2023-10-30T14:02:31.662487+02:00", "EventTime": "2023-10-30T14:02:31.662513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2KK3e2BVuOjWXbPOl"]} -{"Format": "IDEA0", "ID": "e0acd1bf-149d-4e64-94a3-5167707e5ec5", "DetectTime": "2023-10-30T14:02:31.675071+02:00", "EventTime": "2023-10-30T14:02:31.675089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CbXBee4MfWnFs1g0l1"]} -{"Format": "IDEA0", "ID": "599a5d2c-bc59-41ce-80d8-1e5a100b33af", "DetectTime": "2023-10-30T14:02:31.699533+02:00", "EventTime": "2023-10-30T14:02:31.699547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["Ca0fuZ1DlV7sxC1a4h"]} -{"Format": "IDEA0", "ID": "bd9b2fdf-6887-41c5-8052-1cd4b2b9ae35", "DetectTime": "2023-10-30T14:02:31.729602+02:00", "EventTime": "2023-10-30T14:02:31.729616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["ClhUYG3Z6zlkPdrmTi"]} -{"Format": "IDEA0", "ID": "970ccbbf-739f-4023-962d-13aaad84257b", "DetectTime": "2023-10-30T14:02:31.755415+02:00", "EventTime": "2023-10-30T14:02:31.755435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkicyW2JGLgiCrdgCb"]} -{"Format": "IDEA0", "ID": "9f2b7822-90db-4441-b7ee-b8c1b1db2108", "DetectTime": "2023-10-30T14:02:31.784875+02:00", "EventTime": "2023-10-30T14:02:31.784900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CBVeHc2jRdzJrvyoN5"]} -{"Format": "IDEA0", "ID": "628a8ead-eb33-4a18-b98f-e64d7e1052e1", "DetectTime": "2023-10-30T14:02:31.810307+02:00", "EventTime": "2023-10-30T14:02:31.810327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["C9ANNZ3C13UPwK2p85"]} -{"Format": "IDEA0", "ID": "48855289-dee8-4d89-994a-d27366b91d63", "DetectTime": "2023-10-30T14:02:31.834315+02:00", "EventTime": "2023-10-30T14:02:31.834332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CPVJZz4SFcYaXMbB6b"]} -{"Format": "IDEA0", "ID": "7bda20b5-0272-4349-abe0-89942d50aaad", "DetectTime": "2023-10-30T14:02:31.859810+02:00", "EventTime": "2023-10-30T14:02:31.859836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CemoSbHmAx3rWcz4i"]} -{"Format": "IDEA0", "ID": "b0590e58-8f0d-478a-b964-d5abbb7122e6", "DetectTime": "2023-10-30T14:02:31.884400+02:00", "EventTime": "2023-10-30T14:02:31.884415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CmqQo5sZjMKGY9JS3"]} -{"Format": "IDEA0", "ID": "4e45e202-4401-48c6-9d31-38a6a1626d0f", "DetectTime": "2023-10-30T14:02:31.907646+02:00", "EventTime": "2023-10-30T14:02:31.907666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CLe2rwGVmyGOzwKy4"]} -{"Format": "IDEA0", "ID": "a3895470-53f5-4dbe-93cf-99201e39b018", "DetectTime": "2023-10-30T14:02:31.932839+02:00", "EventTime": "2023-10-30T14:02:31.932862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CnXBAn1TQM0aD8JBT8"]} -{"Format": "IDEA0", "ID": "d0b772fa-4b5b-4c9c-8807-309b60928d28", "DetectTime": "2023-10-30T14:02:31.957077+02:00", "EventTime": "2023-10-30T14:02:31.957108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeBr4z13rHD12yslwg"]} -{"Format": "IDEA0", "ID": "15c9887e-622b-4572-95d0-9e7339d018e0", "DetectTime": "2023-10-30T14:02:31.968820+02:00", "EventTime": "2023-10-30T14:02:31.968840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6VFWFsYOtfJJnIxi"]} -{"Format": "IDEA0", "ID": "211ac8c7-b5fe-4a30-ad2b-385ef5fda527", "DetectTime": "2023-10-30T14:02:31.995807+02:00", "EventTime": "2023-10-30T14:02:31.995828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CgIdFs3srYnrtAIgNh"]} -{"Format": "IDEA0", "ID": "977a5e97-013c-4bc5-baa9-6b5fb803ba38", "DetectTime": "2023-10-30T14:02:32.021678+02:00", "EventTime": "2023-10-30T14:02:32.021695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CL4itT3pM81BL750qb"]} -{"Format": "IDEA0", "ID": "13af81b2-f9d3-46bd-91ca-ee5e9e48c886", "DetectTime": "2023-10-30T14:02:32.048485+02:00", "EventTime": "2023-10-30T14:02:32.048511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["ClKjBpVEmk5unimsh"]} -{"Format": "IDEA0", "ID": "e6477cf8-ab3c-455f-8161-ea9ef20ce522", "DetectTime": "2023-10-30T14:02:32.071834+02:00", "EventTime": "2023-10-30T14:02:32.071851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CjeaRi3nnfCVCaQPH8"]} -{"Format": "IDEA0", "ID": "16936b27-a676-4189-8a9f-9cd9cc496216", "DetectTime": "2023-10-30T14:02:32.129388+02:00", "EventTime": "2023-10-30T14:02:32.129414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CYk4C01c2NTowvIC3l"]} -{"Format": "IDEA0", "ID": "ae2ea770-2679-4e7d-8894-6c3010b2b8c0", "DetectTime": "2023-10-30T14:02:32.182998+02:00", "EventTime": "2023-10-30T14:02:32.183011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CW3az33HkxSM8nRiud"]} -{"Format": "IDEA0", "ID": "bb802be8-6787-4597-bb8b-1f582f64ff77", "DetectTime": "2023-10-30T14:02:32.207823+02:00", "EventTime": "2023-10-30T14:02:32.207852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CYTj903D28a7yehzhk"]} -{"Format": "IDEA0", "ID": "a63d8000-4a9a-4833-8c99-f90954e053ef", "DetectTime": "2023-10-30T14:02:32.262481+02:00", "EventTime": "2023-10-30T14:02:32.262508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CY9ejV1KjtL38aJO17"]} -{"Format": "IDEA0", "ID": "047fe94f-01e8-4f09-a7d2-7c4df4ab20b4", "DetectTime": "2023-10-30T14:02:32.292249+02:00", "EventTime": "2023-10-30T14:02:32.292275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjZl4z1OaMRZhEMWg3"]} -{"Format": "IDEA0", "ID": "f0f20503-e8f7-43ae-8d42-010b4d86650e", "DetectTime": "2023-10-30T14:02:32.322750+02:00", "EventTime": "2023-10-30T14:02:32.322768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.197.151.54 ", "ContentType": "text/plain"}], "uids": ["CuQ6NE1VQJVFj44Jpl"]} -{"Format": "IDEA0", "ID": "8b9e7d7a-0e09-48fc-8b0c-fd49f0f66f8f", "DetectTime": "2023-10-30T14:02:32.346420+02:00", "EventTime": "2023-10-30T14:02:32.346436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CUt226Rq4SLatnct4"]} -{"Format": "IDEA0", "ID": "835177a4-9c0f-44c9-aa86-b4a0fb039707", "DetectTime": "2023-10-30T14:02:32.371283+02:00", "EventTime": "2023-10-30T14:02:32.371295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CtT5SXiCmOalV19P5"]} -{"Format": "IDEA0", "ID": "95554ee2-5e04-4887-a2ff-de37eeb77499", "DetectTime": "2023-10-30T14:02:32.395459+02:00", "EventTime": "2023-10-30T14:02:32.395481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["C0avWq411FdxsVaFYb"]} -{"Format": "IDEA0", "ID": "3f4c2943-cea3-4b71-89de-0ce104de70b7", "DetectTime": "2023-10-30T14:02:32.459360+02:00", "EventTime": "2023-10-30T14:02:32.459386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CKaUpY24hzWUXgMwS9"]} -{"Format": "IDEA0", "ID": "430848c3-fabc-492f-8541-293d1eb4b5f8", "DetectTime": "2023-10-30T14:02:32.482951+02:00", "EventTime": "2023-10-30T14:02:32.482968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C6XpUE44cZOQH512cb"]} -{"Format": "IDEA0", "ID": "46523954-d50d-4df3-a532-f42a2fab2459", "DetectTime": "2023-10-30T14:02:32.508248+02:00", "EventTime": "2023-10-30T14:02:32.508268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CCMfYh1wcwiCxZPY3"]} -{"Format": "IDEA0", "ID": "3b44ae1b-76be-401a-b8fe-b3bfb23fd1f5", "DetectTime": "2023-10-30T14:02:32.533269+02:00", "EventTime": "2023-10-30T14:02:32.533298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CBPwgf2LtkcmlmTaz6"]} -{"Format": "IDEA0", "ID": "c5d23197-e89c-4fc0-995e-752b63e50ac9", "DetectTime": "2023-10-30T14:02:32.558748+02:00", "EventTime": "2023-10-30T14:02:32.558767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CwHMMy2au9wPq89KAi"]} -{"Format": "IDEA0", "ID": "e12d86a7-f3db-4651-be03-45a50cbcb460", "DetectTime": "2023-10-30T14:02:32.584223+02:00", "EventTime": "2023-10-30T14:02:32.584275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CjqbeH3jmnjh8Go1f9"]} -{"Format": "IDEA0", "ID": "3a5efc18-a220-4784-919b-c3d94621740e", "DetectTime": "2023-10-30T14:02:32.609058+02:00", "EventTime": "2023-10-30T14:02:32.609086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CamlTU2MoPSDo8pCak"]} -{"Format": "IDEA0", "ID": "56bb5098-a298-439d-956e-abd38abf0ffb", "DetectTime": "2023-10-30T14:02:32.669863+02:00", "EventTime": "2023-10-30T14:02:32.669882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["CEcZWv3ZoS8k1tfxJ9"]} -{"Format": "IDEA0", "ID": "658fae0b-ec9c-4ca9-a5e2-f8e75f084398", "DetectTime": "2023-10-30T14:02:32.695746+02:00", "EventTime": "2023-10-30T14:02:32.695758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CcXrMQ2J6rcblsOZ8b"]} -{"Format": "IDEA0", "ID": "4ed4ff2a-b4d5-4a5e-a5ea-752fd7f6005e", "DetectTime": "2023-10-30T14:02:32.718964+02:00", "EventTime": "2023-10-30T14:02:32.718978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CE6kg32wrSjUjYg8Tk"]} -{"Format": "IDEA0", "ID": "e43e0c4b-5509-4ad4-9a66-68ef37b8ad1f", "DetectTime": "2023-10-30T14:02:32.746267+02:00", "EventTime": "2023-10-30T14:02:32.746295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CwDgUKRjpeuJXkQRa"]} -{"Format": "IDEA0", "ID": "273ec0f4-842b-49a2-a5f3-332a87a808ad", "DetectTime": "2023-10-30T14:02:32.802651+02:00", "EventTime": "2023-10-30T14:02:32.802680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CAwrs2vUgQ8c3bU2b"]} -{"Format": "IDEA0", "ID": "61f25f55-8e09-4de1-8f0c-c79d48d48885", "DetectTime": "2023-10-30T14:02:32.827936+02:00", "EventTime": "2023-10-30T14:02:32.827962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.138.134 ", "ContentType": "text/plain"}], "uids": ["CeeJw842R3JcWaxtNd"]} -{"Format": "IDEA0", "ID": "717c9cdb-ef5f-4253-a4f2-b8f441617223", "DetectTime": "2023-10-30T14:02:32.851386+02:00", "EventTime": "2023-10-30T14:02:32.851402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C8c3ij3NKmmsxFONNf"]} -{"Format": "IDEA0", "ID": "63610397-98c1-4f89-8553-b73e3e6c430c", "DetectTime": "2023-10-30T14:02:32.876153+02:00", "EventTime": "2023-10-30T14:02:32.876181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CoQYxD3NSao6n5gxRd"]} -{"Format": "IDEA0", "ID": "0668df85-52c7-4b55-88f6-aed20ed61687", "DetectTime": "2023-10-30T14:02:32.887208+02:00", "EventTime": "2023-10-30T14:02:32.887231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CVuflqMhgTfqCOt7l"]} -{"Format": "IDEA0", "ID": "9cb0276c-a2ce-4cd9-8c6a-0a45af2bf7f6", "DetectTime": "2023-10-30T14:02:32.911130+02:00", "EventTime": "2023-10-30T14:02:32.911149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CPdbb91hHJAzoYsab2"]} -{"Format": "IDEA0", "ID": "44fa03aa-4759-4a51-87ee-b92f1adea0a3", "DetectTime": "2023-10-30T14:02:32.934272+02:00", "EventTime": "2023-10-30T14:02:32.934290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CgqTke4wfaxMWyXBRc"]} -{"Format": "IDEA0", "ID": "c3cc8033-60fe-4240-83de-9d9e98f078d8", "DetectTime": "2023-10-30T14:02:32.961222+02:00", "EventTime": "2023-10-30T14:02:32.961248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C3VKu84B4y4dpiyrp7"]} -{"Format": "IDEA0", "ID": "b1bd507e-9010-4292-a602-dd4d38af6e87", "DetectTime": "2023-10-30T14:02:32.985656+02:00", "EventTime": "2023-10-30T14:02:32.985682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C5WVaI2IiHxOFRdxYh"]} -{"Format": "IDEA0", "ID": "7fa75407-de41-49f7-b45d-30cc34e1858d", "DetectTime": "2023-10-30T14:02:33.012805+02:00", "EventTime": "2023-10-30T14:02:33.012824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CgIJ4D14bNg22fSEr7"]} -{"Format": "IDEA0", "ID": "7936b022-37aa-48cc-9550-82fa88e148b4", "DetectTime": "2023-10-30T14:02:33.038992+02:00", "EventTime": "2023-10-30T14:02:33.039017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C3dHyP3ePEWRYWFqik"]} -{"Format": "IDEA0", "ID": "43f3abad-e1a6-4804-bbde-2e723906b69f", "DetectTime": "2023-10-30T14:02:33.064976+02:00", "EventTime": "2023-10-30T14:02:33.064993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJuIGvmODRTi2G7L8"]} -{"Format": "IDEA0", "ID": "aecc0407-6673-45bb-a058-682559e893ae", "DetectTime": "2023-10-30T14:02:33.090322+02:00", "EventTime": "2023-10-30T14:02:33.090345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CJpARE47pxLXG2oXTk"]} -{"Format": "IDEA0", "ID": "c76ce39e-eb7a-42bc-8ab9-efe0cae79656", "DetectTime": "2023-10-30T14:02:33.116026+02:00", "EventTime": "2023-10-30T14:02:33.116051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.98.90.21 ", "ContentType": "text/plain"}], "uids": ["C7coRh4ghowAp4mZ8a"]} -{"Format": "IDEA0", "ID": "dd0d6e3d-a443-4f67-be41-72e7b2ba554f", "DetectTime": "2023-10-30T14:02:33.142058+02:00", "EventTime": "2023-10-30T14:02:33.142081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.87.147 ", "ContentType": "text/plain"}], "uids": ["CIu9P64StEExdsz3kl"]} -{"Format": "IDEA0", "ID": "b0e533a7-7eff-44d9-9ce3-4491ecd97ef3", "DetectTime": "2023-10-30T14:02:33.166512+02:00", "EventTime": "2023-10-30T14:02:33.166534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["CORlnD44psliUNB2T3"]} -{"Format": "IDEA0", "ID": "98140c89-59c7-4085-81d9-7b426ae7aec4", "DetectTime": "2023-10-30T14:02:33.193510+02:00", "EventTime": "2023-10-30T14:02:33.193534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CQaTC21772wN4Mbkoc"]} -{"Format": "IDEA0", "ID": "9b071371-6a78-489f-8351-7e6c75658334", "DetectTime": "2023-10-30T14:02:33.220509+02:00", "EventTime": "2023-10-30T14:02:33.220532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["Ca8Zj41S6bdiC0FQ1c"]} -{"Format": "IDEA0", "ID": "8ca2ae41-fa7e-45e3-adbb-3f5098cb1faf", "DetectTime": "2023-10-30T14:02:33.245277+02:00", "EventTime": "2023-10-30T14:02:33.245301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CRubOY2lgmLSbC0w1"]} -{"Format": "IDEA0", "ID": "95364c6b-0572-4705-b9f8-374d249b1600", "DetectTime": "2023-10-30T14:02:33.269334+02:00", "EventTime": "2023-10-30T14:02:33.269351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CfyQIl4u1dDaNypfc9"]} -{"Format": "IDEA0", "ID": "d0193ecf-9b36-402a-9825-cd9e25c8d6a7", "DetectTime": "2023-10-30T14:02:33.295363+02:00", "EventTime": "2023-10-30T14:02:33.295383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CQVidd3yUa4RsEy7Ig"]} -{"Format": "IDEA0", "ID": "96470be2-6bfa-4cde-be2c-abd78232539c", "DetectTime": "2023-10-30T14:02:33.320640+02:00", "EventTime": "2023-10-30T14:02:33.320667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CKazQQ3kCWIFTiAQp9"]} -{"Format": "IDEA0", "ID": "7759a7e8-b9f8-466c-8708-0ad750f33c7d", "DetectTime": "2023-10-30T14:02:33.344817+02:00", "EventTime": "2023-10-30T14:02:33.344839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CtVSnc2gLsWW9M5xdc"]} -{"Format": "IDEA0", "ID": "306124f8-cdb7-44f0-b9b9-88e9f3551b0b", "DetectTime": "2023-10-30T14:02:33.370091+02:00", "EventTime": "2023-10-30T14:02:33.370108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CfoyXehvVi5bcNArc"]} -{"Format": "IDEA0", "ID": "a97aff7d-e44b-4d66-bd10-2c1439f62ea8", "DetectTime": "2023-10-30T14:02:33.396410+02:00", "EventTime": "2023-10-30T14:02:33.396439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CqNuEfYm7Stbblye9"]} -{"Format": "IDEA0", "ID": "2185cbce-161b-4a3f-a851-8457879db636", "DetectTime": "2023-10-30T14:02:33.454700+02:00", "EventTime": "2023-10-30T14:02:33.454717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CpIC5g4MNUby8ffEJj"]} -{"Format": "IDEA0", "ID": "6bfbc542-5315-462e-bce6-08c4420efd60", "DetectTime": "2023-10-30T14:02:33.480969+02:00", "EventTime": "2023-10-30T14:02:33.480989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C7FSt018045PNlDb6e"]} -{"Format": "IDEA0", "ID": "5cf511f2-eb2a-466b-8641-12e3e1a670a0", "DetectTime": "2023-10-30T14:02:33.504097+02:00", "EventTime": "2023-10-30T14:02:33.504117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["COI8AW3XvksfgsbsJd"]} -{"Format": "IDEA0", "ID": "f463d174-e406-4941-a60e-fc1921f43bdd", "DetectTime": "2023-10-30T14:02:33.531792+02:00", "EventTime": "2023-10-30T14:02:33.531819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CmHuVs1TdUk2MDw5be"]} -{"Format": "IDEA0", "ID": "eba0bb93-f9fb-4f38-979e-fc85ca11dc13", "DetectTime": "2023-10-30T14:02:33.556901+02:00", "EventTime": "2023-10-30T14:02:33.556922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CVe3lt4H1XWcoHOabc"]} -{"Format": "IDEA0", "ID": "790a5b05-3999-4455-af6c-3596838a3f9d", "DetectTime": "2023-10-30T14:02:33.613609+02:00", "EventTime": "2023-10-30T14:02:33.613630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.143.194.227 ", "ContentType": "text/plain"}], "uids": ["CK5YF34fbv1qpt7mtc"]} -{"Format": "IDEA0", "ID": "7320bb7e-7b03-4070-b4bf-f356b7a00dd7", "DetectTime": "2023-10-30T14:02:33.638249+02:00", "EventTime": "2023-10-30T14:02:33.638264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CMZ9bp2zwMdJfxKA3a"]} -{"Format": "IDEA0", "ID": "88de0659-c447-42e7-9cf8-28c64265a1fd", "DetectTime": "2023-10-30T14:02:33.661867+02:00", "EventTime": "2023-10-30T14:02:33.661886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwuL7t441a0WkOVACh"]} -{"Format": "IDEA0", "ID": "68996cf9-ebc0-47c0-ae34-5e120f611867", "DetectTime": "2023-10-30T14:02:33.685992+02:00", "EventTime": "2023-10-30T14:02:33.686007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CLFnCD4JACg9is0tEi"]} -{"Format": "IDEA0", "ID": "1ad5a2d8-d08f-42e9-824d-21990e709253", "DetectTime": "2023-10-30T14:02:33.711991+02:00", "EventTime": "2023-10-30T14:02:33.712007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CdCoLp4b7PQXnmbi0g"]} -{"Format": "IDEA0", "ID": "f1f819f9-2d32-4161-9648-dec37d3d81f8", "DetectTime": "2023-10-30T14:02:33.738028+02:00", "EventTime": "2023-10-30T14:02:33.738047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["C4a0CP2VlCqbMCaFDk"]} -{"Format": "IDEA0", "ID": "02af1b9d-0f04-4a17-860e-8446f9d4a470", "DetectTime": "2023-10-30T14:02:33.792559+02:00", "EventTime": "2023-10-30T14:02:33.792584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CUMhon1MU2YWrFkMo1"]} -{"Format": "IDEA0", "ID": "2e2abfeb-c14b-400b-9475-d81250d34057", "DetectTime": "2023-10-30T14:02:33.819559+02:00", "EventTime": "2023-10-30T14:02:33.819584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cv7m0K2QMydZca1G2l"]} -{"Format": "IDEA0", "ID": "8e82646c-6c05-4bbd-ae96-471f5bceb2ba", "DetectTime": "2023-10-30T14:02:33.846844+02:00", "EventTime": "2023-10-30T14:02:33.846864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CO6a2C1PxR3eERvul2"]} -{"Format": "IDEA0", "ID": "caecd58e-c7d7-4abd-a343-64ea546e55f5", "DetectTime": "2023-10-30T14:02:33.906736+02:00", "EventTime": "2023-10-30T14:02:33.906752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CLhsNygiWL0CxHHPk"]} -{"Format": "IDEA0", "ID": "ffb6c0f9-7bd1-472d-81ad-b4169bad6fb7", "DetectTime": "2023-10-30T14:02:33.968545+02:00", "EventTime": "2023-10-30T14:02:33.968564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CQjpRo10rthfhJCZ68"]} -{"Format": "IDEA0", "ID": "31c14f74-781f-4849-9d6b-ff6359861d0f", "DetectTime": "2023-10-30T14:02:34.023634+02:00", "EventTime": "2023-10-30T14:02:34.023661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C0yPjo1l45ObDqH909"]} -{"Format": "IDEA0", "ID": "112031da-5090-4630-8cf3-6b5098349aa0", "DetectTime": "2023-10-30T14:02:34.082468+02:00", "EventTime": "2023-10-30T14:02:34.082497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CIkYzC3SeBukpLDPX6"]} -{"Format": "IDEA0", "ID": "036a3648-652c-4efc-8d19-4713c2b2366a", "DetectTime": "2023-10-30T14:02:34.140013+02:00", "EventTime": "2023-10-30T14:02:34.140029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CE2EK91D9sShE1JY8e"]} -{"Format": "IDEA0", "ID": "e6bd6dcc-a594-4d17-a8f3-f87cc8a569cf", "DetectTime": "2023-10-30T14:02:34.197812+02:00", "EventTime": "2023-10-30T14:02:34.197834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CeUbum1WLeVLEng9e1"]} -{"Format": "IDEA0", "ID": "438bbc89-6d55-4a3e-80ff-52307ca48f99", "DetectTime": "2023-10-30T14:02:34.257815+02:00", "EventTime": "2023-10-30T14:02:34.257839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpInqe22R7zr5OSpU5"]} -{"Format": "Json", "ID": "438bbc89-6d55-4a3e-80ff-52307ca48f99", "DetectTime": "2023-10-30T14:02:34.257815+02:00", "EventTime": "2023-10-30T14:02:34.257839+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-03T06:17:51.876625+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:34.356219)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9e722b8c-b423-45ca-bdf9-4e69a6b95f08", "DetectTime": "2023-10-30T14:02:34.362851+02:00", "EventTime": "2023-10-30T14:02:34.362878+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIcxqomC4J90PPfvh"]} -{"Format": "IDEA0", "ID": "0031ae75-c0d3-48c8-84b8-1ccee07a7fe4", "DetectTime": "2023-10-30T14:02:34.376801+02:00", "EventTime": "2023-10-30T14:02:34.376828+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4dCXt37aE9ARG4lS9"]} -{"Format": "IDEA0", "ID": "74ac3b09-9751-48e2-a101-dca3156bf19f", "DetectTime": "2023-10-30T14:02:34.388102+02:00", "EventTime": "2023-10-30T14:02:34.388124+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cj2kEo2kdUW6vWbvj7"]} -{"Format": "IDEA0", "ID": "1c29ea39-0ed1-43f1-892e-aa0dd296e3c7", "DetectTime": "2023-10-30T14:02:34.402168+02:00", "EventTime": "2023-10-30T14:02:34.402189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6570], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. ", "ContentType": "text/plain"}], "uids": ["Co6jkDjQ4U01Ymond"]} -{"Format": "IDEA0", "ID": "af1b30b4-5ec3-44cc-8562-e0e970e183a6", "DetectTime": "2023-10-30T14:02:34.460665+02:00", "EventTime": "2023-10-30T14:02:34.460683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CQv1ay4e7Cvck0fxU9"]} -{"Format": "IDEA0", "ID": "de33429b-d6ef-4542-a5a8-8b62eb1f06ad", "DetectTime": "2023-10-30T14:02:34.513346+02:00", "EventTime": "2023-10-30T14:02:34.513373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["Cx0nC44jyBypyFtFVa"]} -{"Format": "IDEA0", "ID": "4080bd72-b585-4210-b825-ddcbb9a9db6d", "DetectTime": "2023-10-30T14:02:34.569497+02:00", "EventTime": "2023-10-30T14:02:34.569518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CucZOe3s4flLlA92E3"]} -{"Format": "IDEA0", "ID": "771ab278-261a-4ceb-b085-0e8b105a6909", "DetectTime": "2023-10-30T14:02:34.581856+02:00", "EventTime": "2023-10-30T14:02:34.581872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CCGbva29UQLmsEXV2h"]} -{"Format": "IDEA0", "ID": "ab228a18-81f6-4353-9bbe-d831c885fdc6", "DetectTime": "2023-10-30T14:02:34.635971+02:00", "EventTime": "2023-10-30T14:02:34.635992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CWoQrTqUyrW162hs6"]} -{"Format": "IDEA0", "ID": "3c65c0ec-5fca-4f30-99ed-2d9691c8493b", "DetectTime": "2023-10-30T14:02:34.687511+02:00", "EventTime": "2023-10-30T14:02:34.687532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIcxqomC4J90PPfvh", "Cj2kEo2kdUW6vWbvj7", "CeBr4z13rHD12yslwg", "Cjzf0n1xdjDrdsAKe2"]} -{"Format": "IDEA0", "ID": "fa5c84f6-e5d6-4377-839d-ed93b787b629", "DetectTime": "2023-10-30T14:02:34.699490+02:00", "EventTime": "2023-10-30T14:02:34.699511+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cjzf0n1xdjDrdsAKe2"]} -{"Format": "IDEA0", "ID": "68221d67-440c-4b53-9497-b7c63db089dd", "DetectTime": "2023-10-30T14:02:34.712114+02:00", "EventTime": "2023-10-30T14:02:34.712131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["ClemKW1xVRrqg5DwY2"]} -{"Format": "IDEA0", "ID": "62fd449c-80ec-4d29-a29a-69ee309a1d72", "DetectTime": "2023-10-30T14:02:34.771498+02:00", "EventTime": "2023-10-30T14:02:34.771516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CMPwTx3cQhEzA0XJJ9"]} -{"Format": "IDEA0", "ID": "f74047f9-057d-4b73-a091-273c6745e712", "DetectTime": "2023-10-30T14:02:34.829440+02:00", "EventTime": "2023-10-30T14:02:34.829456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CoQuql1Truk3jKDDql"]} -{"Format": "IDEA0", "ID": "7d0cd609-5ccf-498a-8458-5d130673003f", "DetectTime": "2023-10-30T14:02:34.888553+02:00", "EventTime": "2023-10-30T14:02:34.888573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CJaJkQ137Sux03EsX"]} -{"Format": "IDEA0", "ID": "a3cf4490-936e-44ac-b24d-f8ef6faac3e2", "DetectTime": "2023-10-30T14:02:34.945358+02:00", "EventTime": "2023-10-30T14:02:34.945384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C1InK02ZEWXjnHMjW5"]} -{"Format": "Json", "ID": "a3cf4490-936e-44ac-b24d-f8ef6faac3e2", "DetectTime": "2023-10-30T14:02:34.945358+02:00", "EventTime": "2023-10-30T14:02:34.945384+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:45:33.941612+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:35.034835)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ce24579f-820d-4ddc-96d5-6f4ce563360d", "DetectTime": "2023-10-30T14:02:35.041335+02:00", "EventTime": "2023-10-30T14:02:35.041360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CUG0Mq4tbezTmRbjW5"]} -{"Format": "IDEA0", "ID": "3c924dbc-b2e7-42b5-b958-275fea453b51", "DetectTime": "2023-10-30T14:02:35.097916+02:00", "EventTime": "2023-10-30T14:02:35.097933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CkPWbo2yjTYkU4rXa"]} -{"Format": "IDEA0", "ID": "2dd8ed56-a90e-4525-9b62-4b5d398c8abb", "DetectTime": "2023-10-30T14:02:35.148832+02:00", "EventTime": "2023-10-30T14:02:35.148849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CCkMqY14qLtoQZV4jb"]} -{"Format": "IDEA0", "ID": "09b722ec-9381-45f1-b65c-74f3181b2a65", "DetectTime": "2023-10-30T14:02:35.207462+02:00", "EventTime": "2023-10-30T14:02:35.207484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2414], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. ", "ContentType": "text/plain"}], "uids": ["C67Bin1d7YwQ0wTD4i"]} -{"Format": "IDEA0", "ID": "cdbe694a-0305-4825-9a26-ce8614e14890", "DetectTime": "2023-10-30T14:02:35.269144+02:00", "EventTime": "2023-10-30T14:02:35.269166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CW181VkLrWZVOsDb9"]} -{"Format": "IDEA0", "ID": "b382d2b5-1b3e-4dd0-9375-6d509d658141", "DetectTime": "2023-10-30T14:02:35.342631+02:00", "EventTime": "2023-10-30T14:02:35.342654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CKLqV22AAsSYuR9kOb"]} -{"Format": "IDEA0", "ID": "2a5a47b2-3201-4a73-b064-224b1041f6fa", "DetectTime": "2023-10-30T14:02:35.400918+02:00", "EventTime": "2023-10-30T14:02:35.400947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CiXudN3mZUWu1DWoXc"]} -{"Format": "IDEA0", "ID": "2d98c5e8-037c-4cdb-bb92-799fd39b30c2", "DetectTime": "2023-10-30T14:02:35.453441+02:00", "EventTime": "2023-10-30T14:02:35.453469+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cpot1A2zxvzZy06waa"]} -{"Format": "IDEA0", "ID": "777a7bb4-199c-4381-b35b-aacd2cd8bb49", "DetectTime": "2023-10-30T14:02:35.465243+02:00", "EventTime": "2023-10-30T14:02:35.465262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CwiktE18XNpIyeHRx8"]} -{"Format": "Json", "ID": "777a7bb4-199c-4381-b35b-aacd2cd8bb49", "DetectTime": "2023-10-30T14:02:35.465243+02:00", "EventTime": "2023-10-30T14:02:35.465262+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:45:35.196656+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:35.547963)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "24448afd-8577-4755-8b6c-50e3f7badd5d", "DetectTime": "2023-10-30T14:02:35.554112+02:00", "EventTime": "2023-10-30T14:02:35.554139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CNtVqd3eLMhqTooHdh"]} -{"Format": "IDEA0", "ID": "7397df52-eb57-4c50-a61a-35b0b099077a", "DetectTime": "2023-10-30T14:02:35.607897+02:00", "EventTime": "2023-10-30T14:02:35.607916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["ChDR24Lj83SGAYZje"]} -{"Format": "IDEA0", "ID": "bd3480e5-aa5e-48d2-a52e-38f194669945", "DetectTime": "2023-10-30T14:02:35.665177+02:00", "EventTime": "2023-10-30T14:02:35.665195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["Camskp4ZWcgiYcO7a"]} -{"Format": "IDEA0", "ID": "8a637ae2-013e-4c11-8719-820dc81ec2d0", "DetectTime": "2023-10-30T14:02:35.716711+02:00", "EventTime": "2023-10-30T14:02:35.716730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["Cv09518GwA0wOWLr9"]} -{"Format": "IDEA0", "ID": "f017e691-5237-48e5-b22a-a48653427961", "DetectTime": "2023-10-30T14:02:35.769486+02:00", "EventTime": "2023-10-30T14:02:35.769503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CgqYUt3KsDm9sqDEOc"]} -{"Format": "IDEA0", "ID": "8bd90807-b6a2-41fc-babd-a7c7621b1c57", "DetectTime": "2023-10-30T14:02:35.821304+02:00", "EventTime": "2023-10-30T14:02:35.821326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["Cyi9uQ1eMeDxPiYmWh"]} -{"Format": "IDEA0", "ID": "aef8e607-5e78-446f-8b1e-bcf322402fe7", "DetectTime": "2023-10-30T14:02:35.872814+02:00", "EventTime": "2023-10-30T14:02:35.872834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["CJW2M7hJF63Bu7Ur3"]} -{"Format": "IDEA0", "ID": "24186895-58ba-4238-a2d0-19b34c595607", "DetectTime": "2023-10-30T14:02:35.927251+02:00", "EventTime": "2023-10-30T14:02:35.927275+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ct575R2AvUGd2fWwr1"]} -{"Format": "IDEA0", "ID": "c7d17836-9f84-4461-829b-ec196d7bdfdb", "DetectTime": "2023-10-30T14:02:35.935093+02:00", "EventTime": "2023-10-30T14:02:35.935114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CLY8Z71mVpwo2oI8n5"]} -{"Format": "Json", "ID": "c7d17836-9f84-4461-829b-ec196d7bdfdb", "DetectTime": "2023-10-30T14:02:35.935093+02:00", "EventTime": "2023-10-30T14:02:35.935114+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:45:57.659245+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:36.016211)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3fcea2c4-2f55-46dc-b4a4-b859e20c0f3c", "DetectTime": "2023-10-30T14:02:36.021638+02:00", "EventTime": "2023-10-30T14:02:36.021657+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CO5SZK2pFd1K5U1Hgk"]} -{"Format": "IDEA0", "ID": "8510e89f-b79c-4824-a72a-584153cf4568", "DetectTime": "2023-10-30T14:02:36.030365+02:00", "EventTime": "2023-10-30T14:02:36.030391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cr0Fim35jGCV9dp7W8"]} -{"Format": "IDEA0", "ID": "d134738d-6a6b-47c2-90eb-b55b2a93821d", "DetectTime": "2023-10-30T14:02:36.079008+02:00", "EventTime": "2023-10-30T14:02:36.079035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CSvxV1FGmH3AYOXua"]} -{"Format": "IDEA0", "ID": "bb8282f5-dc76-4321-b58c-69c2f5dcba18", "DetectTime": "2023-10-30T14:02:36.126553+02:00", "EventTime": "2023-10-30T14:02:36.126579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5U4cl1oh8MCor0Quh"]} -{"Format": "IDEA0", "ID": "b9f18349-3d27-493b-aaa6-67107e0b811b", "DetectTime": "2023-10-30T14:02:36.173078+02:00", "EventTime": "2023-10-30T14:02:36.173098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7628], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7628/UDP destination IP 186.93.105.248. ", "ContentType": "text/plain"}], "uids": ["CbEQ681KiN3qkRattb"]} -{"Format": "IDEA0", "ID": "e0fd1b92-b92e-4a18-a012-5352f3267035", "DetectTime": "2023-10-30T14:02:36.220456+02:00", "EventTime": "2023-10-30T14:02:36.220483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CXmEAa4NFAJrk28bEh"]} -{"Format": "IDEA0", "ID": "b83eb2f8-31fe-4eac-ac75-61a9b7b31125", "DetectTime": "2023-10-30T14:02:36.273014+02:00", "EventTime": "2023-10-30T14:02:36.273036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["C0eOhn4o10HhciDi1b"]} -{"Format": "IDEA0", "ID": "656b4a4d-dc92-48e0-977c-ce042d426841", "DetectTime": "2023-10-30T14:02:36.321666+02:00", "EventTime": "2023-10-30T14:02:36.321682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6169], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. ", "ContentType": "text/plain"}], "uids": ["CJitJX1jFpEpcvhCTg"]} -{"Format": "IDEA0", "ID": "5295c1c3-ff45-4d11-b1a7-120ea4b2b7fa", "DetectTime": "2023-10-30T14:02:36.372935+02:00", "EventTime": "2023-10-30T14:02:36.372966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11427], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11427/UDP destination IP 124.120.59.74. ", "ContentType": "text/plain"}], "uids": ["CpnGat20D0tB8DqY02"]} -{"Format": "IDEA0", "ID": "c6727906-b7ca-47a1-ae9e-4c77c19414c8", "DetectTime": "2023-10-30T14:02:36.418954+02:00", "EventTime": "2023-10-30T14:02:36.418972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["C61oE9OFcxATUKEd9"]} -{"Format": "Json", "ID": "c6727906-b7ca-47a1-ae9e-4c77c19414c8", "DetectTime": "2023-10-30T14:02:36.418954+02:00", "EventTime": "2023-10-30T14:02:36.418972+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:47:54.497074+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:36.497075)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f77c7ff-ed7c-4e71-987e-a1614443dbb2", "DetectTime": "2023-10-30T14:02:36.503818+02:00", "EventTime": "2023-10-30T14:02:36.503843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["C6N6TW14Y3MRGNItsk"]} -{"Format": "IDEA0", "ID": "7c88c035-6474-47bc-b1cf-619ba78db693", "DetectTime": "2023-10-30T14:02:36.552086+02:00", "EventTime": "2023-10-30T14:02:36.552105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CDUwUi2gOGJ2TZEYXb"]} -{"Format": "IDEA0", "ID": "cd5aeb7c-285d-4fa6-94d9-38dc9215ea40", "DetectTime": "2023-10-30T14:02:36.593907+02:00", "EventTime": "2023-10-30T14:02:36.593932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Ch2Jbh2BOLzpvmivma"]} -{"Format": "IDEA0", "ID": "3333c3dc-0abc-4d4e-b193-95d4732a596c", "DetectTime": "2023-10-30T14:02:36.636860+02:00", "EventTime": "2023-10-30T14:02:36.636879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7253], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7253/UDP destination IP 186.14.232.123. ", "ContentType": "text/plain"}], "uids": ["C92kTY2GA2Eyd1Grl7"]} -{"Format": "IDEA0", "ID": "c17fa75d-d1d5-4d85-8d1f-019d941f98d7", "DetectTime": "2023-10-30T14:02:36.680190+02:00", "EventTime": "2023-10-30T14:02:36.680215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28779], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28779/UDP destination IP 2.134.161.217. ", "ContentType": "text/plain"}], "uids": ["CY9PkC258iG8bdbi4g"]} -{"Format": "IDEA0", "ID": "27fb8628-da5e-46b1-8bea-02fa9800f603", "DetectTime": "2023-10-30T14:02:36.725286+02:00", "EventTime": "2023-10-30T14:02:36.725305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7265], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. ", "ContentType": "text/plain"}], "uids": ["CfY6uu3CINB5EemBE3"]} -{"Format": "IDEA0", "ID": "9734525f-e4ef-4f69-9ff8-1731f1ee15a3", "DetectTime": "2023-10-30T14:02:36.770036+02:00", "EventTime": "2023-10-30T14:02:36.770055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["C3W3dA48DyXxD5UvD1"]} -{"Format": "IDEA0", "ID": "3b4eb680-9ade-4113-ac56-e3959892770b", "DetectTime": "2023-10-30T14:02:36.811418+02:00", "EventTime": "2023-10-30T14:02:36.811435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24196/UDP destination IP 94.66.213.97. ", "ContentType": "text/plain"}], "uids": ["CQpNKq1rqPltt7jKia"]} -{"Format": "Json", "ID": "3b4eb680-9ade-4113-ac56-e3959892770b", "DetectTime": "2023-10-30T14:02:36.811418+02:00", "EventTime": "2023-10-30T14:02:36.811435+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24196], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:49:13.090908+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:36.890067)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "87b89c3f-255a-4346-b4cb-48beb602abe1", "DetectTime": "2023-10-30T14:02:36.895904+02:00", "EventTime": "2023-10-30T14:02:36.895930+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmvLwZ3irQnEvsARK9"]} -{"Format": "IDEA0", "ID": "8eaf535f-afe7-413f-9e6c-407d572b48f5", "DetectTime": "2023-10-30T14:02:36.905286+02:00", "EventTime": "2023-10-30T14:02:36.905308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CzbIxJ2qlt2PnWj63j"]} -{"Format": "IDEA0", "ID": "8b868416-aa24-4a7d-a40d-8b0ad5b2a4a7", "DetectTime": "2023-10-30T14:02:36.951349+02:00", "EventTime": "2023-10-30T14:02:36.951366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["CGUgDy4ZBA34kwkGK6"]} -{"Format": "IDEA0", "ID": "ece76e9e-2fe7-4e81-ad36-78730b0c4f6e", "DetectTime": "2023-10-30T14:02:36.997693+02:00", "EventTime": "2023-10-30T14:02:36.997721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CopC1X23XC9VYLMY63"]} -{"Format": "IDEA0", "ID": "fe059ad3-b685-4081-82d8-e0b56139f4fb", "DetectTime": "2023-10-30T14:02:37.041162+02:00", "EventTime": "2023-10-30T14:02:37.041181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["C02CGh1s3te5hVBDHd"]} -{"Format": "IDEA0", "ID": "1984658c-4e00-4c17-b571-084a756fb35d", "DetectTime": "2023-10-30T14:02:37.083564+02:00", "EventTime": "2023-10-30T14:02:37.083590+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTgNly1lmTvFAjgPu2"]} -{"Format": "IDEA0", "ID": "79a49a9c-a6e1-41de-acdd-c04fa758d7c7", "DetectTime": "2023-10-30T14:02:37.091623+02:00", "EventTime": "2023-10-30T14:02:37.091649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1932], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1932/UDP destination IP 107.192.22.25. ", "ContentType": "text/plain"}], "uids": ["Cei6m91q6oUOHYwUmc"]} -{"Format": "IDEA0", "ID": "7d0c04f0-17d0-40dc-a7fa-6703718768a6", "DetectTime": "2023-10-30T14:02:37.129781+02:00", "EventTime": "2023-10-30T14:02:37.129808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["ChaiNw3Rtga3anqPz3"]} -{"Format": "IDEA0", "ID": "d44bf336-e7ec-42eb-9db6-0bef5ffec15b", "DetectTime": "2023-10-30T14:02:37.168759+02:00", "EventTime": "2023-10-30T14:02:37.168787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. ", "ContentType": "text/plain"}], "uids": ["Cfadzq4u3VmxTE3eRh"]} -{"Format": "IDEA0", "ID": "1e7b85be-f3d9-4ad6-b3e2-10c26712841d", "DetectTime": "2023-10-30T14:02:37.207562+02:00", "EventTime": "2023-10-30T14:02:37.207579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CaGFIWg2d7M1xn1V"]} -{"Format": "IDEA0", "ID": "baace4b9-61ed-4d65-9531-48a14953a185", "DetectTime": "2023-10-30T14:02:37.252217+02:00", "EventTime": "2023-10-30T14:02:37.252229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["Cgmx8F2SZcm30ntHBl"]} -{"Format": "IDEA0", "ID": "2a045423-1da0-4b9b-9985-2cbba80501cd", "DetectTime": "2023-10-30T14:02:37.291244+02:00", "EventTime": "2023-10-30T14:02:37.291269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10427], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10427/UDP destination IP 88.250.88.135. ", "ContentType": "text/plain"}], "uids": ["CaXaHz4n8FJbdd1tV1"]} -{"Format": "Json", "ID": "2a045423-1da0-4b9b-9985-2cbba80501cd", "DetectTime": "2023-10-30T14:02:37.291244+02:00", "EventTime": "2023-10-30T14:02:37.291269+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10427], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T06:51:50.024509+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2023/10/30 14:02:37.364430)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "78ffe186-bf42-48b3-b080-7ea9105c330c", "DetectTime": "2023-10-30T14:02:37.371150+02:00", "EventTime": "2023-10-30T14:02:37.371175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CnAMIg4g09sWu0B6X6"]} -{"Format": "IDEA0", "ID": "a5b03559-beb4-4ffe-9168-2492d123552a", "DetectTime": "2023-10-30T14:02:37.417423+02:00", "EventTime": "2023-10-30T14:02:37.417451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21298/UDP destination IP 187.206.142.232. ", "ContentType": "text/plain"}], "uids": ["C1St2UupaGYnJIaq9"]} -{"Format": "IDEA0", "ID": "24c6a36d-20fe-4ce4-b355-8d75db65e1d0", "DetectTime": "2023-10-30T14:02:37.461669+02:00", "EventTime": "2023-10-30T14:02:37.461696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["CfUi2y2JbNFXfpGWZd"]} -{"Format": "IDEA0", "ID": "7c988624-7b46-4dd8-9c04-6301616553f8", "DetectTime": "2023-10-30T14:02:37.499440+02:00", "EventTime": "2023-10-30T14:02:37.499466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24417], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24417/UDP destination IP 196.203.197.47. ", "ContentType": "text/plain"}], "uids": ["CCDYZd18MzqCV8oxg6"]} -{"Format": "IDEA0", "ID": "84e98c82-f556-46ae-a9ad-dd4df103466d", "DetectTime": "2023-10-30T14:02:37.539890+02:00", "EventTime": "2023-10-30T14:02:37.539912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["CZfYIq49FrwzwUz4A2"]} -{"Format": "IDEA0", "ID": "75ab77a8-2cfc-4a82-b718-e47349d00105", "DetectTime": "2023-10-30T14:02:37.578347+02:00", "EventTime": "2023-10-30T14:02:37.578368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["Cza2gp4F8qNHyDqowb"]} -{"Format": "IDEA0", "ID": "dccc087f-374b-424f-89ce-bf5400be876b", "DetectTime": "2023-10-30T14:02:37.616021+02:00", "EventTime": "2023-10-30T14:02:37.616040+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 82.49.114.244 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CZWZak3W5hvGKTEL68"]} -{"Format": "IDEA0", "ID": "42dcdf1c-7c43-4d87-8bad-a7ec30aeeec7", "DetectTime": "2023-10-30T14:02:37.680478+02:00", "EventTime": "2023-10-30T14:02:37.680509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["C4U7He4dUEFxUKa7f1"]} -{"Format": "IDEA0", "ID": "950dd78d-a31d-4c3b-841c-ba047787320c", "DetectTime": "2023-10-30T14:02:37.719139+02:00", "EventTime": "2023-10-30T14:02:37.719156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKex273N2TO9bXehVj"]} -{"Format": "IDEA0", "ID": "de0e2fb2-9ce8-4984-8b3c-8724d070d970", "DetectTime": "2023-10-30T14:02:37.788523+02:00", "EventTime": "2023-10-30T14:02:37.788551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CiOxS126mnqW8TkB8b"]} -{"Format": "IDEA0", "ID": "90d8ede3-1d74-4826-9a4d-9bfbf8cf928c", "DetectTime": "2023-10-30T14:02:37.868447+02:00", "EventTime": "2023-10-30T14:02:37.868465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CswuBH128pLV791z1e"]} -{"Format": "IDEA0", "ID": "f52ad018-1377-444f-9d48-af81b205b502", "DetectTime": "2023-10-30T14:02:37.939668+02:00", "EventTime": "2023-10-30T14:02:37.939687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CD3ort3o2D3AVReJN"]} -{"Format": "IDEA0", "ID": "e7e5f313-1bd9-463c-8f32-57e5cc112d15", "DetectTime": "2023-10-30T14:02:38.009834+02:00", "EventTime": "2023-10-30T14:02:38.009851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["C4qrN82NiFxJ1hK36l"]} -{"Format": "IDEA0", "ID": "980f9069-5c3d-4c13-ac9b-753d6a4b9017", "DetectTime": "2023-10-30T14:02:38.082519+02:00", "EventTime": "2023-10-30T14:02:38.082536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnMhSI2N5FsZmiCm95"]} -{"Format": "IDEA0", "ID": "6c524e0a-34c9-4835-bd7d-0f6cbf3b8bbc", "DetectTime": "2023-10-30T14:02:38.091323+02:00", "EventTime": "2023-10-30T14:02:38.091350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C472FYag8mORt3dva"]} -{"Format": "IDEA0", "ID": "1e84fae6-3777-4bc5-95e3-a69e1a785ae8", "DetectTime": "2023-10-30T14:02:38.159795+02:00", "EventTime": "2023-10-30T14:02:38.159818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CdC7Z349dRVyhUYJxd"]} -{"Format": "Json", "ID": "1e84fae6-3777-4bc5-95e3-a69e1a785ae8", "DetectTime": "2023-10-30T14:02:38.159795+02:00", "EventTime": "2023-10-30T14:02:38.159818+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:23:05.298531+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:38.296462)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "16b143ed-63fd-4cba-af62-457acf97f2fa", "DetectTime": "2023-10-30T14:02:38.302879+02:00", "EventTime": "2023-10-30T14:02:38.302896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CAVO5I3KaRWzVRMZQ"]} -{"Format": "IDEA0", "ID": "d7d15044-8199-4670-90a3-5946c9d48964", "DetectTime": "2023-10-30T14:02:38.382771+02:00", "EventTime": "2023-10-30T14:02:38.382826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CNyGGT39ZRFg3ZYs4f"]} -{"Format": "IDEA0", "ID": "6eb7b9e6-100c-4bbe-96c3-537886bb86a1", "DetectTime": "2023-10-30T14:02:38.452806+02:00", "EventTime": "2023-10-30T14:02:38.452832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPRL3K3vDzoDfyDB88"]} -{"Format": "IDEA0", "ID": "c57a5618-6e6f-4edf-953e-73922cff2431", "DetectTime": "2023-10-30T14:02:38.519845+02:00", "EventTime": "2023-10-30T14:02:38.519864+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtK2Ij4myIdE2aEnje"]} -{"Format": "IDEA0", "ID": "fd59c21c-402f-4f9d-a55e-85534113ca55", "DetectTime": "2023-10-30T14:02:38.529579+02:00", "EventTime": "2023-10-30T14:02:38.529603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cxl5KD2z5zrWVT7J19"]} -{"Format": "IDEA0", "ID": "cec9fa8f-ab5a-485e-a5a8-e14a6bee2968", "DetectTime": "2023-10-30T14:02:38.595952+02:00", "EventTime": "2023-10-30T14:02:38.595977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CK7rq9vadmetNvDQa"]} -{"Format": "IDEA0", "ID": "12766373-ca66-42ad-b2ee-7776f72af771", "DetectTime": "2023-10-30T14:02:38.661758+02:00", "EventTime": "2023-10-30T14:02:38.661777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["COdHzWVzlQmCsxVM3"]} -{"Format": "IDEA0", "ID": "967ff6c3-87eb-47eb-b1a3-9e1804eb6367", "DetectTime": "2023-10-30T14:02:38.732128+02:00", "EventTime": "2023-10-30T14:02:38.732145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C8mO4H1IiOwcq1pTNj"]} -{"Format": "IDEA0", "ID": "ad4b5c15-9c6c-4217-8c7c-2780a3ef574d", "DetectTime": "2023-10-30T14:02:38.822513+02:00", "EventTime": "2023-10-30T14:02:38.822539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CVnceiNTMFifS6D07"]} -{"Format": "Json", "ID": "ad4b5c15-9c6c-4217-8c7c-2780a3ef574d", "DetectTime": "2023-10-30T14:02:38.822513+02:00", "EventTime": "2023-10-30T14:02:38.822539+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:23:23.212210+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:38.929887)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "57c3b3e4-4535-4021-9ab4-c6c8be2cced2", "DetectTime": "2023-10-30T14:02:38.935722+02:00", "EventTime": "2023-10-30T14:02:38.935744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CfYd6TwZKGZPefhEh"]} -{"Format": "IDEA0", "ID": "6344d721-7ee9-4abe-bc74-15ecd3237f25", "DetectTime": "2023-10-30T14:02:39.013024+02:00", "EventTime": "2023-10-30T14:02:39.013044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C33sSx1rbIYQZpGna"]} -{"Format": "IDEA0", "ID": "5cf7c221-d58f-48af-982e-6c598c32ae12", "DetectTime": "2023-10-30T14:02:39.084002+02:00", "EventTime": "2023-10-30T14:02:39.084046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3205], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. ", "ContentType": "text/plain"}], "uids": ["CyBlWB1SFxZufUc1d"]} -{"Format": "IDEA0", "ID": "4dfc1eed-9cb7-47bc-95bd-618c843f9a1f", "DetectTime": "2023-10-30T14:02:39.153554+02:00", "EventTime": "2023-10-30T14:02:39.153571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CeMbvF34suIApeWlCa"]} -{"Format": "IDEA0", "ID": "a967a856-7b9d-4684-bfbb-9bc6d6eb15c4", "DetectTime": "2023-10-30T14:02:39.216380+02:00", "EventTime": "2023-10-30T14:02:39.216397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22421], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. ", "ContentType": "text/plain"}], "uids": ["Cf90EE1hyJdE1iGMq8"]} -{"Format": "IDEA0", "ID": "30af3064-d242-47d7-89d5-6af194549fb2", "DetectTime": "2023-10-30T14:02:39.277174+02:00", "EventTime": "2023-10-30T14:02:39.277193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CzW5lC3dPEcPPcGBUc"]} -{"Format": "IDEA0", "ID": "dd33273a-f3a1-4217-bff4-c266ce7908bd", "DetectTime": "2023-10-30T14:02:39.339911+02:00", "EventTime": "2023-10-30T14:02:39.339930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["Cs5unwynYEDZqrSSe"]} -{"Format": "IDEA0", "ID": "2812e618-ca1c-4c88-92b9-33decb27cbdc", "DetectTime": "2023-10-30T14:02:39.394035+02:00", "EventTime": "2023-10-30T14:02:39.394054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["Crp0964a9wWGK8YxWl"]} -{"Format": "Json", "ID": "2812e618-ca1c-4c88-92b9-33decb27cbdc", "DetectTime": "2023-10-30T14:02:39.394035+02:00", "EventTime": "2023-10-30T14:02:39.394054+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:23:24.573263+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:39.483153)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f92e0463-4076-476c-bed3-241f40cbd4b0", "DetectTime": "2023-10-30T14:02:39.488643+02:00", "EventTime": "2023-10-30T14:02:39.488657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CoaBh72GPfLVEXm0X"]} -{"Format": "IDEA0", "ID": "4259ed73-63e9-4a96-936e-34c1d61633ee", "DetectTime": "2023-10-30T14:02:39.549967+02:00", "EventTime": "2023-10-30T14:02:39.549985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CZlvY33gNQE6hISso2"]} -{"Format": "IDEA0", "ID": "9ddf6127-b016-461b-af9f-17435e2b1551", "DetectTime": "2023-10-30T14:02:39.606369+02:00", "EventTime": "2023-10-30T14:02:39.606394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmvLwZ3irQnEvsARK9", "CN6PMR3gir070pEoDi", "Ct575R2AvUGd2fWwr1", "CnMhSI2N5FsZmiCm95"]} -{"Format": "IDEA0", "ID": "4de1b04b-c9bb-48d8-8152-18deca66297a", "DetectTime": "2023-10-30T14:02:39.615631+02:00", "EventTime": "2023-10-30T14:02:39.615653+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CN6PMR3gir070pEoDi"]} -{"Format": "IDEA0", "ID": "265faf95-fe57-44ba-bb96-59baf3bae8e8", "DetectTime": "2023-10-30T14:02:39.624871+02:00", "EventTime": "2023-10-30T14:02:39.624898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CyFEM1a7AofQXgbvl"]} -{"Format": "IDEA0", "ID": "b8f352a8-9be4-4e78-ac3d-f3f6dcc381b9", "DetectTime": "2023-10-30T14:02:39.681704+02:00", "EventTime": "2023-10-30T14:02:39.681736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CmX3tE3OJHK80qbcL5"]} -{"Format": "IDEA0", "ID": "0e0ec23e-bf58-4a62-a0b1-47f1d83c707f", "DetectTime": "2023-10-30T14:02:39.739042+02:00", "EventTime": "2023-10-30T14:02:39.739068+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBuHdM3C5b3KExw7wc"]} -{"Format": "IDEA0", "ID": "a2529521-63a1-4736-84c7-a0596cb6046b", "DetectTime": "2023-10-30T14:02:39.750939+02:00", "EventTime": "2023-10-30T14:02:39.750972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6169], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. ", "ContentType": "text/plain"}], "uids": ["ClV1mY2idyBhXZUhCe"]} -{"Format": "IDEA0", "ID": "b6c05401-1ffb-4171-98d7-69fc49893bb6", "DetectTime": "2023-10-30T14:02:39.807274+02:00", "EventTime": "2023-10-30T14:02:39.807298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["Cug3G84lXn1VkzbXH9"]} -{"Format": "IDEA0", "ID": "5297fc26-0d3d-458e-bc06-500a5714ed74", "DetectTime": "2023-10-30T14:02:39.865701+02:00", "EventTime": "2023-10-30T14:02:39.865728+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cl4VED15XpoShMHZz1"]} -{"Format": "IDEA0", "ID": "76275e11-7c77-4aac-9558-ff22a27401db", "DetectTime": "2023-10-30T14:02:39.875720+02:00", "EventTime": "2023-10-30T14:02:39.875743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["C7qlnUtAfx3SqeN55"]} -{"Format": "IDEA0", "ID": "0098c808-caea-4ab6-be1c-5e6df89db8ec", "DetectTime": "2023-10-30T14:02:39.933413+02:00", "EventTime": "2023-10-30T14:02:39.933437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CukEXN1uVMNUSeClH3"]} -{"Format": "Json", "ID": "0098c808-caea-4ab6-be1c-5e6df89db8ec", "DetectTime": "2023-10-30T14:02:39.933413+02:00", "EventTime": "2023-10-30T14:02:39.933437+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:24:02.805867+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:40.023994)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8d4f1c3a-54f7-4bf4-b760-77012c9f266b", "DetectTime": "2023-10-30T14:02:40.030054+02:00", "EventTime": "2023-10-30T14:02:40.030079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["ClnWfV1D8OvIeaNULk"]} -{"Format": "IDEA0", "ID": "bc54d115-4c80-4f57-97f2-bc240b04a750", "DetectTime": "2023-10-30T14:02:40.088723+02:00", "EventTime": "2023-10-30T14:02:40.088748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28779], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28779/UDP destination IP 2.134.161.217. ", "ContentType": "text/plain"}], "uids": ["CnT8Yq3ohv9OaUurol"]} -{"Format": "IDEA0", "ID": "a5116bcf-c3f3-4466-876a-1d385e933189", "DetectTime": "2023-10-30T14:02:40.140970+02:00", "EventTime": "2023-10-30T14:02:40.140998+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1IjIp35TQH3Itaxy6"]} -{"Format": "IDEA0", "ID": "34679a44-27db-4637-a526-2437ceeee083", "DetectTime": "2023-10-30T14:02:40.150638+02:00", "EventTime": "2023-10-30T14:02:40.150660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7265], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. ", "ContentType": "text/plain"}], "uids": ["CCh8Jl1QkJGUFDzcif"]} -{"Format": "IDEA0", "ID": "b22a4e51-bbe3-416e-a391-b35597620e22", "DetectTime": "2023-10-30T14:02:40.209088+02:00", "EventTime": "2023-10-30T14:02:40.209116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["CKtaMp1Y4lKGZDbCu"]} -{"Format": "IDEA0", "ID": "0761aa2b-d5a3-45bc-9cfa-8fe0fd9640ff", "DetectTime": "2023-10-30T14:02:40.278275+02:00", "EventTime": "2023-10-30T14:02:40.278304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["CLAWKy3JKDhWU6jQ68"]} -{"Format": "IDEA0", "ID": "fd743333-1eb1-4682-a0ed-5e70c687f9bb", "DetectTime": "2023-10-30T14:02:40.349622+02:00", "EventTime": "2023-10-30T14:02:40.349646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CphnPdtlwRBe8LdM1"]} -{"Format": "IDEA0", "ID": "1e0fa4cd-0461-4a91-b253-7fa7a02ecd16", "DetectTime": "2023-10-30T14:02:40.411553+02:00", "EventTime": "2023-10-30T14:02:40.411574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CZan8y7mdn7tzUGVj"]} -{"Format": "IDEA0", "ID": "c5f76b82-70cf-482a-8bd8-aac0900502f9", "DetectTime": "2023-10-30T14:02:40.462037+02:00", "EventTime": "2023-10-30T14:02:40.462052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CpPHIW2B63z1ZEsuNg"]} -{"Format": "Json", "ID": "c5f76b82-70cf-482a-8bd8-aac0900502f9", "DetectTime": "2023-10-30T14:02:40.462037+02:00", "EventTime": "2023-10-30T14:02:40.462052+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:24:22.782165+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:40.543522)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e2edc12-ed2b-4b8b-8dc4-fcc65cebf5a3", "DetectTime": "2023-10-30T14:02:40.550668+02:00", "EventTime": "2023-10-30T14:02:40.550691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. ", "ContentType": "text/plain"}], "uids": ["C6RxpL2TD7oIV1Ff2l"]} -{"Format": "IDEA0", "ID": "8bb6e969-6795-48db-980b-ea463d971eed", "DetectTime": "2023-10-30T14:02:40.610397+02:00", "EventTime": "2023-10-30T14:02:40.610421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CtuhoaaJwIEUhJSm1"]} -{"Format": "IDEA0", "ID": "585397b2-2020-43f4-9a0d-6355369413f3", "DetectTime": "2023-10-30T14:02:40.658114+02:00", "EventTime": "2023-10-30T14:02:40.658132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CNe1jb2QstDxSIuh33"]} -{"Format": "IDEA0", "ID": "c0570c6b-2431-4a58-8f94-3343b778d7ab", "DetectTime": "2023-10-30T14:02:40.702712+02:00", "EventTime": "2023-10-30T14:02:40.702730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["Cpw1EpIqOu02Yqdi"]} -{"Format": "IDEA0", "ID": "f1a1cb91-b250-498c-a02b-c06aa6825ec6", "DetectTime": "2023-10-30T14:02:40.757589+02:00", "EventTime": "2023-10-30T14:02:40.757611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21298/UDP destination IP 187.206.142.232. ", "ContentType": "text/plain"}], "uids": ["CoT13MUxAQubk8Gg1"]} -{"Format": "IDEA0", "ID": "1d1af581-3b4d-49df-b861-5c3c38e95e5e", "DetectTime": "2023-10-30T14:02:40.806190+02:00", "EventTime": "2023-10-30T14:02:40.806210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["CbHJgP3T7GlMwwYiv4"]} -{"Format": "IDEA0", "ID": "e19188d5-b03a-4c96-8c1d-beb307e1c0ed", "DetectTime": "2023-10-30T14:02:40.849222+02:00", "EventTime": "2023-10-30T14:02:40.849250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CvXs1A3snk5T2POaPg"]} -{"Format": "IDEA0", "ID": "a55d10af-9162-4205-93d1-03639af95a2b", "DetectTime": "2023-10-30T14:02:40.895487+02:00", "EventTime": "2023-10-30T14:02:40.895500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["C5JeLw49172exyXjsg"]} -{"Format": "Json", "ID": "a55d10af-9162-4205-93d1-03639af95a2b", "DetectTime": "2023-10-30T14:02:40.895487+02:00", "EventTime": "2023-10-30T14:02:40.895500+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:24:25.255120+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:40.961421)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "15eeb072-020e-49fa-92cf-ee25f4254e85", "DetectTime": "2023-10-30T14:02:40.966188+02:00", "EventTime": "2023-10-30T14:02:40.966205+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CV7R533E45aE9eduC8"]} -{"Format": "IDEA0", "ID": "aaa024f9-8ac9-468f-bdc9-7ab6a55c6315", "DetectTime": "2023-10-30T14:02:40.973296+02:00", "EventTime": "2023-10-30T14:02:40.973317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFWe5a1Vw7gSbwvha"]} -{"Format": "IDEA0", "ID": "a290298a-ceb2-4a5b-b9b9-019e52ff0ea9", "DetectTime": "2023-10-30T14:02:41.014366+02:00", "EventTime": "2023-10-30T14:02:41.014378+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcEQR63TtvBiJuYjxh"]} -{"Format": "IDEA0", "ID": "f960716c-a5c8-454f-bcfd-738dbfa131b6", "DetectTime": "2023-10-30T14:02:41.020888+02:00", "EventTime": "2023-10-30T14:02:41.020906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CKOrnA2WSVTbCfNRB2"]} -{"Format": "IDEA0", "ID": "39fa8be0-6e1c-4026-93bc-45858b2d6ec7", "DetectTime": "2023-10-30T14:02:41.047999+02:00", "EventTime": "2023-10-30T14:02:41.048018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CgqNZS3KpSLirfReff"]} -{"Format": "IDEA0", "ID": "8a07357c-e65a-4d2b-81fb-65fce21a68a0", "DetectTime": "2023-10-30T14:02:41.085941+02:00", "EventTime": "2023-10-30T14:02:41.085952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["C5jJPd2OZv29VaVG17"]} -{"Format": "IDEA0", "ID": "b64fde31-5763-4e7f-89e9-0d893bb5cc8b", "DetectTime": "2023-10-30T14:02:41.124949+02:00", "EventTime": "2023-10-30T14:02:41.124967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0Rc7uwN8xZ93yfx8"]} -{"Format": "IDEA0", "ID": "02651d4f-1c38-4723-b24f-002320f373cc", "DetectTime": "2023-10-30T14:02:41.161369+02:00", "EventTime": "2023-10-30T14:02:41.161389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["CrfeL91bgeYY14kOH5"]} -{"Format": "IDEA0", "ID": "4330092c-3220-4093-86d6-5321ce82ed6e", "DetectTime": "2023-10-30T14:02:41.195480+02:00", "EventTime": "2023-10-30T14:02:41.195497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CLEQUf3BucKPmWl3Qa"]} -{"Format": "IDEA0", "ID": "a873757e-30fc-4ac1-92e9-3bc830ae1ad8", "DetectTime": "2023-10-30T14:02:41.239930+02:00", "EventTime": "2023-10-30T14:02:41.239948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["C5PQES2xcDUO22O2L4"]} -{"Format": "IDEA0", "ID": "31b41427-83f2-4a82-952d-4858e695c9e7", "DetectTime": "2023-10-30T14:02:41.273544+02:00", "EventTime": "2023-10-30T14:02:41.273564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cv2Qdo2Fh6YECyMLt5"]} -{"Format": "Json", "ID": "31b41427-83f2-4a82-952d-4858e695c9e7", "DetectTime": "2023-10-30T14:02:41.273544+02:00", "EventTime": "2023-10-30T14:02:41.273564+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:55:43.603970+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:41.336383)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d9b119fd-90c6-4da8-b344-2ea5a584ba1e", "DetectTime": "2023-10-30T14:02:41.341319+02:00", "EventTime": "2023-10-30T14:02:41.341337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CluDD5wiaFek3BPba"]} -{"Format": "IDEA0", "ID": "9b540ab8-baba-45eb-bd26-7fd6fc8b4df4", "DetectTime": "2023-10-30T14:02:41.379215+02:00", "EventTime": "2023-10-30T14:02:41.379230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C1RAwu3ESkGp0o6Jad"]} -{"Format": "IDEA0", "ID": "92c5182f-2547-45a2-8d43-848836105c0e", "DetectTime": "2023-10-30T14:02:41.413445+02:00", "EventTime": "2023-10-30T14:02:41.413464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CnptnF1wFMXuTwfCIh"]} -{"Format": "IDEA0", "ID": "90063051-4dd1-44b2-8193-e052e4d77e59", "DetectTime": "2023-10-30T14:02:41.453042+02:00", "EventTime": "2023-10-30T14:02:41.453053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CSI1U142Z9PxAbx533"]} -{"Format": "IDEA0", "ID": "c9266b08-dd1e-4f75-8d4b-70e98fc85f25", "DetectTime": "2023-10-30T14:02:41.485250+02:00", "EventTime": "2023-10-30T14:02:41.485264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C51rAO2WY6rYPwoI9d"]} -{"Format": "IDEA0", "ID": "6172562c-a320-4475-aa07-9fee3788ae51", "DetectTime": "2023-10-30T14:02:41.522168+02:00", "EventTime": "2023-10-30T14:02:41.522186+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIElZv3Rm9hArk2LXe"]} -{"Format": "IDEA0", "ID": "fe296b7c-d4fa-47f3-af3f-6fcf1deda319", "DetectTime": "2023-10-30T14:02:41.530088+02:00", "EventTime": "2023-10-30T14:02:41.530105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CDvB3W29Ay0XqXg9re"]} -{"Format": "IDEA0", "ID": "a94a30c7-f6ee-4fc6-8b14-d40befcd8a56", "DetectTime": "2023-10-30T14:02:41.568442+02:00", "EventTime": "2023-10-30T14:02:41.568459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CM8M7e25vyxIu8kCw8"]} -{"Format": "IDEA0", "ID": "576a3975-1111-4870-ac0a-7e93b54f4b86", "DetectTime": "2023-10-30T14:02:41.604256+02:00", "EventTime": "2023-10-30T14:02:41.604275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CKH25v1qNmsZorgp69"]} -{"Format": "Json", "ID": "576a3975-1111-4870-ac0a-7e93b54f4b86", "DetectTime": "2023-10-30T14:02:41.604256+02:00", "EventTime": "2023-10-30T14:02:41.604275+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:55:44.918801+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:41.666183)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "faa8f897-38b5-4e40-8233-177796b85764", "DetectTime": "2023-10-30T14:02:41.670716+02:00", "EventTime": "2023-10-30T14:02:41.670738+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CL7HWe4MikJT1gz01g"]} -{"Format": "IDEA0", "ID": "55084944-db76-48a4-b2c4-3d1df4c7ce5e", "DetectTime": "2023-10-30T14:02:41.678662+02:00", "EventTime": "2023-10-30T14:02:41.678677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CNoKa31ij4XvLIMWC"]} -{"Format": "IDEA0", "ID": "547ddb7d-7ccf-4ce4-9d6f-12e0c2ea165d", "DetectTime": "2023-10-30T14:02:41.718007+02:00", "EventTime": "2023-10-30T14:02:41.718024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["C5dEVD2SRQexbqQYok"]} -{"Format": "IDEA0", "ID": "27d6f2f1-b8ac-4008-a8e8-c918ddba5b94", "DetectTime": "2023-10-30T14:02:41.757310+02:00", "EventTime": "2023-10-30T14:02:41.757331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CWtHCCO8sAHUo6JD8"]} -{"Format": "IDEA0", "ID": "a2c2dbec-f818-4870-91a9-949edf054a2b", "DetectTime": "2023-10-30T14:02:41.791986+02:00", "EventTime": "2023-10-30T14:02:41.792013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["C7Hi9z4jP41eEWzjDi"]} -{"Format": "IDEA0", "ID": "1bfdd383-5f60-4aa9-b73d-d005d1c5fc6f", "DetectTime": "2023-10-30T14:02:41.826854+02:00", "EventTime": "2023-10-30T14:02:41.826871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["Cx6EU73Xps6rS1aEcd"]} -{"Format": "IDEA0", "ID": "59dba61a-85fe-4c0c-b505-7469a12d54a4", "DetectTime": "2023-10-30T14:02:41.860352+02:00", "EventTime": "2023-10-30T14:02:41.860367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CI1P071xftbEmv0lUe"]} -{"Format": "IDEA0", "ID": "453f7d21-8c08-4ee0-bc04-1bc876f77e2a", "DetectTime": "2023-10-30T14:02:41.895639+02:00", "EventTime": "2023-10-30T14:02:41.895658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["C0ZnNA25knxgBdkWnf"]} -{"Format": "IDEA0", "ID": "c98f610a-146b-4677-96d1-d78d288740ba", "DetectTime": "2023-10-30T14:02:41.933264+02:00", "EventTime": "2023-10-30T14:02:41.933283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["C2JDgu2ofhXBrtyVHd"]} -{"Format": "Json", "ID": "c98f610a-146b-4677-96d1-d78d288740ba", "DetectTime": "2023-10-30T14:02:41.933264+02:00", "EventTime": "2023-10-30T14:02:41.933283+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:56:19.424630+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:41.996058)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "df11d3e4-8cf3-44a1-b424-baaf57caf113", "DetectTime": "2023-10-30T14:02:42.001548+02:00", "EventTime": "2023-10-30T14:02:42.001564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CGybgD1GDctIw74Rk"]} -{"Format": "IDEA0", "ID": "730d7ffc-f83d-447d-a23e-8b9fa71496d9", "DetectTime": "2023-10-30T14:02:42.038759+02:00", "EventTime": "2023-10-30T14:02:42.038775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6169], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. ", "ContentType": "text/plain"}], "uids": ["CavLEq12RoovGznYrk"]} -{"Format": "IDEA0", "ID": "a432bb26-6a86-408d-b670-f5f4ac066692", "DetectTime": "2023-10-30T14:02:42.073168+02:00", "EventTime": "2023-10-30T14:02:42.073188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CLkWeY2BiEuPYetMSl"]} -{"Format": "IDEA0", "ID": "24294dc6-66ca-469e-bb34-3e3e92db297d", "DetectTime": "2023-10-30T14:02:42.103653+02:00", "EventTime": "2023-10-30T14:02:42.103665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CISEDv3lk1cwhIZu4l"]} -{"Format": "IDEA0", "ID": "66d421e1-e7bd-4e95-80f9-faa50eaf48b4", "DetectTime": "2023-10-30T14:02:42.137425+02:00", "EventTime": "2023-10-30T14:02:42.137444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CCwuAF31NQJiYYAGNd"]} -{"Format": "IDEA0", "ID": "341a4133-1950-4c2d-bbc1-db703db4705d", "DetectTime": "2023-10-30T14:02:42.168980+02:00", "EventTime": "2023-10-30T14:02:42.169001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CEf5iQ2otPQBrSfM95"]} -{"Format": "IDEA0", "ID": "e22d62c0-d236-4a86-a11a-7c294ce08c0b", "DetectTime": "2023-10-30T14:02:42.203014+02:00", "EventTime": "2023-10-30T14:02:42.203031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28779], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28779/UDP destination IP 2.134.161.217. ", "ContentType": "text/plain"}], "uids": ["CspaJx1PO6TptJVmB8"]} -{"Format": "IDEA0", "ID": "13cf6650-4482-4e67-b14e-86e487275f82", "DetectTime": "2023-10-30T14:02:42.238309+02:00", "EventTime": "2023-10-30T14:02:42.238331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["C5cH4h3DalPLRcllwc"]} -{"Format": "Json", "ID": "13cf6650-4482-4e67-b14e-86e487275f82", "DetectTime": "2023-10-30T14:02:42.238309+02:00", "EventTime": "2023-10-30T14:02:42.238331+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:56:21.978528+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:42.296788)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f2978a14-f32d-4042-8842-4fb7642f8c58", "DetectTime": "2023-10-30T14:02:42.301987+02:00", "EventTime": "2023-10-30T14:02:42.302003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7265], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. ", "ContentType": "text/plain"}], "uids": ["CRphdESP9CuZMqdY9"]} -{"Format": "IDEA0", "ID": "3f996ea0-c18c-41c8-9107-8438249c829f", "DetectTime": "2023-10-30T14:02:42.332867+02:00", "EventTime": "2023-10-30T14:02:42.332882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CI71jv2EIs5jVgGuOg"]} -{"Format": "IDEA0", "ID": "4fc17023-d66e-4eb5-84ee-a5419616e914", "DetectTime": "2023-10-30T14:02:42.360891+02:00", "EventTime": "2023-10-30T14:02:42.360907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CA1wVz3aYYAF7kCnqg"]} -{"Format": "IDEA0", "ID": "74865e58-54ea-4ba3-b7e8-fc7d98884865", "DetectTime": "2023-10-30T14:02:42.391893+02:00", "EventTime": "2023-10-30T14:02:42.391914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["CtakIFXWt3Kh4yw1k"]} -{"Format": "IDEA0", "ID": "9bddb54d-73aa-40c9-b5d4-19f5ea9a936c", "DetectTime": "2023-10-30T14:02:42.421631+02:00", "EventTime": "2023-10-30T14:02:42.421650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. ", "ContentType": "text/plain"}], "uids": ["Ce8Jw01YF6rPfHV768"]} -{"Format": "IDEA0", "ID": "796e240c-9c66-40f1-8b46-6b90f7defc99", "DetectTime": "2023-10-30T14:02:42.451218+02:00", "EventTime": "2023-10-30T14:02:42.451235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CCEWH04vy5CyAy7Tn2"]} -{"Format": "IDEA0", "ID": "d1f68b38-c8f4-4d7d-be13-607c038f9e1c", "DetectTime": "2023-10-30T14:02:42.478287+02:00", "EventTime": "2023-10-30T14:02:42.478301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CJyEBO3veMXQVEFqP2"]} -{"Format": "IDEA0", "ID": "7e8a7f55-e716-4fb8-b2e1-9e99d155b96a", "DetectTime": "2023-10-30T14:02:42.506037+02:00", "EventTime": "2023-10-30T14:02:42.506048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["ClqShq19X8nzIL06df"]} -{"Format": "Json", "ID": "7e8a7f55-e716-4fb8-b2e1-9e99d155b96a", "DetectTime": "2023-10-30T14:02:42.506037+02:00", "EventTime": "2023-10-30T14:02:42.506048+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T07:56:24.087959+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2023/10/30 14:02:42.560452)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "52adba2e-633b-4a50-9347-515f8e05b44d", "DetectTime": "2023-10-30T14:02:42.565433+02:00", "EventTime": "2023-10-30T14:02:42.565444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CJKFw627PFy0UoQt51"]} -{"Format": "IDEA0", "ID": "464872e7-da35-4b1c-bc5b-8904fbafdc51", "DetectTime": "2023-10-30T14:02:42.592338+02:00", "EventTime": "2023-10-30T14:02:42.592361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["C6xyrR3yL225wKW7R3"]} -{"Format": "IDEA0", "ID": "a2a228ad-4a3d-4e40-a0b2-459c806fb3f7", "DetectTime": "2023-10-30T14:02:42.619226+02:00", "EventTime": "2023-10-30T14:02:42.619244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["C9rPYq13SI5X8fqFFb"]} -{"Format": "IDEA0", "ID": "b8ed6fa1-d463-43ce-9e21-5e74b2a6c137", "DetectTime": "2023-10-30T14:02:42.643607+02:00", "EventTime": "2023-10-30T14:02:42.643619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CVPNoG41pAEnqK6wqe"]} -{"Format": "IDEA0", "ID": "e35fff52-266f-43c4-9ba4-4cba411c42af", "DetectTime": "2023-10-30T14:02:42.670300+02:00", "EventTime": "2023-10-30T14:02:42.670318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CV7R533E45aE9eduC8", "Cl4VED15XpoShMHZz1", "CrIRjH2hGdSKb3Uqj5", "CIElZv3Rm9hArk2LXe"]} -{"Format": "IDEA0", "ID": "bd19f596-38c5-40e4-9e78-baabf789f36e", "DetectTime": "2023-10-30T14:02:42.677553+02:00", "EventTime": "2023-10-30T14:02:42.677566+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrIRjH2hGdSKb3Uqj5"]} -{"Format": "IDEA0", "ID": "ffa93ae5-97d5-4bb6-9a2d-c905b0fefeaf", "DetectTime": "2023-10-30T14:02:42.683775+02:00", "EventTime": "2023-10-30T14:02:42.683787+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGCsPF2psQOeaY6pX5"]} -{"Format": "IDEA0", "ID": "bae73d53-2b4d-49e3-ab42-3c6a6fb661db", "DetectTime": "2023-10-30T14:02:42.690112+02:00", "EventTime": "2023-10-30T14:02:42.690133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CWBsAg4hrMwVYRLWEg"]} -{"Format": "IDEA0", "ID": "1b644173-bf2d-4a2a-b257-863297773bac", "DetectTime": "2023-10-30T14:02:42.738735+02:00", "EventTime": "2023-10-30T14:02:42.738750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkGr8hf9IRqad63U"]} -{"Format": "IDEA0", "ID": "1347a587-9bc7-4007-aa8b-201516a12d26", "DetectTime": "2023-10-30T14:02:42.786428+02:00", "EventTime": "2023-10-30T14:02:42.786441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CzKQPU3LodwYrzFs1h"]} -{"Format": "IDEA0", "ID": "a80575b5-fbd3-406f-88bb-d50d2b441a00", "DetectTime": "2023-10-30T14:02:42.831313+02:00", "EventTime": "2023-10-30T14:02:42.831324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CbEE1H37V6nJOyeE23"]} -{"Format": "IDEA0", "ID": "8a3ec10d-2859-400b-80c2-afec9e01d53a", "DetectTime": "2023-10-30T14:02:42.880217+02:00", "EventTime": "2023-10-30T14:02:42.880243+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdyGEU1EKonrMfSNH4"]} -{"Format": "IDEA0", "ID": "be695834-1608-467b-9e44-8d2c2b5d4edf", "DetectTime": "2023-10-30T14:02:42.887280+02:00", "EventTime": "2023-10-30T14:02:42.887292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C24LCs4llyIqlix6R7"]} -{"Format": "Json", "ID": "be695834-1608-467b-9e44-8d2c2b5d4edf", "DetectTime": "2023-10-30T14:02:42.887280+02:00", "EventTime": "2023-10-30T14:02:42.887292+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:27:41.839713+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:43.017611)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7aca3b4e-232f-4530-9fc4-cd78a2945a92", "DetectTime": "2023-10-30T14:02:43.021818+02:00", "EventTime": "2023-10-30T14:02:43.021831+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cq7oHn3hHaAsKqnFx6"]} -{"Format": "IDEA0", "ID": "4d2081a4-07ea-4101-8acb-3f80e1da7e8d", "DetectTime": "2023-10-30T14:02:43.027955+02:00", "EventTime": "2023-10-30T14:02:43.027966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CPygJT3ubauzLACyD3"]} -{"Format": "IDEA0", "ID": "80d5e0da-9c33-4eaa-8936-00fd41e4b759", "DetectTime": "2023-10-30T14:02:43.075458+02:00", "EventTime": "2023-10-30T14:02:43.075479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CARBJY12fYcZSLzbUd"]} -{"Format": "IDEA0", "ID": "1cf2de8a-56b5-4fcb-b1d1-f382839e5615", "DetectTime": "2023-10-30T14:02:43.119910+02:00", "EventTime": "2023-10-30T14:02:43.119926+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtWb8d4nVV4LTR25ai"]} -{"Format": "IDEA0", "ID": "ad809703-8b2c-455c-91b8-41b15b60fa09", "DetectTime": "2023-10-30T14:02:43.127226+02:00", "EventTime": "2023-10-30T14:02:43.127247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CHkKO53NrwtirqAEJh"]} -{"Format": "IDEA0", "ID": "6f80ea0c-bc32-4080-9151-840c9e1cf33c", "DetectTime": "2023-10-30T14:02:43.178233+02:00", "EventTime": "2023-10-30T14:02:43.178249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21244], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. ", "ContentType": "text/plain"}], "uids": ["Cajwoq2ZJxZcMIZQQ5"]} -{"Format": "IDEA0", "ID": "c3c8084b-510d-43d8-a7b8-bb850225f00a", "DetectTime": "2023-10-30T14:02:43.233691+02:00", "EventTime": "2023-10-30T14:02:43.233709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CNoow5MPrKveyHkH9"]} -{"Format": "IDEA0", "ID": "3b956144-0e3b-4b2c-82bd-67e313d356f8", "DetectTime": "2023-10-30T14:02:43.284808+02:00", "EventTime": "2023-10-30T14:02:43.284824+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzQdugMiMYuzLSfFg"]} -{"Format": "IDEA0", "ID": "33fb61ae-cc43-44e1-80d1-2f9e610ebb83", "DetectTime": "2023-10-30T14:02:43.292568+02:00", "EventTime": "2023-10-30T14:02:43.292584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["C0iD3y117zyQS1EZs9"]} -{"Format": "IDEA0", "ID": "be169c8a-7a2c-4817-a254-65ad18561d18", "DetectTime": "2023-10-30T14:02:43.352777+02:00", "EventTime": "2023-10-30T14:02:43.352794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C08CsM2xdOrnV0ShKi"]} -{"Format": "IDEA0", "ID": "a4ea6df5-e5c5-4fff-9fe5-f5878177d642", "DetectTime": "2023-10-30T14:02:43.408821+02:00", "EventTime": "2023-10-30T14:02:43.408837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C4CPtDX8MknSwR8r6"]} -{"Format": "Json", "ID": "a4ea6df5-e5c5-4fff-9fe5-f5878177d642", "DetectTime": "2023-10-30T14:02:43.408821+02:00", "EventTime": "2023-10-30T14:02:43.408837+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:27:43.628968+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:43.489502)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f4dce2f8-abf4-4286-851e-248bb0733e97", "DetectTime": "2023-10-30T14:02:43.495119+02:00", "EventTime": "2023-10-30T14:02:43.495137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CpRJwV3zEIO95NgJf8"]} -{"Format": "IDEA0", "ID": "41b0711b-f876-4cb9-99bb-1fff37501551", "DetectTime": "2023-10-30T14:02:43.542023+02:00", "EventTime": "2023-10-30T14:02:43.542049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1438], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. ", "ContentType": "text/plain"}], "uids": ["CMk7p41LO8DRCnLPT8"]} -{"Format": "IDEA0", "ID": "001c1ff9-a764-4b1f-a886-ef0efd9eb242", "DetectTime": "2023-10-30T14:02:43.591803+02:00", "EventTime": "2023-10-30T14:02:43.591821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CkBMbA2hB1eeLc6BUk"]} -{"Format": "IDEA0", "ID": "25127ef0-c3d4-430e-85c0-c8922b93f732", "DetectTime": "2023-10-30T14:02:43.638063+02:00", "EventTime": "2023-10-30T14:02:43.638079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CFLIdz3M8W7pguCVzl"]} -{"Format": "IDEA0", "ID": "0830ef09-3f83-4db4-a9e4-aea9b4b25d33", "DetectTime": "2023-10-30T14:02:43.667832+02:00", "EventTime": "2023-10-30T14:02:43.667850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CX24wB1hJUS81gQYnb"]} -{"Format": "IDEA0", "ID": "496e6b12-29ca-4102-bccf-f474c0e6d562", "DetectTime": "2023-10-30T14:02:43.711047+02:00", "EventTime": "2023-10-30T14:02:43.711063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CkCqz922jKCJRykK1h"]} -{"Format": "IDEA0", "ID": "0be34581-155e-4da6-bc39-86264c11ddf3", "DetectTime": "2023-10-30T14:02:43.758805+02:00", "EventTime": "2023-10-30T14:02:43.758821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C77tvG41Zo9MDlN96h"]} -{"Format": "IDEA0", "ID": "084e40d5-1ee8-47d6-ba6d-812882a1c9ea", "DetectTime": "2023-10-30T14:02:43.803852+02:00", "EventTime": "2023-10-30T14:02:43.803865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5170], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. ", "ContentType": "text/plain"}], "uids": ["CGd27D3Qz5QL5yJuTk"]} -{"Format": "IDEA0", "ID": "938869ff-1a3e-4532-b939-7cffbcf555d1", "DetectTime": "2023-10-30T14:02:43.848797+02:00", "EventTime": "2023-10-30T14:02:43.848814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CUzhG84q3iVL0jro24"]} -{"Format": "Json", "ID": "938869ff-1a3e-4532-b939-7cffbcf555d1", "DetectTime": "2023-10-30T14:02:43.848797+02:00", "EventTime": "2023-10-30T14:02:43.848814+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:27:44.908331+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:43.922329)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "41e4992d-e3e8-47de-9c01-9a5bf6fc8076", "DetectTime": "2023-10-30T14:02:43.927595+02:00", "EventTime": "2023-10-30T14:02:43.927612+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CORvOC43RlU1KvYE93"]} -{"Format": "IDEA0", "ID": "2f93b63c-8bf3-4c3a-9c1d-06ff41f871b6", "DetectTime": "2023-10-30T14:02:43.972794+02:00", "EventTime": "2023-10-30T14:02:43.972812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CA2thz31onpLUJq1el"]} -{"Format": "IDEA0", "ID": "458a290c-84c7-42bb-add8-5de0d3ffe671", "DetectTime": "2023-10-30T14:02:44.010499+02:00", "EventTime": "2023-10-30T14:02:44.010509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CqW8PS3zYhv63IBpxk"]} -{"Format": "IDEA0", "ID": "9fb6bd5e-0f7c-4ef7-a251-674fd47b9371", "DetectTime": "2023-10-30T14:02:44.049766+02:00", "EventTime": "2023-10-30T14:02:44.049787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CmOumJ23ffTkfOkdqb"]} -{"Format": "IDEA0", "ID": "c4c243a5-5d27-4211-8bae-d78da1d03b17", "DetectTime": "2023-10-30T14:02:44.085256+02:00", "EventTime": "2023-10-30T14:02:44.085270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CWhHOo1uwGYBxQGdCc"]} -{"Format": "IDEA0", "ID": "b260ec18-b662-494d-824c-b81eebb1cc08", "DetectTime": "2023-10-30T14:02:44.125273+02:00", "EventTime": "2023-10-30T14:02:44.125289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CeOAzn1lAhwT1or0Ka"]} -{"Format": "IDEA0", "ID": "e7699311-3daf-4976-ac0d-057f92fabc1b", "DetectTime": "2023-10-30T14:02:44.163845+02:00", "EventTime": "2023-10-30T14:02:44.163858+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChWoc13R24Z3qFwHdh"]} -{"Format": "IDEA0", "ID": "eedef758-0882-4314-9a9c-7412ef0b344a", "DetectTime": "2023-10-30T14:02:44.169055+02:00", "EventTime": "2023-10-30T14:02:44.169071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CQ8hf51QcatlAgQvCl"]} -{"Format": "IDEA0", "ID": "e11b0b52-63ef-4b68-95ad-f31ab4ade225", "DetectTime": "2023-10-30T14:02:44.208993+02:00", "EventTime": "2023-10-30T14:02:44.209009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["Cl9vtS2rPq6Gr66cNa"]} -{"Format": "IDEA0", "ID": "9a7ce899-4023-4707-9664-2544714d4ccd", "DetectTime": "2023-10-30T14:02:44.248087+02:00", "EventTime": "2023-10-30T14:02:44.248106+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfTkTI15joFnj2Lubi"]} -{"Format": "IDEA0", "ID": "a542fe0f-0cf1-4702-984a-edcffd6a5561", "DetectTime": "2023-10-30T14:02:44.254939+02:00", "EventTime": "2023-10-30T14:02:44.254955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CgXeKO2GbSORHCGCR2"]} -{"Format": "Json", "ID": "a542fe0f-0cf1-4702-984a-edcffd6a5561", "DetectTime": "2023-10-30T14:02:44.254939+02:00", "EventTime": "2023-10-30T14:02:44.254955+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:28:05.022188+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:44.337037)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8a829d58-b6bf-4fc7-96a9-23863c928d50", "DetectTime": "2023-10-30T14:02:44.342407+02:00", "EventTime": "2023-10-30T14:02:44.342425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CPuGmu1DTnZNLqpDD3"]} -{"Format": "IDEA0", "ID": "c4f8612d-501e-476c-870f-05bffacc5981", "DetectTime": "2023-10-30T14:02:44.383092+02:00", "EventTime": "2023-10-30T14:02:44.383120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CsfVQo26hNCg4Jr8Vi"]} -{"Format": "IDEA0", "ID": "de5c0dcd-2bbd-4409-8b51-e7ab575a9078", "DetectTime": "2023-10-30T14:02:44.426033+02:00", "EventTime": "2023-10-30T14:02:44.426050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["Cbpt1D4wK7QhjorjW5"]} -{"Format": "IDEA0", "ID": "1652e1fc-7662-404f-a570-8013e96433e2", "DetectTime": "2023-10-30T14:02:44.464423+02:00", "EventTime": "2023-10-30T14:02:44.464435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CBCkn1iUvRcEaXGA6"]} -{"Format": "IDEA0", "ID": "984f987a-85be-4a74-8260-026d9e5b69d3", "DetectTime": "2023-10-30T14:02:44.504006+02:00", "EventTime": "2023-10-30T14:02:44.504032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CO1d7O2Y1KAJ1CVGhf"]} -{"Format": "IDEA0", "ID": "3f95bdf8-2fe3-454b-819b-743b1f8549a0", "DetectTime": "2023-10-30T14:02:44.545502+02:00", "EventTime": "2023-10-30T14:02:44.545524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["CzJfqw1EGBTyxs67nj"]} -{"Format": "IDEA0", "ID": "d7691a0f-7e38-4571-a601-62ddc576e32a", "DetectTime": "2023-10-30T14:02:44.590034+02:00", "EventTime": "2023-10-30T14:02:44.590057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7265], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. ", "ContentType": "text/plain"}], "uids": ["CJPXRv1yIZh2pad5Hf"]} -{"Format": "IDEA0", "ID": "113854e6-89ff-4246-9c1b-e1b012ab6858", "DetectTime": "2023-10-30T14:02:44.630449+02:00", "EventTime": "2023-10-30T14:02:44.630467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CZ3Ntg18pqoOTg5sUa"]} -{"Format": "Json", "ID": "113854e6-89ff-4246-9c1b-e1b012ab6858", "DetectTime": "2023-10-30T14:02:44.630449+02:00", "EventTime": "2023-10-30T14:02:44.630467+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:28:23.024536+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:44.702487)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9bc3a520-3e7f-4ea4-82b7-9b4c80c0ec0b", "DetectTime": "2023-10-30T14:02:44.707833+02:00", "EventTime": "2023-10-30T14:02:44.707848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["C8hl482NTHjgVlAHXa"]} -{"Format": "IDEA0", "ID": "613e86f9-2275-4062-a766-27ebd861b12d", "DetectTime": "2023-10-30T14:02:44.749504+02:00", "EventTime": "2023-10-30T14:02:44.749526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. ", "ContentType": "text/plain"}], "uids": ["CDItvvFZ9qZTwdES2"]} -{"Format": "IDEA0", "ID": "2c5077ca-c398-44a4-94cd-8afb7458f6a8", "DetectTime": "2023-10-30T14:02:44.789917+02:00", "EventTime": "2023-10-30T14:02:44.789933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CZv94k4x08MhnUENM9"]} -{"Format": "IDEA0", "ID": "1e679b14-d170-4abd-8afc-6044e0581051", "DetectTime": "2023-10-30T14:02:44.829922+02:00", "EventTime": "2023-10-30T14:02:44.829937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["CzIyOg4uoCZ7kAciLd"]} -{"Format": "IDEA0", "ID": "cef48c76-d415-4e63-9bf1-2a2a077f56bf", "DetectTime": "2023-10-30T14:02:44.867474+02:00", "EventTime": "2023-10-30T14:02:44.867485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["CeLgw2hV4F8tIgNNb"]} -{"Format": "IDEA0", "ID": "188fe420-321f-4123-aa0f-85f51c3adddf", "DetectTime": "2023-10-30T14:02:44.907505+02:00", "EventTime": "2023-10-30T14:02:44.907530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CTiqhM3aW6tOE2rJt2"]} -{"Format": "IDEA0", "ID": "36f54566-289d-4754-9aea-308425883a00", "DetectTime": "2023-10-30T14:02:44.946677+02:00", "EventTime": "2023-10-30T14:02:44.946693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CmOdBw18z12jaSxGw7"]} -{"Format": "IDEA0", "ID": "4d224312-4315-41fd-b245-1ca95c78ec95", "DetectTime": "2023-10-30T14:02:44.980958+02:00", "EventTime": "2023-10-30T14:02:44.980969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["C7uy372XQisagrMcTe"]} -{"Format": "Json", "ID": "4d224312-4315-41fd-b245-1ca95c78ec95", "DetectTime": "2023-10-30T14:02:44.980958+02:00", "EventTime": "2023-10-30T14:02:44.980969+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:28:25.562150+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:45.100566)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "87e9a752-ec47-46a6-b6c1-8ea8ecb95edc", "DetectTime": "2023-10-30T14:02:45.105284+02:00", "EventTime": "2023-10-30T14:02:45.105296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["ClGIjb3aKKMVr8eLLj"]} -{"Format": "IDEA0", "ID": "d26f7745-3a1b-4764-943f-2104ad558de7", "DetectTime": "2023-10-30T14:02:45.139143+02:00", "EventTime": "2023-10-30T14:02:45.139165+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CRrTEo4u30z8balJc8"]} -{"Format": "IDEA0", "ID": "26876a1b-257f-4443-96c7-ca985f05372e", "DetectTime": "2023-10-30T14:02:45.188992+02:00", "EventTime": "2023-10-30T14:02:45.189020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cj0iyIp1PpaIpJWSb"]} -{"Format": "IDEA0", "ID": "21b8ce53-f202-4a0b-9a5f-bbb59b218b65", "DetectTime": "2023-10-30T14:02:45.228456+02:00", "EventTime": "2023-10-30T14:02:45.228466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["Ck2SBzAqqxaIn5C4c"]} -{"Format": "IDEA0", "ID": "7db12b16-98b3-4d6d-9e36-576b108bd3e9", "DetectTime": "2023-10-30T14:02:45.261814+02:00", "EventTime": "2023-10-30T14:02:45.261830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CSEwZ5IwiXAfUV8Ug"]} -{"Format": "IDEA0", "ID": "70742d31-0eb7-4c48-bcc0-76e3538fe8bd", "DetectTime": "2023-10-30T14:02:45.295922+02:00", "EventTime": "2023-10-30T14:02:45.295943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CtMcfC1uyD2OkydSN8"]} -{"Format": "IDEA0", "ID": "05e54d52-e379-4bd6-b114-d0a8a7a20bbd", "DetectTime": "2023-10-30T14:02:45.330798+02:00", "EventTime": "2023-10-30T14:02:45.330813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CyqqcQq1ZngdrO7n7"]} -{"Format": "IDEA0", "ID": "53a8fd33-7cea-422c-bf4a-e256ea96e481", "DetectTime": "2023-10-30T14:02:45.362867+02:00", "EventTime": "2023-10-30T14:02:45.362883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CgqWteKUh0cgnN29"]} -{"Format": "IDEA0", "ID": "a14f88f5-8757-46fc-ae6e-cbd807749f62", "DetectTime": "2023-10-30T14:02:45.399015+02:00", "EventTime": "2023-10-30T14:02:45.399027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C2azecBqRZzvGIY7j"]} -{"Format": "Json", "ID": "a14f88f5-8757-46fc-ae6e-cbd807749f62", "DetectTime": "2023-10-30T14:02:45.399015+02:00", "EventTime": "2023-10-30T14:02:45.399027+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:59:01.869567+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:45.533491)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "73dc1220-e776-459e-bea5-d1cb4fcbc22e", "DetectTime": "2023-10-30T14:02:45.538803+02:00", "EventTime": "2023-10-30T14:02:45.538819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C5ECbs1EVditZSYfn"]} -{"Format": "IDEA0", "ID": "71eaedd0-18d6-4964-8d6e-d5ea2cfc3a4f", "DetectTime": "2023-10-30T14:02:45.572843+02:00", "EventTime": "2023-10-30T14:02:45.572866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CT6wQW2XIdrNiwS3T9"]} -{"Format": "IDEA0", "ID": "bbfe4076-a0f1-4e05-8737-2c76a8dabdcf", "DetectTime": "2023-10-30T14:02:45.605967+02:00", "EventTime": "2023-10-30T14:02:45.605989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CigK9t1BkPNtTpsZJ4"]} -{"Format": "IDEA0", "ID": "acf05e4d-92e8-4970-ab3c-c9fee3514ecb", "DetectTime": "2023-10-30T14:02:45.640750+02:00", "EventTime": "2023-10-30T14:02:45.640766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cl3mBHQGoLoVPqBg"]} -{"Format": "IDEA0", "ID": "eb8e6d3c-8a7d-4dde-8551-43aeac8f6462", "DetectTime": "2023-10-30T14:02:45.672749+02:00", "EventTime": "2023-10-30T14:02:45.672769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Cfohgo4hNuIAPoowB8"]} -{"Format": "IDEA0", "ID": "e099d4df-ec90-405c-9a4c-725d0f6d8d55", "DetectTime": "2023-10-30T14:02:45.707741+02:00", "EventTime": "2023-10-30T14:02:45.707757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CVVxjp408si79DseS6"]} -{"Format": "IDEA0", "ID": "30bde3cf-752b-4c67-bcac-930159a74471", "DetectTime": "2023-10-30T14:02:45.744486+02:00", "EventTime": "2023-10-30T14:02:45.744505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["ChhJ3Eh4VuihINz46"]} -{"Format": "IDEA0", "ID": "3d4b648b-44c0-4478-a756-9824e4efce57", "DetectTime": "2023-10-30T14:02:45.775844+02:00", "EventTime": "2023-10-30T14:02:45.775856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["Cc6sVr235US1JAGI06"]} -{"Format": "Json", "ID": "3d4b648b-44c0-4478-a756-9824e4efce57", "DetectTime": "2023-10-30T14:02:45.775844+02:00", "EventTime": "2023-10-30T14:02:45.775856+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T08:59:38.160565+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:45.900217)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54281bcb-6532-476f-bc50-0869dd6188dc", "DetectTime": "2023-10-30T14:02:45.904508+02:00", "EventTime": "2023-10-30T14:02:45.904525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CENXqf2ggvVUnCvs44"]} -{"Format": "IDEA0", "ID": "d08c4f5e-ea20-46d8-9f45-a61a222a6ca0", "DetectTime": "2023-10-30T14:02:45.939546+02:00", "EventTime": "2023-10-30T14:02:45.939567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CTiERP2FLw75iLOSC2"]} -{"Format": "IDEA0", "ID": "6c6d3bf8-ec93-4561-bdf8-2ed3eacad065", "DetectTime": "2023-10-30T14:02:45.973520+02:00", "EventTime": "2023-10-30T14:02:45.973542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CW3WzO2OrEVnyy7Jya"]} -{"Format": "IDEA0", "ID": "6cc7288d-9221-480d-bba0-325307ee8145", "DetectTime": "2023-10-30T14:02:46.007900+02:00", "EventTime": "2023-10-30T14:02:46.007916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["CeZpVlYVeL63AXBj5"]} -{"Format": "IDEA0", "ID": "b13b43f7-2977-4ddf-9628-8cb5bef9df5f", "DetectTime": "2023-10-30T14:02:46.040200+02:00", "EventTime": "2023-10-30T14:02:46.040218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["C5Njtm16aXWKVaUkmd"]} -{"Format": "IDEA0", "ID": "f91e3b6d-03cc-4406-9e7b-db2b78834a86", "DetectTime": "2023-10-30T14:02:46.068079+02:00", "EventTime": "2023-10-30T14:02:46.068094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CsrlSX2OOfNLWbizc5"]} -{"Format": "IDEA0", "ID": "98e1cd72-57a3-4a99-b092-975d5e26656b", "DetectTime": "2023-10-30T14:02:46.095356+02:00", "EventTime": "2023-10-30T14:02:46.095369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CjjEAu3yhNpv9urqI7"]} -{"Format": "IDEA0", "ID": "47c98259-ad72-4b55-bc5d-f83ddbd797b3", "DetectTime": "2023-10-30T14:02:46.121529+02:00", "EventTime": "2023-10-30T14:02:46.121549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CUWbBn3fzvudm5gge8"]} -{"Format": "Json", "ID": "47c98259-ad72-4b55-bc5d-f83ddbd797b3", "DetectTime": "2023-10-30T14:02:46.121529+02:00", "EventTime": "2023-10-30T14:02:46.121549+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T09:00:00.654498+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2023/10/30 14:02:46.234474)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4fa754f6-bca8-43cb-ba0e-801ed9b3c06e", "DetectTime": "2023-10-30T14:02:46.239278+02:00", "EventTime": "2023-10-30T14:02:46.239294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CyR8mD2RM7KRXi4GT5"]} -{"Format": "IDEA0", "ID": "95734f74-c7c9-4a9e-998f-bec37f23e722", "DetectTime": "2023-10-30T14:02:46.267170+02:00", "EventTime": "2023-10-30T14:02:46.267190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["Crrrs71ua3PGmMOTv2"]} -{"Format": "IDEA0", "ID": "21eb21c0-ceb2-4002-9ca8-84a37deaf051", "DetectTime": "2023-10-30T14:02:46.295374+02:00", "EventTime": "2023-10-30T14:02:46.295392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CKHKEU2EU4Hu9EWTr7"]} -{"Format": "IDEA0", "ID": "c771071d-54d6-495e-852a-f6c000f92154", "DetectTime": "2023-10-30T14:02:46.320235+02:00", "EventTime": "2023-10-30T14:02:46.320252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1243], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. ", "ContentType": "text/plain"}], "uids": ["CUTKDJrETQzqolNya"]} -{"Format": "IDEA0", "ID": "34afee12-6a6a-42cc-a1ce-4bd178dabd8e", "DetectTime": "2023-10-30T14:02:46.346731+02:00", "EventTime": "2023-10-30T14:02:46.346749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["Cpn2wH1cGyY60YbKvf"]} -{"Format": "IDEA0", "ID": "f2e16d0d-c4b5-40ea-af0d-984ca3e1b576", "DetectTime": "2023-10-30T14:02:46.377882+02:00", "EventTime": "2023-10-30T14:02:46.377903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["Cojer331ZQYf3pciXd"]} -{"Format": "IDEA0", "ID": "552cec1c-d381-479e-82e8-ff0433341d71", "DetectTime": "2023-10-30T14:02:46.408114+02:00", "EventTime": "2023-10-30T14:02:46.408132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["CcIwfE4quboWdYVDHf"]} -{"Format": "IDEA0", "ID": "f1f18607-7226-47b1-8bc0-e2ec3f3dc680", "DetectTime": "2023-10-30T14:02:46.434818+02:00", "EventTime": "2023-10-30T14:02:46.434833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. ", "ContentType": "text/plain"}], "uids": ["Clz3B63nC6pPQbrz51"]} -{"Format": "IDEA0", "ID": "48631133-3002-4b70-979c-474af6f3de07", "DetectTime": "2023-10-30T14:02:46.466495+02:00", "EventTime": "2023-10-30T14:02:46.466511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["C175SY2SuOPBUmULHd"]} -{"Format": "IDEA0", "ID": "057f464e-5f7d-47f7-8953-73751cac7e99", "DetectTime": "2023-10-30T14:02:46.500522+02:00", "EventTime": "2023-10-30T14:02:46.500533+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Hostname": ["157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.154.42.157 from 10.0.2.19. blacklisted IP AS: TELEFONICA_DE_ESPANA, ES AS3352 rDNS: 157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C7Tvz73Yff9rgYokv1"]} -{"Format": "IDEA0", "ID": "9fb3ccbd-4092-4fce-9c5e-42f48fa940ed", "DetectTime": "2023-10-30T14:02:46.548067+02:00", "EventTime": "2023-10-30T14:02:46.548086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["CYvl0e2Z4RkhDAZgsg"]} -{"Format": "IDEA0", "ID": "54807ade-538a-4670-a0c4-e7ed5184fbe1", "DetectTime": "2023-10-30T14:02:46.582554+02:00", "EventTime": "2023-10-30T14:02:46.582566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CtZ4Wo39foRydnmIvh"]} -{"Format": "IDEA0", "ID": "40d844af-0bde-4f12-8adb-c36a92e5a6fa", "DetectTime": "2023-10-30T14:02:46.610351+02:00", "EventTime": "2023-10-30T14:02:46.610367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["Cy681N1gubur5PhjWl"]} -{"Format": "Json", "ID": "40d844af-0bde-4f12-8adb-c36a92e5a6fa", "DetectTime": "2023-10-30T14:02:46.610351+02:00", "EventTime": "2023-10-30T14:02:46.610367+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T09:00:22.451097+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2023/10/30 14:02:46.880079)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "82069375-c2ae-43d9-ab0d-df0d7766e61e", "DetectTime": "2023-10-30T14:02:46.885627+02:00", "EventTime": "2023-10-30T14:02:46.885643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["C6gV6e4vZWcokOzyAk"]} -{"Format": "IDEA0", "ID": "19fbdd79-a128-4f38-9840-c7d270cc5805", "DetectTime": "2023-10-30T14:02:46.910391+02:00", "EventTime": "2023-10-30T14:02:46.910402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CQfARu3dIa8jA3tRDc"]} -{"Format": "IDEA0", "ID": "6f3d5bbd-1496-4244-a239-ecf4b16a3aa0", "DetectTime": "2023-10-30T14:02:46.934344+02:00", "EventTime": "2023-10-30T14:02:46.934360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CPd74D3GHHGjwIS344"]} -{"Format": "IDEA0", "ID": "727f306d-ecce-47b2-97b8-e38041efc18b", "DetectTime": "2023-10-30T14:02:46.964688+02:00", "EventTime": "2023-10-30T14:02:46.964704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CH5Xzf25EqcCI6IwR9"]} -{"Format": "IDEA0", "ID": "776ee46b-e81c-43cb-8765-40655b52bdc2", "DetectTime": "2023-10-30T14:02:47.000313+02:00", "EventTime": "2023-10-30T14:02:47.000331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CQupEr4BZFzhITquAh"]} -{"Format": "IDEA0", "ID": "288a7f69-d525-44f1-8b52-a0a0efb290e6", "DetectTime": "2023-10-30T14:02:47.029015+02:00", "EventTime": "2023-10-30T14:02:47.029030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["ClMaYo3sqcFWHJPL2a"]} -{"Format": "IDEA0", "ID": "8634ee86-34ef-47f4-9ac2-4327fe269c54", "DetectTime": "2023-10-30T14:02:47.057120+02:00", "EventTime": "2023-10-30T14:02:47.057133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CukbQv2vGJNbsv4dH5"]} -{"Format": "IDEA0", "ID": "4d311f5e-cf06-4359-86e4-dace4b0c3df4", "DetectTime": "2023-10-30T14:02:47.089325+02:00", "EventTime": "2023-10-30T14:02:47.089350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CYl4tdt8nvvwg40E1"]} -{"Format": "IDEA0", "ID": "ddc5928c-25ca-49cf-a3d4-8f8042725d5a", "DetectTime": "2023-10-30T14:02:47.120786+02:00", "EventTime": "2023-10-30T14:02:47.120802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CsSkwB4Em2SioO4Xse"]} -{"Format": "Json", "ID": "ddc5928c-25ca-49cf-a3d4-8f8042725d5a", "DetectTime": "2023-10-30T14:02:47.120786+02:00", "EventTime": "2023-10-30T14:02:47.120802+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T09:31:57.548987+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2023/10/30 14:02:47.242998)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d28a2ae4-b306-4295-aaf7-19abb4659ca3", "DetectTime": "2023-10-30T14:02:47.248293+02:00", "EventTime": "2023-10-30T14:02:47.248309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["C8Rtmb2Fwh8bw0rRh"]} -{"Format": "IDEA0", "ID": "a3d8abc7-9a34-4b2e-b1e8-52dfea4b511a", "DetectTime": "2023-10-30T14:02:47.282791+02:00", "EventTime": "2023-10-30T14:02:47.282808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["Cr4m1oXjnwcejzrc9"]} -{"Format": "IDEA0", "ID": "6fea2f74-e2cb-451e-be12-5d5925c1d372", "DetectTime": "2023-10-30T14:02:47.311644+02:00", "EventTime": "2023-10-30T14:02:47.311660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CB0XWd13tAhOcr5Ph"]} -{"Format": "IDEA0", "ID": "c89b67d6-cc68-49b4-a65a-668b9be09997", "DetectTime": "2023-10-30T14:02:47.339914+02:00", "EventTime": "2023-10-30T14:02:47.339933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CbRdLH2BoEe1gGhMFg"]} -{"Format": "IDEA0", "ID": "c77794f0-9cf8-438a-a0b1-95de5e5f703d", "DetectTime": "2023-10-30T14:02:47.375697+02:00", "EventTime": "2023-10-30T14:02:47.375716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CfWGHY2W9eIPt7t4i2"]} -{"Format": "IDEA0", "ID": "dc0dbe03-ca49-458d-b098-e3d3f19b7a0e", "DetectTime": "2023-10-30T14:02:47.404751+02:00", "EventTime": "2023-10-30T14:02:47.404770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C0v69cnkjdVPL7AO8"]} -{"Format": "IDEA0", "ID": "f9ec00c4-f16a-4f9a-8937-112b2bdedc87", "DetectTime": "2023-10-30T14:02:47.436693+02:00", "EventTime": "2023-10-30T14:02:47.436707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["ClsOGZuA230GNWuS2"]} -{"Format": "IDEA0", "ID": "8facba06-3ed4-4760-89de-82186a75d0f4", "DetectTime": "2023-10-30T14:02:47.465693+02:00", "EventTime": "2023-10-30T14:02:47.465711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["Cf08BYwAAZBopQZne"]} -{"Format": "Json", "ID": "8facba06-3ed4-4760-89de-82186a75d0f4", "DetectTime": "2023-10-30T14:02:47.465693+02:00", "EventTime": "2023-10-30T14:02:47.465711+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T09:31:58.864091+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2023/10/30 14:02:47.627863)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "57bbafbe-10c4-40d8-9895-c600e1314454", "DetectTime": "2023-10-30T14:02:47.632756+02:00", "EventTime": "2023-10-30T14:02:47.632768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CERoYe3PbZLIPQDGy1"]} -{"Format": "IDEA0", "ID": "a21d40b4-01d5-4959-a01d-bbeac3eb5e52", "DetectTime": "2023-10-30T14:02:47.653591+02:00", "EventTime": "2023-10-30T14:02:47.653607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CRSajr2jUACm1NHsBc"]} -{"Format": "IDEA0", "ID": "6579a986-d438-4f34-9491-616cd956b8dd", "DetectTime": "2023-10-30T14:02:47.682448+02:00", "EventTime": "2023-10-30T14:02:47.682466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["Czcieq5g6X4h9MuMl"]} -{"Format": "IDEA0", "ID": "89320b33-4bb0-4c89-825b-2840309cca02", "DetectTime": "2023-10-30T14:02:47.707707+02:00", "EventTime": "2023-10-30T14:02:47.707730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CVLE3tLdM3Vf0Yk0d"]} -{"Format": "IDEA0", "ID": "2ffca0c4-aef1-4b96-b34a-81375e5e5906", "DetectTime": "2023-10-30T14:02:47.735777+02:00", "EventTime": "2023-10-30T14:02:47.735793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CZq5b72lRO4wNN3Dea"]} -{"Format": "IDEA0", "ID": "c0a6d76d-78e9-4d85-bc8a-133780565c27", "DetectTime": "2023-10-30T14:02:47.770394+02:00", "EventTime": "2023-10-30T14:02:47.770415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. ", "ContentType": "text/plain"}], "uids": ["C99zpn4ZDs0ddVKnXh"]} -{"Format": "IDEA0", "ID": "3efa56ee-830e-4554-a9e2-3865826ec278", "DetectTime": "2023-10-30T14:02:47.799378+02:00", "EventTime": "2023-10-30T14:02:47.799395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CpQKul3eAIgZMF78M4"]} -{"Format": "IDEA0", "ID": "d1cace9e-daf5-404d-bf5d-199c7af7202d", "DetectTime": "2023-10-30T14:02:47.828751+02:00", "EventTime": "2023-10-30T14:02:47.828767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CtWb8d4nVV4LTR25ai", "CdyGEU1EKonrMfSNH4", "ChWoc13R24Z3qFwHdh", "CGkVQN3nBNvoaT6hI6"]} -{"Format": "IDEA0", "ID": "e11bfe7e-d48f-457f-8825-3416fdc035ef", "DetectTime": "2023-10-30T14:02:47.837663+02:00", "EventTime": "2023-10-30T14:02:47.837680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CruCC02c9RgpD8inhb"]} -{"Format": "IDEA0", "ID": "f0268552-c9af-4a2c-b477-3b265f4ec627", "DetectTime": "2023-10-30T14:02:47.862801+02:00", "EventTime": "2023-10-30T14:02:47.862818+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGkVQN3nBNvoaT6hI6"]} -{"Format": "IDEA0", "ID": "fd26b257-95da-47da-8121-16b3471d0dc5", "DetectTime": "2023-10-30T14:02:47.870916+02:00", "EventTime": "2023-10-30T14:02:47.870932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["CIs2vK1RDw6XP26hwc"]} -{"Format": "Json", "ID": "fd26b257-95da-47da-8121-16b3471d0dc5", "DetectTime": "2023-10-30T14:02:47.870916+02:00", "EventTime": "2023-10-30T14:02:47.870932+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T09:32:00.894238+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2023/10/30 14:02:48.027331)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3f98111b-c11c-4bca-862f-5b430edf57fb", "DetectTime": "2023-10-30T14:02:48.032055+02:00", "EventTime": "2023-10-30T14:02:48.032072+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9Dpb4vNc7YzhOph9"]} -{"Format": "IDEA0", "ID": "b5962cd2-5a7f-4361-b67f-a71ffaeafe07", "DetectTime": "2023-10-30T14:02:48.041248+02:00", "EventTime": "2023-10-30T14:02:48.041268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CzZeCu4W4BTn5Jee47"]} -{"Format": "IDEA0", "ID": "9a4936b2-62d3-4698-a05b-afdfe0a22b4b", "DetectTime": "2023-10-30T14:02:48.065960+02:00", "EventTime": "2023-10-30T14:02:48.065981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CShFnv2RQMSi5QKWxg"]} -{"Format": "IDEA0", "ID": "88cf0e56-0e85-432c-9c15-71e2eeb7c910", "DetectTime": "2023-10-30T14:02:48.090394+02:00", "EventTime": "2023-10-30T14:02:48.090413+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cjp8jaxOQ5mul93Z5"]} -{"Format": "IDEA0", "ID": "99ffc538-6d63-4c98-832e-4b4d0e3cde2e", "DetectTime": "2023-10-30T14:02:48.096537+02:00", "EventTime": "2023-10-30T14:02:48.096549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["C1dqEE2O0Q1AYDJj8b"]} -{"Format": "IDEA0", "ID": "c7c037a9-d011-4dd1-b3fd-29c5f3a09bf9", "DetectTime": "2023-10-30T14:02:48.113331+02:00", "EventTime": "2023-10-30T14:02:48.113348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["CBJ2IX2vUByzAsnV0a"]} -{"Format": "IDEA0", "ID": "7e41bd51-7222-4943-bd1a-6e81c4c8c2e4", "DetectTime": "2023-10-30T14:02:48.133737+02:00", "EventTime": "2023-10-30T14:02:48.133757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CycYoGxJVdo9riRsh"]} -{"Format": "IDEA0", "ID": "835abc17-4f74-4057-8d5f-ebc3ae40ebb9", "DetectTime": "2023-10-30T14:02:48.162614+02:00", "EventTime": "2023-10-30T14:02:48.162631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["C0jhMtTkYAcxNmjJa"]} -{"Format": "IDEA0", "ID": "ce2f6f47-166d-4361-8368-61e645c1575a", "DetectTime": "2023-10-30T14:02:48.187304+02:00", "EventTime": "2023-10-30T14:02:48.187325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["C30Ely3pVMMYhucts9"]} -{"Format": "IDEA0", "ID": "99595448-61f1-4388-9200-6b143a55b133", "DetectTime": "2023-10-30T14:02:48.209664+02:00", "EventTime": "2023-10-30T14:02:48.209676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. ", "ContentType": "text/plain"}], "uids": ["CnPBEs4UrdF9XAhmVd"]} -{"Format": "Json", "ID": "99595448-61f1-4388-9200-6b143a55b133", "DetectTime": "2023-10-30T14:02:48.209664+02:00", "EventTime": "2023-10-30T14:02:48.209676+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17275], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T09:32:22.132468+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2023/10/30 14:02:48.325757)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b74b0a04-3ee8-4135-a527-d833561bd83f", "DetectTime": "2023-10-30T14:02:48.330569+02:00", "EventTime": "2023-10-30T14:02:48.330586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CZkP2lZMeJAiPrvel"]} -{"Format": "IDEA0", "ID": "c8a6a495-8219-49a1-b8cd-bf636413d7df", "DetectTime": "2023-10-30T14:02:48.358420+02:00", "EventTime": "2023-10-30T14:02:48.358444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CUttu14tUHo9KICRp8"]} -{"Format": "IDEA0", "ID": "81a867e6-226b-45aa-b416-b7e583a68145", "DetectTime": "2023-10-30T14:02:48.377484+02:00", "EventTime": "2023-10-30T14:02:48.377500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["CAjZtx1No2iuqXu49"]} -{"Format": "IDEA0", "ID": "eef7919e-d860-4509-80d5-df6dd27cb399", "DetectTime": "2023-10-30T14:02:48.398572+02:00", "EventTime": "2023-10-30T14:02:48.398584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["CK2CYF2xgFCUEzKmn9"]} -{"Format": "IDEA0", "ID": "e67892c9-a4ee-4418-8079-32de33a9b0e8", "DetectTime": "2023-10-30T14:02:48.417423+02:00", "EventTime": "2023-10-30T14:02:48.417439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["CXnuUp351jdCWB9Sp4"]} -{"Format": "IDEA0", "ID": "94ebd5b6-3707-48e0-aed6-b152d1549f50", "DetectTime": "2023-10-30T14:02:48.440460+02:00", "EventTime": "2023-10-30T14:02:48.440477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CcFsQ84YImB5uyjGtf"]} -{"Format": "IDEA0", "ID": "d66c86d4-8f84-4d71-9331-cf399e12c4d2", "DetectTime": "2023-10-30T14:02:48.462643+02:00", "EventTime": "2023-10-30T14:02:48.462659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Ck1MlV1C5ukzbhEnH2"]} -{"Format": "IDEA0", "ID": "48acd333-9996-4524-8b66-75a6593998f2", "DetectTime": "2023-10-30T14:02:48.482871+02:00", "EventTime": "2023-10-30T14:02:48.482888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CS9EcmWjLKQo0l2Ne"]} -{"Format": "IDEA0", "ID": "25a7e6bd-b1cd-43f3-87c5-ff8cdb2ec560", "DetectTime": "2023-10-30T14:02:48.531526+02:00", "EventTime": "2023-10-30T14:02:48.531542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CLvMp84kJKU09Pztoa"]} -{"Format": "IDEA0", "ID": "7af9f635-6e81-4431-a4bf-43d24486e7dd", "DetectTime": "2023-10-30T14:02:48.577116+02:00", "EventTime": "2023-10-30T14:02:48.577131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CfC5cr2rDJD6BrJO67"]} -{"Format": "IDEA0", "ID": "51dffdde-5806-49db-bfce-baecb4eb84ea", "DetectTime": "2023-10-30T14:02:48.616849+02:00", "EventTime": "2023-10-30T14:02:48.616866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CcCeWrAUNv4yZ6w46"]} -{"Format": "IDEA0", "ID": "314105a7-bcf2-429d-8db7-486b94bd6b62", "DetectTime": "2023-10-30T14:02:48.660866+02:00", "EventTime": "2023-10-30T14:02:48.660881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["C6tcCV3QC0vXgQP7k4"]} -{"Format": "IDEA0", "ID": "839ed645-3ada-4d35-b4d7-91f474db099d", "DetectTime": "2023-10-30T14:02:48.712780+02:00", "EventTime": "2023-10-30T14:02:48.712798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C96gMg1gaCUdwcUDPb"]} -{"Format": "Json", "ID": "839ed645-3ada-4d35-b4d7-91f474db099d", "DetectTime": "2023-10-30T14:02:48.712780+02:00", "EventTime": "2023-10-30T14:02:48.712798+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:02:54.020878+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:49.251054)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "94510dec-c68c-4114-bda1-9fd9956a4838", "DetectTime": "2023-10-30T14:02:49.260774+02:00", "EventTime": "2023-10-30T14:02:49.260810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CILPPb4rXOFwZnzoEl"]} -{"Format": "IDEA0", "ID": "34c9e2e2-51d1-43d4-9dae-ba014537c3cb", "DetectTime": "2023-10-30T14:02:49.329864+02:00", "EventTime": "2023-10-30T14:02:49.329884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CKqy5M2qObycFWlBP8"]} -{"Format": "IDEA0", "ID": "f8a0459c-1b3c-4d1d-980f-c3d51cbba82c", "DetectTime": "2023-10-30T14:02:49.383007+02:00", "EventTime": "2023-10-30T14:02:49.383027+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIKgEJ1JQZFsuKdpJ7"]} -{"Format": "IDEA0", "ID": "9ceaa1d5-601d-49a8-b852-24ace335edde", "DetectTime": "2023-10-30T14:02:49.389669+02:00", "EventTime": "2023-10-30T14:02:49.389682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12489], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. ", "ContentType": "text/plain"}], "uids": ["CpgCF04fPD05bqHb1b"]} -{"Format": "IDEA0", "ID": "c1914864-c194-4cfd-9851-4b98d24f0645", "DetectTime": "2023-10-30T14:02:49.431885+02:00", "EventTime": "2023-10-30T14:02:49.431901+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CYNdlkPXsgTFTLftl"]} -{"Format": "IDEA0", "ID": "9c981632-0d65-4dda-afc2-9f96ee71b6b6", "DetectTime": "2023-10-30T14:02:49.487849+02:00", "EventTime": "2023-10-30T14:02:49.487865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C58REj3J4nY923PtH8"]} -{"Format": "IDEA0", "ID": "bc8b4e48-7cdc-4f45-8b6a-22107100fe51", "DetectTime": "2023-10-30T14:02:49.533202+02:00", "EventTime": "2023-10-30T14:02:49.533219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvPwJB2ijJzAQzhCpj"]} -{"Format": "IDEA0", "ID": "2765834e-a27f-46ec-9985-ada68eca809c", "DetectTime": "2023-10-30T14:02:49.583254+02:00", "EventTime": "2023-10-30T14:02:49.583275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C6scyV2vrVgEr9y07"]} -{"Format": "IDEA0", "ID": "678bfc1e-dfdf-4e9f-b27c-0f02bb98ed00", "DetectTime": "2023-10-30T14:02:49.630608+02:00", "EventTime": "2023-10-30T14:02:49.630624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CSy7bV38HATxUGZ25h"]} -{"Format": "IDEA0", "ID": "af36fc48-cb4c-4ee7-a9f7-9a90966fddd3", "DetectTime": "2023-10-30T14:02:49.679256+02:00", "EventTime": "2023-10-30T14:02:49.679275+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwThcD1liwxgbRvxg1"]} -{"Format": "IDEA0", "ID": "4f465616-2557-4495-af7b-d0e46e7f1394", "DetectTime": "2023-10-30T14:02:49.696287+02:00", "EventTime": "2023-10-30T14:02:49.696304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["Cpy8qCbw1y5u2f9Ud"]} -{"Format": "Json", "ID": "4f465616-2557-4495-af7b-d0e46e7f1394", "DetectTime": "2023-10-30T14:02:49.696287+02:00", "EventTime": "2023-10-30T14:02:49.696304+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:02:55.166234+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:49.829036)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c7dafca9-1df8-4406-871b-c17a6e5b1bca", "DetectTime": "2023-10-30T14:02:49.833706+02:00", "EventTime": "2023-10-30T14:02:49.833723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CZBTUH2imPhhld4Eb8"]} -{"Format": "IDEA0", "ID": "7c927be0-b630-4377-a25c-ce27d414aea3", "DetectTime": "2023-10-30T14:02:49.881912+02:00", "EventTime": "2023-10-30T14:02:49.881925+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTQyBr1zcYhuOjvYCb"]} -{"Format": "IDEA0", "ID": "99cd7086-0acf-499c-ab1a-404c8e3f3178", "DetectTime": "2023-10-30T14:02:49.895627+02:00", "EventTime": "2023-10-30T14:02:49.895645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CcCfsLly2PnwdEqpa"]} -{"Format": "IDEA0", "ID": "1dd14764-c11d-4e96-9c4d-14f6adb6cd77", "DetectTime": "2023-10-30T14:02:49.937030+02:00", "EventTime": "2023-10-30T14:02:49.937042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CAiRuD1xIeXJHYzqvf"]} -{"Format": "IDEA0", "ID": "5fb45678-b8e1-4114-bb1b-5600a6f45d92", "DetectTime": "2023-10-30T14:02:49.984353+02:00", "EventTime": "2023-10-30T14:02:49.984372+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyIMGGPxZstxJgGa8"]} -{"Format": "IDEA0", "ID": "9a25746a-619c-4d26-bd03-50e92992f742", "DetectTime": "2023-10-30T14:02:50.003603+02:00", "EventTime": "2023-10-30T14:02:50.003624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CYLEDY2Jsr6An0rMQ5"]} -{"Format": "IDEA0", "ID": "e9f8ffe3-e110-4eb7-bfba-8aa433db71b0", "DetectTime": "2023-10-30T14:02:50.045248+02:00", "EventTime": "2023-10-30T14:02:50.045260+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cxy4GV12RlELpgac1b"]} -{"Format": "IDEA0", "ID": "e52b4c04-ba1b-435b-b421-ace245e1754d", "DetectTime": "2023-10-30T14:02:50.062823+02:00", "EventTime": "2023-10-30T14:02:50.062840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C4k5RXuuja4eC5I8", "CyIMGGPxZstxJgGa8", "CwThcD1liwxgbRvxg1", "Cjp8jaxOQ5mul93Z5"]} -{"Format": "IDEA0", "ID": "0f5cdc25-ed84-494e-b7b6-c6db965e4e4a", "DetectTime": "2023-10-30T14:02:50.075315+02:00", "EventTime": "2023-10-30T14:02:50.075333+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4k5RXuuja4eC5I8"]} -{"Format": "IDEA0", "ID": "0c3c3b12-d158-4e9e-9d92-70a4661a10de", "DetectTime": "2023-10-30T14:02:50.091976+02:00", "EventTime": "2023-10-30T14:02:50.091998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CJTkuIzAItQjKPpF1"]} -{"Format": "IDEA0", "ID": "865f64e9-902d-4076-8354-f431f7a88aa7", "DetectTime": "2023-10-30T14:02:50.138570+02:00", "EventTime": "2023-10-30T14:02:50.138591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CRgNI14iO0HqVyjOJ6"]} -{"Format": "IDEA0", "ID": "5967e9b6-55eb-4885-800f-3322715b38bf", "DetectTime": "2023-10-30T14:02:50.183647+02:00", "EventTime": "2023-10-30T14:02:50.183664+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8dlN5pq9pChgATk8"]} -{"Format": "IDEA0", "ID": "e4098d3d-58aa-4206-930a-9b93cfd9410d", "DetectTime": "2023-10-30T14:02:50.197992+02:00", "EventTime": "2023-10-30T14:02:50.198008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25979], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. ", "ContentType": "text/plain"}], "uids": ["C6yMSA2SbotcpZIozj"]} -{"Format": "IDEA0", "ID": "83d2608d-437c-473f-a981-731bb1eb39c1", "DetectTime": "2023-10-30T14:02:50.244083+02:00", "EventTime": "2023-10-30T14:02:50.244099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["C52hd41CTZ4Q7HZOeh"]} -{"Format": "Json", "ID": "83d2608d-437c-473f-a981-731bb1eb39c1", "DetectTime": "2023-10-30T14:02:50.244083+02:00", "EventTime": "2023-10-30T14:02:50.244099+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:03:15.783760+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:50.392991)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9696a020-5779-4846-a052-a1a0884537df", "DetectTime": "2023-10-30T14:02:50.398004+02:00", "EventTime": "2023-10-30T14:02:50.398018+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cm3koW1UEUocywiq72"]} -{"Format": "IDEA0", "ID": "cb789569-43ab-4b4d-b8a9-fb1a440b5eba", "DetectTime": "2023-10-30T14:02:50.422364+02:00", "EventTime": "2023-10-30T14:02:50.422385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CNeIBx2NCFagAULFd1"]} -{"Format": "IDEA0", "ID": "165c81a8-c36f-4680-960b-2a9181a61ffe", "DetectTime": "2023-10-30T14:02:50.485299+02:00", "EventTime": "2023-10-30T14:02:50.485320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CXffDd1mIo7W8oeT1d"]} -{"Format": "IDEA0", "ID": "95513230-771c-48e0-98d3-979f0dd6a7c4", "DetectTime": "2023-10-30T14:02:50.536339+02:00", "EventTime": "2023-10-30T14:02:50.536356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["C4WpCu3dvw2mq6iAl"]} -{"Format": "IDEA0", "ID": "d11417fa-ae3d-4926-985a-64e435ed9335", "DetectTime": "2023-10-30T14:02:50.582107+02:00", "EventTime": "2023-10-30T14:02:50.582125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CDBBdk4ori7zHXm4Qf"]} -{"Format": "IDEA0", "ID": "97d3f69a-ee2e-4b4e-9d83-ac9bbc6a81ad", "DetectTime": "2023-10-30T14:02:50.625008+02:00", "EventTime": "2023-10-30T14:02:50.625023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CMFcGU1Kpi6G5A3FV9"]} -{"Format": "IDEA0", "ID": "126a1cd7-3bca-4d03-b6bc-e5615859d08c", "DetectTime": "2023-10-30T14:02:50.676585+02:00", "EventTime": "2023-10-30T14:02:50.676600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["C9k8Sb37QKUFBEIxv7"]} -{"Format": "IDEA0", "ID": "7d826650-188b-4dc0-b05f-8d5857f949d0", "DetectTime": "2023-10-30T14:02:50.720087+02:00", "EventTime": "2023-10-30T14:02:50.720108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["COJcUX12SZ4QX6ngtc"]} -{"Format": "IDEA0", "ID": "8dc80f6f-d3c2-4737-a395-0c353a4f10cf", "DetectTime": "2023-10-30T14:02:50.766309+02:00", "EventTime": "2023-10-30T14:02:50.766322+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnyVso4RBnymPX5FP4"]} -{"Format": "IDEA0", "ID": "f323c472-8d85-4d4b-837e-bc396dd6f3ab", "DetectTime": "2023-10-30T14:02:50.784099+02:00", "EventTime": "2023-10-30T14:02:50.784117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["COi5fC2gJ4XjNQyws8"]} -{"Format": "Json", "ID": "f323c472-8d85-4d4b-837e-bc396dd6f3ab", "DetectTime": "2023-10-30T14:02:50.784099+02:00", "EventTime": "2023-10-30T14:02:50.784117+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:03:35.232363+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:50.900612)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c43dcbfd-6bc9-458e-936e-d00709c9fcb8", "DetectTime": "2023-10-30T14:02:50.904783+02:00", "EventTime": "2023-10-30T14:02:50.904793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CekziE2sSfoaMZ0mNl"]} -{"Format": "IDEA0", "ID": "b1f47b8c-0700-4545-86fd-5b3205ddd9ec", "DetectTime": "2023-10-30T14:02:50.939503+02:00", "EventTime": "2023-10-30T14:02:50.939525+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNTpYK1Lf1uDb97Ds8"]} -{"Format": "IDEA0", "ID": "2c247071-1d4f-45d9-b2e8-a070b5b671ac", "DetectTime": "2023-10-30T14:02:50.950666+02:00", "EventTime": "2023-10-30T14:02:50.950678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CWflq52AqrdoJ56rjj"]} -{"Format": "IDEA0", "ID": "a00f40b6-d5d8-4670-a7bb-2df5877a5ed0", "DetectTime": "2023-10-30T14:02:50.984913+02:00", "EventTime": "2023-10-30T14:02:50.984930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["Cbhi2H2DxYRM7Waap1"]} -{"Format": "IDEA0", "ID": "12677d6c-ed0b-4299-8e10-dd52054f2e0e", "DetectTime": "2023-10-30T14:02:51.022621+02:00", "EventTime": "2023-10-30T14:02:51.022642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17793], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. ", "ContentType": "text/plain"}], "uids": ["CKsqpi1IM5p2XDk889"]} -{"Format": "IDEA0", "ID": "b45a4c8f-a576-4923-ad40-c01fcff38730", "DetectTime": "2023-10-30T14:02:51.060415+02:00", "EventTime": "2023-10-30T14:02:51.060433+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CHApzJ21jQYUZuFU8c"]} -{"Format": "IDEA0", "ID": "55025698-bd2e-48eb-87eb-673c9b958148", "DetectTime": "2023-10-30T14:02:51.105034+02:00", "EventTime": "2023-10-30T14:02:51.105053+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDldW54VpqiiTEKvL2"]} -{"Format": "IDEA0", "ID": "f8b4f8bf-888c-4159-ad74-049013ef2984", "DetectTime": "2023-10-30T14:02:51.118144+02:00", "EventTime": "2023-10-30T14:02:51.118158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27555], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 27555/TCP destination IP 77.50.112.98. ", "ContentType": "text/plain"}], "uids": ["C2Ch4B42Doy37R4hNd"]} -{"Format": "IDEA0", "ID": "e6ed33ba-f19b-4db2-bc9f-1532549d59d6", "DetectTime": "2023-10-30T14:02:51.157946+02:00", "EventTime": "2023-10-30T14:02:51.157967+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGZLgX3cF2kDqubaCj"]} -{"Format": "IDEA0", "ID": "9a883970-440c-4240-ab01-6ee6c4ca869b", "DetectTime": "2023-10-30T14:02:51.173547+02:00", "EventTime": "2023-10-30T14:02:51.173564+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Chab1H16kjaIe2fvZ4"]} -{"Format": "IDEA0", "ID": "b5cf2b96-49c6-426c-bf58-f96a560f3e4d", "DetectTime": "2023-10-30T14:02:51.187796+02:00", "EventTime": "2023-10-30T14:02:51.187812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CNTpYK1Lf1uDb97Ds8", "CJwZTh153Ql56yvSyc", "Cm3koW1UEUocywiq72", "CGZLgX3cF2kDqubaCj"]} -{"Format": "IDEA0", "ID": "1367c9bb-773f-4057-b2bd-68ad11ad1fdf", "DetectTime": "2023-10-30T14:02:51.200711+02:00", "EventTime": "2023-10-30T14:02:51.200724+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJwZTh153Ql56yvSyc"]} -{"Format": "IDEA0", "ID": "91c8a3be-f0c6-45c2-abd2-708d57ca5466", "DetectTime": "2023-10-30T14:02:51.216354+02:00", "EventTime": "2023-10-30T14:02:51.216376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CzJg4vGLYZh2uM9af"]} -{"Format": "IDEA0", "ID": "785cbc1c-bc2b-48f6-bc84-c03d3cfba52d", "DetectTime": "2023-10-30T14:02:51.255409+02:00", "EventTime": "2023-10-30T14:02:51.255429+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYLm0W3wSFhgI1SEqi"]} -{"Format": "IDEA0", "ID": "247103c9-085a-4db3-a0b3-5d79e4750503", "DetectTime": "2023-10-30T14:02:51.270500+02:00", "EventTime": "2023-10-30T14:02:51.270515+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuRyYC4R4DinOF9fv8"]} -{"Format": "IDEA0", "ID": "4ab3a328-9086-42ab-a305-7875f61d41a7", "DetectTime": "2023-10-30T14:02:51.285801+02:00", "EventTime": "2023-10-30T14:02:51.285811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C5kyMk3Hy2C8O7PMG8"]} -{"Format": "IDEA0", "ID": "8539e1fb-fbf0-4501-9c9b-d28e43ef4c8d", "DetectTime": "2023-10-30T14:02:51.325640+02:00", "EventTime": "2023-10-30T14:02:51.325653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["Cfa2D82njeXPT1KAri"]} -{"Format": "Json", "ID": "8539e1fb-fbf0-4501-9c9b-d28e43ef4c8d", "DetectTime": "2023-10-30T14:02:51.325640+02:00", "EventTime": "2023-10-30T14:02:51.325653+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:34:20.915098+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:51.440717)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e3b21ee-060c-4ba4-a227-fc3b22f4088a", "DetectTime": "2023-10-30T14:02:51.446233+02:00", "EventTime": "2023-10-30T14:02:51.446260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C9wvtT290UgXWQoYU6"]} -{"Format": "IDEA0", "ID": "4824d312-d7cc-44e9-8580-e703f168d0fe", "DetectTime": "2023-10-30T14:02:51.482577+02:00", "EventTime": "2023-10-30T14:02:51.482593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cbz9vT2qQo1IunvINg"]} -{"Format": "IDEA0", "ID": "3b7cf0df-1fd2-4060-814f-006e1b74fc7b", "DetectTime": "2023-10-30T14:02:51.519116+02:00", "EventTime": "2023-10-30T14:02:51.519134+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaJRbW901Pfq7dYd8"]} -{"Format": "IDEA0", "ID": "8c22d789-a8c8-48e6-99c8-c46a297f4cf2", "DetectTime": "2023-10-30T14:02:51.533312+02:00", "EventTime": "2023-10-30T14:02:51.533323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CQqdjM1zsbZ6l7mf27"]} -{"Format": "IDEA0", "ID": "bc97d0ae-fb69-4def-9dd8-477a3e4d15a4", "DetectTime": "2023-10-30T14:02:51.569754+02:00", "EventTime": "2023-10-30T14:02:51.569775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["C5Nrw115VpTylwphra"]} -{"Format": "IDEA0", "ID": "ded9ea9e-d09a-4508-a04b-aed6209b7c1e", "DetectTime": "2023-10-30T14:02:51.604031+02:00", "EventTime": "2023-10-30T14:02:51.604049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C2GGy31Y9GLMlaut"]} -{"Format": "IDEA0", "ID": "30aac73c-97ae-43a1-b0f2-ddf85eb20fc9", "DetectTime": "2023-10-30T14:02:51.635563+02:00", "EventTime": "2023-10-30T14:02:51.635574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["Cm8HAB3roDvxFCXqJ8"]} -{"Format": "IDEA0", "ID": "1a5572d7-3977-4931-ba36-34ae3ebf661a", "DetectTime": "2023-10-30T14:02:51.668114+02:00", "EventTime": "2023-10-30T14:02:51.668136+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcZFJJ3iA3HNvkOo65"]} -{"Format": "IDEA0", "ID": "a217025e-3e0d-44a0-8225-f80f5ae9ff33", "DetectTime": "2023-10-30T14:02:51.684742+02:00", "EventTime": "2023-10-30T14:02:51.684763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CGYpz01X2lGqs6ACMl"]} -{"Format": "IDEA0", "ID": "5d11e183-9c20-4797-9ea6-9df5797b1c1c", "DetectTime": "2023-10-30T14:02:51.723302+02:00", "EventTime": "2023-10-30T14:02:51.723320+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTEbE63BwirDSDPf3g"]} -{"Format": "IDEA0", "ID": "e6d27bef-f0a5-41fb-8570-38dce5b197a1", "DetectTime": "2023-10-30T14:02:51.738758+02:00", "EventTime": "2023-10-30T14:02:51.738791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CTHOFI1hZ640vS3wad"]} -{"Format": "Json", "ID": "e6d27bef-f0a5-41fb-8570-38dce5b197a1", "DetectTime": "2023-10-30T14:02:51.738758+02:00", "EventTime": "2023-10-30T14:02:51.738791+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:34:39.349750+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:51.847934)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5231da4b-b5c2-42cf-afb7-df7e7f7d1836", "DetectTime": "2023-10-30T14:02:51.853928+02:00", "EventTime": "2023-10-30T14:02:51.853950+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuNIs433TIDmIZ9RN5"]} -{"Format": "IDEA0", "ID": "ec542f54-59fa-49d0-a908-cf9722c1ff47", "DetectTime": "2023-10-30T14:02:51.870594+02:00", "EventTime": "2023-10-30T14:02:51.870606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CTJ0D53zxfZSSCt5vg"]} -{"Format": "IDEA0", "ID": "c0030f18-141d-487f-b958-b926febb0b26", "DetectTime": "2023-10-30T14:02:51.974834+02:00", "EventTime": "2023-10-30T14:02:51.974857+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.96.126.57 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CgeAJB467g1bPOEhi"]} -{"Format": "IDEA0", "ID": "cd6423ed-fb4b-4324-a395-218301ee4154", "DetectTime": "2023-10-30T14:02:52.020809+02:00", "EventTime": "2023-10-30T14:02:52.020835+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTEiDJ2bdlGkGVCzwb"]} -{"Format": "IDEA0", "ID": "c3a8d9ea-2b8c-435f-b841-9c6065682086", "DetectTime": "2023-10-30T14:02:52.032926+02:00", "EventTime": "2023-10-30T14:02:52.032937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CkSo8c3d4Q65uuKA93"]} -{"Format": "IDEA0", "ID": "aa33f280-1cf3-446d-8204-264e25088349", "DetectTime": "2023-10-30T14:02:52.062087+02:00", "EventTime": "2023-10-30T14:02:52.062103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CRzk0p1uZ64wq7vHua"]} -{"Format": "IDEA0", "ID": "183e0c21-838d-438f-8ca8-ebfbf369a0c2", "DetectTime": "2023-10-30T14:02:52.093692+02:00", "EventTime": "2023-10-30T14:02:52.093709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["Cwk3De121HVg7eSk2h"]} -{"Format": "IDEA0", "ID": "fc900ad1-4632-4773-ab9a-de62a6ffefbf", "DetectTime": "2023-10-30T14:02:52.127283+02:00", "EventTime": "2023-10-30T14:02:52.127299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CuNIs433TIDmIZ9RN5", "CuRyYC4R4DinOF9fv8", "C6za824r2zCSHwp2ye", "CcZFJJ3iA3HNvkOo65"]} -{"Format": "IDEA0", "ID": "181aa64b-50cd-4f5f-9b0d-845e1404fb45", "DetectTime": "2023-10-30T14:02:52.144933+02:00", "EventTime": "2023-10-30T14:02:52.144947+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6za824r2zCSHwp2ye"]} -{"Format": "IDEA0", "ID": "0ead6cac-6771-4632-beef-7a437fdbf590", "DetectTime": "2023-10-30T14:02:52.157598+02:00", "EventTime": "2023-10-30T14:02:52.157615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CEHgl8xx10ZqB3m3i"]} -{"Format": "IDEA0", "ID": "2bd0a660-23e1-48ec-a648-c3a217a0f933", "DetectTime": "2023-10-30T14:02:52.187374+02:00", "EventTime": "2023-10-30T14:02:52.187388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CSo62O1IJvbOfpn7d3"]} -{"Format": "IDEA0", "ID": "2284644d-5d33-4e4a-83cb-b443a97133a8", "DetectTime": "2023-10-30T14:02:52.224361+02:00", "EventTime": "2023-10-30T14:02:52.224386+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcdF4D148DJqHbux6c"]} -{"Format": "IDEA0", "ID": "0ae5558b-5a97-46e1-98da-2f2c4d115d61", "DetectTime": "2023-10-30T14:02:52.241505+02:00", "EventTime": "2023-10-30T14:02:52.241516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CtHCAp1IiCT1pR6wei"]} -{"Format": "IDEA0", "ID": "fc1053e6-9e1f-43b3-919f-c1b1a1c91fe4", "DetectTime": "2023-10-30T14:02:52.275518+02:00", "EventTime": "2023-10-30T14:02:52.275535+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CD2akQKZC47I7Ohnc"]} -{"Format": "IDEA0", "ID": "ee9e9863-2999-4ffb-83e4-5b291f9aaa9f", "DetectTime": "2023-10-30T14:02:52.291885+02:00", "EventTime": "2023-10-30T14:02:52.291897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CKOcUl4P3nlInSfhGc"]} -{"Format": "IDEA0", "ID": "51c2bebb-c8ab-43de-b39f-6e582c36713d", "DetectTime": "2023-10-30T14:02:52.322084+02:00", "EventTime": "2023-10-30T14:02:52.322105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CLTj182kFTcYG5QBre"]} -{"Format": "Json", "ID": "51c2bebb-c8ab-43de-b39f-6e582c36713d", "DetectTime": "2023-10-30T14:02:52.322084+02:00", "EventTime": "2023-10-30T14:02:52.322105+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:34:40.742481+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:52.441882)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "35a56667-f9c2-4ca9-9db9-902d57e26401", "DetectTime": "2023-10-30T14:02:52.446898+02:00", "EventTime": "2023-10-30T14:02:52.446916+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYZB5y30mh7sklLEO1"]} -{"Format": "IDEA0", "ID": "14b2d262-971b-4472-9d8d-4020bb7da398", "DetectTime": "2023-10-30T14:02:52.461900+02:00", "EventTime": "2023-10-30T14:02:52.461928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C0DmIC4D5ySPeKAGLi"]} -{"Format": "IDEA0", "ID": "00b5199c-1e42-4b37-8622-5baee1fa29dd", "DetectTime": "2023-10-30T14:02:52.494979+02:00", "EventTime": "2023-10-30T14:02:52.494991+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuZBSegT7sH1gjap3"]} -{"Format": "IDEA0", "ID": "9399a18d-2d51-46a5-b17e-736694e27da1", "DetectTime": "2023-10-30T14:02:52.509010+02:00", "EventTime": "2023-10-30T14:02:52.509025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CtwFABOqCRIiMUfU5"]} -{"Format": "IDEA0", "ID": "e571233b-ad95-4ec6-94e9-cf50e558b0f6", "DetectTime": "2023-10-30T14:02:52.541668+02:00", "EventTime": "2023-10-30T14:02:52.541688+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUE42IAM8YHEauEea"]} -{"Format": "IDEA0", "ID": "aeb15f1a-d5b4-4bb8-9d4d-6f0284f40b08", "DetectTime": "2023-10-30T14:02:52.558975+02:00", "EventTime": "2023-10-30T14:02:52.558993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CdU45NEgztoyQUczc"]} -{"Format": "IDEA0", "ID": "303866df-79ab-42be-aaf5-96aebb8d8baa", "DetectTime": "2023-10-30T14:02:52.589947+02:00", "EventTime": "2023-10-30T14:02:52.589973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CpFLJz3TQunvIl4hue"]} -{"Format": "IDEA0", "ID": "67b5b178-b776-4c54-84ae-d620604cf012", "DetectTime": "2023-10-30T14:02:52.619166+02:00", "EventTime": "2023-10-30T14:02:52.619181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Centto3wcgXEhQpxRe"]} -{"Format": "IDEA0", "ID": "0c2b417c-002b-41ce-87ca-5c685900954c", "DetectTime": "2023-10-30T14:02:52.633373+02:00", "EventTime": "2023-10-30T14:02:52.633390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CM8JhA4kbznxUEXslg"]} -{"Format": "IDEA0", "ID": "ecac2537-aa12-45f4-9303-86a94027d7db", "DetectTime": "2023-10-30T14:02:52.661650+02:00", "EventTime": "2023-10-30T14:02:52.661665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CxPy7CTvkefXEYN93"]} -{"Format": "IDEA0", "ID": "ee4782f8-7aa1-421c-9b1b-8d3122eb359f", "DetectTime": "2023-10-30T14:02:52.695290+02:00", "EventTime": "2023-10-30T14:02:52.695306+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtUK3z4mrzE1IzKRGe"]} -{"Format": "IDEA0", "ID": "64ec7892-da5b-4515-9da3-caaffcd6bfc4", "DetectTime": "2023-10-30T14:02:52.709310+02:00", "EventTime": "2023-10-30T14:02:52.709327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["CLMBmd2fxTXSDl6KNe"]} -{"Format": "IDEA0", "ID": "8567eb6d-1e10-4d7a-ac4c-a77e4895a59e", "DetectTime": "2023-10-30T14:02:52.746068+02:00", "EventTime": "2023-10-30T14:02:52.746084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CD2akQKZC47I7Ohnc", "CuZBSegT7sH1gjap3", "CbhHWU1sBWLX0rrLae", "Centto3wcgXEhQpxRe"]} -{"Format": "IDEA0", "ID": "17c1cc2e-a2b9-44bf-b34d-86ebedae1fe3", "DetectTime": "2023-10-30T14:02:52.763852+02:00", "EventTime": "2023-10-30T14:02:52.763865+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbhHWU1sBWLX0rrLae"]} -{"Format": "IDEA0", "ID": "69276367-4c2d-438c-8859-b3c05e6dc3c2", "DetectTime": "2023-10-30T14:02:52.779725+02:00", "EventTime": "2023-10-30T14:02:52.779742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["Cya4OP14K169aiewfj"]} -{"Format": "Json", "ID": "69276367-4c2d-438c-8859-b3c05e6dc3c2", "DetectTime": "2023-10-30T14:02:52.779725+02:00", "EventTime": "2023-10-30T14:02:52.779742+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T10:35:00.116059+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2023/10/30 14:02:52.902111)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9be7a9db-088f-4fdc-ad5d-e1dabbea13c0", "DetectTime": "2023-10-30T14:02:52.906843+02:00", "EventTime": "2023-10-30T14:02:52.906855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CZh9Gh1b0rkA33rhe9"]} -{"Format": "IDEA0", "ID": "cfbfb7a2-1496-40b1-9078-c3137bef41ff", "DetectTime": "2023-10-30T14:02:52.940797+02:00", "EventTime": "2023-10-30T14:02:52.940813+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CASw5y1sSkjFSzgPhf"]} -{"Format": "IDEA0", "ID": "5216a14c-a41d-441f-aca0-6c05cefe7923", "DetectTime": "2023-10-30T14:02:52.954008+02:00", "EventTime": "2023-10-30T14:02:52.954025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CqLquz438NwgFtGZn3"]} -{"Format": "IDEA0", "ID": "249efeab-3521-40d1-80a7-c29451fe5b45", "DetectTime": "2023-10-30T14:02:52.986041+02:00", "EventTime": "2023-10-30T14:02:52.986058+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGWvsv2h3G8SHCoymk"]} -{"Format": "IDEA0", "ID": "6f1cbdc4-5490-41b0-8d09-6a802c42dcfe", "DetectTime": "2023-10-30T14:02:53.003613+02:00", "EventTime": "2023-10-30T14:02:53.003629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["CQlsnC3vI55kj8keq9"]} -{"Format": "IDEA0", "ID": "8aac12f2-5dab-4270-b167-4ffd3a948ea9", "DetectTime": "2023-10-30T14:02:53.029694+02:00", "EventTime": "2023-10-30T14:02:53.029714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["C9jgvn1nCQ5lsJbWUd"]} -{"Format": "IDEA0", "ID": "8d791b89-4558-43c1-a8d5-a155c7a5fb8e", "DetectTime": "2023-10-30T14:02:53.051622+02:00", "EventTime": "2023-10-30T14:02:53.051633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["C462Os2qX2QKPvo4l8"]} -{"Format": "IDEA0", "ID": "f4dfbd94-b11e-4213-a97b-92efcbc1e1c6", "DetectTime": "2023-10-30T14:02:53.080627+02:00", "EventTime": "2023-10-30T14:02:53.080643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CbHozd3vbIqUg4PnQ1"]} -{"Format": "IDEA0", "ID": "7160e600-a527-45e2-8518-d5c30c1572f0", "DetectTime": "2023-10-30T14:02:53.106760+02:00", "EventTime": "2023-10-30T14:02:53.106773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["Cs53zTBQwh4xLK9yg"]} -{"Format": "IDEA0", "ID": "52505d4a-e02b-4633-ab9f-4c7bfbf0be32", "DetectTime": "2023-10-30T14:02:53.147174+02:00", "EventTime": "2023-10-30T14:02:53.147200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["C4a0CP2VlCqbMCaFDk"]} -{"Format": "IDEA0", "ID": "6c353ce1-debb-4a33-b117-259900a2e45a", "DetectTime": "2023-10-30T14:02:53.177845+02:00", "EventTime": "2023-10-30T14:02:53.177868+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSHUw12X2in7PbIIu3"]} -{"Format": "IDEA0", "ID": "10540d4e-5467-44be-b9c4-a570249ba04b", "DetectTime": "2023-10-30T14:02:53.196709+02:00", "EventTime": "2023-10-30T14:02:53.196722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CQjpRo10rthfhJCZ68"]} -{"Format": "IDEA0", "ID": "a8c4f7be-a00d-4c04-9dca-9bd1804a1896", "DetectTime": "2023-10-30T14:02:53.228778+02:00", "EventTime": "2023-10-30T14:02:53.228795+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Hostname": ["188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 188.169.52.202 from 10.0.2.19. blacklisted IP AS: SILKNET-AS Silknet Autonomous System, GE AS35805 rDNS: 188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CfTwmL16tHTzdSovra"]} -{"Format": "IDEA0", "ID": "9de0ae1e-bf2b-48e3-8f80-28b35df465e2", "DetectTime": "2023-10-30T14:02:53.281837+02:00", "EventTime": "2023-10-30T14:02:53.281857+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4xAezSXaJ9Hh19db"]} -{"Format": "IDEA0", "ID": "67ae7bd9-4cc9-4729-be2f-e9750f72b5bf", "DetectTime": "2023-10-30T14:02:53.295660+02:00", "EventTime": "2023-10-30T14:02:53.295672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C0yPjo1l45ObDqH909"]} -{"Format": "IDEA0", "ID": "0ce423d6-aa3c-41b2-83ba-b6fbdd874fe3", "DetectTime": "2023-10-30T14:02:53.329029+02:00", "EventTime": "2023-10-30T14:02:53.329050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["C6i33B4GF8schPdEDh"]} -{"Format": "IDEA0", "ID": "2f24ef48-153d-4293-b8bf-aa9d207268aa", "DetectTime": "2023-10-30T14:02:53.358942+02:00", "EventTime": "2023-10-30T14:02:53.358962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CIkYzC3SeBukpLDPX6"]} -{"Format": "IDEA0", "ID": "b187db9c-77cd-44c5-8eb7-0512095f5671", "DetectTime": "2023-10-30T14:02:53.389823+02:00", "EventTime": "2023-10-30T14:02:53.389842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CDSF9W3y8Z4cN54X3f"]} -{"Format": "IDEA0", "ID": "1ea041bf-efba-472a-acdc-33f4088f7279", "DetectTime": "2023-10-30T14:02:53.429221+02:00", "EventTime": "2023-10-30T14:02:53.429236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CeUbum1WLeVLEng9e1"]} -{"Format": "IDEA0", "ID": "68a64dfe-61be-42a5-bc95-5c46184472ac", "DetectTime": "2023-10-30T14:02:53.457657+02:00", "EventTime": "2023-10-30T14:02:53.457676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["C5dq7UXMqEnxLqrZ"]} -{"Format": "IDEA0", "ID": "7d046b61-c5d1-4b9c-8253-e992439450a5", "DetectTime": "2023-10-30T14:02:53.502071+02:00", "EventTime": "2023-10-30T14:02:53.502207+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9GhhJ2vQGKwCcT25d"]} -{"Format": "IDEA0", "ID": "eed78fb9-9e15-4c29-b123-0a91751382df", "DetectTime": "2023-10-30T14:02:53.522971+02:00", "EventTime": "2023-10-30T14:02:53.522997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLsQnl3zZfSkMu7ycf"]} -{"Format": "IDEA0", "ID": "f301d7a4-2bf4-4f07-8f28-0b2aee7d8379", "DetectTime": "2023-10-30T14:02:53.559445+02:00", "EventTime": "2023-10-30T14:02:53.559462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpInqe22R7zr5OSpU5"]} -{"Format": "IDEA0", "ID": "1d510dda-440a-491f-8439-59d8670ac986", "DetectTime": "2023-10-30T14:02:53.594657+02:00", "EventTime": "2023-10-30T14:02:53.594671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.16.108.58 ", "ContentType": "text/plain"}], "uids": ["CUiprw1KhZe9dhNusg"]} -{"Format": "IDEA0", "ID": "a0816e2a-e639-4696-9676-5414d6b4f963", "DetectTime": "2023-10-30T14:02:53.624028+02:00", "EventTime": "2023-10-30T14:02:53.624044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.212.179.130 ", "ContentType": "text/plain"}], "uids": ["CXNKG334Xhv8swApLe"]} -{"Format": "IDEA0", "ID": "f145b23f-dd8d-47bd-93d0-a55f3a2d0178", "DetectTime": "2023-10-30T14:02:53.656978+02:00", "EventTime": "2023-10-30T14:02:53.656999+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHIXRm30qGvHTZ2nxh"]} -{"Format": "IDEA0", "ID": "ce93d01b-959a-47f9-a6b0-9286751b56bf", "DetectTime": "2023-10-30T14:02:53.672238+02:00", "EventTime": "2023-10-30T14:02:53.672258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.130.197.245 ", "ContentType": "text/plain"}], "uids": ["Co6jkDjQ4U01Ymond"]} -{"Format": "IDEA0", "ID": "5c2429bb-48b8-4b38-ac53-7352437619f4", "DetectTime": "2023-10-30T14:02:53.704767+02:00", "EventTime": "2023-10-30T14:02:53.704791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["CfFVDoY3j5CpUPWa2"]} -{"Format": "IDEA0", "ID": "4e3fb8bd-6d45-4ca3-a0b7-10e552418428", "DetectTime": "2023-10-30T14:02:53.737235+02:00", "EventTime": "2023-10-30T14:02:53.737252+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CylXNu2xIiu3KMfDg1"]} -{"Format": "IDEA0", "ID": "c13aeab5-c8d0-4d5e-ac48-0bd31d58d6ac", "DetectTime": "2023-10-30T14:02:53.753357+02:00", "EventTime": "2023-10-30T14:02:53.753372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["Cx0nC44jyBypyFtFVa"]} -{"Format": "IDEA0", "ID": "a98065fb-b715-4dba-919a-f2e30b5c7263", "DetectTime": "2023-10-30T14:02:53.787513+02:00", "EventTime": "2023-10-30T14:02:53.787534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CZUkYk3wwGwCSEulx9"]} -{"Format": "IDEA0", "ID": "0d03e587-65c6-4017-aeba-89fcf81f8f33", "DetectTime": "2023-10-30T14:02:53.831487+02:00", "EventTime": "2023-10-30T14:02:53.831507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CQv1ay4e7Cvck0fxU9"]} -{"Format": "IDEA0", "ID": "6510a2f6-3e73-483d-92f7-2b1dc48402b7", "DetectTime": "2023-10-30T14:02:53.863180+02:00", "EventTime": "2023-10-30T14:02:53.863192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C4xAezSXaJ9Hh19db", "CypN4L2EqtkR0KINfh", "CGWvsv2h3G8SHCoymk", "CHIXRm30qGvHTZ2nxh"]} -{"Format": "IDEA0", "ID": "8a7f1017-56ff-45da-b9d0-cbf710019648", "DetectTime": "2023-10-30T14:02:53.875112+02:00", "EventTime": "2023-10-30T14:02:53.875131+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CypN4L2EqtkR0KINfh"]} -{"Format": "IDEA0", "ID": "e3025359-aad4-445e-9cd4-dc19fbe646af", "DetectTime": "2023-10-30T14:02:53.889157+02:00", "EventTime": "2023-10-30T14:02:53.889175+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGpOsT2bz3NjlOPtxb"]} -{"Format": "IDEA0", "ID": "b407fc15-890c-49a2-8fb0-3b5b2849b669", "DetectTime": "2023-10-30T14:02:53.902429+02:00", "EventTime": "2023-10-30T14:02:53.902445+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJA7274RD2uJFBwU3d"]} -{"Format": "IDEA0", "ID": "83de9ef1-8746-4e0c-965a-5aa8322a87fc", "DetectTime": "2023-10-30T14:02:53.916726+02:00", "EventTime": "2023-10-30T14:02:53.916746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["ClemKW1xVRrqg5DwY2"]} -{"Format": "IDEA0", "ID": "8ef83ffd-73c6-4486-a02e-2aa96716ffc7", "DetectTime": "2023-10-30T14:02:53.945699+02:00", "EventTime": "2023-10-30T14:02:53.945711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CCGbva29UQLmsEXV2h"]} -{"Format": "IDEA0", "ID": "d24cb7e1-2883-485d-8e03-f25378198e7d", "DetectTime": "2023-10-30T14:02:53.975607+02:00", "EventTime": "2023-10-30T14:02:53.975631+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMP7X94FllOsd4gTv8"]} -{"Format": "IDEA0", "ID": "24c69b87-ca91-4282-acc8-bc058fbc87d8", "DetectTime": "2023-10-30T14:02:53.991264+02:00", "EventTime": "2023-10-30T14:02:53.991282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CWoQrTqUyrW162hs6"]} -{"Format": "IDEA0", "ID": "f3117378-b307-42e3-b10f-2635ff49eb39", "DetectTime": "2023-10-30T14:02:54.017028+02:00", "EventTime": "2023-10-30T14:02:54.017046+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CoWWwm1702m64qDuU2"]} -{"Format": "IDEA0", "ID": "3e6c040c-3203-4006-a3f7-72ac3ac43260", "DetectTime": "2023-10-30T14:02:54.032390+02:00", "EventTime": "2023-10-30T14:02:54.032411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["Cd38bn2isDJlXOnP53"]} -{"Format": "IDEA0", "ID": "f7ff21af-f339-46f9-8235-fef3f651e0c1", "DetectTime": "2023-10-30T14:02:54.077151+02:00", "EventTime": "2023-10-30T14:02:54.077168+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CO1R7S3aa356M140O2"]} -{"Format": "IDEA0", "ID": "dc1bdd22-b947-4234-b14d-8b06775b418e", "DetectTime": "2023-10-30T14:02:54.092435+02:00", "EventTime": "2023-10-30T14:02:54.092455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CMPwTx3cQhEzA0XJJ9"]} -{"Format": "IDEA0", "ID": "4c8316d8-c627-4fc2-8127-1ec7d38dd2bb", "DetectTime": "2023-10-30T14:02:54.121859+02:00", "EventTime": "2023-10-30T14:02:54.121875+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CW431v4EeJvUr5vWxi"]} -{"Format": "IDEA0", "ID": "e196e471-0683-4834-8222-ec9e4e521ea6", "DetectTime": "2023-10-30T14:02:54.135910+02:00", "EventTime": "2023-10-30T14:02:54.135925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C1InK02ZEWXjnHMjW5"]} -{"Format": "IDEA0", "ID": "fdf0c1e1-6c6d-493e-a453-cfff6c93b468", "DetectTime": "2023-10-30T14:02:54.161256+02:00", "EventTime": "2023-10-30T14:02:54.161275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CUG0Mq4tbezTmRbjW5"]} -{"Format": "IDEA0", "ID": "8b7bf6ab-97d5-4a55-ac4e-e2a366f68ac1", "DetectTime": "2023-10-30T14:02:54.193482+02:00", "EventTime": "2023-10-30T14:02:54.193499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CoQuql1Truk3jKDDql"]} -{"Format": "IDEA0", "ID": "2fb23eae-5cf0-4617-92fb-c68f0a956ebc", "DetectTime": "2023-10-30T14:02:54.221674+02:00", "EventTime": "2023-10-30T14:02:54.221690+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cvt6if1sKT8b6tC4O"]} -{"Format": "IDEA0", "ID": "9d84f095-6c6b-479c-9387-d0d5de0bca85", "DetectTime": "2023-10-30T14:02:54.237227+02:00", "EventTime": "2023-10-30T14:02:54.237254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CJA7274RD2uJFBwU3d", "CB65EU2wzsztnaRyfa", "CoWWwm1702m64qDuU2", "CW431v4EeJvUr5vWxi"]} -{"Format": "IDEA0", "ID": "dc05e3bd-9014-4df4-b1a9-11511eb0ad85", "DetectTime": "2023-10-30T14:02:54.250014+02:00", "EventTime": "2023-10-30T14:02:54.250038+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CB65EU2wzsztnaRyfa"]} -{"Format": "IDEA0", "ID": "a2876376-3a67-4741-ab8c-bf4229da05f5", "DetectTime": "2023-10-30T14:02:54.265409+02:00", "EventTime": "2023-10-30T14:02:54.265430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CkPWbo2yjTYkU4rXa"]} -{"Format": "IDEA0", "ID": "0a98ee03-d87d-439c-8a3b-c403046f86d3", "DetectTime": "2023-10-30T14:02:54.296145+02:00", "EventTime": "2023-10-30T14:02:54.296165+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBpPDoxb5v5qqHvk5"]} -{"Format": "IDEA0", "ID": "663b6492-28c5-4ad7-842c-f82a2867e73e", "DetectTime": "2023-10-30T14:02:54.310601+02:00", "EventTime": "2023-10-30T14:02:54.310622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cf7LdB3R9VSwg1Aqlj"]} -{"Format": "Json", "ID": "663b6492-28c5-4ad7-842c-f82a2867e73e", "DetectTime": "2023-10-30T14:02:54.310601+02:00", "EventTime": "2023-10-30T14:02:54.310622+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T11:06:21.863743+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:02:54.490945)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c413afd1-2c0e-42a8-a5ff-78ecafcaa526", "DetectTime": "2023-10-30T14:02:54.495544+02:00", "EventTime": "2023-10-30T14:02:54.495557+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWIYHqX7C8CTOn7y6"]} -{"Format": "IDEA0", "ID": "91d6dffe-b0b8-4aab-bd2a-26f75e088ff3", "DetectTime": "2023-10-30T14:02:54.508757+02:00", "EventTime": "2023-10-30T14:02:54.508776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["C67Bin1d7YwQ0wTD4i"]} -{"Format": "IDEA0", "ID": "7059ca2e-e1ef-4769-973e-7adb9e175003", "DetectTime": "2023-10-30T14:02:54.538452+02:00", "EventTime": "2023-10-30T14:02:54.538470+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDqgXE1lierBZAyA26"]} -{"Format": "IDEA0", "ID": "111385ab-a211-40e1-9519-0065126da490", "DetectTime": "2023-10-30T14:02:54.550511+02:00", "EventTime": "2023-10-30T14:02:54.550531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CCkMqY14qLtoQZV4jb"]} -{"Format": "IDEA0", "ID": "dd8b07e0-99ba-4f1d-843c-f3ef7530067e", "DetectTime": "2023-10-30T14:02:54.581688+02:00", "EventTime": "2023-10-30T14:02:54.581705+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CULAYT11Xa2JNAW2Sg"]} -{"Format": "IDEA0", "ID": "5158649b-62b8-451c-a4cc-6b6b08590a49", "DetectTime": "2023-10-30T14:02:54.597543+02:00", "EventTime": "2023-10-30T14:02:54.597560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CW181VkLrWZVOsDb9"]} -{"Format": "IDEA0", "ID": "5a516d48-6ede-45fa-8e99-4930d9522c81", "DetectTime": "2023-10-30T14:02:54.623233+02:00", "EventTime": "2023-10-30T14:02:54.623257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CKLqV22AAsSYuR9kOb"]} -{"Format": "IDEA0", "ID": "29f9925d-988e-43c6-bfee-314c1854806b", "DetectTime": "2023-10-30T14:02:54.737711+02:00", "EventTime": "2023-10-30T14:02:54.737733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CNtVqd3eLMhqTooHdh"]} -{"Format": "IDEA0", "ID": "b575630c-8769-40de-9463-185eef671c88", "DetectTime": "2023-10-30T14:02:54.773019+02:00", "EventTime": "2023-10-30T14:02:54.773042+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CkIe2933gCrzNLYVyi"]} -{"Format": "IDEA0", "ID": "7d09e5a5-241d-42ba-bebd-b2dc405c8d3e", "DetectTime": "2023-10-30T14:02:54.789364+02:00", "EventTime": "2023-10-30T14:02:54.789382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CwiktE18XNpIyeHRx8"]} -{"Format": "IDEA0", "ID": "fc6c4793-9fb5-4af3-b4cf-fa29bbd2620b", "DetectTime": "2023-10-30T14:02:54.819063+02:00", "EventTime": "2023-10-30T14:02:54.819080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CiXudN3mZUWu1DWoXc"]} -{"Format": "IDEA0", "ID": "ed689f35-52e4-4073-af83-77bcd923531f", "DetectTime": "2023-10-30T14:02:54.848723+02:00", "EventTime": "2023-10-30T14:02:54.848739+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CziVrm3xLodtQbirB"]} -{"Format": "IDEA0", "ID": "0c267700-29ac-48db-9e11-388cbe1d2f11", "DetectTime": "2023-10-30T14:02:54.863391+02:00", "EventTime": "2023-10-30T14:02:54.863405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C6yloH1BZzrwS86xw"]} -{"Format": "IDEA0", "ID": "9869f71b-2200-40d2-9286-ac3bc0c6807f", "DetectTime": "2023-10-30T14:02:54.903285+02:00", "EventTime": "2023-10-30T14:02:54.903305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["ChDR24Lj83SGAYZje"]} -{"Format": "IDEA0", "ID": "2bb9c279-662d-4a9e-9a08-93c58e957c70", "DetectTime": "2023-10-30T14:02:54.933634+02:00", "EventTime": "2023-10-30T14:02:54.933657+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2dOTP1ufURNvry4u5"]} -{"Format": "IDEA0", "ID": "c393b714-6aba-4b19-bd17-b605a31151ff", "DetectTime": "2023-10-30T14:02:54.949327+02:00", "EventTime": "2023-10-30T14:02:54.949340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CULAYT11Xa2JNAW2Sg", "CziVrm3xLodtQbirB", "CWIYHqX7C8CTOn7y6", "CTnFwMVh37LGjCSuh"]} -{"Format": "IDEA0", "ID": "5d92477e-5a2f-4875-bb52-7c40d5460fa8", "DetectTime": "2023-10-30T14:02:54.961557+02:00", "EventTime": "2023-10-30T14:02:54.961568+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTnFwMVh37LGjCSuh"]} -{"Format": "IDEA0", "ID": "9cda905c-eed2-4fb3-b656-8e3fef8f8b70", "DetectTime": "2023-10-30T14:02:54.976611+02:00", "EventTime": "2023-10-30T14:02:54.976631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["Camskp4ZWcgiYcO7a"]} -{"Format": "IDEA0", "ID": "d121f69e-9582-41de-b4fc-5c8986bad216", "DetectTime": "2023-10-30T14:02:55.011377+02:00", "EventTime": "2023-10-30T14:02:55.011391+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CV8GaZ1VvuC6fCkwa4"]} -{"Format": "IDEA0", "ID": "12035feb-a681-49f3-ac71-0da1e0218bd9", "DetectTime": "2023-10-30T14:02:55.026586+02:00", "EventTime": "2023-10-30T14:02:55.026603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["Cv09518GwA0wOWLr9"]} -{"Format": "IDEA0", "ID": "7fb78bf1-3033-4b27-926e-e9c5e012986d", "DetectTime": "2023-10-30T14:02:55.057630+02:00", "EventTime": "2023-10-30T14:02:55.057645+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfoKXk383dCS4dD0n4"]} -{"Format": "IDEA0", "ID": "23983cbe-d10d-4eb0-922e-93bb6711bc9d", "DetectTime": "2023-10-30T14:02:55.072176+02:00", "EventTime": "2023-10-30T14:02:55.072268+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtSj9p469vO7Bv6c1j"]} -{"Format": "IDEA0", "ID": "0052170c-540c-4c6b-87e5-e7e299a6078d", "DetectTime": "2023-10-30T14:02:55.088267+02:00", "EventTime": "2023-10-30T14:02:55.088288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CgqYUt3KsDm9sqDEOc"]} -{"Format": "IDEA0", "ID": "94d6bad9-d43b-45f1-8030-c8dba54c3861", "DetectTime": "2023-10-30T14:02:55.119107+02:00", "EventTime": "2023-10-30T14:02:55.119127+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cc75nk2aT1GwOEenEe"]} -{"Format": "IDEA0", "ID": "fc1c5ec1-b1d4-45f8-aff3-2e92c102778f", "DetectTime": "2023-10-30T14:02:55.131174+02:00", "EventTime": "2023-10-30T14:02:55.131186+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9vu5XWj7aVQptrTj"]} -{"Format": "IDEA0", "ID": "a931a443-b859-49fd-9779-82c5fe2cdd25", "DetectTime": "2023-10-30T14:02:55.147428+02:00", "EventTime": "2023-10-30T14:02:55.147443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.15.18.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.15.18.13 ", "ContentType": "text/plain"}], "uids": ["C0zacEjUSbPKmIE92"]} -{"Format": "IDEA0", "ID": "a8ce9e2e-e56e-43fd-b243-6afca20b5e86", "DetectTime": "2023-10-30T14:02:55.176333+02:00", "EventTime": "2023-10-30T14:02:55.176351+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmRvym4tpn2dfhB84b"]} -{"Format": "IDEA0", "ID": "7fa7b543-59f5-4e2a-8aaf-5b830238d3e0", "DetectTime": "2023-10-30T14:02:55.193597+02:00", "EventTime": "2023-10-30T14:02:55.193614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["Cyi9uQ1eMeDxPiYmWh"]} -{"Format": "IDEA0", "ID": "a3658527-3514-4603-9110-11d0084bfdc6", "DetectTime": "2023-10-30T14:02:55.224136+02:00", "EventTime": "2023-10-30T14:02:55.224154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.50.25.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.50.25.51 ", "ContentType": "text/plain"}], "uids": ["CDStbv2brSR2Xrg3fc"]} -{"Format": "IDEA0", "ID": "021d96e5-6c49-448e-b3c1-6c32b90fb3de", "DetectTime": "2023-10-30T14:02:55.248944+02:00", "EventTime": "2023-10-30T14:02:55.248965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.184.50.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.184.50.84 ", "ContentType": "text/plain"}], "uids": ["CV6qMuy5Wlq4GXUC3"]} -{"Format": "IDEA0", "ID": "a827225a-ca7e-44e2-84ea-562a7f49f898", "DetectTime": "2023-10-30T14:02:55.277778+02:00", "EventTime": "2023-10-30T14:02:55.277790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.198.227.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.198.227.169 ", "ContentType": "text/plain"}], "uids": ["CGW0WS1r0kEbx8zAIj"]} -{"Format": "IDEA0", "ID": "a52b1ef3-9add-450d-a586-861df613d43e", "DetectTime": "2023-10-30T14:02:55.307451+02:00", "EventTime": "2023-10-30T14:02:55.307463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CLY8Z71mVpwo2oI8n5"]} -{"Format": "IDEA0", "ID": "b7d2b62b-6e58-4d31-9628-cdb9189e7cfa", "DetectTime": "2023-10-30T14:02:55.339132+02:00", "EventTime": "2023-10-30T14:02:55.339155+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2HXtc46AAiNw8dYye"]} -{"Format": "IDEA0", "ID": "24881692-8291-4757-ba70-2704a4b1f592", "DetectTime": "2023-10-30T14:02:55.354394+02:00", "EventTime": "2023-10-30T14:02:55.354415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CvnrOy9FYEItN6vd", "CmRvym4tpn2dfhB84b", "Cc75nk2aT1GwOEenEe", "CfoKXk383dCS4dD0n4"]} -{"Format": "IDEA0", "ID": "0c8271e1-191f-47a7-8f87-992d5cd8a7b7", "DetectTime": "2023-10-30T14:02:55.369957+02:00", "EventTime": "2023-10-30T14:02:55.369983+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvnrOy9FYEItN6vd"]} -{"Format": "IDEA0", "ID": "1c8e778b-1a1d-4e59-a08d-93a9dea33856", "DetectTime": "2023-10-30T14:02:55.391359+02:00", "EventTime": "2023-10-30T14:02:55.391386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.183.4.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.183.4.18 ", "ContentType": "text/plain"}], "uids": ["CwuchEPOqheKPyp76"]} -{"Format": "IDEA0", "ID": "73f31f24-e538-4d8b-968c-d7deca873974", "DetectTime": "2023-10-30T14:02:55.420784+02:00", "EventTime": "2023-10-30T14:02:55.420803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.190.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.190.82 ", "ContentType": "text/plain"}], "uids": ["CtGtPF1sqSiDheDwm8"]} -{"Format": "IDEA0", "ID": "8aaf2fbc-8552-43cc-8b69-b5c798e3bd7f", "DetectTime": "2023-10-30T14:02:55.448766+02:00", "EventTime": "2023-10-30T14:02:55.448779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CJW2M7hJF63Bu7Ur3"]} -{"Format": "IDEA0", "ID": "e42b097c-6d8e-4ccf-b837-2f973c84b39a", "DetectTime": "2023-10-30T14:02:55.478383+02:00", "EventTime": "2023-10-30T14:02:55.478399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CLCnlNJ70Nup0HQUk"]} -{"Format": "IDEA0", "ID": "e8678673-0547-4c54-9469-dfb44f0e35fb", "DetectTime": "2023-10-30T14:02:55.507638+02:00", "EventTime": "2023-10-30T14:02:55.507654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["134.90.252.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 134.90.252.19 ", "ContentType": "text/plain"}], "uids": ["C4qNebka0ahh4uTf6"]} -{"Format": "IDEA0", "ID": "d4e2c009-fd59-4c88-80d8-6d67f776b3d4", "DetectTime": "2023-10-30T14:02:55.535496+02:00", "EventTime": "2023-10-30T14:02:55.535513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMkJRm3T1JrbY1CH03"]} -{"Format": "IDEA0", "ID": "f54cd70d-ac5c-4e9d-b644-5bca3bb6aa72", "DetectTime": "2023-10-30T14:02:55.549980+02:00", "EventTime": "2023-10-30T14:02:55.549996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.100.136.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.100.136.55 ", "ContentType": "text/plain"}], "uids": ["CeQgxR2WSd7FwmTfLe"]} -{"Format": "IDEA0", "ID": "69497765-fbac-4e5c-8803-7ef58c71c34d", "DetectTime": "2023-10-30T14:02:55.577170+02:00", "EventTime": "2023-10-30T14:02:55.577181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.111.78.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.111.78.121 ", "ContentType": "text/plain"}], "uids": ["CqUEyq2CD6b62Gs738"]} -{"Format": "IDEA0", "ID": "2fbcae60-125e-4a04-941c-364f23da919f", "DetectTime": "2023-10-30T14:02:55.607614+02:00", "EventTime": "2023-10-30T14:02:55.607640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CpCp962DChiHX0nQbk"]} -{"Format": "IDEA0", "ID": "b8fdf2a7-50ce-4baa-9ed8-f58587bfac36", "DetectTime": "2023-10-30T14:02:55.645685+02:00", "EventTime": "2023-10-30T14:02:55.645698+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cct56M10iu6Vp2UO0d"]} -{"Format": "IDEA0", "ID": "0f44516d-bc8e-45f4-ac1f-18675698bf45", "DetectTime": "2023-10-30T14:02:55.660963+02:00", "EventTime": "2023-10-30T14:02:55.660991+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck91PFjrB2L0RNZDl"]} -{"Format": "IDEA0", "ID": "698e598d-e946-4787-be26-05b2e7092de8", "DetectTime": "2023-10-30T14:02:55.672107+02:00", "EventTime": "2023-10-30T14:02:55.672124+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZ9u321MTS0vD8G2nc"]} -{"Format": "IDEA0", "ID": "fa360eec-49e3-4b65-a4cd-7ab54d20501f", "DetectTime": "2023-10-30T14:02:55.683958+02:00", "EventTime": "2023-10-30T14:02:55.683974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["C0eOhn4o10HhciDi1b"]} -{"Format": "IDEA0", "ID": "d0f4d045-2d34-4ff9-a683-6eace3ef8525", "DetectTime": "2023-10-30T14:02:55.717062+02:00", "EventTime": "2023-10-30T14:02:55.717078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.14.79.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.14.79.162 ", "ContentType": "text/plain"}], "uids": ["CSNL4JURB1mcNQWf"]} -{"Format": "IDEA0", "ID": "356970bf-173d-4995-b59a-5c6c2c30aaaf", "DetectTime": "2023-10-30T14:02:55.750434+02:00", "EventTime": "2023-10-30T14:02:55.750461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.220.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.220.87 ", "ContentType": "text/plain"}], "uids": ["CIo8O6pP3TaoTH0X6"]} -{"Format": "IDEA0", "ID": "07572da6-7ad8-42e0-9928-f0e8ad3aae91", "DetectTime": "2023-10-30T14:02:55.791154+02:00", "EventTime": "2023-10-30T14:02:55.791175+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSQrwj2FyzVSzi7gZa"]} -{"Format": "IDEA0", "ID": "9db2a5a6-cbab-488c-9f81-28b2c4bee934", "DetectTime": "2023-10-30T14:02:55.805201+02:00", "EventTime": "2023-10-30T14:02:55.805225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["CxCO844Fr6dBZcfNLj"]} -{"Format": "IDEA0", "ID": "4b10f131-96b9-4cbe-951f-060109279667", "DetectTime": "2023-10-30T14:02:55.839211+02:00", "EventTime": "2023-10-30T14:02:55.839229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.108.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.160.108.250 ", "ContentType": "text/plain"}], "uids": ["CFoxXq282bSnVoXl13"]} -{"Format": "IDEA0", "ID": "ef2c9a3b-1219-4084-923b-602ecad43ef1", "DetectTime": "2023-10-30T14:02:55.875250+02:00", "EventTime": "2023-10-30T14:02:55.875274+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["COdAil2R78J2xDXeDj"]} -{"Format": "IDEA0", "ID": "68c899ba-599e-4481-bb79-d9811c224bb5", "DetectTime": "2023-10-30T14:02:55.890002+02:00", "EventTime": "2023-10-30T14:02:55.890020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CXmEAa4NFAJrk28bEh"]} -{"Format": "IDEA0", "ID": "ca2e2e11-a853-40a1-b55b-842406f6a3f5", "DetectTime": "2023-10-30T14:02:55.928928+02:00", "EventTime": "2023-10-30T14:02:55.928948+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWmVac2EGIpxZMXtQ"]} -{"Format": "IDEA0", "ID": "ad47c2af-6aba-4e38-a236-77c1aa7d0687", "DetectTime": "2023-10-30T14:02:55.946502+02:00", "EventTime": "2023-10-30T14:02:55.946521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["COdAil2R78J2xDXeDj", "Cgl2xr26pAO2eD3g9b", "Cct56M10iu6Vp2UO0d", "CZ9u321MTS0vD8G2nc"]} -{"Format": "IDEA0", "ID": "d81aa94f-a8b8-4630-a685-3a23da0cd568", "DetectTime": "2023-10-30T14:02:55.963084+02:00", "EventTime": "2023-10-30T14:02:55.963105+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cgl2xr26pAO2eD3g9b"]} -{"Format": "IDEA0", "ID": "041abed0-7155-4967-8082-64471691078b", "DetectTime": "2023-10-30T14:02:55.977271+02:00", "EventTime": "2023-10-30T14:02:55.977289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CSvxV1FGmH3AYOXua"]} -{"Format": "IDEA0", "ID": "e312790a-2446-40aa-b07b-3525733a5557", "DetectTime": "2023-10-30T14:02:56.012956+02:00", "EventTime": "2023-10-30T14:02:56.012975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.168.116.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.168.116.205 ", "ContentType": "text/plain"}], "uids": ["C2qzIYHTFf6ROsbh"]} -{"Format": "IDEA0", "ID": "c0c64659-417e-4a07-b208-40c63e3e50e5", "DetectTime": "2023-10-30T14:02:56.049807+02:00", "EventTime": "2023-10-30T14:02:56.049824+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP350L2LIX0CxputUa"]} -{"Format": "IDEA0", "ID": "8de962e0-3e8f-4eb0-bc8c-cfbc1c79b015", "DetectTime": "2023-10-30T14:02:56.064257+02:00", "EventTime": "2023-10-30T14:02:56.064272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.178.14.172"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.178.14.172 ", "ContentType": "text/plain"}], "uids": ["ChVMoIztnSuKSLSge"]} -{"Format": "IDEA0", "ID": "e95bad53-bb34-4aa9-bdb7-dd0f5f5399fb", "DetectTime": "2023-10-30T14:02:56.101154+02:00", "EventTime": "2023-10-30T14:02:56.101170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CDUwUi2gOGJ2TZEYXb"]} -{"Format": "IDEA0", "ID": "907ccb9b-9ce5-46f7-a2b0-bff25b971502", "DetectTime": "2023-10-30T14:02:56.141823+02:00", "EventTime": "2023-10-30T14:02:56.141847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.107.159.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.107.159.117 ", "ContentType": "text/plain"}], "uids": ["CDOolw2PEvUiX1y5l1"]} -{"Format": "IDEA0", "ID": "2f19c25d-99d9-466d-a576-d550ead7df08", "DetectTime": "2023-10-30T14:02:56.180364+02:00", "EventTime": "2023-10-30T14:02:56.180381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["4.26.210.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 4.26.210.154 ", "ContentType": "text/plain"}], "uids": ["Cawxmy3Pe13SzH4uy5"]} -{"Format": "IDEA0", "ID": "86825ef3-4c49-44c0-b93c-eed99da8eec2", "DetectTime": "2023-10-30T14:02:56.217062+02:00", "EventTime": "2023-10-30T14:02:56.217078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.93.105.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.93.105.248 ", "ContentType": "text/plain"}], "uids": ["CbEQ681KiN3qkRattb"]} -{"Format": "IDEA0", "ID": "3be175f5-bae6-4706-afc7-ccb80ea41bb0", "DetectTime": "2023-10-30T14:02:56.259157+02:00", "EventTime": "2023-10-30T14:02:56.259175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.133.71.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.133.71.34 ", "ContentType": "text/plain"}], "uids": ["CUuVuz1kp0jPI6Bo5d"]} -{"Format": "IDEA0", "ID": "e68f158a-e235-4512-a797-b307a406b780", "DetectTime": "2023-10-30T14:02:56.297207+02:00", "EventTime": "2023-10-30T14:02:56.297229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.239.247.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.239.247.143 ", "ContentType": "text/plain"}], "uids": ["CL3gzp46vuI61s3K4k"]} -{"Format": "IDEA0", "ID": "95702c94-9282-417f-b9eb-6e85ce9d158a", "DetectTime": "2023-10-30T14:02:56.332144+02:00", "EventTime": "2023-10-30T14:02:56.332160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["CJitJX1jFpEpcvhCTg"]} -{"Format": "IDEA0", "ID": "ceccdb87-d891-4e08-b95f-d1a03433235d", "DetectTime": "2023-10-30T14:02:56.372034+02:00", "EventTime": "2023-10-30T14:02:56.372054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.144.127.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.144.127.243 ", "ContentType": "text/plain"}], "uids": ["CLV8EU1DiW5OjDcLO6"]} -{"Format": "IDEA0", "ID": "a82353cd-9d2c-402b-b45f-eec40a981d93", "DetectTime": "2023-10-30T14:02:56.412504+02:00", "EventTime": "2023-10-30T14:02:56.412526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["C6N6TW14Y3MRGNItsk"]} -{"Format": "IDEA0", "ID": "caa10b22-6cb2-49e7-86bf-a69bc7ebfe2e", "DetectTime": "2023-10-30T14:02:56.448803+02:00", "EventTime": "2023-10-30T14:02:56.448831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.207.189.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.207.189.134 ", "ContentType": "text/plain"}], "uids": ["C87ar83kiXZuSVHtn9"]} -{"Format": "IDEA0", "ID": "38a25bbb-e6cc-4744-b80c-6d21088f7e76", "DetectTime": "2023-10-30T14:02:56.480348+02:00", "EventTime": "2023-10-30T14:02:56.480368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.120.59.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.120.59.74 ", "ContentType": "text/plain"}], "uids": ["CpnGat20D0tB8DqY02"]} -{"Format": "IDEA0", "ID": "b8a11241-539c-455d-9cf3-43a80385e707", "DetectTime": "2023-10-30T14:02:56.512769+02:00", "EventTime": "2023-10-30T14:02:56.512788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["C61oE9OFcxATUKEd9"]} -{"Format": "IDEA0", "ID": "7b802220-1da8-418a-9b61-137fdf092408", "DetectTime": "2023-10-30T14:02:56.544910+02:00", "EventTime": "2023-10-30T14:02:56.544927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.232.123"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.232.123 ", "ContentType": "text/plain"}], "uids": ["C92kTY2GA2Eyd1Grl7"]} -{"Format": "IDEA0", "ID": "8e2fd9f8-7b24-4b03-b37b-daa99adb429f", "DetectTime": "2023-10-30T14:02:56.578534+02:00", "EventTime": "2023-10-30T14:02:56.578552+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cs6MxX2vhyv68s5Bj7"]} -{"Format": "IDEA0", "ID": "8dff1348-0891-4659-a74b-5d728668055c", "DetectTime": "2023-10-30T14:02:56.592670+02:00", "EventTime": "2023-10-30T14:02:56.592692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.192.36.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.192.36.17 ", "ContentType": "text/plain"}], "uids": ["C5fQ3UXejQnQC6R67"]} -{"Format": "IDEA0", "ID": "6b1140a2-9d0e-4cf9-b654-ebf32a4bcbf6", "DetectTime": "2023-10-30T14:02:56.623951+02:00", "EventTime": "2023-10-30T14:02:56.623971+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIABZW1jEJ8S5TdXf"]} -{"Format": "IDEA0", "ID": "9162fc44-d9ce-4b13-8066-2d967d01cb52", "DetectTime": "2023-10-30T14:02:56.636748+02:00", "EventTime": "2023-10-30T14:02:56.636767+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cdppks4vcd5sKbC0fj"]} -{"Format": "IDEA0", "ID": "cbbd3504-7722-46e3-ae1e-3756ea79a154", "DetectTime": "2023-10-30T14:02:56.649198+02:00", "EventTime": "2023-10-30T14:02:56.649225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5U4cl1oh8MCor0Quh"]} -{"Format": "IDEA0", "ID": "0e25b2a7-a22e-4ab9-9197-f49c8081c35c", "DetectTime": "2023-10-30T14:02:56.683294+02:00", "EventTime": "2023-10-30T14:02:56.683314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["C3W3dA48DyXxD5UvD1"]} -{"Format": "IDEA0", "ID": "dfc9fe90-e698-4b35-ab13-4e8cd47184c0", "DetectTime": "2023-10-30T14:02:56.716145+02:00", "EventTime": "2023-10-30T14:02:56.716163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUukEK3NBS8dYjZoe"]} -{"Format": "IDEA0", "ID": "c0ebd5bf-eeef-4640-87a5-135be2bd57f7", "DetectTime": "2023-10-30T14:02:56.729692+02:00", "EventTime": "2023-10-30T14:02:56.729710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Ch2Jbh2BOLzpvmivma"]} -{"Format": "IDEA0", "ID": "58ccdfc1-ed50-42c1-99c9-e4f5afef7333", "DetectTime": "2023-10-30T14:02:56.762612+02:00", "EventTime": "2023-10-30T14:02:56.762632+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQgM4AVGzV7B4Vl3d"]} -{"Format": "IDEA0", "ID": "7fa73e25-b460-4be2-9ab1-5d3205363208", "DetectTime": "2023-10-30T14:02:56.777770+02:00", "EventTime": "2023-10-30T14:02:56.777790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.35.23.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.35.23.156 ", "ContentType": "text/plain"}], "uids": ["Cd7sKi3Mc8NMrPeb2"]} -{"Format": "IDEA0", "ID": "73a4de4a-c0b7-4a8e-ae3b-1f0c9811f73c", "DetectTime": "2023-10-30T14:02:56.811801+02:00", "EventTime": "2023-10-30T14:02:56.811812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.174.204.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.174.204.17 ", "ContentType": "text/plain"}], "uids": ["C9RjHo3eRPqomZpm13"]} -{"Format": "IDEA0", "ID": "c2dff538-a285-461f-90e6-a764aecd9343", "DetectTime": "2023-10-30T14:02:56.841073+02:00", "EventTime": "2023-10-30T14:02:56.841091+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CE0mzO2naIehvkp4Uh"]} -{"Format": "IDEA0", "ID": "09b51266-742a-4020-9446-8f3f28afe011", "DetectTime": "2023-10-30T14:02:56.895510+02:00", "EventTime": "2023-10-30T14:02:56.895525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.110.72.32"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.110.72.32 ", "ContentType": "text/plain"}], "uids": ["C7GmUo1iSLvo5GdKn2"]} -{"Format": "IDEA0", "ID": "5e8bba80-dfa1-4db2-86aa-600db7fc3835", "DetectTime": "2023-10-30T14:02:56.927821+02:00", "EventTime": "2023-10-30T14:02:56.927841+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPIFBM1mKehFNC4w09"]} -{"Format": "IDEA0", "ID": "2f7f13bf-32a2-4f44-a930-2f8669aac1c5", "DetectTime": "2023-10-30T14:02:56.940292+02:00", "EventTime": "2023-10-30T14:02:56.940308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cs6MxX2vhyv68s5Bj7", "CW3XP324B8JE2vMKch", "CQgM4AVGzV7B4Vl3d", "Cdppks4vcd5sKbC0fj"]} -{"Format": "IDEA0", "ID": "41497d94-aeb9-434c-bb63-5916a4ca55db", "DetectTime": "2023-10-30T14:02:56.952186+02:00", "EventTime": "2023-10-30T14:02:56.952205+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CW3XP324B8JE2vMKch"]} -{"Format": "IDEA0", "ID": "03637678-036e-4644-82d4-64347d3f7e79", "DetectTime": "2023-10-30T14:02:56.967543+02:00", "EventTime": "2023-10-30T14:02:56.967564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.118.193.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.118.193.177 ", "ContentType": "text/plain"}], "uids": ["CCEvhc4t5WuxqH40Ee"]} -{"Format": "IDEA0", "ID": "a0fb4c87-0b95-4525-bb5c-70a015e09957", "DetectTime": "2023-10-30T14:02:57.001390+02:00", "EventTime": "2023-10-30T14:02:57.001409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.160.175.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.160.175.150 ", "ContentType": "text/plain"}], "uids": ["C3aICRQw9tAAsu21a"]} -{"Format": "IDEA0", "ID": "41712239-09d4-42b4-8ca7-78de56f0e93b", "DetectTime": "2023-10-30T14:02:57.035147+02:00", "EventTime": "2023-10-30T14:02:57.035172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.96.223.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.96.223.144 ", "ContentType": "text/plain"}], "uids": ["CEgNmz1FLYhhyxDmhd"]} -{"Format": "IDEA0", "ID": "7e925a03-34e4-4529-abe7-1131a94e8ec4", "DetectTime": "2023-10-30T14:02:57.065073+02:00", "EventTime": "2023-10-30T14:02:57.065094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.134.161.217 ", "ContentType": "text/plain"}], "uids": ["CY9PkC258iG8bdbi4g"]} -{"Format": "IDEA0", "ID": "47570924-18f8-46a9-940a-7a5ba1374ade", "DetectTime": "2023-10-30T14:02:57.095795+02:00", "EventTime": "2023-10-30T14:02:57.095806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.229.235.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.229.235.110 ", "ContentType": "text/plain"}], "uids": ["CuWGkn38WjDgNGdA7c"]} -{"Format": "IDEA0", "ID": "4d0ef243-dd55-4b5a-b88d-30379deb76db", "DetectTime": "2023-10-30T14:02:57.127634+02:00", "EventTime": "2023-10-30T14:02:57.127652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.213.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.213.97 ", "ContentType": "text/plain"}], "uids": ["CQpNKq1rqPltt7jKia"]} -{"Format": "IDEA0", "ID": "a6555632-d4b4-46a9-9be5-d143a14bab50", "DetectTime": "2023-10-30T14:02:57.157731+02:00", "EventTime": "2023-10-30T14:02:57.157746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.193.78.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.193.78.226 ", "ContentType": "text/plain"}], "uids": ["CMXR0E2uigWvzpB7O3"]} -{"Format": "IDEA0", "ID": "8ce384f5-7ec9-4581-8cc7-c67d73ee1104", "DetectTime": "2023-10-30T14:02:57.189349+02:00", "EventTime": "2023-10-30T14:02:57.189362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.28.110.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.28.110.98 ", "ContentType": "text/plain"}], "uids": ["CpIscp3AGj92EA9Ez"]} -{"Format": "IDEA0", "ID": "dd563bb8-23bb-4aae-9b4d-53d3e4ed4939", "DetectTime": "2023-10-30T14:02:57.225261+02:00", "EventTime": "2023-10-30T14:02:57.225277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CKSRz21FyGtXVRUzL9"]} -{"Format": "IDEA0", "ID": "504644f9-310c-4add-89e1-9fa4e8cf3d5b", "DetectTime": "2023-10-30T14:02:57.269580+02:00", "EventTime": "2023-10-30T14:02:57.269596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.6.58.68 ", "ContentType": "text/plain"}], "uids": ["CfY6uu3CINB5EemBE3"]} -{"Format": "IDEA0", "ID": "61b3c813-b019-42cc-b8d6-4223a67d6fda", "DetectTime": "2023-10-30T14:02:57.307853+02:00", "EventTime": "2023-10-30T14:02:57.307874+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cx0NH82aIfjaFw4XU1"]} -{"Format": "IDEA0", "ID": "2ddd2ba8-0707-41d7-87b5-a2bb3d66a5b0", "DetectTime": "2023-10-30T14:02:57.323710+02:00", "EventTime": "2023-10-30T14:02:57.323728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["C02CGh1s3te5hVBDHd"]} -{"Format": "IDEA0", "ID": "7bd73368-fed5-4542-be15-34b7048f8218", "DetectTime": "2023-10-30T14:02:57.357156+02:00", "EventTime": "2023-10-30T14:02:57.357181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEIBp82Iv8ktsAQKDh"]} -{"Format": "IDEA0", "ID": "7234c671-1ed8-4f0b-9af4-04d31a6d31aa", "DetectTime": "2023-10-30T14:02:57.373862+02:00", "EventTime": "2023-10-30T14:02:57.373883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.121.241.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.121.241.83 ", "ContentType": "text/plain"}], "uids": ["CPY5U138v1Br98tDB7"]} -{"Format": "IDEA0", "ID": "ba4e1669-9c47-4f9c-99d1-20c54ecc6b4c", "DetectTime": "2023-10-30T14:02:57.413259+02:00", "EventTime": "2023-10-30T14:02:57.413277+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CX5NUw1XBfeIbb4opf"]} -{"Format": "IDEA0", "ID": "e8d2c234-ad16-4986-86e9-410c4fa73126", "DetectTime": "2023-10-30T14:02:57.429762+02:00", "EventTime": "2023-10-30T14:02:57.429789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.196.211.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.196.211.1 ", "ContentType": "text/plain"}], "uids": ["C7uoPX2dkX8R8ZRrjj"]} -{"Format": "IDEA0", "ID": "46f8f686-b706-4887-9b1c-f3241339de37", "DetectTime": "2023-10-30T14:02:57.471828+02:00", "EventTime": "2023-10-30T14:02:57.471892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.75.78.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.75.78.121 ", "ContentType": "text/plain"}], "uids": ["CGvvSo1cVuL6gGt883"]} -{"Format": "IDEA0", "ID": "72919eaf-4065-45b1-b868-21ad795a59f0", "DetectTime": "2023-10-30T14:02:57.519135+02:00", "EventTime": "2023-10-30T14:02:57.519157+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIuiyE1tC2z7xcHMG9"]} -{"Format": "IDEA0", "ID": "bb955469-b8d5-4396-849e-d7b7242879d9", "DetectTime": "2023-10-30T14:02:57.533334+02:00", "EventTime": "2023-10-30T14:02:57.533347+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjQf0oDlGD1IjKjnj"]} -{"Format": "IDEA0", "ID": "a76e2dfb-f7ce-4a64-9a45-013965e37be7", "DetectTime": "2023-10-30T14:02:57.547739+02:00", "EventTime": "2023-10-30T14:02:57.547758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["211.192.25.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 211.192.25.85 ", "ContentType": "text/plain"}], "uids": ["CPrDu32vQxRkZTbjI5"]} -{"Format": "IDEA0", "ID": "f538660e-c1b1-4823-b88c-a48a6bfd2111", "DetectTime": "2023-10-30T14:02:57.585129+02:00", "EventTime": "2023-10-30T14:02:57.585150+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9z1N94UW7wnmDf8U6"]} -{"Format": "IDEA0", "ID": "83a33938-f230-4593-8ed1-ecafc3a602dd", "DetectTime": "2023-10-30T14:02:57.609910+02:00", "EventTime": "2023-10-30T14:02:57.609928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.77.199.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.77.199.6 ", "ContentType": "text/plain"}], "uids": ["CZ2UOtcj2pGZQSqke"]} -{"Format": "IDEA0", "ID": "7c4fed7e-14a6-4f6e-a112-c7d3993eff5e", "DetectTime": "2023-10-30T14:02:57.646976+02:00", "EventTime": "2023-10-30T14:02:57.646997+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CNfovmLfpYf7Rd6k5"]} -{"Format": "IDEA0", "ID": "17832a21-6d8c-4441-815c-17ade9cd8fc1", "DetectTime": "2023-10-30T14:02:57.660874+02:00", "EventTime": "2023-10-30T14:02:57.660891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.60.238.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.60.238.159 ", "ContentType": "text/plain"}], "uids": ["Cjt8Cf4tY0wao2tgu"]} -{"Format": "IDEA0", "ID": "e8a06c20-1f91-46b3-a770-abdbbfc855a1", "DetectTime": "2023-10-30T14:02:57.692982+02:00", "EventTime": "2023-10-30T14:02:57.693000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CopC1X23XC9VYLMY63"]} -{"Format": "IDEA0", "ID": "c04b62c7-388b-48ba-95aa-f130973243a0", "DetectTime": "2023-10-30T14:02:57.724809+02:00", "EventTime": "2023-10-30T14:02:57.724821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.196.26.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.196.26.93 ", "ContentType": "text/plain"}], "uids": ["Cgmv3W3gOCHXPW9Mif"]} -{"Format": "IDEA0", "ID": "f0ef14e3-3777-425a-aa8b-d1d51322b53c", "DetectTime": "2023-10-30T14:02:57.754217+02:00", "EventTime": "2023-10-30T14:02:57.754242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.41.36.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.41.36.227 ", "ContentType": "text/plain"}], "uids": ["CMR7tY5mIgEs4OjTg"]} -{"Format": "IDEA0", "ID": "2c2a7890-13b8-4ebc-b2b3-4a2efc51f41a", "DetectTime": "2023-10-30T14:02:57.784526+02:00", "EventTime": "2023-10-30T14:02:57.784538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9z1N94UW7wnmDf8U6", "CIuiyE1tC2z7xcHMG9", "CiwR6Y19bSA9b898G3", "CEIBp82Iv8ktsAQKDh"]} -{"Format": "IDEA0", "ID": "8e54cc60-3926-4101-bfe9-786ec5ab2368", "DetectTime": "2023-10-30T14:02:57.799222+02:00", "EventTime": "2023-10-30T14:02:57.799243+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiwR6Y19bSA9b898G3"]} -{"Format": "IDEA0", "ID": "a7ad929c-3b2e-4b4b-8b68-dffb631f06a7", "DetectTime": "2023-10-30T14:02:57.814326+02:00", "EventTime": "2023-10-30T14:02:57.814345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.70.30.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.70.30.112 ", "ContentType": "text/plain"}], "uids": ["CzGa8B3L06E2Ts9hij"]} -{"Format": "IDEA0", "ID": "4b2a6bb6-b332-4d04-99f1-c6252da3ceef", "DetectTime": "2023-10-30T14:02:57.849199+02:00", "EventTime": "2023-10-30T14:02:57.849218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.22.131.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.22.131.210 ", "ContentType": "text/plain"}], "uids": ["CY0iEp2oBXRJIiOJ22"]} -{"Format": "IDEA0", "ID": "13d9e4ba-0992-4d6c-bfd3-a38314c3831c", "DetectTime": "2023-10-30T14:02:57.880803+02:00", "EventTime": "2023-10-30T14:02:57.880824+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CP8GkLmD1UlbJZdSb"]} -{"Format": "IDEA0", "ID": "00d03a08-583e-4654-81e4-ede1340bfeb1", "DetectTime": "2023-10-30T14:02:57.895120+02:00", "EventTime": "2023-10-30T14:02:57.895136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.8.143.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.8.143.248 ", "ContentType": "text/plain"}], "uids": ["CPAFn62ScoJpQ56TXd"]} -{"Format": "IDEA0", "ID": "462816f0-ee7a-49de-b016-083097fc7f13", "DetectTime": "2023-10-30T14:02:57.930662+02:00", "EventTime": "2023-10-30T14:02:57.930679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["CGUgDy4ZBA34kwkGK6"]} -{"Format": "IDEA0", "ID": "4ada2a46-1e70-4314-bc35-b1afd6953bf9", "DetectTime": "2023-10-30T14:02:57.962976+02:00", "EventTime": "2023-10-30T14:02:57.963002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.214.75.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.214.75.217 ", "ContentType": "text/plain"}], "uids": ["CeesiL3JuNXxDl5ZY1"]} -{"Format": "IDEA0", "ID": "d73cc89c-688c-4771-8246-c24ab2b1b9f3", "DetectTime": "2023-10-30T14:02:57.994182+02:00", "EventTime": "2023-10-30T14:02:57.994202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.169.72.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.169.72.34 ", "ContentType": "text/plain"}], "uids": ["CKvmIi2Gw3se1jSM2f"]} -{"Format": "IDEA0", "ID": "f2501647-c6a4-4833-a1b1-2d1fcc4ec974", "DetectTime": "2023-10-30T14:02:58.027892+02:00", "EventTime": "2023-10-30T14:02:58.027909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.192.22.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.192.22.25 ", "ContentType": "text/plain"}], "uids": ["Cei6m91q6oUOHYwUmc"]} -{"Format": "IDEA0", "ID": "5dd4d2f8-b425-4712-b41e-d6ef936beedc", "DetectTime": "2023-10-30T14:02:58.060659+02:00", "EventTime": "2023-10-30T14:02:58.060678+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIDzOL34PAUiJWeL5e"]} -{"Format": "IDEA0", "ID": "d04fa24b-922e-42a2-9aed-3d16613a932b", "DetectTime": "2023-10-30T14:02:58.070237+02:00", "EventTime": "2023-10-30T14:02:58.070257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.250.88.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.250.88.135 ", "ContentType": "text/plain"}], "uids": ["CaXaHz4n8FJbdd1tV1"]} -{"Format": "IDEA0", "ID": "f98664df-751e-457c-bb8e-c8409fbb0020", "DetectTime": "2023-10-30T14:02:58.101846+02:00", "EventTime": "2023-10-30T14:02:58.101863+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1tPimaL8LbD2zVC3"]} -{"Format": "IDEA0", "ID": "4071f470-867a-4640-8056-231214fe18ad", "DetectTime": "2023-10-30T14:02:58.112914+02:00", "EventTime": "2023-10-30T14:02:58.112934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["Cza2gp4F8qNHyDqowb"]} -{"Format": "IDEA0", "ID": "156e55a2-1c51-44c8-a73c-8d0f78fd85a8", "DetectTime": "2023-10-30T14:02:58.151582+02:00", "EventTime": "2023-10-30T14:02:58.151595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.183.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.183.67 ", "ContentType": "text/plain"}], "uids": ["CNaGjO3Pg58MyPsVCl"]} -{"Format": "IDEA0", "ID": "a29f7c41-4ad6-49f6-8031-243a6e8bb7f9", "DetectTime": "2023-10-30T14:02:58.185473+02:00", "EventTime": "2023-10-30T14:02:58.185489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.167.93.138 ", "ContentType": "text/plain"}], "uids": ["Cdio2G2oEfK0R7UkKa"]} -{"Format": "IDEA0", "ID": "fa3a24b1-9a1c-4f17-9c78-0a597b3bd2b7", "DetectTime": "2023-10-30T14:02:58.221004+02:00", "EventTime": "2023-10-30T14:02:58.221022+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYhI3b11sCqHNDjwNd"]} -{"Format": "IDEA0", "ID": "3f298f85-ec79-4416-ab95-ddffa84a7b6b", "DetectTime": "2023-10-30T14:02:58.232852+02:00", "EventTime": "2023-10-30T14:02:58.232912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["ChaiNw3Rtga3anqPz3"]} -{"Format": "IDEA0", "ID": "d8a32f70-14e3-4198-bc90-bbf66b2d8a36", "DetectTime": "2023-10-30T14:02:58.268004+02:00", "EventTime": "2023-10-30T14:02:58.268017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["Cfadzq4u3VmxTE3eRh"]} -{"Format": "IDEA0", "ID": "068ebc16-5ad9-488a-9f9c-7a44ac816614", "DetectTime": "2023-10-30T14:02:58.307124+02:00", "EventTime": "2023-10-30T14:02:58.307147+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C53IJ73h7nOlyXv3Lc"]} -{"Format": "IDEA0", "ID": "0ff2c1da-571c-48ae-a0b4-c60fb53c2b56", "DetectTime": "2023-10-30T14:02:58.318909+02:00", "EventTime": "2023-10-30T14:02:58.318930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["C4U7He4dUEFxUKa7f1"]} -{"Format": "IDEA0", "ID": "7f3fba7b-88dd-4187-988e-24d8f811fe80", "DetectTime": "2023-10-30T14:02:58.361171+02:00", "EventTime": "2023-10-30T14:02:58.361194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.59.217.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.59.217.28 ", "ContentType": "text/plain"}], "uids": ["C3KmCB3KS7gaYbTnRg"]} -{"Format": "IDEA0", "ID": "4ca096a7-317a-40ee-8c34-4f498139818a", "DetectTime": "2023-10-30T14:02:58.390808+02:00", "EventTime": "2023-10-30T14:02:58.390832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.241.35.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.241.35.42 ", "ContentType": "text/plain"}], "uids": ["C750Mh4VPR2TIPOPB6"]} -{"Format": "IDEA0", "ID": "c029dbb4-ca6f-4d65-a99f-713160353679", "DetectTime": "2023-10-30T14:02:58.421381+02:00", "EventTime": "2023-10-30T14:02:58.421397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.227.73.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.227.73.248 ", "ContentType": "text/plain"}], "uids": ["CAwgMB3oInerJTYlY2"]} -{"Format": "IDEA0", "ID": "e93f9732-a854-4a9a-befa-90e6476ae119", "DetectTime": "2023-10-30T14:02:58.452537+02:00", "EventTime": "2023-10-30T14:02:58.452556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.24.109.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.24.109.17 ", "ContentType": "text/plain"}], "uids": ["Cqruc21sf4MXrXTBEg"]} -{"Format": "IDEA0", "ID": "b194d750-77e6-4c39-bcd5-4e53d519855b", "DetectTime": "2023-10-30T14:02:58.563885+02:00", "EventTime": "2023-10-30T14:02:58.563903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["Cgmx8F2SZcm30ntHBl"]} -{"Format": "IDEA0", "ID": "fa531407-5358-4501-86ce-96b1f95aeb22", "DetectTime": "2023-10-30T14:02:58.603968+02:00", "EventTime": "2023-10-30T14:02:58.603989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.203.197.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.203.197.47 ", "ContentType": "text/plain"}], "uids": ["CCDYZd18MzqCV8oxg6"]} -{"Format": "IDEA0", "ID": "bf916517-165b-45ac-9e61-b40fff321c6d", "DetectTime": "2023-10-30T14:02:58.647982+02:00", "EventTime": "2023-10-30T14:02:58.647998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.206.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.206.142.232 ", "ContentType": "text/plain"}], "uids": ["C1St2UupaGYnJIaq9"]} -{"Format": "IDEA0", "ID": "3bf9e43d-639f-4896-860b-0968935d4eb3", "DetectTime": "2023-10-30T14:02:58.681861+02:00", "EventTime": "2023-10-30T14:02:58.681876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CfUi2y2JbNFXfpGWZd"]} -{"Format": "IDEA0", "ID": "7b84b9f5-2795-4970-9eb2-4e800e5d4897", "DetectTime": "2023-10-30T14:02:58.717785+02:00", "EventTime": "2023-10-30T14:02:58.717802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.148.67.70"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.148.67.70 ", "ContentType": "text/plain"}], "uids": ["Cerb4HhxbuCcDPIC9"]} -{"Format": "IDEA0", "ID": "70c3c818-55e7-4ddc-90c2-68cea5309289", "DetectTime": "2023-10-30T14:02:58.756613+02:00", "EventTime": "2023-10-30T14:02:58.756633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CvdQgz4k8Cn5vxNexl"]} -{"Format": "IDEA0", "ID": "8961e7da-30b0-4940-8115-3859880ec3c4", "DetectTime": "2023-10-30T14:02:58.802900+02:00", "EventTime": "2023-10-30T14:02:58.802922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.63.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.63.207 ", "ContentType": "text/plain"}], "uids": ["C4ceA83CVXqXkOz3R8"]} -{"Format": "IDEA0", "ID": "91da2357-6c02-4fdb-81f4-a21e88b0ed8a", "DetectTime": "2023-10-30T14:02:58.849604+02:00", "EventTime": "2023-10-30T14:02:58.849621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.210.102.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.210.102.66 ", "ContentType": "text/plain"}], "uids": ["C5cXCS2G1DU8axtVzf"]} -{"Format": "IDEA0", "ID": "d7483352-385b-426f-a98a-cdd6539982c2", "DetectTime": "2023-10-30T14:02:58.887222+02:00", "EventTime": "2023-10-30T14:02:58.887243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.221.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.221.251 ", "ContentType": "text/plain"}], "uids": ["CNDj6B3x8vKsxrb9Ek"]} -{"Format": "IDEA0", "ID": "aa94523c-c5b9-4c47-8800-2c44f9017c1d", "DetectTime": "2023-10-30T14:02:58.923146+02:00", "EventTime": "2023-10-30T14:02:58.923166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.41.178"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.254.41.178 ", "ContentType": "text/plain"}], "uids": ["CmhBu82U0NMQgMbLM7"]} -{"Format": "IDEA0", "ID": "ec5ccd96-fa55-4ffd-838a-d7ecc94dbbd9", "DetectTime": "2023-10-30T14:02:58.955460+02:00", "EventTime": "2023-10-30T14:02:58.955485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CD3ort3o2D3AVReJN"]} -{"Format": "IDEA0", "ID": "028578fa-9f9e-424a-a58c-cbc57644163f", "DetectTime": "2023-10-30T14:02:58.989564+02:00", "EventTime": "2023-10-30T14:02:58.989581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CswuBH128pLV791z1e"]} -{"Format": "IDEA0", "ID": "7a914e3e-277d-4c40-826e-ff55f536f58c", "DetectTime": "2023-10-30T14:02:59.022155+02:00", "EventTime": "2023-10-30T14:02:59.022177+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CNp8Z4Pcp0eEGIHn5"]} -{"Format": "IDEA0", "ID": "9429483e-52af-4792-8c19-9079be5605e7", "DetectTime": "2023-10-30T14:02:59.087744+02:00", "EventTime": "2023-10-30T14:02:59.087765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CnAMIg4g09sWu0B6X6"]} -{"Format": "IDEA0", "ID": "f6660899-093d-475a-9904-04ed29db1c11", "DetectTime": "2023-10-30T14:02:59.125394+02:00", "EventTime": "2023-10-30T14:02:59.125413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["C4qrN82NiFxJ1hK36l"]} -{"Format": "IDEA0", "ID": "3512e03d-8ed7-4a07-9bc8-8c2ea57c6035", "DetectTime": "2023-10-30T14:02:59.167380+02:00", "EventTime": "2023-10-30T14:02:59.167393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CZfYIq49FrwzwUz4A2"]} -{"Format": "IDEA0", "ID": "f27edb96-e445-41fb-a771-19f0ef6252bd", "DetectTime": "2023-10-30T14:02:59.202284+02:00", "EventTime": "2023-10-30T14:02:59.202304+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCg2u34Hlu7Yy9Hej"]} -{"Format": "IDEA0", "ID": "54dbd88d-5d91-4677-af24-4c64aa058b65", "DetectTime": "2023-10-30T14:02:59.213745+02:00", "EventTime": "2023-10-30T14:02:59.213766+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5VAjq3dLTwtVquXc5"]} -{"Format": "IDEA0", "ID": "e52faa93-dded-4bad-ad9e-2211f3179bd2", "DetectTime": "2023-10-30T14:02:59.224887+02:00", "EventTime": "2023-10-30T14:02:59.224908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYhI3b11sCqHNDjwNd", "CCg2u34Hlu7Yy9Hej", "CojWxG1ujhnVknXrdg", "CIDzOL34PAUiJWeL5e"]} -{"Format": "IDEA0", "ID": "f2894e28-637a-4249-a4bd-b756314eb8f3", "DetectTime": "2023-10-30T14:02:59.234949+02:00", "EventTime": "2023-10-30T14:02:59.234973+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CojWxG1ujhnVknXrdg"]} -{"Format": "IDEA0", "ID": "bcc41947-bf3a-4c57-ae26-36a8db1343c5", "DetectTime": "2023-10-30T14:02:59.251143+02:00", "EventTime": "2023-10-30T14:02:59.251169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["ClV1mY2idyBhXZUhCe"]} -{"Format": "IDEA0", "ID": "49f66352-b019-43b9-9bdf-b38f672fe41b", "DetectTime": "2023-10-30T14:02:59.287215+02:00", "EventTime": "2023-10-30T14:02:59.287231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["Cf90EE1hyJdE1iGMq8"]} -{"Format": "IDEA0", "ID": "d97bb7f2-b233-4aee-a855-5eb287c13360", "DetectTime": "2023-10-30T14:02:59.325362+02:00", "EventTime": "2023-10-30T14:02:59.325384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CdC7Z349dRVyhUYJxd"]} -{"Format": "IDEA0", "ID": "225f6c76-d23f-4e54-bd4a-d195151ab0f2", "DetectTime": "2023-10-30T14:02:59.358659+02:00", "EventTime": "2023-10-30T14:02:59.358676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CAVO5I3KaRWzVRMZQ"]} -{"Format": "IDEA0", "ID": "3aae4405-2a64-4fc3-b327-f40aac5c3d9c", "DetectTime": "2023-10-30T14:02:59.391896+02:00", "EventTime": "2023-10-30T14:02:59.391914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CiOxS126mnqW8TkB8b"]} -{"Format": "IDEA0", "ID": "90a8be7e-128c-4100-a914-34fd388bdb8b", "DetectTime": "2023-10-30T14:02:59.429966+02:00", "EventTime": "2023-10-30T14:02:59.429984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.46.106.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.46.106.185 ", "ContentType": "text/plain"}], "uids": ["CjgmCT1Tqb66pMrBd2"]} -{"Format": "IDEA0", "ID": "acd3d644-ecbb-432b-aafd-9e335054fed6", "DetectTime": "2023-10-30T14:02:59.466082+02:00", "EventTime": "2023-10-30T14:02:59.466101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CK7rq9vadmetNvDQa"]} -{"Format": "IDEA0", "ID": "e2c7ab58-55d0-4370-8af2-df85ff8e6382", "DetectTime": "2023-10-30T14:02:59.502000+02:00", "EventTime": "2023-10-30T14:02:59.502018+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwLEmL3iEwvi00Tadf"]} -{"Format": "IDEA0", "ID": "a4350658-4a13-48d7-afd5-071d0f520e90", "DetectTime": "2023-10-30T14:02:59.515386+02:00", "EventTime": "2023-10-30T14:02:59.515403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CyBlWB1SFxZufUc1d"]} -{"Format": "IDEA0", "ID": "041577cd-d0c1-47f9-a166-778531b676f5", "DetectTime": "2023-10-30T14:02:59.550079+02:00", "EventTime": "2023-10-30T14:02:59.550095+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnKfY23QYRBcIKfun3"]} -{"Format": "IDEA0", "ID": "b0abc00d-4c58-47a0-95c2-b2b7c8a63f1d", "DetectTime": "2023-10-30T14:02:59.560547+02:00", "EventTime": "2023-10-30T14:02:59.560567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["Crp0964a9wWGK8YxWl"]} -{"Format": "IDEA0", "ID": "39073c86-7deb-4b04-b367-34344a097b53", "DetectTime": "2023-10-30T14:02:59.597097+02:00", "EventTime": "2023-10-30T14:02:59.597116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["Cs5unwynYEDZqrSSe"]} -{"Format": "IDEA0", "ID": "7845f352-f33e-4bbd-8544-1054e7c6aa87", "DetectTime": "2023-10-30T14:02:59.633543+02:00", "EventTime": "2023-10-30T14:02:59.633559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["Cg3Kql3p4k0qmNYJ8d"]} -{"Format": "IDEA0", "ID": "679d8ae5-e53e-45d1-8495-3b3798754a44", "DetectTime": "2023-10-30T14:02:59.673237+02:00", "EventTime": "2023-10-30T14:02:59.673259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CNyGGT39ZRFg3ZYs4f"]} -{"Format": "IDEA0", "ID": "98a05c2e-29b3-43b9-adcb-da836457480f", "DetectTime": "2023-10-30T14:02:59.710362+02:00", "EventTime": "2023-10-30T14:02:59.710379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C472FYag8mORt3dva"]} -{"Format": "IDEA0", "ID": "ebfa647d-8a02-4ae5-a3d6-79e17213468f", "DetectTime": "2023-10-30T14:02:59.748599+02:00", "EventTime": "2023-10-30T14:02:59.748621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C33sSx1rbIYQZpGna"]} -{"Format": "IDEA0", "ID": "9cc94b6b-5025-4b26-beea-43c4dfc7c6af", "DetectTime": "2023-10-30T14:02:59.793697+02:00", "EventTime": "2023-10-30T14:02:59.793727+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cez3MQ2HMCIqaAov68"]} -{"Format": "IDEA0", "ID": "dc378363-a71d-403b-a070-978b5581aa6c", "DetectTime": "2023-10-30T14:02:59.876464+02:00", "EventTime": "2023-10-30T14:02:59.876484+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBAX5u3Cm9Ki13eYEh"]} -{"Format": "IDEA0", "ID": "b503d742-2998-4499-9245-850621b62749", "DetectTime": "2023-10-30T14:02:59.891996+02:00", "EventTime": "2023-10-30T14:02:59.892019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPRL3K3vDzoDfyDB88"]} -{"Format": "IDEA0", "ID": "1012f6d8-68fa-46c9-95b2-2af38c93127a", "DetectTime": "2023-10-30T14:02:59.929054+02:00", "EventTime": "2023-10-30T14:02:59.929071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.120.59.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.120.59.74 ", "ContentType": "text/plain"}], "uids": ["CeUVCf49ASZB8PCaF2"]} -{"Format": "IDEA0", "ID": "91551095-94ba-41f8-a451-9b3759d6a480", "DetectTime": "2023-10-30T14:02:59.963356+02:00", "EventTime": "2023-10-30T14:02:59.963375+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3QIIt2xXxkbkFJffe"]} -{"Format": "IDEA0", "ID": "8349f117-8155-45a5-88a6-f87c14870c09", "DetectTime": "2023-10-30T14:02:59.973870+02:00", "EventTime": "2023-10-30T14:02:59.973889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CukEXN1uVMNUSeClH3"]} -{"Format": "IDEA0", "ID": "deafad55-3c3b-4015-8663-0c4563aee1ff", "DetectTime": "2023-10-30T14:03:00.015758+02:00", "EventTime": "2023-10-30T14:03:00.015771+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLr8hv32sdkg0H4tb2"]} -{"Format": "IDEA0", "ID": "81608fd1-3014-421f-b984-a1796938d024", "DetectTime": "2023-10-30T14:03:00.026979+02:00", "EventTime": "2023-10-30T14:03:00.027001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrzuMM31CTUBysMJAl"]} -{"Format": "IDEA0", "ID": "ff7739e9-7c0d-4677-9712-ebd34bfeff65", "DetectTime": "2023-10-30T14:03:00.035861+02:00", "EventTime": "2023-10-30T14:03:00.035878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["ClnWfV1D8OvIeaNULk"]} -{"Format": "IDEA0", "ID": "27662e92-e1d3-4e3e-9877-627e6e341d79", "DetectTime": "2023-10-30T14:03:00.076039+02:00", "EventTime": "2023-10-30T14:03:00.076056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CzW5lC3dPEcPPcGBUc"]} -{"Format": "IDEA0", "ID": "823936c5-6cf7-44ea-af16-73a762bb049a", "DetectTime": "2023-10-30T14:03:00.111721+02:00", "EventTime": "2023-10-30T14:03:00.111740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CfYd6TwZKGZPefhEh"]} -{"Format": "IDEA0", "ID": "b0e4e921-2830-40ea-a1ba-2173cbbca03d", "DetectTime": "2023-10-30T14:03:00.148403+02:00", "EventTime": "2023-10-30T14:03:00.148428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["C7qlnUtAfx3SqeN55"]} -{"Format": "IDEA0", "ID": "47f9015e-d6c7-4c7a-87b4-691d83fc1ed2", "DetectTime": "2023-10-30T14:03:00.185500+02:00", "EventTime": "2023-10-30T14:03:00.185520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CmX3tE3OJHK80qbcL5"]} -{"Format": "IDEA0", "ID": "95a3cb09-b3f5-4b72-a2ad-886c425007b7", "DetectTime": "2023-10-30T14:03:00.223531+02:00", "EventTime": "2023-10-30T14:03:00.223606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CZlvY33gNQE6hISso2"]} -{"Format": "IDEA0", "ID": "f7cfe485-e401-4dfc-b15a-9ac4b2cb0c49", "DetectTime": "2023-10-30T14:03:00.259427+02:00", "EventTime": "2023-10-30T14:03:00.259444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CphnPdtlwRBe8LdM1"]} -{"Format": "IDEA0", "ID": "ee951c63-5238-4ab5-8b33-573a8dddc379", "DetectTime": "2023-10-30T14:03:00.294564+02:00", "EventTime": "2023-10-30T14:03:00.294576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["CLAWKy3JKDhWU6jQ68"]} -{"Format": "IDEA0", "ID": "eb984290-196b-4f99-b712-19052d676456", "DetectTime": "2023-10-30T14:03:00.326869+02:00", "EventTime": "2023-10-30T14:03:00.326896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cxl5KD2z5zrWVT7J19"]} -{"Format": "IDEA0", "ID": "90a73772-273f-4433-9c05-59e249f57998", "DetectTime": "2023-10-30T14:03:00.358406+02:00", "EventTime": "2023-10-30T14:03:00.358422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["Cug3G84lXn1VkzbXH9"]} -{"Format": "IDEA0", "ID": "5b57e811-994f-4754-8aa9-0e7ba69a55c5", "DetectTime": "2023-10-30T14:03:00.391722+02:00", "EventTime": "2023-10-30T14:03:00.391741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.206.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.206.142.232 ", "ContentType": "text/plain"}], "uids": ["CoT13MUxAQubk8Gg1"]} -{"Format": "IDEA0", "ID": "e3a159f0-b7b8-421c-a0e9-ea0096ee8c62", "DetectTime": "2023-10-30T14:03:00.423114+02:00", "EventTime": "2023-10-30T14:03:00.423135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CcAi7M3v4uYba8T3s1"]} -{"Format": "IDEA0", "ID": "abf4e5d7-365c-4ac9-8e29-683f00a5a8c7", "DetectTime": "2023-10-30T14:03:00.465875+02:00", "EventTime": "2023-10-30T14:03:00.465892+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtXeqV1Lu7OoHRHoN2"]} -{"Format": "IDEA0", "ID": "a6aaac55-18e8-459a-80e2-d20cc1ed0d74", "DetectTime": "2023-10-30T14:03:00.474855+02:00", "EventTime": "2023-10-30T14:03:00.474874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["COdHzWVzlQmCsxVM3"]} -{"Format": "IDEA0", "ID": "22cd4034-9c1c-4c1e-aa97-5628b2c467f9", "DetectTime": "2023-10-30T14:03:00.507173+02:00", "EventTime": "2023-10-30T14:03:00.507197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CVnceiNTMFifS6D07"]} -{"Format": "IDEA0", "ID": "a4a5089c-04a8-41e2-9d6d-a48f6b8ee154", "DetectTime": "2023-10-30T14:03:00.539853+02:00", "EventTime": "2023-10-30T14:03:00.539876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.6.101.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.6.101.55 ", "ContentType": "text/plain"}], "uids": ["CrT4Fz4LzukcS9W8Dk"]} -{"Format": "IDEA0", "ID": "875178c8-fcee-44ae-b598-20861902ef53", "DetectTime": "2023-10-30T14:03:00.575608+02:00", "EventTime": "2023-10-30T14:03:00.575627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CeMbvF34suIApeWlCa"]} -{"Format": "IDEA0", "ID": "1e0bd93d-b5d0-468a-ac3f-62b8dd965361", "DetectTime": "2023-10-30T14:03:00.609137+02:00", "EventTime": "2023-10-30T14:03:00.609158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CnKfY23QYRBcIKfun3", "C3QIIt2xXxkbkFJffe", "CrzuMM31CTUBysMJAl", "CsAano3wyjvnMbmR2a"]} -{"Format": "IDEA0", "ID": "7a05cb80-765b-4138-9e07-b74dd1a3f50a", "DetectTime": "2023-10-30T14:03:00.619678+02:00", "EventTime": "2023-10-30T14:03:00.619694+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsAano3wyjvnMbmR2a"]} -{"Format": "IDEA0", "ID": "4ecc61c2-4b87-45e7-a8b3-bfb166957e7d", "DetectTime": "2023-10-30T14:03:00.628673+02:00", "EventTime": "2023-10-30T14:03:00.628692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["C6RxpL2TD7oIV1Ff2l"]} -{"Format": "IDEA0", "ID": "1e545034-58d6-4081-8afb-fc5d5c1d6552", "DetectTime": "2023-10-30T14:03:00.661804+02:00", "EventTime": "2023-10-30T14:03:00.661822+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHkXgwRjDzLoCdZV"]} -{"Format": "IDEA0", "ID": "eb200191-4cc0-4bc9-a5db-3680381f907f", "DetectTime": "2023-10-30T14:03:00.671141+02:00", "EventTime": "2023-10-30T14:03:00.671154+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0Uzga33BIYXSzIE1h"]} -{"Format": "IDEA0", "ID": "27863fb4-1616-4d3d-9728-52ba3ba00e11", "DetectTime": "2023-10-30T14:03:00.680503+02:00", "EventTime": "2023-10-30T14:03:00.680522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C8mO4H1IiOwcq1pTNj"]} -{"Format": "IDEA0", "ID": "fadb3b6b-4522-4d19-b817-a56541c5b334", "DetectTime": "2023-10-30T14:03:00.717417+02:00", "EventTime": "2023-10-30T14:03:00.717441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CZan8y7mdn7tzUGVj"]} -{"Format": "IDEA0", "ID": "700d4eee-cb4f-4ea6-b9ca-7c42de00acc5", "DetectTime": "2023-10-30T14:03:00.827101+02:00", "EventTime": "2023-10-30T14:03:00.827120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.221.110 ", "ContentType": "text/plain"}], "uids": ["CMbEXY2YpiBDRVmhCh"]} -{"Format": "IDEA0", "ID": "8e93f165-5ce1-4ac7-babb-d6b63e6918fb", "DetectTime": "2023-10-30T14:03:00.864169+02:00", "EventTime": "2023-10-30T14:03:00.864195+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClOBPg37RQ4qNIskBh"]} -{"Format": "IDEA0", "ID": "98e607d2-417e-46bb-ba23-276e094c3bb8", "DetectTime": "2023-10-30T14:03:00.875177+02:00", "EventTime": "2023-10-30T14:03:00.875199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CKtaMp1Y4lKGZDbCu"]} -{"Format": "IDEA0", "ID": "fadd8700-f916-4bf8-81be-70bcd85fb95f", "DetectTime": "2023-10-30T14:03:00.908613+02:00", "EventTime": "2023-10-30T14:03:00.908631+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7iShc1v0FxN55WjL5"]} -{"Format": "IDEA0", "ID": "d0a3a55f-cf75-40c3-82f7-8e1119a93fd3", "DetectTime": "2023-10-30T14:03:00.917949+02:00", "EventTime": "2023-10-30T14:03:00.917966+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxLpYNbQGCb2vZbh5"]} -{"Format": "IDEA0", "ID": "c3b5c197-10b5-4647-b91a-c4bed6acf3ce", "DetectTime": "2023-10-30T14:03:00.929460+02:00", "EventTime": "2023-10-30T14:03:00.929484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CyFEM1a7AofQXgbvl"]} -{"Format": "IDEA0", "ID": "a3c35ebf-f4c7-4887-9ae8-b7d795b2cbef", "DetectTime": "2023-10-30T14:03:00.964564+02:00", "EventTime": "2023-10-30T14:03:00.964585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.134.161.217 ", "ContentType": "text/plain"}], "uids": ["CnT8Yq3ohv9OaUurol"]} -{"Format": "IDEA0", "ID": "cd39b4be-97d0-4f22-a0f0-f904372284de", "DetectTime": "2023-10-30T14:03:01.008182+02:00", "EventTime": "2023-10-30T14:03:01.008200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CNe1jb2QstDxSIuh33"]} -{"Format": "IDEA0", "ID": "91bc3bd3-4c18-4d01-bd20-014117f11c28", "DetectTime": "2023-10-30T14:03:01.046474+02:00", "EventTime": "2023-10-30T14:03:01.046505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.93.105.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.93.105.248 ", "ContentType": "text/plain"}], "uids": ["CCBSqI2Z19vB5fn9Zi"]} -{"Format": "IDEA0", "ID": "64e31988-5168-4675-b190-c613c008386d", "DetectTime": "2023-10-30T14:03:01.081836+02:00", "EventTime": "2023-10-30T14:03:01.081864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.232.123"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.232.123 ", "ContentType": "text/plain"}], "uids": ["CXPjaK2J19pFCyVPp9"]} -{"Format": "IDEA0", "ID": "6925b94a-dc34-4cb0-9334-005d45a7b15c", "DetectTime": "2023-10-30T14:03:01.117179+02:00", "EventTime": "2023-10-30T14:03:01.117195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKex273N2TO9bXehVj"]} -{"Format": "IDEA0", "ID": "8809d252-29c0-4319-a6ff-015816bf9da9", "DetectTime": "2023-10-30T14:03:01.150086+02:00", "EventTime": "2023-10-30T14:03:01.150112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.6.58.68 ", "ContentType": "text/plain"}], "uids": ["CCh8Jl1QkJGUFDzcif"]} -{"Format": "IDEA0", "ID": "09dc8801-6892-415c-9bb6-92818a402110", "DetectTime": "2023-10-30T14:03:01.184563+02:00", "EventTime": "2023-10-30T14:03:01.184579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["Cpw1EpIqOu02Yqdi"]} -{"Format": "IDEA0", "ID": "560f7380-4dc6-4fbc-9cb8-cf5a8aab57bd", "DetectTime": "2023-10-30T14:03:01.222863+02:00", "EventTime": "2023-10-30T14:03:01.222883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CvXs1A3snk5T2POaPg"]} -{"Format": "IDEA0", "ID": "14b3a0a5-fee4-4e28-8a2f-557a5eb21ed0", "DetectTime": "2023-10-30T14:03:01.258461+02:00", "EventTime": "2023-10-30T14:03:01.258483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CoaBh72GPfLVEXm0X"]} -{"Format": "IDEA0", "ID": "f5277ff6-a52c-4e94-9212-2ca7f3b972eb", "DetectTime": "2023-10-30T14:03:01.296144+02:00", "EventTime": "2023-10-30T14:03:01.296161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CtuhoaaJwIEUhJSm1"]} -{"Format": "IDEA0", "ID": "11338146-410c-446e-8c91-377664b52796", "DetectTime": "2023-10-30T14:03:01.332818+02:00", "EventTime": "2023-10-30T14:03:01.332832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.120.59.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.120.59.74 ", "ContentType": "text/plain"}], "uids": ["Cymlk64fAcr3RpI8Ig"]} -{"Format": "IDEA0", "ID": "86d5f7bd-370d-4365-8843-3f1431eaec8d", "DetectTime": "2023-10-30T14:03:01.366639+02:00", "EventTime": "2023-10-30T14:03:01.366655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CbHJgP3T7GlMwwYiv4"]} -{"Format": "IDEA0", "ID": "62961b03-bdbe-4384-a93c-1bb2058c53ba", "DetectTime": "2023-10-30T14:03:01.401561+02:00", "EventTime": "2023-10-30T14:03:01.401583+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cx23wp1x9HNk0OKO44"]} -{"Format": "IDEA0", "ID": "ad080634-8b7b-4e6d-a48e-cd27cb9fdd99", "DetectTime": "2023-10-30T14:03:01.410546+02:00", "EventTime": "2023-10-30T14:03:01.410558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0Rc7uwN8xZ93yfx8"]} -{"Format": "IDEA0", "ID": "4c77da94-a3d6-49c5-8300-a21678efa423", "DetectTime": "2023-10-30T14:03:01.446500+02:00", "EventTime": "2023-10-30T14:03:01.446521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cv2Qdo2Fh6YECyMLt5"]} -{"Format": "IDEA0", "ID": "4b6a79d8-dcb2-4d41-aadd-7e3b7aaaae0f", "DetectTime": "2023-10-30T14:03:01.482886+02:00", "EventTime": "2023-10-30T14:03:01.482903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C1RAwu3ESkGp0o6Jad"]} -{"Format": "IDEA0", "ID": "289c6e24-11c2-4080-a7a8-9c72bf5b4a15", "DetectTime": "2023-10-30T14:03:01.517310+02:00", "EventTime": "2023-10-30T14:03:01.517328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CrfeL91bgeYY14kOH5"]} -{"Format": "IDEA0", "ID": "522130e5-1728-4fdc-823d-61621fa7596d", "DetectTime": "2023-10-30T14:03:01.553900+02:00", "EventTime": "2023-10-30T14:03:01.553918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CpPHIW2B63z1ZEsuNg"]} -{"Format": "IDEA0", "ID": "36fd1c5e-3392-4525-860c-7de3c029dc8e", "DetectTime": "2023-10-30T14:03:01.586860+02:00", "EventTime": "2023-10-30T14:03:01.586882+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2krAl2H5zMLr0Vx5b"]} -{"Format": "IDEA0", "ID": "65f8092f-1b56-40c7-abfe-248bc767bc17", "DetectTime": "2023-10-30T14:03:01.598291+02:00", "EventTime": "2023-10-30T14:03:01.598310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["C5PQES2xcDUO22O2L4"]} -{"Format": "IDEA0", "ID": "312ebb51-5bd0-45bf-a9cd-38d1d3ffde1d", "DetectTime": "2023-10-30T14:03:01.633272+02:00", "EventTime": "2023-10-30T14:03:01.633300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C5jJPd2OZv29VaVG17"]} -{"Format": "IDEA0", "ID": "3bf495a2-6ef3-412b-bf9e-4d9263ac70c1", "DetectTime": "2023-10-30T14:03:01.675033+02:00", "EventTime": "2023-10-30T14:03:01.675053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CSI1U142Z9PxAbx533"]} -{"Format": "IDEA0", "ID": "acdf786b-5d4e-4b21-aead-2f0ce97af946", "DetectTime": "2023-10-30T14:03:01.717279+02:00", "EventTime": "2023-10-30T14:03:01.717336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.232.123"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.232.123 ", "ContentType": "text/plain"}], "uids": ["C0DUS52Dg0Pbbmfaa9"]} -{"Format": "IDEA0", "ID": "5ec637f7-6df9-46ca-90b8-445fc60b5ba4", "DetectTime": "2023-10-30T14:03:01.757102+02:00", "EventTime": "2023-10-30T14:03:01.757129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CluDD5wiaFek3BPba"]} -{"Format": "IDEA0", "ID": "4ea85677-d127-4ea7-bdf8-bc968befe4f0", "DetectTime": "2023-10-30T14:03:01.795686+02:00", "EventTime": "2023-10-30T14:03:01.795707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["C5JeLw49172exyXjsg"]} -{"Format": "IDEA0", "ID": "caa9a169-8769-4001-bf17-01e110054d71", "DetectTime": "2023-10-30T14:03:01.830582+02:00", "EventTime": "2023-10-30T14:03:01.830605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CLEQUf3BucKPmWl3Qa"]} -{"Format": "IDEA0", "ID": "fa37e63b-27ee-4c18-b4d9-c3de08184bf8", "DetectTime": "2023-10-30T14:03:01.868518+02:00", "EventTime": "2023-10-30T14:03:01.868536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.93.105.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.93.105.248 ", "ContentType": "text/plain"}], "uids": ["CKSRzC41xbMz9vxUEd"]} -{"Format": "IDEA0", "ID": "67411bbb-3036-45b3-8811-11bfd34b98d7", "DetectTime": "2023-10-30T14:03:01.902644+02:00", "EventTime": "2023-10-30T14:03:01.902663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CgqNZS3KpSLirfReff"]} -{"Format": "IDEA0", "ID": "26214c8c-b36c-4a6c-bea5-fa1f0ef8059b", "DetectTime": "2023-10-30T14:03:01.941458+02:00", "EventTime": "2023-10-30T14:03:01.941472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["CiqZt845QtBC3pcgy2"]} -{"Format": "IDEA0", "ID": "e74b4eae-829c-4ad9-9041-3daf54c8a568", "DetectTime": "2023-10-30T14:03:01.975246+02:00", "EventTime": "2023-10-30T14:03:01.975275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2uuJMtiyL4aCbQT6", "Cx23wp1x9HNk0OKO44", "C7iShc1v0FxN55WjL5", "C0Uzga33BIYXSzIE1h"]} -{"Format": "IDEA0", "ID": "ec104bf7-3ad5-460b-932b-710c6194c808", "DetectTime": "2023-10-30T14:03:01.984147+02:00", "EventTime": "2023-10-30T14:03:01.984171+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2uuJMtiyL4aCbQT6"]} -{"Format": "IDEA0", "ID": "238fb9ac-24a1-4ed6-b057-1a53b4dc279e", "DetectTime": "2023-10-30T14:03:01.995738+02:00", "EventTime": "2023-10-30T14:03:01.995761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CxnEeu2nGBM9rZ90Zf"]} -{"Format": "IDEA0", "ID": "debf7f73-ed08-48a2-9097-1d949f2b12f3", "DetectTime": "2023-10-30T14:03:02.059459+02:00", "EventTime": "2023-10-30T14:03:02.059483+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBcy3nUtUUyom96wb"]} -{"Format": "IDEA0", "ID": "b98432f0-cfe3-4471-a837-d5d28ce489b9", "DetectTime": "2023-10-30T14:03:02.074848+02:00", "EventTime": "2023-10-30T14:03:02.074869+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CL4IRN3gMhdE3c1gth"]} -{"Format": "IDEA0", "ID": "1a1d3022-71e3-41eb-b45d-bedb7c6506a6", "DetectTime": "2023-10-30T14:03:02.087611+02:00", "EventTime": "2023-10-30T14:03:02.087624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CNoKa31ij4XvLIMWC"]} -{"Format": "IDEA0", "ID": "f1d8247f-a364-435e-b318-95785c51ce08", "DetectTime": "2023-10-30T14:03:02.142663+02:00", "EventTime": "2023-10-30T14:03:02.142682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C51rAO2WY6rYPwoI9d"]} -{"Format": "IDEA0", "ID": "4a7e9be2-f511-47ba-aa16-ad1f477b6f47", "DetectTime": "2023-10-30T14:03:02.191361+02:00", "EventTime": "2023-10-30T14:03:02.191444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CKH25v1qNmsZorgp69"]} -{"Format": "IDEA0", "ID": "560c2a45-84fd-47d0-9e9b-0585e9a83e8d", "DetectTime": "2023-10-30T14:03:02.237581+02:00", "EventTime": "2023-10-30T14:03:02.237672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CWtHCCO8sAHUo6JD8"]} -{"Format": "IDEA0", "ID": "957a2053-449f-43e7-ba9e-15fec1658945", "DetectTime": "2023-10-30T14:03:02.278914+02:00", "EventTime": "2023-10-30T14:03:02.278931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFWe5a1Vw7gSbwvha"]} -{"Format": "IDEA0", "ID": "f1f31f83-da74-4846-8525-b47310456b34", "DetectTime": "2023-10-30T14:03:02.316639+02:00", "EventTime": "2023-10-30T14:03:02.316659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["C7Hi9z4jP41eEWzjDi"]} -{"Format": "IDEA0", "ID": "b8ae8e82-b7e3-48e6-8186-a2bae95c79fb", "DetectTime": "2023-10-30T14:03:02.360493+02:00", "EventTime": "2023-10-30T14:03:02.360516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CGybgD1GDctIw74Rk"]} -{"Format": "IDEA0", "ID": "1e46db0e-3265-4660-9c34-550b311cb569", "DetectTime": "2023-10-30T14:03:02.396464+02:00", "EventTime": "2023-10-30T14:03:02.396487+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1fsRF2bpevbcBlXK6"]} -{"Format": "IDEA0", "ID": "ad618f3a-eb5b-419d-bd4d-fca0a18ef239", "DetectTime": "2023-10-30T14:03:02.406197+02:00", "EventTime": "2023-10-30T14:03:02.406217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["C2JDgu2ofhXBrtyVHd"]} -{"Format": "IDEA0", "ID": "5e46fe97-8706-4259-ba82-d64408b4bc9c", "DetectTime": "2023-10-30T14:03:02.450491+02:00", "EventTime": "2023-10-30T14:03:02.450517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CDvB3W29Ay0XqXg9re"]} -{"Format": "IDEA0", "ID": "d1bad158-98b3-4eb4-a77a-98bf0548029c", "DetectTime": "2023-10-30T14:03:02.492753+02:00", "EventTime": "2023-10-30T14:03:02.492781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["C5dEVD2SRQexbqQYok"]} -{"Format": "IDEA0", "ID": "37355104-3a48-4481-8fe4-2593fc617e16", "DetectTime": "2023-10-30T14:03:02.533702+02:00", "EventTime": "2023-10-30T14:03:02.533733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CnptnF1wFMXuTwfCIh"]} -{"Format": "IDEA0", "ID": "15c328a7-1e93-4a4f-91de-c3e77e8e0db6", "DetectTime": "2023-10-30T14:03:02.576827+02:00", "EventTime": "2023-10-30T14:03:02.576847+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C81vGv6sFfqt14R8j"]} -{"Format": "IDEA0", "ID": "97f16dee-c550-47a9-8cfd-e68ec86215e8", "DetectTime": "2023-10-30T14:03:02.584574+02:00", "EventTime": "2023-10-30T14:03:02.584586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CM8M7e25vyxIu8kCw8"]} -{"Format": "IDEA0", "ID": "89d94b1c-a4f7-49e0-9327-d75358559420", "DetectTime": "2023-10-30T14:03:02.619035+02:00", "EventTime": "2023-10-30T14:03:02.619059+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3uCF33Ux1d2AV7Ff8"]} -{"Format": "IDEA0", "ID": "abfbb6c1-b226-4006-9dfb-069d0fccbaa7", "DetectTime": "2023-10-30T14:03:02.628247+02:00", "EventTime": "2023-10-30T14:03:02.628269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CI1P071xftbEmv0lUe"]} -{"Format": "IDEA0", "ID": "7385fb9d-844e-4323-9e8b-7430d5bffcba", "DetectTime": "2023-10-30T14:03:02.661424+02:00", "EventTime": "2023-10-30T14:03:02.661440+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0BMJA1GkNmvseA6kd"]} -{"Format": "IDEA0", "ID": "74a20408-fd6b-45e7-bc73-c8b7abd81907", "DetectTime": "2023-10-30T14:03:02.669483+02:00", "EventTime": "2023-10-30T14:03:02.669509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["CtakIFXWt3Kh4yw1k"]} -{"Format": "IDEA0", "ID": "87226561-f4b6-43ce-aca0-2aaa403bb631", "DetectTime": "2023-10-30T14:03:02.702877+02:00", "EventTime": "2023-10-30T14:03:02.702899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["CavLEq12RoovGznYrk"]} -{"Format": "IDEA0", "ID": "58c7895c-e966-4ae5-b8b3-aa4bade8962d", "DetectTime": "2023-10-30T14:03:02.738737+02:00", "EventTime": "2023-10-30T14:03:02.738853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["C5cH4h3DalPLRcllwc"]} -{"Format": "IDEA0", "ID": "4a60f343-e1ce-4b87-a424-a45d1df2dded", "DetectTime": "2023-10-30T14:03:02.784837+02:00", "EventTime": "2023-10-30T14:03:02.784864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["Cx6EU73Xps6rS1aEcd"]} -{"Format": "IDEA0", "ID": "37f1b338-1ba2-445f-8fe6-130944a7d836", "DetectTime": "2023-10-30T14:03:02.819961+02:00", "EventTime": "2023-10-30T14:03:02.819978+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CRuwhA1pya95zovRV6"]} -{"Format": "IDEA0", "ID": "32523233-635c-4af4-a815-8736bf19addb", "DetectTime": "2023-10-30T14:03:02.896508+02:00", "EventTime": "2023-10-30T14:03:02.896527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["C0ZnNA25knxgBdkWnf"]} -{"Format": "IDEA0", "ID": "0d34c9f9-1d06-4d3c-a1f2-581c2f98db9c", "DetectTime": "2023-10-30T14:03:02.929377+02:00", "EventTime": "2023-10-30T14:03:02.929391+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHCeYR2Zn9VXTcmbob"]} -{"Format": "IDEA0", "ID": "ba94fed2-216c-4335-b4da-b1c84468fbc8", "DetectTime": "2023-10-30T14:03:02.938882+02:00", "EventTime": "2023-10-30T14:03:02.938908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CISEDv3lk1cwhIZu4l"]} -{"Format": "IDEA0", "ID": "16fab679-5e23-4568-b5a1-777b00935ca1", "DetectTime": "2023-10-30T14:03:02.969976+02:00", "EventTime": "2023-10-30T14:03:02.969989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CA1wVz3aYYAF7kCnqg"]} -{"Format": "IDEA0", "ID": "fcb65781-203a-4718-b52d-bc13112e0325", "DetectTime": "2023-10-30T14:03:03.002020+02:00", "EventTime": "2023-10-30T14:03:03.002047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CCwuAF31NQJiYYAGNd"]} -{"Format": "IDEA0", "ID": "56f04e21-dc7b-491e-8faa-6ceaf04d1628", "DetectTime": "2023-10-30T14:03:03.033649+02:00", "EventTime": "2023-10-30T14:03:03.033666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["Cv3w4Z2qNtKw6KBvsk"]} -{"Format": "IDEA0", "ID": "094995ad-c24d-4361-abcf-14d45f7c168c", "DetectTime": "2023-10-30T14:03:03.064495+02:00", "EventTime": "2023-10-30T14:03:03.064516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C81vGv6sFfqt14R8j", "C5avrf2CsYEOS1u6Tf", "CL4IRN3gMhdE3c1gth", "C0BMJA1GkNmvseA6kd"]} -{"Format": "IDEA0", "ID": "fbc71202-9a73-475f-959d-c701a4b876ca", "DetectTime": "2023-10-30T14:03:03.073624+02:00", "EventTime": "2023-10-30T14:03:03.073761+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5avrf2CsYEOS1u6Tf"]} -{"Format": "IDEA0", "ID": "094f2868-000b-40af-8506-d9824b9cfe3d", "DetectTime": "2023-10-30T14:03:03.083406+02:00", "EventTime": "2023-10-30T14:03:03.083431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.134.161.217 ", "ContentType": "text/plain"}], "uids": ["CspaJx1PO6TptJVmB8"]} -{"Format": "IDEA0", "ID": "15b48c32-7d84-4d9f-b4b0-081ebc0e70b5", "DetectTime": "2023-10-30T14:03:03.115659+02:00", "EventTime": "2023-10-30T14:03:03.115676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CLkWeY2BiEuPYetMSl"]} -{"Format": "IDEA0", "ID": "31bdbaef-7334-46ce-9607-6921c2284241", "DetectTime": "2023-10-30T14:03:03.148370+02:00", "EventTime": "2023-10-30T14:03:03.148390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CEf5iQ2otPQBrSfM95"]} -{"Format": "IDEA0", "ID": "7ddff2f5-e006-462e-b434-7bf7cab6e3ac", "DetectTime": "2023-10-30T14:03:03.181330+02:00", "EventTime": "2023-10-30T14:03:03.181351+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKtqlH136X3z5EeO2l"]} -{"Format": "IDEA0", "ID": "4e146133-3311-4fa1-b086-408d330f65be", "DetectTime": "2023-10-30T14:03:03.191219+02:00", "EventTime": "2023-10-30T14:03:03.191242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.206.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.206.142.232 ", "ContentType": "text/plain"}], "uids": ["CbarfstRfr8BUAYL4"]} -{"Format": "IDEA0", "ID": "67efe506-d417-457f-85d7-fdfc806aca3e", "DetectTime": "2023-10-30T14:03:03.224558+02:00", "EventTime": "2023-10-30T14:03:03.224587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CI71jv2EIs5jVgGuOg"]} -{"Format": "IDEA0", "ID": "ceb7144c-01db-4bc7-8d39-94c48ce323e4", "DetectTime": "2023-10-30T14:03:03.259015+02:00", "EventTime": "2023-10-30T14:03:03.259036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CVPNoG41pAEnqK6wqe"]} -{"Format": "IDEA0", "ID": "5439f93d-4530-4d8d-9130-1af55af20ce9", "DetectTime": "2023-10-30T14:03:03.291813+02:00", "EventTime": "2023-10-30T14:03:03.291835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["C9rPYq13SI5X8fqFFb"]} -{"Format": "IDEA0", "ID": "d84f8777-f3f3-42ff-91f8-4f0a05f6bf6c", "DetectTime": "2023-10-30T14:03:03.326655+02:00", "EventTime": "2023-10-30T14:03:03.326675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CJKFw627PFy0UoQt51"]} -{"Format": "IDEA0", "ID": "a6517446-cd9e-4b88-8199-9a0b104a6f00", "DetectTime": "2023-10-30T14:03:03.361657+02:00", "EventTime": "2023-10-30T14:03:03.361675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["ClqShq19X8nzIL06df"]} -{"Format": "IDEA0", "ID": "9cb7a8a0-d5b1-4898-baf4-4c6eb7f6263e", "DetectTime": "2023-10-30T14:03:03.393348+02:00", "EventTime": "2023-10-30T14:03:03.393370+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CHxW6Y1wEHOi6JPeX6"]} -{"Format": "IDEA0", "ID": "24c8493f-02ca-4f78-a16e-1ecf1eb6ee7b", "DetectTime": "2023-10-30T14:03:03.458544+02:00", "EventTime": "2023-10-30T14:03:03.458567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["Cp7gjo1AUCf6FfCjOl"]} -{"Format": "IDEA0", "ID": "9d305e2b-daf9-44ad-942b-d7b96fa41155", "DetectTime": "2023-10-30T14:03:03.493253+02:00", "EventTime": "2023-10-30T14:03:03.493280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CJyEBO3veMXQVEFqP2"]} -{"Format": "IDEA0", "ID": "f4ec917f-0dd9-4e86-8b8d-5bacab190b4e", "DetectTime": "2023-10-30T14:03:03.526525+02:00", "EventTime": "2023-10-30T14:03:03.526550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.6.58.68 ", "ContentType": "text/plain"}], "uids": ["CRphdESP9CuZMqdY9"]} -{"Format": "IDEA0", "ID": "27214386-a60d-48cc-a315-c33e745bf3e2", "DetectTime": "2023-10-30T14:03:03.572933+02:00", "EventTime": "2023-10-30T14:03:03.572952+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Chvv4G4V2zY3I2kWdb"]} -{"Format": "IDEA0", "ID": "b7c2a11f-a7dd-4746-8c87-31dc5f8d93cb", "DetectTime": "2023-10-30T14:03:03.580536+02:00", "EventTime": "2023-10-30T14:03:03.580553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CCEWH04vy5CyAy7Tn2"]} -{"Format": "IDEA0", "ID": "cecc7b7c-4425-419b-bd5a-5cb9e46dcf16", "DetectTime": "2023-10-30T14:03:03.616539+02:00", "EventTime": "2023-10-30T14:03:03.616578+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClAWIs1PmnlD6niqKh"]} -{"Format": "IDEA0", "ID": "c792df3f-dce7-4903-9465-c148ae0f66a6", "DetectTime": "2023-10-30T14:03:03.624554+02:00", "EventTime": "2023-10-30T14:03:03.624572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["C6xyrR3yL225wKW7R3"]} -{"Format": "IDEA0", "ID": "ebf6692d-d054-4841-9b9d-ddce56d50d8b", "DetectTime": "2023-10-30T14:03:03.662265+02:00", "EventTime": "2023-10-30T14:03:03.662279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CZqBO83LWXrl2F6ky5"]} -{"Format": "IDEA0", "ID": "f459f8ec-5318-40b6-a87e-e6a5330c1146", "DetectTime": "2023-10-30T14:03:03.698746+02:00", "EventTime": "2023-10-30T14:03:03.698770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CNoow5MPrKveyHkH9"]} -{"Format": "IDEA0", "ID": "77a78e23-3821-4964-aa78-e3a2ecbd1244", "DetectTime": "2023-10-30T14:03:03.732591+02:00", "EventTime": "2023-10-30T14:03:03.732611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["Ce8Jw01YF6rPfHV768"]} -{"Format": "IDEA0", "ID": "e5c8a0be-dc3a-476e-b81f-71a4f198d370", "DetectTime": "2023-10-30T14:03:03.765439+02:00", "EventTime": "2023-10-30T14:03:03.765459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CeOAzn1lAhwT1or0Ka"]} -{"Format": "IDEA0", "ID": "ae995cf2-a789-4741-ad04-63a71e65c979", "DetectTime": "2023-10-30T14:03:03.802497+02:00", "EventTime": "2023-10-30T14:03:03.802523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["ClDzTq3rVt8i88AFh"]} -{"Format": "IDEA0", "ID": "2ceca65c-ab3b-49d6-8c50-3cb9aecbe614", "DetectTime": "2023-10-30T14:03:03.836283+02:00", "EventTime": "2023-10-30T14:03:03.836308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CEa8Ga4Q6qby0Hde7a"]} -{"Format": "IDEA0", "ID": "035d1b9c-2a6a-49d0-ba2f-f9d283ece2a8", "DetectTime": "2023-10-30T14:03:03.869846+02:00", "EventTime": "2023-10-30T14:03:03.869874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["C9Z0YYeLqt6cVqFqg"]} -{"Format": "IDEA0", "ID": "7a9e94fc-b596-4a00-8158-f426ac862ccd", "DetectTime": "2023-10-30T14:03:03.902709+02:00", "EventTime": "2023-10-30T14:03:03.902726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CDKqF828ZcwIbCunK3"]} -{"Format": "IDEA0", "ID": "31d0a582-c91e-41d7-bf89-6ecc79e04a1e", "DetectTime": "2023-10-30T14:03:03.932746+02:00", "EventTime": "2023-10-30T14:03:03.932761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CWBsAg4hrMwVYRLWEg"]} -{"Format": "IDEA0", "ID": "f3bf4b4b-4ffc-476e-94a3-eec0dd9e1297", "DetectTime": "2023-10-30T14:03:03.966733+02:00", "EventTime": "2023-10-30T14:03:03.966760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["C4xRuk4aKOpV9VzTol"]} -{"Format": "IDEA0", "ID": "28037abf-61f6-4276-af86-02424eb1b0bd", "DetectTime": "2023-10-30T14:03:04.013533+02:00", "EventTime": "2023-10-30T14:03:04.013546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CYl4tdt8nvvwg40E1"]} -{"Format": "IDEA0", "ID": "09930b8e-0c1e-4b9b-a50f-be0b537c4068", "DetectTime": "2023-10-30T14:03:04.035759+02:00", "EventTime": "2023-10-30T14:03:04.035780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CN9UPa2knvkFt3WIYf"]} -{"Format": "IDEA0", "ID": "e8aa6547-c83d-4907-ad2b-929b9e2f5e65", "DetectTime": "2023-10-30T14:03:04.070107+02:00", "EventTime": "2023-10-30T14:03:04.070125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CYvl0e2Z4RkhDAZgsg"]} -{"Format": "IDEA0", "ID": "b9062c78-b564-4817-89b0-9e63151ed5b5", "DetectTime": "2023-10-30T14:03:04.091352+02:00", "EventTime": "2023-10-30T14:03:04.091382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CHkKO53NrwtirqAEJh"]} -{"Format": "IDEA0", "ID": "a7b927bb-cce5-47bb-9cbf-b9796acded05", "DetectTime": "2023-10-30T14:03:04.125970+02:00", "EventTime": "2023-10-30T14:03:04.125993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Hostname": ["adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam", "ContentType": "text/plain"}], "uids": ["CXEAAYVxNtFWHfjpl"]} -{"Format": "IDEA0", "ID": "d4ec36c3-d41c-43df-a8c1-87d91a741b00", "DetectTime": "2023-10-30T14:03:04.156017+02:00", "EventTime": "2023-10-30T14:03:04.156036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CX24wB1hJUS81gQYnb"]} -{"Format": "IDEA0", "ID": "1c7d592f-fbd7-4608-92e8-656ca37e480d", "DetectTime": "2023-10-30T14:03:04.192468+02:00", "EventTime": "2023-10-30T14:03:04.192488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["Cl9vtS2rPq6Gr66cNa"]} -{"Format": "IDEA0", "ID": "18e109ff-e50c-452d-a02d-a3bafec3ff66", "DetectTime": "2023-10-30T14:03:04.226896+02:00", "EventTime": "2023-10-30T14:03:04.226968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["Clz3B63nC6pPQbrz51"]} -{"Format": "IDEA0", "ID": "2f1456c4-440e-4d55-816f-3d68bbb8728b", "DetectTime": "2023-10-30T14:03:04.250311+02:00", "EventTime": "2023-10-30T14:03:04.250330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["Cajwoq2ZJxZcMIZQQ5"]} -{"Format": "IDEA0", "ID": "78303106-2118-41fd-bb5b-2f0e5de22b35", "DetectTime": "2023-10-30T14:03:04.285780+02:00", "EventTime": "2023-10-30T14:03:04.285804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CARBJY12fYcZSLzbUd"]} -{"Format": "IDEA0", "ID": "95b52b22-412d-4b34-8d11-a8d025ffa6fe", "DetectTime": "2023-10-30T14:03:04.320635+02:00", "EventTime": "2023-10-30T14:03:04.320677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["C0iD3y117zyQS1EZs9"]} -{"Format": "IDEA0", "ID": "9e755169-172b-446c-9263-bfdbac4a8732", "DetectTime": "2023-10-30T14:03:04.356382+02:00", "EventTime": "2023-10-30T14:03:04.356404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["CEwVUN1RROUSL66QOi"]} -{"Format": "IDEA0", "ID": "529fb136-e7f2-4438-9a30-ef5f9d408038", "DetectTime": "2023-10-30T14:03:04.380215+02:00", "EventTime": "2023-10-30T14:03:04.380236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CQ8hf51QcatlAgQvCl"]} -{"Format": "IDEA0", "ID": "7520b2a2-6be5-4747-a636-5ef89ade9ccc", "DetectTime": "2023-10-30T14:03:04.414008+02:00", "EventTime": "2023-10-30T14:03:04.414034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CUzhG84q3iVL0jro24"]} -{"Format": "IDEA0", "ID": "cd2250c2-01d5-4d17-8a27-af80fa37fd18", "DetectTime": "2023-10-30T14:03:04.453155+02:00", "EventTime": "2023-10-30T14:03:04.453175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CzIyOg4uoCZ7kAciLd"]} -{"Format": "IDEA0", "ID": "4026552c-3322-42ad-b7c0-d5a66d212435", "DetectTime": "2023-10-30T14:03:04.491812+02:00", "EventTime": "2023-10-30T14:03:04.491932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C8Rtmb2Fwh8bw0rRh"]} -{"Format": "IDEA0", "ID": "b3676aef-2629-4309-b4bc-5766eeb27439", "DetectTime": "2023-10-30T14:03:04.517845+02:00", "EventTime": "2023-10-30T14:03:04.517863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Hostname": ["adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam", "ContentType": "text/plain"}], "uids": ["CU3SNt8eY9oHpGIAk"]} -{"Format": "IDEA0", "ID": "a1bf3c7e-bc92-498a-a2eb-0f3c00b93a2f", "DetectTime": "2023-10-30T14:03:04.556190+02:00", "EventTime": "2023-10-30T14:03:04.556219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.206.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.206.142.232 ", "ContentType": "text/plain"}], "uids": ["Cq74ms1KNB47xBR9Y5"]} -{"Format": "IDEA0", "ID": "178ef27d-806a-4c91-a232-f1799c19422c", "DetectTime": "2023-10-30T14:03:04.682838+02:00", "EventTime": "2023-10-30T14:03:04.682859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CtZ4Wo39foRydnmIvh"]} -{"Format": "IDEA0", "ID": "720a21a5-7110-4d5e-b8ee-f67a10019db5", "DetectTime": "2023-10-30T14:03:04.720319+02:00", "EventTime": "2023-10-30T14:03:04.720342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CPd74D3GHHGjwIS344"]} -{"Format": "IDEA0", "ID": "5b6a0ce1-db84-4307-a5ed-179a3f1ee248", "DetectTime": "2023-10-30T14:03:04.754945+02:00", "EventTime": "2023-10-30T14:03:04.754969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CpRJwV3zEIO95NgJf8"]} -{"Format": "IDEA0", "ID": "0f8b85ef-9157-4432-9e5d-67b2a868091c", "DetectTime": "2023-10-30T14:03:04.795535+02:00", "EventTime": "2023-10-30T14:03:04.795550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CMk7p41LO8DRCnLPT8"]} -{"Format": "IDEA0", "ID": "4eab582f-ae60-4a1c-bdc3-bc7670028962", "DetectTime": "2023-10-30T14:03:04.832625+02:00", "EventTime": "2023-10-30T14:03:04.832642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CqW8PS3zYhv63IBpxk"]} -{"Format": "IDEA0", "ID": "57a5697c-dc7b-4806-9e17-028c1fdd2be2", "DetectTime": "2023-10-30T14:03:04.875676+02:00", "EventTime": "2023-10-30T14:03:04.875698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["Cbpt1D4wK7QhjorjW5"]} -{"Format": "IDEA0", "ID": "6d73155f-97ce-4c1b-ba88-7978439eba13", "DetectTime": "2023-10-30T14:03:04.917786+02:00", "EventTime": "2023-10-30T14:03:04.917818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CzKQPU3LodwYrzFs1h"]} -{"Format": "IDEA0", "ID": "55e02d71-b18e-4c77-8a04-058b8a927fa0", "DetectTime": "2023-10-30T14:03:04.956757+02:00", "EventTime": "2023-10-30T14:03:04.956780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkGr8hf9IRqad63U"]} -{"Format": "IDEA0", "ID": "21766c2a-f0b0-42e4-a3ca-987637608c76", "DetectTime": "2023-10-30T14:03:04.997879+02:00", "EventTime": "2023-10-30T14:03:04.997895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["CM99dr4N02h4CKqPz8"]} -{"Format": "IDEA0", "ID": "543ef0d4-7077-4d81-b21c-7a40c85e1c9b", "DetectTime": "2023-10-30T14:03:05.024571+02:00", "EventTime": "2023-10-30T14:03:05.024591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CB0XWd13tAhOcr5Ph"]} -{"Format": "IDEA0", "ID": "066c9619-0368-4445-8450-da78a164f5bc", "DetectTime": "2023-10-30T14:03:05.051668+02:00", "EventTime": "2023-10-30T14:03:05.051685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CxllVPhX7vWDnPjYi"]} -{"Format": "IDEA0", "ID": "57518dcc-8427-42af-9054-8076212c5f96", "DetectTime": "2023-10-30T14:03:05.083625+02:00", "EventTime": "2023-10-30T14:03:05.083641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CukbQv2vGJNbsv4dH5"]} -{"Format": "IDEA0", "ID": "fe90931c-8695-4a18-aa11-8657785c6037", "DetectTime": "2023-10-30T14:03:05.117574+02:00", "EventTime": "2023-10-30T14:03:05.117592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["Cy681N1gubur5PhjWl"]} -{"Format": "IDEA0", "ID": "a8cb08c5-9053-4172-850c-4396f276b975", "DetectTime": "2023-10-30T14:03:05.145779+02:00", "EventTime": "2023-10-30T14:03:05.145807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CeLgw2hV4F8tIgNNb"]} -{"Format": "IDEA0", "ID": "1b37661e-c54d-4fb1-a347-58526e26a07d", "DetectTime": "2023-10-30T14:03:05.188276+02:00", "EventTime": "2023-10-30T14:03:05.188295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CmOumJ23ffTkfOkdqb"]} -{"Format": "IDEA0", "ID": "83b7fadc-505d-4ec5-bc49-46cb63e0bcc6", "DetectTime": "2023-10-30T14:03:05.231049+02:00", "EventTime": "2023-10-30T14:03:05.231068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.134.124.242 ", "ContentType": "text/plain"}], "uids": ["C8lvuj3TwUcKA0lCQd"]} -{"Format": "IDEA0", "ID": "77d96d96-fdf8-4c65-a7ac-af03fe4b621e", "DetectTime": "2023-10-30T14:03:05.271831+02:00", "EventTime": "2023-10-30T14:03:05.271849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CsSkwB4Em2SioO4Xse"]} -{"Format": "IDEA0", "ID": "d77b569d-edd8-4191-8c24-855d12409419", "DetectTime": "2023-10-30T14:03:05.307676+02:00", "EventTime": "2023-10-30T14:03:05.307699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C24LCs4llyIqlix6R7"]} -{"Format": "IDEA0", "ID": "79dde3a9-58f0-431b-857d-63b6a7c3acd1", "DetectTime": "2023-10-30T14:03:05.348861+02:00", "EventTime": "2023-10-30T14:03:05.348881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.6.58.68 ", "ContentType": "text/plain"}], "uids": ["CpYhck4gwJloAQNCie"]} -{"Format": "IDEA0", "ID": "8155974b-93af-468c-90a9-7c6d64475a32", "DetectTime": "2023-10-30T14:03:05.378520+02:00", "EventTime": "2023-10-30T14:03:05.378552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["C7uy372XQisagrMcTe"]} -{"Format": "IDEA0", "ID": "a0fb54fa-4289-4943-8570-4d8c6025a3a4", "DetectTime": "2023-10-30T14:03:05.423487+02:00", "EventTime": "2023-10-30T14:03:05.423509+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Hostname": ["host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 95.104.77.164 from 10.0.2.19. blacklisted IP AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CsT8Wp3efPCztZ30W8"]} -{"Format": "IDEA0", "ID": "256c8d31-38c6-48a0-b816-d3b48d9c98a1", "DetectTime": "2023-10-30T14:03:05.495568+02:00", "EventTime": "2023-10-30T14:03:05.495595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CfWGHY2W9eIPt7t4i2"]} -{"Format": "IDEA0", "ID": "0746d43c-efbd-46e5-83fa-992f24adad53", "DetectTime": "2023-10-30T14:03:05.527655+02:00", "EventTime": "2023-10-30T14:03:05.527681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["C175SY2SuOPBUmULHd"]} -{"Format": "IDEA0", "ID": "11097c0d-2eed-4315-a084-2c336bab5ee5", "DetectTime": "2023-10-30T14:03:05.556236+02:00", "EventTime": "2023-10-30T14:03:05.556253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CPygJT3ubauzLACyD3"]} -{"Format": "IDEA0", "ID": "7f0e0f5f-ca75-40cd-8009-be615ede7445", "DetectTime": "2023-10-30T14:03:05.595730+02:00", "EventTime": "2023-10-30T14:03:05.595752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.134.161.217 ", "ContentType": "text/plain"}], "uids": ["CReUOXvDorLh4yZx2"]} -{"Format": "IDEA0", "ID": "09ffc620-4ba3-4cea-9151-3b86aa2f08b8", "DetectTime": "2023-10-30T14:03:05.636070+02:00", "EventTime": "2023-10-30T14:03:05.636097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CkBMbA2hB1eeLc6BUk"]} -{"Format": "IDEA0", "ID": "5fd9c6b5-5d05-403a-bd2f-53ebfa381870", "DetectTime": "2023-10-30T14:03:05.673897+02:00", "EventTime": "2023-10-30T14:03:05.673923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CBCkn1iUvRcEaXGA6"]} -{"Format": "IDEA0", "ID": "84fac181-b6ed-4b5a-aa0c-66bf19bb41e5", "DetectTime": "2023-10-30T14:03:05.712831+02:00", "EventTime": "2023-10-30T14:03:05.712856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CIs2vK1RDw6XP26hwc"]} -{"Format": "IDEA0", "ID": "52cbece6-94ba-4bd2-bbcd-fcfc3c5a0940", "DetectTime": "2023-10-30T14:03:05.741221+02:00", "EventTime": "2023-10-30T14:03:05.741242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CmYuON23vJV16AUPDh"]} -{"Format": "IDEA0", "ID": "b357464a-354c-4783-9674-297dac9a9dfe", "DetectTime": "2023-10-30T14:03:05.773983+02:00", "EventTime": "2023-10-30T14:03:05.774006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C08CsM2xdOrnV0ShKi"]} -{"Format": "IDEA0", "ID": "e287156d-9eac-4de8-9e89-49cbe3d35242", "DetectTime": "2023-10-30T14:03:05.815080+02:00", "EventTime": "2023-10-30T14:03:05.815098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CTiqhM3aW6tOE2rJt2"]} -{"Format": "IDEA0", "ID": "e732dee7-7336-43a0-abc3-ba17612df0ae", "DetectTime": "2023-10-30T14:03:05.857518+02:00", "EventTime": "2023-10-30T14:03:05.857547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["Cf08BYwAAZBopQZne"]} -{"Format": "IDEA0", "ID": "2c972d84-dde5-4bc5-9574-fb4efc7e296f", "DetectTime": "2023-10-30T14:03:05.883866+02:00", "EventTime": "2023-10-30T14:03:05.883885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["CcIwfE4quboWdYVDHf"]} -{"Format": "IDEA0", "ID": "43f133d9-b5d0-45dd-b425-1f9ce081a1db", "DetectTime": "2023-10-30T14:03:05.912056+02:00", "EventTime": "2023-10-30T14:03:05.912073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["Cojer331ZQYf3pciXd"]} -{"Format": "IDEA0", "ID": "597a3ab6-84a0-4179-823f-b2c8fc74e1d0", "DetectTime": "2023-10-30T14:03:05.939699+02:00", "EventTime": "2023-10-30T14:03:05.939720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Hostname": ["adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam", "ContentType": "text/plain"}], "uids": ["Cgz5s720iSUHvt4Si6"]} -{"Format": "IDEA0", "ID": "e97c2db1-4ffd-4bfc-ab85-a23e351d9240", "DetectTime": "2023-10-30T14:03:05.983763+02:00", "EventTime": "2023-10-30T14:03:05.983784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.69.172.54 ", "ContentType": "text/plain"}], "uids": ["CTcDA24jP0KPHi3Ewl"]} -{"Format": "IDEA0", "ID": "7090a9fc-cc9a-42fa-af63-89da4be782c2", "DetectTime": "2023-10-30T14:03:06.025257+02:00", "EventTime": "2023-10-30T14:03:06.025282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CA2thz31onpLUJq1el"]} -{"Format": "IDEA0", "ID": "b7d5077b-0f64-47f9-8cfe-9964bf3b746b", "DetectTime": "2023-10-30T14:03:06.066272+02:00", "EventTime": "2023-10-30T14:03:06.066294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["C99zpn4ZDs0ddVKnXh"]} -{"Format": "IDEA0", "ID": "33fcd73d-2fca-44e7-af8f-6e38ada2e6c6", "DetectTime": "2023-10-30T14:03:06.101388+02:00", "EventTime": "2023-10-30T14:03:06.101405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["C6gV6e4vZWcokOzyAk"]} -{"Format": "IDEA0", "ID": "b0078a10-ee33-42e0-bc5a-4db425cc526f", "DetectTime": "2023-10-30T14:03:06.127741+02:00", "EventTime": "2023-10-30T14:03:06.127763+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMT0MH1ciyuPCNiPeg"]} -{"Format": "IDEA0", "ID": "0ab8bde3-8a65-4883-8c89-c467aa144a32", "DetectTime": "2023-10-30T14:03:06.136188+02:00", "EventTime": "2023-10-30T14:03:06.136204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C0v69cnkjdVPL7AO8"]} -{"Format": "IDEA0", "ID": "39335d33-689a-4abe-a41a-1705a66b2874", "DetectTime": "2023-10-30T14:03:06.163914+02:00", "EventTime": "2023-10-30T14:03:06.163932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CWhHOo1uwGYBxQGdCc"]} -{"Format": "IDEA0", "ID": "50c2cc91-81ca-4bdb-adba-ba92110600ba", "DetectTime": "2023-10-30T14:03:06.202290+02:00", "EventTime": "2023-10-30T14:03:06.202317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CQupEr4BZFzhITquAh"]} -{"Format": "IDEA0", "ID": "3c0df3c1-21be-473b-8aab-395eda1b0ab0", "DetectTime": "2023-10-30T14:03:06.229775+02:00", "EventTime": "2023-10-30T14:03:06.229792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CzJfqw1EGBTyxs67nj"]} -{"Format": "IDEA0", "ID": "f0d4e23c-a59d-4680-9c3c-414ed0ac5b60", "DetectTime": "2023-10-30T14:03:06.269727+02:00", "EventTime": "2023-10-30T14:03:06.269744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CbEE1H37V6nJOyeE23"]} -{"Format": "IDEA0", "ID": "c6d377b0-f89c-4f04-896f-6ed9d78c7ec7", "DetectTime": "2023-10-30T14:03:06.313071+02:00", "EventTime": "2023-10-30T14:03:06.313088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["ClsOGZuA230GNWuS2"]} -{"Format": "IDEA0", "ID": "c919f1aa-278c-4d5c-a96b-e112f3ace78b", "DetectTime": "2023-10-30T14:03:06.349381+02:00", "EventTime": "2023-10-30T14:03:06.349405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Hostname": ["adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam", "ContentType": "text/plain"}], "uids": ["CXlqLr4X6AUEiuzvLi"]} -{"Format": "IDEA0", "ID": "093a43c2-b36e-4ff1-bbf0-dd6f355f1a49", "DetectTime": "2023-10-30T14:03:06.393902+02:00", "EventTime": "2023-10-30T14:03:06.393923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C5ECbs1EVditZSYfn"]} -{"Format": "IDEA0", "ID": "d02c5127-9052-4998-9180-fa7cc510fe4f", "DetectTime": "2023-10-30T14:03:06.432466+02:00", "EventTime": "2023-10-30T14:03:06.432477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["CGd27D3Qz5QL5yJuTk"]} -{"Format": "IDEA0", "ID": "3ef71dee-44b7-4fc0-8a10-0497e99ed5ca", "DetectTime": "2023-10-30T14:03:06.469611+02:00", "EventTime": "2023-10-30T14:03:06.469636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CsfVQo26hNCg4Jr8Vi"]} -{"Format": "IDEA0", "ID": "e8a0b67b-860a-4645-abb7-d1439aff7e36", "DetectTime": "2023-10-30T14:03:06.505810+02:00", "EventTime": "2023-10-30T14:03:06.505830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CShFnv2RQMSi5QKWxg"]} -{"Format": "IDEA0", "ID": "86b4d7ae-3c62-4702-8a1b-03ca62a5138f", "DetectTime": "2023-10-30T14:03:06.530294+02:00", "EventTime": "2023-10-30T14:03:06.530314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CmOdBw18z12jaSxGw7"]} -{"Format": "IDEA0", "ID": "be21c53f-95d9-4a8b-93c6-3e14769a75ae", "DetectTime": "2023-10-30T14:03:06.566416+02:00", "EventTime": "2023-10-30T14:03:06.566432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CpQKul3eAIgZMF78M4"]} -{"Format": "IDEA0", "ID": "65ee6302-8191-449d-a0c6-f978f3e60459", "DetectTime": "2023-10-30T14:03:06.590302+02:00", "EventTime": "2023-10-30T14:03:06.590321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CVVxjp408si79DseS6"]} -{"Format": "IDEA0", "ID": "279fd747-eb83-48a8-98cc-500c2f274387", "DetectTime": "2023-10-30T14:03:06.627394+02:00", "EventTime": "2023-10-30T14:03:06.627411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["CDItvvFZ9qZTwdES2"]} -{"Format": "IDEA0", "ID": "cf123043-047c-4997-bb24-728c99b3e6c4", "DetectTime": "2023-10-30T14:03:06.665314+02:00", "EventTime": "2023-10-30T14:03:06.665333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CERoYe3PbZLIPQDGy1"]} -{"Format": "IDEA0", "ID": "b520381b-34ec-4bcc-bbbc-48af41cffbe7", "DetectTime": "2023-10-30T14:03:06.695185+02:00", "EventTime": "2023-10-30T14:03:06.695207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.134.161.217 ", "ContentType": "text/plain"}], "uids": ["CrQ59g3FFG1Luz1E3c"]} -{"Format": "IDEA0", "ID": "10046aaa-74bf-41d4-a4a8-7203ebab72fc", "DetectTime": "2023-10-30T14:03:06.737660+02:00", "EventTime": "2023-10-30T14:03:06.737685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CQfARu3dIa8jA3tRDc"]} -{"Format": "IDEA0", "ID": "49b6b9fa-4cf7-4fc3-a60d-915197a299c5", "DetectTime": "2023-10-30T14:03:06.764845+02:00", "EventTime": "2023-10-30T14:03:06.764869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CjjEAu3yhNpv9urqI7"]} -{"Format": "IDEA0", "ID": "d54bc140-4aab-4eaa-8466-b9b7c3430183", "DetectTime": "2023-10-30T14:03:06.805942+02:00", "EventTime": "2023-10-30T14:03:06.805960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C4CPtDX8MknSwR8r6"]} -{"Format": "IDEA0", "ID": "1642fda2-2c73-4713-86ed-6a94fa20ab88", "DetectTime": "2023-10-30T14:03:06.932947+02:00", "EventTime": "2023-10-30T14:03:06.932969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CbRdLH2BoEe1gGhMFg"]} -{"Format": "IDEA0", "ID": "1e7b8e79-c47b-415d-a76e-6ab53c14b5b1", "DetectTime": "2023-10-30T14:03:06.967186+02:00", "EventTime": "2023-10-30T14:03:06.967208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CZv94k4x08MhnUENM9"]} -{"Format": "IDEA0", "ID": "2f2f96f8-fa26-4843-b4ac-6e5b873b24fa", "DetectTime": "2023-10-30T14:03:07.002540+02:00", "EventTime": "2023-10-30T14:03:07.002566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.6.58.68 ", "ContentType": "text/plain"}], "uids": ["CJPXRv1yIZh2pad5Hf"]} -{"Format": "IDEA0", "ID": "1ea2f0f5-9fbc-4591-a8b3-4fc4a535b7e6", "DetectTime": "2023-10-30T14:03:07.044820+02:00", "EventTime": "2023-10-30T14:03:07.044839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["C8hl482NTHjgVlAHXa"]} -{"Format": "IDEA0", "ID": "ec1fe1c4-aaa2-44df-bb29-6badee7c3fa4", "DetectTime": "2023-10-30T14:03:07.083201+02:00", "EventTime": "2023-10-30T14:03:07.083317+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ci7WyADsr5kpEGBKa"]} -{"Format": "IDEA0", "ID": "9c79130e-b0ea-4d5d-ab1e-713718533ea8", "DetectTime": "2023-10-30T14:03:07.092051+02:00", "EventTime": "2023-10-30T14:03:07.092074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["Cr4m1oXjnwcejzrc9"]} -{"Format": "IDEA0", "ID": "8586ab55-0221-4b39-a505-0b72656672c3", "DetectTime": "2023-10-30T14:03:07.118324+02:00", "EventTime": "2023-10-30T14:03:07.118343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CgXeKO2GbSORHCGCR2"]} -{"Format": "IDEA0", "ID": "6380deac-d7e9-4d31-9e47-cdb18757d05f", "DetectTime": "2023-10-30T14:03:07.159010+02:00", "EventTime": "2023-10-30T14:03:07.159031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CruCC02c9RgpD8inhb"]} -{"Format": "IDEA0", "ID": "5467583b-b7fc-4c69-b691-59140465a6fa", "DetectTime": "2023-10-30T14:03:07.184019+02:00", "EventTime": "2023-10-30T14:03:07.184034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CVLE3tLdM3Vf0Yk0d"]} -{"Format": "IDEA0", "ID": "e8bde2c8-a1a9-4911-892d-70db4541bd24", "DetectTime": "2023-10-30T14:03:07.214337+02:00", "EventTime": "2023-10-30T14:03:07.214355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CPuGmu1DTnZNLqpDD3"]} -{"Format": "IDEA0", "ID": "a4994c8a-a80f-4171-bcb0-9fb5ec1c4ad9", "DetectTime": "2023-10-30T14:03:07.260563+02:00", "EventTime": "2023-10-30T14:03:07.260591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CTiERP2FLw75iLOSC2"]} -{"Format": "IDEA0", "ID": "0bc674b5-5d01-487b-af56-b2aec32266f3", "DetectTime": "2023-10-30T14:03:07.298301+02:00", "EventTime": "2023-10-30T14:03:07.298325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CyqqcQq1ZngdrO7n7"]} -{"Format": "IDEA0", "ID": "11a77180-f307-4153-ae7d-32ee41bd2a31", "DetectTime": "2023-10-30T14:03:07.341973+02:00", "EventTime": "2023-10-30T14:03:07.341992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CSEwZ5IwiXAfUV8Ug"]} -{"Format": "IDEA0", "ID": "e5f7246a-8eff-437e-94c5-51e33cd42595", "DetectTime": "2023-10-30T14:03:07.380807+02:00", "EventTime": "2023-10-30T14:03:07.380834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["ClMaYo3sqcFWHJPL2a"]} -{"Format": "IDEA0", "ID": "4e5963f4-edf7-4613-9a1d-8ad3a4cd8c1a", "DetectTime": "2023-10-30T14:03:07.406074+02:00", "EventTime": "2023-10-30T14:03:07.406094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["ClGIjb3aKKMVr8eLLj"]} -{"Format": "IDEA0", "ID": "dc7e0a9a-ad5b-454f-a272-d5762fc3ca11", "DetectTime": "2023-10-30T14:03:07.451351+02:00", "EventTime": "2023-10-30T14:03:07.451425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C2azecBqRZzvGIY7j"]} -{"Format": "IDEA0", "ID": "0d66d567-422d-475e-afd0-91d1b270275e", "DetectTime": "2023-10-30T14:03:07.488460+02:00", "EventTime": "2023-10-30T14:03:07.488480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.9.200"], "Hostname": ["adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space, tags= spam", "ContentType": "text/plain"}], "uids": ["CqjuK23HNdemPirhje"]} -{"Format": "IDEA0", "ID": "b9dc7deb-ba18-424b-9757-eede56e9b595", "DetectTime": "2023-10-30T14:03:07.527228+02:00", "EventTime": "2023-10-30T14:03:07.527260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CCFCbA3GxNwqSGL382"]} -{"Format": "Json", "ID": "b9dc7deb-ba18-424b-9757-eede56e9b595", "DetectTime": "2023-10-30T14:03:07.527228+02:00", "EventTime": "2023-10-30T14:03:07.527260+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T11:06:23.261131+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:03:07.679165)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab959290-3a51-40b8-84b1-c95e09dde762", "DetectTime": "2023-10-30T14:03:07.685745+02:00", "EventTime": "2023-10-30T14:03:07.685966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["C07j5MAlvwAJR7mH4"]} -{"Format": "IDEA0", "ID": "5f1d5adb-0ad4-4c4c-a9fb-b699bab3a96a", "DetectTime": "2023-10-30T14:03:07.739128+02:00", "EventTime": "2023-10-30T14:03:07.739151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["Czcieq5g6X4h9MuMl"]} -{"Format": "IDEA0", "ID": "12bd1cf5-5f01-4c67-adb7-362d016380ce", "DetectTime": "2023-10-30T14:03:07.775302+02:00", "EventTime": "2023-10-30T14:03:07.775323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CQi6L12815HwXVD9m2"]} -{"Format": "IDEA0", "ID": "c696b56c-219b-43a1-a363-deee17e25df5", "DetectTime": "2023-10-30T14:03:07.808546+02:00", "EventTime": "2023-10-30T14:03:07.808577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CigK9t1BkPNtTpsZJ4"]} -{"Format": "IDEA0", "ID": "fe7661f3-1459-4ef0-820f-82caa3b10faf", "DetectTime": "2023-10-30T14:03:07.852818+02:00", "EventTime": "2023-10-30T14:03:07.852835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.127.101.197 ", "ContentType": "text/plain"}], "uids": ["C2Zdsd2AEOnz1RrSZf"]} -{"Format": "IDEA0", "ID": "8506284a-0461-4bdc-bd91-44084a9f45ef", "DetectTime": "2023-10-30T14:03:07.893647+02:00", "EventTime": "2023-10-30T14:03:07.893668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CshLrJ3XQF7rb7l4ic"]} -{"Format": "IDEA0", "ID": "8d03117d-aff8-4597-bb86-05103a922449", "DetectTime": "2023-10-30T14:03:07.903084+02:00", "EventTime": "2023-10-30T14:03:07.903107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CZ3Ntg18pqoOTg5sUa"]} -{"Format": "IDEA0", "ID": "0b41067f-4e44-4d86-9973-a53f5c2dc6b6", "DetectTime": "2023-10-30T14:03:07.943929+02:00", "EventTime": "2023-10-30T14:03:07.943948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["CNB86v3Xkt3TWHCl6h"]} -{"Format": "IDEA0", "ID": "3aaae8fa-fb9f-4258-9f29-8b97a21301bd", "DetectTime": "2023-10-30T14:03:07.990209+02:00", "EventTime": "2023-10-30T14:03:07.990230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CcFsQ84YImB5uyjGtf"]} -{"Format": "IDEA0", "ID": "0a1d1515-27bb-43a8-9c74-62989a2b703a", "DetectTime": "2023-10-30T14:03:08.018818+02:00", "EventTime": "2023-10-30T14:03:08.018840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CtMcfC1uyD2OkydSN8"]} -{"Format": "IDEA0", "ID": "81720b20-7a2b-4398-b677-b002d8829c1f", "DetectTime": "2023-10-30T14:03:08.060782+02:00", "EventTime": "2023-10-30T14:03:08.060806+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CoaICCCpXjgNFkGS2"]} -{"Format": "IDEA0", "ID": "cbdc76e1-7919-4b57-8fb1-57acd218dfb7", "DetectTime": "2023-10-30T14:03:08.132797+02:00", "EventTime": "2023-10-30T14:03:08.132823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cl3mBHQGoLoVPqBg"]} -{"Format": "IDEA0", "ID": "14818941-3273-4cb0-8211-ccad9f24b6c1", "DetectTime": "2023-10-30T14:03:08.177349+02:00", "EventTime": "2023-10-30T14:03:08.177372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CUttu14tUHo9KICRp8"]} -{"Format": "IDEA0", "ID": "656a1419-c395-4134-a6df-bb2d86d16873", "DetectTime": "2023-10-30T14:03:08.206452+02:00", "EventTime": "2023-10-30T14:03:08.206478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.0.116.21 ", "ContentType": "text/plain"}], "uids": ["CYLKpA4CBIPfTUxzR9"]} -{"Format": "IDEA0", "ID": "d14a36cf-2aba-4050-9de8-a5c226c37d36", "DetectTime": "2023-10-30T14:03:08.248012+02:00", "EventTime": "2023-10-30T14:03:08.248030+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsZaMFhWtkm1LVHqj"]} -{"Format": "IDEA0", "ID": "7a55cb3f-39bd-4b09-9b3f-e6c77bac4312", "DetectTime": "2023-10-30T14:03:08.260073+02:00", "EventTime": "2023-10-30T14:03:08.260091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CgqWteKUh0cgnN29"]} -{"Format": "IDEA0", "ID": "f8352fa8-8be6-44db-8e37-6ae306439195", "DetectTime": "2023-10-30T14:03:08.310196+02:00", "EventTime": "2023-10-30T14:03:08.310215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["Cc6sVr235US1JAGI06"]} -{"Format": "IDEA0", "ID": "9c4e708e-1715-4fc4-8c6b-9e400e208e1a", "DetectTime": "2023-10-30T14:03:08.349993+02:00", "EventTime": "2023-10-30T14:03:08.350011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CW3WzO2OrEVnyy7Jya"]} -{"Format": "IDEA0", "ID": "9ffa8117-627e-4583-bcbb-5f9e42126487", "DetectTime": "2023-10-30T14:03:08.396245+02:00", "EventTime": "2023-10-30T14:03:08.396274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CeZpVlYVeL63AXBj5"]} -{"Format": "IDEA0", "ID": "1f8c5e8d-eccf-4540-942d-45af5d590fdc", "DetectTime": "2023-10-30T14:03:08.440606+02:00", "EventTime": "2023-10-30T14:03:08.440632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CRSajr2jUACm1NHsBc"]} -{"Format": "IDEA0", "ID": "bd382d82-6b2a-459d-97e8-0c0d254b5329", "DetectTime": "2023-10-30T14:03:08.470640+02:00", "EventTime": "2023-10-30T14:03:08.470661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CkCqz922jKCJRykK1h"]} -{"Format": "IDEA0", "ID": "b1e4fbbd-7081-4776-bac5-2012290f8a7b", "DetectTime": "2023-10-30T14:03:08.516603+02:00", "EventTime": "2023-10-30T14:03:08.516630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CBJ2IX2vUByzAsnV0a"]} -{"Format": "IDEA0", "ID": "599fa3e6-ab8c-4a06-9c4d-7d238f90f729", "DetectTime": "2023-10-30T14:03:08.544156+02:00", "EventTime": "2023-10-30T14:03:08.544186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C77tvG41Zo9MDlN96h"]} -{"Format": "IDEA0", "ID": "5d34b3b0-9bb8-415c-9f2c-8d050ac13e1a", "DetectTime": "2023-10-30T14:03:08.585970+02:00", "EventTime": "2023-10-30T14:03:08.585993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CO1d7O2Y1KAJ1CVGhf"]} -{"Format": "IDEA0", "ID": "e64eed39-f462-4684-92ba-0f2982639217", "DetectTime": "2023-10-30T14:03:08.626320+02:00", "EventTime": "2023-10-30T14:03:08.626348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CZkP2lZMeJAiPrvel"]} -{"Format": "IDEA0", "ID": "1912f891-7e8d-4215-baca-fbef8a9b8bee", "DetectTime": "2023-10-30T14:03:08.654353+02:00", "EventTime": "2023-10-30T14:03:08.654375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CzZeCu4W4BTn5Jee47"]} -{"Format": "IDEA0", "ID": "b68757f9-b940-4f30-baf0-e60520939340", "DetectTime": "2023-10-30T14:03:08.679421+02:00", "EventTime": "2023-10-30T14:03:08.679450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["C1dqEE2O0Q1AYDJj8b"]} -{"Format": "IDEA0", "ID": "302134cd-196c-4bd6-82ea-15d4f00e9413", "DetectTime": "2023-10-30T14:03:08.703272+02:00", "EventTime": "2023-10-30T14:03:08.703298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CK2CYF2xgFCUEzKmn9"]} -{"Format": "IDEA0", "ID": "009d1059-d78e-487a-9dc9-83e907b5c133", "DetectTime": "2023-10-30T14:03:08.729107+02:00", "EventTime": "2023-10-30T14:03:08.729130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["C0jhMtTkYAcxNmjJa"]} -{"Format": "IDEA0", "ID": "1753a70e-98f6-4d2a-b4eb-20bdba49fdde", "DetectTime": "2023-10-30T14:03:08.753872+02:00", "EventTime": "2023-10-30T14:03:08.753898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CUWbBn3fzvudm5gge8"]} -{"Format": "IDEA0", "ID": "57a9cdaf-1d31-46c3-b853-33db15ac6c1e", "DetectTime": "2023-10-30T14:03:08.789426+02:00", "EventTime": "2023-10-30T14:03:08.789449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["C30Ely3pVMMYhucts9"]} -{"Format": "IDEA0", "ID": "e9a12855-3d4f-4bf0-97b8-0cc0adef3df9", "DetectTime": "2023-10-30T14:03:08.814076+02:00", "EventTime": "2023-10-30T14:03:08.814097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cj0iyIp1PpaIpJWSb"]} -{"Format": "IDEA0", "ID": "507a1eb6-ec33-4b90-bdb6-4faa47b59e9b", "DetectTime": "2023-10-30T14:03:08.847098+02:00", "EventTime": "2023-10-30T14:03:08.847118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.200.86 ", "ContentType": "text/plain"}], "uids": ["C74z1q3uRVZOnbnBql"]} -{"Format": "IDEA0", "ID": "7adb302f-91ae-47b4-b41f-bacd1b9b741b", "DetectTime": "2023-10-30T14:03:08.877007+02:00", "EventTime": "2023-10-30T14:03:08.877028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CsrlSX2OOfNLWbizc5"]} -{"Format": "IDEA0", "ID": "22aaace7-c441-4176-8162-dc216d9cfc8e", "DetectTime": "2023-10-30T14:03:08.910153+02:00", "EventTime": "2023-10-30T14:03:08.910183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CT6wQW2XIdrNiwS3T9"]} -{"Format": "IDEA0", "ID": "3e01a10d-0a4e-47de-92e3-b9ed5a0adb9f", "DetectTime": "2023-10-30T14:03:08.946420+02:00", "EventTime": "2023-10-30T14:03:08.946439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Cfohgo4hNuIAPoowB8"]} -{"Format": "IDEA0", "ID": "c4ec4447-b0e8-403e-bb85-2543bfaa273a", "DetectTime": "2023-10-30T14:03:08.982246+02:00", "EventTime": "2023-10-30T14:03:08.982275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CENXqf2ggvVUnCvs44"]} -{"Format": "IDEA0", "ID": "98cae8a9-64c9-469a-b8c4-e59fefb0fed4", "DetectTime": "2023-10-30T14:03:09.018487+02:00", "EventTime": "2023-10-30T14:03:09.018510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["C5Njtm16aXWKVaUkmd"]} -{"Format": "IDEA0", "ID": "88722b44-2afe-419c-a7f5-fc65fede77c3", "DetectTime": "2023-10-30T14:03:09.053683+02:00", "EventTime": "2023-10-30T14:03:09.053707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["ChhJ3Eh4VuihINz46"]} -{"Format": "IDEA0", "ID": "7ff1a314-e917-470e-b247-4ecdfba5b9cf", "DetectTime": "2023-10-30T14:03:09.087274+02:00", "EventTime": "2023-10-30T14:03:09.087294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CXnuUp351jdCWB9Sp4"]} -{"Format": "IDEA0", "ID": "ce9d3fad-dcc8-4d92-9b59-8439448fa11d", "DetectTime": "2023-10-30T14:03:09.111996+02:00", "EventTime": "2023-10-30T14:03:09.112013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.151.56.116 ", "ContentType": "text/plain"}], "uids": ["C5hvWC1AIQkpCIX5oc"]} -{"Format": "IDEA0", "ID": "26c6398a-a7c3-4da1-b353-dbf7bba3c357", "DetectTime": "2023-10-30T14:03:09.146269+02:00", "EventTime": "2023-10-30T14:03:09.146294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["Ck2SBzAqqxaIn5C4c"]} -{"Format": "IDEA0", "ID": "61865bcc-7882-4caa-ab53-fc6dfb8218ae", "DetectTime": "2023-10-30T14:03:09.179066+02:00", "EventTime": "2023-10-30T14:03:09.179086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Ck1MlV1C5ukzbhEnH2"]} -{"Format": "IDEA0", "ID": "a6fdb7ae-6075-43a8-a749-7b3ccc0515ab", "DetectTime": "2023-10-30T14:03:09.206843+02:00", "EventTime": "2023-10-30T14:03:09.206869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CycYoGxJVdo9riRsh"]} -{"Format": "IDEA0", "ID": "ea283456-2647-4680-8f7e-47aa20ec7e70", "DetectTime": "2023-10-30T14:03:09.228830+02:00", "EventTime": "2023-10-30T14:03:09.228846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["Crrrs71ua3PGmMOTv2"]} -{"Format": "IDEA0", "ID": "a4c6d617-b2f3-438b-8333-757b648e32b6", "DetectTime": "2023-10-30T14:03:09.261681+02:00", "EventTime": "2023-10-30T14:03:09.261694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["Cs53zTBQwh4xLK9yg"]} -{"Format": "IDEA0", "ID": "c55b380d-14a6-4ec9-a1ac-75a9e21a8a02", "DetectTime": "2023-10-30T14:03:09.301714+02:00", "EventTime": "2023-10-30T14:03:09.301729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["CnPBEs4UrdF9XAhmVd"]} -{"Format": "IDEA0", "ID": "1aca94dc-6fc3-41ef-bf0d-a14646a93223", "DetectTime": "2023-10-30T14:03:09.327601+02:00", "EventTime": "2023-10-30T14:03:09.327621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["CAjZtx1No2iuqXu49"]} -{"Format": "IDEA0", "ID": "a94d6c4c-8a33-43e0-8a31-eb75a4bbc965", "DetectTime": "2023-10-30T14:03:09.350081+02:00", "EventTime": "2023-10-30T14:03:09.350103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["CSWtDj2RNAWTXjHOsg"]} -{"Format": "IDEA0", "ID": "2279e482-31bc-4981-b194-e636e4b2478e", "DetectTime": "2023-10-30T14:03:09.392838+02:00", "EventTime": "2023-10-30T14:03:09.392867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CyR8mD2RM7KRXi4GT5"]} -{"Format": "IDEA0", "ID": "c342f25e-e1d9-49cc-bfa6-4e2cfb05a9ee", "DetectTime": "2023-10-30T14:03:09.427921+02:00", "EventTime": "2023-10-30T14:03:09.427956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C4Rqr73NVlmZdh82qk"]} -{"Format": "IDEA0", "ID": "b35052a3-3e12-4261-a6d9-ce413cf07559", "DetectTime": "2023-10-30T14:03:09.468553+02:00", "EventTime": "2023-10-30T14:03:09.468575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["Cpn2wH1cGyY60YbKvf"]} -{"Format": "IDEA0", "ID": "bfeb4894-918d-402d-9ff1-115d6e52869a", "DetectTime": "2023-10-30T14:03:09.501708+02:00", "EventTime": "2023-10-30T14:03:09.501721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CDSF9W3y8Z4cN54X3f"]} -{"Format": "IDEA0", "ID": "245ee5b2-2277-467c-bc61-f66db27c165e", "DetectTime": "2023-10-30T14:03:09.544574+02:00", "EventTime": "2023-10-30T14:03:09.544682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.6.58.68 ", "ContentType": "text/plain"}], "uids": ["Ch0Gin2a4BSXNBHvgj"]} -{"Format": "IDEA0", "ID": "91227a36-adc5-4da8-88a0-7d9cf2267dea", "DetectTime": "2023-10-30T14:03:09.578179+02:00", "EventTime": "2023-10-30T14:03:09.578195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CLDA384PX85t91FN9g"]} -{"Format": "IDEA0", "ID": "1b73fe7b-fbcf-42eb-980d-d1412100af83", "DetectTime": "2023-10-30T14:03:09.617312+02:00", "EventTime": "2023-10-30T14:03:09.617333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CILPPb4rXOFwZnzoEl"]} -{"Format": "IDEA0", "ID": "3e03bc95-4ff3-43af-bc6d-d6c4a139fd0e", "DetectTime": "2023-10-30T14:03:09.648857+02:00", "EventTime": "2023-10-30T14:03:09.648868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CUTKDJrETQzqolNya"]} -{"Format": "IDEA0", "ID": "b8a48298-db17-4a6f-b6cb-9a5bdbbf109d", "DetectTime": "2023-10-30T14:03:09.680996+02:00", "EventTime": "2023-10-30T14:03:09.681020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CKHKEU2EU4Hu9EWTr7"]} -{"Format": "IDEA0", "ID": "e0bdbe0a-b91a-4ed6-8f47-d214921d8dcc", "DetectTime": "2023-10-30T14:03:09.713832+02:00", "EventTime": "2023-10-30T14:03:09.713851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CwtqGk25tyvS2IEeI8"]} -{"Format": "IDEA0", "ID": "74d45901-203c-44fd-9c2f-c6b9641b25e4", "DetectTime": "2023-10-30T14:03:09.758953+02:00", "EventTime": "2023-10-30T14:03:09.758969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["C5dq7UXMqEnxLqrZ"]} -{"Format": "IDEA0", "ID": "ee6a4b89-4fd6-483a-b250-1bd1ef829d0e", "DetectTime": "2023-10-30T14:03:09.800454+02:00", "EventTime": "2023-10-30T14:03:09.800475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CZUkYk3wwGwCSEulx9"]} -{"Format": "IDEA0", "ID": "ce16b7f1-f704-44dd-bad4-26138696a354", "DetectTime": "2023-10-30T14:03:09.843390+02:00", "EventTime": "2023-10-30T14:03:09.843406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CLvMp84kJKU09Pztoa"]} -{"Format": "IDEA0", "ID": "68360afa-1f12-4cc3-8902-2927e1cd20cf", "DetectTime": "2023-10-30T14:03:09.877125+02:00", "EventTime": "2023-10-30T14:03:09.877140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLsQnl3zZfSkMu7ycf"]} -{"Format": "IDEA0", "ID": "d11eaa73-f4fa-42c7-a36d-2a8edc7ae9d8", "DetectTime": "2023-10-30T14:03:09.920853+02:00", "EventTime": "2023-10-30T14:03:09.920875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.180.116.48 ", "ContentType": "text/plain"}], "uids": ["CskWnE18v4WaNlcu7g"]} -{"Format": "IDEA0", "ID": "cb21fb6e-7f7d-42a3-9a20-a4e0a92d939f", "DetectTime": "2023-10-30T14:03:09.951825+02:00", "EventTime": "2023-10-30T14:03:09.951845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CcCfsLly2PnwdEqpa"]} -{"Format": "IDEA0", "ID": "ae0a0685-0a50-41dd-b40b-494b1b11b40b", "DetectTime": "2023-10-30T14:03:09.981593+02:00", "EventTime": "2023-10-30T14:03:09.981612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["Cd38bn2isDJlXOnP53"]} -{"Format": "IDEA0", "ID": "cdf696c3-6d99-4b23-9675-778d9454e4f4", "DetectTime": "2023-10-30T14:03:10.035149+02:00", "EventTime": "2023-10-30T14:03:10.035225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CKqy5M2qObycFWlBP8"]} -{"Format": "IDEA0", "ID": "636a4b26-ecf8-4548-be36-a8d3c01920f9", "DetectTime": "2023-10-30T14:03:10.091458+02:00", "EventTime": "2023-10-30T14:03:10.091625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C58REj3J4nY923PtH8"]} -{"Format": "IDEA0", "ID": "556202c5-47f5-45a7-9aaf-d6fd4b237285", "DetectTime": "2023-10-30T14:03:10.215396+02:00", "EventTime": "2023-10-30T14:03:10.215421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["Cf7iJletCov8Cq6nc"]} -{"Format": "IDEA0", "ID": "ebcb4b84-5a83-4a97-8b48-662d1e88833e", "DetectTime": "2023-10-30T14:03:10.250670+02:00", "EventTime": "2023-10-30T14:03:10.250716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["C52hd41CTZ4Q7HZOeh"]} -{"Format": "IDEA0", "ID": "d36826ac-9143-4cb3-bd12-3cf73e5dba19", "DetectTime": "2023-10-30T14:03:10.288984+02:00", "EventTime": "2023-10-30T14:03:10.289004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CNeIBx2NCFagAULFd1"]} -{"Format": "IDEA0", "ID": "c8946688-1f9b-4bda-98bc-4fdc1fb08094", "DetectTime": "2023-10-30T14:03:10.327888+02:00", "EventTime": "2023-10-30T14:03:10.327916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvPwJB2ijJzAQzhCpj"]} -{"Format": "IDEA0", "ID": "ef5d6176-1bdf-49e0-a423-0366befbcb5c", "DetectTime": "2023-10-30T14:03:10.363887+02:00", "EventTime": "2023-10-30T14:03:10.363925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CcCeWrAUNv4yZ6w46"]} -{"Format": "IDEA0", "ID": "e851e972-a65d-45e3-9c16-8841ca3b4b2d", "DetectTime": "2023-10-30T14:03:10.406238+02:00", "EventTime": "2023-10-30T14:03:10.406306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C6scyV2vrVgEr9y07"]} -{"Format": "IDEA0", "ID": "e4f8e707-1b25-44dd-bba5-905093178073", "DetectTime": "2023-10-30T14:03:10.448178+02:00", "EventTime": "2023-10-30T14:03:10.448205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CYLEDY2Jsr6An0rMQ5"]} -{"Format": "IDEA0", "ID": "c1f1ebfd-698a-489f-a238-7c3233616bf0", "DetectTime": "2023-10-30T14:03:10.491729+02:00", "EventTime": "2023-10-30T14:03:10.491749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C6tcCV3QC0vXgQP7k4"]} -{"Format": "IDEA0", "ID": "990ff638-f43a-4987-a26c-cfee0078377f", "DetectTime": "2023-10-30T14:03:10.527972+02:00", "EventTime": "2023-10-30T14:03:10.527990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CAiRuD1xIeXJHYzqvf"]} -{"Format": "IDEA0", "ID": "a01ac72a-cf6f-4b5d-90e4-ee52c7ce6076", "DetectTime": "2023-10-30T14:03:10.574881+02:00", "EventTime": "2023-10-30T14:03:10.574922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CMFcGU1Kpi6G5A3FV9"]} -{"Format": "IDEA0", "ID": "fbb5603e-bbe6-4dc4-b1a1-2217c569dd2e", "DetectTime": "2023-10-30T14:03:10.613076+02:00", "EventTime": "2023-10-30T14:03:10.613094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CS9EcmWjLKQo0l2Ne"]} -{"Format": "IDEA0", "ID": "337c1a16-c951-4d68-857a-249b5ffd28c4", "DetectTime": "2023-10-30T14:03:10.654674+02:00", "EventTime": "2023-10-30T14:03:10.654698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CRgNI14iO0HqVyjOJ6"]} -{"Format": "IDEA0", "ID": "ee04d295-6c09-4881-9681-8174d35ab78d", "DetectTime": "2023-10-30T14:03:10.699169+02:00", "EventTime": "2023-10-30T14:03:10.699188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.60.50.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.60.50.180 ", "ContentType": "text/plain"}], "uids": ["CBH4Ek256SlF8F3m2j"]} -{"Format": "IDEA0", "ID": "6d0f621c-c575-4ef2-bd3f-5eca9ab870b2", "DetectTime": "2023-10-30T14:03:10.737238+02:00", "EventTime": "2023-10-30T14:03:10.737262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["Cpy8qCbw1y5u2f9Ud"]} -{"Format": "IDEA0", "ID": "927b3bff-350c-4dda-9923-d3d717be9ddc", "DetectTime": "2023-10-30T14:03:10.783808+02:00", "EventTime": "2023-10-30T14:03:10.783825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C2GGy31Y9GLMlaut"]} -{"Format": "IDEA0", "ID": "dc36dc89-8b28-42ac-aaf3-e2ebe0ea305f", "DetectTime": "2023-10-30T14:03:10.825689+02:00", "EventTime": "2023-10-30T14:03:10.825706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["COi5fC2gJ4XjNQyws8"]} -{"Format": "IDEA0", "ID": "b445365b-9abb-4138-b3e5-045a543e51e7", "DetectTime": "2023-10-30T14:03:10.872433+02:00", "EventTime": "2023-10-30T14:03:10.872453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CZBTUH2imPhhld4Eb8"]} -{"Format": "IDEA0", "ID": "d9abb104-69ca-4001-a7db-e25e48f6544d", "DetectTime": "2023-10-30T14:03:10.913053+02:00", "EventTime": "2023-10-30T14:03:10.913073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["CpgCF04fPD05bqHb1b"]} -{"Format": "IDEA0", "ID": "924a3119-5256-486f-9a44-547142293e11", "DetectTime": "2023-10-30T14:03:10.952045+02:00", "EventTime": "2023-10-30T14:03:10.952067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C96gMg1gaCUdwcUDPb"]} -{"Format": "IDEA0", "ID": "e19ba8f6-aeb1-4d20-adc8-92dc4f8cafbb", "DetectTime": "2023-10-30T14:03:10.994068+02:00", "EventTime": "2023-10-30T14:03:10.994096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CDBBdk4ori7zHXm4Qf"]} -{"Format": "IDEA0", "ID": "44b733e9-c055-489e-9398-7008e3802d20", "DetectTime": "2023-10-30T14:03:11.030160+02:00", "EventTime": "2023-10-30T14:03:11.030177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CSy7bV38HATxUGZ25h"]} -{"Format": "IDEA0", "ID": "2f57f722-b647-4061-a66f-5e7c47118355", "DetectTime": "2023-10-30T14:03:11.068098+02:00", "EventTime": "2023-10-30T14:03:11.068119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["CAUBtP3j4vr4Ymco8c"]} -{"Format": "IDEA0", "ID": "ff2d709f-d196-4c17-9269-0aa2b477690a", "DetectTime": "2023-10-30T14:03:11.115272+02:00", "EventTime": "2023-10-30T14:03:11.115291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["Cbhi2H2DxYRM7Waap1"]} -{"Format": "IDEA0", "ID": "612d15ae-ec59-488c-bc4a-6224f5c40134", "DetectTime": "2023-10-30T14:03:11.153861+02:00", "EventTime": "2023-10-30T14:03:11.153888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CekziE2sSfoaMZ0mNl"]} -{"Format": "IDEA0", "ID": "3aa82f1e-e7c0-4341-a82c-b198f48181d8", "DetectTime": "2023-10-30T14:03:11.194973+02:00", "EventTime": "2023-10-30T14:03:11.194994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.48.220.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.48.220.55 ", "ContentType": "text/plain"}], "uids": ["C8VkoomW9PICAUfyi"]} -{"Format": "IDEA0", "ID": "b32f5e20-8b4b-44c4-930a-7907636bbb3d", "DetectTime": "2023-10-30T14:03:11.237726+02:00", "EventTime": "2023-10-30T14:03:11.237764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CJTkuIzAItQjKPpF1"]} -{"Format": "IDEA0", "ID": "37db4bb7-5ad7-49ea-824e-344d9f6ff943", "DetectTime": "2023-10-30T14:03:11.277123+02:00", "EventTime": "2023-10-30T14:03:11.277151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["C5Nrw115VpTylwphra"]} -{"Format": "IDEA0", "ID": "7f1e6a5c-4cd2-42bb-963c-0cd5fbd62f06", "DetectTime": "2023-10-30T14:03:11.325623+02:00", "EventTime": "2023-10-30T14:03:11.325650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.246.67.95 ", "ContentType": "text/plain"}], "uids": ["CqUhXs2HBKYApGyBg1"]} -{"Format": "IDEA0", "ID": "f1cf31ed-7084-4eac-a839-b0dea9f97827", "DetectTime": "2023-10-30T14:03:11.362663+02:00", "EventTime": "2023-10-30T14:03:11.362692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CKsqpi1IM5p2XDk889"]} -{"Format": "IDEA0", "ID": "219bbb2c-f896-408e-aa7f-f7b379052e2f", "DetectTime": "2023-10-30T14:03:11.400495+02:00", "EventTime": "2023-10-30T14:03:11.400512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["C9k8Sb37QKUFBEIxv7"]} -{"Format": "IDEA0", "ID": "4d1962db-a5d9-4333-b85b-8d4ca180d236", "DetectTime": "2023-10-30T14:03:11.437080+02:00", "EventTime": "2023-10-30T14:03:11.437108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["C6yMSA2SbotcpZIozj"]} -{"Format": "IDEA0", "ID": "469b50d6-e072-4940-ad07-39d3bd2bfd91", "DetectTime": "2023-10-30T14:03:11.473234+02:00", "EventTime": "2023-10-30T14:03:11.473255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["Cm8HAB3roDvxFCXqJ8"]} -{"Format": "IDEA0", "ID": "addc62f5-67a1-4802-88e0-87dc564a3431", "DetectTime": "2023-10-30T14:03:11.513320+02:00", "EventTime": "2023-10-30T14:03:11.513341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["C4WpCu3dvw2mq6iAl"]} -{"Format": "IDEA0", "ID": "988f016c-723d-4a22-9c36-fd115dab466c", "DetectTime": "2023-10-30T14:03:11.550495+02:00", "EventTime": "2023-10-30T14:03:11.550513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CfC5cr2rDJD6BrJO67"]} -{"Format": "IDEA0", "ID": "bf314ddf-cc1c-43d9-b0c7-715e241090cf", "DetectTime": "2023-10-30T14:03:11.591328+02:00", "EventTime": "2023-10-30T14:03:11.591346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.42.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.42.213 ", "ContentType": "text/plain"}], "uids": ["CqO0Ir2Dng36Dt16da"]} -{"Format": "IDEA0", "ID": "241f3847-a827-4ad2-ba75-bde2c2f515b1", "DetectTime": "2023-10-30T14:03:11.629295+02:00", "EventTime": "2023-10-30T14:03:11.629312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CzJg4vGLYZh2uM9af"]} -{"Format": "IDEA0", "ID": "c0b42fe4-f74d-45a0-b86b-2accee8a0945", "DetectTime": "2023-10-30T14:03:11.667488+02:00", "EventTime": "2023-10-30T14:03:11.667508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["Cwk3De121HVg7eSk2h"]} -{"Format": "IDEA0", "ID": "e1b47af2-96df-4ff2-aede-75e3078c355b", "DetectTime": "2023-10-30T14:03:11.707020+02:00", "EventTime": "2023-10-30T14:03:11.707044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.59.147 ", "ContentType": "text/plain"}], "uids": ["C0MGvh3u6gMgRNM2zk"]} -{"Format": "IDEA0", "ID": "0e68b1ea-f57c-4a74-a380-3ae34ae494be", "DetectTime": "2023-10-30T14:03:11.744392+02:00", "EventTime": "2023-10-30T14:03:11.744441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C0ulkO3kmm8qRYZEEc"]} -{"Format": "IDEA0", "ID": "bf9e15d3-10ef-44eb-9ea3-1773dab26f71", "DetectTime": "2023-10-30T14:03:11.782829+02:00", "EventTime": "2023-10-30T14:03:11.782852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.62.240.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.62.240.159 ", "ContentType": "text/plain"}], "uids": ["CQO2yjXoExipLi07g"]} -{"Format": "IDEA0", "ID": "4a8fd1e6-29ec-468e-b8d5-7951b39c6efc", "DetectTime": "2023-10-30T14:03:11.821071+02:00", "EventTime": "2023-10-30T14:03:11.821097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CSo62O1IJvbOfpn7d3"]} -{"Format": "IDEA0", "ID": "2ef88513-d3cb-4d5e-bab7-3a94ef3d2570", "DetectTime": "2023-10-30T14:03:11.862970+02:00", "EventTime": "2023-10-30T14:03:11.862998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.50.112.98 ", "ContentType": "text/plain"}], "uids": ["C2Ch4B42Doy37R4hNd"]} -{"Format": "IDEA0", "ID": "a43deed1-6178-4cd4-9c90-ad5edaca3eb9", "DetectTime": "2023-10-30T14:03:11.900967+02:00", "EventTime": "2023-10-30T14:03:11.900988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C9wvtT290UgXWQoYU6"]} -{"Format": "IDEA0", "ID": "c6fb5357-9ab0-41ce-8e00-9c6cfbb365e4", "DetectTime": "2023-10-30T14:03:11.935052+02:00", "EventTime": "2023-10-30T14:03:11.935069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["COJcUX12SZ4QX6ngtc"]} -{"Format": "IDEA0", "ID": "6b1c648c-b8b6-401e-90c9-d75e425216ab", "DetectTime": "2023-10-30T14:03:11.967635+02:00", "EventTime": "2023-10-30T14:03:11.967653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CTHOFI1hZ640vS3wad"]} -{"Format": "IDEA0", "ID": "bfca5670-4b30-47e4-87d6-21798c58c6be", "DetectTime": "2023-10-30T14:03:12.001095+02:00", "EventTime": "2023-10-30T14:03:12.001114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CKOcUl4P3nlInSfhGc"]} -{"Format": "IDEA0", "ID": "a80ded32-3697-4c57-bdc4-cc6e081af8d1", "DetectTime": "2023-10-30T14:03:12.033230+02:00", "EventTime": "2023-10-30T14:03:12.033251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CGYpz01X2lGqs6ACMl"]} -{"Format": "IDEA0", "ID": "9038d3b4-6af2-4d2e-91b4-1a45a3948bfd", "DetectTime": "2023-10-30T14:03:12.071832+02:00", "EventTime": "2023-10-30T14:03:12.071856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CWflq52AqrdoJ56rjj"]} -{"Format": "IDEA0", "ID": "2921f524-944c-4d81-83d9-d32567ab0cf7", "DetectTime": "2023-10-30T14:03:12.111103+02:00", "EventTime": "2023-10-30T14:03:12.111121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CxPy7CTvkefXEYN93"]} -{"Format": "IDEA0", "ID": "64ca6088-a7d5-4a99-b05a-02f6a2fcd614", "DetectTime": "2023-10-30T14:03:12.160987+02:00", "EventTime": "2023-10-30T14:03:12.161005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["C462Os2qX2QKPvo4l8"]} -{"Format": "IDEA0", "ID": "56532b8e-827a-40ed-ad94-4647cdb3d8d7", "DetectTime": "2023-10-30T14:03:12.198602+02:00", "EventTime": "2023-10-30T14:03:12.198619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cf7LdB3R9VSwg1Aqlj"]} -{"Format": "IDEA0", "ID": "137ef77e-d69c-4dbe-9932-13c26d748769", "DetectTime": "2023-10-30T14:03:12.251239+02:00", "EventTime": "2023-10-30T14:03:12.251256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CLkfWP3I9ZboHNOAbk"]} -{"Format": "IDEA0", "ID": "f68cd84c-aed2-46bc-b659-6e68c22d784e", "DetectTime": "2023-10-30T14:03:12.292560+02:00", "EventTime": "2023-10-30T14:03:12.292581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CUbl6Y3SzC0f6yWs5l"]} -{"Format": "IDEA0", "ID": "8cb9bd08-a6ec-4ae6-9054-38ccbeb13a66", "DetectTime": "2023-10-30T14:03:12.325346+02:00", "EventTime": "2023-10-30T14:03:12.325367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CQqdjM1zsbZ6l7mf27"]} -{"Format": "IDEA0", "ID": "884c7636-150e-4ae6-92c1-619bba9cf8ff", "DetectTime": "2023-10-30T14:03:12.355568+02:00", "EventTime": "2023-10-30T14:03:12.355590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CRzk0p1uZ64wq7vHua"]} -{"Format": "IDEA0", "ID": "d42675e8-e20c-451a-bd46-4662783221dd", "DetectTime": "2023-10-30T14:03:12.387931+02:00", "EventTime": "2023-10-30T14:03:12.387951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C0DmIC4D5ySPeKAGLi"]} -{"Format": "IDEA0", "ID": "85ca5955-b143-488f-8e25-2e8fa1a32050", "DetectTime": "2023-10-30T14:03:12.419526+02:00", "EventTime": "2023-10-30T14:03:12.419548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C5kyMk3Hy2C8O7PMG8"]} -{"Format": "IDEA0", "ID": "32510e3c-486f-48ec-a1ab-2341a7eb4120", "DetectTime": "2023-10-30T14:03:12.464087+02:00", "EventTime": "2023-10-30T14:03:12.464107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CtHCAp1IiCT1pR6wei"]} -{"Format": "IDEA0", "ID": "8a1116af-cfe1-496b-accd-04ca932a6d48", "DetectTime": "2023-10-30T14:03:12.509302+02:00", "EventTime": "2023-10-30T14:03:12.509332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.126.4 ", "ContentType": "text/plain"}], "uids": ["CmRK3pjHrDwBncc1g"]} -{"Format": "IDEA0", "ID": "89a6f955-da13-4b0d-96d2-49c3a9e9c8bd", "DetectTime": "2023-10-30T14:03:12.553954+02:00", "EventTime": "2023-10-30T14:03:12.554026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["Cfa2D82njeXPT1KAri"]} -{"Format": "IDEA0", "ID": "a3db2ffd-6fce-494e-9df5-4f193a9bd830", "DetectTime": "2023-10-30T14:03:12.593009+02:00", "EventTime": "2023-10-30T14:03:12.593035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CtwFABOqCRIiMUfU5"]} -{"Format": "IDEA0", "ID": "2a5864ce-24be-492a-a1ba-fb96b7c8c53e", "DetectTime": "2023-10-30T14:03:12.627397+02:00", "EventTime": "2023-10-30T14:03:12.627417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CEHgl8xx10ZqB3m3i"]} -{"Format": "IDEA0", "ID": "7772eb81-c45c-4494-aba4-9a924680317a", "DetectTime": "2023-10-30T14:03:12.663233+02:00", "EventTime": "2023-10-30T14:03:12.663258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CTJ0D53zxfZSSCt5vg"]} -{"Format": "IDEA0", "ID": "4cd55b70-e247-4b7b-9fcb-367722fb4654", "DetectTime": "2023-10-30T14:03:12.694127+02:00", "EventTime": "2023-10-30T14:03:12.694145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["CLMBmd2fxTXSDl6KNe"]} -{"Format": "IDEA0", "ID": "926e6dd9-5c8a-4186-9f6b-2e082129546f", "DetectTime": "2023-10-30T14:03:12.725847+02:00", "EventTime": "2023-10-30T14:03:12.725873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["C9jgvn1nCQ5lsJbWUd"]} -{"Format": "IDEA0", "ID": "849faaa8-4036-4d40-9587-7cd7d6aacbae", "DetectTime": "2023-10-30T14:03:12.758208+02:00", "EventTime": "2023-10-30T14:03:12.758226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["Cya4OP14K169aiewfj"]} -{"Format": "IDEA0", "ID": "19ce24b9-2dbd-4621-80d9-2c9beb92e042", "DetectTime": "2023-10-30T14:03:12.789333+02:00", "EventTime": "2023-10-30T14:03:12.789345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CA9PIa3mWjC6Xrute9"]} -{"Format": "IDEA0", "ID": "21e1eb45-a123-454b-a4e7-474270f7ce33", "DetectTime": "2023-10-30T14:03:12.821952+02:00", "EventTime": "2023-10-30T14:03:12.821970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CqLquz438NwgFtGZn3"]} -{"Format": "IDEA0", "ID": "bc8410de-be95-4ed0-8eae-b31ba042faec", "DetectTime": "2023-10-30T14:03:12.854327+02:00", "EventTime": "2023-10-30T14:03:12.854425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CdU45NEgztoyQUczc"]} -{"Format": "IDEA0", "ID": "4452f742-4335-4f60-b8f6-b94de8fbf673", "DetectTime": "2023-10-30T14:03:12.965394+02:00", "EventTime": "2023-10-30T14:03:12.965423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cbz9vT2qQo1IunvINg"]} -{"Format": "IDEA0", "ID": "d780d170-390e-4677-b824-27877e305775", "DetectTime": "2023-10-30T14:03:13.003937+02:00", "EventTime": "2023-10-30T14:03:13.003957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CLTj182kFTcYG5QBre"]} -{"Format": "IDEA0", "ID": "05b5def8-c4d2-4d00-98d6-b5ab8143b257", "DetectTime": "2023-10-30T14:03:13.038547+02:00", "EventTime": "2023-10-30T14:03:13.038565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CZh9Gh1b0rkA33rhe9"]} -{"Format": "IDEA0", "ID": "12f0965d-be21-4ce0-b591-d673b4cc8e1e", "DetectTime": "2023-10-30T14:03:13.075730+02:00", "EventTime": "2023-10-30T14:03:13.075750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CXffDd1mIo7W8oeT1d"]} -{"Format": "IDEA0", "ID": "b69467e3-fbb3-4f49-a437-0588c8b9edec", "DetectTime": "2023-10-30T14:03:13.109320+02:00", "EventTime": "2023-10-30T14:03:13.109338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CpFLJz3TQunvIl4hue"]} -{"Format": "IDEA0", "ID": "1b0c774a-cf5b-4473-8443-a0fd996eab54", "DetectTime": "2023-10-30T14:03:13.146285+02:00", "EventTime": "2023-10-30T14:03:13.146296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["CQlsnC3vI55kj8keq9"]} -{"Format": "IDEA0", "ID": "9ca07967-435d-4e3c-948d-820994faaefa", "DetectTime": "2023-10-30T14:03:13.182467+02:00", "EventTime": "2023-10-30T14:03:13.182491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CM8JhA4kbznxUEXslg"]} -{"Format": "IDEA0", "ID": "06f59904-26df-4160-a1ac-dd557071a1f7", "DetectTime": "2023-10-30T14:03:13.216715+02:00", "EventTime": "2023-10-30T14:03:13.216731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 42.119.49.245 ", "ContentType": "text/plain"}], "uids": ["CeMXXfi5jiDIzYz9i"]} -{"Format": "IDEA0", "ID": "c725ff10-29e6-440f-a9af-0008c464f844", "DetectTime": "2023-10-30T14:03:13.250681+02:00", "EventTime": "2023-10-30T14:03:13.250699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.172.226.250 ", "ContentType": "text/plain"}], "uids": ["Cftnjj477bgkGcj5Cf"]} -{"Format": "IDEA0", "ID": "d0681d69-dc83-48c8-baaa-fc94d7159903", "DetectTime": "2023-10-30T14:03:13.288647+02:00", "EventTime": "2023-10-30T14:03:13.288672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CbHozd3vbIqUg4PnQ1"]} -{"Format": "IDEA0", "ID": "0c09150c-f5a5-4515-94ac-40fcd6cb74c7", "DetectTime": "2023-10-30T14:03:13.320397+02:00", "EventTime": "2023-10-30T14:03:13.320416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C6yloH1BZzrwS86xw"]} -{"Format": "IDEA0", "ID": "32217972-ef6d-47a0-a118-90593d00117f", "DetectTime": "2023-10-30T14:03:13.365796+02:00", "EventTime": "2023-10-30T14:03:13.365814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["C65zRs3RIMGDcbjsz5"]} -{"Format": "IDEA0", "ID": "13aaf764-618d-4a14-b245-da69c94a7d7d", "DetectTime": "2023-10-30T14:03:13.416993+02:00", "EventTime": "2023-10-30T14:03:13.417018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Cpd4PvOXsXhHkeo0k"]} -{"Format": "IDEA0", "ID": "9fb9d982-21f2-4b61-bb06-d8e67c58f006", "DetectTime": "2023-10-30T14:03:13.468267+02:00", "EventTime": "2023-10-30T14:03:13.468288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["ChC6Y62uRAi8E7iFd5"]} -{"Format": "IDEA0", "ID": "f2f5db83-cb62-4fe1-92ba-d5bd1ed7dd44", "DetectTime": "2023-10-30T14:03:13.515402+02:00", "EventTime": "2023-10-30T14:03:13.515417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CTlg472cqZvtfq06de"]} -{"Format": "IDEA0", "ID": "79cbf2d2-92e4-4cf3-af5f-aac489a49147", "DetectTime": "2023-10-30T14:03:13.562189+02:00", "EventTime": "2023-10-30T14:03:13.562206+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Hostname": ["ppp-219-95.98-62.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 62.98.95.219 from 10.0.2.19. blacklisted IP AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: ppp-219-95.98-62.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ClT45P1VpVgLvUv93k"]} -{"Format": "IDEA0", "ID": "124ee434-afbe-4dd3-b3b4-850d19b884f3", "DetectTime": "2023-10-30T14:03:13.622171+02:00", "EventTime": "2023-10-30T14:03:13.622197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["C1lg0r4HvIENSNMaqd"]} -{"Format": "IDEA0", "ID": "bfd6c9d4-0691-420e-a302-e79ae123d79e", "DetectTime": "2023-10-30T14:03:13.674950+02:00", "EventTime": "2023-10-30T14:03:13.674973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CJK3iUWe2o1ahNZol"]} -{"Format": "IDEA0", "ID": "2753c19f-b38f-43a2-99c6-1bc86c4f87de", "DetectTime": "2023-10-30T14:03:13.722571+02:00", "EventTime": "2023-10-30T14:03:13.722615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CFNzEG1KKRCY0qcv0d"]} -{"Format": "IDEA0", "ID": "c74a73b1-ef04-4bb7-aaf2-9cdf94a99a77", "DetectTime": "2023-10-30T14:03:13.765772+02:00", "EventTime": "2023-10-30T14:03:13.765791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["CeL1mF1A0OtimJUgLi"]} -{"Format": "Json", "ID": "c74a73b1-ef04-4bb7-aaf2-9cdf94a99a77", "DetectTime": "2023-10-30T14:03:13.765772+02:00", "EventTime": "2023-10-30T14:03:13.765791+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T11:06:25.476080+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:03:13.914078)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7f46381a-14ec-42ef-b4fe-c27ca6dfbd55", "DetectTime": "2023-10-30T14:03:13.918757+02:00", "EventTime": "2023-10-30T14:03:13.918776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["Cg6x0B4XtIiLAheNbe"]} -{"Format": "IDEA0", "ID": "0f77ad31-9506-41cb-9e93-e431d3a0daf3", "DetectTime": "2023-10-30T14:03:13.953138+02:00", "EventTime": "2023-10-30T14:03:13.953156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["CV7sMX1l0jgRKipYZ7"]} -{"Format": "IDEA0", "ID": "491b54ce-f96e-4033-b033-560422931aca", "DetectTime": "2023-10-30T14:03:13.993062+02:00", "EventTime": "2023-10-30T14:03:13.993082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["Cv4dXu3eybkLHEb084"]} -{"Format": "IDEA0", "ID": "6d4540b6-9a4a-4fd6-8fbb-2c5274e71ccb", "DetectTime": "2023-10-30T14:03:14.028156+02:00", "EventTime": "2023-10-30T14:03:14.028175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CohP2U3cqchh1j045k"]} -{"Format": "IDEA0", "ID": "2518696b-745b-427a-9398-ce80c4525eb6", "DetectTime": "2023-10-30T14:03:14.062370+02:00", "EventTime": "2023-10-30T14:03:14.062384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["C7JHIALemt2D8i0K5"]} -{"Format": "IDEA0", "ID": "679c3c68-27a5-4624-a1f3-418b791c428d", "DetectTime": "2023-10-30T14:03:14.099414+02:00", "EventTime": "2023-10-30T14:03:14.099430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CFQ5j8WsOIwva3zi7"]} -{"Format": "IDEA0", "ID": "51f71c88-2c64-4c7d-adcc-4d11c42c51c7", "DetectTime": "2023-10-30T14:03:14.133467+02:00", "EventTime": "2023-10-30T14:03:14.133481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CglzZr2AjMaDibbYJh"]} -{"Format": "IDEA0", "ID": "cebac420-3d80-437f-a8a7-a3ef08914cc6", "DetectTime": "2023-10-30T14:03:14.167165+02:00", "EventTime": "2023-10-30T14:03:14.167181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CPyZC53m3nMbPQGf3"]} -{"Format": "Json", "ID": "cebac420-3d80-437f-a8a7-a3ef08914cc6", "DetectTime": "2023-10-30T14:03:14.167165+02:00", "EventTime": "2023-10-30T14:03:14.167181+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-03T11:35:45.320232+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:03:14.292494)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8c531a50-d0c6-442a-adc9-8c93361b25b8", "DetectTime": "2023-10-30T14:03:14.296939+02:00", "EventTime": "2023-10-30T14:03:14.296951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C7iUEc394Ahg1DriUi"]} -{"Format": "IDEA0", "ID": "dc297192-6539-4724-9254-881c1460e535", "DetectTime": "2023-10-30T14:03:14.338358+02:00", "EventTime": "2023-10-30T14:03:14.338371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CaSVqwTgPeYhbfQE"]} -{"Format": "IDEA0", "ID": "9e1c263e-4ee7-42bb-9a9a-bd155b334df0", "DetectTime": "2023-10-30T14:03:14.373157+02:00", "EventTime": "2023-10-30T14:03:14.373173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CdR00D3JeRufo51PRg"]} -{"Format": "IDEA0", "ID": "7ee79be4-1ea2-4e14-ade4-c9d317b94ba1", "DetectTime": "2023-10-30T14:03:14.400771+02:00", "EventTime": "2023-10-30T14:03:14.400783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CUTqXq4dhCY2XC0hM1"]} -{"Format": "IDEA0", "ID": "cdd6158b-97ac-473b-bb6e-95c5e8bd6df9", "DetectTime": "2023-10-30T14:03:14.430751+02:00", "EventTime": "2023-10-30T14:03:14.430770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CGVDZR2oPRBW4MnkA7"]} -{"Format": "IDEA0", "ID": "6f5bc63f-1f1d-4d83-94ff-330b3409d3f4", "DetectTime": "2023-10-30T14:03:14.458791+02:00", "EventTime": "2023-10-30T14:03:14.458809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C2xzQYpq0J2xP8C9j"]} -{"Format": "IDEA0", "ID": "08d3130b-a055-49b0-b632-e4b802efcb0f", "DetectTime": "2023-10-30T14:03:14.489775+02:00", "EventTime": "2023-10-30T14:03:14.489788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CEcBpa3uskGveQyG05"]} -{"Format": "IDEA0", "ID": "9a2c4f99-8d16-457c-954f-0084592c5e25", "DetectTime": "2023-10-30T14:03:14.525686+02:00", "EventTime": "2023-10-30T14:03:14.525698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CYWdh24Lxs3yWznJDk"]} -{"Format": "Json", "ID": "9a2c4f99-8d16-457c-954f-0084592c5e25", "DetectTime": "2023-10-30T14:03:14.525686+02:00", "EventTime": "2023-10-30T14:03:14.525698+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T11:36:34.903749+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:03:14.642970)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "35dc532d-72a9-46fb-86aa-a1d8524e53b0", "DetectTime": "2023-10-30T14:03:14.647171+02:00", "EventTime": "2023-10-30T14:03:14.647183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C6bgL73Yfev2MYRZQg"]} -{"Format": "IDEA0", "ID": "ed08fd90-b451-4f08-a35f-e2c6d83b1215", "DetectTime": "2023-10-30T14:03:14.673549+02:00", "EventTime": "2023-10-30T14:03:14.673566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["C6A9nZ3IbTbUELgcne"]} -{"Format": "IDEA0", "ID": "d273e39a-f2be-478f-b59e-e977b0317e0f", "DetectTime": "2023-10-30T14:03:14.706260+02:00", "EventTime": "2023-10-30T14:03:14.706281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CPP0wl3O95D4KjG7Se"]} -{"Format": "IDEA0", "ID": "d0ab46f4-2c71-42e3-b757-5cca78de6d02", "DetectTime": "2023-10-30T14:03:14.737257+02:00", "EventTime": "2023-10-30T14:03:14.737280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C87ZBY1Ws9zWsrpgi2"]} -{"Format": "IDEA0", "ID": "a7531470-4911-4af8-9925-e907cd8a5844", "DetectTime": "2023-10-30T14:03:14.767820+02:00", "EventTime": "2023-10-30T14:03:14.767840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["C3aql01gZ4qSfljHRl"]} -{"Format": "IDEA0", "ID": "958fa629-293b-4051-a9b4-8766901dba6a", "DetectTime": "2023-10-30T14:03:14.791054+02:00", "EventTime": "2023-10-30T14:03:14.791070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C97Xtf1JXJAK5Jdvlc"]} -{"Format": "IDEA0", "ID": "e3e500fd-0c1c-47c0-8e7b-b1c4a601d1aa", "DetectTime": "2023-10-30T14:03:14.819722+02:00", "EventTime": "2023-10-30T14:03:14.819852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Cmp3sm4VZD7nOha5w3"]} -{"Format": "IDEA0", "ID": "c44f5aa0-df21-4760-8f9b-a59b8003bef7", "DetectTime": "2023-10-30T14:03:14.853327+02:00", "EventTime": "2023-10-30T14:03:14.853342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CDqqIaJCtNTgaZWhh"]} -{"Format": "Json", "ID": "c44f5aa0-df21-4760-8f9b-a59b8003bef7", "DetectTime": "2023-10-30T14:03:14.853327+02:00", "EventTime": "2023-10-30T14:03:14.853342+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T11:36:36.353380+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:03:14.969854)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0db2ffaf-18b0-421b-bc82-e543ff59beb5", "DetectTime": "2023-10-30T14:03:14.974847+02:00", "EventTime": "2023-10-30T14:03:14.974863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CzoBKt1ab6pu9rur41"]} -{"Format": "IDEA0", "ID": "8e7e42c9-a7cb-497c-963c-6cce6554bfa5", "DetectTime": "2023-10-30T14:03:14.998693+02:00", "EventTime": "2023-10-30T14:03:14.998704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["Ckjmfa1W4EtMjdINh4"]} -{"Format": "IDEA0", "ID": "7b4d0440-cba5-4889-adc1-40f7f826007f", "DetectTime": "2023-10-30T14:03:15.025927+02:00", "EventTime": "2023-10-30T14:03:15.025948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CIbdihGoUC4tBET85"]} -{"Format": "IDEA0", "ID": "def056fd-ea6d-4ecc-8ee8-6ea23a228954", "DetectTime": "2023-10-30T14:03:15.051102+02:00", "EventTime": "2023-10-30T14:03:15.051114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CIY5Erm6n53rGGEc3"]} -{"Format": "IDEA0", "ID": "b147033b-b0ea-4aa9-8d6a-b7105cbb3dab", "DetectTime": "2023-10-30T14:03:15.077307+02:00", "EventTime": "2023-10-30T14:03:15.077323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CsPHxo15KkG3n8dMHi"]} -{"Format": "IDEA0", "ID": "c1ab4ad2-37eb-4aa7-a35d-a9694e35eeb2", "DetectTime": "2023-10-30T14:03:15.098698+02:00", "EventTime": "2023-10-30T14:03:15.098709+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 181.65.3.210 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C6t6di7vW6esRTFng"]} -{"Format": "IDEA0", "ID": "39ac1b9e-12b8-422b-92cb-0b6aebd4ee1f", "DetectTime": "2023-10-30T14:03:15.153156+02:00", "EventTime": "2023-10-30T14:03:15.153166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. ", "ContentType": "text/plain"}], "uids": ["ClMDiV1zR6BxpVwkJ2"]} -{"Format": "IDEA0", "ID": "5851f259-cd03-4176-881c-88d58eac37d2", "DetectTime": "2023-10-30T14:03:15.180113+02:00", "EventTime": "2023-10-30T14:03:15.180131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CpIUaA1TfVvdAD2iM4"]} -{"Format": "IDEA0", "ID": "24a0105f-e454-411c-9433-69b92c7126a6", "DetectTime": "2023-10-30T14:03:15.203720+02:00", "EventTime": "2023-10-30T14:03:15.203740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CzJmJC2SCJG7CxiTP"]} -{"Format": "Json", "ID": "24a0105f-e454-411c-9433-69b92c7126a6", "DetectTime": "2023-10-30T14:03:15.203720+02:00", "EventTime": "2023-10-30T14:03:15.203740+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T11:36:38.198130+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2023/10/30 14:03:15.311244)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "59c7bf01-4031-4bcd-a5bd-90c5d2865f71", "DetectTime": "2023-10-30T14:03:15.316910+02:00", "EventTime": "2023-10-30T14:03:15.316926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CyV9oO2kYPybn4X3w8"]} -{"Format": "IDEA0", "ID": "0b3b4288-d3e1-408c-9dc9-367249557ff5", "DetectTime": "2023-10-30T14:03:15.341456+02:00", "EventTime": "2023-10-30T14:03:15.341468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CpCp962DChiHX0nQbk"]} -{"Format": "IDEA0", "ID": "6a5bc235-d795-43c1-82f2-d30d44c3458b", "DetectTime": "2023-10-30T14:03:15.365579+02:00", "EventTime": "2023-10-30T14:03:15.365596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["CfG2XV1UTNWwR39f36"]} -{"Format": "IDEA0", "ID": "ebca5ef2-a161-4051-a078-6f7a7b78aff5", "DetectTime": "2023-10-30T14:03:15.388564+02:00", "EventTime": "2023-10-30T14:03:15.388587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["CD2bMv4UynhI9VeOaf"]} -{"Format": "IDEA0", "ID": "e2ecb999-5680-4d25-89f8-12cd75d364cf", "DetectTime": "2023-10-30T14:03:15.411982+02:00", "EventTime": "2023-10-30T14:03:15.411995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22800], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. ", "ContentType": "text/plain"}], "uids": ["CQrXj629RBxSU18mFc"]} -{"Format": "IDEA0", "ID": "b548ec2a-9552-4014-81ba-b35de116dddd", "DetectTime": "2023-10-30T14:03:15.433879+02:00", "EventTime": "2023-10-30T14:03:15.433895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["Cw9DfR39SuBw7zydt7"]} -{"Format": "IDEA0", "ID": "8f380568-df13-431a-9bb3-bad72b082033", "DetectTime": "2023-10-30T14:03:15.457002+02:00", "EventTime": "2023-10-30T14:03:15.457021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["Cu62xK2r8XuHOcYBOi"]} -{"Format": "IDEA0", "ID": "7dde5078-6068-474b-80d2-c09f13eae2e6", "DetectTime": "2023-10-30T14:03:15.478418+02:00", "EventTime": "2023-10-30T14:03:15.478434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["C3VfzVQUfyct4aZI"]} -{"Format": "IDEA0", "ID": "d0a05a50-ed20-4dbd-9e15-b35cfaef2e94", "DetectTime": "2023-10-30T14:03:15.506395+02:00", "EventTime": "2023-10-30T14:03:15.506409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C8x3pGtG99KzIHtG2"]} -{"Format": "IDEA0", "ID": "0f37a4ff-d7da-4eac-a5f1-6bda21bcd68f", "DetectTime": "2023-10-30T14:03:15.539830+02:00", "EventTime": "2023-10-30T14:03:15.539851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CFpjrP3hZu5paR9ksa", "CshLrJ3XQF7rb7l4ic", "Chvv4G4V2zY3I2kWdb", "CMT0MH1ciyuPCNiPeg"]} -{"Format": "IDEA0", "ID": "6415b34e-6cd7-40b6-addf-d15c23292229", "DetectTime": "2023-10-30T14:03:15.547390+02:00", "EventTime": "2023-10-30T14:03:15.547405+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFpjrP3hZu5paR9ksa"]} -{"Format": "IDEA0", "ID": "41c3dabe-d430-4614-a14b-9269c20ba332", "DetectTime": "2023-10-30T14:03:15.555070+02:00", "EventTime": "2023-10-30T14:03:15.555083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CHxskH3HpcEzlufoj9"]} -{"Format": "IDEA0", "ID": "7472d7c1-97b7-4e0b-98b7-9b0096522c2f", "DetectTime": "2023-10-30T14:03:15.588744+02:00", "EventTime": "2023-10-30T14:03:15.588757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["ClKsDG2Do5NkwQykL5"]} -{"Format": "IDEA0", "ID": "a3118a47-47de-44dc-bf3a-0745e711c1ec", "DetectTime": "2023-10-30T14:03:15.618516+02:00", "EventTime": "2023-10-30T14:03:15.618534+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMUs3P1aY6eWjS8yZ4"]} -{"Format": "IDEA0", "ID": "7e28d22e-321f-4de4-8fee-faa88127e79a", "DetectTime": "2023-10-30T14:03:15.625940+02:00", "EventTime": "2023-10-30T14:03:15.625951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CSjlxc3df5k3aypZbf"]} -{"Format": "IDEA0", "ID": "1c95de51-37bd-4015-8492-14688b176e73", "DetectTime": "2023-10-30T14:03:15.660477+02:00", "EventTime": "2023-10-30T14:03:15.660492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CHZGVmstzyF8QgBE8"]} -{"Format": "IDEA0", "ID": "2abf66db-a4d7-4934-83b4-8e3782ea2c52", "DetectTime": "2023-10-30T14:03:15.691388+02:00", "EventTime": "2023-10-30T14:03:15.691403+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWcIqZ2GmnjWZQDGj"]} -{"Format": "IDEA0", "ID": "535f320e-354c-4dac-9aaf-15e7f815e7e9", "DetectTime": "2023-10-30T14:03:15.699072+02:00", "EventTime": "2023-10-30T14:03:15.699085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CIiJRt1DUM4UO7BKu4"]} -{"Format": "IDEA0", "ID": "f4a2d7d6-6bb8-4648-a0f6-5bca95f034c1", "DetectTime": "2023-10-30T14:03:15.730156+02:00", "EventTime": "2023-10-30T14:03:15.730168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CsFjr507A5NrwtFqd"]} -{"Format": "Json", "ID": "f4a2d7d6-6bb8-4648-a0f6-5bca95f034c1", "DetectTime": "2023-10-30T14:03:15.730156+02:00", "EventTime": "2023-10-30T14:03:15.730168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T12:07:11.275558+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:15.973280)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "41061eec-87a1-4f0c-b4f5-99c08fca5f71", "DetectTime": "2023-10-30T14:03:15.978662+02:00", "EventTime": "2023-10-30T14:03:15.978678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CZrXov1JptAFo0evz9"]} -{"Format": "IDEA0", "ID": "97b019bc-44e0-4488-b5d1-0ad899000cbd", "DetectTime": "2023-10-30T14:03:16.010440+02:00", "EventTime": "2023-10-30T14:03:16.010458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CQYJMArzUN3cTXKYc"]} -{"Format": "IDEA0", "ID": "546304f1-b3aa-4e21-9bc1-91a69f59a524", "DetectTime": "2023-10-30T14:03:16.054204+02:00", "EventTime": "2023-10-30T14:03:16.054233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CLZsMMvJyrjoFp9y7"]} -{"Format": "IDEA0", "ID": "68317d18-7636-4139-b8cf-fa2c55a465e6", "DetectTime": "2023-10-30T14:03:16.092922+02:00", "EventTime": "2023-10-30T14:03:16.092939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["Cjzxm52OOrupOW9Tv1"]} -{"Format": "IDEA0", "ID": "429c1bff-acf1-4d09-bf00-337257a92999", "DetectTime": "2023-10-30T14:03:16.131856+02:00", "EventTime": "2023-10-30T14:03:16.131873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. ", "ContentType": "text/plain"}], "uids": ["CjDMWO103pUGsb3WO1"]} -{"Format": "IDEA0", "ID": "ac9696c5-5cce-4918-a84a-e31544ba6724", "DetectTime": "2023-10-30T14:03:16.177068+02:00", "EventTime": "2023-10-30T14:03:16.177095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CuHmqp12wg8k1tnOS3"]} -{"Format": "IDEA0", "ID": "8a712c0f-54fd-4f46-bc6d-40bd3de5f017", "DetectTime": "2023-10-30T14:03:16.213010+02:00", "EventTime": "2023-10-30T14:03:16.213021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CiFOUH337PjH7yIZ5l"]} -{"Format": "IDEA0", "ID": "ca59f3d6-5b25-4c14-8290-bfd37c8f9ee7", "DetectTime": "2023-10-30T14:03:16.252940+02:00", "EventTime": "2023-10-30T14:03:16.252962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CSHGBU3Xk5D3dBVfjc"]} -{"Format": "Json", "ID": "ca59f3d6-5b25-4c14-8290-bfd37c8f9ee7", "DetectTime": "2023-10-30T14:03:16.252940+02:00", "EventTime": "2023-10-30T14:03:16.252962+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T12:07:12.717683+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:16.436630)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb3d0036-dde8-46ac-8382-825425f6b377", "DetectTime": "2023-10-30T14:03:16.442526+02:00", "EventTime": "2023-10-30T14:03:16.442543+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKRBoS3ksiSDThhLg9"]} -{"Format": "IDEA0", "ID": "d87d6591-d201-4cd8-a03b-a699fb8cf629", "DetectTime": "2023-10-30T14:03:16.451863+02:00", "EventTime": "2023-10-30T14:03:16.451880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CFrBug2uJyZmxdHfQ9"]} -{"Format": "IDEA0", "ID": "4f189d2c-f368-47a7-8ce6-a37c7bd7e615", "DetectTime": "2023-10-30T14:03:16.489630+02:00", "EventTime": "2023-10-30T14:03:16.489646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CiEcyo1OA57WaxBQig"]} -{"Format": "IDEA0", "ID": "50be3d41-a3ad-4e72-b95e-2141e4c88034", "DetectTime": "2023-10-30T14:03:16.530079+02:00", "EventTime": "2023-10-30T14:03:16.530097+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHCychg3gVqG8DLKk"]} -{"Format": "IDEA0", "ID": "f70e257d-023a-4d7e-9e1e-5000046dfbdb", "DetectTime": "2023-10-30T14:03:16.540463+02:00", "EventTime": "2023-10-30T14:03:16.540479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CobBfv3ObMijgxDypj"]} -{"Format": "IDEA0", "ID": "1e95704a-4fd1-459f-bdb1-c0709dd82596", "DetectTime": "2023-10-30T14:03:16.572790+02:00", "EventTime": "2023-10-30T14:03:16.572810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CNM1QV3ZbmLG9fG1G5"]} -{"Format": "IDEA0", "ID": "d4fe8204-7e24-4aee-b1ba-ab85ded307a8", "DetectTime": "2023-10-30T14:03:16.606886+02:00", "EventTime": "2023-10-30T14:03:16.606905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. ", "ContentType": "text/plain"}], "uids": ["CVspwemmNra1qvGbg"]} -{"Format": "IDEA0", "ID": "a030925f-80c5-4633-988e-cb269295ce62", "DetectTime": "2023-10-30T14:03:16.639778+02:00", "EventTime": "2023-10-30T14:03:16.639790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CTcf7R2V1VmWWqbBVc"]} -{"Format": "IDEA0", "ID": "979a8834-ab72-4c64-9a52-9751c89da570", "DetectTime": "2023-10-30T14:03:16.677611+02:00", "EventTime": "2023-10-30T14:03:16.677627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["Cwm8aFlV6pOnjaF83"]} -{"Format": "IDEA0", "ID": "f84d56d5-52b0-4169-801f-baada92502ea", "DetectTime": "2023-10-30T14:03:16.720691+02:00", "EventTime": "2023-10-30T14:03:16.720707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CwwBu344z1X2ovKsOl"]} -{"Format": "Json", "ID": "f84d56d5-52b0-4169-801f-baada92502ea", "DetectTime": "2023-10-30T14:03:16.720691+02:00", "EventTime": "2023-10-30T14:03:16.720707+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T12:07:31.540148+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:16.862481)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6b8c953d-e1be-484b-b618-78fe76d58de9", "DetectTime": "2023-10-30T14:03:16.867794+02:00", "EventTime": "2023-10-30T14:03:16.867814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["C2OAbZ2i0P4CxCjWfh"]} -{"Format": "IDEA0", "ID": "f3436da2-fb1b-44a0-85dd-95280ffec24a", "DetectTime": "2023-10-30T14:03:16.901458+02:00", "EventTime": "2023-10-30T14:03:16.901471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8722], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. ", "ContentType": "text/plain"}], "uids": ["CB9TQ72JEd4VPfeBzh"]} -{"Format": "IDEA0", "ID": "fe5e879f-882b-4474-9835-c6cc05bd0438", "DetectTime": "2023-10-30T14:03:16.933211+02:00", "EventTime": "2023-10-30T14:03:16.933227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["Cj0tmu15sj1LvC8Ce4"]} -{"Format": "IDEA0", "ID": "2d0c0b41-ca49-45de-929b-def06cf503b1", "DetectTime": "2023-10-30T14:03:16.964959+02:00", "EventTime": "2023-10-30T14:03:16.964977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["CdEora32wP6wHLRQPj"]} -{"Format": "IDEA0", "ID": "eb36bd3d-bbcd-46df-b212-16442eaae81c", "DetectTime": "2023-10-30T14:03:16.997131+02:00", "EventTime": "2023-10-30T14:03:16.997142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["CptLGq1KzzDQvMucj3"]} -{"Format": "IDEA0", "ID": "60ae1cc9-c015-4105-bef2-8fc62ff7bd45", "DetectTime": "2023-10-30T14:03:17.022751+02:00", "EventTime": "2023-10-30T14:03:17.022763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["CzMKsM1e9LiLbN8DAl"]} -{"Format": "IDEA0", "ID": "2bd6ffb6-7a79-4ca0-bd50-1bb125ef56a1", "DetectTime": "2023-10-30T14:03:17.056478+02:00", "EventTime": "2023-10-30T14:03:17.056499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10000], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. ", "ContentType": "text/plain"}], "uids": ["CWKhQE4jB9iBNVBSP6"]} -{"Format": "IDEA0", "ID": "53a42c67-d3b5-466d-8c38-97a4fb9d466e", "DetectTime": "2023-10-30T14:03:17.091020+02:00", "EventTime": "2023-10-30T14:03:17.091039+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Civ0Pp1jk1HpEwAys2"]} -{"Format": "IDEA0", "ID": "6a728b4f-90fa-420a-9bff-2479cf7cb835", "DetectTime": "2023-10-30T14:03:17.100146+02:00", "EventTime": "2023-10-30T14:03:17.100163+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUwGgUR1JmS23jRie"]} -{"Format": "IDEA0", "ID": "94dd85d8-190c-4c4c-9f17-03fea2980de0", "DetectTime": "2023-10-30T14:03:17.111366+02:00", "EventTime": "2023-10-30T14:03:17.111383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C0k7io3VfcRPeFafI1"]} -{"Format": "Json", "ID": "94dd85d8-190c-4c4c-9f17-03fea2980de0", "DetectTime": "2023-10-30T14:03:17.111366+02:00", "EventTime": "2023-10-30T14:03:17.111383+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-03T12:35:48.620331+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:17.382056)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "88989b59-74d9-4f7d-8f84-7e437ae2a5d6", "DetectTime": "2023-10-30T14:03:17.387737+02:00", "EventTime": "2023-10-30T14:03:17.387754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CPZ8In18kFLHlwEP3l"]} -{"Format": "IDEA0", "ID": "5efb16a0-3101-4168-b9e8-7a20c76016f6", "DetectTime": "2023-10-30T14:03:17.429757+02:00", "EventTime": "2023-10-30T14:03:17.429774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["Cgl7eh48qvtEiZUH8i"]} -{"Format": "IDEA0", "ID": "6fb553a7-b135-40dd-a2cd-1bbde5a76a4c", "DetectTime": "2023-10-30T14:03:17.466724+02:00", "EventTime": "2023-10-30T14:03:17.466739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CiChTpZ5NbSnryr93"]} -{"Format": "IDEA0", "ID": "d8a02858-1f7d-4a02-a27d-447bd5d52aa9", "DetectTime": "2023-10-30T14:03:17.501723+02:00", "EventTime": "2023-10-30T14:03:17.501745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cxn3nrxKUvVU2NWih"]} -{"Format": "IDEA0", "ID": "d109c2aa-9124-4057-b096-02fa5b044ca8", "DetectTime": "2023-10-30T14:03:17.542562+02:00", "EventTime": "2023-10-30T14:03:17.542585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CQE8zi07KWHUZ2gel"]} -{"Format": "IDEA0", "ID": "b36b9afe-3c0b-47ca-9bea-a36f3f36f580", "DetectTime": "2023-10-30T14:03:17.591003+02:00", "EventTime": "2023-10-30T14:03:17.591026+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXyOTG11xzxfM6MESd"]} -{"Format": "IDEA0", "ID": "e3577733-c3c6-4495-96c8-2039152f0f56", "DetectTime": "2023-10-30T14:03:17.600359+02:00", "EventTime": "2023-10-30T14:03:17.600376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CYqiAQ1d6GDh4M09o4"]} -{"Format": "IDEA0", "ID": "af685d45-ce8b-4f54-b54f-0f3cdff2be69", "DetectTime": "2023-10-30T14:03:17.643786+02:00", "EventTime": "2023-10-30T14:03:17.643802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C6Ze3q1rh5KJm3gHia"]} -{"Format": "IDEA0", "ID": "1ab5b478-3cb4-4f6a-9111-eae8e21f5a55", "DetectTime": "2023-10-30T14:03:17.680424+02:00", "EventTime": "2023-10-30T14:03:17.680441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CZZ3Wt1rlUAmgiCVp4"]} -{"Format": "Json", "ID": "1ab5b478-3cb4-4f6a-9111-eae8e21f5a55", "DetectTime": "2023-10-30T14:03:17.680424+02:00", "EventTime": "2023-10-30T14:03:17.680441+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T12:38:58.859677+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:17.835821)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cc01c667-d4d3-45b4-a036-4175425fc039", "DetectTime": "2023-10-30T14:03:17.847279+02:00", "EventTime": "2023-10-30T14:03:17.847303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CnwHrx49m85CPwLas7"]} -{"Format": "IDEA0", "ID": "fa8b56f7-b78d-4801-ab8e-1c1f1fd34e73", "DetectTime": "2023-10-30T14:03:17.892982+02:00", "EventTime": "2023-10-30T14:03:17.893000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["ClR8bv2LgTvrFrZzqh"]} -{"Format": "IDEA0", "ID": "025e090e-a055-4997-b794-7f69e36a37a8", "DetectTime": "2023-10-30T14:03:17.932539+02:00", "EventTime": "2023-10-30T14:03:17.932559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["CR3VEwrNhtw7eGXE3"]} -{"Format": "IDEA0", "ID": "e7e13fc4-2977-4707-82e8-059068f7e4a7", "DetectTime": "2023-10-30T14:03:17.972399+02:00", "EventTime": "2023-10-30T14:03:17.972419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CabaRc4TJSn3zMFoda"]} -{"Format": "IDEA0", "ID": "2836a880-eff0-4862-b2c8-9757ed6a018c", "DetectTime": "2023-10-30T14:03:18.005605+02:00", "EventTime": "2023-10-30T14:03:18.005622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CCbvWq2Yngvj6S8qJl"]} -{"Format": "IDEA0", "ID": "c4d1acb5-7e04-4e1e-859d-0f4e0e232692", "DetectTime": "2023-10-30T14:03:18.036924+02:00", "EventTime": "2023-10-30T14:03:18.036941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CHCychg3gVqG8DLKk", "CUwGgUR1JmS23jRie", "CWcIqZ2GmnjWZQDGj", "CW34On1SctK9Ne7ey3"]} -{"Format": "IDEA0", "ID": "3d9da8de-8962-43e7-8d3f-5ab70a4307c3", "DetectTime": "2023-10-30T14:03:18.050323+02:00", "EventTime": "2023-10-30T14:03:18.050344+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CW34On1SctK9Ne7ey3"]} -{"Format": "IDEA0", "ID": "a0728130-c32d-4fb9-9475-d3e5d2e5af01", "DetectTime": "2023-10-30T14:03:18.064347+02:00", "EventTime": "2023-10-30T14:03:18.064365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["Cqgu6B37JA4cyKuu6j"]} -{"Format": "IDEA0", "ID": "971f087e-9686-48f3-874d-09adb2a8067f", "DetectTime": "2023-10-30T14:03:18.094572+02:00", "EventTime": "2023-10-30T14:03:18.094588+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CklO8cb28rkpZHEYf"]} -{"Format": "IDEA0", "ID": "d4c2269f-87eb-46df-8394-e7e171ebba76", "DetectTime": "2023-10-30T14:03:18.106257+02:00", "EventTime": "2023-10-30T14:03:18.106273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CrViud379arnSEYl67"]} -{"Format": "IDEA0", "ID": "b149fe96-a93b-4c7e-9fc1-dfaf008cb8fb", "DetectTime": "2023-10-30T14:03:18.140115+02:00", "EventTime": "2023-10-30T14:03:18.140132+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrLwBb1m2jNzujK1Qc"]} -{"Format": "IDEA0", "ID": "89e60047-2006-45eb-b844-1f4013a5f0e2", "DetectTime": "2023-10-30T14:03:18.152359+02:00", "EventTime": "2023-10-30T14:03:18.152377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CsC1W2oJjsO49T4t2"]} -{"Format": "Json", "ID": "89e60047-2006-45eb-b844-1f4013a5f0e2", "DetectTime": "2023-10-30T14:03:18.152359+02:00", "EventTime": "2023-10-30T14:03:18.152377+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T12:39:18.337635+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:18.316277)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b2c8df9-ce74-4203-beeb-c5bf7d079f25", "DetectTime": "2023-10-30T14:03:18.322528+02:00", "EventTime": "2023-10-30T14:03:18.322550+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5lJN6Bq7R3wdG43i"]} -{"Format": "IDEA0", "ID": "df2decfc-6827-48e1-8395-d3b847d5902b", "DetectTime": "2023-10-30T14:03:18.335614+02:00", "EventTime": "2023-10-30T14:03:18.335631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["CNRQzH21vIEAmXesMa"]} -{"Format": "IDEA0", "ID": "94759720-9e24-40d2-a88b-389e9ce44278", "DetectTime": "2023-10-30T14:03:18.381931+02:00", "EventTime": "2023-10-30T14:03:18.382021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CKSRz21FyGtXVRUzL9"]} -{"Format": "IDEA0", "ID": "edb5e358-bf78-4fbe-9a58-69abcad211b2", "DetectTime": "2023-10-30T14:03:18.411713+02:00", "EventTime": "2023-10-30T14:03:18.411735+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cgl42O2V8NmWNvdvSl"]} -{"Format": "IDEA0", "ID": "b2b0e86d-c057-45a7-ae27-5a0325f62d36", "DetectTime": "2023-10-30T14:03:18.424552+02:00", "EventTime": "2023-10-30T14:03:18.424569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CxugOR1v4TFNqplCme"]} -{"Format": "IDEA0", "ID": "fccd73d5-ecdd-4736-8f87-7dfd284f6eb3", "DetectTime": "2023-10-30T14:03:18.459355+02:00", "EventTime": "2023-10-30T14:03:18.459376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CODDSw3GzhFo30B5k"]} -{"Format": "IDEA0", "ID": "fac4a944-158e-41a8-86f8-dd2def5b0fc8", "DetectTime": "2023-10-30T14:03:18.496517+02:00", "EventTime": "2023-10-30T14:03:18.496534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["C3gSjuRKWuQ4bdxw8"]} -{"Format": "IDEA0", "ID": "d7f45cfb-8713-45c9-baf3-fe4a49c400f8", "DetectTime": "2023-10-30T14:03:18.530479+02:00", "EventTime": "2023-10-30T14:03:18.530503+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLqLUT3YnZ3VNwBTpg"]} -{"Format": "IDEA0", "ID": "2c6e1de0-8f82-4c67-a5bd-f41ccb27e6ef", "DetectTime": "2023-10-30T14:03:18.542558+02:00", "EventTime": "2023-10-30T14:03:18.542574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["Cdaqwb3tM1AcVM9JU5"]} -{"Format": "IDEA0", "ID": "053ce658-3f37-4a53-95ab-15106fe212ac", "DetectTime": "2023-10-30T14:03:18.572807+02:00", "EventTime": "2023-10-30T14:03:18.572826+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrpJGs4sH02ZKxy9t1"]} -{"Format": "IDEA0", "ID": "301a3e6a-2681-4255-9e7a-05560d98b651", "DetectTime": "2023-10-30T14:03:18.583579+02:00", "EventTime": "2023-10-30T14:03:18.583596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17585], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. ", "ContentType": "text/plain"}], "uids": ["CTDOBl4VyOJQeN36hi"]} -{"Format": "IDEA0", "ID": "16ff63b2-2112-4003-a83c-36eb1dc52286", "DetectTime": "2023-10-30T14:03:18.613786+02:00", "EventTime": "2023-10-30T14:03:18.613811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10637], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. ", "ContentType": "text/plain"}], "uids": ["CZUhCf15lSflI2qhC6"]} -{"Format": "IDEA0", "ID": "ca6f38b0-36d1-48c8-9f35-7c78d2efa9a7", "DetectTime": "2023-10-30T14:03:18.641701+02:00", "EventTime": "2023-10-30T14:03:18.641725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. ", "ContentType": "text/plain"}], "uids": ["Cq7k0xeWfc76AsjTl"]} -{"Format": "Json", "ID": "ca6f38b0-36d1-48c8-9f35-7c78d2efa9a7", "DetectTime": "2023-10-30T14:03:18.641701+02:00", "EventTime": "2023-10-30T14:03:18.641725+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5225], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T12:39:52.851507+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2023/10/30 14:03:18.830224)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0b3d2bf5-7a18-4eec-9c3a-3ed767cd5cdb", "DetectTime": "2023-10-30T14:03:18.836314+02:00", "EventTime": "2023-10-30T14:03:18.836335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["Crt313gscTHIlz5Mc"]} -{"Format": "IDEA0", "ID": "800efa8e-2b0e-4327-ab41-e18cccdbc828", "DetectTime": "2023-10-30T14:03:18.871859+02:00", "EventTime": "2023-10-30T14:03:18.871877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CKObxo1H7uOn90ky4b"]} -{"Format": "IDEA0", "ID": "870739d9-8db0-4814-9f68-9ab0631fcd87", "DetectTime": "2023-10-30T14:03:18.939754+02:00", "EventTime": "2023-10-30T14:03:18.939770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CaOHt12YcNK319Ldkl"]} -{"Format": "IDEA0", "ID": "b9109b32-ac2b-43a2-84a4-e9b43cc82877", "DetectTime": "2023-10-30T14:03:19.012582+02:00", "EventTime": "2023-10-30T14:03:19.012602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["CAk1O446pRz2sEEDFh"]} -{"Format": "IDEA0", "ID": "a0bddc7e-1c51-4c4a-a151-8012ee33c4b0", "DetectTime": "2023-10-30T14:03:19.074188+02:00", "EventTime": "2023-10-30T14:03:19.074202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CmgOCC1spJJEm75vak"]} -{"Format": "IDEA0", "ID": "0de2a87b-5c47-480c-bc06-53e6525d9299", "DetectTime": "2023-10-30T14:03:19.131793+02:00", "EventTime": "2023-10-30T14:03:19.131807+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAjGa41WbLVWtCoJ6l"]} -{"Format": "IDEA0", "ID": "30214868-15b6-4653-a1b9-218bd1df5a2c", "DetectTime": "2023-10-30T14:03:19.146171+02:00", "EventTime": "2023-10-30T14:03:19.146192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["CP004BsCxHOwkBMH1"]} -{"Format": "IDEA0", "ID": "ada8ad97-91d3-4b1b-9a67-43706efd7487", "DetectTime": "2023-10-30T14:03:19.213289+02:00", "EventTime": "2023-10-30T14:03:19.213306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJAVxD1wE1SxVSxWZc"]} -{"Format": "Json", "ID": "ada8ad97-91d3-4b1b-9a67-43706efd7487", "DetectTime": "2023-10-30T14:03:19.213289+02:00", "EventTime": "2023-10-30T14:03:19.213306+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:11:50.004728+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:19.570413)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1eefdb18-c96c-44fc-840b-c5b539150b95", "DetectTime": "2023-10-30T14:03:19.575545+02:00", "EventTime": "2023-10-30T14:03:19.575557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CAk1Sz4CWbwpxoU5Zh"]} -{"Format": "IDEA0", "ID": "bcf80c26-2b6e-479d-a5b4-c8e955f15877", "DetectTime": "2023-10-30T14:03:19.636691+02:00", "EventTime": "2023-10-30T14:03:19.636711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["Cnr7fw2VkkdMXorblg"]} -{"Format": "IDEA0", "ID": "b7ad10cd-1606-4eb2-9686-c72672212e11", "DetectTime": "2023-10-30T14:03:19.689890+02:00", "EventTime": "2023-10-30T14:03:19.689902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CIS9QD3YEYEQJgc6I8"]} -{"Format": "IDEA0", "ID": "00c2db34-c5a7-4767-b38e-9a9fc0101296", "DetectTime": "2023-10-30T14:03:19.751125+02:00", "EventTime": "2023-10-30T14:03:19.751144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["CN5UFo4VCvt8vNRCm6"]} -{"Format": "IDEA0", "ID": "7d782c35-f729-492b-9245-e7e8b9c663ce", "DetectTime": "2023-10-30T14:03:19.804278+02:00", "EventTime": "2023-10-30T14:03:19.804298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CxWp3j2x5TaMDkpdei"]} -{"Format": "IDEA0", "ID": "dc14c548-e691-4874-8289-cb9c7496e0dc", "DetectTime": "2023-10-30T14:03:19.866310+02:00", "EventTime": "2023-10-30T14:03:19.866323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C9hLMd1SXjufxFMlVe"]} -{"Format": "IDEA0", "ID": "cb3e38da-6328-4590-b78a-5df6e83122cb", "DetectTime": "2023-10-30T14:03:19.927795+02:00", "EventTime": "2023-10-30T14:03:19.927817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CUKGnk63zplniK74k"]} -{"Format": "IDEA0", "ID": "5d26e7d7-4669-414c-8aa7-b31d8de85e44", "DetectTime": "2023-10-30T14:03:19.989425+02:00", "EventTime": "2023-10-30T14:03:19.989438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["C9EXpo1PidA3guH4jc"]} -{"Format": "Json", "ID": "5d26e7d7-4669-414c-8aa7-b31d8de85e44", "DetectTime": "2023-10-30T14:03:19.989425+02:00", "EventTime": "2023-10-30T14:03:19.989438+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:11:51.343243+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:20.146287)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "034bd8e3-7a81-4e97-ab8a-f657cbfb9390", "DetectTime": "2023-10-30T14:03:20.151587+02:00", "EventTime": "2023-10-30T14:03:20.151602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["Cz1L5xlCXtnKZ7yQa"]} -{"Format": "IDEA0", "ID": "3659771e-9463-4d01-842c-0eb7a8808342", "DetectTime": "2023-10-30T14:03:20.216181+02:00", "EventTime": "2023-10-30T14:03:20.216203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["CuwPzb1DIA5HXHmTt5"]} -{"Format": "IDEA0", "ID": "72f71fde-e000-4439-a713-a23f8508721c", "DetectTime": "2023-10-30T14:03:20.277977+02:00", "EventTime": "2023-10-30T14:03:20.277996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cgl42O2V8NmWNvdvSl", "CXHIJR381hfly1f641", "CrpJGs4sH02ZKxy9t1", "CrLwBb1m2jNzujK1Qc"]} -{"Format": "IDEA0", "ID": "b683a779-38bb-4a89-a36a-4d8deb2dfc08", "DetectTime": "2023-10-30T14:03:20.288614+02:00", "EventTime": "2023-10-30T14:03:20.288631+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXHIJR381hfly1f641"]} -{"Format": "IDEA0", "ID": "2ad29a98-da63-4a9e-b1f2-94279fd54673", "DetectTime": "2023-10-30T14:03:20.299127+02:00", "EventTime": "2023-10-30T14:03:20.299143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CSMhct3ISKKik6dME3"]} -{"Format": "IDEA0", "ID": "5d6edfea-db6f-4550-b2c6-35f868a06312", "DetectTime": "2023-10-30T14:03:20.349924+02:00", "EventTime": "2023-10-30T14:03:20.349940+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGHj5JhVzeaZ4E6Li"]} -{"Format": "IDEA0", "ID": "7b50fac4-88de-4246-b5bb-d32a99feac4f", "DetectTime": "2023-10-30T14:03:20.364188+02:00", "EventTime": "2023-10-30T14:03:20.364200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["CyQw8a4fs9RoZSbyG7"]} -{"Format": "IDEA0", "ID": "62da4408-3d61-45f0-8834-7c6a3a49f839", "DetectTime": "2023-10-30T14:03:20.416077+02:00", "EventTime": "2023-10-30T14:03:20.416097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["C11nDW38w8XyHdGg9j"]} -{"Format": "IDEA0", "ID": "6aeb2ad8-0f74-41d9-b612-e7d89d970c89", "DetectTime": "2023-10-30T14:03:20.473874+02:00", "EventTime": "2023-10-30T14:03:20.473893+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIMtIH3V081viIQvY3"]} -{"Format": "IDEA0", "ID": "276eb87e-78eb-4948-b00a-25da696db900", "DetectTime": "2023-10-30T14:03:20.484085+02:00", "EventTime": "2023-10-30T14:03:20.484103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. ", "ContentType": "text/plain"}], "uids": ["CiVVbi31aEnU0fmLS2"]} -{"Format": "IDEA0", "ID": "7bb4fa7e-14ae-4852-ae9e-fff621ac0ed8", "DetectTime": "2023-10-30T14:03:20.537894+02:00", "EventTime": "2023-10-30T14:03:20.537919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["CZFaCT1yRGbk3Rpy7l"]} -{"Format": "IDEA0", "ID": "330a05e9-c5bc-4209-8570-8d1de8809ab3", "DetectTime": "2023-10-30T14:03:20.602930+02:00", "EventTime": "2023-10-30T14:03:20.602988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["CFIrwD4eDmhKlnGpCc"]} -{"Format": "Json", "ID": "330a05e9-c5bc-4209-8570-8d1de8809ab3", "DetectTime": "2023-10-30T14:03:20.602930+02:00", "EventTime": "2023-10-30T14:03:20.602988+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:11:52.961886+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:20.699393)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07599186-f7f9-4ba8-8630-9ea403ae4d70", "DetectTime": "2023-10-30T14:03:20.706714+02:00", "EventTime": "2023-10-30T14:03:20.706738+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIuWfmZmRWNewxM46"]} -{"Format": "IDEA0", "ID": "e4f89c8e-132b-4c84-b8f8-c2758f9ab0bb", "DetectTime": "2023-10-30T14:03:20.718719+02:00", "EventTime": "2023-10-30T14:03:20.718737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6612], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. ", "ContentType": "text/plain"}], "uids": ["C8KjhP2ngkrCm0yBi4"]} -{"Format": "IDEA0", "ID": "b28e43a4-d406-4b9a-85fd-99f95cbc648d", "DetectTime": "2023-10-30T14:03:20.780172+02:00", "EventTime": "2023-10-30T14:03:20.780199+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CH41eV3DrvA6r8kz6h"]} -{"Format": "IDEA0", "ID": "73390a88-65b2-4c6b-b271-416c90592924", "DetectTime": "2023-10-30T14:03:20.791055+02:00", "EventTime": "2023-10-30T14:03:20.791073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["Ccyxke4fpsYnr1dMa3"]} -{"Format": "IDEA0", "ID": "915de9d4-fdb6-4a01-a84a-88ee9fd14953", "DetectTime": "2023-10-30T14:03:20.843871+02:00", "EventTime": "2023-10-30T14:03:20.843884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CvdQgz4k8Cn5vxNexl"]} -{"Format": "IDEA0", "ID": "3f85d295-e2a3-430a-bd88-bf4c88265bb6", "DetectTime": "2023-10-30T14:03:20.867468+02:00", "EventTime": "2023-10-30T14:03:20.867481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8239], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. ", "ContentType": "text/plain"}], "uids": ["CWgWrA05CLy7S5Slc"]} -{"Format": "IDEA0", "ID": "1daea592-ea84-4b3a-8d3d-0d7fecd0f72e", "DetectTime": "2023-10-30T14:03:20.924781+02:00", "EventTime": "2023-10-30T14:03:20.924797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25259], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. ", "ContentType": "text/plain"}], "uids": ["Cka0Kh2WeRmlAKDezg"]} -{"Format": "IDEA0", "ID": "a3f13949-9575-4907-9056-f482b3295287", "DetectTime": "2023-10-30T14:03:20.977048+02:00", "EventTime": "2023-10-30T14:03:20.977064+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvGoCh2cSV4c5r9X98"]} -{"Format": "IDEA0", "ID": "1cd465cb-4e48-4089-be90-ac11bbd8aec4", "DetectTime": "2023-10-30T14:03:20.987898+02:00", "EventTime": "2023-10-30T14:03:20.987916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQOn3x2LJQpZqKsBle"]} -{"Format": "IDEA0", "ID": "a3114245-28c8-42e8-be0a-9cd82224b002", "DetectTime": "2023-10-30T14:03:21.040762+02:00", "EventTime": "2023-10-30T14:03:21.040779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3924], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. ", "ContentType": "text/plain"}], "uids": ["C1kQY22A1pCUdEEstj"]} -{"Format": "IDEA0", "ID": "a83924bc-2239-4457-81c0-c39ce18f5c9d", "DetectTime": "2023-10-30T14:03:21.098354+02:00", "EventTime": "2023-10-30T14:03:21.098371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6134], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. ", "ContentType": "text/plain"}], "uids": ["CC4jA21h3GmX7yNm24"]} -{"Format": "IDEA0", "ID": "bac23df9-3925-4211-9d41-4664c134346b", "DetectTime": "2023-10-30T14:03:21.151079+02:00", "EventTime": "2023-10-30T14:03:21.151099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CzhBMuFB9BXKaiSbd"]} -{"Format": "Json", "ID": "bac23df9-3925-4211-9d41-4664c134346b", "DetectTime": "2023-10-30T14:03:21.151079+02:00", "EventTime": "2023-10-30T14:03:21.151099+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:44:07.439207+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:21.229859)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "718bd7d5-7958-471d-a413-334fcb8ff04b", "DetectTime": "2023-10-30T14:03:21.235166+02:00", "EventTime": "2023-10-30T14:03:21.235182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CCX7Wo2J5R5NSQwvck"]} -{"Format": "IDEA0", "ID": "7fe4cdcc-44b4-45c1-be76-523868d69734", "DetectTime": "2023-10-30T14:03:21.277943+02:00", "EventTime": "2023-10-30T14:03:21.277959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. ", "ContentType": "text/plain"}], "uids": ["C0rdGK1hpNIGjvIcB"]} -{"Format": "IDEA0", "ID": "e8a08cab-69de-4e05-981b-b0c992292f67", "DetectTime": "2023-10-30T14:03:21.325030+02:00", "EventTime": "2023-10-30T14:03:21.325053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24104], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. ", "ContentType": "text/plain"}], "uids": ["C8x0w93un32EmK1tac"]} -{"Format": "IDEA0", "ID": "88d4e0c1-9a5d-4eb4-96cc-771a97c00942", "DetectTime": "2023-10-30T14:03:21.375239+02:00", "EventTime": "2023-10-30T14:03:21.375255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cz2rm41x45fpYvm459"]} -{"Format": "IDEA0", "ID": "cbbae5f6-bce2-4284-b9d8-2446a8372f41", "DetectTime": "2023-10-30T14:03:21.435296+02:00", "EventTime": "2023-10-30T14:03:21.435314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16365], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. ", "ContentType": "text/plain"}], "uids": ["CUZrBD43Qb3An0dYCi"]} -{"Format": "IDEA0", "ID": "99830176-40c3-427e-86dd-8abf0520e03a", "DetectTime": "2023-10-30T14:03:21.493008+02:00", "EventTime": "2023-10-30T14:03:21.493030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. ", "ContentType": "text/plain"}], "uids": ["CfLrLBMs6ooQHAaBj"]} -{"Format": "IDEA0", "ID": "b78e18c1-c3e3-46aa-975e-d27a3673c7fc", "DetectTime": "2023-10-30T14:03:21.545444+02:00", "EventTime": "2023-10-30T14:03:21.545461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8435], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. ", "ContentType": "text/plain"}], "uids": ["CfTNK82OJK5HeTYkcc"]} -{"Format": "IDEA0", "ID": "85479140-557d-4f2d-9f94-0ba768257ad1", "DetectTime": "2023-10-30T14:03:21.597795+02:00", "EventTime": "2023-10-30T14:03:21.597811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CBd0gjrwz0G2Kosr5"]} -{"Format": "Json", "ID": "85479140-557d-4f2d-9f94-0ba768257ad1", "DetectTime": "2023-10-30T14:03:21.597795+02:00", "EventTime": "2023-10-30T14:03:21.597811+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:44:07.773837+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:21.679204)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9cef007f-9c1d-4f31-8890-2428f3d3e706", "DetectTime": "2023-10-30T14:03:21.684811+02:00", "EventTime": "2023-10-30T14:03:21.684831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CW0ADu2RXmmjNgPrGg"]} -{"Format": "IDEA0", "ID": "96d92c6a-4c38-4396-b771-51e80827168c", "DetectTime": "2023-10-30T14:03:21.733633+02:00", "EventTime": "2023-10-30T14:03:21.733652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. ", "ContentType": "text/plain"}], "uids": ["C4kQPf2WHPWv1SuuE7"]} -{"Format": "IDEA0", "ID": "e81693a0-45e4-432f-badb-0b32e31ed0a9", "DetectTime": "2023-10-30T14:03:21.777444+02:00", "EventTime": "2023-10-30T14:03:21.777455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. ", "ContentType": "text/plain"}], "uids": ["C1oGvA4kszJO0uZill"]} -{"Format": "IDEA0", "ID": "8af6d4b5-69c0-4b7d-9f6a-e19848b81a94", "DetectTime": "2023-10-30T14:03:21.820256+02:00", "EventTime": "2023-10-30T14:03:21.820276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7651], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. ", "ContentType": "text/plain"}], "uids": ["Cm4EeP2SMPWRwYZGga"]} -{"Format": "IDEA0", "ID": "f97f7258-58dd-4bf7-85c5-0de2e3eedc95", "DetectTime": "2023-10-30T14:03:21.864316+02:00", "EventTime": "2023-10-30T14:03:21.864341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11337], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. ", "ContentType": "text/plain"}], "uids": ["Cfwehe3oS2xXb2B782"]} -{"Format": "IDEA0", "ID": "e4a4ea50-4bb1-4e83-9235-9a24b7bef702", "DetectTime": "2023-10-30T14:03:21.909314+02:00", "EventTime": "2023-10-30T14:03:21.909329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9109], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. ", "ContentType": "text/plain"}], "uids": ["Cg1bwy3DC4fNoyVdl2"]} -{"Format": "IDEA0", "ID": "47ba8350-85b7-4998-8ea6-3269c116cab3", "DetectTime": "2023-10-30T14:03:21.949990+02:00", "EventTime": "2023-10-30T14:03:21.950007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CconGC2cBlzj68wS41"]} -{"Format": "IDEA0", "ID": "93ad67c2-baf2-4beb-b579-1af719e98b3f", "DetectTime": "2023-10-30T14:03:21.996922+02:00", "EventTime": "2023-10-30T14:03:21.996943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["Cok3hC28qaqT65pkUh"]} -{"Format": "Json", "ID": "93ad67c2-baf2-4beb-b579-1af719e98b3f", "DetectTime": "2023-10-30T14:03:21.996922+02:00", "EventTime": "2023-10-30T14:03:21.996943+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:45:17.488843+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:22.073649)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4cdf173d-0ba1-44a1-bd3f-7944302859b2", "DetectTime": "2023-10-30T14:03:22.079564+02:00", "EventTime": "2023-10-30T14:03:22.079584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CsBkCg1RSnkxqz9Bf4"]} -{"Format": "IDEA0", "ID": "90df6a79-d88a-4b6b-9cca-5c5f89bfe25e", "DetectTime": "2023-10-30T14:03:22.120971+02:00", "EventTime": "2023-10-30T14:03:22.120993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CvhEZF2qCIvq8coERf"]} -{"Format": "IDEA0", "ID": "10c83ba7-5cd8-401d-a22b-57a9d839e7a8", "DetectTime": "2023-10-30T14:03:22.166754+02:00", "EventTime": "2023-10-30T14:03:22.166768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. ", "ContentType": "text/plain"}], "uids": ["C3H3nI1pJYMJbozwkl"]} -{"Format": "IDEA0", "ID": "4f5dacaf-77f4-4776-b3aa-60d118c29a00", "DetectTime": "2023-10-30T14:03:22.205132+02:00", "EventTime": "2023-10-30T14:03:22.205143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["Ckmh4311EjcJMm2gRa"]} -{"Format": "IDEA0", "ID": "590a818f-637d-4ed1-8282-c7d3cc405cf8", "DetectTime": "2023-10-30T14:03:22.250559+02:00", "EventTime": "2023-10-30T14:03:22.250580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. ", "ContentType": "text/plain"}], "uids": ["CH7eze1ZO4OMaOtJj"]} -{"Format": "IDEA0", "ID": "824339a9-9768-4c9a-8b41-9851767c1901", "DetectTime": "2023-10-30T14:03:22.293718+02:00", "EventTime": "2023-10-30T14:03:22.293728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CfOzyh1X4fWg0dxi0d"]} -{"Format": "IDEA0", "ID": "cde22d37-ff11-4011-b17d-8f5f7cc8b2f9", "DetectTime": "2023-10-30T14:03:22.336238+02:00", "EventTime": "2023-10-30T14:03:22.336256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["Cef5Mc2vmo1ssYAsT6"]} -{"Format": "IDEA0", "ID": "6952d71b-3190-40b2-9dce-1636944469dd", "DetectTime": "2023-10-30T14:03:22.379803+02:00", "EventTime": "2023-10-30T14:03:22.379814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CNBLQo26bpZFUQESak"]} -{"Format": "Json", "ID": "6952d71b-3190-40b2-9dce-1636944469dd", "DetectTime": "2023-10-30T14:03:22.379803+02:00", "EventTime": "2023-10-30T14:03:22.379814+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:46:31.810657+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:22.438402)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b89bed3d-9c5e-4fdd-858b-42de34ac5d21", "DetectTime": "2023-10-30T14:03:22.442250+02:00", "EventTime": "2023-10-30T14:03:22.442261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CWm8kRKxybnSg6w47"]} -{"Format": "IDEA0", "ID": "ef6f4870-eefa-424f-8588-8191525528e1", "DetectTime": "2023-10-30T14:03:22.483297+02:00", "EventTime": "2023-10-30T14:03:22.483316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CdeamycZq8OF8OPJ1"]} -{"Format": "IDEA0", "ID": "487ee351-50ee-497c-bf5b-2c0658117523", "DetectTime": "2023-10-30T14:03:22.611344+02:00", "EventTime": "2023-10-30T14:03:22.611363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27376], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. ", "ContentType": "text/plain"}], "uids": ["CC17pG2xsNimC0pO52"]} -{"Format": "IDEA0", "ID": "5f103447-8d7a-4e83-a24c-aa85e2c7b226", "DetectTime": "2023-10-30T14:03:22.656399+02:00", "EventTime": "2023-10-30T14:03:22.656421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["CgjF6rQIAJQr9vlnh"]} -{"Format": "IDEA0", "ID": "07e46996-9477-470b-855a-c0adc7c19edc", "DetectTime": "2023-10-30T14:03:22.698551+02:00", "EventTime": "2023-10-30T14:03:22.698568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11311/UDP destination IP 117.199.106.53. ", "ContentType": "text/plain"}], "uids": ["CaoB9u1dtTchh4Fs36"]} -{"Format": "IDEA0", "ID": "c3e14fda-0bb6-4666-856d-cfd9522e1d54", "DetectTime": "2023-10-30T14:03:22.739867+02:00", "EventTime": "2023-10-30T14:03:22.739886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7588], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. ", "ContentType": "text/plain"}], "uids": ["CWDMN33D7pIswFF6X3"]} -{"Format": "IDEA0", "ID": "2d34b3fa-7654-4223-a8f3-5e69b22d4f9f", "DetectTime": "2023-10-30T14:03:22.781912+02:00", "EventTime": "2023-10-30T14:03:22.781930+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CrUYpos7MJBljGvx5"]} -{"Format": "IDEA0", "ID": "d5c60ff9-7227-4d40-9423-5953da85079d", "DetectTime": "2023-10-30T14:03:22.794304+02:00", "EventTime": "2023-10-30T14:03:22.794326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CJzRbC1O0FprEq5Luh"]} -{"Format": "IDEA0", "ID": "7bd216a4-73de-4c2d-bda5-910a9a514fb3", "DetectTime": "2023-10-30T14:03:22.844519+02:00", "EventTime": "2023-10-30T14:03:22.844537+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CgkKsq2oHLHySIL4va"]} -{"Format": "IDEA0", "ID": "9d9a920c-a65d-4966-aac6-bc169c6ca152", "DetectTime": "2023-10-30T14:03:22.860781+02:00", "EventTime": "2023-10-30T14:03:22.860797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CJdrUL1UOoctcqQ9a"]} -{"Format": "Json", "ID": "9d9a920c-a65d-4966-aac6-bc169c6ca152", "DetectTime": "2023-10-30T14:03:22.860781+02:00", "EventTime": "2023-10-30T14:03:22.860797+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:47:34.791291+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:22.940196)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fa9f9526-2828-4cea-bfe3-cc9fc4dc01d8", "DetectTime": "2023-10-30T14:03:22.945399+02:00", "EventTime": "2023-10-30T14:03:22.945411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["Cdhufm4vxAbpg3P848"]} -{"Format": "IDEA0", "ID": "4e900e78-7fa2-47e2-a27a-c46f2cd9f2ce", "DetectTime": "2023-10-30T14:03:22.995604+02:00", "EventTime": "2023-10-30T14:03:22.995623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CrUYpos7MJBljGvx5", "CIMtIH3V081viIQvY3", "CH41eV3DrvA6r8kz6h", "CyORyz27MI1100QsH8"]} -{"Format": "IDEA0", "ID": "cbf20a1e-86d1-4b5b-adae-039e2156bc00", "DetectTime": "2023-10-30T14:03:23.008853+02:00", "EventTime": "2023-10-30T14:03:23.008870+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyORyz27MI1100QsH8"]} -{"Format": "IDEA0", "ID": "eefe4a4c-4497-4150-a8bd-8baa0afcf5c8", "DetectTime": "2023-10-30T14:03:23.021352+02:00", "EventTime": "2023-10-30T14:03:23.021373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C18XNt41Y75CY7uslk"]} -{"Format": "IDEA0", "ID": "38d64c14-2dc6-45c5-ad01-836d4e5607e6", "DetectTime": "2023-10-30T14:03:23.058740+02:00", "EventTime": "2023-10-30T14:03:23.058757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22710/UDP destination IP 122.3.142.198. ", "ContentType": "text/plain"}], "uids": ["Cbt1k44Q6NEmGvU5I3"]} -{"Format": "IDEA0", "ID": "985dbdd7-2c0e-489d-a68e-a92d09cfb854", "DetectTime": "2023-10-30T14:03:23.100950+02:00", "EventTime": "2023-10-30T14:03:23.100966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15206], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. ", "ContentType": "text/plain"}], "uids": ["C0D7Wy1NWPqIGVPK1g"]} -{"Format": "IDEA0", "ID": "0bc2f466-b3a0-4201-9d3c-6a812fe95706", "DetectTime": "2023-10-30T14:03:23.143036+02:00", "EventTime": "2023-10-30T14:03:23.143056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C8CVBSUxS2k10e2w"]} -{"Format": "IDEA0", "ID": "1a4e07c6-4bca-4ce4-803b-300d6b041e43", "DetectTime": "2023-10-30T14:03:23.182364+02:00", "EventTime": "2023-10-30T14:03:23.182380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["CGCQX2Ar1JQNltcy6"]} -{"Format": "IDEA0", "ID": "60ce3eb2-08c9-4068-80af-834156b906c8", "DetectTime": "2023-10-30T14:03:23.220792+02:00", "EventTime": "2023-10-30T14:03:23.220809+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXxSo2zOoRJigyb7l"]} -{"Format": "IDEA0", "ID": "cf38356b-569f-40f5-ba4d-523d57d25bbb", "DetectTime": "2023-10-30T14:03:23.230928+02:00", "EventTime": "2023-10-30T14:03:23.230940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CcAi7M3v4uYba8T3s1"]} -{"Format": "IDEA0", "ID": "600b0ce7-91aa-49e4-8eca-9c74c05f0816", "DetectTime": "2023-10-30T14:03:23.259131+02:00", "EventTime": "2023-10-30T14:03:23.259149+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIYgAd1wTGx6IDv1Uk"]} -{"Format": "IDEA0", "ID": "bee6431b-c83e-4761-bdb9-8e4c35df9720", "DetectTime": "2023-10-30T14:03:23.270150+02:00", "EventTime": "2023-10-30T14:03:23.270171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18343], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. ", "ContentType": "text/plain"}], "uids": ["Cfkf2U22mo5DKrUHL1"]} -{"Format": "IDEA0", "ID": "33eb8767-4a34-4513-9c16-865d0e7cb51c", "DetectTime": "2023-10-30T14:03:23.313801+02:00", "EventTime": "2023-10-30T14:03:23.313818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. ", "ContentType": "text/plain"}], "uids": ["Ct1ei74XMBdHSLt1Bf"]} -{"Format": "Json", "ID": "33eb8767-4a34-4513-9c16-865d0e7cb51c", "DetectTime": "2023-10-30T14:03:23.313801+02:00", "EventTime": "2023-10-30T14:03:23.313818+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:49:42.304559+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:23.388263)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c1901f51-7e51-49f1-ba19-4be88db7de2b", "DetectTime": "2023-10-30T14:03:23.393188+02:00", "EventTime": "2023-10-30T14:03:23.393200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16776], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16776/UDP destination IP 36.69.218.77. ", "ContentType": "text/plain"}], "uids": ["C4N1dC4DozfxIJEaE9"]} -{"Format": "IDEA0", "ID": "f60c33fe-b183-4b69-8f4a-895b822eb848", "DetectTime": "2023-10-30T14:03:23.436396+02:00", "EventTime": "2023-10-30T14:03:23.436419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. ", "ContentType": "text/plain"}], "uids": ["CzPnv54GQ4omxrCnej"]} -{"Format": "IDEA0", "ID": "7c9c11b2-1c54-435a-af2a-6cc88ba63999", "DetectTime": "2023-10-30T14:03:23.478939+02:00", "EventTime": "2023-10-30T14:03:23.478951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["CD6ubEmOi3I990l9i"]} -{"Format": "IDEA0", "ID": "2374670d-994d-42fa-81bb-175cc1a9e77a", "DetectTime": "2023-10-30T14:03:23.520250+02:00", "EventTime": "2023-10-30T14:03:23.520273+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClinHRZlA2rudkAU8"]} -{"Format": "IDEA0", "ID": "3bdef8f9-ec2e-44ef-ba34-bf3e3ed25f78", "DetectTime": "2023-10-30T14:03:23.533879+02:00", "EventTime": "2023-10-30T14:03:23.533906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CuLPRg4B4nk7Nhcy1l"]} -{"Format": "IDEA0", "ID": "95a35c29-1c54-46c0-887b-18339600ce25", "DetectTime": "2023-10-30T14:03:23.570860+02:00", "EventTime": "2023-10-30T14:03:23.570879+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsAtOT2YjneBGlNVGg"]} -{"Format": "IDEA0", "ID": "b88ee594-ab88-4acd-9eea-5ab5e533a714", "DetectTime": "2023-10-30T14:03:23.582097+02:00", "EventTime": "2023-10-30T14:03:23.582122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CtLfHL1ssWNmYtW4mg"]} -{"Format": "IDEA0", "ID": "435fc9db-50b6-493b-89a9-c8c80bc28a8d", "DetectTime": "2023-10-30T14:03:23.622163+02:00", "EventTime": "2023-10-30T14:03:23.622181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CQ0dvh1mFgGdC03Vck"]} -{"Format": "IDEA0", "ID": "16388498-29cd-4a68-b5d1-4ed514c0a8e5", "DetectTime": "2023-10-30T14:03:23.662879+02:00", "EventTime": "2023-10-30T14:03:23.662899+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cz08xL33cx6nZ5M7wl"]} -{"Format": "IDEA0", "ID": "f0e075a3-cbb6-4444-a75a-f7b0cb14b854", "DetectTime": "2023-10-30T14:03:23.676591+02:00", "EventTime": "2023-10-30T14:03:23.676611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27404], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. ", "ContentType": "text/plain"}], "uids": ["CqgaVt2aed44R1Kx02"]} -{"Format": "IDEA0", "ID": "6c471d7e-38d9-4b93-8524-aaf8694e7d46", "DetectTime": "2023-10-30T14:03:23.715980+02:00", "EventTime": "2023-10-30T14:03:23.715999+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxO0vq3c0dJtaXk3sh"]} -{"Format": "IDEA0", "ID": "abaaee3c-eb13-45c7-b629-085badf809de", "DetectTime": "2023-10-30T14:03:23.728581+02:00", "EventTime": "2023-10-30T14:03:23.728596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19526/UDP destination IP 122.170.10.62. ", "ContentType": "text/plain"}], "uids": ["COEhIbxG8JBejBasa"]} -{"Format": "Json", "ID": "abaaee3c-eb13-45c7-b629-085badf809de", "DetectTime": "2023-10-30T14:03:23.728581+02:00", "EventTime": "2023-10-30T14:03:23.728596+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19526], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:50:08.023947+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:23.797768)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "32ace8f3-e26e-46d4-a1e9-a720f87e5277", "DetectTime": "2023-10-30T14:03:23.803239+02:00", "EventTime": "2023-10-30T14:03:23.803255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["ClFrGx35hhgSIU3cR1"]} -{"Format": "IDEA0", "ID": "d18465cc-9c16-4e8f-b055-493555c7964c", "DetectTime": "2023-10-30T14:03:23.848995+02:00", "EventTime": "2023-10-30T14:03:23.849011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2917], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2917/UDP destination IP 80.241.253.218. ", "ContentType": "text/plain"}], "uids": ["Ctc48u28yCCMWNw9R9"]} -{"Format": "IDEA0", "ID": "7d80aa73-c98e-447e-aa99-2e21bd99ddd7", "DetectTime": "2023-10-30T14:03:23.890641+02:00", "EventTime": "2023-10-30T14:03:23.890655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22126/UDP destination IP 85.97.73.133. ", "ContentType": "text/plain"}], "uids": ["CPrOuLGNaa2BbUTP6"]} -{"Format": "IDEA0", "ID": "aaedeaaa-ddc6-4426-84f0-17bc3221c6ce", "DetectTime": "2023-10-30T14:03:23.931201+02:00", "EventTime": "2023-10-30T14:03:23.931221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10675], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10675/UDP destination IP 120.63.10.102. ", "ContentType": "text/plain"}], "uids": ["CAoV6c3RQjoYsnbWhl"]} -{"Format": "IDEA0", "ID": "e8afa382-79c9-4f8a-af84-ada0cc593453", "DetectTime": "2023-10-30T14:03:23.969782+02:00", "EventTime": "2023-10-30T14:03:23.969799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["Csyu8mUIKLcGJS223"]} -{"Format": "IDEA0", "ID": "a491f70f-058c-4f0d-9f1e-8784ac999f16", "DetectTime": "2023-10-30T14:03:24.007580+02:00", "EventTime": "2023-10-30T14:03:24.007598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. ", "ContentType": "text/plain"}], "uids": ["C9C4D01k3E1C9uVJp2"]} -{"Format": "IDEA0", "ID": "44f4940f-a1e5-46f5-a867-c80db397ea8e", "DetectTime": "2023-10-30T14:03:24.051246+02:00", "EventTime": "2023-10-30T14:03:24.051263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7534], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. ", "ContentType": "text/plain"}], "uids": ["CDYhXr3s8zJOwRRkWi"]} -{"Format": "IDEA0", "ID": "ac8ca1b2-4c2a-4e8e-af83-f4bf08ad1cfd", "DetectTime": "2023-10-30T14:03:24.090177+02:00", "EventTime": "2023-10-30T14:03:24.090195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["CNqBZm4Lh5aGnnJey7"]} -{"Format": "Json", "ID": "ac8ca1b2-4c2a-4e8e-af83-f4bf08ad1cfd", "DetectTime": "2023-10-30T14:03:24.090177+02:00", "EventTime": "2023-10-30T14:03:24.090195+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T13:50:52.982547+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2023/10/30 14:03:24.155715)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6086f33c-4649-483a-b58e-30977ecb5ed6", "DetectTime": "2023-10-30T14:03:24.160776+02:00", "EventTime": "2023-10-30T14:03:24.160790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. ", "ContentType": "text/plain"}], "uids": ["CnwTBH1MU6xOBeXlcd"]} -{"Format": "IDEA0", "ID": "f41400cf-771f-4167-b662-ade27f6a3c1f", "DetectTime": "2023-10-30T14:03:24.197130+02:00", "EventTime": "2023-10-30T14:03:24.197152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CtklSc46DG4581VCA2"]} -{"Format": "IDEA0", "ID": "9fac7bf4-4a10-4f2c-92b9-d60b56830022", "DetectTime": "2023-10-30T14:03:24.225241+02:00", "EventTime": "2023-10-30T14:03:24.225254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10452], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. ", "ContentType": "text/plain"}], "uids": ["CLPBZp2sFV9ryOXVQd"]} -{"Format": "IDEA0", "ID": "8fef661f-38c3-4761-aaa1-8d4f7517602c", "DetectTime": "2023-10-30T14:03:24.258455+02:00", "EventTime": "2023-10-30T14:03:24.258474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CUvklb2NLVcs9p0Cbf"]} -{"Format": "IDEA0", "ID": "b641fd67-3bad-4682-a222-3cacd1c1115e", "DetectTime": "2023-10-30T14:03:24.287895+02:00", "EventTime": "2023-10-30T14:03:24.287912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. ", "ContentType": "text/plain"}], "uids": ["CX3ekU2MXpWZIsfz09"]} -{"Format": "IDEA0", "ID": "43640229-c046-4cc3-8687-9a5af1afa026", "DetectTime": "2023-10-30T14:03:24.322960+02:00", "EventTime": "2023-10-30T14:03:24.322984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["CGUpvo2pfINNsbAbai"]} -{"Format": "IDEA0", "ID": "21b2c53d-7608-4b45-8b63-2d89ae5e3185", "DetectTime": "2023-10-30T14:03:24.366387+02:00", "EventTime": "2023-10-30T14:03:24.366405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cla8oq4SYa2XewM9t7"]} -{"Format": "IDEA0", "ID": "75882a83-c9e8-4110-b61b-dc429785f767", "DetectTime": "2023-10-30T14:03:24.399428+02:00", "EventTime": "2023-10-30T14:03:24.399449+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMksM93ptCtgIVpoX3"]} -{"Format": "IDEA0", "ID": "503aeb28-f691-4e03-81b4-ca2cf97ab5ae", "DetectTime": "2023-10-30T14:03:24.411711+02:00", "EventTime": "2023-10-30T14:03:24.411729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CUKXlUvCSzWJA5PE1"]} -{"Format": "IDEA0", "ID": "23a6bc97-e940-4910-9725-aaf2a2ecf891", "DetectTime": "2023-10-30T14:03:24.473802+02:00", "EventTime": "2023-10-30T14:03:24.473819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKXadN1BDIxLy1bEP3"]} -{"Format": "IDEA0", "ID": "9780894e-1595-4f6e-b8cb-5d5759793236", "DetectTime": "2023-10-30T14:03:24.603034+02:00", "EventTime": "2023-10-30T14:03:24.603050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CB2p6jNdY9X9SxFz4"]} -{"Format": "IDEA0", "ID": "658e0de1-731e-42e7-9f4a-111238167550", "DetectTime": "2023-10-30T14:03:24.666099+02:00", "EventTime": "2023-10-30T14:03:24.666117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CJ9dLA1AzyKX6MzPA8"]} -{"Format": "IDEA0", "ID": "7e8302dc-f3b0-42fb-bf61-6d64b18c5acf", "DetectTime": "2023-10-30T14:03:24.730809+02:00", "EventTime": "2023-10-30T14:03:24.730830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CnpT9mtnJCU0BmE5i"]} -{"Format": "IDEA0", "ID": "abb28564-5e7b-40c5-a5c4-22fbd015550b", "DetectTime": "2023-10-30T14:03:24.798534+02:00", "EventTime": "2023-10-30T14:03:24.798551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CZ1dGA4y6HlkIkWqGh"]} -{"Format": "IDEA0", "ID": "8ea46ff3-3bd4-431a-a2c9-2cfafdafe41d", "DetectTime": "2023-10-30T14:03:24.862836+02:00", "EventTime": "2023-10-30T14:03:24.862854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C36wdN182ygInkYj26"]} -{"Format": "Json", "ID": "8ea46ff3-3bd4-431a-a2c9-2cfafdafe41d", "DetectTime": "2023-10-30T14:03:24.862836+02:00", "EventTime": "2023-10-30T14:03:24.862854+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:22:22.928368+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:24.986897)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "875c2acd-b314-47a1-8902-d9d76777195f", "DetectTime": "2023-10-30T14:03:24.993279+02:00", "EventTime": "2023-10-30T14:03:24.993316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CL73Q41ZsfXY9pFhW9"]} -{"Format": "IDEA0", "ID": "e84c2a92-02bc-4335-a0b1-5a41f83ead51", "DetectTime": "2023-10-30T14:03:25.061212+02:00", "EventTime": "2023-10-30T14:03:25.061225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. ", "ContentType": "text/plain"}], "uids": ["C1lkYr4DiKBWVWvMC5"]} -{"Format": "IDEA0", "ID": "847c587e-1c34-4f42-9954-77b12a7f6bd3", "DetectTime": "2023-10-30T14:03:25.117746+02:00", "EventTime": "2023-10-30T14:03:25.117763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. ", "ContentType": "text/plain"}], "uids": ["CuE2aMMAn3p41pkj"]} -{"Format": "IDEA0", "ID": "58cb691d-17df-43b4-9b37-82d69c608c70", "DetectTime": "2023-10-30T14:03:25.178993+02:00", "EventTime": "2023-10-30T14:03:25.179015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CFpclk1VYfwhdpi7N2"]} -{"Format": "IDEA0", "ID": "b3297953-f9a0-4cb3-86c6-cb7f50d53b3d", "DetectTime": "2023-10-30T14:03:25.241547+02:00", "EventTime": "2023-10-30T14:03:25.241568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CYuMsKxGI5ldEGKn1"]} -{"Format": "IDEA0", "ID": "65b9955f-cce1-454d-9aaa-012ce4306eb2", "DetectTime": "2023-10-30T14:03:25.314491+02:00", "EventTime": "2023-10-30T14:03:25.314507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CBHlYI3p6TcOCgDG68"]} -{"Format": "IDEA0", "ID": "aa31ac1a-5f1e-4670-90f1-26a4efa6d0b0", "DetectTime": "2023-10-30T14:03:25.374336+02:00", "EventTime": "2023-10-30T14:03:25.374353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CRoGN71R8ERmhgcDC5"]} -{"Format": "IDEA0", "ID": "892a5aca-f627-43c8-aaaf-966ef040fb2c", "DetectTime": "2023-10-30T14:03:25.436836+02:00", "EventTime": "2023-10-30T14:03:25.436853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CdNbcC1teIT84gLgBg"]} -{"Format": "Json", "ID": "892a5aca-f627-43c8-aaaf-966ef040fb2c", "DetectTime": "2023-10-30T14:03:25.436836+02:00", "EventTime": "2023-10-30T14:03:25.436853+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:22:23.679402+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:25.526794)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f09d568a-596f-4198-89b9-a5b2b411ce39", "DetectTime": "2023-10-30T14:03:25.532207+02:00", "EventTime": "2023-10-30T14:03:25.532224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CKyf9Ijp93sYsxALi"]} -{"Format": "IDEA0", "ID": "cee78b83-c672-4b3c-bfff-6d7f0e854728", "DetectTime": "2023-10-30T14:03:25.590004+02:00", "EventTime": "2023-10-30T14:03:25.590020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27376], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. ", "ContentType": "text/plain"}], "uids": ["CgEVD12mUbkdceaM3j"]} -{"Format": "IDEA0", "ID": "e17233f7-ba1e-4400-89fe-bd148deba97c", "DetectTime": "2023-10-30T14:03:25.651417+02:00", "EventTime": "2023-10-30T14:03:25.651436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["C1tt8H1i9JWIvI45P7"]} -{"Format": "IDEA0", "ID": "309d11a1-080c-4183-90e3-9a57424b872e", "DetectTime": "2023-10-30T14:03:25.707040+02:00", "EventTime": "2023-10-30T14:03:25.707061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11311], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11311/UDP destination IP 117.199.106.53. ", "ContentType": "text/plain"}], "uids": ["CwfeC03VszvqLLkrXg"]} -{"Format": "IDEA0", "ID": "67db33ee-655e-4c76-b07b-eb7a4f423a21", "DetectTime": "2023-10-30T14:03:25.766054+02:00", "EventTime": "2023-10-30T14:03:25.766080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7588], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. ", "ContentType": "text/plain"}], "uids": ["C5kQWi2XzES44FJ1vk"]} -{"Format": "IDEA0", "ID": "02759ae4-a31b-4e3c-875c-ff787b17781b", "DetectTime": "2023-10-30T14:03:25.825837+02:00", "EventTime": "2023-10-30T14:03:25.825854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CMBX3c2hJV8rcrnPre"]} -{"Format": "IDEA0", "ID": "00d30a3b-9dc5-43b7-be5c-fb1498ab0ea8", "DetectTime": "2023-10-30T14:03:25.882772+02:00", "EventTime": "2023-10-30T14:03:25.882800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CATJI62lwaISVM1F3i"]} -{"Format": "IDEA0", "ID": "d4db53e5-5eb4-448a-8a65-06d1a8ed27fe", "DetectTime": "2023-10-30T14:03:25.931249+02:00", "EventTime": "2023-10-30T14:03:25.931265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cmvtj63OnzQ83ywkwh"]} -{"Format": "Json", "ID": "d4db53e5-5eb4-448a-8a65-06d1a8ed27fe", "DetectTime": "2023-10-30T14:03:25.931249+02:00", "EventTime": "2023-10-30T14:03:25.931265+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:22:25.076441+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:26.016903)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7437fff1-d6da-4002-b48b-0c1cab31e128", "DetectTime": "2023-10-30T14:03:26.022755+02:00", "EventTime": "2023-10-30T14:03:26.022769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CbRDOUQYVbmbfh7y1"]} -{"Format": "IDEA0", "ID": "2f031c5d-6a93-44ad-bd2f-9bb1a806b7d3", "DetectTime": "2023-10-30T14:03:26.082060+02:00", "EventTime": "2023-10-30T14:03:26.082080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22710/UDP destination IP 122.3.142.198. ", "ContentType": "text/plain"}], "uids": ["C8u9o7d1PVvgWxsXh"]} -{"Format": "IDEA0", "ID": "dbaf0405-07a4-4b5a-bbaa-02274cc255c7", "DetectTime": "2023-10-30T14:03:26.135188+02:00", "EventTime": "2023-10-30T14:03:26.135209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CgZkLf3CfJTMepWpPj"]} -{"Format": "IDEA0", "ID": "47a63e20-6e3d-459c-a4c3-11b804c83051", "DetectTime": "2023-10-30T14:03:26.191877+02:00", "EventTime": "2023-10-30T14:03:26.191892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["Cjfetx4rYrgTIku5yj"]} -{"Format": "IDEA0", "ID": "8e0b3947-e1d4-4a82-9642-b02894e75770", "DetectTime": "2023-10-30T14:03:26.242589+02:00", "EventTime": "2023-10-30T14:03:26.242606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CxnEeu2nGBM9rZ90Zf"]} -{"Format": "IDEA0", "ID": "ab3cfec0-d828-4ab8-a860-557a5b260724", "DetectTime": "2023-10-30T14:03:26.267455+02:00", "EventTime": "2023-10-30T14:03:26.267473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18343], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. ", "ContentType": "text/plain"}], "uids": ["CbkE0q4lPifkYCcKp3"]} -{"Format": "IDEA0", "ID": "7c703253-355d-47b0-a7f7-aa3c19d3542b", "DetectTime": "2023-10-30T14:03:26.319174+02:00", "EventTime": "2023-10-30T14:03:26.319196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. ", "ContentType": "text/plain"}], "uids": ["COk6J01FIuw4C8oa3k"]} -{"Format": "IDEA0", "ID": "fdff4371-5616-4e0a-b252-7c673633b15f", "DetectTime": "2023-10-30T14:03:26.368580+02:00", "EventTime": "2023-10-30T14:03:26.368600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. ", "ContentType": "text/plain"}], "uids": ["Cu1xMD241Y9PisrAJg"]} -{"Format": "IDEA0", "ID": "086297c2-ec18-4018-b4bb-579cada91a16", "DetectTime": "2023-10-30T14:03:26.415128+02:00", "EventTime": "2023-10-30T14:03:26.415139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["CvkIgb3Wy3Zzp1SDSj"]} -{"Format": "Json", "ID": "086297c2-ec18-4018-b4bb-579cada91a16", "DetectTime": "2023-10-30T14:03:26.415128+02:00", "EventTime": "2023-10-30T14:03:26.415139+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:22:44.946104+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:26.491084)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ebee1387-5833-4f94-8b60-df425569912e", "DetectTime": "2023-10-30T14:03:26.496346+02:00", "EventTime": "2023-10-30T14:03:26.496362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CUEmJ13w9jv7F7QuH8"]} -{"Format": "IDEA0", "ID": "7a7ff700-9d7e-47a3-837f-e0b33bd5a297", "DetectTime": "2023-10-30T14:03:26.540782+02:00", "EventTime": "2023-10-30T14:03:26.540804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CNHhTBwyNakHHq6P5"]} -{"Format": "IDEA0", "ID": "797ae71b-fcb3-47f3-8c7f-aa7c8f759418", "DetectTime": "2023-10-30T14:03:26.588556+02:00", "EventTime": "2023-10-30T14:03:26.588572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CBCVWUiBDkOOW7xpj", "CxO0vq3c0dJtaXk3sh", "CIYgAd1wTGx6IDv1Uk", "CsAtOT2YjneBGlNVGg"]} -{"Format": "IDEA0", "ID": "b174881b-12dd-4514-b4d1-a25c1c9cd320", "DetectTime": "2023-10-30T14:03:26.598570+02:00", "EventTime": "2023-10-30T14:03:26.598587+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBCVWUiBDkOOW7xpj"]} -{"Format": "IDEA0", "ID": "9196e4e0-b665-46fe-9ebf-8a530aa7791a", "DetectTime": "2023-10-30T14:03:26.609746+02:00", "EventTime": "2023-10-30T14:03:26.609761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["COEGel13v2p0nsuEJa"]} -{"Format": "IDEA0", "ID": "bd95cf17-ea80-4ad5-9e5e-ebfa9143a101", "DetectTime": "2023-10-30T14:03:26.659427+02:00", "EventTime": "2023-10-30T14:03:26.659444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27404], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. ", "ContentType": "text/plain"}], "uids": ["COlvCR3dBmtrqDIEud"]} -{"Format": "IDEA0", "ID": "76eb9c38-d8bc-49b5-ba62-e997a8959a76", "DetectTime": "2023-10-30T14:03:26.704331+02:00", "EventTime": "2023-10-30T14:03:26.704352+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTeD2J14afV3qRFu73"]} -{"Format": "IDEA0", "ID": "c92a8186-7bfa-4f7e-902e-d7325a3ea5dd", "DetectTime": "2023-10-30T14:03:26.715346+02:00", "EventTime": "2023-10-30T14:03:26.715362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19526/UDP destination IP 122.170.10.62. ", "ContentType": "text/plain"}], "uids": ["Cc2Krx4HfiXRjZ9sNe"]} -{"Format": "IDEA0", "ID": "a46346fd-51b2-442d-af8e-781d6f3d5274", "DetectTime": "2023-10-30T14:03:26.759595+02:00", "EventTime": "2023-10-30T14:03:26.759622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CEklMP3tBg9vX2Zyy1"]} -{"Format": "IDEA0", "ID": "0c62bb19-0819-4feb-9365-dabe7107d21f", "DetectTime": "2023-10-30T14:03:26.809111+02:00", "EventTime": "2023-10-30T14:03:26.809128+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cq6u6q1SEyZd92irzk"]} -{"Format": "IDEA0", "ID": "8dd0a1ad-5917-4039-8f85-f2fbebb10cfa", "DetectTime": "2023-10-30T14:03:26.818269+02:00", "EventTime": "2023-10-30T14:03:26.818289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22126/UDP destination IP 85.97.73.133. ", "ContentType": "text/plain"}], "uids": ["C0frBi1qff2Kex24hc"]} -{"Format": "IDEA0", "ID": "a5aaba54-8d03-48e3-9a02-ffeb02cbfbec", "DetectTime": "2023-10-30T14:03:26.861847+02:00", "EventTime": "2023-10-30T14:03:26.861863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["CSHANP2y7Kh8XMRdE"]} -{"Format": "Json", "ID": "a5aaba54-8d03-48e3-9a02-ffeb02cbfbec", "DetectTime": "2023-10-30T14:03:26.861847+02:00", "EventTime": "2023-10-30T14:03:26.861863+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:23:17.690742+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:26.938865)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5a009326-a963-4854-baf8-f32d0233addd", "DetectTime": "2023-10-30T14:03:26.943135+02:00", "EventTime": "2023-10-30T14:03:26.943146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. ", "ContentType": "text/plain"}], "uids": ["CJFG8L26CIlBsset66"]} -{"Format": "IDEA0", "ID": "59390f0b-4dae-40cc-bfd6-8b953f54cf98", "DetectTime": "2023-10-30T14:03:26.986001+02:00", "EventTime": "2023-10-30T14:03:26.986018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7534], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. ", "ContentType": "text/plain"}], "uids": ["CLv1ajDsrxkfHEjZ8"]} -{"Format": "IDEA0", "ID": "5cebcbf0-1c6c-443f-aa4f-e5cba8d5c0cf", "DetectTime": "2023-10-30T14:03:27.025992+02:00", "EventTime": "2023-10-30T14:03:27.026004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["Ct2Vw33ZEyl4U3UYdk"]} -{"Format": "IDEA0", "ID": "003ada7e-0e6b-4dcc-8cfe-566a432f7f32", "DetectTime": "2023-10-30T14:03:27.065789+02:00", "EventTime": "2023-10-30T14:03:27.065810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. ", "ContentType": "text/plain"}], "uids": ["CvvQRp3qpRRfEG5YAf"]} -{"Format": "IDEA0", "ID": "dd6a092e-2269-4972-9f6f-942abcdeac15", "DetectTime": "2023-10-30T14:03:27.106180+02:00", "EventTime": "2023-10-30T14:03:27.106196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CLzzhj1PBhHd43gai"]} -{"Format": "IDEA0", "ID": "839ff774-bc6a-4466-90ab-4682aaec3146", "DetectTime": "2023-10-30T14:03:27.151808+02:00", "EventTime": "2023-10-30T14:03:27.151822+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHNCsO14NpqwEzn6p8"]} -{"Format": "IDEA0", "ID": "48e6bc2a-e0f0-4db5-8c4a-c67e0973caf1", "DetectTime": "2023-10-30T14:03:27.162322+02:00", "EventTime": "2023-10-30T14:03:27.162334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10452], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. ", "ContentType": "text/plain"}], "uids": ["CPbJiu18iZCHmAA0Bl"]} -{"Format": "IDEA0", "ID": "e749a0d8-419a-45f9-a17e-f3a36879e9a8", "DetectTime": "2023-10-30T14:03:27.203513+02:00", "EventTime": "2023-10-30T14:03:27.203524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. ", "ContentType": "text/plain"}], "uids": ["CO08VT8VPlb1t9H2d"]} -{"Format": "IDEA0", "ID": "860a3527-faa3-4c46-b9b6-98ae1ec4503c", "DetectTime": "2023-10-30T14:03:27.242911+02:00", "EventTime": "2023-10-30T14:03:27.242928+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkGpA61hjNU5DMaxPi"]} -{"Format": "IDEA0", "ID": "39b8667f-90b9-4476-bc49-b8a385245eb8", "DetectTime": "2023-10-30T14:03:27.251340+02:00", "EventTime": "2023-10-30T14:03:27.251351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["Cd2Aq34GqRDptKE4mb"]} -{"Format": "Json", "ID": "39b8667f-90b9-4476-bc49-b8a385245eb8", "DetectTime": "2023-10-30T14:03:27.251340+02:00", "EventTime": "2023-10-30T14:03:27.251351+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:23:20.244664+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:27.320698)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9f2dcaf1-ff5c-4197-be72-161f152b44e3", "DetectTime": "2023-10-30T14:03:27.326438+02:00", "EventTime": "2023-10-30T14:03:27.326458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CvvNEX2ytsGy5lG0lg"]} -{"Format": "IDEA0", "ID": "acf6ac23-8b7a-48f2-a93b-1c685591636a", "DetectTime": "2023-10-30T14:03:27.369420+02:00", "EventTime": "2023-10-30T14:03:27.369436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CEQx114ifWRoJUhUW"]} -{"Format": "IDEA0", "ID": "cc36460a-ce31-4743-afd3-9d07474bfb2c", "DetectTime": "2023-10-30T14:03:27.411353+02:00", "EventTime": "2023-10-30T14:03:27.411367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15206], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. ", "ContentType": "text/plain"}], "uids": ["CFQeht22ykGlPtJpy1"]} -{"Format": "IDEA0", "ID": "62c50e20-c306-4fbb-b138-fe3c455dcf26", "DetectTime": "2023-10-30T14:03:27.446668+02:00", "EventTime": "2023-10-30T14:03:27.446680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CGUdGVShi8j5jHvLf"]} -{"Format": "IDEA0", "ID": "32574e78-2109-4cd1-be5f-011af358064e", "DetectTime": "2023-10-30T14:03:27.491189+02:00", "EventTime": "2023-10-30T14:03:27.491208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["Cw2ilD4wfx3plWFe64"]} -{"Format": "IDEA0", "ID": "0afca8bf-4002-4ea8-b9e9-f8a902457d5a", "DetectTime": "2023-10-30T14:03:27.535835+02:00", "EventTime": "2023-10-30T14:03:27.535857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CpEyFUPkUAvKirFQb"]} -{"Format": "IDEA0", "ID": "c2c17f80-1a61-4cce-8c6a-eff1e4d22375", "DetectTime": "2023-10-30T14:03:27.580977+02:00", "EventTime": "2023-10-30T14:03:27.580993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CKMJZo1udqcjpuBZge"]} -{"Format": "IDEA0", "ID": "cc9ce302-1540-41e3-a8c6-b404b992cd5c", "DetectTime": "2023-10-30T14:03:27.626412+02:00", "EventTime": "2023-10-30T14:03:27.626429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. ", "ContentType": "text/plain"}], "uids": ["CRX7Zy35PGvntekec8"]} -{"Format": "Json", "ID": "cc9ce302-1540-41e3-a8c6-b404b992cd5c", "DetectTime": "2023-10-30T14:03:27.626412+02:00", "EventTime": "2023-10-30T14:03:27.626429+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:54:06.659089+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:27.701281)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f338aafc-48d1-4a89-a7c9-3dfeb258fa94", "DetectTime": "2023-10-30T14:03:27.706032+02:00", "EventTime": "2023-10-30T14:03:27.706049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. ", "ContentType": "text/plain"}], "uids": ["CSxUyD1VVlcuRlu6rg"]} -{"Format": "IDEA0", "ID": "0caf5f35-a06c-41ef-b61c-7f9bd23382ec", "DetectTime": "2023-10-30T14:03:27.746170+02:00", "EventTime": "2023-10-30T14:03:27.746191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CIlNOzTzmDk1PlWI5"]} -{"Format": "IDEA0", "ID": "505785af-288d-48e3-a56f-85878701e741", "DetectTime": "2023-10-30T14:03:27.780536+02:00", "EventTime": "2023-10-30T14:03:27.780547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["C34VsW3EDQFpTfJDX4"]} -{"Format": "IDEA0", "ID": "d07a8461-7ec4-4c96-b11b-b63bbd11750e", "DetectTime": "2023-10-30T14:03:27.818672+02:00", "EventTime": "2023-10-30T14:03:27.818690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["Cn40KT2dqtY9ZWihJa"]} -{"Format": "IDEA0", "ID": "63fcbded-f62e-4f51-b3c8-1e1ffa8eff0e", "DetectTime": "2023-10-30T14:03:27.853956+02:00", "EventTime": "2023-10-30T14:03:27.853969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CE4I5r1Ul14ZHa8FL8"]} -{"Format": "IDEA0", "ID": "9963f983-07b9-40a5-b19c-66741b5f0c68", "DetectTime": "2023-10-30T14:03:27.897076+02:00", "EventTime": "2023-10-30T14:03:27.897102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CQT4FO2uXPOKKuqG74"]} -{"Format": "IDEA0", "ID": "2aefac58-27f9-4f82-a9a8-15c5d2d20f2d", "DetectTime": "2023-10-30T14:03:27.937289+02:00", "EventTime": "2023-10-30T14:03:27.937311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["COu59v33vZebgyTHRi"]} -{"Format": "IDEA0", "ID": "1cb925f7-67da-4e5c-a750-525dd161d8a6", "DetectTime": "2023-10-30T14:03:27.979968+02:00", "EventTime": "2023-10-30T14:03:27.979979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["Ckbhff2OBE7ROua2W"]} -{"Format": "Json", "ID": "1cb925f7-67da-4e5c-a750-525dd161d8a6", "DetectTime": "2023-10-30T14:03:27.979968+02:00", "EventTime": "2023-10-30T14:03:27.979979+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:54:07.606712+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:28.045102)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "49b16949-2220-4baa-b871-596d2cdfc424", "DetectTime": "2023-10-30T14:03:28.049662+02:00", "EventTime": "2023-10-30T14:03:28.049675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CaJ5Cb1FPn6aK5THoc"]} -{"Format": "IDEA0", "ID": "3dd2625f-add5-49b9-8865-b79f8f5ced8b", "DetectTime": "2023-10-30T14:03:28.087430+02:00", "EventTime": "2023-10-30T14:03:28.087449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CpULm51OLWPZ4budbk"]} -{"Format": "IDEA0", "ID": "f3005ead-5afb-4bbb-aac5-e2f8c4ad2e6f", "DetectTime": "2023-10-30T14:03:28.128072+02:00", "EventTime": "2023-10-30T14:03:28.128089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["Cb5NthLQQT2ape2xi"]} -{"Format": "IDEA0", "ID": "aaa79452-1b07-4494-91a1-37ceb8c6a871", "DetectTime": "2023-10-30T14:03:28.166103+02:00", "EventTime": "2023-10-30T14:03:28.166122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["C7W1C01dcB3LVi9f2g"]} -{"Format": "IDEA0", "ID": "9029651a-a47b-4fe9-8d42-73877484c7ac", "DetectTime": "2023-10-30T14:03:28.205594+02:00", "EventTime": "2023-10-30T14:03:28.205607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27376], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. ", "ContentType": "text/plain"}], "uids": ["CSd3qH2CX9yVQhK9Mb"]} -{"Format": "IDEA0", "ID": "80ef3bd5-1570-443b-a97e-0e4daab7526d", "DetectTime": "2023-10-30T14:03:28.245061+02:00", "EventTime": "2023-10-30T14:03:28.245083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7588], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. ", "ContentType": "text/plain"}], "uids": ["COfA6z8jaqwlUTSg4"]} -{"Format": "IDEA0", "ID": "e87dcc76-8329-45d8-86a2-d743c576b8e6", "DetectTime": "2023-10-30T14:03:28.284009+02:00", "EventTime": "2023-10-30T14:03:28.284031+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWWF6n3e6ESrkv20y1"]} -{"Format": "IDEA0", "ID": "41be3787-a3c8-4c04-b690-4d52f36d025d", "DetectTime": "2023-10-30T14:03:28.296504+02:00", "EventTime": "2023-10-30T14:03:28.296517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cs5YtVpyb0UthotL4"]} -{"Format": "IDEA0", "ID": "f87ce334-dd63-45ea-95d4-cd16113efa8e", "DetectTime": "2023-10-30T14:03:28.334179+02:00", "EventTime": "2023-10-30T14:03:28.334191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CVWAjX3FY7dqnZuK01"]} -{"Format": "Json", "ID": "f87ce334-dd63-45ea-95d4-cd16113efa8e", "DetectTime": "2023-10-30T14:03:28.334179+02:00", "EventTime": "2023-10-30T14:03:28.334191+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:54:25.355074+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:28.392027)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "87b5c242-dd3c-4311-8f16-792424661a95", "DetectTime": "2023-10-30T14:03:28.396503+02:00", "EventTime": "2023-10-30T14:03:28.396521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C03aHm4D5TEurt8ii3"]} -{"Format": "IDEA0", "ID": "9c65ccaf-d605-4282-8b05-9f51b5bedb42", "DetectTime": "2023-10-30T14:03:28.441445+02:00", "EventTime": "2023-10-30T14:03:28.441466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. ", "ContentType": "text/plain"}], "uids": ["CfUEQY1ZkyN4Ryfebg"]} -{"Format": "IDEA0", "ID": "2e0f8927-41ac-477a-ab00-0859f0e38b52", "DetectTime": "2023-10-30T14:03:28.479231+02:00", "EventTime": "2023-10-30T14:03:28.479253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22710/UDP destination IP 122.3.142.198. ", "ContentType": "text/plain"}], "uids": ["Ch5GXQh6ZMW6ONef5"]} -{"Format": "IDEA0", "ID": "31a62e44-21a6-4b1e-8fd0-36827698e394", "DetectTime": "2023-10-30T14:03:28.510251+02:00", "EventTime": "2023-10-30T14:03:28.510267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["CnYFKl3NcMb6yhVIc5"]} -{"Format": "IDEA0", "ID": "ab20cdc8-8781-4d64-847b-397cde245259", "DetectTime": "2023-10-30T14:03:28.542873+02:00", "EventTime": "2023-10-30T14:03:28.542892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CUpUq8uRXnFVEdE43"]} -{"Format": "IDEA0", "ID": "11506b2e-ebcb-4f7b-915d-e5004e70cce6", "DetectTime": "2023-10-30T14:03:28.575310+02:00", "EventTime": "2023-10-30T14:03:28.575323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18343], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. ", "ContentType": "text/plain"}], "uids": ["Cd8RVPZZ52etmdEf"]} -{"Format": "IDEA0", "ID": "16d2c0f7-422f-49f8-8efd-2edcc6e2cebd", "DetectTime": "2023-10-30T14:03:28.606888+02:00", "EventTime": "2023-10-30T14:03:28.606908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["CVTp2zeuYamP7E7y8"]} -{"Format": "IDEA0", "ID": "3aa14f76-660f-4336-86a0-e5c535edea9f", "DetectTime": "2023-10-30T14:03:28.644733+02:00", "EventTime": "2023-10-30T14:03:28.644752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. ", "ContentType": "text/plain"}], "uids": ["CXLf224Rpe7kulMi1e"]} -{"Format": "Json", "ID": "3aa14f76-660f-4336-86a0-e5c535edea9f", "DetectTime": "2023-10-30T14:03:28.644733+02:00", "EventTime": "2023-10-30T14:03:28.644752+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21795], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:54:29.100036+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:28.720174)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e24687a4-5c7d-43be-bdb7-63add91e9c97", "DetectTime": "2023-10-30T14:03:28.726281+02:00", "EventTime": "2023-10-30T14:03:28.726309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CsWoO236YPBvKfojj9"]} -{"Format": "IDEA0", "ID": "766a0eff-9ad3-4936-a6ee-280b5040037b", "DetectTime": "2023-10-30T14:03:28.767276+02:00", "EventTime": "2023-10-30T14:03:28.767294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["C5EZTw2V2PfpTzxtw9"]} -{"Format": "IDEA0", "ID": "99cbf3fa-817b-4296-955d-3510a692996f", "DetectTime": "2023-10-30T14:03:28.797378+02:00", "EventTime": "2023-10-30T14:03:28.797390+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CL8Joc3J3NtDrAKeFi"]} -{"Format": "IDEA0", "ID": "da555425-fdf1-44d9-8c41-f9089e09abf9", "DetectTime": "2023-10-30T14:03:28.810416+02:00", "EventTime": "2023-10-30T14:03:28.810427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CFC3CG2wOSJ9MVaZI8"]} -{"Format": "IDEA0", "ID": "3d991372-5dfb-43a4-ad4e-3df7e9c8b4c7", "DetectTime": "2023-10-30T14:03:28.842604+02:00", "EventTime": "2023-10-30T14:03:28.842617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cbcf3C1rLg6vEaFiok"]} -{"Format": "IDEA0", "ID": "870b4fb0-3655-48aa-b303-c923597cd886", "DetectTime": "2023-10-30T14:03:28.875886+02:00", "EventTime": "2023-10-30T14:03:28.875901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27404], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. ", "ContentType": "text/plain"}], "uids": ["ClihJY2wjjtVG9YOXh"]} -{"Format": "IDEA0", "ID": "6c194909-d7e3-4e75-9cc5-ed6919d07299", "DetectTime": "2023-10-30T14:03:28.909972+02:00", "EventTime": "2023-10-30T14:03:28.909996+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cdm6st3FoyBOfF9iJl"]} -{"Format": "IDEA0", "ID": "a4e822d2-c375-4cef-a243-cb36299dd809", "DetectTime": "2023-10-30T14:03:28.922641+02:00", "EventTime": "2023-10-30T14:03:28.922658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19526], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19526/UDP destination IP 122.170.10.62. ", "ContentType": "text/plain"}], "uids": ["CBtu1sjYjBhIA92v4"]} -{"Format": "IDEA0", "ID": "35204c9f-ca0a-4f52-b4cc-3b0ed656c38c", "DetectTime": "2023-10-30T14:03:28.959538+02:00", "EventTime": "2023-10-30T14:03:28.959560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["CSjYAG4HsP2oHV2k8h"]} -{"Format": "IDEA0", "ID": "2e17a120-2684-4fb1-9f85-b1273464cc57", "DetectTime": "2023-10-30T14:03:28.996421+02:00", "EventTime": "2023-10-30T14:03:28.996436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CL8Joc3J3NtDrAKeFi", "CkGpA61hjNU5DMaxPi", "Cq6u6q1SEyZd92irzk", "CUrZAk2H5cGOOSipKb"]} -{"Format": "IDEA0", "ID": "75e063bb-cdcb-4ca5-91d7-de73a51f7dad", "DetectTime": "2023-10-30T14:03:29.008871+02:00", "EventTime": "2023-10-30T14:03:29.008889+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUrZAk2H5cGOOSipKb"]} -{"Format": "IDEA0", "ID": "85440eb4-0229-43d7-8393-363a38f7e75f", "DetectTime": "2023-10-30T14:03:29.021875+02:00", "EventTime": "2023-10-30T14:03:29.021900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["C4njxv4afiVR5AJam9"]} -{"Format": "Json", "ID": "85440eb4-0229-43d7-8393-363a38f7e75f", "DetectTime": "2023-10-30T14:03:29.021875+02:00", "EventTime": "2023-10-30T14:03:29.021900+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:54:48.409271+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:29.085786)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "10150579-1175-4d40-b3cd-0a668071f4b6", "DetectTime": "2023-10-30T14:03:29.091592+02:00", "EventTime": "2023-10-30T14:03:29.091619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. ", "ContentType": "text/plain"}], "uids": ["CN72YR3ZgUMpAQNyEd"]} -{"Format": "IDEA0", "ID": "ab1eb9aa-94ad-42e4-b61f-029844d80f15", "DetectTime": "2023-10-30T14:03:29.124817+02:00", "EventTime": "2023-10-30T14:03:29.124832+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZYOac1SXdTrBQxlMg"]} -{"Format": "IDEA0", "ID": "67539498-7a9d-4958-8dd2-2a05c33f1331", "DetectTime": "2023-10-30T14:03:29.138019+02:00", "EventTime": "2023-10-30T14:03:29.138041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. ", "ContentType": "text/plain"}], "uids": ["CLd2oR13orAsaesP0d"]} -{"Format": "IDEA0", "ID": "c0e0d5f3-7ba7-4af3-a831-f147d14a416f", "DetectTime": "2023-10-30T14:03:29.170633+02:00", "EventTime": "2023-10-30T14:03:29.170653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7534], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. ", "ContentType": "text/plain"}], "uids": ["C9Nvz52PFAOyfkOBc"]} -{"Format": "IDEA0", "ID": "85f3d49b-d907-4fcb-9763-8d07546e3c2f", "DetectTime": "2023-10-30T14:03:29.200445+02:00", "EventTime": "2023-10-30T14:03:29.200467+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9wuf340aZxKSQxMWi"]} -{"Format": "IDEA0", "ID": "b06f7910-2607-4a14-80a1-2e2684527540", "DetectTime": "2023-10-30T14:03:29.214313+02:00", "EventTime": "2023-10-30T14:03:29.214336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CxEtGK1D37en8mfRb7"]} -{"Format": "IDEA0", "ID": "1762db6c-5c14-4010-ae9a-673c85c00412", "DetectTime": "2023-10-30T14:03:29.246053+02:00", "EventTime": "2023-10-30T14:03:29.246079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["ChV7ng47QIgZxCaXP7"]} -{"Format": "IDEA0", "ID": "43d4fe84-1ab1-4007-aa35-74a553633710", "DetectTime": "2023-10-30T14:03:29.280649+02:00", "EventTime": "2023-10-30T14:03:29.280670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C6J7df23O6U49xcm5"]} -{"Format": "IDEA0", "ID": "8d8b6562-3507-4fbf-a466-d5376aed8e3e", "DetectTime": "2023-10-30T14:03:29.310844+02:00", "EventTime": "2023-10-30T14:03:29.310856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10452], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. ", "ContentType": "text/plain"}], "uids": ["Csjf9z2W2ObkYaDM9l"]} -{"Format": "IDEA0", "ID": "4e904a6d-7f57-401a-a2c6-67ddb4286b86", "DetectTime": "2023-10-30T14:03:29.346634+02:00", "EventTime": "2023-10-30T14:03:29.346654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. ", "ContentType": "text/plain"}], "uids": ["CtHfdryTb8f9xwUXf"]} -{"Format": "Json", "ID": "4e904a6d-7f57-401a-a2c6-67ddb4286b86", "DetectTime": "2023-10-30T14:03:29.346634+02:00", "EventTime": "2023-10-30T14:03:29.346654+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12232], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T14:54:50.333218+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2023/10/30 14:03:29.415217)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "14cd5b78-67df-4f52-b4d3-9322ff66490d", "DetectTime": "2023-10-30T14:03:29.420785+02:00", "EventTime": "2023-10-30T14:03:29.420802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["Co0mOg3ZlpRoW6kWF1"]} -{"Format": "IDEA0", "ID": "8958a691-a8cf-45e7-bdf2-8e71e9ca9a37", "DetectTime": "2023-10-30T14:03:29.488000+02:00", "EventTime": "2023-10-30T14:03:29.488018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15206], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. ", "ContentType": "text/plain"}], "uids": ["CkYw492KsaHks0vNq7"]} -{"Format": "IDEA0", "ID": "048888a6-c7ec-4506-9dcc-dfaf556da70a", "DetectTime": "2023-10-30T14:03:29.540751+02:00", "EventTime": "2023-10-30T14:03:29.540768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CuHNbD1CIRh4KpBWKc"]} -{"Format": "IDEA0", "ID": "70c9b699-38dc-46ae-a573-bf9c2a604c1c", "DetectTime": "2023-10-30T14:03:29.607272+02:00", "EventTime": "2023-10-30T14:03:29.607289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CgzkOl4hgLp1pg3047"]} -{"Format": "IDEA0", "ID": "a6694ac4-8b25-42f7-ae89-58d6df695441", "DetectTime": "2023-10-30T14:03:29.670828+02:00", "EventTime": "2023-10-30T14:03:29.670849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CyE0ak3hdm3UjjHAf6"]} -{"Format": "IDEA0", "ID": "cdff191f-38bf-4a43-984f-b92d41cdfd6d", "DetectTime": "2023-10-30T14:03:29.726882+02:00", "EventTime": "2023-10-30T14:03:29.726905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CR83K13MyUY03kjmfd"]} -{"Format": "Json", "ID": "cdff191f-38bf-4a43-984f-b92d41cdfd6d", "DetectTime": "2023-10-30T14:03:29.726882+02:00", "EventTime": "2023-10-30T14:03:29.726905+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:25:42.978934+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:29.857823)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c00b4228-8f26-4c1c-b79e-ead1b06d9d39", "DetectTime": "2023-10-30T14:03:29.863828+02:00", "EventTime": "2023-10-30T14:03:29.863848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["C4tbt92YnjYO9GmqCc"]} -{"Format": "IDEA0", "ID": "43d52e00-9b96-4843-85e3-fbd5ce4af7f3", "DetectTime": "2023-10-30T14:03:29.923344+02:00", "EventTime": "2023-10-30T14:03:29.923366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CE9oPF4G2QzdBksSYf"]} -{"Format": "IDEA0", "ID": "04ab2a17-3fb6-41eb-b66d-f605bcc02ca3", "DetectTime": "2023-10-30T14:03:29.979556+02:00", "EventTime": "2023-10-30T14:03:29.979569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["C2Pl42gfK8JFFknll"]} -{"Format": "IDEA0", "ID": "3e920f70-8a03-408d-8b41-e6c482f4636d", "DetectTime": "2023-10-30T14:03:30.038879+02:00", "EventTime": "2023-10-30T14:03:30.038897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["C4xRuk4aKOpV9VzTol"]} -{"Format": "IDEA0", "ID": "5690a490-d6a7-4753-a4ff-db419816654b", "DetectTime": "2023-10-30T14:03:30.064706+02:00", "EventTime": "2023-10-30T14:03:30.064723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. ", "ContentType": "text/plain"}], "uids": ["CrZfW86uVr5xpdose"]} -{"Format": "IDEA0", "ID": "d8b6fa74-3dd8-4d0d-b971-8a853a4d8613", "DetectTime": "2023-10-30T14:03:30.119866+02:00", "EventTime": "2023-10-30T14:03:30.119884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CmL9BV12BSNnD1jkl"]} -{"Format": "IDEA0", "ID": "a74aad83-0195-4074-82a0-4fb394e93331", "DetectTime": "2023-10-30T14:03:30.183362+02:00", "EventTime": "2023-10-30T14:03:30.183381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["ChcmOV2bf4roxMmwP8"]} -{"Format": "IDEA0", "ID": "24d7ecf2-f7ef-4492-b399-6548a9bdc658", "DetectTime": "2023-10-30T14:03:30.238563+02:00", "EventTime": "2023-10-30T14:03:30.238580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. ", "ContentType": "text/plain"}], "uids": ["CW53fx26e0l1XuyRc4"]} -{"Format": "IDEA0", "ID": "beea3d23-622c-44f6-b7e3-15a5ba20d6d4", "DetectTime": "2023-10-30T14:03:30.293759+02:00", "EventTime": "2023-10-30T14:03:30.293786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CWxDfK2eXrFpLnBVe4"]} -{"Format": "Json", "ID": "beea3d23-622c-44f6-b7e3-15a5ba20d6d4", "DetectTime": "2023-10-30T14:03:30.293759+02:00", "EventTime": "2023-10-30T14:03:30.293786+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:25:43.848395+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:30.388752)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c87381df-b2a3-4319-866d-40f582fe2a44", "DetectTime": "2023-10-30T14:03:30.395305+02:00", "EventTime": "2023-10-30T14:03:30.395326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CV46e72cAd9ef4v99b"]} -{"Format": "IDEA0", "ID": "964ef840-b24b-434e-b20c-8d529e0c76f9", "DetectTime": "2023-10-30T14:03:30.450961+02:00", "EventTime": "2023-10-30T14:03:30.450984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["CaaGG31sLg3XYU2xud"]} -{"Format": "IDEA0", "ID": "57b2b27a-ea52-4f34-975b-5405a11e0dc7", "DetectTime": "2023-10-30T14:03:30.507438+02:00", "EventTime": "2023-10-30T14:03:30.507457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CTkJ9o1MBXTtUZMqk2"]} -{"Format": "IDEA0", "ID": "e89132da-6f9b-4eb0-a68e-460aa4104f1d", "DetectTime": "2023-10-30T14:03:30.562955+02:00", "EventTime": "2023-10-30T14:03:30.562976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CTI5wl2jyJI8c23hve"]} -{"Format": "IDEA0", "ID": "e627927c-30a3-449e-bbcc-8dbf9b4a0caa", "DetectTime": "2023-10-30T14:03:30.617355+02:00", "EventTime": "2023-10-30T14:03:30.617370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CdVuD64LMTWwqFrJLc"]} -{"Format": "IDEA0", "ID": "ab8914ed-3803-48ba-ba95-1c3ec6618dff", "DetectTime": "2023-10-30T14:03:30.673652+02:00", "EventTime": "2023-10-30T14:03:30.673679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Ct8iWN2mVE7JBoSKW1"]} -{"Format": "IDEA0", "ID": "fa482d6d-b887-4fab-bb35-447517322179", "DetectTime": "2023-10-30T14:03:30.728653+02:00", "EventTime": "2023-10-30T14:03:30.728671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXI0V81jVDc6ARKrD4"]} -{"Format": "IDEA0", "ID": "23e1459f-bf9e-4bce-b529-d997cda1c190", "DetectTime": "2023-10-30T14:03:30.743043+02:00", "EventTime": "2023-10-30T14:03:30.743062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27376], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. ", "ContentType": "text/plain"}], "uids": ["CSHwdZpn4djAtYDr6"]} -{"Format": "IDEA0", "ID": "ec72e7ac-d2b7-47cc-b14d-966c841be6fd", "DetectTime": "2023-10-30T14:03:30.797353+02:00", "EventTime": "2023-10-30T14:03:30.797368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CajjREaXYSQ0Q4Hb2"]} -{"Format": "Json", "ID": "ec72e7ac-d2b7-47cc-b14d-966c841be6fd", "DetectTime": "2023-10-30T14:03:30.797353+02:00", "EventTime": "2023-10-30T14:03:30.797368+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:25:44.418226+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:30.892139)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "038102f9-48fa-460e-bcdd-3c010055790c", "DetectTime": "2023-10-30T14:03:30.898033+02:00", "EventTime": "2023-10-30T14:03:30.898051+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cord6Y3JQceJGeXio4"]} -{"Format": "IDEA0", "ID": "fe115ff7-c652-4bcd-b28b-884884f9b5a3", "DetectTime": "2023-10-30T14:03:30.912758+02:00", "EventTime": "2023-10-30T14:03:30.912781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CEBwqv33BH44YVOd58"]} -{"Format": "IDEA0", "ID": "17e40269-4aa3-4d28-846d-56eaf11b14e9", "DetectTime": "2023-10-30T14:03:30.964525+02:00", "EventTime": "2023-10-30T14:03:30.964554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7588], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. ", "ContentType": "text/plain"}], "uids": ["CDsSybla7jqDkjdyi"]} -{"Format": "IDEA0", "ID": "5cab589b-8873-4df2-90e4-a2ec3a84f7f3", "DetectTime": "2023-10-30T14:03:31.022446+02:00", "EventTime": "2023-10-30T14:03:31.022466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. ", "ContentType": "text/plain"}], "uids": ["ClXQP23dgHdjqqjg6a"]} -{"Format": "IDEA0", "ID": "e95c8a31-ea64-4b96-970d-ceacb9759cd4", "DetectTime": "2023-10-30T14:03:31.077831+02:00", "EventTime": "2023-10-30T14:03:31.077846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["Cp1YE544iDZ8Lj5613"]} -{"Format": "IDEA0", "ID": "8b2ce6e1-a82a-4bff-a6f2-263953d68374", "DetectTime": "2023-10-30T14:03:31.127213+02:00", "EventTime": "2023-10-30T14:03:31.127225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CcfJ2y1SYw8ZLAuIHc"]} -{"Format": "IDEA0", "ID": "4282d796-429c-479c-9397-30b9107387d4", "DetectTime": "2023-10-30T14:03:31.182439+02:00", "EventTime": "2023-10-30T14:03:31.182459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. ", "ContentType": "text/plain"}], "uids": ["CLDtuZ3AmiXlocOR7"]} -{"Format": "IDEA0", "ID": "5015e8eb-f779-4098-b75d-e73b2720b92b", "DetectTime": "2023-10-30T14:03:31.232963+02:00", "EventTime": "2023-10-30T14:03:31.232981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18343], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. ", "ContentType": "text/plain"}], "uids": ["Cdq6IU1LHiGUhmgFHh"]} -{"Format": "IDEA0", "ID": "5fb136ca-3e9e-4cf5-b6ad-c4180365200b", "DetectTime": "2023-10-30T14:03:31.285154+02:00", "EventTime": "2023-10-30T14:03:31.285180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CyXHH81H9O1leO6zrl"]} -{"Format": "Json", "ID": "5fb136ca-3e9e-4cf5-b6ad-c4180365200b", "DetectTime": "2023-10-30T14:03:31.285154+02:00", "EventTime": "2023-10-30T14:03:31.285180+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:26:03.754807+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:31.366977)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7387047e-6b98-4bff-96b4-67e6ea373eab", "DetectTime": "2023-10-30T14:03:31.373194+02:00", "EventTime": "2023-10-30T14:03:31.373214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CxCoio3bqWsbVprr4a"]} -{"Format": "IDEA0", "ID": "bc6d9883-5040-478d-972f-8b687c5dddbb", "DetectTime": "2023-10-30T14:03:31.426745+02:00", "EventTime": "2023-10-30T14:03:31.426762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CSbaVO2UTXHCiKYXa3"]} -{"Format": "IDEA0", "ID": "646b868e-27bb-4281-bcb3-99f3c8c9c60d", "DetectTime": "2023-10-30T14:03:31.481317+02:00", "EventTime": "2023-10-30T14:03:31.481338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["CgidqK2f3RTq8MEEvd"]} -{"Format": "IDEA0", "ID": "085f5f9a-e21a-4e9d-9124-e63d5e77cff1", "DetectTime": "2023-10-30T14:03:31.535294+02:00", "EventTime": "2023-10-30T14:03:31.535317+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYzSh83ObSl9j7Pow6"]} -{"Format": "IDEA0", "ID": "3b26a029-8dc2-4e23-92ce-617e13b9e0c6", "DetectTime": "2023-10-30T14:03:31.548505+02:00", "EventTime": "2023-10-30T14:03:31.548524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CuBjxc455vR9xCDdY1"]} -{"Format": "IDEA0", "ID": "c2ab794b-92d4-497e-8324-c6d063eeb39d", "DetectTime": "2023-10-30T14:03:31.603719+02:00", "EventTime": "2023-10-30T14:03:31.603736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27404], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. ", "ContentType": "text/plain"}], "uids": ["CYFfOP3RQf09otITvc"]} -{"Format": "IDEA0", "ID": "62eeedbc-6c41-4717-9741-5bd3d960338f", "DetectTime": "2023-10-30T14:03:31.656784+02:00", "EventTime": "2023-10-30T14:03:31.656803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["Ci6qlMaYy8XEibaIc"]} -{"Format": "IDEA0", "ID": "5a4ef20b-13ea-400f-ae1e-a83a23fdf77a", "DetectTime": "2023-10-30T14:03:31.706013+02:00", "EventTime": "2023-10-30T14:03:31.706029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["C6EsW92CMWBMGLJxh4"]} -{"Format": "IDEA0", "ID": "72e39bf5-2a4f-4af1-b4c3-f445b9a871f1", "DetectTime": "2023-10-30T14:03:31.753690+02:00", "EventTime": "2023-10-30T14:03:31.753711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7534], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. ", "ContentType": "text/plain"}], "uids": ["CHwcF93PN4RxfPVpL2"]} -{"Format": "Json", "ID": "72e39bf5-2a4f-4af1-b4c3-f445b9a871f1", "DetectTime": "2023-10-30T14:03:31.753690+02:00", "EventTime": "2023-10-30T14:03:31.753711+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7534], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:26:23.291530+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:31.829500)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3997ad25-97a4-4e60-87b2-09d60a9731b7", "DetectTime": "2023-10-30T14:03:31.835564+02:00", "EventTime": "2023-10-30T14:03:31.835583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CVO0z73pvskKb1tQQi"]} -{"Format": "IDEA0", "ID": "4c61484c-26b6-4d58-a809-1b5edf631351", "DetectTime": "2023-10-30T14:03:31.894153+02:00", "EventTime": "2023-10-30T14:03:31.894172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["CtqMqc2mxcLPtXF2N4"]} -{"Format": "IDEA0", "ID": "4dae4a24-f663-4293-b499-dbb86430d4cb", "DetectTime": "2023-10-30T14:03:31.950153+02:00", "EventTime": "2023-10-30T14:03:31.950175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. ", "ContentType": "text/plain"}], "uids": ["CIbr9E2pcTAtCtzZB9"]} -{"Format": "IDEA0", "ID": "c5dfd395-3067-43c2-801c-66e641cb98fc", "DetectTime": "2023-10-30T14:03:32.004444+02:00", "EventTime": "2023-10-30T14:03:32.004461+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cm7M1kp1spJ7UtzG2"]} -{"Format": "IDEA0", "ID": "ebb6de59-ff30-4907-a2fd-344fff38e07f", "DetectTime": "2023-10-30T14:03:32.018247+02:00", "EventTime": "2023-10-30T14:03:32.018269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15876], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. ", "ContentType": "text/plain"}], "uids": ["CHgN1e3LMyc88rsY4j"]} -{"Format": "IDEA0", "ID": "4a70c92a-3631-4c30-8945-bf9e7c6e79c9", "DetectTime": "2023-10-30T14:03:32.064468+02:00", "EventTime": "2023-10-30T14:03:32.064486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. ", "ContentType": "text/plain"}], "uids": ["CvSV4koMuH250ULXl"]} -{"Format": "IDEA0", "ID": "28356e23-546e-49b7-8708-e9253d0d4fbf", "DetectTime": "2023-10-30T14:03:32.114091+02:00", "EventTime": "2023-10-30T14:03:32.114108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzRxCp4qIaWFFdLNX"]} -{"Format": "IDEA0", "ID": "8a37841b-de3f-4128-8114-91f724e7575d", "DetectTime": "2023-10-30T14:03:32.128190+02:00", "EventTime": "2023-10-30T14:03:32.128210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CKCQ0Z12jxB1kg2Nla"]} -{"Format": "IDEA0", "ID": "7531c7dc-89a2-4576-b4f8-c9212275f7d9", "DetectTime": "2023-10-30T14:03:32.174799+02:00", "EventTime": "2023-10-30T14:03:32.174818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10452], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. ", "ContentType": "text/plain"}], "uids": ["C6kOp52WssnCCKyVd1"]} -{"Format": "IDEA0", "ID": "097711a8-81a6-42a3-a77b-7132dc515dd2", "DetectTime": "2023-10-30T14:03:32.224176+02:00", "EventTime": "2023-10-30T14:03:32.224194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9wuf340aZxKSQxMWi", "Cord6Y3JQceJGeXio4", "Cm7M1kp1spJ7UtzG2", "CSO6u61jipcGG3XS8j"]} -{"Format": "IDEA0", "ID": "84bb74f2-4b58-4a93-9ec5-6945a643069e", "DetectTime": "2023-10-30T14:03:32.236823+02:00", "EventTime": "2023-10-30T14:03:32.236843+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSO6u61jipcGG3XS8j"]} -{"Format": "IDEA0", "ID": "0f36272c-aa27-4210-838e-a62b5652de15", "DetectTime": "2023-10-30T14:03:32.249875+02:00", "EventTime": "2023-10-30T14:03:32.249891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C9OAYu0WS5cjJiIzl"]} -{"Format": "Json", "ID": "0f36272c-aa27-4210-838e-a62b5652de15", "DetectTime": "2023-10-30T14:03:32.249875+02:00", "EventTime": "2023-10-30T14:03:32.249891+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-03T15:36:03.570465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:32.330843)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2d5aa765-528c-40e3-ac66-691ea8b4f09d", "DetectTime": "2023-10-30T14:03:32.336294+02:00", "EventTime": "2023-10-30T14:03:32.336313+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0lYe12oSOuiOTXATe"]} -{"Format": "IDEA0", "ID": "3481993a-81d9-4d93-8ddd-797f3fb4eeb1", "DetectTime": "2023-10-30T14:03:32.351512+02:00", "EventTime": "2023-10-30T14:03:32.351537+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfHHy02j4N55Ugzz1i"]} -{"Format": "IDEA0", "ID": "6e65ac1e-a9db-4255-a413-321eded93eaa", "DetectTime": "2023-10-30T14:03:32.367366+02:00", "EventTime": "2023-10-30T14:03:32.367390+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C60tFJ3rPMEvxKbK72"]} -{"Format": "IDEA0", "ID": "3108de6d-8de1-4c14-9702-77f6aa504abb", "DetectTime": "2023-10-30T14:03:32.380999+02:00", "EventTime": "2023-10-30T14:03:32.381017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEfyoyOs7qsOffBdb"]} -{"Format": "IDEA0", "ID": "58c792de-5672-41f3-8a13-1cba3afa8c20", "DetectTime": "2023-10-30T14:03:32.425870+02:00", "EventTime": "2023-10-30T14:03:32.425888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CMKB1cYiPOJxsiNm2"]} -{"Format": "IDEA0", "ID": "3d8a34cb-4058-4fed-b435-722cb152c6cc", "DetectTime": "2023-10-30T14:03:32.471280+02:00", "EventTime": "2023-10-30T14:03:32.471300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CL5lmN1ainsEqksTGb"]} -{"Format": "IDEA0", "ID": "cc6da475-9123-4e59-b355-6367bb86dc14", "DetectTime": "2023-10-30T14:03:32.515691+02:00", "EventTime": "2023-10-30T14:03:32.515711+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZZin74tvMzJB4Odpf"]} -{"Format": "IDEA0", "ID": "cf346ace-eb12-433c-9910-2601b71dbb46", "DetectTime": "2023-10-30T14:03:32.530012+02:00", "EventTime": "2023-10-30T14:03:32.530028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15206], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. ", "ContentType": "text/plain"}], "uids": ["CH9seVs8w2IVUlezh"]} -{"Format": "IDEA0", "ID": "69531ebc-5afe-4ba1-b100-e42e34346a98", "DetectTime": "2023-10-30T14:03:32.573570+02:00", "EventTime": "2023-10-30T14:03:32.573590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CFaD5U3IZGybKHAkIl"]} -{"Format": "IDEA0", "ID": "e32ad4ff-5e58-421a-a287-cf6fbb56e7a3", "DetectTime": "2023-10-30T14:03:32.622005+02:00", "EventTime": "2023-10-30T14:03:32.622024+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJ0CYG38UzEy30xrRh"]} -{"Format": "IDEA0", "ID": "3a0e022e-ea02-4ed2-955c-68da84cfabf5", "DetectTime": "2023-10-30T14:03:32.635340+02:00", "EventTime": "2023-10-30T14:03:32.635359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["Csza8u3BHaVJ2Okm"]} -{"Format": "IDEA0", "ID": "df6f676b-994c-43f4-a612-14f71dd62b8d", "DetectTime": "2023-10-30T14:03:32.679364+02:00", "EventTime": "2023-10-30T14:03:32.679385+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CILNGP1OkqLdKaUM7g"]} -{"Format": "IDEA0", "ID": "e10dae5a-3e51-4306-bf97-7b5751805c1e", "DetectTime": "2023-10-30T14:03:32.694350+02:00", "EventTime": "2023-10-30T14:03:32.694366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["C9yf2h1EXBZlclJZc"]} -{"Format": "IDEA0", "ID": "df5aa860-3892-4788-a757-6bc2732d720c", "DetectTime": "2023-10-30T14:03:32.745084+02:00", "EventTime": "2023-10-30T14:03:32.745101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CimSop1Tl7VAtoPhwi"]} -{"Format": "Json", "ID": "df5aa860-3892-4788-a757-6bc2732d720c", "DetectTime": "2023-10-30T14:03:32.745084+02:00", "EventTime": "2023-10-30T14:03:32.745101+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:57:35.125478+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:32.822264)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "846daefa-92e0-4de9-8495-b67c5f89899f", "DetectTime": "2023-10-30T14:03:32.827634+02:00", "EventTime": "2023-10-30T14:03:32.827651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CE6ItU2CYGyb5RP5E5"]} -{"Format": "IDEA0", "ID": "43b341c6-c168-4b4f-876c-f02d311ce725", "DetectTime": "2023-10-30T14:03:32.868538+02:00", "EventTime": "2023-10-30T14:03:32.868562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["Cg0TNXkZaJ0KcaRgg"]} -{"Format": "IDEA0", "ID": "b2ffed3f-bd10-4cbd-adcf-a183308a2a7f", "DetectTime": "2023-10-30T14:03:32.909388+02:00", "EventTime": "2023-10-30T14:03:32.909400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["Cl6vgLT7KSHQpHOJ5"]} -{"Format": "IDEA0", "ID": "ce5dd82d-9318-455f-9a62-370daf80e05c", "DetectTime": "2023-10-30T14:03:32.949678+02:00", "EventTime": "2023-10-30T14:03:32.949696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CrckL9dSx9iS5P3l"]} -{"Format": "IDEA0", "ID": "0d1e46ad-4462-40ea-ab66-89e2d9a2473b", "DetectTime": "2023-10-30T14:03:32.989365+02:00", "EventTime": "2023-10-30T14:03:32.989377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CCFCbA3GxNwqSGL382"]} -{"Format": "IDEA0", "ID": "54f2b479-5113-40f2-b1cc-faafc0ae1408", "DetectTime": "2023-10-30T14:03:33.015018+02:00", "EventTime": "2023-10-30T14:03:33.015036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CLse2r13d0WHYNTRCd"]} -{"Format": "IDEA0", "ID": "771f207b-5f7b-451b-8010-1f6f18a72f6a", "DetectTime": "2023-10-30T14:03:33.055390+02:00", "EventTime": "2023-10-30T14:03:33.055410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CJbXWr424Cc6IEw2Ca"]} -{"Format": "IDEA0", "ID": "53d99106-f42e-48f0-bea9-dece02bd4fde", "DetectTime": "2023-10-30T14:03:33.097709+02:00", "EventTime": "2023-10-30T14:03:33.097728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CnKCkr1K2ZxALjzBL1"]} -{"Format": "IDEA0", "ID": "26b55631-b720-40a5-992b-464ca8148f16", "DetectTime": "2023-10-30T14:03:33.137879+02:00", "EventTime": "2023-10-30T14:03:33.137896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cdg1kK1xcn8gQteEmd"]} -{"Format": "Json", "ID": "26b55631-b720-40a5-992b-464ca8148f16", "DetectTime": "2023-10-30T14:03:33.137879+02:00", "EventTime": "2023-10-30T14:03:33.137896+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:57:50.937047+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:33.211998)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f25bca1-8f05-4bb1-8f6f-54f26db437d4", "DetectTime": "2023-10-30T14:03:33.217414+02:00", "EventTime": "2023-10-30T14:03:33.217431+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7oM3caZTLl5ioAah"]} -{"Format": "IDEA0", "ID": "809aaf66-c21b-44b1-8367-9de66c90fd46", "DetectTime": "2023-10-30T14:03:33.231450+02:00", "EventTime": "2023-10-30T14:03:33.231468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7588], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. ", "ContentType": "text/plain"}], "uids": ["CHWws7qwzcE603DJi"]} -{"Format": "IDEA0", "ID": "7c6b7f1a-8f96-4a62-b10e-7c894c1aa981", "DetectTime": "2023-10-30T14:03:33.276654+02:00", "EventTime": "2023-10-30T14:03:33.276673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. ", "ContentType": "text/plain"}], "uids": ["Cc0ndV1ClEDtgs0v3c"]} -{"Format": "IDEA0", "ID": "5f0e6b52-2177-496c-9f68-736dd13e38cf", "DetectTime": "2023-10-30T14:03:33.313990+02:00", "EventTime": "2023-10-30T14:03:33.314016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CSQ35e2mO3uz8gEKl9"]} -{"Format": "IDEA0", "ID": "2927b8db-453c-4a3e-97f2-ba2f7376e7ce", "DetectTime": "2023-10-30T14:03:33.349975+02:00", "EventTime": "2023-10-30T14:03:33.349992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["ChxSZv2ohDiEyb0nW5"]} -{"Format": "IDEA0", "ID": "b33d9a68-67ac-406f-90cc-2bd3e7302428", "DetectTime": "2023-10-30T14:03:33.386309+02:00", "EventTime": "2023-10-30T14:03:33.386326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21795], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. ", "ContentType": "text/plain"}], "uids": ["CSel8H1wcxmmozrtCi"]} -{"Format": "IDEA0", "ID": "de379d29-a404-4328-9b0e-2fc8587606d4", "DetectTime": "2023-10-30T14:03:33.421048+02:00", "EventTime": "2023-10-30T14:03:33.421155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CfHHy02j4N55Ugzz1i", "CafP9e6Q22t4nlnA2", "CILNGP1OkqLdKaUM7g", "CZZin74tvMzJB4Odpf"]} -{"Format": "IDEA0", "ID": "ab925d8f-1e6e-41ff-964e-7ad015282d3a", "DetectTime": "2023-10-30T14:03:33.434368+02:00", "EventTime": "2023-10-30T14:03:33.434394+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CafP9e6Q22t4nlnA2"]} -{"Format": "IDEA0", "ID": "edba0c2c-b46b-43d6-86f4-8152b7f5fab3", "DetectTime": "2023-10-30T14:03:33.447755+02:00", "EventTime": "2023-10-30T14:03:33.447780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["C3Hxne1LsNDdiJdFw8"]} -{"Format": "IDEA0", "ID": "71c8a8e7-945b-4aa4-a8d9-71afb0e19677", "DetectTime": "2023-10-30T14:03:33.490010+02:00", "EventTime": "2023-10-30T14:03:33.490030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CeERnS1HAc5QfLb9c2"]} -{"Format": "IDEA0", "ID": "950ea60c-43f9-4ebe-ba00-c14a0d45193b", "DetectTime": "2023-10-30T14:03:33.530456+02:00", "EventTime": "2023-10-30T14:03:33.530468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CZdhRgPn9pQ3cOUHk"]} -{"Format": "Json", "ID": "950ea60c-43f9-4ebe-ba00-c14a0d45193b", "DetectTime": "2023-10-30T14:03:33.530456+02:00", "EventTime": "2023-10-30T14:03:33.530468+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:58:25.357480+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:33.598519)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed76df36-e519-4eeb-bdfe-097c82f29e11", "DetectTime": "2023-10-30T14:03:33.604010+02:00", "EventTime": "2023-10-30T14:03:33.604029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18343], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. ", "ContentType": "text/plain"}], "uids": ["CJrnia2bFROgY8p1ki"]} -{"Format": "IDEA0", "ID": "2fe889c5-bff9-46ef-af0d-216e9cbedacc", "DetectTime": "2023-10-30T14:03:33.641955+02:00", "EventTime": "2023-10-30T14:03:33.641973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["C2rqrL2krdNDQujPbb"]} -{"Format": "IDEA0", "ID": "da60a363-deae-4f19-b466-79cd52424ac0", "DetectTime": "2023-10-30T14:03:33.675848+02:00", "EventTime": "2023-10-30T14:03:33.675867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C2qYuADAaYHeiXfz1"]} -{"Format": "IDEA0", "ID": "2f06cee4-8125-4507-972f-8dcb34a6c273", "DetectTime": "2023-10-30T14:03:33.713421+02:00", "EventTime": "2023-10-30T14:03:33.713438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["ChX0pLOfb6pVR9Eie"]} -{"Format": "IDEA0", "ID": "6f18a9ef-8d32-4f75-9764-d8a0a0cd44f3", "DetectTime": "2023-10-30T14:03:33.750825+02:00", "EventTime": "2023-10-30T14:03:33.750845+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjZ1iv1O0kTAUQEojd"]} -{"Format": "IDEA0", "ID": "10b3cfef-a2c9-4fea-aa8e-cea911cb1a8b", "DetectTime": "2023-10-30T14:03:33.764964+02:00", "EventTime": "2023-10-30T14:03:33.764980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CPkbJ91bKehxei9LH8"]} -{"Format": "IDEA0", "ID": "426e562d-09ea-4708-99fa-1559521b33d1", "DetectTime": "2023-10-30T14:03:33.806305+02:00", "EventTime": "2023-10-30T14:03:33.806322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27404], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. ", "ContentType": "text/plain"}], "uids": ["Cq2VsV1rk6kdMtSju6"]} -{"Format": "IDEA0", "ID": "20de5db7-2cd4-48ed-80ef-84e8bda84367", "DetectTime": "2023-10-30T14:03:33.842444+02:00", "EventTime": "2023-10-30T14:03:33.842458+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjXlWY2ZXGsGowW6Nc"]} -{"Format": "IDEA0", "ID": "11addf22-2656-470a-9386-ab2101faf175", "DetectTime": "2023-10-30T14:03:33.855545+02:00", "EventTime": "2023-10-30T14:03:33.855564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CwtqGk25tyvS2IEeI8"]} -{"Format": "IDEA0", "ID": "992f360a-a776-4657-8393-9ca0387e5040", "DetectTime": "2023-10-30T14:03:33.882389+02:00", "EventTime": "2023-10-30T14:03:33.882411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["CZ8R0j2gGrwTuHZte1"]} -{"Format": "IDEA0", "ID": "fc4bfb11-e7ac-4bc7-a14d-a09072e4f645", "DetectTime": "2023-10-30T14:03:33.916684+02:00", "EventTime": "2023-10-30T14:03:33.916705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["CVTka54cTSsHgS8UYg"]} -{"Format": "Json", "ID": "fc4bfb11-e7ac-4bc7-a14d-a09072e4f645", "DetectTime": "2023-10-30T14:03:33.916684+02:00", "EventTime": "2023-10-30T14:03:33.916705+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T15:58:26.913753+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2023/10/30 14:03:33.989441)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8734f875-9235-4d0e-a626-74036489475f", "DetectTime": "2023-10-30T14:03:33.995003+02:00", "EventTime": "2023-10-30T14:03:33.995023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7534], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. ", "ContentType": "text/plain"}], "uids": ["Coc5Fi4r8N7EQZ5zWa"]} -{"Format": "IDEA0", "ID": "3b50aaed-8272-49c2-8cce-e25840ae1e5f", "DetectTime": "2023-10-30T14:03:34.033577+02:00", "EventTime": "2023-10-30T14:03:34.033595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["ColmQThRdFybxGkY1"]} -{"Format": "IDEA0", "ID": "677c4f51-b7bc-4dc1-a995-202a4828fd26", "DetectTime": "2023-10-30T14:03:34.066167+02:00", "EventTime": "2023-10-30T14:03:34.066188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["CpFzmo12q1Sne4PBU6"]} -{"Format": "IDEA0", "ID": "eecc92d0-e75f-4597-9342-eb06ca5c9634", "DetectTime": "2023-10-30T14:03:34.098935+02:00", "EventTime": "2023-10-30T14:03:34.098956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. ", "ContentType": "text/plain"}], "uids": ["CVnhmU3OHKIauv5hv6"]} -{"Format": "IDEA0", "ID": "d9176e21-92c6-430d-a827-5d8af4143b5a", "DetectTime": "2023-10-30T14:03:34.132714+02:00", "EventTime": "2023-10-30T14:03:34.132735+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CVOlg33CYpOnulV5C7"]} -{"Format": "IDEA0", "ID": "af148045-ea4d-4dd7-abf6-0e0661b369f0", "DetectTime": "2023-10-30T14:03:34.148391+02:00", "EventTime": "2023-10-30T14:03:34.148417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12232], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. ", "ContentType": "text/plain"}], "uids": ["ChWC051s0RiApLO6pi"]} -{"Format": "IDEA0", "ID": "94d8b07d-321f-458c-9284-f390694ac522", "DetectTime": "2023-10-30T14:03:34.179445+02:00", "EventTime": "2023-10-30T14:03:34.179462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CF6dlH1qJ1YFVGBOi8"]} -{"Format": "IDEA0", "ID": "a8c6cfed-92a2-480e-b1f7-8930d54b49ab", "DetectTime": "2023-10-30T14:03:34.210681+02:00", "EventTime": "2023-10-30T14:03:34.210693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["Cq0XpNgZPOtwWwJBd"]} -{"Format": "IDEA0", "ID": "832a4129-4fde-4e93-9eaf-781ed0b8db7b", "DetectTime": "2023-10-30T14:03:34.241065+02:00", "EventTime": "2023-10-30T14:03:34.241083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CZPoNQ1FumjYgzDanb"]} -{"Format": "IDEA0", "ID": "fe8fb1d2-d8b9-4479-8bf7-e4aaa864e6c3", "DetectTime": "2023-10-30T14:03:34.274255+02:00", "EventTime": "2023-10-30T14:03:34.274268+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cz0vSV32pa7IrUHA4k"]} -{"Format": "IDEA0", "ID": "a730cec7-e023-4c5e-b668-338c7d416123", "DetectTime": "2023-10-30T14:03:34.283201+02:00", "EventTime": "2023-10-30T14:03:34.283219+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHjZOX3K4iguKloGHa"]} -{"Format": "IDEA0", "ID": "f0f8f25f-983f-451a-b1c0-b21904354cb8", "DetectTime": "2023-10-30T14:03:34.292880+02:00", "EventTime": "2023-10-30T14:03:34.292904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15206], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. ", "ContentType": "text/plain"}], "uids": ["CuH7ySFCE5Q4mS9v6"]} -{"Format": "IDEA0", "ID": "a91d4f7a-14d3-419d-9f6c-6485f934fcbd", "DetectTime": "2023-10-30T14:03:34.333963+02:00", "EventTime": "2023-10-30T14:03:34.333980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CaGSf43VrVCOjyCig8"]} -{"Format": "IDEA0", "ID": "afed219f-5e3a-404d-8ab5-b8d375237b0a", "DetectTime": "2023-10-30T14:03:34.370691+02:00", "EventTime": "2023-10-30T14:03:34.370712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CLkfWP3I9ZboHNOAbk"]} -{"Format": "IDEA0", "ID": "fd30358a-dfff-452f-9094-fb5ee97e71f8", "DetectTime": "2023-10-30T14:03:34.398023+02:00", "EventTime": "2023-10-30T14:03:34.398044+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CjdAiyGMKqC2m0PR5"]} -{"Format": "IDEA0", "ID": "ece66d7f-88fb-4a6b-b5c7-386f7a8614aa", "DetectTime": "2023-10-30T14:03:34.407838+02:00", "EventTime": "2023-10-30T14:03:34.407859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CI1aar4NbwKv8Z30Lf"]} -{"Format": "IDEA0", "ID": "26fd0ccf-077a-4926-9e12-c073e2bfd9ac", "DetectTime": "2023-10-30T14:03:34.448720+02:00", "EventTime": "2023-10-30T14:03:34.448772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CMsGLp26uqLi7dwgZc"]} -{"Format": "IDEA0", "ID": "ed449c18-6da6-4700-8e01-85529ab3a229", "DetectTime": "2023-10-30T14:03:34.487433+02:00", "EventTime": "2023-10-30T14:03:34.487452+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxAkd5326VUUKJhmJi"]} -{"Format": "IDEA0", "ID": "675494fb-fa0c-4460-9119-d342aecb4230", "DetectTime": "2023-10-30T14:03:34.497011+02:00", "EventTime": "2023-10-30T14:03:34.497027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CvxMoz2TA8tEbHz7o1"]} -{"Format": "Json", "ID": "675494fb-fa0c-4460-9119-d342aecb4230", "DetectTime": "2023-10-30T14:03:34.497011+02:00", "EventTime": "2023-10-30T14:03:34.497027+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T16:30:51.238363+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 63. (real time 2023/10/30 14:03:34.592694)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ac29e864-afef-4bab-9018-643bd34933ef", "DetectTime": "2023-10-30T14:03:34.598298+02:00", "EventTime": "2023-10-30T14:03:34.598312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["C65zRs3RIMGDcbjsz5"]} -{"Format": "IDEA0", "ID": "ab6d64b4-1af4-4e85-9d78-2457f41dfdf3", "DetectTime": "2023-10-30T14:03:34.626823+02:00", "EventTime": "2023-10-30T14:03:34.626845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cz0vSV32pa7IrUHA4k", "CjXlWY2ZXGsGowW6Nc", "CjdAiyGMKqC2m0PR5", "CyBuZ63QR2Pamo7tZ1"]} -{"Format": "IDEA0", "ID": "f3090901-ce4d-40d9-ab6f-b8d8d3862ec2", "DetectTime": "2023-10-30T14:03:34.636725+02:00", "EventTime": "2023-10-30T14:03:34.636746+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyBuZ63QR2Pamo7tZ1"]} -{"Format": "IDEA0", "ID": "d08eb6e1-f51c-438e-9599-dfc275c140db", "DetectTime": "2023-10-30T14:03:34.646906+02:00", "EventTime": "2023-10-30T14:03:34.646934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Cpd4PvOXsXhHkeo0k"]} -{"Format": "IDEA0", "ID": "931c38ce-8548-4975-8e60-e19fba73adac", "DetectTime": "2023-10-30T14:03:34.671620+02:00", "EventTime": "2023-10-30T14:03:34.671636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CUcQsmGOCEM3fB8v7"]} -{"Format": "IDEA0", "ID": "b957847f-12bf-4e2a-bd40-511841e30320", "DetectTime": "2023-10-30T14:03:34.702128+02:00", "EventTime": "2023-10-30T14:03:34.702142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["ChC6Y62uRAi8E7iFd5"]} -{"Format": "IDEA0", "ID": "91400e00-ebe6-4b4f-bb65-522ee8f88728", "DetectTime": "2023-10-30T14:03:34.728296+02:00", "EventTime": "2023-10-30T14:03:34.728313+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjpzVmXUeZOdQJMP3"]} -{"Format": "IDEA0", "ID": "9f42cce7-d88d-4520-8d18-77db24c9d582", "DetectTime": "2023-10-30T14:03:34.737545+02:00", "EventTime": "2023-10-30T14:03:34.737560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CTlg472cqZvtfq06de"]} -{"Format": "IDEA0", "ID": "8db0d7fb-6225-4e39-8ea2-8f16b4feb483", "DetectTime": "2023-10-30T14:03:34.763053+02:00", "EventTime": "2023-10-30T14:03:34.763069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["C1lg0r4HvIENSNMaqd"]} -{"Format": "IDEA0", "ID": "b0994c6a-f8ac-4fc3-ae05-fef4756b8c28", "DetectTime": "2023-10-30T14:03:34.787315+02:00", "EventTime": "2023-10-30T14:03:34.787327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CJK3iUWe2o1ahNZol"]} -{"Format": "IDEA0", "ID": "e8299a8a-0d3f-4970-819c-5efdcb15a65e", "DetectTime": "2023-10-30T14:03:34.810352+02:00", "EventTime": "2023-10-30T14:03:34.810371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["CeL1mF1A0OtimJUgLi"]} -{"Format": "IDEA0", "ID": "2b4c5eb5-99ed-44be-abed-3c9270e681d4", "DetectTime": "2023-10-30T14:03:34.832065+02:00", "EventTime": "2023-10-30T14:03:34.832083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CFNzEG1KKRCY0qcv0d"]} -{"Format": "IDEA0", "ID": "3d683ae8-4fce-4026-948e-f022086ec558", "DetectTime": "2023-10-30T14:03:34.856814+02:00", "EventTime": "2023-10-30T14:03:34.856826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CRdCUZJSecHfAB3X4"]} -{"Format": "IDEA0", "ID": "a208e908-150c-4897-bc1b-e61c2bb36e0f", "DetectTime": "2023-10-30T14:03:34.887710+02:00", "EventTime": "2023-10-30T14:03:34.887726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CV7sMX1l0jgRKipYZ7"]} -{"Format": "IDEA0", "ID": "c82f6c0c-1b49-4eb8-8125-c5441c4ebbae", "DetectTime": "2023-10-30T14:03:34.913303+02:00", "EventTime": "2023-10-30T14:03:34.913327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["Cg6x0B4XtIiLAheNbe"]} -{"Format": "IDEA0", "ID": "c2ff860c-e360-4236-9e77-47bcda666cc2", "DetectTime": "2023-10-30T14:03:34.938511+02:00", "EventTime": "2023-10-30T14:03:34.938531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["Cv4dXu3eybkLHEb084"]} -{"Format": "IDEA0", "ID": "d7eb56b6-8024-4a4a-b812-f9ed39612741", "DetectTime": "2023-10-30T14:03:34.965805+02:00", "EventTime": "2023-10-30T14:03:34.965825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["C7JHIALemt2D8i0K5"]} -{"Format": "IDEA0", "ID": "23acffff-82a7-43da-84ee-94f9f7d0b943", "DetectTime": "2023-10-30T14:03:34.992646+02:00", "EventTime": "2023-10-30T14:03:34.992666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CohP2U3cqchh1j045k"]} -{"Format": "IDEA0", "ID": "700a1b29-db7f-4248-8f1e-c7715abe1c63", "DetectTime": "2023-10-30T14:03:35.019551+02:00", "EventTime": "2023-10-30T14:03:35.019569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CglzZr2AjMaDibbYJh"]} -{"Format": "IDEA0", "ID": "cc3a5591-b5f3-4d88-bf27-cf99dce55567", "DetectTime": "2023-10-30T14:03:35.046050+02:00", "EventTime": "2023-10-30T14:03:35.046063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CFQ5j8WsOIwva3zi7"]} -{"Format": "IDEA0", "ID": "caf6f368-ba32-4b85-b5ab-d46f4964eb60", "DetectTime": "2023-10-30T14:03:35.072107+02:00", "EventTime": "2023-10-30T14:03:35.072126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CPyZC53m3nMbPQGf3"]} -{"Format": "IDEA0", "ID": "5aba69a3-174d-478a-9c17-ae6586568a69", "DetectTime": "2023-10-30T14:03:35.098575+02:00", "EventTime": "2023-10-30T14:03:35.098600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CdR00D3JeRufo51PRg"]} -{"Format": "IDEA0", "ID": "edbc403c-6175-4d9c-bdfc-efcca45345ee", "DetectTime": "2023-10-30T14:03:35.123338+02:00", "EventTime": "2023-10-30T14:03:35.123357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CaSVqwTgPeYhbfQE"]} -{"Format": "IDEA0", "ID": "fd983856-1bd4-4092-92b7-d42c0c4155a5", "DetectTime": "2023-10-30T14:03:35.151927+02:00", "EventTime": "2023-10-30T14:03:35.151952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CIsMFn4uWyG0px6CBc"]} -{"Format": "IDEA0", "ID": "23d39681-18db-4f60-8e59-b85ee6d2f1ed", "DetectTime": "2023-10-30T14:03:35.188546+02:00", "EventTime": "2023-10-30T14:03:35.188566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C7iUEc394Ahg1DriUi"]} -{"Format": "IDEA0", "ID": "30984821-e71e-4c39-8170-4678bbd87c55", "DetectTime": "2023-10-30T14:03:35.214181+02:00", "EventTime": "2023-10-30T14:03:35.214207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CUTqXq4dhCY2XC0hM1"]} -{"Format": "IDEA0", "ID": "a79fc64f-fee7-4fec-985e-b5ade5c723dd", "DetectTime": "2023-10-30T14:03:35.238748+02:00", "EventTime": "2023-10-30T14:03:35.238766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C2xzQYpq0J2xP8C9j"]} -{"Format": "IDEA0", "ID": "3d7b2905-afad-4acc-831f-92161f948383", "DetectTime": "2023-10-30T14:03:35.265276+02:00", "EventTime": "2023-10-30T14:03:35.265299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CYWdh24Lxs3yWznJDk"]} -{"Format": "IDEA0", "ID": "37a67b2b-aa1e-4bc7-96ca-1f87ab052142", "DetectTime": "2023-10-30T14:03:35.292343+02:00", "EventTime": "2023-10-30T14:03:35.292364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CGVDZR2oPRBW4MnkA7"]} -{"Format": "IDEA0", "ID": "08e8fc20-3516-4c35-b499-cd6303fef1ee", "DetectTime": "2023-10-30T14:03:35.317290+02:00", "EventTime": "2023-10-30T14:03:35.317308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C6bgL73Yfev2MYRZQg"]} -{"Format": "IDEA0", "ID": "60221e55-f46a-408a-9f61-1221490353de", "DetectTime": "2023-10-30T14:03:35.343719+02:00", "EventTime": "2023-10-30T14:03:35.343736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CEcBpa3uskGveQyG05"]} -{"Format": "IDEA0", "ID": "217fe7f8-5f44-4bc6-be0d-034b3c6ed0c1", "DetectTime": "2023-10-30T14:03:35.370887+02:00", "EventTime": "2023-10-30T14:03:35.370908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["C6A9nZ3IbTbUELgcne"]} -{"Format": "IDEA0", "ID": "14a14d44-4920-4105-ab2d-15a1c36d914a", "DetectTime": "2023-10-30T14:03:35.398469+02:00", "EventTime": "2023-10-30T14:03:35.398493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["C3aql01gZ4qSfljHRl"]} -{"Format": "IDEA0", "ID": "b624b2f4-f345-41ff-b38a-2bfe6555c01c", "DetectTime": "2023-10-30T14:03:35.424899+02:00", "EventTime": "2023-10-30T14:03:35.424923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C87ZBY1Ws9zWsrpgi2"]} -{"Format": "IDEA0", "ID": "33cf8c16-80b9-41e8-82a2-cec3cb090838", "DetectTime": "2023-10-30T14:03:35.450045+02:00", "EventTime": "2023-10-30T14:03:35.450067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C97Xtf1JXJAK5Jdvlc"]} -{"Format": "IDEA0", "ID": "f0ec5657-b250-492d-97a6-f1eda466e94f", "DetectTime": "2023-10-30T14:03:35.476179+02:00", "EventTime": "2023-10-30T14:03:35.476196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CPP0wl3O95D4KjG7Se"]} -{"Format": "IDEA0", "ID": "938948c7-9d69-466e-916a-9e365c841efe", "DetectTime": "2023-10-30T14:03:35.501825+02:00", "EventTime": "2023-10-30T14:03:35.501841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CdUkG41I0MiNjSkvvj"]} -{"Format": "IDEA0", "ID": "818458bc-e027-46eb-ae4a-89c7f176f893", "DetectTime": "2023-10-30T14:03:35.529660+02:00", "EventTime": "2023-10-30T14:03:35.529677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CzoBKt1ab6pu9rur41"]} -{"Format": "IDEA0", "ID": "59ee50d7-2619-4c68-a706-df021ce5984c", "DetectTime": "2023-10-30T14:03:35.554771+02:00", "EventTime": "2023-10-30T14:03:35.554799+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cb7OFm4wq7MG73KyTh"]} -{"Format": "IDEA0", "ID": "4a3ee52a-f068-400c-82af-97c2fe8ac0d3", "DetectTime": "2023-10-30T14:03:35.564026+02:00", "EventTime": "2023-10-30T14:03:35.564045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CDqqIaJCtNTgaZWhh"]} -{"Format": "IDEA0", "ID": "3c117bc3-b771-4849-b92e-9ab45bab6bb7", "DetectTime": "2023-10-30T14:03:35.595006+02:00", "EventTime": "2023-10-30T14:03:35.595031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["Ckjmfa1W4EtMjdINh4"]} -{"Format": "IDEA0", "ID": "c1dfdd3a-eaf1-46b9-a408-0196013365bd", "DetectTime": "2023-10-30T14:03:35.622097+02:00", "EventTime": "2023-10-30T14:03:35.622115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CIY5Erm6n53rGGEc3"]} -{"Format": "IDEA0", "ID": "5ecaeed2-d6db-4025-adbe-cd083928c154", "DetectTime": "2023-10-30T14:03:35.650140+02:00", "EventTime": "2023-10-30T14:03:35.650159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Cmp3sm4VZD7nOha5w3"]} -{"Format": "IDEA0", "ID": "b5bf589d-2bb6-4040-8c26-6d16d0459703", "DetectTime": "2023-10-30T14:03:35.676830+02:00", "EventTime": "2023-10-30T14:03:35.676849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CIbdihGoUC4tBET85"]} -{"Format": "IDEA0", "ID": "482029a0-e146-4bbd-beb8-ccd058c758d1", "DetectTime": "2023-10-30T14:03:35.704804+02:00", "EventTime": "2023-10-30T14:03:35.704830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["ClMDiV1zR6BxpVwkJ2"]} -{"Format": "IDEA0", "ID": "179dfcc3-1c79-49d2-a6ac-943b94057d2a", "DetectTime": "2023-10-30T14:03:35.731038+02:00", "EventTime": "2023-10-30T14:03:35.731058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CpIUaA1TfVvdAD2iM4"]} -{"Format": "IDEA0", "ID": "b62a7290-a9ab-4020-8379-52f04d6cb206", "DetectTime": "2023-10-30T14:03:35.761723+02:00", "EventTime": "2023-10-30T14:03:35.761740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CsPHxo15KkG3n8dMHi"]} -{"Format": "IDEA0", "ID": "5f779d70-24ba-475b-a80b-92e1aa362af9", "DetectTime": "2023-10-30T14:03:35.787764+02:00", "EventTime": "2023-10-30T14:03:35.787781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CkIXEtx6XbS1d5SLb"]} -{"Format": "IDEA0", "ID": "74bf9635-2ccb-4c0f-bb55-c89818460a3a", "DetectTime": "2023-10-30T14:03:35.821785+02:00", "EventTime": "2023-10-30T14:03:35.821801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CyV9oO2kYPybn4X3w8"]} -{"Format": "IDEA0", "ID": "aec8e8ac-3a36-4b6f-b123-9a71a320dabf", "DetectTime": "2023-10-30T14:03:35.847799+02:00", "EventTime": "2023-10-30T14:03:35.847814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CzJmJC2SCJG7CxiTP"]} -{"Format": "IDEA0", "ID": "9364f8ac-24b5-4ec6-bc8d-043a8aa57ff8", "DetectTime": "2023-10-30T14:03:35.871484+02:00", "EventTime": "2023-10-30T14:03:35.871504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CfG2XV1UTNWwR39f36"]} -{"Format": "IDEA0", "ID": "e48f0d48-0eef-4af0-b35e-98c5c00112e4", "DetectTime": "2023-10-30T14:03:35.897992+02:00", "EventTime": "2023-10-30T14:03:35.898009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["Cu62xK2r8XuHOcYBOi"]} -{"Format": "IDEA0", "ID": "5cd484d5-cb2c-4081-acc1-af35d67dc559", "DetectTime": "2023-10-30T14:03:35.925258+02:00", "EventTime": "2023-10-30T14:03:35.925269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["Cw9DfR39SuBw7zydt7"]} -{"Format": "IDEA0", "ID": "8862c041-177d-4f58-ad42-74001a3427db", "DetectTime": "2023-10-30T14:03:35.947646+02:00", "EventTime": "2023-10-30T14:03:35.947664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["CQrXj629RBxSU18mFc"]} -{"Format": "IDEA0", "ID": "e4139a54-6728-43a0-a71a-f41aaa98df88", "DetectTime": "2023-10-30T14:03:35.972025+02:00", "EventTime": "2023-10-30T14:03:35.972051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["CD2bMv4UynhI9VeOaf"]} -{"Format": "IDEA0", "ID": "99009a60-d7fd-46d6-9f17-205d167bc052", "DetectTime": "2023-10-30T14:03:35.997635+02:00", "EventTime": "2023-10-30T14:03:35.997654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["C3VfzVQUfyct4aZI"]} -{"Format": "IDEA0", "ID": "854c741d-c8bd-4ec8-8749-cdb3e7fc82ce", "DetectTime": "2023-10-30T14:03:36.024844+02:00", "EventTime": "2023-10-30T14:03:36.024861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CbgIJ44n612qg3YPj"]} -{"Format": "IDEA0", "ID": "f16547b2-eee8-4662-8192-b1fceeca5e22", "DetectTime": "2023-10-30T14:03:36.050539+02:00", "EventTime": "2023-10-30T14:03:36.050563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C8x3pGtG99KzIHtG2"]} -{"Format": "IDEA0", "ID": "2507d944-5673-4bde-ad5e-a946467742f2", "DetectTime": "2023-10-30T14:03:36.071679+02:00", "EventTime": "2023-10-30T14:03:36.071706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CSjlxc3df5k3aypZbf"]} -{"Format": "IDEA0", "ID": "400ff5c6-002c-49c3-b203-e5921510fc3b", "DetectTime": "2023-10-30T14:03:36.093270+02:00", "EventTime": "2023-10-30T14:03:36.093286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["ClKsDG2Do5NkwQykL5"]} -{"Format": "IDEA0", "ID": "f9dc7c9e-fdf5-4b6c-8f7d-7e1d55b9250c", "DetectTime": "2023-10-30T14:03:36.113547+02:00", "EventTime": "2023-10-30T14:03:36.113563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CHxskH3HpcEzlufoj9"]} -{"Format": "IDEA0", "ID": "bc421029-32a8-4b43-ab57-4f10267e6c6d", "DetectTime": "2023-10-30T14:03:36.134739+02:00", "EventTime": "2023-10-30T14:03:36.134761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CHZGVmstzyF8QgBE8"]} -{"Format": "IDEA0", "ID": "acd5b51a-49ca-4eaa-81e4-0ecd298de15d", "DetectTime": "2023-10-30T14:03:36.156372+02:00", "EventTime": "2023-10-30T14:03:36.156392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CsFjr507A5NrwtFqd"]} -{"Format": "IDEA0", "ID": "e3d87321-3140-4b64-ad9f-bff4368c2c30", "DetectTime": "2023-10-30T14:03:36.176899+02:00", "EventTime": "2023-10-30T14:03:36.176915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CZrXov1JptAFo0evz9"]} -{"Format": "IDEA0", "ID": "bac2df72-ac36-4873-9753-85d21631dc5a", "DetectTime": "2023-10-30T14:03:36.196924+02:00", "EventTime": "2023-10-30T14:03:36.196941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CQYJMArzUN3cTXKYc"]} -{"Format": "IDEA0", "ID": "da6c839a-e9c9-492e-aef6-bd0b1691b127", "DetectTime": "2023-10-30T14:03:36.217837+02:00", "EventTime": "2023-10-30T14:03:36.217854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CjDMWO103pUGsb3WO1"]} -{"Format": "IDEA0", "ID": "a37b2032-a7ff-430a-b217-859971bdb762", "DetectTime": "2023-10-30T14:03:36.238812+02:00", "EventTime": "2023-10-30T14:03:36.238830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CSHGBU3Xk5D3dBVfjc"]} -{"Format": "IDEA0", "ID": "4fb9ca43-00cf-4324-ab55-d96b49f3cf56", "DetectTime": "2023-10-30T14:03:36.258658+02:00", "EventTime": "2023-10-30T14:03:36.258671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["Cjzxm52OOrupOW9Tv1"]} -{"Format": "IDEA0", "ID": "e279106d-a88a-4287-a17b-5c963f4d3c76", "DetectTime": "2023-10-30T14:03:36.279998+02:00", "EventTime": "2023-10-30T14:03:36.280015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CIiJRt1DUM4UO7BKu4"]} -{"Format": "IDEA0", "ID": "b721e629-8c58-42fe-8ffd-f0ae37030b6b", "DetectTime": "2023-10-30T14:03:36.299789+02:00", "EventTime": "2023-10-30T14:03:36.299807+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Clvouxety1q3f9c94"]} -{"Format": "IDEA0", "ID": "e09e471c-356a-4223-86eb-2faf04310c4e", "DetectTime": "2023-10-30T14:03:36.308433+02:00", "EventTime": "2023-10-30T14:03:36.308445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CLnka71NefyIp9D2b"]} -{"Format": "IDEA0", "ID": "7c5661b0-cefe-4792-bcfd-244973b77b81", "DetectTime": "2023-10-30T14:03:36.336609+02:00", "EventTime": "2023-10-30T14:03:36.336626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CLZsMMvJyrjoFp9y7"]} -{"Format": "IDEA0", "ID": "1175b090-79b3-4d39-99b8-5271033d6b49", "DetectTime": "2023-10-30T14:03:36.357350+02:00", "EventTime": "2023-10-30T14:03:36.357366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CiFOUH337PjH7yIZ5l"]} -{"Format": "IDEA0", "ID": "3c757225-3574-4f79-9698-f4cce31a7426", "DetectTime": "2023-10-30T14:03:36.377374+02:00", "EventTime": "2023-10-30T14:03:36.377393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CuHmqp12wg8k1tnOS3"]} -{"Format": "IDEA0", "ID": "26f51959-7cbc-4c04-b44b-b8646efb0fb8", "DetectTime": "2023-10-30T14:03:36.398580+02:00", "EventTime": "2023-10-30T14:03:36.398592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CobBfv3ObMijgxDypj"]} -{"Format": "IDEA0", "ID": "67dac3cb-883a-4160-9f41-6c39aa3129bf", "DetectTime": "2023-10-30T14:03:36.418994+02:00", "EventTime": "2023-10-30T14:03:36.419017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CNM1QV3ZbmLG9fG1G5"]} -{"Format": "IDEA0", "ID": "38b537af-69fa-4f1f-bd30-968987a8de90", "DetectTime": "2023-10-30T14:03:36.439817+02:00", "EventTime": "2023-10-30T14:03:36.439835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CTcf7R2V1VmWWqbBVc"]} -{"Format": "IDEA0", "ID": "66a982a5-09b7-47cb-ae89-941cb104069a", "DetectTime": "2023-10-30T14:03:36.460693+02:00", "EventTime": "2023-10-30T14:03:36.460704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CFrBug2uJyZmxdHfQ9"]} -{"Format": "IDEA0", "ID": "f8a827eb-1a84-4357-99f7-94acaed00fd6", "DetectTime": "2023-10-30T14:03:36.482190+02:00", "EventTime": "2023-10-30T14:03:36.482206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CiEcyo1OA57WaxBQig"]} -{"Format": "IDEA0", "ID": "b3f7a23d-3238-4127-bfe7-0b31ea2a8ea8", "DetectTime": "2023-10-30T14:03:36.504482+02:00", "EventTime": "2023-10-30T14:03:36.504508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["Cwm8aFlV6pOnjaF83"]} -{"Format": "IDEA0", "ID": "8406b4e5-4467-431c-aa93-0c927d16c401", "DetectTime": "2023-10-30T14:03:36.527453+02:00", "EventTime": "2023-10-30T14:03:36.527470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["C2OAbZ2i0P4CxCjWfh"]} -{"Format": "IDEA0", "ID": "50196d48-bb02-46e0-a1fe-d57758689d7a", "DetectTime": "2023-10-30T14:03:36.551195+02:00", "EventTime": "2023-10-30T14:03:36.551214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CwwBu344z1X2ovKsOl"]} -{"Format": "IDEA0", "ID": "9b82e9fc-09ad-4712-8f98-47cf22cea080", "DetectTime": "2023-10-30T14:03:36.572027+02:00", "EventTime": "2023-10-30T14:03:36.572040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["COOnG7i7UKBfbjvxa"]} -{"Format": "IDEA0", "ID": "1810b0f7-6339-481d-a63b-b023574e9b4d", "DetectTime": "2023-10-30T14:03:36.594375+02:00", "EventTime": "2023-10-30T14:03:36.594395+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGXzvr3YABNToUOax8"]} -{"Format": "IDEA0", "ID": "47029d4d-3f91-4696-93fe-9bb3411e9ea9", "DetectTime": "2023-10-30T14:03:36.602855+02:00", "EventTime": "2023-10-30T14:03:36.602876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CVspwemmNra1qvGbg"]} -{"Format": "IDEA0", "ID": "e88c1ceb-bcb1-49cc-b9ef-bf5dbbd640e0", "DetectTime": "2023-10-30T14:03:36.633056+02:00", "EventTime": "2023-10-30T14:03:36.633072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["Cj0tmu15sj1LvC8Ce4"]} -{"Format": "IDEA0", "ID": "179f699d-d761-4c79-87ac-752cfc06636c", "DetectTime": "2023-10-30T14:03:36.657290+02:00", "EventTime": "2023-10-30T14:03:36.657304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CB9TQ72JEd4VPfeBzh"]} -{"Format": "IDEA0", "ID": "594eb84d-5917-49d7-830a-c9a128431580", "DetectTime": "2023-10-30T14:03:36.679844+02:00", "EventTime": "2023-10-30T14:03:36.679857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["C7c1ID2cRMalgJ1oBg"]} -{"Format": "IDEA0", "ID": "ddfebead-095f-44cb-9067-cf3c9dad65d1", "DetectTime": "2023-10-30T14:03:36.700775+02:00", "EventTime": "2023-10-30T14:03:36.700795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["CdEora32wP6wHLRQPj"]} -{"Format": "IDEA0", "ID": "f37ef5d6-cf41-4e2d-ba9b-65dc51146e25", "DetectTime": "2023-10-30T14:03:36.722206+02:00", "EventTime": "2023-10-30T14:03:36.722224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["CptLGq1KzzDQvMucj3"]} -{"Format": "IDEA0", "ID": "33f238ba-ca52-4285-8592-34f99a733d7d", "DetectTime": "2023-10-30T14:03:36.747547+02:00", "EventTime": "2023-10-30T14:03:36.747570+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLRH2A4kzqo2A6g4P"]} -{"Format": "IDEA0", "ID": "fffb9068-aa52-4a26-9324-c03ba81cad89", "DetectTime": "2023-10-30T14:03:36.754876+02:00", "EventTime": "2023-10-30T14:03:36.754903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CB3Cbr4JYZwzfmlhel"]} -{"Format": "Json", "ID": "fffb9068-aa52-4a26-9324-c03ba81cad89", "DetectTime": "2023-10-30T14:03:36.754876+02:00", "EventTime": "2023-10-30T14:03:36.754903+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T16:30:52.082452+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 63. (real time 2023/10/30 14:03:36.814013)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0762d38b-3426-4a2b-9d16-3d945d994ac5", "DetectTime": "2023-10-30T14:03:36.818992+02:00", "EventTime": "2023-10-30T14:03:36.819012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CWKhQE4jB9iBNVBSP6"]} -{"Format": "IDEA0", "ID": "b282ffd9-4bb2-451a-8db6-afa94499f8a2", "DetectTime": "2023-10-30T14:03:36.842594+02:00", "EventTime": "2023-10-30T14:03:36.842611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C0k7io3VfcRPeFafI1"]} -{"Format": "IDEA0", "ID": "8ea7371a-cf70-4aac-9fb2-3edeb593278c", "DetectTime": "2023-10-30T14:03:36.864598+02:00", "EventTime": "2023-10-30T14:03:36.864611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.205.151.134 ", "ContentType": "text/plain"}], "uids": ["Cp5X742xsVfisUkjNb"]} -{"Format": "IDEA0", "ID": "324d10b1-60fc-423c-a8a5-37995bbf44c0", "DetectTime": "2023-10-30T14:03:36.886517+02:00", "EventTime": "2023-10-30T14:03:36.886536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CzMKsM1e9LiLbN8DAl"]} -{"Format": "IDEA0", "ID": "13e8863a-b04a-4ef5-8e66-880931975028", "DetectTime": "2023-10-30T14:03:36.909786+02:00", "EventTime": "2023-10-30T14:03:36.909800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.0.223.238 ", "ContentType": "text/plain"}], "uids": ["Cyh6GP2G6Qh4cIbwy7"]} -{"Format": "IDEA0", "ID": "ab26e02c-05f7-4ec2-ab06-12efc0752ca4", "DetectTime": "2023-10-30T14:03:36.931850+02:00", "EventTime": "2023-10-30T14:03:36.931868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CiChTpZ5NbSnryr93"]} -{"Format": "IDEA0", "ID": "921c6480-878d-4ddb-b892-4bb0c58950b7", "DetectTime": "2023-10-30T14:03:36.953842+02:00", "EventTime": "2023-10-30T14:03:36.953862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CYqiAQ1d6GDh4M09o4"]} -{"Format": "IDEA0", "ID": "20457bad-ef55-4133-8feb-90d29043855d", "DetectTime": "2023-10-30T14:03:36.976540+02:00", "EventTime": "2023-10-30T14:03:36.976552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CPZ8In18kFLHlwEP3l"]} -{"Format": "IDEA0", "ID": "06faed23-eafc-4691-a5ad-fe1f4a879c42", "DetectTime": "2023-10-30T14:03:36.999338+02:00", "EventTime": "2023-10-30T14:03:36.999351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["Cgl7eh48qvtEiZUH8i"]} -{"Format": "IDEA0", "ID": "68060353-4418-4bee-b029-09a73d7a5cb3", "DetectTime": "2023-10-30T14:03:37.091817+02:00", "EventTime": "2023-10-30T14:03:37.091838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CQE8zi07KWHUZ2gel"]} -{"Format": "IDEA0", "ID": "d1bc859a-b07a-4aa8-85cc-af02505877d3", "DetectTime": "2023-10-30T14:03:37.116878+02:00", "EventTime": "2023-10-30T14:03:37.116896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cxn3nrxKUvVU2NWih"]} -{"Format": "IDEA0", "ID": "13318542-0257-4105-a1b6-eb79afa8646b", "DetectTime": "2023-10-30T14:03:37.141246+02:00", "EventTime": "2023-10-30T14:03:37.141262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C6Ze3q1rh5KJm3gHia"]} -{"Format": "IDEA0", "ID": "ff3d008b-6702-4c11-8f35-7733219bc4dd", "DetectTime": "2023-10-30T14:03:37.166605+02:00", "EventTime": "2023-10-30T14:03:37.166621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CnwHrx49m85CPwLas7"]} -{"Format": "IDEA0", "ID": "2f074bcf-3ca2-44af-887c-10dd762c594f", "DetectTime": "2023-10-30T14:03:37.190614+02:00", "EventTime": "2023-10-30T14:03:37.190634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["ClR8bv2LgTvrFrZzqh"]} -{"Format": "IDEA0", "ID": "db46e8d6-ecb8-4225-9466-d3b04961aa0a", "DetectTime": "2023-10-30T14:03:37.214002+02:00", "EventTime": "2023-10-30T14:03:37.214022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CaM7mg3uFO4lwg7foe"]} -{"Format": "IDEA0", "ID": "3d4bb2cf-3411-494a-a3fa-26005f5c934a", "DetectTime": "2023-10-30T14:03:37.241753+02:00", "EventTime": "2023-10-30T14:03:37.241768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CZZ3Wt1rlUAmgiCVp4"]} -{"Format": "IDEA0", "ID": "dabbb6c9-5175-40ca-952d-310ecd34a25e", "DetectTime": "2023-10-30T14:03:37.267914+02:00", "EventTime": "2023-10-30T14:03:37.267927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CabaRc4TJSn3zMFoda"]} -{"Format": "IDEA0", "ID": "4e75b950-0270-4d84-9488-8f1aa96b6152", "DetectTime": "2023-10-30T14:03:37.290175+02:00", "EventTime": "2023-10-30T14:03:37.290193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CCbvWq2Yngvj6S8qJl"]} -{"Format": "IDEA0", "ID": "b6929348-3870-447a-8627-6179ff2787af", "DetectTime": "2023-10-30T14:03:37.313718+02:00", "EventTime": "2023-10-30T14:03:37.313735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["CzZiJm4TGVwgYiXw8k"]} -{"Format": "IDEA0", "ID": "42ad881d-eeec-440a-a755-f370fecdc081", "DetectTime": "2023-10-30T14:03:37.338316+02:00", "EventTime": "2023-10-30T14:03:37.338341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["CR3VEwrNhtw7eGXE3"]} -{"Format": "IDEA0", "ID": "f01fe5f1-4272-4d15-ab9e-24baeaf8868d", "DetectTime": "2023-10-30T14:03:37.362289+02:00", "EventTime": "2023-10-30T14:03:37.362308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["Cqgu6B37JA4cyKuu6j"]} -{"Format": "IDEA0", "ID": "f4738c6b-5bc4-4187-b40a-8496a83e3b22", "DetectTime": "2023-10-30T14:03:37.392774+02:00", "EventTime": "2023-10-30T14:03:37.392799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CsC1W2oJjsO49T4t2"]} -{"Format": "IDEA0", "ID": "4b9571c6-62ec-4363-9bd6-b6c992b2517f", "DetectTime": "2023-10-30T14:03:37.419186+02:00", "EventTime": "2023-10-30T14:03:37.419205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["CNRQzH21vIEAmXesMa"]} -{"Format": "IDEA0", "ID": "4139ef04-1af8-4edb-81c7-d73c0eef5179", "DetectTime": "2023-10-30T14:03:37.442117+02:00", "EventTime": "2023-10-30T14:03:37.442132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CODDSw3GzhFo30B5k"]} -{"Format": "IDEA0", "ID": "358238a2-4a0b-42ce-9c0b-50ed19652f5d", "DetectTime": "2023-10-30T14:03:37.466271+02:00", "EventTime": "2023-10-30T14:03:37.466287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CxugOR1v4TFNqplCme"]} -{"Format": "IDEA0", "ID": "3d8c46d6-ce96-4167-afe4-b897ab0dbcb7", "DetectTime": "2023-10-30T14:03:37.489985+02:00", "EventTime": "2023-10-30T14:03:37.489999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CrViud379arnSEYl67"]} -{"Format": "IDEA0", "ID": "42e969e1-28f7-4bf8-80ae-7ba0b7ac0a3d", "DetectTime": "2023-10-30T14:03:37.515248+02:00", "EventTime": "2023-10-30T14:03:37.515265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CeDjXE2yizUOMJ68qk"]} -{"Format": "IDEA0", "ID": "b63d2c4d-3fc1-4aa2-b5f1-b67794a5c345", "DetectTime": "2023-10-30T14:03:37.538353+02:00", "EventTime": "2023-10-30T14:03:37.538369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["C3gSjuRKWuQ4bdxw8"]} -{"Format": "IDEA0", "ID": "afdef76b-6ada-4d40-968b-599c23e80b50", "DetectTime": "2023-10-30T14:03:37.562104+02:00", "EventTime": "2023-10-30T14:03:37.562121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["Cdaqwb3tM1AcVM9JU5"]} -{"Format": "IDEA0", "ID": "227ca129-57fe-451e-b1d4-ef571f89dbb6", "DetectTime": "2023-10-30T14:03:37.586891+02:00", "EventTime": "2023-10-30T14:03:37.586908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CZUhCf15lSflI2qhC6"]} -{"Format": "IDEA0", "ID": "61677e1c-f762-40e2-b2d2-f4fa8c0e7a65", "DetectTime": "2023-10-30T14:03:37.609273+02:00", "EventTime": "2023-10-30T14:03:37.609299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CTDOBl4VyOJQeN36hi"]} -{"Format": "IDEA0", "ID": "6ad615e7-7645-4677-a5d4-f70e3bc3ea07", "DetectTime": "2023-10-30T14:03:37.636851+02:00", "EventTime": "2023-10-30T14:03:37.636868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CjucOP2OdNwpVBMfP3"]} -{"Format": "IDEA0", "ID": "de078016-4b04-4300-b8f0-fc6633d9eed7", "DetectTime": "2023-10-30T14:03:37.660193+02:00", "EventTime": "2023-10-30T14:03:37.660209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CZJ09D4hfPUrGdzqb"]} -{"Format": "IDEA0", "ID": "ee4162f4-38b9-4b75-8ae1-796a9dffbecb", "DetectTime": "2023-10-30T14:03:37.692878+02:00", "EventTime": "2023-10-30T14:03:37.692892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["Cq7k0xeWfc76AsjTl"]} -{"Format": "IDEA0", "ID": "667b7634-424e-4ba3-b752-f84ece7cfc20", "DetectTime": "2023-10-30T14:03:37.715462+02:00", "EventTime": "2023-10-30T14:03:37.715486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["C4kfXq1kotz4EdOa68"]} -{"Format": "IDEA0", "ID": "0201261b-0c76-4a94-87c3-8717c87d2afa", "DetectTime": "2023-10-30T14:03:37.740597+02:00", "EventTime": "2023-10-30T14:03:37.740617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["Crt313gscTHIlz5Mc"]} -{"Format": "IDEA0", "ID": "df25bb59-31f0-422e-b42c-e245db7261bf", "DetectTime": "2023-10-30T14:03:37.764753+02:00", "EventTime": "2023-10-30T14:03:37.764766+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4mhA72rP8jHQH1ar2"]} -{"Format": "IDEA0", "ID": "9e0bc8ac-3cad-433c-9420-06b2303fef9b", "DetectTime": "2023-10-30T14:03:37.772549+02:00", "EventTime": "2023-10-30T14:03:37.772836+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CqEU4e268qb2YOF0K7"]} -{"Format": "IDEA0", "ID": "086bcc7b-9d30-42a7-a09d-d08cbb93d3bf", "DetectTime": "2023-10-30T14:03:37.781674+02:00", "EventTime": "2023-10-30T14:03:37.781690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CKObxo1H7uOn90ky4b"]} -{"Format": "IDEA0", "ID": "ba6c7f6e-a76c-4c9e-8053-44a29e7b3efe", "DetectTime": "2023-10-30T14:03:37.814729+02:00", "EventTime": "2023-10-30T14:03:37.814749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["Czg5gS2XPRTokWUNG3"]} -{"Format": "IDEA0", "ID": "c8e666ea-4047-444a-b3b8-c9f20ef69ace", "DetectTime": "2023-10-30T14:03:37.846169+02:00", "EventTime": "2023-10-30T14:03:37.846186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.174.83.232 ", "ContentType": "text/plain"}], "uids": ["CTO9cQ2TxZUBuOPeG1"]} -{"Format": "IDEA0", "ID": "722d006a-936f-4bf0-a241-328a16538ba3", "DetectTime": "2023-10-30T14:03:37.884554+02:00", "EventTime": "2023-10-30T14:03:37.884615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["CAk1O446pRz2sEEDFh"]} -{"Format": "IDEA0", "ID": "87cbc8b2-71dc-4cc1-8fb0-16d8817c61d3", "DetectTime": "2023-10-30T14:03:37.920796+02:00", "EventTime": "2023-10-30T14:03:37.920821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.91.3.102 ", "ContentType": "text/plain"}], "uids": ["ClSX0e3JDKTvUUdt41"]} -{"Format": "IDEA0", "ID": "6c4f38e4-c39e-40be-b191-e291299b292a", "DetectTime": "2023-10-30T14:03:37.961177+02:00", "EventTime": "2023-10-30T14:03:37.961201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.194.94.131 ", "ContentType": "text/plain"}], "uids": ["CpO84P8eugqh1d972"]} -{"Format": "IDEA0", "ID": "9b078640-47bf-4c8a-83ee-0dff5dba110f", "DetectTime": "2023-10-30T14:03:37.998317+02:00", "EventTime": "2023-10-30T14:03:37.998332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.141.121.62 ", "ContentType": "text/plain"}], "uids": ["CawAzT2zcJ7nmbuPRl"]} -{"Format": "IDEA0", "ID": "847e7516-bc67-4b8d-973b-c113efb64cc4", "DetectTime": "2023-10-30T14:03:38.032810+02:00", "EventTime": "2023-10-30T14:03:38.032827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CaOHt12YcNK319Ldkl"]} -{"Format": "IDEA0", "ID": "622627a6-8e50-40c5-ad5c-fd32ff905f7f", "DetectTime": "2023-10-30T14:03:38.069095+02:00", "EventTime": "2023-10-30T14:03:38.069114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["CP004BsCxHOwkBMH1"]} -{"Format": "IDEA0", "ID": "ecbedc3c-e926-4fdf-b772-de0488ae656f", "DetectTime": "2023-10-30T14:03:38.105389+02:00", "EventTime": "2023-10-30T14:03:38.105408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CAk1Sz4CWbwpxoU5Zh"]} -{"Format": "IDEA0", "ID": "d328456c-11e6-4db1-862a-91735b613565", "DetectTime": "2023-10-30T14:03:38.140310+02:00", "EventTime": "2023-10-30T14:03:38.140327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJAVxD1wE1SxVSxWZc"]} -{"Format": "IDEA0", "ID": "fce08d7f-e70b-45a9-9888-3ad26a643f0d", "DetectTime": "2023-10-30T14:03:38.179634+02:00", "EventTime": "2023-10-30T14:03:38.179660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CmgOCC1spJJEm75vak"]} -{"Format": "IDEA0", "ID": "c2e5b3a4-ced8-4f1b-adb8-1099ec4954da", "DetectTime": "2023-10-30T14:03:38.215048+02:00", "EventTime": "2023-10-30T14:03:38.215117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CIS9QD3YEYEQJgc6I8"]} -{"Format": "IDEA0", "ID": "145b959c-d0ed-4761-a4e1-179ea732a875", "DetectTime": "2023-10-30T14:03:38.258255+02:00", "EventTime": "2023-10-30T14:03:38.258269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C9hLMd1SXjufxFMlVe"]} -{"Format": "IDEA0", "ID": "0f77b53a-f335-4e45-8bd8-731bac5ce57a", "DetectTime": "2023-10-30T14:03:38.296413+02:00", "EventTime": "2023-10-30T14:03:38.296429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["CN5UFo4VCvt8vNRCm6"]} -{"Format": "IDEA0", "ID": "b56584b0-97a5-433f-adec-edfa0a30cb28", "DetectTime": "2023-10-30T14:03:38.338513+02:00", "EventTime": "2023-10-30T14:03:38.338529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["Cz1L5xlCXtnKZ7yQa"]} -{"Format": "IDEA0", "ID": "c1380ec5-c71a-4987-9dd0-62c954a17e3f", "DetectTime": "2023-10-30T14:03:38.377845+02:00", "EventTime": "2023-10-30T14:03:38.377942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["CyQw8a4fs9RoZSbyG7"]} -{"Format": "IDEA0", "ID": "5e122fcb-9082-40e3-bec7-eedfc412b66b", "DetectTime": "2023-10-30T14:03:38.415310+02:00", "EventTime": "2023-10-30T14:03:38.415332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CxWp3j2x5TaMDkpdei"]} -{"Format": "IDEA0", "ID": "1472c0ff-ab50-4444-97f4-75b63768fdd8", "DetectTime": "2023-10-30T14:03:38.452256+02:00", "EventTime": "2023-10-30T14:03:38.452282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["C9EXpo1PidA3guH4jc"]} -{"Format": "IDEA0", "ID": "c1a0f6da-41d8-4a64-bd2a-b5eaab404145", "DetectTime": "2023-10-30T14:03:38.490303+02:00", "EventTime": "2023-10-30T14:03:38.490323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["Cnr7fw2VkkdMXorblg"]} -{"Format": "IDEA0", "ID": "07ff84fd-ed0c-4628-9bcd-9b75a4216f68", "DetectTime": "2023-10-30T14:03:38.524640+02:00", "EventTime": "2023-10-30T14:03:38.524657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CUKGnk63zplniK74k"]} -{"Format": "IDEA0", "ID": "1e35a6e1-9311-41a8-8a8a-edad24d413a7", "DetectTime": "2023-10-30T14:03:38.558538+02:00", "EventTime": "2023-10-30T14:03:38.558556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CiVVbi31aEnU0fmLS2"]} -{"Format": "IDEA0", "ID": "574a2758-e75a-4eac-b8e5-cfd9b9a7f1f6", "DetectTime": "2023-10-30T14:03:38.593287+02:00", "EventTime": "2023-10-30T14:03:38.593307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["C1l2W22Vr7blShJDP6"]} -{"Format": "IDEA0", "ID": "7cd06015-1782-4966-9374-f32aea03da20", "DetectTime": "2023-10-30T14:03:38.631719+02:00", "EventTime": "2023-10-30T14:03:38.631768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["CuwPzb1DIA5HXHmTt5"]} -{"Format": "IDEA0", "ID": "e15cc2e4-feda-40ed-ac67-37d4aff12de1", "DetectTime": "2023-10-30T14:03:38.673663+02:00", "EventTime": "2023-10-30T14:03:38.673680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["Cicu8l2nv2gXoqHgIh"]} -{"Format": "IDEA0", "ID": "127cc1e5-8594-49d8-b058-c86c4b7dc787", "DetectTime": "2023-10-30T14:03:38.715942+02:00", "EventTime": "2023-10-30T14:03:38.715964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CSMhct3ISKKik6dME3"]} -{"Format": "IDEA0", "ID": "623d6700-e9d0-4186-98f4-06bcf4adeb12", "DetectTime": "2023-10-30T14:03:38.759933+02:00", "EventTime": "2023-10-30T14:03:38.759950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["C11nDW38w8XyHdGg9j"]} -{"Format": "IDEA0", "ID": "467b6c2e-4a58-4488-8788-e8d090423039", "DetectTime": "2023-10-30T14:03:38.797870+02:00", "EventTime": "2023-10-30T14:03:38.797896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["CZFaCT1yRGbk3Rpy7l"]} -{"Format": "IDEA0", "ID": "aa85043b-9b72-4c0a-b1ac-2a17b1902443", "DetectTime": "2023-10-30T14:03:38.836230+02:00", "EventTime": "2023-10-30T14:03:38.836248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["CEqAyV1ADSyu0EjF56"]} -{"Format": "IDEA0", "ID": "e6507e8d-06c9-4d39-a5ef-f126deafe172", "DetectTime": "2023-10-30T14:03:38.879093+02:00", "EventTime": "2023-10-30T14:03:38.879110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["C8KjhP2ngkrCm0yBi4"]} -{"Format": "IDEA0", "ID": "ae3d06b1-972e-4e4a-a840-9b414a756ee9", "DetectTime": "2023-10-30T14:03:38.920747+02:00", "EventTime": "2023-10-30T14:03:38.920796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["Ccyxke4fpsYnr1dMa3"]} -{"Format": "IDEA0", "ID": "22c56eab-a5be-4ec6-9e31-3ead066b6794", "DetectTime": "2023-10-30T14:03:38.958996+02:00", "EventTime": "2023-10-30T14:03:38.959022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["CFIrwD4eDmhKlnGpCc"]} -{"Format": "IDEA0", "ID": "7422e8e3-bf31-4349-b173-3879feed9e67", "DetectTime": "2023-10-30T14:03:38.994110+02:00", "EventTime": "2023-10-30T14:03:38.994127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["C03QPR1oCGMrcuIFhg"]} -{"Format": "IDEA0", "ID": "f34a7712-3ea2-4423-b913-590104c3e7d5", "DetectTime": "2023-10-30T14:03:39.026081+02:00", "EventTime": "2023-10-30T14:03:39.026100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.98.167 ", "ContentType": "text/plain"}], "uids": ["CheNnF2RWlAcDrN5zh"]} -{"Format": "IDEA0", "ID": "75ba7176-1908-4f13-8dbc-34ab505f4c36", "DetectTime": "2023-10-30T14:03:39.060074+02:00", "EventTime": "2023-10-30T14:03:39.060100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.86.133.67 ", "ContentType": "text/plain"}], "uids": ["C35Ytl2F1KG46IZq"]} -{"Format": "IDEA0", "ID": "ecc80cec-47a2-4e72-8d88-ae65dcad7d9b", "DetectTime": "2023-10-30T14:03:39.096306+02:00", "EventTime": "2023-10-30T14:03:39.096326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.199.61.254 ", "ContentType": "text/plain"}], "uids": ["CWgWrA05CLy7S5Slc"]} -{"Format": "IDEA0", "ID": "08d6a9c4-26a0-4c68-b7ad-38c7b7db484f", "DetectTime": "2023-10-30T14:03:39.128900+02:00", "EventTime": "2023-10-30T14:03:39.128912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.122.65.82 ", "ContentType": "text/plain"}], "uids": ["C0G9Jb2gxXe0gWLBWc"]} -{"Format": "IDEA0", "ID": "f7c6aa37-860c-4b38-8f1c-13fd7aaa7503", "DetectTime": "2023-10-30T14:03:39.163758+02:00", "EventTime": "2023-10-30T14:03:39.163783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQOn3x2LJQpZqKsBle"]} -{"Format": "IDEA0", "ID": "7a50ee67-4158-45ad-ac56-dddb6e7777c0", "DetectTime": "2023-10-30T14:03:39.198313+02:00", "EventTime": "2023-10-30T14:03:39.198331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.161.198.97 ", "ContentType": "text/plain"}], "uids": ["CZQTIBjuuYwiNhBf"]} -{"Format": "IDEA0", "ID": "cf8226ea-1a35-4f23-85eb-39c316af9a73", "DetectTime": "2023-10-30T14:03:39.233902+02:00", "EventTime": "2023-10-30T14:03:39.233922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.238.124.155 ", "ContentType": "text/plain"}], "uids": ["CBxltz3YtTp36ZTsE2"]} -{"Format": "IDEA0", "ID": "44810a48-beed-45d0-9a96-efe9ce9513ba", "DetectTime": "2023-10-30T14:03:39.265817+02:00", "EventTime": "2023-10-30T14:03:39.265842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CzhBMuFB9BXKaiSbd"]} -{"Format": "IDEA0", "ID": "d42a6a85-f63e-42c2-91cd-0efbce979105", "DetectTime": "2023-10-30T14:03:39.378426+02:00", "EventTime": "2023-10-30T14:03:39.378443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.250.72.187 ", "ContentType": "text/plain"}], "uids": ["Cka0Kh2WeRmlAKDezg"]} -{"Format": "IDEA0", "ID": "d4dd468e-069d-44bb-b781-e7e6772dc914", "DetectTime": "2023-10-30T14:03:39.417722+02:00", "EventTime": "2023-10-30T14:03:39.417746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.78.213.135 ", "ContentType": "text/plain"}], "uids": ["C1kQY22A1pCUdEEstj"]} -{"Format": "IDEA0", "ID": "0a05c8dc-89ed-4f36-9e77-d2ead873b6b0", "DetectTime": "2023-10-30T14:03:39.455428+02:00", "EventTime": "2023-10-30T14:03:39.455454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CKFUwR2bMgItm4ePr7", "C4mhA72rP8jHQH1ar2", "CGXzvr3YABNToUOax8", "Cb7OFm4wq7MG73KyTh"]} -{"Format": "IDEA0", "ID": "4e40e5c9-8b9a-4a7b-affc-e5ec7e82e2b8", "DetectTime": "2023-10-30T14:03:39.465853+02:00", "EventTime": "2023-10-30T14:03:39.465877+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKFUwR2bMgItm4ePr7"]} -{"Format": "IDEA0", "ID": "b3559d39-97b4-4068-95fa-e94214f0e6fd", "DetectTime": "2023-10-30T14:03:39.475829+02:00", "EventTime": "2023-10-30T14:03:39.475847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CW0ADu2RXmmjNgPrGg"]} -{"Format": "IDEA0", "ID": "09dc80b4-48dd-4369-87b6-8af59e3fcac9", "DetectTime": "2023-10-30T14:03:39.514909+02:00", "EventTime": "2023-10-30T14:03:39.514928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.50.157 ", "ContentType": "text/plain"}], "uids": ["CC4jA21h3GmX7yNm24"]} -{"Format": "IDEA0", "ID": "06748122-e9b4-46ad-8c1a-46ff1c609355", "DetectTime": "2023-10-30T14:03:39.553111+02:00", "EventTime": "2023-10-30T14:03:39.553130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.9.226.247 ", "ContentType": "text/plain"}], "uids": ["C8x0w93un32EmK1tac"]} -{"Format": "IDEA0", "ID": "eb1275dc-849e-47b3-b83d-5acfdb6ee975", "DetectTime": "2023-10-30T14:03:39.588175+02:00", "EventTime": "2023-10-30T14:03:39.588201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.9.241.203"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.9.241.203 ", "ContentType": "text/plain"}], "uids": ["CuhXhB2alzqAme7xgk"]} -{"Format": "IDEA0", "ID": "60f4bce0-0a71-4544-981d-fb0cf0f51b08", "DetectTime": "2023-10-30T14:03:39.629581+02:00", "EventTime": "2023-10-30T14:03:39.629599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.92.180.233 ", "ContentType": "text/plain"}], "uids": ["CUZrBD43Qb3An0dYCi"]} -{"Format": "IDEA0", "ID": "0b7f3930-6f93-45c7-a2b9-20514698cf4e", "DetectTime": "2023-10-30T14:03:39.666561+02:00", "EventTime": "2023-10-30T14:03:39.666579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CBd0gjrwz0G2Kosr5"]} -{"Format": "IDEA0", "ID": "5cce4f16-73ba-4a69-ae1b-1fbc182afec6", "DetectTime": "2023-10-30T14:03:39.704409+02:00", "EventTime": "2023-10-30T14:03:39.704428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.99.162 ", "ContentType": "text/plain"}], "uids": ["C3H3nI1pJYMJbozwkl"]} -{"Format": "IDEA0", "ID": "e76f633c-4967-4ba9-a038-493ded47d5b5", "DetectTime": "2023-10-30T14:03:39.755337+02:00", "EventTime": "2023-10-30T14:03:39.755354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.36.128.79 ", "ContentType": "text/plain"}], "uids": ["Cm4EeP2SMPWRwYZGga"]} -{"Format": "IDEA0", "ID": "2e991c4f-5296-4902-9b87-a607d2270af1", "DetectTime": "2023-10-30T14:03:39.796466+02:00", "EventTime": "2023-10-30T14:03:39.796492+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzgLZZ1nPFgnpdBePk"]} -{"Format": "IDEA0", "ID": "02c00456-3d3a-40ca-8957-f8202c3b8e8b", "DetectTime": "2023-10-30T14:03:39.808317+02:00", "EventTime": "2023-10-30T14:03:39.808335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.63.188.231 ", "ContentType": "text/plain"}], "uids": ["C0rdGK1hpNIGjvIcB"]} -{"Format": "IDEA0", "ID": "df9dd877-615f-45a5-8846-1e267f695331", "DetectTime": "2023-10-30T14:03:39.846906+02:00", "EventTime": "2023-10-30T14:03:39.846927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.177.116.230 ", "ContentType": "text/plain"}], "uids": ["CfTNK82OJK5HeTYkcc"]} -{"Format": "IDEA0", "ID": "dd6a821b-3177-46fe-a54d-e5b4453eb021", "DetectTime": "2023-10-30T14:03:39.892860+02:00", "EventTime": "2023-10-30T14:03:39.892884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.185.202.38 ", "ContentType": "text/plain"}], "uids": ["C1oGvA4kszJO0uZill"]} -{"Format": "IDEA0", "ID": "a034ae8c-f03e-4a52-8542-247f724afbdd", "DetectTime": "2023-10-30T14:03:39.935709+02:00", "EventTime": "2023-10-30T14:03:39.935726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["Cok3hC28qaqT65pkUh"]} -{"Format": "IDEA0", "ID": "f4ad3938-471f-4d16-8f68-2535e14b9850", "DetectTime": "2023-10-30T14:03:39.975603+02:00", "EventTime": "2023-10-30T14:03:39.975622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.149.223.80 ", "ContentType": "text/plain"}], "uids": ["CfLrLBMs6ooQHAaBj"]} -{"Format": "IDEA0", "ID": "6d96c616-8633-4a9d-a139-eba4e4cb1075", "DetectTime": "2023-10-30T14:03:40.017523+02:00", "EventTime": "2023-10-30T14:03:40.017548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.152.26 ", "ContentType": "text/plain"}], "uids": ["Cfwehe3oS2xXb2B782"]} -{"Format": "IDEA0", "ID": "04383f3d-882b-467d-bbe2-6e013b014f57", "DetectTime": "2023-10-30T14:03:40.057958+02:00", "EventTime": "2023-10-30T14:03:40.057980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.238.101.170 ", "ContentType": "text/plain"}], "uids": ["C4kQPf2WHPWv1SuuE7"]} -{"Format": "IDEA0", "ID": "a3538da3-84e4-4e19-8b1f-5144f08896d0", "DetectTime": "2023-10-30T14:03:40.099014+02:00", "EventTime": "2023-10-30T14:03:40.099035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CconGC2cBlzj68wS41"]} -{"Format": "IDEA0", "ID": "32b95564-9962-4fef-ad2f-0d48931d890e", "DetectTime": "2023-10-30T14:03:40.141005+02:00", "EventTime": "2023-10-30T14:03:40.141027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CCX7Wo2J5R5NSQwvck"]} -{"Format": "IDEA0", "ID": "c1704161-ae8a-4dfc-95a5-2a525529f529", "DetectTime": "2023-10-30T14:03:40.193172+02:00", "EventTime": "2023-10-30T14:03:40.193191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.86.152.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.86.152.248 ", "ContentType": "text/plain"}], "uids": ["CSGvBZ2WZmILp3nKD1"]} -{"Format": "IDEA0", "ID": "335eb39f-aa70-4ae8-8de2-828e2b2f01e8", "DetectTime": "2023-10-30T14:03:40.242922+02:00", "EventTime": "2023-10-30T14:03:40.242943+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT2iNiIgy7MzjmWka"]} -{"Format": "IDEA0", "ID": "8769ef13-e63f-4ead-b621-98d9a5c329e3", "DetectTime": "2023-10-30T14:03:40.256158+02:00", "EventTime": "2023-10-30T14:03:40.256177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cz2rm41x45fpYvm459"]} -{"Format": "IDEA0", "ID": "2ebe726e-9c2f-49a7-8646-012cc5fa008b", "DetectTime": "2023-10-30T14:03:40.304493+02:00", "EventTime": "2023-10-30T14:03:40.304517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.152.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.152.71.4 ", "ContentType": "text/plain"}], "uids": ["CuyxTZEi6bNbQKzpl"]} -{"Format": "IDEA0", "ID": "5b92fbd5-2b9d-4104-9d36-a11077ed3bf7", "DetectTime": "2023-10-30T14:03:40.346461+02:00", "EventTime": "2023-10-30T14:03:40.346479+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CpDMlU2K0bMz1mB9Te"]} -{"Format": "IDEA0", "ID": "d9162a90-b527-40ea-a0e6-ddcc5157a0ef", "DetectTime": "2023-10-30T14:03:40.357874+02:00", "EventTime": "2023-10-30T14:03:40.357891+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHM1yB4wAsVetJW1Rj"]} -{"Format": "IDEA0", "ID": "841b3e44-a694-4a7e-94aa-1cc1dc9b5844", "DetectTime": "2023-10-30T14:03:40.370917+02:00", "EventTime": "2023-10-30T14:03:40.370937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.55.74.216 ", "ContentType": "text/plain"}], "uids": ["Cg1bwy3DC4fNoyVdl2"]} -{"Format": "IDEA0", "ID": "efe4fa30-074c-40e8-87db-18ece575d28d", "DetectTime": "2023-10-30T14:03:40.414979+02:00", "EventTime": "2023-10-30T14:03:40.415002+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKKca924MnE20O1rjk"]} -{"Format": "IDEA0", "ID": "4de345eb-5ab7-4ddf-9c79-4ed424041f35", "DetectTime": "2023-10-30T14:03:40.425205+02:00", "EventTime": "2023-10-30T14:03:40.425219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.95.5.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.95.5.153 ", "ContentType": "text/plain"}], "uids": ["CWMnxw1ujbVnmNozF1"]} -{"Format": "IDEA0", "ID": "08d5ca03-4397-46ea-9919-de19575fc353", "DetectTime": "2023-10-30T14:03:40.464977+02:00", "EventTime": "2023-10-30T14:03:40.465003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CvhEZF2qCIvq8coERf"]} -{"Format": "IDEA0", "ID": "ce9ba50f-fc48-41f7-8e6d-5cc46e03ede2", "DetectTime": "2023-10-30T14:03:40.503055+02:00", "EventTime": "2023-10-30T14:03:40.503075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CfOzyh1X4fWg0dxi0d"]} -{"Format": "IDEA0", "ID": "54c50805-90fc-444b-bb4f-abf73e7a740c", "DetectTime": "2023-10-30T14:03:40.543058+02:00", "EventTime": "2023-10-30T14:03:40.543083+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CM012o2XgkXjE7Op4g"]} -{"Format": "IDEA0", "ID": "000317e9-47fe-4efe-8c58-afd47416572b", "DetectTime": "2023-10-30T14:03:40.560057+02:00", "EventTime": "2023-10-30T14:03:40.560076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.157.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.157.47 ", "ContentType": "text/plain"}], "uids": ["CKICvQ3ufwC9Y8W865"]} -{"Format": "IDEA0", "ID": "ecf5d2ec-2f5c-46a5-a711-d855c8fbaee2", "DetectTime": "2023-10-30T14:03:40.597848+02:00", "EventTime": "2023-10-30T14:03:40.597873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.96.88.23"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.96.88.23 ", "ContentType": "text/plain"}], "uids": ["C2YDRkWLgSK0SATsh"]} -{"Format": "IDEA0", "ID": "26515b01-d9d7-442b-81d4-38e05d4eac5b", "DetectTime": "2023-10-30T14:03:40.639088+02:00", "EventTime": "2023-10-30T14:03:40.639114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.180.9.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.180.9.190 ", "ContentType": "text/plain"}], "uids": ["CuqTGs2B0B0NXBI95e"]} -{"Format": "IDEA0", "ID": "96da1e8b-4e97-4d77-af6a-cc865f3a72e4", "DetectTime": "2023-10-30T14:03:40.678828+02:00", "EventTime": "2023-10-30T14:03:40.678852+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZDqDo3qYexhue5JRh"]} -{"Format": "IDEA0", "ID": "d23de78b-32d3-4d94-8581-494f35b0aae6", "DetectTime": "2023-10-30T14:03:40.688460+02:00", "EventTime": "2023-10-30T14:03:40.688479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16383], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. ", "ContentType": "text/plain"}], "uids": ["CORxue2nNSm5v8GWSa"]} -{"Format": "IDEA0", "ID": "d732138a-5dd3-42cf-bc3c-6d931fbf97f2", "DetectTime": "2023-10-30T14:03:40.725845+02:00", "EventTime": "2023-10-30T14:03:40.725871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CT2iNiIgy7MzjmWka", "CM012o2XgkXjE7Op4g", "CHM1yB4wAsVetJW1Rj", "CwtysE1z9yVQvM9Fs4"]} -{"Format": "IDEA0", "ID": "6ec20d15-d0cb-4f00-90cc-207586cbf520", "DetectTime": "2023-10-30T14:03:40.739344+02:00", "EventTime": "2023-10-30T14:03:40.739367+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwtysE1z9yVQvM9Fs4"]} -{"Format": "IDEA0", "ID": "b8bcfb9d-78cb-4a3b-bece-b3232dca1f0f", "DetectTime": "2023-10-30T14:03:40.753282+02:00", "EventTime": "2023-10-30T14:03:40.753302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.32.225.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.32.225.38 ", "ContentType": "text/plain"}], "uids": ["CHu0kF4BVwYgHiaNJ6"]} -{"Format": "IDEA0", "ID": "a5277277-8faa-40b5-9552-26aee1a0b215", "DetectTime": "2023-10-30T14:03:40.794547+02:00", "EventTime": "2023-10-30T14:03:40.794564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["Cef5Mc2vmo1ssYAsT6"]} -{"Format": "IDEA0", "ID": "3c361d15-25c8-476e-a576-1034be71e2e1", "DetectTime": "2023-10-30T14:03:40.836401+02:00", "EventTime": "2023-10-30T14:03:40.836428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.109.54.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.109.54.54 ", "ContentType": "text/plain"}], "uids": ["CgzF2c11IZAuYImZva"]} -{"Format": "IDEA0", "ID": "44486e5b-b0a5-48b4-90d9-f212eb6d6548", "DetectTime": "2023-10-30T14:03:40.880039+02:00", "EventTime": "2023-10-30T14:03:40.880056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.239.118 ", "ContentType": "text/plain"}], "uids": ["CH7eze1ZO4OMaOtJj"]} -{"Format": "IDEA0", "ID": "86e90442-2fd4-4e0e-88ab-3f10f5f29d40", "DetectTime": "2023-10-30T14:03:40.921718+02:00", "EventTime": "2023-10-30T14:03:40.921735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["Cg5XLk1OXMnqGpLtJe"]} -{"Format": "IDEA0", "ID": "2bdf5c47-d4c4-42ea-bf89-7dae8062cebd", "DetectTime": "2023-10-30T14:03:40.963061+02:00", "EventTime": "2023-10-30T14:03:40.963079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.46.196.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.46.196.170 ", "ContentType": "text/plain"}], "uids": ["CQaTbF1HyQk11xW1th"]} -{"Format": "IDEA0", "ID": "b605d9fe-6538-4d79-a93d-1edec88b3b1a", "DetectTime": "2023-10-30T14:03:41.002817+02:00", "EventTime": "2023-10-30T14:03:41.002844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.31.105 ", "ContentType": "text/plain"}], "uids": ["CC17pG2xsNimC0pO52"]} -{"Format": "IDEA0", "ID": "e2cb3737-2e36-466c-bfb5-ef0521472e55", "DetectTime": "2023-10-30T14:03:41.043815+02:00", "EventTime": "2023-10-30T14:03:41.043833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.242.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.242.27 ", "ContentType": "text/plain"}], "uids": ["ClzLzfYmhkRWhEI48"]} -{"Format": "IDEA0", "ID": "477f30a4-b245-4108-882c-8fd7c3df046d", "DetectTime": "2023-10-30T14:03:41.081082+02:00", "EventTime": "2023-10-30T14:03:41.081102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.45.73.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.45.73.57 ", "ContentType": "text/plain"}], "uids": ["CWLfZMePFfYDIysVd"]} -{"Format": "IDEA0", "ID": "a2866aab-b98f-4b3b-932c-fd4afa0601ef", "DetectTime": "2023-10-30T14:03:41.113248+02:00", "EventTime": "2023-10-30T14:03:41.113271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["CgjF6rQIAJQr9vlnh"]} -{"Format": "IDEA0", "ID": "9d986db5-6f69-4222-ae24-07ec2d28842d", "DetectTime": "2023-10-30T14:03:41.146360+02:00", "EventTime": "2023-10-30T14:03:41.146386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CsBkCg1RSnkxqz9Bf4"]} -{"Format": "IDEA0", "ID": "3afa7045-c56d-4bf2-b7f5-af8b71f97f8b", "DetectTime": "2023-10-30T14:03:41.180513+02:00", "EventTime": "2023-10-30T14:03:41.180532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CWm8kRKxybnSg6w47"]} -{"Format": "IDEA0", "ID": "c0ba4a6e-3627-4726-85fa-3eb799a0c9ce", "DetectTime": "2023-10-30T14:03:41.214037+02:00", "EventTime": "2023-10-30T14:03:41.214057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.15.146.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.15.146.190 ", "ContentType": "text/plain"}], "uids": ["CxoCYn2uR6fDWryPb7"]} -{"Format": "IDEA0", "ID": "608743ba-061b-4e48-b488-3465e229efb2", "DetectTime": "2023-10-30T14:03:41.246643+02:00", "EventTime": "2023-10-30T14:03:41.246661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["Ckmh4311EjcJMm2gRa"]} -{"Format": "IDEA0", "ID": "2c32905e-5bfe-477f-bbf8-957ce45460e7", "DetectTime": "2023-10-30T14:03:41.280090+02:00", "EventTime": "2023-10-30T14:03:41.280102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.156.246.70"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.156.246.70 ", "ContentType": "text/plain"}], "uids": ["CjBurP3ux2khfq4qy1"]} -{"Format": "IDEA0", "ID": "446573e4-cb51-4ba6-8942-8f589086b1d4", "DetectTime": "2023-10-30T14:03:41.312516+02:00", "EventTime": "2023-10-30T14:03:41.312541+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cdf3IF1dgGQyCnUMs6"]} -{"Format": "IDEA0", "ID": "c6bd17bc-f86a-4024-b0e6-3d6fc13fe31a", "DetectTime": "2023-10-30T14:03:41.322992+02:00", "EventTime": "2023-10-30T14:03:41.323012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.199.189.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.199.189.5 ", "ContentType": "text/plain"}], "uids": ["Cwk4i543R63WngOo88"]} -{"Format": "IDEA0", "ID": "1b04ff30-1846-46e9-b0f4-8d64bb10e178", "DetectTime": "2023-10-30T14:03:41.358649+02:00", "EventTime": "2023-10-30T14:03:41.358666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CJdrUL1UOoctcqQ9a"]} -{"Format": "IDEA0", "ID": "0fe8657a-f244-4258-9994-d52486a94d2b", "DetectTime": "2023-10-30T14:03:41.393193+02:00", "EventTime": "2023-10-30T14:03:41.393212+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHWPCi49fuOUGl9Ma"]} -{"Format": "IDEA0", "ID": "dc5a25fc-ba16-480b-be99-51582a5b40b0", "DetectTime": "2023-10-30T14:03:41.403766+02:00", "EventTime": "2023-10-30T14:03:41.403781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CNBLQo26bpZFUQESak"]} -{"Format": "IDEA0", "ID": "8e848ab8-53c9-43da-8849-e4b49752711f", "DetectTime": "2023-10-30T14:03:41.438294+02:00", "EventTime": "2023-10-30T14:03:41.438315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CdeamycZq8OF8OPJ1"]} -{"Format": "IDEA0", "ID": "fff7b050-3ccd-497c-b701-9a3459a7167d", "DetectTime": "2023-10-30T14:03:41.473827+02:00", "EventTime": "2023-10-30T14:03:41.473846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.20.208.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.20.208.20 ", "ContentType": "text/plain"}], "uids": ["Cn9xknJE5tC5hmU1j"]} -{"Format": "IDEA0", "ID": "cc251c43-4e1a-48b7-b89a-de84cdbd3a8a", "DetectTime": "2023-10-30T14:03:41.508022+02:00", "EventTime": "2023-10-30T14:03:41.508045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.14.83.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.14.83.159 ", "ContentType": "text/plain"}], "uids": ["Cy8gN744UrIkOkiQZ6"]} -{"Format": "IDEA0", "ID": "e4f14ebb-b163-4afb-8d1f-de13ae03bae5", "DetectTime": "2023-10-30T14:03:41.543607+02:00", "EventTime": "2023-10-30T14:03:41.543621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.60.83.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.60.83.242 ", "ContentType": "text/plain"}], "uids": ["CgcyuE4xZyy7VQm0ii"]} -{"Format": "IDEA0", "ID": "89d72278-dd95-42a7-9604-8f18679e729a", "DetectTime": "2023-10-30T14:03:41.579508+02:00", "EventTime": "2023-10-30T14:03:41.579525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["Cdhufm4vxAbpg3P848"]} -{"Format": "IDEA0", "ID": "7f67ee16-1ad5-40de-bfe8-a7c38163de8b", "DetectTime": "2023-10-30T14:03:41.614115+02:00", "EventTime": "2023-10-30T14:03:41.614136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.77.23.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.77.23.90 ", "ContentType": "text/plain"}], "uids": ["CCGsXb4zXoyAAQBaVb"]} -{"Format": "IDEA0", "ID": "a5b10186-85f7-497d-a7d4-acd33948f471", "DetectTime": "2023-10-30T14:03:41.648997+02:00", "EventTime": "2023-10-30T14:03:41.649014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFBET82A0KR77vV7z2"]} -{"Format": "IDEA0", "ID": "6330f93f-0b8f-490a-869f-fb0b302bec96", "DetectTime": "2023-10-30T14:03:41.659894+02:00", "EventTime": "2023-10-30T14:03:41.659917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["CWDMN33D7pIswFF6X3"]} -{"Format": "IDEA0", "ID": "160d2b42-2c8a-4824-81fa-141eaf81cfc0", "DetectTime": "2023-10-30T14:03:41.693599+02:00", "EventTime": "2023-10-30T14:03:41.693613+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxTLhY19mHic69Ui8a"]} -{"Format": "IDEA0", "ID": "fa77bf50-cd9c-40c3-932f-7a17a9e0eb0b", "DetectTime": "2023-10-30T14:03:41.703841+02:00", "EventTime": "2023-10-30T14:03:41.703866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CJzRbC1O0FprEq5Luh"]} -{"Format": "IDEA0", "ID": "2d6380d7-81e9-4ea5-ae04-114933868875", "DetectTime": "2023-10-30T14:03:41.736812+02:00", "EventTime": "2023-10-30T14:03:41.736831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.181.208"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.181.208 ", "ContentType": "text/plain"}], "uids": ["COlwDfh3IQg9hutFa"]} -{"Format": "IDEA0", "ID": "37ce0912-b1b0-4909-b228-ed465aaffb69", "DetectTime": "2023-10-30T14:03:41.771514+02:00", "EventTime": "2023-10-30T14:03:41.771534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.199.106.53 ", "ContentType": "text/plain"}], "uids": ["CaoB9u1dtTchh4Fs36"]} -{"Format": "IDEA0", "ID": "99bbd712-3b1b-4d94-868c-f814acc795c3", "DetectTime": "2023-10-30T14:03:41.806953+02:00", "EventTime": "2023-10-30T14:03:41.806975+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFv6i61VWdR28WwDqi"]} -{"Format": "IDEA0", "ID": "b4b729e6-1286-4bac-b094-3b69509d026a", "DetectTime": "2023-10-30T14:03:41.818233+02:00", "EventTime": "2023-10-30T14:03:41.818257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.29.55.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.29.55.105 ", "ContentType": "text/plain"}], "uids": ["CxK4Yi298OZ3CJFmD7"]} -{"Format": "IDEA0", "ID": "17042bb5-13d4-473f-90e2-93339597b826", "DetectTime": "2023-10-30T14:03:41.850223+02:00", "EventTime": "2023-10-30T14:03:41.850242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C18XNt41Y75CY7uslk"]} -{"Format": "IDEA0", "ID": "cff60513-4832-4f7c-ba10-41a72d103201", "DetectTime": "2023-10-30T14:03:41.884749+02:00", "EventTime": "2023-10-30T14:03:41.884774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.44.21.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.44.21.6 ", "ContentType": "text/plain"}], "uids": ["CrjwEl4HnZNrhfWlH"]} -{"Format": "IDEA0", "ID": "5d1e700e-8ded-49b0-a2f1-01e68a472abe", "DetectTime": "2023-10-30T14:03:41.918979+02:00", "EventTime": "2023-10-30T14:03:41.919003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.3.142.198 ", "ContentType": "text/plain"}], "uids": ["Cbt1k44Q6NEmGvU5I3"]} -{"Format": "IDEA0", "ID": "3e64a8f7-64bc-42cf-9a72-998898132d7c", "DetectTime": "2023-10-30T14:03:41.956516+02:00", "EventTime": "2023-10-30T14:03:41.956530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.251.230.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.251.230.161 ", "ContentType": "text/plain"}], "uids": ["CYDSFAsbv7xrUYyN6"]} -{"Format": "IDEA0", "ID": "cc39f5b0-5f92-4b6f-b4c1-7bd9dba35416", "DetectTime": "2023-10-30T14:03:41.993515+02:00", "EventTime": "2023-10-30T14:03:41.993535+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CCba7Q192PftgzZLO3"]} -{"Format": "IDEA0", "ID": "d0d60259-f9ea-4934-9b14-fa6b948cca34", "DetectTime": "2023-10-30T14:03:42.004840+02:00", "EventTime": "2023-10-30T14:03:42.004860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.22.196.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.22.196.69 ", "ContentType": "text/plain"}], "uids": ["CHdjyy0s11hDBw3Pe"]} -{"Format": "IDEA0", "ID": "d2cb06e0-02b7-4795-a285-46d9ada3e11d", "DetectTime": "2023-10-30T14:03:42.040157+02:00", "EventTime": "2023-10-30T14:03:42.040179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.69.218.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.69.218.77 ", "ContentType": "text/plain"}], "uids": ["C4N1dC4DozfxIJEaE9"]} -{"Format": "IDEA0", "ID": "ce6ea9c7-4a51-4677-99d7-4c5edf950d66", "DetectTime": "2023-10-30T14:03:42.074961+02:00", "EventTime": "2023-10-30T14:03:42.074986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.48.10.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.48.10.93 ", "ContentType": "text/plain"}], "uids": ["C9Xch61JD5kQ4Zpscl"]} -{"Format": "IDEA0", "ID": "4a7fa9d3-f901-4bf6-8154-2a5f9f13b506", "DetectTime": "2023-10-30T14:03:42.108866+02:00", "EventTime": "2023-10-30T14:03:42.108879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.147.34.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.147.34.12 ", "ContentType": "text/plain"}], "uids": ["CHTpFo43jgo5Mclum"]} -{"Format": "IDEA0", "ID": "7fa1fab3-095f-4876-ada9-4dd8d34e7d71", "DetectTime": "2023-10-30T14:03:42.142168+02:00", "EventTime": "2023-10-30T14:03:42.142186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.250.191"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.250.191 ", "ContentType": "text/plain"}], "uids": ["CgcTvxc8Ed87n59n6"]} -{"Format": "IDEA0", "ID": "0758a1a8-7458-433e-9129-c1c369ee556d", "DetectTime": "2023-10-30T14:03:42.177322+02:00", "EventTime": "2023-10-30T14:03:42.177343+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Clqx6D33q6u3Tsguke"]} -{"Format": "IDEA0", "ID": "1be7edcb-38fa-435d-a925-ea015386d00c", "DetectTime": "2023-10-30T14:03:42.188740+02:00", "EventTime": "2023-10-30T14:03:42.188797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.64.171.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.64.171.254 ", "ContentType": "text/plain"}], "uids": ["Ckz0rh1nfICcc5aGMg"]} -{"Format": "IDEA0", "ID": "f2d57adb-1eb0-4bab-8bea-c0e4efba3b41", "DetectTime": "2023-10-30T14:03:42.225146+02:00", "EventTime": "2023-10-30T14:03:42.225167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CxTLhY19mHic69Ui8a", "CHWPCi49fuOUGl9Ma", "CCba7Q192PftgzZLO3", "CSoEUM1e7Q15prBZv7"]} -{"Format": "IDEA0", "ID": "8d39438d-448f-4cf3-8a44-bf09384d5c10", "DetectTime": "2023-10-30T14:03:42.236813+02:00", "EventTime": "2023-10-30T14:03:42.236832+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSoEUM1e7Q15prBZv7"]} -{"Format": "IDEA0", "ID": "8a35aba3-2481-46e6-931e-211fb8a25bb6", "DetectTime": "2023-10-30T14:03:42.339677+02:00", "EventTime": "2023-10-30T14:03:42.339695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.103.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.103.145 ", "ContentType": "text/plain"}], "uids": ["CroFLl3hrmck9k9xp3"]} -{"Format": "IDEA0", "ID": "c6bac2f2-b916-4b89-807c-39d7025cce6e", "DetectTime": "2023-10-30T14:03:42.380606+02:00", "EventTime": "2023-10-30T14:03:42.380625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.167.175.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.167.175.79 ", "ContentType": "text/plain"}], "uids": ["Cer1tt4mxrQtf9wx29"]} -{"Format": "IDEA0", "ID": "89a69f01-81bb-4af0-81c2-664b6309603e", "DetectTime": "2023-10-30T14:03:42.419909+02:00", "EventTime": "2023-10-30T14:03:42.419934+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWP5h74zGwvJMOVVA2"]} -{"Format": "IDEA0", "ID": "98d70c0a-9bd4-48c5-98ed-490c6c89dd2a", "DetectTime": "2023-10-30T14:03:42.433136+02:00", "EventTime": "2023-10-30T14:03:42.433155+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cajhn74U4U8sf7oML9"]} -{"Format": "IDEA0", "ID": "56f1ea81-9297-42a3-9659-65898a8e0387", "DetectTime": "2023-10-30T14:03:42.446802+02:00", "EventTime": "2023-10-30T14:03:42.446819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.0.121.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.0.121.12 ", "ContentType": "text/plain"}], "uids": ["CFs9ro15ZFCEx0ylBf"]} -{"Format": "IDEA0", "ID": "17b091b7-524c-4fa6-8929-f98a90db677d", "DetectTime": "2023-10-30T14:03:42.487641+02:00", "EventTime": "2023-10-30T14:03:42.487658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.89.101.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.89.101.100 ", "ContentType": "text/plain"}], "uids": ["CheSoz4UJ5aEI8m5A3"]} -{"Format": "IDEA0", "ID": "ca4c8525-03a8-4934-bd62-6a2008aa0a5f", "DetectTime": "2023-10-30T14:03:42.527237+02:00", "EventTime": "2023-10-30T14:03:42.527254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.92.21.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.92.21.212 ", "ContentType": "text/plain"}], "uids": ["CdX9tr1RFw4sdjqTta"]} -{"Format": "IDEA0", "ID": "e8118891-2307-42d4-86da-b06dbd8276f9", "DetectTime": "2023-10-30T14:03:42.567061+02:00", "EventTime": "2023-10-30T14:03:42.567078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["27.7.36.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 27.7.36.130 ", "ContentType": "text/plain"}], "uids": ["CH8WmB1JrSrQBc32Ci"]} -{"Format": "IDEA0", "ID": "e0679fe8-3ba2-4113-9370-31dac883039a", "DetectTime": "2023-10-30T14:03:42.610374+02:00", "EventTime": "2023-10-30T14:03:42.610403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CuLPRg4B4nk7Nhcy1l"]} -{"Format": "IDEA0", "ID": "a9fd81fe-6cef-44e2-86a7-eaa1b2658e9f", "DetectTime": "2023-10-30T14:03:42.652458+02:00", "EventTime": "2023-10-30T14:03:42.652480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["Cfkf2U22mo5DKrUHL1"]} -{"Format": "IDEA0", "ID": "b3f79e6d-0cdf-4bc2-b33b-360d39a39c48", "DetectTime": "2023-10-30T14:03:42.692567+02:00", "EventTime": "2023-10-30T14:03:42.692595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["CGCQX2Ar1JQNltcy6"]} -{"Format": "IDEA0", "ID": "50c2c28e-c586-4d85-b307-6f732456e48e", "DetectTime": "2023-10-30T14:03:42.736506+02:00", "EventTime": "2023-10-30T14:03:42.736532+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CywzkfLnhfhTCdOW7"]} -{"Format": "IDEA0", "ID": "edcb358e-d116-46ce-b822-2e56ccd3bfa4", "DetectTime": "2023-10-30T14:03:42.749340+02:00", "EventTime": "2023-10-30T14:03:42.749358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["CzPnv54GQ4omxrCnej"]} -{"Format": "IDEA0", "ID": "476aca15-5230-4b9e-837b-1669bce18edf", "DetectTime": "2023-10-30T14:03:42.793332+02:00", "EventTime": "2023-10-30T14:03:42.793353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.224.186.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.224.186.241 ", "ContentType": "text/plain"}], "uids": ["ClFs9g1VOEXwjtQxOg"]} -{"Format": "IDEA0", "ID": "4b91251a-d9d6-4e28-8739-d4245d831422", "DetectTime": "2023-10-30T14:03:42.835840+02:00", "EventTime": "2023-10-30T14:03:42.835857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["Ct1ei74XMBdHSLt1Bf"]} -{"Format": "IDEA0", "ID": "9eba88e6-28d3-40b2-9704-58843f3976d7", "DetectTime": "2023-10-30T14:03:42.876079+02:00", "EventTime": "2023-10-30T14:03:42.876097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["C0D7Wy1NWPqIGVPK1g"]} -{"Format": "IDEA0", "ID": "5f1d3c6e-017c-4b19-aba3-4593e97dcddf", "DetectTime": "2023-10-30T14:03:42.917307+02:00", "EventTime": "2023-10-30T14:03:42.917329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C8CVBSUxS2k10e2w"]} -{"Format": "IDEA0", "ID": "635ea13c-4ad7-450f-bf75-31e30d9479be", "DetectTime": "2023-10-30T14:03:42.960691+02:00", "EventTime": "2023-10-30T14:03:42.960710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.252.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.252.29 ", "ContentType": "text/plain"}], "uids": ["CoGaIe1oR4O8WizuPk"]} -{"Format": "IDEA0", "ID": "422d233b-0fee-4bd7-b99e-49094c93f582", "DetectTime": "2023-10-30T14:03:43.001947+02:00", "EventTime": "2023-10-30T14:03:43.001971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.5.179.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.5.179.11 ", "ContentType": "text/plain"}], "uids": ["CTg6601izhbSahP6ti"]} -{"Format": "IDEA0", "ID": "800c8270-ca38-4930-bcd4-b823e048058a", "DetectTime": "2023-10-30T14:03:43.044257+02:00", "EventTime": "2023-10-30T14:03:43.044283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.10.62 ", "ContentType": "text/plain"}], "uids": ["COEhIbxG8JBejBasa"]} -{"Format": "IDEA0", "ID": "bb49918b-a83b-4fd4-ba2a-ad969547a742", "DetectTime": "2023-10-30T14:03:43.083307+02:00", "EventTime": "2023-10-30T14:03:43.083324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.28.186.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.28.186.79 ", "ContentType": "text/plain"}], "uids": ["C2GC7JMsQRway8Ic6"]} -{"Format": "IDEA0", "ID": "86f1a86f-5a93-45c2-8810-c5ba0a0f56df", "DetectTime": "2023-10-30T14:03:43.125193+02:00", "EventTime": "2023-10-30T14:03:43.125212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["ClFrGx35hhgSIU3cR1"]} -{"Format": "IDEA0", "ID": "19d0bf4b-f510-49e2-bd89-013176651edb", "DetectTime": "2023-10-30T14:03:43.165965+02:00", "EventTime": "2023-10-30T14:03:43.165988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["CqgaVt2aed44R1Kx02"]} -{"Format": "IDEA0", "ID": "96489810-370a-4ec4-a519-b5406129d88e", "DetectTime": "2023-10-30T14:03:43.208850+02:00", "EventTime": "2023-10-30T14:03:43.208874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.133.70.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.133.70.14 ", "ContentType": "text/plain"}], "uids": ["C1XnP13ACi3N51HIU1"]} -{"Format": "IDEA0", "ID": "17f526b1-f4f5-4f06-812c-cdd75006a871", "DetectTime": "2023-10-30T14:03:43.249424+02:00", "EventTime": "2023-10-30T14:03:43.249448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.3.9.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.3.9.124 ", "ContentType": "text/plain"}], "uids": ["CVYAKp3w6afQhFEuQ2"]} -{"Format": "IDEA0", "ID": "9c66ca45-e8dc-4c51-8ec2-8e773fc3a6d2", "DetectTime": "2023-10-30T14:03:43.288349+02:00", "EventTime": "2023-10-30T14:03:43.288373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.132.152.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.132.152.76 ", "ContentType": "text/plain"}], "uids": ["CgY8BljIGL2tAhLMg"]} -{"Format": "IDEA0", "ID": "62db07b4-9f69-4f8f-ad78-342be051a3b7", "DetectTime": "2023-10-30T14:03:43.330173+02:00", "EventTime": "2023-10-30T14:03:43.330193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.64.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.64.158 ", "ContentType": "text/plain"}], "uids": ["C1JyKzGkd2LVYhaWe"]} -{"Format": "IDEA0", "ID": "75f50073-dc0d-4d5e-ab5e-24bbc1dd7c6c", "DetectTime": "2023-10-30T14:03:43.370230+02:00", "EventTime": "2023-10-30T14:03:43.370256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["120.63.10.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 120.63.10.102 ", "ContentType": "text/plain"}], "uids": ["CAoV6c3RQjoYsnbWhl"]} -{"Format": "IDEA0", "ID": "fe637f59-15c0-4683-a584-98a510e68040", "DetectTime": "2023-10-30T14:03:43.409386+02:00", "EventTime": "2023-10-30T14:03:43.409407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.195.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.195.190 ", "ContentType": "text/plain"}], "uids": ["C3gYIhqoFtEZt9XZ6"]} -{"Format": "IDEA0", "ID": "24c67ef9-4b34-4d7d-a771-a14cc1d6b3b3", "DetectTime": "2023-10-30T14:03:43.451800+02:00", "EventTime": "2023-10-30T14:03:43.451817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.64.144.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.64.144.26 ", "ContentType": "text/plain"}], "uids": ["CvAZ1QnQmHWSC6KUb"]} -{"Format": "IDEA0", "ID": "bbd9d86a-d97b-4677-b27c-94f1a39a3e21", "DetectTime": "2023-10-30T14:03:43.490422+02:00", "EventTime": "2023-10-30T14:03:43.490448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.223.54.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.223.54.21 ", "ContentType": "text/plain"}], "uids": ["CDP4Ne4sJuXHfWR7Mg"]} -{"Format": "IDEA0", "ID": "547f8fea-a1e0-4c41-afcb-183a45480eaf", "DetectTime": "2023-10-30T14:03:43.528754+02:00", "EventTime": "2023-10-30T14:03:43.528922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.149.104.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.149.104.193 ", "ContentType": "text/plain"}], "uids": ["CvjyxYoP4gW4AAiic"]} -{"Format": "IDEA0", "ID": "bac02fbe-2a83-4abb-bc8d-3a6e2954cb04", "DetectTime": "2023-10-30T14:03:43.569144+02:00", "EventTime": "2023-10-30T14:03:43.569172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CQ0dvh1mFgGdC03Vck"]} -{"Format": "IDEA0", "ID": "ee6b8edb-b15f-4777-a0ef-8301c4490cf0", "DetectTime": "2023-10-30T14:03:43.610921+02:00", "EventTime": "2023-10-30T14:03:43.610947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["CD6ubEmOi3I990l9i"]} -{"Format": "IDEA0", "ID": "a1cb7790-63b7-42bf-9bdc-63ad1a5dcaf1", "DetectTime": "2023-10-30T14:03:43.653697+02:00", "EventTime": "2023-10-30T14:03:43.653714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CgCM5t4yUzFeNa3jo"]} -{"Format": "IDEA0", "ID": "9c603bdf-f89a-4564-863d-1ff731e36edb", "DetectTime": "2023-10-30T14:03:43.687970+02:00", "EventTime": "2023-10-30T14:03:43.687987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CtLfHL1ssWNmYtW4mg"]} -{"Format": "IDEA0", "ID": "014408fa-678f-4738-8677-8553ed1582fe", "DetectTime": "2023-10-30T14:03:43.726543+02:00", "EventTime": "2023-10-30T14:03:43.726597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.241.253.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.241.253.218 ", "ContentType": "text/plain"}], "uids": ["Ctc48u28yCCMWNw9R9"]} -{"Format": "IDEA0", "ID": "f9e00473-22f9-4696-ab5a-d09fb5828dfa", "DetectTime": "2023-10-30T14:03:43.769768+02:00", "EventTime": "2023-10-30T14:03:43.769788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["CNqBZm4Lh5aGnnJey7"]} -{"Format": "IDEA0", "ID": "eea7de11-0f06-4ecc-abd7-751233c9b05a", "DetectTime": "2023-10-30T14:03:43.809410+02:00", "EventTime": "2023-10-30T14:03:43.809430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["Csyu8mUIKLcGJS223"]} -{"Format": "IDEA0", "ID": "36290314-12e7-4826-bcdb-df115ebec559", "DetectTime": "2023-10-30T14:03:43.851347+02:00", "EventTime": "2023-10-30T14:03:43.851373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.73.228.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.73.228.35 ", "ContentType": "text/plain"}], "uids": ["CDqKyi1aKuDFqyeOz6"]} -{"Format": "IDEA0", "ID": "e63ee5f8-56ed-42dd-a612-a22586784875", "DetectTime": "2023-10-30T14:03:43.897368+02:00", "EventTime": "2023-10-30T14:03:43.897396+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C5CcVy9aDwDmvsJXc"]} -{"Format": "IDEA0", "ID": "cd5cec81-ea5c-4550-a5d1-2d5705a10e1c", "DetectTime": "2023-10-30T14:03:43.906334+02:00", "EventTime": "2023-10-30T14:03:43.906352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.87.88.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.87.88.73 ", "ContentType": "text/plain"}], "uids": ["CAk78L3Tl1eXvNr295"]} -{"Format": "IDEA0", "ID": "0884307c-9a80-4d42-8e0d-1b7d67583371", "DetectTime": "2023-10-30T14:03:43.950400+02:00", "EventTime": "2023-10-30T14:03:43.950420+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C1ithl2lBn4Y7VH1D2"]} -{"Format": "IDEA0", "ID": "670ca0bc-e2bd-4b09-bfd9-b387c97556cd", "DetectTime": "2023-10-30T14:03:43.959927+02:00", "EventTime": "2023-10-30T14:03:43.960089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.185.46.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.185.46.132 ", "ContentType": "text/plain"}], "uids": ["CDbbbA4zf3nQ0IqwPk"]} -{"Format": "IDEA0", "ID": "6400c7a4-5183-4acc-89b0-56391150d3cb", "DetectTime": "2023-10-30T14:03:44.000806+02:00", "EventTime": "2023-10-30T14:03:44.000834+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CidOay2wMXgk0t0WT8"]} -{"Format": "IDEA0", "ID": "0b2a9f5e-409f-4419-b2d0-5683d7887110", "DetectTime": "2023-10-30T14:03:44.008642+02:00", "EventTime": "2023-10-30T14:03:44.008656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.250.36.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.250.36.53 ", "ContentType": "text/plain"}], "uids": ["C94Hxi2tQUqWymrqbc"]} -{"Format": "IDEA0", "ID": "b17f8b5d-ff70-4efc-b769-89703b84271f", "DetectTime": "2023-10-30T14:03:44.043756+02:00", "EventTime": "2023-10-30T14:03:44.043779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CtklSc46DG4581VCA2"]} -{"Format": "IDEA0", "ID": "b29d2870-2bc8-46ad-bf53-3f00694da439", "DetectTime": "2023-10-30T14:03:44.078793+02:00", "EventTime": "2023-10-30T14:03:44.078815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["CDYhXr3s8zJOwRRkWi"]} -{"Format": "IDEA0", "ID": "68275a65-3efa-4b48-b84d-dfdff8f324f5", "DetectTime": "2023-10-30T14:03:44.112664+02:00", "EventTime": "2023-10-30T14:03:44.112680+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJpRXi4ibijivdGagj"]} -{"Format": "IDEA0", "ID": "63f354ce-5099-4a68-9d8f-e8cb125cc326", "DetectTime": "2023-10-30T14:03:44.120972+02:00", "EventTime": "2023-10-30T14:03:44.120992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.240.31.91 ", "ContentType": "text/plain"}], "uids": ["C9C4D01k3E1C9uVJp2"]} -{"Format": "IDEA0", "ID": "6f2ab5ce-44e4-4de2-9c4e-e1f828d5090b", "DetectTime": "2023-10-30T14:03:44.157257+02:00", "EventTime": "2023-10-30T14:03:44.157278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CKyf9Ijp93sYsxALi"]} -{"Format": "IDEA0", "ID": "daedc24a-40ec-457a-8255-a7442e95367b", "DetectTime": "2023-10-30T14:03:44.187770+02:00", "EventTime": "2023-10-30T14:03:44.187791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CnpT9mtnJCU0BmE5i"]} -{"Format": "IDEA0", "ID": "870f91d9-f27c-43bb-b84b-105894099d9a", "DetectTime": "2023-10-30T14:03:44.219571+02:00", "EventTime": "2023-10-30T14:03:44.219595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.99.162 ", "ContentType": "text/plain"}], "uids": ["C1lkYr4DiKBWVWvMC5"]} -{"Format": "IDEA0", "ID": "c056c63c-f9bc-49d7-87c7-e675cd11a41b", "DetectTime": "2023-10-30T14:03:44.248063+02:00", "EventTime": "2023-10-30T14:03:44.248082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CYuMsKxGI5ldEGKn1"]} -{"Format": "IDEA0", "ID": "e387cafd-4d6a-4898-9ee9-d23956e9e0a4", "DetectTime": "2023-10-30T14:03:44.276932+02:00", "EventTime": "2023-10-30T14:03:44.276951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.73.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.97.73.133 ", "ContentType": "text/plain"}], "uids": ["CPrOuLGNaa2BbUTP6"]} -{"Format": "IDEA0", "ID": "a7d4b79b-d75c-4200-9e79-49904db72226", "DetectTime": "2023-10-30T14:03:44.311144+02:00", "EventTime": "2023-10-30T14:03:44.311168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.234.117.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.234.117.98 ", "ContentType": "text/plain"}], "uids": ["CCeq8H9ND7TN8stbj"]} -{"Format": "IDEA0", "ID": "a245387d-005b-4769-9499-33e8218cba90", "DetectTime": "2023-10-30T14:03:44.348340+02:00", "EventTime": "2023-10-30T14:03:44.348365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["CGUpvo2pfINNsbAbai"]} -{"Format": "IDEA0", "ID": "fbb784c7-b337-4474-9bc9-ac5a2fd74447", "DetectTime": "2023-10-30T14:03:44.382199+02:00", "EventTime": "2023-10-30T14:03:44.382216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.118.30.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.118.30.94 ", "ContentType": "text/plain"}], "uids": ["CFa1oC4w7QhgyYjfpf"]} -{"Format": "IDEA0", "ID": "b2676164-ce5d-4590-904d-bed1f501e186", "DetectTime": "2023-10-30T14:03:44.500220+02:00", "EventTime": "2023-10-30T14:03:44.500238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CB2p6jNdY9X9SxFz4"]} -{"Format": "IDEA0", "ID": "ce41964b-e848-4fc1-9652-8416c7ce4861", "DetectTime": "2023-10-30T14:03:44.535513+02:00", "EventTime": "2023-10-30T14:03:44.535529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.179.199.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.179.199.81 ", "ContentType": "text/plain"}], "uids": ["CSSKpCZIm04RzA2We"]} -{"Format": "IDEA0", "ID": "63ae1d2d-525c-4449-8c99-8e8dd43c93d6", "DetectTime": "2023-10-30T14:03:44.575112+02:00", "EventTime": "2023-10-30T14:03:44.575132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CRoGN71R8ERmhgcDC5"]} -{"Format": "IDEA0", "ID": "27af8556-0f97-4fde-95e1-7da323fc75b3", "DetectTime": "2023-10-30T14:03:44.608984+02:00", "EventTime": "2023-10-30T14:03:44.609010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["CvkIgb3Wy3Zzp1SDSj"]} -{"Format": "IDEA0", "ID": "6b2141dd-5f34-434c-8dfa-820efab814b1", "DetectTime": "2023-10-30T14:03:44.644371+02:00", "EventTime": "2023-10-30T14:03:44.644392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CMBX3c2hJV8rcrnPre"]} -{"Format": "IDEA0", "ID": "437eba05-a4e5-413e-9697-dd25c1c692f3", "DetectTime": "2023-10-30T14:03:44.679350+02:00", "EventTime": "2023-10-30T14:03:44.679375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CZ1dGA4y6HlkIkWqGh"]} -{"Format": "IDEA0", "ID": "894f5e9a-daec-4d89-8d23-810425b19375", "DetectTime": "2023-10-30T14:03:44.713687+02:00", "EventTime": "2023-10-30T14:03:44.713703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C36wdN182ygInkYj26"]} -{"Format": "IDEA0", "ID": "22f10f4a-abca-475d-b2b9-e5154bba1945", "DetectTime": "2023-10-30T14:03:44.749525+02:00", "EventTime": "2023-10-30T14:03:44.749551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["C1tt8H1i9JWIvI45P7"]} -{"Format": "IDEA0", "ID": "b8e10f24-4933-4ad6-9a32-662d357ec9bc", "DetectTime": "2023-10-30T14:03:44.787303+02:00", "EventTime": "2023-10-30T14:03:44.787320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CnwTBH1MU6xOBeXlcd"]} -{"Format": "IDEA0", "ID": "7d667906-592a-4e51-8743-437f77b2c14b", "DetectTime": "2023-10-30T14:03:44.829642+02:00", "EventTime": "2023-10-30T14:03:44.829666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.51.77.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.51.77.103 ", "ContentType": "text/plain"}], "uids": ["CXe9jb4zoN2335DrO8"]} -{"Format": "IDEA0", "ID": "23a890a3-b45b-4f4b-9c9f-35f9af20f9e2", "DetectTime": "2023-10-30T14:03:44.873281+02:00", "EventTime": "2023-10-30T14:03:44.873306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CJ9dLA1AzyKX6MzPA8"]} -{"Format": "IDEA0", "ID": "78deb351-e96f-43ba-b0ef-f4dc8a608dc8", "DetectTime": "2023-10-30T14:03:44.904165+02:00", "EventTime": "2023-10-30T14:03:44.904186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cla8oq4SYa2XewM9t7"]} -{"Format": "IDEA0", "ID": "0fecb212-1128-4830-8313-411b1f3be93f", "DetectTime": "2023-10-30T14:03:44.943905+02:00", "EventTime": "2023-10-30T14:03:44.943923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.162.184.60 ", "ContentType": "text/plain"}], "uids": ["CLPBZp2sFV9ryOXVQd"]} -{"Format": "IDEA0", "ID": "b33b34ec-e0ce-48c2-95d6-a06fe4262a03", "DetectTime": "2023-10-30T14:03:44.981033+02:00", "EventTime": "2023-10-30T14:03:44.981168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CATJI62lwaISVM1F3i"]} -{"Format": "IDEA0", "ID": "e7703564-740c-4469-ba08-657330bfa32b", "DetectTime": "2023-10-30T14:03:45.018382+02:00", "EventTime": "2023-10-30T14:03:45.018405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CFpclk1VYfwhdpi7N2"]} -{"Format": "IDEA0", "ID": "90ed46c6-2c82-4a08-a8ec-699cff30bbaf", "DetectTime": "2023-10-30T14:03:45.051471+02:00", "EventTime": "2023-10-30T14:03:45.051488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["CX3ekU2MXpWZIsfz09"]} -{"Format": "IDEA0", "ID": "cacf112f-2a71-4d16-a03d-8c0083a2064b", "DetectTime": "2023-10-30T14:03:45.090450+02:00", "EventTime": "2023-10-30T14:03:45.090474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CBHlYI3p6TcOCgDG68"]} -{"Format": "IDEA0", "ID": "a96fbe19-1666-4e6a-ad77-301416bbc0df", "DetectTime": "2023-10-30T14:03:45.123441+02:00", "EventTime": "2023-10-30T14:03:45.123458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.199.106.53 ", "ContentType": "text/plain"}], "uids": ["CwfeC03VszvqLLkrXg"]} -{"Format": "IDEA0", "ID": "a2726ecd-4c5b-43ce-9c68-68595f6bcce3", "DetectTime": "2023-10-30T14:03:45.156690+02:00", "EventTime": "2023-10-30T14:03:45.156706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.93.155.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.93.155.18 ", "ContentType": "text/plain"}], "uids": ["CkVhjS1vvHr3uEJmx4"]} -{"Format": "IDEA0", "ID": "e2885713-778a-4561-9a70-1a731a69c2bc", "DetectTime": "2023-10-30T14:03:45.197136+02:00", "EventTime": "2023-10-30T14:03:45.197155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CUKXlUvCSzWJA5PE1"]} -{"Format": "IDEA0", "ID": "7f902569-da2b-4788-86c1-1e3f7fc2b5a6", "DetectTime": "2023-10-30T14:03:45.231810+02:00", "EventTime": "2023-10-30T14:03:45.231836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CUvklb2NLVcs9p0Cbf"]} -{"Format": "IDEA0", "ID": "62c5fc52-bd97-4fa7-b260-c91f1c96bf7c", "DetectTime": "2023-10-30T14:03:45.278897+02:00", "EventTime": "2023-10-30T14:03:45.278915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CdNbcC1teIT84gLgBg"]} -{"Format": "IDEA0", "ID": "f48b80d3-4805-4d23-b520-99be18cc674f", "DetectTime": "2023-10-30T14:03:45.314575+02:00", "EventTime": "2023-10-30T14:03:45.314598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKXadN1BDIxLy1bEP3"]} -{"Format": "IDEA0", "ID": "840a8c3b-f56a-43b1-a6b7-f08c3654bb88", "DetectTime": "2023-10-30T14:03:45.348187+02:00", "EventTime": "2023-10-30T14:03:45.348203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CL73Q41ZsfXY9pFhW9"]} -{"Format": "IDEA0", "ID": "4ada33ae-2450-4fc4-a6e8-c89fd5dfa00f", "DetectTime": "2023-10-30T14:03:45.382509+02:00", "EventTime": "2023-10-30T14:03:45.382527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.31.105 ", "ContentType": "text/plain"}], "uids": ["CgEVD12mUbkdceaM3j"]} -{"Format": "IDEA0", "ID": "62bc351d-49a7-49a0-8813-0b718aacc272", "DetectTime": "2023-10-30T14:03:45.416078+02:00", "EventTime": "2023-10-30T14:03:45.416095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CgZkLf3CfJTMepWpPj"]} -{"Format": "IDEA0", "ID": "020f0ec4-8c35-402c-acbc-c714cd33b9d3", "DetectTime": "2023-10-30T14:03:45.447454+02:00", "EventTime": "2023-10-30T14:03:45.447474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.29.213.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.29.213.222 ", "ContentType": "text/plain"}], "uids": ["CdDOle1XSMt14PV7pl"]} -{"Format": "IDEA0", "ID": "b79c1d0f-4352-4c03-b757-793f5afd181c", "DetectTime": "2023-10-30T14:03:45.488205+02:00", "EventTime": "2023-10-30T14:03:45.488222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["CbkE0q4lPifkYCcKp3"]} -{"Format": "IDEA0", "ID": "c67faee7-6e58-451d-acda-ceb3f9964418", "DetectTime": "2023-10-30T14:03:45.523212+02:00", "EventTime": "2023-10-30T14:03:45.523231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.239.118 ", "ContentType": "text/plain"}], "uids": ["CuE2aMMAn3p41pkj"]} -{"Format": "IDEA0", "ID": "be058cbd-c519-4c62-8dc7-2032bab83912", "DetectTime": "2023-10-30T14:03:45.562626+02:00", "EventTime": "2023-10-30T14:03:45.562653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.69.218.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.69.218.77 ", "ContentType": "text/plain"}], "uids": ["CzdEqG184OgpmBB7Fa"]} -{"Format": "IDEA0", "ID": "563622bd-5ab3-4607-af81-1844d6fd5a06", "DetectTime": "2023-10-30T14:03:45.603092+02:00", "EventTime": "2023-10-30T14:03:45.603110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["COk6J01FIuw4C8oa3k"]} -{"Format": "IDEA0", "ID": "9bbc067f-32ed-4380-a780-b374cc105766", "DetectTime": "2023-10-30T14:03:45.646086+02:00", "EventTime": "2023-10-30T14:03:45.646111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.3.142.198 ", "ContentType": "text/plain"}], "uids": ["C8u9o7d1PVvgWxsXh"]} -{"Format": "IDEA0", "ID": "c3137750-4d46-403a-bec3-7f04df2dc7e2", "DetectTime": "2023-10-30T14:03:45.692513+02:00", "EventTime": "2023-10-30T14:03:45.692536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["Cjfetx4rYrgTIku5yj"]} -{"Format": "IDEA0", "ID": "e6df93db-293e-4fd1-a03d-be3f4248ac4f", "DetectTime": "2023-10-30T14:03:45.732622+02:00", "EventTime": "2023-10-30T14:03:45.732697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cmvtj63OnzQ83ywkwh"]} -{"Format": "IDEA0", "ID": "769619e0-aab2-445e-8ac2-a82c7b52b77b", "DetectTime": "2023-10-30T14:03:45.778160+02:00", "EventTime": "2023-10-30T14:03:45.778179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["C5kQWi2XzES44FJ1vk"]} -{"Format": "IDEA0", "ID": "e63da1a9-403d-4a01-89ec-eaed6536759e", "DetectTime": "2023-10-30T14:03:45.820626+02:00", "EventTime": "2023-10-30T14:03:45.820645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["COEGel13v2p0nsuEJa"]} -{"Format": "IDEA0", "ID": "5510e2f0-3474-4200-993b-a256b8ba9f13", "DetectTime": "2023-10-30T14:03:45.858623+02:00", "EventTime": "2023-10-30T14:03:45.858643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.182.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.88.182.105 ", "ContentType": "text/plain"}], "uids": ["Cj6vAu4gWwKOrbKR8i"]} -{"Format": "IDEA0", "ID": "424ce3c8-010d-4d0d-af54-ce49659e75c9", "DetectTime": "2023-10-30T14:03:45.900677+02:00", "EventTime": "2023-10-30T14:03:45.900697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["CCAndR2wv11qOUIrMa"]} -{"Format": "IDEA0", "ID": "844949aa-617d-467d-ae5b-067ff3cfa9a1", "DetectTime": "2023-10-30T14:03:45.939999+02:00", "EventTime": "2023-10-30T14:03:45.940019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["120.63.10.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 120.63.10.102 ", "ContentType": "text/plain"}], "uids": ["CMFrr63uCa44pxQCcl"]} -{"Format": "IDEA0", "ID": "07c711f9-b893-43ac-b439-9c3c76d543c1", "DetectTime": "2023-10-30T14:03:45.980836+02:00", "EventTime": "2023-10-30T14:03:45.980855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["CSHANP2y7Kh8XMRdE"]} -{"Format": "IDEA0", "ID": "501b409f-4059-471d-a8b5-f170268b151f", "DetectTime": "2023-10-30T14:03:46.015654+02:00", "EventTime": "2023-10-30T14:03:46.015674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CLzzhj1PBhHd43gai"]} -{"Format": "IDEA0", "ID": "02d35b55-7d37-46a4-adf0-26a55291d43c", "DetectTime": "2023-10-30T14:03:46.048115+02:00", "EventTime": "2023-10-30T14:03:46.048135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["Cu1xMD241Y9PisrAJg"]} -{"Format": "IDEA0", "ID": "ab6874cc-f9fa-4915-b9c2-e827a9e1ab9c", "DetectTime": "2023-10-30T14:03:46.081520+02:00", "EventTime": "2023-10-30T14:03:46.081545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.10.62 ", "ContentType": "text/plain"}], "uids": ["Cc2Krx4HfiXRjZ9sNe"]} -{"Format": "IDEA0", "ID": "2e02f257-6600-4556-b661-b3f6b3b86bea", "DetectTime": "2023-10-30T14:03:46.115007+02:00", "EventTime": "2023-10-30T14:03:46.115028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CUEmJ13w9jv7F7QuH8"]} -{"Format": "IDEA0", "ID": "cd579d63-f79c-43a8-b40d-abfe98763c8c", "DetectTime": "2023-10-30T14:03:46.146102+02:00", "EventTime": "2023-10-30T14:03:46.146126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CNHhTBwyNakHHq6P5"]} -{"Format": "IDEA0", "ID": "d75d0f38-e570-4a5a-8984-259ef4433158", "DetectTime": "2023-10-30T14:03:46.174930+02:00", "EventTime": "2023-10-30T14:03:46.174953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.73.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.97.73.133 ", "ContentType": "text/plain"}], "uids": ["C0frBi1qff2Kex24hc"]} -{"Format": "IDEA0", "ID": "5a3d347f-92c2-4d7e-a801-ea533861e265", "DetectTime": "2023-10-30T14:03:46.202138+02:00", "EventTime": "2023-10-30T14:03:46.202160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CbRDOUQYVbmbfh7y1"]} -{"Format": "IDEA0", "ID": "ddbd8471-817b-4961-9206-65d3fd7eca76", "DetectTime": "2023-10-30T14:03:46.230727+02:00", "EventTime": "2023-10-30T14:03:46.230753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CEklMP3tBg9vX2Zyy1"]} -{"Format": "IDEA0", "ID": "466da1eb-258f-4f20-b2eb-eb5d080cfaef", "DetectTime": "2023-10-30T14:03:46.259484+02:00", "EventTime": "2023-10-30T14:03:46.259497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["120.63.10.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 120.63.10.102 ", "ContentType": "text/plain"}], "uids": ["C6Mgnl2HGDKvxjaTb4"]} -{"Format": "IDEA0", "ID": "78ee196d-7e96-45c3-8a4a-84e2a3afd42b", "DetectTime": "2023-10-30T14:03:46.287276+02:00", "EventTime": "2023-10-30T14:03:46.287296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.240.31.91 ", "ContentType": "text/plain"}], "uids": ["CJFG8L26CIlBsset66"]} -{"Format": "IDEA0", "ID": "dec1744c-c369-4e82-b13a-211c073b2887", "DetectTime": "2023-10-30T14:03:46.315513+02:00", "EventTime": "2023-10-30T14:03:46.315525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CE4I5r1Ul14ZHa8FL8"]} -{"Format": "IDEA0", "ID": "0d04833b-e27d-4f3b-9f17-837565a52b9b", "DetectTime": "2023-10-30T14:03:46.348790+02:00", "EventTime": "2023-10-30T14:03:46.348814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C5CcVy9aDwDmvsJXc", "CcouK54VQcU48seaaa", "Cajhn74U4U8sf7oML9", "CidOay2wMXgk0t0WT8"]} -{"Format": "IDEA0", "ID": "7099b890-9d54-4ade-8748-a68b02cea26f", "DetectTime": "2023-10-30T14:03:46.359975+02:00", "EventTime": "2023-10-30T14:03:46.360001+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcouK54VQcU48seaaa"]} -{"Format": "IDEA0", "ID": "007e6b49-18e8-4af6-9a49-4c58a149c00e", "DetectTime": "2023-10-30T14:03:46.371062+02:00", "EventTime": "2023-10-30T14:03:46.371085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.162.184.60 ", "ContentType": "text/plain"}], "uids": ["CPbJiu18iZCHmAA0Bl"]} -{"Format": "IDEA0", "ID": "49dab1de-7dc0-4325-a21a-fd8d4960d567", "DetectTime": "2023-10-30T14:03:46.398959+02:00", "EventTime": "2023-10-30T14:03:46.398980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["COlvCR3dBmtrqDIEud"]} -{"Format": "IDEA0", "ID": "6ef83b7f-6e5a-4063-8daa-bbea1de6ac44", "DetectTime": "2023-10-30T14:03:46.425400+02:00", "EventTime": "2023-10-30T14:03:46.425418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CGUdGVShi8j5jHvLf"]} -{"Format": "IDEA0", "ID": "0c64c875-683d-4d60-9658-deb75395c58f", "DetectTime": "2023-10-30T14:03:46.455734+02:00", "EventTime": "2023-10-30T14:03:46.455759+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CXpRTC4q8GaTZt7HG9"]} -{"Format": "IDEA0", "ID": "1f18acae-3be6-4054-9539-af6032230eec", "DetectTime": "2023-10-30T14:03:46.466187+02:00", "EventTime": "2023-10-30T14:03:46.466202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["CLv1ajDsrxkfHEjZ8"]} -{"Format": "IDEA0", "ID": "1f590bcb-9429-427a-81f0-d3706955e7cc", "DetectTime": "2023-10-30T14:03:46.492859+02:00", "EventTime": "2023-10-30T14:03:46.492883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["COu59v33vZebgyTHRi"]} -{"Format": "IDEA0", "ID": "55fbd1ba-cc21-48c3-9066-cff284f1f99b", "DetectTime": "2023-10-30T14:03:46.521643+02:00", "EventTime": "2023-10-30T14:03:46.521663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CpEyFUPkUAvKirFQb"]} -{"Format": "IDEA0", "ID": "11af8420-7daa-4523-a9ca-d6e05c042a1e", "DetectTime": "2023-10-30T14:03:46.550297+02:00", "EventTime": "2023-10-30T14:03:46.550317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CvvNEX2ytsGy5lG0lg"]} -{"Format": "IDEA0", "ID": "3546208f-ea18-43f6-94bd-3df1ee47ec81", "DetectTime": "2023-10-30T14:03:46.579001+02:00", "EventTime": "2023-10-30T14:03:46.579014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLu6VP3bg3GsrSyYNb"]} -{"Format": "IDEA0", "ID": "2f0dd25c-96ed-4172-ad77-3f6f9a3d940b", "DetectTime": "2023-10-30T14:03:46.589488+02:00", "EventTime": "2023-10-30T14:03:46.589504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["Cw2ilD4wfx3plWFe64"]} -{"Format": "IDEA0", "ID": "56e681b3-652c-4444-9c35-1ed9ad6d0424", "DetectTime": "2023-10-30T14:03:46.617300+02:00", "EventTime": "2023-10-30T14:03:46.617315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CEQx114ifWRoJUhUW"]} -{"Format": "IDEA0", "ID": "aed7f1d6-606c-4af0-b608-e0acfb010037", "DetectTime": "2023-10-30T14:03:46.645866+02:00", "EventTime": "2023-10-30T14:03:46.645885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["CFQeht22ykGlPtJpy1"]} -{"Format": "IDEA0", "ID": "22026b5a-ea04-4a63-81d6-27842327ada6", "DetectTime": "2023-10-30T14:03:46.674138+02:00", "EventTime": "2023-10-30T14:03:46.674159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["Cb5NthLQQT2ape2xi"]} -{"Format": "IDEA0", "ID": "2267b359-74e1-49ff-bf50-efdbbcc60f8c", "DetectTime": "2023-10-30T14:03:46.703730+02:00", "EventTime": "2023-10-30T14:03:46.703748+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ce5pdh9lah1jZrKr4"]} -{"Format": "IDEA0", "ID": "74616d98-5c4f-4257-9cef-93bcf764d9aa", "DetectTime": "2023-10-30T14:03:46.714265+02:00", "EventTime": "2023-10-30T14:03:46.714286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["Cd2Aq34GqRDptKE4mb"]} -{"Format": "IDEA0", "ID": "67ff4091-2085-4e86-8e54-9bce34b217b9", "DetectTime": "2023-10-30T14:03:46.741883+02:00", "EventTime": "2023-10-30T14:03:46.741899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["CXLf224Rpe7kulMi1e"]} -{"Format": "IDEA0", "ID": "9b90dfef-aff0-43c7-8877-c6eea6b6a582", "DetectTime": "2023-10-30T14:03:46.771259+02:00", "EventTime": "2023-10-30T14:03:46.771270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.69.218.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.69.218.77 ", "ContentType": "text/plain"}], "uids": ["Chrecm4uUgYge8bVC2"]} -{"Format": "IDEA0", "ID": "f9a805de-2beb-4118-9579-10a815a0c40e", "DetectTime": "2023-10-30T14:03:46.799276+02:00", "EventTime": "2023-10-30T14:03:46.799298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["C7W1C01dcB3LVi9f2g"]} -{"Format": "IDEA0", "ID": "0248aa90-630b-41e2-bf73-2a4891585585", "DetectTime": "2023-10-30T14:03:46.826295+02:00", "EventTime": "2023-10-30T14:03:46.826317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CaJ5Cb1FPn6aK5THoc"]} -{"Format": "IDEA0", "ID": "23332270-ad4d-4823-876a-e65fecfbd1b0", "DetectTime": "2023-10-30T14:03:46.854019+02:00", "EventTime": "2023-10-30T14:03:46.854038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cbcf3C1rLg6vEaFiok"]} -{"Format": "IDEA0", "ID": "c8d649e9-d318-429e-babd-e27c08faec0b", "DetectTime": "2023-10-30T14:03:46.880053+02:00", "EventTime": "2023-10-30T14:03:46.880065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["Cn40KT2dqtY9ZWihJa"]} -{"Format": "IDEA0", "ID": "8f425abb-9cb5-49b8-a73a-a947c9059562", "DetectTime": "2023-10-30T14:03:46.906107+02:00", "EventTime": "2023-10-30T14:03:46.906132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["COfA6z8jaqwlUTSg4"]} -{"Format": "IDEA0", "ID": "cd06d07d-8c9c-45ce-8643-fa5e514e2e9a", "DetectTime": "2023-10-30T14:03:46.934283+02:00", "EventTime": "2023-10-30T14:03:46.934304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["CO08VT8VPlb1t9H2d"]} -{"Format": "IDEA0", "ID": "92eebce4-5297-4772-abe1-1edf3b4b18fa", "DetectTime": "2023-10-30T14:03:46.963391+02:00", "EventTime": "2023-10-30T14:03:46.963408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["CSjYAG4HsP2oHV2k8h"]} -{"Format": "IDEA0", "ID": "b89fe777-5910-4c90-97fa-b2d8365bc3ea", "DetectTime": "2023-10-30T14:03:46.990928+02:00", "EventTime": "2023-10-30T14:03:46.990948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.3.142.198 ", "ContentType": "text/plain"}], "uids": ["Ch5GXQh6ZMW6ONef5"]} -{"Format": "IDEA0", "ID": "6fde2689-7ba3-4894-a154-ab1a10d11575", "DetectTime": "2023-10-30T14:03:47.019720+02:00", "EventTime": "2023-10-30T14:03:47.019748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.239.118 ", "ContentType": "text/plain"}], "uids": ["CSxUyD1VVlcuRlu6rg"]} -{"Format": "IDEA0", "ID": "24e0ca67-6cbe-428c-b026-e90456b5f1bb", "DetectTime": "2023-10-30T14:03:47.045292+02:00", "EventTime": "2023-10-30T14:03:47.045311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CsWoO236YPBvKfojj9"]} -{"Format": "IDEA0", "ID": "7ab3ca42-f5bf-4f37-8ec4-7b73b43f420d", "DetectTime": "2023-10-30T14:03:47.073219+02:00", "EventTime": "2023-10-30T14:03:47.073246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["C34VsW3EDQFpTfJDX4"]} -{"Format": "IDEA0", "ID": "315d5ea9-e2c8-4312-b3e0-7277363e0d23", "DetectTime": "2023-10-30T14:03:47.100559+02:00", "EventTime": "2023-10-30T14:03:47.100570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CvvQRp3qpRRfEG5YAf"]} -{"Format": "IDEA0", "ID": "a34d18d0-fb02-46e8-a92f-05ffeb30cc3e", "DetectTime": "2023-10-30T14:03:47.126701+02:00", "EventTime": "2023-10-30T14:03:47.126717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CpULm51OLWPZ4budbk"]} -{"Format": "IDEA0", "ID": "a166d683-749c-4942-a523-3788d68f8d32", "DetectTime": "2023-10-30T14:03:47.154939+02:00", "EventTime": "2023-10-30T14:03:47.154961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CFC3CG2wOSJ9MVaZI8"]} -{"Format": "IDEA0", "ID": "d0bce23f-9ddb-4d5d-8ca4-cda820cfe8db", "DetectTime": "2023-10-30T14:03:47.183476+02:00", "EventTime": "2023-10-30T14:03:47.183493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["Cd8RVPZZ52etmdEf"]} -{"Format": "IDEA0", "ID": "762a6b45-1634-4dcc-915c-1eeef382b164", "DetectTime": "2023-10-30T14:03:47.206567+02:00", "EventTime": "2023-10-30T14:03:47.206588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CQT4FO2uXPOKKuqG74"]} -{"Format": "IDEA0", "ID": "93bd6a0a-4ddc-4c05-bd07-73f5743bf898", "DetectTime": "2023-10-30T14:03:47.229127+02:00", "EventTime": "2023-10-30T14:03:47.229140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["Ct2Vw33ZEyl4U3UYdk"]} -{"Format": "IDEA0", "ID": "e2ef3873-85d1-4118-a1d4-a519cf894068", "DetectTime": "2023-10-30T14:03:47.252036+02:00", "EventTime": "2023-10-30T14:03:47.252053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CKMJZo1udqcjpuBZge"]} -{"Format": "IDEA0", "ID": "656abd3f-4a18-4dd5-b6cb-c8fabf079da4", "DetectTime": "2023-10-30T14:03:47.271588+02:00", "EventTime": "2023-10-30T14:03:47.271604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.73.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.97.73.133 ", "ContentType": "text/plain"}], "uids": ["CCypkd2QA9LmqoSBNg"]} -{"Format": "IDEA0", "ID": "d1ab37d8-3765-421e-b274-b8a694640400", "DetectTime": "2023-10-30T14:03:47.293090+02:00", "EventTime": "2023-10-30T14:03:47.293101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CVWAjX3FY7dqnZuK01"]} -{"Format": "IDEA0", "ID": "b5ca688f-c73d-47c8-8251-e6fd5cb476f8", "DetectTime": "2023-10-30T14:03:47.314413+02:00", "EventTime": "2023-10-30T14:03:47.314430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["CZ60hadpzYKww50S4"]} -{"Format": "IDEA0", "ID": "4374997c-05a0-43f5-aceb-cd00fe9fa0d6", "DetectTime": "2023-10-30T14:03:47.339480+02:00", "EventTime": "2023-10-30T14:03:47.339499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.99.162 ", "ContentType": "text/plain"}], "uids": ["CRX7Zy35PGvntekec8"]} -{"Format": "IDEA0", "ID": "8c8a8984-10d7-4eaf-9211-8c619d83f1c9", "DetectTime": "2023-10-30T14:03:47.364737+02:00", "EventTime": "2023-10-30T14:03:47.364757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["Ckbhff2OBE7ROua2W"]} -{"Format": "IDEA0", "ID": "b4057f8c-52cb-4617-ae75-a9973677b1c2", "DetectTime": "2023-10-30T14:03:47.388174+02:00", "EventTime": "2023-10-30T14:03:47.388190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CIlNOzTzmDk1PlWI5"]} -{"Format": "IDEA0", "ID": "90be9d9c-df07-45d0-bc8e-2457a322c6e9", "DetectTime": "2023-10-30T14:03:47.407437+02:00", "EventTime": "2023-10-30T14:03:47.407454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CUpUq8uRXnFVEdE43"]} -{"Format": "IDEA0", "ID": "71546a9f-75ba-410f-8fc0-b14cd21e0929", "DetectTime": "2023-10-30T14:03:47.429584+02:00", "EventTime": "2023-10-30T14:03:47.429604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.73.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.97.73.133 ", "ContentType": "text/plain"}], "uids": ["CV4aTR2astwSRehLIl"]} -{"Format": "IDEA0", "ID": "b31b7d31-a5bc-4c84-9bc1-8255f14894f7", "DetectTime": "2023-10-30T14:03:47.457493+02:00", "EventTime": "2023-10-30T14:03:47.457513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["CfUEQY1ZkyN4Ryfebg"]} -{"Format": "IDEA0", "ID": "9cd3d131-b4be-4bb1-849f-dd7ccccc7c34", "DetectTime": "2023-10-30T14:03:47.483023+02:00", "EventTime": "2023-10-30T14:03:47.483039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.199.106.53 ", "ContentType": "text/plain"}], "uids": ["Cn1Uqn23LbJBMP93V1"]} -{"Format": "IDEA0", "ID": "709feed6-327f-452d-8ca0-75dde5f73df1", "DetectTime": "2023-10-30T14:03:47.508045+02:00", "EventTime": "2023-10-30T14:03:47.508064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cs5YtVpyb0UthotL4"]} -{"Format": "IDEA0", "ID": "b028a9ab-6981-44bf-86e3-daca16f4b9bf", "DetectTime": "2023-10-30T14:03:47.533607+02:00", "EventTime": "2023-10-30T14:03:47.533628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["ClihJY2wjjtVG9YOXh"]} -{"Format": "IDEA0", "ID": "2a28ba70-b0d1-4a05-a314-6cc9e1fb10c4", "DetectTime": "2023-10-30T14:03:47.559593+02:00", "EventTime": "2023-10-30T14:03:47.559609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.31.105 ", "ContentType": "text/plain"}], "uids": ["CSd3qH2CX9yVQhK9Mb"]} -{"Format": "IDEA0", "ID": "cc0c9c2e-1209-4c49-81c4-8de984d2f996", "DetectTime": "2023-10-30T14:03:47.585591+02:00", "EventTime": "2023-10-30T14:03:47.585606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CxEtGK1D37en8mfRb7"]} -{"Format": "IDEA0", "ID": "60ab9ed2-bcdd-45df-8cd2-965718ae55e4", "DetectTime": "2023-10-30T14:03:47.610648+02:00", "EventTime": "2023-10-30T14:03:47.610663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["CVTp2zeuYamP7E7y8"]} -{"Format": "IDEA0", "ID": "713c2657-9081-454b-bd80-64167312bff5", "DetectTime": "2023-10-30T14:03:47.636256+02:00", "EventTime": "2023-10-30T14:03:47.636276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.10.62 ", "ContentType": "text/plain"}], "uids": ["CBtu1sjYjBhIA92v4"]} -{"Format": "IDEA0", "ID": "3aaaf930-5c39-48c1-ba30-3a59926e0161", "DetectTime": "2023-10-30T14:03:47.663390+02:00", "EventTime": "2023-10-30T14:03:47.663406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CuHNbD1CIRh4KpBWKc"]} -{"Format": "IDEA0", "ID": "e968a471-3d2e-498b-8874-3940b0c460f1", "DetectTime": "2023-10-30T14:03:47.694625+02:00", "EventTime": "2023-10-30T14:03:47.694636+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZK3zm33zWcv5f3zkh"]} -{"Format": "IDEA0", "ID": "e4c89337-e22a-49ac-8982-cbd12c45181c", "DetectTime": "2023-10-30T14:03:47.702514+02:00", "EventTime": "2023-10-30T14:03:47.702526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.240.31.91 ", "ContentType": "text/plain"}], "uids": ["CLd2oR13orAsaesP0d"]} -{"Format": "IDEA0", "ID": "adbe57f8-1235-4c3f-b0af-1d15fab62b9b", "DetectTime": "2023-10-30T14:03:47.727832+02:00", "EventTime": "2023-10-30T14:03:47.727852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["Cq0XpNgZPOtwWwJBd"]} -{"Format": "IDEA0", "ID": "77b5c836-f48e-4362-a241-3e056ddbc488", "DetectTime": "2023-10-30T14:03:47.753693+02:00", "EventTime": "2023-10-30T14:03:47.753709+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnuiiW1Kgzzr2DN53"]} -{"Format": "IDEA0", "ID": "5effe335-3c06-4995-807c-f5db8589945e", "DetectTime": "2023-10-30T14:03:47.762366+02:00", "EventTime": "2023-10-30T14:03:47.762394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.3.142.198 ", "ContentType": "text/plain"}], "uids": ["Ctufjb3PYcQACwmtG7"]} -{"Format": "IDEA0", "ID": "ba5d61fd-fd3d-4e10-a6f1-3463ca92cd17", "DetectTime": "2023-10-30T14:03:47.787898+02:00", "EventTime": "2023-10-30T14:03:47.787909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C03aHm4D5TEurt8ii3"]} -{"Format": "IDEA0", "ID": "a1ba8ae1-fe45-4e91-9031-6ae1010c963c", "DetectTime": "2023-10-30T14:03:47.809221+02:00", "EventTime": "2023-10-30T14:03:47.809239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CcfJ2y1SYw8ZLAuIHc"]} -{"Format": "IDEA0", "ID": "0e354601-75be-4914-b3a4-eb0434d3b6f9", "DetectTime": "2023-10-30T14:03:47.831687+02:00", "EventTime": "2023-10-30T14:03:47.831699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.199.106.53 ", "ContentType": "text/plain"}], "uids": ["CHBmsM1gLPAhl1xBpb"]} -{"Format": "IDEA0", "ID": "b99c1675-c085-4d23-ac20-b6419121a8ea", "DetectTime": "2023-10-30T14:03:47.860149+02:00", "EventTime": "2023-10-30T14:03:47.860168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["CnYFKl3NcMb6yhVIc5"]} -{"Format": "IDEA0", "ID": "5f73a6cf-cd11-48c6-bf36-27ed94a09135", "DetectTime": "2023-10-30T14:03:47.887285+02:00", "EventTime": "2023-10-30T14:03:47.887305+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CM2dHC2HGlyipamqYk"]} -{"Format": "IDEA0", "ID": "a0ebed5c-5dd5-4cb6-b250-dd5a0a09e8b8", "DetectTime": "2023-10-30T14:03:47.897748+02:00", "EventTime": "2023-10-30T14:03:47.897768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CN72YR3ZgUMpAQNyEd"]} -{"Format": "IDEA0", "ID": "fda45832-568d-4197-80d6-2b7fd67caf66", "DetectTime": "2023-10-30T14:03:47.923023+02:00", "EventTime": "2023-10-30T14:03:47.923042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["ChV7ng47QIgZxCaXP7"]} -{"Format": "IDEA0", "ID": "5e1f6db0-14e5-4fd3-a08f-2f5336464038", "DetectTime": "2023-10-30T14:03:47.947424+02:00", "EventTime": "2023-10-30T14:03:47.947436+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZ5TIc0Dn5QI7Mft1"]} -{"Format": "IDEA0", "ID": "5b1b78b6-c871-44f5-b532-907d94a4aadb", "DetectTime": "2023-10-30T14:03:47.957325+02:00", "EventTime": "2023-10-30T14:03:47.957345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C6J7df23O6U49xcm5"]} -{"Format": "IDEA0", "ID": "72144ff1-e691-453c-9f66-56b910428ff4", "DetectTime": "2023-10-30T14:03:47.981894+02:00", "EventTime": "2023-10-30T14:03:47.981914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["C4tbt92YnjYO9GmqCc"]} -{"Format": "IDEA0", "ID": "73116990-89d9-4e0b-adc8-0da0dda540de", "DetectTime": "2023-10-30T14:03:48.009152+02:00", "EventTime": "2023-10-30T14:03:48.009163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CI1aar4NbwKv8Z30Lf"]} -{"Format": "IDEA0", "ID": "93e44072-4f3e-4ee8-8014-ad076416df7f", "DetectTime": "2023-10-30T14:03:48.031845+02:00", "EventTime": "2023-10-30T14:03:48.031859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["C4njxv4afiVR5AJam9"]} -{"Format": "IDEA0", "ID": "90aebabb-174c-4ad8-8903-04e55c367142", "DetectTime": "2023-10-30T14:03:48.056591+02:00", "EventTime": "2023-10-30T14:03:48.056610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["C9Nvz52PFAOyfkOBc"]} -{"Format": "IDEA0", "ID": "2d2edfe3-fb59-461d-8b53-5ea1df2ed307", "DetectTime": "2023-10-30T14:03:48.083807+02:00", "EventTime": "2023-10-30T14:03:48.083823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CmL9BV12BSNnD1jkl"]} -{"Format": "IDEA0", "ID": "d1d0c76f-139a-4922-91e7-8d3ca108f9a3", "DetectTime": "2023-10-30T14:03:48.109424+02:00", "EventTime": "2023-10-30T14:03:48.109437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CM2dHC2HGlyipamqYk", "CAH4oU2lmRz5iHhPnf", "CLu6VP3bg3GsrSyYNb", "CZK3zm33zWcv5f3zkh"]} -{"Format": "IDEA0", "ID": "e335cbe9-b925-4ab0-99b1-be62bf12b736", "DetectTime": "2023-10-30T14:03:48.116800+02:00", "EventTime": "2023-10-30T14:03:48.116816+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAH4oU2lmRz5iHhPnf"]} -{"Format": "IDEA0", "ID": "437434ac-26f7-4cf6-8682-c91410545aeb", "DetectTime": "2023-10-30T14:03:48.125972+02:00", "EventTime": "2023-10-30T14:03:48.125998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CgzkOl4hgLp1pg3047"]} -{"Format": "IDEA0", "ID": "5c8747ba-cbf6-4539-8da7-442acf0033b8", "DetectTime": "2023-10-30T14:03:48.154206+02:00", "EventTime": "2023-10-30T14:03:48.154224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.162.184.60 ", "ContentType": "text/plain"}], "uids": ["CjzN1H2dUqYTxH8Avh"]} -{"Format": "IDEA0", "ID": "adcf0104-a20f-4719-b4ca-042675ad7042", "DetectTime": "2023-10-30T14:03:48.176895+02:00", "EventTime": "2023-10-30T14:03:48.176911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CUcQsmGOCEM3fB8v7"]} -{"Format": "IDEA0", "ID": "9bad2231-673e-4618-b204-47dc0ae3dd62", "DetectTime": "2023-10-30T14:03:48.198371+02:00", "EventTime": "2023-10-30T14:03:48.198383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CxCoio3bqWsbVprr4a"]} -{"Format": "IDEA0", "ID": "a3bbce16-1d55-4b65-be8c-92361cb5abc4", "DetectTime": "2023-10-30T14:03:48.222264+02:00", "EventTime": "2023-10-30T14:03:48.222274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.239.118 ", "ContentType": "text/plain"}], "uids": ["Cy9GaB1MLtxJ3jt3A7"]} -{"Format": "IDEA0", "ID": "da3dc7c8-1593-4860-876e-7896aa59690b", "DetectTime": "2023-10-30T14:03:48.241735+02:00", "EventTime": "2023-10-30T14:03:48.241751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.31.105 ", "ContentType": "text/plain"}], "uids": ["CSHwdZpn4djAtYDr6"]} -{"Format": "IDEA0", "ID": "b6d10b13-a99b-4580-a1e5-7a8d9174fba8", "DetectTime": "2023-10-30T14:03:48.263264+02:00", "EventTime": "2023-10-30T14:03:48.263276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CZPoNQ1FumjYgzDanb"]} -{"Format": "IDEA0", "ID": "6d292cfd-a1ab-4f70-ad22-7a3fef82217c", "DetectTime": "2023-10-30T14:03:48.282941+02:00", "EventTime": "2023-10-30T14:03:48.282959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["CkYw492KsaHks0vNq7"]} -{"Format": "IDEA0", "ID": "a9ffcd55-15bb-4e12-a8a8-2874a056ad84", "DetectTime": "2023-10-30T14:03:48.311846+02:00", "EventTime": "2023-10-30T14:03:48.311866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["ChcmOV2bf4roxMmwP8"]} -{"Format": "IDEA0", "ID": "94e0f5f3-d4df-4998-99aa-464330a3447a", "DetectTime": "2023-10-30T14:03:48.340361+02:00", "EventTime": "2023-10-30T14:03:48.340372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["CgidqK2f3RTq8MEEvd"]} -{"Format": "IDEA0", "ID": "ab17aea0-5230-4f95-8139-5072cc9b7aeb", "DetectTime": "2023-10-30T14:03:48.364889+02:00", "EventTime": "2023-10-30T14:03:48.364904+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnJdGW1FZE6bMWHtVl"]} -{"Format": "IDEA0", "ID": "d966f2a6-ae6e-4cc6-9674-5eb2b6b754dc", "DetectTime": "2023-10-30T14:03:48.374146+02:00", "EventTime": "2023-10-30T14:03:48.374163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["CYFfOP3RQf09otITvc"]} -{"Format": "IDEA0", "ID": "e3ff7112-da98-49d3-b704-82d7daafbb71", "DetectTime": "2023-10-30T14:03:48.399787+02:00", "EventTime": "2023-10-30T14:03:48.399803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["C5EZTw2V2PfpTzxtw9"]} -{"Format": "IDEA0", "ID": "7af75d70-cca0-40cc-a856-9c072343a587", "DetectTime": "2023-10-30T14:03:48.423713+02:00", "EventTime": "2023-10-30T14:03:48.423729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.162.184.60 ", "ContentType": "text/plain"}], "uids": ["Csjf9z2W2ObkYaDM9l"]} -{"Format": "IDEA0", "ID": "f2224725-bf21-4300-b506-24ca078bae71", "DetectTime": "2023-10-30T14:03:48.451446+02:00", "EventTime": "2023-10-30T14:03:48.451466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["CDsSybla7jqDkjdyi"]} -{"Format": "IDEA0", "ID": "9370cb2f-021e-4ecc-92f1-42f4f7fcbb57", "DetectTime": "2023-10-30T14:03:48.479815+02:00", "EventTime": "2023-10-30T14:03:48.479831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["CtHfdryTb8f9xwUXf"]} -{"Format": "IDEA0", "ID": "ac2c4d80-b0f1-4627-bc50-04bdcfb42520", "DetectTime": "2023-10-30T14:03:48.502880+02:00", "EventTime": "2023-10-30T14:03:48.502905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CdVuD64LMTWwqFrJLc"]} -{"Format": "IDEA0", "ID": "786975e3-520d-4c0c-b106-5bae8f74df6b", "DetectTime": "2023-10-30T14:03:48.533298+02:00", "EventTime": "2023-10-30T14:03:48.533317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.239.118 ", "ContentType": "text/plain"}], "uids": ["CrZfW86uVr5xpdose"]} -{"Format": "IDEA0", "ID": "81769863-aaa4-4df8-8b4a-822d9f5b1731", "DetectTime": "2023-10-30T14:03:48.555982+02:00", "EventTime": "2023-10-30T14:03:48.555998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CSbaVO2UTXHCiKYXa3"]} -{"Format": "IDEA0", "ID": "67711814-e0e6-473c-9f59-0887800a9e11", "DetectTime": "2023-10-30T14:03:48.581926+02:00", "EventTime": "2023-10-30T14:03:48.581942+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAxzxneQxkWQCYk4a"]} -{"Format": "IDEA0", "ID": "9a72d67f-706d-4c8d-b1bf-4477aab1862c", "DetectTime": "2023-10-30T14:03:48.589470+02:00", "EventTime": "2023-10-30T14:03:48.589481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.31.105 ", "ContentType": "text/plain"}], "uids": ["CMGyNB2jSovzaYTlv9"]} -{"Format": "IDEA0", "ID": "e3fb5e20-51f0-4c55-a217-bb0e349ecc84", "DetectTime": "2023-10-30T14:03:48.610141+02:00", "EventTime": "2023-10-30T14:03:48.610156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["Cp1YE544iDZ8Lj5613"]} -{"Format": "IDEA0", "ID": "fa9d7c36-86c4-4f0a-bc88-6dd863a3a873", "DetectTime": "2023-10-30T14:03:48.636288+02:00", "EventTime": "2023-10-30T14:03:48.636304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CR83K13MyUY03kjmfd"]} -{"Format": "IDEA0", "ID": "6a16216a-a090-4667-a278-ad6f55b8ae2c", "DetectTime": "2023-10-30T14:03:48.665102+02:00", "EventTime": "2023-10-30T14:03:48.665119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.240.31.91 ", "ContentType": "text/plain"}], "uids": ["CvL4jb20XasAsfvdH7"]} -{"Format": "IDEA0", "ID": "f3a40bc7-32e7-49b3-8cb9-1326493e2a7a", "DetectTime": "2023-10-30T14:03:48.684326+02:00", "EventTime": "2023-10-30T14:03:48.684341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CWxDfK2eXrFpLnBVe4"]} -{"Format": "IDEA0", "ID": "e9d27ae0-b5a5-4657-a620-af1f1cdcf3ff", "DetectTime": "2023-10-30T14:03:48.711075+02:00", "EventTime": "2023-10-30T14:03:48.711097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CaGSf43VrVCOjyCig8"]} -{"Format": "IDEA0", "ID": "0c5d14fa-495a-4b2f-bf04-7f2ac69c908a", "DetectTime": "2023-10-30T14:03:48.743378+02:00", "EventTime": "2023-10-30T14:03:48.743391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.99.162 ", "ContentType": "text/plain"}], "uids": ["CJTSqE3teaWCexJrJ1"]} -{"Format": "IDEA0", "ID": "0f94bd49-cce8-4f2d-b67f-49d0a4a14a22", "DetectTime": "2023-10-30T14:03:48.767339+02:00", "EventTime": "2023-10-30T14:03:48.767359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["Co0mOg3ZlpRoW6kWF1"]} -{"Format": "IDEA0", "ID": "97a55e33-271f-4367-b136-ef86df9da4f0", "DetectTime": "2023-10-30T14:03:48.794683+02:00", "EventTime": "2023-10-30T14:03:48.794698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CE9oPF4G2QzdBksSYf"]} -{"Format": "IDEA0", "ID": "f60be3a4-d7a2-484d-935e-9bf1f0f45c7e", "DetectTime": "2023-10-30T14:03:48.820535+02:00", "EventTime": "2023-10-30T14:03:48.820560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["CuH7ySFCE5Q4mS9v6"]} -{"Format": "IDEA0", "ID": "b09c96de-9ab7-4f15-af0a-4fd6bceda6e6", "DetectTime": "2023-10-30T14:03:48.847336+02:00", "EventTime": "2023-10-30T14:03:48.847356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CVO0z73pvskKb1tQQi"]} -{"Format": "IDEA0", "ID": "98552fc2-32cd-4068-ae2e-a54da9b6598d", "DetectTime": "2023-10-30T14:03:48.878386+02:00", "EventTime": "2023-10-30T14:03:48.878403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.99.162 ", "ContentType": "text/plain"}], "uids": ["CW53fx26e0l1XuyRc4"]} -{"Format": "IDEA0", "ID": "63fa8af3-e651-4896-9ca5-5d7d7103db0e", "DetectTime": "2023-10-30T14:03:48.905495+02:00", "EventTime": "2023-10-30T14:03:48.905508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["CLDtuZ3AmiXlocOR7"]} -{"Format": "IDEA0", "ID": "e7beec44-77cc-41ee-b2d3-07eaab254ed5", "DetectTime": "2023-10-30T14:03:48.933658+02:00", "EventTime": "2023-10-30T14:03:48.933679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["CvSV4koMuH250ULXl"]} -{"Format": "IDEA0", "ID": "7a0b7d89-92eb-49e3-a722-089a0bed87f0", "DetectTime": "2023-10-30T14:03:48.964105+02:00", "EventTime": "2023-10-30T14:03:48.964121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CajjREaXYSQ0Q4Hb2"]} -{"Format": "IDEA0", "ID": "3fa0c767-178a-4521-b1cb-7f98eb754701", "DetectTime": "2023-10-30T14:03:48.990284+02:00", "EventTime": "2023-10-30T14:03:48.990295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CEBwqv33BH44YVOd58"]} -{"Format": "IDEA0", "ID": "8d3ab8ef-fcd4-4384-a52c-ac8026bf7270", "DetectTime": "2023-10-30T14:03:49.020149+02:00", "EventTime": "2023-10-30T14:03:49.020166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CyXHH81H9O1leO6zrl"]} -{"Format": "IDEA0", "ID": "ace5e0e9-2bcc-4075-84dc-024252050120", "DetectTime": "2023-10-30T14:03:49.043834+02:00", "EventTime": "2023-10-30T14:03:49.043844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Ct8iWN2mVE7JBoSKW1"]} -{"Format": "IDEA0", "ID": "5e4cce6e-a6aa-4982-80e7-867abc14523a", "DetectTime": "2023-10-30T14:03:49.072544+02:00", "EventTime": "2023-10-30T14:03:49.072560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CTkJ9o1MBXTtUZMqk2"]} -{"Format": "IDEA0", "ID": "d2a25ac0-2478-4305-bef9-76a6af77f392", "DetectTime": "2023-10-30T14:03:49.099050+02:00", "EventTime": "2023-10-30T14:03:49.099069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CvxMoz2TA8tEbHz7o1"]} -{"Format": "IDEA0", "ID": "39e99d72-7d65-4ea2-a7ef-967179cdccb9", "DetectTime": "2023-10-30T14:03:49.126209+02:00", "EventTime": "2023-10-30T14:03:49.126226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["C6EsW92CMWBMGLJxh4"]} -{"Format": "IDEA0", "ID": "167d4883-4369-49c0-b435-e753cfef0d5d", "DetectTime": "2023-10-30T14:03:49.155807+02:00", "EventTime": "2023-10-30T14:03:49.155823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C2Pl42gfK8JFFknll"]} -{"Format": "IDEA0", "ID": "ccc82077-db9c-48a7-b594-877d1430c5eb", "DetectTime": "2023-10-30T14:03:49.190108+02:00", "EventTime": "2023-10-30T14:03:49.190133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["CHwcF93PN4RxfPVpL2"]} -{"Format": "IDEA0", "ID": "c30fb5fd-56fe-471b-bb64-9f429415f5f4", "DetectTime": "2023-10-30T14:03:49.222528+02:00", "EventTime": "2023-10-30T14:03:49.222550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["Ci6qlMaYy8XEibaIc"]} -{"Format": "IDEA0", "ID": "11793f8b-d20c-4e08-ae00-c9007f4928c5", "DetectTime": "2023-10-30T14:03:49.258301+02:00", "EventTime": "2023-10-30T14:03:49.258318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CL5lmN1ainsEqksTGb"]} -{"Format": "IDEA0", "ID": "36b1f0cf-939e-4ef9-ba57-f47980029c28", "DetectTime": "2023-10-30T14:03:49.291102+02:00", "EventTime": "2023-10-30T14:03:49.291115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.240.31.91 ", "ContentType": "text/plain"}], "uids": ["CHgN1e3LMyc88rsY4j"]} -{"Format": "IDEA0", "ID": "48822259-8e78-4411-889f-122491b1b159", "DetectTime": "2023-10-30T14:03:49.319749+02:00", "EventTime": "2023-10-30T14:03:49.319770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.10.62 ", "ContentType": "text/plain"}], "uids": ["CYpKfd40BLLtUnTks"]} -{"Format": "IDEA0", "ID": "e724d7af-2c96-4cba-bc77-c9b8c0e473ee", "DetectTime": "2023-10-30T14:03:49.363866+02:00", "EventTime": "2023-10-30T14:03:49.363883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["CaaGG31sLg3XYU2xud"]} -{"Format": "IDEA0", "ID": "bad80831-e2f2-4031-bf1e-cd14e7f38c18", "DetectTime": "2023-10-30T14:03:49.391949+02:00", "EventTime": "2023-10-30T14:03:49.391970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cdg1kK1xcn8gQteEmd"]} -{"Format": "IDEA0", "ID": "cbf002cc-4c54-4951-bcc3-e64f96991599", "DetectTime": "2023-10-30T14:03:49.423171+02:00", "EventTime": "2023-10-30T14:03:49.423198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CrckL9dSx9iS5P3l"]} -{"Format": "IDEA0", "ID": "2db89aaf-b871-467f-880f-b970c0365999", "DetectTime": "2023-10-30T14:03:49.453296+02:00", "EventTime": "2023-10-30T14:03:49.453312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CE6ItU2CYGyb5RP5E5"]} -{"Format": "IDEA0", "ID": "e751f1b7-53c6-405b-85e7-eed0c59ebefd", "DetectTime": "2023-10-30T14:03:49.484945+02:00", "EventTime": "2023-10-30T14:03:49.484962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CTI5wl2jyJI8c23hve"]} -{"Format": "IDEA0", "ID": "f1d1c041-7e56-4d70-9820-8af116745225", "DetectTime": "2023-10-30T14:03:49.519078+02:00", "EventTime": "2023-10-30T14:03:49.519099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["Cl6vgLT7KSHQpHOJ5"]} -{"Format": "IDEA0", "ID": "209230d4-fd66-489c-8ffe-b7db6bd096cc", "DetectTime": "2023-10-30T14:03:49.547415+02:00", "EventTime": "2023-10-30T14:03:49.547431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CyE0ak3hdm3UjjHAf6"]} -{"Format": "IDEA0", "ID": "112f6269-b10c-4016-a3d4-395b80ee2bdc", "DetectTime": "2023-10-30T14:03:49.578858+02:00", "EventTime": "2023-10-30T14:03:49.578879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.3.142.198 ", "ContentType": "text/plain"}], "uids": ["CPpLK51lX9lf9pmT14"]} -{"Format": "IDEA0", "ID": "093b74ae-8c57-4bd2-94c9-0346024d1bba", "DetectTime": "2023-10-30T14:03:49.611024+02:00", "EventTime": "2023-10-30T14:03:49.611044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["ClXQP23dgHdjqqjg6a"]} -{"Format": "IDEA0", "ID": "5e0d5206-7b8e-4bfd-8e42-4dc7f618c56a", "DetectTime": "2023-10-30T14:03:49.640497+02:00", "EventTime": "2023-10-30T14:03:49.640519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CKCQ0Z12jxB1kg2Nla"]} -{"Format": "IDEA0", "ID": "564c3dde-8821-4ff1-965d-397b23423f5a", "DetectTime": "2023-10-30T14:03:49.670725+02:00", "EventTime": "2023-10-30T14:03:49.670741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CimSop1Tl7VAtoPhwi"]} -{"Format": "IDEA0", "ID": "c7ece879-84c3-4343-a86d-07670fc0246b", "DetectTime": "2023-10-30T14:03:49.702508+02:00", "EventTime": "2023-10-30T14:03:49.702524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CMKB1cYiPOJxsiNm2"]} -{"Format": "IDEA0", "ID": "bf812262-df30-44d7-8150-2bcaf528872a", "DetectTime": "2023-10-30T14:03:49.731977+02:00", "EventTime": "2023-10-30T14:03:49.731994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["Cdq6IU1LHiGUhmgFHh"]} -{"Format": "IDEA0", "ID": "939a95d5-b7e2-49c4-b132-a25307f309a8", "DetectTime": "2023-10-30T14:03:49.757851+02:00", "EventTime": "2023-10-30T14:03:49.757863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CMsGLp26uqLi7dwgZc"]} -{"Format": "IDEA0", "ID": "23d05fd1-3955-4989-b27b-af009868b19e", "DetectTime": "2023-10-30T14:03:49.783864+02:00", "EventTime": "2023-10-30T14:03:49.783882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["Cg0TNXkZaJ0KcaRgg"]} -{"Format": "IDEA0", "ID": "b02ab1e9-2029-4418-9596-3cd81b35e292", "DetectTime": "2023-10-30T14:03:49.812027+02:00", "EventTime": "2023-10-30T14:03:49.812044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C9OAYu0WS5cjJiIzl"]} -{"Format": "IDEA0", "ID": "5d612470-e57f-49b2-9c42-9a2453a44fac", "DetectTime": "2023-10-30T14:03:49.842541+02:00", "EventTime": "2023-10-30T14:03:49.842562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["CH9seVs8w2IVUlezh"]} -{"Format": "IDEA0", "ID": "1af7a21a-e22f-4d0f-9e18-6b05120b25b1", "DetectTime": "2023-10-30T14:03:49.868469+02:00", "EventTime": "2023-10-30T14:03:49.868486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CIbr9E2pcTAtCtzZB9"]} -{"Format": "IDEA0", "ID": "d0617501-7cad-4799-81c2-0d8951dbac1a", "DetectTime": "2023-10-30T14:03:49.892296+02:00", "EventTime": "2023-10-30T14:03:49.892318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CuBjxc455vR9xCDdY1"]} -{"Format": "IDEA0", "ID": "a8b27fdb-876f-4fba-81e8-3e487a128579", "DetectTime": "2023-10-30T14:03:49.917494+02:00", "EventTime": "2023-10-30T14:03:49.917515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.170.10.62 ", "ContentType": "text/plain"}], "uids": ["CCQarTHtGYXYhlxZb"]} -{"Format": "IDEA0", "ID": "27444b3b-2764-4216-8001-a3b3584c3e18", "DetectTime": "2023-10-30T14:03:49.950295+02:00", "EventTime": "2023-10-30T14:03:49.950311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CIsMFn4uWyG0px6CBc"]} -{"Format": "IDEA0", "ID": "fcaacfb5-5f26-4147-9209-d3ba153f5971", "DetectTime": "2023-10-30T14:03:49.973548+02:00", "EventTime": "2023-10-30T14:03:49.973567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CV46e72cAd9ef4v99b"]} -{"Format": "IDEA0", "ID": "e939f49d-17e6-4c8f-a934-f40a77411f45", "DetectTime": "2023-10-30T14:03:50.004802+02:00", "EventTime": "2023-10-30T14:03:50.004819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEfyoyOs7qsOffBdb"]} -{"Format": "IDEA0", "ID": "72c9954b-b793-4be1-afad-123fe30479d6", "DetectTime": "2023-10-30T14:03:50.037018+02:00", "EventTime": "2023-10-30T14:03:50.037040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["CtqMqc2mxcLPtXF2N4"]} -{"Format": "IDEA0", "ID": "f15f79f3-7919-44ee-95e3-0eec6ba1220d", "DetectTime": "2023-10-30T14:03:50.065770+02:00", "EventTime": "2023-10-30T14:03:50.065783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["CSel8H1wcxmmozrtCi"]} -{"Format": "IDEA0", "ID": "b0b24f46-af69-4723-b769-52a88daa9671", "DetectTime": "2023-10-30T14:03:50.093451+02:00", "EventTime": "2023-10-30T14:03:50.093467+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CPa2kk2IUPFtxUjkca"]} -{"Format": "IDEA0", "ID": "63751b0c-216d-40a2-871a-e113c3670e2c", "DetectTime": "2023-10-30T14:03:50.102507+02:00", "EventTime": "2023-10-30T14:03:50.102523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.162.184.60 ", "ContentType": "text/plain"}], "uids": ["C6kOp52WssnCCKyVd1"]} -{"Format": "IDEA0", "ID": "e30da3a2-28b9-4c04-8659-d0a695987ee5", "DetectTime": "2023-10-30T14:03:50.131529+02:00", "EventTime": "2023-10-30T14:03:50.131541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CSQ35e2mO3uz8gEKl9"]} -{"Format": "IDEA0", "ID": "d604447c-1c6b-4346-a7f3-592dedf0a0bc", "DetectTime": "2023-10-30T14:03:50.161438+02:00", "EventTime": "2023-10-30T14:03:50.161458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CRdCUZJSecHfAB3X4"]} -{"Format": "IDEA0", "ID": "eb078b54-9273-4f06-970c-ae77201cc38b", "DetectTime": "2023-10-30T14:03:50.188568+02:00", "EventTime": "2023-10-30T14:03:50.188586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CdUkG41I0MiNjSkvvj"]} -{"Format": "IDEA0", "ID": "ccc1db76-e95f-4c07-a577-a1294a363da4", "DetectTime": "2023-10-30T14:03:50.212903+02:00", "EventTime": "2023-10-30T14:03:50.212922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.96.31.105 ", "ContentType": "text/plain"}], "uids": ["CLxIQbEh8zpxYLvNj"]} -{"Format": "IDEA0", "ID": "e6ec2736-0522-40f3-85ca-dec4f30bf329", "DetectTime": "2023-10-30T14:03:50.238322+02:00", "EventTime": "2023-10-30T14:03:50.238345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CLse2r13d0WHYNTRCd"]} -{"Format": "IDEA0", "ID": "5586c06b-6526-430c-9d14-ecf9495438a3", "DetectTime": "2023-10-30T14:03:50.265747+02:00", "EventTime": "2023-10-30T14:03:50.265757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["Csza8u3BHaVJ2Okm"]} -{"Format": "IDEA0", "ID": "4c409918-b2cc-402d-b3a5-2b454b4e3276", "DetectTime": "2023-10-30T14:03:50.294925+02:00", "EventTime": "2023-10-30T14:03:50.294939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["Cc0ndV1ClEDtgs0v3c"]} -{"Format": "IDEA0", "ID": "a0744ec5-cd74-44f1-bf61-e3678c2390ab", "DetectTime": "2023-10-30T14:03:50.324980+02:00", "EventTime": "2023-10-30T14:03:50.324991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CnKCkr1K2ZxALjzBL1"]} -{"Format": "IDEA0", "ID": "b1834f02-dfeb-4e8e-9c29-96ee8e022526", "DetectTime": "2023-10-30T14:03:50.354428+02:00", "EventTime": "2023-10-30T14:03:50.354444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.239.118 ", "ContentType": "text/plain"}], "uids": ["C1OqEs4p0lp4jJidXc"]} -{"Format": "IDEA0", "ID": "bde98161-46a2-4278-b244-4c4423fbdbc7", "DetectTime": "2023-10-30T14:03:50.377752+02:00", "EventTime": "2023-10-30T14:03:50.377763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["CJrnia2bFROgY8p1ki"]} -{"Format": "IDEA0", "ID": "53183ad5-b2a1-49a5-baf4-88b374b86ba9", "DetectTime": "2023-10-30T14:03:50.404192+02:00", "EventTime": "2023-10-30T14:03:50.404203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["Coc5Fi4r8N7EQZ5zWa"]} -{"Format": "IDEA0", "ID": "26f9b937-31bc-4304-8b60-1ce36083e567", "DetectTime": "2023-10-30T14:03:50.428432+02:00", "EventTime": "2023-10-30T14:03:50.428444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CFaD5U3IZGybKHAkIl"]} -{"Format": "IDEA0", "ID": "d7f27af4-cdd2-4615-ba3d-f73fa11663a7", "DetectTime": "2023-10-30T14:03:50.494665+02:00", "EventTime": "2023-10-30T14:03:50.494687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["CVTka54cTSsHgS8UYg"]} -{"Format": "IDEA0", "ID": "de7c5142-3e0c-4935-a804-41ae2849153a", "DetectTime": "2023-10-30T14:03:50.576953+02:00", "EventTime": "2023-10-30T14:03:50.576974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["C9yf2h1EXBZlclJZc"]} -{"Format": "IDEA0", "ID": "6236888c-22ac-4ac8-86e5-963510f6f148", "DetectTime": "2023-10-30T14:03:50.629245+02:00", "EventTime": "2023-10-30T14:03:50.629262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["ChX0pLOfb6pVR9Eie"]} -{"Format": "IDEA0", "ID": "99c101af-da83-4bf8-bf93-9c65f0c3b87f", "DetectTime": "2023-10-30T14:03:50.658559+02:00", "EventTime": "2023-10-30T14:03:50.658573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["Cq2VsV1rk6kdMtSju6"]} -{"Format": "IDEA0", "ID": "2d81bba5-1c56-40fe-a37a-91c018653a84", "DetectTime": "2023-10-30T14:03:50.681786+02:00", "EventTime": "2023-10-30T14:03:50.681797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CJbXWr424Cc6IEw2Ca"]} -{"Format": "IDEA0", "ID": "cc4f081e-d511-4b2e-8d03-b65d89a5f792", "DetectTime": "2023-10-30T14:03:50.709951+02:00", "EventTime": "2023-10-30T14:03:50.709968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C2qYuADAaYHeiXfz1"]} -{"Format": "IDEA0", "ID": "c063f932-4c96-4920-aab4-3ae61b6d2b01", "DetectTime": "2023-10-30T14:03:50.819309+02:00", "EventTime": "2023-10-30T14:03:50.819361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CZdhRgPn9pQ3cOUHk"]} -{"Format": "IDEA0", "ID": "53e25e8e-2eff-44c3-9c63-fce6264018a2", "DetectTime": "2023-10-30T14:03:50.853848+02:00", "EventTime": "2023-10-30T14:03:50.853860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CkIXEtx6XbS1d5SLb"]} -{"Format": "IDEA0", "ID": "8aabb0d5-6ec3-4616-a204-d9b3293184b8", "DetectTime": "2023-10-30T14:03:50.879249+02:00", "EventTime": "2023-10-30T14:03:50.879265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["CHWws7qwzcE603DJi"]} -{"Format": "IDEA0", "ID": "73a7da1a-7826-44fd-8462-68591e393fa7", "DetectTime": "2023-10-30T14:03:50.914224+02:00", "EventTime": "2023-10-30T14:03:50.914241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.97.99.162 ", "ContentType": "text/plain"}], "uids": ["CaQPC83LuBeZU7wVE4"]} -{"Format": "IDEA0", "ID": "85900ecc-a416-4d69-af91-d950a909e90d", "DetectTime": "2023-10-30T14:03:50.944854+02:00", "EventTime": "2023-10-30T14:03:50.944877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CZsoWPo3oMw8y0vJc"]} -{"Format": "IDEA0", "ID": "b9763484-0e9e-4612-9506-899d68b6269e", "DetectTime": "2023-10-30T14:03:50.975291+02:00", "EventTime": "2023-10-30T14:03:50.975310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CeERnS1HAc5QfLb9c2"]} -{"Format": "IDEA0", "ID": "b8c16fca-1f4e-419b-9488-9644912572f5", "DetectTime": "2023-10-30T14:03:51.006942+02:00", "EventTime": "2023-10-30T14:03:51.006962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["C2rqrL2krdNDQujPbb"]} -{"Format": "IDEA0", "ID": "656b9586-3575-46cd-a36b-8f53052be656", "DetectTime": "2023-10-30T14:03:51.033357+02:00", "EventTime": "2023-10-30T14:03:51.033380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["ChxSZv2ohDiEyb0nW5"]} -{"Format": "IDEA0", "ID": "df12387e-887b-4cc9-aea7-6c3c0816b444", "DetectTime": "2023-10-30T14:03:51.059616+02:00", "EventTime": "2023-10-30T14:03:51.059634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["C3Hxne1LsNDdiJdFw8"]} -{"Format": "IDEA0", "ID": "f3c6d875-7db9-4f5f-a8ba-3758840f1d94", "DetectTime": "2023-10-30T14:03:51.091833+02:00", "EventTime": "2023-10-30T14:03:51.091850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.240.31.91 ", "ContentType": "text/plain"}], "uids": ["Cy7jr61W0z1LKZnHHh"]} -{"Format": "IDEA0", "ID": "743a7119-ff98-4e19-aee3-fda6a49133a9", "DetectTime": "2023-10-30T14:03:51.124475+02:00", "EventTime": "2023-10-30T14:03:51.124497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CPkbJ91bKehxei9LH8"]} -{"Format": "IDEA0", "ID": "f9513d94-947c-42e7-ba8e-9be18bb79478", "DetectTime": "2023-10-30T14:03:51.162504+02:00", "EventTime": "2023-10-30T14:03:51.162523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["ColmQThRdFybxGkY1"]} -{"Format": "IDEA0", "ID": "a731a607-4e34-4609-bf6d-8181d631d657", "DetectTime": "2023-10-30T14:03:51.190008+02:00", "EventTime": "2023-10-30T14:03:51.190021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["CZ8R0j2gGrwTuHZte1"]} -{"Format": "IDEA0", "ID": "5b5509e0-92b0-4971-8781-aed9a36b8df8", "DetectTime": "2023-10-30T14:03:51.219364+02:00", "EventTime": "2023-10-30T14:03:51.219386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.162.184.60 ", "ContentType": "text/plain"}], "uids": ["CWIrojDwOcSvZv4P6"]} -{"Format": "IDEA0", "ID": "d6447041-04da-4f65-a3d6-3231d8027629", "DetectTime": "2023-10-30T14:03:51.247701+02:00", "EventTime": "2023-10-30T14:03:51.247719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["CpFzmo12q1Sne4PBU6"]} -{"Format": "IDEA0", "ID": "3445773b-07b2-4905-b4a8-ed1c5838238e", "DetectTime": "2023-10-30T14:03:51.278882+02:00", "EventTime": "2023-10-30T14:03:51.278899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CVnhmU3OHKIauv5hv6"]} -{"Format": "IDEA0", "ID": "e7b2f525-e8d6-49a8-9ce5-7f5e376b7d66", "DetectTime": "2023-10-30T14:03:51.317466+02:00", "EventTime": "2023-10-30T14:03:51.317553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CbgIJ44n612qg3YPj"]} -{"Format": "IDEA0", "ID": "aa804759-a50d-473d-b1a7-584db6c44583", "DetectTime": "2023-10-30T14:03:51.353331+02:00", "EventTime": "2023-10-30T14:03:51.353355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["ChWC051s0RiApLO6pi"]} -{"Format": "IDEA0", "ID": "18fe515b-d783-400b-9597-475addcddc4f", "DetectTime": "2023-10-30T14:03:51.383946+02:00", "EventTime": "2023-10-30T14:03:51.383963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CLnka71NefyIp9D2b"]} -{"Format": "IDEA0", "ID": "6cc03458-0145-4c65-b36f-285090a32f36", "DetectTime": "2023-10-30T14:03:51.411654+02:00", "EventTime": "2023-10-30T14:03:51.411667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CF6dlH1qJ1YFVGBOi8"]} -{"Format": "IDEA0", "ID": "b6ff3005-4fae-420f-9ab3-95cd3dd259b8", "DetectTime": "2023-10-30T14:03:51.443046+02:00", "EventTime": "2023-10-30T14:03:51.443064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CZMymnqGUUqIaJGwh"]} -{"Format": "IDEA0", "ID": "5b5c32b3-4825-47c8-95d8-799e74c2f464", "DetectTime": "2023-10-30T14:03:51.471302+02:00", "EventTime": "2023-10-30T14:03:51.471325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CB3Cbr4JYZwzfmlhel"]} -{"Format": "IDEA0", "ID": "35c8c074-696c-42e9-a597-e0491c2553b4", "DetectTime": "2023-10-30T14:03:51.497069+02:00", "EventTime": "2023-10-30T14:03:51.497080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["Ck5v333C6wXx8swpp6"]} -{"Format": "IDEA0", "ID": "d3c9588b-f447-4cab-bbbc-82f207026dfb", "DetectTime": "2023-10-30T14:03:51.520022+02:00", "EventTime": "2023-10-30T14:03:51.520041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Ch8FfOAWCvDXqLhH9"]} -{"Format": "Json", "ID": "d3c9588b-f447-4cab-bbbc-82f207026dfb", "DetectTime": "2023-10-30T14:03:51.520022+02:00", "EventTime": "2023-10-30T14:03:51.520041+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T16:31:30.240078+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 63. (real time 2023/10/30 14:03:51.578686)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ec660341-645d-4b16-963d-425c11d6ee64", "DetectTime": "2023-10-30T14:03:51.584277+02:00", "EventTime": "2023-10-30T14:03:51.584296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CK2i3H3X8nDU0as6ta"]} -{"Format": "IDEA0", "ID": "8df80452-b7f7-4e68-a1d6-fc96760d9653", "DetectTime": "2023-10-30T14:03:51.612289+02:00", "EventTime": "2023-10-30T14:03:51.612303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["Cxz4tIprqOCNMHDM"]} -{"Format": "IDEA0", "ID": "e03a805d-d1b0-40c9-a279-10434c59dcf4", "DetectTime": "2023-10-30T14:03:51.636560+02:00", "EventTime": "2023-10-30T14:03:51.636581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["Cxqd0J2RWL9l90NJrd"]} -{"Format": "IDEA0", "ID": "7e23fac8-313e-47b0-9c21-07e5967a852b", "DetectTime": "2023-10-30T14:03:51.662213+02:00", "EventTime": "2023-10-30T14:03:51.662238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18343], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. ", "ContentType": "text/plain"}], "uids": ["CLUdcd3WHRD3nq70r3"]} -{"Format": "IDEA0", "ID": "3c80185d-142f-463b-aced-cb7673b01cfd", "DetectTime": "2023-10-30T14:03:51.695031+02:00", "EventTime": "2023-10-30T14:03:51.695052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["CoMi31373Dso8jkKk3"]} -{"Format": "IDEA0", "ID": "b225ae28-0275-402f-b0f3-d84176a24302", "DetectTime": "2023-10-30T14:03:51.726992+02:00", "EventTime": "2023-10-30T14:03:51.727008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["CBWfTj2QncOhBJgRoh"]} -{"Format": "IDEA0", "ID": "d62b2177-7d5b-475a-89e6-f46f0c4d337a", "DetectTime": "2023-10-30T14:03:51.758220+02:00", "EventTime": "2023-10-30T14:03:51.758242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["C0nPUO2qehV7euCNP1"]} -{"Format": "IDEA0", "ID": "dd90411c-2d79-4362-9ec8-54e8e607269e", "DetectTime": "2023-10-30T14:03:51.789738+02:00", "EventTime": "2023-10-30T14:03:51.789760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. ", "ContentType": "text/plain"}], "uids": ["CWktiX2CRNA1nLP3wk"]} -{"Format": "Json", "ID": "dd90411c-2d79-4362-9ec8-54e8e607269e", "DetectTime": "2023-10-30T14:03:51.789738+02:00", "EventTime": "2023-10-30T14:03:51.789760+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11537], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T16:31:46.766787+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 63. (real time 2023/10/30 14:03:51.851689)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3473afe6-9f64-4531-95ac-8fd8c348df23", "DetectTime": "2023-10-30T14:03:51.857833+02:00", "EventTime": "2023-10-30T14:03:51.857848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CmyS9t1PXJHV11cRE8"]} -{"Format": "IDEA0", "ID": "f397f4fa-c434-46b3-adfa-b2187325c578", "DetectTime": "2023-10-30T14:03:51.883169+02:00", "EventTime": "2023-10-30T14:03:51.883188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CaM7mg3uFO4lwg7foe"]} -{"Format": "IDEA0", "ID": "38aac8fb-d876-43a7-805a-faa757af1810", "DetectTime": "2023-10-30T14:03:51.906486+02:00", "EventTime": "2023-10-30T14:03:51.906500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CF6C203PEeMpHiyZ7c"]} -{"Format": "IDEA0", "ID": "48274cda-4982-47ed-afb1-053b811dd257", "DetectTime": "2023-10-30T14:03:51.929750+02:00", "EventTime": "2023-10-30T14:03:51.929769+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C965xr1DR7WVImGZac"]} -{"Format": "IDEA0", "ID": "7cf5bd4b-ba91-4c89-9d54-a5c9f2488011", "DetectTime": "2023-10-30T14:03:51.938555+02:00", "EventTime": "2023-10-30T14:03:51.938581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CuWpQh2w9GpT67zCF"]} -{"Format": "IDEA0", "ID": "da9a5592-380a-45cc-8d06-0e51381084e0", "DetectTime": "2023-10-30T14:03:51.964762+02:00", "EventTime": "2023-10-30T14:03:51.964778+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZEjCm2YMooZYs9apd"]} -{"Format": "IDEA0", "ID": "2fa9f66a-2b6d-417c-be98-d6699e862972", "DetectTime": "2023-10-30T14:03:51.973813+02:00", "EventTime": "2023-10-30T14:03:51.973834+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVzZKg2qhg1yIZ4eyd"]} -{"Format": "IDEA0", "ID": "7bfb036b-2762-4156-8c05-654dff46e768", "DetectTime": "2023-10-30T14:03:51.982112+02:00", "EventTime": "2023-10-30T14:03:51.982133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["Cn6eHO1ujygqSShfyl"]} -{"Format": "IDEA0", "ID": "4469aa20-d241-4098-8492-d570e78f348c", "DetectTime": "2023-10-30T14:03:52.033704+02:00", "EventTime": "2023-10-30T14:03:52.033722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CZJ09D4hfPUrGdzqb"]} -{"Format": "IDEA0", "ID": "fb1206c9-399a-4aa0-9d37-f5f211f6c94c", "DetectTime": "2023-10-30T14:03:52.057425+02:00", "EventTime": "2023-10-30T14:03:52.057445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["Cev3Xh1FZqyLJeuHSj"]} -{"Format": "IDEA0", "ID": "9bced158-8095-4960-a7cc-d3f752e7cec4", "DetectTime": "2023-10-30T14:03:52.112343+02:00", "EventTime": "2023-10-30T14:03:52.112364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKuRiTenrssmXhH1"]} -{"Format": "IDEA0", "ID": "c13b5710-ea38-4ffa-9193-30441c96e859", "DetectTime": "2023-10-30T14:03:52.162347+02:00", "EventTime": "2023-10-30T14:03:52.162364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CbMoJk1HjxykFdKmKj"]} -{"Format": "IDEA0", "ID": "1423276a-9f84-480f-8613-7b4daaaa270b", "DetectTime": "2023-10-30T14:03:52.216939+02:00", "EventTime": "2023-10-30T14:03:52.216955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C8TWMV2aH5U9h6oaGg"]} -{"Format": "IDEA0", "ID": "dafc68c9-f1f8-4028-a2a7-c7ec67018fbf", "DetectTime": "2023-10-30T14:03:52.265599+02:00", "EventTime": "2023-10-30T14:03:52.265615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CdWX5n1D7g1xuIGyxb"]} -{"Format": "Json", "ID": "dafc68c9-f1f8-4028-a2a7-c7ec67018fbf", "DetectTime": "2023-10-30T14:03:52.265599+02:00", "EventTime": "2023-10-30T14:03:52.265615+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:04:38.600024+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:52.392178)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "016c1441-219b-40e1-8bf6-c9e01685eb9a", "DetectTime": "2023-10-30T14:03:52.397360+02:00", "EventTime": "2023-10-30T14:03:52.397376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CHutQ03gBAZLPzGBRa"]} -{"Format": "IDEA0", "ID": "ed54fd4b-2226-4811-a8a7-c4e6e8b69e12", "DetectTime": "2023-10-30T14:03:52.444819+02:00", "EventTime": "2023-10-30T14:03:52.444832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CJJ0es4NCO3Nkp1Sh"]} -{"Format": "IDEA0", "ID": "bcf54446-3ca8-4172-9c83-c229c77e2106", "DetectTime": "2023-10-30T14:03:52.477496+02:00", "EventTime": "2023-10-30T14:03:52.477513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CT1APG4rbhb9A4rFh"]} -{"Format": "IDEA0", "ID": "f2a084fd-0a26-4e86-b55d-2db44b9bbf29", "DetectTime": "2023-10-30T14:03:52.520693+02:00", "EventTime": "2023-10-30T14:03:52.520709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CTw5Rh1JBZ0gWjCASf"]} -{"Format": "IDEA0", "ID": "f084d39c-d8d3-4afa-9036-255e744c459c", "DetectTime": "2023-10-30T14:03:52.556385+02:00", "EventTime": "2023-10-30T14:03:52.556398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CTzTXe4f0EezltAFV9"]} -{"Format": "IDEA0", "ID": "eb538f6a-3d24-4eb1-8f47-3615fc259168", "DetectTime": "2023-10-30T14:03:52.594766+02:00", "EventTime": "2023-10-30T14:03:52.594803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CWIAcF4t3E1nkLn8ed"]} -{"Format": "IDEA0", "ID": "104cc7a1-1016-4948-9502-3901cd37d5e0", "DetectTime": "2023-10-30T14:03:52.636188+02:00", "EventTime": "2023-10-30T14:03:52.636199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CMIOsb46zbvtcUVkn9"]} -{"Format": "IDEA0", "ID": "a7fe9305-e2f6-4c2c-a041-2ab2d01f9609", "DetectTime": "2023-10-30T14:03:52.676781+02:00", "EventTime": "2023-10-30T14:03:52.676798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CJexZw3qiGACRGyWj8"]} -{"Format": "Json", "ID": "a7fe9305-e2f6-4c2c-a041-2ab2d01f9609", "DetectTime": "2023-10-30T14:03:52.676781+02:00", "EventTime": "2023-10-30T14:03:52.676798+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:04:57.939369+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:52.749492)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "63d7833d-0b1f-4bc7-be6e-f4fca1dca92e", "DetectTime": "2023-10-30T14:03:52.755391+02:00", "EventTime": "2023-10-30T14:03:52.755410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["CTFtvwzIro0kr8bXb"]} -{"Format": "IDEA0", "ID": "a2e44877-27e9-4e72-969f-d34db56b83b1", "DetectTime": "2023-10-30T14:03:52.799528+02:00", "EventTime": "2023-10-30T14:03:52.799548+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C34wIG2dPpawQY5g59"]} -{"Format": "IDEA0", "ID": "c7e54cc3-4650-4028-8970-b9601ac69fb7", "DetectTime": "2023-10-30T14:03:52.807381+02:00", "EventTime": "2023-10-30T14:03:52.807398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["Cy8EQC3SdrlVD3mVyd"]} -{"Format": "IDEA0", "ID": "17270d76-207c-4005-879f-1433f3868db4", "DetectTime": "2023-10-30T14:03:52.849071+02:00", "EventTime": "2023-10-30T14:03:52.849089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CbQFb84mFb0xiRpr81"]} -{"Format": "IDEA0", "ID": "c07492ee-cba9-4216-90f2-2fafac84e774", "DetectTime": "2023-10-30T14:03:52.882817+02:00", "EventTime": "2023-10-30T14:03:52.882861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["Cpx1lC4SZFfcQ7qJj3"]} -{"Format": "IDEA0", "ID": "3de20ccc-c751-49f2-b054-5f82080ed8e9", "DetectTime": "2023-10-30T14:03:52.922816+02:00", "EventTime": "2023-10-30T14:03:52.922831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CrOpDL424IKW0Lr5l"]} -{"Format": "IDEA0", "ID": "eb832611-d7ba-4647-b2f3-d4b0369c312f", "DetectTime": "2023-10-30T14:03:52.956373+02:00", "EventTime": "2023-10-30T14:03:52.956387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["C65xSq8wFd4lxzt07"]} -{"Format": "IDEA0", "ID": "4493ade6-60ba-42b7-8f13-c6d855498ef7", "DetectTime": "2023-10-30T14:03:52.994796+02:00", "EventTime": "2023-10-30T14:03:52.994812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["Cu1DkS2gFWm0U5DWwl"]} -{"Format": "IDEA0", "ID": "a7559511-ce58-4b06-b4ce-29f5554590ec", "DetectTime": "2023-10-30T14:03:53.029490+02:00", "EventTime": "2023-10-30T14:03:53.029510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["Cr6RYZ1rqNlOvLJWIa"]} -{"Format": "Json", "ID": "a7559511-ce58-4b06-b4ce-29f5554590ec", "DetectTime": "2023-10-30T14:03:53.029490+02:00", "EventTime": "2023-10-30T14:03:53.029510+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:05:14.653483+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:53.092347)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d527fae7-1e53-429e-ab2c-1f9d246ae684", "DetectTime": "2023-10-30T14:03:53.096770+02:00", "EventTime": "2023-10-30T14:03:53.096786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["Czg5gS2XPRTokWUNG3"]} -{"Format": "IDEA0", "ID": "ae84b426-1497-44c7-9326-b1a06c5b6b35", "DetectTime": "2023-10-30T14:03:53.117111+02:00", "EventTime": "2023-10-30T14:03:53.117127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CLNWlJ1rChnD3b2p4h"]} -{"Format": "IDEA0", "ID": "2a696669-0620-4ebe-9fd1-e4f5d1963c3a", "DetectTime": "2023-10-30T14:03:53.147785+02:00", "EventTime": "2023-10-30T14:03:53.147796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CWdosonwKX57CQVB4"]} -{"Format": "IDEA0", "ID": "6791e58e-9d77-4db5-a844-2a1f6323a2f8", "DetectTime": "2023-10-30T14:03:53.178870+02:00", "EventTime": "2023-10-30T14:03:53.178882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CDZzUA4XMnyQw6bBId"]} -{"Format": "IDEA0", "ID": "13b7cd50-cf7b-4dc0-a17e-462f238bfe08", "DetectTime": "2023-10-30T14:03:53.211558+02:00", "EventTime": "2023-10-30T14:03:53.211575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["CZVVi91G3zIlS2xpCe"]} -{"Format": "IDEA0", "ID": "60c3efe1-1888-4dce-91ab-b59605dc40db", "DetectTime": "2023-10-30T14:03:53.319709+02:00", "EventTime": "2023-10-30T14:03:53.319731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. ", "ContentType": "text/plain"}], "uids": ["C8dP3r1mwvnrn5afs"]} -{"Format": "IDEA0", "ID": "ead3c2bd-fddb-44b0-9e47-cf0e0bb51777", "DetectTime": "2023-10-30T14:03:53.369884+02:00", "EventTime": "2023-10-30T14:03:53.369906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["C1dPkF4ImOrb1wB1A3"]} -{"Format": "IDEA0", "ID": "b42e8a97-7fc6-4f27-a4ed-d9e7845d43d7", "DetectTime": "2023-10-30T14:03:53.414435+02:00", "EventTime": "2023-10-30T14:03:53.414453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CIxE65CHWi1Tgggng"]} -{"Format": "IDEA0", "ID": "e8d60659-c0f8-40c2-9c7c-20f39c1b42a8", "DetectTime": "2023-10-30T14:03:53.451086+02:00", "EventTime": "2023-10-30T14:03:53.451110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CM4wiU2WBaCyA8UqB4"]} -{"Format": "Json", "ID": "e8d60659-c0f8-40c2-9c7c-20f39c1b42a8", "DetectTime": "2023-10-30T14:03:53.451086+02:00", "EventTime": "2023-10-30T14:03:53.451110+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:05:51.448475+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:53.524031)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea41f415-89f1-42bd-bc33-1cc120d700ac", "DetectTime": "2023-10-30T14:03:53.529968+02:00", "EventTime": "2023-10-30T14:03:53.529983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CAxzxneQxkWQCYk4a", "C965xr1DR7WVImGZac", "CVzZKg2qhg1yIZ4eyd", "CaASk43vYDlS8jJcc5"]} -{"Format": "IDEA0", "ID": "6961880e-1afa-48ea-9f82-a71057df639d", "DetectTime": "2023-10-30T14:03:53.541435+02:00", "EventTime": "2023-10-30T14:03:53.541457+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaASk43vYDlS8jJcc5"]} -{"Format": "IDEA0", "ID": "386121b6-928e-4b7b-ae10-b97663b44d31", "DetectTime": "2023-10-30T14:03:53.554639+02:00", "EventTime": "2023-10-30T14:03:53.554661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C7rtkH3VFK4EcgByM5"]} -{"Format": "IDEA0", "ID": "a848572b-55d8-4128-8151-74064efa3e30", "DetectTime": "2023-10-30T14:03:53.592603+02:00", "EventTime": "2023-10-30T14:03:53.592619+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CO4oaJBf09Ozxoc1e"]} -{"Format": "IDEA0", "ID": "7ca076db-e3d2-4162-81f7-663916692cad", "DetectTime": "2023-10-30T14:03:53.601942+02:00", "EventTime": "2023-10-30T14:03:53.601963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["C7NFpK32AGbnzQDUXc"]} -{"Format": "IDEA0", "ID": "03279d3b-b9f5-4aec-aa7f-c51d2ccebf99", "DetectTime": "2023-10-30T14:03:53.641045+02:00", "EventTime": "2023-10-30T14:03:53.641061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CunzCs1gkbH9PGFeT5"]} -{"Format": "IDEA0", "ID": "c78b9d2e-e03c-4ee8-ab88-e2ccdb137943", "DetectTime": "2023-10-30T14:03:53.680392+02:00", "EventTime": "2023-10-30T14:03:53.680408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["Ccjy3y33g54RTOjSbc"]} -{"Format": "IDEA0", "ID": "5c3b0596-9bf2-426f-a463-fe347b78acaf", "DetectTime": "2023-10-30T14:03:53.717068+02:00", "EventTime": "2023-10-30T14:03:53.717082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["COWsmY3RLWRGOWtBwi"]} -{"Format": "IDEA0", "ID": "2327a6d9-95d8-467c-b2b5-3119c8a60c34", "DetectTime": "2023-10-30T14:03:53.756930+02:00", "EventTime": "2023-10-30T14:03:53.756951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CfER1d1HfMDSgW0QN4"]} -{"Format": "IDEA0", "ID": "ee3d29f2-9992-4e85-9848-8fdf50d8ad60", "DetectTime": "2023-10-30T14:03:53.795301+02:00", "EventTime": "2023-10-30T14:03:53.795327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CYNuRw2b9WCaOrTG8g"]} -{"Format": "IDEA0", "ID": "804b9282-c5b3-497d-a484-4b00c90f12a3", "DetectTime": "2023-10-30T14:03:53.832449+02:00", "EventTime": "2023-10-30T14:03:53.832466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CrYFKw1aGHJEu1Rwih"]} -{"Format": "Json", "ID": "804b9282-c5b3-497d-a484-4b00c90f12a3", "DetectTime": "2023-10-30T14:03:53.832449+02:00", "EventTime": "2023-10-30T14:03:53.832466+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:37:53.231989+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:53.905093)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3218aec-0c80-40e8-8811-3b8f94237c4a", "DetectTime": "2023-10-30T14:03:53.910882+02:00", "EventTime": "2023-10-30T14:03:53.910900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["Cy3Nby4LEPiuc0rjy"]} -{"Format": "IDEA0", "ID": "f0087735-8e63-4399-b30a-7f2dd56a7746", "DetectTime": "2023-10-30T14:03:53.947439+02:00", "EventTime": "2023-10-30T14:03:53.947458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CJJOpiRn9kHJO3mhc"]} -{"Format": "IDEA0", "ID": "41ce4591-892d-46b8-9c36-9318e56484c5", "DetectTime": "2023-10-30T14:03:53.987234+02:00", "EventTime": "2023-10-30T14:03:53.987261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["C6uzWm3RRsvrBU0UYb"]} -{"Format": "IDEA0", "ID": "216ea4f4-5426-48b0-874b-c95c9a994054", "DetectTime": "2023-10-30T14:03:54.024218+02:00", "EventTime": "2023-10-30T14:03:54.024238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CZCcmc2gSb6mSvFRqa"]} -{"Format": "IDEA0", "ID": "fa7b243c-eacb-41da-b451-4e6891a80916", "DetectTime": "2023-10-30T14:03:54.061806+02:00", "EventTime": "2023-10-30T14:03:54.061822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CO9xIm4rZf2CkOKlC3"]} -{"Format": "IDEA0", "ID": "0f7a1f5a-abf4-4515-9e4a-e3f4a9768430", "DetectTime": "2023-10-30T14:03:54.099449+02:00", "EventTime": "2023-10-30T14:03:54.099475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26128], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. ", "ContentType": "text/plain"}], "uids": ["CUJ8Ji4snclvIpTdud"]} -{"Format": "IDEA0", "ID": "f6b14b1d-0407-4522-9c15-4695c194b4b3", "DetectTime": "2023-10-30T14:03:54.137565+02:00", "EventTime": "2023-10-30T14:03:54.137580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CCtLH1NHOt9noxDY6"]} -{"Format": "IDEA0", "ID": "a126c741-f838-405b-ba8a-0c93dfc48de3", "DetectTime": "2023-10-30T14:03:54.172702+02:00", "EventTime": "2023-10-30T14:03:54.172716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CuYQDo34s7lFvf2i65"]} -{"Format": "Json", "ID": "a126c741-f838-405b-ba8a-0c93dfc48de3", "DetectTime": "2023-10-30T14:03:54.172702+02:00", "EventTime": "2023-10-30T14:03:54.172716+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:37:58.257318+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:54.241969)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a10a592f-5934-4892-92c0-10afb105e178", "DetectTime": "2023-10-30T14:03:54.247310+02:00", "EventTime": "2023-10-30T14:03:54.247327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CnUHb8331ouLhD8ljf"]} -{"Format": "IDEA0", "ID": "d41f2ca3-e65f-4979-88d6-aa91e12c6ae5", "DetectTime": "2023-10-30T14:03:54.280640+02:00", "EventTime": "2023-10-30T14:03:54.280657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1711], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. ", "ContentType": "text/plain"}], "uids": ["Cw87Ze1cDwSmXPXze"]} -{"Format": "IDEA0", "ID": "92875dfe-2114-4094-afc5-07a4aa02ed87", "DetectTime": "2023-10-30T14:03:54.311730+02:00", "EventTime": "2023-10-30T14:03:54.311748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cx74jj48eDu3Ugq7Si"]} -{"Format": "IDEA0", "ID": "39ebf199-8cf5-4951-81d0-811a4cc9fe21", "DetectTime": "2023-10-30T14:03:54.346557+02:00", "EventTime": "2023-10-30T14:03:54.346578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CF5ICVaS91Y9kUN31"]} -{"Format": "IDEA0", "ID": "b3b12e73-929f-4ddf-a69b-2ffda602efcc", "DetectTime": "2023-10-30T14:03:54.377933+02:00", "EventTime": "2023-10-30T14:03:54.377948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["C53Ken3o7rdKG12kX9"]} -{"Format": "IDEA0", "ID": "9b7a2375-4e4f-4588-9c38-8c61160f1ae4", "DetectTime": "2023-10-30T14:03:54.410832+02:00", "EventTime": "2023-10-30T14:03:54.410849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["C1l2W22Vr7blShJDP6"]} -{"Format": "IDEA0", "ID": "a894afa5-ba00-4e88-b9d9-1f545b80a9fa", "DetectTime": "2023-10-30T14:03:54.434129+02:00", "EventTime": "2023-10-30T14:03:54.434145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["C9ShSO1xx5B2lrdKQi"]} -{"Format": "IDEA0", "ID": "140fc346-ddee-4a62-acda-0e4686045611", "DetectTime": "2023-10-30T14:03:54.467027+02:00", "EventTime": "2023-10-30T14:03:54.467047+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 82.49.114.244 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2WBSH1gPucaCbH9sb"]} -{"Format": "IDEA0", "ID": "ac9355ea-54df-4f7e-a767-efbd09b43686", "DetectTime": "2023-10-30T14:03:54.531513+02:00", "EventTime": "2023-10-30T14:03:54.531530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CIcfCaXaraSUcdOka"]} -{"Format": "IDEA0", "ID": "15ecc63d-a574-4a2f-826a-f5af98fb2b35", "DetectTime": "2023-10-30T14:03:54.563524+02:00", "EventTime": "2023-10-30T14:03:54.563535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Ch3pdw3UyflP4MOakl"]} -{"Format": "Json", "ID": "15ecc63d-a574-4a2f-826a-f5af98fb2b35", "DetectTime": "2023-10-30T14:03:54.563524+02:00", "EventTime": "2023-10-30T14:03:54.563535+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T17:37:59.082429+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2023/10/30 14:03:54.627555)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e81fb94-938e-4193-b9b6-b2b3f14ec313", "DetectTime": "2023-10-30T14:03:54.633245+02:00", "EventTime": "2023-10-30T14:03:54.633266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["CipM0J28n74vmWNY1h"]} -{"Format": "IDEA0", "ID": "ae38b01b-a1c9-4146-8096-d2885c0c8a16", "DetectTime": "2023-10-30T14:03:54.663293+02:00", "EventTime": "2023-10-30T14:03:54.663310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["CRKXpc23E4HqVqS5X"]} -{"Format": "IDEA0", "ID": "3f1aa924-ef9c-442e-9076-8aa39d175a26", "DetectTime": "2023-10-30T14:03:54.690898+02:00", "EventTime": "2023-10-30T14:03:54.690911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CdZVLL1nggcP0Ew56a"]} -{"Format": "IDEA0", "ID": "2ec851a9-595e-4541-a19e-dfd51c5cef45", "DetectTime": "2023-10-30T14:03:54.711671+02:00", "EventTime": "2023-10-30T14:03:54.711686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C0VSMQ1AemJaL6voh"]} -{"Format": "IDEA0", "ID": "f0d72a93-c60a-442c-884d-28c45269f01f", "DetectTime": "2023-10-30T14:03:54.739571+02:00", "EventTime": "2023-10-30T14:03:54.739586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CzePwENTAQ5WbZpCc"]} -{"Format": "IDEA0", "ID": "9d9abb37-c4b6-4d04-a483-23cede2680eb", "DetectTime": "2023-10-30T14:03:54.786624+02:00", "EventTime": "2023-10-30T14:03:54.786643+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHYEHt4V8XtV5LhYka"]} -{"Format": "IDEA0", "ID": "7c8a0121-b431-455d-a7c9-047ab3087194", "DetectTime": "2023-10-30T14:03:54.794502+02:00", "EventTime": "2023-10-30T14:03:54.794524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CYASCS3y3nfU28RVL2"]} -{"Format": "IDEA0", "ID": "da232207-43f1-4186-906c-29c94c49caf9", "DetectTime": "2023-10-30T14:03:54.833037+02:00", "EventTime": "2023-10-30T14:03:54.833057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["C0I8VHlBLpHg0szmk"]} -{"Format": "IDEA0", "ID": "c6cc733b-c37c-424d-8faf-772a72824f8f", "DetectTime": "2023-10-30T14:03:54.851610+02:00", "EventTime": "2023-10-30T14:03:54.851630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CjFaCt2Ko2XmEzJbX6"]} -{"Format": "IDEA0", "ID": "933d663d-6acb-4d33-924d-0669cf4ebdfb", "DetectTime": "2023-10-30T14:03:54.893154+02:00", "EventTime": "2023-10-30T14:03:54.893172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CDtS953SyFdhTDgY4"]} -{"Format": "IDEA0", "ID": "02e05f4e-6d8a-44e2-9720-0fd147258153", "DetectTime": "2023-10-30T14:03:54.931150+02:00", "EventTime": "2023-10-30T14:03:54.931166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cd1YSF6RlFEXdLTDc"]} -{"Format": "IDEA0", "ID": "a383d4bd-1616-4ed7-b76f-c5d26371e1e6", "DetectTime": "2023-10-30T14:03:54.968917+02:00", "EventTime": "2023-10-30T14:03:54.968929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C4GXZO27pxkzDw7wc6"]} -{"Format": "Json", "ID": "a383d4bd-1616-4ed7-b76f-c5d26371e1e6", "DetectTime": "2023-10-30T14:03:54.968917+02:00", "EventTime": "2023-10-30T14:03:54.968929+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T18:08:48.775312+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2023/10/30 14:03:55.080267)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c40363d1-de04-4e2b-bbce-368356f986b4", "DetectTime": "2023-10-30T14:03:55.086342+02:00", "EventTime": "2023-10-30T14:03:55.086362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C54GAL3hDAZlzCX5L4"]} -{"Format": "IDEA0", "ID": "926bdc70-a618-4505-b71d-9c2c5ff1d7a1", "DetectTime": "2023-10-30T14:03:55.124049+02:00", "EventTime": "2023-10-30T14:03:55.124074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["Cmjkx61HdgD2wW8JM9"]} -{"Format": "IDEA0", "ID": "04d9a0fb-57df-4e5b-9ab1-2b8228911d40", "DetectTime": "2023-10-30T14:03:55.156511+02:00", "EventTime": "2023-10-30T14:03:55.156524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CSf0leInRhWHkTHhj"]} -{"Format": "IDEA0", "ID": "23152a60-f020-499e-bc84-b9dae7574813", "DetectTime": "2023-10-30T14:03:55.196562+02:00", "EventTime": "2023-10-30T14:03:55.196578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CyA1T11uUMUQmE2doa"]} -{"Format": "IDEA0", "ID": "4144b725-0545-400b-b00f-d59060c3feb9", "DetectTime": "2023-10-30T14:03:55.232017+02:00", "EventTime": "2023-10-30T14:03:55.232030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CJSB534RbW6dl1TxHc"]} -{"Format": "IDEA0", "ID": "d5fd0f2e-3e10-4079-b42f-959f8fdd2f78", "DetectTime": "2023-10-30T14:03:55.262099+02:00", "EventTime": "2023-10-30T14:03:55.262115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CUqvNb3aKJyt2Gpdn2"]} -{"Format": "IDEA0", "ID": "14320baa-30c0-4bce-9f1b-3e4184cff8d6", "DetectTime": "2023-10-30T14:03:55.298965+02:00", "EventTime": "2023-10-30T14:03:55.298983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CbGnZ729Mlu1q4HfKa"]} -{"Format": "IDEA0", "ID": "653a1742-2a57-42aa-8265-50f130a574bb", "DetectTime": "2023-10-30T14:03:55.331954+02:00", "EventTime": "2023-10-30T14:03:55.331965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CMyQpFgQop8OfiCI4"]} -{"Format": "Json", "ID": "653a1742-2a57-42aa-8265-50f130a574bb", "DetectTime": "2023-10-30T14:03:55.331954+02:00", "EventTime": "2023-10-30T14:03:55.331965+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T18:09:23.533950+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2023/10/30 14:03:55.389414)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "164a6704-7408-4078-9d1b-0d4738fa28da", "DetectTime": "2023-10-30T14:03:55.395292+02:00", "EventTime": "2023-10-30T14:03:55.395313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CPbczR2UCGI12Hmi6"]} -{"Format": "IDEA0", "ID": "b917c44e-3c8d-43ae-98a2-85a1734f896b", "DetectTime": "2023-10-30T14:03:55.436899+02:00", "EventTime": "2023-10-30T14:03:55.436917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C5lZf04L3CCeWR1zYa"]} -{"Format": "IDEA0", "ID": "1fc6a0de-6eaf-4499-9cf1-510c81f48f9a", "DetectTime": "2023-10-30T14:03:55.470121+02:00", "EventTime": "2023-10-30T14:03:55.470146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CJ4OlL2GxaWt8feoYg"]} -{"Format": "IDEA0", "ID": "251186f0-f51f-4df8-b3fe-ec5d5fa1eec6", "DetectTime": "2023-10-30T14:03:55.504219+02:00", "EventTime": "2023-10-30T14:03:55.504241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CGZ6vD3r5L3aMOMqul"]} -{"Format": "IDEA0", "ID": "0eadfbd7-1ad8-439e-ad2e-e22197d07821", "DetectTime": "2023-10-30T14:03:55.543854+02:00", "EventTime": "2023-10-30T14:03:55.543875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cd4l2A3h3UGLwxhjVc"]} -{"Format": "IDEA0", "ID": "17cb7198-b178-4bc4-9c5e-e7c1d898610a", "DetectTime": "2023-10-30T14:03:55.579811+02:00", "EventTime": "2023-10-30T14:03:55.579828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17720], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. ", "ContentType": "text/plain"}], "uids": ["C8NcT34r3Mu92m3WH2"]} -{"Format": "IDEA0", "ID": "246defe1-f9eb-4e8a-bcc4-7f47f6440da7", "DetectTime": "2023-10-30T14:03:55.612410+02:00", "EventTime": "2023-10-30T14:03:55.612421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CIHuSV1vBW8PYxLSW"]} -{"Format": "IDEA0", "ID": "acf5fe9c-08cc-44c8-972d-3eb0e53bcabc", "DetectTime": "2023-10-30T14:03:55.644626+02:00", "EventTime": "2023-10-30T14:03:55.644651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["C8JHja2kSXJEs9e1T9"]} -{"Format": "Json", "ID": "acf5fe9c-08cc-44c8-972d-3eb0e53bcabc", "DetectTime": "2023-10-30T14:03:55.644626+02:00", "EventTime": "2023-10-30T14:03:55.644651+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T18:09:39.697446+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2023/10/30 14:03:55.709231)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "80390986-e623-4425-9de3-bf431ce90d1f", "DetectTime": "2023-10-30T14:03:55.713994+02:00", "EventTime": "2023-10-30T14:03:55.714012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CgLxxr2Zh2YUsifc3"]} -{"Format": "IDEA0", "ID": "eb1091e4-7b56-497a-a047-3729bd742b63", "DetectTime": "2023-10-30T14:03:55.745932+02:00", "EventTime": "2023-10-30T14:03:55.745948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["CQSfOb1IavBm1EXr9c"]} -{"Format": "IDEA0", "ID": "63ffd50a-cbc1-4b26-bd68-1c66ea2d94b9", "DetectTime": "2023-10-30T14:03:55.778655+02:00", "EventTime": "2023-10-30T14:03:55.778674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["C7pPET1rvWp99w6hIi"]} -{"Format": "IDEA0", "ID": "938a5e2b-61e1-4700-9783-bcf7ae8d10b2", "DetectTime": "2023-10-30T14:03:55.810629+02:00", "EventTime": "2023-10-30T14:03:55.810645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqJYC74YixPBwLouG5"]} -{"Format": "IDEA0", "ID": "86cd17ad-147b-4f08-b269-2489682b7305", "DetectTime": "2023-10-30T14:03:55.842224+02:00", "EventTime": "2023-10-30T14:03:55.842245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CrQNFuQUTDu31M8ic"]} -{"Format": "IDEA0", "ID": "f8229a7d-8cfd-4fee-8629-966104b7366f", "DetectTime": "2023-10-30T14:03:55.870761+02:00", "EventTime": "2023-10-30T14:03:55.870794+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CT20RwdYc6gsWFBOd"]} -{"Format": "IDEA0", "ID": "8e7207d8-deb9-4610-b787-2defb087405d", "DetectTime": "2023-10-30T14:03:55.877640+02:00", "EventTime": "2023-10-30T14:03:55.877656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CD32Wg1BxSazCuHHI3"]} -{"Format": "IDEA0", "ID": "27e88ccc-ded3-403b-bb15-9f83ff0d1f16", "DetectTime": "2023-10-30T14:03:55.908486+02:00", "EventTime": "2023-10-30T14:03:55.908507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C6snPh3Ffmjw2xY3A1"]} -{"Format": "IDEA0", "ID": "23731480-c985-4b1b-9692-17d44ce43e2f", "DetectTime": "2023-10-30T14:03:55.939556+02:00", "EventTime": "2023-10-30T14:03:55.939574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CIdtkr4VKiVkybYAvk"]} -{"Format": "Json", "ID": "23731480-c985-4b1b-9692-17d44ce43e2f", "DetectTime": "2023-10-30T14:03:55.939556+02:00", "EventTime": "2023-10-30T14:03:55.939574+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T18:41:00.573348+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2023/10/30 14:03:56.076172)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "00554bd1-99eb-46df-9685-63d14f0a974b", "DetectTime": "2023-10-30T14:03:56.080739+02:00", "EventTime": "2023-10-30T14:03:56.080757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CSYpnCdH50Qfe1Oed"]} -{"Format": "IDEA0", "ID": "3bddf7a7-0cd2-4533-a729-f0187647feee", "DetectTime": "2023-10-30T14:03:56.114593+02:00", "EventTime": "2023-10-30T14:03:56.114606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CcydrW3jwNTrOU87ng"]} -{"Format": "IDEA0", "ID": "0168282e-fc25-44a7-98f1-685fb59570fd", "DetectTime": "2023-10-30T14:03:56.144848+02:00", "EventTime": "2023-10-30T14:03:56.144862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["Ctv9gl4gxtWtyM9ai7"]} -{"Format": "IDEA0", "ID": "feb2205b-c2c4-4597-a654-21ae09df8146", "DetectTime": "2023-10-30T14:03:56.173214+02:00", "EventTime": "2023-10-30T14:03:56.173231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CXyreI1hnlWrF6X6Tk"]} -{"Format": "IDEA0", "ID": "61bb1e6c-7f15-45c7-93c1-53c2205d4d7e", "DetectTime": "2023-10-30T14:03:56.198306+02:00", "EventTime": "2023-10-30T14:03:56.198325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CvR5ow1fqU2PzKwqYe"]} -{"Format": "IDEA0", "ID": "ba897fc7-62d1-4832-8548-7053554fdce0", "DetectTime": "2023-10-30T14:03:56.228181+02:00", "EventTime": "2023-10-30T14:03:56.228197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CpDSxl4njTixScfmP8"]} -{"Format": "IDEA0", "ID": "7091c05d-9334-4b89-b984-bbd4df06bb3b", "DetectTime": "2023-10-30T14:03:56.256341+02:00", "EventTime": "2023-10-30T14:03:56.256358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1377], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. ", "ContentType": "text/plain"}], "uids": ["CCmGtqTJ0ZKrvpoxb"]} -{"Format": "IDEA0", "ID": "91e35774-3eef-4b60-8ef2-3c93c3b3e057", "DetectTime": "2023-10-30T14:03:56.287706+02:00", "EventTime": "2023-10-30T14:03:56.287732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CbSvFA1N9jl3IAgbdh"]} -{"Format": "Json", "ID": "91e35774-3eef-4b60-8ef2-3c93c3b3e057", "DetectTime": "2023-10-30T14:03:56.287706+02:00", "EventTime": "2023-10-30T14:03:56.287732+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T18:41:20.582400+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2023/10/30 14:03:56.349067)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "76602f95-148a-4057-b62e-97caeef7eea3", "DetectTime": "2023-10-30T14:03:56.354708+02:00", "EventTime": "2023-10-30T14:03:56.354725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CpIZzZf1hyY7owALi"]} -{"Format": "IDEA0", "ID": "22f03bca-ee29-4cff-b199-27c485582f9f", "DetectTime": "2023-10-30T14:03:56.385819+02:00", "EventTime": "2023-10-30T14:03:56.385835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CI2h1l1tI1cLLjCuLk"]} -{"Format": "IDEA0", "ID": "3575f963-4675-4f4a-ba6b-b90400b626f3", "DetectTime": "2023-10-30T14:03:56.414511+02:00", "EventTime": "2023-10-30T14:03:56.414533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["Ck6pNp3uXkH8cAzp58"]} -{"Format": "IDEA0", "ID": "0bca22b3-9d80-465a-ab9e-11196eb8056c", "DetectTime": "2023-10-30T14:03:56.440592+02:00", "EventTime": "2023-10-30T14:03:56.440609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CLCxuB2D4Iab7LSJU8"]} -{"Format": "IDEA0", "ID": "d0c2dc9f-6798-4e90-8209-44575e42a0db", "DetectTime": "2023-10-30T14:03:56.466444+02:00", "EventTime": "2023-10-30T14:03:56.466460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CileaO1Hw6mwiBioYc"]} -{"Format": "IDEA0", "ID": "70b82708-7c09-4ad3-b8a7-76b4f7740d5e", "DetectTime": "2023-10-30T14:03:56.492738+02:00", "EventTime": "2023-10-30T14:03:56.492765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CN58V8TeZfAG8Amm"]} -{"Format": "IDEA0", "ID": "2d390120-d4c3-42fa-b053-dfe9230f89fd", "DetectTime": "2023-10-30T14:03:56.518091+02:00", "EventTime": "2023-10-30T14:03:56.518112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CVMXcD418TGDZ9qrmi"]} -{"Format": "IDEA0", "ID": "ac3a2a27-ddd7-4b83-a35d-5577dd7142ba", "DetectTime": "2023-10-30T14:03:56.544125+02:00", "EventTime": "2023-10-30T14:03:56.544142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. ", "ContentType": "text/plain"}], "uids": ["CImReG1DusNjvfnF8d"]} -{"Format": "Json", "ID": "ac3a2a27-ddd7-4b83-a35d-5577dd7142ba", "DetectTime": "2023-10-30T14:03:56.544125+02:00", "EventTime": "2023-10-30T14:03:56.544142+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T18:41:39.706219+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2023/10/30 14:03:56.605115)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9bd2afd7-6a6e-40cf-aa16-182a3eb4e964", "DetectTime": "2023-10-30T14:03:56.610536+02:00", "EventTime": "2023-10-30T14:03:56.610552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["Ch4cQZ2XY1Egojwlih"]} -{"Format": "IDEA0", "ID": "b09f9c74-216c-4729-8245-a4b95bcfc217", "DetectTime": "2023-10-30T14:03:56.636161+02:00", "EventTime": "2023-10-30T14:03:56.636178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. ", "ContentType": "text/plain"}], "uids": ["CS1NPH1pQDbafArj68"]} -{"Format": "IDEA0", "ID": "bc1293be-bd27-4a9c-a3cf-832d47356b9a", "DetectTime": "2023-10-30T14:03:56.659048+02:00", "EventTime": "2023-10-30T14:03:56.659060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CI5GMK2vGCxWfn5VF"]} -{"Format": "IDEA0", "ID": "0e32a4da-9e23-4a48-9b11-8112eb16afa3", "DetectTime": "2023-10-30T14:03:56.686089+02:00", "EventTime": "2023-10-30T14:03:56.686101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Clk1gz3xtAJTivoxVh"]} -{"Format": "IDEA0", "ID": "5c144688-2ea4-4f90-9f41-de1c011d0914", "DetectTime": "2023-10-30T14:03:56.711207+02:00", "EventTime": "2023-10-30T14:03:56.711218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CpUPQK3TNgIWyynBVk"]} -{"Format": "IDEA0", "ID": "d9e6674f-89d1-4a0f-abab-2c203cd42dae", "DetectTime": "2023-10-30T14:03:56.787331+02:00", "EventTime": "2023-10-30T14:03:56.787352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Ck2h0R2EvdElDdNii1"]} -{"Format": "IDEA0", "ID": "f4435885-9ad9-496f-b1a4-2f09057a7d36", "DetectTime": "2023-10-30T14:03:56.860772+02:00", "EventTime": "2023-10-30T14:03:56.860786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEPl3P2NVX7XLCdfG2"]} -{"Format": "IDEA0", "ID": "7dc1c5c3-5890-4eaa-a311-a97958f79f4d", "DetectTime": "2023-10-30T14:03:56.938086+02:00", "EventTime": "2023-10-30T14:03:56.938103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["ClhCOt3OLHSirImFWe"]} -{"Format": "IDEA0", "ID": "3824e294-c53d-4c48-b70d-23dd8c077647", "DetectTime": "2023-10-30T14:03:57.015061+02:00", "EventTime": "2023-10-30T14:03:57.015080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["C6gWhA2mJYnB2vZ043"]} -{"Format": "IDEA0", "ID": "ce422178-be86-4f67-b986-c436560465a5", "DetectTime": "2023-10-30T14:03:57.097068+02:00", "EventTime": "2023-10-30T14:03:57.097085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CzVFrp1RWT8vhISuWk"]} -{"Format": "IDEA0", "ID": "f7a680ec-39ca-43cc-889d-6621648204f4", "DetectTime": "2023-10-30T14:03:57.174499+02:00", "EventTime": "2023-10-30T14:03:57.174521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CDe2FE4LjeWXevqfr6"]} -{"Format": "Json", "ID": "f7a680ec-39ca-43cc-889d-6621648204f4", "DetectTime": "2023-10-30T14:03:57.174499+02:00", "EventTime": "2023-10-30T14:03:57.174521+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:12:37.247196+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:03:57.303534)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2e4dadc3-6c3a-4d38-ba1c-9834624deb27", "DetectTime": "2023-10-30T14:03:57.309448+02:00", "EventTime": "2023-10-30T14:03:57.309467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CqNzFr45TYZQWb9W4h"]} -{"Format": "IDEA0", "ID": "ea1a7683-1cf7-4c9d-a55f-1a7f19f4ac93", "DetectTime": "2023-10-30T14:03:57.385322+02:00", "EventTime": "2023-10-30T14:03:57.385339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CoLygM3XzdR0PWfIKf"]} -{"Format": "IDEA0", "ID": "b1ad8e4d-2ba1-47e7-8167-f86df8b79822", "DetectTime": "2023-10-30T14:03:57.454188+02:00", "EventTime": "2023-10-30T14:03:57.454213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CnFEqy1iQm03mnB1Eb"]} -{"Format": "IDEA0", "ID": "bb751956-8f06-4880-a3bf-4c5bc81f3db2", "DetectTime": "2023-10-30T14:03:57.525157+02:00", "EventTime": "2023-10-30T14:03:57.525177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CH5Zy32HRNa22W5mZ"]} -{"Format": "IDEA0", "ID": "a5e9e4ea-56b5-4cf2-9346-d6712f816d7b", "DetectTime": "2023-10-30T14:03:57.590556+02:00", "EventTime": "2023-10-30T14:03:57.590572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CDNxYOaP0vwOend"]} -{"Format": "IDEA0", "ID": "ed852cdc-c258-4f2e-921c-321d043387b7", "DetectTime": "2023-10-30T14:03:57.653528+02:00", "EventTime": "2023-10-30T14:03:57.653547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CUMhsV4C66FI5b2Vg"]} -{"Format": "IDEA0", "ID": "026f7533-e752-4fce-afd0-8ab51a963001", "DetectTime": "2023-10-30T14:03:57.715066+02:00", "EventTime": "2023-10-30T14:03:57.715082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CMFTHs25a509OOe3K8"]} -{"Format": "IDEA0", "ID": "13497277-87aa-44d1-bc68-5738c0894e0c", "DetectTime": "2023-10-30T14:03:57.776194+02:00", "EventTime": "2023-10-30T14:03:57.776211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CfhjqS2VplfR73qyGc"]} -{"Format": "Json", "ID": "13497277-87aa-44d1-bc68-5738c0894e0c", "DetectTime": "2023-10-30T14:03:57.776194+02:00", "EventTime": "2023-10-30T14:03:57.776211+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:12:58.515446+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:03:57.922413)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ff2bdd96-b5bd-48ca-be24-6ac14a2e9374", "DetectTime": "2023-10-30T14:03:57.927987+02:00", "EventTime": "2023-10-30T14:03:57.927999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C6n1X62Cn4cmRDdhK9"]} -{"Format": "IDEA0", "ID": "f1ace9f3-d173-40c7-9646-5f1ca8d8e4a1", "DetectTime": "2023-10-30T14:03:58.000339+02:00", "EventTime": "2023-10-30T14:03:58.000359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["C6IJ9X2e8U2kxEjjNj"]} -{"Format": "IDEA0", "ID": "3b810907-b509-4e18-99fd-e037160ccd47", "DetectTime": "2023-10-30T14:03:58.068889+02:00", "EventTime": "2023-10-30T14:03:58.068911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C8WIaq2zwZAfRQw5ca"]} -{"Format": "IDEA0", "ID": "057c8ab8-1fd6-419b-a949-0f00ce1c7761", "DetectTime": "2023-10-30T14:03:58.135555+02:00", "EventTime": "2023-10-30T14:03:58.135571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. ", "ContentType": "text/plain"}], "uids": ["CqiW8Q3KauSNgoMyyh"]} -{"Format": "IDEA0", "ID": "a6ac940a-2f28-4695-b308-b188ae41a7f6", "DetectTime": "2023-10-30T14:03:58.200517+02:00", "EventTime": "2023-10-30T14:03:58.200532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["ChSo6517fAyWePfPFc"]} -{"Format": "IDEA0", "ID": "1cd84266-e7e8-4ca0-b706-ff34130b919d", "DetectTime": "2023-10-30T14:03:58.263203+02:00", "EventTime": "2023-10-30T14:03:58.263223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CLdt6037bt78DOpsF9"]} -{"Format": "IDEA0", "ID": "8db8c2b4-c506-4196-8371-b63654706eaa", "DetectTime": "2023-10-30T14:03:58.329305+02:00", "EventTime": "2023-10-30T14:03:58.329327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CVgiUN36G6mpwvQVr8"]} -{"Format": "IDEA0", "ID": "b47f2b0a-7635-423b-9215-ad329894094f", "DetectTime": "2023-10-30T14:03:58.399750+02:00", "EventTime": "2023-10-30T14:03:58.399767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["CbcIdY37YuSjMQZIJ3"]} -{"Format": "Json", "ID": "b47f2b0a-7635-423b-9215-ad329894094f", "DetectTime": "2023-10-30T14:03:58.399750+02:00", "EventTime": "2023-10-30T14:03:58.399767+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:14:00.858965+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:03:58.504056)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "36457aa7-8131-4cd7-bb24-130fae00a1c8", "DetectTime": "2023-10-30T14:03:58.509620+02:00", "EventTime": "2023-10-30T14:03:58.509635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CgU6BC2liv0MxNneqa"]} -{"Format": "IDEA0", "ID": "c57a60d8-b383-46c8-8dc3-dae68b17f95b", "DetectTime": "2023-10-30T14:03:58.582761+02:00", "EventTime": "2023-10-30T14:03:58.582790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C0QYeb2QLk15S7RmVg"]} -{"Format": "IDEA0", "ID": "3a24f390-0990-4938-b8ce-116c872c459b", "DetectTime": "2023-10-30T14:03:58.656721+02:00", "EventTime": "2023-10-30T14:03:58.656737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CPRKbT2SFA3mL5Okd3"]} -{"Format": "IDEA0", "ID": "3eba1b89-bb46-418b-aa7e-84561cd286a2", "DetectTime": "2023-10-30T14:03:58.730809+02:00", "EventTime": "2023-10-30T14:03:58.730823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CUGgkH3XrNXdhjYwe1"]} -{"Format": "IDEA0", "ID": "8e548456-e18b-4940-b025-b48932fc0da1", "DetectTime": "2023-10-30T14:03:58.798057+02:00", "EventTime": "2023-10-30T14:03:58.798072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["C0SImc4QNzOEbQUEAl"]} -{"Format": "IDEA0", "ID": "403e515b-0080-4758-992c-797002eeda3f", "DetectTime": "2023-10-30T14:03:58.863416+02:00", "EventTime": "2023-10-30T14:03:58.863434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CZ2qmL1ogj1FzRCoO"]} -{"Format": "IDEA0", "ID": "655aceee-3fe9-4cda-8a69-6b9361a3bdb0", "DetectTime": "2023-10-30T14:03:58.929735+02:00", "EventTime": "2023-10-30T14:03:58.929751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CsxSyp2bu1WQZv1crl"]} -{"Format": "IDEA0", "ID": "f4acafca-a761-47f6-8761-33806d622a36", "DetectTime": "2023-10-30T14:03:58.994280+02:00", "EventTime": "2023-10-30T14:03:58.994296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CqkO383rkYJiU9xX7e"]} -{"Format": "Json", "ID": "f4acafca-a761-47f6-8761-33806d622a36", "DetectTime": "2023-10-30T14:03:58.994280+02:00", "EventTime": "2023-10-30T14:03:58.994296+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:14:04.939807+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:03:59.092159)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "320b8fa3-8567-4d8e-83c3-6a9ae28aaac4", "DetectTime": "2023-10-30T14:03:59.097353+02:00", "EventTime": "2023-10-30T14:03:59.097370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CRtUDX2Qk17T6R1ckj"]} -{"Format": "IDEA0", "ID": "436e3df4-1638-4f30-8d99-8db913e24dfd", "DetectTime": "2023-10-30T14:03:59.168233+02:00", "EventTime": "2023-10-30T14:03:59.168250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CjBnQm3ylUyYdtTCX3"]} -{"Format": "IDEA0", "ID": "65b0f1ae-8ef4-4a4f-b0ee-68a010843667", "DetectTime": "2023-10-30T14:03:59.245878+02:00", "EventTime": "2023-10-30T14:03:59.245895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["C2ASNF1ufCqflxcxrl"]} -{"Format": "IDEA0", "ID": "1f850dc1-134b-4ab0-94b2-cf97b6ecf4f4", "DetectTime": "2023-10-30T14:03:59.309091+02:00", "EventTime": "2023-10-30T14:03:59.309108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CSThDv4yhew51By5D9"]} -{"Format": "IDEA0", "ID": "fc0ce8f5-41b3-4d49-8725-53f7c8d333a5", "DetectTime": "2023-10-30T14:03:59.380226+02:00", "EventTime": "2023-10-30T14:03:59.380244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CuDTIX3jesrwAjprZ3"]} -{"Format": "IDEA0", "ID": "16ec68b5-49e2-480d-a9eb-19c074848b14", "DetectTime": "2023-10-30T14:03:59.442894+02:00", "EventTime": "2023-10-30T14:03:59.442911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ccn1Hw1NbJjFcCKDRa"]} -{"Format": "IDEA0", "ID": "f78c6bf7-add7-46bd-8f38-83474f9203a7", "DetectTime": "2023-10-30T14:03:59.506808+02:00", "EventTime": "2023-10-30T14:03:59.506826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CV8x8gE7krRPUY4Vl"]} -{"Format": "IDEA0", "ID": "8bef55a7-5cf6-448c-b648-fc4e6b47db3d", "DetectTime": "2023-10-30T14:03:59.572325+02:00", "EventTime": "2023-10-30T14:03:59.572341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.96.182.207. ", "ContentType": "text/plain"}], "uids": ["C1SPDX3XhKQYtLMbt3"]} -{"Format": "Json", "ID": "8bef55a7-5cf6-448c-b648-fc4e6b47db3d", "DetectTime": "2023-10-30T14:03:59.572325+02:00", "EventTime": "2023-10-30T14:03:59.572341+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:15:16.741160+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:03:59.669539)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "81377d96-e50a-4647-80b7-d33dea5e5426", "DetectTime": "2023-10-30T14:03:59.674940+02:00", "EventTime": "2023-10-30T14:03:59.674957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["CORxue2nNSm5v8GWSa"]} -{"Format": "IDEA0", "ID": "197781ef-8f1b-4ad1-a12e-3ecb3f223dd6", "DetectTime": "2023-10-30T14:03:59.701436+02:00", "EventTime": "2023-10-30T14:03:59.701459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CR9THB1Xrrwo9P8hd4"]} -{"Format": "IDEA0", "ID": "1d2783fd-75b7-4db6-b64d-96a63ef03787", "DetectTime": "2023-10-30T14:03:59.764347+02:00", "EventTime": "2023-10-30T14:03:59.764370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CXnVzL5H0aXh0d6N7"]} -{"Format": "IDEA0", "ID": "b84bf0c1-3382-48ee-b52a-26cf3b7d4ce3", "DetectTime": "2023-10-30T14:03:59.826303+02:00", "EventTime": "2023-10-30T14:03:59.826320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. ", "ContentType": "text/plain"}], "uids": ["CM7HHm3zaKo1Xgprji"]} -{"Format": "IDEA0", "ID": "68bccf78-1105-450b-8154-847c4c69c465", "DetectTime": "2023-10-30T14:03:59.876708+02:00", "EventTime": "2023-10-30T14:03:59.876720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CUzVpG4XV9fKPtTCt"]} -{"Format": "IDEA0", "ID": "d7b7762d-2cb3-46e0-a70a-42960ef54879", "DetectTime": "2023-10-30T14:03:59.926895+02:00", "EventTime": "2023-10-30T14:03:59.926908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1126], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1126/UDP destination IP 92.47.19.247. ", "ContentType": "text/plain"}], "uids": ["CRKB8G2dJvfoVJbrJ1"]} -{"Format": "IDEA0", "ID": "95342600-2782-412b-b0ea-eda6b3685c71", "DetectTime": "2023-10-30T14:03:59.989345+02:00", "EventTime": "2023-10-30T14:03:59.989361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2741], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2741/UDP destination IP 186.92.135.248. ", "ContentType": "text/plain"}], "uids": ["CmG0MI3AExTnopNLCb"]} -{"Format": "IDEA0", "ID": "9a2f9800-cbbc-44b9-b1d1-23969a4f4d38", "DetectTime": "2023-10-30T14:04:00.043685+02:00", "EventTime": "2023-10-30T14:04:00.043696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CXTJwC2tr2fK9ssHka"]} -{"Format": "IDEA0", "ID": "28faa88d-846c-4da5-99a4-01b06e066db2", "DetectTime": "2023-10-30T14:04:00.094087+02:00", "EventTime": "2023-10-30T14:04:00.094099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. ", "ContentType": "text/plain"}], "uids": ["C5dVBNxwyX8IdaIn5"]} -{"Format": "Json", "ID": "28faa88d-846c-4da5-99a4-01b06e066db2", "DetectTime": "2023-10-30T14:04:00.094087+02:00", "EventTime": "2023-10-30T14:04:00.094099+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:19:06.831624+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:00.181479)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c0d06b23-6e4a-45cc-b74a-0c63ec12d406", "DetectTime": "2023-10-30T14:04:00.187557+02:00", "EventTime": "2023-10-30T14:04:00.187575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8211], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8211/UDP destination IP 190.246.2.43. ", "ContentType": "text/plain"}], "uids": ["CMLvra2O04kZY4z8oi"]} -{"Format": "IDEA0", "ID": "924dd22a-af83-4914-9535-637c76034d03", "DetectTime": "2023-10-30T14:04:00.241642+02:00", "EventTime": "2023-10-30T14:04:00.241658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CvnuW92pFMw2dayZk3"]} -{"Format": "IDEA0", "ID": "f52652ef-7209-4d60-9a5b-3dd34d3cef38", "DetectTime": "2023-10-30T14:04:00.300891+02:00", "EventTime": "2023-10-30T14:04:00.300907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CS2yGuf3K9HZ9i7pf"]} -{"Format": "IDEA0", "ID": "7cb4ae93-2c3a-405e-acf1-c33a2825b8be", "DetectTime": "2023-10-30T14:04:00.359765+02:00", "EventTime": "2023-10-30T14:04:00.359784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["Cktwva3g2i3MKebUq3"]} -{"Format": "IDEA0", "ID": "bd255745-61f5-4afd-b606-078c1b59b65e", "DetectTime": "2023-10-30T14:04:00.411457+02:00", "EventTime": "2023-10-30T14:04:00.411470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28610], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28610/UDP destination IP 78.166.143.39. ", "ContentType": "text/plain"}], "uids": ["CZmo1h1bO3rKwxXs8h"]} -{"Format": "IDEA0", "ID": "977c3c7d-29ea-4100-a75a-c91d8a63fc25", "DetectTime": "2023-10-30T14:04:00.464178+02:00", "EventTime": "2023-10-30T14:04:00.464197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.42.42. ", "ContentType": "text/plain"}], "uids": ["CN2VGwcF8ZpaiEaD5"]} -{"Format": "IDEA0", "ID": "9d5865df-4044-4b16-8cbf-057373be3df9", "DetectTime": "2023-10-30T14:04:00.518676+02:00", "EventTime": "2023-10-30T14:04:00.518691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8384/UDP destination IP 188.94.158.164. ", "ContentType": "text/plain"}], "uids": ["CXcvAk17JCygswB1Ri"]} -{"Format": "IDEA0", "ID": "7b321520-59d7-429f-8691-e47c93faab7d", "DetectTime": "2023-10-30T14:04:00.575373+02:00", "EventTime": "2023-10-30T14:04:00.575391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19105/UDP destination IP 151.74.131.196. ", "ContentType": "text/plain"}], "uids": ["Ch8UfA1WF94Kkjriqd"]} -{"Format": "Json", "ID": "7b321520-59d7-429f-8691-e47c93faab7d", "DetectTime": "2023-10-30T14:04:00.575373+02:00", "EventTime": "2023-10-30T14:04:00.575391+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19105], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:21:00.845581+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:00.653436)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb1dfbb9-9328-4750-825d-2995cc8fa0ee", "DetectTime": "2023-10-30T14:04:00.658868+02:00", "EventTime": "2023-10-30T14:04:00.658884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19077], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. ", "ContentType": "text/plain"}], "uids": ["Ck58PC3MoB7GlZn9O4"]} -{"Format": "IDEA0", "ID": "15f02602-bc47-485e-8dbe-9d4f6535af3e", "DetectTime": "2023-10-30T14:04:00.708987+02:00", "EventTime": "2023-10-30T14:04:00.709003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16788], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16788/UDP destination IP 188.169.80.149. ", "ContentType": "text/plain"}], "uids": ["CZiQPQ2DE4ZklGA8O2"]} -{"Format": "IDEA0", "ID": "e70886d7-9873-4a9e-8ae7-dd4a3273284d", "DetectTime": "2023-10-30T14:04:00.760359+02:00", "EventTime": "2023-10-30T14:04:00.760375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["Cbo1AC1wz9pFFFdaK2"]} -{"Format": "IDEA0", "ID": "322495a3-5fed-4bfc-b222-6a9fe57d5ef0", "DetectTime": "2023-10-30T14:04:00.811803+02:00", "EventTime": "2023-10-30T14:04:00.811821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CxDIy5AZoDxdmP4a"]} -{"Format": "IDEA0", "ID": "28299b5d-f618-439f-8726-a2a1a49a9ff4", "DetectTime": "2023-10-30T14:04:00.865465+02:00", "EventTime": "2023-10-30T14:04:00.865480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CB9Vtk2kqLqvC0OU9c"]} -{"Format": "IDEA0", "ID": "2a17e771-d7b2-4d1e-aa3a-0fa22e5dc87c", "DetectTime": "2023-10-30T14:04:00.915931+02:00", "EventTime": "2023-10-30T14:04:00.915949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["CspSo74Wq67BaqGMla"]} -{"Format": "IDEA0", "ID": "4d6d77b1-6b15-47c8-a941-51ffd9ce0339", "DetectTime": "2023-10-30T14:04:00.971454+02:00", "EventTime": "2023-10-30T14:04:00.971475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CypOMMHLKbF4QMjF6"]} -{"Format": "IDEA0", "ID": "039c3448-ae00-4c2d-8d11-9c862244bf58", "DetectTime": "2023-10-30T14:04:01.025390+02:00", "EventTime": "2023-10-30T14:04:01.025401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CSJmit3J0m0ERT2YD"]} -{"Format": "Json", "ID": "039c3448-ae00-4c2d-8d11-9c862244bf58", "DetectTime": "2023-10-30T14:04:01.025390+02:00", "EventTime": "2023-10-30T14:04:01.025401+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:21:52.128963+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:01.110078)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "faca6234-22e1-4f83-8bc2-3b63188645e5", "DetectTime": "2023-10-30T14:04:01.114356+02:00", "EventTime": "2023-10-30T14:04:01.114368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. ", "ContentType": "text/plain"}], "uids": ["CvkWHA2BtrXDBxTQk6"]} -{"Format": "IDEA0", "ID": "e700f4a6-bab3-42aa-b2c8-1d3cd00525e7", "DetectTime": "2023-10-30T14:04:01.168237+02:00", "EventTime": "2023-10-30T14:04:01.168247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21538], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21538/UDP destination IP 31.11.249.52. ", "ContentType": "text/plain"}], "uids": ["ClsKdk2NIxdjc0Lav"]} -{"Format": "IDEA0", "ID": "2923459c-2ba4-4b5a-81d8-d452850e3db7", "DetectTime": "2023-10-30T14:04:01.212042+02:00", "EventTime": "2023-10-30T14:04:01.212063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CXh9F43KnU71TnnZ5k"]} -{"Format": "IDEA0", "ID": "841a22e0-9d94-4f14-b3bd-c550aa0eeb0b", "DetectTime": "2023-10-30T14:04:01.262538+02:00", "EventTime": "2023-10-30T14:04:01.262553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10466], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10466/UDP destination IP 59.180.153.115. ", "ContentType": "text/plain"}], "uids": ["CnKMxI1ycZd90vHoXf"]} -{"Format": "IDEA0", "ID": "594af702-0420-4d45-84ef-5723ac6f670f", "DetectTime": "2023-10-30T14:04:01.308841+02:00", "EventTime": "2023-10-30T14:04:01.308858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11369], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. ", "ContentType": "text/plain"}], "uids": ["C07TrOmN30pZThs2d"]} -{"Format": "IDEA0", "ID": "083930b3-5b8c-4b32-85f3-c6384bc43247", "DetectTime": "2023-10-30T14:04:01.361401+02:00", "EventTime": "2023-10-30T14:04:01.361416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23412], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23412/UDP destination IP 217.55.57.160. ", "ContentType": "text/plain"}], "uids": ["C2sWqV3lC4ME98OkB4"]} -{"Format": "IDEA0", "ID": "00bdfd86-97b7-43d5-8004-85c6c59ed494", "DetectTime": "2023-10-30T14:04:01.415049+02:00", "EventTime": "2023-10-30T14:04:01.415066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CuBE2s2Y0qqKYm24Kl"]} -{"Format": "IDEA0", "ID": "2d285d71-9e5f-4198-a59b-c8c6b5c1158d", "DetectTime": "2023-10-30T14:04:01.468196+02:00", "EventTime": "2023-10-30T14:04:01.468215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["CD5DYx4oSgNdWfvDq1"]} -{"Format": "Json", "ID": "2d285d71-9e5f-4198-a59b-c8c6b5c1158d", "DetectTime": "2023-10-30T14:04:01.468196+02:00", "EventTime": "2023-10-30T14:04:01.468215+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:22:52.295476+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:01.554409)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e3bdc31c-3dcb-4ebe-b39e-e39216562416", "DetectTime": "2023-10-30T14:04:01.559908+02:00", "EventTime": "2023-10-30T14:04:01.559924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["C9zDFk1KC3cxEH3AXe"]} -{"Format": "IDEA0", "ID": "2729372f-1908-4e13-a22c-8f0648439287", "DetectTime": "2023-10-30T14:04:01.610546+02:00", "EventTime": "2023-10-30T14:04:01.610566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CLsSOX3eVuLT4JeDaf"]} -{"Format": "IDEA0", "ID": "ebe2b8be-3ab1-4906-bc94-866832596c2a", "DetectTime": "2023-10-30T14:04:01.654395+02:00", "EventTime": "2023-10-30T14:04:01.654411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. ", "ContentType": "text/plain"}], "uids": ["CKSU644s8DUsFGBMqk"]} -{"Format": "IDEA0", "ID": "0e26485f-5f3e-42e4-8a49-e607b0c97ebc", "DetectTime": "2023-10-30T14:04:01.704590+02:00", "EventTime": "2023-10-30T14:04:01.704602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CoAcUDubjtXsdRbj1"]} -{"Format": "IDEA0", "ID": "36e04ee6-98d2-47a4-95c6-b503e7d7d9fe", "DetectTime": "2023-10-30T14:04:01.750277+02:00", "EventTime": "2023-10-30T14:04:01.750295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C9VLiO07osQvjbAI4"]} -{"Format": "IDEA0", "ID": "09260d20-23d0-4f5f-a99e-66d2ba2bff2a", "DetectTime": "2023-10-30T14:04:01.804889+02:00", "EventTime": "2023-10-30T14:04:01.804901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CuxcI8VbCk1F8zzjh"]} -{"Format": "IDEA0", "ID": "1c924e32-d93f-4fe2-81e2-e5ade5c7abc8", "DetectTime": "2023-10-30T14:04:01.855774+02:00", "EventTime": "2023-10-30T14:04:01.855787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. ", "ContentType": "text/plain"}], "uids": ["C9g08E44uBtOjxRwC9"]} -{"Format": "IDEA0", "ID": "89572d5b-7a5c-4c94-9f74-898b95f542a7", "DetectTime": "2023-10-30T14:04:01.896222+02:00", "EventTime": "2023-10-30T14:04:01.896233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CsaKT52FcK0ebIhc2i"]} -{"Format": "Json", "ID": "89572d5b-7a5c-4c94-9f74-898b95f542a7", "DetectTime": "2023-10-30T14:04:01.896222+02:00", "EventTime": "2023-10-30T14:04:01.896233+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:54:00.782427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:01.961116)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a24e3d95-4f92-4f51-9048-a40ab4ded8ff", "DetectTime": "2023-10-30T14:04:01.965976+02:00", "EventTime": "2023-10-30T14:04:01.965993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["COOJTy12IRxA3VeFab"]} -{"Format": "IDEA0", "ID": "600d6006-65ae-46ad-8b6d-4a8b9bfae1e2", "DetectTime": "2023-10-30T14:04:02.009782+02:00", "EventTime": "2023-10-30T14:04:02.009800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CvwR8J1RGD8atC8463"]} -{"Format": "IDEA0", "ID": "3d0089cf-8786-4ff9-ba37-ea70ce389d1b", "DetectTime": "2023-10-30T14:04:02.050309+02:00", "EventTime": "2023-10-30T14:04:02.050326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CoDiFF4NnxOlq6pz62"]} -{"Format": "IDEA0", "ID": "27f3e545-7aaa-4db5-885b-0d418d6ffb1d", "DetectTime": "2023-10-30T14:04:02.096596+02:00", "EventTime": "2023-10-30T14:04:02.096617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["ClfJmE1XspLjRxhhIk"]} -{"Format": "IDEA0", "ID": "e7510a7e-1289-4f1d-ae2f-06ce3b93ee0b", "DetectTime": "2023-10-30T14:04:02.147054+02:00", "EventTime": "2023-10-30T14:04:02.147072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CaCj1KraRcFSnwjYf"]} -{"Format": "IDEA0", "ID": "65e1d046-29bb-4ef5-9fde-d986cbfe3681", "DetectTime": "2023-10-30T14:04:02.196158+02:00", "EventTime": "2023-10-30T14:04:02.196174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["Cxyg1C4l4u04rsRpy5"]} -{"Format": "IDEA0", "ID": "388172ad-a341-4359-8aa7-fff8ad64f082", "DetectTime": "2023-10-30T14:04:02.245918+02:00", "EventTime": "2023-10-30T14:04:02.245940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Ckp9nW2VugWKX4tIM4"]} -{"Format": "IDEA0", "ID": "334bf36c-8c52-4bec-9857-f89d13ade900", "DetectTime": "2023-10-30T14:04:02.296333+02:00", "EventTime": "2023-10-30T14:04:02.296353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C7ffws1hPIYvE3Wf6k"]} -{"Format": "Json", "ID": "334bf36c-8c52-4bec-9857-f89d13ade900", "DetectTime": "2023-10-30T14:04:02.296333+02:00", "EventTime": "2023-10-30T14:04:02.296353+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:54:03.603463+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:02.378961)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "57ebf372-8332-4cde-9a24-1c16fa402550", "DetectTime": "2023-10-30T14:04:02.384553+02:00", "EventTime": "2023-10-30T14:04:02.384576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CCvAj7hTk2mEPyhpg"]} -{"Format": "IDEA0", "ID": "cddbc02b-b1d2-49ab-a452-9cd9583bb675", "DetectTime": "2023-10-30T14:04:02.440259+02:00", "EventTime": "2023-10-30T14:04:02.440280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C1Uew71eCyThf8goDi"]} -{"Format": "IDEA0", "ID": "57dc9fee-8a89-48c9-94af-7b62a6f2ca9f", "DetectTime": "2023-10-30T14:04:02.488609+02:00", "EventTime": "2023-10-30T14:04:02.488629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CkcDt9IlVevKCf3Ye"]} -{"Format": "IDEA0", "ID": "ebaf03e3-bcd4-43b9-94f3-c6fd8e3d6ea7", "DetectTime": "2023-10-30T14:04:02.538309+02:00", "EventTime": "2023-10-30T14:04:02.538329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CAmgMB4B0xmAOIsa74"]} -{"Format": "IDEA0", "ID": "33144721-829c-4805-8e23-329abc17fb8d", "DetectTime": "2023-10-30T14:04:02.593179+02:00", "EventTime": "2023-10-30T14:04:02.593199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CzR6Vn3RFEqZSjtlq9"]} -{"Format": "IDEA0", "ID": "de4e3551-39d6-4660-b0d9-6ae08f90836b", "DetectTime": "2023-10-30T14:04:02.646273+02:00", "EventTime": "2023-10-30T14:04:02.646294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CBhAo14DFBO9MAfFn8"]} -{"Format": "IDEA0", "ID": "8c301c85-7045-493c-9dff-d56c14c6e2bd", "DetectTime": "2023-10-30T14:04:02.696962+02:00", "EventTime": "2023-10-30T14:04:02.696980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CgCM5t4yUzFeNa3jo"]} -{"Format": "IDEA0", "ID": "4d4d45bc-8273-413c-a0ea-1ac3997f5a4a", "DetectTime": "2023-10-30T14:04:02.719831+02:00", "EventTime": "2023-10-30T14:04:02.719848+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CHrw75RduDRrfhz57"]} -{"Format": "IDEA0", "ID": "68c527b8-cd7d-4335-b07d-94d1fb816dfe", "DetectTime": "2023-10-30T14:04:02.728055+02:00", "EventTime": "2023-10-30T14:04:02.728069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["C6GPtY3Qq1nvtqLT7d"]} -{"Format": "IDEA0", "ID": "3b512214-fbae-4368-bc98-a77f9dd6432d", "DetectTime": "2023-10-30T14:04:02.777414+02:00", "EventTime": "2023-10-30T14:04:02.777434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.96.182.207. ", "ContentType": "text/plain"}], "uids": ["C7S3m9oaFtIxDSPel"]} -{"Format": "Json", "ID": "3b512214-fbae-4368-bc98-a77f9dd6432d", "DetectTime": "2023-10-30T14:04:02.777414+02:00", "EventTime": "2023-10-30T14:04:02.777434+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4294], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:54:05.842283+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:02.862956)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e7427ff3-7fa3-4e35-8e03-515f2e8aa4cf", "DetectTime": "2023-10-30T14:04:02.868966+02:00", "EventTime": "2023-10-30T14:04:02.868988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cl84Dc43rj5qhfrWbc"]} -{"Format": "IDEA0", "ID": "e91cb78b-6413-4ecd-b24b-4cb32442d486", "DetectTime": "2023-10-30T14:04:02.878406+02:00", "EventTime": "2023-10-30T14:04:02.878426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["CVdmBA1J2TfROhjAXl"]} -{"Format": "IDEA0", "ID": "8136ea6b-3b8d-40d0-904c-ab5908dcb7e7", "DetectTime": "2023-10-30T14:04:02.925962+02:00", "EventTime": "2023-10-30T14:04:02.925979+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBDXyk1CKEdNG3U5hb"]} -{"Format": "IDEA0", "ID": "a37cd286-825f-443d-b057-46074dd8a334", "DetectTime": "2023-10-30T14:04:02.934537+02:00", "EventTime": "2023-10-30T14:04:02.934553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["C333Rv3jK1FtisFdRf"]} -{"Format": "IDEA0", "ID": "062687f8-b493-422c-94fb-fa9d5913cb3a", "DetectTime": "2023-10-30T14:04:02.981443+02:00", "EventTime": "2023-10-30T14:04:02.981470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. ", "ContentType": "text/plain"}], "uids": ["CTpGV24pNPsL7srPj8"]} -{"Format": "IDEA0", "ID": "c5270532-5a96-41ab-9ebc-0bc9ce4743f9", "DetectTime": "2023-10-30T14:04:03.027746+02:00", "EventTime": "2023-10-30T14:04:03.027764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["C9H6E93Imz94g3OOIk"]} -{"Format": "IDEA0", "ID": "e17a343c-85f4-4e58-94cb-7c546e1686a3", "DetectTime": "2023-10-30T14:04:03.075846+02:00", "EventTime": "2023-10-30T14:04:03.075870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CgHn3O22TZ1XedYTN8"]} -{"Format": "IDEA0", "ID": "6614971c-f630-4d5a-8288-f39889f2009a", "DetectTime": "2023-10-30T14:04:03.124150+02:00", "EventTime": "2023-10-30T14:04:03.124167+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3bO21ddFj0I6D4Wg"]} -{"Format": "IDEA0", "ID": "448747cd-657b-475c-9da9-5c28100d53d0", "DetectTime": "2023-10-30T14:04:03.132355+02:00", "EventTime": "2023-10-30T14:04:03.132373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.42.42. ", "ContentType": "text/plain"}], "uids": ["CiSEhd3KnR3KL52t7f"]} -{"Format": "IDEA0", "ID": "e400343a-2ce6-45ae-a254-834b97098023", "DetectTime": "2023-10-30T14:04:03.179897+02:00", "EventTime": "2023-10-30T14:04:03.179914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CHYEHt4V8XtV5LhYka", "CsjlEq1wrmgGOcuRa", "CHrw75RduDRrfhz57", "CBDXyk1CKEdNG3U5hb"]} -{"Format": "IDEA0", "ID": "eafdacbb-26ef-4875-8d35-f2bba03156ad", "DetectTime": "2023-10-30T14:04:03.189450+02:00", "EventTime": "2023-10-30T14:04:03.189463+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsjlEq1wrmgGOcuRa"]} -{"Format": "IDEA0", "ID": "cf02eb28-341a-47e0-939b-359261deb5a9", "DetectTime": "2023-10-30T14:04:03.198759+02:00", "EventTime": "2023-10-30T14:04:03.198793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8384], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8384/UDP destination IP 188.94.158.164. ", "ContentType": "text/plain"}], "uids": ["CtGytv146roHbFXf9"]} -{"Format": "IDEA0", "ID": "8a745688-01d2-4d26-a4ca-8e86f1fe41a1", "DetectTime": "2023-10-30T14:04:03.243995+02:00", "EventTime": "2023-10-30T14:04:03.244017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19105], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19105/UDP destination IP 151.74.131.196. ", "ContentType": "text/plain"}], "uids": ["CrnxNlfPfbmHuQvLk"]} -{"Format": "Json", "ID": "8a745688-01d2-4d26-a4ca-8e86f1fe41a1", "DetectTime": "2023-10-30T14:04:03.243995+02:00", "EventTime": "2023-10-30T14:04:03.244017+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19105], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:54:46.817139+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:03.316026)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f09c0dff-fa2c-4242-b159-47216b65ec5b", "DetectTime": "2023-10-30T14:04:03.321444+02:00", "EventTime": "2023-10-30T14:04:03.321459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16788], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16788/UDP destination IP 188.169.80.149. ", "ContentType": "text/plain"}], "uids": ["CCNMO71prItqwNCui"]} -{"Format": "IDEA0", "ID": "50e198d0-40bb-4c02-b13b-db74efd9d012", "DetectTime": "2023-10-30T14:04:03.367907+02:00", "EventTime": "2023-10-30T14:04:03.367925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19077], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. ", "ContentType": "text/plain"}], "uids": ["C9EHV5hBrJVpLHNJl"]} -{"Format": "IDEA0", "ID": "e7b4ee54-a0fa-4b5a-ab05-9f8ea479c2b8", "DetectTime": "2023-10-30T14:04:03.410502+02:00", "EventTime": "2023-10-30T14:04:03.410519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CIWTSu4nugk9aEZ8Xh"]} -{"Format": "IDEA0", "ID": "ae30fc6e-8fae-42e1-9c53-a02181938d8f", "DetectTime": "2023-10-30T14:04:03.452217+02:00", "EventTime": "2023-10-30T14:04:03.452229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CQZWcL2ampG9iVX0Ue"]} -{"Format": "IDEA0", "ID": "30ec45ff-20ad-4c4a-b856-6cb4762335bf", "DetectTime": "2023-10-30T14:04:03.495643+02:00", "EventTime": "2023-10-30T14:04:03.495661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CsfMrb4JR9URJDTCVc"]} -{"Format": "IDEA0", "ID": "1d5a6938-9868-4252-bf9d-b7682af683f2", "DetectTime": "2023-10-30T14:04:03.537800+02:00", "EventTime": "2023-10-30T14:04:03.537813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["CC3Nmn1NLN4ZlLODtb"]} -{"Format": "IDEA0", "ID": "6969d7eb-0cee-4089-a568-dba095f8c693", "DetectTime": "2023-10-30T14:04:03.579283+02:00", "EventTime": "2023-10-30T14:04:03.579298+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5IUtu3PKJIGs3NtB2"]} -{"Format": "IDEA0", "ID": "07438840-e663-4260-8cfc-186a38b10f7e", "DetectTime": "2023-10-30T14:04:03.587976+02:00", "EventTime": "2023-10-30T14:04:03.587988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CKQQiN2goabQp9QR4b"]} -{"Format": "IDEA0", "ID": "a0217760-97ad-45a5-965a-4cde79093358", "DetectTime": "2023-10-30T14:04:03.630011+02:00", "EventTime": "2023-10-30T14:04:03.630032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21538], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21538/UDP destination IP 31.11.249.52. ", "ContentType": "text/plain"}], "uids": ["C82o773FXxHIM0ztqi"]} -{"Format": "Json", "ID": "a0217760-97ad-45a5-965a-4cde79093358", "DetectTime": "2023-10-30T14:04:03.630011+02:00", "EventTime": "2023-10-30T14:04:03.630032+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21538], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:54:49.501433+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:03.701376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e8b723c0-237d-44ec-b56f-3fbfd382da7e", "DetectTime": "2023-10-30T14:04:03.706376+02:00", "EventTime": "2023-10-30T14:04:03.706389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["C5upZ91CM6U0KF8DWb"]} -{"Format": "IDEA0", "ID": "ef103cfb-6008-4ea7-9dd5-bafcbd6a4a81", "DetectTime": "2023-10-30T14:04:03.745542+02:00", "EventTime": "2023-10-30T14:04:03.745555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. ", "ContentType": "text/plain"}], "uids": ["CBIMWp37Wrpeq6AMl2"]} -{"Format": "IDEA0", "ID": "06cf38f2-93ed-4adb-b884-5636efe53d13", "DetectTime": "2023-10-30T14:04:03.786253+02:00", "EventTime": "2023-10-30T14:04:03.786275+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAziK316qPO7RUSoL9"]} -{"Format": "IDEA0", "ID": "93ac27ce-14d1-42ec-8a56-9380f324e716", "DetectTime": "2023-10-30T14:04:03.793424+02:00", "EventTime": "2023-10-30T14:04:03.793434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Cgd8XWkGv5vRmawQ4"]} -{"Format": "IDEA0", "ID": "a9aa34ac-b8ab-4bee-a8dc-56a00b172c5d", "DetectTime": "2023-10-30T14:04:03.835849+02:00", "EventTime": "2023-10-30T14:04:03.835870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11369], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. ", "ContentType": "text/plain"}], "uids": ["CIoC9A3NXcooDmeSDd"]} -{"Format": "IDEA0", "ID": "1b410081-a79f-475f-b295-23103af0f5a5", "DetectTime": "2023-10-30T14:04:03.880021+02:00", "EventTime": "2023-10-30T14:04:03.880047+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cwf73O3IevJejNHebj"]} -{"Format": "IDEA0", "ID": "8e25fcb1-b4e2-4c6a-9acc-456732b8e64c", "DetectTime": "2023-10-30T14:04:03.888301+02:00", "EventTime": "2023-10-30T14:04:03.888321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["Ce8Prov8vBxa1quzf"]} -{"Format": "IDEA0", "ID": "0df4cb19-3d1e-4e13-b3ec-9c75dfa3138a", "DetectTime": "2023-10-30T14:04:03.940490+02:00", "EventTime": "2023-10-30T14:04:03.940512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["C2remc3OutyhgEPSK3"]} -{"Format": "IDEA0", "ID": "2077cc1f-a89e-4da7-868c-55a855d15016", "DetectTime": "2023-10-30T14:04:03.990129+02:00", "EventTime": "2023-10-30T14:04:03.990140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CFbuaB1gK6NfuiwRl9"]} -{"Format": "IDEA0", "ID": "443f2db7-e0c0-4123-9229-25f6b0972a2c", "DetectTime": "2023-10-30T14:04:04.041268+02:00", "EventTime": "2023-10-30T14:04:04.041291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CtNLDF24b5jU64Ctfd"]} -{"Format": "Json", "ID": "443f2db7-e0c0-4123-9229-25f6b0972a2c", "DetectTime": "2023-10-30T14:04:04.041268+02:00", "EventTime": "2023-10-30T14:04:04.041291+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T19:55:23.381972+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2023/10/30 14:04:04.113288)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dfe2d0bd-3ae8-481b-a9b0-65d28074edbe", "DetectTime": "2023-10-30T14:04:04.119232+02:00", "EventTime": "2023-10-30T14:04:04.119250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. ", "ContentType": "text/plain"}], "uids": ["CBwqYSAMt5y5RIaTk"]} -{"Format": "IDEA0", "ID": "b348a3b2-0203-4cd0-ac85-e00104a79492", "DetectTime": "2023-10-30T14:04:04.160552+02:00", "EventTime": "2023-10-30T14:04:04.160569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C9QyDr3XAB0bdkUxn6"]} -{"Format": "IDEA0", "ID": "85a2e815-dbf3-4c9f-a599-0abbbc078d56", "DetectTime": "2023-10-30T14:04:04.195135+02:00", "EventTime": "2023-10-30T14:04:04.195157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28610], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28610/UDP destination IP 78.166.143.39. ", "ContentType": "text/plain"}], "uids": ["C3WLXD32Z7QSkWbWtg"]} -{"Format": "IDEA0", "ID": "583876e9-d664-4c0f-ae96-b9a10bf6a6d7", "DetectTime": "2023-10-30T14:04:04.233458+02:00", "EventTime": "2023-10-30T14:04:04.233477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CGNXjr46wtVQydhUOa"]} -{"Format": "IDEA0", "ID": "9a0d7fac-95c5-4d30-be64-0deee1f1058a", "DetectTime": "2023-10-30T14:04:04.269864+02:00", "EventTime": "2023-10-30T14:04:04.269882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CICyq91Iq8iW3w080h"]} -{"Format": "IDEA0", "ID": "be61ca1e-3546-48f2-9e4e-09f9b5b3d078", "DetectTime": "2023-10-30T14:04:04.307980+02:00", "EventTime": "2023-10-30T14:04:04.308008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEaz601BNTBoJ7pevg"]} -{"Format": "IDEA0", "ID": "cf64091a-67ea-4c04-af3e-5e06453af5ee", "DetectTime": "2023-10-30T14:04:04.348286+02:00", "EventTime": "2023-10-30T14:04:04.348303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CkrnPc3RgUokYWt8G6"]} -{"Format": "Json", "ID": "cf64091a-67ea-4c04-af3e-5e06453af5ee", "DetectTime": "2023-10-30T14:04:04.348286+02:00", "EventTime": "2023-10-30T14:04:04.348303+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T20:27:12.116252+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2023/10/30 14:04:04.457520)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "72b1329d-b6cc-433d-9c5b-6a44b356fdbf", "DetectTime": "2023-10-30T14:04:04.464089+02:00", "EventTime": "2023-10-30T14:04:04.464104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CUd8EdDJRRSUFagEd"]} -{"Format": "IDEA0", "ID": "4e0a3482-838c-4bcb-8fa1-6e0e67f3e70a", "DetectTime": "2023-10-30T14:04:04.506183+02:00", "EventTime": "2023-10-30T14:04:04.506206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["C6okIC4yDxIyyBTB9f"]} -{"Format": "IDEA0", "ID": "551ff2bf-4750-4a62-ba07-c4f22fed441b", "DetectTime": "2023-10-30T14:04:04.543507+02:00", "EventTime": "2023-10-30T14:04:04.543530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CzgH8w41Cr3Ckua3fk"]} -{"Format": "IDEA0", "ID": "50a91b76-e1b9-46bf-a7a6-8d4805789dda", "DetectTime": "2023-10-30T14:04:04.579168+02:00", "EventTime": "2023-10-30T14:04:04.579191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CyTUT5RkbkupH7Vrf"]} -{"Format": "IDEA0", "ID": "15e94295-4160-4849-bb8d-e4a097d276f0", "DetectTime": "2023-10-30T14:04:04.613390+02:00", "EventTime": "2023-10-30T14:04:04.613415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C29fa74nGQcfMh1PT5"]} -{"Format": "IDEA0", "ID": "030177eb-9ee5-4c90-9ad7-9952edd9fd6c", "DetectTime": "2023-10-30T14:04:04.651199+02:00", "EventTime": "2023-10-30T14:04:04.651222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CsWgba4kf3F0UUM3P6"]} -{"Format": "IDEA0", "ID": "20cc342e-13b0-4de7-b26c-412599a466e5", "DetectTime": "2023-10-30T14:04:04.687633+02:00", "EventTime": "2023-10-30T14:04:04.687650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CsUE9i4ylzZTT00lx4"]} -{"Format": "IDEA0", "ID": "f18ad7e2-b44c-4b74-a821-5f7786c47891", "DetectTime": "2023-10-30T14:04:04.723959+02:00", "EventTime": "2023-10-30T14:04:04.723975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CiV2YL1msmVtACM7E9"]} -{"Format": "Json", "ID": "f18ad7e2-b44c-4b74-a821-5f7786c47891", "DetectTime": "2023-10-30T14:04:04.723959+02:00", "EventTime": "2023-10-30T14:04:04.723975+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T20:27:32.260924+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2023/10/30 14:04:04.786996)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f59afbdd-d608-4bb6-90ab-2c7779645758", "DetectTime": "2023-10-30T14:04:04.793062+02:00", "EventTime": "2023-10-30T14:04:04.793088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CZ5bZG3aSSs8YBlll5"]} -{"Format": "IDEA0", "ID": "90eec4d7-fc52-4adc-850a-25543570b9b0", "DetectTime": "2023-10-30T14:04:04.833064+02:00", "EventTime": "2023-10-30T14:04:04.833083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CyDSb11j9sijOpX7g4"]} -{"Format": "IDEA0", "ID": "e5d5f232-4674-4d3b-a7c7-5135a35f2c38", "DetectTime": "2023-10-30T14:04:04.864406+02:00", "EventTime": "2023-10-30T14:04:04.864423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CZy5CG4OX4GdZ4Da0d"]} -{"Format": "IDEA0", "ID": "ff17af2e-5903-48a8-9e01-a5545ffaf984", "DetectTime": "2023-10-30T14:04:04.895743+02:00", "EventTime": "2023-10-30T14:04:04.895759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CQj00BJUUBXt2Mmd6"]} -{"Format": "IDEA0", "ID": "c620ef29-9f6b-4e20-b8cd-0074b82af567", "DetectTime": "2023-10-30T14:04:04.927563+02:00", "EventTime": "2023-10-30T14:04:04.927577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CiTJZT2CjJv7C4K6C4"]} -{"Format": "IDEA0", "ID": "df78bb75-0f93-4374-a192-0986f81f6b3d", "DetectTime": "2023-10-30T14:04:04.960991+02:00", "EventTime": "2023-10-30T14:04:04.961013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9746], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. ", "ContentType": "text/plain"}], "uids": ["C7W98o1Qy7lrkVsDSf"]} -{"Format": "IDEA0", "ID": "166b94b4-beb0-4104-9832-b52c9d20ea06", "DetectTime": "2023-10-30T14:04:04.994350+02:00", "EventTime": "2023-10-30T14:04:04.994372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CEQmvv4xpbeipLW8td"]} -{"Format": "IDEA0", "ID": "0bcac775-e7a9-43c4-9e26-f914fb7beac9", "DetectTime": "2023-10-30T14:04:05.031073+02:00", "EventTime": "2023-10-30T14:04:05.031089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. ", "ContentType": "text/plain"}], "uids": ["Ca4ZNy2LWNKeUBIwDi"]} -{"Format": "Json", "ID": "0bcac775-e7a9-43c4-9e26-f914fb7beac9", "DetectTime": "2023-10-30T14:04:05.031073+02:00", "EventTime": "2023-10-30T14:04:05.031089+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T20:27:52.090679+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2023/10/30 14:04:05.092789)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5aa0dca0-8bad-4fe6-91da-a641e17f12bd", "DetectTime": "2023-10-30T14:04:05.098222+02:00", "EventTime": "2023-10-30T14:04:05.098244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["Cs0b1SIPyDlIQoSea"]} -{"Format": "IDEA0", "ID": "0f883caa-9841-4099-83a1-f0399b5ccc9c", "DetectTime": "2023-10-30T14:04:05.128917+02:00", "EventTime": "2023-10-30T14:04:05.128938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["Cr1hp24ZeW87JdGR6f"]} -{"Format": "IDEA0", "ID": "017d3c10-3d81-43cf-a60b-1e8519ce23e2", "DetectTime": "2023-10-30T14:04:05.158226+02:00", "EventTime": "2023-10-30T14:04:05.158246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.42.42. ", "ContentType": "text/plain"}], "uids": ["CQJsLz4qahRFkgJYVk"]} -{"Format": "IDEA0", "ID": "9417ae27-54b5-42c7-91b3-442031d02f08", "DetectTime": "2023-10-30T14:04:05.187082+02:00", "EventTime": "2023-10-30T14:04:05.187108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19077], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. ", "ContentType": "text/plain"}], "uids": ["Co74Hl3YVFY7D9bjr6"]} -{"Format": "IDEA0", "ID": "93145286-18fb-477f-82c6-0350da46d197", "DetectTime": "2023-10-30T14:04:05.213829+02:00", "EventTime": "2023-10-30T14:04:05.213846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16788], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16788/UDP destination IP 188.169.80.149. ", "ContentType": "text/plain"}], "uids": ["CTEY5h1IqcmCuW6Dx2"]} -{"Format": "IDEA0", "ID": "0f66c61a-c9e8-4ec6-ace8-edaba666e174", "DetectTime": "2023-10-30T14:04:05.241311+02:00", "EventTime": "2023-10-30T14:04:05.241328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CfirB9kRXhzvKWsrb"]} -{"Format": "IDEA0", "ID": "8fd85aeb-3562-4188-b0af-2654fca63750", "DetectTime": "2023-10-30T14:04:05.269755+02:00", "EventTime": "2023-10-30T14:04:05.269773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["Cw5ChRMJZFQdoNEf8"]} -{"Format": "IDEA0", "ID": "19a7db6d-226e-4c03-a5aa-2fe6c1c6ec94", "DetectTime": "2023-10-30T14:04:05.304838+02:00", "EventTime": "2023-10-30T14:04:05.304859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["C1Lq324TpQk2J6ZMl3"]} -{"Format": "Json", "ID": "19a7db6d-226e-4c03-a5aa-2fe6c1c6ec94", "DetectTime": "2023-10-30T14:04:05.304838+02:00", "EventTime": "2023-10-30T14:04:05.304859+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T20:28:25.089306+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2023/10/30 14:04:05.375424)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "62400370-1363-4052-b533-728c1f3fe881", "DetectTime": "2023-10-30T14:04:05.381452+02:00", "EventTime": "2023-10-30T14:04:05.381474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CDgTFf4amxNZK1xzz1"]} -{"Format": "IDEA0", "ID": "89a11892-2550-4cc5-bf1c-1e333a247edd", "DetectTime": "2023-10-30T14:04:05.416167+02:00", "EventTime": "2023-10-30T14:04:05.416182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. ", "ContentType": "text/plain"}], "uids": ["ChowTECmlK89Hj1p9"]} -{"Format": "IDEA0", "ID": "4a09fe48-c907-4842-b722-95cc162fe348", "DetectTime": "2023-10-30T14:04:05.445800+02:00", "EventTime": "2023-10-30T14:04:05.445820+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CnJWrTNS34IU4Olg3"]} -{"Format": "IDEA0", "ID": "5cee1e4f-ff18-4a7f-ac07-3c48a1519a85", "DetectTime": "2023-10-30T14:04:05.455524+02:00", "EventTime": "2023-10-30T14:04:05.455542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CVyh7s4NdxIP8O2uV8"]} -{"Format": "IDEA0", "ID": "fc410d75-4a7b-43f5-a02a-07ea7291c764", "DetectTime": "2023-10-30T14:04:05.482121+02:00", "EventTime": "2023-10-30T14:04:05.482147+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCnLa51Va68t86BTYa"]} -{"Format": "IDEA0", "ID": "3b1be811-d0f0-497e-abb9-d26bff7b96bf", "DetectTime": "2023-10-30T14:04:05.490517+02:00", "EventTime": "2023-10-30T14:04:05.490541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [21538], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 21538/UDP destination IP 31.11.249.52. ", "ContentType": "text/plain"}], "uids": ["Cvr9ZQ2tX03WH5fnpl"]} -{"Format": "IDEA0", "ID": "9910be2a-f915-4b32-b601-dc4538f0e0db", "DetectTime": "2023-10-30T14:04:05.519245+02:00", "EventTime": "2023-10-30T14:04:05.519265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C382Qo2FkNi7VTn622"]} -{"Format": "IDEA0", "ID": "f99a64c5-8438-44c3-b66d-e6947cd9ac7f", "DetectTime": "2023-10-30T14:04:05.542767+02:00", "EventTime": "2023-10-30T14:04:05.542800+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbcKtDvqHtVKeCLqk"]} -{"Format": "IDEA0", "ID": "8b6d1564-724a-41cc-b012-e3d9a7272c2c", "DetectTime": "2023-10-30T14:04:05.550364+02:00", "EventTime": "2023-10-30T14:04:05.550384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["CVvfWY2bC8TF5x2zb7"]} -{"Format": "IDEA0", "ID": "efbf7b04-aaab-4889-ac2b-fd6e3e950154", "DetectTime": "2023-10-30T14:04:05.576304+02:00", "EventTime": "2023-10-30T14:04:05.576323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CaFRVI3VY3kDPi56D6"]} -{"Format": "IDEA0", "ID": "89fa9636-1cca-4deb-a8e7-17418c38db0e", "DetectTime": "2023-10-30T14:04:05.600549+02:00", "EventTime": "2023-10-30T14:04:05.600566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CMoC9r1TT3I0Irbs94"]} -{"Format": "Json", "ID": "89fa9636-1cca-4deb-a8e7-17418c38db0e", "DetectTime": "2023-10-30T14:04:05.600549+02:00", "EventTime": "2023-10-30T14:04:05.600566+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T20:28:44.970083+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2023/10/30 14:04:05.657431)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a4bd7831-98c7-4e9c-a6a9-84e476b4e0b6", "DetectTime": "2023-10-30T14:04:05.663026+02:00", "EventTime": "2023-10-30T14:04:05.663050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CB3DKT2SaaYf10Ph7f"]} -{"Format": "IDEA0", "ID": "8cc3f413-72e4-4c72-b50c-2c2b148be37f", "DetectTime": "2023-10-30T14:04:05.686543+02:00", "EventTime": "2023-10-30T14:04:05.686556+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CtYO3i2bIao2cN8Bm9"]} -{"Format": "IDEA0", "ID": "7893a817-d489-43ab-847d-3f0841044a94", "DetectTime": "2023-10-30T14:04:05.693592+02:00", "EventTime": "2023-10-30T14:04:05.693611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["CUYJFY1qsoMqhu4zbk"]} -{"Format": "IDEA0", "ID": "091ef441-b677-4a1b-b1bd-9bc4e47652fd", "DetectTime": "2023-10-30T14:04:05.718332+02:00", "EventTime": "2023-10-30T14:04:05.718353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. ", "ContentType": "text/plain"}], "uids": ["CPHM4i2vsnC2iSn7d7"]} -{"Format": "IDEA0", "ID": "74d27faf-57c2-419d-84c4-326f9b690785", "DetectTime": "2023-10-30T14:04:05.741316+02:00", "EventTime": "2023-10-30T14:04:05.741338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CteNFG1VqJjJSqlg4k"]} -{"Format": "IDEA0", "ID": "f98bd692-ec97-452a-befd-e1a6854dcb70", "DetectTime": "2023-10-30T14:04:05.764918+02:00", "EventTime": "2023-10-30T14:04:05.764939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["C16Tfq3HiPdDmdpT1k"]} -{"Format": "IDEA0", "ID": "eeff1d2c-c9a0-47db-bf4d-56051087635f", "DetectTime": "2023-10-30T14:04:05.786258+02:00", "EventTime": "2023-10-30T14:04:05.786278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11369], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. ", "ContentType": "text/plain"}], "uids": ["CgMcgC3KXfWacC6pf9"]} -{"Format": "IDEA0", "ID": "cd240b68-54bd-4e7d-ba87-dbd8072202e9", "DetectTime": "2023-10-30T14:04:05.845525+02:00", "EventTime": "2023-10-30T14:04:05.845541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28610], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28610/UDP destination IP 78.166.143.39. ", "ContentType": "text/plain"}], "uids": ["CQjoamjMsaRpycDHh"]} -{"Format": "IDEA0", "ID": "4fa37e49-db80-4b62-96bd-c5a3c66691a0", "DetectTime": "2023-10-30T14:04:05.904550+02:00", "EventTime": "2023-10-30T14:04:05.904566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CjrqSu4KpQjrBAW8kh"]} -{"Format": "IDEA0", "ID": "e246f877-0615-4a5c-9f4d-e592e2677040", "DetectTime": "2023-10-30T14:04:05.959814+02:00", "EventTime": "2023-10-30T14:04:05.959832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CDbI831wXC2pHsZw7g"]} -{"Format": "IDEA0", "ID": "cd7e88d3-4e6d-4d93-a246-55ca6adc98aa", "DetectTime": "2023-10-30T14:04:06.017644+02:00", "EventTime": "2023-10-30T14:04:06.017664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CSmxRfW4Zg6zmY24j"]} -{"Format": "IDEA0", "ID": "ba9fe7a1-eed1-435e-b1da-d162e1ee46ef", "DetectTime": "2023-10-30T14:04:06.082885+02:00", "EventTime": "2023-10-30T14:04:06.082903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["C01t6KthGCJPVLyl"]} -{"Format": "Json", "ID": "ba9fe7a1-eed1-435e-b1da-d162e1ee46ef", "DetectTime": "2023-10-30T14:04:06.082885+02:00", "EventTime": "2023-10-30T14:04:06.082903+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:00:31.253714+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:06.212350)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cfb9b9ba-f22e-476f-8706-727a0a18c573", "DetectTime": "2023-10-30T14:04:06.218333+02:00", "EventTime": "2023-10-30T14:04:06.218353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CMnY2z2PmAbbWbvd7a"]} -{"Format": "IDEA0", "ID": "efde485c-2413-4096-a17f-be691015765e", "DetectTime": "2023-10-30T14:04:06.271665+02:00", "EventTime": "2023-10-30T14:04:06.271685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["C47eaj4FhDTp5vfPC3"]} -{"Format": "IDEA0", "ID": "f7018853-c15d-4ffa-81ac-f3b4e7835095", "DetectTime": "2023-10-30T14:04:06.326592+02:00", "EventTime": "2023-10-30T14:04:06.326617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CH9ZOvgXyl6fvU048"]} -{"Format": "IDEA0", "ID": "0a94fd83-0d5d-4c02-8bd4-c6a733b88a93", "DetectTime": "2023-10-30T14:04:06.381003+02:00", "EventTime": "2023-10-30T14:04:06.381020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C0hRlj4O6YF3t9Lazk"]} -{"Format": "IDEA0", "ID": "17ee8bf2-0cd5-49ec-b3cd-bf9160bc2474", "DetectTime": "2023-10-30T14:04:06.435095+02:00", "EventTime": "2023-10-30T14:04:06.435117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CcoJGwW0mkbkLYDIc"]} -{"Format": "IDEA0", "ID": "5c391b9c-fd6b-44b7-bcc7-59ecbd7b9126", "DetectTime": "2023-10-30T14:04:06.487394+02:00", "EventTime": "2023-10-30T14:04:06.487420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CkM6rD4YYYmPaSrQfl"]} -{"Format": "IDEA0", "ID": "cd53c776-0adf-4199-afdf-6b43352eddf0", "DetectTime": "2023-10-30T14:04:06.540951+02:00", "EventTime": "2023-10-30T14:04:06.540967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CMBPDSfoA4Bk6qSCd"]} -{"Format": "IDEA0", "ID": "0a6f3a28-c687-4c60-979c-a5312d3b79f3", "DetectTime": "2023-10-30T14:04:06.591685+02:00", "EventTime": "2023-10-30T14:04:06.591703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CYslQFx2GS9WlYLq2"]} -{"Format": "Json", "ID": "0a6f3a28-c687-4c60-979c-a5312d3b79f3", "DetectTime": "2023-10-30T14:04:06.591685+02:00", "EventTime": "2023-10-30T14:04:06.591703+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:00:36.020922+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:06.682499)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eeb6166f-f117-4ce7-afbf-29be9d6587c4", "DetectTime": "2023-10-30T14:04:06.688278+02:00", "EventTime": "2023-10-30T14:04:06.688293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C65KyF3yhK3QVUOasl"]} -{"Format": "IDEA0", "ID": "a1375ae2-04de-4587-9512-32909ef0fab5", "DetectTime": "2023-10-30T14:04:06.741579+02:00", "EventTime": "2023-10-30T14:04:06.741599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CKHHhu1DbL0eYMjzid"]} -{"Format": "IDEA0", "ID": "fd21baf6-750f-4fae-b822-df2acf03ffde", "DetectTime": "2023-10-30T14:04:06.868818+02:00", "EventTime": "2023-10-30T14:04:06.868839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CHaVnz4XdWo4tuDJg5"]} -{"Format": "IDEA0", "ID": "041d2739-3ed6-4770-8c05-f8686be28632", "DetectTime": "2023-10-30T14:04:06.929892+02:00", "EventTime": "2023-10-30T14:04:06.929914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CBBqnk16Lwvn9FR2Zc"]} -{"Format": "IDEA0", "ID": "ff9ea563-5724-4b95-a377-e5ef9ab3ea53", "DetectTime": "2023-10-30T14:04:06.995949+02:00", "EventTime": "2023-10-30T14:04:06.995971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["CZ60hadpzYKww50S4"]} -{"Format": "IDEA0", "ID": "2f7a02dd-4549-4ea3-819d-69dc10d2e336", "DetectTime": "2023-10-30T14:04:07.022991+02:00", "EventTime": "2023-10-30T14:04:07.023013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CbcKtDvqHtVKeCLqk", "CicolCTmLPxhNwg79", "CAziK316qPO7RUSoL9", "CnJWrTNS34IU4Olg3"]} -{"Format": "IDEA0", "ID": "b6051904-7e31-47cb-a87e-c3f1d68e2dc4", "DetectTime": "2023-10-30T14:04:07.034603+02:00", "EventTime": "2023-10-30T14:04:07.034626+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CicolCTmLPxhNwg79"]} -{"Format": "IDEA0", "ID": "67140775-573f-4b2a-8279-e64a590c0684", "DetectTime": "2023-10-30T14:04:07.042652+02:00", "EventTime": "2023-10-30T14:04:07.042663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CnVYT81kuYd0OlEnh4"]} -{"Format": "IDEA0", "ID": "f12688ba-01c0-4e20-b259-7b40f6dc265e", "DetectTime": "2023-10-30T14:04:07.105501+02:00", "EventTime": "2023-10-30T14:04:07.105518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsRtbu4kXHgjUTiEA"]} -{"Format": "IDEA0", "ID": "6a53ef0e-d034-4895-81fd-a568c30e4241", "DetectTime": "2023-10-30T14:04:07.114641+02:00", "EventTime": "2023-10-30T14:04:07.114658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19077], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. ", "ContentType": "text/plain"}], "uids": ["C10ih84DyjSny8xZP8"]} -{"Format": "IDEA0", "ID": "c73e1aba-ba4a-4a87-9417-e1ecf94cb481", "DetectTime": "2023-10-30T14:04:07.177815+02:00", "EventTime": "2023-10-30T14:04:07.177835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CHKHRC3AJwszi7lfe4"]} -{"Format": "IDEA0", "ID": "f747763d-9320-435d-a8e5-46ec8156363a", "DetectTime": "2023-10-30T14:04:07.237853+02:00", "EventTime": "2023-10-30T14:04:07.237871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. ", "ContentType": "text/plain"}], "uids": ["CGLMrMGPFoEqcuH0h"]} -{"Format": "Json", "ID": "f747763d-9320-435d-a8e5-46ec8156363a", "DetectTime": "2023-10-30T14:04:07.237853+02:00", "EventTime": "2023-10-30T14:04:07.237871+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:01:11.064773+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:07.328447)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93ba1011-f84b-4fa7-8cad-69cabbca5c44", "DetectTime": "2023-10-30T14:04:07.334346+02:00", "EventTime": "2023-10-30T14:04:07.334366+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUHpcm1JQiVSPbVuMg"]} -{"Format": "IDEA0", "ID": "855f7ebe-e1c6-4a2d-9ebf-ac8d19998566", "DetectTime": "2023-10-30T14:04:07.346117+02:00", "EventTime": "2023-10-30T14:04:07.346135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CxHTOx2Cu4NjpaVFQl"]} -{"Format": "IDEA0", "ID": "a8362ffc-e6dd-4ae0-8d27-ce926deec8b3", "DetectTime": "2023-10-30T14:04:07.409105+02:00", "EventTime": "2023-10-30T14:04:07.409122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CCi5iV3YyJxrBOg3rc"]} -{"Format": "IDEA0", "ID": "0f4b9727-4427-4152-8b17-4a7c738b2389", "DetectTime": "2023-10-30T14:04:07.465678+02:00", "EventTime": "2023-10-30T14:04:07.465699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CTegWd3H1jl80dh0Ue"]} -{"Format": "IDEA0", "ID": "a394b7cb-c5fe-45db-b0bd-412c0c8cd035", "DetectTime": "2023-10-30T14:04:07.520875+02:00", "EventTime": "2023-10-30T14:04:07.520901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CmwHtV1uirZjFAoO3d"]} -{"Format": "IDEA0", "ID": "aa73f849-68b7-4ed0-8f4c-5e0127b2ae71", "DetectTime": "2023-10-30T14:04:07.577565+02:00", "EventTime": "2023-10-30T14:04:07.577582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["C3wWFD3MkOKVG85sRf"]} -{"Format": "IDEA0", "ID": "8ae642a2-d620-4c3b-aa6d-ce5278960569", "DetectTime": "2023-10-30T14:04:07.609749+02:00", "EventTime": "2023-10-30T14:04:07.609768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CTagXZ2SsEiQe6maP7"]} -{"Format": "IDEA0", "ID": "86690fe0-1bc3-4aca-a25a-b6932e314a46", "DetectTime": "2023-10-30T14:04:07.664065+02:00", "EventTime": "2023-10-30T14:04:07.664087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. ", "ContentType": "text/plain"}], "uids": ["C4Ge5C34ndiyQhZ3s6"]} -{"Format": "IDEA0", "ID": "4572c0ab-4d6e-442f-9b00-1c93ab08ff18", "DetectTime": "2023-10-30T14:04:07.718803+02:00", "EventTime": "2023-10-30T14:04:07.718824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CPaZFnN7q1DNLeES3"]} -{"Format": "IDEA0", "ID": "5e15a245-dee1-4793-aa45-ce9c973fc91f", "DetectTime": "2023-10-30T14:04:07.777836+02:00", "EventTime": "2023-10-30T14:04:07.777852+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cawvjv3bg8RH9cm1P3"]} -{"Format": "IDEA0", "ID": "0b7f4af7-555c-429b-84ad-5828561e0670", "DetectTime": "2023-10-30T14:04:07.842680+02:00", "EventTime": "2023-10-30T14:04:07.842697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C3exj74ecXYUzuKeG6"]} -{"Format": "Json", "ID": "0b7f4af7-555c-429b-84ad-5828561e0670", "DetectTime": "2023-10-30T14:04:07.842680+02:00", "EventTime": "2023-10-30T14:04:07.842697+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:01:45.884186+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:07.937802)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b3f1d44-9aec-4a1b-8378-21bdca200a62", "DetectTime": "2023-10-30T14:04:07.944152+02:00", "EventTime": "2023-10-30T14:04:07.944170+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDbdX12d8FSYwe5xLf"]} -{"Format": "IDEA0", "ID": "639a1db7-dd7c-4415-9ab4-1e157a83da5e", "DetectTime": "2023-10-30T14:04:07.953899+02:00", "EventTime": "2023-10-30T14:04:07.953920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CoZaRV245y4KIU4iQ9"]} -{"Format": "IDEA0", "ID": "92f0558b-7775-497a-a598-08d8a613f1bb", "DetectTime": "2023-10-30T14:04:08.011184+02:00", "EventTime": "2023-10-30T14:04:08.011206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["CP6Ce11Ppq7ZwFD9Ac"]} -{"Format": "IDEA0", "ID": "c4b3240c-c51a-4b0f-a016-dd267db28349", "DetectTime": "2023-10-30T14:04:08.067354+02:00", "EventTime": "2023-10-30T14:04:08.067371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CGLzKr4iTRXENiNn84"]} -{"Format": "IDEA0", "ID": "7330de75-570a-43e8-bb54-27b89f30be93", "DetectTime": "2023-10-30T14:04:08.121266+02:00", "EventTime": "2023-10-30T14:04:08.121284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["CBzo2HA8Mqqy8dP6d"]} -{"Format": "IDEA0", "ID": "410ded8d-6ad4-467c-8b7b-34d1558883cf", "DetectTime": "2023-10-30T14:04:08.174406+02:00", "EventTime": "2023-10-30T14:04:08.174428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. ", "ContentType": "text/plain"}], "uids": ["CGhPvF1euxoybvHXSd"]} -{"Format": "IDEA0", "ID": "66d512e5-29e0-45f1-9b80-4fd6846d149a", "DetectTime": "2023-10-30T14:04:08.232575+02:00", "EventTime": "2023-10-30T14:04:08.232600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CSPRbK3YwqxMNqQAoh"]} -{"Format": "IDEA0", "ID": "1d24f51c-f9a2-4886-acff-183ed4e1cdc4", "DetectTime": "2023-10-30T14:04:08.288374+02:00", "EventTime": "2023-10-30T14:04:08.288393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CXolFc27YErT1Bthda"]} -{"Format": "IDEA0", "ID": "4385e680-eaa5-40ae-97ee-67462874707c", "DetectTime": "2023-10-30T14:04:08.342333+02:00", "EventTime": "2023-10-30T14:04:08.342358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CDVzlC2xG6yPVnHc52"]} -{"Format": "Json", "ID": "4385e680-eaa5-40ae-97ee-67462874707c", "DetectTime": "2023-10-30T14:04:08.342333+02:00", "EventTime": "2023-10-30T14:04:08.342358+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-03T21:06:15.664864+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:08.442553)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "48c262d3-d4e4-4aa1-bde3-c7c9a78b429b", "DetectTime": "2023-10-30T14:04:08.448763+02:00", "EventTime": "2023-10-30T14:04:08.448782+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVrB7X3LcLmbgCWEFa"]} -{"Format": "IDEA0", "ID": "8899a6ee-173b-47f6-8208-b5af0c602cf7", "DetectTime": "2023-10-30T14:04:08.461997+02:00", "EventTime": "2023-10-30T14:04:08.462020+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZRSHIDG928E6EFf9"]} -{"Format": "IDEA0", "ID": "ef04f864-43d5-4b23-b1b4-e3c94581c1e9", "DetectTime": "2023-10-30T14:04:08.471491+02:00", "EventTime": "2023-10-30T14:04:08.471514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CLHJdp4EFsVbGd7GWg"]} -{"Format": "IDEA0", "ID": "b927462a-4a93-4bb4-bc75-d873fb843d0b", "DetectTime": "2023-10-30T14:04:08.522363+02:00", "EventTime": "2023-10-30T14:04:08.522384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CWsEPg2Yp4DnDIYoE8"]} -{"Format": "IDEA0", "ID": "a4353aaa-024d-4326-83e6-66eb237d48cc", "DetectTime": "2023-10-30T14:04:08.572416+02:00", "EventTime": "2023-10-30T14:04:08.572438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CNa1o11m42wBIShEG2"]} -{"Format": "IDEA0", "ID": "a9d3fb32-b36e-4bec-a5ce-b296f83320d0", "DetectTime": "2023-10-30T14:04:08.618294+02:00", "EventTime": "2023-10-30T14:04:08.618311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPIrdc35oveJmCd1Ag"]} -{"Format": "IDEA0", "ID": "243bef26-ced7-4f36-ba17-b6478de6d09c", "DetectTime": "2023-10-30T14:04:08.661178+02:00", "EventTime": "2023-10-30T14:04:08.661203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CHiqbK10jKo3LlGeoc"]} -{"Format": "IDEA0", "ID": "5130bea1-69ce-4a42-a864-db816775d913", "DetectTime": "2023-10-30T14:04:08.700753+02:00", "EventTime": "2023-10-30T14:04:08.700771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11369], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. ", "ContentType": "text/plain"}], "uids": ["C6Y96lh0rXRVZSly3"]} -{"Format": "IDEA0", "ID": "4f0e0beb-cc5d-452f-8853-5f550cc8bde5", "DetectTime": "2023-10-30T14:04:08.742754+02:00", "EventTime": "2023-10-30T14:04:08.742776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["C8hNIo24fyGBbrVAXa"]} -{"Format": "IDEA0", "ID": "71cd5e4c-6d6a-458a-b4b2-ec2c0396181e", "DetectTime": "2023-10-30T14:04:08.785046+02:00", "EventTime": "2023-10-30T14:04:08.785068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CZMymnqGUUqIaJGwh"]} -{"Format": "IDEA0", "ID": "2e039499-7307-4a8d-ab2d-34d596d1df5b", "DetectTime": "2023-10-30T14:04:08.807342+02:00", "EventTime": "2023-10-30T14:04:08.807360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["Ck5v333C6wXx8swpp6"]} -{"Format": "IDEA0", "ID": "92d61f1d-f360-46d8-b8ca-c1c9e0ea6412", "DetectTime": "2023-10-30T14:04:08.830091+02:00", "EventTime": "2023-10-30T14:04:08.830116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C55uJHazMuPkQmOw3"]} -{"Format": "Json", "ID": "92d61f1d-f360-46d8-b8ca-c1c9e0ea6412", "DetectTime": "2023-10-30T14:04:08.830091+02:00", "EventTime": "2023-10-30T14:04:08.830116+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:33:27.763242+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:08.906042)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45cc26ac-bc9b-4b0f-add9-b19f551d4803", "DetectTime": "2023-10-30T14:04:08.912132+02:00", "EventTime": "2023-10-30T14:04:08.912152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Ch8FfOAWCvDXqLhH9"]} -{"Format": "IDEA0", "ID": "12cc3d63-e0db-4faf-8a36-b3276738c16d", "DetectTime": "2023-10-30T14:04:08.938392+02:00", "EventTime": "2023-10-30T14:04:08.938407+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwfqgDFYMCtloc9C"]} -{"Format": "IDEA0", "ID": "c644fb11-1bbf-419d-9012-aec1bb6e9e25", "DetectTime": "2023-10-30T14:04:08.945132+02:00", "EventTime": "2023-10-30T14:04:08.945146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CK2i3H3X8nDU0as6ta"]} -{"Format": "IDEA0", "ID": "cec96a56-0fa8-493e-a642-fe86c59f0051", "DetectTime": "2023-10-30T14:04:09.028771+02:00", "EventTime": "2023-10-30T14:04:09.028791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["Cxz4tIprqOCNMHDM"]} -{"Format": "IDEA0", "ID": "0de8b300-b54f-49b1-8730-261529b0757b", "DetectTime": "2023-10-30T14:04:09.055842+02:00", "EventTime": "2023-10-30T14:04:09.055865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["Cxqd0J2RWL9l90NJrd"]} -{"Format": "IDEA0", "ID": "1990cfd1-b8dd-4fd9-aad8-010616dc839c", "DetectTime": "2023-10-30T14:04:09.082419+02:00", "EventTime": "2023-10-30T14:04:09.082436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["CLUdcd3WHRD3nq70r3"]} -{"Format": "IDEA0", "ID": "705ec67b-bdae-4df2-a595-6f84d5f53bbd", "DetectTime": "2023-10-30T14:04:09.106254+02:00", "EventTime": "2023-10-30T14:04:09.106273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["CoMi31373Dso8jkKk3"]} -{"Format": "IDEA0", "ID": "50182142-32d9-4f8c-a9b9-53b581b0faf6", "DetectTime": "2023-10-30T14:04:09.131564+02:00", "EventTime": "2023-10-30T14:04:09.131583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CbsqXV3p6DKsb9IiA8"]} -{"Format": "IDEA0", "ID": "1c194e73-8310-4c5c-ba30-d8216c29350e", "DetectTime": "2023-10-30T14:04:09.175785+02:00", "EventTime": "2023-10-30T14:04:09.175802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["CqYzWE3Ikqd94lxbVi"]} -{"Format": "IDEA0", "ID": "05a48525-98f7-4f20-a8a6-47af1d7f30b6", "DetectTime": "2023-10-30T14:04:09.204694+02:00", "EventTime": "2023-10-30T14:04:09.204717+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7p6N83ObWnBLQJdJ1"]} -{"Format": "IDEA0", "ID": "76013cb8-88d7-4005-b64e-970e3e4dd37e", "DetectTime": "2023-10-30T14:04:09.212998+02:00", "EventTime": "2023-10-30T14:04:09.213025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["CBWfTj2QncOhBJgRoh"]} -{"Format": "IDEA0", "ID": "a1c2b1c5-d35d-4637-a8eb-1e23ac8b31ca", "DetectTime": "2023-10-30T14:04:09.238676+02:00", "EventTime": "2023-10-30T14:04:09.238699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["C0nPUO2qehV7euCNP1"]} -{"Format": "IDEA0", "ID": "99c5824c-e526-49c7-a1a0-3b36afeb3c08", "DetectTime": "2023-10-30T14:04:09.263180+02:00", "EventTime": "2023-10-30T14:04:09.263193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["CjvMzZ1pABMrFgH4Cg"]} -{"Format": "IDEA0", "ID": "a73991cd-8618-489e-8bc5-b3a68679b54b", "DetectTime": "2023-10-30T14:04:09.289558+02:00", "EventTime": "2023-10-30T14:04:09.289577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CWktiX2CRNA1nLP3wk"]} -{"Format": "IDEA0", "ID": "bcc8c77a-c65c-4e7d-811d-45b6366625d4", "DetectTime": "2023-10-30T14:04:09.329459+02:00", "EventTime": "2023-10-30T14:04:09.329477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CmyS9t1PXJHV11cRE8"]} -{"Format": "IDEA0", "ID": "5211037b-06af-4e95-83a5-c5c423b7faee", "DetectTime": "2023-10-30T14:04:09.354611+02:00", "EventTime": "2023-10-30T14:04:09.354628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["CC6s4TDpOgGlAOxVf"]} -{"Format": "IDEA0", "ID": "473b0000-e81d-4dd9-b870-242d50f60942", "DetectTime": "2023-10-30T14:04:09.378403+02:00", "EventTime": "2023-10-30T14:04:09.378419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["Cymy2O1CbUgpuErYWh"]} -{"Format": "IDEA0", "ID": "dff2c9d7-35d6-41c1-b6f5-48c49ecc45ea", "DetectTime": "2023-10-30T14:04:09.426590+02:00", "EventTime": "2023-10-30T14:04:09.426608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CF6C203PEeMpHiyZ7c"]} -{"Format": "IDEA0", "ID": "ea6f0209-0aee-42f6-b07c-e4cafd6cec36", "DetectTime": "2023-10-30T14:04:09.452958+02:00", "EventTime": "2023-10-30T14:04:09.452981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CuWpQh2w9GpT67zCF"]} -{"Format": "IDEA0", "ID": "51422567-5ef5-4559-a6fc-ebb3842d63a5", "DetectTime": "2023-10-30T14:04:09.477810+02:00", "EventTime": "2023-10-30T14:04:09.477829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CVEv981XP2CCDLqDv9"]} -{"Format": "IDEA0", "ID": "208f55ba-8dbe-4bcc-bc74-fa5c3fcd6235", "DetectTime": "2023-10-30T14:04:09.523473+02:00", "EventTime": "2023-10-30T14:04:09.523495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CMUFGrWGFVSlcUGP7"]} -{"Format": "IDEA0", "ID": "7c65dc94-15f9-4dfb-8f3d-4e4ef0792e6b", "DetectTime": "2023-10-30T14:04:09.569138+02:00", "EventTime": "2023-10-30T14:04:09.569158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.183.69.117 ", "ContentType": "text/plain"}], "uids": ["CP8szyVQCMy0mT5y2"]} -{"Format": "IDEA0", "ID": "7c398ce3-5085-498f-89f6-70c7eb2870a3", "DetectTime": "2023-10-30T14:04:09.601236+02:00", "EventTime": "2023-10-30T14:04:09.601252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.59.249 ", "ContentType": "text/plain"}], "uids": ["CpvrnZ2K2NDQ0ZTdHb"]} -{"Format": "IDEA0", "ID": "3ad14dfe-f3e7-4d3f-8cc9-8a8c6409dbcd", "DetectTime": "2023-10-30T14:04:09.634215+02:00", "EventTime": "2023-10-30T14:04:09.634236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CMkz5b2FvJJ9DUdVy"]} -{"Format": "IDEA0", "ID": "87880b63-c229-4283-b877-48fa30399d44", "DetectTime": "2023-10-30T14:04:09.676227+02:00", "EventTime": "2023-10-30T14:04:09.676251+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.231.62.73 from 10.0.2.19. blacklisted IP AS: KOBA-AS Polish ISP, PL AS3452 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CBrkgffyAdckR7rig"]} -{"Format": "IDEA0", "ID": "f469b7c1-6866-4055-af5f-45df1af5fd4d", "DetectTime": "2023-10-30T14:04:09.739778+02:00", "EventTime": "2023-10-30T14:04:09.739795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.240.245.133 ", "ContentType": "text/plain"}], "uids": ["CWRctE2Qj8naMEkvTk"]} -{"Format": "IDEA0", "ID": "97722624-5b86-4281-a433-03e4770a4a09", "DetectTime": "2023-10-30T14:04:09.772950+02:00", "EventTime": "2023-10-30T14:04:09.772971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.3.159 ", "ContentType": "text/plain"}], "uids": ["C8sCrUJqB6nhlP6ff"]} -{"Format": "IDEA0", "ID": "36b7272d-33a2-4245-a49d-14fd8ff472bf", "DetectTime": "2023-10-30T14:04:09.804258+02:00", "EventTime": "2023-10-30T14:04:09.804277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.136.223.205 ", "ContentType": "text/plain"}], "uids": ["Clnrgd1Mn12VKJ9Au4"]} -{"Format": "IDEA0", "ID": "3e523e42-1d1a-407e-b795-69bca453ad00", "DetectTime": "2023-10-30T14:04:09.851363+02:00", "EventTime": "2023-10-30T14:04:09.851388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cl2ypl44MgtEm9CHVc"]} -{"Format": "IDEA0", "ID": "3dbcbbb6-dc51-48ce-aaaa-4068c720e8b3", "DetectTime": "2023-10-30T14:04:09.900027+02:00", "EventTime": "2023-10-30T14:04:09.900048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CwZLJw1tty3FZufhg", "CVrB7X3LcLmbgCWEFa", "CwfqgDFYMCtloc9C", "CUHpcm1JQiVSPbVuMg"]} -{"Format": "IDEA0", "ID": "8a05e1a8-84a2-4058-9883-7116929622d9", "DetectTime": "2023-10-30T14:04:09.907984+02:00", "EventTime": "2023-10-30T14:04:09.908002+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwZLJw1tty3FZufhg"]} -{"Format": "IDEA0", "ID": "6ee50bad-f8eb-41a7-be93-fd1f1fa4d5c2", "DetectTime": "2023-10-30T14:04:09.918330+02:00", "EventTime": "2023-10-30T14:04:09.918354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["Cn6eHO1ujygqSShfyl"]} -{"Format": "IDEA0", "ID": "bb4e0189-7947-47a1-a432-44e6684184d5", "DetectTime": "2023-10-30T14:04:09.951692+02:00", "EventTime": "2023-10-30T14:04:09.951713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CpVVT943kUmKXMEKJd"]} -{"Format": "IDEA0", "ID": "682a85b4-9f4a-428f-aef7-d9939940b6d1", "DetectTime": "2023-10-30T14:04:09.993640+02:00", "EventTime": "2023-10-30T14:04:09.993666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["C87C1kCiif4ZQK9F3"]} -{"Format": "IDEA0", "ID": "641544a3-83bd-4a9e-a021-67c073d3e843", "DetectTime": "2023-10-30T14:04:10.041195+02:00", "EventTime": "2023-10-30T14:04:10.041263+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWkDjlXybTjyfVEod"]} -{"Format": "IDEA0", "ID": "9b9577e5-0195-4f74-82ee-1795d76e3449", "DetectTime": "2023-10-30T14:04:10.051952+02:00", "EventTime": "2023-10-30T14:04:10.051976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["Cev3Xh1FZqyLJeuHSj"]} -{"Format": "IDEA0", "ID": "442f1737-c64c-4fe3-b151-f638e37bdb52", "DetectTime": "2023-10-30T14:04:10.099183+02:00", "EventTime": "2023-10-30T14:04:10.099205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKuRiTenrssmXhH1"]} -{"Format": "IDEA0", "ID": "ece2fb94-cfac-4254-87ec-d42bf08d9e3d", "DetectTime": "2023-10-30T14:04:10.137081+02:00", "EventTime": "2023-10-30T14:04:10.137098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CACz5O3MA1VOfZQEek"]} -{"Format": "Json", "ID": "ece2fb94-cfac-4254-87ec-d42bf08d9e3d", "DetectTime": "2023-10-30T14:04:10.137081+02:00", "EventTime": "2023-10-30T14:04:10.137098+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:33:45.900804+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:10.212743)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "67c1dadb-de24-42df-9617-06511824b3cd", "DetectTime": "2023-10-30T14:04:10.221617+02:00", "EventTime": "2023-10-30T14:04:10.221636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C8TWMV2aH5U9h6oaGg"]} -{"Format": "IDEA0", "ID": "00432a54-dd2a-466e-9e3a-6d4d29c78b97", "DetectTime": "2023-10-30T14:04:10.269645+02:00", "EventTime": "2023-10-30T14:04:10.269668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CbMoJk1HjxykFdKmKj"]} -{"Format": "IDEA0", "ID": "c8a94df5-8609-448e-ab80-30aff32dace8", "DetectTime": "2023-10-30T14:04:10.306043+02:00", "EventTime": "2023-10-30T14:04:10.306060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CdWX5n1D7g1xuIGyxb"]} -{"Format": "IDEA0", "ID": "75631a86-fa3a-496d-b0b6-ebe9bb10d980", "DetectTime": "2023-10-30T14:04:10.338979+02:00", "EventTime": "2023-10-30T14:04:10.338999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CHutQ03gBAZLPzGBRa"]} -{"Format": "IDEA0", "ID": "7842311b-4d65-4b9b-92d1-0ffc3435e564", "DetectTime": "2023-10-30T14:04:10.372992+02:00", "EventTime": "2023-10-30T14:04:10.373006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CJJ0es4NCO3Nkp1Sh"]} -{"Format": "IDEA0", "ID": "a25f6794-5bc6-44d3-95c1-b4f8d3c33fde", "DetectTime": "2023-10-30T14:04:10.407740+02:00", "EventTime": "2023-10-30T14:04:10.407757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CT1APG4rbhb9A4rFh"]} -{"Format": "IDEA0", "ID": "50062e4d-6378-492e-b6cc-a3095aa4da67", "DetectTime": "2023-10-30T14:04:10.438284+02:00", "EventTime": "2023-10-30T14:04:10.438360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CTw5Rh1JBZ0gWjCASf"]} -{"Format": "IDEA0", "ID": "70db0387-b09c-4b98-8fd6-37c1a404909b", "DetectTime": "2023-10-30T14:04:10.473036+02:00", "EventTime": "2023-10-30T14:04:10.473198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CB4rU7sjH0fFkZjfe"]} -{"Format": "IDEA0", "ID": "045d51cf-a2c3-4197-a219-fbd452198603", "DetectTime": "2023-10-30T14:04:10.519313+02:00", "EventTime": "2023-10-30T14:04:10.519333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CTzTXe4f0EezltAFV9"]} -{"Format": "IDEA0", "ID": "9aab5694-9495-484c-8925-1b64146c9b23", "DetectTime": "2023-10-30T14:04:10.567968+02:00", "EventTime": "2023-10-30T14:04:10.567988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CyPgRu1ikCgRDAONA5"]} -{"Format": "IDEA0", "ID": "f8da37ba-55d7-48fc-b5f2-84f4acd1cd0f", "DetectTime": "2023-10-30T14:04:10.603832+02:00", "EventTime": "2023-10-30T14:04:10.603847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CWIAcF4t3E1nkLn8ed"]} -{"Format": "IDEA0", "ID": "8436e612-e752-4d56-a830-5260b2776e8d", "DetectTime": "2023-10-30T14:04:10.635259+02:00", "EventTime": "2023-10-30T14:04:10.635277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CMIOsb46zbvtcUVkn9"]} -{"Format": "IDEA0", "ID": "9314f689-1ef3-4afe-be73-3ffabe54654a", "DetectTime": "2023-10-30T14:04:10.669355+02:00", "EventTime": "2023-10-30T14:04:10.669368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CJexZw3qiGACRGyWj8"]} -{"Format": "IDEA0", "ID": "b3878c13-b317-4f7b-9f0e-bc09235facfc", "DetectTime": "2023-10-30T14:04:10.703632+02:00", "EventTime": "2023-10-30T14:04:10.703645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["CTFtvwzIro0kr8bXb"]} -{"Format": "IDEA0", "ID": "20414029-c779-478c-b364-82e055aa1d31", "DetectTime": "2023-10-30T14:04:10.736518+02:00", "EventTime": "2023-10-30T14:04:10.736543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CrOpDL424IKW0Lr5l"]} -{"Format": "IDEA0", "ID": "1f3bbce0-e0b0-4651-8cff-a3655465298c", "DetectTime": "2023-10-30T14:04:10.775496+02:00", "EventTime": "2023-10-30T14:04:10.775514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CbQFb84mFb0xiRpr81"]} -{"Format": "IDEA0", "ID": "76d2c26b-c3af-4dc5-a2f8-c72e7bb743e6", "DetectTime": "2023-10-30T14:04:10.813050+02:00", "EventTime": "2023-10-30T14:04:10.813069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["C65xSq8wFd4lxzt07"]} -{"Format": "IDEA0", "ID": "0ec3a252-bd1c-446f-934a-591e2fa24458", "DetectTime": "2023-10-30T14:04:10.842708+02:00", "EventTime": "2023-10-30T14:04:10.842723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["Cpx1lC4SZFfcQ7qJj3"]} -{"Format": "IDEA0", "ID": "62128b08-1a11-48ac-9765-cd9758b0f4af", "DetectTime": "2023-10-30T14:04:10.881996+02:00", "EventTime": "2023-10-30T14:04:10.882016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["Cy8EQC3SdrlVD3mVyd"]} -{"Format": "IDEA0", "ID": "cefae4ef-04f9-47d6-90d2-9930a34f1c2f", "DetectTime": "2023-10-30T14:04:10.912921+02:00", "EventTime": "2023-10-30T14:04:10.912946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["Cu1DkS2gFWm0U5DWwl"]} -{"Format": "IDEA0", "ID": "fc7de177-eaec-4566-b1fe-6c2abb9cdae5", "DetectTime": "2023-10-30T14:04:10.944794+02:00", "EventTime": "2023-10-30T14:04:10.944810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["Cvd5E14KEEWInzn6R6"]} -{"Format": "IDEA0", "ID": "c1956a50-e10f-4e2e-a466-84b2b0fdcf8b", "DetectTime": "2023-10-30T14:04:10.984753+02:00", "EventTime": "2023-10-30T14:04:10.984765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["Cr6RYZ1rqNlOvLJWIa"]} -{"Format": "IDEA0", "ID": "d6af5a68-ee95-4806-b4aa-805e2d370aee", "DetectTime": "2023-10-30T14:04:11.014401+02:00", "EventTime": "2023-10-30T14:04:11.014423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["CNcnzM1B1hRDoRqqQh"]} -{"Format": "IDEA0", "ID": "0bb20aca-c997-43ab-9796-53717a51c1ef", "DetectTime": "2023-10-30T14:04:11.045963+02:00", "EventTime": "2023-10-30T14:04:11.045976+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Ce6eV03ydr8xtLNMy9"]} -{"Format": "IDEA0", "ID": "4c2040b7-a9fb-463a-9103-71d45f667091", "DetectTime": "2023-10-30T14:04:11.053659+02:00", "EventTime": "2023-10-30T14:04:11.053675+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4gx049aX9AqfaMN6"]} -{"Format": "IDEA0", "ID": "15c051f7-04d8-4689-8405-eaae9f40a03f", "DetectTime": "2023-10-30T14:04:11.062132+02:00", "EventTime": "2023-10-30T14:04:11.062150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CLNWlJ1rChnD3b2p4h"]} -{"Format": "IDEA0", "ID": "9c442cce-510a-4de7-a153-9039bb74bdc8", "DetectTime": "2023-10-30T14:04:11.092770+02:00", "EventTime": "2023-10-30T14:04:11.092788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CWdosonwKX57CQVB4"]} -{"Format": "IDEA0", "ID": "6bfda6a6-c575-47f3-9898-6678cb8eedb8", "DetectTime": "2023-10-30T14:04:11.126282+02:00", "EventTime": "2023-10-30T14:04:11.126305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CDZzUA4XMnyQw6bBId"]} -{"Format": "IDEA0", "ID": "c3409582-b9ba-4afc-85ba-fa29fdad756b", "DetectTime": "2023-10-30T14:04:11.163887+02:00", "EventTime": "2023-10-30T14:04:11.163904+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cy12KT2z2KRuxsujji"]} -{"Format": "IDEA0", "ID": "3c087774-ccd8-4534-a7ec-cbd6a2df69ff", "DetectTime": "2023-10-30T14:04:11.172236+02:00", "EventTime": "2023-10-30T14:04:11.172255+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C4KFLa4SrCldad1Hyd"]} -{"Format": "IDEA0", "ID": "9af0f4e7-35b7-459c-951e-f212fed73cb8", "DetectTime": "2023-10-30T14:04:11.229405+02:00", "EventTime": "2023-10-30T14:04:11.229435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["CxNIrI2VIc9BfLTyr5"]} -{"Format": "IDEA0", "ID": "dac4940e-f91d-4024-a2cf-24e2e92a4a1e", "DetectTime": "2023-10-30T14:04:11.259414+02:00", "EventTime": "2023-10-30T14:04:11.259434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["CZVVi91G3zIlS2xpCe"]} -{"Format": "IDEA0", "ID": "3917d30e-6669-4873-9304-a84d4c68d397", "DetectTime": "2023-10-30T14:04:11.289449+02:00", "EventTime": "2023-10-30T14:04:11.289467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["C1dPkF4ImOrb1wB1A3"]} -{"Format": "IDEA0", "ID": "616e2d8c-f54f-4273-8d7c-894a28b9f1a8", "DetectTime": "2023-10-30T14:04:11.318858+02:00", "EventTime": "2023-10-30T14:04:11.318879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CM4wiU2WBaCyA8UqB4"]} -{"Format": "IDEA0", "ID": "0a235174-60bb-4393-899f-4a0b50c6743a", "DetectTime": "2023-10-30T14:04:11.346161+02:00", "EventTime": "2023-10-30T14:04:11.346181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwoYFrSvGXFLKnD45"]} -{"Format": "IDEA0", "ID": "d117a65c-6945-453a-b557-394a28103429", "DetectTime": "2023-10-30T14:04:11.354039+02:00", "EventTime": "2023-10-30T14:04:11.354062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CbeBRSem3A8zqSKN9"]} -{"Format": "IDEA0", "ID": "6539c21e-8216-4265-a0ac-78f990083f28", "DetectTime": "2023-10-30T14:04:11.383581+02:00", "EventTime": "2023-10-30T14:04:11.383597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CIxE65CHWi1Tgggng"]} -{"Format": "IDEA0", "ID": "777b6817-bba2-45cc-875c-7e9aa6adc574", "DetectTime": "2023-10-30T14:04:11.414195+02:00", "EventTime": "2023-10-30T14:04:11.414215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["C8dP3r1mwvnrn5afs"]} -{"Format": "IDEA0", "ID": "0187ad8f-0d57-4cbb-bb43-7d4df0b8f608", "DetectTime": "2023-10-30T14:04:11.444696+02:00", "EventTime": "2023-10-30T14:04:11.444712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C7rtkH3VFK4EcgByM5"]} -{"Format": "IDEA0", "ID": "2be9514f-5a5c-402b-a7db-4c47cac37e62", "DetectTime": "2023-10-30T14:04:11.477171+02:00", "EventTime": "2023-10-30T14:04:11.477189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CWkIDY1tsbEz2Pdfha"]} -{"Format": "IDEA0", "ID": "462c2084-307c-464f-a731-290b08accd20", "DetectTime": "2023-10-30T14:04:11.508252+02:00", "EventTime": "2023-10-30T14:04:11.508278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CFMfJ04s0aMG5Npe38"]} -{"Format": "IDEA0", "ID": "15d8b3cc-6276-4c72-8e52-c361d229acf7", "DetectTime": "2023-10-30T14:04:11.550704+02:00", "EventTime": "2023-10-30T14:04:11.550722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.242.182.216 ", "ContentType": "text/plain"}], "uids": ["CnNA0U3h9sBCeu4wGg"]} -{"Format": "IDEA0", "ID": "11895ef1-eaf6-4c0c-bcd5-5b13253ecfa1", "DetectTime": "2023-10-30T14:04:11.578521+02:00", "EventTime": "2023-10-30T14:04:11.578540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.160.114.142 ", "ContentType": "text/plain"}], "uids": ["CiNKJs4I9boJNzKdgc"]} -{"Format": "IDEA0", "ID": "dbbbe482-beb4-488f-a165-769b649f991f", "DetectTime": "2023-10-30T14:04:11.608594+02:00", "EventTime": "2023-10-30T14:04:11.608609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.143.80.185 ", "ContentType": "text/plain"}], "uids": ["CYDllV34BeK0vT9ed8"]} -{"Format": "IDEA0", "ID": "c8496756-fdef-47ad-b11c-a26a5339cd56", "DetectTime": "2023-10-30T14:04:11.639651+02:00", "EventTime": "2023-10-30T14:04:11.639671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.234.97.81 ", "ContentType": "text/plain"}], "uids": ["CsmnUT1leWBtS1dL2k"]} -{"Format": "IDEA0", "ID": "a286e02f-8ea7-4a94-b2e2-4d6fca3c701a", "DetectTime": "2023-10-30T14:04:11.668307+02:00", "EventTime": "2023-10-30T14:04:11.668324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CUfKaI17KYAHgjeDn2"]} -{"Format": "IDEA0", "ID": "157c563f-559a-482f-8fb8-d59f7bf66fb6", "DetectTime": "2023-10-30T14:04:11.697526+02:00", "EventTime": "2023-10-30T14:04:11.697541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["C7NFpK32AGbnzQDUXc"]} -{"Format": "IDEA0", "ID": "eccd6989-c086-4232-a70e-5f474e621003", "DetectTime": "2023-10-30T14:04:11.728014+02:00", "EventTime": "2023-10-30T14:04:11.728032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["Ccjy3y33g54RTOjSbc"]} -{"Format": "IDEA0", "ID": "058fea66-a34c-4777-b54c-26e98c75bea3", "DetectTime": "2023-10-30T14:04:11.758139+02:00", "EventTime": "2023-10-30T14:04:11.758161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CunzCs1gkbH9PGFeT5"]} -{"Format": "IDEA0", "ID": "ae19af30-5774-4260-8829-9fc365730af1", "DetectTime": "2023-10-30T14:04:11.787167+02:00", "EventTime": "2023-10-30T14:04:11.787191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["COWsmY3RLWRGOWtBwi"]} -{"Format": "IDEA0", "ID": "329fdaf2-2815-4581-b1bd-194a66d22da5", "DetectTime": "2023-10-30T14:04:11.818526+02:00", "EventTime": "2023-10-30T14:04:11.818547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CYNuRw2b9WCaOrTG8g"]} -{"Format": "IDEA0", "ID": "2549feb7-b973-48fa-a1d9-9b802b9d967b", "DetectTime": "2023-10-30T14:04:11.848489+02:00", "EventTime": "2023-10-30T14:04:11.848504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CrYFKw1aGHJEu1Rwih"]} -{"Format": "IDEA0", "ID": "cc66c51f-3c19-4bd5-9fb2-092c11af7333", "DetectTime": "2023-10-30T14:04:11.879493+02:00", "EventTime": "2023-10-30T14:04:11.879511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CfER1d1HfMDSgW0QN4"]} -{"Format": "IDEA0", "ID": "a27fff39-e8b7-4fc0-91c7-af6aac99b7af", "DetectTime": "2023-10-30T14:04:11.911132+02:00", "EventTime": "2023-10-30T14:04:11.911157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CJJOpiRn9kHJO3mhc"]} -{"Format": "IDEA0", "ID": "926b3519-e0ce-4eb6-82f7-997cff007f6c", "DetectTime": "2023-10-30T14:04:11.943493+02:00", "EventTime": "2023-10-30T14:04:11.943509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["Cy3Nby4LEPiuc0rjy"]} -{"Format": "IDEA0", "ID": "410340cd-73ed-4dff-bcee-2aca2e3aa8f7", "DetectTime": "2023-10-30T14:04:11.975962+02:00", "EventTime": "2023-10-30T14:04:11.975979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["CUJ8Ji4snclvIpTdud"]} -{"Format": "IDEA0", "ID": "5d50c2fc-58dd-458e-92ca-3f0e3590be5f", "DetectTime": "2023-10-30T14:04:12.006867+02:00", "EventTime": "2023-10-30T14:04:12.006888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CZCcmc2gSb6mSvFRqa"]} -{"Format": "IDEA0", "ID": "e2d4b980-2df1-494a-a65a-934ce67d61cd", "DetectTime": "2023-10-30T14:04:12.037178+02:00", "EventTime": "2023-10-30T14:04:12.037199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C6uzWm3RRsvrBU0UYb"]} -{"Format": "IDEA0", "ID": "71e2b2db-66b0-48a5-8112-48601dc3a4cc", "DetectTime": "2023-10-30T14:04:12.072897+02:00", "EventTime": "2023-10-30T14:04:12.072914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CO9xIm4rZf2CkOKlC3"]} -{"Format": "IDEA0", "ID": "cba17625-5b36-4b75-b1b5-6bf74157ef56", "DetectTime": "2023-10-30T14:04:12.101514+02:00", "EventTime": "2023-10-30T14:04:12.101535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["C7Xe5DC9F9YQu30ol"]} -{"Format": "IDEA0", "ID": "072fedb9-7241-4c00-9a5d-e9f9e300925a", "DetectTime": "2023-10-30T14:04:12.140529+02:00", "EventTime": "2023-10-30T14:04:12.140546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CuYQDo34s7lFvf2i65"]} -{"Format": "IDEA0", "ID": "cd84a709-9b73-40d1-a85c-16d494e501f6", "DetectTime": "2023-10-30T14:04:12.170274+02:00", "EventTime": "2023-10-30T14:04:12.170301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CCtLH1NHOt9noxDY6"]} -{"Format": "IDEA0", "ID": "4a515531-2a63-40b8-9dae-e537aa99ed91", "DetectTime": "2023-10-30T14:04:12.200663+02:00", "EventTime": "2023-10-30T14:04:12.200684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CnUHb8331ouLhD8ljf"]} -{"Format": "IDEA0", "ID": "f20bd7e4-629d-4804-9ec5-58c2fea74ace", "DetectTime": "2023-10-30T14:04:12.231892+02:00", "EventTime": "2023-10-30T14:04:12.231904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["Cw87Ze1cDwSmXPXze"]} -{"Format": "IDEA0", "ID": "c3173e12-a65c-46c6-b9c7-0fcc9af4d562", "DetectTime": "2023-10-30T14:04:12.259730+02:00", "EventTime": "2023-10-30T14:04:12.259752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cx74jj48eDu3Ugq7Si"]} -{"Format": "IDEA0", "ID": "1d5c533f-b270-45a0-b6a8-3232d2835ae7", "DetectTime": "2023-10-30T14:04:12.291803+02:00", "EventTime": "2023-10-30T14:04:12.291824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CF5ICVaS91Y9kUN31"]} -{"Format": "IDEA0", "ID": "97049068-252b-4070-a85c-2c575bf8c8d2", "DetectTime": "2023-10-30T14:04:12.322231+02:00", "EventTime": "2023-10-30T14:04:12.322247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["C9ShSO1xx5B2lrdKQi"]} -{"Format": "IDEA0", "ID": "c597602f-8656-4e77-ac90-d706f73a7046", "DetectTime": "2023-10-30T14:04:12.352475+02:00", "EventTime": "2023-10-30T14:04:12.352497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["C53Ken3o7rdKG12kX9"]} -{"Format": "IDEA0", "ID": "156cb5be-fce7-4c68-9963-a835ce4ab4b4", "DetectTime": "2023-10-30T14:04:12.386175+02:00", "EventTime": "2023-10-30T14:04:12.386199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Ch3pdw3UyflP4MOakl"]} -{"Format": "IDEA0", "ID": "3e39fdda-4dc8-4e44-9aa9-28a22948c847", "DetectTime": "2023-10-30T14:04:12.416652+02:00", "EventTime": "2023-10-30T14:04:12.416669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["CipM0J28n74vmWNY1h"]} -{"Format": "IDEA0", "ID": "1c5d746b-ebf3-496b-b77e-e56419d5fa87", "DetectTime": "2023-10-30T14:04:12.445303+02:00", "EventTime": "2023-10-30T14:04:12.445319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CIcfCaXaraSUcdOka"]} -{"Format": "IDEA0", "ID": "e9101fa4-86b9-4afe-8384-498f0d004760", "DetectTime": "2023-10-30T14:04:12.479736+02:00", "EventTime": "2023-10-30T14:04:12.479761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["CeBUu9tcyYbMPX3K6"]} -{"Format": "IDEA0", "ID": "15a1b076-91f9-45dc-b00f-4493cdb70fcd", "DetectTime": "2023-10-30T14:04:12.508083+02:00", "EventTime": "2023-10-30T14:04:12.508100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CdZVLL1nggcP0Ew56a"]} -{"Format": "IDEA0", "ID": "a62bf0b2-0f96-4e8b-b72c-8b3b6d7eb8ed", "DetectTime": "2023-10-30T14:04:12.539243+02:00", "EventTime": "2023-10-30T14:04:12.539254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C0VSMQ1AemJaL6voh"]} -{"Format": "IDEA0", "ID": "a249e031-6ab2-4d22-bda3-ceca201407a4", "DetectTime": "2023-10-30T14:04:12.569539+02:00", "EventTime": "2023-10-30T14:04:12.569556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CzePwENTAQ5WbZpCc"]} -{"Format": "IDEA0", "ID": "b21e5137-1d61-4321-bf17-24384b5ba653", "DetectTime": "2023-10-30T14:04:12.595557+02:00", "EventTime": "2023-10-30T14:04:12.595578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["CRKXpc23E4HqVqS5X"]} -{"Format": "IDEA0", "ID": "5a5515fd-079d-401d-a4e0-757edb9148cf", "DetectTime": "2023-10-30T14:04:12.627100+02:00", "EventTime": "2023-10-30T14:04:12.627120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CYASCS3y3nfU28RVL2"]} -{"Format": "IDEA0", "ID": "18e2b9c8-d49b-42e3-8de4-b9479fbb91e8", "DetectTime": "2023-10-30T14:04:12.652136+02:00", "EventTime": "2023-10-30T14:04:12.652162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.119.104 ", "ContentType": "text/plain"}], "uids": ["CGBhuz2dTPF8dWONb3"]} -{"Format": "IDEA0", "ID": "bddf2c17-60b5-45db-89b9-98798441f2fb", "DetectTime": "2023-10-30T14:04:12.676911+02:00", "EventTime": "2023-10-30T14:04:12.676924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CjFaCt2Ko2XmEzJbX6"]} -{"Format": "IDEA0", "ID": "394a5284-c9cf-4eff-bc84-7342696e8a35", "DetectTime": "2023-10-30T14:04:12.703456+02:00", "EventTime": "2023-10-30T14:04:12.703473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19077], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. ", "ContentType": "text/plain"}], "uids": ["CgedN94WY062as8B96"]} -{"Format": "IDEA0", "ID": "31f40ad0-4a53-4b2c-8f61-82fbbe76d580", "DetectTime": "2023-10-30T14:04:12.741130+02:00", "EventTime": "2023-10-30T14:04:12.741152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cd1YSF6RlFEXdLTDc"]} -{"Format": "IDEA0", "ID": "a266f3f6-8f05-4b5a-bb1f-031de68709d9", "DetectTime": "2023-10-30T14:04:12.769252+02:00", "EventTime": "2023-10-30T14:04:12.769269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CDtS953SyFdhTDgY4"]} -{"Format": "IDEA0", "ID": "db4b8799-b5b2-41bb-ac36-fc65b3e27de4", "DetectTime": "2023-10-30T14:04:12.798352+02:00", "EventTime": "2023-10-30T14:04:12.798374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C54GAL3hDAZlzCX5L4"]} -{"Format": "IDEA0", "ID": "f9aa94a1-b57c-42af-89e5-3b4f82267cba", "DetectTime": "2023-10-30T14:04:12.825172+02:00", "EventTime": "2023-10-30T14:04:12.825189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["Cmjkx61HdgD2wW8JM9"]} -{"Format": "IDEA0", "ID": "07074373-2f52-441d-bcba-6aad84f9a456", "DetectTime": "2023-10-30T14:04:12.853196+02:00", "EventTime": "2023-10-30T14:04:12.853217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4GXZO27pxkzDw7wc6"]} -{"Format": "IDEA0", "ID": "be65c32d-5269-4d25-ad1e-564aae47a435", "DetectTime": "2023-10-30T14:04:12.881628+02:00", "EventTime": "2023-10-30T14:04:12.881649+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CBfDIP1EHB3VM9KAxi"]} -{"Format": "IDEA0", "ID": "8252860e-2098-4971-aa13-4f45d352c5bd", "DetectTime": "2023-10-30T14:04:12.937692+02:00", "EventTime": "2023-10-30T14:04:12.937706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CBLnHh2joh4JTeOTO1"]} -{"Format": "IDEA0", "ID": "8e91a1d0-46fe-4c71-bf73-d2629a47bfab", "DetectTime": "2023-10-30T14:04:12.963741+02:00", "EventTime": "2023-10-30T14:04:12.963768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CyA1T11uUMUQmE2doa"]} -{"Format": "IDEA0", "ID": "0b191ba4-582b-4cfa-90c5-03cd0f6ad72e", "DetectTime": "2023-10-30T14:04:12.987857+02:00", "EventTime": "2023-10-30T14:04:12.987874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CSf0leInRhWHkTHhj"]} -{"Format": "IDEA0", "ID": "43ab0e8c-a81d-493c-83e9-b08bfc8ef6d1", "DetectTime": "2023-10-30T14:04:13.012998+02:00", "EventTime": "2023-10-30T14:04:13.013020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["CRL4aL1kCZ7SAa2fq4"]} -{"Format": "IDEA0", "ID": "744059ce-7ee4-481f-af1c-1023649b7b21", "DetectTime": "2023-10-30T14:04:13.039417+02:00", "EventTime": "2023-10-30T14:04:13.039434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CUqvNb3aKJyt2Gpdn2"]} -{"Format": "IDEA0", "ID": "26b02232-6e0a-44a6-91aa-0b811b1b0ec9", "DetectTime": "2023-10-30T14:04:13.066125+02:00", "EventTime": "2023-10-30T14:04:13.066141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CJSB534RbW6dl1TxHc"]} -{"Format": "IDEA0", "ID": "4cf13126-6657-4995-9688-b01a8bf551d8", "DetectTime": "2023-10-30T14:04:13.093028+02:00", "EventTime": "2023-10-30T14:04:13.093052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CPbczR2UCGI12Hmi6"]} -{"Format": "IDEA0", "ID": "22f7f238-f0cb-4c0a-97ed-1572df40946d", "DetectTime": "2023-10-30T14:04:13.120720+02:00", "EventTime": "2023-10-30T14:04:13.120740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CbGnZ729Mlu1q4HfKa"]} -{"Format": "IDEA0", "ID": "cfcba1e5-6822-4789-94a4-15f9ae6404f8", "DetectTime": "2023-10-30T14:04:13.144181+02:00", "EventTime": "2023-10-30T14:04:13.144197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CMyQpFgQop8OfiCI4"]} -{"Format": "IDEA0", "ID": "b317aa75-f66c-43d4-bf4c-595193c040bc", "DetectTime": "2023-10-30T14:04:13.168378+02:00", "EventTime": "2023-10-30T14:04:13.168395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["Cs6FRWXOTFeqLoND5"]} -{"Format": "IDEA0", "ID": "0fb4fcdf-685b-4f52-8f64-438e82bc8ac3", "DetectTime": "2023-10-30T14:04:13.192848+02:00", "EventTime": "2023-10-30T14:04:13.192864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CK4TddGgEMKrPRdpi"]} -{"Format": "IDEA0", "ID": "b55e1d06-daaf-400e-9ba4-0f74c2d6e437", "DetectTime": "2023-10-30T14:04:13.228860+02:00", "EventTime": "2023-10-30T14:04:13.228880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C5lZf04L3CCeWR1zYa"]} -{"Format": "IDEA0", "ID": "e4158bdf-f042-4a73-8991-ae2488e89070", "DetectTime": "2023-10-30T14:04:13.255035+02:00", "EventTime": "2023-10-30T14:04:13.255062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CGZ6vD3r5L3aMOMqul"]} -{"Format": "IDEA0", "ID": "c5179405-4b3b-4d24-a385-9b16af073199", "DetectTime": "2023-10-30T14:04:13.364591+02:00", "EventTime": "2023-10-30T14:04:13.364608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CJ4OlL2GxaWt8feoYg"]} -{"Format": "IDEA0", "ID": "10664ac3-099d-4d0a-aca7-c5a0b75ee06b", "DetectTime": "2023-10-30T14:04:13.395535+02:00", "EventTime": "2023-10-30T14:04:13.395796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cd4l2A3h3UGLwxhjVc"]} -{"Format": "IDEA0", "ID": "ccdd940a-7b08-4d2c-8cbe-802873e96835", "DetectTime": "2023-10-30T14:04:13.425506+02:00", "EventTime": "2023-10-30T14:04:13.425535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["C8NcT34r3Mu92m3WH2"]} -{"Format": "IDEA0", "ID": "0f04ccab-0ca7-4780-943b-0e57c04d2748", "DetectTime": "2023-10-30T14:04:13.454675+02:00", "EventTime": "2023-10-30T14:04:13.454695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CIHuSV1vBW8PYxLSW"]} -{"Format": "IDEA0", "ID": "9dfe18eb-b3a3-4b53-a19a-1fbada695947", "DetectTime": "2023-10-30T14:04:13.481305+02:00", "EventTime": "2023-10-30T14:04:13.481326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["C8JHja2kSXJEs9e1T9"]} -{"Format": "IDEA0", "ID": "615ecb7a-fb11-4425-af60-788c4c43704c", "DetectTime": "2023-10-30T14:04:13.509808+02:00", "EventTime": "2023-10-30T14:04:13.509826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CgLxxr2Zh2YUsifc3"]} -{"Format": "IDEA0", "ID": "e272129e-62f1-4fda-8b52-c6f34625075e", "DetectTime": "2023-10-30T14:04:13.538375+02:00", "EventTime": "2023-10-30T14:04:13.538396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["CQSfOb1IavBm1EXr9c"]} -{"Format": "IDEA0", "ID": "6d79b138-b974-4aeb-849d-55af5e05e68a", "DetectTime": "2023-10-30T14:04:13.570366+02:00", "EventTime": "2023-10-30T14:04:13.570387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["C7pPET1rvWp99w6hIi"]} -{"Format": "IDEA0", "ID": "fc61fd29-b627-4204-b909-c46bdd530016", "DetectTime": "2023-10-30T14:04:13.600379+02:00", "EventTime": "2023-10-30T14:04:13.600400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqJYC74YixPBwLouG5"]} -{"Format": "IDEA0", "ID": "989e0fb4-239d-47ba-9215-445f7f5a0438", "DetectTime": "2023-10-30T14:04:13.629342+02:00", "EventTime": "2023-10-30T14:04:13.629358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CrQNFuQUTDu31M8ic"]} -{"Format": "IDEA0", "ID": "1ee4291c-b159-4974-8313-7442ccd0dc14", "DetectTime": "2023-10-30T14:04:13.658870+02:00", "EventTime": "2023-10-30T14:04:13.658896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CXWTwW2Tm3U4Jvkfyf"]} -{"Format": "IDEA0", "ID": "4b7252ef-71c4-410d-be05-d6d037898c2b", "DetectTime": "2023-10-30T14:04:13.699594+02:00", "EventTime": "2023-10-30T14:04:13.699609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CuxV2um4xx43WYzbd"]} -{"Format": "IDEA0", "ID": "1c1221d6-4975-4346-bdb6-6b2fca082e15", "DetectTime": "2023-10-30T14:04:13.730098+02:00", "EventTime": "2023-10-30T14:04:13.730114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.249.160.108 ", "ContentType": "text/plain"}], "uids": ["CnU5AM2jic8WxDGOZd"]} -{"Format": "IDEA0", "ID": "f53cad79-f840-42be-a23f-823f021d2f7c", "DetectTime": "2023-10-30T14:04:13.761545+02:00", "EventTime": "2023-10-30T14:04:13.761566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.97.86.66 ", "ContentType": "text/plain"}], "uids": ["CPJLjE3cQeOx9ifctk"]} -{"Format": "IDEA0", "ID": "66a0dcab-f5ec-4b11-8318-632c83c152b2", "DetectTime": "2023-10-30T14:04:13.789875+02:00", "EventTime": "2023-10-30T14:04:13.789895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CD32Wg1BxSazCuHHI3"]} -{"Format": "IDEA0", "ID": "0c8f4e41-03fc-49a3-9e91-2b04440c102c", "DetectTime": "2023-10-30T14:04:13.825571+02:00", "EventTime": "2023-10-30T14:04:13.825592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["Cm4Gkw3RuguYQ7kiF8"]} -{"Format": "Json", "ID": "0c8f4e41-03fc-49a3-9e91-2b04440c102c", "DetectTime": "2023-10-30T14:04:13.825571+02:00", "EventTime": "2023-10-30T14:04:13.825592+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:34:05.160959+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:13.913829)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7cd7d6ea-03b4-4870-93fb-78ddd3f07a56", "DetectTime": "2023-10-30T14:04:13.920879+02:00", "EventTime": "2023-10-30T14:04:13.920903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CIdtkr4VKiVkybYAvk"]} -{"Format": "IDEA0", "ID": "f15772aa-bfcb-4b67-9f08-a005bd1593b3", "DetectTime": "2023-10-30T14:04:13.955325+02:00", "EventTime": "2023-10-30T14:04:13.955343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C6snPh3Ffmjw2xY3A1"]} -{"Format": "IDEA0", "ID": "050da8e0-831b-44fe-a011-29287a434671", "DetectTime": "2023-10-30T14:04:13.985351+02:00", "EventTime": "2023-10-30T14:04:13.985372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CSYpnCdH50Qfe1Oed"]} -{"Format": "IDEA0", "ID": "e7f9615b-7eef-4228-9ce7-e76c5dc5a36f", "DetectTime": "2023-10-30T14:04:14.020096+02:00", "EventTime": "2023-10-30T14:04:14.020113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CcydrW3jwNTrOU87ng"]} -{"Format": "IDEA0", "ID": "e63ad37f-16f6-4829-ab02-7ef1022fd6de", "DetectTime": "2023-10-30T14:04:14.051835+02:00", "EventTime": "2023-10-30T14:04:14.051858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["Ctv9gl4gxtWtyM9ai7"]} -{"Format": "IDEA0", "ID": "87eb7ca2-8ff8-4f9f-8c42-ed6e1c7c0c23", "DetectTime": "2023-10-30T14:04:14.081203+02:00", "EventTime": "2023-10-30T14:04:14.081224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CXyreI1hnlWrF6X6Tk"]} -{"Format": "IDEA0", "ID": "3b05ce87-6ce4-4e7b-a075-16462214be67", "DetectTime": "2023-10-30T14:04:14.109427+02:00", "EventTime": "2023-10-30T14:04:14.109445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CvR5ow1fqU2PzKwqYe"]} -{"Format": "IDEA0", "ID": "ddd95975-2a1f-4efa-b5fb-7fdc577c99d1", "DetectTime": "2023-10-30T14:04:14.140783+02:00", "EventTime": "2023-10-30T14:04:14.140837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. ", "ContentType": "text/plain"}], "uids": ["CiZVMn2WUzYUIbN6Bi"]} -{"Format": "IDEA0", "ID": "1c24b3f7-2f49-49dc-b27e-bef6c72a4efb", "DetectTime": "2023-10-30T14:04:14.190319+02:00", "EventTime": "2023-10-30T14:04:14.190340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CpDSxl4njTixScfmP8"]} -{"Format": "IDEA0", "ID": "db7903d9-eaca-482d-8589-b1da857780ed", "DetectTime": "2023-10-30T14:04:14.223779+02:00", "EventTime": "2023-10-30T14:04:14.223805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["ChJKzZ2iOx4QJZBdlg"]} -{"Format": "IDEA0", "ID": "032e0c95-0902-4fbd-8301-de3803bd48e7", "DetectTime": "2023-10-30T14:04:14.256116+02:00", "EventTime": "2023-10-30T14:04:14.256162+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXtI4T3MtntZv5rzW5"]} -{"Format": "IDEA0", "ID": "fd03a24b-02c7-4d1d-9d5b-892803054ab9", "DetectTime": "2023-10-30T14:04:14.265590+02:00", "EventTime": "2023-10-30T14:04:14.265610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CCmGtqTJ0ZKrvpoxb"]} -{"Format": "IDEA0", "ID": "be73e1fb-a9af-4282-87e4-475070925ae2", "DetectTime": "2023-10-30T14:04:14.297674+02:00", "EventTime": "2023-10-30T14:04:14.297694+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGyauG4kUH9aHzP8xe"]} -{"Format": "IDEA0", "ID": "e2405337-f226-4e5c-b358-4e825759ef3e", "DetectTime": "2023-10-30T14:04:14.307729+02:00", "EventTime": "2023-10-30T14:04:14.307774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CbSvFA1N9jl3IAgbdh"]} -{"Format": "IDEA0", "ID": "4995d258-c37d-40e9-a503-c7a613fbaba5", "DetectTime": "2023-10-30T14:04:14.343820+02:00", "EventTime": "2023-10-30T14:04:14.343840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cy12KT2z2KRuxsujji", "Ce6eV03ydr8xtLNMy9", "CLEria3GGlIyNRmqhb", "CXtI4T3MtntZv5rzW5"]} -{"Format": "IDEA0", "ID": "c909f248-9f04-41a9-bb0d-c9c5131886ac", "DetectTime": "2023-10-30T14:04:14.356159+02:00", "EventTime": "2023-10-30T14:04:14.356177+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CLEria3GGlIyNRmqhb"]} -{"Format": "IDEA0", "ID": "5ac5f789-4fbe-429b-9d98-345d02d66276", "DetectTime": "2023-10-30T14:04:14.365635+02:00", "EventTime": "2023-10-30T14:04:14.365656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CI2h1l1tI1cLLjCuLk"]} -{"Format": "IDEA0", "ID": "e3eb0ad8-0862-4c86-90ae-e81400ddfe2f", "DetectTime": "2023-10-30T14:04:14.395593+02:00", "EventTime": "2023-10-30T14:04:14.395618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CpIZzZf1hyY7owALi"]} -{"Format": "IDEA0", "ID": "54e1f9ab-4a6d-40c5-95bf-8f22fa74abb4", "DetectTime": "2023-10-30T14:04:14.425704+02:00", "EventTime": "2023-10-30T14:04:14.425721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["Ck6pNp3uXkH8cAzp58"]} -{"Format": "IDEA0", "ID": "79c32e03-c0b8-49bb-8b83-02916ea76ed9", "DetectTime": "2023-10-30T14:04:14.456976+02:00", "EventTime": "2023-10-30T14:04:14.457002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CFwzSq40XUloA3dUx6"]} -{"Format": "IDEA0", "ID": "008525b8-fd8e-4fc8-ae05-b2ad28923926", "DetectTime": "2023-10-30T14:04:14.497891+02:00", "EventTime": "2023-10-30T14:04:14.497918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CLCxuB2D4Iab7LSJU8"]} -{"Format": "IDEA0", "ID": "991039cc-eb35-4ca8-9cb3-c473e78217e3", "DetectTime": "2023-10-30T14:04:14.527255+02:00", "EventTime": "2023-10-30T14:04:14.527288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["CvCdN42UylBN4Razzl"]} -{"Format": "IDEA0", "ID": "4cadaf34-c0a9-4396-be97-3621a7cf3e6b", "DetectTime": "2023-10-30T14:04:14.563099+02:00", "EventTime": "2023-10-30T14:04:14.563118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CN58V8TeZfAG8Amm"]} -{"Format": "IDEA0", "ID": "d7b3cf26-5ff0-41fd-837e-f0751132a937", "DetectTime": "2023-10-30T14:04:14.595076+02:00", "EventTime": "2023-10-30T14:04:14.595094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CileaO1Hw6mwiBioYc"]} -{"Format": "IDEA0", "ID": "9f8f8c08-43fa-4849-a447-c2338483dd5e", "DetectTime": "2023-10-30T14:04:14.625892+02:00", "EventTime": "2023-10-30T14:04:14.625911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CVMXcD418TGDZ9qrmi"]} -{"Format": "IDEA0", "ID": "a5b86fab-cbb5-43f4-88f5-8e12ce6d12e7", "DetectTime": "2023-10-30T14:04:14.656564+02:00", "EventTime": "2023-10-30T14:04:14.656584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["Ch4cQZ2XY1Egojwlih"]} -{"Format": "IDEA0", "ID": "8a0876a6-fae7-4640-b8e7-04c09d1d33cf", "DetectTime": "2023-10-30T14:04:14.689620+02:00", "EventTime": "2023-10-30T14:04:14.689722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["CImReG1DusNjvfnF8d"]} -{"Format": "IDEA0", "ID": "febc98e3-5cd6-4959-adc3-c188b857fcc8", "DetectTime": "2023-10-30T14:04:14.718703+02:00", "EventTime": "2023-10-30T14:04:14.718722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["CS1NPH1pQDbafArj68"]} -{"Format": "IDEA0", "ID": "360fbf79-6403-4bb8-9cee-6f9c907b6507", "DetectTime": "2023-10-30T14:04:14.746706+02:00", "EventTime": "2023-10-30T14:04:14.746722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CI5GMK2vGCxWfn5VF"]} -{"Format": "IDEA0", "ID": "8f71a7df-31a3-41ec-b0b1-013e5e2551c0", "DetectTime": "2023-10-30T14:04:14.778855+02:00", "EventTime": "2023-10-30T14:04:14.778873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["Cxon5D1r9iQetv5i07"]} -{"Format": "IDEA0", "ID": "e9fe908a-52f2-4571-880e-9f390933e451", "DetectTime": "2023-10-30T14:04:14.825818+02:00", "EventTime": "2023-10-30T14:04:14.825841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Clk1gz3xtAJTivoxVh"]} -{"Format": "IDEA0", "ID": "8726d2ca-10dd-46ee-ae06-1f5cc7f92bb2", "DetectTime": "2023-10-30T14:04:14.854977+02:00", "EventTime": "2023-10-30T14:04:14.855000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CpUPQK3TNgIWyynBVk"]} -{"Format": "IDEA0", "ID": "3446e2c5-754c-4786-994c-665df958754b", "DetectTime": "2023-10-30T14:04:14.905805+02:00", "EventTime": "2023-10-30T14:04:14.905835+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CsH0Ni1BnAw4F5I44k"]} -{"Format": "IDEA0", "ID": "90ec7b12-18f4-49e8-b2c2-b200a24ad726", "DetectTime": "2023-10-30T14:04:14.916381+02:00", "EventTime": "2023-10-30T14:04:14.916397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CiwLJO1jOnGvuuKF8k"]} -{"Format": "IDEA0", "ID": "71120d88-a17e-4dd1-8c0a-6721ae9d232f", "DetectTime": "2023-10-30T14:04:14.957343+02:00", "EventTime": "2023-10-30T14:04:14.957361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CDkfhA1BakqQNVKNli"]} -{"Format": "IDEA0", "ID": "9aecdf41-9655-4411-962f-f898b99bb922", "DetectTime": "2023-10-30T14:04:15.009283+02:00", "EventTime": "2023-10-30T14:04:15.009299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.76.136 ", "ContentType": "text/plain"}], "uids": ["Cr7lQh2vbw5A7mVSsj"]} -{"Format": "IDEA0", "ID": "86820401-e055-45d0-97bc-e87dbf43c064", "DetectTime": "2023-10-30T14:04:15.054301+02:00", "EventTime": "2023-10-30T14:04:15.054332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CGWtxt4zREAruyGmR7"]} -{"Format": "IDEA0", "ID": "d2b4665e-585b-4233-9e72-7d9510d984f1", "DetectTime": "2023-10-30T14:04:15.090311+02:00", "EventTime": "2023-10-30T14:04:15.090332+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cr7wYE4UhWVPtNa5Cg"]} -{"Format": "IDEA0", "ID": "ccf3d6e2-7644-4a42-ae4a-7c60929ce35e", "DetectTime": "2023-10-30T14:04:15.098290+02:00", "EventTime": "2023-10-30T14:04:15.098309+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChuYp71KuEhq6iBye3"]} -{"Format": "IDEA0", "ID": "28581d40-2455-4ac4-83d9-abf2df32598e", "DetectTime": "2023-10-30T14:04:15.159386+02:00", "EventTime": "2023-10-30T14:04:15.159420+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ca2AGf1eEuL3UDvb6e"]} -{"Format": "IDEA0", "ID": "5935e962-ff25-4599-af17-e090032fe393", "DetectTime": "2023-10-30T14:04:15.168096+02:00", "EventTime": "2023-10-30T14:04:15.168120+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeyhTB4f1aONk57m3l"]} -{"Format": "IDEA0", "ID": "74227335-d853-4634-a2af-775c34bf9611", "DetectTime": "2023-10-30T14:04:15.175726+02:00", "EventTime": "2023-10-30T14:04:15.175746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEPl3P2NVX7XLCdfG2"]} -{"Format": "IDEA0", "ID": "ad7d89c8-d242-4831-a646-198396f07239", "DetectTime": "2023-10-30T14:04:15.214268+02:00", "EventTime": "2023-10-30T14:04:15.214289+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cy8uki4ADDyYb6lZb1"]} -{"Format": "IDEA0", "ID": "c916a8e9-0121-4fae-b5c0-58237c2c2622", "DetectTime": "2023-10-30T14:04:15.222102+02:00", "EventTime": "2023-10-30T14:04:15.222130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Ck2h0R2EvdElDdNii1"]} -{"Format": "IDEA0", "ID": "945a58cc-0fce-4f14-9b5a-17fd4de232ca", "DetectTime": "2023-10-30T14:04:15.260821+02:00", "EventTime": "2023-10-30T14:04:15.260839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CzVFrp1RWT8vhISuWk"]} -{"Format": "IDEA0", "ID": "75254d35-2966-455c-a76e-9f5ee0b51d11", "DetectTime": "2023-10-30T14:04:15.300109+02:00", "EventTime": "2023-10-30T14:04:15.300130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["ClhCOt3OLHSirImFWe"]} -{"Format": "IDEA0", "ID": "97bd5351-69dd-4b4f-9a7d-bf01a1a2c589", "DetectTime": "2023-10-30T14:04:15.340260+02:00", "EventTime": "2023-10-30T14:04:15.340283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["C6gWhA2mJYnB2vZ043"]} -{"Format": "IDEA0", "ID": "aa33d806-f9ad-481f-ad16-8078c3bb0e74", "DetectTime": "2023-10-30T14:04:15.379590+02:00", "EventTime": "2023-10-30T14:04:15.379605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CDe2FE4LjeWXevqfr6"]} -{"Format": "IDEA0", "ID": "76ac5087-b366-426a-b8dd-007935725b21", "DetectTime": "2023-10-30T14:04:15.416930+02:00", "EventTime": "2023-10-30T14:04:15.416950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CzxW6l1NcofQkfvIc6"]} -{"Format": "IDEA0", "ID": "58c33a17-5dea-4219-aae8-c6f8f5e1f3e4", "DetectTime": "2023-10-30T14:04:15.461239+02:00", "EventTime": "2023-10-30T14:04:15.461260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CqNzFr45TYZQWb9W4h"]} -{"Format": "IDEA0", "ID": "80efc902-70d4-4552-bfe7-a94214bfd58e", "DetectTime": "2023-10-30T14:04:15.508845+02:00", "EventTime": "2023-10-30T14:04:15.508857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CoLygM3XzdR0PWfIKf"]} -{"Format": "IDEA0", "ID": "4e505725-9322-4d3d-a693-ad3449b4ff67", "DetectTime": "2023-10-30T14:04:15.552365+02:00", "EventTime": "2023-10-30T14:04:15.552394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CnFEqy1iQm03mnB1Eb"]} -{"Format": "IDEA0", "ID": "9445388a-896e-499f-aa06-bce3f7a82f63", "DetectTime": "2023-10-30T14:04:15.590505+02:00", "EventTime": "2023-10-30T14:04:15.590533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CH5Zy32HRNa22W5mZ"]} -{"Format": "IDEA0", "ID": "7f4c1c50-c186-4f24-8e93-08bec33f5864", "DetectTime": "2023-10-30T14:04:15.632014+02:00", "EventTime": "2023-10-30T14:04:15.632286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CUMhsV4C66FI5b2Vg"]} -{"Format": "IDEA0", "ID": "5c24d517-ce59-44d1-a58e-0741ff81d440", "DetectTime": "2023-10-30T14:04:15.670435+02:00", "EventTime": "2023-10-30T14:04:15.670452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CMFTHs25a509OOe3K8"]} -{"Format": "IDEA0", "ID": "77c99bce-31a7-4971-a46b-d3bd93c93505", "DetectTime": "2023-10-30T14:04:15.709079+02:00", "EventTime": "2023-10-30T14:04:15.709101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CDNxYOaP0vwOend"]} -{"Format": "IDEA0", "ID": "c4dacf3b-5fda-4477-ac53-3633f23651a1", "DetectTime": "2023-10-30T14:04:15.835738+02:00", "EventTime": "2023-10-30T14:04:15.835760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CfhjqS2VplfR73qyGc"]} -{"Format": "IDEA0", "ID": "3dd237e6-7002-4510-a0ac-2944ca6a7f90", "DetectTime": "2023-10-30T14:04:15.881869+02:00", "EventTime": "2023-10-30T14:04:15.881885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["C6IJ9X2e8U2kxEjjNj"]} -{"Format": "IDEA0", "ID": "9a0ab866-52f4-4cf5-b837-87c297c6faca", "DetectTime": "2023-10-30T14:04:15.929928+02:00", "EventTime": "2023-10-30T14:04:15.929949+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"], "Hostname": ["178-223-239-27.dynamic.mtsdoo.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 178.223.239.27 from 10.0.2.19. blacklisted IP AS: MTSDOO-AS, RS AS202441 rDNS: 178-223-239-27.dynamic.mtsdoo.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C6jd4ibo89oTj8sNh"]} -{"Format": "IDEA0", "ID": "68353ba6-516a-49a5-a137-9feb8a5eea3b", "DetectTime": "2023-10-30T14:04:16.000322+02:00", "EventTime": "2023-10-30T14:04:16.000340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["CH7gZj25WTcDc3XTu7"]} -{"Format": "IDEA0", "ID": "ea6ca5c2-cd2a-434d-889d-0b536b7d0567", "DetectTime": "2023-10-30T14:04:16.054949+02:00", "EventTime": "2023-10-30T14:04:16.054976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.152.83.86 ", "ContentType": "text/plain"}], "uids": ["CSStHP3TuMD4tmzHig"]} -{"Format": "IDEA0", "ID": "80937c5a-06b4-4f73-ab18-d4202fe255ca", "DetectTime": "2023-10-30T14:04:16.101632+02:00", "EventTime": "2023-10-30T14:04:16.101648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["ChT9F92YkW1qlYWykl"]} -{"Format": "IDEA0", "ID": "b81635e5-aa89-412a-9793-bc90fee6e7ba", "DetectTime": "2023-10-30T14:04:16.142723+02:00", "EventTime": "2023-10-30T14:04:16.142773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C6n1X62Cn4cmRDdhK9"]} -{"Format": "IDEA0", "ID": "2f3596cf-55f0-4239-8f7c-7e9bcf02e81b", "DetectTime": "2023-10-30T14:04:16.190454+02:00", "EventTime": "2023-10-30T14:04:16.190473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["CqiW8Q3KauSNgoMyyh"]} -{"Format": "IDEA0", "ID": "cbe2da4f-1747-42a1-b1b6-d08998a0b6a5", "DetectTime": "2023-10-30T14:04:16.238151+02:00", "EventTime": "2023-10-30T14:04:16.238168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C8WIaq2zwZAfRQw5ca"]} -{"Format": "IDEA0", "ID": "88815c43-9a91-4550-be54-ec3805dab773", "DetectTime": "2023-10-30T14:04:16.283482+02:00", "EventTime": "2023-10-30T14:04:16.283502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.55.62.226 ", "ContentType": "text/plain"}], "uids": ["Cjex9o2rqFfPcLNwlj"]} -{"Format": "IDEA0", "ID": "9862df84-c285-474c-aede-2273866e7288", "DetectTime": "2023-10-30T14:04:16.332003+02:00", "EventTime": "2023-10-30T14:04:16.332023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLdt6037bt78DOpsF9"]} -{"Format": "IDEA0", "ID": "652591bc-3326-4ec3-a804-2037bc79f360", "DetectTime": "2023-10-30T14:04:16.378540+02:00", "EventTime": "2023-10-30T14:04:16.378559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CVgiUN36G6mpwvQVr8"]} -{"Format": "IDEA0", "ID": "a27d5a44-a7ca-4c36-a44b-414c11468ca3", "DetectTime": "2023-10-30T14:04:16.428639+02:00", "EventTime": "2023-10-30T14:04:16.428663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["ChSo6517fAyWePfPFc"]} -{"Format": "IDEA0", "ID": "95238756-bcad-4e84-bc7d-33413bf67dbd", "DetectTime": "2023-10-30T14:04:16.476129+02:00", "EventTime": "2023-10-30T14:04:16.476155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C0QYeb2QLk15S7RmVg"]} -{"Format": "IDEA0", "ID": "dd00c909-3eb5-4faf-a770-7567bc70e722", "DetectTime": "2023-10-30T14:04:16.526023+02:00", "EventTime": "2023-10-30T14:04:16.526045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CUGgkH3XrNXdhjYwe1"]} -{"Format": "IDEA0", "ID": "e3ae4c85-a7c4-4156-8bea-8e313081764b", "DetectTime": "2023-10-30T14:04:16.573177+02:00", "EventTime": "2023-10-30T14:04:16.573199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CbcIdY37YuSjMQZIJ3"]} -{"Format": "IDEA0", "ID": "b3589a45-4bc2-447a-b790-99419c834d67", "DetectTime": "2023-10-30T14:04:16.622566+02:00", "EventTime": "2023-10-30T14:04:16.622585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CgU6BC2liv0MxNneqa"]} -{"Format": "IDEA0", "ID": "51433979-8437-45a1-9647-3858ba303fa8", "DetectTime": "2023-10-30T14:04:16.672314+02:00", "EventTime": "2023-10-30T14:04:16.672333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CZ2qmL1ogj1FzRCoO"]} -{"Format": "IDEA0", "ID": "73b0e1b4-5c45-4783-9b92-4bc9cadb045b", "DetectTime": "2023-10-30T14:04:16.716766+02:00", "EventTime": "2023-10-30T14:04:16.716787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CPRKbT2SFA3mL5Okd3"]} -{"Format": "IDEA0", "ID": "bea1bb3d-70cd-4b6e-81e2-9e2468c70d92", "DetectTime": "2023-10-30T14:04:16.762483+02:00", "EventTime": "2023-10-30T14:04:16.762501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["C0SImc4QNzOEbQUEAl"]} -{"Format": "IDEA0", "ID": "d625742d-5bd9-45b8-894d-89acb9bb3204", "DetectTime": "2023-10-30T14:04:16.809443+02:00", "EventTime": "2023-10-30T14:04:16.809462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CjBnQm3ylUyYdtTCX3"]} -{"Format": "IDEA0", "ID": "eff71f86-a4a2-4e45-a576-6d2b280854ce", "DetectTime": "2023-10-30T14:04:16.861736+02:00", "EventTime": "2023-10-30T14:04:16.861754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CRtUDX2Qk17T6R1ckj"]} -{"Format": "IDEA0", "ID": "0419d63d-c560-4066-a9d5-4b525b972581", "DetectTime": "2023-10-30T14:04:16.909909+02:00", "EventTime": "2023-10-30T14:04:16.909934+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cxi3Kw4OpkL9E4q6L1"]} -{"Format": "IDEA0", "ID": "240e0573-122d-481c-a0ca-15cea28d49d8", "DetectTime": "2023-10-30T14:04:16.928290+02:00", "EventTime": "2023-10-30T14:04:16.928317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CqkO383rkYJiU9xX7e"]} -{"Format": "IDEA0", "ID": "67c4be0b-f978-40e5-96f5-e9a3716f3fa5", "DetectTime": "2023-10-30T14:04:16.975504+02:00", "EventTime": "2023-10-30T14:04:16.975536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cplip32WhRgDp7xkjb"]} -{"Format": "IDEA0", "ID": "fcc2ff48-28f1-486f-8ca2-310f393a73e2", "DetectTime": "2023-10-30T14:04:16.996480+02:00", "EventTime": "2023-10-30T14:04:16.996506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CeyhTB4f1aONk57m3l", "CdnWRl3pKNsq4g3xJ2", "Cxi3Kw4OpkL9E4q6L1", "Cr7wYE4UhWVPtNa5Cg"]} -{"Format": "IDEA0", "ID": "a8375c6b-f068-4bc3-a147-ec51c25a59c4", "DetectTime": "2023-10-30T14:04:17.014008+02:00", "EventTime": "2023-10-30T14:04:17.014035+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdnWRl3pKNsq4g3xJ2"]} -{"Format": "IDEA0", "ID": "65708a48-b943-487a-acf8-da3b690f88c2", "DetectTime": "2023-10-30T14:04:17.037336+02:00", "EventTime": "2023-10-30T14:04:17.037360+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cxw2I71PPYQcmaJgGe"]} -{"Format": "IDEA0", "ID": "1eeac2db-0285-46fc-9f56-44380955e338", "DetectTime": "2023-10-30T14:04:17.057080+02:00", "EventTime": "2023-10-30T14:04:17.057108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbE1NS1JqIgfEdmVGa"]} -{"Format": "IDEA0", "ID": "d323c11d-37e1-4eb3-9edf-446841db74c4", "DetectTime": "2023-10-30T14:04:17.078487+02:00", "EventTime": "2023-10-30T14:04:17.078507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CuDTIX3jesrwAjprZ3"]} -{"Format": "IDEA0", "ID": "30d1d9ce-d9f3-4384-a30e-2f40124d7ac1", "DetectTime": "2023-10-30T14:04:17.123140+02:00", "EventTime": "2023-10-30T14:04:17.123158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CsxSyp2bu1WQZv1crl"]} -{"Format": "IDEA0", "ID": "1cc45798-7701-4ae3-92b7-88d090fa273d", "DetectTime": "2023-10-30T14:04:17.172413+02:00", "EventTime": "2023-10-30T14:04:17.172442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CSThDv4yhew51By5D9"]} -{"Format": "IDEA0", "ID": "fd45fc42-a5b4-4596-b110-eaf6ec59b268", "DetectTime": "2023-10-30T14:04:17.221172+02:00", "EventTime": "2023-10-30T14:04:17.221192+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cgyty31gNcghr1lli4"]} -{"Format": "IDEA0", "ID": "029b1ccc-c6d0-49f7-9d8d-5bc014107c3f", "DetectTime": "2023-10-30T14:04:17.240816+02:00", "EventTime": "2023-10-30T14:04:17.240834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["C2ASNF1ufCqflxcxrl"]} -{"Format": "IDEA0", "ID": "3783ede3-3a13-4f37-896a-068ad0eb29a1", "DetectTime": "2023-10-30T14:04:17.291990+02:00", "EventTime": "2023-10-30T14:04:17.292011+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClHhKIYjjKyTuLYg3"]} -{"Format": "IDEA0", "ID": "aa12b91b-bbf2-4b9f-9d81-d43ca763c4b8", "DetectTime": "2023-10-30T14:04:17.313623+02:00", "EventTime": "2023-10-30T14:04:17.313652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.250.244.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.250.244.160 ", "ContentType": "text/plain"}], "uids": ["CTbxmA4mMlxp89DtR9"]} -{"Format": "IDEA0", "ID": "7a2b6367-08fe-452a-87f8-e442d09b2147", "DetectTime": "2023-10-30T14:04:17.365734+02:00", "EventTime": "2023-10-30T14:04:17.365753+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5sgQnLPWGqiXPDHd"]} -{"Format": "IDEA0", "ID": "1a19655e-2a55-462f-a648-173d309eb235", "DetectTime": "2023-10-30T14:04:17.389556+02:00", "EventTime": "2023-10-30T14:04:17.389706+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C86IKk3uCcfsCEjoNl"]} -{"Format": "IDEA0", "ID": "211a2a59-42d6-4f3e-a28b-21384c24ef02", "DetectTime": "2023-10-30T14:04:17.409285+02:00", "EventTime": "2023-10-30T14:04:17.409305+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Csahgo2UW67SVONosa"]} -{"Format": "IDEA0", "ID": "bfb219ca-4e42-45e6-a7d7-fca525dffd57", "DetectTime": "2023-10-30T14:04:17.427657+02:00", "EventTime": "2023-10-30T14:04:17.427675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ccn1Hw1NbJjFcCKDRa"]} -{"Format": "IDEA0", "ID": "87e76213-e799-4ff2-94ca-9146b6d61b02", "DetectTime": "2023-10-30T14:04:17.475854+02:00", "EventTime": "2023-10-30T14:04:17.475872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C7edJx3BDsZiZHCVtf", "CbE1NS1JqIgfEdmVGa", "C86IKk3uCcfsCEjoNl", "ClHhKIYjjKyTuLYg3"]} -{"Format": "IDEA0", "ID": "1b2787d2-86d3-4627-9836-65f7f33270ef", "DetectTime": "2023-10-30T14:04:17.495623+02:00", "EventTime": "2023-10-30T14:04:17.495646+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7edJx3BDsZiZHCVtf"]} -{"Format": "IDEA0", "ID": "8f696c71-2af2-44ae-9fe5-20332ddc327b", "DetectTime": "2023-10-30T14:04:17.517571+02:00", "EventTime": "2023-10-30T14:04:17.517591+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZ83Wp2NuGPedaytki"]} -{"Format": "IDEA0", "ID": "11c37d13-ac3f-4f96-b972-378b694b40b7", "DetectTime": "2023-10-30T14:04:17.540225+02:00", "EventTime": "2023-10-30T14:04:17.540247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.9.241.203"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.9.241.203 ", "ContentType": "text/plain"}], "uids": ["CLWQj5AB5CIOwlxS6"]} -{"Format": "IDEA0", "ID": "05379522-335f-4951-aff6-a6b5d9a814cc", "DetectTime": "2023-10-30T14:04:17.588109+02:00", "EventTime": "2023-10-30T14:04:17.588127+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4HUuW3w1VrdQHJUM1"]} -{"Format": "IDEA0", "ID": "d082578d-116b-4d52-9b00-45e4505b12f3", "DetectTime": "2023-10-30T14:04:17.604482+02:00", "EventTime": "2023-10-30T14:04:17.604501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.96.182.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.96.182.207 ", "ContentType": "text/plain"}], "uids": ["C1SPDX3XhKQYtLMbt3"]} -{"Format": "IDEA0", "ID": "bd6f6a9a-11dc-4517-8343-3c71a400ebbf", "DetectTime": "2023-10-30T14:04:17.642132+02:00", "EventTime": "2023-10-30T14:04:17.642160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["CRpX1j3fIngdMDDoK5"]} -{"Format": "Json", "ID": "bd6f6a9a-11dc-4517-8343-3c71a400ebbf", "DetectTime": "2023-10-30T14:04:17.642132+02:00", "EventTime": "2023-10-30T14:04:17.642160+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T21:34:06.729814+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2023/10/30 14:04:17.714959)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa8f8313-5698-4c99-b242-3a059533181a", "DetectTime": "2023-10-30T14:04:17.721359+02:00", "EventTime": "2023-10-30T14:04:17.721378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.192.108.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.192.108.64 ", "ContentType": "text/plain"}], "uids": ["CTOfXl3bFAtA0xRkPh"]} -{"Format": "IDEA0", "ID": "5c773d94-c583-413a-853d-2eee5037dc37", "DetectTime": "2023-10-30T14:04:17.768045+02:00", "EventTime": "2023-10-30T14:04:17.768065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.152.71.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.152.71.4 ", "ContentType": "text/plain"}], "uids": ["CXB2x32VoTLKEfO5Ak"]} -{"Format": "IDEA0", "ID": "fdba9e7d-d197-4608-880e-ab7abe478c74", "DetectTime": "2023-10-30T14:04:17.812574+02:00", "EventTime": "2023-10-30T14:04:17.812593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CV8x8gE7krRPUY4Vl"]} -{"Format": "IDEA0", "ID": "25ca0f89-7817-4655-8530-42c2038a03b6", "DetectTime": "2023-10-30T14:04:17.852155+02:00", "EventTime": "2023-10-30T14:04:17.852178+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBmfqM3SF5eYv0hxx"]} -{"Format": "IDEA0", "ID": "39750960-eea1-4dc1-b639-ebac371ea479", "DetectTime": "2023-10-30T14:04:17.867998+02:00", "EventTime": "2023-10-30T14:04:17.868025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.39.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.164.39.9 ", "ContentType": "text/plain"}], "uids": ["CSxeR1284TTe9nC7El"]} -{"Format": "IDEA0", "ID": "8b3bd357-c4d3-47e0-89e3-27da693e65eb", "DetectTime": "2023-10-30T14:04:17.905271+02:00", "EventTime": "2023-10-30T14:04:17.905300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.225.178.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.225.178.218 ", "ContentType": "text/plain"}], "uids": ["CdmskJsHg9cAWN3s1"]} -{"Format": "IDEA0", "ID": "56da8545-c958-4862-9c21-90dde280ca6c", "DetectTime": "2023-10-30T14:04:17.946702+02:00", "EventTime": "2023-10-30T14:04:17.946721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.181.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.181.162 ", "ContentType": "text/plain"}], "uids": ["CXWsAq3Fpq8RjIcG3a"]} -{"Format": "IDEA0", "ID": "443bb335-5bf8-4d32-a327-6116fd4dc6a2", "DetectTime": "2023-10-30T14:04:17.989390+02:00", "EventTime": "2023-10-30T14:04:17.989407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.64.104.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.64.104.6 ", "ContentType": "text/plain"}], "uids": ["C1dNDqL61gijqtnaj"]} -{"Format": "IDEA0", "ID": "09c63d93-997c-442a-814c-dbd9acaaa59f", "DetectTime": "2023-10-30T14:04:18.028848+02:00", "EventTime": "2023-10-30T14:04:18.028873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.198.227.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.198.227.169 ", "ContentType": "text/plain"}], "uids": ["C6CleO196bDeiC21Sf"]} -{"Format": "IDEA0", "ID": "726960fa-e4c3-4cab-a673-2c9a67896c23", "DetectTime": "2023-10-30T14:04:18.070962+02:00", "EventTime": "2023-10-30T14:04:18.070983+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSRu4E1yDrlILNmKu5"]} -{"Format": "IDEA0", "ID": "2b0cf3eb-4a20-4571-b520-e900c83e0e0f", "DetectTime": "2023-10-30T14:04:18.087728+02:00", "EventTime": "2023-10-30T14:04:18.087748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.15.18.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.15.18.13 ", "ContentType": "text/plain"}], "uids": ["CC7nepFOPIIHdsVq4"]} -{"Format": "IDEA0", "ID": "31b85da1-dcc0-4619-802b-bd38e666b4b5", "DetectTime": "2023-10-30T14:04:18.126104+02:00", "EventTime": "2023-10-30T14:04:18.126126+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuVbBuYYjz6Nt4Z7f"]} -{"Format": "IDEA0", "ID": "fd354300-7cd2-4de6-bae1-787eaa8384ed", "DetectTime": "2023-10-30T14:04:18.141181+02:00", "EventTime": "2023-10-30T14:04:18.141200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CR9THB1Xrrwo9P8hd4"]} -{"Format": "IDEA0", "ID": "eb482c3f-4271-4360-84bf-b65164fcb06f", "DetectTime": "2023-10-30T14:04:18.180910+02:00", "EventTime": "2023-10-30T14:04:18.180934+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpmAKLZ3PYWq56FCa"]} -{"Format": "IDEA0", "ID": "290ac524-6f63-4d61-9348-c43ffc4cb5f8", "DetectTime": "2023-10-30T14:04:18.197579+02:00", "EventTime": "2023-10-30T14:04:18.197599+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGJSkt1UrXthd8pJ64"]} -{"Format": "IDEA0", "ID": "e3b0b54f-2d33-4547-9cfa-6edd1af99c0e", "DetectTime": "2023-10-30T14:04:18.213362+02:00", "EventTime": "2023-10-30T14:04:18.213379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["8.18.2.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 8.18.2.254 ", "ContentType": "text/plain"}], "uids": ["Cvpsnem5djcexIzX5"]} -{"Format": "IDEA0", "ID": "f7e401ce-f8f5-4618-acf8-98956a1d07b9", "DetectTime": "2023-10-30T14:04:18.253314+02:00", "EventTime": "2023-10-30T14:04:18.253339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.194.115.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.194.115.207 ", "ContentType": "text/plain"}], "uids": ["C24DKi4JrmtDul0h7j"]} -{"Format": "IDEA0", "ID": "e9176eb6-7736-49b3-9030-f560670f3e54", "DetectTime": "2023-10-30T14:04:18.293004+02:00", "EventTime": "2023-10-30T14:04:18.293033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CzqKkNyR7oivNo1wh", "C4HUuW3w1VrdQHJUM1", "CSRu4E1yDrlILNmKu5", "CpmAKLZ3PYWq56FCa"]} -{"Format": "IDEA0", "ID": "7cf0bbfb-c99f-4b7d-8f30-1e52c470cab9", "DetectTime": "2023-10-30T14:04:18.311391+02:00", "EventTime": "2023-10-30T14:04:18.311419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.216.50.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.216.50.15 ", "ContentType": "text/plain"}], "uids": ["CtuuahHgHiv6eDeWk"]} -{"Format": "IDEA0", "ID": "cb44824d-90d9-4cdb-8323-842c56c30bea", "DetectTime": "2023-10-30T14:04:18.351613+02:00", "EventTime": "2023-10-30T14:04:18.351630+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzqKkNyR7oivNo1wh"]} -{"Format": "IDEA0", "ID": "01aa7e5b-c7be-45f2-8615-abc0ca628d07", "DetectTime": "2023-10-30T14:04:18.369800+02:00", "EventTime": "2023-10-30T14:04:18.369826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.110.95.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.110.95.186 ", "ContentType": "text/plain"}], "uids": ["Cl1THD4lpI0AhHM0Zg"]} -{"Format": "IDEA0", "ID": "86b875cc-5325-494d-a5ca-b0d512abf94a", "DetectTime": "2023-10-30T14:04:18.410143+02:00", "EventTime": "2023-10-30T14:04:18.410161+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHqASFv7zVXZ0bell"]} -{"Format": "IDEA0", "ID": "8d913326-8d9b-48b6-8574-a4d0915bfe86", "DetectTime": "2023-10-30T14:04:18.428642+02:00", "EventTime": "2023-10-30T14:04:18.428659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.251.230.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.251.230.161 ", "ContentType": "text/plain"}], "uids": ["CgpiPO2VFK4ks3OYf"]} -{"Format": "IDEA0", "ID": "eabc5b46-6eb0-4233-af34-1daa0d74b8ee", "DetectTime": "2023-10-30T14:04:18.469789+02:00", "EventTime": "2023-10-30T14:04:18.469812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.44.21.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.44.21.6 ", "ContentType": "text/plain"}], "uids": ["CNypmB3FntODMEc0Kj"]} -{"Format": "IDEA0", "ID": "552fb8a0-427b-4af3-855e-134cd765251b", "DetectTime": "2023-10-30T14:04:18.513894+02:00", "EventTime": "2023-10-30T14:04:18.513913+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CB7x694qdr0SHrt9tb"]} -{"Format": "IDEA0", "ID": "c194c4c4-7c7c-46ca-81c0-6ba39b6f9ba8", "DetectTime": "2023-10-30T14:04:18.533290+02:00", "EventTime": "2023-10-30T14:04:18.533311+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CGjnk73ptuHbv9w5n1"]} -{"Format": "IDEA0", "ID": "3826e0b0-4d07-4ed5-9ad9-bf71395dabae", "DetectTime": "2023-10-30T14:04:18.551099+02:00", "EventTime": "2023-10-30T14:04:18.551121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.232.104.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.232.104.54 ", "ContentType": "text/plain"}], "uids": ["CfLF3I3UFpCUwZ7Yj6"]} -{"Format": "IDEA0", "ID": "1c5b71b3-7945-45fa-b1b3-0fa5439076e6", "DetectTime": "2023-10-30T14:04:18.589874+02:00", "EventTime": "2023-10-30T14:04:18.589891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["120.150.27.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 120.150.27.251 ", "ContentType": "text/plain"}], "uids": ["CbMo4p4MVtBfos2jFj"]} -{"Format": "IDEA0", "ID": "892ed185-18de-4b79-808a-878f83d3bc18", "DetectTime": "2023-10-30T14:04:18.630208+02:00", "EventTime": "2023-10-30T14:04:18.630232+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cezit72mAyJDD4CeNd"]} -{"Format": "IDEA0", "ID": "94f0dfb7-5e5b-498b-9b48-5e1cab7c74ed", "DetectTime": "2023-10-30T14:04:18.646673+02:00", "EventTime": "2023-10-30T14:04:18.646696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.242.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.242.27 ", "ContentType": "text/plain"}], "uids": ["CetEvr1KeI0Nv9roqe"]} -{"Format": "IDEA0", "ID": "6774600d-3527-4332-803d-e508d50cb5de", "DetectTime": "2023-10-30T14:04:18.687207+02:00", "EventTime": "2023-10-30T14:04:18.687225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["C3ZFSC20GUtiOKPCU2"]} -{"Format": "IDEA0", "ID": "928bb997-3ef6-4278-9246-1ea1e1ac2b61", "DetectTime": "2023-10-30T14:04:18.732298+02:00", "EventTime": "2023-10-30T14:04:18.732320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CM7HHm3zaKo1Xgprji"]} -{"Format": "IDEA0", "ID": "416c7942-0e12-482b-8440-0066110441f2", "DetectTime": "2023-10-30T14:04:18.773755+02:00", "EventTime": "2023-10-30T14:04:18.773774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.80.29.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.80.29.170 ", "ContentType": "text/plain"}], "uids": ["CuluOc4tlFMHEbATE1"]} -{"Format": "IDEA0", "ID": "a0e42e6d-a9f7-4ccd-a156-2ff169b0a9ae", "DetectTime": "2023-10-30T14:04:18.814226+02:00", "EventTime": "2023-10-30T14:04:18.814247+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSxza9hvlw5CN7RG"]} -{"Format": "IDEA0", "ID": "b2ea335a-7113-4088-bd01-424b5e894dc5", "DetectTime": "2023-10-30T14:04:18.833253+02:00", "EventTime": "2023-10-30T14:04:18.833278+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CsOz5z2yLjRuXP2jO3"]} -{"Format": "IDEA0", "ID": "2a361100-3138-4b37-81fb-0e2b7f92e102", "DetectTime": "2023-10-30T14:04:18.851175+02:00", "EventTime": "2023-10-30T14:04:18.851244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.3.239.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.3.239.73 ", "ContentType": "text/plain"}], "uids": ["CeaFyb24ZgH9YzObEe"]} -{"Format": "IDEA0", "ID": "db4cb2f9-a756-456a-96d3-3fadb0edcd9e", "DetectTime": "2023-10-30T14:04:18.896971+02:00", "EventTime": "2023-10-30T14:04:18.897035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.5.179.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.5.179.11 ", "ContentType": "text/plain"}], "uids": ["CbI2Pc3fircLpCi0l3"]} -{"Format": "IDEA0", "ID": "9b17999f-8c7b-489d-a82c-d56e6e3f10fd", "DetectTime": "2023-10-30T14:04:18.940226+02:00", "EventTime": "2023-10-30T14:04:18.940238+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CezeDV3RWU3DZGMYlk"]} -{"Format": "IDEA0", "ID": "6ad0b7d6-b379-4963-ba4f-0f8255c36b5e", "DetectTime": "2023-10-30T14:04:18.956235+02:00", "EventTime": "2023-10-30T14:04:18.956261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.141.117.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.141.117.232 ", "ContentType": "text/plain"}], "uids": ["CZ5ZFa15nG0aXdUpRh"]} -{"Format": "IDEA0", "ID": "5d279d88-d377-461f-8f69-ef8a0a85e111", "DetectTime": "2023-10-30T14:04:19.003999+02:00", "EventTime": "2023-10-30T14:04:19.004020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.157.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.157.47 ", "ContentType": "text/plain"}], "uids": ["C73v3bjjBiqlFd9s1"]} -{"Format": "IDEA0", "ID": "8fdb658f-a5a4-4d91-8b24-73060614826a", "DetectTime": "2023-10-30T14:04:19.063909+02:00", "EventTime": "2023-10-30T14:04:19.063934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cezit72mAyJDD4CeNd", "CdlJAu4hLdDKJAVgH8", "CB7x694qdr0SHrt9tb", "CsOz5z2yLjRuXP2jO3"]} -{"Format": "IDEA0", "ID": "fc6372c7-7978-4cba-85cb-4edd0e737208", "DetectTime": "2023-10-30T14:04:19.088043+02:00", "EventTime": "2023-10-30T14:04:19.088065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.59.60.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.59.60.84 ", "ContentType": "text/plain"}], "uids": ["CVETJV1frFLf27R857"]} -{"Format": "IDEA0", "ID": "6c41dd15-2813-4275-9a39-c0aa851418c0", "DetectTime": "2023-10-30T14:04:19.161801+02:00", "EventTime": "2023-10-30T14:04:19.161825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.80.99.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.80.99.25 ", "ContentType": "text/plain"}], "uids": ["Ctp2AG3UzpFd9fGYWd"]} -{"Format": "IDEA0", "ID": "effab11e-92e1-4781-8cfd-7179d1fdbc76", "DetectTime": "2023-10-30T14:04:19.251716+02:00", "EventTime": "2023-10-30T14:04:19.251745+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdlJAu4hLdDKJAVgH8"]} -{"Format": "IDEA0", "ID": "b0fa7714-49ae-4e33-9666-2acaa2a967bb", "DetectTime": "2023-10-30T14:04:19.283829+02:00", "EventTime": "2023-10-30T14:04:19.283852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CUzVpG4XV9fKPtTCt"]} -{"Format": "IDEA0", "ID": "cf59db92-11d6-4e5b-a9dd-b39e4e93f0ed", "DetectTime": "2023-10-30T14:04:19.366261+02:00", "EventTime": "2023-10-30T14:04:19.366320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.228.163.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.228.163.130 ", "ContentType": "text/plain"}], "uids": ["CwltJX1cYVtoiYx1F"]} -{"Format": "IDEA0", "ID": "ba47ef51-caa5-4260-9834-ab4b2ccc90f8", "DetectTime": "2023-10-30T14:04:19.414199+02:00", "EventTime": "2023-10-30T14:04:19.414218+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cf52nU1b2rpFxAlSq7"]} -{"Format": "IDEA0", "ID": "f601b42c-54c9-4983-9f83-cd3b70ac9b5e", "DetectTime": "2023-10-30T14:04:19.433139+02:00", "EventTime": "2023-10-30T14:04:19.433162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.185.46.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.185.46.132 ", "ContentType": "text/plain"}], "uids": ["CB6BdI2A1kIvUUKe7g"]} -{"Format": "IDEA0", "ID": "7ba2da1b-9a58-4fe9-96af-8b189211d2af", "DetectTime": "2023-10-30T14:04:19.476850+02:00", "EventTime": "2023-10-30T14:04:19.476868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.241.253.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.241.253.218 ", "ContentType": "text/plain"}], "uids": ["C6eNF32LHw9yyw67Dg"]} -{"Format": "IDEA0", "ID": "63fda296-957d-411c-9a92-23e93e54bb36", "DetectTime": "2023-10-30T14:04:19.619546+02:00", "EventTime": "2023-10-30T14:04:19.619597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.57.22.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.57.22.60 ", "ContentType": "text/plain"}], "uids": ["CIMQPE2A74P5Dwtx8j"]} -{"Format": "IDEA0", "ID": "4f4ac0d4-4db3-4a81-a6e0-0f8a8e150337", "DetectTime": "2023-10-30T14:04:19.677738+02:00", "EventTime": "2023-10-30T14:04:19.677755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.14.83.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.14.83.159 ", "ContentType": "text/plain"}], "uids": ["CBnHkg17QUAyGW0Psl"]} -{"Format": "IDEA0", "ID": "9ab92009-c2e6-4ecf-8f59-6cf34cab1101", "DetectTime": "2023-10-30T14:04:19.738151+02:00", "EventTime": "2023-10-30T14:04:19.738171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CXnVzL5H0aXh0d6N7"]} -{"Format": "IDEA0", "ID": "2b7462b6-3d01-44eb-abf6-e74b22730ae3", "DetectTime": "2023-10-30T14:04:19.793225+02:00", "EventTime": "2023-10-30T14:04:19.793243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.207.56.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.207.56.41 ", "ContentType": "text/plain"}], "uids": ["C225NA3st28NWesVlf"]} -{"Format": "IDEA0", "ID": "0c8d0d11-d179-4e7b-a141-7f59879a1d74", "DetectTime": "2023-10-30T14:04:19.838817+02:00", "EventTime": "2023-10-30T14:04:19.838837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.47.19.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.47.19.247 ", "ContentType": "text/plain"}], "uids": ["CRKB8G2dJvfoVJbrJ1"]} -{"Format": "IDEA0", "ID": "e8082f16-b9ef-4997-96a7-16b380ef9299", "DetectTime": "2023-10-30T14:04:19.881116+02:00", "EventTime": "2023-10-30T14:04:19.881132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.92.135.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.92.135.248 ", "ContentType": "text/plain"}], "uids": ["CmG0MI3AExTnopNLCb"]} -{"Format": "IDEA0", "ID": "997e8248-16b3-44a7-950b-fbcec5bb1649", "DetectTime": "2023-10-30T14:04:19.925165+02:00", "EventTime": "2023-10-30T14:04:19.925182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.95.39.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.95.39.221 ", "ContentType": "text/plain"}], "uids": ["Cfe5EF4Lj6O1uUbA28"]} -{"Format": "IDEA0", "ID": "b76d2642-54eb-4b15-8d5c-d1565c4d8f7b", "DetectTime": "2023-10-30T14:04:19.974569+02:00", "EventTime": "2023-10-30T14:04:19.974597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.230.228.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.230.228.174 ", "ContentType": "text/plain"}], "uids": ["CHjKjI1wLqtJUO6fd"]} -{"Format": "IDEA0", "ID": "408d897f-de7e-4070-960e-1a6c524692d8", "DetectTime": "2023-10-30T14:04:20.017889+02:00", "EventTime": "2023-10-30T14:04:20.017907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CS2yGuf3K9HZ9i7pf"]} -{"Format": "IDEA0", "ID": "ae711bfc-e1ad-4d3a-a892-724694f8f547", "DetectTime": "2023-10-30T14:04:20.061140+02:00", "EventTime": "2023-10-30T14:04:20.061156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.246.2.43"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.246.2.43 ", "ContentType": "text/plain"}], "uids": ["CMLvra2O04kZY4z8oi"]} -{"Format": "IDEA0", "ID": "7ef09aaa-6986-4067-8a7d-48eab0d88ad8", "DetectTime": "2023-10-30T14:04:20.103833+02:00", "EventTime": "2023-10-30T14:04:20.103889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.213.192.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.213.192.176 ", "ContentType": "text/plain"}], "uids": ["CJYdm14EXmin7WNRc6"]} -{"Format": "IDEA0", "ID": "653cd71e-31e3-43b6-96a1-ab9bd1b51c35", "DetectTime": "2023-10-30T14:04:20.155282+02:00", "EventTime": "2023-10-30T14:04:20.155301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.231.72.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.231.72.9 ", "ContentType": "text/plain"}], "uids": ["C0l0uO3uYWJNnPqsm4"]} -{"Format": "IDEA0", "ID": "95d988c7-e44b-4c47-9445-819e19a4ce4d", "DetectTime": "2023-10-30T14:04:20.209678+02:00", "EventTime": "2023-10-30T14:04:20.209694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["207.114.249.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 207.114.249.34 ", "ContentType": "text/plain"}], "uids": ["CXMHyJ1RN8fSs7KaG2"]} -{"Format": "IDEA0", "ID": "e690a37b-9850-41b8-8225-3bb771f27f5a", "DetectTime": "2023-10-30T14:04:20.257947+02:00", "EventTime": "2023-10-30T14:04:20.257972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.73.228.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.73.228.35 ", "ContentType": "text/plain"}], "uids": ["CiIVOE4JksgycIIsw5"]} -{"Format": "IDEA0", "ID": "7af0eb83-5891-4a86-9631-25e97b43bd3d", "DetectTime": "2023-10-30T14:04:20.305505+02:00", "EventTime": "2023-10-30T14:04:20.305527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.99.102.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.99.102.58 ", "ContentType": "text/plain"}], "uids": ["Cp5RcF3vyJnR8vLZD7"]} -{"Format": "IDEA0", "ID": "3b515966-b5af-455f-9b45-654191d1cbec", "DetectTime": "2023-10-30T14:04:20.368983+02:00", "EventTime": "2023-10-30T14:04:20.369001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.15.230.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.15.230.112 ", "ContentType": "text/plain"}], "uids": ["CesA8b3FydRB3PFRH4"]} -{"Format": "IDEA0", "ID": "fe233e6b-637d-458d-8b98-0568674c2f5b", "DetectTime": "2023-10-30T14:04:20.412634+02:00", "EventTime": "2023-10-30T14:04:20.412650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.103.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.103.145 ", "ContentType": "text/plain"}], "uids": ["CEGM0F49fehAEQEhj3"]} -{"Format": "IDEA0", "ID": "c02d7e0d-6cc9-4982-9479-a50d51351e82", "DetectTime": "2023-10-30T14:04:20.453810+02:00", "EventTime": "2023-10-30T14:04:20.453824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["159.205.108.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 159.205.108.153 ", "ContentType": "text/plain"}], "uids": ["Cq2V5V1l4oha8vb9N9"]} -{"Format": "IDEA0", "ID": "1b7f53bb-fc3d-4302-854e-cda278cfc3c1", "DetectTime": "2023-10-30T14:04:20.499760+02:00", "EventTime": "2023-10-30T14:04:20.499874+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDYHI62KaIbUEaw36g"]} -{"Format": "IDEA0", "ID": "9f37bf6e-05d2-4258-b822-c00ecbfe6015", "DetectTime": "2023-10-30T14:04:20.509865+02:00", "EventTime": "2023-10-30T14:04:20.509883+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjZYXq29kxghdXurDl"]} -{"Format": "IDEA0", "ID": "f68abc92-c5f8-45c4-8795-6b52ceeb7b5b", "DetectTime": "2023-10-30T14:04:20.522386+02:00", "EventTime": "2023-10-30T14:04:20.522407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.185.247.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.185.247.82 ", "ContentType": "text/plain"}], "uids": ["CoF59B37kxJTxnRHZ2"]} -{"Format": "IDEA0", "ID": "20c10e01-acc8-4992-83b7-7f83d764aa1a", "DetectTime": "2023-10-30T14:04:20.574262+02:00", "EventTime": "2023-10-30T14:04:20.574283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.94.158.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.94.158.164 ", "ContentType": "text/plain"}], "uids": ["CXcvAk17JCygswB1Ri"]} -{"Format": "IDEA0", "ID": "4f3d9fa9-f9bc-422f-aa4e-80848254ad16", "DetectTime": "2023-10-30T14:04:20.617835+02:00", "EventTime": "2023-10-30T14:04:20.617850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.101.74.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.101.74.193 ", "ContentType": "text/plain"}], "uids": ["CRslvM0MPzyKwvl1e"]} -{"Format": "IDEA0", "ID": "0a560548-8932-4a5f-b99b-12ac026ad290", "DetectTime": "2023-10-30T14:04:20.658836+02:00", "EventTime": "2023-10-30T14:04:20.658853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.42.42 ", "ContentType": "text/plain"}], "uids": ["CN2VGwcF8ZpaiEaD5"]} -{"Format": "IDEA0", "ID": "744b7704-9413-46a4-a8d8-52919356d5a4", "DetectTime": "2023-10-30T14:04:20.699282+02:00", "EventTime": "2023-10-30T14:04:20.699299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["C5dVBNxwyX8IdaIn5"]} -{"Format": "IDEA0", "ID": "70334a6d-dea1-4b14-aa3c-0cc44eff3125", "DetectTime": "2023-10-30T14:04:20.741060+02:00", "EventTime": "2023-10-30T14:04:20.741087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CvnuW92pFMw2dayZk3"]} -{"Format": "IDEA0", "ID": "0ce3f6a3-04e1-4573-8659-b5bfee64fb54", "DetectTime": "2023-10-30T14:04:20.785190+02:00", "EventTime": "2023-10-30T14:04:20.785209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.6.39.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.6.39.216 ", "ContentType": "text/plain"}], "uids": ["CKSQrH3rt9irRTGnG"]} -{"Format": "IDEA0", "ID": "8dc2bc22-f643-4dc0-bac7-f372c09fbcf0", "DetectTime": "2023-10-30T14:04:20.826085+02:00", "EventTime": "2023-10-30T14:04:20.826102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.30.193.92"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.30.193.92 ", "ContentType": "text/plain"}], "uids": ["Cttfe13oHxwRBiV1L4"]} -{"Format": "IDEA0", "ID": "a1dccc4d-587a-47a2-94e2-7fca286c4bd1", "DetectTime": "2023-10-30T14:04:20.889101+02:00", "EventTime": "2023-10-30T14:04:20.889128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.114.75.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.114.75.50 ", "ContentType": "text/plain"}], "uids": ["CxLK1kgEdnq87VWTh"]} -{"Format": "IDEA0", "ID": "2a24d470-e7e8-4236-899a-0e841a018501", "DetectTime": "2023-10-30T14:04:20.932434+02:00", "EventTime": "2023-10-30T14:04:20.932453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.154.145.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.154.145.47 ", "ContentType": "text/plain"}], "uids": ["CTepc115LFmbMQlWtk"]} -{"Format": "IDEA0", "ID": "38a4ea1a-4af6-40c5-a6db-1d17273bc3f2", "DetectTime": "2023-10-30T14:04:20.972913+02:00", "EventTime": "2023-10-30T14:04:20.972938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.236.182.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.236.182.34 ", "ContentType": "text/plain"}], "uids": ["CXBGme2V0mtuVM6u6d"]} -{"Format": "IDEA0", "ID": "38523537-16f8-4745-acbf-81d811903ea7", "DetectTime": "2023-10-30T14:04:21.017887+02:00", "EventTime": "2023-10-30T14:04:21.017905+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CORODNZ56IDhmdut9"]} -{"Format": "IDEA0", "ID": "225183d5-9cce-46b0-bc74-37abe1f92c65", "DetectTime": "2023-10-30T14:04:21.028122+02:00", "EventTime": "2023-10-30T14:04:21.028141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.62.133.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.62.133.135 ", "ContentType": "text/plain"}], "uids": ["CrpXIQ1hz5Z4TrTtDk"]} -{"Format": "IDEA0", "ID": "b4eb36a9-8939-4633-b9ed-8d164c772e8d", "DetectTime": "2023-10-30T14:04:21.078588+02:00", "EventTime": "2023-10-30T14:04:21.078615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CB9Vtk2kqLqvC0OU9c"]} -{"Format": "IDEA0", "ID": "9de8ae06-cc36-4c2d-a51a-17ddd0b303fe", "DetectTime": "2023-10-30T14:04:21.128296+02:00", "EventTime": "2023-10-30T14:04:21.128449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CXTJwC2tr2fK9ssHka"]} -{"Format": "IDEA0", "ID": "2220f269-fed3-438e-91ef-02c713568e5b", "DetectTime": "2023-10-30T14:04:21.161718+02:00", "EventTime": "2023-10-30T14:04:21.161730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CSJmit3J0m0ERT2YD"]} -{"Format": "IDEA0", "ID": "fc3b841f-14ad-4a0c-a094-f99568b9e078", "DetectTime": "2023-10-30T14:04:21.212915+02:00", "EventTime": "2023-10-30T14:04:21.212935+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCuOp31Zq15vNM2x1k"]} -{"Format": "IDEA0", "ID": "e733e5b4-88a5-4cff-80af-27c5c4ffb9d7", "DetectTime": "2023-10-30T14:04:21.225750+02:00", "EventTime": "2023-10-30T14:04:21.225775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.26.149.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.26.149.126 ", "ContentType": "text/plain"}], "uids": ["CJO6m34qbs8012IIQk"]} -{"Format": "IDEA0", "ID": "0d21ab0d-c002-4448-906b-7f8a7ac50050", "DetectTime": "2023-10-30T14:04:21.303648+02:00", "EventTime": "2023-10-30T14:04:21.303668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.163.69.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.163.69.33 ", "ContentType": "text/plain"}], "uids": ["CLtI2I2TyiPht05MH4"]} -{"Format": "IDEA0", "ID": "2f46a067-394c-4553-892e-26bae9db0248", "DetectTime": "2023-10-30T14:04:21.352845+02:00", "EventTime": "2023-10-30T14:04:21.352866+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbdSEQL2olhPWmmMd"]} -{"Format": "IDEA0", "ID": "1440b64d-3612-4bb4-8d55-00eeba20ec90", "DetectTime": "2023-10-30T14:04:21.365175+02:00", "EventTime": "2023-10-30T14:04:21.365192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["Ck58PC3MoB7GlZn9O4"]} -{"Format": "IDEA0", "ID": "52f4cb2c-dfae-4afd-86fe-0794d6b7da28", "DetectTime": "2023-10-30T14:04:21.417961+02:00", "EventTime": "2023-10-30T14:04:21.417982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.131.201.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.131.201.146 ", "ContentType": "text/plain"}], "uids": ["CJIkaY1botvhXz2xVk"]} -{"Format": "IDEA0", "ID": "8dc74241-7ca5-44d6-b43d-5edb981c488a", "DetectTime": "2023-10-30T14:04:21.465344+02:00", "EventTime": "2023-10-30T14:04:21.465366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["Cktwva3g2i3MKebUq3"]} -{"Format": "IDEA0", "ID": "95d54eb0-ce7c-42ef-b090-9cec0f8fa73b", "DetectTime": "2023-10-30T14:04:21.498082+02:00", "EventTime": "2023-10-30T14:04:21.498102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CypOMMHLKbF4QMjF6"]} -{"Format": "IDEA0", "ID": "fd8f27f4-26ea-446d-83ff-f44f8f9eb76a", "DetectTime": "2023-10-30T14:04:21.533314+02:00", "EventTime": "2023-10-30T14:04:21.533331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.191.82.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.191.82.82 ", "ContentType": "text/plain"}], "uids": ["Czm6pV24c5CqeigMZ1"]} -{"Format": "IDEA0", "ID": "b482928b-ae88-44ec-87b5-892fe5a6426a", "DetectTime": "2023-10-30T14:04:21.569133+02:00", "EventTime": "2023-10-30T14:04:21.569152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["Cbo1AC1wz9pFFFdaK2"]} -{"Format": "IDEA0", "ID": "088b0827-2827-439a-ad1c-a740781f23a0", "DetectTime": "2023-10-30T14:04:21.608677+02:00", "EventTime": "2023-10-30T14:04:21.608701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.178.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.164.178.50 ", "ContentType": "text/plain"}], "uids": ["CDk4911kLwe0ACWfod"]} -{"Format": "IDEA0", "ID": "cff293a1-881a-4518-bbfc-e24e6bb55070", "DetectTime": "2023-10-30T14:04:21.641334+02:00", "EventTime": "2023-10-30T14:04:21.641374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.48.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.48.40 ", "ContentType": "text/plain"}], "uids": ["CYqjOo1mQEZgTtfTk6"]} -{"Format": "IDEA0", "ID": "6c27d18c-52b7-44c6-b3fe-82067df20ffc", "DetectTime": "2023-10-30T14:04:21.678050+02:00", "EventTime": "2023-10-30T14:04:21.678067+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfFmG02xwQyCUe6Ooc"]} -{"Format": "IDEA0", "ID": "e5c1221c-baa4-480c-9ea5-ea10cc28e568", "DetectTime": "2023-10-30T14:04:21.687122+02:00", "EventTime": "2023-10-30T14:04:21.687138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.172.120.192"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.172.120.192 ", "ContentType": "text/plain"}], "uids": ["CYYpxl137Nvkw3iRFj"]} -{"Format": "IDEA0", "ID": "ffa46510-5974-40b9-bf00-3e0f50b589d5", "DetectTime": "2023-10-30T14:04:21.723293+02:00", "EventTime": "2023-10-30T14:04:21.723309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CbdSEQL2olhPWmmMd", "CORODNZ56IDhmdut9", "CDYHI62KaIbUEaw36g", "CyZKdrt4nYwxeDNud"]} -{"Format": "IDEA0", "ID": "a4649d1c-c5dd-4f2a-b98b-4f2dfe87cc72", "DetectTime": "2023-10-30T14:04:21.732471+02:00", "EventTime": "2023-10-30T14:04:21.732489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyZKdrt4nYwxeDNud"]} -{"Format": "IDEA0", "ID": "69e8228e-1ae1-4510-973d-4241198440ac", "DetectTime": "2023-10-30T14:04:21.743174+02:00", "EventTime": "2023-10-30T14:04:21.743190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.55.57.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.55.57.160 ", "ContentType": "text/plain"}], "uids": ["C2sWqV3lC4ME98OkB4"]} -{"Format": "IDEA0", "ID": "11750ca8-e3a6-4b11-92ec-f38270bb3d70", "DetectTime": "2023-10-30T14:04:21.885377+02:00", "EventTime": "2023-10-30T14:04:21.885411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.172.252.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.172.252.79 ", "ContentType": "text/plain"}], "uids": ["CrWdGb3lzGFnw3W4J5"]} -{"Format": "IDEA0", "ID": "0c818e07-ef8d-4c4e-be64-2ade14957416", "DetectTime": "2023-10-30T14:04:21.925550+02:00", "EventTime": "2023-10-30T14:04:21.925567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CxDIy5AZoDxdmP4a"]} -{"Format": "IDEA0", "ID": "5377134b-0a27-48c8-971b-0eb8a1cf3075", "DetectTime": "2023-10-30T14:04:21.970224+02:00", "EventTime": "2023-10-30T14:04:21.970245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.166.143.39 ", "ContentType": "text/plain"}], "uids": ["CZmo1h1bO3rKwxXs8h"]} -{"Format": "IDEA0", "ID": "10d12033-001c-414d-a075-d78219adfa27", "DetectTime": "2023-10-30T14:04:22.020229+02:00", "EventTime": "2023-10-30T14:04:22.020251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.74.14.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.74.14.220 ", "ContentType": "text/plain"}], "uids": ["Cx7KIE2mCW1N2z4thc"]} -{"Format": "IDEA0", "ID": "db654477-c0b9-41eb-ba6b-ab399025a768", "DetectTime": "2023-10-30T14:04:22.069396+02:00", "EventTime": "2023-10-30T14:04:22.069418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.123.48.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.123.48.21 ", "ContentType": "text/plain"}], "uids": ["C4NcOM1VcI6bMLXjMf"]} -{"Format": "IDEA0", "ID": "d6afb77b-cd52-4929-9cc5-dd28a2e05d0c", "DetectTime": "2023-10-30T14:04:22.107874+02:00", "EventTime": "2023-10-30T14:04:22.107891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.74.131.196"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.74.131.196 ", "ContentType": "text/plain"}], "uids": ["Ch8UfA1WF94Kkjriqd"]} -{"Format": "IDEA0", "ID": "b00d8ee3-c948-4521-a9c2-b836bdc55047", "DetectTime": "2023-10-30T14:04:22.141709+02:00", "EventTime": "2023-10-30T14:04:22.141726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.142.200.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.142.200.139 ", "ContentType": "text/plain"}], "uids": ["CozsDy3bFGG3ykKk37"]} -{"Format": "IDEA0", "ID": "540d69d5-ba27-4acf-8977-b67b68d103ab", "DetectTime": "2023-10-30T14:04:22.180100+02:00", "EventTime": "2023-10-30T14:04:22.180121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.152.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.182.152.207 ", "ContentType": "text/plain"}], "uids": ["CFWNBw3vPe3AtyVIIl"]} -{"Format": "IDEA0", "ID": "b3af817e-95ff-4fed-a65b-67a0709ecc42", "DetectTime": "2023-10-30T14:04:22.217359+02:00", "EventTime": "2023-10-30T14:04:22.217380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["C07TrOmN30pZThs2d"]} -{"Format": "IDEA0", "ID": "77a8f3c9-4b04-46c4-9b31-3e39d443ec84", "DetectTime": "2023-10-30T14:04:22.253219+02:00", "EventTime": "2023-10-30T14:04:22.253238+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CM6PpC1QdED3eFb3L1"]} -{"Format": "IDEA0", "ID": "8b4615d5-b882-4d50-a293-d1f2bd438108", "DetectTime": "2023-10-30T14:04:22.266470+02:00", "EventTime": "2023-10-30T14:04:22.266486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CXh9F43KnU71TnnZ5k"]} -{"Format": "IDEA0", "ID": "375c1ecc-ba73-4232-bd04-7a48f5f46633", "DetectTime": "2023-10-30T14:04:22.306356+02:00", "EventTime": "2023-10-30T14:04:22.306372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["CspSo74Wq67BaqGMla"]} -{"Format": "IDEA0", "ID": "21305986-426b-49b3-bea9-7b40cd446601", "DetectTime": "2023-10-30T14:04:22.341781+02:00", "EventTime": "2023-10-30T14:04:22.341797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.234.138.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.234.138.82 ", "ContentType": "text/plain"}], "uids": ["C3aFq83XBVSakJ9PV"]} -{"Format": "IDEA0", "ID": "2b7706c6-27b8-4700-9c6c-9488d72c4e64", "DetectTime": "2023-10-30T14:04:22.380313+02:00", "EventTime": "2023-10-30T14:04:22.380331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.107.16.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.107.16.215 ", "ContentType": "text/plain"}], "uids": ["CqaAPd1fDGIBtygYSj"]} -{"Format": "IDEA0", "ID": "c2b303ef-ae25-4ae2-a5a5-97a1f08ca735", "DetectTime": "2023-10-30T14:04:22.422242+02:00", "EventTime": "2023-10-30T14:04:22.422259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.11.249.52 ", "ContentType": "text/plain"}], "uids": ["ClsKdk2NIxdjc0Lav"]} -{"Format": "IDEA0", "ID": "95242746-69d3-4239-9787-d36bde602f5f", "DetectTime": "2023-10-30T14:04:22.458263+02:00", "EventTime": "2023-10-30T14:04:22.458279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.85.7.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.85.7.250 ", "ContentType": "text/plain"}], "uids": ["C4Zusf3vtfwwps59Hj"]} -{"Format": "IDEA0", "ID": "8bdad835-b9b4-4818-9e26-f81dd5e0c024", "DetectTime": "2023-10-30T14:04:22.502419+02:00", "EventTime": "2023-10-30T14:04:22.502435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.180.153.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.180.153.115 ", "ContentType": "text/plain"}], "uids": ["CnKMxI1ycZd90vHoXf"]} -{"Format": "IDEA0", "ID": "b5bd85b8-dca3-438f-89cc-1b631fe4f508", "DetectTime": "2023-10-30T14:04:22.542033+02:00", "EventTime": "2023-10-30T14:04:22.542053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["CvkWHA2BtrXDBxTQk6"]} -{"Format": "IDEA0", "ID": "f65ae296-3dd5-4858-8689-76ed2e4e7c9b", "DetectTime": "2023-10-30T14:04:22.577748+02:00", "EventTime": "2023-10-30T14:04:22.577764+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9xXAuclOB6ZLFnd"]} -{"Format": "IDEA0", "ID": "c0e12c06-3023-42c0-8973-335f180504a1", "DetectTime": "2023-10-30T14:04:22.587661+02:00", "EventTime": "2023-10-30T14:04:22.587677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.46.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.46.62 ", "ContentType": "text/plain"}], "uids": ["CF6YyWkXOwJ2eMqs2"]} -{"Format": "IDEA0", "ID": "fa31e8fa-738d-455c-802a-4cdb6874521c", "DetectTime": "2023-10-30T14:04:22.626147+02:00", "EventTime": "2023-10-30T14:04:22.626164+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSkVFSrzPilTy2p9h"]} -{"Format": "IDEA0", "ID": "32d02f0d-82eb-4579-b054-a928eaeb992b", "DetectTime": "2023-10-30T14:04:22.635565+02:00", "EventTime": "2023-10-30T14:04:22.635583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.121.9.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.121.9.254 ", "ContentType": "text/plain"}], "uids": ["C6BsFL3zH9BQihLQ34"]} -{"Format": "IDEA0", "ID": "27163553-dc4a-43e4-b256-2c5acb15b5b7", "DetectTime": "2023-10-30T14:04:22.663073+02:00", "EventTime": "2023-10-30T14:04:22.663084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.12.109.89"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.12.109.89 ", "ContentType": "text/plain"}], "uids": ["Cq3sF81BCGWfoIYKvl"]} -{"Format": "IDEA0", "ID": "ee4f34a3-5aef-422f-823d-90110bcf0218", "DetectTime": "2023-10-30T14:04:22.700285+02:00", "EventTime": "2023-10-30T14:04:22.700301+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMvnRx9dsyp4HY8k2"]} -{"Format": "IDEA0", "ID": "33346abf-977b-4fb3-8beb-504bfb23eb45", "DetectTime": "2023-10-30T14:04:22.710772+02:00", "EventTime": "2023-10-30T14:04:22.710802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CuBE2s2Y0qqKYm24Kl"]} -{"Format": "IDEA0", "ID": "558b6208-ae55-4f53-9996-b305bf89ec32", "DetectTime": "2023-10-30T14:04:22.744932+02:00", "EventTime": "2023-10-30T14:04:22.744950+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cqku0O1AOJ9Ed0KVLc"]} -{"Format": "IDEA0", "ID": "330dd4e0-48d6-46dd-985e-12e16c6b5138", "DetectTime": "2023-10-30T14:04:22.754343+02:00", "EventTime": "2023-10-30T14:04:22.754362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.80.149 ", "ContentType": "text/plain"}], "uids": ["CZiQPQ2DE4ZklGA8O2"]} -{"Format": "IDEA0", "ID": "0a9156de-41f9-4a4f-98d1-1d7993811717", "DetectTime": "2023-10-30T14:04:22.793282+02:00", "EventTime": "2023-10-30T14:04:22.793302+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSWSKu3etR9uOpk5qk"]} -{"Format": "IDEA0", "ID": "e1fda35b-f192-4d7d-998c-70780aa9f5fb", "DetectTime": "2023-10-30T14:04:22.804090+02:00", "EventTime": "2023-10-30T14:04:22.804109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.62.235.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.62.235.234 ", "ContentType": "text/plain"}], "uids": ["CkKA5v3h1fVnTQiYa1"]} -{"Format": "IDEA0", "ID": "77edcc62-cc11-469d-bd19-c52891a2e3c6", "DetectTime": "2023-10-30T14:04:22.837022+02:00", "EventTime": "2023-10-30T14:04:22.837044+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CeNd542oZfMkaxx1i6"]} -{"Format": "IDEA0", "ID": "5329fdc5-053c-4709-8ec4-576f18a9e10d", "DetectTime": "2023-10-30T14:04:22.846309+02:00", "EventTime": "2023-10-30T14:04:22.846325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.186.151.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.186.151.112 ", "ContentType": "text/plain"}], "uids": ["CIzt1Z1gVtA57X8TX9"]} -{"Format": "IDEA0", "ID": "1bac1106-db7a-4b5b-9464-d2853fde7214", "DetectTime": "2023-10-30T14:04:22.883471+02:00", "EventTime": "2023-10-30T14:04:22.883491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.114.0.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.114.0.197 ", "ContentType": "text/plain"}], "uids": ["C15Jt631OECUK6cEoj"]} -{"Format": "IDEA0", "ID": "efd84d22-33ae-49ac-9a21-d0e9962f6324", "DetectTime": "2023-10-30T14:04:22.919559+02:00", "EventTime": "2023-10-30T14:04:22.919581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["C9zDFk1KC3cxEH3AXe"]} -{"Format": "IDEA0", "ID": "c1fa3241-8007-456d-bb78-d85fc262f4c3", "DetectTime": "2023-10-30T14:04:22.953336+02:00", "EventTime": "2023-10-30T14:04:22.953351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CKSU644s8DUsFGBMqk"]} -{"Format": "IDEA0", "ID": "eb1a9481-36d9-433a-a461-e0bd72f08afe", "DetectTime": "2023-10-30T14:04:22.992287+02:00", "EventTime": "2023-10-30T14:04:22.992304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["220.246.41.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 220.246.41.152 ", "ContentType": "text/plain"}], "uids": ["Cu7jfv4rnTXhArpaq8"]} -{"Format": "IDEA0", "ID": "467547ff-2948-47e2-bb24-ebf8b04b8165", "DetectTime": "2023-10-30T14:04:23.030207+02:00", "EventTime": "2023-10-30T14:04:23.030233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CSWSKu3etR9uOpk5qk", "Cea6Ck44RdBeNM1OVj", "C9xXAuclOB6ZLFnd", "CMvnRx9dsyp4HY8k2"]} -{"Format": "IDEA0", "ID": "c9c3736d-8a80-4276-b97d-e2cadd7b38d0", "DetectTime": "2023-10-30T14:04:23.039665+02:00", "EventTime": "2023-10-30T14:04:23.039682+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cea6Ck44RdBeNM1OVj"]} -{"Format": "IDEA0", "ID": "9e741764-8e36-4ffb-a036-89cd1330b156", "DetectTime": "2023-10-30T14:04:23.048901+02:00", "EventTime": "2023-10-30T14:04:23.048917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.77.39.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.77.39.185 ", "ContentType": "text/plain"}], "uids": ["C562qXy92AvcHhapl"]} -{"Format": "IDEA0", "ID": "e8dcdfb6-5431-461b-9723-be8b4aefa021", "DetectTime": "2023-10-30T14:04:23.086991+02:00", "EventTime": "2023-10-30T14:04:23.087008+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CN4QbhdhwYSXyjYl1"]} -{"Format": "IDEA0", "ID": "248be1cd-c380-4cff-8814-c61b4abe6ac9", "DetectTime": "2023-10-30T14:04:23.099129+02:00", "EventTime": "2023-10-30T14:04:23.099149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CaW82u3nJgwb3UxbTf"]} -{"Format": "IDEA0", "ID": "86e15660-79db-4013-98ff-a082957805ac", "DetectTime": "2023-10-30T14:04:23.126056+02:00", "EventTime": "2023-10-30T14:04:23.126080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["C9g08E44uBtOjxRwC9"]} -{"Format": "IDEA0", "ID": "1266f64a-7fdc-44f6-98bd-0667db7bbba4", "DetectTime": "2023-10-30T14:04:23.161152+02:00", "EventTime": "2023-10-30T14:04:23.161170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. ", "ContentType": "text/plain"}], "uids": ["CmJ8HZ1z3nydJldSRg"]} -{"Format": "IDEA0", "ID": "8e41379c-1fd5-4a5b-8852-db18c441e9f1", "DetectTime": "2023-10-30T14:04:23.192933+02:00", "EventTime": "2023-10-30T14:04:23.192950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.150.226.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.150.226.65 ", "ContentType": "text/plain"}], "uids": ["C7c7Iw3JIHk7h3DKk1"]} -{"Format": "IDEA0", "ID": "61fd3012-21e8-457e-a541-6f8e65a7428d", "DetectTime": "2023-10-30T14:04:23.237225+02:00", "EventTime": "2023-10-30T14:04:23.237251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.235.176.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.235.176.96 ", "ContentType": "text/plain"}], "uids": ["CuYXPP1H8cGDcTKvN3"]} -{"Format": "IDEA0", "ID": "d741d352-5c9c-4e75-a8c0-797cd1cbee92", "DetectTime": "2023-10-30T14:04:23.275179+02:00", "EventTime": "2023-10-30T14:04:23.275198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CLsSOX3eVuLT4JeDaf"]} -{"Format": "IDEA0", "ID": "29548a7b-9baa-47c6-83dd-ff334a56869c", "DetectTime": "2023-10-30T14:04:23.313458+02:00", "EventTime": "2023-10-30T14:04:23.313474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.31.161.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.31.161.18 ", "ContentType": "text/plain"}], "uids": ["CgF2em2nZiB0e8lnf8"]} -{"Format": "IDEA0", "ID": "79fd57c0-b7e1-4a34-9b00-dea8fdf41003", "DetectTime": "2023-10-30T14:04:23.352701+02:00", "EventTime": "2023-10-30T14:04:23.352723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C9VLiO07osQvjbAI4"]} -{"Format": "IDEA0", "ID": "9600ff8a-1078-4a40-9130-27d6fe59eaa9", "DetectTime": "2023-10-30T14:04:23.394121+02:00", "EventTime": "2023-10-30T14:04:23.394141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CoDiFF4NnxOlq6pz62"]} -{"Format": "IDEA0", "ID": "7195edf4-9640-4ab5-b881-8a6eb395a977", "DetectTime": "2023-10-30T14:04:23.435602+02:00", "EventTime": "2023-10-30T14:04:23.435619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.180.153.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.180.153.115 ", "ContentType": "text/plain"}], "uids": ["CF06ff3cJwF74YtfCa"]} -{"Format": "IDEA0", "ID": "2e598122-75ed-4a62-bc7f-2a1fdef5ae77", "DetectTime": "2023-10-30T14:04:23.460897+02:00", "EventTime": "2023-10-30T14:04:23.460914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["C1s3gV20iVyulk1KO"]} -{"Format": "IDEA0", "ID": "1707b23e-e4b1-4094-8a15-cc8b4761552e", "DetectTime": "2023-10-30T14:04:23.487997+02:00", "EventTime": "2023-10-30T14:04:23.488018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CaCj1KraRcFSnwjYf"]} -{"Format": "IDEA0", "ID": "c0064dad-3e8a-4750-aa7a-e3d23ba173ef", "DetectTime": "2023-10-30T14:04:23.524140+02:00", "EventTime": "2023-10-30T14:04:23.524156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Ckp9nW2VugWKX4tIM4"]} -{"Format": "IDEA0", "ID": "86a38493-4a59-42c0-a2cd-c76593272575", "DetectTime": "2023-10-30T14:04:23.557325+02:00", "EventTime": "2023-10-30T14:04:23.557338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CkrnPc3RgUokYWt8G6"]} -{"Format": "IDEA0", "ID": "6393c5d0-7dc9-4c11-8ceb-fb47920c012b", "DetectTime": "2023-10-30T14:04:23.579372+02:00", "EventTime": "2023-10-30T14:04:23.579390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CzgH8w41Cr3Ckua3fk"]} -{"Format": "IDEA0", "ID": "9de66011-8b15-46b2-8335-9d6a143afa08", "DetectTime": "2023-10-30T14:04:23.598356+02:00", "EventTime": "2023-10-30T14:04:23.598370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CyTUT5RkbkupH7Vrf"]} -{"Format": "IDEA0", "ID": "41faceb5-5540-48c1-a539-5effe8066256", "DetectTime": "2023-10-30T14:04:23.614764+02:00", "EventTime": "2023-10-30T14:04:23.614796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C9QyDr3XAB0bdkUxn6"]} -{"Format": "IDEA0", "ID": "7bd43e4c-278a-4a86-9813-e29473c8f038", "DetectTime": "2023-10-30T14:04:23.636606+02:00", "EventTime": "2023-10-30T14:04:23.636624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["ClfJmE1XspLjRxhhIk"]} -{"Format": "IDEA0", "ID": "f58e68c8-5321-409c-9b31-eed08a4c174b", "DetectTime": "2023-10-30T14:04:23.663134+02:00", "EventTime": "2023-10-30T14:04:23.663150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.166.143.39 ", "ContentType": "text/plain"}], "uids": ["C3WLXD32Z7QSkWbWtg"]} -{"Format": "IDEA0", "ID": "d4131cc2-edb6-4822-90e1-8520993ec01f", "DetectTime": "2023-10-30T14:04:23.680319+02:00", "EventTime": "2023-10-30T14:04:23.680335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C7ffws1hPIYvE3Wf6k"]} -{"Format": "IDEA0", "ID": "7469833e-c636-4719-9234-cf9f12cdaaad", "DetectTime": "2023-10-30T14:04:23.708271+02:00", "EventTime": "2023-10-30T14:04:23.708286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEaz601BNTBoJ7pevg"]} -{"Format": "IDEA0", "ID": "393ac865-03db-4a3d-9c1d-e7bb3b6dc5bf", "DetectTime": "2023-10-30T14:04:23.729401+02:00", "EventTime": "2023-10-30T14:04:23.729417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CQj00BJUUBXt2Mmd6"]} -{"Format": "IDEA0", "ID": "27fcc817-fb0d-4803-824d-4c20253557e1", "DetectTime": "2023-10-30T14:04:23.750735+02:00", "EventTime": "2023-10-30T14:04:23.750751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CZy5CG4OX4GdZ4Da0d"]} -{"Format": "IDEA0", "ID": "a6fce9f8-089c-486f-aee4-0ae88b340be0", "DetectTime": "2023-10-30T14:04:23.771990+02:00", "EventTime": "2023-10-30T14:04:23.772007+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkCY25IM7hYyC3sy3"]} -{"Format": "IDEA0", "ID": "cef0c7b5-6628-4b78-b3b1-8ec37a518d53", "DetectTime": "2023-10-30T14:04:23.781470+02:00", "EventTime": "2023-10-30T14:04:23.781486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CEQmvv4xpbeipLW8td"]} -{"Format": "IDEA0", "ID": "f4a1f938-11b3-498d-a35b-473c5d5833cb", "DetectTime": "2023-10-30T14:04:23.802841+02:00", "EventTime": "2023-10-30T14:04:23.802862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CsWgba4kf3F0UUM3P6"]} -{"Format": "IDEA0", "ID": "82fd0a4c-c678-4fe6-a947-f86f46b4f2aa", "DetectTime": "2023-10-30T14:04:23.822924+02:00", "EventTime": "2023-10-30T14:04:23.822938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CICyq91Iq8iW3w080h"]} -{"Format": "IDEA0", "ID": "8d087476-a231-4cb9-b4a1-5fac43ff13f9", "DetectTime": "2023-10-30T14:04:23.847394+02:00", "EventTime": "2023-10-30T14:04:23.847413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CvwR8J1RGD8atC8463"]} -{"Format": "IDEA0", "ID": "637d1014-cc1b-4bda-aa4f-f2c7b0056f85", "DetectTime": "2023-10-30T14:04:23.878399+02:00", "EventTime": "2023-10-30T14:04:23.878412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CuxcI8VbCk1F8zzjh"]} -{"Format": "IDEA0", "ID": "28e1c99e-c25a-4371-bfe3-daa8e3a148a9", "DetectTime": "2023-10-30T14:04:23.912726+02:00", "EventTime": "2023-10-30T14:04:23.912738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.55.57.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.55.57.160 ", "ContentType": "text/plain"}], "uids": ["CzztnW3iWbGxwInvqh"]} -{"Format": "IDEA0", "ID": "b6826660-b36e-443e-8820-1ca505f06b1e", "DetectTime": "2023-10-30T14:04:23.934581+02:00", "EventTime": "2023-10-30T14:04:23.934592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["Cr1hp24ZeW87JdGR6f"]} -{"Format": "IDEA0", "ID": "e21470fe-a97e-4e0b-a708-5a6072c9bed9", "DetectTime": "2023-10-30T14:04:23.954687+02:00", "EventTime": "2023-10-30T14:04:23.954707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.173.32"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.173.32 ", "ContentType": "text/plain"}], "uids": ["CnPsH5rMUFGooXZ2a"]} -{"Format": "IDEA0", "ID": "7de62ecf-a35c-4d07-a187-8ce5471c20c9", "DetectTime": "2023-10-30T14:04:23.989421+02:00", "EventTime": "2023-10-30T14:04:23.989440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["COOJTy12IRxA3VeFab"]} -{"Format": "IDEA0", "ID": "022bb8ee-5f41-47df-bf3e-1864d29a00d1", "DetectTime": "2023-10-30T14:04:24.023521+02:00", "EventTime": "2023-10-30T14:04:24.023537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CsaKT52FcK0ebIhc2i"]} -{"Format": "IDEA0", "ID": "72ba6f94-a5dd-43cc-b18a-1e47afb88349", "DetectTime": "2023-10-30T14:04:24.059677+02:00", "EventTime": "2023-10-30T14:04:24.059698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CoAcUDubjtXsdRbj1"]} -{"Format": "IDEA0", "ID": "819463a8-2588-459c-8de8-de0bdbe0df42", "DetectTime": "2023-10-30T14:04:24.092510+02:00", "EventTime": "2023-10-30T14:04:24.092522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C6okIC4yDxIyyBTB9f"]} -{"Format": "IDEA0", "ID": "6d5e7ae3-68d7-4316-ac59-91b5c4e928ad", "DetectTime": "2023-10-30T14:04:24.113519+02:00", "EventTime": "2023-10-30T14:04:24.113538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["C4ircE4oHAT6azb4if"]} -{"Format": "IDEA0", "ID": "2c5b0fcd-a24c-4c14-8c18-3fefcc97b20a", "DetectTime": "2023-10-30T14:04:24.133664+02:00", "EventTime": "2023-10-30T14:04:24.133682+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRiPiC4CKaPOfqSETl"]} -{"Format": "IDEA0", "ID": "362a7930-335c-430c-a2ac-2d5177c7e9d5", "DetectTime": "2023-10-30T14:04:24.143672+02:00", "EventTime": "2023-10-30T14:04:24.143694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.36.121.227 ", "ContentType": "text/plain"}], "uids": ["Cypjx04qKFntjR8g2c"]} -{"Format": "IDEA0", "ID": "22aa2555-9b15-40c8-ad7d-42a2af8c3a8d", "DetectTime": "2023-10-30T14:04:24.175543+02:00", "EventTime": "2023-10-30T14:04:24.175559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.94.158.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.94.158.164 ", "ContentType": "text/plain"}], "uids": ["CtGytv146roHbFXf9"]} -{"Format": "IDEA0", "ID": "f8d1b7a9-9b6b-4ee3-8cf9-d9ed7ffe3220", "DetectTime": "2023-10-30T14:04:24.207771+02:00", "EventTime": "2023-10-30T14:04:24.207783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CPFznt29Ca5PaFYN19"]} -{"Format": "IDEA0", "ID": "9e695c2e-5a30-47c6-b083-44cfe902fffc", "DetectTime": "2023-10-30T14:04:24.229896+02:00", "EventTime": "2023-10-30T14:04:24.229917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CUd8EdDJRRSUFagEd"]} -{"Format": "IDEA0", "ID": "d8a4af8e-a29a-4a57-9adf-d9a604e2afb0", "DetectTime": "2023-10-30T14:04:24.252643+02:00", "EventTime": "2023-10-30T14:04:24.252659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CD5DYx4oSgNdWfvDq1"]} -{"Format": "IDEA0", "ID": "72d9036f-82f0-4565-8431-61804a2b2fcf", "DetectTime": "2023-10-30T14:04:24.285980+02:00", "EventTime": "2023-10-30T14:04:24.285998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.67.44.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.67.44.82 ", "ContentType": "text/plain"}], "uids": ["C8zK0D3b8zamaVm4h7"]} -{"Format": "IDEA0", "ID": "dba37b25-83e6-4559-93a2-64dd96d05a34", "DetectTime": "2023-10-30T14:04:24.318514+02:00", "EventTime": "2023-10-30T14:04:24.318535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.80.149 ", "ContentType": "text/plain"}], "uids": ["CTEY5h1IqcmCuW6Dx2"]} -{"Format": "IDEA0", "ID": "95b32281-9305-45d6-88cb-10760b3c61f9", "DetectTime": "2023-10-30T14:04:24.343075+02:00", "EventTime": "2023-10-30T14:04:24.343091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CZ5bZG3aSSs8YBlll5"]} -{"Format": "IDEA0", "ID": "75d7d22c-57b7-4366-ab08-ec2830cabc89", "DetectTime": "2023-10-30T14:04:24.364939+02:00", "EventTime": "2023-10-30T14:04:24.364956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C382Qo2FkNi7VTn622"]} -{"Format": "IDEA0", "ID": "0e8d3206-d073-4bb2-81eb-8a643447da02", "DetectTime": "2023-10-30T14:04:24.383944+02:00", "EventTime": "2023-10-30T14:04:24.383955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CiTJZT2CjJv7C4K6C4"]} -{"Format": "IDEA0", "ID": "3cda78f9-cc11-4805-bc61-c2388787bfa1", "DetectTime": "2023-10-30T14:04:24.400160+02:00", "EventTime": "2023-10-30T14:04:24.400173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.96.182.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.96.182.207 ", "ContentType": "text/plain"}], "uids": ["C7S3m9oaFtIxDSPel"]} -{"Format": "IDEA0", "ID": "138d12f5-889b-40bf-a479-1eae0aa4bb9c", "DetectTime": "2023-10-30T14:04:24.434480+02:00", "EventTime": "2023-10-30T14:04:24.434502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CsUE9i4ylzZTT00lx4"]} -{"Format": "IDEA0", "ID": "8811f4d6-ebb7-494f-9346-cedb9f87d5d6", "DetectTime": "2023-10-30T14:04:24.451665+02:00", "EventTime": "2023-10-30T14:04:24.451677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["C333Rv3jK1FtisFdRf"]} -{"Format": "IDEA0", "ID": "0fd9b21f-780a-482f-9684-28c5c86c6ae5", "DetectTime": "2023-10-30T14:04:24.484282+02:00", "EventTime": "2023-10-30T14:04:24.484293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CfirB9kRXhzvKWsrb"]} -{"Format": "IDEA0", "ID": "12bf5687-3edb-437e-9a5c-08b91627c9d6", "DetectTime": "2023-10-30T14:04:24.502241+02:00", "EventTime": "2023-10-30T14:04:24.502252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["C6GPtY3Qq1nvtqLT7d"]} -{"Format": "IDEA0", "ID": "7385359b-2cc0-4cef-8bdc-70141e869e21", "DetectTime": "2023-10-30T14:04:24.531503+02:00", "EventTime": "2023-10-30T14:04:24.531522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["Cxyg1C4l4u04rsRpy5"]} -{"Format": "IDEA0", "ID": "a4afe184-f406-4d4a-b186-631905af02a2", "DetectTime": "2023-10-30T14:04:24.563119+02:00", "EventTime": "2023-10-30T14:04:24.563139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CCvAj7hTk2mEPyhpg"]} -{"Format": "IDEA0", "ID": "6d1cedad-11d3-435f-aeea-7d8b75a67dd5", "DetectTime": "2023-10-30T14:04:24.591438+02:00", "EventTime": "2023-10-30T14:04:24.591449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C29fa74nGQcfMh1PT5"]} -{"Format": "IDEA0", "ID": "04f57dd5-6527-4a93-ac40-e453683fe72b", "DetectTime": "2023-10-30T14:04:24.614512+02:00", "EventTime": "2023-10-30T14:04:24.614529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CAffxCkAOy9ewIJUb"]} -{"Format": "IDEA0", "ID": "ccdb7cf0-aae0-44c5-aa5b-6e7bab64bea7", "DetectTime": "2023-10-30T14:04:24.645396+02:00", "EventTime": "2023-10-30T14:04:24.645412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.96.182.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.96.182.207 ", "ContentType": "text/plain"}], "uids": ["CT0Rtw3LQz3QbMUZp4"]} -{"Format": "IDEA0", "ID": "3bf264c5-add4-4aa7-a8aa-91f6c6c58ecd", "DetectTime": "2023-10-30T14:04:24.665608+02:00", "EventTime": "2023-10-30T14:04:24.665624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["Co74Hl3YVFY7D9bjr6"]} -{"Format": "IDEA0", "ID": "cdef748b-122f-42e2-920e-eb8ff3e75567", "DetectTime": "2023-10-30T14:04:24.753900+02:00", "EventTime": "2023-10-30T14:04:24.753922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.94.158.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.94.158.164 ", "ContentType": "text/plain"}], "uids": ["CbhoPk3xxzUqWzOJQ4"]} -{"Format": "IDEA0", "ID": "920847e1-dce1-4c94-9bd1-84028509ea7d", "DetectTime": "2023-10-30T14:04:24.777946+02:00", "EventTime": "2023-10-30T14:04:24.777963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C1Uew71eCyThf8goDi"]} -{"Format": "IDEA0", "ID": "8bb4acd6-bd45-4834-bb8a-e943fc5ffd89", "DetectTime": "2023-10-30T14:04:24.815670+02:00", "EventTime": "2023-10-30T14:04:24.815688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CGNXjr46wtVQydhUOa"]} -{"Format": "IDEA0", "ID": "58afa366-02ac-44be-892e-0161672e356b", "DetectTime": "2023-10-30T14:04:24.836128+02:00", "EventTime": "2023-10-30T14:04:24.836139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.1.55.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.1.55.130 ", "ContentType": "text/plain"}], "uids": ["Csv1SF3MvJ51qB5QN4"]} -{"Format": "IDEA0", "ID": "2d7328be-f095-4d9a-bc7e-3ba0122462d3", "DetectTime": "2023-10-30T14:04:24.864087+02:00", "EventTime": "2023-10-30T14:04:24.864099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CB3DKT2SaaYf10Ph7f"]} -{"Format": "IDEA0", "ID": "458ab64f-52a4-4b8b-acf1-ad4707198470", "DetectTime": "2023-10-30T14:04:24.885067+02:00", "EventTime": "2023-10-30T14:04:24.885078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CyDSb11j9sijOpX7g4"]} -{"Format": "IDEA0", "ID": "86f3b172-5556-4923-a78d-281086f74881", "DetectTime": "2023-10-30T14:04:24.905768+02:00", "EventTime": "2023-10-30T14:04:24.905786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CiV2YL1msmVtACM7E9"]} -{"Format": "IDEA0", "ID": "39782747-70ea-4d14-a5fa-3fd173133956", "DetectTime": "2023-10-30T14:04:24.930054+02:00", "EventTime": "2023-10-30T14:04:24.930071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CVdmBA1J2TfROhjAXl"]} -{"Format": "IDEA0", "ID": "4c4959b5-ffc9-4fde-9639-4c81ae84f2ee", "DetectTime": "2023-10-30T14:04:24.964147+02:00", "EventTime": "2023-10-30T14:04:24.964160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["Ca4ZNy2LWNKeUBIwDi"]} -{"Format": "IDEA0", "ID": "61420272-2b11-49f3-bc03-fdebbc6f9452", "DetectTime": "2023-10-30T14:04:24.988428+02:00", "EventTime": "2023-10-30T14:04:24.988447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["Cs0b1SIPyDlIQoSea"]} -{"Format": "IDEA0", "ID": "4c3c4266-1497-4aad-9acc-585d8cb8b69c", "DetectTime": "2023-10-30T14:04:25.010536+02:00", "EventTime": "2023-10-30T14:04:25.010548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CVyh7s4NdxIP8O2uV8"]} -{"Format": "IDEA0", "ID": "e366332a-6c47-49ee-9174-54a6e2546a83", "DetectTime": "2023-10-30T14:04:25.038672+02:00", "EventTime": "2023-10-30T14:04:25.038689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CUYJFY1qsoMqhu4zbk"]} -{"Format": "IDEA0", "ID": "60c0b523-1674-4eb5-88d4-0c17e578d845", "DetectTime": "2023-10-30T14:04:25.061276+02:00", "EventTime": "2023-10-30T14:04:25.061288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["C7W98o1Qy7lrkVsDSf"]} -{"Format": "IDEA0", "ID": "1adfa5ae-1809-44b7-a4fb-8eebc0569c14", "DetectTime": "2023-10-30T14:04:25.083835+02:00", "EventTime": "2023-10-30T14:04:25.083853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CkcDt9IlVevKCf3Ye"]} -{"Format": "IDEA0", "ID": "559ac922-1c4d-4199-a8c3-fa08355d0bc9", "DetectTime": "2023-10-30T14:04:25.124073+02:00", "EventTime": "2023-10-30T14:04:25.124095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.74.131.196"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.74.131.196 ", "ContentType": "text/plain"}], "uids": ["CrnxNlfPfbmHuQvLk"]} -{"Format": "IDEA0", "ID": "e40656c9-6541-4d8f-8a37-09f5eaa45383", "DetectTime": "2023-10-30T14:04:25.161517+02:00", "EventTime": "2023-10-30T14:04:25.161534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CgHn3O22TZ1XedYTN8"]} -{"Format": "IDEA0", "ID": "5b9d1277-3996-48c3-97f8-a8c136b48a20", "DetectTime": "2023-10-30T14:04:25.196576+02:00", "EventTime": "2023-10-30T14:04:25.196588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.80.149 ", "ContentType": "text/plain"}], "uids": ["CCNMO71prItqwNCui"]} -{"Format": "IDEA0", "ID": "39f30523-ad90-4dc0-a1a5-6a565354bbdb", "DetectTime": "2023-10-30T14:04:25.229373+02:00", "EventTime": "2023-10-30T14:04:25.229392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.11.249.52 ", "ContentType": "text/plain"}], "uids": ["Cvr9ZQ2tX03WH5fnpl"]} -{"Format": "IDEA0", "ID": "6e9b3920-9ac7-42a0-b42c-1b3438ca3332", "DetectTime": "2023-10-30T14:04:25.253092+02:00", "EventTime": "2023-10-30T14:04:25.253112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["ChowTECmlK89Hj1p9"]} -{"Format": "IDEA0", "ID": "d6f1c8e1-d315-41e7-a9ce-58e88c15eb36", "DetectTime": "2023-10-30T14:04:25.276583+02:00", "EventTime": "2023-10-30T14:04:25.276602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CAmgMB4B0xmAOIsa74"]} -{"Format": "IDEA0", "ID": "7c9895bc-93f1-4744-9919-8bfc1b81b3e4", "DetectTime": "2023-10-30T14:04:25.310728+02:00", "EventTime": "2023-10-30T14:04:25.310745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.166.143.39 ", "ContentType": "text/plain"}], "uids": ["CI78LM3WK21EirBqdg"]} -{"Format": "IDEA0", "ID": "72c8c59e-7099-44fb-9966-040b9fdfeab2", "DetectTime": "2023-10-30T14:04:25.347111+02:00", "EventTime": "2023-10-30T14:04:25.347134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["C1Lq324TpQk2J6ZMl3"]} -{"Format": "IDEA0", "ID": "bc7a384d-76c1-4adb-b0da-40ac3bdba2ee", "DetectTime": "2023-10-30T14:04:25.376404+02:00", "EventTime": "2023-10-30T14:04:25.376420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CaFRVI3VY3kDPi56D6"]} -{"Format": "IDEA0", "ID": "25dac261-1282-4336-b8e0-3ac39f4fd35a", "DetectTime": "2023-10-30T14:04:25.402866+02:00", "EventTime": "2023-10-30T14:04:25.402888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.74.131.196"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.74.131.196 ", "ContentType": "text/plain"}], "uids": ["CazSs34ckD6BgmJFAl"]} -{"Format": "IDEA0", "ID": "365edaf7-87c4-49bb-a76f-4e5d8a75f1f6", "DetectTime": "2023-10-30T14:04:25.424123+02:00", "EventTime": "2023-10-30T14:04:25.424144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["CW86tyMOTBhWq6125"]} -{"Format": "IDEA0", "ID": "274fc5a6-e981-406c-9929-57c951222d74", "DetectTime": "2023-10-30T14:04:25.448454+02:00", "EventTime": "2023-10-30T14:04:25.448472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CQZWcL2ampG9iVX0Ue"]} -{"Format": "IDEA0", "ID": "176b8eae-34cc-486c-9fd9-7f8a950a7d34", "DetectTime": "2023-10-30T14:04:25.486033+02:00", "EventTime": "2023-10-30T14:04:25.486050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["CTpGV24pNPsL7srPj8"]} -{"Format": "IDEA0", "ID": "cb000ef8-b457-459c-b188-511a85e02030", "DetectTime": "2023-10-30T14:04:25.522516+02:00", "EventTime": "2023-10-30T14:04:25.522545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["Cw5ChRMJZFQdoNEf8"]} -{"Format": "IDEA0", "ID": "05183760-d995-4379-a63b-47174ae90f87", "DetectTime": "2023-10-30T14:04:25.546685+02:00", "EventTime": "2023-10-30T14:04:25.546702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CDgTFf4amxNZK1xzz1"]} -{"Format": "IDEA0", "ID": "d37c5a4b-e9c6-4bbd-83ea-ffa08c8366bc", "DetectTime": "2023-10-30T14:04:25.572987+02:00", "EventTime": "2023-10-30T14:04:25.573003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CPHM4i2vsnC2iSn7d7"]} -{"Format": "IDEA0", "ID": "abb2ba1a-62cb-4dd4-968c-0acfae708cc5", "DetectTime": "2023-10-30T14:04:25.594220+02:00", "EventTime": "2023-10-30T14:04:25.594237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.42.42 ", "ContentType": "text/plain"}], "uids": ["CQJsLz4qahRFkgJYVk"]} -{"Format": "IDEA0", "ID": "2bd869e9-58f3-40aa-a943-ae7350c33dd5", "DetectTime": "2023-10-30T14:04:25.617140+02:00", "EventTime": "2023-10-30T14:04:25.617159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.74.131.196"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.74.131.196 ", "ContentType": "text/plain"}], "uids": ["Cm75g2XDtxoZOA0jd"]} -{"Format": "IDEA0", "ID": "e57b8f9e-3fe1-4c43-b250-e96f5da581ff", "DetectTime": "2023-10-30T14:04:25.641273+02:00", "EventTime": "2023-10-30T14:04:25.641294+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClY6372jjllAgXd0y4"]} -{"Format": "IDEA0", "ID": "744fd30b-cea5-4fb5-903b-a820e5d723bf", "DetectTime": "2023-10-30T14:04:25.648432+02:00", "EventTime": "2023-10-30T14:04:25.648454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["CVvfWY2bC8TF5x2zb7"]} -{"Format": "IDEA0", "ID": "14950924-982f-4b69-864e-e4ed2fdde28c", "DetectTime": "2023-10-30T14:04:25.677725+02:00", "EventTime": "2023-10-30T14:04:25.677743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CMoC9r1TT3I0Irbs94"]} -{"Format": "IDEA0", "ID": "91d84ef5-14dd-482e-b504-35ec513ec8af", "DetectTime": "2023-10-30T14:04:25.701667+02:00", "EventTime": "2023-10-30T14:04:25.701682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.96.182.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.96.182.207 ", "ContentType": "text/plain"}], "uids": ["C4sFBZUSygcKco0Oc"]} -{"Format": "IDEA0", "ID": "6a11aebc-8be7-443c-949a-f1d76ca3b8ba", "DetectTime": "2023-10-30T14:04:25.724589+02:00", "EventTime": "2023-10-30T14:04:25.724606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.42.42 ", "ContentType": "text/plain"}], "uids": ["CiSEhd3KnR3KL52t7f"]} -{"Format": "IDEA0", "ID": "02854d22-68eb-4bda-a18c-477ae686ca71", "DetectTime": "2023-10-30T14:04:25.759157+02:00", "EventTime": "2023-10-30T14:04:25.759175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["C16Tfq3HiPdDmdpT1k"]} -{"Format": "IDEA0", "ID": "0cbd6eb5-6caf-4436-900d-ab22af40725e", "DetectTime": "2023-10-30T14:04:25.780494+02:00", "EventTime": "2023-10-30T14:04:25.780511+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8BwKK2zYf8Y7rJKLc"]} -{"Format": "IDEA0", "ID": "c1764f8e-5776-470f-a4c5-2db40248b39a", "DetectTime": "2023-10-30T14:04:25.786713+02:00", "EventTime": "2023-10-30T14:04:25.786731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["C9H6E93Imz94g3OOIk"]} -{"Format": "IDEA0", "ID": "3180893f-11fb-4591-8ff0-321457f3d46e", "DetectTime": "2023-10-30T14:04:25.833826+02:00", "EventTime": "2023-10-30T14:04:25.833847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CzR6Vn3RFEqZSjtlq9"]} -{"Format": "IDEA0", "ID": "bbcfc79a-ee29-47ec-ba0a-41acb60bda0d", "DetectTime": "2023-10-30T14:04:25.871602+02:00", "EventTime": "2023-10-30T14:04:25.871616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CBhAo14DFBO9MAfFn8"]} -{"Format": "IDEA0", "ID": "9b54692d-4b2d-4bb5-8e69-3825687c164e", "DetectTime": "2023-10-30T14:04:25.906738+02:00", "EventTime": "2023-10-30T14:04:25.906755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CteNFG1VqJjJSqlg4k"]} -{"Format": "IDEA0", "ID": "1ffeef02-c25b-4d1e-9a49-abbe363109cc", "DetectTime": "2023-10-30T14:04:25.928405+02:00", "EventTime": "2023-10-30T14:04:25.928422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CsfMrb4JR9URJDTCVc"]} -{"Format": "IDEA0", "ID": "6e3375da-0320-47e9-90bd-8011cdb924a6", "DetectTime": "2023-10-30T14:04:25.966418+02:00", "EventTime": "2023-10-30T14:04:25.966430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CtNLDF24b5jU64Ctfd"]} -{"Format": "IDEA0", "ID": "ccc7c814-ed02-4674-9a26-c0843a765123", "DetectTime": "2023-10-30T14:04:26.004237+02:00", "EventTime": "2023-10-30T14:04:26.004253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CH9ZOvgXyl6fvU048"]} -{"Format": "IDEA0", "ID": "be538f22-2fad-45be-a753-73f14e598a6e", "DetectTime": "2023-10-30T14:04:26.033509+02:00", "EventTime": "2023-10-30T14:04:26.033520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["Ce8Prov8vBxa1quzf"]} -{"Format": "IDEA0", "ID": "f89901e2-7886-4ea2-a56f-34c44c69ca9c", "DetectTime": "2023-10-30T14:04:26.065241+02:00", "EventTime": "2023-10-30T14:04:26.065258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.55.57.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.55.57.160 ", "ContentType": "text/plain"}], "uids": ["C7VimJ393n0WVwBX4"]} -{"Format": "IDEA0", "ID": "fc195a50-9410-41f6-b7ef-6a1ba314fcf9", "DetectTime": "2023-10-30T14:04:26.102845+02:00", "EventTime": "2023-10-30T14:04:26.102863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Cgd8XWkGv5vRmawQ4"]} -{"Format": "IDEA0", "ID": "87b274f5-2e12-4e1a-a9a5-b0b9f1d6cb57", "DetectTime": "2023-10-30T14:04:26.139665+02:00", "EventTime": "2023-10-30T14:04:26.139683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["CC3Nmn1NLN4ZlLODtb"]} -{"Format": "IDEA0", "ID": "f762be8a-9098-48ee-ac16-7056deaebe86", "DetectTime": "2023-10-30T14:04:26.177357+02:00", "EventTime": "2023-10-30T14:04:26.177374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CFbuaB1gK6NfuiwRl9"]} -{"Format": "IDEA0", "ID": "bbfa4d1f-c248-4b92-8a6c-90dbec4759a5", "DetectTime": "2023-10-30T14:04:26.217221+02:00", "EventTime": "2023-10-30T14:04:26.217241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CBwqYSAMt5y5RIaTk"]} -{"Format": "IDEA0", "ID": "06b8043a-5bb8-489c-817e-68119c2842db", "DetectTime": "2023-10-30T14:04:26.256469+02:00", "EventTime": "2023-10-30T14:04:26.256486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.180.153.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.180.153.115 ", "ContentType": "text/plain"}], "uids": ["CCFBq71VgKgOz2Gkhj"]} -{"Format": "IDEA0", "ID": "dd296fc2-439e-482a-9436-2da85cb4d284", "DetectTime": "2023-10-30T14:04:26.290884+02:00", "EventTime": "2023-10-30T14:04:26.290900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C0hRlj4O6YF3t9Lazk"]} -{"Format": "IDEA0", "ID": "ba569fb3-bbb1-4088-b7c2-351450c972f6", "DetectTime": "2023-10-30T14:04:26.325809+02:00", "EventTime": "2023-10-30T14:04:26.325829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["C5upZ91CM6U0KF8DWb"]} -{"Format": "IDEA0", "ID": "d920c665-a756-4b97-a090-81b6e06a0290", "DetectTime": "2023-10-30T14:04:26.358829+02:00", "EventTime": "2023-10-30T14:04:26.358849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["CPuoR3XRgNnBQo5Z3"]} -{"Format": "IDEA0", "ID": "f1b5b902-0e97-4b28-b8b5-1e083122d450", "DetectTime": "2023-10-30T14:04:26.389670+02:00", "EventTime": "2023-10-30T14:04:26.389687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CKQQiN2goabQp9QR4b"]} -{"Format": "IDEA0", "ID": "3c25be94-2fb3-45b2-9e94-350172854523", "DetectTime": "2023-10-30T14:04:26.422947+02:00", "EventTime": "2023-10-30T14:04:26.422963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.166.143.39 ", "ContentType": "text/plain"}], "uids": ["CQjoamjMsaRpycDHh"]} -{"Format": "IDEA0", "ID": "0d797441-bd55-4550-9125-f10a2e653a51", "DetectTime": "2023-10-30T14:04:26.452155+02:00", "EventTime": "2023-10-30T14:04:26.452174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["CBIMWp37Wrpeq6AMl2"]} -{"Format": "IDEA0", "ID": "169670e8-5a83-4915-ac32-1ebcef910de1", "DetectTime": "2023-10-30T14:04:26.482796+02:00", "EventTime": "2023-10-30T14:04:26.482822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.131.151.100 ", "ContentType": "text/plain"}], "uids": ["CrEIKf1fpy5sUZzDY7"]} -{"Format": "IDEA0", "ID": "9f277ed0-66f4-46bf-a100-010799b79389", "DetectTime": "2023-10-30T14:04:26.506368+02:00", "EventTime": "2023-10-30T14:04:26.506390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C01t6KthGCJPVLyl"]} -{"Format": "IDEA0", "ID": "9ed421e0-c199-4377-a764-0f8b4d22059c", "DetectTime": "2023-10-30T14:04:26.536908+02:00", "EventTime": "2023-10-30T14:04:26.536927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.11.249.52 ", "ContentType": "text/plain"}], "uids": ["C82o773FXxHIM0ztqi"]} -{"Format": "IDEA0", "ID": "3e28f553-0d74-4e6d-b069-fe9673d9dba3", "DetectTime": "2023-10-30T14:04:26.572037+02:00", "EventTime": "2023-10-30T14:04:26.572053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["C9EHV5hBrJVpLHNJl"]} -{"Format": "IDEA0", "ID": "ce7e76e3-c7ed-46a5-aa32-2ac4e01882d3", "DetectTime": "2023-10-30T14:04:26.604666+02:00", "EventTime": "2023-10-30T14:04:26.604683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CHaVnz4XdWo4tuDJg5"]} -{"Format": "IDEA0", "ID": "1721f8b6-1d75-4ce1-8f76-70eb62f6d967", "DetectTime": "2023-10-30T14:04:26.634766+02:00", "EventTime": "2023-10-30T14:04:26.634806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["C47eaj4FhDTp5vfPC3"]} -{"Format": "IDEA0", "ID": "eac33fdc-ad58-40fc-b8c0-758a6c792111", "DetectTime": "2023-10-30T14:04:26.662988+02:00", "EventTime": "2023-10-30T14:04:26.663005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["ColoP62owvC05kcPt"]} -{"Format": "IDEA0", "ID": "0d4fb9d6-e244-418f-ba8d-fcbcb918c1a8", "DetectTime": "2023-10-30T14:04:26.690569+02:00", "EventTime": "2023-10-30T14:04:26.690586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CIWTSu4nugk9aEZ8Xh"]} -{"Format": "IDEA0", "ID": "1ce21527-7a1e-4a7c-b8e0-da99097d4eac", "DetectTime": "2023-10-30T14:04:26.723705+02:00", "EventTime": "2023-10-30T14:04:26.723723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CSmxRfW4Zg6zmY24j"]} -{"Format": "IDEA0", "ID": "ff2a839b-3fb2-48cc-a66c-6134d2f3da9d", "DetectTime": "2023-10-30T14:04:26.752201+02:00", "EventTime": "2023-10-30T14:04:26.752222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CDbI831wXC2pHsZw7g"]} -{"Format": "IDEA0", "ID": "33f6d70f-8846-4f28-bef8-e22d46120e05", "DetectTime": "2023-10-30T14:04:26.782379+02:00", "EventTime": "2023-10-30T14:04:26.782400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CkM6rD4YYYmPaSrQfl"]} -{"Format": "IDEA0", "ID": "a52b10a3-904d-4fe8-8441-6948cf2f1450", "DetectTime": "2023-10-30T14:04:26.813493+02:00", "EventTime": "2023-10-30T14:04:26.813516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CKHHhu1DbL0eYMjzid"]} -{"Format": "IDEA0", "ID": "5c62e997-f8ce-4fec-aab1-d0b21c6bed66", "DetectTime": "2023-10-30T14:04:26.842800+02:00", "EventTime": "2023-10-30T14:04:26.842817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CMnY2z2PmAbbWbvd7a"]} -{"Format": "IDEA0", "ID": "dab22177-0dda-4bbc-854d-b725d83afd5c", "DetectTime": "2023-10-30T14:04:26.873115+02:00", "EventTime": "2023-10-30T14:04:26.873155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CMBPDSfoA4Bk6qSCd"]} -{"Format": "IDEA0", "ID": "bd313660-c5af-4217-8878-6d17e373adac", "DetectTime": "2023-10-30T14:04:26.903919+02:00", "EventTime": "2023-10-30T14:04:26.903939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.94.158.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.94.158.164 ", "ContentType": "text/plain"}], "uids": ["CG88XF2eggGEwy0tb4"]} -{"Format": "IDEA0", "ID": "43e03d63-d69d-477c-b7a8-61028996a8bb", "DetectTime": "2023-10-30T14:04:26.930711+02:00", "EventTime": "2023-10-30T14:04:26.930724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CWsEPg2Yp4DnDIYoE8"]} -{"Format": "IDEA0", "ID": "f1b59132-ae01-403b-8bfd-93974e46f623", "DetectTime": "2023-10-30T14:04:26.959093+02:00", "EventTime": "2023-10-30T14:04:26.959112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.42.42 ", "ContentType": "text/plain"}], "uids": ["C16lmq2348fuXbPQp1"]} -{"Format": "IDEA0", "ID": "b2f3f331-6889-44d4-ab5c-d057f62ca67a", "DetectTime": "2023-10-30T14:04:27.102162+02:00", "EventTime": "2023-10-30T14:04:27.102181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CPaZFnN7q1DNLeES3"]} -{"Format": "IDEA0", "ID": "0d63dd6e-617b-4765-8492-2401880f0b3c", "DetectTime": "2023-10-30T14:04:27.132055+02:00", "EventTime": "2023-10-30T14:04:27.132073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CHKHRC3AJwszi7lfe4"]} -{"Format": "IDEA0", "ID": "b17cca18-c21f-4fea-ad13-ea08de5bc4a0", "DetectTime": "2023-10-30T14:04:27.164061+02:00", "EventTime": "2023-10-30T14:04:27.164082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["C10ih84DyjSny8xZP8"]} -{"Format": "IDEA0", "ID": "d1bdf408-d90b-4ed7-9e1d-82f63afccb76", "DetectTime": "2023-10-30T14:04:27.194034+02:00", "EventTime": "2023-10-30T14:04:27.194052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C3exj74ecXYUzuKeG6"]} -{"Format": "IDEA0", "ID": "e5d096f6-ce8b-47ec-ab52-cb584288d4df", "DetectTime": "2023-10-30T14:04:27.225016+02:00", "EventTime": "2023-10-30T14:04:27.225031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CCi5iV3YyJxrBOg3rc"]} -{"Format": "IDEA0", "ID": "e7317bf7-6259-42d5-81a9-26b4e130a576", "DetectTime": "2023-10-30T14:04:27.256839+02:00", "EventTime": "2023-10-30T14:04:27.256954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["CGLMrMGPFoEqcuH0h"]} -{"Format": "IDEA0", "ID": "dd16dc05-b90d-45a6-8e02-0e3a8e142a17", "DetectTime": "2023-10-30T14:04:27.287047+02:00", "EventTime": "2023-10-30T14:04:27.287075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CBzo2HA8Mqqy8dP6d"]} -{"Format": "IDEA0", "ID": "ee45b92b-96a1-4891-ab91-234471228915", "DetectTime": "2023-10-30T14:04:27.319442+02:00", "EventTime": "2023-10-30T14:04:27.319462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["CgMcgC3KXfWacC6pf9"]} -{"Format": "IDEA0", "ID": "572e4745-f7a1-44e2-b241-f2cba172e7d4", "DetectTime": "2023-10-30T14:04:27.345895+02:00", "EventTime": "2023-10-30T14:04:27.345907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CjrqSu4KpQjrBAW8kh"]} -{"Format": "IDEA0", "ID": "bc199c4b-a926-4420-9f43-e878ff265b7c", "DetectTime": "2023-10-30T14:04:27.377418+02:00", "EventTime": "2023-10-30T14:04:27.377434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CTegWd3H1jl80dh0Ue"]} -{"Format": "IDEA0", "ID": "7a471ef0-01d6-47ea-9142-7190fa0d40f7", "DetectTime": "2023-10-30T14:04:27.409654+02:00", "EventTime": "2023-10-30T14:04:27.409670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CYslQFx2GS9WlYLq2"]} -{"Format": "IDEA0", "ID": "9a0b3640-ade7-4e92-aded-a526a6cc6767", "DetectTime": "2023-10-30T14:04:27.440192+02:00", "EventTime": "2023-10-30T14:04:27.440210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CcoJGwW0mkbkLYDIc"]} -{"Format": "IDEA0", "ID": "b75c8f4c-4a60-4ad3-9049-017b46b17d59", "DetectTime": "2023-10-30T14:04:27.470492+02:00", "EventTime": "2023-10-30T14:04:27.470512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CnVYT81kuYd0OlEnh4"]} -{"Format": "IDEA0", "ID": "d3a87d33-f29e-4aff-a012-8fc4cfa40423", "DetectTime": "2023-10-30T14:04:27.500009+02:00", "EventTime": "2023-10-30T14:04:27.500033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["C2remc3OutyhgEPSK3"]} -{"Format": "IDEA0", "ID": "83da312d-4f9a-40ba-a7d6-22e5fd6504c1", "DetectTime": "2023-10-30T14:04:27.536884+02:00", "EventTime": "2023-10-30T14:04:27.536898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.80.149 ", "ContentType": "text/plain"}], "uids": ["CwHMmIyAHOg4WquMi"]} -{"Format": "IDEA0", "ID": "bbf0df77-3d05-4dd6-9310-603ea946052d", "DetectTime": "2023-10-30T14:04:27.563783+02:00", "EventTime": "2023-10-30T14:04:27.563800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CGLzKr4iTRXENiNn84"]} -{"Format": "IDEA0", "ID": "97b03bb2-18e3-49c7-8143-94bb181c600f", "DetectTime": "2023-10-30T14:04:27.599752+02:00", "EventTime": "2023-10-30T14:04:27.599774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CmwHtV1uirZjFAoO3d"]} -{"Format": "IDEA0", "ID": "c6c6fdca-b8f4-4035-81eb-e2a53cc6a33a", "DetectTime": "2023-10-30T14:04:27.629420+02:00", "EventTime": "2023-10-30T14:04:27.629439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["CIoC9A3NXcooDmeSDd"]} -{"Format": "IDEA0", "ID": "f92da7e7-a51f-4e57-aada-f1cdd5b9158e", "DetectTime": "2023-10-30T14:04:27.665967+02:00", "EventTime": "2023-10-30T14:04:27.665989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CxHTOx2Cu4NjpaVFQl"]} -{"Format": "IDEA0", "ID": "d5f639a9-2aa2-4209-b0fe-5e7fac9703f0", "DetectTime": "2023-10-30T14:04:27.701118+02:00", "EventTime": "2023-10-30T14:04:27.701131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C65KyF3yhK3QVUOasl"]} -{"Format": "IDEA0", "ID": "0b62a086-cdd3-43da-b582-91e1e1e2c1f4", "DetectTime": "2023-10-30T14:04:27.731063+02:00", "EventTime": "2023-10-30T14:04:27.731082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CDVzlC2xG6yPVnHc52"]} -{"Format": "IDEA0", "ID": "279b3a06-4473-45a2-b970-fa69182807a5", "DetectTime": "2023-10-30T14:04:27.764002+02:00", "EventTime": "2023-10-30T14:04:27.764019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CBBqnk16Lwvn9FR2Zc"]} -{"Format": "IDEA0", "ID": "d429b862-aada-461d-a3fa-0312508a079e", "DetectTime": "2023-10-30T14:04:27.794612+02:00", "EventTime": "2023-10-30T14:04:27.794628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C55uJHazMuPkQmOw3"]} -{"Format": "IDEA0", "ID": "6fffccc9-813b-4a8c-879d-4dba57eab97b", "DetectTime": "2023-10-30T14:04:27.829789+02:00", "EventTime": "2023-10-30T14:04:27.829808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["CP6Ce11Ppq7ZwFD9Ac"]} -{"Format": "IDEA0", "ID": "9fc8d10b-b484-4cb9-9951-e1eda604ffbe", "DetectTime": "2023-10-30T14:04:27.864162+02:00", "EventTime": "2023-10-30T14:04:27.864246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.191.210 ", "ContentType": "text/plain"}], "uids": ["C3ModD43MXswrjSx1j"]} -{"Format": "IDEA0", "ID": "c98b40e8-2bcb-4c0c-9381-b72c49b3d86a", "DetectTime": "2023-10-30T14:04:27.901873+02:00", "EventTime": "2023-10-30T14:04:27.901893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPIrdc35oveJmCd1Ag"]} -{"Format": "IDEA0", "ID": "c14da4ec-4060-4833-8995-f06d217c8f80", "DetectTime": "2023-10-30T14:04:27.930935+02:00", "EventTime": "2023-10-30T14:04:27.930953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CXolFc27YErT1Bthda"]} -{"Format": "IDEA0", "ID": "d0788403-f731-4e7f-b632-e4fb934d8597", "DetectTime": "2023-10-30T14:04:27.963398+02:00", "EventTime": "2023-10-30T14:04:27.963415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["C4Ge5C34ndiyQhZ3s6"]} -{"Format": "IDEA0", "ID": "7b51d186-0b7f-4843-acee-16fe2209d26f", "DetectTime": "2023-10-30T14:04:27.991342+02:00", "EventTime": "2023-10-30T14:04:27.991358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.11.249.52 ", "ContentType": "text/plain"}], "uids": ["CMnkFi2BvbJ5BBewTl"]} -{"Format": "IDEA0", "ID": "4a026754-65d1-4907-9f36-71c375da6055", "DetectTime": "2023-10-30T14:04:28.022978+02:00", "EventTime": "2023-10-30T14:04:28.022996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CoZaRV245y4KIU4iQ9"]} -{"Format": "IDEA0", "ID": "cca9a11f-0fda-400a-a386-19dce45fa02b", "DetectTime": "2023-10-30T14:04:28.047075+02:00", "EventTime": "2023-10-30T14:04:28.047092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.11.249.52 ", "ContentType": "text/plain"}], "uids": ["CA9jUK1ia5uBYO7Iki"]} -{"Format": "IDEA0", "ID": "6a1c2647-1194-4e0b-8799-a5f5785b2fb5", "DetectTime": "2023-10-30T14:04:28.075111+02:00", "EventTime": "2023-10-30T14:04:28.075123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.80.149 ", "ContentType": "text/plain"}], "uids": ["Cj5PQz1Zh7AE6bKlsc"]} -{"Format": "IDEA0", "ID": "5e504e95-c96f-4fbc-8d27-a4a4fc794185", "DetectTime": "2023-10-30T14:04:28.104345+02:00", "EventTime": "2023-10-30T14:04:28.104370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.42.42 ", "ContentType": "text/plain"}], "uids": ["CBzDih3Oo5qdQE1p9d"]} -{"Format": "IDEA0", "ID": "05be4566-c4cd-4455-9082-c1099aa46623", "DetectTime": "2023-10-30T14:04:28.133942+02:00", "EventTime": "2023-10-30T14:04:28.133953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CTagXZ2SsEiQe6maP7"]} -{"Format": "IDEA0", "ID": "21dcf9d2-ed7b-4fdb-b84f-48f1cb354c99", "DetectTime": "2023-10-30T14:04:28.159990+02:00", "EventTime": "2023-10-30T14:04:28.160000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["C6Y96lh0rXRVZSly3"]} -{"Format": "IDEA0", "ID": "eae8c4be-1a04-4745-a297-46ea4beb404e", "DetectTime": "2023-10-30T14:04:28.189321+02:00", "EventTime": "2023-10-30T14:04:28.189338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CSPRbK3YwqxMNqQAoh"]} -{"Format": "IDEA0", "ID": "3557724f-5c41-438a-ab59-9917329a6c99", "DetectTime": "2023-10-30T14:04:28.219838+02:00", "EventTime": "2023-10-30T14:04:28.219859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CGhPvF1euxoybvHXSd"]} -{"Format": "IDEA0", "ID": "9fe00853-2c18-439f-a49f-ae2f1a299f28", "DetectTime": "2023-10-30T14:04:28.248746+02:00", "EventTime": "2023-10-30T14:04:28.248759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CNa1o11m42wBIShEG2"]} -{"Format": "IDEA0", "ID": "b5cb6f63-2265-4901-8ad4-f424a40e2c62", "DetectTime": "2023-10-30T14:04:28.280864+02:00", "EventTime": "2023-10-30T14:04:28.280880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CLHJdp4EFsVbGd7GWg"]} -{"Format": "IDEA0", "ID": "5e286fa5-e409-47cd-b5de-34fca12770e3", "DetectTime": "2023-10-30T14:04:28.310335+02:00", "EventTime": "2023-10-30T14:04:28.310350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["C8hNIo24fyGBbrVAXa"]} -{"Format": "IDEA0", "ID": "a8328118-4673-4ced-b230-4ccc8ba89369", "DetectTime": "2023-10-30T14:04:28.341410+02:00", "EventTime": "2023-10-30T14:04:28.341422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CMkz5b2FvJJ9DUdVy"]} -{"Format": "IDEA0", "ID": "25edd9bf-a6e8-4ded-830c-a2ff83467cd7", "DetectTime": "2023-10-30T14:04:28.381838+02:00", "EventTime": "2023-10-30T14:04:28.381856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CVEv981XP2CCDLqDv9"]} -{"Format": "IDEA0", "ID": "69a5e0fb-96d0-4f79-8a8f-8c209f8cf6a8", "DetectTime": "2023-10-30T14:04:28.427601+02:00", "EventTime": "2023-10-30T14:04:28.427624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["Cymy2O1CbUgpuErYWh"]} -{"Format": "IDEA0", "ID": "7e254835-f059-4b9c-a9dd-8763babf7525", "DetectTime": "2023-10-30T14:04:28.476865+02:00", "EventTime": "2023-10-30T14:04:28.476885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CHiqbK10jKo3LlGeoc"]} -{"Format": "IDEA0", "ID": "79a9a3e4-a03a-4520-81c8-a183210c3b02", "DetectTime": "2023-10-30T14:04:28.518252+02:00", "EventTime": "2023-10-30T14:04:28.518266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CMUFGrWGFVSlcUGP7"]} -{"Format": "IDEA0", "ID": "b1be11dd-f541-4a0c-b28a-e3ada74604b9", "DetectTime": "2023-10-30T14:04:28.553133+02:00", "EventTime": "2023-10-30T14:04:28.553154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CbsqXV3p6DKsb9IiA8"]} -{"Format": "IDEA0", "ID": "742030d2-5dea-4bcc-aa39-2829b8ae1377", "DetectTime": "2023-10-30T14:04:28.587969+02:00", "EventTime": "2023-10-30T14:04:28.587986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cl2ypl44MgtEm9CHVc"]} -{"Format": "IDEA0", "ID": "e9efc37e-73c8-4c66-8216-a5345ecde285", "DetectTime": "2023-10-30T14:04:28.617592+02:00", "EventTime": "2023-10-30T14:04:28.617610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.166.143.39 ", "ContentType": "text/plain"}], "uids": ["CIpPoJfwVhj5GGQ35"]} -{"Format": "IDEA0", "ID": "56603079-0730-41f4-b6f8-84290c5ce899", "DetectTime": "2023-10-30T14:04:28.652770+02:00", "EventTime": "2023-10-30T14:04:28.652782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CoFhus1SSwmbHPBMRj"]} -{"Format": "IDEA0", "ID": "41b26dc2-71ef-4a6f-8bbb-edae111631b6", "DetectTime": "2023-10-30T14:04:28.684297+02:00", "EventTime": "2023-10-30T14:04:28.684319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CtOSQx38yF4AK9Egid"]} -{"Format": "IDEA0", "ID": "c3c2d741-c72d-4521-a9c4-b6e9fdee5e29", "DetectTime": "2023-10-30T14:04:28.718306+02:00", "EventTime": "2023-10-30T14:04:28.718322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CpVVT943kUmKXMEKJd"]} -{"Format": "IDEA0", "ID": "397d67a4-e1a3-4934-b26d-06129f2885e5", "DetectTime": "2023-10-30T14:04:28.757472+02:00", "EventTime": "2023-10-30T14:04:28.757490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CB4rU7sjH0fFkZjfe"]} -{"Format": "IDEA0", "ID": "5ece9890-edf5-4090-b8de-6aa55c57d0ae", "DetectTime": "2023-10-30T14:04:28.793475+02:00", "EventTime": "2023-10-30T14:04:28.793491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["Cvd5E14KEEWInzn6R6"]} -{"Format": "IDEA0", "ID": "8e0ce98f-8ce1-4a2e-ace4-20e6470c23e6", "DetectTime": "2023-10-30T14:04:28.819252+02:00", "EventTime": "2023-10-30T14:04:28.819270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CACz5O3MA1VOfZQEek"]} -{"Format": "IDEA0", "ID": "9641ad17-f968-4cbe-a566-be9c033abc61", "DetectTime": "2023-10-30T14:04:28.846204+02:00", "EventTime": "2023-10-30T14:04:28.846221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CFMfJ04s0aMG5Npe38"]} -{"Format": "IDEA0", "ID": "854f11dd-3ae2-4f95-810f-79725aff0976", "DetectTime": "2023-10-30T14:04:28.872200+02:00", "EventTime": "2023-10-30T14:04:28.872215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CJIdUhzhTzowvcVI8"]} -{"Format": "IDEA0", "ID": "6d143c15-b891-4569-98bb-7b0211215688", "DetectTime": "2023-10-30T14:04:28.899323+02:00", "EventTime": "2023-10-30T14:04:28.899334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["C7Xe5DC9F9YQu30ol"]} -{"Format": "IDEA0", "ID": "ddf2d809-ba04-4ac2-8fec-9d7aff50c414", "DetectTime": "2023-10-30T14:04:28.923100+02:00", "EventTime": "2023-10-30T14:04:28.923120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["CkwVeM154wZKgBWeNk"]} -{"Format": "IDEA0", "ID": "14076497-d657-48d3-8eff-5740bdf4405c", "DetectTime": "2023-10-30T14:04:28.952150+02:00", "EventTime": "2023-10-30T14:04:28.952168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CxyO1t4OkUjBh8uezj"]} -{"Format": "IDEA0", "ID": "22aeb97d-71ea-4ac8-9540-84ff6d19442e", "DetectTime": "2023-10-30T14:04:28.977552+02:00", "EventTime": "2023-10-30T14:04:28.977569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. ", "ContentType": "text/plain"}], "uids": ["CwlHWN3k3vhPrGp173"]} -{"Format": "IDEA0", "ID": "be377cc9-1e3d-4929-a4f8-e83735bb6aaf", "DetectTime": "2023-10-30T14:04:29.020479+02:00", "EventTime": "2023-10-30T14:04:29.020497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["C2XPz64XL05OuMYuOi"]} -{"Format": "IDEA0", "ID": "1cfeeddb-4556-4590-bc97-bf60a7710ad4", "DetectTime": "2023-10-30T14:04:29.066306+02:00", "EventTime": "2023-10-30T14:04:29.066317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CsLgWF4dqyned22oX8"]} -{"Format": "IDEA0", "ID": "f91b8338-4118-4ad9-9e52-a34db7638000", "DetectTime": "2023-10-30T14:04:29.100935+02:00", "EventTime": "2023-10-30T14:04:29.100961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["C7lDtw2I8NWS8Cy8r4"]} -{"Format": "IDEA0", "ID": "8098d10a-953d-4176-a779-91697e590ab1", "DetectTime": "2023-10-30T14:04:29.147300+02:00", "EventTime": "2023-10-30T14:04:29.147320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C7P45z3tKNXiSDtB54"]} -{"Format": "IDEA0", "ID": "da714b2f-4fb5-45d9-8b8b-dffa8dc4e374", "DetectTime": "2023-10-30T14:04:29.199202+02:00", "EventTime": "2023-10-30T14:04:29.199221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CDA2ug1Gz81ntmnm03"]} -{"Format": "IDEA0", "ID": "5081e7d6-5f03-4b9b-9e02-6cf832911fb4", "DetectTime": "2023-10-30T14:04:29.249658+02:00", "EventTime": "2023-10-30T14:04:29.249685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CgVlha2emWMapJKcY"]} -{"Format": "Json", "ID": "5081e7d6-5f03-4b9b-9e02-6cf832911fb4", "DetectTime": "2023-10-30T14:04:29.249658+02:00", "EventTime": "2023-10-30T14:04:29.249685+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:05:15.746904+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:29.345313)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b238425-b5ec-493f-93bc-c20307f3d05e", "DetectTime": "2023-10-30T14:04:29.350072+02:00", "EventTime": "2023-10-30T14:04:29.350084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CDJTZc46HfS13vYpj1"]} -{"Format": "IDEA0", "ID": "cc870dfa-f604-426f-82cb-c5315a695849", "DetectTime": "2023-10-30T14:04:29.387837+02:00", "EventTime": "2023-10-30T14:04:29.387848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C8ifEx3xVAPSIA7Tb1"]} -{"Format": "IDEA0", "ID": "83bddb55-5c67-44cf-8bf0-b1a0c97526f0", "DetectTime": "2023-10-30T14:04:29.422674+02:00", "EventTime": "2023-10-30T14:04:29.422687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CSIVUl2ZshrNpAEOOf"]} -{"Format": "IDEA0", "ID": "8eaf0a01-2ed4-49c1-867c-36c0bd237fbd", "DetectTime": "2023-10-30T14:04:29.460884+02:00", "EventTime": "2023-10-30T14:04:29.460901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["CgedN94WY062as8B96"]} -{"Format": "IDEA0", "ID": "8e6c2d28-79d8-4060-8da1-09541fe26045", "DetectTime": "2023-10-30T14:04:29.486148+02:00", "EventTime": "2023-10-30T14:04:29.486166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C1yE5q1GPhCgniqmb6"]} -{"Format": "IDEA0", "ID": "61865c0d-d555-41d5-b84d-03edd0cc4a86", "DetectTime": "2023-10-30T14:04:29.524357+02:00", "EventTime": "2023-10-30T14:04:29.524374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cw9AlA3ATi3YyskjX2"]} -{"Format": "IDEA0", "ID": "e75201c9-53df-49d5-aaeb-0042d4b623c6", "DetectTime": "2023-10-30T14:04:29.562540+02:00", "EventTime": "2023-10-30T14:04:29.562560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. ", "ContentType": "text/plain"}], "uids": ["CI0WfdxmAv80KvS6h"]} -{"Format": "IDEA0", "ID": "c809d98f-f35b-4910-bbb9-4b0aabb1ac0b", "DetectTime": "2023-10-30T14:04:29.600292+02:00", "EventTime": "2023-10-30T14:04:29.600303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["CG3c1n2Qgf71y78q01"]} -{"Format": "IDEA0", "ID": "18fe8bf2-bf76-4e41-82bf-eb270c3bb7de", "DetectTime": "2023-10-30T14:04:29.627425+02:00", "EventTime": "2023-10-30T14:04:29.627439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["Ca0vweXPyctpoZ3hb"]} -{"Format": "IDEA0", "ID": "24e96ead-620e-4e22-b7fc-c6b6be8ab2c6", "DetectTime": "2023-10-30T14:04:29.666384+02:00", "EventTime": "2023-10-30T14:04:29.666401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["C8r0iz394lihCmZ3I1"]} -{"Format": "Json", "ID": "24e96ead-620e-4e22-b7fc-c6b6be8ab2c6", "DetectTime": "2023-10-30T14:04:29.666384+02:00", "EventTime": "2023-10-30T14:04:29.666401+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:05:17.032336+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:29.740180)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07454a56-fbcc-4d0b-b099-114a51f3bc5e", "DetectTime": "2023-10-30T14:04:29.745570+02:00", "EventTime": "2023-10-30T14:04:29.745586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["Cif3AA4F93FZZI2XU3"]} -{"Format": "IDEA0", "ID": "5f290e06-91eb-4ab3-b946-e70d16d73798", "DetectTime": "2023-10-30T14:04:29.789997+02:00", "EventTime": "2023-10-30T14:04:29.790019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["Ck54mb4DHV1PSjvbYh"]} -{"Format": "IDEA0", "ID": "7fb9aab8-5d09-4031-b956-513a0006cabb", "DetectTime": "2023-10-30T14:04:29.827906+02:00", "EventTime": "2023-10-30T14:04:29.827923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CEBeeC4U13hmxbnmih"]} -{"Format": "IDEA0", "ID": "1f97493d-b532-4f35-add1-ec82574f3de6", "DetectTime": "2023-10-30T14:04:29.868567+02:00", "EventTime": "2023-10-30T14:04:29.868588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CkBonP4ff8TIxC3T4"]} -{"Format": "IDEA0", "ID": "fa305ca8-b16b-443c-9871-d840a16d9034", "DetectTime": "2023-10-30T14:04:29.906998+02:00", "EventTime": "2023-10-30T14:04:29.907016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19077], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. ", "ContentType": "text/plain"}], "uids": ["CAYfiy3usdbeBlGch1"]} -{"Format": "IDEA0", "ID": "ff639b80-4adf-44af-8658-d9ba8fa6f8d8", "DetectTime": "2023-10-30T14:04:29.946839+02:00", "EventTime": "2023-10-30T14:04:29.946857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["C3sqgg1q6zpwcZudS3"]} -{"Format": "IDEA0", "ID": "800f4bfb-32eb-49dc-ab96-2f8fc3f3805d", "DetectTime": "2023-10-30T14:04:29.990686+02:00", "EventTime": "2023-10-30T14:04:29.990708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["C0bZAZ2ffOGHHJ6Id2"]} -{"Format": "IDEA0", "ID": "aa943511-4611-4ab1-aaad-959d9ba7288a", "DetectTime": "2023-10-30T14:04:30.035545+02:00", "EventTime": "2023-10-30T14:04:30.035571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CHdaKf4vCkmjpQ7Zq8"]} -{"Format": "Json", "ID": "aa943511-4611-4ab1-aaad-959d9ba7288a", "DetectTime": "2023-10-30T14:04:30.035545+02:00", "EventTime": "2023-10-30T14:04:30.035571+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:05:18.364781+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:30.099974)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "44d9477c-5f4c-4258-8b94-0a56c16b1b0b", "DetectTime": "2023-10-30T14:04:30.105325+02:00", "EventTime": "2023-10-30T14:04:30.105342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["Cg94pv3bg8pseerJ9g"]} -{"Format": "IDEA0", "ID": "a14bd9b4-57c3-46aa-9b2f-7155e673be04", "DetectTime": "2023-10-30T14:04:30.143143+02:00", "EventTime": "2023-10-30T14:04:30.143172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1807], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. ", "ContentType": "text/plain"}], "uids": ["CyxZEI8pfxSAzTF4a"]} -{"Format": "IDEA0", "ID": "3d9c940b-513e-415e-ae50-dcc33fc4afb1", "DetectTime": "2023-10-30T14:04:30.179230+02:00", "EventTime": "2023-10-30T14:04:30.179247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CFgz4c3rSHjkfALfTc"]} -{"Format": "IDEA0", "ID": "485c23f7-37c7-4eaf-b10a-0fa2808770fe", "DetectTime": "2023-10-30T14:04:30.217766+02:00", "EventTime": "2023-10-30T14:04:30.217782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CjK244216JFgDerU1h"]} -{"Format": "IDEA0", "ID": "a46aec24-a88b-4be7-837a-8749118e070b", "DetectTime": "2023-10-30T14:04:30.257251+02:00", "EventTime": "2023-10-30T14:04:30.257272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CoQeXI1blIFFCHIgz7"]} -{"Format": "IDEA0", "ID": "3ef142da-4dd2-423e-9b65-b429f459260e", "DetectTime": "2023-10-30T14:04:30.294321+02:00", "EventTime": "2023-10-30T14:04:30.294338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["Cca5vi3vNBwrhHLheh"]} -{"Format": "IDEA0", "ID": "2fe08d2c-e847-41a3-9a97-e748eb7c61e4", "DetectTime": "2023-10-30T14:04:30.332706+02:00", "EventTime": "2023-10-30T14:04:30.332721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ClRXtQ3OVWKFmnoJZe"]} -{"Format": "IDEA0", "ID": "312333da-2c94-442b-b1fc-17b1b769237f", "DetectTime": "2023-10-30T14:04:30.374886+02:00", "EventTime": "2023-10-30T14:04:30.374904+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqkMeB4R09aib2lBc8"]} -{"Format": "IDEA0", "ID": "f2e3511e-5d7c-4992-9190-bbaad1352baa", "DetectTime": "2023-10-30T14:04:30.381624+02:00", "EventTime": "2023-10-30T14:04:30.381639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CK4TddGgEMKrPRdpi"]} -{"Format": "IDEA0", "ID": "eb756fe0-ce20-40a3-8208-074ae7b5011f", "DetectTime": "2023-10-30T14:04:30.411080+02:00", "EventTime": "2023-10-30T14:04:30.411097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. ", "ContentType": "text/plain"}], "uids": ["CfGE9433dGIDuq3l5g"]} -{"Format": "Json", "ID": "eb756fe0-ce20-40a3-8208-074ae7b5011f", "DetectTime": "2023-10-30T14:04:30.411080+02:00", "EventTime": "2023-10-30T14:04:30.411097+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9536], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:05:21.384765+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:30.475482)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3731b1e9-d671-4c01-80e7-d88eb544c88e", "DetectTime": "2023-10-30T14:04:30.480853+02:00", "EventTime": "2023-10-30T14:04:30.480868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CMiajwzuhzwP5Hahf"]} -{"Format": "IDEA0", "ID": "0cec7609-acb0-4270-b5c2-a117a0ef2f06", "DetectTime": "2023-10-30T14:04:30.518335+02:00", "EventTime": "2023-10-30T14:04:30.518352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CO7JZe2yOiUq4WMpb"]} -{"Format": "IDEA0", "ID": "b3fa32f6-342d-4994-844f-6f37928fe360", "DetectTime": "2023-10-30T14:04:30.557041+02:00", "EventTime": "2023-10-30T14:04:30.557060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["CqzDZ9cjsyNjwsO23"]} -{"Format": "IDEA0", "ID": "250d4d7f-2cd7-4791-925c-867df8878c5a", "DetectTime": "2023-10-30T14:04:30.594713+02:00", "EventTime": "2023-10-30T14:04:30.594734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CrXtCb1Tl9d5zjIWX6"]} -{"Format": "IDEA0", "ID": "9953283f-b9d3-44b2-8ea6-b1ee63e956eb", "DetectTime": "2023-10-30T14:04:30.633469+02:00", "EventTime": "2023-10-30T14:04:30.633485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["Cge8vv4IWLyPZQaqUg"]} -{"Format": "IDEA0", "ID": "72eba4e5-21d2-4891-bd86-94780fae09d7", "DetectTime": "2023-10-30T14:04:30.666232+02:00", "EventTime": "2023-10-30T14:04:30.666252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CBWLzX3f186749a7ic"]} -{"Format": "IDEA0", "ID": "ffa7d679-0e5f-4c89-9b1a-2390111c452b", "DetectTime": "2023-10-30T14:04:30.703352+02:00", "EventTime": "2023-10-30T14:04:30.703368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CXWTwW2Tm3U4Jvkfyf"]} -{"Format": "IDEA0", "ID": "a171cb26-d69b-42de-ac38-306775399d52", "DetectTime": "2023-10-30T14:04:30.731625+02:00", "EventTime": "2023-10-30T14:04:30.731637+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cbbm2z41ox25be3i94"]} -{"Format": "IDEA0", "ID": "4462072c-5335-42d3-871d-424d2435bc61", "DetectTime": "2023-10-30T14:04:30.737925+02:00", "EventTime": "2023-10-30T14:04:30.737940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CPyLyN2M6plbiqRWva"]} -{"Format": "IDEA0", "ID": "4bf2e03d-6430-41a7-904b-0c2b2c627c7a", "DetectTime": "2023-10-30T14:04:30.775200+02:00", "EventTime": "2023-10-30T14:04:30.775221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. ", "ContentType": "text/plain"}], "uids": ["C4Fao74LcrtCvvDteb"]} -{"Format": "Json", "ID": "4bf2e03d-6430-41a7-904b-0c2b2c627c7a", "DetectTime": "2023-10-30T14:04:30.775200+02:00", "EventTime": "2023-10-30T14:04:30.775221+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6857], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:35:50.871523+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:30.838225)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "92f1e846-c9f3-460b-9af1-d4f2060db010", "DetectTime": "2023-10-30T14:04:30.842894+02:00", "EventTime": "2023-10-30T14:04:30.842909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CF4wic1LQIIjRCusS3"]} -{"Format": "IDEA0", "ID": "f1c24484-aa10-4d42-9d73-81cf00095173", "DetectTime": "2023-10-30T14:04:30.877299+02:00", "EventTime": "2023-10-30T14:04:30.877317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["Cm4Gkw3RuguYQ7kiF8"]} -{"Format": "IDEA0", "ID": "2eca7b8d-7f03-4455-a17e-8714be47dcb3", "DetectTime": "2023-10-30T14:04:30.903566+02:00", "EventTime": "2023-10-30T14:04:30.903584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C0qQ7x2xh6aDLVANfh"]} -{"Format": "IDEA0", "ID": "ec4968d9-eea3-4491-8d2b-6cebd0eeccb7", "DetectTime": "2023-10-30T14:04:30.937027+02:00", "EventTime": "2023-10-30T14:04:30.937044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cc3Soi3xzRXhLQSpDi"]} -{"Format": "IDEA0", "ID": "fecbe61b-0587-4bb9-b6c1-f84487850297", "DetectTime": "2023-10-30T14:04:30.963230+02:00", "EventTime": "2023-10-30T14:04:30.963251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CIOxGEuM5vvm3MUQl"]} -{"Format": "IDEA0", "ID": "12f0c837-c69b-4fd3-9d4c-d94a594c766f", "DetectTime": "2023-10-30T14:04:30.995373+02:00", "EventTime": "2023-10-30T14:04:30.995392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CBJIaj1EqT7RUdh8gc"]} -{"Format": "IDEA0", "ID": "2740eda5-84d9-42c1-acf5-f13a07f7f388", "DetectTime": "2023-10-30T14:04:31.026691+02:00", "EventTime": "2023-10-30T14:04:31.026708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Cu6EuT2nT07q2iAcTa"]} -{"Format": "IDEA0", "ID": "7d5f1cb6-3b5c-42ae-8417-e0242d7069b4", "DetectTime": "2023-10-30T14:04:31.059438+02:00", "EventTime": "2023-10-30T14:04:31.059456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C0SbHd4xrKh0Yknz51"]} -{"Format": "IDEA0", "ID": "3f483765-8005-4199-8b9c-a0e95f31b431", "DetectTime": "2023-10-30T14:04:31.087251+02:00", "EventTime": "2023-10-30T14:04:31.087264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CjVFNe2spqNUgmsr9d"]} -{"Format": "Json", "ID": "3f483765-8005-4199-8b9c-a0e95f31b431", "DetectTime": "2023-10-30T14:04:31.087251+02:00", "EventTime": "2023-10-30T14:04:31.087264+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:35:51.679451+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:31.153610)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "308878ad-a55a-4dd4-8880-ecaa3242fa2d", "DetectTime": "2023-10-30T14:04:31.158889+02:00", "EventTime": "2023-10-30T14:04:31.158902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CRR7Zl4JnyCTQJFXE8"]} -{"Format": "IDEA0", "ID": "63fe20c2-970f-4253-80fb-8d714bbea121", "DetectTime": "2023-10-30T14:04:31.190621+02:00", "EventTime": "2023-10-30T14:04:31.190638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["CiZVMn2WUzYUIbN6Bi"]} -{"Format": "IDEA0", "ID": "6928a2ae-47b7-4a8f-baa5-4a2391ddee95", "DetectTime": "2023-10-30T14:04:31.218464+02:00", "EventTime": "2023-10-30T14:04:31.218482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CzsfSm4TIHbVRNtyKg"]} -{"Format": "IDEA0", "ID": "735571b5-e99d-4854-b9b4-5e490348201a", "DetectTime": "2023-10-30T14:04:31.248057+02:00", "EventTime": "2023-10-30T14:04:31.248075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C6JcaDSFIg0dO2XMj"]} -{"Format": "IDEA0", "ID": "b05f2622-0138-45cb-9011-13e9c228b862", "DetectTime": "2023-10-30T14:04:31.277834+02:00", "EventTime": "2023-10-30T14:04:31.277846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CqkMeB4R09aib2lBc8", "C48IWg29Ixfkbxe73i", "CkCY25IM7hYyC3sy3", "ClY6372jjllAgXd0y4"]} -{"Format": "IDEA0", "ID": "3fc89b48-d998-4404-9394-72ad06953692", "DetectTime": "2023-10-30T14:04:31.285154+02:00", "EventTime": "2023-10-30T14:04:31.285172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C48IWg29Ixfkbxe73i"]} -{"Format": "IDEA0", "ID": "296f190b-65ff-4338-a016-ae957abb6f32", "DetectTime": "2023-10-30T14:04:31.293365+02:00", "EventTime": "2023-10-30T14:04:31.293381+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2cjuK1sj9LVIN6w52"]} -{"Format": "IDEA0", "ID": "ea77c5ae-eb66-46d4-bacf-878e0ccb63cb", "DetectTime": "2023-10-30T14:04:31.301332+02:00", "EventTime": "2023-10-30T14:04:31.301344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["C5nMiKYBUazrpe5b7"]} -{"Format": "IDEA0", "ID": "88edc0d8-1f9b-4f5b-a48a-0dfa5376f393", "DetectTime": "2023-10-30T14:04:31.327115+02:00", "EventTime": "2023-10-30T14:04:31.327128+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbZlXm4EzES9qeJRF7"]} -{"Format": "IDEA0", "ID": "165939d5-e756-41f1-a98f-5536fabb6f37", "DetectTime": "2023-10-30T14:04:31.334371+02:00", "EventTime": "2023-10-30T14:04:31.334383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CIH789YRKFtBaSGV4"]} -{"Format": "IDEA0", "ID": "fd33ce00-819e-4b5d-b3f9-034027f354bf", "DetectTime": "2023-10-30T14:04:31.359784+02:00", "EventTime": "2023-10-30T14:04:31.359794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CVgvSC3e4UXfJTVG4l"]} -{"Format": "IDEA0", "ID": "46922f87-b70c-4b10-986b-3a117d439984", "DetectTime": "2023-10-30T14:04:31.392162+02:00", "EventTime": "2023-10-30T14:04:31.392179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CMvOfu2upskV22jcK3"]} -{"Format": "IDEA0", "ID": "b889d646-f183-4007-88f2-463ae9424f3e", "DetectTime": "2023-10-30T14:04:31.423260+02:00", "EventTime": "2023-10-30T14:04:31.423277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CVT3JO3yg6WIKr7uQa"]} -{"Format": "Json", "ID": "b889d646-f183-4007-88f2-463ae9424f3e", "DetectTime": "2023-10-30T14:04:31.423260+02:00", "EventTime": "2023-10-30T14:04:31.423277+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:36:11.270369+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:31.485811)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a226f4a-d1fc-4709-a103-7f40ae6ffdba", "DetectTime": "2023-10-30T14:04:31.491651+02:00", "EventTime": "2023-10-30T14:04:31.491670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CFwzSq40XUloA3dUx6"]} -{"Format": "IDEA0", "ID": "dad88d44-4830-4a21-9561-6cf65b5f0174", "DetectTime": "2023-10-30T14:04:31.521606+02:00", "EventTime": "2023-10-30T14:04:31.521620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CHfUa04Np5R3W50c6e"]} -{"Format": "IDEA0", "ID": "5b9d1e3c-f2d2-4cb6-878b-04060e4e2bbf", "DetectTime": "2023-10-30T14:04:31.548600+02:00", "EventTime": "2023-10-30T14:04:31.548619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["C1qr141uhW1uiVuAr1"]} -{"Format": "IDEA0", "ID": "60c41b62-bae1-4d61-9c54-01bacfaff45b", "DetectTime": "2023-10-30T14:04:31.576877+02:00", "EventTime": "2023-10-30T14:04:31.576893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["COVku54uG4pfp4c15i"]} -{"Format": "IDEA0", "ID": "1a47c73f-429d-45b7-9ac8-b719c875044f", "DetectTime": "2023-10-30T14:04:31.670773+02:00", "EventTime": "2023-10-30T14:04:31.670803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CKY05S3U98P1yB3aJe"]} -{"Format": "IDEA0", "ID": "1fb04ee6-4e30-4b03-a77e-e488cb1de0d3", "DetectTime": "2023-10-30T14:04:31.703555+02:00", "EventTime": "2023-10-30T14:04:31.703575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["Cxon5D1r9iQetv5i07"]} -{"Format": "IDEA0", "ID": "5d53e90a-29b5-4e6e-b0d4-d76d60325707", "DetectTime": "2023-10-30T14:04:31.735644+02:00", "EventTime": "2023-10-30T14:04:31.735660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CxRP9u36lsdsji9bYd"]} -{"Format": "IDEA0", "ID": "7171678f-760d-41c1-ada6-ea7671dc0430", "DetectTime": "2023-10-30T14:04:31.768097+02:00", "EventTime": "2023-10-30T14:04:31.768119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CiwLJO1jOnGvuuKF8k"]} -{"Format": "IDEA0", "ID": "ce511f6b-af93-468f-b383-8b4a8e08ad22", "DetectTime": "2023-10-30T14:04:31.800724+02:00", "EventTime": "2023-10-30T14:04:31.800739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["Cr310KioHzKUIOLB6"]} -{"Format": "IDEA0", "ID": "7fa595ed-d52e-423e-8bbe-224c902c2b2a", "DetectTime": "2023-10-30T14:04:31.831563+02:00", "EventTime": "2023-10-30T14:04:31.831579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CnEyuU2cY3sC5yjrTd"]} -{"Format": "IDEA0", "ID": "69a21c69-69c1-47b6-a599-85713a64fd5e", "DetectTime": "2023-10-30T14:04:31.861297+02:00", "EventTime": "2023-10-30T14:04:31.861312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Ck49Lc1E0k0M2IwC6j"]} -{"Format": "Json", "ID": "69a21c69-69c1-47b6-a599-85713a64fd5e", "DetectTime": "2023-10-30T14:04:31.861297+02:00", "EventTime": "2023-10-30T14:04:31.861312+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T22:36:49.911004+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2023/10/30 14:04:31.929649)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "428646b4-0ced-4a3f-9c16-aa1b6bce3ae0", "DetectTime": "2023-10-30T14:04:31.934834+02:00", "EventTime": "2023-10-30T14:04:31.934846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["C8uf9z2mmKu6sKMSF4"]} -{"Format": "IDEA0", "ID": "bf34f294-d5fa-45fc-8d22-51e198cc6d2c", "DetectTime": "2023-10-30T14:04:31.967654+02:00", "EventTime": "2023-10-30T14:04:31.967673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CkBBc3329rwEf4w082"]} -{"Format": "IDEA0", "ID": "d8216cc2-8009-4988-ab17-e3e1242eabd3", "DetectTime": "2023-10-30T14:04:31.991353+02:00", "EventTime": "2023-10-30T14:04:31.991369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CDDTCm1idnd22V1Ot8"]} -{"Format": "IDEA0", "ID": "2cf1111a-b2cb-4812-82f9-9c8f206c93a7", "DetectTime": "2023-10-30T14:04:32.018641+02:00", "EventTime": "2023-10-30T14:04:32.018659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CGWtxt4zREAruyGmR7"]} -{"Format": "IDEA0", "ID": "7c2656a7-461d-4bdf-9b49-a4c3ac04e0c0", "DetectTime": "2023-10-30T14:04:32.050939+02:00", "EventTime": "2023-10-30T14:04:32.050953+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4njFN3oAYIF1vRY49"]} -{"Format": "IDEA0", "ID": "f6e8bb9e-694a-46cb-929e-cf79ca5302c6", "DetectTime": "2023-10-30T14:04:32.066864+02:00", "EventTime": "2023-10-30T14:04:32.066888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CrV0sK38PvJ8ura2yh"]} -{"Format": "IDEA0", "ID": "3fa96741-4bad-4da8-9d95-7d39c8e975ca", "DetectTime": "2023-10-30T14:04:32.095586+02:00", "EventTime": "2023-10-30T14:04:32.095610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CND7xW24W5u3pjuvh4"]} -{"Format": "IDEA0", "ID": "7d81eb3b-a7b9-4e3d-9305-4b378e9db938", "DetectTime": "2023-10-30T14:04:32.124828+02:00", "EventTime": "2023-10-30T14:04:32.124844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. ", "ContentType": "text/plain"}], "uids": ["C1EoKf1vo1KiGw7vQa"]} -{"Format": "IDEA0", "ID": "a113700e-af20-4df8-9ac9-636d9aa89dad", "DetectTime": "2023-10-30T14:04:32.156608+02:00", "EventTime": "2023-10-30T14:04:32.156631+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Hostname": ["ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.193.194.29 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cpfrw214T9RDt7h2Vl"]} -{"Format": "IDEA0", "ID": "3aa898e6-50fc-455c-a08f-bcd9ae35b6ef", "DetectTime": "2023-10-30T14:04:32.217685+02:00", "EventTime": "2023-10-30T14:04:32.217702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. ", "ContentType": "text/plain"}], "uids": ["Ca702c1YGcIr8EEhfb"]} -{"Format": "IDEA0", "ID": "ccbbc0a5-8f7b-453b-a63b-d1010b67766b", "DetectTime": "2023-10-30T14:04:32.252361+02:00", "EventTime": "2023-10-30T14:04:32.252379+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxOdNa1ojalZOXS3bf"]} -{"Format": "IDEA0", "ID": "f803584b-7cfb-41d6-9aa9-08470cb74eea", "DetectTime": "2023-10-30T14:04:32.262765+02:00", "EventTime": "2023-10-30T14:04:32.262792+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C44dQ549UqgTZ52Kyf"]} -{"Format": "IDEA0", "ID": "d978d9a4-40d8-4f2d-a9ab-3c437aeaeb7b", "DetectTime": "2023-10-30T14:04:32.272244+02:00", "EventTime": "2023-10-30T14:04:32.272260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CF5nxe4Fk21FRBPo78"]} -{"Format": "IDEA0", "ID": "9e4aafd6-612e-4eff-b927-c640b6a29b20", "DetectTime": "2023-10-30T14:04:32.322585+02:00", "EventTime": "2023-10-30T14:04:32.322603+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CG6kSi31zYsmgWngW4"]} -{"Format": "IDEA0", "ID": "2c6659be-48b4-4970-85a8-c5b18b43eddb", "DetectTime": "2023-10-30T14:04:32.331357+02:00", "EventTime": "2023-10-30T14:04:32.331377+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxtW0Z25q46Y0fkq0e"]} -{"Format": "IDEA0", "ID": "719abdf8-62c2-4ed0-8753-77b8bf5ec869", "DetectTime": "2023-10-30T14:04:32.340266+02:00", "EventTime": "2023-10-30T14:04:32.340282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CzxW6l1NcofQkfvIc6"]} -{"Format": "IDEA0", "ID": "07044ab7-a8f9-4ca8-b840-b4f92db8868c", "DetectTime": "2023-10-30T14:04:32.372102+02:00", "EventTime": "2023-10-30T14:04:32.372119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CxWFl6OtfyeNWJkX3"]} -{"Format": "IDEA0", "ID": "b7248a7e-b3c8-4b93-b735-45f82c761b30", "DetectTime": "2023-10-30T14:04:32.420583+02:00", "EventTime": "2023-10-30T14:04:32.420598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CD3AJ03FK31Psc7yyk"]} -{"Format": "IDEA0", "ID": "d47861c5-5401-4440-a1fc-4ac5561fcef6", "DetectTime": "2023-10-30T14:04:32.470415+02:00", "EventTime": "2023-10-30T14:04:32.470434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CUW0Ki4wvX4O8hrUkj"]} -{"Format": "IDEA0", "ID": "199b041b-4f12-45f0-a749-dc26852aa810", "DetectTime": "2023-10-30T14:04:32.514405+02:00", "EventTime": "2023-10-30T14:04:32.514421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["C50eNG2KAwjSeoqZzb"]} -{"Format": "IDEA0", "ID": "c6f86542-6e27-448e-83d9-16b894b33c2b", "DetectTime": "2023-10-30T14:04:32.560259+02:00", "EventTime": "2023-10-30T14:04:32.560275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C2XH2KFW1B7eUeBha"]} -{"Format": "Json", "ID": "c6f86542-6e27-448e-83d9-16b894b33c2b", "DetectTime": "2023-10-30T14:04:32.560259+02:00", "EventTime": "2023-10-30T14:04:32.560275+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:08:28.466377+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:32.675467)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a2d3b0c3-3f87-42b0-9ae6-105465292cf1", "DetectTime": "2023-10-30T14:04:32.680985+02:00", "EventTime": "2023-10-30T14:04:32.681001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CgAB982mZNOoqndRN7"]} -{"Format": "IDEA0", "ID": "1b45ea8f-6ed4-45ff-82aa-30f07392ae94", "DetectTime": "2023-10-30T14:04:32.729264+02:00", "EventTime": "2023-10-30T14:04:32.729280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cctevw1kdTxcpYYky8"]} -{"Format": "IDEA0", "ID": "b666b146-fd11-4580-bc7d-e57aca929bb1", "DetectTime": "2023-10-30T14:04:32.774394+02:00", "EventTime": "2023-10-30T14:04:32.774417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CLsdDH1z3ZtBFPDo0c"]} -{"Format": "IDEA0", "ID": "ca7b87c9-57a0-4501-ad93-8015255e6ef7", "DetectTime": "2023-10-30T14:04:32.817260+02:00", "EventTime": "2023-10-30T14:04:32.817279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CjM5nq33TBaS8qTpZ"]} -{"Format": "IDEA0", "ID": "3394166d-fe0d-40c8-a1c8-a916e2e34e5d", "DetectTime": "2023-10-30T14:04:32.860949+02:00", "EventTime": "2023-10-30T14:04:32.860969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CgoujN1INQX9MnR08d"]} -{"Format": "IDEA0", "ID": "3abae952-c109-4e5c-bc97-202a843f0998", "DetectTime": "2023-10-30T14:04:32.909352+02:00", "EventTime": "2023-10-30T14:04:32.909373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C4UmCt2e0L44GYNURf"]} -{"Format": "IDEA0", "ID": "04dae3f8-67fb-46d2-8d37-927aac3ecc1e", "DetectTime": "2023-10-30T14:04:32.953155+02:00", "EventTime": "2023-10-30T14:04:32.953176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CmVcRU6760z6JgVQ6"]} -{"Format": "IDEA0", "ID": "95b5cfdd-ae33-4c77-a7dc-54ae66125271", "DetectTime": "2023-10-30T14:04:32.997821+02:00", "EventTime": "2023-10-30T14:04:32.997838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CnOgJA3CmMZhj1VRNh"]} -{"Format": "Json", "ID": "95b5cfdd-ae33-4c77-a7dc-54ae66125271", "DetectTime": "2023-10-30T14:04:32.997821+02:00", "EventTime": "2023-10-30T14:04:32.997838+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:08:45.959670+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:33.075219)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae632ac5-8030-482a-9d60-cfe8f41863f0", "DetectTime": "2023-10-30T14:04:33.080836+02:00", "EventTime": "2023-10-30T14:04:33.080857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["Cqhmki3419FALX0cTe"]} -{"Format": "IDEA0", "ID": "369fb8cf-bec7-47a0-b62c-f8a6d103b4e8", "DetectTime": "2023-10-30T14:04:33.125590+02:00", "EventTime": "2023-10-30T14:04:33.125609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CKKbg44q5Xv94ocSV6"]} -{"Format": "IDEA0", "ID": "1832f565-6360-4dce-812a-08ef2b0c1086", "DetectTime": "2023-10-30T14:04:33.165916+02:00", "EventTime": "2023-10-30T14:04:33.165932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CTxVQt3cOHYgx2Lcci"]} -{"Format": "IDEA0", "ID": "12078c7a-6662-4e20-877a-9972e7df8d60", "DetectTime": "2023-10-30T14:04:33.207080+02:00", "EventTime": "2023-10-30T14:04:33.207096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["C2Oxcb26ktdabPZCUh"]} -{"Format": "IDEA0", "ID": "e3520722-5029-4d0b-a1ba-78df0f04f954", "DetectTime": "2023-10-30T14:04:33.249515+02:00", "EventTime": "2023-10-30T14:04:33.249541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CSy84m4nr6xXin1X01"]} -{"Format": "IDEA0", "ID": "cd407caa-6447-48cb-98bc-2de48b86a395", "DetectTime": "2023-10-30T14:04:33.284791+02:00", "EventTime": "2023-10-30T14:04:33.284810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Ckg9qu21W93XOsj374"]} -{"Format": "IDEA0", "ID": "214e7395-14d8-4917-a56d-4179dee83e11", "DetectTime": "2023-10-30T14:04:33.323027+02:00", "EventTime": "2023-10-30T14:04:33.323040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CaZPEL1tX1naJEOpd6"]} -{"Format": "IDEA0", "ID": "c1b6e5cc-288b-4e72-b6d0-7bc9fa0df7b5", "DetectTime": "2023-10-30T14:04:33.358569+02:00", "EventTime": "2023-10-30T14:04:33.358583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["Cd0w1z41QFsQCS2218"]} -{"Format": "Json", "ID": "c1b6e5cc-288b-4e72-b6d0-7bc9fa0df7b5", "DetectTime": "2023-10-30T14:04:33.358569+02:00", "EventTime": "2023-10-30T14:04:33.358583+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:08:47.938169+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:33.421680)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a9139105-1346-4359-9c6e-f2a480f04485", "DetectTime": "2023-10-30T14:04:33.427909+02:00", "EventTime": "2023-10-30T14:04:33.427925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CxOdNa1ojalZOXS3bf", "CbZlXm4EzES9qeJRF7", "C1B0d747sGoJzKKy8", "CG6kSi31zYsmgWngW4"]} -{"Format": "IDEA0", "ID": "371be120-253c-4788-a2f3-2fa4797d8de3", "DetectTime": "2023-10-30T14:04:33.436871+02:00", "EventTime": "2023-10-30T14:04:33.436882+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1B0d747sGoJzKKy8"]} -{"Format": "IDEA0", "ID": "db77ee58-295d-43fc-abfa-5bd913174ee4", "DetectTime": "2023-10-30T14:04:33.445264+02:00", "EventTime": "2023-10-30T14:04:33.445284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CHRE0L23oxm6v6Xyei"]} -{"Format": "IDEA0", "ID": "4e9a85e5-5978-4445-95d4-7d3893cc2bbe", "DetectTime": "2023-10-30T14:04:33.479962+02:00", "EventTime": "2023-10-30T14:04:33.479978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CQ5CEH1401rR0G12r7"]} -{"Format": "IDEA0", "ID": "82d4bb4c-5d97-4052-8139-885ee7062756", "DetectTime": "2023-10-30T14:04:33.517190+02:00", "EventTime": "2023-10-30T14:04:33.517216+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CbMHCN1siTk1hbqZKg"]} -{"Format": "IDEA0", "ID": "f6c174ac-96b1-4ced-86ca-b2b7951610d2", "DetectTime": "2023-10-30T14:04:33.525791+02:00", "EventTime": "2023-10-30T14:04:33.525808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CNhrFa1ulwqjLC5Zh1"]} -{"Format": "IDEA0", "ID": "f52dc2d2-879a-4cf0-bd94-f04569b385fd", "DetectTime": "2023-10-30T14:04:33.563599+02:00", "EventTime": "2023-10-30T14:04:33.563616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Crin4N1q1DFK71ug04"]} -{"Format": "IDEA0", "ID": "60ec6afa-89b4-48b4-b1a1-0d41e25b5ac5", "DetectTime": "2023-10-30T14:04:33.600425+02:00", "EventTime": "2023-10-30T14:04:33.600443+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9uvPZ1kTWYziJgA99"]} -{"Format": "IDEA0", "ID": "9430c5c0-b193-438d-bfda-8c85bb60b78b", "DetectTime": "2023-10-30T14:04:33.607509+02:00", "EventTime": "2023-10-30T14:04:33.607520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Cn58dA1DY6gsJNBbK3"]} -{"Format": "IDEA0", "ID": "d02eec7c-06b2-41d6-b2ec-2633a182fb0f", "DetectTime": "2023-10-30T14:04:33.642892+02:00", "EventTime": "2023-10-30T14:04:33.642910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["C1XNdW32xhpru4Msfa"]} -{"Format": "IDEA0", "ID": "1d49bad4-0dad-48de-b5b5-748bc5be9dae", "DetectTime": "2023-10-30T14:04:33.677599+02:00", "EventTime": "2023-10-30T14:04:33.677610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["Cc4Cyv3JBvkhuD5rz5"]} -{"Format": "IDEA0", "ID": "11a6aab7-fd32-4441-ae89-81f4ba6214fe", "DetectTime": "2023-10-30T14:04:33.714433+02:00", "EventTime": "2023-10-30T14:04:33.714455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CqXJJcQGNXx2pVwv4"]} -{"Format": "Json", "ID": "11a6aab7-fd32-4441-ae89-81f4ba6214fe", "DetectTime": "2023-10-30T14:04:33.714433+02:00", "EventTime": "2023-10-30T14:04:33.714455+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:08:50.010289+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:33.853370)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5844b8aa-a011-4629-96b8-058e7cee05f5", "DetectTime": "2023-10-30T14:04:33.859283+02:00", "EventTime": "2023-10-30T14:04:33.859303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["ChT9F92YkW1qlYWykl"]} -{"Format": "IDEA0", "ID": "ebe9f359-9759-4623-8ccc-fa184fe8c43f", "DetectTime": "2023-10-30T14:04:33.896716+02:00", "EventTime": "2023-10-30T14:04:33.896731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CEHMAE3SjCY2MUuJU"]} -{"Format": "IDEA0", "ID": "763b1a0b-4e5e-4541-8852-e56942f8764e", "DetectTime": "2023-10-30T14:04:33.930143+02:00", "EventTime": "2023-10-30T14:04:33.930160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["Cs4ct54B0wpfzqsAHe"]} -{"Format": "IDEA0", "ID": "abcabbc4-bdc3-4920-b39d-ebffad45902e", "DetectTime": "2023-10-30T14:04:33.969908+02:00", "EventTime": "2023-10-30T14:04:33.969929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvpA1IFa49U1SXcXh"]} -{"Format": "IDEA0", "ID": "ce16b236-eb75-4ff2-8fcb-146bafd650ee", "DetectTime": "2023-10-30T14:04:34.011224+02:00", "EventTime": "2023-10-30T14:04:34.011242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CKNyZ82mV6ENis0ysd"]} -{"Format": "IDEA0", "ID": "2a0ccc79-2b90-4b26-8339-95ab68beb091", "DetectTime": "2023-10-30T14:04:34.050045+02:00", "EventTime": "2023-10-30T14:04:34.050062+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMCjxl4lLVZ2vfSE82"]} -{"Format": "IDEA0", "ID": "a32bbdc4-4ed2-4d54-a5ae-6c3f7f4fe9f1", "DetectTime": "2023-10-30T14:04:34.060387+02:00", "EventTime": "2023-10-30T14:04:34.060406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CUNAX63EuvLwkkacHl"]} -{"Format": "IDEA0", "ID": "280917eb-a530-4a92-a5ae-d78491944158", "DetectTime": "2023-10-30T14:04:34.097108+02:00", "EventTime": "2023-10-30T14:04:34.097127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CxGTJx3TqGGrdBQhV9"]} -{"Format": "IDEA0", "ID": "52828f16-0d94-4231-b4fc-109f51cc4baf", "DetectTime": "2023-10-30T14:04:34.134661+02:00", "EventTime": "2023-10-30T14:04:34.134678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Cm5x3w4sR0YYuEhRY4"]} -{"Format": "IDEA0", "ID": "a27cdbba-e06c-4e69-90b9-3b9593b76ca8", "DetectTime": "2023-10-30T14:04:34.171569+02:00", "EventTime": "2023-10-30T14:04:34.171586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cnzs852rQKdTuyyGul"]} -{"Format": "Json", "ID": "a27cdbba-e06c-4e69-90b9-3b9593b76ca8", "DetectTime": "2023-10-30T14:04:34.171569+02:00", "EventTime": "2023-10-30T14:04:34.171586+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:40:45.701563+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:34.241410)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3509e2fc-bc0e-4779-ac52-b919a7f064a1", "DetectTime": "2023-10-30T14:04:34.246603+02:00", "EventTime": "2023-10-30T14:04:34.246618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CZGACBZmiakUsGCwb"]} -{"Format": "IDEA0", "ID": "3e57aa61-f954-48b0-b5f0-610af23ccb68", "DetectTime": "2023-10-30T14:04:34.285191+02:00", "EventTime": "2023-10-30T14:04:34.285208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CVfV862ezAoxWCjkVb"]} -{"Format": "IDEA0", "ID": "797a3214-9e81-4bc1-9a2f-6d2706dfb6a2", "DetectTime": "2023-10-30T14:04:34.317100+02:00", "EventTime": "2023-10-30T14:04:34.317114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CZYWtD3QDEDZ0XDUIb"]} -{"Format": "IDEA0", "ID": "e6315dc2-ccd3-43b8-9606-f6c65711dab1", "DetectTime": "2023-10-30T14:04:34.352974+02:00", "EventTime": "2023-10-30T14:04:34.352987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CK064X1XlARzZmOwB4"]} -{"Format": "IDEA0", "ID": "f44566d6-a32c-4c2c-94ab-891f5c46eb3f", "DetectTime": "2023-10-30T14:04:34.383942+02:00", "EventTime": "2023-10-30T14:04:34.383958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CvLmLF49F0aGoOkZa1"]} -{"Format": "IDEA0", "ID": "d104e173-a06c-4bdc-a384-8b8e4d24fe83", "DetectTime": "2023-10-30T14:04:34.421714+02:00", "EventTime": "2023-10-30T14:04:34.421731+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CwQg7jxzsQtE7qUFj"]} -{"Format": "IDEA0", "ID": "c65556f6-8d60-48f1-bcfd-a3b0bb4d5284", "DetectTime": "2023-10-30T14:04:34.431531+02:00", "EventTime": "2023-10-30T14:04:34.431551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["C81Fz84JJQLOxtZIb7"]} -{"Format": "IDEA0", "ID": "729df6ec-816a-4f1f-bc21-1f515b7dae75", "DetectTime": "2023-10-30T14:04:34.471023+02:00", "EventTime": "2023-10-30T14:04:34.471042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CDipRi2Aw7UDoSei9"]} -{"Format": "IDEA0", "ID": "1955d2af-82ae-4d39-846b-179a63773fed", "DetectTime": "2023-10-30T14:04:34.511314+02:00", "EventTime": "2023-10-30T14:04:34.511327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CaDMm83gEk1k4STx5k"]} -{"Format": "Json", "ID": "1955d2af-82ae-4d39-846b-179a63773fed", "DetectTime": "2023-10-30T14:04:34.511314+02:00", "EventTime": "2023-10-30T14:04:34.511327+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:40:50.467996+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:34.576158)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6f8a8e54-abd0-4732-9379-d9dd20b91fd2", "DetectTime": "2023-10-30T14:04:34.582036+02:00", "EventTime": "2023-10-30T14:04:34.582053+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cgqal83WlbtgsNgrwg"]} -{"Format": "IDEA0", "ID": "88efb621-34ea-4c5f-9c77-a2394f48026a", "DetectTime": "2023-10-30T14:04:34.591485+02:00", "EventTime": "2023-10-30T14:04:34.591514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["Cg91Nl2iLSQNP4fRue"]} -{"Format": "IDEA0", "ID": "bbcf446c-1c70-4163-a1f8-9c992b0bac7e", "DetectTime": "2023-10-30T14:04:34.627335+02:00", "EventTime": "2023-10-30T14:04:34.627356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CChilRNFBFnDrdPM"]} -{"Format": "IDEA0", "ID": "5647d1d4-0edc-430e-a836-ba985322ed47", "DetectTime": "2023-10-30T14:04:34.655090+02:00", "EventTime": "2023-10-30T14:04:34.655109+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvzUBpPlRCjzCdE63"]} -{"Format": "IDEA0", "ID": "49d04fae-6363-421d-89e3-a86adcf45d90", "DetectTime": "2023-10-30T14:04:34.663699+02:00", "EventTime": "2023-10-30T14:04:34.663715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["ClC8Gb1FCNjKWlCgWe"]} -{"Format": "IDEA0", "ID": "23893c76-886c-449e-9cf5-eef563d3907a", "DetectTime": "2023-10-30T14:04:34.694136+02:00", "EventTime": "2023-10-30T14:04:34.694154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["COVIIBLPdAkyZpyc8"]} -{"Format": "IDEA0", "ID": "f1e20e6a-5645-4fee-8a8a-a88848e3a8bc", "DetectTime": "2023-10-30T14:04:34.723835+02:00", "EventTime": "2023-10-30T14:04:34.723848+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cpqjef4vj0kRI7Nch1"]} -{"Format": "IDEA0", "ID": "45321d70-ad5c-4ed0-be65-0c2ff5f584e5", "DetectTime": "2023-10-30T14:04:34.733160+02:00", "EventTime": "2023-10-30T14:04:34.733181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["C3Ni1f3WNuLDndhxvd"]} -{"Format": "IDEA0", "ID": "6188076d-099c-414e-8f60-80b3c8e85a49", "DetectTime": "2023-10-30T14:04:34.764786+02:00", "EventTime": "2023-10-30T14:04:34.764803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CG8sIs1rQsBGKJ4fe6"]} -{"Format": "IDEA0", "ID": "a43044b7-d82e-411d-bc89-e673eb460755", "DetectTime": "2023-10-30T14:04:34.793845+02:00", "EventTime": "2023-10-30T14:04:34.793870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CpNhgz4VFhmAvAsBUi"]} -{"Format": "IDEA0", "ID": "c6be703d-b69c-48e6-99e2-997ba2f8ebad", "DetectTime": "2023-10-30T14:04:34.844346+02:00", "EventTime": "2023-10-30T14:04:34.844367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CYQyXLNsJMwrov1Ih"]} -{"Format": "Json", "ID": "c6be703d-b69c-48e6-99e2-997ba2f8ebad", "DetectTime": "2023-10-30T14:04:34.844346+02:00", "EventTime": "2023-10-30T14:04:34.844367+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-03T23:40:53.292131+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2023/10/30 14:04:34.914805)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "625e7cb3-4c9d-4dd5-9ff7-2379e56d737b", "DetectTime": "2023-10-30T14:04:34.921740+02:00", "EventTime": "2023-10-30T14:04:34.921763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["C6qoRipwzjBugpx3k"]} -{"Format": "IDEA0", "ID": "72d285ca-5579-4c86-a46e-54d9fe637dd2", "DetectTime": "2023-10-30T14:04:34.960030+02:00", "EventTime": "2023-10-30T14:04:34.960051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CoNecC1yxfxPA3ot9"]} -{"Format": "IDEA0", "ID": "197845c2-87b0-4879-909d-33a37bb31ab6", "DetectTime": "2023-10-30T14:04:34.993242+02:00", "EventTime": "2023-10-30T14:04:34.993255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CP0l6wcqRFSzjUxA5"]} -{"Format": "IDEA0", "ID": "3f1777fd-d5eb-40f2-8d8f-e437c86769f0", "DetectTime": "2023-10-30T14:04:35.026958+02:00", "EventTime": "2023-10-30T14:04:35.026979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CmGUSn1EqS6PGK7IM9"]} -{"Format": "IDEA0", "ID": "a07fc717-2f4f-4fe1-bfec-9eba5d51349d", "DetectTime": "2023-10-30T14:04:35.062661+02:00", "EventTime": "2023-10-30T14:04:35.062685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CVHNEkJrmpNlP337f"]} -{"Format": "IDEA0", "ID": "7d5ec8c9-0ef0-4126-b57d-88918f5300b3", "DetectTime": "2023-10-30T14:04:35.098161+02:00", "EventTime": "2023-10-30T14:04:35.098180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["Cfc2wm1GZTjr7BqEAh"]} -{"Format": "IDEA0", "ID": "517fa20a-7634-4be6-9939-1da345b2f540", "DetectTime": "2023-10-30T14:04:35.126940+02:00", "EventTime": "2023-10-30T14:04:35.126959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["Ce50N22EB7cPSdoOe3"]} -{"Format": "IDEA0", "ID": "64439fe4-b6b7-4fd8-8f91-8905dae9a430", "DetectTime": "2023-10-30T14:04:35.172346+02:00", "EventTime": "2023-10-30T14:04:35.172363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["C6tILA37T1Y0SKOwy5"]} -{"Format": "IDEA0", "ID": "fc3248fc-a732-4647-9956-99c0e1c6c48d", "DetectTime": "2023-10-30T14:04:35.217618+02:00", "EventTime": "2023-10-30T14:04:35.217631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CpjoKR1vmFLXftVPF9"]} -{"Format": "IDEA0", "ID": "cbae9ac1-b096-44fd-b7d6-564a43678694", "DetectTime": "2023-10-30T14:04:35.260647+02:00", "EventTime": "2023-10-30T14:04:35.260666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CbSBEv36l7lKcvloVb"]} -{"Format": "IDEA0", "ID": "23e02f8a-d6a9-44e7-a4c5-f41af54b4d1b", "DetectTime": "2023-10-30T14:04:35.304859+02:00", "EventTime": "2023-10-30T14:04:35.304878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CKBmOs4fEjotFAFSM4"]} -{"Format": "IDEA0", "ID": "a9e8326d-4f4d-4a2f-91f9-074a19f0fb8d", "DetectTime": "2023-10-30T14:04:35.354329+02:00", "EventTime": "2023-10-30T14:04:35.354355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["C06olz3FS7kCe4ZOWb"]} -{"Format": "IDEA0", "ID": "4e189449-f0fa-49f7-b582-0afce80fbeba", "DetectTime": "2023-10-30T14:04:35.399615+02:00", "EventTime": "2023-10-30T14:04:35.399642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CJPwvLVUMcaeThWL9"]} -{"Format": "Json", "ID": "4e189449-f0fa-49f7-b582-0afce80fbeba", "DetectTime": "2023-10-30T14:04:35.399615+02:00", "EventTime": "2023-10-30T14:04:35.399642+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:11:36.059917+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:35.483754)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a442fe69-a311-41c2-9e9c-b5fc3457db42", "DetectTime": "2023-10-30T14:04:35.489874+02:00", "EventTime": "2023-10-30T14:04:35.489895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["Cj4OHS3V7qpAR2GyUc"]} -{"Format": "IDEA0", "ID": "66e5d278-41d1-46ea-adaf-65100c8867f2", "DetectTime": "2023-10-30T14:04:35.532429+02:00", "EventTime": "2023-10-30T14:04:35.532449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["Clvy5hKWaejwXNNUl"]} -{"Format": "IDEA0", "ID": "62009692-0d78-4c17-aca4-2e4515d56216", "DetectTime": "2023-10-30T14:04:35.571310+02:00", "EventTime": "2023-10-30T14:04:35.571331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CaGm2d223zbtfX8ZZ3"]} -{"Format": "IDEA0", "ID": "80baedea-5463-4056-adfd-7cb4a9c4904e", "DetectTime": "2023-10-30T14:04:35.609437+02:00", "EventTime": "2023-10-30T14:04:35.609454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CybmGQ2mUHGar08yzb"]} -{"Format": "IDEA0", "ID": "1dddf2c2-6729-423a-a08d-6f00f7c81ef8", "DetectTime": "2023-10-30T14:04:35.648956+02:00", "EventTime": "2023-10-30T14:04:35.648975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CgjYvc4QLMiPgKRefi"]} -{"Format": "IDEA0", "ID": "ecd0eb13-11b4-428c-8002-1e079bef9dcb", "DetectTime": "2023-10-30T14:04:35.687064+02:00", "EventTime": "2023-10-30T14:04:35.687081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["Cg19qK2Bc4Y6BQeL3k"]} -{"Format": "IDEA0", "ID": "668150be-e2b3-48ea-98fd-19b004510b15", "DetectTime": "2023-10-30T14:04:35.731351+02:00", "EventTime": "2023-10-30T14:04:35.731377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CDb35O3HMg28aIgfk2"]} -{"Format": "IDEA0", "ID": "f7b810b1-af0b-43d1-9802-7338e3682e0a", "DetectTime": "2023-10-30T14:04:35.769452+02:00", "EventTime": "2023-10-30T14:04:35.769472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["C2fJbhPUoLr7lIPpb"]} -{"Format": "Json", "ID": "f7b810b1-af0b-43d1-9802-7338e3682e0a", "DetectTime": "2023-10-30T14:04:35.769452+02:00", "EventTime": "2023-10-30T14:04:35.769472+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:11:37.850494+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:35.841682)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "582d41bc-2c6b-4170-85e6-1c11d53c8895", "DetectTime": "2023-10-30T14:04:35.846989+02:00", "EventTime": "2023-10-30T14:04:35.847007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CjZB24c6ykMK9VhMj"]} -{"Format": "IDEA0", "ID": "f606fc8f-61a3-4879-870f-ab102cb336c5", "DetectTime": "2023-10-30T14:04:35.885985+02:00", "EventTime": "2023-10-30T14:04:35.886005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CJ66IhM3YwYiRLZO6"]} -{"Format": "IDEA0", "ID": "e0db52c2-5125-479c-807a-90e814a6cad1", "DetectTime": "2023-10-30T14:04:35.921621+02:00", "EventTime": "2023-10-30T14:04:35.921638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["COjUeS1z4IXYSOvg5a"]} -{"Format": "IDEA0", "ID": "b0f8ff45-d4cc-4e9b-985c-9a3625748e57", "DetectTime": "2023-10-30T14:04:35.956289+02:00", "EventTime": "2023-10-30T14:04:35.956311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9uvPZ1kTWYziJgA99", "CvzUBpPlRCjzCdE63", "CwQg7jxzsQtE7qUFj", "ClaLhuWGURcsWoaCd"]} -{"Format": "IDEA0", "ID": "f43e2b02-1fa6-4aad-964a-35ca9b37aba1", "DetectTime": "2023-10-30T14:04:35.965651+02:00", "EventTime": "2023-10-30T14:04:35.965666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["Cl0f3ydZKPm1QfGp9"]} -{"Format": "IDEA0", "ID": "1d1b389b-acc8-4ef5-bbdf-92323cf3c402", "DetectTime": "2023-10-30T14:04:35.997675+02:00", "EventTime": "2023-10-30T14:04:35.997696+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ClaLhuWGURcsWoaCd"]} -{"Format": "IDEA0", "ID": "6498cae2-a112-4e1f-93e9-a35dc8b82abb", "DetectTime": "2023-10-30T14:04:36.006948+02:00", "EventTime": "2023-10-30T14:04:36.006961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CIAXn42O3Oh10FiMpi"]} -{"Format": "IDEA0", "ID": "e7fc928e-d366-4eff-ab72-c7c413a39e3a", "DetectTime": "2023-10-30T14:04:36.042861+02:00", "EventTime": "2023-10-30T14:04:36.042881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CF3aE74NMG1y8beLQb"]} -{"Format": "IDEA0", "ID": "0936e566-5e7a-415c-ac3e-481ba32acd8b", "DetectTime": "2023-10-30T14:04:36.081331+02:00", "EventTime": "2023-10-30T14:04:36.081352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["C93Uwf3QwSD5sJXPQa"]} -{"Format": "IDEA0", "ID": "87db9602-915b-4716-82ab-4c83cb4ff0a4", "DetectTime": "2023-10-30T14:04:36.120303+02:00", "EventTime": "2023-10-30T14:04:36.120324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["C7cAbF1xP6LLUTaX41"]} -{"Format": "Json", "ID": "87db9602-915b-4716-82ab-4c83cb4ff0a4", "DetectTime": "2023-10-30T14:04:36.120303+02:00", "EventTime": "2023-10-30T14:04:36.120324+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:11:39.859364+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:36.186414)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2448107a-750f-4151-ab43-167aa982513d", "DetectTime": "2023-10-30T14:04:36.191188+02:00", "EventTime": "2023-10-30T14:04:36.191208+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ctt15I1ZkJEveyaTb"]} -{"Format": "IDEA0", "ID": "822cd99c-116b-4610-ac3d-70334ee97883", "DetectTime": "2023-10-30T14:04:36.202836+02:00", "EventTime": "2023-10-30T14:04:36.202857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CFbOK51G47m6NeKLKa"]} -{"Format": "IDEA0", "ID": "28958497-e6ec-4e97-8af2-3a801dc03181", "DetectTime": "2023-10-30T14:04:36.236311+02:00", "EventTime": "2023-10-30T14:04:36.236329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["C5dTvO2CJoxlvQbOwb"]} -{"Format": "IDEA0", "ID": "b44a00b3-540b-497f-8776-c52e8f2c2961", "DetectTime": "2023-10-30T14:04:36.263303+02:00", "EventTime": "2023-10-30T14:04:36.263327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CSbjfpfCUtGwP6Ev5"]} -{"Format": "IDEA0", "ID": "5f7dcc2b-9976-4121-bc93-f427b58bc2cd", "DetectTime": "2023-10-30T14:04:36.292685+02:00", "EventTime": "2023-10-30T14:04:36.292699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C1KjTY2burp0iaUpue"]} -{"Format": "IDEA0", "ID": "8c4a9c53-5728-4b58-a7a8-27d76dc6a968", "DetectTime": "2023-10-30T14:04:36.324069+02:00", "EventTime": "2023-10-30T14:04:36.324094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CscHub15gbB19dGZ5k"]} -{"Format": "IDEA0", "ID": "6c9688eb-cc37-4ae7-aaec-4f9b1cfc5358", "DetectTime": "2023-10-30T14:04:36.356451+02:00", "EventTime": "2023-10-30T14:04:36.356468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CgsMLa3hv8SGApJSA8"]} -{"Format": "IDEA0", "ID": "64cdf5e5-6cfc-4750-b0da-06c3a859a7b6", "DetectTime": "2023-10-30T14:04:36.386704+02:00", "EventTime": "2023-10-30T14:04:36.386716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CZMVmk1yU3okkDZmf1"]} -{"Format": "IDEA0", "ID": "e217cfbb-a867-4145-815b-68ae59eb11cf", "DetectTime": "2023-10-30T14:04:36.415998+02:00", "EventTime": "2023-10-30T14:04:36.416015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvIR7878A0NMxkDz8"]} -{"Format": "Json", "ID": "e217cfbb-a867-4145-815b-68ae59eb11cf", "DetectTime": "2023-10-30T14:04:36.415998+02:00", "EventTime": "2023-10-30T14:04:36.416015+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:42:10.418934+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:36.478326)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0c9638aa-b380-4595-9a54-c7fba9c1bb30", "DetectTime": "2023-10-30T14:04:36.483831+02:00", "EventTime": "2023-10-30T14:04:36.483849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CshtKx10LtXOz8sap2"]} -{"Format": "IDEA0", "ID": "b98c60ef-e2f5-4060-8713-0b883ca74de2", "DetectTime": "2023-10-30T14:04:36.516269+02:00", "EventTime": "2023-10-30T14:04:36.516287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["CRQRRw33wvpghD8qu4"]} -{"Format": "IDEA0", "ID": "1c35f1ff-2194-4841-8b35-7fe1818e30b5", "DetectTime": "2023-10-30T14:04:36.545680+02:00", "EventTime": "2023-10-30T14:04:36.545696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CLObWT2Gi3FjUbW5o4"]} -{"Format": "IDEA0", "ID": "64811063-d2c6-49da-8b8e-13f163307cbd", "DetectTime": "2023-10-30T14:04:36.576199+02:00", "EventTime": "2023-10-30T14:04:36.576214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Co8GbL3RAvshAMyUpg"]} -{"Format": "IDEA0", "ID": "3c2fe589-fd73-4352-a61b-7c1e2557defa", "DetectTime": "2023-10-30T14:04:36.605656+02:00", "EventTime": "2023-10-30T14:04:36.605676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CGak3l3MoaVnfRc1j7"]} -{"Format": "IDEA0", "ID": "376306f2-7807-4f09-95bd-e2abab4ea66b", "DetectTime": "2023-10-30T14:04:36.636939+02:00", "EventTime": "2023-10-30T14:04:36.636952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CoLWA33a4XDQARh1E8"]} -{"Format": "IDEA0", "ID": "f70566d7-0e5c-43a3-879d-a696dac546af", "DetectTime": "2023-10-30T14:04:36.665507+02:00", "EventTime": "2023-10-30T14:04:36.665528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["Czxp3p2B0mWUtUGabb"]} -{"Format": "IDEA0", "ID": "72c97a53-d418-4be2-a72a-b0039c886bf7", "DetectTime": "2023-10-30T14:04:36.696561+02:00", "EventTime": "2023-10-30T14:04:36.696579+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZof4O3Zk8wTxZNZAd"]} -{"Format": "IDEA0", "ID": "dc572dd8-8ca4-4eff-89f6-4ab02c3540cd", "DetectTime": "2023-10-30T14:04:36.705487+02:00", "EventTime": "2023-10-30T14:04:36.705503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CQ48hj1z66IOTn96Db"]} -{"Format": "Json", "ID": "dc572dd8-8ca4-4eff-89f6-4ab02c3540cd", "DetectTime": "2023-10-30T14:04:36.705487+02:00", "EventTime": "2023-10-30T14:04:36.705503+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:42:12.021585+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:36.836974)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4d0b749f-4939-4f38-8414-007f42d813f8", "DetectTime": "2023-10-30T14:04:36.843530+02:00", "EventTime": "2023-10-30T14:04:36.843552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CdClhl2wx0FxCVRaMe"]} -{"Format": "IDEA0", "ID": "7a0356dd-1893-4e90-875d-375840ee2ed4", "DetectTime": "2023-10-30T14:04:36.879357+02:00", "EventTime": "2023-10-30T14:04:36.879374+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck0H1P34RrhObVMNB2"]} -{"Format": "IDEA0", "ID": "f808a5a9-af4b-47cd-beb3-19bda73b76cf", "DetectTime": "2023-10-30T14:04:36.890570+02:00", "EventTime": "2023-10-30T14:04:36.890588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["Cmk9se2zzJA9ppHO4j"]} -{"Format": "IDEA0", "ID": "f009dd6a-a084-42d3-9b56-5084de49c28b", "DetectTime": "2023-10-30T14:04:36.922390+02:00", "EventTime": "2023-10-30T14:04:36.922419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CU4i044kOO5E94Ke62"]} -{"Format": "IDEA0", "ID": "9fcb8031-835e-47a2-b8d5-0809170193b5", "DetectTime": "2023-10-30T14:04:36.934380+02:00", "EventTime": "2023-10-30T14:04:36.934406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C8oDvh17e2nkDg16Rb"]} -{"Format": "IDEA0", "ID": "de59deee-aee2-428d-9f8e-39000e3559a0", "DetectTime": "2023-10-30T14:04:36.969259+02:00", "EventTime": "2023-10-30T14:04:36.969277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["C58tj12Mnv66hOBow5"]} -{"Format": "IDEA0", "ID": "ee3d43b7-c7b2-4e52-87d9-15fa5016c42f", "DetectTime": "2023-10-30T14:04:36.998728+02:00", "EventTime": "2023-10-30T14:04:36.998744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CBHw933UQTa8JdKb5l"]} -{"Format": "IDEA0", "ID": "71d3f24e-9494-4dca-bf07-f5556fce4d8a", "DetectTime": "2023-10-30T14:04:37.031489+02:00", "EventTime": "2023-10-30T14:04:37.031515+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiSa6A4xT8TOxWv8rd"]} -{"Format": "IDEA0", "ID": "6fbbf27c-f917-4bde-9682-add03939e31f", "DetectTime": "2023-10-30T14:04:37.042152+02:00", "EventTime": "2023-10-30T14:04:37.042180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CLs9yF3EJG6LBTzU7c"]} -{"Format": "IDEA0", "ID": "c96d98e9-5295-4d40-b45c-3bde8f7bba20", "DetectTime": "2023-10-30T14:04:37.076279+02:00", "EventTime": "2023-10-30T14:04:37.076311+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CGylOt4Ml0Mul15HEc"]} -{"Format": "IDEA0", "ID": "e9319a91-fb39-4831-86d3-536674754295", "DetectTime": "2023-10-30T14:04:37.088526+02:00", "EventTime": "2023-10-30T14:04:37.088547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CmEggW27Ys3Lo1Jxn2"]} -{"Format": "IDEA0", "ID": "c553ccdc-7e3c-4f79-8412-a96e59a2c76e", "DetectTime": "2023-10-30T14:04:37.120301+02:00", "EventTime": "2023-10-30T14:04:37.120315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CsAlwhJGIpIFwUQef"]} -{"Format": "Json", "ID": "c553ccdc-7e3c-4f79-8412-a96e59a2c76e", "DetectTime": "2023-10-30T14:04:37.120301+02:00", "EventTime": "2023-10-30T14:04:37.120315+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:42:31.436590+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:37.191012)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7c05b6ab-bb01-49ad-a809-d7bd56b414bf", "DetectTime": "2023-10-30T14:04:37.197374+02:00", "EventTime": "2023-10-30T14:04:37.197395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CTsNu32Fz9gRP7Irpe"]} -{"Format": "IDEA0", "ID": "684aeb9f-cd85-40ed-b37f-37183304daac", "DetectTime": "2023-10-30T14:04:37.227139+02:00", "EventTime": "2023-10-30T14:04:37.227161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CPUvEJ1dg6sto1HMV1"]} -{"Format": "IDEA0", "ID": "6d59abe3-c760-4dd7-987f-7395ff2fa7c3", "DetectTime": "2023-10-30T14:04:37.254160+02:00", "EventTime": "2023-10-30T14:04:37.254173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["CKmoqH2mbf5oeSIODh"]} -{"Format": "IDEA0", "ID": "bfe99be8-33ed-45ff-84af-1b48edf04703", "DetectTime": "2023-10-30T14:04:37.278423+02:00", "EventTime": "2023-10-30T14:04:37.278441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CnwYD82SSf8MHw2Tmf"]} -{"Format": "IDEA0", "ID": "0a3bc919-09c3-442d-9adb-7a9b0817c246", "DetectTime": "2023-10-30T14:04:37.306876+02:00", "EventTime": "2023-10-30T14:04:37.306893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Cf8R2WLApmMJN9Qxh"]} -{"Format": "IDEA0", "ID": "d2a3650e-451f-45a0-88b8-640498fe2926", "DetectTime": "2023-10-30T14:04:37.334088+02:00", "EventTime": "2023-10-30T14:04:37.334108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CKONVW28KsTOir8gug"]} -{"Format": "IDEA0", "ID": "36a4ec7e-3438-4d73-8a02-e2188808cf1e", "DetectTime": "2023-10-30T14:04:37.361013+02:00", "EventTime": "2023-10-30T14:04:37.361025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CP9YZG1nnuF2V0HhS8"]} -{"Format": "IDEA0", "ID": "a0082698-a633-4da3-9cbe-c94c98826e4f", "DetectTime": "2023-10-30T14:04:37.385908+02:00", "EventTime": "2023-10-30T14:04:37.385920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CutJgV1GipXjl5cADc"]} -{"Format": "Json", "ID": "a0082698-a633-4da3-9cbe-c94c98826e4f", "DetectTime": "2023-10-30T14:04:37.385908+02:00", "EventTime": "2023-10-30T14:04:37.385920+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T00:42:51.463826+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2023/10/30 14:04:37.442465)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bdc29786-c958-4af4-aad4-d4def13e3e1e", "DetectTime": "2023-10-30T14:04:37.449280+02:00", "EventTime": "2023-10-30T14:04:37.449307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CMsBFt4wMTGew8gjpl"]} -{"Format": "IDEA0", "ID": "08de0fd3-87bb-46a8-9759-26fbbfba3c69", "DetectTime": "2023-10-30T14:04:37.475471+02:00", "EventTime": "2023-10-30T14:04:37.475487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CwsGeC1tDKSWoj4Fy6"]} -{"Format": "IDEA0", "ID": "61e1cc3d-6561-42c8-a3f2-44a4fa13afd1", "DetectTime": "2023-10-30T14:04:37.522357+02:00", "EventTime": "2023-10-30T14:04:37.522375+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C7mJ2Y1gG7KVirXUI1"]} -{"Format": "IDEA0", "ID": "b0608ce7-5e98-431b-93ef-a019758135c4", "DetectTime": "2023-10-30T14:04:37.533730+02:00", "EventTime": "2023-10-30T14:04:37.533750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CoKGT13wFV824OLZvg"]} -{"Format": "IDEA0", "ID": "558b4305-8788-4807-aaf7-b52662ed1e17", "DetectTime": "2023-10-30T14:04:37.577522+02:00", "EventTime": "2023-10-30T14:04:37.577546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPTSDT2p8z4jdCBvHj"]} -{"Format": "IDEA0", "ID": "b86898aa-23a0-4295-b5c5-914ea2886f59", "DetectTime": "2023-10-30T14:04:37.628170+02:00", "EventTime": "2023-10-30T14:04:37.628190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CGobgy3on0C2I1d3La"]} -{"Format": "IDEA0", "ID": "c1e50ddd-46d2-4f6b-ad4f-7dc2f7671b0b", "DetectTime": "2023-10-30T14:04:37.675572+02:00", "EventTime": "2023-10-30T14:04:37.675588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CwLJIq1teb1uMqElO5"]} -{"Format": "IDEA0", "ID": "55d7f8c0-088f-42ca-8b7c-6ea890dca56e", "DetectTime": "2023-10-30T14:04:37.722330+02:00", "EventTime": "2023-10-30T14:04:37.722354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CBSRsS1DSY35Zvwiz8"]} -{"Format": "IDEA0", "ID": "f68e52bf-beda-464e-84ed-5c153749e36e", "DetectTime": "2023-10-30T14:04:37.767903+02:00", "EventTime": "2023-10-30T14:04:37.767917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. ", "ContentType": "text/plain"}], "uids": ["C38lon3H4cRJz5XsP6"]} -{"Format": "Json", "ID": "f68e52bf-beda-464e-84ed-5c153749e36e", "DetectTime": "2023-10-30T14:04:37.767903+02:00", "EventTime": "2023-10-30T14:04:37.767917+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T01:13:19.402287+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2023/10/30 14:04:37.883971)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "005744e8-8e78-470d-8556-dd7935076b1b", "DetectTime": "2023-10-30T14:04:37.889458+02:00", "EventTime": "2023-10-30T14:04:37.889480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["Cmw87NH0RbK0n60i2"]} -{"Format": "IDEA0", "ID": "3e14be69-f05c-4286-bf7a-111773ff6ae7", "DetectTime": "2023-10-30T14:04:37.933186+02:00", "EventTime": "2023-10-30T14:04:37.933203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["Cq6UJl4j2Nh0COhW8a"]} -{"Format": "IDEA0", "ID": "ac5c47df-faaa-4446-b9d6-ef749fdf3462", "DetectTime": "2023-10-30T14:04:37.973212+02:00", "EventTime": "2023-10-30T14:04:37.973233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CRpX1j3fIngdMDDoK5"]} -{"Format": "IDEA0", "ID": "c26bf59d-d93f-430e-8262-f82122bd549c", "DetectTime": "2023-10-30T14:04:38.006883+02:00", "EventTime": "2023-10-30T14:04:38.006903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CqG1EL1Ofe6iLkPU2k"]} -{"Format": "IDEA0", "ID": "fcedc179-e7ac-4633-957d-790f79cc0844", "DetectTime": "2023-10-30T14:04:38.058004+02:00", "EventTime": "2023-10-30T14:04:38.058020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cyn0pd4aiu6A1nhqOf"]} -{"Format": "IDEA0", "ID": "257674cb-e234-4feb-a4ca-25fdd2329de7", "DetectTime": "2023-10-30T14:04:38.102371+02:00", "EventTime": "2023-10-30T14:04:38.102389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CeUTbE9k3Q0bWEi8"]} -{"Format": "IDEA0", "ID": "8bc81e92-7b88-4228-a0ae-9a2e5bec9a90", "DetectTime": "2023-10-30T14:04:38.145236+02:00", "EventTime": "2023-10-30T14:04:38.145258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["C0xdpS2QAAX8SXcq06"]} -{"Format": "IDEA0", "ID": "7b333111-e57e-4a3c-b0f4-1eb190f5e6d9", "DetectTime": "2023-10-30T14:04:38.185184+02:00", "EventTime": "2023-10-30T14:04:38.185208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["Cmm7GK2H7RBFhzWPMl"]} -{"Format": "IDEA0", "ID": "dfbd27e6-33ea-459c-8dd9-c6a4611e3736", "DetectTime": "2023-10-30T14:04:38.233750+02:00", "EventTime": "2023-10-30T14:04:38.233771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZof4O3Zk8wTxZNZAd", "CGylOt4Ml0Mul15HEc", "CU4i044kOO5E94Ke62", "CKou8H2Nnwf1lrhLy7"]} -{"Format": "IDEA0", "ID": "bbb9c568-7db8-42dc-8474-6675116ecfcc", "DetectTime": "2023-10-30T14:04:38.244307+02:00", "EventTime": "2023-10-30T14:04:38.244324+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKou8H2Nnwf1lrhLy7"]} -{"Format": "IDEA0", "ID": "9e4706eb-043b-4d89-aad0-5b3a232df90b", "DetectTime": "2023-10-30T14:04:38.255246+02:00", "EventTime": "2023-10-30T14:04:38.255268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["C7bQb13vut2V5haXk5"]} -{"Format": "Json", "ID": "9e4706eb-043b-4d89-aad0-5b3a232df90b", "DetectTime": "2023-10-30T14:04:38.255246+02:00", "EventTime": "2023-10-30T14:04:38.255268+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T01:13:21.029341+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2023/10/30 14:04:38.329287)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "607ee79d-a3e3-4cbc-b7ee-e66736f04823", "DetectTime": "2023-10-30T14:04:38.334860+02:00", "EventTime": "2023-10-30T14:04:38.334877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CSEdj14s0PTAY2MfR2"]} -{"Format": "IDEA0", "ID": "8758a627-08f6-48a7-a6d8-9e0605800fa3", "DetectTime": "2023-10-30T14:04:38.375368+02:00", "EventTime": "2023-10-30T14:04:38.375388+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CRCAUj4V7jHb3BeN3j"]} -{"Format": "IDEA0", "ID": "7b2641f1-e6d9-4a24-9d21-6ff4c9059bab", "DetectTime": "2023-10-30T14:04:38.386471+02:00", "EventTime": "2023-10-30T14:04:38.386491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CeDE6m1FdwhAGa5gy1"]} -{"Format": "IDEA0", "ID": "a1e5c53c-f7f6-4e58-a538-808ebf975a96", "DetectTime": "2023-10-30T14:04:38.428024+02:00", "EventTime": "2023-10-30T14:04:38.428040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CmTtQlRubl22XPZki"]} -{"Format": "IDEA0", "ID": "d3c64772-458c-4b65-aa06-02f3fa56f796", "DetectTime": "2023-10-30T14:04:38.473427+02:00", "EventTime": "2023-10-30T14:04:38.473452+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXRkc5230D9Mc51CEj"]} -{"Format": "IDEA0", "ID": "dab37dfb-81a7-4607-94b8-518d6ebf374e", "DetectTime": "2023-10-30T14:04:38.485573+02:00", "EventTime": "2023-10-30T14:04:38.485602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["ClBfHLuOPms0HGhhc"]} -{"Format": "IDEA0", "ID": "4e44239a-3bf1-4cc1-a3c7-fc241d22210e", "DetectTime": "2023-10-30T14:04:38.524084+02:00", "EventTime": "2023-10-30T14:04:38.524098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cog9oN3DYfCHVYEUfb"]} -{"Format": "IDEA0", "ID": "1bbcb598-34bd-447c-adef-394654588de3", "DetectTime": "2023-10-30T14:04:38.561511+02:00", "EventTime": "2023-10-30T14:04:38.561531+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5vGYM3x3jFC72riQa"]} -{"Format": "IDEA0", "ID": "974efb87-1936-4fae-bf5f-691a8e8c6f67", "DetectTime": "2023-10-30T14:04:38.571071+02:00", "EventTime": "2023-10-30T14:04:38.571084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["Cpe1oW3yWMdH2vaSda"]} -{"Format": "IDEA0", "ID": "9786c7bd-b7c9-4a1a-9e16-85d634a7adaa", "DetectTime": "2023-10-30T14:04:38.606214+02:00", "EventTime": "2023-10-30T14:04:38.606257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2062], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. ", "ContentType": "text/plain"}], "uids": ["C7v7dR1K6bboBnXrNd"]} -{"Format": "IDEA0", "ID": "d4824cbd-6d20-470e-94ee-7cec1b8586bd", "DetectTime": "2023-10-30T14:04:38.640873+02:00", "EventTime": "2023-10-30T14:04:38.640889+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CqALIs44bgk5lqlaOj"]} -{"Format": "IDEA0", "ID": "1854b40c-1594-4f4f-abc7-6225c0ad8aaa", "DetectTime": "2023-10-30T14:04:38.650971+02:00", "EventTime": "2023-10-30T14:04:38.650997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. ", "ContentType": "text/plain"}], "uids": ["CAz0A81WmmPfJhco26"]} -{"Format": "Json", "ID": "1854b40c-1594-4f4f-abc7-6225c0ad8aaa", "DetectTime": "2023-10-30T14:04:38.650971+02:00", "EventTime": "2023-10-30T14:04:38.650997+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18579], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T01:13:22.846392+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2023/10/30 14:04:38.719928)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c84137f2-9338-4654-a1d9-0379b2e127f1", "DetectTime": "2023-10-30T14:04:38.725896+02:00", "EventTime": "2023-10-30T14:04:38.725918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CqSfCh1RwXVQxa8sUk"]} -{"Format": "IDEA0", "ID": "70c1574a-d4ef-4f81-98d8-8f7c24885e1b", "DetectTime": "2023-10-30T14:04:38.759988+02:00", "EventTime": "2023-10-30T14:04:38.760005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CaXJdQYIDRZifYuI4"]} -{"Format": "IDEA0", "ID": "3153592a-25a4-4c10-918d-1b324c48c802", "DetectTime": "2023-10-30T14:04:38.792327+02:00", "EventTime": "2023-10-30T14:04:38.792348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ChQRlTSdkv0NuJpq1"]} -{"Format": "IDEA0", "ID": "71ff7bf5-c4ab-4e8d-850d-2c8ea048f189", "DetectTime": "2023-10-30T14:04:38.824097+02:00", "EventTime": "2023-10-30T14:04:38.824123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["C8HLgaZuzHHjCdPIj"]} -{"Format": "IDEA0", "ID": "441bc6e1-1d6a-4d0d-979b-71c6717ab59a", "DetectTime": "2023-10-30T14:04:38.856087+02:00", "EventTime": "2023-10-30T14:04:38.856113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["Ci33Pw2Z6TGuEqTIvc"]} -{"Format": "IDEA0", "ID": "d9c1a5b3-2ad1-48bc-8a36-aabfbccd302b", "DetectTime": "2023-10-30T14:04:38.892016+02:00", "EventTime": "2023-10-30T14:04:38.892038+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYRQUf3YBc0oos6x61"]} -{"Format": "IDEA0", "ID": "c3adbabe-5e64-43b4-9109-f986f9be2a69", "DetectTime": "2023-10-30T14:04:38.902953+02:00", "EventTime": "2023-10-30T14:04:38.902972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Chry1d2T4hNVrFzIU3"]} -{"Format": "IDEA0", "ID": "2a8a518f-c14d-4114-bf9a-6892e097a7c7", "DetectTime": "2023-10-30T14:04:38.933562+02:00", "EventTime": "2023-10-30T14:04:38.933576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. ", "ContentType": "text/plain"}], "uids": ["CgLVpq4xH6vicV2M15"]} -{"Format": "IDEA0", "ID": "c5f7a42f-dd66-4b8e-8c0c-5e50dec39fcd", "DetectTime": "2023-10-30T14:04:38.964141+02:00", "EventTime": "2023-10-30T14:04:38.964162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CXJmKh4oEg8BGaptik"]} -{"Format": "Json", "ID": "c5f7a42f-dd66-4b8e-8c0c-5e50dec39fcd", "DetectTime": "2023-10-30T14:04:38.964141+02:00", "EventTime": "2023-10-30T14:04:38.964162+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T01:43:48.077737+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2023/10/30 14:04:39.028792)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "febbdab2-e5a8-405d-8ec8-dd189b8f2962", "DetectTime": "2023-10-30T14:04:39.034610+02:00", "EventTime": "2023-10-30T14:04:39.034633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CEglQa3lpxl7thfrK2"]} -{"Format": "IDEA0", "ID": "60d79e3b-f882-4b62-b155-20cac6c36f80", "DetectTime": "2023-10-30T14:04:39.061690+02:00", "EventTime": "2023-10-30T14:04:39.061710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cyxdvc12e6pdiCMGoh"]} -{"Format": "IDEA0", "ID": "da8f4489-03e9-431e-bcb4-0919bb356792", "DetectTime": "2023-10-30T14:04:39.170703+02:00", "EventTime": "2023-10-30T14:04:39.170722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CX5cpX2QixAZ45HpA"]} -{"Format": "IDEA0", "ID": "ce386344-3e77-428f-9e09-7bece8d1a9d8", "DetectTime": "2023-10-30T14:04:39.203770+02:00", "EventTime": "2023-10-30T14:04:39.203789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CDI1HQe2271Qiy3Vc"]} -{"Format": "IDEA0", "ID": "42de7dac-f003-48c2-961f-fddd342ff2dc", "DetectTime": "2023-10-30T14:04:39.235642+02:00", "EventTime": "2023-10-30T14:04:39.235663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CzyKgx4woSmiCoXvHg"]} -{"Format": "IDEA0", "ID": "5c090eb6-db9b-4be9-acbd-b4dcf07e0d15", "DetectTime": "2023-10-30T14:04:39.268097+02:00", "EventTime": "2023-10-30T14:04:39.268123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CGr5P89MUk72dBUX2"]} -{"Format": "IDEA0", "ID": "ff76ddea-cfa1-40b9-8605-bca0ae404b6a", "DetectTime": "2023-10-30T14:04:39.302825+02:00", "EventTime": "2023-10-30T14:04:39.302849+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cp2foS3g4fhKzu0Vab"]} -{"Format": "IDEA0", "ID": "46f26ca9-f31c-4bdd-81b3-65ca06e5caf4", "DetectTime": "2023-10-30T14:04:39.312190+02:00", "EventTime": "2023-10-30T14:04:39.312206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CbBl482DEZN4KTwXs4"]} -{"Format": "IDEA0", "ID": "8e948f0d-1c98-4c45-8179-c65af52590f7", "DetectTime": "2023-10-30T14:04:39.347124+02:00", "EventTime": "2023-10-30T14:04:39.347144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CCxL5o49xQnmkyEBL3"]} -{"Format": "Json", "ID": "8e948f0d-1c98-4c45-8179-c65af52590f7", "DetectTime": "2023-10-30T14:04:39.347124+02:00", "EventTime": "2023-10-30T14:04:39.347144+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T01:44:08.914763+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2023/10/30 14:04:39.417373)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07e13136-d6b6-44fe-81ac-d8cc4796ecd6", "DetectTime": "2023-10-30T14:04:39.423621+02:00", "EventTime": "2023-10-30T14:04:39.423637+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBazKl3QCfdQd5UDb2"]} -{"Format": "IDEA0", "ID": "26a6936c-91eb-4263-bf2d-3f74443fa95b", "DetectTime": "2023-10-30T14:04:39.433423+02:00", "EventTime": "2023-10-30T14:04:39.433444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CUKABnPyUkJMTLYNe"]} -{"Format": "IDEA0", "ID": "09b73cdf-a068-4a45-ab29-bd94c9468dc7", "DetectTime": "2023-10-30T14:04:39.463524+02:00", "EventTime": "2023-10-30T14:04:39.463543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["Cdhqdq3tZ1mwwRCCA7"]} -{"Format": "IDEA0", "ID": "534f0af6-d87e-429b-b6f7-e21d8c65a506", "DetectTime": "2023-10-30T14:04:39.490167+02:00", "EventTime": "2023-10-30T14:04:39.490189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CejbxW3ovS87JfpItk"]} -{"Format": "IDEA0", "ID": "156f6c0b-2066-418b-8ce3-433a46dfd32e", "DetectTime": "2023-10-30T14:04:39.523282+02:00", "EventTime": "2023-10-30T14:04:39.523299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CEAAqZ2yQD4tNtkT0g"]} -{"Format": "IDEA0", "ID": "65b8b913-4b37-41fb-b660-eb46100566f1", "DetectTime": "2023-10-30T14:04:39.552838+02:00", "EventTime": "2023-10-30T14:04:39.552853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CmRASIIvBvOv13ZZ3"]} -{"Format": "IDEA0", "ID": "305509be-81c1-4619-afe2-23e4360823f0", "DetectTime": "2023-10-30T14:04:39.583693+02:00", "EventTime": "2023-10-30T14:04:39.583713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["C1I0Az4uEqa6h08M1g"]} -{"Format": "IDEA0", "ID": "b077534b-773b-4d7e-b07d-aff276e011d1", "DetectTime": "2023-10-30T14:04:39.613536+02:00", "EventTime": "2023-10-30T14:04:39.613559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CwEQBsqgsUk7kp4w5"]} -{"Format": "IDEA0", "ID": "e092854c-aa97-48bb-a85f-f109e59748d7", "DetectTime": "2023-10-30T14:04:39.645269+02:00", "EventTime": "2023-10-30T14:04:39.645288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CwhuZL14tdlXlmz4f"]} -{"Format": "Json", "ID": "e092854c-aa97-48bb-a85f-f109e59748d7", "DetectTime": "2023-10-30T14:04:39.645269+02:00", "EventTime": "2023-10-30T14:04:39.645288+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T01:45:02.480190+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2023/10/30 14:04:39.703540)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0939e9b8-20b6-4378-bf77-963815426dd4", "DetectTime": "2023-10-30T14:04:39.709202+02:00", "EventTime": "2023-10-30T14:04:39.709219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["C1Klcy1DxRPWToR8l3"]} -{"Format": "IDEA0", "ID": "16cbf751-14a3-4407-96ad-bc54b741a109", "DetectTime": "2023-10-30T14:04:39.744368+02:00", "EventTime": "2023-10-30T14:04:39.744385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CKjXAa4q4dOJ12fyif"]} -{"Format": "IDEA0", "ID": "0257ef8f-a25a-4bc5-af70-77338c6e60a6", "DetectTime": "2023-10-30T14:04:39.772702+02:00", "EventTime": "2023-10-30T14:04:39.772721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CXVQpn4Be2LDU3r4X9"]} -{"Format": "IDEA0", "ID": "34421d23-b41f-4f8d-8f48-2189f416059f", "DetectTime": "2023-10-30T14:04:39.799259+02:00", "EventTime": "2023-10-30T14:04:39.799283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CO7zd62CNMWAjZmI36"]} -{"Format": "IDEA0", "ID": "c659bc0c-ff89-4c90-b058-52dcf0951a37", "DetectTime": "2023-10-30T14:04:39.825868+02:00", "EventTime": "2023-10-30T14:04:39.825895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSW5e62OClOqMWdDa2"]} -{"Format": "IDEA0", "ID": "099ff379-e47a-4090-a483-f6206b012972", "DetectTime": "2023-10-30T14:04:39.897556+02:00", "EventTime": "2023-10-30T14:04:39.897578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CIm6dK3xFzprWBqSyg"]} -{"Format": "IDEA0", "ID": "87821c99-3fc5-44a2-8240-af4025e35788", "DetectTime": "2023-10-30T14:04:39.969876+02:00", "EventTime": "2023-10-30T14:04:39.969897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CZITcE18ttPvVhkut8"]} -{"Format": "IDEA0", "ID": "589c1b28-1e7d-4325-803c-f2f8c8b7be5a", "DetectTime": "2023-10-30T14:04:40.052106+02:00", "EventTime": "2023-10-30T14:04:40.052125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbtI7h1xebVqPqhGbi"]} -{"Format": "IDEA0", "ID": "4eb07d35-0e69-4ebb-a155-bdc6a99786de", "DetectTime": "2023-10-30T14:04:40.150009+02:00", "EventTime": "2023-10-30T14:04:40.150093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C1ZXQK3UOrMTsh1oM9"]} -{"Format": "IDEA0", "ID": "c85e17ca-a8b6-43d4-a077-de36c392e065", "DetectTime": "2023-10-30T14:04:40.243710+02:00", "EventTime": "2023-10-30T14:04:40.243731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CKV2nF6rAaUDNSvLd"]} -{"Format": "Json", "ID": "c85e17ca-a8b6-43d4-a077-de36c392e065", "DetectTime": "2023-10-30T14:04:40.243710+02:00", "EventTime": "2023-10-30T14:04:40.243731+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:16:45.247848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:40.430313)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6890e597-7668-4c7f-ac78-818fd0b46a06", "DetectTime": "2023-10-30T14:04:40.436758+02:00", "EventTime": "2023-10-30T14:04:40.436780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CffKCA17AOPVYARtMl"]} -{"Format": "IDEA0", "ID": "5db304e7-973c-471d-82fb-dfbc70cb0897", "DetectTime": "2023-10-30T14:04:40.509788+02:00", "EventTime": "2023-10-30T14:04:40.509809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CIQsgX32FanUpEUFg4"]} -{"Format": "IDEA0", "ID": "ab9e882f-15fa-443e-98c0-88725b7913f1", "DetectTime": "2023-10-30T14:04:40.584720+02:00", "EventTime": "2023-10-30T14:04:40.584737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CjUHvu1U0xjD6FRmLi"]} -{"Format": "IDEA0", "ID": "9d11ac9a-f61d-4107-a480-0d60b7d059e4", "DetectTime": "2023-10-30T14:04:40.649280+02:00", "EventTime": "2023-10-30T14:04:40.649303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["Cvg8pQ3GbKrOAPgJok"]} -{"Format": "IDEA0", "ID": "d80c774a-f321-45da-a7d7-0c20cfad9c4a", "DetectTime": "2023-10-30T14:04:40.716025+02:00", "EventTime": "2023-10-30T14:04:40.716042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CEqz314eQA7mHy0oL6"]} -{"Format": "IDEA0", "ID": "12b7b453-77ee-4a68-94b0-418ed7ee52db", "DetectTime": "2023-10-30T14:04:40.792162+02:00", "EventTime": "2023-10-30T14:04:40.792188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CVWpBc2NQYaixPppo3"]} -{"Format": "IDEA0", "ID": "ec4d3a10-b166-4069-8ebf-49650fb05c9e", "DetectTime": "2023-10-30T14:04:40.883678+02:00", "EventTime": "2023-10-30T14:04:40.883702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["C1VQ9A43Uk97zjaLA4"]} -{"Format": "IDEA0", "ID": "ec2b08a2-47e4-4ba6-8ffe-66ff82192684", "DetectTime": "2023-10-30T14:04:40.963358+02:00", "EventTime": "2023-10-30T14:04:40.963382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C3ntI4KdIUtYOGsi3"]} -{"Format": "Json", "ID": "ec2b08a2-47e4-4ba6-8ffe-66ff82192684", "DetectTime": "2023-10-30T14:04:40.963358+02:00", "EventTime": "2023-10-30T14:04:40.963382+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:16:46.688843+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:41.073192)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "512a9bc6-9a2e-4b2b-8968-1072b1f9071a", "DetectTime": "2023-10-30T14:04:41.078997+02:00", "EventTime": "2023-10-30T14:04:41.079012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CAn56P30c3CuPF0cu8"]} -{"Format": "IDEA0", "ID": "12dc6432-72ac-4de0-88be-675f027c04c8", "DetectTime": "2023-10-30T14:04:41.160196+02:00", "EventTime": "2023-10-30T14:04:41.160222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CLzrZoQNPhXkycUYi"]} -{"Format": "IDEA0", "ID": "7ca8e18a-c9d0-4628-9bdd-4f713c609f1f", "DetectTime": "2023-10-30T14:04:41.239088+02:00", "EventTime": "2023-10-30T14:04:41.239106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["C0DkDC1bAGClK3KgEb"]} -{"Format": "IDEA0", "ID": "13f58e14-5bb0-45e0-8966-781cdcccaf1f", "DetectTime": "2023-10-30T14:04:41.302647+02:00", "EventTime": "2023-10-30T14:04:41.302667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CoCsxR2yJTDROmJ66d"]} -{"Format": "IDEA0", "ID": "26bcd13e-27cb-43a6-b60e-621e9fc7da98", "DetectTime": "2023-10-30T14:04:41.357705+02:00", "EventTime": "2023-10-30T14:04:41.357719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CoabGRAuBNpyTESod"]} -{"Format": "IDEA0", "ID": "15ec853a-bf10-46e2-bba2-cc40ac3ab106", "DetectTime": "2023-10-30T14:04:41.410312+02:00", "EventTime": "2023-10-30T14:04:41.410334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CWZE0k2jlHoHduhYmc"]} -{"Format": "IDEA0", "ID": "cc741904-1d5c-4255-9401-39715b4fb346", "DetectTime": "2023-10-30T14:04:41.466115+02:00", "EventTime": "2023-10-30T14:04:41.466125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4KSve4TmjaeygULHj"]} -{"Format": "IDEA0", "ID": "88642478-c738-489c-ae02-ccc68a80a4e8", "DetectTime": "2023-10-30T14:04:41.518153+02:00", "EventTime": "2023-10-30T14:04:41.518176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CmzkOK3yAGZU1DNpa"]} -{"Format": "Json", "ID": "88642478-c738-489c-ae02-ccc68a80a4e8", "DetectTime": "2023-10-30T14:04:41.518153+02:00", "EventTime": "2023-10-30T14:04:41.518176+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:17:08.209671+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:41.608226)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b1956f5c-1b32-4c41-befd-eff1b39ab4cd", "DetectTime": "2023-10-30T14:04:41.614075+02:00", "EventTime": "2023-10-30T14:04:41.614094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CuMX3XzswDP0EU3T7"]} -{"Format": "IDEA0", "ID": "dce2d587-fc57-4f36-aaa4-8f53418ae2f3", "DetectTime": "2023-10-30T14:04:41.666979+02:00", "EventTime": "2023-10-30T14:04:41.667001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["CMEutYJ6rJGhNnIJd"]} -{"Format": "IDEA0", "ID": "ff25fa21-8739-42d5-8552-10f5382b9624", "DetectTime": "2023-10-30T14:04:41.715570+02:00", "EventTime": "2023-10-30T14:04:41.715588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["Csy5PO2GXkM4ARwZyf"]} -{"Format": "IDEA0", "ID": "40eac4a5-93a5-4fcb-b3ce-125bd27d06c3", "DetectTime": "2023-10-30T14:04:41.769977+02:00", "EventTime": "2023-10-30T14:04:41.769997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CpRrIq7Hb45TTwZEj"]} -{"Format": "IDEA0", "ID": "8a1b3ebb-8e7d-4d54-8c99-0332ac8435d2", "DetectTime": "2023-10-30T14:04:41.819703+02:00", "EventTime": "2023-10-30T14:04:41.819724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20050], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. ", "ContentType": "text/plain"}], "uids": ["Cd0rhsprlMiUQU6Cb"]} -{"Format": "IDEA0", "ID": "1627a198-558a-4549-9b2a-b73603fd2c33", "DetectTime": "2023-10-30T14:04:41.872708+02:00", "EventTime": "2023-10-30T14:04:41.872725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. ", "ContentType": "text/plain"}], "uids": ["Ce4GbZssqvmqvog5d"]} -{"Format": "IDEA0", "ID": "df3f7ecd-fc54-4cda-a507-82e2c16b3c67", "DetectTime": "2023-10-30T14:04:41.924045+02:00", "EventTime": "2023-10-30T14:04:41.924062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CKLcyC3ITLw8aKNNo8"]} -{"Format": "IDEA0", "ID": "5152c115-5080-43a7-bfa1-dc4b4efe3d28", "DetectTime": "2023-10-30T14:04:41.977032+02:00", "EventTime": "2023-10-30T14:04:41.977049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CbHNb01fLxbRXQ9LRj"]} -{"Format": "Json", "ID": "5152c115-5080-43a7-bfa1-dc4b4efe3d28", "DetectTime": "2023-10-30T14:04:41.977032+02:00", "EventTime": "2023-10-30T14:04:41.977049+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:20:19.634349+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:42.053284)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ff7820b3-d161-4f66-b498-e69f43c40887", "DetectTime": "2023-10-30T14:04:42.058694+02:00", "EventTime": "2023-10-30T14:04:42.058708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["C4A7GPGVVPrUIvJEa"]} -{"Format": "IDEA0", "ID": "4237f9e0-3dc1-4a8a-9268-235183bc187a", "DetectTime": "2023-10-30T14:04:42.109534+02:00", "EventTime": "2023-10-30T14:04:42.109556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22660], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22660/UDP destination IP 186.47.55.122. ", "ContentType": "text/plain"}], "uids": ["CR6qkJ3yVFL99KrXrd"]} -{"Format": "IDEA0", "ID": "28a8ce13-1f27-494b-beaa-b026dc78a9ad", "DetectTime": "2023-10-30T14:04:42.159764+02:00", "EventTime": "2023-10-30T14:04:42.159777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27629], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27629/UDP destination IP 60.53.58.144. ", "ContentType": "text/plain"}], "uids": ["Chk6Bk3JXsNb5caNDf"]} -{"Format": "IDEA0", "ID": "ab1fcf29-88c4-4890-9ee3-b99c84911e1a", "DetectTime": "2023-10-30T14:04:42.205852+02:00", "EventTime": "2023-10-30T14:04:42.205869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CB9nO74SVaL5qO9Vx3"]} -{"Format": "IDEA0", "ID": "b7eaf2a0-8ec2-4b5b-876a-d1ebc45c0b6e", "DetectTime": "2023-10-30T14:04:42.256792+02:00", "EventTime": "2023-10-30T14:04:42.256820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22330], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22330/UDP destination IP 181.65.46.79. ", "ContentType": "text/plain"}], "uids": ["CJc5sB1LA8cR29u1re"]} -{"Format": "IDEA0", "ID": "7f57234c-f79c-4df0-8e5f-9e25f9805ca9", "DetectTime": "2023-10-30T14:04:42.309814+02:00", "EventTime": "2023-10-30T14:04:42.309832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CqU6Lg2S17MVMNylL9"]} -{"Format": "IDEA0", "ID": "f5854a4a-b15b-42ea-9bcd-dbea813b2fdc", "DetectTime": "2023-10-30T14:04:42.368791+02:00", "EventTime": "2023-10-30T14:04:42.368811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CdxmC83H1dECZfpbp3"]} -{"Format": "IDEA0", "ID": "2fb891d4-81bb-472b-890d-4f03226fbf26", "DetectTime": "2023-10-30T14:04:42.419663+02:00", "EventTime": "2023-10-30T14:04:42.419688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. ", "ContentType": "text/plain"}], "uids": ["CBMA8z2bndIOlOLXPh"]} -{"Format": "Json", "ID": "2fb891d4-81bb-472b-890d-4f03226fbf26", "DetectTime": "2023-10-30T14:04:42.419663+02:00", "EventTime": "2023-10-30T14:04:42.419688+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:22:12.777982+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:42.516352)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6581505-69bc-4fe2-90cb-72d89c44a7d1", "DetectTime": "2023-10-30T14:04:42.521552+02:00", "EventTime": "2023-10-30T14:04:42.521567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CqALIs44bgk5lqlaOj", "Cp2foS3g4fhKzu0Vab", "CXRkc5230D9Mc51CEj", "CdActm1Hwnsw7BFpGb"]} -{"Format": "IDEA0", "ID": "1b5b14f8-6b92-4095-9911-d4f20fe27939", "DetectTime": "2023-10-30T14:04:42.529925+02:00", "EventTime": "2023-10-30T14:04:42.529942+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CdActm1Hwnsw7BFpGb"]} -{"Format": "IDEA0", "ID": "ae2e152b-56cf-435f-a801-c21cc317e8a6", "DetectTime": "2023-10-30T14:04:42.542269+02:00", "EventTime": "2023-10-30T14:04:42.542289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["C0L7gy23xW4L0RBMQh"]} -{"Format": "IDEA0", "ID": "c7a0ff5d-c5da-4308-a520-df5184fb3e58", "DetectTime": "2023-10-30T14:04:42.589434+02:00", "EventTime": "2023-10-30T14:04:42.589452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. ", "ContentType": "text/plain"}], "uids": ["CSAS4y1crJ16xegc4i"]} -{"Format": "IDEA0", "ID": "8fe9aaee-e238-43c3-9515-8fc9252de2d7", "DetectTime": "2023-10-30T14:04:42.637497+02:00", "EventTime": "2023-10-30T14:04:42.637518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cpd7DH2Caacczn7jf1"]} -{"Format": "IDEA0", "ID": "632e55e9-33b6-4308-8b91-f99a758f824e", "DetectTime": "2023-10-30T14:04:42.646434+02:00", "EventTime": "2023-10-30T14:04:42.646454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CqQJ3z3jA0LcwfhfR1"]} -{"Format": "IDEA0", "ID": "46989ee9-ff7a-47a6-a585-7a4da09fdbac", "DetectTime": "2023-10-30T14:04:42.689857+02:00", "EventTime": "2023-10-30T14:04:42.689872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C3JPLG1V5LcDeKohL6"]} -{"Format": "IDEA0", "ID": "2488771e-ec78-4a96-b66c-243c6d2f541c", "DetectTime": "2023-10-30T14:04:42.735701+02:00", "EventTime": "2023-10-30T14:04:42.735723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4440], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4440/UDP destination IP 201.155.76.16. ", "ContentType": "text/plain"}], "uids": ["CpWJw99AIJ24AtaQj"]} -{"Format": "IDEA0", "ID": "fd06038e-7e58-442b-9627-1bd9e3f1798a", "DetectTime": "2023-10-30T14:04:42.783006+02:00", "EventTime": "2023-10-30T14:04:42.783031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5030], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5030/UDP destination IP 190.254.182.91. ", "ContentType": "text/plain"}], "uids": ["CZP2Do1QVgtmHxnvh"]} -{"Format": "IDEA0", "ID": "b17d933a-26be-4508-afb9-dc8314f587c5", "DetectTime": "2023-10-30T14:04:42.830709+02:00", "EventTime": "2023-10-30T14:04:42.830732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1130], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1130/UDP destination IP 190.200.221.34. ", "ContentType": "text/plain"}], "uids": ["CzTAIY3ovhVnvcz4rb"]} -{"Format": "IDEA0", "ID": "c7b80367-348d-4350-bea1-565c1aa3bebf", "DetectTime": "2023-10-30T14:04:42.874334+02:00", "EventTime": "2023-10-30T14:04:42.874359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdaGLM3Zm5cWaxTkq1"]} -{"Format": "Json", "ID": "c7b80367-348d-4350-bea1-565c1aa3bebf", "DetectTime": "2023-10-30T14:04:42.874334+02:00", "EventTime": "2023-10-30T14:04:42.874359+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-04T02:37:28.668445+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:42.955426)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed57a6d6-20a5-4c11-befd-558fb836031a", "DetectTime": "2023-10-30T14:04:42.960386+02:00", "EventTime": "2023-10-30T14:04:42.960408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CAUsuA4fdRVAbrHiv4"]} -{"Format": "IDEA0", "ID": "958e61be-f45d-47f3-871d-71a1766e2044", "DetectTime": "2023-10-30T14:04:43.005475+02:00", "EventTime": "2023-10-30T14:04:43.005488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CZem9A4argycHZTUZk"]} -{"Format": "IDEA0", "ID": "c3660279-04b6-4151-a2dc-3e96dba1139b", "DetectTime": "2023-10-30T14:04:43.050718+02:00", "EventTime": "2023-10-30T14:04:43.050733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CRUrFM1PILsDiimkl5"]} -{"Format": "IDEA0", "ID": "f7e85cbd-5d5a-46b2-b727-86b55a899ddf", "DetectTime": "2023-10-30T14:04:43.091444+02:00", "EventTime": "2023-10-30T14:04:43.091464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. ", "ContentType": "text/plain"}], "uids": ["CNaha23UQwCY6G8s6g"]} -{"Format": "IDEA0", "ID": "a6c5e6a2-38f8-45f5-89d6-3212775f4594", "DetectTime": "2023-10-30T14:04:43.135758+02:00", "EventTime": "2023-10-30T14:04:43.135777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14723], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. ", "ContentType": "text/plain"}], "uids": ["CX8OYu3NFMczXNVRO8"]} -{"Format": "IDEA0", "ID": "a8b1cba5-5be6-4a88-a576-e7b79b795627", "DetectTime": "2023-10-30T14:04:43.179697+02:00", "EventTime": "2023-10-30T14:04:43.179708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CLKO513USVMxgjUcyc"]} -{"Format": "IDEA0", "ID": "11318436-ca05-424d-8e4e-27b796da2473", "DetectTime": "2023-10-30T14:04:43.222592+02:00", "EventTime": "2023-10-30T14:04:43.222621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["ClHCUY3sydWzAIco7f"]} -{"Format": "IDEA0", "ID": "5242e9bd-cc4f-4584-948e-30ad2af5a5ac", "DetectTime": "2023-10-30T14:04:43.263604+02:00", "EventTime": "2023-10-30T14:04:43.263629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CNKg0E14YiYoYCVKp"]} -{"Format": "Json", "ID": "5242e9bd-cc4f-4584-948e-30ad2af5a5ac", "DetectTime": "2023-10-30T14:04:43.263604+02:00", "EventTime": "2023-10-30T14:04:43.263629+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:56:00.685692+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:43.342354)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5623b327-58e6-437d-82e9-73124e8ecd0e", "DetectTime": "2023-10-30T14:04:43.348842+02:00", "EventTime": "2023-10-30T14:04:43.348861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C6YUSo4kJSskrOufH3"]} -{"Format": "IDEA0", "ID": "3def5486-241e-4730-9f2a-73fd0aad1814", "DetectTime": "2023-10-30T14:04:43.392521+02:00", "EventTime": "2023-10-30T14:04:43.392549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CHbbaq4BMyvsjw25Uh"]} -{"Format": "IDEA0", "ID": "a31882c5-2d7c-4e95-83da-56b9baeb85f4", "DetectTime": "2023-10-30T14:04:43.432575+02:00", "EventTime": "2023-10-30T14:04:43.432600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CGoeKV244PQGRd0lj"]} -{"Format": "IDEA0", "ID": "34cc2e76-1a86-40e4-b2e8-3079c8a754e8", "DetectTime": "2023-10-30T14:04:43.476108+02:00", "EventTime": "2023-10-30T14:04:43.476124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CWpAcp6AkIjZ4xUA4"]} -{"Format": "IDEA0", "ID": "6e178da7-edcf-4b7e-8b97-94cd8ede7745", "DetectTime": "2023-10-30T14:04:43.515062+02:00", "EventTime": "2023-10-30T14:04:43.515085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CcoNxv1AE1yGThl0tc"]} -{"Format": "IDEA0", "ID": "96404419-e238-4728-b261-3fe0216d6d91", "DetectTime": "2023-10-30T14:04:43.556375+02:00", "EventTime": "2023-10-30T14:04:43.556401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cb5T5s12SU5j8IuHX9"]} -{"Format": "IDEA0", "ID": "15414ef0-4213-47e5-93ba-c71ba2ac7861", "DetectTime": "2023-10-30T14:04:43.598920+02:00", "EventTime": "2023-10-30T14:04:43.598942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["C1snZn2w8cIp6fi1q5"]} -{"Format": "IDEA0", "ID": "570e8a83-11f5-496f-87b0-5e78a0c75680", "DetectTime": "2023-10-30T14:04:43.641352+02:00", "EventTime": "2023-10-30T14:04:43.641377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CRs2CakOQYcXnIFI6"]} -{"Format": "Json", "ID": "570e8a83-11f5-496f-87b0-5e78a0c75680", "DetectTime": "2023-10-30T14:04:43.641352+02:00", "EventTime": "2023-10-30T14:04:43.641377+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:56:02.423321+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:43.710169)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "19f0cb23-d035-400b-88bb-bf1e16f482eb", "DetectTime": "2023-10-30T14:04:43.716593+02:00", "EventTime": "2023-10-30T14:04:43.716608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["C146VY38uoCzxuB3C3"]} -{"Format": "IDEA0", "ID": "a392b814-d99f-4e5a-8c3b-b802a4665b0a", "DetectTime": "2023-10-30T14:04:43.753409+02:00", "EventTime": "2023-10-30T14:04:43.753426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CRDKMp1t6VPIeMdE2l"]} -{"Format": "IDEA0", "ID": "e332bd9f-41b4-49c3-889d-bdbca4f6e2bd", "DetectTime": "2023-10-30T14:04:43.789519+02:00", "EventTime": "2023-10-30T14:04:43.789546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CpbmWa2e21C7cOoEYa"]} -{"Format": "IDEA0", "ID": "46374abc-dad5-4cc7-9151-a2ab63bc30bb", "DetectTime": "2023-10-30T14:04:43.825087+02:00", "EventTime": "2023-10-30T14:04:43.825100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CmJ8HZ1z3nydJldSRg"]} -{"Format": "IDEA0", "ID": "333ddcb2-ac76-4bc5-bcdb-91928442f62a", "DetectTime": "2023-10-30T14:04:43.855710+02:00", "EventTime": "2023-10-30T14:04:43.855729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Ckrs4U3xNxVcTKf9qc"]} -{"Format": "IDEA0", "ID": "23f499c3-8d58-4a45-95ff-f9dc4feeaaa8", "DetectTime": "2023-10-30T14:04:43.894244+02:00", "EventTime": "2023-10-30T14:04:43.894262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["CBxE2N3fFRwxSx8RAa"]} -{"Format": "IDEA0", "ID": "5a2ac8af-f205-494d-9cfb-6763792e0206", "DetectTime": "2023-10-30T14:04:43.928690+02:00", "EventTime": "2023-10-30T14:04:43.928710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["Cx7FW2U10T0ToPe56"]} -{"Format": "IDEA0", "ID": "81625e19-1971-4e08-bd2a-f366e5a4d61b", "DetectTime": "2023-10-30T14:04:43.968114+02:00", "EventTime": "2023-10-30T14:04:43.968132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CYLt024NHfopM2eqvc"]} -{"Format": "IDEA0", "ID": "b80370b7-9324-4c1a-8d4f-2941c4cf23b6", "DetectTime": "2023-10-30T14:04:44.005870+02:00", "EventTime": "2023-10-30T14:04:44.005893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. ", "ContentType": "text/plain"}], "uids": ["COTXtBPCk8JhPAT4e"]} -{"Format": "Json", "ID": "b80370b7-9324-4c1a-8d4f-2941c4cf23b6", "DetectTime": "2023-10-30T14:04:44.005870+02:00", "EventTime": "2023-10-30T14:04:44.005893+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:56:21.748963+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:44.075955)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "16e64a6e-a699-409d-95d3-1f7d9fac196a", "DetectTime": "2023-10-30T14:04:44.082505+02:00", "EventTime": "2023-10-30T14:04:44.082527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CnBNDc4l6sqWOxXtS7"]} -{"Format": "IDEA0", "ID": "fc833122-0b10-4ff3-ab2b-97a034f5d7d8", "DetectTime": "2023-10-30T14:04:44.122581+02:00", "EventTime": "2023-10-30T14:04:44.122603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CbC08mLxsjuelz2m2"]} -{"Format": "IDEA0", "ID": "0005dfc8-5557-43ef-888b-78ffa31c4a4f", "DetectTime": "2023-10-30T14:04:44.158326+02:00", "EventTime": "2023-10-30T14:04:44.158337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["Cod0Dx4HWP4dtZoHVg"]} -{"Format": "IDEA0", "ID": "c8b64089-6d22-4982-8e47-f979e533e6f3", "DetectTime": "2023-10-30T14:04:44.191093+02:00", "EventTime": "2023-10-30T14:04:44.191111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["C0loyxv9WbXr6gfIe"]} -{"Format": "IDEA0", "ID": "4afe9890-ebc8-475b-8c1c-8e225906ae9a", "DetectTime": "2023-10-30T14:04:44.224111+02:00", "EventTime": "2023-10-30T14:04:44.224138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22330], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22330/UDP destination IP 181.65.46.79. ", "ContentType": "text/plain"}], "uids": ["Crw0353ptMHnzENzHj"]} -{"Format": "IDEA0", "ID": "baf8f33d-3c6b-4f9c-8a4e-ca1cf23af249", "DetectTime": "2023-10-30T14:04:44.258381+02:00", "EventTime": "2023-10-30T14:04:44.258397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CXEkwu1VYioHDVvCXe"]} -{"Format": "IDEA0", "ID": "152fb67d-3eb9-4fe0-89fd-66b065516602", "DetectTime": "2023-10-30T14:04:44.288181+02:00", "EventTime": "2023-10-30T14:04:44.288201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C0C28U3xqujf4uhUc3"]} -{"Format": "IDEA0", "ID": "ea0f0729-0de5-4ac1-a438-a34e31aca10f", "DetectTime": "2023-10-30T14:04:44.320784+02:00", "EventTime": "2023-10-30T14:04:44.320810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["CvgxLL3r7r0YCDjjj"]} -{"Format": "Json", "ID": "ea0f0729-0de5-4ac1-a438-a34e31aca10f", "DetectTime": "2023-10-30T14:04:44.320784+02:00", "EventTime": "2023-10-30T14:04:44.320810+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T02:57:16.340280+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2023/10/30 14:04:44.392246)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f0da72b2-b575-4b12-8f8d-8eb4fde33b4d", "DetectTime": "2023-10-30T14:04:44.401608+02:00", "EventTime": "2023-10-30T14:04:44.401639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. ", "ContentType": "text/plain"}], "uids": ["CBvgmo2pSdF3K0Oj34"]} -{"Format": "IDEA0", "ID": "8acab131-216f-4692-91ce-173c528d4fe4", "DetectTime": "2023-10-30T14:04:44.437792+02:00", "EventTime": "2023-10-30T14:04:44.437803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CCVzJQ2XBTlVfk6d1l"]} -{"Format": "IDEA0", "ID": "403d9ece-992b-469f-b882-69df6669ad49", "DetectTime": "2023-10-30T14:04:44.469827+02:00", "EventTime": "2023-10-30T14:04:44.469846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CUXTqc36iRkLDLTrT1"]} -{"Format": "IDEA0", "ID": "038fe21b-8d03-481e-a987-546f8815aab7", "DetectTime": "2023-10-30T14:04:44.503027+02:00", "EventTime": "2023-10-30T14:04:44.503052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1130], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1130/UDP destination IP 190.200.221.34. ", "ContentType": "text/plain"}], "uids": ["C7c38b1pGkX0y7Aqq6"]} -{"Format": "IDEA0", "ID": "422dc597-8f34-405d-8796-fe5de2953b97", "DetectTime": "2023-10-30T14:04:44.536960+02:00", "EventTime": "2023-10-30T14:04:44.536983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cs7xFr35gpdzEbQBy6"]} -{"Format": "IDEA0", "ID": "672c231b-fb1a-4a87-bde5-21fe3c65e26f", "DetectTime": "2023-10-30T14:04:44.567838+02:00", "EventTime": "2023-10-30T14:04:44.567857+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CECJsX1PgKJHU4NXEg"]} -{"Format": "IDEA0", "ID": "84beff5d-06c2-4e5e-abfe-67f0600da295", "DetectTime": "2023-10-30T14:04:44.575152+02:00", "EventTime": "2023-10-30T14:04:44.575164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20050], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. ", "ContentType": "text/plain"}], "uids": ["Cma5OPMALNZ1Pek8f"]} -{"Format": "IDEA0", "ID": "fec98f8e-7d2b-4698-afa5-30b49f757d37", "DetectTime": "2023-10-30T14:04:44.605637+02:00", "EventTime": "2023-10-30T14:04:44.605654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. ", "ContentType": "text/plain"}], "uids": ["CdbfJysxq3n2GE4X1"]} -{"Format": "IDEA0", "ID": "cbbee7f4-6648-423b-a2f8-180907a4e781", "DetectTime": "2023-10-30T14:04:44.635511+02:00", "EventTime": "2023-10-30T14:04:44.635530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4440], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4440/UDP destination IP 201.155.76.16. ", "ContentType": "text/plain"}], "uids": ["CLkW3y4dOj7PSSyLL"]} -{"Format": "IDEA0", "ID": "f2c8583a-0eb7-4095-a4cd-db12be22613d", "DetectTime": "2023-10-30T14:04:44.662562+02:00", "EventTime": "2023-10-30T14:04:44.662578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cyh6PD1dbprpfGTizj"]} -{"Format": "IDEA0", "ID": "572f5590-56ab-43cf-8d80-cf735cf92feb", "DetectTime": "2023-10-30T14:04:44.691727+02:00", "EventTime": "2023-10-30T14:04:44.691747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CaUg4z2R7CvkClgqC2"]} -{"Format": "IDEA0", "ID": "17a1c3f8-30ae-41f7-9676-eb3b0ae2354d", "DetectTime": "2023-10-30T14:04:44.723646+02:00", "EventTime": "2023-10-30T14:04:44.723664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CnSwee1yq82VebE41e"]} -{"Format": "Json", "ID": "17a1c3f8-30ae-41f7-9676-eb3b0ae2354d", "DetectTime": "2023-10-30T14:04:44.723646+02:00", "EventTime": "2023-10-30T14:04:44.723664+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T03:28:50.551290+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 74. (real time 2023/10/30 14:04:44.790658)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b352321d-ecb8-462b-8a5f-04044bcb88cf", "DetectTime": "2023-10-30T14:04:44.796208+02:00", "EventTime": "2023-10-30T14:04:44.796228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29881], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. ", "ContentType": "text/plain"}], "uids": ["CC8GJ02ZGX32salIg7"]} -{"Format": "IDEA0", "ID": "06a5bf6f-96bf-4ec6-8d14-3c83541714f8", "DetectTime": "2023-10-30T14:04:44.829284+02:00", "EventTime": "2023-10-30T14:04:44.829303+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CnnVmJ1MUwPs6XErZj"]} -{"Format": "IDEA0", "ID": "f5f0b7df-63bf-459f-84e6-9e9b523c073f", "DetectTime": "2023-10-30T14:04:44.836963+02:00", "EventTime": "2023-10-30T14:04:44.836975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["C29eBsTNpWYw6pUwi"]} -{"Format": "IDEA0", "ID": "cc751c7f-2dd1-4ab1-ab9c-fecb6b041722", "DetectTime": "2023-10-30T14:04:44.864529+02:00", "EventTime": "2023-10-30T14:04:44.864549+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CXOpD9381T61BKXXk2"]} -{"Format": "IDEA0", "ID": "22a863cc-fdb1-4178-98cf-517adf81cf11", "DetectTime": "2023-10-30T14:04:44.919873+02:00", "EventTime": "2023-10-30T14:04:44.919889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C3rFJx21w9lDaUbtog"]} -{"Format": "IDEA0", "ID": "11e336fc-1997-4a15-92ad-52e7e073a90c", "DetectTime": "2023-10-30T14:04:44.948911+02:00", "EventTime": "2023-10-30T14:04:44.948926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHQuCc3sBQrpFxS16d"]} -{"Format": "IDEA0", "ID": "5f4aba2c-a3b6-4f1f-87d9-b6731aee4d68", "DetectTime": "2023-10-30T14:04:44.977524+02:00", "EventTime": "2023-10-30T14:04:44.977542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CsLqyF3y42ClN4VJd5"]} -{"Format": "IDEA0", "ID": "9ea95357-dcab-45b2-8823-9995789a304b", "DetectTime": "2023-10-30T14:04:45.005119+02:00", "EventTime": "2023-10-30T14:04:45.005132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CJ6eMV1yUswKGc8WOc"]} -{"Format": "IDEA0", "ID": "31fa963f-91d8-41e6-9924-4ad3dd28d73b", "DetectTime": "2023-10-30T14:04:45.033155+02:00", "EventTime": "2023-10-30T14:04:45.033175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CJqqU81kgbExhQYZE6"]} -{"Format": "IDEA0", "ID": "9c277972-fd26-428b-ae24-fc0929dbe9d8", "DetectTime": "2023-10-30T14:04:45.062073+02:00", "EventTime": "2023-10-30T14:04:45.062099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CAxW02Pu9MvyWwSgd"]} -{"Format": "Json", "ID": "9c277972-fd26-428b-ae24-fc0929dbe9d8", "DetectTime": "2023-10-30T14:04:45.062073+02:00", "EventTime": "2023-10-30T14:04:45.062099+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T03:29:27.509797+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 74. (real time 2023/10/30 14:04:45.120385)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "52f9201c-f53b-430b-bb75-5fde5797c86a", "DetectTime": "2023-10-30T14:04:45.125627+02:00", "EventTime": "2023-10-30T14:04:45.125643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CYepAT1qItaxf17qX8"]} -{"Format": "IDEA0", "ID": "52b95c95-c2c1-465a-9247-76d63377b141", "DetectTime": "2023-10-30T14:04:45.157197+02:00", "EventTime": "2023-10-30T14:04:45.157215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["C6LJFI1W2vSCzWBk56"]} -{"Format": "IDEA0", "ID": "6ffe9281-1ca5-40aa-bcf5-1fdef4a53b38", "DetectTime": "2023-10-30T14:04:45.181413+02:00", "EventTime": "2023-10-30T14:04:45.181433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CsX6Kr1IrOXGhYjF8"]} -{"Format": "IDEA0", "ID": "a57af956-be9c-452a-a034-59bd27a78b85", "DetectTime": "2023-10-30T14:04:45.206213+02:00", "EventTime": "2023-10-30T14:04:45.206229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CK70Sa3b3uRTqXm1Y4"]} -{"Format": "IDEA0", "ID": "e227146e-35b8-4d7a-984c-aa2e4f37f251", "DetectTime": "2023-10-30T14:04:45.235878+02:00", "EventTime": "2023-10-30T14:04:45.235895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CZnet6173TsNw5ey5h"]} -{"Format": "IDEA0", "ID": "f09449c2-2d35-4c99-93ad-ce6f54ec8f5a", "DetectTime": "2023-10-30T14:04:45.262381+02:00", "EventTime": "2023-10-30T14:04:45.262397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. ", "ContentType": "text/plain"}], "uids": ["CrpSlA4LYmtaGnu9Gl"]} -{"Format": "IDEA0", "ID": "d8b2e858-677a-4adc-9d2d-e721989bfe25", "DetectTime": "2023-10-30T14:04:45.287920+02:00", "EventTime": "2023-10-30T14:04:45.287940+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CVxCrN2HNxzRybmcDg"]} -{"Format": "IDEA0", "ID": "2284647f-4f6e-41ee-8fbc-23461d8d7488", "DetectTime": "2023-10-30T14:04:45.295909+02:00", "EventTime": "2023-10-30T14:04:45.295930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNljE13JYmH46NCuqk"]} -{"Format": "IDEA0", "ID": "36c73a05-ad26-4b88-9ae9-439924fc73f3", "DetectTime": "2023-10-30T14:04:45.321921+02:00", "EventTime": "2023-10-30T14:04:45.321937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["C5ScL33xXqfCf9CVy8"]} -{"Format": "Json", "ID": "36c73a05-ad26-4b88-9ae9-439924fc73f3", "DetectTime": "2023-10-30T14:04:45.321921+02:00", "EventTime": "2023-10-30T14:04:45.321937+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T03:29:29.589647+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 74. (real time 2023/10/30 14:04:45.381635)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae1544db-221e-4acc-9f7f-d95e1de6178d", "DetectTime": "2023-10-30T14:04:45.386965+02:00", "EventTime": "2023-10-30T14:04:45.386983+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWKfCy4a4JzRo55hr6"]} -{"Format": "IDEA0", "ID": "f541d365-f648-4529-b8c6-654dd316a495", "DetectTime": "2023-10-30T14:04:45.395912+02:00", "EventTime": "2023-10-30T14:04:45.395934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["Cs09gWmJszyqeebm6"]} -{"Format": "IDEA0", "ID": "922fbca2-50c0-468f-a5d7-e659ab38420b", "DetectTime": "2023-10-30T14:04:45.417976+02:00", "EventTime": "2023-10-30T14:04:45.417990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["CggsuLCfai7lVFFPi"]} -{"Format": "IDEA0", "ID": "c38c2f53-9bb9-45d7-9c6b-07b18776a9e1", "DetectTime": "2023-10-30T14:04:45.441376+02:00", "EventTime": "2023-10-30T14:04:45.441396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["ClwloF4Mh9tyNG1qP"]} -{"Format": "IDEA0", "ID": "8114867a-8d1f-41fa-9eae-fab277dc26ed", "DetectTime": "2023-10-30T14:04:45.468205+02:00", "EventTime": "2023-10-30T14:04:45.468221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. ", "ContentType": "text/plain"}], "uids": ["CaIwQP2E5JqwZf9Jek"]} -{"Format": "IDEA0", "ID": "fab75493-0563-46a4-ba93-da3eae394ce8", "DetectTime": "2023-10-30T14:04:45.493823+02:00", "EventTime": "2023-10-30T14:04:45.493837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CqMTOy4IHCZOwWVxgf"]} -{"Format": "IDEA0", "ID": "4cbdad7c-2df4-445d-87b2-d7cbfb18b146", "DetectTime": "2023-10-30T14:04:45.517133+02:00", "EventTime": "2023-10-30T14:04:45.517158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CZdaoLvDWgZ6BDyx"]} -{"Format": "IDEA0", "ID": "7f681031-79b8-4d60-8ab2-6547de8782ac", "DetectTime": "2023-10-30T14:04:45.539599+02:00", "EventTime": "2023-10-30T14:04:45.539619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CO8aJANR6r4gLXOu5"]} -{"Format": "IDEA0", "ID": "a303aab8-78b8-4f4f-ba24-e5b7de50e3c1", "DetectTime": "2023-10-30T14:04:45.561954+02:00", "EventTime": "2023-10-30T14:04:45.561968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22330], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 22330/UDP destination IP 181.65.46.79. ", "ContentType": "text/plain"}], "uids": ["CAgDmC2omVrSUiz4l8"]} -{"Format": "Json", "ID": "a303aab8-78b8-4f4f-ba24-e5b7de50e3c1", "DetectTime": "2023-10-30T14:04:45.561954+02:00", "EventTime": "2023-10-30T14:04:45.561968+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [22330], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T03:29:31.577819+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 74. (real time 2023/10/30 14:04:45.612797)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7d3282ba-bdc8-4211-8e8b-1dd9fae3a1f4", "DetectTime": "2023-10-30T14:04:45.617734+02:00", "EventTime": "2023-10-30T14:04:45.617751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CSarC61Wbl4NcjddO4"]} -{"Format": "IDEA0", "ID": "17449fe8-ec1d-4dfa-89d5-1541e4a11204", "DetectTime": "2023-10-30T14:04:45.640336+02:00", "EventTime": "2023-10-30T14:04:45.640352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. ", "ContentType": "text/plain"}], "uids": ["Cgp8Bw1318eN1xIOJ1"]} -{"Format": "IDEA0", "ID": "e393c0d0-806d-405e-ac91-87fa0c3c69cd", "DetectTime": "2023-10-30T14:04:45.663539+02:00", "EventTime": "2023-10-30T14:04:45.663559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["C8kg1d188KYyA2av3b"]} -{"Format": "IDEA0", "ID": "d74f742c-6360-4f2f-87e3-231a4d81a37b", "DetectTime": "2023-10-30T14:04:45.686218+02:00", "EventTime": "2023-10-30T14:04:45.686239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CLW6S7KXihfUJEC39"]} -{"Format": "IDEA0", "ID": "04204d25-dca0-4660-bee5-453bfc0ca2c4", "DetectTime": "2023-10-30T14:04:45.707392+02:00", "EventTime": "2023-10-30T14:04:45.707416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CdrS9c4QxEMbiPG1rj"]} -{"Format": "IDEA0", "ID": "f6c8a851-e27f-480f-8936-956389c8d662", "DetectTime": "2023-10-30T14:04:45.727667+02:00", "EventTime": "2023-10-30T14:04:45.727684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1130], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1130/UDP destination IP 190.200.221.34. ", "ContentType": "text/plain"}], "uids": ["CxUZP33iDEhwTH07Wa"]} -{"Format": "IDEA0", "ID": "2f646ca7-ddec-47e4-85e2-e1ed7ad2ea5d", "DetectTime": "2023-10-30T14:04:45.750378+02:00", "EventTime": "2023-10-30T14:04:45.750396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CY5RGuTImbnM4Gws3"]} -{"Format": "IDEA0", "ID": "68f04f9d-6eac-4dfd-a89d-0d0eba478f69", "DetectTime": "2023-10-30T14:04:45.783052+02:00", "EventTime": "2023-10-30T14:04:45.783071+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Hostname": ["157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.154.42.157 from 10.0.2.19. blacklisted IP AS: TELEFONICA_DE_ESPANA, ES AS3352 rDNS: 157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CSBOPGyeLJyFt7M17"]} -{"Format": "IDEA0", "ID": "e15809a7-8d43-4329-9a76-00472ecd6a4b", "DetectTime": "2023-10-30T14:04:45.856996+02:00", "EventTime": "2023-10-30T14:04:45.857013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CrY6jskWWompL60og"]} -{"Format": "IDEA0", "ID": "b162a422-d1cb-4d2b-8c42-34e9bea86e63", "DetectTime": "2023-10-30T14:04:45.922762+02:00", "EventTime": "2023-10-30T14:04:45.922796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20050], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. ", "ContentType": "text/plain"}], "uids": ["CZqc5kB9uGb3sgU7d"]} -{"Format": "IDEA0", "ID": "3fc81e58-dd5f-4b13-8038-3fb5e76b5c1c", "DetectTime": "2023-10-30T14:04:45.988335+02:00", "EventTime": "2023-10-30T14:04:45.988356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. ", "ContentType": "text/plain"}], "uids": ["C2JwBX35xEjB9mXGb6"]} -{"Format": "IDEA0", "ID": "ed659df3-a32e-4121-96a2-7812966504df", "DetectTime": "2023-10-30T14:04:46.126853+02:00", "EventTime": "2023-10-30T14:04:46.126887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CqeikT2XV0XXkeKtu6"]} -{"Format": "IDEA0", "ID": "6ab6dfbe-4592-422c-a0a7-8ae18d5bfa51", "DetectTime": "2023-10-30T14:04:46.274706+02:00", "EventTime": "2023-10-30T14:04:46.274724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CWILcz1qVqGM3D1DU"]} -{"Format": "IDEA0", "ID": "542aed66-05e6-4bfe-9147-d7c6789e7e44", "DetectTime": "2023-10-30T14:04:46.343830+02:00", "EventTime": "2023-10-30T14:04:46.343847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4440], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4440/UDP destination IP 201.155.76.16. ", "ContentType": "text/plain"}], "uids": ["ChUduT2hEZGCvvQgmf"]} -{"Format": "Json", "ID": "542aed66-05e6-4bfe-9147-d7c6789e7e44", "DetectTime": "2023-10-30T14:04:46.343830+02:00", "EventTime": "2023-10-30T14:04:46.343847+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4440], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:00:58.401399+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:04:46.548025)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a10a9eed-0fa2-4d16-a11a-a3a10afcec24", "DetectTime": "2023-10-30T14:04:46.555859+02:00", "EventTime": "2023-10-30T14:04:46.555880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CoFhus1SSwmbHPBMRj"]} -{"Format": "IDEA0", "ID": "584c207a-85b9-46ea-b117-d0d3246338b4", "DetectTime": "2023-10-30T14:04:46.602458+02:00", "EventTime": "2023-10-30T14:04:46.602488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CxqgwD2di6mZuBHM6a"]} -{"Format": "IDEA0", "ID": "23005b33-e4bc-48a8-989a-aab07a2bbf26", "DetectTime": "2023-10-30T14:04:46.657439+02:00", "EventTime": "2023-10-30T14:04:46.657456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CJIdUhzhTzowvcVI8"]} -{"Format": "IDEA0", "ID": "8cbf3fbe-412d-4f38-b960-21d12f0fc96d", "DetectTime": "2023-10-30T14:04:46.690175+02:00", "EventTime": "2023-10-30T14:04:46.690191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["CkwVeM154wZKgBWeNk"]} -{"Format": "IDEA0", "ID": "2cdeab6c-255d-49c6-98de-e35e46351b06", "DetectTime": "2023-10-30T14:04:46.723020+02:00", "EventTime": "2023-10-30T14:04:46.723046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CYBTpO3pp3c1nebv8h"]} -{"Format": "IDEA0", "ID": "f8b7780a-0111-4a27-8f51-8adb7d8e5bb5", "DetectTime": "2023-10-30T14:04:46.773744+02:00", "EventTime": "2023-10-30T14:04:46.773772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CxyO1t4OkUjBh8uezj"]} -{"Format": "IDEA0", "ID": "a0cc0934-eda0-4d36-84b1-b6196393f4ed", "DetectTime": "2023-10-30T14:04:46.806994+02:00", "EventTime": "2023-10-30T14:04:46.807010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CSmgEPbt5IEI3zIy1"]} -{"Format": "IDEA0", "ID": "62d8a7dc-a936-4ed7-a1ff-5d7c2f3197c1", "DetectTime": "2023-10-30T14:04:46.858302+02:00", "EventTime": "2023-10-30T14:04:46.858321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CARLJU103I7nw4K7M6"]} -{"Format": "IDEA0", "ID": "1628ffa1-fd27-4446-9ad0-7351165c156d", "DetectTime": "2023-10-30T14:04:46.909545+02:00", "EventTime": "2023-10-30T14:04:46.909560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CM25a52k9LAVZQ1Thh"]} -{"Format": "IDEA0", "ID": "5d19fb34-7b37-4137-924e-2e9d633486ee", "DetectTime": "2023-10-30T14:04:46.961484+02:00", "EventTime": "2023-10-30T14:04:46.961505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.166.143.39 ", "ContentType": "text/plain"}], "uids": ["ClKmVk3ORfNbaXaGS5"]} -{"Format": "IDEA0", "ID": "2bfa2d6c-2711-47e8-bd71-c3dc71f0b187", "DetectTime": "2023-10-30T14:04:46.992276+02:00", "EventTime": "2023-10-30T14:04:46.992301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CLcEso4ll1S5PZA056"]} -{"Format": "IDEA0", "ID": "d5e088bf-d3d8-4938-80f2-78ad0aace223", "DetectTime": "2023-10-30T14:04:47.039568+02:00", "EventTime": "2023-10-30T14:04:47.039586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["CwlHWN3k3vhPrGp173"]} -{"Format": "IDEA0", "ID": "404f0011-5ae5-4bce-8d54-37147b999588", "DetectTime": "2023-10-30T14:04:47.069732+02:00", "EventTime": "2023-10-30T14:04:47.069745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["C2XPz64XL05OuMYuOi"]} -{"Format": "IDEA0", "ID": "e43b9946-7b65-4d42-bce9-27275f70dcab", "DetectTime": "2023-10-30T14:04:47.097484+02:00", "EventTime": "2023-10-30T14:04:47.097505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["CCJJP51qCDrObEq7ji"]} -{"Format": "IDEA0", "ID": "d96b2d4e-6993-40de-aa8d-e00d3057635c", "DetectTime": "2023-10-30T14:04:47.126136+02:00", "EventTime": "2023-10-30T14:04:47.126160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C7lDtw2I8NWS8Cy8r4"]} -{"Format": "IDEA0", "ID": "d050261a-7ed1-47c2-adcb-705f4c431b40", "DetectTime": "2023-10-30T14:04:47.161564+02:00", "EventTime": "2023-10-30T14:04:47.161588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CsLgWF4dqyned22oX8"]} -{"Format": "IDEA0", "ID": "fe5d7a86-63b0-4925-9a32-f671fc31e527", "DetectTime": "2023-10-30T14:04:47.192147+02:00", "EventTime": "2023-10-30T14:04:47.192167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C7P45z3tKNXiSDtB54"]} -{"Format": "IDEA0", "ID": "aee24be0-1be0-40a7-b746-ffc88b35f00c", "DetectTime": "2023-10-30T14:04:47.221930+02:00", "EventTime": "2023-10-30T14:04:47.221953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CDA2ug1Gz81ntmnm03"]} -{"Format": "IDEA0", "ID": "e9dc579f-a680-4085-b01c-0c60d2961ff1", "DetectTime": "2023-10-30T14:04:47.251217+02:00", "EventTime": "2023-10-30T14:04:47.251243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJBy6i22UpTyE2tUqf"]} -{"Format": "IDEA0", "ID": "db88c380-956e-4802-9c94-4b205b252f95", "DetectTime": "2023-10-30T14:04:47.280992+02:00", "EventTime": "2023-10-30T14:04:47.281013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CfLNmZUSYV1aNuIhl"]} -{"Format": "IDEA0", "ID": "d6d4102b-2411-4281-8eec-17c4489c6201", "DetectTime": "2023-10-30T14:04:47.329794+02:00", "EventTime": "2023-10-30T14:04:47.329811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CDJTZc46HfS13vYpj1"]} -{"Format": "IDEA0", "ID": "03e8ab31-4325-4427-a57e-e95e20120526", "DetectTime": "2023-10-30T14:04:47.357216+02:00", "EventTime": "2023-10-30T14:04:47.357228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C8ifEx3xVAPSIA7Tb1"]} -{"Format": "IDEA0", "ID": "69eee7f7-e770-4dc5-b6dc-7f6b6eba59fb", "DetectTime": "2023-10-30T14:04:47.383883+02:00", "EventTime": "2023-10-30T14:04:47.383907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CgVlha2emWMapJKcY"]} -{"Format": "IDEA0", "ID": "3a8ed100-c64a-4a4a-8703-3f784e919c78", "DetectTime": "2023-10-30T14:04:47.410792+02:00", "EventTime": "2023-10-30T14:04:47.410820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C1yE5q1GPhCgniqmb6"]} -{"Format": "IDEA0", "ID": "67276173-3c47-4482-af12-e8717255511d", "DetectTime": "2023-10-30T14:04:47.439541+02:00", "EventTime": "2023-10-30T14:04:47.439559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CSIVUl2ZshrNpAEOOf"]} -{"Format": "IDEA0", "ID": "d2e8d0f6-5d20-419f-9ee6-9afde4ecf351", "DetectTime": "2023-10-30T14:04:47.467804+02:00", "EventTime": "2023-10-30T14:04:47.467821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CI0WfdxmAv80KvS6h"]} -{"Format": "IDEA0", "ID": "40f624ff-b0cd-49db-81e3-f05f89133f49", "DetectTime": "2023-10-30T14:04:47.495709+02:00", "EventTime": "2023-10-30T14:04:47.495731+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyrNpb37Or2zvkvjqe"]} -{"Format": "IDEA0", "ID": "f292226d-cbf2-456d-9320-f24351b3d525", "DetectTime": "2023-10-30T14:04:47.503635+02:00", "EventTime": "2023-10-30T14:04:47.503652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cw9AlA3ATi3YyskjX2"]} -{"Format": "IDEA0", "ID": "afdf4564-bb0c-4688-a996-4d3125d2c50f", "DetectTime": "2023-10-30T14:04:47.528460+02:00", "EventTime": "2023-10-30T14:04:47.528476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["Ca0vweXPyctpoZ3hb"]} -{"Format": "IDEA0", "ID": "083bb9fc-3345-4634-8e1a-714f4c8b2529", "DetectTime": "2023-10-30T14:04:47.557464+02:00", "EventTime": "2023-10-30T14:04:47.557481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["Ck54mb4DHV1PSjvbYh"]} -{"Format": "IDEA0", "ID": "5d6660cc-f3a3-43a5-9a06-5f3aab6b0501", "DetectTime": "2023-10-30T14:04:47.588226+02:00", "EventTime": "2023-10-30T14:04:47.588246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["Cif3AA4F93FZZI2XU3"]} -{"Format": "IDEA0", "ID": "ba826059-a06f-4c0e-99f8-7ac867443af8", "DetectTime": "2023-10-30T14:04:47.617283+02:00", "EventTime": "2023-10-30T14:04:47.617303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["C8r0iz394lihCmZ3I1"]} -{"Format": "IDEA0", "ID": "10d31a9b-a466-418a-ba89-60aa4d7e14af", "DetectTime": "2023-10-30T14:04:47.644846+02:00", "EventTime": "2023-10-30T14:04:47.644870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CEBeeC4U13hmxbnmih"]} -{"Format": "IDEA0", "ID": "22042c0f-0687-49fe-8721-91c5660a2416", "DetectTime": "2023-10-30T14:04:47.677038+02:00", "EventTime": "2023-10-30T14:04:47.677056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CkBonP4ff8TIxC3T4"]} -{"Format": "IDEA0", "ID": "cd9b5ba3-928d-4330-9045-fa18a1daeb42", "DetectTime": "2023-10-30T14:04:47.712480+02:00", "EventTime": "2023-10-30T14:04:47.712508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. ", "ContentType": "text/plain"}], "uids": ["CdXaC5116CHtS3NGEd"]} -{"Format": "Json", "ID": "cd9b5ba3-928d-4330-9045-fa18a1daeb42", "DetectTime": "2023-10-30T14:04:47.712480+02:00", "EventTime": "2023-10-30T14:04:47.712508+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9471], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:01:15.912304+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:04:47.799841)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b8d0a0c4-20b4-4968-afb7-0c7fc2313b7e", "DetectTime": "2023-10-30T14:04:47.805330+02:00", "EventTime": "2023-10-30T14:04:47.805347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CFgz4c3rSHjkfALfTc"]} -{"Format": "IDEA0", "ID": "94b413bf-f73b-4e44-86b5-a63aa8d8d9f6", "DetectTime": "2023-10-30T14:04:47.836627+02:00", "EventTime": "2023-10-30T14:04:47.836654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["C3sqgg1q6zpwcZudS3"]} -{"Format": "IDEA0", "ID": "3d85df8b-f4ea-49aa-93ed-697e48f0f575", "DetectTime": "2023-10-30T14:04:47.864692+02:00", "EventTime": "2023-10-30T14:04:47.864713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CHdaKf4vCkmjpQ7Zq8"]} -{"Format": "IDEA0", "ID": "0a87c285-a2fa-4b41-86a1-81f40a6a7183", "DetectTime": "2023-10-30T14:04:47.896267+02:00", "EventTime": "2023-10-30T14:04:47.896289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["C0bZAZ2ffOGHHJ6Id2"]} -{"Format": "IDEA0", "ID": "ba10decc-dbab-4d0f-a9d2-001a10c6e425", "DetectTime": "2023-10-30T14:04:47.933051+02:00", "EventTime": "2023-10-30T14:04:47.933100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["Cg94pv3bg8pseerJ9g"]} -{"Format": "IDEA0", "ID": "6eea7333-bf05-413d-a750-1310b2dfd9d7", "DetectTime": "2023-10-30T14:04:47.965565+02:00", "EventTime": "2023-10-30T14:04:47.965586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["CyxZEI8pfxSAzTF4a"]} -{"Format": "IDEA0", "ID": "3c391941-58e1-4330-b0f3-3b9a7167f254", "DetectTime": "2023-10-30T14:04:47.995488+02:00", "EventTime": "2023-10-30T14:04:47.995508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["CAYfiy3usdbeBlGch1"]} -{"Format": "IDEA0", "ID": "8c6b6474-5d5e-41a4-9518-26e623ede574", "DetectTime": "2023-10-30T14:04:48.033972+02:00", "EventTime": "2023-10-30T14:04:48.033998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CjK244216JFgDerU1h"]} -{"Format": "IDEA0", "ID": "cd66e3c8-9b48-4c14-af49-379d0cccf18c", "DetectTime": "2023-10-30T14:04:48.064897+02:00", "EventTime": "2023-10-30T14:04:48.065149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CoQeXI1blIFFCHIgz7"]} -{"Format": "IDEA0", "ID": "6015aba5-534b-41fd-8ab9-a47cc17e3a7b", "DetectTime": "2023-10-30T14:04:48.097473+02:00", "EventTime": "2023-10-30T14:04:48.097491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["Cca5vi3vNBwrhHLheh"]} -{"Format": "IDEA0", "ID": "e417014d-8690-466d-a181-4b291e52ae34", "DetectTime": "2023-10-30T14:04:48.127051+02:00", "EventTime": "2023-10-30T14:04:48.127063+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2c9iq39sXaEEWpAog"]} -{"Format": "IDEA0", "ID": "9892eb64-b6d2-4abb-b0d0-2c030a2c6757", "DetectTime": "2023-10-30T14:04:48.133860+02:00", "EventTime": "2023-10-30T14:04:48.133877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CfGE9433dGIDuq3l5g"]} -{"Format": "IDEA0", "ID": "86fe32f2-9b04-46e0-bbb3-81e774af1eb0", "DetectTime": "2023-10-30T14:04:48.163754+02:00", "EventTime": "2023-10-30T14:04:48.163774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ClRXtQ3OVWKFmnoJZe"]} -{"Format": "IDEA0", "ID": "f86e5ef9-778b-4c5f-bf41-a0e995e237dd", "DetectTime": "2023-10-30T14:04:48.193787+02:00", "EventTime": "2023-10-30T14:04:48.193804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CMiajwzuhzwP5Hahf"]} -{"Format": "IDEA0", "ID": "41efc46a-5be0-491b-9a23-ca53dc73030b", "DetectTime": "2023-10-30T14:04:48.223367+02:00", "EventTime": "2023-10-30T14:04:48.223387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CrXtCb1Tl9d5zjIWX6"]} -{"Format": "IDEA0", "ID": "39167721-2089-44a9-848d-a380c133f912", "DetectTime": "2023-10-30T14:04:48.252981+02:00", "EventTime": "2023-10-30T14:04:48.252996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CqzDZ9cjsyNjwsO23"]} -{"Format": "IDEA0", "ID": "ad5add18-97f2-4d08-8592-5a7c619694ac", "DetectTime": "2023-10-30T14:04:48.280346+02:00", "EventTime": "2023-10-30T14:04:48.280368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CBWLzX3f186749a7ic"]} -{"Format": "IDEA0", "ID": "b012a92c-bdd2-47d9-9216-051a51a71744", "DetectTime": "2023-10-30T14:04:48.310882+02:00", "EventTime": "2023-10-30T14:04:48.310902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CLdijI3TcpiJjAsqf6"]} -{"Format": "IDEA0", "ID": "1c2aa9eb-e86d-473f-a49b-d537000d364a", "DetectTime": "2023-10-30T14:04:48.357048+02:00", "EventTime": "2023-10-30T14:04:48.357065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["Cge8vv4IWLyPZQaqUg"]} -{"Format": "IDEA0", "ID": "cb6477b6-23da-4935-b99b-13ae5786d9ad", "DetectTime": "2023-10-30T14:04:48.387745+02:00", "EventTime": "2023-10-30T14:04:48.387762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 49.49.97.102 ", "ContentType": "text/plain"}], "uids": ["CsKYtl2VymNOfgH8H9"]} -{"Format": "IDEA0", "ID": "8863aa98-7666-46fd-9ed8-951aea24f33f", "DetectTime": "2023-10-30T14:04:48.419696+02:00", "EventTime": "2023-10-30T14:04:48.419716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CO7JZe2yOiUq4WMpb"]} -{"Format": "IDEA0", "ID": "d9d759d6-f47a-4ff5-abcb-587da0a219f5", "DetectTime": "2023-10-30T14:04:48.450531+02:00", "EventTime": "2023-10-30T14:04:48.450552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CPyLyN2M6plbiqRWva"]} -{"Format": "IDEA0", "ID": "9b5f8833-eb47-4512-8761-4e068ba70242", "DetectTime": "2023-10-30T14:04:48.479719+02:00", "EventTime": "2023-10-30T14:04:48.479739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["C4Fao74LcrtCvvDteb"]} -{"Format": "IDEA0", "ID": "79297cf5-65a7-411a-9636-c54b42475358", "DetectTime": "2023-10-30T14:04:48.508045+02:00", "EventTime": "2023-10-30T14:04:48.508060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C0qQ7x2xh6aDLVANfh"]} -{"Format": "IDEA0", "ID": "def85fab-3ec6-4bc8-b88b-1fbfbce3b2e3", "DetectTime": "2023-10-30T14:04:48.537715+02:00", "EventTime": "2023-10-30T14:04:48.537731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CF4wic1LQIIjRCusS3"]} -{"Format": "IDEA0", "ID": "5363df43-2c44-414b-9032-2ec677af03de", "DetectTime": "2023-10-30T14:04:48.564069+02:00", "EventTime": "2023-10-30T14:04:48.564089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CIOxGEuM5vvm3MUQl"]} -{"Format": "IDEA0", "ID": "b04f2caf-501d-4325-b9d6-c2ad054a2077", "DetectTime": "2023-10-30T14:04:48.595522+02:00", "EventTime": "2023-10-30T14:04:48.595544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cc3Soi3xzRXhLQSpDi"]} -{"Format": "IDEA0", "ID": "fd0de98c-afb7-4ee0-ac6b-39613b20fbbf", "DetectTime": "2023-10-30T14:04:48.624255+02:00", "EventTime": "2023-10-30T14:04:48.624280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C0SbHd4xrKh0Yknz51"]} -{"Format": "IDEA0", "ID": "62228ed5-be56-477b-ad9c-1aa1554f7800", "DetectTime": "2023-10-30T14:04:48.652160+02:00", "EventTime": "2023-10-30T14:04:48.652177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4Ciun1V1B1j79xqYf"]} -{"Format": "IDEA0", "ID": "7f0b3cd8-ed4a-4630-a073-50f46924c96a", "DetectTime": "2023-10-30T14:04:48.679960+02:00", "EventTime": "2023-10-30T14:04:48.679977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Cu6EuT2nT07q2iAcTa"]} -{"Format": "IDEA0", "ID": "4cbf59df-355d-408b-b673-d53955715b7f", "DetectTime": "2023-10-30T14:04:48.710232+02:00", "EventTime": "2023-10-30T14:04:48.710251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CjVFNe2spqNUgmsr9d"]} -{"Format": "IDEA0", "ID": "b974854a-25c3-44d9-9d32-9d44c091d322", "DetectTime": "2023-10-30T14:04:48.750704+02:00", "EventTime": "2023-10-30T14:04:48.750727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CBJIaj1EqT7RUdh8gc"]} -{"Format": "IDEA0", "ID": "49876733-c547-4cd9-b1a9-eb4423a39f18", "DetectTime": "2023-10-30T14:04:48.779270+02:00", "EventTime": "2023-10-30T14:04:48.779290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C6JcaDSFIg0dO2XMj"]} -{"Format": "IDEA0", "ID": "9abe5c0e-6e6b-4366-bee1-8849f517b89e", "DetectTime": "2023-10-30T14:04:48.808081+02:00", "EventTime": "2023-10-30T14:04:48.808095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CFWlNj24VfpHJ6LJtf"]} -{"Format": "IDEA0", "ID": "b0811058-4305-43d9-b0d0-77135e9a8df4", "DetectTime": "2023-10-30T14:04:48.860799+02:00", "EventTime": "2023-10-30T14:04:48.860818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CRR7Zl4JnyCTQJFXE8"]} -{"Format": "IDEA0", "ID": "d1a296e9-e7b3-41a3-bfc1-af13397d9521", "DetectTime": "2023-10-30T14:04:48.902206+02:00", "EventTime": "2023-10-30T14:04:48.902230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CW91624rRCODtiKxk8"]} -{"Format": "IDEA0", "ID": "3cd46abc-621a-49ee-bfac-ab5dc36d94af", "DetectTime": "2023-10-30T14:04:48.944227+02:00", "EventTime": "2023-10-30T14:04:48.944248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["C5nMiKYBUazrpe5b7"]} -{"Format": "IDEA0", "ID": "f2db6763-1fa9-4a72-844b-496f12efbc8d", "DetectTime": "2023-10-30T14:04:48.990283+02:00", "EventTime": "2023-10-30T14:04:48.990301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CzsfSm4TIHbVRNtyKg"]} -{"Format": "IDEA0", "ID": "fa09e1ba-a657-476b-853a-4c5cd5b70e81", "DetectTime": "2023-10-30T14:04:49.019981+02:00", "EventTime": "2023-10-30T14:04:49.020003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CIH789YRKFtBaSGV4"]} -{"Format": "IDEA0", "ID": "d0604614-661f-4dfa-8eb5-a9ea789661c6", "DetectTime": "2023-10-30T14:04:49.049537+02:00", "EventTime": "2023-10-30T14:04:49.049554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CVT3JO3yg6WIKr7uQa"]} -{"Format": "IDEA0", "ID": "2a905140-bc85-4d70-bf40-5436f7c53f8d", "DetectTime": "2023-10-30T14:04:49.077106+02:00", "EventTime": "2023-10-30T14:04:49.077131+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CJZNBw2v1YjqOztbE6"]} -{"Format": "IDEA0", "ID": "ce78ab5b-21c3-44a8-95a1-d9781bee41c1", "DetectTime": "2023-10-30T14:04:49.135092+02:00", "EventTime": "2023-10-30T14:04:49.135112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CVgvSC3e4UXfJTVG4l"]} -{"Format": "IDEA0", "ID": "ef488d4c-2b77-4f80-bcc6-12ffe9222809", "DetectTime": "2023-10-30T14:04:49.167111+02:00", "EventTime": "2023-10-30T14:04:49.167134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CMvOfu2upskV22jcK3"]} -{"Format": "IDEA0", "ID": "e819efae-420b-4518-bb1b-986b77efd7d2", "DetectTime": "2023-10-30T14:04:49.205449+02:00", "EventTime": "2023-10-30T14:04:49.205466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["C1qr141uhW1uiVuAr1"]} -{"Format": "IDEA0", "ID": "6308d579-9763-4475-beae-675884370e4d", "DetectTime": "2023-10-30T14:04:49.249828+02:00", "EventTime": "2023-10-30T14:04:49.249851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CHfUa04Np5R3W50c6e"]} -{"Format": "IDEA0", "ID": "63d0ff2c-3e42-48f8-b8bf-ed13663197e8", "DetectTime": "2023-10-30T14:04:49.292660+02:00", "EventTime": "2023-10-30T14:04:49.292679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2460], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. ", "ContentType": "text/plain"}], "uids": ["CetyS73Buq1DoCTxI5"]} -{"Format": "IDEA0", "ID": "a1c06d9c-8ee6-48a9-8dc8-609c4a1d7f2f", "DetectTime": "2023-10-30T14:04:49.355631+02:00", "EventTime": "2023-10-30T14:04:49.355717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["CDzCc14OV4jfdMu3A3"]} -{"Format": "IDEA0", "ID": "ebb0d430-1e04-44af-aef5-182012bf8365", "DetectTime": "2023-10-30T14:04:49.384530+02:00", "EventTime": "2023-10-30T14:04:49.384549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["Cdubmuz4zVKGqShO7"]} -{"Format": "IDEA0", "ID": "1f8cc6d6-41ac-4ce9-8baa-018adcfa081a", "DetectTime": "2023-10-30T14:04:49.413684+02:00", "EventTime": "2023-10-30T14:04:49.413705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["COVku54uG4pfp4c15i"]} -{"Format": "IDEA0", "ID": "ae9a812d-50f9-4761-a5bd-c53b3e36a020", "DetectTime": "2023-10-30T14:04:49.444566+02:00", "EventTime": "2023-10-30T14:04:49.444586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CKY05S3U98P1yB3aJe"]} -{"Format": "IDEA0", "ID": "d0e19cae-a5a9-4844-ad34-47cc7962b261", "DetectTime": "2023-10-30T14:04:49.474028+02:00", "EventTime": "2023-10-30T14:04:49.474047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CxRP9u36lsdsji9bYd"]} -{"Format": "IDEA0", "ID": "32a9cbea-8f8f-4021-a042-0627f24e71c4", "DetectTime": "2023-10-30T14:04:49.504032+02:00", "EventTime": "2023-10-30T14:04:49.504048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["Cr310KioHzKUIOLB6"]} -{"Format": "IDEA0", "ID": "ba910c27-fe68-4708-a22d-05ef82b33f5f", "DetectTime": "2023-10-30T14:04:49.532164+02:00", "EventTime": "2023-10-30T14:04:49.532185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CnEyuU2cY3sC5yjrTd"]} -{"Format": "IDEA0", "ID": "c36308be-1cd0-4065-8e02-e2ba3ee474f1", "DetectTime": "2023-10-30T14:04:49.562156+02:00", "EventTime": "2023-10-30T14:04:49.562180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["C8uf9z2mmKu6sKMSF4"]} -{"Format": "IDEA0", "ID": "e8506d2c-7c6a-485d-abc7-c44589869b79", "DetectTime": "2023-10-30T14:04:49.588551+02:00", "EventTime": "2023-10-30T14:04:49.588570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Ck49Lc1E0k0M2IwC6j"]} -{"Format": "IDEA0", "ID": "4fb887d8-1672-43cf-83bf-79640868927c", "DetectTime": "2023-10-30T14:04:49.619101+02:00", "EventTime": "2023-10-30T14:04:49.619116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CkBBc3329rwEf4w082"]} -{"Format": "IDEA0", "ID": "e24e960a-88f1-4ccc-badf-48cfff802458", "DetectTime": "2023-10-30T14:04:49.649744+02:00", "EventTime": "2023-10-30T14:04:49.649761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CfEGBz4QkG1xvHDAz8"]} -{"Format": "IDEA0", "ID": "5aebb44c-2b07-408f-8db8-fd35a4f3902a", "DetectTime": "2023-10-30T14:04:49.696522+02:00", "EventTime": "2023-10-30T14:04:49.696539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CrV0sK38PvJ8ura2yh"]} -{"Format": "IDEA0", "ID": "008958ae-82f8-4e8d-9950-49c4b48ba2ba", "DetectTime": "2023-10-30T14:04:49.726343+02:00", "EventTime": "2023-10-30T14:04:49.726359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CDDTCm1idnd22V1Ot8"]} -{"Format": "IDEA0", "ID": "e11a1d16-0eac-484f-83d9-fcbaab623400", "DetectTime": "2023-10-30T14:04:49.755131+02:00", "EventTime": "2023-10-30T14:04:49.755157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CFcbAE39LuPYRrAgP5"]} -{"Format": "IDEA0", "ID": "9f80cbe0-1b07-43b5-8645-ae792d707a11", "DetectTime": "2023-10-30T14:04:49.786519+02:00", "EventTime": "2023-10-30T14:04:49.786545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CND7xW24W5u3pjuvh4"]} -{"Format": "IDEA0", "ID": "5f7d00a5-0477-4301-b3f0-78371c5f9989", "DetectTime": "2023-10-30T14:04:49.818305+02:00", "EventTime": "2023-10-30T14:04:49.818324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["C1EoKf1vo1KiGw7vQa"]} -{"Format": "IDEA0", "ID": "ba5da5ae-51be-4e02-bdf1-a27527e24a04", "DetectTime": "2023-10-30T14:04:49.846833+02:00", "EventTime": "2023-10-30T14:04:49.846857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["Ca702c1YGcIr8EEhfb"]} -{"Format": "IDEA0", "ID": "2adab7d8-34ab-49a7-9629-d012794ee2a6", "DetectTime": "2023-10-30T14:04:49.877681+02:00", "EventTime": "2023-10-30T14:04:49.877699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CF5nxe4Fk21FRBPo78"]} -{"Format": "IDEA0", "ID": "ab9cebed-d0e9-44b3-a1fa-0b493f521675", "DetectTime": "2023-10-30T14:04:49.907339+02:00", "EventTime": "2023-10-30T14:04:49.907359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C2b0Q93YD5rPRc59X8"]} -{"Format": "IDEA0", "ID": "e423e03a-110f-4856-9469-7c119c2159ad", "DetectTime": "2023-10-30T14:04:49.937533+02:00", "EventTime": "2023-10-30T14:04:49.937550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Ce9KHO2uByPEK13Qjb"]} -{"Format": "IDEA0", "ID": "a83df5f5-4282-4609-8f84-22b25fe2f343", "DetectTime": "2023-10-30T14:04:49.982194+02:00", "EventTime": "2023-10-30T14:04:49.982219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.28.246 ", "ContentType": "text/plain"}], "uids": ["CxSShv47Pd6DnoltDa"]} -{"Format": "IDEA0", "ID": "9ea5895b-6ff6-4591-a149-19ce94dd5e1c", "DetectTime": "2023-10-30T14:04:50.009316+02:00", "EventTime": "2023-10-30T14:04:50.009334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.51.236.113 ", "ContentType": "text/plain"}], "uids": ["CCio9l38V8FrzpDPnk"]} -{"Format": "IDEA0", "ID": "a5a92dc3-f866-49ba-8adc-d869a4bcae15", "DetectTime": "2023-10-30T14:04:50.041564+02:00", "EventTime": "2023-10-30T14:04:50.041587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.221.67.129 ", "ContentType": "text/plain"}], "uids": ["CbazEa3iS5NLj0OCA4"]} -{"Format": "IDEA0", "ID": "633060f6-6e84-4c16-9ccd-2ba5ad75a11d", "DetectTime": "2023-10-30T14:04:50.071386+02:00", "EventTime": "2023-10-30T14:04:50.071406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.21.216.25 ", "ContentType": "text/plain"}], "uids": ["Cx9H2Y1XjJl6IT4wV4"]} -{"Format": "IDEA0", "ID": "617aa9a0-091d-4634-9f94-148237a3675b", "DetectTime": "2023-10-30T14:04:50.099246+02:00", "EventTime": "2023-10-30T14:04:50.099268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CECJsX1PgKJHU4NXEg", "CyrNpb37Or2zvkvjqe", "CDCb1m3gbBsEDKyfUf", "CVxCrN2HNxzRybmcDg"]} -{"Format": "IDEA0", "ID": "02bfd529-6b6d-4182-97b8-682f2df740db", "DetectTime": "2023-10-30T14:04:50.107445+02:00", "EventTime": "2023-10-30T14:04:50.107465+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDCb1m3gbBsEDKyfUf"]} -{"Format": "IDEA0", "ID": "4f025650-2532-4544-9e48-af2f55cb5ce9", "DetectTime": "2023-10-30T14:04:50.116533+02:00", "EventTime": "2023-10-30T14:04:50.116551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CxWFl6OtfyeNWJkX3"]} -{"Format": "IDEA0", "ID": "2a268179-ec40-4fda-8c05-adc54bb64bc4", "DetectTime": "2023-10-30T14:04:50.153240+02:00", "EventTime": "2023-10-30T14:04:50.153259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CD3AJ03FK31Psc7yyk"]} -{"Format": "IDEA0", "ID": "79efd703-485e-4ca9-a943-b95f011ef2ed", "DetectTime": "2023-10-30T14:04:50.192233+02:00", "EventTime": "2023-10-30T14:04:50.192251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CUW0Ki4wvX4O8hrUkj"]} -{"Format": "IDEA0", "ID": "b7c86959-5a2e-49a7-b733-60f3bd67ca07", "DetectTime": "2023-10-30T14:04:50.229112+02:00", "EventTime": "2023-10-30T14:04:50.229139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CWC7hv2izAs8AVFWHe"]} -{"Format": "IDEA0", "ID": "823db420-f4aa-45a1-9f99-a863931bb98a", "DetectTime": "2023-10-30T14:04:50.282956+02:00", "EventTime": "2023-10-30T14:04:50.282972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["C50eNG2KAwjSeoqZzb"]} -{"Format": "IDEA0", "ID": "553591e4-c515-4e35-9c9d-adec07c8cdda", "DetectTime": "2023-10-30T14:04:50.311907+02:00", "EventTime": "2023-10-30T14:04:50.311923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CgAB982mZNOoqndRN7"]} -{"Format": "IDEA0", "ID": "71e97106-f68b-43e6-9c19-3cbece8e3897", "DetectTime": "2023-10-30T14:04:50.346581+02:00", "EventTime": "2023-10-30T14:04:50.346605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C2XH2KFW1B7eUeBha"]} -{"Format": "IDEA0", "ID": "863e094d-d0e9-4f75-b9cc-6ba01751324c", "DetectTime": "2023-10-30T14:04:50.377554+02:00", "EventTime": "2023-10-30T14:04:50.377573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cctevw1kdTxcpYYky8"]} -{"Format": "IDEA0", "ID": "8d8cf339-8890-4c23-bb3b-c575b3da8a32", "DetectTime": "2023-10-30T14:04:50.408151+02:00", "EventTime": "2023-10-30T14:04:50.408167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4ToXA1NA3h3WbllIk"]} -{"Format": "IDEA0", "ID": "84ddfc8d-97e4-4c7b-b49e-d64a6d98ff0e", "DetectTime": "2023-10-30T14:04:50.446768+02:00", "EventTime": "2023-10-30T14:04:50.446873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["CyfgWJ1pxCMtqkWMZ8"]} -{"Format": "IDEA0", "ID": "df4274de-5954-4a76-84ee-cd80b2ccaf2d", "DetectTime": "2023-10-30T14:04:50.488916+02:00", "EventTime": "2023-10-30T14:04:50.488934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CjM5nq33TBaS8qTpZ"]} -{"Format": "IDEA0", "ID": "d7ad65f7-2913-47f1-abff-4f7f6d0f5ca4", "DetectTime": "2023-10-30T14:04:50.521796+02:00", "EventTime": "2023-10-30T14:04:50.521814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CLsdDH1z3ZtBFPDo0c"]} -{"Format": "IDEA0", "ID": "97c2fd95-dc42-4032-86fa-4de772423f61", "DetectTime": "2023-10-30T14:04:50.550108+02:00", "EventTime": "2023-10-30T14:04:50.550125+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C8f5F6ZxdmGXbyT1j"]} -{"Format": "IDEA0", "ID": "b346d991-b2c4-4a09-a267-6fca9ebba808", "DetectTime": "2023-10-30T14:04:50.558678+02:00", "EventTime": "2023-10-30T14:04:50.558697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CgoujN1INQX9MnR08d"]} -{"Format": "IDEA0", "ID": "e234fa29-f854-4e58-87a4-d03c213efccc", "DetectTime": "2023-10-30T14:04:50.590439+02:00", "EventTime": "2023-10-30T14:04:50.590457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CuGPrn4CKSTNE4mBmf"]} -{"Format": "IDEA0", "ID": "24cdda3e-8312-42a2-87c7-88f7b63b04e1", "DetectTime": "2023-10-30T14:04:50.632075+02:00", "EventTime": "2023-10-30T14:04:50.632086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CmVcRU6760z6JgVQ6"]} -{"Format": "IDEA0", "ID": "b0e1203f-5d43-45ce-8cd1-f1889a61e80a", "DetectTime": "2023-10-30T14:04:50.655914+02:00", "EventTime": "2023-10-30T14:04:50.655932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["Cqhmki3419FALX0cTe"]} -{"Format": "IDEA0", "ID": "8c8c2c2b-c300-481d-a96a-3594bc010fa6", "DetectTime": "2023-10-30T14:04:50.683667+02:00", "EventTime": "2023-10-30T14:04:50.683684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CnOgJA3CmMZhj1VRNh"]} -{"Format": "IDEA0", "ID": "a90b31c6-f803-4f2c-9149-7c78fef0122a", "DetectTime": "2023-10-30T14:04:50.712142+02:00", "EventTime": "2023-10-30T14:04:50.712165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C4UmCt2e0L44GYNURf"]} -{"Format": "IDEA0", "ID": "4b1d95e8-8b59-480e-b131-4068eac55287", "DetectTime": "2023-10-30T14:04:50.735926+02:00", "EventTime": "2023-10-30T14:04:50.735937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CKKbg44q5Xv94ocSV6"]} -{"Format": "IDEA0", "ID": "ebc6fb1a-35f3-4d09-9169-4ca3e896514f", "DetectTime": "2023-10-30T14:04:50.759432+02:00", "EventTime": "2023-10-30T14:04:50.759448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CTxVQt3cOHYgx2Lcci"]} -{"Format": "IDEA0", "ID": "d9708222-5eac-4401-8083-5429966194fd", "DetectTime": "2023-10-30T14:04:50.786829+02:00", "EventTime": "2023-10-30T14:04:50.786842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CSy84m4nr6xXin1X01"]} -{"Format": "IDEA0", "ID": "b90a924e-c5ab-4cf1-878b-df5bf2e1fbed", "DetectTime": "2023-10-30T14:04:50.813575+02:00", "EventTime": "2023-10-30T14:04:50.813591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["C2Oxcb26ktdabPZCUh"]} -{"Format": "IDEA0", "ID": "96885c74-7f1f-41b7-b930-3aac6c5e9890", "DetectTime": "2023-10-30T14:04:50.841055+02:00", "EventTime": "2023-10-30T14:04:50.841071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["CUMZ024OqxTU0upqCl"]} -{"Format": "Json", "ID": "96885c74-7f1f-41b7-b930-3aac6c5e9890", "DetectTime": "2023-10-30T14:04:50.841055+02:00", "EventTime": "2023-10-30T14:04:50.841071+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:01:35.122899+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:04:50.929798)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f3ae7244-b6a7-4cdf-8f3e-a062ae9f3598", "DetectTime": "2023-10-30T14:04:50.936346+02:00", "EventTime": "2023-10-30T14:04:50.936365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Ckg9qu21W93XOsj374"]} -{"Format": "IDEA0", "ID": "5224a011-cebb-454b-aa47-e75b5bdf83a0", "DetectTime": "2023-10-30T14:04:50.972014+02:00", "EventTime": "2023-10-30T14:04:50.972033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["Cd0w1z41QFsQCS2218"]} -{"Format": "IDEA0", "ID": "a5747ccd-8b41-4e62-98b7-b741c77427e9", "DetectTime": "2023-10-30T14:04:50.996387+02:00", "EventTime": "2023-10-30T14:04:50.996404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CaZPEL1tX1naJEOpd6"]} -{"Format": "IDEA0", "ID": "c3d7b62b-1a0e-44cf-826e-2ff8bf633e88", "DetectTime": "2023-10-30T14:04:51.023895+02:00", "EventTime": "2023-10-30T14:04:51.023914+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CgcnA44SW6XKJAG4si"]} -{"Format": "IDEA0", "ID": "56e91113-b9a4-4f43-ba49-b4db442d5b97", "DetectTime": "2023-10-30T14:04:51.080915+02:00", "EventTime": "2023-10-30T14:04:51.080937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CHRE0L23oxm6v6Xyei"]} -{"Format": "IDEA0", "ID": "50ce1503-643e-4f95-bf9c-30d936649ce2", "DetectTime": "2023-10-30T14:04:51.107978+02:00", "EventTime": "2023-10-30T14:04:51.107998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CQ5CEH1401rR0G12r7"]} -{"Format": "IDEA0", "ID": "612f25e2-6fd0-4db8-a077-4bda2e855021", "DetectTime": "2023-10-30T14:04:51.134239+02:00", "EventTime": "2023-10-30T14:04:51.134256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CNhrFa1ulwqjLC5Zh1"]} -{"Format": "IDEA0", "ID": "4a098a6a-b680-449e-b951-19a95afd6544", "DetectTime": "2023-10-30T14:04:51.158176+02:00", "EventTime": "2023-10-30T14:04:51.158191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Cn58dA1DY6gsJNBbK3"]} -{"Format": "IDEA0", "ID": "bcc5d704-7cb7-4cae-af7e-21ca9387aba2", "DetectTime": "2023-10-30T14:04:51.183101+02:00", "EventTime": "2023-10-30T14:04:51.183124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CG4DwT9yJABCkChDf"]} -{"Format": "IDEA0", "ID": "fc9d6249-72a5-4315-a7ab-5fdb212e0a45", "DetectTime": "2023-10-30T14:04:51.220543+02:00", "EventTime": "2023-10-30T14:04:51.220562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Crin4N1q1DFK71ug04"]} -{"Format": "IDEA0", "ID": "525146ab-2bbb-483b-bb34-2552769f6208", "DetectTime": "2023-10-30T14:04:51.244338+02:00", "EventTime": "2023-10-30T14:04:51.244349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["C1XNdW32xhpru4Msfa"]} -{"Format": "IDEA0", "ID": "f836d5da-de30-4e88-81d3-56f47f8a26ac", "DetectTime": "2023-10-30T14:04:51.271369+02:00", "EventTime": "2023-10-30T14:04:51.271381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["Cc4Cyv3JBvkhuD5rz5"]} -{"Format": "IDEA0", "ID": "af27ed8d-b441-438d-aeb2-78f499002cb8", "DetectTime": "2023-10-30T14:04:51.298556+02:00", "EventTime": "2023-10-30T14:04:51.298569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CniCjXHA4pD1N7UEf"]} -{"Format": "IDEA0", "ID": "b75d55b8-eee9-4705-a310-3cf8ff344eb5", "DetectTime": "2023-10-30T14:04:51.323202+02:00", "EventTime": "2023-10-30T14:04:51.323214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CqXJJcQGNXx2pVwv4"]} -{"Format": "IDEA0", "ID": "73a4996a-3a06-498f-936d-238bc635a6e3", "DetectTime": "2023-10-30T14:04:51.346124+02:00", "EventTime": "2023-10-30T14:04:51.346138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["Cdv0bt3SZQbVcrFHUl"]} -{"Format": "IDEA0", "ID": "68225b6d-f309-4377-b6ea-1a0cfe31bf61", "DetectTime": "2023-10-30T14:04:51.372056+02:00", "EventTime": "2023-10-30T14:04:51.372073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CEHMAE3SjCY2MUuJU"]} -{"Format": "IDEA0", "ID": "80028fe9-0e22-4d27-8735-77306ad20f3f", "DetectTime": "2023-10-30T14:04:51.396184+02:00", "EventTime": "2023-10-30T14:04:51.396195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["CWQ7Aw4Ar2bdrPclw1"]} -{"Format": "IDEA0", "ID": "66313147-7ebb-48e6-b546-1ca555abb2ba", "DetectTime": "2023-10-30T14:04:51.436411+02:00", "EventTime": "2023-10-30T14:04:51.436421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.246.62.65 ", "ContentType": "text/plain"}], "uids": ["Cwwtm13PKRUZ8hDDZg"]} -{"Format": "IDEA0", "ID": "1705c90c-9c83-4279-b950-8bf865f55b85", "DetectTime": "2023-10-30T14:04:51.460219+02:00", "EventTime": "2023-10-30T14:04:51.460234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.76.202 ", "ContentType": "text/plain"}], "uids": ["CKw7sn2PGSMdpcs4F2"]} -{"Format": "IDEA0", "ID": "38bd1d10-c69b-4981-95ed-6a7256b9958e", "DetectTime": "2023-10-30T14:04:51.485769+02:00", "EventTime": "2023-10-30T14:04:51.485785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.14.194.158 ", "ContentType": "text/plain"}], "uids": ["C6Wh7Q3OTXybBROmsf"]} -{"Format": "IDEA0", "ID": "b65af0ab-f6b5-48b7-b473-59d4889569d1", "DetectTime": "2023-10-30T14:04:51.510466+02:00", "EventTime": "2023-10-30T14:04:51.510485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["Cs4ct54B0wpfzqsAHe"]} -{"Format": "IDEA0", "ID": "a119c06c-2e96-402d-8c54-25d6715a1f7b", "DetectTime": "2023-10-30T14:04:51.535675+02:00", "EventTime": "2023-10-30T14:04:51.535693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CqCOgA1hfBR0JnWz5e"]} -{"Format": "IDEA0", "ID": "15b10c43-63d5-4368-b398-0883d54d4883", "DetectTime": "2023-10-30T14:04:51.579814+02:00", "EventTime": "2023-10-30T14:04:51.579831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvpA1IFa49U1SXcXh"]} -{"Format": "IDEA0", "ID": "0991942c-fe61-452a-9a8b-ca23053d06ad", "DetectTime": "2023-10-30T14:04:51.608630+02:00", "EventTime": "2023-10-30T14:04:51.608648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CKNyZ82mV6ENis0ysd"]} -{"Format": "IDEA0", "ID": "180b7797-c857-4c93-af06-f258781bd596", "DetectTime": "2023-10-30T14:04:51.636224+02:00", "EventTime": "2023-10-30T14:04:51.636244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C5RlzVHvCGJOzT4gh"]} -{"Format": "IDEA0", "ID": "a5833248-3a51-4d11-a40f-7a3a09caa5ab", "DetectTime": "2023-10-30T14:04:51.661681+02:00", "EventTime": "2023-10-30T14:04:51.661693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CUNAX63EuvLwkkacHl"]} -{"Format": "IDEA0", "ID": "a86cc2ea-0442-44ba-b1c0-df10b517df62", "DetectTime": "2023-10-30T14:04:51.687488+02:00", "EventTime": "2023-10-30T14:04:51.687508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CxGTJx3TqGGrdBQhV9"]} -{"Format": "IDEA0", "ID": "9afdf9cf-1b8f-4cb4-a660-fc547366a3b9", "DetectTime": "2023-10-30T14:04:51.712825+02:00", "EventTime": "2023-10-30T14:04:51.712836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Cm5x3w4sR0YYuEhRY4"]} -{"Format": "IDEA0", "ID": "9cef701b-223a-459a-a001-b8bdbb9a53b6", "DetectTime": "2023-10-30T14:04:51.735241+02:00", "EventTime": "2023-10-30T14:04:51.735261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cnzs852rQKdTuyyGul"]} -{"Format": "IDEA0", "ID": "82ec6543-d3f9-45c4-b55b-c0c4235c1f22", "DetectTime": "2023-10-30T14:04:51.760732+02:00", "EventTime": "2023-10-30T14:04:51.760752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CZGACBZmiakUsGCwb"]} -{"Format": "IDEA0", "ID": "b90de118-e3e3-4513-84c8-91dcb888c9c5", "DetectTime": "2023-10-30T14:04:51.785973+02:00", "EventTime": "2023-10-30T14:04:51.785988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["C7WY4JPOSmOqyWX3"]} -{"Format": "IDEA0", "ID": "16163c06-d82b-4253-959e-47b29e5196fe", "DetectTime": "2023-10-30T14:04:51.819975+02:00", "EventTime": "2023-10-30T14:04:51.819991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CVfV862ezAoxWCjkVb"]} -{"Format": "IDEA0", "ID": "ed9571b9-6bb4-4411-b21b-fc01ffe53143", "DetectTime": "2023-10-30T14:04:51.843522+02:00", "EventTime": "2023-10-30T14:04:51.843539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CK064X1XlARzZmOwB4"]} -{"Format": "IDEA0", "ID": "ab6d9f4d-c2ce-44d7-96ea-6da6bcc9cb22", "DetectTime": "2023-10-30T14:04:51.868661+02:00", "EventTime": "2023-10-30T14:04:51.868673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CZYWtD3QDEDZ0XDUIb"]} -{"Format": "IDEA0", "ID": "e8bdc181-8567-4787-8d85-26667f98bf1a", "DetectTime": "2023-10-30T14:04:51.891289+02:00", "EventTime": "2023-10-30T14:04:51.891300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CvLmLF49F0aGoOkZa1"]} -{"Format": "IDEA0", "ID": "ccc354ec-b816-4d48-88c6-eb67af5b0091", "DetectTime": "2023-10-30T14:04:51.912255+02:00", "EventTime": "2023-10-30T14:04:51.912267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["C81Fz84JJQLOxtZIb7"]} -{"Format": "IDEA0", "ID": "959dc48c-3d3e-4c8c-96a5-1a7e4b409d28", "DetectTime": "2023-10-30T14:04:51.933216+02:00", "EventTime": "2023-10-30T14:04:51.933232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CDipRi2Aw7UDoSei9"]} -{"Format": "IDEA0", "ID": "51e07a95-1c36-4130-a58a-9b0896322b4a", "DetectTime": "2023-10-30T14:04:51.957940+02:00", "EventTime": "2023-10-30T14:04:51.957951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. ", "ContentType": "text/plain"}], "uids": ["C19ybphrKmYL2ZqN2"]} -{"Format": "IDEA0", "ID": "348ae6ca-b954-4162-969d-65b94a2ffa4e", "DetectTime": "2023-10-30T14:04:51.996939+02:00", "EventTime": "2023-10-30T14:04:51.996956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["Cg91Nl2iLSQNP4fRue"]} -{"Format": "IDEA0", "ID": "7f869aec-eedb-4182-bc20-3b5c8cd0df6a", "DetectTime": "2023-10-30T14:04:52.019246+02:00", "EventTime": "2023-10-30T14:04:52.019263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CaDMm83gEk1k4STx5k"]} -{"Format": "IDEA0", "ID": "96f14e8c-a047-4b0c-b9b8-84f8051a674e", "DetectTime": "2023-10-30T14:04:52.037760+02:00", "EventTime": "2023-10-30T14:04:52.037771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ClC8Gb1FCNjKWlCgWe"]} -{"Format": "IDEA0", "ID": "21879fe9-16ef-4ef1-a148-5fcf06912670", "DetectTime": "2023-10-30T14:04:52.061427+02:00", "EventTime": "2023-10-30T14:04:52.061438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CChilRNFBFnDrdPM"]} -{"Format": "IDEA0", "ID": "cb629db3-f2aa-4c62-8a9c-5f527f53eee0", "DetectTime": "2023-10-30T14:04:52.086697+02:00", "EventTime": "2023-10-30T14:04:52.086715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["COVIIBLPdAkyZpyc8"]} -{"Format": "IDEA0", "ID": "2c6b8568-2282-41c9-b463-b5e4331dee7f", "DetectTime": "2023-10-30T14:04:52.110683+02:00", "EventTime": "2023-10-30T14:04:52.110702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["C3Ni1f3WNuLDndhxvd"]} -{"Format": "IDEA0", "ID": "afc8e9eb-567d-407d-ba37-6b99edf80f22", "DetectTime": "2023-10-30T14:04:52.136410+02:00", "EventTime": "2023-10-30T14:04:52.136428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CG8sIs1rQsBGKJ4fe6"]} -{"Format": "IDEA0", "ID": "7e336ebc-e13f-4fe0-8ba6-9c98fcffed9e", "DetectTime": "2023-10-30T14:04:52.159824+02:00", "EventTime": "2023-10-30T14:04:52.159840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CYQyXLNsJMwrov1Ih"]} -{"Format": "IDEA0", "ID": "57e361d2-0920-4ce4-a445-7bcbee795fd6", "DetectTime": "2023-10-30T14:04:52.181418+02:00", "EventTime": "2023-10-30T14:04:52.181439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["C6qoRipwzjBugpx3k"]} -{"Format": "IDEA0", "ID": "0c2a549a-c957-4252-81e7-a1f40bf3a77f", "DetectTime": "2023-10-30T14:04:52.206034+02:00", "EventTime": "2023-10-30T14:04:52.206048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CpNhgz4VFhmAvAsBUi"]} -{"Format": "IDEA0", "ID": "c00e11b4-1da6-4810-89c0-4c7e09360217", "DetectTime": "2023-10-30T14:04:52.230865+02:00", "EventTime": "2023-10-30T14:04:52.230877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CP0l6wcqRFSzjUxA5"]} -{"Format": "IDEA0", "ID": "cc3dfb5a-2c97-41c9-9ee9-0f7df8c89855", "DetectTime": "2023-10-30T14:04:52.255294+02:00", "EventTime": "2023-10-30T14:04:52.255309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["C2FEBS3ad0gbzbLO66"]} -{"Format": "IDEA0", "ID": "91c64266-9284-4471-86e6-ab949370892d", "DetectTime": "2023-10-30T14:04:52.291895+02:00", "EventTime": "2023-10-30T14:04:52.291910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CoNecC1yxfxPA3ot9"]} -{"Format": "IDEA0", "ID": "a5911cb3-52f3-4917-87de-f608fab31544", "DetectTime": "2023-10-30T14:04:52.320603+02:00", "EventTime": "2023-10-30T14:04:52.320620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CVHNEkJrmpNlP337f"]} -{"Format": "IDEA0", "ID": "4d2bb8a3-cc78-44da-9b1a-eef2fe311280", "DetectTime": "2023-10-30T14:04:52.347092+02:00", "EventTime": "2023-10-30T14:04:52.347108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CmGUSn1EqS6PGK7IM9"]} -{"Format": "IDEA0", "ID": "702dc250-f286-40cf-803f-860c02347794", "DetectTime": "2023-10-30T14:04:52.374508+02:00", "EventTime": "2023-10-30T14:04:52.374522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["Ce50N22EB7cPSdoOe3"]} -{"Format": "IDEA0", "ID": "c06b84bc-33a6-45fd-b26c-f4e65123a153", "DetectTime": "2023-10-30T14:04:52.395923+02:00", "EventTime": "2023-10-30T14:04:52.395946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["Cfc2wm1GZTjr7BqEAh"]} -{"Format": "IDEA0", "ID": "8dc996e2-3eb0-45bf-8a2d-8ccc6b6f24f1", "DetectTime": "2023-10-30T14:04:52.423470+02:00", "EventTime": "2023-10-30T14:04:52.423491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CbSBEv36l7lKcvloVb"]} -{"Format": "IDEA0", "ID": "201d73c0-be91-4d46-ac2e-4e771c6c149c", "DetectTime": "2023-10-30T14:04:52.445330+02:00", "EventTime": "2023-10-30T14:04:52.445346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C6tILA37T1Y0SKOwy5"]} -{"Format": "IDEA0", "ID": "02d76f13-6b07-4c98-a5d3-c6f5d9074f81", "DetectTime": "2023-10-30T14:04:52.465589+02:00", "EventTime": "2023-10-30T14:04:52.465606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CpjoKR1vmFLXftVPF9"]} -{"Format": "IDEA0", "ID": "9f5f0407-50fa-4e15-9131-3f36b1ec363b", "DetectTime": "2023-10-30T14:04:52.483482+02:00", "EventTime": "2023-10-30T14:04:52.483501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CpnzncSUV43Xxaax4"]} -{"Format": "IDEA0", "ID": "8c0c9037-924c-4e69-9c95-e6f0029c70b3", "DetectTime": "2023-10-30T14:04:52.502058+02:00", "EventTime": "2023-10-30T14:04:52.502079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["C06olz3FS7kCe4ZOWb"]} -{"Format": "IDEA0", "ID": "9b82f173-080d-4d5a-a71e-9a5905ab0578", "DetectTime": "2023-10-30T14:04:52.522801+02:00", "EventTime": "2023-10-30T14:04:52.522813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8Y9Og4knIExRgfDo6"]} -{"Format": "IDEA0", "ID": "3c460fbd-9434-4ec1-9aaa-0cda18445019", "DetectTime": "2023-10-30T14:04:52.540755+02:00", "EventTime": "2023-10-30T14:04:52.540771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CKBmOs4fEjotFAFSM4"]} -{"Format": "IDEA0", "ID": "543c4d09-939b-4e89-a00a-47d430c74792", "DetectTime": "2023-10-30T14:04:52.559477+02:00", "EventTime": "2023-10-30T14:04:52.559490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["Cj4OHS3V7qpAR2GyUc"]} -{"Format": "IDEA0", "ID": "98231ce5-07bc-4aa7-a643-11722e7f45b3", "DetectTime": "2023-10-30T14:04:52.580277+02:00", "EventTime": "2023-10-30T14:04:52.580300+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CxuEev2MKpUaU1rLj1"]} -{"Format": "IDEA0", "ID": "6f2452dd-a996-4422-aa9b-72b8d5617a4e", "DetectTime": "2023-10-30T14:04:52.588261+02:00", "EventTime": "2023-10-30T14:04:52.588277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CaGm2d223zbtfX8ZZ3"]} -{"Format": "IDEA0", "ID": "6fbe2599-6671-4208-aa7d-f63358b72a77", "DetectTime": "2023-10-30T14:04:52.609264+02:00", "EventTime": "2023-10-30T14:04:52.609286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CJPwvLVUMcaeThWL9"]} -{"Format": "IDEA0", "ID": "8a562c9f-0dde-47e5-b2d8-9b8790199987", "DetectTime": "2023-10-30T14:04:52.628626+02:00", "EventTime": "2023-10-30T14:04:52.628645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["Clvy5hKWaejwXNNUl"]} -{"Format": "IDEA0", "ID": "73a0ca3e-4a57-4e16-839a-868de26dc04c", "DetectTime": "2023-10-30T14:04:52.647003+02:00", "EventTime": "2023-10-30T14:04:52.647022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["Cg19qK2Bc4Y6BQeL3k"]} -{"Format": "IDEA0", "ID": "fcccb54d-dc9c-4d0b-8796-df91712048a7", "DetectTime": "2023-10-30T14:04:52.667008+02:00", "EventTime": "2023-10-30T14:04:52.667029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CybmGQ2mUHGar08yzb"]} -{"Format": "IDEA0", "ID": "5723bb06-e921-4a26-87bf-81ce338e5093", "DetectTime": "2023-10-30T14:04:52.684452+02:00", "EventTime": "2023-10-30T14:04:52.684467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CYsHvC3ZPmLXFGg8md"]} -{"Format": "IDEA0", "ID": "73c4a6fe-3704-43f8-9d5d-305fc571dbad", "DetectTime": "2023-10-30T14:04:52.722521+02:00", "EventTime": "2023-10-30T14:04:52.722533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CgjYvc4QLMiPgKRefi"]} -{"Format": "IDEA0", "ID": "d71522b2-bc51-46d4-a07d-2fcb61bfeb0d", "DetectTime": "2023-10-30T14:04:52.743673+02:00", "EventTime": "2023-10-30T14:04:52.743694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["C2fJbhPUoLr7lIPpb"]} -{"Format": "IDEA0", "ID": "17cf6df7-e98e-44b4-8f5c-dbed6972fbbc", "DetectTime": "2023-10-30T14:04:52.765652+02:00", "EventTime": "2023-10-30T14:04:52.765671+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuzHGYFJ2Mz7uNJN8"]} -{"Format": "IDEA0", "ID": "9cbb63c7-0d4f-4d4e-a694-b139c54b3212", "DetectTime": "2023-10-30T14:04:52.772782+02:00", "EventTime": "2023-10-30T14:04:52.772797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CDb35O3HMg28aIgfk2"]} -{"Format": "IDEA0", "ID": "e1c6d721-3c37-4504-b879-33439c09d8a7", "DetectTime": "2023-10-30T14:04:52.792501+02:00", "EventTime": "2023-10-30T14:04:52.792516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CjZB24c6ykMK9VhMj"]} -{"Format": "IDEA0", "ID": "7feca426-c6f9-4ca2-b2e2-62d882dc0cc6", "DetectTime": "2023-10-30T14:04:52.810728+02:00", "EventTime": "2023-10-30T14:04:52.810740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CJ66IhM3YwYiRLZO6"]} -{"Format": "IDEA0", "ID": "32f1fabc-04c9-4fc8-8910-6adfa490ed7a", "DetectTime": "2023-10-30T14:04:52.829837+02:00", "EventTime": "2023-10-30T14:04:52.829853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["Cl0f3ydZKPm1QfGp9"]} -{"Format": "IDEA0", "ID": "4e8dd912-8118-4a9b-b814-e5a47f1a60eb", "DetectTime": "2023-10-30T14:04:52.847935+02:00", "EventTime": "2023-10-30T14:04:52.847953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["COjUeS1z4IXYSOvg5a"]} -{"Format": "IDEA0", "ID": "d9fd61e6-bfea-445c-b699-ddd322a157a6", "DetectTime": "2023-10-30T14:04:52.865393+02:00", "EventTime": "2023-10-30T14:04:52.865409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CF3aE74NMG1y8beLQb"]} -{"Format": "IDEA0", "ID": "509f85d9-e9bf-4d69-9368-2ae07706fac0", "DetectTime": "2023-10-30T14:04:52.883614+02:00", "EventTime": "2023-10-30T14:04:52.883631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CIAXn42O3Oh10FiMpi"]} -{"Format": "IDEA0", "ID": "c2ab915f-0571-46e7-a29b-c83cc813db43", "DetectTime": "2023-10-30T14:04:52.903312+02:00", "EventTime": "2023-10-30T14:04:52.903329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["C7cAbF1xP6LLUTaX41"]} -{"Format": "IDEA0", "ID": "d6253c2b-4f0b-4313-b169-1fe30a5e553d", "DetectTime": "2023-10-30T14:04:52.921941+02:00", "EventTime": "2023-10-30T14:04:52.921958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["C93Uwf3QwSD5sJXPQa"]} -{"Format": "IDEA0", "ID": "5fb4d3dc-311c-47fb-8e93-4b6a6f478d7c", "DetectTime": "2023-10-30T14:04:52.941960+02:00", "EventTime": "2023-10-30T14:04:52.941976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CFbOK51G47m6NeKLKa"]} -{"Format": "IDEA0", "ID": "74757b90-633c-4940-96b4-03c7739b4f49", "DetectTime": "2023-10-30T14:04:52.960571+02:00", "EventTime": "2023-10-30T14:04:52.960587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CSbjfpfCUtGwP6Ev5"]} -{"Format": "IDEA0", "ID": "29d73267-c059-46b5-8135-c536151982a5", "DetectTime": "2023-10-30T14:04:52.979955+02:00", "EventTime": "2023-10-30T14:04:52.979975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CscHub15gbB19dGZ5k"]} -{"Format": "IDEA0", "ID": "8ec26bf1-c185-4429-9143-148cd546b582", "DetectTime": "2023-10-30T14:04:53.001459+02:00", "EventTime": "2023-10-30T14:04:53.001486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CgsMLa3hv8SGApJSA8"]} -{"Format": "IDEA0", "ID": "792640ee-1670-40b7-9ad3-705d81ef0a51", "DetectTime": "2023-10-30T14:04:53.021453+02:00", "EventTime": "2023-10-30T14:04:53.021467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C1KjTY2burp0iaUpue"]} -{"Format": "IDEA0", "ID": "172ee764-5482-4b7c-bfff-a729a6eac446", "DetectTime": "2023-10-30T14:04:53.040654+02:00", "EventTime": "2023-10-30T14:04:53.040666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["C5dTvO2CJoxlvQbOwb"]} -{"Format": "IDEA0", "ID": "f65544f7-a643-4ad5-bb61-92e5893e0d5f", "DetectTime": "2023-10-30T14:04:53.058071+02:00", "EventTime": "2023-10-30T14:04:53.058090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CZMVmk1yU3okkDZmf1"]} -{"Format": "IDEA0", "ID": "dc0e0baa-e784-4933-a46e-cc23035b8281", "DetectTime": "2023-10-30T14:04:53.075229+02:00", "EventTime": "2023-10-30T14:04:53.075244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CbIyUw13awyIXoY5R5"]} -{"Format": "IDEA0", "ID": "19d82b25-dad7-489f-a16c-5c38cf3ed25f", "DetectTime": "2023-10-30T14:04:53.092582+02:00", "EventTime": "2023-10-30T14:04:53.092595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvIR7878A0NMxkDz8"]} -{"Format": "IDEA0", "ID": "63761163-1f1e-4252-8ac3-86b4eab53099", "DetectTime": "2023-10-30T14:04:53.110721+02:00", "EventTime": "2023-10-30T14:04:53.110737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cke9C74Tft4WH9zQG9"]} -{"Format": "Json", "ID": "63761163-1f1e-4252-8ac3-86b4eab53099", "DetectTime": "2023-10-30T14:04:53.110721+02:00", "EventTime": "2023-10-30T14:04:53.110737+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:01:55.538303+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:04:53.182258)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ba1139b-0b38-4661-827f-f5f69bd0e086", "DetectTime": "2023-10-30T14:04:53.186263+02:00", "EventTime": "2023-10-30T14:04:53.186274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CshtKx10LtXOz8sap2"]} -{"Format": "IDEA0", "ID": "7940a35a-3f6e-48fb-8885-4966ffe47a95", "DetectTime": "2023-10-30T14:04:53.207159+02:00", "EventTime": "2023-10-30T14:04:53.207175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEQWBf49g4g3CG71va"]} -{"Format": "IDEA0", "ID": "00479f4e-afc0-41c2-8f12-70693039482f", "DetectTime": "2023-10-30T14:04:53.223998+02:00", "EventTime": "2023-10-30T14:04:53.224011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CRQRRw33wvpghD8qu4"]} -{"Format": "IDEA0", "ID": "03406d66-44ec-444a-9803-af7388ce840d", "DetectTime": "2023-10-30T14:04:53.244639+02:00", "EventTime": "2023-10-30T14:04:53.244651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Co8GbL3RAvshAMyUpg"]} -{"Format": "IDEA0", "ID": "1f1c70f2-d815-40aa-8bcb-2e90ddd3996d", "DetectTime": "2023-10-30T14:04:53.263934+02:00", "EventTime": "2023-10-30T14:04:53.263951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CLObWT2Gi3FjUbW5o4"]} -{"Format": "IDEA0", "ID": "9a47e33c-135d-4d0f-8415-853b2c917fda", "DetectTime": "2023-10-30T14:04:53.283192+02:00", "EventTime": "2023-10-30T14:04:53.283213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CGak3l3MoaVnfRc1j7"]} -{"Format": "IDEA0", "ID": "b747352c-34d0-432d-8568-6b595b1cbdbb", "DetectTime": "2023-10-30T14:04:53.303815+02:00", "EventTime": "2023-10-30T14:04:53.303831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CoLWA33a4XDQARh1E8"]} -{"Format": "IDEA0", "ID": "1d95cd7f-09c3-4cb6-b000-901210e15cad", "DetectTime": "2023-10-30T14:04:53.324096+02:00", "EventTime": "2023-10-30T14:04:53.324113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["Czxp3p2B0mWUtUGabb"]} -{"Format": "IDEA0", "ID": "741a4401-c2b2-4d7f-9b8f-290ce2aa9039", "DetectTime": "2023-10-30T14:04:53.342350+02:00", "EventTime": "2023-10-30T14:04:53.342363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CQ48hj1z66IOTn96Db"]} -{"Format": "IDEA0", "ID": "13e3dfdd-15b7-4431-89ec-87c0a92644a3", "DetectTime": "2023-10-30T14:04:53.361808+02:00", "EventTime": "2023-10-30T14:04:53.361826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CdClhl2wx0FxCVRaMe"]} -{"Format": "IDEA0", "ID": "4c52503d-6089-4464-a4d7-a7974fd61726", "DetectTime": "2023-10-30T14:04:53.378380+02:00", "EventTime": "2023-10-30T14:04:53.378409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["Cmk9se2zzJA9ppHO4j"]} -{"Format": "IDEA0", "ID": "f01560e7-62df-4641-85e9-a1227a10a593", "DetectTime": "2023-10-30T14:04:53.395823+02:00", "EventTime": "2023-10-30T14:04:53.395837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["C58tj12Mnv66hOBow5"]} -{"Format": "IDEA0", "ID": "1621462a-2683-4e41-9433-ea30090ca25a", "DetectTime": "2023-10-30T14:04:53.422760+02:00", "EventTime": "2023-10-30T14:04:53.422794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. ", "ContentType": "text/plain"}], "uids": ["CNtx0X1yRhhyykNa4a"]} -{"Format": "IDEA0", "ID": "07f3129c-69bd-48fa-90c1-52eba31a4010", "DetectTime": "2023-10-30T14:04:53.467096+02:00", "EventTime": "2023-10-30T14:04:53.467109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C8oDvh17e2nkDg16Rb"]} -{"Format": "IDEA0", "ID": "081b64ad-a9ef-4130-90e5-dd22df1a5f91", "DetectTime": "2023-10-30T14:04:53.485832+02:00", "EventTime": "2023-10-30T14:04:53.485848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CnafOH1TqxuN4eafva"]} -{"Format": "IDEA0", "ID": "8bd0af07-0490-4fca-a77f-705b0f659f85", "DetectTime": "2023-10-30T14:04:53.504688+02:00", "EventTime": "2023-10-30T14:04:53.504701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CBHw933UQTa8JdKb5l"]} -{"Format": "IDEA0", "ID": "a7e8e22f-30b8-4511-a249-d63b9a03b7c3", "DetectTime": "2023-10-30T14:04:53.523920+02:00", "EventTime": "2023-10-30T14:04:53.523934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CmEggW27Ys3Lo1Jxn2"]} -{"Format": "IDEA0", "ID": "4fc226b6-83bb-4e3b-94b9-4187c00a2a71", "DetectTime": "2023-10-30T14:04:53.543666+02:00", "EventTime": "2023-10-30T14:04:53.543687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CLs9yF3EJG6LBTzU7c"]} -{"Format": "IDEA0", "ID": "cfef8a55-33e4-466c-9149-4d5c5290422b", "DetectTime": "2023-10-30T14:04:53.565800+02:00", "EventTime": "2023-10-30T14:04:53.565825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CnwYD82SSf8MHw2Tmf"]} -{"Format": "IDEA0", "ID": "8b7812a1-5eee-4b22-bcd8-78369778d031", "DetectTime": "2023-10-30T14:04:53.588108+02:00", "EventTime": "2023-10-30T14:04:53.588133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CsAlwhJGIpIFwUQef"]} -{"Format": "IDEA0", "ID": "37a85a36-f5f8-4270-81f8-daf52de98ea1", "DetectTime": "2023-10-30T14:04:53.609194+02:00", "EventTime": "2023-10-30T14:04:53.609213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CTsNu32Fz9gRP7Irpe"]} -{"Format": "IDEA0", "ID": "187f9d3f-129f-4923-b363-71004a1081be", "DetectTime": "2023-10-30T14:04:53.629530+02:00", "EventTime": "2023-10-30T14:04:53.629550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CPUvEJ1dg6sto1HMV1"]} -{"Format": "IDEA0", "ID": "bdf47620-d39e-4e50-bb11-2328c9e7f04f", "DetectTime": "2023-10-30T14:04:53.648765+02:00", "EventTime": "2023-10-30T14:04:53.648783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CzKwfB3Jc2onCoMFya"]} -{"Format": "IDEA0", "ID": "f7299676-12fe-46aa-a5cd-561b5d63f26a", "DetectTime": "2023-10-30T14:04:53.667913+02:00", "EventTime": "2023-10-30T14:04:53.667946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Cf8R2WLApmMJN9Qxh"]} -{"Format": "IDEA0", "ID": "8393d27c-73b0-48d3-8cd5-919febc776bd", "DetectTime": "2023-10-30T14:04:53.689027+02:00", "EventTime": "2023-10-30T14:04:53.689054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CKmoqH2mbf5oeSIODh"]} -{"Format": "IDEA0", "ID": "06138ebb-3734-41c0-bf7f-fdae61da3979", "DetectTime": "2023-10-30T14:04:53.709950+02:00", "EventTime": "2023-10-30T14:04:53.709969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CP9YZG1nnuF2V0HhS8"]} -{"Format": "IDEA0", "ID": "6a1c1e67-1fe4-4498-948e-796ae365bba6", "DetectTime": "2023-10-30T14:04:53.728549+02:00", "EventTime": "2023-10-30T14:04:53.728566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CKONVW28KsTOir8gug"]} -{"Format": "IDEA0", "ID": "e97dc21c-e7cb-4a1c-a280-d35b8084099a", "DetectTime": "2023-10-30T14:04:53.746760+02:00", "EventTime": "2023-10-30T14:04:53.746800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CutJgV1GipXjl5cADc"]} -{"Format": "IDEA0", "ID": "a463966a-6ded-4a61-a162-17e03aeccb71", "DetectTime": "2023-10-30T14:04:53.766142+02:00", "EventTime": "2023-10-30T14:04:53.766158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CMsBFt4wMTGew8gjpl"]} -{"Format": "IDEA0", "ID": "16fc0f42-59c6-4755-b28f-28268fc04146", "DetectTime": "2023-10-30T14:04:53.789218+02:00", "EventTime": "2023-10-30T14:04:53.789234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["CBnpSy1kcZ22nacBwb"]} -{"Format": "IDEA0", "ID": "5007bb23-5f7d-4de5-9352-0285ce8d2b97", "DetectTime": "2023-10-30T14:04:53.829972+02:00", "EventTime": "2023-10-30T14:04:53.829988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CwsGeC1tDKSWoj4Fy6"]} -{"Format": "IDEA0", "ID": "ae1e1591-3c7e-4d69-ab2c-bf086679ed66", "DetectTime": "2023-10-30T14:04:53.854504+02:00", "EventTime": "2023-10-30T14:04:53.854522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CzBepC2AlWTxRW6Wy6"]} -{"Format": "IDEA0", "ID": "1243ca78-088e-4f21-b862-5259e9621357", "DetectTime": "2023-10-30T14:04:53.879281+02:00", "EventTime": "2023-10-30T14:04:53.879301+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZJfeC18QE2DJhnBSk"]} -{"Format": "IDEA0", "ID": "1192b9c4-0b12-4fec-b29d-a5b6b3ccc20a", "DetectTime": "2023-10-30T14:04:53.885804+02:00", "EventTime": "2023-10-30T14:04:53.885822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CGobgy3on0C2I1d3La"]} -{"Format": "IDEA0", "ID": "b6b73fad-e632-4f85-b48a-28e088212093", "DetectTime": "2023-10-30T14:04:53.906919+02:00", "EventTime": "2023-10-30T14:04:53.906936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPTSDT2p8z4jdCBvHj"]} -{"Format": "IDEA0", "ID": "7683254b-9a3e-4c00-80d2-0d35e9c03d71", "DetectTime": "2023-10-30T14:04:53.926880+02:00", "EventTime": "2023-10-30T14:04:53.926892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CoKGT13wFV824OLZvg"]} -{"Format": "IDEA0", "ID": "b97050f5-b173-41be-98b3-f10006a43474", "DetectTime": "2023-10-30T14:04:53.948880+02:00", "EventTime": "2023-10-30T14:04:53.948897+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CTdV0L1iL8yZF0OGk7"]} -{"Format": "IDEA0", "ID": "b2bb2210-0098-4cf4-bf3a-d94be56a1164", "DetectTime": "2023-10-30T14:04:53.955575+02:00", "EventTime": "2023-10-30T14:04:53.955592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLkeWr4P2kYYTzdUUg"]} -{"Format": "IDEA0", "ID": "3fac12eb-8d35-472f-8edb-e38284c38006", "DetectTime": "2023-10-30T14:04:53.978579+02:00", "EventTime": "2023-10-30T14:04:53.978596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CwLJIq1teb1uMqElO5"]} -{"Format": "IDEA0", "ID": "89630f6f-1250-42fa-aa31-ebeba88c7c0e", "DetectTime": "2023-10-30T14:04:54.003176+02:00", "EventTime": "2023-10-30T14:04:54.003193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CBSRsS1DSY35Zvwiz8"]} -{"Format": "IDEA0", "ID": "a7f40859-09d9-4364-ac4d-3aa6b57a94f5", "DetectTime": "2023-10-30T14:04:54.024647+02:00", "EventTime": "2023-10-30T14:04:54.024657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["C38lon3H4cRJz5XsP6"]} -{"Format": "IDEA0", "ID": "eaa6d218-8cdd-46b5-a3c2-ff54394ec285", "DetectTime": "2023-10-30T14:04:54.045535+02:00", "EventTime": "2023-10-30T14:04:54.045554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CqG1EL1Ofe6iLkPU2k"]} -{"Format": "IDEA0", "ID": "10285f7c-205a-46b0-9f6c-d33bcad5f601", "DetectTime": "2023-10-30T14:04:54.065547+02:00", "EventTime": "2023-10-30T14:04:54.065563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["Cmw87NH0RbK0n60i2"]} -{"Format": "IDEA0", "ID": "3d4505a6-fd73-45cb-87e5-ae1f760e3ab3", "DetectTime": "2023-10-30T14:04:54.086600+02:00", "EventTime": "2023-10-30T14:04:54.086621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["Cq6UJl4j2Nh0COhW8a"]} -{"Format": "IDEA0", "ID": "97035489-ef35-4bf4-8bdd-0e38c0cda769", "DetectTime": "2023-10-30T14:04:54.110128+02:00", "EventTime": "2023-10-30T14:04:54.110144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cyn0pd4aiu6A1nhqOf"]} -{"Format": "IDEA0", "ID": "796258c0-389b-4328-b6b8-59512edfd849", "DetectTime": "2023-10-30T14:04:54.133640+02:00", "EventTime": "2023-10-30T14:04:54.133655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CeUTbE9k3Q0bWEi8"]} -{"Format": "IDEA0", "ID": "6f4b446c-17c4-456d-8ca8-9396d9ca92e8", "DetectTime": "2023-10-30T14:04:54.153815+02:00", "EventTime": "2023-10-30T14:04:54.153831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["Cmm7GK2H7RBFhzWPMl"]} -{"Format": "IDEA0", "ID": "508d4551-2c41-4c5f-82cc-0e77c3aa0f8e", "DetectTime": "2023-10-30T14:04:54.175685+02:00", "EventTime": "2023-10-30T14:04:54.175698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["C0xdpS2QAAX8SXcq06"]} -{"Format": "IDEA0", "ID": "a7f38de5-1390-44dc-9c0a-5ce5ca37066d", "DetectTime": "2023-10-30T14:04:54.194528+02:00", "EventTime": "2023-10-30T14:04:54.194544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CCH1SqMuYkRniOdLb"]} -{"Format": "IDEA0", "ID": "17ce9366-5d75-466c-9c6f-62677dfc7aed", "DetectTime": "2023-10-30T14:04:54.236001+02:00", "EventTime": "2023-10-30T14:04:54.236019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CeDE6m1FdwhAGa5gy1"]} -{"Format": "IDEA0", "ID": "454916b4-eee8-416e-a03c-2c8d718f748f", "DetectTime": "2023-10-30T14:04:54.258145+02:00", "EventTime": "2023-10-30T14:04:54.258167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["C7bQb13vut2V5haXk5"]} -{"Format": "IDEA0", "ID": "bebead03-2fc5-4e36-a6bf-6356fad7ef3c", "DetectTime": "2023-10-30T14:04:54.279069+02:00", "EventTime": "2023-10-30T14:04:54.279087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CSEdj14s0PTAY2MfR2"]} -{"Format": "IDEA0", "ID": "ecc5d3d9-b790-4f26-a616-2b643708eb68", "DetectTime": "2023-10-30T14:04:54.301083+02:00", "EventTime": "2023-10-30T14:04:54.301102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CmTtQlRubl22XPZki"]} -{"Format": "IDEA0", "ID": "bdecf546-3ed5-4b05-9469-5a8e7be3d80a", "DetectTime": "2023-10-30T14:04:54.318988+02:00", "EventTime": "2023-10-30T14:04:54.319002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["ClBfHLuOPms0HGhhc"]} -{"Format": "IDEA0", "ID": "d13ac227-c67c-452e-b32b-69d20418c5a5", "DetectTime": "2023-10-30T14:04:54.344414+02:00", "EventTime": "2023-10-30T14:04:54.344436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["Cpe1oW3yWMdH2vaSda"]} -{"Format": "IDEA0", "ID": "76556684-3662-484d-b7c8-84ad6f740486", "DetectTime": "2023-10-30T14:04:54.369284+02:00", "EventTime": "2023-10-30T14:04:54.369312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["C7v7dR1K6bboBnXrNd"]} -{"Format": "IDEA0", "ID": "8775ed84-1ed9-4b14-b201-8e355b5fea18", "DetectTime": "2023-10-30T14:04:54.387260+02:00", "EventTime": "2023-10-30T14:04:54.387273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cog9oN3DYfCHVYEUfb"]} -{"Format": "IDEA0", "ID": "ccd4570d-82c8-4783-b8fb-278860f3a020", "DetectTime": "2023-10-30T14:04:54.406756+02:00", "EventTime": "2023-10-30T14:04:54.406769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CqSfCh1RwXVQxa8sUk"]} -{"Format": "IDEA0", "ID": "1b3e5ce0-b0d6-4559-9e63-5651baa11e58", "DetectTime": "2023-10-30T14:04:54.425326+02:00", "EventTime": "2023-10-30T14:04:54.425340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["C8HLgaZuzHHjCdPIj"]} -{"Format": "IDEA0", "ID": "78f225e2-a843-4483-a22a-5a246bb5a0bd", "DetectTime": "2023-10-30T14:04:54.446474+02:00", "EventTime": "2023-10-30T14:04:54.446491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CAz0A81WmmPfJhco26"]} -{"Format": "IDEA0", "ID": "da84a733-5ca3-465d-9d94-874ba7fbe866", "DetectTime": "2023-10-30T14:04:54.465839+02:00", "EventTime": "2023-10-30T14:04:54.465856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CaXJdQYIDRZifYuI4"]} -{"Format": "IDEA0", "ID": "bec020cb-a14d-483e-89ed-24792faaff2f", "DetectTime": "2023-10-30T14:04:54.486006+02:00", "EventTime": "2023-10-30T14:04:54.486017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["Ci33Pw2Z6TGuEqTIvc"]} -{"Format": "IDEA0", "ID": "3859ac65-b745-4663-8360-1e51c172274f", "DetectTime": "2023-10-30T14:04:54.507036+02:00", "EventTime": "2023-10-30T14:04:54.507053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ChQRlTSdkv0NuJpq1"]} -{"Format": "IDEA0", "ID": "dd83acc8-8ccd-45c6-866c-26eef5605a86", "DetectTime": "2023-10-30T14:04:54.528554+02:00", "EventTime": "2023-10-30T14:04:54.528579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CndFBw1huGiUY2rY"]} -{"Format": "IDEA0", "ID": "6467beb1-6fc4-435e-914f-3d449f02f60f", "DetectTime": "2023-10-30T14:04:54.548613+02:00", "EventTime": "2023-10-30T14:04:54.548630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CurTGKImla89EVPD6"]} -{"Format": "IDEA0", "ID": "ec61b817-21df-4906-be13-4ee46dde08ce", "DetectTime": "2023-10-30T14:04:54.567334+02:00", "EventTime": "2023-10-30T14:04:54.567347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["CgLVpq4xH6vicV2M15"]} -{"Format": "IDEA0", "ID": "e5b212a9-5da0-4369-84fe-ae626515a8c4", "DetectTime": "2023-10-30T14:04:54.587644+02:00", "EventTime": "2023-10-30T14:04:54.587660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8ctba1RAKEXqP6Mz8"]} -{"Format": "IDEA0", "ID": "9d30337d-ab73-402c-a7b9-87e27ba526b4", "DetectTime": "2023-10-30T14:04:54.609900+02:00", "EventTime": "2023-10-30T14:04:54.609912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CEglQa3lpxl7thfrK2"]} -{"Format": "IDEA0", "ID": "64ae6005-fa04-4dad-a222-4c6df8ca83b4", "DetectTime": "2023-10-30T14:04:54.631762+02:00", "EventTime": "2023-10-30T14:04:54.631779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cyxdvc12e6pdiCMGoh"]} -{"Format": "IDEA0", "ID": "025456e2-e790-4535-8ae9-605d0e3039d3", "DetectTime": "2023-10-30T14:04:54.649787+02:00", "EventTime": "2023-10-30T14:04:54.649803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CXJmKh4oEg8BGaptik"]} -{"Format": "IDEA0", "ID": "c8349261-927c-4f78-bbaa-f8023c5017c9", "DetectTime": "2023-10-30T14:04:54.670160+02:00", "EventTime": "2023-10-30T14:04:54.670177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CHnobQ1eMqpf5fxzYj"]} -{"Format": "IDEA0", "ID": "3f953ecb-7ebe-4391-b556-7d7915038555", "DetectTime": "2023-10-30T14:04:54.688499+02:00", "EventTime": "2023-10-30T14:04:54.688510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Chry1d2T4hNVrFzIU3"]} -{"Format": "IDEA0", "ID": "d719d592-55e6-4ec4-b049-f3a643df3c29", "DetectTime": "2023-10-30T14:04:54.707834+02:00", "EventTime": "2023-10-30T14:04:54.707845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CDI1HQe2271Qiy3Vc"]} -{"Format": "IDEA0", "ID": "d8707039-8737-4004-80f3-3d635e61bd05", "DetectTime": "2023-10-30T14:04:54.726493+02:00", "EventTime": "2023-10-30T14:04:54.726509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CrF9pk1e0bD9Ivv1F2"]} -{"Format": "IDEA0", "ID": "b95a4562-a230-45db-87b5-a589e00bc46c", "DetectTime": "2023-10-30T14:04:54.749398+02:00", "EventTime": "2023-10-30T14:04:54.749416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cw9VFH39n40ailUez7"]} -{"Format": "IDEA0", "ID": "421746b9-dfa4-4bd6-9ac7-93168a863902", "DetectTime": "2023-10-30T14:04:54.790120+02:00", "EventTime": "2023-10-30T14:04:54.790136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CX5cpX2QixAZ45HpA"]} -{"Format": "IDEA0", "ID": "abcfe58d-0a11-4c0f-b737-de7b26d09ee1", "DetectTime": "2023-10-30T14:04:54.810456+02:00", "EventTime": "2023-10-30T14:04:54.810468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CbBl482DEZN4KTwXs4"]} -{"Format": "IDEA0", "ID": "55838944-d623-4ca1-aaae-911f6011207d", "DetectTime": "2023-10-30T14:04:54.826771+02:00", "EventTime": "2023-10-30T14:04:54.826807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CzyKgx4woSmiCoXvHg"]} -{"Format": "IDEA0", "ID": "f91898c8-25f3-408d-ae3e-df8e16ddedd8", "DetectTime": "2023-10-30T14:04:54.842748+02:00", "EventTime": "2023-10-30T14:04:54.842758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CCxL5o49xQnmkyEBL3"]} -{"Format": "IDEA0", "ID": "b21a4f09-2f0e-48a5-930e-52d46527cbb3", "DetectTime": "2023-10-30T14:04:54.861923+02:00", "EventTime": "2023-10-30T14:04:54.861938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CGr5P89MUk72dBUX2"]} -{"Format": "IDEA0", "ID": "141121f0-d897-47e4-8e02-4c4b256983f3", "DetectTime": "2023-10-30T14:04:54.879552+02:00", "EventTime": "2023-10-30T14:04:54.879570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CejbxW3ovS87JfpItk"]} -{"Format": "IDEA0", "ID": "b8d46d92-f07a-4d87-8774-81718933d590", "DetectTime": "2023-10-30T14:04:54.897441+02:00", "EventTime": "2023-10-30T14:04:54.897456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CUKABnPyUkJMTLYNe"]} -{"Format": "IDEA0", "ID": "de33b8c6-42cd-4e89-ac89-91dd0285fc48", "DetectTime": "2023-10-30T14:04:54.919487+02:00", "EventTime": "2023-10-30T14:04:54.919503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["Cdhqdq3tZ1mwwRCCA7"]} -{"Format": "IDEA0", "ID": "a79df50c-8260-4621-8515-bae0cf5ae7c6", "DetectTime": "2023-10-30T14:04:54.939653+02:00", "EventTime": "2023-10-30T14:04:54.939670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CmRASIIvBvOv13ZZ3"]} -{"Format": "IDEA0", "ID": "e38f77b1-e3fd-46a1-bc43-f1fde31818b1", "DetectTime": "2023-10-30T14:04:54.958437+02:00", "EventTime": "2023-10-30T14:04:54.958453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["C1I0Az4uEqa6h08M1g"]} -{"Format": "IDEA0", "ID": "9e238fe9-e183-40a8-82c7-cf7c3dc0bb9e", "DetectTime": "2023-10-30T14:04:54.978207+02:00", "EventTime": "2023-10-30T14:04:54.978223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CEAAqZ2yQD4tNtkT0g"]} -{"Format": "IDEA0", "ID": "3bdc8f3b-1edf-435c-8a1c-88d28d6c92bb", "DetectTime": "2023-10-30T14:04:54.999809+02:00", "EventTime": "2023-10-30T14:04:54.999825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CLpifq1W42peNlRiOg"]} -{"Format": "IDEA0", "ID": "d4247e38-3919-4602-8033-f72766db9be8", "DetectTime": "2023-10-30T14:04:55.019542+02:00", "EventTime": "2023-10-30T14:04:55.019554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CEBGWW5rzGSPer59f"]} -{"Format": "IDEA0", "ID": "96d55faf-ee14-4edd-b1ef-d9430c605a55", "DetectTime": "2023-10-30T14:04:55.037505+02:00", "EventTime": "2023-10-30T14:04:55.037520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CwEQBsqgsUk7kp4w5"]} -{"Format": "IDEA0", "ID": "2d2c9916-32ab-42aa-b3ec-fffbdbbf2ffd", "DetectTime": "2023-10-30T14:04:55.058148+02:00", "EventTime": "2023-10-30T14:04:55.058168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CoIQAR2kVmF1sGoLE1"]} -{"Format": "IDEA0", "ID": "7606a341-d609-481e-ad9e-b10c4f6f7f17", "DetectTime": "2023-10-30T14:04:55.078174+02:00", "EventTime": "2023-10-30T14:04:55.078194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["C1Klcy1DxRPWToR8l3"]} -{"Format": "IDEA0", "ID": "8372623f-d929-4a38-a5ab-3603e877adf4", "DetectTime": "2023-10-30T14:04:55.101289+02:00", "EventTime": "2023-10-30T14:04:55.101308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CwhuZL14tdlXlmz4f"]} -{"Format": "IDEA0", "ID": "0cd21f2b-949f-4674-82dc-de5feebd8853", "DetectTime": "2023-10-30T14:04:55.125657+02:00", "EventTime": "2023-10-30T14:04:55.125673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CKjXAa4q4dOJ12fyif"]} -{"Format": "IDEA0", "ID": "dec2e5d6-b943-409d-ab22-d7c21065afdc", "DetectTime": "2023-10-30T14:04:55.149864+02:00", "EventTime": "2023-10-30T14:04:55.149884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CO7zd62CNMWAjZmI36"]} -{"Format": "IDEA0", "ID": "a129750c-d8f8-44f4-9f31-4a5fc1f88c8a", "DetectTime": "2023-10-30T14:04:55.171289+02:00", "EventTime": "2023-10-30T14:04:55.171302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CXVQpn4Be2LDU3r4X9"]} -{"Format": "IDEA0", "ID": "281c6617-95a0-4bf4-9114-bf389a039ad0", "DetectTime": "2023-10-30T14:04:55.186897+02:00", "EventTime": "2023-10-30T14:04:55.186908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CneAl435VMwOY3x1Fg"]} -{"Format": "IDEA0", "ID": "7bd4adb4-24ce-4262-968f-800762cd2bdc", "DetectTime": "2023-10-30T14:04:55.219759+02:00", "EventTime": "2023-10-30T14:04:55.219775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.7.185.64 ", "ContentType": "text/plain"}], "uids": ["CgV0GZ1sDDCHJD45fb"]} -{"Format": "IDEA0", "ID": "7dfd0606-1675-4c5d-a7b9-62a9cabf7d3a", "DetectTime": "2023-10-30T14:04:55.246872+02:00", "EventTime": "2023-10-30T14:04:55.246884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSW5e62OClOqMWdDa2"]} -{"Format": "IDEA0", "ID": "9759dad6-5fb8-43e8-bf7b-c4bb93f229ea", "DetectTime": "2023-10-30T14:04:55.274796+02:00", "EventTime": "2023-10-30T14:04:55.274813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CIm6dK3xFzprWBqSyg"]} -{"Format": "IDEA0", "ID": "8638ddab-6391-4cdc-830b-a9e4eb90ef98", "DetectTime": "2023-10-30T14:04:55.304107+02:00", "EventTime": "2023-10-30T14:04:55.304132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CHXnYcPkONfz83sgb"]} -{"Format": "IDEA0", "ID": "8304eb80-abd5-4099-9597-4ff1a9c4c44a", "DetectTime": "2023-10-30T14:04:55.328893+02:00", "EventTime": "2023-10-30T14:04:55.328910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CsNrkI33PKIbfuERX9"]} -{"Format": "IDEA0", "ID": "84617fe5-db09-48cd-b7be-fffaaa2aaf75", "DetectTime": "2023-10-30T14:04:55.353770+02:00", "EventTime": "2023-10-30T14:04:55.353782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbtI7h1xebVqPqhGbi"]} -{"Format": "IDEA0", "ID": "957a0d01-6887-4d3f-9490-46afe9329442", "DetectTime": "2023-10-30T14:04:55.383508+02:00", "EventTime": "2023-10-30T14:04:55.383526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.30.110 ", "ContentType": "text/plain"}], "uids": ["CGKpleQ1YtNlhHIj4"]} -{"Format": "IDEA0", "ID": "677e5d67-9517-4aa4-9aa4-38ac7fbd3d82", "DetectTime": "2023-10-30T14:04:55.408919+02:00", "EventTime": "2023-10-30T14:04:55.408931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.169.115.140 ", "ContentType": "text/plain"}], "uids": ["Cimi1gKXVAtAFIjFb"]} -{"Format": "IDEA0", "ID": "9fe57b93-1bce-49a1-be16-e63d0f0cbed6", "DetectTime": "2023-10-30T14:04:55.433931+02:00", "EventTime": "2023-10-30T14:04:55.433948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C1ZXQK3UOrMTsh1oM9"]} -{"Format": "IDEA0", "ID": "3ba00535-4d6c-46f6-985a-d35b39e1f4ae", "DetectTime": "2023-10-30T14:04:55.456885+02:00", "EventTime": "2023-10-30T14:04:55.456896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CeD66l1kQHU55NhrUb"]} -{"Format": "IDEA0", "ID": "0250aa2c-bf4c-403a-829b-e903e1379ca6", "DetectTime": "2023-10-30T14:04:55.483656+02:00", "EventTime": "2023-10-30T14:04:55.483672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CKV2nF6rAaUDNSvLd"]} -{"Format": "IDEA0", "ID": "230aa7fe-1ad5-47f8-80f1-1888111c7491", "DetectTime": "2023-10-30T14:04:55.510041+02:00", "EventTime": "2023-10-30T14:04:55.510057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CZITcE18ttPvVhkut8"]} -{"Format": "IDEA0", "ID": "0d4ab232-facb-476a-a6b3-ccd642369539", "DetectTime": "2023-10-30T14:04:55.534138+02:00", "EventTime": "2023-10-30T14:04:55.534160+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBc82B3ZKpLkqNoZQc"]} -{"Format": "IDEA0", "ID": "e998051e-7ecc-4033-b11d-e8192fd0123a", "DetectTime": "2023-10-30T14:04:55.542001+02:00", "EventTime": "2023-10-30T14:04:55.542024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CffKCA17AOPVYARtMl"]} -{"Format": "IDEA0", "ID": "6d7241a7-59af-4239-9d95-c833160f0a1a", "DetectTime": "2023-10-30T14:04:55.572832+02:00", "EventTime": "2023-10-30T14:04:55.572854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CIQsgX32FanUpEUFg4"]} -{"Format": "IDEA0", "ID": "e4ca2ff6-a552-4bb1-8df4-83eda8eeac6b", "DetectTime": "2023-10-30T14:04:55.602211+02:00", "EventTime": "2023-10-30T14:04:55.602222+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CFBjPq3XwOnfMGRLA5"]} -{"Format": "IDEA0", "ID": "c18ee21f-ce0e-45de-b847-b11797947312", "DetectTime": "2023-10-30T14:04:55.656288+02:00", "EventTime": "2023-10-30T14:04:55.656306+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzUpGl36gvSxuSzNM8"]} -{"Format": "IDEA0", "ID": "3f50a541-7914-4937-bf7d-50e1a8304a5e", "DetectTime": "2023-10-30T14:04:55.662314+02:00", "EventTime": "2023-10-30T14:04:55.662324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CVWpBc2NQYaixPppo3"]} -{"Format": "IDEA0", "ID": "d660cda6-bdca-40d7-9852-5ac403d80251", "DetectTime": "2023-10-30T14:04:55.685557+02:00", "EventTime": "2023-10-30T14:04:55.685578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CjUHvu1U0xjD6FRmLi"]} -{"Format": "IDEA0", "ID": "ab4b0755-e6b5-4cd6-b460-ffc3455b404f", "DetectTime": "2023-10-30T14:04:55.710521+02:00", "EventTime": "2023-10-30T14:04:55.710537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CEqz314eQA7mHy0oL6"]} -{"Format": "IDEA0", "ID": "23f7842f-0101-4b8d-b221-b168a6259064", "DetectTime": "2023-10-30T14:04:55.736838+02:00", "EventTime": "2023-10-30T14:04:55.736850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["Cvg8pQ3GbKrOAPgJok"]} -{"Format": "IDEA0", "ID": "0bdd4ceb-d46f-4587-a114-71c1ea988b93", "DetectTime": "2023-10-30T14:04:55.764711+02:00", "EventTime": "2023-10-30T14:04:55.764726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CLzrZoQNPhXkycUYi"]} -{"Format": "IDEA0", "ID": "61f814bd-4292-4222-9f39-b254dbbef929", "DetectTime": "2023-10-30T14:04:55.790318+02:00", "EventTime": "2023-10-30T14:04:55.790334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C3ntI4KdIUtYOGsi3"]} -{"Format": "IDEA0", "ID": "6be580d5-2a95-4b4b-b855-09570db0311f", "DetectTime": "2023-10-30T14:04:55.816281+02:00", "EventTime": "2023-10-30T14:04:55.816299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CAn56P30c3CuPF0cu8"]} -{"Format": "IDEA0", "ID": "46955857-8ad6-41fd-96bc-f305b68fb438", "DetectTime": "2023-10-30T14:04:55.843231+02:00", "EventTime": "2023-10-30T14:04:55.843246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CXHZmzvejU00XAM5f", "CBc82B3ZKpLkqNoZQc", "CxuEev2MKpUaU1rLj1", "CZJfeC18QE2DJhnBSk"]} -{"Format": "IDEA0", "ID": "a60f6863-9775-42fd-9b09-d2140a261bda", "DetectTime": "2023-10-30T14:04:55.851768+02:00", "EventTime": "2023-10-30T14:04:55.851794+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXHZmzvejU00XAM5f"]} -{"Format": "IDEA0", "ID": "fe2f971b-5958-4dc2-8620-20c04de32e9f", "DetectTime": "2023-10-30T14:04:55.859535+02:00", "EventTime": "2023-10-30T14:04:55.859551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["C1VQ9A43Uk97zjaLA4"]} -{"Format": "IDEA0", "ID": "6fe3f821-c8d7-45c7-b864-e580c0b3caa2", "DetectTime": "2023-10-30T14:04:55.888211+02:00", "EventTime": "2023-10-30T14:04:55.888227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4KSve4TmjaeygULHj"]} -{"Format": "IDEA0", "ID": "a9ae2d78-1e27-44bd-9cd6-a9d585b6f6b4", "DetectTime": "2023-10-30T14:04:55.916120+02:00", "EventTime": "2023-10-30T14:04:55.916140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["C0DkDC1bAGClK3KgEb"]} -{"Format": "IDEA0", "ID": "00e9d8d3-dfca-44ce-9b6c-9b938966a06e", "DetectTime": "2023-10-30T14:04:55.940588+02:00", "EventTime": "2023-10-30T14:04:55.940605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CoCsxR2yJTDROmJ66d"]} -{"Format": "IDEA0", "ID": "a6461000-e399-4a54-b052-f8aab2714718", "DetectTime": "2023-10-30T14:04:55.972392+02:00", "EventTime": "2023-10-30T14:04:55.972416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3YB3H343cFJg8Cdzg"]} -{"Format": "IDEA0", "ID": "1f111c9f-7729-4c09-b635-9c3c095c6ca8", "DetectTime": "2023-10-30T14:04:55.981854+02:00", "EventTime": "2023-10-30T14:04:55.981876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CoabGRAuBNpyTESod"]} -{"Format": "IDEA0", "ID": "8c55bf03-b570-4912-871d-2742c27d229b", "DetectTime": "2023-10-30T14:04:56.011800+02:00", "EventTime": "2023-10-30T14:04:56.011821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CmzkOK3yAGZU1DNpa"]} -{"Format": "IDEA0", "ID": "3fed6276-484d-478c-8d42-40dfc4b459cd", "DetectTime": "2023-10-30T14:04:56.041854+02:00", "EventTime": "2023-10-30T14:04:56.041877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CuMX3XzswDP0EU3T7"]} -{"Format": "IDEA0", "ID": "bddbd3f4-adcc-4036-8b0c-840ae4e5d600", "DetectTime": "2023-10-30T14:04:56.069294+02:00", "EventTime": "2023-10-30T14:04:56.069316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZ0OWX1c0UqPojVJL3"]} -{"Format": "IDEA0", "ID": "25beb776-f48b-4039-82c6-8ad9c18fef3c", "DetectTime": "2023-10-30T14:04:56.076625+02:00", "EventTime": "2023-10-30T14:04:56.076636+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYTHMx2WRF4mek1Bz9"]} -{"Format": "IDEA0", "ID": "7e2d5367-781d-4d97-b13f-20782f19ccc5", "DetectTime": "2023-10-30T14:04:56.084946+02:00", "EventTime": "2023-10-30T14:04:56.084968+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CkNK964TH6PQLCFGA7"]} -{"Format": "IDEA0", "ID": "12dba6f1-ab8a-407a-9b8a-dca5ba570ebd", "DetectTime": "2023-10-30T14:04:56.094098+02:00", "EventTime": "2023-10-30T14:04:56.094121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.141.117.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.141.117.232 ", "ContentType": "text/plain"}], "uids": ["CS8Bec4yAeeItEQ6Be"]} -{"Format": "IDEA0", "ID": "45682dbd-fdd5-48d5-b236-ba7cbf241da5", "DetectTime": "2023-10-30T14:04:56.125007+02:00", "EventTime": "2023-10-30T14:04:56.125024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.77.237.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.77.237.107 ", "ContentType": "text/plain"}], "uids": ["CuwekO1kmZ28torbEa"]} -{"Format": "IDEA0", "ID": "55d11105-cd74-4917-8245-bc123c1beeb3", "DetectTime": "2023-10-30T14:04:56.156710+02:00", "EventTime": "2023-10-30T14:04:56.156730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["Csy5PO2GXkM4ARwZyf"]} -{"Format": "IDEA0", "ID": "2373a149-d387-4df7-9138-422c6b505064", "DetectTime": "2023-10-30T14:04:56.185436+02:00", "EventTime": "2023-10-30T14:04:56.185455+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CiZRtT1V4hlG2m7Mq4"]} -{"Format": "IDEA0", "ID": "ef9675b3-921d-4adb-a106-725c568ca642", "DetectTime": "2023-10-30T14:04:56.192823+02:00", "EventTime": "2023-10-30T14:04:56.192833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.5.194.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.5.194.234 ", "ContentType": "text/plain"}], "uids": ["C3713q2Hw03UAFHaGh"]} -{"Format": "IDEA0", "ID": "e930b2c2-308d-4a3d-a13e-b50d4e429a89", "DetectTime": "2023-10-30T14:04:56.221916+02:00", "EventTime": "2023-10-30T14:04:56.221938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CWZE0k2jlHoHduhYmc"]} -{"Format": "IDEA0", "ID": "3197a8a9-1ced-4063-896e-c10556283204", "DetectTime": "2023-10-30T14:04:56.250772+02:00", "EventTime": "2023-10-30T14:04:56.250800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.153.6.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.153.6.113 ", "ContentType": "text/plain"}], "uids": ["CYC0754zLJIexYTSB9"]} -{"Format": "IDEA0", "ID": "47d27916-d647-4c38-b48c-57b82a25014e", "DetectTime": "2023-10-30T14:04:56.278441+02:00", "EventTime": "2023-10-30T14:04:56.278466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.42.234.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.42.234.135 ", "ContentType": "text/plain"}], "uids": ["CPSoVV19J9pxt9AXPh"]} -{"Format": "IDEA0", "ID": "23ef1c33-6fe8-4657-a6cf-838877f040a1", "DetectTime": "2023-10-30T14:04:56.307131+02:00", "EventTime": "2023-10-30T14:04:56.307148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.49.45.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.49.45.200 ", "ContentType": "text/plain"}], "uids": ["CSUZbi4LRql3bcd2Al"]} -{"Format": "IDEA0", "ID": "290fa64b-3e13-462e-8367-cebee7d83715", "DetectTime": "2023-10-30T14:04:56.331730+02:00", "EventTime": "2023-10-30T14:04:56.331750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.80.99.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.80.99.25 ", "ContentType": "text/plain"}], "uids": ["CZVUSX0lOgfP16e7l"]} -{"Format": "IDEA0", "ID": "ac5147d3-f900-4587-8010-5e1bb96c67e6", "DetectTime": "2023-10-30T14:04:56.363366+02:00", "EventTime": "2023-10-30T14:04:56.363385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CMEutYJ6rJGhNnIJd"]} -{"Format": "IDEA0", "ID": "0a2e4c38-203a-41cb-bea6-10e8c712c63a", "DetectTime": "2023-10-30T14:04:56.394027+02:00", "EventTime": "2023-10-30T14:04:56.394043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.47.68.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.47.68.47 ", "ContentType": "text/plain"}], "uids": ["CM4TLK3UeSeaz3xAS4"]} -{"Format": "IDEA0", "ID": "0fae0b10-0d4d-4512-a219-72a684bed606", "DetectTime": "2023-10-30T14:04:56.425891+02:00", "EventTime": "2023-10-30T14:04:56.425909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.167.175.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.167.175.79 ", "ContentType": "text/plain"}], "uids": ["CY6MFW2tpoETcveog5"]} -{"Format": "IDEA0", "ID": "157166bc-5714-4594-8f3f-1469ec25cddd", "DetectTime": "2023-10-30T14:04:56.456884+02:00", "EventTime": "2023-10-30T14:04:56.456900+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cc9YOK3xrAWmDBFWg1"]} -{"Format": "IDEA0", "ID": "15d67bcf-a9a6-4619-9b9d-7eaeeda04720", "DetectTime": "2023-10-30T14:04:56.467256+02:00", "EventTime": "2023-10-30T14:04:56.467275+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CR0SdL2MhdOqpNWNk8"]} -{"Format": "IDEA0", "ID": "8da19d0e-426a-48e6-9ca8-f250c2a7c6ed", "DetectTime": "2023-10-30T14:04:56.475905+02:00", "EventTime": "2023-10-30T14:04:56.475925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.247.158.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.247.158.109 ", "ContentType": "text/plain"}], "uids": ["CLzYd22fAnWTp08xKc"]} -{"Format": "IDEA0", "ID": "0e6dfe57-a733-4d7b-a3a3-011bb76bffb2", "DetectTime": "2023-10-30T14:04:56.505979+02:00", "EventTime": "2023-10-30T14:04:56.505992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.44.21.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.44.21.6 ", "ContentType": "text/plain"}], "uids": ["CcJ2cBwz6I9ReHpBb"]} -{"Format": "IDEA0", "ID": "c25f4e0d-3699-49b7-9034-64dd91240e30", "DetectTime": "2023-10-30T14:04:56.535973+02:00", "EventTime": "2023-10-30T14:04:56.535994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.144.53.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.144.53.62 ", "ContentType": "text/plain"}], "uids": ["CBalEe3XoNQFp5qEi9"]} -{"Format": "IDEA0", "ID": "c3425853-3bba-49af-a485-337b78b28cb0", "DetectTime": "2023-10-30T14:04:56.565147+02:00", "EventTime": "2023-10-30T14:04:56.565158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.153.229.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.153.229.168 ", "ContentType": "text/plain"}], "uids": ["CnJNr72lyw263giJHj"]} -{"Format": "IDEA0", "ID": "b0bdbbcb-9433-4015-bb14-2056d3da5fad", "DetectTime": "2023-10-30T14:04:56.593518+02:00", "EventTime": "2023-10-30T14:04:56.593534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.98.108.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.98.108.145 ", "ContentType": "text/plain"}], "uids": ["CkO2fYrWffzmBICCc"]} -{"Format": "IDEA0", "ID": "35db0ce5-426a-45a1-a9ba-166e9f975aaf", "DetectTime": "2023-10-30T14:04:56.623661+02:00", "EventTime": "2023-10-30T14:04:56.623682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.19.112.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.19.112.167 ", "ContentType": "text/plain"}], "uids": ["CknCYt1rwOJbLpIeg8"]} -{"Format": "IDEA0", "ID": "e72a6f63-0e1a-4895-a33c-c306394f2050", "DetectTime": "2023-10-30T14:04:56.653831+02:00", "EventTime": "2023-10-30T14:04:56.653844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CpRrIq7Hb45TTwZEj"]} -{"Format": "IDEA0", "ID": "fa5ea4c9-731b-42ae-82a1-c4c65bc845f5", "DetectTime": "2023-10-30T14:04:56.679476+02:00", "EventTime": "2023-10-30T14:04:56.679489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.43.242.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.43.242.41 ", "ContentType": "text/plain"}], "uids": ["CYmVqS2ceugDy1oz98"]} -{"Format": "IDEA0", "ID": "c4540bdb-09da-47a8-aef0-f8979f1030f6", "DetectTime": "2023-10-30T14:04:56.709541+02:00", "EventTime": "2023-10-30T14:04:56.709552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.7.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.7.51 ", "ContentType": "text/plain"}], "uids": ["CmlTPM20WXyJGW8Ab1"]} -{"Format": "IDEA0", "ID": "a70a85ec-dc28-4f74-ab63-12337f3419c1", "DetectTime": "2023-10-30T14:04:56.736820+02:00", "EventTime": "2023-10-30T14:04:56.736840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["Cd0rhsprlMiUQU6Cb"]} -{"Format": "IDEA0", "ID": "fcbe894b-0ca3-4b24-8b63-42471074de4e", "DetectTime": "2023-10-30T14:04:56.766656+02:00", "EventTime": "2023-10-30T14:04:56.766677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.64.171.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.64.171.254 ", "ContentType": "text/plain"}], "uids": ["CxUQt8RYw0o5IWey3"]} -{"Format": "IDEA0", "ID": "5d117da0-dbc1-4f9d-8786-0bf4cff84ade", "DetectTime": "2023-10-30T14:04:56.793151+02:00", "EventTime": "2023-10-30T14:04:56.793168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.175.211.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.175.211.52 ", "ContentType": "text/plain"}], "uids": ["CPj3Pi3MDTAfZjAng"]} -{"Format": "IDEA0", "ID": "dc7cc138-31dc-4203-9267-a436aefc6364", "DetectTime": "2023-10-30T14:04:56.821397+02:00", "EventTime": "2023-10-30T14:04:56.821415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["C4A7GPGVVPrUIvJEa"]} -{"Format": "IDEA0", "ID": "094420a6-2841-4541-a629-d761e556a978", "DetectTime": "2023-10-30T14:04:56.850338+02:00", "EventTime": "2023-10-30T14:04:56.850359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.54.86.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.54.86.114 ", "ContentType": "text/plain"}], "uids": ["CQjdPv3RFlyCUPqCq7"]} -{"Format": "IDEA0", "ID": "dd085799-5439-4307-b0cf-99548511c38d", "DetectTime": "2023-10-30T14:04:56.879371+02:00", "EventTime": "2023-10-30T14:04:56.879395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["Ce4GbZssqvmqvog5d"]} -{"Format": "IDEA0", "ID": "8a8cafac-608a-49ba-aace-71ca7371986d", "DetectTime": "2023-10-30T14:04:56.910549+02:00", "EventTime": "2023-10-30T14:04:56.910567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.189.32.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.189.32.164 ", "ContentType": "text/plain"}], "uids": ["CBvAOD4s2IcWxw4xKf"]} -{"Format": "IDEA0", "ID": "48b23a65-050f-4e45-9670-762cf783a814", "DetectTime": "2023-10-30T14:04:56.939241+02:00", "EventTime": "2023-10-30T14:04:56.939252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CKLcyC3ITLw8aKNNo8"]} -{"Format": "IDEA0", "ID": "d58584da-d193-4be8-ad4f-7cf666aedd03", "DetectTime": "2023-10-30T14:04:56.966820+02:00", "EventTime": "2023-10-30T14:04:56.966844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.179.199.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.179.199.81 ", "ContentType": "text/plain"}], "uids": ["CaOpDF2lzS3DN2fo5g"]} -{"Format": "IDEA0", "ID": "faaef6cc-3e4a-45b2-b7be-3cd9c0255079", "DetectTime": "2023-10-30T14:04:56.998081+02:00", "EventTime": "2023-10-30T14:04:56.998101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CZ0OWX1c0UqPojVJL3", "CJ3ebd4WTjHhhHAg13", "CkNK964TH6PQLCFGA7", "Cc9YOK3xrAWmDBFWg1"]} -{"Format": "IDEA0", "ID": "f24cb612-aa79-4a10-99cd-692095a77726", "DetectTime": "2023-10-30T14:04:57.008999+02:00", "EventTime": "2023-10-30T14:04:57.009022+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJ3ebd4WTjHhhHAg13"]} -{"Format": "IDEA0", "ID": "028f404e-c727-4303-a523-54eb3abe3770", "DetectTime": "2023-10-30T14:04:57.019083+02:00", "EventTime": "2023-10-30T14:04:57.019102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CbHNb01fLxbRXQ9LRj"]} -{"Format": "IDEA0", "ID": "65d1d31d-d20c-4f1e-8e43-b7c93e6904bf", "DetectTime": "2023-10-30T14:04:57.049495+02:00", "EventTime": "2023-10-30T14:04:57.049512+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxKBT41WtpHBqxYtW3"]} -{"Format": "IDEA0", "ID": "df3c5e79-465f-4fff-b171-a6e5498dfc96", "DetectTime": "2023-10-30T14:04:57.057626+02:00", "EventTime": "2023-10-30T14:04:57.057649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.80.148.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.80.148.122 ", "ContentType": "text/plain"}], "uids": ["CvkkOUFGFjPg4LyHa"]} -{"Format": "IDEA0", "ID": "25581480-3e81-46f4-b216-db0a9269407e", "DetectTime": "2023-10-30T14:04:57.087391+02:00", "EventTime": "2023-10-30T14:04:57.087408+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CleRoi4Sqv7PuuyKx3"]} -{"Format": "IDEA0", "ID": "3bf52b77-c65c-42a8-b86d-6d516f521aaa", "DetectTime": "2023-10-30T14:04:57.095965+02:00", "EventTime": "2023-10-30T14:04:57.095982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.133.120.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.133.120.233 ", "ContentType": "text/plain"}], "uids": ["Cisgaf4yc8y32EBYY2"]} -{"Format": "IDEA0", "ID": "52d960b6-6c06-4679-bf94-170c3655800c", "DetectTime": "2023-10-30T14:04:57.127943+02:00", "EventTime": "2023-10-30T14:04:57.127967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.228.163.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.228.163.130 ", "ContentType": "text/plain"}], "uids": ["C9KqGqOZS3rJ3gLl7"]} -{"Format": "IDEA0", "ID": "4e451e1b-6055-480d-8319-7511a2e6a397", "DetectTime": "2023-10-30T14:04:57.155519+02:00", "EventTime": "2023-10-30T14:04:57.155537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["208.64.183.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 208.64.183.187 ", "ContentType": "text/plain"}], "uids": ["CfVkHY3XA45aXMEpoi"]} -{"Format": "IDEA0", "ID": "5eecd7e1-9fca-43a9-b831-b05859b23805", "DetectTime": "2023-10-30T14:04:57.181930+02:00", "EventTime": "2023-10-30T14:04:57.181942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.107.16.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.107.16.215 ", "ContentType": "text/plain"}], "uids": ["CIvH9K3a8qqyKMb7ul"]} -{"Format": "IDEA0", "ID": "e1b0dffe-304c-4ddf-b46e-0fad608c762f", "DetectTime": "2023-10-30T14:04:57.216116+02:00", "EventTime": "2023-10-30T14:04:57.216132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.9.162.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.9.162.183 ", "ContentType": "text/plain"}], "uids": ["CaxSiF29ZS1H4r1Tyk"]} -{"Format": "IDEA0", "ID": "325b9911-67df-4ac6-8ef6-521f6a2f2cdd", "DetectTime": "2023-10-30T14:04:57.244150+02:00", "EventTime": "2023-10-30T14:04:57.244165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.100.90.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.100.90.72 ", "ContentType": "text/plain"}], "uids": ["CYkv3k3UpFbtGzZGpj"]} -{"Format": "IDEA0", "ID": "1bae9fd4-d7a8-4ec4-958d-37dfa522e4a6", "DetectTime": "2023-10-30T14:04:57.271994+02:00", "EventTime": "2023-10-30T14:04:57.272009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.230.228.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.230.228.174 ", "ContentType": "text/plain"}], "uids": ["CyFQHB1OwU4VhCornb"]} -{"Format": "IDEA0", "ID": "6d522475-e8fc-473a-bd97-a197d0fe37c3", "DetectTime": "2023-10-30T14:04:57.297728+02:00", "EventTime": "2023-10-30T14:04:57.297739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.185.247.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.185.247.82 ", "ContentType": "text/plain"}], "uids": ["C3YvtC1zoOEwbSkyA4"]} -{"Format": "IDEA0", "ID": "4ff92faa-7c50-4609-90e3-af9921b0eb7f", "DetectTime": "2023-10-30T14:04:57.327660+02:00", "EventTime": "2023-10-30T14:04:57.327680+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C3pORG3Mnj5ST0PTM3"]} -{"Format": "IDEA0", "ID": "cbd69c26-c71b-4b68-8be3-028e7d5d7a8e", "DetectTime": "2023-10-30T14:04:57.336910+02:00", "EventTime": "2023-10-30T14:04:57.336926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.48.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.48.40 ", "ContentType": "text/plain"}], "uids": ["CRQqFx1lZBT2YQ49be"]} -{"Format": "IDEA0", "ID": "630f4186-27a3-46de-8f88-d8cd0f5f823f", "DetectTime": "2023-10-30T14:04:57.364172+02:00", "EventTime": "2023-10-30T14:04:57.364189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["CSAS4y1crJ16xegc4i"]} -{"Format": "IDEA0", "ID": "30bd3d3d-23e4-4958-83f0-ff086c64070b", "DetectTime": "2023-10-30T14:04:57.390503+02:00", "EventTime": "2023-10-30T14:04:57.390520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.178.102.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.178.102.100 ", "ContentType": "text/plain"}], "uids": ["C0tJ0k363zH4Y99jy4"]} -{"Format": "IDEA0", "ID": "aaaec520-760f-44e1-9641-91d306a99803", "DetectTime": "2023-10-30T14:04:57.419393+02:00", "EventTime": "2023-10-30T14:04:57.419414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.47.55.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.47.55.122 ", "ContentType": "text/plain"}], "uids": ["CR6qkJ3yVFL99KrXrd"]} -{"Format": "IDEA0", "ID": "b5d18318-58fd-482f-bc51-49df7384d884", "DetectTime": "2023-10-30T14:04:57.450356+02:00", "EventTime": "2023-10-30T14:04:57.450367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.172.252.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.172.252.79 ", "ContentType": "text/plain"}], "uids": ["CZGNhA3HD9S4u9ocE7"]} -{"Format": "IDEA0", "ID": "1c7f5121-0214-4d85-89aa-524f4bbeda83", "DetectTime": "2023-10-30T14:04:57.473844+02:00", "EventTime": "2023-10-30T14:04:57.473859+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAuDZ51BVTnmLocDPc"]} -{"Format": "IDEA0", "ID": "2781fcb6-793b-40d7-894a-182e63338a5a", "DetectTime": "2023-10-30T14:04:57.482282+02:00", "EventTime": "2023-10-30T14:04:57.482304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.163.69.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.163.69.33 ", "ContentType": "text/plain"}], "uids": ["CUQ05i1wfVzrH05ayk"]} -{"Format": "IDEA0", "ID": "0b358764-1497-4677-869c-622e72b980af", "DetectTime": "2023-10-30T14:04:57.512393+02:00", "EventTime": "2023-10-30T14:04:57.512415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.53.58.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.53.58.144 ", "ContentType": "text/plain"}], "uids": ["Chk6Bk3JXsNb5caNDf"]} -{"Format": "IDEA0", "ID": "a2049d5d-135d-4af0-8bc5-43030f7028bd", "DetectTime": "2023-10-30T14:04:57.539395+02:00", "EventTime": "2023-10-30T14:04:57.539408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.40.168.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.40.168.78 ", "ContentType": "text/plain"}], "uids": ["CtBURC1WpxskbaaRd9"]} -{"Format": "IDEA0", "ID": "5049e071-c4fe-40f8-bb41-213209d6d94b", "DetectTime": "2023-10-30T14:04:57.566918+02:00", "EventTime": "2023-10-30T14:04:57.566935+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSeE5W1fbjEMJFnCVj"]} -{"Format": "IDEA0", "ID": "bad0e2cc-894f-4a95-9c4d-21b6a656a9c5", "DetectTime": "2023-10-30T14:04:57.574112+02:00", "EventTime": "2023-10-30T14:04:57.574127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.172.120.192"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.172.120.192 ", "ContentType": "text/plain"}], "uids": ["CSf3FFWeqDW8ejd4g"]} -{"Format": "IDEA0", "ID": "3e3291ad-48c9-4233-b1b9-f68ac5eaa7b0", "DetectTime": "2023-10-30T14:04:57.603259+02:00", "EventTime": "2023-10-30T14:04:57.603286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["CBMA8z2bndIOlOLXPh"]} -{"Format": "IDEA0", "ID": "29b147f4-5936-448e-947d-cfbbc6931d62", "DetectTime": "2023-10-30T14:04:57.637903+02:00", "EventTime": "2023-10-30T14:04:57.637921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CqU6Lg2S17MVMNylL9"]} -{"Format": "IDEA0", "ID": "1a10539a-1358-498b-9c39-6d2c2875909d", "DetectTime": "2023-10-30T14:04:57.675134+02:00", "EventTime": "2023-10-30T14:04:57.675152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C3JPLG1V5LcDeKohL6"]} -{"Format": "IDEA0", "ID": "805a75ad-9283-4500-9716-fb94caa44f74", "DetectTime": "2023-10-30T14:04:57.705204+02:00", "EventTime": "2023-10-30T14:04:57.705227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.4.124.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.4.124.235 ", "ContentType": "text/plain"}], "uids": ["ClZsXB1qaauAh8USIl"]} -{"Format": "IDEA0", "ID": "aeac8bd1-acad-4c4b-a208-bc839ec41f99", "DetectTime": "2023-10-30T14:04:57.729850+02:00", "EventTime": "2023-10-30T14:04:57.729867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["C0L7gy23xW4L0RBMQh"]} -{"Format": "IDEA0", "ID": "10fc8e9d-2f39-4038-8df3-eec6cc94b275", "DetectTime": "2023-10-30T14:04:57.757324+02:00", "EventTime": "2023-10-30T14:04:57.757422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.46.79 ", "ContentType": "text/plain"}], "uids": ["CJc5sB1LA8cR29u1re"]} -{"Format": "IDEA0", "ID": "ffcbc866-4055-455b-b494-dfd9ed9e4da0", "DetectTime": "2023-10-30T14:04:57.782748+02:00", "EventTime": "2023-10-30T14:04:57.782765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.42.0.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.42.0.154 ", "ContentType": "text/plain"}], "uids": ["C9ukVWq06PCzKkI78"]} -{"Format": "IDEA0", "ID": "c71a3b6f-af4c-4744-b4fc-7284d018135a", "DetectTime": "2023-10-30T14:04:57.813014+02:00", "EventTime": "2023-10-30T14:04:57.813043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.86.122.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.86.122.18 ", "ContentType": "text/plain"}], "uids": ["CXUVz41XejPzvxxw4g"]} -{"Format": "IDEA0", "ID": "c02bc1ea-8b80-4dd8-b8ba-c62411496942", "DetectTime": "2023-10-30T14:04:57.843077+02:00", "EventTime": "2023-10-30T14:04:57.843094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.62.133.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.62.133.135 ", "ContentType": "text/plain"}], "uids": ["C4GrzW1Y7EpgZhChvi"]} -{"Format": "IDEA0", "ID": "c5985879-d7b6-4387-a944-44a9f9f201ab", "DetectTime": "2023-10-30T14:04:57.870774+02:00", "EventTime": "2023-10-30T14:04:57.870806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.56.42.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.56.42.93 ", "ContentType": "text/plain"}], "uids": ["C3btK1s5VpHbqEr7j"]} -{"Format": "IDEA0", "ID": "6ae6db3f-5e2a-4cfa-a76b-5780cf19c265", "DetectTime": "2023-10-30T14:04:57.898919+02:00", "EventTime": "2023-10-30T14:04:57.898942+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CXy1iY3AUdTXV6cjig"]} -{"Format": "IDEA0", "ID": "95a50fee-72b8-445a-9ede-3b2356f29034", "DetectTime": "2023-10-30T14:04:57.906172+02:00", "EventTime": "2023-10-30T14:04:57.906188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.233.14.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.233.14.95 ", "ContentType": "text/plain"}], "uids": ["CFE88x1fF3SrguB8Uf"]} -{"Format": "IDEA0", "ID": "4e88844c-962a-44b9-b22c-8bb7d14b7c7b", "DetectTime": "2023-10-30T14:04:57.937892+02:00", "EventTime": "2023-10-30T14:04:57.937911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.155.76.16 ", "ContentType": "text/plain"}], "uids": ["CpWJw99AIJ24AtaQj"]} -{"Format": "IDEA0", "ID": "9452650d-dc6e-4bd0-8713-f703403dcba1", "DetectTime": "2023-10-30T14:04:57.965369+02:00", "EventTime": "2023-10-30T14:04:57.965380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.133.70.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.133.70.14 ", "ContentType": "text/plain"}], "uids": ["C1w44l1bHy3YJlN5kl"]} -{"Format": "IDEA0", "ID": "e59e0caa-57ea-4156-a0b8-5058b73badeb", "DetectTime": "2023-10-30T14:04:57.990356+02:00", "EventTime": "2023-10-30T14:04:57.990372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.62.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.232.62.111 ", "ContentType": "text/plain"}], "uids": ["CnSnAD4T02ZE1l7APk"]} -{"Format": "IDEA0", "ID": "3c356aa0-dd91-4ea9-9da3-0286f18a4ffd", "DetectTime": "2023-10-30T14:04:58.016645+02:00", "EventTime": "2023-10-30T14:04:58.016658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.78.128.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.78.128.99 ", "ContentType": "text/plain"}], "uids": ["ClCOIJ3lik04kfmjl9"]} -{"Format": "IDEA0", "ID": "9606bc15-aa86-41a7-9ccb-18656df88fb0", "DetectTime": "2023-10-30T14:04:58.043172+02:00", "EventTime": "2023-10-30T14:04:58.043193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.185.58.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.185.58.240 ", "ContentType": "text/plain"}], "uids": ["CtfpcZ3HTkpPhulbKe"]} -{"Format": "IDEA0", "ID": "75063e41-bb3d-4864-b62d-307014aa649c", "DetectTime": "2023-10-30T14:04:58.068048+02:00", "EventTime": "2023-10-30T14:04:58.068069+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CKeWR52K90Vrzflc7f"]} -{"Format": "IDEA0", "ID": "0b9c4355-7612-4fc1-b89a-0dd7e94b8659", "DetectTime": "2023-10-30T14:04:58.075840+02:00", "EventTime": "2023-10-30T14:04:58.075859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.48.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.48.189 ", "ContentType": "text/plain"}], "uids": ["Cw5uZw2Bi32RwErSak"]} -{"Format": "IDEA0", "ID": "0537df16-988f-4179-a99a-c958d29d7c60", "DetectTime": "2023-10-30T14:04:58.102665+02:00", "EventTime": "2023-10-30T14:04:58.102677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CqQJ3z3jA0LcwfhfR1"]} -{"Format": "IDEA0", "ID": "20f95a77-0a84-40e0-b65f-d643b1a139bc", "DetectTime": "2023-10-30T14:04:58.129004+02:00", "EventTime": "2023-10-30T14:04:58.129284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.3.235.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.3.235.218 ", "ContentType": "text/plain"}], "uids": ["CepurD3y6vcwdgvkmg"]} -{"Format": "IDEA0", "ID": "3b3bcec7-0a64-4ab7-bdeb-1b4077a750cf", "DetectTime": "2023-10-30T14:04:58.159007+02:00", "EventTime": "2023-10-30T14:04:58.159023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.68.195 ", "ContentType": "text/plain"}], "uids": ["CDmgRk254zC5ecOsof"]} -{"Format": "IDEA0", "ID": "7ee7faad-9243-42f9-9408-a8fe779d631c", "DetectTime": "2023-10-30T14:04:58.188408+02:00", "EventTime": "2023-10-30T14:04:58.188428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.6.85.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.6.85.206 ", "ContentType": "text/plain"}], "uids": ["C18Rd12yWD3VWGDBW5"]} -{"Format": "IDEA0", "ID": "4ff52ccf-ee06-4dd0-98fb-26467365b77d", "DetectTime": "2023-10-30T14:04:58.218933+02:00", "EventTime": "2023-10-30T14:04:58.218954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.207.233.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.207.233.145 ", "ContentType": "text/plain"}], "uids": ["CerKtn3Z7XZ5Kmz2lf"]} -{"Format": "IDEA0", "ID": "b1a23ba9-a968-453d-bbda-776a064cf74f", "DetectTime": "2023-10-30T14:04:58.248706+02:00", "EventTime": "2023-10-30T14:04:58.248722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.215.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.215.237 ", "ContentType": "text/plain"}], "uids": ["Ca2Iho2yYvu12rkscj"]} -{"Format": "IDEA0", "ID": "317a9cf7-d7f6-440f-88d4-5867557b27de", "DetectTime": "2023-10-30T14:04:58.278196+02:00", "EventTime": "2023-10-30T14:04:58.278212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.9.249.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.9.249.18 ", "ContentType": "text/plain"}], "uids": ["CdvyFLNJjFFlvn4k"]} -{"Format": "IDEA0", "ID": "ba24b9f6-b76c-4be6-bdcd-8a8cb88fb3e2", "DetectTime": "2023-10-30T14:04:58.305655+02:00", "EventTime": "2023-10-30T14:04:58.305671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.200.221.34 ", "ContentType": "text/plain"}], "uids": ["CzTAIY3ovhVnvcz4rb"]} -{"Format": "IDEA0", "ID": "5a9fdaaa-a6e8-423a-8790-24996f19b371", "DetectTime": "2023-10-30T14:04:58.330461+02:00", "EventTime": "2023-10-30T14:04:58.330474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CB9nO74SVaL5qO9Vx3"]} -{"Format": "IDEA0", "ID": "60eb3fb5-dd59-4183-bc7b-ce6d580fc740", "DetectTime": "2023-10-30T14:04:58.352943+02:00", "EventTime": "2023-10-30T14:04:58.352968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.182.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.182.91 ", "ContentType": "text/plain"}], "uids": ["CZP2Do1QVgtmHxnvh"]} -{"Format": "IDEA0", "ID": "57a2e940-a989-4d50-84af-ca6cb009ee6a", "DetectTime": "2023-10-30T14:04:58.378356+02:00", "EventTime": "2023-10-30T14:04:58.378374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.50.158.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.50.158.112 ", "ContentType": "text/plain"}], "uids": ["C4rgQKaMuNi2v57T4"]} -{"Format": "IDEA0", "ID": "0506f255-0fba-4f59-a948-3ca95758178b", "DetectTime": "2023-10-30T14:04:58.404157+02:00", "EventTime": "2023-10-30T14:04:58.404169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.57.22.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.57.22.60 ", "ContentType": "text/plain"}], "uids": ["CU7Y3mHsUXY3ZAjJc"]} -{"Format": "IDEA0", "ID": "159b988c-2071-426e-b8ee-f547f4a7592f", "DetectTime": "2023-10-30T14:04:58.436365+02:00", "EventTime": "2023-10-30T14:04:58.436383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.110.78.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.110.78.222 ", "ContentType": "text/plain"}], "uids": ["CAX29IkrTERmTnBuc"]} -{"Format": "IDEA0", "ID": "d15be494-1480-44b5-af68-a279c9ea7b54", "DetectTime": "2023-10-30T14:04:58.463418+02:00", "EventTime": "2023-10-30T14:04:58.463440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.218.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.218.73 ", "ContentType": "text/plain"}], "uids": ["CT4MBQ2lK6396Z4jX3"]} -{"Format": "IDEA0", "ID": "3547d93b-7281-4e25-b968-f39dabead4c1", "DetectTime": "2023-10-30T14:04:58.491253+02:00", "EventTime": "2023-10-30T14:04:58.491269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.58.27.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.58.27.130 ", "ContentType": "text/plain"}], "uids": ["Cr7XDn2DMMbk0uEs67"]} -{"Format": "IDEA0", "ID": "7233d3a5-5ee4-4556-8050-b5af29d67960", "DetectTime": "2023-10-30T14:04:58.518821+02:00", "EventTime": "2023-10-30T14:04:58.518841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.50.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.50.100 ", "ContentType": "text/plain"}], "uids": ["CeiKIv2Hs8Z2lLlq0l"]} -{"Format": "IDEA0", "ID": "6668a4e8-425c-4595-8d29-3869c0004adb", "DetectTime": "2023-10-30T14:04:58.544400+02:00", "EventTime": "2023-10-30T14:04:58.544419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.251.117.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.251.117.45 ", "ContentType": "text/plain"}], "uids": ["CrYwPd214Kn2Peruje"]} -{"Format": "IDEA0", "ID": "864124cd-7a98-4e87-b2e6-e9e61d0d0f23", "DetectTime": "2023-10-30T14:04:58.655366+02:00", "EventTime": "2023-10-30T14:04:58.655385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.111.237.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.111.237.3 ", "ContentType": "text/plain"}], "uids": ["Cvkw5y3f22mv389fx8"]} -{"Format": "IDEA0", "ID": "29855cda-5e28-4207-a4be-55df07fd2883", "DetectTime": "2023-10-30T14:04:58.691176+02:00", "EventTime": "2023-10-30T14:04:58.691194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.53.58.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.53.58.144 ", "ContentType": "text/plain"}], "uids": ["CvJDf228vYohooP4Td"]} -{"Format": "IDEA0", "ID": "2ac28445-4fec-43d3-b4a6-67964b328727", "DetectTime": "2023-10-30T14:04:58.716230+02:00", "EventTime": "2023-10-30T14:04:58.716247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CdxmC83H1dECZfpbp3"]} -{"Format": "IDEA0", "ID": "13e410c8-4a6a-4777-9363-236fa07aff82", "DetectTime": "2023-10-30T14:04:58.745958+02:00", "EventTime": "2023-10-30T14:04:58.745979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.172.168.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.172.168.141 ", "ContentType": "text/plain"}], "uids": ["CZlnKb1EmHZMMFRHh1"]} -{"Format": "IDEA0", "ID": "82ddfb7a-a4bf-43fc-90a0-391d165f0ec5", "DetectTime": "2023-10-30T14:04:58.775215+02:00", "EventTime": "2023-10-30T14:04:58.775243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CNKg0E14YiYoYCVKp"]} -{"Format": "IDEA0", "ID": "33a3f606-a45f-48da-9081-073eaf8c0fd9", "DetectTime": "2023-10-30T14:04:58.814497+02:00", "EventTime": "2023-10-30T14:04:58.814513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.155.76.16 ", "ContentType": "text/plain"}], "uids": ["CLkW3y4dOj7PSSyLL"]} -{"Format": "IDEA0", "ID": "40389bb9-38f9-4622-b828-72587b3a22fc", "DetectTime": "2023-10-30T14:04:58.833227+02:00", "EventTime": "2023-10-30T14:04:58.833243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CRDKMp1t6VPIeMdE2l"]} -{"Format": "IDEA0", "ID": "43609563-7d6b-4ce4-8bd7-d7b11a33f0e4", "DetectTime": "2023-10-30T14:04:58.861938+02:00", "EventTime": "2023-10-30T14:04:58.861960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CAUsuA4fdRVAbrHiv4"]} -{"Format": "IDEA0", "ID": "b6a93da6-25d2-4b96-8c74-a8b19d351f53", "DetectTime": "2023-10-30T14:04:58.895618+02:00", "EventTime": "2023-10-30T14:04:58.895640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["Cma5OPMALNZ1Pek8f"]} -{"Format": "IDEA0", "ID": "26a26992-60f6-44fc-8410-e1715d3605e7", "DetectTime": "2023-10-30T14:04:58.919321+02:00", "EventTime": "2023-10-30T14:04:58.919343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.152.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.152.116 ", "ContentType": "text/plain"}], "uids": ["CbibKr48mg6D5PGw6"]} -{"Format": "IDEA0", "ID": "60653eaa-40cc-460e-9002-76db81384826", "DetectTime": "2023-10-30T14:04:58.965045+02:00", "EventTime": "2023-10-30T14:04:58.965067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CcoNxv1AE1yGThl0tc"]} -{"Format": "IDEA0", "ID": "1cf16896-28d6-4ea5-86ae-a0f6b8d17341", "DetectTime": "2023-10-30T14:04:59.004642+02:00", "EventTime": "2023-10-30T14:04:59.004659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.47.55.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.47.55.122 ", "ContentType": "text/plain"}], "uids": ["CibQv14OHS4kFw3sib"]} -{"Format": "IDEA0", "ID": "44289fef-540e-4a71-9863-7d5aabe66d58", "DetectTime": "2023-10-30T14:04:59.028159+02:00", "EventTime": "2023-10-30T14:04:59.028179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["C29eBsTNpWYw6pUwi"]} -{"Format": "IDEA0", "ID": "50a43b06-002a-45de-b31b-c4caba022b06", "DetectTime": "2023-10-30T14:04:59.053061+02:00", "EventTime": "2023-10-30T14:04:59.053081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["C6LJFI1W2vSCzWBk56"]} -{"Format": "IDEA0", "ID": "497c1bde-c663-42e0-a26e-b62f712757d4", "DetectTime": "2023-10-30T14:04:59.073769+02:00", "EventTime": "2023-10-30T14:04:59.073800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CZdaoLvDWgZ6BDyx"]} -{"Format": "IDEA0", "ID": "8cff9e39-0559-4ddc-8034-5aa36efd014a", "DetectTime": "2023-10-30T14:04:59.098679+02:00", "EventTime": "2023-10-30T14:04:59.098699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CXy1iY3AUdTXV6cjig", "CleRoi4Sqv7PuuyKx3", "CAuDZ51BVTnmLocDPc", "CFNFR63LErr9QaNmA"]} -{"Format": "IDEA0", "ID": "20ad77d7-169e-457c-a23e-ed172d1af040", "DetectTime": "2023-10-30T14:04:59.108989+02:00", "EventTime": "2023-10-30T14:04:59.109005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CnSwee1yq82VebE41e"]} -{"Format": "IDEA0", "ID": "0d00b2c4-2430-4ec8-9d98-7448e9bd94c3", "DetectTime": "2023-10-30T14:04:59.133040+02:00", "EventTime": "2023-10-30T14:04:59.133061+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CFNFR63LErr9QaNmA"]} -{"Format": "IDEA0", "ID": "0aed24a4-8871-4ed5-80cf-97c3c89b4b08", "DetectTime": "2023-10-30T14:04:59.143165+02:00", "EventTime": "2023-10-30T14:04:59.143181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CTE1ca4JgXEUhHKtu"]} -{"Format": "IDEA0", "ID": "b6539d49-b9cc-4be6-87b0-7059d258bf89", "DetectTime": "2023-10-30T14:04:59.161558+02:00", "EventTime": "2023-10-30T14:04:59.161576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cyh6PD1dbprpfGTizj"]} -{"Format": "IDEA0", "ID": "f9615e41-548e-4525-bc85-6bd7b77cbf1b", "DetectTime": "2023-10-30T14:04:59.183657+02:00", "EventTime": "2023-10-30T14:04:59.183673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNcL2O2tKyrmvXITv6"]} -{"Format": "IDEA0", "ID": "6acda433-b2fd-470b-80d6-45af46b79536", "DetectTime": "2023-10-30T14:04:59.205319+02:00", "EventTime": "2023-10-30T14:04:59.205336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["CdbfJysxq3n2GE4X1"]} -{"Format": "IDEA0", "ID": "fd38e34e-9428-49c7-a939-61b981f39b08", "DetectTime": "2023-10-30T14:04:59.227553+02:00", "EventTime": "2023-10-30T14:04:59.227570+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CzSQuC1mJ3vxRW85Tf"]} -{"Format": "IDEA0", "ID": "a5f2ce73-36ec-43b9-b97b-388c4f92c269", "DetectTime": "2023-10-30T14:04:59.238230+02:00", "EventTime": "2023-10-30T14:04:59.238248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.166.184.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.166.184.128 ", "ContentType": "text/plain"}], "uids": ["CU5SQQ29QYKo2vd8Ad"]} -{"Format": "IDEA0", "ID": "1c1c2f6e-c75c-43d1-ab4b-28a720fc450c", "DetectTime": "2023-10-30T14:04:59.268720+02:00", "EventTime": "2023-10-30T14:04:59.268743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.21.97.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.21.97.133 ", "ContentType": "text/plain"}], "uids": ["CWMv4E14m0YUlS2cw"]} -{"Format": "IDEA0", "ID": "2b41fe93-3ed1-4484-9441-7849dff29d04", "DetectTime": "2023-10-30T14:04:59.301575+02:00", "EventTime": "2023-10-30T14:04:59.301595+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEszdu3StOTI5SN6sl"]} -{"Format": "IDEA0", "ID": "4f0c07e5-2eed-4a76-a8f7-d2575a126956", "DetectTime": "2023-10-30T14:04:59.312705+02:00", "EventTime": "2023-10-30T14:04:59.312725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CHbbaq4BMyvsjw25Uh"]} -{"Format": "IDEA0", "ID": "7c888d86-8cb0-4bfe-b04d-36bd54ceb442", "DetectTime": "2023-10-30T14:04:59.350033+02:00", "EventTime": "2023-10-30T14:04:59.350052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CX8OYu3NFMczXNVRO8"]} -{"Format": "IDEA0", "ID": "7e4c6df2-f1c0-4759-abed-2b615ddfad04", "DetectTime": "2023-10-30T14:04:59.388019+02:00", "EventTime": "2023-10-30T14:04:59.388037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cs7xFr35gpdzEbQBy6"]} -{"Format": "IDEA0", "ID": "161d80b4-87d4-440f-a257-24e84a57ac07", "DetectTime": "2023-10-30T14:04:59.409319+02:00", "EventTime": "2023-10-30T14:04:59.409335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["CaIwQP2E5JqwZf9Jek"]} -{"Format": "IDEA0", "ID": "9b349094-07ae-44ab-8201-9e67f3e2ab81", "DetectTime": "2023-10-30T14:04:59.426727+02:00", "EventTime": "2023-10-30T14:04:59.426741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CRUrFM1PILsDiimkl5"]} -{"Format": "IDEA0", "ID": "5c094d38-f110-4615-8879-95ce2f22fdd9", "DetectTime": "2023-10-30T14:04:59.456681+02:00", "EventTime": "2023-10-30T14:04:59.456699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["CNaha23UQwCY6G8s6g"]} -{"Format": "IDEA0", "ID": "8872a641-1d80-4d19-8ea7-30ecb51077ab", "DetectTime": "2023-10-30T14:04:59.487458+02:00", "EventTime": "2023-10-30T14:04:59.487475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CC8GJ02ZGX32salIg7"]} -{"Format": "IDEA0", "ID": "0af19c53-bfb2-4953-b366-49dc6d5ccfe2", "DetectTime": "2023-10-30T14:04:59.506578+02:00", "EventTime": "2023-10-30T14:04:59.506594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.182.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.182.91 ", "ContentType": "text/plain"}], "uids": ["CMMlep27jquNcAlTpd"]} -{"Format": "IDEA0", "ID": "b95b7425-afc3-437f-806d-236bd34da5c3", "DetectTime": "2023-10-30T14:04:59.531669+02:00", "EventTime": "2023-10-30T14:04:59.531692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CJ6eMV1yUswKGc8WOc"]} -{"Format": "IDEA0", "ID": "e357e285-ff9d-4d27-962e-1bbfa05959ec", "DetectTime": "2023-10-30T14:04:59.558347+02:00", "EventTime": "2023-10-30T14:04:59.558364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CJqqU81kgbExhQYZE6"]} -{"Format": "IDEA0", "ID": "8d9b1e77-f0e3-4d4a-a68c-f9acba21cdd4", "DetectTime": "2023-10-30T14:04:59.576172+02:00", "EventTime": "2023-10-30T14:04:59.576183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C7evZr1kXm9UM0pMVj"]} -{"Format": "IDEA0", "ID": "751fab53-b6cc-4da2-9ff9-5c00509f8def", "DetectTime": "2023-10-30T14:04:59.593212+02:00", "EventTime": "2023-10-30T14:04:59.593225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHQuCc3sBQrpFxS16d"]} -{"Format": "IDEA0", "ID": "f573461f-8d61-4d86-9662-1859937fd7f7", "DetectTime": "2023-10-30T14:04:59.612994+02:00", "EventTime": "2023-10-30T14:04:59.613014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNljE13JYmH46NCuqk"]} -{"Format": "IDEA0", "ID": "73f83b6c-93f2-4dfd-80ba-c195ed400660", "DetectTime": "2023-10-30T14:04:59.632016+02:00", "EventTime": "2023-10-30T14:04:59.632037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CAxW02Pu9MvyWwSgd"]} -{"Format": "IDEA0", "ID": "7e5201f8-e75e-497e-bad0-0a1f0393c953", "DetectTime": "2023-10-30T14:04:59.651642+02:00", "EventTime": "2023-10-30T14:04:59.651663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CRs2CakOQYcXnIFI6"]} -{"Format": "IDEA0", "ID": "354eaf64-2bc3-4b31-9c5d-31eb0c0109f8", "DetectTime": "2023-10-30T14:04:59.678824+02:00", "EventTime": "2023-10-30T14:04:59.678843+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C98skf2SjypLPUTmMg"]} -{"Format": "IDEA0", "ID": "f922c548-f839-4cbd-b7c3-1e7dd5158ef4", "DetectTime": "2023-10-30T14:04:59.689058+02:00", "EventTime": "2023-10-30T14:04:59.689073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CGoeKV244PQGRd0lj"]} -{"Format": "IDEA0", "ID": "37ebc923-e484-404d-914e-02a3cc668999", "DetectTime": "2023-10-30T14:04:59.718324+02:00", "EventTime": "2023-10-30T14:04:59.718341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["C1snZn2w8cIp6fi1q5"]} -{"Format": "IDEA0", "ID": "ad3dfeff-b503-40e9-920a-7a294572b90f", "DetectTime": "2023-10-30T14:04:59.751340+02:00", "EventTime": "2023-10-30T14:04:59.751358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CBxE2N3fFRwxSx8RAa"]} -{"Format": "IDEA0", "ID": "555de32b-4ef8-425b-a676-2ca2765dd356", "DetectTime": "2023-10-30T14:04:59.780651+02:00", "EventTime": "2023-10-30T14:04:59.780668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C6YUSo4kJSskrOufH3"]} -{"Format": "IDEA0", "ID": "ad30cb46-ecab-4140-abbf-b544e13c12f5", "DetectTime": "2023-10-30T14:04:59.811020+02:00", "EventTime": "2023-10-30T14:04:59.811043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C3rFJx21w9lDaUbtog"]} -{"Format": "IDEA0", "ID": "e9be16f4-4e84-4cc1-a243-0f2ee6b54131", "DetectTime": "2023-10-30T14:04:59.830978+02:00", "EventTime": "2023-10-30T14:04:59.831001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CSarC61Wbl4NcjddO4"]} -{"Format": "IDEA0", "ID": "398f87e2-26cd-4f6a-89b1-2ba1d2624f52", "DetectTime": "2023-10-30T14:04:59.852527+02:00", "EventTime": "2023-10-30T14:04:59.852545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJca4Ofs9DhhvtlV3"]} -{"Format": "IDEA0", "ID": "bad41206-8a5a-4085-9915-8b4c94ae0da5", "DetectTime": "2023-10-30T14:04:59.884803+02:00", "EventTime": "2023-10-30T14:04:59.884821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CCd8yZ1AvsVaaPLe77"]} -{"Format": "IDEA0", "ID": "bced9262-41d0-4893-9a4e-7859938db6bc", "DetectTime": "2023-10-30T14:04:59.904981+02:00", "EventTime": "2023-10-30T14:04:59.904993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CLKO513USVMxgjUcyc"]} -{"Format": "IDEA0", "ID": "77ee49db-b57f-4c59-860b-5ed06aa82747", "DetectTime": "2023-10-30T14:04:59.933961+02:00", "EventTime": "2023-10-30T14:04:59.933978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CZem9A4argycHZTUZk"]} -{"Format": "IDEA0", "ID": "47df511b-9803-4937-930a-2c7374804c2d", "DetectTime": "2023-10-30T14:04:59.962656+02:00", "EventTime": "2023-10-30T14:04:59.962670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CWpAcp6AkIjZ4xUA4"]} -{"Format": "IDEA0", "ID": "b7f71f8f-c4cc-4534-9b2e-5707169fe6cd", "DetectTime": "2023-10-30T14:05:00.005021+02:00", "EventTime": "2023-10-30T14:05:00.005039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20050], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. ", "ContentType": "text/plain"}], "uids": ["COl4t73dI0TgtLoA2"]} -{"Format": "IDEA0", "ID": "e0b1bec6-91fc-442d-a93f-2d3603fad1cd", "DetectTime": "2023-10-30T14:05:00.046991+02:00", "EventTime": "2023-10-30T14:05:00.047011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cb5T5s12SU5j8IuHX9"]} -{"Format": "IDEA0", "ID": "3b75f08f-d7da-48e6-996e-bbcfa5a9ec7e", "DetectTime": "2023-10-30T14:05:00.075071+02:00", "EventTime": "2023-10-30T14:05:00.075089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CYepAT1qItaxf17qX8"]} -{"Format": "IDEA0", "ID": "7285cc0e-ea56-406b-9300-1627dabb2bf0", "DetectTime": "2023-10-30T14:05:00.097831+02:00", "EventTime": "2023-10-30T14:05:00.097844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CsLqyF3y42ClN4VJd5"]} -{"Format": "IDEA0", "ID": "9397965b-966e-4405-9ea9-2666371925ac", "DetectTime": "2023-10-30T14:05:00.118815+02:00", "EventTime": "2023-10-30T14:05:00.118834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Ckrs4U3xNxVcTKf9qc"]} -{"Format": "IDEA0", "ID": "13c0fb80-b0a6-4e1a-96ab-434256bc9a86", "DetectTime": "2023-10-30T14:05:00.151174+02:00", "EventTime": "2023-10-30T14:05:00.151201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CggsuLCfai7lVFFPi"]} -{"Format": "IDEA0", "ID": "81ccd2c6-20cf-4ab6-8d7b-f7593b32d611", "DetectTime": "2023-10-30T14:05:00.174120+02:00", "EventTime": "2023-10-30T14:05:00.174141+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.96.126.57 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CQqbxg4UHCjMycOSoc"]} -{"Format": "IDEA0", "ID": "f52a6519-6c61-481d-863e-af7e4de3be87", "DetectTime": "2023-10-30T14:05:00.237509+02:00", "EventTime": "2023-10-30T14:05:00.237531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CaUg4z2R7CvkClgqC2"]} -{"Format": "IDEA0", "ID": "2cd3cc8f-f320-42fb-8a9a-8da276f865f0", "DetectTime": "2023-10-30T14:05:00.265873+02:00", "EventTime": "2023-10-30T14:05:00.265892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["ClwloF4Mh9tyNG1qP"]} -{"Format": "IDEA0", "ID": "e8bf3499-2de9-4d27-a4be-ab1393291d83", "DetectTime": "2023-10-30T14:05:00.288596+02:00", "EventTime": "2023-10-30T14:05:00.288614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CsX6Kr1IrOXGhYjF8"]} -{"Format": "IDEA0", "ID": "c137fd7e-76d8-4663-a4d0-ff96f649e894", "DetectTime": "2023-10-30T14:05:00.309653+02:00", "EventTime": "2023-10-30T14:05:00.309672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CrpSlA4LYmtaGnu9Gl"]} -{"Format": "IDEA0", "ID": "03e26b2e-1935-463e-aa39-89a58b6eb04d", "DetectTime": "2023-10-30T14:05:00.328493+02:00", "EventTime": "2023-10-30T14:05:00.328509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CLW6S7KXihfUJEC39"]} -{"Format": "IDEA0", "ID": "38b42885-f4fa-4f74-ba6d-9c5570a9e8fc", "DetectTime": "2023-10-30T14:05:00.352102+02:00", "EventTime": "2023-10-30T14:05:00.352114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["C5ScL33xXqfCf9CVy8"]} -{"Format": "IDEA0", "ID": "fa3f6878-e7ff-4e8a-a1b7-d67d8d9bdc95", "DetectTime": "2023-10-30T14:05:00.373351+02:00", "EventTime": "2023-10-30T14:05:00.373369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["ClHCUY3sydWzAIco7f"]} -{"Format": "IDEA0", "ID": "5995d1fd-9606-42cb-a85a-faa7478571c3", "DetectTime": "2023-10-30T14:05:00.397398+02:00", "EventTime": "2023-10-30T14:05:00.397418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CK70Sa3b3uRTqXm1Y4"]} -{"Format": "IDEA0", "ID": "e8aa51d4-0bea-4e59-8da1-4167ffdea6d0", "DetectTime": "2023-10-30T14:05:00.415122+02:00", "EventTime": "2023-10-30T14:05:00.415205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.200.221.34 ", "ContentType": "text/plain"}], "uids": ["C7c38b1pGkX0y7Aqq6"]} -{"Format": "IDEA0", "ID": "40f7d748-d340-4641-bfa9-91ae7bff35a7", "DetectTime": "2023-10-30T14:05:00.442767+02:00", "EventTime": "2023-10-30T14:05:00.442814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["C6pBuM1BVRdvWN8edc"]} -{"Format": "IDEA0", "ID": "5214ba2d-0b3e-47e6-b963-5b3af0e2a2b3", "DetectTime": "2023-10-30T14:05:00.470214+02:00", "EventTime": "2023-10-30T14:05:00.470227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["Cgp8Bw1318eN1xIOJ1"]} -{"Format": "IDEA0", "ID": "962e4e78-707f-4a2b-a6b1-83ece5e2418f", "DetectTime": "2023-10-30T14:05:00.485444+02:00", "EventTime": "2023-10-30T14:05:00.485462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CqMTOy4IHCZOwWVxgf"]} -{"Format": "IDEA0", "ID": "0c6e5db1-4844-4034-9670-09ce1d57eb13", "DetectTime": "2023-10-30T14:05:00.501984+02:00", "EventTime": "2023-10-30T14:05:00.501995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["Cs09gWmJszyqeebm6"]} -{"Format": "IDEA0", "ID": "eca6f227-90cf-47a8-99af-719bc83eb07d", "DetectTime": "2023-10-30T14:05:00.519099+02:00", "EventTime": "2023-10-30T14:05:00.519121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CZnet6173TsNw5ey5h"]} -{"Format": "IDEA0", "ID": "1952281d-1cc0-4d87-8043-737926bb744c", "DetectTime": "2023-10-30T14:05:00.536260+02:00", "EventTime": "2023-10-30T14:05:00.536280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["Cx7FW2U10T0ToPe56"]} -{"Format": "IDEA0", "ID": "9f5bd0a0-869c-4eff-bc47-3f55423ce806", "DetectTime": "2023-10-30T14:05:00.564595+02:00", "EventTime": "2023-10-30T14:05:00.564624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.46.79 ", "ContentType": "text/plain"}], "uids": ["CAgDmC2omVrSUiz4l8"]} -{"Format": "IDEA0", "ID": "bc540bea-911f-4c37-a6e4-d8ac73e4ab51", "DetectTime": "2023-10-30T14:05:00.583124+02:00", "EventTime": "2023-10-30T14:05:00.583136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CO8aJANR6r4gLXOu5"]} -{"Format": "IDEA0", "ID": "b6d4cf79-a502-42a4-80ff-f686e64d7f5e", "DetectTime": "2023-10-30T14:05:00.600924+02:00", "EventTime": "2023-10-30T14:05:00.600935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CbC08mLxsjuelz2m2"]} -{"Format": "IDEA0", "ID": "2f919911-1434-4787-b4c6-b32dea73128e", "DetectTime": "2023-10-30T14:05:00.626914+02:00", "EventTime": "2023-10-30T14:05:00.626935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.47.55.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.47.55.122 ", "ContentType": "text/plain"}], "uids": ["CsnmOT1FJTcJE01DUd"]} -{"Format": "IDEA0", "ID": "6ce2eee6-08ec-4309-83bf-f2f0ae3ea19c", "DetectTime": "2023-10-30T14:05:00.656709+02:00", "EventTime": "2023-10-30T14:05:00.656729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CnBNDc4l6sqWOxXtS7"]} -{"Format": "IDEA0", "ID": "f42a8fd7-6006-485f-9f70-c7cbe1fd7e71", "DetectTime": "2023-10-30T14:05:00.752718+02:00", "EventTime": "2023-10-30T14:05:00.752739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["C146VY38uoCzxuB3C3"]} -{"Format": "IDEA0", "ID": "94e4bf07-0580-47ea-a5c1-b79011406c4e", "DetectTime": "2023-10-30T14:05:00.785452+02:00", "EventTime": "2023-10-30T14:05:00.785468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["CBvgmo2pSdF3K0Oj34"]} -{"Format": "IDEA0", "ID": "122c6df7-7996-4558-a2f3-dff174dc3cd2", "DetectTime": "2023-10-30T14:05:00.813640+02:00", "EventTime": "2023-10-30T14:05:00.813652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CxqgwD2di6mZuBHM6a"]} -{"Format": "IDEA0", "ID": "7c564915-3550-47f3-9a79-999015747e60", "DetectTime": "2023-10-30T14:05:00.853803+02:00", "EventTime": "2023-10-30T14:05:00.853821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CdrS9c4QxEMbiPG1rj"]} -{"Format": "IDEA0", "ID": "567b7177-e679-472d-bb8c-959f409336d9", "DetectTime": "2023-10-30T14:05:00.871951+02:00", "EventTime": "2023-10-30T14:05:00.871963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.123.76 ", "ContentType": "text/plain"}], "uids": ["CTZRJY3Xnl89qfWds1"]} -{"Format": "IDEA0", "ID": "b3c2c1c7-949f-4a96-af2f-e5f97f15c092", "DetectTime": "2023-10-30T14:05:00.916670+02:00", "EventTime": "2023-10-30T14:05:00.916698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CCVzJQ2XBTlVfk6d1l"]} -{"Format": "IDEA0", "ID": "52620786-30ca-4cd5-ab9a-3b229fd03f61", "DetectTime": "2023-10-30T14:05:00.945633+02:00", "EventTime": "2023-10-30T14:05:00.945646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["C8kg1d188KYyA2av3b"]} -{"Format": "IDEA0", "ID": "d3756881-63d2-4294-ab7e-eaa2680f70be", "DetectTime": "2023-10-30T14:05:00.962647+02:00", "EventTime": "2023-10-30T14:05:00.962665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["Cod0Dx4HWP4dtZoHVg"]} -{"Format": "IDEA0", "ID": "8f18c540-d34e-46eb-9e26-1ef0162d4975", "DetectTime": "2023-10-30T14:05:00.994904+02:00", "EventTime": "2023-10-30T14:05:00.994928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.200.221.34 ", "ContentType": "text/plain"}], "uids": ["CxUZP33iDEhwTH07Wa"]} -{"Format": "IDEA0", "ID": "7c6f0a2f-7679-4304-aad0-9611466e8912", "DetectTime": "2023-10-30T14:05:01.016497+02:00", "EventTime": "2023-10-30T14:05:01.016508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdaGLM3Zm5cWaxTkq1"]} -{"Format": "IDEA0", "ID": "6bcc9878-92b3-4561-b4ac-b7609a61d9eb", "DetectTime": "2023-10-30T14:05:01.046259+02:00", "EventTime": "2023-10-30T14:05:01.046276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["C2JwBX35xEjB9mXGb6"]} -{"Format": "IDEA0", "ID": "88a76bcf-f0e0-4930-b88b-07b825ffef0e", "DetectTime": "2023-10-30T14:05:01.089861+02:00", "EventTime": "2023-10-30T14:05:01.089876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CYLt024NHfopM2eqvc"]} -{"Format": "IDEA0", "ID": "727add4a-c386-40d4-8e10-a1c318872bf5", "DetectTime": "2023-10-30T14:05:01.119108+02:00", "EventTime": "2023-10-30T14:05:01.119130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CZqc5kB9uGb3sgU7d"]} -{"Format": "IDEA0", "ID": "1812fb5c-b904-40dd-984b-abe32afe3152", "DetectTime": "2023-10-30T14:05:01.159896+02:00", "EventTime": "2023-10-30T14:05:01.159912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["COTXtBPCk8JhPAT4e"]} -{"Format": "IDEA0", "ID": "f561ba8e-3d36-4329-9e7f-1b631eea5971", "DetectTime": "2023-10-30T14:05:01.193742+02:00", "EventTime": "2023-10-30T14:05:01.193760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["C0loyxv9WbXr6gfIe"]} -{"Format": "IDEA0", "ID": "b1ae725d-5403-4a66-8550-f43671aadb3b", "DetectTime": "2023-10-30T14:05:01.225310+02:00", "EventTime": "2023-10-30T14:05:01.225363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CrY6jskWWompL60og"]} -{"Format": "IDEA0", "ID": "2aa38538-c6d7-425a-b84e-2c58881efbb0", "DetectTime": "2023-10-30T14:05:01.269602+02:00", "EventTime": "2023-10-30T14:05:01.269619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.155.76.16 ", "ContentType": "text/plain"}], "uids": ["ChUduT2hEZGCvvQgmf"]} -{"Format": "IDEA0", "ID": "ef18f2cc-3563-4aa5-aa7f-cd74380f086e", "DetectTime": "2023-10-30T14:05:01.310206+02:00", "EventTime": "2023-10-30T14:05:01.310228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CXEkwu1VYioHDVvCXe"]} -{"Format": "IDEA0", "ID": "fb1b0207-e03a-4326-abd2-05a1439a7172", "DetectTime": "2023-10-30T14:05:01.341727+02:00", "EventTime": "2023-10-30T14:05:01.341748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C0C28U3xqujf4uhUc3"]} -{"Format": "IDEA0", "ID": "3c448045-c5e4-45d2-8254-41bef3f98381", "DetectTime": "2023-10-30T14:05:01.372897+02:00", "EventTime": "2023-10-30T14:05:01.372908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CWILcz1qVqGM3D1DU"]} -{"Format": "IDEA0", "ID": "8705f20c-bc4f-4b3f-94da-cd8251b6bfb9", "DetectTime": "2023-10-30T14:05:01.414627+02:00", "EventTime": "2023-10-30T14:05:01.414643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["CnsUWp3pc2BarQ44S1"]} -{"Format": "IDEA0", "ID": "147e392d-4c59-4988-96b7-ddc846fe208e", "DetectTime": "2023-10-30T14:05:01.447587+02:00", "EventTime": "2023-10-30T14:05:01.447605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CY5RGuTImbnM4Gws3"]} -{"Format": "IDEA0", "ID": "8e12184a-5424-41c2-a6c2-fca130009f20", "DetectTime": "2023-10-30T14:05:01.467777+02:00", "EventTime": "2023-10-30T14:05:01.467793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CpbmWa2e21C7cOoEYa"]} -{"Format": "IDEA0", "ID": "cdaa61e3-0234-4991-b200-29fa7069c9c7", "DetectTime": "2023-10-30T14:05:01.501043+02:00", "EventTime": "2023-10-30T14:05:01.501061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.53.58.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.53.58.144 ", "ContentType": "text/plain"}], "uids": ["CAYbsh40wGaTX59Odk"]} -{"Format": "IDEA0", "ID": "1844e507-01dd-4ddc-88ea-4576306b4be3", "DetectTime": "2023-10-30T14:05:01.534606+02:00", "EventTime": "2023-10-30T14:05:01.534637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CSmgEPbt5IEI3zIy1"]} -{"Format": "IDEA0", "ID": "a72ca128-e9a0-4c1c-bd21-ec5eb486c8e9", "DetectTime": "2023-10-30T14:05:01.584605+02:00", "EventTime": "2023-10-30T14:05:01.584626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CARLJU103I7nw4K7M6"]} -{"Format": "IDEA0", "ID": "25778761-b3d4-44bd-9f98-ce294f0f386e", "DetectTime": "2023-10-30T14:05:01.630937+02:00", "EventTime": "2023-10-30T14:05:01.630959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CvgxLL3r7r0YCDjjj"]} -{"Format": "IDEA0", "ID": "d4e7672d-ba54-41f2-a18a-4dd0d80e0795", "DetectTime": "2023-10-30T14:05:01.669686+02:00", "EventTime": "2023-10-30T14:05:01.669706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.169.222.118 ", "ContentType": "text/plain"}], "uids": ["C6Hatv4E1TcQwqUG4"]} -{"Format": "IDEA0", "ID": "d7f39ffc-4ec2-46f1-a2f8-5de457ec2dd1", "DetectTime": "2023-10-30T14:05:01.711014+02:00", "EventTime": "2023-10-30T14:05:01.711031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CFYKzuhL36kK0wsnd"]} -{"Format": "IDEA0", "ID": "d8fad929-b54d-44cd-913f-f5ba7add01b9", "DetectTime": "2023-10-30T14:05:01.748194+02:00", "EventTime": "2023-10-30T14:05:01.748216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C7pmef3nzcHmVC67h8"]} -{"Format": "IDEA0", "ID": "35ef20e7-22cd-4215-84fc-ac72d2581eff", "DetectTime": "2023-10-30T14:05:01.786677+02:00", "EventTime": "2023-10-30T14:05:01.786693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.46.79 ", "ContentType": "text/plain"}], "uids": ["Crw0353ptMHnzENzHj"]} -{"Format": "IDEA0", "ID": "9dfc83e6-493a-412d-bb83-262b2db050ff", "DetectTime": "2023-10-30T14:05:01.818112+02:00", "EventTime": "2023-10-30T14:05:01.818132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.182.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.254.182.91 ", "ContentType": "text/plain"}], "uids": ["Cq3qN427Chi9e01m9"]} -{"Format": "IDEA0", "ID": "17333f61-a37e-4e8b-a8b9-79ae6d9065e7", "DetectTime": "2023-10-30T14:05:01.851928+02:00", "EventTime": "2023-10-30T14:05:01.851949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CYBTpO3pp3c1nebv8h"]} -{"Format": "IDEA0", "ID": "4d89afd6-9a43-49a2-a263-29cb8c7df395", "DetectTime": "2023-10-30T14:05:01.892160+02:00", "EventTime": "2023-10-30T14:05:01.892178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.155.76.16 ", "ContentType": "text/plain"}], "uids": ["CM2ACz3bGCdjuQZMgb"]} -{"Format": "IDEA0", "ID": "b8fe469f-b6d2-435c-bc86-f3fb4fd4d8d1", "DetectTime": "2023-10-30T14:05:01.920044+02:00", "EventTime": "2023-10-30T14:05:01.920060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CUXTqc36iRkLDLTrT1"]} -{"Format": "IDEA0", "ID": "908e05b4-d973-444a-a362-1d15f53bdac7", "DetectTime": "2023-10-30T14:05:01.947956+02:00", "EventTime": "2023-10-30T14:05:01.947968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CqeikT2XV0XXkeKtu6"]} -{"Format": "IDEA0", "ID": "4dcaa650-cf30-4224-af7f-a83e6d14ad11", "DetectTime": "2023-10-30T14:05:01.988483+02:00", "EventTime": "2023-10-30T14:05:01.988495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CM25a52k9LAVZQ1Thh"]} -{"Format": "IDEA0", "ID": "d6b1c448-e801-44ea-97ce-0cdcab5036fc", "DetectTime": "2023-10-30T14:05:02.028382+02:00", "EventTime": "2023-10-30T14:05:02.028395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CfLNmZUSYV1aNuIhl"]} -{"Format": "IDEA0", "ID": "53d9beaa-2847-44a1-b8cf-9f64cb838767", "DetectTime": "2023-10-30T14:05:02.069457+02:00", "EventTime": "2023-10-30T14:05:02.069474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CLcEso4ll1S5PZA056"]} -{"Format": "IDEA0", "ID": "8af38b29-a038-463c-bd4a-601f3821b4c8", "DetectTime": "2023-10-30T14:05:02.122813+02:00", "EventTime": "2023-10-30T14:05:02.122832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CdXaC5116CHtS3NGEd"]} -{"Format": "IDEA0", "ID": "71ddce86-e001-42e3-bc48-318a94a60f64", "DetectTime": "2023-10-30T14:05:02.166552+02:00", "EventTime": "2023-10-30T14:05:02.166567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CLdijI3TcpiJjAsqf6"]} -{"Format": "IDEA0", "ID": "0d18fd15-d047-407b-84e9-0c8d0eea368b", "DetectTime": "2023-10-30T14:05:02.207987+02:00", "EventTime": "2023-10-30T14:05:02.208010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CFWlNj24VfpHJ6LJtf"]} -{"Format": "IDEA0", "ID": "b9f61a68-f359-4cd7-9c46-a4f32a296002", "DetectTime": "2023-10-30T14:05:02.252180+02:00", "EventTime": "2023-10-30T14:05:02.252200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ClnO29QDL2fLkpzH5"]} -{"Format": "IDEA0", "ID": "8abadc94-4fb1-472d-98af-4c93f7c2fba8", "DetectTime": "2023-10-30T14:05:02.296511+02:00", "EventTime": "2023-10-30T14:05:02.296536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["CetyS73Buq1DoCTxI5"]} -{"Format": "IDEA0", "ID": "67e0202e-78d7-4962-ad37-52608ff34d71", "DetectTime": "2023-10-30T14:05:02.340455+02:00", "EventTime": "2023-10-30T14:05:02.340471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Chrq6F3gMjZprTPUOb"]} -{"Format": "IDEA0", "ID": "2bba15ac-d815-406a-8416-59e8b32ddcc8", "DetectTime": "2023-10-30T14:05:02.381239+02:00", "EventTime": "2023-10-30T14:05:02.381258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["ChGASV22z6MUo3dWP4"]} -{"Format": "IDEA0", "ID": "dc540416-68db-40cf-8ad4-b0e586cd98f6", "DetectTime": "2023-10-30T14:05:02.423975+02:00", "EventTime": "2023-10-30T14:05:02.423991+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CP2AC33oohKblt4Huj"]} -{"Format": "IDEA0", "ID": "1b0f8f41-59fe-4b1d-9eba-cee0e1fc43f0", "DetectTime": "2023-10-30T14:05:02.434930+02:00", "EventTime": "2023-10-30T14:05:02.434951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CjfQLp4lhzBEMX0zG1"]} -{"Format": "IDEA0", "ID": "3b73037d-7897-4402-a136-ff9282b9a070", "DetectTime": "2023-10-30T14:05:02.474562+02:00", "EventTime": "2023-10-30T14:05:02.474578+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYCqOKfIe7CxxaXt1"]} -{"Format": "IDEA0", "ID": "ed56ebf9-925e-4191-b386-6510928416c7", "DetectTime": "2023-10-30T14:05:02.484643+02:00", "EventTime": "2023-10-30T14:05:02.484660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CgvYCY2zX0A8lnCfz3"]} -{"Format": "IDEA0", "ID": "f3a5c752-bd58-4506-a838-dd5dfd04f885", "DetectTime": "2023-10-30T14:05:02.521338+02:00", "EventTime": "2023-10-30T14:05:02.521355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CfEGBz4QkG1xvHDAz8"]} -{"Format": "IDEA0", "ID": "b7551aa0-4166-4a61-9f0b-ceb4c8008f90", "DetectTime": "2023-10-30T14:05:02.560980+02:00", "EventTime": "2023-10-30T14:05:02.561002+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CZpC5A1WvY7gGv8ad"]} -{"Format": "IDEA0", "ID": "bfe9349e-9af0-4750-8eae-e6c03853debf", "DetectTime": "2023-10-30T14:05:02.572701+02:00", "EventTime": "2023-10-30T14:05:02.572718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["C8HWx22DZC215us84c"]} -{"Format": "Json", "ID": "bfe9349e-9af0-4750-8eae-e6c03853debf", "DetectTime": "2023-10-30T14:05:02.572701+02:00", "EventTime": "2023-10-30T14:05:02.572718+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:34:09.806876+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:05:02.648296)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fcce1e76-52d6-4d40-9856-c17d2c07711f", "DetectTime": "2023-10-30T14:05:02.652819+02:00", "EventTime": "2023-10-30T14:05:02.652835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CbyF6vhzv3tDiT256"]} -{"Format": "IDEA0", "ID": "f16be463-5903-4b02-a511-b85e9c5be03a", "DetectTime": "2023-10-30T14:05:02.682527+02:00", "EventTime": "2023-10-30T14:05:02.682548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CjU7I62U3hkk0B0yA7"]} -{"Format": "IDEA0", "ID": "961fd770-9928-4863-98dc-60d0ff929c85", "DetectTime": "2023-10-30T14:05:02.717134+02:00", "EventTime": "2023-10-30T14:05:02.717151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Ce9KHO2uByPEK13Qjb"]} -{"Format": "IDEA0", "ID": "0b7a210c-f6aa-44ae-b6cb-ee0eee988479", "DetectTime": "2023-10-30T14:05:02.753162+02:00", "EventTime": "2023-10-30T14:05:02.753179+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Clw87c0J5zBqtxtPa"]} -{"Format": "IDEA0", "ID": "e25dce4f-b32a-4f27-bbd5-bdb70e26b944", "DetectTime": "2023-10-30T14:05:02.760871+02:00", "EventTime": "2023-10-30T14:05:02.760883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["Ce8e8M1FnV641vzRck"]} -{"Format": "IDEA0", "ID": "f14cd439-7962-47b2-aa6c-7ba1b35ffa52", "DetectTime": "2023-10-30T14:05:02.788338+02:00", "EventTime": "2023-10-30T14:05:02.788351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["ClAALZ3VFy76ZELTNa"]} -{"Format": "IDEA0", "ID": "6b821221-1723-417b-85f7-1c6bb27b54a9", "DetectTime": "2023-10-30T14:05:02.821814+02:00", "EventTime": "2023-10-30T14:05:02.821825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CP2AC33oohKblt4Huj", "CuGgt04GhweSKXojV6", "CZpC5A1WvY7gGv8ad", "CEszdu3StOTI5SN6sl"]} -{"Format": "IDEA0", "ID": "8a9099d3-0ed4-454e-8e03-50854f1b75ea", "DetectTime": "2023-10-30T14:05:02.829307+02:00", "EventTime": "2023-10-30T14:05:02.829326+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CuGgt04GhweSKXojV6"]} -{"Format": "IDEA0", "ID": "07a0723f-ca14-4c3b-b8c4-54d261aff583", "DetectTime": "2023-10-30T14:05:02.840354+02:00", "EventTime": "2023-10-30T14:05:02.840374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C9V2P62jA6ZAtHnMme"]} -{"Format": "IDEA0", "ID": "9262fa6f-c29c-43d0-992f-95265ab7e0d5", "DetectTime": "2023-10-30T14:05:02.870792+02:00", "EventTime": "2023-10-30T14:05:02.870809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["C3Jnk9ANoIw6tXzN2"]} -{"Format": "IDEA0", "ID": "10c95fc3-7ca3-46e6-8575-fc0d8cf0a73c", "DetectTime": "2023-10-30T14:05:02.902822+02:00", "EventTime": "2023-10-30T14:05:02.902840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CkKnNYJtojxWH5J15"]} -{"Format": "IDEA0", "ID": "3a427cab-a52e-4880-918c-0df4d8eca108", "DetectTime": "2023-10-30T14:05:02.942909+02:00", "EventTime": "2023-10-30T14:05:02.942933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CqAY2k3OCTmjvLGCq3"]} -{"Format": "IDEA0", "ID": "70470491-8356-43b5-92ad-a8afbedbf5c0", "DetectTime": "2023-10-30T14:05:02.980008+02:00", "EventTime": "2023-10-30T14:05:02.980026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C1FZEX3QLNbrKLgji4"]} -{"Format": "IDEA0", "ID": "95a11077-b8c8-44e4-9a86-5a686bc7c537", "DetectTime": "2023-10-30T14:05:03.016782+02:00", "EventTime": "2023-10-30T14:05:03.016801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CArRrKMhPvq6BqTm9"]} -{"Format": "IDEA0", "ID": "b4b88e21-9df0-40ca-aa18-316a6b5a82f9", "DetectTime": "2023-10-30T14:05:03.046648+02:00", "EventTime": "2023-10-30T14:05:03.046674+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C2CLl13imTsBvBvUE4"]} -{"Format": "IDEA0", "ID": "f6002405-15b8-412f-bec8-cffd992a91e9", "DetectTime": "2023-10-30T14:05:03.057497+02:00", "EventTime": "2023-10-30T14:05:03.057516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CsoYjy4dqLsWVNeG9i"]} -{"Format": "Json", "ID": "f6002405-15b8-412f-bec8-cffd992a91e9", "DetectTime": "2023-10-30T14:05:03.057497+02:00", "EventTime": "2023-10-30T14:05:03.057516+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:34:45.852835+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:05:03.123669)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5fd14d26-d567-4a37-a0b7-68ef72b5e085", "DetectTime": "2023-10-30T14:05:03.129087+02:00", "EventTime": "2023-10-30T14:05:03.129103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CMCqot1X819epB4oja"]} -{"Format": "IDEA0", "ID": "ad1ccfb8-dab9-42e3-8467-f34a3ba2439f", "DetectTime": "2023-10-30T14:05:03.167067+02:00", "EventTime": "2023-10-30T14:05:03.167084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CWC7hv2izAs8AVFWHe"]} -{"Format": "IDEA0", "ID": "072bbe93-e385-47eb-b670-c960a3619e0c", "DetectTime": "2023-10-30T14:05:03.197972+02:00", "EventTime": "2023-10-30T14:05:03.197990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["CuOWCp4510UoK2NU2i"]} -{"Format": "IDEA0", "ID": "91bfc3f6-f622-4088-8b0b-c8245a0c73ca", "DetectTime": "2023-10-30T14:05:03.232005+02:00", "EventTime": "2023-10-30T14:05:03.232023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CAjsbl16auzNrGVbbl"]} -{"Format": "IDEA0", "ID": "e0158855-850e-4806-8805-10b93734dcdb", "DetectTime": "2023-10-30T14:05:03.263391+02:00", "EventTime": "2023-10-30T14:05:03.263411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["CJVF3G1lUAS2Rd4tCe"]} -{"Format": "IDEA0", "ID": "7a102584-46e7-441f-a11c-0a28846d2672", "DetectTime": "2023-10-30T14:05:03.299543+02:00", "EventTime": "2023-10-30T14:05:03.299556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. ", "ContentType": "text/plain"}], "uids": ["C7nqLh4C4xH5HS33xk"]} -{"Format": "IDEA0", "ID": "ebfbeea1-7388-4f0b-aa81-0c0da16f9a06", "DetectTime": "2023-10-30T14:05:03.328508+02:00", "EventTime": "2023-10-30T14:05:03.328521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CBJfhZ3R7qh0FLCR04"]} -{"Format": "IDEA0", "ID": "080a392a-604f-44ab-baf6-ef217bc5d3ce", "DetectTime": "2023-10-30T14:05:03.360629+02:00", "EventTime": "2023-10-30T14:05:03.360647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CuGPrn4CKSTNE4mBmf"]} -{"Format": "IDEA0", "ID": "ccc23d68-d913-4e8e-9204-a5d42376b7e5", "DetectTime": "2023-10-30T14:05:03.395467+02:00", "EventTime": "2023-10-30T14:05:03.395483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CopWVX2pgeKOxX1Hge"]} -{"Format": "IDEA0", "ID": "300d8e3c-9757-468b-be95-ab7076fbb3d7", "DetectTime": "2023-10-30T14:05:03.423682+02:00", "EventTime": "2023-10-30T14:05:03.423700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CqxTia2HShAJyDALV6"]} -{"Format": "IDEA0", "ID": "52448434-9f9b-4f71-98ff-793ecba84554", "DetectTime": "2023-10-30T14:05:03.451982+02:00", "EventTime": "2023-10-30T14:05:03.452000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CZeOgd4cgAqWTBA118"]} -{"Format": "IDEA0", "ID": "8b8da7c8-6fc6-4c02-8ab3-b12a2e2bff0d", "DetectTime": "2023-10-30T14:05:03.485865+02:00", "EventTime": "2023-10-30T14:05:03.485878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3326], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. ", "ContentType": "text/plain"}], "uids": ["CDzrwm1gQsv41yv0p2"]} -{"Format": "Json", "ID": "8b8da7c8-6fc6-4c02-8ab3-b12a2e2bff0d", "DetectTime": "2023-10-30T14:05:03.485865+02:00", "EventTime": "2023-10-30T14:05:03.485878+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3326], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T04:34:48.282648+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2023/10/30 14:05:03.542046)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "048cc0b7-1a1c-415b-b021-e56c5f8ebf5f", "DetectTime": "2023-10-30T14:05:03.546920+02:00", "EventTime": "2023-10-30T14:05:03.546936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["CfZD3i3gq9zyIOMQl"]} -{"Format": "IDEA0", "ID": "96bb918b-b740-4c75-a636-591829553137", "DetectTime": "2023-10-30T14:05:03.578551+02:00", "EventTime": "2023-10-30T14:05:03.578577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["CUMZ024OqxTU0upqCl"]} -{"Format": "IDEA0", "ID": "9587054b-3630-411b-9c5b-f75744114d4c", "DetectTime": "2023-10-30T14:05:03.603223+02:00", "EventTime": "2023-10-30T14:05:03.603239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CrBDln3wmrkaLMEya4"]} -{"Format": "IDEA0", "ID": "5c5fcde8-2d49-4942-9bef-6b82036d17f7", "DetectTime": "2023-10-30T14:05:03.635398+02:00", "EventTime": "2023-10-30T14:05:03.635415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrkpBP3LETQK9Wiici"]} -{"Format": "IDEA0", "ID": "49c28dbe-a327-48ee-81a7-7ee85d699261", "DetectTime": "2023-10-30T14:05:03.668621+02:00", "EventTime": "2023-10-30T14:05:03.668643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. ", "ContentType": "text/plain"}], "uids": ["CldFzD3ktE7e1yJjA4"]} -{"Format": "IDEA0", "ID": "a8dd04c4-e842-4ed9-8173-c6c463b623c4", "DetectTime": "2023-10-30T14:05:03.709995+02:00", "EventTime": "2023-10-30T14:05:03.710012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CG4DwT9yJABCkChDf"]} -{"Format": "IDEA0", "ID": "c18e15e2-8948-483d-9e1d-c8f2577427a3", "DetectTime": "2023-10-30T14:05:03.744453+02:00", "EventTime": "2023-10-30T14:05:03.744475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CbMGP92qdWsxOCmqe6"]} -{"Format": "IDEA0", "ID": "1b6a439a-390e-431e-a195-7e99a6202bb0", "DetectTime": "2023-10-30T14:05:03.787239+02:00", "EventTime": "2023-10-30T14:05:03.787255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20050], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. ", "ContentType": "text/plain"}], "uids": ["CaMtAP25ZOE9tGJ2Fd"]} -{"Format": "IDEA0", "ID": "eda42a84-1c17-46d0-a979-5ab2e6a7f3e8", "DetectTime": "2023-10-30T14:05:03.830354+02:00", "EventTime": "2023-10-30T14:05:03.830375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CWQ7Aw4Ar2bdrPclw1"]} -{"Format": "IDEA0", "ID": "c74705e6-9691-4608-a2df-665de89953ff", "DetectTime": "2023-10-30T14:05:03.858197+02:00", "EventTime": "2023-10-30T14:05:03.858224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C8Lx5T3naYrUMMUBnh"]} -{"Format": "IDEA0", "ID": "d84c3acb-14c4-484e-8422-fb99a6596a67", "DetectTime": "2023-10-30T14:05:03.898245+02:00", "EventTime": "2023-10-30T14:05:03.898271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["C0WRdy2unonhFYo4U9"]} -{"Format": "IDEA0", "ID": "eb5f9529-88b8-4423-8c2c-52bf3055966c", "DetectTime": "2023-10-30T14:05:03.939490+02:00", "EventTime": "2023-10-30T14:05:03.939510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. ", "ContentType": "text/plain"}], "uids": ["CFyffq3rbKCMzLT8Fg"]} -{"Format": "IDEA0", "ID": "0bf72121-a1a8-424a-9547-41a8f6e697ed", "DetectTime": "2023-10-30T14:05:03.985389+02:00", "EventTime": "2023-10-30T14:05:03.985412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CaW2oD4i5rhdVPUl3f"]} -{"Format": "Json", "ID": "0bf72121-a1a8-424a-9547-41a8f6e697ed", "DetectTime": "2023-10-30T14:05:03.985389+02:00", "EventTime": "2023-10-30T14:05:03.985412+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T05:06:45.246465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2023/10/30 14:05:04.089855)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "890a3bd7-4cb3-46df-9540-836f91a89012", "DetectTime": "2023-10-30T14:05:04.095773+02:00", "EventTime": "2023-10-30T14:05:04.095792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["ChQ9xy2YVNhy75H9Cg"]} -{"Format": "IDEA0", "ID": "09bc1708-cbb1-4bf0-b1e2-618570fac269", "DetectTime": "2023-10-30T14:05:04.131721+02:00", "EventTime": "2023-10-30T14:05:04.131733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CYNLSr1KA3Hzo3Ngle"]} -{"Format": "IDEA0", "ID": "a3369721-fb04-48fe-a5d0-34c8adf6ccc7", "DetectTime": "2023-10-30T14:05:04.169437+02:00", "EventTime": "2023-10-30T14:05:04.169450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CqCOgA1hfBR0JnWz5e"]} -{"Format": "IDEA0", "ID": "fc724c70-ec18-438d-87ba-92c79702f2b0", "DetectTime": "2023-10-30T14:05:04.197736+02:00", "EventTime": "2023-10-30T14:05:04.197763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CPmgOn2T3XnHY8CSs7"]} -{"Format": "IDEA0", "ID": "ea866dbb-24fd-4506-a28d-554655d7ed8b", "DetectTime": "2023-10-30T14:05:04.233460+02:00", "EventTime": "2023-10-30T14:05:04.233475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CrRrsCSZPNoJPJrdd"]} -{"Format": "IDEA0", "ID": "25cee258-e827-49cd-a31f-ffb9ef70bca7", "DetectTime": "2023-10-30T14:05:04.263798+02:00", "EventTime": "2023-10-30T14:05:04.263815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CXjVLc2YhhTdA9ezad"]} -{"Format": "IDEA0", "ID": "c9de8981-49ae-4add-a25e-fa3ebd464a04", "DetectTime": "2023-10-30T14:05:04.295708+02:00", "EventTime": "2023-10-30T14:05:04.295726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CCT6nt45tx3Uzndxse"]} -{"Format": "IDEA0", "ID": "d443b686-e5c8-4d9a-8af0-253ac2446ee6", "DetectTime": "2023-10-30T14:05:04.332142+02:00", "EventTime": "2023-10-30T14:05:04.332154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CHwhKR1F7yDNoGEnfb"]} -{"Format": "IDEA0", "ID": "359eeb87-8e82-4f86-a3f5-43198c015439", "DetectTime": "2023-10-30T14:05:04.371847+02:00", "EventTime": "2023-10-30T14:05:04.371858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["Ck6D5g4VORVEJmnBmi"]} -{"Format": "Json", "ID": "359eeb87-8e82-4f86-a3f5-43198c015439", "DetectTime": "2023-10-30T14:05:04.371847+02:00", "EventTime": "2023-10-30T14:05:04.371858+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T05:06:47.320661+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2023/10/30 14:05:04.434250)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ffc8dd4-2e0f-4bbf-a996-1b79d38a7d77", "DetectTime": "2023-10-30T14:05:04.439735+02:00", "EventTime": "2023-10-30T14:05:04.439752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["Cz34LFchKry16K6c3"]} -{"Format": "IDEA0", "ID": "438de863-53f7-4b78-9fe1-193c47f66799", "DetectTime": "2023-10-30T14:05:04.473053+02:00", "EventTime": "2023-10-30T14:05:04.473070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNSIb51uOCbzIUqUC9"]} -{"Format": "IDEA0", "ID": "927aa927-2f55-4f3d-b466-8fb13cfabe1f", "DetectTime": "2023-10-30T14:05:04.505899+02:00", "EventTime": "2023-10-30T14:05:04.505916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["C7WY4JPOSmOqyWX3"]} -{"Format": "IDEA0", "ID": "1e9b129b-ed79-4eb3-b43c-6ea024ae7ca6", "DetectTime": "2023-10-30T14:05:04.536845+02:00", "EventTime": "2023-10-30T14:05:04.536866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["Cz9D1a2GcD5YjC2dZf"]} -{"Format": "IDEA0", "ID": "72c6e779-1a64-4a33-801d-4fdcc4c8af2c", "DetectTime": "2023-10-30T14:05:04.567927+02:00", "EventTime": "2023-10-30T14:05:04.567948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CCtRDi3qNWOCmcNic9"]} -{"Format": "IDEA0", "ID": "39783021-5a1b-4c64-8a89-49e17023170a", "DetectTime": "2023-10-30T14:05:04.600815+02:00", "EventTime": "2023-10-30T14:05:04.600833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["C1qC203nvDhJHVmVS9"]} -{"Format": "IDEA0", "ID": "539a16db-9fdb-4c19-bfff-69d1030c12a5", "DetectTime": "2023-10-30T14:05:04.637280+02:00", "EventTime": "2023-10-30T14:05:04.637297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4321], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. ", "ContentType": "text/plain"}], "uids": ["CtaUx52CbZWDdpE1Vb"]} -{"Format": "IDEA0", "ID": "d4e9ac24-e341-4e4d-b069-9d96e169220f", "DetectTime": "2023-10-30T14:05:04.675678+02:00", "EventTime": "2023-10-30T14:05:04.675696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CFzF2H3rPABIdT8Z26"]} -{"Format": "IDEA0", "ID": "52cdea78-9865-4fcf-8a0c-601f3f2bda69", "DetectTime": "2023-10-30T14:05:04.708871+02:00", "EventTime": "2023-10-30T14:05:04.708887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CTFWbT3y9iiihoQlu2"]} -{"Format": "Json", "ID": "52cdea78-9865-4fcf-8a0c-601f3f2bda69", "DetectTime": "2023-10-30T14:05:04.708871+02:00", "EventTime": "2023-10-30T14:05:04.708887+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T05:06:50.066150+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2023/10/30 14:05:04.766541)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2e04636e-1144-48c0-8c1a-d399005db42f", "DetectTime": "2023-10-30T14:05:04.770474+02:00", "EventTime": "2023-10-30T14:05:04.770486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsgvQhVzS9lJ0faz5"]} -{"Format": "IDEA0", "ID": "c4b7ab1c-bb26-4f85-a15b-d02020e9765c", "DetectTime": "2023-10-30T14:05:04.797231+02:00", "EventTime": "2023-10-30T14:05:04.797243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["CHfr6w2S2IsZ23iNb7"]} -{"Format": "IDEA0", "ID": "92ebd4e2-cf78-461b-aa17-f053b9c13121", "DetectTime": "2023-10-30T14:05:04.825373+02:00", "EventTime": "2023-10-30T14:05:04.825384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CUdmiW3SiAYNdMdjyd"]} -{"Format": "IDEA0", "ID": "e53b2df7-82e6-47fb-90d9-cabe10aa9a7b", "DetectTime": "2023-10-30T14:05:04.857294+02:00", "EventTime": "2023-10-30T14:05:04.857315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CTh8CXd3tq5H3c1jb"]} -{"Format": "IDEA0", "ID": "60ca21f4-454c-4e84-afb8-628cea4a3c02", "DetectTime": "2023-10-30T14:05:04.893016+02:00", "EventTime": "2023-10-30T14:05:04.893032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CmKAPs4EtlTpNGpl9i"]} -{"Format": "IDEA0", "ID": "33f65c26-8cc8-4767-93f2-a94937dfa589", "DetectTime": "2023-10-30T14:05:04.930375+02:00", "EventTime": "2023-10-30T14:05:04.930397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["C19ybphrKmYL2ZqN2"]} -{"Format": "IDEA0", "ID": "357867e7-d7cc-4c99-bdfd-3515786c17b5", "DetectTime": "2023-10-30T14:05:04.965598+02:00", "EventTime": "2023-10-30T14:05:04.965621+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1Xzu9p3D2AFGXhwd"]} -{"Format": "IDEA0", "ID": "de35fe61-6929-4761-b773-d2ea655acbc4", "DetectTime": "2023-10-30T14:05:04.973375+02:00", "EventTime": "2023-10-30T14:05:04.973394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9gyfzcMUt2w60Edi"]} -{"Format": "IDEA0", "ID": "8e3113e6-bf41-4ef0-8640-f1431c6333c3", "DetectTime": "2023-10-30T14:05:05.010062+02:00", "EventTime": "2023-10-30T14:05:05.010085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CzgEkB1xM92TUC373"]} -{"Format": "IDEA0", "ID": "f5720068-dff2-4c14-853d-760b178e89f1", "DetectTime": "2023-10-30T14:05:05.044811+02:00", "EventTime": "2023-10-30T14:05:05.044829+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CEOi1h1z1dulmJAiJ2"]} -{"Format": "IDEA0", "ID": "1c0e1b9a-d874-45fc-8fff-9ce623cb4e6d", "DetectTime": "2023-10-30T14:05:05.053136+02:00", "EventTime": "2023-10-30T14:05:05.053156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. ", "ContentType": "text/plain"}], "uids": ["Cj31xf2Q4qp7Yn2QU8"]} -{"Format": "Json", "ID": "1c0e1b9a-d874-45fc-8fff-9ce623cb4e6d", "DetectTime": "2023-10-30T14:05:05.053136+02:00", "EventTime": "2023-10-30T14:05:05.053156+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T05:38:00.146773+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2023/10/30 14:05:05.121098)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "02512fff-4aab-4c10-bb1f-37e76a29fb9a", "DetectTime": "2023-10-30T14:05:05.125627+02:00", "EventTime": "2023-10-30T14:05:05.125645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20050], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. ", "ContentType": "text/plain"}], "uids": ["CnBMJD3ZaX9npZzNQ7"]} -{"Format": "IDEA0", "ID": "9d539a67-a943-476c-b6ae-b17653381ef1", "DetectTime": "2023-10-30T14:05:05.154749+02:00", "EventTime": "2023-10-30T14:05:05.154766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["C2FEBS3ad0gbzbLO66"]} -{"Format": "IDEA0", "ID": "4914a87b-466d-42b4-9c02-324c1df6999a", "DetectTime": "2023-10-30T14:05:05.183112+02:00", "EventTime": "2023-10-30T14:05:05.183130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRDnq52eBbnVWrXm0f"]} -{"Format": "IDEA0", "ID": "870a2427-931e-4f71-93d5-22722e8aeeac", "DetectTime": "2023-10-30T14:05:05.209137+02:00", "EventTime": "2023-10-30T14:05:05.209154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Cjeu2g3WnvBFDB9WR9"]} -{"Format": "IDEA0", "ID": "0a1dc263-8472-4e3f-aa5e-00003a749010", "DetectTime": "2023-10-30T14:05:05.238937+02:00", "EventTime": "2023-10-30T14:05:05.238949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CRqxEE2zsoqdkWUXG6"]} -{"Format": "IDEA0", "ID": "04cf4adb-827b-4c1c-ba80-81e3380a59a8", "DetectTime": "2023-10-30T14:05:05.262603+02:00", "EventTime": "2023-10-30T14:05:05.262619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cu1EKi1NMT1hrOOmL7"]} -{"Format": "IDEA0", "ID": "e7a259be-7bc2-496b-a20e-8efe3ad811c4", "DetectTime": "2023-10-30T14:05:05.293985+02:00", "EventTime": "2023-10-30T14:05:05.294003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CbgJ3l28OmqU1Kgws9"]} -{"Format": "IDEA0", "ID": "e5d6d18b-e1c0-4866-b1b5-22b9a907ab48", "DetectTime": "2023-10-30T14:05:05.320286+02:00", "EventTime": "2023-10-30T14:05:05.320302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CBmCKo115abvMKV4P6"]} -{"Format": "IDEA0", "ID": "7b7a9e92-744f-4502-830e-b746d63bd6f8", "DetectTime": "2023-10-30T14:05:05.350907+02:00", "EventTime": "2023-10-30T14:05:05.350928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C83Bkr2kcfvOlLVXLg"]} -{"Format": "Json", "ID": "7b7a9e92-744f-4502-830e-b746d63bd6f8", "DetectTime": "2023-10-30T14:05:05.350907+02:00", "EventTime": "2023-10-30T14:05:05.350928+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T05:38:37.038429+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2023/10/30 14:05:05.407968)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "28517e77-0e2f-4560-a3b9-de07b5683be5", "DetectTime": "2023-10-30T14:05:05.414286+02:00", "EventTime": "2023-10-30T14:05:05.414310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CCfYNB4zefRJB2sc9d"]} -{"Format": "IDEA0", "ID": "a37359ca-788b-41ab-8a13-917ffb3a36e2", "DetectTime": "2023-10-30T14:05:05.442338+02:00", "EventTime": "2023-10-30T14:05:05.442354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CUTvr7D4NLcxWs8xf"]} -{"Format": "IDEA0", "ID": "a5c364be-d857-428c-a702-004f4096ed63", "DetectTime": "2023-10-30T14:05:05.467366+02:00", "EventTime": "2023-10-30T14:05:05.467393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["C3YoRr1W4gHPzn3s1"]} -{"Format": "IDEA0", "ID": "b22464d3-ed60-47c1-8841-97ce424cb356", "DetectTime": "2023-10-30T14:05:05.495716+02:00", "EventTime": "2023-10-30T14:05:05.495735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CotTrFDlLciMhKI4d"]} -{"Format": "IDEA0", "ID": "70c33103-279c-4b8f-8d3c-843e2b776d86", "DetectTime": "2023-10-30T14:05:05.523761+02:00", "EventTime": "2023-10-30T14:05:05.523779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["CB3jzl46K1sLaGo9gl"]} -{"Format": "IDEA0", "ID": "107375ad-965d-4edb-9fa7-1e16d31a9ac9", "DetectTime": "2023-10-30T14:05:05.549227+02:00", "EventTime": "2023-10-30T14:05:05.549240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CQExhMrQ9wHQoXfj3"]} -{"Format": "IDEA0", "ID": "897f1566-a7af-4fae-9600-d5fa48f5f953", "DetectTime": "2023-10-30T14:05:05.574112+02:00", "EventTime": "2023-10-30T14:05:05.574131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CdAwGs4N7E1cOhUPx5"]} -{"Format": "IDEA0", "ID": "fc60733f-0827-49ba-ba7b-01efaec980b7", "DetectTime": "2023-10-30T14:05:05.600172+02:00", "EventTime": "2023-10-30T14:05:05.600189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["C9pshCgiUeGVnppxk"]} -{"Format": "Json", "ID": "fc60733f-0827-49ba-ba7b-01efaec980b7", "DetectTime": "2023-10-30T14:05:05.600172+02:00", "EventTime": "2023-10-30T14:05:05.600189+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T05:38:39.125114+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2023/10/30 14:05:05.661107)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "47cd9461-483d-461a-acae-4247285e378d", "DetectTime": "2023-10-30T14:05:05.666562+02:00", "EventTime": "2023-10-30T14:05:05.666576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CCgr1tX8i6JT8yRKb"]} -{"Format": "IDEA0", "ID": "054a371f-ee8a-47a7-9783-860d39f7ee0d", "DetectTime": "2023-10-30T14:05:05.693661+02:00", "EventTime": "2023-10-30T14:05:05.693673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10320], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. ", "ContentType": "text/plain"}], "uids": ["CVHhHhV1JYrOCcyje"]} -{"Format": "IDEA0", "ID": "9627a6f4-66e8-46f8-a2a5-34a4059f877a", "DetectTime": "2023-10-30T14:05:05.719828+02:00", "EventTime": "2023-10-30T14:05:05.719840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CYsHvC3ZPmLXFGg8md"]} -{"Format": "IDEA0", "ID": "8f2e7a2d-5d4e-4c53-8d9e-9cf9651c6f98", "DetectTime": "2023-10-30T14:05:05.750158+02:00", "EventTime": "2023-10-30T14:05:05.750183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C1TYgs1jfS02JzPOag"]} -{"Format": "IDEA0", "ID": "83d5cec5-2a2f-4000-887b-5808a4aa101b", "DetectTime": "2023-10-30T14:05:05.773847+02:00", "EventTime": "2023-10-30T14:05:05.773860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.46.79 ", "ContentType": "text/plain"}], "uids": ["C7qKqd15MHragzHz32"]} -{"Format": "IDEA0", "ID": "2bf329a2-b2ee-4410-844e-546848ac3d56", "DetectTime": "2023-10-30T14:05:05.804061+02:00", "EventTime": "2023-10-30T14:05:05.804074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["CVf7Ls3B8FiO3zgVf"]} -{"Format": "IDEA0", "ID": "cd4e8428-186b-4dc1-8506-45ba6066355f", "DetectTime": "2023-10-30T14:05:05.829419+02:00", "EventTime": "2023-10-30T14:05:05.829441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CtaJ393b3w8xu3IP9l"]} -{"Format": "IDEA0", "ID": "5226b178-5ebd-4520-bbd7-ca1284559718", "DetectTime": "2023-10-30T14:05:05.857238+02:00", "EventTime": "2023-10-30T14:05:05.857257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CPp1As22qAAeJyTCl2"]} -{"Format": "IDEA0", "ID": "b1530f25-c58a-4a90-b519-1e52e45c6495", "DetectTime": "2023-10-30T14:05:05.883602+02:00", "EventTime": "2023-10-30T14:05:05.883628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CsC7NdwzeV097Xvbg"]} -{"Format": "IDEA0", "ID": "d10d42a4-1010-4cd3-b74e-529b89df1c52", "DetectTime": "2023-10-30T14:05:05.910093+02:00", "EventTime": "2023-10-30T14:05:05.910110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["ChrWlO2uIUAr1LntDg"]} -{"Format": "IDEA0", "ID": "f4168624-a468-426f-9609-5ccc6730ed9e", "DetectTime": "2023-10-30T14:05:05.960290+02:00", "EventTime": "2023-10-30T14:05:05.960308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C0XJs71eyBXXhXcvT6"]} -{"Format": "IDEA0", "ID": "31d97829-c729-486e-a301-f21051f50433", "DetectTime": "2023-10-30T14:05:06.006601+02:00", "EventTime": "2023-10-30T14:05:06.006620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cke9C74Tft4WH9zQG9"]} -{"Format": "IDEA0", "ID": "85636489-b495-4701-ae00-42a81ad679dd", "DetectTime": "2023-10-30T14:05:06.036024+02:00", "EventTime": "2023-10-30T14:05:06.036037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cx6chm2SrBUQ8rkmta"]} -{"Format": "IDEA0", "ID": "fbc18c7f-59bc-4929-a200-61b84b646cbb", "DetectTime": "2023-10-30T14:05:06.082419+02:00", "EventTime": "2023-10-30T14:05:06.082439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. ", "ContentType": "text/plain"}], "uids": ["CRaVzL3pPXsTeRIeM5"]} -{"Format": "IDEA0", "ID": "147b5384-7798-4b6a-9e15-9cd0ed6fd6ba", "DetectTime": "2023-10-30T14:05:06.128331+02:00", "EventTime": "2023-10-30T14:05:06.128350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwTkjC068FFdSXT39"]} -{"Format": "IDEA0", "ID": "8210ca10-2937-4062-a023-23651781b81b", "DetectTime": "2023-10-30T14:05:06.175608+02:00", "EventTime": "2023-10-30T14:05:06.175620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CrNULn2OL9SwYIhgOj"]} -{"Format": "Json", "ID": "8210ca10-2937-4062-a023-23651781b81b", "DetectTime": "2023-10-30T14:05:06.175608+02:00", "EventTime": "2023-10-30T14:05:06.175620+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:10:10.782715+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:06.289033)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a0e5b063-d0ab-4e19-9c1b-f6873754e576", "DetectTime": "2023-10-30T14:05:06.293146+02:00", "EventTime": "2023-10-30T14:05:06.293157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CImqqkWWaUCETexe9"]} -{"Format": "IDEA0", "ID": "51fdaeec-6d32-410e-9365-cd3f8763200f", "DetectTime": "2023-10-30T14:05:06.340709+02:00", "EventTime": "2023-10-30T14:05:06.340734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CHxf6V2VZrUsN01B0b"]} -{"Format": "IDEA0", "ID": "59ba2eb2-0b46-4546-ac1c-5bfb3dfcd175", "DetectTime": "2023-10-30T14:05:06.385429+02:00", "EventTime": "2023-10-30T14:05:06.385443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CDfGhe4XGC9U07SlK2"]} -{"Format": "IDEA0", "ID": "c6fda6b5-649a-40a8-a85e-b92fc4c76433", "DetectTime": "2023-10-30T14:05:06.430515+02:00", "EventTime": "2023-10-30T14:05:06.430533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Ceb52r4GRnw6Y6vEsd"]} -{"Format": "IDEA0", "ID": "8b94939f-5281-45de-931e-4bec3f9167cd", "DetectTime": "2023-10-30T14:05:06.474343+02:00", "EventTime": "2023-10-30T14:05:06.474360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CwI6y1So39uDZn9Af"]} -{"Format": "IDEA0", "ID": "36f24227-872e-4d37-b0a5-ce525ce8d311", "DetectTime": "2023-10-30T14:05:06.516123+02:00", "EventTime": "2023-10-30T14:05:06.516144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CQK3Dp1dsp3KmCDSq8"]} -{"Format": "IDEA0", "ID": "9b925fbd-682b-4166-ac84-3c212e8b1cb9", "DetectTime": "2023-10-30T14:05:06.560288+02:00", "EventTime": "2023-10-30T14:05:06.560315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CF82p33kAXMTLwJf3d"]} -{"Format": "IDEA0", "ID": "ceea314a-6891-41f1-a509-cf828d7a5863", "DetectTime": "2023-10-30T14:05:06.603633+02:00", "EventTime": "2023-10-30T14:05:06.603652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CUYCMdoMtREDYNmx6"]} -{"Format": "Json", "ID": "ceea314a-6891-41f1-a509-cf828d7a5863", "DetectTime": "2023-10-30T14:05:06.603633+02:00", "EventTime": "2023-10-30T14:05:06.603652+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:10:29.208309+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:06.686675)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f69eb1d0-fa60-4df2-9e01-d13939e200ad", "DetectTime": "2023-10-30T14:05:06.691970+02:00", "EventTime": "2023-10-30T14:05:06.691988+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDopKKq5m0vfT8Cm7"]} -{"Format": "IDEA0", "ID": "87f6c88c-a863-4575-8f86-ffd2556620f8", "DetectTime": "2023-10-30T14:05:06.701165+02:00", "EventTime": "2023-10-30T14:05:06.701185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["C3hYuL1i0bIWRyzO8a"]} -{"Format": "IDEA0", "ID": "5a160715-1ae3-4125-aeeb-548b147e0930", "DetectTime": "2023-10-30T14:05:06.745524+02:00", "EventTime": "2023-10-30T14:05:06.745544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CU3LA041caokmBKxvk"]} -{"Format": "IDEA0", "ID": "be3d1dda-bc3e-4426-a79e-f07bda5e7e26", "DetectTime": "2023-10-30T14:05:06.789771+02:00", "EventTime": "2023-10-30T14:05:06.789787+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CjLMSJ1p6oo6aoaPXh"]} -{"Format": "IDEA0", "ID": "3a83f7fc-590f-470a-8914-a398055d1cb8", "DetectTime": "2023-10-30T14:05:06.797605+02:00", "EventTime": "2023-10-30T14:05:06.797623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CpkSK2101KQEOpBod"]} -{"Format": "IDEA0", "ID": "1e52e94a-0c19-4dc8-80c8-9394f6fe4414", "DetectTime": "2023-10-30T14:05:06.845290+02:00", "EventTime": "2023-10-30T14:05:06.845309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6388], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. ", "ContentType": "text/plain"}], "uids": ["Ck6TNu4FKTtvPxwzOf"]} -{"Format": "IDEA0", "ID": "8bcae39a-cb7a-4ea0-a537-2ccd6a84aee7", "DetectTime": "2023-10-30T14:05:06.887166+02:00", "EventTime": "2023-10-30T14:05:06.887186+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQX7djYa58eqQCCN2"]} -{"Format": "IDEA0", "ID": "c542d173-39fb-43c9-8b6e-747e264d54c0", "DetectTime": "2023-10-30T14:05:06.894216+02:00", "EventTime": "2023-10-30T14:05:06.894243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CiSlr417pX39ey8Vd4"]} -{"Format": "IDEA0", "ID": "b89f3614-074c-4314-aac5-a599beabe289", "DetectTime": "2023-10-30T14:05:06.939401+02:00", "EventTime": "2023-10-30T14:05:06.939418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["CNtx0X1yRhhyykNa4a"]} -{"Format": "IDEA0", "ID": "51a3794b-1b0e-4ba0-9462-59353420f65e", "DetectTime": "2023-10-30T14:05:06.972035+02:00", "EventTime": "2023-10-30T14:05:06.972054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Crk0wCGy1DdCO0vkj"]} -{"Format": "IDEA0", "ID": "1a432256-462c-454b-b5c6-4d4007234af3", "DetectTime": "2023-10-30T14:05:07.015544+02:00", "EventTime": "2023-10-30T14:05:07.015566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["C5dJlM3yszoH76bDE1"]} -{"Format": "IDEA0", "ID": "d475a5e9-afdd-4927-af81-70a9a924601a", "DetectTime": "2023-10-30T14:05:07.062107+02:00", "EventTime": "2023-10-30T14:05:07.062139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CPzkmb1KXfdYVC3SGk"]} -{"Format": "Json", "ID": "d475a5e9-afdd-4927-af81-70a9a924601a", "DetectTime": "2023-10-30T14:05:07.062107+02:00", "EventTime": "2023-10-30T14:05:07.062139+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:10:48.423295+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:07.136815)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b7e5e79-0d3c-4db3-ab61-8163e414c8c1", "DetectTime": "2023-10-30T14:05:07.142274+02:00", "EventTime": "2023-10-30T14:05:07.142293+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CfHpYN1vj6FjogsT7"]} -{"Format": "IDEA0", "ID": "2e005c9f-3371-49cb-aee5-3170371e478f", "DetectTime": "2023-10-30T14:05:07.152223+02:00", "EventTime": "2023-10-30T14:05:07.152247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CcmW9Y1leyC7lo30R5"]} -{"Format": "IDEA0", "ID": "aa077301-1212-4a83-a00a-ce1ef236c9f5", "DetectTime": "2023-10-30T14:05:07.190894+02:00", "EventTime": "2023-10-30T14:05:07.190907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CstIdz3Yo176UP3Neb"]} -{"Format": "IDEA0", "ID": "d0d81302-cd23-4a20-a341-b3e1a45a5bea", "DetectTime": "2023-10-30T14:05:07.235524+02:00", "EventTime": "2023-10-30T14:05:07.235541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CPHZAA3CKki3AWoVle"]} -{"Format": "IDEA0", "ID": "3ceedfe6-97ca-4eda-b64b-6ffcc76d5f3e", "DetectTime": "2023-10-30T14:05:07.272405+02:00", "EventTime": "2023-10-30T14:05:07.272421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CwOv1yitWSGUkJek"]} -{"Format": "IDEA0", "ID": "df71dd35-d5b1-4c90-9eb5-f9815805028a", "DetectTime": "2023-10-30T14:05:07.315358+02:00", "EventTime": "2023-10-30T14:05:07.315374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CBnpSy1kcZ22nacBwb"]} -{"Format": "IDEA0", "ID": "34f1ab7a-b1a6-4fae-9999-738a4f341ec6", "DetectTime": "2023-10-30T14:05:07.345431+02:00", "EventTime": "2023-10-30T14:05:07.345452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CH348B2Gc6fkiZEvVl"]} -{"Format": "IDEA0", "ID": "13655e59-f482-4938-b306-a9812bdccaf9", "DetectTime": "2023-10-30T14:05:07.383454+02:00", "EventTime": "2023-10-30T14:05:07.383472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cy0Soi12W4XoZZv5M2"]} -{"Format": "IDEA0", "ID": "b50681aa-5c75-4572-b0e6-c34cd6ddb334", "DetectTime": "2023-10-30T14:05:07.423165+02:00", "EventTime": "2023-10-30T14:05:07.423181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CF2Z7j10UYCrF16IP6"]} -{"Format": "IDEA0", "ID": "caf0c6a5-dc22-4ea4-866e-dbb157201b3b", "DetectTime": "2023-10-30T14:05:07.463190+02:00", "EventTime": "2023-10-30T14:05:07.463212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C6xBYw0v2p2AzyIr3"]} -{"Format": "Json", "ID": "caf0c6a5-dc22-4ea4-866e-dbb157201b3b", "DetectTime": "2023-10-30T14:05:07.463190+02:00", "EventTime": "2023-10-30T14:05:07.463212+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:42:01.873614+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:07.612124)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5decf100-fe85-45e5-b449-9e12b4d5e9a5", "DetectTime": "2023-10-30T14:05:07.618179+02:00", "EventTime": "2023-10-30T14:05:07.618198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CyOP1W3PheExcq9Vh7"]} -{"Format": "IDEA0", "ID": "8f4dddbf-9407-49a8-85aa-bba8e7788709", "DetectTime": "2023-10-30T14:05:07.666124+02:00", "EventTime": "2023-10-30T14:05:07.666146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CPzwDW7enKKHjmNU7"]} -{"Format": "IDEA0", "ID": "f8620947-5ce7-4cae-83a0-26625ecb99fe", "DetectTime": "2023-10-30T14:05:07.710108+02:00", "EventTime": "2023-10-30T14:05:07.710129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CoMtzc2O0oy2UQk6A4"]} -{"Format": "IDEA0", "ID": "8b79292e-e3c4-467b-b997-78c4d646248a", "DetectTime": "2023-10-30T14:05:07.752411+02:00", "EventTime": "2023-10-30T14:05:07.752437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CSS6dp1pIqIqhQLzR5"]} -{"Format": "IDEA0", "ID": "64332f1c-6eb9-4136-be17-badd1abb2933", "DetectTime": "2023-10-30T14:05:07.796433+02:00", "EventTime": "2023-10-30T14:05:07.796457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cg2Tac4p1Nx8hvX3qi"]} -{"Format": "IDEA0", "ID": "f5cf0f63-7765-4c22-992d-a8dace58ec9d", "DetectTime": "2023-10-30T14:05:07.838659+02:00", "EventTime": "2023-10-30T14:05:07.838672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["Cgz3zI1im2rlNFuIA6"]} -{"Format": "IDEA0", "ID": "65daa98a-0f6c-4ae7-987f-bc54cb2357cc", "DetectTime": "2023-10-30T14:05:07.884390+02:00", "EventTime": "2023-10-30T14:05:07.884416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CC5SUvXpjC6IBHA2d"]} -{"Format": "IDEA0", "ID": "9a40918e-d41f-4fdd-be31-9ea02103639e", "DetectTime": "2023-10-30T14:05:07.927915+02:00", "EventTime": "2023-10-30T14:05:07.927932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CFCRFw4Wt23kjkOcfc"]} -{"Format": "Json", "ID": "9a40918e-d41f-4fdd-be31-9ea02103639e", "DetectTime": "2023-10-30T14:05:07.927915+02:00", "EventTime": "2023-10-30T14:05:07.927932+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:42:03.682566+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:08.008470)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cc3a9e01-08cf-4bef-897a-a51ba47f8296", "DetectTime": "2023-10-30T14:05:08.014532+02:00", "EventTime": "2023-10-30T14:05:08.014550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CRMIeU2OFWdSwleLB2"]} -{"Format": "IDEA0", "ID": "614a10a3-abcb-4354-932b-b8b3dd9ae626", "DetectTime": "2023-10-30T14:05:08.058734+02:00", "EventTime": "2023-10-30T14:05:08.058759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["Cecjdk3L9ZUUKpM9M5"]} -{"Format": "IDEA0", "ID": "0d8a1a40-b899-4c2a-976c-51642a0455af", "DetectTime": "2023-10-30T14:05:08.099197+02:00", "EventTime": "2023-10-30T14:05:08.099223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CC6Dt11aHqIJzRb3Fd"]} -{"Format": "IDEA0", "ID": "ffacd25e-25ee-4683-b40f-f46b634715a2", "DetectTime": "2023-10-30T14:05:08.139793+02:00", "EventTime": "2023-10-30T14:05:08.139810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CjlvGricqtFhSVNKh"]} -{"Format": "IDEA0", "ID": "c738522d-52f5-490b-ad9e-335e18ac7319", "DetectTime": "2023-10-30T14:05:08.182180+02:00", "EventTime": "2023-10-30T14:05:08.182202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CCH1SqMuYkRniOdLb"]} -{"Format": "IDEA0", "ID": "69ef28ab-d3bc-4823-817b-696dbe426c71", "DetectTime": "2023-10-30T14:05:08.219238+02:00", "EventTime": "2023-10-30T14:05:08.219255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CkVnTp3pvJo5bz6xic"]} -{"Format": "IDEA0", "ID": "efbf7a72-60cc-47b0-8380-811ba959cb38", "DetectTime": "2023-10-30T14:05:08.255761+02:00", "EventTime": "2023-10-30T14:05:08.255780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cp1SKf3eOyUYJ2Q2Ec"]} -{"Format": "IDEA0", "ID": "0616cc18-2757-418b-928a-ba64489f58d0", "DetectTime": "2023-10-30T14:05:08.296714+02:00", "EventTime": "2023-10-30T14:05:08.296735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["Cy6u8q2YUEIZ3drIKi"]} -{"Format": "IDEA0", "ID": "73406aa5-9b16-4164-be5f-56ba9b585bf2", "DetectTime": "2023-10-30T14:05:08.341396+02:00", "EventTime": "2023-10-30T14:05:08.341414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.200.221.34 ", "ContentType": "text/plain"}], "uids": ["CF94CE1HQdMGx4fsni"]} -{"Format": "IDEA0", "ID": "9ef994db-d648-42a1-8a80-fdd6518620b8", "DetectTime": "2023-10-30T14:05:08.379637+02:00", "EventTime": "2023-10-30T14:05:08.379655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C7V7eD255xsDSrsKx8"]} -{"Format": "Json", "ID": "9ef994db-d648-42a1-8a80-fdd6518620b8", "DetectTime": "2023-10-30T14:05:08.379637+02:00", "EventTime": "2023-10-30T14:05:08.379655+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:42:04.974316+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:08.463922)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c892f272-ca0a-408a-ac8d-4833f6f020bd", "DetectTime": "2023-10-30T14:05:08.469481+02:00", "EventTime": "2023-10-30T14:05:08.469501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["Cny9Sm1DJthEjCxno6"]} -{"Format": "IDEA0", "ID": "96283501-337f-4101-86fa-fe608a8f0ee1", "DetectTime": "2023-10-30T14:05:08.516929+02:00", "EventTime": "2023-10-30T14:05:08.516957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CluqnH3TbXcDGwTU14"]} -{"Format": "IDEA0", "ID": "67d642b3-00d9-4b89-ba78-27b7144f2143", "DetectTime": "2023-10-30T14:05:08.558136+02:00", "EventTime": "2023-10-30T14:05:08.558165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["Cv38o03VHXay7xzfnd"]} -{"Format": "IDEA0", "ID": "e7269eaf-e76d-464c-b7b5-508d05d116d2", "DetectTime": "2023-10-30T14:05:08.595840+02:00", "EventTime": "2023-10-30T14:05:08.595861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVWCWu3PVI0XpJZaG1"]} -{"Format": "IDEA0", "ID": "ecc3a395-fa30-4ab9-9bc8-8eb7ca479434", "DetectTime": "2023-10-30T14:05:08.637203+02:00", "EventTime": "2023-10-30T14:05:08.637219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CvLLrt0l6fnB5Mfai"]} -{"Format": "IDEA0", "ID": "4008912d-37dc-4ce1-a0b8-c88ce9b63db6", "DetectTime": "2023-10-30T14:05:08.673440+02:00", "EventTime": "2023-10-30T14:05:08.673454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. ", "ContentType": "text/plain"}], "uids": ["C5xkpB2uwTSQjZpDH"]} -{"Format": "IDEA0", "ID": "a05d8671-2f4c-4492-9714-3a2f45b7e89a", "DetectTime": "2023-10-30T14:05:08.709406+02:00", "EventTime": "2023-10-30T14:05:08.709427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18246], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18246/UDP destination IP 181.64.105.137. ", "ContentType": "text/plain"}], "uids": ["C6FsU42ypMjxRpfDJb"]} -{"Format": "IDEA0", "ID": "b103be76-c53f-41f5-8122-b6cc1bf9318c", "DetectTime": "2023-10-30T14:05:08.751930+02:00", "EventTime": "2023-10-30T14:05:08.751956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10849], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. ", "ContentType": "text/plain"}], "uids": ["Cmgen12o9Ie6IdMVd1"]} -{"Format": "Json", "ID": "b103be76-c53f-41f5-8122-b6cc1bf9318c", "DetectTime": "2023-10-30T14:05:08.751930+02:00", "EventTime": "2023-10-30T14:05:08.751956+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10849], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:44:45.830355+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:08.833169)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6243e211-7404-47b1-8a27-f0325a3262a7", "DetectTime": "2023-10-30T14:05:08.840430+02:00", "EventTime": "2023-10-30T14:05:08.840443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CC7i8RClAzUYDBuj6"]} -{"Format": "IDEA0", "ID": "2fb7501d-6374-48d0-94ae-74ae73a5a81d", "DetectTime": "2023-10-30T14:05:08.885646+02:00", "EventTime": "2023-10-30T14:05:08.885670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["C5hkfpmWJYYBuzgu6"]} -{"Format": "IDEA0", "ID": "05c48371-5477-4ec6-9864-0a825bd9e846", "DetectTime": "2023-10-30T14:05:08.917200+02:00", "EventTime": "2023-10-30T14:05:08.917218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cw9VFH39n40ailUez7"]} -{"Format": "IDEA0", "ID": "16cd8d30-febc-4661-9656-190080b943cd", "DetectTime": "2023-10-30T14:05:08.962519+02:00", "EventTime": "2023-10-30T14:05:08.962543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9794], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9794/UDP destination IP 74.88.250.25. ", "ContentType": "text/plain"}], "uids": ["CPeYLX1eajYY5rX07b"]} -{"Format": "IDEA0", "ID": "4e468667-797a-451a-aa75-0180f81855ec", "DetectTime": "2023-10-30T14:05:09.003286+02:00", "EventTime": "2023-10-30T14:05:09.003306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["CwgmiW2oWAXAKi661d"]} -{"Format": "IDEA0", "ID": "69d328ca-a5c5-4c55-a5f2-ac374f17d3b3", "DetectTime": "2023-10-30T14:05:09.037009+02:00", "EventTime": "2023-10-30T14:05:09.037029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. ", "ContentType": "text/plain"}], "uids": ["CeGvnX2MiymeEv3zS9"]} -{"Format": "IDEA0", "ID": "485e78ca-e516-49a7-8f8e-ce8309c7520a", "DetectTime": "2023-10-30T14:05:09.073541+02:00", "EventTime": "2023-10-30T14:05:09.073558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3057], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3057/UDP destination IP 60.164.177.244. ", "ContentType": "text/plain"}], "uids": ["C3CHuV3R5ehmfUkdFi"]} -{"Format": "IDEA0", "ID": "b16cd852-4554-4654-9dcb-be796f95e462", "DetectTime": "2023-10-30T14:05:09.107962+02:00", "EventTime": "2023-10-30T14:05:09.107980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CDopKKq5m0vfT8Cm7", "CntOEa2zoAY9sDdV12", "CQX7djYa58eqQCCN2", "C1Xzu9p3D2AFGXhwd"]} -{"Format": "IDEA0", "ID": "5cb8d39d-803d-4fcd-9cfb-0f1f1f3fca4a", "DetectTime": "2023-10-30T14:05:09.116093+02:00", "EventTime": "2023-10-30T14:05:09.116114+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CntOEa2zoAY9sDdV12"]} -{"Format": "IDEA0", "ID": "ec969d71-1748-484e-b7f6-e5f71563608e", "DetectTime": "2023-10-30T14:05:09.124937+02:00", "EventTime": "2023-10-30T14:05:09.124954+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAqz5M2LJJ5E5qbzmf"]} -{"Format": "IDEA0", "ID": "fa7637cc-3b53-4130-adaf-0004737fc6f3", "DetectTime": "2023-10-30T14:05:09.133790+02:00", "EventTime": "2023-10-30T14:05:09.133806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CvOwHK2KoZSIB1WHe8"]} -{"Format": "IDEA0", "ID": "1ef41237-d736-4a40-999b-cb95cf0753bc", "DetectTime": "2023-10-30T14:05:09.167148+02:00", "EventTime": "2023-10-30T14:05:09.167166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.198. ", "ContentType": "text/plain"}], "uids": ["CbasyA3qh5wbmLeDHb"]} -{"Format": "Json", "ID": "1ef41237-d736-4a40-999b-cb95cf0753bc", "DetectTime": "2023-10-30T14:05:09.167148+02:00", "EventTime": "2023-10-30T14:05:09.167166+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T06:47:03.849987+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2023/10/30 14:05:09.241957)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "741760ff-283a-4355-aef0-4b1433c3e5e6", "DetectTime": "2023-10-30T14:05:09.250175+02:00", "EventTime": "2023-10-30T14:05:09.250198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CbsxJd1FHNrYEKlcs8"]} -{"Format": "IDEA0", "ID": "5a5817c2-10a1-4ecc-b376-030358e2ea9b", "DetectTime": "2023-10-30T14:05:09.288174+02:00", "EventTime": "2023-10-30T14:05:09.288195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11677], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11677/UDP destination IP 36.83.113.195. ", "ContentType": "text/plain"}], "uids": ["CuolWnLaRbs4kCM41"]} -{"Format": "IDEA0", "ID": "a2c4f3ed-9e40-4b2e-8189-72f193fd7508", "DetectTime": "2023-10-30T14:05:09.319147+02:00", "EventTime": "2023-10-30T14:05:09.319160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.117.42.122 ", "ContentType": "text/plain"}], "uids": ["CgTmEJ1jT0Ab7xtHjf"]} -{"Format": "IDEA0", "ID": "f080610e-6342-4684-a6ee-854d549ef9a6", "DetectTime": "2023-10-30T14:05:09.359123+02:00", "EventTime": "2023-10-30T14:05:09.359141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaK5Wf34PnsTrd1gi6"]} -{"Format": "IDEA0", "ID": "a05cf5a0-47a7-4918-a935-29fead861138", "DetectTime": "2023-10-30T14:05:09.415984+02:00", "EventTime": "2023-10-30T14:05:09.416012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27555], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 27555/TCP destination IP 77.50.112.98. ", "ContentType": "text/plain"}], "uids": ["CJqQeAfUobQWLyome"]} -{"Format": "IDEA0", "ID": "aca93b2d-e50c-492f-9da9-1ad5d8e2457c", "DetectTime": "2023-10-30T14:05:09.474336+02:00", "EventTime": "2023-10-30T14:05:09.474356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.182 ", "ContentType": "text/plain"}], "uids": ["CXy8JW2ekCQZThsSVa"]} -{"Format": "IDEA0", "ID": "044b7fa4-2e62-4d49-ab4a-cef39b246971", "DetectTime": "2023-10-30T14:05:09.508713+02:00", "EventTime": "2023-10-30T14:05:09.508733+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C6nnxb9peT2Uf5Tg9"]} -{"Format": "IDEA0", "ID": "c76c7cad-c7f7-4076-8b4f-8c12daf74cbf", "DetectTime": "2023-10-30T14:05:09.517379+02:00", "EventTime": "2023-10-30T14:05:09.517394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CV5m464HB7l1FWIW54"]} -{"Format": "IDEA0", "ID": "01fb07f7-db0e-4fad-8803-a174bb242582", "DetectTime": "2023-10-30T14:05:09.572801+02:00", "EventTime": "2023-10-30T14:05:09.572819+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CT97sGKuf23FkFzA4"]} -{"Format": "IDEA0", "ID": "d2334420-dd4e-4918-9405-b25b6bc09622", "DetectTime": "2023-10-30T14:05:09.581674+02:00", "EventTime": "2023-10-30T14:05:09.581696+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAJUG44Q8nlQ0sMnK6"]} -{"Format": "IDEA0", "ID": "9b649315-44a1-45d0-96e0-37d047504c2b", "DetectTime": "2023-10-30T14:05:09.589398+02:00", "EventTime": "2023-10-30T14:05:09.589410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CDjzix2ZSiaD3gnJG"]} -{"Format": "IDEA0", "ID": "98b7cd6d-bb44-46e7-8eee-9f5679410939", "DetectTime": "2023-10-30T14:05:09.642122+02:00", "EventTime": "2023-10-30T14:05:09.642135+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cu5ffEvUUaR4uHGAi"]} -{"Format": "IDEA0", "ID": "b4414be8-9316-4ac7-b99d-ad06cacdf6ce", "DetectTime": "2023-10-30T14:05:09.650436+02:00", "EventTime": "2023-10-30T14:05:09.650450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CBXOy237nfWAzltWl3"]} -{"Format": "IDEA0", "ID": "7675ddef-e48d-4391-9265-7e93ebd22363", "DetectTime": "2023-10-30T14:05:09.790444+02:00", "EventTime": "2023-10-30T14:05:09.790470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C508Ou2mw4RNjg4Gt9"]} -{"Format": "Json", "ID": "7675ddef-e48d-4391-9265-7e93ebd22363", "DetectTime": "2023-10-30T14:05:09.790444+02:00", "EventTime": "2023-10-30T14:05:09.790470+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:17:36.465067+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:09.955997)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "59a4b8f6-21c4-4d46-8018-b9842b9a7c49", "DetectTime": "2023-10-30T14:05:09.962347+02:00", "EventTime": "2023-10-30T14:05:09.962368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C0Zo5o3KbxsiSMFyQc"]} -{"Format": "IDEA0", "ID": "6409a805-d6c5-49c9-9636-de3decb43161", "DetectTime": "2023-10-30T14:05:10.030286+02:00", "EventTime": "2023-10-30T14:05:10.030307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CCTRENH6ZY8DBMZX1"]} -{"Format": "IDEA0", "ID": "b657b6fc-a7b2-4a31-aebf-b75ae8069fb2", "DetectTime": "2023-10-30T14:05:10.128450+02:00", "EventTime": "2023-10-30T14:05:10.128471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CjQISU1cjvOkJQhL2i"]} -{"Format": "IDEA0", "ID": "d296b4c2-1587-4f6a-8b85-064ef765b739", "DetectTime": "2023-10-30T14:05:10.200903+02:00", "EventTime": "2023-10-30T14:05:10.200919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["C4CCSq3u4xllkEMW5"]} -{"Format": "IDEA0", "ID": "c68f7094-4b6e-4f6c-805b-1576232ab1f1", "DetectTime": "2023-10-30T14:05:10.260748+02:00", "EventTime": "2023-10-30T14:05:10.260765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["Cw6PL44yJkq7KRqT3h"]} -{"Format": "IDEA0", "ID": "3897a25a-c26b-416c-ad7d-295211028073", "DetectTime": "2023-10-30T14:05:10.321878+02:00", "EventTime": "2023-10-30T14:05:10.321899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CFreSV18dbfMFs1oe1"]} -{"Format": "IDEA0", "ID": "d343a153-a5d9-45dc-801a-b0e75a6afd5a", "DetectTime": "2023-10-30T14:05:10.379882+02:00", "EventTime": "2023-10-30T14:05:10.379899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CR9CeI2HgOsFk25Vsa"]} -{"Format": "IDEA0", "ID": "634b69e1-435c-4043-bda0-a1095045bf6f", "DetectTime": "2023-10-30T14:05:10.473130+02:00", "EventTime": "2023-10-30T14:05:10.473148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.65.46.79 ", "ContentType": "text/plain"}], "uids": ["CyxWoP2gVHhpTDl8yl"]} -{"Format": "IDEA0", "ID": "9eb4aedd-d2c7-49c7-81e0-a7f10200e3c3", "DetectTime": "2023-10-30T14:05:10.520865+02:00", "EventTime": "2023-10-30T14:05:10.520892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CIdnJb1aVvZ17hK10g"]} -{"Format": "Json", "ID": "9eb4aedd-d2c7-49c7-81e0-a7f10200e3c3", "DetectTime": "2023-10-30T14:05:10.520865+02:00", "EventTime": "2023-10-30T14:05:10.520892+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:17:38.111020+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:10.646713)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "41aa13d1-7b5e-4a18-855b-e655146ef2e0", "DetectTime": "2023-10-30T14:05:10.654272+02:00", "EventTime": "2023-10-30T14:05:10.654298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["C9kzmZ2SGQsffzUare"]} -{"Format": "IDEA0", "ID": "27d9a486-0142-4c6c-8e0a-a6abef315905", "DetectTime": "2023-10-30T14:05:10.721924+02:00", "EventTime": "2023-10-30T14:05:10.721952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CTHlUZ1FpQpzhdCMEj"]} -{"Format": "IDEA0", "ID": "19a71374-7367-47a2-9096-7d78db45445d", "DetectTime": "2023-10-30T14:05:10.784509+02:00", "EventTime": "2023-10-30T14:05:10.784526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["C1dtmeAqgMneLeWPf"]} -{"Format": "IDEA0", "ID": "81f8dd0d-571d-4294-8083-d7329b8cddfc", "DetectTime": "2023-10-30T14:05:10.843954+02:00", "EventTime": "2023-10-30T14:05:10.844020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CRydEY3il79s5e3je4"]} -{"Format": "IDEA0", "ID": "226b57b1-46a9-4ef4-8b80-47062a542ae1", "DetectTime": "2023-10-30T14:05:10.903480+02:00", "EventTime": "2023-10-30T14:05:10.903498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["C8DvvB2f7lY6avzFXk"]} -{"Format": "IDEA0", "ID": "99f702c4-0c31-4bb7-a116-f55f53c49a40", "DetectTime": "2023-10-30T14:05:10.959331+02:00", "EventTime": "2023-10-30T14:05:10.959348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CpTchq3pd2AaGjQNu6"]} -{"Format": "IDEA0", "ID": "3df6811f-5de8-43ad-92ee-ae0a2be5bb89", "DetectTime": "2023-10-30T14:05:11.026240+02:00", "EventTime": "2023-10-30T14:05:11.026265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ChEzJw3o8KJlvDZHJf"]} -{"Format": "IDEA0", "ID": "4d881bfa-c11d-4408-9608-eb582a8fe7a8", "DetectTime": "2023-10-30T14:05:11.091886+02:00", "EventTime": "2023-10-30T14:05:11.091908+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CvVQe342ufiyd1CUal"]} -{"Format": "IDEA0", "ID": "2fa7a38c-b090-40bb-a3d5-50d00a67ed40", "DetectTime": "2023-10-30T14:05:11.102295+02:00", "EventTime": "2023-10-30T14:05:11.102311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["ChH4PHx8XBIxwbtz6"]} -{"Format": "Json", "ID": "2fa7a38c-b090-40bb-a3d5-50d00a67ed40", "DetectTime": "2023-10-30T14:05:11.102295+02:00", "EventTime": "2023-10-30T14:05:11.102311+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:17:39.902958+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:11.201269)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f4156963-e6f6-4283-9473-a69deabc52d4", "DetectTime": "2023-10-30T14:05:11.207390+02:00", "EventTime": "2023-10-30T14:05:11.207408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CqtPaA3qwO4010no15"]} -{"Format": "IDEA0", "ID": "ed61e3dd-21f2-4554-9b41-a3f1fc7519b3", "DetectTime": "2023-10-30T14:05:11.267488+02:00", "EventTime": "2023-10-30T14:05:11.267508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C6WP8Z1ixCwCcVmxN2"]} -{"Format": "IDEA0", "ID": "3e08b83f-0eda-4130-8392-7dc36f3cabe6", "DetectTime": "2023-10-30T14:05:11.329167+02:00", "EventTime": "2023-10-30T14:05:11.329195+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyNsIPCjPN5tlrrN2"]} -{"Format": "IDEA0", "ID": "99e0f0fd-4a1d-4ecc-8562-c5ce5b34cd03", "DetectTime": "2023-10-30T14:05:11.338343+02:00", "EventTime": "2023-10-30T14:05:11.338363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CG2nhQPhQKfeIrgy6"]} -{"Format": "IDEA0", "ID": "931d3ace-5bd6-4761-85ef-24c5feed7e1c", "DetectTime": "2023-10-30T14:05:11.395350+02:00", "EventTime": "2023-10-30T14:05:11.395369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CVY1Ed1HrCbyJE4VVj"]} -{"Format": "IDEA0", "ID": "251ed3e6-fadf-4a8b-9f7c-5e54b5882d76", "DetectTime": "2023-10-30T14:05:11.451903+02:00", "EventTime": "2023-10-30T14:05:11.451929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CeSpW64HQV2p22haf"]} -{"Format": "IDEA0", "ID": "ebc64599-1e7b-4a1a-9257-f2a65b55bc88", "DetectTime": "2023-10-30T14:05:11.503598+02:00", "EventTime": "2023-10-30T14:05:11.503621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. ", "ContentType": "text/plain"}], "uids": ["C1Dd5i3IC55sVPSX61"]} -{"Format": "IDEA0", "ID": "ef072876-8cea-42e5-9a32-dbca9f9e4d7f", "DetectTime": "2023-10-30T14:05:11.551409+02:00", "EventTime": "2023-10-30T14:05:11.551428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10849], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. ", "ContentType": "text/plain"}], "uids": ["C859u1WjS2BQICIu2"]} -{"Format": "IDEA0", "ID": "8c18eee3-3ba6-418f-a9c1-9d733db6ace3", "DetectTime": "2023-10-30T14:05:11.598088+02:00", "EventTime": "2023-10-30T14:05:11.598111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["C7VHQfdQNGjeA7IAd"]} -{"Format": "Json", "ID": "8c18eee3-3ba6-418f-a9c1-9d733db6ace3", "DetectTime": "2023-10-30T14:05:11.598088+02:00", "EventTime": "2023-10-30T14:05:11.598111+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:17:57.799243+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:11.681363)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "755ef704-60c3-4d8a-a22c-b9eb1d0c2d2b", "DetectTime": "2023-10-30T14:05:11.688124+02:00", "EventTime": "2023-10-30T14:05:11.688145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3653], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. ", "ContentType": "text/plain"}], "uids": ["CBtInHiIEEsVBfNui"]} -{"Format": "IDEA0", "ID": "5ec4764e-3f69-43a5-8b75-588a5b6967c9", "DetectTime": "2023-10-30T14:05:11.745465+02:00", "EventTime": "2023-10-30T14:05:11.745484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["CYpwi2478Q8quPKiPh"]} -{"Format": "IDEA0", "ID": "ab38c424-4659-4b92-9bdf-8ab72b714bdc", "DetectTime": "2023-10-30T14:05:11.796575+02:00", "EventTime": "2023-10-30T14:05:11.796593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. ", "ContentType": "text/plain"}], "uids": ["CPRw5G4UuxqshgQstg"]} -{"Format": "IDEA0", "ID": "68418ad0-77ea-4452-be5f-3f2d9314cfa6", "DetectTime": "2023-10-30T14:05:11.845487+02:00", "EventTime": "2023-10-30T14:05:11.845504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3057], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3057/UDP destination IP 60.164.177.244. ", "ContentType": "text/plain"}], "uids": ["Cw82dF4uV84OMnHmg5"]} -{"Format": "IDEA0", "ID": "4c97b953-0e88-4ee7-ba5e-458e1cfc5ce5", "DetectTime": "2023-10-30T14:05:11.892009+02:00", "EventTime": "2023-10-30T14:05:11.892025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CjOl9v2q8MwkG6ZAk6"]} -{"Format": "IDEA0", "ID": "08aa22bb-74b4-4c9a-bf97-591196de7fa4", "DetectTime": "2023-10-30T14:05:11.938311+02:00", "EventTime": "2023-10-30T14:05:11.938328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9546], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.198. ", "ContentType": "text/plain"}], "uids": ["CVlqu53ZEJ7eWoFaf4"]} -{"Format": "IDEA0", "ID": "4d2f1434-25d7-4e8e-913b-7b96f1dda6fc", "DetectTime": "2023-10-30T14:05:11.987005+02:00", "EventTime": "2023-10-30T14:05:11.987025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.200.221.34 ", "ContentType": "text/plain"}], "uids": ["CftaZO1pZsqzpwK77i"]} -{"Format": "IDEA0", "ID": "f7e5aed5-4e8a-44b4-80ea-d95d60f8d066", "DetectTime": "2023-10-30T14:05:12.028433+02:00", "EventTime": "2023-10-30T14:05:12.028454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CxthmP10Bypb6iieZ2"]} -{"Format": "IDEA0", "ID": "bfc158fb-5393-42d1-a70e-e4bf341358d2", "DetectTime": "2023-10-30T14:05:12.082576+02:00", "EventTime": "2023-10-30T14:05:12.082595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11677], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11677/UDP destination IP 36.83.113.195. ", "ContentType": "text/plain"}], "uids": ["Cv9jiq2TdDqg7cdfug"]} -{"Format": "Json", "ID": "bfc158fb-5393-42d1-a70e-e4bf341358d2", "DetectTime": "2023-10-30T14:05:12.082576+02:00", "EventTime": "2023-10-30T14:05:12.082595+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11677], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:18:19.937000+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:12.186436)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8714c49f-b2f1-44bb-b37f-346db771958e", "DetectTime": "2023-10-30T14:05:12.192915+02:00", "EventTime": "2023-10-30T14:05:12.192940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CDYv6T2cVcpVJaPdXc"]} -{"Format": "IDEA0", "ID": "e0fa69fe-17ca-46a9-baa5-134bee4d0a8c", "DetectTime": "2023-10-30T14:05:12.237962+02:00", "EventTime": "2023-10-30T14:05:12.237984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C6nnxb9peT2Uf5Tg9", "CvVQe342ufiyd1CUal", "C1Iti9IuzD7egOkWd", "CAJUG44Q8nlQ0sMnK6"]} -{"Format": "IDEA0", "ID": "40913ea2-299b-4adc-b31f-b2963f1f2f3b", "DetectTime": "2023-10-30T14:05:12.246621+02:00", "EventTime": "2023-10-30T14:05:12.246662+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1Iti9IuzD7egOkWd"]} -{"Format": "IDEA0", "ID": "67cd78ee-02d6-4e58-946b-212bb15e67d2", "DetectTime": "2023-10-30T14:05:12.255353+02:00", "EventTime": "2023-10-30T14:05:12.255373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CO2iUS3zbCS7t4dMGd"]} -{"Format": "IDEA0", "ID": "ba8c1548-73cb-4011-b496-d82cc27d429d", "DetectTime": "2023-10-30T14:05:12.298262+02:00", "EventTime": "2023-10-30T14:05:12.298283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C2LzCADz31CeCvkJg"]} -{"Format": "IDEA0", "ID": "537cf207-2480-4292-8c1c-161bf14ede21", "DetectTime": "2023-10-30T14:05:12.337491+02:00", "EventTime": "2023-10-30T14:05:12.337518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CzoFx2v1Isj9wGijb"]} -{"Format": "IDEA0", "ID": "2dad5ff0-1b35-46e9-b1de-4eeb1e725e1f", "DetectTime": "2023-10-30T14:05:12.385055+02:00", "EventTime": "2023-10-30T14:05:12.385079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CVizRRAm7GCEtrDZ5"]} -{"Format": "IDEA0", "ID": "e22b3e9d-0263-483c-8211-e305a0ceabb0", "DetectTime": "2023-10-30T14:05:12.427079+02:00", "EventTime": "2023-10-30T14:05:12.427098+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CDunPe4m4VDFSI1ei8"]} -{"Format": "IDEA0", "ID": "25fa5e73-a888-46d3-ac1d-3bbc312d608e", "DetectTime": "2023-10-30T14:05:12.435153+02:00", "EventTime": "2023-10-30T14:05:12.435173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CxatN93Yaf5epzyjVa"]} -{"Format": "IDEA0", "ID": "fb071f8e-3fe0-4812-be63-409577793c38", "DetectTime": "2023-10-30T14:05:12.481872+02:00", "EventTime": "2023-10-30T14:05:12.481898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["C3v94b33iM6BTNeNVg"]} -{"Format": "IDEA0", "ID": "dc9491c2-0990-4932-910a-e0bfd5d6593e", "DetectTime": "2023-10-30T14:05:12.524061+02:00", "EventTime": "2023-10-30T14:05:12.524079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Ct4mKd21VCTLm38O0j"]} -{"Format": "Json", "ID": "dc9491c2-0990-4932-910a-e0bfd5d6593e", "DetectTime": "2023-10-30T14:05:12.524061+02:00", "EventTime": "2023-10-30T14:05:12.524079+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:49:24.043540+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:12.599142)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "832bc669-9e58-48ae-a6cf-a5f571564af2", "DetectTime": "2023-10-30T14:05:12.605040+02:00", "EventTime": "2023-10-30T14:05:12.605057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CZTzmk1AyR2yZoOZh5"]} -{"Format": "IDEA0", "ID": "9c976a9b-62e0-4591-a332-f5123e7886e1", "DetectTime": "2023-10-30T14:05:12.649472+02:00", "EventTime": "2023-10-30T14:05:12.649492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CKtj7W2LP6j5kfPQh1"]} -{"Format": "IDEA0", "ID": "8b1d0704-f92b-442c-9ac0-146c874f5c43", "DetectTime": "2023-10-30T14:05:12.692142+02:00", "EventTime": "2023-10-30T14:05:12.692165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["Cd21lj117jf5EwMVr4"]} -{"Format": "IDEA0", "ID": "7e09a098-79f0-4519-ac31-62048cdb950f", "DetectTime": "2023-10-30T14:05:12.736783+02:00", "EventTime": "2023-10-30T14:05:12.736798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["Cdz7nL2lzFrC0A5356"]} -{"Format": "IDEA0", "ID": "c1946400-652d-4a1a-b748-da7b709a41f8", "DetectTime": "2023-10-30T14:05:12.778512+02:00", "EventTime": "2023-10-30T14:05:12.778534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CQvSVD1eo7ejfZSC2f"]} -{"Format": "IDEA0", "ID": "62353f35-6bee-42d4-909d-fb78cebf2ee1", "DetectTime": "2023-10-30T14:05:12.821166+02:00", "EventTime": "2023-10-30T14:05:12.821179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["ClT1SJ1ZJlZNSukAyi"]} -{"Format": "IDEA0", "ID": "6124df99-5cfc-4cc8-8bb1-c7d4ced51608", "DetectTime": "2023-10-30T14:05:12.982409+02:00", "EventTime": "2023-10-30T14:05:12.982427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqkUN44MwVDBJoYOOd"]} -{"Format": "IDEA0", "ID": "c1840d71-b489-42a1-85e7-6ac663b6c52e", "DetectTime": "2023-10-30T14:05:13.032231+02:00", "EventTime": "2023-10-30T14:05:13.032248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CpeDQP1SlbEJQIUj9e"]} -{"Format": "Json", "ID": "c1840d71-b489-42a1-85e7-6ac663b6c52e", "DetectTime": "2023-10-30T14:05:13.032231+02:00", "EventTime": "2023-10-30T14:05:13.032248+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:49:25.817698+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:13.108307)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e0fcf674-76e6-446a-9b3a-98b2ec27446d", "DetectTime": "2023-10-30T14:05:13.114122+02:00", "EventTime": "2023-10-30T14:05:13.114139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["CBISgg2EfxTpwVJ2R7"]} -{"Format": "IDEA0", "ID": "6a196db8-043b-4ff6-aafd-b981d01bd63e", "DetectTime": "2023-10-30T14:05:13.160745+02:00", "EventTime": "2023-10-30T14:05:13.160766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CMXWB145enJwkcFdM"]} -{"Format": "IDEA0", "ID": "d1fdb4bd-447f-4905-bf28-13e29f7dcd27", "DetectTime": "2023-10-30T14:05:13.203712+02:00", "EventTime": "2023-10-30T14:05:13.203728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CdxzKuBuGxAOK4C63"]} -{"Format": "IDEA0", "ID": "6978efed-4cc9-4cc2-bc40-3d45d1f421c3", "DetectTime": "2023-10-30T14:05:13.248621+02:00", "EventTime": "2023-10-30T14:05:13.248647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CGLYjl3uDwJ2fuHUmc"]} -{"Format": "IDEA0", "ID": "980b7118-0b9a-4838-a7d9-c62a7e5537b8", "DetectTime": "2023-10-30T14:05:13.295345+02:00", "EventTime": "2023-10-30T14:05:13.295367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CccqAeOLg9hCT81R2"]} -{"Format": "IDEA0", "ID": "b3877570-c268-4d90-895c-b299670a58eb", "DetectTime": "2023-10-30T14:05:13.337876+02:00", "EventTime": "2023-10-30T14:05:13.337898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CU0rc945nQswfSTPr9"]} -{"Format": "IDEA0", "ID": "482a49bf-4255-49a0-bb25-f756edf0feae", "DetectTime": "2023-10-30T14:05:13.394340+02:00", "EventTime": "2023-10-30T14:05:13.394360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CeDI5J3VCAgVqC5Pt9"]} -{"Format": "IDEA0", "ID": "58ecb99b-1be3-4e6a-b8ad-61942daacfc8", "DetectTime": "2023-10-30T14:05:13.441068+02:00", "EventTime": "2023-10-30T14:05:13.441095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CD8Xaw1Z0v2KphJe4k"]} -{"Format": "Json", "ID": "58ecb99b-1be3-4e6a-b8ad-61942daacfc8", "DetectTime": "2023-10-30T14:05:13.441068+02:00", "EventTime": "2023-10-30T14:05:13.441095+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:49:28.171697+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:13.527618)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f6147e8e-d42f-44e7-b413-c9de0cca85bb", "DetectTime": "2023-10-30T14:05:13.533406+02:00", "EventTime": "2023-10-30T14:05:13.533425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CKaqJcey7l6BJslbh"]} -{"Format": "IDEA0", "ID": "02b79430-1c73-4a31-ac07-806debb72504", "DetectTime": "2023-10-30T14:05:13.577622+02:00", "EventTime": "2023-10-30T14:05:13.577687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. ", "ContentType": "text/plain"}], "uids": ["CXMYmzMEXDYBz5Uo6"]} -{"Format": "IDEA0", "ID": "8e574ade-01f1-464f-ab94-ee3a9ff90cd9", "DetectTime": "2023-10-30T14:05:13.620570+02:00", "EventTime": "2023-10-30T14:05:13.620596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10849], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. ", "ContentType": "text/plain"}], "uids": ["CWVMs618QMvY9Xhaa3"]} -{"Format": "IDEA0", "ID": "0d66d54d-922d-4916-a5ed-cee80fba5cdb", "DetectTime": "2023-10-30T14:05:13.663677+02:00", "EventTime": "2023-10-30T14:05:13.663727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CjUw9B39VhN9IK4P7f"]} -{"Format": "IDEA0", "ID": "94696c1f-9504-466f-bcdf-d52ed10a3754", "DetectTime": "2023-10-30T14:05:13.704433+02:00", "EventTime": "2023-10-30T14:05:13.704466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["CzZN6Kvq9e5xBafZb"]} -{"Format": "IDEA0", "ID": "033a47eb-8f52-4907-9a12-25e0f4909f7a", "DetectTime": "2023-10-30T14:05:13.741598+02:00", "EventTime": "2023-10-30T14:05:13.741615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. ", "ContentType": "text/plain"}], "uids": ["Ca3wwo1qO2VeGbngUf"]} -{"Format": "IDEA0", "ID": "8ecd4253-568b-425d-8af2-6eab5b84fc16", "DetectTime": "2023-10-30T14:05:13.784573+02:00", "EventTime": "2023-10-30T14:05:13.784590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CoImNy1X8lbyKYyGH9"]} -{"Format": "IDEA0", "ID": "f6656a4c-8b9b-42ea-88ff-227af57a8ef1", "DetectTime": "2023-10-30T14:05:13.821872+02:00", "EventTime": "2023-10-30T14:05:13.821900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CJmHjZ2xl1kmPLbOw8"]} -{"Format": "Json", "ID": "f6656a4c-8b9b-42ea-88ff-227af57a8ef1", "DetectTime": "2023-10-30T14:05:13.821872+02:00", "EventTime": "2023-10-30T14:05:13.821900+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T07:50:22.241232+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2023/10/30 14:05:13.895149)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a1f4e5c3-a501-48fe-875f-6b67da39cdd5", "DetectTime": "2023-10-30T14:05:13.901027+02:00", "EventTime": "2023-10-30T14:05:13.901042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["CPFNKtRlFzu6jT7Yh"]} -{"Format": "IDEA0", "ID": "15f13e5b-90ed-4854-9e90-7951d6133dd5", "DetectTime": "2023-10-30T14:05:13.957191+02:00", "EventTime": "2023-10-30T14:05:13.957208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CcHab52vFzKBRvdTjb"]} -{"Format": "IDEA0", "ID": "8006224d-44a5-4746-a1c1-dfac3932d505", "DetectTime": "2023-10-30T14:05:14.020641+02:00", "EventTime": "2023-10-30T14:05:14.020668+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Hostname": ["188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 188.169.52.202 from 10.0.2.19. blacklisted IP AS: SILKNET-AS Silknet Autonomous System, GE AS35805 rDNS: 188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9FtS41kMnwwpHbPg6"]} -{"Format": "IDEA0", "ID": "01f8e2b9-a613-474f-9d02-5c60156ba95e", "DetectTime": "2023-10-30T14:05:14.097554+02:00", "EventTime": "2023-10-30T14:05:14.097580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Co49lF29ggtJtkqqEe"]} -{"Format": "IDEA0", "ID": "b527a9b7-cd04-4a7c-8398-2a0de5960d63", "DetectTime": "2023-10-30T14:05:14.148181+02:00", "EventTime": "2023-10-30T14:05:14.148215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["C331co2qBOTFNYEatj"]} -{"Format": "IDEA0", "ID": "804e881d-5b6a-48f5-a6a7-619d7dafb906", "DetectTime": "2023-10-30T14:05:14.187221+02:00", "EventTime": "2023-10-30T14:05:14.187241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CdSty22cTQYSC9IZ7j"]} -{"Format": "IDEA0", "ID": "1463c2cc-05c6-42e7-904e-186ede37a0e0", "DetectTime": "2023-10-30T14:05:14.241141+02:00", "EventTime": "2023-10-30T14:05:14.241166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CSFpk54ihZ4gB8xQo5"]} -{"Format": "IDEA0", "ID": "8d5125d3-2eb8-44d8-83ab-230b2446d1f5", "DetectTime": "2023-10-30T14:05:14.297851+02:00", "EventTime": "2023-10-30T14:05:14.297872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CQ3z5z4JAJypYJrIPl"]} -{"Format": "IDEA0", "ID": "a5bd7a21-fd51-4468-b1dc-ad79210bc596", "DetectTime": "2023-10-30T14:05:14.365197+02:00", "EventTime": "2023-10-30T14:05:14.365220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["C8tpUL3WupNR9AKJZ5"]} -{"Format": "Json", "ID": "a5bd7a21-fd51-4468-b1dc-ad79210bc596", "DetectTime": "2023-10-30T14:05:14.365197+02:00", "EventTime": "2023-10-30T14:05:14.365220+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:21:55.841156+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:14.485410)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb4037c5-1017-482b-bd46-8a223d2b8a41", "DetectTime": "2023-10-30T14:05:14.492438+02:00", "EventTime": "2023-10-30T14:05:14.492458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["ClUxBs3UrjO0SCd59d"]} -{"Format": "IDEA0", "ID": "ffec4623-1d6f-4912-8441-ddb9eaae5b38", "DetectTime": "2023-10-30T14:05:14.550513+02:00", "EventTime": "2023-10-30T14:05:14.550543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CHaDc8bd1L6XA6202"]} -{"Format": "IDEA0", "ID": "69918404-7034-4939-af8a-b6a224c97acc", "DetectTime": "2023-10-30T14:05:14.603062+02:00", "EventTime": "2023-10-30T14:05:14.603082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CUSDdA38hIyIkLV7q9"]} -{"Format": "IDEA0", "ID": "022380f0-2d46-4270-b030-ef56a7174d52", "DetectTime": "2023-10-30T14:05:14.656365+02:00", "EventTime": "2023-10-30T14:05:14.656384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CY1cZ018CIWtNFHaqg"]} -{"Format": "IDEA0", "ID": "53d8c680-c6d9-41fd-b173-b3a4997ca981", "DetectTime": "2023-10-30T14:05:14.706075+02:00", "EventTime": "2023-10-30T14:05:14.706090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["C8vR2R2PwZp2J142Wb"]} -{"Format": "IDEA0", "ID": "e9189fa8-b4ad-4fbd-a5ca-60f1faf1ad1f", "DetectTime": "2023-10-30T14:05:14.753302+02:00", "EventTime": "2023-10-30T14:05:14.753327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CaH0IsJxcGp2huOtf"]} -{"Format": "IDEA0", "ID": "6581b0df-81a7-46f5-a2fd-a6522f98f35b", "DetectTime": "2023-10-30T14:05:14.795263+02:00", "EventTime": "2023-10-30T14:05:14.795281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C8eyHv1ps8zNRupmlc"]} -{"Format": "IDEA0", "ID": "99e265d6-0977-4de0-8165-92a4f9b9ee12", "DetectTime": "2023-10-30T14:05:14.836719+02:00", "EventTime": "2023-10-30T14:05:14.836734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cd7NHm4qPR4ab8xG48"]} -{"Format": "Json", "ID": "99e265d6-0977-4de0-8165-92a4f9b9ee12", "DetectTime": "2023-10-30T14:05:14.836719+02:00", "EventTime": "2023-10-30T14:05:14.836734+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:21:57.623944+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:14.912448)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "11088fd5-125a-41e5-9db5-e7313f28f4b2", "DetectTime": "2023-10-30T14:05:14.918120+02:00", "EventTime": "2023-10-30T14:05:14.918147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C9M53m2hmcLyyDo8n8"]} -{"Format": "IDEA0", "ID": "ad05935b-7231-46d7-ab7d-512c051e3050", "DetectTime": "2023-10-30T14:05:14.964943+02:00", "EventTime": "2023-10-30T14:05:14.964963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13944], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. ", "ContentType": "text/plain"}], "uids": ["C80jh72KCOyB8ukwrg"]} -{"Format": "IDEA0", "ID": "f8f4edce-cfc5-4dac-b318-3050e22a3ee3", "DetectTime": "2023-10-30T14:05:15.007762+02:00", "EventTime": "2023-10-30T14:05:15.007780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CJzdlG32CkdQ1oQCkl"]} -{"Format": "IDEA0", "ID": "7bc32a86-350d-4d53-86dc-ddfd745f3b9c", "DetectTime": "2023-10-30T14:05:15.054605+02:00", "EventTime": "2023-10-30T14:05:15.054631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CtsHaEWaBO53aJJn8"]} -{"Format": "IDEA0", "ID": "23cb234c-ce97-4575-8c45-91aba35da61d", "DetectTime": "2023-10-30T14:05:15.099013+02:00", "EventTime": "2023-10-30T14:05:15.099033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CgCvx423dUbZl5MOo3"]} -{"Format": "IDEA0", "ID": "a9e9a346-91a0-4cf8-92b0-e266bdcb9738", "DetectTime": "2023-10-30T14:05:15.260745+02:00", "EventTime": "2023-10-30T14:05:15.260772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CLxLlx4T7k6cYAB69j"]} -{"Format": "IDEA0", "ID": "9b5dcee2-7446-4a24-860f-ebe2ae576c60", "DetectTime": "2023-10-30T14:05:15.310345+02:00", "EventTime": "2023-10-30T14:05:15.310367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CvOd7JzzWv4df6Ssh"]} -{"Format": "IDEA0", "ID": "afeae667-742c-4edf-b350-ab7afeb9c32e", "DetectTime": "2023-10-30T14:05:15.369444+02:00", "EventTime": "2023-10-30T14:05:15.369463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CtRZuh4ey8kvTrvda1"]} -{"Format": "Json", "ID": "afeae667-742c-4edf-b350-ab7afeb9c32e", "DetectTime": "2023-10-30T14:05:15.369444+02:00", "EventTime": "2023-10-30T14:05:15.369463+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:21:59.696603+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:15.461639)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "186622b2-6af6-4e6e-9b0b-c48eff2cdf05", "DetectTime": "2023-10-30T14:05:15.467820+02:00", "EventTime": "2023-10-30T14:05:15.467834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C9NTaV2CJoLhjW2i75"]} -{"Format": "IDEA0", "ID": "26954394-c34c-4075-9edf-fd3b70913dee", "DetectTime": "2023-10-30T14:05:15.526238+02:00", "EventTime": "2023-10-30T14:05:15.526260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["Cjbj0D2IKkeTzeCeWd"]} -{"Format": "IDEA0", "ID": "ebc73b23-b998-4877-ba97-54abe3539787", "DetectTime": "2023-10-30T14:05:15.572722+02:00", "EventTime": "2023-10-30T14:05:15.572741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. ", "ContentType": "text/plain"}], "uids": ["CWFUL84y1Z6as1DxG5"]} -{"Format": "IDEA0", "ID": "e4b04ebb-bd1f-4b1e-8475-4aeac09558fc", "DetectTime": "2023-10-30T14:05:15.618241+02:00", "EventTime": "2023-10-30T14:05:15.618259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10849], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. ", "ContentType": "text/plain"}], "uids": ["CT0oog6702NR2t9b8"]} -{"Format": "IDEA0", "ID": "46ad1b43-734b-4a9d-8763-05616a783ab5", "DetectTime": "2023-10-30T14:05:15.661744+02:00", "EventTime": "2023-10-30T14:05:15.661763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CA5Dkn1XWl9FFUMFNk"]} -{"Format": "IDEA0", "ID": "19f9ee80-cf90-4e0c-b3c1-f418c7cf2a76", "DetectTime": "2023-10-30T14:05:15.713163+02:00", "EventTime": "2023-10-30T14:05:15.713183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["C7gKFs4GQIB15bGPw4"]} -{"Format": "IDEA0", "ID": "a1487499-145f-4f56-bd45-0d40448c4f57", "DetectTime": "2023-10-30T14:05:15.769903+02:00", "EventTime": "2023-10-30T14:05:15.769922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. ", "ContentType": "text/plain"}], "uids": ["CsnE8J2P6lpyR2Uh48"]} -{"Format": "IDEA0", "ID": "28493dcf-b430-46f0-b229-995cac037737", "DetectTime": "2023-10-30T14:05:15.824223+02:00", "EventTime": "2023-10-30T14:05:15.824241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CgyZNP5co2e739Bdd"]} -{"Format": "Json", "ID": "28493dcf-b430-46f0-b229-995cac037737", "DetectTime": "2023-10-30T14:05:15.824223+02:00", "EventTime": "2023-10-30T14:05:15.824241+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:22:02.220847+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:15.937935)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8b2011a-a9d0-4d33-8fd3-ee4ee2e1f906", "DetectTime": "2023-10-30T14:05:15.945392+02:00", "EventTime": "2023-10-30T14:05:15.945413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CaLst64pWj71ISdiU7"]} -{"Format": "IDEA0", "ID": "903c671c-c1ab-4388-9d07-04b5310ad31d", "DetectTime": "2023-10-30T14:05:15.988572+02:00", "EventTime": "2023-10-30T14:05:15.988591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["C2ifmnrn4hnYABWR1"]} -{"Format": "IDEA0", "ID": "358e95df-b1a9-4d79-a032-32572be2a913", "DetectTime": "2023-10-30T14:05:16.031972+02:00", "EventTime": "2023-10-30T14:05:16.031996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwLNNQ2rUdnDBsPGc7"]} -{"Format": "IDEA0", "ID": "af444a56-6f03-4e06-9025-f236c22824e5", "DetectTime": "2023-10-30T14:05:16.071989+02:00", "EventTime": "2023-10-30T14:05:16.072014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CQMuXjV7mOMAmL5Dd"]} -{"Format": "IDEA0", "ID": "bdd5e913-0066-4097-a4cf-3b6150eb4e4f", "DetectTime": "2023-10-30T14:05:16.118939+02:00", "EventTime": "2023-10-30T14:05:16.118966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CQEk4A4ldWIRc7wi9a"]} -{"Format": "IDEA0", "ID": "69148143-8deb-486d-895e-07de9de49133", "DetectTime": "2023-10-30T14:05:16.158693+02:00", "EventTime": "2023-10-30T14:05:16.158716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CbxKkc4VljLCimhNC9"]} -{"Format": "IDEA0", "ID": "4d104c8f-39e9-4370-a0b8-3e54cc5fdbc8", "DetectTime": "2023-10-30T14:05:16.204492+02:00", "EventTime": "2023-10-30T14:05:16.204512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CO8URQ2FnHmPLApsjb"]} -{"Format": "IDEA0", "ID": "0baa298a-d3ed-4de7-b180-b78d3ce39690", "DetectTime": "2023-10-30T14:05:16.244180+02:00", "EventTime": "2023-10-30T14:05:16.244199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CkhsNR1x36MubDTZD"]} -{"Format": "Json", "ID": "0baa298a-d3ed-4de7-b180-b78d3ce39690", "DetectTime": "2023-10-30T14:05:16.244180+02:00", "EventTime": "2023-10-30T14:05:16.244199+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:52:34.887365+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:16.333102)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4b3286f8-edcd-4605-a613-dd445c18b8a7", "DetectTime": "2023-10-30T14:05:16.339491+02:00", "EventTime": "2023-10-30T14:05:16.339515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["C8FdxpEfQDUrCXGUf"]} -{"Format": "IDEA0", "ID": "f364dea1-9adb-4fad-8d92-f25abbe41de5", "DetectTime": "2023-10-30T14:05:16.388664+02:00", "EventTime": "2023-10-30T14:05:16.388693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["Cprk7t379urZ90Jnua"]} -{"Format": "IDEA0", "ID": "a53e3d1a-a183-4f88-8446-d9aed2d3b851", "DetectTime": "2023-10-30T14:05:16.426926+02:00", "EventTime": "2023-10-30T14:05:16.426947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CKyXdR1dwgmrAtrM41"]} -{"Format": "IDEA0", "ID": "e22baa2f-1c53-41fe-8e55-eaa8f99a1306", "DetectTime": "2023-10-30T14:05:16.471564+02:00", "EventTime": "2023-10-30T14:05:16.471585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CZQpoA2KU9RuFREwI1"]} -{"Format": "IDEA0", "ID": "f83a6c60-9bd1-4ac4-af7b-7824fe4ec744", "DetectTime": "2023-10-30T14:05:16.510728+02:00", "EventTime": "2023-10-30T14:05:16.510751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cc8CnL2ppmXMyEYlwh"]} -{"Format": "IDEA0", "ID": "c6703c49-fb2e-4d46-ba6a-d43a3ceb558d", "DetectTime": "2023-10-30T14:05:16.550028+02:00", "EventTime": "2023-10-30T14:05:16.550046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ck2IsX2v7L8bEQ9tN3"]} -{"Format": "IDEA0", "ID": "c3afb597-242b-4662-9580-22791a9d2f60", "DetectTime": "2023-10-30T14:05:16.589869+02:00", "EventTime": "2023-10-30T14:05:16.589882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CfpY99vTwW4OWXfM5"]} -{"Format": "IDEA0", "ID": "00ce0ee8-c9dc-4781-a26c-7fed5d5d8b06", "DetectTime": "2023-10-30T14:05:16.630286+02:00", "EventTime": "2023-10-30T14:05:16.630305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["Cv0OhhuhLqQ14nGm"]} -{"Format": "Json", "ID": "00ce0ee8-c9dc-4781-a26c-7fed5d5d8b06", "DetectTime": "2023-10-30T14:05:16.630286+02:00", "EventTime": "2023-10-30T14:05:16.630305+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:52:36.614643+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:16.715151)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "be62a5cc-04bc-4ec7-a9b3-3ef86b16b39d", "DetectTime": "2023-10-30T14:05:16.722658+02:00", "EventTime": "2023-10-30T14:05:16.722678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C69AWz2LQGq83vtyE6"]} -{"Format": "IDEA0", "ID": "cc37cbe5-d9ec-4b77-a524-c7d3f491c1a6", "DetectTime": "2023-10-30T14:05:16.758976+02:00", "EventTime": "2023-10-30T14:05:16.758997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CdtgW31O3o60yU4W7k"]} -{"Format": "IDEA0", "ID": "9e21a2bf-25b2-4c85-9a2a-6f2377189606", "DetectTime": "2023-10-30T14:05:16.798428+02:00", "EventTime": "2023-10-30T14:05:16.798443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CMV9p8cdciBHkBkjb"]} -{"Format": "IDEA0", "ID": "f88b7771-ddf1-476e-9795-dd3ede693d7a", "DetectTime": "2023-10-30T14:05:16.832579+02:00", "EventTime": "2023-10-30T14:05:16.832620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CpwLSg1qU1wWAuQYFl"]} -{"Format": "IDEA0", "ID": "cc423ccd-0b4d-4eda-b066-616cbe398b58", "DetectTime": "2023-10-30T14:05:16.867557+02:00", "EventTime": "2023-10-30T14:05:16.867574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CZdoNMgzjjXj6MWk4"]} -{"Format": "IDEA0", "ID": "a94e4fc6-61fb-4514-a3bf-b5ae302bf0ae", "DetectTime": "2023-10-30T14:05:16.902993+02:00", "EventTime": "2023-10-30T14:05:16.903014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["C3nWKR3poqxxUjde72"]} -{"Format": "IDEA0", "ID": "8f1943a7-d1e0-460c-884c-ae468d89680a", "DetectTime": "2023-10-30T14:05:16.936065+02:00", "EventTime": "2023-10-30T14:05:16.936084+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cz8DMTuExle1PIdt8"]} -{"Format": "IDEA0", "ID": "bb2a41a3-a186-4323-8ac2-d19ae9d2787a", "DetectTime": "2023-10-30T14:05:16.944511+02:00", "EventTime": "2023-10-30T14:05:16.944532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CvIJ7wm51y65FvN2k"]} -{"Format": "IDEA0", "ID": "72738ded-edac-4e00-bb27-953054c7624b", "DetectTime": "2023-10-30T14:05:16.974233+02:00", "EventTime": "2023-10-30T14:05:16.974254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C9g24C23c2gKNFMR03"]} -{"Format": "Json", "ID": "72738ded-edac-4e00-bb27-953054c7624b", "DetectTime": "2023-10-30T14:05:16.974233+02:00", "EventTime": "2023-10-30T14:05:16.974254+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T08:52:57.298162+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2023/10/30 14:05:17.043127)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dffce171-d1ce-4a1e-a91b-11b4f2d5d126", "DetectTime": "2023-10-30T14:05:17.048319+02:00", "EventTime": "2023-10-30T14:05:17.048343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CmXGNGyD4OMzYnAKk"]} -{"Format": "IDEA0", "ID": "19420dbf-23c5-4352-a5f7-fba8bd77fa5a", "DetectTime": "2023-10-30T14:05:17.077026+02:00", "EventTime": "2023-10-30T14:05:17.077050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9285], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. ", "ContentType": "text/plain"}], "uids": ["CVXpR54P75vngi8VZ5"]} -{"Format": "IDEA0", "ID": "600e8fdd-699a-4302-9b28-a3a0a3c7da73", "DetectTime": "2023-10-30T14:05:17.107971+02:00", "EventTime": "2023-10-30T14:05:17.107988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["C68wTd3A7dWJ0jWRY2"]} -{"Format": "IDEA0", "ID": "a711f5fa-4bef-420d-ba2d-d060796d246b", "DetectTime": "2023-10-30T14:05:17.135272+02:00", "EventTime": "2023-10-30T14:05:17.135288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CYm7grTzgCXmdYFfi"]} -{"Format": "IDEA0", "ID": "3af44093-f34b-4e5b-add0-27fd3bd2b248", "DetectTime": "2023-10-30T14:05:17.163769+02:00", "EventTime": "2023-10-30T14:05:17.163796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2042], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. ", "ContentType": "text/plain"}], "uids": ["CGCQFg1I55eZhwIWMh"]} -{"Format": "IDEA0", "ID": "3586e1cd-e9aa-4fef-9061-ae74063a78d6", "DetectTime": "2023-10-30T14:05:17.191063+02:00", "EventTime": "2023-10-30T14:05:17.191079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CPh5o528D98zOyAYr5"]} -{"Format": "IDEA0", "ID": "ce78f991-31f5-4147-b196-0e6174eba655", "DetectTime": "2023-10-30T14:05:17.222271+02:00", "EventTime": "2023-10-30T14:05:17.222285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["C9A3Nf2tO5phIjG9v4"]} -{"Format": "IDEA0", "ID": "b099dd28-d8f4-4616-8f00-3a4167cd8b9e", "DetectTime": "2023-10-30T14:05:17.249380+02:00", "EventTime": "2023-10-30T14:05:17.249399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["Cd9cBC3fnrFdIXxvDb"]} -{"Format": "IDEA0", "ID": "a514501e-685d-4303-b80d-90d998a4f8a4", "DetectTime": "2023-10-30T14:05:17.296013+02:00", "EventTime": "2023-10-30T14:05:17.296033+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvYGTf2spaoWiVwMRg"]} -{"Format": "IDEA0", "ID": "5c0b3a35-82d3-4938-9393-815c430d6701", "DetectTime": "2023-10-30T14:05:17.303989+02:00", "EventTime": "2023-10-30T14:05:17.304013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKtztR18TnE5aFcTfd"]} -{"Format": "IDEA0", "ID": "9050b13d-884a-4600-9a22-816fb68c8133", "DetectTime": "2023-10-30T14:05:17.346511+02:00", "EventTime": "2023-10-30T14:05:17.346527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CePPmO2fbmfLHAeQy9"]} -{"Format": "IDEA0", "ID": "414583d9-caf9-45e1-bad2-a15e8ddc0e84", "DetectTime": "2023-10-30T14:05:17.391720+02:00", "EventTime": "2023-10-30T14:05:17.391745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CqsXWh3P0egqtxLesj"]} -{"Format": "IDEA0", "ID": "abd93c65-d650-480d-b933-82b1c848ca7d", "DetectTime": "2023-10-30T14:05:17.438163+02:00", "EventTime": "2023-10-30T14:05:17.438181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CgIWPg29s801wSiCyc"]} -{"Format": "IDEA0", "ID": "332c02f5-f0d4-4bbf-9fb3-823a495d6845", "DetectTime": "2023-10-30T14:05:17.481633+02:00", "EventTime": "2023-10-30T14:05:17.481659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C6Z4jv341TlypYaVdh"]} -{"Format": "IDEA0", "ID": "b94160d2-67fd-445e-af03-8eb69ada3ac6", "DetectTime": "2023-10-30T14:05:17.527410+02:00", "EventTime": "2023-10-30T14:05:17.527436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C3Rgjl40GLvBmI5xA9"]} -{"Format": "Json", "ID": "b94160d2-67fd-445e-af03-8eb69ada3ac6", "DetectTime": "2023-10-30T14:05:17.527410+02:00", "EventTime": "2023-10-30T14:05:17.527436+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:23:53.259427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:17.628263)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "662f8c24-c493-48e3-94d0-1bac39d4c745", "DetectTime": "2023-10-30T14:05:17.634311+02:00", "EventTime": "2023-10-30T14:05:17.634341+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAZOak3bhJqhbzzyS5"]} -{"Format": "IDEA0", "ID": "521eea65-2550-49e0-9dc9-d1e6bd99af64", "DetectTime": "2023-10-30T14:05:17.642680+02:00", "EventTime": "2023-10-30T14:05:17.642704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["C6OTFH1nICIEU19lWl"]} -{"Format": "IDEA0", "ID": "503b8f6e-bd92-49fa-85fd-eafc4a81365e", "DetectTime": "2023-10-30T14:05:17.685179+02:00", "EventTime": "2023-10-30T14:05:17.685199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CAc6hKdKVwMwS6yHa"]} -{"Format": "IDEA0", "ID": "712c747e-0119-471e-882a-8823b8daf8d9", "DetectTime": "2023-10-30T14:05:17.729862+02:00", "EventTime": "2023-10-30T14:05:17.729893+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cu5oF93nXenWg3ubBi"]} -{"Format": "IDEA0", "ID": "676dcf59-89e0-4391-bbce-334e23313a76", "DetectTime": "2023-10-30T14:05:17.738906+02:00", "EventTime": "2023-10-30T14:05:17.738923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CSmhcf2kOS2ohry0Eg"]} -{"Format": "IDEA0", "ID": "313d75d0-2afb-4455-a21a-d26f0bc35ecf", "DetectTime": "2023-10-30T14:05:17.777654+02:00", "EventTime": "2023-10-30T14:05:17.777678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CzrW27181TXWyMnmIc"]} -{"Format": "IDEA0", "ID": "046012fa-fd41-4177-8c49-fefabf9dcdc4", "DetectTime": "2023-10-30T14:05:17.818982+02:00", "EventTime": "2023-10-30T14:05:17.818997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CutYXk3orvWgsMb062"]} -{"Format": "IDEA0", "ID": "ceeee365-150c-4e8e-aeb8-3ff06b9ea123", "DetectTime": "2023-10-30T14:05:17.862467+02:00", "EventTime": "2023-10-30T14:05:17.862486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CWQaPwLUVVXk7dz97"]} -{"Format": "IDEA0", "ID": "c932aebf-a4af-493a-b329-dee27c62477a", "DetectTime": "2023-10-30T14:05:17.902384+02:00", "EventTime": "2023-10-30T14:05:17.902405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CTfmMt2KbKwGMaP8Cf"]} -{"Format": "IDEA0", "ID": "fe9f8803-a8ef-4023-b042-8f789e326771", "DetectTime": "2023-10-30T14:05:17.941718+02:00", "EventTime": "2023-10-30T14:05:17.941766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CQZnXz2x1o26C8gDE"]} -{"Format": "Json", "ID": "fe9f8803-a8ef-4023-b042-8f789e326771", "DetectTime": "2023-10-30T14:05:17.941718+02:00", "EventTime": "2023-10-30T14:05:17.941766+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:24:13.153032+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:18.127521)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f3b0b6c4-ddf1-4d2d-b164-b9d94cfacd0a", "DetectTime": "2023-10-30T14:05:18.133768+02:00", "EventTime": "2023-10-30T14:05:18.133797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["Cbd2E92SzujcpOPIz8"]} -{"Format": "IDEA0", "ID": "0f7c60ab-c0a4-4662-a18a-292c8ec06bb8", "DetectTime": "2023-10-30T14:05:18.184072+02:00", "EventTime": "2023-10-30T14:05:18.184089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CMBHdL299onA64mgAl"]} -{"Format": "IDEA0", "ID": "f5fd5d15-7835-435b-b278-1a9ea4850e13", "DetectTime": "2023-10-30T14:05:18.231715+02:00", "EventTime": "2023-10-30T14:05:18.231737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CUKayf2ZF2vKRPhnP3"]} -{"Format": "IDEA0", "ID": "012ec2c8-5a87-4dcd-a409-b355a0ce6e34", "DetectTime": "2023-10-30T14:05:18.279105+02:00", "EventTime": "2023-10-30T14:05:18.279131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CDU8in2ecAqjq2c8bk"]} -{"Format": "IDEA0", "ID": "0ab8ca87-c556-4a7e-8353-13958c5cf30d", "DetectTime": "2023-10-30T14:05:18.322095+02:00", "EventTime": "2023-10-30T14:05:18.322114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["ClQgka2SRwzDkBGV16"]} -{"Format": "IDEA0", "ID": "71ee9d48-0541-47f9-bbc7-3ae4b9d995b2", "DetectTime": "2023-10-30T14:05:18.369887+02:00", "EventTime": "2023-10-30T14:05:18.369906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CHG6Lg4zszLyOBHTWb"]} -{"Format": "IDEA0", "ID": "bb6ce7a6-ae56-4db5-9cc1-8d5509cbfb70", "DetectTime": "2023-10-30T14:05:18.414996+02:00", "EventTime": "2023-10-30T14:05:18.415023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CqVb3C2FZe5JUIFCza"]} -{"Format": "IDEA0", "ID": "4100af91-a957-4869-b24d-ff8b12917fe2", "DetectTime": "2023-10-30T14:05:18.463183+02:00", "EventTime": "2023-10-30T14:05:18.463212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CAgXqa2oZ1QVtkSU6c"]} -{"Format": "Json", "ID": "4100af91-a957-4869-b24d-ff8b12917fe2", "DetectTime": "2023-10-30T14:05:18.463183+02:00", "EventTime": "2023-10-30T14:05:18.463212+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:24:14.838940+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:18.556270)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d19bb90a-75eb-4a2c-9151-8b11c71982ee", "DetectTime": "2023-10-30T14:05:18.563734+02:00", "EventTime": "2023-10-30T14:05:18.563760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["CZ8GgJ2F5lp6Oea8H8"]} -{"Format": "IDEA0", "ID": "d06e2fea-8771-4fbf-90db-76daf695df17", "DetectTime": "2023-10-30T14:05:18.615003+02:00", "EventTime": "2023-10-30T14:05:18.615026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["Cg6gBT2g7VMyrTcasi"]} -{"Format": "IDEA0", "ID": "e7bfd4dd-b10c-4606-bd3f-93ec93a39526", "DetectTime": "2023-10-30T14:05:18.656693+02:00", "EventTime": "2023-10-30T14:05:18.656714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CtrNxh4fZUaMjoNvzc"]} -{"Format": "IDEA0", "ID": "95730738-90ff-4cc4-8286-eb84f5d23fa7", "DetectTime": "2023-10-30T14:05:18.697742+02:00", "EventTime": "2023-10-30T14:05:18.697768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CsjfMj1Ot2TfesXpW2"]} -{"Format": "IDEA0", "ID": "c0f6c0f3-a768-4bf1-866b-a66cedfc3b28", "DetectTime": "2023-10-30T14:05:18.747707+02:00", "EventTime": "2023-10-30T14:05:18.747724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5326], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. ", "ContentType": "text/plain"}], "uids": ["C3lq7A4bKX9rmJS1x6"]} -{"Format": "IDEA0", "ID": "e9271d3c-1132-407a-ae65-4a0a2e8a9e18", "DetectTime": "2023-10-30T14:05:18.790765+02:00", "EventTime": "2023-10-30T14:05:18.790847+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzG34p1qnqNG9hJisl"]} -{"Format": "IDEA0", "ID": "7b0a16ce-ec72-4b92-a63e-1801e5e41dce", "DetectTime": "2023-10-30T14:05:18.801200+02:00", "EventTime": "2023-10-30T14:05:18.801214+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0iqPF2zargfqnKWJd"]} -{"Format": "IDEA0", "ID": "642e8333-eea7-4bc3-b54b-4e7ec2b1e1ee", "DetectTime": "2023-10-30T14:05:18.811880+02:00", "EventTime": "2023-10-30T14:05:18.811894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C2rEiD4N4CevHVliBg", "CAZOak3bhJqhbzzyS5", "Cz8DMTuExle1PIdt8", "CzG34p1qnqNG9hJisl"]} -{"Format": "IDEA0", "ID": "055cb8e0-03c1-45c1-a208-10e7533da9f8", "DetectTime": "2023-10-30T14:05:18.821452+02:00", "EventTime": "2023-10-30T14:05:18.821470+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2rEiD4N4CevHVliBg"]} -{"Format": "IDEA0", "ID": "f8db21e6-dd2d-46be-893a-29331adbcfb5", "DetectTime": "2023-10-30T14:05:18.831540+02:00", "EventTime": "2023-10-30T14:05:18.831559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CEhScO3kWxDONpY3sc"]} -{"Format": "IDEA0", "ID": "03f8bd53-64ee-4965-94b1-fb0130a1b4a6", "DetectTime": "2023-10-30T14:05:18.872275+02:00", "EventTime": "2023-10-30T14:05:18.872385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Crx1dJ196b5jgjgzFa"]} -{"Format": "IDEA0", "ID": "9f3d1d99-bc3e-4567-a965-103962070ac4", "DetectTime": "2023-10-30T14:05:18.917435+02:00", "EventTime": "2023-10-30T14:05:18.917454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CwKVu4CXG6AuwQ2Z2"]} -{"Format": "Json", "ID": "9f3d1d99-bc3e-4567-a965-103962070ac4", "DetectTime": "2023-10-30T14:05:18.917435+02:00", "EventTime": "2023-10-30T14:05:18.917454+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:56:02.117395+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:19.039232)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb9b2cce-81c3-41cd-b531-2329484b1761", "DetectTime": "2023-10-30T14:05:19.047109+02:00", "EventTime": "2023-10-30T14:05:19.047133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CLBlwxPEr2NCaGXUl"]} -{"Format": "IDEA0", "ID": "008e498d-35dd-4f83-996a-39d678a6ae2f", "DetectTime": "2023-10-30T14:05:19.102503+02:00", "EventTime": "2023-10-30T14:05:19.102522+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJghfo16jWsChIoy3g"]} -{"Format": "IDEA0", "ID": "43b0c0b8-a18f-4d7b-91a1-71b726346845", "DetectTime": "2023-10-30T14:05:19.119813+02:00", "EventTime": "2023-10-30T14:05:19.119832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CxBxJu4XKT1Kotoq4"]} -{"Format": "IDEA0", "ID": "0ff049a6-5e50-4988-92fc-ed741885dcac", "DetectTime": "2023-10-30T14:05:19.177554+02:00", "EventTime": "2023-10-30T14:05:19.177577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["CPyilA3SeVoOjO1gsa"]} -{"Format": "IDEA0", "ID": "14573cf1-23e7-42f8-a012-78174277ec0a", "DetectTime": "2023-10-30T14:05:19.269449+02:00", "EventTime": "2023-10-30T14:05:19.269482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CSJvai1Djry3LKEiVe"]} -{"Format": "IDEA0", "ID": "9147585e-76b0-4a78-bf9b-c7be237cd133", "DetectTime": "2023-10-30T14:05:19.338576+02:00", "EventTime": "2023-10-30T14:05:19.338598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["ClTFLT3XWzn6JcOPih"]} -{"Format": "IDEA0", "ID": "7594a113-37c4-4ad4-80a8-7e80b5d2f87a", "DetectTime": "2023-10-30T14:05:19.394702+02:00", "EventTime": "2023-10-30T14:05:19.394725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["C0tdyOIQlFnUsGgP"]} -{"Format": "IDEA0", "ID": "bcc31094-de49-404f-bd19-7d5d0a81f2f9", "DetectTime": "2023-10-30T14:05:19.453837+02:00", "EventTime": "2023-10-30T14:05:19.453856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["C0elN43zXJhr6RaSo"]} -{"Format": "IDEA0", "ID": "8db88183-4bde-46d4-8863-76c3ad696754", "DetectTime": "2023-10-30T14:05:19.493810+02:00", "EventTime": "2023-10-30T14:05:19.493831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CxqKyO1m6psed3BaK4"]} -{"Format": "Json", "ID": "8db88183-4bde-46d4-8863-76c3ad696754", "DetectTime": "2023-10-30T14:05:19.493810+02:00", "EventTime": "2023-10-30T14:05:19.493831+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:56:04.757925+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:19.570767)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eb9f986b-c7af-4174-9fd1-2db9472fb0e5", "DetectTime": "2023-10-30T14:05:19.578039+02:00", "EventTime": "2023-10-30T14:05:19.578059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CF2BS72UZ33ne4j1Sh"]} -{"Format": "IDEA0", "ID": "bf3a7ff7-0466-4f76-882e-566244913cb4", "DetectTime": "2023-10-30T14:05:19.616904+02:00", "EventTime": "2023-10-30T14:05:19.616926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9139], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. ", "ContentType": "text/plain"}], "uids": ["CcyzD41HkZYo42mJt7"]} -{"Format": "IDEA0", "ID": "5ae6feb3-a4ab-4440-8f5f-f19fe85a9403", "DetectTime": "2023-10-30T14:05:19.649896+02:00", "EventTime": "2023-10-30T14:05:19.649924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CX3cyg4JIkXvBs2V2g"]} -{"Format": "IDEA0", "ID": "a369cf83-6289-4e23-b3ca-7d5ed6a318e2", "DetectTime": "2023-10-30T14:05:19.686648+02:00", "EventTime": "2023-10-30T14:05:19.686668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CLnC2j1NKZZA7v6Wbc"]} -{"Format": "IDEA0", "ID": "dd588f86-d23a-4a15-ac8f-4d83a6b9a637", "DetectTime": "2023-10-30T14:05:19.720835+02:00", "EventTime": "2023-10-30T14:05:19.720861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CLO4Hb211enOUMueTj"]} -{"Format": "IDEA0", "ID": "4dd98365-41a4-46e4-a1b1-3878c984b47e", "DetectTime": "2023-10-30T14:05:19.753177+02:00", "EventTime": "2023-10-30T14:05:19.753203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CptVOc1BFXLK0HbYZ"]} -{"Format": "IDEA0", "ID": "03dadb5b-8186-471d-9f26-6e0d78b43904", "DetectTime": "2023-10-30T14:05:19.788089+02:00", "EventTime": "2023-10-30T14:05:19.788114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C3i7mn4rB6F8Reqaw2"]} -{"Format": "IDEA0", "ID": "dc4af88c-7f44-48f3-a5ea-df6345431890", "DetectTime": "2023-10-30T14:05:19.820790+02:00", "EventTime": "2023-10-30T14:05:19.820804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CoNzqe1we1rZ3p0c8b"]} -{"Format": "Json", "ID": "dc4af88c-7f44-48f3-a5ea-df6345431890", "DetectTime": "2023-10-30T14:05:19.820790+02:00", "EventTime": "2023-10-30T14:05:19.820804+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:56:06.320406+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:19.903038)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2bed4cef-85f0-47db-b7f5-268eb6a54c9f", "DetectTime": "2023-10-30T14:05:19.909504+02:00", "EventTime": "2023-10-30T14:05:19.909525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["C63Gww4hGM0gSHMUU2"]} -{"Format": "IDEA0", "ID": "eabe9b93-5e82-4e06-aeae-1a44a3bc7c8f", "DetectTime": "2023-10-30T14:05:19.940523+02:00", "EventTime": "2023-10-30T14:05:19.940543+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CAUbpe1WCB6cldWtyl"]} -{"Format": "IDEA0", "ID": "289de3b4-7eeb-45d7-a6ce-5e513137e8e8", "DetectTime": "2023-10-30T14:05:19.950498+02:00", "EventTime": "2023-10-30T14:05:19.950518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C58EhQ1tLMHfMS7HK"]} -{"Format": "IDEA0", "ID": "ca14d24d-10dc-4854-b7ed-95975320bd4b", "DetectTime": "2023-10-30T14:05:19.979425+02:00", "EventTime": "2023-10-30T14:05:19.979444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CbrASuXxipdFOaoxd"]} -{"Format": "IDEA0", "ID": "43a01b23-1f7d-4c14-9921-0c0d1943020b", "DetectTime": "2023-10-30T14:05:20.013083+02:00", "EventTime": "2023-10-30T14:05:20.013108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CCohIs47kzpCLas4M6"]} -{"Format": "IDEA0", "ID": "97d69520-8dc9-4a07-b2f5-fd5ffb32bad4", "DetectTime": "2023-10-30T14:05:20.022548+02:00", "EventTime": "2023-10-30T14:05:20.022568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CZsRxLU0JSqOGZZlj"]} -{"Format": "IDEA0", "ID": "f4c03a22-b61f-4ead-ba6e-9cc15072f541", "DetectTime": "2023-10-30T14:05:20.053267+02:00", "EventTime": "2023-10-30T14:05:20.053287+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CzWI0anJMEHPM37kb"]} -{"Format": "IDEA0", "ID": "2da3e3a4-109b-4e4a-90bc-f3844aece5ac", "DetectTime": "2023-10-30T14:05:20.064641+02:00", "EventTime": "2023-10-30T14:05:20.064663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["C55XEK8qO1iJmJsg"]} -{"Format": "IDEA0", "ID": "50c89db6-7545-4688-9cc0-83876d32de6b", "DetectTime": "2023-10-30T14:05:20.098176+02:00", "EventTime": "2023-10-30T14:05:20.098197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["COl4t73dI0TgtLoA2"]} -{"Format": "IDEA0", "ID": "bd41b7f5-9e3c-40fb-9c0f-cd457210e29b", "DetectTime": "2023-10-30T14:05:20.137738+02:00", "EventTime": "2023-10-30T14:05:20.137761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CVcNjU1e6ZYj1d4dO2"]} -{"Format": "IDEA0", "ID": "05c0ed9b-effc-4cc9-90c5-f5166f7b81fb", "DetectTime": "2023-10-30T14:05:20.167737+02:00", "EventTime": "2023-10-30T14:05:20.167768+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLW5fk1ip1LQ1dBidl"]} -{"Format": "IDEA0", "ID": "3bcc064e-157f-4604-a119-8b78712a7edd", "DetectTime": "2023-10-30T14:05:20.175434+02:00", "EventTime": "2023-10-30T14:05:20.175455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CBXGzN3O05fFU8mhG"]} -{"Format": "IDEA0", "ID": "7d1282c1-0a39-4441-9f2f-d73761bb6a84", "DetectTime": "2023-10-30T14:05:20.202569+02:00", "EventTime": "2023-10-30T14:05:20.202590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CrIPOc2t19be92A7Y3"]} -{"Format": "Json", "ID": "7d1282c1-0a39-4441-9f2f-d73761bb6a84", "DetectTime": "2023-10-30T14:05:20.202569+02:00", "EventTime": "2023-10-30T14:05:20.202590+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T09:56:08.660430+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2023/10/30 14:05:20.366860)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ad4d1b0d-48d0-41bf-8cd9-27b7efca8c6d", "DetectTime": "2023-10-30T14:05:20.373910+02:00", "EventTime": "2023-10-30T14:05:20.373928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CuYePX14EsNLM6grA5"]} -{"Format": "IDEA0", "ID": "c47c4564-0674-4b8b-8598-f32dd649b696", "DetectTime": "2023-10-30T14:05:20.451080+02:00", "EventTime": "2023-10-30T14:05:20.451102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CCWvKz4Q83SbswZ808"]} -{"Format": "IDEA0", "ID": "ce77c146-9d74-4967-ba18-ee3228bba69a", "DetectTime": "2023-10-30T14:05:20.519650+02:00", "EventTime": "2023-10-30T14:05:20.519672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CuEEYq3Gw4tQHgtTHi"]} -{"Format": "IDEA0", "ID": "950616bf-f1c8-4924-9f00-19b57fd87259", "DetectTime": "2023-10-30T14:05:20.582441+02:00", "EventTime": "2023-10-30T14:05:20.582468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CqVOEK2D6CFD1n8kLj"]} -{"Format": "IDEA0", "ID": "769b0ffd-bce4-4daf-9231-520810e2a9ae", "DetectTime": "2023-10-30T14:05:20.642983+02:00", "EventTime": "2023-10-30T14:05:20.643022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNSUKs2IQUr1nNL62"]} -{"Format": "IDEA0", "ID": "7ff00276-123f-4fe6-bd58-df494cc9c0ed", "DetectTime": "2023-10-30T14:05:20.700769+02:00", "EventTime": "2023-10-30T14:05:20.700801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CC5iXW34NP26ovXqJ5"]} -{"Format": "IDEA0", "ID": "04391aa7-c84a-4297-ac72-6340360cbe94", "DetectTime": "2023-10-30T14:05:20.759468+02:00", "EventTime": "2023-10-30T14:05:20.759490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["COf21ihxYOMx2hddb"]} -{"Format": "Json", "ID": "04391aa7-c84a-4297-ac72-6340360cbe94", "DetectTime": "2023-10-30T14:05:20.759468+02:00", "EventTime": "2023-10-30T14:05:20.759490+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T10:26:21.620354+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2023/10/30 14:05:20.862537)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8170edca-991e-442b-bc59-8e064389db35", "DetectTime": "2023-10-30T14:05:20.870172+02:00", "EventTime": "2023-10-30T14:05:20.870201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ClnO29QDL2fLkpzH5"]} -{"Format": "IDEA0", "ID": "88c7e52f-455e-4ef7-b8fc-4e938d562449", "DetectTime": "2023-10-30T14:05:20.918540+02:00", "EventTime": "2023-10-30T14:05:20.918564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CeJ0PKCN7EFKiSDck"]} -{"Format": "IDEA0", "ID": "25278c47-5c52-44e1-a255-7e4fef8cb137", "DetectTime": "2023-10-30T14:05:20.984050+02:00", "EventTime": "2023-10-30T14:05:20.984071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CE2GGd1OEOymA9LShg"]} -{"Format": "IDEA0", "ID": "e45f5feb-f662-4e72-a892-a40fc17df07f", "DetectTime": "2023-10-30T14:05:21.040454+02:00", "EventTime": "2023-10-30T14:05:21.040482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Chrq6F3gMjZprTPUOb"]} -{"Format": "IDEA0", "ID": "95975083-448a-46bf-a6a6-8a2b5db914e7", "DetectTime": "2023-10-30T14:05:21.083269+02:00", "EventTime": "2023-10-30T14:05:21.083295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C1tShk2p4Ty5nlrtVl"]} -{"Format": "IDEA0", "ID": "7fd909dc-adc5-4d4e-9bf2-2ec3607e1545", "DetectTime": "2023-10-30T14:05:21.138418+02:00", "EventTime": "2023-10-30T14:05:21.138440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["ChGASV22z6MUo3dWP4"]} -{"Format": "IDEA0", "ID": "3773af79-396a-4506-936f-86ff0da26a8b", "DetectTime": "2023-10-30T14:05:21.179825+02:00", "EventTime": "2023-10-30T14:05:21.179845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CtjvUxHYCBGzAjaba"]} -{"Format": "IDEA0", "ID": "e34b4856-e261-420a-a064-45e7c5eaeb1a", "DetectTime": "2023-10-30T14:05:21.221954+02:00", "EventTime": "2023-10-30T14:05:21.221974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.155.76.16 ", "ContentType": "text/plain"}], "uids": ["CS3rzf4EoRstYavGNb"]} -{"Format": "IDEA0", "ID": "83a9fbe4-3e10-4f08-9616-5e471ec5b729", "DetectTime": "2023-10-30T14:05:21.270076+02:00", "EventTime": "2023-10-30T14:05:21.270103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CjfQLp4lhzBEMX0zG1"]} -{"Format": "IDEA0", "ID": "f98a2ccc-dd1f-4b15-be79-7795f95a312f", "DetectTime": "2023-10-30T14:05:21.315114+02:00", "EventTime": "2023-10-30T14:05:21.315138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["Cu0mXC2ttny1Ibu5sk"]} -{"Format": "IDEA0", "ID": "d4c0dea2-0261-480d-accb-043db3644588", "DetectTime": "2023-10-30T14:05:21.369442+02:00", "EventTime": "2023-10-30T14:05:21.369466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CgvYCY2zX0A8lnCfz3"]} -{"Format": "IDEA0", "ID": "6eebb325-dce7-4d03-831b-581f1c8e8245", "DetectTime": "2023-10-30T14:05:21.414244+02:00", "EventTime": "2023-10-30T14:05:21.414267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Cr1XhIcjKfpPjwDI3"]} -{"Format": "IDEA0", "ID": "9ef2dc78-f91f-4435-a32b-6978190dee44", "DetectTime": "2023-10-30T14:05:21.469643+02:00", "EventTime": "2023-10-30T14:05:21.469672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["C8HWx22DZC215us84c"]} -{"Format": "IDEA0", "ID": "b59f85e2-a409-456c-ab8a-d4dc6359768b", "DetectTime": "2023-10-30T14:05:21.512593+02:00", "EventTime": "2023-10-30T14:05:21.512610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CbyF6vhzv3tDiT256"]} -{"Format": "IDEA0", "ID": "44deec55-6e4d-4959-8e61-4a7eaeaac1ad", "DetectTime": "2023-10-30T14:05:21.555056+02:00", "EventTime": "2023-10-30T14:05:21.555090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["COBzJi2sh64oeHSMY8"]} -{"Format": "IDEA0", "ID": "f2d8399b-cbb9-4247-9468-70394e3f5fd0", "DetectTime": "2023-10-30T14:05:21.603316+02:00", "EventTime": "2023-10-30T14:05:21.603333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CjU7I62U3hkk0B0yA7"]} -{"Format": "IDEA0", "ID": "2ebc4a6e-8444-40f3-a791-c5ca0f383ab9", "DetectTime": "2023-10-30T14:05:21.640896+02:00", "EventTime": "2023-10-30T14:05:21.640921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["Cv1lRE4mGqcYtcMNbf"]} -{"Format": "IDEA0", "ID": "e565a083-6221-4d6a-b497-ae1562c7ec99", "DetectTime": "2023-10-30T14:05:21.687728+02:00", "EventTime": "2023-10-30T14:05:21.687748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["Ce8e8M1FnV641vzRck"]} -{"Format": "IDEA0", "ID": "1dabe9eb-2a71-41f7-b80e-f17794c6d907", "DetectTime": "2023-10-30T14:05:21.730977+02:00", "EventTime": "2023-10-30T14:05:21.731000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C9V2P62jA6ZAtHnMme"]} -{"Format": "IDEA0", "ID": "ceeabe5d-933f-4196-ae31-c65a8a11b57e", "DetectTime": "2023-10-30T14:05:21.771910+02:00", "EventTime": "2023-10-30T14:05:21.771934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["C3Jnk9ANoIw6tXzN2"]} -{"Format": "IDEA0", "ID": "742a0567-6de8-4959-a7c8-d591df962e0b", "DetectTime": "2023-10-30T14:05:21.812645+02:00", "EventTime": "2023-10-30T14:05:21.812668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CmOQC04REWuX9XcO2d"]} -{"Format": "IDEA0", "ID": "4aa6b844-4695-4340-b7af-04ee4d3cc058", "DetectTime": "2023-10-30T14:05:21.856206+02:00", "EventTime": "2023-10-30T14:05:21.856223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["Cuetnd3mG5klFtM7L5"]} -{"Format": "IDEA0", "ID": "eda7578c-3db8-4489-9358-48646d1e238d", "DetectTime": "2023-10-30T14:05:21.910128+02:00", "EventTime": "2023-10-30T14:05:21.910149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CkKnNYJtojxWH5J15"]} -{"Format": "IDEA0", "ID": "f19dad71-5a1a-4cc6-adac-19ab2cb9e8dc", "DetectTime": "2023-10-30T14:05:21.952237+02:00", "EventTime": "2023-10-30T14:05:21.952255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C1FZEX3QLNbrKLgji4"]} -{"Format": "IDEA0", "ID": "423679f8-4bd7-4dcb-91c5-dd685b3e2653", "DetectTime": "2023-10-30T14:05:21.991782+02:00", "EventTime": "2023-10-30T14:05:21.991808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CqAY2k3OCTmjvLGCq3"]} -{"Format": "IDEA0", "ID": "10a2d519-c3cb-4802-898f-ac1ec88b4c60", "DetectTime": "2023-10-30T14:05:22.043785+02:00", "EventTime": "2023-10-30T14:05:22.043811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CArRrKMhPvq6BqTm9"]} -{"Format": "IDEA0", "ID": "d787dcd2-5c81-4ad9-9030-bae6c0eacf13", "DetectTime": "2023-10-30T14:05:22.093693+02:00", "EventTime": "2023-10-30T14:05:22.093716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C1dqA23uc8vAGhHfE1"]} -{"Format": "IDEA0", "ID": "9fe4eba9-10a6-4d75-b881-23eef6e6bcda", "DetectTime": "2023-10-30T14:05:22.136188+02:00", "EventTime": "2023-10-30T14:05:22.136214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CoA2rM2n4TJ6CpxkLe"]} -{"Format": "Json", "ID": "9fe4eba9-10a6-4d75-b881-23eef6e6bcda", "DetectTime": "2023-10-30T14:05:22.136188+02:00", "EventTime": "2023-10-30T14:05:22.136214+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T10:26:39.783170+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2023/10/30 14:05:22.237004)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b6da199-1f36-4e94-882d-a3e0da1ed6fb", "DetectTime": "2023-10-30T14:05:22.243144+02:00", "EventTime": "2023-10-30T14:05:22.243160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CsoYjy4dqLsWVNeG9i"]} -{"Format": "IDEA0", "ID": "327529d3-0061-4980-8209-5402628b600a", "DetectTime": "2023-10-30T14:05:22.283265+02:00", "EventTime": "2023-10-30T14:05:22.283299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CMCqot1X819epB4oja"]} -{"Format": "IDEA0", "ID": "edbb3bf8-af23-45b7-a019-cb39696ba880", "DetectTime": "2023-10-30T14:05:22.328702+02:00", "EventTime": "2023-10-30T14:05:22.328720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["CuOWCp4510UoK2NU2i"]} -{"Format": "IDEA0", "ID": "dbe57bb1-5591-41de-80e2-42ff9d799185", "DetectTime": "2023-10-30T14:05:22.371632+02:00", "EventTime": "2023-10-30T14:05:22.371650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CHaSBm4NH6dyvFKYWe"]} -{"Format": "IDEA0", "ID": "6dd70b01-4f34-47f2-8340-745a9bc91dbb", "DetectTime": "2023-10-30T14:05:22.416806+02:00", "EventTime": "2023-10-30T14:05:22.416824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CAjsbl16auzNrGVbbl"]} -{"Format": "IDEA0", "ID": "769a5112-ccaa-461e-bb84-dfa3c703e78b", "DetectTime": "2023-10-30T14:05:22.460279+02:00", "EventTime": "2023-10-30T14:05:22.460297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CJVF3G1lUAS2Rd4tCe"]} -{"Format": "IDEA0", "ID": "75d5497c-6291-4865-9805-9416d726bbb7", "DetectTime": "2023-10-30T14:05:22.502545+02:00", "EventTime": "2023-10-30T14:05:22.502570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["C7nqLh4C4xH5HS33xk"]} -{"Format": "IDEA0", "ID": "89049559-baa8-4acd-8415-c3ecb73f0613", "DetectTime": "2023-10-30T14:05:22.547507+02:00", "EventTime": "2023-10-30T14:05:22.547528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CBJfhZ3R7qh0FLCR04"]} -{"Format": "IDEA0", "ID": "5cc8416a-f43d-4269-9cb7-afa28b9cc13a", "DetectTime": "2023-10-30T14:05:22.583376+02:00", "EventTime": "2023-10-30T14:05:22.583390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CkNHgQ1nlCS0P3GHfh"]} -{"Format": "IDEA0", "ID": "dda3ea9d-2c98-4ce2-9fa5-59e4c32603aa", "DetectTime": "2023-10-30T14:05:22.631945+02:00", "EventTime": "2023-10-30T14:05:22.631964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CopWVX2pgeKOxX1Hge"]} -{"Format": "IDEA0", "ID": "79144135-3803-4bdf-8a31-b754ce9fd027", "DetectTime": "2023-10-30T14:05:22.674100+02:00", "EventTime": "2023-10-30T14:05:22.674118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CqxTia2HShAJyDALV6"]} -{"Format": "IDEA0", "ID": "7c3a6b60-d73b-40aa-b70f-966e9c139772", "DetectTime": "2023-10-30T14:05:22.711281+02:00", "EventTime": "2023-10-30T14:05:22.711302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CZeOgd4cgAqWTBA118"]} -{"Format": "IDEA0", "ID": "f63e10bb-c623-4a99-8898-b76f1040a283", "DetectTime": "2023-10-30T14:05:22.750584+02:00", "EventTime": "2023-10-30T14:05:22.750601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["CDzrwm1gQsv41yv0p2"]} -{"Format": "IDEA0", "ID": "cbab71b4-648a-468c-95be-d4ec06853ead", "DetectTime": "2023-10-30T14:05:22.789732+02:00", "EventTime": "2023-10-30T14:05:22.789760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["C50SEa4Xgp7pC3fSE3"]} -{"Format": "IDEA0", "ID": "7213872a-accf-4288-b105-ba4c9a5273bc", "DetectTime": "2023-10-30T14:05:22.833951+02:00", "EventTime": "2023-10-30T14:05:22.833969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CfZD3i3gq9zyIOMQl"]} -{"Format": "IDEA0", "ID": "ff7f0198-a9fe-4742-b927-ff7261dafc55", "DetectTime": "2023-10-30T14:05:22.879232+02:00", "EventTime": "2023-10-30T14:05:22.879248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CrBDln3wmrkaLMEya4"]} -{"Format": "IDEA0", "ID": "743da744-1b70-4377-adf6-df0c4b603cc9", "DetectTime": "2023-10-30T14:05:22.912640+02:00", "EventTime": "2023-10-30T14:05:22.912659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["CldFzD3ktE7e1yJjA4"]} -{"Format": "IDEA0", "ID": "ce601759-30b1-44da-9af0-1fc09b8c5db1", "DetectTime": "2023-10-30T14:05:22.942567+02:00", "EventTime": "2023-10-30T14:05:22.942590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C1Dlm32guUDhE08tQ1"]} -{"Format": "IDEA0", "ID": "a66aa7a4-ecd0-4078-a3f7-ba796edecac1", "DetectTime": "2023-10-30T14:05:22.987773+02:00", "EventTime": "2023-10-30T14:05:22.987795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.155.76.16 ", "ContentType": "text/plain"}], "uids": ["Cr9EOI1QHmpBwucMkd"]} -{"Format": "IDEA0", "ID": "ee52df4e-4a38-465d-b4a7-432aae08ac84", "DetectTime": "2023-10-30T14:05:23.020419+02:00", "EventTime": "2023-10-30T14:05:23.020438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrkpBP3LETQK9Wiici"]} -{"Format": "IDEA0", "ID": "0fdf369d-675c-4c4b-b8f1-4c2463eb81dd", "DetectTime": "2023-10-30T14:05:23.060216+02:00", "EventTime": "2023-10-30T14:05:23.060232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.251.242.238 ", "ContentType": "text/plain"}], "uids": ["CR7eqA1uPQ1SkX0X92"]} -{"Format": "IDEA0", "ID": "2ddc247c-5860-429f-a5d4-c19662dbcb18", "DetectTime": "2023-10-30T14:05:23.090000+02:00", "EventTime": "2023-10-30T14:05:23.090026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.49.183 ", "ContentType": "text/plain"}], "uids": ["C0Wdkc4TuGxudR8L8"]} -{"Format": "IDEA0", "ID": "7ab137f7-549a-4084-b4c0-088a14c52880", "DetectTime": "2023-10-30T14:05:23.124598+02:00", "EventTime": "2023-10-30T14:05:23.124612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CEtonQ3rq3Cxbr30wb"]} -{"Format": "IDEA0", "ID": "5ca538b2-1cd6-419b-82bf-e6bcb2b86f46", "DetectTime": "2023-10-30T14:05:23.178519+02:00", "EventTime": "2023-10-30T14:05:23.178546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CaMtAP25ZOE9tGJ2Fd"]} -{"Format": "IDEA0", "ID": "6d2f0fb9-d986-424c-ad33-fcb1ddda44c1", "DetectTime": "2023-10-30T14:05:23.213371+02:00", "EventTime": "2023-10-30T14:05:23.213397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CbMGP92qdWsxOCmqe6"]} -{"Format": "IDEA0", "ID": "f499ba26-10ee-409f-a528-b21a669c8a3a", "DetectTime": "2023-10-30T14:05:23.244354+02:00", "EventTime": "2023-10-30T14:05:23.244371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CT6MaA1mmP11JakNlk"]} -{"Format": "IDEA0", "ID": "995215c7-b93f-4efa-a612-cf04f7afdb34", "DetectTime": "2023-10-30T14:05:23.273274+02:00", "EventTime": "2023-10-30T14:05:23.273291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8Lx5T3naYrUMMUBnh"]} -{"Format": "IDEA0", "ID": "8274626d-5aa5-4dcd-89f5-bde8114aaaa8", "DetectTime": "2023-10-30T14:05:23.300965+02:00", "EventTime": "2023-10-30T14:05:23.300982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CP5Etq3CgztpQSFIai"]} -{"Format": "IDEA0", "ID": "01a07a65-cd31-4b2f-be80-c0ce0a75f8fb", "DetectTime": "2023-10-30T14:05:23.328767+02:00", "EventTime": "2023-10-30T14:05:23.328783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["C0WRdy2unonhFYo4U9"]} -{"Format": "IDEA0", "ID": "36547184-b2e5-424c-a948-27bc45e40ea9", "DetectTime": "2023-10-30T14:05:23.354928+02:00", "EventTime": "2023-10-30T14:05:23.354943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CmW03zAQNQPBxuMpa"]} -{"Format": "IDEA0", "ID": "96b315ba-c6b4-4fa1-8735-5a06149bdc22", "DetectTime": "2023-10-30T14:05:23.382150+02:00", "EventTime": "2023-10-30T14:05:23.382167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CRk77M3ho6AE9M6iS1"]} -{"Format": "IDEA0", "ID": "0bac2106-fa26-42de-b16b-e832f5d5c0c4", "DetectTime": "2023-10-30T14:05:23.421329+02:00", "EventTime": "2023-10-30T14:05:23.421344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["ChQ9xy2YVNhy75H9Cg"]} -{"Format": "IDEA0", "ID": "37cdb3c1-a8bb-4b71-9989-b506805e06c1", "DetectTime": "2023-10-30T14:05:23.447590+02:00", "EventTime": "2023-10-30T14:05:23.447609+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbOJDA4puV4xFCkyf4"]} -{"Format": "IDEA0", "ID": "09729f21-c9c4-4179-9a2e-678ef9b2cee8", "DetectTime": "2023-10-30T14:05:23.456677+02:00", "EventTime": "2023-10-30T14:05:23.456693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CFyffq3rbKCMzLT8Fg"]} -{"Format": "IDEA0", "ID": "3c48d5f1-902c-4770-a5b3-cbb19a4f5157", "DetectTime": "2023-10-30T14:05:23.484216+02:00", "EventTime": "2023-10-30T14:05:23.484236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CaW2oD4i5rhdVPUl3f"]} -{"Format": "IDEA0", "ID": "4c3b1205-1dea-426b-aea2-95dacc449d5e", "DetectTime": "2023-10-30T14:05:23.511821+02:00", "EventTime": "2023-10-30T14:05:23.511842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CYNLSr1KA3Hzo3Ngle"]} -{"Format": "IDEA0", "ID": "8bd69ad7-f26d-47fb-9d99-1ff0eadc7b4d", "DetectTime": "2023-10-30T14:05:23.534942+02:00", "EventTime": "2023-10-30T14:05:23.534967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CPmgOn2T3XnHY8CSs7"]} -{"Format": "IDEA0", "ID": "92196696-762f-4141-974a-1c860cc69368", "DetectTime": "2023-10-30T14:05:23.561175+02:00", "EventTime": "2023-10-30T14:05:23.561189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CXjVLc2YhhTdA9ezad"]} -{"Format": "IDEA0", "ID": "367a15a6-444b-482c-b811-df1300786b08", "DetectTime": "2023-10-30T14:05:23.668958+02:00", "EventTime": "2023-10-30T14:05:23.669026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CbopBh3y1wD3U5gqSb"]} -{"Format": "IDEA0", "ID": "35b0f9ef-d863-4040-acbf-a04b342f61f4", "DetectTime": "2023-10-30T14:05:23.722752+02:00", "EventTime": "2023-10-30T14:05:23.722915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CrRrsCSZPNoJPJrdd"]} -{"Format": "IDEA0", "ID": "c2c3b9a1-e716-45e9-bdbb-d1683da9f5df", "DetectTime": "2023-10-30T14:05:23.754742+02:00", "EventTime": "2023-10-30T14:05:23.754764+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ccgb7H3MrBEGecBkp4"]} -{"Format": "IDEA0", "ID": "c97ac62c-e8c0-48a2-8eff-0fde14812286", "DetectTime": "2023-10-30T14:05:23.762930+02:00", "EventTime": "2023-10-30T14:05:23.762955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CCT6nt45tx3Uzndxse"]} -{"Format": "IDEA0", "ID": "81f5559a-0d09-4cf1-81ba-3b3e0eded0b8", "DetectTime": "2023-10-30T14:05:23.796841+02:00", "EventTime": "2023-10-30T14:05:23.796854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CHwhKR1F7yDNoGEnfb"]} -{"Format": "IDEA0", "ID": "70900e97-6a44-4174-9186-3b57fcc7dfe0", "DetectTime": "2023-10-30T14:05:23.825018+02:00", "EventTime": "2023-10-30T14:05:23.825036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Co2OPm1ukoKHJUXlbi"]} -{"Format": "IDEA0", "ID": "9dc1b1f1-2228-429e-bd97-465b8607064a", "DetectTime": "2023-10-30T14:05:23.855474+02:00", "EventTime": "2023-10-30T14:05:23.855492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["Ck6D5g4VORVEJmnBmi"]} -{"Format": "IDEA0", "ID": "a388672c-41f3-49d9-a35a-2f98b6b6f9c1", "DetectTime": "2023-10-30T14:05:23.884906+02:00", "EventTime": "2023-10-30T14:05:23.884924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNSIb51uOCbzIUqUC9"]} -{"Format": "IDEA0", "ID": "4e6b0e68-47d1-4f23-a99b-b4d4bfce77e4", "DetectTime": "2023-10-30T14:05:23.912454+02:00", "EventTime": "2023-10-30T14:05:23.912475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["Cz34LFchKry16K6c3"]} -{"Format": "IDEA0", "ID": "192b0676-a148-496b-be86-6cb900c23185", "DetectTime": "2023-10-30T14:05:23.946826+02:00", "EventTime": "2023-10-30T14:05:23.946850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["Cz9D1a2GcD5YjC2dZf"]} -{"Format": "IDEA0", "ID": "34261c21-452f-44be-8588-c5bf6b53df57", "DetectTime": "2023-10-30T14:05:23.980941+02:00", "EventTime": "2023-10-30T14:05:23.980962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CCtRDi3qNWOCmcNic9"]} -{"Format": "IDEA0", "ID": "8a3d281c-b9fc-48cd-9c8a-0ad50d94d560", "DetectTime": "2023-10-30T14:05:24.016242+02:00", "EventTime": "2023-10-30T14:05:24.016267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CQA8T93xiuxrYor205"]} -{"Format": "Json", "ID": "8a3d281c-b9fc-48cd-9c8a-0ad50d94d560", "DetectTime": "2023-10-30T14:05:24.016242+02:00", "EventTime": "2023-10-30T14:05:24.016267+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T10:26:41.823519+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2023/10/30 14:05:24.108123)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "49c0cd83-bd05-4b35-8f77-80f6071ceec6", "DetectTime": "2023-10-30T14:05:24.114010+02:00", "EventTime": "2023-10-30T14:05:24.114029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["CtaUx52CbZWDdpE1Vb"]} -{"Format": "IDEA0", "ID": "810a66d9-9dd7-4b86-8a10-c866babd64fd", "DetectTime": "2023-10-30T14:05:24.162469+02:00", "EventTime": "2023-10-30T14:05:24.162487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["C1qC203nvDhJHVmVS9"]} -{"Format": "IDEA0", "ID": "178bccf7-a875-4ad1-bd76-5f26bb0e4eeb", "DetectTime": "2023-10-30T14:05:24.192329+02:00", "EventTime": "2023-10-30T14:05:24.192348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CFzF2H3rPABIdT8Z26"]} -{"Format": "IDEA0", "ID": "865caa2e-4366-4bcc-9e4f-37bff2358bed", "DetectTime": "2023-10-30T14:05:24.222373+02:00", "EventTime": "2023-10-30T14:05:24.222389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["CvkDSz4E0KtDMmpgb2"]} -{"Format": "IDEA0", "ID": "b88c4b05-3056-48fd-9360-b6bddeab2985", "DetectTime": "2023-10-30T14:05:24.256128+02:00", "EventTime": "2023-10-30T14:05:24.256144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CTFWbT3y9iiihoQlu2"]} -{"Format": "IDEA0", "ID": "5663da11-9cc5-4f96-9e6b-2e7478c5b021", "DetectTime": "2023-10-30T14:05:24.286675+02:00", "EventTime": "2023-10-30T14:05:24.286693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CHfr6w2S2IsZ23iNb7"]} -{"Format": "IDEA0", "ID": "5fa3d932-d236-492e-bf23-34ad1d5abd06", "DetectTime": "2023-10-30T14:05:24.321293+02:00", "EventTime": "2023-10-30T14:05:24.321312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CUdmiW3SiAYNdMdjyd"]} -{"Format": "IDEA0", "ID": "b28e3bfb-b342-4161-be4f-ed99d383e643", "DetectTime": "2023-10-30T14:05:24.369187+02:00", "EventTime": "2023-10-30T14:05:24.369210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CSBaeO10HcTaKVM16a"]} -{"Format": "IDEA0", "ID": "75c4cbcd-ea5b-43b8-b1f3-b62e5bb13db8", "DetectTime": "2023-10-30T14:05:24.444175+02:00", "EventTime": "2023-10-30T14:05:24.444198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CTh8CXd3tq5H3c1jb"]} -{"Format": "IDEA0", "ID": "e688cbd2-b686-4100-90df-6e82e1a296b0", "DetectTime": "2023-10-30T14:05:24.488831+02:00", "EventTime": "2023-10-30T14:05:24.488849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CmKAPs4EtlTpNGpl9i"]} -{"Format": "IDEA0", "ID": "d8f4af5d-c7a2-4f2d-9456-a802e628ef51", "DetectTime": "2023-10-30T14:05:24.527295+02:00", "EventTime": "2023-10-30T14:05:24.527311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsgvQhVzS9lJ0faz5"]} -{"Format": "IDEA0", "ID": "01c97bbd-b355-480a-987d-cd5fec315cd5", "DetectTime": "2023-10-30T14:05:24.586034+02:00", "EventTime": "2023-10-30T14:05:24.586057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CzgEkB1xM92TUC373"]} -{"Format": "IDEA0", "ID": "26ee38ac-593a-462b-aeed-5b8343839809", "DetectTime": "2023-10-30T14:05:24.620271+02:00", "EventTime": "2023-10-30T14:05:24.620287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9gyfzcMUt2w60Edi"]} -{"Format": "IDEA0", "ID": "616e4dbb-7dbb-4952-8fe2-d7490ec67da9", "DetectTime": "2023-10-30T14:05:24.656230+02:00", "EventTime": "2023-10-30T14:05:24.656248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CBbW97Jt9JSsRs4Pa"]} -{"Format": "IDEA0", "ID": "3802ebd6-689a-4a27-9fdf-c0137d257ead", "DetectTime": "2023-10-30T14:05:24.692372+02:00", "EventTime": "2023-10-30T14:05:24.692388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CnBMJD3ZaX9npZzNQ7"]} -{"Format": "IDEA0", "ID": "c55fbaf2-a61a-43d4-bd00-145eddb9cc91", "DetectTime": "2023-10-30T14:05:24.722892+02:00", "EventTime": "2023-10-30T14:05:24.722910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CZufGX2LWfHIqNNaXf"]} -{"Format": "IDEA0", "ID": "58e398f2-41dd-46ab-8132-bcfa48973162", "DetectTime": "2023-10-30T14:05:24.755121+02:00", "EventTime": "2023-10-30T14:05:24.755138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.29.186.246 ", "ContentType": "text/plain"}], "uids": ["CFMQzd4iwWUxRKrKj"]} -{"Format": "IDEA0", "ID": "5f7b64a8-193d-4f9a-ae09-2197ce9418fc", "DetectTime": "2023-10-30T14:05:24.786546+02:00", "EventTime": "2023-10-30T14:05:24.786566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["Clu4Sq3NxeYkJJrvzf"]} -{"Format": "IDEA0", "ID": "debebc44-90ce-44c3-ba3a-22a9f9db09d8", "DetectTime": "2023-10-30T14:05:24.820087+02:00", "EventTime": "2023-10-30T14:05:24.820115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Cjeu2g3WnvBFDB9WR9"]} -{"Format": "IDEA0", "ID": "8abeed16-1ddc-4d4a-b2b7-3bda2cb175c7", "DetectTime": "2023-10-30T14:05:24.853764+02:00", "EventTime": "2023-10-30T14:05:24.853791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["Cj31xf2Q4qp7Yn2QU8"]} -{"Format": "IDEA0", "ID": "463f488f-7a4b-469b-84af-c0a31865da3a", "DetectTime": "2023-10-30T14:05:24.886123+02:00", "EventTime": "2023-10-30T14:05:24.886135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRDnq52eBbnVWrXm0f"]} -{"Format": "IDEA0", "ID": "fdf823f4-4f52-4859-b2b0-ebb294ad1845", "DetectTime": "2023-10-30T14:05:24.917593+02:00", "EventTime": "2023-10-30T14:05:24.917604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["C0NRkWINi0H20M49k"]} -{"Format": "IDEA0", "ID": "277fd8dc-1766-49f4-80f8-df852892673e", "DetectTime": "2023-10-30T14:05:24.949734+02:00", "EventTime": "2023-10-30T14:05:24.949747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CRqxEE2zsoqdkWUXG6"]} -{"Format": "IDEA0", "ID": "0240d7ab-60cf-43a4-b24a-eca37d6f4057", "DetectTime": "2023-10-30T14:05:24.973935+02:00", "EventTime": "2023-10-30T14:05:24.973952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CH7UHw2FPr981pLBUk"]} -{"Format": "IDEA0", "ID": "6285421a-7f11-4210-bc06-86992603af34", "DetectTime": "2023-10-30T14:05:24.994849+02:00", "EventTime": "2023-10-30T14:05:24.994865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CbgJ3l28OmqU1Kgws9"]} -{"Format": "IDEA0", "ID": "d396662f-f6e4-4fe8-b124-5d4106e117c9", "DetectTime": "2023-10-30T14:05:25.019014+02:00", "EventTime": "2023-10-30T14:05:25.019025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CBmCKo115abvMKV4P6"]} -{"Format": "IDEA0", "ID": "cc95094c-ca9c-4a9c-bc7e-4a9d8113bb6f", "DetectTime": "2023-10-30T14:05:25.044424+02:00", "EventTime": "2023-10-30T14:05:25.044441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C83Bkr2kcfvOlLVXLg"]} -{"Format": "IDEA0", "ID": "829ac4b2-0816-4f5b-92a9-df86b2ac82f9", "DetectTime": "2023-10-30T14:05:25.067339+02:00", "EventTime": "2023-10-30T14:05:25.067353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cu1EKi1NMT1hrOOmL7"]} -{"Format": "IDEA0", "ID": "bc098eba-877d-4265-832f-36d34ff469f9", "DetectTime": "2023-10-30T14:05:25.090209+02:00", "EventTime": "2023-10-30T14:05:25.090228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CCfYNB4zefRJB2sc9d"]} -{"Format": "IDEA0", "ID": "df585df7-1238-4f70-b987-4961160845ce", "DetectTime": "2023-10-30T14:05:25.119353+02:00", "EventTime": "2023-10-30T14:05:25.119369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CUTvr7D4NLcxWs8xf"]} -{"Format": "IDEA0", "ID": "6315f46f-1672-4db8-baa9-f778c63f042b", "DetectTime": "2023-10-30T14:05:25.146767+02:00", "EventTime": "2023-10-30T14:05:25.146798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CotTrFDlLciMhKI4d"]} -{"Format": "IDEA0", "ID": "0fc63c52-3e38-401a-8fb7-0952f4bb8e8d", "DetectTime": "2023-10-30T14:05:25.168162+02:00", "EventTime": "2023-10-30T14:05:25.168187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["C3YoRr1W4gHPzn3s1"]} -{"Format": "IDEA0", "ID": "7ad46410-9653-4e36-8b24-c309e603a594", "DetectTime": "2023-10-30T14:05:25.196132+02:00", "EventTime": "2023-10-30T14:05:25.196148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["CB3jzl46K1sLaGo9gl"]} -{"Format": "IDEA0", "ID": "62449932-ce18-48ab-9e5b-fd2816a48719", "DetectTime": "2023-10-30T14:05:25.226318+02:00", "EventTime": "2023-10-30T14:05:25.226333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CdAwGs4N7E1cOhUPx5"]} -{"Format": "IDEA0", "ID": "b987c79c-0881-4629-821e-da5aef130f4a", "DetectTime": "2023-10-30T14:05:25.251911+02:00", "EventTime": "2023-10-30T14:05:25.251926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CQExhMrQ9wHQoXfj3"]} -{"Format": "IDEA0", "ID": "4f549e98-831c-4896-bd7d-4f91a8557644", "DetectTime": "2023-10-30T14:05:25.279761+02:00", "EventTime": "2023-10-30T14:05:25.279781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CmPATar9ryxceXGXk"]} -{"Format": "IDEA0", "ID": "8da484a5-567f-4ffb-8b2d-5f87d8a5fd64", "DetectTime": "2023-10-30T14:05:25.313162+02:00", "EventTime": "2023-10-30T14:05:25.313245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["C9pshCgiUeGVnppxk"]} -{"Format": "IDEA0", "ID": "03f4cbf8-cdb4-48e5-ac64-d9682630f722", "DetectTime": "2023-10-30T14:05:25.333235+02:00", "EventTime": "2023-10-30T14:05:25.333256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CzWI0anJMEHPM37kb", "CpDiiIBzuEF1OkbFj", "CbOJDA4puV4xFCkyf4", "CAUbpe1WCB6cldWtyl"]} -{"Format": "IDEA0", "ID": "34b29f22-6b62-4c8e-a1fc-f0dbdb4275d1", "DetectTime": "2023-10-30T14:05:25.340591+02:00", "EventTime": "2023-10-30T14:05:25.340609+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CpDiiIBzuEF1OkbFj"]} -{"Format": "IDEA0", "ID": "ba703256-f843-4c95-b356-13ed72670c86", "DetectTime": "2023-10-30T14:05:25.349191+02:00", "EventTime": "2023-10-30T14:05:25.349213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CVHhHhV1JYrOCcyje"]} -{"Format": "IDEA0", "ID": "16ae0a38-e647-4eed-b304-8049ef4430d2", "DetectTime": "2023-10-30T14:05:25.375868+02:00", "EventTime": "2023-10-30T14:05:25.375888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["Ci31Sk11rtCjLPBD66"]} -{"Format": "IDEA0", "ID": "43ed1cc7-9255-4c86-8518-44366468c433", "DetectTime": "2023-10-30T14:05:25.402575+02:00", "EventTime": "2023-10-30T14:05:25.402597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CCgr1tX8i6JT8yRKb"]} -{"Format": "IDEA0", "ID": "fcfdb3b6-c0bf-4107-ab1a-f465a6694973", "DetectTime": "2023-10-30T14:05:25.432908+02:00", "EventTime": "2023-10-30T14:05:25.432928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C1TYgs1jfS02JzPOag"]} -{"Format": "IDEA0", "ID": "6bcd5911-a02e-4aec-8f0d-6e7dee48f374", "DetectTime": "2023-10-30T14:05:25.463781+02:00", "EventTime": "2023-10-30T14:05:25.463806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CVf7Ls3B8FiO3zgVf"]} -{"Format": "IDEA0", "ID": "cd84725c-8ef6-4718-a0cd-cd295804c646", "DetectTime": "2023-10-30T14:05:25.489000+02:00", "EventTime": "2023-10-30T14:05:25.489020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CtaJ393b3w8xu3IP9l"]} -{"Format": "IDEA0", "ID": "f8a714b7-787f-44ae-99a2-e8708b3a5114", "DetectTime": "2023-10-30T14:05:25.518508+02:00", "EventTime": "2023-10-30T14:05:25.518531+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cx1MNf42AJKn5TmJE1"]} -{"Format": "IDEA0", "ID": "86e08572-15a5-4465-b109-14bfacaf2567", "DetectTime": "2023-10-30T14:05:25.527167+02:00", "EventTime": "2023-10-30T14:05:25.527191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CPp1As22qAAeJyTCl2"]} -{"Format": "IDEA0", "ID": "a85becc6-8a75-4ddd-9d85-c58fe33d6370", "DetectTime": "2023-10-30T14:05:25.553466+02:00", "EventTime": "2023-10-30T14:05:25.553487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CsC7NdwzeV097Xvbg"]} -{"Format": "IDEA0", "ID": "299040ac-156e-4405-8362-9c37e5f071de", "DetectTime": "2023-10-30T14:05:25.579131+02:00", "EventTime": "2023-10-30T14:05:25.579142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["Cujdxr1NL9ZMrdk39f"]} -{"Format": "IDEA0", "ID": "e81d323a-3428-4c3e-b272-d20141d0ef2d", "DetectTime": "2023-10-30T14:05:25.606820+02:00", "EventTime": "2023-10-30T14:05:25.606836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["CorXaI1wvNBRKN1Fy1"]} -{"Format": "IDEA0", "ID": "a3848fb8-8056-4867-a44f-523991aa02a2", "DetectTime": "2023-10-30T14:05:25.632134+02:00", "EventTime": "2023-10-30T14:05:25.632155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C0XJs71eyBXXhXcvT6"]} -{"Format": "IDEA0", "ID": "ff6b409a-00a9-4c74-adc4-4fb66ff6fa98", "DetectTime": "2023-10-30T14:05:25.654571+02:00", "EventTime": "2023-10-30T14:05:25.654584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.202.252.61 ", "ContentType": "text/plain"}], "uids": ["CjzaBe4VkcNVKo3Tsa"]} -{"Format": "IDEA0", "ID": "fbbf9505-e535-4c12-adbc-ce0073d16e4a", "DetectTime": "2023-10-30T14:05:25.675980+02:00", "EventTime": "2023-10-30T14:05:25.675997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["ChrWlO2uIUAr1LntDg"]} -{"Format": "IDEA0", "ID": "56ec4744-f500-42a3-9d98-e567a1df2132", "DetectTime": "2023-10-30T14:05:25.699342+02:00", "EventTime": "2023-10-30T14:05:25.699356+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CbiLBG2MZjGSJ3qpP9"]} -{"Format": "IDEA0", "ID": "2d6f33c0-3da9-4656-8c3a-de8cfedd2a27", "DetectTime": "2023-10-30T14:05:25.706098+02:00", "EventTime": "2023-10-30T14:05:25.706114+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CG5dXE2UzSXTdY5Wnb"]} -{"Format": "IDEA0", "ID": "0d2924da-9658-4382-ac73-5beff5640fec", "DetectTime": "2023-10-30T14:05:25.712985+02:00", "EventTime": "2023-10-30T14:05:25.713002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cx6chm2SrBUQ8rkmta"]} -{"Format": "IDEA0", "ID": "2997ec46-6a19-4ca5-aee1-f80522069548", "DetectTime": "2023-10-30T14:05:25.736456+02:00", "EventTime": "2023-10-30T14:05:25.736472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwTkjC068FFdSXT39"]} -{"Format": "IDEA0", "ID": "7c356cdb-8ea1-4981-8156-0678c8185909", "DetectTime": "2023-10-30T14:05:25.758363+02:00", "EventTime": "2023-10-30T14:05:25.758380+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CTzLq93OJJFUptLnAk"]} -{"Format": "IDEA0", "ID": "97cde636-4894-44ac-887c-512c8542256c", "DetectTime": "2023-10-30T14:05:25.765373+02:00", "EventTime": "2023-10-30T14:05:25.765385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["CRaVzL3pPXsTeRIeM5"]} -{"Format": "IDEA0", "ID": "c0e7076d-563a-4cd9-a81c-476ac99aabc7", "DetectTime": "2023-10-30T14:05:25.786797+02:00", "EventTime": "2023-10-30T14:05:25.786814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CrNULn2OL9SwYIhgOj"]} -{"Format": "IDEA0", "ID": "8715572b-71f0-4708-bf73-637a4a0aee0e", "DetectTime": "2023-10-30T14:05:25.811171+02:00", "EventTime": "2023-10-30T14:05:25.811189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CDfGhe4XGC9U07SlK2"]} -{"Format": "IDEA0", "ID": "fc5a7d87-1670-4eeb-a958-600f196be90c", "DetectTime": "2023-10-30T14:05:25.833852+02:00", "EventTime": "2023-10-30T14:05:25.833870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CHxf6V2VZrUsN01B0b"]} -{"Format": "IDEA0", "ID": "796e70c1-021a-4660-aad6-67411c0fdcbe", "DetectTime": "2023-10-30T14:05:25.858359+02:00", "EventTime": "2023-10-30T14:05:25.858379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CDYxz640okIwmkAhbg"]} -{"Format": "IDEA0", "ID": "7b7887f6-3ac1-48d7-9e55-59b90a36317c", "DetectTime": "2023-10-30T14:05:25.882561+02:00", "EventTime": "2023-10-30T14:05:25.882583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Ceb52r4GRnw6Y6vEsd"]} -{"Format": "IDEA0", "ID": "f7dd007a-0aa1-42f6-b0fe-f1d3d4c1a9fa", "DetectTime": "2023-10-30T14:05:25.906753+02:00", "EventTime": "2023-10-30T14:05:25.906774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CF82p33kAXMTLwJf3d"]} -{"Format": "IDEA0", "ID": "b9a8ea32-3288-4013-985e-2763394b1ae9", "DetectTime": "2023-10-30T14:05:25.932086+02:00", "EventTime": "2023-10-30T14:05:25.932108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CaaB2z2NhcPSQbgej8"]} -{"Format": "IDEA0", "ID": "501c07fa-5401-4f38-a3fb-ebd99bfe2ad6", "DetectTime": "2023-10-30T14:05:25.956676+02:00", "EventTime": "2023-10-30T14:05:25.956693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CwI6y1So39uDZn9Af"]} -{"Format": "IDEA0", "ID": "ac7f7bb0-6c02-4744-b7eb-7b369f45514c", "DetectTime": "2023-10-30T14:05:25.980473+02:00", "EventTime": "2023-10-30T14:05:25.980490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CUYCMdoMtREDYNmx6"]} -{"Format": "IDEA0", "ID": "844ba47d-6944-4039-84cf-8ba15de4812f", "DetectTime": "2023-10-30T14:05:26.001727+02:00", "EventTime": "2023-10-30T14:05:26.001747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CImqqkWWaUCETexe9"]} -{"Format": "IDEA0", "ID": "fd5f9e1a-09a6-460d-88d4-180ffcd5f91a", "DetectTime": "2023-10-30T14:05:26.022741+02:00", "EventTime": "2023-10-30T14:05:26.022755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CRSUhH1gNI2FphH6L1"]} -{"Format": "IDEA0", "ID": "ec6d01d1-da40-4676-82da-987d8fd71d7f", "DetectTime": "2023-10-30T14:05:26.046077+02:00", "EventTime": "2023-10-30T14:05:26.046094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["C3hYuL1i0bIWRyzO8a"]} -{"Format": "IDEA0", "ID": "a3061d6e-9f79-45ef-bb43-2dfdf62f8519", "DetectTime": "2023-10-30T14:05:26.073274+02:00", "EventTime": "2023-10-30T14:05:26.073299+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CcHuYlDjOSKaZzsVe"]} -{"Format": "IDEA0", "ID": "31643f41-5d23-4505-9953-7bcaef8515ae", "DetectTime": "2023-10-30T14:05:26.081365+02:00", "EventTime": "2023-10-30T14:05:26.081384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CQK3Dp1dsp3KmCDSq8"]} -{"Format": "IDEA0", "ID": "e46013f8-7fca-4f07-9173-ead8b2be76be", "DetectTime": "2023-10-30T14:05:26.104814+02:00", "EventTime": "2023-10-30T14:05:26.104826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CpkSK2101KQEOpBod"]} -{"Format": "IDEA0", "ID": "4318aa42-7070-497e-8e4d-3bca97e99651", "DetectTime": "2023-10-30T14:05:26.123071+02:00", "EventTime": "2023-10-30T14:05:26.123088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CU3LA041caokmBKxvk"]} -{"Format": "IDEA0", "ID": "5bc1d9db-d106-480b-adb8-d27ee6f0ad82", "DetectTime": "2023-10-30T14:05:26.145581+02:00", "EventTime": "2023-10-30T14:05:26.145598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Crk0wCGy1DdCO0vkj"]} -{"Format": "IDEA0", "ID": "59e4ed54-fc05-454d-a8cc-bea2dd1872bd", "DetectTime": "2023-10-30T14:05:26.170932+02:00", "EventTime": "2023-10-30T14:05:26.170953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CVIoDUrfoQz3yZ01d"]} -{"Format": "IDEA0", "ID": "bfecffa1-8fa2-4db2-ba24-bba648171332", "DetectTime": "2023-10-30T14:05:26.204267+02:00", "EventTime": "2023-10-30T14:05:26.204287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["Ck6TNu4FKTtvPxwzOf"]} -{"Format": "IDEA0", "ID": "773a3d85-cd19-48f5-9425-7cf30596561f", "DetectTime": "2023-10-30T14:05:26.226435+02:00", "EventTime": "2023-10-30T14:05:26.226455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CiSlr417pX39ey8Vd4"]} -{"Format": "IDEA0", "ID": "b373b2ea-5ee4-43dd-ab13-5443a09bfffb", "DetectTime": "2023-10-30T14:05:26.249534+02:00", "EventTime": "2023-10-30T14:05:26.249563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["C5dJlM3yszoH76bDE1"]} -{"Format": "IDEA0", "ID": "ba542243-edd8-4bdc-adba-783e88e3ae29", "DetectTime": "2023-10-30T14:05:26.271234+02:00", "EventTime": "2023-10-30T14:05:26.271249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CPzkmb1KXfdYVC3SGk"]} -{"Format": "IDEA0", "ID": "225d5b79-da01-4105-b8da-2aad1be7a31a", "DetectTime": "2023-10-30T14:05:26.292090+02:00", "EventTime": "2023-10-30T14:05:26.292107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CcmW9Y1leyC7lo30R5"]} -{"Format": "IDEA0", "ID": "1257569d-27ca-4081-9c03-4cea66f31058", "DetectTime": "2023-10-30T14:05:26.315158+02:00", "EventTime": "2023-10-30T14:05:26.315175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CstIdz3Yo176UP3Neb"]} -{"Format": "IDEA0", "ID": "e9a2cbdc-7e5d-4cb5-9324-f885dcb06886", "DetectTime": "2023-10-30T14:05:26.338489+02:00", "EventTime": "2023-10-30T14:05:26.338509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CY68pC4hs637p6JBjd"]} -{"Format": "IDEA0", "ID": "c7db9a0d-d610-4845-9c0d-58a93a9856c2", "DetectTime": "2023-10-30T14:05:26.365143+02:00", "EventTime": "2023-10-30T14:05:26.365163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.235.166.233 ", "ContentType": "text/plain"}], "uids": ["CBZsL12D6kzr3Kn4Hc"]} -{"Format": "IDEA0", "ID": "ac09c1e2-d756-4ef6-84a5-c98845f4a5cf", "DetectTime": "2023-10-30T14:05:26.384731+02:00", "EventTime": "2023-10-30T14:05:26.384741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CwOv1yitWSGUkJek"]} -{"Format": "IDEA0", "ID": "f68a00ce-a2a4-4356-9715-489ecfb01879", "DetectTime": "2023-10-30T14:05:26.408634+02:00", "EventTime": "2023-10-30T14:05:26.408651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.42.223.97 ", "ContentType": "text/plain"}], "uids": ["CIG8sv2denmm2Qggzf"]} -{"Format": "IDEA0", "ID": "f983661e-2bfb-4944-a08a-ca05a6bd67be", "DetectTime": "2023-10-30T14:05:26.426159+02:00", "EventTime": "2023-10-30T14:05:26.426177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CPHZAA3CKki3AWoVle"]} -{"Format": "IDEA0", "ID": "cb3ffceb-83d6-46e1-8d21-4d7d0894ee7d", "DetectTime": "2023-10-30T14:05:26.443030+02:00", "EventTime": "2023-10-30T14:05:26.443042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRrARq213zbwpDSuKc"]} -{"Format": "IDEA0", "ID": "8db13371-3e33-42fb-9197-bf72c6b0e12e", "DetectTime": "2023-10-30T14:05:26.470961+02:00", "EventTime": "2023-10-30T14:05:26.470988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["CGsEuG2VOIOEd8Xjzh"]} -{"Format": "IDEA0", "ID": "d1869b9b-6f9a-4c2b-ae2b-840e6b279805", "DetectTime": "2023-10-30T14:05:26.489855+02:00", "EventTime": "2023-10-30T14:05:26.489868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CH348B2Gc6fkiZEvVl"]} -{"Format": "IDEA0", "ID": "13bd2a9c-c8c9-4558-983d-2e62c7d1159b", "DetectTime": "2023-10-30T14:05:26.513712+02:00", "EventTime": "2023-10-30T14:05:26.513728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cy0Soi12W4XoZZv5M2"]} -{"Format": "IDEA0", "ID": "86a05bf0-b710-4a3c-9b81-f0027a0a50c2", "DetectTime": "2023-10-30T14:05:26.608717+02:00", "EventTime": "2023-10-30T14:05:26.608742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CF2Z7j10UYCrF16IP6"]} -{"Format": "IDEA0", "ID": "b60d3666-7248-4c9b-b7a0-90284c58eea3", "DetectTime": "2023-10-30T14:05:26.634499+02:00", "EventTime": "2023-10-30T14:05:26.634510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["Cgz3zI1im2rlNFuIA6"]} -{"Format": "IDEA0", "ID": "995f12d9-9310-4dd0-8083-d9d33dbf9911", "DetectTime": "2023-10-30T14:05:26.661193+02:00", "EventTime": "2023-10-30T14:05:26.661209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CFSuIF3s4zJfyaq5C5"]} -{"Format": "IDEA0", "ID": "d64003c1-e309-4cda-bd0c-b90e5533aa03", "DetectTime": "2023-10-30T14:05:26.690620+02:00", "EventTime": "2023-10-30T14:05:26.690643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CSS6dp1pIqIqhQLzR5"]} -{"Format": "IDEA0", "ID": "24ed704b-a777-4f99-8791-36189ec5e0df", "DetectTime": "2023-10-30T14:05:26.715368+02:00", "EventTime": "2023-10-30T14:05:26.715383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CoMtzc2O0oy2UQk6A4"]} -{"Format": "IDEA0", "ID": "8762d522-bf35-4135-b333-053bb7687914", "DetectTime": "2023-10-30T14:05:26.740053+02:00", "EventTime": "2023-10-30T14:05:26.740071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.152.219.188 ", "ContentType": "text/plain"}], "uids": ["C1QrkD17eQRNtHW65l"]} -{"Format": "IDEA0", "ID": "4963cfef-bc8f-4c18-ba4d-6697df24ba20", "DetectTime": "2023-10-30T14:05:26.764249+02:00", "EventTime": "2023-10-30T14:05:26.764263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C6xBYw0v2p2AzyIr3"]} -{"Format": "IDEA0", "ID": "60477a4d-8378-440a-a4a3-ebb51e50a36b", "DetectTime": "2023-10-30T14:05:26.790346+02:00", "EventTime": "2023-10-30T14:05:26.790362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CyOP1W3PheExcq9Vh7"]} -{"Format": "IDEA0", "ID": "ef1b7eb4-98f1-4e4f-a1bb-2a182b89e6d1", "DetectTime": "2023-10-30T14:05:26.816229+02:00", "EventTime": "2023-10-30T14:05:26.816247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CPzwDW7enKKHjmNU7"]} -{"Format": "IDEA0", "ID": "1eef5453-dd23-448d-9ff0-a1f0ff232ccf", "DetectTime": "2023-10-30T14:05:26.837657+02:00", "EventTime": "2023-10-30T14:05:26.837683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CRMIeU2OFWdSwleLB2"]} -{"Format": "IDEA0", "ID": "0bc53184-aca5-461e-840b-e9359561d4e3", "DetectTime": "2023-10-30T14:05:26.862978+02:00", "EventTime": "2023-10-30T14:05:26.862998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cg2Tac4p1Nx8hvX3qi"]} -{"Format": "IDEA0", "ID": "4863bd56-2b94-474d-be55-644f0757740b", "DetectTime": "2023-10-30T14:05:26.886831+02:00", "EventTime": "2023-10-30T14:05:26.886850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["Cecjdk3L9ZUUKpM9M5"]} -{"Format": "IDEA0", "ID": "4178158a-85c1-428d-b8e4-f691433d1099", "DetectTime": "2023-10-30T14:05:26.916276+02:00", "EventTime": "2023-10-30T14:05:26.916292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CC5SUvXpjC6IBHA2d"]} -{"Format": "IDEA0", "ID": "8df356eb-b7fc-4ecb-8223-9f793e3fe016", "DetectTime": "2023-10-30T14:05:26.941760+02:00", "EventTime": "2023-10-30T14:05:26.941782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cp1SKf3eOyUYJ2Q2Ec"]} -{"Format": "IDEA0", "ID": "e033a4e0-67f0-46a6-b275-b3c074027a88", "DetectTime": "2023-10-30T14:05:26.963837+02:00", "EventTime": "2023-10-30T14:05:26.963856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CkVnTp3pvJo5bz6xic"]} -{"Format": "IDEA0", "ID": "afc2fc50-8e33-4ea5-80b9-adb0be17d622", "DetectTime": "2023-10-30T14:05:26.989942+02:00", "EventTime": "2023-10-30T14:05:26.989968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CFCRFw4Wt23kjkOcfc"]} -{"Format": "IDEA0", "ID": "f8b0decf-389b-4094-824e-a0507d16dee0", "DetectTime": "2023-10-30T14:05:27.013877+02:00", "EventTime": "2023-10-30T14:05:27.013893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CC6Dt11aHqIJzRb3Fd"]} -{"Format": "IDEA0", "ID": "08f39a70-dfff-475a-817c-9fd5d1782322", "DetectTime": "2023-10-30T14:05:27.033860+02:00", "EventTime": "2023-10-30T14:05:27.033871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["Cy6u8q2YUEIZ3drIKi"]} -{"Format": "IDEA0", "ID": "78b7a6b8-d492-48e3-9c7a-f1148dcf084d", "DetectTime": "2023-10-30T14:05:27.056234+02:00", "EventTime": "2023-10-30T14:05:27.056256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CjlvGricqtFhSVNKh"]} -{"Format": "IDEA0", "ID": "63252a01-457b-4c6e-8209-1b179041623b", "DetectTime": "2023-10-30T14:05:27.080597+02:00", "EventTime": "2023-10-30T14:05:27.080617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CluqnH3TbXcDGwTU14"]} -{"Format": "IDEA0", "ID": "2146ab31-24af-4607-90b8-a1067c6b07d8", "DetectTime": "2023-10-30T14:05:27.105166+02:00", "EventTime": "2023-10-30T14:05:27.105182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["CyK85f4iigfljSC6W5"]} -{"Format": "IDEA0", "ID": "35a54866-9350-4fbe-85ae-9b0917839152", "DetectTime": "2023-10-30T14:05:27.140132+02:00", "EventTime": "2023-10-30T14:05:27.140151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C7V7eD255xsDSrsKx8"]} -{"Format": "IDEA0", "ID": "8cec623b-144c-41c1-a8fb-4b1669f36702", "DetectTime": "2023-10-30T14:05:27.166263+02:00", "EventTime": "2023-10-30T14:05:27.166285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["Cv38o03VHXay7xzfnd"]} -{"Format": "IDEA0", "ID": "a897508c-e069-4d39-8ea7-6c5567da4a92", "DetectTime": "2023-10-30T14:05:27.194629+02:00", "EventTime": "2023-10-30T14:05:27.194645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["Cny9Sm1DJthEjCxno6"]} -{"Format": "IDEA0", "ID": "840b8919-17d6-407d-b937-7c38f26bdfba", "DetectTime": "2023-10-30T14:05:27.223483+02:00", "EventTime": "2023-10-30T14:05:27.223498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.44.21.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.44.21.6 ", "ContentType": "text/plain"}], "uids": ["Cl9Ew44QnUNtExOZmb"]} -{"Format": "IDEA0", "ID": "8091dc61-4a4a-4203-83c9-f76ac4843480", "DetectTime": "2023-10-30T14:05:27.245957+02:00", "EventTime": "2023-10-30T14:05:27.245973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVWCWu3PVI0XpJZaG1"]} -{"Format": "IDEA0", "ID": "c25500d8-ca51-4f5e-83fd-1d97e4118a33", "DetectTime": "2023-10-30T14:05:27.271892+02:00", "EventTime": "2023-10-30T14:05:27.271909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.137.54.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.137.54.10 ", "ContentType": "text/plain"}], "uids": ["CqyS1p3w89t0KQGGX5"]} -{"Format": "IDEA0", "ID": "a4196766-70ef-44af-849d-4205e51aa448", "DetectTime": "2023-10-30T14:05:27.297310+02:00", "EventTime": "2023-10-30T14:05:27.297330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CvLLrt0l6fnB5Mfai"]} -{"Format": "IDEA0", "ID": "0c83b0a1-3c75-4d44-be14-13175a1e460a", "DetectTime": "2023-10-30T14:05:27.321479+02:00", "EventTime": "2023-10-30T14:05:27.321490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.183.248.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.183.248.5 ", "ContentType": "text/plain"}], "uids": ["Cb4ySY2daQt0C0BPZ2"]} -{"Format": "IDEA0", "ID": "f36bea95-cca7-4908-b3df-731b6aa1e21e", "DetectTime": "2023-10-30T14:05:27.347678+02:00", "EventTime": "2023-10-30T14:05:27.347691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.116.98.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.116.98.186 ", "ContentType": "text/plain"}], "uids": ["CAVS0S1kyps3V8Rf04"]} -{"Format": "IDEA0", "ID": "4ad35ab2-f4ef-4fd6-a164-5ab8ca7b80e5", "DetectTime": "2023-10-30T14:05:27.372143+02:00", "EventTime": "2023-10-30T14:05:27.372158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["C5xkpB2uwTSQjZpDH"]} -{"Format": "IDEA0", "ID": "fa010f77-e5cd-436a-988e-31ab4c12c5de", "DetectTime": "2023-10-30T14:05:27.396783+02:00", "EventTime": "2023-10-30T14:05:27.396799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.92.21.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.92.21.212 ", "ContentType": "text/plain"}], "uids": ["CqIu184tg52aDMYU53"]} -{"Format": "IDEA0", "ID": "c0286205-8b5e-426b-bf01-66cef6cd0bcd", "DetectTime": "2023-10-30T14:05:27.421490+02:00", "EventTime": "2023-10-30T14:05:27.421514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.14.148.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.14.148.83 ", "ContentType": "text/plain"}], "uids": ["CKkECG2jDfURx9Qkzb"]} -{"Format": "IDEA0", "ID": "a037b8b8-4c8b-42f1-94ae-aedbd1497432", "DetectTime": "2023-10-30T14:05:27.449049+02:00", "EventTime": "2023-10-30T14:05:27.449065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.13.70.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.13.70.100 ", "ContentType": "text/plain"}], "uids": ["CRbcga1t4Qg3e7Ck44"]} -{"Format": "IDEA0", "ID": "5def472f-f70c-4a16-a8fe-0cbc0f732ec6", "DetectTime": "2023-10-30T14:05:27.475631+02:00", "EventTime": "2023-10-30T14:05:27.475652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.70.233.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.70.233.41 ", "ContentType": "text/plain"}], "uids": ["CzRIwZRMdvKZH6TS8"]} -{"Format": "IDEA0", "ID": "0de362e8-5317-4231-8622-3d7e2b9d64cc", "DetectTime": "2023-10-30T14:05:27.502378+02:00", "EventTime": "2023-10-30T14:05:27.502396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.39.6.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.39.6.109 ", "ContentType": "text/plain"}], "uids": ["CqXkwLeGaFSuRZyf2"]} -{"Format": "IDEA0", "ID": "6ce98c04-ea37-468b-94ef-c2450ab60d2f", "DetectTime": "2023-10-30T14:05:27.527647+02:00", "EventTime": "2023-10-30T14:05:27.527672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.158.48 ", "ContentType": "text/plain"}], "uids": ["Cmgen12o9Ie6IdMVd1"]} -{"Format": "IDEA0", "ID": "4579db52-4405-486a-8670-7be1484cd88c", "DetectTime": "2023-10-30T14:05:27.551695+02:00", "EventTime": "2023-10-30T14:05:27.551722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.162.85.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.162.85.176 ", "ContentType": "text/plain"}], "uids": ["Cym2sg3MoAEeUUbGNc"]} -{"Format": "IDEA0", "ID": "dc7c5910-774b-4ffa-b1c5-9bc55973ee6d", "DetectTime": "2023-10-30T14:05:27.576656+02:00", "EventTime": "2023-10-30T14:05:27.576677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.65.195.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.65.195.62 ", "ContentType": "text/plain"}], "uids": ["CSCtlq2Rk8V6oukXEf"]} -{"Format": "IDEA0", "ID": "8b416197-79b8-40ab-82cd-cee84d222708", "DetectTime": "2023-10-30T14:05:27.602938+02:00", "EventTime": "2023-10-30T14:05:27.602959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.64.171.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.64.171.254 ", "ContentType": "text/plain"}], "uids": ["CtNz2j1FeZkVvnRPCl"]} -{"Format": "IDEA0", "ID": "e3f1a021-2832-4f21-99f9-7960004af664", "DetectTime": "2023-10-30T14:05:27.629395+02:00", "EventTime": "2023-10-30T14:05:27.629410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.79.15.23"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.79.15.23 ", "ContentType": "text/plain"}], "uids": ["CP4YPl2OlYdbrV9INa"]} -{"Format": "IDEA0", "ID": "d102906e-c14e-43ad-83e9-b950ab22b0de", "DetectTime": "2023-10-30T14:05:27.655626+02:00", "EventTime": "2023-10-30T14:05:27.655648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.167.175.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.167.175.79 ", "ContentType": "text/plain"}], "uids": ["CBSYXw1LrsdOic1nsk"]} -{"Format": "IDEA0", "ID": "787268fa-14c4-4991-9fb2-56da84fcf8a5", "DetectTime": "2023-10-30T14:05:27.684124+02:00", "EventTime": "2023-10-30T14:05:27.684145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.127.147.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.127.147.138 ", "ContentType": "text/plain"}], "uids": ["CD5Pdw2LmcTh6ZEQf6"]} -{"Format": "IDEA0", "ID": "0127a7f1-52a2-495c-926d-07077a86e249", "DetectTime": "2023-10-30T14:05:27.710548+02:00", "EventTime": "2023-10-30T14:05:27.710572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.64.105.137 ", "ContentType": "text/plain"}], "uids": ["C6FsU42ypMjxRpfDJb"]} -{"Format": "IDEA0", "ID": "2934caf1-6c18-413b-9d4b-a1bcdc6fe5f6", "DetectTime": "2023-10-30T14:05:27.735186+02:00", "EventTime": "2023-10-30T14:05:27.735202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.179.199.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.179.199.81 ", "ContentType": "text/plain"}], "uids": ["CLi4vMwpBdQWjw4n"]} -{"Format": "IDEA0", "ID": "d752c740-73d4-46dd-a8f5-c72c4eda0bf6", "DetectTime": "2023-10-30T14:05:27.760143+02:00", "EventTime": "2023-10-30T14:05:27.760161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C0t2ivhjk0B12dDi"]} -{"Format": "IDEA0", "ID": "11549152-5481-4ce8-99b0-c36247379378", "DetectTime": "2023-10-30T14:05:27.787087+02:00", "EventTime": "2023-10-30T14:05:27.787114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["C5hkfpmWJYYBuzgu6"]} -{"Format": "IDEA0", "ID": "89e1b400-3209-4c26-be39-08faa11359db", "DetectTime": "2023-10-30T14:05:27.812502+02:00", "EventTime": "2023-10-30T14:05:27.812520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CC7i8RClAzUYDBuj6"]} -{"Format": "IDEA0", "ID": "f8eae424-51ec-4f54-b496-290eb83baf76", "DetectTime": "2023-10-30T14:05:27.835687+02:00", "EventTime": "2023-10-30T14:05:27.835712+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDWVQN1m1ipXkFsVnf"]} -{"Format": "IDEA0", "ID": "dd017875-739f-41cc-9910-8cdb26ec3ca0", "DetectTime": "2023-10-30T14:05:27.845200+02:00", "EventTime": "2023-10-30T14:05:27.845222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.30.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.30.137 ", "ContentType": "text/plain"}], "uids": ["CLorRW1IOFLFgNm786"]} -{"Format": "IDEA0", "ID": "4d7007cd-7257-4305-863a-a12fab5c0ab4", "DetectTime": "2023-10-30T14:05:27.869132+02:00", "EventTime": "2023-10-30T14:05:27.869148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.238.13.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.238.13.187 ", "ContentType": "text/plain"}], "uids": ["CPU0tY3kzqPTHDzdr9"]} -{"Format": "IDEA0", "ID": "d9ed4aaf-6577-4c2d-a452-dc8854ae30ec", "DetectTime": "2023-10-30T14:05:27.892149+02:00", "EventTime": "2023-10-30T14:05:27.892167+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSVs3J1Mn4qCCpqsFl"]} -{"Format": "IDEA0", "ID": "ca2a8fef-746e-479d-8274-c7836eb9f136", "DetectTime": "2023-10-30T14:05:27.900890+02:00", "EventTime": "2023-10-30T14:05:27.900908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["Ckd2k3Hj9zaG1f8Ck"]} -{"Format": "IDEA0", "ID": "0bfd5476-9fe6-44a3-a0af-b84632363647", "DetectTime": "2023-10-30T14:05:27.932359+02:00", "EventTime": "2023-10-30T14:05:27.932377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.47.68.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.47.68.47 ", "ContentType": "text/plain"}], "uids": ["Cdgpl51Czhh8LFGSZ9"]} -{"Format": "IDEA0", "ID": "3cac1596-f2d3-4c7d-9172-19de498c6db9", "DetectTime": "2023-10-30T14:05:27.959372+02:00", "EventTime": "2023-10-30T14:05:27.959392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CbiLBG2MZjGSJ3qpP9", "CDK01e4JnUBW8yBpO3", "CTzLq93OJJFUptLnAk", "CDWVQN1m1ipXkFsVnf"]} -{"Format": "IDEA0", "ID": "0bb8ff18-d1b6-46ee-a531-40b0f7943b19", "DetectTime": "2023-10-30T14:05:27.968399+02:00", "EventTime": "2023-10-30T14:05:27.968416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDK01e4JnUBW8yBpO3"]} -{"Format": "IDEA0", "ID": "afffa605-d05c-40af-bdbf-17b41357181c", "DetectTime": "2023-10-30T14:05:27.976363+02:00", "EventTime": "2023-10-30T14:05:27.976379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.4.124.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.4.124.235 ", "ContentType": "text/plain"}], "uids": ["CeJaHN2agcHFxoP7H9"]} -{"Format": "IDEA0", "ID": "9580cb86-98e9-4529-989f-68e2feb0d11f", "DetectTime": "2023-10-30T14:05:27.997611+02:00", "EventTime": "2023-10-30T14:05:27.997636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.103.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.103.145 ", "ContentType": "text/plain"}], "uids": ["Cimni64v7R6wt1QWsk"]} -{"Format": "IDEA0", "ID": "b7a6ac1c-379f-4d02-9e65-48696b0f9782", "DetectTime": "2023-10-30T14:05:28.023706+02:00", "EventTime": "2023-10-30T14:05:28.023726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.70.45.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.70.45.237 ", "ContentType": "text/plain"}], "uids": ["CORKOb4s9iGBy1NmK3"]} -{"Format": "IDEA0", "ID": "0c5d7867-5d12-4633-b0dd-5026af919924", "DetectTime": "2023-10-30T14:05:28.048593+02:00", "EventTime": "2023-10-30T14:05:28.048613+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cq5gNx3CCDDMbOqOTe"]} -{"Format": "IDEA0", "ID": "a9d0e31a-4c0d-4690-b3f7-5ab92f44624e", "DetectTime": "2023-10-30T14:05:28.057844+02:00", "EventTime": "2023-10-30T14:05:28.057865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.6.137.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.6.137.163 ", "ContentType": "text/plain"}], "uids": ["CsaQAhovHIKqiZXc3"]} -{"Format": "IDEA0", "ID": "efdbaa83-3865-4f5b-9225-69175307cd4c", "DetectTime": "2023-10-30T14:05:28.084196+02:00", "EventTime": "2023-10-30T14:05:28.084223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.207.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.53.207.175 ", "ContentType": "text/plain"}], "uids": ["COoWoi3it29l2YWQv3"]} -{"Format": "IDEA0", "ID": "4c0c2839-bd1d-4e1f-a4d5-a85a34e089ac", "DetectTime": "2023-10-30T14:05:28.108791+02:00", "EventTime": "2023-10-30T14:05:28.108807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.219.182.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.219.182.186 ", "ContentType": "text/plain"}], "uids": ["CcSHV24MWz8oAdL3i7"]} -{"Format": "IDEA0", "ID": "f055ce3d-3128-4fce-b65d-12f01a6cdd48", "DetectTime": "2023-10-30T14:05:28.136866+02:00", "EventTime": "2023-10-30T14:05:28.136888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.136.208.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.136.208.226 ", "ContentType": "text/plain"}], "uids": ["CsFuRN2bN7wSeRuj9j"]} -{"Format": "IDEA0", "ID": "35f0a80f-3b22-419a-8814-475c589d7fd1", "DetectTime": "2023-10-30T14:05:28.163735+02:00", "EventTime": "2023-10-30T14:05:28.163753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.177.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.164.177.244 ", "ContentType": "text/plain"}], "uids": ["C3CHuV3R5ehmfUkdFi"]} -{"Format": "IDEA0", "ID": "d69fdeb7-f981-4c9c-ab04-fde87e8508f3", "DetectTime": "2023-10-30T14:05:28.186117+02:00", "EventTime": "2023-10-30T14:05:28.186138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.130.34.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.130.34.86 ", "ContentType": "text/plain"}], "uids": ["CszfjP2KrGzaCWnZPk"]} -{"Format": "IDEA0", "ID": "2a2dd029-53ea-4132-9403-9cb7d8009f66", "DetectTime": "2023-10-30T14:05:28.208162+02:00", "EventTime": "2023-10-30T14:05:28.208172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.48.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.48.189 ", "ContentType": "text/plain"}], "uids": ["CG3Xlr3SO6qRwmO3Oj"]} -{"Format": "IDEA0", "ID": "e8d5658c-f875-474c-8a8e-235ab499a7b0", "DetectTime": "2023-10-30T14:05:28.231037+02:00", "EventTime": "2023-10-30T14:05:28.231049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.97.114.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.97.114.61 ", "ContentType": "text/plain"}], "uids": ["CwWHNA13GTmJk7QZK1"]} -{"Format": "IDEA0", "ID": "ddbe3d1d-912b-411f-a537-ac2cb78472e4", "DetectTime": "2023-10-30T14:05:28.253125+02:00", "EventTime": "2023-10-30T14:05:28.253144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["CeGvnX2MiymeEv3zS9"]} -{"Format": "IDEA0", "ID": "f8011c7d-5684-4d95-8cc1-50895f524d49", "DetectTime": "2023-10-30T14:05:28.275681+02:00", "EventTime": "2023-10-30T14:05:28.275694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.93.99.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.93.99.254 ", "ContentType": "text/plain"}], "uids": ["CumGpkOr01Rfw4V0b"]} -{"Format": "IDEA0", "ID": "be15df7b-d205-491a-8f9d-704ced2831d8", "DetectTime": "2023-10-30T14:05:28.299425+02:00", "EventTime": "2023-10-30T14:05:28.299447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.88.250.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.88.250.25 ", "ContentType": "text/plain"}], "uids": ["CPeYLX1eajYY5rX07b"]} -{"Format": "IDEA0", "ID": "e7614673-f163-4983-af81-a9b4f3a15a16", "DetectTime": "2023-10-30T14:05:28.321727+02:00", "EventTime": "2023-10-30T14:05:28.321743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["27.54.51.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 27.54.51.115 ", "ContentType": "text/plain"}], "uids": ["CGC0Oy3tB8L94JFkji"]} -{"Format": "IDEA0", "ID": "315e7248-439f-483b-ad58-bde777650441", "DetectTime": "2023-10-30T14:05:28.344841+02:00", "EventTime": "2023-10-30T14:05:28.344861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.100.90.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.100.90.72 ", "ContentType": "text/plain"}], "uids": ["C2ttOb3eUXfjKpW8S9"]} -{"Format": "IDEA0", "ID": "4c1e0441-c766-466b-83f1-a7c0546df9eb", "DetectTime": "2023-10-30T14:05:28.364000+02:00", "EventTime": "2023-10-30T14:05:28.364013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["CwgmiW2oWAXAKi661d"]} -{"Format": "IDEA0", "ID": "11915a4c-8d69-4b21-884e-3154969ac463", "DetectTime": "2023-10-30T14:05:28.389831+02:00", "EventTime": "2023-10-30T14:05:28.389846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.47.239.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.47.239.222 ", "ContentType": "text/plain"}], "uids": ["CgMGij1OgImZFsxqC"]} -{"Format": "IDEA0", "ID": "5d6a5cf9-565f-4bde-b1c7-ebad41fe07b3", "DetectTime": "2023-10-30T14:05:28.414082+02:00", "EventTime": "2023-10-30T14:05:28.414103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CvOwHK2KoZSIB1WHe8"]} -{"Format": "IDEA0", "ID": "55658ee7-1542-4f6b-b598-e564169600d7", "DetectTime": "2023-10-30T14:05:28.436846+02:00", "EventTime": "2023-10-30T14:05:28.436863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.6.85.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.6.85.206 ", "ContentType": "text/plain"}], "uids": ["Cg1K5t3M58IEV3dxT1"]} -{"Format": "IDEA0", "ID": "d13de6b9-d445-4d40-b1a8-20981b0bdbfd", "DetectTime": "2023-10-30T14:05:28.463144+02:00", "EventTime": "2023-10-30T14:05:28.463156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.113.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.113.195 ", "ContentType": "text/plain"}], "uids": ["CuolWnLaRbs4kCM41"]} -{"Format": "IDEA0", "ID": "2b79099f-00eb-4a23-9d63-a8d2ea6522ee", "DetectTime": "2023-10-30T14:05:28.494649+02:00", "EventTime": "2023-10-30T14:05:28.494672+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CrJ5Id3u5n9ubjcfQ"]} -{"Format": "IDEA0", "ID": "1838cccb-534e-4839-8558-2ce8aac92267", "DetectTime": "2023-10-30T14:05:28.553342+02:00", "EventTime": "2023-10-30T14:05:28.553358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.198 ", "ContentType": "text/plain"}], "uids": ["CbasyA3qh5wbmLeDHb"]} -{"Format": "IDEA0", "ID": "7bb0eda7-daa2-490e-b70f-933e0e4f9d5a", "DetectTime": "2023-10-30T14:05:28.573245+02:00", "EventTime": "2023-10-30T14:05:28.573259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CbsxJd1FHNrYEKlcs8"]} -{"Format": "IDEA0", "ID": "75a4bc8b-a1e6-4e35-af03-560f9c388065", "DetectTime": "2023-10-30T14:05:28.600934+02:00", "EventTime": "2023-10-30T14:05:28.600952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.139.173.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.139.173.239 ", "ContentType": "text/plain"}], "uids": ["CfclNS5HEsOk6igHg"]} -{"Format": "IDEA0", "ID": "dd966c99-28e6-487f-95df-c6cf60768186", "DetectTime": "2023-10-30T14:05:28.628929+02:00", "EventTime": "2023-10-30T14:05:28.628949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.53.148.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.53.148.125 ", "ContentType": "text/plain"}], "uids": ["CjPsQm45IFyf4UVYR2"]} -{"Format": "IDEA0", "ID": "be64a41d-1038-4eda-8171-2a2a615af688", "DetectTime": "2023-10-30T14:05:28.654722+02:00", "EventTime": "2023-10-30T14:05:28.654739+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cz5dgK1JrsUTQteZ04"]} -{"Format": "IDEA0", "ID": "e00052ce-1ab3-4516-8383-5c2610c528b9", "DetectTime": "2023-10-30T14:05:28.662346+02:00", "EventTime": "2023-10-30T14:05:28.662365+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CX2Hok1QDXg3LNOWc"]} -{"Format": "IDEA0", "ID": "d08250d3-8608-40c7-8910-7d4fb4530923", "DetectTime": "2023-10-30T14:05:28.669228+02:00", "EventTime": "2023-10-30T14:05:28.669243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cx0Kp96JMi6IdR77d"]} -{"Format": "IDEA0", "ID": "bc373577-0eb9-4801-bb3f-e39c6d554527", "DetectTime": "2023-10-30T14:05:28.700920+02:00", "EventTime": "2023-10-30T14:05:28.700932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.62.240.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.62.240.159 ", "ContentType": "text/plain"}], "uids": ["CFKjX3Cn13iFSqD3c"]} -{"Format": "IDEA0", "ID": "4743ecb7-fa4b-4eb7-8ce3-4400a7ebbda8", "DetectTime": "2023-10-30T14:05:28.722609+02:00", "EventTime": "2023-10-30T14:05:28.722620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.50.112.98 ", "ContentType": "text/plain"}], "uids": ["CJqQeAfUobQWLyome"]} -{"Format": "IDEA0", "ID": "18dab3ad-eb9e-4346-82bc-6414bd1c2d63", "DetectTime": "2023-10-30T14:05:28.746011+02:00", "EventTime": "2023-10-30T14:05:28.746022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CSb4gx3hA64AYdRe9c"]} -{"Format": "IDEA0", "ID": "88c4be72-6f34-4a49-a1fc-34e7c839bba0", "DetectTime": "2023-10-30T14:05:28.767168+02:00", "EventTime": "2023-10-30T14:05:28.767184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CV5m464HB7l1FWIW54"]} -{"Format": "IDEA0", "ID": "1f687ae3-2551-4447-937d-fb0518b3b73a", "DetectTime": "2023-10-30T14:05:28.791547+02:00", "EventTime": "2023-10-30T14:05:28.791560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.3.38 ", "ContentType": "text/plain"}], "uids": ["CFk61j1GohneoC78Li"]} -{"Format": "IDEA0", "ID": "30809b41-365c-4322-92dd-7361c69461de", "DetectTime": "2023-10-30T14:05:28.817402+02:00", "EventTime": "2023-10-30T14:05:28.817414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaK5Wf34PnsTrd1gi6"]} -{"Format": "IDEA0", "ID": "07ce30e8-653c-4909-9332-0b237cc63724", "DetectTime": "2023-10-30T14:05:28.844212+02:00", "EventTime": "2023-10-30T14:05:28.844234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CBXOy237nfWAzltWl3"]} -{"Format": "IDEA0", "ID": "661b09b0-e3ca-457f-8d1f-59c4aaa8da13", "DetectTime": "2023-10-30T14:05:28.873742+02:00", "EventTime": "2023-10-30T14:05:28.873758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C508Ou2mw4RNjg4Gt9"]} -{"Format": "IDEA0", "ID": "8f6e20aa-056d-480e-b5c2-70c59f3b8ad3", "DetectTime": "2023-10-30T14:05:28.904496+02:00", "EventTime": "2023-10-30T14:05:28.904516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.60.50.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.60.50.180 ", "ContentType": "text/plain"}], "uids": ["Czv48O1yhd0ndSy4r7"]} -{"Format": "IDEA0", "ID": "607d33ba-9c6a-4f8b-a925-03ad5bf5bee6", "DetectTime": "2023-10-30T14:05:28.938578+02:00", "EventTime": "2023-10-30T14:05:28.938594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.48.220.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.48.220.55 ", "ContentType": "text/plain"}], "uids": ["CG5b9uZsypTUxpFZ7"]} -{"Format": "IDEA0", "ID": "8fb0d3fd-8f31-46f0-8b06-7092b8d238ac", "DetectTime": "2023-10-30T14:05:28.966129+02:00", "EventTime": "2023-10-30T14:05:28.966156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["C4CCSq3u4xllkEMW5"]} -{"Format": "IDEA0", "ID": "ab504f1a-45ca-4877-a671-c4293c9289fe", "DetectTime": "2023-10-30T14:05:28.992070+02:00", "EventTime": "2023-10-30T14:05:28.992086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C0Zo5o3KbxsiSMFyQc"]} -{"Format": "IDEA0", "ID": "c909c106-9a31-42ea-bfed-ec701b172b1e", "DetectTime": "2023-10-30T14:05:29.018100+02:00", "EventTime": "2023-10-30T14:05:29.018119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.42.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.42.213 ", "ContentType": "text/plain"}], "uids": ["CsFIDc22NsplrmtBI"]} -{"Format": "IDEA0", "ID": "dd7a5082-7480-479b-8510-ba58ab38fb21", "DetectTime": "2023-10-30T14:05:29.045848+02:00", "EventTime": "2023-10-30T14:05:29.045867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["Cw6PL44yJkq7KRqT3h"]} -{"Format": "IDEA0", "ID": "eaa4c5a0-4c58-4652-98e5-f37b06177608", "DetectTime": "2023-10-30T14:05:29.074692+02:00", "EventTime": "2023-10-30T14:05:29.074708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CjQISU1cjvOkJQhL2i"]} -{"Format": "IDEA0", "ID": "f985e0de-f5ee-406a-b383-897392d8df61", "DetectTime": "2023-10-30T14:05:29.099086+02:00", "EventTime": "2023-10-30T14:05:29.099106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CcXbVx1kgaDuotofej"]} -{"Format": "IDEA0", "ID": "5a7556e5-54e3-445b-a943-a28761991e34", "DetectTime": "2023-10-30T14:05:29.123137+02:00", "EventTime": "2023-10-30T14:05:29.123154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CDjzix2ZSiaD3gnJG"]} -{"Format": "IDEA0", "ID": "2f29d0e7-fef3-4156-b74b-dae591d55157", "DetectTime": "2023-10-30T14:05:29.145342+02:00", "EventTime": "2023-10-30T14:05:29.145358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CFreSV18dbfMFs1oe1"]} -{"Format": "IDEA0", "ID": "7fc1266f-1a3e-4231-a971-e834ea3c2e85", "DetectTime": "2023-10-30T14:05:29.165923+02:00", "EventTime": "2023-10-30T14:05:29.165940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CIdnJb1aVvZ17hK10g"]} -{"Format": "IDEA0", "ID": "62775de3-4fc9-47bf-8ed8-f8621f35fef1", "DetectTime": "2023-10-30T14:05:29.191596+02:00", "EventTime": "2023-10-30T14:05:29.191615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["C9kzmZ2SGQsffzUare"]} -{"Format": "IDEA0", "ID": "779c8ffa-586d-43cd-92d9-3a467e1fee05", "DetectTime": "2023-10-30T14:05:29.219662+02:00", "EventTime": "2023-10-30T14:05:29.219679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["C8DvvB2f7lY6avzFXk"]} -{"Format": "IDEA0", "ID": "e53e4869-c8b1-4f49-a796-cd21a7054e43", "DetectTime": "2023-10-30T14:05:29.249910+02:00", "EventTime": "2023-10-30T14:05:29.249922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CpTchq3pd2AaGjQNu6"]} -{"Format": "IDEA0", "ID": "df4c2b42-5440-4ae5-bab2-f1b0eb6b6413", "DetectTime": "2023-10-30T14:05:29.280206+02:00", "EventTime": "2023-10-30T14:05:29.280221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CTHlUZ1FpQpzhdCMEj"]} -{"Format": "IDEA0", "ID": "f10841e0-3151-4e76-9699-90b276185038", "DetectTime": "2023-10-30T14:05:29.307544+02:00", "EventTime": "2023-10-30T14:05:29.307566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CCTRENH6ZY8DBMZX1"]} -{"Format": "IDEA0", "ID": "9a15c78b-c837-4940-a4a2-e47642a3d408", "DetectTime": "2023-10-30T14:05:29.336671+02:00", "EventTime": "2023-10-30T14:05:29.336684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CG2nhQPhQKfeIrgy6"]} -{"Format": "IDEA0", "ID": "2a9e2366-a460-4536-84ec-bebb1e79aaa1", "DetectTime": "2023-10-30T14:05:29.362034+02:00", "EventTime": "2023-10-30T14:05:29.362051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CR9CeI2HgOsFk25Vsa"]} -{"Format": "IDEA0", "ID": "cf90ff79-af2d-45b8-8d95-1afc0b1f3388", "DetectTime": "2023-10-30T14:05:29.392763+02:00", "EventTime": "2023-10-30T14:05:29.392777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CRydEY3il79s5e3je4"]} -{"Format": "IDEA0", "ID": "1d689b5b-4b04-4532-b0c8-eaa62f93b0a8", "DetectTime": "2023-10-30T14:05:29.421645+02:00", "EventTime": "2023-10-30T14:05:29.421657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ChEzJw3o8KJlvDZHJf"]} -{"Format": "IDEA0", "ID": "8e08310d-7b70-428a-8f82-d49141959b61", "DetectTime": "2023-10-30T14:05:29.448394+02:00", "EventTime": "2023-10-30T14:05:29.448413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CeSpW64HQV2p22haf"]} -{"Format": "IDEA0", "ID": "b5b02800-4bdb-4b7d-b631-99c1d55ee2d1", "DetectTime": "2023-10-30T14:05:29.476431+02:00", "EventTime": "2023-10-30T14:05:29.476454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C6WP8Z1ixCwCcVmxN2"]} -{"Format": "IDEA0", "ID": "52743e3d-3a2b-4769-8841-2419086bb3ae", "DetectTime": "2023-10-30T14:05:29.504110+02:00", "EventTime": "2023-10-30T14:05:29.504138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CqtPaA3qwO4010no15"]} -{"Format": "IDEA0", "ID": "d3538a6c-c379-47fb-97ed-eba86f746b64", "DetectTime": "2023-10-30T14:05:29.529572+02:00", "EventTime": "2023-10-30T14:05:29.529588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CVY1Ed1HrCbyJE4VVj"]} -{"Format": "IDEA0", "ID": "4bc1bfdd-8d7e-4288-816b-039dfa72aeff", "DetectTime": "2023-10-30T14:05:29.556173+02:00", "EventTime": "2023-10-30T14:05:29.556200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["C1dtmeAqgMneLeWPf"]} -{"Format": "IDEA0", "ID": "7f800b76-e843-495a-aec2-9086ac4c1b0b", "DetectTime": "2023-10-30T14:05:29.582606+02:00", "EventTime": "2023-10-30T14:05:29.582622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVRgr91YaTyi20mfV3"]} -{"Format": "Json", "ID": "7f800b76-e843-495a-aec2-9086ac4c1b0b", "DetectTime": "2023-10-30T14:05:29.582606+02:00", "EventTime": "2023-10-30T14:05:29.582622+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T10:57:28.229574+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2023/10/30 14:05:29.639847)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3b60feb-257a-47d9-b67d-606397edd4bb", "DetectTime": "2023-10-30T14:05:29.645363+02:00", "EventTime": "2023-10-30T14:05:29.645374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["ChH4PHx8XBIxwbtz6"]} -{"Format": "IDEA0", "ID": "072f684d-0cf2-4e67-9b35-f1638ff42bcc", "DetectTime": "2023-10-30T14:05:29.780760+02:00", "EventTime": "2023-10-30T14:05:29.780780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.64.105.137 ", "ContentType": "text/plain"}], "uids": ["C9JH5W28uq9ZLsucR"]} -{"Format": "IDEA0", "ID": "1cf2f9cf-d7b9-4221-8589-3f582abbfc57", "DetectTime": "2023-10-30T14:05:29.811241+02:00", "EventTime": "2023-10-30T14:05:29.811258+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIw48OsmSDAf0FVic"]} -{"Format": "IDEA0", "ID": "1aad0262-78c1-4f6b-ae53-d119f66b012e", "DetectTime": "2023-10-30T14:05:29.817978+02:00", "EventTime": "2023-10-30T14:05:29.818026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CBtInHiIEEsVBfNui"]} -{"Format": "IDEA0", "ID": "787253a6-5a88-474f-b428-ae4add1ac34e", "DetectTime": "2023-10-30T14:05:29.847863+02:00", "EventTime": "2023-10-30T14:05:29.847880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CxthmP10Bypb6iieZ2"]} -{"Format": "IDEA0", "ID": "924f2b6b-1235-4720-b730-a2384ebd5255", "DetectTime": "2023-10-30T14:05:29.874345+02:00", "EventTime": "2023-10-30T14:05:29.874361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["CYpwi2478Q8quPKiPh"]} -{"Format": "IDEA0", "ID": "7b60795d-0a41-4739-85d2-745644a18d95", "DetectTime": "2023-10-30T14:05:29.902641+02:00", "EventTime": "2023-10-30T14:05:29.902658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.198 ", "ContentType": "text/plain"}], "uids": ["CVlqu53ZEJ7eWoFaf4"]} -{"Format": "IDEA0", "ID": "b088ded7-ee18-4f85-bd81-838972aeeb73", "DetectTime": "2023-10-30T14:05:29.942328+02:00", "EventTime": "2023-10-30T14:05:29.942347+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CenzjF2am0lkdJAFI7"]} -{"Format": "IDEA0", "ID": "be81950f-8a99-4376-ad64-ff0ad9aaf385", "DetectTime": "2023-10-30T14:05:29.953801+02:00", "EventTime": "2023-10-30T14:05:29.953822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["C1Dd5i3IC55sVPSX61"]} -{"Format": "IDEA0", "ID": "c9a4ee49-8f3c-4bd0-b519-048da46dc4ef", "DetectTime": "2023-10-30T14:05:29.987057+02:00", "EventTime": "2023-10-30T14:05:29.987080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["C7VHQfdQNGjeA7IAd"]} -{"Format": "IDEA0", "ID": "3fd14908-d264-4e0f-9a37-d907d2da16be", "DetectTime": "2023-10-30T14:05:30.018555+02:00", "EventTime": "2023-10-30T14:05:30.018577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.158.48 ", "ContentType": "text/plain"}], "uids": ["C859u1WjS2BQICIu2"]} -{"Format": "IDEA0", "ID": "953e4550-25cd-40d1-9612-525c01c7b1a9", "DetectTime": "2023-10-30T14:05:30.057077+02:00", "EventTime": "2023-10-30T14:05:30.057093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.88.250.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.88.250.25 ", "ContentType": "text/plain"}], "uids": ["Cc5s4TfIZaoteBnW"]} -{"Format": "IDEA0", "ID": "0e01680b-e30d-4973-93e0-5a797cff184b", "DetectTime": "2023-10-30T14:05:30.087414+02:00", "EventTime": "2023-10-30T14:05:30.087430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.177.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.164.177.244 ", "ContentType": "text/plain"}], "uids": ["Cw82dF4uV84OMnHmg5"]} -{"Format": "IDEA0", "ID": "03af2e4a-0032-4918-9444-8922bda61d63", "DetectTime": "2023-10-30T14:05:30.114633+02:00", "EventTime": "2023-10-30T14:05:30.114650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CjOl9v2q8MwkG6ZAk6"]} -{"Format": "IDEA0", "ID": "dccfd6a5-2717-4e14-b9dc-dcce60a72ff2", "DetectTime": "2023-10-30T14:05:30.148974+02:00", "EventTime": "2023-10-30T14:05:30.148991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["CPRw5G4UuxqshgQstg"]} -{"Format": "IDEA0", "ID": "8e96961e-01a3-4dd7-bdb3-94af81722b46", "DetectTime": "2023-10-30T14:05:30.179315+02:00", "EventTime": "2023-10-30T14:05:30.179334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CDYv6T2cVcpVJaPdXc"]} -{"Format": "IDEA0", "ID": "e0c22785-9b0b-459e-8716-f248e68976d4", "DetectTime": "2023-10-30T14:05:30.212681+02:00", "EventTime": "2023-10-30T14:05:30.212693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.113.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.113.195 ", "ContentType": "text/plain"}], "uids": ["Cv9jiq2TdDqg7cdfug"]} -{"Format": "IDEA0", "ID": "c0e5741a-3b8d-466a-8b49-1f21618f3f9f", "DetectTime": "2023-10-30T14:05:30.241653+02:00", "EventTime": "2023-10-30T14:05:30.241674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.64.105.137 ", "ContentType": "text/plain"}], "uids": ["Cz8hig2jI9UFOMkZy4"]} -{"Format": "IDEA0", "ID": "b77097aa-128d-4642-b5c8-292f68e548f1", "DetectTime": "2023-10-30T14:05:30.271415+02:00", "EventTime": "2023-10-30T14:05:30.271435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C2LzCADz31CeCvkJg"]} -{"Format": "IDEA0", "ID": "66e12fc8-7902-4cd7-835a-92a3dd1695f6", "DetectTime": "2023-10-30T14:05:30.309355+02:00", "EventTime": "2023-10-30T14:05:30.309382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CxatN93Yaf5epzyjVa"]} -{"Format": "IDEA0", "ID": "e580765e-8f24-41dd-9afc-2ed4408dbefe", "DetectTime": "2023-10-30T14:05:30.338284+02:00", "EventTime": "2023-10-30T14:05:30.338300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C9P4531scJHYXHHHHi"]} -{"Format": "IDEA0", "ID": "6f1bc483-013a-420d-b390-e1dd83614a4d", "DetectTime": "2023-10-30T14:05:30.374221+02:00", "EventTime": "2023-10-30T14:05:30.374237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.88.250.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.88.250.25 ", "ContentType": "text/plain"}], "uids": ["CgUiloJ6T472NK1Q2"]} -{"Format": "IDEA0", "ID": "e3c94ecc-2520-4d47-b6a6-617efdef82cd", "DetectTime": "2023-10-30T14:05:30.404639+02:00", "EventTime": "2023-10-30T14:05:30.404660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["C3v94b33iM6BTNeNVg"]} -{"Format": "IDEA0", "ID": "70f2e919-dbc6-4308-b023-20f1b4aea1fe", "DetectTime": "2023-10-30T14:05:30.431951+02:00", "EventTime": "2023-10-30T14:05:30.431971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CzoFx2v1Isj9wGijb"]} -{"Format": "IDEA0", "ID": "b49a97d3-ec20-407d-b56d-1f1eafa30ec4", "DetectTime": "2023-10-30T14:05:30.497874+02:00", "EventTime": "2023-10-30T14:05:30.497911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CO2iUS3zbCS7t4dMGd"]} -{"Format": "IDEA0", "ID": "a16edacd-64a2-4c9d-a154-6456bf49586f", "DetectTime": "2023-10-30T14:05:30.549683+02:00", "EventTime": "2023-10-30T14:05:30.549701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CVizRRAm7GCEtrDZ5"]} -{"Format": "IDEA0", "ID": "1fc33200-8e7e-4726-b100-99a5cf658ec4", "DetectTime": "2023-10-30T14:05:30.585899+02:00", "EventTime": "2023-10-30T14:05:30.585915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["ClUhLp1tpAlUCFJE2d"]} -{"Format": "IDEA0", "ID": "96b7b3f4-1e48-4c79-b32e-cdfd87cb4c91", "DetectTime": "2023-10-30T14:05:30.619813+02:00", "EventTime": "2023-10-30T14:05:30.619832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["Cdz7nL2lzFrC0A5356"]} -{"Format": "IDEA0", "ID": "31f59b1e-bf7a-4fe2-9e62-9f6252239251", "DetectTime": "2023-10-30T14:05:30.650754+02:00", "EventTime": "2023-10-30T14:05:30.650774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["Cd21lj117jf5EwMVr4"]} -{"Format": "IDEA0", "ID": "cd3b36ac-a58f-4502-ae6a-b16287917f8f", "DetectTime": "2023-10-30T14:05:30.685938+02:00", "EventTime": "2023-10-30T14:05:30.685964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CZTzmk1AyR2yZoOZh5"]} -{"Format": "IDEA0", "ID": "d31b692c-eb9d-4e87-bf30-0e0c478553ed", "DetectTime": "2023-10-30T14:05:30.730489+02:00", "EventTime": "2023-10-30T14:05:30.730509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CMXWB145enJwkcFdM"]} -{"Format": "IDEA0", "ID": "20ea564b-fd62-40c9-b0cc-ee71cb6cfb7b", "DetectTime": "2023-10-30T14:05:30.759036+02:00", "EventTime": "2023-10-30T14:05:30.759055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Ct4mKd21VCTLm38O0j"]} -{"Format": "IDEA0", "ID": "e75f4af3-36d4-49c0-a7e7-ac232742d69e", "DetectTime": "2023-10-30T14:05:30.791268+02:00", "EventTime": "2023-10-30T14:05:30.791284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CKtj7W2LP6j5kfPQh1"]} -{"Format": "IDEA0", "ID": "32fb68f2-b429-4c03-8168-c7ba1ab7ffff", "DetectTime": "2023-10-30T14:05:30.821548+02:00", "EventTime": "2023-10-30T14:05:30.821564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CQvSVD1eo7ejfZSC2f"]} -{"Format": "IDEA0", "ID": "0d159c47-3e17-4a4a-a9d1-c6a14278eac2", "DetectTime": "2023-10-30T14:05:30.851107+02:00", "EventTime": "2023-10-30T14:05:30.851127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CpeDQP1SlbEJQIUj9e"]} -{"Format": "IDEA0", "ID": "ca27e312-d935-46fb-a784-ce74df781f13", "DetectTime": "2023-10-30T14:05:30.888248+02:00", "EventTime": "2023-10-30T14:05:30.888269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["ClT1SJ1ZJlZNSukAyi"]} -{"Format": "IDEA0", "ID": "6940ac13-6afc-4813-9c48-eb6f66458f66", "DetectTime": "2023-10-30T14:05:30.921567+02:00", "EventTime": "2023-10-30T14:05:30.921585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CdxzKuBuGxAOK4C63"]} -{"Format": "IDEA0", "ID": "17cd8c01-1aab-4a07-a3e8-10781c9e5101", "DetectTime": "2023-10-30T14:05:30.960059+02:00", "EventTime": "2023-10-30T14:05:30.960077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqkUN44MwVDBJoYOOd"]} -{"Format": "IDEA0", "ID": "5cf67b50-59c3-4a9a-8c02-ea1e5d14aaa0", "DetectTime": "2023-10-30T14:05:31.004258+02:00", "EventTime": "2023-10-30T14:05:31.004286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CBISgg2EfxTpwVJ2R7"]} -{"Format": "IDEA0", "ID": "75329b92-e114-42c3-8cf0-c0c6ce59a564", "DetectTime": "2023-10-30T14:05:31.060015+02:00", "EventTime": "2023-10-30T14:05:31.060038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CeDI5J3VCAgVqC5Pt9"]} -{"Format": "IDEA0", "ID": "8643e574-2f05-46b3-ac74-dedd0ae4933f", "DetectTime": "2023-10-30T14:05:31.132650+02:00", "EventTime": "2023-10-30T14:05:31.132667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CGLYjl3uDwJ2fuHUmc"]} -{"Format": "IDEA0", "ID": "cb712088-9a53-4ecd-9b8f-d9742d077f4a", "DetectTime": "2023-10-30T14:05:31.156228+02:00", "EventTime": "2023-10-30T14:05:31.156240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CKaqJcey7l6BJslbh"]} -{"Format": "IDEA0", "ID": "e4f56a9e-d3b0-49ee-9472-1112ec69b74b", "DetectTime": "2023-10-30T14:05:31.190221+02:00", "EventTime": "2023-10-30T14:05:31.190238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.158.48 ", "ContentType": "text/plain"}], "uids": ["CWVMs618QMvY9Xhaa3"]} -{"Format": "IDEA0", "ID": "e08fe538-84c6-48c1-90b3-a1b5f6ef8119", "DetectTime": "2023-10-30T14:05:31.217504+02:00", "EventTime": "2023-10-30T14:05:31.217524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CccqAeOLg9hCT81R2"]} -{"Format": "IDEA0", "ID": "82d4bc99-51fb-4689-9360-2d7efe9ce732", "DetectTime": "2023-10-30T14:05:31.251013+02:00", "EventTime": "2023-10-30T14:05:31.251131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.177.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.164.177.244 ", "ContentType": "text/plain"}], "uids": ["C6LVSv11ChAaSx9fE5"]} -{"Format": "IDEA0", "ID": "08717577-cc3b-4b3a-93da-feca840860d5", "DetectTime": "2023-10-30T14:05:31.275535+02:00", "EventTime": "2023-10-30T14:05:31.275553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CjUw9B39VhN9IK4P7f"]} -{"Format": "IDEA0", "ID": "91ed8ed8-a53b-486d-8b5f-5c17f5f750fe", "DetectTime": "2023-10-30T14:05:31.308711+02:00", "EventTime": "2023-10-30T14:05:31.308734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["CzZN6Kvq9e5xBafZb"]} -{"Format": "IDEA0", "ID": "428ac4b0-0583-425b-a795-bbe0d4064479", "DetectTime": "2023-10-30T14:05:31.336533+02:00", "EventTime": "2023-10-30T14:05:31.336549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CwC8gS2X8Wi6J76Qll"]} -{"Format": "IDEA0", "ID": "cb767ccd-84c8-4c29-b325-5ab12d59151e", "DetectTime": "2023-10-30T14:05:31.363811+02:00", "EventTime": "2023-10-30T14:05:31.363838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CXMYmzMEXDYBz5Uo6"]} -{"Format": "IDEA0", "ID": "c37dad78-a949-43af-aa30-dbbf7c185d76", "DetectTime": "2023-10-30T14:05:31.390972+02:00", "EventTime": "2023-10-30T14:05:31.390993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CPFNKtRlFzu6jT7Yh"]} -{"Format": "IDEA0", "ID": "0157b1c0-619f-4d1e-bef2-e5a46923eb27", "DetectTime": "2023-10-30T14:05:31.418517+02:00", "EventTime": "2023-10-30T14:05:31.418540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C8dKT31mMNnHCCQUTf"]} -{"Format": "IDEA0", "ID": "208edb21-4f03-4b46-9f92-30873c62d1f5", "DetectTime": "2023-10-30T14:05:31.447096+02:00", "EventTime": "2023-10-30T14:05:31.447118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Co49lF29ggtJtkqqEe"]} -{"Format": "IDEA0", "ID": "4cbc3ba2-3ece-43a8-b04a-c67d3f9df835", "DetectTime": "2023-10-30T14:05:31.479254+02:00", "EventTime": "2023-10-30T14:05:31.479274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.50.244.169 ", "ContentType": "text/plain"}], "uids": ["CjsK7B3JhjYBGXN8G9"]} -{"Format": "IDEA0", "ID": "7127286c-9b35-4fdb-9cbc-7c62d6324ec6", "DetectTime": "2023-10-30T14:05:31.519056+02:00", "EventTime": "2023-10-30T14:05:31.519073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CU0rc945nQswfSTPr9"]} -{"Format": "IDEA0", "ID": "82502233-da63-40d1-bb6c-8e2afaccaaf6", "DetectTime": "2023-10-30T14:05:31.557472+02:00", "EventTime": "2023-10-30T14:05:31.557494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.198 ", "ContentType": "text/plain"}], "uids": ["Crvy3s2MEOvZmlTZMd"]} -{"Format": "IDEA0", "ID": "89a439ee-9b07-499c-91d3-4a0be3ca0072", "DetectTime": "2023-10-30T14:05:31.578139+02:00", "EventTime": "2023-10-30T14:05:31.578158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CD8Xaw1Z0v2KphJe4k"]} -{"Format": "IDEA0", "ID": "d07478e3-c189-42bf-8c01-9741fad8aa9a", "DetectTime": "2023-10-30T14:05:31.600002+02:00", "EventTime": "2023-10-30T14:05:31.600017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CoImNy1X8lbyKYyGH9"]} -{"Format": "IDEA0", "ID": "95a52def-c32a-4a60-80e1-417fea631b97", "DetectTime": "2023-10-30T14:05:31.622879+02:00", "EventTime": "2023-10-30T14:05:31.622892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.113.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.113.195 ", "ContentType": "text/plain"}], "uids": ["CMv3Dh1QAGChbYBR25"]} -{"Format": "IDEA0", "ID": "529f19f2-8bad-4852-bc34-cb88d9eb98f1", "DetectTime": "2023-10-30T14:05:31.645609+02:00", "EventTime": "2023-10-30T14:05:31.645626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbjAAHIDD21FdOZoi"]} -{"Format": "IDEA0", "ID": "7bf7ee6c-357b-47c4-af22-5fc003e71285", "DetectTime": "2023-10-30T14:05:31.676257+02:00", "EventTime": "2023-10-30T14:05:31.676275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CcHab52vFzKBRvdTjb"]} -{"Format": "IDEA0", "ID": "e1b82908-01aa-426c-a67e-e0b8f7642a40", "DetectTime": "2023-10-30T14:05:31.766117+02:00", "EventTime": "2023-10-30T14:05:31.766132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CUSDdA38hIyIkLV7q9"]} -{"Format": "IDEA0", "ID": "6fa90818-0637-4a14-bae1-66e5a4dea76c", "DetectTime": "2023-10-30T14:05:31.792800+02:00", "EventTime": "2023-10-30T14:05:31.792821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.42.92.198 ", "ContentType": "text/plain"}], "uids": ["C1dcGg4Wk3wrlyEKx7"]} -{"Format": "IDEA0", "ID": "94c1c206-55d0-453d-8b5f-1d682187deb5", "DetectTime": "2023-10-30T14:05:31.821946+02:00", "EventTime": "2023-10-30T14:05:31.821962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.177.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 60.164.177.244 ", "ContentType": "text/plain"}], "uids": ["CpdnrPYj8zPatfejj"]} -{"Format": "IDEA0", "ID": "f1fc6b25-ffac-494d-8374-bbfd4e7ee2c4", "DetectTime": "2023-10-30T14:05:31.851554+02:00", "EventTime": "2023-10-30T14:05:31.851576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CSFpk54ihZ4gB8xQo5"]} -{"Format": "IDEA0", "ID": "d1d51875-1157-4e66-b94e-22ae1e13414a", "DetectTime": "2023-10-30T14:05:31.883823+02:00", "EventTime": "2023-10-30T14:05:31.883841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["C8tpUL3WupNR9AKJZ5"]} -{"Format": "IDEA0", "ID": "28879c65-f4eb-4f30-8689-83574470ba46", "DetectTime": "2023-10-30T14:05:31.912144+02:00", "EventTime": "2023-10-30T14:05:31.912166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.113.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.83.113.195 ", "ContentType": "text/plain"}], "uids": ["CdFHyO1Ve1aOkkJWKd"]} -{"Format": "IDEA0", "ID": "a5177a9a-e2ec-4735-8063-da406bfcd77d", "DetectTime": "2023-10-30T14:05:31.940342+02:00", "EventTime": "2023-10-30T14:05:31.940357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CdSty22cTQYSC9IZ7j"]} -{"Format": "IDEA0", "ID": "bf5a3f42-61a7-440a-babc-83fb45297c31", "DetectTime": "2023-10-30T14:05:31.970746+02:00", "EventTime": "2023-10-30T14:05:31.970767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CtsHaEWaBO53aJJn8"]} -{"Format": "IDEA0", "ID": "e38bcd15-b0ca-4f31-90ba-71ad9ba2bf31", "DetectTime": "2023-10-30T14:05:31.995748+02:00", "EventTime": "2023-10-30T14:05:31.995770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CQ3z5z4JAJypYJrIPl"]} -{"Format": "IDEA0", "ID": "5a60671d-60c3-4f13-ba8a-7a69807ac792", "DetectTime": "2023-10-30T14:05:32.023165+02:00", "EventTime": "2023-10-30T14:05:32.023182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["Ca3wwo1qO2VeGbngUf"]} -{"Format": "IDEA0", "ID": "0f976314-0434-4a03-b26b-15c9c3d40705", "DetectTime": "2023-10-30T14:05:32.066202+02:00", "EventTime": "2023-10-30T14:05:32.066225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["ClUxBs3UrjO0SCd59d"]} -{"Format": "IDEA0", "ID": "48925bbd-4752-41d9-8a6d-b6b0e7015b4a", "DetectTime": "2023-10-30T14:05:32.103091+02:00", "EventTime": "2023-10-30T14:05:32.103114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CJmHjZ2xl1kmPLbOw8"]} -{"Format": "IDEA0", "ID": "2d69c698-5f8f-4797-bde4-1cc0be023945", "DetectTime": "2023-10-30T14:05:32.134985+02:00", "EventTime": "2023-10-30T14:05:32.135002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["C8vR2R2PwZp2J142Wb"]} -{"Format": "IDEA0", "ID": "df8b9273-33ad-4fde-80c0-cf6531aedfc3", "DetectTime": "2023-10-30T14:05:32.161901+02:00", "EventTime": "2023-10-30T14:05:32.161919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C9M53m2hmcLyyDo8n8"]} -{"Format": "IDEA0", "ID": "98c983d7-0447-4336-8d45-c55477571767", "DetectTime": "2023-10-30T14:05:32.190856+02:00", "EventTime": "2023-10-30T14:05:32.190873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cd7NHm4qPR4ab8xG48"]} -{"Format": "IDEA0", "ID": "14cb9ace-1aed-4222-b343-fd094305bf08", "DetectTime": "2023-10-30T14:05:32.219073+02:00", "EventTime": "2023-10-30T14:05:32.219095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.158.48 ", "ContentType": "text/plain"}], "uids": ["CT0oog6702NR2t9b8"]} -{"Format": "IDEA0", "ID": "72367186-aaad-41ef-90cd-e481b8eee5ec", "DetectTime": "2023-10-30T14:05:32.249679+02:00", "EventTime": "2023-10-30T14:05:32.249695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["C7gKFs4GQIB15bGPw4"]} -{"Format": "IDEA0", "ID": "2a73905e-3553-4bfa-9178-a955090d78fe", "DetectTime": "2023-10-30T14:05:32.279477+02:00", "EventTime": "2023-10-30T14:05:32.279494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CvOd7JzzWv4df6Ssh"]} -{"Format": "IDEA0", "ID": "81f76fae-e654-45e0-8f80-788bd3a6e4fa", "DetectTime": "2023-10-30T14:05:32.303615+02:00", "EventTime": "2023-10-30T14:05:32.303636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CgCvx423dUbZl5MOo3"]} -{"Format": "IDEA0", "ID": "ff8778d1-4441-470e-8882-b2e8461ac5c9", "DetectTime": "2023-10-30T14:05:32.338254+02:00", "EventTime": "2023-10-30T14:05:32.338270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CHaDc8bd1L6XA6202"]} -{"Format": "IDEA0", "ID": "61a9ac57-a279-470e-9b92-a8f062d954fe", "DetectTime": "2023-10-30T14:05:32.364460+02:00", "EventTime": "2023-10-30T14:05:32.364476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["C80jh72KCOyB8ukwrg"]} -{"Format": "IDEA0", "ID": "b52b6efe-6391-4ac3-aee8-152ed2aaff84", "DetectTime": "2023-10-30T14:05:32.387892+02:00", "EventTime": "2023-10-30T14:05:32.387908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CaH0IsJxcGp2huOtf"]} -{"Format": "IDEA0", "ID": "10d76fce-2361-4356-afeb-1f608b7c7fee", "DetectTime": "2023-10-30T14:05:32.410770+02:00", "EventTime": "2023-10-30T14:05:32.410813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["Cjbj0D2IKkeTzeCeWd"]} -{"Format": "IDEA0", "ID": "648e7ee8-7a64-4496-8015-0c12cd6a63d2", "DetectTime": "2023-10-30T14:05:32.440541+02:00", "EventTime": "2023-10-30T14:05:32.440565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CWFUL84y1Z6as1DxG5"]} -{"Format": "IDEA0", "ID": "b3efe9e1-885b-4fb3-b901-530fdaccaa73", "DetectTime": "2023-10-30T14:05:32.487981+02:00", "EventTime": "2023-10-30T14:05:32.487998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CgyZNP5co2e739Bdd"]} -{"Format": "IDEA0", "ID": "18be0c35-92ef-4557-8cd1-76ed5d404059", "DetectTime": "2023-10-30T14:05:32.536730+02:00", "EventTime": "2023-10-30T14:05:32.536746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CY1cZ018CIWtNFHaqg"]} -{"Format": "IDEA0", "ID": "a4676a58-95a0-4bac-acfe-2c44120df868", "DetectTime": "2023-10-30T14:05:32.573870+02:00", "EventTime": "2023-10-30T14:05:32.573887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwLNNQ2rUdnDBsPGc7"]} -{"Format": "IDEA0", "ID": "b09ce58a-54e6-478e-9722-e86949ee7ad5", "DetectTime": "2023-10-30T14:05:32.601432+02:00", "EventTime": "2023-10-30T14:05:32.601452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CA5Dkn1XWl9FFUMFNk"]} -{"Format": "IDEA0", "ID": "ec528378-fb26-431c-89b5-32a791dfbe3b", "DetectTime": "2023-10-30T14:05:32.626902+02:00", "EventTime": "2023-10-30T14:05:32.626918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CaLst64pWj71ISdiU7"]} -{"Format": "IDEA0", "ID": "d089619c-696e-4e7c-a1da-edebe4418aa4", "DetectTime": "2023-10-30T14:05:32.654265+02:00", "EventTime": "2023-10-30T14:05:32.654282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CLxLlx4T7k6cYAB69j"]} -{"Format": "IDEA0", "ID": "c4bf2fb1-6a9b-4034-9baf-8c5cf00c7092", "DetectTime": "2023-10-30T14:05:32.674705+02:00", "EventTime": "2023-10-30T14:05:32.674721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C6WgbU24DCfuHocHV8"]} -{"Format": "IDEA0", "ID": "8bf476b2-ab05-4f7f-adab-8425cd5a4b2c", "DetectTime": "2023-10-30T14:05:32.697232+02:00", "EventTime": "2023-10-30T14:05:32.697243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C8eyHv1ps8zNRupmlc"]} -{"Format": "IDEA0", "ID": "277f8dd4-979b-405c-9991-2658d8280807", "DetectTime": "2023-10-30T14:05:32.719684+02:00", "EventTime": "2023-10-30T14:05:32.719705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CJzdlG32CkdQ1oQCkl"]} -{"Format": "IDEA0", "ID": "2088f5c3-99ff-4107-ae32-3798ab32d379", "DetectTime": "2023-10-30T14:05:32.740863+02:00", "EventTime": "2023-10-30T14:05:32.740880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["C2ifmnrn4hnYABWR1"]} -{"Format": "IDEA0", "ID": "b742e104-39eb-4137-9b73-7f4a44c9c7bc", "DetectTime": "2023-10-30T14:05:32.765815+02:00", "EventTime": "2023-10-30T14:05:32.765831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["CsnE8J2P6lpyR2Uh48"]} -{"Format": "IDEA0", "ID": "d24ee2d9-d997-44da-a674-e8c29aca80b4", "DetectTime": "2023-10-30T14:05:32.790195+02:00", "EventTime": "2023-10-30T14:05:32.790216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C9NTaV2CJoLhjW2i75"]} -{"Format": "IDEA0", "ID": "42b0f284-a575-4ae0-af9d-f28fb49f0fb6", "DetectTime": "2023-10-30T14:05:32.813495+02:00", "EventTime": "2023-10-30T14:05:32.813517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CtRZuh4ey8kvTrvda1"]} -{"Format": "IDEA0", "ID": "a8e0f77f-d431-44a3-84eb-af8e4f3b2892", "DetectTime": "2023-10-30T14:05:32.840478+02:00", "EventTime": "2023-10-30T14:05:32.840495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CbxKkc4VljLCimhNC9"]} -{"Format": "IDEA0", "ID": "354dfa7d-6434-4e75-b770-7f984098a9bd", "DetectTime": "2023-10-30T14:05:32.863621+02:00", "EventTime": "2023-10-30T14:05:32.863641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CQMuXjV7mOMAmL5Dd"]} -{"Format": "IDEA0", "ID": "e3628c97-cdf0-43f7-a4d5-86da3dd9357e", "DetectTime": "2023-10-30T14:05:32.886307+02:00", "EventTime": "2023-10-30T14:05:32.886318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CQEk4A4ldWIRc7wi9a"]} -{"Format": "IDEA0", "ID": "2e8cf885-45b0-4673-946c-88038d82535a", "DetectTime": "2023-10-30T14:05:32.910717+02:00", "EventTime": "2023-10-30T14:05:32.910739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["Cprk7t379urZ90Jnua"]} -{"Format": "IDEA0", "ID": "319052ef-62e9-400f-b167-8ee845595ad6", "DetectTime": "2023-10-30T14:05:32.934294+02:00", "EventTime": "2023-10-30T14:05:32.934311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CkhsNR1x36MubDTZD"]} -{"Format": "IDEA0", "ID": "20c19e8e-d8a4-4310-945c-34f1c8169385", "DetectTime": "2023-10-30T14:05:32.958861+02:00", "EventTime": "2023-10-30T14:05:32.958884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["C8FdxpEfQDUrCXGUf"]} -{"Format": "IDEA0", "ID": "12b54df5-dc59-4e85-9fcb-e3145e9ccfc9", "DetectTime": "2023-10-30T14:05:32.978740+02:00", "EventTime": "2023-10-30T14:05:32.978752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CKyXdR1dwgmrAtrM41"]} -{"Format": "IDEA0", "ID": "7ea91370-5d7a-4f9c-82a6-fae106daec8c", "DetectTime": "2023-10-30T14:05:33.003875+02:00", "EventTime": "2023-10-30T14:05:33.003895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CdtgW31O3o60yU4W7k"]} -{"Format": "IDEA0", "ID": "76798655-8a75-4cfe-af45-f0f8eb5f013e", "DetectTime": "2023-10-30T14:05:33.027406+02:00", "EventTime": "2023-10-30T14:05:33.027426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CO8URQ2FnHmPLApsjb"]} -{"Format": "IDEA0", "ID": "0eb7b540-2786-4919-b09d-ff9814e88a5e", "DetectTime": "2023-10-30T14:05:33.047786+02:00", "EventTime": "2023-10-30T14:05:33.047798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["Cv0OhhuhLqQ14nGm"]} -{"Format": "IDEA0", "ID": "1dcbe189-98f6-42c2-a4e0-0bc15513f60b", "DetectTime": "2023-10-30T14:05:33.071918+02:00", "EventTime": "2023-10-30T14:05:33.071933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CfpY99vTwW4OWXfM5"]} -{"Format": "IDEA0", "ID": "a57497fb-f8a5-4af1-9998-473c233eed03", "DetectTime": "2023-10-30T14:05:33.095590+02:00", "EventTime": "2023-10-30T14:05:33.095607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cc8CnL2ppmXMyEYlwh"]} -{"Format": "IDEA0", "ID": "9cc6591b-b051-427b-8b7e-af14bdb1a2bb", "DetectTime": "2023-10-30T14:05:33.121742+02:00", "EventTime": "2023-10-30T14:05:33.121758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CpwLSg1qU1wWAuQYFl"]} -{"Format": "IDEA0", "ID": "126ab553-006c-45f4-99e9-14ebf77c10f9", "DetectTime": "2023-10-30T14:05:33.145589+02:00", "EventTime": "2023-10-30T14:05:33.145607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CZdoNMgzjjXj6MWk4"]} -{"Format": "IDEA0", "ID": "3b2aaca1-9923-453f-adbd-22e7f152df2b", "DetectTime": "2023-10-30T14:05:33.176311+02:00", "EventTime": "2023-10-30T14:05:33.176328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CuQYJh423fGkXOeXL7"]} -{"Format": "IDEA0", "ID": "6a87fda4-3ae7-4ba5-9816-dc17b98cf93b", "DetectTime": "2023-10-30T14:05:33.198129+02:00", "EventTime": "2023-10-30T14:05:33.198146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C9g24C23c2gKNFMR03"]} -{"Format": "IDEA0", "ID": "2446f212-f1af-4d6b-b90d-32aa225626e5", "DetectTime": "2023-10-30T14:05:33.221123+02:00", "EventTime": "2023-10-30T14:05:33.221141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CZQpoA2KU9RuFREwI1"]} -{"Format": "IDEA0", "ID": "36e1219c-ef3e-443c-a732-4905b733ee7c", "DetectTime": "2023-10-30T14:05:33.242815+02:00", "EventTime": "2023-10-30T14:05:33.242837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CvIJ7wm51y65FvN2k"]} -{"Format": "IDEA0", "ID": "6ab8c201-e30b-4f56-8eff-9ffa84533891", "DetectTime": "2023-10-30T14:05:33.264694+02:00", "EventTime": "2023-10-30T14:05:33.264712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ck2IsX2v7L8bEQ9tN3"]} -{"Format": "IDEA0", "ID": "46997adb-257b-4c05-9179-89bd3d512d73", "DetectTime": "2023-10-30T14:05:33.286675+02:00", "EventTime": "2023-10-30T14:05:33.286691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C69AWz2LQGq83vtyE6"]} -{"Format": "IDEA0", "ID": "8c11ce9e-4825-498d-8c2f-ab863aa25907", "DetectTime": "2023-10-30T14:05:33.309511+02:00", "EventTime": "2023-10-30T14:05:33.309523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CmXGNGyD4OMzYnAKk"]} -{"Format": "IDEA0", "ID": "0616147d-d804-4119-9f32-cacad64a6c55", "DetectTime": "2023-10-30T14:05:33.335166+02:00", "EventTime": "2023-10-30T14:05:33.335187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["ClOCgSTrc0imT8E18"]} -{"Format": "IDEA0", "ID": "9febfa1d-6429-4e8c-9e51-05abbc7d32ee", "DetectTime": "2023-10-30T14:05:33.367287+02:00", "EventTime": "2023-10-30T14:05:33.367304+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CMpkpj2o2Blwmd6uyf"]} -{"Format": "IDEA0", "ID": "4cf495d5-b132-4f3f-88f4-fd6b822d6143", "DetectTime": "2023-10-30T14:05:33.421360+02:00", "EventTime": "2023-10-30T14:05:33.421373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["C68wTd3A7dWJ0jWRY2"]} -{"Format": "IDEA0", "ID": "73e5c7f7-949a-4925-aefe-d7b18219f354", "DetectTime": "2023-10-30T14:05:33.447022+02:00", "EventTime": "2023-10-30T14:05:33.447042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CMV9p8cdciBHkBkjb"]} -{"Format": "IDEA0", "ID": "56b00149-a187-4b98-868e-3ce12d78502d", "DetectTime": "2023-10-30T14:05:33.474678+02:00", "EventTime": "2023-10-30T14:05:33.474697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["C3nWKR3poqxxUjde72"]} -{"Format": "IDEA0", "ID": "e2b5603a-0fb6-41a7-81e6-8ac7b6718697", "DetectTime": "2023-10-30T14:05:33.501138+02:00", "EventTime": "2023-10-30T14:05:33.501151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CVXpR54P75vngi8VZ5"]} -{"Format": "IDEA0", "ID": "465aa6ee-6d17-4a59-82c4-664a83ba2ab1", "DetectTime": "2023-10-30T14:05:33.528562+02:00", "EventTime": "2023-10-30T14:05:33.528583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CDfy9sf6MFHXzZszh"]} -{"Format": "IDEA0", "ID": "b0197909-67e5-4de6-8148-17eb8aa152f0", "DetectTime": "2023-10-30T14:05:33.556207+02:00", "EventTime": "2023-10-30T14:05:33.556223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CPh5o528D98zOyAYr5"]} -{"Format": "IDEA0", "ID": "925fa08c-e3ce-4011-9b66-5c526593680d", "DetectTime": "2023-10-30T14:05:33.579575+02:00", "EventTime": "2023-10-30T14:05:33.579597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.158.48 ", "ContentType": "text/plain"}], "uids": ["CPPaWX3ePut70rrHjd"]} -{"Format": "IDEA0", "ID": "d3db8be2-ded3-49cd-b247-a130b42a6c27", "DetectTime": "2023-10-30T14:05:33.603060+02:00", "EventTime": "2023-10-30T14:05:33.603076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["CGCQFg1I55eZhwIWMh"]} -{"Format": "IDEA0", "ID": "adf99b01-02f8-4d54-976f-e7a8aa1d5d30", "DetectTime": "2023-10-30T14:05:33.625692+02:00", "EventTime": "2023-10-30T14:05:33.625708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["Cd9cBC3fnrFdIXxvDb"]} -{"Format": "IDEA0", "ID": "1a019802-6f84-4a57-a42f-4c118967851a", "DetectTime": "2023-10-30T14:05:33.642866+02:00", "EventTime": "2023-10-30T14:05:33.642879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C9oUZo4pa3eLMgUFpl"]} -{"Format": "IDEA0", "ID": "92da9625-e658-40cf-89c8-7d3dda042c5f", "DetectTime": "2023-10-30T14:05:33.662910+02:00", "EventTime": "2023-10-30T14:05:33.662927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.245.242 ", "ContentType": "text/plain"}], "uids": ["CmLVVB2jb19gsVz8Xa"]} -{"Format": "IDEA0", "ID": "d6fbace4-4136-4193-bea2-e2609f411033", "DetectTime": "2023-10-30T14:05:33.683954+02:00", "EventTime": "2023-10-30T14:05:33.683974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.158.48 ", "ContentType": "text/plain"}], "uids": ["CQSHGw3J7jR7PCBGN6"]} -{"Format": "IDEA0", "ID": "7329ddb3-221b-4a4f-bc42-f4f8790b10fb", "DetectTime": "2023-10-30T14:05:33.703035+02:00", "EventTime": "2023-10-30T14:05:33.703050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKtztR18TnE5aFcTfd"]} -{"Format": "IDEA0", "ID": "b302cd12-297a-4a7d-8db8-89b45997ed69", "DetectTime": "2023-10-30T14:05:33.720685+02:00", "EventTime": "2023-10-30T14:05:33.720700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CePPmO2fbmfLHAeQy9"]} -{"Format": "IDEA0", "ID": "f6fab2b1-8e25-4934-87bd-7cef86816597", "DetectTime": "2023-10-30T14:05:33.740183+02:00", "EventTime": "2023-10-30T14:05:33.740204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CYm7grTzgCXmdYFfi"]} -{"Format": "IDEA0", "ID": "468f53e1-f0da-4e85-a846-452e6143f95f", "DetectTime": "2023-10-30T14:05:33.763593+02:00", "EventTime": "2023-10-30T14:05:33.763613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CAc6hKdKVwMwS6yHa"]} -{"Format": "IDEA0", "ID": "0567c927-3a06-43bd-9592-d3f1c251b7f7", "DetectTime": "2023-10-30T14:05:33.783554+02:00", "EventTime": "2023-10-30T14:05:33.783570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CqsXWh3P0egqtxLesj"]} -{"Format": "IDEA0", "ID": "a372a0f9-9773-4306-8241-f81b21ba1b2d", "DetectTime": "2023-10-30T14:05:33.802905+02:00", "EventTime": "2023-10-30T14:05:33.802921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C3Rgjl40GLvBmI5xA9"]} -{"Format": "IDEA0", "ID": "ad06690e-c903-446b-ab23-7ed164ab6b48", "DetectTime": "2023-10-30T14:05:33.824399+02:00", "EventTime": "2023-10-30T14:05:33.824416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CzrW27181TXWyMnmIc"]} -{"Format": "IDEA0", "ID": "73bdbfe0-1da0-4de1-b04b-7a47fb015cc5", "DetectTime": "2023-10-30T14:05:33.845780+02:00", "EventTime": "2023-10-30T14:05:33.845802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["C9A3Nf2tO5phIjG9v4"]} -{"Format": "IDEA0", "ID": "12962334-ce1d-4c9e-975d-0911fbf13ee9", "DetectTime": "2023-10-30T14:05:33.871172+02:00", "EventTime": "2023-10-30T14:05:33.871192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["Cc00Ti136s1G3qxEU4"]} -{"Format": "IDEA0", "ID": "5beef79a-92eb-4b4a-90d2-84aeb8c9b971", "DetectTime": "2023-10-30T14:05:33.891163+02:00", "EventTime": "2023-10-30T14:05:33.891183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CgIWPg29s801wSiCyc"]} -{"Format": "IDEA0", "ID": "f15f9168-f5a3-4928-9343-4c42416603b7", "DetectTime": "2023-10-30T14:05:33.908766+02:00", "EventTime": "2023-10-30T14:05:33.908785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CSmhcf2kOS2ohry0Eg"]} -{"Format": "IDEA0", "ID": "4a730391-7259-4c55-b9f5-d63e6d8bf878", "DetectTime": "2023-10-30T14:05:33.927283+02:00", "EventTime": "2023-10-30T14:05:33.927303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["ClQgka2SRwzDkBGV16"]} -{"Format": "IDEA0", "ID": "e16c2daf-34fd-48ac-80bd-9104abf14c4d", "DetectTime": "2023-10-30T14:05:33.948334+02:00", "EventTime": "2023-10-30T14:05:33.948350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C6Z4jv341TlypYaVdh"]} -{"Format": "IDEA0", "ID": "718d1aa1-6ea8-4d2e-9b13-43efff681be3", "DetectTime": "2023-10-30T14:05:33.967163+02:00", "EventTime": "2023-10-30T14:05:33.967182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CMBHdL299onA64mgAl"]} -{"Format": "IDEA0", "ID": "268289c7-aff6-466f-823b-b35bf4d56c4f", "DetectTime": "2023-10-30T14:05:33.985540+02:00", "EventTime": "2023-10-30T14:05:33.985552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CQZnXz2x1o26C8gDE"]} -{"Format": "IDEA0", "ID": "ae6d5296-446b-4cc1-91b3-fec5027687e5", "DetectTime": "2023-10-30T14:05:34.002561+02:00", "EventTime": "2023-10-30T14:05:34.002577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["C6OTFH1nICIEU19lWl"]} -{"Format": "IDEA0", "ID": "5a1322e2-0497-4787-badb-96174aa859e7", "DetectTime": "2023-10-30T14:05:34.024161+02:00", "EventTime": "2023-10-30T14:05:34.024179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CWQaPwLUVVXk7dz97"]} -{"Format": "IDEA0", "ID": "c638e6a9-ce9b-4754-aeea-da81d22700f5", "DetectTime": "2023-10-30T14:05:34.046306+02:00", "EventTime": "2023-10-30T14:05:34.046322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CqVb3C2FZe5JUIFCza"]} -{"Format": "IDEA0", "ID": "7a295d6b-7eca-4d3b-a039-8023824ef533", "DetectTime": "2023-10-30T14:05:34.065641+02:00", "EventTime": "2023-10-30T14:05:34.065658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["Cbd2E92SzujcpOPIz8"]} -{"Format": "IDEA0", "ID": "164569b9-e7c0-4832-9c52-108f08425466", "DetectTime": "2023-10-30T14:05:34.085283+02:00", "EventTime": "2023-10-30T14:05:34.085301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CTfmMt2KbKwGMaP8Cf"]} -{"Format": "IDEA0", "ID": "a6df7bb5-1160-4d27-92e4-2921196136be", "DetectTime": "2023-10-30T14:05:34.105317+02:00", "EventTime": "2023-10-30T14:05:34.105330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CUKayf2ZF2vKRPhnP3"]} -{"Format": "IDEA0", "ID": "61c30515-4786-48f8-ae67-b4e6718c50d2", "DetectTime": "2023-10-30T14:05:34.120662+02:00", "EventTime": "2023-10-30T14:05:34.120681+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CYivL4449RFnrC0knl"]} -{"Format": "IDEA0", "ID": "69a47a7f-ee74-4fa5-b330-c54934c7857b", "DetectTime": "2023-10-30T14:05:34.169113+02:00", "EventTime": "2023-10-30T14:05:34.169125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["CWAw0V33g2H4bGXQQ3"]} -{"Format": "IDEA0", "ID": "bb2f810e-533b-4c13-b421-3d4b8a9224fa", "DetectTime": "2023-10-30T14:05:34.187781+02:00", "EventTime": "2023-10-30T14:05:34.187803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CU3b4IhfdnB0Bn4e4"]} -{"Format": "IDEA0", "ID": "4aa2bb16-e523-42f7-9ad1-e06182cb4735", "DetectTime": "2023-10-30T14:05:34.206715+02:00", "EventTime": "2023-10-30T14:05:34.206735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CAgXqa2oZ1QVtkSU6c"]} -{"Format": "IDEA0", "ID": "3d1e68af-4267-4ff1-8d84-59a53b70beef", "DetectTime": "2023-10-30T14:05:34.223502+02:00", "EventTime": "2023-10-30T14:05:34.223518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CHG6Lg4zszLyOBHTWb"]} -{"Format": "IDEA0", "ID": "13f2ccdf-74ae-4482-9d3b-6ad44f08ef2a", "DetectTime": "2023-10-30T14:05:34.244129+02:00", "EventTime": "2023-10-30T14:05:34.244145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CutYXk3orvWgsMb062"]} -{"Format": "IDEA0", "ID": "54fb2e1e-23b1-4782-a963-3d5b5f5c3962", "DetectTime": "2023-10-30T14:05:34.262104+02:00", "EventTime": "2023-10-30T14:05:34.262123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CDU8in2ecAqjq2c8bk"]} -{"Format": "IDEA0", "ID": "32146394-a14b-490c-9dea-4090d8608b77", "DetectTime": "2023-10-30T14:05:34.280211+02:00", "EventTime": "2023-10-30T14:05:34.280222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["Cg6gBT2g7VMyrTcasi"]} -{"Format": "IDEA0", "ID": "f62f07b7-65dd-4cd1-b906-72d399ac86db", "DetectTime": "2023-10-30T14:05:34.298676+02:00", "EventTime": "2023-10-30T14:05:34.298688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["C3lq7A4bKX9rmJS1x6"]} -{"Format": "IDEA0", "ID": "67e38e06-97fc-4538-aaad-ec1687e4c255", "DetectTime": "2023-10-30T14:05:34.313904+02:00", "EventTime": "2023-10-30T14:05:34.313922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CtrNxh4fZUaMjoNvzc"]} -{"Format": "IDEA0", "ID": "d81b851f-9e18-4d2e-bc23-588a67da1493", "DetectTime": "2023-10-30T14:05:34.332211+02:00", "EventTime": "2023-10-30T14:05:34.332224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CsjfMj1Ot2TfesXpW2"]} -{"Format": "IDEA0", "ID": "4951f50b-c1a5-46d4-b989-c44faba8765a", "DetectTime": "2023-10-30T14:05:34.349623+02:00", "EventTime": "2023-10-30T14:05:34.349643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["Cb5N2i2ymtShQgPHzd"]} -{"Format": "IDEA0", "ID": "3c5ee834-4009-4418-bfd9-0ed381a6fa79", "DetectTime": "2023-10-30T14:05:34.380679+02:00", "EventTime": "2023-10-30T14:05:34.380698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CwKVu4CXG6AuwQ2Z2"]} -{"Format": "IDEA0", "ID": "1bdb512c-413b-490c-818b-ef8afb78586b", "DetectTime": "2023-10-30T14:05:34.399188+02:00", "EventTime": "2023-10-30T14:05:34.399212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["CZ8GgJ2F5lp6Oea8H8"]} -{"Format": "IDEA0", "ID": "b80bc6a4-0d49-4fb1-8950-4003e081f50c", "DetectTime": "2023-10-30T14:05:34.418097+02:00", "EventTime": "2023-10-30T14:05:34.418119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CxBxJu4XKT1Kotoq4"]} -{"Format": "IDEA0", "ID": "54668d84-3d38-4292-8935-c028bf3b86a3", "DetectTime": "2023-10-30T14:05:34.437606+02:00", "EventTime": "2023-10-30T14:05:34.437622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CUwnlHklTPAbh333d"]} -{"Format": "IDEA0", "ID": "af79dc63-12eb-4242-89f1-ccbdc044946f", "DetectTime": "2023-10-30T14:05:34.457354+02:00", "EventTime": "2023-10-30T14:05:34.457375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Crx1dJ196b5jgjgzFa"]} -{"Format": "IDEA0", "ID": "11b9d484-eff0-4bf4-a15a-4f7884894e41", "DetectTime": "2023-10-30T14:05:34.479357+02:00", "EventTime": "2023-10-30T14:05:34.479375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CEhScO3kWxDONpY3sc"]} -{"Format": "IDEA0", "ID": "8ae83018-1d14-4b66-a3c4-eea2e200616d", "DetectTime": "2023-10-30T14:05:34.497431+02:00", "EventTime": "2023-10-30T14:05:34.497447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["C0elN43zXJhr6RaSo"]} -{"Format": "IDEA0", "ID": "728ee86f-8dd2-4dd0-950b-94769ee86f19", "DetectTime": "2023-10-30T14:05:34.517241+02:00", "EventTime": "2023-10-30T14:05:34.517256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 139.194.211.145 ", "ContentType": "text/plain"}], "uids": ["CYIGPR370O1smQ9pfk"]} -{"Format": "IDEA0", "ID": "2681886f-7bf5-42fe-a7cd-af06f68d01c7", "DetectTime": "2023-10-30T14:05:34.536915+02:00", "EventTime": "2023-10-30T14:05:34.536930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.214.247.251 ", "ContentType": "text/plain"}], "uids": ["CaLjpplag9Ba5Yw62"]} -{"Format": "IDEA0", "ID": "a6790a27-a15a-4cc3-9279-a61bfd99c37f", "DetectTime": "2023-10-30T14:05:34.556963+02:00", "EventTime": "2023-10-30T14:05:34.556974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["CPyilA3SeVoOjO1gsa"]} -{"Format": "IDEA0", "ID": "c09cd1ab-811f-43bf-9ac5-53eced8fadb7", "DetectTime": "2023-10-30T14:05:34.580151+02:00", "EventTime": "2023-10-30T14:05:34.580167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["ClTFLT3XWzn6JcOPih"]} -{"Format": "IDEA0", "ID": "30e641c8-f4fd-42b4-b4d2-a469ae598323", "DetectTime": "2023-10-30T14:05:34.598391+02:00", "EventTime": "2023-10-30T14:05:34.598403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CLBlwxPEr2NCaGXUl"]} -{"Format": "IDEA0", "ID": "a34bd0ea-be91-418e-801d-d140c5b5922f", "DetectTime": "2023-10-30T14:05:34.618737+02:00", "EventTime": "2023-10-30T14:05:34.618748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CcyzD41HkZYo42mJt7"]} -{"Format": "IDEA0", "ID": "8c275e07-39bb-427b-a1dc-9930e287a68d", "DetectTime": "2023-10-30T14:05:34.635137+02:00", "EventTime": "2023-10-30T14:05:34.635148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CSJvai1Djry3LKEiVe"]} -{"Format": "IDEA0", "ID": "3e71d404-004c-4502-b08d-e6e787e6e78e", "DetectTime": "2023-10-30T14:05:34.649817+02:00", "EventTime": "2023-10-30T14:05:34.649833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["C0tdyOIQlFnUsGgP"]} -{"Format": "IDEA0", "ID": "572a9908-5615-4a42-8b5e-6b2052755e54", "DetectTime": "2023-10-30T14:05:34.668320+02:00", "EventTime": "2023-10-30T14:05:34.668337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CoNzqe1we1rZ3p0c8b"]} -{"Format": "IDEA0", "ID": "266f0141-97e1-42fb-a22d-c19bd1585344", "DetectTime": "2023-10-30T14:05:34.685096+02:00", "EventTime": "2023-10-30T14:05:34.685108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CLnC2j1NKZZA7v6Wbc"]} -{"Format": "IDEA0", "ID": "9e4a5273-ff1d-48c9-8fe1-d3ec9f4101e8", "DetectTime": "2023-10-30T14:05:34.704910+02:00", "EventTime": "2023-10-30T14:05:34.704921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CxqKyO1m6psed3BaK4"]} -{"Format": "IDEA0", "ID": "e1dcdb68-2b95-4d59-be8c-55b3f359c33c", "DetectTime": "2023-10-30T14:05:34.722696+02:00", "EventTime": "2023-10-30T14:05:34.722711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C5WbU8KViBa09y2ge"]} -{"Format": "IDEA0", "ID": "624cc40a-0d2f-4916-8964-bb947fa14c34", "DetectTime": "2023-10-30T14:05:34.741137+02:00", "EventTime": "2023-10-30T14:05:34.741161+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2jB5440Sa74nQW7m7"]} -{"Format": "IDEA0", "ID": "d6ab9fef-5539-4cff-8e2a-a5e0d0e31426", "DetectTime": "2023-10-30T14:05:34.748663+02:00", "EventTime": "2023-10-30T14:05:34.748680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CLO4Hb211enOUMueTj"]} -{"Format": "IDEA0", "ID": "dcaac955-5dff-446c-8966-b13c883e2bcf", "DetectTime": "2023-10-30T14:05:34.766441+02:00", "EventTime": "2023-10-30T14:05:34.766452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CF2BS72UZ33ne4j1Sh"]} -{"Format": "IDEA0", "ID": "4f115d3f-8cdb-401b-98fc-8a2138511c8e", "DetectTime": "2023-10-30T14:05:34.783476+02:00", "EventTime": "2023-10-30T14:05:34.783493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["C55XEK8qO1iJmJsg"]} -{"Format": "IDEA0", "ID": "6a3b0216-1492-4018-ba4a-1adc51755af4", "DetectTime": "2023-10-30T14:05:34.800116+02:00", "EventTime": "2023-10-30T14:05:34.800128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["Cko2lykXioj0P4gsa"]} -{"Format": "IDEA0", "ID": "88f3d3bc-6f33-4d07-b890-c18f3bb851d0", "DetectTime": "2023-10-30T14:05:34.827439+02:00", "EventTime": "2023-10-30T14:05:34.827460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CuEEYq3Gw4tQHgtTHi"]} -{"Format": "IDEA0", "ID": "f564ff30-0af4-48f3-a4d0-6096ef6bb028", "DetectTime": "2023-10-30T14:05:34.851151+02:00", "EventTime": "2023-10-30T14:05:34.851169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CCWvKz4Q83SbswZ808"]} -{"Format": "IDEA0", "ID": "370ab9a4-f1f4-4359-b2a6-5f9948930852", "DetectTime": "2023-10-30T14:05:34.878253+02:00", "EventTime": "2023-10-30T14:05:34.878271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CuYePX14EsNLM6grA5"]} -{"Format": "IDEA0", "ID": "e181d9c5-e07c-460e-bb4d-fb30f3741f7e", "DetectTime": "2023-10-30T14:05:34.906606+02:00", "EventTime": "2023-10-30T14:05:34.906624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C3i7mn4rB6F8Reqaw2"]} -{"Format": "IDEA0", "ID": "3064279d-9742-4150-9a34-4c61ad627fba", "DetectTime": "2023-10-30T14:05:34.927879+02:00", "EventTime": "2023-10-30T14:05:34.927894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CqVOEK2D6CFD1n8kLj"]} -{"Format": "IDEA0", "ID": "5c823de3-bf79-46d9-acd5-5089c0c125fa", "DetectTime": "2023-10-30T14:05:34.955487+02:00", "EventTime": "2023-10-30T14:05:34.955504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CX3cyg4JIkXvBs2V2g"]} -{"Format": "IDEA0", "ID": "708c6b5e-ad69-49ca-8bb0-99a3cd1e81dc", "DetectTime": "2023-10-30T14:05:34.974495+02:00", "EventTime": "2023-10-30T14:05:34.974517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C58EhQ1tLMHfMS7HK"]} -{"Format": "IDEA0", "ID": "7cae70d7-65c6-485e-b329-6b75ad520b63", "DetectTime": "2023-10-30T14:05:34.995041+02:00", "EventTime": "2023-10-30T14:05:34.995058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CptVOc1BFXLK0HbYZ"]} -{"Format": "IDEA0", "ID": "46b1d0cd-e4e2-4100-80de-8fe32603c9b9", "DetectTime": "2023-10-30T14:05:35.009980+02:00", "EventTime": "2023-10-30T14:05:35.010004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLXVS9zeeyqCF7Dqc"]} -{"Format": "IDEA0", "ID": "16243fbd-1d19-47ba-bba8-c49009f9af9f", "DetectTime": "2023-10-30T14:05:35.036572+02:00", "EventTime": "2023-10-30T14:05:35.036582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CbrASuXxipdFOaoxd"]} -{"Format": "IDEA0", "ID": "dde1b152-55ce-411d-bc2e-18da0e8af72b", "DetectTime": "2023-10-30T14:05:35.053088+02:00", "EventTime": "2023-10-30T14:05:35.053100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CZsRxLU0JSqOGZZlj"]} -{"Format": "IDEA0", "ID": "721b3e05-337d-485c-a8e1-67bfc46ba595", "DetectTime": "2023-10-30T14:05:35.069969+02:00", "EventTime": "2023-10-30T14:05:35.069981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CC5iXW34NP26ovXqJ5"]} -{"Format": "IDEA0", "ID": "6b65729f-1e6b-4836-a094-18b7aafe2e4b", "DetectTime": "2023-10-30T14:05:35.095567+02:00", "EventTime": "2023-10-30T14:05:35.095586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["C63Gww4hGM0gSHMUU2"]} -{"Format": "IDEA0", "ID": "ff3f9bef-c4b4-4d78-90e9-10e1728271d7", "DetectTime": "2023-10-30T14:05:35.113320+02:00", "EventTime": "2023-10-30T14:05:35.113336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNSUKs2IQUr1nNL62"]} -{"Format": "IDEA0", "ID": "d55b837e-6083-43c2-9083-a05fe1306c37", "DetectTime": "2023-10-30T14:05:35.138009+02:00", "EventTime": "2023-10-30T14:05:35.138020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CrIPOc2t19be92A7Y3"]} -{"Format": "IDEA0", "ID": "127470df-7ee8-4896-ada7-801357f15bbc", "DetectTime": "2023-10-30T14:05:35.154590+02:00", "EventTime": "2023-10-30T14:05:35.154607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CBXGzN3O05fFU8mhG"]} -{"Format": "IDEA0", "ID": "6a0a40ba-8de4-4c48-91dc-a9dc167acc2b", "DetectTime": "2023-10-30T14:05:35.172899+02:00", "EventTime": "2023-10-30T14:05:35.172916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["COf21ihxYOMx2hddb"]} -{"Format": "IDEA0", "ID": "c3295406-5dc1-407b-9484-8cb7b42af08b", "DetectTime": "2023-10-30T14:05:35.200324+02:00", "EventTime": "2023-10-30T14:05:35.200334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CVcNjU1e6ZYj1d4dO2"]} -{"Format": "IDEA0", "ID": "8a8aa9ac-b8c4-4f40-8781-d5a4f6029de2", "DetectTime": "2023-10-30T14:05:35.219496+02:00", "EventTime": "2023-10-30T14:05:35.219518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["COf7xs2wMg9bevzmnj"]} -{"Format": "IDEA0", "ID": "03e37e62-870d-4847-8610-584b0c890c70", "DetectTime": "2023-10-30T14:05:35.250992+02:00", "EventTime": "2023-10-30T14:05:35.251010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CE2GGd1OEOymA9LShg"]} -{"Format": "IDEA0", "ID": "5eec7485-2446-421c-883d-369ee638888f", "DetectTime": "2023-10-30T14:05:35.278482+02:00", "EventTime": "2023-10-30T14:05:35.278496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CeJ0PKCN7EFKiSDck"]} -{"Format": "IDEA0", "ID": "3ed1061f-538b-4407-9906-8a19f401305f", "DetectTime": "2023-10-30T14:05:35.307335+02:00", "EventTime": "2023-10-30T14:05:35.307356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C1tShk2p4Ty5nlrtVl"]} -{"Format": "IDEA0", "ID": "ec0f83b3-b100-4372-a938-55436c17de15", "DetectTime": "2023-10-30T14:05:35.335145+02:00", "EventTime": "2023-10-30T14:05:35.335162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["Cu0mXC2ttny1Ibu5sk"]} -{"Format": "IDEA0", "ID": "f9a4311b-bd09-4e70-a582-3253256943ba", "DetectTime": "2023-10-30T14:05:35.365091+02:00", "EventTime": "2023-10-30T14:05:35.365103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Cr1XhIcjKfpPjwDI3"]} -{"Format": "IDEA0", "ID": "8ff52c8d-0cfe-4ce1-9588-4beea55d46f7", "DetectTime": "2023-10-30T14:05:35.394475+02:00", "EventTime": "2023-10-30T14:05:35.394494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CVtRvy4pDPLl5ghVk5"]} -{"Format": "IDEA0", "ID": "301cee04-5c5a-4a2e-9a2f-fdae38431bb7", "DetectTime": "2023-10-30T14:05:35.424000+02:00", "EventTime": "2023-10-30T14:05:35.424015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CVhbrn3txvNE6NHsal"]} -{"Format": "IDEA0", "ID": "e91f8427-4128-4651-b9c8-4ce7314e1bcb", "DetectTime": "2023-10-30T14:05:35.452513+02:00", "EventTime": "2023-10-30T14:05:35.452530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["COBzJi2sh64oeHSMY8"]} -{"Format": "IDEA0", "ID": "2fdbc4ef-5c33-46c8-9c9b-0567d39b69c6", "DetectTime": "2023-10-30T14:05:35.478514+02:00", "EventTime": "2023-10-30T14:05:35.478528+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBALuK1ZVJ1MRRFDSl"]} -{"Format": "IDEA0", "ID": "8adf0c05-f35c-4ae4-b965-3e5e37d8525d", "DetectTime": "2023-10-30T14:05:35.484092+02:00", "EventTime": "2023-10-30T14:05:35.484105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CKSsdA39qZTrvX1Kfk"]} -{"Format": "IDEA0", "ID": "32cd07eb-fe36-4b74-b1c1-23f740a3a752", "DetectTime": "2023-10-30T14:05:35.514090+02:00", "EventTime": "2023-10-30T14:05:35.514106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["Ck37uN3Z7eB0miFCU"]} -{"Format": "IDEA0", "ID": "d766a028-af4e-473d-a28f-694ff539ecb7", "DetectTime": "2023-10-30T14:05:35.544634+02:00", "EventTime": "2023-10-30T14:05:35.544645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CTAI0u2Nrp9zdCtW8h"]} -{"Format": "IDEA0", "ID": "efe2d614-1660-4d1c-a00b-eb773771c690", "DetectTime": "2023-10-30T14:05:35.571945+02:00", "EventTime": "2023-10-30T14:05:35.571966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CKcHQj3sXKrhxTBz37"]} -{"Format": "Json", "ID": "efe2d614-1660-4d1c-a00b-eb773771c690", "DetectTime": "2023-10-30T14:05:35.571945+02:00", "EventTime": "2023-10-30T14:05:35.571966+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T10:57:49.285018+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2023/10/30 14:05:35.636312)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "290d3ab4-ea3f-4668-93d0-078eb24d677d", "DetectTime": "2023-10-30T14:05:35.642223+02:00", "EventTime": "2023-10-30T14:05:35.642243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C7d4Lf2eKZ9e1e8kP6"]} -{"Format": "IDEA0", "ID": "ccc0e02d-6cc4-4921-8307-0386d4388d7a", "DetectTime": "2023-10-30T14:05:35.670346+02:00", "EventTime": "2023-10-30T14:05:35.670363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["Cuxjgx19JnRaIrrgEb"]} -{"Format": "IDEA0", "ID": "019f3c0c-3c2f-4997-866b-6379e6dabaff", "DetectTime": "2023-10-30T14:05:35.701244+02:00", "EventTime": "2023-10-30T14:05:35.701264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CZ0wixEoQ05cezi35"]} -{"Format": "IDEA0", "ID": "1b627a2d-79e1-4cdb-a215-505c37d9ad76", "DetectTime": "2023-10-30T14:05:35.726318+02:00", "EventTime": "2023-10-30T14:05:35.726331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["Cuetnd3mG5klFtM7L5"]} -{"Format": "IDEA0", "ID": "6dee28de-313e-41c3-aa4f-a2dd1c9657dd", "DetectTime": "2023-10-30T14:05:35.755695+02:00", "EventTime": "2023-10-30T14:05:35.755711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CgvmPQGfLQfwmebph"]} -{"Format": "IDEA0", "ID": "c8040282-722c-4dd5-a511-4615ba2b0ac0", "DetectTime": "2023-10-30T14:05:35.785278+02:00", "EventTime": "2023-10-30T14:05:35.785305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CzSmbk4bHCy4nLpf73"]} -{"Format": "IDEA0", "ID": "7eb8d361-fbb4-46a3-92fb-e1fc3c67b518", "DetectTime": "2023-10-30T14:05:35.808815+02:00", "EventTime": "2023-10-30T14:05:35.808831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CyWZqCAVGwUcwheBi"]} -{"Format": "IDEA0", "ID": "9fc1461d-9047-4c63-bd35-76a8fcd5c956", "DetectTime": "2023-10-30T14:05:35.834976+02:00", "EventTime": "2023-10-30T14:05:35.834993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CjkIfp2ljg2d8uY5Tc"]} -{"Format": "IDEA0", "ID": "3b035e6b-c247-4d5a-9e9a-a684de9bebf5", "DetectTime": "2023-10-30T14:05:35.863589+02:00", "EventTime": "2023-10-30T14:05:35.863607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["C7ZlEiTVugtCIS685"]} -{"Format": "IDEA0", "ID": "a492f27e-079a-407c-b2ba-a2a7a633b1ff", "DetectTime": "2023-10-30T14:05:35.888586+02:00", "EventTime": "2023-10-30T14:05:35.888598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CoA2rM2n4TJ6CpxkLe"]} -{"Format": "IDEA0", "ID": "50c2c9f5-e617-46c7-b166-71ffbdf82116", "DetectTime": "2023-10-30T14:05:35.913143+02:00", "EventTime": "2023-10-30T14:05:35.913163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CDmnyvUyTw7cvuLy1"]} -{"Format": "Json", "ID": "50c2c9f5-e617-46c7-b166-71ffbdf82116", "DetectTime": "2023-10-30T14:05:35.913143+02:00", "EventTime": "2023-10-30T14:05:35.913163+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T10:57:52.134007+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2023/10/30 14:05:35.959173)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eef5d1a4-85aa-4821-9c39-e5ef1b6031ca", "DetectTime": "2023-10-30T14:05:35.963739+02:00", "EventTime": "2023-10-30T14:05:35.963750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CwjrDpPxH7x1IL1b1"]} -{"Format": "IDEA0", "ID": "f1f37621-d578-42b8-abb7-8df183770b0c", "DetectTime": "2023-10-30T14:05:35.986142+02:00", "EventTime": "2023-10-30T14:05:35.986162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["C6J3xk4WSulqe7qpJ4"]} -{"Format": "IDEA0", "ID": "12d7522f-ebb8-4307-8e5b-b267883d629a", "DetectTime": "2023-10-30T14:05:36.010397+02:00", "EventTime": "2023-10-30T14:05:36.010413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CGq0e4Dx9h8aNgil8"]} -{"Format": "IDEA0", "ID": "e5c6d507-8de1-48c8-a322-80335366356e", "DetectTime": "2023-10-30T14:05:36.033803+02:00", "EventTime": "2023-10-30T14:05:36.033820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CHaSBm4NH6dyvFKYWe"]} -{"Format": "IDEA0", "ID": "9b380447-a5aa-4d4c-93e2-dfe9def2ee00", "DetectTime": "2023-10-30T14:05:36.060315+02:00", "EventTime": "2023-10-30T14:05:36.060330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CssFvZ3QizekaFdQci"]} -{"Format": "IDEA0", "ID": "9e88b2fd-f143-4916-975a-dec0db764b30", "DetectTime": "2023-10-30T14:05:36.095220+02:00", "EventTime": "2023-10-30T14:05:36.095236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["COuMlf1CcJmHLBAVvd"]} -{"Format": "IDEA0", "ID": "040220c4-2dd6-4a3b-9bc4-7e8dfaec3a4a", "DetectTime": "2023-10-30T14:05:36.130533+02:00", "EventTime": "2023-10-30T14:05:36.130545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CnRe3r2zIvLpSj9Kah"]} -{"Format": "IDEA0", "ID": "90823e9b-6357-4afc-ab2f-92090220de6f", "DetectTime": "2023-10-30T14:05:36.162317+02:00", "EventTime": "2023-10-30T14:05:36.162328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["COAG2u1bJA4u6vDa1i"]} -{"Format": "IDEA0", "ID": "7b2f5b49-3e68-41d2-b47e-ab9b98bcc33c", "DetectTime": "2023-10-30T14:05:36.198812+02:00", "EventTime": "2023-10-30T14:05:36.198827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CJPCaT1CMyf6idgOkk"]} -{"Format": "IDEA0", "ID": "f021548d-aa31-48c3-8ec6-ed4e99ae9e2c", "DetectTime": "2023-10-30T14:05:36.236221+02:00", "EventTime": "2023-10-30T14:05:36.236242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CDLcmcJtwnzYJ2qk2"]} -{"Format": "IDEA0", "ID": "b557acfb-3231-4065-8754-5cbe0be2b519", "DetectTime": "2023-10-30T14:05:36.278667+02:00", "EventTime": "2023-10-30T14:05:36.278686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyDVIL7tjOIMkYPT"]} -{"Format": "Json", "ID": "b557acfb-3231-4065-8754-5cbe0be2b519", "DetectTime": "2023-10-30T14:05:36.278667+02:00", "EventTime": "2023-10-30T14:05:36.278686+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T11:28:19.090190+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2023/10/30 14:05:36.349570)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "17a39702-084b-43c4-aba6-ef472704a297", "DetectTime": "2023-10-30T14:05:36.353399+02:00", "EventTime": "2023-10-30T14:05:36.353410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CkNHgQ1nlCS0P3GHfh"]} -{"Format": "IDEA0", "ID": "5b570c1f-a11f-47d7-a697-cd73f50a2c85", "DetectTime": "2023-10-30T14:05:36.377088+02:00", "EventTime": "2023-10-30T14:05:36.377103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CzLhG521w0AhpL16i6"]} -{"Format": "IDEA0", "ID": "6cbe3b0a-61d0-4a21-9014-b63eab632d23", "DetectTime": "2023-10-30T14:05:36.406720+02:00", "EventTime": "2023-10-30T14:05:36.406732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CMVfuK3qouyKFVWXgc"]} -{"Format": "IDEA0", "ID": "40462284-10d7-4acd-a609-0e785f2eaa9a", "DetectTime": "2023-10-30T14:05:36.441259+02:00", "EventTime": "2023-10-30T14:05:36.441278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Ci5aU23P2Oeozr63Ok"]} -{"Format": "IDEA0", "ID": "4085f976-7fe4-44ec-bca2-f5e744e0aeaa", "DetectTime": "2023-10-30T14:05:36.488390+02:00", "EventTime": "2023-10-30T14:05:36.488416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["CDKxhV2CQ36tH8Fyqb"]} -{"Format": "IDEA0", "ID": "618ff6ee-074c-4ef0-b08d-c09dcac4489d", "DetectTime": "2023-10-30T14:05:36.524753+02:00", "EventTime": "2023-10-30T14:05:36.524779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["Cf9XUF2mEUvM3JM9Lf"]} -{"Format": "IDEA0", "ID": "1d6ef9a3-db51-47f0-91b5-50bacafea806", "DetectTime": "2023-10-30T14:05:36.561957+02:00", "EventTime": "2023-10-30T14:05:36.561971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["C50SEa4Xgp7pC3fSE3"]} -{"Format": "IDEA0", "ID": "ccedd0da-ab2e-47ba-bc95-91936c4bd301", "DetectTime": "2023-10-30T14:05:36.583476+02:00", "EventTime": "2023-10-30T14:05:36.583492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CCspxC2pSQJP5tZBw3"]} -{"Format": "IDEA0", "ID": "8fe0a3be-3a3d-4328-bfc6-da994a380403", "DetectTime": "2023-10-30T14:05:36.615109+02:00", "EventTime": "2023-10-30T14:05:36.615127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CAoUjQIzPTbi7wukk"]} -{"Format": "IDEA0", "ID": "efca99b4-13e8-43fb-b595-9fa760a55cc6", "DetectTime": "2023-10-30T14:05:36.725155+02:00", "EventTime": "2023-10-30T14:05:36.725175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["COyT8z3dgpB0FAe52j"]} -{"Format": "Json", "ID": "efca99b4-13e8-43fb-b595-9fa760a55cc6", "DetectTime": "2023-10-30T14:05:36.725155+02:00", "EventTime": "2023-10-30T14:05:36.725175+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T11:28:21.030415+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2023/10/30 14:05:36.791769)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0e349278-1d38-44d9-8944-dbcf59fb0840", "DetectTime": "2023-10-30T14:05:36.797764+02:00", "EventTime": "2023-10-30T14:05:36.797844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C18RMo14grCzAgnNQj"]} -{"Format": "IDEA0", "ID": "bacf4185-64d2-4343-81e9-bf3164b1b978", "DetectTime": "2023-10-30T14:05:36.834077+02:00", "EventTime": "2023-10-30T14:05:36.834098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["C5PPlx4tvZxITIK2f6"]} -{"Format": "IDEA0", "ID": "8d70b120-dbbc-456f-b222-7e755509c2f3", "DetectTime": "2023-10-30T14:05:36.864702+02:00", "EventTime": "2023-10-30T14:05:36.864719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CErI5X1mVGEuqq9xo"]} -{"Format": "IDEA0", "ID": "c59a12f9-2d24-4e31-8fd2-0e17c0a53009", "DetectTime": "2023-10-30T14:05:36.898058+02:00", "EventTime": "2023-10-30T14:05:36.898075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C1Dlm32guUDhE08tQ1"]} -{"Format": "IDEA0", "ID": "44260e06-a431-482c-88eb-7d924d16be02", "DetectTime": "2023-10-30T14:05:36.927600+02:00", "EventTime": "2023-10-30T14:05:36.927618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CO3D443rQvPKrvk5t6"]} -{"Format": "IDEA0", "ID": "0bb6c988-3a9c-4692-98e2-14d0fb9b44e7", "DetectTime": "2023-10-30T14:05:36.960821+02:00", "EventTime": "2023-10-30T14:05:36.960840+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CyQozn1Lh62TCnwzkj"]} -{"Format": "IDEA0", "ID": "a9b2d491-9417-45d1-bf5d-258c8aed8e2d", "DetectTime": "2023-10-30T14:05:37.022103+02:00", "EventTime": "2023-10-30T14:05:37.022125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CFHfMm3nhUmyIycpIk"]} -{"Format": "IDEA0", "ID": "8d8118a1-450e-4411-b2d4-f3adc97f06a9", "DetectTime": "2023-10-30T14:05:37.061357+02:00", "EventTime": "2023-10-30T14:05:37.061380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C0Gvgy1BeWeQ1MDzfc"]} -{"Format": "IDEA0", "ID": "02c4f97e-4e4d-4c9d-93f9-5031d3b64620", "DetectTime": "2023-10-30T14:05:37.096320+02:00", "EventTime": "2023-10-30T14:05:37.096341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. ", "ContentType": "text/plain"}], "uids": ["CazGTA3rj3nsOgibt8"]} -{"Format": "IDEA0", "ID": "a823d8ab-8744-4caa-99de-8a85aae966d5", "DetectTime": "2023-10-30T14:05:37.130731+02:00", "EventTime": "2023-10-30T14:05:37.130752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["CnAvmhxapcpVnXJz"]} -{"Format": "Json", "ID": "a823d8ab-8744-4caa-99de-8a85aae966d5", "DetectTime": "2023-10-30T14:05:37.130731+02:00", "EventTime": "2023-10-30T14:05:37.130752+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T11:28:22.938323+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2023/10/30 14:05:37.196088)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c5cb50e1-7da3-43c7-bb91-ec76b4484394", "DetectTime": "2023-10-30T14:05:37.201471+02:00", "EventTime": "2023-10-30T14:05:37.201489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CGn1Zv4PwDLCHCuAXd"]} -{"Format": "IDEA0", "ID": "cda133bf-62f2-4703-9ece-76ecd2d9a123", "DetectTime": "2023-10-30T14:05:37.235650+02:00", "EventTime": "2023-10-30T14:05:37.235677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11664], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. ", "ContentType": "text/plain"}], "uids": ["CaVtYq4BNRYsvGMiY"]} -{"Format": "IDEA0", "ID": "85e18e3d-0be7-4a4f-b76a-b5a55119fb3d", "DetectTime": "2023-10-30T14:05:37.266069+02:00", "EventTime": "2023-10-30T14:05:37.266086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CRaQ3cTMedzWFSLhi"]} -{"Format": "IDEA0", "ID": "05416b97-f2b5-406c-bda1-df7a51762bd7", "DetectTime": "2023-10-30T14:05:37.296401+02:00", "EventTime": "2023-10-30T14:05:37.296421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["C5pTZC1EdMGZHNTaFj"]} -{"Format": "IDEA0", "ID": "058da038-b2a2-4a07-9624-ddd90bd0af04", "DetectTime": "2023-10-30T14:05:37.324778+02:00", "EventTime": "2023-10-30T14:05:37.324802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CHVdTS18v7A272ytbe"]} -{"Format": "IDEA0", "ID": "c3feb16c-bd94-4a9c-bc66-9f21241ee7fc", "DetectTime": "2023-10-30T14:05:37.353361+02:00", "EventTime": "2023-10-30T14:05:37.353378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CEtonQ3rq3Cxbr30wb"]} -{"Format": "IDEA0", "ID": "e638226e-be62-4a71-80e3-c154c606fb7f", "DetectTime": "2023-10-30T14:05:37.380723+02:00", "EventTime": "2023-10-30T14:05:37.380744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["C8AIN832t6XjJAabo9"]} -{"Format": "IDEA0", "ID": "5c5ccffc-ce29-4524-9da6-814164f6c762", "DetectTime": "2023-10-30T14:05:37.408043+02:00", "EventTime": "2023-10-30T14:05:37.408059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CIfHOd1vnsStePzVf3"]} -{"Format": "IDEA0", "ID": "9ba19f61-8433-4546-b457-3c331a5bf898", "DetectTime": "2023-10-30T14:05:37.438347+02:00", "EventTime": "2023-10-30T14:05:37.438363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CZaJSm1NOsxvsF9Xvg"]} -{"Format": "Json", "ID": "9ba19f61-8433-4546-b457-3c331a5bf898", "DetectTime": "2023-10-30T14:05:37.438347+02:00", "EventTime": "2023-10-30T14:05:37.438363+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T11:58:50.211153+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2023/10/30 14:05:37.501193)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a031e535-2c14-4eef-a5ed-2bcdfe326ef5", "DetectTime": "2023-10-30T14:05:37.505708+02:00", "EventTime": "2023-10-30T14:05:37.505728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CRk77M3ho6AE9M6iS1"]} -{"Format": "IDEA0", "ID": "70124a13-ff25-4df9-b096-6c389a3ad434", "DetectTime": "2023-10-30T14:05:37.536952+02:00", "EventTime": "2023-10-30T14:05:37.536974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CcgGgN2nOsoT0oqoEh"]} -{"Format": "IDEA0", "ID": "6aaaa119-8f15-40de-af55-bdcc74df1989", "DetectTime": "2023-10-30T14:05:37.569788+02:00", "EventTime": "2023-10-30T14:05:37.569804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CjUuYh4McnSHQpRida"]} -{"Format": "IDEA0", "ID": "84332b57-27e0-4666-85bf-307fa760a222", "DetectTime": "2023-10-30T14:05:37.599380+02:00", "EventTime": "2023-10-30T14:05:37.599399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CGwO2L10r2qxZlKdz3"]} -{"Format": "IDEA0", "ID": "0477718b-c71b-422a-9b85-779b250718e7", "DetectTime": "2023-10-30T14:05:37.622684+02:00", "EventTime": "2023-10-30T14:05:37.622737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CUs2BzL5Ut8wqRgob"]} -{"Format": "IDEA0", "ID": "bbd5922b-ad78-4006-b2cd-37d9cd58c034", "DetectTime": "2023-10-30T14:05:37.654961+02:00", "EventTime": "2023-10-30T14:05:37.654978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CexW2Gs6MWlLUyah1"]} -{"Format": "IDEA0", "ID": "36e146f3-0da1-47a7-97e7-7c4cf079983c", "DetectTime": "2023-10-30T14:05:37.683984+02:00", "EventTime": "2023-10-30T14:05:37.684001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["CLnVTw47mlBRcPvs03"]} -{"Format": "IDEA0", "ID": "7a516d17-5283-47fc-a088-40529c51df27", "DetectTime": "2023-10-30T14:05:37.713036+02:00", "EventTime": "2023-10-30T14:05:37.713056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C6lU291BTmTFteJRrc"]} -{"Format": "IDEA0", "ID": "84cbdec2-025f-43f5-a88e-cdcfadc15a77", "DetectTime": "2023-10-30T14:05:37.741137+02:00", "EventTime": "2023-10-30T14:05:37.741157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["Cb78bP2K8G8w6HHrB5"]} -{"Format": "Json", "ID": "84cbdec2-025f-43f5-a88e-cdcfadc15a77", "DetectTime": "2023-10-30T14:05:37.741137+02:00", "EventTime": "2023-10-30T14:05:37.741157+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T11:58:52.034746+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2023/10/30 14:05:37.803925)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8afabfb1-93d3-4742-8f42-ceb5e058efc9", "DetectTime": "2023-10-30T14:05:37.810274+02:00", "EventTime": "2023-10-30T14:05:37.810300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["Ci8PF32FQIjQ82PcGk"]} -{"Format": "IDEA0", "ID": "434f7f3b-2407-4042-b4e0-3b01e2d5aa8c", "DetectTime": "2023-10-30T14:05:37.841469+02:00", "EventTime": "2023-10-30T14:05:37.841491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CbopBh3y1wD3U5gqSb"]} -{"Format": "IDEA0", "ID": "041602d1-896d-44c1-aba4-d451746b5ed7", "DetectTime": "2023-10-30T14:05:37.871983+02:00", "EventTime": "2023-10-30T14:05:37.872003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CsUTNq1P32uKdOehs9"]} -{"Format": "IDEA0", "ID": "04aff680-04bb-4833-8228-883c44dec339", "DetectTime": "2023-10-30T14:05:37.903073+02:00", "EventTime": "2023-10-30T14:05:37.903086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CzrupL2f29DGLh6y0b"]} -{"Format": "IDEA0", "ID": "e143cfd0-1e8d-466a-b354-daf2591d3016", "DetectTime": "2023-10-30T14:05:37.925803+02:00", "EventTime": "2023-10-30T14:05:37.925830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CmAOdI1gKuWv94lYU"]} -{"Format": "IDEA0", "ID": "9f1e2336-9e7b-4dd2-baf4-6ded5f5527ef", "DetectTime": "2023-10-30T14:05:37.952232+02:00", "EventTime": "2023-10-30T14:05:37.952252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CXQU3R3059CYw3Rbme"]} -{"Format": "IDEA0", "ID": "34fc83b2-d7e1-492a-92f5-77dd2ac152a0", "DetectTime": "2023-10-30T14:05:37.975106+02:00", "EventTime": "2023-10-30T14:05:37.975120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CJG6Ed3wPH8M6OjPC8"]} -{"Format": "IDEA0", "ID": "e7cd4f1b-4022-464e-8784-7ba0285151ac", "DetectTime": "2023-10-30T14:05:38.001404+02:00", "EventTime": "2023-10-30T14:05:38.001422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CJvmV41MZ3BNrlhPab"]} -{"Format": "IDEA0", "ID": "fcc960b7-c508-40e0-8cdc-1a5e1dd8b2fb", "DetectTime": "2023-10-30T14:05:38.023838+02:00", "EventTime": "2023-10-30T14:05:38.023850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CKMoKE1uA5fJjlKxO2"]} -{"Format": "Json", "ID": "fcc960b7-c508-40e0-8cdc-1a5e1dd8b2fb", "DetectTime": "2023-10-30T14:05:38.023838+02:00", "EventTime": "2023-10-30T14:05:38.023850+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T11:58:54.083332+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2023/10/30 14:05:38.082406)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b459dcd-387b-4176-b745-3184330c0be5", "DetectTime": "2023-10-30T14:05:38.088234+02:00", "EventTime": "2023-10-30T14:05:38.088250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["Cb5za62UKDf1mXYgCb"]} -{"Format": "IDEA0", "ID": "bec1df0a-3c6e-44cb-a0d5-732bbf470d17", "DetectTime": "2023-10-30T14:05:38.112955+02:00", "EventTime": "2023-10-30T14:05:38.112978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CaWVaKf12rj3lsjy1"]} -{"Format": "IDEA0", "ID": "bbce0286-8792-4c15-80e9-b968e4ef8fa2", "DetectTime": "2023-10-30T14:05:38.133967+02:00", "EventTime": "2023-10-30T14:05:38.133996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["CKrSnN3PQRXsJbuXYh"]} -{"Format": "IDEA0", "ID": "e1b20105-f46b-4e17-9479-0bb31638dd72", "DetectTime": "2023-10-30T14:05:38.154595+02:00", "EventTime": "2023-10-30T14:05:38.154608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CZFEwO2ZjBOe1m0EDe"]} -{"Format": "IDEA0", "ID": "274b82d2-2227-4f0e-b126-6b3320e069fa", "DetectTime": "2023-10-30T14:05:38.180965+02:00", "EventTime": "2023-10-30T14:05:38.180988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C0iFbw2ZkbwQbnKlQ3"]} -{"Format": "IDEA0", "ID": "d78f99e1-25c1-436f-a8b0-37aa02edd624", "DetectTime": "2023-10-30T14:05:38.234953+02:00", "EventTime": "2023-10-30T14:05:38.234970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CQA8T93xiuxrYor205"]} -{"Format": "IDEA0", "ID": "6db7c060-2e3f-4a1a-8233-e72a910f6b25", "DetectTime": "2023-10-30T14:05:38.268050+02:00", "EventTime": "2023-10-30T14:05:38.268077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7184], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. ", "ContentType": "text/plain"}], "uids": ["CYujFt3UKQqNUOFWg5"]} -{"Format": "IDEA0", "ID": "515849c9-721b-43c8-80f8-54872b7ffc27", "DetectTime": "2023-10-30T14:05:38.328471+02:00", "EventTime": "2023-10-30T14:05:38.328488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2324], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. ", "ContentType": "text/plain"}], "uids": ["CrSZQ043Eqsu4C43Tf"]} -{"Format": "IDEA0", "ID": "2979542c-db4f-4a33-94bf-09e5d5410613", "DetectTime": "2023-10-30T14:05:38.383855+02:00", "EventTime": "2023-10-30T14:05:38.383874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. ", "ContentType": "text/plain"}], "uids": ["Cte8pm19tkNMXHJjo9"]} -{"Format": "IDEA0", "ID": "407f41d9-c0e0-4a01-b3ce-1b1468f4dfdb", "DetectTime": "2023-10-30T14:05:38.436102+02:00", "EventTime": "2023-10-30T14:05:38.436118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CmMvVp3kCiTAiFVQnk"]} -{"Format": "IDEA0", "ID": "952dc8ec-8152-4a41-820d-50caee864b2c", "DetectTime": "2023-10-30T14:05:38.486162+02:00", "EventTime": "2023-10-30T14:05:38.486183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CNornu3Qax2JyERr6c"]} -{"Format": "IDEA0", "ID": "a4290dce-1203-40a4-96a8-03e1e7d07262", "DetectTime": "2023-10-30T14:05:38.539350+02:00", "EventTime": "2023-10-30T14:05:38.539370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNG4zh4PNtD9iBX4Yc"]} -{"Format": "IDEA0", "ID": "08ef1546-9515-451f-9061-c243b7e08c7a", "DetectTime": "2023-10-30T14:05:38.590819+02:00", "EventTime": "2023-10-30T14:05:38.590837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. ", "ContentType": "text/plain"}], "uids": ["Cc5VAF39lsfx381GB3"]} -{"Format": "Json", "ID": "08ef1546-9515-451f-9061-c243b7e08c7a", "DetectTime": "2023-10-30T14:05:38.590819+02:00", "EventTime": "2023-10-30T14:05:38.590837+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8348], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:30:24.937538+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:38.675773)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6c23fe33-2f69-46f1-8802-51218225991d", "DetectTime": "2023-10-30T14:05:38.681720+02:00", "EventTime": "2023-10-30T14:05:38.681740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9922], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. ", "ContentType": "text/plain"}], "uids": ["CGaymq2cStO1fmKV1b"]} -{"Format": "IDEA0", "ID": "f9591493-51ec-4931-a47b-215e68eebdea", "DetectTime": "2023-10-30T14:05:38.729380+02:00", "EventTime": "2023-10-30T14:05:38.729392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10088], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. ", "ContentType": "text/plain"}], "uids": ["CuyVzIAC8miMvNvL3"]} -{"Format": "IDEA0", "ID": "8b6fd90a-ddd2-45d3-a96d-89ed47907eb7", "DetectTime": "2023-10-30T14:05:38.775867+02:00", "EventTime": "2023-10-30T14:05:38.775884+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CzBYIb35Wr7b85Y7E2"]} -{"Format": "IDEA0", "ID": "e6f17f1c-0396-4735-9fe9-c5104ab004a8", "DetectTime": "2023-10-30T14:05:38.835690+02:00", "EventTime": "2023-10-30T14:05:38.835701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7836], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. ", "ContentType": "text/plain"}], "uids": ["CymtkI1gbiCLOWJqKe"]} -{"Format": "IDEA0", "ID": "7deb8944-1ca0-4f40-93c4-e96a6aa49ac3", "DetectTime": "2023-10-30T14:05:38.962027+02:00", "EventTime": "2023-10-30T14:05:38.962046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C6OO9m1x2Z15BnyKxc"]} -{"Format": "IDEA0", "ID": "1912f79a-8925-4d6f-b9b9-b91cdca376d7", "DetectTime": "2023-10-30T14:05:39.022917+02:00", "EventTime": "2023-10-30T14:05:39.022934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25608], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. ", "ContentType": "text/plain"}], "uids": ["Cg7be53VAvov4Rq6H9"]} -{"Format": "IDEA0", "ID": "c0d485cd-29c1-4a31-a0e9-7a05ff6a5d61", "DetectTime": "2023-10-30T14:05:39.095706+02:00", "EventTime": "2023-10-30T14:05:39.095723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. ", "ContentType": "text/plain"}], "uids": ["CIkM5y2FvkOMO7hc2l"]} -{"Format": "IDEA0", "ID": "43e6a38c-e0b4-46e5-b2d7-127798d20328", "DetectTime": "2023-10-30T14:05:39.151090+02:00", "EventTime": "2023-10-30T14:05:39.151109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cz5dgK1JrsUTQteZ04", "C1Gtoz1qwSVfCdagv", "CIw48OsmSDAf0FVic", "C2jB5440Sa74nQW7m7"]} -{"Format": "IDEA0", "ID": "a2e13c47-21fc-4f77-a7a5-220debe772e4", "DetectTime": "2023-10-30T14:05:39.161013+02:00", "EventTime": "2023-10-30T14:05:39.161037+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C1Gtoz1qwSVfCdagv"]} -{"Format": "IDEA0", "ID": "a19af543-e7da-41d8-a7cf-f440224d9b7a", "DetectTime": "2023-10-30T14:05:39.169696+02:00", "EventTime": "2023-10-30T14:05:39.169713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2756], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. ", "ContentType": "text/plain"}], "uids": ["CbridD3iacTA8o9QZe"]} -{"Format": "IDEA0", "ID": "375b5a13-85e9-4802-b656-6b9caed65900", "DetectTime": "2023-10-30T14:05:39.226527+02:00", "EventTime": "2023-10-30T14:05:39.226544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CsGxzG1YWeQHrDhAFj"]} -{"Format": "Json", "ID": "375b5a13-85e9-4802-b656-6b9caed65900", "DetectTime": "2023-10-30T14:05:39.226527+02:00", "EventTime": "2023-10-30T14:05:39.226544+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:30:26.918000+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:39.333498)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c59b5623-b533-4afc-aa47-23c590478b70", "DetectTime": "2023-10-30T14:05:39.342865+02:00", "EventTime": "2023-10-30T14:05:39.342886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CSBaeO10HcTaKVM16a"]} -{"Format": "IDEA0", "ID": "e9e4188c-e727-4855-8140-641c378710e7", "DetectTime": "2023-10-30T14:05:39.396904+02:00", "EventTime": "2023-10-30T14:05:39.396924+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cgifxq24NFco6JQ0I2"]} -{"Format": "IDEA0", "ID": "3471609d-fecd-4dcd-a7ce-4b4d73860e74", "DetectTime": "2023-10-30T14:05:39.407316+02:00", "EventTime": "2023-10-30T14:05:39.407339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8136], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. ", "ContentType": "text/plain"}], "uids": ["CcQrIW3eeBWesoFUak"]} -{"Format": "IDEA0", "ID": "dd166c01-dd42-4443-b2ac-9d8a17d5b7ae", "DetectTime": "2023-10-30T14:05:39.465590+02:00", "EventTime": "2023-10-30T14:05:39.465611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CZ7fCS2fRC94yQ6mpf"]} -{"Format": "IDEA0", "ID": "f367a536-bba5-43d8-90ca-aafc1f5641f0", "DetectTime": "2023-10-30T14:05:39.525097+02:00", "EventTime": "2023-10-30T14:05:39.525119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CCETmj1EcuM89mtcO3"]} -{"Format": "IDEA0", "ID": "32f1a729-c721-4491-a279-ee97d58f1eaa", "DetectTime": "2023-10-30T14:05:39.575815+02:00", "EventTime": "2023-10-30T14:05:39.575882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CwlyEek8TSqoTBkok"]} -{"Format": "IDEA0", "ID": "a5ba1722-51f8-49f9-bfd0-fab1b8d28d26", "DetectTime": "2023-10-30T14:05:39.625936+02:00", "EventTime": "2023-10-30T14:05:39.625953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CpwfXgZH3hkXpZXqe"]} -{"Format": "IDEA0", "ID": "f97e89e6-a6f1-4063-ac15-73dd944e7166", "DetectTime": "2023-10-30T14:05:39.684365+02:00", "EventTime": "2023-10-30T14:05:39.684383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6123], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. ", "ContentType": "text/plain"}], "uids": ["C3b8aF1p6nZ3d1o7Ha"]} -{"Format": "IDEA0", "ID": "5b548372-5d54-48f7-9f1e-0cb017b5f44c", "DetectTime": "2023-10-30T14:05:39.739285+02:00", "EventTime": "2023-10-30T14:05:39.739311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3956], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. ", "ContentType": "text/plain"}], "uids": ["CdVxUo4ZCIgmezPMQl"]} -{"Format": "IDEA0", "ID": "6cc3ac4e-a932-4456-b78d-25361e7e9b42", "DetectTime": "2023-10-30T14:05:39.797718+02:00", "EventTime": "2023-10-30T14:05:39.797735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. ", "ContentType": "text/plain"}], "uids": ["CaL7Ol4vGD26qtQ78l"]} -{"Format": "Json", "ID": "6cc3ac4e-a932-4456-b78d-25361e7e9b42", "DetectTime": "2023-10-30T14:05:39.797718+02:00", "EventTime": "2023-10-30T14:05:39.797735+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10172], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:30:28.518442+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:39.881316)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8d2605e6-c9fd-4b31-857a-99c8feb10e6a", "DetectTime": "2023-10-30T14:05:39.887127+02:00", "EventTime": "2023-10-30T14:05:39.887144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28486], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. ", "ContentType": "text/plain"}], "uids": ["CCIAdb1znQzngQJ7t5"]} -{"Format": "IDEA0", "ID": "f1d1528b-042f-4ea1-928b-1e243f39f3de", "DetectTime": "2023-10-30T14:05:39.937983+02:00", "EventTime": "2023-10-30T14:05:39.937999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CAEhPf199sNeNiXcuh"]} -{"Format": "IDEA0", "ID": "60962a51-8631-4ecd-8b46-3ced8e082572", "DetectTime": "2023-10-30T14:05:39.987846+02:00", "EventTime": "2023-10-30T14:05:39.987866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CgSueL2Mw2Xr8xP1y6"]} -{"Format": "IDEA0", "ID": "b4a623eb-2686-44b1-959c-98f709ce636c", "DetectTime": "2023-10-30T14:05:40.039734+02:00", "EventTime": "2023-10-30T14:05:40.039756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["Cesrcf2oFa87SP7wvl"]} -{"Format": "IDEA0", "ID": "0cb14949-99ad-4ae6-a060-f4e5c93ef666", "DetectTime": "2023-10-30T14:05:40.090329+02:00", "EventTime": "2023-10-30T14:05:40.090349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["C8Iry93iK9YDRjHTq2"]} -{"Format": "IDEA0", "ID": "2a638c84-e1f6-41ee-b2bc-eedfd1571059", "DetectTime": "2023-10-30T14:05:40.137380+02:00", "EventTime": "2023-10-30T14:05:40.137402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["C0NRkWINi0H20M49k"]} -{"Format": "IDEA0", "ID": "ee15db3c-c3c4-4b6f-94b4-a4d69071a03b", "DetectTime": "2023-10-30T14:05:40.167428+02:00", "EventTime": "2023-10-30T14:05:40.167445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10483], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10483/UDP destination IP 95.58.15.211. ", "ContentType": "text/plain"}], "uids": ["CKCtZk2RteWS2XxKpb"]} -{"Format": "IDEA0", "ID": "a9b7b383-fb0b-4b91-82ea-ccd4d3734b61", "DetectTime": "2023-10-30T14:05:40.223153+02:00", "EventTime": "2023-10-30T14:05:40.223172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["C2gNmX2vWr4b0hsD7f"]} -{"Format": "IDEA0", "ID": "3cee5f11-d9e7-4d1b-bcf0-6adcb48239ae", "DetectTime": "2023-10-30T14:05:40.274533+02:00", "EventTime": "2023-10-30T14:05:40.274558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. ", "ContentType": "text/plain"}], "uids": ["Cze0B93XVXvdeB6n7a"]} -{"Format": "Json", "ID": "3cee5f11-d9e7-4d1b-bcf0-6adcb48239ae", "DetectTime": "2023-10-30T14:05:40.274533+02:00", "EventTime": "2023-10-30T14:05:40.274558+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:31:20.653950+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:40.370347)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a8415b4a-f650-4535-9ed2-c6c48f9e3109", "DetectTime": "2023-10-30T14:05:40.378145+02:00", "EventTime": "2023-10-30T14:05:40.378174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CZEvhQ2FwRRjDoEool"]} -{"Format": "IDEA0", "ID": "8ae7f61b-d560-49a8-8922-0dafd1cc28b7", "DetectTime": "2023-10-30T14:05:40.435468+02:00", "EventTime": "2023-10-30T14:05:40.435491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["CaM2GZ4XsG8QO0yv"]} -{"Format": "IDEA0", "ID": "bf819f28-36ef-4149-aebf-bf554e23a0aa", "DetectTime": "2023-10-30T14:05:40.481083+02:00", "EventTime": "2023-10-30T14:05:40.481104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7236], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. ", "ContentType": "text/plain"}], "uids": ["CSQ4Iu4CFiGk1CGrG5"]} -{"Format": "IDEA0", "ID": "c33688ff-edf6-4e1b-81a7-55e77adf355d", "DetectTime": "2023-10-30T14:05:40.527244+02:00", "EventTime": "2023-10-30T14:05:40.527262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["ClDBmG4De9di0AaBKl"]} -{"Format": "IDEA0", "ID": "23bd5227-a55b-4f0e-8a3d-bec21d1ad15c", "DetectTime": "2023-10-30T14:05:40.579964+02:00", "EventTime": "2023-10-30T14:05:40.579984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. ", "ContentType": "text/plain"}], "uids": ["CK9VSr2A6ZMBql25Sk"]} -{"Format": "IDEA0", "ID": "e9753176-e01f-4a0b-a632-ca8e9a058dc4", "DetectTime": "2023-10-30T14:05:40.626437+02:00", "EventTime": "2023-10-30T14:05:40.626464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CRGFCo3PA769ubCug7"]} -{"Format": "IDEA0", "ID": "93381a07-62d4-4411-90c1-444fbe5a3dad", "DetectTime": "2023-10-30T14:05:40.669658+02:00", "EventTime": "2023-10-30T14:05:40.669681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cd4Dzz131cb5rZWPWj"]} -{"Format": "IDEA0", "ID": "e3d2e759-d6a3-4b48-9403-06a31bf6ae36", "DetectTime": "2023-10-30T14:05:40.712440+02:00", "EventTime": "2023-10-30T14:05:40.712468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CFC1cTiMqYlG8BdS9"]} -{"Format": "Json", "ID": "e3d2e759-d6a3-4b48-9403-06a31bf6ae36", "DetectTime": "2023-10-30T14:05:40.712440+02:00", "EventTime": "2023-10-30T14:05:40.712468+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:32:07.166891+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:40.793112)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7c519fcf-de8f-41a0-b21e-aabac165759b", "DetectTime": "2023-10-30T14:05:40.798534+02:00", "EventTime": "2023-10-30T14:05:40.798550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CmPATar9ryxceXGXk"]} -{"Format": "IDEA0", "ID": "7991830f-3337-405b-9777-2f449412a96a", "DetectTime": "2023-10-30T14:05:40.827090+02:00", "EventTime": "2023-10-30T14:05:40.827111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["Czf0nQ3jd28I2nwBS1"]} -{"Format": "IDEA0", "ID": "7ae936bf-6968-4b99-be77-578b09b17ba4", "DetectTime": "2023-10-30T14:05:40.864093+02:00", "EventTime": "2023-10-30T14:05:40.864111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CuSW3fkMoOfQ67mhc"]} -{"Format": "IDEA0", "ID": "0bfd955f-969d-4724-bbed-e003b4d6edef", "DetectTime": "2023-10-30T14:05:40.899954+02:00", "EventTime": "2023-10-30T14:05:40.899970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19010], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19010/UDP destination IP 110.137.7.240. ", "ContentType": "text/plain"}], "uids": ["C1MggA1chGsbZjOsV3"]} -{"Format": "IDEA0", "ID": "b9f159e1-93e9-40db-9c5c-8189d9f4d7e9", "DetectTime": "2023-10-30T14:05:40.939553+02:00", "EventTime": "2023-10-30T14:05:40.939570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CL2Zrh2Y29QWHHe8nd"]} -{"Format": "IDEA0", "ID": "5f2f3965-8c16-46ef-aec2-3f3d61dab3ab", "DetectTime": "2023-10-30T14:05:40.976862+02:00", "EventTime": "2023-10-30T14:05:40.976881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15171], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15171/UDP destination IP 203.198.93.5. ", "ContentType": "text/plain"}], "uids": ["CgQaYI2SNjMPYIdiKf"]} -{"Format": "IDEA0", "ID": "d981a67b-c61d-4394-b204-64b3cc566ae5", "DetectTime": "2023-10-30T14:05:41.015139+02:00", "EventTime": "2023-10-30T14:05:41.015155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["C3UhNz2TzMcB25ryNh"]} -{"Format": "IDEA0", "ID": "b493a778-de3a-4349-ab89-8a04c4081567", "DetectTime": "2023-10-30T14:05:41.051757+02:00", "EventTime": "2023-10-30T14:05:41.051773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17782], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17782/UDP destination IP 182.64.80.71. ", "ContentType": "text/plain"}], "uids": ["CVja5Q1XatZMIaUVAf"]} -{"Format": "IDEA0", "ID": "139a7f2d-4b0f-47ac-8763-91d5b054d1a1", "DetectTime": "2023-10-30T14:05:41.090311+02:00", "EventTime": "2023-10-30T14:05:41.090328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 201.209.29.166. ", "ContentType": "text/plain"}], "uids": ["CylMUz2I4TPpnnJIfd"]} -{"Format": "Json", "ID": "139a7f2d-4b0f-47ac-8763-91d5b054d1a1", "DetectTime": "2023-10-30T14:05:41.090311+02:00", "EventTime": "2023-10-30T14:05:41.090328+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:33:39.688471+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:41.157871)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8280e06e-4516-4bcf-8980-358d324db699", "DetectTime": "2023-10-30T14:05:41.164288+02:00", "EventTime": "2023-10-30T14:05:41.164311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 176.74.91.96. ", "ContentType": "text/plain"}], "uids": ["CHg5ru4O7YkRKcsYTj"]} -{"Format": "IDEA0", "ID": "04586e05-8be0-4e9c-b5b5-65353ad56f82", "DetectTime": "2023-10-30T14:05:41.199311+02:00", "EventTime": "2023-10-30T14:05:41.199335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["CRMkQrwMFJR7L80ml"]} -{"Format": "IDEA0", "ID": "2d96969c-818c-4e66-b096-d27725450820", "DetectTime": "2023-10-30T14:05:41.230502+02:00", "EventTime": "2023-10-30T14:05:41.230520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3969], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. ", "ContentType": "text/plain"}], "uids": ["CkhLTI1QaIyUlUnJy1"]} -{"Format": "IDEA0", "ID": "f848f929-898c-4aec-9c34-d94fe43d613e", "DetectTime": "2023-10-30T14:05:41.265924+02:00", "EventTime": "2023-10-30T14:05:41.265945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CAh4cj2UgpJBWZ2Up"]} -{"Format": "IDEA0", "ID": "47949086-e53f-438c-abf6-c13fcef59afa", "DetectTime": "2023-10-30T14:05:41.300271+02:00", "EventTime": "2023-10-30T14:05:41.300285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["Cujdxr1NL9ZMrdk39f"]} -{"Format": "IDEA0", "ID": "dcd26be8-26b6-4386-ab78-80e1bf37a975", "DetectTime": "2023-10-30T14:05:41.324595+02:00", "EventTime": "2023-10-30T14:05:41.324635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23413], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23413/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["CMFx3t2xcc9P0GhWK9"]} -{"Format": "IDEA0", "ID": "90320edb-bad7-4b46-989f-cc44352aa307", "DetectTime": "2023-10-30T14:05:41.358003+02:00", "EventTime": "2023-10-30T14:05:41.358028+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CabRYa11l2yEh5tQK4"]} -{"Format": "IDEA0", "ID": "8fba6a9e-80b9-4ef7-ac39-c4fe97178e90", "DetectTime": "2023-10-30T14:05:41.364945+02:00", "EventTime": "2023-10-30T14:05:41.364967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["ClOE9LZmiE8j8OrIg"]} -{"Format": "IDEA0", "ID": "cc68ef0c-0945-4d04-89a6-be7a9ef5f4a7", "DetectTime": "2023-10-30T14:05:41.398932+02:00", "EventTime": "2023-10-30T14:05:41.399004+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cm8X6d2vZzfop3qAQc"]} -{"Format": "IDEA0", "ID": "9a71961f-5601-4a4c-8ca3-78cc3b962e99", "DetectTime": "2023-10-30T14:05:41.407618+02:00", "EventTime": "2023-10-30T14:05:41.407641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ChdSz13U8ITuWeH0ei"]} -{"Format": "IDEA0", "ID": "5f6eec0d-1e77-4b27-8217-5b0d4f5ee073", "DetectTime": "2023-10-30T14:05:41.439989+02:00", "EventTime": "2023-10-30T14:05:41.440008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CoEBqx1a2K23trNAMb"]} -{"Format": "Json", "ID": "5f6eec0d-1e77-4b27-8217-5b0d4f5ee073", "DetectTime": "2023-10-30T14:05:41.439989+02:00", "EventTime": "2023-10-30T14:05:41.440008+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:34:31.796498+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:41.504955)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "28268ca1-37bc-4cba-8536-3d46449fbf87", "DetectTime": "2023-10-30T14:05:41.510059+02:00", "EventTime": "2023-10-30T14:05:41.510086+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Hostname": ["host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 95.104.77.164 from 10.0.2.19. blacklisted IP AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CGlDl430gGSe834n19"]} -{"Format": "IDEA0", "ID": "435d7960-b40d-4e36-8086-db62a77e277e", "DetectTime": "2023-10-30T14:05:41.568459+02:00", "EventTime": "2023-10-30T14:05:41.568473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CocnjQ15fB0vJSQWs9"]} -{"Format": "IDEA0", "ID": "2f8cde3b-7bf7-4b3c-adeb-5fa8c02b32c4", "DetectTime": "2023-10-30T14:05:41.594186+02:00", "EventTime": "2023-10-30T14:05:41.594209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CRcVYDPFZH0qF56y1"]} -{"Format": "IDEA0", "ID": "7ff73763-ea6e-4918-aba6-b1c28601b9b1", "DetectTime": "2023-10-30T14:05:41.620887+02:00", "EventTime": "2023-10-30T14:05:41.620904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. ", "ContentType": "text/plain"}], "uids": ["CmDroa335CVQYaRUB"]} -{"Format": "IDEA0", "ID": "1f2f82ae-406b-417e-9bd8-260c856d1b10", "DetectTime": "2023-10-30T14:05:41.647173+02:00", "EventTime": "2023-10-30T14:05:41.647194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7884], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. ", "ContentType": "text/plain"}], "uids": ["Cm1yS6WJJrthwxGg9"]} -{"Format": "IDEA0", "ID": "eae191f6-2da3-4f7e-b361-15a97425279e", "DetectTime": "2023-10-30T14:05:41.673115+02:00", "EventTime": "2023-10-30T14:05:41.673142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16780], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16780/UDP destination IP 180.183.49.99. ", "ContentType": "text/plain"}], "uids": ["CuKox016xNdEuJU2Pk"]} -{"Format": "IDEA0", "ID": "6ce2d10c-4e66-447b-a314-df879998a92c", "DetectTime": "2023-10-30T14:05:41.701876+02:00", "EventTime": "2023-10-30T14:05:41.701893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["ChviTtD3wKFosOyEg"]} -{"Format": "IDEA0", "ID": "06ef2a3e-08f7-485d-9d88-f4d3200597ff", "DetectTime": "2023-10-30T14:05:41.728827+02:00", "EventTime": "2023-10-30T14:05:41.728844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16833], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16833/UDP destination IP 118.68.150.223. ", "ContentType": "text/plain"}], "uids": ["CiFmG2tAzmb8phuX3"]} -{"Format": "IDEA0", "ID": "b327f597-a06b-46d8-83e7-1ed5e3bf63b2", "DetectTime": "2023-10-30T14:05:41.758030+02:00", "EventTime": "2023-10-30T14:05:41.758052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CZj9mY2jyjMohSiDZ3"]} -{"Format": "Json", "ID": "b327f597-a06b-46d8-83e7-1ed5e3bf63b2", "DetectTime": "2023-10-30T14:05:41.758030+02:00", "EventTime": "2023-10-30T14:05:41.758052+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:36:38.575589+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:41.812922)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "34b4faa6-643a-4e2e-bce4-ebaad1d68fb4", "DetectTime": "2023-10-30T14:05:41.817554+02:00", "EventTime": "2023-10-30T14:05:41.817566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14240], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14240/UDP destination IP 59.181.111.224. ", "ContentType": "text/plain"}], "uids": ["CVwKJ42qwoRNtoHgX8"]} -{"Format": "IDEA0", "ID": "662a523f-982a-4557-9b78-c1b0650953b2", "DetectTime": "2023-10-30T14:05:41.844379+02:00", "EventTime": "2023-10-30T14:05:41.844397+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 181.65.3.210 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cgvzml1N1obvRLmWud"]} -{"Format": "IDEA0", "ID": "7149b34b-f775-4e1d-80c8-d33e7b660802", "DetectTime": "2023-10-30T14:05:41.894555+02:00", "EventTime": "2023-10-30T14:05:41.894575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20193], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. ", "ContentType": "text/plain"}], "uids": ["CGyhBQUJiFSEpULOh"]} -{"Format": "IDEA0", "ID": "af9d020b-f015-4dfb-b29e-f19035a6ab22", "DetectTime": "2023-10-30T14:05:41.920822+02:00", "EventTime": "2023-10-30T14:05:41.920838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CkME7n3T5pTrOuCj76"]} -{"Format": "IDEA0", "ID": "42fbb2c2-37e9-4459-ae9a-b48ace264e37", "DetectTime": "2023-10-30T14:05:41.947268+02:00", "EventTime": "2023-10-30T14:05:41.947288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CjrApE2JwDPKIFvYqf"]} -{"Format": "IDEA0", "ID": "24fca44c-842b-4c4f-ada6-2a76ee5cd73c", "DetectTime": "2023-10-30T14:05:41.974394+02:00", "EventTime": "2023-10-30T14:05:41.974414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CtxLou36mzlYEaVoBa"]} -{"Format": "IDEA0", "ID": "944843cc-2501-4417-b602-e05e9dd30d67", "DetectTime": "2023-10-30T14:05:42.000468+02:00", "EventTime": "2023-10-30T14:05:42.000489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYmdGV1D05ORn3OzB2"]} -{"Format": "IDEA0", "ID": "a2cc8852-49b9-478a-8e5b-cc44781a8f80", "DetectTime": "2023-10-30T14:05:42.008118+02:00", "EventTime": "2023-10-30T14:05:42.008138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CVIoDUrfoQz3yZ01d"]} -{"Format": "IDEA0", "ID": "b0b2e370-1d01-4bc4-95cf-4c76b61a47a7", "DetectTime": "2023-10-30T14:05:42.030616+02:00", "EventTime": "2023-10-30T14:05:42.030634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CPuCWg33GdUGIcg5fk"]} -{"Format": "IDEA0", "ID": "683e1b66-b630-4706-b8bb-a8b0cec30bd7", "DetectTime": "2023-10-30T14:05:42.129884+02:00", "EventTime": "2023-10-30T14:05:42.129903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11174], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. ", "ContentType": "text/plain"}], "uids": ["ClY8xh1a9Z44FFZ2jl"]} -{"Format": "IDEA0", "ID": "a84370f2-b12a-4440-93e9-65f2d1646a85", "DetectTime": "2023-10-30T14:05:42.158627+02:00", "EventTime": "2023-10-30T14:05:42.158645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. ", "ContentType": "text/plain"}], "uids": ["CpTzdq1mClVoaizoLf"]} -{"Format": "Json", "ID": "a84370f2-b12a-4440-93e9-65f2d1646a85", "DetectTime": "2023-10-30T14:05:42.158627+02:00", "EventTime": "2023-10-30T14:05:42.158645+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28606], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T12:38:26.345248+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2023/10/30 14:05:42.219637)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "44da3c4f-7788-47ab-9f6d-0320cbbdff52", "DetectTime": "2023-10-30T14:05:42.225324+02:00", "EventTime": "2023-10-30T14:05:42.225340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CfSsCw2ELboo5hWBFb"]} -{"Format": "IDEA0", "ID": "e6e5a1c1-c2e6-4a9f-acae-359795ee05ac", "DetectTime": "2023-10-30T14:05:42.256218+02:00", "EventTime": "2023-10-30T14:05:42.256238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15020], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15020/UDP destination IP 125.113.181.147. ", "ContentType": "text/plain"}], "uids": ["CNadm43G8HlxR9GqXd"]} -{"Format": "IDEA0", "ID": "6c36eeae-b14d-4d5b-9e27-d1283130dc97", "DetectTime": "2023-10-30T14:05:42.283167+02:00", "EventTime": "2023-10-30T14:05:42.283183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26503], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26503/UDP destination IP 189.187.96.177. ", "ContentType": "text/plain"}], "uids": ["C8jEb82FzxinkMYDO3"]} -{"Format": "IDEA0", "ID": "52efb07a-d485-4e42-bda2-5a052958a398", "DetectTime": "2023-10-30T14:05:42.309995+02:00", "EventTime": "2023-10-30T14:05:42.310019+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cd8gpJ34xe79CsXOsf"]} -{"Format": "IDEA0", "ID": "df1fc8fa-ba96-4502-bb34-b2c901f5eec7", "DetectTime": "2023-10-30T14:05:42.316867+02:00", "EventTime": "2023-10-30T14:05:42.316882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["COQvWd1xymPEzepk2f"]} -{"Format": "IDEA0", "ID": "1a8c0fb5-5b31-479b-8dd5-e4a6269f6d96", "DetectTime": "2023-10-30T14:05:42.342166+02:00", "EventTime": "2023-10-30T14:05:42.342181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CstcZF3PJxz2bc2MPc"]} -{"Format": "IDEA0", "ID": "e754894c-d5fd-4ac3-925a-bd6efc166d4a", "DetectTime": "2023-10-30T14:05:42.365495+02:00", "EventTime": "2023-10-30T14:05:42.365514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CCb3Bc3cQaOI26LWJg"]} -{"Format": "IDEA0", "ID": "abc9527d-ce93-43d6-97c7-4446546f2ee1", "DetectTime": "2023-10-30T14:05:42.430716+02:00", "EventTime": "2023-10-30T14:05:42.430734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CKiHiQ2lJLUjJNARQg"]} -{"Format": "IDEA0", "ID": "6f008056-8469-4b73-b4fb-064705e97992", "DetectTime": "2023-10-30T14:05:42.489919+02:00", "EventTime": "2023-10-30T14:05:42.489936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CawUrv2kyO8LECnwo1"]} -{"Format": "IDEA0", "ID": "76559df9-4c66-4bee-9d16-002fd2a2ac7b", "DetectTime": "2023-10-30T14:05:42.553563+02:00", "EventTime": "2023-10-30T14:05:42.553586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CxTfSp8mztmfUYFHc"]} -{"Format": "Json", "ID": "76559df9-4c66-4bee-9d16-002fd2a2ac7b", "DetectTime": "2023-10-30T14:05:42.553563+02:00", "EventTime": "2023-10-30T14:05:42.553586+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:09:18.474956+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:42.740278)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f57d84f7-be7d-4ad6-a7ec-4784c6879f60", "DetectTime": "2023-10-30T14:05:42.744718+02:00", "EventTime": "2023-10-30T14:05:42.744737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CQ14IE1cf4f6xNeFpi"]} -{"Format": "IDEA0", "ID": "68d13783-d502-43e1-818c-040d2f20acca", "DetectTime": "2023-10-30T14:05:42.814524+02:00", "EventTime": "2023-10-30T14:05:42.814543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["Cw70Tr1zFxPfgIOvbk"]} -{"Format": "IDEA0", "ID": "02904913-ac84-4153-b6e2-63331ef5ee47", "DetectTime": "2023-10-30T14:05:42.876666+02:00", "EventTime": "2023-10-30T14:05:42.876688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["C6nMwO2Ap7bH7iRUhh"]} -{"Format": "IDEA0", "ID": "0a32e7e1-ec09-493e-8b22-4d786667c279", "DetectTime": "2023-10-30T14:05:42.947381+02:00", "EventTime": "2023-10-30T14:05:42.947396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["CBu0fV1FC5AZx5VPv3"]} -{"Format": "IDEA0", "ID": "51a86b39-4a53-4f36-b1a2-618fdbc37220", "DetectTime": "2023-10-30T14:05:43.010249+02:00", "EventTime": "2023-10-30T14:05:43.010275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. ", "ContentType": "text/plain"}], "uids": ["CyCtCw1xpRxQMTvpW8"]} -{"Format": "IDEA0", "ID": "6099804f-57b5-426a-832e-6dcbc3dba67c", "DetectTime": "2023-10-30T14:05:43.072009+02:00", "EventTime": "2023-10-30T14:05:43.072022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CNv0Gl4bGw655P9aK8"]} -{"Format": "IDEA0", "ID": "fcabc2cc-09c1-456a-b794-bf824b05bd56", "DetectTime": "2023-10-30T14:05:43.132251+02:00", "EventTime": "2023-10-30T14:05:43.132267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7236], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. ", "ContentType": "text/plain"}], "uids": ["CV0Y0Z1gsdUSUA77fc"]} -{"Format": "IDEA0", "ID": "82fd37a6-deb4-48d4-b714-9a43cba8c087", "DetectTime": "2023-10-30T14:05:43.203363+02:00", "EventTime": "2023-10-30T14:05:43.203384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["Co9k8822ZwKcxOAAWk"]} -{"Format": "Json", "ID": "82fd37a6-deb4-48d4-b714-9a43cba8c087", "DetectTime": "2023-10-30T14:05:43.203363+02:00", "EventTime": "2023-10-30T14:05:43.203384+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:09:37.876039+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:43.308246)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f1c936e8-6dd4-41c5-b288-e7dec173cc0e", "DetectTime": "2023-10-30T14:05:43.314683+02:00", "EventTime": "2023-10-30T14:05:43.314700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CQTKTs2tPhYU9vqlt6"]} -{"Format": "IDEA0", "ID": "07c1dac1-97b0-438a-a08c-5aab65997e11", "DetectTime": "2023-10-30T14:05:43.379457+02:00", "EventTime": "2023-10-30T14:05:43.379475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. ", "ContentType": "text/plain"}], "uids": ["C8lbnP2VTwWAf1jnv4"]} -{"Format": "IDEA0", "ID": "f4372cd6-f96b-4a93-80d1-1d1e24f80b14", "DetectTime": "2023-10-30T14:05:43.441783+02:00", "EventTime": "2023-10-30T14:05:43.441799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CqKitJ1m8kGefPZmji"]} -{"Format": "IDEA0", "ID": "e818737d-b952-476d-b8a8-2bf773785efe", "DetectTime": "2023-10-30T14:05:43.509497+02:00", "EventTime": "2023-10-30T14:05:43.509518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["CW99Eb1HvWLYQhKnb7"]} -{"Format": "IDEA0", "ID": "e31adea3-ffb6-424e-82d1-612cc1d05e90", "DetectTime": "2023-10-30T14:05:43.582468+02:00", "EventTime": "2023-10-30T14:05:43.582489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["C7G5EMoqyreewvdha"]} -{"Format": "IDEA0", "ID": "4101954c-3758-4d57-812c-dd28158fe219", "DetectTime": "2023-10-30T14:05:43.656525+02:00", "EventTime": "2023-10-30T14:05:43.656543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CfhTyQ2GDiUkammuzg"]} -{"Format": "IDEA0", "ID": "e41efbd1-342d-4ca5-ba9c-3483ba1db986", "DetectTime": "2023-10-30T14:05:43.722352+02:00", "EventTime": "2023-10-30T14:05:43.722380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15171], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15171/UDP destination IP 203.198.93.5. ", "ContentType": "text/plain"}], "uids": ["CDXU8b1PejTQ0FCaSa"]} -{"Format": "IDEA0", "ID": "674b8196-2ce1-4f8c-89e4-366224dc784f", "DetectTime": "2023-10-30T14:05:43.780843+02:00", "EventTime": "2023-10-30T14:05:43.780863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["Chjgv6ffiQa0I5IVa"]} -{"Format": "Json", "ID": "674b8196-2ce1-4f8c-89e4-366224dc784f", "DetectTime": "2023-10-30T14:05:43.780843+02:00", "EventTime": "2023-10-30T14:05:43.780863+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:09:59.968556+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:43.864591)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "28efc956-65c5-4ef5-90a9-ba3852b02200", "DetectTime": "2023-10-30T14:05:43.870099+02:00", "EventTime": "2023-10-30T14:05:43.870119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CqIYdsjGqdXZYCXG9"]} -{"Format": "IDEA0", "ID": "dd3544f3-d9f4-4623-8d5f-8a1ce74f27ee", "DetectTime": "2023-10-30T14:05:43.924144+02:00", "EventTime": "2023-10-30T14:05:43.924159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 201.209.29.166. ", "ContentType": "text/plain"}], "uids": ["Cs26llwPfDOL3UCj8"]} -{"Format": "IDEA0", "ID": "95b27172-70f1-4771-aba8-870f61104e0c", "DetectTime": "2023-10-30T14:05:43.973808+02:00", "EventTime": "2023-10-30T14:05:43.973820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cbd0YU3lR2hZ0JntZi"]} -{"Format": "IDEA0", "ID": "3bb7c6bc-488e-4825-9d4b-842631704369", "DetectTime": "2023-10-30T14:05:44.029726+02:00", "EventTime": "2023-10-30T14:05:44.029749+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C2GsQtNDRBJBrCfk1"]} -{"Format": "IDEA0", "ID": "9ddb2b12-7342-48bd-ba76-3427d0ff6c83", "DetectTime": "2023-10-30T14:05:44.037254+02:00", "EventTime": "2023-10-30T14:05:44.037275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["Cv5CSuYu47F8J794e"]} -{"Format": "IDEA0", "ID": "60ffac2a-5415-4575-a986-26d21b4b9f24", "DetectTime": "2023-10-30T14:05:44.091165+02:00", "EventTime": "2023-10-30T14:05:44.091182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["C6eVCW2XkWbp1MA5j"]} -{"Format": "IDEA0", "ID": "02da6c40-2c11-4766-9f6c-b1d38703fef4", "DetectTime": "2023-10-30T14:05:44.144094+02:00", "EventTime": "2023-10-30T14:05:44.144113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.33.235 ", "ContentType": "text/plain"}], "uids": ["CAWGTP18iUVkW0MEcj"]} -{"Format": "IDEA0", "ID": "114f00a1-94dc-434d-b528-a1f697969630", "DetectTime": "2023-10-30T14:05:44.169493+02:00", "EventTime": "2023-10-30T14:05:44.169518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3969], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. ", "ContentType": "text/plain"}], "uids": ["Co5Qra2dnYf0ZDWQwg"]} -{"Format": "IDEA0", "ID": "2cf59b5a-932d-450c-90c2-353a558dc3af", "DetectTime": "2023-10-30T14:05:44.216755+02:00", "EventTime": "2023-10-30T14:05:44.216784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CUTKUE2hxC9sMvfWKj"]} -{"Format": "IDEA0", "ID": "fa53ad3b-a7c7-43c6-a49b-d012ab94a8f0", "DetectTime": "2023-10-30T14:05:44.262505+02:00", "EventTime": "2023-10-30T14:05:44.262523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cua0eV3jD7NromN4ch"]} -{"Format": "Json", "ID": "fa53ad3b-a7c7-43c6-a49b-d012ab94a8f0", "DetectTime": "2023-10-30T14:05:44.262505+02:00", "EventTime": "2023-10-30T14:05:44.262523+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:10:54.364466+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:44.428018)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c138ccd2-9c1b-4e88-b907-4fc0be3175f8", "DetectTime": "2023-10-30T14:05:44.434624+02:00", "EventTime": "2023-10-30T14:05:44.434644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["C6ovqMQAHyRLcl9F8"]} -{"Format": "IDEA0", "ID": "af9c6ec9-d201-456b-96c3-28d874b1c02a", "DetectTime": "2023-10-30T14:05:44.495968+02:00", "EventTime": "2023-10-30T14:05:44.495984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CDmyDy2x4WzTjWOz2i"]} -{"Format": "IDEA0", "ID": "68c047a0-050e-462a-a9e8-89397ed26088", "DetectTime": "2023-10-30T14:05:44.551352+02:00", "EventTime": "2023-10-30T14:05:44.551378+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CZTnb81mX6zDy7Pajl"]} -{"Format": "IDEA0", "ID": "d1424fe4-ad1b-45ec-8d9d-c7a9aa1fe052", "DetectTime": "2023-10-30T14:05:44.560984+02:00", "EventTime": "2023-10-30T14:05:44.561011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. ", "ContentType": "text/plain"}], "uids": ["CLC8v33yOn4gNH4mc2"]} -{"Format": "IDEA0", "ID": "b24b702b-9bba-4db1-a5f1-9e9de4b8d9c0", "DetectTime": "2023-10-30T14:05:44.623483+02:00", "EventTime": "2023-10-30T14:05:44.623505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7884], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. ", "ContentType": "text/plain"}], "uids": ["CX2ziADcxqCHlVqld"]} -{"Format": "IDEA0", "ID": "fd415028-9e2d-4e35-9cd1-0df50dfc178b", "DetectTime": "2023-10-30T14:05:44.683459+02:00", "EventTime": "2023-10-30T14:05:44.683484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16780], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16780/UDP destination IP 180.183.49.99. ", "ContentType": "text/plain"}], "uids": ["CEIPCG34ZaDsu5Eybg"]} -{"Format": "IDEA0", "ID": "536110ad-4b41-4dcb-963e-a1a62e181172", "DetectTime": "2023-10-30T14:05:44.740983+02:00", "EventTime": "2023-10-30T14:05:44.741001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["CU7tKC0aJ4Htvni9k"]} -{"Format": "IDEA0", "ID": "e44866f9-16e0-40db-ae14-8805fc2d62e3", "DetectTime": "2023-10-30T14:05:44.801247+02:00", "EventTime": "2023-10-30T14:05:44.801277+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CPFRcb2aFf7usMmGve"]} -{"Format": "IDEA0", "ID": "b65fe81f-c84c-4994-8d40-099f42cd1b4e", "DetectTime": "2023-10-30T14:05:44.869079+02:00", "EventTime": "2023-10-30T14:05:44.869105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Chf5rX1TPzWrst5KP7"]} -{"Format": "IDEA0", "ID": "cdc1cb19-a83a-43a2-b735-77e35d538079", "DetectTime": "2023-10-30T14:05:44.925569+02:00", "EventTime": "2023-10-30T14:05:44.925593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CYmdGV1D05ORn3OzB2", "C2GsQtNDRBJBrCfk1", "COk6p24JJ2YwRmcwOc", "CabRYa11l2yEh5tQK4"]} -{"Format": "IDEA0", "ID": "d58cda3e-2796-436c-94dd-685b471f5854", "DetectTime": "2023-10-30T14:05:44.934429+02:00", "EventTime": "2023-10-30T14:05:44.934445+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["COk6p24JJ2YwRmcwOc"]} -{"Format": "IDEA0", "ID": "a7de85bf-c878-4a89-b637-25c459d350da", "DetectTime": "2023-10-30T14:05:44.943826+02:00", "EventTime": "2023-10-30T14:05:44.943845+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CJH3oUO19KwddweZh"]} -{"Format": "IDEA0", "ID": "e008e82e-d5a8-481c-8921-b3917dff08d0", "DetectTime": "2023-10-30T14:05:44.952540+02:00", "EventTime": "2023-10-30T14:05:44.952564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20193], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. ", "ContentType": "text/plain"}], "uids": ["C2oiGj1umIkFjRDmOg"]} -{"Format": "Json", "ID": "e008e82e-d5a8-481c-8921-b3917dff08d0", "DetectTime": "2023-10-30T14:05:44.952540+02:00", "EventTime": "2023-10-30T14:05:44.952564+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20193], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:11:48.833037+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:45.034942)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3c8d2e27-eba0-4854-af15-035ff843910b", "DetectTime": "2023-10-30T14:05:45.040058+02:00", "EventTime": "2023-10-30T14:05:45.040070+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRTYWn1z1WMmz4J0og"]} -{"Format": "IDEA0", "ID": "049c3df1-0009-4e14-82bc-e8605803c9cd", "DetectTime": "2023-10-30T14:05:45.050688+02:00", "EventTime": "2023-10-30T14:05:45.050706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CQvAvkDYCHSYb4lp4"]} -{"Format": "IDEA0", "ID": "41ce99b5-80ee-486a-b326-a1ed857fae21", "DetectTime": "2023-10-30T14:05:45.102877+02:00", "EventTime": "2023-10-30T14:05:45.102901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11174], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. ", "ContentType": "text/plain"}], "uids": ["CaZkl6gO8kXW83NQb"]} -{"Format": "IDEA0", "ID": "af2b53d8-279f-452a-ad50-e97fed9a1b21", "DetectTime": "2023-10-30T14:05:45.153184+02:00", "EventTime": "2023-10-30T14:05:45.153213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["ClWqwJkS9tjzPLuX3"]} -{"Format": "IDEA0", "ID": "9980c142-d5ce-4c78-9b41-184fa5f198fc", "DetectTime": "2023-10-30T14:05:45.209088+02:00", "EventTime": "2023-10-30T14:05:45.209106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. ", "ContentType": "text/plain"}], "uids": ["C1b8xVDuDLzVeV3I4"]} -{"Format": "IDEA0", "ID": "9b1b8a57-8db7-4452-850a-cdcd739ca567", "DetectTime": "2023-10-30T14:05:45.264247+02:00", "EventTime": "2023-10-30T14:05:45.264267+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CuzkZM2QhvyFYXAT19"]} -{"Format": "IDEA0", "ID": "88cfbeb8-d607-4565-a15a-90e9e5fb8c15", "DetectTime": "2023-10-30T14:05:45.273576+02:00", "EventTime": "2023-10-30T14:05:45.273602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["Cbuhp61pSwLUdo2imh"]} -{"Format": "IDEA0", "ID": "b2861823-ea91-4e93-832e-d99f0b014d2e", "DetectTime": "2023-10-30T14:05:45.331134+02:00", "EventTime": "2023-10-30T14:05:45.331164+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0y5MY1rIPXcuPuaj3"]} -{"Format": "IDEA0", "ID": "6dfaf094-3b81-4648-985d-72b2bd35a119", "DetectTime": "2023-10-30T14:05:45.340658+02:00", "EventTime": "2023-10-30T14:05:45.340684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CC1nHC2kQatYeueGa8"]} -{"Format": "IDEA0", "ID": "e3ea1fb7-5346-4b9c-94ac-fa2e070f99ae", "DetectTime": "2023-10-30T14:05:45.393373+02:00", "EventTime": "2023-10-30T14:05:45.393402+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CIAl8x3zg1VHtaCYE3"]} -{"Format": "IDEA0", "ID": "623a074b-9cca-4d50-92d9-099f0dfdc459", "DetectTime": "2023-10-30T14:05:45.401619+02:00", "EventTime": "2023-10-30T14:05:45.401630+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Hostname": ["ppp-219-95.98-62.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 62.98.95.219 from 10.0.2.19. blacklisted IP AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: ppp-219-95.98-62.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C1cI3QjHpPq0XXydh"]} -{"Format": "IDEA0", "ID": "b6bd04d7-88d8-4e22-a481-421af50971db", "DetectTime": "2023-10-30T14:05:45.465158+02:00", "EventTime": "2023-10-30T14:05:45.465171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["Ckd2k3Hj9zaG1f8Ck"]} -{"Format": "IDEA0", "ID": "9832c02e-20c1-40cc-b8e4-dfda262898f1", "DetectTime": "2023-10-30T14:05:45.492664+02:00", "EventTime": "2023-10-30T14:05:45.492686+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C9E6qH3bxfhwBXP8w8"]} -{"Format": "IDEA0", "ID": "1c40dacc-7894-4abe-9eda-c09e820d1307", "DetectTime": "2023-10-30T14:05:45.503053+02:00", "EventTime": "2023-10-30T14:05:45.503079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["C2Kvnt2rf5lx07STk4"]} -{"Format": "IDEA0", "ID": "995c25c0-89d5-4017-96a1-2a3595f8e2c9", "DetectTime": "2023-10-30T14:05:45.554994+02:00", "EventTime": "2023-10-30T14:05:45.555014+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cf8oTF4sAliTmzeqX2"]} -{"Format": "IDEA0", "ID": "0bbf077c-7d00-43d1-9f3d-5dea94bd1460", "DetectTime": "2023-10-30T14:05:45.564982+02:00", "EventTime": "2023-10-30T14:05:45.564994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3084], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 3084/TCP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CKjopw4eMnSuycGSS3"]} -{"Format": "Json", "ID": "0bbf077c-7d00-43d1-9f3d-5dea94bd1460", "DetectTime": "2023-10-30T14:05:45.564982+02:00", "EventTime": "2023-10-30T14:05:45.564994+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3084], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-04T13:44:16.952200+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:45.646210)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3c3ab00e-8d5a-4f0d-adfa-2a2a7e3d6cfe", "DetectTime": "2023-10-30T14:05:45.651396+02:00", "EventTime": "2023-10-30T14:05:45.651411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CdgzRd35FLpxjjl4Bk"]} -{"Format": "IDEA0", "ID": "4690e1a6-5334-4664-ada7-e9c4039f325e", "DetectTime": "2023-10-30T14:05:45.701590+02:00", "EventTime": "2023-10-30T14:05:45.701604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cckf4m47mmSh7ONNh1"]} -{"Format": "IDEA0", "ID": "4463cbf0-2623-4635-b370-e32021238d39", "DetectTime": "2023-10-30T14:05:45.753361+02:00", "EventTime": "2023-10-30T14:05:45.753388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CMpsgX2Re3jTpxpNX2"]} -{"Format": "IDEA0", "ID": "d5c584bb-1ed8-4393-8169-3b8b43acb3c1", "DetectTime": "2023-10-30T14:05:45.804331+02:00", "EventTime": "2023-10-30T14:05:45.804358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CwDjdV0zkTuhprvRj"]} -{"Format": "IDEA0", "ID": "59195574-26b2-47d5-a960-a16784d44bc1", "DetectTime": "2023-10-30T14:05:45.853433+02:00", "EventTime": "2023-10-30T14:05:45.853461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CHskRH20r0dcRBUuvj"]} -{"Format": "IDEA0", "ID": "61c95f2d-3594-4656-a668-b7fa127fc13c", "DetectTime": "2023-10-30T14:05:45.897653+02:00", "EventTime": "2023-10-30T14:05:45.897674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CG3wB9UTX8lAi2e07"]} -{"Format": "IDEA0", "ID": "33e6759f-3e30-4271-a05a-12dd349c627d", "DetectTime": "2023-10-30T14:05:45.946129+02:00", "EventTime": "2023-10-30T14:05:45.946146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CyHJuuzshzEbAmlId"]} -{"Format": "IDEA0", "ID": "17f65731-61cf-41c0-81a6-48e00df32c04", "DetectTime": "2023-10-30T14:05:45.990417+02:00", "EventTime": "2023-10-30T14:05:45.990434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CE2JsHgJVLVHUb388"]} -{"Format": "Json", "ID": "17f65731-61cf-41c0-81a6-48e00df32c04", "DetectTime": "2023-10-30T14:05:45.990417+02:00", "EventTime": "2023-10-30T14:05:45.990434+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:45:28.739455+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:46.070068)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0da43b6f-004e-4ea3-8afd-fb62526906f3", "DetectTime": "2023-10-30T14:05:46.074943+02:00", "EventTime": "2023-10-30T14:05:46.074965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["CiDqqC3j2omEuTYQYk"]} -{"Format": "IDEA0", "ID": "023722d8-f67c-449b-8afb-e952f7dd5215", "DetectTime": "2023-10-30T14:05:46.116900+02:00", "EventTime": "2023-10-30T14:05:46.116916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. ", "ContentType": "text/plain"}], "uids": ["CWoG28SyGaG676tWa"]} -{"Format": "IDEA0", "ID": "1c3ad9f4-b367-442f-ae0d-a9d0b20831f0", "DetectTime": "2023-10-30T14:05:46.155691+02:00", "EventTime": "2023-10-30T14:05:46.155711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CaRoXV2l4aurd9DMz"]} -{"Format": "IDEA0", "ID": "31628d4a-78e8-4018-ac6d-e776a5ad45ae", "DetectTime": "2023-10-30T14:05:46.193494+02:00", "EventTime": "2023-10-30T14:05:46.193521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cx0Kp96JMi6IdR77d"]} -{"Format": "IDEA0", "ID": "a71ad7be-77b0-4de1-b01a-a96b9bdf5841", "DetectTime": "2023-10-30T14:05:46.218313+02:00", "EventTime": "2023-10-30T14:05:46.218326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CYJBbBuXTrXOlBSzg"]} -{"Format": "IDEA0", "ID": "05171fa1-8f12-46cb-acd6-1f1751fe8059", "DetectTime": "2023-10-30T14:05:46.257456+02:00", "EventTime": "2023-10-30T14:05:46.257476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7236], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. ", "ContentType": "text/plain"}], "uids": ["CDFWIi3nwdXuOXb9Yg"]} -{"Format": "IDEA0", "ID": "4f3f251e-c9ae-408c-8aee-de9d786be658", "DetectTime": "2023-10-30T14:05:46.294354+02:00", "EventTime": "2023-10-30T14:05:46.294373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. ", "ContentType": "text/plain"}], "uids": ["CFF5VH2esiVNVkRqN1"]} -{"Format": "IDEA0", "ID": "09a6bd48-2158-4584-9d2b-085100d5d819", "DetectTime": "2023-10-30T14:05:46.334161+02:00", "EventTime": "2023-10-30T14:05:46.334177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cq3PHt3jghOkB1Inak"]} -{"Format": "IDEA0", "ID": "df651ca3-ebdc-41f2-8ad3-9d4446dc1cd9", "DetectTime": "2023-10-30T14:05:46.375811+02:00", "EventTime": "2023-10-30T14:05:46.375829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["C8Yt432BwDgBjucnrd"]} -{"Format": "Json", "ID": "df651ca3-ebdc-41f2-8ad3-9d4446dc1cd9", "DetectTime": "2023-10-30T14:05:46.375811+02:00", "EventTime": "2023-10-30T14:05:46.375829+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:45:30.681565+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:46.455595)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c9bb53ea-b8a5-4bca-ac38-9f27135cafd3", "DetectTime": "2023-10-30T14:05:46.461769+02:00", "EventTime": "2023-10-30T14:05:46.461797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["Csruuv1NTcso2NZ3R9"]} -{"Format": "IDEA0", "ID": "30522792-cdd6-4e9b-b3db-a1419a24f76a", "DetectTime": "2023-10-30T14:05:46.502447+02:00", "EventTime": "2023-10-30T14:05:46.502464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CKCkkg0ZJ2OE8QLi2"]} -{"Format": "IDEA0", "ID": "697d3d59-8c99-482e-9522-94dabcc6066f", "DetectTime": "2023-10-30T14:05:46.539543+02:00", "EventTime": "2023-10-30T14:05:46.539555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CcE8Rw2tWUGhPUt5K8"]} -{"Format": "IDEA0", "ID": "6711c09d-72d7-46ed-b396-766bdfe90167", "DetectTime": "2023-10-30T14:05:46.579101+02:00", "EventTime": "2023-10-30T14:05:46.579113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["C0sdpl1Qm36Rkep5w"]} -{"Format": "IDEA0", "ID": "ae48eb9e-22ba-4e5e-95b8-dd9fb54485a1", "DetectTime": "2023-10-30T14:05:46.615509+02:00", "EventTime": "2023-10-30T14:05:46.615523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 201.209.29.166. ", "ContentType": "text/plain"}], "uids": ["Cy2V3l2B3k6OVeean8"]} -{"Format": "IDEA0", "ID": "1261fb82-9a49-4eac-bdc1-9f8e5a4677a4", "DetectTime": "2023-10-30T14:05:46.651508+02:00", "EventTime": "2023-10-30T14:05:46.651527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["C6WY7ORB8gNEVzLHl"]} -{"Format": "IDEA0", "ID": "3a3613e8-7c41-45b2-bf24-ed50be403b67", "DetectTime": "2023-10-30T14:05:46.688888+02:00", "EventTime": "2023-10-30T14:05:46.688902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3969], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. ", "ContentType": "text/plain"}], "uids": ["CmDCR82T8GzOwhJhL1"]} -{"Format": "IDEA0", "ID": "bc3ef52a-3540-4358-8f46-cd9a1fa4d249", "DetectTime": "2023-10-30T14:05:46.727048+02:00", "EventTime": "2023-10-30T14:05:46.727067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CFUgrwNXIu1qknd2f"]} -{"Format": "Json", "ID": "bc3ef52a-3540-4358-8f46-cd9a1fa4d249", "DetectTime": "2023-10-30T14:05:46.727048+02:00", "EventTime": "2023-10-30T14:05:46.727067+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:46:08.264190+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:46.797921)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "60b35f38-a97c-4b05-9abf-4f70f83fb7a7", "DetectTime": "2023-10-30T14:05:46.803070+02:00", "EventTime": "2023-10-30T14:05:46.803083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CKwN6D1xPwjKJxRQyj"]} -{"Format": "IDEA0", "ID": "9320f1fe-d4ca-4c27-8bf6-eb4c900b01d2", "DetectTime": "2023-10-30T14:05:46.839599+02:00", "EventTime": "2023-10-30T14:05:46.839615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CCxZqV3bm30lS0BREi"]} -{"Format": "IDEA0", "ID": "ffb0d673-86f2-417f-bb7d-d4ca7f256f10", "DetectTime": "2023-10-30T14:05:46.872747+02:00", "EventTime": "2023-10-30T14:05:46.872768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CaAmLK2dUGI4pZ0ySc"]} -{"Format": "IDEA0", "ID": "3cdd662c-4ec2-4903-bf2c-2ab447fe2fec", "DetectTime": "2023-10-30T14:05:46.911418+02:00", "EventTime": "2023-10-30T14:05:46.911432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. ", "ContentType": "text/plain"}], "uids": ["CQlJBZ1aohLp8D2mz6"]} -{"Format": "IDEA0", "ID": "8c003e24-9b36-4b74-aefc-a5fe11363dda", "DetectTime": "2023-10-30T14:05:46.946238+02:00", "EventTime": "2023-10-30T14:05:46.946257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7884], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. ", "ContentType": "text/plain"}], "uids": ["CzUUt93ZZyiMupGUP7"]} -{"Format": "IDEA0", "ID": "6535f385-3a85-4a88-9876-7112785a3e4d", "DetectTime": "2023-10-30T14:05:46.980422+02:00", "EventTime": "2023-10-30T14:05:46.980437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["Cw1paT3f2VXQO5v1Sj"]} -{"Format": "IDEA0", "ID": "d73debaa-362b-4f02-b969-760322fa3f2d", "DetectTime": "2023-10-30T14:05:47.013007+02:00", "EventTime": "2023-10-30T14:05:47.013020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVRgr91YaTyi20mfV3"]} -{"Format": "IDEA0", "ID": "167e62d8-c567-45d3-980f-36934f5650d2", "DetectTime": "2023-10-30T14:05:47.035053+02:00", "EventTime": "2023-10-30T14:05:47.035067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Cteb32KuEDAuFv2Fc"]} -{"Format": "IDEA0", "ID": "6a25c3e7-eba3-4aa9-b8ef-ebbfd4eef977", "DetectTime": "2023-10-30T14:05:47.068512+02:00", "EventTime": "2023-10-30T14:05:47.068525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["COwWvg2uHosGAEph5"]} -{"Format": "Json", "ID": "6a25c3e7-eba3-4aa9-b8ef-ebbfd4eef977", "DetectTime": "2023-10-30T14:05:47.068512+02:00", "EventTime": "2023-10-30T14:05:47.068525+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T13:46:27.134134+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2023/10/30 14:05:47.135291)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dcce56b9-b07e-484c-9953-bac7f129a0c3", "DetectTime": "2023-10-30T14:05:47.139374+02:00", "EventTime": "2023-10-30T14:05:47.139387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20193], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. ", "ContentType": "text/plain"}], "uids": ["C7KZJALMKlg4BwMj8"]} -{"Format": "IDEA0", "ID": "a3abf053-6ddb-4398-b9c4-c51d98c36326", "DetectTime": "2023-10-30T14:05:47.176600+02:00", "EventTime": "2023-10-30T14:05:47.176617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CHU8VX2gb7g2XaDZii"]} -{"Format": "IDEA0", "ID": "bdbd677e-0eb0-49a2-9386-8ebb8f0ab365", "DetectTime": "2023-10-30T14:05:47.211974+02:00", "EventTime": "2023-10-30T14:05:47.211987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CCYiMR2b26kARAq4k1"]} -{"Format": "IDEA0", "ID": "43fd433b-61dd-492d-bc44-b3bdca192f02", "DetectTime": "2023-10-30T14:05:47.236228+02:00", "EventTime": "2023-10-30T14:05:47.236241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11174], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. ", "ContentType": "text/plain"}], "uids": ["CpcG0o4ol64HIWaGag"]} -{"Format": "IDEA0", "ID": "dbe259a2-550a-4b9d-819e-162dbda24ee8", "DetectTime": "2023-10-30T14:05:47.269781+02:00", "EventTime": "2023-10-30T14:05:47.269803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. ", "ContentType": "text/plain"}], "uids": ["CcL89eAbarQj4zve9"]} -{"Format": "IDEA0", "ID": "4289f266-7e36-445c-bd9c-f63f1c5d8c3f", "DetectTime": "2023-10-30T14:05:47.304511+02:00", "EventTime": "2023-10-30T14:05:47.304522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["CElqMF2c4tKRSy2Fe1"]} -{"Format": "IDEA0", "ID": "82719965-d8bb-47f5-b370-06cb0628a1f4", "DetectTime": "2023-10-30T14:05:47.338594+02:00", "EventTime": "2023-10-30T14:05:47.338605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CeV03Z1XpSr1Yzw7Pa"]} -{"Format": "IDEA0", "ID": "575beaeb-f07e-4d7e-8088-481b96098f2d", "DetectTime": "2023-10-30T14:05:47.386212+02:00", "EventTime": "2023-10-30T14:05:47.386224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CtYBBW32aOpcLpRGDe"]} -{"Format": "IDEA0", "ID": "e76e23fa-ec51-4d23-990d-47dc7e156f73", "DetectTime": "2023-10-30T14:05:47.432737+02:00", "EventTime": "2023-10-30T14:05:47.432754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CscBsU3d99eSJLa7gl"]} -{"Format": "IDEA0", "ID": "86843e9b-c0ac-49af-bb4a-781fcc85b641", "DetectTime": "2023-10-30T14:05:47.487089+02:00", "EventTime": "2023-10-30T14:05:47.487103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CBIqrc4fpErwGj4On8"]} -{"Format": "IDEA0", "ID": "cc51da6f-0333-446a-bf65-03d8b97087f5", "DetectTime": "2023-10-30T14:05:47.540567+02:00", "EventTime": "2023-10-30T14:05:47.540583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["Cioxcy3YKfkrwe4FGc"]} -{"Format": "IDEA0", "ID": "bdbc8096-f7fc-4aad-9cb5-3c71b76650ab", "DetectTime": "2023-10-30T14:05:47.595261+02:00", "EventTime": "2023-10-30T14:05:47.595279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CWdJ1btGNVY23Rvki"]} -{"Format": "Json", "ID": "bdbc8096-f7fc-4aad-9cb5-3c71b76650ab", "DetectTime": "2023-10-30T14:05:47.595261+02:00", "EventTime": "2023-10-30T14:05:47.595279+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:17:41.756969+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:47.716076)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bcc0cb8a-41b8-46af-8e73-44e4e5a7881e", "DetectTime": "2023-10-30T14:05:47.722330+02:00", "EventTime": "2023-10-30T14:05:47.722354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["C4WuDa4UVWKVgRAmqf"]} -{"Format": "IDEA0", "ID": "9e235121-5011-46c3-a25a-6572abfd781c", "DetectTime": "2023-10-30T14:05:47.771508+02:00", "EventTime": "2023-10-30T14:05:47.771520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CRBxna1NbAA7t7SSf1"]} -{"Format": "IDEA0", "ID": "e8fc205d-da46-4f2d-9db2-eda58b578172", "DetectTime": "2023-10-30T14:05:47.820098+02:00", "EventTime": "2023-10-30T14:05:47.820120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C4Lqnt2JvbfspmDi14"]} -{"Format": "IDEA0", "ID": "7a069e8f-34aa-4e74-a4d6-cc78394fcf66", "DetectTime": "2023-10-30T14:05:47.866388+02:00", "EventTime": "2023-10-30T14:05:47.866405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["C0cGGv4xKZ7HLpqEif"]} -{"Format": "IDEA0", "ID": "306e90a6-86cf-464e-a46f-ac1219664388", "DetectTime": "2023-10-30T14:05:47.905709+02:00", "EventTime": "2023-10-30T14:05:47.905728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["Cb1a9O2DoKIt29Jxo5"]} -{"Format": "IDEA0", "ID": "6dfaf023-63b7-4766-b77d-316248b03bf8", "DetectTime": "2023-10-30T14:05:47.950661+02:00", "EventTime": "2023-10-30T14:05:47.950683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. ", "ContentType": "text/plain"}], "uids": ["CIaAw3NNfxCfkNrAl"]} -{"Format": "IDEA0", "ID": "2ba0208b-fa43-4e19-b39e-f327dc0539a6", "DetectTime": "2023-10-30T14:05:47.996115+02:00", "EventTime": "2023-10-30T14:05:47.996132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CLAOop1c5WTJkcjCz1"]} -{"Format": "IDEA0", "ID": "f4cb17f6-3694-45fd-9a76-0a2cf1f13291", "DetectTime": "2023-10-30T14:05:48.041986+02:00", "EventTime": "2023-10-30T14:05:48.042002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["CN03rC1Aga6LnaeD1l"]} -{"Format": "Json", "ID": "f4cb17f6-3694-45fd-9a76-0a2cf1f13291", "DetectTime": "2023-10-30T14:05:48.041986+02:00", "EventTime": "2023-10-30T14:05:48.042002+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:17:44.520461+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:48.123456)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "05a568e5-baae-4525-9097-c85947987f2a", "DetectTime": "2023-10-30T14:05:48.128944+02:00", "EventTime": "2023-10-30T14:05:48.128963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C3iaZs2kyzR55AMRw9"]} -{"Format": "IDEA0", "ID": "e5518bd0-4413-4e1d-be20-b6ff0f594d8a", "DetectTime": "2023-10-30T14:05:48.283585+02:00", "EventTime": "2023-10-30T14:05:48.283611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. ", "ContentType": "text/plain"}], "uids": ["CnObwT34Y0BLb2mjQ"]} -{"Format": "IDEA0", "ID": "326c0863-24c6-478b-9e6e-671fb6a1aced", "DetectTime": "2023-10-30T14:05:48.331312+02:00", "EventTime": "2023-10-30T14:05:48.331339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["ChUkFC1XYO287Yt925"]} -{"Format": "IDEA0", "ID": "d075e550-a678-4f98-864a-d0a925e4cc6b", "DetectTime": "2023-10-30T14:05:48.381748+02:00", "EventTime": "2023-10-30T14:05:48.381765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7236], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. ", "ContentType": "text/plain"}], "uids": ["CmbuHdcI8FZz7e5zd"]} -{"Format": "IDEA0", "ID": "d36fc859-043f-45c6-a264-2dad97f04202", "DetectTime": "2023-10-30T14:05:48.429412+02:00", "EventTime": "2023-10-30T14:05:48.429429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CZzaCB3YzISegl0wW1"]} -{"Format": "IDEA0", "ID": "19b4db53-b999-449c-b301-fc13a2482fef", "DetectTime": "2023-10-30T14:05:48.480599+02:00", "EventTime": "2023-10-30T14:05:48.480613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["C6symp2tGW2MKIXUuk"]} -{"Format": "IDEA0", "ID": "716134e6-1d39-4c34-b53d-86d69064059f", "DetectTime": "2023-10-30T14:05:48.528765+02:00", "EventTime": "2023-10-30T14:05:48.528779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CRQHmPWKY8WgRGBl"]} -{"Format": "IDEA0", "ID": "16835f8c-d8d3-423d-abb1-19c49a9277a5", "DetectTime": "2023-10-30T14:05:48.572084+02:00", "EventTime": "2023-10-30T14:05:48.572102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["ClUhLp1tpAlUCFJE2d"]} -{"Format": "IDEA0", "ID": "335dd8a9-b8e5-4c40-a941-2225002161cb", "DetectTime": "2023-10-30T14:05:48.602002+02:00", "EventTime": "2023-10-30T14:05:48.602023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CzS4mB4rPYNgOTKoPj"]} -{"Format": "Json", "ID": "335dd8a9-b8e5-4c40-a941-2225002161cb", "DetectTime": "2023-10-30T14:05:48.602002+02:00", "EventTime": "2023-10-30T14:05:48.602023+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:17:46.921162+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:48.687981)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "37374bc0-71bf-4b95-974b-fc4b6f650a02", "DetectTime": "2023-10-30T14:05:48.693068+02:00", "EventTime": "2023-10-30T14:05:48.693093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CNWTOHkLEBUYHpzt3"]} -{"Format": "IDEA0", "ID": "26548568-04a5-47c4-920a-dcc2e417b129", "DetectTime": "2023-10-30T14:05:48.751407+02:00", "EventTime": "2023-10-30T14:05:48.751425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["COmG8j2NCmA2w3qa1e"]} -{"Format": "IDEA0", "ID": "bdd58787-652d-4a64-a55e-97a3d91a04a1", "DetectTime": "2023-10-30T14:05:48.797603+02:00", "EventTime": "2023-10-30T14:05:48.797618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CuPnGl2jC0VG11ERjf"]} -{"Format": "IDEA0", "ID": "b8f09852-54d7-452b-9d76-197f4d1f1e31", "DetectTime": "2023-10-30T14:05:48.844637+02:00", "EventTime": "2023-10-30T14:05:48.844655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CrineV1wCs6dVvEd5f"]} -{"Format": "IDEA0", "ID": "7676f9a7-b5da-45a3-a3ea-11504d4cfc5b", "DetectTime": "2023-10-30T14:05:48.896298+02:00", "EventTime": "2023-10-30T14:05:48.896321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3969], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. ", "ContentType": "text/plain"}], "uids": ["Cv5bR137f8SyJuHIb1"]} -{"Format": "IDEA0", "ID": "b8e9952a-d5d9-4d13-887f-dc639f256ca9", "DetectTime": "2023-10-30T14:05:48.954771+02:00", "EventTime": "2023-10-30T14:05:48.954817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CvXqGF43bzK2cZCkW5"]} -{"Format": "IDEA0", "ID": "523634b7-0e95-47a2-a243-58df5002ea0e", "DetectTime": "2023-10-30T14:05:49.019860+02:00", "EventTime": "2023-10-30T14:05:49.019889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. ", "ContentType": "text/plain"}], "uids": ["CRtD9MpmkeDxQQ8tg"]} -{"Format": "IDEA0", "ID": "18c0b5f7-3b61-4568-a8b5-81335282defe", "DetectTime": "2023-10-30T14:05:49.082472+02:00", "EventTime": "2023-10-30T14:05:49.082494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7884], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. ", "ContentType": "text/plain"}], "uids": ["CfVYro2z0Cq53mdXb5"]} -{"Format": "Json", "ID": "18c0b5f7-3b61-4568-a8b5-81335282defe", "DetectTime": "2023-10-30T14:05:49.082472+02:00", "EventTime": "2023-10-30T14:05:49.082494+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7884], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:18:08.464387+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:49.214714)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d72df65c-dfad-4685-8f01-46ecccb2fa2d", "DetectTime": "2023-10-30T14:05:49.221597+02:00", "EventTime": "2023-10-30T14:05:49.221613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["CBa3jG2BmHlN4imkjb"]} -{"Format": "IDEA0", "ID": "aeb93658-e181-4739-88a9-28f6482c7957", "DetectTime": "2023-10-30T14:05:49.270535+02:00", "EventTime": "2023-10-30T14:05:49.270556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CrEVrkqTrOCXkfz07"]} -{"Format": "IDEA0", "ID": "32ec1bd4-7e74-4cd1-8620-ea4146ecf0ac", "DetectTime": "2023-10-30T14:05:49.320147+02:00", "EventTime": "2023-10-30T14:05:49.320163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CyWVlF1IGTkdDO6BC3"]} -{"Format": "IDEA0", "ID": "0a17be3b-b721-4b09-ac4d-0b6f090c2439", "DetectTime": "2023-10-30T14:05:49.370403+02:00", "EventTime": "2023-10-30T14:05:49.370420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11174], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. ", "ContentType": "text/plain"}], "uids": ["CHz3Zi1rZQSXG2xna8"]} -{"Format": "IDEA0", "ID": "b4291f35-63e4-481c-b7b5-c88bc36ad246", "DetectTime": "2023-10-30T14:05:49.411650+02:00", "EventTime": "2023-10-30T14:05:49.411676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [20193], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. ", "ContentType": "text/plain"}], "uids": ["CWE2F718yRDYOSNn47"]} -{"Format": "IDEA0", "ID": "3e148476-583d-4742-b67a-c62d02685251", "DetectTime": "2023-10-30T14:05:49.454511+02:00", "EventTime": "2023-10-30T14:05:49.454539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CkEcVC4E4tI18NRBha"]} -{"Format": "IDEA0", "ID": "c46c7c55-b569-4533-b4c5-eb6dd6959fcb", "DetectTime": "2023-10-30T14:05:49.497409+02:00", "EventTime": "2023-10-30T14:05:49.497426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28606], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. ", "ContentType": "text/plain"}], "uids": ["C1A2AI28B9mVCWJj1d"]} -{"Format": "IDEA0", "ID": "9ac58956-91c9-492e-bc54-aceaf83c3b33", "DetectTime": "2023-10-30T14:05:49.538442+02:00", "EventTime": "2023-10-30T14:05:49.538464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["Ch25051TTicB8QzPtc"]} -{"Format": "Json", "ID": "9ac58956-91c9-492e-bc54-aceaf83c3b33", "DetectTime": "2023-10-30T14:05:49.538442+02:00", "EventTime": "2023-10-30T14:05:49.538464+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:18:11.279073+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:49.620582)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bff9477d-51e1-43a3-a86b-67b7e54ba504", "DetectTime": "2023-10-30T14:05:49.626634+02:00", "EventTime": "2023-10-30T14:05:49.626655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CKiwF94QuBvIRv0Ay"]} -{"Format": "IDEA0", "ID": "24c60959-5271-4709-8a65-fbd84c0cb692", "DetectTime": "2023-10-30T14:05:49.672154+02:00", "EventTime": "2023-10-30T14:05:49.672176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CyHlv634SgCaIZfYx5"]} -{"Format": "IDEA0", "ID": "bc8a967b-bcc0-4b40-b2d9-03e41b904cd0", "DetectTime": "2023-10-30T14:05:49.709809+02:00", "EventTime": "2023-10-30T14:05:49.709825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CFzjWn2kuQujPrW4ng"]} -{"Format": "IDEA0", "ID": "60570bfa-3b76-46d7-9c8b-aacb23435d46", "DetectTime": "2023-10-30T14:05:49.751060+02:00", "EventTime": "2023-10-30T14:05:49.751077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CjcOYr0HK8NrHUJdi"]} -{"Format": "IDEA0", "ID": "77321515-c62f-41a4-a777-9ca262ec6b52", "DetectTime": "2023-10-30T14:05:49.790075+02:00", "EventTime": "2023-10-30T14:05:49.790092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CLciF716GMHbgbs3b4"]} -{"Format": "IDEA0", "ID": "300d2e20-73cb-424a-aa02-d5f046694f62", "DetectTime": "2023-10-30T14:05:49.829132+02:00", "EventTime": "2023-10-30T14:05:49.829148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CTQSHRM2k5s9vo0N9"]} -{"Format": "IDEA0", "ID": "0e3fea0f-0719-47ee-80ee-92aef20b2973", "DetectTime": "2023-10-30T14:05:49.869927+02:00", "EventTime": "2023-10-30T14:05:49.869952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CpaKGl7TynEQ603va"]} -{"Format": "IDEA0", "ID": "f370d2fd-6b25-43d4-8fe1-b2d27123244b", "DetectTime": "2023-10-30T14:05:49.907485+02:00", "EventTime": "2023-10-30T14:05:49.907503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CiF18e9dvzyOZmUp2"]} -{"Format": "Json", "ID": "f370d2fd-6b25-43d4-8fe1-b2d27123244b", "DetectTime": "2023-10-30T14:05:49.907485+02:00", "EventTime": "2023-10-30T14:05:49.907503+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:48:35.080009+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:49.978024)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "edd2524d-d615-41f2-86f0-95a08f43b069", "DetectTime": "2023-10-30T14:05:49.983364+02:00", "EventTime": "2023-10-30T14:05:49.983380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["Co1ezaQB5q0vrvK84"]} -{"Format": "IDEA0", "ID": "c4bb2c0e-d286-4fd3-8e38-e4080fcd6472", "DetectTime": "2023-10-30T14:05:50.019412+02:00", "EventTime": "2023-10-30T14:05:50.019429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["CAoYoX1bAgg80MCmBk"]} -{"Format": "IDEA0", "ID": "12f33085-2451-4ef4-9f8d-c89ceca4e33c", "DetectTime": "2023-10-30T14:05:50.055059+02:00", "EventTime": "2023-10-30T14:05:50.055073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CUOBB91XJfZip8zja5"]} -{"Format": "IDEA0", "ID": "c5722a3b-aee5-4020-8770-0d779e586225", "DetectTime": "2023-10-30T14:05:50.087214+02:00", "EventTime": "2023-10-30T14:05:50.087232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["CcOPw02EdqMHpwGoA7"]} -{"Format": "IDEA0", "ID": "9faf4254-c484-4f76-b8e7-c0e1f4a6ef83", "DetectTime": "2023-10-30T14:05:50.119981+02:00", "EventTime": "2023-10-30T14:05:50.119994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CKm1So3zUycPo5HOZ3"]} -{"Format": "IDEA0", "ID": "a4dc8fe2-d631-44e0-a24c-f755a9e037a6", "DetectTime": "2023-10-30T14:05:50.153485+02:00", "EventTime": "2023-10-30T14:05:50.153501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. ", "ContentType": "text/plain"}], "uids": ["Cntdae2iggej6B1oa6"]} -{"Format": "IDEA0", "ID": "5e163d71-67ab-4b81-b065-8b45ec7b6416", "DetectTime": "2023-10-30T14:05:50.291668+02:00", "EventTime": "2023-10-30T14:05:50.291704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CqxpgJ2OtNUVXnGR1l"]} -{"Format": "IDEA0", "ID": "15119e46-1f15-4694-8f87-b7bdd6f3bb21", "DetectTime": "2023-10-30T14:05:50.339929+02:00", "EventTime": "2023-10-30T14:05:50.339955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28066], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. ", "ContentType": "text/plain"}], "uids": ["CAzHZm3UjP5zKr2El4"]} -{"Format": "Json", "ID": "15119e46-1f15-4694-8f87-b7bdd6f3bb21", "DetectTime": "2023-10-30T14:05:50.339929+02:00", "EventTime": "2023-10-30T14:05:50.339955+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28066], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:48:36.834977+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:50.427839)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d5885370-8300-40f4-af53-2f767363c6e7", "DetectTime": "2023-10-30T14:05:50.441212+02:00", "EventTime": "2023-10-30T14:05:50.441237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C1oJzk3xY0sz0ZWjdf"]} -{"Format": "IDEA0", "ID": "04971f74-f26d-4095-bb07-d0a4b242f007", "DetectTime": "2023-10-30T14:05:50.497838+02:00", "EventTime": "2023-10-30T14:05:50.497855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbjAAHIDD21FdOZoi"]} -{"Format": "IDEA0", "ID": "e0d8db87-a4f2-4e7a-bb04-765b13be0f0b", "DetectTime": "2023-10-30T14:05:50.525970+02:00", "EventTime": "2023-10-30T14:05:50.525987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["C6DwZU1G68Gvb4WhYf"]} -{"Format": "IDEA0", "ID": "d13c348b-4264-49f5-92ad-b7b784cd2165", "DetectTime": "2023-10-30T14:05:50.564888+02:00", "EventTime": "2023-10-30T14:05:50.564914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CXFplF4SIoGikI9vI7"]} -{"Format": "IDEA0", "ID": "43749ab7-7768-43e6-90cb-94b52cc1ec13", "DetectTime": "2023-10-30T14:05:50.599047+02:00", "EventTime": "2023-10-30T14:05:50.599070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["Cs5iLB5Ig1GlT6lt4"]} -{"Format": "IDEA0", "ID": "68c9371e-45b0-464c-bdb1-4c0bf63f021d", "DetectTime": "2023-10-30T14:05:50.634786+02:00", "EventTime": "2023-10-30T14:05:50.634806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CNoLLs3bOv5rIaeYUi"]} -{"Format": "IDEA0", "ID": "cc95ef0d-92ba-45d9-9cd6-b0da370204fd", "DetectTime": "2023-10-30T14:05:50.673312+02:00", "EventTime": "2023-10-30T14:05:50.673329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CzWLGe3UFmgqPGyOSb"]} -{"Format": "IDEA0", "ID": "cb3234ff-650c-40ef-ac50-b9424f40e07c", "DetectTime": "2023-10-30T14:05:50.713437+02:00", "EventTime": "2023-10-30T14:05:50.713451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CjKp9R2q6e4yDLN0ja"]} -{"Format": "IDEA0", "ID": "adb26333-2aa0-4b44-88cc-4d3ecf52bd35", "DetectTime": "2023-10-30T14:05:50.748144+02:00", "EventTime": "2023-10-30T14:05:50.748173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["ChYBEq37bzLOu8Y1af"]} -{"Format": "IDEA0", "ID": "73715622-7d47-46b5-a469-143681e2aa7e", "DetectTime": "2023-10-30T14:05:50.778611+02:00", "EventTime": "2023-10-30T14:05:50.778625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CTqC9X3amDKZjgP4I"]} -{"Format": "Json", "ID": "73715622-7d47-46b5-a469-143681e2aa7e", "DetectTime": "2023-10-30T14:05:50.778611+02:00", "EventTime": "2023-10-30T14:05:50.778625+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:48:56.085950+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:50.847887)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e74986a7-822f-4593-9d7b-fb1c9f582f14", "DetectTime": "2023-10-30T14:05:50.852352+02:00", "EventTime": "2023-10-30T14:05:50.852366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3969], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. ", "ContentType": "text/plain"}], "uids": ["CbIusHPr3aiDYMnUa"]} -{"Format": "IDEA0", "ID": "425e47a0-4e4d-42f9-b856-cac75a4130d8", "DetectTime": "2023-10-30T14:05:50.885407+02:00", "EventTime": "2023-10-30T14:05:50.885421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CKwyEc4hfUwnOf5uP5"]} -{"Format": "IDEA0", "ID": "cff4a4ee-2cbb-45a2-be71-d1f6cf5d864f", "DetectTime": "2023-10-30T14:05:50.913917+02:00", "EventTime": "2023-10-30T14:05:50.913936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C9E6qH3bxfhwBXP8w8", "CRTYWn1z1WMmz4J0og", "C0y5MY1rIPXcuPuaj3", "CyvyY725Cm0L43LiM5"]} -{"Format": "IDEA0", "ID": "ac79b750-4c3c-4456-9dc6-0f0d45354f27", "DetectTime": "2023-10-30T14:05:50.923604+02:00", "EventTime": "2023-10-30T14:05:50.923622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CcrJyMWfYfGKCufu"]} -{"Format": "IDEA0", "ID": "cd3b3b56-6919-4fd6-b7fc-eb1f8ef58a75", "DetectTime": "2023-10-30T14:05:50.954104+02:00", "EventTime": "2023-10-30T14:05:50.954124+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyvyY725Cm0L43LiM5"]} -{"Format": "IDEA0", "ID": "2b4a719c-2e62-4186-b64c-e5f2e01a6935", "DetectTime": "2023-10-30T14:05:50.963226+02:00", "EventTime": "2023-10-30T14:05:50.963249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. ", "ContentType": "text/plain"}], "uids": ["CAQKBu23meIc95Lwxe"]} -{"Format": "IDEA0", "ID": "6db218c6-6532-4f15-bfb8-83c3dcc43bcf", "DetectTime": "2023-10-30T14:05:50.996126+02:00", "EventTime": "2023-10-30T14:05:50.996145+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CyR0tegb4vFMS0GFi"]} -{"Format": "IDEA0", "ID": "be2bc8d4-48a0-456f-89ec-6414532309d5", "DetectTime": "2023-10-30T14:05:51.004823+02:00", "EventTime": "2023-10-30T14:05:51.004850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CbO8fZ3GBctc223OOf"]} -{"Format": "IDEA0", "ID": "0c8ac2a8-9f4f-488e-9a4f-571b2c150d0d", "DetectTime": "2023-10-30T14:05:51.034313+02:00", "EventTime": "2023-10-30T14:05:51.034330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CHxTyD1KIryyN3Stt4"]} -{"Format": "IDEA0", "ID": "54262a32-b56b-4cb6-ae5e-49d77af8a98d", "DetectTime": "2023-10-30T14:05:51.065878+02:00", "EventTime": "2023-10-30T14:05:51.065892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["ClLz6C3ShTo2Be8Xoj"]} -{"Format": "IDEA0", "ID": "7e1a6e8a-b191-446e-8d81-0652a308b370", "DetectTime": "2023-10-30T14:05:51.097283+02:00", "EventTime": "2023-10-30T14:05:51.097300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CI215W2YokVe9qYuZj"]} -{"Format": "Json", "ID": "7e1a6e8a-b191-446e-8d81-0652a308b370", "DetectTime": "2023-10-30T14:05:51.097283+02:00", "EventTime": "2023-10-30T14:05:51.097300+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T14:50:08.234417+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2023/10/30 14:05:51.165532)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93da85c9-5ace-4857-8c9c-36935aa45fe1", "DetectTime": "2023-10-30T14:05:51.170610+02:00", "EventTime": "2023-10-30T14:05:51.170623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CK4MPmeczO4NmAZr8"]} -{"Format": "IDEA0", "ID": "40ed1da0-82f8-4066-b9ef-7d5d39b5ddcc", "DetectTime": "2023-10-30T14:05:51.218717+02:00", "EventTime": "2023-10-30T14:05:51.218734+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CNZLTY2FoyPaMfls36"]} -{"Format": "IDEA0", "ID": "fb19f72b-9c65-43bb-a1fa-36b91a47a69e", "DetectTime": "2023-10-30T14:05:51.227963+02:00", "EventTime": "2023-10-30T14:05:51.227984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["CQ4Xy118dsgv05aCu6"]} -{"Format": "IDEA0", "ID": "3c003a3b-e379-4190-8aac-d4851ccf7e66", "DetectTime": "2023-10-30T14:05:51.272689+02:00", "EventTime": "2023-10-30T14:05:51.272705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cv0OaSUpUyoV1IfLi"]} -{"Format": "IDEA0", "ID": "109a462a-a6b6-4f87-943d-6c27581d5f57", "DetectTime": "2023-10-30T14:05:51.320727+02:00", "EventTime": "2023-10-30T14:05:51.320740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CDqZLM2EJURSrKto4h"]} -{"Format": "IDEA0", "ID": "bf253d4a-90ae-4432-8a0d-08b90e2fa6d8", "DetectTime": "2023-10-30T14:05:51.367606+02:00", "EventTime": "2023-10-30T14:05:51.367623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["Czbrak2FyZCNwZ3PSd"]} -{"Format": "IDEA0", "ID": "7da18989-c6bf-4e55-a6b4-be85ac03e449", "DetectTime": "2023-10-30T14:05:51.418145+02:00", "EventTime": "2023-10-30T14:05:51.418168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CVmzNt48A5ey1CG627"]} -{"Format": "Json", "ID": "7da18989-c6bf-4e55-a6b4-be85ac03e449", "DetectTime": "2023-10-30T14:05:51.418145+02:00", "EventTime": "2023-10-30T14:05:51.418168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:21:52.151634+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:51.548329)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "96ed8404-f1d8-4045-83b0-12718376ae3c", "DetectTime": "2023-10-30T14:05:51.554496+02:00", "EventTime": "2023-10-30T14:05:51.554518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CkWhg125Ew8phtViUb"]} -{"Format": "IDEA0", "ID": "56b542f7-dda9-4904-a348-7a2f6af9a12b", "DetectTime": "2023-10-30T14:05:51.603646+02:00", "EventTime": "2023-10-30T14:05:51.603662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CDt3uV34Dc1yAOGlhh"]} -{"Format": "IDEA0", "ID": "8baaa9f2-3c87-40f9-8a30-227e64e03361", "DetectTime": "2023-10-30T14:05:51.648387+02:00", "EventTime": "2023-10-30T14:05:51.648405+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ChTp5w16tc3h1fj2Sf"]} -{"Format": "IDEA0", "ID": "c29629e9-3ac3-4680-b0cf-948496c96686", "DetectTime": "2023-10-30T14:05:51.656831+02:00", "EventTime": "2023-10-30T14:05:51.656848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CAJR5yxYqB4v6DDfi"]} -{"Format": "IDEA0", "ID": "61fd16f1-8304-41ab-9288-2fc7785b04e3", "DetectTime": "2023-10-30T14:05:51.702480+02:00", "EventTime": "2023-10-30T14:05:51.702498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CmgFWkbteWAU4PoGl"]} -{"Format": "IDEA0", "ID": "6ebf341e-4722-4dd9-870d-f1266c6cb6f8", "DetectTime": "2023-10-30T14:05:51.748002+02:00", "EventTime": "2023-10-30T14:05:51.748028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CLBLm2MJfwyIKmZq2"]} -{"Format": "IDEA0", "ID": "37ba2894-b94a-4ca5-bedf-b5348208f4ff", "DetectTime": "2023-10-30T14:05:51.797448+02:00", "EventTime": "2023-10-30T14:05:51.797470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CVT8QA2DJyIl1Hth3l"]} -{"Format": "IDEA0", "ID": "21bcb671-be45-411d-9cf1-ed805d9ba4ab", "DetectTime": "2023-10-30T14:05:51.845568+02:00", "EventTime": "2023-10-30T14:05:51.845585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["ClOCgSTrc0imT8E18"]} -{"Format": "IDEA0", "ID": "1afbe4d0-07af-4824-96ee-2df9ebf32152", "DetectTime": "2023-10-30T14:05:51.871239+02:00", "EventTime": "2023-10-30T14:05:51.871265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CPbIj93ikA4Foz4HE6"]} -{"Format": "IDEA0", "ID": "a809ff2d-f7b2-459a-803c-3d6f2deaaa88", "DetectTime": "2023-10-30T14:05:51.914160+02:00", "EventTime": "2023-10-30T14:05:51.914179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. ", "ContentType": "text/plain"}], "uids": ["C9LhPD2GKWX2igXfB2"]} -{"Format": "Json", "ID": "a809ff2d-f7b2-459a-803c-3d6f2deaaa88", "DetectTime": "2023-10-30T14:05:51.914160+02:00", "EventTime": "2023-10-30T14:05:51.914179+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:21:54.092514+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:51.990866)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3d007278-669f-41b3-8d3a-5a0710192f1f", "DetectTime": "2023-10-30T14:05:51.995529+02:00", "EventTime": "2023-10-30T14:05:51.995540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["C3mDj13UY63LD5vcBe"]} -{"Format": "IDEA0", "ID": "b529dceb-90e7-48e9-b3de-09b7697ebe1e", "DetectTime": "2023-10-30T14:05:52.035720+02:00", "EventTime": "2023-10-30T14:05:52.035740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["C0Ziz71XxdiK7189S9"]} -{"Format": "IDEA0", "ID": "38759abd-b2df-429d-9ae4-481883b0a3b9", "DetectTime": "2023-10-30T14:05:52.070312+02:00", "EventTime": "2023-10-30T14:05:52.070329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CFfh404dP2Xubjlnke"]} -{"Format": "IDEA0", "ID": "714b2613-3540-4095-8993-63faca76f031", "DetectTime": "2023-10-30T14:05:52.107424+02:00", "EventTime": "2023-10-30T14:05:52.107448+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CMoxEe2uQeCv4PDagd"]} -{"Format": "IDEA0", "ID": "ec9de7fe-2eed-4576-a7cf-2e58921dfd4d", "DetectTime": "2023-10-30T14:05:52.115058+02:00", "EventTime": "2023-10-30T14:05:52.115076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["C6Prd84Z93xrPmhzJh"]} -{"Format": "IDEA0", "ID": "2564fa64-b1dd-402d-8305-c1cfe95884a5", "DetectTime": "2023-10-30T14:05:52.150213+02:00", "EventTime": "2023-10-30T14:05:52.150225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CwLXwu1wsPufQtFjjb"]} -{"Format": "IDEA0", "ID": "fec0a911-ad54-4f6c-a0a9-c18bbce86982", "DetectTime": "2023-10-30T14:05:52.186819+02:00", "EventTime": "2023-10-30T14:05:52.186840+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWhKFR38O2ulLPRSRk"]} -{"Format": "IDEA0", "ID": "1ce18fe5-d9c1-42c1-8f2d-1118e376052c", "DetectTime": "2023-10-30T14:05:52.195176+02:00", "EventTime": "2023-10-30T14:05:52.195199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CxdSwC1yGRTNW3oTHf"]} -{"Format": "IDEA0", "ID": "c66232fc-8524-4171-b054-6be086e73464", "DetectTime": "2023-10-30T14:05:52.234574+02:00", "EventTime": "2023-10-30T14:05:52.234596+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CcdPqA1JQybeywngTl"]} -{"Format": "IDEA0", "ID": "308c27eb-c818-4c1a-800e-928acddd32a8", "DetectTime": "2023-10-30T14:05:52.243093+02:00", "EventTime": "2023-10-30T14:05:52.243106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C72FuD2FszPM0TplQh"]} -{"Format": "IDEA0", "ID": "4c66a3f9-5385-49ca-85d6-5344787f804e", "DetectTime": "2023-10-30T14:05:52.277865+02:00", "EventTime": "2023-10-30T14:05:52.277877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["C35fHYk3GcpABgtWe"]} -{"Format": "Json", "ID": "4c66a3f9-5385-49ca-85d6-5344787f804e", "DetectTime": "2023-10-30T14:05:52.277865+02:00", "EventTime": "2023-10-30T14:05:52.277877+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:22:11.936295+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:52.352583)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "118ec5af-a1c4-4610-94b3-3a4be5414957", "DetectTime": "2023-10-30T14:05:52.358225+02:00", "EventTime": "2023-10-30T14:05:52.358242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3969], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. ", "ContentType": "text/plain"}], "uids": ["CHvskD1270llwxd5uk"]} -{"Format": "IDEA0", "ID": "2d451d38-b0b0-4c07-9665-e248e644e01c", "DetectTime": "2023-10-30T14:05:52.395707+02:00", "EventTime": "2023-10-30T14:05:52.395734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CUmzda2MNvlwhKW93i"]} -{"Format": "IDEA0", "ID": "7b2967e3-150f-4a65-8958-b63757c23623", "DetectTime": "2023-10-30T14:05:52.430112+02:00", "EventTime": "2023-10-30T14:05:52.430129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CMmtyC3oYml0MT9Q93"]} -{"Format": "IDEA0", "ID": "cf5be8f9-407d-4037-b44f-efdb5c1b43e9", "DetectTime": "2023-10-30T14:05:52.466253+02:00", "EventTime": "2023-10-30T14:05:52.466267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CJjuj94hErqCi35AAf"]} -{"Format": "IDEA0", "ID": "b100a75c-f558-4aaf-be43-4d89b3319d03", "DetectTime": "2023-10-30T14:05:52.498371+02:00", "EventTime": "2023-10-30T14:05:52.498390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CST3zXsqO91gzwe2a"]} -{"Format": "IDEA0", "ID": "ac66800d-4427-4cc2-9a98-060041d55597", "DetectTime": "2023-10-30T14:05:52.530145+02:00", "EventTime": "2023-10-30T14:05:52.530157+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CxWz3M3fQki6aF4Rg9"]} -{"Format": "IDEA0", "ID": "a96b518c-6145-4204-ad3f-ed7011c93b3e", "DetectTime": "2023-10-30T14:05:52.536133+02:00", "EventTime": "2023-10-30T14:05:52.536150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CdZCuk8SLOgnKrh27"]} -{"Format": "IDEA0", "ID": "fe6e95b4-1f19-47c5-9330-539f60fe37c2", "DetectTime": "2023-10-30T14:05:52.571464+02:00", "EventTime": "2023-10-30T14:05:52.571480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["CLHF763bpgnRqvjk37"]} -{"Format": "IDEA0", "ID": "1f0c28bd-3eef-48cd-9a4a-5fd0560e321d", "DetectTime": "2023-10-30T14:05:52.603583+02:00", "EventTime": "2023-10-30T14:05:52.603601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CFJvDvmUi0Ezzcc4g"]} -{"Format": "Json", "ID": "1f0c28bd-3eef-48cd-9a4a-5fd0560e321d", "DetectTime": "2023-10-30T14:05:52.603583+02:00", "EventTime": "2023-10-30T14:05:52.603601+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:22:51.187899+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:52.679159)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e829df4d-da78-4f20-b8df-27079831a340", "DetectTime": "2023-10-30T14:05:52.685705+02:00", "EventTime": "2023-10-30T14:05:52.685726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CoHmU8Pvrmnr1GJEb"]} -{"Format": "IDEA0", "ID": "404d99d8-b87f-4be6-9b08-9b0234d2a9b6", "DetectTime": "2023-10-30T14:05:52.721114+02:00", "EventTime": "2023-10-30T14:05:52.721140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CmlERM1m1IdJ51VgAa"]} -{"Format": "IDEA0", "ID": "810cf4ca-7fd0-4a51-a90e-bcaeb20e9fc0", "DetectTime": "2023-10-30T14:05:52.757698+02:00", "EventTime": "2023-10-30T14:05:52.757717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["CH3vYC3qJw6rUg7I1e"]} -{"Format": "IDEA0", "ID": "01abe897-48f2-44e1-8da9-5190260d8474", "DetectTime": "2023-10-30T14:05:52.797666+02:00", "EventTime": "2023-10-30T14:05:52.797689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CWCkU31yyMew4NVRhh"]} -{"Format": "IDEA0", "ID": "f119b8de-f806-402a-9497-473caff43bf5", "DetectTime": "2023-10-30T14:05:52.829893+02:00", "EventTime": "2023-10-30T14:05:52.829909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["Cg6Cx63G6Z0L8QJEvi"]} -{"Format": "IDEA0", "ID": "74c074f1-b805-495c-a3ef-836f348c891e", "DetectTime": "2023-10-30T14:05:52.863560+02:00", "EventTime": "2023-10-30T14:05:52.863588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CIfkWSqLiuzkNiAAl"]} -{"Format": "IDEA0", "ID": "94f338a3-96f1-4754-9b16-cd10ca4997ab", "DetectTime": "2023-10-30T14:05:52.898106+02:00", "EventTime": "2023-10-30T14:05:52.898123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cq4bN53w5rb40GSEC9"]} -{"Format": "IDEA0", "ID": "4d2ee3c2-ca19-4319-bd75-94ec63b2c3f8", "DetectTime": "2023-10-30T14:05:52.931523+02:00", "EventTime": "2023-10-30T14:05:52.931550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CjdiGV2yfhnUKKUYll"]} -{"Format": "Json", "ID": "4d2ee3c2-ca19-4319-bd75-94ec63b2c3f8", "DetectTime": "2023-10-30T14:05:52.931523+02:00", "EventTime": "2023-10-30T14:05:52.931550+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:53:42.769465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:53.087888)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a2dd2ef2-573e-47d0-8fc2-a08b95de1e74", "DetectTime": "2023-10-30T14:05:53.096958+02:00", "EventTime": "2023-10-30T14:05:53.096979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["Cb5N2i2ymtShQgPHzd"]} -{"Format": "IDEA0", "ID": "49aac7ab-fc34-4904-bb3a-df8fb02a7cbd", "DetectTime": "2023-10-30T14:05:53.137146+02:00", "EventTime": "2023-10-30T14:05:53.137170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["Ck579R2nBIPHU9wcv1"]} -{"Format": "IDEA0", "ID": "c714fb53-9ff6-4d17-9ebb-7b92116d5fc0", "DetectTime": "2023-10-30T14:05:53.171431+02:00", "EventTime": "2023-10-30T14:05:53.171451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["C874GWRU533rLzUee"]} -{"Format": "IDEA0", "ID": "16e6690b-0934-434f-ac4b-f903b57d9e58", "DetectTime": "2023-10-30T14:05:53.205923+02:00", "EventTime": "2023-10-30T14:05:53.205941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["Cd6TSz2lyxFqOPJRBl"]} -{"Format": "IDEA0", "ID": "6f26973e-33a7-4048-ba4a-ab1f2e866957", "DetectTime": "2023-10-30T14:05:53.239233+02:00", "EventTime": "2023-10-30T14:05:53.239253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cm66KX3OPmbvy4LPX9"]} -{"Format": "IDEA0", "ID": "1302a480-b2dc-4532-a7a8-02a9e29e9f55", "DetectTime": "2023-10-30T14:05:53.274364+02:00", "EventTime": "2023-10-30T14:05:53.274382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cq2G9A3pg7OJoJd8Gb"]} -{"Format": "IDEA0", "ID": "6ed2125b-3739-4c6c-943d-93fc0451fac6", "DetectTime": "2023-10-30T14:05:53.311439+02:00", "EventTime": "2023-10-30T14:05:53.311468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CYP8LR1E2JR3pPHM5c"]} -{"Format": "IDEA0", "ID": "df424fb5-0333-4d88-9d4d-18547d576862", "DetectTime": "2023-10-30T14:05:53.346458+02:00", "EventTime": "2023-10-30T14:05:53.346475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CLd9BeLXQadP7Hm3a"]} -{"Format": "IDEA0", "ID": "e6e4df69-9ea9-47ef-adeb-b5835d00cdb9", "DetectTime": "2023-10-30T14:05:53.382194+02:00", "EventTime": "2023-10-30T14:05:53.382210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CK6pbe35avLMBjkAO"]} -{"Format": "Json", "ID": "e6e4df69-9ea9-47ef-adeb-b5835d00cdb9", "DetectTime": "2023-10-30T14:05:53.382194+02:00", "EventTime": "2023-10-30T14:05:53.382210+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:54:17.929924+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:53.469735)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c0ffabbb-a763-47d1-8aa1-04647a7b6f6d", "DetectTime": "2023-10-30T14:05:53.479125+02:00", "EventTime": "2023-10-30T14:05:53.479151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CAiKFB4yfyIPc4zaQ2"]} -{"Format": "IDEA0", "ID": "08c22968-e9fe-49b4-9dbb-d0928b6550cf", "DetectTime": "2023-10-30T14:05:53.511844+02:00", "EventTime": "2023-10-30T14:05:53.511866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["Cqn05Z2FRCH3YsBxkh"]} -{"Format": "IDEA0", "ID": "7d7fd6fa-c22b-4229-bb75-a6b525b8105f", "DetectTime": "2023-10-30T14:05:53.546672+02:00", "EventTime": "2023-10-30T14:05:53.546691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["C4LOvs3Ncfeuuif3Je"]} -{"Format": "IDEA0", "ID": "fb516c43-3363-46f3-82c4-2eb9f584b5c5", "DetectTime": "2023-10-30T14:05:53.579949+02:00", "EventTime": "2023-10-30T14:05:53.579978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["COf7xs2wMg9bevzmnj"]} -{"Format": "IDEA0", "ID": "a929f4d0-cb7a-4838-a2fd-6a08214b9c2b", "DetectTime": "2023-10-30T14:05:53.608513+02:00", "EventTime": "2023-10-30T14:05:53.608539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CVtRvy4pDPLl5ghVk5"]} -{"Format": "IDEA0", "ID": "c97a141f-9e64-449e-8452-c21314253731", "DetectTime": "2023-10-30T14:05:53.636876+02:00", "EventTime": "2023-10-30T14:05:53.636891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CplbW91hwkIRIU1cR8"]} -{"Format": "IDEA0", "ID": "43fd180b-4243-4be5-a2f5-8f070e244299", "DetectTime": "2023-10-30T14:05:53.671564+02:00", "EventTime": "2023-10-30T14:05:53.671582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CVhbrn3txvNE6NHsal"]} -{"Format": "IDEA0", "ID": "75216e1c-606d-4618-b670-8be4ce7f85e1", "DetectTime": "2023-10-30T14:05:53.700746+02:00", "EventTime": "2023-10-30T14:05:53.700763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CpEbzK1SMgQ4PFodV"]} -{"Format": "IDEA0", "ID": "70d0d670-607a-4638-b540-37d24c587a6c", "DetectTime": "2023-10-30T14:05:53.733497+02:00", "EventTime": "2023-10-30T14:05:53.733525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CKSsdA39qZTrvX1Kfk"]} -{"Format": "IDEA0", "ID": "0152916e-7c69-4d77-a478-02c1959ad4ff", "DetectTime": "2023-10-30T14:05:53.764019+02:00", "EventTime": "2023-10-30T14:05:53.764035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CTAI0u2Nrp9zdCtW8h"]} -{"Format": "IDEA0", "ID": "7503cd09-e59e-4271-b73d-e7cf33ad29c6", "DetectTime": "2023-10-30T14:05:53.793133+02:00", "EventTime": "2023-10-30T14:05:53.793224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CKcHQj3sXKrhxTBz37"]} -{"Format": "IDEA0", "ID": "04e7baf3-17c9-41cd-86dc-c024c19ade16", "DetectTime": "2023-10-30T14:05:53.823302+02:00", "EventTime": "2023-10-30T14:05:53.823321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CAs5qk4sHhGA5bNeC8"]} -{"Format": "IDEA0", "ID": "2a195d23-d111-4939-93e0-cd6d10f71157", "DetectTime": "2023-10-30T14:05:53.853947+02:00", "EventTime": "2023-10-30T14:05:53.853965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C7d4Lf2eKZ9e1e8kP6"]} -{"Format": "IDEA0", "ID": "a4dd04b2-a644-4f74-a25f-e76fabc20526", "DetectTime": "2023-10-30T14:05:53.881909+02:00", "EventTime": "2023-10-30T14:05:53.881927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["Cuxjgx19JnRaIrrgEb"]} -{"Format": "IDEA0", "ID": "c4c498a8-e827-4a9d-9887-7ec51eeb890d", "DetectTime": "2023-10-30T14:05:53.911248+02:00", "EventTime": "2023-10-30T14:05:53.911277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CggYja2aE1L8wfMM6"]} -{"Format": "IDEA0", "ID": "2d7f5fab-9f3f-4df4-bd80-7fb22ad85481", "DetectTime": "2023-10-30T14:05:53.938262+02:00", "EventTime": "2023-10-30T14:05:53.938282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["Cr5VMd3mpHpEce0ufb"]} -{"Format": "IDEA0", "ID": "467e2af2-9abb-4206-bd03-8a62fea4e19f", "DetectTime": "2023-10-30T14:05:53.965765+02:00", "EventTime": "2023-10-30T14:05:53.965794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CZ0wixEoQ05cezi35"]} -{"Format": "IDEA0", "ID": "c71818f4-7962-4930-a301-2a5a11b25112", "DetectTime": "2023-10-30T14:05:53.993810+02:00", "EventTime": "2023-10-30T14:05:53.993831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CzSmbk4bHCy4nLpf73"]} -{"Format": "IDEA0", "ID": "38b67002-a9f8-4660-8f12-25c8a2d0481e", "DetectTime": "2023-10-30T14:05:54.021084+02:00", "EventTime": "2023-10-30T14:05:54.021100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CgvmPQGfLQfwmebph"]} -{"Format": "IDEA0", "ID": "06893957-edfb-491f-a7cb-8cf9e1fdf372", "DetectTime": "2023-10-30T14:05:54.053715+02:00", "EventTime": "2023-10-30T14:05:54.053729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CyWZqCAVGwUcwheBi"]} -{"Format": "IDEA0", "ID": "bf2862a7-bc36-4562-860e-22dbb06a4b2c", "DetectTime": "2023-10-30T14:05:54.081358+02:00", "EventTime": "2023-10-30T14:05:54.081376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CjkIfp2ljg2d8uY5Tc"]} -{"Format": "IDEA0", "ID": "6207eb11-296b-40e7-809e-db218b2ac63a", "DetectTime": "2023-10-30T14:05:54.110669+02:00", "EventTime": "2023-10-30T14:05:54.110690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["C7ZlEiTVugtCIS685"]} -{"Format": "IDEA0", "ID": "d726728b-75b5-4bfc-aa31-1429e5da7a6d", "DetectTime": "2023-10-30T14:05:54.137271+02:00", "EventTime": "2023-10-30T14:05:54.137283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CDmnyvUyTw7cvuLy1"]} -{"Format": "IDEA0", "ID": "5feb1d8d-f219-4d9c-90a9-7bf221364bce", "DetectTime": "2023-10-30T14:05:54.163129+02:00", "EventTime": "2023-10-30T14:05:54.163146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CYircu1lPoFpOzwEl8"]} -{"Format": "Json", "ID": "5feb1d8d-f219-4d9c-90a9-7bf221364bce", "DetectTime": "2023-10-30T14:05:54.163129+02:00", "EventTime": "2023-10-30T14:05:54.163146+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T15:54:39.649627+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2023/10/30 14:05:54.232317)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa0c23f2-716c-4859-9955-ec4a82481b00", "DetectTime": "2023-10-30T14:05:54.237968+02:00", "EventTime": "2023-10-30T14:05:54.237986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CwjrDpPxH7x1IL1b1"]} -{"Format": "IDEA0", "ID": "b931d9e7-3bb6-45a0-b98d-ef025046195e", "DetectTime": "2023-10-30T14:05:54.273075+02:00", "EventTime": "2023-10-30T14:05:54.273143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["C6J3xk4WSulqe7qpJ4"]} -{"Format": "IDEA0", "ID": "f92dd263-5d38-4bc4-b780-2792e2b513aa", "DetectTime": "2023-10-30T14:05:54.301411+02:00", "EventTime": "2023-10-30T14:05:54.301431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CssFvZ3QizekaFdQci"]} -{"Format": "IDEA0", "ID": "8b2a829b-f2ad-452c-a51a-924ec61170ff", "DetectTime": "2023-10-30T14:05:54.326562+02:00", "EventTime": "2023-10-30T14:05:54.327549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CGq0e4Dx9h8aNgil8"]} -{"Format": "IDEA0", "ID": "49269dd4-27bf-49e7-ac10-bdd66912b829", "DetectTime": "2023-10-30T14:05:54.358134+02:00", "EventTime": "2023-10-30T14:05:54.358154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["COuMlf1CcJmHLBAVvd"]} -{"Format": "IDEA0", "ID": "67c7909c-2069-4624-9821-85fe76ce225c", "DetectTime": "2023-10-30T14:05:54.381762+02:00", "EventTime": "2023-10-30T14:05:54.381782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CnRe3r2zIvLpSj9Kah"]} -{"Format": "IDEA0", "ID": "45cb0d3d-2a22-477a-bfdd-e84bfc547514", "DetectTime": "2023-10-30T14:05:54.400877+02:00", "EventTime": "2023-10-30T14:05:54.400892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["COAG2u1bJA4u6vDa1i"]} -{"Format": "IDEA0", "ID": "61e08af4-1c73-4a73-983d-08b000add817", "DetectTime": "2023-10-30T14:05:54.425581+02:00", "EventTime": "2023-10-30T14:05:54.425602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CR1Bdz481tUmyI64Sj"]} -{"Format": "IDEA0", "ID": "ee5719ec-20f9-4088-814c-491037d4eaf8", "DetectTime": "2023-10-30T14:05:54.450680+02:00", "EventTime": "2023-10-30T14:05:54.450697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CJPCaT1CMyf6idgOkk"]} -{"Format": "IDEA0", "ID": "cf04fd6d-8409-412b-901b-f3ddf3931d07", "DetectTime": "2023-10-30T14:05:54.472759+02:00", "EventTime": "2023-10-30T14:05:54.472778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Ct3qlQawktGx0Weq5"]} -{"Format": "IDEA0", "ID": "e11126ba-86d9-45f5-a005-d47506e8cd24", "DetectTime": "2023-10-30T14:05:54.492950+02:00", "EventTime": "2023-10-30T14:05:54.492967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CDLcmcJtwnzYJ2qk2"]} -{"Format": "IDEA0", "ID": "e86de355-efc5-4662-9059-92df9338f4d7", "DetectTime": "2023-10-30T14:05:54.513876+02:00", "EventTime": "2023-10-30T14:05:54.513892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyDVIL7tjOIMkYPT"]} -{"Format": "IDEA0", "ID": "b3143fa4-8efc-4a0d-935e-d12c52b28cfd", "DetectTime": "2023-10-30T14:05:54.535681+02:00", "EventTime": "2023-10-30T14:05:54.535702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CzLhG521w0AhpL16i6"]} -{"Format": "IDEA0", "ID": "94255c4f-bcfe-46c5-99ce-b6e577be9f68", "DetectTime": "2023-10-30T14:05:54.558127+02:00", "EventTime": "2023-10-30T14:05:54.558139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Ci5aU23P2Oeozr63Ok"]} -{"Format": "IDEA0", "ID": "cd4bfe0f-c6b1-4a80-b0a2-47475c076bbd", "DetectTime": "2023-10-30T14:05:54.579162+02:00", "EventTime": "2023-10-30T14:05:54.579188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CMVfuK3qouyKFVWXgc"]} -{"Format": "IDEA0", "ID": "3a459fb5-10a3-4ca9-ba36-630c50dc24c7", "DetectTime": "2023-10-30T14:05:54.600630+02:00", "EventTime": "2023-10-30T14:05:54.600650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["CDKxhV2CQ36tH8Fyqb"]} -{"Format": "IDEA0", "ID": "348bbba3-a3cb-4643-a301-cd1f30e8af62", "DetectTime": "2023-10-30T14:05:54.621521+02:00", "EventTime": "2023-10-30T14:05:54.621536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CCspxC2pSQJP5tZBw3"]} -{"Format": "IDEA0", "ID": "d86d9696-f692-43c8-a126-b042281f64ed", "DetectTime": "2023-10-30T14:05:54.641315+02:00", "EventTime": "2023-10-30T14:05:54.641332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["Cf9XUF2mEUvM3JM9Lf"]} -{"Format": "IDEA0", "ID": "a6d19565-cc6d-4cfc-8755-c4cdb158cbee", "DetectTime": "2023-10-30T14:05:54.662408+02:00", "EventTime": "2023-10-30T14:05:54.662431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["COyT8z3dgpB0FAe52j"]} -{"Format": "IDEA0", "ID": "96034636-2363-4ffa-bd9f-4cf322fbd2f6", "DetectTime": "2023-10-30T14:05:54.682857+02:00", "EventTime": "2023-10-30T14:05:54.682882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CAoUjQIzPTbi7wukk"]} -{"Format": "IDEA0", "ID": "2b6e6d66-518b-4e13-ad4f-6127b4276263", "DetectTime": "2023-10-30T14:05:54.700109+02:00", "EventTime": "2023-10-30T14:05:54.700120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C18RMo14grCzAgnNQj"]} -{"Format": "IDEA0", "ID": "1a9363bd-c50f-491e-9e4e-2db1b9d34940", "DetectTime": "2023-10-30T14:05:54.718482+02:00", "EventTime": "2023-10-30T14:05:54.718499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CnJSxTheIOHW3udZ5"]} -{"Format": "IDEA0", "ID": "4a2295ea-a8b2-4a96-b1bd-fc22680e4b90", "DetectTime": "2023-10-30T14:05:54.742645+02:00", "EventTime": "2023-10-30T14:05:54.742664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["C5PPlx4tvZxITIK2f6"]} -{"Format": "IDEA0", "ID": "8756e5e3-abc6-4404-addd-26c245dae871", "DetectTime": "2023-10-30T14:05:54.764540+02:00", "EventTime": "2023-10-30T14:05:54.764556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CErI5X1mVGEuqq9xo"]} -{"Format": "IDEA0", "ID": "262ab7db-788b-4ae9-824a-bfa5db7fe41a", "DetectTime": "2023-10-30T14:05:54.784768+02:00", "EventTime": "2023-10-30T14:05:54.784783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CO3D443rQvPKrvk5t6"]} -{"Format": "IDEA0", "ID": "ceaa9487-67f1-4b36-9a6c-58c03de68680", "DetectTime": "2023-10-30T14:05:54.802470+02:00", "EventTime": "2023-10-30T14:05:54.802482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CFHfMm3nhUmyIycpIk"]} -{"Format": "IDEA0", "ID": "39cdf510-c7f0-41be-b306-12eb1dc66cb3", "DetectTime": "2023-10-30T14:05:54.817805+02:00", "EventTime": "2023-10-30T14:05:54.817821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C0Gvgy1BeWeQ1MDzfc"]} -{"Format": "IDEA0", "ID": "5d6a03ba-3d5f-4e5b-ae02-12fdf7e8f15a", "DetectTime": "2023-10-30T14:05:54.834312+02:00", "EventTime": "2023-10-30T14:05:54.834324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CazGTA3rj3nsOgibt8"]} -{"Format": "IDEA0", "ID": "88cda5d9-9d88-420d-a05b-9da08d83a4b0", "DetectTime": "2023-10-30T14:05:54.848132+02:00", "EventTime": "2023-10-30T14:05:54.848143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["CnAvmhxapcpVnXJz"]} -{"Format": "IDEA0", "ID": "19043eed-7d91-4bbb-b91d-b911780149fd", "DetectTime": "2023-10-30T14:05:54.862366+02:00", "EventTime": "2023-10-30T14:05:54.862377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CGn1Zv4PwDLCHCuAXd"]} -{"Format": "IDEA0", "ID": "ae7ebdec-7041-4c5b-9e8b-69fee0fe53e5", "DetectTime": "2023-10-30T14:05:54.877789+02:00", "EventTime": "2023-10-30T14:05:54.877806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CRaQ3cTMedzWFSLhi"]} -{"Format": "IDEA0", "ID": "fe38d24f-b3cb-486b-96cb-697b8152667b", "DetectTime": "2023-10-30T14:05:54.895212+02:00", "EventTime": "2023-10-30T14:05:54.895225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CaVtYq4BNRYsvGMiY"]} -{"Format": "IDEA0", "ID": "f38a2273-5dce-48b2-a0ef-3d4a1de50a3b", "DetectTime": "2023-10-30T14:05:54.911926+02:00", "EventTime": "2023-10-30T14:05:54.911937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Cvw68N3KIFlqfhUbs5"]} -{"Format": "IDEA0", "ID": "3c3bd935-ff6b-4305-a055-fc4532bf20f8", "DetectTime": "2023-10-30T14:05:54.931033+02:00", "EventTime": "2023-10-30T14:05:54.931051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["C5pTZC1EdMGZHNTaFj"]} -{"Format": "IDEA0", "ID": "d26ae8b9-d0cf-491c-935f-f045a4ae6896", "DetectTime": "2023-10-30T14:05:55.006293+02:00", "EventTime": "2023-10-30T14:05:55.006319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CHVdTS18v7A272ytbe"]} -{"Format": "IDEA0", "ID": "116bce83-bb2a-4af2-a300-322f6e7e6e43", "DetectTime": "2023-10-30T14:05:55.028945+02:00", "EventTime": "2023-10-30T14:05:55.028974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CRWpfAfY3yZAu03l"]} -{"Format": "IDEA0", "ID": "2794e9f1-58cd-4b89-a8f6-5f9992a4f5c9", "DetectTime": "2023-10-30T14:05:55.053434+02:00", "EventTime": "2023-10-30T14:05:55.053450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["C8AIN832t6XjJAabo9"]} -{"Format": "IDEA0", "ID": "3413fd28-48d2-4ecb-b924-4b3ac1f135fe", "DetectTime": "2023-10-30T14:05:55.072641+02:00", "EventTime": "2023-10-30T14:05:55.072667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CIfHOd1vnsStePzVf3"]} -{"Format": "IDEA0", "ID": "56a9746a-a77c-49f1-8a1f-2b937be8f50f", "DetectTime": "2023-10-30T14:05:55.092045+02:00", "EventTime": "2023-10-30T14:05:55.092057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["CZseVc1KCCJJJ0p9h4"]} -{"Format": "IDEA0", "ID": "56b2ec12-463c-4959-8a74-7333ba9ebed3", "DetectTime": "2023-10-30T14:05:55.111329+02:00", "EventTime": "2023-10-30T14:05:55.111346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ChCzBp2RSLhxEgVSXe"]} -{"Format": "IDEA0", "ID": "66da82e3-80f7-4e3d-be35-9d50c3f2bf71", "DetectTime": "2023-10-30T14:05:55.131166+02:00", "EventTime": "2023-10-30T14:05:55.131182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CZaJSm1NOsxvsF9Xvg"]} -{"Format": "IDEA0", "ID": "bf1ecedd-1910-49ed-9850-e0942402c0be", "DetectTime": "2023-10-30T14:05:55.152670+02:00", "EventTime": "2023-10-30T14:05:55.152687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CjUuYh4McnSHQpRida"]} -{"Format": "IDEA0", "ID": "1c963be6-c484-4f30-b19e-388b7c8cf12d", "DetectTime": "2023-10-30T14:05:55.174850+02:00", "EventTime": "2023-10-30T14:05:55.174871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CcgGgN2nOsoT0oqoEh"]} -{"Format": "IDEA0", "ID": "40d80a80-4bdc-47ca-9b2c-1789f2e209b3", "DetectTime": "2023-10-30T14:05:55.192622+02:00", "EventTime": "2023-10-30T14:05:55.192638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CGwO2L10r2qxZlKdz3"]} -{"Format": "IDEA0", "ID": "93bb73de-154e-4ba9-b7ba-79e8c0f07b18", "DetectTime": "2023-10-30T14:05:55.210595+02:00", "EventTime": "2023-10-30T14:05:55.210612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CUs2BzL5Ut8wqRgob"]} -{"Format": "IDEA0", "ID": "2f0093c8-6732-4bb7-9ac6-7f51c35826e0", "DetectTime": "2023-10-30T14:05:55.229815+02:00", "EventTime": "2023-10-30T14:05:55.229828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CmmNCt39WuMrDTScKg"]} -{"Format": "IDEA0", "ID": "80c42761-30c0-44f3-9905-e9373891c1c3", "DetectTime": "2023-10-30T14:05:55.267749+02:00", "EventTime": "2023-10-30T14:05:55.267762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CexW2Gs6MWlLUyah1"]} -{"Format": "IDEA0", "ID": "74721adf-b3ea-4729-988f-835aac78b96d", "DetectTime": "2023-10-30T14:05:55.288691+02:00", "EventTime": "2023-10-30T14:05:55.288712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["CLnVTw47mlBRcPvs03"]} -{"Format": "IDEA0", "ID": "dd5648bd-0c30-4ca0-bf8a-0dee62932bc2", "DetectTime": "2023-10-30T14:05:55.309200+02:00", "EventTime": "2023-10-30T14:05:55.309219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C6lU291BTmTFteJRrc"]} -{"Format": "IDEA0", "ID": "fa41c342-1a03-4255-a50e-464b1a9c5e7a", "DetectTime": "2023-10-30T14:05:55.331530+02:00", "EventTime": "2023-10-30T14:05:55.331550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["Cb78bP2K8G8w6HHrB5"]} -{"Format": "IDEA0", "ID": "389942f6-4808-450a-899e-1aae248fdd7e", "DetectTime": "2023-10-30T14:05:55.353225+02:00", "EventTime": "2023-10-30T14:05:55.353246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["Ci8PF32FQIjQ82PcGk"]} -{"Format": "IDEA0", "ID": "ae6c7880-4c33-4a63-8ab4-ff4d98753b82", "DetectTime": "2023-10-30T14:05:55.375817+02:00", "EventTime": "2023-10-30T14:05:55.375836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CsUTNq1P32uKdOehs9"]} -{"Format": "IDEA0", "ID": "1cdfdc14-2e54-4ae2-9b5f-3df64660b9e1", "DetectTime": "2023-10-30T14:05:55.397965+02:00", "EventTime": "2023-10-30T14:05:55.397977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CzrupL2f29DGLh6y0b"]} -{"Format": "IDEA0", "ID": "d1b4d45b-5d07-4bae-8583-7f7c6fe53c39", "DetectTime": "2023-10-30T14:05:55.418406+02:00", "EventTime": "2023-10-30T14:05:55.418422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CmAOdI1gKuWv94lYU"]} -{"Format": "IDEA0", "ID": "d48a0551-78e2-4d33-bf5d-dcf7fea652ed", "DetectTime": "2023-10-30T14:05:55.439970+02:00", "EventTime": "2023-10-30T14:05:55.439991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CXQU3R3059CYw3Rbme"]} -{"Format": "IDEA0", "ID": "7be18f74-35da-456b-be57-325794bbd400", "DetectTime": "2023-10-30T14:05:55.464157+02:00", "EventTime": "2023-10-30T14:05:55.464173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CJG6Ed3wPH8M6OjPC8"]} -{"Format": "IDEA0", "ID": "55475a1d-1d0e-4e2c-8eca-4dd79ab97179", "DetectTime": "2023-10-30T14:05:55.485191+02:00", "EventTime": "2023-10-30T14:05:55.485209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CJvmV41MZ3BNrlhPab"]} -{"Format": "IDEA0", "ID": "492b3618-5b33-4938-a913-6853006605bf", "DetectTime": "2023-10-30T14:05:55.506762+02:00", "EventTime": "2023-10-30T14:05:55.506796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CKMoKE1uA5fJjlKxO2"]} -{"Format": "IDEA0", "ID": "eec2de16-1d81-4d04-a996-548de22936a6", "DetectTime": "2023-10-30T14:05:55.528249+02:00", "EventTime": "2023-10-30T14:05:55.528266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["CKrSnN3PQRXsJbuXYh"]} -{"Format": "IDEA0", "ID": "0c62d33b-df2f-4563-83d9-f24a134cd2ed", "DetectTime": "2023-10-30T14:05:55.547609+02:00", "EventTime": "2023-10-30T14:05:55.547625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["C6w0Wq4nRu7itm7TY9"]} -{"Format": "IDEA0", "ID": "1600feb1-4f19-4a8c-b015-e14b572a344c", "DetectTime": "2023-10-30T14:05:55.567485+02:00", "EventTime": "2023-10-30T14:05:55.567501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["Cb5za62UKDf1mXYgCb"]} -{"Format": "IDEA0", "ID": "2f2d7f0b-b410-4258-a3da-9ed29f879a36", "DetectTime": "2023-10-30T14:05:55.592842+02:00", "EventTime": "2023-10-30T14:05:55.592863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CNyNPj1bVOXiPdvqFj"]} -{"Format": "IDEA0", "ID": "13418340-20ba-4b79-b598-19a1ceef2069", "DetectTime": "2023-10-30T14:05:55.616074+02:00", "EventTime": "2023-10-30T14:05:55.616098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CaWVaKf12rj3lsjy1"]} -{"Format": "IDEA0", "ID": "9457d5a4-67f3-4ead-bfa6-93a4e414dee0", "DetectTime": "2023-10-30T14:05:55.637789+02:00", "EventTime": "2023-10-30T14:05:55.637818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CZFEwO2ZjBOe1m0EDe"]} -{"Format": "IDEA0", "ID": "125fc67c-ba97-455b-8e90-9843183b7a92", "DetectTime": "2023-10-30T14:05:55.660552+02:00", "EventTime": "2023-10-30T14:05:55.660569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cla0eL1IDPvOz6zK0d"]} -{"Format": "IDEA0", "ID": "b6f68a5c-2532-4ef4-8663-b7e13e9fbd03", "DetectTime": "2023-10-30T14:05:55.702467+02:00", "EventTime": "2023-10-30T14:05:55.702490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C0iFbw2ZkbwQbnKlQ3"]} -{"Format": "IDEA0", "ID": "58f92ea8-986e-4dcd-b9d4-3852fd12e4c5", "DetectTime": "2023-10-30T14:05:55.728454+02:00", "EventTime": "2023-10-30T14:05:55.728471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.5.30.98 ", "ContentType": "text/plain"}], "uids": ["CBSRZv2UMTpmxxdTTa"]} -{"Format": "IDEA0", "ID": "2aa5287c-e42a-47a6-9eb4-9b9797c7f301", "DetectTime": "2023-10-30T14:05:55.751887+02:00", "EventTime": "2023-10-30T14:05:55.751903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.188.253.63 ", "ContentType": "text/plain"}], "uids": ["CYujFt3UKQqNUOFWg5"]} -{"Format": "IDEA0", "ID": "bbb01124-74c0-4fa9-b5d5-3c986d81ed89", "DetectTime": "2023-10-30T14:05:55.777776+02:00", "EventTime": "2023-10-30T14:05:55.777795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.162.159.200 ", "ContentType": "text/plain"}], "uids": ["CDGyTz1dFi9mgVbz8"]} -{"Format": "IDEA0", "ID": "0ff3cbca-88d6-47a8-b70b-0c3ec3af1dea", "DetectTime": "2023-10-30T14:05:55.803212+02:00", "EventTime": "2023-10-30T14:05:55.803233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CysQRy3HuemtCQ9cC7"]} -{"Format": "IDEA0", "ID": "e74c184b-cc06-4efb-9cf8-75ebfd2f1c7f", "DetectTime": "2023-10-30T14:05:55.829694+02:00", "EventTime": "2023-10-30T14:05:55.829717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CMoxEe2uQeCv4PDagd", "CNZLTY2FoyPaMfls36", "CSCjyB244SOLzNrrv9", "CcdPqA1JQybeywngTl"]} -{"Format": "IDEA0", "ID": "12753dc1-8fd2-4e0d-a9f4-af4ac52d09e4", "DetectTime": "2023-10-30T14:05:55.838123+02:00", "EventTime": "2023-10-30T14:05:55.838144+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CSCjyB244SOLzNrrv9"]} -{"Format": "IDEA0", "ID": "8f28c3c1-ca5f-4ffe-acf4-1687475ced47", "DetectTime": "2023-10-30T14:05:55.848909+02:00", "EventTime": "2023-10-30T14:05:55.848925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CmMvVp3kCiTAiFVQnk"]} -{"Format": "IDEA0", "ID": "6d89628a-cc57-4bbc-a0ee-2326582ff515", "DetectTime": "2023-10-30T14:05:55.875738+02:00", "EventTime": "2023-10-30T14:05:55.875762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.244.250.216 ", "ContentType": "text/plain"}], "uids": ["Cte8pm19tkNMXHJjo9"]} -{"Format": "IDEA0", "ID": "93e1c652-3fd0-4802-8471-58e47500a4b0", "DetectTime": "2023-10-30T14:05:55.904252+02:00", "EventTime": "2023-10-30T14:05:55.904268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.194.154.27 ", "ContentType": "text/plain"}], "uids": ["CrSZQ043Eqsu4C43Tf"]} -{"Format": "IDEA0", "ID": "4d004bdc-61c8-4c2c-8cdc-0805a2182d74", "DetectTime": "2023-10-30T14:05:55.931009+02:00", "EventTime": "2023-10-30T14:05:55.931026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CNornu3Qax2JyERr6c"]} -{"Format": "IDEA0", "ID": "816807b5-c8a0-4cc1-990c-dea82d1b2fe6", "DetectTime": "2023-10-30T14:05:55.956232+02:00", "EventTime": "2023-10-30T14:05:55.956248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNG4zh4PNtD9iBX4Yc"]} -{"Format": "IDEA0", "ID": "158113d8-6b62-48ba-adcc-21ccae3edeb2", "DetectTime": "2023-10-30T14:05:55.985202+02:00", "EventTime": "2023-10-30T14:05:55.985223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.5.189 ", "ContentType": "text/plain"}], "uids": ["Cc5VAF39lsfx381GB3"]} -{"Format": "IDEA0", "ID": "4c77d447-5a82-4594-8c7e-a4e775239d40", "DetectTime": "2023-10-30T14:05:56.013902+02:00", "EventTime": "2023-10-30T14:05:56.013923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["CJfzX01obsQb8NMmk8"]} -{"Format": "IDEA0", "ID": "efc41d5a-9ac4-4575-bee6-b57b516c70d6", "DetectTime": "2023-10-30T14:05:56.053789+02:00", "EventTime": "2023-10-30T14:05:56.053806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.51.105.117 ", "ContentType": "text/plain"}], "uids": ["CymtkI1gbiCLOWJqKe"]} -{"Format": "IDEA0", "ID": "2b904ae0-ce61-44fd-b96b-d38b9e80dd7f", "DetectTime": "2023-10-30T14:05:56.078188+02:00", "EventTime": "2023-10-30T14:05:56.078209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.10.105.137 ", "ContentType": "text/plain"}], "uids": ["CuyVzIAC8miMvNvL3"]} -{"Format": "IDEA0", "ID": "bcf06e42-8253-49e0-a04b-8e63924ab076", "DetectTime": "2023-10-30T14:05:56.104312+02:00", "EventTime": "2023-10-30T14:05:56.104334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.149.119.209 ", "ContentType": "text/plain"}], "uids": ["Cg7be53VAvov4Rq6H9"]} -{"Format": "IDEA0", "ID": "0f11b422-5250-45d8-96a3-88ea7ee5f7b2", "DetectTime": "2023-10-30T14:05:56.127715+02:00", "EventTime": "2023-10-30T14:05:56.127730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.139.2.103 ", "ContentType": "text/plain"}], "uids": ["CGaymq2cStO1fmKV1b"]} -{"Format": "IDEA0", "ID": "8ffcc615-bffd-45a5-be0a-6dcb4cdc7d8a", "DetectTime": "2023-10-30T14:05:56.147768+02:00", "EventTime": "2023-10-30T14:05:56.147779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.36.56.127 ", "ContentType": "text/plain"}], "uids": ["CIkM5y2FvkOMO7hc2l"]} -{"Format": "IDEA0", "ID": "27d920ce-37f5-42c7-84f7-5a7b152203ff", "DetectTime": "2023-10-30T14:05:56.166914+02:00", "EventTime": "2023-10-30T14:05:56.166927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C6OO9m1x2Z15BnyKxc"]} -{"Format": "IDEA0", "ID": "190e0a5e-e4bc-4107-b51d-c3184eeb5992", "DetectTime": "2023-10-30T14:05:56.191399+02:00", "EventTime": "2023-10-30T14:05:56.191423+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CifDlo4JnXRQVoN2lb"]} -{"Format": "IDEA0", "ID": "96538b06-0e2c-448c-bc44-6087576ec99d", "DetectTime": "2023-10-30T14:05:56.199934+02:00", "EventTime": "2023-10-30T14:05:56.199957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.40.218 ", "ContentType": "text/plain"}], "uids": ["CbridD3iacTA8o9QZe"]} -{"Format": "IDEA0", "ID": "441981c7-64ba-4b4a-a7c3-8f8b13243dd2", "DetectTime": "2023-10-30T14:05:56.223093+02:00", "EventTime": "2023-10-30T14:05:56.223107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CsGxzG1YWeQHrDhAFj"]} -{"Format": "IDEA0", "ID": "f3bdb210-f929-4f1b-a5f3-34e08874a26d", "DetectTime": "2023-10-30T14:05:56.240631+02:00", "EventTime": "2023-10-30T14:05:56.240651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CZ7fCS2fRC94yQ6mpf"]} -{"Format": "IDEA0", "ID": "4879dd96-d1ae-407d-851c-87e59117208f", "DetectTime": "2023-10-30T14:05:56.263635+02:00", "EventTime": "2023-10-30T14:05:56.263647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CpwfXgZH3hkXpZXqe"]} -{"Format": "IDEA0", "ID": "06ece1b0-af2e-4f0b-8ed2-b6082bc664ec", "DetectTime": "2023-10-30T14:05:56.283362+02:00", "EventTime": "2023-10-30T14:05:56.283373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.160.9.130 ", "ContentType": "text/plain"}], "uids": ["CcQrIW3eeBWesoFUak"]} -{"Format": "IDEA0", "ID": "b35afd5e-07a6-4903-8344-7d17c26426ec", "DetectTime": "2023-10-30T14:05:56.307572+02:00", "EventTime": "2023-10-30T14:05:56.307605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CwlyEek8TSqoTBkok"]} -{"Format": "IDEA0", "ID": "6559a899-6cf2-4963-9a75-98567e98f663", "DetectTime": "2023-10-30T14:05:56.332139+02:00", "EventTime": "2023-10-30T14:05:56.332164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CCETmj1EcuM89mtcO3"]} -{"Format": "IDEA0", "ID": "50491843-63f4-4cee-a933-55bcacfc3433", "DetectTime": "2023-10-30T14:05:56.357530+02:00", "EventTime": "2023-10-30T14:05:56.357550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C8HoZM23jpsPbNk0C4"]} -{"Format": "IDEA0", "ID": "cc55b83d-8675-48e1-9357-71c736afc3d6", "DetectTime": "2023-10-30T14:05:56.394865+02:00", "EventTime": "2023-10-30T14:05:56.394883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.184.50.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.184.50.84 ", "ContentType": "text/plain"}], "uids": ["Cw4vt04pZLONFfQnT6"]} -{"Format": "IDEA0", "ID": "4ca16887-9683-41cb-8b76-0b0b850cf9f4", "DetectTime": "2023-10-30T14:05:56.416777+02:00", "EventTime": "2023-10-30T14:05:56.416789+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJYIQz1JZlSqAhalb6"]} -{"Format": "IDEA0", "ID": "077b904d-6a9e-4bee-94e6-64ee9d656957", "DetectTime": "2023-10-30T14:05:56.423728+02:00", "EventTime": "2023-10-30T14:05:56.423744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 183.89.113.140 ", "ContentType": "text/plain"}], "uids": ["CCIAdb1znQzngQJ7t5"]} -{"Format": "IDEA0", "ID": "f563f191-a4c8-4fdf-ba5f-f597d0751398", "DetectTime": "2023-10-30T14:05:56.447238+02:00", "EventTime": "2023-10-30T14:05:56.447260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.72.22.249 ", "ContentType": "text/plain"}], "uids": ["CdVxUo4ZCIgmezPMQl"]} -{"Format": "IDEA0", "ID": "32f7d7ea-63aa-4bb9-8465-f143028ce238", "DetectTime": "2023-10-30T14:05:56.472387+02:00", "EventTime": "2023-10-30T14:05:56.472410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CAEhPf199sNeNiXcuh"]} -{"Format": "IDEA0", "ID": "baabac49-29da-4e88-8638-c5ed07d0edce", "DetectTime": "2023-10-30T14:05:56.490529+02:00", "EventTime": "2023-10-30T14:05:56.490550+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwtGwb3u7Bg7yB9fdb"]} -{"Format": "IDEA0", "ID": "a925e0a3-2f57-4f6e-8df2-bf01b5221b03", "DetectTime": "2023-10-30T14:05:56.498552+02:00", "EventTime": "2023-10-30T14:05:56.498568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.79.114.250 ", "ContentType": "text/plain"}], "uids": ["C3b8aF1p6nZ3d1o7Ha"]} -{"Format": "IDEA0", "ID": "4b190267-c6ee-4c6f-aaf9-044d0f354d39", "DetectTime": "2023-10-30T14:05:56.522479+02:00", "EventTime": "2023-10-30T14:05:56.522493+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["ChePu72ke5uKTJwdh5"]} -{"Format": "IDEA0", "ID": "cf6232e3-e93d-4593-8252-c003d4167a9b", "DetectTime": "2023-10-30T14:05:56.528562+02:00", "EventTime": "2023-10-30T14:05:56.528573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CgSueL2Mw2Xr8xP1y6"]} -{"Format": "IDEA0", "ID": "1ce1d493-e7a4-4452-b6f3-9a015e185404", "DetectTime": "2023-10-30T14:05:56.550290+02:00", "EventTime": "2023-10-30T14:05:56.550306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.225.178.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.225.178.218 ", "ContentType": "text/plain"}], "uids": ["C9DEB03UTUnTdEFDB8"]} -{"Format": "IDEA0", "ID": "99937254-a766-49d0-8f54-9f438a5d3ab2", "DetectTime": "2023-10-30T14:05:56.573104+02:00", "EventTime": "2023-10-30T14:05:56.573123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.52.57.142 ", "ContentType": "text/plain"}], "uids": ["CaL7Ol4vGD26qtQ78l"]} -{"Format": "IDEA0", "ID": "9933b2d7-99dc-4e29-85b3-92d207099a55", "DetectTime": "2023-10-30T14:05:56.594017+02:00", "EventTime": "2023-10-30T14:05:56.594036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["C8Iry93iK9YDRjHTq2"]} -{"Format": "IDEA0", "ID": "28988f9e-500e-4425-989d-0390df680873", "DetectTime": "2023-10-30T14:05:56.616869+02:00", "EventTime": "2023-10-30T14:05:56.616886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.109.16.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.109.16.188 ", "ContentType": "text/plain"}], "uids": ["CX73wg238U0IeZtED4"]} -{"Format": "IDEA0", "ID": "9f0dd7a1-2897-4059-b628-490224074af8", "DetectTime": "2023-10-30T14:05:56.637837+02:00", "EventTime": "2023-10-30T14:05:56.637850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.190.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.190.82 ", "ContentType": "text/plain"}], "uids": ["CNXuhd1sc1vcD3B9Ug"]} -{"Format": "IDEA0", "ID": "ba2932e5-785f-4b91-8154-930ba085e118", "DetectTime": "2023-10-30T14:05:56.660375+02:00", "EventTime": "2023-10-30T14:05:56.660397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.110.49.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.110.49.137 ", "ContentType": "text/plain"}], "uids": ["CaCWTi3S5ifHYKnoY3"]} -{"Format": "IDEA0", "ID": "22f476f9-86ee-439c-b541-2a5889dbcff1", "DetectTime": "2023-10-30T14:05:56.681281+02:00", "EventTime": "2023-10-30T14:05:56.681297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.3.244"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.3.244 ", "ContentType": "text/plain"}], "uids": ["CKRITN1LzNzPlHEtJ1"]} -{"Format": "IDEA0", "ID": "208425ce-2895-42c6-b5a5-d6661070a5e0", "DetectTime": "2023-10-30T14:05:56.702542+02:00", "EventTime": "2023-10-30T14:05:56.702558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["C2gNmX2vWr4b0hsD7f"]} -{"Format": "IDEA0", "ID": "22c95789-7372-491b-aced-bb1aebf1c126", "DetectTime": "2023-10-30T14:05:56.719982+02:00", "EventTime": "2023-10-30T14:05:56.719995+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMWDmE4LuYGcwUY7re"]} -{"Format": "IDEA0", "ID": "9087a666-f2d8-45e3-b877-3784d8f11e62", "DetectTime": "2023-10-30T14:05:56.725960+02:00", "EventTime": "2023-10-30T14:05:56.725972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["Cze0B93XVXvdeB6n7a"]} -{"Format": "IDEA0", "ID": "921edf52-71e5-42af-bdd4-cdc7577d195a", "DetectTime": "2023-10-30T14:05:56.744344+02:00", "EventTime": "2023-10-30T14:05:56.744357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CaM2GZ4XsG8QO0yv"]} -{"Format": "IDEA0", "ID": "adf79f21-4160-4139-a6ff-714eec0bed0c", "DetectTime": "2023-10-30T14:05:56.763708+02:00", "EventTime": "2023-10-30T14:05:56.763719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CKw20Y2nQG88okE6Tj"]} -{"Format": "IDEA0", "ID": "c3825444-78d1-492a-93ed-efbe602e3973", "DetectTime": "2023-10-30T14:05:56.792803+02:00", "EventTime": "2023-10-30T14:05:56.792816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["Cesrcf2oFa87SP7wvl"]} -{"Format": "IDEA0", "ID": "4ea20a9b-7bf3-4c13-8091-3745cfeb154f", "DetectTime": "2023-10-30T14:05:56.814721+02:00", "EventTime": "2023-10-30T14:05:56.814736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.15.211"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.58.15.211 ", "ContentType": "text/plain"}], "uids": ["CKCtZk2RteWS2XxKpb"]} -{"Format": "IDEA0", "ID": "39729923-7115-42c0-964a-858cdfab5928", "DetectTime": "2023-10-30T14:05:56.833075+02:00", "EventTime": "2023-10-30T14:05:56.833086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CZEvhQ2FwRRjDoEool"]} -{"Format": "IDEA0", "ID": "ff676bb4-fa9b-4218-acab-cbe2cedf78bf", "DetectTime": "2023-10-30T14:05:56.852596+02:00", "EventTime": "2023-10-30T14:05:56.852613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CSQ4Iu4CFiGk1CGrG5"]} -{"Format": "IDEA0", "ID": "9c1b6074-c4de-4691-9585-2bbbd9f845a1", "DetectTime": "2023-10-30T14:05:56.871125+02:00", "EventTime": "2023-10-30T14:05:56.871136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.253.224.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.253.224.5 ", "ContentType": "text/plain"}], "uids": ["CEx8O84zM3mIHYZrhb"]} -{"Format": "IDEA0", "ID": "809f1c98-c58c-463a-922a-c672fc65465e", "DetectTime": "2023-10-30T14:05:56.892818+02:00", "EventTime": "2023-10-30T14:05:56.892834+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKQzTz3y0zZk2wbwud"]} -{"Format": "IDEA0", "ID": "082f87b3-43a1-4e1f-a429-594ee04c03dc", "DetectTime": "2023-10-30T14:05:56.899720+02:00", "EventTime": "2023-10-30T14:05:56.899735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.26 ", "ContentType": "text/plain"}], "uids": ["CGXkVj4ge1kXl8epQa"]} -{"Format": "IDEA0", "ID": "ebb851a3-ff9a-4269-b990-77f73a3f4e20", "DetectTime": "2023-10-30T14:05:56.919065+02:00", "EventTime": "2023-10-30T14:05:56.919076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.252.119.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.252.119.186 ", "ContentType": "text/plain"}], "uids": ["C6t5vNjZKtiNvGOp4"]} -{"Format": "IDEA0", "ID": "995df192-85e8-42d2-91ef-fd1041eb5f11", "DetectTime": "2023-10-30T14:05:56.937719+02:00", "EventTime": "2023-10-30T14:05:56.937734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["ClDBmG4De9di0AaBKl"]} -{"Format": "IDEA0", "ID": "c76e8a78-9469-43dd-baf7-0dca3074be8b", "DetectTime": "2023-10-30T14:05:56.959088+02:00", "EventTime": "2023-10-30T14:05:56.959101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.218.36.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.218.36.18 ", "ContentType": "text/plain"}], "uids": ["C4yYhA4MeU6BADmuGe"]} -{"Format": "IDEA0", "ID": "5198e57d-6f01-438b-8b85-e832b11a6afe", "DetectTime": "2023-10-30T14:05:56.976579+02:00", "EventTime": "2023-10-30T14:05:56.976591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["CK9VSr2A6ZMBql25Sk"]} -{"Format": "IDEA0", "ID": "faa37e57-8c67-4542-b5f7-7241a5fc5447", "DetectTime": "2023-10-30T14:05:56.996735+02:00", "EventTime": "2023-10-30T14:05:56.996746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.207.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.207.110 ", "ContentType": "text/plain"}], "uids": ["ChPMlC1jP7smxsj1G2"]} -{"Format": "IDEA0", "ID": "516db3fc-a694-419c-aa6b-f8d109ddfae9", "DetectTime": "2023-10-30T14:05:57.013824+02:00", "EventTime": "2023-10-30T14:05:57.013835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.192.107.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.192.107.51 ", "ContentType": "text/plain"}], "uids": ["CitKfa3HDKY8duR0i8"]} -{"Format": "IDEA0", "ID": "00cfcb2b-6536-4871-86f7-ab835aa07ddc", "DetectTime": "2023-10-30T14:05:57.030587+02:00", "EventTime": "2023-10-30T14:05:57.030599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["Czf0nQ3jd28I2nwBS1"]} -{"Format": "IDEA0", "ID": "2ff394ff-a7b9-46ad-adfe-b64ef07d88d1", "DetectTime": "2023-10-30T14:05:57.050244+02:00", "EventTime": "2023-10-30T14:05:57.050257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.160.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.160.125 ", "ContentType": "text/plain"}], "uids": ["C5vhYoEJDaP5inVkd"]} -{"Format": "IDEA0", "ID": "9d047a2a-9486-4c90-9743-960f0df37f01", "DetectTime": "2023-10-30T14:05:57.068013+02:00", "EventTime": "2023-10-30T14:05:57.068029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cd4Dzz131cb5rZWPWj"]} -{"Format": "IDEA0", "ID": "379ee5af-c85b-46cb-abc4-7a59651678a4", "DetectTime": "2023-10-30T14:05:57.086435+02:00", "EventTime": "2023-10-30T14:05:57.086447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.187.82.127"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.187.82.127 ", "ContentType": "text/plain"}], "uids": ["CnGMWL2BZTQyuHl6i9"]} -{"Format": "IDEA0", "ID": "30213181-5f46-4a77-ad07-af0d18e6bdad", "DetectTime": "2023-10-30T14:05:57.107932+02:00", "EventTime": "2023-10-30T14:05:57.107949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["91.235.36.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 91.235.36.83 ", "ContentType": "text/plain"}], "uids": ["Ci9I7V3GK4iBwQw4x4"]} -{"Format": "IDEA0", "ID": "a1ea39af-46fe-4118-a521-72015f3d42ca", "DetectTime": "2023-10-30T14:05:57.124952+02:00", "EventTime": "2023-10-30T14:05:57.124964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.218.55.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.218.55.176 ", "ContentType": "text/plain"}], "uids": ["CP7fHNLYxpwtBzVfe"]} -{"Format": "IDEA0", "ID": "438fb823-4a88-4a6a-b79e-5f070e337f59", "DetectTime": "2023-10-30T14:05:57.140156+02:00", "EventTime": "2023-10-30T14:05:57.140166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CFC1cTiMqYlG8BdS9"]} -{"Format": "IDEA0", "ID": "a0e8b43c-bd5e-40c7-94b7-7f5e93542277", "DetectTime": "2023-10-30T14:05:57.159531+02:00", "EventTime": "2023-10-30T14:05:57.159543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CRGFCo3PA769ubCug7"]} -{"Format": "IDEA0", "ID": "0cba03a1-9364-4ad3-9a46-f85ee45d5122", "DetectTime": "2023-10-30T14:05:57.177380+02:00", "EventTime": "2023-10-30T14:05:57.177391+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYsFYS10FprPRXOvzc"]} -{"Format": "IDEA0", "ID": "c99cb2c0-666c-488d-b910-592e4357b787", "DetectTime": "2023-10-30T14:05:57.184015+02:00", "EventTime": "2023-10-30T14:05:57.184030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.137.7.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.137.7.240 ", "ContentType": "text/plain"}], "uids": ["C1MggA1chGsbZjOsV3"]} -{"Format": "IDEA0", "ID": "e6f0f64e-aa36-46e5-a011-dd4887825764", "DetectTime": "2023-10-30T14:05:57.207052+02:00", "EventTime": "2023-10-30T14:05:57.207065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CL2Zrh2Y29QWHHe8nd"]} -{"Format": "IDEA0", "ID": "9035b87a-b0bb-4acb-8522-2ff1d5f7ca37", "DetectTime": "2023-10-30T14:05:57.223022+02:00", "EventTime": "2023-10-30T14:05:57.223034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.198.93.5 ", "ContentType": "text/plain"}], "uids": ["CgQaYI2SNjMPYIdiKf"]} -{"Format": "IDEA0", "ID": "5b29f22a-43c4-47fb-8423-03af94d75163", "DetectTime": "2023-10-30T14:05:57.245771+02:00", "EventTime": "2023-10-30T14:05:57.245791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.14.171.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.14.171.25 ", "ContentType": "text/plain"}], "uids": ["CFd9qR1CN4Bo1pN961"]} -{"Format": "IDEA0", "ID": "22e0042e-f6d6-40fe-a5b3-1b0507f25350", "DetectTime": "2023-10-30T14:05:57.267513+02:00", "EventTime": "2023-10-30T14:05:57.267533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CKQzTz3y0zZk2wbwud", "CDMEj64zOkhmss9r93", "CJYIQz1JZlSqAhalb6", "ChePu72ke5uKTJwdh5"]} -{"Format": "IDEA0", "ID": "e4e6da5d-2c05-4fcd-859f-8961f21cb710", "DetectTime": "2023-10-30T14:05:57.276789+02:00", "EventTime": "2023-10-30T14:05:57.276811+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CDMEj64zOkhmss9r93"]} -{"Format": "IDEA0", "ID": "a170604c-84a9-4004-803b-7c82df6381da", "DetectTime": "2023-10-30T14:05:57.286400+02:00", "EventTime": "2023-10-30T14:05:57.286422+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cw6j8zR7Qbz92aoI1"]} -{"Format": "IDEA0", "ID": "34c5f74d-76d3-4699-9d7b-8ee1c201930a", "DetectTime": "2023-10-30T14:05:57.294420+02:00", "EventTime": "2023-10-30T14:05:57.294445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.188.121"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.188.121 ", "ContentType": "text/plain"}], "uids": ["CQePhNV2mo7rerTga"]} -{"Format": "IDEA0", "ID": "8b0b7505-dddd-4b89-9c7a-e585e89c45c5", "DetectTime": "2023-10-30T14:05:57.318147+02:00", "EventTime": "2023-10-30T14:05:57.318162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.23.51.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.23.51.2 ", "ContentType": "text/plain"}], "uids": ["C8JVzt4kDABtEbFho"]} -{"Format": "IDEA0", "ID": "e190c926-89ff-4d28-963b-25371d33814b", "DetectTime": "2023-10-30T14:05:57.335508+02:00", "EventTime": "2023-10-30T14:05:57.335524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.114.131.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.114.131.45 ", "ContentType": "text/plain"}], "uids": ["CTqy9a48H4vcZRszTl"]} -{"Format": "IDEA0", "ID": "cdd3d792-f905-41df-923f-7a1b1c2532ad", "DetectTime": "2023-10-30T14:05:57.353869+02:00", "EventTime": "2023-10-30T14:05:57.353881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CuSW3fkMoOfQ67mhc"]} -{"Format": "IDEA0", "ID": "d4f1b5f8-7198-424e-aed9-b3130070db77", "DetectTime": "2023-10-30T14:05:57.375085+02:00", "EventTime": "2023-10-30T14:05:57.375102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["C3UhNz2TzMcB25ryNh"]} -{"Format": "IDEA0", "ID": "0ce0a964-e79c-4e98-b57a-b28e2c264835", "DetectTime": "2023-10-30T14:05:57.394906+02:00", "EventTime": "2023-10-30T14:05:57.394925+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cx9BCL1DhO2kpG95Oc"]} -{"Format": "IDEA0", "ID": "f27c4c6c-396f-4ae8-9c16-af211692f7c4", "DetectTime": "2023-10-30T14:05:57.403802+02:00", "EventTime": "2023-10-30T14:05:57.403819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["61.5.44.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 61.5.44.98 ", "ContentType": "text/plain"}], "uids": ["CaCHeJ3sktW5yvNZ95"]} -{"Format": "IDEA0", "ID": "80148c84-0ddc-4afc-b548-2e3407a498ba", "DetectTime": "2023-10-30T14:05:57.423955+02:00", "EventTime": "2023-10-30T14:05:57.423968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.201.136.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.201.136.114 ", "ContentType": "text/plain"}], "uids": ["C7e1V44axcsGF2eIR4"]} -{"Format": "IDEA0", "ID": "d3a831c2-2a4a-43a9-acaa-8d193cbf2f17", "DetectTime": "2023-10-30T14:05:57.438694+02:00", "EventTime": "2023-10-30T14:05:57.438706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.37.144.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.37.144.9 ", "ContentType": "text/plain"}], "uids": ["CTpl9o1XrH1ZCFJcjl"]} -{"Format": "IDEA0", "ID": "94a500a7-c6e3-428e-94e8-49ccaace9ebf", "DetectTime": "2023-10-30T14:05:57.460635+02:00", "EventTime": "2023-10-30T14:05:57.460651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.209.29.166 ", "ContentType": "text/plain"}], "uids": ["CylMUz2I4TPpnnJIfd"]} -{"Format": "IDEA0", "ID": "bf3298af-d60b-4a6e-9660-eb3c0ed5a648", "DetectTime": "2023-10-30T14:05:57.480201+02:00", "EventTime": "2023-10-30T14:05:57.480219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.74.91.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.74.91.96 ", "ContentType": "text/plain"}], "uids": ["CHg5ru4O7YkRKcsYTj"]} -{"Format": "IDEA0", "ID": "5aa872b4-2056-42c3-b82d-c576074f1370", "DetectTime": "2023-10-30T14:05:57.503462+02:00", "EventTime": "2023-10-30T14:05:57.503478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.64.80.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.64.80.71 ", "ContentType": "text/plain"}], "uids": ["CVja5Q1XatZMIaUVAf"]} -{"Format": "IDEA0", "ID": "88fecb28-9a02-4375-88fe-6fe5aa24e314", "DetectTime": "2023-10-30T14:05:57.528161+02:00", "EventTime": "2023-10-30T14:05:57.528177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.53.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.53.83 ", "ContentType": "text/plain"}], "uids": ["C395gT9zP0fCAtPW5"]} -{"Format": "IDEA0", "ID": "2b184a0c-fecf-4713-9c3a-e908662f2ac4", "DetectTime": "2023-10-30T14:05:57.548267+02:00", "EventTime": "2023-10-30T14:05:57.548282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["23.24.76.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 23.24.76.117 ", "ContentType": "text/plain"}], "uids": ["CLq9sO2pWsiQLSxDmj"]} -{"Format": "IDEA0", "ID": "ef98294c-c1f1-4d28-9a5b-e5420bfb9ad1", "DetectTime": "2023-10-30T14:05:57.568148+02:00", "EventTime": "2023-10-30T14:05:57.568165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CAh4cj2UgpJBWZ2Up"]} -{"Format": "IDEA0", "ID": "add356b4-af87-455b-8d87-cf6a0496517c", "DetectTime": "2023-10-30T14:05:57.593676+02:00", "EventTime": "2023-10-30T14:05:57.593696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["CkhLTI1QaIyUlUnJy1"]} -{"Format": "IDEA0", "ID": "0db84aa0-e706-41ea-b3dd-8ebbc7353429", "DetectTime": "2023-10-30T14:05:57.613746+02:00", "EventTime": "2023-10-30T14:05:57.613756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CGvTe6vu3FVpKZuFb"]} -{"Format": "IDEA0", "ID": "0836c147-7bd7-4184-8dda-13b840c385bc", "DetectTime": "2023-10-30T14:05:57.643394+02:00", "EventTime": "2023-10-30T14:05:57.643407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.97.28.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.97.28.139 ", "ContentType": "text/plain"}], "uids": ["CzaH6E3o2iSFlb9p6"]} -{"Format": "IDEA0", "ID": "ae547f81-ce47-4daa-bc79-6510be4dd188", "DetectTime": "2023-10-30T14:05:57.660738+02:00", "EventTime": "2023-10-30T14:05:57.660749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.91.101.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.91.101.29 ", "ContentType": "text/plain"}], "uids": ["C52dIcR9oRhCp1XMe"]} -{"Format": "IDEA0", "ID": "1a688678-63d5-4b0c-993f-a5c5d738f721", "DetectTime": "2023-10-30T14:05:57.682682+02:00", "EventTime": "2023-10-30T14:05:57.682698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.145.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.31.145.117 ", "ContentType": "text/plain"}], "uids": ["C5ljel19MYLqFctEah"]} -{"Format": "IDEA0", "ID": "11a896a6-9edd-43aa-84b9-001bff81cff4", "DetectTime": "2023-10-30T14:05:57.706114+02:00", "EventTime": "2023-10-30T14:05:57.706130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["CMFx3t2xcc9P0GhWK9"]} -{"Format": "IDEA0", "ID": "463674fe-9e68-44a0-aebe-2dc062c955ea", "DetectTime": "2023-10-30T14:05:57.729544+02:00", "EventTime": "2023-10-30T14:05:57.729558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ChdSz13U8ITuWeH0ei"]} -{"Format": "IDEA0", "ID": "48500b51-3304-47ff-b0b8-5cfcbd05f685", "DetectTime": "2023-10-30T14:05:57.746849+02:00", "EventTime": "2023-10-30T14:05:57.746862+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CWoWPY1Wg7KGVA2Dca"]} -{"Format": "IDEA0", "ID": "2c7390fe-ba5a-46d7-adae-2db20d5730bd", "DetectTime": "2023-10-30T14:05:57.753050+02:00", "EventTime": "2023-10-30T14:05:57.753061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.231.149.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.231.149.46 ", "ContentType": "text/plain"}], "uids": ["CfkxiR2XKGx1Sqd4v6"]} -{"Format": "IDEA0", "ID": "152f100b-2137-44e1-9210-9a9c4297830c", "DetectTime": "2023-10-30T14:05:57.776056+02:00", "EventTime": "2023-10-30T14:05:57.776072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CRDzWXCelMLNvBaXd"]} -{"Format": "IDEA0", "ID": "7f1ba699-8398-41e1-838e-c4b9cd912c64", "DetectTime": "2023-10-30T14:05:57.798029+02:00", "EventTime": "2023-10-30T14:05:57.798042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CRMkQrwMFJR7L80ml"]} -{"Format": "IDEA0", "ID": "fc0a612b-f20b-4d04-aa2a-d83b5e6781db", "DetectTime": "2023-10-30T14:05:57.818753+02:00", "EventTime": "2023-10-30T14:05:57.818772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.1.138.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.1.138.200 ", "ContentType": "text/plain"}], "uids": ["Cu6xkW22XLi6BJsMmc"]} -{"Format": "IDEA0", "ID": "b2b20a59-6730-45b4-96b4-b55b016a9937", "DetectTime": "2023-10-30T14:05:57.837452+02:00", "EventTime": "2023-10-30T14:05:57.837465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["ChviTtD3wKFosOyEg"]} -{"Format": "IDEA0", "ID": "3b9d5f6b-83ac-4b29-88fd-efa3a4e10e7e", "DetectTime": "2023-10-30T14:05:57.859930+02:00", "EventTime": "2023-10-30T14:05:57.859951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.61.181.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.61.181.143 ", "ContentType": "text/plain"}], "uids": ["CKfWw51qEo1h69FQVf"]} -{"Format": "IDEA0", "ID": "cbcc3dad-6cd2-444c-b674-0b69f50a560e", "DetectTime": "2023-10-30T14:05:57.884609+02:00", "EventTime": "2023-10-30T14:05:57.884629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.150.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.150.223 ", "ContentType": "text/plain"}], "uids": ["CiFmG2tAzmb8phuX3"]} -{"Format": "IDEA0", "ID": "585e3ce1-260d-40d8-b1cb-410f10dff8a7", "DetectTime": "2023-10-30T14:05:57.909624+02:00", "EventTime": "2023-10-30T14:05:57.909647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CmDroa335CVQYaRUB"]} -{"Format": "IDEA0", "ID": "dd25c7ab-a0e5-46e7-8e2e-617822339063", "DetectTime": "2023-10-30T14:05:57.930298+02:00", "EventTime": "2023-10-30T14:05:57.930313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.33.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.33.95 ", "ContentType": "text/plain"}], "uids": ["CHXBW12SBDDpI8gg84"]} -{"Format": "IDEA0", "ID": "c660c531-1cd8-40bc-801f-6bf3e70438e3", "DetectTime": "2023-10-30T14:05:57.952935+02:00", "EventTime": "2023-10-30T14:05:57.952952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CoEBqx1a2K23trNAMb"]} -{"Format": "IDEA0", "ID": "307a6c7b-e84f-411a-8e30-035b3c9872ed", "DetectTime": "2023-10-30T14:05:57.976453+02:00", "EventTime": "2023-10-30T14:05:57.976469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.39.67.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.39.67.168 ", "ContentType": "text/plain"}], "uids": ["CqJK6W1iZ6UVhSmYq9"]} -{"Format": "IDEA0", "ID": "0f7ba1c7-bacc-4411-95f0-aaa31f70ef9e", "DetectTime": "2023-10-30T14:05:57.997880+02:00", "EventTime": "2023-10-30T14:05:57.997896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.132.190.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.132.190.206 ", "ContentType": "text/plain"}], "uids": ["CqiZSn351d33oiuGvk"]} -{"Format": "IDEA0", "ID": "2bfc8bfe-a929-4d4a-a01f-4a99058fcd9a", "DetectTime": "2023-10-30T14:05:58.017197+02:00", "EventTime": "2023-10-30T14:05:58.017210+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CKdqk94Sg15oXUTZXj"]} -{"Format": "IDEA0", "ID": "54f5c11c-40bc-4eb4-b530-fa509d8d62ea", "DetectTime": "2023-10-30T14:05:58.023042+02:00", "EventTime": "2023-10-30T14:05:58.023052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.7.188"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.7.188 ", "ContentType": "text/plain"}], "uids": ["CnvlZF2cWAb2oOThj2"]} -{"Format": "IDEA0", "ID": "a3660203-a453-4cf5-8ed0-5c9785fb2cce", "DetectTime": "2023-10-30T14:05:58.044543+02:00", "EventTime": "2023-10-30T14:05:58.044559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.49.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.49.99 ", "ContentType": "text/plain"}], "uids": ["CuKox016xNdEuJU2Pk"]} -{"Format": "IDEA0", "ID": "af0c49ea-d2eb-4e69-a2a9-0af604f39de3", "DetectTime": "2023-10-30T14:05:58.066601+02:00", "EventTime": "2023-10-30T14:05:58.066616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.119.5.156 ", "ContentType": "text/plain"}], "uids": ["Cm1yS6WJJrthwxGg9"]} -{"Format": "IDEA0", "ID": "74628224-1c52-490b-a17a-7e9ac64cdfa2", "DetectTime": "2023-10-30T14:05:58.090373+02:00", "EventTime": "2023-10-30T14:05:58.090393+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["ClWeHN3M3VdTOi65ok"]} -{"Format": "IDEA0", "ID": "f8bd2c15-8e5b-4da9-a6b4-5fe4e4d1937d", "DetectTime": "2023-10-30T14:05:58.099872+02:00", "EventTime": "2023-10-30T14:05:58.099894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CRcVYDPFZH0qF56y1"]} -{"Format": "IDEA0", "ID": "e1867352-e87a-4959-9166-e7424a32c973", "DetectTime": "2023-10-30T14:05:58.119658+02:00", "EventTime": "2023-10-30T14:05:58.119675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.7.208.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.7.208.130 ", "ContentType": "text/plain"}], "uids": ["CP1FDW21VEze7Ugqgi"]} -{"Format": "IDEA0", "ID": "1c1d5a3b-ea40-4535-8cc2-cf3a3c170c10", "DetectTime": "2023-10-30T14:05:58.140206+02:00", "EventTime": "2023-10-30T14:05:58.140232+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRShh74NvBtx8hs178"]} -{"Format": "IDEA0", "ID": "ff49ae66-05f6-45f8-8218-34a530a904b1", "DetectTime": "2023-10-30T14:05:58.148923+02:00", "EventTime": "2023-10-30T14:05:58.148934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["CGyhBQUJiFSEpULOh"]} -{"Format": "IDEA0", "ID": "3b3df492-0211-4634-8df4-f78f4ebac826", "DetectTime": "2023-10-30T14:05:58.168407+02:00", "EventTime": "2023-10-30T14:05:58.168423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["194.225.212.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 194.225.212.130 ", "ContentType": "text/plain"}], "uids": ["CqG0OA3lch2ORIGsjb"]} -{"Format": "IDEA0", "ID": "dd3663d1-5fb9-427a-bf9d-11918a0e8dce", "DetectTime": "2023-10-30T14:05:58.185092+02:00", "EventTime": "2023-10-30T14:05:58.185103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.135.114.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.135.114.8 ", "ContentType": "text/plain"}], "uids": ["C1SeEw3HAcbPI81shf"]} -{"Format": "IDEA0", "ID": "aecfa051-c6d1-4aac-a20c-e0e273ed0f39", "DetectTime": "2023-10-30T14:05:58.202261+02:00", "EventTime": "2023-10-30T14:05:58.202273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.25.122.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.25.122.205 ", "ContentType": "text/plain"}], "uids": ["CUt4Uo3tZtaMPGylQb"]} -{"Format": "IDEA0", "ID": "c4873e48-4b82-47d4-bf21-c89c797fad1d", "DetectTime": "2023-10-30T14:05:58.219618+02:00", "EventTime": "2023-10-30T14:05:58.219637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.200.12.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.200.12.76 ", "ContentType": "text/plain"}], "uids": ["C5tdH41rLCJjRZiiEe"]} -{"Format": "IDEA0", "ID": "e2626b13-b1df-45f5-8797-8acbfd275902", "DetectTime": "2023-10-30T14:05:58.237475+02:00", "EventTime": "2023-10-30T14:05:58.237491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.91.199.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.91.199.193 ", "ContentType": "text/plain"}], "uids": ["CkODCk4ASRXSY4Hc8d"]} -{"Format": "IDEA0", "ID": "09299363-1599-4ac9-9cfe-ddc7d79b167f", "DetectTime": "2023-10-30T14:05:58.260840+02:00", "EventTime": "2023-10-30T14:05:58.260855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CocnjQ15fB0vJSQWs9"]} -{"Format": "IDEA0", "ID": "eb650871-62cc-4c6c-9a39-b96aea0cf17e", "DetectTime": "2023-10-30T14:05:58.283336+02:00", "EventTime": "2023-10-30T14:05:58.283352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CZj9mY2jyjMohSiDZ3"]} -{"Format": "IDEA0", "ID": "308047f7-fcf5-4a6a-b913-4f9099daec1d", "DetectTime": "2023-10-30T14:05:58.305558+02:00", "EventTime": "2023-10-30T14:05:58.305572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["ClOE9LZmiE8j8OrIg"]} -{"Format": "IDEA0", "ID": "fb9f98a1-90da-4d7a-9b60-513c38384aa0", "DetectTime": "2023-10-30T14:05:58.322795+02:00", "EventTime": "2023-10-30T14:05:58.322811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.233.201.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.233.201.35 ", "ContentType": "text/plain"}], "uids": ["CdEoJU2133dUVOEoLk"]} -{"Format": "IDEA0", "ID": "2157c067-d5d2-4f6d-a840-7da36eb3d958", "DetectTime": "2023-10-30T14:05:58.342184+02:00", "EventTime": "2023-10-30T14:05:58.342204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.200.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.200.159 ", "ContentType": "text/plain"}], "uids": ["CD5zHd1rBNJb85LTzd"]} -{"Format": "IDEA0", "ID": "5e914a7d-a316-4432-a17b-a342e2ac6b03", "DetectTime": "2023-10-30T14:05:58.358764+02:00", "EventTime": "2023-10-30T14:05:58.358795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.177.99.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.177.99.253 ", "ContentType": "text/plain"}], "uids": ["CzAx583hkbozhJhuVe"]} -{"Format": "IDEA0", "ID": "24e285c5-57b5-4b92-8d1a-81e7b870c88f", "DetectTime": "2023-10-30T14:05:58.380111+02:00", "EventTime": "2023-10-30T14:05:58.380128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CkME7n3T5pTrOuCj76"]} -{"Format": "IDEA0", "ID": "4ef77cb4-be19-4ea3-8e7c-4ebdbfbcdb58", "DetectTime": "2023-10-30T14:05:58.401563+02:00", "EventTime": "2023-10-30T14:05:58.401575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.151.196"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.151.196 ", "ContentType": "text/plain"}], "uids": ["CKpbcMCr9rSIgfTOg"]} -{"Format": "IDEA0", "ID": "3e365faf-df01-4ccf-a4bd-be3b0b652258", "DetectTime": "2023-10-30T14:05:58.423838+02:00", "EventTime": "2023-10-30T14:05:58.423854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.118.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.118.85 ", "ContentType": "text/plain"}], "uids": ["CUlSza3WdrbdXsjPd1"]} -{"Format": "IDEA0", "ID": "69eee3af-e340-4566-9333-7c35bea0a6eb", "DetectTime": "2023-10-30T14:05:58.507682+02:00", "EventTime": "2023-10-30T14:05:58.507712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["160.78.109.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 160.78.109.81 ", "ContentType": "text/plain"}], "uids": ["CcQBYc4TR2noJOeoW8"]} -{"Format": "IDEA0", "ID": "37f80f96-f329-439c-b506-b9ee47b06cac", "DetectTime": "2023-10-30T14:05:58.536270+02:00", "EventTime": "2023-10-30T14:05:58.536287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.179.165.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.179.165.180 ", "ContentType": "text/plain"}], "uids": ["CHx26J3RPkBI2Rsnkg"]} -{"Format": "IDEA0", "ID": "4edf59d3-3345-45a8-b67a-bed2b8148b85", "DetectTime": "2023-10-30T14:05:58.562546+02:00", "EventTime": "2023-10-30T14:05:58.562566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.8.121.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.8.121.235 ", "ContentType": "text/plain"}], "uids": ["CqgOy74UTtRwhSC3w5"]} -{"Format": "IDEA0", "ID": "625ec84b-fd70-42c5-9057-7ec0c5eab092", "DetectTime": "2023-10-30T14:05:58.584293+02:00", "EventTime": "2023-10-30T14:05:58.584314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["CpTzdq1mClVoaizoLf"]} -{"Format": "IDEA0", "ID": "9e7137fb-3ee7-40aa-a42d-de7a85f930e4", "DetectTime": "2023-10-30T14:05:58.605728+02:00", "EventTime": "2023-10-30T14:05:58.605748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CjrApE2JwDPKIFvYqf"]} -{"Format": "IDEA0", "ID": "4570a3e9-53fa-44c3-ab82-618b3abed697", "DetectTime": "2023-10-30T14:05:58.631196+02:00", "EventTime": "2023-10-30T14:05:58.631217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.48.155.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.48.155.216 ", "ContentType": "text/plain"}], "uids": ["CBCX4HDcyzJeqaaWh"]} -{"Format": "IDEA0", "ID": "3aa68a34-29e6-4c45-82d4-5d07121d42d7", "DetectTime": "2023-10-30T14:05:58.656071+02:00", "EventTime": "2023-10-30T14:05:58.656091+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CdqqTWlwra4rxDrpi"]} -{"Format": "IDEA0", "ID": "71e887f2-5131-43cb-9da2-ba1c2fbd8012", "DetectTime": "2023-10-30T14:05:58.664102+02:00", "EventTime": "2023-10-30T14:05:58.664117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.1.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.1.163 ", "ContentType": "text/plain"}], "uids": ["C3RjocIp3vgun6vRe"]} -{"Format": "IDEA0", "ID": "bb98eacb-a871-444b-bbc9-fdedac34cc23", "DetectTime": "2023-10-30T14:05:58.684589+02:00", "EventTime": "2023-10-30T14:05:58.684606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.92.231.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.92.231.157 ", "ContentType": "text/plain"}], "uids": ["CdKTbo3qu1B75gcIQ2"]} -{"Format": "IDEA0", "ID": "6bb6b79c-0474-4091-ab4f-011dc3739518", "DetectTime": "2023-10-30T14:05:58.702380+02:00", "EventTime": "2023-10-30T14:05:58.702391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.9.247.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.9.247.150 ", "ContentType": "text/plain"}], "uids": ["CrgPhS3xoxEdgPiWsi"]} -{"Format": "IDEA0", "ID": "e30f6038-a001-4354-b7e9-b0b9dab6238a", "DetectTime": "2023-10-30T14:05:58.729209+02:00", "EventTime": "2023-10-30T14:05:58.729229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.150.84.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.150.84.28 ", "ContentType": "text/plain"}], "uids": ["CIkU8A2z83FFUMEit7"]} -{"Format": "IDEA0", "ID": "3908ca7e-388d-4e54-b14c-f97e52e4ea1b", "DetectTime": "2023-10-30T14:05:58.752826+02:00", "EventTime": "2023-10-30T14:05:58.752844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.42.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.97.42.133 ", "ContentType": "text/plain"}], "uids": ["CoTADA2m7DfeP7R825"]} -{"Format": "IDEA0", "ID": "d638c033-ee96-4b1e-a7f2-bc0535a5fbf3", "DetectTime": "2023-10-30T14:05:58.777348+02:00", "EventTime": "2023-10-30T14:05:58.777364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.6.140.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.6.140.5 ", "ContentType": "text/plain"}], "uids": ["COjoit7umHYwoBYi"]} -{"Format": "IDEA0", "ID": "2bdf03bb-7927-44d8-adcc-b105fae4e779", "DetectTime": "2023-10-30T14:05:58.802539+02:00", "EventTime": "2023-10-30T14:05:58.802550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["168.187.127.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 168.187.127.206 ", "ContentType": "text/plain"}], "uids": ["CNpTo1YGzegcm3GL6"]} -{"Format": "IDEA0", "ID": "8aeb1268-0f57-4bf5-abef-63ea1018b724", "DetectTime": "2023-10-30T14:05:58.825036+02:00", "EventTime": "2023-10-30T14:05:58.825057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.211.49.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.211.49.137 ", "ContentType": "text/plain"}], "uids": ["CARMAP2zwQvDmZlRf4"]} -{"Format": "IDEA0", "ID": "21e39020-92b0-4606-b217-a71cccec62b6", "DetectTime": "2023-10-30T14:05:58.848828+02:00", "EventTime": "2023-10-30T14:05:58.848843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.181.111.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.181.111.224 ", "ContentType": "text/plain"}], "uids": ["CVwKJ42qwoRNtoHgX8"]} -{"Format": "IDEA0", "ID": "5d5717e9-a934-408b-8833-2645b0d08ae7", "DetectTime": "2023-10-30T14:05:58.873889+02:00", "EventTime": "2023-10-30T14:05:58.873910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.177.164.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.177.164.7 ", "ContentType": "text/plain"}], "uids": ["CsOnuz4RNrYrSdum3e"]} -{"Format": "IDEA0", "ID": "7e5f4b0f-f707-42e3-b576-9915bce4c750", "DetectTime": "2023-10-30T14:05:58.900029+02:00", "EventTime": "2023-10-30T14:05:58.900050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.113.181.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.113.181.147 ", "ContentType": "text/plain"}], "uids": ["CNadm43G8HlxR9GqXd"]} -{"Format": "IDEA0", "ID": "3967790a-4908-42bc-b6b2-fcf011496d18", "DetectTime": "2023-10-30T14:05:58.925951+02:00", "EventTime": "2023-10-30T14:05:58.925966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.187.96.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.187.96.177 ", "ContentType": "text/plain"}], "uids": ["C8jEb82FzxinkMYDO3"]} -{"Format": "IDEA0", "ID": "f319359c-db6d-4925-8680-df84ae70f042", "DetectTime": "2023-10-30T14:05:58.951565+02:00", "EventTime": "2023-10-30T14:05:58.951584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.111.107 ", "ContentType": "text/plain"}], "uids": ["ClY8xh1a9Z44FFZ2jl"]} -{"Format": "IDEA0", "ID": "7dbc7719-436d-4720-825a-e9de51fcbe1d", "DetectTime": "2023-10-30T14:05:58.976437+02:00", "EventTime": "2023-10-30T14:05:58.976454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.109.94.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.109.94.100 ", "ContentType": "text/plain"}], "uids": ["CnVqxf24gcnnmY8mCh"]} -{"Format": "IDEA0", "ID": "0829db28-439e-4cd9-b068-5785cc7da3f6", "DetectTime": "2023-10-30T14:05:58.999490+02:00", "EventTime": "2023-10-30T14:05:58.999506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CifUeq4EAMn1lCPNRc"]} -{"Format": "Json", "ID": "0829db28-439e-4cd9-b068-5785cc7da3f6", "DetectTime": "2023-10-30T14:05:58.999490+02:00", "EventTime": "2023-10-30T14:05:58.999506+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T16:25:57.423635+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2023/10/30 14:05:59.087870)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6d940233-b8d3-4934-a9fd-d79252f433fd", "DetectTime": "2023-10-30T14:05:59.093298+02:00", "EventTime": "2023-10-30T14:05:59.093314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.4.86.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.4.86.90 ", "ContentType": "text/plain"}], "uids": ["Cali0B2S4Vjh7MYjnc"]} -{"Format": "IDEA0", "ID": "d57a5223-e260-4db7-9b98-84a06ed6ad96", "DetectTime": "2023-10-30T14:05:59.119969+02:00", "EventTime": "2023-10-30T14:05:59.119985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.15.117.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.15.117.170 ", "ContentType": "text/plain"}], "uids": ["ChHVUwhG1pHk1Elsa"]} -{"Format": "IDEA0", "ID": "8d525010-770d-48da-bdfc-6ad1dfcd22ce", "DetectTime": "2023-10-30T14:05:59.149351+02:00", "EventTime": "2023-10-30T14:05:59.149371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.227.133.172"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.227.133.172 ", "ContentType": "text/plain"}], "uids": ["Ccb4bv1nDCLLrVrXP1"]} -{"Format": "IDEA0", "ID": "eed35a16-2e0d-4468-814c-08c24b50e65c", "DetectTime": "2023-10-30T14:05:59.175506+02:00", "EventTime": "2023-10-30T14:05:59.175530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["COQvWd1xymPEzepk2f"]} -{"Format": "IDEA0", "ID": "b110998e-6cc5-445c-b6b6-b7507206619f", "DetectTime": "2023-10-30T14:05:59.201096+02:00", "EventTime": "2023-10-30T14:05:59.201116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.198.7.32"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.198.7.32 ", "ContentType": "text/plain"}], "uids": ["Cvtl5s1U4G7iz2ukpj"]} -{"Format": "IDEA0", "ID": "d406193e-62c7-4965-bee5-97e196a689f5", "DetectTime": "2023-10-30T14:05:59.226755+02:00", "EventTime": "2023-10-30T14:05:59.226772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.55.18.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.55.18.199 ", "ContentType": "text/plain"}], "uids": ["C30RShIJgPGLq8ze4"]} -{"Format": "IDEA0", "ID": "082955e9-2b9c-431e-8afc-5d401b68790d", "DetectTime": "2023-10-30T14:05:59.252153+02:00", "EventTime": "2023-10-30T14:05:59.252170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CfSsCw2ELboo5hWBFb"]} -{"Format": "IDEA0", "ID": "b70f2906-16b8-4deb-bb90-8f051a9b5400", "DetectTime": "2023-10-30T14:05:59.276044+02:00", "EventTime": "2023-10-30T14:05:59.276061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.23.173.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.23.173.69 ", "ContentType": "text/plain"}], "uids": ["C6e9h91hrnrxlZfHf3"]} -{"Format": "IDEA0", "ID": "48697f3f-c870-42da-9275-5f455d878f93", "DetectTime": "2023-10-30T14:05:59.302391+02:00", "EventTime": "2023-10-30T14:05:59.302407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CPuCWg33GdUGIcg5fk"]} -{"Format": "IDEA0", "ID": "25d0c092-9fcc-4860-aa55-96368981dc74", "DetectTime": "2023-10-30T14:05:59.331445+02:00", "EventTime": "2023-10-30T14:05:59.331464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CtxLou36mzlYEaVoBa"]} -{"Format": "IDEA0", "ID": "6f14053b-d672-4f95-bd8f-90d0527c13ad", "DetectTime": "2023-10-30T14:05:59.359181+02:00", "EventTime": "2023-10-30T14:05:59.359202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["Cx9BCL1DhO2kpG95Oc", "CRShh74NvBtx8hs178", "CKdqk94Sg15oXUTZXj", "C4yYyK1pIVfZRzVO71"]} -{"Format": "IDEA0", "ID": "be2db252-cddd-4ba6-babb-da36ca2813b3", "DetectTime": "2023-10-30T14:05:59.368060+02:00", "EventTime": "2023-10-30T14:05:59.368079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.122.81.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.122.81.76 ", "ContentType": "text/plain"}], "uids": ["CIxWMf1MLhsITZIvDc"]} -{"Format": "IDEA0", "ID": "38c1a831-1925-4834-b580-e650b4575147", "DetectTime": "2023-10-30T14:05:59.396904+02:00", "EventTime": "2023-10-30T14:05:59.396925+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C4yYyK1pIVfZRzVO71"]} -{"Format": "IDEA0", "ID": "34e9372d-9335-401b-b65b-08aade316a04", "DetectTime": "2023-10-30T14:05:59.406589+02:00", "EventTime": "2023-10-30T14:05:59.406607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CstcZF3PJxz2bc2MPc"]} -{"Format": "IDEA0", "ID": "283dfc9f-662b-452d-b9c1-c63ba9e4b67c", "DetectTime": "2023-10-30T14:05:59.429870+02:00", "EventTime": "2023-10-30T14:05:59.429884+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CUzgaX2ipFAbtEPzTl"]} -{"Format": "IDEA0", "ID": "5a30438c-589e-4d75-9b6f-c7c858799c0c", "DetectTime": "2023-10-30T14:05:59.436201+02:00", "EventTime": "2023-10-30T14:05:59.436213+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CoGl642ZEF6HEZiKu"]} -{"Format": "IDEA0", "ID": "caf333c0-beef-4317-8be5-e0746fa534d3", "DetectTime": "2023-10-30T14:05:59.444092+02:00", "EventTime": "2023-10-30T14:05:59.444110+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMqrgE34FW71wIGTfk"]} -{"Format": "IDEA0", "ID": "6183ac04-e1bb-4262-80dd-eeba11a13280", "DetectTime": "2023-10-30T14:05:59.451855+02:00", "EventTime": "2023-10-30T14:05:59.451873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CQ14IE1cf4f6xNeFpi"]} -{"Format": "IDEA0", "ID": "1811595c-189e-41ad-bbfa-df28846fbb2d", "DetectTime": "2023-10-30T14:05:59.483496+02:00", "EventTime": "2023-10-30T14:05:59.483513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CCb3Bc3cQaOI26LWJg"]} -{"Format": "IDEA0", "ID": "80feb4a8-4efc-4080-959c-796c2a5d2c85", "DetectTime": "2023-10-30T14:05:59.513485+02:00", "EventTime": "2023-10-30T14:05:59.513496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CPlkiG2drcJg3w6HBf"]} -{"Format": "IDEA0", "ID": "0f30c7ae-d165-46d0-86dc-ccd823749afc", "DetectTime": "2023-10-30T14:05:59.547762+02:00", "EventTime": "2023-10-30T14:05:59.547775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CNv0Gl4bGw655P9aK8"]} -{"Format": "IDEA0", "ID": "b99d8433-7d1a-4ca5-aa66-14da2511cd13", "DetectTime": "2023-10-30T14:05:59.578655+02:00", "EventTime": "2023-10-30T14:05:59.578673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["Cw70Tr1zFxPfgIOvbk"]} -{"Format": "IDEA0", "ID": "0905a735-1eb7-4295-bc4c-9f6785e58cac", "DetectTime": "2023-10-30T14:05:59.607043+02:00", "EventTime": "2023-10-30T14:05:59.607069+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRcd0P29kUlYyQgd0d"]} -{"Format": "IDEA0", "ID": "ee3e0a9f-51e7-495c-9b81-98a9d5c07db1", "DetectTime": "2023-10-30T14:05:59.613370+02:00", "EventTime": "2023-10-30T14:05:59.613381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.15.211"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.58.15.211 ", "ContentType": "text/plain"}], "uids": ["CBdqCw3AxVSHnE3cc4"]} -{"Format": "IDEA0", "ID": "2b9a8472-29c1-4708-bcfd-30dc9d3f5091", "DetectTime": "2023-10-30T14:05:59.639944+02:00", "EventTime": "2023-10-30T14:05:59.639959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CxTfSp8mztmfUYFHc"]} -{"Format": "IDEA0", "ID": "d63e4474-2486-4b65-be53-e367494fc1c8", "DetectTime": "2023-10-30T14:05:59.671880+02:00", "EventTime": "2023-10-30T14:05:59.671896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CBu0fV1FC5AZx5VPv3"]} -{"Format": "IDEA0", "ID": "370fa44f-1366-4d19-bf6a-137441ded4bf", "DetectTime": "2023-10-30T14:05:59.700089+02:00", "EventTime": "2023-10-30T14:05:59.700106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["C6nMwO2Ap7bH7iRUhh"]} -{"Format": "IDEA0", "ID": "842d8f5b-ee70-4bdf-ac99-9e89c200b2be", "DetectTime": "2023-10-30T14:05:59.732534+02:00", "EventTime": "2023-10-30T14:05:59.732552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CKiHiQ2lJLUjJNARQg"]} -{"Format": "IDEA0", "ID": "3ec99e61-8a56-43b5-9c06-650412094358", "DetectTime": "2023-10-30T14:05:59.765467+02:00", "EventTime": "2023-10-30T14:05:59.765483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["Co9k8822ZwKcxOAAWk"]} -{"Format": "IDEA0", "ID": "5b090004-1b04-4455-81cf-5139adf282d2", "DetectTime": "2023-10-30T14:05:59.793464+02:00", "EventTime": "2023-10-30T14:05:59.793478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["CyCtCw1xpRxQMTvpW8"]} -{"Format": "IDEA0", "ID": "30538911-96b5-4945-a896-674ea2f90b95", "DetectTime": "2023-10-30T14:05:59.819755+02:00", "EventTime": "2023-10-30T14:05:59.819766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.137.7.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.137.7.240 ", "ContentType": "text/plain"}], "uids": ["Cts13b4x3OUer88fBb"]} -{"Format": "IDEA0", "ID": "cec78c52-b9e3-4510-ae37-ac95bbf46680", "DetectTime": "2023-10-30T14:05:59.850258+02:00", "EventTime": "2023-10-30T14:05:59.850274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["Cm4w8C1tVnMxKl98B7"]} -{"Format": "IDEA0", "ID": "c573fe25-8a68-49ca-9d46-4928ac6f4234", "DetectTime": "2023-10-30T14:05:59.882833+02:00", "EventTime": "2023-10-30T14:05:59.882845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CV0Y0Z1gsdUSUA77fc"]} -{"Format": "IDEA0", "ID": "9f24a6b9-adb1-4541-b699-434b45855487", "DetectTime": "2023-10-30T14:05:59.914149+02:00", "EventTime": "2023-10-30T14:05:59.914202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CawUrv2kyO8LECnwo1"]} -{"Format": "IDEA0", "ID": "e966c3ed-92a6-451a-a110-5ac25dc16d24", "DetectTime": "2023-10-30T14:05:59.949235+02:00", "EventTime": "2023-10-30T14:05:59.949247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["C7G5EMoqyreewvdha"]} -{"Format": "IDEA0", "ID": "73514930-848d-4f91-80e3-91170fcfbcb9", "DetectTime": "2023-10-30T14:05:59.981976+02:00", "EventTime": "2023-10-30T14:05:59.981991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["C8lbnP2VTwWAf1jnv4"]} -{"Format": "IDEA0", "ID": "7f02f661-90b6-4a4c-bbf9-ff1418cbcebf", "DetectTime": "2023-10-30T14:06:00.020864+02:00", "EventTime": "2023-10-30T14:06:00.020877+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CrPd6u3x5wN13Cy1W6"]} -{"Format": "IDEA0", "ID": "c6a15b45-71d2-493c-b672-1bb85ae78080", "DetectTime": "2023-10-30T14:06:00.028211+02:00", "EventTime": "2023-10-30T14:06:00.028224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CW99Eb1HvWLYQhKnb7"]} -{"Format": "IDEA0", "ID": "0f2e0673-3a34-49e0-8d23-4f3d43be3988", "DetectTime": "2023-10-30T14:06:00.060151+02:00", "EventTime": "2023-10-30T14:06:00.060168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CfhTyQ2GDiUkammuzg"]} -{"Format": "IDEA0", "ID": "db7403d2-c1d7-4a27-9d44-cc047aec0a4d", "DetectTime": "2023-10-30T14:06:00.087308+02:00", "EventTime": "2023-10-30T14:06:00.087325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CYueS72hijGgpLWwT5"]} -{"Format": "IDEA0", "ID": "32e2829f-7249-4315-aa00-6ad7ad0002e9", "DetectTime": "2023-10-30T14:06:00.115418+02:00", "EventTime": "2023-10-30T14:06:00.115431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.198.93.5 ", "ContentType": "text/plain"}], "uids": ["CDXU8b1PejTQ0FCaSa"]} -{"Format": "IDEA0", "ID": "ec217efd-6a18-48c4-945d-93366c81e5dc", "DetectTime": "2023-10-30T14:06:00.139380+02:00", "EventTime": "2023-10-30T14:06:00.139405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CASOuM18j6NZDrYGUa"]} -{"Format": "IDEA0", "ID": "1ebd2198-1351-48fa-b2a0-d976a3d85366", "DetectTime": "2023-10-30T14:06:00.167236+02:00", "EventTime": "2023-10-30T14:06:00.167249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CQTKTs2tPhYU9vqlt6"]} -{"Format": "IDEA0", "ID": "36647c2b-ce43-46b4-bf1f-c36081de4a2d", "DetectTime": "2023-10-30T14:06:00.196610+02:00", "EventTime": "2023-10-30T14:06:00.196621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CqIYdsjGqdXZYCXG9"]} -{"Format": "IDEA0", "ID": "f0cde1c4-2924-4a4e-8712-a4de45fb1a63", "DetectTime": "2023-10-30T14:06:00.220117+02:00", "EventTime": "2023-10-30T14:06:00.220129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.119.5.156 ", "ContentType": "text/plain"}], "uids": ["CX2ziADcxqCHlVqld"]} -{"Format": "IDEA0", "ID": "55eaff8b-e850-4126-9d1c-d813b07c599a", "DetectTime": "2023-10-30T14:06:00.244438+02:00", "EventTime": "2023-10-30T14:06:00.244452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["C2oiGj1umIkFjRDmOg"]} -{"Format": "IDEA0", "ID": "ffb3c07f-ec35-4dad-99d5-901944687cbe", "DetectTime": "2023-10-30T14:06:00.267742+02:00", "EventTime": "2023-10-30T14:06:00.267754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.209.29.166 ", "ContentType": "text/plain"}], "uids": ["Cs26llwPfDOL3UCj8"]} -{"Format": "IDEA0", "ID": "730a2e5a-af06-48cf-8884-a89dac3a65a2", "DetectTime": "2023-10-30T14:06:00.292827+02:00", "EventTime": "2023-10-30T14:06:00.292840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.64.80.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.64.80.71 ", "ContentType": "text/plain"}], "uids": ["COtK3WXbHQEgL5sW7"]} -{"Format": "IDEA0", "ID": "6aa12523-8d76-4326-8539-30af2640dfe4", "DetectTime": "2023-10-30T14:06:00.320506+02:00", "EventTime": "2023-10-30T14:06:00.320527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["Co5Qra2dnYf0ZDWQwg"]} -{"Format": "IDEA0", "ID": "d44bc4b1-74ac-4c18-a127-14a44f00cb23", "DetectTime": "2023-10-30T14:06:00.423278+02:00", "EventTime": "2023-10-30T14:06:00.423302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["Chjgv6ffiQa0I5IVa"]} -{"Format": "IDEA0", "ID": "f2d9a95d-6379-48d3-8838-f4541d4cc483", "DetectTime": "2023-10-30T14:06:00.458000+02:00", "EventTime": "2023-10-30T14:06:00.458024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CqKitJ1m8kGefPZmji"]} -{"Format": "IDEA0", "ID": "6c1da922-cdb7-4c5c-9c32-e99626afdffb", "DetectTime": "2023-10-30T14:06:00.489740+02:00", "EventTime": "2023-10-30T14:06:00.489756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["C4sV2z1Mcxi2VyLT5i"]} -{"Format": "IDEA0", "ID": "d97e5d2d-ddfd-4115-902a-aa3b866e61d6", "DetectTime": "2023-10-30T14:06:00.519558+02:00", "EventTime": "2023-10-30T14:06:00.519572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4034], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. ", "ContentType": "text/plain"}], "uids": ["CWHloX4dp9AlqBjR8"]} -{"Format": "IDEA0", "ID": "194039a3-c42b-41ea-872d-1267de1a49d8", "DetectTime": "2023-10-30T14:06:00.558821+02:00", "EventTime": "2023-10-30T14:06:00.558841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CDmyDy2x4WzTjWOz2i"]} -{"Format": "IDEA0", "ID": "a506ef45-e9e3-48da-84e3-da1abd18a00d", "DetectTime": "2023-10-30T14:06:00.591971+02:00", "EventTime": "2023-10-30T14:06:00.591989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CUTKUE2hxC9sMvfWKj"]} -{"Format": "IDEA0", "ID": "53fcd306-6d35-495e-a9b1-713b23f4ea88", "DetectTime": "2023-10-30T14:06:00.627287+02:00", "EventTime": "2023-10-30T14:06:00.627304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["Cv5CSuYu47F8J794e"]} -{"Format": "IDEA0", "ID": "47aef9d6-0519-4415-b847-1023adb83c21", "DetectTime": "2023-10-30T14:06:00.657254+02:00", "EventTime": "2023-10-30T14:06:00.657276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Chf5rX1TPzWrst5KP7"]} -{"Format": "IDEA0", "ID": "e84d0abc-4200-42e2-93d4-9052a32c2671", "DetectTime": "2023-10-30T14:06:00.690344+02:00", "EventTime": "2023-10-30T14:06:00.690362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.150.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.150.223 ", "ContentType": "text/plain"}], "uids": ["CBVr9v30QuAp0fbWff"]} -{"Format": "IDEA0", "ID": "e24bfa59-b4b2-4f1c-9e3e-2ff8b878d9e0", "DetectTime": "2023-10-30T14:06:00.725037+02:00", "EventTime": "2023-10-30T14:06:00.725050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.49.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.49.99 ", "ContentType": "text/plain"}], "uids": ["CEIPCG34ZaDsu5Eybg"]} -{"Format": "IDEA0", "ID": "38324a22-4bb8-4697-ae63-a4094271d1de", "DetectTime": "2023-10-30T14:06:00.763194+02:00", "EventTime": "2023-10-30T14:06:00.763211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["C1b8xVDuDLzVeV3I4"]} -{"Format": "IDEA0", "ID": "d194831e-5c7e-4a22-99c0-0f229cf56c7a", "DetectTime": "2023-10-30T14:06:00.798186+02:00", "EventTime": "2023-10-30T14:06:00.798203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CLC8v33yOn4gNH4mc2"]} -{"Format": "IDEA0", "ID": "d13c1067-c774-4247-9f93-a66bfce8a533", "DetectTime": "2023-10-30T14:06:00.839873+02:00", "EventTime": "2023-10-30T14:06:00.839896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.74.91.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.74.91.96 ", "ContentType": "text/plain"}], "uids": ["CSmThp4Jl8Xi78WOjf"]} -{"Format": "IDEA0", "ID": "26a5c893-563d-492f-8479-a85f4ce3d423", "DetectTime": "2023-10-30T14:06:00.869825+02:00", "EventTime": "2023-10-30T14:06:00.869836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cua0eV3jD7NromN4ch"]} -{"Format": "IDEA0", "ID": "e55a50f5-78d3-4653-be53-f7a0e9e4d568", "DetectTime": "2023-10-30T14:06:00.902538+02:00", "EventTime": "2023-10-30T14:06:00.902556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["C6eVCW2XkWbp1MA5j"]} -{"Format": "IDEA0", "ID": "7faddd75-ade6-4874-8fdb-5bc127cf8825", "DetectTime": "2023-10-30T14:06:00.940548+02:00", "EventTime": "2023-10-30T14:06:00.940560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["C6ovqMQAHyRLcl9F8"]} -{"Format": "IDEA0", "ID": "37357253-37ab-4a55-885a-87f09dbfeb0a", "DetectTime": "2023-10-30T14:06:00.968680+02:00", "EventTime": "2023-10-30T14:06:00.968706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["C2hR0OrFoRju5WXy9"]} -{"Format": "IDEA0", "ID": "3b649c9c-423e-4467-864c-16c096dff8bd", "DetectTime": "2023-10-30T14:06:01.003377+02:00", "EventTime": "2023-10-30T14:06:01.003395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.111.107 ", "ContentType": "text/plain"}], "uids": ["CaZkl6gO8kXW83NQb"]} -{"Format": "IDEA0", "ID": "839ded96-6736-4515-b59e-7cc1f730eff5", "DetectTime": "2023-10-30T14:06:01.039888+02:00", "EventTime": "2023-10-30T14:06:01.039908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CrLUo23oIlqi9H7Dc5"]} -{"Format": "IDEA0", "ID": "cc8e02f5-0955-4d0c-a8cc-e05d17ab1bc7", "DetectTime": "2023-10-30T14:06:01.075915+02:00", "EventTime": "2023-10-30T14:06:01.075934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.15.211"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.58.15.211 ", "ContentType": "text/plain"}], "uids": ["CgmlQ42khEKFokQ93a"]} -{"Format": "IDEA0", "ID": "0734d784-1eb5-48f2-869b-4d6802787765", "DetectTime": "2023-10-30T14:06:01.111924+02:00", "EventTime": "2023-10-30T14:06:01.111942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.64.80.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.64.80.71 ", "ContentType": "text/plain"}], "uids": ["Ck7AgM1vtwZ5NXBqv9"]} -{"Format": "IDEA0", "ID": "ef36288b-7f23-469f-af1c-f9fcec873ebd", "DetectTime": "2023-10-30T14:06:01.138909+02:00", "EventTime": "2023-10-30T14:06:01.138926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CU7tKC0aJ4Htvni9k"]} -{"Format": "IDEA0", "ID": "98158f59-ff61-4ab7-8e9b-f3a3adcc394c", "DetectTime": "2023-10-30T14:06:01.166190+02:00", "EventTime": "2023-10-30T14:06:01.166208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.187.96.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.187.96.177 ", "ContentType": "text/plain"}], "uids": ["CB3q7g3HWSdEtWUqnd"]} -{"Format": "IDEA0", "ID": "5a5addca-55e0-45fd-a997-cd61130a1501", "DetectTime": "2023-10-30T14:06:01.196370+02:00", "EventTime": "2023-10-30T14:06:01.196387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["Cbuhp61pSwLUdo2imh"]} -{"Format": "IDEA0", "ID": "45e7198c-d437-4d4e-ad4c-d81f40f6c27c", "DetectTime": "2023-10-30T14:06:01.231447+02:00", "EventTime": "2023-10-30T14:06:01.231463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cbd0YU3lR2hZ0JntZi"]} -{"Format": "IDEA0", "ID": "72c7477a-52b7-4e1a-a2f2-098a25c185fc", "DetectTime": "2023-10-30T14:06:01.266733+02:00", "EventTime": "2023-10-30T14:06:01.266750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["C6CXup3db3GnrT7K73"]} -{"Format": "IDEA0", "ID": "43f5f3d6-0774-49b8-8802-2e691f8a8caa", "DetectTime": "2023-10-30T14:06:01.300499+02:00", "EventTime": "2023-10-30T14:06:01.300514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CuvcIo1QDCJbCEMBJ3"]} -{"Format": "IDEA0", "ID": "20eff3fd-2514-4b8e-8e36-84166f274f38", "DetectTime": "2023-10-30T14:06:01.338252+02:00", "EventTime": "2023-10-30T14:06:01.338269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["Cx8PHh2lNGakfXBgOc"]} -{"Format": "IDEA0", "ID": "949ef133-45cf-4bf3-aba5-003e26a43b68", "DetectTime": "2023-10-30T14:06:01.371858+02:00", "EventTime": "2023-10-30T14:06:01.371876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.181.111.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.181.111.224 ", "ContentType": "text/plain"}], "uids": ["C3fAte22fb1N186rZb"]} -{"Format": "IDEA0", "ID": "96cf1f86-8338-4564-8798-52d6631c2454", "DetectTime": "2023-10-30T14:06:01.400670+02:00", "EventTime": "2023-10-30T14:06:01.400680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.187.96.177"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.187.96.177 ", "ContentType": "text/plain"}], "uids": ["Cr3pep3JE8bXS2rC4d"]} -{"Format": "IDEA0", "ID": "98670630-74ad-4851-85ed-3a12a2cb447d", "DetectTime": "2023-10-30T14:06:01.432368+02:00", "EventTime": "2023-10-30T14:06:01.432388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["ClWqwJkS9tjzPLuX3"]} -{"Format": "IDEA0", "ID": "5d8c5d14-0447-41d1-ae3d-6d310b078078", "DetectTime": "2023-10-30T14:06:01.464016+02:00", "EventTime": "2023-10-30T14:06:01.464032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CC1nHC2kQatYeueGa8"]} -{"Format": "IDEA0", "ID": "7ee64356-b657-4767-b7c7-ea58392301b4", "DetectTime": "2023-10-30T14:06:01.492392+02:00", "EventTime": "2023-10-30T14:06:01.492408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.150.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.68.150.223 ", "ContentType": "text/plain"}], "uids": ["CSrWly4LOoBHmXecZb"]} -{"Format": "IDEA0", "ID": "620f3bcf-3a3d-4a5e-b3d3-401cb4bd62fb", "DetectTime": "2023-10-30T14:06:01.526596+02:00", "EventTime": "2023-10-30T14:06:01.526613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.74.91.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.74.91.96 ", "ContentType": "text/plain"}], "uids": ["Ccb9ax3UFmStz1FRjk"]} -{"Format": "IDEA0", "ID": "f3f52519-b59c-4755-9981-958b9f85cd78", "DetectTime": "2023-10-30T14:06:01.560345+02:00", "EventTime": "2023-10-30T14:06:01.560361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.181.111.224"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.181.111.224 ", "ContentType": "text/plain"}], "uids": ["CbbTnGZvxULxT0RA1"]} -{"Format": "IDEA0", "ID": "9b20dbef-7f86-40f9-bf11-8d2bb452cd4a", "DetectTime": "2023-10-30T14:06:01.594757+02:00", "EventTime": "2023-10-30T14:06:01.594776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["C2Kvnt2rf5lx07STk4"]} -{"Format": "IDEA0", "ID": "a59069e7-c2d5-45fe-9677-ef62bbb2f1ec", "DetectTime": "2023-10-30T14:06:01.627100+02:00", "EventTime": "2023-10-30T14:06:01.627116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CKjopw4eMnSuycGSS3"]} -{"Format": "IDEA0", "ID": "ce2ebbd8-b3f9-44ff-a00d-d16c4ab56556", "DetectTime": "2023-10-30T14:06:01.659738+02:00", "EventTime": "2023-10-30T14:06:01.659765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CHskRH20r0dcRBUuvj"]} -{"Format": "IDEA0", "ID": "86bd3bf9-2a9c-4aeb-bad0-d801669d4115", "DetectTime": "2023-10-30T14:06:01.695418+02:00", "EventTime": "2023-10-30T14:06:01.695439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CQvAvkDYCHSYb4lp4"]} -{"Format": "IDEA0", "ID": "3485ff93-1d04-484d-a4f6-44a89d22d853", "DetectTime": "2023-10-30T14:06:01.729152+02:00", "EventTime": "2023-10-30T14:06:01.729168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.113.181.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.113.181.147 ", "ContentType": "text/plain"}], "uids": ["COzb824X1XSUy0lUmc"]} -{"Format": "IDEA0", "ID": "67fb2d47-0e70-4f7b-8d8d-7a5271264c27", "DetectTime": "2023-10-30T14:06:01.763246+02:00", "EventTime": "2023-10-30T14:06:01.763262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["CAh5B63GCRrCWrrFX7"]} -{"Format": "IDEA0", "ID": "954c7196-61f3-4b6c-8660-81d420acd7b6", "DetectTime": "2023-10-30T14:06:01.798075+02:00", "EventTime": "2023-10-30T14:06:01.798097+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CeE7643GFqi3yR1Anl"]} -{"Format": "IDEA0", "ID": "38e42644-2f04-4cd1-a460-cef8ee9ca828", "DetectTime": "2023-10-30T14:06:01.806601+02:00", "EventTime": "2023-10-30T14:06:01.806618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.137.7.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.137.7.240 ", "ContentType": "text/plain"}], "uids": ["C0TlQ11HBpWt2j3wQ"]} -{"Format": "IDEA0", "ID": "6144ca41-aeb9-495b-8d80-5880c93bbdb7", "DetectTime": "2023-10-30T14:06:01.839650+02:00", "EventTime": "2023-10-30T14:06:01.839666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CE2JsHgJVLVHUb388"]} -{"Format": "IDEA0", "ID": "624a8eae-9b44-42a9-b06b-028ff4b7c499", "DetectTime": "2023-10-30T14:06:01.876964+02:00", "EventTime": "2023-10-30T14:06:01.876985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.113.181.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.113.181.147 ", "ContentType": "text/plain"}], "uids": ["C0wxga3hMpuC6Jt5Ng"]} -{"Format": "IDEA0", "ID": "7f7dbc88-e605-4dad-8b7c-14b5c6ff4b15", "DetectTime": "2023-10-30T14:06:01.909384+02:00", "EventTime": "2023-10-30T14:06:01.909400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CDFWIi3nwdXuOXb9Yg"]} -{"Format": "IDEA0", "ID": "ccd3bfbc-4228-40a7-b9a8-0d038864d389", "DetectTime": "2023-10-30T14:06:01.941779+02:00", "EventTime": "2023-10-30T14:06:01.941797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CcE8Rw2tWUGhPUt5K8"]} -{"Format": "IDEA0", "ID": "13a589f7-158e-4991-892e-435ddd2bc67f", "DetectTime": "2023-10-30T14:06:01.977797+02:00", "EventTime": "2023-10-30T14:06:01.977815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cckf4m47mmSh7ONNh1"]} -{"Format": "IDEA0", "ID": "8f2f1a75-ddf4-4106-b7f5-67440db7907c", "DetectTime": "2023-10-30T14:06:02.009098+02:00", "EventTime": "2023-10-30T14:06:02.009109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CMpsgX2Re3jTpxpNX2"]} -{"Format": "IDEA0", "ID": "4294142c-04eb-4830-a7a4-266cf8918673", "DetectTime": "2023-10-30T14:06:02.036920+02:00", "EventTime": "2023-10-30T14:06:02.036935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CiDqqC3j2omEuTYQYk"]} -{"Format": "IDEA0", "ID": "9024ff5c-58f6-434f-b914-937323e6b755", "DetectTime": "2023-10-30T14:06:02.068644+02:00", "EventTime": "2023-10-30T14:06:02.068660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CwDjdV0zkTuhprvRj"]} -{"Format": "IDEA0", "ID": "af570188-48eb-43f3-8a92-bd187af9cfd9", "DetectTime": "2023-10-30T14:06:02.094074+02:00", "EventTime": "2023-10-30T14:06:02.094086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CG3wB9UTX8lAi2e07"]} -{"Format": "IDEA0", "ID": "8ae9cd6d-eb91-4fd6-bc05-e30677a1b67c", "DetectTime": "2023-10-30T14:06:02.119245+02:00", "EventTime": "2023-10-30T14:06:02.119256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["CFF5VH2esiVNVkRqN1"]} -{"Format": "IDEA0", "ID": "1692af32-56f7-4754-bd5b-32a936649a12", "DetectTime": "2023-10-30T14:06:02.143382+02:00", "EventTime": "2023-10-30T14:06:02.143395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CKCkkg0ZJ2OE8QLi2"]} -{"Format": "IDEA0", "ID": "fde9dfe4-1974-49b4-8c8d-ae54c07295eb", "DetectTime": "2023-10-30T14:06:02.169840+02:00", "EventTime": "2023-10-30T14:06:02.169856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7196], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. ", "ContentType": "text/plain"}], "uids": ["CyNEiJ1wAjlA9LPRL4"]} -{"Format": "IDEA0", "ID": "8532fb48-e8ff-48e0-992f-60f5b4a11004", "DetectTime": "2023-10-30T14:06:02.202628+02:00", "EventTime": "2023-10-30T14:06:02.202645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CForhlRWXayCEs7A7"]} -{"Format": "IDEA0", "ID": "14d71acf-dc66-422d-8d9d-08b7617d3792", "DetectTime": "2023-10-30T14:06:02.227028+02:00", "EventTime": "2023-10-30T14:06:02.227040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CaRoXV2l4aurd9DMz"]} -{"Format": "IDEA0", "ID": "7156058b-7a36-48a2-ab96-b058e0694ed0", "DetectTime": "2023-10-30T14:06:02.251730+02:00", "EventTime": "2023-10-30T14:06:02.251742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CdgzRd35FLpxjjl4Bk"]} -{"Format": "IDEA0", "ID": "e4beb5f2-60b8-4e18-b884-7648ac2b7d06", "DetectTime": "2023-10-30T14:06:02.282736+02:00", "EventTime": "2023-10-30T14:06:02.282751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CYJBbBuXTrXOlBSzg"]} -{"Format": "IDEA0", "ID": "53d730ce-53f5-44cd-a620-18c00c57c1eb", "DetectTime": "2023-10-30T14:06:02.311312+02:00", "EventTime": "2023-10-30T14:06:02.311331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["C8Yt432BwDgBjucnrd"]} -{"Format": "IDEA0", "ID": "53fd23bb-1a84-427b-81b6-42fe6cec8cb8", "DetectTime": "2023-10-30T14:06:02.344857+02:00", "EventTime": "2023-10-30T14:06:02.344879+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cef4ox1oiue9lXboS9"]} -{"Format": "IDEA0", "ID": "8c2642d3-13f7-4889-8823-0a83b39bf8d0", "DetectTime": "2023-10-30T14:06:02.352921+02:00", "EventTime": "2023-10-30T14:06:02.352941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CBIqrc4fpErwGj4On8"]} -{"Format": "IDEA0", "ID": "27d489c8-7b06-4caa-a02d-94886871df4e", "DetectTime": "2023-10-30T14:06:02.376880+02:00", "EventTime": "2023-10-30T14:06:02.376896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cq3PHt3jghOkB1Inak"]} -{"Format": "IDEA0", "ID": "4c1c0948-fe13-4a81-90be-d6e093bf85db", "DetectTime": "2023-10-30T14:06:02.410168+02:00", "EventTime": "2023-10-30T14:06:02.410185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CeE7643GFqi3yR1Anl", "CoGl642ZEF6HEZiKu", "CRcd0P29kUlYyQgd0d", "CUtwjn4DqveygOq7R8"]} -{"Format": "IDEA0", "ID": "27b9bbc3-6e88-4f61-ad69-8257b121c753", "DetectTime": "2023-10-30T14:06:02.417126+02:00", "EventTime": "2023-10-30T14:06:02.417137+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUtwjn4DqveygOq7R8"]} -{"Format": "IDEA0", "ID": "269d996e-ed6f-4be5-82b3-cbe58661ba0d", "DetectTime": "2023-10-30T14:06:02.423401+02:00", "EventTime": "2023-10-30T14:06:02.423412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C3iaZs2kyzR55AMRw9"]} -{"Format": "IDEA0", "ID": "f715c133-b177-414f-a643-58320f0fb1c2", "DetectTime": "2023-10-30T14:06:02.445264+02:00", "EventTime": "2023-10-30T14:06:02.445283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["CmDCR82T8GzOwhJhL1"]} -{"Format": "IDEA0", "ID": "c0b64285-be7a-4fbc-a7c5-5b01a2df9e7d", "DetectTime": "2023-10-30T14:06:02.474578+02:00", "EventTime": "2023-10-30T14:06:02.474590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.209.29.166 ", "ContentType": "text/plain"}], "uids": ["Cy2V3l2B3k6OVeean8"]} -{"Format": "IDEA0", "ID": "d0b696c6-800e-49e5-88b4-02b5b7f1a777", "DetectTime": "2023-10-30T14:06:02.502256+02:00", "EventTime": "2023-10-30T14:06:02.502274+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CSJrFQ1zo47OaDlPNg"]} -{"Format": "IDEA0", "ID": "a8bd79bb-7a2c-4a9a-bd68-0c2be020628b", "DetectTime": "2023-10-30T14:06:02.508297+02:00", "EventTime": "2023-10-30T14:06:02.508315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CscBsU3d99eSJLa7gl"]} -{"Format": "IDEA0", "ID": "44393a3c-6dd6-4503-a08b-5a8857d38784", "DetectTime": "2023-10-30T14:06:02.530905+02:00", "EventTime": "2023-10-30T14:06:02.530923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CaAmLK2dUGI4pZ0ySc"]} -{"Format": "IDEA0", "ID": "238c6ca6-7d14-436c-9040-d80798f6e3ba", "DetectTime": "2023-10-30T14:06:02.562568+02:00", "EventTime": "2023-10-30T14:06:02.562579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CeV03Z1XpSr1Yzw7Pa"]} -{"Format": "IDEA0", "ID": "20eb56b8-3255-459f-8a1c-4e27de102358", "DetectTime": "2023-10-30T14:06:02.583083+02:00", "EventTime": "2023-10-30T14:06:02.583095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.49.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.49.99 ", "ContentType": "text/plain"}], "uids": ["CUq31G2EciEg60kME7"]} -{"Format": "IDEA0", "ID": "78fa42a3-0448-49b8-8d96-20e3119c6539", "DetectTime": "2023-10-30T14:06:02.605518+02:00", "EventTime": "2023-10-30T14:06:02.605538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["C4WuDa4UVWKVgRAmqf"]} -{"Format": "IDEA0", "ID": "622f2569-1a5e-43e9-bd02-6e831b1c0019", "DetectTime": "2023-10-30T14:06:02.629120+02:00", "EventTime": "2023-10-30T14:06:02.629133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CAYx6Q1oP30XSrm0tk"]} -{"Format": "IDEA0", "ID": "ae199e1f-0fe7-401c-b470-188258a433e0", "DetectTime": "2023-10-30T14:06:02.654436+02:00", "EventTime": "2023-10-30T14:06:02.654453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.198.93.5 ", "ContentType": "text/plain"}], "uids": ["CRJtFf2IV6a5iRMJC"]} -{"Format": "IDEA0", "ID": "27afd871-e45f-4b9d-87a5-6d9c1d16f029", "DetectTime": "2023-10-30T14:06:02.678125+02:00", "EventTime": "2023-10-30T14:06:02.678139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["ChUkFC1XYO287Yt925"]} -{"Format": "IDEA0", "ID": "3a367ca5-e7e8-4d7a-bbe2-a4c54c42b90e", "DetectTime": "2023-10-30T14:06:02.696831+02:00", "EventTime": "2023-10-30T14:06:02.696845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.198.93.5 ", "ContentType": "text/plain"}], "uids": ["CRBjXzl5iMsucjeG2"]} -{"Format": "IDEA0", "ID": "0cb8de4c-b042-4a4e-9ea2-c14735cfb49e", "DetectTime": "2023-10-30T14:06:02.722679+02:00", "EventTime": "2023-10-30T14:06:02.722699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["CWoG28SyGaG676tWa"]} -{"Format": "IDEA0", "ID": "0e50569b-a703-4814-82dc-2ff458f9ca05", "DetectTime": "2023-10-30T14:06:02.756554+02:00", "EventTime": "2023-10-30T14:06:02.756575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["C6WY7ORB8gNEVzLHl"]} -{"Format": "IDEA0", "ID": "87a35cff-b63c-48a1-a0ef-803de2f0e02b", "DetectTime": "2023-10-30T14:06:02.791186+02:00", "EventTime": "2023-10-30T14:06:02.791202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.119.5.156 ", "ContentType": "text/plain"}], "uids": ["CzUUt93ZZyiMupGUP7"]} -{"Format": "IDEA0", "ID": "d4da393c-e8db-46fd-b997-f5e0f87667da", "DetectTime": "2023-10-30T14:06:02.820829+02:00", "EventTime": "2023-10-30T14:06:02.820845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C4Lqnt2JvbfspmDi14"]} -{"Format": "IDEA0", "ID": "1a378153-0a81-4ff3-973d-b45d54520967", "DetectTime": "2023-10-30T14:06:02.846209+02:00", "EventTime": "2023-10-30T14:06:02.846225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CWdJ1btGNVY23Rvki"]} -{"Format": "IDEA0", "ID": "d0216215-f1fa-42bc-9264-e5d4d067d082", "DetectTime": "2023-10-30T14:06:02.863549+02:00", "EventTime": "2023-10-30T14:06:02.863562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CtYBBW32aOpcLpRGDe"]} -{"Format": "IDEA0", "ID": "faa46ab7-5561-4993-bc2c-ac2c58773cbe", "DetectTime": "2023-10-30T14:06:02.881070+02:00", "EventTime": "2023-10-30T14:06:02.881083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C9qwXB3R5Y4CzFqiLc"]} -{"Format": "IDEA0", "ID": "ebae189b-4519-4b74-8730-a52652bb259e", "DetectTime": "2023-10-30T14:06:02.901756+02:00", "EventTime": "2023-10-30T14:06:02.901778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CyHJuuzshzEbAmlId"]} -{"Format": "IDEA0", "ID": "5a93ef30-33c5-48b1-8631-e38f2bd9d2eb", "DetectTime": "2023-10-30T14:06:02.935135+02:00", "EventTime": "2023-10-30T14:06:02.935156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CLAOop1c5WTJkcjCz1"]} -{"Format": "IDEA0", "ID": "5abbd4c9-6a69-49b8-ac56-362e650af565", "DetectTime": "2023-10-30T14:06:02.960310+02:00", "EventTime": "2023-10-30T14:06:02.960327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CQlJBZ1aohLp8D2mz6"]} -{"Format": "IDEA0", "ID": "1da65e4f-f9f0-442f-b40c-fbe2e800a55e", "DetectTime": "2023-10-30T14:06:02.991748+02:00", "EventTime": "2023-10-30T14:06:02.991763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CFUgrwNXIu1qknd2f"]} -{"Format": "IDEA0", "ID": "792c7232-3ec4-4c0d-9756-cdcef2d2479d", "DetectTime": "2023-10-30T14:06:03.027125+02:00", "EventTime": "2023-10-30T14:06:03.027146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["Cw1paT3f2VXQO5v1Sj"]} -{"Format": "IDEA0", "ID": "e5aa3ebe-7ee9-4529-ac29-8dd0f3f2fcea", "DetectTime": "2023-10-30T14:06:03.060287+02:00", "EventTime": "2023-10-30T14:06:03.060304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["Cioxcy3YKfkrwe4FGc"]} -{"Format": "IDEA0", "ID": "fcba7854-099e-48e3-bea3-59742f107981", "DetectTime": "2023-10-30T14:06:03.083038+02:00", "EventTime": "2023-10-30T14:06:03.083060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["Csruuv1NTcso2NZ3R9"]} -{"Format": "IDEA0", "ID": "62b2d516-5866-428f-af85-76237d7305c4", "DetectTime": "2023-10-30T14:06:03.117596+02:00", "EventTime": "2023-10-30T14:06:03.117616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CuPnGl2jC0VG11ERjf"]} -{"Format": "IDEA0", "ID": "d8a8aa94-b336-4dfa-b293-151c03cb460a", "DetectTime": "2023-10-30T14:06:03.143054+02:00", "EventTime": "2023-10-30T14:06:03.143075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["C0sdpl1Qm36Rkep5w"]} -{"Format": "IDEA0", "ID": "882c568d-9e89-41a7-8ae5-546fe786b25e", "DetectTime": "2023-10-30T14:06:03.177199+02:00", "EventTime": "2023-10-30T14:06:03.177210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CN03rC1Aga6LnaeD1l"]} -{"Format": "IDEA0", "ID": "ab04e436-9624-41cf-ba21-60057d9e9c5b", "DetectTime": "2023-10-30T14:06:03.197337+02:00", "EventTime": "2023-10-30T14:06:03.197360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CZzaCB3YzISegl0wW1"]} -{"Format": "IDEA0", "ID": "0453b6e3-74ec-40a0-a7a5-90397933c04e", "DetectTime": "2023-10-30T14:06:03.219706+02:00", "EventTime": "2023-10-30T14:06:03.219722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.209.29.166 ", "ContentType": "text/plain"}], "uids": ["C650Wh2KhR7mt1UwCh"]} -{"Format": "IDEA0", "ID": "e2774b6b-bc1b-4278-8f5c-e57a51940aa3", "DetectTime": "2023-10-30T14:06:03.237257+02:00", "EventTime": "2023-10-30T14:06:03.237284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CzS4mB4rPYNgOTKoPj"]} -{"Format": "IDEA0", "ID": "762db5bb-0d92-4cce-8c42-4658260d8eac", "DetectTime": "2023-10-30T14:06:03.262943+02:00", "EventTime": "2023-10-30T14:06:03.262965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.111.107 ", "ContentType": "text/plain"}], "uids": ["CHz3Zi1rZQSXG2xna8"]} -{"Format": "IDEA0", "ID": "c30a6728-ee9c-4d90-b91e-eea22b95d14c", "DetectTime": "2023-10-30T14:06:03.286040+02:00", "EventTime": "2023-10-30T14:06:03.286051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CBa3jG2BmHlN4imkjb"]} -{"Format": "IDEA0", "ID": "7500f977-ed12-491f-9a5d-7153e68cbbd6", "DetectTime": "2023-10-30T14:06:03.308671+02:00", "EventTime": "2023-10-30T14:06:03.308690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.111.107 ", "ContentType": "text/plain"}], "uids": ["CpcG0o4ol64HIWaGag"]} -{"Format": "IDEA0", "ID": "9de5503c-e17d-4e6f-8952-b14446a5a3d6", "DetectTime": "2023-10-30T14:06:03.332738+02:00", "EventTime": "2023-10-30T14:06:03.332754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["Cv5bR137f8SyJuHIb1"]} -{"Format": "IDEA0", "ID": "b64b8f9a-47dc-4999-9cce-5ca161508bf2", "DetectTime": "2023-10-30T14:06:03.354169+02:00", "EventTime": "2023-10-30T14:06:03.354185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["CElqMF2c4tKRSy2Fe1"]} -{"Format": "IDEA0", "ID": "1fed445a-6c60-40a3-91ca-c624ce0cc794", "DetectTime": "2023-10-30T14:06:03.380455+02:00", "EventTime": "2023-10-30T14:06:03.380471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CCxZqV3bm30lS0BREi"]} -{"Format": "IDEA0", "ID": "81ced3dc-c565-405b-8766-1a7b2fc587b7", "DetectTime": "2023-10-30T14:06:03.472503+02:00", "EventTime": "2023-10-30T14:06:03.472522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["C6symp2tGW2MKIXUuk"]} -{"Format": "IDEA0", "ID": "a954fdc2-3bd4-4e2d-96c8-b576c05663b7", "DetectTime": "2023-10-30T14:06:03.498051+02:00", "EventTime": "2023-10-30T14:06:03.498067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Cteb32KuEDAuFv2Fc"]} -{"Format": "IDEA0", "ID": "dfe8852b-d8b8-4013-94c7-cf9e80185ba8", "DetectTime": "2023-10-30T14:06:03.526735+02:00", "EventTime": "2023-10-30T14:06:03.526755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CRBxna1NbAA7t7SSf1"]} -{"Format": "IDEA0", "ID": "51d90899-5867-415c-a537-ef985d9e0039", "DetectTime": "2023-10-30T14:06:03.550704+02:00", "EventTime": "2023-10-30T14:06:03.550720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.119.5.156 ", "ContentType": "text/plain"}], "uids": ["CfVYro2z0Cq53mdXb5"]} -{"Format": "IDEA0", "ID": "32996f71-c1bc-484b-b265-27a8452790d7", "DetectTime": "2023-10-30T14:06:03.573520+02:00", "EventTime": "2023-10-30T14:06:03.573540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["C0cGGv4xKZ7HLpqEif"]} -{"Format": "IDEA0", "ID": "4c2243dc-bca0-4418-b286-6283d1563960", "DetectTime": "2023-10-30T14:06:03.590717+02:00", "EventTime": "2023-10-30T14:06:03.590728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CrineV1wCs6dVvEd5f"]} -{"Format": "IDEA0", "ID": "6bf0cc73-7fbe-4cad-af02-c60c058ee2a6", "DetectTime": "2023-10-30T14:06:03.611643+02:00", "EventTime": "2023-10-30T14:06:03.611657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CmbuHdcI8FZz7e5zd"]} -{"Format": "IDEA0", "ID": "848d0fa2-d070-4601-8281-db06abb8ca6e", "DetectTime": "2023-10-30T14:06:03.630172+02:00", "EventTime": "2023-10-30T14:06:03.630195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CNWTOHkLEBUYHpzt3"]} -{"Format": "IDEA0", "ID": "c143e768-6b10-469c-8344-15ef0d29e21b", "DetectTime": "2023-10-30T14:06:03.654202+02:00", "EventTime": "2023-10-30T14:06:03.654217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CKwN6D1xPwjKJxRQyj"]} -{"Format": "IDEA0", "ID": "05b53a5f-f911-4e67-8ae3-cb8acd659945", "DetectTime": "2023-10-30T14:06:03.685013+02:00", "EventTime": "2023-10-30T14:06:03.685024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CN4iNFnljXTIBgAse"]} -{"Format": "IDEA0", "ID": "3ac85aa5-c64e-4370-8bb9-d841c8bcb61f", "DetectTime": "2023-10-30T14:06:03.714441+02:00", "EventTime": "2023-10-30T14:06:03.714457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["COmG8j2NCmA2w3qa1e"]} -{"Format": "IDEA0", "ID": "01d352a2-d42e-4eb6-bd1c-2ccf924090b0", "DetectTime": "2023-10-30T14:06:03.737514+02:00", "EventTime": "2023-10-30T14:06:03.737530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CRQHmPWKY8WgRGBl"]} -{"Format": "IDEA0", "ID": "421fd4c2-e518-482e-994e-79b6d21e8ef7", "DetectTime": "2023-10-30T14:06:03.767092+02:00", "EventTime": "2023-10-30T14:06:03.767110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["CIaAw3NNfxCfkNrAl"]} -{"Format": "IDEA0", "ID": "6b6328ea-6b44-4c81-82bc-ba66ecdcfd03", "DetectTime": "2023-10-30T14:06:03.790249+02:00", "EventTime": "2023-10-30T14:06:03.790265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["C1A2AI28B9mVCWJj1d"]} -{"Format": "IDEA0", "ID": "6845604a-384b-48d0-af75-42f9d966ad29", "DetectTime": "2023-10-30T14:06:03.812766+02:00", "EventTime": "2023-10-30T14:06:03.812783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["CcL89eAbarQj4zve9"]} -{"Format": "IDEA0", "ID": "2303fc7c-beff-4032-909e-6e03f16458b0", "DetectTime": "2023-10-30T14:06:03.841709+02:00", "EventTime": "2023-10-30T14:06:03.841726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["COwWvg2uHosGAEph5"]} -{"Format": "IDEA0", "ID": "d3c87e66-b8e9-4f15-b655-19d4ad2460a0", "DetectTime": "2023-10-30T14:06:03.875503+02:00", "EventTime": "2023-10-30T14:06:03.875518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["Cb1a9O2DoKIt29Jxo5"]} -{"Format": "IDEA0", "ID": "a5db2d16-595a-4296-b47c-eb30e83bd756", "DetectTime": "2023-10-30T14:06:03.898389+02:00", "EventTime": "2023-10-30T14:06:03.898405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.49.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.49.99 ", "ContentType": "text/plain"}], "uids": ["CQ2QKw1ijyT2pgNqS2"]} -{"Format": "IDEA0", "ID": "0492161d-744e-4e6d-b6de-6b3a9d8e1ee2", "DetectTime": "2023-10-30T14:06:03.925811+02:00", "EventTime": "2023-10-30T14:06:03.925823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["C7KZJALMKlg4BwMj8"]} -{"Format": "IDEA0", "ID": "5b251669-17d0-40a3-b9d1-a30a9eea39e2", "DetectTime": "2023-10-30T14:06:03.954653+02:00", "EventTime": "2023-10-30T14:06:03.954668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["CnObwT34Y0BLb2mjQ"]} -{"Format": "IDEA0", "ID": "fc870624-a42c-4fbb-886d-3d22d82f9a9c", "DetectTime": "2023-10-30T14:06:03.974440+02:00", "EventTime": "2023-10-30T14:06:03.974455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CvXqGF43bzK2cZCkW5"]} -{"Format": "IDEA0", "ID": "7ce45b42-fd90-4f73-abed-dc35ea45db9c", "DetectTime": "2023-10-30T14:06:03.993181+02:00", "EventTime": "2023-10-30T14:06:03.993197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CRtD9MpmkeDxQQ8tg"]} -{"Format": "IDEA0", "ID": "f7b4c1a6-5c4b-44ce-b2d3-d0a92867f95c", "DetectTime": "2023-10-30T14:06:04.017284+02:00", "EventTime": "2023-10-30T14:06:04.017300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["CWE2F718yRDYOSNn47"]} -{"Format": "IDEA0", "ID": "5463e8ae-c24f-4116-96dd-590632db7fe8", "DetectTime": "2023-10-30T14:06:04.040582+02:00", "EventTime": "2023-10-30T14:06:04.040599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CTQSHRM2k5s9vo0N9"]} -{"Format": "IDEA0", "ID": "43fbb361-3629-4852-b99e-d53fd4ec1658", "DetectTime": "2023-10-30T14:06:04.063787+02:00", "EventTime": "2023-10-30T14:06:04.063798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CHU8VX2gb7g2XaDZii"]} -{"Format": "IDEA0", "ID": "d0811e2a-4a99-47c9-bf7b-e22a343abeba", "DetectTime": "2023-10-30T14:06:04.094548+02:00", "EventTime": "2023-10-30T14:06:04.094564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CyWVlF1IGTkdDO6BC3"]} -{"Format": "IDEA0", "ID": "9e360afa-0430-4bd9-8c39-8ebc4ff73fab", "DetectTime": "2023-10-30T14:06:04.117748+02:00", "EventTime": "2023-10-30T14:06:04.117764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["Ch25051TTicB8QzPtc"]} -{"Format": "IDEA0", "ID": "f4231200-053f-4e44-ba82-c89f87e1d036", "DetectTime": "2023-10-30T14:06:04.144908+02:00", "EventTime": "2023-10-30T14:06:04.144920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.209.29.166 ", "ContentType": "text/plain"}], "uids": ["CqsFQo4FdcrclLtqbe"]} -{"Format": "IDEA0", "ID": "949ca609-0e5e-40c6-b2d9-b22fc83738f5", "DetectTime": "2023-10-30T14:06:04.163488+02:00", "EventTime": "2023-10-30T14:06:04.163499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CjcOYr0HK8NrHUJdi"]} -{"Format": "IDEA0", "ID": "d24fc9e3-2226-4c9a-ae65-62439bd0bb70", "DetectTime": "2023-10-30T14:06:04.186462+02:00", "EventTime": "2023-10-30T14:06:04.186479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CrEVrkqTrOCXkfz07"]} -{"Format": "IDEA0", "ID": "341ede1a-8c02-4bb7-854a-cf3707b3f4ee", "DetectTime": "2023-10-30T14:06:04.205874+02:00", "EventTime": "2023-10-30T14:06:04.205894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CMFi2c3Ydvt0Qn0CZ5"]} -{"Format": "IDEA0", "ID": "dd2896e0-b17d-4be8-b448-10f08404d28d", "DetectTime": "2023-10-30T14:06:04.227653+02:00", "EventTime": "2023-10-30T14:06:04.227670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CKm1So3zUycPo5HOZ3"]} -{"Format": "IDEA0", "ID": "4a7d016d-7c20-4d7d-b583-ced9fc9686f9", "DetectTime": "2023-10-30T14:06:04.250650+02:00", "EventTime": "2023-10-30T14:06:04.250661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CKiwF94QuBvIRv0Ay"]} -{"Format": "IDEA0", "ID": "d0d5ac68-5669-44eb-818f-c18be29d12d1", "DetectTime": "2023-10-30T14:06:04.269321+02:00", "EventTime": "2023-10-30T14:06:04.269335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CiQsWtBpPAYJrudq8"]} -{"Format": "IDEA0", "ID": "8828fee2-6307-4eeb-8e06-eec94bc55134", "DetectTime": "2023-10-30T14:06:04.291348+02:00", "EventTime": "2023-10-30T14:06:04.291366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["Co1ezaQB5q0vrvK84"]} -{"Format": "IDEA0", "ID": "ad05a26c-4c29-46c1-bc24-9e03420cf1fa", "DetectTime": "2023-10-30T14:06:04.309783+02:00", "EventTime": "2023-10-30T14:06:04.309794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CzWLGe3UFmgqPGyOSb"]} -{"Format": "IDEA0", "ID": "75872be5-6aa2-471f-b89e-3d9a98ef08d3", "DetectTime": "2023-10-30T14:06:04.329891+02:00", "EventTime": "2023-10-30T14:06:04.329910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CLciF716GMHbgbs3b4"]} -{"Format": "IDEA0", "ID": "f328a7f3-4300-4197-9035-62020f8dc1e6", "DetectTime": "2023-10-30T14:06:04.351006+02:00", "EventTime": "2023-10-30T14:06:04.351017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CXFplF4SIoGikI9vI7"]} -{"Format": "IDEA0", "ID": "260b922b-6ab4-45fc-9244-8d4bc710a637", "DetectTime": "2023-10-30T14:06:04.367940+02:00", "EventTime": "2023-10-30T14:06:04.367957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CcOPw02EdqMHpwGoA7"]} -{"Format": "IDEA0", "ID": "cb5a1f65-0a83-4984-8670-0a94cec283bd", "DetectTime": "2023-10-30T14:06:04.385432+02:00", "EventTime": "2023-10-30T14:06:04.385446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CpaKGl7TynEQ603va"]} -{"Format": "IDEA0", "ID": "d93b082e-1b11-454f-b2c8-36424a221583", "DetectTime": "2023-10-30T14:06:04.406717+02:00", "EventTime": "2023-10-30T14:06:04.406729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["Cs5iLB5Ig1GlT6lt4"]} -{"Format": "IDEA0", "ID": "a7336e57-c7cb-49aa-8120-c42f5537d782", "DetectTime": "2023-10-30T14:06:04.430429+02:00", "EventTime": "2023-10-30T14:06:04.430446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CyHlv634SgCaIZfYx5"]} -{"Format": "IDEA0", "ID": "250b392a-51a2-4d23-a41e-facc4b11d74d", "DetectTime": "2023-10-30T14:06:04.455048+02:00", "EventTime": "2023-10-30T14:06:04.455065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CUOBB91XJfZip8zja5"]} -{"Format": "IDEA0", "ID": "9709a696-0e78-4fc2-b808-55ca7eb92d64", "DetectTime": "2023-10-30T14:06:04.477307+02:00", "EventTime": "2023-10-30T14:06:04.477318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CHxTyD1KIryyN3Stt4"]} -{"Format": "IDEA0", "ID": "3b46ac12-4e68-4b4f-9186-cf329a7fc067", "DetectTime": "2023-10-30T14:06:04.498292+02:00", "EventTime": "2023-10-30T14:06:04.498308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CAoYoX1bAgg80MCmBk"]} -{"Format": "IDEA0", "ID": "0d147805-b7b7-4350-a846-743d637ff021", "DetectTime": "2023-10-30T14:06:04.520553+02:00", "EventTime": "2023-10-30T14:06:04.520564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CFzjWn2kuQujPrW4ng"]} -{"Format": "IDEA0", "ID": "a39d2b48-ae5f-44e2-b37c-c97b5c41dd98", "DetectTime": "2023-10-30T14:06:04.541141+02:00", "EventTime": "2023-10-30T14:06:04.541154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["CAzHZm3UjP5zKr2El4"]} -{"Format": "IDEA0", "ID": "fec92093-4752-48fe-afbe-f075b6cc1034", "DetectTime": "2023-10-30T14:06:04.560186+02:00", "EventTime": "2023-10-30T14:06:04.560205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CKwyEc4hfUwnOf5uP5"]} -{"Format": "IDEA0", "ID": "343cc58f-afa6-4ad2-a6a0-dab26649badb", "DetectTime": "2023-10-30T14:06:04.582336+02:00", "EventTime": "2023-10-30T14:06:04.582352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CTqC9X3amDKZjgP4I"]} -{"Format": "IDEA0", "ID": "5bb40d29-49cf-44e7-ac03-39d53e7a4b06", "DetectTime": "2023-10-30T14:06:04.603592+02:00", "EventTime": "2023-10-30T14:06:04.603608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CcrJyMWfYfGKCufu"]} -{"Format": "IDEA0", "ID": "078989a9-0731-42dc-85a8-0264938d2985", "DetectTime": "2023-10-30T14:06:04.626919+02:00", "EventTime": "2023-10-30T14:06:04.626931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["Cntdae2iggej6B1oa6"]} -{"Format": "IDEA0", "ID": "8eb80042-8541-48e3-a5ea-316de56c6efe", "DetectTime": "2023-10-30T14:06:04.649116+02:00", "EventTime": "2023-10-30T14:06:04.649136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["C3mDj13UY63LD5vcBe"]} -{"Format": "IDEA0", "ID": "ec243af0-ec9b-4b1c-9831-066324764fec", "DetectTime": "2023-10-30T14:06:04.673648+02:00", "EventTime": "2023-10-30T14:06:04.673666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CLBLm2MJfwyIKmZq2"]} -{"Format": "IDEA0", "ID": "76283db8-9991-4bff-93b2-34924d7d457a", "DetectTime": "2023-10-30T14:06:04.701126+02:00", "EventTime": "2023-10-30T14:06:04.701149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CiF18e9dvzyOZmUp2"]} -{"Format": "IDEA0", "ID": "eb38fce0-faba-4c9d-b743-020c727a4c36", "DetectTime": "2023-10-30T14:06:04.727752+02:00", "EventTime": "2023-10-30T14:06:04.727769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CqxpgJ2OtNUVXnGR1l"]} -{"Format": "IDEA0", "ID": "1b2bd1d5-dbeb-4511-a090-269a2055ff43", "DetectTime": "2023-10-30T14:06:04.753241+02:00", "EventTime": "2023-10-30T14:06:04.753256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CK4MPmeczO4NmAZr8"]} -{"Format": "IDEA0", "ID": "b5d0f1df-95da-4ae6-95dc-6e4cfed0e9e4", "DetectTime": "2023-10-30T14:06:04.781138+02:00", "EventTime": "2023-10-30T14:06:04.781154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["ClLz6C3ShTo2Be8Xoj"]} -{"Format": "IDEA0", "ID": "2003c624-fc14-437b-9858-6e7e26b3a799", "DetectTime": "2023-10-30T14:06:04.807736+02:00", "EventTime": "2023-10-30T14:06:04.807752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C1oJzk3xY0sz0ZWjdf"]} -{"Format": "IDEA0", "ID": "10f35028-e7d1-465c-b214-4a0f2ef184ff", "DetectTime": "2023-10-30T14:06:04.828790+02:00", "EventTime": "2023-10-30T14:06:04.828808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CmEPzN1d0K4zQhfPVl"]} -{"Format": "IDEA0", "ID": "0d9aeab7-d4ed-404a-a594-f14e1f19d2d1", "DetectTime": "2023-10-30T14:06:04.855664+02:00", "EventTime": "2023-10-30T14:06:04.855680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CkEcVC4E4tI18NRBha"]} -{"Format": "IDEA0", "ID": "95cc3cf7-f9d9-4704-98b0-eae4939443c8", "DetectTime": "2023-10-30T14:06:04.878081+02:00", "EventTime": "2023-10-30T14:06:04.878098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["CbIusHPr3aiDYMnUa"]} -{"Format": "IDEA0", "ID": "5c439013-c7b8-4d83-bdf1-8ecb330ff30c", "DetectTime": "2023-10-30T14:06:04.902325+02:00", "EventTime": "2023-10-30T14:06:04.902343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["CxxP1O3kahutpWvB6b"]} -{"Format": "IDEA0", "ID": "30601127-b202-4e4e-bb95-0a5971b9a86a", "DetectTime": "2023-10-30T14:06:04.928378+02:00", "EventTime": "2023-10-30T14:06:04.928398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["C6DwZU1G68Gvb4WhYf"]} -{"Format": "IDEA0", "ID": "6c659845-93ed-42aa-99ab-f53116b7f49f", "DetectTime": "2023-10-30T14:06:04.954131+02:00", "EventTime": "2023-10-30T14:06:04.954151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["CMnWR14Hmci1JxpeQ5"]} -{"Format": "IDEA0", "ID": "96b3bf46-1e3b-49e0-b56b-201f78151c89", "DetectTime": "2023-10-30T14:06:04.978129+02:00", "EventTime": "2023-10-30T14:06:04.978140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CNoLLs3bOv5rIaeYUi"]} -{"Format": "IDEA0", "ID": "8ed5d689-4a8a-4a29-803c-0d515ff872a7", "DetectTime": "2023-10-30T14:06:04.999093+02:00", "EventTime": "2023-10-30T14:06:04.999106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CAQKBu23meIc95Lwxe"]} -{"Format": "IDEA0", "ID": "c1490786-5861-4bc0-ac7f-17e0d806c1a6", "DetectTime": "2023-10-30T14:06:05.018632+02:00", "EventTime": "2023-10-30T14:06:05.018644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["C8jcsF3mGJwTxv6Lt3"]} -{"Format": "IDEA0", "ID": "df211883-a719-4f35-a91c-15caa4ca2aa8", "DetectTime": "2023-10-30T14:06:05.036583+02:00", "EventTime": "2023-10-30T14:06:05.036594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CwLXwu1wsPufQtFjjb"]} -{"Format": "IDEA0", "ID": "b69b50b9-c304-420b-b200-134232852a21", "DetectTime": "2023-10-30T14:06:05.060775+02:00", "EventTime": "2023-10-30T14:06:05.060790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.119.5.156 ", "ContentType": "text/plain"}], "uids": ["CvXEqt1HebfjmURtzh"]} -{"Format": "IDEA0", "ID": "866293eb-f147-4869-bd1b-e44b3b8076f2", "DetectTime": "2023-10-30T14:06:05.078631+02:00", "EventTime": "2023-10-30T14:06:05.078642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CVT8QA2DJyIl1Hth3l"]} -{"Format": "IDEA0", "ID": "ed23e411-c265-4064-86a6-c0a2a115b3ff", "DetectTime": "2023-10-30T14:06:05.103921+02:00", "EventTime": "2023-10-30T14:06:05.103939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CQ4Xy118dsgv05aCu6"]} -{"Format": "IDEA0", "ID": "3dc366aa-bd30-4e40-aac9-36b7f8b931e0", "DetectTime": "2023-10-30T14:06:05.129609+02:00", "EventTime": "2023-10-30T14:06:05.129625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CmgFWkbteWAU4PoGl"]} -{"Format": "IDEA0", "ID": "916b1832-c3cb-41ad-b063-4b4aa91c36e6", "DetectTime": "2023-10-30T14:06:05.154027+02:00", "EventTime": "2023-10-30T14:06:05.154045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.176.58.33 ", "ContentType": "text/plain"}], "uids": ["CpzOZH1HSUuZ8X5R55"]} -{"Format": "IDEA0", "ID": "7b085c00-ff2c-484c-81ca-07646a9f66c8", "DetectTime": "2023-10-30T14:06:05.178509+02:00", "EventTime": "2023-10-30T14:06:05.178528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CI215W2YokVe9qYuZj"]} -{"Format": "IDEA0", "ID": "a3061c2e-b79c-421d-9057-1c6cb811456d", "DetectTime": "2023-10-30T14:06:05.202426+02:00", "EventTime": "2023-10-30T14:06:05.202441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CbO8fZ3GBctc223OOf"]} -{"Format": "IDEA0", "ID": "d0701657-c4ab-4853-b1c7-4d4a1343fa00", "DetectTime": "2023-10-30T14:06:05.226279+02:00", "EventTime": "2023-10-30T14:06:05.226297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.119.5.156 ", "ContentType": "text/plain"}], "uids": ["CwdQE14kNEO2r3G19"]} -{"Format": "IDEA0", "ID": "c91bc765-1113-4cb3-8ffe-44b800bbcb18", "DetectTime": "2023-10-30T14:06:05.249134+02:00", "EventTime": "2023-10-30T14:06:05.249145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CDt3uV34Dc1yAOGlhh"]} -{"Format": "IDEA0", "ID": "23b8f3f5-8171-4664-9c28-0c6cc471ff41", "DetectTime": "2023-10-30T14:06:05.270898+02:00", "EventTime": "2023-10-30T14:06:05.270914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.111.107 ", "ContentType": "text/plain"}], "uids": ["Ch4dCg4OfcoW6s926e"]} -{"Format": "IDEA0", "ID": "8303d6ac-611e-4610-8c4a-77b5bd9fc092", "DetectTime": "2023-10-30T14:06:05.293031+02:00", "EventTime": "2023-10-30T14:06:05.293045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CAJR5yxYqB4v6DDfi"]} -{"Format": "IDEA0", "ID": "50739632-f428-43bb-bf95-d82b28a7f73f", "DetectTime": "2023-10-30T14:06:05.315098+02:00", "EventTime": "2023-10-30T14:06:05.315109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["C9LhPD2GKWX2igXfB2"]} -{"Format": "IDEA0", "ID": "1a786280-70e9-4f04-ae06-d9025fb27147", "DetectTime": "2023-10-30T14:06:05.335560+02:00", "EventTime": "2023-10-30T14:06:05.335571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.107.111.107 ", "ContentType": "text/plain"}], "uids": ["COjL1T3VfcMB4Ym0Pi"]} -{"Format": "IDEA0", "ID": "3c38b057-d72d-4906-96f1-9a04dd6cf45c", "DetectTime": "2023-10-30T14:06:05.353950+02:00", "EventTime": "2023-10-30T14:06:05.353966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CNjsZs4Gd9qmLpsFj1"]} -{"Format": "IDEA0", "ID": "43a082c8-2f8b-4e84-9610-7123217694fc", "DetectTime": "2023-10-30T14:06:05.383383+02:00", "EventTime": "2023-10-30T14:06:05.383400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CFfh404dP2Xubjlnke"]} -{"Format": "IDEA0", "ID": "b30b16dd-7cab-45eb-9737-e8acf47d17f6", "DetectTime": "2023-10-30T14:06:05.405693+02:00", "EventTime": "2023-10-30T14:06:05.405710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["CLHF763bpgnRqvjk37"]} -{"Format": "IDEA0", "ID": "36adb958-0f06-4386-a544-a0c4f2cb7986", "DetectTime": "2023-10-30T14:06:05.427374+02:00", "EventTime": "2023-10-30T14:06:05.427386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["C1nbbA4RBBt17mQAzj"]} -{"Format": "IDEA0", "ID": "9462ac1c-972c-4827-9fc3-bbc9c81ff086", "DetectTime": "2023-10-30T14:06:05.448720+02:00", "EventTime": "2023-10-30T14:06:05.448736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CjKp9R2q6e4yDLN0ja"]} -{"Format": "IDEA0", "ID": "261f2c7b-151b-4129-9d66-c6a5ccedf32b", "DetectTime": "2023-10-30T14:06:05.473456+02:00", "EventTime": "2023-10-30T14:06:05.473511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cso8XwU48ySIAH59h"]} -{"Format": "IDEA0", "ID": "2015004b-adfe-457b-9cb2-a963e44e6cc4", "DetectTime": "2023-10-30T14:06:05.495590+02:00", "EventTime": "2023-10-30T14:06:05.495606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CxdSwC1yGRTNW3oTHf"]} -{"Format": "IDEA0", "ID": "cf3d767d-a9ec-4f76-a525-96a107d40eac", "DetectTime": "2023-10-30T14:06:05.520330+02:00", "EventTime": "2023-10-30T14:06:05.520348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["Czbrak2FyZCNwZ3PSd"]} -{"Format": "IDEA0", "ID": "027be84a-d193-4767-ba33-5740e417425e", "DetectTime": "2023-10-30T14:06:05.546203+02:00", "EventTime": "2023-10-30T14:06:05.546214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CDqZLM2EJURSrKto4h"]} -{"Format": "IDEA0", "ID": "9a3a6139-1d3f-4802-901f-d153afd20d9a", "DetectTime": "2023-10-30T14:06:05.566629+02:00", "EventTime": "2023-10-30T14:06:05.566644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CkWhg125Ew8phtViUb"]} -{"Format": "IDEA0", "ID": "c994a859-5541-47a0-87cc-54396926ef55", "DetectTime": "2023-10-30T14:06:05.584938+02:00", "EventTime": "2023-10-30T14:06:05.584950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["CII99z3Dm3Feavk6da"]} -{"Format": "IDEA0", "ID": "07f45ab7-c4a2-4dab-b0a8-4814f3bfcf24", "DetectTime": "2023-10-30T14:06:05.604053+02:00", "EventTime": "2023-10-30T14:06:05.604064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["CGNgFt4qFiGWZGpCc7"]} -{"Format": "IDEA0", "ID": "4c0d5792-bc4e-4438-95a7-74e4fc85ccd6", "DetectTime": "2023-10-30T14:06:05.620351+02:00", "EventTime": "2023-10-30T14:06:05.620363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CPbIj93ikA4Foz4HE6"]} -{"Format": "IDEA0", "ID": "83e3ce7d-56da-4713-8b89-bab4b3619b99", "DetectTime": "2023-10-30T14:06:05.637396+02:00", "EventTime": "2023-10-30T14:06:05.637407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C72FuD2FszPM0TplQh"]} -{"Format": "IDEA0", "ID": "bfe92d4e-2d38-4bc9-9dd0-7dc7ea3c5e78", "DetectTime": "2023-10-30T14:06:05.656697+02:00", "EventTime": "2023-10-30T14:06:05.656709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CST3zXsqO91gzwe2a"]} -{"Format": "IDEA0", "ID": "814471e1-a300-4b7d-ae7d-5d40b07f66f3", "DetectTime": "2023-10-30T14:06:05.673204+02:00", "EventTime": "2023-10-30T14:06:05.673214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["C0Ziz71XxdiK7189S9"]} -{"Format": "IDEA0", "ID": "249db645-ffaa-4063-81b3-db4e4585433d", "DetectTime": "2023-10-30T14:06:05.689777+02:00", "EventTime": "2023-10-30T14:06:05.689788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CVmzNt48A5ey1CG627"]} -{"Format": "IDEA0", "ID": "10bf4cd5-6908-48fa-8a82-85f71f4a6025", "DetectTime": "2023-10-30T14:06:05.711013+02:00", "EventTime": "2023-10-30T14:06:05.711025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cv0OaSUpUyoV1IfLi"]} -{"Format": "IDEA0", "ID": "6d9b17de-0fe5-4b42-920d-0d3bbc6084a3", "DetectTime": "2023-10-30T14:06:05.736496+02:00", "EventTime": "2023-10-30T14:06:05.736516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["CHvskD1270llwxd5uk"]} -{"Format": "IDEA0", "ID": "d183b23c-3095-4b4c-88a5-5fffc10606f9", "DetectTime": "2023-10-30T14:06:05.756936+02:00", "EventTime": "2023-10-30T14:06:05.756947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CdZCuk8SLOgnKrh27"]} -{"Format": "IDEA0", "ID": "44fec075-ef4f-4c6f-863f-3944d7948c56", "DetectTime": "2023-10-30T14:06:05.781219+02:00", "EventTime": "2023-10-30T14:06:05.781231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CUmzda2MNvlwhKW93i"]} -{"Format": "IDEA0", "ID": "722d9d00-0e3c-4301-bfa0-a0b404f231ea", "DetectTime": "2023-10-30T14:06:05.804008+02:00", "EventTime": "2023-10-30T14:06:05.804021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["C6Prd84Z93xrPmhzJh"]} -{"Format": "IDEA0", "ID": "1cc8c1ec-cd63-4cb9-96b8-cb8ecd2a22e3", "DetectTime": "2023-10-30T14:06:05.826917+02:00", "EventTime": "2023-10-30T14:06:05.826934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 119.144.23.153 ", "ContentType": "text/plain"}], "uids": ["Ct044l38lhgxumOksl"]} -{"Format": "IDEA0", "ID": "ac536b5c-8a72-4b4a-aedf-f2331670c2a6", "DetectTime": "2023-10-30T14:06:05.850011+02:00", "EventTime": "2023-10-30T14:06:05.850030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CjdiGV2yfhnUKKUYll"]} -{"Format": "IDEA0", "ID": "e18d736e-78d0-413d-b461-8bf65553e90b", "DetectTime": "2023-10-30T14:06:05.867093+02:00", "EventTime": "2023-10-30T14:06:05.867104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CHzPhqdm3sQHwW7h"]} -{"Format": "IDEA0", "ID": "d8a6f18d-e270-4056-89b4-a375f071fe5d", "DetectTime": "2023-10-30T14:06:05.885721+02:00", "EventTime": "2023-10-30T14:06:05.885733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CJjuj94hErqCi35AAf"]} -{"Format": "IDEA0", "ID": "0064a912-efa4-4268-b7c0-292dcaee914e", "DetectTime": "2023-10-30T14:06:05.902115+02:00", "EventTime": "2023-10-30T14:06:05.902126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["Cg6Cx63G6Z0L8QJEvi"]} -{"Format": "IDEA0", "ID": "a941a2e8-587b-4ef4-aa76-eaaceece5d59", "DetectTime": "2023-10-30T14:06:05.920239+02:00", "EventTime": "2023-10-30T14:06:05.920250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cay0KA1JSGMuYaZn34"]} -{"Format": "IDEA0", "ID": "20fed960-5bf8-4581-995c-21aad4c1a510", "DetectTime": "2023-10-30T14:06:05.938018+02:00", "EventTime": "2023-10-30T14:06:05.938030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CoHmU8Pvrmnr1GJEb"]} -{"Format": "IDEA0", "ID": "1dd02c5b-c20d-4ef6-a92b-1bf9eb5b666a", "DetectTime": "2023-10-30T14:06:05.956255+02:00", "EventTime": "2023-10-30T14:06:05.956270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["C35fHYk3GcpABgtWe"]} -{"Format": "IDEA0", "ID": "db76e58e-3cc6-48de-8210-857e280acbe4", "DetectTime": "2023-10-30T14:06:05.975330+02:00", "EventTime": "2023-10-30T14:06:05.975347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CIfkWSqLiuzkNiAAl"]} -{"Format": "IDEA0", "ID": "fc64cc97-f1cd-430f-8795-b291bc671d69", "DetectTime": "2023-10-30T14:06:05.997454+02:00", "EventTime": "2023-10-30T14:06:05.997465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CH3vYC3qJw6rUg7I1e"]} -{"Format": "IDEA0", "ID": "5b0d7c63-8f63-4ee0-a0e0-e24c1fcb672a", "DetectTime": "2023-10-30T14:06:06.013763+02:00", "EventTime": "2023-10-30T14:06:06.013778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CMmtyC3oYml0MT9Q93"]} -{"Format": "IDEA0", "ID": "9376d830-dbd1-4419-892a-0649f70bb2e9", "DetectTime": "2023-10-30T14:06:06.033142+02:00", "EventTime": "2023-10-30T14:06:06.033158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CLd9BeLXQadP7Hm3a"]} -{"Format": "IDEA0", "ID": "736a776d-c474-4f10-adba-694f63e209b0", "DetectTime": "2023-10-30T14:06:06.052377+02:00", "EventTime": "2023-10-30T14:06:06.052391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CAiKFB4yfyIPc4zaQ2"]} -{"Format": "IDEA0", "ID": "e28790da-66e3-444c-9659-97c7977cf532", "DetectTime": "2023-10-30T14:06:06.068259+02:00", "EventTime": "2023-10-30T14:06:06.068270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CpVyen2EXyQ4diN2zd"]} -{"Format": "IDEA0", "ID": "28723cf6-7935-42bb-a530-9f455837b90c", "DetectTime": "2023-10-30T14:06:06.086042+02:00", "EventTime": "2023-10-30T14:06:06.086054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["C874GWRU533rLzUee"]} -{"Format": "IDEA0", "ID": "be99cd54-ab1a-4a22-a37d-0b9b0cbd33e8", "DetectTime": "2023-10-30T14:06:06.103666+02:00", "EventTime": "2023-10-30T14:06:06.103678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CAs5qk4sHhGA5bNeC8"]} -{"Format": "IDEA0", "ID": "61d0c7d2-66de-411f-9111-b7bed8559758", "DetectTime": "2023-10-30T14:06:06.187287+02:00", "EventTime": "2023-10-30T14:06:06.187305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cq2G9A3pg7OJoJd8Gb"]} -{"Format": "IDEA0", "ID": "c99e72e1-2ca6-4e11-9059-41eeb77c2167", "DetectTime": "2023-10-30T14:06:06.212275+02:00", "EventTime": "2023-10-30T14:06:06.212293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CFJvDvmUi0Ezzcc4g"]} -{"Format": "IDEA0", "ID": "3aa79778-1ad4-441b-8585-bced2299edcf", "DetectTime": "2023-10-30T14:06:06.232777+02:00", "EventTime": "2023-10-30T14:06:06.232789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["Cqn05Z2FRCH3YsBxkh"]} -{"Format": "IDEA0", "ID": "f22b33d5-edd6-4770-aa51-7ba6d3ccd171", "DetectTime": "2023-10-30T14:06:06.253895+02:00", "EventTime": "2023-10-30T14:06:06.253906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["CClCmY2hKTKnyu15vc"]} -{"Format": "IDEA0", "ID": "0a023b60-58e0-4292-a3d8-250fc4bffd75", "DetectTime": "2023-10-30T14:06:06.278029+02:00", "EventTime": "2023-10-30T14:06:06.278042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 103.19.249.96 ", "ContentType": "text/plain"}], "uids": ["CD8hky1BbYA6EaE80g"]} -{"Format": "IDEA0", "ID": "f62ed731-3678-49ab-a3bd-3b0e1b3071d0", "DetectTime": "2023-10-30T14:06:06.297724+02:00", "EventTime": "2023-10-30T14:06:06.297744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cq4bN53w5rb40GSEC9"]} -{"Format": "IDEA0", "ID": "402a389c-fc8e-4b07-8cbe-37a1616d6775", "DetectTime": "2023-10-30T14:06:06.316328+02:00", "EventTime": "2023-10-30T14:06:06.316339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["Cd6TSz2lyxFqOPJRBl"]} -{"Format": "IDEA0", "ID": "f17c611c-9f58-4c6c-a94d-d388d7db3cd3", "DetectTime": "2023-10-30T14:06:06.335076+02:00", "EventTime": "2023-10-30T14:06:06.335091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CpEbzK1SMgQ4PFodV"]} -{"Format": "IDEA0", "ID": "76346b4d-d3c5-4f5e-8ded-40ae463700dd", "DetectTime": "2023-10-30T14:06:06.359400+02:00", "EventTime": "2023-10-30T14:06:06.359421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["Ck579R2nBIPHU9wcv1"]} -{"Format": "IDEA0", "ID": "b10f6cbe-9914-489d-8972-fe6966eb43fc", "DetectTime": "2023-10-30T14:06:06.377719+02:00", "EventTime": "2023-10-30T14:06:06.377736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["C4LOvs3Ncfeuuif3Je"]} -{"Format": "IDEA0", "ID": "2af92a4b-0644-4a47-8f49-7f839614acef", "DetectTime": "2023-10-30T14:06:06.394525+02:00", "EventTime": "2023-10-30T14:06:06.394536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CWCkU31yyMew4NVRhh"]} -{"Format": "IDEA0", "ID": "2dd207ba-eac3-4236-ab13-dfbdf70890f6", "DetectTime": "2023-10-30T14:06:06.413076+02:00", "EventTime": "2023-10-30T14:06:06.413087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CYP8LR1E2JR3pPHM5c"]} -{"Format": "IDEA0", "ID": "0186305a-3dff-40de-9685-f6f569253c29", "DetectTime": "2023-10-30T14:06:06.431351+02:00", "EventTime": "2023-10-30T14:06:06.431362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CmmNCt39WuMrDTScKg"]} -{"Format": "IDEA0", "ID": "6b3a5658-189c-4105-9f77-90817e33ecd2", "DetectTime": "2023-10-30T14:06:06.464752+02:00", "EventTime": "2023-10-30T14:06:06.464769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CK6pbe35avLMBjkAO"]} -{"Format": "IDEA0", "ID": "3c4547a6-a514-47d4-9622-c346f946425f", "DetectTime": "2023-10-30T14:06:06.484468+02:00", "EventTime": "2023-10-30T14:06:06.484479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cmw0v24J6HQ7GgcuA"]} -{"Format": "IDEA0", "ID": "97ca42d7-878f-4b04-ae6f-75ee523320c8", "DetectTime": "2023-10-30T14:06:06.513523+02:00", "EventTime": "2023-10-30T14:06:06.513540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cm66KX3OPmbvy4LPX9"]} -{"Format": "IDEA0", "ID": "e20c842e-3c84-4307-b889-a012972a5239", "DetectTime": "2023-10-30T14:06:06.539331+02:00", "EventTime": "2023-10-30T14:06:06.539351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CplbW91hwkIRIU1cR8"]} -{"Format": "IDEA0", "ID": "164ea452-1102-4e03-ab38-7b6d4bbd9c75", "DetectTime": "2023-10-30T14:06:06.560705+02:00", "EventTime": "2023-10-30T14:06:06.560726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CYircu1lPoFpOzwEl8"]} -{"Format": "IDEA0", "ID": "e41f9014-2e69-4e80-b3fe-678cafc7f195", "DetectTime": "2023-10-30T14:06:06.580104+02:00", "EventTime": "2023-10-30T14:06:06.580116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CmlERM1m1IdJ51VgAa"]} -{"Format": "IDEA0", "ID": "21aa1737-a9db-4312-93d8-9a779ef12071", "DetectTime": "2023-10-30T14:06:06.600089+02:00", "EventTime": "2023-10-30T14:06:06.600101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["CLt8km1tP10tLw6cV9"]} -{"Format": "IDEA0", "ID": "3948c560-eb48-47c4-92d0-df83226edd32", "DetectTime": "2023-10-30T14:06:06.620741+02:00", "EventTime": "2023-10-30T14:06:06.620757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["Cr5VMd3mpHpEce0ufb"]} -{"Format": "IDEA0", "ID": "a3b3a478-6d27-4de1-8711-c10422d5beb7", "DetectTime": "2023-10-30T14:06:06.643647+02:00", "EventTime": "2023-10-30T14:06:06.643665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.253.198 ", "ContentType": "text/plain"}], "uids": ["CSuWAq11ulC82Szked"]} -{"Format": "IDEA0", "ID": "5f293b91-7569-4c0b-80eb-e494a6d5f444", "DetectTime": "2023-10-30T14:06:06.681186+02:00", "EventTime": "2023-10-30T14:06:06.681202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CR1Bdz481tUmyI64Sj"]} -{"Format": "IDEA0", "ID": "b80652d6-a146-402e-be1a-5dd11c72f5e8", "DetectTime": "2023-10-30T14:06:06.706137+02:00", "EventTime": "2023-10-30T14:06:06.706153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CnJSxTheIOHW3udZ5"]} -{"Format": "IDEA0", "ID": "09d4b3a4-cc64-4483-9a8e-08b591c02276", "DetectTime": "2023-10-30T14:06:06.729809+02:00", "EventTime": "2023-10-30T14:06:06.729822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Cvw68N3KIFlqfhUbs5"]} -{"Format": "IDEA0", "ID": "357202b2-3a28-4c9a-98cd-6f3b21071a8d", "DetectTime": "2023-10-30T14:06:06.753553+02:00", "EventTime": "2023-10-30T14:06:06.753569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["Cbzh4p3xuZ1f33zC09"]} -{"Format": "IDEA0", "ID": "97055729-4ae7-4d52-b58e-0174445e902c", "DetectTime": "2023-10-30T14:06:06.794357+02:00", "EventTime": "2023-10-30T14:06:06.794374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 14.99.39.64 ", "ContentType": "text/plain"}], "uids": ["CBfnRylpHVnavJSm2"]} -{"Format": "IDEA0", "ID": "5d732fb2-8cac-4078-8740-867cb55c9dc7", "DetectTime": "2023-10-30T14:06:06.825203+02:00", "EventTime": "2023-10-30T14:06:06.825215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["CZseVc1KCCJJJ0p9h4"]} -{"Format": "IDEA0", "ID": "acd8128a-ce28-4518-a33a-84635c9e939b", "DetectTime": "2023-10-30T14:06:06.852038+02:00", "EventTime": "2023-10-30T14:06:06.852049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CsUbbIQC5yXhWADmk"]} -{"Format": "IDEA0", "ID": "0dd09b6c-e898-4078-834c-1f8cecf5bd00", "DetectTime": "2023-10-30T14:06:06.884341+02:00", "EventTime": "2023-10-30T14:06:06.884361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CLbbnT2jWNifeqGsVh"]} -{"Format": "IDEA0", "ID": "b37b9498-1cd8-47c6-b439-4cf99fe50a2e", "DetectTime": "2023-10-30T14:06:06.914007+02:00", "EventTime": "2023-10-30T14:06:06.914019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["ChNlDy2qNKBd03IpCe"]} -{"Format": "Json", "ID": "b37b9498-1cd8-47c6-b439-4cf99fe50a2e", "DetectTime": "2023-10-30T14:06:06.914007+02:00", "EventTime": "2023-10-30T14:06:06.914019+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T16:25:59.273123+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2023/10/30 14:06:06.979411)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "98007ab1-470c-4e1f-a34a-730bbd6ae15e", "DetectTime": "2023-10-30T14:06:06.984746+02:00", "EventTime": "2023-10-30T14:06:06.984763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cjf4oHYX19HY0nu3k"]} -{"Format": "IDEA0", "ID": "baaf9fe2-7c50-4222-bc63-392276c973d6", "DetectTime": "2023-10-30T14:06:07.017146+02:00", "EventTime": "2023-10-30T14:06:07.017164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C7lgcl4RXHpsv0upAh"]} -{"Format": "IDEA0", "ID": "7e331833-8c97-4897-8f9c-c7bf3b6542cf", "DetectTime": "2023-10-30T14:06:07.046618+02:00", "EventTime": "2023-10-30T14:06:07.046629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CZXh4h1eDwj2di5sn4"]} -{"Format": "IDEA0", "ID": "bcd2181a-8f2b-46f8-ab44-7bd62cac5ceb", "DetectTime": "2023-10-30T14:06:07.075989+02:00", "EventTime": "2023-10-30T14:06:07.076007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cla0eL1IDPvOz6zK0d"]} -{"Format": "IDEA0", "ID": "cec34099-174d-45c8-a2ae-f9007cc0d01e", "DetectTime": "2023-10-30T14:06:07.101617+02:00", "EventTime": "2023-10-30T14:06:07.101633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CcKIqA4QOzAEbWLoZ5"]} -{"Format": "IDEA0", "ID": "95f6b7fa-ffad-4e63-90a9-04cb556a660f", "DetectTime": "2023-10-30T14:06:07.136228+02:00", "EventTime": "2023-10-30T14:06:07.136244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CW0UX72IhHbW9YHNH8"]} -{"Format": "IDEA0", "ID": "b4c0bad3-5844-4a7d-82b0-58415120e9ac", "DetectTime": "2023-10-30T14:06:07.168460+02:00", "EventTime": "2023-10-30T14:06:07.168476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CzF6Nt2tmYM70lKED8"]} -{"Format": "IDEA0", "ID": "19e160eb-64c9-471d-b09c-96fa52318345", "DetectTime": "2023-10-30T14:06:07.196817+02:00", "EventTime": "2023-10-30T14:06:07.196834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CIgx8R1FMwOH5HgrQ2"]} -{"Format": "IDEA0", "ID": "08e8d268-3ba4-4820-8cdf-6d32d277721f", "DetectTime": "2023-10-30T14:06:07.229331+02:00", "EventTime": "2023-10-30T14:06:07.229347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["C1qcJV1Scq9keczY18"]} -{"Format": "IDEA0", "ID": "f01cc6d7-fe23-4e6c-875e-bec69b2179e1", "DetectTime": "2023-10-30T14:06:07.259421+02:00", "EventTime": "2023-10-30T14:06:07.259441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Csmtrs4I3hEOpLzpkg"]} -{"Format": "Json", "ID": "f01cc6d7-fe23-4e6c-875e-bec69b2179e1", "DetectTime": "2023-10-30T14:06:07.259421+02:00", "EventTime": "2023-10-30T14:06:07.259441+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T16:26:01.436181+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2023/10/30 14:06:07.321917)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f48132e3-4cb5-4b30-acb6-fb8aeb3d2da0", "DetectTime": "2023-10-30T14:06:07.327415+02:00", "EventTime": "2023-10-30T14:06:07.327433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["CQaU0P2x3OABPvDWhh"]} -{"Format": "IDEA0", "ID": "29df1092-2d11-42d6-8126-2bab2786088f", "DetectTime": "2023-10-30T14:06:07.360144+02:00", "EventTime": "2023-10-30T14:06:07.360160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CVw4Sa2nXz6O6n5dYk"]} -{"Format": "IDEA0", "ID": "3be2390d-79fa-41f2-969f-b0a5e548a71d", "DetectTime": "2023-10-30T14:06:07.389159+02:00", "EventTime": "2023-10-30T14:06:07.389176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CANxJ32JrHPYnGtB6c"]} -{"Format": "IDEA0", "ID": "8243c132-1547-44d1-b39b-e31210895fff", "DetectTime": "2023-10-30T14:06:07.419440+02:00", "EventTime": "2023-10-30T14:06:07.419455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cu3Un93F1bXxnXBsQh"]} -{"Format": "IDEA0", "ID": "6f5e8354-7c99-45b0-be7e-3734553e93d4", "DetectTime": "2023-10-30T14:06:07.453887+02:00", "EventTime": "2023-10-30T14:06:07.453908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CTMiJ94V6tssxioO6g"]} -{"Format": "IDEA0", "ID": "6a654562-cba2-40d1-9d7c-30cfdda8eb1a", "DetectTime": "2023-10-30T14:06:07.482612+02:00", "EventTime": "2023-10-30T14:06:07.482623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CZul3Z3U9GYoyHoF9b"]} -{"Format": "IDEA0", "ID": "92c82a83-ccfe-48c6-ba15-0b5e71a73a17", "DetectTime": "2023-10-30T14:06:07.507223+02:00", "EventTime": "2023-10-30T14:06:07.507244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CTiMEKCHrlEHrqgD1"]} -{"Format": "IDEA0", "ID": "b770b934-97de-49d9-afcd-a96fd9130ec2", "DetectTime": "2023-10-30T14:06:07.537132+02:00", "EventTime": "2023-10-30T14:06:07.537148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CGtNUB32VJgM0DTkKi"]} -{"Format": "IDEA0", "ID": "1874721a-2ff4-4463-9ee6-71407f9e2f33", "DetectTime": "2023-10-30T14:06:07.569767+02:00", "EventTime": "2023-10-30T14:06:07.569784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CJfzX01obsQb8NMmk8"]} -{"Format": "IDEA0", "ID": "4da2c76f-8e4a-4eae-b26b-350c3480fa8a", "DetectTime": "2023-10-30T14:06:07.602162+02:00", "EventTime": "2023-10-30T14:06:07.602178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. ", "ContentType": "text/plain"}], "uids": ["ChaIKcWgNxZBNVCI5"]} -{"Format": "Json", "ID": "4da2c76f-8e4a-4eae-b26b-350c3480fa8a", "DetectTime": "2023-10-30T14:06:07.602162+02:00", "EventTime": "2023-10-30T14:06:07.602178+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29519], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T16:56:29.670316+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2023/10/30 14:06:07.667811)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f0c35fc2-33f0-4e75-bdcd-239c9fdf7d9b", "DetectTime": "2023-10-30T14:06:07.673871+02:00", "EventTime": "2023-10-30T14:06:07.673887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C4sgAE2he8zAt2mZGa"]} -{"Format": "IDEA0", "ID": "b8dd28c5-f56d-4efc-a1c8-34aed9a7f1b1", "DetectTime": "2023-10-30T14:06:07.706976+02:00", "EventTime": "2023-10-30T14:06:07.706994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CVCRry3fhLNBj0Thq3"]} -{"Format": "IDEA0", "ID": "cdfb988f-78cf-4ef3-ae87-9ee1728bb1c2", "DetectTime": "2023-10-30T14:06:07.735675+02:00", "EventTime": "2023-10-30T14:06:07.735694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5181], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5181/TCP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C3t4w91aLFNqgRq9Kk"]} -{"Format": "IDEA0", "ID": "0e6f3abd-df7c-47f6-8fe7-667abd95c616", "DetectTime": "2023-10-30T14:06:07.764572+02:00", "EventTime": "2023-10-30T14:06:07.764594+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CQtBNaqPh9vdh8rs"]} -{"Format": "IDEA0", "ID": "81b60308-0269-451b-8c71-b67d0a4abb05", "DetectTime": "2023-10-30T14:06:07.771942+02:00", "EventTime": "2023-10-30T14:06:07.771962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["C3k0H72BB38B35B6D1"]} -{"Format": "IDEA0", "ID": "bcba1792-62b7-4d28-8523-d51d5d849a87", "DetectTime": "2023-10-30T14:06:07.802268+02:00", "EventTime": "2023-10-30T14:06:07.802289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CO0SQ23JFnWFN3ARNh"]} -{"Format": "IDEA0", "ID": "2fa0f63a-88b2-41c2-874a-d5423d7fcf0b", "DetectTime": "2023-10-30T14:06:07.833890+02:00", "EventTime": "2023-10-30T14:06:07.833915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CtzJWx4fL8nzR3TLd8"]} -{"Format": "IDEA0", "ID": "25f762f4-e594-4b6b-bbe2-30d890b908a0", "DetectTime": "2023-10-30T14:06:07.863872+02:00", "EventTime": "2023-10-30T14:06:07.863892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CDhKzxusOLFiezove"]} -{"Format": "IDEA0", "ID": "1f3989d0-b927-49e5-95aa-22fdefa78459", "DetectTime": "2023-10-30T14:06:07.887470+02:00", "EventTime": "2023-10-30T14:06:07.887488+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CAeIm110TAsoPldAFj"]} -{"Format": "IDEA0", "ID": "7a36066f-4dd8-4054-9e82-eb93a807670d", "DetectTime": "2023-10-30T14:06:07.894626+02:00", "EventTime": "2023-10-30T14:06:07.894647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CLCHye4rwkwhHs7vX"]} -{"Format": "Json", "ID": "7a36066f-4dd8-4054-9e82-eb93a807670d", "DetectTime": "2023-10-30T14:06:07.894626+02:00", "EventTime": "2023-10-30T14:06:07.894647+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15655], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T16:57:25.077035+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2023/10/30 14:06:07.958631)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a8295bcb-766e-4608-be1b-2faf92ae77f2", "DetectTime": "2023-10-30T14:06:07.962600+02:00", "EventTime": "2023-10-30T14:06:07.962610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ClB2gW36M2ewexyoLk"]} -{"Format": "IDEA0", "ID": "9f3ea086-ca54-4e3f-b195-cd837b750952", "DetectTime": "2023-10-30T14:06:07.982959+02:00", "EventTime": "2023-10-30T14:06:07.982971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CZuQ8m48oCrLrT1xM8"]} -{"Format": "IDEA0", "ID": "79c2dd4e-ca86-4524-9950-58686c8a6c4f", "DetectTime": "2023-10-30T14:06:08.002276+02:00", "EventTime": "2023-10-30T14:06:08.002288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["Cfy09k4PFFW2n1lQo6"]} -{"Format": "IDEA0", "ID": "62e4725a-7aa0-4e1c-b34e-3f1c89507e45", "DetectTime": "2023-10-30T14:06:08.024960+02:00", "EventTime": "2023-10-30T14:06:08.024972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["C9IEdJ14zXQrIpq7hf"]} -{"Format": "IDEA0", "ID": "59efbf05-7459-45d3-8d45-3b57496c405b", "DetectTime": "2023-10-30T14:06:08.044672+02:00", "EventTime": "2023-10-30T14:06:08.044685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CC1ILwyQHugLEZQZd"]} -{"Format": "IDEA0", "ID": "5eda7ff0-1b2c-409d-bc05-66269175b2d9", "DetectTime": "2023-10-30T14:06:08.063974+02:00", "EventTime": "2023-10-30T14:06:08.063986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["C57QWwWB0ymMqdcv5"]} -{"Format": "IDEA0", "ID": "6318a6be-dc5e-4a72-a37d-10c6bcb143b2", "DetectTime": "2023-10-30T14:06:08.084307+02:00", "EventTime": "2023-10-30T14:06:08.084318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CA7ofg1UKq2Q9khnla"]} -{"Format": "IDEA0", "ID": "0045f570-88c2-4505-b660-16f4fdb4c6e3", "DetectTime": "2023-10-30T14:06:08.103257+02:00", "EventTime": "2023-10-30T14:06:08.103267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["C8aaCo3e4MACZjpkc9"]} -{"Format": "Json", "ID": "0045f570-88c2-4505-b660-16f4fdb4c6e3", "DetectTime": "2023-10-30T14:06:08.103257+02:00", "EventTime": "2023-10-30T14:06:08.103267+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T16:57:27.114092+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2023/10/30 14:06:08.160055)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f0101b0-59cd-45e8-a365-302144facc0c", "DetectTime": "2023-10-30T14:06:08.165378+02:00", "EventTime": "2023-10-30T14:06:08.165396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CVBmW72A7KQgQp8u7d"]} -{"Format": "IDEA0", "ID": "c0dd21d3-5fcb-4aff-a889-862d791fa63e", "DetectTime": "2023-10-30T14:06:08.184597+02:00", "EventTime": "2023-10-30T14:06:08.184614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8HoZM23jpsPbNk0C4"]} -{"Format": "IDEA0", "ID": "34921db5-f565-42a8-b087-b01d34a7b936", "DetectTime": "2023-10-30T14:06:08.205639+02:00", "EventTime": "2023-10-30T14:06:08.205656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C8Lj264NFTv4ebF8Tb"]} -{"Format": "IDEA0", "ID": "e6ad3f37-c3a9-4fb0-918f-11917d1bc2cb", "DetectTime": "2023-10-30T14:06:08.229851+02:00", "EventTime": "2023-10-30T14:06:08.229871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["CWiJuO2FVCzAP16mD3"]} -{"Format": "IDEA0", "ID": "5f07a4d1-c726-403b-9daf-3f51d0336122", "DetectTime": "2023-10-30T14:06:08.253846+02:00", "EventTime": "2023-10-30T14:06:08.253870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CMpnaa2oK3kqAuN0yb"]} -{"Format": "IDEA0", "ID": "3f0a3c8a-e96c-4fff-8022-f30000e21a79", "DetectTime": "2023-10-30T14:06:08.279488+02:00", "EventTime": "2023-10-30T14:06:08.279508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C1xUyu4q4Wtq9mtZcb"]} -{"Format": "IDEA0", "ID": "7927d938-fcb3-48cd-84b2-d1e981eee067", "DetectTime": "2023-10-30T14:06:08.314639+02:00", "EventTime": "2023-10-30T14:06:08.314652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CZ6s4KEoAYkQgTf88"]} -{"Format": "IDEA0", "ID": "9ddf0ba9-2001-4826-8c9c-c6dbe7636ae3", "DetectTime": "2023-10-30T14:06:08.350793+02:00", "EventTime": "2023-10-30T14:06:08.350810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CZq2ev2iRUA5feRRag"]} -{"Format": "IDEA0", "ID": "3286e816-ebb7-4ca8-aaac-fa4df283b2a0", "DetectTime": "2023-10-30T14:06:08.386314+02:00", "EventTime": "2023-10-30T14:06:08.386329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CbUgqo3JVDOj0G68s8"]} -{"Format": "IDEA0", "ID": "458c24fe-b4d0-4989-94ea-bc7921a1c5a4", "DetectTime": "2023-10-30T14:06:08.424769+02:00", "EventTime": "2023-10-30T14:06:08.424786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CmU6SJ3q4NPwvye9il"]} -{"Format": "IDEA0", "ID": "6dfa78ea-e23a-45a0-9a53-e7f169800672", "DetectTime": "2023-10-30T14:06:08.462367+02:00", "EventTime": "2023-10-30T14:06:08.462380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CYvpFB2crL1giT7kwa"]} -{"Format": "IDEA0", "ID": "b0cf7c4c-abbe-4a48-82c0-1b231f4ac164", "DetectTime": "2023-10-30T14:06:08.500833+02:00", "EventTime": "2023-10-30T14:06:08.500850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CK8dTx4AtntRPf2KBd"]} -{"Format": "Json", "ID": "b0cf7c4c-abbe-4a48-82c0-1b231f4ac164", "DetectTime": "2023-10-30T14:06:08.500833+02:00", "EventTime": "2023-10-30T14:06:08.500850+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:29:04.772511+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:08.597305)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6228e416-c67d-41e5-bc87-49960e439840", "DetectTime": "2023-10-30T14:06:08.602916+02:00", "EventTime": "2023-10-30T14:06:08.602934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CKxtaH3jTsoslwovBd"]} -{"Format": "IDEA0", "ID": "f4380a52-829a-4f43-a2bb-4db7a093fa21", "DetectTime": "2023-10-30T14:06:08.634631+02:00", "EventTime": "2023-10-30T14:06:08.634645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["C0LJYr1H56QLG13fm4"]} -{"Format": "IDEA0", "ID": "aa2fb46b-4493-4d6d-a3db-407a2f9a3655", "DetectTime": "2023-10-30T14:06:08.673988+02:00", "EventTime": "2023-10-30T14:06:08.674009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CFIp7x3IHjOxALbl94"]} -{"Format": "IDEA0", "ID": "5400a4c4-a94c-4eed-b89f-01a32cbc7bb1", "DetectTime": "2023-10-30T14:06:08.711877+02:00", "EventTime": "2023-10-30T14:06:08.711893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CSseXxdic12oVGzPa"]} -{"Format": "IDEA0", "ID": "37f03eb2-1d8e-4eba-bb0d-8cac498bce12", "DetectTime": "2023-10-30T14:06:08.747786+02:00", "EventTime": "2023-10-30T14:06:08.747797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CR44Ya1FClClCoJBhk"]} -{"Format": "IDEA0", "ID": "38f78e42-b9d1-430f-b3d2-c2feefa1191d", "DetectTime": "2023-10-30T14:06:08.780534+02:00", "EventTime": "2023-10-30T14:06:08.780550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CataG04A33Y5d7FjFa"]} -{"Format": "IDEA0", "ID": "f38c0972-aaf9-4698-88a4-12583b3b3e7e", "DetectTime": "2023-10-30T14:06:08.814014+02:00", "EventTime": "2023-10-30T14:06:08.814026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CTbiGR3jGb7agalpPe"]} -{"Format": "IDEA0", "ID": "515f5b6f-9f9f-4881-afba-29b714070e30", "DetectTime": "2023-10-30T14:06:08.842820+02:00", "EventTime": "2023-10-30T14:06:08.842832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C4M0qQGk0SoVZYo17"]} -{"Format": "Json", "ID": "515f5b6f-9f9f-4881-afba-29b714070e30", "DetectTime": "2023-10-30T14:06:08.842820+02:00", "EventTime": "2023-10-30T14:06:08.842832+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:30:25.970338+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:08.904020)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4bfce280-5c72-41a8-8045-69afbd100044", "DetectTime": "2023-10-30T14:06:08.908022+02:00", "EventTime": "2023-10-30T14:06:08.908033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["C0dunR3DrOaI0hlaD4"]} -{"Format": "IDEA0", "ID": "a0f7a606-c3a4-4660-b0bd-d6eadeb0c417", "DetectTime": "2023-10-30T14:06:08.941032+02:00", "EventTime": "2023-10-30T14:06:08.941050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CPlNFUfOjtt01EoV7"]} -{"Format": "IDEA0", "ID": "2c435ae7-f48b-4ccb-a674-27458c505653", "DetectTime": "2023-10-30T14:06:08.980199+02:00", "EventTime": "2023-10-30T14:06:08.980219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CzDwR12iGJyCTx5hi"]} -{"Format": "IDEA0", "ID": "a8e3e6ad-1cf8-48e9-b041-064207bd4145", "DetectTime": "2023-10-30T14:06:09.018047+02:00", "EventTime": "2023-10-30T14:06:09.018067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CvZmBy3OpNkwhzBth6"]} -{"Format": "IDEA0", "ID": "a056ba2a-a693-4d0e-925f-0b50af193346", "DetectTime": "2023-10-30T14:06:09.055902+02:00", "EventTime": "2023-10-30T14:06:09.055914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C5k81c2BKJFMPzkg9a"]} -{"Format": "IDEA0", "ID": "7ea7444d-caf4-4429-b1cd-6a54a43bf817", "DetectTime": "2023-10-30T14:06:09.085773+02:00", "EventTime": "2023-10-30T14:06:09.085790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["Cr8rdQ1zbEJikrvdnf"]} -{"Format": "IDEA0", "ID": "4c4c2747-5f29-4945-ad3c-a4a8484d5a89", "DetectTime": "2023-10-30T14:06:09.119410+02:00", "EventTime": "2023-10-30T14:06:09.119421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["Cmbet13LXiGCIfB7nc"]} -{"Format": "IDEA0", "ID": "157ce77a-0923-43bf-9db2-f268d0ee3f10", "DetectTime": "2023-10-30T14:06:09.157427+02:00", "EventTime": "2023-10-30T14:06:09.157447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ci0aUM1ewdZF2Fd7r7"]} -{"Format": "Json", "ID": "157ce77a-0923-43bf-9db2-f268d0ee3f10", "DetectTime": "2023-10-30T14:06:09.157427+02:00", "EventTime": "2023-10-30T14:06:09.157447+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:29:44.184425+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:09.213637)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "453bba3d-e971-4be7-b185-c8ad95eff480", "DetectTime": "2023-10-30T14:06:09.219280+02:00", "EventTime": "2023-10-30T14:06:09.219299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CifehQ1moDVurMAHE9"]} -{"Format": "IDEA0", "ID": "775d00b7-4594-468b-b9a9-fe6bc70d5950", "DetectTime": "2023-10-30T14:06:09.255397+02:00", "EventTime": "2023-10-30T14:06:09.255419+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CO8bht4QpCvQIbPaal"]} -{"Format": "IDEA0", "ID": "a7b7b248-cf9e-45d8-9fff-3c7b1b284b0f", "DetectTime": "2023-10-30T14:06:09.263195+02:00", "EventTime": "2023-10-30T14:06:09.263216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CYFC8S1VMLJf10nGja"]} -{"Format": "IDEA0", "ID": "7db78913-a184-4888-8c5d-03dd343b1b18", "DetectTime": "2023-10-30T14:06:09.291017+02:00", "EventTime": "2023-10-30T14:06:09.291029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CVT9cj28oDwesY8OFk"]} -{"Format": "IDEA0", "ID": "2054f39e-8c8b-4440-8575-cfa0854753d6", "DetectTime": "2023-10-30T14:06:09.318715+02:00", "EventTime": "2023-10-30T14:06:09.318735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CXQHNM2SWuSOyK6nRf"]} -{"Format": "IDEA0", "ID": "58e94f6c-523f-4832-b07a-a02c14deb1d8", "DetectTime": "2023-10-30T14:06:09.354888+02:00", "EventTime": "2023-10-30T14:06:09.354905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["Cv4mi82L5W2Bj3oxvf"]} -{"Format": "IDEA0", "ID": "11120343-305e-4229-8e2a-ca0e44b44f60", "DetectTime": "2023-10-30T14:06:09.388429+02:00", "EventTime": "2023-10-30T14:06:09.388446+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CHZAPm4cpjfmVvHKh3"]} -{"Format": "IDEA0", "ID": "7be2d88d-65bc-4153-9e61-6112e3608c82", "DetectTime": "2023-10-30T14:06:09.395942+02:00", "EventTime": "2023-10-30T14:06:09.395959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [17939], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. ", "ContentType": "text/plain"}], "uids": ["C1wp652XrxyjVYExp1"]} -{"Format": "IDEA0", "ID": "4462944f-4f95-4d0c-a5ae-4e4ebcc4c5b4", "DetectTime": "2023-10-30T14:06:09.429842+02:00", "EventTime": "2023-10-30T14:06:09.429856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CYhrtr4R3wNcDCB1M4"]} -{"Format": "IDEA0", "ID": "86396a8b-ef05-4651-a772-bed4b275b7c9", "DetectTime": "2023-10-30T14:06:09.461100+02:00", "EventTime": "2023-10-30T14:06:09.461116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CridK7ryTZOV92Rsl"]} -{"Format": "Json", "ID": "86396a8b-ef05-4651-a772-bed4b275b7c9", "DetectTime": "2023-10-30T14:06:09.461100+02:00", "EventTime": "2023-10-30T14:06:09.461116+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:30:01.936160+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:09.533006)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "acfd3c30-7689-4227-adef-513de58e8335", "DetectTime": "2023-10-30T14:06:09.537435+02:00", "EventTime": "2023-10-30T14:06:09.537449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CKw20Y2nQG88okE6Tj"]} -{"Format": "IDEA0", "ID": "86da4595-d263-4b5b-aaf0-443448a99b9b", "DetectTime": "2023-10-30T14:06:09.562568+02:00", "EventTime": "2023-10-30T14:06:09.562589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["CU467T2umxseEOwAT5"]} -{"Format": "IDEA0", "ID": "d1ac1eff-1da8-40d4-926c-e1a27585be46", "DetectTime": "2023-10-30T14:06:09.594542+02:00", "EventTime": "2023-10-30T14:06:09.594556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cutvzz4oDxchAvON3g"]} -{"Format": "IDEA0", "ID": "1ad06d23-b1f5-46ec-9472-5234065de3e7", "DetectTime": "2023-10-30T14:06:09.624384+02:00", "EventTime": "2023-10-30T14:06:09.624401+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CaYkdn1PaYKPPJ6xn5"]} -{"Format": "IDEA0", "ID": "a9a667f8-2a81-41dc-9b79-f103eb4c2d37", "DetectTime": "2023-10-30T14:06:09.630974+02:00", "EventTime": "2023-10-30T14:06:09.630986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["CqOVqm2A6UJXVM9UN3"]} -{"Format": "IDEA0", "ID": "7e38c1ac-d1c9-4734-9eaa-1d3e50de21b6", "DetectTime": "2023-10-30T14:06:09.660944+02:00", "EventTime": "2023-10-30T14:06:09.660956+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C0YjzFz1Sm3ts4oO"]} -{"Format": "IDEA0", "ID": "5518472f-52da-4105-8236-8c559325701a", "DetectTime": "2023-10-30T14:06:09.668828+02:00", "EventTime": "2023-10-30T14:06:09.668847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. ", "ContentType": "text/plain"}], "uids": ["CmPeMH1fugy5tBCpU"]} -{"Format": "IDEA0", "ID": "8b72ad1d-1ed9-4912-817d-a11d32f6aeb5", "DetectTime": "2023-10-30T14:06:09.701720+02:00", "EventTime": "2023-10-30T14:06:09.701736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["C1LCFy2ULLtG8XRpBe"]} -{"Format": "IDEA0", "ID": "74a5c313-bad2-4ea5-8d3b-3c65badc0b33", "DetectTime": "2023-10-30T14:06:09.732780+02:00", "EventTime": "2023-10-30T14:06:09.732795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CSDpXh2ohekJHBlXC8"]} -{"Format": "IDEA0", "ID": "d67be908-9c84-4307-a78b-4f3bdcd49948", "DetectTime": "2023-10-30T14:06:09.754627+02:00", "EventTime": "2023-10-30T14:06:09.754644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2039], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2039/UDP destination IP 88.247.65.143. ", "ContentType": "text/plain"}], "uids": ["CwV6KB1LcFe8Etzzf4"]} -{"Format": "IDEA0", "ID": "3700092c-96aa-4fc3-950a-c9edfe83f2ca", "DetectTime": "2023-10-30T14:06:09.787889+02:00", "EventTime": "2023-10-30T14:06:09.787908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26762], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26762/UDP destination IP 190.239.253.243. ", "ContentType": "text/plain"}], "uids": ["Cst0eVWG5NcnMSOil"]} -{"Format": "IDEA0", "ID": "2a477a9d-7630-4b1b-8f17-d8aed9b98356", "DetectTime": "2023-10-30T14:06:09.819384+02:00", "EventTime": "2023-10-30T14:06:09.819406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["ChVrbz9tuGVePtPgf"]} -{"Format": "Json", "ID": "2a477a9d-7630-4b1b-8f17-d8aed9b98356", "DetectTime": "2023-10-30T14:06:09.819384+02:00", "EventTime": "2023-10-30T14:06:09.819406+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:34:30.690988+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:09.885391)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "12397d2d-fb7c-435a-9115-e2c220438bd8", "DetectTime": "2023-10-30T14:06:09.890162+02:00", "EventTime": "2023-10-30T14:06:09.890180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["CT6MC54SXB4l2JcaMe"]} -{"Format": "IDEA0", "ID": "6cca0445-ee7e-4c6e-9143-ee945a4f162f", "DetectTime": "2023-10-30T14:06:09.924811+02:00", "EventTime": "2023-10-30T14:06:09.924828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["Cb70ko4fqNw0IXYj4i"]} -{"Format": "IDEA0", "ID": "1c07cca4-9fa0-4cfd-8539-3b4daa7b17ab", "DetectTime": "2023-10-30T14:06:09.953401+02:00", "EventTime": "2023-10-30T14:06:09.953415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CMCVHe2DFMpbIsiiq1"]} -{"Format": "IDEA0", "ID": "793f418c-c290-4b8b-9c77-dc0433dbf510", "DetectTime": "2023-10-30T14:06:09.983730+02:00", "EventTime": "2023-10-30T14:06:09.983750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11735/UDP destination IP 78.188.99.85. ", "ContentType": "text/plain"}], "uids": ["Cgdaik3kcnqG9Hz5B6"]} -{"Format": "IDEA0", "ID": "1bf60069-f3b6-4f1d-8ee3-953e0b90db29", "DetectTime": "2023-10-30T14:06:10.013477+02:00", "EventTime": "2023-10-30T14:06:10.013493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 31.51.19.187. ", "ContentType": "text/plain"}], "uids": ["C03Sfz7FyqExGoAkb"]} -{"Format": "IDEA0", "ID": "79af8b58-38e1-4f7a-ac3a-291591151f49", "DetectTime": "2023-10-30T14:06:10.039712+02:00", "EventTime": "2023-10-30T14:06:10.039728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CE9drp2c7bQ1oPYUV4"]} -{"Format": "IDEA0", "ID": "f8c8921b-8c49-46aa-95cb-abdfd06d5607", "DetectTime": "2023-10-30T14:06:10.073788+02:00", "EventTime": "2023-10-30T14:06:10.073811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["CFKyv326lLvFOxH4dc"]} -{"Format": "IDEA0", "ID": "7409dd50-58fa-4556-b8ad-3086bc2591c4", "DetectTime": "2023-10-30T14:06:10.109867+02:00", "EventTime": "2023-10-30T14:06:10.109887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CvJs0g4RKTpgbSrRF1"]} -{"Format": "Json", "ID": "7409dd50-58fa-4556-b8ad-3086bc2591c4", "DetectTime": "2023-10-30T14:06:10.109867+02:00", "EventTime": "2023-10-30T14:06:10.109887+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:36:42.093468+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:10.185893)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a4bbba0e-41d3-4680-82d5-b51bc9fb6c90", "DetectTime": "2023-10-30T14:06:10.191236+02:00", "EventTime": "2023-10-30T14:06:10.191251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["Cml82aByl4whTKuWk"]} -{"Format": "IDEA0", "ID": "31b71874-e9fa-46ce-8261-123fab62fb10", "DetectTime": "2023-10-30T14:06:10.219190+02:00", "EventTime": "2023-10-30T14:06:10.219211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["ClomCH3t52RkyxqNSd"]} -{"Format": "IDEA0", "ID": "96f84101-f267-406e-a574-6c9d907ee118", "DetectTime": "2023-10-30T14:06:10.248930+02:00", "EventTime": "2023-10-30T14:06:10.248947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CxraMq4OcVhbsaY6Hj"]} -{"Format": "IDEA0", "ID": "ec793778-e9e2-412a-b188-9b2d927536af", "DetectTime": "2023-10-30T14:06:10.275808+02:00", "EventTime": "2023-10-30T14:06:10.275828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJ42f23GTBRkMR5ixi"]} -{"Format": "IDEA0", "ID": "bea0cd15-5552-4429-99e5-ca35d109a5f8", "DetectTime": "2023-10-30T14:06:10.302814+02:00", "EventTime": "2023-10-30T14:06:10.302827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15153], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. ", "ContentType": "text/plain"}], "uids": ["CR4RwK2TmWzgpl8k44"]} -{"Format": "IDEA0", "ID": "8fd7f296-a4bf-44a2-a459-dc4bb4000a6a", "DetectTime": "2023-10-30T14:06:10.330317+02:00", "EventTime": "2023-10-30T14:06:10.330338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["C0taO73vQNVK2zV7rh"]} -{"Format": "IDEA0", "ID": "a7d20dfa-cbce-469a-812d-af4bec6ac922", "DetectTime": "2023-10-30T14:06:10.357500+02:00", "EventTime": "2023-10-30T14:06:10.357528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CvecDw4ghXxCaoMnA8"]} -{"Format": "IDEA0", "ID": "581e56e8-1be6-4d17-a3c5-959ac7d04d40", "DetectTime": "2023-10-30T14:06:10.382135+02:00", "EventTime": "2023-10-30T14:06:10.382147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CDZk1g35IpQFbBaTCi"]} -{"Format": "Json", "ID": "581e56e8-1be6-4d17-a3c5-959ac7d04d40", "DetectTime": "2023-10-30T14:06:10.382135+02:00", "EventTime": "2023-10-30T14:06:10.382147+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T17:38:58.226438+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2023/10/30 14:06:10.447278)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2141c49a-81d8-479c-8878-1dd7df3d77b4", "DetectTime": "2023-10-30T14:06:10.453310+02:00", "EventTime": "2023-10-30T14:06:10.453327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CaYkdn1PaYKPPJ6xn5", "CYvAuyh6Jl75MJIze", "CQtBNaqPh9vdh8rs", "CO8bht4QpCvQIbPaal"]} -{"Format": "IDEA0", "ID": "83bc02fe-72fd-4c26-a5f8-6e637f28f975", "DetectTime": "2023-10-30T14:06:10.462091+02:00", "EventTime": "2023-10-30T14:06:10.462111+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CYvAuyh6Jl75MJIze"]} -{"Format": "IDEA0", "ID": "9be83e9d-0089-43ed-b7d2-d5d4cb4d35f5", "DetectTime": "2023-10-30T14:06:10.470931+02:00", "EventTime": "2023-10-30T14:06:10.470947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CbmKN827lHXxWi3k79"]} -{"Format": "IDEA0", "ID": "dcd771ee-79c2-4f41-8899-3cae0292f568", "DetectTime": "2023-10-30T14:06:10.495667+02:00", "EventTime": "2023-10-30T14:06:10.495681+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMtXQ81sCCJiXap6Yl"]} -{"Format": "IDEA0", "ID": "ffe914c8-0c1e-4bcf-bec7-0b12e95b3c98", "DetectTime": "2023-10-30T14:06:10.504602+02:00", "EventTime": "2023-10-30T14:06:10.504618+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CmcL7B12MRuE9Q1NH7"]} -{"Format": "IDEA0", "ID": "b2abcbdd-df12-41ab-b34a-2e8e9f441591", "DetectTime": "2023-10-30T14:06:10.516053+02:00", "EventTime": "2023-10-30T14:06:10.516072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CxCWr81APyouQAWrze"]} -{"Format": "IDEA0", "ID": "581df5e0-de54-409d-aa3d-c0db61c8ca3a", "DetectTime": "2023-10-30T14:06:10.542634+02:00", "EventTime": "2023-10-30T14:06:10.542654+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck4rOr3PJCBynpSTJ7"]} -{"Format": "IDEA0", "ID": "531762a5-9518-4b19-9957-6409962b06af", "DetectTime": "2023-10-30T14:06:10.552592+02:00", "EventTime": "2023-10-30T14:06:10.552612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CGvTe6vu3FVpKZuFb"]} -{"Format": "IDEA0", "ID": "c3eb2d34-10d3-4ed9-ba22-ab1cc44a2f05", "DetectTime": "2023-10-30T14:06:10.581203+02:00", "EventTime": "2023-10-30T14:06:10.581222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CnHlPE46aDqjMxQiZk"]} -{"Format": "IDEA0", "ID": "fcc401cf-6f22-4c9f-811e-6b24377883fa", "DetectTime": "2023-10-30T14:06:10.607524+02:00", "EventTime": "2023-10-30T14:06:10.607542+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CtFGw822Dc1GkSIk22"]} -{"Format": "IDEA0", "ID": "16904188-935c-4602-92a4-efb924025500", "DetectTime": "2023-10-30T14:06:10.616213+02:00", "EventTime": "2023-10-30T14:06:10.616224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CyODL427WsHRNsIlEk"]} -{"Format": "IDEA0", "ID": "68d9a2ad-8a49-4d87-899a-e893e8e43656", "DetectTime": "2023-10-30T14:06:10.641795+02:00", "EventTime": "2023-10-30T14:06:10.641814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CBQCFc1zlVqp6yurl1"]} -{"Format": "IDEA0", "ID": "85f266df-676d-4a6b-bb18-04b6f5d17cc2", "DetectTime": "2023-10-30T14:06:10.665512+02:00", "EventTime": "2023-10-30T14:06:10.665531+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CFCwUnu9ZYYCuZb8c"]} -{"Format": "IDEA0", "ID": "4d9d638f-f58e-40f8-8760-5fbb975c36c0", "DetectTime": "2023-10-30T14:06:10.674825+02:00", "EventTime": "2023-10-30T14:06:10.674841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CQz3gRGUl7Sy3Dg6"]} -{"Format": "IDEA0", "ID": "fcf76620-d2b2-4200-98d8-55fb58e88fc2", "DetectTime": "2023-10-30T14:06:10.701494+02:00", "EventTime": "2023-10-30T14:06:10.701516+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C3GA1KZnF9XM80jgl"]} -{"Format": "IDEA0", "ID": "b6b10149-7bc7-427b-a5ca-7e4442110cf4", "DetectTime": "2023-10-30T14:06:10.710242+02:00", "EventTime": "2023-10-30T14:06:10.710258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CC1w8XIhLO9Ev3GDb"]} -{"Format": "IDEA0", "ID": "3280fd46-0243-4da7-863d-bdea7a15a7c6", "DetectTime": "2023-10-30T14:06:10.733290+02:00", "EventTime": "2023-10-30T14:06:10.733309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CPK2uhB80Chp770sj"]} -{"Format": "IDEA0", "ID": "44d2b356-2528-47f1-8b8c-5fbb3c368cf0", "DetectTime": "2023-10-30T14:06:10.787888+02:00", "EventTime": "2023-10-30T14:06:10.787901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["Ct6i1D4tUBtJ1ULQld"]} -{"Format": "IDEA0", "ID": "a8bb9bb5-a9ab-462d-8509-98ebffae5a32", "DetectTime": "2023-10-30T14:06:10.845908+02:00", "EventTime": "2023-10-30T14:06:10.845925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ctq4yr2kWl6r4ym9Ek"]} -{"Format": "IDEA0", "ID": "0db63032-f235-44c0-aa62-42c4997b830e", "DetectTime": "2023-10-30T14:06:10.900230+02:00", "EventTime": "2023-10-30T14:06:10.900251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CtszR426yXQujVMJU8"]} -{"Format": "IDEA0", "ID": "1ecb7ee8-ea31-4457-a2e1-c778eacffbc8", "DetectTime": "2023-10-30T14:06:10.958714+02:00", "EventTime": "2023-10-30T14:06:10.958729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CL23lg4oIRwPj1eSeh"]} -{"Format": "IDEA0", "ID": "b2c718c6-7b18-4a11-902f-11041fb1100d", "DetectTime": "2023-10-30T14:06:11.018617+02:00", "EventTime": "2023-10-30T14:06:11.018639+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CC8W144QsRMKKr6wm3"]} -{"Format": "IDEA0", "ID": "b68ab2cd-1b3f-452e-9efe-66dc6a5ca897", "DetectTime": "2023-10-30T14:06:11.027980+02:00", "EventTime": "2023-10-30T14:06:11.027996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. ", "ContentType": "text/plain"}], "uids": ["CwoZpF2kGAn3BceFb6"]} -{"Format": "Json", "ID": "b68ab2cd-1b3f-452e-9efe-66dc6a5ca897", "DetectTime": "2023-10-30T14:06:11.027980+02:00", "EventTime": "2023-10-30T14:06:11.027996+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:11:33.270517+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:11.156974)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e9ab5b01-851f-4cf9-8cf0-8ed0933c0eff", "DetectTime": "2023-10-30T14:06:11.162480+02:00", "EventTime": "2023-10-30T14:06:11.162499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CiPV3344kgUiGSpiMa"]} -{"Format": "IDEA0", "ID": "3aa91720-bce7-425b-b2fa-aea5be0d60db", "DetectTime": "2023-10-30T14:06:11.217704+02:00", "EventTime": "2023-10-30T14:06:11.217719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CPdfbJ3a4g0C1SJsLj"]} -{"Format": "IDEA0", "ID": "e8988779-b8bb-4f71-8c15-97dded8d4ae0", "DetectTime": "2023-10-30T14:06:11.266399+02:00", "EventTime": "2023-10-30T14:06:11.266415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CaepZi3skFsGdaEU0g"]} -{"Format": "IDEA0", "ID": "5176eb40-73af-4640-9b7b-6902de55231f", "DetectTime": "2023-10-30T14:06:11.317999+02:00", "EventTime": "2023-10-30T14:06:11.318011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CgLKmI1O1ooiqufIKa"]} -{"Format": "IDEA0", "ID": "d13d448d-8510-4ca4-b17c-3be64a5d03e5", "DetectTime": "2023-10-30T14:06:11.373386+02:00", "EventTime": "2023-10-30T14:06:11.373407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CLAU3l14ImO4MuQxr4"]} -{"Format": "IDEA0", "ID": "15296484-fbec-41cf-8a5b-74d8f36cefe8", "DetectTime": "2023-10-30T14:06:11.424798+02:00", "EventTime": "2023-10-30T14:06:11.424808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cf52gb11uWBN5SP8a1"]} -{"Format": "IDEA0", "ID": "503e20c6-16ed-4ce7-987c-b2173c265ed7", "DetectTime": "2023-10-30T14:06:11.474630+02:00", "EventTime": "2023-10-30T14:06:11.474650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CmcL7B12MRuE9Q1NH7", "C3GA1KZnF9XM80jgl", "CtFGw822Dc1GkSIk22", "CiJFLq4oSlbyN9Eyua"]} -{"Format": "IDEA0", "ID": "3eb37805-0178-42a2-a000-247dc0d6a638", "DetectTime": "2023-10-30T14:06:11.485206+02:00", "EventTime": "2023-10-30T14:06:11.485226+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CiJFLq4oSlbyN9Eyua"]} -{"Format": "IDEA0", "ID": "43487f88-91e3-4a12-b4b3-06f64e831b9f", "DetectTime": "2023-10-30T14:06:11.495180+02:00", "EventTime": "2023-10-30T14:06:11.495193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CIXDUzuudOVs2J196"]} -{"Format": "IDEA0", "ID": "36fbb8a5-d621-46d5-abd2-967fec0016e8", "DetectTime": "2023-10-30T14:06:11.545233+02:00", "EventTime": "2023-10-30T14:06:11.545251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CQEhs01NXwy4sqmq88"]} -{"Format": "Json", "ID": "36fbb8a5-d621-46d5-abd2-967fec0016e8", "DetectTime": "2023-10-30T14:06:11.545233+02:00", "EventTime": "2023-10-30T14:06:11.545251+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:11:34.931565+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:11.631027)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9f615798-f4e6-4a23-8ee6-a48dd314b52f", "DetectTime": "2023-10-30T14:06:11.635598+02:00", "EventTime": "2023-10-30T14:06:11.635611+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C06gYg1C20epusEoE5"]} -{"Format": "IDEA0", "ID": "b9d1f35f-98e7-4669-b264-98f130b12c11", "DetectTime": "2023-10-30T14:06:11.644610+02:00", "EventTime": "2023-10-30T14:06:11.644625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CVLofg37GSzdv7zRtg"]} -{"Format": "IDEA0", "ID": "d5b9f471-1ede-4109-9dfd-584ca80cb457", "DetectTime": "2023-10-30T14:06:11.693506+02:00", "EventTime": "2023-10-30T14:06:11.693520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18951], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. ", "ContentType": "text/plain"}], "uids": ["CM7gZT3zg2atIgdIud"]} -{"Format": "IDEA0", "ID": "a0dc30f7-f291-4513-ac0f-a23aceb69c32", "DetectTime": "2023-10-30T14:06:11.744239+02:00", "EventTime": "2023-10-30T14:06:11.744253+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CT90Hd4Udp5Yp07sVh"]} -{"Format": "IDEA0", "ID": "776a7275-5322-41cc-b300-87dd5254eeee", "DetectTime": "2023-10-30T14:06:11.752588+02:00", "EventTime": "2023-10-30T14:06:11.752602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CFCBcW1LljfqUXoXu6"]} -{"Format": "IDEA0", "ID": "bfa035bd-7771-4f58-807c-080ea53e544f", "DetectTime": "2023-10-30T14:06:11.803356+02:00", "EventTime": "2023-10-30T14:06:11.803377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CPGoVP1e5idg5T7sE2"]} -{"Format": "IDEA0", "ID": "a1644ecc-adab-4e56-86f2-08c98d0573dd", "DetectTime": "2023-10-30T14:06:11.856994+02:00", "EventTime": "2023-10-30T14:06:11.857016+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["COez4L1TpWSw8M4ht8"]} -{"Format": "IDEA0", "ID": "96037fdc-38dc-410e-851f-1d0785f5124b", "DetectTime": "2023-10-30T14:06:11.866548+02:00", "EventTime": "2023-10-30T14:06:11.866564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CLyqJ017vPRyWqVjBg"]} -{"Format": "IDEA0", "ID": "c4d8f37a-92b9-4140-a677-a25a437bd67e", "DetectTime": "2023-10-30T14:06:11.916373+02:00", "EventTime": "2023-10-30T14:06:11.916390+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C0sB3d2lom3uQXg3Mj"]} -{"Format": "IDEA0", "ID": "adac12b5-8ec7-4a5c-909b-19fbe1e2bbb4", "DetectTime": "2023-10-30T14:06:11.926275+02:00", "EventTime": "2023-10-30T14:06:11.926291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Co2okR3VT4dI4v3Kv7"]} -{"Format": "IDEA0", "ID": "433dfeb6-6a77-46bb-a1eb-7f0a47900525", "DetectTime": "2023-10-30T14:06:11.974134+02:00", "EventTime": "2023-10-30T14:06:11.974152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CcqY2P17nd3xGBJik8"]} -{"Format": "IDEA0", "ID": "6a6ef0e8-256a-4a91-8948-7a205c07e79f", "DetectTime": "2023-10-30T14:06:12.024649+02:00", "EventTime": "2023-10-30T14:06:12.024663+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CaayFU1UfrtmfDGlg6"]} -{"Format": "IDEA0", "ID": "3987d98f-aa24-4dfd-b13d-2b2bed99cbe8", "DetectTime": "2023-10-30T14:06:12.033676+02:00", "EventTime": "2023-10-30T14:06:12.033688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["CFMbKf2exqNZIRLopb"]} -{"Format": "Json", "ID": "3987d98f-aa24-4dfd-b13d-2b2bed99cbe8", "DetectTime": "2023-10-30T14:06:12.033676+02:00", "EventTime": "2023-10-30T14:06:12.033688+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:11:55.728010+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:12.123227)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb00b662-469f-4796-82af-a772c97b3076", "DetectTime": "2023-10-30T14:06:12.128916+02:00", "EventTime": "2023-10-30T14:06:12.128940+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["C7XVZT2qui6ZEULZYi"]} -{"Format": "IDEA0", "ID": "7c7844aa-3f3b-4996-9ce4-c659b1ec691f", "DetectTime": "2023-10-30T14:06:12.140083+02:00", "EventTime": "2023-10-30T14:06:12.140100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CEv9jUvHnaN1yK6S9"]} -{"Format": "IDEA0", "ID": "2ac8e2f9-e48c-4c88-ab7a-c49321510d2d", "DetectTime": "2023-10-30T14:06:12.190432+02:00", "EventTime": "2023-10-30T14:06:12.190445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CFCRrI10VLO9B7wQn"]} -{"Format": "IDEA0", "ID": "8b797a2c-aa60-4690-b81b-90489d440a44", "DetectTime": "2023-10-30T14:06:12.238955+02:00", "EventTime": "2023-10-30T14:06:12.238970+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Cce1TZ1e1aw5fkWgPe"]} -{"Format": "IDEA0", "ID": "227e8a27-0260-42b9-8ee3-7d96724f79a2", "DetectTime": "2023-10-30T14:06:12.249248+02:00", "EventTime": "2023-10-30T14:06:12.249260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. ", "ContentType": "text/plain"}], "uids": ["CGNe4B1o54Foqmptd7"]} -{"Format": "IDEA0", "ID": "78efb6e3-a6af-4d35-94b9-6990b9bcbc29", "DetectTime": "2023-10-30T14:06:12.292131+02:00", "EventTime": "2023-10-30T14:06:12.292148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2039], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2039/UDP destination IP 88.247.65.143. ", "ContentType": "text/plain"}], "uids": ["C4x3kW1YtySpi3V70l"]} -{"Format": "IDEA0", "ID": "9303c623-4f0a-4507-b2bf-ba44ed9e93d6", "DetectTime": "2023-10-30T14:06:12.335505+02:00", "EventTime": "2023-10-30T14:06:12.335523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["CxES354528L5AsoKB6"]} -{"Format": "IDEA0", "ID": "45bcb812-85e5-4354-8295-cfa612c7533d", "DetectTime": "2023-10-30T14:06:12.385332+02:00", "EventTime": "2023-10-30T14:06:12.385352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CifUeq4EAMn1lCPNRc"]} -{"Format": "IDEA0", "ID": "9fd1f662-9a4b-4ef9-9bcd-16c4582ce1cf", "DetectTime": "2023-10-30T14:06:12.410378+02:00", "EventTime": "2023-10-30T14:06:12.410396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["CyiHsqy8Hjl8MbCch"]} -{"Format": "IDEA0", "ID": "f20042a9-f02a-4d3a-8bf1-0e84d83280e1", "DetectTime": "2023-10-30T14:06:12.460778+02:00", "EventTime": "2023-10-30T14:06:12.460795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["C966p31sEmc1B92FHl"]} -{"Format": "IDEA0", "ID": "03e3d976-de6b-40f2-bd4d-2f47887bc861", "DetectTime": "2023-10-30T14:06:12.508669+02:00", "EventTime": "2023-10-30T14:06:12.508685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CgMqisJJdTGx29BOl"]} -{"Format": "Json", "ID": "03e3d976-de6b-40f2-bd4d-2f47887bc861", "DetectTime": "2023-10-30T14:06:12.508669+02:00", "EventTime": "2023-10-30T14:06:12.508685+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:12:32.576599+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:12.587596)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc916c34-ba69-4bba-b0bf-71e651335dab", "DetectTime": "2023-10-30T14:06:12.593432+02:00", "EventTime": "2023-10-30T14:06:12.593449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11735/UDP destination IP 78.188.99.85. ", "ContentType": "text/plain"}], "uids": ["CPCnkB2mZG5l7pa784"]} -{"Format": "IDEA0", "ID": "0d5d1f6b-4b3b-492b-8c1c-94bf7aa11e1f", "DetectTime": "2023-10-30T14:06:12.642929+02:00", "EventTime": "2023-10-30T14:06:12.642942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 31.51.19.187. ", "ContentType": "text/plain"}], "uids": ["CuFQgu3RRprPbnhwaa"]} -{"Format": "IDEA0", "ID": "523a1d56-d6b9-40e9-88e2-e793dda585ad", "DetectTime": "2023-10-30T14:06:12.687773+02:00", "EventTime": "2023-10-30T14:06:12.687799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CRClFM1yjgFyQUbXAb"]} -{"Format": "IDEA0", "ID": "489ddd2a-4a88-43df-af80-a5d43e79dc17", "DetectTime": "2023-10-30T14:06:12.737271+02:00", "EventTime": "2023-10-30T14:06:12.737287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["CZ7UvL1G27cmLflv9e"]} -{"Format": "IDEA0", "ID": "c756bb50-e421-47e5-9b23-7fcbbcec2cf8", "DetectTime": "2023-10-30T14:06:12.783528+02:00", "EventTime": "2023-10-30T14:06:12.783540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CM3Jpy2hk0pHRn7N8g"]} -{"Format": "IDEA0", "ID": "3c8eda41-3b9c-49fe-8ef5-c843be2b4355", "DetectTime": "2023-10-30T14:06:12.828882+02:00", "EventTime": "2023-10-30T14:06:12.828897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CpzPBHBPI6KYbOMth"]} -{"Format": "IDEA0", "ID": "2335f18c-75ee-4e46-a35b-f172869eea93", "DetectTime": "2023-10-30T14:06:12.869810+02:00", "EventTime": "2023-10-30T14:06:12.869823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["CJQsB5BQroVeNgcVa"]} -{"Format": "IDEA0", "ID": "f715f3bf-53db-48e2-8373-b170ee33e7b1", "DetectTime": "2023-10-30T14:06:12.914641+02:00", "EventTime": "2023-10-30T14:06:12.914662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CFiKJm3FhgBnsBtgi2"]} -{"Format": "Json", "ID": "f715f3bf-53db-48e2-8373-b170ee33e7b1", "DetectTime": "2023-10-30T14:06:12.914641+02:00", "EventTime": "2023-10-30T14:06:12.914662+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:12:34.001772+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:12.996130)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "60a28443-46ac-477e-ba1f-b5a5f23bb038", "DetectTime": "2023-10-30T14:06:13.000743+02:00", "EventTime": "2023-10-30T14:06:13.000762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C50ygc1T9Z5OpkTW06"]} -{"Format": "IDEA0", "ID": "303970e0-3bf9-47ad-b694-41784dcbc611", "DetectTime": "2023-10-30T14:06:13.042374+02:00", "EventTime": "2023-10-30T14:06:13.042387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15153], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. ", "ContentType": "text/plain"}], "uids": ["CcJmGM14bB4Ldc6Ga2"]} -{"Format": "IDEA0", "ID": "809cf7b3-4569-438e-8b21-1cdbfa247bb6", "DetectTime": "2023-10-30T14:06:13.083693+02:00", "EventTime": "2023-10-30T14:06:13.083705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["C0sB3d2lom3uQXg3Mj", "C7XVZT2qui6ZEULZYi", "CUdLHY1v1MNnzmQX3b", "CT90Hd4Udp5Yp07sVh"]} -{"Format": "IDEA0", "ID": "d527240d-28ed-4180-aa68-423b674e0bc6", "DetectTime": "2023-10-30T14:06:13.092351+02:00", "EventTime": "2023-10-30T14:06:13.092369+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CUdLHY1v1MNnzmQX3b"]} -{"Format": "IDEA0", "ID": "a6e9f19d-e6b8-440c-91ef-787a59cd8c1d", "DetectTime": "2023-10-30T14:06:13.101741+02:00", "EventTime": "2023-10-30T14:06:13.101759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CqPwTo30YiEWzxaSx7"]} -{"Format": "IDEA0", "ID": "e8005513-a0cb-43ec-954a-cd88690dbdbc", "DetectTime": "2023-10-30T14:06:13.138543+02:00", "EventTime": "2023-10-30T14:06:13.138557+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C4ruam1RcuJkl4GMb8"]} -{"Format": "IDEA0", "ID": "09a246da-0c55-494b-bef3-f6e4ba24ff4e", "DetectTime": "2023-10-30T14:06:13.146895+02:00", "EventTime": "2023-10-30T14:06:13.146910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CJQbzn2NUOes7X5tUc"]} -{"Format": "IDEA0", "ID": "04ad020f-3f83-4473-beac-09a56f56a44b", "DetectTime": "2023-10-30T14:06:13.187026+02:00", "EventTime": "2023-10-30T14:06:13.187046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CKosL3mfybLf9uPC"]} -{"Format": "IDEA0", "ID": "e9d9d59a-4d01-413d-9a1c-e7c72458979e", "DetectTime": "2023-10-30T14:06:13.228811+02:00", "EventTime": "2023-10-30T14:06:13.228826+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CyoBWuy2nqeUA8hz6"]} -{"Format": "IDEA0", "ID": "99aca04c-99a1-4f7a-bcf5-c8f84eb7915a", "DetectTime": "2023-10-30T14:06:13.236792+02:00", "EventTime": "2023-10-30T14:06:13.236808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CsuGDL3CbuC0kuIpA2"]} -{"Format": "IDEA0", "ID": "642eee5b-9a80-4e9a-91bb-dc51ca3412ad", "DetectTime": "2023-10-30T14:06:13.279269+02:00", "EventTime": "2023-10-30T14:06:13.279287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CDE1rP25McPveqIiy6"]} -{"Format": "IDEA0", "ID": "a3d4663b-6bf2-425f-a068-5a57ce71044e", "DetectTime": "2023-10-30T14:06:13.316331+02:00", "EventTime": "2023-10-30T14:06:13.316349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["ChYQ6viLM86fNuF17"]} -{"Format": "Json", "ID": "a3d4663b-6bf2-425f-a068-5a57ce71044e", "DetectTime": "2023-10-30T14:06:13.316331+02:00", "EventTime": "2023-10-30T14:06:13.316349+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:12:37.131845+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:13.389015)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fa7cfe5e-df85-4dcc-a882-1c060b64dbb2", "DetectTime": "2023-10-30T14:06:13.393726+02:00", "EventTime": "2023-10-30T14:06:13.393742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["Cgx9VJ2gnwfkOKscD7"]} -{"Format": "IDEA0", "ID": "2de4c0b5-53c5-4d5b-ad55-f0fb50c5abac", "DetectTime": "2023-10-30T14:06:13.429790+02:00", "EventTime": "2023-10-30T14:06:13.429803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CJj0Zw2QbsZMQsWkqj"]} -{"Format": "IDEA0", "ID": "df8f83a7-fcea-4644-91e5-d619d49cfbc0", "DetectTime": "2023-10-30T14:06:13.468092+02:00", "EventTime": "2023-10-30T14:06:13.468112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CjdYLE4fXSNRcllZp3"]} -{"Format": "IDEA0", "ID": "e3da87ca-943f-4339-a7ce-8d6ac27719e2", "DetectTime": "2023-10-30T14:06:13.499138+02:00", "EventTime": "2023-10-30T14:06:13.499149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26762], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26762/UDP destination IP 190.239.253.243. ", "ContentType": "text/plain"}], "uids": ["CTPOof1hnLKXD3j7h4"]} -{"Format": "IDEA0", "ID": "18018076-7ac2-4785-827e-065a0fdc9529", "DetectTime": "2023-10-30T14:06:13.535628+02:00", "EventTime": "2023-10-30T14:06:13.535647+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CLiOvA2Zud70ULbuYd"]} -{"Format": "IDEA0", "ID": "2af9f8a0-d8b5-47ba-b68f-05b75e3ca3e6", "DetectTime": "2023-10-30T14:06:13.545904+02:00", "EventTime": "2023-10-30T14:06:13.545923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["C4ZV162zPgiwh8M4d1"]} -{"Format": "IDEA0", "ID": "b2200ccb-9769-4d98-b077-71acfecb0a2b", "DetectTime": "2023-10-30T14:06:13.580881+02:00", "EventTime": "2023-10-30T14:06:13.580903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cc1i9I3kOnZPAUXNOf"]} -{"Format": "IDEA0", "ID": "1f77908c-1de2-4d29-809a-773a5d4c413b", "DetectTime": "2023-10-30T14:06:13.621725+02:00", "EventTime": "2023-10-30T14:06:13.621745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C5iiLWpo82JrcFqXh"]} -{"Format": "IDEA0", "ID": "5cba4b63-ba11-4957-a1c8-037a81851e87", "DetectTime": "2023-10-30T14:06:13.663392+02:00", "EventTime": "2023-10-30T14:06:13.663404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["C2Dc3m1p7LAWTjtbrf"]} -{"Format": "Json", "ID": "5cba4b63-ba11-4957-a1c8-037a81851e87", "DetectTime": "2023-10-30T14:06:13.663392+02:00", "EventTime": "2023-10-30T14:06:13.663404+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:43:54.118776+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:13.743401)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "37e046cf-d86d-4020-a386-a9336f78c63f", "DetectTime": "2023-10-30T14:06:13.748322+02:00", "EventTime": "2023-10-30T14:06:13.748337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CN6bKf3MPGDFC0szg4"]} -{"Format": "IDEA0", "ID": "27408ccb-69cc-400f-8fe0-c2db9322af75", "DetectTime": "2023-10-30T14:06:13.786922+02:00", "EventTime": "2023-10-30T14:06:13.786944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["ChRg8D1Ju7KMk819jl"]} -{"Format": "IDEA0", "ID": "35303a6f-37cc-49f5-b68d-4400edcdaa67", "DetectTime": "2023-10-30T14:06:13.825552+02:00", "EventTime": "2023-10-30T14:06:13.825567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C3tY2Z3QE4mjGG0zO2"]} -{"Format": "IDEA0", "ID": "e96e0f06-ebb7-4256-ac9c-eed32eefce01", "DetectTime": "2023-10-30T14:06:13.863418+02:00", "EventTime": "2023-10-30T14:06:13.863435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CPlkiG2drcJg3w6HBf"]} -{"Format": "IDEA0", "ID": "d3854a01-4be8-4f59-9c61-ae7c6d029a99", "DetectTime": "2023-10-30T14:06:13.886116+02:00", "EventTime": "2023-10-30T14:06:13.886136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CZLAop4QA9iuDA0Sv8"]} -{"Format": "IDEA0", "ID": "be6717f3-4cda-4f06-a71d-0d84ced03fc9", "DetectTime": "2023-10-30T14:06:13.927311+02:00", "EventTime": "2023-10-30T14:06:13.927322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["C33Two3CkTSB04i3mg"]} -{"Format": "IDEA0", "ID": "4f091e95-14ce-4514-b13c-4696bb5c8f2a", "DetectTime": "2023-10-30T14:06:13.963829+02:00", "EventTime": "2023-10-30T14:06:13.963845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CUhiT4122SaA2GVI43"]} -{"Format": "IDEA0", "ID": "e26a49a1-f1b2-41e3-b9f6-ce155c734703", "DetectTime": "2023-10-30T14:06:14.002405+02:00", "EventTime": "2023-10-30T14:06:14.002422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["COJWqd3NJFK9tElvAd"]} -{"Format": "IDEA0", "ID": "ca920560-b28b-4930-b956-50ad156d29bd", "DetectTime": "2023-10-30T14:06:14.036078+02:00", "EventTime": "2023-10-30T14:06:14.036096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. ", "ContentType": "text/plain"}], "uids": ["CWov4pKBph4l7ycw8"]} -{"Format": "Json", "ID": "ca920560-b28b-4930-b956-50ad156d29bd", "DetectTime": "2023-10-30T14:06:14.036078+02:00", "EventTime": "2023-10-30T14:06:14.036096+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11075], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:44:11.154172+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:14.108653)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "30bc0bb9-2e58-441b-8238-69c4c4a2c07c", "DetectTime": "2023-10-30T14:06:14.114685+02:00", "EventTime": "2023-10-30T14:06:14.114705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CpxBEH1XzAjJxIuTUb"]} -{"Format": "IDEA0", "ID": "624cf7e1-45d7-4d48-89a0-1a92b48270bc", "DetectTime": "2023-10-30T14:06:14.146636+02:00", "EventTime": "2023-10-30T14:06:14.146648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CwQsTC2GxLuAs2nN73"]} -{"Format": "IDEA0", "ID": "8fc845b1-d200-43bb-bcff-17dc61004f2c", "DetectTime": "2023-10-30T14:06:14.178893+02:00", "EventTime": "2023-10-30T14:06:14.178905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C5PJZk2St1yv7bkU7c"]} -{"Format": "IDEA0", "ID": "52ded601-cb4d-4744-a3ab-e85df03d3c74", "DetectTime": "2023-10-30T14:06:14.210657+02:00", "EventTime": "2023-10-30T14:06:14.210675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CqxetP1A3XPrdoIHo6"]} -{"Format": "IDEA0", "ID": "36cf0e53-91c4-4346-85a0-dd20dfdad31f", "DetectTime": "2023-10-30T14:06:14.240594+02:00", "EventTime": "2023-10-30T14:06:14.240614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CN5YU34VekDMfGvkxb"]} -{"Format": "IDEA0", "ID": "da52bc3f-8955-4c62-aebc-5811db45cb74", "DetectTime": "2023-10-30T14:06:14.278713+02:00", "EventTime": "2023-10-30T14:06:14.278729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["CzwrxU13JQVJGVKirc"]} -{"Format": "IDEA0", "ID": "f5cf81d9-b1a5-4096-a695-15c1ea4a041d", "DetectTime": "2023-10-30T14:06:14.317520+02:00", "EventTime": "2023-10-30T14:06:14.317534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["C1Raqi1bJczmUHRLfa"]} -{"Format": "IDEA0", "ID": "7029c295-7899-4b69-a7d2-4dbd88de527c", "DetectTime": "2023-10-30T14:06:14.356076+02:00", "EventTime": "2023-10-30T14:06:14.356089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. ", "ContentType": "text/plain"}], "uids": ["Cd2hLIzmq24OhdzCa"]} -{"Format": "Json", "ID": "7029c295-7899-4b69-a7d2-4dbd88de527c", "DetectTime": "2023-10-30T14:06:14.356076+02:00", "EventTime": "2023-10-30T14:06:14.356089+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:44:49.085822+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:14.430005)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6cb43627-09e0-4872-a555-ec46ae5ead7b", "DetectTime": "2023-10-30T14:06:14.436096+02:00", "EventTime": "2023-10-30T14:06:14.436113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2039], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2039/UDP destination IP 88.247.65.143. ", "ContentType": "text/plain"}], "uids": ["CUP6f7lZHNKxUvAH3"]} -{"Format": "IDEA0", "ID": "12d03bec-3513-4c3c-b751-1512f3f0fa3f", "DetectTime": "2023-10-30T14:06:14.471814+02:00", "EventTime": "2023-10-30T14:06:14.471837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["ChiiFk4KFwmJgLba61"]} -{"Format": "IDEA0", "ID": "d419f70c-99cb-41dd-9ff1-4158c932e0e8", "DetectTime": "2023-10-30T14:06:14.505705+02:00", "EventTime": "2023-10-30T14:06:14.505721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["CrWd242awf4MaAcAs7"]} -{"Format": "IDEA0", "ID": "93afc709-9624-4a36-8303-7be5b010baa3", "DetectTime": "2023-10-30T14:06:14.538376+02:00", "EventTime": "2023-10-30T14:06:14.538396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CbyGmQDLYHB6Eru1"]} -{"Format": "IDEA0", "ID": "a3c09e08-b44f-4230-bb41-7bf8d257fe1b", "DetectTime": "2023-10-30T14:06:14.574635+02:00", "EventTime": "2023-10-30T14:06:14.574650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CrH16F4Uy5VutDrDD5"]} -{"Format": "IDEA0", "ID": "8356406a-44d9-4e27-9ef0-3e6917f88bc3", "DetectTime": "2023-10-30T14:06:14.607426+02:00", "EventTime": "2023-10-30T14:06:14.607437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CqpTTa2N333hKg9Yu6"]} -{"Format": "IDEA0", "ID": "9a7e520c-7e85-4ffa-a1f8-3c8ba2428738", "DetectTime": "2023-10-30T14:06:14.638457+02:00", "EventTime": "2023-10-30T14:06:14.638475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CAyr2n1aooTLvSl9Ci"]} -{"Format": "IDEA0", "ID": "2428e8ff-b49d-4900-9e30-ba4b41b7dd0f", "DetectTime": "2023-10-30T14:06:14.765328+02:00", "EventTime": "2023-10-30T14:06:14.765347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CPxQGt34qG0kL38ztk"]} -{"Format": "Json", "ID": "2428e8ff-b49d-4900-9e30-ba4b41b7dd0f", "DetectTime": "2023-10-30T14:06:14.765328+02:00", "EventTime": "2023-10-30T14:06:14.765347+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:45:22.295055+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:14.846056)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "12d35e3b-ad50-49f3-97bb-7a97fc5f4c7b", "DetectTime": "2023-10-30T14:06:14.851956+02:00", "EventTime": "2023-10-30T14:06:14.851970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["C4xaBm1Av10bHiRGS4"]} -{"Format": "IDEA0", "ID": "44047d1c-7336-4dff-a205-3fa011d5653b", "DetectTime": "2023-10-30T14:06:14.891326+02:00", "EventTime": "2023-10-30T14:06:14.891343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["C6b2BF29pqiXmxcDr1"]} -{"Format": "IDEA0", "ID": "df35ea4d-c21e-4a37-8c3c-147621f975a5", "DetectTime": "2023-10-30T14:06:14.926085+02:00", "EventTime": "2023-10-30T14:06:14.926105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["ChTWj91C9sBdcAZ7Me"]} -{"Format": "IDEA0", "ID": "cde0342a-9426-4d47-9c52-8d64f6fa4964", "DetectTime": "2023-10-30T14:06:14.962372+02:00", "EventTime": "2023-10-30T14:06:14.962394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CZVRyZ1w5W7NBbIfQd"]} -{"Format": "IDEA0", "ID": "1ccee697-12d2-4846-ace7-240eb9e5a4d3", "DetectTime": "2023-10-30T14:06:15.000299+02:00", "EventTime": "2023-10-30T14:06:15.000315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15153], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. ", "ContentType": "text/plain"}], "uids": ["CowJXKpfaw0ejvF6e"]} -{"Format": "IDEA0", "ID": "488f900c-fa65-4120-a854-a45473039e43", "DetectTime": "2023-10-30T14:06:15.036874+02:00", "EventTime": "2023-10-30T14:06:15.036897+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CRU17g2VNfQ31aQd55"]} -{"Format": "IDEA0", "ID": "d66417f8-a81d-4df9-a7e1-e68f41071878", "DetectTime": "2023-10-30T14:06:15.045815+02:00", "EventTime": "2023-10-30T14:06:15.045832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["Cl9rfp25Y7oySWwPZ2"]} -{"Format": "IDEA0", "ID": "70563a23-e950-4122-9708-fa595f1fa2c0", "DetectTime": "2023-10-30T14:06:15.082703+02:00", "EventTime": "2023-10-30T14:06:15.082720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CIL54RCI6sN7EQkI8"]} -{"Format": "IDEA0", "ID": "fcc634c2-1e72-4c4a-8568-76ca5992632c", "DetectTime": "2023-10-30T14:06:15.119703+02:00", "EventTime": "2023-10-30T14:06:15.119720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C78a1mEaBketwZHf4"]} -{"Format": "Json", "ID": "fcc634c2-1e72-4c4a-8568-76ca5992632c", "DetectTime": "2023-10-30T14:06:15.119703+02:00", "EventTime": "2023-10-30T14:06:15.119720+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T18:45:26.767615+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2023/10/30 14:06:15.196010)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ec8d9585-d309-478c-9621-0af24cdbb63d", "DetectTime": "2023-10-30T14:06:15.201231+02:00", "EventTime": "2023-10-30T14:06:15.201248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["Cgq31B3RdDeEC7xlK4"]} -{"Format": "IDEA0", "ID": "adceb204-47d8-4854-af5f-4f5dc0335d8d", "DetectTime": "2023-10-30T14:06:15.234497+02:00", "EventTime": "2023-10-30T14:06:15.234513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C02e444VVyFyV1nQG"]} -{"Format": "IDEA0", "ID": "02e9fa33-78ad-4947-982d-5348fa1504bc", "DetectTime": "2023-10-30T14:06:15.266403+02:00", "EventTime": "2023-10-30T14:06:15.266418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CZB6Yp3UEKA4WYUGZ1"]} -{"Format": "IDEA0", "ID": "d6b46781-53b3-4972-a39d-bea628b9a33f", "DetectTime": "2023-10-30T14:06:15.298731+02:00", "EventTime": "2023-10-30T14:06:15.298748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CHmEoj1OUiANBvF5B1"]} -{"Format": "IDEA0", "ID": "607744e8-38fb-4dbf-a088-a09eab42f51a", "DetectTime": "2023-10-30T14:06:15.331644+02:00", "EventTime": "2023-10-30T14:06:15.331661+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C9agnvZ3qeKDHCFVa"]} -{"Format": "IDEA0", "ID": "b9be59ff-0c2e-4d63-9df9-10b1c390a68a", "DetectTime": "2023-10-30T14:06:15.338203+02:00", "EventTime": "2023-10-30T14:06:15.338219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CWHloX4dp9AlqBjR8"]} -{"Format": "IDEA0", "ID": "caf6cd4d-5ec5-44b6-9f43-507ff846443b", "DetectTime": "2023-10-30T14:06:15.365282+02:00", "EventTime": "2023-10-30T14:06:15.365309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CfBJhy4XU1eqfqo0Rh"]} -{"Format": "IDEA0", "ID": "c3301506-2c3e-457b-b381-90e35e78c1c1", "DetectTime": "2023-10-30T14:06:15.423615+02:00", "EventTime": "2023-10-30T14:06:15.423632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CaoBFwDx0izRI9JVb"]} -{"Format": "IDEA0", "ID": "b9bdf979-747c-4480-846e-a7eecd0932c3", "DetectTime": "2023-10-30T14:06:15.483063+02:00", "EventTime": "2023-10-30T14:06:15.483082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CRVPsrUjheRVfvfof"]} -{"Format": "IDEA0", "ID": "37cd3390-e6c7-495c-afdc-26bae6e9a912", "DetectTime": "2023-10-30T14:06:15.545347+02:00", "EventTime": "2023-10-30T14:06:15.545363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["CfTSab1Ky3OG174Wye"]} -{"Format": "IDEA0", "ID": "40f5b60b-ea06-4b86-8e6b-a83850829264", "DetectTime": "2023-10-30T14:06:15.603228+02:00", "EventTime": "2023-10-30T14:06:15.603245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CgBOcT1BU9ftHuoRh2"]} -{"Format": "IDEA0", "ID": "8acabc62-3b9e-4178-aff8-7d7903798b88", "DetectTime": "2023-10-30T14:06:15.666615+02:00", "EventTime": "2023-10-30T14:06:15.666632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CMvHlc2TSUP6l8RXS"]} -{"Format": "Json", "ID": "8acabc62-3b9e-4178-aff8-7d7903798b88", "DetectTime": "2023-10-30T14:06:15.666615+02:00", "EventTime": "2023-10-30T14:06:15.666632+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:17:44.163552+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:15.832398)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2ca1d88e-7e40-4302-8c16-b2444c03257d", "DetectTime": "2023-10-30T14:06:15.836879+02:00", "EventTime": "2023-10-30T14:06:15.836893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CW2Nuz2b5l52MfAw1b"]} -{"Format": "IDEA0", "ID": "4b5a75e4-7d6c-40b2-bea9-178a30c1d5db", "DetectTime": "2023-10-30T14:06:15.902424+02:00", "EventTime": "2023-10-30T14:06:15.902450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CdqZcZ2U2Kg4xfLdp7"]} -{"Format": "IDEA0", "ID": "a3a53eaf-f050-41e6-9faa-ff558e514cc1", "DetectTime": "2023-10-30T14:06:15.968553+02:00", "EventTime": "2023-10-30T14:06:15.968572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["C7NhZ73n2TIli1VDsb"]} -{"Format": "IDEA0", "ID": "dcb88758-d853-4ee4-8a9c-a92c2d8df707", "DetectTime": "2023-10-30T14:06:16.029626+02:00", "EventTime": "2023-10-30T14:06:16.029647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEJ16w2EMG1kxoGObc"]} -{"Format": "IDEA0", "ID": "f46028b1-83c3-4905-9b91-78e13f655081", "DetectTime": "2023-10-30T14:06:16.088012+02:00", "EventTime": "2023-10-30T14:06:16.088031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CZRvGl1TUphSiFg0S1"]} -{"Format": "IDEA0", "ID": "64c478fc-c153-40c8-92c4-7274238b6cce", "DetectTime": "2023-10-30T14:06:16.149558+02:00", "EventTime": "2023-10-30T14:06:16.149577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CDtToqeCP63zYTBf1"]} -{"Format": "IDEA0", "ID": "1a113d0b-d620-4e67-aa73-36b4aeb0263a", "DetectTime": "2023-10-30T14:06:16.204099+02:00", "EventTime": "2023-10-30T14:06:16.204117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["C5YWe72CEJgVh6UTv9"]} -{"Format": "IDEA0", "ID": "80aef1ab-ef11-4467-a451-961ac64e167c", "DetectTime": "2023-10-30T14:06:16.259165+02:00", "EventTime": "2023-10-30T14:06:16.259191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cx7FDh4EVK46nz4zZ2"]} -{"Format": "Json", "ID": "80aef1ab-ef11-4467-a451-961ac64e167c", "DetectTime": "2023-10-30T14:06:16.259165+02:00", "EventTime": "2023-10-30T14:06:16.259191+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:17:45.697777+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:16.351162)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ec0739d4-4f75-4866-8db2-4bd8a58878cb", "DetectTime": "2023-10-30T14:06:16.360718+02:00", "EventTime": "2023-10-30T14:06:16.360743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CsrI5l158ePmWiXis7"]} -{"Format": "IDEA0", "ID": "bb7bcf1c-60b4-4319-a68a-8cd86a28d327", "DetectTime": "2023-10-30T14:06:16.418062+02:00", "EventTime": "2023-10-30T14:06:16.418085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CGOfUS2DQUiIX2NEHb"]} -{"Format": "IDEA0", "ID": "20e0c457-3890-4ed5-985a-b61688d3b068", "DetectTime": "2023-10-30T14:06:16.475563+02:00", "EventTime": "2023-10-30T14:06:16.475599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CvqLCsIqJsmmZCvb"]} -{"Format": "IDEA0", "ID": "aff3ec70-a627-4244-b3b0-56b00a53b2d4", "DetectTime": "2023-10-30T14:06:16.526415+02:00", "EventTime": "2023-10-30T14:06:16.526429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CofahRbRHXMWmebf9"]} -{"Format": "IDEA0", "ID": "151746e1-7cb8-4f87-99ca-04b3f9477d80", "DetectTime": "2023-10-30T14:06:16.577260+02:00", "EventTime": "2023-10-30T14:06:16.577280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CfI8OY3w2ZXQ5tJ8ud"]} -{"Format": "IDEA0", "ID": "2e69320b-615e-464d-aec6-a96069db3de8", "DetectTime": "2023-10-30T14:06:16.625589+02:00", "EventTime": "2023-10-30T14:06:16.625613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["CPfBPJ1FlRmVsvwyx1"]} -{"Format": "IDEA0", "ID": "5749b9fd-f092-4292-80f4-f10d6a468c0b", "DetectTime": "2023-10-30T14:06:16.670718+02:00", "EventTime": "2023-10-30T14:06:16.670730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["C2TP0E44gw84vxAk0b"]} -{"Format": "IDEA0", "ID": "de671716-d3ae-4393-a662-e60030f5ca77", "DetectTime": "2023-10-30T14:06:16.715381+02:00", "EventTime": "2023-10-30T14:06:16.715392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13908], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. ", "ContentType": "text/plain"}], "uids": ["CAX9XS1d1JhZbkiWH6"]} -{"Format": "Json", "ID": "de671716-d3ae-4393-a662-e60030f5ca77", "DetectTime": "2023-10-30T14:06:16.715381+02:00", "EventTime": "2023-10-30T14:06:16.715392+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13908], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:18:19.872057+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:16.798075)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "685608b8-642b-482f-8e5c-763bf3d79934", "DetectTime": "2023-10-30T14:06:16.803792+02:00", "EventTime": "2023-10-30T14:06:16.803812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CpRdcr17iIU7PTTyGh"]} -{"Format": "IDEA0", "ID": "7d416c01-4466-4542-aa53-f347fe122834", "DetectTime": "2023-10-30T14:06:16.849245+02:00", "EventTime": "2023-10-30T14:06:16.849261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["C9EcycxX8nwiglwWl"]} -{"Format": "IDEA0", "ID": "07e48373-b4f4-46cf-adf2-733210b9d1b8", "DetectTime": "2023-10-30T14:06:16.899627+02:00", "EventTime": "2023-10-30T14:06:16.899653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CvK8kdGa71vaLYS99"]} -{"Format": "IDEA0", "ID": "e8269202-eaec-4996-9a2c-f220708ec7de", "DetectTime": "2023-10-30T14:06:16.945138+02:00", "EventTime": "2023-10-30T14:06:16.945165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CmNetD1wceoeUQyZUe"]} -{"Format": "IDEA0", "ID": "21990bec-4f53-4bb3-9b4b-816c13365aba", "DetectTime": "2023-10-30T14:06:16.989458+02:00", "EventTime": "2023-10-30T14:06:16.989483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["C48TVi4vozCkQMrpZ6"]} -{"Format": "IDEA0", "ID": "0ceb286a-b043-403f-becc-dd76298e47f2", "DetectTime": "2023-10-30T14:06:17.037459+02:00", "EventTime": "2023-10-30T14:06:17.037476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["CI6JIY36EPKM5X9bFi"]} -{"Format": "IDEA0", "ID": "edf30baa-de96-418f-9583-fe9cb30ea5bf", "DetectTime": "2023-10-30T14:06:17.087823+02:00", "EventTime": "2023-10-30T14:06:17.087850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CO12HZWkSBGFjIdWj"]} -{"Format": "IDEA0", "ID": "0e3a6436-a0e7-4910-aadb-512bf5bd1a76", "DetectTime": "2023-10-30T14:06:17.131753+02:00", "EventTime": "2023-10-30T14:06:17.131766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["C4GCdP1MRDtrsj4p77"]} -{"Format": "Json", "ID": "0e3a6436-a0e7-4910-aadb-512bf5bd1a76", "DetectTime": "2023-10-30T14:06:17.131753+02:00", "EventTime": "2023-10-30T14:06:17.131766+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:18:21.482611+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:17.211655)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "68e0a573-96fa-494f-90cb-06a1d46bdd81", "DetectTime": "2023-10-30T14:06:17.217189+02:00", "EventTime": "2023-10-30T14:06:17.217209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CHYTkJ3nT1hzCkLGt4"]} -{"Format": "IDEA0", "ID": "9729f38f-cc37-468a-aa8f-9373461fd0fd", "DetectTime": "2023-10-30T14:06:17.263996+02:00", "EventTime": "2023-10-30T14:06:17.264018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CIeUO04YE1SNYyb91i"]} -{"Format": "IDEA0", "ID": "005c21f2-a25b-416e-ae19-3a21152861da", "DetectTime": "2023-10-30T14:06:17.306488+02:00", "EventTime": "2023-10-30T14:06:17.306512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJc6gX1TOpVT4PMEOg"]} -{"Format": "IDEA0", "ID": "3522f857-ec44-437d-8ce7-8f8a9708a5ea", "DetectTime": "2023-10-30T14:06:17.350069+02:00", "EventTime": "2023-10-30T14:06:17.350098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15153], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. ", "ContentType": "text/plain"}], "uids": ["CG5nPa4XxiTbsVmzrj"]} -{"Format": "IDEA0", "ID": "c92320da-aa06-491d-b54a-07cb34a94683", "DetectTime": "2023-10-30T14:06:17.393549+02:00", "EventTime": "2023-10-30T14:06:17.393573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CjRylg3m8bFDgg1Xlb"]} -{"Format": "IDEA0", "ID": "a86043dd-2261-429e-aadb-ef5c91c2777f", "DetectTime": "2023-10-30T14:06:17.439120+02:00", "EventTime": "2023-10-30T14:06:17.439151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CvpgWB3nf78AYSTaak"]} -{"Format": "IDEA0", "ID": "67362445-5f1a-4376-82b2-a4ff03aaa977", "DetectTime": "2023-10-30T14:06:17.487161+02:00", "EventTime": "2023-10-30T14:06:17.487186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CybCCy1UC3aIX01iM1"]} -{"Format": "IDEA0", "ID": "79ebb8f8-bef5-4e78-9967-a8f7fa759300", "DetectTime": "2023-10-30T14:06:17.531890+02:00", "EventTime": "2023-10-30T14:06:17.531910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["Ccczej4yD9GqCNA3a7"]} -{"Format": "Json", "ID": "79ebb8f8-bef5-4e78-9967-a8f7fa759300", "DetectTime": "2023-10-30T14:06:17.531890+02:00", "EventTime": "2023-10-30T14:06:17.531910+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:18:40.442048+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:17.611974)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dbd9da2f-2fac-4151-8459-5634a57db878", "DetectTime": "2023-10-30T14:06:17.618149+02:00", "EventTime": "2023-10-30T14:06:17.618169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C7kZn41iGq1pwRRRxi"]} -{"Format": "IDEA0", "ID": "1a48f123-38bf-4b58-8f6f-894485718b59", "DetectTime": "2023-10-30T14:06:17.663076+02:00", "EventTime": "2023-10-30T14:06:17.663092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CqBPfl1oCaNEIARsCb"]} -{"Format": "IDEA0", "ID": "9fc7c3aa-dffc-4b85-bf9a-0b257c736cf9", "DetectTime": "2023-10-30T14:06:17.702531+02:00", "EventTime": "2023-10-30T14:06:17.702558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CnVF6ItsVBoBnKC1a"]} -{"Format": "IDEA0", "ID": "734e8bae-094d-4dee-910e-3cec38e5c8c5", "DetectTime": "2023-10-30T14:06:17.747105+02:00", "EventTime": "2023-10-30T14:06:17.747121+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEBsXa2WE7t8kdIcZ1"]} -{"Format": "IDEA0", "ID": "8b90bd13-6dd7-4538-950b-31b508c64785", "DetectTime": "2023-10-30T14:06:17.755132+02:00", "EventTime": "2023-10-30T14:06:17.755150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CxgTCS1Ci61QECzq18"]} -{"Format": "IDEA0", "ID": "ab0e850c-06d9-4692-af20-84d75ef3f96b", "DetectTime": "2023-10-30T14:06:17.797151+02:00", "EventTime": "2023-10-30T14:06:17.797167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CyNEiJ1wAjlA9LPRL4"]} -{"Format": "IDEA0", "ID": "487cf90f-c724-4bfc-9f3e-2166a483d4b4", "DetectTime": "2023-10-30T14:06:17.820310+02:00", "EventTime": "2023-10-30T14:06:17.820337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CmNYLK3FBunacErwUl"]} -{"Format": "IDEA0", "ID": "493a7607-0578-4f7d-b66b-cbb6c992d35f", "DetectTime": "2023-10-30T14:06:17.862628+02:00", "EventTime": "2023-10-30T14:06:17.862640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. ", "ContentType": "text/plain"}], "uids": ["COjDzk3gAd7taUiW65"]} -{"Format": "IDEA0", "ID": "36331b69-d55e-497f-b800-d940d1e81c1d", "DetectTime": "2023-10-30T14:06:17.915653+02:00", "EventTime": "2023-10-30T14:06:17.915669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CVSzn14eaI2vVSo0Cf"]} -{"Format": "IDEA0", "ID": "2f8043f2-8897-4577-9f48-91d3d30871e7", "DetectTime": "2023-10-30T14:06:17.955714+02:00", "EventTime": "2023-10-30T14:06:17.955733+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CvVnGBOUv0cTjdbM"]} -{"Format": "IDEA0", "ID": "6a07269c-fdeb-4ba0-b26f-f803954676bd", "DetectTime": "2023-10-30T14:06:17.963220+02:00", "EventTime": "2023-10-30T14:06:17.963247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CRktRarjUwvL0GKCc"]} -{"Format": "Json", "ID": "6a07269c-fdeb-4ba0-b26f-f803954676bd", "DetectTime": "2023-10-30T14:06:17.963220+02:00", "EventTime": "2023-10-30T14:06:17.963247+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:50:08.800513+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:18.042573)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "286974aa-257f-4f44-8c55-41df9c7a4bde", "DetectTime": "2023-10-30T14:06:18.047612+02:00", "EventTime": "2023-10-30T14:06:18.047626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CAN7u2b2AkaFtV1ma"]} -{"Format": "IDEA0", "ID": "dc86ff63-c507-461c-87c6-4d6bced0e944", "DetectTime": "2023-10-30T14:06:18.085232+02:00", "EventTime": "2023-10-30T14:06:18.085259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CcrwI52rzkdGIXsUsj"]} -{"Format": "IDEA0", "ID": "1650e04e-8254-4939-9be2-33eb3493ba89", "DetectTime": "2023-10-30T14:06:18.123037+02:00", "EventTime": "2023-10-30T14:06:18.123052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C5zC0VNM6ur8OIMd4"]} -{"Format": "IDEA0", "ID": "f8fe4b0d-864f-4710-b9bb-9da74c85365e", "DetectTime": "2023-10-30T14:06:18.160232+02:00", "EventTime": "2023-10-30T14:06:18.160249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CR4zWy1jcaTGGPst"]} -{"Format": "IDEA0", "ID": "58955a8e-24c5-4693-9128-6e9854e81e66", "DetectTime": "2023-10-30T14:06:18.197093+02:00", "EventTime": "2023-10-30T14:06:18.197110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CyC8GE2IMBel2tvPn8"]} -{"Format": "IDEA0", "ID": "8025cf0f-388e-417a-a186-9be6878c832c", "DetectTime": "2023-10-30T14:06:18.230928+02:00", "EventTime": "2023-10-30T14:06:18.230941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C4OHCZhpLpTZMB1Zf"]} -{"Format": "IDEA0", "ID": "283b779e-9172-4131-9f68-626f49cf9629", "DetectTime": "2023-10-30T14:06:18.267831+02:00", "EventTime": "2023-10-30T14:06:18.267848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CSuBZC4MFpETLPTEul"]} -{"Format": "IDEA0", "ID": "a68cd477-ce8c-4c13-9aa7-9b84ee7df37f", "DetectTime": "2023-10-30T14:06:18.302444+02:00", "EventTime": "2023-10-30T14:06:18.302461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CJ9Q1jnyt2dUKVF64"]} -{"Format": "Json", "ID": "a68cd477-ce8c-4c13-9aa7-9b84ee7df37f", "DetectTime": "2023-10-30T14:06:18.302444+02:00", "EventTime": "2023-10-30T14:06:18.302461+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:50:10.068993+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:18.376457)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1c61602d-d539-4ddc-9cc9-5613ed278d4f", "DetectTime": "2023-10-30T14:06:18.381178+02:00", "EventTime": "2023-10-30T14:06:18.381203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CtYjV748B1NxThmNcc"]} -{"Format": "IDEA0", "ID": "89be0879-8745-4a01-a216-9a1033f845e0", "DetectTime": "2023-10-30T14:06:18.417349+02:00", "EventTime": "2023-10-30T14:06:18.417361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CY5bHE8radEIgM95"]} -{"Format": "IDEA0", "ID": "1c9c0391-2d25-43cb-b985-926f45e95991", "DetectTime": "2023-10-30T14:06:18.450042+02:00", "EventTime": "2023-10-30T14:06:18.450063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C6WlCb33QZWhB3XIId"]} -{"Format": "IDEA0", "ID": "3eee1996-efc6-418a-af09-7eafa54a09aa", "DetectTime": "2023-10-30T14:06:18.488425+02:00", "EventTime": "2023-10-30T14:06:18.488440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["CQ2jWD3NME9srkGaF8"]} -{"Format": "IDEA0", "ID": "22fdae91-e7ea-404f-8f9f-f9945134fcbf", "DetectTime": "2023-10-30T14:06:18.522684+02:00", "EventTime": "2023-10-30T14:06:18.522856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CfzGsa38DCfoo51nH9", "CyoBWuy2nqeUA8hz6", "CEBsXa2WE7t8kdIcZ1", "CRU17g2VNfQ31aQd55"]} -{"Format": "IDEA0", "ID": "1cd6f8e1-5f14-4a4c-9b16-b7cbb0e363db", "DetectTime": "2023-10-30T14:06:18.530627+02:00", "EventTime": "2023-10-30T14:06:18.530648+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CfzGsa38DCfoo51nH9"]} -{"Format": "IDEA0", "ID": "887c30b5-dedf-4734-b03a-8f89c25da919", "DetectTime": "2023-10-30T14:06:18.538424+02:00", "EventTime": "2023-10-30T14:06:18.538448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29304], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. ", "ContentType": "text/plain"}], "uids": ["Cur7xu1EETWhTtUJm7"]} -{"Format": "IDEA0", "ID": "827d6172-132f-443e-8522-37f77eebf958", "DetectTime": "2023-10-30T14:06:18.574084+02:00", "EventTime": "2023-10-30T14:06:18.574101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["ChidnG2RVP7ek4KeWc"]} -{"Format": "IDEA0", "ID": "505310f0-6186-4fe7-bfc9-d59d310248d7", "DetectTime": "2023-10-30T14:06:18.608657+02:00", "EventTime": "2023-10-30T14:06:18.608675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CFVEpL25nhdcJ9x521"]} -{"Format": "IDEA0", "ID": "9137ae17-7670-471e-bb71-b28acf4be827", "DetectTime": "2023-10-30T14:06:18.640364+02:00", "EventTime": "2023-10-30T14:06:18.640376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CSICMWXpz4jKtXwnj"]} -{"Format": "Json", "ID": "9137ae17-7670-471e-bb71-b28acf4be827", "DetectTime": "2023-10-30T14:06:18.640364+02:00", "EventTime": "2023-10-30T14:06:18.640376+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:50:30.068835+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:18.710007)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "993d013b-2221-44ba-b958-7f3f26f60d99", "DetectTime": "2023-10-30T14:06:18.716096+02:00", "EventTime": "2023-10-30T14:06:18.716116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CJ3p2g217w91UYOOnd"]} -{"Format": "IDEA0", "ID": "e299e861-59f8-4edd-9244-cbef29cec72d", "DetectTime": "2023-10-30T14:06:18.758412+02:00", "EventTime": "2023-10-30T14:06:18.758434+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CBuXKX2DIbjyJxAnTh"]} -{"Format": "IDEA0", "ID": "120cadec-0a1c-4a3d-b358-ab6d0171409b", "DetectTime": "2023-10-30T14:06:18.765755+02:00", "EventTime": "2023-10-30T14:06:18.765772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["Csg3Rz04cZycafDYc"]} -{"Format": "IDEA0", "ID": "f04117a0-77f5-46a3-8096-01d6bf6d1788", "DetectTime": "2023-10-30T14:06:18.798080+02:00", "EventTime": "2023-10-30T14:06:18.798105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["ClgTAK124x7McA6fbb"]} -{"Format": "IDEA0", "ID": "401d08c4-50ab-45e4-8923-e249633ffe08", "DetectTime": "2023-10-30T14:06:18.830090+02:00", "EventTime": "2023-10-30T14:06:18.830103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["CK4TmH1qsgkzXZJpe3"]} -{"Format": "IDEA0", "ID": "5135ae56-fd11-4305-83cd-865f4398ff43", "DetectTime": "2023-10-30T14:06:18.860750+02:00", "EventTime": "2023-10-30T14:06:18.860777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["C2zwp01QLx8jAjNDyg"]} -{"Format": "IDEA0", "ID": "9f34af56-aa8b-4e8a-851f-fbb20b6efc1e", "DetectTime": "2023-10-30T14:06:18.892872+02:00", "EventTime": "2023-10-30T14:06:18.892893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["C7rgYQ1v6OphLMWTve"]} -{"Format": "IDEA0", "ID": "f0efcad8-6fb6-427e-8686-b85e509d96b4", "DetectTime": "2023-10-30T14:06:18.925193+02:00", "EventTime": "2023-10-30T14:06:18.925216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["CMrMdk2rlXv7No8Aj2"]} -{"Format": "IDEA0", "ID": "74ede213-8fb3-4bfd-9764-01f7e083952b", "DetectTime": "2023-10-30T14:06:18.955233+02:00", "EventTime": "2023-10-30T14:06:18.955253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CxL5C04Bhb14iKtrY5"]} -{"Format": "Json", "ID": "74ede213-8fb3-4bfd-9764-01f7e083952b", "DetectTime": "2023-10-30T14:06:18.955233+02:00", "EventTime": "2023-10-30T14:06:18.955253+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T19:50:49.117471+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2023/10/30 14:06:19.024148)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7aac9a6e-cb4e-44fe-9308-b30ca2197dad", "DetectTime": "2023-10-30T14:06:19.029576+02:00", "EventTime": "2023-10-30T14:06:19.029589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C6CfK734d4I1gcUdi8"]} -{"Format": "IDEA0", "ID": "8acb0d3b-6e94-43f1-96d8-3647dcc7c5e2", "DetectTime": "2023-10-30T14:06:19.066958+02:00", "EventTime": "2023-10-30T14:06:19.066991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CROGsP2dOkTOV4eAah"]} -{"Format": "IDEA0", "ID": "beb50940-7404-4b9e-8b59-1f9b36b14b80", "DetectTime": "2023-10-30T14:06:19.102371+02:00", "EventTime": "2023-10-30T14:06:19.102391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CJcpr1uYFoc3Bxiac"]} -{"Format": "IDEA0", "ID": "d2e05835-7fae-4907-bffe-f2b34246d842", "DetectTime": "2023-10-30T14:06:19.136844+02:00", "EventTime": "2023-10-30T14:06:19.136874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CNsdgB3PVagzqxX7ci"]} -{"Format": "IDEA0", "ID": "e652c98f-4437-46af-8e5e-251f12b540d2", "DetectTime": "2023-10-30T14:06:19.173404+02:00", "EventTime": "2023-10-30T14:06:19.173431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C25pOc1SD31aDpK913"]} -{"Format": "IDEA0", "ID": "7afcbeeb-0e34-4807-aa1b-31848ffd0bfd", "DetectTime": "2023-10-30T14:06:19.210267+02:00", "EventTime": "2023-10-30T14:06:19.210284+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CIEDWw6vVYqIrDDa2"]} -{"Format": "IDEA0", "ID": "56a34b0c-d92e-4066-ac9e-2508b1e97ced", "DetectTime": "2023-10-30T14:06:19.218195+02:00", "EventTime": "2023-10-30T14:06:19.218214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CDrBXS1asCF3xrfHN3"]} -{"Format": "IDEA0", "ID": "4ac5184b-9de7-4505-9f56-ab55c108ffc7", "DetectTime": "2023-10-30T14:06:19.255105+02:00", "EventTime": "2023-10-30T14:06:19.255127+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CYGsBx4isPM97w9cw4"]} -{"Format": "IDEA0", "ID": "a44a7a0c-9f05-4576-a71c-305397cc71ec", "DetectTime": "2023-10-30T14:06:19.263625+02:00", "EventTime": "2023-10-30T14:06:19.263638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CAOObG11OZnDx7XPZ6"]} -{"Format": "IDEA0", "ID": "fa7c990a-5ed7-4616-9edc-abd62ceee2f3", "DetectTime": "2023-10-30T14:06:19.296388+02:00", "EventTime": "2023-10-30T14:06:19.296407+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CWQJv33UzWGqpmz0Sc"]} -{"Format": "IDEA0", "ID": "342aeb1a-a693-45dc-bb83-d5def62ce893", "DetectTime": "2023-10-30T14:06:19.303826+02:00", "EventTime": "2023-10-30T14:06:19.303841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CYedkt2epqvjeQUgd9"]} -{"Format": "IDEA0", "ID": "34e61af5-9256-41dc-a81a-ff3d6148254b", "DetectTime": "2023-10-30T14:06:19.356727+02:00", "EventTime": "2023-10-30T14:06:19.356748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["ChUDDH2bBnBKkqQuof"]} -{"Format": "IDEA0", "ID": "1c2540ed-76cb-4b50-bc7c-383a64518192", "DetectTime": "2023-10-30T14:06:19.422104+02:00", "EventTime": "2023-10-30T14:06:19.422125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cd1Oxo2dHNDrjcMyEf"]} -{"Format": "IDEA0", "ID": "d7eeda35-3e2f-4a64-a377-8a104ee76614", "DetectTime": "2023-10-30T14:06:19.478980+02:00", "EventTime": "2023-10-30T14:06:19.479006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["C8fVFY1Ikrjf0VCBu7"]} -{"Format": "IDEA0", "ID": "83d4c5a7-8ab9-4fe6-8040-04bbf82ae311", "DetectTime": "2023-10-30T14:06:19.530895+02:00", "EventTime": "2023-10-30T14:06:19.530921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CsF4ib3v31KdLhNZve"]} -{"Format": "IDEA0", "ID": "f22d2194-2d8a-4631-b5cf-9a1f9b4fd8a4", "DetectTime": "2023-10-30T14:06:19.581470+02:00", "EventTime": "2023-10-30T14:06:19.581489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CWX8Le3thwjLDvhwla"]} -{"Format": "IDEA0", "ID": "fd76ce9a-9e0c-4eb1-b1a2-576ed445d64b", "DetectTime": "2023-10-30T14:06:19.719184+02:00", "EventTime": "2023-10-30T14:06:19.719214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CPydgm3GgiZojirKff"]} -{"Format": "Json", "ID": "fd76ce9a-9e0c-4eb1-b1a2-576ed445d64b", "DetectTime": "2023-10-30T14:06:19.719184+02:00", "EventTime": "2023-10-30T14:06:19.719214+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:22:29.101356+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:19.844884)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "105b0c40-a415-4675-a80d-d0b76e6ff58a", "DetectTime": "2023-10-30T14:06:19.851041+02:00", "EventTime": "2023-10-30T14:06:19.851068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CUrCl94lERG8wHS3J3"]} -{"Format": "IDEA0", "ID": "c3f40564-a4a8-4c38-8bd9-741ac6e6b0e1", "DetectTime": "2023-10-30T14:06:19.912251+02:00", "EventTime": "2023-10-30T14:06:19.912269+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"], "Hostname": ["178-223-239-27.dynamic.mtsdoo.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 178.223.239.27 from 10.0.2.19. blacklisted IP AS: MTSDOO-AS, RS AS202441 rDNS: 178-223-239-27.dynamic.mtsdoo.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CnSjp23ZDJ621zp8C2"]} -{"Format": "IDEA0", "ID": "3dd26393-4c7d-4c3f-b4f8-f3f954b16525", "DetectTime": "2023-10-30T14:06:19.942810+02:00", "EventTime": "2023-10-30T14:06:19.942829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CNgQWh3CbRz8CIAOI2"]} -{"Format": "IDEA0", "ID": "c1046cdb-bbcc-43c1-9882-537d43a3de70", "DetectTime": "2023-10-30T14:06:19.996882+02:00", "EventTime": "2023-10-30T14:06:19.996899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwkKR84BofFyzzUbT2"]} -{"Format": "IDEA0", "ID": "17795a00-582d-482c-8a25-3ba30ee768e3", "DetectTime": "2023-10-30T14:06:20.047111+02:00", "EventTime": "2023-10-30T14:06:20.047131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CbWOnB1W1KXzTBO60f"]} -{"Format": "IDEA0", "ID": "9d0a12bc-34c2-4e14-95c9-4eeb6fb8c051", "DetectTime": "2023-10-30T14:06:20.101161+02:00", "EventTime": "2023-10-30T14:06:20.101174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CTI4ZXzQRx4YZsnp5"]} -{"Format": "IDEA0", "ID": "2021d1d2-12a0-4dfd-a01d-6802032ba3f6", "DetectTime": "2023-10-30T14:06:20.148555+02:00", "EventTime": "2023-10-30T14:06:20.148571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C1YFK82P0dvis5KGfk"]} -{"Format": "IDEA0", "ID": "d9532bba-b4a1-4c2a-b49a-b794350b7e87", "DetectTime": "2023-10-30T14:06:20.200285+02:00", "EventTime": "2023-10-30T14:06:20.200313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CGD9O54ZWNduOdw45d"]} -{"Format": "IDEA0", "ID": "7378553d-6312-43d2-8cfd-c01e81c66f8f", "DetectTime": "2023-10-30T14:06:20.249950+02:00", "EventTime": "2023-10-30T14:06:20.249968+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CutavF4QNjPCxbe4Uh"]} -{"Format": "IDEA0", "ID": "1fb8d341-d7e2-45d0-9818-06e2069be0d1", "DetectTime": "2023-10-30T14:06:20.257890+02:00", "EventTime": "2023-10-30T14:06:20.257912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["C2YOpS26CTAxK78Gmd"]} -{"Format": "Json", "ID": "1fb8d341-d7e2-45d0-9818-06e2069be0d1", "DetectTime": "2023-10-30T14:06:20.257890+02:00", "EventTime": "2023-10-30T14:06:20.257912+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:22:31.417074+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:20.347000)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8a726d6c-a496-4823-b6e9-91c7b3007dce", "DetectTime": "2023-10-30T14:06:20.352679+02:00", "EventTime": "2023-10-30T14:06:20.352700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cdj7Fp4OWXWVDlWfdb"]} -{"Format": "IDEA0", "ID": "34ced106-5771-411c-af28-e50e3892f3af", "DetectTime": "2023-10-30T14:06:20.405263+02:00", "EventTime": "2023-10-30T14:06:20.405280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ch2LT34XqKUUgWCs6i"]} -{"Format": "IDEA0", "ID": "b06a008c-b6b2-41c7-82ac-0074114ea90d", "DetectTime": "2023-10-30T14:06:20.460299+02:00", "EventTime": "2023-10-30T14:06:20.460328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["C7rJ4S25LMhLU6wiFi"]} -{"Format": "IDEA0", "ID": "9a81aec3-5379-43da-b340-9c90653c898c", "DetectTime": "2023-10-30T14:06:20.536701+02:00", "EventTime": "2023-10-30T14:06:20.536727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CvWF553PzaZZAWsfEj"]} -{"Format": "IDEA0", "ID": "b3c97127-7e2b-4ba1-89e5-e1ef2791aff9", "DetectTime": "2023-10-30T14:06:20.607797+02:00", "EventTime": "2023-10-30T14:06:20.607856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CS4BXG292HmjhGOlmg"]} -{"Format": "IDEA0", "ID": "84eff074-2763-4a3e-abb9-1f7ae9c85e48", "DetectTime": "2023-10-30T14:06:20.658856+02:00", "EventTime": "2023-10-30T14:06:20.658883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CpHcWV3P1Q47sd5NU6"]} -{"Format": "IDEA0", "ID": "30eb5a63-e3ef-4d24-b3a0-6c5867607e9a", "DetectTime": "2023-10-30T14:06:20.711158+02:00", "EventTime": "2023-10-30T14:06:20.711182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CurBZR3BSbhGiFYEvf"]} -{"Format": "IDEA0", "ID": "d1453ab9-49d1-4ecc-af6b-1c8bb0f23d37", "DetectTime": "2023-10-30T14:06:20.763674+02:00", "EventTime": "2023-10-30T14:06:20.763702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["C17q3pw5Zw5TJEYVa"]} -{"Format": "Json", "ID": "d1453ab9-49d1-4ecc-af6b-1c8bb0f23d37", "DetectTime": "2023-10-30T14:06:20.763674+02:00", "EventTime": "2023-10-30T14:06:20.763702+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:22:49.232725+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:20.859624)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f06fafaf-6207-42cd-bbf8-bd88fe8011b2", "DetectTime": "2023-10-30T14:06:20.865412+02:00", "EventTime": "2023-10-30T14:06:20.865440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CN4iNFnljXTIBgAse"]} -{"Format": "IDEA0", "ID": "9e5d93c1-8cf0-43b9-b32c-360427973565", "DetectTime": "2023-10-30T14:06:20.895365+02:00", "EventTime": "2023-10-30T14:06:20.895391+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CJqpQA4geYSsFvv6y"]} -{"Format": "IDEA0", "ID": "a088e79c-6f1a-463e-b5a0-c1fc355b548c", "DetectTime": "2023-10-30T14:06:20.903577+02:00", "EventTime": "2023-10-30T14:06:20.903602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CFIrhu2WbmMRz04NEk"]} -{"Format": "IDEA0", "ID": "72221d13-4732-4fe0-bd9e-bda69ce5e5eb", "DetectTime": "2023-10-30T14:06:20.949978+02:00", "EventTime": "2023-10-30T14:06:20.949994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["ChQ3O53R9KNy3Nu9z6"]} -{"Format": "IDEA0", "ID": "f3284503-dd1b-4e7e-b57c-cf02a2684615", "DetectTime": "2023-10-30T14:06:20.999345+02:00", "EventTime": "2023-10-30T14:06:20.999372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["C7Hlif1tIacwbvps5g"]} -{"Format": "IDEA0", "ID": "b9e9d9f4-646c-40f2-9905-f70deda8ab3c", "DetectTime": "2023-10-30T14:06:21.047776+02:00", "EventTime": "2023-10-30T14:06:21.047864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CAVbnZ1emEKIHthUc"]} -{"Format": "IDEA0", "ID": "2234a50f-2b6c-4d98-b678-e5062599317a", "DetectTime": "2023-10-30T14:06:21.096991+02:00", "EventTime": "2023-10-30T14:06:21.097009+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["Ck7wTlwg2AGdhdGEl"]} -{"Format": "IDEA0", "ID": "9a22f0bd-e7eb-4f20-89a5-983c84d6c003", "DetectTime": "2023-10-30T14:06:21.106655+02:00", "EventTime": "2023-10-30T14:06:21.106683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CiPodn2NcbnjV5p5Ei"]} -{"Format": "IDEA0", "ID": "e3029a9e-5b88-47e4-9a39-8d661a8ba3b2", "DetectTime": "2023-10-30T14:06:21.153883+02:00", "EventTime": "2023-10-30T14:06:21.153904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CoFgRt3pzO1X6SLxWc"]} -{"Format": "IDEA0", "ID": "8b8f5a17-4dba-4706-a5fb-e9d8e330ddc9", "DetectTime": "2023-10-30T14:06:21.206754+02:00", "EventTime": "2023-10-30T14:06:21.206792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["CRABAy36n54keiURxl"]} -{"Format": "IDEA0", "ID": "9ce41eff-6806-4c4f-bb31-93a88729bad0", "DetectTime": "2023-10-30T14:06:21.255584+02:00", "EventTime": "2023-10-30T14:06:21.255605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["Cr0lGPgExA5Hl7Tua"]} -{"Format": "Json", "ID": "9ce41eff-6806-4c4f-bb31-93a88729bad0", "DetectTime": "2023-10-30T14:06:21.255584+02:00", "EventTime": "2023-10-30T14:06:21.255605+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:22:50.777823+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:21.347937)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ca24d995-17d0-4e5c-8db0-735b8ea6a696", "DetectTime": "2023-10-30T14:06:21.354015+02:00", "EventTime": "2023-10-30T14:06:21.354033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CdGpJj2Envb2vr36g2"]} -{"Format": "IDEA0", "ID": "409d11b6-e3a1-479c-b0d8-9e23f92d9eed", "DetectTime": "2023-10-30T14:06:21.402948+02:00", "EventTime": "2023-10-30T14:06:21.402976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CKSmWcOZbRJ2MYIV4"]} -{"Format": "IDEA0", "ID": "12676f95-bc87-4aea-9cdf-c3ba8b9fd177", "DetectTime": "2023-10-30T14:06:21.446453+02:00", "EventTime": "2023-10-30T14:06:21.446475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CX2PS83w0Vt0VJjUO8"]} -{"Format": "IDEA0", "ID": "81261f36-193d-4708-8583-12ef39e4d7c7", "DetectTime": "2023-10-30T14:06:21.495238+02:00", "EventTime": "2023-10-30T14:06:21.495266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CM05Pg1XF0cas0atx6"]} -{"Format": "IDEA0", "ID": "96387010-ae65-49d6-b4fb-a0aa56402130", "DetectTime": "2023-10-30T14:06:21.538136+02:00", "EventTime": "2023-10-30T14:06:21.538166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["COuTJr1nrBcZl5utC5"]} -{"Format": "IDEA0", "ID": "458f8837-7bf1-4f4c-ac79-1d4970610b77", "DetectTime": "2023-10-30T14:06:21.583842+02:00", "EventTime": "2023-10-30T14:06:21.583868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CAL21x1KaVTH5SACti"]} -{"Format": "IDEA0", "ID": "77d6aace-87e8-418a-a113-e659fb01b581", "DetectTime": "2023-10-30T14:06:21.642432+02:00", "EventTime": "2023-10-30T14:06:21.642454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CgGXdL1cpIVTgYlgO8"]} -{"Format": "IDEA0", "ID": "03c30195-a0e2-492b-9b83-26e3e080ef7f", "DetectTime": "2023-10-30T14:06:21.690223+02:00", "EventTime": "2023-10-30T14:06:21.690251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["Cg1aPo2k0rrL9RTxSj"]} -{"Format": "Json", "ID": "03c30195-a0e2-492b-9b83-26e3e080ef7f", "DetectTime": "2023-10-30T14:06:21.690223+02:00", "EventTime": "2023-10-30T14:06:21.690251+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:53:58.772920+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:21.761810)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ecebf6b0-c0e1-4b00-a9d4-1e11c8a37230", "DetectTime": "2023-10-30T14:06:21.766584+02:00", "EventTime": "2023-10-30T14:06:21.766603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CS9LBy4tkxarbheW3h"]} -{"Format": "IDEA0", "ID": "5ff923af-636e-43ac-9cda-d36cf3f82b6c", "DetectTime": "2023-10-30T14:06:21.802476+02:00", "EventTime": "2023-10-30T14:06:21.802495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CYjCxn39UYv09Hh9g7"]} -{"Format": "IDEA0", "ID": "b833ae36-5cf3-4d93-af05-be01ad849cac", "DetectTime": "2023-10-30T14:06:21.839813+02:00", "EventTime": "2023-10-30T14:06:21.839841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["Ck5lqI22dvydJCiSoe"]} -{"Format": "IDEA0", "ID": "c7850ae2-8e63-48cf-859d-89bbe3a8b8cd", "DetectTime": "2023-10-30T14:06:21.879257+02:00", "EventTime": "2023-10-30T14:06:21.879285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["C3T57s49SfZxu7K3q9"]} -{"Format": "IDEA0", "ID": "0bdb068f-5334-4c76-9e16-63a7fc4acdb2", "DetectTime": "2023-10-30T14:06:21.921471+02:00", "EventTime": "2023-10-30T14:06:21.921497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["Cs4DvI12BPTHDVIzKa"]} -{"Format": "IDEA0", "ID": "73136feb-ace8-472c-99f7-fed0e36950f6", "DetectTime": "2023-10-30T14:06:21.962110+02:00", "EventTime": "2023-10-30T14:06:21.962125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cxvfp41a6iE9Nsx3Ff"]} -{"Format": "IDEA0", "ID": "ce919e28-11cd-4692-810a-81eb6cf981ff", "DetectTime": "2023-10-30T14:06:22.001745+02:00", "EventTime": "2023-10-30T14:06:22.001758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "multiple empty HTTP connections to google.com", "ContentType": "text/plain"}], "uids": ["CIEDWw6vVYqIrDDa2", "CBBxoa1FDQTieOTPRd", "CWQJv33UzWGqpmz0Sc", "CJqpQA4geYSsFvv6y"]} -{"Format": "IDEA0", "ID": "1d3d7962-a715-4f39-89e4-464629b20d90", "DetectTime": "2023-10-30T14:06:22.011609+02:00", "EventTime": "2023-10-30T14:06:22.011623+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CBBxoa1FDQTieOTPRd"]} -{"Format": "IDEA0", "ID": "e9a45dc8-c2c6-438f-975d-b593ce036d72", "DetectTime": "2023-10-30T14:06:22.021763+02:00", "EventTime": "2023-10-30T14:06:22.021783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C25gs81e1elBR5tpP3"]} -{"Format": "IDEA0", "ID": "da7622b5-5b89-42e2-9162-67a437f19a75", "DetectTime": "2023-10-30T14:06:22.060253+02:00", "EventTime": "2023-10-30T14:06:22.060301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CW4Cuk8stpzvJhYX9"]} -{"Format": "Json", "ID": "da7622b5-5b89-42e2-9162-67a437f19a75", "DetectTime": "2023-10-30T14:06:22.060253+02:00", "EventTime": "2023-10-30T14:06:22.060301+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:54:00.808568+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:22.129789)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b0aba757-d797-4881-a055-73493bad09a3", "DetectTime": "2023-10-30T14:06:22.134962+02:00", "EventTime": "2023-10-30T14:06:22.134975+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CwbnEp3BVZHJvp7GQ9"]} -{"Format": "IDEA0", "ID": "217a05ac-b2f8-494c-a33c-1d53a7b71c81", "DetectTime": "2023-10-30T14:06:22.143847+02:00", "EventTime": "2023-10-30T14:06:22.143864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["C9KRrM1xpP2xOn1iqe"]} -{"Format": "IDEA0", "ID": "c3937880-ddc0-474f-bc66-eacb75232414", "DetectTime": "2023-10-30T14:06:22.176760+02:00", "EventTime": "2023-10-30T14:06:22.176774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CJTOALmzyppYnhh56"]} -{"Format": "IDEA0", "ID": "1cf7af73-c91c-4619-a01f-1817a3138d31", "DetectTime": "2023-10-30T14:06:22.207540+02:00", "EventTime": "2023-10-30T14:06:22.207561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CnPMZWvLLewtHRtC5"]} -{"Format": "IDEA0", "ID": "c220466d-df91-448f-86da-ed33e8a798ec", "DetectTime": "2023-10-30T14:06:22.240826+02:00", "EventTime": "2023-10-30T14:06:22.240844+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["Cr28xv35FWeO8ZuJNd"]} -{"Format": "IDEA0", "ID": "1ddb2d3c-012f-4a2e-9fd8-76cc373dfaee", "DetectTime": "2023-10-30T14:06:22.248791+02:00", "EventTime": "2023-10-30T14:06:22.248805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CUTqsJF6E0RlA6FE"]} -{"Format": "IDEA0", "ID": "87156d6a-a7c6-4233-a50a-8a54e3fa9e90", "DetectTime": "2023-10-30T14:06:22.281548+02:00", "EventTime": "2023-10-30T14:06:22.281560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13907], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. ", "ContentType": "text/plain"}], "uids": ["CJWb3r1vS1EhVB1fDh"]} -{"Format": "IDEA0", "ID": "584b5eaf-977f-4b60-9cde-9f950bc6005a", "DetectTime": "2023-10-30T14:06:22.312602+02:00", "EventTime": "2023-10-30T14:06:22.312621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CNjsZs4Gd9qmLpsFj1"]} -{"Format": "IDEA0", "ID": "9e9d3ce0-c581-44dc-91bf-3b9835feb355", "DetectTime": "2023-10-30T14:06:22.335417+02:00", "EventTime": "2023-10-30T14:06:22.335440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CqOpz81IjzhKKzJFV3"]} -{"Format": "IDEA0", "ID": "29e39f56-59c7-4732-b847-d9b5f45c4707", "DetectTime": "2023-10-30T14:06:22.365816+02:00", "EventTime": "2023-10-30T14:06:22.365831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C9O6WpibzwIvkT6m5"]} -{"Format": "IDEA0", "ID": "d0fd1a44-cd08-4d90-97ea-917130251655", "DetectTime": "2023-10-30T14:06:22.398940+02:00", "EventTime": "2023-10-30T14:06:22.398953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CTltbY10bK2KlYy7S"]} -{"Format": "Json", "ID": "d0fd1a44-cd08-4d90-97ea-917130251655", "DetectTime": "2023-10-30T14:06:22.398940+02:00", "EventTime": "2023-10-30T14:06:22.398953+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:54:02.521757+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:22.468701)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "73e0f26b-1f03-4eae-a55d-9f4ac12aa39f", "DetectTime": "2023-10-30T14:06:22.474686+02:00", "EventTime": "2023-10-30T14:06:22.474703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CyVLzVt7Arf2Xj496"]} -{"Format": "IDEA0", "ID": "07aeacff-de30-428c-a771-98bd86b09784", "DetectTime": "2023-10-30T14:06:22.507997+02:00", "EventTime": "2023-10-30T14:06:22.508014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CwCeOn37RXYITdHi94"]} -{"Format": "IDEA0", "ID": "7a15bed3-9458-4a2a-9a74-659c2b9676c0", "DetectTime": "2023-10-30T14:06:22.535976+02:00", "EventTime": "2023-10-30T14:06:22.535994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["C8DKze2y1WPtvtDLMi"]} -{"Format": "IDEA0", "ID": "2dfbd933-b0da-466b-863d-4b675804ccea", "DetectTime": "2023-10-30T14:06:22.564168+02:00", "EventTime": "2023-10-30T14:06:22.564184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CEHqAu3TfBCNNEq8fk"]} -{"Format": "IDEA0", "ID": "eee28fb9-6ee0-4276-8fb2-c097d59c3521", "DetectTime": "2023-10-30T14:06:22.593457+02:00", "EventTime": "2023-10-30T14:06:22.593473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CRwCrY1urYlvZCXtLk"]} -{"Format": "IDEA0", "ID": "fc08e2d5-55a8-47b6-9d90-2df39af98051", "DetectTime": "2023-10-30T14:06:22.622612+02:00", "EventTime": "2023-10-30T14:06:22.622630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["C5DqwI1aKLkdki6oW8"]} -{"Format": "IDEA0", "ID": "41d42f15-e0f3-46aa-85e7-780a3cc8a502", "DetectTime": "2023-10-30T14:06:22.650091+02:00", "EventTime": "2023-10-30T14:06:22.650108+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["C5vfof2vNEKGnPWz9"]} -{"Format": "IDEA0", "ID": "1bebb65c-0888-4037-bb92-bc205cb1ab86", "DetectTime": "2023-10-30T14:06:22.659549+02:00", "EventTime": "2023-10-30T14:06:22.659568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CKoxby1Cvq94qNutNk"]} -{"Format": "IDEA0", "ID": "93fc573b-3bc3-41a1-b703-9f7aefd57159", "DetectTime": "2023-10-30T14:06:22.689868+02:00", "EventTime": "2023-10-30T14:06:22.689894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cp46e33yOWunrnrjbi"]} -{"Format": "Json", "ID": "93fc573b-3bc3-41a1-b703-9f7aefd57159", "DetectTime": "2023-10-30T14:06:22.689868+02:00", "EventTime": "2023-10-30T14:06:22.689894+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:54:04.032531+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:22.757639)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc8ab0e0-b74f-4d48-aa74-8b0a0e4ccaa4", "DetectTime": "2023-10-30T14:06:22.762202+02:00", "EventTime": "2023-10-30T14:06:22.762212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cmw0v24J6HQ7GgcuA"]} -{"Format": "IDEA0", "ID": "e4c7f32f-3673-4ebc-bfb8-c465298bb47a", "DetectTime": "2023-10-30T14:06:22.791771+02:00", "EventTime": "2023-10-30T14:06:22.791792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CKUqa74MYgernnM5sk"]} -{"Format": "IDEA0", "ID": "95162ff1-61ca-442b-9105-7f467df0fbe7", "DetectTime": "2023-10-30T14:06:22.816428+02:00", "EventTime": "2023-10-30T14:06:22.816452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["CgabaP7FXZvMqFIHc"]} -{"Format": "IDEA0", "ID": "2e737433-6211-45bb-818a-6619f43d3591", "DetectTime": "2023-10-30T14:06:22.840567+02:00", "EventTime": "2023-10-30T14:06:22.840581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CsUbbIQC5yXhWADmk"]} -{"Format": "IDEA0", "ID": "437b7234-1957-4464-ad1d-011a4be28087", "DetectTime": "2023-10-30T14:06:22.864031+02:00", "EventTime": "2023-10-30T14:06:22.864047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CISU4M2EKmHeqpuRq3"]} -{"Format": "IDEA0", "ID": "ec83388d-d835-440a-8511-d6a27aa0ae40", "DetectTime": "2023-10-30T14:06:22.890105+02:00", "EventTime": "2023-10-30T14:06:22.890129+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.99"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.99.", "ContentType": "text/plain"}], "uids": ["CEMyWD3kdX0UBxRLl2"]} -{"Format": "IDEA0", "ID": "eeac47bf-b945-4f98-b5cb-ab91e8a281a3", "DetectTime": "2023-10-30T14:06:22.898892+02:00", "EventTime": "2023-10-30T14:06:22.898904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["ChNlDy2qNKBd03IpCe"]} -{"Format": "IDEA0", "ID": "6da65e84-5509-4473-baa3-be31e09ee932", "DetectTime": "2023-10-30T14:06:22.924463+02:00", "EventTime": "2023-10-30T14:06:22.924478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CLbbnT2jWNifeqGsVh"]} -{"Format": "IDEA0", "ID": "8952f4cd-4782-4b23-85fc-52985d82616f", "DetectTime": "2023-10-30T14:06:22.948288+02:00", "EventTime": "2023-10-30T14:06:22.948303+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.194.70.94"], "Type": ["SendingUnencryptedData"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 173.194.70.94.", "ContentType": "text/plain"}], "uids": ["CMtTmy2FRyG8Goznil"]} -{"Format": "IDEA0", "ID": "1078fb16-aaa0-4d8f-ac1e-180c794ca8b1", "DetectTime": "2023-10-30T14:06:22.956809+02:00", "EventTime": "2023-10-30T14:06:22.956834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cjf4oHYX19HY0nu3k"]} -{"Format": "IDEA0", "ID": "4c375a56-10ec-4d26-93d4-910a084ca760", "DetectTime": "2023-10-30T14:06:22.983439+02:00", "EventTime": "2023-10-30T14:06:22.983461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C7lgcl4RXHpsv0upAh"]} -{"Format": "IDEA0", "ID": "9e543cc9-21bc-43db-a9ea-e1995645a23c", "DetectTime": "2023-10-30T14:06:23.013518+02:00", "EventTime": "2023-10-30T14:06:23.013545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CXAjAL2eqc62UQABTf"]} -{"Format": "IDEA0", "ID": "136ef083-29c8-4713-887c-baa7d8fd4cdd", "DetectTime": "2023-10-30T14:06:23.039860+02:00", "EventTime": "2023-10-30T14:06:23.039873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CcKIqA4QOzAEbWLoZ5"]} -{"Format": "IDEA0", "ID": "2235ae11-244e-42cf-8c0a-7ccba94c691f", "DetectTime": "2023-10-30T14:06:23.064464+02:00", "EventTime": "2023-10-30T14:06:23.064481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CZXh4h1eDwj2di5sn4"]} -{"Format": "IDEA0", "ID": "8ebbd735-d086-4546-8035-7bad23391fad", "DetectTime": "2023-10-30T14:06:23.090496+02:00", "EventTime": "2023-10-30T14:06:23.090513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CW0UX72IhHbW9YHNH8"]} -{"Format": "IDEA0", "ID": "efb5317a-af21-4455-bfb7-4e0d1cf46faa", "DetectTime": "2023-10-30T14:06:23.115375+02:00", "EventTime": "2023-10-30T14:06:23.115389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CzF6Nt2tmYM70lKED8"]} -{"Format": "IDEA0", "ID": "f4c9672d-caed-4f8a-8161-5ea87bcaa2f7", "DetectTime": "2023-10-30T14:06:23.139558+02:00", "EventTime": "2023-10-30T14:06:23.139574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CIgx8R1FMwOH5HgrQ2"]} -{"Format": "IDEA0", "ID": "a63fce1a-a566-4550-b4a7-60335f285fd0", "DetectTime": "2023-10-30T14:06:23.164219+02:00", "EventTime": "2023-10-30T14:06:23.164245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["C1qcJV1Scq9keczY18"]} -{"Format": "IDEA0", "ID": "a186459e-edb3-422f-bba8-81ea536c9fdb", "DetectTime": "2023-10-30T14:06:23.189232+02:00", "EventTime": "2023-10-30T14:06:23.189250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["CQaU0P2x3OABPvDWhh"]} -{"Format": "IDEA0", "ID": "3582ec9f-4f85-427e-a1f1-138e0246f674", "DetectTime": "2023-10-30T14:06:23.212913+02:00", "EventTime": "2023-10-30T14:06:23.212929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Csmtrs4I3hEOpLzpkg"]} -{"Format": "IDEA0", "ID": "c3a98f81-b5d8-4003-a7ef-6a97ac4c6f5b", "DetectTime": "2023-10-30T14:06:23.237717+02:00", "EventTime": "2023-10-30T14:06:23.237729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CVw4Sa2nXz6O6n5dYk"]} -{"Format": "IDEA0", "ID": "8c35504f-6b55-464b-bdf3-eaed439c492f", "DetectTime": "2023-10-30T14:06:23.262657+02:00", "EventTime": "2023-10-30T14:06:23.262673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["Cfj2J32XqY36U9iUY1"]} -{"Format": "IDEA0", "ID": "b2a3b8b0-1a87-48c0-af1f-3dc046137a21", "DetectTime": "2023-10-30T14:06:23.370462+02:00", "EventTime": "2023-10-30T14:06:23.370484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CANxJ32JrHPYnGtB6c"]} -{"Format": "IDEA0", "ID": "bdd0cee3-60c9-431d-893e-abf4c76a7d35", "DetectTime": "2023-10-30T14:06:23.402591+02:00", "EventTime": "2023-10-30T14:06:23.402608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cu3Un93F1bXxnXBsQh"]} -{"Format": "IDEA0", "ID": "6134c14f-07ae-4ab0-952a-1979ccab4310", "DetectTime": "2023-10-30T14:06:23.431297+02:00", "EventTime": "2023-10-30T14:06:23.431330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CuKtXo4DSRAXLDM4n4"]} -{"Format": "IDEA0", "ID": "21819c58-e327-4444-9523-11610a433630", "DetectTime": "2023-10-30T14:06:23.464006+02:00", "EventTime": "2023-10-30T14:06:23.464032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CFxhb137yacGKQFzQ2"]} -{"Format": "IDEA0", "ID": "5be3b200-f9f6-4641-b122-9b803b48be9d", "DetectTime": "2023-10-30T14:06:23.497158+02:00", "EventTime": "2023-10-30T14:06:23.497184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CTMiJ94V6tssxioO6g"]} -{"Format": "IDEA0", "ID": "5f4ecb25-42ea-4808-a621-d9cbe8508da3", "DetectTime": "2023-10-30T14:06:23.527912+02:00", "EventTime": "2023-10-30T14:06:23.527934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CwM9ez1iih2CqbDPX"]} -{"Format": "Json", "ID": "5f4ecb25-42ea-4808-a621-d9cbe8508da3", "DetectTime": "2023-10-30T14:06:23.527912+02:00", "EventTime": "2023-10-30T14:06:23.527934+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T20:54:06.120176+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2023/10/30 14:06:23.598720)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c5c824ae-7bba-4924-b93a-7883d972e90b", "DetectTime": "2023-10-30T14:06:23.604548+02:00", "EventTime": "2023-10-30T14:06:23.604564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CO7Tgx3nVMTcSQe977"]} -{"Format": "IDEA0", "ID": "efd0588e-83ba-4839-ba04-302b417a841c", "DetectTime": "2023-10-30T14:06:23.635938+02:00", "EventTime": "2023-10-30T14:06:23.636002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CZul3Z3U9GYoyHoF9b"]} -{"Format": "IDEA0", "ID": "3ae097c3-a860-4992-82db-2b4782e8a300", "DetectTime": "2023-10-30T14:06:23.665719+02:00", "EventTime": "2023-10-30T14:06:23.665746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CTiMEKCHrlEHrqgD1"]} -{"Format": "IDEA0", "ID": "d30fad1f-3eca-4210-9791-b99417e67ead", "DetectTime": "2023-10-30T14:06:23.695939+02:00", "EventTime": "2023-10-30T14:06:23.695961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CGtNUB32VJgM0DTkKi"]} -{"Format": "IDEA0", "ID": "72448fd5-b6ea-4cee-8493-fa8675dffcb7", "DetectTime": "2023-10-30T14:06:23.726858+02:00", "EventTime": "2023-10-30T14:06:23.726876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["ChaIKcWgNxZBNVCI5"]} -{"Format": "IDEA0", "ID": "eda6317f-24ae-43d7-90fc-e5fd4a111abc", "DetectTime": "2023-10-30T14:06:23.755133+02:00", "EventTime": "2023-10-30T14:06:23.755154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4sgAE2he8zAt2mZGa"]} -{"Format": "IDEA0", "ID": "bcdd08b7-1abc-4382-a629-54cc2d6b5177", "DetectTime": "2023-10-30T14:06:23.782330+02:00", "EventTime": "2023-10-30T14:06:23.782350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["CCQFlW23kBKWKCngjb"]} -{"Format": "IDEA0", "ID": "dc960bcd-cceb-4cd4-9d79-47f6fdd0eac2", "DetectTime": "2023-10-30T14:06:23.809914+02:00", "EventTime": "2023-10-30T14:06:23.809933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C3t4w91aLFNqgRq9Kk"]} -{"Format": "IDEA0", "ID": "622cc0eb-6cf4-45bb-9a46-726c6d66fc6c", "DetectTime": "2023-10-30T14:06:23.836097+02:00", "EventTime": "2023-10-30T14:06:23.836124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CVCRry3fhLNBj0Thq3"]} -{"Format": "IDEA0", "ID": "5aca3417-774b-4542-aea7-f870f2212ba9", "DetectTime": "2023-10-30T14:06:23.864357+02:00", "EventTime": "2023-10-30T14:06:23.864370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CU6i75XABQOwlrpJi"]} -{"Format": "IDEA0", "ID": "3d6a5354-226d-4d66-a346-6c6c83e0e943", "DetectTime": "2023-10-30T14:06:23.889615+02:00", "EventTime": "2023-10-30T14:06:23.889632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CVtGuA2vUwSxQbX0W1"]} -{"Format": "IDEA0", "ID": "9c7a1f16-2d15-4232-93be-3ebafa8aff4d", "DetectTime": "2023-10-30T14:06:23.919001+02:00", "EventTime": "2023-10-30T14:06:23.919018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["C3k0H72BB38B35B6D1"]} -{"Format": "IDEA0", "ID": "8bd25d84-7269-4843-b395-785c68da8ba8", "DetectTime": "2023-10-30T14:06:23.948281+02:00", "EventTime": "2023-10-30T14:06:23.948299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CX1mt52FPXbtYNtHM9"]} -{"Format": "IDEA0", "ID": "32346a63-c985-46e8-a7b6-27d937fdb27b", "DetectTime": "2023-10-30T14:06:23.976889+02:00", "EventTime": "2023-10-30T14:06:23.976901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CtzJWx4fL8nzR3TLd8"]} -{"Format": "IDEA0", "ID": "b5d90ab6-cb46-41c7-b606-079ed005b8ee", "DetectTime": "2023-10-30T14:06:24.006065+02:00", "EventTime": "2023-10-30T14:06:24.006093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CDhKzxusOLFiezove"]} -{"Format": "IDEA0", "ID": "761fd55a-d3e4-4ec6-b64a-4669b9a52d2d", "DetectTime": "2023-10-30T14:06:24.031228+02:00", "EventTime": "2023-10-30T14:06:24.031245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CO0SQ23JFnWFN3ARNh"]} -{"Format": "IDEA0", "ID": "1f075402-2676-4e7c-9b7a-3eca2cecd108", "DetectTime": "2023-10-30T14:06:24.059143+02:00", "EventTime": "2023-10-30T14:06:24.059170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CLCHye4rwkwhHs7vX"]} -{"Format": "IDEA0", "ID": "e7c03aef-fceb-46fb-a024-f84c31ce5c03", "DetectTime": "2023-10-30T14:06:24.086422+02:00", "EventTime": "2023-10-30T14:06:24.086446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CKhsZV3d4Gpp9y0IBe"]} -{"Format": "IDEA0", "ID": "9a77f9e2-26f3-44fa-8836-e79bfba3f063", "DetectTime": "2023-10-30T14:06:24.139495+02:00", "EventTime": "2023-10-30T14:06:24.139522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ClB2gW36M2ewexyoLk"]} -{"Format": "IDEA0", "ID": "7518b02f-3978-4c27-807d-d6d6e7616327", "DetectTime": "2023-10-30T14:06:24.168989+02:00", "EventTime": "2023-10-30T14:06:24.169005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CZuQ8m48oCrLrT1xM8"]} -{"Format": "IDEA0", "ID": "b1eab136-0e21-49a9-a1ac-4985db92f24d", "DetectTime": "2023-10-30T14:06:24.198810+02:00", "EventTime": "2023-10-30T14:06:24.198829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["Cfy09k4PFFW2n1lQo6"]} -{"Format": "IDEA0", "ID": "934be507-d9f6-46dc-9a3f-67ca72c94f47", "DetectTime": "2023-10-30T14:06:24.228577+02:00", "EventTime": "2023-10-30T14:06:24.228606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["C9IEdJ14zXQrIpq7hf"]} -{"Format": "IDEA0", "ID": "6e1f83e7-6b7d-40c6-aa08-6d0969c753b6", "DetectTime": "2023-10-30T14:06:24.253576+02:00", "EventTime": "2023-10-30T14:06:24.253595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CC1ILwyQHugLEZQZd"]} -{"Format": "IDEA0", "ID": "ac771c8d-6df6-49b0-99b9-4b488a92fb9a", "DetectTime": "2023-10-30T14:06:24.280719+02:00", "EventTime": "2023-10-30T14:06:24.280737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CA7ofg1UKq2Q9khnla"]} -{"Format": "IDEA0", "ID": "f79b9b0c-74f4-4f72-8f31-1c996c8b312d", "DetectTime": "2023-10-30T14:06:24.306423+02:00", "EventTime": "2023-10-30T14:06:24.306449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["C57QWwWB0ymMqdcv5"]} -{"Format": "IDEA0", "ID": "5f46eaf9-8b44-42f1-ace6-73b2b1caa8dc", "DetectTime": "2023-10-30T14:06:24.336674+02:00", "EventTime": "2023-10-30T14:06:24.336688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["C8aaCo3e4MACZjpkc9"]} -{"Format": "IDEA0", "ID": "c3f2c74d-1498-4a25-8b78-d4508a6cd3ce", "DetectTime": "2023-10-30T14:06:24.365744+02:00", "EventTime": "2023-10-30T14:06:24.365761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CVBmW72A7KQgQp8u7d"]} -{"Format": "IDEA0", "ID": "90de8519-ab43-4d48-b7cd-017ba1f13293", "DetectTime": "2023-10-30T14:06:24.400287+02:00", "EventTime": "2023-10-30T14:06:24.400308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CUw4mQ1udYt54wTdAh"]} -{"Format": "IDEA0", "ID": "a0e464d3-c3c6-4e49-837b-73fe0bd4c9e0", "DetectTime": "2023-10-30T14:06:24.461678+02:00", "EventTime": "2023-10-30T14:06:24.461700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C8Lj264NFTv4ebF8Tb"]} -{"Format": "IDEA0", "ID": "02c77db8-4b91-4ead-b149-2f02db8d28b5", "DetectTime": "2023-10-30T14:06:24.488942+02:00", "EventTime": "2023-10-30T14:06:24.488959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["CWiJuO2FVCzAP16mD3"]} -{"Format": "IDEA0", "ID": "a65a4128-3378-4d92-9f16-c1f115f6cd2b", "DetectTime": "2023-10-30T14:06:24.521941+02:00", "EventTime": "2023-10-30T14:06:24.521968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CMpnaa2oK3kqAuN0yb"]} -{"Format": "IDEA0", "ID": "b664c9ff-9748-4708-a264-73dd498ceffc", "DetectTime": "2023-10-30T14:06:24.553903+02:00", "EventTime": "2023-10-30T14:06:24.553932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. ", "ContentType": "text/plain"}], "uids": ["CBhVrR1XIOgsdbhrF6"]} -{"Format": "IDEA0", "ID": "c70a98a8-d6cf-4f0b-9e73-fd0670f8427f", "DetectTime": "2023-10-30T14:06:24.607980+02:00", "EventTime": "2023-10-30T14:06:24.608005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C1xUyu4q4Wtq9mtZcb"]} -{"Format": "IDEA0", "ID": "3b491ff5-367d-4ffd-854f-151ba9c1136d", "DetectTime": "2023-10-30T14:06:24.636900+02:00", "EventTime": "2023-10-30T14:06:24.636919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CUOlyp7PKOzHvQfXi"]} -{"Format": "IDEA0", "ID": "0842aee4-c6b3-44f8-91fd-66c7c518f6d8", "DetectTime": "2023-10-30T14:06:24.690956+02:00", "EventTime": "2023-10-30T14:06:24.690972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.56.145.220 ", "ContentType": "text/plain"}], "uids": ["CT5u3vIqNH1zg9d2c"]} -{"Format": "IDEA0", "ID": "75bb785f-cc04-440f-af5c-1d301ed1d5de", "DetectTime": "2023-10-30T14:06:24.720615+02:00", "EventTime": "2023-10-30T14:06:24.720634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CvFboS1gjsuXbZX3kh"]} -{"Format": "IDEA0", "ID": "f8961b83-0300-48e5-8b5a-b9b27a409b8e", "DetectTime": "2023-10-30T14:06:24.773846+02:00", "EventTime": "2023-10-30T14:06:24.773875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.210.233.68 ", "ContentType": "text/plain"}], "uids": ["C8Db2H3fcfZkgjvac7"]} -{"Format": "IDEA0", "ID": "3bf088df-f460-4bf2-91b4-26339cfe4f74", "DetectTime": "2023-10-30T14:06:24.803451+02:00", "EventTime": "2023-10-30T14:06:24.803470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CapYIY1XiOnEaUYka1"]} -{"Format": "IDEA0", "ID": "f71bb0e2-9fa4-413f-be89-2a2102797c0b", "DetectTime": "2023-10-30T14:06:24.834133+02:00", "EventTime": "2023-10-30T14:06:24.834165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CZ6s4KEoAYkQgTf88"]} -{"Format": "IDEA0", "ID": "65b26ef6-4aa0-43f6-9b79-e6cce61e5ca6", "DetectTime": "2023-10-30T14:06:24.867654+02:00", "EventTime": "2023-10-30T14:06:24.867679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["Clpval2Jul0x75rGZh"]} -{"Format": "IDEA0", "ID": "a780632e-3917-40f1-b200-e27133735885", "DetectTime": "2023-10-30T14:06:24.936304+02:00", "EventTime": "2023-10-30T14:06:24.936325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CbUgqo3JVDOj0G68s8"]} -{"Format": "IDEA0", "ID": "3289b189-3896-4a49-ab2e-02174670e4f6", "DetectTime": "2023-10-30T14:06:24.973161+02:00", "EventTime": "2023-10-30T14:06:24.973186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CZq2ev2iRUA5feRRag"]} -{"Format": "IDEA0", "ID": "8e4bd5a1-9700-4ee8-9078-f7e4cc21e763", "DetectTime": "2023-10-30T14:06:25.009078+02:00", "EventTime": "2023-10-30T14:06:25.009092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CmU6SJ3q4NPwvye9il"]} -{"Format": "IDEA0", "ID": "f56acc7d-67a6-44ff-aeb0-a6749a40e6cc", "DetectTime": "2023-10-30T14:06:25.042526+02:00", "EventTime": "2023-10-30T14:06:25.042547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CYvpFB2crL1giT7kwa"]} -{"Format": "IDEA0", "ID": "b85e343e-f41e-41c4-a8e1-23a03231a119", "DetectTime": "2023-10-30T14:06:25.090103+02:00", "EventTime": "2023-10-30T14:06:25.090132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CztCgRQtV8epa0d32"]} -{"Format": "Json", "ID": "b85e343e-f41e-41c4-a8e1-23a03231a119", "DetectTime": "2023-10-30T14:06:25.090103+02:00", "EventTime": "2023-10-30T14:06:25.090132+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:24:14.475380+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:25.218915)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42aaafa1-56bf-4da2-ab2c-2c2133fa24be", "DetectTime": "2023-10-30T14:06:25.225498+02:00", "EventTime": "2023-10-30T14:06:25.225518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CQ8nMS3v5Uq55hZJU5"]} -{"Format": "IDEA0", "ID": "86261f25-dafe-4a3e-beff-465170ffa6e7", "DetectTime": "2023-10-30T14:06:25.261991+02:00", "EventTime": "2023-10-30T14:06:25.262019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CK8dTx4AtntRPf2KBd"]} -{"Format": "IDEA0", "ID": "90048ca6-10ea-48a7-8cc1-9be02a0bc056", "DetectTime": "2023-10-30T14:06:25.291226+02:00", "EventTime": "2023-10-30T14:06:25.291243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CFIp7x3IHjOxALbl94"]} -{"Format": "IDEA0", "ID": "d3b4ae77-99b1-489d-86c1-ac2117487b2c", "DetectTime": "2023-10-30T14:06:25.322149+02:00", "EventTime": "2023-10-30T14:06:25.322166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CKxtaH3jTsoslwovBd"]} -{"Format": "IDEA0", "ID": "e53173b7-5619-4269-8fa7-417f22910761", "DetectTime": "2023-10-30T14:06:25.354470+02:00", "EventTime": "2023-10-30T14:06:25.354490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CCkEho3Si1Fwhy4ZXe"]} -{"Format": "IDEA0", "ID": "99fffaa5-1296-44f2-8304-0acf856dd2dd", "DetectTime": "2023-10-30T14:06:25.384215+02:00", "EventTime": "2023-10-30T14:06:25.384244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CCs3yNXNCJNzLB685"]} -{"Format": "IDEA0", "ID": "cdc553ef-1ab7-4060-8a2d-1e7fd438b331", "DetectTime": "2023-10-30T14:06:25.435527+02:00", "EventTime": "2023-10-30T14:06:25.435546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["C0LJYr1H56QLG13fm4"]} -{"Format": "IDEA0", "ID": "25005e69-f2fe-4a3c-b40a-d1f7cafb7e53", "DetectTime": "2023-10-30T14:06:25.462902+02:00", "EventTime": "2023-10-30T14:06:25.462920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.139.20.20 ", "ContentType": "text/plain"}], "uids": ["CgMl4B3jmefuirufKb"]} -{"Format": "IDEA0", "ID": "e524a716-5baf-4cae-9e50-de9bc1e69102", "DetectTime": "2023-10-30T14:06:25.493460+02:00", "EventTime": "2023-10-30T14:06:25.493477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["Cua3mX3CN7GdW7btQc"]} -{"Format": "IDEA0", "ID": "e1ae4855-1e24-41f7-984d-f64f2eb7140d", "DetectTime": "2023-10-30T14:06:25.520027+02:00", "EventTime": "2023-10-30T14:06:25.520044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CSseXxdic12oVGzPa"]} -{"Format": "IDEA0", "ID": "fc0be51d-f3d1-4de4-be7d-bcff6ce30104", "DetectTime": "2023-10-30T14:06:25.547811+02:00", "EventTime": "2023-10-30T14:06:25.547829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CR44Ya1FClClCoJBhk"]} -{"Format": "IDEA0", "ID": "099880df-8827-466a-8128-d7eeac220d2f", "DetectTime": "2023-10-30T14:06:25.575739+02:00", "EventTime": "2023-10-30T14:06:25.575758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C4M0qQGk0SoVZYo17"]} -{"Format": "IDEA0", "ID": "29604c87-f725-44a0-b0fe-c8d79f40b3c7", "DetectTime": "2023-10-30T14:06:25.703062+02:00", "EventTime": "2023-10-30T14:06:25.703284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CP6OGFRg7KEAHCh21"]} -{"Format": "IDEA0", "ID": "efe41e31-1022-42a4-a97b-a68ccd7e5765", "DetectTime": "2023-10-30T14:06:25.745804+02:00", "EventTime": "2023-10-30T14:06:25.745823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CTbiGR3jGb7agalpPe"]} -{"Format": "IDEA0", "ID": "704d5d43-6f64-4eb2-a227-243d357cf2d6", "DetectTime": "2023-10-30T14:06:25.780693+02:00", "EventTime": "2023-10-30T14:06:25.780755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CataG04A33Y5d7FjFa"]} -{"Format": "IDEA0", "ID": "ffdadd26-0617-4ff4-ab0e-22a655f093ee", "DetectTime": "2023-10-30T14:06:25.817396+02:00", "EventTime": "2023-10-30T14:06:25.817410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["C0dunR3DrOaI0hlaD4"]} -{"Format": "IDEA0", "ID": "e12a7e96-d0e6-46b2-9465-8f2cb2a12dfb", "DetectTime": "2023-10-30T14:06:25.848217+02:00", "EventTime": "2023-10-30T14:06:25.848243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CPlNFUfOjtt01EoV7"]} -{"Format": "IDEA0", "ID": "589e7f8a-491c-4fe5-a22a-cb2fb7b76fdf", "DetectTime": "2023-10-30T14:06:25.890270+02:00", "EventTime": "2023-10-30T14:06:25.890291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CzDwR12iGJyCTx5hi"]} -{"Format": "IDEA0", "ID": "e0fe4ddc-b0ea-4a74-900e-c6665ecef455", "DetectTime": "2023-10-30T14:06:25.925721+02:00", "EventTime": "2023-10-30T14:06:25.925746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CvZmBy3OpNkwhzBth6"]} -{"Format": "IDEA0", "ID": "80b0d9c3-6726-4e27-a445-f6252d6473d6", "DetectTime": "2023-10-30T14:06:25.958422+02:00", "EventTime": "2023-10-30T14:06:25.958438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CEhpjg1DZ6Tspls2J7"]} -{"Format": "IDEA0", "ID": "9f0a2bae-46a2-45ce-9d5b-7c96502bca17", "DetectTime": "2023-10-30T14:06:26.021562+02:00", "EventTime": "2023-10-30T14:06:26.021588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C5k81c2BKJFMPzkg9a"]} -{"Format": "IDEA0", "ID": "7ab26758-256b-475a-a5d2-8c7a8f003f2c", "DetectTime": "2023-10-30T14:06:26.062128+02:00", "EventTime": "2023-10-30T14:06:26.062144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["Cmbet13LXiGCIfB7nc"]} -{"Format": "IDEA0", "ID": "d63b3acf-8c6c-401f-bf60-ac6dcdd0c697", "DetectTime": "2023-10-30T14:06:26.103097+02:00", "EventTime": "2023-10-30T14:06:26.103116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["Cr8rdQ1zbEJikrvdnf"]} -{"Format": "IDEA0", "ID": "63b56355-beb7-49fc-b2d1-367fde967803", "DetectTime": "2023-10-30T14:06:26.144183+02:00", "EventTime": "2023-10-30T14:06:26.144209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CifehQ1moDVurMAHE9"]} -{"Format": "IDEA0", "ID": "d93053f6-3680-4ffc-be86-7eb7815272d6", "DetectTime": "2023-10-30T14:06:26.183546+02:00", "EventTime": "2023-10-30T14:06:26.183573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ci0aUM1ewdZF2Fd7r7"]} -{"Format": "IDEA0", "ID": "31525caa-5ded-4fe9-8268-462351d70ec9", "DetectTime": "2023-10-30T14:06:26.214665+02:00", "EventTime": "2023-10-30T14:06:26.214692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CXQHNM2SWuSOyK6nRf"]} -{"Format": "IDEA0", "ID": "28fd57dd-e8c5-41d5-9538-24569b621a2d", "DetectTime": "2023-10-30T14:06:26.255921+02:00", "EventTime": "2023-10-30T14:06:26.255937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CYFC8S1VMLJf10nGja"]} -{"Format": "IDEA0", "ID": "71aca146-53a5-4a46-868a-982d49909ea8", "DetectTime": "2023-10-30T14:06:26.295479+02:00", "EventTime": "2023-10-30T14:06:26.295496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["Cv4mi82L5W2Bj3oxvf"]} -{"Format": "IDEA0", "ID": "41e9ee46-1fee-4745-b14a-eed3e3128087", "DetectTime": "2023-10-30T14:06:26.333918+02:00", "EventTime": "2023-10-30T14:06:26.333935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["C1wp652XrxyjVYExp1"]} -{"Format": "IDEA0", "ID": "4b7486ee-f5c5-4fa0-ac85-39d8c5b87530", "DetectTime": "2023-10-30T14:06:26.375909+02:00", "EventTime": "2023-10-30T14:06:26.375931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CVT9cj28oDwesY8OFk"]} -{"Format": "IDEA0", "ID": "6bd8a084-28c4-42da-bea6-ced33700261e", "DetectTime": "2023-10-30T14:06:26.412268+02:00", "EventTime": "2023-10-30T14:06:26.412295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["23.24.76.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 23.24.76.117 ", "ContentType": "text/plain"}], "uids": ["CnRFvE3Tq4xXG1MCp2"]} -{"Format": "IDEA0", "ID": "0a8d552d-f9c6-48ae-9f1b-2b5711bc54e1", "DetectTime": "2023-10-30T14:06:26.442637+02:00", "EventTime": "2023-10-30T14:06:26.442653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.236.103.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.236.103.4 ", "ContentType": "text/plain"}], "uids": ["CNidl1143DKHMf6Oc1"]} -{"Format": "IDEA0", "ID": "60bebf4a-940b-4e46-b960-649140a168b4", "DetectTime": "2023-10-30T14:06:26.495457+02:00", "EventTime": "2023-10-30T14:06:26.495484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CridK7ryTZOV92Rsl"]} -{"Format": "IDEA0", "ID": "6fd0e9f8-376c-4328-9c17-e3e20d70fb20", "DetectTime": "2023-10-30T14:06:26.531734+02:00", "EventTime": "2023-10-30T14:06:26.531757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIWb9e27R8wSzgwRPb"]} -{"Format": "IDEA0", "ID": "93cf6178-80a0-4214-a125-d5da028617f3", "DetectTime": "2023-10-30T14:06:26.600149+02:00", "EventTime": "2023-10-30T14:06:26.600177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.39.67.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.39.67.168 ", "ContentType": "text/plain"}], "uids": ["CNiOYt1kbwOrybl3l4"]} -{"Format": "IDEA0", "ID": "ec02785b-f243-4772-9b8a-6f9ad0c46122", "DetectTime": "2023-10-30T14:06:26.636556+02:00", "EventTime": "2023-10-30T14:06:26.636577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.215.160.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 196.215.160.36 ", "ContentType": "text/plain"}], "uids": ["CJORKX1CFA77KkoHF4"]} -{"Format": "IDEA0", "ID": "ef80d95a-bee8-49d5-b01d-53b2b2879547", "DetectTime": "2023-10-30T14:06:26.671860+02:00", "EventTime": "2023-10-30T14:06:26.671885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.122.81.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.122.81.76 ", "ContentType": "text/plain"}], "uids": ["CG6Ryq3CbCz7sCNHt5"]} -{"Format": "IDEA0", "ID": "7e7fc14b-cb37-4875-8280-ac61fbec2335", "DetectTime": "2023-10-30T14:06:26.706517+02:00", "EventTime": "2023-10-30T14:06:26.706534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.208.182.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.208.182.36 ", "ContentType": "text/plain"}], "uids": ["C3S9pQ2l7RugIZlqG2"]} -{"Format": "IDEA0", "ID": "ca9c836a-5bb1-493f-b73f-f9e19c7b94f8", "DetectTime": "2023-10-30T14:06:26.743260+02:00", "EventTime": "2023-10-30T14:06:26.743282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CYhrtr4R3wNcDCB1M4"]} -{"Format": "IDEA0", "ID": "ec5069fd-a17b-4220-b3d3-6ea23394adde", "DetectTime": "2023-10-30T14:06:26.781798+02:00", "EventTime": "2023-10-30T14:06:26.781819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.53.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.53.83 ", "ContentType": "text/plain"}], "uids": ["CzLocM129efPZ33ap8"]} -{"Format": "IDEA0", "ID": "e81f50fb-e493-4e8a-925d-78eb5c39ad64", "DetectTime": "2023-10-30T14:06:26.821114+02:00", "EventTime": "2023-10-30T14:06:26.821137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.134.200.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.134.200.145 ", "ContentType": "text/plain"}], "uids": ["CPWd5d1sQat0fzwHza"]} -{"Format": "IDEA0", "ID": "ca7c6a93-5677-4672-a3c4-2dc9a328e528", "DetectTime": "2023-10-30T14:06:26.861532+02:00", "EventTime": "2023-10-30T14:06:26.861552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["C6gmgx4ET9GCNztDql"]} -{"Format": "IDEA0", "ID": "ed2b4fb0-eac1-4e29-800c-208a808586f7", "DetectTime": "2023-10-30T14:06:26.898046+02:00", "EventTime": "2023-10-30T14:06:26.898067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.157.7.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.157.7.234 ", "ContentType": "text/plain"}], "uids": ["CUFApO2dgAx8ZbDavl"]} -{"Format": "IDEA0", "ID": "ce7f1500-4c86-4db0-8dde-662f0e7a8717", "DetectTime": "2023-10-30T14:06:26.931316+02:00", "EventTime": "2023-10-30T14:06:26.931337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.183.131.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.183.131.195 ", "ContentType": "text/plain"}], "uids": ["CXDaPi3zrW5jSQqje"]} -{"Format": "IDEA0", "ID": "b02ecfc1-5d20-44c3-b25a-8ced671437d4", "DetectTime": "2023-10-30T14:06:26.968706+02:00", "EventTime": "2023-10-30T14:06:26.968724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CwDJZp2lSOvbg4MAA"]} -{"Format": "IDEA0", "ID": "6238e216-ae56-441c-a391-bbd28f768ec2", "DetectTime": "2023-10-30T14:06:27.010493+02:00", "EventTime": "2023-10-30T14:06:27.010514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CU467T2umxseEOwAT5"]} -{"Format": "IDEA0", "ID": "70cec58b-6e6e-419d-962d-108750762d55", "DetectTime": "2023-10-30T14:06:27.060442+02:00", "EventTime": "2023-10-30T14:06:27.060464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.109.200.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.109.200.63 ", "ContentType": "text/plain"}], "uids": ["CabO6T3HecYhFAljdb"]} -{"Format": "IDEA0", "ID": "e34ec9ef-ba31-422e-9bf3-4bbf57c9f1ee", "DetectTime": "2023-10-30T14:06:27.094337+02:00", "EventTime": "2023-10-30T14:06:27.094355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.216.177.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.216.177.159 ", "ContentType": "text/plain"}], "uids": ["CWfBff28QCmtgbNG76"]} -{"Format": "IDEA0", "ID": "f4208dd8-ce55-4ae4-afc7-2ec802f68ccf", "DetectTime": "2023-10-30T14:06:27.126903+02:00", "EventTime": "2023-10-30T14:06:27.126924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.166.194.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.166.194.45 ", "ContentType": "text/plain"}], "uids": ["CgrNZv1WKNCPiNM4xa"]} -{"Format": "IDEA0", "ID": "3c238c13-207e-4ef3-8b91-626cce450179", "DetectTime": "2023-10-30T14:06:27.162476+02:00", "EventTime": "2023-10-30T14:06:27.162494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.182.136.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 59.182.136.118 ", "ContentType": "text/plain"}], "uids": ["CVVv2fUQDXc4a4M7e"]} -{"Format": "IDEA0", "ID": "c6f3cb41-0aa5-4937-8dc9-54e5e6721469", "DetectTime": "2023-10-30T14:06:27.196751+02:00", "EventTime": "2023-10-30T14:06:27.196771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cutvzz4oDxchAvON3g"]} -{"Format": "IDEA0", "ID": "c0aaa7fc-a08b-4844-b54a-0f9e9e8a8b63", "DetectTime": "2023-10-30T14:06:27.230222+02:00", "EventTime": "2023-10-30T14:06:27.230237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.7.208.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.7.208.130 ", "ContentType": "text/plain"}], "uids": ["CJfaQy4BFCUnUoSdkl"]} -{"Format": "IDEA0", "ID": "9f449340-63f2-468e-b467-b17f477a916c", "DetectTime": "2023-10-30T14:06:27.266176+02:00", "EventTime": "2023-10-30T14:06:27.266203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.225.178.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.225.178.218 ", "ContentType": "text/plain"}], "uids": ["CEtmIv20h0O8zcUZ03"]} -{"Format": "IDEA0", "ID": "849c1128-0094-4a70-acdd-1c04d518e8d2", "DetectTime": "2023-10-30T14:06:27.297415+02:00", "EventTime": "2023-10-30T14:06:27.297450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.20.182.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.20.182.29 ", "ContentType": "text/plain"}], "uids": ["CWNMbt31Iv82aV6P2g"]} -{"Format": "IDEA0", "ID": "c6614da3-c1e9-4709-99c1-3ab25ce1f44e", "DetectTime": "2023-10-30T14:06:27.327720+02:00", "EventTime": "2023-10-30T14:06:27.327738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.1.138.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.1.138.200 ", "ContentType": "text/plain"}], "uids": ["CdlokB1Oq07kZEinz9"]} -{"Format": "IDEA0", "ID": "96e2f86c-7f4e-4f76-8421-1a8dc652f3e8", "DetectTime": "2023-10-30T14:06:27.363490+02:00", "EventTime": "2023-10-30T14:06:27.363510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.194.118.70"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.194.118.70 ", "ContentType": "text/plain"}], "uids": ["C4uJUfybhw3HZv2cd"]} -{"Format": "IDEA0", "ID": "b99c9054-b780-4c4d-bdc9-cd0d475b0c40", "DetectTime": "2023-10-30T14:06:27.396760+02:00", "EventTime": "2023-10-30T14:06:27.396783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.74.153.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.74.153.34 ", "ContentType": "text/plain"}], "uids": ["CHlAji17UUojySOi6f"]} -{"Format": "IDEA0", "ID": "48fccc9a-e96f-4cae-a9fa-a01739e858b3", "DetectTime": "2023-10-30T14:06:27.444365+02:00", "EventTime": "2023-10-30T14:06:27.444385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.97.28.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.97.28.139 ", "ContentType": "text/plain"}], "uids": ["CmmcAr2iSaKYs7SwX6"]} -{"Format": "IDEA0", "ID": "28358d63-b25c-4c65-bdd1-5be3026604b4", "DetectTime": "2023-10-30T14:06:27.480774+02:00", "EventTime": "2023-10-30T14:06:27.481050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.231.149.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.231.149.46 ", "ContentType": "text/plain"}], "uids": ["CXCX0I21Hco5rDGfg4"]} -{"Format": "IDEA0", "ID": "9141f3ac-e4f7-499f-bdcd-2786a3833f67", "DetectTime": "2023-10-30T14:06:27.516536+02:00", "EventTime": "2023-10-30T14:06:27.516562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["COivpMNunAkfQPDu1"]} -{"Format": "IDEA0", "ID": "126130b9-1a96-4aa3-813e-591751a66348", "DetectTime": "2023-10-30T14:06:27.580282+02:00", "EventTime": "2023-10-30T14:06:27.580300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CqOVqm2A6UJXVM9UN3"]} -{"Format": "IDEA0", "ID": "214f14a5-119d-4ff1-b9f9-ef81e01bec0d", "DetectTime": "2023-10-30T14:06:27.611386+02:00", "EventTime": "2023-10-30T14:06:27.611414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.253.14.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.253.14.57 ", "ContentType": "text/plain"}], "uids": ["C0OEER2ZuHo6jkTz63"]} -{"Format": "IDEA0", "ID": "b20a1382-ad9e-46d3-8c8f-ab2fa894916f", "DetectTime": "2023-10-30T14:06:27.638677+02:00", "EventTime": "2023-10-30T14:06:27.638692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["C1LCFy2ULLtG8XRpBe"]} -{"Format": "IDEA0", "ID": "3bdd0837-c1a0-444f-aa1a-90f883c26fee", "DetectTime": "2023-10-30T14:06:27.665846+02:00", "EventTime": "2023-10-30T14:06:27.665878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.70.205.195 ", "ContentType": "text/plain"}], "uids": ["CmPeMH1fugy5tBCpU"]} -{"Format": "IDEA0", "ID": "2f3b8abe-4507-485b-9a10-211746990755", "DetectTime": "2023-10-30T14:06:27.697277+02:00", "EventTime": "2023-10-30T14:06:27.697304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.221.166.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.221.166.164 ", "ContentType": "text/plain"}], "uids": ["C5CDqN27jqqveEz5H1"]} -{"Format": "IDEA0", "ID": "05b9cd87-064c-40b3-a46c-629b3390fe69", "DetectTime": "2023-10-30T14:06:27.725722+02:00", "EventTime": "2023-10-30T14:06:27.725739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.28.238.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.28.238.5 ", "ContentType": "text/plain"}], "uids": ["CcKGz62xWcV1gUJq6l"]} -{"Format": "IDEA0", "ID": "91f64472-cd0a-40e6-8e2b-f748a1d450b1", "DetectTime": "2023-10-30T14:06:27.755943+02:00", "EventTime": "2023-10-30T14:06:27.755965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.146.6.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.146.6.175 ", "ContentType": "text/plain"}], "uids": ["C1ctbY3MAL5Yuqm9da"]} -{"Format": "IDEA0", "ID": "fb38da05-123a-46dd-ad47-5cd4b5adc728", "DetectTime": "2023-10-30T14:06:27.784044+02:00", "EventTime": "2023-10-30T14:06:27.784059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.132.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.139.132.103 ", "ContentType": "text/plain"}], "uids": ["C9ZEkXheY8Xps436h"]} -{"Format": "IDEA0", "ID": "079c9b3d-6be2-4a78-a831-f0c01aef9ab5", "DetectTime": "2023-10-30T14:06:27.812638+02:00", "EventTime": "2023-10-30T14:06:27.812663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["Cdg7W01vyvSLmLIMZa"]} -{"Format": "IDEA0", "ID": "38391b79-80db-45d0-ad65-ac7f83a60af8", "DetectTime": "2023-10-30T14:06:27.840946+02:00", "EventTime": "2023-10-30T14:06:27.840968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.199.91.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.199.91.254 ", "ContentType": "text/plain"}], "uids": ["CNKk7D2wzuOHMW7Qb6"]} -{"Format": "IDEA0", "ID": "a344e1d3-d1f5-464d-aa6e-471645e13991", "DetectTime": "2023-10-30T14:06:27.868473+02:00", "EventTime": "2023-10-30T14:06:27.868489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.196.162.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.196.162.114 ", "ContentType": "text/plain"}], "uids": ["Czu3He2gzMBTP4M7gh"]} -{"Format": "IDEA0", "ID": "7da3df00-7aa5-427c-86db-8803a93ab536", "DetectTime": "2023-10-30T14:06:27.898287+02:00", "EventTime": "2023-10-30T14:06:27.898311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.179.3.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.179.3.22 ", "ContentType": "text/plain"}], "uids": ["Ccbeub4nlI87ScMjqb"]} -{"Format": "IDEA0", "ID": "d31e1563-0e2e-4867-a2f0-87986cad7838", "DetectTime": "2023-10-30T14:06:27.927208+02:00", "EventTime": "2023-10-30T14:06:27.927224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.15.211"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.58.15.211 ", "ContentType": "text/plain"}], "uids": ["CjlOnD3jBkVJ3KBmj9"]} -{"Format": "IDEA0", "ID": "d629c209-9f20-4b4d-abc9-836871cea29e", "DetectTime": "2023-10-30T14:06:27.958652+02:00", "EventTime": "2023-10-30T14:06:27.958669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.247.65.143 ", "ContentType": "text/plain"}], "uids": ["CwV6KB1LcFe8Etzzf4"]} -{"Format": "IDEA0", "ID": "d49ddfcf-b5ef-4bb2-89bc-f56ee0682683", "DetectTime": "2023-10-30T14:06:27.985489+02:00", "EventTime": "2023-10-30T14:06:27.985505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["23.30.177.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 23.30.177.153 ", "ContentType": "text/plain"}], "uids": ["C2yzIH1HJO4Pwd7Sa"]} -{"Format": "IDEA0", "ID": "949376eb-066f-4b76-9282-2e4bf8a3329c", "DetectTime": "2023-10-30T14:06:28.016026+02:00", "EventTime": "2023-10-30T14:06:28.016058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["39.41.115.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 39.41.115.86 ", "ContentType": "text/plain"}], "uids": ["CbMyuK2EuaR9uPJlXc"]} -{"Format": "IDEA0", "ID": "83e076c0-1bf6-4747-920e-50aadaffb5ef", "DetectTime": "2023-10-30T14:06:28.045372+02:00", "EventTime": "2023-10-30T14:06:28.045387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["ChVrbz9tuGVePtPgf"]} -{"Format": "IDEA0", "ID": "80702c94-fd10-4498-ba01-73a900830c8e", "DetectTime": "2023-10-30T14:06:28.073566+02:00", "EventTime": "2023-10-30T14:06:28.073578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.253.243 ", "ContentType": "text/plain"}], "uids": ["Cst0eVWG5NcnMSOil"]} -{"Format": "IDEA0", "ID": "a80bc37a-46db-49ba-9b04-f5a76939d023", "DetectTime": "2023-10-30T14:06:28.098665+02:00", "EventTime": "2023-10-30T14:06:28.098691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CT6MC54SXB4l2JcaMe"]} -{"Format": "IDEA0", "ID": "9f073eb6-9599-4f96-aaae-c5b2cdc14fe7", "DetectTime": "2023-10-30T14:06:28.121056+02:00", "EventTime": "2023-10-30T14:06:28.121073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.24.108.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.24.108.105 ", "ContentType": "text/plain"}], "uids": ["CJWZZa2otUe54434i2"]} -{"Format": "IDEA0", "ID": "3d70a07d-34b3-41b1-b7c9-a7e156768385", "DetectTime": "2023-10-30T14:06:28.145567+02:00", "EventTime": "2023-10-30T14:06:28.145579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.119.61.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.119.61.37 ", "ContentType": "text/plain"}], "uids": ["CGHTiY3MZ0iDg9snZc"]} -{"Format": "IDEA0", "ID": "cc4a272f-4fa5-4aa0-9c5b-850b22ac0a64", "DetectTime": "2023-10-30T14:06:28.169984+02:00", "EventTime": "2023-10-30T14:06:28.169998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cur36o1WEDQuAtFd98"]} -{"Format": "IDEA0", "ID": "78c2e711-678d-42f8-8049-1918b92ed2b1", "DetectTime": "2023-10-30T14:06:28.214253+02:00", "EventTime": "2023-10-30T14:06:28.214265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.98.145.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.98.145.136 ", "ContentType": "text/plain"}], "uids": ["CPQDQI1J70RgWrQbde"]} -{"Format": "IDEA0", "ID": "fdb42e02-1068-402d-a279-705d5e2fabeb", "DetectTime": "2023-10-30T14:06:28.241157+02:00", "EventTime": "2023-10-30T14:06:28.241169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CMCVHe2DFMpbIsiiq1"]} -{"Format": "IDEA0", "ID": "2ad355bb-7710-4886-8297-87f8d41c6634", "DetectTime": "2023-10-30T14:06:28.266048+02:00", "EventTime": "2023-10-30T14:06:28.266065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.52.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.52.183 ", "ContentType": "text/plain"}], "uids": ["CBRtf61qQl6YrlCyJ1"]} -{"Format": "IDEA0", "ID": "737883d3-8c0d-41b8-b755-2928ab7fa13a", "DetectTime": "2023-10-30T14:06:28.291600+02:00", "EventTime": "2023-10-30T14:06:28.291619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.174.80.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.174.80.114 ", "ContentType": "text/plain"}], "uids": ["C0xyi130GAEI7ZFtM5"]} -{"Format": "IDEA0", "ID": "a99630d0-4591-4554-87ed-28904d1145a9", "DetectTime": "2023-10-30T14:06:28.315117+02:00", "EventTime": "2023-10-30T14:06:28.315128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.99.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.99.85 ", "ContentType": "text/plain"}], "uids": ["Cgdaik3kcnqG9Hz5B6"]} -{"Format": "IDEA0", "ID": "42216476-4b13-4614-9af7-76d3e1735682", "DetectTime": "2023-10-30T14:06:28.338866+02:00", "EventTime": "2023-10-30T14:06:28.338889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.51.19.187 ", "ContentType": "text/plain"}], "uids": ["C03Sfz7FyqExGoAkb"]} -{"Format": "IDEA0", "ID": "e7906273-e41f-4d85-8e29-50c8908f54b6", "DetectTime": "2023-10-30T14:06:28.363321+02:00", "EventTime": "2023-10-30T14:06:28.363342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.205.233.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.205.233.25 ", "ContentType": "text/plain"}], "uids": ["CHxCXD2nLY5vfAEtw3"]} -{"Format": "IDEA0", "ID": "fe3b090d-5405-4cf0-8681-40b25b55a0ac", "DetectTime": "2023-10-30T14:06:28.391098+02:00", "EventTime": "2023-10-30T14:06:28.391123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.33.110.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.33.110.250 ", "ContentType": "text/plain"}], "uids": ["CTUf871v0ujFSoCce6"]} -{"Format": "IDEA0", "ID": "0ae35e25-054f-4e4e-9b6f-d6b031d6d726", "DetectTime": "2023-10-30T14:06:28.418553+02:00", "EventTime": "2023-10-30T14:06:28.418570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["27.3.194.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 27.3.194.218 ", "ContentType": "text/plain"}], "uids": ["C2G7PO2HtlsSVGcUP2"]} -{"Format": "IDEA0", "ID": "890aae08-0901-4e54-91d8-941aba4a048f", "DetectTime": "2023-10-30T14:06:28.445817+02:00", "EventTime": "2023-10-30T14:06:28.445833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.75.48.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.75.48.164 ", "ContentType": "text/plain"}], "uids": ["CwchWE3B95LBQVWsq5"]} -{"Format": "IDEA0", "ID": "2ece2d36-d83d-4aa3-8420-fb5c9613b8cc", "DetectTime": "2023-10-30T14:06:28.470954+02:00", "EventTime": "2023-10-30T14:06:28.470974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.236.250.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.236.250.104 ", "ContentType": "text/plain"}], "uids": ["C6iZBI186VkLDQb7nb"]} -{"Format": "IDEA0", "ID": "7d049556-f4ba-4ab9-a95c-6f1d4799e8dd", "DetectTime": "2023-10-30T14:06:28.499302+02:00", "EventTime": "2023-10-30T14:06:28.499321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["Cb70ko4fqNw0IXYj4i"]} -{"Format": "IDEA0", "ID": "aa083f32-5226-4e65-9b9f-6170b3dc55a0", "DetectTime": "2023-10-30T14:06:28.526163+02:00", "EventTime": "2023-10-30T14:06:28.526180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CE9drp2c7bQ1oPYUV4"]} -{"Format": "IDEA0", "ID": "35c63e87-3277-404d-89ae-4c5b7756b64d", "DetectTime": "2023-10-30T14:06:28.549578+02:00", "EventTime": "2023-10-30T14:06:28.549589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.2.71.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.2.71.141 ", "ContentType": "text/plain"}], "uids": ["CN9EXQ2wq0aO38ZtL9"]} -{"Format": "IDEA0", "ID": "5ad6e666-1a3d-405f-a327-c22c57a366e8", "DetectTime": "2023-10-30T14:06:28.571109+02:00", "EventTime": "2023-10-30T14:06:28.571130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.223.169 ", "ContentType": "text/plain"}], "uids": ["CR4RwK2TmWzgpl8k44"]} -{"Format": "IDEA0", "ID": "2f8f5b81-0de9-4333-afcd-bc64e844ee30", "DetectTime": "2023-10-30T14:06:28.594881+02:00", "EventTime": "2023-10-30T14:06:28.594897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.207.218.206"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.207.218.206 ", "ContentType": "text/plain"}], "uids": ["CPifn641agm6lJrgol"]} -{"Format": "IDEA0", "ID": "1cfd3b4a-7e35-40cd-832f-bb167824f6c4", "DetectTime": "2023-10-30T14:06:28.615414+02:00", "EventTime": "2023-10-30T14:06:28.615435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.73.234.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.73.234.189 ", "ContentType": "text/plain"}], "uids": ["CiOoCOYgEJsuRhIJl"]} -{"Format": "IDEA0", "ID": "b6ea3bed-c402-4dca-b7c0-5c6b07c2bac0", "DetectTime": "2023-10-30T14:06:28.640457+02:00", "EventTime": "2023-10-30T14:06:28.640483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["C0taO73vQNVK2zV7rh"]} -{"Format": "IDEA0", "ID": "29a75c62-f605-4a13-b8ca-5f78a819703f", "DetectTime": "2023-10-30T14:06:28.664786+02:00", "EventTime": "2023-10-30T14:06:28.664802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.141.110.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.141.110.230 ", "ContentType": "text/plain"}], "uids": ["CabXkN3g9XM0bply16"]} -{"Format": "IDEA0", "ID": "5fb53fb3-63f5-4e68-ae2b-f8aa2acf491b", "DetectTime": "2023-10-30T14:06:28.687294+02:00", "EventTime": "2023-10-30T14:06:28.687310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["CFKyv326lLvFOxH4dc"]} -{"Format": "IDEA0", "ID": "16a804c8-fc2d-4ed9-98a7-c3677e38b54e", "DetectTime": "2023-10-30T14:06:28.710680+02:00", "EventTime": "2023-10-30T14:06:28.710699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.109.94.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.109.94.100 ", "ContentType": "text/plain"}], "uids": ["CJsLKy1AItgg3yi1H7"]} -{"Format": "IDEA0", "ID": "55ce83ba-8fef-4441-adde-86db9c95d549", "DetectTime": "2023-10-30T14:06:28.730608+02:00", "EventTime": "2023-10-30T14:06:28.730619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.176.227.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.176.227.204 ", "ContentType": "text/plain"}], "uids": ["CZJqFKQcqABUdtwJ1"]} -{"Format": "IDEA0", "ID": "9c57ce08-6a71-4884-9123-6a3d94abbcba", "DetectTime": "2023-10-30T14:06:28.748627+02:00", "EventTime": "2023-10-30T14:06:28.748639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CvJs0g4RKTpgbSrRF1"]} -{"Format": "IDEA0", "ID": "0da9c9f7-54b4-4c80-9c99-e6ce1248016a", "DetectTime": "2023-10-30T14:06:28.765757+02:00", "EventTime": "2023-10-30T14:06:28.765773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.225.128.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.225.128.139 ", "ContentType": "text/plain"}], "uids": ["Co5Fqf46EmZlDIhse8"]} -{"Format": "IDEA0", "ID": "d762c610-6032-4687-9e5c-6baf5ce546fb", "DetectTime": "2023-10-30T14:06:28.790220+02:00", "EventTime": "2023-10-30T14:06:28.790236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["Cml82aByl4whTKuWk"]} -{"Format": "IDEA0", "ID": "b5c8f8ea-5ebb-45fa-9c27-f13ad25be522", "DetectTime": "2023-10-30T14:06:28.812805+02:00", "EventTime": "2023-10-30T14:06:28.812817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJ42f23GTBRkMR5ixi"]} -{"Format": "IDEA0", "ID": "fcc93842-0087-43e1-9155-f27163d6d9c4", "DetectTime": "2023-10-30T14:06:28.832889+02:00", "EventTime": "2023-10-30T14:06:28.832905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.235.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.235.54 ", "ContentType": "text/plain"}], "uids": ["CokkfH3rSKA0GmHlwf"]} -{"Format": "IDEA0", "ID": "ca7e29df-4005-41ba-bd67-503270b1ca17", "DetectTime": "2023-10-30T14:06:28.857046+02:00", "EventTime": "2023-10-30T14:06:28.857060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.167.82.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.167.82.36 ", "ContentType": "text/plain"}], "uids": ["CeCm3S3U8Jsaz7LSv7"]} -{"Format": "IDEA0", "ID": "cd2ad856-75f5-4349-b903-8f74af690d06", "DetectTime": "2023-10-30T14:06:28.876619+02:00", "EventTime": "2023-10-30T14:06:28.876629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.130.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.130.200 ", "ContentType": "text/plain"}], "uids": ["CtUX2Y1qxlA7Agpxgj"]} -{"Format": "IDEA0", "ID": "58d89457-220c-4593-bd3f-5d5c6c058f66", "DetectTime": "2023-10-30T14:06:28.898226+02:00", "EventTime": "2023-10-30T14:06:28.898243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CxraMq4OcVhbsaY6Hj"]} -{"Format": "IDEA0", "ID": "a291bff5-13fc-400e-829e-9bcd595bf104", "DetectTime": "2023-10-30T14:06:28.917221+02:00", "EventTime": "2023-10-30T14:06:28.917235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.72.118.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.72.118.131 ", "ContentType": "text/plain"}], "uids": ["Cdp7Wl4VAg7hKM2bj4"]} -{"Format": "IDEA0", "ID": "a40ea8be-428a-4a29-9223-99874e661f3d", "DetectTime": "2023-10-30T14:06:28.939587+02:00", "EventTime": "2023-10-30T14:06:28.939603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["ClomCH3t52RkyxqNSd"]} -{"Format": "IDEA0", "ID": "e9035707-4da8-4264-a0ca-fc038504ad42", "DetectTime": "2023-10-30T14:06:28.960686+02:00", "EventTime": "2023-10-30T14:06:28.960702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.149.132.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.149.132.57 ", "ContentType": "text/plain"}], "uids": ["CailZk2t104KMaq4d7"]} -{"Format": "IDEA0", "ID": "2a8309ea-26fe-4a8c-adb6-1768a6891cec", "DetectTime": "2023-10-30T14:06:28.983940+02:00", "EventTime": "2023-10-30T14:06:28.983954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.227.166.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.227.166.142 ", "ContentType": "text/plain"}], "uids": ["CVFpmP2g1CUb1GQQ7h"]} -{"Format": "IDEA0", "ID": "6931fcc0-8d80-4ae0-82a0-2fc07f82b838", "DetectTime": "2023-10-30T14:06:29.007263+02:00", "EventTime": "2023-10-30T14:06:29.007284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.206.3.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 197.206.3.248 ", "ContentType": "text/plain"}], "uids": ["CdD0lM27Fk6zULwmFl"]} -{"Format": "IDEA0", "ID": "aac6e7b8-bafe-4b98-8bf0-20ecc1ec576f", "DetectTime": "2023-10-30T14:06:29.032980+02:00", "EventTime": "2023-10-30T14:06:29.033002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["207.237.76.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 207.237.76.230 ", "ContentType": "text/plain"}], "uids": ["C9Y83s1zuQMkcguk6"]} -{"Format": "IDEA0", "ID": "cb412a6b-79ee-432f-893e-25e835988ec7", "DetectTime": "2023-10-30T14:06:29.059234+02:00", "EventTime": "2023-10-30T14:06:29.059255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CvecDw4ghXxCaoMnA8"]} -{"Format": "IDEA0", "ID": "e6eb0954-93b2-4332-89e0-8f8c1fa48569", "DetectTime": "2023-10-30T14:06:29.082662+02:00", "EventTime": "2023-10-30T14:06:29.082677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.67.152.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.67.152.174 ", "ContentType": "text/plain"}], "uids": ["C8sl2lTRqYFsyEar5"]} -{"Format": "IDEA0", "ID": "326823c8-04d8-4d10-8181-d38dedb65910", "DetectTime": "2023-10-30T14:06:29.100035+02:00", "EventTime": "2023-10-30T14:06:29.100046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CxCWr81APyouQAWrze"]} -{"Format": "IDEA0", "ID": "3abb6985-44e7-48be-a823-06ed3351ad40", "DetectTime": "2023-10-30T14:06:29.120902+02:00", "EventTime": "2023-10-30T14:06:29.120913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.25.116.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.25.116.35 ", "ContentType": "text/plain"}], "uids": ["CMWvId4zIJqMJLqkv"]} -{"Format": "IDEA0", "ID": "91c8cb91-4c50-4c0a-9573-354641b5b3ac", "DetectTime": "2023-10-30T14:06:29.145615+02:00", "EventTime": "2023-10-30T14:06:29.145633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CbmKN827lHXxWi3k79"]} -{"Format": "IDEA0", "ID": "6ccb5c65-7478-45fc-bdc8-2d172b3820ec", "DetectTime": "2023-10-30T14:06:29.170482+02:00", "EventTime": "2023-10-30T14:06:29.170503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CDZk1g35IpQFbBaTCi"]} -{"Format": "IDEA0", "ID": "b1d513ac-3bb7-49d0-8997-3af306d45267", "DetectTime": "2023-10-30T14:06:29.196199+02:00", "EventTime": "2023-10-30T14:06:29.196216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.1.94.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.1.94.91 ", "ContentType": "text/plain"}], "uids": ["CGg4RG23qeMnQXv8x2"]} -{"Format": "IDEA0", "ID": "b49caf04-1ade-4666-8dfa-25470c87c151", "DetectTime": "2023-10-30T14:06:29.219296+02:00", "EventTime": "2023-10-30T14:06:29.219308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.119.163.4"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.119.163.4 ", "ContentType": "text/plain"}], "uids": ["Cen8la1p5AuV3oCjGl"]} -{"Format": "IDEA0", "ID": "319a099c-a70d-4e77-b507-31c0cd0ba988", "DetectTime": "2023-10-30T14:06:29.241419+02:00", "EventTime": "2023-10-30T14:06:29.241435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C8uy7G4wtyRcQEuUbl"]} -{"Format": "IDEA0", "ID": "ff81d4c0-75fb-49ea-86a8-3ac7ee63a367", "DetectTime": "2023-10-30T14:06:29.277735+02:00", "EventTime": "2023-10-30T14:06:29.277756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.146.85 ", "ContentType": "text/plain"}], "uids": ["CXLoMN1XdxtRqJ5xEe"]} -{"Format": "IDEA0", "ID": "fc334c99-b73e-474c-89b4-ad559071dbc9", "DetectTime": "2023-10-30T14:06:29.301152+02:00", "EventTime": "2023-10-30T14:06:29.301171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.98.17.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.98.17.66 ", "ContentType": "text/plain"}], "uids": ["Cotg8WEoVpJA9tftk"]} -{"Format": "IDEA0", "ID": "16890a46-12aa-4d0e-ae48-a49b7109652f", "DetectTime": "2023-10-30T14:06:29.326546+02:00", "EventTime": "2023-10-30T14:06:29.326566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.114.245.252"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.114.245.252 ", "ContentType": "text/plain"}], "uids": ["CMZ7AhsRYB2f6tJak"]} -{"Format": "IDEA0", "ID": "1333edbb-4a9a-4376-a5d8-d6484910e85e", "DetectTime": "2023-10-30T14:06:29.353165+02:00", "EventTime": "2023-10-30T14:06:29.353188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.231.42.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.231.42.234 ", "ContentType": "text/plain"}], "uids": ["C6e4AU2IVEK8BlwxA5"]} -{"Format": "IDEA0", "ID": "e54608a1-de9c-4162-aa2b-a472c9ca3bee", "DetectTime": "2023-10-30T14:06:29.378758+02:00", "EventTime": "2023-10-30T14:06:29.378793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.50.102.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.50.102.109 ", "ContentType": "text/plain"}], "uids": ["CZheY41VbxYrrkWVa4"]} -{"Format": "IDEA0", "ID": "83b339ad-a749-4fc8-8ddd-863119e7bce3", "DetectTime": "2023-10-30T14:06:29.401812+02:00", "EventTime": "2023-10-30T14:06:29.401827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CQz3gRGUl7Sy3Dg6"]} -{"Format": "IDEA0", "ID": "1a2bad4b-b13e-4b21-affd-4fe3a1887a93", "DetectTime": "2023-10-30T14:06:29.421103+02:00", "EventTime": "2023-10-30T14:06:29.421116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.166.221.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.166.221.213 ", "ContentType": "text/plain"}], "uids": ["CV7Dfs1E1f2mUJIkyb"]} -{"Format": "IDEA0", "ID": "d1733ad1-177c-421b-af15-24fc60dd7585", "DetectTime": "2023-10-30T14:06:29.443128+02:00", "EventTime": "2023-10-30T14:06:29.443149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.79.0.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 114.79.0.24 ", "ContentType": "text/plain"}], "uids": ["Chkr6qqcQMp6TqAJ2"]} -{"Format": "IDEA0", "ID": "3f1361c5-e19b-4de8-9512-2e5a98969dd9", "DetectTime": "2023-10-30T14:06:29.468054+02:00", "EventTime": "2023-10-30T14:06:29.468072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["194.30.130.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 194.30.130.14 ", "ContentType": "text/plain"}], "uids": ["CpHZri39mQLd41zesi"]} -{"Format": "IDEA0", "ID": "4b975dad-e1e9-46c7-84eb-8fc7ed197e62", "DetectTime": "2023-10-30T14:06:29.488375+02:00", "EventTime": "2023-10-30T14:06:29.488393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.5.202.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.5.202.84 ", "ContentType": "text/plain"}], "uids": ["CUvCim3oe17GZ1bX1"]} -{"Format": "IDEA0", "ID": "db567a8a-0824-4923-8114-1f2548cbddc0", "DetectTime": "2023-10-30T14:06:29.506123+02:00", "EventTime": "2023-10-30T14:06:29.506135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.179.33.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.179.33.161 ", "ContentType": "text/plain"}], "uids": ["ChscSL3Lx7Tdu4Izlc"]} -{"Format": "IDEA0", "ID": "01e2f92d-2c84-4ca5-9299-600e250c7183", "DetectTime": "2023-10-30T14:06:29.526869+02:00", "EventTime": "2023-10-30T14:06:29.526882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.117.148"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.117.148 ", "ContentType": "text/plain"}], "uids": ["C4KAUk2hQYDUSRcPSk"]} -{"Format": "IDEA0", "ID": "6546dd2e-92d9-4081-bf55-22c8eceea7da", "DetectTime": "2023-10-30T14:06:29.547449+02:00", "EventTime": "2023-10-30T14:06:29.547468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.171.136.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.171.136.37 ", "ContentType": "text/plain"}], "uids": ["CNxMkr3qCVDcK7Hwv2"]} -{"Format": "IDEA0", "ID": "822ceb1e-333a-4a79-ba56-0b546ea73f2f", "DetectTime": "2023-10-30T14:06:29.573261+02:00", "EventTime": "2023-10-30T14:06:29.573281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.119.19.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.119.19.131 ", "ContentType": "text/plain"}], "uids": ["CnUzJq2U1nk3F7f75i"]} -{"Format": "IDEA0", "ID": "b39e5671-f173-4e68-bd85-d23c33d23af0", "DetectTime": "2023-10-30T14:06:29.598065+02:00", "EventTime": "2023-10-30T14:06:29.598086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CnHlPE46aDqjMxQiZk"]} -{"Format": "IDEA0", "ID": "87e5ffc3-dc97-4a42-a64f-0f37cf237442", "DetectTime": "2023-10-30T14:06:29.622130+02:00", "EventTime": "2023-10-30T14:06:29.622143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.180.248.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.180.248.3 ", "ContentType": "text/plain"}], "uids": ["ClQcS9LAJWFcXhGr"]} -{"Format": "IDEA0", "ID": "43c941a7-2614-4949-817e-6354f4e0ea61", "DetectTime": "2023-10-30T14:06:29.641498+02:00", "EventTime": "2023-10-30T14:06:29.641511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CyODL427WsHRNsIlEk"]} -{"Format": "IDEA0", "ID": "f420819e-e404-43a8-b7df-d7425789e796", "DetectTime": "2023-10-30T14:06:29.661946+02:00", "EventTime": "2023-10-30T14:06:29.661958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.45.110.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.45.110.91 ", "ContentType": "text/plain"}], "uids": ["C5ikSq2lyqPi6dx08g"]} -{"Format": "IDEA0", "ID": "10e7a77d-9f3d-4be5-9df5-3017ac304533", "DetectTime": "2023-10-30T14:06:29.682256+02:00", "EventTime": "2023-10-30T14:06:29.682269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.91.101.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.91.101.29 ", "ContentType": "text/plain"}], "uids": ["CbSGoS2EY5tH5TyMFh"]} -{"Format": "IDEA0", "ID": "2bb0d9fe-b199-4c4f-aac0-8221a891b423", "DetectTime": "2023-10-30T14:06:29.702307+02:00", "EventTime": "2023-10-30T14:06:29.702324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.93.30.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.93.30.18 ", "ContentType": "text/plain"}], "uids": ["CbjeX32wm69cXXE1P9"]} -{"Format": "IDEA0", "ID": "486cc74e-2f41-4cf6-9729-612097705158", "DetectTime": "2023-10-30T14:06:29.721251+02:00", "EventTime": "2023-10-30T14:06:29.721262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.125.134.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.125.134.1 ", "ContentType": "text/plain"}], "uids": ["CwE5XZ3uSmuZoYarNi"]} -{"Format": "IDEA0", "ID": "d9117b47-25a7-4d7d-a036-e16bb3c55edd", "DetectTime": "2023-10-30T14:06:29.742727+02:00", "EventTime": "2023-10-30T14:06:29.742745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.14.30.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.14.30.94 ", "ContentType": "text/plain"}], "uids": ["CvyoE14UUbYXaSKel8"]} -{"Format": "IDEA0", "ID": "dbbbce8d-1591-42e4-808b-995579d95c70", "DetectTime": "2023-10-30T14:06:29.762771+02:00", "EventTime": "2023-10-30T14:06:29.762800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.16.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.16.233 ", "ContentType": "text/plain"}], "uids": ["CJq5HA1OMb0JhuB1l5"]} -{"Format": "IDEA0", "ID": "e492e346-41ff-471b-8b41-40b4bcdc694f", "DetectTime": "2023-10-30T14:06:29.780810+02:00", "EventTime": "2023-10-30T14:06:29.780832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.92.175.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.92.175.97 ", "ContentType": "text/plain"}], "uids": ["CZO4Nw1fkEXSaI8Ssk"]} -{"Format": "IDEA0", "ID": "1c295730-e168-4b53-89fe-eae70867dbcc", "DetectTime": "2023-10-30T14:06:29.805505+02:00", "EventTime": "2023-10-30T14:06:29.805525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CBQCFc1zlVqp6yurl1"]} -{"Format": "IDEA0", "ID": "99423b65-5773-4a10-b991-12df69e703a5", "DetectTime": "2023-10-30T14:06:29.829722+02:00", "EventTime": "2023-10-30T14:06:29.829734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.70.98.247 ", "ContentType": "text/plain"}], "uids": ["CzQRT9HOv4dulUm1k"]} -{"Format": "IDEA0", "ID": "4f5c423f-efbb-4da4-b16a-c953f13bc8b9", "DetectTime": "2023-10-30T14:06:29.853914+02:00", "EventTime": "2023-10-30T14:06:29.853934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.107.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.107.225 ", "ContentType": "text/plain"}], "uids": ["C8phJo1WhIgQc7fao6"]} -{"Format": "IDEA0", "ID": "c28d6819-2321-42f9-8114-b2282d3e6cd1", "DetectTime": "2023-10-30T14:06:29.978577+02:00", "EventTime": "2023-10-30T14:06:29.978598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CC1w8XIhLO9Ev3GDb"]} -{"Format": "IDEA0", "ID": "67234d51-426d-456b-8e72-8dc64ffbbd9a", "DetectTime": "2023-10-30T14:06:30.005298+02:00", "EventTime": "2023-10-30T14:06:30.005327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.45.144.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.45.144.39 ", "ContentType": "text/plain"}], "uids": ["CvT2Jth7um8LlCZl9"]} -{"Format": "IDEA0", "ID": "67028dbc-74f8-440c-a3ae-671630d03594", "DetectTime": "2023-10-30T14:06:30.031314+02:00", "EventTime": "2023-10-30T14:06:30.031332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CaepZi3skFsGdaEU0g"]} -{"Format": "IDEA0", "ID": "b9769f25-ee21-4e1f-88d6-f4beef6d6c16", "DetectTime": "2023-10-30T14:06:30.063552+02:00", "EventTime": "2023-10-30T14:06:30.063569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CZqXtU1PJs3s1FBGH9"]} -{"Format": "IDEA0", "ID": "edf46fb0-02dc-4f41-813b-7000d27dbd5b", "DetectTime": "2023-10-30T14:06:30.107990+02:00", "EventTime": "2023-10-30T14:06:30.108007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CtszR426yXQujVMJU8"]} -{"Format": "IDEA0", "ID": "165fe6e8-373b-4603-8b87-00c605eb39ae", "DetectTime": "2023-10-30T14:06:30.134686+02:00", "EventTime": "2023-10-30T14:06:30.134709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CwoZpF2kGAn3BceFb6"]} -{"Format": "IDEA0", "ID": "fc2d9962-3897-4a4a-b8f4-abd1041d8eea", "DetectTime": "2023-10-30T14:06:30.167182+02:00", "EventTime": "2023-10-30T14:06:30.167203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CPGoVP1e5idg5T7sE2"]} -{"Format": "IDEA0", "ID": "b3061fc3-bfba-4a41-8338-c2e2a751f6f6", "DetectTime": "2023-10-30T14:06:30.192940+02:00", "EventTime": "2023-10-30T14:06:30.192953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["Ct6i1D4tUBtJ1ULQld"]} -{"Format": "IDEA0", "ID": "899255d4-1ff2-4224-b54a-58984b4047da", "DetectTime": "2023-10-30T14:06:30.218714+02:00", "EventTime": "2023-10-30T14:06:30.218730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CQEhs01NXwy4sqmq88"]} -{"Format": "IDEA0", "ID": "d82334f0-f4ca-40ca-9304-9cb4359a9b95", "DetectTime": "2023-10-30T14:06:30.248169+02:00", "EventTime": "2023-10-30T14:06:30.248196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["CxES354528L5AsoKB6"]} -{"Format": "IDEA0", "ID": "74f7fa47-cfb6-46f6-881c-dd7fba19a75e", "DetectTime": "2023-10-30T14:06:30.280253+02:00", "EventTime": "2023-10-30T14:06:30.280273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CPdfbJ3a4g0C1SJsLj"]} -{"Format": "IDEA0", "ID": "ef23dbc6-79da-4315-8e82-f5785d41bc75", "DetectTime": "2023-10-30T14:06:30.307658+02:00", "EventTime": "2023-10-30T14:06:30.307674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CgLKmI1O1ooiqufIKa"]} -{"Format": "IDEA0", "ID": "5c9b8df4-8d71-40f9-a578-3cff9d184cbf", "DetectTime": "2023-10-30T14:06:30.335380+02:00", "EventTime": "2023-10-30T14:06:30.335397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ctq4yr2kWl6r4ym9Ek"]} -{"Format": "IDEA0", "ID": "f22e4588-6e13-47c6-995c-4fca12abce67", "DetectTime": "2023-10-30T14:06:30.366918+02:00", "EventTime": "2023-10-30T14:06:30.366938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CPK2uhB80Chp770sj"]} -{"Format": "IDEA0", "ID": "d94584a9-8081-44e5-97d8-1a57847fb0d9", "DetectTime": "2023-10-30T14:06:30.400602+02:00", "EventTime": "2023-10-30T14:06:30.400617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CiPV3344kgUiGSpiMa"]} -{"Format": "IDEA0", "ID": "1c580c5c-8321-4a0a-a81a-edf645e5e1fa", "DetectTime": "2023-10-30T14:06:30.431332+02:00", "EventTime": "2023-10-30T14:06:30.431352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CFCBcW1LljfqUXoXu6"]} -{"Format": "IDEA0", "ID": "9a3f2c18-f3e1-49d0-8506-1e038e2e817e", "DetectTime": "2023-10-30T14:06:30.463730+02:00", "EventTime": "2023-10-30T14:06:30.463747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CPv6G5Q5wB6zQrvq5"]} -{"Format": "IDEA0", "ID": "6aab0a8d-7ab8-49b1-a363-50847bbf2fb4", "DetectTime": "2023-10-30T14:06:30.494046+02:00", "EventTime": "2023-10-30T14:06:30.494062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.253.243 ", "ContentType": "text/plain"}], "uids": ["Cu8WlN14D2xeDHxO81"]} -{"Format": "IDEA0", "ID": "c6c71d88-8153-4a8f-a35f-990668708014", "DetectTime": "2023-10-30T14:06:30.517538+02:00", "EventTime": "2023-10-30T14:06:30.517553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CLyqJ017vPRyWqVjBg"]} -{"Format": "IDEA0", "ID": "5b4c29f3-2682-4a2e-926a-30d2cc879a33", "DetectTime": "2023-10-30T14:06:30.546705+02:00", "EventTime": "2023-10-30T14:06:30.546716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CgMqisJJdTGx29BOl"]} -{"Format": "IDEA0", "ID": "fd651a49-73a2-43ae-83b6-bc9eac5d4c98", "DetectTime": "2023-10-30T14:06:30.572869+02:00", "EventTime": "2023-10-30T14:06:30.572884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CL23lg4oIRwPj1eSeh"]} -{"Format": "IDEA0", "ID": "7a5749b8-7a8d-4f19-a313-75a142c0f421", "DetectTime": "2023-10-30T14:06:30.602630+02:00", "EventTime": "2023-10-30T14:06:30.602651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Co2okR3VT4dI4v3Kv7"]} -{"Format": "IDEA0", "ID": "d433fdfb-1ad6-499f-be24-693b259a6be3", "DetectTime": "2023-10-30T14:06:30.633717+02:00", "EventTime": "2023-10-30T14:06:30.633738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CFMbKf2exqNZIRLopb"]} -{"Format": "IDEA0", "ID": "05e103c5-2c60-4602-b228-6d96f4d2bcf6", "DetectTime": "2023-10-30T14:06:30.666224+02:00", "EventTime": "2023-10-30T14:06:30.666244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CcqY2P17nd3xGBJik8"]} -{"Format": "IDEA0", "ID": "e75abde2-43d3-4904-b601-6d7de52bde5b", "DetectTime": "2023-10-30T14:06:30.698283+02:00", "EventTime": "2023-10-30T14:06:30.698298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CEv9jUvHnaN1yK6S9"]} -{"Format": "IDEA0", "ID": "05d999d7-eaee-4fce-ab07-7576bb41b551", "DetectTime": "2023-10-30T14:06:30.728137+02:00", "EventTime": "2023-10-30T14:06:30.728157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CVLofg37GSzdv7zRtg"]} -{"Format": "IDEA0", "ID": "f2a623d8-79f8-4f5c-97a4-201a1f2ac783", "DetectTime": "2023-10-30T14:06:30.759020+02:00", "EventTime": "2023-10-30T14:06:30.759037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CM7gZT3zg2atIgdIud"]} -{"Format": "IDEA0", "ID": "8be0c428-36bb-4b62-a15f-fae5d14170a2", "DetectTime": "2023-10-30T14:06:30.788118+02:00", "EventTime": "2023-10-30T14:06:30.788134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.51.19.187 ", "ContentType": "text/plain"}], "uids": ["CuFQgu3RRprPbnhwaa"]} -{"Format": "IDEA0", "ID": "2f9c1b88-9676-4e1f-be30-3298f28c685c", "DetectTime": "2023-10-30T14:06:30.818208+02:00", "EventTime": "2023-10-30T14:06:30.818224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["CZ7UvL1G27cmLflv9e"]} -{"Format": "IDEA0", "ID": "f43237a8-b1ff-43d2-8a25-9412f7c5333b", "DetectTime": "2023-10-30T14:06:30.842553+02:00", "EventTime": "2023-10-30T14:06:30.842573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CLAU3l14ImO4MuQxr4"]} -{"Format": "IDEA0", "ID": "e9f169ad-d2b0-475b-babc-7d2ef2e611b9", "DetectTime": "2023-10-30T14:06:30.873285+02:00", "EventTime": "2023-10-30T14:06:30.873305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cf52gb11uWBN5SP8a1"]} -{"Format": "IDEA0", "ID": "b9f718a0-c8ee-4355-a3ac-c28d9a06681e", "DetectTime": "2023-10-30T14:06:30.904102+02:00", "EventTime": "2023-10-30T14:06:30.904114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["CZHuyu2JfdNZpEjODh"]} -{"Format": "IDEA0", "ID": "bd4964f9-0d38-4e6a-9d43-892ee739b94c", "DetectTime": "2023-10-30T14:06:30.927092+02:00", "EventTime": "2023-10-30T14:06:30.927109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.247.65.143 ", "ContentType": "text/plain"}], "uids": ["C4x3kW1YtySpi3V70l"]} -{"Format": "IDEA0", "ID": "45c042f4-f8c4-432d-bd23-284b3692c6ca", "DetectTime": "2023-10-30T14:06:30.952041+02:00", "EventTime": "2023-10-30T14:06:30.952063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["CJQsB5BQroVeNgcVa"]} -{"Format": "IDEA0", "ID": "daea0798-1cfc-4d68-a900-ae238492e708", "DetectTime": "2023-10-30T14:06:30.973472+02:00", "EventTime": "2023-10-30T14:06:30.973501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CyiHsqy8Hjl8MbCch"]} -{"Format": "IDEA0", "ID": "92779f8c-556e-48ba-8eea-d1b2140ec8b5", "DetectTime": "2023-10-30T14:06:30.994971+02:00", "EventTime": "2023-10-30T14:06:30.994988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CIXDUzuudOVs2J196"]} -{"Format": "IDEA0", "ID": "2dea46ef-c9da-4292-845b-3b178191e224", "DetectTime": "2023-10-30T14:06:31.021561+02:00", "EventTime": "2023-10-30T14:06:31.021587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CFCRrI10VLO9B7wQn"]} -{"Format": "IDEA0", "ID": "0f5a9ca9-a4b4-426f-b898-8b0ecc5d8610", "DetectTime": "2023-10-30T14:06:31.051754+02:00", "EventTime": "2023-10-30T14:06:31.051769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CpzPBHBPI6KYbOMth"]} -{"Format": "IDEA0", "ID": "3b57e232-6cdf-4a4b-87f7-babdf34415b0", "DetectTime": "2023-10-30T14:06:31.078686+02:00", "EventTime": "2023-10-30T14:06:31.078710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CM3Jpy2hk0pHRn7N8g"]} -{"Format": "IDEA0", "ID": "b9aeaa03-f83f-4c15-963c-f71ab4e0e1f2", "DetectTime": "2023-10-30T14:06:31.103234+02:00", "EventTime": "2023-10-30T14:06:31.103246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.70.205.195 ", "ContentType": "text/plain"}], "uids": ["CGNe4B1o54Foqmptd7"]} -{"Format": "IDEA0", "ID": "a91bda2e-de08-4f2c-ad3e-607b3a1d5a6b", "DetectTime": "2023-10-30T14:06:31.130474+02:00", "EventTime": "2023-10-30T14:06:31.130495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.99.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.99.85 ", "ContentType": "text/plain"}], "uids": ["CPCnkB2mZG5l7pa784"]} -{"Format": "IDEA0", "ID": "ba72fbde-9b82-49c6-a640-9803878ab6d5", "DetectTime": "2023-10-30T14:06:31.158118+02:00", "EventTime": "2023-10-30T14:06:31.158133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C50ygc1T9Z5OpkTW06"]} -{"Format": "IDEA0", "ID": "f3027122-13d2-4248-97b0-f68096353c4c", "DetectTime": "2023-10-30T14:06:31.188419+02:00", "EventTime": "2023-10-30T14:06:31.188434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["C966p31sEmc1B92FHl"]} -{"Format": "IDEA0", "ID": "d2371693-0195-4f78-891a-6b04f70e2e0d", "DetectTime": "2023-10-30T14:06:31.216595+02:00", "EventTime": "2023-10-30T14:06:31.216607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CJQbzn2NUOes7X5tUc"]} -{"Format": "IDEA0", "ID": "01746044-c101-4be9-8136-27964e9f361f", "DetectTime": "2023-10-30T14:06:31.243338+02:00", "EventTime": "2023-10-30T14:06:31.243350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CqPwTo30YiEWzxaSx7"]} -{"Format": "IDEA0", "ID": "f6163091-9f4a-427d-8d45-9fd3171840a1", "DetectTime": "2023-10-30T14:06:31.265311+02:00", "EventTime": "2023-10-30T14:06:31.265329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CFiKJm3FhgBnsBtgi2"]} -{"Format": "IDEA0", "ID": "a0a898ba-c111-4731-a6c2-8ecf7a9bb3dd", "DetectTime": "2023-10-30T14:06:31.291009+02:00", "EventTime": "2023-10-30T14:06:31.291031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CRClFM1yjgFyQUbXAb"]} -{"Format": "IDEA0", "ID": "23de66d1-d6c5-4b99-a98a-a6dce660d980", "DetectTime": "2023-10-30T14:06:31.320177+02:00", "EventTime": "2023-10-30T14:06:31.320198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.223.169 ", "ContentType": "text/plain"}], "uids": ["CcJmGM14bB4Ldc6Ga2"]} -{"Format": "IDEA0", "ID": "7c101bef-c8dc-49c0-9da6-183b306aeaf2", "DetectTime": "2023-10-30T14:06:31.349961+02:00", "EventTime": "2023-10-30T14:06:31.349973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["CpglNZCZXoNXGRm58"]} -{"Format": "IDEA0", "ID": "22ebfb1d-79ae-482e-ba52-d251d9166e8b", "DetectTime": "2023-10-30T14:06:31.377746+02:00", "EventTime": "2023-10-30T14:06:31.377765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CKosL3mfybLf9uPC"]} -{"Format": "IDEA0", "ID": "ab1f898a-ebf2-42e4-939f-ae51dfaa32b3", "DetectTime": "2023-10-30T14:06:31.407380+02:00", "EventTime": "2023-10-30T14:06:31.407398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["COrXyynomc3oc98O4"]} -{"Format": "Json", "ID": "ab1f898a-ebf2-42e4-939f-ae51dfaa32b3", "DetectTime": "2023-10-30T14:06:31.407380+02:00", "EventTime": "2023-10-30T14:06:31.407398+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:24:16.022498+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:31.481550)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1c4143f7-b669-426f-9e80-c9c7c39766ac", "DetectTime": "2023-10-30T14:06:31.485671+02:00", "EventTime": "2023-10-30T14:06:31.485683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["ChYQ6viLM86fNuF17"]} -{"Format": "IDEA0", "ID": "48e6ac02-f5ec-4155-a6ee-507afa44680f", "DetectTime": "2023-10-30T14:06:31.508086+02:00", "EventTime": "2023-10-30T14:06:31.508098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CJj0Zw2QbsZMQsWkqj"]} -{"Format": "IDEA0", "ID": "0ffbfadd-a345-4ea2-81b5-8313b45204a3", "DetectTime": "2023-10-30T14:06:31.533531+02:00", "EventTime": "2023-10-30T14:06:31.533544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["C8ngF9PviSmobDwgc"]} -{"Format": "IDEA0", "ID": "de3f62fb-dd5b-4d1d-b99e-5512229739ce", "DetectTime": "2023-10-30T14:06:31.561065+02:00", "EventTime": "2023-10-30T14:06:31.561077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.127.20.14 ", "ContentType": "text/plain"}], "uids": ["Cpm60y3lzDmXXr2VGh"]} -{"Format": "IDEA0", "ID": "826b3437-8f31-4351-8b27-bf4035f75b64", "DetectTime": "2023-10-30T14:06:31.587824+02:00", "EventTime": "2023-10-30T14:06:31.587848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["C2Dc3m1p7LAWTjtbrf"]} -{"Format": "IDEA0", "ID": "e92dc44a-1407-4955-aa03-15dc15da7a0c", "DetectTime": "2023-10-30T14:06:31.620430+02:00", "EventTime": "2023-10-30T14:06:31.620452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CjdYLE4fXSNRcllZp3"]} -{"Format": "IDEA0", "ID": "4fb5eb25-e5bf-4bdf-bda8-350438de50ab", "DetectTime": "2023-10-30T14:06:31.653092+02:00", "EventTime": "2023-10-30T14:06:31.653110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CDE1rP25McPveqIiy6"]} -{"Format": "IDEA0", "ID": "10a23b61-4768-4b1f-92cb-59473b009015", "DetectTime": "2023-10-30T14:06:31.680166+02:00", "EventTime": "2023-10-30T14:06:31.680178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cc1i9I3kOnZPAUXNOf"]} -{"Format": "IDEA0", "ID": "835c64b6-342b-4613-8603-42baf2a2deca", "DetectTime": "2023-10-30T14:06:31.705421+02:00", "EventTime": "2023-10-30T14:06:31.705439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["C4ZV162zPgiwh8M4d1"]} -{"Format": "IDEA0", "ID": "ee12b93f-14f7-433d-b69b-b8ba87168d66", "DetectTime": "2023-10-30T14:06:31.733401+02:00", "EventTime": "2023-10-30T14:06:31.733412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CZLAop4QA9iuDA0Sv8"]} -{"Format": "IDEA0", "ID": "7dc16edd-3999-4f76-8c98-e7a472e75d76", "DetectTime": "2023-10-30T14:06:31.761897+02:00", "EventTime": "2023-10-30T14:06:31.761920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["Cgx9VJ2gnwfkOKscD7"]} -{"Format": "IDEA0", "ID": "b3b411b3-30bd-4236-85a9-6a0c37483277", "DetectTime": "2023-10-30T14:06:31.787731+02:00", "EventTime": "2023-10-30T14:06:31.787747+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"], "Hostname": ["157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.154.42.157 from 10.0.2.19. blacklisted IP AS: TELEFONICA_DE_ESPANA, ES AS3352 rDNS: 157.red-79-154-42.dynamicip.rima-tde.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CvpA5125CZzrPnxJO"]} -{"Format": "IDEA0", "ID": "84bc6e47-e456-4e9f-b720-2112ab71a82e", "DetectTime": "2023-10-30T14:06:31.808686+02:00", "EventTime": "2023-10-30T14:06:31.808702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CsuGDL3CbuC0kuIpA2"]} -{"Format": "IDEA0", "ID": "c5f9a4b9-1cbf-49ef-8525-c5c1fac2cd52", "DetectTime": "2023-10-30T14:06:31.836981+02:00", "EventTime": "2023-10-30T14:06:31.836996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CUhiT4122SaA2GVI43"]} -{"Format": "IDEA0", "ID": "13680d0a-df24-4509-8071-a9c1a013d081", "DetectTime": "2023-10-30T14:06:31.868676+02:00", "EventTime": "2023-10-30T14:06:31.868697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.253.243 ", "ContentType": "text/plain"}], "uids": ["CTPOof1hnLKXD3j7h4"]} -{"Format": "IDEA0", "ID": "5e09eb2a-3c80-4898-a1c1-af0aa43f8734", "DetectTime": "2023-10-30T14:06:31.898450+02:00", "EventTime": "2023-10-30T14:06:31.898471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CN6bKf3MPGDFC0szg4"]} -{"Format": "IDEA0", "ID": "48365b43-107a-4777-b64a-71f60e9bcc68", "DetectTime": "2023-10-30T14:06:31.996476+02:00", "EventTime": "2023-10-30T14:06:31.996495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["ChRg8D1Ju7KMk819jl"]} -{"Format": "IDEA0", "ID": "059ce458-d1dd-4607-b1eb-85751d4f4f8c", "DetectTime": "2023-10-30T14:06:32.027581+02:00", "EventTime": "2023-10-30T14:06:32.027598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C5iiLWpo82JrcFqXh"]} -{"Format": "IDEA0", "ID": "77e917ae-23d4-43dc-8123-94d85bd6956e", "DetectTime": "2023-10-30T14:06:32.056669+02:00", "EventTime": "2023-10-30T14:06:32.056690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CO3PQ32JlkQ7nFqSdc"]} -{"Format": "IDEA0", "ID": "73090c41-c664-4014-98f4-6828b65c5721", "DetectTime": "2023-10-30T14:06:32.089942+02:00", "EventTime": "2023-10-30T14:06:32.089963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["COJWqd3NJFK9tElvAd"]} -{"Format": "IDEA0", "ID": "25770f88-5a7c-446a-9f62-18572789fd4d", "DetectTime": "2023-10-30T14:06:32.117241+02:00", "EventTime": "2023-10-30T14:06:32.117257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C5PJZk2St1yv7bkU7c"]} -{"Format": "IDEA0", "ID": "a8d77319-a277-4fac-8c96-9ab2a1dd8dd7", "DetectTime": "2023-10-30T14:06:32.148173+02:00", "EventTime": "2023-10-30T14:06:32.148190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C3tY2Z3QE4mjGG0zO2"]} -{"Format": "IDEA0", "ID": "0ec02a6b-3150-4141-81ad-d7b44cd25c39", "DetectTime": "2023-10-30T14:06:32.178487+02:00", "EventTime": "2023-10-30T14:06:32.178504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CWov4pKBph4l7ycw8"]} -{"Format": "IDEA0", "ID": "681de233-a030-43b5-a47d-0e624445e448", "DetectTime": "2023-10-30T14:06:32.209775+02:00", "EventTime": "2023-10-30T14:06:32.209803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["C33Two3CkTSB04i3mg"]} -{"Format": "IDEA0", "ID": "6015c9db-7dc1-4090-aa12-4ad9a41aed1b", "DetectTime": "2023-10-30T14:06:32.240372+02:00", "EventTime": "2023-10-30T14:06:32.240388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["C4762347zVpjamfbDc"]} -{"Format": "IDEA0", "ID": "69a050dc-df8b-4a77-b14c-18f3a70810a0", "DetectTime": "2023-10-30T14:06:32.270827+02:00", "EventTime": "2023-10-30T14:06:32.270844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CzwrxU13JQVJGVKirc"]} -{"Format": "IDEA0", "ID": "3011b514-4e21-4e70-8b91-bdb18df11a04", "DetectTime": "2023-10-30T14:06:32.300611+02:00", "EventTime": "2023-10-30T14:06:32.300627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CpxBEH1XzAjJxIuTUb"]} -{"Format": "IDEA0", "ID": "f13f224a-e7eb-46be-90a4-ea646e5781f3", "DetectTime": "2023-10-30T14:06:32.327293+02:00", "EventTime": "2023-10-30T14:06:32.327308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CwQsTC2GxLuAs2nN73"]} -{"Format": "IDEA0", "ID": "757613dd-30ec-4b8c-97c0-2588bc076d9c", "DetectTime": "2023-10-30T14:06:32.354366+02:00", "EventTime": "2023-10-30T14:06:32.354382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CBnQUm3bUJiEUrvzjc"]} -{"Format": "IDEA0", "ID": "aaee4320-7f7d-470a-b11e-fa04894ebfaa", "DetectTime": "2023-10-30T14:06:32.401407+02:00", "EventTime": "2023-10-30T14:06:32.401433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CqxetP1A3XPrdoIHo6"]} -{"Format": "IDEA0", "ID": "9fdb5214-b45e-44a5-9125-733d55a4dae6", "DetectTime": "2023-10-30T14:06:32.431613+02:00", "EventTime": "2023-10-30T14:06:32.431627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.51.19.187 ", "ContentType": "text/plain"}], "uids": ["CkJLVG1BLnYDxmHxVf"]} -{"Format": "IDEA0", "ID": "ffa152d5-fd80-4f0e-9c50-5116d6381cdc", "DetectTime": "2023-10-30T14:06:32.460230+02:00", "EventTime": "2023-10-30T14:06:32.460248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CN5YU34VekDMfGvkxb"]} -{"Format": "IDEA0", "ID": "b0d374a2-4698-44e0-a7ad-2472e37a8801", "DetectTime": "2023-10-30T14:06:32.492212+02:00", "EventTime": "2023-10-30T14:06:32.492233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CrWd242awf4MaAcAs7"]} -{"Format": "IDEA0", "ID": "74d32b31-6f36-4ceb-8a77-0e1c8d163587", "DetectTime": "2023-10-30T14:06:32.524213+02:00", "EventTime": "2023-10-30T14:06:32.524231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CySFrX1VQ7h07uLRj4"]} -{"Format": "IDEA0", "ID": "1f41ff8c-beb7-415c-b192-e48ed178e3c8", "DetectTime": "2023-10-30T14:06:32.552778+02:00", "EventTime": "2023-10-30T14:06:32.552795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CrH16F4Uy5VutDrDD5"]} -{"Format": "IDEA0", "ID": "5ff7159f-7d6d-4df4-b57d-a6829ba417e5", "DetectTime": "2023-10-30T14:06:32.582024+02:00", "EventTime": "2023-10-30T14:06:32.582049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["C1Raqi1bJczmUHRLfa"]} -{"Format": "IDEA0", "ID": "a8f67151-5b90-4c45-ac37-6bae905b330e", "DetectTime": "2023-10-30T14:06:32.612572+02:00", "EventTime": "2023-10-30T14:06:32.612589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CbyGmQDLYHB6Eru1"]} -{"Format": "IDEA0", "ID": "eb59ca68-ce0d-41d0-ad9d-4dbab1a16a98", "DetectTime": "2023-10-30T14:06:32.642939+02:00", "EventTime": "2023-10-30T14:06:32.642959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.247.65.143 ", "ContentType": "text/plain"}], "uids": ["CUP6f7lZHNKxUvAH3"]} -{"Format": "IDEA0", "ID": "a9e996d4-efe9-439e-88f1-c2ab34a4d2f8", "DetectTime": "2023-10-30T14:06:32.668470+02:00", "EventTime": "2023-10-30T14:06:32.668485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["ChiiFk4KFwmJgLba61"]} -{"Format": "IDEA0", "ID": "3f999db4-6074-418e-adb5-b59190cf1d7a", "DetectTime": "2023-10-30T14:06:32.698135+02:00", "EventTime": "2023-10-30T14:06:32.698151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.99.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.99.85 ", "ContentType": "text/plain"}], "uids": ["C61r9P1poTvTv9bwQg"]} -{"Format": "IDEA0", "ID": "5bf7790a-dcf3-4a30-b677-957984a49c45", "DetectTime": "2023-10-30T14:06:32.727645+02:00", "EventTime": "2023-10-30T14:06:32.727662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CAyr2n1aooTLvSl9Ci"]} -{"Format": "IDEA0", "ID": "b2323bd4-2c25-43c0-86fa-374e8aa0435e", "DetectTime": "2023-10-30T14:06:32.759754+02:00", "EventTime": "2023-10-30T14:06:32.759770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.70.205.195 ", "ContentType": "text/plain"}], "uids": ["Cd2hLIzmq24OhdzCa"]} -{"Format": "IDEA0", "ID": "bf433962-9715-4ba4-a68e-282288564592", "DetectTime": "2023-10-30T14:06:32.791029+02:00", "EventTime": "2023-10-30T14:06:32.791050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["C4xaBm1Av10bHiRGS4"]} -{"Format": "IDEA0", "ID": "e67c17a7-eec4-4192-a787-2e12f658cc8f", "DetectTime": "2023-10-30T14:06:32.820863+02:00", "EventTime": "2023-10-30T14:06:32.820883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CZVRyZ1w5W7NBbIfQd"]} -{"Format": "IDEA0", "ID": "0b0a2193-d555-4956-a05f-b3743316d965", "DetectTime": "2023-10-30T14:06:32.850824+02:00", "EventTime": "2023-10-30T14:06:32.850845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["C6b2BF29pqiXmxcDr1"]} -{"Format": "IDEA0", "ID": "7462fc0d-2bfd-4cc5-b84a-e9eb5860571c", "DetectTime": "2023-10-30T14:06:32.880075+02:00", "EventTime": "2023-10-30T14:06:32.880091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.223.169 ", "ContentType": "text/plain"}], "uids": ["CowJXKpfaw0ejvF6e"]} -{"Format": "IDEA0", "ID": "9ef0f205-ca50-4ae8-a846-57233099f47f", "DetectTime": "2023-10-30T14:06:32.908621+02:00", "EventTime": "2023-10-30T14:06:32.908637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CPxQGt34qG0kL38ztk"]} -{"Format": "IDEA0", "ID": "36bcba0c-9838-44e9-b412-d8ecf43c5443", "DetectTime": "2023-10-30T14:06:32.934951+02:00", "EventTime": "2023-10-30T14:06:32.934969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CqpTTa2N333hKg9Yu6"]} -{"Format": "IDEA0", "ID": "36c04535-2ea6-40d8-bfeb-893b4633ade2", "DetectTime": "2023-10-30T14:06:32.961448+02:00", "EventTime": "2023-10-30T14:06:32.961464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["Cwg6se41GgKf5FbrFi"]} -{"Format": "IDEA0", "ID": "1d83000d-461e-4d47-ac7d-9d239fd82fd4", "DetectTime": "2023-10-30T14:06:32.987959+02:00", "EventTime": "2023-10-30T14:06:32.987979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["ChTWj91C9sBdcAZ7Me"]} -{"Format": "IDEA0", "ID": "6a06011d-82f1-4aca-9f5d-0641f60401db", "DetectTime": "2023-10-30T14:06:33.019450+02:00", "EventTime": "2023-10-30T14:06:33.019472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C78a1mEaBketwZHf4"]} -{"Format": "IDEA0", "ID": "7c37a491-f752-472c-8edc-455867375c29", "DetectTime": "2023-10-30T14:06:33.050379+02:00", "EventTime": "2023-10-30T14:06:33.050397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CIL54RCI6sN7EQkI8"]} -{"Format": "IDEA0", "ID": "b653a9f0-7403-46bd-b9bd-b4a34835cb1d", "DetectTime": "2023-10-30T14:06:33.079632+02:00", "EventTime": "2023-10-30T14:06:33.079644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CcHFiiRMSBVgpmFRb"]} -{"Format": "IDEA0", "ID": "adfdff5c-a447-482c-bdd3-659271f1d7b1", "DetectTime": "2023-10-30T14:06:33.114104+02:00", "EventTime": "2023-10-30T14:06:33.114114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["Cgq31B3RdDeEC7xlK4"]} -{"Format": "IDEA0", "ID": "669b2743-ac35-4c5c-8c59-4ff255cb9913", "DetectTime": "2023-10-30T14:06:33.140033+02:00", "EventTime": "2023-10-30T14:06:33.140053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["Cl9rfp25Y7oySWwPZ2"]} -{"Format": "IDEA0", "ID": "117be622-c658-40b0-85fd-b0ee0d716b18", "DetectTime": "2023-10-30T14:06:33.164498+02:00", "EventTime": "2023-10-30T14:06:33.164510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CHmEoj1OUiANBvF5B1"]} -{"Format": "IDEA0", "ID": "e1960b5d-be6c-472a-b02e-befeaa44d11d", "DetectTime": "2023-10-30T14:06:33.188892+02:00", "EventTime": "2023-10-30T14:06:33.188908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C02e444VVyFyV1nQG"]} -{"Format": "IDEA0", "ID": "4e8add62-43ae-44bc-9946-65e1180c6a39", "DetectTime": "2023-10-30T14:06:33.218947+02:00", "EventTime": "2023-10-30T14:06:33.218965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.123.181.44 ", "ContentType": "text/plain"}], "uids": ["C1M5O42ybhC9ZoYjsk"]} -{"Format": "IDEA0", "ID": "50b3d7fc-a280-4aa9-984e-89f3a0856482", "DetectTime": "2023-10-30T14:06:33.246389+02:00", "EventTime": "2023-10-30T14:06:33.246402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CaoBFwDx0izRI9JVb"]} -{"Format": "IDEA0", "ID": "f3e074df-3add-4955-928a-9ae8358f17d2", "DetectTime": "2023-10-30T14:06:33.276880+02:00", "EventTime": "2023-10-30T14:06:33.276908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CZB6Yp3UEKA4WYUGZ1"]} -{"Format": "IDEA0", "ID": "f27ec53f-88ec-4832-b8db-fb6659b45830", "DetectTime": "2023-10-30T14:06:33.307056+02:00", "EventTime": "2023-10-30T14:06:33.307068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.215 ", "ContentType": "text/plain"}], "uids": ["CFxHmc1ErJ5XTCknA5"]} -{"Format": "IDEA0", "ID": "ca2ac1b0-d8c2-4272-bb00-5eb1274c98cf", "DetectTime": "2023-10-30T14:06:33.337141+02:00", "EventTime": "2023-10-30T14:06:33.337158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.99.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.188.99.85 ", "ContentType": "text/plain"}], "uids": ["CdbRZWEyJIIf82Gx7"]} -{"Format": "IDEA0", "ID": "bac3dd2e-876e-4188-913d-ead77abfafe0", "DetectTime": "2023-10-30T14:06:33.364664+02:00", "EventTime": "2023-10-30T14:06:33.364678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.51.19.187 ", "ContentType": "text/plain"}], "uids": ["CbZvWFpaj0bF1YuDk"]} -{"Format": "IDEA0", "ID": "cf779c59-7a63-4a20-bb74-f3c71d4a24b3", "DetectTime": "2023-10-30T14:06:33.395148+02:00", "EventTime": "2023-10-30T14:06:33.395165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CLCGE733BYACAuXua3"]} -{"Format": "IDEA0", "ID": "e569d15f-ff6f-445a-b820-8a1a37a9b916", "DetectTime": "2023-10-30T14:06:33.424119+02:00", "EventTime": "2023-10-30T14:06:33.424143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CfTSab1Ky3OG174Wye"]} -{"Format": "IDEA0", "ID": "43903ccd-fbed-4dd3-97d1-232e3da35690", "DetectTime": "2023-10-30T14:06:33.453901+02:00", "EventTime": "2023-10-30T14:06:33.453922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CfBJhy4XU1eqfqo0Rh"]} -{"Format": "IDEA0", "ID": "001a3309-bb6a-4ac1-9d06-5b54c5bd0ed0", "DetectTime": "2023-10-30T14:06:33.478522+02:00", "EventTime": "2023-10-30T14:06:33.478534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.253.243 ", "ContentType": "text/plain"}], "uids": ["Cqkh8dXuh32ZmnFT4"]} -{"Format": "IDEA0", "ID": "11614fa5-4117-4d3f-acc8-9fb83723aff3", "DetectTime": "2023-10-30T14:06:33.501291+02:00", "EventTime": "2023-10-30T14:06:33.501303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CgBOcT1BU9ftHuoRh2"]} -{"Format": "IDEA0", "ID": "46ac2c9c-fb61-4ed4-89a1-b0ef9f1fd6dd", "DetectTime": "2023-10-30T14:06:33.522841+02:00", "EventTime": "2023-10-30T14:06:33.522853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CMvHlc2TSUP6l8RXS"]} -{"Format": "IDEA0", "ID": "dff1d4d3-6292-4ef6-a243-8a0b192cf16d", "DetectTime": "2023-10-30T14:06:33.545911+02:00", "EventTime": "2023-10-30T14:06:33.545929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C22xwG4QLfOt0dA948"]} -{"Format": "IDEA0", "ID": "e2b7ddec-71a4-42dd-ae6f-4b98d5800548", "DetectTime": "2023-10-30T14:06:33.578114+02:00", "EventTime": "2023-10-30T14:06:33.578128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["C5YWe72CEJgVh6UTv9"]} -{"Format": "IDEA0", "ID": "9ff04d1e-ad62-4721-aa3b-da449a57c80e", "DetectTime": "2023-10-30T14:06:33.600574+02:00", "EventTime": "2023-10-30T14:06:33.600587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CRVPsrUjheRVfvfof"]} -{"Format": "IDEA0", "ID": "2c6ba2c6-db23-4a2c-a6e5-0d69c87955f4", "DetectTime": "2023-10-30T14:06:33.620467+02:00", "EventTime": "2023-10-30T14:06:33.620480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["C7NhZ73n2TIli1VDsb"]} -{"Format": "IDEA0", "ID": "0072bd18-dedb-45b1-a8c8-80275f16afba", "DetectTime": "2023-10-30T14:06:33.645953+02:00", "EventTime": "2023-10-30T14:06:33.645969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEJ16w2EMG1kxoGObc"]} -{"Format": "IDEA0", "ID": "8f10cb9f-a91d-4e0d-9234-8a1917838f29", "DetectTime": "2023-10-30T14:06:33.672029+02:00", "EventTime": "2023-10-30T14:06:33.672050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CofahRbRHXMWmebf9"]} -{"Format": "IDEA0", "ID": "f9f35be7-915f-426e-a368-15fb0dccf34d", "DetectTime": "2023-10-30T14:06:33.694399+02:00", "EventTime": "2023-10-30T14:06:33.694411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cx7FDh4EVK46nz4zZ2"]} -{"Format": "IDEA0", "ID": "0f67036a-26eb-4809-a705-1dc75dde2d33", "DetectTime": "2023-10-30T14:06:33.716051+02:00", "EventTime": "2023-10-30T14:06:33.716066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CZRvGl1TUphSiFg0S1"]} -{"Format": "IDEA0", "ID": "e28059d5-0605-4392-97e9-f148e30e7775", "DetectTime": "2023-10-30T14:06:33.736796+02:00", "EventTime": "2023-10-30T14:06:33.736812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CvqLCsIqJsmmZCvb"]} -{"Format": "IDEA0", "ID": "52be909f-a084-4d47-b7dd-faa6ff44f09e", "DetectTime": "2023-10-30T14:06:33.758350+02:00", "EventTime": "2023-10-30T14:06:33.758362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CdqZcZ2U2Kg4xfLdp7"]} -{"Format": "IDEA0", "ID": "5875896e-6f95-46b1-b54c-5edddb750194", "DetectTime": "2023-10-30T14:06:33.787011+02:00", "EventTime": "2023-10-30T14:06:33.787029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["CNIC6Q1i6shoRtM7Xj"]} -{"Format": "IDEA0", "ID": "d375f278-e29f-4ca0-aede-7c2da1157be7", "DetectTime": "2023-10-30T14:06:33.808540+02:00", "EventTime": "2023-10-30T14:06:33.808551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CsrI5l158ePmWiXis7"]} -{"Format": "IDEA0", "ID": "27cf8bc3-81db-485b-a097-be2b9811812b", "DetectTime": "2023-10-30T14:06:33.832185+02:00", "EventTime": "2023-10-30T14:06:33.832201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.70.205.195 ", "ContentType": "text/plain"}], "uids": ["CAX9XS1d1JhZbkiWH6"]} -{"Format": "IDEA0", "ID": "d54d4a06-c753-40d4-992f-d068c89c784b", "DetectTime": "2023-10-30T14:06:33.858517+02:00", "EventTime": "2023-10-30T14:06:33.858534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CfI8OY3w2ZXQ5tJ8ud"]} -{"Format": "IDEA0", "ID": "2a8593c5-d734-42c4-95e2-dd3bc1874b9c", "DetectTime": "2023-10-30T14:06:33.884001+02:00", "EventTime": "2023-10-30T14:06:33.884017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CPfBPJ1FlRmVsvwyx1"]} -{"Format": "IDEA0", "ID": "a3fa0d2c-da0b-441a-93d2-c1cc2e203548", "DetectTime": "2023-10-30T14:06:33.908069+02:00", "EventTime": "2023-10-30T14:06:33.908082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CDtToqeCP63zYTBf1"]} -{"Format": "IDEA0", "ID": "a3894963-fec8-4520-8235-5981d0dbe77d", "DetectTime": "2023-10-30T14:06:33.935946+02:00", "EventTime": "2023-10-30T14:06:33.935961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["C2TP0E44gw84vxAk0b"]} -{"Format": "IDEA0", "ID": "59aaf570-dcb4-4dc0-9ed4-bdfe16541789", "DetectTime": "2023-10-30T14:06:33.957426+02:00", "EventTime": "2023-10-30T14:06:33.957440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CW2Nuz2b5l52MfAw1b"]} -{"Format": "IDEA0", "ID": "54e82300-b04d-426c-b513-45ac5ebf642b", "DetectTime": "2023-10-30T14:06:33.988146+02:00", "EventTime": "2023-10-30T14:06:33.988162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["CI6JIY36EPKM5X9bFi"]} -{"Format": "IDEA0", "ID": "73b493b1-690b-480a-a4c9-1840d90e4a2e", "DetectTime": "2023-10-30T14:06:34.010159+02:00", "EventTime": "2023-10-30T14:06:34.010178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CvK8kdGa71vaLYS99"]} -{"Format": "IDEA0", "ID": "29cca06f-e4fc-4383-bf9d-1a5b7bb5872f", "DetectTime": "2023-10-30T14:06:34.035767+02:00", "EventTime": "2023-10-30T14:06:34.035788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CO12HZWkSBGFjIdWj"]} -{"Format": "IDEA0", "ID": "23296239-8cc1-46f6-a397-fc10aca192eb", "DetectTime": "2023-10-30T14:06:34.055550+02:00", "EventTime": "2023-10-30T14:06:34.055560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.247.65.143 ", "ContentType": "text/plain"}], "uids": ["CIZS6jdLu0pXmZt74"]} -{"Format": "IDEA0", "ID": "34226830-afe9-461e-bfce-c379d20606f4", "DetectTime": "2023-10-30T14:06:34.079008+02:00", "EventTime": "2023-10-30T14:06:34.079024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["C4GCdP1MRDtrsj4p77"]} -{"Format": "IDEA0", "ID": "f5f25cc3-edc9-45af-8270-06f9b519daba", "DetectTime": "2023-10-30T14:06:34.105753+02:00", "EventTime": "2023-10-30T14:06:34.105769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["C9EcycxX8nwiglwWl"]} -{"Format": "IDEA0", "ID": "4c61bcf2-cef1-465a-afad-0a9657e722b6", "DetectTime": "2023-10-30T14:06:34.131132+02:00", "EventTime": "2023-10-30T14:06:34.131144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["C48TVi4vozCkQMrpZ6"]} -{"Format": "IDEA0", "ID": "06631245-3e03-401e-916a-aa40fa6ac99f", "DetectTime": "2023-10-30T14:06:34.154091+02:00", "EventTime": "2023-10-30T14:06:34.154110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CGOfUS2DQUiIX2NEHb"]} -{"Format": "IDEA0", "ID": "ea95eebe-81c6-48b4-9820-3404ce264a5d", "DetectTime": "2023-10-30T14:06:34.176995+02:00", "EventTime": "2023-10-30T14:06:34.177009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CIeUO04YE1SNYyb91i"]} -{"Format": "IDEA0", "ID": "0d605c66-8d73-4f98-a88a-2778f00bd506", "DetectTime": "2023-10-30T14:06:34.202088+02:00", "EventTime": "2023-10-30T14:06:34.202107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CmNetD1wceoeUQyZUe"]} -{"Format": "IDEA0", "ID": "2519fa30-5cd3-4704-995c-3dde2865df58", "DetectTime": "2023-10-30T14:06:34.230917+02:00", "EventTime": "2023-10-30T14:06:34.231072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CHYTkJ3nT1hzCkLGt4"]} -{"Format": "IDEA0", "ID": "638b15d8-66c4-4e0a-9c13-b952d9b18fcf", "DetectTime": "2023-10-30T14:06:34.262857+02:00", "EventTime": "2023-10-30T14:06:34.262879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["Ccczej4yD9GqCNA3a7"]} -{"Format": "IDEA0", "ID": "a2cf1107-370f-4657-b169-06c3de70bf0f", "DetectTime": "2023-10-30T14:06:34.293921+02:00", "EventTime": "2023-10-30T14:06:34.293942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJc6gX1TOpVT4PMEOg"]} -{"Format": "IDEA0", "ID": "dc844398-0a42-43f1-a6a4-04001e280e5b", "DetectTime": "2023-10-30T14:06:34.319241+02:00", "EventTime": "2023-10-30T14:06:34.319258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["C90vzt4DR4EROrD8cl"]} -{"Format": "IDEA0", "ID": "df7a6604-1ac7-4f85-9ded-f4a40aea3fc5", "DetectTime": "2023-10-30T14:06:34.361598+02:00", "EventTime": "2023-10-30T14:06:34.361613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CpRdcr17iIU7PTTyGh"]} -{"Format": "IDEA0", "ID": "a0e2676b-9901-4d6e-8682-38525bbd554c", "DetectTime": "2023-10-30T14:06:34.391315+02:00", "EventTime": "2023-10-30T14:06:34.391332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C7kZn41iGq1pwRRRxi"]} -{"Format": "IDEA0", "ID": "1def7fdc-388f-425b-bc67-a6d7f62dd125", "DetectTime": "2023-10-30T14:06:34.416099+02:00", "EventTime": "2023-10-30T14:06:34.416111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CJstpy2FGbFFPEolr"]} -{"Format": "IDEA0", "ID": "d08d44d5-3d22-4314-a769-0b9d348ef519", "DetectTime": "2023-10-30T14:06:34.437299+02:00", "EventTime": "2023-10-30T14:06:34.437317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CjRylg3m8bFDgg1Xlb"]} -{"Format": "IDEA0", "ID": "229bd0a1-1ae0-4251-b619-c06ed7a97b3d", "DetectTime": "2023-10-30T14:06:34.463944+02:00", "EventTime": "2023-10-30T14:06:34.463962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.247.65.143 ", "ContentType": "text/plain"}], "uids": ["CF7BwVzuQ6Txo7B95"]} -{"Format": "IDEA0", "ID": "e58260bc-3fe5-44bb-b6dc-829298d548af", "DetectTime": "2023-10-30T14:06:34.492197+02:00", "EventTime": "2023-10-30T14:06:34.492213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.223.169 ", "ContentType": "text/plain"}], "uids": ["CG5nPa4XxiTbsVmzrj"]} -{"Format": "IDEA0", "ID": "433d90f6-6daf-42d4-ac20-02d82f1a95a6", "DetectTime": "2023-10-30T14:06:34.517374+02:00", "EventTime": "2023-10-30T14:06:34.517391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CybCCy1UC3aIX01iM1"]} -{"Format": "IDEA0", "ID": "fad7f16e-fc17-47d2-b554-22cf48b57cb3", "DetectTime": "2023-10-30T14:06:34.547217+02:00", "EventTime": "2023-10-30T14:06:34.547237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.239.253.243 ", "ContentType": "text/plain"}], "uids": ["C8FsSm1ecX3ifjTik5"]} -{"Format": "IDEA0", "ID": "b800d49b-a95f-4640-80ed-2211e39fa7e1", "DetectTime": "2023-10-30T14:06:34.571888+02:00", "EventTime": "2023-10-30T14:06:34.571899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CvpgWB3nf78AYSTaak"]} -{"Format": "IDEA0", "ID": "60574db8-9a89-4c4e-bc01-6aa3b67f1f93", "DetectTime": "2023-10-30T14:06:34.592731+02:00", "EventTime": "2023-10-30T14:06:34.592743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.3.226.73 ", "ContentType": "text/plain"}], "uids": ["Co6Xvg4sz781G2iu3f"]} -{"Format": "IDEA0", "ID": "eaf9a3e0-97fb-47cc-961e-a2fbba3ae599", "DetectTime": "2023-10-30T14:06:34.615150+02:00", "EventTime": "2023-10-30T14:06:34.615161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CqBPfl1oCaNEIARsCb"]} -{"Format": "IDEA0", "ID": "c705f5da-9eab-4dfa-b4c8-0f1b7c5c3cb0", "DetectTime": "2023-10-30T14:06:34.634577+02:00", "EventTime": "2023-10-30T14:06:34.634592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["Ci1aV4jBy651Hrprl"]} -{"Format": "IDEA0", "ID": "9773153f-dfd8-4dd1-a579-f092b8a593d4", "DetectTime": "2023-10-30T14:06:34.662254+02:00", "EventTime": "2023-10-30T14:06:34.662272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CVSzn14eaI2vVSo0Cf"]} -{"Format": "IDEA0", "ID": "0ed84bbd-2676-4120-a792-daab9d1df3a1", "DetectTime": "2023-10-30T14:06:34.688668+02:00", "EventTime": "2023-10-30T14:06:34.688679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CxgTCS1Ci61QECzq18"]} -{"Format": "IDEA0", "ID": "80112f07-24f0-48ab-963f-04b10292c1c1", "DetectTime": "2023-10-30T14:06:34.714840+02:00", "EventTime": "2023-10-30T14:06:34.714853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CnVF6ItsVBoBnKC1a"]} -{"Format": "IDEA0", "ID": "b00ec595-8a73-44ec-bd02-21b76e6bb556", "DetectTime": "2023-10-30T14:06:34.735698+02:00", "EventTime": "2023-10-30T14:06:34.735711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CSuBZC4MFpETLPTEul"]} -{"Format": "IDEA0", "ID": "f65bc31b-4b15-4a6c-a47d-692bd31e4035", "DetectTime": "2023-10-30T14:06:34.759309+02:00", "EventTime": "2023-10-30T14:06:34.759321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CR4zWy1jcaTGGPst"]} -{"Format": "IDEA0", "ID": "f4d7c156-1d42-4edb-8d01-34bdbbdd73dd", "DetectTime": "2023-10-30T14:06:34.788679+02:00", "EventTime": "2023-10-30T14:06:34.788695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C5zC0VNM6ur8OIMd4"]} -{"Format": "IDEA0", "ID": "328083f2-eba0-491f-ba6c-148c37eb5d4b", "DetectTime": "2023-10-30T14:06:34.818045+02:00", "EventTime": "2023-10-30T14:06:34.818061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C4OHCZhpLpTZMB1Zf"]} -{"Format": "IDEA0", "ID": "6d605a8b-c875-4b8b-abdd-0075e496588c", "DetectTime": "2023-10-30T14:06:34.844150+02:00", "EventTime": "2023-10-30T14:06:34.844166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CAN7u2b2AkaFtV1ma"]} -{"Format": "IDEA0", "ID": "28218a3c-6ab5-40eb-a244-0dbd5d10bfff", "DetectTime": "2023-10-30T14:06:34.869354+02:00", "EventTime": "2023-10-30T14:06:34.869371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["COjDzk3gAd7taUiW65"]} -{"Format": "IDEA0", "ID": "018e4b55-7f9f-44fd-a881-16b138da230e", "DetectTime": "2023-10-30T14:06:34.891613+02:00", "EventTime": "2023-10-30T14:06:34.891629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CcrwI52rzkdGIXsUsj"]} -{"Format": "IDEA0", "ID": "f726c4c5-d300-4354-ae64-a630f4dccf65", "DetectTime": "2023-10-30T14:06:34.917983+02:00", "EventTime": "2023-10-30T14:06:34.918001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CtYjV748B1NxThmNcc"]} -{"Format": "IDEA0", "ID": "af806522-b75e-42eb-9f8a-c5dac7123dc1", "DetectTime": "2023-10-30T14:06:34.941230+02:00", "EventTime": "2023-10-30T14:06:34.941242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C6WlCb33QZWhB3XIId"]} -{"Format": "IDEA0", "ID": "8b7680ef-9a1f-4110-8556-3a286caffebb", "DetectTime": "2023-10-30T14:06:34.964264+02:00", "EventTime": "2023-10-30T14:06:34.964276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CJ9Q1jnyt2dUKVF64"]} -{"Format": "IDEA0", "ID": "4a98431a-138d-4464-aa54-4748ecbe476c", "DetectTime": "2023-10-30T14:06:34.998720+02:00", "EventTime": "2023-10-30T14:06:34.998736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CJctKe1K4LMfhyfYni"]} -{"Format": "IDEA0", "ID": "d81f9394-ba49-43d1-ae1d-f9fef0a5eec1", "DetectTime": "2023-10-30T14:06:35.028716+02:00", "EventTime": "2023-10-30T14:06:35.028727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["CQ2jWD3NME9srkGaF8"]} -{"Format": "IDEA0", "ID": "92ad0034-58a2-4c55-999c-609ecf8108af", "DetectTime": "2023-10-30T14:06:35.049131+02:00", "EventTime": "2023-10-30T14:06:35.049142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CRktRarjUwvL0GKCc"]} -{"Format": "IDEA0", "ID": "df0a7d55-9af1-41b4-927b-be5846fc9f61", "DetectTime": "2023-10-30T14:06:35.070285+02:00", "EventTime": "2023-10-30T14:06:35.070297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CmNYLK3FBunacErwUl"]} -{"Format": "IDEA0", "ID": "6b3cfb68-24c1-401d-bb55-53bed090297e", "DetectTime": "2023-10-30T14:06:35.098124+02:00", "EventTime": "2023-10-30T14:06:35.098144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["Csg3Rz04cZycafDYc"]} -{"Format": "IDEA0", "ID": "5d7c4261-c7f7-48a0-8f45-4d3376af9b67", "DetectTime": "2023-10-30T14:06:35.126127+02:00", "EventTime": "2023-10-30T14:06:35.126143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["ChidnG2RVP7ek4KeWc"]} -{"Format": "IDEA0", "ID": "58d9d180-0304-4329-8e51-10532713fa07", "DetectTime": "2023-10-30T14:06:35.151895+02:00", "EventTime": "2023-10-30T14:06:35.151907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CFVEpL25nhdcJ9x521"]} -{"Format": "IDEA0", "ID": "98a6902e-d29c-40b4-86a4-5878a55b5eb7", "DetectTime": "2023-10-30T14:06:35.176463+02:00", "EventTime": "2023-10-30T14:06:35.176474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CJ3p2g217w91UYOOnd"]} -{"Format": "IDEA0", "ID": "8416fafd-dd70-4302-80d6-3138f32f7cdf", "DetectTime": "2023-10-30T14:06:35.198620+02:00", "EventTime": "2023-10-30T14:06:35.198636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CyC8GE2IMBel2tvPn8"]} -{"Format": "IDEA0", "ID": "1e1a10fc-b465-46d6-8aa2-8349dea5a0a6", "DetectTime": "2023-10-30T14:06:35.223814+02:00", "EventTime": "2023-10-30T14:06:35.223831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CYedkt2epqvjeQUgd9"]} -{"Format": "IDEA0", "ID": "7839f1cf-4911-429a-9625-1f51e3f66048", "DetectTime": "2023-10-30T14:06:35.248125+02:00", "EventTime": "2023-10-30T14:06:35.248145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CY5bHE8radEIgM95"]} -{"Format": "IDEA0", "ID": "6d3a11c2-0c2a-4a12-9061-7922a44fe1cd", "DetectTime": "2023-10-30T14:06:35.270603+02:00", "EventTime": "2023-10-30T14:06:35.270621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CROGsP2dOkTOV4eAah"]} -{"Format": "IDEA0", "ID": "ec05736a-e23c-4384-a9ee-d2bfb4b6fb2d", "DetectTime": "2023-10-30T14:06:35.300319+02:00", "EventTime": "2023-10-30T14:06:35.300329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.70.205.195 ", "ContentType": "text/plain"}], "uids": ["C8hlPn49g3Wc9R76Y1"]} -{"Format": "IDEA0", "ID": "351dfd1d-6713-4e89-bc34-3cc7d6f24e4b", "DetectTime": "2023-10-30T14:06:35.324572+02:00", "EventTime": "2023-10-30T14:06:35.324590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["CMrMdk2rlXv7No8Aj2"]} -{"Format": "IDEA0", "ID": "0f7838ec-ebc1-47ca-b0af-260cc6acfe4c", "DetectTime": "2023-10-30T14:06:35.344684+02:00", "EventTime": "2023-10-30T14:06:35.344694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["C7rgYQ1v6OphLMWTve"]} -{"Format": "IDEA0", "ID": "2a678dd8-b0f9-48f4-814f-9ebaf942c58d", "DetectTime": "2023-10-30T14:06:35.363311+02:00", "EventTime": "2023-10-30T14:06:35.363323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.223.169 ", "ContentType": "text/plain"}], "uids": ["CffK5H9GMTsm6E15e"]} -{"Format": "IDEA0", "ID": "b8dc846b-5b03-4346-a2cc-440672722d5e", "DetectTime": "2023-10-30T14:06:35.388842+02:00", "EventTime": "2023-10-30T14:06:35.388853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["C2zwp01QLx8jAjNDyg"]} -{"Format": "IDEA0", "ID": "87eca52f-c793-46b4-8c83-e96087dafa1f", "DetectTime": "2023-10-30T14:06:35.410456+02:00", "EventTime": "2023-10-30T14:06:35.410472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CNsdgB3PVagzqxX7ci"]} -{"Format": "IDEA0", "ID": "0ecbc691-d8a5-4def-a67a-f616311fe95b", "DetectTime": "2023-10-30T14:06:35.440941+02:00", "EventTime": "2023-10-30T14:06:35.440963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CSICMWXpz4jKtXwnj"]} -{"Format": "IDEA0", "ID": "aa9e8f48-6d72-4e72-b248-059f9210512f", "DetectTime": "2023-10-30T14:06:35.471344+02:00", "EventTime": "2023-10-30T14:06:35.471363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["Cg1rqM3QOncKTwAmma"]} -{"Format": "IDEA0", "ID": "056e97bb-75cb-46a2-b012-168901fe58e9", "DetectTime": "2023-10-30T14:06:35.501537+02:00", "EventTime": "2023-10-30T14:06:35.501556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["ChUDDH2bBnBKkqQuof"]} -{"Format": "IDEA0", "ID": "630b3f27-20f2-4e91-a51e-1ce360a44c4c", "DetectTime": "2023-10-30T14:06:35.524378+02:00", "EventTime": "2023-10-30T14:06:35.524392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.161.223.169 ", "ContentType": "text/plain"}], "uids": ["Cm1iRk2n3BCSZhtq99"]} -{"Format": "IDEA0", "ID": "50eecb4d-0e7a-4215-9180-fb74b58dc2b6", "DetectTime": "2023-10-30T14:06:35.544593+02:00", "EventTime": "2023-10-30T14:06:35.544610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C6CfK734d4I1gcUdi8"]} -{"Format": "IDEA0", "ID": "08b7ef39-4b4c-4405-a61a-ef36b48241ba", "DetectTime": "2023-10-30T14:06:35.569196+02:00", "EventTime": "2023-10-30T14:06:35.569207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C25pOc1SD31aDpK913"]} -{"Format": "IDEA0", "ID": "f180c677-5575-4036-8688-22f6744d01bd", "DetectTime": "2023-10-30T14:06:35.594678+02:00", "EventTime": "2023-10-30T14:06:35.594691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["C8fVFY1Ikrjf0VCBu7"]} -{"Format": "IDEA0", "ID": "ad2f2366-8aa6-4385-98f8-f6dc0df0f100", "DetectTime": "2023-10-30T14:06:35.611637+02:00", "EventTime": "2023-10-30T14:06:35.611649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CPydgm3GgiZojirKff"]} -{"Format": "IDEA0", "ID": "806b634c-63bf-441b-b3f0-6ce6bae211c7", "DetectTime": "2023-10-30T14:06:35.628607+02:00", "EventTime": "2023-10-30T14:06:35.628626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CK4TmH1qsgkzXZJpe3"]} -{"Format": "IDEA0", "ID": "b72430cc-8b20-4982-b7d7-3916c046d33b", "DetectTime": "2023-10-30T14:06:35.651901+02:00", "EventTime": "2023-10-30T14:06:35.651917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["ClgTAK124x7McA6fbb"]} -{"Format": "IDEA0", "ID": "f85b8a53-8d87-4bb4-bf74-0946f4d0f1e3", "DetectTime": "2023-10-30T14:06:35.673275+02:00", "EventTime": "2023-10-30T14:06:35.673289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.70.205.195 ", "ContentType": "text/plain"}], "uids": ["Ciyg0b4pSaiVqJzWJ"]} -{"Format": "IDEA0", "ID": "1d4366a2-f3a7-4543-b660-29e4ad57903a", "DetectTime": "2023-10-30T14:06:35.692078+02:00", "EventTime": "2023-10-30T14:06:35.692089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cd1Oxo2dHNDrjcMyEf"]} -{"Format": "IDEA0", "ID": "ed094c73-7079-4730-82ef-ca781dc5e5b6", "DetectTime": "2023-10-30T14:06:35.715624+02:00", "EventTime": "2023-10-30T14:06:35.715641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CTI4ZXzQRx4YZsnp5"]} -{"Format": "IDEA0", "ID": "c58c1b46-bba3-4270-96e6-85dcb73fdb91", "DetectTime": "2023-10-30T14:06:35.736505+02:00", "EventTime": "2023-10-30T14:06:35.736523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CNgQWh3CbRz8CIAOI2"]} -{"Format": "IDEA0", "ID": "4688c1ac-ce81-4657-a7f9-669829aa4b53", "DetectTime": "2023-10-30T14:06:35.756574+02:00", "EventTime": "2023-10-30T14:06:35.756591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CUrCl94lERG8wHS3J3"]} -{"Format": "IDEA0", "ID": "9df172aa-4399-44dd-b29b-10373cca4d79", "DetectTime": "2023-10-30T14:06:35.778517+02:00", "EventTime": "2023-10-30T14:06:35.778533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CWX8Le3thwjLDvhwla"]} -{"Format": "IDEA0", "ID": "8eefea5f-84eb-42cd-8a78-f458e475c610", "DetectTime": "2023-10-30T14:06:35.799711+02:00", "EventTime": "2023-10-30T14:06:35.799726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwkKR84BofFyzzUbT2"]} -{"Format": "IDEA0", "ID": "b023cdb0-5d62-476b-ae02-14ed61454fc1", "DetectTime": "2023-10-30T14:06:35.819159+02:00", "EventTime": "2023-10-30T14:06:35.819172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CsF4ib3v31KdLhNZve"]} -{"Format": "IDEA0", "ID": "1fc55716-1683-4c50-af60-d98f52207f50", "DetectTime": "2023-10-30T14:06:35.838977+02:00", "EventTime": "2023-10-30T14:06:35.838995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CxL5C04Bhb14iKtrY5"]} -{"Format": "IDEA0", "ID": "428badda-d5ea-40c8-8c9b-54ee14e9b4f4", "DetectTime": "2023-10-30T14:06:35.865609+02:00", "EventTime": "2023-10-30T14:06:35.865620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["Cur7xu1EETWhTtUJm7"]} -{"Format": "IDEA0", "ID": "ff10ab13-d15c-4d43-8eb2-435b41c724b2", "DetectTime": "2023-10-30T14:06:35.894222+02:00", "EventTime": "2023-10-30T14:06:35.894239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cdj7Fp4OWXWVDlWfdb"]} -{"Format": "IDEA0", "ID": "12d3f596-4383-4c37-8fdd-85d3c48f3186", "DetectTime": "2023-10-30T14:06:35.917964+02:00", "EventTime": "2023-10-30T14:06:35.917985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CGD9O54ZWNduOdw45d"]} -{"Format": "IDEA0", "ID": "2268bc05-e989-459f-a7bb-4d2bdf03a1d9", "DetectTime": "2023-10-30T14:06:35.938602+02:00", "EventTime": "2023-10-30T14:06:35.938619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CvWF553PzaZZAWsfEj"]} -{"Format": "IDEA0", "ID": "af2a20cb-3202-442d-b5e8-eab5f7705087", "DetectTime": "2023-10-30T14:06:35.963080+02:00", "EventTime": "2023-10-30T14:06:35.963096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CJcpr1uYFoc3Bxiac"]} -{"Format": "IDEA0", "ID": "74e535f2-b3f7-4413-b169-f0c4e9ef8d18", "DetectTime": "2023-10-30T14:06:35.996023+02:00", "EventTime": "2023-10-30T14:06:35.996036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CbWOnB1W1KXzTBO60f"]} -{"Format": "IDEA0", "ID": "b632233a-7529-4fb0-ba5e-50813b9def5f", "DetectTime": "2023-10-30T14:06:36.019250+02:00", "EventTime": "2023-10-30T14:06:36.019270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["C7rJ4S25LMhLU6wiFi"]} -{"Format": "IDEA0", "ID": "758c90dc-2b29-4452-b53d-b42d60d8d3f2", "DetectTime": "2023-10-30T14:06:36.042409+02:00", "EventTime": "2023-10-30T14:06:36.042421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["CVqDoB3QDiWvWDxgwk"]} -{"Format": "IDEA0", "ID": "23529c91-16ee-4271-80eb-9039ab122ce4", "DetectTime": "2023-10-30T14:06:36.064155+02:00", "EventTime": "2023-10-30T14:06:36.064167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CBeHtd4Ev99tpsXpIb"]} -{"Format": "IDEA0", "ID": "2a3d8360-db49-4ad6-abfd-1516cb07c155", "DetectTime": "2023-10-30T14:06:36.108303+02:00", "EventTime": "2023-10-30T14:06:36.108317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["CWUJIi3awTosk4CCil"]} -{"Format": "IDEA0", "ID": "3a96ec57-faef-4f6a-af97-8aa0bd52e874", "DetectTime": "2023-10-30T14:06:36.130276+02:00", "EventTime": "2023-10-30T14:06:36.130294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CDrBXS1asCF3xrfHN3"]} -{"Format": "IDEA0", "ID": "844a035c-5036-4fb5-98da-858549b686ee", "DetectTime": "2023-10-30T14:06:36.158923+02:00", "EventTime": "2023-10-30T14:06:36.158941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CpHcWV3P1Q47sd5NU6"]} -{"Format": "IDEA0", "ID": "7f61cb5d-ee88-42f1-9659-b058aec65313", "DetectTime": "2023-10-30T14:06:36.182545+02:00", "EventTime": "2023-10-30T14:06:36.182567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ch2LT34XqKUUgWCs6i"]} -{"Format": "IDEA0", "ID": "dc36260b-1b0d-440a-993d-f000d962b517", "DetectTime": "2023-10-30T14:06:36.202538+02:00", "EventTime": "2023-10-30T14:06:36.202554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["ChQ3O53R9KNy3Nu9z6"]} -{"Format": "IDEA0", "ID": "96a75056-0f92-4a59-97b1-8ae7b3752b25", "DetectTime": "2023-10-30T14:06:36.219927+02:00", "EventTime": "2023-10-30T14:06:36.219939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CFIrhu2WbmMRz04NEk"]} -{"Format": "IDEA0", "ID": "bd3de5b3-94b1-4946-a860-682154b01a6f", "DetectTime": "2023-10-30T14:06:36.240693+02:00", "EventTime": "2023-10-30T14:06:36.240707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CAOObG11OZnDx7XPZ6"]} -{"Format": "IDEA0", "ID": "4a778f72-119b-47b0-8f69-fa790f4b5283", "DetectTime": "2023-10-30T14:06:36.262774+02:00", "EventTime": "2023-10-30T14:06:36.262837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["C7Hlif1tIacwbvps5g"]} -{"Format": "IDEA0", "ID": "b822794b-d7f6-4dc3-86b5-15831ea2ca48", "DetectTime": "2023-10-30T14:06:36.284097+02:00", "EventTime": "2023-10-30T14:06:36.284109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["C2YOpS26CTAxK78Gmd"]} -{"Format": "IDEA0", "ID": "e859210a-684e-4ca3-96fc-0f1bfe656223", "DetectTime": "2023-10-30T14:06:36.301418+02:00", "EventTime": "2023-10-30T14:06:36.301434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C1YFK82P0dvis5KGfk"]} -{"Format": "IDEA0", "ID": "8274b403-148a-4491-a439-71ca7794e1c5", "DetectTime": "2023-10-30T14:06:36.321434+02:00", "EventTime": "2023-10-30T14:06:36.321446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CAVbnZ1emEKIHthUc"]} -{"Format": "IDEA0", "ID": "b6609d72-8adc-4a7d-ad7b-dfce7f4c83bd", "DetectTime": "2023-10-30T14:06:36.342834+02:00", "EventTime": "2023-10-30T14:06:36.342854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CiPodn2NcbnjV5p5Ei"]} -{"Format": "IDEA0", "ID": "37182fdd-adf1-4c20-acae-8ee1a2955815", "DetectTime": "2023-10-30T14:06:36.363350+02:00", "EventTime": "2023-10-30T14:06:36.363366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["Cg1aPo2k0rrL9RTxSj"]} -{"Format": "IDEA0", "ID": "1b7387fc-ecf0-459d-ba4a-6c7f6b30a557", "DetectTime": "2023-10-30T14:06:36.387364+02:00", "EventTime": "2023-10-30T14:06:36.387380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CS4BXG292HmjhGOlmg"]} -{"Format": "IDEA0", "ID": "96021a0f-ea88-45b9-b8d9-b58e078bcfe4", "DetectTime": "2023-10-30T14:06:36.404654+02:00", "EventTime": "2023-10-30T14:06:36.404670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["C17q3pw5Zw5TJEYVa"]} -{"Format": "IDEA0", "ID": "7bb8b3d9-e248-4505-899e-dc0e00b13fcb", "DetectTime": "2023-10-30T14:06:36.426458+02:00", "EventTime": "2023-10-30T14:06:36.426476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CdGpJj2Envb2vr36g2"]} -{"Format": "IDEA0", "ID": "53c8a7c4-3bec-445e-8fb5-f6735cb79498", "DetectTime": "2023-10-30T14:06:36.445692+02:00", "EventTime": "2023-10-30T14:06:36.445710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["Cr0lGPgExA5Hl7Tua"]} -{"Format": "IDEA0", "ID": "b94b5135-324a-4660-865a-448d386ed32e", "DetectTime": "2023-10-30T14:06:36.464403+02:00", "EventTime": "2023-10-30T14:06:36.464420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CurBZR3BSbhGiFYEvf"]} -{"Format": "IDEA0", "ID": "12d32cdc-a558-4dbb-83b5-fb9b96aac3d8", "DetectTime": "2023-10-30T14:06:36.484215+02:00", "EventTime": "2023-10-30T14:06:36.484227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["CRABAy36n54keiURxl"]} -{"Format": "IDEA0", "ID": "bb4f06f2-0ea5-4f31-9ea7-570103596d3a", "DetectTime": "2023-10-30T14:06:36.502569+02:00", "EventTime": "2023-10-30T14:06:36.502581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CKSmWcOZbRJ2MYIV4"]} -{"Format": "IDEA0", "ID": "a60ceaf3-c43a-4c8d-94cc-76730680a2a5", "DetectTime": "2023-10-30T14:06:36.521356+02:00", "EventTime": "2023-10-30T14:06:36.521372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CM05Pg1XF0cas0atx6"]} -{"Format": "IDEA0", "ID": "3fb9a254-6759-424a-9131-6723bdeac61b", "DetectTime": "2023-10-30T14:06:36.541562+02:00", "EventTime": "2023-10-30T14:06:36.541579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CoFgRt3pzO1X6SLxWc"]} -{"Format": "IDEA0", "ID": "1eec42da-21ef-46cc-8264-a449fdd2f88d", "DetectTime": "2023-10-30T14:06:36.560941+02:00", "EventTime": "2023-10-30T14:06:36.560952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CX2PS83w0Vt0VJjUO8"]} -{"Format": "IDEA0", "ID": "5edd2820-f5cb-4e07-93a4-07e3362a748f", "DetectTime": "2023-10-30T14:06:36.577177+02:00", "EventTime": "2023-10-30T14:06:36.577187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.18.183.173 ", "ContentType": "text/plain"}], "uids": ["Ci5kZc3UaHbkNzHtXd"]} -{"Format": "IDEA0", "ID": "43349089-2a64-46ae-a5b1-661796042304", "DetectTime": "2023-10-30T14:06:36.592651+02:00", "EventTime": "2023-10-30T14:06:36.592662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["COuTJr1nrBcZl5utC5"]} -{"Format": "IDEA0", "ID": "a4dfe99a-df28-4875-b251-0f8c9a22fd56", "DetectTime": "2023-10-30T14:06:36.609403+02:00", "EventTime": "2023-10-30T14:06:36.609424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["Ck5lqI22dvydJCiSoe"]} -{"Format": "IDEA0", "ID": "a03b0217-718b-4406-8b5e-60821956505d", "DetectTime": "2023-10-30T14:06:36.630748+02:00", "EventTime": "2023-10-30T14:06:36.630770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CAL21x1KaVTH5SACti"]} -{"Format": "IDEA0", "ID": "7d958a0b-8dc4-4234-a389-33af71b3acbd", "DetectTime": "2023-10-30T14:06:36.649212+02:00", "EventTime": "2023-10-30T14:06:36.649223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["C3T57s49SfZxu7K3q9"]} -{"Format": "IDEA0", "ID": "620e3d6d-2654-47b3-970c-f50b8a276afb", "DetectTime": "2023-10-30T14:06:36.669944+02:00", "EventTime": "2023-10-30T14:06:36.669965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CYjCxn39UYv09Hh9g7"]} -{"Format": "IDEA0", "ID": "9852cb9e-1f32-436d-be1f-bce5d74acad7", "DetectTime": "2023-10-30T14:06:36.694313+02:00", "EventTime": "2023-10-30T14:06:36.694335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CS9LBy4tkxarbheW3h"]} -{"Format": "IDEA0", "ID": "cf889b87-0e2d-4114-b252-d27dc74c8ad8", "DetectTime": "2023-10-30T14:06:36.718456+02:00", "EventTime": "2023-10-30T14:06:36.718478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CgGXdL1cpIVTgYlgO8"]} -{"Format": "IDEA0", "ID": "e9b1ceed-3c2e-4485-ae17-438b408b7583", "DetectTime": "2023-10-30T14:06:36.741785+02:00", "EventTime": "2023-10-30T14:06:36.741801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["Cs4DvI12BPTHDVIzKa"]} -{"Format": "IDEA0", "ID": "3578a015-ff41-4844-b25c-d4a6f14fd600", "DetectTime": "2023-10-30T14:06:36.761330+02:00", "EventTime": "2023-10-30T14:06:36.761341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cxvfp41a6iE9Nsx3Ff"]} -{"Format": "IDEA0", "ID": "016a670d-8b2c-4279-991e-50a3b3c6af43", "DetectTime": "2023-10-30T14:06:36.779421+02:00", "EventTime": "2023-10-30T14:06:36.779434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C25gs81e1elBR5tpP3"]} -{"Format": "IDEA0", "ID": "2d21edcf-795c-4011-a5e9-7bc24f46cd13", "DetectTime": "2023-10-30T14:06:36.798719+02:00", "EventTime": "2023-10-30T14:06:36.798735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CnPMZWvLLewtHRtC5"]} -{"Format": "IDEA0", "ID": "d340fad4-9bb5-4992-acf6-183bae27617e", "DetectTime": "2023-10-30T14:06:36.820740+02:00", "EventTime": "2023-10-30T14:06:36.820756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CqOpz81IjzhKKzJFV3"]} -{"Format": "IDEA0", "ID": "3b058b84-ac0b-475e-a2b1-6a033e73fe80", "DetectTime": "2023-10-30T14:06:36.841246+02:00", "EventTime": "2023-10-30T14:06:36.841262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["C9KRrM1xpP2xOn1iqe"]} -{"Format": "IDEA0", "ID": "f92e06bc-93b3-49b8-8d4f-3039933c7bb4", "DetectTime": "2023-10-30T14:06:36.863147+02:00", "EventTime": "2023-10-30T14:06:36.863159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.73.185.159 ", "ContentType": "text/plain"}], "uids": ["Ca7lkd1FXDNZKfGzTi"]} -{"Format": "IDEA0", "ID": "710e0e4a-f895-4dd6-aed8-ae4f0cea165a", "DetectTime": "2023-10-30T14:06:36.883615+02:00", "EventTime": "2023-10-30T14:06:36.883631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CUTqsJF6E0RlA6FE"]} -{"Format": "IDEA0", "ID": "15be9edf-3354-4d37-8ada-5441b30c05d4", "DetectTime": "2023-10-30T14:06:36.905201+02:00", "EventTime": "2023-10-30T14:06:36.905218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CuDneD4BAJibxJ8za8"]} -{"Format": "IDEA0", "ID": "a4e7605a-31ce-441a-bb60-6b428313126d", "DetectTime": "2023-10-30T14:06:36.944222+02:00", "EventTime": "2023-10-30T14:06:36.944234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CW4Cuk8stpzvJhYX9"]} -{"Format": "IDEA0", "ID": "60c7844a-bedd-441f-8775-9dde6e26c473", "DetectTime": "2023-10-30T14:06:36.965091+02:00", "EventTime": "2023-10-30T14:06:36.965107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CTltbY10bK2KlYy7S"]} -{"Format": "IDEA0", "ID": "c05e5f7b-4612-4aa2-86bc-09769faaaf56", "DetectTime": "2023-10-30T14:06:36.989902+02:00", "EventTime": "2023-10-30T14:06:36.989925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CKUqa74MYgernnM5sk"]} -{"Format": "IDEA0", "ID": "9178c0f1-c30c-46cd-a977-e29dee52d602", "DetectTime": "2023-10-30T14:06:37.012125+02:00", "EventTime": "2023-10-30T14:06:37.012136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cp46e33yOWunrnrjbi"]} -{"Format": "IDEA0", "ID": "a0d728d6-ee70-4ead-96cb-9dca4c006ca4", "DetectTime": "2023-10-30T14:06:37.030855+02:00", "EventTime": "2023-10-30T14:06:37.030872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C9O6WpibzwIvkT6m5"]} -{"Format": "IDEA0", "ID": "b639c97b-9ea1-446a-b7de-280ebbf03e92", "DetectTime": "2023-10-30T14:06:37.052823+02:00", "EventTime": "2023-10-30T14:06:37.052849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CJTOALmzyppYnhh56"]} -{"Format": "IDEA0", "ID": "f08c3a96-ee87-46d8-bade-348e4c2079c8", "DetectTime": "2023-10-30T14:06:37.072009+02:00", "EventTime": "2023-10-30T14:06:37.072026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CwCeOn37RXYITdHi94"]} -{"Format": "IDEA0", "ID": "72a299b8-b45f-4b0e-bf46-2eb0fe26e2ed", "DetectTime": "2023-10-30T14:06:37.091695+02:00", "EventTime": "2023-10-30T14:06:37.091707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["CJWb3r1vS1EhVB1fDh"]} -{"Format": "IDEA0", "ID": "1b476837-01f0-4156-8503-c97c6c46b6d7", "DetectTime": "2023-10-30T14:06:37.113744+02:00", "EventTime": "2023-10-30T14:06:37.113760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["C8DKze2y1WPtvtDLMi"]} -{"Format": "IDEA0", "ID": "7bef233e-5783-4a60-9ba2-1cbb85f46897", "DetectTime": "2023-10-30T14:06:37.136607+02:00", "EventTime": "2023-10-30T14:06:37.136626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CISU4M2EKmHeqpuRq3"]} -{"Format": "IDEA0", "ID": "e7404dfe-1d80-4887-a657-01d8a1c1c600", "DetectTime": "2023-10-30T14:06:37.161658+02:00", "EventTime": "2023-10-30T14:06:37.161678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CyVLzVt7Arf2Xj496"]} -{"Format": "IDEA0", "ID": "cba04816-4f31-4f89-860b-36be5d885ab4", "DetectTime": "2023-10-30T14:06:37.183239+02:00", "EventTime": "2023-10-30T14:06:37.183255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["C5DqwI1aKLkdki6oW8"]} -{"Format": "IDEA0", "ID": "0b51a63e-e5e4-44d9-b55a-99957cd967fd", "DetectTime": "2023-10-30T14:06:37.204168+02:00", "EventTime": "2023-10-30T14:06:37.204179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CKoxby1Cvq94qNutNk"]} -{"Format": "IDEA0", "ID": "c17dc33a-f184-4992-9610-2fd788087005", "DetectTime": "2023-10-30T14:06:37.222604+02:00", "EventTime": "2023-10-30T14:06:37.222620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CEHqAu3TfBCNNEq8fk"]} -{"Format": "IDEA0", "ID": "12e71556-c553-4940-8308-365530eddd59", "DetectTime": "2023-10-30T14:06:37.247060+02:00", "EventTime": "2023-10-30T14:06:37.247076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CRwCrY1urYlvZCXtLk"]} -{"Format": "IDEA0", "ID": "0e6968db-a390-4194-8365-6a35259d2c2e", "DetectTime": "2023-10-30T14:06:37.269992+02:00", "EventTime": "2023-10-30T14:06:37.270007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["CgabaP7FXZvMqFIHc"]} -{"Format": "IDEA0", "ID": "7e1d3c46-0045-4685-bc9d-5dbf8c0fc729", "DetectTime": "2023-10-30T14:06:37.291573+02:00", "EventTime": "2023-10-30T14:06:37.291593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CXAjAL2eqc62UQABTf"]} -{"Format": "IDEA0", "ID": "27fb448c-5526-451a-8bf4-58556d744584", "DetectTime": "2023-10-30T14:06:37.309718+02:00", "EventTime": "2023-10-30T14:06:37.309733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CuKtXo4DSRAXLDM4n4"]} -{"Format": "IDEA0", "ID": "f03db46d-5fbd-4668-959d-3bcc95c9a78d", "DetectTime": "2023-10-30T14:06:37.330111+02:00", "EventTime": "2023-10-30T14:06:37.330127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["Cfj2J32XqY36U9iUY1"]} -{"Format": "IDEA0", "ID": "c0cb1fb7-b4d5-4353-aaa3-1f052a72c49d", "DetectTime": "2023-10-30T14:06:37.352406+02:00", "EventTime": "2023-10-30T14:06:37.352423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CFxhb137yacGKQFzQ2"]} -{"Format": "IDEA0", "ID": "62ed983b-b78d-401c-a602-611c0c0dd333", "DetectTime": "2023-10-30T14:06:37.372610+02:00", "EventTime": "2023-10-30T14:06:37.372621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["CcwrT34o0A50KtBvcg"]} -{"Format": "Json", "ID": "62ed983b-b78d-401c-a602-611c0c0dd333", "DetectTime": "2023-10-30T14:06:37.372610+02:00", "EventTime": "2023-10-30T14:06:37.372621+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:24:34.037207+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:37.445491)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f226c4de-5b96-4b46-956b-e44714864c30", "DetectTime": "2023-10-30T14:06:37.451233+02:00", "EventTime": "2023-10-30T14:06:37.451253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CwM9ez1iih2CqbDPX"]} -{"Format": "IDEA0", "ID": "f763a1df-2347-4a61-b272-ce4fda342fe4", "DetectTime": "2023-10-30T14:06:37.474522+02:00", "EventTime": "2023-10-30T14:06:37.474533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CpnZubhWJei0gb2M1"]} -{"Format": "IDEA0", "ID": "24909829-7576-44f2-8c1c-a5e1196a1310", "DetectTime": "2023-10-30T14:06:37.510570+02:00", "EventTime": "2023-10-30T14:06:37.510592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["C3uHpr2SjSmtfXHLb4"]} -{"Format": "IDEA0", "ID": "8fadc173-54a6-4e04-99a0-56e11889fd17", "DetectTime": "2023-10-30T14:06:37.546473+02:00", "EventTime": "2023-10-30T14:06:37.546490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CICv5t2hNlBkKa0Bk3"]} -{"Format": "IDEA0", "ID": "2aa3ce60-987d-475a-a19b-9d8fe14d846f", "DetectTime": "2023-10-30T14:06:37.586159+02:00", "EventTime": "2023-10-30T14:06:37.586179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CI2VXp3W6KYn2cGGjc"]} -{"Format": "IDEA0", "ID": "5c3cb091-9419-4bbc-b8b6-22305a5e906d", "DetectTime": "2023-10-30T14:06:37.625591+02:00", "EventTime": "2023-10-30T14:06:37.625612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8396], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. ", "ContentType": "text/plain"}], "uids": ["CFHCuI73OzkIAGh28"]} -{"Format": "IDEA0", "ID": "0fcd9e0d-4814-440f-b617-733522355bff", "DetectTime": "2023-10-30T14:06:37.655710+02:00", "EventTime": "2023-10-30T14:06:37.655729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15074], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. ", "ContentType": "text/plain"}], "uids": ["Cm7FXb45w7solRzotj"]} -{"Format": "IDEA0", "ID": "7d73b382-f623-4935-b184-5e7eb38c6cdc", "DetectTime": "2023-10-30T14:06:37.683251+02:00", "EventTime": "2023-10-30T14:06:37.683262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CU6i75XABQOwlrpJi"]} -{"Format": "IDEA0", "ID": "8bf77cd9-f3d4-4dd7-898d-9de207a7e552", "DetectTime": "2023-10-30T14:06:37.701122+02:00", "EventTime": "2023-10-30T14:06:37.701133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["Cc2f5q5BkwhBzms5d"]} -{"Format": "IDEA0", "ID": "440adcbf-60be-4cd9-9e0a-1b599914ffc9", "DetectTime": "2023-10-30T14:06:37.732396+02:00", "EventTime": "2023-10-30T14:06:37.732407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C6Y0rn4u3hZMkV1bx3"]} -{"Format": "Json", "ID": "440adcbf-60be-4cd9-9e0a-1b599914ffc9", "DetectTime": "2023-10-30T14:06:37.732396+02:00", "EventTime": "2023-10-30T14:06:37.732407+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:24:36.462078+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:37.797870)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a6f880f0-97d1-4f0c-ac0f-d371a12b07a5", "DetectTime": "2023-10-30T14:06:37.802450+02:00", "EventTime": "2023-10-30T14:06:37.802469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["Cwi4LPBW1t8YINBa2"]} -{"Format": "IDEA0", "ID": "066a73ba-a25a-4fda-81f9-7494fa0a001b", "DetectTime": "2023-10-30T14:06:37.832363+02:00", "EventTime": "2023-10-30T14:06:37.832374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CuFUGp45s5m7e84OK2"]} -{"Format": "IDEA0", "ID": "a1c85c18-b7c9-46e1-8cd8-a533a2c60185", "DetectTime": "2023-10-30T14:06:37.858448+02:00", "EventTime": "2023-10-30T14:06:37.858459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CS4iyP2uY2ENnXIoye"]} -{"Format": "IDEA0", "ID": "14127c07-85df-44ed-bba5-4fe887713868", "DetectTime": "2023-10-30T14:06:37.889730+02:00", "EventTime": "2023-10-30T14:06:37.889740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CpFrO5rUohvavqJzg"]} -{"Format": "IDEA0", "ID": "e58881b1-0aac-485b-95bf-354b6c94de6d", "DetectTime": "2023-10-30T14:06:37.915740+02:00", "EventTime": "2023-10-30T14:06:37.915752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CKNfHs22wJ34GjgwKa"]} -{"Format": "IDEA0", "ID": "baec2b8e-c765-4d87-a836-91c3f439bd97", "DetectTime": "2023-10-30T14:06:37.943075+02:00", "EventTime": "2023-10-30T14:06:37.943088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CKhsZV3d4Gpp9y0IBe"]} -{"Format": "IDEA0", "ID": "5e285f6f-5569-49d7-bdd8-026a25c9262b", "DetectTime": "2023-10-30T14:06:37.978295+02:00", "EventTime": "2023-10-30T14:06:37.978307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CrwdF24pciKUYynMm3"]} -{"Format": "IDEA0", "ID": "8db4e4ba-9dd5-41ef-ba00-834b7ac7103b", "DetectTime": "2023-10-30T14:06:38.014335+02:00", "EventTime": "2023-10-30T14:06:38.014355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CUw4mQ1udYt54wTdAh"]} -{"Format": "IDEA0", "ID": "a57a47e5-885c-4ca0-8918-16ab978fe358", "DetectTime": "2023-10-30T14:06:38.050811+02:00", "EventTime": "2023-10-30T14:06:38.050828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["Cp5rpA1p0ntftNlVPc"]} -{"Format": "IDEA0", "ID": "853f3516-3fab-4be4-a4d8-8340ceb1bc45", "DetectTime": "2023-10-30T14:06:38.086479+02:00", "EventTime": "2023-10-30T14:06:38.086501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CBhVrR1XIOgsdbhrF6"]} -{"Format": "IDEA0", "ID": "f98a33ae-2b23-4888-81f8-3abbdac2d89c", "DetectTime": "2023-10-30T14:06:38.118951+02:00", "EventTime": "2023-10-30T14:06:38.118968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CUOlyp7PKOzHvQfXi"]} -{"Format": "IDEA0", "ID": "db9e99a0-4bc7-43c8-a9a4-2855b188b877", "DetectTime": "2023-10-30T14:06:38.151222+02:00", "EventTime": "2023-10-30T14:06:38.151240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CJ2lZ511NRQW3a3b1g"]} -{"Format": "IDEA0", "ID": "7c3b8982-b39f-44ea-8355-14b4deff1da6", "DetectTime": "2023-10-30T14:06:38.181307+02:00", "EventTime": "2023-10-30T14:06:38.181324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C0xQhv2ir4pSTAROij"]} -{"Format": "IDEA0", "ID": "5ccd86bf-fd6a-4788-bd75-f06d5cff6a6e", "DetectTime": "2023-10-30T14:06:38.212153+02:00", "EventTime": "2023-10-30T14:06:38.212169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["C1ByMM15F2SFuFHiw4"]} -{"Format": "Json", "ID": "5ccd86bf-fd6a-4788-bd75-f06d5cff6a6e", "DetectTime": "2023-10-30T14:06:38.212153+02:00", "EventTime": "2023-10-30T14:06:38.212169+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:56:01.105763+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:38.283313)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4392d35b-aaf0-4c3a-9024-907559a05638", "DetectTime": "2023-10-30T14:06:38.288695+02:00", "EventTime": "2023-10-30T14:06:38.288713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C2rfXa1JLJflSX9Dcj"]} -{"Format": "IDEA0", "ID": "691aafc2-78c3-4e2f-8720-517a3cfffcc3", "DetectTime": "2023-10-30T14:06:38.323006+02:00", "EventTime": "2023-10-30T14:06:38.323019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CvFboS1gjsuXbZX3kh"]} -{"Format": "IDEA0", "ID": "8526358e-ac4d-46b4-a3b0-5f0cfbe81e70", "DetectTime": "2023-10-30T14:06:38.351555+02:00", "EventTime": "2023-10-30T14:06:38.351571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CmBY3W3VMsNatGRub4"]} -{"Format": "IDEA0", "ID": "e1cbe80f-09a9-40e7-8a6c-ed038fa2a36a", "DetectTime": "2023-10-30T14:06:38.374263+02:00", "EventTime": "2023-10-30T14:06:38.374274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C9KmoQ3NZontMVlLgg"]} -{"Format": "IDEA0", "ID": "2403dac9-2c78-437f-ae2e-58a3c5fd7d11", "DetectTime": "2023-10-30T14:06:38.403704+02:00", "EventTime": "2023-10-30T14:06:38.403721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXwjMt4a8wZ2b2JCd5"]} -{"Format": "IDEA0", "ID": "6466b2a5-67d8-400d-adae-a1a95738a80d", "DetectTime": "2023-10-30T14:06:38.433873+02:00", "EventTime": "2023-10-30T14:06:38.433885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CNBwwa4w9prLzFLDYl"]} -{"Format": "IDEA0", "ID": "2c1811be-e7fb-4434-8dd4-39a16aa7406b", "DetectTime": "2023-10-30T14:06:38.458658+02:00", "EventTime": "2023-10-30T14:06:38.458669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["Clpval2Jul0x75rGZh"]} -{"Format": "IDEA0", "ID": "e0f58050-29a4-4885-bfb7-226ce082c44b", "DetectTime": "2023-10-30T14:06:38.483465+02:00", "EventTime": "2023-10-30T14:06:38.483477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CM2jE52cFkS6OjuwL5"]} -{"Format": "IDEA0", "ID": "41828cf4-b8ff-4749-a908-f8ad2248b2db", "DetectTime": "2023-10-30T14:06:38.511390+02:00", "EventTime": "2023-10-30T14:06:38.511402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["Cyfdal2gXyStdiAF0b"]} -{"Format": "IDEA0", "ID": "6b3aa889-289e-4d22-96c0-a4c69d641920", "DetectTime": "2023-10-30T14:06:38.538018+02:00", "EventTime": "2023-10-30T14:06:38.538032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CSD0Kz12B8eahdPch6"]} -{"Format": "Json", "ID": "6b3aa889-289e-4d22-96c0-a4c69d641920", "DetectTime": "2023-10-30T14:06:38.538018+02:00", "EventTime": "2023-10-30T14:06:38.538032+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:56:02.714579+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:38.594973)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f40c92db-69a8-41f7-a7f6-c9f1a1389406", "DetectTime": "2023-10-30T14:06:38.598926+02:00", "EventTime": "2023-10-30T14:06:38.598939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CKAyRY29sBKJAr3IBd"]} -{"Format": "IDEA0", "ID": "0498ef4e-2a63-4076-bb5d-52d2dc480dcf", "DetectTime": "2023-10-30T14:06:38.630008+02:00", "EventTime": "2023-10-30T14:06:38.630024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C80wk23hjIMX4ddUff"]} -{"Format": "IDEA0", "ID": "02fa1d5f-f3da-4b83-a789-477bf61db846", "DetectTime": "2023-10-30T14:06:38.662845+02:00", "EventTime": "2023-10-30T14:06:38.662857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CpiX1IcOETP3QxbPh"]} -{"Format": "IDEA0", "ID": "ed678c90-4bf9-4bb9-a02a-5fdf60d5f067", "DetectTime": "2023-10-30T14:06:38.692665+02:00", "EventTime": "2023-10-30T14:06:38.692683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CsNbNcYQhn9HsC3n1"]} -{"Format": "IDEA0", "ID": "80fb1db7-7c93-4a9b-bd60-01eb47838406", "DetectTime": "2023-10-30T14:06:38.725864+02:00", "EventTime": "2023-10-30T14:06:38.725884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["C17Ce53ejdbeRZFrg5"]} -{"Format": "IDEA0", "ID": "26893c37-230e-42bc-b20d-c5d72b43dae6", "DetectTime": "2023-10-30T14:06:38.757782+02:00", "EventTime": "2023-10-30T14:06:38.757797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CztCgRQtV8epa0d32"]} -{"Format": "IDEA0", "ID": "60b426c9-891e-486d-a53a-0e5bbf89f1a2", "DetectTime": "2023-10-30T14:06:38.788293+02:00", "EventTime": "2023-10-30T14:06:38.788306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CjCRocnsPk89BUt53"]} -{"Format": "IDEA0", "ID": "8d25268e-89cf-4657-a6c5-0271845eff89", "DetectTime": "2023-10-30T14:06:38.814944+02:00", "EventTime": "2023-10-30T14:06:38.814961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CoqAMi4qwF24AGSTX1"]} -{"Format": "IDEA0", "ID": "d85a2c1b-bc42-459d-a42e-67a3f4910f94", "DetectTime": "2023-10-30T14:06:38.845869+02:00", "EventTime": "2023-10-30T14:06:38.845882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["Cd77TaS0k9UQzAFD8"]} -{"Format": "IDEA0", "ID": "c3f89a6a-7c1b-4f4f-88e9-6a77f39b8ea9", "DetectTime": "2023-10-30T14:06:38.873393+02:00", "EventTime": "2023-10-30T14:06:38.873406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CphgtU1qN8MjVACzZf"]} -{"Format": "Json", "ID": "c3f89a6a-7c1b-4f4f-88e9-6a77f39b8ea9", "DetectTime": "2023-10-30T14:06:38.873393+02:00", "EventTime": "2023-10-30T14:06:38.873406+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:56:04.698649+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:38.927893)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "484b5a06-cbec-4408-9338-d10f0ffbf093", "DetectTime": "2023-10-30T14:06:38.931945+02:00", "EventTime": "2023-10-30T14:06:38.931956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKLYS01jN194R3Weaj"]} -{"Format": "IDEA0", "ID": "df5663c1-ac7f-42da-928c-7db210c098cc", "DetectTime": "2023-10-30T14:06:38.958603+02:00", "EventTime": "2023-10-30T14:06:38.958614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CgpMjd1TdtDMLjxes"]} -{"Format": "IDEA0", "ID": "76ff1628-3905-4ff9-94fc-3abcd5e1d916", "DetectTime": "2023-10-30T14:06:38.987005+02:00", "EventTime": "2023-10-30T14:06:38.987026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CgGxSb217lnPtLNNG4"]} -{"Format": "IDEA0", "ID": "648e44a4-6831-4e16-808c-d37eb48042e3", "DetectTime": "2023-10-30T14:06:39.013484+02:00", "EventTime": "2023-10-30T14:06:39.013502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CVXAsK1UhTSvDdIy5f"]} -{"Format": "IDEA0", "ID": "1a159559-1c87-4022-a0fa-f6db137300bc", "DetectTime": "2023-10-30T14:06:39.038018+02:00", "EventTime": "2023-10-30T14:06:39.038030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CCs3yNXNCJNzLB685"]} -{"Format": "IDEA0", "ID": "a099040a-c297-4ace-9840-d2a3539a5556", "DetectTime": "2023-10-30T14:06:39.062589+02:00", "EventTime": "2023-10-30T14:06:39.062604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Cc8n8h2BLuHhUzWCY6"]} -{"Format": "IDEA0", "ID": "e05bb064-a28e-4bdf-bb0d-60098b221d3b", "DetectTime": "2023-10-30T14:06:39.092385+02:00", "EventTime": "2023-10-30T14:06:39.092407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CT0oye2owwJJMt7Gdd"]} -{"Format": "IDEA0", "ID": "4342fcb0-d19b-45ba-870d-879dca003db1", "DetectTime": "2023-10-30T14:06:39.122459+02:00", "EventTime": "2023-10-30T14:06:39.122473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CtbnMb2LH08lW8wVt6"]} -{"Format": "IDEA0", "ID": "3c02cb9e-058b-4468-a868-d24e15dcd911", "DetectTime": "2023-10-30T14:06:39.150176+02:00", "EventTime": "2023-10-30T14:06:39.150196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CgIvWT30bJ718dPmOd"]} -{"Format": "Json", "ID": "3c02cb9e-058b-4468-a868-d24e15dcd911", "DetectTime": "2023-10-30T14:06:39.150176+02:00", "EventTime": "2023-10-30T14:06:39.150196+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T21:56:41.847827+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2023/10/30 14:06:39.211834)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "79812436-99b0-442f-bdd9-c71f7eae153c", "DetectTime": "2023-10-30T14:06:39.217407+02:00", "EventTime": "2023-10-30T14:06:39.217423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cd1oor3kUR1L4UU9T7"]} -{"Format": "IDEA0", "ID": "bf50f89f-4dd7-4ba1-8b1e-fc3e109bbd56", "DetectTime": "2023-10-30T14:06:39.249371+02:00", "EventTime": "2023-10-30T14:06:39.249382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CKCMZZ2ndzgMEfvdSj"]} -{"Format": "IDEA0", "ID": "e0adf61d-2cf4-4276-9ab4-170fdccdb181", "DetectTime": "2023-10-30T14:06:39.285662+02:00", "EventTime": "2023-10-30T14:06:39.285689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CuH2rw3bewCt42PYq7"]} -{"Format": "IDEA0", "ID": "ba1f2762-91ff-44eb-8cca-5ed79869cd77", "DetectTime": "2023-10-30T14:06:39.318288+02:00", "EventTime": "2023-10-30T14:06:39.318306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C6js1o1ws7S6ShIina"]} -{"Format": "IDEA0", "ID": "3d986296-951f-452c-8ba5-1c8682e01508", "DetectTime": "2023-10-30T14:06:39.354213+02:00", "EventTime": "2023-10-30T14:06:39.354230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CYzyW74LoxLKbqblF4"]} -{"Format": "IDEA0", "ID": "a4180ffe-faae-4a50-b174-9488852588e4", "DetectTime": "2023-10-30T14:06:39.386592+02:00", "EventTime": "2023-10-30T14:06:39.386611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13453], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. ", "ContentType": "text/plain"}], "uids": ["CBNgYV3ukwZBbcO1h6"]} -{"Format": "IDEA0", "ID": "fd0f8efb-d9cb-45bc-a618-c28c8e32a599", "DetectTime": "2023-10-30T14:06:39.415545+02:00", "EventTime": "2023-10-30T14:06:39.415563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CpWZgC4npPvTKf45Hf"]} -{"Format": "Json", "ID": "fd0f8efb-d9cb-45bc-a618-c28c8e32a599", "DetectTime": "2023-10-30T14:06:39.415545+02:00", "EventTime": "2023-10-30T14:06:39.415563+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T22:28:15.052937+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 93. (real time 2023/10/30 14:06:39.504997)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7ac5a7b1-f6c1-4ae3-b35b-96a258a70243", "DetectTime": "2023-10-30T14:06:39.509326+02:00", "EventTime": "2023-10-30T14:06:39.509338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CZsCtx3L036bdJwQu5"]} -{"Format": "IDEA0", "ID": "e2ebe9c7-bc98-4597-b594-0770d2e8431c", "DetectTime": "2023-10-30T14:06:39.540175+02:00", "EventTime": "2023-10-30T14:06:39.540194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CEhpjg1DZ6Tspls2J7"]} -{"Format": "IDEA0", "ID": "abff54f7-034c-4562-84a4-26c7943123af", "DetectTime": "2023-10-30T14:06:39.561348+02:00", "EventTime": "2023-10-30T14:06:39.561360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CGC5WG2JtCUFA7IZga"]} -{"Format": "IDEA0", "ID": "3f5e1aff-f54c-4f2d-9082-27258b5175af", "DetectTime": "2023-10-30T14:06:39.588915+02:00", "EventTime": "2023-10-30T14:06:39.588935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C26AsA2EVDTajNKkwf"]} -{"Format": "IDEA0", "ID": "72b9870e-21ea-4f5e-ab69-68c37064beff", "DetectTime": "2023-10-30T14:06:39.618848+02:00", "EventTime": "2023-10-30T14:06:39.618871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cky0pR3ZT3H6j2mGO7"]} -{"Format": "IDEA0", "ID": "a652f279-1f69-4048-b32c-c1bd681079d3", "DetectTime": "2023-10-30T14:06:39.648815+02:00", "EventTime": "2023-10-30T14:06:39.648827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["Cr3vFA2lbsO638hdv6"]} -{"Format": "IDEA0", "ID": "4825cb95-e579-4fdf-bc8f-9be88aebca2f", "DetectTime": "2023-10-30T14:06:39.672202+02:00", "EventTime": "2023-10-30T14:06:39.672218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CRlw3WeAHlkuOj8F8"]} -{"Format": "IDEA0", "ID": "c39e2f16-03e0-4b76-af24-702c3e8fbf35", "DetectTime": "2023-10-30T14:06:39.698770+02:00", "EventTime": "2023-10-30T14:06:39.698802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CKu3s93ZPOzbSbqT6k"]} -{"Format": "IDEA0", "ID": "a7f2a577-6970-4393-83ac-f79632cffccd", "DetectTime": "2023-10-30T14:06:39.724239+02:00", "EventTime": "2023-10-30T14:06:39.724257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CGiyHu1Flo8YbGb676"]} -{"Format": "Json", "ID": "a7f2a577-6970-4393-83ac-f79632cffccd", "DetectTime": "2023-10-30T14:06:39.724239+02:00", "EventTime": "2023-10-30T14:06:39.724257+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T22:28:16.539744+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 93. (real time 2023/10/30 14:06:39.790311)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e13f45a-604c-4121-8a35-ea064893c6c4", "DetectTime": "2023-10-30T14:06:39.795669+02:00", "EventTime": "2023-10-30T14:06:39.795685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cq82Ok2OnyI8nqWfOc"]} -{"Format": "IDEA0", "ID": "e5c59a03-bc10-4a62-a0c1-e425f1ff3845", "DetectTime": "2023-10-30T14:06:39.818510+02:00", "EventTime": "2023-10-30T14:06:39.818528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CeCiyW117d3LLGbFV5"]} -{"Format": "IDEA0", "ID": "8d3469ca-5a45-4fa9-87aa-1e9ceca8fecd", "DetectTime": "2023-10-30T14:06:39.839719+02:00", "EventTime": "2023-10-30T14:06:39.839736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["Csg4L32oYjJMbOZxEf"]} -{"Format": "IDEA0", "ID": "0684b821-49df-4a14-a0f3-68cafd9238e4", "DetectTime": "2023-10-30T14:06:39.864316+02:00", "EventTime": "2023-10-30T14:06:39.864334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["ClHuVQKh9F3krW2j9"]} -{"Format": "IDEA0", "ID": "fcd31a30-8e23-4c78-860e-8c03168c3677", "DetectTime": "2023-10-30T14:06:39.888651+02:00", "EventTime": "2023-10-30T14:06:39.888667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CZ2oV21IrZ9lIovLDg"]} -{"Format": "IDEA0", "ID": "d59859db-f7c7-44cb-ad6a-1bec4f1918d5", "DetectTime": "2023-10-30T14:06:39.906625+02:00", "EventTime": "2023-10-30T14:06:39.906635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. ", "ContentType": "text/plain"}], "uids": ["CVT27d4ZWn30mL3k9h"]} -{"Format": "IDEA0", "ID": "8a7ee7b8-31fa-4f43-8141-92b49bc5f697", "DetectTime": "2023-10-30T14:06:39.926642+02:00", "EventTime": "2023-10-30T14:06:39.926655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CneoV444hXZ3jFeTT5"]} -{"Format": "IDEA0", "ID": "c43bb120-d9e6-4fae-9597-d5630537a32c", "DetectTime": "2023-10-30T14:06:39.952781+02:00", "EventTime": "2023-10-30T14:06:39.952798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C13TRO29jJCfeQxZU5"]} -{"Format": "Json", "ID": "c43bb120-d9e6-4fae-9597-d5630537a32c", "DetectTime": "2023-10-30T14:06:39.952781+02:00", "EventTime": "2023-10-30T14:06:39.952798+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T22:28:18.619429+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 93. (real time 2023/10/30 14:06:40.011119)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "74a729cf-d38d-4a0d-b033-60745327847e", "DetectTime": "2023-10-30T14:06:40.015522+02:00", "EventTime": "2023-10-30T14:06:40.015537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CdQaCu11HqbJusPP7d"]} -{"Format": "IDEA0", "ID": "21fe7469-ab4a-4149-9730-3d1f2ab2950a", "DetectTime": "2023-10-30T14:06:40.034988+02:00", "EventTime": "2023-10-30T14:06:40.035000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CScyCW1OpXs2sRWzk2"]} -{"Format": "IDEA0", "ID": "7d70e77b-f33c-4ea7-9f6b-0bcf1c948750", "DetectTime": "2023-10-30T14:06:40.058168+02:00", "EventTime": "2023-10-30T14:06:40.058187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CYClOGU5bilrsGu9c"]} -{"Format": "IDEA0", "ID": "5fc1ff8c-63a4-4e89-b2d5-1fd25aeed7c9", "DetectTime": "2023-10-30T14:06:40.083274+02:00", "EventTime": "2023-10-30T14:06:40.083290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C9OlsI1mR6kKeyVxi6"]} -{"Format": "IDEA0", "ID": "7fe76a7b-8a0b-413b-bfea-c295bd45e873", "DetectTime": "2023-10-30T14:06:40.101778+02:00", "EventTime": "2023-10-30T14:06:40.101790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["Ca59ns3rDMYbyfLdhl"]} -{"Format": "IDEA0", "ID": "201e160e-64fc-414a-b0f0-109435296d27", "DetectTime": "2023-10-30T14:06:40.121368+02:00", "EventTime": "2023-10-30T14:06:40.121386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["C0qMgNLqgjuTRCIC2"]} -{"Format": "IDEA0", "ID": "7905bc59-d6d4-4759-b838-dae13eb2c2ef", "DetectTime": "2023-10-30T14:06:40.143121+02:00", "EventTime": "2023-10-30T14:06:40.143133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C226vR3i3PAWpWvWh7"]} -{"Format": "IDEA0", "ID": "a474fce6-3e52-4ad7-8d11-e704ff9d88d9", "DetectTime": "2023-10-30T14:06:40.162550+02:00", "EventTime": "2023-10-30T14:06:40.162567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Cv5Bsf2euext1aN4cc"]} -{"Format": "Json", "ID": "a474fce6-3e52-4ad7-8d11-e704ff9d88d9", "DetectTime": "2023-10-30T14:06:40.162550+02:00", "EventTime": "2023-10-30T14:06:40.162567+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T22:59:35.078923+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 93. (real time 2023/10/30 14:06:40.214493)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1c8b41ce-8b21-40f7-9f02-3254fd6fe68c", "DetectTime": "2023-10-30T14:06:40.218818+02:00", "EventTime": "2023-10-30T14:06:40.218830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CyCNK81q9Qgp3UX765"]} -{"Format": "IDEA0", "ID": "713c5c3d-cccb-4f5b-818a-06b3bdb3fe40", "DetectTime": "2023-10-30T14:06:40.241712+02:00", "EventTime": "2023-10-30T14:06:40.241724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["C3DiHoOIaqVSeKkh2"]} -{"Format": "IDEA0", "ID": "4081916b-c45e-4aa5-a038-b882454365fb", "DetectTime": "2023-10-30T14:06:40.257711+02:00", "EventTime": "2023-10-30T14:06:40.257725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CilyPv2chsbwBaiqJ1"]} -{"Format": "IDEA0", "ID": "e9b1f883-34ac-4fe8-96c5-01dc3e84472f", "DetectTime": "2023-10-30T14:06:40.275267+02:00", "EventTime": "2023-10-30T14:06:40.275283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIWb9e27R8wSzgwRPb"]} -{"Format": "IDEA0", "ID": "280d82c5-4f6b-4aae-8736-0209176b81fd", "DetectTime": "2023-10-30T14:06:40.295943+02:00", "EventTime": "2023-10-30T14:06:40.295954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["Cgoo18p34YbwVtpN"]} -{"Format": "IDEA0", "ID": "ca2f95b9-6803-401b-b996-1320aa64403f", "DetectTime": "2023-10-30T14:06:40.315126+02:00", "EventTime": "2023-10-30T14:06:40.315146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["ClR7L4g6ONmhoA1bc"]} -{"Format": "IDEA0", "ID": "33bafb90-b918-464b-b4aa-0a95b3fb5bd6", "DetectTime": "2023-10-30T14:06:40.338939+02:00", "EventTime": "2023-10-30T14:06:40.338956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C6zbX88NMkKFzEZW5"]} -{"Format": "IDEA0", "ID": "5d916121-5e79-45e4-9e61-65660c62741a", "DetectTime": "2023-10-30T14:06:40.373441+02:00", "EventTime": "2023-10-30T14:06:40.373456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CYdy2i1uqjId2lCSFd"]} -{"Format": "IDEA0", "ID": "1ff35761-8011-48a2-804e-f82e94cffd14", "DetectTime": "2023-10-30T14:06:40.406753+02:00", "EventTime": "2023-10-30T14:06:40.406768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CgJGj22wk6tfAvb8oh"]} -{"Format": "IDEA0", "ID": "c329a71a-acf2-4095-bd46-4c6d1f027269", "DetectTime": "2023-10-30T14:06:40.446756+02:00", "EventTime": "2023-10-30T14:06:40.446775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cn6ylQ2nNx9Hfmjds1"]} -{"Format": "IDEA0", "ID": "934f8f39-438f-4cd0-bfff-b0952773e920", "DetectTime": "2023-10-30T14:06:40.481729+02:00", "EventTime": "2023-10-30T14:06:40.481740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CHWtO324ZoEyA4SBDg"]} -{"Format": "IDEA0", "ID": "90e3ba53-b9a9-47bd-b09e-b2a0d9bbdd9f", "DetectTime": "2023-10-30T14:06:40.506528+02:00", "EventTime": "2023-10-30T14:06:40.506541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CJeV1i39xC2H7qdfxh"]} -{"Format": "Json", "ID": "90e3ba53-b9a9-47bd-b09e-b2a0d9bbdd9f", "DetectTime": "2023-10-30T14:06:40.506528+02:00", "EventTime": "2023-10-30T14:06:40.506541+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T23:00:18.523039+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2023/10/30 14:06:40.608202)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "91a31f10-ccaa-4100-94fc-e58030d6dee3", "DetectTime": "2023-10-30T14:06:40.613650+02:00", "EventTime": "2023-10-30T14:06:40.613665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CF2d2N1NucYo6egKvd"]} -{"Format": "IDEA0", "ID": "bfed985e-0358-4d25-ae79-4557c7b9df7b", "DetectTime": "2023-10-30T14:06:40.650079+02:00", "EventTime": "2023-10-30T14:06:40.650103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CGqHJZ17woQSACVZ33"]} -{"Format": "IDEA0", "ID": "0ee4528a-b680-4e78-ba3f-782b6296feac", "DetectTime": "2023-10-30T14:06:40.679993+02:00", "EventTime": "2023-10-30T14:06:40.680004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CpE1Wc39JxEC3vBbe6"]} -{"Format": "IDEA0", "ID": "1325d694-4d89-4830-9a82-60b26cd46cb4", "DetectTime": "2023-10-30T14:06:40.710570+02:00", "EventTime": "2023-10-30T14:06:40.710591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ChPr662nk1dXCOSIsc"]} -{"Format": "IDEA0", "ID": "4e6ad172-eb5f-45be-a05c-159e40025dbd", "DetectTime": "2023-10-30T14:06:40.746293+02:00", "EventTime": "2023-10-30T14:06:40.746313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10763], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. ", "ContentType": "text/plain"}], "uids": ["CNjArg23U2wPGUacT5"]} -{"Format": "IDEA0", "ID": "4ef4c36a-0647-4e18-9a01-d96665b45eb7", "DetectTime": "2023-10-30T14:06:40.782894+02:00", "EventTime": "2023-10-30T14:06:40.782915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CvH6KLzuKL9mq2yRa"]} -{"Format": "IDEA0", "ID": "482b4086-965a-455f-8126-a25ba140ecfc", "DetectTime": "2023-10-30T14:06:40.810350+02:00", "EventTime": "2023-10-30T14:06:40.810363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["C2Y5Vd3gX6tFYHUVf9"]} -{"Format": "IDEA0", "ID": "bd10a497-7377-4829-820a-0ff66f24b8ad", "DetectTime": "2023-10-30T14:06:40.841597+02:00", "EventTime": "2023-10-30T14:06:40.841613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CaE3rF4ADSzOQHUzXb"]} -{"Format": "Json", "ID": "bd10a497-7377-4829-820a-0ff66f24b8ad", "DetectTime": "2023-10-30T14:06:40.841597+02:00", "EventTime": "2023-10-30T14:06:40.841613+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T23:00:38.074893+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2023/10/30 14:06:40.900227)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6b2994ff-d2a1-4fa9-afd1-74663c3a209c", "DetectTime": "2023-10-30T14:06:40.905778+02:00", "EventTime": "2023-10-30T14:06:40.905795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CsVMW42FqC3p45YRS5"]} -{"Format": "IDEA0", "ID": "9c5321bf-3af8-41d8-a9f4-5bfe94e1bf83", "DetectTime": "2023-10-30T14:06:40.936027+02:00", "EventTime": "2023-10-30T14:06:40.936043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CvDPEd12b8WNOCyg1i"]} -{"Format": "IDEA0", "ID": "3b2d2513-8418-4418-9003-ae8ea2a908d9", "DetectTime": "2023-10-30T14:06:40.964303+02:00", "EventTime": "2023-10-30T14:06:40.964320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CrRoOl1lTI6c3idSb1"]} -{"Format": "IDEA0", "ID": "421e7a39-8647-4593-9baf-0d8d13eca151", "DetectTime": "2023-10-30T14:06:40.995153+02:00", "EventTime": "2023-10-30T14:06:40.995170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["Cbt4ta1Ir2mzS2o456"]} -{"Format": "IDEA0", "ID": "e6dd3cd3-8696-4e54-b71d-e9ed0c6f4e3b", "DetectTime": "2023-10-30T14:06:41.029373+02:00", "EventTime": "2023-10-30T14:06:41.029390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CAaxgv31bfMwA02Vq4"]} -{"Format": "IDEA0", "ID": "8964e498-5a33-4f99-83bf-bd1d2d499c8e", "DetectTime": "2023-10-30T14:06:41.056207+02:00", "EventTime": "2023-10-30T14:06:41.056227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CxxFoa4nyuxNN7NqMg"]} -{"Format": "IDEA0", "ID": "a8a8a49d-d89b-4895-9ccc-7177d0414977", "DetectTime": "2023-10-30T14:06:41.086410+02:00", "EventTime": "2023-10-30T14:06:41.086437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5977], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CQGn67SWw4o9Kvxj9"]} -{"Format": "IDEA0", "ID": "8d8acb6b-8a33-4cf9-8a8b-3a8a6dc27f87", "DetectTime": "2023-10-30T14:06:41.115984+02:00", "EventTime": "2023-10-30T14:06:41.115997+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"], "Hostname": ["188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 188.169.52.202 from 10.0.2.19. blacklisted IP AS: SILKNET-AS Silknet Autonomous System, GE AS35805 rDNS: 188-169-52-202.dsl.utg.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C4mYKv3AaMyNN10kwg"]} -{"Format": "IDEA0", "ID": "71bffa7a-cbc3-4d6d-ad8c-47a5c78e0acd", "DetectTime": "2023-10-30T14:06:41.135379+02:00", "EventTime": "2023-10-30T14:06:41.135395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CWtpSe22cCkGs8xkV1"]} -{"Format": "Json", "ID": "71bffa7a-cbc3-4d6d-ad8c-47a5c78e0acd", "DetectTime": "2023-10-30T14:06:41.135379+02:00", "EventTime": "2023-10-30T14:06:41.135395+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T23:31:34.279206+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2023/10/30 14:06:41.190558)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a70fcd85-d42e-4c79-bbfa-e61f9d1cfcde", "DetectTime": "2023-10-30T14:06:41.194671+02:00", "EventTime": "2023-10-30T14:06:41.194688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CJk4qlW9JzGstI1Hh"]} -{"Format": "IDEA0", "ID": "c2052805-1d9a-4fe4-8168-bb41ecf35ecd", "DetectTime": "2023-10-30T14:06:41.219871+02:00", "EventTime": "2023-10-30T14:06:41.219899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["COivpMNunAkfQPDu1"]} -{"Format": "IDEA0", "ID": "e62836b4-898b-4a3b-9550-8da52d667df2", "DetectTime": "2023-10-30T14:06:41.244749+02:00", "EventTime": "2023-10-30T14:06:41.244759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CoqyjE3lBnqQ71xmt6"]} -{"Format": "IDEA0", "ID": "f7641d51-574d-45e0-ae86-ae935f8803ca", "DetectTime": "2023-10-30T14:06:41.271503+02:00", "EventTime": "2023-10-30T14:06:41.271530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CI1jiv85ykucciCLl"]} -{"Format": "IDEA0", "ID": "7e133b03-695d-4441-8a78-547371ace909", "DetectTime": "2023-10-30T14:06:41.295536+02:00", "EventTime": "2023-10-30T14:06:41.295552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["CyVzEP20pOgPKByuvf"]} -{"Format": "IDEA0", "ID": "8a2c1946-5830-4d10-8ea9-2ee4d9e07208", "DetectTime": "2023-10-30T14:06:41.317908+02:00", "EventTime": "2023-10-30T14:06:41.317918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["COP0AQ1iZBO34bh1rf"]} -{"Format": "IDEA0", "ID": "c6043cdd-cfc3-4eaf-ae93-c7b49c7132d6", "DetectTime": "2023-10-30T14:06:41.340971+02:00", "EventTime": "2023-10-30T14:06:41.340983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CWulUb1acPkyRzKRn4"]} -{"Format": "IDEA0", "ID": "61e7b72e-6f72-4af2-b230-1787b968172a", "DetectTime": "2023-10-30T14:06:41.365980+02:00", "EventTime": "2023-10-30T14:06:41.365996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CkNl393qEWXRhKi3Tb"]} -{"Format": "IDEA0", "ID": "723fb0ab-fe2f-4997-8621-ccc2d130315f", "DetectTime": "2023-10-30T14:06:41.396248+02:00", "EventTime": "2023-10-30T14:06:41.396264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CuqmUk4n1CWe4JKNe"]} -{"Format": "Json", "ID": "723fb0ab-fe2f-4997-8621-ccc2d130315f", "DetectTime": "2023-10-30T14:06:41.396248+02:00", "EventTime": "2023-10-30T14:06:41.396264+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T23:31:35.992349+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2023/10/30 14:06:41.576441)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6ac78373-1ca0-4ec3-9f10-b32e3776d599", "DetectTime": "2023-10-30T14:06:41.580516+02:00", "EventTime": "2023-10-30T14:06:41.580528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CQmGQ018GTuyBb9Z0h"]} -{"Format": "IDEA0", "ID": "e636be4d-a5b6-481d-8c91-755e361c32b9", "DetectTime": "2023-10-30T14:06:41.605456+02:00", "EventTime": "2023-10-30T14:06:41.605473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CjQbHH1EuRHN2e3hDj"]} -{"Format": "IDEA0", "ID": "0f3af6a0-46be-4983-8d17-2dc4a53e3c90", "DetectTime": "2023-10-30T14:06:41.630620+02:00", "EventTime": "2023-10-30T14:06:41.630636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CrJS981VPSbtMsN646"]} -{"Format": "IDEA0", "ID": "a5119f9a-b609-4d2e-8ce6-3c0fe01cb350", "DetectTime": "2023-10-30T14:06:41.652232+02:00", "EventTime": "2023-10-30T14:06:41.652249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CgMVR63jrLXbzsS8D5"]} -{"Format": "IDEA0", "ID": "74bea2c1-de96-49cf-8e31-8ffb7ad3b492", "DetectTime": "2023-10-30T14:06:41.676208+02:00", "EventTime": "2023-10-30T14:06:41.676224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CxELln1BnMmqrGaTK9"]} -{"Format": "IDEA0", "ID": "49e72ddc-cd85-42d3-8d70-a22227a0152c", "DetectTime": "2023-10-30T14:06:41.701754+02:00", "EventTime": "2023-10-30T14:06:41.701769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["Cp2Cyn3fWTD4GlSq98"]} -{"Format": "IDEA0", "ID": "184acfa6-7863-468e-b0c2-083a9ff4fa91", "DetectTime": "2023-10-30T14:06:41.725451+02:00", "EventTime": "2023-10-30T14:06:41.725462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKY7q31BnicBYuZNYd"]} -{"Format": "IDEA0", "ID": "c19ab39f-129c-414b-9d91-708f06ff8abd", "DetectTime": "2023-10-30T14:06:41.751281+02:00", "EventTime": "2023-10-30T14:06:41.751297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CmU49jd2BuGa6k83"]} -{"Format": "Json", "ID": "c19ab39f-129c-414b-9d91-708f06ff8abd", "DetectTime": "2023-10-30T14:06:41.751281+02:00", "EventTime": "2023-10-30T14:06:41.751297+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-04T23:32:48.660460+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2023/10/30 14:06:41.815608)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6c2e22e1-9950-48c7-bd89-253e9e6c2422", "DetectTime": "2023-10-30T14:06:41.821270+02:00", "EventTime": "2023-10-30T14:06:41.821285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ClUgZIUSy29eLNLwb"]} -{"Format": "IDEA0", "ID": "15abe83e-89aa-44cf-a5c5-0357b7e3b0bb", "DetectTime": "2023-10-30T14:06:41.843256+02:00", "EventTime": "2023-10-30T14:06:41.843269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CWcOYt1ixB9SQF4Pv4"]} -{"Format": "IDEA0", "ID": "e1dac3d0-861c-4cbd-b4d1-101669e1a46a", "DetectTime": "2023-10-30T14:06:41.864733+02:00", "EventTime": "2023-10-30T14:06:41.864744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CkvdsAI4qjBb62DGd"]} -{"Format": "IDEA0", "ID": "6b8bc2b6-851d-4ad7-a3b4-4c375aa7af1b", "DetectTime": "2023-10-30T14:06:41.885590+02:00", "EventTime": "2023-10-30T14:06:41.885603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["C1JEPCQDGfsmfdmZ3"]} -{"Format": "IDEA0", "ID": "33893113-82e4-46b1-9eaf-23be8e215ec4", "DetectTime": "2023-10-30T14:06:41.905224+02:00", "EventTime": "2023-10-30T14:06:41.905238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CjxMQaf77Fnjt9Mde"]} -{"Format": "IDEA0", "ID": "7ddc3d72-1fdc-487e-bede-e0cda779d3f0", "DetectTime": "2023-10-30T14:06:41.928085+02:00", "EventTime": "2023-10-30T14:06:41.928103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjpLUi2LeiUHPEf69i"]} -{"Format": "IDEA0", "ID": "d0257957-2ba2-4fab-a0ae-9f997e69039d", "DetectTime": "2023-10-30T14:06:41.954419+02:00", "EventTime": "2023-10-30T14:06:41.954440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CqsZeU3noBk8jet065"]} -{"Format": "IDEA0", "ID": "f830a1e8-bf59-4189-8a0c-a7a66e61feaf", "DetectTime": "2023-10-30T14:06:42.018610+02:00", "EventTime": "2023-10-30T14:06:42.018623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16163], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. ", "ContentType": "text/plain"}], "uids": ["CUx7QEfKHU2X6Nkm4"]} -{"Format": "IDEA0", "ID": "92165246-8313-4741-9c06-de59801b4fa6", "DetectTime": "2023-10-30T14:06:42.068913+02:00", "EventTime": "2023-10-30T14:06:42.068924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CfdHrn1Ot87mFpkhzh"]} -{"Format": "IDEA0", "ID": "57d82b80-0dce-4483-b413-18d63b125cdf", "DetectTime": "2023-10-30T14:06:42.126277+02:00", "EventTime": "2023-10-30T14:06:42.126293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["COyNMA1EoJph4rq8l1"]} -{"Format": "IDEA0", "ID": "e165c89a-bf65-47d2-8a51-4f1690e777fc", "DetectTime": "2023-10-30T14:06:42.176878+02:00", "EventTime": "2023-10-30T14:06:42.176894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CfWdEO3GWLesHxgRxg"]} -{"Format": "IDEA0", "ID": "7fecf9f9-4459-4034-880f-791d1563e341", "DetectTime": "2023-10-30T14:06:42.231657+02:00", "EventTime": "2023-10-30T14:06:42.231678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CuD09e3AuIWoxqMzBj"]} -{"Format": "IDEA0", "ID": "9bada10e-4ca8-4be8-a7e7-62f286928bbf", "DetectTime": "2023-10-30T14:06:42.289519+02:00", "EventTime": "2023-10-30T14:06:42.289540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CKxmZQ2V6X6nuawgB4"]} -{"Format": "Json", "ID": "9bada10e-4ca8-4be8-a7e7-62f286928bbf", "DetectTime": "2023-10-30T14:06:42.289519+02:00", "EventTime": "2023-10-30T14:06:42.289540+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:03:54.334264+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:42.403362)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7cb14a58-853f-4d1a-995c-7b064ec108d0", "DetectTime": "2023-10-30T14:06:42.408698+02:00", "EventTime": "2023-10-30T14:06:42.408715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. ", "ContentType": "text/plain"}], "uids": ["C1G8is3qWuKzyoaV43"]} -{"Format": "IDEA0", "ID": "42fc43d3-c8ad-4ea0-b1aa-3dc99393e796", "DetectTime": "2023-10-30T14:06:42.471090+02:00", "EventTime": "2023-10-30T14:06:42.471111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CMoWBu1f4wci0b56C9"]} -{"Format": "IDEA0", "ID": "79450d72-ddf0-4d0e-846a-8410ed31254e", "DetectTime": "2023-10-30T14:06:42.524489+02:00", "EventTime": "2023-10-30T14:06:42.524502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cur36o1WEDQuAtFd98"]} -{"Format": "IDEA0", "ID": "8f1f9b95-7cd4-4c45-983b-fc1c5ff52f68", "DetectTime": "2023-10-30T14:06:42.545331+02:00", "EventTime": "2023-10-30T14:06:42.545347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CNLHPu2H77OXDBltQb"]} -{"Format": "IDEA0", "ID": "1c6a00f3-0a10-4e94-9219-2f5e69caa4b5", "DetectTime": "2023-10-30T14:06:42.596674+02:00", "EventTime": "2023-10-30T14:06:42.596693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C1oC9g3KHVHr99Ste"]} -{"Format": "IDEA0", "ID": "b83179e6-e82d-4cfb-8f48-da84e2cd9782", "DetectTime": "2023-10-30T14:06:42.645384+02:00", "EventTime": "2023-10-30T14:06:42.645400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C06TAN2Q8XurqUynI8"]} -{"Format": "IDEA0", "ID": "c7608fcc-6870-4152-af45-f1936941ee97", "DetectTime": "2023-10-30T14:06:42.696546+02:00", "EventTime": "2023-10-30T14:06:42.696563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCKAId2Vlr7UYkCtl7"]} -{"Format": "IDEA0", "ID": "1994fa0f-cc8c-459c-983b-7cb85c6a0743", "DetectTime": "2023-10-30T14:06:42.740229+02:00", "EventTime": "2023-10-30T14:06:42.740244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CCktEM1I8AB9fVj4Q1"]} -{"Format": "IDEA0", "ID": "55e19ae3-097f-4248-9f87-644870db193b", "DetectTime": "2023-10-30T14:06:42.789075+02:00", "EventTime": "2023-10-30T14:06:42.789093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. ", "ContentType": "text/plain"}], "uids": ["CzEymX3dOQapG61fRk"]} -{"Format": "Json", "ID": "55e19ae3-097f-4248-9f87-644870db193b", "DetectTime": "2023-10-30T14:06:42.789075+02:00", "EventTime": "2023-10-30T14:06:42.789093+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:03:55.954483+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:42.876376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cae10bb5-35fa-4e84-be00-8eabe5286014", "DetectTime": "2023-10-30T14:06:42.882264+02:00", "EventTime": "2023-10-30T14:06:42.882286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CX0kWe4QBhPJz2ou78"]} -{"Format": "IDEA0", "ID": "12d18a24-ebfd-4bc4-9e6b-db2055f3d115", "DetectTime": "2023-10-30T14:06:42.934940+02:00", "EventTime": "2023-10-30T14:06:42.934957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CZUXwm4NQdXPYjZQve"]} -{"Format": "IDEA0", "ID": "d8e239dd-d30b-4003-9d17-697663699799", "DetectTime": "2023-10-30T14:06:42.981944+02:00", "EventTime": "2023-10-30T14:06:42.981955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CcFMthzUmleU5Lrs9"]} -{"Format": "IDEA0", "ID": "2e8785fa-73ac-43c3-9b6d-fce7396b3d27", "DetectTime": "2023-10-30T14:06:43.030040+02:00", "EventTime": "2023-10-30T14:06:43.030058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["C3VLnN2XhMdx9i2K6b"]} -{"Format": "IDEA0", "ID": "fee8b2ce-ab60-4b4c-8170-592b603c322d", "DetectTime": "2023-10-30T14:06:43.080909+02:00", "EventTime": "2023-10-30T14:06:43.080926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CaUscw3imyj7q9w63f"]} -{"Format": "IDEA0", "ID": "4f687a2d-5392-47a5-8efb-54c36f747f9d", "DetectTime": "2023-10-30T14:06:43.132381+02:00", "EventTime": "2023-10-30T14:06:43.132397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CCkNk56U2BCtyOwyl"]} -{"Format": "IDEA0", "ID": "d5f05a26-78f2-4063-84e0-abe4e5ff44c5", "DetectTime": "2023-10-30T14:06:43.183817+02:00", "EventTime": "2023-10-30T14:06:43.183833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CHHqy73xU6Hi34eCQ2"]} -{"Format": "IDEA0", "ID": "13a71462-b264-455d-a2fa-e9c8cd47628f", "DetectTime": "2023-10-30T14:06:43.237097+02:00", "EventTime": "2023-10-30T14:06:43.237117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CgKdbFyWtHjVIfgqi"]} -{"Format": "Json", "ID": "13a71462-b264-455d-a2fa-e9c8cd47628f", "DetectTime": "2023-10-30T14:06:43.237097+02:00", "EventTime": "2023-10-30T14:06:43.237117+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:03:57.517132+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:43.321105)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "63882863-75ae-4c6c-b09d-32acda0f7f92", "DetectTime": "2023-10-30T14:06:43.326879+02:00", "EventTime": "2023-10-30T14:06:43.326896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CuXHz3vkKGmfyZi4h"]} -{"Format": "IDEA0", "ID": "2107354d-4a34-4e60-baef-947d69be2bd4", "DetectTime": "2023-10-30T14:06:43.379211+02:00", "EventTime": "2023-10-30T14:06:43.379226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4727], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4727/UDP destination IP 99.8.121.25. ", "ContentType": "text/plain"}], "uids": ["CxUldu4eteyKI7j57a"]} -{"Format": "IDEA0", "ID": "bed072d7-0948-4141-a6b3-5d1ba0c93f5d", "DetectTime": "2023-10-30T14:06:43.423587+02:00", "EventTime": "2023-10-30T14:06:43.423601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24834], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24834/UDP destination IP 178.91.64.56. ", "ContentType": "text/plain"}], "uids": ["CdgwQRhKKijVQJ5il"]} -{"Format": "IDEA0", "ID": "0df939b5-bc55-44e6-b522-ef6c4a92cfcb", "DetectTime": "2023-10-30T14:06:43.470824+02:00", "EventTime": "2023-10-30T14:06:43.470846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CybMWC32qPzbG0ONpg"]} -{"Format": "IDEA0", "ID": "46e2dc2f-3852-4932-b10f-d1e0c6ee73ff", "DetectTime": "2023-10-30T14:06:43.591607+02:00", "EventTime": "2023-10-30T14:06:43.591620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4403/UDP destination IP 186.95.17.106. ", "ContentType": "text/plain"}], "uids": ["CJ6QE41vPk92oFA3J2"]} -{"Format": "IDEA0", "ID": "ab461693-0d28-4831-872e-de7ba1eaeca9", "DetectTime": "2023-10-30T14:06:43.643842+02:00", "EventTime": "2023-10-30T14:06:43.643859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CwSXmJ1tJXIx522o0h"]} -{"Format": "IDEA0", "ID": "37e02656-260a-4f6e-8157-1e8256be5e7b", "DetectTime": "2023-10-30T14:06:43.698074+02:00", "EventTime": "2023-10-30T14:06:43.698090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. ", "ContentType": "text/plain"}], "uids": ["CPresd342tj0cIWcNd"]} -{"Format": "IDEA0", "ID": "b6e23afd-5b1d-47ac-b556-22abb1acee4e", "DetectTime": "2023-10-30T14:06:43.753136+02:00", "EventTime": "2023-10-30T14:06:43.753152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CLNtRQ6BVbfUPLbAd"]} -{"Format": "Json", "ID": "b6e23afd-5b1d-47ac-b556-22abb1acee4e", "DetectTime": "2023-10-30T14:06:43.753136+02:00", "EventTime": "2023-10-30T14:06:43.753152+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:05:40.178408+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:43.858910)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "298ba201-650c-46e3-86d4-12bd0f35a9d1", "DetectTime": "2023-10-30T14:06:43.865295+02:00", "EventTime": "2023-10-30T14:06:43.865322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4507/UDP destination IP 84.151.242.149. ", "ContentType": "text/plain"}], "uids": ["CPTKra3cZgG8yPBjAd"]} -{"Format": "IDEA0", "ID": "3a2a8911-5e6d-4e4d-a302-6680dc88afed", "DetectTime": "2023-10-30T14:06:43.914026+02:00", "EventTime": "2023-10-30T14:06:43.914044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9397], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9397/UDP destination IP 95.104.67.50. ", "ContentType": "text/plain"}], "uids": ["CNTPvZ2Ds874Rnc7J4"]} -{"Format": "IDEA0", "ID": "3be13944-3f5d-41be-88e7-8cf07ae79912", "DetectTime": "2023-10-30T14:06:43.967954+02:00", "EventTime": "2023-10-30T14:06:43.967976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CLP2ew4OfHW304HmA8"]} -{"Format": "IDEA0", "ID": "d438092d-ece4-42a7-a9ce-3790be90c281", "DetectTime": "2023-10-30T14:06:44.027193+02:00", "EventTime": "2023-10-30T14:06:44.027212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7353], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7353/UDP destination IP 190.118.81.174. ", "ContentType": "text/plain"}], "uids": ["CW3HY74K6pQtZVnhrb"]} -{"Format": "IDEA0", "ID": "b4c0ef9b-7e3e-48a7-a9a3-8d4ba6043dcb", "DetectTime": "2023-10-30T14:06:44.079632+02:00", "EventTime": "2023-10-30T14:06:44.079645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CdcLoC4GS2QEpIrQMa"]} -{"Format": "IDEA0", "ID": "04c53035-7f58-40ab-bf07-4610d3480d60", "DetectTime": "2023-10-30T14:06:44.137289+02:00", "EventTime": "2023-10-30T14:06:44.137316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C8uy7G4wtyRcQEuUbl"]} -{"Format": "IDEA0", "ID": "48d50193-67db-40d8-9551-faf2be1b0cb7", "DetectTime": "2023-10-30T14:06:44.162745+02:00", "EventTime": "2023-10-30T14:06:44.162762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CmpQBe2W7hwzJn4g4a"]} -{"Format": "IDEA0", "ID": "93e95c2b-156b-4e89-9c5d-4df0ad6ac56f", "DetectTime": "2023-10-30T14:06:44.217763+02:00", "EventTime": "2023-10-30T14:06:44.217785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. ", "ContentType": "text/plain"}], "uids": ["CtHKsZ2Gq86XGveDDb"]} -{"Format": "IDEA0", "ID": "6894f1e8-686d-4a1f-b66b-2c987e8185e6", "DetectTime": "2023-10-30T14:06:44.272272+02:00", "EventTime": "2023-10-30T14:06:44.272291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1007], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1007/UDP destination IP 190.56.105.225. ", "ContentType": "text/plain"}], "uids": ["CJlRTZ2o89VAcEON4g"]} -{"Format": "Json", "ID": "6894f1e8-686d-4a1f-b66b-2c987e8185e6", "DetectTime": "2023-10-30T14:06:44.272272+02:00", "EventTime": "2023-10-30T14:06:44.272291+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1007], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:08:34.335820+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:44.368322)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8d1de7a8-f6f7-4d35-8ee0-598c2be95a32", "DetectTime": "2023-10-30T14:06:44.377617+02:00", "EventTime": "2023-10-30T14:06:44.377633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28328], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CbGgv81ncwJNiGvg13"]} -{"Format": "IDEA0", "ID": "755c8366-3c9f-4807-930a-b4db9b1f5e7f", "DetectTime": "2023-10-30T14:06:44.435394+02:00", "EventTime": "2023-10-30T14:06:44.435414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19928/UDP destination IP 151.70.71.239. ", "ContentType": "text/plain"}], "uids": ["Cd3pFZ1BYryg1eO1N3"]} -{"Format": "IDEA0", "ID": "b36ebf47-dcdf-4918-814f-1071e9b9d2c8", "DetectTime": "2023-10-30T14:06:44.496664+02:00", "EventTime": "2023-10-30T14:06:44.496688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["C5MbTu4zhSZSMc9bUl"]} -{"Format": "IDEA0", "ID": "98b94bec-7b4d-456e-8c7e-09365c29a361", "DetectTime": "2023-10-30T14:06:44.552191+02:00", "EventTime": "2023-10-30T14:06:44.552207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16974], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16974/UDP destination IP 178.89.116.82. ", "ContentType": "text/plain"}], "uids": ["ClvZVm3OPk4PeQ1PM3"]} -{"Format": "IDEA0", "ID": "8d54fab3-84d8-41be-b9d6-f030cd51fecd", "DetectTime": "2023-10-30T14:06:44.601983+02:00", "EventTime": "2023-10-30T14:06:44.602003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13316], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13316/UDP destination IP 190.174.206.51. ", "ContentType": "text/plain"}], "uids": ["CkAAOZ2cWhIgqxWyDh"]} -{"Format": "IDEA0", "ID": "6df96833-7b8a-4317-b51a-5bf2fe097fc9", "DetectTime": "2023-10-30T14:06:44.652019+02:00", "EventTime": "2023-10-30T14:06:44.652037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8157], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8157/UDP destination IP 58.9.147.155. ", "ContentType": "text/plain"}], "uids": ["CfJVEv1wsfNPlBW41i"]} -{"Format": "IDEA0", "ID": "38f516e0-6e33-4cb9-a20a-aeccb47219a4", "DetectTime": "2023-10-30T14:06:44.700626+02:00", "EventTime": "2023-10-30T14:06:44.700645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15479], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15479/UDP destination IP 187.205.178.217. ", "ContentType": "text/plain"}], "uids": ["CehixH3Jp8zKD9hCYj"]} -{"Format": "IDEA0", "ID": "3d240bea-2576-4166-8cc3-5ecdcd47d0ce", "DetectTime": "2023-10-30T14:06:44.752606+02:00", "EventTime": "2023-10-30T14:06:44.752622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6668/UDP destination IP 94.71.146.85. ", "ContentType": "text/plain"}], "uids": ["C0wbKZMCcQvkmOj1"]} -{"Format": "Json", "ID": "3d240bea-2576-4166-8cc3-5ecdcd47d0ce", "DetectTime": "2023-10-30T14:06:44.752606+02:00", "EventTime": "2023-10-30T14:06:44.752622+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6668], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:10:42.248599+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:44.834520)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "58548da3-cfc3-4a4e-be6d-a48ff677a0e5", "DetectTime": "2023-10-30T14:06:44.840340+02:00", "EventTime": "2023-10-30T14:06:44.840358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CACvPS2a7VNGNgSBs4"]} -{"Format": "IDEA0", "ID": "757b7343-8eb6-43ae-81d2-2322d21995da", "DetectTime": "2023-10-30T14:06:44.892845+02:00", "EventTime": "2023-10-30T14:06:44.892864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CZqXtU1PJs3s1FBGH9"]} -{"Format": "IDEA0", "ID": "75baf4c1-ef3d-425a-824a-545b4b4840c7", "DetectTime": "2023-10-30T14:06:44.925583+02:00", "EventTime": "2023-10-30T14:06:44.925599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. ", "ContentType": "text/plain"}], "uids": ["CKzYn42h7b1JhcJnIj"]} -{"Format": "IDEA0", "ID": "295ea4f9-4491-4255-8126-b936d26e3d1f", "DetectTime": "2023-10-30T14:06:44.973917+02:00", "EventTime": "2023-10-30T14:06:44.973937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrpsK63lLg3Nu5aK7b"]} -{"Format": "IDEA0", "ID": "3e49b2ec-10f3-415b-a096-9a686057204f", "DetectTime": "2023-10-30T14:06:45.026315+02:00", "EventTime": "2023-10-30T14:06:45.026337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C4Y9up30V7NvS7Bqhh"]} -{"Format": "IDEA0", "ID": "c4938f37-2149-4169-a4ff-c3a789887f44", "DetectTime": "2023-10-30T14:06:45.073586+02:00", "EventTime": "2023-10-30T14:06:45.073604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. ", "ContentType": "text/plain"}], "uids": ["C2v4iv2qbFLKfmWINj"]} -{"Format": "IDEA0", "ID": "5928de55-15a8-4ef7-a9e4-4d8c452f60b9", "DetectTime": "2023-10-30T14:06:45.123625+02:00", "EventTime": "2023-10-30T14:06:45.123646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. ", "ContentType": "text/plain"}], "uids": ["CpIcoq3xPkkQcRupXj"]} -{"Format": "IDEA0", "ID": "03caf478-2972-464f-b739-0752be2fff57", "DetectTime": "2023-10-30T14:06:45.174088+02:00", "EventTime": "2023-10-30T14:06:45.174105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["ChNl0Y3Z3I6Aswibua"]} -{"Format": "IDEA0", "ID": "df3c4e9b-3c9d-4d5e-b1f1-d964e3318c60", "DetectTime": "2023-10-30T14:06:45.215087+02:00", "EventTime": "2023-10-30T14:06:45.215101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cv1io93ImKWc0sVfTj"]} -{"Format": "Json", "ID": "df3c4e9b-3c9d-4d5e-b1f1-d964e3318c60", "DetectTime": "2023-10-30T14:06:45.215087+02:00", "EventTime": "2023-10-30T14:06:45.215101+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:43:52.201196+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:45.293822)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "acb45ab9-9d5d-400a-a281-0e62a572fb56", "DetectTime": "2023-10-30T14:06:45.298453+02:00", "EventTime": "2023-10-30T14:06:45.298465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["ChyL9oGKtJ9e6jVa6"]} -{"Format": "IDEA0", "ID": "b60910e0-31c3-43b5-9ff4-bda253f34481", "DetectTime": "2023-10-30T14:06:45.340494+02:00", "EventTime": "2023-10-30T14:06:45.340506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["C1Uoa1arlH59sg26c"]} -{"Format": "IDEA0", "ID": "be7bedab-e07d-4d0a-9cfc-9f976fc96e8c", "DetectTime": "2023-10-30T14:06:45.383860+02:00", "EventTime": "2023-10-30T14:06:45.383882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CPW0sk1Es6ljTqOdJ4"]} -{"Format": "IDEA0", "ID": "3bdd5116-b9f5-4697-b255-e8932ec21975", "DetectTime": "2023-10-30T14:06:45.426642+02:00", "EventTime": "2023-10-30T14:06:45.426668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CFfMn73Yl1I8ktRCtc"]} -{"Format": "IDEA0", "ID": "3833454b-818a-4b67-947f-1e271c9f4ed8", "DetectTime": "2023-10-30T14:06:45.467667+02:00", "EventTime": "2023-10-30T14:06:45.467693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CX8ZiA3UXw8ACU01wj"]} -{"Format": "IDEA0", "ID": "0f8dca44-547b-4eef-b436-84c996772940", "DetectTime": "2023-10-30T14:06:45.507921+02:00", "EventTime": "2023-10-30T14:06:45.507947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQOCuN00N2hW01Md3"]} -{"Format": "IDEA0", "ID": "e829a10b-59e1-449d-9438-6788a81e5406", "DetectTime": "2023-10-30T14:06:45.551803+02:00", "EventTime": "2023-10-30T14:06:45.551821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CyqN992jBTVt7YHor3"]} -{"Format": "IDEA0", "ID": "cb5893d2-daff-400a-a4a2-4ef550578845", "DetectTime": "2023-10-30T14:06:45.592274+02:00", "EventTime": "2023-10-30T14:06:45.592294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CoyXLG375lKyWdy1ec"]} -{"Format": "Json", "ID": "cb5893d2-daff-400a-a4a2-4ef550578845", "DetectTime": "2023-10-30T14:06:45.592274+02:00", "EventTime": "2023-10-30T14:06:45.592294+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:44:12.888874+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:45.670505)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aeeaa4bb-679c-4ff1-8d1b-0a697ba98730", "DetectTime": "2023-10-30T14:06:45.676275+02:00", "EventTime": "2023-10-30T14:06:45.676297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Ccslrh4xlp0n1sl799"]} -{"Format": "IDEA0", "ID": "40fac13a-4c82-4d56-82e9-cbf1eedb5b8e", "DetectTime": "2023-10-30T14:06:45.719080+02:00", "EventTime": "2023-10-30T14:06:45.719095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["COrXyynomc3oc98O4"]} -{"Format": "IDEA0", "ID": "b2a89b30-3555-4e17-b0c4-f09669019462", "DetectTime": "2023-10-30T14:06:45.746675+02:00", "EventTime": "2023-10-30T14:06:45.746702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CPqc742pHEf8k45vrh"]} -{"Format": "IDEA0", "ID": "65bf5a1e-65a1-42bc-8808-eaa4cb860333", "DetectTime": "2023-10-30T14:06:45.784698+02:00", "EventTime": "2023-10-30T14:06:45.784713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["C9mumlhtVyiOlHzq9"]} -{"Format": "IDEA0", "ID": "b37c38ac-1203-43a2-8c19-bf3e484ff209", "DetectTime": "2023-10-30T14:06:45.830269+02:00", "EventTime": "2023-10-30T14:06:45.830297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CEOAYb4NRulb0fkY3"]} -{"Format": "IDEA0", "ID": "7bfc7cfd-c295-422d-9cba-a3418e9e2588", "DetectTime": "2023-10-30T14:06:45.870791+02:00", "EventTime": "2023-10-30T14:06:45.870809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. ", "ContentType": "text/plain"}], "uids": ["CVx2003NzSnbWHcX3h"]} -{"Format": "IDEA0", "ID": "4d304ff6-4ab3-4800-8513-f3daa7274ac0", "DetectTime": "2023-10-30T14:06:45.910368+02:00", "EventTime": "2023-10-30T14:06:45.910392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["Cznk9Y1mFhkCpRIA87"]} -{"Format": "IDEA0", "ID": "e929b820-b075-4adf-9829-0816a578afb7", "DetectTime": "2023-10-30T14:06:45.936296+02:00", "EventTime": "2023-10-30T14:06:45.936323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["Cf7Rp32E2pTrwTqEDd"]} -{"Format": "IDEA0", "ID": "4799c98b-8ba1-4c22-b954-cb2e60e568be", "DetectTime": "2023-10-30T14:06:45.977814+02:00", "EventTime": "2023-10-30T14:06:45.977835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CrRmY9148WLS1cvfa4"]} -{"Format": "IDEA0", "ID": "8797df2f-06be-4031-8024-a5bb99c5bd96", "DetectTime": "2023-10-30T14:06:46.020286+02:00", "EventTime": "2023-10-30T14:06:46.020303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C8EL4Y2gseUSrZAEVc"]} -{"Format": "Json", "ID": "8797df2f-06be-4031-8024-a5bb99c5bd96", "DetectTime": "2023-10-30T14:06:46.020286+02:00", "EventTime": "2023-10-30T14:06:46.020303+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:44:52.486526+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:46.099611)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1057748d-5c67-4658-836d-6c1db6dada46", "DetectTime": "2023-10-30T14:06:46.105015+02:00", "EventTime": "2023-10-30T14:06:46.105041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["Cmq0SadKzHfd6IOXk"]} -{"Format": "IDEA0", "ID": "edf183ce-b8f5-4887-ba9b-c5f49731e0f8", "DetectTime": "2023-10-30T14:06:46.143725+02:00", "EventTime": "2023-10-30T14:06:46.143744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CSYiNh4zxrI5D5dd03"]} -{"Format": "IDEA0", "ID": "c763e741-7a5d-4ca1-a3a5-6076d7a487e2", "DetectTime": "2023-10-30T14:06:46.183400+02:00", "EventTime": "2023-10-30T14:06:46.183416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4727], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4727/UDP destination IP 99.8.121.25. ", "ContentType": "text/plain"}], "uids": ["ChufgC353vBWhTijl8"]} -{"Format": "IDEA0", "ID": "75b92bfa-bc2a-4901-8fd3-dc2e7172a871", "DetectTime": "2023-10-30T14:06:46.219014+02:00", "EventTime": "2023-10-30T14:06:46.219031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CvX7OezBEVtgLUtf5"]} -{"Format": "IDEA0", "ID": "f2678e93-a0ed-4477-8f42-824fe65c95cb", "DetectTime": "2023-10-30T14:06:46.260807+02:00", "EventTime": "2023-10-30T14:06:46.260825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4403], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4403/UDP destination IP 186.95.17.106. ", "ContentType": "text/plain"}], "uids": ["CbrfTj1han2c5Wanp4"]} -{"Format": "IDEA0", "ID": "0328ad02-f781-4c25-bd29-ab88fce27f8a", "DetectTime": "2023-10-30T14:06:46.299146+02:00", "EventTime": "2023-10-30T14:06:46.299161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["Cg7nis1e7COmZ8Ira"]} -{"Format": "IDEA0", "ID": "35c9732a-a3a6-44bf-abf5-8e0f1a568f6e", "DetectTime": "2023-10-30T14:06:46.337822+02:00", "EventTime": "2023-10-30T14:06:46.337845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. ", "ContentType": "text/plain"}], "uids": ["CBfO4i2YxzMfDS7XL7"]} -{"Format": "IDEA0", "ID": "c54b719c-b31b-4f9a-b921-a2f9136ad6f5", "DetectTime": "2023-10-30T14:06:46.377750+02:00", "EventTime": "2023-10-30T14:06:46.377768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CuoyVMTi1s3Dj8pab"]} -{"Format": "Json", "ID": "c54b719c-b31b-4f9a-b921-a2f9136ad6f5", "DetectTime": "2023-10-30T14:06:46.377750+02:00", "EventTime": "2023-10-30T14:06:46.377768+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:45:13.949755+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:46.457208)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb29519f-c52d-452c-bf51-c5333bc77ba1", "DetectTime": "2023-10-30T14:06:46.463322+02:00", "EventTime": "2023-10-30T14:06:46.463342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4507/UDP destination IP 84.151.242.149. ", "ContentType": "text/plain"}], "uids": ["Cr2r8K5UNt5Txo7Rh"]} -{"Format": "IDEA0", "ID": "8c534cca-7e15-43b0-8c85-0e9a3a8fe2fc", "DetectTime": "2023-10-30T14:06:46.502190+02:00", "EventTime": "2023-10-30T14:06:46.502215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CDB9e51AYmg52f33G8"]} -{"Format": "IDEA0", "ID": "b9b99545-c0e6-4373-8d60-70e0da085cb3", "DetectTime": "2023-10-30T14:06:46.539982+02:00", "EventTime": "2023-10-30T14:06:46.540001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CepQ4X2lwctD40DIx3"]} -{"Format": "IDEA0", "ID": "63c8a727-3006-4fe3-aeeb-a14d2f18727a", "DetectTime": "2023-10-30T14:06:46.577466+02:00", "EventTime": "2023-10-30T14:06:46.577488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CAkyEp10M6DklSO0of"]} -{"Format": "IDEA0", "ID": "c954a996-56b9-418f-9b8c-fc3442d5c05b", "DetectTime": "2023-10-30T14:06:46.612700+02:00", "EventTime": "2023-10-30T14:06:46.612712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. ", "ContentType": "text/plain"}], "uids": ["Cdye3S1EJI0ex7iw06"]} -{"Format": "IDEA0", "ID": "88e972d3-ebc4-4474-9fb3-5ac95ab0d788", "DetectTime": "2023-10-30T14:06:46.648989+02:00", "EventTime": "2023-10-30T14:06:46.649005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1007], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1007/UDP destination IP 190.56.105.225. ", "ContentType": "text/plain"}], "uids": ["CiWT2a34MyzTgVXX03"]} -{"Format": "IDEA0", "ID": "3e6e7f85-7080-4f53-81f3-9bdc392e7f38", "DetectTime": "2023-10-30T14:06:46.690033+02:00", "EventTime": "2023-10-30T14:06:46.690059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28328], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CZh6fsXAhCub9CPnd"]} -{"Format": "IDEA0", "ID": "5acf42cc-eae5-40ac-86f3-c8106dd0caa2", "DetectTime": "2023-10-30T14:06:46.725984+02:00", "EventTime": "2023-10-30T14:06:46.726000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CBnQUm3bUJiEUrvzjc"]} -{"Format": "IDEA0", "ID": "7e3c1a31-7583-4ab5-90e9-ced2e429de92", "DetectTime": "2023-10-30T14:06:46.753088+02:00", "EventTime": "2023-10-30T14:06:46.753108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["C8kwqD2fBpvs1dU0L"]} -{"Format": "Json", "ID": "7e3c1a31-7583-4ab5-90e9-ced2e429de92", "DetectTime": "2023-10-30T14:06:46.753088+02:00", "EventTime": "2023-10-30T14:06:46.753108+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:46:09.693463+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:46.825555)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "02afefef-799b-49df-a35f-76b6acc3234b", "DetectTime": "2023-10-30T14:06:46.832155+02:00", "EventTime": "2023-10-30T14:06:46.832177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16974], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16974/UDP destination IP 178.89.116.82. ", "ContentType": "text/plain"}], "uids": ["C4QLVR3AXdBt9JSPzf"]} -{"Format": "IDEA0", "ID": "6bc47563-23bc-437e-8850-d0f1da67a809", "DetectTime": "2023-10-30T14:06:46.871309+02:00", "EventTime": "2023-10-30T14:06:46.871331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15479], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15479/UDP destination IP 187.205.178.217. ", "ContentType": "text/plain"}], "uids": ["CoZOy1oBinoMiacx2"]} -{"Format": "IDEA0", "ID": "ee5e1413-1b51-451b-8f50-d66ea368c409", "DetectTime": "2023-10-30T14:06:46.909091+02:00", "EventTime": "2023-10-30T14:06:46.909110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6668], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6668/UDP destination IP 94.71.146.85. ", "ContentType": "text/plain"}], "uids": ["C9IL3X2XbmTQYs1Fna"]} -{"Format": "IDEA0", "ID": "418f3355-b0e4-4d9b-beca-bc0ba32a025d", "DetectTime": "2023-10-30T14:06:46.952027+02:00", "EventTime": "2023-10-30T14:06:46.952066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CauF341RvXQXFpT959"]} -{"Format": "IDEA0", "ID": "c771d9bb-ed14-4729-b000-4982db21e0f7", "DetectTime": "2023-10-30T14:06:46.992157+02:00", "EventTime": "2023-10-30T14:06:46.992176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. ", "ContentType": "text/plain"}], "uids": ["CPbqVe4PCB27HS2Tgc"]} -{"Format": "IDEA0", "ID": "e0ae4525-6f26-408e-9a68-12fe5c8ae7df", "DetectTime": "2023-10-30T14:06:47.028207+02:00", "EventTime": "2023-10-30T14:06:47.028226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CYXEGo2ns4Qr91Khcd"]} -{"Format": "IDEA0", "ID": "55e98786-b013-4dee-8df9-5758b6ca5e10", "DetectTime": "2023-10-30T14:06:47.066013+02:00", "EventTime": "2023-10-30T14:06:47.066038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. ", "ContentType": "text/plain"}], "uids": ["CxmhcH3zBpLIJEj0m4"]} -{"Format": "IDEA0", "ID": "328e3683-39b8-427d-a9f9-49760f80140f", "DetectTime": "2023-10-30T14:06:47.098569+02:00", "EventTime": "2023-10-30T14:06:47.098593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. ", "ContentType": "text/plain"}], "uids": ["CKGpdg2VVLDq19NNUl"]} -{"Format": "Json", "ID": "328e3683-39b8-427d-a9f9-49760f80140f", "DetectTime": "2023-10-30T14:06:47.098569+02:00", "EventTime": "2023-10-30T14:06:47.098593+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18069], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T00:46:48.560379+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2023/10/30 14:06:47.168409)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6a04515-97e0-4607-afca-1b906682cd72", "DetectTime": "2023-10-30T14:06:47.174395+02:00", "EventTime": "2023-10-30T14:06:47.174415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3ywDf33d0VUMWD2Fb"]} -{"Format": "IDEA0", "ID": "0995d09b-e816-423b-a2fc-50b7e5596f23", "DetectTime": "2023-10-30T14:06:47.229745+02:00", "EventTime": "2023-10-30T14:06:47.229764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CT50fY2gHAMCNz6cz4"]} -{"Format": "IDEA0", "ID": "59e6d554-a4ee-42ae-934d-87d0daacc2f6", "DetectTime": "2023-10-30T14:06:47.283342+02:00", "EventTime": "2023-10-30T14:06:47.283369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CcHFiiRMSBVgpmFRb"]} -{"Format": "IDEA0", "ID": "de5055bd-7b79-43fc-8714-f048402b7a9e", "DetectTime": "2023-10-30T14:06:47.309988+02:00", "EventTime": "2023-10-30T14:06:47.310008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C4CLr91foNkUsjDMll"]} -{"Format": "IDEA0", "ID": "a6495bdc-ad93-4284-acf5-eda1d34097c1", "DetectTime": "2023-10-30T14:06:47.363734+02:00", "EventTime": "2023-10-30T14:06:47.363760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CdKutgbaKGm7DLJhk"]} -{"Format": "Json", "ID": "a6495bdc-ad93-4284-acf5-eda1d34097c1", "DetectTime": "2023-10-30T14:06:47.363734+02:00", "EventTime": "2023-10-30T14:06:47.363760+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:19:41.675553+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:47.552858)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ee2dec47-b74e-4d72-aec2-1f9d48ac963f", "DetectTime": "2023-10-30T14:06:47.559208+02:00", "EventTime": "2023-10-30T14:06:47.559229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["C9K5P746wwtCPEEIP5"]} -{"Format": "IDEA0", "ID": "b7b03594-1440-4f19-abeb-af2544420c04", "DetectTime": "2023-10-30T14:06:47.616268+02:00", "EventTime": "2023-10-30T14:06:47.616292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CymKAv3Rj8yE3yksck"]} -{"Format": "IDEA0", "ID": "4a99251e-36ff-4502-8358-38b7a6043e56", "DetectTime": "2023-10-30T14:06:47.673211+02:00", "EventTime": "2023-10-30T14:06:47.673239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cwyw5Q3lalyP5q9Xbl"]} -{"Format": "IDEA0", "ID": "4150d005-c0ab-43ff-a6b9-05ee09897ae6", "DetectTime": "2023-10-30T14:06:47.725613+02:00", "EventTime": "2023-10-30T14:06:47.725636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CbeFTdL9m9wS7ws6e"]} -{"Format": "IDEA0", "ID": "ad105dbf-f8fa-4285-982e-380053e165d2", "DetectTime": "2023-10-30T14:06:47.777891+02:00", "EventTime": "2023-10-30T14:06:47.777920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["COLUdv3biJlvwQC227"]} -{"Format": "IDEA0", "ID": "89debae5-85d6-4e64-a6c5-143913f91611", "DetectTime": "2023-10-30T14:06:47.829939+02:00", "EventTime": "2023-10-30T14:06:47.829956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Ck1FNW3YRmB6H2Y4d1"]} -{"Format": "IDEA0", "ID": "243daf91-be5d-441c-b1f4-7f8c3993f0cb", "DetectTime": "2023-10-30T14:06:47.890044+02:00", "EventTime": "2023-10-30T14:06:47.890070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["ChufOs2OdJ6chgPXod"]} -{"Format": "IDEA0", "ID": "56177de2-8833-4cf7-9690-4e870d8f0d8e", "DetectTime": "2023-10-30T14:06:47.939480+02:00", "EventTime": "2023-10-30T14:06:47.939491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CjSszs3xJKiAw1Hybf"]} -{"Format": "Json", "ID": "56177de2-8833-4cf7-9690-4e870d8f0d8e", "DetectTime": "2023-10-30T14:06:47.939480+02:00", "EventTime": "2023-10-30T14:06:47.939491+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:20:00.786001+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:48.025954)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31cb103e-3670-40b9-b450-3e03549245bb", "DetectTime": "2023-10-30T14:06:48.031679+02:00", "EventTime": "2023-10-30T14:06:48.031696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CvmB1k4qblVIw1usT3"]} -{"Format": "IDEA0", "ID": "e3456a68-4009-46ba-aa12-d89f038589a5", "DetectTime": "2023-10-30T14:06:48.081209+02:00", "EventTime": "2023-10-30T14:06:48.081221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CMQCHM3lLA1YEb5pel"]} -{"Format": "IDEA0", "ID": "533814f7-077d-4917-ac6f-0c9b0dff50e3", "DetectTime": "2023-10-30T14:06:48.130306+02:00", "EventTime": "2023-10-30T14:06:48.130319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["C2gbQR33N7qqL3y0m3"]} -{"Format": "IDEA0", "ID": "18daac88-4054-436f-b916-982b75a84dfa", "DetectTime": "2023-10-30T14:06:48.176938+02:00", "EventTime": "2023-10-30T14:06:48.176955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C3CjPc3GzJOKWDzgmd"]} -{"Format": "IDEA0", "ID": "9279e9fc-2a79-4ec3-b090-9e1a3eb645bc", "DetectTime": "2023-10-30T14:06:48.224607+02:00", "EventTime": "2023-10-30T14:06:48.224620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CSOtKR1nGQcVEtyAs2"]} -{"Format": "IDEA0", "ID": "2e63a1c0-99bf-4559-b156-52fdc97ad5cf", "DetectTime": "2023-10-30T14:06:48.275025+02:00", "EventTime": "2023-10-30T14:06:48.275056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["Cu8WHd3tGeutMvrC62"]} -{"Format": "IDEA0", "ID": "ac845cca-b013-4aff-9ec8-8bf9c9c84460", "DetectTime": "2023-10-30T14:06:48.322582+02:00", "EventTime": "2023-10-30T14:06:48.322612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CSFJ0T10iUbEWraW04"]} -{"Format": "IDEA0", "ID": "e169989c-7598-41d2-8d00-284f64fa4bd1", "DetectTime": "2023-10-30T14:06:48.369805+02:00", "EventTime": "2023-10-30T14:06:48.369818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["Cz63QF2d1dzLGQl9s"]} -{"Format": "Json", "ID": "e169989c-7598-41d2-8d00-284f64fa4bd1", "DetectTime": "2023-10-30T14:06:48.369805+02:00", "EventTime": "2023-10-30T14:06:48.369818+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:20:53.709749+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:48.461385)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "147dde16-3455-4996-9180-11b6821cbd0c", "DetectTime": "2023-10-30T14:06:48.467035+02:00", "EventTime": "2023-10-30T14:06:48.467051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["Coq3Qz4qvK1NgySj12"]} -{"Format": "IDEA0", "ID": "8ac54fd9-437f-4f9e-96cf-112fc97e915f", "DetectTime": "2023-10-30T14:06:48.512142+02:00", "EventTime": "2023-10-30T14:06:48.512163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. ", "ContentType": "text/plain"}], "uids": ["Cl2HIaruP89FEVrp"]} -{"Format": "IDEA0", "ID": "002ad76f-5376-420c-a561-4f04b4deacdc", "DetectTime": "2023-10-30T14:06:48.559435+02:00", "EventTime": "2023-10-30T14:06:48.559452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4507/UDP destination IP 84.151.242.149. ", "ContentType": "text/plain"}], "uids": ["CWa8561UFRqfNWXAl"]} -{"Format": "IDEA0", "ID": "97aab169-38db-4528-b535-47a31112c4a9", "DetectTime": "2023-10-30T14:06:48.606023+02:00", "EventTime": "2023-10-30T14:06:48.606046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CCxJcn13NmqYkqC32k"]} -{"Format": "IDEA0", "ID": "a9a2d561-0df6-4fb5-ab54-2fcad4cde270", "DetectTime": "2023-10-30T14:06:48.653577+02:00", "EventTime": "2023-10-30T14:06:48.653609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["C135a42HsMfIagrV43"]} -{"Format": "IDEA0", "ID": "0cf38aa3-7ab6-4488-a093-e229c57e433b", "DetectTime": "2023-10-30T14:06:48.700677+02:00", "EventTime": "2023-10-30T14:06:48.700693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CiUaUp3I8WsNnzJIHc"]} -{"Format": "IDEA0", "ID": "0940b0ee-c9d1-4292-822a-32022c44bfe1", "DetectTime": "2023-10-30T14:06:48.841928+02:00", "EventTime": "2023-10-30T14:06:48.841950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C22xwG4QLfOt0dA948"]} -{"Format": "IDEA0", "ID": "5258148a-96bd-4f9f-999a-a6d5868a9df4", "DetectTime": "2023-10-30T14:06:48.880548+02:00", "EventTime": "2023-10-30T14:06:48.880568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["C3rXSP2da7DlruKFZ5"]} -{"Format": "IDEA0", "ID": "ea13411d-9a17-4398-8706-cca7c09d2255", "DetectTime": "2023-10-30T14:06:48.945415+02:00", "EventTime": "2023-10-30T14:06:48.945444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. ", "ContentType": "text/plain"}], "uids": ["CmnAhF3cEisw2umvec"]} -{"Format": "Json", "ID": "ea13411d-9a17-4398-8706-cca7c09d2255", "DetectTime": "2023-10-30T14:06:48.945415+02:00", "EventTime": "2023-10-30T14:06:48.945444+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:20:55.898571+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:49.043850)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "67c2b0f0-8325-41a9-a66a-c63430b432bc", "DetectTime": "2023-10-30T14:06:49.050904+02:00", "EventTime": "2023-10-30T14:06:49.050927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28328], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["Ca5bAO2wJiFGnx8CXi"]} -{"Format": "IDEA0", "ID": "693fa532-5b07-4d63-bb05-77aedd930b4b", "DetectTime": "2023-10-30T14:06:49.134380+02:00", "EventTime": "2023-10-30T14:06:49.134402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["CvqNRi1gVPXBcmjMJ2"]} -{"Format": "IDEA0", "ID": "0716d866-e325-47aa-94ea-0bd3e2f7eddb", "DetectTime": "2023-10-30T14:06:49.211909+02:00", "EventTime": "2023-10-30T14:06:49.211929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CFfhKI2IfY4WdPQ1"]} -{"Format": "IDEA0", "ID": "378f03e0-f54d-4953-80a1-b8872571c427", "DetectTime": "2023-10-30T14:06:49.292594+02:00", "EventTime": "2023-10-30T14:06:49.292615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. ", "ContentType": "text/plain"}], "uids": ["CuuC25ybiXT7Qsjb8"]} -{"Format": "IDEA0", "ID": "076b7918-b725-468d-9bf8-205a0525b0c6", "DetectTime": "2023-10-30T14:06:49.374954+02:00", "EventTime": "2023-10-30T14:06:49.374974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CQb7gSb3aRwe5c6Ge"]} -{"Format": "IDEA0", "ID": "31c863f9-45fc-4e58-8df8-bdd0a40ac621", "DetectTime": "2023-10-30T14:06:49.429118+02:00", "EventTime": "2023-10-30T14:06:49.429134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. ", "ContentType": "text/plain"}], "uids": ["Ch1S1DYzOPSnc4f6i"]} -{"Format": "IDEA0", "ID": "a959d8df-3c84-4e2e-b36f-2560f78ae83e", "DetectTime": "2023-10-30T14:06:49.487406+02:00", "EventTime": "2023-10-30T14:06:49.487435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. ", "ContentType": "text/plain"}], "uids": ["C4oW2u450hScHrFY1d"]} -{"Format": "IDEA0", "ID": "f1fc76b0-d8d0-4fa8-b1c1-22089ad9cad2", "DetectTime": "2023-10-30T14:06:49.541143+02:00", "EventTime": "2023-10-30T14:06:49.541161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoIv9p1SzZh2P1809h"]} -{"Format": "Json", "ID": "f1fc76b0-d8d0-4fa8-b1c1-22089ad9cad2", "DetectTime": "2023-10-30T14:06:49.541143+02:00", "EventTime": "2023-10-30T14:06:49.541161+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-05T01:42:50.469222+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:49.635625)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31d78a7f-a695-4b47-b250-cbfc0ea37899", "DetectTime": "2023-10-30T14:06:49.643118+02:00", "EventTime": "2023-10-30T14:06:49.643145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["C6BPjYnjLTmMxmwv4"]} -{"Format": "IDEA0", "ID": "2283e7ca-a6c9-4343-aaa2-e082840e781b", "DetectTime": "2023-10-30T14:06:49.697379+02:00", "EventTime": "2023-10-30T14:06:49.697395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9616], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. ", "ContentType": "text/plain"}], "uids": ["CUZzd217iL66nV7Yw9"]} -{"Format": "IDEA0", "ID": "efa44ec9-5b2a-4446-93f7-6abd0fcd3c9b", "DetectTime": "2023-10-30T14:06:49.746445+02:00", "EventTime": "2023-10-30T14:06:49.746465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["C90vzt4DR4EROrD8cl"]} -{"Format": "IDEA0", "ID": "28b361d2-52bf-4de5-8793-e8c8ad979ba1", "DetectTime": "2023-10-30T14:06:49.778952+02:00", "EventTime": "2023-10-30T14:06:49.778975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CfItbEenPe1jiarF7"]} -{"Format": "IDEA0", "ID": "e0ec9072-43aa-4d0a-8d4f-356b5564f9ad", "DetectTime": "2023-10-30T14:06:49.829592+02:00", "EventTime": "2023-10-30T14:06:49.829611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CBF60D3JRoGf0h36vb"]} -{"Format": "IDEA0", "ID": "ed0020b6-3c25-4b7c-984e-d1b05978aea3", "DetectTime": "2023-10-30T14:06:49.881924+02:00", "EventTime": "2023-10-30T14:06:49.881946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cm2mwJ2IaXGPin3Ew2"]} -{"Format": "IDEA0", "ID": "ac341482-bc60-4647-9e9b-c9ceff12c921", "DetectTime": "2023-10-30T14:06:49.931373+02:00", "EventTime": "2023-10-30T14:06:49.931392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5060], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. ", "ContentType": "text/plain"}], "uids": ["CPXysa4eahS6wjAdn8"]} -{"Format": "IDEA0", "ID": "032148a6-aac3-4719-988a-05d6d8749526", "DetectTime": "2023-10-30T14:06:49.987308+02:00", "EventTime": "2023-10-30T14:06:49.987335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CSQQA5hKSAeNz6MNi"]} -{"Format": "IDEA0", "ID": "164ee917-8fca-4209-bf12-883419fd2e2f", "DetectTime": "2023-10-30T14:06:50.041933+02:00", "EventTime": "2023-10-30T14:06:50.041961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBSeFg1zCNhtXRbnrg"]} -{"Format": "Json", "ID": "164ee917-8fca-4209-bf12-883419fd2e2f", "DetectTime": "2023-10-30T14:06:50.041933+02:00", "EventTime": "2023-10-30T14:06:50.041961+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:54:49.543267+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:50.135872)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6327e55-0143-43dc-a1b8-8fa44887b4f2", "DetectTime": "2023-10-30T14:06:50.143549+02:00", "EventTime": "2023-10-30T14:06:50.143567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CCDi4pMqajrKoS9q7"]} -{"Format": "IDEA0", "ID": "54862940-7a45-4492-a97e-2c04bbd86d2d", "DetectTime": "2023-10-30T14:06:50.197253+02:00", "EventTime": "2023-10-30T14:06:50.197273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CGeK4e2t2IgQwgXeH3"]} -{"Format": "IDEA0", "ID": "13ef3bb2-d84a-4d9f-a036-55394ec0cee3", "DetectTime": "2023-10-30T14:06:50.251484+02:00", "EventTime": "2023-10-30T14:06:50.251501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CmMDZi4aVrhzxpiSme"]} -{"Format": "IDEA0", "ID": "ba120296-cd7e-4f8c-adb0-7acc0cd49045", "DetectTime": "2023-10-30T14:06:50.299299+02:00", "EventTime": "2023-10-30T14:06:50.299319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CbaNJB3yA3L7WhK1i7"]} -{"Format": "IDEA0", "ID": "c0ad6d53-a46b-4aec-a2ce-e2661d492aba", "DetectTime": "2023-10-30T14:06:50.348056+02:00", "EventTime": "2023-10-30T14:06:50.348086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CkclcY3hP8GQ4nPZJk"]} -{"Format": "IDEA0", "ID": "82a4a864-4bd8-45c7-ae27-c8534510e538", "DetectTime": "2023-10-30T14:06:50.394774+02:00", "EventTime": "2023-10-30T14:06:50.394832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CAQNsQ1iyjKPMW9nXg"]} -{"Format": "IDEA0", "ID": "5ec55682-f527-47e5-8174-5a7e3dc2e770", "DetectTime": "2023-10-30T14:06:50.462998+02:00", "EventTime": "2023-10-30T14:06:50.463017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CCm4sa4arRE2Qo7us"]} -{"Format": "IDEA0", "ID": "5096d83e-b39e-42ce-9503-d2f3c85fad02", "DetectTime": "2023-10-30T14:06:50.511378+02:00", "EventTime": "2023-10-30T14:06:50.511390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CeAzBl2cGvlaqQG3T4"]} -{"Format": "Json", "ID": "5096d83e-b39e-42ce-9503-d2f3c85fad02", "DetectTime": "2023-10-30T14:06:50.511378+02:00", "EventTime": "2023-10-30T14:06:50.511390+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:55:27.020848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:50.600369)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "493a76c1-258e-46fd-bb20-d3d69d7247ea", "DetectTime": "2023-10-30T14:06:50.606866+02:00", "EventTime": "2023-10-30T14:06:50.606887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CrQdP231Vrzh7ubsag"]} -{"Format": "IDEA0", "ID": "97bb7ff5-0c3d-4b27-8630-3e4afff67065", "DetectTime": "2023-10-30T14:06:50.646695+02:00", "EventTime": "2023-10-30T14:06:50.646723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. ", "ContentType": "text/plain"}], "uids": ["CRSqIO2cXPqAlRCqDf"]} -{"Format": "IDEA0", "ID": "b44464b3-6bf5-4782-a172-b0c162c1f117", "DetectTime": "2023-10-30T14:06:50.682896+02:00", "EventTime": "2023-10-30T14:06:50.682924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CGyi1J1YcSG7OgZ7I"]} -{"Format": "IDEA0", "ID": "e89f38ec-0a98-4fd4-9dba-9d368b13380a", "DetectTime": "2023-10-30T14:06:50.717683+02:00", "EventTime": "2023-10-30T14:06:50.717699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CYzSa7k4mUVeQ3tM6"]} -{"Format": "IDEA0", "ID": "ad011f66-f954-40e9-a4e0-e1f851d2705f", "DetectTime": "2023-10-30T14:06:50.837212+02:00", "EventTime": "2023-10-30T14:06:50.837260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["C1BpHBfl5XomMUh8j"]} -{"Format": "IDEA0", "ID": "ad3d5523-faca-4895-90b5-39d0179c471a", "DetectTime": "2023-10-30T14:06:50.884545+02:00", "EventTime": "2023-10-30T14:06:50.884564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CpO80j2Lx5y7e1izca"]} -{"Format": "IDEA0", "ID": "743d240e-d756-40fc-a003-e8e338cbefb4", "DetectTime": "2023-10-30T14:06:50.925686+02:00", "EventTime": "2023-10-30T14:06:50.925705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CwEcxO19undrGja"]} -{"Format": "IDEA0", "ID": "21971714-9957-4a6d-992d-a55608e8726d", "DetectTime": "2023-10-30T14:06:50.971159+02:00", "EventTime": "2023-10-30T14:06:50.971176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. ", "ContentType": "text/plain"}], "uids": ["CvWM4M1CStaMHvZq7h"]} -{"Format": "Json", "ID": "21971714-9957-4a6d-992d-a55608e8726d", "DetectTime": "2023-10-30T14:06:50.971159+02:00", "EventTime": "2023-10-30T14:06:50.971176+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T01:55:44.842857+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2023/10/30 14:06:51.054668)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0ecec279-cd8b-40b3-b371-48bd2fc57bf0", "DetectTime": "2023-10-30T14:06:51.062641+02:00", "EventTime": "2023-10-30T14:06:51.062666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28328], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CH8LRN237HFdZh0lEg"]} -{"Format": "IDEA0", "ID": "1ac0f874-bea9-4691-93dd-5455c8748213", "DetectTime": "2023-10-30T14:06:51.110199+02:00", "EventTime": "2023-10-30T14:06:51.110221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["Cvbhp51ShNKT0Okihd"]} -{"Format": "IDEA0", "ID": "93212ced-ffff-401d-9898-11ba1dcbf9de", "DetectTime": "2023-10-30T14:06:51.156077+02:00", "EventTime": "2023-10-30T14:06:51.156095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CZXz7049xQsLgqkRy9"]} -{"Format": "IDEA0", "ID": "6535e8ba-2f9c-4149-ab0c-f866152c7691", "DetectTime": "2023-10-30T14:06:51.198469+02:00", "EventTime": "2023-10-30T14:06:51.198491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CJctKe1K4LMfhyfYni"]} -{"Format": "IDEA0", "ID": "773a6f45-a7ee-4065-879c-67e52763ef27", "DetectTime": "2023-10-30T14:06:51.235271+02:00", "EventTime": "2023-10-30T14:06:51.235292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8730], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. ", "ContentType": "text/plain"}], "uids": ["CGm3GY93zhfdAqlpg"]} -{"Format": "IDEA0", "ID": "53c5d963-2efb-4a37-bccb-c99bcb7e8b39", "DetectTime": "2023-10-30T14:06:51.275746+02:00", "EventTime": "2023-10-30T14:06:51.275764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CgG42t4AbumFgpg3Vh"]} -{"Format": "IDEA0", "ID": "aef8865f-5259-4039-a006-9b1129d3e491", "DetectTime": "2023-10-30T14:06:51.315374+02:00", "EventTime": "2023-10-30T14:06:51.315392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. ", "ContentType": "text/plain"}], "uids": ["CtEYxu4H77VCr8osl7"]} -{"Format": "IDEA0", "ID": "a1880f42-91b0-4f59-be8b-349d4c3a7aa7", "DetectTime": "2023-10-30T14:06:51.353694+02:00", "EventTime": "2023-10-30T14:06:51.353717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXf0fyArsJhTwQ4sg"]} -{"Format": "IDEA0", "ID": "55fd8aae-dc4c-4d06-96e7-1074c1652fe3", "DetectTime": "2023-10-30T14:06:51.404319+02:00", "EventTime": "2023-10-30T14:06:51.404338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CJRS5x41ipBxA4s8Yl"]} -{"Format": "IDEA0", "ID": "500376ec-1473-4760-98aa-11e4d9db2dac", "DetectTime": "2023-10-30T14:06:51.455436+02:00", "EventTime": "2023-10-30T14:06:51.455464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CR3djW3U6J5exRb24l"]} -{"Format": "IDEA0", "ID": "76dd11a6-1e9f-4ca7-b95a-90d6e405cee8", "DetectTime": "2023-10-30T14:06:51.505723+02:00", "EventTime": "2023-10-30T14:06:51.505744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18069], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. ", "ContentType": "text/plain"}], "uids": ["Czgazz5iSex4gIWc6"]} -{"Format": "IDEA0", "ID": "3a1cd3f7-ef79-4494-8976-82eaffa4c6d2", "DetectTime": "2023-10-30T14:06:51.555339+02:00", "EventTime": "2023-10-30T14:06:51.555361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CgTZWYmnDHmUQcEL3"]} -{"Format": "IDEA0", "ID": "bf457655-41c0-48c0-8127-098fc9f02b16", "DetectTime": "2023-10-30T14:06:51.605699+02:00", "EventTime": "2023-10-30T14:06:51.605724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CiV1DoSqXJtPvsY69"]} -{"Format": "Json", "ID": "bf457655-41c0-48c0-8127-098fc9f02b16", "DetectTime": "2023-10-30T14:06:51.605699+02:00", "EventTime": "2023-10-30T14:06:51.605724+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:26:51.970859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:51.753827)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a686d0ef-d2b2-41f5-addb-e10596fbd7b9", "DetectTime": "2023-10-30T14:06:51.761756+02:00", "EventTime": "2023-10-30T14:06:51.761770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cj6LXq3NWqcdo4YqLg"]} -{"Format": "IDEA0", "ID": "b108b02e-7c7b-4e32-9129-873b722b1de3", "DetectTime": "2023-10-30T14:06:51.814799+02:00", "EventTime": "2023-10-30T14:06:51.814828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CZYFzv3xXBjl1F0eSh"]} -{"Format": "IDEA0", "ID": "124360ac-a0aa-40de-8b13-315dbfbc9b5f", "DetectTime": "2023-10-30T14:06:51.867682+02:00", "EventTime": "2023-10-30T14:06:51.867698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CLlBT25XszEQ7BQM9"]} -{"Format": "IDEA0", "ID": "920a12cc-07af-4b8b-88c3-2f758fa3717a", "DetectTime": "2023-10-30T14:06:51.920303+02:00", "EventTime": "2023-10-30T14:06:51.920319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CWNLK82uhivOfsz72l"]} -{"Format": "IDEA0", "ID": "acdd8c52-c249-4d2a-8c81-5af0eccff4dd", "DetectTime": "2023-10-30T14:06:51.968650+02:00", "EventTime": "2023-10-30T14:06:51.968676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cxt52Nw71Oi1eilEh"]} -{"Format": "IDEA0", "ID": "88fc93e0-9f91-4914-8bbe-d2d3c4d4c794", "DetectTime": "2023-10-30T14:06:52.016871+02:00", "EventTime": "2023-10-30T14:06:52.016897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CTVaMY2rgkMWh3T1G8"]} -{"Format": "IDEA0", "ID": "e58adb77-6dde-4266-90dc-9d1803f8927d", "DetectTime": "2023-10-30T14:06:52.074266+02:00", "EventTime": "2023-10-30T14:06:52.074290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["Cu2Aqn4XUwnVlBbxy9"]} -{"Format": "IDEA0", "ID": "688f6f06-dd96-4626-8f22-17c8d2727110", "DetectTime": "2023-10-30T14:06:52.120890+02:00", "EventTime": "2023-10-30T14:06:52.120919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CCAxqRSuQLBlpGzG2"]} -{"Format": "Json", "ID": "688f6f06-dd96-4626-8f22-17c8d2727110", "DetectTime": "2023-10-30T14:06:52.120890+02:00", "EventTime": "2023-10-30T14:06:52.120919+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:27:31.378869+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:52.214882)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6ff5b301-803b-428b-a4d3-fe4973b681ce", "DetectTime": "2023-10-30T14:06:52.220628+02:00", "EventTime": "2023-10-30T14:06:52.220646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CWydWY2nmODNxqvqz7"]} -{"Format": "IDEA0", "ID": "3fda16dc-881e-4809-81ae-b546ab17b1c7", "DetectTime": "2023-10-30T14:06:52.273011+02:00", "EventTime": "2023-10-30T14:06:52.273036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CMa0Dv2o0wgb9jwjY9"]} -{"Format": "IDEA0", "ID": "64c4c7ee-7c0b-43c2-ab80-965f1eaececf", "DetectTime": "2023-10-30T14:06:52.319729+02:00", "EventTime": "2023-10-30T14:06:52.319744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CO4JZb3AJYyLaMbtu8"]} -{"Format": "IDEA0", "ID": "f8655f01-3135-4de2-8858-fe31601e98a1", "DetectTime": "2023-10-30T14:06:52.366997+02:00", "EventTime": "2023-10-30T14:06:52.367030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["Cpcvoa4WeKGCF8hHWh"]} -{"Format": "IDEA0", "ID": "38dd6c8b-f0b3-465a-bb2a-566e2976dac3", "DetectTime": "2023-10-30T14:06:52.411746+02:00", "EventTime": "2023-10-30T14:06:52.411773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. ", "ContentType": "text/plain"}], "uids": ["CFtUlH1eFm9fFY5mNa"]} -{"Format": "IDEA0", "ID": "1c7e4dcd-6d0b-4a43-830e-0ae2b29466b8", "DetectTime": "2023-10-30T14:06:52.463898+02:00", "EventTime": "2023-10-30T14:06:52.463922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CIoVoI3lbYPbSxbQLh"]} -{"Format": "IDEA0", "ID": "4847075d-2c2e-4d18-bde3-39a73b9858e8", "DetectTime": "2023-10-30T14:06:52.525637+02:00", "EventTime": "2023-10-30T14:06:52.525657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CnGHFQ1cPLSn1pL7S"]} -{"Format": "IDEA0", "ID": "8ea96132-d193-4102-b988-95b1290e1455", "DetectTime": "2023-10-30T14:06:52.582598+02:00", "EventTime": "2023-10-30T14:06:52.582618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CFVSQc1rf3p8cdBUa8"]} -{"Format": "Json", "ID": "8ea96132-d193-4102-b988-95b1290e1455", "DetectTime": "2023-10-30T14:06:52.582598+02:00", "EventTime": "2023-10-30T14:06:52.582618+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:27:33.484208+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:52.661165)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "67bcc148-1d0b-4468-9cda-1a5b61827c31", "DetectTime": "2023-10-30T14:06:52.666949+02:00", "EventTime": "2023-10-30T14:06:52.666968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CYbSN92uai2YOXvTo9"]} -{"Format": "IDEA0", "ID": "b0e77e1f-2df2-405e-9258-bfdf2fb91633", "DetectTime": "2023-10-30T14:06:52.708304+02:00", "EventTime": "2023-10-30T14:06:52.708319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28328], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CaxKkh38Qp91QfM0Vb"]} -{"Format": "IDEA0", "ID": "b8400bd5-09a6-4ffd-ad49-6a2c7b82da6a", "DetectTime": "2023-10-30T14:06:52.747389+02:00", "EventTime": "2023-10-30T14:06:52.747418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. ", "ContentType": "text/plain"}], "uids": ["CMttBd1zeYF2Dxv7pg"]} -{"Format": "IDEA0", "ID": "083fa3c1-d50f-4fd6-9f3f-cc5e37935aa2", "DetectTime": "2023-10-30T14:06:52.786484+02:00", "EventTime": "2023-10-30T14:06:52.786508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CPHFgY7aBHAsLr4ml"]} -{"Format": "IDEA0", "ID": "e65f83ed-1cfb-4be1-9857-5f2efd897b35", "DetectTime": "2023-10-30T14:06:52.824517+02:00", "EventTime": "2023-10-30T14:06:52.824535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["Cgzvw63G2ZVnp0p95g"]} -{"Format": "IDEA0", "ID": "e2c9f6cb-73a6-4c2d-ba59-56c6b5cd5fdb", "DetectTime": "2023-10-30T14:06:52.866843+02:00", "EventTime": "2023-10-30T14:06:52.866863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CZfk1sUSTOkwEeYq6"]} -{"Format": "IDEA0", "ID": "0166098a-e8c4-446e-ab10-a1eb2f25e899", "DetectTime": "2023-10-30T14:06:52.899615+02:00", "EventTime": "2023-10-30T14:06:52.899632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CpgOny2z1xVjkdtml3"]} -{"Format": "IDEA0", "ID": "20c88a42-2d81-4629-b129-bb4503c136aa", "DetectTime": "2023-10-30T14:06:52.943836+02:00", "EventTime": "2023-10-30T14:06:52.943865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. ", "ContentType": "text/plain"}], "uids": ["CspVG63Ne6HWcVXG65"]} -{"Format": "Json", "ID": "20c88a42-2d81-4629-b129-bb4503c136aa", "DetectTime": "2023-10-30T14:06:52.943836+02:00", "EventTime": "2023-10-30T14:06:52.943865+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:27:53.294827+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:53.023542)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b14ffac4-1585-4ce9-965d-ea76930a9241", "DetectTime": "2023-10-30T14:06:53.029903+02:00", "EventTime": "2023-10-30T14:06:53.029918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CBeHtd4Ev99tpsXpIb"]} -{"Format": "IDEA0", "ID": "d5ea61b8-2441-4b9c-b579-2101588f6b83", "DetectTime": "2023-10-30T14:06:53.060685+02:00", "EventTime": "2023-10-30T14:06:53.060707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEb9GM1SowEYPrTnGg"]} -{"Format": "IDEA0", "ID": "6d88889f-9719-4198-912f-19395dc59088", "DetectTime": "2023-10-30T14:06:53.101097+02:00", "EventTime": "2023-10-30T14:06:53.101139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CSk3BZ1Y9KWFuL3Ynj"]} -{"Format": "IDEA0", "ID": "f8dc57e6-a377-4944-9469-fce89143a31b", "DetectTime": "2023-10-30T14:06:53.134652+02:00", "EventTime": "2023-10-30T14:06:53.134666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["C5hPvy49HqjxxmdlVj"]} -{"Format": "IDEA0", "ID": "c4cd8448-a85e-415c-9e17-4d2d80dad579", "DetectTime": "2023-10-30T14:06:53.170547+02:00", "EventTime": "2023-10-30T14:06:53.170568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["CfXbZsOF72PVJv7zd"]} -{"Format": "IDEA0", "ID": "3eda90e4-7e5f-4d13-845e-1c81de6390ab", "DetectTime": "2023-10-30T14:06:53.206075+02:00", "EventTime": "2023-10-30T14:06:53.206105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CWQygD19Xje0kZ4Bm7"]} -{"Format": "IDEA0", "ID": "fbb8470b-88e8-4989-95fa-e0c365874bb7", "DetectTime": "2023-10-30T14:06:53.244350+02:00", "EventTime": "2023-10-30T14:06:53.244366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cq6UYY3E79vPWBXoxj"]} -{"Format": "IDEA0", "ID": "f8132bff-2078-4304-ad09-20d1b3e28fd9", "DetectTime": "2023-10-30T14:06:53.277981+02:00", "EventTime": "2023-10-30T14:06:53.278005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CMOy5F2Eo2WVIvCdoh"]} -{"Format": "IDEA0", "ID": "75fff354-47e1-494d-a187-6558e03dfe0c", "DetectTime": "2023-10-30T14:06:53.314962+02:00", "EventTime": "2023-10-30T14:06:53.314976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CUWM8q333H9qGzbkqk"]} -{"Format": "Json", "ID": "75fff354-47e1-494d-a187-6558e03dfe0c", "DetectTime": "2023-10-30T14:06:53.314962+02:00", "EventTime": "2023-10-30T14:06:53.314976+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:59:42.865498+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:53.388190)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6e69a69c-435c-465e-9925-26fad01db335", "DetectTime": "2023-10-30T14:06:53.394861+02:00", "EventTime": "2023-10-30T14:06:53.394882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["Cwrgd24ESDpp3oeFXg"]} -{"Format": "IDEA0", "ID": "1c91d34f-14a3-4cc3-938a-5cebcca7fd92", "DetectTime": "2023-10-30T14:06:53.433990+02:00", "EventTime": "2023-10-30T14:06:53.434013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CKazRW1vxBhkup3iV4"]} -{"Format": "IDEA0", "ID": "91b8c7b6-f2e8-4e74-b830-9f63dc825c72", "DetectTime": "2023-10-30T14:06:53.466744+02:00", "EventTime": "2023-10-30T14:06:53.466761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cu7BKXWlwyxC2M4qh"]} -{"Format": "IDEA0", "ID": "08ad1eff-63cd-4b01-a2a2-81fe6da50a89", "DetectTime": "2023-10-30T14:06:53.501036+02:00", "EventTime": "2023-10-30T14:06:53.501057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C8IA3U2y504fywZc8l"]} -{"Format": "IDEA0", "ID": "da76b6e8-f454-475e-a54f-96dcf06901ac", "DetectTime": "2023-10-30T14:06:53.538271+02:00", "EventTime": "2023-10-30T14:06:53.538342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CuDneD4BAJibxJ8za8"]} -{"Format": "IDEA0", "ID": "d2746891-a529-4b26-ad3a-cbe845d8cff7", "DetectTime": "2023-10-30T14:06:53.567866+02:00", "EventTime": "2023-10-30T14:06:53.567882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["C7YAGg4ZLD7zqlq0hl"]} -{"Format": "IDEA0", "ID": "779a47c8-25eb-484a-9b13-a9434ac3c156", "DetectTime": "2023-10-30T14:06:53.604838+02:00", "EventTime": "2023-10-30T14:06:53.604863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CwQBfw4p91JFQXAVp4"]} -{"Format": "IDEA0", "ID": "707dff4f-c632-49da-93c9-84c9b9e5dc87", "DetectTime": "2023-10-30T14:06:53.636741+02:00", "EventTime": "2023-10-30T14:06:53.636869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CcwrT34o0A50KtBvcg"]} -{"Format": "IDEA0", "ID": "fa31a420-b047-4cc9-8cb9-171108a35ad8", "DetectTime": "2023-10-30T14:06:53.669184+02:00", "EventTime": "2023-10-30T14:06:53.669202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CpnZubhWJei0gb2M1"]} -{"Format": "IDEA0", "ID": "b82e904c-12be-4fdf-bfba-74653011468b", "DetectTime": "2023-10-30T14:06:53.701349+02:00", "EventTime": "2023-10-30T14:06:53.701375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["C8C1ph3vGE7pWN2Ty7"]} -{"Format": "IDEA0", "ID": "07d1f0c9-3ab4-4855-9587-ef93223c1626", "DetectTime": "2023-10-30T14:06:53.735351+02:00", "EventTime": "2023-10-30T14:06:53.735374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["C3uHpr2SjSmtfXHLb4"]} -{"Format": "IDEA0", "ID": "244e032b-1408-4453-a9b9-ac94fef54a8e", "DetectTime": "2023-10-30T14:06:53.764768+02:00", "EventTime": "2023-10-30T14:06:53.764786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CICv5t2hNlBkKa0Bk3"]} -{"Format": "IDEA0", "ID": "2a14c81a-436c-4af5-8bd7-268e84d9ec62", "DetectTime": "2023-10-30T14:06:53.796659+02:00", "EventTime": "2023-10-30T14:06:53.796680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CI2VXp3W6KYn2cGGjc"]} -{"Format": "IDEA0", "ID": "0776b134-d553-4b92-bf8d-7a1c9e6b7794", "DetectTime": "2023-10-30T14:06:53.827988+02:00", "EventTime": "2023-10-30T14:06:53.828010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. ", "ContentType": "text/plain"}], "uids": ["C4E0gD2G9UnbF7i4W4"]} -{"Format": "Json", "ID": "0776b134-d553-4b92-bf8d-7a1c9e6b7794", "DetectTime": "2023-10-30T14:06:53.827988+02:00", "EventTime": "2023-10-30T14:06:53.828010+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4178], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:59:45.872163+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:54.016068)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b033bf1c-a038-443b-a4eb-7a900b9ebdfb", "DetectTime": "2023-10-30T14:06:54.022205+02:00", "EventTime": "2023-10-30T14:06:54.022222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["CFHCuI73OzkIAGh28"]} -{"Format": "IDEA0", "ID": "25bf97f2-7280-45b8-98cd-16bc9d651cc0", "DetectTime": "2023-10-30T14:06:54.058860+02:00", "EventTime": "2023-10-30T14:06:54.058879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["Cm7FXb45w7solRzotj"]} -{"Format": "IDEA0", "ID": "c9fd9fd5-5279-4df3-9416-70e259ad2428", "DetectTime": "2023-10-30T14:06:54.094482+02:00", "EventTime": "2023-10-30T14:06:54.094508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["Cc2f5q5BkwhBzms5d"]} -{"Format": "IDEA0", "ID": "08cb2c4a-585c-4a7d-8abc-4e6e9c0499cd", "DetectTime": "2023-10-30T14:06:54.128166+02:00", "EventTime": "2023-10-30T14:06:54.128183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C6Y0rn4u3hZMkV1bx3"]} -{"Format": "IDEA0", "ID": "4819b746-e51a-4aa8-bc65-392a40454a6d", "DetectTime": "2023-10-30T14:06:54.162663+02:00", "EventTime": "2023-10-30T14:06:54.162680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["Cwi4LPBW1t8YINBa2"]} -{"Format": "IDEA0", "ID": "8efc4141-2c9c-4d5b-ab85-c04d155799a0", "DetectTime": "2023-10-30T14:06:54.193838+02:00", "EventTime": "2023-10-30T14:06:54.193851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CFy6hj3Z1Ff17Z3WB2"]} -{"Format": "IDEA0", "ID": "dee80620-0c4d-4c1e-9271-a64a98a674d5", "DetectTime": "2023-10-30T14:06:54.226577+02:00", "EventTime": "2023-10-30T14:06:54.226594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CuFUGp45s5m7e84OK2"]} -{"Format": "IDEA0", "ID": "1d6914d3-be4d-4b36-8f57-c3bb5a4f4f96", "DetectTime": "2023-10-30T14:06:54.263445+02:00", "EventTime": "2023-10-30T14:06:54.263463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CS4iyP2uY2ENnXIoye"]} -{"Format": "IDEA0", "ID": "524bf309-73cc-44f6-9e88-adf23224bee8", "DetectTime": "2023-10-30T14:06:54.302862+02:00", "EventTime": "2023-10-30T14:06:54.302887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CpFrO5rUohvavqJzg"]} -{"Format": "IDEA0", "ID": "19857768-59a8-4228-aa8a-00e4c2b26abf", "DetectTime": "2023-10-30T14:06:54.338474+02:00", "EventTime": "2023-10-30T14:06:54.338501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CKNfHs22wJ34GjgwKa"]} -{"Format": "IDEA0", "ID": "19e23ba2-8f80-4295-aef6-270dd16293d6", "DetectTime": "2023-10-30T14:06:54.376899+02:00", "EventTime": "2023-10-30T14:06:54.376914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CXd5PTYpcxVh813d1"]} -{"Format": "IDEA0", "ID": "9bec7bc0-e782-4971-bf53-3c11525a5697", "DetectTime": "2023-10-30T14:06:54.411721+02:00", "EventTime": "2023-10-30T14:06:54.411739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["C9bMKk2BLKLeLOxbih"]} -{"Format": "IDEA0", "ID": "c1f620c6-458f-4c9b-96fd-08bd47a98617", "DetectTime": "2023-10-30T14:06:54.445288+02:00", "EventTime": "2023-10-30T14:06:54.445314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.71.187.210 ", "ContentType": "text/plain"}], "uids": ["C5bJhR3qrRGsGc4pU1"]} -{"Format": "IDEA0", "ID": "91a22547-5aec-4a0e-a184-662db2a3b531", "DetectTime": "2023-10-30T14:06:54.479495+02:00", "EventTime": "2023-10-30T14:06:54.479512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["C9inAr1vZvoOqA1gs7"]} -{"Format": "IDEA0", "ID": "26e68492-ccac-4a52-b28c-e6478262b2e3", "DetectTime": "2023-10-30T14:06:54.513714+02:00", "EventTime": "2023-10-30T14:06:54.513731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CE6t1f396gm9VQpqE7"]} -{"Format": "IDEA0", "ID": "a86f2e1b-c143-4b47-821d-14ffdbc60b87", "DetectTime": "2023-10-30T14:06:54.547073+02:00", "EventTime": "2023-10-30T14:06:54.547090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28328], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. ", "ContentType": "text/plain"}], "uids": ["CmBlCgvKf1hYCstJi"]} -{"Format": "IDEA0", "ID": "56d34e42-a654-4e96-ab8d-f91e012a0272", "DetectTime": "2023-10-30T14:06:54.581847+02:00", "EventTime": "2023-10-30T14:06:54.581863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19593], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. ", "ContentType": "text/plain"}], "uids": ["CR2LJCeb78ge9Co31"]} -{"Format": "IDEA0", "ID": "2d8ca4c2-4d78-4cdd-8574-3184491a6e6c", "DetectTime": "2023-10-30T14:06:54.613183+02:00", "EventTime": "2023-10-30T14:06:54.613209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CrwdF24pciKUYynMm3"]} -{"Format": "IDEA0", "ID": "63225a89-c8de-48f4-971d-05440c0802c9", "DetectTime": "2023-10-30T14:06:54.645395+02:00", "EventTime": "2023-10-30T14:06:54.645414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["Czxi4g3HsGBJRzf8cg"]} -{"Format": "IDEA0", "ID": "ff2a6f70-2405-47c9-a887-cc7fbb7d3d30", "DetectTime": "2023-10-30T14:06:54.677438+02:00", "EventTime": "2023-10-30T14:06:54.677457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["Cx0SEj2taWGIZEluw9"]} -{"Format": "IDEA0", "ID": "f800dd64-6ede-41bd-a997-2263152dde16", "DetectTime": "2023-10-30T14:06:54.712756+02:00", "EventTime": "2023-10-30T14:06:54.712776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["Cp5rpA1p0ntftNlVPc"]} -{"Format": "IDEA0", "ID": "3ba14e89-204e-4e82-a869-f7e2b4945ca0", "DetectTime": "2023-10-30T14:06:54.747271+02:00", "EventTime": "2023-10-30T14:06:54.747292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CyANx63M1tLDVaFzyh"]} -{"Format": "Json", "ID": "3ba14e89-204e-4e82-a869-f7e2b4945ca0", "DetectTime": "2023-10-30T14:06:54.747271+02:00", "EventTime": "2023-10-30T14:06:54.747292+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T02:59:48.964590+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2023/10/30 14:06:54.826762)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d7c670d9-7fbf-447b-8f3b-1598b859003c", "DetectTime": "2023-10-30T14:06:54.832826+02:00", "EventTime": "2023-10-30T14:06:54.832840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CJ2lZ511NRQW3a3b1g"]} -{"Format": "IDEA0", "ID": "6226b822-659a-4927-9bac-07928bc4c22a", "DetectTime": "2023-10-30T14:06:54.875358+02:00", "EventTime": "2023-10-30T14:06:54.875380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C0xQhv2ir4pSTAROij"]} -{"Format": "IDEA0", "ID": "4e111dd9-b1dc-4784-b4c0-26bdd0d382e7", "DetectTime": "2023-10-30T14:06:54.912080+02:00", "EventTime": "2023-10-30T14:06:54.912097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CubGiD13m6je7T8QP1"]} -{"Format": "IDEA0", "ID": "40a72724-4ff3-4187-b56d-61b629c75d48", "DetectTime": "2023-10-30T14:06:54.946220+02:00", "EventTime": "2023-10-30T14:06:54.946238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["C1ByMM15F2SFuFHiw4"]} -{"Format": "IDEA0", "ID": "cf7c646c-b66d-4016-bf5c-8c937edf3050", "DetectTime": "2023-10-30T14:06:54.983807+02:00", "EventTime": "2023-10-30T14:06:54.983825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C2rfXa1JLJflSX9Dcj"]} -{"Format": "IDEA0", "ID": "5d70b58d-f8c8-452e-826c-0783dcb514f4", "DetectTime": "2023-10-30T14:06:55.021514+02:00", "EventTime": "2023-10-30T14:06:55.021533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CmBY3W3VMsNatGRub4"]} -{"Format": "IDEA0", "ID": "4bdc0ff8-cf9e-48d6-896d-7955ee03c9fa", "DetectTime": "2023-10-30T14:06:55.051626+02:00", "EventTime": "2023-10-30T14:06:55.051645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C9KmoQ3NZontMVlLgg"]} -{"Format": "IDEA0", "ID": "21cae6b7-e665-457a-aaa0-df7cbd36b958", "DetectTime": "2023-10-30T14:06:55.092203+02:00", "EventTime": "2023-10-30T14:06:55.092223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["C0yJfD1S7Dl3yAso1b"]} -{"Format": "IDEA0", "ID": "f5824a68-4f0e-40d7-bb32-4f876f15fcba", "DetectTime": "2023-10-30T14:06:55.123023+02:00", "EventTime": "2023-10-30T14:06:55.123048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXwjMt4a8wZ2b2JCd5"]} -{"Format": "IDEA0", "ID": "c5513994-7a53-4b1b-b519-a8c68519745b", "DetectTime": "2023-10-30T14:06:55.155580+02:00", "EventTime": "2023-10-30T14:06:55.155597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CNBwwa4w9prLzFLDYl"]} -{"Format": "IDEA0", "ID": "93c35687-7e81-40f3-9642-1e8c530e57bb", "DetectTime": "2023-10-30T14:06:55.194375+02:00", "EventTime": "2023-10-30T14:06:55.194394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CM2jE52cFkS6OjuwL5"]} -{"Format": "IDEA0", "ID": "3151550b-485b-4958-9cb1-910ff3c77c65", "DetectTime": "2023-10-30T14:06:55.229005+02:00", "EventTime": "2023-10-30T14:06:55.229068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["Cyfdal2gXyStdiAF0b"]} -{"Format": "IDEA0", "ID": "04460577-58bc-4262-9e26-b26ed22ee3b4", "DetectTime": "2023-10-30T14:06:55.263888+02:00", "EventTime": "2023-10-30T14:06:55.263910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CSD0Kz12B8eahdPch6"]} -{"Format": "IDEA0", "ID": "5d8ca4fe-6d7e-4a3d-894e-98f9ee34f4d1", "DetectTime": "2023-10-30T14:06:55.303026+02:00", "EventTime": "2023-10-30T14:06:55.303055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CKAyRY29sBKJAr3IBd"]} -{"Format": "IDEA0", "ID": "84e81765-00db-4602-94c5-902d85eaa44f", "DetectTime": "2023-10-30T14:06:55.338886+02:00", "EventTime": "2023-10-30T14:06:55.338904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CxL6AiGh5VNQs7Eed"]} -{"Format": "IDEA0", "ID": "99c960a6-88e2-4f93-be89-7525fd52d54d", "DetectTime": "2023-10-30T14:06:55.370631+02:00", "EventTime": "2023-10-30T14:06:55.370658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C80wk23hjIMX4ddUff"]} -{"Format": "IDEA0", "ID": "042c1c30-ddfe-455f-960a-ac12d30c8a49", "DetectTime": "2023-10-30T14:06:55.406062+02:00", "EventTime": "2023-10-30T14:06:55.406078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CpiX1IcOETP3QxbPh"]} -{"Format": "IDEA0", "ID": "3532b32b-86fa-4736-80c5-3baed1da18c5", "DetectTime": "2023-10-30T14:06:55.442747+02:00", "EventTime": "2023-10-30T14:06:55.442771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CsNbNcYQhn9HsC3n1"]} -{"Format": "IDEA0", "ID": "21436e10-4974-4029-8628-15567e0e9438", "DetectTime": "2023-10-30T14:06:55.477161+02:00", "EventTime": "2023-10-30T14:06:55.477188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["C17Ce53ejdbeRZFrg5"]} -{"Format": "IDEA0", "ID": "0702de3d-2f69-4866-9b00-49a319384315", "DetectTime": "2023-10-30T14:06:55.513271+02:00", "EventTime": "2023-10-30T14:06:55.513292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CjCRocnsPk89BUt53"]} -{"Format": "IDEA0", "ID": "02bd50c5-8d85-44cc-8a48-6d0b648c4f48", "DetectTime": "2023-10-30T14:06:55.549261+02:00", "EventTime": "2023-10-30T14:06:55.549280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CoqAMi4qwF24AGSTX1"]} -{"Format": "IDEA0", "ID": "fe9aea0c-0910-4280-a743-f27d4b3cb8a2", "DetectTime": "2023-10-30T14:06:55.583828+02:00", "EventTime": "2023-10-30T14:06:55.583840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C03TL94yc6iKyFT1Uk"]} -{"Format": "IDEA0", "ID": "1b2c142a-2cd3-461a-81ea-f4680fdd0be2", "DetectTime": "2023-10-30T14:06:55.610305+02:00", "EventTime": "2023-10-30T14:06:55.610322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CphgtU1qN8MjVACzZf"]} -{"Format": "IDEA0", "ID": "2bca424d-919a-40fb-a1d7-099f04032bd6", "DetectTime": "2023-10-30T14:06:55.640664+02:00", "EventTime": "2023-10-30T14:06:55.640681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["Cd77TaS0k9UQzAFD8"]} -{"Format": "IDEA0", "ID": "ead9c1b5-c6ef-456a-a14e-27190ba4f5d4", "DetectTime": "2023-10-30T14:06:55.672760+02:00", "EventTime": "2023-10-30T14:06:55.672779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKLYS01jN194R3Weaj"]} -{"Format": "IDEA0", "ID": "dfeacf8a-cc20-476b-86a1-835f5d954829", "DetectTime": "2023-10-30T14:06:55.705356+02:00", "EventTime": "2023-10-30T14:06:55.705375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["CTUftx2HY309QgGYTl"]} -{"Format": "IDEA0", "ID": "1d2d1f54-4798-45cc-aaab-41c17567efc7", "DetectTime": "2023-10-30T14:06:55.735535+02:00", "EventTime": "2023-10-30T14:06:55.735555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["Ctuv9r34LsnLmb2ep7"]} -{"Format": "IDEA0", "ID": "63fffd90-b403-4462-aef9-d207f127d2bb", "DetectTime": "2023-10-30T14:06:55.765032+02:00", "EventTime": "2023-10-30T14:06:55.765056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CgpMjd1TdtDMLjxes"]} -{"Format": "IDEA0", "ID": "936ccb2f-9078-494f-87b5-2f4ecbd4d502", "DetectTime": "2023-10-30T14:06:55.794602+02:00", "EventTime": "2023-10-30T14:06:55.794620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CVXAsK1UhTSvDdIy5f"]} -{"Format": "IDEA0", "ID": "c2c07d1e-5eeb-474a-9d91-a7f9477be08e", "DetectTime": "2023-10-30T14:06:55.825734+02:00", "EventTime": "2023-10-30T14:06:55.825760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CgGxSb217lnPtLNNG4"]} -{"Format": "IDEA0", "ID": "3b25da96-befa-4158-9e66-2641c984cb87", "DetectTime": "2023-10-30T14:06:55.858017+02:00", "EventTime": "2023-10-30T14:06:55.858035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. ", "ContentType": "text/plain"}], "uids": ["CZMKCf3epKOFJlAA8d"]} -{"Format": "IDEA0", "ID": "b6c76d17-c13b-4999-9fcf-641593559299", "DetectTime": "2023-10-30T14:06:55.886129+02:00", "EventTime": "2023-10-30T14:06:55.886155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cc8n8h2BLuHhUzWCY6"]} -{"Format": "IDEA0", "ID": "b11075a9-d451-48f7-9bd8-9d6290712aa4", "DetectTime": "2023-10-30T14:06:55.916945+02:00", "EventTime": "2023-10-30T14:06:55.916966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["Cd1oor3kUR1L4UU9T7"]} -{"Format": "IDEA0", "ID": "7530a0ac-051f-4ad6-82c4-8ae1727d5283", "DetectTime": "2023-10-30T14:06:56.042194+02:00", "EventTime": "2023-10-30T14:06:56.042221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CT0oye2owwJJMt7Gdd"]} -{"Format": "IDEA0", "ID": "be5398f3-1569-4ab8-a934-9e89abb479a1", "DetectTime": "2023-10-30T14:06:56.078434+02:00", "EventTime": "2023-10-30T14:06:56.078451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CtbnMb2LH08lW8wVt6"]} -{"Format": "IDEA0", "ID": "f82bb89b-8100-4e8d-b72a-a204d35c46a5", "DetectTime": "2023-10-30T14:06:56.113604+02:00", "EventTime": "2023-10-30T14:06:56.113629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CgIvWT30bJ718dPmOd"]} -{"Format": "IDEA0", "ID": "5ce6edd7-c2c0-45e0-957d-18dcc1a84863", "DetectTime": "2023-10-30T14:06:56.150268+02:00", "EventTime": "2023-10-30T14:06:56.150285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CsnMA1LNg3E9BukCg"]} -{"Format": "IDEA0", "ID": "e9251110-8818-42ad-bb50-8af56a73285c", "DetectTime": "2023-10-30T14:06:56.178954+02:00", "EventTime": "2023-10-30T14:06:56.178980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTuFk8nZSYIe7R4Lc"]} -{"Format": "IDEA0", "ID": "daee2b90-f68e-4d1a-9c62-be2e152defd7", "DetectTime": "2023-10-30T14:06:56.211694+02:00", "EventTime": "2023-10-30T14:06:56.211717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.228.60 ", "ContentType": "text/plain"}], "uids": ["CuTP5W3JkMNuu3h5tg"]} -{"Format": "IDEA0", "ID": "4c64ace1-4e8a-4da3-97e8-23288c0cdd27", "DetectTime": "2023-10-30T14:06:56.240623+02:00", "EventTime": "2023-10-30T14:06:56.240651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.147.12 ", "ContentType": "text/plain"}], "uids": ["Chm7Bq1LzJzY7H6qD2"]} -{"Format": "IDEA0", "ID": "3825950c-ed52-4121-963a-950e07377ea0", "DetectTime": "2023-10-30T14:06:56.269540+02:00", "EventTime": "2023-10-30T14:06:56.269558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.33.13 ", "ContentType": "text/plain"}], "uids": ["Cblou33wFdws3WqSpa"]} -{"Format": "IDEA0", "ID": "df14ac10-c63b-4e71-8ca3-d6d1c8e5082e", "DetectTime": "2023-10-30T14:06:56.298080+02:00", "EventTime": "2023-10-30T14:06:56.298096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CKCMZZ2ndzgMEfvdSj"]} -{"Format": "IDEA0", "ID": "2992df89-9723-4f80-8fdf-9838edd61e27", "DetectTime": "2023-10-30T14:06:56.328228+02:00", "EventTime": "2023-10-30T14:06:56.328250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CuH2rw3bewCt42PYq7"]} -{"Format": "IDEA0", "ID": "df283003-c76d-4d45-980b-8a31f6f4ad5f", "DetectTime": "2023-10-30T14:06:56.358432+02:00", "EventTime": "2023-10-30T14:06:56.358462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C6js1o1ws7S6ShIina"]} -{"Format": "IDEA0", "ID": "46cbab9b-07eb-46c6-9e13-4d454e77b93e", "DetectTime": "2023-10-30T14:06:56.389629+02:00", "EventTime": "2023-10-30T14:06:56.389646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CYzyW74LoxLKbqblF4"]} -{"Format": "IDEA0", "ID": "16eaf280-c65f-4be4-9699-1b0ada6ddcc3", "DetectTime": "2023-10-30T14:06:56.420397+02:00", "EventTime": "2023-10-30T14:06:56.420424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CXBVTi48pmAiVsjn8e"]} -{"Format": "IDEA0", "ID": "8bba0c7a-32dd-4767-9f79-c7aa67f21325", "DetectTime": "2023-10-30T14:06:56.454596+02:00", "EventTime": "2023-10-30T14:06:56.454650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CBNgYV3ukwZBbcO1h6"]} -{"Format": "IDEA0", "ID": "fab637f6-02b6-44ed-893c-e6d535ffa3e1", "DetectTime": "2023-10-30T14:06:56.484805+02:00", "EventTime": "2023-10-30T14:06:56.484826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CpWZgC4npPvTKf45Hf"]} -{"Format": "IDEA0", "ID": "a6d5b251-61b3-4e9b-9a24-745d91d441c3", "DetectTime": "2023-10-30T14:06:56.517242+02:00", "EventTime": "2023-10-30T14:06:56.517268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CZsCtx3L036bdJwQu5"]} -{"Format": "IDEA0", "ID": "4a490620-d3ee-43d6-bc62-66f82044bd67", "DetectTime": "2023-10-30T14:06:56.548160+02:00", "EventTime": "2023-10-30T14:06:56.548304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CGC5WG2JtCUFA7IZga"]} -{"Format": "IDEA0", "ID": "ed340644-c1c3-4644-ab9e-27259d425e11", "DetectTime": "2023-10-30T14:06:56.578958+02:00", "EventTime": "2023-10-30T14:06:56.578981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C26AsA2EVDTajNKkwf"]} -{"Format": "IDEA0", "ID": "0f833aff-5f73-4bc6-9231-aed5af291053", "DetectTime": "2023-10-30T14:06:56.610409+02:00", "EventTime": "2023-10-30T14:06:56.610429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cky0pR3ZT3H6j2mGO7"]} -{"Format": "IDEA0", "ID": "3ed44773-a765-47b3-8be8-7bf114bc1152", "DetectTime": "2023-10-30T14:06:56.642881+02:00", "EventTime": "2023-10-30T14:06:56.642910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CmoGy42cq7nuCHhYQl"]} -{"Format": "IDEA0", "ID": "cd7d7c93-b44b-4fce-a405-3105230d25e3", "DetectTime": "2023-10-30T14:06:56.673315+02:00", "EventTime": "2023-10-30T14:06:56.673336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["Cr3vFA2lbsO638hdv6"]} -{"Format": "IDEA0", "ID": "12b9fafb-1271-42a4-bbaa-71253701e199", "DetectTime": "2023-10-30T14:06:56.704687+02:00", "EventTime": "2023-10-30T14:06:56.704703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CRlw3WeAHlkuOj8F8"]} -{"Format": "IDEA0", "ID": "f11a31c6-8618-4e29-93fb-ed59cca5029d", "DetectTime": "2023-10-30T14:06:56.731150+02:00", "EventTime": "2023-10-30T14:06:56.731170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CHlIr14LEH5QW59y4e"]} -{"Format": "IDEA0", "ID": "fdaa2d1f-a445-4d6c-803f-c7deeaab9e49", "DetectTime": "2023-10-30T14:06:56.765323+02:00", "EventTime": "2023-10-30T14:06:56.765340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CKu3s93ZPOzbSbqT6k"]} -{"Format": "IDEA0", "ID": "29c02270-0b56-4d3c-bf29-2ae8cd0e709d", "DetectTime": "2023-10-30T14:06:56.796912+02:00", "EventTime": "2023-10-30T14:06:56.796928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CGiyHu1Flo8YbGb676"]} -{"Format": "IDEA0", "ID": "04a1b2c7-4bec-4bdd-9ca0-71e78bb8d0b6", "DetectTime": "2023-10-30T14:06:56.828989+02:00", "EventTime": "2023-10-30T14:06:56.829035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8076], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. ", "ContentType": "text/plain"}], "uids": ["C7wOQc4h4mXG6svZR1"]} -{"Format": "IDEA0", "ID": "bea8288b-d675-4bf7-a237-3fb3523488f3", "DetectTime": "2023-10-30T14:06:56.859162+02:00", "EventTime": "2023-10-30T14:06:56.859179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cq82Ok2OnyI8nqWfOc"]} -{"Format": "IDEA0", "ID": "eb0abf07-6d9a-4798-9267-0ffa0611cb6b", "DetectTime": "2023-10-30T14:06:56.888849+02:00", "EventTime": "2023-10-30T14:06:56.888862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CeCiyW117d3LLGbFV5"]} -{"Format": "IDEA0", "ID": "45d76794-a48f-473f-aa9b-98e46c9d1484", "DetectTime": "2023-10-30T14:06:56.924825+02:00", "EventTime": "2023-10-30T14:06:56.924848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["Csg4L32oYjJMbOZxEf"]} -{"Format": "IDEA0", "ID": "3767aca7-5cfc-4366-845a-0966a7c76936", "DetectTime": "2023-10-30T14:06:56.953667+02:00", "EventTime": "2023-10-30T14:06:56.953690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CgDbMYDFPq5tEg7qg"]} -{"Format": "IDEA0", "ID": "3a3a5e8e-94ef-4a50-ac30-500270747521", "DetectTime": "2023-10-30T14:06:56.984719+02:00", "EventTime": "2023-10-30T14:06:56.984791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["ClHuVQKh9F3krW2j9"]} -{"Format": "IDEA0", "ID": "b847e466-4f81-430d-ac6c-9d89916be799", "DetectTime": "2023-10-30T14:06:57.013579+02:00", "EventTime": "2023-10-30T14:06:57.013610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CZ2oV21IrZ9lIovLDg"]} -{"Format": "IDEA0", "ID": "6edb820c-f273-4c97-bb0f-5bbee9af50e5", "DetectTime": "2023-10-30T14:06:57.045024+02:00", "EventTime": "2023-10-30T14:06:57.045081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CVT27d4ZWn30mL3k9h"]} -{"Format": "IDEA0", "ID": "7e74fff4-e887-439a-84b3-8a9aaf2c8133", "DetectTime": "2023-10-30T14:06:57.073776+02:00", "EventTime": "2023-10-30T14:06:57.073793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CneoV444hXZ3jFeTT5"]} -{"Format": "IDEA0", "ID": "151bc7c6-963c-4c8a-a733-97e35f4f0cee", "DetectTime": "2023-10-30T14:06:57.104608+02:00", "EventTime": "2023-10-30T14:06:57.104624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C13TRO29jJCfeQxZU5"]} -{"Format": "IDEA0", "ID": "c0936416-46ce-48a6-baf7-1a2c28692145", "DetectTime": "2023-10-30T14:06:57.135214+02:00", "EventTime": "2023-10-30T14:06:57.135239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["Cy4LD02lfYUosOBDog"]} -{"Format": "IDEA0", "ID": "f2b270a5-d36c-4bd7-abc8-a95c6ca5dfe4", "DetectTime": "2023-10-30T14:06:57.163854+02:00", "EventTime": "2023-10-30T14:06:57.163870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CdQaCu11HqbJusPP7d"]} -{"Format": "IDEA0", "ID": "0c98c58e-38f3-4f53-8b4b-dc07ed0ae068", "DetectTime": "2023-10-30T14:06:57.195233+02:00", "EventTime": "2023-10-30T14:06:57.195251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CotRdz3GRoZerE6ak"]} -{"Format": "Json", "ID": "0c98c58e-38f3-4f53-8b4b-dc07ed0ae068", "DetectTime": "2023-10-30T14:06:57.195233+02:00", "EventTime": "2023-10-30T14:06:57.195251+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T03:30:33.323608+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 98. (real time 2023/10/30 14:06:57.305076)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "06e36279-1af1-4091-9196-9861b652d823", "DetectTime": "2023-10-30T14:06:57.312446+02:00", "EventTime": "2023-10-30T14:06:57.312467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Ce61Ar23w8pm1TInA1"]} -{"Format": "IDEA0", "ID": "7d370871-64b3-46cb-bfb5-c457338fa8b9", "DetectTime": "2023-10-30T14:06:57.345567+02:00", "EventTime": "2023-10-30T14:06:57.345584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CScyCW1OpXs2sRWzk2"]} -{"Format": "IDEA0", "ID": "1bf66e42-f0e7-41ba-9809-61f0d0a1ed16", "DetectTime": "2023-10-30T14:06:57.374612+02:00", "EventTime": "2023-10-30T14:06:57.374628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C9OlsI1mR6kKeyVxi6"]} -{"Format": "IDEA0", "ID": "a848668c-d60f-4c8a-9436-52819dd4811c", "DetectTime": "2023-10-30T14:06:57.409087+02:00", "EventTime": "2023-10-30T14:06:57.409105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CYClOGU5bilrsGu9c"]} -{"Format": "IDEA0", "ID": "70d617df-1367-4de4-a017-798a3b1580b2", "DetectTime": "2023-10-30T14:06:57.436883+02:00", "EventTime": "2023-10-30T14:06:57.436901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["Ca59ns3rDMYbyfLdhl"]} -{"Format": "IDEA0", "ID": "b278d9f1-67e4-44c8-a5c8-ac797df4fa72", "DetectTime": "2023-10-30T14:06:57.466911+02:00", "EventTime": "2023-10-30T14:06:57.466932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CegUGy1TYUnxhi3xpj"]} -{"Format": "IDEA0", "ID": "890819db-ded6-49eb-8261-61af961e3c38", "DetectTime": "2023-10-30T14:06:57.494640+02:00", "EventTime": "2023-10-30T14:06:57.494662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C0qMgNLqgjuTRCIC2"]} -{"Format": "IDEA0", "ID": "ccfcd547-f1c8-4b4d-b1e2-6a6a7ca7d265", "DetectTime": "2023-10-30T14:06:57.527170+02:00", "EventTime": "2023-10-30T14:06:57.527208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["C226vR3i3PAWpWvWh7"]} -{"Format": "IDEA0", "ID": "3dd32cf5-cf20-46f6-bed3-d434d2e1e67d", "DetectTime": "2023-10-30T14:06:57.558408+02:00", "EventTime": "2023-10-30T14:06:57.558426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CTrp6G3URmP0pK84Tb"]} -{"Format": "IDEA0", "ID": "d78c1396-a3ae-4f66-85b8-73ebc7a737f4", "DetectTime": "2023-10-30T14:06:57.583774+02:00", "EventTime": "2023-10-30T14:06:57.583800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["C0DbHH1y9EOivPDWGe"]} -{"Format": "IDEA0", "ID": "d3e6169b-0ad2-4606-8ef6-bc42b9b4670d", "DetectTime": "2023-10-30T14:06:57.614139+02:00", "EventTime": "2023-10-30T14:06:57.614162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CqPbGe1LM7sjcrSGB"]} -{"Format": "IDEA0", "ID": "cd8c2323-742b-418d-9603-5133c161d007", "DetectTime": "2023-10-30T14:06:57.650987+02:00", "EventTime": "2023-10-30T14:06:57.651008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cv5Bsf2euext1aN4cc"]} -{"Format": "IDEA0", "ID": "d5941334-d62d-453a-bdf4-9f4810c0e82a", "DetectTime": "2023-10-30T14:06:57.683386+02:00", "EventTime": "2023-10-30T14:06:57.683410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CviXFc4ooQAXxfcwe7"]} -{"Format": "IDEA0", "ID": "c00952ba-453a-4bf9-813e-02bd108e10c9", "DetectTime": "2023-10-30T14:06:57.705405+02:00", "EventTime": "2023-10-30T14:06:57.705424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CyCNK81q9Qgp3UX765"]} -{"Format": "IDEA0", "ID": "b39d4a65-3249-4583-86ce-32cf7168dbb5", "DetectTime": "2023-10-30T14:06:57.729921+02:00", "EventTime": "2023-10-30T14:06:57.729937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["C3DiHoOIaqVSeKkh2"]} -{"Format": "IDEA0", "ID": "e0953975-71aa-458c-9186-0bd3c48a72da", "DetectTime": "2023-10-30T14:06:57.757472+02:00", "EventTime": "2023-10-30T14:06:57.757543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cb19U71Ni4GTPAdbL"]} -{"Format": "IDEA0", "ID": "5362352b-3ccd-4c74-8e8a-ee426dd2563e", "DetectTime": "2023-10-30T14:06:57.783039+02:00", "EventTime": "2023-10-30T14:06:57.783053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CilyPv2chsbwBaiqJ1"]} -{"Format": "IDEA0", "ID": "92c7b3ad-e8ac-42b1-8276-78e742ae56de", "DetectTime": "2023-10-30T14:06:57.807751+02:00", "EventTime": "2023-10-30T14:06:57.807770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["Cgoo18p34YbwVtpN"]} -{"Format": "IDEA0", "ID": "d3955b41-295e-4040-b1df-ddd075928095", "DetectTime": "2023-10-30T14:06:57.831698+02:00", "EventTime": "2023-10-30T14:06:57.831715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIIYsA4VazM27ybFyk"]} -{"Format": "IDEA0", "ID": "af076298-26fd-48ee-a96f-28347081146a", "DetectTime": "2023-10-30T14:06:57.856398+02:00", "EventTime": "2023-10-30T14:06:57.856420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["Crsm5G3hAvD4nf7BG"]} -{"Format": "IDEA0", "ID": "51c04296-be92-4656-a9e7-b188e585610c", "DetectTime": "2023-10-30T14:06:57.882674+02:00", "EventTime": "2023-10-30T14:06:57.882693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C1Wejj3aRhHVogrMRd"]} -{"Format": "IDEA0", "ID": "30e9b8d4-b791-4d4a-9cb0-ffd259d12919", "DetectTime": "2023-10-30T14:06:57.907125+02:00", "EventTime": "2023-10-30T14:06:57.907151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["ClR7L4g6ONmhoA1bc"]} -{"Format": "IDEA0", "ID": "6c64e686-b932-41a6-9af1-56c2cc07faf5", "DetectTime": "2023-10-30T14:06:57.938345+02:00", "EventTime": "2023-10-30T14:06:57.938386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CvZZQa3puByPRBMvs3"]} -{"Format": "IDEA0", "ID": "98131459-1012-4380-a4d3-411b8c085055", "DetectTime": "2023-10-30T14:06:57.964931+02:00", "EventTime": "2023-10-30T14:06:57.964948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C6zbX88NMkKFzEZW5"]} -{"Format": "IDEA0", "ID": "f086a080-5abd-462f-9b75-9ce7b8c564d5", "DetectTime": "2023-10-30T14:06:57.997481+02:00", "EventTime": "2023-10-30T14:06:57.997497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CYdy2i1uqjId2lCSFd"]} -{"Format": "IDEA0", "ID": "bf058832-8154-4cd6-b6fb-3f7a4b704c0a", "DetectTime": "2023-10-30T14:06:58.029065+02:00", "EventTime": "2023-10-30T14:06:58.029088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["Cy6UoO1MumtjvtdqD2"]} -{"Format": "Json", "ID": "bf058832-8154-4cd6-b6fb-3f7a4b704c0a", "DetectTime": "2023-10-30T14:06:58.029065+02:00", "EventTime": "2023-10-30T14:06:58.029088+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T03:30:35.368523+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 98. (real time 2023/10/30 14:06:58.112824)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e3802439-9710-494d-9fbf-7fd066472696", "DetectTime": "2023-10-30T14:06:58.121383+02:00", "EventTime": "2023-10-30T14:06:58.121401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CgJGj22wk6tfAvb8oh"]} -{"Format": "IDEA0", "ID": "72bc5b41-6004-4590-9020-bbc8c6a1a819", "DetectTime": "2023-10-30T14:06:58.157611+02:00", "EventTime": "2023-10-30T14:06:58.157633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cn6ylQ2nNx9Hfmjds1"]} -{"Format": "IDEA0", "ID": "0f2145d5-4b7d-490e-ae88-dd30e732a6b2", "DetectTime": "2023-10-30T14:06:58.188698+02:00", "EventTime": "2023-10-30T14:06:58.188717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CHWtO324ZoEyA4SBDg"]} -{"Format": "IDEA0", "ID": "2d89dec1-da17-430c-9a8c-ce496a1ac637", "DetectTime": "2023-10-30T14:06:58.223816+02:00", "EventTime": "2023-10-30T14:06:58.223844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CJeV1i39xC2H7qdfxh"]} -{"Format": "IDEA0", "ID": "b6efb8be-e636-4b89-8ead-4b0d7572b74a", "DetectTime": "2023-10-30T14:06:58.254347+02:00", "EventTime": "2023-10-30T14:06:58.254375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CF2d2N1NucYo6egKvd"]} -{"Format": "IDEA0", "ID": "0f6177dd-5412-4347-9995-562d5f0cfc01", "DetectTime": "2023-10-30T14:06:58.285730+02:00", "EventTime": "2023-10-30T14:06:58.285758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ChPr662nk1dXCOSIsc"]} -{"Format": "IDEA0", "ID": "0657d252-cc1b-45a6-b7a2-1b78b1979c92", "DetectTime": "2023-10-30T14:06:58.314798+02:00", "EventTime": "2023-10-30T14:06:58.314815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CpE1Wc39JxEC3vBbe6"]} -{"Format": "IDEA0", "ID": "1a883a97-ff3e-4c07-bc51-ebb9d53dbc04", "DetectTime": "2023-10-30T14:06:58.344439+02:00", "EventTime": "2023-10-30T14:06:58.344456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CGqHJZ17woQSACVZ33"]} -{"Format": "IDEA0", "ID": "ce051852-6639-4ba1-bd49-7ff93262d0f9", "DetectTime": "2023-10-30T14:06:58.372037+02:00", "EventTime": "2023-10-30T14:06:58.372063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CNjArg23U2wPGUacT5"]} -{"Format": "IDEA0", "ID": "1f561f7b-e376-4099-b2bf-f8b6eb371dfa", "DetectTime": "2023-10-30T14:06:58.403256+02:00", "EventTime": "2023-10-30T14:06:58.403282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CvH6KLzuKL9mq2yRa"]} -{"Format": "IDEA0", "ID": "bc9e360e-43a3-4df5-b25a-9f6b769bf3c7", "DetectTime": "2023-10-30T14:06:58.436185+02:00", "EventTime": "2023-10-30T14:06:58.436210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["C70alqYl2JzW6sJh6"]} -{"Format": "IDEA0", "ID": "3e6f3ed6-557c-45dc-b0ab-2d1b90b2c2d3", "DetectTime": "2023-10-30T14:06:58.459179+02:00", "EventTime": "2023-10-30T14:06:58.459197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["CsBSwU27FXLnoCNLH3"]} -{"Format": "IDEA0", "ID": "6831dcfe-22a5-44ff-ac6b-b56108282cb3", "DetectTime": "2023-10-30T14:06:58.489002+02:00", "EventTime": "2023-10-30T14:06:58.489028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["C2Y5Vd3gX6tFYHUVf9"]} -{"Format": "IDEA0", "ID": "91820706-b262-41fe-86eb-57f089b5625b", "DetectTime": "2023-10-30T14:06:58.522161+02:00", "EventTime": "2023-10-30T14:06:58.522188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CaE3rF4ADSzOQHUzXb"]} -{"Format": "IDEA0", "ID": "9876897c-6c4f-425d-834d-5e90710878fa", "DetectTime": "2023-10-30T14:06:58.550889+02:00", "EventTime": "2023-10-30T14:06:58.550936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CsVMW42FqC3p45YRS5"]} -{"Format": "IDEA0", "ID": "e3ff890d-e839-49b2-91aa-87fa8040f6a2", "DetectTime": "2023-10-30T14:06:58.580676+02:00", "EventTime": "2023-10-30T14:06:58.580698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CvDPEd12b8WNOCyg1i"]} -{"Format": "IDEA0", "ID": "fb743cf1-d690-4992-8b6c-c3b56fbf5d0a", "DetectTime": "2023-10-30T14:06:58.612115+02:00", "EventTime": "2023-10-30T14:06:58.612133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["Cbt4ta1Ir2mzS2o456"]} -{"Format": "IDEA0", "ID": "d91add15-ea58-4a1e-85c8-7fc5e0f3c4ac", "DetectTime": "2023-10-30T14:06:58.643397+02:00", "EventTime": "2023-10-30T14:06:58.643427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CAaxgv31bfMwA02Vq4"]} -{"Format": "IDEA0", "ID": "9b3a68bc-a943-4cd7-9bd1-11b42cca284b", "DetectTime": "2023-10-30T14:06:58.671747+02:00", "EventTime": "2023-10-30T14:06:58.671791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CrRoOl1lTI6c3idSb1"]} -{"Format": "IDEA0", "ID": "9e28b426-cb62-45c3-8772-d4d09b8b14e4", "DetectTime": "2023-10-30T14:06:58.703175+02:00", "EventTime": "2023-10-30T14:06:58.703200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cl0hHg3R5PKw3oQimi"]} -{"Format": "IDEA0", "ID": "d8b24b6d-01e4-4e8a-8c4e-b50a108d12c0", "DetectTime": "2023-10-30T14:06:58.728729+02:00", "EventTime": "2023-10-30T14:06:58.728747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CxxFoa4nyuxNN7NqMg"]} -{"Format": "IDEA0", "ID": "3bf58a21-6b73-4c3b-946f-a9b5676f076a", "DetectTime": "2023-10-30T14:06:58.760567+02:00", "EventTime": "2023-10-30T14:06:58.760586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CQGn67SWw4o9Kvxj9"]} -{"Format": "IDEA0", "ID": "3966dfbb-0fa0-4387-94d5-0cb961b94784", "DetectTime": "2023-10-30T14:06:58.789422+02:00", "EventTime": "2023-10-30T14:06:58.789445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.174.226 ", "ContentType": "text/plain"}], "uids": ["CRtSuv2lwL8eXKwM6g"]} -{"Format": "IDEA0", "ID": "96de023c-cc71-4600-8b1f-730571725243", "DetectTime": "2023-10-30T14:06:58.818813+02:00", "EventTime": "2023-10-30T14:06:58.818841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CtAOzB37SzJgvGSaDe"]} -{"Format": "IDEA0", "ID": "7ac7dbd8-567a-4187-84d0-01174f1e4d5a", "DetectTime": "2023-10-30T14:06:58.841720+02:00", "EventTime": "2023-10-30T14:06:58.841744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["C5iNOj4nexCJQ3McAd"]} -{"Format": "IDEA0", "ID": "1b06244b-5986-403d-b566-566493d95372", "DetectTime": "2023-10-30T14:06:58.869224+02:00", "EventTime": "2023-10-30T14:06:58.869249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["C1B1kV2l0nojVLenze"]} -{"Format": "IDEA0", "ID": "cb71b523-4d44-4a5d-a7d6-c3e05e796316", "DetectTime": "2023-10-30T14:06:58.898407+02:00", "EventTime": "2023-10-30T14:06:58.898435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CxMZbN2K0rLiplWmT7"]} -{"Format": "IDEA0", "ID": "5bd3a676-3d98-4751-87c1-622beaa4c4a1", "DetectTime": "2023-10-30T14:06:58.919263+02:00", "EventTime": "2023-10-30T14:06:58.919300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CWtpSe22cCkGs8xkV1"]} -{"Format": "IDEA0", "ID": "d9616030-038f-4567-9ed5-60a676de8eb2", "DetectTime": "2023-10-30T14:06:58.947134+02:00", "EventTime": "2023-10-30T14:06:58.947173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CYE27lSNo8EKrasQd"]} -{"Format": "IDEA0", "ID": "09e378b6-68ba-40e1-bd67-7edb17555e10", "DetectTime": "2023-10-30T14:06:58.968132+02:00", "EventTime": "2023-10-30T14:06:58.968154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CHXqL51ilKg2ClF3h4"]} -{"Format": "IDEA0", "ID": "2859b786-6fec-436b-aac6-d8f031a557f6", "DetectTime": "2023-10-30T14:06:58.992629+02:00", "EventTime": "2023-10-30T14:06:58.992658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CJk4qlW9JzGstI1Hh"]} -{"Format": "IDEA0", "ID": "97b7e521-ffbf-44ee-a1cc-4933b479ae9a", "DetectTime": "2023-10-30T14:06:59.024480+02:00", "EventTime": "2023-10-30T14:06:59.024497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cg6xpD412ZqzgJvHuk"]} -{"Format": "IDEA0", "ID": "62a2a865-65a3-4584-b542-737438714506", "DetectTime": "2023-10-30T14:06:59.045787+02:00", "EventTime": "2023-10-30T14:06:59.045815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CoqyjE3lBnqQ71xmt6"]} -{"Format": "IDEA0", "ID": "8b1bae6d-183b-42bf-bd19-6a4b32a975e6", "DetectTime": "2023-10-30T14:06:59.079194+02:00", "EventTime": "2023-10-30T14:06:59.079258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CI1jiv85ykucciCLl"]} -{"Format": "IDEA0", "ID": "95c0bd58-1ff6-4afb-9520-21eea8a99546", "DetectTime": "2023-10-30T14:06:59.114092+02:00", "EventTime": "2023-10-30T14:06:59.114119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["CKhEAT1V0iZSMklL1d"]} -{"Format": "Json", "ID": "95c0bd58-1ff6-4afb-9520-21eea8a99546", "DetectTime": "2023-10-30T14:06:59.114092+02:00", "EventTime": "2023-10-30T14:06:59.114119+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T03:32:05.035159+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 98. (real time 2023/10/30 14:06:59.179828)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e53daad1-3b3a-4f73-84ac-c96cace58b50", "DetectTime": "2023-10-30T14:06:59.187244+02:00", "EventTime": "2023-10-30T14:06:59.187276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CyVzEP20pOgPKByuvf"]} -{"Format": "IDEA0", "ID": "1ebac76f-85d8-432a-b4d5-cf63a45fcc5d", "DetectTime": "2023-10-30T14:06:59.217249+02:00", "EventTime": "2023-10-30T14:06:59.217271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["COP0AQ1iZBO34bh1rf"]} -{"Format": "IDEA0", "ID": "9e40bedd-6cb0-43df-a6f0-ac715d9915b2", "DetectTime": "2023-10-30T14:06:59.250047+02:00", "EventTime": "2023-10-30T14:06:59.250068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CwdWyc2M6AxdxmMIq1"]} -{"Format": "IDEA0", "ID": "ae881b1e-2b42-40c8-aef3-1e4d0e39cc45", "DetectTime": "2023-10-30T14:06:59.268410+02:00", "EventTime": "2023-10-30T14:06:59.268424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CikeoE2L1WGvfyhxZg"]} -{"Format": "IDEA0", "ID": "26532e78-080f-4bf9-a943-4e1462b80d10", "DetectTime": "2023-10-30T14:06:59.291311+02:00", "EventTime": "2023-10-30T14:06:59.291337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CWulUb1acPkyRzKRn4"]} -{"Format": "IDEA0", "ID": "0039ec82-b2a1-4a5d-ab71-be34f4da5842", "DetectTime": "2023-10-30T14:06:59.324148+02:00", "EventTime": "2023-10-30T14:06:59.324170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CkNl393qEWXRhKi3Tb"]} -{"Format": "IDEA0", "ID": "3ece11f2-d5e5-4cbe-9dc8-5a21d61e5193", "DetectTime": "2023-10-30T14:06:59.356143+02:00", "EventTime": "2023-10-30T14:06:59.356181+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.96.126.57 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CRVrRE0UAqwvPRGAc"]} -{"Format": "IDEA0", "ID": "952b4d45-c90c-4147-8a5d-35228b0aaa43", "DetectTime": "2023-10-30T14:06:59.383992+02:00", "EventTime": "2023-10-30T14:06:59.384011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CuqmUk4n1CWe4JKNe"]} -{"Format": "IDEA0", "ID": "d3547a39-8ed3-442d-b1b0-d26662133e9c", "DetectTime": "2023-10-30T14:06:59.413027+02:00", "EventTime": "2023-10-30T14:06:59.413039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CJKPui1JQHfBVBcFVb"]} -{"Format": "IDEA0", "ID": "671c2a49-0d5d-4b21-9199-83f7d12f364b", "DetectTime": "2023-10-30T14:06:59.442803+02:00", "EventTime": "2023-10-30T14:06:59.442828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cc5j7wtteqHKzIJ24"]} -{"Format": "IDEA0", "ID": "6caf9d1b-eed9-4e8b-866d-4058febdc3bb", "DetectTime": "2023-10-30T14:06:59.472741+02:00", "EventTime": "2023-10-30T14:06:59.472759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CQmGQ018GTuyBb9Z0h"]} -{"Format": "IDEA0", "ID": "f24c00f7-f6bd-46ee-8880-69e8e8172acb", "DetectTime": "2023-10-30T14:06:59.501534+02:00", "EventTime": "2023-10-30T14:06:59.501552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CjQbHH1EuRHN2e3hDj"]} -{"Format": "IDEA0", "ID": "c7bd7cd4-ca96-44ab-a095-dea59953be89", "DetectTime": "2023-10-30T14:06:59.531955+02:00", "EventTime": "2023-10-30T14:06:59.531976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CgIPf61a8dzTOajBFc"]} -{"Format": "IDEA0", "ID": "5fbdf8f4-e22e-40d6-bd06-9b936a1c5f49", "DetectTime": "2023-10-30T14:06:59.562293+02:00", "EventTime": "2023-10-30T14:06:59.562320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CAdzRR1sTVWdUYNF6f"]} -{"Format": "IDEA0", "ID": "5e1be78a-c00e-4f4f-86b7-a31a021586a2", "DetectTime": "2023-10-30T14:06:59.640051+02:00", "EventTime": "2023-10-30T14:06:59.640070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CrJS981VPSbtMsN646"]} -{"Format": "IDEA0", "ID": "bd65afff-ec9f-4259-8b96-7e9eb4da8e54", "DetectTime": "2023-10-30T14:06:59.667952+02:00", "EventTime": "2023-10-30T14:06:59.667978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CgMVR63jrLXbzsS8D5"]} -{"Format": "IDEA0", "ID": "6d5d78b6-ea30-44db-90d0-c21f4ccc5841", "DetectTime": "2023-10-30T14:06:59.696862+02:00", "EventTime": "2023-10-30T14:06:59.696892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CxELln1BnMmqrGaTK9"]} -{"Format": "IDEA0", "ID": "17568406-1d23-4f72-a807-7ca5c4c8fb6f", "DetectTime": "2023-10-30T14:06:59.726524+02:00", "EventTime": "2023-10-30T14:06:59.726552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["CCK2F621apmCBltYI4"]} -{"Format": "IDEA0", "ID": "1c8301dc-776d-42bf-b429-97f8f724049c", "DetectTime": "2023-10-30T14:06:59.753695+02:00", "EventTime": "2023-10-30T14:06:59.753723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["Cp2Cyn3fWTD4GlSq98"]} -{"Format": "IDEA0", "ID": "48d4c799-c800-4a26-b31e-0e622c92c2eb", "DetectTime": "2023-10-30T14:06:59.784329+02:00", "EventTime": "2023-10-30T14:06:59.784357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKY7q31BnicBYuZNYd"]} -{"Format": "IDEA0", "ID": "dd74ffc9-a7ee-4e92-ae69-0f2d2fbed19d", "DetectTime": "2023-10-30T14:06:59.817079+02:00", "EventTime": "2023-10-30T14:06:59.817132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CmU49jd2BuGa6k83"]} -{"Format": "IDEA0", "ID": "264ab766-1298-4dc2-80be-4822944e9bdf", "DetectTime": "2023-10-30T14:06:59.846669+02:00", "EventTime": "2023-10-30T14:06:59.846682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ClUgZIUSy29eLNLwb"]} -{"Format": "IDEA0", "ID": "dae33baa-d453-469e-86ee-b60896f1cf6f", "DetectTime": "2023-10-30T14:06:59.877306+02:00", "EventTime": "2023-10-30T14:06:59.877330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CWcOYt1ixB9SQF4Pv4"]} -{"Format": "IDEA0", "ID": "c977bb90-07c1-4588-a2a5-05fac0d3a10c", "DetectTime": "2023-10-30T14:06:59.907650+02:00", "EventTime": "2023-10-30T14:06:59.907675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CkvdsAI4qjBb62DGd"]} -{"Format": "IDEA0", "ID": "976a665b-4235-440b-ae5e-143359a22bcb", "DetectTime": "2023-10-30T14:06:59.939327+02:00", "EventTime": "2023-10-30T14:06:59.939345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["C1JEPCQDGfsmfdmZ3"]} -{"Format": "IDEA0", "ID": "79ad3512-c608-4084-9ce5-d2044181b1fc", "DetectTime": "2023-10-30T14:06:59.968767+02:00", "EventTime": "2023-10-30T14:06:59.968798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CjxMQaf77Fnjt9Mde"]} -{"Format": "IDEA0", "ID": "aeff553b-ee96-4370-b469-ff0d303cfe83", "DetectTime": "2023-10-30T14:07:00.001114+02:00", "EventTime": "2023-10-30T14:07:00.001139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CKdZcR1O4j1p101CIf"]} -{"Format": "IDEA0", "ID": "a309eb13-f59a-4583-ba07-3d5e7a3760db", "DetectTime": "2023-10-30T14:07:00.074370+02:00", "EventTime": "2023-10-30T14:07:00.074435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjpLUi2LeiUHPEf69i"]} -{"Format": "IDEA0", "ID": "39f6b73b-2acb-4719-9bb3-5f9800acfde5", "DetectTime": "2023-10-30T14:07:00.103670+02:00", "EventTime": "2023-10-30T14:07:00.103687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CHhJi33qZD78ZLxLml"]} -{"Format": "IDEA0", "ID": "fdd71b55-b000-4b1c-8054-11a7521d16a9", "DetectTime": "2023-10-30T14:07:00.135989+02:00", "EventTime": "2023-10-30T14:07:00.136006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CsxDmy4hmTUX90Hf67"]} -{"Format": "IDEA0", "ID": "37123712-aee4-4323-852c-b7f9a614716f", "DetectTime": "2023-10-30T14:07:00.210015+02:00", "EventTime": "2023-10-30T14:07:00.210049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CftW9I313EG1xvAhR7"]} -{"Format": "IDEA0", "ID": "02519e03-9186-4ced-832a-cacc19845a78", "DetectTime": "2023-10-30T14:07:00.284261+02:00", "EventTime": "2023-10-30T14:07:00.284279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CXNy8K3Ceqy1AtyAu9"]} -{"Format": "IDEA0", "ID": "29d1282b-290c-4b82-9a7e-f8eb40f5d2d7", "DetectTime": "2023-10-30T14:07:00.318252+02:00", "EventTime": "2023-10-30T14:07:00.318272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.208.40.220 ", "ContentType": "text/plain"}], "uids": ["C9ptlQ2I0vbIWrV2Gf"]} -{"Format": "IDEA0", "ID": "45f6acb1-a594-4133-ab12-5bcb83db080a", "DetectTime": "2023-10-30T14:07:00.351491+02:00", "EventTime": "2023-10-30T14:07:00.351516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CqsZeU3noBk8jet065"]} -{"Format": "IDEA0", "ID": "fabf1cff-a512-4b83-ad6f-1bc0c89d4dcc", "DetectTime": "2023-10-30T14:07:00.385508+02:00", "EventTime": "2023-10-30T14:07:00.385524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CCEfze3V7tSSjKye2k"]} -{"Format": "IDEA0", "ID": "bba069fa-9abf-467c-9804-67317e85e83e", "DetectTime": "2023-10-30T14:07:00.468783+02:00", "EventTime": "2023-10-30T14:07:00.468804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.110.142.232 ", "ContentType": "text/plain"}], "uids": ["CUx7QEfKHU2X6Nkm4"]} -{"Format": "IDEA0", "ID": "677dc660-4d55-4188-8874-63fe58869351", "DetectTime": "2023-10-30T14:07:00.501052+02:00", "EventTime": "2023-10-30T14:07:00.501076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CfdHrn1Ot87mFpkhzh"]} -{"Format": "IDEA0", "ID": "f32e6fa9-a2df-40a9-a0b0-ed8513126e8a", "DetectTime": "2023-10-30T14:07:00.535438+02:00", "EventTime": "2023-10-30T14:07:00.535451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CfWdEO3GWLesHxgRxg"]} -{"Format": "IDEA0", "ID": "3ba453b2-7281-4a72-b6c5-a4922c9df341", "DetectTime": "2023-10-30T14:07:00.564994+02:00", "EventTime": "2023-10-30T14:07:00.565020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CEWYC13m5CEaZjNCNg"]} -{"Format": "Json", "ID": "3ba453b2-7281-4a72-b6c5-a4922c9df341", "DetectTime": "2023-10-30T14:07:00.564994+02:00", "EventTime": "2023-10-30T14:07:00.565020+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:03:52.926159+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:00.737597)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6f32802e-de58-4a0a-bff8-59817dee6119", "DetectTime": "2023-10-30T14:07:00.742932+02:00", "EventTime": "2023-10-30T14:07:00.742955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CKxmZQ2V6X6nuawgB4"]} -{"Format": "IDEA0", "ID": "dc020664-3d20-4715-ab50-313c2d6516c0", "DetectTime": "2023-10-30T14:07:00.782180+02:00", "EventTime": "2023-10-30T14:07:00.782200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["COyNMA1EoJph4rq8l1"]} -{"Format": "IDEA0", "ID": "466d3b5b-f8bf-41a9-9103-d70e3a5f76f6", "DetectTime": "2023-10-30T14:07:00.816939+02:00", "EventTime": "2023-10-30T14:07:00.816954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CuD09e3AuIWoxqMzBj"]} -{"Format": "IDEA0", "ID": "b8a17cc2-b23f-4ad5-b31b-e486f080c7b1", "DetectTime": "2023-10-30T14:07:00.848612+02:00", "EventTime": "2023-10-30T14:07:00.848643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["C1G8is3qWuKzyoaV43"]} -{"Format": "IDEA0", "ID": "24f63649-33ff-47da-96dd-ab647f278625", "DetectTime": "2023-10-30T14:07:00.881689+02:00", "EventTime": "2023-10-30T14:07:00.881707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CMoWBu1f4wci0b56C9"]} -{"Format": "IDEA0", "ID": "e20646ff-946d-41b3-bc5c-a59e7ea3b2eb", "DetectTime": "2023-10-30T14:07:00.914719+02:00", "EventTime": "2023-10-30T14:07:00.914740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C1oC9g3KHVHr99Ste"]} -{"Format": "IDEA0", "ID": "a6256343-dacb-4763-aa38-bd7ad7cef66f", "DetectTime": "2023-10-30T14:07:00.948944+02:00", "EventTime": "2023-10-30T14:07:00.948963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CCktEM1I8AB9fVj4Q1"]} -{"Format": "IDEA0", "ID": "5046fcea-a20a-4ed0-b944-4cfcca0a8ca0", "DetectTime": "2023-10-30T14:07:00.980556+02:00", "EventTime": "2023-10-30T14:07:00.980581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CslIDq4eKrzUfnV1nk"]} -{"Format": "IDEA0", "ID": "cc396931-9ed2-42f8-b5f9-2332db56f2f2", "DetectTime": "2023-10-30T14:07:01.051353+02:00", "EventTime": "2023-10-30T14:07:01.051374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CNLHPu2H77OXDBltQb"]} -{"Format": "IDEA0", "ID": "267ce836-db22-49f6-b018-e5c4e93df2d2", "DetectTime": "2023-10-30T14:07:01.085546+02:00", "EventTime": "2023-10-30T14:07:01.085563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C06TAN2Q8XurqUynI8"]} -{"Format": "IDEA0", "ID": "5e08d071-fd7d-423f-9ca3-372fd986aae3", "DetectTime": "2023-10-30T14:07:01.124643+02:00", "EventTime": "2023-10-30T14:07:01.124666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CZUXwm4NQdXPYjZQve"]} -{"Format": "IDEA0", "ID": "e181a836-719f-4f33-9716-ca0abfa9da5d", "DetectTime": "2023-10-30T14:07:01.161499+02:00", "EventTime": "2023-10-30T14:07:01.161527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCKAId2Vlr7UYkCtl7"]} -{"Format": "IDEA0", "ID": "4bc0cde7-3772-469f-9151-b39857807e89", "DetectTime": "2023-10-30T14:07:01.190524+02:00", "EventTime": "2023-10-30T14:07:01.190539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CcFMthzUmleU5Lrs9"]} -{"Format": "IDEA0", "ID": "f833fffc-0014-411b-9880-464abb99038f", "DetectTime": "2023-10-30T14:07:01.224000+02:00", "EventTime": "2023-10-30T14:07:01.224022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["CzEymX3dOQapG61fRk"]} -{"Format": "IDEA0", "ID": "12e0af82-7ae7-4e46-96db-7eb1154e323c", "DetectTime": "2023-10-30T14:07:01.257887+02:00", "EventTime": "2023-10-30T14:07:01.257908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CaUscw3imyj7q9w63f"]} -{"Format": "IDEA0", "ID": "a9c9043c-8b53-416a-b751-bbbd5a2e5e22", "DetectTime": "2023-10-30T14:07:01.291322+02:00", "EventTime": "2023-10-30T14:07:01.291339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CHHqy73xU6Hi34eCQ2"]} -{"Format": "IDEA0", "ID": "38e9898e-883f-405e-bfa3-7eac037e3103", "DetectTime": "2023-10-30T14:07:01.327876+02:00", "EventTime": "2023-10-30T14:07:01.327896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CX0kWe4QBhPJz2ou78"]} -{"Format": "IDEA0", "ID": "8c6a7839-f33e-4d67-b1db-a90b055f9d0a", "DetectTime": "2023-10-30T14:07:01.364513+02:00", "EventTime": "2023-10-30T14:07:01.364566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["C3VLnN2XhMdx9i2K6b"]} -{"Format": "IDEA0", "ID": "55b762c2-5c11-4519-97d5-91e100ec54f7", "DetectTime": "2023-10-30T14:07:01.402962+02:00", "EventTime": "2023-10-30T14:07:01.402991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CgKdbFyWtHjVIfgqi"]} -{"Format": "IDEA0", "ID": "59696a0e-0b00-4251-94f6-c2b5eca5cdbe", "DetectTime": "2023-10-30T14:07:01.436466+02:00", "EventTime": "2023-10-30T14:07:01.436488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.237.226.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.237.226.20 ", "ContentType": "text/plain"}], "uids": ["CRLqJw4pCkQxURdv7h"]} -{"Format": "IDEA0", "ID": "7ece88af-6c62-4437-b3ce-84870f0b91cc", "DetectTime": "2023-10-30T14:07:01.469967+02:00", "EventTime": "2023-10-30T14:07:01.469993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CCkNk56U2BCtyOwyl"]} -{"Format": "IDEA0", "ID": "d556781b-33ef-4cd5-adc6-170963a904ab", "DetectTime": "2023-10-30T14:07:01.501347+02:00", "EventTime": "2023-10-30T14:07:01.501368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.91.64.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.91.64.56 ", "ContentType": "text/plain"}], "uids": ["CdgwQRhKKijVQJ5il"]} -{"Format": "IDEA0", "ID": "c23b0eba-fd5c-48e3-948e-1304f167dccb", "DetectTime": "2023-10-30T14:07:01.534725+02:00", "EventTime": "2023-10-30T14:07:01.534747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CuXHz3vkKGmfyZi4h"]} -{"Format": "IDEA0", "ID": "ad2ab4ac-d53e-4290-ab33-c1592aec80e9", "DetectTime": "2023-10-30T14:07:01.568695+02:00", "EventTime": "2023-10-30T14:07:01.568728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.8.121.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.8.121.25 ", "ContentType": "text/plain"}], "uids": ["CxUldu4eteyKI7j57a"]} -{"Format": "IDEA0", "ID": "31751360-23c5-497c-8934-2bc73eaad435", "DetectTime": "2023-10-30T14:07:01.601611+02:00", "EventTime": "2023-10-30T14:07:01.601637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CSRIQF1nxzyTZJaJZb"]} -{"Format": "IDEA0", "ID": "8fe032ec-9787-46eb-9e89-bb6d047e6476", "DetectTime": "2023-10-30T14:07:01.667965+02:00", "EventTime": "2023-10-30T14:07:01.667992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CwSXmJ1tJXIx522o0h"]} -{"Format": "IDEA0", "ID": "b1a4fc9b-02f4-424c-b314-956a696b5e07", "DetectTime": "2023-10-30T14:07:01.702168+02:00", "EventTime": "2023-10-30T14:07:01.702196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CybMWC32qPzbG0ONpg"]} -{"Format": "IDEA0", "ID": "fce64b3a-df9d-4a16-8712-22c68e3a9448", "DetectTime": "2023-10-30T14:07:01.732569+02:00", "EventTime": "2023-10-30T14:07:01.732583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.13.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.13.68.87 ", "ContentType": "text/plain"}], "uids": ["Cf8yhzwgSG8mtWo1c"]} -{"Format": "IDEA0", "ID": "3865e495-f8f0-4837-9722-083c7dfed46b", "DetectTime": "2023-10-30T14:07:01.763170+02:00", "EventTime": "2023-10-30T14:07:01.763191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.6.169.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.6.169.162 ", "ContentType": "text/plain"}], "uids": ["CiwsnK2N8CdI8ifxgh"]} -{"Format": "IDEA0", "ID": "0b0cbe46-ec34-4ff7-be4b-8a6f485a622d", "DetectTime": "2023-10-30T14:07:01.794341+02:00", "EventTime": "2023-10-30T14:07:01.794369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.112.55.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.112.55.97 ", "ContentType": "text/plain"}], "uids": ["CnoKOsbWpGE4l8oe5"]} -{"Format": "IDEA0", "ID": "18a82941-b5f1-480a-8ed3-d6d4e32f1236", "DetectTime": "2023-10-30T14:07:01.825603+02:00", "EventTime": "2023-10-30T14:07:01.825618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.151.145.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.151.145.104 ", "ContentType": "text/plain"}], "uids": ["CPcImf3JruzmB7aAd3"]} -{"Format": "IDEA0", "ID": "05c43fe5-e613-4779-9c86-335ee475edad", "DetectTime": "2023-10-30T14:07:01.857870+02:00", "EventTime": "2023-10-30T14:07:01.857885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.62.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.235.62.57 ", "ContentType": "text/plain"}], "uids": ["Cj0xzh3RcSVF083lp6"]} -{"Format": "IDEA0", "ID": "c48de6b7-ed38-4c8f-801a-0fcdbf090516", "DetectTime": "2023-10-30T14:07:01.888165+02:00", "EventTime": "2023-10-30T14:07:01.888192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.53.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.53.83 ", "ContentType": "text/plain"}], "uids": ["C74zVX3vM5QmueQ0f3"]} -{"Format": "IDEA0", "ID": "c6e06124-d396-4127-9a14-b863dea30ee4", "DetectTime": "2023-10-30T14:07:01.918684+02:00", "EventTime": "2023-10-30T14:07:01.918701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.174.119.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.174.119.158 ", "ContentType": "text/plain"}], "uids": ["CkoL0u4WGZSAT1Apwb"]} -{"Format": "IDEA0", "ID": "d6f9216e-8851-49cf-a78b-9a0081eb2e3d", "DetectTime": "2023-10-30T14:07:01.951306+02:00", "EventTime": "2023-10-30T14:07:01.951327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.17.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.17.106 ", "ContentType": "text/plain"}], "uids": ["CJ6QE41vPk92oFA3J2"]} -{"Format": "IDEA0", "ID": "78f810f3-e7f0-4745-a445-f2b5454599cd", "DetectTime": "2023-10-30T14:07:01.984135+02:00", "EventTime": "2023-10-30T14:07:01.984160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CLNtRQ6BVbfUPLbAd"]} -{"Format": "IDEA0", "ID": "08cd6f68-98de-4759-9c7e-20d39379166b", "DetectTime": "2023-10-30T14:07:02.014639+02:00", "EventTime": "2023-10-30T14:07:02.014657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.134.200.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.134.200.145 ", "ContentType": "text/plain"}], "uids": ["CSJp6D3kyKTiO6b2Pa"]} -{"Format": "IDEA0", "ID": "1a358775-40ca-4fa4-bb9a-7872fa5cb8fd", "DetectTime": "2023-10-30T14:07:02.045316+02:00", "EventTime": "2023-10-30T14:07:02.045338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.223.117.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.223.117.163 ", "ContentType": "text/plain"}], "uids": ["CyibhE1mHW3wh7gDXh"]} -{"Format": "IDEA0", "ID": "4e57c300-adf4-471b-b2e0-854373790f2a", "DetectTime": "2023-10-30T14:07:02.076049+02:00", "EventTime": "2023-10-30T14:07:02.076063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.75.48.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.75.48.164 ", "ContentType": "text/plain"}], "uids": ["COunAr2gABZsI0Kcfe"]} -{"Format": "IDEA0", "ID": "1aa1bd22-d054-4325-b7ba-eb78a4ef6484", "DetectTime": "2023-10-30T14:07:02.108760+02:00", "EventTime": "2023-10-30T14:07:02.108786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.178.208.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.178.208.222 ", "ContentType": "text/plain"}], "uids": ["CV8hy44Of50GaRc4k9"]} -{"Format": "IDEA0", "ID": "6252cc56-e81a-4dd7-a8c8-7da52aaa375f", "DetectTime": "2023-10-30T14:07:02.143146+02:00", "EventTime": "2023-10-30T14:07:02.143169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.240.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.240.91 ", "ContentType": "text/plain"}], "uids": ["Cu5qT3VSYeX3PEUT6"]} -{"Format": "IDEA0", "ID": "5626b906-a9f3-4a3f-a6bd-d0a0dd2979c8", "DetectTime": "2023-10-30T14:07:02.176718+02:00", "EventTime": "2023-10-30T14:07:02.176739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["CPresd342tj0cIWcNd"]} -{"Format": "IDEA0", "ID": "2f7b18d9-99c6-4c9a-99f5-b1e9d030fd29", "DetectTime": "2023-10-30T14:07:02.209450+02:00", "EventTime": "2023-10-30T14:07:02.209468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.21.140.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.21.140.162 ", "ContentType": "text/plain"}], "uids": ["CVTQk14dnSzEJ39iW4"]} -{"Format": "IDEA0", "ID": "07904aa0-5791-4f6c-b330-6d948a0ba8f6", "DetectTime": "2023-10-30T14:07:02.242034+02:00", "EventTime": "2023-10-30T14:07:02.242052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.67.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.67.50 ", "ContentType": "text/plain"}], "uids": ["CNTPvZ2Ds874Rnc7J4"]} -{"Format": "IDEA0", "ID": "107e04e0-b326-4a58-b90a-4a0320efec14", "DetectTime": "2023-10-30T14:07:02.274832+02:00", "EventTime": "2023-10-30T14:07:02.274853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.151.242.149 ", "ContentType": "text/plain"}], "uids": ["CPTKra3cZgG8yPBjAd"]} -{"Format": "IDEA0", "ID": "310b97f2-84c8-4ca3-9c1f-c286855a67e1", "DetectTime": "2023-10-30T14:07:02.307499+02:00", "EventTime": "2023-10-30T14:07:02.307529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.206.32.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.206.32.119 ", "ContentType": "text/plain"}], "uids": ["C9lmdA1qwiynPUnxml"]} -{"Format": "IDEA0", "ID": "ad70d9e6-a7c6-40dd-a9ab-b124f7c9b8cd", "DetectTime": "2023-10-30T14:07:02.343543+02:00", "EventTime": "2023-10-30T14:07:02.343561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.174.80.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.174.80.114 ", "ContentType": "text/plain"}], "uids": ["CsBd0c3bBfaoXgHFW3"]} -{"Format": "IDEA0", "ID": "c0d89e62-4ab8-40a2-88a2-4c158732bcc1", "DetectTime": "2023-10-30T14:07:02.371634+02:00", "EventTime": "2023-10-30T14:07:02.371660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.42.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.97.42.133 ", "ContentType": "text/plain"}], "uids": ["CgrBGv2DzbR6N5WtQa"]} -{"Format": "IDEA0", "ID": "f0a86f75-ba8b-4aa2-a4be-845905fe0de3", "DetectTime": "2023-10-30T14:07:02.400137+02:00", "EventTime": "2023-10-30T14:07:02.400164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CQxnhI3kJn4fVWoOpk"]} -{"Format": "IDEA0", "ID": "79d440d2-d674-44f1-b1f5-01a848800118", "DetectTime": "2023-10-30T14:07:02.465242+02:00", "EventTime": "2023-10-30T14:07:02.465269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.242.160.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.242.160.242 ", "ContentType": "text/plain"}], "uids": ["CbPeE33yMvUEYJ8Uuk"]} -{"Format": "IDEA0", "ID": "c914a845-e9e5-4c1e-9393-9bcc14f791b4", "DetectTime": "2023-10-30T14:07:02.498212+02:00", "EventTime": "2023-10-30T14:07:02.498235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.3.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.3.124 ", "ContentType": "text/plain"}], "uids": ["CSyn5C1Bx0HEBjtzkk"]} -{"Format": "IDEA0", "ID": "d624441a-4b1d-462f-8973-06170ed73943", "DetectTime": "2023-10-30T14:07:02.532780+02:00", "EventTime": "2023-10-30T14:07:02.532799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.9.107.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.9.107.246 ", "ContentType": "text/plain"}], "uids": ["CrJweO2GGtFxn5HiKh"]} -{"Format": "IDEA0", "ID": "ef6342cc-0504-4551-bd48-aad612b8d780", "DetectTime": "2023-10-30T14:07:02.564578+02:00", "EventTime": "2023-10-30T14:07:02.564594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.128.198.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.128.198.24 ", "ContentType": "text/plain"}], "uids": ["CpnwfM23uGPEOK2Fa6"]} -{"Format": "IDEA0", "ID": "db555e88-207b-497d-9469-bfc9368937c3", "DetectTime": "2023-10-30T14:07:02.594421+02:00", "EventTime": "2023-10-30T14:07:02.594437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.118.81.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.118.81.174 ", "ContentType": "text/plain"}], "uids": ["CW3HY74K6pQtZVnhrb"]} -{"Format": "IDEA0", "ID": "e17cab9d-4609-45d2-949e-db64b48b9394", "DetectTime": "2023-10-30T14:07:02.625329+02:00", "EventTime": "2023-10-30T14:07:02.625341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.243.239.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.243.239.45 ", "ContentType": "text/plain"}], "uids": ["CN8RKYEQJXZZ5z6Xj"]} -{"Format": "IDEA0", "ID": "006c6a22-64e2-4c47-ac33-e46d9f039d9e", "DetectTime": "2023-10-30T14:07:02.652375+02:00", "EventTime": "2023-10-30T14:07:02.652392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.115.63.192"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.115.63.192 ", "ContentType": "text/plain"}], "uids": ["CFkrWw4do2acUqjEk"]} -{"Format": "IDEA0", "ID": "93a770dd-3c1d-4d49-ab80-71ff0067e92e", "DetectTime": "2023-10-30T14:07:02.684813+02:00", "EventTime": "2023-10-30T14:07:02.684830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.86.45.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.86.45.216 ", "ContentType": "text/plain"}], "uids": ["CPiREUXP6PX8PvUWh"]} -{"Format": "IDEA0", "ID": "886c5975-da78-4164-aff3-1353e028efa1", "DetectTime": "2023-10-30T14:07:02.714545+02:00", "EventTime": "2023-10-30T14:07:02.714561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.220.195.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.220.195.112 ", "ContentType": "text/plain"}], "uids": ["Co72ok2M6HDEoFPPO"]} -{"Format": "IDEA0", "ID": "e3e1b257-f44f-4665-aea2-fdd05d0d8804", "DetectTime": "2023-10-30T14:07:02.746399+02:00", "EventTime": "2023-10-30T14:07:02.746418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.237.68.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.237.68.37 ", "ContentType": "text/plain"}], "uids": ["ChWmGs3FEolRM5mul1"]} -{"Format": "IDEA0", "ID": "9fede36c-f2c7-4d67-91ea-7c40c374c585", "DetectTime": "2023-10-30T14:07:02.779155+02:00", "EventTime": "2023-10-30T14:07:02.779171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.217.224.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.217.224.134 ", "ContentType": "text/plain"}], "uids": ["C32GQy4c1Ng8fYDAT5"]} -{"Format": "IDEA0", "ID": "d7e75b27-6d4a-476a-9c61-eead3431b01f", "DetectTime": "2023-10-30T14:07:02.809831+02:00", "EventTime": "2023-10-30T14:07:02.809858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CLP2ew4OfHW304HmA8"]} -{"Format": "IDEA0", "ID": "81517bbd-2e55-41ed-badd-2f010447668b", "DetectTime": "2023-10-30T14:07:02.837587+02:00", "EventTime": "2023-10-30T14:07:02.837604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.7.208.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.7.208.130 ", "ContentType": "text/plain"}], "uids": ["CWV3jW23ZlcvARsy6l"]} -{"Format": "IDEA0", "ID": "10bd59a3-5b26-4ac6-a2f5-dd6e83b4fb08", "DetectTime": "2023-10-30T14:07:02.866240+02:00", "EventTime": "2023-10-30T14:07:02.866262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.37.182.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.37.182.77 ", "ContentType": "text/plain"}], "uids": ["CUUxQe358wAqLKVhF3"]} -{"Format": "IDEA0", "ID": "e13d8780-22dd-4bc4-a3fb-2fb143905976", "DetectTime": "2023-10-30T14:07:02.896234+02:00", "EventTime": "2023-10-30T14:07:02.896252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.14.30.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.14.30.94 ", "ContentType": "text/plain"}], "uids": ["CtiymW187GEaOnuBvk"]} -{"Format": "IDEA0", "ID": "971b54a8-d48e-4aab-b6da-2c6bb0b254bd", "DetectTime": "2023-10-30T14:07:02.923612+02:00", "EventTime": "2023-10-30T14:07:02.923628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.25.116.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.25.116.35 ", "ContentType": "text/plain"}], "uids": ["CZ15YF4u3QaMNPbQ9i"]} -{"Format": "IDEA0", "ID": "9e667420-0efb-481c-aaa1-30abe735da43", "DetectTime": "2023-10-30T14:07:02.954833+02:00", "EventTime": "2023-10-30T14:07:02.954855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.130.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.130.200 ", "ContentType": "text/plain"}], "uids": ["CgCMXg1TVvnCpW6o26"]} -{"Format": "IDEA0", "ID": "d36b03b6-7240-416a-a034-f3611bcb2664", "DetectTime": "2023-10-30T14:07:02.984500+02:00", "EventTime": "2023-10-30T14:07:02.984516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.119.61.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.119.61.37 ", "ContentType": "text/plain"}], "uids": ["Cs5Juh43eH5nglZnRi"]} -{"Format": "IDEA0", "ID": "d4d5d829-f061-44df-96f0-a1cc63ea5c90", "DetectTime": "2023-10-30T14:07:03.017390+02:00", "EventTime": "2023-10-30T14:07:03.017411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.90.55.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.90.55.50 ", "ContentType": "text/plain"}], "uids": ["Cnm7534htDGGyokzVe"]} -{"Format": "IDEA0", "ID": "2fc1e684-5ed4-4e60-8c7b-5d2ec88f8d6a", "DetectTime": "2023-10-30T14:07:03.045354+02:00", "EventTime": "2023-10-30T14:07:03.045370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CmpQBe2W7hwzJn4g4a"]} -{"Format": "IDEA0", "ID": "6a2a3b31-8711-443a-9ea3-7e5ed4ed09ee", "DetectTime": "2023-10-30T14:07:03.073728+02:00", "EventTime": "2023-10-30T14:07:03.073749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CdcLoC4GS2QEpIrQMa"]} -{"Format": "IDEA0", "ID": "7cc56b10-1067-4399-8499-68b7dc573745", "DetectTime": "2023-10-30T14:07:03.101773+02:00", "EventTime": "2023-10-30T14:07:03.101798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.242.167.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.242.167.2 ", "ContentType": "text/plain"}], "uids": ["C04xD61hCqZiDzadU2"]} -{"Format": "IDEA0", "ID": "d32dc080-c2d6-4048-8a41-7abdfa713266", "DetectTime": "2023-10-30T14:07:03.135183+02:00", "EventTime": "2023-10-30T14:07:03.135201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.70.71.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.70.71.239 ", "ContentType": "text/plain"}], "uids": ["Cd3pFZ1BYryg1eO1N3"]} -{"Format": "IDEA0", "ID": "16639a0b-4e07-4e2f-9ed8-1239994485e9", "DetectTime": "2023-10-30T14:07:03.164720+02:00", "EventTime": "2023-10-30T14:07:03.164737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.88.11.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.88.11.18 ", "ContentType": "text/plain"}], "uids": ["CA48OA3hg84YPswqY3"]} -{"Format": "IDEA0", "ID": "c2039a23-d75f-421a-b26a-6709653679bd", "DetectTime": "2023-10-30T14:07:03.188742+02:00", "EventTime": "2023-10-30T14:07:03.188763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["CtHKsZ2Gq86XGveDDb"]} -{"Format": "IDEA0", "ID": "0e88d8d6-a04c-4aca-8d31-a65acad286fa", "DetectTime": "2023-10-30T14:07:03.215413+02:00", "EventTime": "2023-10-30T14:07:03.215431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.28.204.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.28.204.173 ", "ContentType": "text/plain"}], "uids": ["CbXtlA1u6HbGoFuzpk"]} -{"Format": "IDEA0", "ID": "b675590f-2e16-4617-a311-cc588d4aede9", "DetectTime": "2023-10-30T14:07:03.243053+02:00", "EventTime": "2023-10-30T14:07:03.243071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.183.131.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.183.131.195 ", "ContentType": "text/plain"}], "uids": ["Ca2ncc3uZrdhTjNJQf"]} -{"Format": "IDEA0", "ID": "90ffb571-0160-426f-bf2b-5bfd6375056b", "DetectTime": "2023-10-30T14:07:03.269737+02:00", "EventTime": "2023-10-30T14:07:03.269752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.231.149.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.231.149.46 ", "ContentType": "text/plain"}], "uids": ["CsVomHJ5fLudRhZHj"]} -{"Format": "IDEA0", "ID": "8b1c4552-e086-4901-8b01-9dd2b8671d11", "DetectTime": "2023-10-30T14:07:03.297577+02:00", "EventTime": "2023-10-30T14:07:03.297592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.8.125.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.8.125.94 ", "ContentType": "text/plain"}], "uids": ["CSJ4tx4sj11mNRd2zb"]} -{"Format": "IDEA0", "ID": "6e8d7ea1-9f82-49ae-b17f-53b698081449", "DetectTime": "2023-10-30T14:07:03.322775+02:00", "EventTime": "2023-10-30T14:07:03.322803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.14.191"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.14.191 ", "ContentType": "text/plain"}], "uids": ["C1agrPSXEX4nneWxl"]} -{"Format": "IDEA0", "ID": "97ed82c1-156d-4e0f-a785-f52a7fb2127d", "DetectTime": "2023-10-30T14:07:03.347384+02:00", "EventTime": "2023-10-30T14:07:03.347399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["204.214.40.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 204.214.40.200 ", "ContentType": "text/plain"}], "uids": ["C5yEY902IC4XlQqJi"]} -{"Format": "IDEA0", "ID": "ae4da2ac-f29a-4a3c-9128-de14ce1f79e1", "DetectTime": "2023-10-30T14:07:03.376819+02:00", "EventTime": "2023-10-30T14:07:03.376839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.116.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.89.116.82 ", "ContentType": "text/plain"}], "uids": ["ClvZVm3OPk4PeQ1PM3"]} -{"Format": "IDEA0", "ID": "2ffb3e98-185c-4102-860a-dbcbc5989416", "DetectTime": "2023-10-30T14:07:03.405719+02:00", "EventTime": "2023-10-30T14:07:03.405735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.231.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.231.112 ", "ContentType": "text/plain"}], "uids": ["CcujxbJxHd7bsWjc2"]} -{"Format": "IDEA0", "ID": "a0642c3a-a0ae-4859-8434-1605e7f8bb94", "DetectTime": "2023-10-30T14:07:03.427743+02:00", "EventTime": "2023-10-30T14:07:03.427754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.159.134.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.159.134.66 ", "ContentType": "text/plain"}], "uids": ["C6xklU1iR5Mfb8NHL9"]} -{"Format": "IDEA0", "ID": "b8158f23-6d9b-40ac-9e10-651163011631", "DetectTime": "2023-10-30T14:07:03.451179+02:00", "EventTime": "2023-10-30T14:07:03.451199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.24.108.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.24.108.105 ", "ContentType": "text/plain"}], "uids": ["CBbT1zhHUhYDkliV9"]} -{"Format": "IDEA0", "ID": "64817f81-4655-4dcd-9d51-4503a9a816cf", "DetectTime": "2023-10-30T14:07:03.476926+02:00", "EventTime": "2023-10-30T14:07:03.476944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.130.129.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.130.129.114 ", "ContentType": "text/plain"}], "uids": ["Cpl3fynwxtHhwnOO6"]} -{"Format": "IDEA0", "ID": "8c1dcdcd-4341-4703-b31f-e528712de48c", "DetectTime": "2023-10-30T14:07:03.506066+02:00", "EventTime": "2023-10-30T14:07:03.506079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["C5MbTu4zhSZSMc9bUl"]} -{"Format": "IDEA0", "ID": "fea340ad-3a97-4962-9836-741da07f1993", "DetectTime": "2023-10-30T14:07:03.534685+02:00", "EventTime": "2023-10-30T14:07:03.534702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.227.240.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.227.240.128 ", "ContentType": "text/plain"}], "uids": ["C8sF001T9o9kPTFC5i"]} -{"Format": "IDEA0", "ID": "3ddd58af-ea1d-46c0-819d-23885e116d6d", "DetectTime": "2023-10-30T14:07:03.559784+02:00", "EventTime": "2023-10-30T14:07:03.559795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["ClvwnT2C5TohWXCoNh"]} -{"Format": "IDEA0", "ID": "bada1168-96ea-4b7d-83c3-b502d0490f11", "DetectTime": "2023-10-30T14:07:03.608720+02:00", "EventTime": "2023-10-30T14:07:03.608737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.174.252.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.174.252.22 ", "ContentType": "text/plain"}], "uids": ["C06mSnFAD28f8j9G6"]} -{"Format": "IDEA0", "ID": "9afae43f-8dce-4a70-9939-060292f31e51", "DetectTime": "2023-10-30T14:07:03.637459+02:00", "EventTime": "2023-10-30T14:07:03.637476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.111.56.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.111.56.170 ", "ContentType": "text/plain"}], "uids": ["CnaClZ3yuyptD5S4Z1"]} -{"Format": "IDEA0", "ID": "498a3095-26e5-4b5f-9817-4e7cfc6d9202", "DetectTime": "2023-10-30T14:07:03.659031+02:00", "EventTime": "2023-10-30T14:07:03.659048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.9.147.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.9.147.155 ", "ContentType": "text/plain"}], "uids": ["CfJVEv1wsfNPlBW41i"]} -{"Format": "IDEA0", "ID": "0186e06a-4822-417e-b487-3824bc8d1347", "DetectTime": "2023-10-30T14:07:03.682196+02:00", "EventTime": "2023-10-30T14:07:03.682212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.105.225 ", "ContentType": "text/plain"}], "uids": ["CJlRTZ2o89VAcEON4g"]} -{"Format": "IDEA0", "ID": "5e58b156-5f26-43c3-8ae8-892e9d444b10", "DetectTime": "2023-10-30T14:07:03.711317+02:00", "EventTime": "2023-10-30T14:07:03.711338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.147.74.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.147.74.118 ", "ContentType": "text/plain"}], "uids": ["CXdPi02kkBkhQOzICk"]} -{"Format": "IDEA0", "ID": "b6551a4a-5d2b-4bef-989e-55392bcb0a6d", "DetectTime": "2023-10-30T14:07:03.739893+02:00", "EventTime": "2023-10-30T14:07:03.739910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.6.159.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.6.159.248 ", "ContentType": "text/plain"}], "uids": ["CwkrOp4MjPfW2125P8"]} -{"Format": "IDEA0", "ID": "b10f79fc-a887-4a5f-aeab-8e0ac7083e04", "DetectTime": "2023-10-30T14:07:03.767724+02:00", "EventTime": "2023-10-30T14:07:03.767740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.208.48.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.208.48.140 ", "ContentType": "text/plain"}], "uids": ["CnWW6i3xP23IKBpiA2"]} -{"Format": "IDEA0", "ID": "2db3ee75-8605-4cd3-8b37-cd8a120d7df8", "DetectTime": "2023-10-30T14:07:03.796824+02:00", "EventTime": "2023-10-30T14:07:03.796835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CbGgv81ncwJNiGvg13"]} -{"Format": "IDEA0", "ID": "f707ea3b-cbe2-48ec-8f7a-0a998552d4cb", "DetectTime": "2023-10-30T14:07:03.821755+02:00", "EventTime": "2023-10-30T14:07:03.821765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.64.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.64.200 ", "ContentType": "text/plain"}], "uids": ["Cim1fp4k8pDRJSNdw7"]} -{"Format": "IDEA0", "ID": "abe7084d-598d-46c6-b418-861018706aa0", "DetectTime": "2023-10-30T14:07:03.842895+02:00", "EventTime": "2023-10-30T14:07:03.842912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CACvPS2a7VNGNgSBs4"]} -{"Format": "IDEA0", "ID": "e2b50469-b7a4-4c87-a907-c52c2daed255", "DetectTime": "2023-10-30T14:07:03.867726+02:00", "EventTime": "2023-10-30T14:07:03.867743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.199.91.254"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.199.91.254 ", "ContentType": "text/plain"}], "uids": ["CEq12a2ka8d4vi9HA3"]} -{"Format": "IDEA0", "ID": "c060c15e-d7ab-4b75-b457-a8e0fffce556", "DetectTime": "2023-10-30T14:07:03.892415+02:00", "EventTime": "2023-10-30T14:07:03.892434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.38.171.165"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.38.171.165 ", "ContentType": "text/plain"}], "uids": ["CsRlAd3d877ukfn0Y5"]} -{"Format": "IDEA0", "ID": "4a8ff399-bbe6-42b7-94c0-677694a40a05", "DetectTime": "2023-10-30T14:07:03.918070+02:00", "EventTime": "2023-10-30T14:07:03.918087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["165.138.86.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 165.138.86.150 ", "ContentType": "text/plain"}], "uids": ["CTWE3i2V3aXMo8WQ8"]} -{"Format": "IDEA0", "ID": "4bf26320-29aa-42e1-82ff-5773337a3d6b", "DetectTime": "2023-10-30T14:07:03.943763+02:00", "EventTime": "2023-10-30T14:07:03.943788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.205.178.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.205.178.217 ", "ContentType": "text/plain"}], "uids": ["CehixH3Jp8zKD9hCYj"]} -{"Format": "IDEA0", "ID": "0ceadfe3-9e2f-4d05-bf67-079e99ea693e", "DetectTime": "2023-10-30T14:07:03.971846+02:00", "EventTime": "2023-10-30T14:07:03.971858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.146.85 ", "ContentType": "text/plain"}], "uids": ["C0wbKZMCcQvkmOj1"]} -{"Format": "IDEA0", "ID": "e53db41f-f91e-4e1c-a882-5f8897a1e3d5", "DetectTime": "2023-10-30T14:07:03.995628+02:00", "EventTime": "2023-10-30T14:07:03.995648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.58.148.23"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.58.148.23 ", "ContentType": "text/plain"}], "uids": ["C59gDp1UdJ21tsGi2b"]} -{"Format": "IDEA0", "ID": "8e756b3a-1a03-4bab-92ad-3c7859cd0566", "DetectTime": "2023-10-30T14:07:04.019660+02:00", "EventTime": "2023-10-30T14:07:04.019681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["C2v4iv2qbFLKfmWINj"]} -{"Format": "IDEA0", "ID": "32783593-36f2-4dd2-acb9-80efdd737857", "DetectTime": "2023-10-30T14:07:04.039804+02:00", "EventTime": "2023-10-30T14:07:04.039817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.46.127.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.46.127.71 ", "ContentType": "text/plain"}], "uids": ["CG3ZWt3Gmsh0ncuzo5"]} -{"Format": "IDEA0", "ID": "5c1266f1-3e73-4282-a616-82c57b611bc9", "DetectTime": "2023-10-30T14:07:04.062164+02:00", "EventTime": "2023-10-30T14:07:04.062179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.167.82.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.167.82.36 ", "ContentType": "text/plain"}], "uids": ["CMk1pL2ITAo4wdRGNc"]} -{"Format": "IDEA0", "ID": "fe18459f-20f1-46ae-afc6-2aefec61ee6e", "DetectTime": "2023-10-30T14:07:04.083143+02:00", "EventTime": "2023-10-30T14:07:04.083156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.45.144.39"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.45.144.39 ", "ContentType": "text/plain"}], "uids": ["CskUAq3NS2CRGX6FKd"]} -{"Format": "IDEA0", "ID": "579e6f12-f677-4c89-bf38-cd435bade244", "DetectTime": "2023-10-30T14:07:04.107117+02:00", "EventTime": "2023-10-30T14:07:04.107134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["61.15.33.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 61.15.33.124 ", "ContentType": "text/plain"}], "uids": ["CRolxC2dqpb3CtHWbh"]} -{"Format": "IDEA0", "ID": "3ce1221e-90d7-4e60-be6c-3f4e6adf42e7", "DetectTime": "2023-10-30T14:07:04.136729+02:00", "EventTime": "2023-10-30T14:07:04.136749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.66.45.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.66.45.163 ", "ContentType": "text/plain"}], "uids": ["CWNjG130IhRFF9b6D9"]} -{"Format": "IDEA0", "ID": "eb22b3ee-8f21-4e4e-967b-061ee0ce3613", "DetectTime": "2023-10-30T14:07:04.159649+02:00", "EventTime": "2023-10-30T14:07:04.159661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.219.246 ", "ContentType": "text/plain"}], "uids": ["Ce6ACG37iQDu4pV7E"]} -{"Format": "IDEA0", "ID": "1aa950ef-d8c7-4a66-af6d-4ef4e4e2835b", "DetectTime": "2023-10-30T14:07:04.187160+02:00", "EventTime": "2023-10-30T14:07:04.187172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.158.2.78 ", "ContentType": "text/plain"}], "uids": ["CKzYn42h7b1JhcJnIj"]} -{"Format": "IDEA0", "ID": "7f32ab61-211c-43f7-845d-fc27b980003f", "DetectTime": "2023-10-30T14:07:04.208790+02:00", "EventTime": "2023-10-30T14:07:04.208801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.84.32"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.84.32 ", "ContentType": "text/plain"}], "uids": ["CDUM8K3DZtHPiP0Ok2"]} -{"Format": "IDEA0", "ID": "3f90acf1-659b-418d-8928-e17900aa4fe9", "DetectTime": "2023-10-30T14:07:04.233485+02:00", "EventTime": "2023-10-30T14:07:04.233502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.50.102.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.50.102.109 ", "ContentType": "text/plain"}], "uids": ["CstpmLwpdHGxGq85"]} -{"Format": "IDEA0", "ID": "b7e41a71-9145-4d48-b432-95ad0d5d2a2d", "DetectTime": "2023-10-30T14:07:04.259463+02:00", "EventTime": "2023-10-30T14:07:04.259484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.228.9.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.228.9.82 ", "ContentType": "text/plain"}], "uids": ["CGNVN340WAmLmls54"]} -{"Format": "IDEA0", "ID": "bf5217fa-de65-42fc-b418-b66852275de0", "DetectTime": "2023-10-30T14:07:04.289501+02:00", "EventTime": "2023-10-30T14:07:04.289525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.43.232.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.43.232.40 ", "ContentType": "text/plain"}], "uids": ["C5ZzbpwnQmcJNTvp7"]} -{"Format": "IDEA0", "ID": "57227efe-7fd7-430f-9b85-32d5feb1084a", "DetectTime": "2023-10-30T14:07:04.317758+02:00", "EventTime": "2023-10-30T14:07:04.317774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.82.219.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.82.219.84 ", "ContentType": "text/plain"}], "uids": ["CLuRir4DiptLzk3ACc"]} -{"Format": "IDEA0", "ID": "1f0ae99a-cb10-4708-9968-108aca0f8a47", "DetectTime": "2023-10-30T14:07:04.348543+02:00", "EventTime": "2023-10-30T14:07:04.348560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C4Y9up30V7NvS7Bqhh"]} -{"Format": "IDEA0", "ID": "68a3451a-634d-4c83-ba88-8a0cfa3e6388", "DetectTime": "2023-10-30T14:07:04.372687+02:00", "EventTime": "2023-10-30T14:07:04.372705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.203.24.77 ", "ContentType": "text/plain"}], "uids": ["CG2o99q3FEHVBuKQi"]} -{"Format": "IDEA0", "ID": "bb14cfe4-18b5-4537-806e-2cd6559aeb5c", "DetectTime": "2023-10-30T14:07:04.397330+02:00", "EventTime": "2023-10-30T14:07:04.397347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.165.181.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.165.181.124 ", "ContentType": "text/plain"}], "uids": ["Ch4Mri1QsiB33dQHPb"]} -{"Format": "IDEA0", "ID": "33c2f8c4-99ee-4b29-aef9-3ca38aa9baea", "DetectTime": "2023-10-30T14:07:04.423786+02:00", "EventTime": "2023-10-30T14:07:04.423804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.85.182.203"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.85.182.203 ", "ContentType": "text/plain"}], "uids": ["CNGzDk23upf9NRv2T8"]} -{"Format": "IDEA0", "ID": "a4b88eb9-5876-4e07-9aee-2a280b9b809b", "DetectTime": "2023-10-30T14:07:04.444601+02:00", "EventTime": "2023-10-30T14:07:04.444613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.174.206.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.174.206.51 ", "ContentType": "text/plain"}], "uids": ["CkAAOZ2cWhIgqxWyDh"]} -{"Format": "IDEA0", "ID": "bc3782c5-8f85-47a2-a6a7-b7d16d52b5ee", "DetectTime": "2023-10-30T14:07:04.472472+02:00", "EventTime": "2023-10-30T14:07:04.472492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.237.15.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.237.15.33 ", "ContentType": "text/plain"}], "uids": ["C2XLCd14U6w8GQr5og"]} -{"Format": "IDEA0", "ID": "ccf3647f-ebdd-4d90-89c4-b675c54a0259", "DetectTime": "2023-10-30T14:07:04.495582+02:00", "EventTime": "2023-10-30T14:07:04.495594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrpsK63lLg3Nu5aK7b"]} -{"Format": "IDEA0", "ID": "2b10c0a5-687b-436c-986f-af63eaef5200", "DetectTime": "2023-10-30T14:07:04.525794+02:00", "EventTime": "2023-10-30T14:07:04.525810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.189.172.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.189.172.113 ", "ContentType": "text/plain"}], "uids": ["CeIoDJ23UxhQhid9Li"]} -{"Format": "IDEA0", "ID": "eed06342-c08d-467a-911c-6c69bf2f31a6", "DetectTime": "2023-10-30T14:07:04.553457+02:00", "EventTime": "2023-10-30T14:07:04.553476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["ChNl0Y3Z3I6Aswibua"]} -{"Format": "IDEA0", "ID": "518f8a0d-cccb-443a-94cf-fa2119abc7d0", "DetectTime": "2023-10-30T14:07:04.577231+02:00", "EventTime": "2023-10-30T14:07:04.577242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.33.110.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.33.110.250 ", "ContentType": "text/plain"}], "uids": ["CQ5Vtd3IwhAL13MKug"]} -{"Format": "IDEA0", "ID": "d26ca907-9726-47bc-b4b5-cabeaab890bf", "DetectTime": "2023-10-30T14:07:04.599202+02:00", "EventTime": "2023-10-30T14:07:04.599218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CX8ZiA3UXw8ACU01wj"]} -{"Format": "IDEA0", "ID": "9fc21e9f-b2ec-4c06-be90-f18f5364b5e5", "DetectTime": "2023-10-30T14:07:04.627084+02:00", "EventTime": "2023-10-30T14:07:04.627105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["141.99.133.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 141.99.133.54 ", "ContentType": "text/plain"}], "uids": ["CDLY5i4UtSJzXscknj"]} -{"Format": "IDEA0", "ID": "66fff35b-1668-464d-b088-6b997e0f97d9", "DetectTime": "2023-10-30T14:07:04.655419+02:00", "EventTime": "2023-10-30T14:07:04.655434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["CeX2w737O3WIgcOde"]} -{"Format": "IDEA0", "ID": "f7b8d126-fd6c-49aa-b789-a7deebc734b9", "DetectTime": "2023-10-30T14:07:04.675369+02:00", "EventTime": "2023-10-30T14:07:04.675389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.96.97.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.96.97.18 ", "ContentType": "text/plain"}], "uids": ["CRR8xw170ebPPmL7G6"]} -{"Format": "IDEA0", "ID": "6a159e19-a1a5-4101-a8de-ef404fe62f16", "DetectTime": "2023-10-30T14:07:04.698032+02:00", "EventTime": "2023-10-30T14:07:04.698042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CvpZ7p2OGi0ACKkS4l"]} -{"Format": "IDEA0", "ID": "66fb1455-8ab7-4a48-a8f6-45194f8e1807", "DetectTime": "2023-10-30T14:07:04.717089+02:00", "EventTime": "2023-10-30T14:07:04.717107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["C9mumlhtVyiOlHzq9"]} -{"Format": "IDEA0", "ID": "1767e2f2-6313-4e66-aac3-33fc687c1244", "DetectTime": "2023-10-30T14:07:04.739027+02:00", "EventTime": "2023-10-30T14:07:04.739040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CFfMn73Yl1I8ktRCtc"]} -{"Format": "IDEA0", "ID": "82471f5c-6c35-4f1f-abc8-1fe9a9948f75", "DetectTime": "2023-10-30T14:07:04.761290+02:00", "EventTime": "2023-10-30T14:07:04.761308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CPW0sk1Es6ljTqOdJ4"]} -{"Format": "IDEA0", "ID": "c775e297-8ba1-4805-baf4-7847bb8c5091", "DetectTime": "2023-10-30T14:07:04.788732+02:00", "EventTime": "2023-10-30T14:07:04.788744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cv1io93ImKWc0sVfTj"]} -{"Format": "IDEA0", "ID": "ea96e385-b84f-4d9f-a314-01993e8a74e3", "DetectTime": "2023-10-30T14:07:04.810329+02:00", "EventTime": "2023-10-30T14:07:04.810342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CyqN992jBTVt7YHor3"]} -{"Format": "IDEA0", "ID": "ed00fa63-890e-47b7-9ddd-9b6cccab4210", "DetectTime": "2023-10-30T14:07:04.835067+02:00", "EventTime": "2023-10-30T14:07:04.835088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C8EL4Y2gseUSrZAEVc"]} -{"Format": "IDEA0", "ID": "1719b380-0883-4630-a77c-840f6bca48a2", "DetectTime": "2023-10-30T14:07:04.854650+02:00", "EventTime": "2023-10-30T14:07:04.854667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CoyXLG375lKyWdy1ec"]} -{"Format": "IDEA0", "ID": "10febe0f-c3f4-4d22-991d-dfc2b5166aaa", "DetectTime": "2023-10-30T14:07:04.874526+02:00", "EventTime": "2023-10-30T14:07:04.874546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["CpIcoq3xPkkQcRupXj"]} -{"Format": "IDEA0", "ID": "e5082dd7-bfeb-4e7b-89f9-c3edefe81bae", "DetectTime": "2023-10-30T14:07:04.897463+02:00", "EventTime": "2023-10-30T14:07:04.897475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.131.236.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.131.236.157 ", "ContentType": "text/plain"}], "uids": ["ChE0Z73RH1gGue7vUg"]} -{"Format": "IDEA0", "ID": "97dd6264-fe41-48e2-b529-3a8bbcaad2d2", "DetectTime": "2023-10-30T14:07:04.923391+02:00", "EventTime": "2023-10-30T14:07:04.923408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CEOAYb4NRulb0fkY3"]} -{"Format": "IDEA0", "ID": "f212664a-1cdb-40bc-878c-1222ca01226d", "DetectTime": "2023-10-30T14:07:04.947455+02:00", "EventTime": "2023-10-30T14:07:04.947467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.248.120.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.248.120.197 ", "ContentType": "text/plain"}], "uids": ["CyebuyCKD4CJserw5"]} -{"Format": "IDEA0", "ID": "f4d321de-fe8e-4bb7-82e1-84acd3c0e92b", "DetectTime": "2023-10-30T14:07:04.967283+02:00", "EventTime": "2023-10-30T14:07:04.967295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQOCuN00N2hW01Md3"]} -{"Format": "IDEA0", "ID": "d155dcca-408b-4289-bda7-a15882019dd8", "DetectTime": "2023-10-30T14:07:04.989472+02:00", "EventTime": "2023-10-30T14:07:04.989489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["C1Uoa1arlH59sg26c"]} -{"Format": "IDEA0", "ID": "e0d98bce-22af-4cc4-8a6b-76605c07b4c2", "DetectTime": "2023-10-30T14:07:05.015640+02:00", "EventTime": "2023-10-30T14:07:05.015653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CVx2003NzSnbWHcX3h"]} -{"Format": "IDEA0", "ID": "4ad3a8a6-fe95-4880-82eb-57f3003b5a5d", "DetectTime": "2023-10-30T14:07:05.042708+02:00", "EventTime": "2023-10-30T14:07:05.042724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CrRmY9148WLS1cvfa4"]} -{"Format": "IDEA0", "ID": "f604bf6b-74b0-49e0-888b-636856f0e4c0", "DetectTime": "2023-10-30T14:07:05.069010+02:00", "EventTime": "2023-10-30T14:07:05.069023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.8.121.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.8.121.25 ", "ContentType": "text/plain"}], "uids": ["ChufgC353vBWhTijl8"]} -{"Format": "IDEA0", "ID": "0887c437-bac6-4670-9c4a-07d3b9f0d8e9", "DetectTime": "2023-10-30T14:07:05.088106+02:00", "EventTime": "2023-10-30T14:07:05.088117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["Cwt6hA1LyxbvY9yJd9"]} -{"Format": "IDEA0", "ID": "2dd91daf-84ad-4c38-bd34-0be18d02587f", "DetectTime": "2023-10-30T14:07:05.111158+02:00", "EventTime": "2023-10-30T14:07:05.111175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CSYiNh4zxrI5D5dd03"]} -{"Format": "IDEA0", "ID": "d1d68e58-a490-44c2-89df-808c227bc53c", "DetectTime": "2023-10-30T14:07:05.133710+02:00", "EventTime": "2023-10-30T14:07:05.133726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Ccslrh4xlp0n1sl799"]} -{"Format": "IDEA0", "ID": "f1970083-0fed-41e6-8bf4-864e8090128b", "DetectTime": "2023-10-30T14:07:05.154748+02:00", "EventTime": "2023-10-30T14:07:05.154763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.151.242.149 ", "ContentType": "text/plain"}], "uids": ["Cr2r8K5UNt5Txo7Rh"]} -{"Format": "IDEA0", "ID": "42e4f14e-3a14-4413-b9d7-cb492d3611c4", "DetectTime": "2023-10-30T14:07:05.180756+02:00", "EventTime": "2023-10-30T14:07:05.180772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.91.64.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.91.64.56 ", "ContentType": "text/plain"}], "uids": ["C1orOO2rzsA1Hm8xaf"]} -{"Format": "IDEA0", "ID": "4dfeea10-aa71-4beb-9a60-8f531d2946ca", "DetectTime": "2023-10-30T14:07:05.209304+02:00", "EventTime": "2023-10-30T14:07:05.209327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["ChyL9oGKtJ9e6jVa6"]} -{"Format": "IDEA0", "ID": "5c22e3ab-79d5-4f0c-9121-0df31d3e5b85", "DetectTime": "2023-10-30T14:07:05.235122+02:00", "EventTime": "2023-10-30T14:07:05.235133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CA33XA3GGSpOE7pqa5"]} -{"Format": "IDEA0", "ID": "6a652ad0-5cbd-438e-8dd2-07855a185dc1", "DetectTime": "2023-10-30T14:07:05.257379+02:00", "EventTime": "2023-10-30T14:07:05.257396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["Cg7nis1e7COmZ8Ira"]} -{"Format": "IDEA0", "ID": "c38bde94-8dda-471e-ad22-f6c99da3b5bb", "DetectTime": "2023-10-30T14:07:05.281372+02:00", "EventTime": "2023-10-30T14:07:05.281387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["Cmq0SadKzHfd6IOXk"]} -{"Format": "IDEA0", "ID": "e66c65df-3d3a-4798-83be-627fea4b269b", "DetectTime": "2023-10-30T14:07:05.306678+02:00", "EventTime": "2023-10-30T14:07:05.306696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.105.225 ", "ContentType": "text/plain"}], "uids": ["CiWT2a34MyzTgVXX03"]} -{"Format": "IDEA0", "ID": "6d529380-d56f-4101-a0f0-10ef3031155b", "DetectTime": "2023-10-30T14:07:05.333631+02:00", "EventTime": "2023-10-30T14:07:05.333648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.17.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.17.106 ", "ContentType": "text/plain"}], "uids": ["CbrfTj1han2c5Wanp4"]} -{"Format": "IDEA0", "ID": "a73b3dde-a2dd-4084-81af-aa052db2d774", "DetectTime": "2023-10-30T14:07:05.356256+02:00", "EventTime": "2023-10-30T14:07:05.356267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CAkyEp10M6DklSO0of"]} -{"Format": "IDEA0", "ID": "8766cd53-3064-4fa6-a524-04bc17d612e1", "DetectTime": "2023-10-30T14:07:05.376823+02:00", "EventTime": "2023-10-30T14:07:05.376839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CPqc742pHEf8k45vrh"]} -{"Format": "IDEA0", "ID": "eaff5790-f1f3-4241-9ba7-a92a7cd99b4c", "DetectTime": "2023-10-30T14:07:05.401546+02:00", "EventTime": "2023-10-30T14:07:05.401569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.118.81.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.118.81.174 ", "ContentType": "text/plain"}], "uids": ["C0ankn4m2H0tySKO6g"]} -{"Format": "IDEA0", "ID": "0059588d-2fee-4895-9fe7-f0652f497e52", "DetectTime": "2023-10-30T14:07:05.425992+02:00", "EventTime": "2023-10-30T14:07:05.426003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["Cf7Rp32E2pTrwTqEDd"]} -{"Format": "IDEA0", "ID": "486d9603-724d-45a6-a26c-9def403d6ae5", "DetectTime": "2023-10-30T14:07:05.451694+02:00", "EventTime": "2023-10-30T14:07:05.451714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CvX7OezBEVtgLUtf5"]} -{"Format": "IDEA0", "ID": "565613a4-8c97-44a9-ba5b-a476a36929a8", "DetectTime": "2023-10-30T14:07:05.479306+02:00", "EventTime": "2023-10-30T14:07:05.479317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["C8kwqD2fBpvs1dU0L"]} -{"Format": "IDEA0", "ID": "53a89a06-367f-4ebf-b053-8499a00817ee", "DetectTime": "2023-10-30T14:07:05.502101+02:00", "EventTime": "2023-10-30T14:07:05.502123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CV41IyHhgpTU79Imk"]} -{"Format": "IDEA0", "ID": "53800dc7-ef10-4629-aece-39f7e0202327", "DetectTime": "2023-10-30T14:07:05.560545+02:00", "EventTime": "2023-10-30T14:07:05.560566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.67.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.67.50 ", "ContentType": "text/plain"}], "uids": ["CF20O44HeoDaqjiRgf"]} -{"Format": "IDEA0", "ID": "950f3aff-a301-42a1-b3bc-5d191e64aa99", "DetectTime": "2023-10-30T14:07:05.586715+02:00", "EventTime": "2023-10-30T14:07:05.586727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CZh6fsXAhCub9CPnd"]} -{"Format": "IDEA0", "ID": "2a9ac71c-2eac-4927-a622-a6671f833d00", "DetectTime": "2023-10-30T14:07:05.614573+02:00", "EventTime": "2023-10-30T14:07:05.614588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CepQ4X2lwctD40DIx3"]} -{"Format": "IDEA0", "ID": "881d0596-c185-41d5-8634-33adaeb299d4", "DetectTime": "2023-10-30T14:07:05.642392+02:00", "EventTime": "2023-10-30T14:07:05.642407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CuoyVMTi1s3Dj8pab"]} -{"Format": "IDEA0", "ID": "66244356-a879-4757-8cdf-e9d99414d4f0", "DetectTime": "2023-10-30T14:07:05.665179+02:00", "EventTime": "2023-10-30T14:07:05.665191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["Cdye3S1EJI0ex7iw06"]} -{"Format": "IDEA0", "ID": "6c896ef1-fff1-4f2d-b6a8-967b9f7f8064", "DetectTime": "2023-10-30T14:07:05.688070+02:00", "EventTime": "2023-10-30T14:07:05.688081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.174.206.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.174.206.51 ", "ContentType": "text/plain"}], "uids": ["CwebMk2YHaB7hTJv52"]} -{"Format": "IDEA0", "ID": "1712c3a9-4b46-40d2-bf27-30b0ece312e6", "DetectTime": "2023-10-30T14:07:05.713413+02:00", "EventTime": "2023-10-30T14:07:05.713429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CDB9e51AYmg52f33G8"]} -{"Format": "IDEA0", "ID": "d170c5e1-7f5e-4d0a-8eb6-ae80fd574af3", "DetectTime": "2023-10-30T14:07:05.739833+02:00", "EventTime": "2023-10-30T14:07:05.739845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.205.178.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.205.178.217 ", "ContentType": "text/plain"}], "uids": ["CoZOy1oBinoMiacx2"]} -{"Format": "IDEA0", "ID": "8a20c510-cf6d-4173-a56e-809ee257f3cb", "DetectTime": "2023-10-30T14:07:05.760340+02:00", "EventTime": "2023-10-30T14:07:05.760353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CYXEGo2ns4Qr91Khcd"]} -{"Format": "IDEA0", "ID": "bbc089d6-4c31-49a7-8f98-7de311cc070a", "DetectTime": "2023-10-30T14:07:05.781196+02:00", "EventTime": "2023-10-30T14:07:05.781208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["CBfO4i2YxzMfDS7XL7"]} -{"Format": "IDEA0", "ID": "a5dfb103-8347-4181-8585-4d39e01e7d30", "DetectTime": "2023-10-30T14:07:05.806183+02:00", "EventTime": "2023-10-30T14:07:05.806199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.9.147.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.9.147.155 ", "ContentType": "text/plain"}], "uids": ["Cj50LU3SUWikwCKuC9"]} -{"Format": "IDEA0", "ID": "9d3f073a-6991-433f-bcaf-7d705c56a200", "DetectTime": "2023-10-30T14:07:05.836296+02:00", "EventTime": "2023-10-30T14:07:05.836313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CauF341RvXQXFpT959"]} -{"Format": "IDEA0", "ID": "316e331e-8a89-4424-a3b2-fb90604fddef", "DetectTime": "2023-10-30T14:07:05.861350+02:00", "EventTime": "2023-10-30T14:07:05.861366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.116.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.89.116.82 ", "ContentType": "text/plain"}], "uids": ["C4QLVR3AXdBt9JSPzf"]} -{"Format": "IDEA0", "ID": "cbbf0cb1-e4a3-4ebc-8468-b31795f012a4", "DetectTime": "2023-10-30T14:07:05.887162+02:00", "EventTime": "2023-10-30T14:07:05.887177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["CxmhcH3zBpLIJEj0m4"]} -{"Format": "IDEA0", "ID": "7ac75420-0896-4b35-aa6a-608e0a37c58d", "DetectTime": "2023-10-30T14:07:05.908932+02:00", "EventTime": "2023-10-30T14:07:05.908943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.146.85 ", "ContentType": "text/plain"}], "uids": ["C9IL3X2XbmTQYs1Fna"]} -{"Format": "IDEA0", "ID": "1238feb6-e92c-4720-aadd-074f35b08bc1", "DetectTime": "2023-10-30T14:07:05.931790+02:00", "EventTime": "2023-10-30T14:07:05.931808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["CKGpdg2VVLDq19NNUl"]} -{"Format": "IDEA0", "ID": "75c1680c-27ae-4721-8388-543922c58428", "DetectTime": "2023-10-30T14:07:05.955713+02:00", "EventTime": "2023-10-30T14:07:05.955732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CdKutgbaKGm7DLJhk"]} -{"Format": "IDEA0", "ID": "ec008d8c-77c0-40e7-92ce-f6d746cee6c1", "DetectTime": "2023-10-30T14:07:05.977866+02:00", "EventTime": "2023-10-30T14:07:05.977880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["Coq3Qz4qvK1NgySj12"]} -{"Format": "IDEA0", "ID": "0a96b43e-660e-4a72-967b-b89f85f799a4", "DetectTime": "2023-10-30T14:07:06.001703+02:00", "EventTime": "2023-10-30T14:07:06.001721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CZmJGk34dGIPWiKoC6"]} -{"Format": "IDEA0", "ID": "3343f545-fce6-44d5-95c2-0322826fa42a", "DetectTime": "2023-10-30T14:07:06.034161+02:00", "EventTime": "2023-10-30T14:07:06.034174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["ChufOs2OdJ6chgPXod"]} -{"Format": "IDEA0", "ID": "bf84bb97-8804-442b-9b11-faecb3f6cb9d", "DetectTime": "2023-10-30T14:07:06.068197+02:00", "EventTime": "2023-10-30T14:07:06.068219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.158.2.78 ", "ContentType": "text/plain"}], "uids": ["CPbqVe4PCB27HS2Tgc"]} -{"Format": "IDEA0", "ID": "648db45c-5b7d-47ad-930f-1d8729ab9b82", "DetectTime": "2023-10-30T14:07:06.093790+02:00", "EventTime": "2023-10-30T14:07:06.093803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["C2gbQR33N7qqL3y0m3"]} -{"Format": "IDEA0", "ID": "cecb08fb-16eb-4157-a787-a11fba86e29c", "DetectTime": "2023-10-30T14:07:06.120083+02:00", "EventTime": "2023-10-30T14:07:06.120094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.146.85 ", "ContentType": "text/plain"}], "uids": ["CIAufm3si0lA02zw3"]} -{"Format": "IDEA0", "ID": "32c6e2cf-dbe7-41d8-bf90-8d635030491b", "DetectTime": "2023-10-30T14:07:06.142764+02:00", "EventTime": "2023-10-30T14:07:06.142798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CbeFTdL9m9wS7ws6e"]} -{"Format": "IDEA0", "ID": "a574129b-4311-4b77-84a8-2df148542964", "DetectTime": "2023-10-30T14:07:06.168569+02:00", "EventTime": "2023-10-30T14:07:06.168588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["COLUdv3biJlvwQC227"]} -{"Format": "IDEA0", "ID": "3ce2ca68-6cc8-4590-a3ed-eed0209f8d02", "DetectTime": "2023-10-30T14:07:06.195446+02:00", "EventTime": "2023-10-30T14:07:06.195463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.70.71.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.70.71.239 ", "ContentType": "text/plain"}], "uids": ["Cce1ED2AlviNRSQOa2"]} -{"Format": "IDEA0", "ID": "e6155d7a-bc18-4afa-8d93-5335f24d335b", "DetectTime": "2023-10-30T14:07:06.221721+02:00", "EventTime": "2023-10-30T14:07:06.221734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C4CLr91foNkUsjDMll"]} -{"Format": "IDEA0", "ID": "4dab2595-4f11-48e2-8f13-2b83eaa6f483", "DetectTime": "2023-10-30T14:07:06.247543+02:00", "EventTime": "2023-10-30T14:07:06.247554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.67.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.104.67.50 ", "ContentType": "text/plain"}], "uids": ["C1qcgJ3kDUx2Eai5v5"]} -{"Format": "IDEA0", "ID": "451c1064-39b9-409b-93de-cf0535e3184b", "DetectTime": "2023-10-30T14:07:06.277663+02:00", "EventTime": "2023-10-30T14:07:06.277679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.174.206.51"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.174.206.51 ", "ContentType": "text/plain"}], "uids": ["CdaN3O3NUHFHJ2Tboj"]} -{"Format": "IDEA0", "ID": "81c3170f-9e41-4df8-a2a7-7f927e237c95", "DetectTime": "2023-10-30T14:07:06.302885+02:00", "EventTime": "2023-10-30T14:07:06.302900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.116.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.89.116.82 ", "ContentType": "text/plain"}], "uids": ["CFXukw27kMlBptsx6f"]} -{"Format": "IDEA0", "ID": "18acd8de-7b60-4184-978c-ad73955e41a6", "DetectTime": "2023-10-30T14:07:06.332497+02:00", "EventTime": "2023-10-30T14:07:06.332513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3ywDf33d0VUMWD2Fb"]} -{"Format": "IDEA0", "ID": "321ed926-b107-45e5-8f72-e4d6069ff52c", "DetectTime": "2023-10-30T14:07:06.363868+02:00", "EventTime": "2023-10-30T14:07:06.363883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.118.81.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.118.81.174 ", "ContentType": "text/plain"}], "uids": ["C2CJsJ2M9FOYXRXTg9"]} -{"Format": "IDEA0", "ID": "8ae4f844-320e-44af-9026-1072107a2e26", "DetectTime": "2023-10-30T14:07:06.396206+02:00", "EventTime": "2023-10-30T14:07:06.396222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.17.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.17.106 ", "ContentType": "text/plain"}], "uids": ["CA2QtL3YKnC8DfwiU5"]} -{"Format": "IDEA0", "ID": "420eb926-6473-490b-ab77-8833dd549ada", "DetectTime": "2023-10-30T14:07:06.426264+02:00", "EventTime": "2023-10-30T14:07:06.426287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CymKAv3Rj8yE3yksck"]} -{"Format": "IDEA0", "ID": "7c1c7f76-1786-4357-9e2c-da1bb1c7cba5", "DetectTime": "2023-10-30T14:07:06.460635+02:00", "EventTime": "2023-10-30T14:07:06.460651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.70.71.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.70.71.239 ", "ContentType": "text/plain"}], "uids": ["CiqJEV2BgJVHGwNBrh"]} -{"Format": "IDEA0", "ID": "4e08fffe-08b4-463a-a983-bae3ae7f7b7d", "DetectTime": "2023-10-30T14:07:06.493498+02:00", "EventTime": "2023-10-30T14:07:06.493521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CT50fY2gHAMCNz6cz4"]} -{"Format": "IDEA0", "ID": "7147190f-752e-4d93-92d2-6141a2de2f1f", "DetectTime": "2023-10-30T14:07:06.527450+02:00", "EventTime": "2023-10-30T14:07:06.527470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CjSszs3xJKiAw1Hybf"]} -{"Format": "IDEA0", "ID": "af35f5ba-67d3-4042-8c58-399e597c0f9f", "DetectTime": "2023-10-30T14:07:06.560258+02:00", "EventTime": "2023-10-30T14:07:06.560280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CQb7gSb3aRwe5c6Ge"]} -{"Format": "IDEA0", "ID": "e29660a7-fb81-400c-b9ae-54b1d8072d0d", "DetectTime": "2023-10-30T14:07:06.593113+02:00", "EventTime": "2023-10-30T14:07:06.593133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CMQCHM3lLA1YEb5pel"]} -{"Format": "IDEA0", "ID": "17d4f4f3-572c-4bce-a100-73d1fe78ab7f", "DetectTime": "2023-10-30T14:07:06.626100+02:00", "EventTime": "2023-10-30T14:07:06.626117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CgG9ie0KAl3EviR44"]} -{"Format": "IDEA0", "ID": "45080cec-1e8d-4ad3-8c30-ae4f898b149d", "DetectTime": "2023-10-30T14:07:06.659402+02:00", "EventTime": "2023-10-30T14:07:06.659419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.9.147.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 58.9.147.155 ", "ContentType": "text/plain"}], "uids": ["CtpJyq4UUlVo6tOQLi"]} -{"Format": "IDEA0", "ID": "49bfb166-ddd6-4806-971d-2a6ddce49a44", "DetectTime": "2023-10-30T14:07:06.692114+02:00", "EventTime": "2023-10-30T14:07:06.692134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Ck1FNW3YRmB6H2Y4d1"]} -{"Format": "IDEA0", "ID": "7f8056b4-80e8-4825-8549-9e1d81b3091f", "DetectTime": "2023-10-30T14:07:06.719351+02:00", "EventTime": "2023-10-30T14:07:06.719371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["C9K5P746wwtCPEEIP5"]} -{"Format": "IDEA0", "ID": "5db230bd-08b6-49bc-9ffa-bd3f6c3613bf", "DetectTime": "2023-10-30T14:07:06.745540+02:00", "EventTime": "2023-10-30T14:07:06.745557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["C3rXSP2da7DlruKFZ5"]} -{"Format": "IDEA0", "ID": "b850b2d2-b3ba-45fe-ac2e-d22b8d3599bb", "DetectTime": "2023-10-30T14:07:06.777321+02:00", "EventTime": "2023-10-30T14:07:06.777332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.91.64.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.91.64.56 ", "ContentType": "text/plain"}], "uids": ["CP7cci4CrrnIpxdo22"]} -{"Format": "IDEA0", "ID": "4f2a6a9c-71e2-42f0-95ad-7d132e9819f4", "DetectTime": "2023-10-30T14:07:06.802178+02:00", "EventTime": "2023-10-30T14:07:06.802193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.8.121.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.8.121.25 ", "ContentType": "text/plain"}], "uids": ["CeGcUz3uBErJhXC09"]} -{"Format": "IDEA0", "ID": "328fb74d-aa29-421a-9b0a-90d379354ff0", "DetectTime": "2023-10-30T14:07:06.829689+02:00", "EventTime": "2023-10-30T14:07:06.829702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4786], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. ", "ContentType": "text/plain"}], "uids": ["CeEH1f3oy5YowFPW77"]} -{"Format": "IDEA0", "ID": "37efeefc-7b3f-4c48-a4b0-c0cc3a1e1185", "DetectTime": "2023-10-30T14:07:06.881566+02:00", "EventTime": "2023-10-30T14:07:06.881578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cwyw5Q3lalyP5q9Xbl"]} -{"Format": "IDEA0", "ID": "33fc02e2-e556-4d9b-bf80-9d16be355c3b", "DetectTime": "2023-10-30T14:07:06.908798+02:00", "EventTime": "2023-10-30T14:07:06.908816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CvqNRi1gVPXBcmjMJ2"]} -{"Format": "IDEA0", "ID": "a53eb723-81d1-4982-b0ab-5108384803e8", "DetectTime": "2023-10-30T14:07:06.935536+02:00", "EventTime": "2023-10-30T14:07:06.935546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CvmB1k4qblVIw1usT3"]} -{"Format": "IDEA0", "ID": "1dd7deaf-d724-4d2d-9da1-2530d360c70d", "DetectTime": "2023-10-30T14:07:06.963271+02:00", "EventTime": "2023-10-30T14:07:06.963293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CiUaUp3I8WsNnzJIHc"]} -{"Format": "IDEA0", "ID": "7e77e807-1d83-4f4f-8d18-eb3d09899c5b", "DetectTime": "2023-10-30T14:07:06.996367+02:00", "EventTime": "2023-10-30T14:07:06.996387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["Cz63QF2d1dzLGQl9s"]} -{"Format": "IDEA0", "ID": "ca53fe85-085c-49b1-9041-7f7a2c73c6a8", "DetectTime": "2023-10-30T14:07:07.031275+02:00", "EventTime": "2023-10-30T14:07:07.031296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C3CjPc3GzJOKWDzgmd"]} -{"Format": "IDEA0", "ID": "1a99548b-55f5-4f3c-b66b-a118a77cfff7", "DetectTime": "2023-10-30T14:07:07.062835+02:00", "EventTime": "2023-10-30T14:07:07.062847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CSOtKR1nGQcVEtyAs2"]} -{"Format": "IDEA0", "ID": "c4f46d6b-7e47-451f-b754-2e51802c95aa", "DetectTime": "2023-10-30T14:07:07.088998+02:00", "EventTime": "2023-10-30T14:07:07.089015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.151.242.149 ", "ContentType": "text/plain"}], "uids": ["CWa8561UFRqfNWXAl"]} -{"Format": "IDEA0", "ID": "c98c12dd-e89f-48f1-b066-93188ed3e321", "DetectTime": "2023-10-30T14:07:07.118137+02:00", "EventTime": "2023-10-30T14:07:07.118153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["Cl2HIaruP89FEVrp"]} -{"Format": "IDEA0", "ID": "0da6173c-cd3a-403c-878a-19504def1a66", "DetectTime": "2023-10-30T14:07:07.142262+02:00", "EventTime": "2023-10-30T14:07:07.142272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.105.225 ", "ContentType": "text/plain"}], "uids": ["CyV49u2n6UCTWBZI79"]} -{"Format": "IDEA0", "ID": "21901b55-7f05-4cb7-aa0b-4e5a8a8ea09e", "DetectTime": "2023-10-30T14:07:07.174866+02:00", "EventTime": "2023-10-30T14:07:07.174882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["Ch1S1DYzOPSnc4f6i"]} -{"Format": "IDEA0", "ID": "1c6c519a-086f-46ec-ba8a-0697d7a0dbcf", "DetectTime": "2023-10-30T14:07:07.199328+02:00", "EventTime": "2023-10-30T14:07:07.199343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CSFJ0T10iUbEWraW04"]} -{"Format": "IDEA0", "ID": "1a9e1fab-4a20-4733-87a9-c91f0c63d3f2", "DetectTime": "2023-10-30T14:07:07.232151+02:00", "EventTime": "2023-10-30T14:07:07.232174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.70.40.131 ", "ContentType": "text/plain"}], "uids": ["COpB2A17xxLi9sECch"]} -{"Format": "IDEA0", "ID": "fd335182-e83e-407f-a9ac-cc1e061d58ba", "DetectTime": "2023-10-30T14:07:07.266330+02:00", "EventTime": "2023-10-30T14:07:07.266351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CiV1DoSqXJtPvsY69"]} -{"Format": "IDEA0", "ID": "1c58ae80-d290-4473-97f3-fa656d5f8aa4", "DetectTime": "2023-10-30T14:07:07.288112+02:00", "EventTime": "2023-10-30T14:07:07.288129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.205.178.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.205.178.217 ", "ContentType": "text/plain"}], "uids": ["CtfWKk3USDcU7DeVIg"]} -{"Format": "IDEA0", "ID": "d850eede-7111-46a0-b7a9-b08baffd0d5f", "DetectTime": "2023-10-30T14:07:07.315482+02:00", "EventTime": "2023-10-30T14:07:07.315497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["Cu8WHd3tGeutMvrC62"]} -{"Format": "IDEA0", "ID": "43342de7-6571-4bb1-b56a-1e13563e1b67", "DetectTime": "2023-10-30T14:07:07.348736+02:00", "EventTime": "2023-10-30T14:07:07.348757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.248.221 ", "ContentType": "text/plain"}], "uids": ["COmgRn4aqREcIQrTU9"]} -{"Format": "IDEA0", "ID": "93fc9a4b-3c38-48a8-8deb-af57021f9f3b", "DetectTime": "2023-10-30T14:07:07.381950+02:00", "EventTime": "2023-10-30T14:07:07.381970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.158.2.78 ", "ContentType": "text/plain"}], "uids": ["CuuC25ybiXT7Qsjb8"]} -{"Format": "IDEA0", "ID": "0fb06d35-028e-4bd7-85ec-6f20e08bb58a", "DetectTime": "2023-10-30T14:07:07.414058+02:00", "EventTime": "2023-10-30T14:07:07.414074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["C135a42HsMfIagrV43"]} -{"Format": "IDEA0", "ID": "1392dbd6-a7a3-4a36-ba7a-6731e38d6377", "DetectTime": "2023-10-30T14:07:07.444092+02:00", "EventTime": "2023-10-30T14:07:07.444110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CFfhKI2IfY4WdPQ1"]} -{"Format": "IDEA0", "ID": "91e873b9-c7f3-4ad0-90f8-72db8d0101ec", "DetectTime": "2023-10-30T14:07:07.475579+02:00", "EventTime": "2023-10-30T14:07:07.475593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CCxJcn13NmqYkqC32k"]} -{"Format": "IDEA0", "ID": "a5f5260b-cc53-43da-a7fc-c9010cf7f3a6", "DetectTime": "2023-10-30T14:07:07.497803+02:00", "EventTime": "2023-10-30T14:07:07.497814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["CmnAhF3cEisw2umvec"]} -{"Format": "IDEA0", "ID": "de815ba5-f8f4-4b35-b213-1cadd9af557b", "DetectTime": "2023-10-30T14:07:07.519931+02:00", "EventTime": "2023-10-30T14:07:07.519943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["Ca5bAO2wJiFGnx8CXi"]} -{"Format": "IDEA0", "ID": "295210e7-8fe4-4106-a8da-4877b64b2f99", "DetectTime": "2023-10-30T14:07:07.548369+02:00", "EventTime": "2023-10-30T14:07:07.548381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CHNgQC13D4ARi1Fphb"]} -{"Format": "IDEA0", "ID": "53c8cd13-42f2-437b-a395-1ae446763a52", "DetectTime": "2023-10-30T14:07:07.576419+02:00", "EventTime": "2023-10-30T14:07:07.576435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["Czgazz5iSex4gIWc6"]} -{"Format": "IDEA0", "ID": "e225d993-b6bb-45e3-b1e9-108e0543510c", "DetectTime": "2023-10-30T14:07:07.600159+02:00", "EventTime": "2023-10-30T14:07:07.600175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["C6BPjYnjLTmMxmwv4"]} -{"Format": "IDEA0", "ID": "ee95b724-51d6-4491-aa2c-bb2faeb86e05", "DetectTime": "2023-10-30T14:07:07.631477+02:00", "EventTime": "2023-10-30T14:07:07.631492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.8.121.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.8.121.25 ", "ContentType": "text/plain"}], "uids": ["CXtkO61lY6Wmi3xwW7"]} -{"Format": "IDEA0", "ID": "6c264213-b702-4b4c-9140-8e55d8fa450e", "DetectTime": "2023-10-30T14:07:07.662376+02:00", "EventTime": "2023-10-30T14:07:07.662392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CBF60D3JRoGf0h36vb"]} -{"Format": "IDEA0", "ID": "cf294d66-df18-419d-9cac-fd93286b60e1", "DetectTime": "2023-10-30T14:07:07.693582+02:00", "EventTime": "2023-10-30T14:07:07.693596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.17.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.17.106 ", "ContentType": "text/plain"}], "uids": ["Ct30u12Bw7SIf5LB7l"]} -{"Format": "IDEA0", "ID": "3d8122bf-b17a-406e-bcd8-c2a170a67335", "DetectTime": "2023-10-30T14:07:07.716558+02:00", "EventTime": "2023-10-30T14:07:07.716575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.169.112 ", "ContentType": "text/plain"}], "uids": ["CYXb9P2XvCjOIUTpM4"]} -{"Format": "IDEA0", "ID": "818296fe-f07d-4962-9101-cc3731c4a318", "DetectTime": "2023-10-30T14:07:07.740758+02:00", "EventTime": "2023-10-30T14:07:07.740769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.151.242.149 ", "ContentType": "text/plain"}], "uids": ["CRSaZi3wULbHJKwy83"]} -{"Format": "IDEA0", "ID": "8a4344e3-3b8c-4e39-861e-f3ba3efe49c4", "DetectTime": "2023-10-30T14:07:07.758431+02:00", "EventTime": "2023-10-30T14:07:07.758442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CJRS5x41ipBxA4s8Yl"]} -{"Format": "IDEA0", "ID": "66b19bab-b358-47f9-8b8e-1b2daa76423a", "DetectTime": "2023-10-30T14:07:07.775374+02:00", "EventTime": "2023-10-30T14:07:07.775385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CgTZWYmnDHmUQcEL3"]} -{"Format": "IDEA0", "ID": "27fdec59-29b4-4cc6-8930-dc711e49d74a", "DetectTime": "2023-10-30T14:07:07.795685+02:00", "EventTime": "2023-10-30T14:07:07.795701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CfItbEenPe1jiarF7"]} -{"Format": "IDEA0", "ID": "adeebc68-954e-4074-a214-68bbb8a564d1", "DetectTime": "2023-10-30T14:07:07.824412+02:00", "EventTime": "2023-10-30T14:07:07.824424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["C4oW2u450hScHrFY1d"]} -{"Format": "IDEA0", "ID": "dd54745b-58ba-40e2-8db2-6f38c96e0be6", "DetectTime": "2023-10-30T14:07:07.856272+02:00", "EventTime": "2023-10-30T14:07:07.856289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.116.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.89.116.82 ", "ContentType": "text/plain"}], "uids": ["Csz0mylXafAd4x1Ti"]} -{"Format": "IDEA0", "ID": "e35ce1ae-15c4-4980-8c34-0bd1d2157538", "DetectTime": "2023-10-30T14:07:07.885301+02:00", "EventTime": "2023-10-30T14:07:07.885312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CFVSQc1rf3p8cdBUa8"]} -{"Format": "IDEA0", "ID": "71e24d68-7a75-45d2-ac66-14cd93c24c35", "DetectTime": "2023-10-30T14:07:07.905714+02:00", "EventTime": "2023-10-30T14:07:07.905730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CvYkje8PQI5Tmg5Qh"]} -{"Format": "IDEA0", "ID": "1cba1ad5-f151-4455-abc6-72a7dd238b48", "DetectTime": "2023-10-30T14:07:07.927606+02:00", "EventTime": "2023-10-30T14:07:07.927622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CIoVoI3lbYPbSxbQLh"]} -{"Format": "IDEA0", "ID": "0ca8ac2a-0bfb-4f5d-9470-07b1a26a0a5c", "DetectTime": "2023-10-30T14:07:07.950025+02:00", "EventTime": "2023-10-30T14:07:07.950040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CZYFzv3xXBjl1F0eSh"]} -{"Format": "IDEA0", "ID": "0f4e5b5e-b06b-4c8e-af71-cbc2cc88ea16", "DetectTime": "2023-10-30T14:07:07.974302+02:00", "EventTime": "2023-10-30T14:07:07.974315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CmMDZi4aVrhzxpiSme"]} -{"Format": "IDEA0", "ID": "f30a0f01-5e4b-4fd5-9719-f61ebe1346b4", "DetectTime": "2023-10-30T14:07:08.004495+02:00", "EventTime": "2023-10-30T14:07:08.004511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CWydWY2nmODNxqvqz7"]} -{"Format": "IDEA0", "ID": "6be3a650-66a8-44e0-a042-3927c91ef61f", "DetectTime": "2023-10-30T14:07:08.029390+02:00", "EventTime": "2023-10-30T14:07:08.029409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.205.178.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.205.178.217 ", "ContentType": "text/plain"}], "uids": ["CLvxKX3nXFu6NfEQWh"]} -{"Format": "IDEA0", "ID": "13b26f5c-001f-42b0-8355-5febd11c77c7", "DetectTime": "2023-10-30T14:07:08.061647+02:00", "EventTime": "2023-10-30T14:07:08.061665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CwlRRe49tYNM0y2ia7"]} -{"Format": "IDEA0", "ID": "43b03d10-7660-452a-b677-a571ec0ecab4", "DetectTime": "2023-10-30T14:07:08.097237+02:00", "EventTime": "2023-10-30T14:07:08.097258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["CMttBd1zeYF2Dxv7pg"]} -{"Format": "IDEA0", "ID": "2fcf98d8-f9b9-475a-a92a-069399cb2993", "DetectTime": "2023-10-30T14:07:08.120915+02:00", "EventTime": "2023-10-30T14:07:08.120927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CWNLK82uhivOfsz72l"]} -{"Format": "IDEA0", "ID": "1ddf78bb-ecb1-4d1b-be68-d65e617802e6", "DetectTime": "2023-10-30T14:07:08.143312+02:00", "EventTime": "2023-10-30T14:07:08.143328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CriZR8G8enkh1WO2i"]} -{"Format": "IDEA0", "ID": "3c9e9cca-e559-4c4c-ac6e-7c745fbe7a62", "DetectTime": "2023-10-30T14:07:08.163944+02:00", "EventTime": "2023-10-30T14:07:08.163956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CZfk1sUSTOkwEeYq6"]} -{"Format": "IDEA0", "ID": "82e4969d-85a8-4197-81b5-b38cf58b2e2f", "DetectTime": "2023-10-30T14:07:08.184464+02:00", "EventTime": "2023-10-30T14:07:08.184478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLlBT25XszEQ7BQM9"]} -{"Format": "IDEA0", "ID": "6a8e72a2-e61f-44ba-b873-d4a0145e53d5", "DetectTime": "2023-10-30T14:07:08.203829+02:00", "EventTime": "2023-10-30T14:07:08.203845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CaxKkh38Qp91QfM0Vb"]} -{"Format": "IDEA0", "ID": "fb66a299-ef77-4f20-99a0-30777e3457e9", "DetectTime": "2023-10-30T14:07:08.221358+02:00", "EventTime": "2023-10-30T14:07:08.221373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C0EHtN2qzJbjpswBJg"]} -{"Format": "IDEA0", "ID": "7c5895d6-34f3-4427-8a4f-da281ae6bfa1", "DetectTime": "2023-10-30T14:07:08.237947+02:00", "EventTime": "2023-10-30T14:07:08.237959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.146.85 ", "ContentType": "text/plain"}], "uids": ["CMGDJT1jlGZGDpZZa6"]} -{"Format": "IDEA0", "ID": "3edb13e2-e037-40d7-8d9d-b6048409299e", "DetectTime": "2023-10-30T14:07:08.262596+02:00", "EventTime": "2023-10-30T14:07:08.262615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cm2mwJ2IaXGPin3Ew2"]} -{"Format": "IDEA0", "ID": "a121a41d-8ae3-466c-88db-5966c558bcf6", "DetectTime": "2023-10-30T14:07:08.293671+02:00", "EventTime": "2023-10-30T14:07:08.293688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CR3djW3U6J5exRb24l"]} -{"Format": "IDEA0", "ID": "d8ea8279-c7e3-425e-992d-1a19305aaa22", "DetectTime": "2023-10-30T14:07:08.315019+02:00", "EventTime": "2023-10-30T14:07:08.315030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBSeFg1zCNhtXRbnrg"]} -{"Format": "IDEA0", "ID": "a719ac12-ec57-4ca4-b64d-6227d4b0a99c", "DetectTime": "2023-10-30T14:07:08.338202+02:00", "EventTime": "2023-10-30T14:07:08.338217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cxt52Nw71Oi1eilEh"]} -{"Format": "IDEA0", "ID": "99acef80-6444-49bc-8c9c-cd7447159b99", "DetectTime": "2023-10-30T14:07:08.355547+02:00", "EventTime": "2023-10-30T14:07:08.355559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["CspVG63Ne6HWcVXG65"]} -{"Format": "IDEA0", "ID": "01a93899-b2ba-4b34-bb41-fc2be97b0354", "DetectTime": "2023-10-30T14:07:08.371957+02:00", "EventTime": "2023-10-30T14:07:08.371968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["CFtUlH1eFm9fFY5mNa"]} -{"Format": "IDEA0", "ID": "cdaa18f5-4016-4343-9e73-28cea86104c3", "DetectTime": "2023-10-30T14:07:08.388776+02:00", "EventTime": "2023-10-30T14:07:08.388788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CrQdP231Vrzh7ubsag"]} -{"Format": "IDEA0", "ID": "83cc888f-2298-4ce3-8e22-465044716e79", "DetectTime": "2023-10-30T14:07:08.413476+02:00", "EventTime": "2023-10-30T14:07:08.413490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["Cno61Xa89ivVcGS24"]} -{"Format": "IDEA0", "ID": "f9f6c5f1-006a-409e-a504-ef7f47b6c9f5", "DetectTime": "2023-10-30T14:07:08.430686+02:00", "EventTime": "2023-10-30T14:07:08.430697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.105.225 ", "ContentType": "text/plain"}], "uids": ["CyRzEl4Vi7tOv0Jj8c"]} -{"Format": "IDEA0", "ID": "79c3ef83-4d81-4dcc-85e2-20ac6869b266", "DetectTime": "2023-10-30T14:07:08.456019+02:00", "EventTime": "2023-10-30T14:07:08.456035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CbaNJB3yA3L7WhK1i7"]} -{"Format": "IDEA0", "ID": "98aed5ea-5659-4de3-b7b3-2332eff95459", "DetectTime": "2023-10-30T14:07:08.482462+02:00", "EventTime": "2023-10-30T14:07:08.482484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CHNOmf2YrvrgAiUJEe"]} -{"Format": "IDEA0", "ID": "07c464a8-28aa-4f0e-870f-df1f2231772b", "DetectTime": "2023-10-30T14:07:08.503908+02:00", "EventTime": "2023-10-30T14:07:08.503925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CGeK4e2t2IgQwgXeH3"]} -{"Format": "IDEA0", "ID": "d1f6705f-5959-40e5-9c18-f1f542b90f3a", "DetectTime": "2023-10-30T14:07:08.531925+02:00", "EventTime": "2023-10-30T14:07:08.531939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CCAxqRSuQLBlpGzG2"]} -{"Format": "IDEA0", "ID": "3b8a2d29-275c-4729-a1d0-36272e3ca267", "DetectTime": "2023-10-30T14:07:08.551009+02:00", "EventTime": "2023-10-30T14:07:08.551036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["CvWM4M1CStaMHvZq7h"]} -{"Format": "IDEA0", "ID": "a5e76978-db4b-458e-ba81-8777008c736b", "DetectTime": "2023-10-30T14:07:08.574117+02:00", "EventTime": "2023-10-30T14:07:08.574133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CkclcY3hP8GQ4nPZJk"]} -{"Format": "IDEA0", "ID": "98befce2-9a0e-4a3c-bddb-7d9c337d3523", "DetectTime": "2023-10-30T14:07:08.605902+02:00", "EventTime": "2023-10-30T14:07:08.605919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CGyi1J1YcSG7OgZ7I"]} -{"Format": "IDEA0", "ID": "3695d936-4fcc-4553-bec6-1df90efd075d", "DetectTime": "2023-10-30T14:07:08.632439+02:00", "EventTime": "2023-10-30T14:07:08.632451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.158.2.78 ", "ContentType": "text/plain"}], "uids": ["CAz82r3m9qgbLjQjfh"]} -{"Format": "IDEA0", "ID": "bc37f7ea-d1d4-4594-971c-533a14ea9d8f", "DetectTime": "2023-10-30T14:07:08.653505+02:00", "EventTime": "2023-10-30T14:07:08.653524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["CUZzd217iL66nV7Yw9"]} -{"Format": "IDEA0", "ID": "118dab3b-4fe7-408c-bee7-8888d42eb5f0", "DetectTime": "2023-10-30T14:07:08.680939+02:00", "EventTime": "2023-10-30T14:07:08.680952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CCm4sa4arRE2Qo7us"]} -{"Format": "IDEA0", "ID": "167fdbc9-9037-412b-b2cd-d6fdf5be5b38", "DetectTime": "2023-10-30T14:07:08.709237+02:00", "EventTime": "2023-10-30T14:07:08.709248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CnGHFQ1cPLSn1pL7S"]} -{"Format": "IDEA0", "ID": "e2cca625-b9c3-4390-a877-5d6e1eceb78f", "DetectTime": "2023-10-30T14:07:08.732011+02:00", "EventTime": "2023-10-30T14:07:08.732028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["Cpcvoa4WeKGCF8hHWh"]} -{"Format": "IDEA0", "ID": "8a2c808c-e29a-4205-8708-648bb2065d6e", "DetectTime": "2023-10-30T14:07:08.751886+02:00", "EventTime": "2023-10-30T14:07:08.751899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cj6LXq3NWqcdo4YqLg"]} -{"Format": "IDEA0", "ID": "1a81c908-ae84-4a9e-9c1d-69615bcbf5c8", "DetectTime": "2023-10-30T14:07:08.769392+02:00", "EventTime": "2023-10-30T14:07:08.769408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CwEcxO19undrGja"]} -{"Format": "IDEA0", "ID": "fd197991-9a48-47fb-8d13-1e390c9e016a", "DetectTime": "2023-10-30T14:07:08.798183+02:00", "EventTime": "2023-10-30T14:07:08.798194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["Cwrgd24ESDpp3oeFXg"]} -{"Format": "IDEA0", "ID": "0458ac6e-76f1-458e-b33b-a185bee4573a", "DetectTime": "2023-10-30T14:07:08.817427+02:00", "EventTime": "2023-10-30T14:07:08.817440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["Cu2Aqn4XUwnVlBbxy9"]} -{"Format": "IDEA0", "ID": "c651f2d8-bd1f-4536-aaf5-15a774e42339", "DetectTime": "2023-10-30T14:07:08.834322+02:00", "EventTime": "2023-10-30T14:07:08.834337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CXmNU34FrMcTGhck37"]} -{"Format": "IDEA0", "ID": "ae7f96b5-65da-41bf-89d3-8909c9bfded7", "DetectTime": "2023-10-30T14:07:08.858913+02:00", "EventTime": "2023-10-30T14:07:08.858927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CO4JZb3AJYyLaMbtu8"]} -{"Format": "IDEA0", "ID": "a2e52b72-d8ce-4b3f-b2bb-0bc807cacd9a", "DetectTime": "2023-10-30T14:07:08.877211+02:00", "EventTime": "2023-10-30T14:07:08.877222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CPHFgY7aBHAsLr4ml"]} -{"Format": "IDEA0", "ID": "b26dbe91-f761-44a5-98d1-ec630a556a22", "DetectTime": "2023-10-30T14:07:08.897475+02:00", "EventTime": "2023-10-30T14:07:08.897492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoIv9p1SzZh2P1809h"]} -{"Format": "IDEA0", "ID": "7b7f9477-8ee7-4c4c-8671-a4f30ee8c576", "DetectTime": "2023-10-30T14:07:08.921923+02:00", "EventTime": "2023-10-30T14:07:08.921941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cq6UYY3E79vPWBXoxj"]} -{"Format": "IDEA0", "ID": "b10d29d3-000a-41da-8f1e-819b3c1c7c2b", "DetectTime": "2023-10-30T14:07:08.943413+02:00", "EventTime": "2023-10-30T14:07:08.943429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CCDi4pMqajrKoS9q7"]} -{"Format": "IDEA0", "ID": "9d475dbc-565b-4a6c-8872-10badc393aa0", "DetectTime": "2023-10-30T14:07:08.974419+02:00", "EventTime": "2023-10-30T14:07:08.974431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXf0fyArsJhTwQ4sg"]} -{"Format": "IDEA0", "ID": "0a98e96b-a02c-4e65-a1f2-abd7562a4ac7", "DetectTime": "2023-10-30T14:07:08.996464+02:00", "EventTime": "2023-10-30T14:07:08.996479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CMa0Dv2o0wgb9jwjY9"]} -{"Format": "IDEA0", "ID": "b3bdc884-eb39-4c98-943d-3ff50e900f85", "DetectTime": "2023-10-30T14:07:09.017634+02:00", "EventTime": "2023-10-30T14:07:09.017650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CYzSa7k4mUVeQ3tM6"]} -{"Format": "IDEA0", "ID": "754755c0-5ba4-42d2-b29e-df76cc0b6be2", "DetectTime": "2023-10-30T14:07:09.046412+02:00", "EventTime": "2023-10-30T14:07:09.046423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CeAzBl2cGvlaqQG3T4"]} -{"Format": "IDEA0", "ID": "29b2faba-d9a2-462c-83e9-86ed56b77a47", "DetectTime": "2023-10-30T14:07:09.069805+02:00", "EventTime": "2023-10-30T14:07:09.069818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CTVaMY2rgkMWh3T1G8"]} -{"Format": "IDEA0", "ID": "770bad91-50dd-4385-af46-219389944292", "DetectTime": "2023-10-30T14:07:09.089047+02:00", "EventTime": "2023-10-30T14:07:09.089063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["CPXysa4eahS6wjAdn8"]} -{"Format": "IDEA0", "ID": "a83467cc-d127-4280-b11b-a1d5f424404e", "DetectTime": "2023-10-30T14:07:09.114374+02:00", "EventTime": "2023-10-30T14:07:09.114385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["CVj4Sq3eMEjasejNyl"]} -{"Format": "IDEA0", "ID": "ea5e8d5a-954f-47f9-9180-13e0c68ded9c", "DetectTime": "2023-10-30T14:07:09.137902+02:00", "EventTime": "2023-10-30T14:07:09.137913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CfXbZsOF72PVJv7zd"]} -{"Format": "IDEA0", "ID": "bd67256b-5064-4c34-acb2-1502c1bb9d6a", "DetectTime": "2023-10-30T14:07:09.155650+02:00", "EventTime": "2023-10-30T14:07:09.155667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 84.151.242.149 ", "ContentType": "text/plain"}], "uids": ["CAwxmshzkSEmmPQhi"]} -{"Format": "IDEA0", "ID": "8300ca60-cbdb-403b-b199-bd71266fa72e", "DetectTime": "2023-10-30T14:07:09.182409+02:00", "EventTime": "2023-10-30T14:07:09.182420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CUWM8q333H9qGzbkqk"]} -{"Format": "IDEA0", "ID": "56f7a964-229f-44f3-bc86-a65b0bad6221", "DetectTime": "2023-10-30T14:07:09.203837+02:00", "EventTime": "2023-10-30T14:07:09.203851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.19.251.225 ", "ContentType": "text/plain"}], "uids": ["C912Fq1dstRN84Tc6e"]} -{"Format": "IDEA0", "ID": "98220f73-e252-4304-a0a0-e95c1145fa6c", "DetectTime": "2023-10-30T14:07:09.221607+02:00", "EventTime": "2023-10-30T14:07:09.221625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["C1BpHBfl5XomMUh8j"]} -{"Format": "IDEA0", "ID": "af9293c7-f4f3-4535-b6f2-8f54b5964dcb", "DetectTime": "2023-10-30T14:07:09.248413+02:00", "EventTime": "2023-10-30T14:07:09.248430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CH8LRN237HFdZh0lEg"]} -{"Format": "IDEA0", "ID": "673d67ed-ec28-4b52-95ad-0c8d87eaf575", "DetectTime": "2023-10-30T14:07:09.275162+02:00", "EventTime": "2023-10-30T14:07:09.275173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CKazRW1vxBhkup3iV4"]} -{"Format": "IDEA0", "ID": "61df5dd8-7a82-419b-8afd-c2d0bba54ff1", "DetectTime": "2023-10-30T14:07:09.293593+02:00", "EventTime": "2023-10-30T14:07:09.293613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CAQNsQ1iyjKPMW9nXg"]} -{"Format": "IDEA0", "ID": "1cb91c4c-4758-4828-bf58-9f7f39cd7609", "DetectTime": "2023-10-30T14:07:09.323330+02:00", "EventTime": "2023-10-30T14:07:09.323347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CgG42t4AbumFgpg3Vh"]} -{"Format": "IDEA0", "ID": "8bc25b65-d861-404e-a6e5-b8c7dc6134cf", "DetectTime": "2023-10-30T14:07:09.350578+02:00", "EventTime": "2023-10-30T14:07:09.350592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["Cgzvw63G2ZVnp0p95g"]} -{"Format": "IDEA0", "ID": "e2c2546e-1f1a-41ee-9f93-67be480afc61", "DetectTime": "2023-10-30T14:07:09.372576+02:00", "EventTime": "2023-10-30T14:07:09.372596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["C5hPvy49HqjxxmdlVj"]} -{"Format": "IDEA0", "ID": "de23ba27-b979-4c29-8178-591c34281b19", "DetectTime": "2023-10-30T14:07:09.397657+02:00", "EventTime": "2023-10-30T14:07:09.397677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CWQygD19Xje0kZ4Bm7"]} -{"Format": "IDEA0", "ID": "2ecbea83-b349-4e01-826d-2dc92f5515f9", "DetectTime": "2023-10-30T14:07:09.417131+02:00", "EventTime": "2023-10-30T14:07:09.417150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CSk3BZ1Y9KWFuL3Ynj"]} -{"Format": "IDEA0", "ID": "73675dd2-25db-4f13-a52d-b20b3fb79837", "DetectTime": "2023-10-30T14:07:09.441853+02:00", "EventTime": "2023-10-30T14:07:09.441870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.158.2.78 ", "ContentType": "text/plain"}], "uids": ["Cvm06uGZhbPS30DKj"]} -{"Format": "IDEA0", "ID": "f7931b13-6151-4241-9e33-314957909586", "DetectTime": "2023-10-30T14:07:09.461994+02:00", "EventTime": "2023-10-30T14:07:09.462006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["C13JHz4oGrwNSt6ht8"]} -{"Format": "IDEA0", "ID": "c543337e-3a7a-4324-b71d-ffed18b19967", "DetectTime": "2023-10-30T14:07:09.485456+02:00", "EventTime": "2023-10-30T14:07:09.485472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["CRSqIO2cXPqAlRCqDf"]} -{"Format": "IDEA0", "ID": "cfe2835c-e0a4-4835-8611-e8ae3751f2c3", "DetectTime": "2023-10-30T14:07:09.517483+02:00", "EventTime": "2023-10-30T14:07:09.517499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["Cvbhp51ShNKT0Okihd"]} -{"Format": "IDEA0", "ID": "9410a2f8-14b6-424a-860e-4a9c9d1639af", "DetectTime": "2023-10-30T14:07:09.550648+02:00", "EventTime": "2023-10-30T14:07:09.550669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["CtEYxu4H77VCr8osl7"]} -{"Format": "IDEA0", "ID": "cdf5ecd2-e250-4baa-9eab-1e93ff1b1130", "DetectTime": "2023-10-30T14:07:09.583410+02:00", "EventTime": "2023-10-30T14:07:09.583434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CSQQA5hKSAeNz6MNi"]} -{"Format": "IDEA0", "ID": "c6a6e98d-1ce8-47ce-894b-507dbdd7e2e4", "DetectTime": "2023-10-30T14:07:09.617250+02:00", "EventTime": "2023-10-30T14:07:09.617271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.158.2.78 ", "ContentType": "text/plain"}], "uids": ["CGm3GY93zhfdAqlpg"]} -{"Format": "IDEA0", "ID": "4d644ee2-e089-43c4-9f14-6a03d49c45ed", "DetectTime": "2023-10-30T14:07:09.646104+02:00", "EventTime": "2023-10-30T14:07:09.646117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CpgOny2z1xVjkdtml3"]} -{"Format": "IDEA0", "ID": "de4fe66a-3db5-4801-b726-d3e8aae146cf", "DetectTime": "2023-10-30T14:07:09.665203+02:00", "EventTime": "2023-10-30T14:07:09.665221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cu7BKXWlwyxC2M4qh"]} -{"Format": "IDEA0", "ID": "240717f0-8643-4f54-9271-f46b113459fb", "DetectTime": "2023-10-30T14:07:09.682579+02:00", "EventTime": "2023-10-30T14:07:09.682592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CMOy5F2Eo2WVIvCdoh"]} -{"Format": "IDEA0", "ID": "bd101539-5817-4a4c-b3af-7fd56d882d60", "DetectTime": "2023-10-30T14:07:09.707166+02:00", "EventTime": "2023-10-30T14:07:09.707180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C8IA3U2y504fywZc8l"]} -{"Format": "IDEA0", "ID": "5846c41a-3d05-4bfd-816d-312887ceb389", "DetectTime": "2023-10-30T14:07:09.727245+02:00", "EventTime": "2023-10-30T14:07:09.727261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["C7YAGg4ZLD7zqlq0hl"]} -{"Format": "IDEA0", "ID": "3b2cd778-6831-4e19-a8ef-1db75eaa1b1e", "DetectTime": "2023-10-30T14:07:09.747435+02:00", "EventTime": "2023-10-30T14:07:09.747445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["C4E0gD2G9UnbF7i4W4"]} -{"Format": "IDEA0", "ID": "dae7cf90-ae1b-4ec2-bfc9-b439ebbf7b8e", "DetectTime": "2023-10-30T14:07:09.767790+02:00", "EventTime": "2023-10-30T14:07:09.767810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CmBlCgvKf1hYCstJi"]} -{"Format": "IDEA0", "ID": "e7799949-5542-4937-82fa-539c4b4a801e", "DetectTime": "2023-10-30T14:07:09.784875+02:00", "EventTime": "2023-10-30T14:07:09.784899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CXBVTi48pmAiVsjn8e"]} -{"Format": "IDEA0", "ID": "6dd83c76-8125-486e-b6aa-34979fbd0770", "DetectTime": "2023-10-30T14:07:09.796219+02:00", "EventTime": "2023-10-30T14:07:09.796230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["C9bMKk2BLKLeLOxbih"]} -{"Format": "IDEA0", "ID": "5330ef2a-5791-45bc-994b-df5ea7537c92", "DetectTime": "2023-10-30T14:07:09.819748+02:00", "EventTime": "2023-10-30T14:07:09.819764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CYbSN92uai2YOXvTo9"]} -{"Format": "IDEA0", "ID": "80d316a9-e989-4340-9748-3f56625c6395", "DetectTime": "2023-10-30T14:07:09.843197+02:00", "EventTime": "2023-10-30T14:07:09.843214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C8C1ph3vGE7pWN2Ty7"]} -{"Format": "IDEA0", "ID": "95ad905e-4aa2-43f6-98d7-a65dea200ce9", "DetectTime": "2023-10-30T14:07:09.864316+02:00", "EventTime": "2023-10-30T14:07:09.864328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CE6t1f396gm9VQpqE7"]} -{"Format": "IDEA0", "ID": "36549313-91ca-4eaf-ba92-b35165b593e2", "DetectTime": "2023-10-30T14:07:09.887328+02:00", "EventTime": "2023-10-30T14:07:09.887347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CpO80j2Lx5y7e1izca"]} -{"Format": "IDEA0", "ID": "88d4a10d-9f91-4fba-bae9-63e23dd74ac8", "DetectTime": "2023-10-30T14:07:09.921582+02:00", "EventTime": "2023-10-30T14:07:09.921602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cm0rHW3qJm5AX2Sbs2"]} -{"Format": "IDEA0", "ID": "2948dbcc-62ee-447a-bea1-3ee909c7c1bc", "DetectTime": "2023-10-30T14:07:09.981913+02:00", "EventTime": "2023-10-30T14:07:09.981934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CXd5PTYpcxVh813d1"]} -{"Format": "IDEA0", "ID": "00aa869c-2654-440c-80fc-954614fb3771", "DetectTime": "2023-10-30T14:07:10.000918+02:00", "EventTime": "2023-10-30T14:07:10.000937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEb9GM1SowEYPrTnGg"]} -{"Format": "IDEA0", "ID": "33b54fdf-b56c-49fe-b264-c7ae6b573895", "DetectTime": "2023-10-30T14:07:10.021082+02:00", "EventTime": "2023-10-30T14:07:10.021097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.215.217.209 ", "ContentType": "text/plain"}], "uids": ["CdrNjV4adh1sFah1g"]} -{"Format": "IDEA0", "ID": "a2db442a-5aa5-4c00-84dc-8fe29134f044", "DetectTime": "2023-10-30T14:07:10.033236+02:00", "EventTime": "2023-10-30T14:07:10.033253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CFy6hj3Z1Ff17Z3WB2"]} -{"Format": "IDEA0", "ID": "f393ed0c-22bd-4b2f-a110-04e7430759dc", "DetectTime": "2023-10-30T14:07:10.053837+02:00", "EventTime": "2023-10-30T14:07:10.053850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["Czxi4g3HsGBJRzf8cg"]} -{"Format": "IDEA0", "ID": "0701ef04-0e11-498b-805b-5a0ab0c98739", "DetectTime": "2023-10-30T14:07:10.074606+02:00", "EventTime": "2023-10-30T14:07:10.074622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CZXz7049xQsLgqkRy9"]} -{"Format": "IDEA0", "ID": "934274b5-74d5-4f0a-ba44-07141791712d", "DetectTime": "2023-10-30T14:07:10.105866+02:00", "EventTime": "2023-10-30T14:07:10.105877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CwQBfw4p91JFQXAVp4"]} -{"Format": "IDEA0", "ID": "15a4c73f-57c6-410e-a1c7-ed4fbeee096e", "DetectTime": "2023-10-30T14:07:10.132373+02:00", "EventTime": "2023-10-30T14:07:10.132389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["C7wOQc4h4mXG6svZR1"]} -{"Format": "IDEA0", "ID": "9d0d4a92-13b5-47f2-b0e7-dbc5d701e475", "DetectTime": "2023-10-30T14:07:10.148852+02:00", "EventTime": "2023-10-30T14:07:10.148866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CmoGy42cq7nuCHhYQl"]} -{"Format": "IDEA0", "ID": "cbf05153-d832-4f99-963f-5350770f3cfc", "DetectTime": "2023-10-30T14:07:10.163170+02:00", "EventTime": "2023-10-30T14:07:10.163187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["CR2LJCeb78ge9Co31"]} -{"Format": "IDEA0", "ID": "9f74ef68-1452-48b5-b55e-9aea1b30e855", "DetectTime": "2023-10-30T14:07:10.185518+02:00", "EventTime": "2023-10-30T14:07:10.185535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["C0yJfD1S7Dl3yAso1b"]} -{"Format": "IDEA0", "ID": "da848edd-eb03-4f43-bd4a-f2ed52589af1", "DetectTime": "2023-10-30T14:07:10.203372+02:00", "EventTime": "2023-10-30T14:07:10.203388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CHlIr14LEH5QW59y4e"]} -{"Format": "IDEA0", "ID": "f6cee446-7268-4d81-819d-88d9b84f9b7e", "DetectTime": "2023-10-30T14:07:10.215521+02:00", "EventTime": "2023-10-30T14:07:10.215531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CxL6AiGh5VNQs7Eed"]} -{"Format": "IDEA0", "ID": "dc1d6d23-905d-4303-a209-81b5b14a5d63", "DetectTime": "2023-10-30T14:07:10.234700+02:00", "EventTime": "2023-10-30T14:07:10.234713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CuQ89s4D5yIFO3EOW3"]} -{"Format": "IDEA0", "ID": "0896da92-6f4b-407a-b7d9-b1fe54b218bf", "DetectTime": "2023-10-30T14:07:10.249342+02:00", "EventTime": "2023-10-30T14:07:10.249363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CotRdz3GRoZerE6ak"]} -{"Format": "IDEA0", "ID": "229db1a6-0cb3-419d-95b2-20b20bafc688", "DetectTime": "2023-10-30T14:07:10.265156+02:00", "EventTime": "2023-10-30T14:07:10.265168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CubGiD13m6je7T8QP1"]} -{"Format": "IDEA0", "ID": "99ff1bc7-42a4-43b2-81d8-1a1735feae66", "DetectTime": "2023-10-30T14:07:10.286552+02:00", "EventTime": "2023-10-30T14:07:10.286568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTuFk8nZSYIe7R4Lc"]} -{"Format": "IDEA0", "ID": "9c383e07-566d-4a94-bff0-e89e1c02edaf", "DetectTime": "2023-10-30T14:07:10.302832+02:00", "EventTime": "2023-10-30T14:07:10.302852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CyANx63M1tLDVaFzyh"]} -{"Format": "IDEA0", "ID": "fa308fb6-ed4f-4676-ba1e-de2411a4a6a4", "DetectTime": "2023-10-30T14:07:10.328497+02:00", "EventTime": "2023-10-30T14:07:10.328513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CTrp6G3URmP0pK84Tb"]} -{"Format": "IDEA0", "ID": "eaae7489-85d6-48ec-83d7-08b7ad43cacf", "DetectTime": "2023-10-30T14:07:10.345150+02:00", "EventTime": "2023-10-30T14:07:10.345166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CegUGy1TYUnxhi3xpj"]} -{"Format": "IDEA0", "ID": "98dddfed-c324-4d5b-8c0d-5fc4fb2e4561", "DetectTime": "2023-10-30T14:07:10.360841+02:00", "EventTime": "2023-10-30T14:07:10.360852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CviXFc4ooQAXxfcwe7"]} -{"Format": "IDEA0", "ID": "e135ffe8-ced6-41f5-b2b0-0ef0f2f345cb", "DetectTime": "2023-10-30T14:07:10.372728+02:00", "EventTime": "2023-10-30T14:07:10.372738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CgDbMYDFPq5tEg7qg"]} -{"Format": "IDEA0", "ID": "1026df42-c094-44b3-b84d-1264db06c6f8", "DetectTime": "2023-10-30T14:07:10.383911+02:00", "EventTime": "2023-10-30T14:07:10.383929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CqPbGe1LM7sjcrSGB"]} -{"Format": "IDEA0", "ID": "686ca5bc-4cd8-4e54-a601-cd392975f715", "DetectTime": "2023-10-30T14:07:10.396299+02:00", "EventTime": "2023-10-30T14:07:10.396310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cb19U71Ni4GTPAdbL"]} -{"Format": "IDEA0", "ID": "6cfe1ff0-9f14-4713-a66b-917d3c183d40", "DetectTime": "2023-10-30T14:07:10.413430+02:00", "EventTime": "2023-10-30T14:07:10.413446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["CXvnup1bKTjMkLnH1d"]} -{"Format": "IDEA0", "ID": "a20a67ad-0e99-431f-8c34-52fed62250ff", "DetectTime": "2023-10-30T14:07:10.428891+02:00", "EventTime": "2023-10-30T14:07:10.428906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIIYsA4VazM27ybFyk"]} -{"Format": "IDEA0", "ID": "f8641341-c51c-40f0-b058-07a2b4b95e1d", "DetectTime": "2023-10-30T14:07:10.445693+02:00", "EventTime": "2023-10-30T14:07:10.445712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C03TL94yc6iKyFT1Uk"]} -{"Format": "IDEA0", "ID": "ee328efa-93e5-489d-b8bf-64e6372b0406", "DetectTime": "2023-10-30T14:07:10.463143+02:00", "EventTime": "2023-10-30T14:07:10.463154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["Cy6UoO1MumtjvtdqD2"]} -{"Format": "IDEA0", "ID": "f7940c74-ead7-4fc9-84e9-f701a33fe040", "DetectTime": "2023-10-30T14:07:10.473826+02:00", "EventTime": "2023-10-30T14:07:10.473845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C1Wejj3aRhHVogrMRd"]} -{"Format": "IDEA0", "ID": "bc6f7071-fa40-400b-ab16-0bb70ede42e4", "DetectTime": "2023-10-30T14:07:10.488308+02:00", "EventTime": "2023-10-30T14:07:10.488319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["CZMKCf3epKOFJlAA8d"]} -{"Format": "IDEA0", "ID": "2762a543-fda1-426c-b9d6-d81d09048979", "DetectTime": "2023-10-30T14:07:10.511682+02:00", "EventTime": "2023-10-30T14:07:10.511698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["C70alqYl2JzW6sJh6"]} -{"Format": "IDEA0", "ID": "7cf5e7d0-8893-4596-88df-bc0bd1e7de9d", "DetectTime": "2023-10-30T14:07:10.527409+02:00", "EventTime": "2023-10-30T14:07:10.527425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["CYrWRu43qMatjScL5k"]} -{"Format": "IDEA0", "ID": "aa503dfb-a9b3-4ea1-b882-01c2e348369d", "DetectTime": "2023-10-30T14:07:10.542070+02:00", "EventTime": "2023-10-30T14:07:10.542086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CtAOzB37SzJgvGSaDe"]} -{"Format": "IDEA0", "ID": "4d193ba1-f418-4e53-a821-b3bf5ffa9459", "DetectTime": "2023-10-30T14:07:10.558187+02:00", "EventTime": "2023-10-30T14:07:10.558208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["Cwixmp1UNLIx5WyEy9"]} -{"Format": "IDEA0", "ID": "3c569a3b-bc89-4dc0-9719-04d13cd5abd6", "DetectTime": "2023-10-30T14:07:10.575706+02:00", "EventTime": "2023-10-30T14:07:10.575726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cl0hHg3R5PKw3oQimi"]} -{"Format": "IDEA0", "ID": "a0bc22e3-4114-4315-b24e-faf486221147", "DetectTime": "2023-10-30T14:07:10.594270+02:00", "EventTime": "2023-10-30T14:07:10.594287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CAps111tTLbdVFw11"]} -{"Format": "Json", "ID": "a0bc22e3-4114-4315-b24e-faf486221147", "DetectTime": "2023-10-30T14:07:10.594270+02:00", "EventTime": "2023-10-30T14:07:10.594287+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:04:11.573570+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:10.672462)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "efdff7b2-2eaa-4787-a2e5-989890c11b9e", "DetectTime": "2023-10-30T14:07:10.676499+02:00", "EventTime": "2023-10-30T14:07:10.676512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["Cj7Xke4jFW60VxCzDj"]} -{"Format": "IDEA0", "ID": "49646248-2cc6-40d9-a075-54d94264f015", "DetectTime": "2023-10-30T14:07:10.688146+02:00", "EventTime": "2023-10-30T14:07:10.688157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CxMZbN2K0rLiplWmT7"]} -{"Format": "IDEA0", "ID": "39d26f2a-f4bd-4e9e-be47-ecaa22a7b4d8", "DetectTime": "2023-10-30T14:07:10.701423+02:00", "EventTime": "2023-10-30T14:07:10.701435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CYE27lSNo8EKrasQd"]} -{"Format": "IDEA0", "ID": "0f717072-8fbc-4374-9af2-8d3f14377979", "DetectTime": "2023-10-30T14:07:10.712818+02:00", "EventTime": "2023-10-30T14:07:10.712829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CHXqL51ilKg2ClF3h4"]} -{"Format": "IDEA0", "ID": "604a4570-9a8b-4290-8377-5e6d7f142d49", "DetectTime": "2023-10-30T14:07:10.725401+02:00", "EventTime": "2023-10-30T14:07:10.725412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["C1pbcJ1w384EchRfl9"]} -{"Format": "IDEA0", "ID": "0dad0253-87a3-4257-8d9d-1c68e8df348a", "DetectTime": "2023-10-30T14:07:10.736361+02:00", "EventTime": "2023-10-30T14:07:10.736373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cg6xpD412ZqzgJvHuk"]} -{"Format": "IDEA0", "ID": "1d29bc32-6bdf-41b3-9784-330610456748", "DetectTime": "2023-10-30T14:07:10.747644+02:00", "EventTime": "2023-10-30T14:07:10.747655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CKhEAT1V0iZSMklL1d"]} -{"Format": "IDEA0", "ID": "88e49197-08ae-4129-8e82-da873e335e78", "DetectTime": "2023-10-30T14:07:10.761755+02:00", "EventTime": "2023-10-30T14:07:10.761770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Chibu01RvUFdKJuJEk"]} -{"Format": "IDEA0", "ID": "a21f545b-fca7-4284-a229-f1581314b1c0", "DetectTime": "2023-10-30T14:07:10.811387+02:00", "EventTime": "2023-10-30T14:07:10.811403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CwdWyc2M6AxdxmMIq1"]} -{"Format": "IDEA0", "ID": "d8c902cb-6f97-4491-92f4-105c5c764190", "DetectTime": "2023-10-30T14:07:10.828453+02:00", "EventTime": "2023-10-30T14:07:10.828469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRH7EesW9tWn2r8k2"]} -{"Format": "IDEA0", "ID": "d20af741-39fe-4679-a16d-9924be84fe2d", "DetectTime": "2023-10-30T14:07:10.873971+02:00", "EventTime": "2023-10-30T14:07:10.873987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CikeoE2L1WGvfyhxZg"]} -{"Format": "IDEA0", "ID": "11b8a2f9-2f9a-4eb5-9e63-58dc4a395536", "DetectTime": "2023-10-30T14:07:10.890661+02:00", "EventTime": "2023-10-30T14:07:10.890678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Ckijow3ER9poPEbL09"]} -{"Format": "IDEA0", "ID": "14776ca0-afa4-4597-a308-6aa801e6cb08", "DetectTime": "2023-10-30T14:07:10.943565+02:00", "EventTime": "2023-10-30T14:07:10.943585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CFGcTO3uDcwTVSWyq8"]} -{"Format": "IDEA0", "ID": "9aa67daa-fade-49ae-a17f-0be450651547", "DetectTime": "2023-10-30T14:07:11.001535+02:00", "EventTime": "2023-10-30T14:07:11.001556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. ", "ContentType": "text/plain"}], "uids": ["CrbpzKB9I4Qni2Xtc"]} -{"Format": "IDEA0", "ID": "a01cbe0f-811f-4be3-8d75-547f0d1ab4c4", "DetectTime": "2023-10-30T14:07:11.059569+02:00", "EventTime": "2023-10-30T14:07:11.059590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C4zuz33nXYbSbzflVd"]} -{"Format": "IDEA0", "ID": "b3560674-50ce-428a-8e5f-405eb88666ab", "DetectTime": "2023-10-30T14:07:11.118109+02:00", "EventTime": "2023-10-30T14:07:11.118134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CojGaY3fDHJRCkhl18"]} -{"Format": "IDEA0", "ID": "ec8a1062-46a4-4ad1-9975-ef8a8446aa53", "DetectTime": "2023-10-30T14:07:11.174376+02:00", "EventTime": "2023-10-30T14:07:11.174387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cuponu1iq0oWTcXWy1"]} -{"Format": "Json", "ID": "ec8a1062-46a4-4ad1-9975-ef8a8446aa53", "DetectTime": "2023-10-30T14:07:11.174376+02:00", "EventTime": "2023-10-30T14:07:11.174387+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:04:32.896656+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:11.246194)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "af8816ca-3ec4-4606-9e1c-c647b4c09439", "DetectTime": "2023-10-30T14:07:11.250305+02:00", "EventTime": "2023-10-30T14:07:11.250316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["CoBgy9EsgsW5eEili"]} -{"Format": "IDEA0", "ID": "abf3128c-4596-46e2-8f68-b7a59f166e72", "DetectTime": "2023-10-30T14:07:11.295424+02:00", "EventTime": "2023-10-30T14:07:11.295440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CAdzRR1sTVWdUYNF6f"]} -{"Format": "IDEA0", "ID": "30241c1b-aefc-4408-bca2-4bec845c0ab5", "DetectTime": "2023-10-30T14:07:11.338541+02:00", "EventTime": "2023-10-30T14:07:11.338554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.20.5.95 ", "ContentType": "text/plain"}], "uids": ["CZkIpY3dbEjxUo5kNk"]} -{"Format": "IDEA0", "ID": "d3c26f30-e11b-47e5-ba6c-dcfa6e2fad09", "DetectTime": "2023-10-30T14:07:11.377582+02:00", "EventTime": "2023-10-30T14:07:11.377600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CBqcqz3RKb4N1gWsUd"]} -{"Format": "IDEA0", "ID": "beaefa8e-4c6a-41d7-b2c1-340303416849", "DetectTime": "2023-10-30T14:07:11.430501+02:00", "EventTime": "2023-10-30T14:07:11.430523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CO8yOK39gTUwJAgc4c"]} -{"Format": "IDEA0", "ID": "8b1eea5a-adb1-45ef-95af-a588deb448db", "DetectTime": "2023-10-30T14:07:11.484479+02:00", "EventTime": "2023-10-30T14:07:11.484499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.84.26.82 ", "ContentType": "text/plain"}], "uids": ["Cxfgkf3Ui5mlcNDL8c"]} -{"Format": "IDEA0", "ID": "fccf9b53-efb5-4494-b49f-0aae1e937b4a", "DetectTime": "2023-10-30T14:07:11.523570+02:00", "EventTime": "2023-10-30T14:07:11.523598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.182.45 ", "ContentType": "text/plain"}], "uids": ["CrZ1Dx2xT3fmiplgX4"]} -{"Format": "IDEA0", "ID": "1a4daab9-19a0-4b80-9613-1f75ac3a4268", "DetectTime": "2023-10-30T14:07:11.567801+02:00", "EventTime": "2023-10-30T14:07:11.567818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.54.128.18 ", "ContentType": "text/plain"}], "uids": ["C5djUN2zGOmt0OtCIb"]} -{"Format": "IDEA0", "ID": "8279f545-cb9e-4b8f-a526-d20a5615fcaa", "DetectTime": "2023-10-30T14:07:11.611271+02:00", "EventTime": "2023-10-30T14:07:11.611287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.105.8.141 ", "ContentType": "text/plain"}], "uids": ["CXIlFs1xgxLd6moUOl"]} -{"Format": "IDEA0", "ID": "a136cedf-9114-4bcc-8b5b-6aa9464e7eb6", "DetectTime": "2023-10-30T14:07:11.665094+02:00", "EventTime": "2023-10-30T14:07:11.665110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CGRUvx2WjNA3xiz932"]} -{"Format": "IDEA0", "ID": "fa37b81a-1db9-4261-909e-5217afb1641c", "DetectTime": "2023-10-30T14:07:11.716163+02:00", "EventTime": "2023-10-30T14:07:11.716247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7494], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. ", "ContentType": "text/plain"}], "uids": ["CnZ4bd1uoyeibjUDMe"]} -{"Format": "IDEA0", "ID": "4f7e2092-d52e-4d13-9ec4-ef482dd86c7c", "DetectTime": "2023-10-30T14:07:11.764500+02:00", "EventTime": "2023-10-30T14:07:11.764511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["C32RaF4SyQ6dThQ9O"]} -{"Format": "IDEA0", "ID": "fe11a45f-68a5-4b84-be80-f667f292a8cc", "DetectTime": "2023-10-30T14:07:11.803308+02:00", "EventTime": "2023-10-30T14:07:11.803324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CKdZcR1O4j1p101CIf"]} -{"Format": "IDEA0", "ID": "e5520a26-dc18-4471-ab91-87a7a0b4eea8", "DetectTime": "2023-10-30T14:07:11.854943+02:00", "EventTime": "2023-10-30T14:07:11.854955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8666], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.195.1. ", "ContentType": "text/plain"}], "uids": ["CMx1wc4vOFPRIEOfp2"]} -{"Format": "IDEA0", "ID": "62a7d41d-64d9-46f0-8af4-6790a6fee50b", "DetectTime": "2023-10-30T14:07:11.900297+02:00", "EventTime": "2023-10-30T14:07:11.900312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8721], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. ", "ContentType": "text/plain"}], "uids": ["CsC3SQ18Q63UtPImdc"]} -{"Format": "IDEA0", "ID": "fc3326f1-4720-43aa-9959-99b405d11de7", "DetectTime": "2023-10-30T14:07:11.951181+02:00", "EventTime": "2023-10-30T14:07:11.951201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CsxDmy4hmTUX90Hf67"]} -{"Format": "IDEA0", "ID": "f646946d-79f5-47a1-ba2f-f13b1bb4b1ad", "DetectTime": "2023-10-30T14:07:11.992746+02:00", "EventTime": "2023-10-30T14:07:11.992761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CRJdhi3JQbjmIb5Yu1"]} -{"Format": "IDEA0", "ID": "1cb6e410-144f-46e2-965a-c26c70699016", "DetectTime": "2023-10-30T14:07:12.047416+02:00", "EventTime": "2023-10-30T14:07:12.047434+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"], "Hostname": ["ppp-219-95.98-62.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 62.98.95.219 from 10.0.2.19. blacklisted IP AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: ppp-219-95.98-62.wind.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CeoOhj4nGnoylEx9Jh"]} -{"Format": "IDEA0", "ID": "e69d00e6-ff9a-4c47-b334-c8d1831de4d3", "DetectTime": "2023-10-30T14:07:12.072535+02:00", "EventTime": "2023-10-30T14:07:12.072551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CkRUtwpDiGSsfdMNf"]} -{"Format": "IDEA0", "ID": "07807509-e208-45fe-b3b0-5006b3557087", "DetectTime": "2023-10-30T14:07:12.118506+02:00", "EventTime": "2023-10-30T14:07:12.118521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CRgj2P3Gi4Hu62YEm8"]} -{"Format": "Json", "ID": "07807509-e208-45fe-b3b0-5006b3557087", "DetectTime": "2023-10-30T14:07:12.118506+02:00", "EventTime": "2023-10-30T14:07:12.118521+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:08:14.822060+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:12.203197)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6d11c8bb-4671-4fdd-ad30-9b24527e7821", "DetectTime": "2023-10-30T14:07:12.207036+02:00", "EventTime": "2023-10-30T14:07:12.207048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CftW9I313EG1xvAhR7"]} -{"Format": "IDEA0", "ID": "ece74fe3-65b0-4bc7-950d-2489bd659576", "DetectTime": "2023-10-30T14:07:12.251152+02:00", "EventTime": "2023-10-30T14:07:12.251171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CuwZbq4ekP9LyfySa6"]} -{"Format": "IDEA0", "ID": "31ef82ac-c89b-41ee-9f6a-40f8e25387fe", "DetectTime": "2023-10-30T14:07:12.300449+02:00", "EventTime": "2023-10-30T14:07:12.300465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["C0ldW72BnRdKDkHaBd"]} -{"Format": "IDEA0", "ID": "af89fa34-188b-4d14-8a05-eaa3c26b5410", "DetectTime": "2023-10-30T14:07:12.348626+02:00", "EventTime": "2023-10-30T14:07:12.348651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26222], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26222/UDP destination IP 190.56.254.24. ", "ContentType": "text/plain"}], "uids": ["CwVEFL1tI6XenOwWN4"]} -{"Format": "IDEA0", "ID": "11ac4761-3b06-46a2-a466-f8130faecbdb", "DetectTime": "2023-10-30T14:07:12.395095+02:00", "EventTime": "2023-10-30T14:07:12.395117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CTG9M016LrcGR91hDj"]} -{"Format": "IDEA0", "ID": "57a86055-dddf-4d7e-8e73-c94dcf22aab9", "DetectTime": "2023-10-30T14:07:12.440100+02:00", "EventTime": "2023-10-30T14:07:12.440119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CCEfze3V7tSSjKye2k"]} -{"Format": "IDEA0", "ID": "74dffc5d-c58b-40f8-adea-7fb587b80b5e", "DetectTime": "2023-10-30T14:07:12.477850+02:00", "EventTime": "2023-10-30T14:07:12.477865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CrqndK29G6Q8CTHd06"]} -{"Format": "IDEA0", "ID": "05e31d7b-fcb3-45e0-bbd5-171d67bfe35f", "DetectTime": "2023-10-30T14:07:12.521838+02:00", "EventTime": "2023-10-30T14:07:12.521852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CEzLVE2nJqpILYNNx8"]} -{"Format": "IDEA0", "ID": "ca0d07d7-cf4b-49e6-a946-11a97001a979", "DetectTime": "2023-10-30T14:07:12.566279+02:00", "EventTime": "2023-10-30T14:07:12.566290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CEWYC13m5CEaZjNCNg"]} -{"Format": "IDEA0", "ID": "672e6db4-71ba-4bd1-a603-90dcf35039cb", "DetectTime": "2023-10-30T14:07:12.616221+02:00", "EventTime": "2023-10-30T14:07:12.616240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["C1IRWm3WItZvUyEuL6"]} -{"Format": "IDEA0", "ID": "34887560-2566-4ef4-8094-4cabb6289ccc", "DetectTime": "2023-10-30T14:07:12.663653+02:00", "EventTime": "2023-10-30T14:07:12.663669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CnMv092QdDjDIjNKpa"]} -{"Format": "Json", "ID": "34887560-2566-4ef4-8094-4cabb6289ccc", "DetectTime": "2023-10-30T14:07:12.663653+02:00", "EventTime": "2023-10-30T14:07:12.663669+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-05T04:13:22.191215+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:12.734820)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bfe940b6-2886-4e9e-bc6e-1cea949235c0", "DetectTime": "2023-10-30T14:07:12.740160+02:00", "EventTime": "2023-10-30T14:07:12.740176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CWmnku40g2MY45wJP7"]} -{"Format": "IDEA0", "ID": "9314a674-6ad1-4b93-b708-a7131833dac7", "DetectTime": "2023-10-30T14:07:12.783306+02:00", "EventTime": "2023-10-30T14:07:12.783324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C1CtOP20bO2LckKcCi"]} -{"Format": "IDEA0", "ID": "a657427a-0a62-4507-bcd7-18f9f040291c", "DetectTime": "2023-10-30T14:07:12.822303+02:00", "EventTime": "2023-10-30T14:07:12.822324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C64W9QdspAzNd9Yl"]} -{"Format": "IDEA0", "ID": "9128f55d-c441-4d2c-bdc9-0d08ec2e2492", "DetectTime": "2023-10-30T14:07:12.859597+02:00", "EventTime": "2023-10-30T14:07:12.859614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CHWGkC3nM9nYM5RsC6"]} -{"Format": "IDEA0", "ID": "cc625114-2ac6-4a56-9274-0cc0d33f1b1e", "DetectTime": "2023-10-30T14:07:12.901501+02:00", "EventTime": "2023-10-30T14:07:12.901513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6952], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6952/UDP destination IP 93.177.185.85. ", "ContentType": "text/plain"}], "uids": ["CBShmS3peHdfHEQx6e"]} -{"Format": "IDEA0", "ID": "c68a9ae8-22c1-4edd-9f0c-d7e3b8f205f3", "DetectTime": "2023-10-30T14:07:12.950896+02:00", "EventTime": "2023-10-30T14:07:12.950913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CN4OQy2bMgK7fs7jt3"]} -{"Format": "IDEA0", "ID": "56e0cb92-dd7d-4fe5-a148-902cb92fec64", "DetectTime": "2023-10-30T14:07:12.999481+02:00", "EventTime": "2023-10-30T14:07:12.999497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["C9VAu44m9sSGFj64Nd"]} -{"Format": "IDEA0", "ID": "b2e432b0-6f11-4ce3-a80f-ef83644b80c6", "DetectTime": "2023-10-30T14:07:13.046186+02:00", "EventTime": "2023-10-30T14:07:13.046199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CslIDq4eKrzUfnV1nk"]} -{"Format": "IDEA0", "ID": "253c0bd9-c8ec-4c26-a954-6af540733fd5", "DetectTime": "2023-10-30T14:07:13.093455+02:00", "EventTime": "2023-10-30T14:07:13.093468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["CEj2W53pq5QQQgtbel"]} -{"Format": "Json", "ID": "253c0bd9-c8ec-4c26-a954-6af540733fd5", "DetectTime": "2023-10-30T14:07:13.093455+02:00", "EventTime": "2023-10-30T14:07:13.093468+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:15:53.533943+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:13.178759)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "38588595-c214-4bcf-ba40-074ab2ac1ea6", "DetectTime": "2023-10-30T14:07:13.189052+02:00", "EventTime": "2023-10-30T14:07:13.189237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9891/UDP destination IP 190.198.255.149. ", "ContentType": "text/plain"}], "uids": ["CK9Hrz3yR49z5u4Ld"]} -{"Format": "IDEA0", "ID": "f527ddc7-373e-40bb-82b8-70ef48188fee", "DetectTime": "2023-10-30T14:07:13.236277+02:00", "EventTime": "2023-10-30T14:07:13.236292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Cn1WXKJr970xqEJu9"]} -{"Format": "IDEA0", "ID": "cb94ff5c-431c-49e2-a0ac-fdeaf2240082", "DetectTime": "2023-10-30T14:07:13.283685+02:00", "EventTime": "2023-10-30T14:07:13.283712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CuHevN1VxINCLCpQd4"]} -{"Format": "IDEA0", "ID": "1dbadb4c-ecc3-42c6-9c24-8724b513818f", "DetectTime": "2023-10-30T14:07:13.334332+02:00", "EventTime": "2023-10-30T14:07:13.334357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C06Egb1MT7t01YuVTi"]} -{"Format": "IDEA0", "ID": "95b32e0b-6250-46c1-8d26-033e4242f953", "DetectTime": "2023-10-30T14:07:13.385343+02:00", "EventTime": "2023-10-30T14:07:13.385366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CWYP5u3i5iuZxzw8mc"]} -{"Format": "IDEA0", "ID": "4bf70bae-4280-4b11-bcfb-f5439e6fb596", "DetectTime": "2023-10-30T14:07:13.427781+02:00", "EventTime": "2023-10-30T14:07:13.427796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CTnkUj2YJFGemKyHf2"]} -{"Format": "IDEA0", "ID": "e2e6ea00-9efd-455d-9976-399b78759094", "DetectTime": "2023-10-30T14:07:13.471572+02:00", "EventTime": "2023-10-30T14:07:13.471584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cca0cx4LSGJKj6dZ0j"]} -{"Format": "IDEA0", "ID": "92ad409f-e06b-4b6a-a8d4-1d231df93815", "DetectTime": "2023-10-30T14:07:13.516198+02:00", "EventTime": "2023-10-30T14:07:13.516218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CKKDuI1CWCXkoMJT51"]} -{"Format": "Json", "ID": "92ad409f-e06b-4b6a-a8d4-1d231df93815", "DetectTime": "2023-10-30T14:07:13.516198+02:00", "EventTime": "2023-10-30T14:07:13.516218+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:47:33.243141+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:13.593209)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "34c65314-83b3-461c-81d8-3a6681cc1df8", "DetectTime": "2023-10-30T14:07:13.597038+02:00", "EventTime": "2023-10-30T14:07:13.597049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CwIREF41a2YqeVHmo5"]} -{"Format": "IDEA0", "ID": "d000a835-1e75-4a38-b260-c9e1cb9a4b8d", "DetectTime": "2023-10-30T14:07:13.638644+02:00", "EventTime": "2023-10-30T14:07:13.638661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9279], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. ", "ContentType": "text/plain"}], "uids": ["CvAcqUwZrqmLd33L4"]} -{"Format": "IDEA0", "ID": "ca80943d-c3ba-48e0-9fa7-50b6555a6618", "DetectTime": "2023-10-30T14:07:13.677125+02:00", "EventTime": "2023-10-30T14:07:13.677138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C9XvYn3okGD3KjEeLi"]} -{"Format": "IDEA0", "ID": "2605e778-0c1a-4c84-9c20-f18efaf8d13d", "DetectTime": "2023-10-30T14:07:13.720880+02:00", "EventTime": "2023-10-30T14:07:13.720899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C2IAh52fczBeDNGZV4"]} -{"Format": "IDEA0", "ID": "6118271c-b27b-419d-ae6e-e50cd1bd17dc", "DetectTime": "2023-10-30T14:07:13.758554+02:00", "EventTime": "2023-10-30T14:07:13.758566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CI9VeN3NhGR9ZYUIk7"]} -{"Format": "IDEA0", "ID": "0d696976-9f8c-4180-87b3-115902b772d2", "DetectTime": "2023-10-30T14:07:13.796400+02:00", "EventTime": "2023-10-30T14:07:13.796411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CEOE0Y1IMKQh2M4k7g"]} -{"Format": "IDEA0", "ID": "b1cb6141-0f37-4683-b1cf-c3310b73b452", "DetectTime": "2023-10-30T14:07:13.829019+02:00", "EventTime": "2023-10-30T14:07:13.829030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CLszE9zMoEKAA5UO8"]} -{"Format": "IDEA0", "ID": "bc173708-d14e-4be9-9288-52cac2a6641c", "DetectTime": "2023-10-30T14:07:13.865725+02:00", "EventTime": "2023-10-30T14:07:13.865746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CD9eq91cMwCSHEMzX3"]} -{"Format": "Json", "ID": "bc173708-d14e-4be9-9288-52cac2a6641c", "DetectTime": "2023-10-30T14:07:13.865725+02:00", "EventTime": "2023-10-30T14:07:13.865746+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:47:54.457352+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:13.937504)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b8f6a58-0150-42f4-b520-8f4f22f73c94", "DetectTime": "2023-10-30T14:07:13.942030+02:00", "EventTime": "2023-10-30T14:07:13.942048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["C9ObIYxpQ0aqOEx2b"]} -{"Format": "IDEA0", "ID": "d319675d-02e1-433b-a635-f786dedec21f", "DetectTime": "2023-10-30T14:07:13.988500+02:00", "EventTime": "2023-10-30T14:07:13.988522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CTBnHO1HfTFzPliLk2"]} -{"Format": "IDEA0", "ID": "7d553466-fc1d-402f-a68b-42c5d5c34610", "DetectTime": "2023-10-30T14:07:14.029026+02:00", "EventTime": "2023-10-30T14:07:14.029038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CoUwoM7VRkIKYufzk"]} -{"Format": "IDEA0", "ID": "71c95880-5a2c-4099-9e71-f3bc06be4dda", "DetectTime": "2023-10-30T14:07:14.072359+02:00", "EventTime": "2023-10-30T14:07:14.072382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CoQlEd179IUDXSuIT2"]} -{"Format": "IDEA0", "ID": "b8ffdd20-f48f-470a-b9b1-1976671a2781", "DetectTime": "2023-10-30T14:07:14.113367+02:00", "EventTime": "2023-10-30T14:07:14.113382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CFPK5j4zNhRxD8Amuk"]} -{"Format": "IDEA0", "ID": "296cab5d-cdd7-47ca-8a78-bcfd0927cd42", "DetectTime": "2023-10-30T14:07:14.147027+02:00", "EventTime": "2023-10-30T14:07:14.147040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CEX1jP3T6EvGKPtXli"]} -{"Format": "IDEA0", "ID": "19f373c0-fc33-4c08-900e-718978df796f", "DetectTime": "2023-10-30T14:07:14.185927+02:00", "EventTime": "2023-10-30T14:07:14.185948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CsWJ5H2eQDLWYCCXr4"]} -{"Format": "IDEA0", "ID": "58689885-66d1-41d4-bb37-003b5e0c5729", "DetectTime": "2023-10-30T14:07:14.230208+02:00", "EventTime": "2023-10-30T14:07:14.230225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CSRIQF1nxzyTZJaJZb"]} -{"Format": "IDEA0", "ID": "e52dbf3b-b4b8-49d7-a9db-9802f1cf2453", "DetectTime": "2023-10-30T14:07:14.271082+02:00", "EventTime": "2023-10-30T14:07:14.271095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3vNDPmPSno5cMEZb"]} -{"Format": "Json", "ID": "e52dbf3b-b4b8-49d7-a9db-9802f1cf2453", "DetectTime": "2023-10-30T14:07:14.271082+02:00", "EventTime": "2023-10-30T14:07:14.271095+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:48:16.060687+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:14.328644)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8e2b3145-8fe3-4998-b101-73144afab40e", "DetectTime": "2023-10-30T14:07:14.334228+02:00", "EventTime": "2023-10-30T14:07:14.334245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["CjgXH4RB6HaEXqo8k"]} -{"Format": "IDEA0", "ID": "6daf2418-3e68-410c-bffc-663c949b81c5", "DetectTime": "2023-10-30T14:07:14.370979+02:00", "EventTime": "2023-10-30T14:07:14.370997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CXUcXF1E4OibsIldwe"]} -{"Format": "IDEA0", "ID": "c7556b2a-cc6d-4868-a3cc-8d2b407a8934", "DetectTime": "2023-10-30T14:07:14.405357+02:00", "EventTime": "2023-10-30T14:07:14.405379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7494], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. ", "ContentType": "text/plain"}], "uids": ["C2T0Rv48cHuXujdCli"]} -{"Format": "IDEA0", "ID": "8b1a164c-73c4-4a77-9abc-1411fbce56a0", "DetectTime": "2023-10-30T14:07:14.436985+02:00", "EventTime": "2023-10-30T14:07:14.436998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["CKG52g11d6eFvgZkZ2"]} -{"Format": "IDEA0", "ID": "26c1bbfe-50d1-48cd-ad15-2c9203f994b0", "DetectTime": "2023-10-30T14:07:14.471061+02:00", "EventTime": "2023-10-30T14:07:14.471078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CjdwvA2LH0zHqTrrEb"]} -{"Format": "IDEA0", "ID": "65bcfc10-91cb-4f69-9141-ed824a4f6550", "DetectTime": "2023-10-30T14:07:14.505497+02:00", "EventTime": "2023-10-30T14:07:14.505514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CRkX0d100mvXG3q4K6"]} -{"Format": "IDEA0", "ID": "d400ec6d-99c1-46ab-9a86-09117a67542b", "DetectTime": "2023-10-30T14:07:14.531646+02:00", "EventTime": "2023-10-30T14:07:14.531657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CSJRsi2UzqOt4qoqE"]} -{"Format": "IDEA0", "ID": "5d55342a-1503-42f2-8419-fe776ea3040f", "DetectTime": "2023-10-30T14:07:14.565704+02:00", "EventTime": "2023-10-30T14:07:14.565720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C4ARI83X7PqMbWbrl1"]} -{"Format": "Json", "ID": "5d55342a-1503-42f2-8419-fe776ea3040f", "DetectTime": "2023-10-30T14:07:14.565704+02:00", "EventTime": "2023-10-30T14:07:14.565720+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:48:53.104653+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:14.629858)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5db6b848-cf22-4bdc-996a-a1da46abe517", "DetectTime": "2023-10-30T14:07:14.635010+02:00", "EventTime": "2023-10-30T14:07:14.635028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CYBGRB3ONCJTOx8dv9"]} -{"Format": "IDEA0", "ID": "0d136c12-801f-41d6-a5c6-2fab665cd7fc", "DetectTime": "2023-10-30T14:07:14.667057+02:00", "EventTime": "2023-10-30T14:07:14.667071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26222], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26222/UDP destination IP 190.56.254.24. ", "ContentType": "text/plain"}], "uids": ["CYMJFQ2IB0NdiBqXq8"]} -{"Format": "IDEA0", "ID": "57c70838-602c-4a59-931a-385994f5c380", "DetectTime": "2023-10-30T14:07:14.697140+02:00", "EventTime": "2023-10-30T14:07:14.697152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CMuGEa4g0EYjQ1oUC2"]} -{"Format": "IDEA0", "ID": "0b94a81e-9d23-4f61-b212-ef3efe6d620d", "DetectTime": "2023-10-30T14:07:14.729163+02:00", "EventTime": "2023-10-30T14:07:14.729174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["Co89e63oTPfqZP1Ea4"]} -{"Format": "IDEA0", "ID": "dded2d87-3f02-463e-8613-2924494cee0e", "DetectTime": "2023-10-30T14:07:14.756942+02:00", "EventTime": "2023-10-30T14:07:14.756953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CVMd6640PoUiZM8vD2"]} -{"Format": "IDEA0", "ID": "dc5f8a4c-d538-4d0b-b34e-a6c1148f2859", "DetectTime": "2023-10-30T14:07:14.781326+02:00", "EventTime": "2023-10-30T14:07:14.781337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["ConG6hVZ9x132uvu7"]} -{"Format": "IDEA0", "ID": "271b9940-c4cf-4f55-b4df-92f6a4016128", "DetectTime": "2023-10-30T14:07:14.811569+02:00", "EventTime": "2023-10-30T14:07:14.811585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["Ci54fL1Jn4S32ETTL6"]} -{"Format": "IDEA0", "ID": "006c7bfb-e989-44b5-8cfd-8a8d71b04f55", "DetectTime": "2023-10-30T14:07:14.842121+02:00", "EventTime": "2023-10-30T14:07:14.842133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CDBlOu4FBzHA0PYJqk"]} -{"Format": "Json", "ID": "006c7bfb-e989-44b5-8cfd-8a8d71b04f55", "DetectTime": "2023-10-30T14:07:14.842121+02:00", "EventTime": "2023-10-30T14:07:14.842133+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:48:55.498799+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:14.906615)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c12b0b8e-2805-43b0-a10c-35236cea8159", "DetectTime": "2023-10-30T14:07:14.910556+02:00", "EventTime": "2023-10-30T14:07:14.910566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CZsbAp4G7RKJtx6IJk"]} -{"Format": "IDEA0", "ID": "9e5a2cf4-5969-4ea4-9172-6e9a779cfbba", "DetectTime": "2023-10-30T14:07:14.938444+02:00", "EventTime": "2023-10-30T14:07:14.938458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CAsdk125XcjSXC91oj"]} -{"Format": "IDEA0", "ID": "176babd9-377e-469f-8319-a0efba044606", "DetectTime": "2023-10-30T14:07:14.963683+02:00", "EventTime": "2023-10-30T14:07:14.963694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CsK6Tk7eT5a5IPiYl"]} -{"Format": "IDEA0", "ID": "dd58fc46-2bb7-4e50-abf3-d833511684fb", "DetectTime": "2023-10-30T14:07:14.996775+02:00", "EventTime": "2023-10-30T14:07:14.996794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["CtiROvj2U848BYLBf"]} -{"Format": "IDEA0", "ID": "f5f3f857-0baa-4a2b-9f7c-66d7460fd3b2", "DetectTime": "2023-10-30T14:07:15.030655+02:00", "EventTime": "2023-10-30T14:07:15.030666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["C0o1fR2nlgM2IM1yTh"]} -{"Format": "IDEA0", "ID": "69ffab88-a36e-4574-a0cd-27909a256d25", "DetectTime": "2023-10-30T14:07:15.062731+02:00", "EventTime": "2023-10-30T14:07:15.062747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9891/UDP destination IP 190.198.255.149. ", "ContentType": "text/plain"}], "uids": ["CMyS2v3gtW0APmebnf"]} -{"Format": "IDEA0", "ID": "32cca8ca-8486-460b-a977-12e92281b234", "DetectTime": "2023-10-30T14:07:15.096834+02:00", "EventTime": "2023-10-30T14:07:15.096848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Cdac5IRnXOHmsMh9b"]} -{"Format": "IDEA0", "ID": "4059dc52-6699-4a80-bdf5-6287afb013b2", "DetectTime": "2023-10-30T14:07:15.131081+02:00", "EventTime": "2023-10-30T14:07:15.131097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CWVQvh4MAbAOyF4PWl"]} -{"Format": "Json", "ID": "4059dc52-6699-4a80-bdf5-6287afb013b2", "DetectTime": "2023-10-30T14:07:15.131081+02:00", "EventTime": "2023-10-30T14:07:15.131097+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T04:49:13.149124+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2023/10/30 14:07:15.195270)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0a84ab87-c6be-46f7-aa55-db34321184ef", "DetectTime": "2023-10-30T14:07:15.200831+02:00", "EventTime": "2023-10-30T14:07:15.200846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CGCuIn36uKm1TywW2d"]} -{"Format": "IDEA0", "ID": "0eef7931-333b-4353-b093-dfb41e9b059b", "DetectTime": "2023-10-30T14:07:15.236550+02:00", "EventTime": "2023-10-30T14:07:15.236572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrBELi3tVGGPhDuGzj"]} -{"Format": "IDEA0", "ID": "d2df677f-21d1-4d36-ae7e-211bb1470485", "DetectTime": "2023-10-30T14:07:15.285185+02:00", "EventTime": "2023-10-30T14:07:15.285199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8721], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. ", "ContentType": "text/plain"}], "uids": ["CkUtOE3SNcenjLBOhg"]} -{"Format": "IDEA0", "ID": "e4b6fee2-c355-448a-aaf0-e2cf1eea33a4", "DetectTime": "2023-10-30T14:07:15.325315+02:00", "EventTime": "2023-10-30T14:07:15.325332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ca4bDh4VB1B0BW9Kk"]} -{"Format": "IDEA0", "ID": "12795c90-9675-4d9b-88c5-6545e3aaf5a7", "DetectTime": "2023-10-30T14:07:15.364721+02:00", "EventTime": "2023-10-30T14:07:15.364738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CN9xup1Fxw38RUIAjl"]} -{"Format": "IDEA0", "ID": "c9aae12c-4746-4781-a719-39fc4ad4edfc", "DetectTime": "2023-10-30T14:07:15.401813+02:00", "EventTime": "2023-10-30T14:07:15.401824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CQxnhI3kJn4fVWoOpk"]} -{"Format": "IDEA0", "ID": "1109e9b8-32e8-4d2d-8bda-332bc9a35d9e", "DetectTime": "2023-10-30T14:07:15.426854+02:00", "EventTime": "2023-10-30T14:07:15.426870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CUBdU74K0rMFSDsEW2"]} -{"Format": "IDEA0", "ID": "55b09344-392c-4423-a8cb-b28368b85b69", "DetectTime": "2023-10-30T14:07:15.471170+02:00", "EventTime": "2023-10-30T14:07:15.471186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Cc65mEZJCHjq1dPv1"]} -{"Format": "IDEA0", "ID": "434ee99d-15d0-4260-b9c8-61b907e9e148", "DetectTime": "2023-10-30T14:07:15.517604+02:00", "EventTime": "2023-10-30T14:07:15.517621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CgxOt012kw1MXOxgH7"]} -{"Format": "Json", "ID": "434ee99d-15d0-4260-b9c8-61b907e9e148", "DetectTime": "2023-10-30T14:07:15.517604+02:00", "EventTime": "2023-10-30T14:07:15.517621+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:20:37.435906+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:15.621289)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb042b8c-1a2f-413e-b229-d6b547dce593", "DetectTime": "2023-10-30T14:07:15.626581+02:00", "EventTime": "2023-10-30T14:07:15.626598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CDvbsU3vZAgizdEqd4"]} -{"Format": "IDEA0", "ID": "8fd56fe7-ed80-4fc9-a8c4-e38247279e2a", "DetectTime": "2023-10-30T14:07:15.671372+02:00", "EventTime": "2023-10-30T14:07:15.671384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVVo3d1v6oqiu0neh6"]} -{"Format": "IDEA0", "ID": "acf43b9b-27af-4a97-b4bf-250769312117", "DetectTime": "2023-10-30T14:07:15.711871+02:00", "EventTime": "2023-10-30T14:07:15.711882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CIBDcr2d4Bi00WocDg"]} -{"Format": "IDEA0", "ID": "7c093478-2217-4895-81e9-2e24c72f4173", "DetectTime": "2023-10-30T14:07:15.747600+02:00", "EventTime": "2023-10-30T14:07:15.747611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["CzI06F134N0LeVmr"]} -{"Format": "IDEA0", "ID": "69314bd1-832b-4c40-9108-b450aea44be0", "DetectTime": "2023-10-30T14:07:15.785053+02:00", "EventTime": "2023-10-30T14:07:15.785066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CR9KvX3TmUe8bN1kFg"]} -{"Format": "IDEA0", "ID": "2710e74f-01b5-444b-be14-2a111d6f5a62", "DetectTime": "2023-10-30T14:07:15.826901+02:00", "EventTime": "2023-10-30T14:07:15.826912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C79Ae41MY8WC0cLNpl"]} -{"Format": "IDEA0", "ID": "f4565ee3-b0fb-4a87-bd08-a41c1faebc9b", "DetectTime": "2023-10-30T14:07:15.871594+02:00", "EventTime": "2023-10-30T14:07:15.871605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CfbGf2yO6gOT3eV72"]} -{"Format": "IDEA0", "ID": "43d2ddb9-d550-4f84-87df-35fa519af5f3", "DetectTime": "2023-10-30T14:07:15.911489+02:00", "EventTime": "2023-10-30T14:07:15.911505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CkFYfx1WoX5odhNaV3"]} -{"Format": "Json", "ID": "43d2ddb9-d550-4f84-87df-35fa519af5f3", "DetectTime": "2023-10-30T14:07:15.911489+02:00", "EventTime": "2023-10-30T14:07:15.911505+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:20:57.421848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:15.976062)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae1516d3-72d1-48b2-9c34-d0f3f43bdab7", "DetectTime": "2023-10-30T14:07:15.979997+02:00", "EventTime": "2023-10-30T14:07:15.980008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C0MSBu1p3VkAfekinc"]} -{"Format": "IDEA0", "ID": "a24b1321-fab5-4dc6-8c8c-46fdf670b373", "DetectTime": "2023-10-30T14:07:16.018625+02:00", "EventTime": "2023-10-30T14:07:16.018641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CD4Bfj1m1SMg1sTrNk"]} -{"Format": "IDEA0", "ID": "28310555-1846-41ca-bd2c-de5a582bade7", "DetectTime": "2023-10-30T14:07:16.055888+02:00", "EventTime": "2023-10-30T14:07:16.055901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["C5olXh18v0cohEIu7e"]} -{"Format": "IDEA0", "ID": "5dc0b6ce-a303-437a-9ad8-3c4ec8110bb1", "DetectTime": "2023-10-30T14:07:16.095027+02:00", "EventTime": "2023-10-30T14:07:16.095044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["C0EUQH16R0qa23zytk"]} -{"Format": "IDEA0", "ID": "b7680722-7eef-470a-89bd-3f5ee9e848ae", "DetectTime": "2023-10-30T14:07:16.135554+02:00", "EventTime": "2023-10-30T14:07:16.135571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cmh2ocfuPtWJN9PQj"]} -{"Format": "IDEA0", "ID": "28369b69-8619-4da2-b5d1-9324a1ad066f", "DetectTime": "2023-10-30T14:07:16.182421+02:00", "EventTime": "2023-10-30T14:07:16.182432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["CRCWGm2Xn0p7h6rEpc"]} -{"Format": "IDEA0", "ID": "990006fd-2ba2-4c0a-a990-ae7c91bf6a22", "DetectTime": "2023-10-30T14:07:16.233905+02:00", "EventTime": "2023-10-30T14:07:16.233926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7494], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. ", "ContentType": "text/plain"}], "uids": ["CbAeQE333Dzw9hIjng"]} -{"Format": "IDEA0", "ID": "bb29a317-32c1-4e42-b801-cdb1fb5f27cb", "DetectTime": "2023-10-30T14:07:16.278975+02:00", "EventTime": "2023-10-30T14:07:16.278986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C8EixyRTw1kTSkJ63"]} -{"Format": "Json", "ID": "bb29a317-32c1-4e42-b801-cdb1fb5f27cb", "DetectTime": "2023-10-30T14:07:16.278975+02:00", "EventTime": "2023-10-30T14:07:16.278986+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:21:00.138918+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:16.359111)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c54d69cb-76ae-42bd-a188-eac193d974c3", "DetectTime": "2023-10-30T14:07:16.363392+02:00", "EventTime": "2023-10-30T14:07:16.363403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["CtK05x2SySXhOCNR6"]} -{"Format": "IDEA0", "ID": "6fd4af89-8fa0-4e9f-bf6b-85e0ba19a5fb", "DetectTime": "2023-10-30T14:07:16.407364+02:00", "EventTime": "2023-10-30T14:07:16.407375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Cb80mR3l9lsCa4W161"]} -{"Format": "IDEA0", "ID": "ec7bdf3c-5a1e-4261-8945-ed261b9cb933", "DetectTime": "2023-10-30T14:07:16.448017+02:00", "EventTime": "2023-10-30T14:07:16.448029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CkxrTR2wWn2y0Fcu61"]} -{"Format": "IDEA0", "ID": "082be35f-0922-4a57-93f6-17f7b5ec7f58", "DetectTime": "2023-10-30T14:07:16.493292+02:00", "EventTime": "2023-10-30T14:07:16.493308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CAF9j42TECR5ux0IBk"]} -{"Format": "IDEA0", "ID": "e66102c2-c7e5-440b-8173-538139de41c3", "DetectTime": "2023-10-30T14:07:16.538420+02:00", "EventTime": "2023-10-30T14:07:16.538430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CKixKh4P8SuVcYtQM2"]} -{"Format": "IDEA0", "ID": "ca9308d1-bad6-434a-83de-2d792bec4a2b", "DetectTime": "2023-10-30T14:07:16.580985+02:00", "EventTime": "2023-10-30T14:07:16.581001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CVE4942tsSiAw7FODj"]} -{"Format": "IDEA0", "ID": "abc61b9a-5a75-492d-a944-1b8f66c8a2eb", "DetectTime": "2023-10-30T14:07:16.624663+02:00", "EventTime": "2023-10-30T14:07:16.624675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CScAJo3C7DgcRxf1pl"]} -{"Format": "IDEA0", "ID": "d5977016-f603-4165-a131-5cf36226c9f7", "DetectTime": "2023-10-30T14:07:16.663891+02:00", "EventTime": "2023-10-30T14:07:16.663902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C2nHBm4pc65ql1Hxwa"]} -{"Format": "Json", "ID": "d5977016-f603-4165-a131-5cf36226c9f7", "DetectTime": "2023-10-30T14:07:16.663891+02:00", "EventTime": "2023-10-30T14:07:16.663902+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:21:02.181485+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:16.738443)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dd5fe4f2-690e-4de6-ab53-daa6e6f842dc", "DetectTime": "2023-10-30T14:07:16.744145+02:00", "EventTime": "2023-10-30T14:07:16.744160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26222], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26222/UDP destination IP 190.56.254.24. ", "ContentType": "text/plain"}], "uids": ["Ci71bM1DIMtZ2HJfWg"]} -{"Format": "IDEA0", "ID": "e485f84d-f27d-4f40-b311-8632ad4d73ba", "DetectTime": "2023-10-30T14:07:16.781477+02:00", "EventTime": "2023-10-30T14:07:16.781495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CMR6VW2dC0ZCLamDd4"]} -{"Format": "IDEA0", "ID": "8a74f47a-e2e1-47c9-9d67-226bd94cd0ad", "DetectTime": "2023-10-30T14:07:16.811938+02:00", "EventTime": "2023-10-30T14:07:16.811948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CXedby2wwueiM7PiV6"]} -{"Format": "IDEA0", "ID": "255d3185-e4fe-4e5c-a23d-5b9a60ff56f8", "DetectTime": "2023-10-30T14:07:16.848219+02:00", "EventTime": "2023-10-30T14:07:16.848238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CtSzR4BuEeUn31Muj"]} -{"Format": "IDEA0", "ID": "047060fe-2d60-4a55-9355-e898002508ff", "DetectTime": "2023-10-30T14:07:16.884395+02:00", "EventTime": "2023-10-30T14:07:16.884411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CmoCmo3t0TwKnPxOGf"]} -{"Format": "IDEA0", "ID": "b0bce54d-fbf2-4a0c-aad1-d13fef3cea1e", "DetectTime": "2023-10-30T14:07:16.929885+02:00", "EventTime": "2023-10-30T14:07:16.929906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CESnMy4kRYwiLcUEv5"]} -{"Format": "IDEA0", "ID": "2e174c1d-07a6-40e1-8b18-2e304e81c7aa", "DetectTime": "2023-10-30T14:07:16.971621+02:00", "EventTime": "2023-10-30T14:07:16.971638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CMgmamjHy7w3sbL1"]} -{"Format": "IDEA0", "ID": "61458f36-40b2-45cb-8349-1433b47fd0a0", "DetectTime": "2023-10-30T14:07:17.009945+02:00", "EventTime": "2023-10-30T14:07:17.009961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CjDJU34PJyTkwS9vMj"]} -{"Format": "Json", "ID": "61458f36-40b2-45cb-8349-1433b47fd0a0", "DetectTime": "2023-10-30T14:07:17.009945+02:00", "EventTime": "2023-10-30T14:07:17.009961+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:21:04.465612+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:17.091531)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "784a3682-24e7-4801-bb7b-eba3bf052a6e", "DetectTime": "2023-10-30T14:07:17.097618+02:00", "EventTime": "2023-10-30T14:07:17.097639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["CdWamk3p7w20jK7k31"]} -{"Format": "IDEA0", "ID": "c15906fe-afa7-4f41-abf5-b6007ce65712", "DetectTime": "2023-10-30T14:07:17.135889+02:00", "EventTime": "2023-10-30T14:07:17.135903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["CCtFNs3WoO1aVTgUT6"]} -{"Format": "IDEA0", "ID": "e49b3086-166d-4c85-8423-85227a78d045", "DetectTime": "2023-10-30T14:07:17.169146+02:00", "EventTime": "2023-10-30T14:07:17.169163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C2Zyt618DMffzBcmN7"]} -{"Format": "IDEA0", "ID": "2e216f9c-1ff1-4f6a-9bc3-2e2c78a4e7d2", "DetectTime": "2023-10-30T14:07:17.207399+02:00", "EventTime": "2023-10-30T14:07:17.207417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CsioMs2D7GQwg18Bpg"]} -{"Format": "IDEA0", "ID": "ba27c3f9-0f92-4159-b2d0-e6cb55b08447", "DetectTime": "2023-10-30T14:07:17.247569+02:00", "EventTime": "2023-10-30T14:07:17.247584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CvBiPx2F6ERZdtga1"]} -{"Format": "IDEA0", "ID": "a37ca325-b970-4400-bfae-9d2a88361c01", "DetectTime": "2023-10-30T14:07:17.288392+02:00", "EventTime": "2023-10-30T14:07:17.288403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuTPRf1jmE70DctXhi"]} -{"Format": "IDEA0", "ID": "d5e4a39e-3aed-498c-bf03-ba6c766c4955", "DetectTime": "2023-10-30T14:07:17.319878+02:00", "EventTime": "2023-10-30T14:07:17.319893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8721], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. ", "ContentType": "text/plain"}], "uids": ["C9fjlO3lt0iFmMuL1d"]} -{"Format": "IDEA0", "ID": "3383a970-d282-4383-b809-67215f9937a6", "DetectTime": "2023-10-30T14:07:17.355110+02:00", "EventTime": "2023-10-30T14:07:17.355133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. ", "ContentType": "text/plain"}], "uids": ["CQMehN35fDMuhfweSk"]} -{"Format": "Json", "ID": "3383a970-d282-4383-b809-67215f9937a6", "DetectTime": "2023-10-30T14:07:17.355110+02:00", "EventTime": "2023-10-30T14:07:17.355133+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1112], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:52:11.104327+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:17.431363)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42b9b164-727d-4ace-a7ba-d4954a7ed94a", "DetectTime": "2023-10-30T14:07:17.435838+02:00", "EventTime": "2023-10-30T14:07:17.435854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CovVsh2bwJKcnNmD9d"]} -{"Format": "IDEA0", "ID": "fe33e399-728e-4608-a7c3-6d2c47ecd62d", "DetectTime": "2023-10-30T14:07:17.469796+02:00", "EventTime": "2023-10-30T14:07:17.469813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CfABd33ep4dSKSjeRe"]} -{"Format": "IDEA0", "ID": "9b797adf-81b8-4593-900c-8f2f3e0f5b32", "DetectTime": "2023-10-30T14:07:17.503270+02:00", "EventTime": "2023-10-30T14:07:17.503286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CEtx8D1IZ67m8BwKWi"]} -{"Format": "IDEA0", "ID": "cf837e84-3dad-43bb-8b6a-c32e2b794c03", "DetectTime": "2023-10-30T14:07:17.542037+02:00", "EventTime": "2023-10-30T14:07:17.542060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CvwbeZ1H8ecCkmDVO3"]} -{"Format": "IDEA0", "ID": "1de7a45b-4359-40f2-a10c-b45624f1a856", "DetectTime": "2023-10-30T14:07:17.575490+02:00", "EventTime": "2023-10-30T14:07:17.575502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CJiXsv4MBiffmJqPK"]} -{"Format": "IDEA0", "ID": "15f494dd-f028-4b89-9f95-65ccd211c996", "DetectTime": "2023-10-30T14:07:17.604965+02:00", "EventTime": "2023-10-30T14:07:17.604981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["C8yvhZ2B7H11rymhI1"]} -{"Format": "IDEA0", "ID": "fb331aeb-b4b8-47b7-ada5-6bc49be87eff", "DetectTime": "2023-10-30T14:07:17.642246+02:00", "EventTime": "2023-10-30T14:07:17.642259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CNijBu4PQ5n0Gcol6d"]} -{"Format": "IDEA0", "ID": "f51b1fc2-6d35-48ea-9b5e-f1110258cfc3", "DetectTime": "2023-10-30T14:07:17.679451+02:00", "EventTime": "2023-10-30T14:07:17.679471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CiUfVW27bAep2RhTX2"]} -{"Format": "Json", "ID": "f51b1fc2-6d35-48ea-9b5e-f1110258cfc3", "DetectTime": "2023-10-30T14:07:17.679451+02:00", "EventTime": "2023-10-30T14:07:17.679471+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:52:30.620059+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:17.744285)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5b8a6eb2-7990-4bb5-9e5c-9693c5613ce6", "DetectTime": "2023-10-30T14:07:17.748481+02:00", "EventTime": "2023-10-30T14:07:17.748492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CovydG2OSA2iY5Vj4"]} -{"Format": "IDEA0", "ID": "02c00619-d0da-4c1a-af55-46133f9ea699", "DetectTime": "2023-10-30T14:07:17.777480+02:00", "EventTime": "2023-10-30T14:07:17.777492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CvBYgZ2aCjkdu3KMGf"]} -{"Format": "IDEA0", "ID": "46589a92-6e58-45ba-8530-dd81ab9c7fa1", "DetectTime": "2023-10-30T14:07:17.810210+02:00", "EventTime": "2023-10-30T14:07:17.810227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIOnwu1tKNzzFeCOze"]} -{"Format": "IDEA0", "ID": "7013b33b-5afc-43ed-b150-6227c02dc10f", "DetectTime": "2023-10-30T14:07:17.840934+02:00", "EventTime": "2023-10-30T14:07:17.840951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CYNa0c3er8cVNRUYf6"]} -{"Format": "IDEA0", "ID": "55c10d96-6d5f-4ece-a4ec-4de425994809", "DetectTime": "2023-10-30T14:07:17.874183+02:00", "EventTime": "2023-10-30T14:07:17.874195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CURm7l1o4FJLGTCZKj"]} -{"Format": "IDEA0", "ID": "3c6fd96a-1f6e-4070-b307-3b30e40607be", "DetectTime": "2023-10-30T14:07:17.908215+02:00", "EventTime": "2023-10-30T14:07:17.908231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CkVz3xH3Hxtf2qr03"]} -{"Format": "IDEA0", "ID": "1bbd489d-d063-407b-b63b-e06cd81bf695", "DetectTime": "2023-10-30T14:07:17.942391+02:00", "EventTime": "2023-10-30T14:07:17.942418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7252], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. ", "ContentType": "text/plain"}], "uids": ["CODL2x3vggLbU3gjel"]} -{"Format": "IDEA0", "ID": "81ec8a5f-c134-46f4-95fc-5ed9ccb00b1f", "DetectTime": "2023-10-30T14:07:17.967068+02:00", "EventTime": "2023-10-30T14:07:17.967084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CdQnk91V5lpTZpnR44"]} -{"Format": "Json", "ID": "81ec8a5f-c134-46f4-95fc-5ed9ccb00b1f", "DetectTime": "2023-10-30T14:07:17.967068+02:00", "EventTime": "2023-10-30T14:07:17.967084+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:52:32.785832+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:18.029705)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a2241d5b-a7e0-4f9e-b30e-119abf62c5fd", "DetectTime": "2023-10-30T14:07:18.033997+02:00", "EventTime": "2023-10-30T14:07:18.034013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CT0p1e1IwfKBO3O5v7"]} -{"Format": "IDEA0", "ID": "66f20f8e-ff6a-43fa-8041-434f95c45f6c", "DetectTime": "2023-10-30T14:07:18.061968+02:00", "EventTime": "2023-10-30T14:07:18.061979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["C3xBvu2YuDdKj87kLa"]} -{"Format": "IDEA0", "ID": "dc51b99b-fe04-4e00-9a18-1fce1f0d8a1e", "DetectTime": "2023-10-30T14:07:18.089813+02:00", "EventTime": "2023-10-30T14:07:18.089828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CU0vTy2WcRYPsDq9lb"]} -{"Format": "IDEA0", "ID": "67bd7b0a-a584-4210-bf2f-c2fea3822227", "DetectTime": "2023-10-30T14:07:18.114532+02:00", "EventTime": "2023-10-30T14:07:18.114546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7494], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. ", "ContentType": "text/plain"}], "uids": ["CLIFGEVIM2elvax68"]} -{"Format": "IDEA0", "ID": "0d0e153a-0560-4f76-81f4-a839e4015477", "DetectTime": "2023-10-30T14:07:18.145037+02:00", "EventTime": "2023-10-30T14:07:18.145054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CN7y8e2oqjLNB5smbg"]} -{"Format": "IDEA0", "ID": "ba7137a5-6bf7-41d0-8a83-4efe3d51f2ce", "DetectTime": "2023-10-30T14:07:18.178905+02:00", "EventTime": "2023-10-30T14:07:18.178923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["C4oLQu3UYtob76wP0h"]} -{"Format": "IDEA0", "ID": "54e3bea6-8253-4c19-9374-1008a8bb3ae7", "DetectTime": "2023-10-30T14:07:18.211722+02:00", "EventTime": "2023-10-30T14:07:18.211743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CI0sTa4f3gBv5k1a82"]} -{"Format": "IDEA0", "ID": "6a2e0ff0-3845-44f7-9072-20b89bd19f64", "DetectTime": "2023-10-30T14:07:18.239750+02:00", "EventTime": "2023-10-30T14:07:18.239768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CLoYkP2z7WVseddf3j"]} -{"Format": "Json", "ID": "6a2e0ff0-3845-44f7-9072-20b89bd19f64", "DetectTime": "2023-10-30T14:07:18.239750+02:00", "EventTime": "2023-10-30T14:07:18.239768+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:52:35.484799+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:18.306991)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "593c5342-9aab-470d-9d5a-e545aec6a814", "DetectTime": "2023-10-30T14:07:18.312294+02:00", "EventTime": "2023-10-30T14:07:18.312310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C5R7ZP3L7NPA9huhr7"]} -{"Format": "IDEA0", "ID": "ac393d14-ef2f-4d84-be33-ab21e4116b45", "DetectTime": "2023-10-30T14:07:18.345041+02:00", "EventTime": "2023-10-30T14:07:18.345055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CoGPCq1XgGdqoTpzx9"]} -{"Format": "IDEA0", "ID": "f635c530-e112-4acd-8043-79133961f90e", "DetectTime": "2023-10-30T14:07:18.373531+02:00", "EventTime": "2023-10-30T14:07:18.373543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CXwStN18yjaoj24LE3"]} -{"Format": "IDEA0", "ID": "2c8c0539-9f42-4e8f-bd06-a1514c2d64ac", "DetectTime": "2023-10-30T14:07:18.403318+02:00", "EventTime": "2023-10-30T14:07:18.403330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CjY2YB2fw5B5RR4Lgk"]} -{"Format": "IDEA0", "ID": "9127b8db-abc4-4e89-9fb4-a2730116f3a1", "DetectTime": "2023-10-30T14:07:18.435874+02:00", "EventTime": "2023-10-30T14:07:18.435887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CVYccem6auiXxBfOj"]} -{"Format": "IDEA0", "ID": "2ad06384-ef87-4243-b306-65b1f1751cc8", "DetectTime": "2023-10-30T14:07:18.466350+02:00", "EventTime": "2023-10-30T14:07:18.466366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["ClvwnT2C5TohWXCoNh"]} -{"Format": "IDEA0", "ID": "6538ba56-af9f-4d10-bdd0-6ace195ad9a7", "DetectTime": "2023-10-30T14:07:18.496397+02:00", "EventTime": "2023-10-30T14:07:18.496409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CYOlFy4nV5TVCWvChj"]} -{"Format": "IDEA0", "ID": "211ae598-d283-46f1-b886-92488e1eca66", "DetectTime": "2023-10-30T14:07:18.520922+02:00", "EventTime": "2023-10-30T14:07:18.520932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CWnMf12yxCw5dfP6Rg"]} -{"Format": "IDEA0", "ID": "acfc4067-ebc1-4e51-be7c-2f8815158087", "DetectTime": "2023-10-30T14:07:18.551266+02:00", "EventTime": "2023-10-30T14:07:18.551290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CXTNpo28RtTSBqbRF"]} -{"Format": "Json", "ID": "acfc4067-ebc1-4e51-be7c-2f8815158087", "DetectTime": "2023-10-30T14:07:18.551266+02:00", "EventTime": "2023-10-30T14:07:18.551290+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T05:52:53.194813+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2023/10/30 14:07:18.616103)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54080954-1140-410c-95ce-ebcc0fc4d2c3", "DetectTime": "2023-10-30T14:07:18.621572+02:00", "EventTime": "2023-10-30T14:07:18.621598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CBfqJP1665L1QN0Mwf"]} -{"Format": "IDEA0", "ID": "bf59669d-3a7d-4742-923f-18c6ef3c8dce", "DetectTime": "2023-10-30T14:07:18.650855+02:00", "EventTime": "2023-10-30T14:07:18.650870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CeK9gU11TyNuO1leU3"]} -{"Format": "IDEA0", "ID": "7e4eba9d-3f8a-4c2a-8e13-ad381d9669c8", "DetectTime": "2023-10-30T14:07:18.677943+02:00", "EventTime": "2023-10-30T14:07:18.677960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CKr26Y1fYUFdzRdgFg"]} -{"Format": "IDEA0", "ID": "22a8114f-c32b-459f-a49a-019f7ba14d68", "DetectTime": "2023-10-30T14:07:18.707059+02:00", "EventTime": "2023-10-30T14:07:18.707076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["C10cKd2rZ65S68az53"]} -{"Format": "IDEA0", "ID": "5c54ad3a-f86e-4f00-b66a-0e1d00a0c098", "DetectTime": "2023-10-30T14:07:18.742058+02:00", "EventTime": "2023-10-30T14:07:18.742076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["C154QH1iaEGOZz9BIf"]} -{"Format": "IDEA0", "ID": "9dcaea46-febb-4d7a-bdd4-addc9afaca26", "DetectTime": "2023-10-30T14:07:18.772584+02:00", "EventTime": "2023-10-30T14:07:18.772600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Cr4z5p1fY6WqQp0aD5"]} -{"Format": "IDEA0", "ID": "949f7aa0-335f-49e6-b896-93332bc89940", "DetectTime": "2023-10-30T14:07:18.803262+02:00", "EventTime": "2023-10-30T14:07:18.803282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CEmcp31OO8k9xaYVKc"]} -{"Format": "IDEA0", "ID": "709bdb3c-86a4-4042-adec-65c6c6c03043", "DetectTime": "2023-10-30T14:07:18.830899+02:00", "EventTime": "2023-10-30T14:07:18.830917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjWRTw4zUNaxoH4Umc"]} -{"Format": "IDEA0", "ID": "51a13656-061c-410b-bce5-542fb5437ecc", "DetectTime": "2023-10-30T14:07:18.873933+02:00", "EventTime": "2023-10-30T14:07:18.873948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CmqqJB3neB8nHFL5b8"]} -{"Format": "IDEA0", "ID": "e48782f9-07db-461f-8ef7-27062daa5304", "DetectTime": "2023-10-30T14:07:18.928100+02:00", "EventTime": "2023-10-30T14:07:18.928117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8721], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. ", "ContentType": "text/plain"}], "uids": ["CZztod2c2jTHYQMBV1"]} -{"Format": "IDEA0", "ID": "f8834937-3462-44e8-ae1a-55038342ed12", "DetectTime": "2023-10-30T14:07:18.987956+02:00", "EventTime": "2023-10-30T14:07:18.987968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CBoto82LarOySaZpLg"]} -{"Format": "IDEA0", "ID": "62f8ea51-0f6a-4126-bd88-5597d5dfb50f", "DetectTime": "2023-10-30T14:07:19.045149+02:00", "EventTime": "2023-10-30T14:07:19.045170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CDLRjm2rYll9yI4U2"]} -{"Format": "IDEA0", "ID": "eb76ac99-3374-4050-bef9-fc957510993e", "DetectTime": "2023-10-30T14:07:19.108519+02:00", "EventTime": "2023-10-30T14:07:19.108537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CSrskI2uBtWjuU7abf"]} -{"Format": "Json", "ID": "eb76ac99-3374-4050-bef9-fc957510993e", "DetectTime": "2023-10-30T14:07:19.108519+02:00", "EventTime": "2023-10-30T14:07:19.108537+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:23:50.178629+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:19.249140)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c0475dcc-f11c-4b97-82cc-a65c60ebc9b6", "DetectTime": "2023-10-30T14:07:19.254959+02:00", "EventTime": "2023-10-30T14:07:19.254975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CA8ESD2lLqQxjghph4"]} -{"Format": "IDEA0", "ID": "083b57d7-edf8-4fef-bfb4-30ff9d848f28", "DetectTime": "2023-10-30T14:07:19.299882+02:00", "EventTime": "2023-10-30T14:07:19.299899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CgGxhr0mVspNuLTkh"]} -{"Format": "IDEA0", "ID": "7e3ddd79-6258-4d93-8166-13d84dad03bf", "DetectTime": "2023-10-30T14:07:19.352909+02:00", "EventTime": "2023-10-30T14:07:19.352936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["C4eIMQPaT8zx8A457"]} -{"Format": "IDEA0", "ID": "fdfe5da4-ce11-4e39-b08e-cbd1ee9d191b", "DetectTime": "2023-10-30T14:07:19.404594+02:00", "EventTime": "2023-10-30T14:07:19.404618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15516], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. ", "ContentType": "text/plain"}], "uids": ["Cpg4ne1W4JDkuHeBi7"]} -{"Format": "IDEA0", "ID": "194c5880-5b64-4eea-af57-ab49a2eb11d1", "DetectTime": "2023-10-30T14:07:19.454344+02:00", "EventTime": "2023-10-30T14:07:19.454370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["Cqu1Ne3ivu9KWFcFra"]} -{"Format": "IDEA0", "ID": "955fcc72-817b-4dfc-ab4b-5d3a0b9a4bc9", "DetectTime": "2023-10-30T14:07:19.499851+02:00", "EventTime": "2023-10-30T14:07:19.499869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CiMoYz1JyTvJDkBza7"]} -{"Format": "IDEA0", "ID": "95011f85-3cf7-4e90-8ed4-2de0db2b2634", "DetectTime": "2023-10-30T14:07:19.550001+02:00", "EventTime": "2023-10-30T14:07:19.550024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CrUiry2yVBOeuuqnGf"]} -{"Format": "IDEA0", "ID": "177696c8-a5e5-41f8-8e6a-ee83ede4b986", "DetectTime": "2023-10-30T14:07:19.596763+02:00", "EventTime": "2023-10-30T14:07:19.596783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cim3YC1hrEV8d5sig7"]} -{"Format": "Json", "ID": "177696c8-a5e5-41f8-8e6a-ee83ede4b986", "DetectTime": "2023-10-30T14:07:19.596763+02:00", "EventTime": "2023-10-30T14:07:19.596783+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:23:52.113123+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:19.685836)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "256c4453-53b9-4e12-8549-0c0d431aaa9f", "DetectTime": "2023-10-30T14:07:19.690846+02:00", "EventTime": "2023-10-30T14:07:19.691006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CctLAY1nmgkGYEwRf7"]} -{"Format": "IDEA0", "ID": "6c115200-7f4a-473c-816c-d24ace0e4a8e", "DetectTime": "2023-10-30T14:07:19.737509+02:00", "EventTime": "2023-10-30T14:07:19.737529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CLY5Bq2FE7HIlR1eFd"]} -{"Format": "IDEA0", "ID": "dec03153-de83-4f36-a5fb-885451f2f8e8", "DetectTime": "2023-10-30T14:07:19.786196+02:00", "EventTime": "2023-10-30T14:07:19.786216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CkJidI1B0gYgOZdvQf"]} -{"Format": "IDEA0", "ID": "863ac60a-cf85-4400-9c3a-387a25008940", "DetectTime": "2023-10-30T14:07:19.831426+02:00", "EventTime": "2023-10-30T14:07:19.831447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C8k4xr1HUN1cY9xnS"]} -{"Format": "IDEA0", "ID": "46d7b166-1b58-45cb-b1b3-b22c9e830267", "DetectTime": "2023-10-30T14:07:19.876450+02:00", "EventTime": "2023-10-30T14:07:19.876471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CLWn9p4Ogf6pz6cxq8"]} -{"Format": "IDEA0", "ID": "5e188afc-d2bb-4d7c-a497-dd47a3ac751e", "DetectTime": "2023-10-30T14:07:19.918268+02:00", "EventTime": "2023-10-30T14:07:19.918289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["CQ9UAe12PknJZoNHi2"]} -{"Format": "IDEA0", "ID": "6c6948e0-4d3c-4214-8153-e48ead982f1d", "DetectTime": "2023-10-30T14:07:19.963905+02:00", "EventTime": "2023-10-30T14:07:19.963928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CE3ARc1k1FNdiMPALc"]} -{"Format": "IDEA0", "ID": "ef0d9635-3cfd-4e6b-b61b-b3eaa01b7288", "DetectTime": "2023-10-30T14:07:20.010165+02:00", "EventTime": "2023-10-30T14:07:20.010185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CnbKcL1FwNMyYaGWK3"]} -{"Format": "Json", "ID": "ef0d9635-3cfd-4e6b-b61b-b3eaa01b7288", "DetectTime": "2023-10-30T14:07:20.010165+02:00", "EventTime": "2023-10-30T14:07:20.010185+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:24:44.267188+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:20.096988)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "10d30864-0adf-4b48-a7fe-644eaf5af346", "DetectTime": "2023-10-30T14:07:20.102448+02:00", "EventTime": "2023-10-30T14:07:20.102468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CjLjYh2YgJS9c5d0wl"]} -{"Format": "IDEA0", "ID": "c21c929f-a777-414e-9a9e-c9b011cd39f1", "DetectTime": "2023-10-30T14:07:20.146929+02:00", "EventTime": "2023-10-30T14:07:20.146948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CfZ8ph1PkK0rimrhYf"]} -{"Format": "IDEA0", "ID": "f35c4c27-ed22-4223-ad84-86ab9d1d895f", "DetectTime": "2023-10-30T14:07:20.190268+02:00", "EventTime": "2023-10-30T14:07:20.190291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C2RDWj3sOyYKy8M827"]} -{"Format": "IDEA0", "ID": "958f0678-9a1a-4e0d-83b1-6a79ffb8ad29", "DetectTime": "2023-10-30T14:07:20.233662+02:00", "EventTime": "2023-10-30T14:07:20.233694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CYDD2Q1J0YeYaLnFR"]} -{"Format": "IDEA0", "ID": "bae10fe0-e0c3-4870-ac60-9afce6a153b2", "DetectTime": "2023-10-30T14:07:20.276764+02:00", "EventTime": "2023-10-30T14:07:20.276775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CSdzui3aXe2ooqqV1k"]} -{"Format": "IDEA0", "ID": "a5b1bbf3-0628-4914-91f0-5f7b82717ef7", "DetectTime": "2023-10-30T14:07:20.320049+02:00", "EventTime": "2023-10-30T14:07:20.320064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CmyvmH2QRIx2bUJ73"]} -{"Format": "IDEA0", "ID": "7bf3d132-1b3a-4cd5-85e8-9b9c39e3a67a", "DetectTime": "2023-10-30T14:07:20.358971+02:00", "EventTime": "2023-10-30T14:07:20.358984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C8QShE2ufYQLSVqgB2"]} -{"Format": "IDEA0", "ID": "0165c9b1-85c6-489b-93b6-3cbdcdfdce43", "DetectTime": "2023-10-30T14:07:20.399167+02:00", "EventTime": "2023-10-30T14:07:20.399184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["ChfJiG1QVwF1kXQEd3"]} -{"Format": "Json", "ID": "0165c9b1-85c6-489b-93b6-3cbdcdfdce43", "DetectTime": "2023-10-30T14:07:20.399167+02:00", "EventTime": "2023-10-30T14:07:20.399184+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:24:46.377067+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:20.475170)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "695fb7e0-c393-4004-ac78-cbd06e826916", "DetectTime": "2023-10-30T14:07:20.480179+02:00", "EventTime": "2023-10-30T14:07:20.480195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CMdeTk2xNCN44bcmt8"]} -{"Format": "IDEA0", "ID": "71751688-ab2b-47cf-8214-2c13bfe62324", "DetectTime": "2023-10-30T14:07:20.518035+02:00", "EventTime": "2023-10-30T14:07:20.518055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CoHWjqmjntZL6Qzok"]} -{"Format": "IDEA0", "ID": "ad205818-afa3-421c-ad3c-c9ed4176d51f", "DetectTime": "2023-10-30T14:07:20.551883+02:00", "EventTime": "2023-10-30T14:07:20.551895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["CDU7xi6ITphTRMz7b"]} -{"Format": "IDEA0", "ID": "ff26f975-2995-41d6-b71f-3091f92578a3", "DetectTime": "2023-10-30T14:07:20.590941+02:00", "EventTime": "2023-10-30T14:07:20.590958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CGjKT03oanR4KPMpD7"]} -{"Format": "IDEA0", "ID": "df99fcfe-8c65-48c2-8acb-f7836141f5a7", "DetectTime": "2023-10-30T14:07:20.627877+02:00", "EventTime": "2023-10-30T14:07:20.627894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CBUi7nlYUCYLUWmSe"]} -{"Format": "IDEA0", "ID": "ec99e221-927e-428e-a642-fba169e8eeaf", "DetectTime": "2023-10-30T14:07:20.664039+02:00", "EventTime": "2023-10-30T14:07:20.664056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C8JEGn1RtR8SciAR3g"]} -{"Format": "IDEA0", "ID": "528fc834-dae0-42be-8e25-2bee69f8332a", "DetectTime": "2023-10-30T14:07:20.706460+02:00", "EventTime": "2023-10-30T14:07:20.706487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["CSJXQW1rAxjtOOtOj3"]} -{"Format": "IDEA0", "ID": "4bccd363-8530-41cf-8cb2-456e28cd595b", "DetectTime": "2023-10-30T14:07:20.744504+02:00", "EventTime": "2023-10-30T14:07:20.744515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CcvxRq2WeyyFCI9vS"]} -{"Format": "Json", "ID": "4bccd363-8530-41cf-8cb2-456e28cd595b", "DetectTime": "2023-10-30T14:07:20.744504+02:00", "EventTime": "2023-10-30T14:07:20.744515+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:24:50.158557+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:20.819518)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "46123a0d-b617-42bc-89fb-da5688a27c3c", "DetectTime": "2023-10-30T14:07:20.825031+02:00", "EventTime": "2023-10-30T14:07:20.825044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp1LFY1F6MSSrkDu4k"]} -{"Format": "IDEA0", "ID": "036f1a30-0795-4eff-ba57-4e72e0eb7a45", "DetectTime": "2023-10-30T14:07:20.862831+02:00", "EventTime": "2023-10-30T14:07:20.862851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Csb5i83jnTHE5xnkU1"]} -{"Format": "IDEA0", "ID": "6d91a975-140e-4f0a-ab2a-9fc16a527d40", "DetectTime": "2023-10-30T14:07:20.900079+02:00", "EventTime": "2023-10-30T14:07:20.900091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8721], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. ", "ContentType": "text/plain"}], "uids": ["CQriPX3EPhvUWLhV3c"]} -{"Format": "IDEA0", "ID": "0e96439f-d9ba-4015-b815-92426885a3f5", "DetectTime": "2023-10-30T14:07:20.934579+02:00", "EventTime": "2023-10-30T14:07:20.934596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C5dGDM1kmAVkUC18Sh"]} -{"Format": "IDEA0", "ID": "4602b54c-caba-4665-81d4-ca7ee5e8c3da", "DetectTime": "2023-10-30T14:07:20.968749+02:00", "EventTime": "2023-10-30T14:07:20.968761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CR1SFnbYBmBof9qJ6"]} -{"Format": "IDEA0", "ID": "11facd90-cd05-4877-b4ad-40fc4ac46890", "DetectTime": "2023-10-30T14:07:21.005307+02:00", "EventTime": "2023-10-30T14:07:21.005334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CHwUt140ZwM0vySOl7"]} -{"Format": "IDEA0", "ID": "6b88c756-9a8f-40bb-835e-efbaeab0b27e", "DetectTime": "2023-10-30T14:07:21.043109+02:00", "EventTime": "2023-10-30T14:07:21.043136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CVDdwh4GgcAh2pXaUc"]} -{"Format": "IDEA0", "ID": "9969fd5f-0a0a-49c0-8c17-a756e82108f6", "DetectTime": "2023-10-30T14:07:21.077554+02:00", "EventTime": "2023-10-30T14:07:21.077571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. ", "ContentType": "text/plain"}], "uids": ["CushHI33yBa9TT5Vd2"]} -{"Format": "Json", "ID": "9969fd5f-0a0a-49c0-8c17-a756e82108f6", "DetectTime": "2023-10-30T14:07:21.077554+02:00", "EventTime": "2023-10-30T14:07:21.077571+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13874], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:56:23.461337+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:21.151966)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a36771a0-963f-4278-89a8-1008aeb9fd87", "DetectTime": "2023-10-30T14:07:21.156737+02:00", "EventTime": "2023-10-30T14:07:21.156756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["ChOD6P1lrX1rXP3Eii"]} -{"Format": "IDEA0", "ID": "9988791e-4282-4f86-9baa-7a4ef2cdaf16", "DetectTime": "2023-10-30T14:07:21.190247+02:00", "EventTime": "2023-10-30T14:07:21.190258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CeU9T2HI8pZSOcCyd"]} -{"Format": "IDEA0", "ID": "4c8ab665-d0dd-45f7-8bea-7cc5d3cab6fd", "DetectTime": "2023-10-30T14:07:21.220520+02:00", "EventTime": "2023-10-30T14:07:21.220533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGczgK2VrFWZJ9ZV64"]} -{"Format": "IDEA0", "ID": "f428886a-dbfa-49d2-b7be-47eeb45e2d7f", "DetectTime": "2023-10-30T14:07:21.255639+02:00", "EventTime": "2023-10-30T14:07:21.255656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CWqD9b1YrTUdzQU051"]} -{"Format": "IDEA0", "ID": "6a21b017-7fc1-4935-9427-0e4afd2e2532", "DetectTime": "2023-10-30T14:07:21.288527+02:00", "EventTime": "2023-10-30T14:07:21.288540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C6sYpZ1ZHnBI0dIhze"]} -{"Format": "IDEA0", "ID": "d4ffb41b-e6f1-4c96-a908-bd5905522cdc", "DetectTime": "2023-10-30T14:07:21.321689+02:00", "EventTime": "2023-10-30T14:07:21.321708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPCFqv2vYvmYKm5t3l"]} -{"Format": "IDEA0", "ID": "fe3328d4-0c3d-41ec-bf48-7fe6545f1d82", "DetectTime": "2023-10-30T14:07:21.358609+02:00", "EventTime": "2023-10-30T14:07:21.358632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CPQQ472WHxcO00kuUl"]} -{"Format": "IDEA0", "ID": "867dc361-1348-464f-8493-e63d03655d39", "DetectTime": "2023-10-30T14:07:21.394756+02:00", "EventTime": "2023-10-30T14:07:21.394773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CvhSYd1l6im1GZP9kd"]} -{"Format": "Json", "ID": "867dc361-1348-464f-8493-e63d03655d39", "DetectTime": "2023-10-30T14:07:21.394756+02:00", "EventTime": "2023-10-30T14:07:21.394773+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:56:43.596194+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:21.464522)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b7fd364b-4fc4-4180-b304-9da679904f96", "DetectTime": "2023-10-30T14:07:21.469595+02:00", "EventTime": "2023-10-30T14:07:21.469611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CoKUW74lPfgRog1C3a"]} -{"Format": "IDEA0", "ID": "4cc663b2-e79f-428d-86cd-52bcc289ff5d", "DetectTime": "2023-10-30T14:07:21.503058+02:00", "EventTime": "2023-10-30T14:07:21.503075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cj1jam2f3WduoDne9e"]} -{"Format": "IDEA0", "ID": "899a55b9-8f09-4f33-9183-42f60ff6590a", "DetectTime": "2023-10-30T14:07:21.534437+02:00", "EventTime": "2023-10-30T14:07:21.534461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23507], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. ", "ContentType": "text/plain"}], "uids": ["C7Dd3B2bCZ1kL1FwY8"]} -{"Format": "IDEA0", "ID": "1b45a238-e8f9-408a-b220-00bf4d98fa3f", "DetectTime": "2023-10-30T14:07:21.565148+02:00", "EventTime": "2023-10-30T14:07:21.565168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["Ckxhpa2bAkz7104EJa"]} -{"Format": "IDEA0", "ID": "aed406c6-0bcd-41f7-b481-546cf468a6c3", "DetectTime": "2023-10-30T14:07:21.598844+02:00", "EventTime": "2023-10-30T14:07:21.598872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CylpTS3PSpTNXC0d0j"]} -{"Format": "IDEA0", "ID": "e7cdd1f7-e687-49ff-b73c-0082a3c00b23", "DetectTime": "2023-10-30T14:07:21.629492+02:00", "EventTime": "2023-10-30T14:07:21.629509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C8Cbus2rdXVQi3wN3k"]} -{"Format": "IDEA0", "ID": "6a5d8935-e843-4546-805b-b25d1887cf3e", "DetectTime": "2023-10-30T14:07:21.663616+02:00", "EventTime": "2023-10-30T14:07:21.663637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["C307503vPhPgi6UQA5"]} -{"Format": "IDEA0", "ID": "25792c1b-1639-4e02-b62d-ff1db005363b", "DetectTime": "2023-10-30T14:07:21.697703+02:00", "EventTime": "2023-10-30T14:07:21.697717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C0LNAp4aWwlEhvikJj"]} -{"Format": "Json", "ID": "25792c1b-1639-4e02-b62d-ff1db005363b", "DetectTime": "2023-10-30T14:07:21.697703+02:00", "EventTime": "2023-10-30T14:07:21.697717+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:56:46.339443+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:21.757343)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2cc80a2e-8991-4158-879c-c96b2c5f71c0", "DetectTime": "2023-10-30T14:07:21.763104+02:00", "EventTime": "2023-10-30T14:07:21.763120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CZrryj1Z7GMBXKZRT5"]} -{"Format": "IDEA0", "ID": "cfa4f8f1-e4ff-41f5-b6f4-53cf1db474dd", "DetectTime": "2023-10-30T14:07:21.796093+02:00", "EventTime": "2023-10-30T14:07:21.796109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CAdBxwJub35GLXDU6"]} -{"Format": "IDEA0", "ID": "4b8bd074-835a-44b4-a308-effbfe5ad989", "DetectTime": "2023-10-30T14:07:21.825737+02:00", "EventTime": "2023-10-30T14:07:21.825752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CwL7F14E5vXIOjY7gf"]} -{"Format": "IDEA0", "ID": "7f356573-2d4d-4ba0-972f-afb616d0301f", "DetectTime": "2023-10-30T14:07:21.853483+02:00", "EventTime": "2023-10-30T14:07:21.853496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKA58w42EucicrerG7"]} -{"Format": "IDEA0", "ID": "da80f0cf-8536-4342-98ca-58400c435600", "DetectTime": "2023-10-30T14:07:21.879150+02:00", "EventTime": "2023-10-30T14:07:21.879162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["C12Fxr4Z4JfbnAsClg"]} -{"Format": "IDEA0", "ID": "c5905663-a7ac-44e0-8085-60e255ba51c9", "DetectTime": "2023-10-30T14:07:21.906119+02:00", "EventTime": "2023-10-30T14:07:21.906133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CYyDvxHD75zGeoXKk"]} -{"Format": "IDEA0", "ID": "0dca934d-75bd-43d1-ac43-90b0f46d67f8", "DetectTime": "2023-10-30T14:07:21.930996+02:00", "EventTime": "2023-10-30T14:07:21.931012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CpCBpp1cDGBWVHcN28"]} -{"Format": "IDEA0", "ID": "26e6d27d-63bb-48d9-8e88-250dce254fc7", "DetectTime": "2023-10-30T14:07:21.960002+02:00", "EventTime": "2023-10-30T14:07:21.960015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["C5xpZ14G52SGnIDQvh"]} -{"Format": "Json", "ID": "26e6d27d-63bb-48d9-8e88-250dce254fc7", "DetectTime": "2023-10-30T14:07:21.960002+02:00", "EventTime": "2023-10-30T14:07:21.960015+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T06:56:48.402350+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2023/10/30 14:07:22.024237)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "497f279a-1b35-498c-b146-8a39dc614806", "DetectTime": "2023-10-30T14:07:22.029119+02:00", "EventTime": "2023-10-30T14:07:22.029135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["CxMMR23mbfNsC7QQL6"]} -{"Format": "IDEA0", "ID": "0a054c26-870d-401b-884c-4e046050d36b", "DetectTime": "2023-10-30T14:07:22.055723+02:00", "EventTime": "2023-10-30T14:07:22.055741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CIHnWY3LjGznC27Znk"]} -{"Format": "IDEA0", "ID": "bdc41907-209b-4e4a-92f1-1fb08074c57f", "DetectTime": "2023-10-30T14:07:22.081202+02:00", "EventTime": "2023-10-30T14:07:22.081214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Cpi62sq0eFYtoJ8ed"]} -{"Format": "IDEA0", "ID": "560f478b-35d9-46fd-a2c6-91ee0ae9fa64", "DetectTime": "2023-10-30T14:07:22.106894+02:00", "EventTime": "2023-10-30T14:07:22.106908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CyS8Y5477ziIsCdmga"]} -{"Format": "IDEA0", "ID": "0430a19b-bfbe-404f-98b1-4d7fad0a69bf", "DetectTime": "2023-10-30T14:07:22.130163+02:00", "EventTime": "2023-10-30T14:07:22.130179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["ChfEEgjxpnCOF3eFh"]} -{"Format": "IDEA0", "ID": "ee09a567-8386-48d9-b28b-eabea5d9a927", "DetectTime": "2023-10-30T14:07:22.154851+02:00", "EventTime": "2023-10-30T14:07:22.154868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXmuT51q6PUpsnDc8g"]} -{"Format": "IDEA0", "ID": "be4daadc-e7d0-4497-892f-abe87b207559", "DetectTime": "2023-10-30T14:07:22.192011+02:00", "EventTime": "2023-10-30T14:07:22.192026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CV41IyHhgpTU79Imk"]} -{"Format": "IDEA0", "ID": "e2459bce-23a7-48db-9779-752c55a84a0f", "DetectTime": "2023-10-30T14:07:22.223570+02:00", "EventTime": "2023-10-30T14:07:22.223584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CHt0Yto4ol5IilnQd"]} -{"Format": "IDEA0", "ID": "98864486-a36d-4b4a-8299-6a099da97ace", "DetectTime": "2023-10-30T14:07:22.264432+02:00", "EventTime": "2023-10-30T14:07:22.264448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CxUZtS35svqPlfhry2"]} -{"Format": "IDEA0", "ID": "03544410-0b63-4052-8ca1-5f46e46955b3", "DetectTime": "2023-10-30T14:07:22.301388+02:00", "EventTime": "2023-10-30T14:07:22.301404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CciP273iB5knP2ErVk"]} -{"Format": "IDEA0", "ID": "c68d2ede-3926-40a7-bd4a-64305af7d195", "DetectTime": "2023-10-30T14:07:22.341370+02:00", "EventTime": "2023-10-30T14:07:22.341388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CPbmjLdPuSW2Ty9t2"]} -{"Format": "IDEA0", "ID": "50785861-7122-482f-b935-28daa88dae42", "DetectTime": "2023-10-30T14:07:22.379249+02:00", "EventTime": "2023-10-30T14:07:22.379267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cn97vf39nxSD5zNSTb"]} -{"Format": "IDEA0", "ID": "0e293312-d7c9-4685-8ab5-53c34601f4d7", "DetectTime": "2023-10-30T14:07:22.416153+02:00", "EventTime": "2023-10-30T14:07:22.416169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C8QeWo4dNxiHAM8dg9"]} -{"Format": "Json", "ID": "0e293312-d7c9-4685-8ab5-53c34601f4d7", "DetectTime": "2023-10-30T14:07:22.416153+02:00", "EventTime": "2023-10-30T14:07:22.416169+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:27:56.194645+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:22.521725)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9a138a08-8da2-4c7d-8e38-8a6054925115", "DetectTime": "2023-10-30T14:07:22.527169+02:00", "EventTime": "2023-10-30T14:07:22.527187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRMGxy9YLltn2n14j"]} -{"Format": "IDEA0", "ID": "be14641f-2f77-4ed2-8b7b-3ba92733202a", "DetectTime": "2023-10-30T14:07:22.574071+02:00", "EventTime": "2023-10-30T14:07:22.574091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["C0Ba3p45tQMnJxlow7"]} -{"Format": "IDEA0", "ID": "4c0bab91-8e1e-405e-952d-c7282d257cbd", "DetectTime": "2023-10-30T14:07:22.615906+02:00", "EventTime": "2023-10-30T14:07:22.615927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["C6FqFf2cMfUne0zpf6"]} -{"Format": "IDEA0", "ID": "622b4324-bd12-4658-a3b1-aef5cb65f6e6", "DetectTime": "2023-10-30T14:07:22.661689+02:00", "EventTime": "2023-10-30T14:07:22.661704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CoaTI24YavZkHxsLak"]} -{"Format": "IDEA0", "ID": "d5d4a66f-2d8e-4a45-ae7e-2b63134b55d4", "DetectTime": "2023-10-30T14:07:22.696959+02:00", "EventTime": "2023-10-30T14:07:22.696977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CzAAR01mpL3amOoqPc"]} -{"Format": "IDEA0", "ID": "19bacb87-5e3f-4203-b95c-96b5692e3620", "DetectTime": "2023-10-30T14:07:22.735188+02:00", "EventTime": "2023-10-30T14:07:22.735202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CdpWug33bny8ZyPHhc"]} -{"Format": "IDEA0", "ID": "c9888144-e092-4639-a545-78501913c196", "DetectTime": "2023-10-30T14:07:22.769738+02:00", "EventTime": "2023-10-30T14:07:22.769748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CF1HUB1Aj7M0lU3wt7"]} -{"Format": "IDEA0", "ID": "b43fa0e9-d256-419e-996d-89b254dc7909", "DetectTime": "2023-10-30T14:07:22.805009+02:00", "EventTime": "2023-10-30T14:07:22.805024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["Czo9zA3fs27FSkzf12"]} -{"Format": "Json", "ID": "b43fa0e9-d256-419e-996d-89b254dc7909", "DetectTime": "2023-10-30T14:07:22.805009+02:00", "EventTime": "2023-10-30T14:07:22.805024+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:27:58.220895+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:22.875999)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6cca89a5-5547-429c-ad79-6b208d0685cd", "DetectTime": "2023-10-30T14:07:22.881006+02:00", "EventTime": "2023-10-30T14:07:22.881035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Chu51g25UddLgf06Jk"]} -{"Format": "IDEA0", "ID": "185db952-8f11-445a-91aa-e754fe3c4268", "DetectTime": "2023-10-30T14:07:22.915333+02:00", "EventTime": "2023-10-30T14:07:22.915346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["Cjrmvw4hQvUDlcO9g1"]} -{"Format": "IDEA0", "ID": "b55209df-e817-462a-95ad-7a4f44cb1753", "DetectTime": "2023-10-30T14:07:22.951561+02:00", "EventTime": "2023-10-30T14:07:22.951584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C2alGNCphgJ59O96a"]} -{"Format": "IDEA0", "ID": "1ebfddd6-c42c-453c-a4dc-49f88ffc9453", "DetectTime": "2023-10-30T14:07:22.987990+02:00", "EventTime": "2023-10-30T14:07:22.988008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CZKrFe3XYiyW8OMzmc"]} -{"Format": "IDEA0", "ID": "74c8d8cc-6292-4094-83c5-f5d590d354a4", "DetectTime": "2023-10-30T14:07:23.022144+02:00", "EventTime": "2023-10-30T14:07:23.022156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CRpMt2OXwnrBhcv7"]} -{"Format": "IDEA0", "ID": "f7f3c009-7002-4c7f-b398-101f951d046f", "DetectTime": "2023-10-30T14:07:23.057624+02:00", "EventTime": "2023-10-30T14:07:23.057636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Cd0Cwy1kWSQyIStAyh"]} -{"Format": "IDEA0", "ID": "344de812-3429-4963-877d-8ee8a9d1384b", "DetectTime": "2023-10-30T14:07:23.095753+02:00", "EventTime": "2023-10-30T14:07:23.095772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["C3v9WnZ2FUWi2HHa4"]} -{"Format": "IDEA0", "ID": "26210987-fb09-4a51-ae64-1934107dc315", "DetectTime": "2023-10-30T14:07:23.133701+02:00", "EventTime": "2023-10-30T14:07:23.133722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CTonY83BrsxXZLBnB9"]} -{"Format": "Json", "ID": "26210987-fb09-4a51-ae64-1934107dc315", "DetectTime": "2023-10-30T14:07:23.133701+02:00", "EventTime": "2023-10-30T14:07:23.133722+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:28:17.306619+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:23.206802)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6049fbc-7e33-46ec-b695-9733f4e76153", "DetectTime": "2023-10-30T14:07:23.211886+02:00", "EventTime": "2023-10-30T14:07:23.211914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CCAHZZIjBwL0S8ej"]} -{"Format": "IDEA0", "ID": "9623148d-28fe-45f2-adf8-6e0d8e0caec1", "DetectTime": "2023-10-30T14:07:23.251891+02:00", "EventTime": "2023-10-30T14:07:23.251919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["C0twWFtmliNRtE1yj"]} -{"Format": "IDEA0", "ID": "4a9f7066-94f6-4239-9053-c98c6c107087", "DetectTime": "2023-10-30T14:07:23.290423+02:00", "EventTime": "2023-10-30T14:07:23.290441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CP2onc1NlhNUFot7S2"]} -{"Format": "IDEA0", "ID": "b909cda4-e0e4-4f82-b791-3a5f7a32af95", "DetectTime": "2023-10-30T14:07:23.326638+02:00", "EventTime": "2023-10-30T14:07:23.326660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CIrbDD1WvK9artrTEh"]} -{"Format": "IDEA0", "ID": "95f315f5-121c-4658-bea4-3b3a8af6cf4f", "DetectTime": "2023-10-30T14:07:23.359777+02:00", "EventTime": "2023-10-30T14:07:23.359793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CCdWAm2Ur2kTVR4N26"]} -{"Format": "IDEA0", "ID": "9d4ec264-cf0e-4699-9c8a-a776cf72b585", "DetectTime": "2023-10-30T14:07:23.394678+02:00", "EventTime": "2023-10-30T14:07:23.394698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["Cq4gSV1OtWKw6EZHNc"]} -{"Format": "IDEA0", "ID": "38d85395-d9d0-4e8e-9f4f-072af8fbe419", "DetectTime": "2023-10-30T14:07:23.428620+02:00", "EventTime": "2023-10-30T14:07:23.428634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CRkJvU12PdCT2ORXo7"]} -{"Format": "IDEA0", "ID": "c59a4898-3978-403a-9c6d-4a7f404cf0ac", "DetectTime": "2023-10-30T14:07:23.463550+02:00", "EventTime": "2023-10-30T14:07:23.463579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C1a9it2j8ggt4sG6pg"]} -{"Format": "Json", "ID": "c59a4898-3978-403a-9c6d-4a7f404cf0ac", "DetectTime": "2023-10-30T14:07:23.463550+02:00", "EventTime": "2023-10-30T14:07:23.463579+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:28:19.901965+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:23.530224)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eb924da9-9fd8-4efc-a200-940d0331b73a", "DetectTime": "2023-10-30T14:07:23.535434+02:00", "EventTime": "2023-10-30T14:07:23.535451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["Ce5vMC2E8rXbiB49V8"]} -{"Format": "IDEA0", "ID": "38ea3c28-05e7-431c-9bb2-c8f016089845", "DetectTime": "2023-10-30T14:07:23.568640+02:00", "EventTime": "2023-10-30T14:07:23.568659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26073], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. ", "ContentType": "text/plain"}], "uids": ["C89EJ51AjbFFywLMWi"]} -{"Format": "IDEA0", "ID": "162c1668-ec86-412b-a1c7-23a6343bbbde", "DetectTime": "2023-10-30T14:07:23.596954+02:00", "EventTime": "2023-10-30T14:07:23.596966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CQ8PE636WETSm4w8Kg"]} -{"Format": "IDEA0", "ID": "46e590da-4a7d-4108-bf8b-8818f913f8dd", "DetectTime": "2023-10-30T14:07:23.635721+02:00", "EventTime": "2023-10-30T14:07:23.635742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwDdXh388cjSbIz6gf"]} -{"Format": "IDEA0", "ID": "a3710878-72de-49b5-9753-fec5efbe0c4b", "DetectTime": "2023-10-30T14:07:23.670353+02:00", "EventTime": "2023-10-30T14:07:23.670377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CvB53K2RwOvRypRiGi"]} -{"Format": "IDEA0", "ID": "065a9943-ce5a-4e34-8e6b-35a191eaec4d", "DetectTime": "2023-10-30T14:07:23.703029+02:00", "EventTime": "2023-10-30T14:07:23.703047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CDhpkz3FZ45NfDK3al"]} -{"Format": "IDEA0", "ID": "4adb1cbb-11ef-4aff-b661-70308c5960e7", "DetectTime": "2023-10-30T14:07:23.737741+02:00", "EventTime": "2023-10-30T14:07:23.737769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CdhxOc14AHednICfYi"]} -{"Format": "IDEA0", "ID": "1ced1f8b-80e1-47bf-acac-a765b4011e52", "DetectTime": "2023-10-30T14:07:23.773236+02:00", "EventTime": "2023-10-30T14:07:23.773257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C4hc2i4Urq7kn112Hh"]} -{"Format": "Json", "ID": "1ced1f8b-80e1-47bf-acac-a765b4011e52", "DetectTime": "2023-10-30T14:07:23.773236+02:00", "EventTime": "2023-10-30T14:07:23.773257+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:59:34.927536+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:23.846212)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "48935a6a-0faa-499b-bd62-ec7e3c3d7cab", "DetectTime": "2023-10-30T14:07:23.852286+02:00", "EventTime": "2023-10-30T14:07:23.852311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CNJvP92CBBZFKhatjh"]} -{"Format": "IDEA0", "ID": "946df182-d9a0-4736-8e84-fffa1d3906dd", "DetectTime": "2023-10-30T14:07:23.886529+02:00", "EventTime": "2023-10-30T14:07:23.886555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CD60SE2yWMUzFoHSb4"]} -{"Format": "IDEA0", "ID": "816f6744-6264-49f0-9d1c-e29787f8a222", "DetectTime": "2023-10-30T14:07:23.918696+02:00", "EventTime": "2023-10-30T14:07:23.918717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CunhV73uZZyNz3tKwi"]} -{"Format": "IDEA0", "ID": "ab2bb483-ea26-4717-8d10-6e6289b98b77", "DetectTime": "2023-10-30T14:07:23.950981+02:00", "EventTime": "2023-10-30T14:07:23.950998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cw8Kmx4TY45IvIaspl"]} -{"Format": "IDEA0", "ID": "77505161-f009-41bc-ae59-b53f59f61709", "DetectTime": "2023-10-30T14:07:23.980689+02:00", "EventTime": "2023-10-30T14:07:23.980702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CG2a2X3kXiXPmDJ2l"]} -{"Format": "IDEA0", "ID": "be275be0-5487-4944-83c7-9b0da5f44f25", "DetectTime": "2023-10-30T14:07:24.011731+02:00", "EventTime": "2023-10-30T14:07:24.011751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CB7PF7SgWsmZhCuM6"]} -{"Format": "IDEA0", "ID": "223d3ed7-6e03-4c57-8e92-ec4253a35f2d", "DetectTime": "2023-10-30T14:07:24.044753+02:00", "EventTime": "2023-10-30T14:07:24.044770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CG8OBN1An5GjXmRxj"]} -{"Format": "IDEA0", "ID": "74abf918-0481-4b35-92d4-dba1864331bf", "DetectTime": "2023-10-30T14:07:24.073255+02:00", "EventTime": "2023-10-30T14:07:24.073270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CTktRv3BgutulelMh"]} -{"Format": "Json", "ID": "74abf918-0481-4b35-92d4-dba1864331bf", "DetectTime": "2023-10-30T14:07:24.073255+02:00", "EventTime": "2023-10-30T14:07:24.073270+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:59:37.075787+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:24.139459)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "756ab227-9163-49de-a819-d155908d66c8", "DetectTime": "2023-10-30T14:07:24.145471+02:00", "EventTime": "2023-10-30T14:07:24.145494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CGQ63f2URkmsKKCVP4"]} -{"Format": "IDEA0", "ID": "f12c7210-8b22-458b-a0af-728153e75191", "DetectTime": "2023-10-30T14:07:24.173905+02:00", "EventTime": "2023-10-30T14:07:24.173917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CouGyo2qfHp3afIjui"]} -{"Format": "IDEA0", "ID": "2f182fab-ea34-40ec-9b7c-c7cdebefac29", "DetectTime": "2023-10-30T14:07:24.197467+02:00", "EventTime": "2023-10-30T14:07:24.197480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXRgBoZI12o9tvTrc"]} -{"Format": "IDEA0", "ID": "759d2388-56c4-4838-909c-74aaafc5993d", "DetectTime": "2023-10-30T14:07:24.221067+02:00", "EventTime": "2023-10-30T14:07:24.221084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["C23FtDuCZhZXkkAe"]} -{"Format": "IDEA0", "ID": "9df7c8b1-99d8-403d-9b1d-a368297c299c", "DetectTime": "2023-10-30T14:07:24.246837+02:00", "EventTime": "2023-10-30T14:07:24.246851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Clxlyu2X4T3nSeRhEk"]} -{"Format": "IDEA0", "ID": "5fb43411-94a7-418c-b7dc-5b5a6fb6d610", "DetectTime": "2023-10-30T14:07:24.272187+02:00", "EventTime": "2023-10-30T14:07:24.272200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CdfP0a3wO0O8k2Odjf"]} -{"Format": "IDEA0", "ID": "7c863304-67ed-484f-954c-91694d294887", "DetectTime": "2023-10-30T14:07:24.299546+02:00", "EventTime": "2023-10-30T14:07:24.299570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C1aDf44NkjSesfgPPk"]} -{"Format": "IDEA0", "ID": "e6f4d506-b1e5-4f60-8c1a-5186db9d6e4c", "DetectTime": "2023-10-30T14:07:24.325940+02:00", "EventTime": "2023-10-30T14:07:24.325970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CoGpV31i1KotE16Lbh"]} -{"Format": "Json", "ID": "e6f4d506-b1e5-4f60-8c1a-5186db9d6e4c", "DetectTime": "2023-10-30T14:07:24.325940+02:00", "EventTime": "2023-10-30T14:07:24.325970+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T07:59:58.044689+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:24.388695)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f35777df-74fc-464e-aaa5-43be37dffab3", "DetectTime": "2023-10-30T14:07:24.393852+02:00", "EventTime": "2023-10-30T14:07:24.393863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["Cf7Pxs3MOknbphG6k2"]} -{"Format": "IDEA0", "ID": "5a78909c-e9cf-4338-9697-e61921e31171", "DetectTime": "2023-10-30T14:07:24.420748+02:00", "EventTime": "2023-10-30T14:07:24.420761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CCPwO61ujcJW18PaUe"]} -{"Format": "IDEA0", "ID": "765dd17c-c2ec-48bf-a057-054a8c27ffc6", "DetectTime": "2023-10-30T14:07:24.446262+02:00", "EventTime": "2023-10-30T14:07:24.446279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Cx3ZQO1IyBAYF2h4ek"]} -{"Format": "IDEA0", "ID": "e3e03140-9554-4ebb-996e-d170937a571e", "DetectTime": "2023-10-30T14:07:24.475669+02:00", "EventTime": "2023-10-30T14:07:24.475690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CckcCJwtAo8VEPPuf"]} -{"Format": "IDEA0", "ID": "12de8537-1aa1-4ef4-991c-5726995e806a", "DetectTime": "2023-10-30T14:07:24.507519+02:00", "EventTime": "2023-10-30T14:07:24.507533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CGOahTRd9lUuNuCXf"]} -{"Format": "IDEA0", "ID": "b74f0e0a-92ed-4a39-8f32-ab8561133d7e", "DetectTime": "2023-10-30T14:07:24.534706+02:00", "EventTime": "2023-10-30T14:07:24.534745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cv6B704dxHCoxDBAyb"]} -{"Format": "IDEA0", "ID": "25345626-d96d-4965-a9aa-8c74a0523eaa", "DetectTime": "2023-10-30T14:07:24.559579+02:00", "EventTime": "2023-10-30T14:07:24.559592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CjLCxP13OkT21nIgC9"]} -{"Format": "IDEA0", "ID": "2d0d99a2-4cc7-4952-b8ce-9c62f7b7bc81", "DetectTime": "2023-10-30T14:07:24.583945+02:00", "EventTime": "2023-10-30T14:07:24.583960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. ", "ContentType": "text/plain"}], "uids": ["CPjLRI3gJaxXumc1q7"]} -{"Format": "Json", "ID": "2d0d99a2-4cc7-4952-b8ce-9c62f7b7bc81", "DetectTime": "2023-10-30T14:07:24.583945+02:00", "EventTime": "2023-10-30T14:07:24.583960+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8159], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T08:00:00.166297+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2023/10/30 14:07:24.641818)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "054af037-f134-4fe4-9b4a-b9c20000cf35", "DetectTime": "2023-10-30T14:07:24.646446+02:00", "EventTime": "2023-10-30T14:07:24.646458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CuOlTsOzPDC7isRx5"]} -{"Format": "IDEA0", "ID": "c7032b0a-61bb-48df-a55e-3189b9a033c5", "DetectTime": "2023-10-30T14:07:24.671261+02:00", "EventTime": "2023-10-30T14:07:24.671274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Ccfx3u2LaQ6meEfN5f"]} -{"Format": "IDEA0", "ID": "c77d314b-de01-4433-9502-cbb2535790de", "DetectTime": "2023-10-30T14:07:24.693390+02:00", "EventTime": "2023-10-30T14:07:24.693412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CSUDcvSn8KH5qqOi6"]} -{"Format": "IDEA0", "ID": "d5ad6a18-3031-45ad-b9d4-97c3dc276468", "DetectTime": "2023-10-30T14:07:24.717856+02:00", "EventTime": "2023-10-30T14:07:24.717876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["COflB238gbsGEzGIZ7"]} -{"Format": "IDEA0", "ID": "89275b03-61f4-4074-84f9-6daa31193a9d", "DetectTime": "2023-10-30T14:07:24.742173+02:00", "EventTime": "2023-10-30T14:07:24.742189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CeEH1f3oy5YowFPW77"]} -{"Format": "IDEA0", "ID": "e1959439-2450-4de7-8878-c807dd8e9bcf", "DetectTime": "2023-10-30T14:07:24.776513+02:00", "EventTime": "2023-10-30T14:07:24.776530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CGC4z7UsITPrxu5Z9"]} -{"Format": "IDEA0", "ID": "e20f74c8-455a-45d7-87c3-adf481f7ff8a", "DetectTime": "2023-10-30T14:07:24.803287+02:00", "EventTime": "2023-10-30T14:07:24.803303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CBlEnR2VvpbUhrLN2k"]} -{"Format": "IDEA0", "ID": "0cfe0c6e-1487-4fe9-8145-a2dc0d6ec917", "DetectTime": "2023-10-30T14:07:24.826427+02:00", "EventTime": "2023-10-30T14:07:24.826444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C76Rwc1fsepIRLOnS5"]} -{"Format": "IDEA0", "ID": "87458989-9869-486a-9374-79163d857938", "DetectTime": "2023-10-30T14:07:24.850632+02:00", "EventTime": "2023-10-30T14:07:24.850650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CSWt2V2mUViRKlDTMg"]} -{"Format": "IDEA0", "ID": "190eef90-8982-4707-99d3-2495910655db", "DetectTime": "2023-10-30T14:07:24.874050+02:00", "EventTime": "2023-10-30T14:07:24.874072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cpqb7v2synK3VEgE7e"]} -{"Format": "Json", "ID": "190eef90-8982-4707-99d3-2495910655db", "DetectTime": "2023-10-30T14:07:24.874050+02:00", "EventTime": "2023-10-30T14:07:24.874072+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T08:30:55.300885+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 103. (real time 2023/10/30 14:07:24.951965)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e7da55e-32f9-4ed8-a422-3274de57f0ab", "DetectTime": "2023-10-30T14:07:24.956756+02:00", "EventTime": "2023-10-30T14:07:24.956767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Cvnr2b3LGLCUaxiWB5"]} -{"Format": "IDEA0", "ID": "a5408692-87bd-439a-90f6-665dd2a45d98", "DetectTime": "2023-10-30T14:07:24.983257+02:00", "EventTime": "2023-10-30T14:07:24.983277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CPnFhc2Q784P8pv4Zf"]} -{"Format": "IDEA0", "ID": "5bfc463c-8242-4266-8240-175e2249b2f0", "DetectTime": "2023-10-30T14:07:25.007665+02:00", "EventTime": "2023-10-30T14:07:25.007689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CW6ykV35fDglCacPG"]} -{"Format": "IDEA0", "ID": "badea847-e187-47c6-9e2f-5d21644c6124", "DetectTime": "2023-10-30T14:07:25.031024+02:00", "EventTime": "2023-10-30T14:07:25.031045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C7rfSi2y5m9DBX4ifd"]} -{"Format": "IDEA0", "ID": "c1659981-0eed-43ac-921f-47df80566943", "DetectTime": "2023-10-30T14:07:25.055340+02:00", "EventTime": "2023-10-30T14:07:25.055352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cz9UFL1JURR17Hvq8"]} -{"Format": "IDEA0", "ID": "a785f6fd-ce63-458d-8ed3-889fc500aec4", "DetectTime": "2023-10-30T14:07:25.078816+02:00", "EventTime": "2023-10-30T14:07:25.078844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CUYg9P1fRtPAamk6Q3"]} -{"Format": "IDEA0", "ID": "8ca1b2f8-f4c6-4750-b71e-daa90e3190dd", "DetectTime": "2023-10-30T14:07:25.102471+02:00", "EventTime": "2023-10-30T14:07:25.102498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CJZsVd4O2l0Odz7dQ9"]} -{"Format": "IDEA0", "ID": "345e7ddb-2540-4d99-9552-900ee983ff04", "DetectTime": "2023-10-30T14:07:25.126679+02:00", "EventTime": "2023-10-30T14:07:25.126708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CaEHWk2NfvQuIZ0i1g"]} -{"Format": "Json", "ID": "345e7ddb-2540-4d99-9552-900ee983ff04", "DetectTime": "2023-10-30T14:07:25.126679+02:00", "EventTime": "2023-10-30T14:07:25.126708+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T08:30:57.509974+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 103. (real time 2023/10/30 14:07:25.187586)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "83388318-6a92-45e7-bc50-1e257e8c102e", "DetectTime": "2023-10-30T14:07:25.192085+02:00", "EventTime": "2023-10-30T14:07:25.192102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cx2qiS2X6OjbwZ3G2d"]} -{"Format": "IDEA0", "ID": "d51192f3-68d2-41ad-83d2-234eee26f830", "DetectTime": "2023-10-30T14:07:25.213833+02:00", "EventTime": "2023-10-30T14:07:25.213856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C8TUv14o2Z1HZvFbTi"]} -{"Format": "IDEA0", "ID": "f1fa625c-681a-4165-b955-4da341110f5e", "DetectTime": "2023-10-30T14:07:25.235678+02:00", "EventTime": "2023-10-30T14:07:25.235706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["Ct1aBw2MzivDAhVc54"]} -{"Format": "IDEA0", "ID": "82212c51-31c7-4d3f-ad89-dc86c7452720", "DetectTime": "2023-10-30T14:07:25.257170+02:00", "EventTime": "2023-10-30T14:07:25.257185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CKo2Ep2HjOEaX45kKg"]} -{"Format": "IDEA0", "ID": "1b9fad38-0cd0-4cfe-9b96-0deec6baab56", "DetectTime": "2023-10-30T14:07:25.275746+02:00", "EventTime": "2023-10-30T14:07:25.275758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cp1rDD19Qrq1ziHR21"]} -{"Format": "IDEA0", "ID": "b5452b5d-f54b-493a-8557-f700d824712a", "DetectTime": "2023-10-30T14:07:25.296541+02:00", "EventTime": "2023-10-30T14:07:25.296560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CrxZkM1As40L1xcBBc"]} -{"Format": "IDEA0", "ID": "71fdf291-52bb-42e0-b206-2bc9379c3df2", "DetectTime": "2023-10-30T14:07:25.316563+02:00", "EventTime": "2023-10-30T14:07:25.316579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C9gb363P4gLsg2peYg"]} -{"Format": "IDEA0", "ID": "6c5e9cdd-a6d6-48f2-b1d6-03d999baa3b1", "DetectTime": "2023-10-30T14:07:25.337015+02:00", "EventTime": "2023-10-30T14:07:25.337041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CRRMC72lBkOrkFJFji"]} -{"Format": "Json", "ID": "6c5e9cdd-a6d6-48f2-b1d6-03d999baa3b1", "DetectTime": "2023-10-30T14:07:25.337015+02:00", "EventTime": "2023-10-30T14:07:25.337041+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T08:30:59.844662+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 103. (real time 2023/10/30 14:07:25.392908)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b14f08d0-f0d0-4572-8df2-a29cbf88f4fb", "DetectTime": "2023-10-30T14:07:25.398192+02:00", "EventTime": "2023-10-30T14:07:25.398203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CLaGk71rQXGN2CEmAb"]} -{"Format": "IDEA0", "ID": "2a070727-730a-4cfc-bf75-f64cf2ffad60", "DetectTime": "2023-10-30T14:07:25.417759+02:00", "EventTime": "2023-10-30T14:07:25.417776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CUzlkt4KBmhoQucMo9"]} -{"Format": "IDEA0", "ID": "bf5f0c8f-9234-4a09-96b4-f008b6925043", "DetectTime": "2023-10-30T14:07:25.436268+02:00", "EventTime": "2023-10-30T14:07:25.436281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CV7wzw1O1lX80vBT39"]} -{"Format": "IDEA0", "ID": "ac8f5e4d-a144-432b-bbeb-3d35f0e6a1d8", "DetectTime": "2023-10-30T14:07:25.454537+02:00", "EventTime": "2023-10-30T14:07:25.454552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CZP0zK1mNGpDe0SFZi"]} -{"Format": "IDEA0", "ID": "1778202a-3ddf-4347-8b7b-5695a34019f9", "DetectTime": "2023-10-30T14:07:25.472933+02:00", "EventTime": "2023-10-30T14:07:25.472944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CxwYxg3LUvQRlKLZm1"]} -{"Format": "IDEA0", "ID": "c55f0641-3757-4b5b-a006-74d9217420dc", "DetectTime": "2023-10-30T14:07:25.489608+02:00", "EventTime": "2023-10-30T14:07:25.489627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CbUvGo2ElG8YsazoGl"]} -{"Format": "IDEA0", "ID": "d6d4665c-a2e2-4649-b1c9-8770796d447e", "DetectTime": "2023-10-30T14:07:25.507764+02:00", "EventTime": "2023-10-30T14:07:25.507781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C4DFSF1kVD9oeZxVMa"]} -{"Format": "IDEA0", "ID": "123c7ef3-848c-441a-8ee3-85371365cd93", "DetectTime": "2023-10-30T14:07:25.524565+02:00", "EventTime": "2023-10-30T14:07:25.524582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CEEDJ92VkHAzvCzPWf"]} -{"Format": "Json", "ID": "123c7ef3-848c-441a-8ee3-85371365cd93", "DetectTime": "2023-10-30T14:07:25.524565+02:00", "EventTime": "2023-10-30T14:07:25.524582+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T08:31:19.460553+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 103. (real time 2023/10/30 14:07:25.578831)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42bc8d0f-2485-4b86-b18b-cb2fcd3ca5a4", "DetectTime": "2023-10-30T14:07:25.583829+02:00", "EventTime": "2023-10-30T14:07:25.583844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CQPgwx2acn47QdFAyd"]} -{"Format": "IDEA0", "ID": "7eaac3e1-8035-4d15-bc35-c345fbf507e4", "DetectTime": "2023-10-30T14:07:25.599043+02:00", "EventTime": "2023-10-30T14:07:25.599069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CAX3Ys4brsbdSuWB3b"]} -{"Format": "IDEA0", "ID": "3cd089c2-eb1c-4de0-9627-fd9ee8560642", "DetectTime": "2023-10-30T14:07:25.617434+02:00", "EventTime": "2023-10-30T14:07:25.617451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkEMcX3xJdLLLkIo2j"]} -{"Format": "IDEA0", "ID": "29c35c4a-bec8-4138-b3a6-f5885b8f49c7", "DetectTime": "2023-10-30T14:07:25.633486+02:00", "EventTime": "2023-10-30T14:07:25.633506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CoawWo2kT3DJFTLf4i"]} -{"Format": "IDEA0", "ID": "fccd48ff-d1f8-4188-8830-1a70cb28cafd", "DetectTime": "2023-10-30T14:07:25.673712+02:00", "EventTime": "2023-10-30T14:07:25.673731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C5RpCLgAxNOd3uag5"]} -{"Format": "IDEA0", "ID": "cbf18025-5176-4307-85de-a504ab947d76", "DetectTime": "2023-10-30T14:07:25.714858+02:00", "EventTime": "2023-10-30T14:07:25.714875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C8KIQ92aYQRq5H9iY8"]} -{"Format": "IDEA0", "ID": "ddd061a3-7325-4fac-8f33-226be9c908d7", "DetectTime": "2023-10-30T14:07:25.754045+02:00", "EventTime": "2023-10-30T14:07:25.754059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CMqvBI21ZnTM2S6Mob"]} -{"Format": "IDEA0", "ID": "51d9ac97-ce27-4788-8154-f704f229409e", "DetectTime": "2023-10-30T14:07:25.790296+02:00", "EventTime": "2023-10-30T14:07:25.790316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CiUO8M3CdEyF7CycY2"]} -{"Format": "IDEA0", "ID": "fdc6eeff-e97b-4cb3-a006-6a2c4e50731b", "DetectTime": "2023-10-30T14:07:25.827849+02:00", "EventTime": "2023-10-30T14:07:25.827862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CLE38O1FfVBxRENcA8"]} -{"Format": "IDEA0", "ID": "2d2654c9-2ea9-44db-a49c-8c012d27c42e", "DetectTime": "2023-10-30T14:07:25.869011+02:00", "EventTime": "2023-10-30T14:07:25.869028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Co2PHl1hJ7Ws9SsTO1"]} -{"Format": "IDEA0", "ID": "bdd48c85-c2ba-40b0-8ddc-a0a44b37b162", "DetectTime": "2023-10-30T14:07:25.907387+02:00", "EventTime": "2023-10-30T14:07:25.907403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVsea814zTRpb624fj"]} -{"Format": "Json", "ID": "bdd48c85-c2ba-40b0-8ddc-a0a44b37b162", "DetectTime": "2023-10-30T14:07:25.907387+02:00", "EventTime": "2023-10-30T14:07:25.907403+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T09:01:42.180185+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:25.983225)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ac6e0962-e86d-4cc1-b579-55f99f69a4aa", "DetectTime": "2023-10-30T14:07:25.987606+02:00", "EventTime": "2023-10-30T14:07:25.987623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C5qP2Z1RFROx1qt3nd"]} -{"Format": "IDEA0", "ID": "ebebc841-5552-40fc-b84f-a563166a8f12", "DetectTime": "2023-10-30T14:07:26.027730+02:00", "EventTime": "2023-10-30T14:07:26.027848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CJa7d91k6Flsf2HKl"]} -{"Format": "IDEA0", "ID": "e9afbe26-f4b5-459e-8974-8d46a0ae41f6", "DetectTime": "2023-10-30T14:07:26.066298+02:00", "EventTime": "2023-10-30T14:07:26.066313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CTnSTk2fl00PU0Utfl"]} -{"Format": "IDEA0", "ID": "36de63e7-d941-4ad7-863a-4ebc76649540", "DetectTime": "2023-10-30T14:07:26.104803+02:00", "EventTime": "2023-10-30T14:07:26.104819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CVhDMA2ijrioqHeGK9"]} -{"Format": "IDEA0", "ID": "dbfe3833-cd71-4c13-bd14-06bb22474ddf", "DetectTime": "2023-10-30T14:07:26.140040+02:00", "EventTime": "2023-10-30T14:07:26.140054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C6lIkCSV6hYI0xdrj"]} -{"Format": "IDEA0", "ID": "69a418dd-1e07-4894-a74c-e2003e957643", "DetectTime": "2023-10-30T14:07:26.174367+02:00", "EventTime": "2023-10-30T14:07:26.174378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["Cuv8L73HRLn3lC2gI4"]} -{"Format": "IDEA0", "ID": "9d57d4a1-b167-4ddb-b84f-c922f4f58307", "DetectTime": "2023-10-30T14:07:26.207623+02:00", "EventTime": "2023-10-30T14:07:26.207643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKqhsi4QwWgG8kPHW9"]} -{"Format": "IDEA0", "ID": "b8f0be22-8f70-4ec0-9a09-892642774f56", "DetectTime": "2023-10-30T14:07:26.247532+02:00", "EventTime": "2023-10-30T14:07:26.247552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["C7NSRO1PPLjtd9Z0X3"]} -{"Format": "Json", "ID": "b8f0be22-8f70-4ec0-9a09-892642774f56", "DetectTime": "2023-10-30T14:07:26.247532+02:00", "EventTime": "2023-10-30T14:07:26.247552+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T09:01:44.222522+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:26.323516)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ef569a20-ef6f-41c5-b20e-f7b2ab009d87", "DetectTime": "2023-10-30T14:07:26.328178+02:00", "EventTime": "2023-10-30T14:07:26.328190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CCKSYK25S6WM2hSmHe"]} -{"Format": "IDEA0", "ID": "bb8f6c8e-3e62-40e5-9e11-4a71f5f11dcc", "DetectTime": "2023-10-30T14:07:26.362627+02:00", "EventTime": "2023-10-30T14:07:26.362639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["ChcCOH3GsZ4lGmV70l"]} -{"Format": "IDEA0", "ID": "1be76bf0-5185-4531-82a9-1fcc1d2c3b72", "DetectTime": "2023-10-30T14:07:26.396935+02:00", "EventTime": "2023-10-30T14:07:26.396952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CIU0Fe3e1Rkm7tfZX9"]} -{"Format": "IDEA0", "ID": "8ae7b3a9-3946-4e09-86c2-49d09b54c6c7", "DetectTime": "2023-10-30T14:07:26.432756+02:00", "EventTime": "2023-10-30T14:07:26.432777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CesAQfVFXQgW7o2Be"]} -{"Format": "IDEA0", "ID": "ca9afe77-df7b-43ca-a39b-ff9313c20f4a", "DetectTime": "2023-10-30T14:07:26.465154+02:00", "EventTime": "2023-10-30T14:07:26.465172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CVQ83wQOJsjG4kXF3"]} -{"Format": "IDEA0", "ID": "d4864c42-7908-4040-9d81-400de32b6421", "DetectTime": "2023-10-30T14:07:26.502661+02:00", "EventTime": "2023-10-30T14:07:26.502673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CsWvYMeCQSWluxDI8"]} -{"Format": "IDEA0", "ID": "268a293d-f734-4986-bd7f-b3ad16b0f4d4", "DetectTime": "2023-10-30T14:07:26.539269+02:00", "EventTime": "2023-10-30T14:07:26.539287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CjDF5zTlH9WmGjrKj"]} -{"Format": "IDEA0", "ID": "874485fd-191b-4b3f-89be-9a473d204fe3", "DetectTime": "2023-10-30T14:07:26.573450+02:00", "EventTime": "2023-10-30T14:07:26.573462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CD3YfRUWXSePcqmtg"]} -{"Format": "Json", "ID": "874485fd-191b-4b3f-89be-9a473d204fe3", "DetectTime": "2023-10-30T14:07:26.573450+02:00", "EventTime": "2023-10-30T14:07:26.573462+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T09:01:46.991991+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:26.647245)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5478fda5-665e-4f87-857f-966b8efcfd6f", "DetectTime": "2023-10-30T14:07:26.652354+02:00", "EventTime": "2023-10-30T14:07:26.652370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CS3XqN3y1EtFav19Ga"]} -{"Format": "IDEA0", "ID": "911e842c-5038-43f3-bdb9-20f461067106", "DetectTime": "2023-10-30T14:07:26.685708+02:00", "EventTime": "2023-10-30T14:07:26.685733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Cg30LFQTliZFyTYcf"]} -{"Format": "IDEA0", "ID": "09c5ad3f-e356-4d14-9c1f-d3c6c3fa5a89", "DetectTime": "2023-10-30T14:07:26.716872+02:00", "EventTime": "2023-10-30T14:07:26.716889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C3qNif4GZYa9gCaHr7"]} -{"Format": "IDEA0", "ID": "16f4b1b8-9560-4082-860c-1ddcd28a4bae", "DetectTime": "2023-10-30T14:07:26.755085+02:00", "EventTime": "2023-10-30T14:07:26.755103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cm0rHW3qJm5AX2Sbs2"]} -{"Format": "IDEA0", "ID": "0da0c25f-65f4-43a6-9e49-24fd7f4e5632", "DetectTime": "2023-10-30T14:07:26.785728+02:00", "EventTime": "2023-10-30T14:07:26.785745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CX7gVb3Z9YVBctRTn7"]} -{"Format": "IDEA0", "ID": "b62409e0-f40d-4a26-a0e2-db89ed6f35e1", "DetectTime": "2023-10-30T14:07:26.818513+02:00", "EventTime": "2023-10-30T14:07:26.818533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CFiFJkOcR8OLeXrR3"]} -{"Format": "IDEA0", "ID": "1262cc13-3d0f-4e2c-86de-517d61811b29", "DetectTime": "2023-10-30T14:07:26.852147+02:00", "EventTime": "2023-10-30T14:07:26.852164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CdYiHo1yoRRzvRRLK1"]} -{"Format": "IDEA0", "ID": "d7e7dab6-1cb8-4c89-99aa-3208d90adaa4", "DetectTime": "2023-10-30T14:07:26.884475+02:00", "EventTime": "2023-10-30T14:07:26.884499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CYhn6u1yFeSkdwCjjk"]} -{"Format": "IDEA0", "ID": "82883414-f62c-498c-83d7-82f5a7b1dd4e", "DetectTime": "2023-10-30T14:07:26.918514+02:00", "EventTime": "2023-10-30T14:07:26.918535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGNP1x1LVZNW6PkfE9"]} -{"Format": "Json", "ID": "82883414-f62c-498c-83d7-82f5a7b1dd4e", "DetectTime": "2023-10-30T14:07:26.918514+02:00", "EventTime": "2023-10-30T14:07:26.918535+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-05T09:13:26.551192+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:26.980681)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2ef7a9c1-885c-4aa1-b92b-01049fa29a04", "DetectTime": "2023-10-30T14:07:26.985851+02:00", "EventTime": "2023-10-30T14:07:26.985879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CYG3bl3hZJN9tB7p24"]} -{"Format": "IDEA0", "ID": "d374be5a-504b-4bbe-9069-4521c5052817", "DetectTime": "2023-10-30T14:07:27.018565+02:00", "EventTime": "2023-10-30T14:07:27.018581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C9j5pw2YkxftjnKrMc"]} -{"Format": "IDEA0", "ID": "2a438081-3216-42fe-92ca-269ca849802f", "DetectTime": "2023-10-30T14:07:27.045470+02:00", "EventTime": "2023-10-30T14:07:27.045486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CySdxlK9R0D8W12R2"]} -{"Format": "IDEA0", "ID": "b011e993-ae60-4a54-aaef-594be3d37f36", "DetectTime": "2023-10-30T14:07:27.077041+02:00", "EventTime": "2023-10-30T14:07:27.077060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CisDXw3A49O5CnSTgk"]} -{"Format": "IDEA0", "ID": "2e38405d-b65f-4d9a-97d8-3ad0a814e0b6", "DetectTime": "2023-10-30T14:07:27.107893+02:00", "EventTime": "2023-10-30T14:07:27.107909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C3e3xO3Jeby91oRlkc"]} -{"Format": "IDEA0", "ID": "c483f9b7-556a-4e30-8ed2-d34ad03c301e", "DetectTime": "2023-10-30T14:07:27.135134+02:00", "EventTime": "2023-10-30T14:07:27.135155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CpXEve29YdTmD5JpU9"]} -{"Format": "IDEA0", "ID": "f90d495e-c257-4319-a396-285841cd2b94", "DetectTime": "2023-10-30T14:07:27.163019+02:00", "EventTime": "2023-10-30T14:07:27.163031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CAps111tTLbdVFw11"]} -{"Format": "IDEA0", "ID": "5336e43e-e7f7-45c4-9f72-c561c70b83ab", "DetectTime": "2023-10-30T14:07:27.192664+02:00", "EventTime": "2023-10-30T14:07:27.192686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Chibu01RvUFdKJuJEk"]} -{"Format": "IDEA0", "ID": "96fabf10-cd7e-4b91-97e0-e5629b0fb9d8", "DetectTime": "2023-10-30T14:07:27.226296+02:00", "EventTime": "2023-10-30T14:07:27.226310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["COYIR31RD2bQmlE9fj"]} -{"Format": "IDEA0", "ID": "fa001aeb-f520-4f5d-9cb4-674e4d8a3edd", "DetectTime": "2023-10-30T14:07:27.265134+02:00", "EventTime": "2023-10-30T14:07:27.265151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQVsk21G0sjLBWQla9"]} -{"Format": "Json", "ID": "fa001aeb-f520-4f5d-9cb4-674e4d8a3edd", "DetectTime": "2023-10-30T14:07:27.265134+02:00", "EventTime": "2023-10-30T14:07:27.265151+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T09:32:06.948367+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:27.330093)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "02816020-5ba1-4a84-a8f9-5d12ac1a37a8", "DetectTime": "2023-10-30T14:07:27.335784+02:00", "EventTime": "2023-10-30T14:07:27.335802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRH7EesW9tWn2r8k2"]} -{"Format": "IDEA0", "ID": "178ad4c9-2c3d-4a8d-b55b-d281e2489744", "DetectTime": "2023-10-30T14:07:27.369045+02:00", "EventTime": "2023-10-30T14:07:27.369064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Ckijow3ER9poPEbL09"]} -{"Format": "IDEA0", "ID": "c8c46b19-7398-415b-867d-e4228e68236c", "DetectTime": "2023-10-30T14:07:27.402443+02:00", "EventTime": "2023-10-30T14:07:27.402464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CiOi6L1wswkGrvWw5g"]} -{"Format": "IDEA0", "ID": "3f5a7363-3272-49b4-a5aa-6450a71ad95c", "DetectTime": "2023-10-30T14:07:27.429978+02:00", "EventTime": "2023-10-30T14:07:27.429991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CFGcTO3uDcwTVSWyq8"]} -{"Format": "IDEA0", "ID": "bd584597-de8c-4f2e-93ff-f15c4ad409a7", "DetectTime": "2023-10-30T14:07:27.463359+02:00", "EventTime": "2023-10-30T14:07:27.463375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CrbpzKB9I4Qni2Xtc"]} -{"Format": "IDEA0", "ID": "d26bb970-c7c3-4327-8283-18e76349ef46", "DetectTime": "2023-10-30T14:07:27.498870+02:00", "EventTime": "2023-10-30T14:07:27.498886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C4zuz33nXYbSbzflVd"]} -{"Format": "IDEA0", "ID": "1370056a-5eff-4dcc-8b66-f7743012f940", "DetectTime": "2023-10-30T14:07:27.649482+02:00", "EventTime": "2023-10-30T14:07:27.649513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["C54RTCJw6R0ivf4Ld"]} -{"Format": "IDEA0", "ID": "116ef863-c4c6-4589-83b0-225b2978f27c", "DetectTime": "2023-10-30T14:07:27.683004+02:00", "EventTime": "2023-10-30T14:07:27.683021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CojGaY3fDHJRCkhl18"]} -{"Format": "IDEA0", "ID": "dcc13dbb-920f-4903-9fdb-288a4f29ae06", "DetectTime": "2023-10-30T14:07:27.721155+02:00", "EventTime": "2023-10-30T14:07:27.721170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cuponu1iq0oWTcXWy1"]} -{"Format": "IDEA0", "ID": "69726d85-4657-402d-bb96-0bcee42f0614", "DetectTime": "2023-10-30T14:07:27.757584+02:00", "EventTime": "2023-10-30T14:07:27.757599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.237.226.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.237.226.20 ", "ContentType": "text/plain"}], "uids": ["CxdPd43wTSe9j8D5ee"]} -{"Format": "IDEA0", "ID": "18633f6d-baac-46c1-9b77-5c49106697fa", "DetectTime": "2023-10-30T14:07:27.794600+02:00", "EventTime": "2023-10-30T14:07:27.794622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CoBgy9EsgsW5eEili"]} -{"Format": "IDEA0", "ID": "8cd827cd-9f40-4072-ac76-5f841cc9edae", "DetectTime": "2023-10-30T14:07:27.836856+02:00", "EventTime": "2023-10-30T14:07:27.836872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.141.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.141.12 ", "ContentType": "text/plain"}], "uids": ["CYy00FyM78j45fJtc"]} -{"Format": "IDEA0", "ID": "9bc41473-c890-49f2-9641-a35a99c3941d", "DetectTime": "2023-10-30T14:07:27.874621+02:00", "EventTime": "2023-10-30T14:07:27.874642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.223.117.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.223.117.163 ", "ContentType": "text/plain"}], "uids": ["CUejhJypAABAfhiX5"]} -{"Format": "IDEA0", "ID": "132bffb5-f164-4040-8fb4-451a03eed608", "DetectTime": "2023-10-30T14:07:27.912732+02:00", "EventTime": "2023-10-30T14:07:27.912751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.174.80.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.174.80.114 ", "ContentType": "text/plain"}], "uids": ["Ctw34U1UWoFwFtcNd"]} -{"Format": "IDEA0", "ID": "c0a966df-ca50-4530-9cc4-815209229c9b", "DetectTime": "2023-10-30T14:07:27.949368+02:00", "EventTime": "2023-10-30T14:07:27.949383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.234.151.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.234.151.247 ", "ContentType": "text/plain"}], "uids": ["C7iyHR2PbepAz04IB3"]} -{"Format": "IDEA0", "ID": "07ed2efc-561d-49b9-b76a-9af80704dfb1", "DetectTime": "2023-10-30T14:07:27.986708+02:00", "EventTime": "2023-10-30T14:07:27.986728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CBqcqz3RKb4N1gWsUd"]} -{"Format": "IDEA0", "ID": "07c73997-ecf5-4e6c-841b-be0f760f4633", "DetectTime": "2023-10-30T14:07:28.021094+02:00", "EventTime": "2023-10-30T14:07:28.021110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CqicyNfDJ4fatwT34"]} -{"Format": "IDEA0", "ID": "7196e02f-a009-4eae-bc4d-458077b42705", "DetectTime": "2023-10-30T14:07:28.053037+02:00", "EventTime": "2023-10-30T14:07:28.053055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.189.200.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 221.189.200.166 ", "ContentType": "text/plain"}], "uids": ["CcCUIveYF65HrL7c1"]} -{"Format": "IDEA0", "ID": "492e5ba4-a50c-4164-8349-122503adf847", "DetectTime": "2023-10-30T14:07:28.090443+02:00", "EventTime": "2023-10-30T14:07:28.090461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.241.71.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.241.71.26 ", "ContentType": "text/plain"}], "uids": ["CxDHYD4dHdlBWY2HHj"]} -{"Format": "IDEA0", "ID": "0af020a5-8971-492e-af47-1bcf84707b3c", "DetectTime": "2023-10-30T14:07:28.126128+02:00", "EventTime": "2023-10-30T14:07:28.126146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.245.5.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.245.5.17 ", "ContentType": "text/plain"}], "uids": ["CfOvhW1m0JaOzxZNwc"]} -{"Format": "IDEA0", "ID": "f2379fbc-2a3f-46e8-ade6-8af596e25853", "DetectTime": "2023-10-30T14:07:28.162855+02:00", "EventTime": "2023-10-30T14:07:28.162874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.244.46.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.244.46.205 ", "ContentType": "text/plain"}], "uids": ["C77eul1jc8f9FEUdHa"]} -{"Format": "IDEA0", "ID": "0f19594f-8341-4622-a099-2069bac5b9ea", "DetectTime": "2023-10-30T14:07:28.194541+02:00", "EventTime": "2023-10-30T14:07:28.194568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.116.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.201.116.249 ", "ContentType": "text/plain"}], "uids": ["CuVra24QQxYTtOZRs9"]} -{"Format": "IDEA0", "ID": "d5613e34-78d6-4e56-81b8-0589ce2cbc3d", "DetectTime": "2023-10-30T14:07:28.227318+02:00", "EventTime": "2023-10-30T14:07:28.227342+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 181.65.3.210 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CytELc4g6tTyA4ijBl"]} -{"Format": "IDEA0", "ID": "df7889d0-ab5c-4e4e-bd4f-2d86e705c370", "DetectTime": "2023-10-30T14:07:28.257966+02:00", "EventTime": "2023-10-30T14:07:28.257987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.128.198.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.128.198.24 ", "ContentType": "text/plain"}], "uids": ["C2cD3C3xQmzuKerNKk"]} -{"Format": "IDEA0", "ID": "1f898a74-5b5e-463a-a502-1441bda436c9", "DetectTime": "2023-10-30T14:07:28.292234+02:00", "EventTime": "2023-10-30T14:07:28.292249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.20.182.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.20.182.29 ", "ContentType": "text/plain"}], "uids": ["CxG8n914KGpd4mXcy8"]} -{"Format": "IDEA0", "ID": "69d79372-6c8a-414b-97a2-6df7ff88cf9c", "DetectTime": "2023-10-30T14:07:28.328650+02:00", "EventTime": "2023-10-30T14:07:28.328665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.74.153.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.74.153.34 ", "ContentType": "text/plain"}], "uids": ["CY7VzS1vfNSQObnqS5"]} -{"Format": "IDEA0", "ID": "4204634c-ee77-48f2-a6c4-3c423332c0b0", "DetectTime": "2023-10-30T14:07:28.363587+02:00", "EventTime": "2023-10-30T14:07:28.363607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.7.241.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.7.241.110 ", "ContentType": "text/plain"}], "uids": ["CbL0eb4Rbjuo9JFw1k"]} -{"Format": "IDEA0", "ID": "b2d609ab-3a2c-4022-abfd-b18d2687ede4", "DetectTime": "2023-10-30T14:07:28.399670+02:00", "EventTime": "2023-10-30T14:07:28.399688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.130.51.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.130.51.106 ", "ContentType": "text/plain"}], "uids": ["CLdlY82LuUgyVHDj77"]} -{"Format": "IDEA0", "ID": "597324f3-c611-4aed-b78c-1f2aa00c3c4b", "DetectTime": "2023-10-30T14:07:28.434214+02:00", "EventTime": "2023-10-30T14:07:28.434232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.176.96.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.176.96.110 ", "ContentType": "text/plain"}], "uids": ["CrlVLp6lfP0AFOmg"]} -{"Format": "IDEA0", "ID": "aa7491df-2ccc-49c7-bdda-6866fc8c21c2", "DetectTime": "2023-10-30T14:07:28.472066+02:00", "EventTime": "2023-10-30T14:07:28.472083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.88.11.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.88.11.18 ", "ContentType": "text/plain"}], "uids": ["Cs6Rak2ZjVM3a61xbf"]} -{"Format": "IDEA0", "ID": "50553fa7-45bd-4ea5-be89-7891f61b5312", "DetectTime": "2023-10-30T14:07:28.510511+02:00", "EventTime": "2023-10-30T14:07:28.510525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.217.176.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.217.176.193 ", "ContentType": "text/plain"}], "uids": ["CchCho1UDXsfVC1be6"]} -{"Format": "IDEA0", "ID": "4fc7de15-fa83-4a80-affa-c701c4c29760", "DetectTime": "2023-10-30T14:07:28.543739+02:00", "EventTime": "2023-10-30T14:07:28.543756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.141.85.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.141.85.234 ", "ContentType": "text/plain"}], "uids": ["CV7Pej1dacvATYvdA9"]} -{"Format": "IDEA0", "ID": "0f488fc5-fd48-4b36-9ab3-4767fb0bd1a2", "DetectTime": "2023-10-30T14:07:28.579139+02:00", "EventTime": "2023-10-30T14:07:28.579158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.195.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.195.1 ", "ContentType": "text/plain"}], "uids": ["CMx1wc4vOFPRIEOfp2"]} -{"Format": "IDEA0", "ID": "acce77c6-d811-4fad-bdd1-ab17a288f089", "DetectTime": "2023-10-30T14:07:28.615935+02:00", "EventTime": "2023-10-30T14:07:28.615953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.59.252.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.59.252.18 ", "ContentType": "text/plain"}], "uids": ["C0AouT1wf7JKYCTUAb"]} -{"Format": "IDEA0", "ID": "7b5f8de5-eb0f-4a78-9c24-31327616074b", "DetectTime": "2023-10-30T14:07:28.650606+02:00", "EventTime": "2023-10-30T14:07:28.650623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.219.238.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.219.238.163 ", "ContentType": "text/plain"}], "uids": ["CgVkN83E88WdR7MOE5"]} -{"Format": "IDEA0", "ID": "91d62d81-af6f-4d8a-847c-bb5a49d652ec", "DetectTime": "2023-10-30T14:07:28.682665+02:00", "EventTime": "2023-10-30T14:07:28.682693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.219.169"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.219.169 ", "ContentType": "text/plain"}], "uids": ["CJqARZH3ouPq8PGNk"]} -{"Format": "IDEA0", "ID": "8791c88d-796f-4d04-9ba3-0e9ef5c501b5", "DetectTime": "2023-10-30T14:07:28.717596+02:00", "EventTime": "2023-10-30T14:07:28.717613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CuwZbq4ekP9LyfySa6"]} -{"Format": "IDEA0", "ID": "5724714b-e65a-4119-9d67-aaa0a320b2dd", "DetectTime": "2023-10-30T14:07:28.749913+02:00", "EventTime": "2023-10-30T14:07:28.749932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CRgj2P3Gi4Hu62YEm8"]} -{"Format": "IDEA0", "ID": "f4d68a3d-aa88-4ea8-89fe-08c4527f6583", "DetectTime": "2023-10-30T14:07:28.784643+02:00", "EventTime": "2023-10-30T14:07:28.784661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.246.37.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.246.37.19 ", "ContentType": "text/plain"}], "uids": ["CGm6xw4pQkjAGACRX5"]} -{"Format": "IDEA0", "ID": "1cf2e4b5-df57-4e2b-860c-258426ef5881", "DetectTime": "2023-10-30T14:07:28.820851+02:00", "EventTime": "2023-10-30T14:07:28.820868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.75.245.104 ", "ContentType": "text/plain"}], "uids": ["CnZ4bd1uoyeibjUDMe"]} -{"Format": "IDEA0", "ID": "489eb101-8bc9-45ff-8688-2724e647a176", "DetectTime": "2023-10-30T14:07:28.855377+02:00", "EventTime": "2023-10-30T14:07:28.855405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.186.201.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.186.201.138 ", "ContentType": "text/plain"}], "uids": ["CxbU5G4ejrmoieHde1"]} -{"Format": "IDEA0", "ID": "f1912f52-2e55-4ef7-9c54-6865683836bd", "DetectTime": "2023-10-30T14:07:28.890474+02:00", "EventTime": "2023-10-30T14:07:28.890491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.231.149.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.231.149.46 ", "ContentType": "text/plain"}], "uids": ["CA4GO31ztOqrbGMTDh"]} -{"Format": "IDEA0", "ID": "6d5c37df-ccb9-49a1-8576-a12f37fc1864", "DetectTime": "2023-10-30T14:07:28.924259+02:00", "EventTime": "2023-10-30T14:07:28.924270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C1qqSX3jRByGe31jB9"]} -{"Format": "IDEA0", "ID": "0a47b1eb-b410-4601-9edc-8662cc39d763", "DetectTime": "2023-10-30T14:07:28.953666+02:00", "EventTime": "2023-10-30T14:07:28.953678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["C32RaF4SyQ6dThQ9O"]} -{"Format": "IDEA0", "ID": "e759179b-2ba1-4734-b2a5-488620d48890", "DetectTime": "2023-10-30T14:07:28.986075+02:00", "EventTime": "2023-10-30T14:07:28.986090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.146.168.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.146.168.101 ", "ContentType": "text/plain"}], "uids": ["CXkbMP3LFnZbwuA6k4"]} -{"Format": "IDEA0", "ID": "b8fc51d1-db0e-4ae3-bbab-e780c13d52af", "DetectTime": "2023-10-30T14:07:29.021561+02:00", "EventTime": "2023-10-30T14:07:29.021578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["CsC3SQ18Q63UtPImdc"]} -{"Format": "IDEA0", "ID": "69572c8a-19b8-4849-8f46-ce8dc89f51df", "DetectTime": "2023-10-30T14:07:29.072928+02:00", "EventTime": "2023-10-30T14:07:29.072945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.227.139.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.227.139.14 ", "ContentType": "text/plain"}], "uids": ["ClrVLv2soFVBRbW5f2"]} -{"Format": "IDEA0", "ID": "d62f4e82-2cdb-4b82-bf51-9bda05ed6071", "DetectTime": "2023-10-30T14:07:29.115553+02:00", "EventTime": "2023-10-30T14:07:29.115580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["C0ldW72BnRdKDkHaBd"]} -{"Format": "IDEA0", "ID": "84cb0c1c-41c0-433b-a65f-ebe7db7ef0f4", "DetectTime": "2023-10-30T14:07:29.162449+02:00", "EventTime": "2023-10-30T14:07:29.162468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.133.189.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.133.189.129 ", "ContentType": "text/plain"}], "uids": ["Cic0JWTv9ChH7rVI5"]} -{"Format": "IDEA0", "ID": "55212b1f-ab41-4cb1-a8a0-b81b34c62f07", "DetectTime": "2023-10-30T14:07:29.202514+02:00", "EventTime": "2023-10-30T14:07:29.202570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.111.56.170"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.111.56.170 ", "ContentType": "text/plain"}], "uids": ["CDpSJK6eZohzmUkh3"]} -{"Format": "IDEA0", "ID": "986c474a-7c00-46aa-8c7d-2a5a7c799c11", "DetectTime": "2023-10-30T14:07:29.242487+02:00", "EventTime": "2023-10-30T14:07:29.242499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CRJdhi3JQbjmIb5Yu1"]} -{"Format": "IDEA0", "ID": "d65655d6-57aa-4ff6-ab87-48a2203e0f51", "DetectTime": "2023-10-30T14:07:29.292756+02:00", "EventTime": "2023-10-30T14:07:29.292793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.217.224.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.217.224.134 ", "ContentType": "text/plain"}], "uids": ["CmOg4L3lZYwxTF1Np"]} -{"Format": "IDEA0", "ID": "2cabc9f7-09b9-420d-98cb-7aa1f4609f4b", "DetectTime": "2023-10-30T14:07:29.342706+02:00", "EventTime": "2023-10-30T14:07:29.342725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.254.24 ", "ContentType": "text/plain"}], "uids": ["CwVEFL1tI6XenOwWN4"]} -{"Format": "IDEA0", "ID": "53da696e-ada4-4d42-be93-3744529f5ed9", "DetectTime": "2023-10-30T14:07:29.395067+02:00", "EventTime": "2023-10-30T14:07:29.395094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.24.211.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.24.211.146 ", "ContentType": "text/plain"}], "uids": ["CHClkc4noda0WnWNx6"]} -{"Format": "IDEA0", "ID": "da9694b6-2743-497e-bf0f-27fa368bc92c", "DetectTime": "2023-10-30T14:07:29.427549+02:00", "EventTime": "2023-10-30T14:07:29.427575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.153.236.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.153.236.79 ", "ContentType": "text/plain"}], "uids": ["CRoLkh40YzZwjuoRtj"]} -{"Format": "IDEA0", "ID": "cc1517fb-9beb-4418-8331-4697f00789a0", "DetectTime": "2023-10-30T14:07:29.467703+02:00", "EventTime": "2023-10-30T14:07:29.467725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.45.241.223"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.45.241.223 ", "ContentType": "text/plain"}], "uids": ["Cm9l5G1qYPbg6iwRe7"]} -{"Format": "IDEA0", "ID": "6ba36b9a-b64b-4afe-85ad-9c13a15f91da", "DetectTime": "2023-10-30T14:07:29.504819+02:00", "EventTime": "2023-10-30T14:07:29.504839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.71.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.248.71.232 ", "ContentType": "text/plain"}], "uids": ["CtGW184fhNtqFTjAA5"]} -{"Format": "IDEA0", "ID": "65c98adb-76ac-482c-a7b2-273a16917309", "DetectTime": "2023-10-30T14:07:29.538763+02:00", "EventTime": "2023-10-30T14:07:29.538794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CkRUtwpDiGSsfdMNf"]} -{"Format": "IDEA0", "ID": "40625ce6-2a7a-4d37-8136-b686cc265817", "DetectTime": "2023-10-30T14:07:29.577806+02:00", "EventTime": "2023-10-30T14:07:29.577823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.219.71.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.219.71.161 ", "ContentType": "text/plain"}], "uids": ["Cu4wj6xkhOFQ2vqVa"]} -{"Format": "IDEA0", "ID": "54c6312f-90fb-4328-b251-85d364a2fd17", "DetectTime": "2023-10-30T14:07:29.618138+02:00", "EventTime": "2023-10-30T14:07:29.618164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.207.149.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.207.149.93 ", "ContentType": "text/plain"}], "uids": ["COghOI1MpgZ4sNgh16"]} -{"Format": "IDEA0", "ID": "e3ec86e6-a3be-4bb6-a094-80117b01294d", "DetectTime": "2023-10-30T14:07:29.655320+02:00", "EventTime": "2023-10-30T14:07:29.655338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["4.28.39.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 4.28.39.222 ", "ContentType": "text/plain"}], "uids": ["CkTnxl4v77wZ4Btpo6"]} -{"Format": "IDEA0", "ID": "e5968871-3753-4812-b11c-ce95b8aee342", "DetectTime": "2023-10-30T14:07:29.697165+02:00", "EventTime": "2023-10-30T14:07:29.697191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.171.87.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.171.87.44 ", "ContentType": "text/plain"}], "uids": ["CLf2SnTWZIfUc4OV6"]} -{"Format": "IDEA0", "ID": "548e29a0-ff8d-4199-adde-da344f042c9e", "DetectTime": "2023-10-30T14:07:29.732237+02:00", "EventTime": "2023-10-30T14:07:29.732253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CTG9M016LrcGR91hDj"]} -{"Format": "IDEA0", "ID": "4b5bece5-9679-4a2e-a11e-56b70316219a", "DetectTime": "2023-10-30T14:07:29.769903+02:00", "EventTime": "2023-10-30T14:07:29.769931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.70.178"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.70.178 ", "ContentType": "text/plain"}], "uids": ["CQNTIkcNIUypwziRk"]} -{"Format": "IDEA0", "ID": "a517bb91-2e8a-4a7d-926d-3b3ae42cd8bb", "DetectTime": "2023-10-30T14:07:29.806693+02:00", "EventTime": "2023-10-30T14:07:29.806710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CrqndK29G6Q8CTHd06"]} -{"Format": "IDEA0", "ID": "9981d5b1-a1d1-42a3-94fa-4dfc32b23ee5", "DetectTime": "2023-10-30T14:07:29.961748+02:00", "EventTime": "2023-10-30T14:07:29.961769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.12.140.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.12.140.18 ", "ContentType": "text/plain"}], "uids": ["C51iCu1gZ183POZk7h"]} -{"Format": "IDEA0", "ID": "8be11ed3-05be-45e2-b6ee-d0ec8f52ccee", "DetectTime": "2023-10-30T14:07:30.010330+02:00", "EventTime": "2023-10-30T14:07:30.010343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.15.24.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 116.15.24.101 ", "ContentType": "text/plain"}], "uids": ["CUCVej39AaBygNDwqk"]} -{"Format": "IDEA0", "ID": "816fca06-b961-4adf-b6fc-a0de60d1dab6", "DetectTime": "2023-10-30T14:07:30.054489+02:00", "EventTime": "2023-10-30T14:07:30.054510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.249.120.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.249.120.151 ", "ContentType": "text/plain"}], "uids": ["CEPAyRMAC2QeWRfpb"]} -{"Format": "IDEA0", "ID": "7072b5e2-e1b2-48f3-9b2a-59cc7f63c72e", "DetectTime": "2023-10-30T14:07:30.103875+02:00", "EventTime": "2023-10-30T14:07:30.103935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.199.133.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.199.133.213 ", "ContentType": "text/plain"}], "uids": ["C6oO7Y1kUdkve1uEEk"]} -{"Format": "IDEA0", "ID": "619b2d26-7c03-4e19-ad64-8998eb57f6e5", "DetectTime": "2023-10-30T14:07:30.148066+02:00", "EventTime": "2023-10-30T14:07:30.148089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.28.94.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.28.94.198 ", "ContentType": "text/plain"}], "uids": ["CtfCgl2e128NnCkB3h"]} -{"Format": "IDEA0", "ID": "037f44aa-1231-4076-bb9f-4304e04f1086", "DetectTime": "2023-10-30T14:07:30.190234+02:00", "EventTime": "2023-10-30T14:07:30.190260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.56.10.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.56.10.160 ", "ContentType": "text/plain"}], "uids": ["CrjtNsle8eLcqpi8"]} -{"Format": "IDEA0", "ID": "83a4a6b3-4d3b-4d65-b3db-ef9b77f1437c", "DetectTime": "2023-10-30T14:07:30.238093+02:00", "EventTime": "2023-10-30T14:07:30.238117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.109.94.100"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.109.94.100 ", "ContentType": "text/plain"}], "uids": ["CZ28QM39HiFC3gId7j"]} -{"Format": "IDEA0", "ID": "3bfdeeb2-657f-4d23-80c9-30d9ffaaa58a", "DetectTime": "2023-10-30T14:07:30.290337+02:00", "EventTime": "2023-10-30T14:07:30.290366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.178.57.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.178.57.91 ", "ContentType": "text/plain"}], "uids": ["CXaex51XyHudXcVTr8"]} -{"Format": "IDEA0", "ID": "886cb931-4b1c-42c3-b42a-32df14ee12f3", "DetectTime": "2023-10-30T14:07:30.339308+02:00", "EventTime": "2023-10-30T14:07:30.339327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.254.20.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.254.20.213 ", "ContentType": "text/plain"}], "uids": ["Csdt8G0D4dSYZmWkg"]} -{"Format": "IDEA0", "ID": "71c08ffb-d50a-4980-a9bd-b8b3fa391a6b", "DetectTime": "2023-10-30T14:07:30.392127+02:00", "EventTime": "2023-10-30T14:07:30.392144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.208.48.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.208.48.140 ", "ContentType": "text/plain"}], "uids": ["CdNYKj2yVQosKc6528"]} -{"Format": "IDEA0", "ID": "ddccf6e8-ace0-4afb-81e2-ad0fc8663413", "DetectTime": "2023-10-30T14:07:30.442868+02:00", "EventTime": "2023-10-30T14:07:30.442881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.221.159.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.221.159.35 ", "ContentType": "text/plain"}], "uids": ["CgEGCE2pVQo5rFIW38"]} -{"Format": "IDEA0", "ID": "9ab13119-d159-49e9-9ff5-d7da1ec819a9", "DetectTime": "2023-10-30T14:07:30.484369+02:00", "EventTime": "2023-10-30T14:07:30.484386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.77.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.77.27 ", "ContentType": "text/plain"}], "uids": ["CfUcSA25lP0lkjMZC1"]} -{"Format": "IDEA0", "ID": "13238228-74ad-4d8e-8104-d81d53a79951", "DetectTime": "2023-10-30T14:07:30.536245+02:00", "EventTime": "2023-10-30T14:07:30.536262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.129.134.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.129.134.157 ", "ContentType": "text/plain"}], "uids": ["CHDVe8L9uXkMtmwuj"]} -{"Format": "IDEA0", "ID": "978bee8c-ef4d-4798-ab45-96416b7898c5", "DetectTime": "2023-10-30T14:07:30.580222+02:00", "EventTime": "2023-10-30T14:07:30.580251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.165.170.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.165.170.202 ", "ContentType": "text/plain"}], "uids": ["CfyGXDOouP2a8luwf"]} -{"Format": "IDEA0", "ID": "765cbcef-e8d8-41eb-8597-55f12ccf6172", "DetectTime": "2023-10-30T14:07:30.639552+02:00", "EventTime": "2023-10-30T14:07:30.639568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CWmnku40g2MY45wJP7"]} -{"Format": "IDEA0", "ID": "29dae2de-21c8-46a5-9b5d-97c4215a6bdf", "DetectTime": "2023-10-30T14:07:30.710741+02:00", "EventTime": "2023-10-30T14:07:30.710769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.75.123.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.75.123.26 ", "ContentType": "text/plain"}], "uids": ["ClsOM82kW0rPz8J5T9"]} -{"Format": "IDEA0", "ID": "fb839f75-4fea-4b9d-916f-6615abcb93ee", "DetectTime": "2023-10-30T14:07:30.796639+02:00", "EventTime": "2023-10-30T14:07:30.796659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.92.72.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.92.72.189 ", "ContentType": "text/plain"}], "uids": ["C9fYXe1LVhjNFMDJMd"]} -{"Format": "IDEA0", "ID": "129ca945-e64b-4185-9a96-edc0608f6776", "DetectTime": "2023-10-30T14:07:30.849271+02:00", "EventTime": "2023-10-30T14:07:30.849290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.1.58.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.1.58.147 ", "ContentType": "text/plain"}], "uids": ["CpAPt43gCs7ihlWgl3"]} -{"Format": "IDEA0", "ID": "96380064-1c53-4e2a-b6bf-13144923347f", "DetectTime": "2023-10-30T14:07:30.896113+02:00", "EventTime": "2023-10-30T14:07:30.896129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.104.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.236.104.33 ", "ContentType": "text/plain"}], "uids": ["CNl53P2RIty4E7eKbg"]} -{"Format": "IDEA0", "ID": "12fc0bae-edec-4f4d-83d1-2d3a7a78fd45", "DetectTime": "2023-10-30T14:07:30.939383+02:00", "EventTime": "2023-10-30T14:07:30.939399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.204.29.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.204.29.198 ", "ContentType": "text/plain"}], "uids": ["C7Tc2p1mj2ACniedjd"]} -{"Format": "IDEA0", "ID": "9126cd20-217f-4241-af99-93ccb6094acd", "DetectTime": "2023-10-30T14:07:30.990290+02:00", "EventTime": "2023-10-30T14:07:30.990316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.54.108.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.54.108.18 ", "ContentType": "text/plain"}], "uids": ["CTe7B1ReZpPK1QB5e"]} -{"Format": "IDEA0", "ID": "d5fbb1cf-d794-4f32-9b44-7a101fb165fe", "DetectTime": "2023-10-30T14:07:31.036079+02:00", "EventTime": "2023-10-30T14:07:31.036097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["194.236.15.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 194.236.15.146 ", "ContentType": "text/plain"}], "uids": ["CQKtyq2O8BwhRt480b"]} -{"Format": "IDEA0", "ID": "15860ad3-2e40-45ce-a753-910e83d94944", "DetectTime": "2023-10-30T14:07:31.083048+02:00", "EventTime": "2023-10-30T14:07:31.083067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.177.185.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.177.185.85 ", "ContentType": "text/plain"}], "uids": ["CBShmS3peHdfHEQx6e"]} -{"Format": "IDEA0", "ID": "5991ae6e-6b2f-468c-916e-bbd7897d44e3", "DetectTime": "2023-10-30T14:07:31.125426+02:00", "EventTime": "2023-10-30T14:07:31.125493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C1CtOP20bO2LckKcCi"]} -{"Format": "IDEA0", "ID": "7f3112da-78f7-45a3-8605-cb01681ea8c4", "DetectTime": "2023-10-30T14:07:31.171871+02:00", "EventTime": "2023-10-30T14:07:31.171892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.91.101.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.91.101.29 ", "ContentType": "text/plain"}], "uids": ["CCsUgNUcSeSD2RX8g"]} -{"Format": "IDEA0", "ID": "d058b7f9-574a-4d1d-bf2d-52acf09041f0", "DetectTime": "2023-10-30T14:07:31.209396+02:00", "EventTime": "2023-10-30T14:07:31.209425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C64W9QdspAzNd9Yl"]} -{"Format": "IDEA0", "ID": "9fe2f934-35a2-4be6-8a28-25f541aa43da", "DetectTime": "2023-10-30T14:07:31.251767+02:00", "EventTime": "2023-10-30T14:07:31.251788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.161.119.149"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.161.119.149 ", "ContentType": "text/plain"}], "uids": ["C9Lp6t2NVa6PckXnZg"]} -{"Format": "IDEA0", "ID": "2827d030-0939-4324-9284-72148f06b1eb", "DetectTime": "2023-10-30T14:07:31.293748+02:00", "EventTime": "2023-10-30T14:07:31.293760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.112.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.112.141 ", "ContentType": "text/plain"}], "uids": ["C8Ojkv3WyECgJUi6S3"]} -{"Format": "IDEA0", "ID": "c7ad9784-7a18-42d4-be84-733f3d6b6db0", "DetectTime": "2023-10-30T14:07:31.338700+02:00", "EventTime": "2023-10-30T14:07:31.338716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.251.79.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.251.79.138 ", "ContentType": "text/plain"}], "uids": ["CyLBtd4U8quPic7Szb"]} -{"Format": "IDEA0", "ID": "b565498a-f925-4b22-a25e-73a4661a2fc8", "DetectTime": "2023-10-30T14:07:31.384225+02:00", "EventTime": "2023-10-30T14:07:31.384238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.166.33.7"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.166.33.7 ", "ContentType": "text/plain"}], "uids": ["CcY8DI29uioUqMpMCb"]} -{"Format": "IDEA0", "ID": "ee52c580-a52a-4631-b505-3b4ac5bdc02b", "DetectTime": "2023-10-30T14:07:31.428984+02:00", "EventTime": "2023-10-30T14:07:31.429000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C7ya3x2e1sx3UaCo5e"]} -{"Format": "IDEA0", "ID": "d952b389-400d-4376-9e23-d0c61eb9e507", "DetectTime": "2023-10-30T14:07:31.461731+02:00", "EventTime": "2023-10-30T14:07:31.461750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["206.53.94.14"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 206.53.94.14 ", "ContentType": "text/plain"}], "uids": ["C5OovTKpYGgGAgWI"]} -{"Format": "IDEA0", "ID": "badd67f5-f4bd-48f6-8645-ee4e9c2eaf21", "DetectTime": "2023-10-30T14:07:31.501483+02:00", "EventTime": "2023-10-30T14:07:31.501510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.103.36.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.103.36.68 ", "ContentType": "text/plain"}], "uids": ["CmUrtU2p8SPC9PZoE7"]} -{"Format": "IDEA0", "ID": "521207c1-093d-4420-815f-b3f87d69f3b0", "DetectTime": "2023-10-30T14:07:31.538607+02:00", "EventTime": "2023-10-30T14:07:31.538625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.113.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.113.11 ", "ContentType": "text/plain"}], "uids": ["Cwwb4f2xDblHKIf9U1"]} -{"Format": "IDEA0", "ID": "74f51136-1a42-415b-aa28-4f83fefffe95", "DetectTime": "2023-10-30T14:07:31.574532+02:00", "EventTime": "2023-10-30T14:07:31.574552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["C1IRWm3WItZvUyEuL6"]} -{"Format": "IDEA0", "ID": "9394e4bf-80f1-4345-9a4e-3c9ff9074d0f", "DetectTime": "2023-10-30T14:07:31.616922+02:00", "EventTime": "2023-10-30T14:07:31.616934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.32.165.211"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.32.165.211 ", "ContentType": "text/plain"}], "uids": ["CuMN0x1NIxTOO5XDMd"]} -{"Format": "IDEA0", "ID": "b5ca7ac6-588e-4bbb-9229-43e531c76f24", "DetectTime": "2023-10-30T14:07:31.662909+02:00", "EventTime": "2023-10-30T14:07:31.662928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.186.210.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.186.210.63 ", "ContentType": "text/plain"}], "uids": ["C5p0pj1dm0AiR2lJU7"]} -{"Format": "IDEA0", "ID": "b80e7bb8-372b-4570-8065-ff813e1de8fa", "DetectTime": "2023-10-30T14:07:31.702299+02:00", "EventTime": "2023-10-30T14:07:31.702326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.105.109.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.105.109.234 ", "ContentType": "text/plain"}], "uids": ["Cxwsf32OKyhNMyENc"]} -{"Format": "IDEA0", "ID": "e665375b-ab44-4a43-a081-7a075e90f519", "DetectTime": "2023-10-30T14:07:31.738940+02:00", "EventTime": "2023-10-30T14:07:31.738955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.235.118.178"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.235.118.178 ", "ContentType": "text/plain"}], "uids": ["CcCUN12mu0UlHphKE6"]} -{"Format": "IDEA0", "ID": "6f7d6405-118e-48f9-91ae-4f56b67b06a6", "DetectTime": "2023-10-30T14:07:31.773580+02:00", "EventTime": "2023-10-30T14:07:31.773608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.24.30.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.24.30.40 ", "ContentType": "text/plain"}], "uids": ["CbKanH1SjpNryAlMk7"]} -{"Format": "IDEA0", "ID": "5a1deea1-9550-4a47-bd2d-2baa93ca1357", "DetectTime": "2023-10-30T14:07:31.813352+02:00", "EventTime": "2023-10-30T14:07:31.813371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CEzLVE2nJqpILYNNx8"]} -{"Format": "IDEA0", "ID": "f0b011f8-6b7d-444b-94ba-f007f9dda0cc", "DetectTime": "2023-10-30T14:07:31.847971+02:00", "EventTime": "2023-10-30T14:07:31.847996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CHWGkC3nM9nYM5RsC6"]} -{"Format": "IDEA0", "ID": "708d8c93-8ce2-41a1-aa1e-1d9e8ffb633c", "DetectTime": "2023-10-30T14:07:31.884016+02:00", "EventTime": "2023-10-30T14:07:31.884034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.43.232.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.43.232.11 ", "ContentType": "text/plain"}], "uids": ["C9HLaXICEHa8Lyuk2"]} -{"Format": "IDEA0", "ID": "6970c7f3-7d5f-41c7-a479-41c8e5086f20", "DetectTime": "2023-10-30T14:07:31.920257+02:00", "EventTime": "2023-10-30T14:07:31.920289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.92.120.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.92.120.168 ", "ContentType": "text/plain"}], "uids": ["Ca4Cmi4XBmPqhHaHY4"]} -{"Format": "IDEA0", "ID": "7f5ba5f0-863c-4526-8508-33abdad12ea6", "DetectTime": "2023-10-30T14:07:31.955488+02:00", "EventTime": "2023-10-30T14:07:31.955505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.218.26.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.218.26.31 ", "ContentType": "text/plain"}], "uids": ["CbwLS9ORxo7vdhyna"]} -{"Format": "IDEA0", "ID": "4bf86c93-dd56-404c-88fd-aae7e4741579", "DetectTime": "2023-10-30T14:07:31.989850+02:00", "EventTime": "2023-10-30T14:07:31.989878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.37.115.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.37.115.46 ", "ContentType": "text/plain"}], "uids": ["CLwXew1kAnNfr0dDI5"]} -{"Format": "IDEA0", "ID": "6c3523c3-2887-4715-92eb-2dc228cfb9a4", "DetectTime": "2023-10-30T14:07:32.025601+02:00", "EventTime": "2023-10-30T14:07:32.025616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.133.177.109"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.133.177.109 ", "ContentType": "text/plain"}], "uids": ["CBOlGs1RdVGHc305Yh"]} -{"Format": "IDEA0", "ID": "2b033614-cd25-4aca-b89d-66da3aebb0aa", "DetectTime": "2023-10-30T14:07:32.059609+02:00", "EventTime": "2023-10-30T14:07:32.059626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.17.25.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.17.25.1 ", "ContentType": "text/plain"}], "uids": ["CBDEceAloymG7opI5"]} -{"Format": "IDEA0", "ID": "5479eff4-8c50-41d1-8113-54c9a1bcfa33", "DetectTime": "2023-10-30T14:07:32.092053+02:00", "EventTime": "2023-10-30T14:07:32.092064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.39.73.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.39.73.164 ", "ContentType": "text/plain"}], "uids": ["CW33WP2hAjc0iLQrI8"]} -{"Format": "IDEA0", "ID": "95925493-d24b-4811-a8ab-289f3dc2ae22", "DetectTime": "2023-10-30T14:07:32.129606+02:00", "EventTime": "2023-10-30T14:07:32.129627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CuHevN1VxINCLCpQd4"]} -{"Format": "IDEA0", "ID": "333528d1-c2f8-4c6a-aef9-98f6e7f7d29c", "DetectTime": "2023-10-30T14:07:32.166196+02:00", "EventTime": "2023-10-30T14:07:32.166212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.64.28.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 115.64.28.251 ", "ContentType": "text/plain"}], "uids": ["CoiR7M3wqEdpF1w6w4"]} -{"Format": "IDEA0", "ID": "5303ef93-3264-4c51-861e-53c0bf14c9f7", "DetectTime": "2023-10-30T14:07:32.199417+02:00", "EventTime": "2023-10-30T14:07:32.199442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["C9VAu44m9sSGFj64Nd"]} -{"Format": "IDEA0", "ID": "3b407b22-cffa-46be-aa2a-e4ce90a1a3d0", "DetectTime": "2023-10-30T14:07:32.232657+02:00", "EventTime": "2023-10-30T14:07:32.232676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.16.165.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.16.165.50 ", "ContentType": "text/plain"}], "uids": ["C1ceV712ufh2UH3gJ9"]} -{"Format": "IDEA0", "ID": "406d2e91-45cc-4e1b-9ba0-51469e47cbc1", "DetectTime": "2023-10-30T14:07:32.262518+02:00", "EventTime": "2023-10-30T14:07:32.262532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.206.193.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.206.193.194 ", "ContentType": "text/plain"}], "uids": ["C24Yd32AI3KETLlFPl"]} -{"Format": "IDEA0", "ID": "f229a2be-0b11-43ba-82e4-2d28d410c044", "DetectTime": "2023-10-30T14:07:32.295375+02:00", "EventTime": "2023-10-30T14:07:32.295388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.149.88.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.149.88.131 ", "ContentType": "text/plain"}], "uids": ["CtCqxq4j9m3SQNGgke"]} -{"Format": "IDEA0", "ID": "7493bab3-85ef-474c-b32e-9cf716cf4b89", "DetectTime": "2023-10-30T14:07:32.325797+02:00", "EventTime": "2023-10-30T14:07:32.325817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CN4OQy2bMgK7fs7jt3"]} -{"Format": "IDEA0", "ID": "81276533-50ce-47e4-83eb-8841eab371f4", "DetectTime": "2023-10-30T14:07:32.357523+02:00", "EventTime": "2023-10-30T14:07:32.357543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.179.193.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.179.193.243 ", "ContentType": "text/plain"}], "uids": ["CpYcmz5AEV52Rvb42"]} -{"Format": "IDEA0", "ID": "8e570e79-043b-4f85-b590-2bcaa4bcafc0", "DetectTime": "2023-10-30T14:07:32.386757+02:00", "EventTime": "2023-10-30T14:07:32.386769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["CEj2W53pq5QQQgtbel"]} -{"Format": "IDEA0", "ID": "08175f96-d266-4daa-95ce-270fb78c941c", "DetectTime": "2023-10-30T14:07:32.413271+02:00", "EventTime": "2023-10-30T14:07:32.413283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.11.63.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.11.63.141 ", "ContentType": "text/plain"}], "uids": ["CZkPPJ3v95nBDOKGe3"]} -{"Format": "IDEA0", "ID": "dc81967c-e61d-41bb-a513-f52e75ab63ad", "DetectTime": "2023-10-30T14:07:32.441535+02:00", "EventTime": "2023-10-30T14:07:32.441550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.244.153.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.244.153.2 ", "ContentType": "text/plain"}], "uids": ["CZmhh63HTEwsK1hnO4"]} -{"Format": "IDEA0", "ID": "404bca6e-e833-430f-be84-79934a72d4eb", "DetectTime": "2023-10-30T14:07:32.471983+02:00", "EventTime": "2023-10-30T14:07:32.471993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CnMv092QdDjDIjNKpa"]} -{"Format": "IDEA0", "ID": "1f5a99f7-9dcb-4571-bc6d-e4c197f3fe4d", "DetectTime": "2023-10-30T14:07:32.504833+02:00", "EventTime": "2023-10-30T14:07:32.504851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CwIREF41a2YqeVHmo5"]} -{"Format": "IDEA0", "ID": "5bf9be6c-251f-424a-87ff-ca0bddd553ee", "DetectTime": "2023-10-30T14:07:32.533896+02:00", "EventTime": "2023-10-30T14:07:32.533966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.115.194.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.115.194.21 ", "ContentType": "text/plain"}], "uids": ["C2o6ng3z6923uKJmMg"]} -{"Format": "IDEA0", "ID": "35a3437d-17de-4dee-aec9-07cb4259a125", "DetectTime": "2023-10-30T14:07:32.564094+02:00", "EventTime": "2023-10-30T14:07:32.564109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CTnkUj2YJFGemKyHf2"]} -{"Format": "IDEA0", "ID": "cd9f8904-93a4-4ff5-904c-746bbec58018", "DetectTime": "2023-10-30T14:07:32.593947+02:00", "EventTime": "2023-10-30T14:07:32.593963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.162.1.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.162.1.2 ", "ContentType": "text/plain"}], "uids": ["CA2AMN30pmxAIP5eV7"]} -{"Format": "IDEA0", "ID": "84a7955b-0d3a-43d4-b43e-3a46c4ac79d1", "DetectTime": "2023-10-30T14:07:32.623060+02:00", "EventTime": "2023-10-30T14:07:32.623075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["120.151.139.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 120.151.139.117 ", "ContentType": "text/plain"}], "uids": ["Cn4Ep12CAe1ulkxy4g"]} -{"Format": "IDEA0", "ID": "3cca61d5-6c83-47aa-ba76-2570267e2f3e", "DetectTime": "2023-10-30T14:07:32.653906+02:00", "EventTime": "2023-10-30T14:07:32.653925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C06Egb1MT7t01YuVTi"]} -{"Format": "IDEA0", "ID": "bf8485bf-45f8-4c66-a5b4-e88836163d9b", "DetectTime": "2023-10-30T14:07:32.685790+02:00", "EventTime": "2023-10-30T14:07:32.685809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.116.40.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.116.40.1 ", "ContentType": "text/plain"}], "uids": ["CP9p332Gc8omcGG5o9"]} -{"Format": "IDEA0", "ID": "41d95ea9-b736-4a40-8b89-d915a3f51aa3", "DetectTime": "2023-10-30T14:07:32.714698+02:00", "EventTime": "2023-10-30T14:07:32.714710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C9XvYn3okGD3KjEeLi"]} -{"Format": "IDEA0", "ID": "f9663313-6d70-4cf4-99b6-097a3137a592", "DetectTime": "2023-10-30T14:07:32.747488+02:00", "EventTime": "2023-10-30T14:07:32.747500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CEOE0Y1IMKQh2M4k7g"]} -{"Format": "IDEA0", "ID": "5918d31f-5250-4dc5-8b90-8a5c5a4e5046", "DetectTime": "2023-10-30T14:07:32.777164+02:00", "EventTime": "2023-10-30T14:07:32.777177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.28.170.103"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.28.170.103 ", "ContentType": "text/plain"}], "uids": ["C9Gr4T3NuNfP1jaKbd"]} -{"Format": "IDEA0", "ID": "8e3d25eb-b9e4-445d-aa3f-3c72880bafc2", "DetectTime": "2023-10-30T14:07:32.806089+02:00", "EventTime": "2023-10-30T14:07:32.806108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.5.22.15"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.5.22.15 ", "ContentType": "text/plain"}], "uids": ["CrXmQLYVIbDqWx0rj"]} -{"Format": "IDEA0", "ID": "c91579fe-dda2-4ba9-a069-57323c7c7365", "DetectTime": "2023-10-30T14:07:32.838931+02:00", "EventTime": "2023-10-30T14:07:32.838949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.82.106.153"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.82.106.153 ", "ContentType": "text/plain"}], "uids": ["CZg4lE3tMiIC3aI86l"]} -{"Format": "IDEA0", "ID": "e92af038-0946-4678-a1a5-49241d8453fe", "DetectTime": "2023-10-30T14:07:32.866385+02:00", "EventTime": "2023-10-30T14:07:32.866405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["C9ObIYxpQ0aqOEx2b"]} -{"Format": "IDEA0", "ID": "2eea842f-45bb-42e7-abbf-fbc6b4e15dd7", "DetectTime": "2023-10-30T14:07:32.896546+02:00", "EventTime": "2023-10-30T14:07:32.896574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.100.61.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.100.61.139 ", "ContentType": "text/plain"}], "uids": ["C0Zsay4CLF4rX1zfu2"]} -{"Format": "IDEA0", "ID": "9f6dc875-1887-469a-9b15-2382d59cb4e1", "DetectTime": "2023-10-30T14:07:32.925515+02:00", "EventTime": "2023-10-30T14:07:32.925535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Cn1WXKJr970xqEJu9"]} -{"Format": "IDEA0", "ID": "84f3ae96-3906-42bd-8d27-f664ce40ee6a", "DetectTime": "2023-10-30T14:07:32.955499+02:00", "EventTime": "2023-10-30T14:07:32.955512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C2IAh52fczBeDNGZV4"]} -{"Format": "IDEA0", "ID": "8bda9698-afca-4057-8559-f50963b5b2b8", "DetectTime": "2023-10-30T14:07:32.986704+02:00", "EventTime": "2023-10-30T14:07:32.986721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.110.134.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.110.134.47 ", "ContentType": "text/plain"}], "uids": ["CFJ3VLurcCddWGdAk"]} -{"Format": "IDEA0", "ID": "b8e4774e-e745-4163-ae1d-ad0b906c2ea0", "DetectTime": "2023-10-30T14:07:33.019367+02:00", "EventTime": "2023-10-30T14:07:33.019393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.88.44.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.88.44.12 ", "ContentType": "text/plain"}], "uids": ["CnpcwQ3rzzmQBDDZ72"]} -{"Format": "IDEA0", "ID": "771dc9f1-9963-4fdc-b29f-335431cb3f33", "DetectTime": "2023-10-30T14:07:33.054511+02:00", "EventTime": "2023-10-30T14:07:33.054528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CLszE9zMoEKAA5UO8"]} -{"Format": "IDEA0", "ID": "804e0431-e8b6-442e-a6ae-53141bceb12a", "DetectTime": "2023-10-30T14:07:33.087903+02:00", "EventTime": "2023-10-30T14:07:33.087914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CI9VeN3NhGR9ZYUIk7"]} -{"Format": "IDEA0", "ID": "831ff826-2f2b-4cc3-9d63-c8b417254e99", "DetectTime": "2023-10-30T14:07:33.121937+02:00", "EventTime": "2023-10-30T14:07:33.121955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CvAcqUwZrqmLd33L4"]} -{"Format": "IDEA0", "ID": "eb8c801d-adf9-485f-a31c-e37d7877e3b7", "DetectTime": "2023-10-30T14:07:33.155197+02:00", "EventTime": "2023-10-30T14:07:33.155207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CoQlEd179IUDXSuIT2"]} -{"Format": "IDEA0", "ID": "c332228a-dd55-4518-ac92-75b25e36fea8", "DetectTime": "2023-10-30T14:07:33.187380+02:00", "EventTime": "2023-10-30T14:07:33.187398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3vNDPmPSno5cMEZb"]} -{"Format": "IDEA0", "ID": "9f8f8685-6f98-4a63-b3c6-4733482272c0", "DetectTime": "2023-10-30T14:07:33.219002+02:00", "EventTime": "2023-10-30T14:07:33.219027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CXUcXF1E4OibsIldwe"]} -{"Format": "IDEA0", "ID": "93c240e7-e986-4bed-b9d6-8901ec836356", "DetectTime": "2023-10-30T14:07:33.252307+02:00", "EventTime": "2023-10-30T14:07:33.252332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CWYP5u3i5iuZxzw8mc"]} -{"Format": "IDEA0", "ID": "c7da4d48-1221-45fb-9200-531dbc86eb97", "DetectTime": "2023-10-30T14:07:33.288490+02:00", "EventTime": "2023-10-30T14:07:33.288507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cca0cx4LSGJKj6dZ0j"]} -{"Format": "IDEA0", "ID": "224cec4f-f2c9-41d9-b315-bfe7c91a7f67", "DetectTime": "2023-10-30T14:07:33.326409+02:00", "EventTime": "2023-10-30T14:07:33.326430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CTBnHO1HfTFzPliLk2"]} -{"Format": "IDEA0", "ID": "5ce2e7f6-dc43-4fb3-a409-9428ef48a6e0", "DetectTime": "2023-10-30T14:07:33.359395+02:00", "EventTime": "2023-10-30T14:07:33.359407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CMuGEa4g0EYjQ1oUC2"]} -{"Format": "IDEA0", "ID": "29277381-9cb7-41af-a9c4-579d849322d8", "DetectTime": "2023-10-30T14:07:33.391455+02:00", "EventTime": "2023-10-30T14:07:33.391471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.254.24 ", "ContentType": "text/plain"}], "uids": ["CYMJFQ2IB0NdiBqXq8"]} -{"Format": "IDEA0", "ID": "1385ea73-c133-4d82-b2f5-baf563837d3a", "DetectTime": "2023-10-30T14:07:33.424530+02:00", "EventTime": "2023-10-30T14:07:33.424548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CD9eq91cMwCSHEMzX3"]} -{"Format": "IDEA0", "ID": "741cd438-1dd0-4b5e-80b9-61fb05a608c6", "DetectTime": "2023-10-30T14:07:33.456114+02:00", "EventTime": "2023-10-30T14:07:33.456129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CEX1jP3T6EvGKPtXli"]} -{"Format": "IDEA0", "ID": "11ca439d-9cf1-49b7-a4d5-9b3fc2538e92", "DetectTime": "2023-10-30T14:07:33.487878+02:00", "EventTime": "2023-10-30T14:07:33.487893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CoUwoM7VRkIKYufzk"]} -{"Format": "IDEA0", "ID": "07ff8d56-c952-4f29-baf6-c58ea71aa586", "DetectTime": "2023-10-30T14:07:33.520525+02:00", "EventTime": "2023-10-30T14:07:33.520545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CzI06F134N0LeVmr"]} -{"Format": "IDEA0", "ID": "e8381a8b-e074-445e-96e1-624b2a67e4e9", "DetectTime": "2023-10-30T14:07:33.548071+02:00", "EventTime": "2023-10-30T14:07:33.548087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.195.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.195.1 ", "ContentType": "text/plain"}], "uids": ["CGel8h2OHs98YPh2Bg"]} -{"Format": "IDEA0", "ID": "b9b970a1-3092-451b-83f1-b4d14c2703ae", "DetectTime": "2023-10-30T14:07:33.572094+02:00", "EventTime": "2023-10-30T14:07:33.572111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["CkUtOE3SNcenjLBOhg"]} -{"Format": "IDEA0", "ID": "406eecb8-1ed4-414d-b5a8-e18f364586d0", "DetectTime": "2023-10-30T14:07:33.598178+02:00", "EventTime": "2023-10-30T14:07:33.598197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CR9KvX3TmUe8bN1kFg"]} -{"Format": "IDEA0", "ID": "1b9265c1-21c8-4d4b-9728-a804de22c204", "DetectTime": "2023-10-30T14:07:33.625552+02:00", "EventTime": "2023-10-30T14:07:33.625568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["ConG6hVZ9x132uvu7"]} -{"Format": "IDEA0", "ID": "b495ccf6-7bce-4800-9bb3-25c87dbbf369", "DetectTime": "2023-10-30T14:07:33.660423+02:00", "EventTime": "2023-10-30T14:07:33.660442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["Co89e63oTPfqZP1Ea4"]} -{"Format": "IDEA0", "ID": "d2bd5f5b-06f3-488b-8381-4f823ed86dd3", "DetectTime": "2023-10-30T14:07:33.692173+02:00", "EventTime": "2023-10-30T14:07:33.692192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CjgXH4RB6HaEXqo8k"]} -{"Format": "IDEA0", "ID": "17d536a9-f461-4b6c-96b7-2d698a35e400", "DetectTime": "2023-10-30T14:07:33.725576+02:00", "EventTime": "2023-10-30T14:07:33.725592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CKKDuI1CWCXkoMJT51"]} -{"Format": "IDEA0", "ID": "887d6e3a-7198-406f-87d3-689f33129886", "DetectTime": "2023-10-30T14:07:33.757654+02:00", "EventTime": "2023-10-30T14:07:33.757671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C3ST2a1o3Ewg0yX9r1"]} -{"Format": "IDEA0", "ID": "9893a9c8-704a-4840-a631-e6927361d313", "DetectTime": "2023-10-30T14:07:33.787774+02:00", "EventTime": "2023-10-30T14:07:33.787791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CFPK5j4zNhRxD8Amuk"]} -{"Format": "IDEA0", "ID": "c3efccdc-5b77-406e-9253-d2e13ce05750", "DetectTime": "2023-10-30T14:07:33.818295+02:00", "EventTime": "2023-10-30T14:07:33.818308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ca4bDh4VB1B0BW9Kk"]} -{"Format": "IDEA0", "ID": "5c799db3-01ac-49e8-b94c-1a464c72aa7e", "DetectTime": "2023-10-30T14:07:33.840963+02:00", "EventTime": "2023-10-30T14:07:33.840979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cc65mEZJCHjq1dPv1"]} -{"Format": "IDEA0", "ID": "f6f12eca-7b21-4fff-8420-e1488e9a6a2f", "DetectTime": "2023-10-30T14:07:33.865046+02:00", "EventTime": "2023-10-30T14:07:33.865063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVVo3d1v6oqiu0neh6"]} -{"Format": "IDEA0", "ID": "df95d036-ee78-4ed6-b4e4-67c2638fdb0d", "DetectTime": "2023-10-30T14:07:33.889357+02:00", "EventTime": "2023-10-30T14:07:33.889371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C5olXh18v0cohEIu7e"]} -{"Format": "IDEA0", "ID": "5ad7c8c5-3e32-4695-a933-a5075a71d894", "DetectTime": "2023-10-30T14:07:33.914370+02:00", "EventTime": "2023-10-30T14:07:33.914393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.75.245.104 ", "ContentType": "text/plain"}], "uids": ["C2T0Rv48cHuXujdCli"]} -{"Format": "IDEA0", "ID": "23c61920-e0d4-462a-a3dc-7fa00f2530eb", "DetectTime": "2023-10-30T14:07:33.944517+02:00", "EventTime": "2023-10-30T14:07:33.944528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.195.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.116.195.1 ", "ContentType": "text/plain"}], "uids": ["CWEcHN1dI8A8xPZyc5"]} -{"Format": "IDEA0", "ID": "c950bedc-8dcf-424e-84e6-9aa40d629202", "DetectTime": "2023-10-30T14:07:33.974718+02:00", "EventTime": "2023-10-30T14:07:33.974738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["C9TnEkVlI0QB5m7k1"]} -{"Format": "IDEA0", "ID": "bd060cd1-c61d-47db-89ea-409633b86008", "DetectTime": "2023-10-30T14:07:34.005048+02:00", "EventTime": "2023-10-30T14:07:34.005066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.177.185.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.177.185.85 ", "ContentType": "text/plain"}], "uids": ["C1mOFF15t3sb14wL5"]} -{"Format": "IDEA0", "ID": "49cf902f-fb6b-4371-91a1-5de464621daa", "DetectTime": "2023-10-30T14:07:34.033359+02:00", "EventTime": "2023-10-30T14:07:34.033381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CgxOt012kw1MXOxgH7"]} -{"Format": "IDEA0", "ID": "e1446608-7a8c-42d3-9cac-a2a27b80a2e6", "DetectTime": "2023-10-30T14:07:34.062242+02:00", "EventTime": "2023-10-30T14:07:34.062263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CfbGf2yO6gOT3eV72"]} -{"Format": "IDEA0", "ID": "4de65c47-7833-47c3-826a-be5160624d65", "DetectTime": "2023-10-30T14:07:34.088615+02:00", "EventTime": "2023-10-30T14:07:34.088628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CIBDcr2d4Bi00WocDg"]} -{"Format": "IDEA0", "ID": "6d7d32e0-f7d6-4655-af71-2a1df23eac83", "DetectTime": "2023-10-30T14:07:34.116106+02:00", "EventTime": "2023-10-30T14:07:34.116122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Cb80mR3l9lsCa4W161"]} -{"Format": "IDEA0", "ID": "bb372ac1-0cec-46d1-96c4-29000e99855c", "DetectTime": "2023-10-30T14:07:34.142951+02:00", "EventTime": "2023-10-30T14:07:34.142968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CESnMy4kRYwiLcUEv5"]} -{"Format": "IDEA0", "ID": "89796704-33fa-405d-a035-17b8b1e84230", "DetectTime": "2023-10-30T14:07:34.170530+02:00", "EventTime": "2023-10-30T14:07:34.170542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CsWJ5H2eQDLWYCCXr4"]} -{"Format": "IDEA0", "ID": "8c1ae0ea-3c25-473b-bfa1-e2a05d77a4e4", "DetectTime": "2023-10-30T14:07:34.194402+02:00", "EventTime": "2023-10-30T14:07:34.194414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cp0XtF4P1W7VP24Pc9"]} -{"Format": "IDEA0", "ID": "1aefa106-2df1-4f53-b05f-ac429e21af8a", "DetectTime": "2023-10-30T14:07:34.221980+02:00", "EventTime": "2023-10-30T14:07:34.221997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CZbSsdL4QAGJ76Qz2"]} -{"Format": "IDEA0", "ID": "558a6c03-0fee-46ae-b4ca-1685b97e3a14", "DetectTime": "2023-10-30T14:07:34.249462+02:00", "EventTime": "2023-10-30T14:07:34.249478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CjdwvA2LH0zHqTrrEb"]} -{"Format": "IDEA0", "ID": "dc0019b6-18f9-478a-b27d-ff6decc7ec47", "DetectTime": "2023-10-30T14:07:34.280974+02:00", "EventTime": "2023-10-30T14:07:34.280986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.75.245.104 ", "ContentType": "text/plain"}], "uids": ["CbAeQE333Dzw9hIjng"]} -{"Format": "IDEA0", "ID": "df8f5bdd-5553-447e-9f1c-2efbacdb3786", "DetectTime": "2023-10-30T14:07:34.304038+02:00", "EventTime": "2023-10-30T14:07:34.304049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CN9xup1Fxw38RUIAjl"]} -{"Format": "IDEA0", "ID": "74f574d8-7d65-44ad-9c7b-47924040e4f6", "DetectTime": "2023-10-30T14:07:34.337968+02:00", "EventTime": "2023-10-30T14:07:34.337992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CuDPyO34JEmd0If2Bd"]} -{"Format": "IDEA0", "ID": "802cc981-0b56-43b5-8627-e71bda2bffb1", "DetectTime": "2023-10-30T14:07:34.363983+02:00", "EventTime": "2023-10-30T14:07:34.363999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CUBdU74K0rMFSDsEW2"]} -{"Format": "IDEA0", "ID": "aaf8fe62-8ffa-4ad5-b628-dd3d31a2d46e", "DetectTime": "2023-10-30T14:07:34.392901+02:00", "EventTime": "2023-10-30T14:07:34.392913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["CKG52g11d6eFvgZkZ2"]} -{"Format": "IDEA0", "ID": "99f2911b-4bf3-44d6-a212-61e120627ea3", "DetectTime": "2023-10-30T14:07:34.420686+02:00", "EventTime": "2023-10-30T14:07:34.420702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CMR6VW2dC0ZCLamDd4"]} -{"Format": "IDEA0", "ID": "af14cc4b-9a44-4274-bdb7-fd1b3f52047b", "DetectTime": "2023-10-30T14:07:34.442935+02:00", "EventTime": "2023-10-30T14:07:34.442961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CYBGRB3ONCJTOx8dv9"]} -{"Format": "IDEA0", "ID": "62378a4d-3862-4d39-a637-7222e14c390d", "DetectTime": "2023-10-30T14:07:34.475863+02:00", "EventTime": "2023-10-30T14:07:34.475887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CkFYfx1WoX5odhNaV3"]} -{"Format": "IDEA0", "ID": "02800c21-e0d3-46a7-856f-e14efea37dec", "DetectTime": "2023-10-30T14:07:34.505915+02:00", "EventTime": "2023-10-30T14:07:34.505931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["CKhzxD3Fi72vWoVa3b"]} -{"Format": "IDEA0", "ID": "4d588a61-2903-45c3-b582-dcbf4e8c0bf3", "DetectTime": "2023-10-30T14:07:34.541572+02:00", "EventTime": "2023-10-30T14:07:34.541588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CAsdk125XcjSXC91oj"]} -{"Format": "IDEA0", "ID": "69d06f7c-7b3d-4eaa-ac94-c1e31105345c", "DetectTime": "2023-10-30T14:07:34.574615+02:00", "EventTime": "2023-10-30T14:07:34.574627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cmh2ocfuPtWJN9PQj"]} -{"Format": "IDEA0", "ID": "fc6e39e2-a654-4994-b0b9-4c8753036754", "DetectTime": "2023-10-30T14:07:34.604578+02:00", "EventTime": "2023-10-30T14:07:34.604594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CD4Bfj1m1SMg1sTrNk"]} -{"Format": "IDEA0", "ID": "f9d3df62-74cd-4031-af77-ea31a6f65f6a", "DetectTime": "2023-10-30T14:07:34.634336+02:00", "EventTime": "2023-10-30T14:07:34.634358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CDBlOu4FBzHA0PYJqk"]} -{"Format": "IDEA0", "ID": "b116f1f6-6768-4ede-a385-b90d607e596b", "DetectTime": "2023-10-30T14:07:34.668204+02:00", "EventTime": "2023-10-30T14:07:34.668226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CiUfVW27bAep2RhTX2"]} -{"Format": "IDEA0", "ID": "5d5fffb7-0091-49ae-8899-dd67cb65a67c", "DetectTime": "2023-10-30T14:07:34.696500+02:00", "EventTime": "2023-10-30T14:07:34.696517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkxrTR2wWn2y0Fcu61"]} -{"Format": "IDEA0", "ID": "2e980a0e-fdeb-49a1-83de-4b5758add9c3", "DetectTime": "2023-10-30T14:07:34.723781+02:00", "EventTime": "2023-10-30T14:07:34.723797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.22.146.222 ", "ContentType": "text/plain"}], "uids": ["CkZoHiwyBmsZOR8N6"]} -{"Format": "IDEA0", "ID": "f93dc11b-b5ab-46a4-8893-3268c32294db", "DetectTime": "2023-10-30T14:07:34.754197+02:00", "EventTime": "2023-10-30T14:07:34.754214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CSJRsi2UzqOt4qoqE"]} -{"Format": "IDEA0", "ID": "26b9f8b5-d6b2-4cfe-b492-9716811f083b", "DetectTime": "2023-10-30T14:07:34.776892+02:00", "EventTime": "2023-10-30T14:07:34.776904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["CtK05x2SySXhOCNR6"]} -{"Format": "IDEA0", "ID": "e5b24b52-2571-4b28-b8b1-95b17faddd91", "DetectTime": "2023-10-30T14:07:34.798837+02:00", "EventTime": "2023-10-30T14:07:34.798848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C8EixyRTw1kTSkJ63"]} -{"Format": "IDEA0", "ID": "6e06db67-0e2f-46d4-aef0-ec3bb2f36008", "DetectTime": "2023-10-30T14:07:34.822544+02:00", "EventTime": "2023-10-30T14:07:34.822556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CvwbeZ1H8ecCkmDVO3"]} -{"Format": "IDEA0", "ID": "bfec0b7b-1544-4ba0-aab2-210896b18bd9", "DetectTime": "2023-10-30T14:07:34.845168+02:00", "EventTime": "2023-10-30T14:07:34.845182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["C0o1fR2nlgM2IM1yTh"]} -{"Format": "IDEA0", "ID": "f29dc7df-cb55-4930-b2ca-8294118f4a7d", "DetectTime": "2023-10-30T14:07:34.872785+02:00", "EventTime": "2023-10-30T14:07:34.872802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CRkX0d100mvXG3q4K6"]} -{"Format": "IDEA0", "ID": "21606457-3da9-45fe-a6f4-6b53c33a6699", "DetectTime": "2023-10-30T14:07:34.899424+02:00", "EventTime": "2023-10-30T14:07:34.899437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CMgmamjHy7w3sbL1"]} -{"Format": "IDEA0", "ID": "854bed4d-8a85-446f-a510-9267aec8ae1a", "DetectTime": "2023-10-30T14:07:34.921691+02:00", "EventTime": "2023-10-30T14:07:34.921712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CU0vTy2WcRYPsDq9lb"]} -{"Format": "IDEA0", "ID": "568bdad6-2820-4f28-96f5-5a2741b3435b", "DetectTime": "2023-10-30T14:07:34.943830+02:00", "EventTime": "2023-10-30T14:07:34.943841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CVE4942tsSiAw7FODj"]} -{"Format": "IDEA0", "ID": "991a4159-a936-4465-aeb6-77b4667bbbb7", "DetectTime": "2023-10-30T14:07:34.966226+02:00", "EventTime": "2023-10-30T14:07:34.966241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CKixKh4P8SuVcYtQM2"]} -{"Format": "IDEA0", "ID": "4ba00d78-4638-4d79-9f51-795089d46559", "DetectTime": "2023-10-30T14:07:34.987509+02:00", "EventTime": "2023-10-30T14:07:34.987521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.177.185.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.177.185.85 ", "ContentType": "text/plain"}], "uids": ["CLZJUR3doHON3RD3g1"]} -{"Format": "IDEA0", "ID": "cc09f006-74e8-457a-ba4a-f8f9c4ba468a", "DetectTime": "2023-10-30T14:07:35.012205+02:00", "EventTime": "2023-10-30T14:07:35.012216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CZsbAp4G7RKJtx6IJk"]} -{"Format": "IDEA0", "ID": "583639cd-d32e-4cef-8e52-3ea1eba02d84", "DetectTime": "2023-10-30T14:07:35.032767+02:00", "EventTime": "2023-10-30T14:07:35.032779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIOnwu1tKNzzFeCOze"]} -{"Format": "IDEA0", "ID": "753d8831-f652-4705-a0fa-77b276ca492e", "DetectTime": "2023-10-30T14:07:35.053392+02:00", "EventTime": "2023-10-30T14:07:35.053405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CsioMs2D7GQwg18Bpg"]} -{"Format": "IDEA0", "ID": "5e6f33fb-f1a1-45d8-acf7-c0d9f054953c", "DetectTime": "2023-10-30T14:07:35.078139+02:00", "EventTime": "2023-10-30T14:07:35.078151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C0MSBu1p3VkAfekinc"]} -{"Format": "IDEA0", "ID": "a2344ab0-28ff-4448-b8f6-52917238292f", "DetectTime": "2023-10-30T14:07:35.100033+02:00", "EventTime": "2023-10-30T14:07:35.100050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["CdWamk3p7w20jK7k31"]} -{"Format": "IDEA0", "ID": "28d9d692-fb57-4548-b964-766e2efa3047", "DetectTime": "2023-10-30T14:07:35.120680+02:00", "EventTime": "2023-10-30T14:07:35.120692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C2nHBm4pc65ql1Hxwa"]} -{"Format": "IDEA0", "ID": "b4270f39-a45a-4bd8-9fb6-645e2d8042aa", "DetectTime": "2023-10-30T14:07:35.139035+02:00", "EventTime": "2023-10-30T14:07:35.139052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CsK6Tk7eT5a5IPiYl"]} -{"Format": "IDEA0", "ID": "9d05950d-eb81-41bf-8403-7857fff4970a", "DetectTime": "2023-10-30T14:07:35.164552+02:00", "EventTime": "2023-10-30T14:07:35.164569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["Ci54fL1Jn4S32ETTL6"]} -{"Format": "IDEA0", "ID": "580d8d94-da31-48fd-b3cd-2e51e67e1746", "DetectTime": "2023-10-30T14:07:35.186318+02:00", "EventTime": "2023-10-30T14:07:35.186329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["CCtFNs3WoO1aVTgUT6"]} -{"Format": "IDEA0", "ID": "771c9cab-16da-4323-81e9-a52165eb57e0", "DetectTime": "2023-10-30T14:07:35.205378+02:00", "EventTime": "2023-10-30T14:07:35.205403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CRCWGm2Xn0p7h6rEpc"]} -{"Format": "IDEA0", "ID": "bbcf2b5b-71cc-48e3-b5e2-5435d4f058b9", "DetectTime": "2023-10-30T14:07:35.228965+02:00", "EventTime": "2023-10-30T14:07:35.228976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["C0EUQH16R0qa23zytk"]} -{"Format": "IDEA0", "ID": "8f3209e4-faea-49da-87ae-a66b4287b915", "DetectTime": "2023-10-30T14:07:35.249848+02:00", "EventTime": "2023-10-30T14:07:35.249859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C2Zyt618DMffzBcmN7"]} -{"Format": "IDEA0", "ID": "7dab6757-cdc6-4436-baf4-0fe01d25a566", "DetectTime": "2023-10-30T14:07:35.273002+02:00", "EventTime": "2023-10-30T14:07:35.273016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CjDJU34PJyTkwS9vMj"]} -{"Format": "IDEA0", "ID": "0a854970-cd62-460b-88cb-9861050dba18", "DetectTime": "2023-10-30T14:07:35.295613+02:00", "EventTime": "2023-10-30T14:07:35.295625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CXedby2wwueiM7PiV6"]} -{"Format": "IDEA0", "ID": "b79a6ec6-6c8e-4b08-82ae-b2d33cfd6452", "DetectTime": "2023-10-30T14:07:35.320031+02:00", "EventTime": "2023-10-30T14:07:35.320047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C79Ae41MY8WC0cLNpl"]} -{"Format": "IDEA0", "ID": "6e156870-5ce9-44c1-9f2c-d98dc52ced4b", "DetectTime": "2023-10-30T14:07:35.345059+02:00", "EventTime": "2023-10-30T14:07:35.345071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CtSzR4BuEeUn31Muj"]} -{"Format": "IDEA0", "ID": "7b36d5c7-e38d-4173-b7e6-77e316e01389", "DetectTime": "2023-10-30T14:07:35.368299+02:00", "EventTime": "2023-10-30T14:07:35.368310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CVMd6640PoUiZM8vD2"]} -{"Format": "IDEA0", "ID": "db32a54c-2f51-4119-a8a7-66d90339b7ec", "DetectTime": "2023-10-30T14:07:35.394138+02:00", "EventTime": "2023-10-30T14:07:35.394159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CAF9j42TECR5ux0IBk"]} -{"Format": "IDEA0", "ID": "ed4ad5bf-9667-4f07-97e9-af6ab76ad633", "DetectTime": "2023-10-30T14:07:35.420707+02:00", "EventTime": "2023-10-30T14:07:35.420717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CmoCmo3t0TwKnPxOGf"]} -{"Format": "IDEA0", "ID": "f17093db-5799-4a37-856b-4fdb898855fb", "DetectTime": "2023-10-30T14:07:35.442870+02:00", "EventTime": "2023-10-30T14:07:35.442889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C4ARI83X7PqMbWbrl1"]} -{"Format": "IDEA0", "ID": "220b407f-6b52-4702-9b64-55c858e2dfbe", "DetectTime": "2023-10-30T14:07:35.469635+02:00", "EventTime": "2023-10-30T14:07:35.469647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["CtiROvj2U848BYLBf"]} -{"Format": "IDEA0", "ID": "ecd82df7-b724-40b6-bdd0-412acd5c1db1", "DetectTime": "2023-10-30T14:07:35.496135+02:00", "EventTime": "2023-10-30T14:07:35.496150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["C4oLQu3UYtob76wP0h"]} -{"Format": "IDEA0", "ID": "7e61ebc3-b419-4d06-b3c9-85aaac332c07", "DetectTime": "2023-10-30T14:07:35.520902+02:00", "EventTime": "2023-10-30T14:07:35.520915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CYNa0c3er8cVNRUYf6"]} -{"Format": "IDEA0", "ID": "d8a4e4ef-cdb3-4088-ad6d-d7e026b6367a", "DetectTime": "2023-10-30T14:07:35.543580+02:00", "EventTime": "2023-10-30T14:07:35.543595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CScAJo3C7DgcRxf1pl"]} -{"Format": "IDEA0", "ID": "5f2502c6-952c-4f71-81a4-b05d641b934c", "DetectTime": "2023-10-30T14:07:35.565348+02:00", "EventTime": "2023-10-30T14:07:35.565364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CvBiPx2F6ERZdtga1"]} -{"Format": "IDEA0", "ID": "b78d04f1-515e-48d6-aff3-a320efed5f52", "DetectTime": "2023-10-30T14:07:35.587674+02:00", "EventTime": "2023-10-30T14:07:35.587690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CmqqJB3neB8nHFL5b8"]} -{"Format": "IDEA0", "ID": "e1a5bcf2-a797-4355-9091-e77c17b5dd2b", "DetectTime": "2023-10-30T14:07:35.612877+02:00", "EventTime": "2023-10-30T14:07:35.612888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.254.24 ", "ContentType": "text/plain"}], "uids": ["Ci71bM1DIMtZ2HJfWg"]} -{"Format": "IDEA0", "ID": "ed6d6b0a-1ec3-4855-a7d4-e52e2b498c82", "DetectTime": "2023-10-30T14:07:35.633247+02:00", "EventTime": "2023-10-30T14:07:35.633264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CdQnk91V5lpTZpnR44"]} -{"Format": "IDEA0", "ID": "e9f0e610-fa7e-4d7b-a4ec-19cf4d4051a9", "DetectTime": "2023-10-30T14:07:35.654066+02:00", "EventTime": "2023-10-30T14:07:35.654083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CDvbsU3vZAgizdEqd4"]} -{"Format": "IDEA0", "ID": "378d1582-8163-4e74-b3ec-67da43456a69", "DetectTime": "2023-10-30T14:07:35.675728+02:00", "EventTime": "2023-10-30T14:07:35.675741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CN7y8e2oqjLNB5smbg"]} -{"Format": "IDEA0", "ID": "ae128ec9-55f5-4b82-a871-6de765891e4f", "DetectTime": "2023-10-30T14:07:35.700422+02:00", "EventTime": "2023-10-30T14:07:35.700439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CKr26Y1fYUFdzRdgFg"]} -{"Format": "IDEA0", "ID": "99cd1f4b-c1f5-448b-bda8-06ce51ab7629", "DetectTime": "2023-10-30T14:07:35.726730+02:00", "EventTime": "2023-10-30T14:07:35.726742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CfABd33ep4dSKSjeRe"]} -{"Format": "IDEA0", "ID": "d7f558eb-8b45-4f90-8774-87cb4bd317f2", "DetectTime": "2023-10-30T14:07:35.748524+02:00", "EventTime": "2023-10-30T14:07:35.748540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CkVz3xH3Hxtf2qr03"]} -{"Format": "IDEA0", "ID": "a968f13b-64c5-4008-bb26-d9f7828ffc4a", "DetectTime": "2023-10-30T14:07:35.776004+02:00", "EventTime": "2023-10-30T14:07:35.776020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CovVsh2bwJKcnNmD9d"]} -{"Format": "IDEA0", "ID": "63c8d0f4-84cf-4402-bec9-57ea8c835e2b", "DetectTime": "2023-10-30T14:07:35.804650+02:00", "EventTime": "2023-10-30T14:07:35.804673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["C10cKd2rZ65S68az53"]} -{"Format": "IDEA0", "ID": "50e6bb2b-af3d-4244-b594-32bcc5fbdb26", "DetectTime": "2023-10-30T14:07:35.834592+02:00", "EventTime": "2023-10-30T14:07:35.834613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["C9fjlO3lt0iFmMuL1d"]} -{"Format": "IDEA0", "ID": "6cc955bd-b071-46c5-a517-ac3db2233698", "DetectTime": "2023-10-30T14:07:35.865037+02:00", "EventTime": "2023-10-30T14:07:35.865057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CWVQvh4MAbAOyF4PWl"]} -{"Format": "IDEA0", "ID": "d4a009d8-7bbc-4e3a-acca-f985995c065d", "DetectTime": "2023-10-30T14:07:35.897033+02:00", "EventTime": "2023-10-30T14:07:35.897049+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.231.62.73 from 10.0.2.19. blacklisted IP AS: KOBA-AS Polish ISP, PL AS3452 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cqs2yc2XAbFMPOdPz2"]} -{"Format": "IDEA0", "ID": "ffb2aa90-fbfb-4066-9671-7a407e92f62f", "DetectTime": "2023-10-30T14:07:35.924810+02:00", "EventTime": "2023-10-30T14:07:35.924827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["C3xBvu2YuDdKj87kLa"]} -{"Format": "IDEA0", "ID": "07ba8025-09c1-4139-8e8d-d7326eb78a84", "DetectTime": "2023-10-30T14:07:35.946303+02:00", "EventTime": "2023-10-30T14:07:35.946323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CNijBu4PQ5n0Gcol6d"]} -{"Format": "IDEA0", "ID": "67f3aba9-76b9-4089-98d1-004cb0fda6b5", "DetectTime": "2023-10-30T14:07:35.971732+02:00", "EventTime": "2023-10-30T14:07:35.971747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CVYccem6auiXxBfOj"]} -{"Format": "IDEA0", "ID": "0926a620-4e6a-497e-a55a-f62385c4dee9", "DetectTime": "2023-10-30T14:07:35.995702+02:00", "EventTime": "2023-10-30T14:07:35.995719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.74.62 ", "ContentType": "text/plain"}], "uids": ["CafKmM3GyiC0EeJMyj"]} -{"Format": "IDEA0", "ID": "03ef5a48-f3c6-4478-8c33-03f0c74f030f", "DetectTime": "2023-10-30T14:07:36.020667+02:00", "EventTime": "2023-10-30T14:07:36.020678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CQMehN35fDMuhfweSk"]} -{"Format": "IDEA0", "ID": "fbfc8708-887e-44be-be90-6302a9d2a689", "DetectTime": "2023-10-30T14:07:36.045254+02:00", "EventTime": "2023-10-30T14:07:36.045271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CURm7l1o4FJLGTCZKj"]} -{"Format": "IDEA0", "ID": "88314921-217a-4a77-857a-2f29c5ee75e5", "DetectTime": "2023-10-30T14:07:36.069095+02:00", "EventTime": "2023-10-30T14:07:36.069107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CODL2x3vggLbU3gjel"]} -{"Format": "IDEA0", "ID": "e1f7576d-37f9-4919-a6cc-5edfd7fb7e41", "DetectTime": "2023-10-30T14:07:36.093304+02:00", "EventTime": "2023-10-30T14:07:36.093320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C5R7ZP3L7NPA9huhr7"]} -{"Format": "IDEA0", "ID": "a3b77598-65f8-49f2-8fb7-1dc64746d283", "DetectTime": "2023-10-30T14:07:36.112583+02:00", "EventTime": "2023-10-30T14:07:36.112599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Cdac5IRnXOHmsMh9b"]} -{"Format": "IDEA0", "ID": "b6cf144a-ec71-43b0-818c-2737c039bba4", "DetectTime": "2023-10-30T14:07:36.141154+02:00", "EventTime": "2023-10-30T14:07:36.141171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CHZtL12fwcL6Gq80W8"]} -{"Format": "IDEA0", "ID": "e467631d-66d0-497e-9195-908529cd85ea", "DetectTime": "2023-10-30T14:07:36.163772+02:00", "EventTime": "2023-10-30T14:07:36.163793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Cr4z5p1fY6WqQp0aD5"]} -{"Format": "IDEA0", "ID": "d3e023af-796b-4952-b9ed-406f07e28184", "DetectTime": "2023-10-30T14:07:36.189119+02:00", "EventTime": "2023-10-30T14:07:36.189131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrBELi3tVGGPhDuGzj"]} -{"Format": "IDEA0", "ID": "582e21a6-bb35-4294-8782-2ac7320df30a", "DetectTime": "2023-10-30T14:07:36.212445+02:00", "EventTime": "2023-10-30T14:07:36.212456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CEtx8D1IZ67m8BwKWi"]} -{"Format": "IDEA0", "ID": "720d8510-3846-46a3-ae52-456948f22b06", "DetectTime": "2023-10-30T14:07:36.233042+02:00", "EventTime": "2023-10-30T14:07:36.233061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["C8yvhZ2B7H11rymhI1"]} -{"Format": "IDEA0", "ID": "9aff5b68-c375-49fb-8bec-abcc6b915de8", "DetectTime": "2023-10-30T14:07:36.255688+02:00", "EventTime": "2023-10-30T14:07:36.255700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CWnMf12yxCw5dfP6Rg"]} -{"Format": "IDEA0", "ID": "6f64d87c-71f4-4d36-8fc2-480788d8d946", "DetectTime": "2023-10-30T14:07:36.279613+02:00", "EventTime": "2023-10-30T14:07:36.279631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["CQ9UAe12PknJZoNHi2"]} -{"Format": "IDEA0", "ID": "7bf2c2ce-3bae-4250-aadd-d1a613d1ba22", "DetectTime": "2023-10-30T14:07:36.303980+02:00", "EventTime": "2023-10-30T14:07:36.303993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CovydG2OSA2iY5Vj4"]} -{"Format": "IDEA0", "ID": "9b0e3173-7e79-4c34-8825-587ff4fe0cee", "DetectTime": "2023-10-30T14:07:36.327694+02:00", "EventTime": "2023-10-30T14:07:36.327707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C2RDWj3sOyYKy8M827"]} -{"Format": "IDEA0", "ID": "0dc7fa41-9ab1-45b0-82ee-fdba5c43f5e6", "DetectTime": "2023-10-30T14:07:36.348477+02:00", "EventTime": "2023-10-30T14:07:36.348495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CLoYkP2z7WVseddf3j"]} -{"Format": "IDEA0", "ID": "ac604fae-d46d-45fa-b027-b17c42fe79e6", "DetectTime": "2023-10-30T14:07:36.372037+02:00", "EventTime": "2023-10-30T14:07:36.372049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CDLRjm2rYll9yI4U2"]} -{"Format": "IDEA0", "ID": "7f839111-9c90-41dd-8a6b-cf27cb9bea5e", "DetectTime": "2023-10-30T14:07:36.391842+02:00", "EventTime": "2023-10-30T14:07:36.391853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CvBYgZ2aCjkdu3KMGf"]} -{"Format": "IDEA0", "ID": "b44f4448-9253-431a-a39e-0636dbaa4e43", "DetectTime": "2023-10-30T14:07:36.412271+02:00", "EventTime": "2023-10-30T14:07:36.412282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CgGxhr0mVspNuLTkh"]} -{"Format": "IDEA0", "ID": "9c42cc30-a4e4-4699-bb87-ed0a72624a20", "DetectTime": "2023-10-30T14:07:36.431599+02:00", "EventTime": "2023-10-30T14:07:36.431614+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CJKdbr38Q09bfArxj2"]} -{"Format": "IDEA0", "ID": "fbc87c1b-b93e-4371-bb68-95c584afe909", "DetectTime": "2023-10-30T14:07:36.456574+02:00", "EventTime": "2023-10-30T14:07:36.456590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.254.24 ", "ContentType": "text/plain"}], "uids": ["C68aY21XJsWnYPKUKa"]} -{"Format": "IDEA0", "ID": "f198cc7d-55cc-4dc4-8102-8d2b40a7388f", "DetectTime": "2023-10-30T14:07:36.479206+02:00", "EventTime": "2023-10-30T14:07:36.479218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CJiXsv4MBiffmJqPK"]} -{"Format": "IDEA0", "ID": "3e17907e-009e-4526-8dac-9ad2914ee27f", "DetectTime": "2023-10-30T14:07:36.502561+02:00", "EventTime": "2023-10-30T14:07:36.502579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CXwStN18yjaoj24LE3"]} -{"Format": "IDEA0", "ID": "64a01408-7ac3-42a7-ab37-b0654330fd12", "DetectTime": "2023-10-30T14:07:36.528112+02:00", "EventTime": "2023-10-30T14:07:36.528124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CoHWjqmjntZL6Qzok"]} -{"Format": "IDEA0", "ID": "f7c9e43d-11d5-4eab-835d-ca4f21170399", "DetectTime": "2023-10-30T14:07:36.553917+02:00", "EventTime": "2023-10-30T14:07:36.553931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CLY5Bq2FE7HIlR1eFd"]} -{"Format": "IDEA0", "ID": "ce1cc5e2-4162-4954-8841-a3614e59436a", "DetectTime": "2023-10-30T14:07:36.574207+02:00", "EventTime": "2023-10-30T14:07:36.574220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CBoto82LarOySaZpLg"]} -{"Format": "IDEA0", "ID": "a86c8ad2-7abc-4392-98d1-d2c470e03748", "DetectTime": "2023-10-30T14:07:36.592830+02:00", "EventTime": "2023-10-30T14:07:36.592841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["C4eIMQPaT8zx8A457"]} -{"Format": "IDEA0", "ID": "2bd8ed50-b098-4241-8d5d-9610e2105eb5", "DetectTime": "2023-10-30T14:07:36.619941+02:00", "EventTime": "2023-10-30T14:07:36.619964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["C154QH1iaEGOZz9BIf"]} -{"Format": "IDEA0", "ID": "5caf5b4b-60db-43be-8169-dc8bb51e70d7", "DetectTime": "2023-10-30T14:07:36.649806+02:00", "EventTime": "2023-10-30T14:07:36.649827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C7rfSi2y5m9DBX4ifd"]} -{"Format": "IDEA0", "ID": "28c0b3c3-df5f-4f3a-8b6c-8a22c3c7599a", "DetectTime": "2023-10-30T14:07:36.665986+02:00", "EventTime": "2023-10-30T14:07:36.666010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CI0sTa4f3gBv5k1a82"]} -{"Format": "IDEA0", "ID": "fca51c73-8728-460f-a7a0-14ab9df392ba", "DetectTime": "2023-10-30T14:07:36.689152+02:00", "EventTime": "2023-10-30T14:07:36.689163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.75.245.104 ", "ContentType": "text/plain"}], "uids": ["CLIFGEVIM2elvax68"]} -{"Format": "IDEA0", "ID": "f8611f1f-7885-4c23-ab40-a281b3d11765", "DetectTime": "2023-10-30T14:07:36.710365+02:00", "EventTime": "2023-10-30T14:07:36.710378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CSdzui3aXe2ooqqV1k"]} -{"Format": "IDEA0", "ID": "23a9b0d1-bb18-4dbd-8c00-057d44fc05fb", "DetectTime": "2023-10-30T14:07:36.731230+02:00", "EventTime": "2023-10-30T14:07:36.731245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuTPRf1jmE70DctXhi"]} -{"Format": "IDEA0", "ID": "d38436a6-f8fd-4bae-838e-712f9a720bd1", "DetectTime": "2023-10-30T14:07:36.758336+02:00", "EventTime": "2023-10-30T14:07:36.758351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cp0epy24GipWUvsiNh"]} -{"Format": "IDEA0", "ID": "735c2586-d19d-463a-96c2-dca95be96237", "DetectTime": "2023-10-30T14:07:36.785224+02:00", "EventTime": "2023-10-30T14:07:36.785240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["Cpg4ne1W4JDkuHeBi7"]} -{"Format": "IDEA0", "ID": "a0b74968-d8a0-4cc4-b19e-9041376396bd", "DetectTime": "2023-10-30T14:07:36.812526+02:00", "EventTime": "2023-10-30T14:07:36.812546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CfZ8ph1PkK0rimrhYf"]} -{"Format": "IDEA0", "ID": "6d83626a-a80d-4a48-ba7b-628e533704f8", "DetectTime": "2023-10-30T14:07:36.836109+02:00", "EventTime": "2023-10-30T14:07:36.836120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CkJidI1B0gYgOZdvQf"]} -{"Format": "IDEA0", "ID": "3196658b-a85c-4662-9661-0c5ec4b47b5f", "DetectTime": "2023-10-30T14:07:36.855485+02:00", "EventTime": "2023-10-30T14:07:36.855497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C8TUv14o2Z1HZvFbTi"]} -{"Format": "IDEA0", "ID": "d0fcb087-4f6a-4145-9fa9-abef85bd7aaa", "DetectTime": "2023-10-30T14:07:36.869157+02:00", "EventTime": "2023-10-30T14:07:36.869173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CXTNpo28RtTSBqbRF"]} -{"Format": "IDEA0", "ID": "7b1f9dd8-f755-4f05-86d0-9af481d8c5d1", "DetectTime": "2023-10-30T14:07:36.891579+02:00", "EventTime": "2023-10-30T14:07:36.891592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CZP0zK1mNGpDe0SFZi"]} -{"Format": "IDEA0", "ID": "23d88e59-8b94-4955-ace6-55b04f1921d8", "DetectTime": "2023-10-30T14:07:36.903541+02:00", "EventTime": "2023-10-30T14:07:36.903554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CrUiry2yVBOeuuqnGf"]} -{"Format": "IDEA0", "ID": "4a4501df-a199-471a-857e-4f5896586639", "DetectTime": "2023-10-30T14:07:36.924299+02:00", "EventTime": "2023-10-30T14:07:36.924316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CGCuIn36uKm1TywW2d"]} -{"Format": "IDEA0", "ID": "23eb2f9f-f184-42c0-bc4e-f418f151cb0f", "DetectTime": "2023-10-30T14:07:36.954262+02:00", "EventTime": "2023-10-30T14:07:36.954359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CYDD2Q1J0YeYaLnFR"]} -{"Format": "IDEA0", "ID": "42f0ad56-1a33-461d-9392-863908b40ad3", "DetectTime": "2023-10-30T14:07:36.977817+02:00", "EventTime": "2023-10-30T14:07:36.977829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CiMoYz1JyTvJDkBza7"]} -{"Format": "IDEA0", "ID": "57d71a25-16b9-46f4-a2a3-e4146facf004", "DetectTime": "2023-10-30T14:07:36.996289+02:00", "EventTime": "2023-10-30T14:07:36.996301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CjLjYh2YgJS9c5d0wl"]} -{"Format": "IDEA0", "ID": "2553a5be-2f9f-4c60-802e-0ee9430c26cb", "DetectTime": "2023-10-30T14:07:37.015637+02:00", "EventTime": "2023-10-30T14:07:37.015655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["CZztod2c2jTHYQMBV1"]} -{"Format": "IDEA0", "ID": "93b081b8-7b18-4d67-8dd9-68651be04da8", "DetectTime": "2023-10-30T14:07:37.034177+02:00", "EventTime": "2023-10-30T14:07:37.034193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.56.254.24 ", "ContentType": "text/plain"}], "uids": ["CagAri26nMvPhA0Ndi"]} -{"Format": "IDEA0", "ID": "f5467ce2-5ece-42c0-8636-a86840297e8f", "DetectTime": "2023-10-30T14:07:37.054847+02:00", "EventTime": "2023-10-30T14:07:37.054873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C8k4xr1HUN1cY9xnS"]} -{"Format": "IDEA0", "ID": "55275a3a-0e7d-47de-898f-c4b6c24d4c22", "DetectTime": "2023-10-30T14:07:37.076812+02:00", "EventTime": "2023-10-30T14:07:37.076828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["C0odzMGUypkcvi6Ti"]} -{"Format": "IDEA0", "ID": "bf95da83-13db-48dd-b73a-c04397f62b53", "DetectTime": "2023-10-30T14:07:37.096644+02:00", "EventTime": "2023-10-30T14:07:37.096655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CGC4z7UsITPrxu5Z9"]} -{"Format": "IDEA0", "ID": "67725379-21b5-41d6-bd05-6320f41e1798", "DetectTime": "2023-10-30T14:07:37.107784+02:00", "EventTime": "2023-10-30T14:07:37.107795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CnbKcL1FwNMyYaGWK3"]} -{"Format": "IDEA0", "ID": "d8e661f0-16c2-4b57-82c7-09c007d9ad3c", "DetectTime": "2023-10-30T14:07:37.132184+02:00", "EventTime": "2023-10-30T14:07:37.132205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cim3YC1hrEV8d5sig7"]} -{"Format": "IDEA0", "ID": "153935a6-4015-4065-891c-d1d09d93e690", "DetectTime": "2023-10-30T14:07:37.158442+02:00", "EventTime": "2023-10-30T14:07:37.158454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CoGPCq1XgGdqoTpzx9"]} -{"Format": "IDEA0", "ID": "b5ac366b-0bcc-4bcb-90ce-8784d66fabfd", "DetectTime": "2023-10-30T14:07:37.179683+02:00", "EventTime": "2023-10-30T14:07:37.179696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CE3ARc1k1FNdiMPALc"]} -{"Format": "IDEA0", "ID": "8743865e-64bc-423f-9ed7-59316a24f61d", "DetectTime": "2023-10-30T14:07:37.201551+02:00", "EventTime": "2023-10-30T14:07:37.201567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CBfqJP1665L1QN0Mwf"]} -{"Format": "IDEA0", "ID": "37e141b9-6ace-4d94-809a-ebba9b06a49e", "DetectTime": "2023-10-30T14:07:37.221589+02:00", "EventTime": "2023-10-30T14:07:37.221600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CYOlFy4nV5TVCWvChj"]} -{"Format": "IDEA0", "ID": "d2b1fe71-ed08-4edf-a951-349fafa819da", "DetectTime": "2023-10-30T14:07:37.247821+02:00", "EventTime": "2023-10-30T14:07:37.247842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CVZ6JL2EIeTKmQUa61"]} -{"Format": "IDEA0", "ID": "9fcffcb9-2227-45cc-8965-191656c1c057", "DetectTime": "2023-10-30T14:07:37.274736+02:00", "EventTime": "2023-10-30T14:07:37.274759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CaEHWk2NfvQuIZ0i1g"]} -{"Format": "IDEA0", "ID": "f405d27d-bf60-4b0c-b785-12e6925bb3a0", "DetectTime": "2023-10-30T14:07:37.288975+02:00", "EventTime": "2023-10-30T14:07:37.288986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CPnFhc2Q784P8pv4Zf"]} -{"Format": "IDEA0", "ID": "a0ba7e63-da98-4dbf-a9e4-ae4b6b37e4ce", "DetectTime": "2023-10-30T14:07:37.301286+02:00", "EventTime": "2023-10-30T14:07:37.301307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CMdeTk2xNCN44bcmt8"]} -{"Format": "IDEA0", "ID": "7f978065-f3d3-4e7f-b64b-9f8e3f811832", "DetectTime": "2023-10-30T14:07:37.328012+02:00", "EventTime": "2023-10-30T14:07:37.328028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CSUDcvSn8KH5qqOi6"]} -{"Format": "IDEA0", "ID": "2ff2c9ba-4d39-495b-827a-c9c5c804941e", "DetectTime": "2023-10-30T14:07:37.341302+02:00", "EventTime": "2023-10-30T14:07:37.341313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["CDU7xi6ITphTRMz7b"]} -{"Format": "IDEA0", "ID": "7444a479-47d8-4ac3-a45a-2fe6e01df0b9", "DetectTime": "2023-10-30T14:07:37.367835+02:00", "EventTime": "2023-10-30T14:07:37.367855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["CSJXQW1rAxjtOOtOj3"]} -{"Format": "IDEA0", "ID": "73d6caa6-5952-47a6-9754-c82f58603736", "DetectTime": "2023-10-30T14:07:37.392036+02:00", "EventTime": "2023-10-30T14:07:37.392048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C8QShE2ufYQLSVqgB2"]} -{"Format": "IDEA0", "ID": "0a265430-371c-44c6-b5b4-1a08b8ac0123", "DetectTime": "2023-10-30T14:07:37.411681+02:00", "EventTime": "2023-10-30T14:07:37.411692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CXabnp9RknqgJmIee"]} -{"Format": "IDEA0", "ID": "6c2829bf-c62f-4baf-9437-2040822855e1", "DetectTime": "2023-10-30T14:07:37.434402+02:00", "EventTime": "2023-10-30T14:07:37.434420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CSrskI2uBtWjuU7abf"]} -{"Format": "IDEA0", "ID": "ff439fa5-05d9-40fb-a5d7-28e9803822be", "DetectTime": "2023-10-30T14:07:37.461098+02:00", "EventTime": "2023-10-30T14:07:37.461116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CQPgwx2acn47QdFAyd"]} -{"Format": "IDEA0", "ID": "46eb3147-0d96-4816-bb6d-e12cfd166d87", "DetectTime": "2023-10-30T14:07:37.473738+02:00", "EventTime": "2023-10-30T14:07:37.473754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CLaGk71rQXGN2CEmAb"]} -{"Format": "IDEA0", "ID": "1408ac2a-0b77-4f86-87f8-82eb918cc77c", "DetectTime": "2023-10-30T14:07:37.488016+02:00", "EventTime": "2023-10-30T14:07:37.488031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CRt51K2S2NiYtHlTpb"]} -{"Format": "IDEA0", "ID": "60caa111-1ae1-4979-a49a-1be7b0b036ce", "DetectTime": "2023-10-30T14:07:37.513639+02:00", "EventTime": "2023-10-30T14:07:37.513656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CEmcp31OO8k9xaYVKc"]} -{"Format": "IDEA0", "ID": "37fae4b5-48d0-412c-b19b-ebc303b9c16e", "DetectTime": "2023-10-30T14:07:37.539439+02:00", "EventTime": "2023-10-30T14:07:37.539449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CctLAY1nmgkGYEwRf7"]} -{"Format": "IDEA0", "ID": "2736f899-1938-4748-ae95-1fe7646da1f5", "DetectTime": "2023-10-30T14:07:37.643865+02:00", "EventTime": "2023-10-30T14:07:37.643886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cpqb7v2synK3VEgE7e"]} -{"Format": "IDEA0", "ID": "1370b638-d313-4982-811a-786d62fcd614", "DetectTime": "2023-10-30T14:07:37.661403+02:00", "EventTime": "2023-10-30T14:07:37.661416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CjY2YB2fw5B5RR4Lgk"]} -{"Format": "IDEA0", "ID": "e03157e2-518d-4a1c-b94f-a787914d5745", "DetectTime": "2023-10-30T14:07:37.692911+02:00", "EventTime": "2023-10-30T14:07:37.692923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CpCBpp1cDGBWVHcN28"]} -{"Format": "IDEA0", "ID": "a39714b4-841d-4915-9c8c-e0484051ee9b", "DetectTime": "2023-10-30T14:07:37.716879+02:00", "EventTime": "2023-10-30T14:07:37.716901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CmufRz2GskO6Rg335"]} -{"Format": "IDEA0", "ID": "6a472f78-6d56-43d7-8488-5d839be0aa85", "DetectTime": "2023-10-30T14:07:37.739068+02:00", "EventTime": "2023-10-30T14:07:37.739086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CF1HUB1Aj7M0lU3wt7"]} -{"Format": "IDEA0", "ID": "285b88ae-9e09-4ff5-b576-44e91a409c8d", "DetectTime": "2023-10-30T14:07:37.760631+02:00", "EventTime": "2023-10-30T14:07:37.760648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CPQQ472WHxcO00kuUl"]} -{"Format": "IDEA0", "ID": "6fab7948-07a1-471d-b212-bffc3028ea43", "DetectTime": "2023-10-30T14:07:37.790701+02:00", "EventTime": "2023-10-30T14:07:37.790715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["C7Dd3B2bCZ1kL1FwY8"]} -{"Format": "IDEA0", "ID": "029ac374-08c5-4cd2-9498-7b169c302f88", "DetectTime": "2023-10-30T14:07:37.819494+02:00", "EventTime": "2023-10-30T14:07:37.819510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["C3v9WnZ2FUWi2HHa4"]} -{"Format": "IDEA0", "ID": "c8815244-bfc3-47c1-b0d6-97d13955a068", "DetectTime": "2023-10-30T14:07:37.841458+02:00", "EventTime": "2023-10-30T14:07:37.841474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CHwUt140ZwM0vySOl7"]} -{"Format": "IDEA0", "ID": "c50d7c43-758b-4139-b252-6c6e5efabdec", "DetectTime": "2023-10-30T14:07:37.867154+02:00", "EventTime": "2023-10-30T14:07:37.867166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CbUvGo2ElG8YsazoGl"]} -{"Format": "IDEA0", "ID": "5e6ba777-dc3e-43b1-9021-7106599d6c4f", "DetectTime": "2023-10-30T14:07:37.878741+02:00", "EventTime": "2023-10-30T14:07:37.878752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CUzlkt4KBmhoQucMo9"]} -{"Format": "IDEA0", "ID": "9d8f63cd-551e-4e02-b938-c66e2ed10916", "DetectTime": "2023-10-30T14:07:37.891591+02:00", "EventTime": "2023-10-30T14:07:37.891602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CcvxRq2WeyyFCI9vS"]} -{"Format": "IDEA0", "ID": "0c1140b5-5b52-4089-a426-d2fd7aea1d66", "DetectTime": "2023-10-30T14:07:37.913979+02:00", "EventTime": "2023-10-30T14:07:37.914000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CBlEnR2VvpbUhrLN2k"]} -{"Format": "IDEA0", "ID": "0f93b367-7a7c-4549-b0bd-821fcbae7d12", "DetectTime": "2023-10-30T14:07:37.927727+02:00", "EventTime": "2023-10-30T14:07:37.927742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CA8ESD2lLqQxjghph4"]} -{"Format": "IDEA0", "ID": "3fe2f2bc-c08c-4d08-b121-b6c00f5f7926", "DetectTime": "2023-10-30T14:07:37.950390+02:00", "EventTime": "2023-10-30T14:07:37.950402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cx2qiS2X6OjbwZ3G2d"]} -{"Format": "IDEA0", "ID": "e698fd82-d70d-43fd-a111-6fe913013d11", "DetectTime": "2023-10-30T14:07:37.964222+02:00", "EventTime": "2023-10-30T14:07:37.964239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CSWt2V2mUViRKlDTMg"]} -{"Format": "IDEA0", "ID": "ee5bda3a-8924-498b-9192-3eb16b8ca3a3", "DetectTime": "2023-10-30T14:07:37.980216+02:00", "EventTime": "2023-10-30T14:07:37.980232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CT0p1e1IwfKBO3O5v7"]} -{"Format": "IDEA0", "ID": "ee5698d9-e3c4-420f-85bf-b87908f1a7b0", "DetectTime": "2023-10-30T14:07:38.010448+02:00", "EventTime": "2023-10-30T14:07:38.010465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["CRXgTd30xKc5rvAq84"]} -{"Format": "IDEA0", "ID": "baad5d0f-8cf2-4a69-9cdb-7f6e0f691738", "DetectTime": "2023-10-30T14:07:38.024530+02:00", "EventTime": "2023-10-30T14:07:38.024542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CeK9gU11TyNuO1leU3"]} -{"Format": "IDEA0", "ID": "9cb3adf4-b369-460e-ad61-322ede46b871", "DetectTime": "2023-10-30T14:07:38.054576+02:00", "EventTime": "2023-10-30T14:07:38.054593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CrxZkM1As40L1xcBBc"]} -{"Format": "IDEA0", "ID": "a275f0a2-68ba-4cc4-a620-7ec5558a4597", "DetectTime": "2023-10-30T14:07:38.070277+02:00", "EventTime": "2023-10-30T14:07:38.070299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["C307503vPhPgi6UQA5"]} -{"Format": "IDEA0", "ID": "340f4e87-9f23-4ca2-912d-41ee0cc52681", "DetectTime": "2023-10-30T14:07:38.097051+02:00", "EventTime": "2023-10-30T14:07:38.097068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CWqD9b1YrTUdzQU051"]} -{"Format": "IDEA0", "ID": "4d83339c-8930-45d8-a4d7-6458eb7bc39c", "DetectTime": "2023-10-30T14:07:38.124250+02:00", "EventTime": "2023-10-30T14:07:38.124266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C0Ba3p45tQMnJxlow7"]} -{"Format": "IDEA0", "ID": "495d9f2e-33a3-42d5-acac-1ccd04d6e522", "DetectTime": "2023-10-30T14:07:38.146834+02:00", "EventTime": "2023-10-30T14:07:38.146850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C8JEGn1RtR8SciAR3g"]} -{"Format": "IDEA0", "ID": "3caf50f5-cba7-4c9a-adf0-8b6f0a23944e", "DetectTime": "2023-10-30T14:07:38.174383+02:00", "EventTime": "2023-10-30T14:07:38.174400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CW6ykV35fDglCacPG"]} -{"Format": "IDEA0", "ID": "a4e216cc-1558-4740-837a-c18731105444", "DetectTime": "2023-10-30T14:07:38.191682+02:00", "EventTime": "2023-10-30T14:07:38.191704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVsea814zTRpb624fj"]} -{"Format": "IDEA0", "ID": "2e13bc99-20c8-4de5-8155-1c30a3548b98", "DetectTime": "2023-10-30T14:07:38.221306+02:00", "EventTime": "2023-10-30T14:07:38.221327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CoaTI24YavZkHxsLak"]} -{"Format": "IDEA0", "ID": "389d8562-fd12-470c-babb-fbda47f9dcd9", "DetectTime": "2023-10-30T14:07:38.243186+02:00", "EventTime": "2023-10-30T14:07:38.243198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CoKUW74lPfgRog1C3a"]} -{"Format": "IDEA0", "ID": "5417ebb7-964a-4bcf-b0f6-e8d7ff650925", "DetectTime": "2023-10-30T14:07:38.270968+02:00", "EventTime": "2023-10-30T14:07:38.270988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CCKSYK25S6WM2hSmHe"]} -{"Format": "IDEA0", "ID": "da0939ee-9299-4a97-b74b-9f7cb7a5c646", "DetectTime": "2023-10-30T14:07:38.297002+02:00", "EventTime": "2023-10-30T14:07:38.297019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CEEDJ92VkHAzvCzPWf"]} -{"Format": "IDEA0", "ID": "19e64db2-02f2-404e-a119-a82626c2ba60", "DetectTime": "2023-10-30T14:07:38.312563+02:00", "EventTime": "2023-10-30T14:07:38.312578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CxwYxg3LUvQRlKLZm1"]} -{"Format": "IDEA0", "ID": "5d42269d-40d2-4daf-a665-f81ed334357a", "DetectTime": "2023-10-30T14:07:38.327499+02:00", "EventTime": "2023-10-30T14:07:38.327515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["CIrftG39iBDtrmZxwl"]} -{"Format": "IDEA0", "ID": "9b8b3b4f-36ed-4bf4-b1f0-0a2c9589664c", "DetectTime": "2023-10-30T14:07:38.345622+02:00", "EventTime": "2023-10-30T14:07:38.345643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.75.245.104 ", "ContentType": "text/plain"}], "uids": ["CKEzzD42xXvHakvyAc"]} -{"Format": "IDEA0", "ID": "6deab358-6cb9-41ae-afdf-f10a2cc28195", "DetectTime": "2023-10-30T14:07:38.372267+02:00", "EventTime": "2023-10-30T14:07:38.372278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CJZsVd4O2l0Odz7dQ9"]} -{"Format": "IDEA0", "ID": "3ca49ad3-03bd-41ba-9f40-ec82f4e10eff", "DetectTime": "2023-10-30T14:07:38.385001+02:00", "EventTime": "2023-10-30T14:07:38.385016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CIrbDD1WvK9artrTEh"]} -{"Format": "IDEA0", "ID": "2b840551-03ac-4a03-b4af-790738d58218", "DetectTime": "2023-10-30T14:07:38.407722+02:00", "EventTime": "2023-10-30T14:07:38.407748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CwL7F14E5vXIOjY7gf"]} -{"Format": "IDEA0", "ID": "95ff8602-9851-4bd9-b0b9-ffa51a3ca3d9", "DetectTime": "2023-10-30T14:07:38.436377+02:00", "EventTime": "2023-10-30T14:07:38.436401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C76Rwc1fsepIRLOnS5"]} -{"Format": "IDEA0", "ID": "2ee49d6a-96a6-4999-81cc-46af0abf9e71", "DetectTime": "2023-10-30T14:07:38.454136+02:00", "EventTime": "2023-10-30T14:07:38.454156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CHt0Yto4ol5IilnQd"]} -{"Format": "IDEA0", "ID": "fdf2b34c-4566-4553-9be1-18cfc4a67a36", "DetectTime": "2023-10-30T14:07:38.476379+02:00", "EventTime": "2023-10-30T14:07:38.476392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cp1rDD19Qrq1ziHR21"]} -{"Format": "IDEA0", "ID": "6cc6f4aa-54ae-4e4b-a30d-936c760b0385", "DetectTime": "2023-10-30T14:07:38.494973+02:00", "EventTime": "2023-10-30T14:07:38.494989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C8KIQ92aYQRq5H9iY8"]} -{"Format": "IDEA0", "ID": "f943d098-23d2-4df8-be95-09cd4f69640b", "DetectTime": "2023-10-30T14:07:38.524811+02:00", "EventTime": "2023-10-30T14:07:38.524827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cz9UFL1JURR17Hvq8"]} -{"Format": "IDEA0", "ID": "86955add-fa8c-43d3-9740-b4512519a1ae", "DetectTime": "2023-10-30T14:07:38.540555+02:00", "EventTime": "2023-10-30T14:07:38.540570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CJa7d91k6Flsf2HKl"]} -{"Format": "IDEA0", "ID": "d2c55150-0e48-46aa-8d5b-b2c02f48a2c2", "DetectTime": "2023-10-30T14:07:38.565087+02:00", "EventTime": "2023-10-30T14:07:38.565104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["C11Uf11au9n8oJafVg"]} -{"Format": "IDEA0", "ID": "4abbc449-5a8b-4828-acbc-6bcf347a66f0", "DetectTime": "2023-10-30T14:07:38.583949+02:00", "EventTime": "2023-10-30T14:07:38.583966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C3e3xO3Jeby91oRlkc"]} -{"Format": "IDEA0", "ID": "097b66f9-260a-45ca-b2b9-d5c7a75e7ca9", "DetectTime": "2023-10-30T14:07:38.609135+02:00", "EventTime": "2023-10-30T14:07:38.609147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cvnr2b3LGLCUaxiWB5"]} -{"Format": "IDEA0", "ID": "081f3b5a-9c61-45dc-b514-db8dc620dd8d", "DetectTime": "2023-10-30T14:07:38.621338+02:00", "EventTime": "2023-10-30T14:07:38.621349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CxUZtS35svqPlfhry2"]} -{"Format": "IDEA0", "ID": "fefc24ba-7864-46a7-8228-b3e3bcbc0935", "DetectTime": "2023-10-30T14:07:38.637686+02:00", "EventTime": "2023-10-30T14:07:38.637697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C9gb363P4gLsg2peYg"]} -{"Format": "IDEA0", "ID": "c7dcd232-566c-4a93-acce-d7995fbe9e65", "DetectTime": "2023-10-30T14:07:38.652204+02:00", "EventTime": "2023-10-30T14:07:38.652223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["Ct1aBw2MzivDAhVc54"]} -{"Format": "IDEA0", "ID": "ede9dd19-f5df-4fa4-bb0d-0e28e9e05e0d", "DetectTime": "2023-10-30T14:07:38.669110+02:00", "EventTime": "2023-10-30T14:07:38.669131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CLWn9p4Ogf6pz6cxq8"]} -{"Format": "IDEA0", "ID": "4e63c02d-9135-4658-85b3-3892eabee2ab", "DetectTime": "2023-10-30T14:07:38.694438+02:00", "EventTime": "2023-10-30T14:07:38.694455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CS3XqN3y1EtFav19Ga"]} -{"Format": "IDEA0", "ID": "42005cda-7718-4cff-aaca-bc1f9e5d77fc", "DetectTime": "2023-10-30T14:07:38.717480+02:00", "EventTime": "2023-10-30T14:07:38.717498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CAX3Ys4brsbdSuWB3b"]} -{"Format": "IDEA0", "ID": "d927629a-b2f7-4626-905b-eff9970d8c06", "DetectTime": "2023-10-30T14:07:38.733343+02:00", "EventTime": "2023-10-30T14:07:38.733364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CTnSTk2fl00PU0Utfl"]} -{"Format": "IDEA0", "ID": "4b46b2e2-c4ef-4b44-b186-c55fe7da705f", "DetectTime": "2023-10-30T14:07:38.758381+02:00", "EventTime": "2023-10-30T14:07:38.758395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.82.66 ", "ContentType": "text/plain"}], "uids": ["CYpeEX22FHC9uq5Z9"]} -{"Format": "IDEA0", "ID": "5434cb83-8859-4dcf-8906-78053ffb2ecc", "DetectTime": "2023-10-30T14:07:38.780958+02:00", "EventTime": "2023-10-30T14:07:38.780974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C8Cbus2rdXVQi3wN3k"]} -{"Format": "IDEA0", "ID": "8d3e019b-7d69-43c9-879b-aa3209baf712", "DetectTime": "2023-10-30T14:07:38.803936+02:00", "EventTime": "2023-10-30T14:07:38.803957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["ChOD6P1lrX1rXP3Eii"]} -{"Format": "IDEA0", "ID": "973331b9-fadf-4aa2-804b-3708807ed307", "DetectTime": "2023-10-30T14:07:38.826513+02:00", "EventTime": "2023-10-30T14:07:38.826529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CciP273iB5knP2ErVk"]} -{"Format": "IDEA0", "ID": "83c1e043-f19c-4032-8f63-83ac8711e9d3", "DetectTime": "2023-10-30T14:07:38.847418+02:00", "EventTime": "2023-10-30T14:07:38.847435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C2alGNCphgJ59O96a"]} -{"Format": "IDEA0", "ID": "23dce8d1-0f51-4108-8cc7-426a7d32d214", "DetectTime": "2023-10-30T14:07:38.869868+02:00", "EventTime": "2023-10-30T14:07:38.869885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CzAAR01mpL3amOoqPc"]} -{"Format": "IDEA0", "ID": "a1db6f8d-7492-474a-a0f8-081a704b6912", "DetectTime": "2023-10-30T14:07:38.890194+02:00", "EventTime": "2023-10-30T14:07:38.890205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["ChfJiG1QVwF1kXQEd3"]} -{"Format": "IDEA0", "ID": "c99289ac-62d8-4a42-8d6e-ada1a639d942", "DetectTime": "2023-10-30T14:07:38.916921+02:00", "EventTime": "2023-10-30T14:07:38.916936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CUn3Vu2jxXm8VIxih4"]} -{"Format": "IDEA0", "ID": "855e49b5-4124-47db-a11a-218dcf93998a", "DetectTime": "2023-10-30T14:07:38.943873+02:00", "EventTime": "2023-10-30T14:07:38.943891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cn97vf39nxSD5zNSTb"]} -{"Format": "IDEA0", "ID": "1d8f8541-b394-4853-8121-d3d787f2d2cb", "DetectTime": "2023-10-30T14:07:38.967660+02:00", "EventTime": "2023-10-30T14:07:38.967682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.66.186.110 ", "ContentType": "text/plain"}], "uids": ["CuNxro4LOrcS3417n1"]} -{"Format": "IDEA0", "ID": "4727b7a1-b4e6-417e-8a93-cadb36ddb123", "DetectTime": "2023-10-30T14:07:38.994207+02:00", "EventTime": "2023-10-30T14:07:38.994220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["Cjrmvw4hQvUDlcO9g1"]} -{"Format": "IDEA0", "ID": "01e0cbb0-7805-4db3-8a90-cfb945906267", "DetectTime": "2023-10-30T14:07:39.014899+02:00", "EventTime": "2023-10-30T14:07:39.014919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["C5kiWg2JcZnSqcvkC3"]} -{"Format": "IDEA0", "ID": "c0cf4ee9-a890-4729-ad04-b14eb11f5998", "DetectTime": "2023-10-30T14:07:39.046135+02:00", "EventTime": "2023-10-30T14:07:39.046155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CLE38O1FfVBxRENcA8"]} -{"Format": "IDEA0", "ID": "dcb41400-0f8e-4d2c-91cd-18616ead6256", "DetectTime": "2023-10-30T14:07:39.077205+02:00", "EventTime": "2023-10-30T14:07:39.077222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["C89EJ51AjbFFywLMWi"]} -{"Format": "IDEA0", "ID": "c4a095fe-c96d-4772-953d-27eadb831c94", "DetectTime": "2023-10-30T14:07:39.100226+02:00", "EventTime": "2023-10-30T14:07:39.100245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CQ8PE636WETSm4w8Kg"]} -{"Format": "IDEA0", "ID": "9cc86f26-183f-4565-a223-a83718a18001", "DetectTime": "2023-10-30T14:07:39.122879+02:00", "EventTime": "2023-10-30T14:07:39.122897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CRpMt2OXwnrBhcv7"]} -{"Format": "IDEA0", "ID": "3416ab79-4ff6-4bb0-91c9-09cbd943dcca", "DetectTime": "2023-10-30T14:07:39.145790+02:00", "EventTime": "2023-10-30T14:07:39.145810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CPbmjLdPuSW2Ty9t2"]} -{"Format": "IDEA0", "ID": "4ddc8bf3-e1f2-40e7-83d2-fe3cf0d87520", "DetectTime": "2023-10-30T14:07:39.165922+02:00", "EventTime": "2023-10-30T14:07:39.165943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CKo2Ep2HjOEaX45kKg"]} -{"Format": "IDEA0", "ID": "2a7f77a3-ff47-439b-b1e1-b50764432fed", "DetectTime": "2023-10-30T14:07:39.178309+02:00", "EventTime": "2023-10-30T14:07:39.178323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CSqkttr1UogGssqr3"]} -{"Format": "IDEA0", "ID": "37edca89-f075-4484-8bdd-c2cb371fc799", "DetectTime": "2023-10-30T14:07:39.203028+02:00", "EventTime": "2023-10-30T14:07:39.203050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["CPjLRI3gJaxXumc1q7"]} -{"Format": "IDEA0", "ID": "7d572aea-e1a7-4416-ab96-a9590d19b72e", "DetectTime": "2023-10-30T14:07:39.229186+02:00", "EventTime": "2023-10-30T14:07:39.229206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C8QeWo4dNxiHAM8dg9"]} -{"Format": "IDEA0", "ID": "71f54c3d-7f2d-4613-91fc-5c76416c67e2", "DetectTime": "2023-10-30T14:07:39.252863+02:00", "EventTime": "2023-10-30T14:07:39.252883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CYG3bl3hZJN9tB7p24"]} -{"Format": "IDEA0", "ID": "40542ed6-912f-4546-994d-b0aa8b2642f0", "DetectTime": "2023-10-30T14:07:39.278608+02:00", "EventTime": "2023-10-30T14:07:39.278625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["Cqu1Ne3ivu9KWFcFra"]} -{"Format": "IDEA0", "ID": "6e76c09b-591e-4a42-aabe-d227571a936b", "DetectTime": "2023-10-30T14:07:39.307262+02:00", "EventTime": "2023-10-30T14:07:39.307284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C1a9it2j8ggt4sG6pg"]} -{"Format": "IDEA0", "ID": "a926d079-14c0-4130-8ce3-fc29d1e9da54", "DetectTime": "2023-10-30T14:07:39.335017+02:00", "EventTime": "2023-10-30T14:07:39.335034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGczgK2VrFWZJ9ZV64"]} -{"Format": "IDEA0", "ID": "4b4d4718-5d09-4bd3-a1ee-f1ddd06d1c01", "DetectTime": "2023-10-30T14:07:39.356114+02:00", "EventTime": "2023-10-30T14:07:39.356126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CdhxOc14AHednICfYi"]} -{"Format": "IDEA0", "ID": "ced3daea-fcde-4ce2-a276-bb4ac8cec1ac", "DetectTime": "2023-10-30T14:07:39.378640+02:00", "EventTime": "2023-10-30T14:07:39.378663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.75.245.104 ", "ContentType": "text/plain"}], "uids": ["C6ahjW2vcZPybj3zuc"]} -{"Format": "IDEA0", "ID": "370d6fd7-a0a3-4d21-9ed7-1847eddc2e25", "DetectTime": "2023-10-30T14:07:39.406607+02:00", "EventTime": "2023-10-30T14:07:39.406626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Csb5i83jnTHE5xnkU1"]} -{"Format": "IDEA0", "ID": "78950c34-e0e0-4f82-8414-285fd2b1367a", "DetectTime": "2023-10-30T14:07:39.430178+02:00", "EventTime": "2023-10-30T14:07:39.430189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C6lIkCSV6hYI0xdrj"]} -{"Format": "IDEA0", "ID": "b1878672-9052-4bac-9422-adc04aa357b8", "DetectTime": "2023-10-30T14:07:39.458738+02:00", "EventTime": "2023-10-30T14:07:39.458759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjWRTw4zUNaxoH4Umc"]} -{"Format": "IDEA0", "ID": "47e4b777-f616-44d6-935f-52665a373a76", "DetectTime": "2023-10-30T14:07:39.486619+02:00", "EventTime": "2023-10-30T14:07:39.486633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CesAQfVFXQgW7o2Be"]} -{"Format": "IDEA0", "ID": "3436bab5-9d6c-4e30-abe4-5eae4321ccbd", "DetectTime": "2023-10-30T14:07:39.514316+02:00", "EventTime": "2023-10-30T14:07:39.514329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["C5xpZ14G52SGnIDQvh"]} -{"Format": "IDEA0", "ID": "f174793f-5e2c-49f0-9b77-43c0f8547572", "DetectTime": "2023-10-30T14:07:39.540305+02:00", "EventTime": "2023-10-30T14:07:39.540321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Cd0Cwy1kWSQyIStAyh"]} -{"Format": "IDEA0", "ID": "ec05eba1-47a7-40ba-8d75-4ebe8a3896a3", "DetectTime": "2023-10-30T14:07:39.562162+02:00", "EventTime": "2023-10-30T14:07:39.562179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["CQriPX3EPhvUWLhV3c"]} -{"Format": "IDEA0", "ID": "54f9cba5-93ac-43ec-9605-8b1af918bde7", "DetectTime": "2023-10-30T14:07:39.586225+02:00", "EventTime": "2023-10-30T14:07:39.586248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CdYiHo1yoRRzvRRLK1"]} -{"Format": "IDEA0", "ID": "e78bfaa0-d6e1-4d93-9e63-28ba2ec99ee2", "DetectTime": "2023-10-30T14:07:39.610724+02:00", "EventTime": "2023-10-30T14:07:39.610740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CRkJvU12PdCT2ORXo7"]} -{"Format": "IDEA0", "ID": "a32c7b53-dedd-4eb3-b17c-a22d369d3630", "DetectTime": "2023-10-30T14:07:39.631914+02:00", "EventTime": "2023-10-30T14:07:39.631931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C9j5pw2YkxftjnKrMc"]} -{"Format": "IDEA0", "ID": "9a0e2044-2de4-4b80-b51a-844f27cab5da", "DetectTime": "2023-10-30T14:07:39.656689+02:00", "EventTime": "2023-10-30T14:07:39.656705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKqhsi4QwWgG8kPHW9"]} -{"Format": "IDEA0", "ID": "73365faf-88c6-428d-a584-4ea97b7ce678", "DetectTime": "2023-10-30T14:07:39.679118+02:00", "EventTime": "2023-10-30T14:07:39.679133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["Czo9zA3fs27FSkzf12"]} -{"Format": "IDEA0", "ID": "93f3316f-1330-47b5-b3f5-90f225b151e8", "DetectTime": "2023-10-30T14:07:39.699928+02:00", "EventTime": "2023-10-30T14:07:39.699940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.34.37 ", "ContentType": "text/plain"}], "uids": ["CxEiub4UiNQvMDK5k1"]} -{"Format": "IDEA0", "ID": "fa198626-655c-4d04-8ad9-ab54fcd92b96", "DetectTime": "2023-10-30T14:07:39.718148+02:00", "EventTime": "2023-10-30T14:07:39.718159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CoawWo2kT3DJFTLf4i"]} -{"Format": "IDEA0", "ID": "c52f06bc-8a06-4a07-a98e-021c548bf103", "DetectTime": "2023-10-30T14:07:39.743530+02:00", "EventTime": "2023-10-30T14:07:39.743541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["ChcCOH3GsZ4lGmV70l"]} -{"Format": "IDEA0", "ID": "78f8183b-e1a0-456e-a527-0d376043b829", "DetectTime": "2023-10-30T14:07:39.766697+02:00", "EventTime": "2023-10-30T14:07:39.766718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C4DFSF1kVD9oeZxVMa"]} -{"Format": "IDEA0", "ID": "9140660f-b0e4-4e79-85ed-3d51e444d7ad", "DetectTime": "2023-10-30T14:07:39.782541+02:00", "EventTime": "2023-10-30T14:07:39.782561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CD60SE2yWMUzFoHSb4"]} -{"Format": "IDEA0", "ID": "5bf3ddae-b89c-45bc-8b18-27ef25e2fc2e", "DetectTime": "2023-10-30T14:07:39.802561+02:00", "EventTime": "2023-10-30T14:07:39.802572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Co2PHl1hJ7Ws9SsTO1"]} -{"Format": "IDEA0", "ID": "d6e30262-aaa1-4ae9-9c1c-fc37375e788e", "DetectTime": "2023-10-30T14:07:39.825128+02:00", "EventTime": "2023-10-30T14:07:39.825144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRMGxy9YLltn2n14j"]} -{"Format": "IDEA0", "ID": "5def5fb1-3582-4eab-954c-9c53fdd17b55", "DetectTime": "2023-10-30T14:07:39.847339+02:00", "EventTime": "2023-10-30T14:07:39.847361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CyS8Y5477ziIsCdmga"]} -{"Format": "IDEA0", "ID": "081f2ca6-43ba-4b1a-b83e-23fd81d765cc", "DetectTime": "2023-10-30T14:07:39.874200+02:00", "EventTime": "2023-10-30T14:07:39.874221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CBUi7nlYUCYLUWmSe"]} -{"Format": "IDEA0", "ID": "c285acf8-2b9b-4610-9d2c-164dba15fe68", "DetectTime": "2023-10-30T14:07:39.902519+02:00", "EventTime": "2023-10-30T14:07:39.902535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CRRMC72lBkOrkFJFji"]} -{"Format": "IDEA0", "ID": "117bc41b-e838-417c-83b7-134c30f234ff", "DetectTime": "2023-10-30T14:07:39.917626+02:00", "EventTime": "2023-10-30T14:07:39.917641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["C6zUsDqVK0AGW1mvf"]} -{"Format": "IDEA0", "ID": "36cc23af-0184-4e2e-93f3-0f2fe9afce90", "DetectTime": "2023-10-30T14:07:39.937904+02:00", "EventTime": "2023-10-30T14:07:39.937918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkEMcX3xJdLLLkIo2j"]} -{"Format": "IDEA0", "ID": "6cf7748c-b48a-4073-b332-e2beff87b915", "DetectTime": "2023-10-30T14:07:39.949390+02:00", "EventTime": "2023-10-30T14:07:39.949404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CmyvmH2QRIx2bUJ73"]} -{"Format": "IDEA0", "ID": "ad20d1c4-93c4-4ec5-aaec-105dc73e4d57", "DetectTime": "2023-10-30T14:07:39.970523+02:00", "EventTime": "2023-10-30T14:07:39.970534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 1.23.68.2 ", "ContentType": "text/plain"}], "uids": ["CWJ70pB3we3n5xqm1"]} -{"Format": "IDEA0", "ID": "e8973050-8839-4ec9-b705-8e8eed6a02f4", "DetectTime": "2023-10-30T14:07:39.987215+02:00", "EventTime": "2023-10-30T14:07:39.987227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Chu51g25UddLgf06Jk"]} -{"Format": "IDEA0", "ID": "f6acfc53-a70a-45e1-a248-233aee054a21", "DetectTime": "2023-10-30T14:07:40.007297+02:00", "EventTime": "2023-10-30T14:07:40.007316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CoGpV31i1KotE16Lbh"]} -{"Format": "IDEA0", "ID": "156ca22f-f16d-43f1-8c79-11522a670bff", "DetectTime": "2023-10-30T14:07:40.029088+02:00", "EventTime": "2023-10-30T14:07:40.029104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CySdxlK9R0D8W12R2"]} -{"Format": "IDEA0", "ID": "525c6571-b97a-4cb0-a6c2-08dbd6c7b953", "DetectTime": "2023-10-30T14:07:40.057245+02:00", "EventTime": "2023-10-30T14:07:40.057265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CUYg9P1fRtPAamk6Q3"]} -{"Format": "IDEA0", "ID": "8b42671e-1d64-4157-b77c-23a2069cd8ba", "DetectTime": "2023-10-30T14:07:40.071572+02:00", "EventTime": "2023-10-30T14:07:40.071585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CiUO8M3CdEyF7CycY2"]} -{"Format": "IDEA0", "ID": "5a379a8a-e7fe-434d-a4d7-eaaf640b058a", "DetectTime": "2023-10-30T14:07:40.162352+02:00", "EventTime": "2023-10-30T14:07:40.162365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CNJvP92CBBZFKhatjh"]} -{"Format": "IDEA0", "ID": "7df17bbf-0479-4154-9983-d2935bde3c63", "DetectTime": "2023-10-30T14:07:40.179145+02:00", "EventTime": "2023-10-30T14:07:40.179157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CjDF5zTlH9WmGjrKj"]} -{"Format": "IDEA0", "ID": "379acea3-dec6-49b3-8616-ca08051cdd92", "DetectTime": "2023-10-30T14:07:40.207634+02:00", "EventTime": "2023-10-30T14:07:40.207649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.68.61 ", "ContentType": "text/plain"}], "uids": ["CMkwLa1dNQkEKZWqn9"]} -{"Format": "IDEA0", "ID": "bf255bbc-99ba-4f09-b753-e74dd64bddca", "DetectTime": "2023-10-30T14:07:40.232210+02:00", "EventTime": "2023-10-30T14:07:40.232227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CIU0Fe3e1Rkm7tfZX9"]} -{"Format": "IDEA0", "ID": "20039589-6d88-4bfa-9df4-af2af314f99e", "DetectTime": "2023-10-30T14:07:40.261047+02:00", "EventTime": "2023-10-30T14:07:40.261063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CylpTS3PSpTNXC0d0j"]} -{"Format": "IDEA0", "ID": "393db25d-12f1-4961-b4f1-9019068ef3ca", "DetectTime": "2023-10-30T14:07:40.288897+02:00", "EventTime": "2023-10-30T14:07:40.288908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["C12Fxr4Z4JfbnAsClg"]} -{"Format": "IDEA0", "ID": "a9305a42-d424-43fc-838a-8b6af6efd964", "DetectTime": "2023-10-30T14:07:40.309791+02:00", "EventTime": "2023-10-30T14:07:40.309802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["COflB238gbsGEzGIZ7"]} -{"Format": "IDEA0", "ID": "8d143d17-41f1-461f-9315-3c486969eb31", "DetectTime": "2023-10-30T14:07:40.323958+02:00", "EventTime": "2023-10-30T14:07:40.323975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CB7PF7SgWsmZhCuM6"]} -{"Format": "IDEA0", "ID": "ceb697f8-4ec9-43fe-93d5-8b340266b1f0", "DetectTime": "2023-10-30T14:07:40.348087+02:00", "EventTime": "2023-10-30T14:07:40.348103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C5qP2Z1RFROx1qt3nd"]} -{"Format": "IDEA0", "ID": "d951e156-2cb1-4dce-b615-06b0d27f1d33", "DetectTime": "2023-10-30T14:07:40.376305+02:00", "EventTime": "2023-10-30T14:07:40.376321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CVQ83wQOJsjG4kXF3"]} -{"Format": "IDEA0", "ID": "c2b0a65e-776d-46dc-a9c8-5cd24d6516e8", "DetectTime": "2023-10-30T14:07:40.408823+02:00", "EventTime": "2023-10-30T14:07:40.408840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CD3YfRUWXSePcqmtg"]} -{"Format": "IDEA0", "ID": "38b9f362-a4fb-4af5-8b5e-cbbbfb84388e", "DetectTime": "2023-10-30T14:07:40.436429+02:00", "EventTime": "2023-10-30T14:07:40.436441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CR1SFnbYBmBof9qJ6"]} -{"Format": "IDEA0", "ID": "51d176d2-f1d1-41c1-845e-52296d43b15d", "DetectTime": "2023-10-30T14:07:40.460602+02:00", "EventTime": "2023-10-30T14:07:40.460620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CDhpkz3FZ45NfDK3al"]} -{"Format": "IDEA0", "ID": "8bdb08d7-4547-46dd-a23d-04c7896fc6c7", "DetectTime": "2023-10-30T14:07:40.482073+02:00", "EventTime": "2023-10-30T14:07:40.482089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZt1cT1ldYnji19PB2"]} -{"Format": "IDEA0", "ID": "953337f5-4d1c-43ba-b55f-3ad481af0deb", "DetectTime": "2023-10-30T14:07:40.505886+02:00", "EventTime": "2023-10-30T14:07:40.505898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CsWvYMeCQSWluxDI8"]} -{"Format": "IDEA0", "ID": "ec776b10-7636-4578-abd8-d38463672318", "DetectTime": "2023-10-30T14:07:40.530810+02:00", "EventTime": "2023-10-30T14:07:40.530823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CTonY83BrsxXZLBnB9"]} -{"Format": "IDEA0", "ID": "4c4a5d39-79cf-4463-9b19-a20bc561d685", "DetectTime": "2023-10-30T14:07:40.546734+02:00", "EventTime": "2023-10-30T14:07:40.546746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CCAHZZIjBwL0S8ej"]} -{"Format": "IDEA0", "ID": "891fa228-1e51-4f9d-bb2d-1fb71e0df897", "DetectTime": "2023-10-30T14:07:40.573004+02:00", "EventTime": "2023-10-30T14:07:40.573028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CVDdwh4GgcAh2pXaUc"]} -{"Format": "IDEA0", "ID": "f3ba6927-25da-4af7-9c8f-a7ef8245d25d", "DetectTime": "2023-10-30T14:07:40.592995+02:00", "EventTime": "2023-10-30T14:07:40.593006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C5RpCLgAxNOd3uag5"]} -{"Format": "IDEA0", "ID": "7b66ed2b-7f56-40e1-beac-3ed9b3adeb32", "DetectTime": "2023-10-30T14:07:40.614493+02:00", "EventTime": "2023-10-30T14:07:40.614518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CeU9T2HI8pZSOcCyd"]} -{"Format": "IDEA0", "ID": "85d63351-5c7f-4910-b70d-6e40da3902f6", "DetectTime": "2023-10-30T14:07:40.638422+02:00", "EventTime": "2023-10-30T14:07:40.638439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CTktRv3BgutulelMh"]} -{"Format": "IDEA0", "ID": "7970f08d-b628-4101-829d-7861a2a7f156", "DetectTime": "2023-10-30T14:07:40.658057+02:00", "EventTime": "2023-10-30T14:07:40.658068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CiOi6L1wswkGrvWw5g"]} -{"Format": "IDEA0", "ID": "801b02b4-fc03-4414-9603-9a6a8fe726ea", "DetectTime": "2023-10-30T14:07:40.679775+02:00", "EventTime": "2023-10-30T14:07:40.679790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp1LFY1F6MSSrkDu4k"]} -{"Format": "IDEA0", "ID": "0aa40542-ef68-49d8-8225-f54feee91f40", "DetectTime": "2023-10-30T14:07:40.705297+02:00", "EventTime": "2023-10-30T14:07:40.705320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Clxlyu2X4T3nSeRhEk"]} -{"Format": "IDEA0", "ID": "9a3e287d-8472-4556-b3b2-f1e06a347e27", "DetectTime": "2023-10-30T14:07:40.724142+02:00", "EventTime": "2023-10-30T14:07:40.724153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CMqvBI21ZnTM2S6Mob"]} -{"Format": "IDEA0", "ID": "f0a15d4b-b353-4d46-b133-a53d09e72acc", "DetectTime": "2023-10-30T14:07:40.746317+02:00", "EventTime": "2023-10-30T14:07:40.746334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C5dGDM1kmAVkUC18Sh"]} -{"Format": "IDEA0", "ID": "16397863-ba49-4e1e-b943-eb6896f8e1dd", "DetectTime": "2023-10-30T14:07:40.772336+02:00", "EventTime": "2023-10-30T14:07:40.772348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["Cuv8L73HRLn3lC2gI4"]} -{"Format": "IDEA0", "ID": "f6d0a4c9-7b7a-4b22-a60b-84bee451bbe7", "DetectTime": "2023-10-30T14:07:40.795167+02:00", "EventTime": "2023-10-30T14:07:40.795186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CX7gVb3Z9YVBctRTn7"]} -{"Format": "IDEA0", "ID": "5d0f97d3-41dd-4308-b01e-2c2f11476745", "DetectTime": "2023-10-30T14:07:40.823996+02:00", "EventTime": "2023-10-30T14:07:40.824013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CYhn6u1yFeSkdwCjjk"]} -{"Format": "IDEA0", "ID": "bae40889-7a43-4e0f-a12e-8cc6bb3e255c", "DetectTime": "2023-10-30T14:07:40.852695+02:00", "EventTime": "2023-10-30T14:07:40.852711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["ChfEEgjxpnCOF3eFh"]} -{"Format": "IDEA0", "ID": "5c351078-9aeb-45ea-80f6-14a6bec2e862", "DetectTime": "2023-10-30T14:07:40.875051+02:00", "EventTime": "2023-10-30T14:07:40.875062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Cg30LFQTliZFyTYcf"]} -{"Format": "IDEA0", "ID": "4b55001b-ba45-42a0-b6fe-2435515dcd86", "DetectTime": "2023-10-30T14:07:40.896633+02:00", "EventTime": "2023-10-30T14:07:40.896651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPCFqv2vYvmYKm5t3l"]} -{"Format": "IDEA0", "ID": "84239025-221c-44ad-b029-9c8913182032", "DetectTime": "2023-10-30T14:07:40.926723+02:00", "EventTime": "2023-10-30T14:07:40.926740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CisDXw3A49O5CnSTgk"]} -{"Format": "IDEA0", "ID": "bf66d2c6-93d6-41a8-9173-953c27ec0490", "DetectTime": "2023-10-30T14:07:40.955616+02:00", "EventTime": "2023-10-30T14:07:40.955633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CIHnWY3LjGznC27Znk"]} -{"Format": "IDEA0", "ID": "be905d0f-8775-487a-8645-6c8c7205bb93", "DetectTime": "2023-10-30T14:07:40.981900+02:00", "EventTime": "2023-10-30T14:07:40.981927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CpXEve29YdTmD5JpU9"]} -{"Format": "IDEA0", "ID": "5b22fb00-78e8-458f-9a4e-67b51e35e7dc", "DetectTime": "2023-10-30T14:07:41.011014+02:00", "EventTime": "2023-10-30T14:07:41.011042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cj1jam2f3WduoDne9e"]} -{"Format": "IDEA0", "ID": "03aaad51-89cc-43c0-ac82-f24ebe7a9970", "DetectTime": "2023-10-30T14:07:41.040102+02:00", "EventTime": "2023-10-30T14:07:41.040124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["C7NSRO1PPLjtd9Z0X3"]} -{"Format": "IDEA0", "ID": "5d8ab404-e742-4680-acb3-d37027c07fbd", "DetectTime": "2023-10-30T14:07:41.069742+02:00", "EventTime": "2023-10-30T14:07:41.069759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CCdWAm2Ur2kTVR4N26"]} -{"Format": "IDEA0", "ID": "8bea1d2a-540e-448e-81cf-ef232f016fd8", "DetectTime": "2023-10-30T14:07:41.091624+02:00", "EventTime": "2023-10-30T14:07:41.091635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwDdXh388cjSbIz6gf"]} -{"Format": "IDEA0", "ID": "c0c896c8-ff36-4f58-9c78-7c7271998be9", "DetectTime": "2023-10-30T14:07:41.114940+02:00", "EventTime": "2023-10-30T14:07:41.114955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CUAbkG3uvo6LZfLbL2"]} -{"Format": "IDEA0", "ID": "00aff22f-173a-4d52-be7a-ee87a1635d91", "DetectTime": "2023-10-30T14:07:41.138401+02:00", "EventTime": "2023-10-30T14:07:41.138418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CVhDMA2ijrioqHeGK9"]} -{"Format": "IDEA0", "ID": "1fa177b4-1ca1-4181-a414-6ac35578f043", "DetectTime": "2023-10-30T14:07:41.166367+02:00", "EventTime": "2023-10-30T14:07:41.166384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["CushHI33yBa9TT5Vd2"]} -{"Format": "IDEA0", "ID": "f5467215-9bdb-430d-9c6f-99ae2970be69", "DetectTime": "2023-10-30T14:07:41.193483+02:00", "EventTime": "2023-10-30T14:07:41.193504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CGjKT03oanR4KPMpD7"]} -{"Format": "IDEA0", "ID": "b7eb0095-a959-4c87-bd47-02785692944b", "DetectTime": "2023-10-30T14:07:41.222656+02:00", "EventTime": "2023-10-30T14:07:41.222673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C3qNif4GZYa9gCaHr7"]} -{"Format": "IDEA0", "ID": "5a812045-440e-445e-95f2-12ded98b383c", "DetectTime": "2023-10-30T14:07:41.251861+02:00", "EventTime": "2023-10-30T14:07:41.251877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.214.0.19 ", "ContentType": "text/plain"}], "uids": ["Ce5vMC2E8rXbiB49V8"]} -{"Format": "IDEA0", "ID": "1d2d436e-ff15-4164-9a8d-02458b6022ef", "DetectTime": "2023-10-30T14:07:41.275760+02:00", "EventTime": "2023-10-30T14:07:41.275776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CvhSYd1l6im1GZP9kd"]} -{"Format": "IDEA0", "ID": "fd70328c-571a-47e5-9d3f-07e88242f5f2", "DetectTime": "2023-10-30T14:07:41.304610+02:00", "EventTime": "2023-10-30T14:07:41.304621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CV7wzw1O1lX80vBT39"]} -{"Format": "IDEA0", "ID": "3af0c7a9-a2da-4cc6-a5ec-2da700aec902", "DetectTime": "2023-10-30T14:07:41.320679+02:00", "EventTime": "2023-10-30T14:07:41.320696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CP2onc1NlhNUFot7S2"]} -{"Format": "IDEA0", "ID": "4b55660e-6bda-408b-a6c6-2675bebe0335", "DetectTime": "2023-10-30T14:07:41.342935+02:00", "EventTime": "2023-10-30T14:07:41.342952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CdpWug33bny8ZyPHhc"]} -{"Format": "IDEA0", "ID": "70bb7c3e-461c-4ee5-9b43-7ad7fd57dfbf", "DetectTime": "2023-10-30T14:07:41.366575+02:00", "EventTime": "2023-10-30T14:07:41.366602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.206.29.96 ", "ContentType": "text/plain"}], "uids": ["Cs61aZ1ZKJzjrFX7ae"]} -{"Format": "IDEA0", "ID": "7b5b430e-3c38-4ecb-85f1-3244e303dffd", "DetectTime": "2023-10-30T14:07:41.389220+02:00", "EventTime": "2023-10-30T14:07:41.389236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CZrryj1Z7GMBXKZRT5"]} -{"Format": "IDEA0", "ID": "083240b2-3d2d-4f80-bc33-5ebfb64c7f3a", "DetectTime": "2023-10-30T14:07:41.418106+02:00", "EventTime": "2023-10-30T14:07:41.418123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C6sYpZ1ZHnBI0dIhze"]} -{"Format": "IDEA0", "ID": "be743fbb-186b-4588-ab63-da7d5048c88e", "DetectTime": "2023-10-30T14:07:41.445316+02:00", "EventTime": "2023-10-30T14:07:41.445332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CunhV73uZZyNz3tKwi"]} -{"Format": "IDEA0", "ID": "341056c2-1463-4355-bcd1-81d7442f6492", "DetectTime": "2023-10-30T14:07:41.469928+02:00", "EventTime": "2023-10-30T14:07:41.469939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKA58w42EucicrerG7"]} -{"Format": "IDEA0", "ID": "5b53aea8-c652-429d-87eb-508850a68a79", "DetectTime": "2023-10-30T14:07:41.495484+02:00", "EventTime": "2023-10-30T14:07:41.495500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CouGyo2qfHp3afIjui"]} -{"Format": "IDEA0", "ID": "f8b27b31-8767-4dc1-9db8-bbdefc47d832", "DetectTime": "2023-10-30T14:07:41.517486+02:00", "EventTime": "2023-10-30T14:07:41.517503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CuOlTsOzPDC7isRx5"]} -{"Format": "IDEA0", "ID": "e612eefc-9bc5-4de0-96be-5f0deb0e5692", "DetectTime": "2023-10-30T14:07:41.540232+02:00", "EventTime": "2023-10-30T14:07:41.540248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CCPwO61ujcJW18PaUe"]} -{"Format": "IDEA0", "ID": "b7a1739d-e5d4-44e4-89d5-a683538aa3d6", "DetectTime": "2023-10-30T14:07:41.560906+02:00", "EventTime": "2023-10-30T14:07:41.560918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CFiFJkOcR8OLeXrR3"]} -{"Format": "IDEA0", "ID": "b7c85793-25e7-4f27-98eb-e38916d1594c", "DetectTime": "2023-10-30T14:07:41.583042+02:00", "EventTime": "2023-10-30T14:07:41.583054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cw8Kmx4TY45IvIaspl"]} -{"Format": "IDEA0", "ID": "ef1cab70-be03-4e92-92d1-de4c9e42e0fc", "DetectTime": "2023-10-30T14:07:41.604676+02:00", "EventTime": "2023-10-30T14:07:41.604697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cv6B704dxHCoxDBAyb"]} -{"Format": "IDEA0", "ID": "79d71547-bc92-4ca8-b665-08fc0f051670", "DetectTime": "2023-10-30T14:07:41.625409+02:00", "EventTime": "2023-10-30T14:07:41.625425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CdfP0a3wO0O8k2Odjf"]} -{"Format": "IDEA0", "ID": "49355863-9864-4d6e-a31b-8c42a5375f93", "DetectTime": "2023-10-30T14:07:41.647786+02:00", "EventTime": "2023-10-30T14:07:41.647805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["C6FqFf2cMfUne0zpf6"]} -{"Format": "IDEA0", "ID": "2014fa4e-a112-4b9e-b315-73ad531ce016", "DetectTime": "2023-10-30T14:07:41.665916+02:00", "EventTime": "2023-10-30T14:07:41.665936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXRgBoZI12o9tvTrc"]} -{"Format": "IDEA0", "ID": "5c2f5136-04e7-4b2e-a13d-d539b82ab24e", "DetectTime": "2023-10-30T14:07:41.684473+02:00", "EventTime": "2023-10-30T14:07:41.684485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C0LNAp4aWwlEhvikJj"]} -{"Format": "IDEA0", "ID": "4ebaeeff-86a1-440d-914b-f943dc36e038", "DetectTime": "2023-10-30T14:07:41.704556+02:00", "EventTime": "2023-10-30T14:07:41.704567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CvB53K2RwOvRypRiGi"]} -{"Format": "IDEA0", "ID": "c738a1ca-39d5-464a-9831-0878a7238b71", "DetectTime": "2023-10-30T14:07:41.722987+02:00", "EventTime": "2023-10-30T14:07:41.723000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["C0twWFtmliNRtE1yj"]} -{"Format": "IDEA0", "ID": "8f662685-08a6-46d6-adff-bd6b2c737e13", "DetectTime": "2023-10-30T14:07:41.740639+02:00", "EventTime": "2023-10-30T14:07:41.740656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CG8OBN1An5GjXmRxj"]} -{"Format": "IDEA0", "ID": "a65eaf8f-8ca7-461f-bc61-c37076d1db74", "DetectTime": "2023-10-30T14:07:41.758148+02:00", "EventTime": "2023-10-30T14:07:41.758159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CjLCxP13OkT21nIgC9"]} -{"Format": "IDEA0", "ID": "77fa042c-469d-4ff2-98c3-ff5431863754", "DetectTime": "2023-10-30T14:07:41.775648+02:00", "EventTime": "2023-10-30T14:07:41.775659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CG2a2X3kXiXPmDJ2l"]} -{"Format": "IDEA0", "ID": "3e574edf-a156-4205-8ae1-6c88045fca05", "DetectTime": "2023-10-30T14:07:41.793478+02:00", "EventTime": "2023-10-30T14:07:41.793490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["C23FtDuCZhZXkkAe"]} -{"Format": "IDEA0", "ID": "2515e903-d931-46f9-9b1d-a1b7264e8e6e", "DetectTime": "2023-10-30T14:07:41.811366+02:00", "EventTime": "2023-10-30T14:07:41.811377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CYyDvxHD75zGeoXKk"]} -{"Format": "IDEA0", "ID": "fd466bd5-26f4-4303-b01a-c57f43eb05f7", "DetectTime": "2023-10-30T14:07:41.831417+02:00", "EventTime": "2023-10-30T14:07:41.831435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Cpi62sq0eFYtoJ8ed"]} -{"Format": "IDEA0", "ID": "ab8fe299-0e0e-4b26-b1b1-19e0d665240f", "DetectTime": "2023-10-30T14:07:41.852753+02:00", "EventTime": "2023-10-30T14:07:41.852774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["COYIR31RD2bQmlE9fj"]} -{"Format": "IDEA0", "ID": "b977e4eb-5782-4654-bc1e-24e4cf89c44e", "DetectTime": "2023-10-30T14:07:41.878595+02:00", "EventTime": "2023-10-30T14:07:41.878613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C1aDf44NkjSesfgPPk"]} -{"Format": "IDEA0", "ID": "0cea5151-35aa-4f07-9244-513b06eb587d", "DetectTime": "2023-10-30T14:07:41.902149+02:00", "EventTime": "2023-10-30T14:07:41.902170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["Ckxhpa2bAkz7104EJa"]} -{"Format": "IDEA0", "ID": "4e50badb-953e-469e-9136-4f7ca11bb68e", "DetectTime": "2023-10-30T14:07:41.928262+02:00", "EventTime": "2023-10-30T14:07:41.928278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C4hc2i4Urq7kn112Hh"]} -{"Format": "IDEA0", "ID": "1c41c44a-ad18-43b7-b724-b47ac16919b8", "DetectTime": "2023-10-30T14:07:41.949459+02:00", "EventTime": "2023-10-30T14:07:41.949479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CAdBxwJub35GLXDU6"]} -{"Format": "IDEA0", "ID": "39106177-b98a-42c8-88d6-aa39e5f205b3", "DetectTime": "2023-10-30T14:07:41.978421+02:00", "EventTime": "2023-10-30T14:07:41.978440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["Cq4gSV1OtWKw6EZHNc"]} -{"Format": "IDEA0", "ID": "a4674707-c1da-4712-b353-b597adab6f71", "DetectTime": "2023-10-30T14:07:42.001963+02:00", "EventTime": "2023-10-30T14:07:42.001983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["CxMMR23mbfNsC7QQL6"]} -{"Format": "IDEA0", "ID": "89967f31-ef32-488b-a86c-4ee9e3f9d5c9", "DetectTime": "2023-10-30T14:07:42.030197+02:00", "EventTime": "2023-10-30T14:07:42.030216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["Cf7Pxs3MOknbphG6k2"]} -{"Format": "IDEA0", "ID": "39950836-8a43-4f6f-aaee-80f6490c8e6e", "DetectTime": "2023-10-30T14:07:42.051329+02:00", "EventTime": "2023-10-30T14:07:42.051344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Cx3ZQO1IyBAYF2h4ek"]} -{"Format": "IDEA0", "ID": "87fc9ff8-39c2-4a51-9c6b-0cbc827303af", "DetectTime": "2023-10-30T14:07:42.072939+02:00", "EventTime": "2023-10-30T14:07:42.072950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CZKrFe3XYiyW8OMzmc"]} -{"Format": "IDEA0", "ID": "0501c2c6-1abb-464a-a9b6-736a92efcc4a", "DetectTime": "2023-10-30T14:07:42.093393+02:00", "EventTime": "2023-10-30T14:07:42.093413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CGQ63f2URkmsKKCVP4"]} -{"Format": "IDEA0", "ID": "51f55621-d13d-4c26-af0e-079dea115baa", "DetectTime": "2023-10-30T14:07:42.116591+02:00", "EventTime": "2023-10-30T14:07:42.116611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXmuT51q6PUpsnDc8g"]} -{"Format": "IDEA0", "ID": "e039284c-1db4-47ca-973d-5c714ed09c73", "DetectTime": "2023-10-30T14:07:42.140284+02:00", "EventTime": "2023-10-30T14:07:42.140304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C54RTCJw6R0ivf4Ld"]} -{"Format": "IDEA0", "ID": "73a3bc1d-89cd-4d25-acce-f02dbcc52510", "DetectTime": "2023-10-30T14:07:42.169315+02:00", "EventTime": "2023-10-30T14:07:42.169331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Ccfx3u2LaQ6meEfN5f"]} -{"Format": "IDEA0", "ID": "4c9d9431-2f6b-468e-87f9-afb4414f57ec", "DetectTime": "2023-10-30T14:07:42.191229+02:00", "EventTime": "2023-10-30T14:07:42.191244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQVsk21G0sjLBWQla9"]} -{"Format": "IDEA0", "ID": "09266485-dac2-45fb-8914-a98c3806b266", "DetectTime": "2023-10-30T14:07:42.213490+02:00", "EventTime": "2023-10-30T14:07:42.213510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.58.24 ", "ContentType": "text/plain"}], "uids": ["C5xsLS14z2Fgcu9jgk"]} -{"Format": "IDEA0", "ID": "edb05597-549b-481c-bca5-78df2fb00e99", "DetectTime": "2023-10-30T14:07:42.237200+02:00", "EventTime": "2023-10-30T14:07:42.237213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CckcCJwtAo8VEPPuf"]} -{"Format": "IDEA0", "ID": "52c94973-fd0b-4b93-b59b-cd08e481cb99", "DetectTime": "2023-10-30T14:07:42.257939+02:00", "EventTime": "2023-10-30T14:07:42.257955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGNP1x1LVZNW6PkfE9"]} -{"Format": "IDEA0", "ID": "55bf97fc-4dae-4771-aa6f-3c0cb1c7e14f", "DetectTime": "2023-10-30T14:07:42.283037+02:00", "EventTime": "2023-10-30T14:07:42.283050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CGOahTRd9lUuNuCXf"]} -{"Format": "IDEA0", "ID": "f29b0b60-725f-4bc3-857c-ce53f9e2b7d7", "DetectTime": "2023-10-30T14:07:42.300540+02:00", "EventTime": "2023-10-30T14:07:42.300552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CqicyNfDJ4fatwT34"]} -{"Format": "IDEA0", "ID": "98b5404e-15d9-4478-ad35-99d6aa1a3288", "DetectTime": "2023-10-30T14:07:42.326763+02:00", "EventTime": "2023-10-30T14:07:42.326795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14298], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CMx37h3XWyEHBFFZRb"]} -{"Format": "IDEA0", "ID": "b19cc557-7849-46db-9b30-fc819b2c2fa3", "DetectTime": "2023-10-30T14:07:42.356019+02:00", "EventTime": "2023-10-30T14:07:42.356033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C5nhz5acY9r2yOhqb"]} -{"Format": "Json", "ID": "b19cc557-7849-46db-9b30-fc819b2c2fa3", "DetectTime": "2023-10-30T14:07:42.356019+02:00", "EventTime": "2023-10-30T14:07:42.356033+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T09:32:09.351010+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:42.415633)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7ce24bac-0084-40e0-98e3-0a0edc48c673", "DetectTime": "2023-10-30T14:07:42.420175+02:00", "EventTime": "2023-10-30T14:07:42.420191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["C12y3k1WS48ruJkQP1"]} -{"Format": "IDEA0", "ID": "03c4865c-4c77-452c-82a5-7e953ac3e653", "DetectTime": "2023-10-30T14:07:42.444754+02:00", "EventTime": "2023-10-30T14:07:42.444770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C5i1nC1fnWim2mavI"]} -{"Format": "IDEA0", "ID": "d760c8dc-e010-45c4-9fee-24ba07baf320", "DetectTime": "2023-10-30T14:07:42.470445+02:00", "EventTime": "2023-10-30T14:07:42.470470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CPIA914NUYj79I2skh"]} -{"Format": "IDEA0", "ID": "8a507371-f166-40d2-ba36-7ff82e1feba1", "DetectTime": "2023-10-30T14:07:42.496323+02:00", "EventTime": "2023-10-30T14:07:42.496345+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CSwyfd1V1k4TcSMc59"]} -{"Format": "IDEA0", "ID": "a84417bb-3b8d-4e07-af1c-3de77f13b709", "DetectTime": "2023-10-30T14:07:42.527399+02:00", "EventTime": "2023-10-30T14:07:42.527415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19662], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. ", "ContentType": "text/plain"}], "uids": ["CSJjc13HuPcwiRHSr1"]} -{"Format": "IDEA0", "ID": "c32d6c7c-b14a-4f73-a7c1-355e7ac41fbc", "DetectTime": "2023-10-30T14:07:42.551368+02:00", "EventTime": "2023-10-30T14:07:42.551385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cl0iiOziWvAdVxKrl"]} -{"Format": "IDEA0", "ID": "b3ba59db-0242-4764-b77c-6a206e945a3d", "DetectTime": "2023-10-30T14:07:42.575327+02:00", "EventTime": "2023-10-30T14:07:42.575339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CWSLCV3afa8ZRGQkre"]} -{"Format": "IDEA0", "ID": "3874b4eb-fc69-4de2-9941-0dfec89ef5c7", "DetectTime": "2023-10-30T14:07:42.594806+02:00", "EventTime": "2023-10-30T14:07:42.594818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CtzYvB3KfZ8rKOLw0f"]} -{"Format": "IDEA0", "ID": "8892d93d-ced9-4e9b-a22b-81994729128a", "DetectTime": "2023-10-30T14:07:42.614000+02:00", "EventTime": "2023-10-30T14:07:42.614011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CoER3o4kbSXwCG3XBg"]} -{"Format": "Json", "ID": "8892d93d-ced9-4e9b-a22b-81994729128a", "DetectTime": "2023-10-30T14:07:42.614000+02:00", "EventTime": "2023-10-30T14:07:42.614011+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T09:32:12.085278+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2023/10/30 14:07:42.668682)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eddbd06e-6be7-401b-8a04-c3a31ab93259", "DetectTime": "2023-10-30T14:07:42.673014+02:00", "EventTime": "2023-10-30T14:07:42.673026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CttwdxqhnDtnKJwVh"]} -{"Format": "IDEA0", "ID": "193adca7-d6da-4a6a-82de-f9837ae55a5b", "DetectTime": "2023-10-30T14:07:42.695722+02:00", "EventTime": "2023-10-30T14:07:42.695744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["C6yQ2V3nLlCAsScx8h"]} -{"Format": "IDEA0", "ID": "b460dd64-7479-4c80-8d62-a7df86661637", "DetectTime": "2023-10-30T14:07:42.720246+02:00", "EventTime": "2023-10-30T14:07:42.720267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Co2pm24ORsjC7ulDZi"]} -{"Format": "IDEA0", "ID": "78dd9b32-201b-49ba-8f67-85d94ed9d011", "DetectTime": "2023-10-30T14:07:42.744239+02:00", "EventTime": "2023-10-30T14:07:42.744258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CmwWe44idPAduA03Mk"]} -{"Format": "IDEA0", "ID": "5600cb49-ad7e-4b7e-b86e-5f9582a74d23", "DetectTime": "2023-10-30T14:07:42.762443+02:00", "EventTime": "2023-10-30T14:07:42.762455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CLEacH37apka64VuDi"]} -{"Format": "IDEA0", "ID": "8d5bcf39-0078-4619-9580-ab8a0a6df238", "DetectTime": "2023-10-30T14:07:42.781135+02:00", "EventTime": "2023-10-30T14:07:42.781155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C8ZE5O3JHImuk8RENi"]} -{"Format": "IDEA0", "ID": "6ef35221-ad1a-4cd5-a263-e7530f266d2c", "DetectTime": "2023-10-30T14:07:42.796648+02:00", "EventTime": "2023-10-30T14:07:42.796658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpeWv322E0L9dGFBM6"]} -{"Format": "IDEA0", "ID": "49eebfae-f30e-458e-8fe8-e0d57c97655c", "DetectTime": "2023-10-30T14:07:42.819328+02:00", "EventTime": "2023-10-30T14:07:42.819349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C1qqSX3jRByGe31jB9"]} -{"Format": "IDEA0", "ID": "707fb81e-e99d-47e4-beb6-657ae1ef3683", "DetectTime": "2023-10-30T14:07:42.841357+02:00", "EventTime": "2023-10-30T14:07:42.841369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C5rSd92FXNuOSb0Dr8"]} -{"Format": "IDEA0", "ID": "9646c181-9323-40b3-b353-0cb997a78da9", "DetectTime": "2023-10-30T14:07:42.880480+02:00", "EventTime": "2023-10-30T14:07:42.880497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CplQlt1SITsMu9GuXi"]} -{"Format": "IDEA0", "ID": "4af1873e-e428-45df-a337-4838df930c9c", "DetectTime": "2023-10-30T14:07:42.921372+02:00", "EventTime": "2023-10-30T14:07:42.921388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CuUT5i1vpEiPGCbay1"]} -{"Format": "IDEA0", "ID": "e847c3b4-0de4-4a4a-9e7a-2e875cd951e0", "DetectTime": "2023-10-30T14:07:42.964981+02:00", "EventTime": "2023-10-30T14:07:42.964996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cz7EfGNCv4dRSjqHe"]} -{"Format": "IDEA0", "ID": "1865c94d-25af-443a-b157-4b09266c64b2", "DetectTime": "2023-10-30T14:07:43.001280+02:00", "EventTime": "2023-10-30T14:07:43.001291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ChFSRH24LIR1bKkard"]} -{"Format": "IDEA0", "ID": "b55d1019-cd67-49c0-9875-52b6c5f036d4", "DetectTime": "2023-10-30T14:07:43.043095+02:00", "EventTime": "2023-10-30T14:07:43.043113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C3Xx6a1oymNHfvgPVg"]} -{"Format": "Json", "ID": "b55d1019-cd67-49c0-9875-52b6c5f036d4", "DetectTime": "2023-10-30T14:07:43.043095+02:00", "EventTime": "2023-10-30T14:07:43.043113+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T10:02:21.698924+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:43.141905)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c0349ee-5d24-49ae-a4cd-27f3225215fe", "DetectTime": "2023-10-30T14:07:43.146022+02:00", "EventTime": "2023-10-30T14:07:43.146034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CTgDCFIskag6SaPGc"]} -{"Format": "IDEA0", "ID": "73d2b71d-c443-4da8-afa8-d3572f7f91c1", "DetectTime": "2023-10-30T14:07:43.246424+02:00", "EventTime": "2023-10-30T14:07:43.246446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C0BS852QvdGm6719Q8"]} -{"Format": "IDEA0", "ID": "b49028c3-25da-4480-92ae-f2428a4efeb7", "DetectTime": "2023-10-30T14:07:43.287973+02:00", "EventTime": "2023-10-30T14:07:43.287989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Ckq3Gs2wpV201Adhfb"]} -{"Format": "IDEA0", "ID": "52d49c39-1943-410b-9ff3-e9c0ac058b98", "DetectTime": "2023-10-30T14:07:43.329832+02:00", "EventTime": "2023-10-30T14:07:43.329844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C2A1i1W2mtlDYCRqi"]} -{"Format": "IDEA0", "ID": "eaa66e15-6208-413b-8578-943e59e615f6", "DetectTime": "2023-10-30T14:07:43.367718+02:00", "EventTime": "2023-10-30T14:07:43.367729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbQX8x1LeHyOImT4Dl"]} -{"Format": "IDEA0", "ID": "bf8eb06a-7a15-4f6f-aa87-1122dfe9030d", "DetectTime": "2023-10-30T14:07:43.401972+02:00", "EventTime": "2023-10-30T14:07:43.401983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CLstSgeNVCYodcf5k"]} -{"Format": "IDEA0", "ID": "d69c768f-cae8-48ca-b040-15016af194e5", "DetectTime": "2023-10-30T14:07:43.443058+02:00", "EventTime": "2023-10-30T14:07:43.443073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CulYQb3MqeQTywegec"]} -{"Format": "IDEA0", "ID": "82e9ff84-a125-469c-bf54-b4914e684ac5", "DetectTime": "2023-10-30T14:07:43.479748+02:00", "EventTime": "2023-10-30T14:07:43.479764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CN36nm3aMxZmkFowc8"]} -{"Format": "Json", "ID": "82e9ff84-a125-469c-bf54-b4914e684ac5", "DetectTime": "2023-10-30T14:07:43.479748+02:00", "EventTime": "2023-10-30T14:07:43.479764+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T10:02:23.673147+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:43.559457)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7506bccd-e033-4f94-bcef-ce5d041a6811", "DetectTime": "2023-10-30T14:07:43.564932+02:00", "EventTime": "2023-10-30T14:07:43.564949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C5P4Ir1eMOCaHiV9ge"]} -{"Format": "IDEA0", "ID": "e22a4a61-9e49-4e41-a1f4-5890085c129e", "DetectTime": "2023-10-30T14:07:43.605090+02:00", "EventTime": "2023-10-30T14:07:43.605106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C8vUxQLoL5jhnekP1"]} -{"Format": "IDEA0", "ID": "81074d07-39ae-4d91-b2d1-a9cacc675fe9", "DetectTime": "2023-10-30T14:07:43.644845+02:00", "EventTime": "2023-10-30T14:07:43.644857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CaGJgo4fmDV6N1ojK9"]} -{"Format": "IDEA0", "ID": "ea0ce0d0-b271-45a3-8f22-213ac88bf4f7", "DetectTime": "2023-10-30T14:07:43.687971+02:00", "EventTime": "2023-10-30T14:07:43.687987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CgSXj83qJ5GQlZsSCe"]} -{"Format": "IDEA0", "ID": "24f3b58e-916b-4d95-9c5e-99417210d5b6", "DetectTime": "2023-10-30T14:07:43.730953+02:00", "EventTime": "2023-10-30T14:07:43.730966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CBPmbJ3kjhxm4Ji7ig"]} -{"Format": "IDEA0", "ID": "9d304074-16dd-4334-95ce-eda620ea1cb4", "DetectTime": "2023-10-30T14:07:43.763967+02:00", "EventTime": "2023-10-30T14:07:43.763978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["Cui70Z1b5NycwAwlf8"]} -{"Format": "IDEA0", "ID": "4f10ec45-43b6-43b2-824b-bba7aa857d7d", "DetectTime": "2023-10-30T14:07:43.802737+02:00", "EventTime": "2023-10-30T14:07:43.802755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CIoxop3aytj6Arh5o9"]} -{"Format": "IDEA0", "ID": "1cccc09b-1ac2-49a5-9e53-9b30c6dbd211", "DetectTime": "2023-10-30T14:07:43.840322+02:00", "EventTime": "2023-10-30T14:07:43.840343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CJDi7B3JE3t6myBcvh"]} -{"Format": "Json", "ID": "1cccc09b-1ac2-49a5-9e53-9b30c6dbd211", "DetectTime": "2023-10-30T14:07:43.840322+02:00", "EventTime": "2023-10-30T14:07:43.840343+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T10:03:16.574344+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:43.918407)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0ec8bc5a-7013-4483-be25-a3ac023a4e51", "DetectTime": "2023-10-30T14:07:43.924102+02:00", "EventTime": "2023-10-30T14:07:43.924118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Ciieux4xqPBYtfu6Rl"]} -{"Format": "IDEA0", "ID": "8d37407b-dd63-455c-93d5-21bfd03fe116", "DetectTime": "2023-10-30T14:07:43.964167+02:00", "EventTime": "2023-10-30T14:07:43.964184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CPebLz2wpJk4AjiUa4"]} -{"Format": "IDEA0", "ID": "64842e1f-85c8-4baf-afff-70ab4f965d77", "DetectTime": "2023-10-30T14:07:44.001776+02:00", "EventTime": "2023-10-30T14:07:44.001806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CIktrT2kNYXkiZXTX7"]} -{"Format": "IDEA0", "ID": "daae05ce-b2d6-4190-bdd4-86f47d5505ec", "DetectTime": "2023-10-30T14:07:44.035627+02:00", "EventTime": "2023-10-30T14:07:44.035644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CCiETVlbspaNRia36"]} -{"Format": "IDEA0", "ID": "e77ebac0-63dd-4d9e-9234-8d56fdfad78f", "DetectTime": "2023-10-30T14:07:44.069375+02:00", "EventTime": "2023-10-30T14:07:44.069391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CuFcf77MTnTtnAfic"]} -{"Format": "IDEA0", "ID": "81729ee4-1fb8-40a2-ad90-915ec7e34dfa", "DetectTime": "2023-10-30T14:07:44.104104+02:00", "EventTime": "2023-10-30T14:07:44.104124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cd4kqT1eH8ljZJq0X5"]} -{"Format": "IDEA0", "ID": "c9b421b7-217b-4480-bebe-8426b19ce7b7", "DetectTime": "2023-10-30T14:07:44.141674+02:00", "EventTime": "2023-10-30T14:07:44.141690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CO9aAI3rqAjuz14Qz3"]} -{"Format": "IDEA0", "ID": "d4a94d32-a19f-4664-acf3-f837060ea505", "DetectTime": "2023-10-30T14:07:44.178454+02:00", "EventTime": "2023-10-30T14:07:44.178472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27555], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 27555/TCP destination IP 77.50.112.98. ", "ContentType": "text/plain"}], "uids": ["CGxAsgCmddCrPzAAc"]} -{"Format": "Json", "ID": "d4a94d32-a19f-4664-acf3-f837060ea505", "DetectTime": "2023-10-30T14:07:44.178454+02:00", "EventTime": "2023-10-30T14:07:44.178472+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27555], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-05T10:14:16.931712+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:44.254936)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b3d7fcfb-e5bb-4fc9-89c8-01f5668e641c", "DetectTime": "2023-10-30T14:07:44.264948+02:00", "EventTime": "2023-10-30T14:07:44.264970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [23394], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 23394/TCP destination IP 46.48.220.55. ", "ContentType": "text/plain"}], "uids": ["CdPhUf41TRfdSmEgal"]} -{"Format": "IDEA0", "ID": "391a14b4-16e7-4109-bc69-6ae97ac6bdb2", "DetectTime": "2023-10-30T14:07:44.304215+02:00", "EventTime": "2023-10-30T14:07:44.304235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C7GpTz1uwsxYX6Fvcl"]} -{"Format": "IDEA0", "ID": "a6373700-92a7-424a-b4f2-bb5d72c9369c", "DetectTime": "2023-10-30T14:07:44.343086+02:00", "EventTime": "2023-10-30T14:07:44.343107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cu5ZPe2UJJpbWP6iZ1"]} -{"Format": "IDEA0", "ID": "30e49535-f474-45fe-bb48-8ad74359d257", "DetectTime": "2023-10-30T14:07:44.380089+02:00", "EventTime": "2023-10-30T14:07:44.380106+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CTQmVa15frCorljava"]} -{"Format": "IDEA0", "ID": "12f0d243-5eb0-441a-9aa7-2f5dee22725d", "DetectTime": "2023-10-30T14:07:44.412116+02:00", "EventTime": "2023-10-30T14:07:44.412137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C8CVLrUlqh3xTKCDl"]} -{"Format": "IDEA0", "ID": "e78876ad-7c4f-49b7-9de7-7e275bbdb8cb", "DetectTime": "2023-10-30T14:07:44.443825+02:00", "EventTime": "2023-10-30T14:07:44.443843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CTyxWx3PJKGKfMRddc"]} -{"Format": "IDEA0", "ID": "72469645-a726-490e-8ba8-0e1842ccc4bb", "DetectTime": "2023-10-30T14:07:44.480197+02:00", "EventTime": "2023-10-30T14:07:44.480216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CpSv9N262BumNpJHIg"]} -{"Format": "IDEA0", "ID": "bbea136f-fdc5-4a41-83cf-8fe31ef2c98d", "DetectTime": "2023-10-30T14:07:44.512841+02:00", "EventTime": "2023-10-30T14:07:44.512861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CLKX8U2zlahi5iPk25"]} -{"Format": "IDEA0", "ID": "3268b085-3a1f-4e95-b6dc-430167290bcd", "DetectTime": "2023-10-30T14:07:44.547852+02:00", "EventTime": "2023-10-30T14:07:44.547869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C9AEVO3BTfF62NuJX1"]} -{"Format": "Json", "ID": "3268b085-3a1f-4e95-b6dc-430167290bcd", "DetectTime": "2023-10-30T14:07:44.547852+02:00", "EventTime": "2023-10-30T14:07:44.547869+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T10:34:39.000679+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:44.619504)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a5c4f567-99af-4407-a8ee-fcde24635175", "DetectTime": "2023-10-30T14:07:44.625222+02:00", "EventTime": "2023-10-30T14:07:44.625239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CiUL3c3LrUvHWyjxWj"]} -{"Format": "IDEA0", "ID": "71f18648-902f-4e1b-aab4-9a091b4934b4", "DetectTime": "2023-10-30T14:07:44.659322+02:00", "EventTime": "2023-10-30T14:07:44.659339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmHIiuRHiyYElOnvj"]} -{"Format": "IDEA0", "ID": "50bdb896-f62b-4e77-b6fb-9cddeb02deac", "DetectTime": "2023-10-30T14:07:44.688527+02:00", "EventTime": "2023-10-30T14:07:44.688541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CuNCp2e4TXyAJgIrc"]} -{"Format": "IDEA0", "ID": "cfbcad04-e05c-487e-8aaf-88cd7aaff86d", "DetectTime": "2023-10-30T14:07:44.717398+02:00", "EventTime": "2023-10-30T14:07:44.717411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cq3lCO8HouHoHhJ23"]} -{"Format": "IDEA0", "ID": "f666287d-17e2-4fb8-98d8-7e39132684b9", "DetectTime": "2023-10-30T14:07:44.745516+02:00", "EventTime": "2023-10-30T14:07:44.745532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["C50YLE1PM08xWu232l"]} -{"Format": "IDEA0", "ID": "62b7a3e8-6263-4fe5-b29b-7692b67c92e1", "DetectTime": "2023-10-30T14:07:44.770970+02:00", "EventTime": "2023-10-30T14:07:44.770982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CcpEcv40DVpyGaZU21"]} -{"Format": "IDEA0", "ID": "25d40490-a6e8-4f65-a817-de4b236f5918", "DetectTime": "2023-10-30T14:07:44.796266+02:00", "EventTime": "2023-10-30T14:07:44.796276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Co5r5q20prj0NCH6sj"]} -{"Format": "IDEA0", "ID": "9aeee727-dd95-40d8-8ed4-98a2c5224a03", "DetectTime": "2023-10-30T14:07:44.826492+02:00", "EventTime": "2023-10-30T14:07:44.826508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C1Awjn1EsYc9yJnyij"]} -{"Format": "Json", "ID": "9aeee727-dd95-40d8-8ed4-98a2c5224a03", "DetectTime": "2023-10-30T14:07:44.826492+02:00", "EventTime": "2023-10-30T14:07:44.826508+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T10:34:41.123347+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:44.894544)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "97e4999f-5b84-4031-a6e2-9cf7546f388f", "DetectTime": "2023-10-30T14:07:44.899768+02:00", "EventTime": "2023-10-30T14:07:44.899783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C5P346QmPrTH4JZD5"]} -{"Format": "IDEA0", "ID": "90ae0e59-8cdb-4eb6-a8d8-02c7c06e309e", "DetectTime": "2023-10-30T14:07:44.925833+02:00", "EventTime": "2023-10-30T14:07:44.925850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CbSb4A4gVnsOYZpbrd"]} -{"Format": "IDEA0", "ID": "a109e4bf-8ce3-40dc-8573-850415bd811e", "DetectTime": "2023-10-30T14:07:44.953443+02:00", "EventTime": "2023-10-30T14:07:44.953459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CIrmzf370hKkzPUcRd"]} -{"Format": "IDEA0", "ID": "8133b3de-042e-4b45-b1af-d153f3629489", "DetectTime": "2023-10-30T14:07:44.977275+02:00", "EventTime": "2023-10-30T14:07:44.977287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CCrvOe4TsUTYDV9tG5"]} -{"Format": "IDEA0", "ID": "aa322d33-c1f7-49de-888b-3ef7263fd810", "DetectTime": "2023-10-30T14:07:45.002540+02:00", "EventTime": "2023-10-30T14:07:45.002556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CtGf1lA1uoXnqD9Jh"]} -{"Format": "IDEA0", "ID": "624f127d-48fb-4108-bb4f-dcf6c79b57d3", "DetectTime": "2023-10-30T14:07:45.026095+02:00", "EventTime": "2023-10-30T14:07:45.026109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CHBvJi4kiKWOJJaKRc"]} -{"Format": "IDEA0", "ID": "4fbe812e-3d8c-4f27-b3da-71ea054a9df0", "DetectTime": "2023-10-30T14:07:45.050284+02:00", "EventTime": "2023-10-30T14:07:45.050295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CFdKYR1D0fj6iNzud2"]} -{"Format": "IDEA0", "ID": "ef4d7cab-848b-47a5-98d6-7608378fe862", "DetectTime": "2023-10-30T14:07:45.072505+02:00", "EventTime": "2023-10-30T14:07:45.072516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["C2vhje2Z3QRueclpqk"]} -{"Format": "Json", "ID": "ef4d7cab-848b-47a5-98d6-7608378fe862", "DetectTime": "2023-10-30T14:07:45.072505+02:00", "EventTime": "2023-10-30T14:07:45.072516+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T10:34:43.961667+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2023/10/30 14:07:45.130977)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4de3e522-c84d-4154-b411-80a00d11dcce", "DetectTime": "2023-10-30T14:07:45.135946+02:00", "EventTime": "2023-10-30T14:07:45.135964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CTZZ6TQ7YCDGYDwRg"]} -{"Format": "IDEA0", "ID": "ac96f01d-d3dc-4393-a428-e54cabb6ba52", "DetectTime": "2023-10-30T14:07:45.241381+02:00", "EventTime": "2023-10-30T14:07:45.241398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C1na7y3ohj1CyILvW2"]} -{"Format": "IDEA0", "ID": "c33c4cbc-4b96-48bb-9ed2-358c33090257", "DetectTime": "2023-10-30T14:07:45.270511+02:00", "EventTime": "2023-10-30T14:07:45.270540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CHuULZ1q7f5o4Q8AX7"]} -{"Format": "IDEA0", "ID": "c4b785e2-b17b-4fa0-9a40-9323f35d1c8c", "DetectTime": "2023-10-30T14:07:45.297179+02:00", "EventTime": "2023-10-30T14:07:45.297191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CWEZmJ1tKSSxnatUd6"]} -{"Format": "IDEA0", "ID": "200fd57b-0aea-4326-b9ed-722f1e69f583", "DetectTime": "2023-10-30T14:07:45.323588+02:00", "EventTime": "2023-10-30T14:07:45.323603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CfyXiJ33dnUasNhXE4"]} -{"Format": "IDEA0", "ID": "4cb435cc-aa90-4922-8b2a-494d3611a0ac", "DetectTime": "2023-10-30T14:07:45.351933+02:00", "EventTime": "2023-10-30T14:07:45.351950+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2LZMp3e7RtWRbqa54"]} -{"Format": "IDEA0", "ID": "bb4156bf-ec03-4e4f-94f2-0fd72753ac85", "DetectTime": "2023-10-30T14:07:45.378933+02:00", "EventTime": "2023-10-30T14:07:45.379015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C8IG8OeLZakMFXl87"]} -{"Format": "IDEA0", "ID": "42177dcb-114c-43b2-86fe-295cec6acc83", "DetectTime": "2023-10-30T14:07:45.408013+02:00", "EventTime": "2023-10-30T14:07:45.408029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CGaLJk1goTdyAjLtYi"]} -{"Format": "IDEA0", "ID": "1b8badb4-1901-4b2a-9eab-2e9a81f173eb", "DetectTime": "2023-10-30T14:07:45.434156+02:00", "EventTime": "2023-10-30T14:07:45.434173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CZovDW17syZFTRrqpi"]} -{"Format": "IDEA0", "ID": "a20c9784-2ab0-423d-a733-f83d1d5fac5c", "DetectTime": "2023-10-30T14:07:45.471159+02:00", "EventTime": "2023-10-30T14:07:45.471175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C4BoTb5Hcb2CrU5gk"]} -{"Format": "IDEA0", "ID": "b62f1129-ffd5-45c7-9f7b-eb30713022fa", "DetectTime": "2023-10-30T14:07:45.507343+02:00", "EventTime": "2023-10-30T14:07:45.507359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CSNhsp2Tz1rUJ5rvDc"]} -{"Format": "IDEA0", "ID": "871c3ddd-7cf4-4af1-ab94-f4018737de19", "DetectTime": "2023-10-30T14:07:45.545636+02:00", "EventTime": "2023-10-30T14:07:45.545652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CY8rP540eupwF3ipj3"]} -{"Format": "IDEA0", "ID": "62659d85-2f95-4460-8727-3c4fe16d0ad4", "DetectTime": "2023-10-30T14:07:45.583123+02:00", "EventTime": "2023-10-30T14:07:45.583139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CwdQ1O33WyzrUqoCL4"]} -{"Format": "IDEA0", "ID": "56b3407f-e363-4b30-b2c6-8d63ea3778e1", "DetectTime": "2023-10-30T14:07:45.622271+02:00", "EventTime": "2023-10-30T14:07:45.622286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CdqJ5220Feq91ILfTe"]} -{"Format": "IDEA0", "ID": "75e6e1af-47fa-4a1a-b72d-ee96e48c0c22", "DetectTime": "2023-10-30T14:07:45.654634+02:00", "EventTime": "2023-10-30T14:07:45.654654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["COi9IS20Elmk00RA5d"]} -{"Format": "Json", "ID": "75e6e1af-47fa-4a1a-b72d-ee96e48c0c22", "DetectTime": "2023-10-30T14:07:45.654634+02:00", "EventTime": "2023-10-30T14:07:45.654654+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:04:55.997998+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:45.741846)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "26aed12c-ef50-463a-8010-4546046a5545", "DetectTime": "2023-10-30T14:07:45.747772+02:00", "EventTime": "2023-10-30T14:07:45.747792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CdaSBtXx97Lx3Bo4h"]} -{"Format": "IDEA0", "ID": "88ab43ac-f635-4ccf-915f-35fd562bf487", "DetectTime": "2023-10-30T14:07:45.785944+02:00", "EventTime": "2023-10-30T14:07:45.785963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CUfSOQ3tx52qyRsk6a"]} -{"Format": "IDEA0", "ID": "dc8f7efa-0c77-4f2d-8d2b-29084cce6095", "DetectTime": "2023-10-30T14:07:45.825375+02:00", "EventTime": "2023-10-30T14:07:45.825392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["COFHtGYwicn8jfX3l"]} -{"Format": "IDEA0", "ID": "7dfae400-793e-4d4a-b46c-9cbf3b21fe88", "DetectTime": "2023-10-30T14:07:45.860990+02:00", "EventTime": "2023-10-30T14:07:45.861006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C5hbsqGoObziDa4oi"]} -{"Format": "IDEA0", "ID": "ed4a299f-4121-467a-a782-75b0ac9ee3cd", "DetectTime": "2023-10-30T14:07:45.897501+02:00", "EventTime": "2023-10-30T14:07:45.897518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C804c51Fh3epSOTOkf"]} -{"Format": "IDEA0", "ID": "952f0934-db46-4497-9a7b-2c2bbe2cef32", "DetectTime": "2023-10-30T14:07:45.932074+02:00", "EventTime": "2023-10-30T14:07:45.932090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CA159P3NABV0gaiiVg"]} -{"Format": "IDEA0", "ID": "ba90a7f2-78b6-408a-8a96-e07bf50b1b5f", "DetectTime": "2023-10-30T14:07:45.969215+02:00", "EventTime": "2023-10-30T14:07:45.969235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cakci64zEHf7szpt3d"]} -{"Format": "IDEA0", "ID": "40d34585-f2bd-4312-a504-23c33992afa7", "DetectTime": "2023-10-30T14:07:46.005565+02:00", "EventTime": "2023-10-30T14:07:46.005586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["COVZk54ber8pyZi2C8"]} -{"Format": "Json", "ID": "40d34585-f2bd-4312-a504-23c33992afa7", "DetectTime": "2023-10-30T14:07:46.005565+02:00", "EventTime": "2023-10-30T14:07:46.005586+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:05:13.551739+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:46.076171)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "812816a7-ed84-4943-b2db-063f51b46e87", "DetectTime": "2023-10-30T14:07:46.081372+02:00", "EventTime": "2023-10-30T14:07:46.081388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Chu0DAPWppBrV9KH9"]} -{"Format": "IDEA0", "ID": "e3e06074-fdb6-4a05-a1da-9b954f32d9aa", "DetectTime": "2023-10-30T14:07:46.111365+02:00", "EventTime": "2023-10-30T14:07:46.111376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CM1WuY1WR2WD4H4X44"]} -{"Format": "IDEA0", "ID": "b79aa96a-1992-4f9d-87d3-1bb2d27527e1", "DetectTime": "2023-10-30T14:07:46.145329+02:00", "EventTime": "2023-10-30T14:07:46.145346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CRqRZb22VcvaN7W4pj"]} -{"Format": "IDEA0", "ID": "7366ae9e-c607-4a88-a155-f739a3e9eb08", "DetectTime": "2023-10-30T14:07:46.181374+02:00", "EventTime": "2023-10-30T14:07:46.181401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CzGvT31IrhaAm07op1"]} -{"Format": "IDEA0", "ID": "6c5e7e64-1d5d-4260-9a92-e9bd21f0d1f9", "DetectTime": "2023-10-30T14:07:46.214265+02:00", "EventTime": "2023-10-30T14:07:46.214280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CwGF394RvNX8FQVMe2"]} -{"Format": "IDEA0", "ID": "db2a6eaf-4a25-4274-9599-4e86521e295e", "DetectTime": "2023-10-30T14:07:46.243529+02:00", "EventTime": "2023-10-30T14:07:46.243540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CYM1IK3phPctIVvNLj"]} -{"Format": "IDEA0", "ID": "c18855e8-f2ec-491d-af5e-da96d63019dd", "DetectTime": "2023-10-30T14:07:46.275401+02:00", "EventTime": "2023-10-30T14:07:46.275418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["Cuva5y1Zn1c8HrMQ3a"]} -{"Format": "IDEA0", "ID": "c708ba32-7a9a-432d-b3eb-fd728bbda5ee", "DetectTime": "2023-10-30T14:07:46.309499+02:00", "EventTime": "2023-10-30T14:07:46.309514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CNV13z1SplftBvwFkd"]} -{"Format": "Json", "ID": "c708ba32-7a9a-432d-b3eb-fd728bbda5ee", "DetectTime": "2023-10-30T14:07:46.309499+02:00", "EventTime": "2023-10-30T14:07:46.309514+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:05:16.210164+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:46.388478)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2754b8e3-b584-44e5-a42c-50e2e4e9f561", "DetectTime": "2023-10-30T14:07:46.393049+02:00", "EventTime": "2023-10-30T14:07:46.393066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CG5CJd4BEZHmFEYWJc"]} -{"Format": "IDEA0", "ID": "a5725fdb-3752-457f-a77b-fc82af7b6b66", "DetectTime": "2023-10-30T14:07:46.426701+02:00", "EventTime": "2023-10-30T14:07:46.426719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CO8jP435rqMn7LCXD8"]} -{"Format": "IDEA0", "ID": "d7b9947b-9272-4b8b-ae20-c8bb038ae278", "DetectTime": "2023-10-30T14:07:46.460462+02:00", "EventTime": "2023-10-30T14:07:46.460478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbFSmO3XSDAb8N7Bsk"]} -{"Format": "IDEA0", "ID": "fcd079a3-e989-4e43-8e7a-d8f758183d3a", "DetectTime": "2023-10-30T14:07:46.491960+02:00", "EventTime": "2023-10-30T14:07:46.491977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CHu9Tu4OGYNk8yTTO9"]} -{"Format": "IDEA0", "ID": "74df4ffa-cd56-4871-b3f9-e1509bcc3719", "DetectTime": "2023-10-30T14:07:46.523405+02:00", "EventTime": "2023-10-30T14:07:46.523423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CLLGmOlSUTKe64wvi"]} -{"Format": "IDEA0", "ID": "a50c5045-677f-4ea2-b03b-fd0523045fa3", "DetectTime": "2023-10-30T14:07:46.552280+02:00", "EventTime": "2023-10-30T14:07:46.552297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C3fBPp1chX0eviKznk"]} -{"Format": "IDEA0", "ID": "e52e6b33-3060-4470-b390-f5ee1e7ecdee", "DetectTime": "2023-10-30T14:07:46.583779+02:00", "EventTime": "2023-10-30T14:07:46.583797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CIy6pG4LOpybIizfgi"]} -{"Format": "IDEA0", "ID": "fa72acb3-9cd6-4cf8-9679-c39b23eed971", "DetectTime": "2023-10-30T14:07:46.614594+02:00", "EventTime": "2023-10-30T14:07:46.614622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CenTrY26KEqyQqC4Y7"]} -{"Format": "Json", "ID": "fa72acb3-9cd6-4cf8-9679-c39b23eed971", "DetectTime": "2023-10-30T14:07:46.614594+02:00", "EventTime": "2023-10-30T14:07:46.614622+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:39:46.379078+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:46.684321)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f2a84b20-52ac-4eb9-8e00-ac412d526833", "DetectTime": "2023-10-30T14:07:46.690347+02:00", "EventTime": "2023-10-30T14:07:46.690368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQZWdh1rwJPHsJcZGl"]} -{"Format": "IDEA0", "ID": "13d2d137-d240-497e-92b8-c452c565dec8", "DetectTime": "2023-10-30T14:07:46.722387+02:00", "EventTime": "2023-10-30T14:07:46.722401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C0Z3pB3dxhOs2G6evb"]} -{"Format": "IDEA0", "ID": "1aacaa85-981a-4020-b0a3-39c5e2b014ac", "DetectTime": "2023-10-30T14:07:46.747196+02:00", "EventTime": "2023-10-30T14:07:46.747211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["ClGDcv2ZJGUFfTgzw6"]} -{"Format": "IDEA0", "ID": "1aaac5b4-63a3-467f-b71b-e1428a5db2a3", "DetectTime": "2023-10-30T14:07:46.775642+02:00", "EventTime": "2023-10-30T14:07:46.775664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CxoY5y4Xy6BvVuHEce"]} -{"Format": "IDEA0", "ID": "e8d2fb09-2a01-465f-947c-5d3e73bd4441", "DetectTime": "2023-10-30T14:07:46.803783+02:00", "EventTime": "2023-10-30T14:07:46.803794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CpnBqY2jhKMKdTer56"]} -{"Format": "IDEA0", "ID": "06f59fdb-3718-4e45-8ca4-d743d437f7e6", "DetectTime": "2023-10-30T14:07:46.822547+02:00", "EventTime": "2023-10-30T14:07:46.822558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cj7oyv1DzkkZshrDD7"]} -{"Format": "IDEA0", "ID": "0de777d1-c864-415d-8a31-afa6ed3bd9c5", "DetectTime": "2023-10-30T14:07:46.842700+02:00", "EventTime": "2023-10-30T14:07:46.842713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C7b0lH260ovn6N2sGk"]} -{"Format": "IDEA0", "ID": "a99464e1-3c68-4b45-ab89-c3bfed55ec2b", "DetectTime": "2023-10-30T14:07:46.865567+02:00", "EventTime": "2023-10-30T14:07:46.865583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CeDJcp2KfWkfKvaIoc"]} -{"Format": "Json", "ID": "a99464e1-3c68-4b45-ab89-c3bfed55ec2b", "DetectTime": "2023-10-30T14:07:46.865567+02:00", "EventTime": "2023-10-30T14:07:46.865583+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:40:05.313099+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:46.920142)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d14cee86-07e0-4686-b58a-727071a444b0", "DetectTime": "2023-10-30T14:07:46.923834+02:00", "EventTime": "2023-10-30T14:07:46.923845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CW5lMR0rKdjiVYLlj"]} -{"Format": "IDEA0", "ID": "ee9d74cc-8260-411f-b61c-e725d151a8bc", "DetectTime": "2023-10-30T14:07:46.946816+02:00", "EventTime": "2023-10-30T14:07:46.946835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CiEdpX2ZGkBfZ81bc3"]} -{"Format": "IDEA0", "ID": "ec00931d-f322-448e-a12f-ec102e05f4eb", "DetectTime": "2023-10-30T14:07:46.971660+02:00", "EventTime": "2023-10-30T14:07:46.971685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CYj5Br4z4xfYjVwDJd"]} -{"Format": "IDEA0", "ID": "1702a617-68bf-42f8-b6a0-9ab837bafc7a", "DetectTime": "2023-10-30T14:07:46.992848+02:00", "EventTime": "2023-10-30T14:07:46.992864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cdb5wT17W8rlIQWFI2"]} -{"Format": "IDEA0", "ID": "d09c92c8-8bbc-4834-a446-54eaaeeb0b68", "DetectTime": "2023-10-30T14:07:47.017878+02:00", "EventTime": "2023-10-30T14:07:47.017888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CwBGlv4jILNCF7NHra"]} -{"Format": "IDEA0", "ID": "30ef805b-06fd-4bff-8c56-743e7ead6ff8", "DetectTime": "2023-10-30T14:07:47.038412+02:00", "EventTime": "2023-10-30T14:07:47.038431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CXAK8B3I8FRdDVckO5"]} -{"Format": "IDEA0", "ID": "ca1ce805-c1a1-4609-b483-54baa50764c5", "DetectTime": "2023-10-30T14:07:47.059413+02:00", "EventTime": "2023-10-30T14:07:47.059429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CEWtET1t7StUbxO6vk"]} -{"Format": "IDEA0", "ID": "ad84adfd-b3ec-4347-9881-e0fffb8bd26d", "DetectTime": "2023-10-30T14:07:47.079954+02:00", "EventTime": "2023-10-30T14:07:47.079965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CziHLC4itvgjdyTyh8"]} -{"Format": "Json", "ID": "ad84adfd-b3ec-4347-9881-e0fffb8bd26d", "DetectTime": "2023-10-30T14:07:47.079954+02:00", "EventTime": "2023-10-30T14:07:47.079965+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:40:07.483066+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:47.131877)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8fa5bfe3-aba0-4f1b-ab06-3cc092cf623f", "DetectTime": "2023-10-30T14:07:47.137842+02:00", "EventTime": "2023-10-30T14:07:47.137858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CFjxXU4mCAvBhKzbf"]} -{"Format": "IDEA0", "ID": "87bf5c75-97e0-4644-bb01-afcf738e30ed", "DetectTime": "2023-10-30T14:07:47.161107+02:00", "EventTime": "2023-10-30T14:07:47.161123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["Crkiir4tiXSciodlqc"]} -{"Format": "IDEA0", "ID": "1b3e020e-4743-4700-9b12-7166cb1fc55a", "DetectTime": "2023-10-30T14:07:47.180545+02:00", "EventTime": "2023-10-30T14:07:47.180556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CMjA6r4R1iyALEKH27"]} -{"Format": "IDEA0", "ID": "c621862c-5d61-42a9-af87-308efae5659e", "DetectTime": "2023-10-30T14:07:47.202296+02:00", "EventTime": "2023-10-30T14:07:47.202312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CCl0qR39uiAXj2buk2"]} -{"Format": "IDEA0", "ID": "b7024dc3-a6a0-44c6-87f2-38935e13859b", "DetectTime": "2023-10-30T14:07:47.224134+02:00", "EventTime": "2023-10-30T14:07:47.224149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CPOjXBrjtQmTCOp6a"]} -{"Format": "IDEA0", "ID": "2111d3ff-ca08-4381-aa74-f9d70808594c", "DetectTime": "2023-10-30T14:07:47.245543+02:00", "EventTime": "2023-10-30T14:07:47.245558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFjDjt2ommT9QkOhhh"]} -{"Format": "IDEA0", "ID": "646fef02-883b-4425-923c-170b8e4d192b", "DetectTime": "2023-10-30T14:07:47.262737+02:00", "EventTime": "2023-10-30T14:07:47.262751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CfMOFN1ajrIqtsc4g4"]} -{"Format": "IDEA0", "ID": "17d51255-1aa1-4358-a3eb-578447e89163", "DetectTime": "2023-10-30T14:07:47.279436+02:00", "EventTime": "2023-10-30T14:07:47.279452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["Ctc3wfdA6ZZ6wwNng"]} -{"Format": "Json", "ID": "17d51255-1aa1-4358-a3eb-578447e89163", "DetectTime": "2023-10-30T14:07:47.279436+02:00", "EventTime": "2023-10-30T14:07:47.279452+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T11:40:10.084556+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2023/10/30 14:07:47.340306)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9dc7364b-8c4f-430f-8f38-ef4c4fb0decf", "DetectTime": "2023-10-30T14:07:47.344135+02:00", "EventTime": "2023-10-30T14:07:47.344146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C0gAtA4tljIqOUcOM"]} -{"Format": "IDEA0", "ID": "be724968-a9ac-4b23-a87d-1a92c41804da", "DetectTime": "2023-10-30T14:07:47.359760+02:00", "EventTime": "2023-10-30T14:07:47.359777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CLRjB51XcfoNUzrlZ"]} -{"Format": "IDEA0", "ID": "5bbb92df-157c-441c-96f9-83c9054e0f71", "DetectTime": "2023-10-30T14:07:47.381056+02:00", "EventTime": "2023-10-30T14:07:47.381079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CP0wBjMyzZnBUxa5"]} -{"Format": "IDEA0", "ID": "cca94a56-3391-4d62-99de-631e73a22c0d", "DetectTime": "2023-10-30T14:07:47.401325+02:00", "EventTime": "2023-10-30T14:07:47.401344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cek9kn3XzRGc5jcP24"]} -{"Format": "IDEA0", "ID": "3ae3f789-dcc3-49a7-a1e2-41ad0b4768ca", "DetectTime": "2023-10-30T14:07:47.432727+02:00", "EventTime": "2023-10-30T14:07:47.432742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CxrPYp2LiNVxbu9uX2"]} -{"Format": "IDEA0", "ID": "e553db67-3e55-44fd-be31-4f44b03ec0ec", "DetectTime": "2023-10-30T14:07:47.465480+02:00", "EventTime": "2023-10-30T14:07:47.465509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CJqVSt4rX3AJrwvqzh"]} -{"Format": "IDEA0", "ID": "2a496d28-a031-4ec2-b2bd-90a4dfae901b", "DetectTime": "2023-10-30T14:07:47.498305+02:00", "EventTime": "2023-10-30T14:07:47.498324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CnRMPF1KYfGi5hlk1f"]} -{"Format": "IDEA0", "ID": "ee634e61-c9db-405b-bfb5-354cc02ef1a4", "DetectTime": "2023-10-30T14:07:47.532671+02:00", "EventTime": "2023-10-30T14:07:47.532682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C8ZmTf1domJuzYyBd2"]} -{"Format": "IDEA0", "ID": "0fbe8942-bfb6-4dfd-b549-433ce9877947", "DetectTime": "2023-10-30T14:07:47.561205+02:00", "EventTime": "2023-10-30T14:07:47.561220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CAGljf13OtrFayGyhl"]} -{"Format": "IDEA0", "ID": "e32b3312-7657-412b-bc02-27759a4d48b0", "DetectTime": "2023-10-30T14:07:47.592349+02:00", "EventTime": "2023-10-30T14:07:47.592362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["COaMVIIRZkLrXNfCe"]} -{"Format": "IDEA0", "ID": "d8f08f3f-3caf-4cb9-b8a4-7ee47571f410", "DetectTime": "2023-10-30T14:07:47.626888+02:00", "EventTime": "2023-10-30T14:07:47.626905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CKkrjm3VWKfpdjcg3f"]} -{"Format": "Json", "ID": "d8f08f3f-3caf-4cb9-b8a4-7ee47571f410", "DetectTime": "2023-10-30T14:07:47.626888+02:00", "EventTime": "2023-10-30T14:07:47.626905+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:10:33.329448+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:47.702471)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f89256d1-25e7-441e-ad42-b03ac6431496", "DetectTime": "2023-10-30T14:07:47.707265+02:00", "EventTime": "2023-10-30T14:07:47.707291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CoqREc2FOclKwf2SP4"]} -{"Format": "IDEA0", "ID": "650e30f9-7cc7-449a-bbff-9c729e0aaf9a", "DetectTime": "2023-10-30T14:07:47.740643+02:00", "EventTime": "2023-10-30T14:07:47.740656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cxg3ic2FteZ6nW6X2d"]} -{"Format": "IDEA0", "ID": "f9b024bc-d6c8-4af6-a863-1d0e17a401f1", "DetectTime": "2023-10-30T14:07:47.770165+02:00", "EventTime": "2023-10-30T14:07:47.770176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CO1SJnqUKh19KGwT2"]} -{"Format": "IDEA0", "ID": "94263845-9c03-40b4-8135-741d77359e94", "DetectTime": "2023-10-30T14:07:47.794010+02:00", "EventTime": "2023-10-30T14:07:47.794022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["C09AC33OnIoK2AUjk8"]} -{"Format": "IDEA0", "ID": "67d3f856-2e43-462f-a7c6-59647bf23a66", "DetectTime": "2023-10-30T14:07:47.820521+02:00", "EventTime": "2023-10-30T14:07:47.820539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CElL5h1VYf6g3Kjvll"]} -{"Format": "IDEA0", "ID": "05fd8c22-0693-424a-ad33-be84ac696cf9", "DetectTime": "2023-10-30T14:07:47.850379+02:00", "EventTime": "2023-10-30T14:07:47.850394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C7ya3x2e1sx3UaCo5e"]} -{"Format": "IDEA0", "ID": "8bfc7371-a885-4e9c-8761-7509ec0281cb", "DetectTime": "2023-10-30T14:07:47.867349+02:00", "EventTime": "2023-10-30T14:07:47.867360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CRmmPm3KhkN4Wmxbm4"]} -{"Format": "IDEA0", "ID": "534adee2-a450-40f3-bdd2-03f2c1820b5d", "DetectTime": "2023-10-30T14:07:47.899716+02:00", "EventTime": "2023-10-30T14:07:47.899734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CXXbtN1G2tKkVbazx"]} -{"Format": "IDEA0", "ID": "c9819d2a-e53f-4ea2-9cb0-bec588cea539", "DetectTime": "2023-10-30T14:07:47.931926+02:00", "EventTime": "2023-10-30T14:07:47.931948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CUwEed2thNWJNKWGG3"]} -{"Format": "Json", "ID": "c9819d2a-e53f-4ea2-9cb0-bec588cea539", "DetectTime": "2023-10-30T14:07:47.931926+02:00", "EventTime": "2023-10-30T14:07:47.931948+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:10:35.289741+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:48.067661)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "523d195f-f153-4a45-8c28-3cd9fd5b71f1", "DetectTime": "2023-10-30T14:07:48.073461+02:00", "EventTime": "2023-10-30T14:07:48.073478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C9pvMY2bet4PK7A56"]} -{"Format": "IDEA0", "ID": "4a37a555-d81b-43da-979d-58d0a7fc5823", "DetectTime": "2023-10-30T14:07:48.109766+02:00", "EventTime": "2023-10-30T14:07:48.109784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CtByap2PLTI2KDKXz1"]} -{"Format": "IDEA0", "ID": "8269aeca-597d-4286-9605-98409fdb8873", "DetectTime": "2023-10-30T14:07:48.140840+02:00", "EventTime": "2023-10-30T14:07:48.140861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CK9rQf21OEH5luFh25"]} -{"Format": "IDEA0", "ID": "a6d856ae-ff59-4b46-a599-55af3fe1f8f2", "DetectTime": "2023-10-30T14:07:48.169116+02:00", "EventTime": "2023-10-30T14:07:48.169129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CtN18v1SVbJGoc0j4d"]} -{"Format": "IDEA0", "ID": "fd02eab0-b5e6-406e-b557-c674aa7f7ca7", "DetectTime": "2023-10-30T14:07:48.193655+02:00", "EventTime": "2023-10-30T14:07:48.193667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CCj73p4dyMRsUCqBHl"]} -{"Format": "IDEA0", "ID": "df8ab942-b85b-49fd-ac6f-4e5e5e5a9b96", "DetectTime": "2023-10-30T14:07:48.223194+02:00", "EventTime": "2023-10-30T14:07:48.223210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CQP6f44diLUv9TtAGf"]} -{"Format": "IDEA0", "ID": "b8446a70-365c-48d9-b9ce-bd82f02d9c3f", "DetectTime": "2023-10-30T14:07:48.256553+02:00", "EventTime": "2023-10-30T14:07:48.256574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CDK2Z12BcMQoCK7Gx3"]} -{"Format": "IDEA0", "ID": "a876a52c-e86d-470d-807e-d5a154f2152d", "DetectTime": "2023-10-30T14:07:48.282531+02:00", "EventTime": "2023-10-30T14:07:48.282553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CkBuBqfV8e3EjRg6g"]} -{"Format": "Json", "ID": "a876a52c-e86d-470d-807e-d5a154f2152d", "DetectTime": "2023-10-30T14:07:48.282531+02:00", "EventTime": "2023-10-30T14:07:48.282553+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:10:37.945746+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:48.349367)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86069104-a1f1-4b71-b56a-627425adc36b", "DetectTime": "2023-10-30T14:07:48.354069+02:00", "EventTime": "2023-10-30T14:07:48.354081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CJKOq64WoYppxYWa35"]} -{"Format": "IDEA0", "ID": "ae971c39-6781-48fb-9d8c-2f1ccc10e1a4", "DetectTime": "2023-10-30T14:07:48.384664+02:00", "EventTime": "2023-10-30T14:07:48.384683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CDV4fH2TLwKiHZPIig"]} -{"Format": "IDEA0", "ID": "82601c17-945a-40f5-8530-ae027625bac2", "DetectTime": "2023-10-30T14:07:48.413631+02:00", "EventTime": "2023-10-30T14:07:48.413658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["COIFEm4zB7OfOrrOZ4"]} -{"Format": "IDEA0", "ID": "08df633c-74d4-44eb-9132-d2aef2cd8c5d", "DetectTime": "2023-10-30T14:07:48.439029+02:00", "EventTime": "2023-10-30T14:07:48.439044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["Cm15iyGhyJL6hixoj"]} -{"Format": "IDEA0", "ID": "1bf1d5ac-0f5b-4285-9924-4e2ee0a784c4", "DetectTime": "2023-10-30T14:07:48.470025+02:00", "EventTime": "2023-10-30T14:07:48.470041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CyiP7D3tJmwTA6gM4e"]} -{"Format": "IDEA0", "ID": "d2ec0811-595b-4a60-84c7-f468b7a44d5b", "DetectTime": "2023-10-30T14:07:48.508468+02:00", "EventTime": "2023-10-30T14:07:48.508485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CRcbCr3mFk8D5VzZJe"]} -{"Format": "IDEA0", "ID": "99365964-9e08-4e16-8ee0-6735953beabc", "DetectTime": "2023-10-30T14:07:48.536001+02:00", "EventTime": "2023-10-30T14:07:48.536013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CFrQf42iX6rMcLTFej"]} -{"Format": "IDEA0", "ID": "a92e2431-6859-44e7-88c9-1ce7fb01cd7b", "DetectTime": "2023-10-30T14:07:48.563583+02:00", "EventTime": "2023-10-30T14:07:48.563597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C3O7iO2zTHjZNwb172"]} -{"Format": "Json", "ID": "a92e2431-6859-44e7-88c9-1ce7fb01cd7b", "DetectTime": "2023-10-30T14:07:48.563583+02:00", "EventTime": "2023-10-30T14:07:48.563597+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:41:19.156339+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:48.628516)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "48a61abb-9c88-4725-b3f1-cd726524b564", "DetectTime": "2023-10-30T14:07:48.633598+02:00", "EventTime": "2023-10-30T14:07:48.633617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CwtBsT3n1HzdkRSI9l"]} -{"Format": "IDEA0", "ID": "44b662cd-e58a-43dd-a730-ff1d2b9db2c2", "DetectTime": "2023-10-30T14:07:48.659767+02:00", "EventTime": "2023-10-30T14:07:48.659779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CkBIIF48yyeM7sMP7c"]} -{"Format": "IDEA0", "ID": "3fdf4801-bfb4-4d61-b192-8f62baf62143", "DetectTime": "2023-10-30T14:07:48.688240+02:00", "EventTime": "2023-10-30T14:07:48.688261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cmedfk4zp4lToqM9r5"]} -{"Format": "IDEA0", "ID": "2ff569d9-bbb3-4ab3-b9b0-baee9d2a54d9", "DetectTime": "2023-10-30T14:07:48.715965+02:00", "EventTime": "2023-10-30T14:07:48.715982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CzRLQ63T2wOuJjs6A2"]} -{"Format": "IDEA0", "ID": "c77f13e2-d01b-4402-9b2f-da0f8ee38d8b", "DetectTime": "2023-10-30T14:07:48.760858+02:00", "EventTime": "2023-10-30T14:07:48.760876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CnrIKU7ymnpk0qyFg"]} -{"Format": "IDEA0", "ID": "6c9f4d97-ec1f-49d4-bd9e-a5dca8e81ba7", "DetectTime": "2023-10-30T14:07:48.788297+02:00", "EventTime": "2023-10-30T14:07:48.788314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CzAcUR2Vkt7AMdt7O1"]} -{"Format": "IDEA0", "ID": "79f23328-4aee-463d-a93d-db1d137e0f1e", "DetectTime": "2023-10-30T14:07:48.812797+02:00", "EventTime": "2023-10-30T14:07:48.812819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIO21g3bLhICIw5Evf"]} -{"Format": "IDEA0", "ID": "b9e575c8-3aff-49fa-9760-d1c85687ffd2", "DetectTime": "2023-10-30T14:07:48.845477+02:00", "EventTime": "2023-10-30T14:07:48.845497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CbcT762LSBUbIyErI2"]} -{"Format": "Json", "ID": "b9e575c8-3aff-49fa-9760-d1c85687ffd2", "DetectTime": "2023-10-30T14:07:48.845477+02:00", "EventTime": "2023-10-30T14:07:48.845497+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:41:20.867252+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:48.936372)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4aca8633-ab15-4b33-8f25-c591ba07e218", "DetectTime": "2023-10-30T14:07:48.943009+02:00", "EventTime": "2023-10-30T14:07:48.943030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CPTnIm33PPZfmsEdJ"]} -{"Format": "IDEA0", "ID": "82fd6e5b-ace6-463c-b18c-e1420895e996", "DetectTime": "2023-10-30T14:07:48.980806+02:00", "EventTime": "2023-10-30T14:07:48.980822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CfcicGgtbGmDmmUve"]} -{"Format": "IDEA0", "ID": "c3e66993-eb7e-488e-bc5a-2084734ff740", "DetectTime": "2023-10-30T14:07:49.017168+02:00", "EventTime": "2023-10-30T14:07:49.017184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CRfQFyZ93WNIaA4si"]} -{"Format": "IDEA0", "ID": "0094cfdc-b50c-4fa0-9ca4-ebc72569701d", "DetectTime": "2023-10-30T14:07:49.051038+02:00", "EventTime": "2023-10-30T14:07:49.051056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CkUoO04JsbSHcIqP46"]} -{"Format": "IDEA0", "ID": "9eb7b09c-4d18-45b6-b99d-1ca7b55271ab", "DetectTime": "2023-10-30T14:07:49.084517+02:00", "EventTime": "2023-10-30T14:07:49.084539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CqKXs94njAAnTOMZ89"]} -{"Format": "IDEA0", "ID": "5fb92f67-f6cc-4cf6-a58d-70f3442f312a", "DetectTime": "2023-10-30T14:07:49.115407+02:00", "EventTime": "2023-10-30T14:07:49.115427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ckl6tH3UZbmIb6xnSb"]} -{"Format": "IDEA0", "ID": "ee087ee8-85f2-49b7-897d-40fbb3936bd2", "DetectTime": "2023-10-30T14:07:49.159136+02:00", "EventTime": "2023-10-30T14:07:49.159163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["ChzoGw4xdoq08qFxwb"]} -{"Format": "IDEA0", "ID": "44d51cdb-c313-4586-ad71-beb56508b9bf", "DetectTime": "2023-10-30T14:07:49.189740+02:00", "EventTime": "2023-10-30T14:07:49.189760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CMTkUh3AjTq3B6exQ1"]} -{"Format": "Json", "ID": "44d51cdb-c313-4586-ad71-beb56508b9bf", "DetectTime": "2023-10-30T14:07:49.189740+02:00", "EventTime": "2023-10-30T14:07:49.189760+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:41:22.880384+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:49.248282)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed36fc22-1ab1-48f1-814a-904eb87ab422", "DetectTime": "2023-10-30T14:07:49.254001+02:00", "EventTime": "2023-10-30T14:07:49.254023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["C5CjTo4BMhMdSfaP9g"]} -{"Format": "IDEA0", "ID": "cc6d5cbe-4427-4c24-b927-f8730ed629ad", "DetectTime": "2023-10-30T14:07:49.278978+02:00", "EventTime": "2023-10-30T14:07:49.278995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CzTY3vxNTBYgCMiOc"]} -{"Format": "IDEA0", "ID": "56346443-a452-419a-b18e-739631410ed0", "DetectTime": "2023-10-30T14:07:49.304244+02:00", "EventTime": "2023-10-30T14:07:49.304264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CjlgNQG8k2rjN5GN6"]} -{"Format": "IDEA0", "ID": "921b6c37-019d-4f0f-b092-59c32ca54c1a", "DetectTime": "2023-10-30T14:07:49.330544+02:00", "EventTime": "2023-10-30T14:07:49.330565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CGUQ354pk37emkk6fb"]} -{"Format": "IDEA0", "ID": "6ae95a59-f289-494a-a9e8-a07b5ed55587", "DetectTime": "2023-10-30T14:07:49.361590+02:00", "EventTime": "2023-10-30T14:07:49.361607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CER5nm2eXh0hpuz4W1"]} -{"Format": "IDEA0", "ID": "d3cc4a31-2f8e-4e2f-8d2d-9a70214a663c", "DetectTime": "2023-10-30T14:07:49.386235+02:00", "EventTime": "2023-10-30T14:07:49.386250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CMufs61u3MVZSPDuM1"]} -{"Format": "IDEA0", "ID": "bbe9cb42-4188-4cb5-95b8-557ec77ef4ea", "DetectTime": "2023-10-30T14:07:49.414238+02:00", "EventTime": "2023-10-30T14:07:49.414251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbPA9j3Q0LjIOMNn56"]} -{"Format": "IDEA0", "ID": "85d7b65b-941e-4577-86c9-8859eed67488", "DetectTime": "2023-10-30T14:07:49.444438+02:00", "EventTime": "2023-10-30T14:07:49.444454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CYRncomcuKKc7x72a"]} -{"Format": "Json", "ID": "85d7b65b-941e-4577-86c9-8859eed67488", "DetectTime": "2023-10-30T14:07:49.444438+02:00", "EventTime": "2023-10-30T14:07:49.444454+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T12:41:25.682312+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2023/10/30 14:07:49.510528)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "96051fda-d20d-4f57-9656-6ebe5cd67212", "DetectTime": "2023-10-30T14:07:49.516463+02:00", "EventTime": "2023-10-30T14:07:49.516482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CRR2BTfFf0f4I5OUi"]} -{"Format": "IDEA0", "ID": "ed737bf4-db04-4699-81d0-eba310beaec7", "DetectTime": "2023-10-30T14:07:49.545763+02:00", "EventTime": "2023-10-30T14:07:49.545784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CeDBNNrWiJ2yIkSXe"]} -{"Format": "IDEA0", "ID": "81fd2424-f27f-4487-aceb-cb4171f5fd2e", "DetectTime": "2023-10-30T14:07:49.569429+02:00", "EventTime": "2023-10-30T14:07:49.569447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CFRrTr1EH8uf1MkcW9"]} -{"Format": "IDEA0", "ID": "600e05dc-6776-43d0-8a78-a7a025d7bedb", "DetectTime": "2023-10-30T14:07:49.592766+02:00", "EventTime": "2023-10-30T14:07:49.592785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CPZeS74am1pLbFFhR9"]} -{"Format": "IDEA0", "ID": "c671ed65-7215-4037-ac93-152b2e706c29", "DetectTime": "2023-10-30T14:07:49.634489+02:00", "EventTime": "2023-10-30T14:07:49.634510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cv8TtP3Yj8u5sgW8l1"]} -{"Format": "IDEA0", "ID": "dea43e4e-8edd-4820-911f-02570c8f3cc8", "DetectTime": "2023-10-30T14:07:49.674741+02:00", "EventTime": "2023-10-30T14:07:49.674760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CVoHK94bgOIEC9h1y6"]} -{"Format": "IDEA0", "ID": "16e0dd07-bccc-4b55-a13e-f78e72165d0c", "DetectTime": "2023-10-30T14:07:49.712113+02:00", "EventTime": "2023-10-30T14:07:49.712133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CNkBqo2git3brQgVM9"]} -{"Format": "IDEA0", "ID": "7197d733-54f5-4d1a-8b02-5f98e667f2ea", "DetectTime": "2023-10-30T14:07:49.751539+02:00", "EventTime": "2023-10-30T14:07:49.751560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CcbnKM3AkMkJgqwAk4"]} -{"Format": "IDEA0", "ID": "30f93114-9976-47b8-b005-1f8e4a41ddcf", "DetectTime": "2023-10-30T14:07:49.790358+02:00", "EventTime": "2023-10-30T14:07:49.790380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["COO0EWSpjsAnPkms2"]} -{"Format": "IDEA0", "ID": "d999014f-cea5-4b90-8d70-6051095d1a6a", "DetectTime": "2023-10-30T14:07:49.826570+02:00", "EventTime": "2023-10-30T14:07:49.826588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CbbK7X1CP7bxj1r7Z8"]} -{"Format": "IDEA0", "ID": "045a8b3b-4bf5-45c2-bb22-5d11f0f1b547", "DetectTime": "2023-10-30T14:07:49.863682+02:00", "EventTime": "2023-10-30T14:07:49.863698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CgpPlf40jtbu7SNc4c"]} -{"Format": "Json", "ID": "045a8b3b-4bf5-45c2-bb22-5d11f0f1b547", "DetectTime": "2023-10-30T14:07:49.863682+02:00", "EventTime": "2023-10-30T14:07:49.863698+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:11:30.730239+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:49.944020)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ac7608c-62fd-469a-8f0b-a57d568ceb94", "DetectTime": "2023-10-30T14:07:49.949359+02:00", "EventTime": "2023-10-30T14:07:49.949387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CCtVEV2sLWl3md0Uh4"]} -{"Format": "IDEA0", "ID": "deff5975-2b43-4a0b-8070-3fd31dc350ac", "DetectTime": "2023-10-30T14:07:49.985975+02:00", "EventTime": "2023-10-30T14:07:49.985998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CKC5h51VimG8DcTwb"]} -{"Format": "IDEA0", "ID": "5f6cc70b-c310-4cbc-81b1-dd6739c5fb59", "DetectTime": "2023-10-30T14:07:50.021811+02:00", "EventTime": "2023-10-30T14:07:50.021839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CIz4Y94RcVIJpzGlC"]} -{"Format": "IDEA0", "ID": "f9e488ee-d86f-454f-af6b-6d3435e25885", "DetectTime": "2023-10-30T14:07:50.129307+02:00", "EventTime": "2023-10-30T14:07:50.129326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CENJe13bsrr47Iv292"]} -{"Format": "IDEA0", "ID": "43575aa7-8d93-4044-baa5-2db3ac0f9ba1", "DetectTime": "2023-10-30T14:07:50.167253+02:00", "EventTime": "2023-10-30T14:07:50.167274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["CwTfvs4wqsnCgnqYY2"]} -{"Format": "IDEA0", "ID": "bfafb605-f829-4c18-97d7-3d6c32fa4f44", "DetectTime": "2023-10-30T14:07:50.207945+02:00", "EventTime": "2023-10-30T14:07:50.207966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CExXMx1ZWaGSZ8mwok"]} -{"Format": "IDEA0", "ID": "332848fe-8ce5-4b81-9be2-a41ed795d7fa", "DetectTime": "2023-10-30T14:07:50.244948+02:00", "EventTime": "2023-10-30T14:07:50.244974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CGvFOx2V4wHEAkuiDc"]} -{"Format": "IDEA0", "ID": "ca06a6d2-8e59-4432-b6db-93f886cad96c", "DetectTime": "2023-10-30T14:07:50.289969+02:00", "EventTime": "2023-10-30T14:07:50.289994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["ChyaHg5vHX0GVqxU6"]} -{"Format": "Json", "ID": "ca06a6d2-8e59-4432-b6db-93f886cad96c", "DetectTime": "2023-10-30T14:07:50.289969+02:00", "EventTime": "2023-10-30T14:07:50.289994+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:11:32.790007+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:50.369376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f08c02ce-3009-4080-b8a1-8fbd925a0cf9", "DetectTime": "2023-10-30T14:07:50.374595+02:00", "EventTime": "2023-10-30T14:07:50.374617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C8vCsF41c3lcLCAgc6"]} -{"Format": "IDEA0", "ID": "7b373286-7184-4d18-9f3a-c851de153f34", "DetectTime": "2023-10-30T14:07:50.415511+02:00", "EventTime": "2023-10-30T14:07:50.415524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CIhvOv1W63MPTSJC11"]} -{"Format": "IDEA0", "ID": "d2ae6d2c-68cb-499c-baf3-cc62c7ee50d7", "DetectTime": "2023-10-30T14:07:50.470865+02:00", "EventTime": "2023-10-30T14:07:50.470888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Ch4M45ysbnoCVEhT8"]} -{"Format": "IDEA0", "ID": "ded9474d-52c1-43df-838e-efeb0555d5c0", "DetectTime": "2023-10-30T14:07:50.515762+02:00", "EventTime": "2023-10-30T14:07:50.515779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["Cc74Uf12OkuiDiwflk"]} -{"Format": "IDEA0", "ID": "31341361-0d05-42d0-a1fb-5adebd25a241", "DetectTime": "2023-10-30T14:07:50.552614+02:00", "EventTime": "2023-10-30T14:07:50.552631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["Cqa8F14z2aiNvTPbM7"]} -{"Format": "IDEA0", "ID": "bc202799-5045-41f8-8bc6-c1a8c13e3183", "DetectTime": "2023-10-30T14:07:50.587954+02:00", "EventTime": "2023-10-30T14:07:50.587970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CosZNC29FMzGVnkhPd"]} -{"Format": "IDEA0", "ID": "1b9070fc-fae4-4f3d-a32b-a16f4f89afde", "DetectTime": "2023-10-30T14:07:50.625483+02:00", "EventTime": "2023-10-30T14:07:50.625500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CeoAuI2xukSnbvFWx1"]} -{"Format": "IDEA0", "ID": "82446755-be43-4bab-9605-cbcaecb10954", "DetectTime": "2023-10-30T14:07:50.666606+02:00", "EventTime": "2023-10-30T14:07:50.666624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CJ1YXS3pDkUJL9m6Mi"]} -{"Format": "Json", "ID": "82446755-be43-4bab-9605-cbcaecb10954", "DetectTime": "2023-10-30T14:07:50.666606+02:00", "EventTime": "2023-10-30T14:07:50.666624+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:11:35.419909+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:50.749722)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a7fd2a88-8de5-4c3b-b809-9cc375314a3b", "DetectTime": "2023-10-30T14:07:50.754541+02:00", "EventTime": "2023-10-30T14:07:50.754570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["ClI1xyGLYsfsORXU"]} -{"Format": "IDEA0", "ID": "9b7e223e-2785-40e2-aa86-ec34f79b5c78", "DetectTime": "2023-10-30T14:07:50.792457+02:00", "EventTime": "2023-10-30T14:07:50.792477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["C162tr49iAjYOFsM89"]} -{"Format": "IDEA0", "ID": "6d81a945-d424-49a0-8c9d-03a3be72c5d1", "DetectTime": "2023-10-30T14:07:50.828926+02:00", "EventTime": "2023-10-30T14:07:50.828947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CLyf1w3XW1q5jLZBQd"]} -{"Format": "IDEA0", "ID": "009a28f1-052d-46e7-93d1-ba8ca9bddae4", "DetectTime": "2023-10-30T14:07:50.860075+02:00", "EventTime": "2023-10-30T14:07:50.860094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C2vcju1dD126E7Gqie"]} -{"Format": "IDEA0", "ID": "783758ab-c655-452e-bb1b-6a3a620bdd3c", "DetectTime": "2023-10-30T14:07:50.901476+02:00", "EventTime": "2023-10-30T14:07:50.901495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CfX5CU34SDZgbGGwOk"]} -{"Format": "IDEA0", "ID": "fe328f0d-e5c5-4882-b280-5014d2981ee1", "DetectTime": "2023-10-30T14:07:50.937354+02:00", "EventTime": "2023-10-30T14:07:50.937380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CRX4Gx21wPJ1ljLmTa"]} -{"Format": "IDEA0", "ID": "7030ab3a-098c-4809-bc4b-97863a96e385", "DetectTime": "2023-10-30T14:07:50.971616+02:00", "EventTime": "2023-10-30T14:07:50.971636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CqGP3O2UxMOzfJG5e"]} -{"Format": "IDEA0", "ID": "bbad66d7-6875-40fb-a31a-0d11ef3fbd0d", "DetectTime": "2023-10-30T14:07:51.009424+02:00", "EventTime": "2023-10-30T14:07:51.009452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CWFhUQfkCUCOeIfV4"]} -{"Format": "Json", "ID": "bbad66d7-6875-40fb-a31a-0d11ef3fbd0d", "DetectTime": "2023-10-30T14:07:51.009424+02:00", "EventTime": "2023-10-30T14:07:51.009452+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:41:39.342805+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:51.090131)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "75db3219-9afa-4d29-b9d4-31bfc249208e", "DetectTime": "2023-10-30T14:07:51.098865+02:00", "EventTime": "2023-10-30T14:07:51.098883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CPh23J2mRWk5nzgFrc"]} -{"Format": "IDEA0", "ID": "09663214-5da4-4274-a0c5-44e2582beb05", "DetectTime": "2023-10-30T14:07:51.133166+02:00", "EventTime": "2023-10-30T14:07:51.133183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CybwOs2NxAcwpPEpL2"]} -{"Format": "IDEA0", "ID": "4771300a-e1ba-4059-802e-91b8a71d7df1", "DetectTime": "2023-10-30T14:07:51.167629+02:00", "EventTime": "2023-10-30T14:07:51.167645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cvbj8K3Ou4iFGSxsp9"]} -{"Format": "IDEA0", "ID": "29d4231f-0b10-4303-b589-cb8fd12f268e", "DetectTime": "2023-10-30T14:07:51.198289+02:00", "EventTime": "2023-10-30T14:07:51.198355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CO814l31ydrGyLxsV3"]} -{"Format": "IDEA0", "ID": "e2ffb3c8-df40-4f02-a117-f037ac8a1450", "DetectTime": "2023-10-30T14:07:51.234216+02:00", "EventTime": "2023-10-30T14:07:51.234233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C7a9UU3fotYK6Odlof"]} -{"Format": "IDEA0", "ID": "203c7c73-e01f-4245-8085-7c686f4f2377", "DetectTime": "2023-10-30T14:07:51.262865+02:00", "EventTime": "2023-10-30T14:07:51.262884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CktdtP3Oj6bHqSmN65"]} -{"Format": "IDEA0", "ID": "bd2b85f6-1068-4db1-b67e-d71ac65d5e5b", "DetectTime": "2023-10-30T14:07:51.291859+02:00", "EventTime": "2023-10-30T14:07:51.291875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CfHEg43DGlwlfzU7dg"]} -{"Format": "IDEA0", "ID": "4839ec04-8d67-46fe-a355-91cf9a15a7ca", "DetectTime": "2023-10-30T14:07:51.324831+02:00", "EventTime": "2023-10-30T14:07:51.324861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CitYvt4YhnATMwQTZf"]} -{"Format": "Json", "ID": "4839ec04-8d67-46fe-a355-91cf9a15a7ca", "DetectTime": "2023-10-30T14:07:51.324831+02:00", "EventTime": "2023-10-30T14:07:51.324861+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:41:41.062851+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:51.395226)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93f1099c-67cc-41f7-8272-f4796f2ef01c", "DetectTime": "2023-10-30T14:07:51.400527+02:00", "EventTime": "2023-10-30T14:07:51.400546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CjOybiVkESt7EZQ91"]} -{"Format": "IDEA0", "ID": "714b733d-2e43-44e5-bf9a-f667d98b69b5", "DetectTime": "2023-10-30T14:07:51.439359+02:00", "EventTime": "2023-10-30T14:07:51.439386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CqEjSI2aPU54mIQc5e"]} -{"Format": "IDEA0", "ID": "5d35fed5-c3ef-474d-8f53-851f9b46b952", "DetectTime": "2023-10-30T14:07:51.469051+02:00", "EventTime": "2023-10-30T14:07:51.469073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [25906], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. ", "ContentType": "text/plain"}], "uids": ["Cg8zDj1pb9Dlcsv891"]} -{"Format": "IDEA0", "ID": "17b578ca-05b8-416c-8248-0d513f3a2325", "DetectTime": "2023-10-30T14:07:51.497640+02:00", "EventTime": "2023-10-30T14:07:51.497657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["Com6vG1sXGWE6zrZL2"]} -{"Format": "IDEA0", "ID": "0742803a-a92d-473e-a993-b9cd1562174f", "DetectTime": "2023-10-30T14:07:51.523916+02:00", "EventTime": "2023-10-30T14:07:51.523931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C6ajfb4AdGTYpxXnEf"]} -{"Format": "IDEA0", "ID": "d41066a2-6eff-4ada-9382-5ce2f78b07e1", "DetectTime": "2023-10-30T14:07:51.554640+02:00", "EventTime": "2023-10-30T14:07:51.554668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C1KnmnjcTomxpbNf9"]} -{"Format": "IDEA0", "ID": "80569ea4-e53e-445f-b146-91f9abb1d1d1", "DetectTime": "2023-10-30T14:07:51.582421+02:00", "EventTime": "2023-10-30T14:07:51.582444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Cnvrep4zfuYvGtbmp9"]} -{"Format": "IDEA0", "ID": "26aa4a1b-f0c2-49ac-bc86-79b70740bca5", "DetectTime": "2023-10-30T14:07:51.607509+02:00", "EventTime": "2023-10-30T14:07:51.607528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C9E0X9483g2uqkMAek"]} -{"Format": "Json", "ID": "26aa4a1b-f0c2-49ac-bc86-79b70740bca5", "DetectTime": "2023-10-30T14:07:51.607509+02:00", "EventTime": "2023-10-30T14:07:51.607528+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:41:43.251774+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:51.675764)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "91fd796d-0cd9-4048-a121-4411edb0e89d", "DetectTime": "2023-10-30T14:07:51.681645+02:00", "EventTime": "2023-10-30T14:07:51.681671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CjAoB73QBvdeFgrYtg"]} -{"Format": "IDEA0", "ID": "d004f1ca-4b79-4473-bae2-4be77de7cbe5", "DetectTime": "2023-10-30T14:07:51.712103+02:00", "EventTime": "2023-10-30T14:07:51.712126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["C1ZKZs4e1oKp38cuS9"]} -{"Format": "IDEA0", "ID": "ae004bc7-6020-488e-9cf3-ae44a5360f6b", "DetectTime": "2023-10-30T14:07:51.735574+02:00", "EventTime": "2023-10-30T14:07:51.735595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CMSbYF2YHVYfX4crN2"]} -{"Format": "IDEA0", "ID": "676b55c6-2950-4ac3-a0f6-d99d2684ade9", "DetectTime": "2023-10-30T14:07:51.758660+02:00", "EventTime": "2023-10-30T14:07:51.758688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CN4u9c3ha31YD3ASX3"]} -{"Format": "IDEA0", "ID": "520ba337-e3e5-4e42-8307-d50ea2efc231", "DetectTime": "2023-10-30T14:07:51.782021+02:00", "EventTime": "2023-10-30T14:07:51.782041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CfjP8v4hAw7XZSSkD6"]} -{"Format": "IDEA0", "ID": "e521cf42-a709-4596-a487-ee01772fb7df", "DetectTime": "2023-10-30T14:07:51.805946+02:00", "EventTime": "2023-10-30T14:07:51.805962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CMal0y4xQvLsYkqEY1"]} -{"Format": "IDEA0", "ID": "bfb5e85f-d6f8-4e1c-bbe3-d98374695333", "DetectTime": "2023-10-30T14:07:51.831259+02:00", "EventTime": "2023-10-30T14:07:51.831278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C2HbRF3mWu7AjsutB9"]} -{"Format": "IDEA0", "ID": "6ed72ca9-9389-4066-a535-5752b02c4795", "DetectTime": "2023-10-30T14:07:51.855306+02:00", "EventTime": "2023-10-30T14:07:51.855334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CAWkJj33pXFRUKtLfg"]} -{"Format": "Json", "ID": "6ed72ca9-9389-4066-a535-5752b02c4795", "DetectTime": "2023-10-30T14:07:51.855306+02:00", "EventTime": "2023-10-30T14:07:51.855334+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T13:41:45.594356+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2023/10/30 14:07:51.918283)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eebdce57-d22a-4e3a-b0b3-e02aa353d162", "DetectTime": "2023-10-30T14:07:51.923734+02:00", "EventTime": "2023-10-30T14:07:51.923750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CImmN01DrcZpHBtcja"]} -{"Format": "IDEA0", "ID": "1b535dd2-7310-4bde-a110-09fed494d916", "DetectTime": "2023-10-30T14:07:51.945826+02:00", "EventTime": "2023-10-30T14:07:51.945853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CtBYID3gge5rCMD0dg"]} -{"Format": "IDEA0", "ID": "c58bbd50-b558-4cdb-beb4-60f7cd15d310", "DetectTime": "2023-10-30T14:07:51.966352+02:00", "EventTime": "2023-10-30T14:07:51.966369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CBXDGm1Up7GDz7Bqmj"]} -{"Format": "IDEA0", "ID": "cceb495d-3474-4a29-8428-0c38cbc8683b", "DetectTime": "2023-10-30T14:07:51.990882+02:00", "EventTime": "2023-10-30T14:07:51.990903+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Hostname": ["ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.193.194.29 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C12tiw2BtBPuUQnv07"]} -{"Format": "IDEA0", "ID": "50148684-fa83-4d26-a8b7-d2a37548da63", "DetectTime": "2023-10-30T14:07:52.023074+02:00", "EventTime": "2023-10-30T14:07:52.023094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CCbY581sPFTV1wTQAh"]} -{"Format": "IDEA0", "ID": "f4d23ab1-7ed5-4d93-a4ac-db8aad63bd09", "DetectTime": "2023-10-30T14:07:52.043313+02:00", "EventTime": "2023-10-30T14:07:52.043330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CNyNQU31sZSs3TRALl"]} -{"Format": "IDEA0", "ID": "b5c1d290-d5f9-468b-9ea9-b3bc0b6d8cc6", "DetectTime": "2023-10-30T14:07:52.080630+02:00", "EventTime": "2023-10-30T14:07:52.080650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CbKPqJ2akoNmgEevdk"]} -{"Format": "IDEA0", "ID": "e730e880-a624-435d-8631-e12345899e0b", "DetectTime": "2023-10-30T14:07:52.118717+02:00", "EventTime": "2023-10-30T14:07:52.118734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cf3tsWNr6exDfjHI1"]} -{"Format": "IDEA0", "ID": "c3b8ff9a-5ff8-4e96-aa20-a2e3d5676a5c", "DetectTime": "2023-10-30T14:07:52.154988+02:00", "EventTime": "2023-10-30T14:07:52.155006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CoVFSZ9a1yUUQZJ87"]} -{"Format": "IDEA0", "ID": "ccacf943-1b8a-48d3-ac3b-c4f30ee567c7", "DetectTime": "2023-10-30T14:07:52.197969+02:00", "EventTime": "2023-10-30T14:07:52.197988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CMJUYc1CfTLGaRXrD1"]} -{"Format": "IDEA0", "ID": "25c9fa73-48a6-4ff3-9c03-d3b09b02d5f3", "DetectTime": "2023-10-30T14:07:52.243697+02:00", "EventTime": "2023-10-30T14:07:52.243709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CeNoTt1uTvvIx3CwCd"]} -{"Format": "IDEA0", "ID": "e052b6a7-9e18-44a6-8c82-b252415c9187", "DetectTime": "2023-10-30T14:07:52.284163+02:00", "EventTime": "2023-10-30T14:07:52.284175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CMtCcYKMWt2LDVgF7"]} -{"Format": "Json", "ID": "e052b6a7-9e18-44a6-8c82-b252415c9187", "DetectTime": "2023-10-30T14:07:52.284163+02:00", "EventTime": "2023-10-30T14:07:52.284175+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T14:12:12.361310+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2023/10/30 14:07:52.383688)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3caac2e7-9412-4198-886e-7e431ca07d9b", "DetectTime": "2023-10-30T14:07:52.389852+02:00", "EventTime": "2023-10-30T14:07:52.389868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CgFLDg1xePxijC1C16"]} -{"Format": "IDEA0", "ID": "f3baba6e-6f4d-42db-90e1-dda6f4adba01", "DetectTime": "2023-10-30T14:07:52.429218+02:00", "EventTime": "2023-10-30T14:07:52.429234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CBHytsFeEBBZNjyX4"]} -{"Format": "IDEA0", "ID": "46d14977-f3d5-4c92-80ef-6199322071cc", "DetectTime": "2023-10-30T14:07:52.462521+02:00", "EventTime": "2023-10-30T14:07:52.462537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["Cxmb593s7iZbl4Sx1b"]} -{"Format": "IDEA0", "ID": "0813c9d4-dd9f-4e91-b363-905e4574516a", "DetectTime": "2023-10-30T14:07:52.498349+02:00", "EventTime": "2023-10-30T14:07:52.498367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CQ0VO12CHMsDxyAAVd"]} -{"Format": "IDEA0", "ID": "1e4ae0a4-88bc-4c21-a278-f9eb011477ed", "DetectTime": "2023-10-30T14:07:52.534498+02:00", "EventTime": "2023-10-30T14:07:52.534518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CfDWFz1RGU3eEtSyn5"]} -{"Format": "IDEA0", "ID": "09dc6ae8-ab87-48e7-b9d0-6397f7973601", "DetectTime": "2023-10-30T14:07:52.570544+02:00", "EventTime": "2023-10-30T14:07:52.570560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CUsE0R2SaCj3QcMZi"]} -{"Format": "IDEA0", "ID": "5c0feb1d-e5f9-45bd-98d5-d1d2f8f556e8", "DetectTime": "2023-10-30T14:07:52.604139+02:00", "EventTime": "2023-10-30T14:07:52.604153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CGFa2y4ogThck9SVQ7"]} -{"Format": "IDEA0", "ID": "daf892be-c98c-41e4-b287-1a0f0e3d5e34", "DetectTime": "2023-10-30T14:07:52.644676+02:00", "EventTime": "2023-10-30T14:07:52.644699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cu0liC1j2pEtmz2PXb"]} -{"Format": "Json", "ID": "daf892be-c98c-41e4-b287-1a0f0e3d5e34", "DetectTime": "2023-10-30T14:07:52.644676+02:00", "EventTime": "2023-10-30T14:07:52.644699+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T14:12:48.847179+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2023/10/30 14:07:52.720074)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb87942b-983f-443d-966a-d91a2edf1667", "DetectTime": "2023-10-30T14:07:52.724630+02:00", "EventTime": "2023-10-30T14:07:52.724644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4258], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. ", "ContentType": "text/plain"}], "uids": ["CWY1Rm3q6gnrOMOIB8"]} -{"Format": "IDEA0", "ID": "fe719f3e-cf35-408f-82e6-cffebe5805f1", "DetectTime": "2023-10-30T14:07:52.757836+02:00", "EventTime": "2023-10-30T14:07:52.757848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CL19Cg1ZmE6N2SWaxc"]} -{"Format": "IDEA0", "ID": "c366800f-f98e-4efe-958c-2ce770f95747", "DetectTime": "2023-10-30T14:07:52.786985+02:00", "EventTime": "2023-10-30T14:07:52.787004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CTzPHC4ojqs2AJIFcc"]} -{"Format": "IDEA0", "ID": "2ef0c4e4-317f-464e-a3f7-c2655a14a152", "DetectTime": "2023-10-30T14:07:52.820099+02:00", "EventTime": "2023-10-30T14:07:52.820111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CdhSlL1HYivf9gpzk3"]} -{"Format": "IDEA0", "ID": "b479600f-0d35-491b-a45e-bf0308ee5c83", "DetectTime": "2023-10-30T14:07:52.853305+02:00", "EventTime": "2023-10-30T14:07:52.853323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CkbEmWCF4x29X8LV2"]} -{"Format": "IDEA0", "ID": "b995b183-cbc0-498c-9107-3bcaf91e27c0", "DetectTime": "2023-10-30T14:07:52.885701+02:00", "EventTime": "2023-10-30T14:07:52.885718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["C2dHKa2Q2IJNIhQ73f"]} -{"Format": "IDEA0", "ID": "0484bbe0-2c0a-4d82-befa-36504d531c81", "DetectTime": "2023-10-30T14:07:52.919081+02:00", "EventTime": "2023-10-30T14:07:52.919108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CAMnLMNkwzvDSXDzj"]} -{"Format": "IDEA0", "ID": "7f42a74d-c818-4e74-a1c1-253c185d78d7", "DetectTime": "2023-10-30T14:07:52.951363+02:00", "EventTime": "2023-10-30T14:07:52.951381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CxkMjB3NNCUVHDpVU3"]} -{"Format": "Json", "ID": "7f42a74d-c818-4e74-a1c1-253c185d78d7", "DetectTime": "2023-10-30T14:07:52.951363+02:00", "EventTime": "2023-10-30T14:07:52.951381+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T14:12:51.528632+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2023/10/30 14:07:53.024163)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2cdd5db0-5f7b-4e94-99de-f1f450fa7e80", "DetectTime": "2023-10-30T14:07:53.030109+02:00", "EventTime": "2023-10-30T14:07:53.030136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cx6NVT2uEZoTEgGiGf"]} -{"Format": "IDEA0", "ID": "72e2c27f-0d08-494f-9f1b-734793fe1ea9", "DetectTime": "2023-10-30T14:07:53.075455+02:00", "EventTime": "2023-10-30T14:07:53.075484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CJmyBW2nVXfzF3g1Yd"]} -{"Format": "IDEA0", "ID": "49730fdd-17fe-4ed4-acf4-9a0fa817e344", "DetectTime": "2023-10-30T14:07:53.109662+02:00", "EventTime": "2023-10-30T14:07:53.109684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CtEiww1XXQF6N9WaV4"]} -{"Format": "IDEA0", "ID": "a6963e4a-22df-491c-bc0a-7580a1d024d0", "DetectTime": "2023-10-30T14:07:53.142214+02:00", "EventTime": "2023-10-30T14:07:53.142234+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CSRlGs42lE7HvyIpvj"]} -{"Format": "IDEA0", "ID": "28eb50d2-9b8b-44f9-a901-362517fe57fe", "DetectTime": "2023-10-30T14:07:53.174158+02:00", "EventTime": "2023-10-30T14:07:53.174185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C6Cv0Q2gxbTkjhZCWa"]} -{"Format": "IDEA0", "ID": "bb28a8de-c890-497f-9e15-38b33790b08d", "DetectTime": "2023-10-30T14:07:53.204948+02:00", "EventTime": "2023-10-30T14:07:53.204966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CBA5wj2PDUk01mecXa"]} -{"Format": "IDEA0", "ID": "fc09e7f8-de8e-4ebb-9652-16fc990a6182", "DetectTime": "2023-10-30T14:07:53.237296+02:00", "EventTime": "2023-10-30T14:07:53.237319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CJTl843y1B8cZ4VVq2"]} -{"Format": "IDEA0", "ID": "fcd62013-19a3-46d9-9f07-3212a29695ea", "DetectTime": "2023-10-30T14:07:53.267574+02:00", "EventTime": "2023-10-30T14:07:53.267600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cw9aP63w5VhjAYpMSg"]} -{"Format": "IDEA0", "ID": "1d71f45b-2164-45ae-ae2b-7379ac040d50", "DetectTime": "2023-10-30T14:07:53.296859+02:00", "EventTime": "2023-10-30T14:07:53.296875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CrfufZ1rtTDGgBu66"]} -{"Format": "Json", "ID": "1d71f45b-2164-45ae-ae2b-7379ac040d50", "DetectTime": "2023-10-30T14:07:53.296859+02:00", "EventTime": "2023-10-30T14:07:53.296875+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T14:43:40.313213+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2023/10/30 14:07:53.368950)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5548369d-5ae8-429c-a770-ec34c0d9b4ca", "DetectTime": "2023-10-30T14:07:53.374489+02:00", "EventTime": "2023-10-30T14:07:53.374504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CZ3zlO1jC2XXgqgw5h"]} -{"Format": "IDEA0", "ID": "6c69c538-57cb-4ec3-963b-90ab26647b11", "DetectTime": "2023-10-30T14:07:53.408753+02:00", "EventTime": "2023-10-30T14:07:53.408771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cece8d4TX862JDpFD7"]} -{"Format": "IDEA0", "ID": "499adec0-b791-4f19-b753-0d9b14199627", "DetectTime": "2023-10-30T14:07:53.443174+02:00", "EventTime": "2023-10-30T14:07:53.443194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPW43UeS7x9Fn7e45"]} -{"Format": "IDEA0", "ID": "0be94079-03cf-41f6-844c-7df3409478dc", "DetectTime": "2023-10-30T14:07:53.473702+02:00", "EventTime": "2023-10-30T14:07:53.473721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cf0scY1eTPvbyImZii"]} -{"Format": "IDEA0", "ID": "e48769f1-b779-40a0-aff2-f5ad40235768", "DetectTime": "2023-10-30T14:07:53.507828+02:00", "EventTime": "2023-10-30T14:07:53.507853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C6xER5NydO5em6yV2"]} -{"Format": "IDEA0", "ID": "cf766ea8-7604-4d51-adfc-0d38cfc42cda", "DetectTime": "2023-10-30T14:07:53.537769+02:00", "EventTime": "2023-10-30T14:07:53.537785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C0dFfF328CUvAw1kGb"]} -{"Format": "IDEA0", "ID": "84514d7e-1fb4-44b6-9004-c3c9f81b5dbf", "DetectTime": "2023-10-30T14:07:53.567899+02:00", "EventTime": "2023-10-30T14:07:53.567923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CPIu9k3fieUAxoujj9"]} -{"Format": "IDEA0", "ID": "731b555a-3806-43f3-aaed-ccc0ad3d08d7", "DetectTime": "2023-10-30T14:07:53.595672+02:00", "EventTime": "2023-10-30T14:07:53.595689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CdhkGGmASlUyjCQIc"]} -{"Format": "Json", "ID": "731b555a-3806-43f3-aaed-ccc0ad3d08d7", "DetectTime": "2023-10-30T14:07:53.595672+02:00", "EventTime": "2023-10-30T14:07:53.595689+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T14:43:42.123400+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2023/10/30 14:07:53.655738)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9fffc2f5-84d9-41f9-92d0-5f34abe36010", "DetectTime": "2023-10-30T14:07:53.660635+02:00", "EventTime": "2023-10-30T14:07:53.660654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CdvCoo1zXmgbgLZ1c6"]} -{"Format": "IDEA0", "ID": "5fba7c69-0742-47d0-b45c-9fe9dfd52208", "DetectTime": "2023-10-30T14:07:53.689428+02:00", "EventTime": "2023-10-30T14:07:53.689449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CgON9l3IBJKbvaET49"]} -{"Format": "IDEA0", "ID": "fb9f9fd5-f603-412a-9c15-584c6b6a6447", "DetectTime": "2023-10-30T14:07:53.720037+02:00", "EventTime": "2023-10-30T14:07:53.720057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Clrloi2gAqmd9uEnZi"]} -{"Format": "IDEA0", "ID": "e77363c3-e790-4267-8c2f-72cd69d5040f", "DetectTime": "2023-10-30T14:07:53.754417+02:00", "EventTime": "2023-10-30T14:07:53.754445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CN6u8p1FUhfqKjIgNf"]} -{"Format": "IDEA0", "ID": "2fb17996-c160-4d02-ab09-0ca3d9801f59", "DetectTime": "2023-10-30T14:07:53.779450+02:00", "EventTime": "2023-10-30T14:07:53.779467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C18xtQGVzaAK28dTk"]} -{"Format": "IDEA0", "ID": "74ad355a-61f0-439f-b810-bb12794d79ad", "DetectTime": "2023-10-30T14:07:53.806457+02:00", "EventTime": "2023-10-30T14:07:53.806471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CtMznQyzMABjN87j8"]} -{"Format": "IDEA0", "ID": "34bf1930-0935-43f1-9683-14d45842c3f1", "DetectTime": "2023-10-30T14:07:53.832742+02:00", "EventTime": "2023-10-30T14:07:53.832765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CeHJgR2kIw12SN3ekb"]} -{"Format": "IDEA0", "ID": "2c05f30f-e96a-430e-90ef-22ffe62ba6cc", "DetectTime": "2023-10-30T14:07:53.858985+02:00", "EventTime": "2023-10-30T14:07:53.859006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CYhSJu3ReIwNxTIy39"]} -{"Format": "Json", "ID": "2c05f30f-e96a-430e-90ef-22ffe62ba6cc", "DetectTime": "2023-10-30T14:07:53.858985+02:00", "EventTime": "2023-10-30T14:07:53.859006+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T14:44:22.513574+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2023/10/30 14:07:53.917500)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "13906ab4-15b7-4ed8-8cf7-b433edfa0884", "DetectTime": "2023-10-30T14:07:53.923911+02:00", "EventTime": "2023-10-30T14:07:53.923937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CBrezo3XcJlGD6U8Bg"]} -{"Format": "IDEA0", "ID": "f52437dc-312e-416c-a48b-1777418fb134", "DetectTime": "2023-10-30T14:07:53.950227+02:00", "EventTime": "2023-10-30T14:07:53.950247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CgKNL90oNTU9saL5a"]} -{"Format": "IDEA0", "ID": "c1d959a7-00b0-40de-9417-c56425cb6404", "DetectTime": "2023-10-30T14:07:53.976174+02:00", "EventTime": "2023-10-30T14:07:53.976190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["ChDIu31ftBiniyhtk"]} -{"Format": "IDEA0", "ID": "e5b756a0-d576-417d-ad32-3beb938748d6", "DetectTime": "2023-10-30T14:07:54.002381+02:00", "EventTime": "2023-10-30T14:07:54.002398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Co2VYNYYdHdnkJwZ2"]} -{"Format": "IDEA0", "ID": "740ddfe2-ec9d-4518-ac8f-d90e6438a2db", "DetectTime": "2023-10-30T14:07:54.027266+02:00", "EventTime": "2023-10-30T14:07:54.027278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["C61bI04R9OrdNUNjge"]} -{"Format": "IDEA0", "ID": "cf61a6da-f3f6-4d3d-bd6c-1ffc517a433a", "DetectTime": "2023-10-30T14:07:54.051444+02:00", "EventTime": "2023-10-30T14:07:54.051463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CzyGQk2A967ICxfJu8"]} -{"Format": "IDEA0", "ID": "a23da0ad-37cf-4613-82c1-fe72bbc2fb47", "DetectTime": "2023-10-30T14:07:54.073819+02:00", "EventTime": "2023-10-30T14:07:54.073839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CbkwJN2T1C7W0oGd1f"]} -{"Format": "IDEA0", "ID": "07c0b967-7e47-4e6c-85f8-87346e8c2025", "DetectTime": "2023-10-30T14:07:54.098762+02:00", "EventTime": "2023-10-30T14:07:54.098815+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CJGFir1ffwilbbKmA"]} -{"Format": "IDEA0", "ID": "64b8c4e4-da3a-4c96-9fd8-1ef08121ff1d", "DetectTime": "2023-10-30T14:07:54.130384+02:00", "EventTime": "2023-10-30T14:07:54.130406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["C8bNTK1iHhMsuDD9F2"]} -{"Format": "IDEA0", "ID": "ffe1532c-b5da-4d95-90fa-0298195d31bc", "DetectTime": "2023-10-30T14:07:54.168854+02:00", "EventTime": "2023-10-30T14:07:54.168871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CkMg9F1UufXb9tpqbf"]} -{"Format": "IDEA0", "ID": "f4131de8-a3e3-4d7b-8426-0bd966152900", "DetectTime": "2023-10-30T14:07:54.210205+02:00", "EventTime": "2023-10-30T14:07:54.210229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CW62Zu2sJx0Q1Ue08i"]} -{"Format": "IDEA0", "ID": "79496d16-57cb-4564-b487-8049a5c8dbf8", "DetectTime": "2023-10-30T14:07:54.353928+02:00", "EventTime": "2023-10-30T14:07:54.353956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CZHdim3GLHJZJfJCYh"]} -{"Format": "IDEA0", "ID": "4eed2b63-c144-4e61-9b4a-dab23edcb1ad", "DetectTime": "2023-10-30T14:07:54.399468+02:00", "EventTime": "2023-10-30T14:07:54.399497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C9Oolf32OxfuZsU8zi"]} -{"Format": "IDEA0", "ID": "335d4c90-9a55-41be-8cbd-1711655e3548", "DetectTime": "2023-10-30T14:07:54.442769+02:00", "EventTime": "2023-10-30T14:07:54.442848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CBQ0Db1CinvlDdSzck"]} -{"Format": "IDEA0", "ID": "6789c55f-5f36-4765-affd-cdae7c5351b3", "DetectTime": "2023-10-30T14:07:54.487160+02:00", "EventTime": "2023-10-30T14:07:54.487181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CfzShu43odAdAVg1R4"]} -{"Format": "IDEA0", "ID": "d2956c5d-262b-429e-a67c-8235eca3c281", "DetectTime": "2023-10-30T14:07:54.534878+02:00", "EventTime": "2023-10-30T14:07:54.534906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CrjujvNTaim0L7M8c"]} -{"Format": "Json", "ID": "d2956c5d-262b-429e-a67c-8235eca3c281", "DetectTime": "2023-10-30T14:07:54.534878+02:00", "EventTime": "2023-10-30T14:07:54.534906+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T15:14:58.552009+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:54.622125)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45da8ccc-b394-4824-97ba-47040b780755", "DetectTime": "2023-10-30T14:07:54.627909+02:00", "EventTime": "2023-10-30T14:07:54.627929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CgyTlP11rlolqesnjk"]} -{"Format": "IDEA0", "ID": "e212636d-da29-4158-8ac9-c05b5e0589cc", "DetectTime": "2023-10-30T14:07:54.674767+02:00", "EventTime": "2023-10-30T14:07:54.674853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CoUKV3hxAbuQ3RQf7"]} -{"Format": "IDEA0", "ID": "439051ce-600d-4b40-b2ec-97163aa58f80", "DetectTime": "2023-10-30T14:07:54.714279+02:00", "EventTime": "2023-10-30T14:07:54.714303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CMTvF54tr2XV4qS3ja"]} -{"Format": "IDEA0", "ID": "d6202295-02cc-4f0f-bc08-c6c3f4b8d68a", "DetectTime": "2023-10-30T14:07:54.755949+02:00", "EventTime": "2023-10-30T14:07:54.755966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C6Twty1e9OkuD8YThl"]} -{"Format": "IDEA0", "ID": "9b9ede8c-05f9-4a94-bcc2-f16ac31409e7", "DetectTime": "2023-10-30T14:07:54.794532+02:00", "EventTime": "2023-10-30T14:07:54.794553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["COvRbq23LAnptoYHJ7"]} -{"Format": "IDEA0", "ID": "e8cc8f8e-9ebf-4b5f-8093-70e49cf3de0d", "DetectTime": "2023-10-30T14:07:54.840345+02:00", "EventTime": "2023-10-30T14:07:54.840362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CNeWZu1u8TjWk1zKIl"]} -{"Format": "IDEA0", "ID": "97757bfb-33ab-491d-a094-56ec784531f4", "DetectTime": "2023-10-30T14:07:54.880328+02:00", "EventTime": "2023-10-30T14:07:54.880349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CoRCsavj2SU7u7d2i"]} -{"Format": "IDEA0", "ID": "10931aa1-ead1-4259-9673-6aba08d6efd9", "DetectTime": "2023-10-30T14:07:54.921451+02:00", "EventTime": "2023-10-30T14:07:54.921468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CYAK8m1HTse7oHPQJh"]} -{"Format": "Json", "ID": "10931aa1-ead1-4259-9673-6aba08d6efd9", "DetectTime": "2023-10-30T14:07:54.921451+02:00", "EventTime": "2023-10-30T14:07:54.921468+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T15:15:00.845625+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:55.007087)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fa1e67ff-969d-4dfb-8079-dd68ba7c3eab", "DetectTime": "2023-10-30T14:07:55.013319+02:00", "EventTime": "2023-10-30T14:07:55.013347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["ChrCCB432HrRrafXpd"]} -{"Format": "IDEA0", "ID": "b3a83ed5-6377-423a-9817-2c6169ee7338", "DetectTime": "2023-10-30T14:07:55.054670+02:00", "EventTime": "2023-10-30T14:07:55.054695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CH60774nEB1dy4gOhe"]} -{"Format": "IDEA0", "ID": "2df43a35-76ac-4ad4-8f54-cdade0fc7f63", "DetectTime": "2023-10-30T14:07:55.089128+02:00", "EventTime": "2023-10-30T14:07:55.089146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CghiQm4aDIZGvfEQ2"]} -{"Format": "IDEA0", "ID": "e281f555-c84a-43c1-b348-30ce3f95b2bc", "DetectTime": "2023-10-30T14:07:55.124396+02:00", "EventTime": "2023-10-30T14:07:55.124416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CDv3g73iMddkAcnsTb"]} -{"Format": "IDEA0", "ID": "e10b547d-fb1b-46e3-a77a-2111647c56bf", "DetectTime": "2023-10-30T14:07:55.162044+02:00", "EventTime": "2023-10-30T14:07:55.162062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CHzaUQ1JYYnz1UZ541"]} -{"Format": "IDEA0", "ID": "16fa73c3-5438-474c-9cda-b3d009c70b35", "DetectTime": "2023-10-30T14:07:55.196142+02:00", "EventTime": "2023-10-30T14:07:55.196156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CHNgDF2koPnPqOGhol"]} -{"Format": "IDEA0", "ID": "47d12fa5-7e7e-4ee7-939a-f52715377401", "DetectTime": "2023-10-30T14:07:55.228999+02:00", "EventTime": "2023-10-30T14:07:55.229017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C8j7043mbXJ0KcRwfg"]} -{"Format": "IDEA0", "ID": "534ce3a9-3f25-44fb-b484-702cbe3e6e4e", "DetectTime": "2023-10-30T14:07:55.267490+02:00", "EventTime": "2023-10-30T14:07:55.267508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["C0j4pv4shT7mSgioH4"]} -{"Format": "Json", "ID": "534ce3a9-3f25-44fb-b484-702cbe3e6e4e", "DetectTime": "2023-10-30T14:07:55.267490+02:00", "EventTime": "2023-10-30T14:07:55.267508+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T15:15:02.972080+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:55.345376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "63d3bfcd-f9a1-4f47-bb96-20e5ce86490a", "DetectTime": "2023-10-30T14:07:55.352617+02:00", "EventTime": "2023-10-30T14:07:55.352638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C8Is9G23bKFRxsJff6"]} -{"Format": "IDEA0", "ID": "cd3176bd-5841-4125-9a3e-6740ab7fc81d", "DetectTime": "2023-10-30T14:07:55.392905+02:00", "EventTime": "2023-10-30T14:07:55.392925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CJFPmf4foNlTbJouQ7"]} -{"Format": "IDEA0", "ID": "268845a3-cd54-422e-883c-3ce18cbd94bc", "DetectTime": "2023-10-30T14:07:55.426014+02:00", "EventTime": "2023-10-30T14:07:55.426036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CwrrmU2JCcCuILlQHj"]} -{"Format": "IDEA0", "ID": "792fa64e-a2a1-44cf-8e36-51b81e465a43", "DetectTime": "2023-10-30T14:07:55.459708+02:00", "EventTime": "2023-10-30T14:07:55.459726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CNHIsv1LivaMs2SEXc"]} -{"Format": "IDEA0", "ID": "6db94728-dd73-4348-8b1e-309c6cc6ceee", "DetectTime": "2023-10-30T14:07:55.492923+02:00", "EventTime": "2023-10-30T14:07:55.492943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CLAnJb2UxoA3fMtNVc"]} -{"Format": "IDEA0", "ID": "1717ec44-6115-4b6d-aff4-9f7e3360e258", "DetectTime": "2023-10-30T14:07:55.525739+02:00", "EventTime": "2023-10-30T14:07:55.525756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["C83aIQ2Ub7hDzyQ3Pl"]} -{"Format": "IDEA0", "ID": "618dbd59-0def-4631-af4b-6259a59c741e", "DetectTime": "2023-10-30T14:07:55.557449+02:00", "EventTime": "2023-10-30T14:07:55.557468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CxSmWM2aaFKNMINUh7"]} -{"Format": "IDEA0", "ID": "0f0576f8-a5e1-4ff2-bb67-435695526821", "DetectTime": "2023-10-30T14:07:55.590266+02:00", "EventTime": "2023-10-30T14:07:55.590292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CyAEbD2GWxN8W3eatf"]} -{"Format": "Json", "ID": "0f0576f8-a5e1-4ff2-bb67-435695526821", "DetectTime": "2023-10-30T14:07:55.590266+02:00", "EventTime": "2023-10-30T14:07:55.590292+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T15:45:09.513138+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:55.661432)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a50cf005-13f7-4553-8bc5-9f509d2414a0", "DetectTime": "2023-10-30T14:07:55.666456+02:00", "EventTime": "2023-10-30T14:07:55.666473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C7GRQp3S4NOuM99S63"]} -{"Format": "IDEA0", "ID": "a151e78c-a0de-4e05-9be6-9f075a1567e0", "DetectTime": "2023-10-30T14:07:55.697391+02:00", "EventTime": "2023-10-30T14:07:55.697416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CadzNJ3wQBxHHvYeg9"]} -{"Format": "IDEA0", "ID": "7fed2f97-3f81-461e-84a1-0dc58dceb01d", "DetectTime": "2023-10-30T14:07:55.729758+02:00", "EventTime": "2023-10-30T14:07:55.729770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CzJRw13iz1y5CCUvvi"]} -{"Format": "IDEA0", "ID": "6c74846b-021d-4a15-9459-5afca048addf", "DetectTime": "2023-10-30T14:07:55.760144+02:00", "EventTime": "2023-10-30T14:07:55.760165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cd31UdmS7cwK2g58"]} -{"Format": "IDEA0", "ID": "1505526a-ab5c-443e-9507-7d464a6bd01b", "DetectTime": "2023-10-30T14:07:55.789684+02:00", "EventTime": "2023-10-30T14:07:55.789710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CMtgzL2u3CDAoW1JSd"]} -{"Format": "IDEA0", "ID": "7e487340-fc96-4268-8ad1-e5644eef89a9", "DetectTime": "2023-10-30T14:07:55.819124+02:00", "EventTime": "2023-10-30T14:07:55.819137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C7wbrg2HyJqCcmd8zg"]} -{"Format": "IDEA0", "ID": "e2a4e8bd-4bda-4aaa-9a85-2816010501fb", "DetectTime": "2023-10-30T14:07:55.848781+02:00", "EventTime": "2023-10-30T14:07:55.848805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cg2jVlOPnRYknX0V"]} -{"Format": "IDEA0", "ID": "f98f003a-3d92-438f-8369-50f851ea7d75", "DetectTime": "2023-10-30T14:07:55.879280+02:00", "EventTime": "2023-10-30T14:07:55.879298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CPzAeCSdYLqcaEhu9"]} -{"Format": "Json", "ID": "f98f003a-3d92-438f-8369-50f851ea7d75", "DetectTime": "2023-10-30T14:07:55.879280+02:00", "EventTime": "2023-10-30T14:07:55.879298+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T15:45:11.421787+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:55.947813)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ee4c463e-33fc-4ab6-97be-bc4b3e5c56f1", "DetectTime": "2023-10-30T14:07:55.954681+02:00", "EventTime": "2023-10-30T14:07:55.954710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C78ULP34hbzkU6c4Xg"]} -{"Format": "IDEA0", "ID": "10565fb2-dc3f-4bb6-9e89-ffd35d3010f5", "DetectTime": "2023-10-30T14:07:55.983437+02:00", "EventTime": "2023-10-30T14:07:55.983454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CE4OyMpT74KrsRFXa"]} -{"Format": "IDEA0", "ID": "455d2c59-c237-4fab-a2fc-384a3dd6e722", "DetectTime": "2023-10-30T14:07:56.009580+02:00", "EventTime": "2023-10-30T14:07:56.009599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["Cxd6Cx1EIrHOO17qu"]} -{"Format": "IDEA0", "ID": "d59dc95f-a7ce-4685-837d-aa12b2c8411e", "DetectTime": "2023-10-30T14:07:56.032669+02:00", "EventTime": "2023-10-30T14:07:56.032695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CtJuXm1BivboJ2Erka"]} -{"Format": "IDEA0", "ID": "b4d66e7c-e979-43e2-9242-30584c7a91b9", "DetectTime": "2023-10-30T14:07:56.053977+02:00", "EventTime": "2023-10-30T14:07:56.053993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C5QMjv2xvxdcd8i58h"]} -{"Format": "IDEA0", "ID": "a22ce696-eb9b-4d37-8675-ca9e1edab491", "DetectTime": "2023-10-30T14:07:56.075228+02:00", "EventTime": "2023-10-30T14:07:56.075249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CGexI21gbZ4h7gGrf2"]} -{"Format": "IDEA0", "ID": "17f920f6-129e-46cf-9806-7e1c19b35d70", "DetectTime": "2023-10-30T14:07:56.096682+02:00", "EventTime": "2023-10-30T14:07:56.096698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CC6lSD4D1oN1dBv3Li"]} -{"Format": "IDEA0", "ID": "983356b3-1b81-43fd-88d1-68342a9617b0", "DetectTime": "2023-10-30T14:07:56.118437+02:00", "EventTime": "2023-10-30T14:07:56.118454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CsPY4E0CdZJSOFE7j"]} -{"Format": "Json", "ID": "983356b3-1b81-43fd-88d1-68342a9617b0", "DetectTime": "2023-10-30T14:07:56.118437+02:00", "EventTime": "2023-10-30T14:07:56.118454+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T15:45:13.236484+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:56.177597)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fd6460c9-d3d8-49aa-8df3-e4fb226b19f2", "DetectTime": "2023-10-30T14:07:56.183070+02:00", "EventTime": "2023-10-30T14:07:56.183102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CKSIO348I1fStAgCei"]} -{"Format": "IDEA0", "ID": "f722596e-1eb4-43dd-a8f6-31ab4adc4793", "DetectTime": "2023-10-30T14:07:56.208325+02:00", "EventTime": "2023-10-30T14:07:56.208341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CQ7sJUk1NXHiuLgH5"]} -{"Format": "IDEA0", "ID": "b5e5f6cb-c759-482d-9915-09822eede0dc", "DetectTime": "2023-10-30T14:07:56.230765+02:00", "EventTime": "2023-10-30T14:07:56.230823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CQaY6o1pe3eAQ3jtj2"]} -{"Format": "IDEA0", "ID": "1746a5a8-0a4f-4fcc-b01c-0fd04f43e3b1", "DetectTime": "2023-10-30T14:07:56.253511+02:00", "EventTime": "2023-10-30T14:07:56.253535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CfKVM61VrPiQ3vZ3Hb"]} -{"Format": "IDEA0", "ID": "2f3cad74-d1ec-4c80-8354-7ed1642b7c9b", "DetectTime": "2023-10-30T14:07:56.391749+02:00", "EventTime": "2023-10-30T14:07:56.391777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CwahVT3cwW5V1jILt7"]} -{"Format": "IDEA0", "ID": "ac6dea8b-8364-41b8-9fe4-c7d01e7e781f", "DetectTime": "2023-10-30T14:07:56.417155+02:00", "EventTime": "2023-10-30T14:07:56.417181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CTJChb4P63R0r1ZmTc"]} -{"Format": "IDEA0", "ID": "daa19bb5-416f-4138-aaaa-130423917d41", "DetectTime": "2023-10-30T14:07:56.445658+02:00", "EventTime": "2023-10-30T14:07:56.445677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C5AEos3pFBYhIAtpv8"]} -{"Format": "IDEA0", "ID": "673b8b27-e96e-4616-a932-12306a3587ab", "DetectTime": "2023-10-30T14:07:56.468786+02:00", "EventTime": "2023-10-30T14:07:56.468807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CRc3De2ykJpzd1TiCi"]} -{"Format": "Json", "ID": "673b8b27-e96e-4616-a932-12306a3587ab", "DetectTime": "2023-10-30T14:07:56.468786+02:00", "EventTime": "2023-10-30T14:07:56.468807+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-05T15:50:10.892233+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2023/10/30 14:07:56.535052)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c72fb94e-d849-4608-9bae-991d3daaef85", "DetectTime": "2023-10-30T14:07:56.542243+02:00", "EventTime": "2023-10-30T14:07:56.542262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C4vFvv3X8oHIFCDnQk"]} -{"Format": "IDEA0", "ID": "0a284d01-d3da-4d5f-82ff-0be1a39d99c1", "DetectTime": "2023-10-30T14:07:56.585995+02:00", "EventTime": "2023-10-30T14:07:56.586012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cp0XtF4P1W7VP24Pc9"]} -{"Format": "IDEA0", "ID": "480630b2-d306-4e8f-9f16-c3eaf4010517", "DetectTime": "2023-10-30T14:07:56.610635+02:00", "EventTime": "2023-10-30T14:07:56.610662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cvx5a54DAETmWgDHl4"]} -{"Format": "IDEA0", "ID": "1b79a053-c92c-4870-a2db-c6ae041725ae", "DetectTime": "2023-10-30T14:07:56.652631+02:00", "EventTime": "2023-10-30T14:07:56.652658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CkOkFo4TwSlGTVhpYh"]} -{"Format": "IDEA0", "ID": "f7957cf7-a5f6-494f-bce0-24b9a36ac89e", "DetectTime": "2023-10-30T14:07:56.692737+02:00", "EventTime": "2023-10-30T14:07:56.692756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CsfCNE7V7h29Shc05"]} -{"Format": "IDEA0", "ID": "96841443-3ca0-4f98-9919-dee78244bf81", "DetectTime": "2023-10-30T14:07:56.732059+02:00", "EventTime": "2023-10-30T14:07:56.732090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CB45z8DLf4DG1HPj"]} -{"Format": "IDEA0", "ID": "70d15a9e-d421-44fe-821b-05b4f8104ed6", "DetectTime": "2023-10-30T14:07:56.770627+02:00", "EventTime": "2023-10-30T14:07:56.770646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Coo5Vm4ZYbO8lGtU2j"]} -{"Format": "IDEA0", "ID": "7ac04428-43cf-4d98-97a4-fa4818ebc497", "DetectTime": "2023-10-30T14:07:56.811120+02:00", "EventTime": "2023-10-30T14:07:56.811139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJEmnz3uix5OBEABt9"]} -{"Format": "IDEA0", "ID": "d7d7e02e-f28f-4c9c-99b8-2664210fdae1", "DetectTime": "2023-10-30T14:07:56.856858+02:00", "EventTime": "2023-10-30T14:07:56.856875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CTxqhuFZzanaHLAEg"]} -{"Format": "Json", "ID": "d7d7e02e-f28f-4c9c-99b8-2664210fdae1", "DetectTime": "2023-10-30T14:07:56.856858+02:00", "EventTime": "2023-10-30T14:07:56.856875+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T16:15:52.834405+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2023/10/30 14:07:56.947652)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b6b30c59-df79-4dad-8bad-569040abb46c", "DetectTime": "2023-10-30T14:07:56.954672+02:00", "EventTime": "2023-10-30T14:07:56.954698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cwu9pV2sfPev1AR9Qc"]} -{"Format": "IDEA0", "ID": "99c296f1-d520-404d-ba5c-18698c6bd00d", "DetectTime": "2023-10-30T14:07:57.003613+02:00", "EventTime": "2023-10-30T14:07:57.003630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CKN5B83tbqkclAIugk"]} -{"Format": "IDEA0", "ID": "68efd7c8-fdb5-4e21-8432-a5b1cbc571d0", "DetectTime": "2023-10-30T14:07:57.043582+02:00", "EventTime": "2023-10-30T14:07:57.043599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cdlr5u32yXjWG54k7c"]} -{"Format": "IDEA0", "ID": "dcbe6ea0-c75a-4110-b427-57bcfe930c80", "DetectTime": "2023-10-30T14:07:57.082978+02:00", "EventTime": "2023-10-30T14:07:57.082993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CWcJAo4iNCYzL8Q6Jl"]} -{"Format": "IDEA0", "ID": "b1658d33-8fd8-47bb-b059-1b68b7283a1a", "DetectTime": "2023-10-30T14:07:57.115140+02:00", "EventTime": "2023-10-30T14:07:57.115166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CyMAN83mK3P7tSQll2"]} -{"Format": "IDEA0", "ID": "12de74f2-9eb8-4fc2-84aa-b25d35cee502", "DetectTime": "2023-10-30T14:07:57.150470+02:00", "EventTime": "2023-10-30T14:07:57.150489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CtQlq33QOIcirmCEAd"]} -{"Format": "IDEA0", "ID": "034009c2-b09a-4b7b-9838-5fad352b9550", "DetectTime": "2023-10-30T14:07:57.185903+02:00", "EventTime": "2023-10-30T14:07:57.185922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["ChOQda4LLnEHyBACyk"]} -{"Format": "IDEA0", "ID": "841e3643-1643-4a5f-90b0-bbc6b4372222", "DetectTime": "2023-10-30T14:07:57.224572+02:00", "EventTime": "2023-10-30T14:07:57.224598+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CwpcyvssUeqSpXmol"]} -{"Format": "IDEA0", "ID": "d4db1b49-0be3-41b9-aead-63ae82e70ed9", "DetectTime": "2023-10-30T14:07:57.258079+02:00", "EventTime": "2023-10-30T14:07:57.258094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cyvbbr2EXGlLB3MF4g"]} -{"Format": "Json", "ID": "d4db1b49-0be3-41b9-aead-63ae82e70ed9", "DetectTime": "2023-10-30T14:07:57.258079+02:00", "EventTime": "2023-10-30T14:07:57.258094+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T16:15:54.548506+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2023/10/30 14:07:57.334691)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ceff71fe-fef4-499c-86b1-ea3f6dcb56e9", "DetectTime": "2023-10-30T14:07:57.340101+02:00", "EventTime": "2023-10-30T14:07:57.340118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CGLwFF3XoV23VenOT2"]} -{"Format": "IDEA0", "ID": "eb7c2489-5345-4beb-a247-69769d08708a", "DetectTime": "2023-10-30T14:07:57.377735+02:00", "EventTime": "2023-10-30T14:07:57.377754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CCV6h3M0td5nc8zYl"]} -{"Format": "IDEA0", "ID": "2be23685-172d-4ef8-b744-8036407a63bd", "DetectTime": "2023-10-30T14:07:57.410675+02:00", "EventTime": "2023-10-30T14:07:57.410689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Cz4o2m3m0D1iN8v7Xb"]} -{"Format": "IDEA0", "ID": "6b9a2331-2455-44e7-9838-e180d29860bb", "DetectTime": "2023-10-30T14:07:57.447382+02:00", "EventTime": "2023-10-30T14:07:57.447483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["Cz8vES1mL1QgKL5az6"]} -{"Format": "IDEA0", "ID": "c97acddf-ebe1-4728-bea3-65add9a87eb1", "DetectTime": "2023-10-30T14:07:57.481623+02:00", "EventTime": "2023-10-30T14:07:57.481646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["Cx7Vqj1WBg4HjAS8O2"]} -{"Format": "IDEA0", "ID": "16939fd2-f508-44e6-87c5-4f15803f0338", "DetectTime": "2023-10-30T14:07:57.517024+02:00", "EventTime": "2023-10-30T14:07:57.517049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Cb30Oa2EyDglWpVjsh"]} -{"Format": "IDEA0", "ID": "701d635a-542c-4163-8ecc-617cfcdc2191", "DetectTime": "2023-10-30T14:07:57.549324+02:00", "EventTime": "2023-10-30T14:07:57.549341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CBq7Gt1Cwm6MWHuikl"]} -{"Format": "IDEA0", "ID": "2d8a80b6-0b0d-4b02-876b-ee0d03d52f70", "DetectTime": "2023-10-30T14:07:57.581831+02:00", "EventTime": "2023-10-30T14:07:57.581855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CJbS9j7BhKOp52OL6"]} -{"Format": "Json", "ID": "2d8a80b6-0b0d-4b02-876b-ee0d03d52f70", "DetectTime": "2023-10-30T14:07:57.581831+02:00", "EventTime": "2023-10-30T14:07:57.581855+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T16:15:56.555436+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2023/10/30 14:07:57.657334)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e7f9cbfd-a07c-44db-abe4-49a8189076a1", "DetectTime": "2023-10-30T14:07:57.663550+02:00", "EventTime": "2023-10-30T14:07:57.663563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C3APuK15raejpPrDe"]} -{"Format": "IDEA0", "ID": "1c13ddb6-9a20-4b17-b8a8-f53dc9f0d0e5", "DetectTime": "2023-10-30T14:07:57.698187+02:00", "EventTime": "2023-10-30T14:07:57.698210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CZk9aE4veeiy1ZP6Bb"]} -{"Format": "IDEA0", "ID": "357b6b18-9192-4151-b5ae-4e24e8d9283a", "DetectTime": "2023-10-30T14:07:57.728879+02:00", "EventTime": "2023-10-30T14:07:57.728896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CxaP9e4L6xlSVCzzng"]} -{"Format": "IDEA0", "ID": "5f89c573-82a0-45e2-ac9b-8947322f2fbb", "DetectTime": "2023-10-30T14:07:57.760679+02:00", "EventTime": "2023-10-30T14:07:57.760709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C86t4NfuALx2BcLK2"]} -{"Format": "IDEA0", "ID": "b51d8d13-80f6-4893-8822-2beed6189206", "DetectTime": "2023-10-30T14:07:57.796573+02:00", "EventTime": "2023-10-30T14:07:57.796593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CL3Iks4yO8bL6djDwf"]} -{"Format": "IDEA0", "ID": "f8880d65-bb3b-4d32-9218-89246b14ffe9", "DetectTime": "2023-10-30T14:07:57.832084+02:00", "EventTime": "2023-10-30T14:07:57.832114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CP28Uc3ZrFRAy09RJ9"]} -{"Format": "IDEA0", "ID": "aa42be5d-3f74-4930-b01b-375dd57dfb81", "DetectTime": "2023-10-30T14:07:57.863494+02:00", "EventTime": "2023-10-30T14:07:57.863520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CLxKBc2JBZq7lwCq3d"]} -{"Format": "IDEA0", "ID": "3f4bfbdd-c4a7-4500-b82f-d78e38353d75", "DetectTime": "2023-10-30T14:07:57.898589+02:00", "EventTime": "2023-10-30T14:07:57.898604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["COCov74FWJIBS031Hl"]} -{"Format": "Json", "ID": "3f4bfbdd-c4a7-4500-b82f-d78e38353d75", "DetectTime": "2023-10-30T14:07:57.898589+02:00", "EventTime": "2023-10-30T14:07:57.898604+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T16:46:13.745424+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2023/10/30 14:07:57.975339)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d050aae4-c82a-4e3f-8d7c-fa89c5d30f1a", "DetectTime": "2023-10-30T14:07:57.981005+02:00", "EventTime": "2023-10-30T14:07:57.981024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CL6SRP14ytlqBigEXb"]} -{"Format": "IDEA0", "ID": "3b9b04a3-4c8c-4d65-82cf-cf77ed8732a1", "DetectTime": "2023-10-30T14:07:58.006495+02:00", "EventTime": "2023-10-30T14:07:58.006525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CGeg9l4EJCwpkXpfie"]} -{"Format": "IDEA0", "ID": "93389a80-8911-4139-84ee-cda937a1efbc", "DetectTime": "2023-10-30T14:07:58.032383+02:00", "EventTime": "2023-10-30T14:07:58.032411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CMwCdM37DNttkncdhg"]} -{"Format": "IDEA0", "ID": "9f3f77ab-d19a-4c11-bcca-8f0605bf8b1e", "DetectTime": "2023-10-30T14:07:58.058813+02:00", "EventTime": "2023-10-30T14:07:58.058833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Csdh8C2foLuDG3byF6"]} -{"Format": "IDEA0", "ID": "46cca0db-46ec-43d7-aa02-643932ba410d", "DetectTime": "2023-10-30T14:07:58.084051+02:00", "EventTime": "2023-10-30T14:07:58.084075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CDV2CoEIIGNqZT7r7"]} -{"Format": "IDEA0", "ID": "6e3e3d90-522c-4a21-ab45-2075d9bae897", "DetectTime": "2023-10-30T14:07:58.109692+02:00", "EventTime": "2023-10-30T14:07:58.109705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C3lftiEhkufdjRjxb"]} -{"Format": "IDEA0", "ID": "4caa9a2d-bdda-489e-9ec8-4e0fa6624d79", "DetectTime": "2023-10-30T14:07:58.138010+02:00", "EventTime": "2023-10-30T14:07:58.138023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CvvdoU1JtETRtQZGc"]} -{"Format": "IDEA0", "ID": "4e3bbfc1-7980-4385-b501-ba0e793f5918", "DetectTime": "2023-10-30T14:07:58.161467+02:00", "EventTime": "2023-10-30T14:07:58.161482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CRaONl4YuyarxCWk1f"]} -{"Format": "Json", "ID": "4e3bbfc1-7980-4385-b501-ba0e793f5918", "DetectTime": "2023-10-30T14:07:58.161467+02:00", "EventTime": "2023-10-30T14:07:58.161482+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T16:46:15.473717+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2023/10/30 14:07:58.220353)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a37a6a0b-24a3-43bb-a0bf-14479c2c128d", "DetectTime": "2023-10-30T14:07:58.226578+02:00", "EventTime": "2023-10-30T14:07:58.226591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C99Peu2X6H6sHXxUwf"]} -{"Format": "IDEA0", "ID": "94d1585b-04f2-4845-bfcb-6fbc9f7d28ed", "DetectTime": "2023-10-30T14:07:58.252288+02:00", "EventTime": "2023-10-30T14:07:58.252305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CayHTP23cmC4mHHrYk"]} -{"Format": "IDEA0", "ID": "602caac7-78d0-44e6-8685-71cc0bf43ed1", "DetectTime": "2023-10-30T14:07:58.275449+02:00", "EventTime": "2023-10-30T14:07:58.275467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CYDhum1VX9zOz3vXKb"]} -{"Format": "IDEA0", "ID": "543a5ae3-3502-4a3c-a647-4601968a85c8", "DetectTime": "2023-10-30T14:07:58.298304+02:00", "EventTime": "2023-10-30T14:07:58.298331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CNAiR14SOs79UWCOU5"]} -{"Format": "IDEA0", "ID": "dde8ce0f-1b6c-4680-81ab-6646e82888db", "DetectTime": "2023-10-30T14:07:58.322850+02:00", "EventTime": "2023-10-30T14:07:58.322863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Csg0qn2F6v5KQ8lnzf"]} -{"Format": "IDEA0", "ID": "32cb3e5b-3e7d-411d-909e-f3ed13bb6a57", "DetectTime": "2023-10-30T14:07:58.345548+02:00", "EventTime": "2023-10-30T14:07:58.345565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CGV8iM3olBaZE54aYd"]} -{"Format": "IDEA0", "ID": "bd435010-d543-44e5-a5aa-2a7f4fd11f15", "DetectTime": "2023-10-30T14:07:58.372790+02:00", "EventTime": "2023-10-30T14:07:58.372808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Chh9JV1jjDr8lYyLSi"]} -{"Format": "IDEA0", "ID": "8fdae83a-1f3e-4204-a696-7873152685a8", "DetectTime": "2023-10-30T14:07:58.397431+02:00", "EventTime": "2023-10-30T14:07:58.397452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CPsLQ914Inkdu0FFJ3"]} -{"Format": "Json", "ID": "8fdae83a-1f3e-4204-a696-7873152685a8", "DetectTime": "2023-10-30T14:07:58.397431+02:00", "EventTime": "2023-10-30T14:07:58.397452+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T16:46:17.353384+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2023/10/30 14:07:58.465621)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ad84a59-7baf-4424-a5c7-53600943aa94", "DetectTime": "2023-10-30T14:07:58.474745+02:00", "EventTime": "2023-10-30T14:07:58.474767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CGh8Wg1qUpFvGbdRDf"]} -{"Format": "IDEA0", "ID": "bfab44c5-bfcb-48ff-822d-226be6237960", "DetectTime": "2023-10-30T14:07:58.498051+02:00", "EventTime": "2023-10-30T14:07:58.498142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CIQzWa2y1suFNGp2A5"]} -{"Format": "IDEA0", "ID": "6535245f-7be6-49a3-b332-dc59fdfa1011", "DetectTime": "2023-10-30T14:07:58.519649+02:00", "EventTime": "2023-10-30T14:07:58.519671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Cmd20C20807povAmSg"]} -{"Format": "IDEA0", "ID": "0e7485f4-de6f-4d77-b02e-daa34e522eb9", "DetectTime": "2023-10-30T14:07:58.540928+02:00", "EventTime": "2023-10-30T14:07:58.540950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CoKOuF2KXxN3VyEANe"]} -{"Format": "IDEA0", "ID": "b6a85f48-eae7-4f74-a87b-a00beb712a86", "DetectTime": "2023-10-30T14:07:58.561574+02:00", "EventTime": "2023-10-30T14:07:58.561594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CEGZl62JpcYy8fchdg"]} -{"Format": "IDEA0", "ID": "0c86b545-a6aa-488c-99b5-d80c6902b0b5", "DetectTime": "2023-10-30T14:07:58.583819+02:00", "EventTime": "2023-10-30T14:07:58.583837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CWJfIZI4AEsHFmTp9"]} -{"Format": "IDEA0", "ID": "51d524c4-bcf8-4325-982b-6f46784a76c8", "DetectTime": "2023-10-30T14:07:58.606324+02:00", "EventTime": "2023-10-30T14:07:58.606342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["Co999UCswyCwuWYzg"]} -{"Format": "IDEA0", "ID": "107a0617-05e2-4bb6-ab5e-507426262cb4", "DetectTime": "2023-10-30T14:07:58.628627+02:00", "EventTime": "2023-10-30T14:07:58.628645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CWwnvC4CZEivMx625h"]} -{"Format": "IDEA0", "ID": "38533e25-4f0c-4721-8ef5-83620a7ae496", "DetectTime": "2023-10-30T14:07:58.665857+02:00", "EventTime": "2023-10-30T14:07:58.665875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["C148Mx209KtTReaRK2"]} -{"Format": "IDEA0", "ID": "72c4d3a1-28d1-4aff-91c2-fddeeb15e100", "DetectTime": "2023-10-30T14:07:58.701086+02:00", "EventTime": "2023-10-30T14:07:58.701098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CfylrdEv69pjloJwf"]} -{"Format": "IDEA0", "ID": "d282502c-9a07-4723-a67f-113a1efa12a6", "DetectTime": "2023-10-30T14:07:58.737536+02:00", "EventTime": "2023-10-30T14:07:58.737563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CTQeBe2caETaIHWPcb"]} -{"Format": "IDEA0", "ID": "72c65b0f-1e52-4fa4-a55a-28a5ee133ff3", "DetectTime": "2023-10-30T14:07:58.775012+02:00", "EventTime": "2023-10-30T14:07:58.775025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXLTOF4MvvlOIBjfXc"]} -{"Format": "IDEA0", "ID": "f721308f-647c-4e79-9eb3-38b2d8c870c2", "DetectTime": "2023-10-30T14:07:58.811562+02:00", "EventTime": "2023-10-30T14:07:58.811578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cub1Yc2TnR2ZCWlmv6"]} -{"Format": "IDEA0", "ID": "f2afce8a-f66c-491a-a308-03c7c3fe0dae", "DetectTime": "2023-10-30T14:07:58.846946+02:00", "EventTime": "2023-10-30T14:07:58.846973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C3d9s02XzLByaHXzoa"]} -{"Format": "Json", "ID": "f2afce8a-f66c-491a-a308-03c7c3fe0dae", "DetectTime": "2023-10-30T14:07:58.846946+02:00", "EventTime": "2023-10-30T14:07:58.846973+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T17:16:57.308936+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2023/10/30 14:07:58.937145)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e36eb9e-37e1-45eb-9191-4a06761c65b1", "DetectTime": "2023-10-30T14:07:58.942904+02:00", "EventTime": "2023-10-30T14:07:58.942928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CpPf0T3eVk75P01lGd"]} -{"Format": "IDEA0", "ID": "419393ae-2f7f-4b84-9434-751b7aaffff0", "DetectTime": "2023-10-30T14:07:58.981473+02:00", "EventTime": "2023-10-30T14:07:58.981493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CLMJuv3bZrLk7oteXk"]} -{"Format": "IDEA0", "ID": "74da1803-c9ec-41cf-9bb6-6a533d40e6fd", "DetectTime": "2023-10-30T14:07:59.017363+02:00", "EventTime": "2023-10-30T14:07:59.017384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CgwGde48ov7rNkLSTh"]} -{"Format": "IDEA0", "ID": "13230586-e824-4797-858a-2550b6dcd3c2", "DetectTime": "2023-10-30T14:07:59.052216+02:00", "EventTime": "2023-10-30T14:07:59.052233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C8CDOK2Mflo0bHMmnf"]} -{"Format": "IDEA0", "ID": "94f94cbc-ec8f-4946-9134-40e0ea28a6ec", "DetectTime": "2023-10-30T14:07:59.169302+02:00", "EventTime": "2023-10-30T14:07:59.169332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Ccn6w2179jsIBGXK06"]} -{"Format": "IDEA0", "ID": "13b09b7b-23f7-43cc-8883-4706309f4d5f", "DetectTime": "2023-10-30T14:07:59.210815+02:00", "EventTime": "2023-10-30T14:07:59.210832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C8VTVs4Bp0TEa44Zfl"]} -{"Format": "IDEA0", "ID": "244466d4-8b8a-4473-abf1-ea3464828a25", "DetectTime": "2023-10-30T14:07:59.249649+02:00", "EventTime": "2023-10-30T14:07:59.249666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CCyUXoak9KMj9gqQa"]} -{"Format": "IDEA0", "ID": "b7ca98f9-d410-4544-9162-82d743bbbe80", "DetectTime": "2023-10-30T14:07:59.285687+02:00", "EventTime": "2023-10-30T14:07:59.285706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cz5Del3m4yCDZ1r2N9"]} -{"Format": "Json", "ID": "b7ca98f9-d410-4544-9162-82d743bbbe80", "DetectTime": "2023-10-30T14:07:59.285687+02:00", "EventTime": "2023-10-30T14:07:59.285706+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T17:16:58.964270+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2023/10/30 14:07:59.371553)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b07d8b21-c412-45a1-a700-6e0abca55ebd", "DetectTime": "2023-10-30T14:07:59.377208+02:00", "EventTime": "2023-10-30T14:07:59.377228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C5RYqV2qilFvwMr7Hl"]} -{"Format": "IDEA0", "ID": "9bec3a4a-6659-4825-9496-200e753288c1", "DetectTime": "2023-10-30T14:07:59.416427+02:00", "EventTime": "2023-10-30T14:07:59.416447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CTlpBAOyalEuL6kHa"]} -{"Format": "IDEA0", "ID": "66062e7e-3800-499b-8fd9-622811342ff3", "DetectTime": "2023-10-30T14:07:59.463356+02:00", "EventTime": "2023-10-30T14:07:59.463382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CKBhtq2ZsSRmtX59tc"]} -{"Format": "IDEA0", "ID": "6cbc0bf7-2ef2-4024-be6f-a4433f952cf1", "DetectTime": "2023-10-30T14:07:59.496931+02:00", "EventTime": "2023-10-30T14:07:59.496950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["C08lwy4OYnuM5dpk1k"]} -{"Format": "IDEA0", "ID": "fd3dfb3f-c0dc-4358-871d-e8c9562b904a", "DetectTime": "2023-10-30T14:07:59.534366+02:00", "EventTime": "2023-10-30T14:07:59.534396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CiqNSK22z9aku1Irre"]} -{"Format": "IDEA0", "ID": "497d20a8-5460-4109-b951-20a6e27be25e", "DetectTime": "2023-10-30T14:07:59.577278+02:00", "EventTime": "2023-10-30T14:07:59.577296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CNEEkL3nFpkXwta8Rf"]} -{"Format": "IDEA0", "ID": "335093ac-6a42-4fe5-9d5d-98f366919653", "DetectTime": "2023-10-30T14:07:59.620158+02:00", "EventTime": "2023-10-30T14:07:59.620186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CAuQt91WMNrlG1Woz5"]} -{"Format": "IDEA0", "ID": "d9d8df0f-259e-432e-9769-4ffd1b7e1a4d", "DetectTime": "2023-10-30T14:07:59.653762+02:00", "EventTime": "2023-10-30T14:07:59.653782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CB0b2i2WC6vswD6MUf"]} -{"Format": "Json", "ID": "d9d8df0f-259e-432e-9769-4ffd1b7e1a4d", "DetectTime": "2023-10-30T14:07:59.653762+02:00", "EventTime": "2023-10-30T14:07:59.653782+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T17:17:01.367285+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2023/10/30 14:07:59.731781)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d2bf2f83-2b58-4562-bd08-fc9742f51722", "DetectTime": "2023-10-30T14:07:59.737262+02:00", "EventTime": "2023-10-30T14:07:59.737286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cw4izz18hOXoCkUsxj"]} -{"Format": "IDEA0", "ID": "1e2ac810-dbf9-42fa-b4b5-0e6ec381d1f0", "DetectTime": "2023-10-30T14:07:59.776436+02:00", "EventTime": "2023-10-30T14:07:59.776454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CCilDy2SfkWa2p4O8a"]} -{"Format": "IDEA0", "ID": "c775295c-c9bf-460d-9b3d-0c84a7c68023", "DetectTime": "2023-10-30T14:07:59.810229+02:00", "EventTime": "2023-10-30T14:07:59.810245+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CT47HtfI2jeJTFC1a"]} -{"Format": "IDEA0", "ID": "bc56cd12-7779-4beb-b906-31f27d80c680", "DetectTime": "2023-10-30T14:07:59.845166+02:00", "EventTime": "2023-10-30T14:07:59.845194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CXuiVV3wxUUarF1g2l"]} -{"Format": "IDEA0", "ID": "9921c506-8479-45a9-bc79-60b3b970b8f7", "DetectTime": "2023-10-30T14:07:59.875065+02:00", "EventTime": "2023-10-30T14:07:59.875082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CE0NTb4ZzADqeRfU68"]} -{"Format": "IDEA0", "ID": "3699cde3-d3da-4271-8a31-5325d24209ae", "DetectTime": "2023-10-30T14:07:59.904428+02:00", "EventTime": "2023-10-30T14:07:59.904448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C3WhNsNXBOAeWyuMb"]} -{"Format": "IDEA0", "ID": "03460f4c-e5a8-4199-aed5-c9b9b92cd1de", "DetectTime": "2023-10-30T14:07:59.937639+02:00", "EventTime": "2023-10-30T14:07:59.937656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CDbIoEXzU7U0rwAaj"]} -{"Format": "IDEA0", "ID": "f1cc9b6b-b934-4058-95c0-eaac46544f2a", "DetectTime": "2023-10-30T14:07:59.967132+02:00", "EventTime": "2023-10-30T14:07:59.967159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["Cjzv4w39YhMpXF88P"]} -{"Format": "IDEA0", "ID": "f93df495-9c78-4439-9645-53534c633989", "DetectTime": "2023-10-30T14:08:00.005496+02:00", "EventTime": "2023-10-30T14:08:00.005518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CE2eYe3xDQcpPEJFRe"]} -{"Format": "Json", "ID": "f93df495-9c78-4439-9645-53534c633989", "DetectTime": "2023-10-30T14:08:00.005496+02:00", "EventTime": "2023-10-30T14:08:00.005518+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T17:48:06.036309+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2023/10/30 14:08:00.100028)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "498850b1-556f-4709-9e49-528a37203cc8", "DetectTime": "2023-10-30T14:08:00.106662+02:00", "EventTime": "2023-10-30T14:08:00.106678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CAmlguYF6yMbxSPBa"]} -{"Format": "IDEA0", "ID": "f548038a-95df-4b75-b7c2-d99d92887cb7", "DetectTime": "2023-10-30T14:08:00.141839+02:00", "EventTime": "2023-10-30T14:08:00.141860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CklxWVfjyR5FQQqm"]} -{"Format": "IDEA0", "ID": "9ed517b1-0e60-4e09-88e2-402bf484c716", "DetectTime": "2023-10-30T14:08:00.179107+02:00", "EventTime": "2023-10-30T14:08:00.179130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CWkEqo1Ju4GZvNKDWe"]} -{"Format": "IDEA0", "ID": "272226a4-43f1-46b8-9f31-5ea0bfa76ab8", "DetectTime": "2023-10-30T14:08:00.209696+02:00", "EventTime": "2023-10-30T14:08:00.209714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cv0VQSMiDcMYY0TEi"]} -{"Format": "IDEA0", "ID": "b6055131-f174-4d79-b383-a167976d2a77", "DetectTime": "2023-10-30T14:08:00.237456+02:00", "EventTime": "2023-10-30T14:08:00.237469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C5fWNh2YneBL8tNpr4"]} -{"Format": "IDEA0", "ID": "ae2186f3-2e21-4887-8348-98717922467e", "DetectTime": "2023-10-30T14:08:00.266573+02:00", "EventTime": "2023-10-30T14:08:00.266603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cc8jgs3b3cIH1JmOue"]} -{"Format": "IDEA0", "ID": "0f660a22-0e9f-48c8-be32-4e0b7f24bfe3", "DetectTime": "2023-10-30T14:08:00.293138+02:00", "EventTime": "2023-10-30T14:08:00.293155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CizbBQ20Ow35mm1CWd"]} -{"Format": "IDEA0", "ID": "e03a6fd1-bea7-466b-9f67-156267803147", "DetectTime": "2023-10-30T14:08:00.320342+02:00", "EventTime": "2023-10-30T14:08:00.320355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CDAALS1pchbX4e6Xh2"]} -{"Format": "Json", "ID": "e03a6fd1-bea7-466b-9f67-156267803147", "DetectTime": "2023-10-30T14:08:00.320342+02:00", "EventTime": "2023-10-30T14:08:00.320355+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T17:48:07.747859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2023/10/30 14:08:00.408683)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b416d802-7bcb-448e-a19d-2bfb4f8c5c29", "DetectTime": "2023-10-30T14:08:00.416542+02:00", "EventTime": "2023-10-30T14:08:00.416566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CqQAPLIqjT9F5YsS1"]} -{"Format": "IDEA0", "ID": "52f605c2-2eca-445a-a6c3-228eb59594f4", "DetectTime": "2023-10-30T14:08:00.449364+02:00", "EventTime": "2023-10-30T14:08:00.449388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CQZLUA3RlxUUuQ2Bcf"]} -{"Format": "IDEA0", "ID": "14d6f0c7-da57-4530-97c3-bffdf747d99e", "DetectTime": "2023-10-30T14:08:00.476710+02:00", "EventTime": "2023-10-30T14:08:00.476728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CHG4ER3NmJCw84psXk"]} -{"Format": "IDEA0", "ID": "8257d441-8cef-4773-9deb-32b7a7b2a9a5", "DetectTime": "2023-10-30T14:08:00.505099+02:00", "EventTime": "2023-10-30T14:08:00.505118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C0aY352ZfcibMrPoPe"]} -{"Format": "IDEA0", "ID": "69dd5556-3312-4e0e-a9c9-1934ab4f4ef6", "DetectTime": "2023-10-30T14:08:00.536008+02:00", "EventTime": "2023-10-30T14:08:00.536035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["C46jNs3dEH7kiUKHRc"]} -{"Format": "IDEA0", "ID": "0a842a43-5073-4321-91dd-491ff677ab2c", "DetectTime": "2023-10-30T14:08:00.564641+02:00", "EventTime": "2023-10-30T14:08:00.564662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["Cx6wJl3VbFp7FIZsIh"]} -{"Format": "IDEA0", "ID": "7f1a6244-1223-48a0-8af2-3a5fa704e911", "DetectTime": "2023-10-30T14:08:00.592261+02:00", "EventTime": "2023-10-30T14:08:00.592288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CBXDPY37wJlZ51TkW6"]} -{"Format": "IDEA0", "ID": "a6b05c4f-e886-41e2-9b36-0e375ef87f38", "DetectTime": "2023-10-30T14:08:00.620412+02:00", "EventTime": "2023-10-30T14:08:00.620441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CloBeE2vMpg4vcOUij"]} -{"Format": "Json", "ID": "a6b05c4f-e886-41e2-9b36-0e375ef87f38", "DetectTime": "2023-10-30T14:08:00.620412+02:00", "EventTime": "2023-10-30T14:08:00.620441+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T17:48:09.703485+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2023/10/30 14:08:00.690041)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8e2253b4-0a87-4fee-8cd7-2e586d693c3c", "DetectTime": "2023-10-30T14:08:00.696151+02:00", "EventTime": "2023-10-30T14:08:00.696170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CBl9xZ30P90LJJ7FKd"]} -{"Format": "IDEA0", "ID": "9cd96b5a-feea-4586-8aad-2fac8bd62e81", "DetectTime": "2023-10-30T14:08:00.725589+02:00", "EventTime": "2023-10-30T14:08:00.725611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CYMdphHipM2bDl7wb"]} -{"Format": "IDEA0", "ID": "8f4d3604-1101-4702-befe-6af21b6f4fd5", "DetectTime": "2023-10-30T14:08:00.752675+02:00", "EventTime": "2023-10-30T14:08:00.752695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CoYZ0G4tMEavZ9sBEl"]} -{"Format": "IDEA0", "ID": "1b461b7d-5ef6-49d6-8610-1090320a2364", "DetectTime": "2023-10-30T14:08:00.776619+02:00", "EventTime": "2023-10-30T14:08:00.776642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CxYa4e2JXMGgnAuUEh"]} -{"Format": "IDEA0", "ID": "e47bc898-a1f7-455b-a095-0f085bb4d52a", "DetectTime": "2023-10-30T14:08:00.799860+02:00", "EventTime": "2023-10-30T14:08:00.799901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CJN3f84EJlV7RCzsQ6"]} -{"Format": "IDEA0", "ID": "84785480-99c6-45ba-b03d-e1fa9d46c181", "DetectTime": "2023-10-30T14:08:00.819388+02:00", "EventTime": "2023-10-30T14:08:00.819404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CAaSVGmHHZSBRO2W8"]} -{"Format": "IDEA0", "ID": "2e2a0cad-5248-4a0e-88f4-ee5eb0fbce95", "DetectTime": "2023-10-30T14:08:00.841187+02:00", "EventTime": "2023-10-30T14:08:00.841215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CujPic1TJApE6vZUY4"]} -{"Format": "IDEA0", "ID": "5629b69b-75fe-4431-90e0-4c7e6edccfb8", "DetectTime": "2023-10-30T14:08:00.876053+02:00", "EventTime": "2023-10-30T14:08:00.876082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CbrMJlJO5LeXz8lz8"]} -{"Format": "IDEA0", "ID": "247cc1bb-b4a3-4f5a-9a2d-51a01a0606f4", "DetectTime": "2023-10-30T14:08:00.911146+02:00", "EventTime": "2023-10-30T14:08:00.911163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CGAzIMvwAuIrtwKli"]} -{"Format": "IDEA0", "ID": "1813fba6-1505-4d33-aeef-595a902aba15", "DetectTime": "2023-10-30T14:08:00.950374+02:00", "EventTime": "2023-10-30T14:08:00.950391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CewZ5a3ssPKEF9Clmj"]} -{"Format": "IDEA0", "ID": "ebe7ebf3-5417-4bed-9cf2-c043b03b7a59", "DetectTime": "2023-10-30T14:08:00.987325+02:00", "EventTime": "2023-10-30T14:08:00.987354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwJ9x73ZNKQWXnb4n"]} -{"Format": "IDEA0", "ID": "6c372017-d25d-4891-b46d-1e038eace7b1", "DetectTime": "2023-10-30T14:08:01.025713+02:00", "EventTime": "2023-10-30T14:08:01.025739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CESnh23Dyo8rMt9I0a"]} -{"Format": "IDEA0", "ID": "73c71e29-af52-4371-81be-f2b1f5e276b1", "DetectTime": "2023-10-30T14:08:01.061933+02:00", "EventTime": "2023-10-30T14:08:01.061950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C9Byn8266FKFnJirug"]} -{"Format": "IDEA0", "ID": "20daffc6-5185-45ca-a367-8c76fe585a40", "DetectTime": "2023-10-30T14:08:01.094850+02:00", "EventTime": "2023-10-30T14:08:01.094868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C6VCInHUrlQbz1wA3"]} -{"Format": "Json", "ID": "20daffc6-5185-45ca-a367-8c76fe585a40", "DetectTime": "2023-10-30T14:08:01.094850+02:00", "EventTime": "2023-10-30T14:08:01.094868+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T18:18:54.142463+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2023/10/30 14:08:01.169175)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8091ea50-388a-4afc-8ec0-4bca78d9b47e", "DetectTime": "2023-10-30T14:08:01.174936+02:00", "EventTime": "2023-10-30T14:08:01.174955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZbZNi2FRZuMmVijTe"]} -{"Format": "IDEA0", "ID": "a841e6c1-5e04-4800-a1e6-22c4bea727e6", "DetectTime": "2023-10-30T14:08:01.288983+02:00", "EventTime": "2023-10-30T14:08:01.288995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CAzvLw1q0OKYyq5uGd"]} -{"Format": "IDEA0", "ID": "f2581dfd-5a7a-48c2-b153-61cb0225cb98", "DetectTime": "2023-10-30T14:08:01.329387+02:00", "EventTime": "2023-10-30T14:08:01.329412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C00Xxd2u6ey2GtiEui"]} -{"Format": "IDEA0", "ID": "d8971c8a-6679-4cc0-aa40-623afee8e188", "DetectTime": "2023-10-30T14:08:01.363723+02:00", "EventTime": "2023-10-30T14:08:01.363738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["ClZ1At3odVXP0FIhb2"]} -{"Format": "IDEA0", "ID": "4a980505-6f6b-4b44-8785-61ec3ba78cce", "DetectTime": "2023-10-30T14:08:01.403983+02:00", "EventTime": "2023-10-30T14:08:01.404010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["Co4a7b452PDNgsqwyk"]} -{"Format": "IDEA0", "ID": "db9faeb3-148a-44c8-8979-ecd364fe33fb", "DetectTime": "2023-10-30T14:08:01.441915+02:00", "EventTime": "2023-10-30T14:08:01.441939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CeXHVnipqnwR8UsQ1"]} -{"Format": "IDEA0", "ID": "608a409b-67b9-4ea2-9c93-55dfeec5c37f", "DetectTime": "2023-10-30T14:08:01.487798+02:00", "EventTime": "2023-10-30T14:08:01.487826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cc4ylC1GONby32Evwk"]} -{"Format": "IDEA0", "ID": "8ffa117d-9d12-4965-bbc2-03faae9e0e0b", "DetectTime": "2023-10-30T14:08:01.523406+02:00", "EventTime": "2023-10-30T14:08:01.523427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CvcsAH1mbfxNWwAQa3"]} -{"Format": "Json", "ID": "8ffa117d-9d12-4965-bbc2-03faae9e0e0b", "DetectTime": "2023-10-30T14:08:01.523406+02:00", "EventTime": "2023-10-30T14:08:01.523427+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T18:19:01.489356+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2023/10/30 14:08:01.606917)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2900b51f-bfdd-41ca-9e42-119036c5b0b8", "DetectTime": "2023-10-30T14:08:01.612638+02:00", "EventTime": "2023-10-30T14:08:01.612658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CKTazh1qJMsT1yrAw1"]} -{"Format": "IDEA0", "ID": "96f58561-b763-423d-a001-5092817a1155", "DetectTime": "2023-10-30T14:08:01.647811+02:00", "EventTime": "2023-10-30T14:08:01.647828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Cb0l0k3d2XqdmntRW"]} -{"Format": "IDEA0", "ID": "a302392e-04c1-4601-bf0f-5f6d8c001d57", "DetectTime": "2023-10-30T14:08:01.681259+02:00", "EventTime": "2023-10-30T14:08:01.681279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["C6pnRC2Id3bNc0uq9"]} -{"Format": "IDEA0", "ID": "a45a4548-7ede-44fe-a53e-c547e777f50a", "DetectTime": "2023-10-30T14:08:01.715385+02:00", "EventTime": "2023-10-30T14:08:01.715405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CJBq9j3m73eNHbjuf6"]} -{"Format": "IDEA0", "ID": "da2931d6-904a-4307-870b-85b941bf0811", "DetectTime": "2023-10-30T14:08:01.750282+02:00", "EventTime": "2023-10-30T14:08:01.750304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CdvYLX320rnNZDZhGh"]} -{"Format": "IDEA0", "ID": "15188d24-b557-47e5-a222-3f781900d81d", "DetectTime": "2023-10-30T14:08:01.785105+02:00", "EventTime": "2023-10-30T14:08:01.785122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbOQwdY3rwITnk0s3"]} -{"Format": "IDEA0", "ID": "49ed3393-8340-4e47-8a76-048a9e5f31c0", "DetectTime": "2023-10-30T14:08:01.818693+02:00", "EventTime": "2023-10-30T14:08:01.818720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CfJ5Mw3fDNj0Om9omf"]} -{"Format": "IDEA0", "ID": "ec0dc264-4b05-4ee0-8648-2d5ff3658acc", "DetectTime": "2023-10-30T14:08:01.855890+02:00", "EventTime": "2023-10-30T14:08:01.855911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CCgbSw2WywfZra78Ea"]} -{"Format": "Json", "ID": "ec0dc264-4b05-4ee0-8648-2d5ff3658acc", "DetectTime": "2023-10-30T14:08:01.855890+02:00", "EventTime": "2023-10-30T14:08:01.855911+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T18:19:07.195586+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2023/10/30 14:08:01.931400)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2b3112b8-7f59-455d-8db9-fae0393e919f", "DetectTime": "2023-10-30T14:08:01.936926+02:00", "EventTime": "2023-10-30T14:08:01.936942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["COrknp2USYlO64H1oe"]} -{"Format": "IDEA0", "ID": "6ba4f52a-49a2-427e-93b6-173d2a0af2a5", "DetectTime": "2023-10-30T14:08:01.971063+02:00", "EventTime": "2023-10-30T14:08:01.971108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C8mBfC1FQ2oKuvEyI3"]} -{"Format": "IDEA0", "ID": "7255dd7b-d935-439c-bc60-91580b42407d", "DetectTime": "2023-10-30T14:08:02.007624+02:00", "EventTime": "2023-10-30T14:08:02.007644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CeaXK74lpj4AYmtqM5"]} -{"Format": "IDEA0", "ID": "fee8ca53-7101-4e4c-9bc1-eed8eaffe741", "DetectTime": "2023-10-30T14:08:02.041214+02:00", "EventTime": "2023-10-30T14:08:02.041247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CA8ueHLvtTyHm4Mrb"]} -{"Format": "IDEA0", "ID": "cffb075d-b004-49b7-9b1e-54c9f50bc6ac", "DetectTime": "2023-10-30T14:08:02.074270+02:00", "EventTime": "2023-10-30T14:08:02.074288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CLCXBA2Mt1iiJbnPc5"]} -{"Format": "IDEA0", "ID": "fc670a2f-ba45-4919-bc91-27cd68a2b22f", "DetectTime": "2023-10-30T14:08:02.105191+02:00", "EventTime": "2023-10-30T14:08:02.105209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cb8Z0p1l4SttqwERIb"]} -{"Format": "IDEA0", "ID": "3e317c41-75db-4c84-8d65-f4fa9b8d4dfb", "DetectTime": "2023-10-30T14:08:02.137598+02:00", "EventTime": "2023-10-30T14:08:02.137619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbdEuk2uhHtxmNRYc4"]} -{"Format": "IDEA0", "ID": "76ee49ac-b59c-417d-a2ef-51dfde392ca4", "DetectTime": "2023-10-30T14:08:02.169084+02:00", "EventTime": "2023-10-30T14:08:02.169111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CA0P8y4d1BPL8QhVxb"]} -{"Format": "Json", "ID": "76ee49ac-b59c-417d-a2ef-51dfde392ca4", "DetectTime": "2023-10-30T14:08:02.169084+02:00", "EventTime": "2023-10-30T14:08:02.169111+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T18:49:30.681928+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2023/10/30 14:08:02.245812)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "09e96dc5-1eac-48b4-b226-d367b0bd3aa8", "DetectTime": "2023-10-30T14:08:02.252417+02:00", "EventTime": "2023-10-30T14:08:02.252442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CNOq8m2PMdAC0P402f"]} -{"Format": "IDEA0", "ID": "8091f23f-d264-4890-8d42-ae9750799b00", "DetectTime": "2023-10-30T14:08:02.286338+02:00", "EventTime": "2023-10-30T14:08:02.286353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C6YswMHQ7ABTa39Md"]} -{"Format": "IDEA0", "ID": "8c0b0d85-9889-4de2-a9b2-f8570430df5b", "DetectTime": "2023-10-30T14:08:02.312257+02:00", "EventTime": "2023-10-30T14:08:02.312275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CNYjop14EtpZOlQSQb"]} -{"Format": "IDEA0", "ID": "d43a9a7c-2e16-477b-8511-5f79414243fb", "DetectTime": "2023-10-30T14:08:02.340661+02:00", "EventTime": "2023-10-30T14:08:02.340689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CudAKW1fNaSOB3HcW5"]} -{"Format": "IDEA0", "ID": "7ec654a4-8b22-4d21-a332-1fd291114798", "DetectTime": "2023-10-30T14:08:02.373790+02:00", "EventTime": "2023-10-30T14:08:02.373813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CSC5fm2D3u1GIsEKEl"]} -{"Format": "IDEA0", "ID": "7bed5273-e8f2-42e5-8dc0-287a669552e1", "DetectTime": "2023-10-30T14:08:02.405411+02:00", "EventTime": "2023-10-30T14:08:02.405434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CvxNpo2Zzblu3TqrFe"]} -{"Format": "IDEA0", "ID": "ace4596c-821f-459e-89af-1970d1fb9afc", "DetectTime": "2023-10-30T14:08:02.435775+02:00", "EventTime": "2023-10-30T14:08:02.435797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["C6HqarKkWqRmZ6Qla"]} -{"Format": "IDEA0", "ID": "a5eebe66-cfb0-49ca-a829-b0a9b82afc22", "DetectTime": "2023-10-30T14:08:02.465052+02:00", "EventTime": "2023-10-30T14:08:02.465073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CniixB4YmZfmKOgfn9"]} -{"Format": "Json", "ID": "a5eebe66-cfb0-49ca-a829-b0a9b82afc22", "DetectTime": "2023-10-30T14:08:02.465052+02:00", "EventTime": "2023-10-30T14:08:02.465073+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-05T18:50:26.422573+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2023/10/30 14:08:02.541629)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b4447151-c664-439c-90bd-5425e34b8377", "DetectTime": "2023-10-30T14:08:02.547207+02:00", "EventTime": "2023-10-30T14:08:02.547225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CNTmak32bYO9O82n9l"]} -{"Format": "IDEA0", "ID": "a1c7538c-1140-4797-99bf-52bd5c1d86eb", "DetectTime": "2023-10-30T14:08:02.575755+02:00", "EventTime": "2023-10-30T14:08:02.575770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CcNnWuRMvVMlzB3n1"]} -{"Format": "IDEA0", "ID": "4b4a97ff-666c-4792-933f-be8992a44486", "DetectTime": "2023-10-30T14:08:02.601413+02:00", "EventTime": "2023-10-30T14:08:02.601432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CWlE6a3RIJlVdx29F1"]} -{"Format": "IDEA0", "ID": "8b8a2c6e-73c5-4344-9361-82ee6a60c57f", "DetectTime": "2023-10-30T14:08:02.623819+02:00", "EventTime": "2023-10-30T14:08:02.623832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CClUQuug3Wj9BIvLl"]} -{"Format": "IDEA0", "ID": "2d714d1c-6df8-4c33-91a3-40fee397c015", "DetectTime": "2023-10-30T14:08:02.649329+02:00", "EventTime": "2023-10-30T14:08:02.649348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Cc4Aw81cLkgXPWVb9e"]} -{"Format": "IDEA0", "ID": "191dfc3e-a74c-49fe-b6b8-24291d82ace6", "DetectTime": "2023-10-30T14:08:02.672410+02:00", "EventTime": "2023-10-30T14:08:02.672438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["Cg4qdd4RQXThHZFNS4"]} -{"Format": "IDEA0", "ID": "ba4d047a-2688-4d8a-ba28-7b2e12778086", "DetectTime": "2023-10-30T14:08:02.697559+02:00", "EventTime": "2023-10-30T14:08:02.697577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["C4smMl3tBzoMLtfhHh"]} -{"Format": "IDEA0", "ID": "3cd5632e-139c-407c-b008-c56aa8cf195f", "DetectTime": "2023-10-30T14:08:02.722486+02:00", "EventTime": "2023-10-30T14:08:02.722502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CkY7NCUV0CMdR8Df4"]} -{"Format": "Json", "ID": "3cd5632e-139c-407c-b008-c56aa8cf195f", "DetectTime": "2023-10-30T14:08:02.722486+02:00", "EventTime": "2023-10-30T14:08:02.722502+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T18:49:34.967846+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2023/10/30 14:08:02.789197)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8b2f0254-9c34-4368-a4cc-fac3431f7920", "DetectTime": "2023-10-30T14:08:02.795275+02:00", "EventTime": "2023-10-30T14:08:02.795297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CmILY02XM8U0rNG3Gc"]} -{"Format": "IDEA0", "ID": "437e8b96-b0ad-4e24-b530-1c0da6061afb", "DetectTime": "2023-10-30T14:08:02.819046+02:00", "EventTime": "2023-10-30T14:08:02.819074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CP0YO9t4P497wXK93"]} -{"Format": "IDEA0", "ID": "ddd2421a-7a88-4dbb-abce-dbf32e9cadbe", "DetectTime": "2023-10-30T14:08:02.839912+02:00", "EventTime": "2023-10-30T14:08:02.839932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CSfznt2kQ8Q6v6iXF5"]} -{"Format": "IDEA0", "ID": "e10657a5-8fa2-4c75-86db-1cfd0248127e", "DetectTime": "2023-10-30T14:08:02.864612+02:00", "EventTime": "2023-10-30T14:08:02.864639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["Clylg91EagUhzRwQ4d"]} -{"Format": "IDEA0", "ID": "6b8caf0f-cb46-4042-a9f7-16098b8ff756", "DetectTime": "2023-10-30T14:08:02.884839+02:00", "EventTime": "2023-10-30T14:08:02.884865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CgNBew42zoqK1AVqq2"]} -{"Format": "IDEA0", "ID": "369f8786-2f39-4ef6-899c-cc7619fc36b9", "DetectTime": "2023-10-30T14:08:02.909222+02:00", "EventTime": "2023-10-30T14:08:02.909248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZt1cT1ldYnji19PB2"]} -{"Format": "IDEA0", "ID": "87e0c8ff-84dc-4cbc-a802-e63437d71e0e", "DetectTime": "2023-10-30T14:08:02.936353+02:00", "EventTime": "2023-10-30T14:08:02.936376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CLzkhF1jOTfSvwKL6e"]} -{"Format": "IDEA0", "ID": "9dec1587-ed1f-419e-ba09-30f7692ffc17", "DetectTime": "2023-10-30T14:08:02.978496+02:00", "EventTime": "2023-10-30T14:08:02.978522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C5tnpr4qNz10fW6BJ1"]} -{"Format": "IDEA0", "ID": "4403374a-4dad-4de3-a0ec-bf7a8c773fa3", "DetectTime": "2023-10-30T14:08:03.019911+02:00", "EventTime": "2023-10-30T14:08:03.019938+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CHVGCE7GHaErI1VW3"]} -{"Format": "IDEA0", "ID": "5c44c1ce-96f0-48eb-ac60-6acaf8267fa3", "DetectTime": "2023-10-30T14:08:03.049814+02:00", "EventTime": "2023-10-30T14:08:03.049841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CKXZtS1xcFUsfuINel"]} -{"Format": "IDEA0", "ID": "48cf5b9d-9c08-4f63-909a-c173f0f21240", "DetectTime": "2023-10-30T14:08:03.088081+02:00", "EventTime": "2023-10-30T14:08:03.088097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CDQaHQ3h4fkqM74dZh"]} -{"Format": "IDEA0", "ID": "4cf8ca37-410e-4d04-97f6-2e2d868176b5", "DetectTime": "2023-10-30T14:08:03.128317+02:00", "EventTime": "2023-10-30T14:08:03.128344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CXkktr4SzUqc8Gl7T2"]} -{"Format": "IDEA0", "ID": "6b560eed-a330-4b3e-953f-312b95e51b74", "DetectTime": "2023-10-30T14:08:03.172620+02:00", "EventTime": "2023-10-30T14:08:03.172637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKRtlQ3R1CVPOoPTz8"]} -{"Format": "IDEA0", "ID": "bdd26ace-5c3f-44aa-bf37-b5da6126252e", "DetectTime": "2023-10-30T14:08:03.213779+02:00", "EventTime": "2023-10-30T14:08:03.213797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CMx37h3XWyEHBFFZRb"]} -{"Format": "IDEA0", "ID": "c1369bc8-4dd2-4787-8367-1a1eed3e29f6", "DetectTime": "2023-10-30T14:08:03.236313+02:00", "EventTime": "2023-10-30T14:08:03.236336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CgY5bK1QVkzQvKsz1k"]} -{"Format": "Json", "ID": "c1369bc8-4dd2-4787-8367-1a1eed3e29f6", "DetectTime": "2023-10-30T14:08:03.236313+02:00", "EventTime": "2023-10-30T14:08:03.236336+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T19:19:43.563853+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2023/10/30 14:08:03.325090)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e8062fe7-bb0b-454b-9590-1382f4a4a080", "DetectTime": "2023-10-30T14:08:03.329693+02:00", "EventTime": "2023-10-30T14:08:03.329705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C5nhz5acY9r2yOhqb"]} -{"Format": "IDEA0", "ID": "bde7a578-f713-4adc-8660-d621dabc4246", "DetectTime": "2023-10-30T14:08:03.354116+02:00", "EventTime": "2023-10-30T14:08:03.354138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C8NpzM3lqKXH7k95li"]} -{"Format": "IDEA0", "ID": "27505bcf-4fa9-4153-935f-0afb58f6a5ef", "DetectTime": "2023-10-30T14:08:03.398364+02:00", "EventTime": "2023-10-30T14:08:03.398388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["C12y3k1WS48ruJkQP1"]} -{"Format": "IDEA0", "ID": "03bebc25-2032-4df3-be5b-e56f42147a76", "DetectTime": "2023-10-30T14:08:03.424047+02:00", "EventTime": "2023-10-30T14:08:03.424071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C3ErmDISqg0HisJ25"]} -{"Format": "IDEA0", "ID": "c2348879-cea7-4fff-8815-c68ef917793d", "DetectTime": "2023-10-30T14:08:03.467009+02:00", "EventTime": "2023-10-30T14:08:03.467033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C5i1nC1fnWim2mavI"]} -{"Format": "IDEA0", "ID": "151a9beb-2340-4694-a553-420c54933b9a", "DetectTime": "2023-10-30T14:08:03.496064+02:00", "EventTime": "2023-10-30T14:08:03.496084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CPIA914NUYj79I2skh"]} -{"Format": "IDEA0", "ID": "0cdd0651-8cc7-488e-9624-bdb87797939e", "DetectTime": "2023-10-30T14:08:03.523521+02:00", "EventTime": "2023-10-30T14:08:03.523540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CbXIwK30Oo1INFXdOc"]} -{"Format": "IDEA0", "ID": "5cf780c3-513d-4cc2-96f5-c1645174bd64", "DetectTime": "2023-10-30T14:08:03.566238+02:00", "EventTime": "2023-10-30T14:08:03.566256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CSJjc13HuPcwiRHSr1"]} -{"Format": "IDEA0", "ID": "db612326-3038-46ba-b92b-17b1d5f63e9f", "DetectTime": "2023-10-30T14:08:03.591019+02:00", "EventTime": "2023-10-30T14:08:03.591040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cl0iiOziWvAdVxKrl"]} -{"Format": "IDEA0", "ID": "7637dc99-5a0f-421e-9701-a7b6d392bbad", "DetectTime": "2023-10-30T14:08:03.614933+02:00", "EventTime": "2023-10-30T14:08:03.614951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CXElPI1sivuqLxHd9k"]} -{"Format": "IDEA0", "ID": "40e6675a-5ce9-442e-b2d9-d32e3ed2a368", "DetectTime": "2023-10-30T14:08:03.654058+02:00", "EventTime": "2023-10-30T14:08:03.654074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CaE5kA4WN53vjO08t4"]} -{"Format": "IDEA0", "ID": "2bde0809-80d9-4478-b231-5ffc320a65f3", "DetectTime": "2023-10-30T14:08:03.693198+02:00", "EventTime": "2023-10-30T14:08:03.693212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CWSLCV3afa8ZRGQkre"]} -{"Format": "IDEA0", "ID": "a03263fb-6db6-430b-a979-c9d2bc064580", "DetectTime": "2023-10-30T14:08:03.718963+02:00", "EventTime": "2023-10-30T14:08:03.718992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C0RFNG2mec8TZFH4C2"]} -{"Format": "IDEA0", "ID": "4e03b576-941b-487f-b995-9bc2970ef127", "DetectTime": "2023-10-30T14:08:03.760296+02:00", "EventTime": "2023-10-30T14:08:03.760318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CtzYvB3KfZ8rKOLw0f"]} -{"Format": "IDEA0", "ID": "af3921e4-ac7f-40e0-b6d1-08145859bb3e", "DetectTime": "2023-10-30T14:08:03.787002+02:00", "EventTime": "2023-10-30T14:08:03.787024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CI2MLf4W2NJdoqIoZd"]} -{"Format": "IDEA0", "ID": "42d8eb43-b1c7-4007-8b2f-75d24673579f", "DetectTime": "2023-10-30T14:08:03.826567+02:00", "EventTime": "2023-10-30T14:08:03.826583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CoER3o4kbSXwCG3XBg"]} -{"Format": "IDEA0", "ID": "a31fd6a8-4b89-4f42-b8ce-d7b0ed83d23b", "DetectTime": "2023-10-30T14:08:03.852236+02:00", "EventTime": "2023-10-30T14:08:03.852366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CLNtsp2vbZA1wc06Ch"]} -{"Format": "Json", "ID": "a31fd6a8-4b89-4f42-b8ce-d7b0ed83d23b", "DetectTime": "2023-10-30T14:08:03.852236+02:00", "EventTime": "2023-10-30T14:08:03.852366+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T19:19:45.483449+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2023/10/30 14:08:03.933042)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4a3f7c9f-df60-4345-8f41-2ae75c4d97ea", "DetectTime": "2023-10-30T14:08:03.938356+02:00", "EventTime": "2023-10-30T14:08:03.938383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CttwdxqhnDtnKJwVh"]} -{"Format": "IDEA0", "ID": "847cff1b-6150-4f92-a3e8-4d06b242f5a0", "DetectTime": "2023-10-30T14:08:03.963143+02:00", "EventTime": "2023-10-30T14:08:03.963170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["C6yQ2V3nLlCAsScx8h"]} -{"Format": "IDEA0", "ID": "2ebe2949-e2cf-4a5c-888a-4219a0f18b90", "DetectTime": "2023-10-30T14:08:03.988348+02:00", "EventTime": "2023-10-30T14:08:03.988375+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CnivDu3k1JNAY6mCbl"]} -{"Format": "IDEA0", "ID": "c8a08077-7261-4395-85fc-e7eed71799c9", "DetectTime": "2023-10-30T14:08:04.020525+02:00", "EventTime": "2023-10-30T14:08:04.020542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Co2pm24ORsjC7ulDZi"]} -{"Format": "IDEA0", "ID": "6d2a0535-d9bf-4eb9-80f1-338e7250a084", "DetectTime": "2023-10-30T14:08:04.044820+02:00", "EventTime": "2023-10-30T14:08:04.044899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CojzTY2xpd0OYDEn0c"]} -{"Format": "IDEA0", "ID": "f5ecfea4-aefd-474f-bd53-0caa40cab877", "DetectTime": "2023-10-30T14:08:04.081286+02:00", "EventTime": "2023-10-30T14:08:04.081309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CmwWe44idPAduA03Mk"]} -{"Format": "IDEA0", "ID": "eb44fede-3bf4-4c6b-a9c7-448b27f58b7f", "DetectTime": "2023-10-30T14:08:04.106269+02:00", "EventTime": "2023-10-30T14:08:04.106290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CLEacH37apka64VuDi"]} -{"Format": "IDEA0", "ID": "78c2fb22-6ef8-477e-86fb-cd683628a85b", "DetectTime": "2023-10-30T14:08:04.130308+02:00", "EventTime": "2023-10-30T14:08:04.130321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CYpf4r13mTSvEhi6e9"]} -{"Format": "IDEA0", "ID": "b1cc23bd-2851-4e60-9c49-e4269ab19c60", "DetectTime": "2023-10-30T14:08:04.168841+02:00", "EventTime": "2023-10-30T14:08:04.168864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C8ZE5O3JHImuk8RENi"]} -{"Format": "IDEA0", "ID": "34a19398-67ec-4092-83d4-9dadbc497394", "DetectTime": "2023-10-30T14:08:04.193798+02:00", "EventTime": "2023-10-30T14:08:04.193810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CpeWv322E0L9dGFBM6"]} -{"Format": "IDEA0", "ID": "5615a873-2c77-4813-b7a8-466175e2851c", "DetectTime": "2023-10-30T14:08:04.220806+02:00", "EventTime": "2023-10-30T14:08:04.220818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CI3bnG2mYxc5lAA2l7"]} -{"Format": "IDEA0", "ID": "e8ba8a8b-38d2-474a-9bfc-f143282c0ac4", "DetectTime": "2023-10-30T14:08:04.256530+02:00", "EventTime": "2023-10-30T14:08:04.256541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C5rSd92FXNuOSb0Dr8"]} -{"Format": "IDEA0", "ID": "9374c93d-7889-4906-8930-c88388c18f02", "DetectTime": "2023-10-30T14:08:04.284771+02:00", "EventTime": "2023-10-30T14:08:04.284796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CiJAXQ2dIYhauMjYyg"]} -{"Format": "IDEA0", "ID": "e147e1b3-7a86-4ea1-89a3-10379d7b82c7", "DetectTime": "2023-10-30T14:08:04.321780+02:00", "EventTime": "2023-10-30T14:08:04.321802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CplQlt1SITsMu9GuXi"]} -{"Format": "IDEA0", "ID": "6c74d98e-06e0-44c5-8e4f-15431c44825f", "DetectTime": "2023-10-30T14:08:04.354628+02:00", "EventTime": "2023-10-30T14:08:04.354645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cz7EfGNCv4dRSjqHe"]} -{"Format": "IDEA0", "ID": "657de233-cb93-4417-94d5-d5921e981b78", "DetectTime": "2023-10-30T14:08:04.383136+02:00", "EventTime": "2023-10-30T14:08:04.383202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CuUT5i1vpEiPGCbay1"]} -{"Format": "IDEA0", "ID": "9dcc1d19-9f6a-4568-95a2-6fd919d26fd2", "DetectTime": "2023-10-30T14:08:04.410570+02:00", "EventTime": "2023-10-30T14:08:04.410591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CXetba3s6R8ngM7o2"]} -{"Format": "IDEA0", "ID": "a07ad386-72d8-44b6-af01-075bd5ecb813", "DetectTime": "2023-10-30T14:08:04.446805+02:00", "EventTime": "2023-10-30T14:08:04.446825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ChFSRH24LIR1bKkard"]} -{"Format": "IDEA0", "ID": "3d8d2cc5-a200-4919-b719-c568c420671e", "DetectTime": "2023-10-30T14:08:04.476894+02:00", "EventTime": "2023-10-30T14:08:04.476905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CTgDCFIskag6SaPGc"]} -{"Format": "IDEA0", "ID": "e4743480-4f79-4d04-8d84-75b7298a3e81", "DetectTime": "2023-10-30T14:08:04.515275+02:00", "EventTime": "2023-10-30T14:08:04.515292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C3Xx6a1oymNHfvgPVg"]} -{"Format": "IDEA0", "ID": "102aef04-7a4a-4192-ac62-09dba2def172", "DetectTime": "2023-10-30T14:08:04.543764+02:00", "EventTime": "2023-10-30T14:08:04.543780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CBGvpG3mtBaA0MSyQe"]} -{"Format": "IDEA0", "ID": "6823d196-dffb-4fe5-806f-3419130352a7", "DetectTime": "2023-10-30T14:08:04.583555+02:00", "EventTime": "2023-10-30T14:08:04.583573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Ckq3Gs2wpV201Adhfb"]} -{"Format": "IDEA0", "ID": "ef98cc36-3d39-4057-b5e8-60538fc68779", "DetectTime": "2023-10-30T14:08:04.613128+02:00", "EventTime": "2023-10-30T14:08:04.613145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C0BS852QvdGm6719Q8"]} -{"Format": "IDEA0", "ID": "9a7468da-3110-4b7d-9f51-461d9ee387eb", "DetectTime": "2023-10-30T14:08:04.641851+02:00", "EventTime": "2023-10-30T14:08:04.641868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C2A1i1W2mtlDYCRqi"]} -{"Format": "IDEA0", "ID": "d6c7efba-7c4c-4d08-b076-cf2eaa695547", "DetectTime": "2023-10-30T14:08:04.670298+02:00", "EventTime": "2023-10-30T14:08:04.670311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbQX8x1LeHyOImT4Dl"]} -{"Format": "IDEA0", "ID": "c21ce09d-62b3-4436-b824-6dc3575f6219", "DetectTime": "2023-10-30T14:08:04.700146+02:00", "EventTime": "2023-10-30T14:08:04.700174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CN36nm3aMxZmkFowc8"]} -{"Format": "IDEA0", "ID": "026bb2fd-83c2-4fe9-8ca9-b3b4de0e5f7f", "DetectTime": "2023-10-30T14:08:04.725631+02:00", "EventTime": "2023-10-30T14:08:04.725656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CulYQb3MqeQTywegec"]} -{"Format": "IDEA0", "ID": "3cfe5e63-5c28-42ac-aed5-ffa1277a4180", "DetectTime": "2023-10-30T14:08:04.753225+02:00", "EventTime": "2023-10-30T14:08:04.753241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CnXokS2XMGkp8wU0k3"]} -{"Format": "IDEA0", "ID": "6f2bd586-c047-41eb-a2f7-a35842f9fcb6", "DetectTime": "2023-10-30T14:08:04.792297+02:00", "EventTime": "2023-10-30T14:08:04.792324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CLstSgeNVCYodcf5k"]} -{"Format": "IDEA0", "ID": "325722ca-162d-4f97-aa5e-b582988d46b0", "DetectTime": "2023-10-30T14:08:04.821495+02:00", "EventTime": "2023-10-30T14:08:04.821522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C5P4Ir1eMOCaHiV9ge"]} -{"Format": "IDEA0", "ID": "073f8f55-8946-4af4-9f5e-ae03c22ea99d", "DetectTime": "2023-10-30T14:08:04.846730+02:00", "EventTime": "2023-10-30T14:08:04.846756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CaGJgo4fmDV6N1ojK9"]} -{"Format": "IDEA0", "ID": "f30af915-7289-44ef-8211-83ca868519fb", "DetectTime": "2023-10-30T14:08:04.871908+02:00", "EventTime": "2023-10-30T14:08:04.871924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CltcEd3K1kbiVIczGi"]} -{"Format": "IDEA0", "ID": "65204747-186c-443c-a27f-69544c98740a", "DetectTime": "2023-10-30T14:08:04.898531+02:00", "EventTime": "2023-10-30T14:08:04.898543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C8vUxQLoL5jhnekP1"]} -{"Format": "IDEA0", "ID": "98c8a3ca-312a-4ada-bb8d-d1979a7142a6", "DetectTime": "2023-10-30T14:08:04.927682+02:00", "EventTime": "2023-10-30T14:08:04.927700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CgSXj83qJ5GQlZsSCe"]} -{"Format": "IDEA0", "ID": "1a0092d9-c167-4723-85f6-93d09c0ea9dc", "DetectTime": "2023-10-30T14:08:04.955850+02:00", "EventTime": "2023-10-30T14:08:04.955864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C2effme0ZLVXVW5q3"]} -{"Format": "IDEA0", "ID": "f2511fbd-8bdc-4a6a-8ade-ecef0e4b176c", "DetectTime": "2023-10-30T14:08:04.983657+02:00", "EventTime": "2023-10-30T14:08:04.983674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CcAeC84BgJEKBZ77f3"]} -{"Format": "IDEA0", "ID": "104d2c64-834d-4ac3-8972-cd8fb8b57eda", "DetectTime": "2023-10-30T14:08:05.011499+02:00", "EventTime": "2023-10-30T14:08:05.011516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["Cui70Z1b5NycwAwlf8"]} -{"Format": "IDEA0", "ID": "e1268aae-060e-49aa-bfe5-36e97c5f7fec", "DetectTime": "2023-10-30T14:08:05.036682+02:00", "EventTime": "2023-10-30T14:08:05.036706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CBPmbJ3kjhxm4Ji7ig"]} -{"Format": "IDEA0", "ID": "88b352d1-4bf5-4777-bbcf-2fa77c47c183", "DetectTime": "2023-10-30T14:08:05.065537+02:00", "EventTime": "2023-10-30T14:08:05.065558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CNwqae24wDZWhLQAMg"]} -{"Format": "Json", "ID": "88b352d1-4bf5-4777-bbcf-2fa77c47c183", "DetectTime": "2023-10-30T14:08:05.065537+02:00", "EventTime": "2023-10-30T14:08:05.065558+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T19:19:48.564530+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2023/10/30 14:08:05.184356)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8859076c-0241-459d-a7a0-8fef4e521c40", "DetectTime": "2023-10-30T14:08:05.193398+02:00", "EventTime": "2023-10-30T14:08:05.193419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Ciieux4xqPBYtfu6Rl"]} -{"Format": "IDEA0", "ID": "194b9641-b188-497e-b896-17073245e385", "DetectTime": "2023-10-30T14:08:05.279695+02:00", "EventTime": "2023-10-30T14:08:05.279715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CIoxop3aytj6Arh5o9"]} -{"Format": "IDEA0", "ID": "86bbe11a-565e-40d4-8ea8-c25888fb7b9e", "DetectTime": "2023-10-30T14:08:05.320783+02:00", "EventTime": "2023-10-30T14:08:05.320806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CPebLz2wpJk4AjiUa4"]} -{"Format": "IDEA0", "ID": "14860739-abd7-4018-8af4-fb4ea5fa3d3e", "DetectTime": "2023-10-30T14:08:05.363658+02:00", "EventTime": "2023-10-30T14:08:05.363691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CJDi7B3JE3t6myBcvh"]} -{"Format": "IDEA0", "ID": "fb640933-806e-48f8-ab62-d0130e7db293", "DetectTime": "2023-10-30T14:08:05.439100+02:00", "EventTime": "2023-10-30T14:08:05.439132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CIktrT2kNYXkiZXTX7"]} -{"Format": "IDEA0", "ID": "641ad4c9-f83f-4a95-a1f3-aec716a8eb20", "DetectTime": "2023-10-30T14:08:05.511747+02:00", "EventTime": "2023-10-30T14:08:05.511767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CCiETVlbspaNRia36"]} -{"Format": "IDEA0", "ID": "f2469efc-2e82-428e-8388-39a87ee7df7b", "DetectTime": "2023-10-30T14:08:05.555866+02:00", "EventTime": "2023-10-30T14:08:05.555886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cd4kqT1eH8ljZJq0X5"]} -{"Format": "IDEA0", "ID": "d91ffd69-c16a-4c02-8672-c46733ea14ef", "DetectTime": "2023-10-30T14:08:05.588469+02:00", "EventTime": "2023-10-30T14:08:05.588486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CuFcf77MTnTtnAfic"]} -{"Format": "IDEA0", "ID": "261d2b7a-d93a-4b69-a9c7-315fbafbac9a", "DetectTime": "2023-10-30T14:08:05.617155+02:00", "EventTime": "2023-10-30T14:08:05.617175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CP6imAftyehcW97pa"]} -{"Format": "IDEA0", "ID": "7fe96cbc-eab3-4132-aa0c-1a5ffd584e4d", "DetectTime": "2023-10-30T14:08:05.650395+02:00", "EventTime": "2023-10-30T14:08:05.650408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.50.112.98 ", "ContentType": "text/plain"}], "uids": ["CGxAsgCmddCrPzAAc"]} -{"Format": "IDEA0", "ID": "2f9e2bea-304c-497c-b375-dd2b11d85e73", "DetectTime": "2023-10-30T14:08:05.671067+02:00", "EventTime": "2023-10-30T14:08:05.671080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CO9aAI3rqAjuz14Qz3"]} -{"Format": "IDEA0", "ID": "fe258c8d-9e03-4999-bb11-5d75339d2234", "DetectTime": "2023-10-30T14:08:05.694826+02:00", "EventTime": "2023-10-30T14:08:05.694843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.48.220.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.48.220.55 ", "ContentType": "text/plain"}], "uids": ["CdPhUf41TRfdSmEgal"]} -{"Format": "IDEA0", "ID": "62e31a20-c7b4-49eb-87c8-969deb644298", "DetectTime": "2023-10-30T14:08:05.718087+02:00", "EventTime": "2023-10-30T14:08:05.718099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.60.50.180"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.60.50.180 ", "ContentType": "text/plain"}], "uids": ["CHx0es361Z8oEdlhwg"]} -{"Format": "IDEA0", "ID": "9512a019-90fd-4353-998b-db1ca1cc513b", "DetectTime": "2023-10-30T14:08:05.738552+02:00", "EventTime": "2023-10-30T14:08:05.738565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C7GpTz1uwsxYX6Fvcl"]} -{"Format": "IDEA0", "ID": "da9a9b23-fe81-4d70-b8f3-bc40ed8af348", "DetectTime": "2023-10-30T14:08:05.759885+02:00", "EventTime": "2023-10-30T14:08:05.759896+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 24.139.178.44 from 10.0.2.19. blacklisted IP AS: LCPRL, US AS1463 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CY8occespU2ZRO84d"]} -{"Format": "IDEA0", "ID": "49cd761c-8553-4787-9f83-304323c2721f", "DetectTime": "2023-10-30T14:08:05.783343+02:00", "EventTime": "2023-10-30T14:08:05.783356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.42.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.42.213 ", "ContentType": "text/plain"}], "uids": ["CXhoamtomGKojbTdb"]} -{"Format": "IDEA0", "ID": "28bd856a-df9f-413f-ba26-6443703bea43", "DetectTime": "2023-10-30T14:08:05.807212+02:00", "EventTime": "2023-10-30T14:08:05.807232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.62.240.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.62.240.159 ", "ContentType": "text/plain"}], "uids": ["CZFmSH3YjILTqfP2Ze"]} -{"Format": "IDEA0", "ID": "ec97c3d3-4a55-4f34-9f3b-7626a743d63e", "DetectTime": "2023-10-30T14:08:05.827012+02:00", "EventTime": "2023-10-30T14:08:05.827029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CsU7022doNgXNrTdol"]} -{"Format": "IDEA0", "ID": "07ecc482-7550-4fdf-a1b6-5e889d8e675b", "DetectTime": "2023-10-30T14:08:05.847853+02:00", "EventTime": "2023-10-30T14:08:05.847863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CpQCaZ2oWkNByuzznb"]} -{"Format": "IDEA0", "ID": "23d7129c-b38c-4966-b0ca-53ef2072d288", "DetectTime": "2023-10-30T14:08:05.868063+02:00", "EventTime": "2023-10-30T14:08:05.868080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cu5ZPe2UJJpbWP6iZ1"]} -{"Format": "IDEA0", "ID": "e6c1c6c0-3750-47e2-b18d-88b94d713bc2", "DetectTime": "2023-10-30T14:08:05.893449+02:00", "EventTime": "2023-10-30T14:08:05.893465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.242.6.156 ", "ContentType": "text/plain"}], "uids": ["CPk5vn4eMB9kEMKuNa"]} -{"Format": "IDEA0", "ID": "b2033da8-7016-4f64-bf1a-9de9583899d0", "DetectTime": "2023-10-30T14:08:05.919653+02:00", "EventTime": "2023-10-30T14:08:05.919669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["C4UxV5Vb70MBaOT0c"]} -{"Format": "IDEA0", "ID": "cb784831-7871-45ba-89c3-f12360f781b9", "DetectTime": "2023-10-30T14:08:05.950849+02:00", "EventTime": "2023-10-30T14:08:05.950863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CTyxWx3PJKGKfMRddc"]} -{"Format": "IDEA0", "ID": "be41991c-8e24-4a85-9270-12cccbd6694f", "DetectTime": "2023-10-30T14:08:05.971827+02:00", "EventTime": "2023-10-30T14:08:05.971840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C8CVLrUlqh3xTKCDl"]} -{"Format": "IDEA0", "ID": "402c3a79-ac01-47a7-9214-5a3a24485423", "DetectTime": "2023-10-30T14:08:05.997025+02:00", "EventTime": "2023-10-30T14:08:05.997100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CIyDNp4t1wHyQwAaX2"]} -{"Format": "IDEA0", "ID": "c536e9c5-e78f-4cf9-ae14-6b332ef58379", "DetectTime": "2023-10-30T14:08:06.024542+02:00", "EventTime": "2023-10-30T14:08:06.024565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CLKX8U2zlahi5iPk25"]} -{"Format": "IDEA0", "ID": "8496de06-f4bb-4889-8ec3-b32527b512c3", "DetectTime": "2023-10-30T14:08:06.044946+02:00", "EventTime": "2023-10-30T14:08:06.044962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CpSv9N262BumNpJHIg"]} -{"Format": "IDEA0", "ID": "9f23f101-9b9d-479b-b942-0c6c04bced6e", "DetectTime": "2023-10-30T14:08:06.065810+02:00", "EventTime": "2023-10-30T14:08:06.065826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C9AEVO3BTfF62NuJX1"]} -{"Format": "IDEA0", "ID": "589dbfa3-93b6-4906-a41e-c39dac3533ed", "DetectTime": "2023-10-30T14:08:06.090557+02:00", "EventTime": "2023-10-30T14:08:06.090573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CiUL3c3LrUvHWyjxWj"]} -{"Format": "IDEA0", "ID": "dea04aa2-d483-403f-bac3-f8a62dd188d5", "DetectTime": "2023-10-30T14:08:06.116744+02:00", "EventTime": "2023-10-30T14:08:06.116764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CN5VKE2smkWsf8kAQ7"]} -{"Format": "IDEA0", "ID": "04779e2c-62b4-4ee5-a0b9-848db51774d0", "DetectTime": "2023-10-30T14:08:06.144145+02:00", "EventTime": "2023-10-30T14:08:06.144162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C50YLE1PM08xWu232l"]} -{"Format": "IDEA0", "ID": "a9345bbb-eff3-49b7-b877-2afd43452c90", "DetectTime": "2023-10-30T14:08:06.172353+02:00", "EventTime": "2023-10-30T14:08:06.172375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmHIiuRHiyYElOnvj"]} -{"Format": "IDEA0", "ID": "ba498aaf-becd-45fa-be8a-5b1c08e751b7", "DetectTime": "2023-10-30T14:08:06.198897+02:00", "EventTime": "2023-10-30T14:08:06.198915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CuNCp2e4TXyAJgIrc"]} -{"Format": "IDEA0", "ID": "6fa959c0-1976-4811-97fd-6174afb3807d", "DetectTime": "2023-10-30T14:08:06.222507+02:00", "EventTime": "2023-10-30T14:08:06.222521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cq3lCO8HouHoHhJ23"]} -{"Format": "IDEA0", "ID": "7cee9d66-aab2-43ca-a9a4-aeb757b609b0", "DetectTime": "2023-10-30T14:08:06.247637+02:00", "EventTime": "2023-10-30T14:08:06.247655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CcpEcv40DVpyGaZU21"]} -{"Format": "IDEA0", "ID": "2e0e8db3-9b9f-4a98-8995-2eb42dbc2ffb", "DetectTime": "2023-10-30T14:08:06.273480+02:00", "EventTime": "2023-10-30T14:08:06.273496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Co5r5q20prj0NCH6sj"]} -{"Format": "IDEA0", "ID": "128be301-704c-409f-929d-574d197fa9c5", "DetectTime": "2023-10-30T14:08:06.299044+02:00", "EventTime": "2023-10-30T14:08:06.299061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C1Awjn1EsYc9yJnyij"]} -{"Format": "IDEA0", "ID": "0e2c574d-f2ea-4ccb-a0b1-dc685dd22a99", "DetectTime": "2023-10-30T14:08:06.324711+02:00", "EventTime": "2023-10-30T14:08:06.324727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C5P346QmPrTH4JZD5"]} -{"Format": "IDEA0", "ID": "99b16eee-c32c-4bb2-9811-3e933f0d3f4a", "DetectTime": "2023-10-30T14:08:06.348947+02:00", "EventTime": "2023-10-30T14:08:06.348958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CbSb4A4gVnsOYZpbrd"]} -{"Format": "IDEA0", "ID": "a98fc3a8-014f-40a8-a193-7359e61a634f", "DetectTime": "2023-10-30T14:08:06.372514+02:00", "EventTime": "2023-10-30T14:08:06.372531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CCrvOe4TsUTYDV9tG5"]} -{"Format": "IDEA0", "ID": "048f4eb9-e45a-4ec8-80d3-221d81af2b29", "DetectTime": "2023-10-30T14:08:06.398640+02:00", "EventTime": "2023-10-30T14:08:06.398657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CIrmzf370hKkzPUcRd"]} -{"Format": "IDEA0", "ID": "e0c71905-f268-4668-96e5-22f60cb57be4", "DetectTime": "2023-10-30T14:08:06.427288+02:00", "EventTime": "2023-10-30T14:08:06.427310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CtGf1lA1uoXnqD9Jh"]} -{"Format": "IDEA0", "ID": "efb4dccd-998f-4af5-9309-deadc8051c5e", "DetectTime": "2023-10-30T14:08:06.456106+02:00", "EventTime": "2023-10-30T14:08:06.456118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CHBvJi4kiKWOJJaKRc"]} -{"Format": "IDEA0", "ID": "73efc4aa-c017-409d-b99a-5cb7f5e981da", "DetectTime": "2023-10-30T14:08:06.476815+02:00", "EventTime": "2023-10-30T14:08:06.476832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CFdKYR1D0fj6iNzud2"]} -{"Format": "IDEA0", "ID": "18d8c425-aba4-4e8d-a4cb-b208c6ac1ea3", "DetectTime": "2023-10-30T14:08:06.499585+02:00", "EventTime": "2023-10-30T14:08:06.499603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CTZZ6TQ7YCDGYDwRg"]} -{"Format": "IDEA0", "ID": "f068186d-d349-413d-a38f-6b39c1e37946", "DetectTime": "2023-10-30T14:08:06.532424+02:00", "EventTime": "2023-10-30T14:08:06.532445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["C2vhje2Z3QRueclpqk"]} -{"Format": "IDEA0", "ID": "4a350e8e-91d4-4033-af03-b0c20ab10b0e", "DetectTime": "2023-10-30T14:08:06.560188+02:00", "EventTime": "2023-10-30T14:08:06.560208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CHuULZ1q7f5o4Q8AX7"]} -{"Format": "IDEA0", "ID": "6bd0ea6b-0b84-4336-b4cc-a6f6b9789b38", "DetectTime": "2023-10-30T14:08:06.584063+02:00", "EventTime": "2023-10-30T14:08:06.584075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CTzfLE46XwmumchBEf"]} -{"Format": "IDEA0", "ID": "422d2401-a9f8-4df2-8b52-065f57b3f01b", "DetectTime": "2023-10-30T14:08:06.611366+02:00", "EventTime": "2023-10-30T14:08:06.611380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C1na7y3ohj1CyILvW2"]} -{"Format": "IDEA0", "ID": "ab7448cb-d9e5-40c5-abd8-984d395ad0c3", "DetectTime": "2023-10-30T14:08:06.633950+02:00", "EventTime": "2023-10-30T14:08:06.633961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CWEZmJ1tKSSxnatUd6"]} -{"Format": "IDEA0", "ID": "322b6f36-4e2e-4c5c-a31f-c2a6b87a657f", "DetectTime": "2023-10-30T14:08:06.660463+02:00", "EventTime": "2023-10-30T14:08:06.660480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CfyXiJ33dnUasNhXE4"]} -{"Format": "IDEA0", "ID": "cc1d7625-2daf-4f74-8fe3-84b051fded2f", "DetectTime": "2023-10-30T14:08:06.683824+02:00", "EventTime": "2023-10-30T14:08:06.683843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C8IG8OeLZakMFXl87"]} -{"Format": "IDEA0", "ID": "8fcea717-cd3d-4efb-aee5-1e33e5fd9291", "DetectTime": "2023-10-30T14:08:06.709670+02:00", "EventTime": "2023-10-30T14:08:06.709688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CZovDW17syZFTRrqpi"]} -{"Format": "IDEA0", "ID": "b1a7d63e-83d9-4295-83da-93175c661c9c", "DetectTime": "2023-10-30T14:08:06.726659+02:00", "EventTime": "2023-10-30T14:08:06.726679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CJTpUM26UQoasvcGkh"]} -{"Format": "IDEA0", "ID": "ffdf221c-6970-4255-9c68-bcadf5cfbb16", "DetectTime": "2023-10-30T14:08:06.754398+02:00", "EventTime": "2023-10-30T14:08:06.754422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CSNhsp2Tz1rUJ5rvDc"]} -{"Format": "IDEA0", "ID": "6340969a-6eda-494a-a573-751a2ae7a9dc", "DetectTime": "2023-10-30T14:08:06.770213+02:00", "EventTime": "2023-10-30T14:08:06.770224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CGaLJk1goTdyAjLtYi"]} -{"Format": "IDEA0", "ID": "c0869e6a-ec83-43ef-a7e9-cbb3c192a447", "DetectTime": "2023-10-30T14:08:06.788545+02:00", "EventTime": "2023-10-30T14:08:06.788556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C4BoTb5Hcb2CrU5gk"]} -{"Format": "IDEA0", "ID": "4b478098-e9a3-449a-9b13-c33e464b7b0d", "DetectTime": "2023-10-30T14:08:06.809514+02:00", "EventTime": "2023-10-30T14:08:06.809535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["COi9IS20Elmk00RA5d"]} -{"Format": "IDEA0", "ID": "64fdb822-ae79-45d3-b887-1b502c0b9e04", "DetectTime": "2023-10-30T14:08:06.832426+02:00", "EventTime": "2023-10-30T14:08:06.832447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CdqJ5220Feq91ILfTe"]} -{"Format": "IDEA0", "ID": "e1061fd0-b88d-4c0f-b5df-3b8bad0a0270", "DetectTime": "2023-10-30T14:08:06.853313+02:00", "EventTime": "2023-10-30T14:08:06.853334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CY8rP540eupwF3ipj3"]} -{"Format": "IDEA0", "ID": "dd872b3c-8efc-49c8-bffa-5e6246b14c33", "DetectTime": "2023-10-30T14:08:06.874363+02:00", "EventTime": "2023-10-30T14:08:06.874385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CwdQ1O33WyzrUqoCL4"]} -{"Format": "IDEA0", "ID": "20553c14-e7bd-46cb-9d69-0ff21fcfc553", "DetectTime": "2023-10-30T14:08:06.897281+02:00", "EventTime": "2023-10-30T14:08:06.897301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CdaSBtXx97Lx3Bo4h"]} -{"Format": "IDEA0", "ID": "33b1198c-6a28-44a2-bc42-f812b1afda6e", "DetectTime": "2023-10-30T14:08:06.916812+02:00", "EventTime": "2023-10-30T14:08:06.916824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CUfSOQ3tx52qyRsk6a"]} -{"Format": "IDEA0", "ID": "9267913b-9a51-4acb-9712-150683929d07", "DetectTime": "2023-10-30T14:08:06.934996+02:00", "EventTime": "2023-10-30T14:08:06.935017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C5hbsqGoObziDa4oi"]} -{"Format": "IDEA0", "ID": "cfba367c-7368-4046-b1d0-726191ad287a", "DetectTime": "2023-10-30T14:08:06.953236+02:00", "EventTime": "2023-10-30T14:08:06.953251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CW0wqu3yE7z973gPk"]} -{"Format": "IDEA0", "ID": "60b452bd-72bb-4948-b14c-5f8ea4f42a20", "DetectTime": "2023-10-30T14:08:06.980651+02:00", "EventTime": "2023-10-30T14:08:06.980670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["COFHtGYwicn8jfX3l"]} -{"Format": "IDEA0", "ID": "2dd8bdb1-ec08-49a4-898a-7b35fce85136", "DetectTime": "2023-10-30T14:08:07.001267+02:00", "EventTime": "2023-10-30T14:08:07.001291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Ctjust2bvS67nI9hj8"]} -{"Format": "IDEA0", "ID": "86b08de7-4837-4a34-bce1-4a6aa708aa28", "DetectTime": "2023-10-30T14:08:07.022318+02:00", "EventTime": "2023-10-30T14:08:07.022338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CA159P3NABV0gaiiVg"]} -{"Format": "IDEA0", "ID": "6906e02f-efe5-4103-b17b-70f7a1f90177", "DetectTime": "2023-10-30T14:08:07.043301+02:00", "EventTime": "2023-10-30T14:08:07.043321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C804c51Fh3epSOTOkf"]} -{"Format": "IDEA0", "ID": "6a3681a5-f1f9-4a15-a86b-139640e7c898", "DetectTime": "2023-10-30T14:08:07.064007+02:00", "EventTime": "2023-10-30T14:08:07.064028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cakci64zEHf7szpt3d"]} -{"Format": "IDEA0", "ID": "ecc1bdee-3647-445b-ab3d-91a949b76eee", "DetectTime": "2023-10-30T14:08:07.085524+02:00", "EventTime": "2023-10-30T14:08:07.085544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Chu0DAPWppBrV9KH9"]} -{"Format": "IDEA0", "ID": "8ac16f8e-73c9-411d-aef7-27f0a1d2c731", "DetectTime": "2023-10-30T14:08:07.108283+02:00", "EventTime": "2023-10-30T14:08:07.108302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CM1WuY1WR2WD4H4X44"]} -{"Format": "IDEA0", "ID": "db0ba23d-d1d2-41c3-9acd-09682d6456a5", "DetectTime": "2023-10-30T14:08:07.128662+02:00", "EventTime": "2023-10-30T14:08:07.128674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["COVZk54ber8pyZi2C8"]} -{"Format": "IDEA0", "ID": "a1006766-a56f-4b44-b196-e0025d7b0631", "DetectTime": "2023-10-30T14:08:07.147493+02:00", "EventTime": "2023-10-30T14:08:07.147512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CRqRZb22VcvaN7W4pj"]} -{"Format": "IDEA0", "ID": "c92ef484-291b-47fb-932f-4c0439fa0c65", "DetectTime": "2023-10-30T14:08:07.168655+02:00", "EventTime": "2023-10-30T14:08:07.168674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CzGvT31IrhaAm07op1"]} -{"Format": "IDEA0", "ID": "bb93f6e8-4120-418b-8015-862016db6f81", "DetectTime": "2023-10-30T14:08:07.188749+02:00", "EventTime": "2023-10-30T14:08:07.188762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CwGF394RvNX8FQVMe2"]} -{"Format": "IDEA0", "ID": "abf210e0-e1bc-4cc9-bce3-f6523a885e42", "DetectTime": "2023-10-30T14:08:07.208668+02:00", "EventTime": "2023-10-30T14:08:07.208684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["Cuva5y1Zn1c8HrMQ3a"]} -{"Format": "IDEA0", "ID": "cea658f6-9556-4bbc-9a88-09e57cea996e", "DetectTime": "2023-10-30T14:08:07.225370+02:00", "EventTime": "2023-10-30T14:08:07.225381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CNV13z1SplftBvwFkd"]} -{"Format": "IDEA0", "ID": "8361121b-23d7-4079-b3cd-7252575a0ca3", "DetectTime": "2023-10-30T14:08:07.244200+02:00", "EventTime": "2023-10-30T14:08:07.244219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CYM1IK3phPctIVvNLj"]} -{"Format": "IDEA0", "ID": "4af21a4a-2e81-4d86-9b89-bf03c4703c62", "DetectTime": "2023-10-30T14:08:07.261392+02:00", "EventTime": "2023-10-30T14:08:07.261410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CO8jP435rqMn7LCXD8"]} -{"Format": "IDEA0", "ID": "3f77bcaf-2543-4f27-841f-d544e2a1eb0b", "DetectTime": "2023-10-30T14:08:07.282069+02:00", "EventTime": "2023-10-30T14:08:07.282086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CG5CJd4BEZHmFEYWJc"]} -{"Format": "IDEA0", "ID": "d2b4d6a8-8268-4aa3-811e-952429b3decf", "DetectTime": "2023-10-30T14:08:07.301267+02:00", "EventTime": "2023-10-30T14:08:07.301279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CHu9Tu4OGYNk8yTTO9"]} -{"Format": "IDEA0", "ID": "3155c0de-4290-4f84-9556-ac12fa563b36", "DetectTime": "2023-10-30T14:08:07.315388+02:00", "EventTime": "2023-10-30T14:08:07.315400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbFSmO3XSDAb8N7Bsk"]} -{"Format": "IDEA0", "ID": "0964e37d-0a53-43e8-b620-640c278b4f3a", "DetectTime": "2023-10-30T14:08:07.328813+02:00", "EventTime": "2023-10-30T14:08:07.328825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["Cp1VOF2cYlrTUwZz0j"]} -{"Format": "Json", "ID": "0964e37d-0a53-43e8-b620-640c278b4f3a", "DetectTime": "2023-10-30T14:08:07.328813+02:00", "EventTime": "2023-10-30T14:08:07.328825+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T19:50:12.471441+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2023/10/30 14:08:07.402027)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "82bf7275-2b7b-4ba9-af66-b52ebb4da977", "DetectTime": "2023-10-30T14:08:07.407591+02:00", "EventTime": "2023-10-30T14:08:07.407607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CLLGmOlSUTKe64wvi"]} -{"Format": "IDEA0", "ID": "133323d2-d677-482f-a0a9-c4ea369e8667", "DetectTime": "2023-10-30T14:08:07.425922+02:00", "EventTime": "2023-10-30T14:08:07.425939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C3fBPp1chX0eviKznk"]} -{"Format": "IDEA0", "ID": "3bb42dfe-756f-4296-ae94-cd745c62da8e", "DetectTime": "2023-10-30T14:08:07.446567+02:00", "EventTime": "2023-10-30T14:08:07.446591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CIy6pG4LOpybIizfgi"]} -{"Format": "IDEA0", "ID": "bb0aade6-9b5c-4111-90ca-37913556954c", "DetectTime": "2023-10-30T14:08:07.469302+02:00", "EventTime": "2023-10-30T14:08:07.469321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CenTrY26KEqyQqC4Y7"]} -{"Format": "IDEA0", "ID": "9a465a4a-c2ce-475e-9344-0f3f2a66b9b8", "DetectTime": "2023-10-30T14:08:07.489345+02:00", "EventTime": "2023-10-30T14:08:07.489366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQZWdh1rwJPHsJcZGl"]} -{"Format": "IDEA0", "ID": "c1cbb404-ad8c-4d29-9fd5-e57ef30fae9c", "DetectTime": "2023-10-30T14:08:07.506185+02:00", "EventTime": "2023-10-30T14:08:07.506197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cb6CsfgXy9tKulCDg"]} -{"Format": "IDEA0", "ID": "8c9d9114-cbe3-453d-b5d5-ca072e8f1f36", "DetectTime": "2023-10-30T14:08:07.529706+02:00", "EventTime": "2023-10-30T14:08:07.529726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C0Z3pB3dxhOs2G6evb"]} -{"Format": "IDEA0", "ID": "f57b13ac-f8cf-419f-9aaa-3f0a2c31a2fd", "DetectTime": "2023-10-30T14:08:07.549776+02:00", "EventTime": "2023-10-30T14:08:07.549792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["ClGDcv2ZJGUFfTgzw6"]} -{"Format": "IDEA0", "ID": "5c922afb-8a0d-4f09-a867-f4dfb4d12ab9", "DetectTime": "2023-10-30T14:08:07.566847+02:00", "EventTime": "2023-10-30T14:08:07.566859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CxoY5y4Xy6BvVuHEce"]} -{"Format": "IDEA0", "ID": "25f1b7d6-d371-48f7-9f0b-68a503a8e8c7", "DetectTime": "2023-10-30T14:08:07.584283+02:00", "EventTime": "2023-10-30T14:08:07.584296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cj7oyv1DzkkZshrDD7"]} -{"Format": "IDEA0", "ID": "cb5cf2bd-b747-4eed-995e-0e34e918a721", "DetectTime": "2023-10-30T14:08:07.601764+02:00", "EventTime": "2023-10-30T14:08:07.601780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["COIMx63Q3H1UqTm2j9"]} -{"Format": "IDEA0", "ID": "5eacd04a-f7e2-4c29-a0f4-6b877ac0e58f", "DetectTime": "2023-10-30T14:08:07.626731+02:00", "EventTime": "2023-10-30T14:08:07.626746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CpnBqY2jhKMKdTer56"]} -{"Format": "IDEA0", "ID": "99e97842-1a96-43fe-bdca-e31bfd98c5df", "DetectTime": "2023-10-30T14:08:07.645803+02:00", "EventTime": "2023-10-30T14:08:07.645819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C7b0lH260ovn6N2sGk"]} -{"Format": "IDEA0", "ID": "6a72c1ba-115a-46b1-bcfe-01bd819ad628", "DetectTime": "2023-10-30T14:08:07.665542+02:00", "EventTime": "2023-10-30T14:08:07.665560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CeDJcp2KfWkfKvaIoc"]} -{"Format": "IDEA0", "ID": "09594200-01fb-4454-ab5b-8b35e3662d9b", "DetectTime": "2023-10-30T14:08:07.686458+02:00", "EventTime": "2023-10-30T14:08:07.686474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CW5lMR0rKdjiVYLlj"]} -{"Format": "IDEA0", "ID": "757f00c3-aa27-46ee-9cbd-e584b24297a5", "DetectTime": "2023-10-30T14:08:07.707809+02:00", "EventTime": "2023-10-30T14:08:07.707826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CYj5Br4z4xfYjVwDJd"]} -{"Format": "IDEA0", "ID": "8b793ee1-63ac-4304-8fcf-09011bb03991", "DetectTime": "2023-10-30T14:08:07.728142+02:00", "EventTime": "2023-10-30T14:08:07.728157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CiEdpX2ZGkBfZ81bc3"]} -{"Format": "IDEA0", "ID": "7bc1b02f-b99e-4ce1-bed8-6961d4989403", "DetectTime": "2023-10-30T14:08:07.743416+02:00", "EventTime": "2023-10-30T14:08:07.743427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cdb5wT17W8rlIQWFI2"]} -{"Format": "IDEA0", "ID": "04752224-da5e-44de-9634-adfe7ec27e25", "DetectTime": "2023-10-30T14:08:07.762526+02:00", "EventTime": "2023-10-30T14:08:07.762537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CXAK8B3I8FRdDVckO5"]} -{"Format": "IDEA0", "ID": "6ddfff3d-71b7-4027-a466-e3c387d6c372", "DetectTime": "2023-10-30T14:08:07.778755+02:00", "EventTime": "2023-10-30T14:08:07.778776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CwBGlv4jILNCF7NHra"]} -{"Format": "IDEA0", "ID": "f67ea653-fd46-4a95-a894-4b51c1fb036b", "DetectTime": "2023-10-30T14:08:07.797046+02:00", "EventTime": "2023-10-30T14:08:07.797062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CEWtET1t7StUbxO6vk"]} -{"Format": "IDEA0", "ID": "3ab67df6-5a98-4eaa-a1b5-91e8a1319b81", "DetectTime": "2023-10-30T14:08:07.815892+02:00", "EventTime": "2023-10-30T14:08:07.815908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRNTWo1bzngReleT7"]} -{"Format": "IDEA0", "ID": "0ef8f6c7-2256-4585-a4f9-f07b3406ce2f", "DetectTime": "2023-10-30T14:08:07.841943+02:00", "EventTime": "2023-10-30T14:08:07.841961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CziHLC4itvgjdyTyh8"]} -{"Format": "IDEA0", "ID": "6bb80046-e4a4-41d7-8e6f-9355ca212016", "DetectTime": "2023-10-30T14:08:07.857610+02:00", "EventTime": "2023-10-30T14:08:07.857620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["Crkiir4tiXSciodlqc"]} -{"Format": "IDEA0", "ID": "16cc9c70-d81e-4565-8665-e09b8016115a", "DetectTime": "2023-10-30T14:08:07.872781+02:00", "EventTime": "2023-10-30T14:08:07.872792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CFjxXU4mCAvBhKzbf"]} -{"Format": "IDEA0", "ID": "dc9197a9-ba9f-4faa-a619-26a171f4cbc0", "DetectTime": "2023-10-30T14:08:07.887239+02:00", "EventTime": "2023-10-30T14:08:07.887253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CMjA6r4R1iyALEKH27"]} -{"Format": "IDEA0", "ID": "c74d10d8-ec0b-450c-b278-65a609a2b96e", "DetectTime": "2023-10-30T14:08:07.901064+02:00", "EventTime": "2023-10-30T14:08:07.901075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CCl0qR39uiAXj2buk2"]} -{"Format": "IDEA0", "ID": "2ef12fc6-a6fe-4dce-9f4b-93ddf9742fe8", "DetectTime": "2023-10-30T14:08:07.917467+02:00", "EventTime": "2023-10-30T14:08:07.917478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CPOjXBrjtQmTCOp6a"]} -{"Format": "IDEA0", "ID": "a6d6dab8-e0d9-4951-9db9-dd877a0e28a5", "DetectTime": "2023-10-30T14:08:07.936276+02:00", "EventTime": "2023-10-30T14:08:07.936292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFjDjt2ommT9QkOhhh"]} -{"Format": "IDEA0", "ID": "6bd5dda7-6a2e-4a4a-9e5a-e313b253d436", "DetectTime": "2023-10-30T14:08:07.955093+02:00", "EventTime": "2023-10-30T14:08:07.955109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIi1tv4SFAv24A6Dgf"]} -{"Format": "IDEA0", "ID": "3df86738-0475-4d6e-9973-30e7add04ade", "DetectTime": "2023-10-30T14:08:07.983910+02:00", "EventTime": "2023-10-30T14:08:07.983921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CfMOFN1ajrIqtsc4g4"]} -{"Format": "IDEA0", "ID": "4f843bab-4861-4430-93f9-f3d0bb7bc496", "DetectTime": "2023-10-30T14:08:07.998414+02:00", "EventTime": "2023-10-30T14:08:07.998432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C0gAtA4tljIqOUcOM"]} -{"Format": "IDEA0", "ID": "8a365f98-4a5e-43e2-b686-04f19663bdbe", "DetectTime": "2023-10-30T14:08:08.014761+02:00", "EventTime": "2023-10-30T14:08:08.014773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["Ctc3wfdA6ZZ6wwNng"]} -{"Format": "IDEA0", "ID": "53af11fc-a864-4253-8690-6349d04f5932", "DetectTime": "2023-10-30T14:08:08.029117+02:00", "EventTime": "2023-10-30T14:08:08.029128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CLRjB51XcfoNUzrlZ"]} -{"Format": "IDEA0", "ID": "d755392a-fcb8-4568-9cb8-74373827ad1e", "DetectTime": "2023-10-30T14:08:08.042349+02:00", "EventTime": "2023-10-30T14:08:08.042365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CP0wBjMyzZnBUxa5"]} -{"Format": "IDEA0", "ID": "f48199da-bada-4447-85cf-093a7e1245a7", "DetectTime": "2023-10-30T14:08:08.062402+02:00", "EventTime": "2023-10-30T14:08:08.062423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CZUFbh2rmbuaFaRDze"]} -{"Format": "IDEA0", "ID": "1aa9f3d5-c627-4201-b604-b499068b4cf0", "DetectTime": "2023-10-30T14:08:08.086213+02:00", "EventTime": "2023-10-30T14:08:08.086229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cek9kn3XzRGc5jcP24"]} -{"Format": "IDEA0", "ID": "78de9abb-26b2-4dd5-b0b0-775d00e94cf8", "DetectTime": "2023-10-30T14:08:08.102369+02:00", "EventTime": "2023-10-30T14:08:08.102390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CxrPYp2LiNVxbu9uX2"]} -{"Format": "IDEA0", "ID": "a6f771d4-cd3b-4b25-acfe-ffa224ba85dd", "DetectTime": "2023-10-30T14:08:08.117868+02:00", "EventTime": "2023-10-30T14:08:08.117895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CJqVSt4rX3AJrwvqzh"]} -{"Format": "IDEA0", "ID": "c72d35ac-8cea-4dad-84ac-bc6860bd2737", "DetectTime": "2023-10-30T14:08:08.137201+02:00", "EventTime": "2023-10-30T14:08:08.137223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C8ZmTf1domJuzYyBd2"]} -{"Format": "IDEA0", "ID": "e6e9725e-a171-4d07-a70c-321621e8cd5a", "DetectTime": "2023-10-30T14:08:08.156746+02:00", "EventTime": "2023-10-30T14:08:08.156762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CnRMPF1KYfGi5hlk1f"]} -{"Format": "IDEA0", "ID": "6ac4e4e4-b5c6-47e0-82c7-8a78fe397683", "DetectTime": "2023-10-30T14:08:08.174217+02:00", "EventTime": "2023-10-30T14:08:08.174228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CAGljf13OtrFayGyhl"]} -{"Format": "IDEA0", "ID": "912f2a03-7992-46f8-891c-3c0f4eaa4746", "DetectTime": "2023-10-30T14:08:08.189410+02:00", "EventTime": "2023-10-30T14:08:08.189422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CKkrjm3VWKfpdjcg3f"]} -{"Format": "IDEA0", "ID": "4a28812a-edf4-4aab-837d-de92d931fc79", "DetectTime": "2023-10-30T14:08:08.205614+02:00", "EventTime": "2023-10-30T14:08:08.205625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["COaMVIIRZkLrXNfCe"]} -{"Format": "IDEA0", "ID": "e1992bfc-f9ec-417c-8b12-16ae1fba902b", "DetectTime": "2023-10-30T14:08:08.222425+02:00", "EventTime": "2023-10-30T14:08:08.222441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cxg3ic2FteZ6nW6X2d"]} -{"Format": "IDEA0", "ID": "1af6cf51-29e5-4879-8613-e705d10d1126", "DetectTime": "2023-10-30T14:08:08.239077+02:00", "EventTime": "2023-10-30T14:08:08.239093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CoqREc2FOclKwf2SP4"]} -{"Format": "IDEA0", "ID": "68fd7640-3e6a-4716-a1a4-83d813ae793a", "DetectTime": "2023-10-30T14:08:08.253662+02:00", "EventTime": "2023-10-30T14:08:08.253673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CO1SJnqUKh19KGwT2"]} -{"Format": "IDEA0", "ID": "15fcc0f8-d88f-4561-bcc5-0046b0f06c67", "DetectTime": "2023-10-30T14:08:08.269694+02:00", "EventTime": "2023-10-30T14:08:08.269706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CK9oKP3B5tc5RiwmX5"]} -{"Format": "IDEA0", "ID": "39aa00f8-a5cc-4588-a85a-88f63fb8e2f1", "DetectTime": "2023-10-30T14:08:08.301795+02:00", "EventTime": "2023-10-30T14:08:08.301812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C09AC33OnIoK2AUjk8"]} -{"Format": "IDEA0", "ID": "548a628c-fd07-46a1-9810-87fcc383001f", "DetectTime": "2023-10-30T14:08:08.316476+02:00", "EventTime": "2023-10-30T14:08:08.316493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CElL5h1VYf6g3Kjvll"]} -{"Format": "IDEA0", "ID": "7db01ce9-ce98-4a1e-a44b-133b5c4b8d09", "DetectTime": "2023-10-30T14:08:08.334378+02:00", "EventTime": "2023-10-30T14:08:08.334389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CXXbtN1G2tKkVbazx"]} -{"Format": "IDEA0", "ID": "442aa0b3-714e-4caa-b4b5-7d376408c72e", "DetectTime": "2023-10-30T14:08:08.352090+02:00", "EventTime": "2023-10-30T14:08:08.352107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CUwEed2thNWJNKWGG3"]} -{"Format": "IDEA0", "ID": "87aa0f37-5ee3-4e1b-8977-31f346d5d9d4", "DetectTime": "2023-10-30T14:08:08.371950+02:00", "EventTime": "2023-10-30T14:08:08.371968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CRmmPm3KhkN4Wmxbm4"]} -{"Format": "IDEA0", "ID": "84fc88fb-800e-4a7d-ae75-176b3d558e5b", "DetectTime": "2023-10-30T14:08:08.390503+02:00", "EventTime": "2023-10-30T14:08:08.390529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CtByap2PLTI2KDKXz1"]} -{"Format": "IDEA0", "ID": "49ae501f-130f-42ed-803f-44fd9b70ba95", "DetectTime": "2023-10-30T14:08:08.411250+02:00", "EventTime": "2023-10-30T14:08:08.411270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C9pvMY2bet4PK7A56"]} -{"Format": "IDEA0", "ID": "f041a0c4-89f6-42c6-8cc4-44c1da6e6d8e", "DetectTime": "2023-10-30T14:08:08.431216+02:00", "EventTime": "2023-10-30T14:08:08.431237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CK9rQf21OEH5luFh25"]} -{"Format": "IDEA0", "ID": "c86d62e1-fbd8-4dc9-90da-974e37c45082", "DetectTime": "2023-10-30T14:08:08.451465+02:00", "EventTime": "2023-10-30T14:08:08.451477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CCj73p4dyMRsUCqBHl"]} -{"Format": "IDEA0", "ID": "f4a011e7-4ef1-46a1-b973-30b5af197b7b", "DetectTime": "2023-10-30T14:08:08.470868+02:00", "EventTime": "2023-10-30T14:08:08.470888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CtN18v1SVbJGoc0j4d"]} -{"Format": "IDEA0", "ID": "5040269d-b749-4560-8686-ae30f8258a60", "DetectTime": "2023-10-30T14:08:08.492098+02:00", "EventTime": "2023-10-30T14:08:08.492120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CQP6f44diLUv9TtAGf"]} -{"Format": "IDEA0", "ID": "5a322f2f-7866-45f6-8e6e-0dfac4da9238", "DetectTime": "2023-10-30T14:08:08.512521+02:00", "EventTime": "2023-10-30T14:08:08.512537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C4yV274Di7FukBjg9e"]} -{"Format": "IDEA0", "ID": "03c4ecf5-1ecf-41f4-9982-120e49fb0e2e", "DetectTime": "2023-10-30T14:08:08.546549+02:00", "EventTime": "2023-10-30T14:08:08.546560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CDK2Z12BcMQoCK7Gx3"]} -{"Format": "IDEA0", "ID": "61332ee9-b90e-46e1-bb2d-5d4464aaa969", "DetectTime": "2023-10-30T14:08:08.560817+02:00", "EventTime": "2023-10-30T14:08:08.560828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CJKOq64WoYppxYWa35"]} -{"Format": "IDEA0", "ID": "71080a50-fc38-4659-86f0-1af16ace26f0", "DetectTime": "2023-10-30T14:08:08.576844+02:00", "EventTime": "2023-10-30T14:08:08.576856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CkBuBqfV8e3EjRg6g"]} -{"Format": "IDEA0", "ID": "86882ffc-9319-4441-a4c6-eaa07869b770", "DetectTime": "2023-10-30T14:08:08.595351+02:00", "EventTime": "2023-10-30T14:08:08.595367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["Cm15iyGhyJL6hixoj"]} -{"Format": "IDEA0", "ID": "2339f3bd-7452-47ef-90db-15772d908151", "DetectTime": "2023-10-30T14:08:08.613653+02:00", "EventTime": "2023-10-30T14:08:08.613667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["COIFEm4zB7OfOrrOZ4"]} -{"Format": "IDEA0", "ID": "f096ae34-60aa-4ffc-bd73-e7ebd9d8d12a", "DetectTime": "2023-10-30T14:08:08.627402+02:00", "EventTime": "2023-10-30T14:08:08.627413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CDV4fH2TLwKiHZPIig"]} -{"Format": "IDEA0", "ID": "97e8e259-86e3-407f-9486-1ea293898049", "DetectTime": "2023-10-30T14:08:08.642416+02:00", "EventTime": "2023-10-30T14:08:08.642427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CyiP7D3tJmwTA6gM4e"]} -{"Format": "IDEA0", "ID": "ec938958-7cf1-4c85-945b-3281720a3ed3", "DetectTime": "2023-10-30T14:08:08.658710+02:00", "EventTime": "2023-10-30T14:08:08.658722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CrzbVu2u5RoW9LVDZa"]} -{"Format": "IDEA0", "ID": "a6c8ac40-bdb8-45dd-9c4e-fd6912ac02d0", "DetectTime": "2023-10-30T14:08:08.683336+02:00", "EventTime": "2023-10-30T14:08:08.683362+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2l1kG3IchCC5HV4d"]} -{"Format": "IDEA0", "ID": "c6ad9e1a-1aec-4126-8955-3c661e127fd5", "DetectTime": "2023-10-30T14:08:08.715727+02:00", "EventTime": "2023-10-30T14:08:08.715744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CRcbCr3mFk8D5VzZJe"]} -{"Format": "IDEA0", "ID": "b6c50b93-6a36-4ba0-9dff-72cec267a5f8", "DetectTime": "2023-10-30T14:08:08.731700+02:00", "EventTime": "2023-10-30T14:08:08.731712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C1DvIb0g1masdzZj4"]} -{"Format": "IDEA0", "ID": "f1a3e71d-aedd-4171-be00-b65e0cca46ae", "DetectTime": "2023-10-30T14:08:08.750793+02:00", "EventTime": "2023-10-30T14:08:08.750809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C3O7iO2zTHjZNwb172"]} -{"Format": "IDEA0", "ID": "f764135c-135f-44fb-b28d-129c09712ac8", "DetectTime": "2023-10-30T14:08:08.770286+02:00", "EventTime": "2023-10-30T14:08:08.770299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CFrQf42iX6rMcLTFej"]} -{"Format": "IDEA0", "ID": "7a1b2a90-6fe1-4a06-aca6-8a27a397a54e", "DetectTime": "2023-10-30T14:08:08.784742+02:00", "EventTime": "2023-10-30T14:08:08.784757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CwtBsT3n1HzdkRSI9l"]} -{"Format": "IDEA0", "ID": "7eca2994-2f53-4525-9ddb-34fc6d0c3261", "DetectTime": "2023-10-30T14:08:08.802031+02:00", "EventTime": "2023-10-30T14:08:08.802042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CkBIIF48yyeM7sMP7c"]} -{"Format": "IDEA0", "ID": "1fd587a9-c4be-42ab-b1c5-24d3946c34d4", "DetectTime": "2023-10-30T14:08:08.817647+02:00", "EventTime": "2023-10-30T14:08:08.817668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cmedfk4zp4lToqM9r5"]} -{"Format": "IDEA0", "ID": "a4e07862-378f-40f7-86ad-2bcaf3273dd9", "DetectTime": "2023-10-30T14:08:08.834702+02:00", "EventTime": "2023-10-30T14:08:08.834724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CzRLQ63T2wOuJjs6A2"]} -{"Format": "IDEA0", "ID": "5a9a86cf-a0ce-4e22-a6e9-ab98a1808a89", "DetectTime": "2023-10-30T14:08:08.852543+02:00", "EventTime": "2023-10-30T14:08:08.852555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CHf3a44XXOeCAXWTFk"]} -{"Format": "Json", "ID": "5a9a86cf-a0ce-4e22-a6e9-ab98a1808a89", "DetectTime": "2023-10-30T14:08:08.852543+02:00", "EventTime": "2023-10-30T14:08:08.852555+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T19:50:30.733989+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2023/10/30 14:08:08.914670)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "865987ff-8951-4833-9272-056c87b598e2", "DetectTime": "2023-10-30T14:08:08.920945+02:00", "EventTime": "2023-10-30T14:08:08.920966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CnrIKU7ymnpk0qyFg"]} -{"Format": "IDEA0", "ID": "2ae89032-9556-47cd-90a9-6081ca553f1d", "DetectTime": "2023-10-30T14:08:08.943126+02:00", "EventTime": "2023-10-30T14:08:08.943144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIO21g3bLhICIw5Evf"]} -{"Format": "IDEA0", "ID": "e18a3b32-f20c-49fc-a544-c053dcdb8a9c", "DetectTime": "2023-10-30T14:08:08.958307+02:00", "EventTime": "2023-10-30T14:08:08.958324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CzAcUR2Vkt7AMdt7O1"]} -{"Format": "IDEA0", "ID": "1cfbe606-484a-4933-b442-cee9957f4504", "DetectTime": "2023-10-30T14:08:08.981338+02:00", "EventTime": "2023-10-30T14:08:08.981359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CfcicGgtbGmDmmUve"]} -{"Format": "IDEA0", "ID": "1813f163-f6fa-40cd-ac17-557d5e41e09c", "DetectTime": "2023-10-30T14:08:09.002938+02:00", "EventTime": "2023-10-30T14:08:09.002959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CbcT762LSBUbIyErI2"]} -{"Format": "IDEA0", "ID": "27a1ebe7-3df3-4e53-80a0-3d15fb1aa045", "DetectTime": "2023-10-30T14:08:09.020179+02:00", "EventTime": "2023-10-30T14:08:09.020197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CPTnIm33PPZfmsEdJ"]} -{"Format": "IDEA0", "ID": "d2fb4207-0646-4a4a-a6ea-6447d454fc69", "DetectTime": "2023-10-30T14:08:09.035180+02:00", "EventTime": "2023-10-30T14:08:09.035192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CRfQFyZ93WNIaA4si"]} -{"Format": "IDEA0", "ID": "e90b135a-88e9-4d86-b53c-c3c7d9e1b41d", "DetectTime": "2023-10-30T14:08:09.050272+02:00", "EventTime": "2023-10-30T14:08:09.050289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CqKXs94njAAnTOMZ89"]} -{"Format": "IDEA0", "ID": "aa3cd2f4-4956-44e4-8943-f84bcd842524", "DetectTime": "2023-10-30T14:08:09.069016+02:00", "EventTime": "2023-10-30T14:08:09.069035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CkUoO04JsbSHcIqP46"]} -{"Format": "IDEA0", "ID": "465d9eeb-9dc9-4c3b-8220-1f560e6ff437", "DetectTime": "2023-10-30T14:08:09.089618+02:00", "EventTime": "2023-10-30T14:08:09.089635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["ChzoGw4xdoq08qFxwb"]} -{"Format": "IDEA0", "ID": "171d77b3-c27c-4a2c-853d-55aee71707c8", "DetectTime": "2023-10-30T14:08:09.108214+02:00", "EventTime": "2023-10-30T14:08:09.108230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ckl6tH3UZbmIb6xnSb"]} -{"Format": "IDEA0", "ID": "db41f7d7-42c6-43cc-8708-d2baa90e9b21", "DetectTime": "2023-10-30T14:08:09.129681+02:00", "EventTime": "2023-10-30T14:08:09.129703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CMTkUh3AjTq3B6exQ1"]} -{"Format": "IDEA0", "ID": "2e4e1428-d3cb-46fe-b9f2-59080e35ca38", "DetectTime": "2023-10-30T14:08:09.150361+02:00", "EventTime": "2023-10-30T14:08:09.150377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CzTY3vxNTBYgCMiOc"]} -{"Format": "IDEA0", "ID": "a0c945a2-77bc-4fd8-b4ad-bf18862c07ce", "DetectTime": "2023-10-30T14:08:09.167283+02:00", "EventTime": "2023-10-30T14:08:09.167295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C78ORM1LVxciM4j8k9"]} -{"Format": "IDEA0", "ID": "0b3f16bb-7d22-4a13-82b4-9fdb7757b948", "DetectTime": "2023-10-30T14:08:09.192506+02:00", "EventTime": "2023-10-30T14:08:09.192523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CGUQ354pk37emkk6fb"]} -{"Format": "IDEA0", "ID": "2c277b11-77ba-4e15-ab57-b57ac92cded4", "DetectTime": "2023-10-30T14:08:09.212961+02:00", "EventTime": "2023-10-30T14:08:09.212977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["C5CjTo4BMhMdSfaP9g"]} -{"Format": "IDEA0", "ID": "57e4e227-a9af-41bb-92bc-7f4bb44a9e4d", "DetectTime": "2023-10-30T14:08:09.235244+02:00", "EventTime": "2023-10-30T14:08:09.235260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CjlgNQG8k2rjN5GN6"]} -{"Format": "IDEA0", "ID": "373ad69c-6dbf-4879-9fd4-aff2c9fb8d07", "DetectTime": "2023-10-30T14:08:09.250687+02:00", "EventTime": "2023-10-30T14:08:09.250698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CER5nm2eXh0hpuz4W1"]} -{"Format": "IDEA0", "ID": "0d656a32-1adb-4764-964b-70ddba065b43", "DetectTime": "2023-10-30T14:08:09.268907+02:00", "EventTime": "2023-10-30T14:08:09.268919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CMufs61u3MVZSPDuM1"]} -{"Format": "IDEA0", "ID": "3d41345e-fe7c-4bef-83c3-a2fd9fb76fd6", "DetectTime": "2023-10-30T14:08:09.285960+02:00", "EventTime": "2023-10-30T14:08:09.285978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbPA9j3Q0LjIOMNn56"]} -{"Format": "IDEA0", "ID": "de45d4a1-183d-4381-86e5-e584a9e68200", "DetectTime": "2023-10-30T14:08:09.303574+02:00", "EventTime": "2023-10-30T14:08:09.303591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CYRncomcuKKc7x72a"]} -{"Format": "IDEA0", "ID": "36f44141-6a4f-4443-a21c-7ce0eb247ea2", "DetectTime": "2023-10-30T14:08:09.323680+02:00", "EventTime": "2023-10-30T14:08:09.323700+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Crruex405v8TxtA5Eb"]} -{"Format": "IDEA0", "ID": "f70771de-47d3-42d7-854d-4f802eb4fc98", "DetectTime": "2023-10-30T14:08:09.356153+02:00", "EventTime": "2023-10-30T14:08:09.356177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CeDBNNrWiJ2yIkSXe"]} -{"Format": "IDEA0", "ID": "052f4b79-de31-4117-99b2-45482dc14831", "DetectTime": "2023-10-30T14:08:09.374905+02:00", "EventTime": "2023-10-30T14:08:09.374918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CFRrTr1EH8uf1MkcW9"]} -{"Format": "IDEA0", "ID": "39607361-9a94-4675-bc9b-46c88e422fa7", "DetectTime": "2023-10-30T14:08:09.392620+02:00", "EventTime": "2023-10-30T14:08:09.392638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["ChAIW5j8DM62b8zuj"]} -{"Format": "IDEA0", "ID": "c11c104f-3224-490f-9d84-b80e2b151593", "DetectTime": "2023-10-30T14:08:09.418063+02:00", "EventTime": "2023-10-30T14:08:09.418084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CRR2BTfFf0f4I5OUi"]} -{"Format": "IDEA0", "ID": "23242520-4fa0-4f39-9734-536930032e31", "DetectTime": "2023-10-30T14:08:09.440137+02:00", "EventTime": "2023-10-30T14:08:09.440155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CPZeS74am1pLbFFhR9"]} -{"Format": "IDEA0", "ID": "f36253ea-97fc-4e0f-a596-4f0d790b3aca", "DetectTime": "2023-10-30T14:08:09.459779+02:00", "EventTime": "2023-10-30T14:08:09.459797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cv8TtP3Yj8u5sgW8l1"]} -{"Format": "IDEA0", "ID": "5e6a5652-014a-4781-a7f2-638d0eb198f4", "DetectTime": "2023-10-30T14:08:09.475511+02:00", "EventTime": "2023-10-30T14:08:09.475522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CNkBqo2git3brQgVM9"]} -{"Format": "IDEA0", "ID": "e480b160-d5ee-41bc-b1cd-915a9373f1b9", "DetectTime": "2023-10-30T14:08:09.495821+02:00", "EventTime": "2023-10-30T14:08:09.495842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CVoHK94bgOIEC9h1y6"]} -{"Format": "IDEA0", "ID": "69357ed9-cf7c-4040-a6ba-3879f20f1973", "DetectTime": "2023-10-30T14:08:09.516729+02:00", "EventTime": "2023-10-30T14:08:09.516749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CcbnKM3AkMkJgqwAk4"]} -{"Format": "IDEA0", "ID": "8eae79b4-1473-49ad-aa62-357d3bcd26cc", "DetectTime": "2023-10-30T14:08:09.539163+02:00", "EventTime": "2023-10-30T14:08:09.539181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["COO0EWSpjsAnPkms2"]} -{"Format": "IDEA0", "ID": "613e46bf-d205-4b28-9b70-856e6f743872", "DetectTime": "2023-10-30T14:08:09.558316+02:00", "EventTime": "2023-10-30T14:08:09.558337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CbbK7X1CP7bxj1r7Z8"]} -{"Format": "IDEA0", "ID": "12909cc9-5968-4991-b91d-c1a3718ff520", "DetectTime": "2023-10-30T14:08:09.575287+02:00", "EventTime": "2023-10-30T14:08:09.575299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CgpPlf40jtbu7SNc4c"]} -{"Format": "IDEA0", "ID": "327eff8d-40af-4dc1-8448-819c7fbd6824", "DetectTime": "2023-10-30T14:08:09.589932+02:00", "EventTime": "2023-10-30T14:08:09.589944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CCtVEV2sLWl3md0Uh4"]} -{"Format": "IDEA0", "ID": "9ee4049f-3a60-47fc-938c-50ec95141002", "DetectTime": "2023-10-30T14:08:09.608263+02:00", "EventTime": "2023-10-30T14:08:09.608279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CIz4Y94RcVIJpzGlC"]} -{"Format": "IDEA0", "ID": "71f1b163-21ea-43cb-b0f1-7182952ad622", "DetectTime": "2023-10-30T14:08:09.628825+02:00", "EventTime": "2023-10-30T14:08:09.628841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CENJe13bsrr47Iv292"]} -{"Format": "IDEA0", "ID": "6d40050f-65a0-4c5d-a08c-0110226a41af", "DetectTime": "2023-10-30T14:08:09.644868+02:00", "EventTime": "2023-10-30T14:08:09.644885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CKC5h51VimG8DcTwb"]} -{"Format": "IDEA0", "ID": "c4d9fea5-6019-4ec3-afb2-d3fc2bcf0336", "DetectTime": "2023-10-30T14:08:09.660937+02:00", "EventTime": "2023-10-30T14:08:09.660954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CExXMx1ZWaGSZ8mwok"]} -{"Format": "IDEA0", "ID": "76587694-ea86-4606-8df1-5fbf8b440838", "DetectTime": "2023-10-30T14:08:09.678531+02:00", "EventTime": "2023-10-30T14:08:09.678548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CwTfvs4wqsnCgnqYY2"]} -{"Format": "IDEA0", "ID": "6350d5c1-ac01-4533-9560-beee0b744b20", "DetectTime": "2023-10-30T14:08:09.697675+02:00", "EventTime": "2023-10-30T14:08:09.697699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["ChyaHg5vHX0GVqxU6"]} -{"Format": "IDEA0", "ID": "4adff2e2-a234-4b53-bb5c-7188f981a111", "DetectTime": "2023-10-30T14:08:09.718096+02:00", "EventTime": "2023-10-30T14:08:09.718112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C8vCsF41c3lcLCAgc6"]} -{"Format": "IDEA0", "ID": "affe76d2-c938-46d9-ba11-b295aebdd802", "DetectTime": "2023-10-30T14:08:09.734876+02:00", "EventTime": "2023-10-30T14:08:09.734889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXIpSrKM6fvjKiYek"]} -{"Format": "IDEA0", "ID": "6ef41932-54f3-48ac-9cde-79dc4318e8c9", "DetectTime": "2023-10-30T14:08:09.762379+02:00", "EventTime": "2023-10-30T14:08:09.762403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CIhvOv1W63MPTSJC11"]} -{"Format": "IDEA0", "ID": "2441887e-18be-4bfb-b909-04a055d2d12d", "DetectTime": "2023-10-30T14:08:09.782051+02:00", "EventTime": "2023-10-30T14:08:09.782064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CGvFOx2V4wHEAkuiDc"]} -{"Format": "IDEA0", "ID": "7d8b55e4-c51f-4a2b-9861-983cba40063f", "DetectTime": "2023-10-30T14:08:09.802290+02:00", "EventTime": "2023-10-30T14:08:09.802311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["Cc74Uf12OkuiDiwflk"]} -{"Format": "IDEA0", "ID": "0ffcda00-cadb-49cd-a8d6-7b178bc2fc00", "DetectTime": "2023-10-30T14:08:09.819902+02:00", "EventTime": "2023-10-30T14:08:09.819916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CosZNC29FMzGVnkhPd"]} -{"Format": "IDEA0", "ID": "b2d29c12-252b-457a-88af-b64debc581ba", "DetectTime": "2023-10-30T14:08:09.839283+02:00", "EventTime": "2023-10-30T14:08:09.839303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Ch4M45ysbnoCVEhT8"]} -{"Format": "IDEA0", "ID": "76e9fca0-54e7-4524-8e7c-cdbfa199172f", "DetectTime": "2023-10-30T14:08:09.860044+02:00", "EventTime": "2023-10-30T14:08:09.860060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["C162tr49iAjYOFsM89"]} -{"Format": "IDEA0", "ID": "872a6e29-0131-4ea6-8e5e-6a72502f9fb5", "DetectTime": "2023-10-30T14:08:09.879451+02:00", "EventTime": "2023-10-30T14:08:09.879478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["Cqa8F14z2aiNvTPbM7"]} -{"Format": "IDEA0", "ID": "6d311965-2940-4cd9-ad1b-1be791ab6e92", "DetectTime": "2023-10-30T14:08:09.895999+02:00", "EventTime": "2023-10-30T14:08:09.896016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CLyf1w3XW1q5jLZBQd"]} -{"Format": "IDEA0", "ID": "fef2eacc-0132-42c7-bcf0-5844a7fed5e2", "DetectTime": "2023-10-30T14:08:09.912425+02:00", "EventTime": "2023-10-30T14:08:09.912437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["ClI1xyGLYsfsORXU"]} -{"Format": "IDEA0", "ID": "40983387-e578-476e-be8e-513a4470157f", "DetectTime": "2023-10-30T14:08:09.928449+02:00", "EventTime": "2023-10-30T14:08:09.928468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CeoAuI2xukSnbvFWx1"]} -{"Format": "IDEA0", "ID": "7614124f-aad0-4f3e-810b-d58f503865f5", "DetectTime": "2023-10-30T14:08:09.943857+02:00", "EventTime": "2023-10-30T14:08:09.943871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CJ1YXS3pDkUJL9m6Mi"]} -{"Format": "IDEA0", "ID": "7eef3502-da65-4999-9aa1-50c04194e172", "DetectTime": "2023-10-30T14:08:09.959615+02:00", "EventTime": "2023-10-30T14:08:09.959626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CfX5CU34SDZgbGGwOk"]} -{"Format": "IDEA0", "ID": "9b3859a9-abfa-45c0-8d53-f7dbfc9f3aac", "DetectTime": "2023-10-30T14:08:09.977741+02:00", "EventTime": "2023-10-30T14:08:09.977756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C2vcju1dD126E7Gqie"]} -{"Format": "IDEA0", "ID": "141cd8a6-ec2d-457c-b044-5686df68df61", "DetectTime": "2023-10-30T14:08:09.994285+02:00", "EventTime": "2023-10-30T14:08:09.994303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CRX4Gx21wPJ1ljLmTa"]} -{"Format": "IDEA0", "ID": "0bdccc37-f375-49e9-9a9f-529b191a46f2", "DetectTime": "2023-10-30T14:08:10.013785+02:00", "EventTime": "2023-10-30T14:08:10.013802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CWFhUQfkCUCOeIfV4"]} -{"Format": "IDEA0", "ID": "9da637f6-ddaa-4b17-9a58-eb1d4f585d4a", "DetectTime": "2023-10-30T14:08:10.031128+02:00", "EventTime": "2023-10-30T14:08:10.031150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CPh23J2mRWk5nzgFrc"]} -{"Format": "IDEA0", "ID": "b604e0e3-e5e5-49f1-8885-ac103bd2152a", "DetectTime": "2023-10-30T14:08:10.050550+02:00", "EventTime": "2023-10-30T14:08:10.050564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CqGP3O2UxMOzfJG5e"]} -{"Format": "IDEA0", "ID": "e90959d1-ebfc-4b85-96de-0084ad3b512d", "DetectTime": "2023-10-30T14:08:10.071293+02:00", "EventTime": "2023-10-30T14:08:10.071309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["Cm5N6K1Ipx8iYV2Z5f"]} -{"Format": "IDEA0", "ID": "b071429a-8758-4834-8919-b98c9419bdca", "DetectTime": "2023-10-30T14:08:10.106147+02:00", "EventTime": "2023-10-30T14:08:10.106164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CybwOs2NxAcwpPEpL2"]} -{"Format": "IDEA0", "ID": "9bff8a86-7d66-490c-b795-65be5f52be0a", "DetectTime": "2023-10-30T14:08:10.126655+02:00", "EventTime": "2023-10-30T14:08:10.126676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cvbj8K3Ou4iFGSxsp9"]} -{"Format": "IDEA0", "ID": "5adc3eee-6771-435b-9b3a-f18bbbe00cc3", "DetectTime": "2023-10-30T14:08:10.149598+02:00", "EventTime": "2023-10-30T14:08:10.149610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CO814l31ydrGyLxsV3"]} -{"Format": "IDEA0", "ID": "b97da036-8f76-467e-8bae-63c36971c202", "DetectTime": "2023-10-30T14:08:10.166304+02:00", "EventTime": "2023-10-30T14:08:10.166323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CktdtP3Oj6bHqSmN65"]} -{"Format": "IDEA0", "ID": "8bf6574b-b5fb-4311-883a-45e9315ebd51", "DetectTime": "2023-10-30T14:08:10.183770+02:00", "EventTime": "2023-10-30T14:08:10.183781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CfHEg43DGlwlfzU7dg"]} -{"Format": "IDEA0", "ID": "76ca1228-b750-49d7-8a4d-54b1ae02d326", "DetectTime": "2023-10-30T14:08:10.198157+02:00", "EventTime": "2023-10-30T14:08:10.198168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C7a9UU3fotYK6Odlof"]} -{"Format": "IDEA0", "ID": "30358c6a-6e85-4ef3-8f4d-b51d8557710a", "DetectTime": "2023-10-30T14:08:10.211156+02:00", "EventTime": "2023-10-30T14:08:10.211173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CjOybiVkESt7EZQ91"]} -{"Format": "IDEA0", "ID": "b2c125b0-afac-471f-9490-bf9d89d105fd", "DetectTime": "2023-10-30T14:08:10.225554+02:00", "EventTime": "2023-10-30T14:08:10.225566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CitYvt4YhnATMwQTZf"]} -{"Format": "IDEA0", "ID": "87db000a-7e46-42d7-b25d-d14794caa520", "DetectTime": "2023-10-30T14:08:10.240102+02:00", "EventTime": "2023-10-30T14:08:10.240113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CqEjSI2aPU54mIQc5e"]} -{"Format": "IDEA0", "ID": "6884a1f1-9e76-4750-9d79-87e931ec4d81", "DetectTime": "2023-10-30T14:08:10.255086+02:00", "EventTime": "2023-10-30T14:08:10.255099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["Cg8zDj1pb9Dlcsv891"]} -{"Format": "IDEA0", "ID": "38d187e0-6770-4d6d-9107-87289ed2cebd", "DetectTime": "2023-10-30T14:08:10.270419+02:00", "EventTime": "2023-10-30T14:08:10.270430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C6ajfb4AdGTYpxXnEf"]} -{"Format": "IDEA0", "ID": "7f4ca817-e878-465a-bcdd-406f28e38a1e", "DetectTime": "2023-10-30T14:08:10.285327+02:00", "EventTime": "2023-10-30T14:08:10.285338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["Com6vG1sXGWE6zrZL2"]} -{"Format": "IDEA0", "ID": "56b56395-b63a-4c1d-9b22-f73bbcaccdc0", "DetectTime": "2023-10-30T14:08:10.299650+02:00", "EventTime": "2023-10-30T14:08:10.299662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C1KnmnjcTomxpbNf9"]} -{"Format": "IDEA0", "ID": "6ba9e430-f646-45d6-b3e7-437f3e4b0614", "DetectTime": "2023-10-30T14:08:10.316079+02:00", "EventTime": "2023-10-30T14:08:10.316096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Cnvrep4zfuYvGtbmp9"]} -{"Format": "IDEA0", "ID": "52352a5d-39ca-4a64-abf6-7ccead446f77", "DetectTime": "2023-10-30T14:08:10.333456+02:00", "EventTime": "2023-10-30T14:08:10.333467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CKcMUv2iuxy2e2Z9Qh"]} -{"Format": "IDEA0", "ID": "f7f4f7f0-fb54-4ba5-8d03-d3a62020d71c", "DetectTime": "2023-10-30T14:08:10.355130+02:00", "EventTime": "2023-10-30T14:08:10.355143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C9E0X9483g2uqkMAek"]} -{"Format": "IDEA0", "ID": "04ff588b-48f2-4901-8d55-e142a38795c5", "DetectTime": "2023-10-30T14:08:10.372077+02:00", "EventTime": "2023-10-30T14:08:10.372088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CjAoB73QBvdeFgrYtg"]} -{"Format": "IDEA0", "ID": "8d391368-a9d1-4f52-a49f-c4bb6c2b84b3", "DetectTime": "2023-10-30T14:08:10.387375+02:00", "EventTime": "2023-10-30T14:08:10.387391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["C1ZKZs4e1oKp38cuS9"]} -{"Format": "IDEA0", "ID": "49a4c20c-59fa-41da-873d-8794f0fe0bff", "DetectTime": "2023-10-30T14:08:10.403960+02:00", "EventTime": "2023-10-30T14:08:10.403971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CMSbYF2YHVYfX4crN2"]} -{"Format": "IDEA0", "ID": "fb324fce-1b54-4020-9bf6-5b2f3acd36ef", "DetectTime": "2023-10-30T14:08:10.420015+02:00", "EventTime": "2023-10-30T14:08:10.420026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CfjP8v4hAw7XZSSkD6"]} -{"Format": "IDEA0", "ID": "eb430c10-d23c-4451-b41f-a057c0f55ca8", "DetectTime": "2023-10-30T14:08:10.434276+02:00", "EventTime": "2023-10-30T14:08:10.434290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CN4u9c3ha31YD3ASX3"]} -{"Format": "IDEA0", "ID": "c563222e-32dc-43a4-8d1d-7bc321e7f504", "DetectTime": "2023-10-30T14:08:10.449897+02:00", "EventTime": "2023-10-30T14:08:10.449908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C2HbRF3mWu7AjsutB9"]} -{"Format": "IDEA0", "ID": "d5c7971a-94bc-45bd-85e5-e2ef5aba75d3", "DetectTime": "2023-10-30T14:08:10.466743+02:00", "EventTime": "2023-10-30T14:08:10.466754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CMal0y4xQvLsYkqEY1"]} -{"Format": "IDEA0", "ID": "39396cfe-c9ba-4b15-b392-f57a57b05c58", "DetectTime": "2023-10-30T14:08:10.482687+02:00", "EventTime": "2023-10-30T14:08:10.482705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CAWkJj33pXFRUKtLfg"]} -{"Format": "IDEA0", "ID": "cbe4b6ba-2751-4baa-ac3d-a03ebd2f8c03", "DetectTime": "2023-10-30T14:08:10.495888+02:00", "EventTime": "2023-10-30T14:08:10.495900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CImmN01DrcZpHBtcja"]} -{"Format": "IDEA0", "ID": "a319d2a2-ba83-4c05-8352-de0e1127d016", "DetectTime": "2023-10-30T14:08:10.516813+02:00", "EventTime": "2023-10-30T14:08:10.516833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CBXDGm1Up7GDz7Bqmj"]} -{"Format": "IDEA0", "ID": "7fcb0550-c226-4451-8ee7-b15dc605397e", "DetectTime": "2023-10-30T14:08:10.541158+02:00", "EventTime": "2023-10-30T14:08:10.541170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CtBYID3gge5rCMD0dg"]} -{"Format": "IDEA0", "ID": "9405c59f-690b-41ee-b06d-cb265c0ac4db", "DetectTime": "2023-10-30T14:08:10.560499+02:00", "EventTime": "2023-10-30T14:08:10.560517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CE6b813FSNoOlr6Oma"]} -{"Format": "IDEA0", "ID": "75f1c6de-989f-43d9-9812-85173bc838ef", "DetectTime": "2023-10-30T14:08:10.591586+02:00", "EventTime": "2023-10-30T14:08:10.591605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CCbY581sPFTV1wTQAh"]} -{"Format": "IDEA0", "ID": "321b7b3f-c2c0-4e6b-9606-2533dce89688", "DetectTime": "2023-10-30T14:08:10.612624+02:00", "EventTime": "2023-10-30T14:08:10.612642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CNyNQU31sZSs3TRALl"]} -{"Format": "IDEA0", "ID": "fcd8acbb-d2af-46ca-91ad-7273b2dfeb42", "DetectTime": "2023-10-30T14:08:10.636229+02:00", "EventTime": "2023-10-30T14:08:10.636245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C8vM5U2T9mk3eCs3u3"]} -{"Format": "IDEA0", "ID": "af4c0123-1cc4-48b5-a16f-b5d6e5c6175f", "DetectTime": "2023-10-30T14:08:10.658102+02:00", "EventTime": "2023-10-30T14:08:10.658118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CbKPqJ2akoNmgEevdk"]} -{"Format": "IDEA0", "ID": "adccfdab-a16f-4d8b-9304-36c7b4d8267f", "DetectTime": "2023-10-30T14:08:10.675310+02:00", "EventTime": "2023-10-30T14:08:10.675322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cf3tsWNr6exDfjHI1"]} -{"Format": "IDEA0", "ID": "3cdbb7fa-151a-439e-8dd7-1d62c093fcb8", "DetectTime": "2023-10-30T14:08:10.694886+02:00", "EventTime": "2023-10-30T14:08:10.694898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CNyMUy4ZqYwk9Ag5Ic"]} -{"Format": "IDEA0", "ID": "d7a79ce5-a908-4935-9eaf-fe2d99878750", "DetectTime": "2023-10-30T14:08:10.717521+02:00", "EventTime": "2023-10-30T14:08:10.717534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CoVFSZ9a1yUUQZJ87"]} -{"Format": "IDEA0", "ID": "e764429d-af3b-428a-9d99-aea7e796a99e", "DetectTime": "2023-10-30T14:08:10.737123+02:00", "EventTime": "2023-10-30T14:08:10.737139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CMJUYc1CfTLGaRXrD1"]} -{"Format": "IDEA0", "ID": "7cf0837c-6242-493a-b7a7-c9916449c773", "DetectTime": "2023-10-30T14:08:10.759342+02:00", "EventTime": "2023-10-30T14:08:10.759357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CeNoTt1uTvvIx3CwCd"]} -{"Format": "IDEA0", "ID": "4c64f251-ecc1-47ce-9bbb-8e8f4eea38c1", "DetectTime": "2023-10-30T14:08:10.783737+02:00", "EventTime": "2023-10-30T14:08:10.783756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CMtCcYKMWt2LDVgF7"]} -{"Format": "IDEA0", "ID": "19b580a4-c5e9-44e0-a47a-7cf363b4f363", "DetectTime": "2023-10-30T14:08:10.808565+02:00", "EventTime": "2023-10-30T14:08:10.808583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CgFLDg1xePxijC1C16"]} -{"Format": "IDEA0", "ID": "f80229de-57c2-4fd6-bcb6-c20f83e4a128", "DetectTime": "2023-10-30T14:08:10.833988+02:00", "EventTime": "2023-10-30T14:08:10.834004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CBHytsFeEBBZNjyX4"]} -{"Format": "IDEA0", "ID": "54ade03c-a5da-40e0-88ac-8c0b8e545225", "DetectTime": "2023-10-30T14:08:10.855361+02:00", "EventTime": "2023-10-30T14:08:10.855376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CzQD9445GcJ7TaOzo3"]} -{"Format": "IDEA0", "ID": "9af715b3-f134-4c06-9d27-5401de504b44", "DetectTime": "2023-10-30T14:08:10.874872+02:00", "EventTime": "2023-10-30T14:08:10.874885+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C6NCun1oKuaac1zUMa"]} -{"Format": "IDEA0", "ID": "ce2f57f6-7edd-4314-a195-e41b6e05471f", "DetectTime": "2023-10-30T14:08:10.902602+02:00", "EventTime": "2023-10-30T14:08:10.902617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CQ0VO12CHMsDxyAAVd"]} -{"Format": "IDEA0", "ID": "cacd10e3-0058-46cd-a14c-064199fc91b2", "DetectTime": "2023-10-30T14:08:10.925155+02:00", "EventTime": "2023-10-30T14:08:10.925176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["Cxmb593s7iZbl4Sx1b"]} -{"Format": "IDEA0", "ID": "64628231-37c7-4945-a0f8-8f54f12521b7", "DetectTime": "2023-10-30T14:08:10.948768+02:00", "EventTime": "2023-10-30T14:08:10.948790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CXfogU1oKM3YKZDaNf"]} -{"Format": "Json", "ID": "64628231-37c7-4945-a0f8-8f54f12521b7", "DetectTime": "2023-10-30T14:08:10.948768+02:00", "EventTime": "2023-10-30T14:08:10.948790+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T19:50:33.712577+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2023/10/30 14:08:11.011229)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2c72b9b0-6859-4a36-a10f-2e22ab231cf4", "DetectTime": "2023-10-30T14:08:11.016680+02:00", "EventTime": "2023-10-30T14:08:11.016693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["C4zuke3tVHipSJnSh1"]} -{"Format": "IDEA0", "ID": "c7796500-0bd3-41b5-83ce-59f7b93da294", "DetectTime": "2023-10-30T14:08:11.033262+02:00", "EventTime": "2023-10-30T14:08:11.033278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CfDWFz1RGU3eEtSyn5"]} -{"Format": "IDEA0", "ID": "b7932b2a-49a4-46c8-8316-2dd8f0b31fae", "DetectTime": "2023-10-30T14:08:11.052406+02:00", "EventTime": "2023-10-30T14:08:11.052421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CGFa2y4ogThck9SVQ7"]} -{"Format": "IDEA0", "ID": "b8efb516-8cd9-4ea7-83c8-af59279e42c8", "DetectTime": "2023-10-30T14:08:11.073242+02:00", "EventTime": "2023-10-30T14:08:11.073263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CUsE0R2SaCj3QcMZi"]} -{"Format": "IDEA0", "ID": "1d9f5715-3e43-4bca-a5a1-032e796835fa", "DetectTime": "2023-10-30T14:08:11.092605+02:00", "EventTime": "2023-10-30T14:08:11.092619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CL19Cg1ZmE6N2SWaxc"]} -{"Format": "IDEA0", "ID": "3376a18c-c9ef-4983-ac22-24d1ac054856", "DetectTime": "2023-10-30T14:08:11.109986+02:00", "EventTime": "2023-10-30T14:08:11.109998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CWY1Rm3q6gnrOMOIB8"]} -{"Format": "IDEA0", "ID": "851ca225-ed19-43a7-bb15-1d8372074e32", "DetectTime": "2023-10-30T14:08:11.131543+02:00", "EventTime": "2023-10-30T14:08:11.131562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cu0liC1j2pEtmz2PXb"]} -{"Format": "IDEA0", "ID": "56ebf07d-191a-4297-95fb-73f97309334a", "DetectTime": "2023-10-30T14:08:11.156163+02:00", "EventTime": "2023-10-30T14:08:11.156179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CkbEmWCF4x29X8LV2"]} -{"Format": "IDEA0", "ID": "de490f39-a599-4953-9f6b-a21f164565e5", "DetectTime": "2023-10-30T14:08:11.175398+02:00", "EventTime": "2023-10-30T14:08:11.175411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CdhSlL1HYivf9gpzk3"]} -{"Format": "IDEA0", "ID": "92fab1ee-9fc4-4e4f-9f16-15ebc78f7c3c", "DetectTime": "2023-10-30T14:08:11.189986+02:00", "EventTime": "2023-10-30T14:08:11.189997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CAMnLMNkwzvDSXDzj"]} -{"Format": "IDEA0", "ID": "ffead6ae-c5ee-439a-b693-58905f3fe1fd", "DetectTime": "2023-10-30T14:08:11.210897+02:00", "EventTime": "2023-10-30T14:08:11.210918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CTzPHC4ojqs2AJIFcc"]} -{"Format": "IDEA0", "ID": "6b7eb31e-4dab-4289-8ee9-257c0e42be19", "DetectTime": "2023-10-30T14:08:11.232587+02:00", "EventTime": "2023-10-30T14:08:11.232599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CxkMjB3NNCUVHDpVU3"]} -{"Format": "IDEA0", "ID": "00e6918f-dfef-44dc-a2be-435b8990e77f", "DetectTime": "2023-10-30T14:08:11.250848+02:00", "EventTime": "2023-10-30T14:08:11.250867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CggUyh2tSZkxNO1tU8"]} -{"Format": "IDEA0", "ID": "3ef9a558-2149-4a81-a15c-9870500e465e", "DetectTime": "2023-10-30T14:08:11.274406+02:00", "EventTime": "2023-10-30T14:08:11.274422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CJmyBW2nVXfzF3g1Yd"]} -{"Format": "IDEA0", "ID": "66da415a-70e9-413e-9cd3-b17668254b3e", "DetectTime": "2023-10-30T14:08:11.294986+02:00", "EventTime": "2023-10-30T14:08:11.295000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["C2dHKa2Q2IJNIhQ73f"]} -{"Format": "IDEA0", "ID": "649ba8fd-6093-4f51-939a-980fe0ef4784", "DetectTime": "2023-10-30T14:08:11.314160+02:00", "EventTime": "2023-10-30T14:08:11.314171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cx6NVT2uEZoTEgGiGf"]} -{"Format": "IDEA0", "ID": "efcf60d4-333f-4d91-bb6b-91392c4a3212", "DetectTime": "2023-10-30T14:08:11.333360+02:00", "EventTime": "2023-10-30T14:08:11.333378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C6Cv0Q2gxbTkjhZCWa"]} -{"Format": "IDEA0", "ID": "4469f8c6-ec8e-4464-9bc6-e05f3c69a81e", "DetectTime": "2023-10-30T14:08:11.351996+02:00", "EventTime": "2023-10-30T14:08:11.352012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CtEiww1XXQF6N9WaV4"]} -{"Format": "IDEA0", "ID": "c41a0b31-e5f5-426a-9db4-c776b990955d", "DetectTime": "2023-10-30T14:08:11.373583+02:00", "EventTime": "2023-10-30T14:08:11.373599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CBA5wj2PDUk01mecXa"]} -{"Format": "IDEA0", "ID": "3722db2b-9db6-4d48-9e97-2183a674abab", "DetectTime": "2023-10-30T14:08:11.396538+02:00", "EventTime": "2023-10-30T14:08:11.396564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.207.22.66 ", "ContentType": "text/plain"}], "uids": ["CJzz0g1G26LFpfDkSk"]} -{"Format": "IDEA0", "ID": "1bc3b7fd-03df-4727-b39a-719e2dd86efc", "DetectTime": "2023-10-30T14:08:11.420226+02:00", "EventTime": "2023-10-30T14:08:11.420247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Ce1AdX22bSCHXCDgc"]} -{"Format": "IDEA0", "ID": "bcd95002-7149-4883-9d19-b2a5d5597423", "DetectTime": "2023-10-30T14:08:11.445086+02:00", "EventTime": "2023-10-30T14:08:11.445098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CJTl843y1B8cZ4VVq2"]} -{"Format": "IDEA0", "ID": "b236db67-aa4f-4f41-877a-1ac309124eb7", "DetectTime": "2023-10-30T14:08:11.461648+02:00", "EventTime": "2023-10-30T14:08:11.461667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CrfufZ1rtTDGgBu66"]} -{"Format": "IDEA0", "ID": "76e6c0f0-a9d7-49b6-a076-3e870c5bca9c", "DetectTime": "2023-10-30T14:08:11.485185+02:00", "EventTime": "2023-10-30T14:08:11.485206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cw9aP63w5VhjAYpMSg"]} -{"Format": "IDEA0", "ID": "f831d07d-4ec8-4507-a22b-1eeb7f9a0c93", "DetectTime": "2023-10-30T14:08:11.506233+02:00", "EventTime": "2023-10-30T14:08:11.506245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CZ3zlO1jC2XXgqgw5h"]} -{"Format": "IDEA0", "ID": "6583d96b-ec71-481a-9d3d-d855cf7e2133", "DetectTime": "2023-10-30T14:08:11.523053+02:00", "EventTime": "2023-10-30T14:08:11.523064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cece8d4TX862JDpFD7"]} -{"Format": "IDEA0", "ID": "54e8c80d-56b3-403a-9442-f609b210a0b5", "DetectTime": "2023-10-30T14:08:11.541234+02:00", "EventTime": "2023-10-30T14:08:11.541251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPW43UeS7x9Fn7e45"]} -{"Format": "IDEA0", "ID": "2aab3b27-97da-4363-8d02-f5d07dd4d222", "DetectTime": "2023-10-30T14:08:11.565704+02:00", "EventTime": "2023-10-30T14:08:11.565725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cf0scY1eTPvbyImZii"]} -{"Format": "IDEA0", "ID": "708a96ef-499e-4e54-9e0f-5b9fa92a3509", "DetectTime": "2023-10-30T14:08:11.590641+02:00", "EventTime": "2023-10-30T14:08:11.590658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CZFpY3CpYU6UpU39d"]} -{"Format": "IDEA0", "ID": "89cffd52-770d-4dbe-9e15-cb8c53ce94ce", "DetectTime": "2023-10-30T14:08:11.614090+02:00", "EventTime": "2023-10-30T14:08:11.614101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C6xER5NydO5em6yV2"]} -{"Format": "IDEA0", "ID": "c8c7d831-c1c8-4db9-9f29-4d7f5c79a0c7", "DetectTime": "2023-10-30T14:08:11.634426+02:00", "EventTime": "2023-10-30T14:08:11.634443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C0dFfF328CUvAw1kGb"]} -{"Format": "IDEA0", "ID": "97854561-4e21-4f04-bb19-31b9b256c947", "DetectTime": "2023-10-30T14:08:11.650561+02:00", "EventTime": "2023-10-30T14:08:11.650572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CPIu9k3fieUAxoujj9"]} -{"Format": "IDEA0", "ID": "d5fcb406-90bd-48cc-b4b9-d81cce735924", "DetectTime": "2023-10-30T14:08:11.667288+02:00", "EventTime": "2023-10-30T14:08:11.667300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CdhkGGmASlUyjCQIc"]} -{"Format": "IDEA0", "ID": "fb5f8118-8688-4e3c-8130-d51e405c2707", "DetectTime": "2023-10-30T14:08:11.682773+02:00", "EventTime": "2023-10-30T14:08:11.682802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CdvCoo1zXmgbgLZ1c6"]} -{"Format": "IDEA0", "ID": "54e78fa5-f50e-4425-a2d9-b2fc34643b0c", "DetectTime": "2023-10-30T14:08:11.705799+02:00", "EventTime": "2023-10-30T14:08:11.705820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Clrloi2gAqmd9uEnZi"]} -{"Format": "IDEA0", "ID": "313a4ed5-97a4-4ca5-973e-f6f5fa2a5173", "DetectTime": "2023-10-30T14:08:11.727251+02:00", "EventTime": "2023-10-30T14:08:11.727270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CgON9l3IBJKbvaET49"]} -{"Format": "IDEA0", "ID": "3bc16afe-d21a-47df-8c83-e3c4b4962b15", "DetectTime": "2023-10-30T14:08:11.747679+02:00", "EventTime": "2023-10-30T14:08:11.747696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CViPi41m3m7b8Z8dg"]} -{"Format": "IDEA0", "ID": "97b1d90e-57e2-4fd7-9beb-8a05096b7f4a", "DetectTime": "2023-10-30T14:08:11.769919+02:00", "EventTime": "2023-10-30T14:08:11.769932+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Hostname": ["host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 95.104.77.164 from 10.0.2.19. blacklisted IP AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CA8zs3ICcdh9r5s0b"]} -{"Format": "IDEA0", "ID": "36987ae2-1f7c-4900-8b0b-19ab356484d8", "DetectTime": "2023-10-30T14:08:11.794755+02:00", "EventTime": "2023-10-30T14:08:11.794767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CN6u8p1FUhfqKjIgNf"]} -{"Format": "IDEA0", "ID": "1a4c1593-28d9-4469-87a3-3f898f7dbe41", "DetectTime": "2023-10-30T14:08:11.816207+02:00", "EventTime": "2023-10-30T14:08:11.816225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CFxHsn1jPmACpSRSqi"]} -{"Format": "IDEA0", "ID": "5727a681-3cdb-410d-b6e4-949cd6857141", "DetectTime": "2023-10-30T14:08:11.834930+02:00", "EventTime": "2023-10-30T14:08:11.834943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C18xtQGVzaAK28dTk"]} -{"Format": "IDEA0", "ID": "6c732e31-0d3c-400b-be60-680c99141d43", "DetectTime": "2023-10-30T14:08:11.853032+02:00", "EventTime": "2023-10-30T14:08:11.853043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CtMznQyzMABjN87j8"]} -{"Format": "IDEA0", "ID": "dc6ad3d0-98c6-44db-9c13-5dbd33b82fdb", "DetectTime": "2023-10-30T14:08:11.868829+02:00", "EventTime": "2023-10-30T14:08:11.868842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CeHJgR2kIw12SN3ekb"]} -{"Format": "IDEA0", "ID": "959af202-8787-4acc-a77d-339df102dd02", "DetectTime": "2023-10-30T14:08:11.887270+02:00", "EventTime": "2023-10-30T14:08:11.887285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CYhSJu3ReIwNxTIy39"]} -{"Format": "IDEA0", "ID": "899ea623-2866-4789-ae67-4534f0f07344", "DetectTime": "2023-10-30T14:08:11.907049+02:00", "EventTime": "2023-10-30T14:08:11.907061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["C9h7hW9GIohV4ZHLh"]} -{"Format": "IDEA0", "ID": "757c4f7d-bd6d-414e-a18d-6107196e79ce", "DetectTime": "2023-10-30T14:08:11.925508+02:00", "EventTime": "2023-10-30T14:08:11.925524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CBrezo3XcJlGD6U8Bg"]} -{"Format": "IDEA0", "ID": "63491ee7-8305-4237-a658-ecb56d5c15f3", "DetectTime": "2023-10-30T14:08:11.949207+02:00", "EventTime": "2023-10-30T14:08:11.949223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CgKNL90oNTU9saL5a"]} -{"Format": "IDEA0", "ID": "e40b9ecd-0f30-444b-babe-4ea41ee7394b", "DetectTime": "2023-10-30T14:08:11.970089+02:00", "EventTime": "2023-10-30T14:08:11.970101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CKwqg81TOXMHYOOQM5"]} -{"Format": "IDEA0", "ID": "76c764df-9aa2-4cc0-b8b0-a952a4725639", "DetectTime": "2023-10-30T14:08:11.992445+02:00", "EventTime": "2023-10-30T14:08:11.992455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Co2VYNYYdHdnkJwZ2"]} -{"Format": "IDEA0", "ID": "84077773-0982-44bd-b82e-1f3ec158901a", "DetectTime": "2023-10-30T14:08:12.009759+02:00", "EventTime": "2023-10-30T14:08:12.009770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["ChDIu31ftBiniyhtk"]} -{"Format": "IDEA0", "ID": "a0247aba-8a83-49fc-bab4-7f1a534f5067", "DetectTime": "2023-10-30T14:08:12.026806+02:00", "EventTime": "2023-10-30T14:08:12.026823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["C61bI04R9OrdNUNjge"]} -{"Format": "IDEA0", "ID": "d6abd10e-493e-48b6-a5f8-1251432ec9bc", "DetectTime": "2023-10-30T14:08:12.048478+02:00", "EventTime": "2023-10-30T14:08:12.048494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CzyGQk2A967ICxfJu8"]} -{"Format": "IDEA0", "ID": "a0122308-1bc5-46b5-9c69-5df3416e9339", "DetectTime": "2023-10-30T14:08:12.068320+02:00", "EventTime": "2023-10-30T14:08:12.068336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CbkwJN2T1C7W0oGd1f"]} -{"Format": "IDEA0", "ID": "90b6094a-e85e-4ca5-bba7-867b009c956f", "DetectTime": "2023-10-30T14:08:12.089346+02:00", "EventTime": "2023-10-30T14:08:12.089366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.175.199.126 ", "ContentType": "text/plain"}], "uids": ["CnFt1w4nGUHwN5CoE2"]} -{"Format": "IDEA0", "ID": "85848553-8288-4a13-95f9-3836f92de0cf", "DetectTime": "2023-10-30T14:08:12.105995+02:00", "EventTime": "2023-10-30T14:08:12.106006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["C8bNTK1iHhMsuDD9F2"]} -{"Format": "IDEA0", "ID": "a093fabf-0a1c-4707-af14-789b342acb24", "DetectTime": "2023-10-30T14:08:12.118513+02:00", "EventTime": "2023-10-30T14:08:12.118524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CkMg9F1UufXb9tpqbf"]} -{"Format": "IDEA0", "ID": "f9c7485e-680a-46e4-99fe-27bdaeb38112", "DetectTime": "2023-10-30T14:08:12.135530+02:00", "EventTime": "2023-10-30T14:08:12.135551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CPx3ia349ZvkfGGhh1"]} -{"Format": "IDEA0", "ID": "4e3a7c97-40b3-4f57-ba47-b007c21e22a7", "DetectTime": "2023-10-30T14:08:12.162583+02:00", "EventTime": "2023-10-30T14:08:12.162609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CW62Zu2sJx0Q1Ue08i"]} -{"Format": "IDEA0", "ID": "ba85eaff-c740-4b49-a954-b6c2be76eaae", "DetectTime": "2023-10-30T14:08:12.178371+02:00", "EventTime": "2023-10-30T14:08:12.178387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CZHdim3GLHJZJfJCYh"]} -{"Format": "IDEA0", "ID": "1df6ada0-9f30-4ac9-b2b0-b79c4b5078f1", "DetectTime": "2023-10-30T14:08:12.195095+02:00", "EventTime": "2023-10-30T14:08:12.195106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C9Oolf32OxfuZsU8zi"]} -{"Format": "IDEA0", "ID": "3ada7e27-c721-4dbd-9896-4a0dfa5450e5", "DetectTime": "2023-10-30T14:08:12.209226+02:00", "EventTime": "2023-10-30T14:08:12.209238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CgyTlP11rlolqesnjk"]} -{"Format": "IDEA0", "ID": "16bfaa49-809f-4e33-8f0b-9ee44c17b5dd", "DetectTime": "2023-10-30T14:08:12.227504+02:00", "EventTime": "2023-10-30T14:08:12.227521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CMTvF54tr2XV4qS3ja"]} -{"Format": "IDEA0", "ID": "fb24ed53-99b1-41e5-b983-6ca39e616b2d", "DetectTime": "2023-10-30T14:08:12.241845+02:00", "EventTime": "2023-10-30T14:08:12.241857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["COvRbq23LAnptoYHJ7"]} -{"Format": "IDEA0", "ID": "c23abe9f-6446-4581-b6e2-ac3f9af2bb67", "DetectTime": "2023-10-30T14:08:12.253583+02:00", "EventTime": "2023-10-30T14:08:12.253594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CBQ0Db1CinvlDdSzck"]} -{"Format": "IDEA0", "ID": "af2941fb-518a-4fa6-b805-bda62c3a285a", "DetectTime": "2023-10-30T14:08:12.265188+02:00", "EventTime": "2023-10-30T14:08:12.265199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CrjujvNTaim0L7M8c"]} -{"Format": "IDEA0", "ID": "a71fe213-bca9-46c8-8e76-709a94db0db7", "DetectTime": "2023-10-30T14:08:12.276666+02:00", "EventTime": "2023-10-30T14:08:12.276676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CfzShu43odAdAVg1R4"]} -{"Format": "IDEA0", "ID": "74d4fbb8-b57e-4573-9fe0-428f50669444", "DetectTime": "2023-10-30T14:08:12.292787+02:00", "EventTime": "2023-10-30T14:08:12.292803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CNeWZu1u8TjWk1zKIl"]} -{"Format": "IDEA0", "ID": "63eb3f07-511c-4705-979d-7e34eab0bd48", "DetectTime": "2023-10-30T14:08:12.309868+02:00", "EventTime": "2023-10-30T14:08:12.309884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C6Twty1e9OkuD8YThl"]} -{"Format": "IDEA0", "ID": "fe5ddcfb-fa74-4708-aa48-bd91e900cdaa", "DetectTime": "2023-10-30T14:08:12.327525+02:00", "EventTime": "2023-10-30T14:08:12.327541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CoUKV3hxAbuQ3RQf7"]} -{"Format": "IDEA0", "ID": "60eac8a7-3f72-4a24-b121-426a1f8fded8", "DetectTime": "2023-10-30T14:08:12.344445+02:00", "EventTime": "2023-10-30T14:08:12.344461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CoRCsavj2SU7u7d2i"]} -{"Format": "IDEA0", "ID": "ea151505-cbbc-42c4-9625-1aa4249e7013", "DetectTime": "2023-10-30T14:08:12.361775+02:00", "EventTime": "2023-10-30T14:08:12.361791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CH60774nEB1dy4gOhe"]} -{"Format": "IDEA0", "ID": "b756782b-aefb-42f0-ad86-95d9af69de7d", "DetectTime": "2023-10-30T14:08:12.379179+02:00", "EventTime": "2023-10-30T14:08:12.379194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CYAK8m1HTse7oHPQJh"]} -{"Format": "IDEA0", "ID": "21250c0f-1e16-4704-81fe-09b31ec0240b", "DetectTime": "2023-10-30T14:08:12.396245+02:00", "EventTime": "2023-10-30T14:08:12.396260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["ChrCCB432HrRrafXpd"]} -{"Format": "IDEA0", "ID": "b9233058-b538-4bb5-b921-08323ad8125f", "DetectTime": "2023-10-30T14:08:12.413466+02:00", "EventTime": "2023-10-30T14:08:12.413482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CDv3g73iMddkAcnsTb"]} -{"Format": "IDEA0", "ID": "22a8358c-ce3f-497f-bb09-77eb28dc55f6", "DetectTime": "2023-10-30T14:08:12.429886+02:00", "EventTime": "2023-10-30T14:08:12.429904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CghiQm4aDIZGvfEQ2"]} -{"Format": "IDEA0", "ID": "a0ad7622-d258-4cf0-a0f7-56a0001e3c65", "DetectTime": "2023-10-30T14:08:12.447206+02:00", "EventTime": "2023-10-30T14:08:12.447229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CHzaUQ1JYYnz1UZ541"]} -{"Format": "IDEA0", "ID": "41939ab6-69c6-462e-9d8e-1bf0f071ade3", "DetectTime": "2023-10-30T14:08:12.463531+02:00", "EventTime": "2023-10-30T14:08:12.463547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CHNgDF2koPnPqOGhol"]} -{"Format": "IDEA0", "ID": "03e5251c-72fc-499a-8aca-7481530b3e8e", "DetectTime": "2023-10-30T14:08:12.479038+02:00", "EventTime": "2023-10-30T14:08:12.479056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["C0j4pv4shT7mSgioH4"]} -{"Format": "IDEA0", "ID": "dd18b376-7661-4df6-9229-6287f3a2fd2c", "DetectTime": "2023-10-30T14:08:12.492458+02:00", "EventTime": "2023-10-30T14:08:12.492471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C8Is9G23bKFRxsJff6"]} -{"Format": "IDEA0", "ID": "a1fa9c49-2890-4e55-a7dd-5b687f4abc1d", "DetectTime": "2023-10-30T14:08:12.509212+02:00", "EventTime": "2023-10-30T14:08:12.509231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CJFPmf4foNlTbJouQ7"]} -{"Format": "IDEA0", "ID": "20571d1d-2617-4c42-926a-fa8605c03070", "DetectTime": "2023-10-30T14:08:12.524174+02:00", "EventTime": "2023-10-30T14:08:12.524185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C8j7043mbXJ0KcRwfg"]} -{"Format": "IDEA0", "ID": "9ad3b55c-561a-440e-8bde-69defbe4fa9f", "DetectTime": "2023-10-30T14:08:12.538101+02:00", "EventTime": "2023-10-30T14:08:12.538125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CwrrmU2JCcCuILlQHj"]} -{"Format": "IDEA0", "ID": "1690cc6a-7eb3-48f0-9ad6-f9b2ff6c154e", "DetectTime": "2023-10-30T14:08:12.553550+02:00", "EventTime": "2023-10-30T14:08:12.553566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CNHIsv1LivaMs2SEXc"]} -{"Format": "IDEA0", "ID": "1142e026-c0ad-456e-97f9-607569f8a939", "DetectTime": "2023-10-30T14:08:12.567583+02:00", "EventTime": "2023-10-30T14:08:12.567602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CgQj0F1hU8UcZS4VHj"]} -{"Format": "IDEA0", "ID": "6c4c1aa1-f2eb-45b8-8648-e3abc1b60731", "DetectTime": "2023-10-30T14:08:12.609529+02:00", "EventTime": "2023-10-30T14:08:12.609549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CLAnJb2UxoA3fMtNVc"]} -{"Format": "IDEA0", "ID": "1b4bdcc5-7ca4-4b01-a345-d0c3fbe00d28", "DetectTime": "2023-10-30T14:08:12.628032+02:00", "EventTime": "2023-10-30T14:08:12.628054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["C83aIQ2Ub7hDzyQ3Pl"]} -{"Format": "IDEA0", "ID": "fd2e486e-739c-4e40-8789-ff3b2969c7c1", "DetectTime": "2023-10-30T14:08:12.646659+02:00", "EventTime": "2023-10-30T14:08:12.646679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CxSmWM2aaFKNMINUh7"]} -{"Format": "IDEA0", "ID": "9f0afbf3-172f-4007-b103-092ae40255be", "DetectTime": "2023-10-30T14:08:12.662709+02:00", "EventTime": "2023-10-30T14:08:12.662727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CadzNJ3wQBxHHvYeg9"]} -{"Format": "IDEA0", "ID": "1697fefc-84ea-4bce-9cc0-2cc5b691e562", "DetectTime": "2023-10-30T14:08:12.677904+02:00", "EventTime": "2023-10-30T14:08:12.677921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CyAEbD2GWxN8W3eatf"]} -{"Format": "IDEA0", "ID": "a577210b-8205-4233-b1c9-1d99b0e688de", "DetectTime": "2023-10-30T14:08:12.696528+02:00", "EventTime": "2023-10-30T14:08:12.696549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cd31UdmS7cwK2g58"]} -{"Format": "IDEA0", "ID": "501a89fc-106f-49c9-b02f-56ed35703b29", "DetectTime": "2023-10-30T14:08:12.713920+02:00", "EventTime": "2023-10-30T14:08:12.713936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C7wbrg2HyJqCcmd8zg"]} -{"Format": "IDEA0", "ID": "1600f0e9-71f4-41a3-97b3-3872de0a3e73", "DetectTime": "2023-10-30T14:08:12.730958+02:00", "EventTime": "2023-10-30T14:08:12.730970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C7GRQp3S4NOuM99S63"]} -{"Format": "IDEA0", "ID": "97874a75-0ab2-407b-80e9-9bbe352b455d", "DetectTime": "2023-10-30T14:08:12.745641+02:00", "EventTime": "2023-10-30T14:08:12.745654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CzJRw13iz1y5CCUvvi"]} -{"Format": "IDEA0", "ID": "91f20ea3-d400-4295-b4cf-f87327339e0c", "DetectTime": "2023-10-30T14:08:12.758970+02:00", "EventTime": "2023-10-30T14:08:12.758983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CMtgzL2u3CDAoW1JSd"]} -{"Format": "IDEA0", "ID": "c92a7252-7a3e-4460-a01b-1c6527b58978", "DetectTime": "2023-10-30T14:08:12.774681+02:00", "EventTime": "2023-10-30T14:08:12.774696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cg2jVlOPnRYknX0V"]} -{"Format": "IDEA0", "ID": "cd949502-e190-4e3e-81bc-7cf0006a1074", "DetectTime": "2023-10-30T14:08:12.789879+02:00", "EventTime": "2023-10-30T14:08:12.789890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CE4OyMpT74KrsRFXa"]} -{"Format": "IDEA0", "ID": "9e9fe68b-e276-4e3c-aa04-4d1f6ec8c1c7", "DetectTime": "2023-10-30T14:08:12.803860+02:00", "EventTime": "2023-10-30T14:08:12.803872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C78ULP34hbzkU6c4Xg"]} -{"Format": "IDEA0", "ID": "d587a87d-a834-48df-9c54-13683d54120f", "DetectTime": "2023-10-30T14:08:12.816730+02:00", "EventTime": "2023-10-30T14:08:12.816741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CPzAeCSdYLqcaEhu9"]} -{"Format": "IDEA0", "ID": "8a57fa3d-2456-460a-8b99-1ece2643a46d", "DetectTime": "2023-10-30T14:08:12.829817+02:00", "EventTime": "2023-10-30T14:08:12.829829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CtJuXm1BivboJ2Erka"]} -{"Format": "IDEA0", "ID": "c51c88cd-2b77-4cf9-bbb9-8a22293d5dc7", "DetectTime": "2023-10-30T14:08:12.842997+02:00", "EventTime": "2023-10-30T14:08:12.843009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["Cxd6Cx1EIrHOO17qu"]} -{"Format": "IDEA0", "ID": "d518cb20-8857-4951-8d4b-c4aff0f57dee", "DetectTime": "2023-10-30T14:08:12.858056+02:00", "EventTime": "2023-10-30T14:08:12.858066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C5QMjv2xvxdcd8i58h"]} -{"Format": "IDEA0", "ID": "61e0e894-f8dd-4658-8d5a-004154a3edb4", "DetectTime": "2023-10-30T14:08:12.874163+02:00", "EventTime": "2023-10-30T14:08:12.874181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CGexI21gbZ4h7gGrf2"]} -{"Format": "IDEA0", "ID": "53550fa2-e7dc-483f-9831-19ffa7e6f82d", "DetectTime": "2023-10-30T14:08:12.891702+02:00", "EventTime": "2023-10-30T14:08:12.891720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CKSIO348I1fStAgCei"]} -{"Format": "IDEA0", "ID": "4d1aa926-0f30-4d6d-a97c-49f255cf3356", "DetectTime": "2023-10-30T14:08:12.909101+02:00", "EventTime": "2023-10-30T14:08:12.909117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CC6lSD4D1oN1dBv3Li"]} -{"Format": "IDEA0", "ID": "60b513b5-0c48-40df-9676-c6c435e56648", "DetectTime": "2023-10-30T14:08:12.923436+02:00", "EventTime": "2023-10-30T14:08:12.923451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CQ7sJUk1NXHiuLgH5"]} -{"Format": "IDEA0", "ID": "211d5e00-8d2e-44b5-b965-b0ca0775548f", "DetectTime": "2023-10-30T14:08:12.939922+02:00", "EventTime": "2023-10-30T14:08:12.939938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CQaY6o1pe3eAQ3jtj2"]} -{"Format": "IDEA0", "ID": "538175fc-4c73-4319-88b2-8a7da39b3963", "DetectTime": "2023-10-30T14:08:12.954916+02:00", "EventTime": "2023-10-30T14:08:12.954929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CTJChb4P63R0r1ZmTc"]} -{"Format": "IDEA0", "ID": "49be0134-eb99-45a0-9465-fb8b22d0d557", "DetectTime": "2023-10-30T14:08:12.969549+02:00", "EventTime": "2023-10-30T14:08:12.969561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CsPY4E0CdZJSOFE7j"]} -{"Format": "IDEA0", "ID": "6f9bbf25-9171-4219-8413-a3049d905162", "DetectTime": "2023-10-30T14:08:12.985678+02:00", "EventTime": "2023-10-30T14:08:12.985694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CfKVM61VrPiQ3vZ3Hb"]} -{"Format": "IDEA0", "ID": "e1e2f08e-23a6-4e90-8032-4a7587f6ede3", "DetectTime": "2023-10-30T14:08:13.002117+02:00", "EventTime": "2023-10-30T14:08:13.002134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CwahVT3cwW5V1jILt7"]} -{"Format": "IDEA0", "ID": "2d56b8b6-c44f-4556-8be1-fc845e8b7dac", "DetectTime": "2023-10-30T14:08:13.019751+02:00", "EventTime": "2023-10-30T14:08:13.019771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cvx5a54DAETmWgDHl4"]} -{"Format": "IDEA0", "ID": "afe1dab9-404b-4fe9-8614-b9cec52bb3fd", "DetectTime": "2023-10-30T14:08:13.038334+02:00", "EventTime": "2023-10-30T14:08:13.038351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C5AEos3pFBYhIAtpv8"]} -{"Format": "IDEA0", "ID": "743ea1c3-dc21-4110-bdbc-9d73af467ad8", "DetectTime": "2023-10-30T14:08:13.053903+02:00", "EventTime": "2023-10-30T14:08:13.053919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CRc3De2ykJpzd1TiCi"]} -{"Format": "IDEA0", "ID": "5c6cec84-32eb-43e9-b225-b10e78879615", "DetectTime": "2023-10-30T14:08:13.068320+02:00", "EventTime": "2023-10-30T14:08:13.068337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C4vFvv3X8oHIFCDnQk"]} -{"Format": "IDEA0", "ID": "3973707a-e909-4360-98fb-bc270c9ffd38", "DetectTime": "2023-10-30T14:08:13.087864+02:00", "EventTime": "2023-10-30T14:08:13.087885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CVrUiq6JnLz1ysg01"]} -{"Format": "IDEA0", "ID": "f27aaf84-2f44-4cc2-8964-68bce981f352", "DetectTime": "2023-10-30T14:08:13.131923+02:00", "EventTime": "2023-10-30T14:08:13.131939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CkOkFo4TwSlGTVhpYh"]} -{"Format": "IDEA0", "ID": "1584ca48-cd68-483c-b6d8-fe056f6a44de", "DetectTime": "2023-10-30T14:08:13.150733+02:00", "EventTime": "2023-10-30T14:08:13.150751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CsfCNE7V7h29Shc05"]} -{"Format": "IDEA0", "ID": "9fe6cde6-85fa-422c-834d-e41a3dff4edf", "DetectTime": "2023-10-30T14:08:13.167305+02:00", "EventTime": "2023-10-30T14:08:13.167327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJEmnz3uix5OBEABt9"]} -{"Format": "IDEA0", "ID": "7b5123a5-8d10-4af7-81f2-3e197dee491d", "DetectTime": "2023-10-30T14:08:13.188636+02:00", "EventTime": "2023-10-30T14:08:13.188655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cwu9pV2sfPev1AR9Qc"]} -{"Format": "IDEA0", "ID": "2cdf4a41-bd4f-4cbd-83a6-23f82dab35b1", "DetectTime": "2023-10-30T14:08:13.207718+02:00", "EventTime": "2023-10-30T14:08:13.207733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CB45z8DLf4DG1HPj"]} -{"Format": "IDEA0", "ID": "900df379-e029-4746-a010-f99729732a66", "DetectTime": "2023-10-30T14:08:13.225575+02:00", "EventTime": "2023-10-30T14:08:13.225586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C04X8CU3tOir8WZi7"]} -{"Format": "IDEA0", "ID": "af4e2b98-e27a-4608-b7ed-5fdcdeb5e8ab", "DetectTime": "2023-10-30T14:08:13.245310+02:00", "EventTime": "2023-10-30T14:08:13.245326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CKN5B83tbqkclAIugk"]} -{"Format": "IDEA0", "ID": "f0da8fa1-0c0a-4c06-bf6a-20eb6745e9c0", "DetectTime": "2023-10-30T14:08:13.261880+02:00", "EventTime": "2023-10-30T14:08:13.261891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CTxqhuFZzanaHLAEg"]} -{"Format": "IDEA0", "ID": "899ba7e8-0843-41c8-b081-554a89239e4e", "DetectTime": "2023-10-30T14:08:13.278603+02:00", "EventTime": "2023-10-30T14:08:13.278615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CyMAN83mK3P7tSQll2"]} -{"Format": "IDEA0", "ID": "3531d21d-357e-4a30-bdc7-0770043793e7", "DetectTime": "2023-10-30T14:08:13.298044+02:00", "EventTime": "2023-10-30T14:08:13.298057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cr6qwd2y67M4sulf4g"]} -{"Format": "IDEA0", "ID": "47183c2b-72f6-44c3-b67a-55520d054103", "DetectTime": "2023-10-30T14:08:13.339632+02:00", "EventTime": "2023-10-30T14:08:13.339643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Coo5Vm4ZYbO8lGtU2j"]} -{"Format": "IDEA0", "ID": "f1ba6a9f-4f84-420f-805d-6c371b9adc96", "DetectTime": "2023-10-30T14:08:13.354843+02:00", "EventTime": "2023-10-30T14:08:13.354855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cyvbbr2EXGlLB3MF4g"]} -{"Format": "IDEA0", "ID": "1ebee48a-272c-4c73-a3ab-88481b7af0b6", "DetectTime": "2023-10-30T14:08:13.371594+02:00", "EventTime": "2023-10-30T14:08:13.371613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cdlr5u32yXjWG54k7c"]} -{"Format": "IDEA0", "ID": "f16923a0-8d57-42a6-90de-bc4aef29bc94", "DetectTime": "2023-10-30T14:08:13.391680+02:00", "EventTime": "2023-10-30T14:08:13.391691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CCV6h3M0td5nc8zYl"]} -{"Format": "IDEA0", "ID": "2490c696-5dfe-438b-b2e0-6c22576c1d94", "DetectTime": "2023-10-30T14:08:13.410550+02:00", "EventTime": "2023-10-30T14:08:13.410570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CWcJAo4iNCYzL8Q6Jl"]} -{"Format": "IDEA0", "ID": "10f3cb58-6d69-49df-871b-e221f6c732b3", "DetectTime": "2023-10-30T14:08:13.424917+02:00", "EventTime": "2023-10-30T14:08:13.424928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CtQlq33QOIcirmCEAd"]} -{"Format": "IDEA0", "ID": "3eb85943-8471-4c83-a113-41e77dbac279", "DetectTime": "2023-10-30T14:08:13.438220+02:00", "EventTime": "2023-10-30T14:08:13.438232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CGLwFF3XoV23VenOT2"]} -{"Format": "IDEA0", "ID": "ac2cfd29-a7ec-4948-9656-f81a7808b5be", "DetectTime": "2023-10-30T14:08:13.456109+02:00", "EventTime": "2023-10-30T14:08:13.456129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["ChOQda4LLnEHyBACyk"]} -{"Format": "IDEA0", "ID": "d0d98e41-0f6b-4bd0-a2aa-ea01c2d5d35e", "DetectTime": "2023-10-30T14:08:13.477343+02:00", "EventTime": "2023-10-30T14:08:13.477368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["Cx7Vqj1WBg4HjAS8O2"]} -{"Format": "IDEA0", "ID": "e0590646-33cc-46eb-a815-bd0dd88f6ebc", "DetectTime": "2023-10-30T14:08:13.498259+02:00", "EventTime": "2023-10-30T14:08:13.498280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Cz4o2m3m0D1iN8v7Xb"]} -{"Format": "IDEA0", "ID": "7e9e66e6-7b4b-4854-bb3f-c97e2e671936", "DetectTime": "2023-10-30T14:08:13.518815+02:00", "EventTime": "2023-10-30T14:08:13.518836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CQ7ts93P2D06vgEjik"]} -{"Format": "IDEA0", "ID": "0de17522-7e4f-4f5a-aacd-ee96f3f12fe6", "DetectTime": "2023-10-30T14:08:13.564432+02:00", "EventTime": "2023-10-30T14:08:13.564446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["Cz8vES1mL1QgKL5az6"]} -{"Format": "IDEA0", "ID": "9676b078-0075-42ed-911d-e6700c07225f", "DetectTime": "2023-10-30T14:08:13.579237+02:00", "EventTime": "2023-10-30T14:08:13.579252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C3APuK15raejpPrDe"]} -{"Format": "IDEA0", "ID": "bae12248-9064-488c-b9b3-3aa56fa2a8b0", "DetectTime": "2023-10-30T14:08:13.593030+02:00", "EventTime": "2023-10-30T14:08:13.593047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CZk9aE4veeiy1ZP6Bb"]} -{"Format": "IDEA0", "ID": "41afdcbc-077f-4b01-9503-5b77889a8c58", "DetectTime": "2023-10-30T14:08:13.611715+02:00", "EventTime": "2023-10-30T14:08:13.611731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CJbS9j7BhKOp52OL6"]} -{"Format": "IDEA0", "ID": "70acef73-5322-4a97-ae9d-9893fd05ebf1", "DetectTime": "2023-10-30T14:08:13.631591+02:00", "EventTime": "2023-10-30T14:08:13.631607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Cb30Oa2EyDglWpVjsh"]} -{"Format": "IDEA0", "ID": "5537bfa2-a276-4e37-ae9a-51017eee8364", "DetectTime": "2023-10-30T14:08:13.650628+02:00", "EventTime": "2023-10-30T14:08:13.650639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CxaP9e4L6xlSVCzzng"]} -{"Format": "IDEA0", "ID": "0289169a-fcd6-443c-bbe9-91342a0bb961", "DetectTime": "2023-10-30T14:08:13.665217+02:00", "EventTime": "2023-10-30T14:08:13.665234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CBq7Gt1Cwm6MWHuikl"]} -{"Format": "IDEA0", "ID": "0e99c87e-ed0f-4f10-b5f1-fbfb59833493", "DetectTime": "2023-10-30T14:08:13.681216+02:00", "EventTime": "2023-10-30T14:08:13.681236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C86t4NfuALx2BcLK2"]} -{"Format": "IDEA0", "ID": "11425283-18c7-47c4-8ed5-772d61695227", "DetectTime": "2023-10-30T14:08:13.699243+02:00", "EventTime": "2023-10-30T14:08:13.699264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CL3Iks4yO8bL6djDwf"]} -{"Format": "IDEA0", "ID": "f84aa458-c359-4a3b-a825-4807dd58730a", "DetectTime": "2023-10-30T14:08:13.718540+02:00", "EventTime": "2023-10-30T14:08:13.718556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CeKhch2jqPHtaVSuW9"]} -{"Format": "IDEA0", "ID": "4e5029de-4aa1-4510-b755-dd3cb014d61e", "DetectTime": "2023-10-30T14:08:13.759060+02:00", "EventTime": "2023-10-30T14:08:13.759090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CLxKBc2JBZq7lwCq3d"]} -{"Format": "IDEA0", "ID": "3f73b643-2e01-4b40-8a2e-4b268d394e95", "DetectTime": "2023-10-30T14:08:13.778068+02:00", "EventTime": "2023-10-30T14:08:13.778081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["COCov74FWJIBS031Hl"]} -{"Format": "IDEA0", "ID": "83a758ba-7f53-430c-9200-38b6e1a47761", "DetectTime": "2023-10-30T14:08:13.798421+02:00", "EventTime": "2023-10-30T14:08:13.798437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CL6SRP14ytlqBigEXb"]} -{"Format": "IDEA0", "ID": "65dfb947-c479-4437-ac77-f4d8166e006f", "DetectTime": "2023-10-30T14:08:13.817427+02:00", "EventTime": "2023-10-30T14:08:13.817443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CP28Uc3ZrFRAy09RJ9"]} -{"Format": "IDEA0", "ID": "09f78570-6299-498c-a3bf-15aba62374cd", "DetectTime": "2023-10-30T14:08:13.837537+02:00", "EventTime": "2023-10-30T14:08:13.837552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CMwCdM37DNttkncdhg"]} -{"Format": "IDEA0", "ID": "6520a2ec-426c-4793-a9e5-d9b2a9540202", "DetectTime": "2023-10-30T14:08:13.857092+02:00", "EventTime": "2023-10-30T14:08:13.857108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Csdh8C2foLuDG3byF6"]} -{"Format": "IDEA0", "ID": "8f911b35-db93-4ff8-8947-8df6526c5494", "DetectTime": "2023-10-30T14:08:13.875593+02:00", "EventTime": "2023-10-30T14:08:13.875610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CNAiR14SOs79UWCOU5"]} -{"Format": "IDEA0", "ID": "e86a3c93-4242-46d3-adc9-5d603cadb870", "DetectTime": "2023-10-30T14:08:13.890168+02:00", "EventTime": "2023-10-30T14:08:13.890180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CYDhum1VX9zOz3vXKb"]} -{"Format": "IDEA0", "ID": "cdcb6268-3d14-453f-ad16-c945f1bd6a2e", "DetectTime": "2023-10-30T14:08:13.906107+02:00", "EventTime": "2023-10-30T14:08:13.906118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C3lftiEhkufdjRjxb"]} -{"Format": "IDEA0", "ID": "aa95cda4-1935-4fb9-b264-1cba8f5355bd", "DetectTime": "2023-10-30T14:08:13.926154+02:00", "EventTime": "2023-10-30T14:08:13.926175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CGeg9l4EJCwpkXpfie"]} -{"Format": "IDEA0", "ID": "e46ad46e-7b14-4ed2-8851-72f51c7f2c27", "DetectTime": "2023-10-30T14:08:13.946725+02:00", "EventTime": "2023-10-30T14:08:13.946744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C99Peu2X6H6sHXxUwf"]} -{"Format": "IDEA0", "ID": "44f81573-a760-4ed2-8497-291d951a4336", "DetectTime": "2023-10-30T14:08:13.965248+02:00", "EventTime": "2023-10-30T14:08:13.965267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CDV2CoEIIGNqZT7r7"]} -{"Format": "IDEA0", "ID": "e6390971-272e-4323-aeca-7f7d1b9c4988", "DetectTime": "2023-10-30T14:08:13.986278+02:00", "EventTime": "2023-10-30T14:08:13.986300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CRaONl4YuyarxCWk1f"]} -{"Format": "IDEA0", "ID": "7803ea9d-d518-491d-9389-8f0b8caa96a0", "DetectTime": "2023-10-30T14:08:14.007044+02:00", "EventTime": "2023-10-30T14:08:14.007063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CayHTP23cmC4mHHrYk"]} -{"Format": "IDEA0", "ID": "3a81dff6-f8df-438b-9a4e-60980eece2e6", "DetectTime": "2023-10-30T14:08:14.025164+02:00", "EventTime": "2023-10-30T14:08:14.025181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CGV8iM3olBaZE54aYd"]} -{"Format": "IDEA0", "ID": "bc45c4a1-cd3f-4f17-bd8d-f8224641113e", "DetectTime": "2023-10-30T14:08:14.043866+02:00", "EventTime": "2023-10-30T14:08:14.043882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CvvdoU1JtETRtQZGc"]} -{"Format": "IDEA0", "ID": "6dd47dad-04fa-46ce-8d24-8a7ea3145e0d", "DetectTime": "2023-10-30T14:08:14.062820+02:00", "EventTime": "2023-10-30T14:08:14.062834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Csg0qn2F6v5KQ8lnzf"]} -{"Format": "IDEA0", "ID": "9f2e5163-aa55-4136-a418-179d6643d9bb", "DetectTime": "2023-10-30T14:08:14.077994+02:00", "EventTime": "2023-10-30T14:08:14.078005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Chh9JV1jjDr8lYyLSi"]} -{"Format": "IDEA0", "ID": "f878cab2-06ce-4bc6-b01e-37a6724288bd", "DetectTime": "2023-10-30T14:08:14.093242+02:00", "EventTime": "2023-10-30T14:08:14.093259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CoKOuF2KXxN3VyEANe"]} -{"Format": "IDEA0", "ID": "6d30a886-7b31-43d6-a5cc-e863e9eea225", "DetectTime": "2023-10-30T14:08:14.108293+02:00", "EventTime": "2023-10-30T14:08:14.108308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CPsLQ914Inkdu0FFJ3"]} -{"Format": "IDEA0", "ID": "97422134-8ca0-43e3-8a00-16ff064fd086", "DetectTime": "2023-10-30T14:08:14.124359+02:00", "EventTime": "2023-10-30T14:08:14.124370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CLS64U3viKN0zxsOI5"]} -{"Format": "IDEA0", "ID": "6ca63742-97fe-4eac-90d5-8fb46489f617", "DetectTime": "2023-10-30T14:08:14.160937+02:00", "EventTime": "2023-10-30T14:08:14.160949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CGh8Wg1qUpFvGbdRDf"]} -{"Format": "IDEA0", "ID": "b88dd6e3-d365-40e0-a44f-174d6e670684", "DetectTime": "2023-10-30T14:08:14.178759+02:00", "EventTime": "2023-10-30T14:08:14.178770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CWJfIZI4AEsHFmTp9"]} -{"Format": "IDEA0", "ID": "23055b81-ba38-4c85-8cf5-eeb7744aae48", "DetectTime": "2023-10-30T14:08:14.194004+02:00", "EventTime": "2023-10-30T14:08:14.194016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["Co999UCswyCwuWYzg"]} -{"Format": "IDEA0", "ID": "575911c9-5485-4f53-93be-3c6ce8a29f0a", "DetectTime": "2023-10-30T14:08:14.210851+02:00", "EventTime": "2023-10-30T14:08:14.210863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CEGZl62JpcYy8fchdg"]} -{"Format": "IDEA0", "ID": "c6b9e69a-b199-4daa-ae5c-a8816f26f429", "DetectTime": "2023-10-30T14:08:14.224363+02:00", "EventTime": "2023-10-30T14:08:14.224374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CIQzWa2y1suFNGp2A5"]} -{"Format": "IDEA0", "ID": "db46209e-3595-412e-bb35-5e5dc9aeb333", "DetectTime": "2023-10-30T14:08:14.241000+02:00", "EventTime": "2023-10-30T14:08:14.241011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Cmd20C20807povAmSg"]} -{"Format": "IDEA0", "ID": "5560f138-6e72-44b1-ac1d-540c76a88cdd", "DetectTime": "2023-10-30T14:08:14.259579+02:00", "EventTime": "2023-10-30T14:08:14.259590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["C148Mx209KtTReaRK2"]} -{"Format": "IDEA0", "ID": "6f32cba0-f4b4-4355-b616-1c6cc45761cd", "DetectTime": "2023-10-30T14:08:14.275885+02:00", "EventTime": "2023-10-30T14:08:14.275903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CTQeBe2caETaIHWPcb"]} -{"Format": "IDEA0", "ID": "2c27abec-d82a-477f-a8eb-5a5bececdc6e", "DetectTime": "2023-10-30T14:08:14.295314+02:00", "EventTime": "2023-10-30T14:08:14.295335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CWwnvC4CZEivMx625h"]} -{"Format": "IDEA0", "ID": "c1488063-5886-46db-bc71-3f82475159f8", "DetectTime": "2023-10-30T14:08:14.316263+02:00", "EventTime": "2023-10-30T14:08:14.316283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkYpY84xDBjGD6gVkd"]} -{"Format": "IDEA0", "ID": "2e6bc2e4-05c1-4b01-9a45-caa3e3f92199", "DetectTime": "2023-10-30T14:08:14.337386+02:00", "EventTime": "2023-10-30T14:08:14.337405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CfylrdEv69pjloJwf"]} -{"Format": "IDEA0", "ID": "3a1c76b4-0cce-4180-acfc-36b29b5cd65a", "DetectTime": "2023-10-30T14:08:14.355321+02:00", "EventTime": "2023-10-30T14:08:14.355341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C3d9s02XzLByaHXzoa"]} -{"Format": "IDEA0", "ID": "2bcb7cd6-018f-4561-a9a1-adcc19f74cdd", "DetectTime": "2023-10-30T14:08:14.376389+02:00", "EventTime": "2023-10-30T14:08:14.376409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C8VTVs4Bp0TEa44Zfl"]} -{"Format": "IDEA0", "ID": "c671b30d-85a6-4ae5-856d-caf3ad4c6094", "DetectTime": "2023-10-30T14:08:14.396398+02:00", "EventTime": "2023-10-30T14:08:14.396419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CLMJuv3bZrLk7oteXk"]} -{"Format": "IDEA0", "ID": "ff243002-4837-40e8-927a-510d0364b5d2", "DetectTime": "2023-10-30T14:08:14.416204+02:00", "EventTime": "2023-10-30T14:08:14.416220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cub1Yc2TnR2ZCWlmv6"]} -{"Format": "IDEA0", "ID": "c0bd5c61-fcc8-42b4-9157-da6f06cf9020", "DetectTime": "2023-10-30T14:08:14.431033+02:00", "EventTime": "2023-10-30T14:08:14.431047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CnsXgF38E7zSqPnFgf"]} -{"Format": "IDEA0", "ID": "859804ff-6a33-4f84-a188-ed7fad7f8b9a", "DetectTime": "2023-10-30T14:08:14.475630+02:00", "EventTime": "2023-10-30T14:08:14.475651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Ccn6w2179jsIBGXK06"]} -{"Format": "IDEA0", "ID": "35eeec6d-2360-44c8-9e25-e87a793e289b", "DetectTime": "2023-10-30T14:08:14.495440+02:00", "EventTime": "2023-10-30T14:08:14.495458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C8CDOK2Mflo0bHMmnf"]} -{"Format": "IDEA0", "ID": "514df667-f5f4-44c1-8184-1987c4555c8b", "DetectTime": "2023-10-30T14:08:14.511667+02:00", "EventTime": "2023-10-30T14:08:14.511687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cz5Del3m4yCDZ1r2N9"]} -{"Format": "IDEA0", "ID": "6b03a02f-61ab-484b-a94a-5674a7ad4088", "DetectTime": "2023-10-30T14:08:14.531325+02:00", "EventTime": "2023-10-30T14:08:14.531343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CpPf0T3eVk75P01lGd"]} -{"Format": "IDEA0", "ID": "309a052f-0438-4e4e-b54c-3a32861a4da8", "DetectTime": "2023-10-30T14:08:14.551764+02:00", "EventTime": "2023-10-30T14:08:14.551797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CCyUXoak9KMj9gqQa"]} -{"Format": "IDEA0", "ID": "bdb30ba6-8b24-4f94-bfc6-e8eab1ef02d2", "DetectTime": "2023-10-30T14:08:14.567262+02:00", "EventTime": "2023-10-30T14:08:14.567274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXLTOF4MvvlOIBjfXc"]} -{"Format": "IDEA0", "ID": "9b90c919-b317-42a7-b90a-f3e498fb6bf1", "DetectTime": "2023-10-30T14:08:14.580378+02:00", "EventTime": "2023-10-30T14:08:14.580391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["C08lwy4OYnuM5dpk1k"]} -{"Format": "IDEA0", "ID": "f653e620-56d6-43f8-841c-2ecccd79a890", "DetectTime": "2023-10-30T14:08:14.596681+02:00", "EventTime": "2023-10-30T14:08:14.596711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C5RYqV2qilFvwMr7Hl"]} -{"Format": "IDEA0", "ID": "697d2280-a020-4040-b644-a6f37013a466", "DetectTime": "2023-10-30T14:08:14.615530+02:00", "EventTime": "2023-10-30T14:08:14.615546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CTlpBAOyalEuL6kHa"]} -{"Format": "IDEA0", "ID": "5379a9dd-9250-4244-80a6-555534d3b580", "DetectTime": "2023-10-30T14:08:14.634644+02:00", "EventTime": "2023-10-30T14:08:14.634660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CNEEkL3nFpkXwta8Rf"]} -{"Format": "IDEA0", "ID": "cd4fec6c-4629-4a6c-bdea-fef661b085b6", "DetectTime": "2023-10-30T14:08:14.654154+02:00", "EventTime": "2023-10-30T14:08:14.654170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cw4izz18hOXoCkUsxj"]} -{"Format": "IDEA0", "ID": "cb1eee0e-3828-4504-973e-1333142ac07c", "DetectTime": "2023-10-30T14:08:14.673961+02:00", "EventTime": "2023-10-30T14:08:14.673977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CgwGde48ov7rNkLSTh"]} -{"Format": "IDEA0", "ID": "63dc88b7-e601-45d4-ba1a-40626fb809c8", "DetectTime": "2023-10-30T14:08:14.691993+02:00", "EventTime": "2023-10-30T14:08:14.692008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CCilDy2SfkWa2p4O8a"]} -{"Format": "IDEA0", "ID": "6e740bb4-8a97-4f36-8c01-ac9f256ea785", "DetectTime": "2023-10-30T14:08:14.711778+02:00", "EventTime": "2023-10-30T14:08:14.711799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CXuiVV3wxUUarF1g2l"]} -{"Format": "IDEA0", "ID": "d8938dbb-d7ba-4d3b-bdda-878e89a189ab", "DetectTime": "2023-10-30T14:08:14.730936+02:00", "EventTime": "2023-10-30T14:08:14.730952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CE0NTb4ZzADqeRfU68"]} -{"Format": "IDEA0", "ID": "a6af4d73-3e99-4da9-a0bf-02a335c13de0", "DetectTime": "2023-10-30T14:08:14.750889+02:00", "EventTime": "2023-10-30T14:08:14.750906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CAuQt91WMNrlG1Woz5"]} -{"Format": "IDEA0", "ID": "3103d651-cea4-4b7f-b877-3649d73ecbc8", "DetectTime": "2023-10-30T14:08:14.771178+02:00", "EventTime": "2023-10-30T14:08:14.771194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CKBhtq2ZsSRmtX59tc"]} -{"Format": "IDEA0", "ID": "d900e468-307b-4184-9df1-a9f174687871", "DetectTime": "2023-10-30T14:08:14.789888+02:00", "EventTime": "2023-10-30T14:08:14.789902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CB0b2i2WC6vswD6MUf"]} -{"Format": "IDEA0", "ID": "a736ab5c-c4be-4358-8efe-798eff5578e2", "DetectTime": "2023-10-30T14:08:14.807868+02:00", "EventTime": "2023-10-30T14:08:14.807883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["Cjzv4w39YhMpXF88P"]} -{"Format": "IDEA0", "ID": "7f22e688-dc45-4517-b2ea-f6686e3467ea", "DetectTime": "2023-10-30T14:08:14.826570+02:00", "EventTime": "2023-10-30T14:08:14.826587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CDbIoEXzU7U0rwAaj"]} -{"Format": "IDEA0", "ID": "aa171be9-c5c1-4892-b47a-a48c6c25daf6", "DetectTime": "2023-10-30T14:08:14.844850+02:00", "EventTime": "2023-10-30T14:08:14.844868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CkoAiu4mfobK8hkP02"]} -{"Format": "IDEA0", "ID": "12e69402-0d01-4e4f-ae82-bc3106f9b56d", "DetectTime": "2023-10-30T14:08:14.860526+02:00", "EventTime": "2023-10-30T14:08:14.860537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CWkEqo1Ju4GZvNKDWe"]} -{"Format": "IDEA0", "ID": "dea5b370-707d-42f3-a193-bcbbb092ae2f", "DetectTime": "2023-10-30T14:08:14.879965+02:00", "EventTime": "2023-10-30T14:08:14.879982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CE2eYe3xDQcpPEJFRe"]} -{"Format": "IDEA0", "ID": "67fd767e-3d95-4946-ba7e-9eb2d263d41d", "DetectTime": "2023-10-30T14:08:14.899117+02:00", "EventTime": "2023-10-30T14:08:14.899129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C5fWNh2YneBL8tNpr4"]} -{"Format": "IDEA0", "ID": "19c2c0a1-60f6-410e-8d23-8d129b1e885d", "DetectTime": "2023-10-30T14:08:14.913496+02:00", "EventTime": "2023-10-30T14:08:14.913509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CiqNSK22z9aku1Irre"]} -{"Format": "IDEA0", "ID": "10a4f496-ceca-4470-a3d6-46d41860aedd", "DetectTime": "2023-10-30T14:08:14.928632+02:00", "EventTime": "2023-10-30T14:08:14.928652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C3WhNsNXBOAeWyuMb"]} -{"Format": "IDEA0", "ID": "191429e1-052e-4506-b650-1cf08e856093", "DetectTime": "2023-10-30T14:08:14.946612+02:00", "EventTime": "2023-10-30T14:08:14.946628+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9VoKh2TBV9BJeNw77"]} -{"Format": "IDEA0", "ID": "8209f96d-e93d-477c-aa62-d30245dcde8a", "DetectTime": "2023-10-30T14:08:14.971897+02:00", "EventTime": "2023-10-30T14:08:14.971908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C8GMaYMLPsCcYzvn6"]} -{"Format": "Json", "ID": "8209f96d-e93d-477c-aa62-d30245dcde8a", "DetectTime": "2023-10-30T14:08:14.971897+02:00", "EventTime": "2023-10-30T14:08:14.971908+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:21:13.040482+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:15.052793)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "97310afe-cda5-4fd6-8a2e-57a673a2131a", "DetectTime": "2023-10-30T14:08:15.057032+02:00", "EventTime": "2023-10-30T14:08:15.057044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CGNMAR28qLTiAP3l5b"]} -{"Format": "IDEA0", "ID": "873f8715-c228-4b30-a65e-700add22aaf2", "DetectTime": "2023-10-30T14:08:15.072062+02:00", "EventTime": "2023-10-30T14:08:15.072074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CAmlguYF6yMbxSPBa"]} -{"Format": "IDEA0", "ID": "eaea85f3-0f37-4b47-ad05-940dec80f546", "DetectTime": "2023-10-30T14:08:15.087974+02:00", "EventTime": "2023-10-30T14:08:15.087988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cv0VQSMiDcMYY0TEi"]} -{"Format": "IDEA0", "ID": "1b8d0b86-4638-44a4-9d10-47a12d618ef1", "DetectTime": "2023-10-30T14:08:15.106317+02:00", "EventTime": "2023-10-30T14:08:15.106335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CDAALS1pchbX4e6Xh2"]} -{"Format": "IDEA0", "ID": "25210ea3-621c-45e1-b996-0eebbdb6596f", "DetectTime": "2023-10-30T14:08:15.126852+02:00", "EventTime": "2023-10-30T14:08:15.126868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CklxWVfjyR5FQQqm"]} -{"Format": "IDEA0", "ID": "a0b08875-5dc9-432b-9ac2-7c1f933820c6", "DetectTime": "2023-10-30T14:08:15.145397+02:00", "EventTime": "2023-10-30T14:08:15.145412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CBXDPY37wJlZ51TkW6"]} -{"Format": "IDEA0", "ID": "07f03292-9c64-4efe-b32e-b8a37321eaeb", "DetectTime": "2023-10-30T14:08:15.160210+02:00", "EventTime": "2023-10-30T14:08:15.160227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CQZLUA3RlxUUuQ2Bcf"]} -{"Format": "IDEA0", "ID": "a2592795-f00b-43d1-891c-ed9cc4359133", "DetectTime": "2023-10-30T14:08:15.176727+02:00", "EventTime": "2023-10-30T14:08:15.176740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C0aY352ZfcibMrPoPe"]} -{"Format": "IDEA0", "ID": "40ec8751-8bb1-4c9d-808a-a36d5a33f7c6", "DetectTime": "2023-10-30T14:08:15.190133+02:00", "EventTime": "2023-10-30T14:08:15.190146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CHG4ER3NmJCw84psXk"]} -{"Format": "IDEA0", "ID": "9c5ee23b-5746-43f0-85cb-0ffaa0536996", "DetectTime": "2023-10-30T14:08:15.208115+02:00", "EventTime": "2023-10-30T14:08:15.208125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cc8jgs3b3cIH1JmOue"]} -{"Format": "IDEA0", "ID": "c07dd864-d268-4ec7-935e-38f2f2fa98ce", "DetectTime": "2023-10-30T14:08:15.222579+02:00", "EventTime": "2023-10-30T14:08:15.222591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CizbBQ20Ow35mm1CWd"]} -{"Format": "IDEA0", "ID": "6cb18668-2cec-4e69-b0c3-68593dd23ec5", "DetectTime": "2023-10-30T14:08:15.240934+02:00", "EventTime": "2023-10-30T14:08:15.240951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CewZ5a3ssPKEF9Clmj"]} -{"Format": "IDEA0", "ID": "6d021b4a-38ab-4ce4-a1e5-660237f6975c", "DetectTime": "2023-10-30T14:08:15.259841+02:00", "EventTime": "2023-10-30T14:08:15.259856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CqQAPLIqjT9F5YsS1"]} -{"Format": "IDEA0", "ID": "0118121b-2e1e-4983-b817-93fd398b20da", "DetectTime": "2023-10-30T14:08:15.279232+02:00", "EventTime": "2023-10-30T14:08:15.279248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["C46jNs3dEH7kiUKHRc"]} -{"Format": "IDEA0", "ID": "f5011895-59a4-482f-924a-4e2ddd56e700", "DetectTime": "2023-10-30T14:08:15.297771+02:00", "EventTime": "2023-10-30T14:08:15.297784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CxYa4e2JXMGgnAuUEh"]} -{"Format": "IDEA0", "ID": "5bf148d1-7752-4336-b14d-72e8d936ca06", "DetectTime": "2023-10-30T14:08:15.313174+02:00", "EventTime": "2023-10-30T14:08:15.313185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CYMdphHipM2bDl7wb"]} -{"Format": "IDEA0", "ID": "9a5e9945-5c3f-4c48-b9b1-90471f23abd4", "DetectTime": "2023-10-30T14:08:15.328529+02:00", "EventTime": "2023-10-30T14:08:15.328544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CJN3f84EJlV7RCzsQ6"]} -{"Format": "IDEA0", "ID": "83c323df-14f9-4090-b018-9663a12b1fcb", "DetectTime": "2023-10-30T14:08:15.349256+02:00", "EventTime": "2023-10-30T14:08:15.349276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CBl9xZ30P90LJJ7FKd"]} -{"Format": "IDEA0", "ID": "80356c6f-1c11-4d28-a594-350deadd195e", "DetectTime": "2023-10-30T14:08:15.370548+02:00", "EventTime": "2023-10-30T14:08:15.370571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CGAzIMvwAuIrtwKli"]} -{"Format": "IDEA0", "ID": "c91ca84a-27b2-48b7-906e-24014d3aa265", "DetectTime": "2023-10-30T14:08:15.391126+02:00", "EventTime": "2023-10-30T14:08:15.391148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C9Byn8266FKFnJirug"]} -{"Format": "IDEA0", "ID": "f732c6c2-c5a0-4339-8193-547fbff30248", "DetectTime": "2023-10-30T14:08:15.408015+02:00", "EventTime": "2023-10-30T14:08:15.408026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CESnh23Dyo8rMt9I0a"]} -{"Format": "IDEA0", "ID": "6fd87854-567a-44c0-8af3-abe365d27e7a", "DetectTime": "2023-10-30T14:08:15.423759+02:00", "EventTime": "2023-10-30T14:08:15.423771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CloBeE2vMpg4vcOUij"]} -{"Format": "IDEA0", "ID": "bdee670f-433b-4d8f-8861-c3c1d661bf3c", "DetectTime": "2023-10-30T14:08:15.441586+02:00", "EventTime": "2023-10-30T14:08:15.441599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwJ9x73ZNKQWXnb4n"]} -{"Format": "IDEA0", "ID": "a334c5c8-a89e-40e2-87d5-426455e6c65f", "DetectTime": "2023-10-30T14:08:15.457811+02:00", "EventTime": "2023-10-30T14:08:15.457827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CAaSVGmHHZSBRO2W8"]} -{"Format": "IDEA0", "ID": "cfb6cf16-e309-4d20-93b8-6ead7122b636", "DetectTime": "2023-10-30T14:08:15.475710+02:00", "EventTime": "2023-10-30T14:08:15.475725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CbrMJlJO5LeXz8lz8"]} -{"Format": "IDEA0", "ID": "c9085a8e-54a0-43cf-8d47-e3ab1107b10e", "DetectTime": "2023-10-30T14:08:15.493596+02:00", "EventTime": "2023-10-30T14:08:15.493612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["Cx6wJl3VbFp7FIZsIh"]} -{"Format": "IDEA0", "ID": "0f581ba9-1031-44b7-b037-d90c5a5900db", "DetectTime": "2023-10-30T14:08:15.510148+02:00", "EventTime": "2023-10-30T14:08:15.510163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Crgo3A28FAS5FVky5k"]} -{"Format": "IDEA0", "ID": "9d125f8b-20ad-4db3-9231-558a9cd2c2ee", "DetectTime": "2023-10-30T14:08:15.527301+02:00", "EventTime": "2023-10-30T14:08:15.527317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CoYZ0G4tMEavZ9sBEl"]} -{"Format": "IDEA0", "ID": "1af9e0bb-af47-4bcf-bb0e-b3865c7d1cb2", "DetectTime": "2023-10-30T14:08:15.542580+02:00", "EventTime": "2023-10-30T14:08:15.542591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["ClZ1At3odVXP0FIhb2"]} -{"Format": "IDEA0", "ID": "bcec7bf8-134e-4fd3-bf1a-d81c3ee49d53", "DetectTime": "2023-10-30T14:08:15.563490+02:00", "EventTime": "2023-10-30T14:08:15.563515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZbZNi2FRZuMmVijTe"]} -{"Format": "IDEA0", "ID": "225f39e7-67aa-4fcb-9ccf-2b75f48813e8", "DetectTime": "2023-10-30T14:08:15.583849+02:00", "EventTime": "2023-10-30T14:08:15.583869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CcB6pDVyLvtfkKOp"]} -{"Format": "IDEA0", "ID": "25ced046-2e7d-4929-a345-c5a797588932", "DetectTime": "2023-10-30T14:08:15.630244+02:00", "EventTime": "2023-10-30T14:08:15.630264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CujPic1TJApE6vZUY4"]} -{"Format": "IDEA0", "ID": "f591ca60-98e3-4448-bab0-37878babb41a", "DetectTime": "2023-10-30T14:08:15.650227+02:00", "EventTime": "2023-10-30T14:08:15.650248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CAzvLw1q0OKYyq5uGd"]} -{"Format": "IDEA0", "ID": "bd6d9a55-a520-484a-aeb7-8d50a03bee5d", "DetectTime": "2023-10-30T14:08:15.670016+02:00", "EventTime": "2023-10-30T14:08:15.670037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CJBq9j3m73eNHbjuf6"]} -{"Format": "IDEA0", "ID": "31bfc669-59b4-4980-b5e6-9bc58ff2b29b", "DetectTime": "2023-10-30T14:08:15.689459+02:00", "EventTime": "2023-10-30T14:08:15.689480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C00Xxd2u6ey2GtiEui"]} -{"Format": "IDEA0", "ID": "cb9252ba-746e-4a36-b703-a125785895de", "DetectTime": "2023-10-30T14:08:15.709467+02:00", "EventTime": "2023-10-30T14:08:15.709487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CKTazh1qJMsT1yrAw1"]} -{"Format": "IDEA0", "ID": "063d9a40-aeec-4f60-8811-109c76deed5f", "DetectTime": "2023-10-30T14:08:15.729056+02:00", "EventTime": "2023-10-30T14:08:15.729068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["COrknp2USYlO64H1oe"]} -{"Format": "IDEA0", "ID": "5bf9d4ce-5f22-4436-9d07-1e202d70dfda", "DetectTime": "2023-10-30T14:08:15.743577+02:00", "EventTime": "2023-10-30T14:08:15.743595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CfJ5Mw3fDNj0Om9omf"]} -{"Format": "IDEA0", "ID": "ea33280d-556b-4ed8-be10-e2a1b0762bcc", "DetectTime": "2023-10-30T14:08:15.757036+02:00", "EventTime": "2023-10-30T14:08:15.757048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CdvYLX320rnNZDZhGh"]} -{"Format": "IDEA0", "ID": "89673478-3007-45c5-b8f6-b7fb023992e0", "DetectTime": "2023-10-30T14:08:15.771607+02:00", "EventTime": "2023-10-30T14:08:15.771619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CeXHVnipqnwR8UsQ1"]} -{"Format": "IDEA0", "ID": "8ff63ace-4bc9-4c35-bdc2-3657e85466e6", "DetectTime": "2023-10-30T14:08:15.787916+02:00", "EventTime": "2023-10-30T14:08:15.787944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["Co4a7b452PDNgsqwyk"]} -{"Format": "IDEA0", "ID": "616bc459-e6fa-4c38-8bc2-06810295ad70", "DetectTime": "2023-10-30T14:08:15.806096+02:00", "EventTime": "2023-10-30T14:08:15.806111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CvcsAH1mbfxNWwAQa3"]} -{"Format": "IDEA0", "ID": "32d5f25b-d1b9-4aa1-9b5a-5b4bc7150d30", "DetectTime": "2023-10-30T14:08:15.822097+02:00", "EventTime": "2023-10-30T14:08:15.822109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CCgbSw2WywfZra78Ea"]} -{"Format": "IDEA0", "ID": "6def5d4c-da25-44eb-b56b-526b98299b3e", "DetectTime": "2023-10-30T14:08:15.835886+02:00", "EventTime": "2023-10-30T14:08:15.835897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cc4ylC1GONby32Evwk"]} -{"Format": "IDEA0", "ID": "12a078c7-e813-4581-acb1-2839f5d05746", "DetectTime": "2023-10-30T14:08:15.849964+02:00", "EventTime": "2023-10-30T14:08:15.849975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Cb0l0k3d2XqdmntRW"]} -{"Format": "IDEA0", "ID": "18105d4d-6b89-44c2-a522-375b894e19fb", "DetectTime": "2023-10-30T14:08:15.862913+02:00", "EventTime": "2023-10-30T14:08:15.862925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C6VCInHUrlQbz1wA3"]} -{"Format": "IDEA0", "ID": "0bdf2122-4daa-4d57-a9c5-62ac32ce1009", "DetectTime": "2023-10-30T14:08:15.880929+02:00", "EventTime": "2023-10-30T14:08:15.880949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["C6pnRC2Id3bNc0uq9"]} -{"Format": "IDEA0", "ID": "8a7b127d-c7c1-451b-9bf8-c9222a15d8bc", "DetectTime": "2023-10-30T14:08:15.898203+02:00", "EventTime": "2023-10-30T14:08:15.898214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CeaXK74lpj4AYmtqM5"]} -{"Format": "IDEA0", "ID": "bed87506-d706-42b5-b24a-65d6f263181c", "DetectTime": "2023-10-30T14:08:15.916031+02:00", "EventTime": "2023-10-30T14:08:15.916048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbOQwdY3rwITnk0s3"]} -{"Format": "IDEA0", "ID": "56367bc9-ed0d-4af7-a118-5bc1ea01214a", "DetectTime": "2023-10-30T14:08:15.931761+02:00", "EventTime": "2023-10-30T14:08:15.931772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C8mBfC1FQ2oKuvEyI3"]} -{"Format": "IDEA0", "ID": "84ee4ebf-6fce-4fb5-be87-5b1ec27c88df", "DetectTime": "2023-10-30T14:08:15.945463+02:00", "EventTime": "2023-10-30T14:08:15.945484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbdEuk2uhHtxmNRYc4"]} -{"Format": "IDEA0", "ID": "91eb52e6-3b66-4a68-89f0-90af0a568f39", "DetectTime": "2023-10-30T14:08:15.958969+02:00", "EventTime": "2023-10-30T14:08:15.958981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CNOq8m2PMdAC0P402f"]} -{"Format": "IDEA0", "ID": "efc17b31-81c8-478c-809e-ec4eed159cc9", "DetectTime": "2023-10-30T14:08:15.974025+02:00", "EventTime": "2023-10-30T14:08:15.974038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CA0P8y4d1BPL8QhVxb"]} -{"Format": "IDEA0", "ID": "8c9fa2a5-0e6c-4e1d-be13-7163a84d1279", "DetectTime": "2023-10-30T14:08:15.989214+02:00", "EventTime": "2023-10-30T14:08:15.989225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CA8ueHLvtTyHm4Mrb"]} -{"Format": "IDEA0", "ID": "fc3da6e5-f0ff-4d07-ab6c-ef09def5a038", "DetectTime": "2023-10-30T14:08:16.006769+02:00", "EventTime": "2023-10-30T14:08:16.006824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cb8Z0p1l4SttqwERIb"]} -{"Format": "IDEA0", "ID": "bb88c344-132c-43ee-ba2e-1919511d9e2b", "DetectTime": "2023-10-30T14:08:16.026100+02:00", "EventTime": "2023-10-30T14:08:16.026121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C0WfVy3qHoqyxTQ3o9"]} -{"Format": "IDEA0", "ID": "32ab04a0-6b98-46b7-9515-738c5e514bc1", "DetectTime": "2023-10-30T14:08:16.044464+02:00", "EventTime": "2023-10-30T14:08:16.044480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["CzIr1nUEo0bIqXMN6"]} -{"Format": "IDEA0", "ID": "ec73b665-f5b6-4ab1-975b-aa17ce4afa30", "DetectTime": "2023-10-30T14:08:16.089828+02:00", "EventTime": "2023-10-30T14:08:16.089841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CLCXBA2Mt1iiJbnPc5"]} -{"Format": "IDEA0", "ID": "b4a06286-3222-452b-bf2a-038a5d2ce6ef", "DetectTime": "2023-10-30T14:08:16.104550+02:00", "EventTime": "2023-10-30T14:08:16.104562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C6YswMHQ7ABTa39Md"]} -{"Format": "IDEA0", "ID": "7108e0da-9571-4d6f-bcdb-522092acf582", "DetectTime": "2023-10-30T14:08:16.118873+02:00", "EventTime": "2023-10-30T14:08:16.118886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["C6HqarKkWqRmZ6Qla"]} -{"Format": "IDEA0", "ID": "35f86103-67a9-463c-abae-96ef32b95390", "DetectTime": "2023-10-30T14:08:16.134034+02:00", "EventTime": "2023-10-30T14:08:16.134046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CudAKW1fNaSOB3HcW5"]} -{"Format": "IDEA0", "ID": "b89e48ce-727a-4384-8617-a0b42ab89cc3", "DetectTime": "2023-10-30T14:08:16.147262+02:00", "EventTime": "2023-10-30T14:08:16.147274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CSC5fm2D3u1GIsEKEl"]} -{"Format": "IDEA0", "ID": "7ec9aa2d-b72b-4087-b15c-4afe7e587eb4", "DetectTime": "2023-10-30T14:08:16.161406+02:00", "EventTime": "2023-10-30T14:08:16.161417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Cc4Aw81cLkgXPWVb9e"]} -{"Format": "IDEA0", "ID": "8c38311f-4e7f-4e6a-ac1a-7539c4607b01", "DetectTime": "2023-10-30T14:08:16.178089+02:00", "EventTime": "2023-10-30T14:08:16.178107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CNYjop14EtpZOlQSQb"]} -{"Format": "IDEA0", "ID": "2e71f2db-010e-4f0d-838b-396cc601de33", "DetectTime": "2023-10-30T14:08:16.197502+02:00", "EventTime": "2023-10-30T14:08:16.197518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["Cg4qdd4RQXThHZFNS4"]} -{"Format": "IDEA0", "ID": "4eb5a90b-4016-4d73-8a53-5b607ab297b4", "DetectTime": "2023-10-30T14:08:16.215662+02:00", "EventTime": "2023-10-30T14:08:16.215678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CWlE6a3RIJlVdx29F1"]} -{"Format": "IDEA0", "ID": "1b8aa06f-5626-4831-a5be-1d53f31915e7", "DetectTime": "2023-10-30T14:08:16.234544+02:00", "EventTime": "2023-10-30T14:08:16.234567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CNTmak32bYO9O82n9l"]} -{"Format": "IDEA0", "ID": "adf4fc5e-4769-4a36-8fad-89fe8d667792", "DetectTime": "2023-10-30T14:08:16.255013+02:00", "EventTime": "2023-10-30T14:08:16.255033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["C4smMl3tBzoMLtfhHh"]} -{"Format": "IDEA0", "ID": "1082e748-480e-4bf0-997d-fe7f67517fc7", "DetectTime": "2023-10-30T14:08:16.273034+02:00", "EventTime": "2023-10-30T14:08:16.273048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CcNnWuRMvVMlzB3n1"]} -{"Format": "IDEA0", "ID": "8347107e-c5a1-43a6-a775-21a3e687a66e", "DetectTime": "2023-10-30T14:08:16.290970+02:00", "EventTime": "2023-10-30T14:08:16.290986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CniixB4YmZfmKOgfn9"]} -{"Format": "IDEA0", "ID": "5a3c124a-d3ca-4d89-9f15-ef67a177ba25", "DetectTime": "2023-10-30T14:08:16.311236+02:00", "EventTime": "2023-10-30T14:08:16.311256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CvxNpo2Zzblu3TqrFe"]} -{"Format": "IDEA0", "ID": "8498dc33-b1a6-4823-9932-607729ee3806", "DetectTime": "2023-10-30T14:08:16.329369+02:00", "EventTime": "2023-10-30T14:08:16.329388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CClUQuug3Wj9BIvLl"]} -{"Format": "IDEA0", "ID": "9304ffa9-ef7d-4a6e-b2ea-ff53839441c7", "DetectTime": "2023-10-30T14:08:16.348717+02:00", "EventTime": "2023-10-30T14:08:16.348745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CmILY02XM8U0rNG3Gc"]} -{"Format": "IDEA0", "ID": "b687a483-b833-4225-8586-005239c57780", "DetectTime": "2023-10-30T14:08:16.370270+02:00", "EventTime": "2023-10-30T14:08:16.370286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CSfznt2kQ8Q6v6iXF5"]} -{"Format": "IDEA0", "ID": "c715e96d-5231-45f4-a9a3-2ab36fb006b5", "DetectTime": "2023-10-30T14:08:16.390335+02:00", "EventTime": "2023-10-30T14:08:16.390355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C5tnpr4qNz10fW6BJ1"]} -{"Format": "IDEA0", "ID": "e6d96351-37fb-480c-ae41-a3f4fc9fb091", "DetectTime": "2023-10-30T14:08:16.417130+02:00", "EventTime": "2023-10-30T14:08:16.417141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["Clylg91EagUhzRwQ4d"]} -{"Format": "IDEA0", "ID": "ad9df1b3-19e5-4ec1-929d-ce1918b418bf", "DetectTime": "2023-10-30T14:08:16.434941+02:00", "EventTime": "2023-10-30T14:08:16.434958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["ClkEau2OorebX3pm4j"]} -{"Format": "IDEA0", "ID": "3ba3488c-1504-4b6e-855b-96e965bc12d8", "DetectTime": "2023-10-30T14:08:16.477348+02:00", "EventTime": "2023-10-30T14:08:16.477360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CkY7NCUV0CMdR8Df4"]} -{"Format": "IDEA0", "ID": "73902f4f-52bd-4a2c-8f99-e1dd3e1cd466", "DetectTime": "2023-10-30T14:08:16.495886+02:00", "EventTime": "2023-10-30T14:08:16.495902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CP0YO9t4P497wXK93"]} -{"Format": "IDEA0", "ID": "7d0069e9-88b0-4b1b-b5c4-db62ac6c131f", "DetectTime": "2023-10-30T14:08:16.514163+02:00", "EventTime": "2023-10-30T14:08:16.514178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKRtlQ3R1CVPOoPTz8"]} -{"Format": "IDEA0", "ID": "5644257d-a5be-4cd1-a7eb-d450b27deabb", "DetectTime": "2023-10-30T14:08:16.539760+02:00", "EventTime": "2023-10-30T14:08:16.539780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CKXZtS1xcFUsfuINel"]} -{"Format": "IDEA0", "ID": "217956f5-7344-44ff-9c31-345961afafa7", "DetectTime": "2023-10-30T14:08:16.564940+02:00", "EventTime": "2023-10-30T14:08:16.564962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CgNBew42zoqK1AVqq2"]} -{"Format": "IDEA0", "ID": "ebef2ee1-591e-495a-bb1d-bce81c527e6e", "DetectTime": "2023-10-30T14:08:16.590078+02:00", "EventTime": "2023-10-30T14:08:16.590099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CDQaHQ3h4fkqM74dZh"]} -{"Format": "IDEA0", "ID": "f7746d30-16dd-432f-918c-1cd0b08ece89", "DetectTime": "2023-10-30T14:08:16.615040+02:00", "EventTime": "2023-10-30T14:08:16.615057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CLzkhF1jOTfSvwKL6e"]} -{"Format": "IDEA0", "ID": "334dc55d-1eda-4511-9ce5-11bd73b6464b", "DetectTime": "2023-10-30T14:08:16.637031+02:00", "EventTime": "2023-10-30T14:08:16.637049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CgY5bK1QVkzQvKsz1k"]} -{"Format": "IDEA0", "ID": "22c9403a-3b89-432f-86a0-93bf3a30ed2b", "DetectTime": "2023-10-30T14:08:16.659754+02:00", "EventTime": "2023-10-30T14:08:16.659771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CXkktr4SzUqc8Gl7T2"]} -{"Format": "IDEA0", "ID": "e0bc7cf1-097c-48be-a444-e9900d93bd38", "DetectTime": "2023-10-30T14:08:16.680287+02:00", "EventTime": "2023-10-30T14:08:16.680303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C8NpzM3lqKXH7k95li"]} -{"Format": "IDEA0", "ID": "917f9887-378a-4383-95fa-fcbb2449a55d", "DetectTime": "2023-10-30T14:08:16.702167+02:00", "EventTime": "2023-10-30T14:08:16.702183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C3ErmDISqg0HisJ25"]} -{"Format": "IDEA0", "ID": "de049a36-35f4-4e63-a165-8ec9aa9414d6", "DetectTime": "2023-10-30T14:08:16.728507+02:00", "EventTime": "2023-10-30T14:08:16.728525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CXElPI1sivuqLxHd9k"]} -{"Format": "IDEA0", "ID": "3eca4dc0-9e10-4679-ac9d-b1514810c0a0", "DetectTime": "2023-10-30T14:08:16.748516+02:00", "EventTime": "2023-10-30T14:08:16.748527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CbXIwK30Oo1INFXdOc"]} -{"Format": "IDEA0", "ID": "14cad451-0301-4364-8bd4-c636b007fca7", "DetectTime": "2023-10-30T14:08:16.768686+02:00", "EventTime": "2023-10-30T14:08:16.768699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CaE5kA4WN53vjO08t4"]} -{"Format": "IDEA0", "ID": "1aa05a0a-9bcf-4a87-a6ca-8230636aae90", "DetectTime": "2023-10-30T14:08:16.793620+02:00", "EventTime": "2023-10-30T14:08:16.793636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C0RFNG2mec8TZFH4C2"]} -{"Format": "IDEA0", "ID": "119ed727-b09f-44cc-873f-d50862339773", "DetectTime": "2023-10-30T14:08:16.818662+02:00", "EventTime": "2023-10-30T14:08:16.818677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ca7bmz3KvSJBupNxP"]} -{"Format": "IDEA0", "ID": "cb93a384-b641-459f-8734-e6ad8199d25e", "DetectTime": "2023-10-30T14:08:16.856222+02:00", "EventTime": "2023-10-30T14:08:16.856234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CI2MLf4W2NJdoqIoZd"]} -{"Format": "IDEA0", "ID": "38ea31fc-1496-4215-a2bf-62a8682b3ef8", "DetectTime": "2023-10-30T14:08:16.879600+02:00", "EventTime": "2023-10-30T14:08:16.879626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CLNtsp2vbZA1wc06Ch"]} -{"Format": "IDEA0", "ID": "0c580f1a-a4bb-4ca5-b559-317545474d0f", "DetectTime": "2023-10-30T14:08:16.900357+02:00", "EventTime": "2023-10-30T14:08:16.900371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CwogHe1oTzR9aKrWrb"]} -{"Format": "IDEA0", "ID": "99019937-3506-48e7-86a7-4f6505548f23", "DetectTime": "2023-10-30T14:08:16.936472+02:00", "EventTime": "2023-10-30T14:08:16.936486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CojzTY2xpd0OYDEn0c"]} -{"Format": "IDEA0", "ID": "d386bd40-9903-49ab-a012-37855efdf4c6", "DetectTime": "2023-10-30T14:08:16.956593+02:00", "EventTime": "2023-10-30T14:08:16.956605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CF1ifp4rKSHASVmIQ8"]} -{"Format": "IDEA0", "ID": "fbce72c1-951b-4cd0-9d22-f7e72c777ea1", "DetectTime": "2023-10-30T14:08:16.992655+02:00", "EventTime": "2023-10-30T14:08:16.992667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CNWQg71WUnLhfyc5Ra"]} -{"Format": "IDEA0", "ID": "abb3aa25-652a-476a-8160-b2ec232b51bb", "DetectTime": "2023-10-30T14:08:17.031084+02:00", "EventTime": "2023-10-30T14:08:17.031095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CyusFCfojRgJGxH6h"]} -{"Format": "Json", "ID": "abb3aa25-652a-476a-8160-b2ec232b51bb", "DetectTime": "2023-10-30T14:08:17.031084+02:00", "EventTime": "2023-10-30T14:08:17.031095+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:21:15.123302+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:17.098336)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d496605f-ab0c-4b53-b20f-4de81e5c0617", "DetectTime": "2023-10-30T14:08:17.103972+02:00", "EventTime": "2023-10-30T14:08:17.103988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CYpf4r13mTSvEhi6e9"]} -{"Format": "IDEA0", "ID": "864682c9-9b7c-47bb-b142-f580c0c593c5", "DetectTime": "2023-10-30T14:08:17.129741+02:00", "EventTime": "2023-10-30T14:08:17.129753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CueQuI1YW6D9LK3HCl"]} -{"Format": "IDEA0", "ID": "ffcf0823-23f3-427c-a881-9df897da4090", "DetectTime": "2023-10-30T14:08:17.168103+02:00", "EventTime": "2023-10-30T14:08:17.168124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CVg3s625ChE4S1A3c6"]} -{"Format": "IDEA0", "ID": "8ca0514b-5edf-4f28-9c2a-c8f6819f863e", "DetectTime": "2023-10-30T14:08:17.200260+02:00", "EventTime": "2023-10-30T14:08:17.200272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CJvxpwLdA9VpONnCd"]} -{"Format": "IDEA0", "ID": "9dab85f5-ba14-446b-85b8-35330d8a5ed0", "DetectTime": "2023-10-30T14:08:17.229830+02:00", "EventTime": "2023-10-30T14:08:17.229841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["Cg6go12GBhOdMjjBWb"]} -{"Format": "IDEA0", "ID": "27d831ff-f539-4fa0-b7a7-a702413be6b7", "DetectTime": "2023-10-30T14:08:17.266391+02:00", "EventTime": "2023-10-30T14:08:17.266408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CI3bnG2mYxc5lAA2l7"]} -{"Format": "IDEA0", "ID": "2d01e0f7-9ef1-4c4c-a641-e8d314967775", "DetectTime": "2023-10-30T14:08:17.287004+02:00", "EventTime": "2023-10-30T14:08:17.287018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C2rXgH1DGBYEi36mq7"]} -{"Format": "IDEA0", "ID": "2905d8da-e256-48d0-be05-32bcac236169", "DetectTime": "2023-10-30T14:08:17.322192+02:00", "EventTime": "2023-10-30T14:08:17.322202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CqNrbY2EKQSHfBehp5"]} -{"Format": "IDEA0", "ID": "8e6940e2-0636-464a-b37e-804c72d73852", "DetectTime": "2023-10-30T14:08:17.360145+02:00", "EventTime": "2023-10-30T14:08:17.360161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CW7KCPbDTHOahJMwj"]} -{"Format": "IDEA0", "ID": "58c543a1-9516-44ef-a7a1-76faa60cf0c2", "DetectTime": "2023-10-30T14:08:17.399085+02:00", "EventTime": "2023-10-30T14:08:17.399106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CBXQ1A2xgg3Zsq4hde"]} -{"Format": "Json", "ID": "58c543a1-9516-44ef-a7a1-76faa60cf0c2", "DetectTime": "2023-10-30T14:08:17.399085+02:00", "EventTime": "2023-10-30T14:08:17.399106+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:21:17.140947+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:17.474905)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "04c8c29c-5f87-4c98-8227-2aa1c71fec68", "DetectTime": "2023-10-30T14:08:17.480534+02:00", "EventTime": "2023-10-30T14:08:17.480562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CkHJR21znBTqJFdU3b"]} -{"Format": "IDEA0", "ID": "cb7f6edb-bee1-428c-add7-64fd2304d39c", "DetectTime": "2023-10-30T14:08:17.523171+02:00", "EventTime": "2023-10-30T14:08:17.523188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CiJAXQ2dIYhauMjYyg"]} -{"Format": "IDEA0", "ID": "c09bcb9e-fbee-4a5b-b4bc-ab44f2e7bf70", "DetectTime": "2023-10-30T14:08:17.544946+02:00", "EventTime": "2023-10-30T14:08:17.544960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C6na8N3wSJfGiwTHa3"]} -{"Format": "IDEA0", "ID": "77177e72-600c-4d5d-97df-6bc29e6d475c", "DetectTime": "2023-10-30T14:08:17.576474+02:00", "EventTime": "2023-10-30T14:08:17.576491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CIbxzSv02ehp274td"]} -{"Format": "IDEA0", "ID": "ba3cf284-60a7-47b6-9293-61611c174288", "DetectTime": "2023-10-30T14:08:17.607778+02:00", "EventTime": "2023-10-30T14:08:17.607794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CZ8HRr25746HzDwedi"]} -{"Format": "IDEA0", "ID": "f0cfbd02-08c1-4d56-a651-00390e6015db", "DetectTime": "2023-10-30T14:08:17.639419+02:00", "EventTime": "2023-10-30T14:08:17.639430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CpOKIk39QuXSLLeN69"]} -{"Format": "IDEA0", "ID": "f03ae16f-caa7-4fab-b29b-9e5a5a0371fa", "DetectTime": "2023-10-30T14:08:17.669274+02:00", "EventTime": "2023-10-30T14:08:17.669289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2848], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. ", "ContentType": "text/plain"}], "uids": ["CzdAKb3L6HxQUPvVad"]} -{"Format": "IDEA0", "ID": "fd397df0-c949-4966-b0f2-4e0085d125d7", "DetectTime": "2023-10-30T14:08:17.700493+02:00", "EventTime": "2023-10-30T14:08:17.700505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CXetba3s6R8ngM7o2"]} -{"Format": "IDEA0", "ID": "8e8c3f7d-c83c-46fd-ba86-bfd0566a84ef", "DetectTime": "2023-10-30T14:08:17.725872+02:00", "EventTime": "2023-10-30T14:08:17.725888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4587], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. ", "ContentType": "text/plain"}], "uids": ["CiTH5N3qC2M6oZzCQ6"]} -{"Format": "IDEA0", "ID": "5eccfd17-a2cf-4203-b1d9-752003a708dd", "DetectTime": "2023-10-30T14:08:17.759644+02:00", "EventTime": "2023-10-30T14:08:17.759656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["Co0CJUBYoWUVfvlTe"]} -{"Format": "Json", "ID": "5eccfd17-a2cf-4203-b1d9-752003a708dd", "DetectTime": "2023-10-30T14:08:17.759644+02:00", "EventTime": "2023-10-30T14:08:17.759656+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:51:39.569763+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:17.833070)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5b739f69-be01-4f7a-9176-0da0e0ba9b8d", "DetectTime": "2023-10-30T14:08:17.837147+02:00", "EventTime": "2023-10-30T14:08:17.837158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8564], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. ", "ContentType": "text/plain"}], "uids": ["CSvpuR2k2woN4kRlYa"]} -{"Format": "IDEA0", "ID": "b6e8731c-29b7-49be-a778-ee19cd571b8d", "DetectTime": "2023-10-30T14:08:17.875087+02:00", "EventTime": "2023-10-30T14:08:17.875107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CfyO2f2vASz15jTJQ2"]} -{"Format": "IDEA0", "ID": "c483b41e-35ee-4b49-9f3a-421765e303dc", "DetectTime": "2023-10-30T14:08:17.914450+02:00", "EventTime": "2023-10-30T14:08:17.914469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. ", "ContentType": "text/plain"}], "uids": ["CU1dTO1ndpfBE6akKg"]} -{"Format": "IDEA0", "ID": "5ce17df7-56bb-439d-a2a2-bfb36b9ef6e3", "DetectTime": "2023-10-30T14:08:17.941759+02:00", "EventTime": "2023-10-30T14:08:17.941776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C8awIsW1NiYszyqVi"]} -{"Format": "IDEA0", "ID": "9db61c5c-7879-4351-a209-c3d34f7fa107", "DetectTime": "2023-10-30T14:08:17.975581+02:00", "EventTime": "2023-10-30T14:08:17.975599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7154], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. ", "ContentType": "text/plain"}], "uids": ["CBmEKB3MAal2OdYunc"]} -{"Format": "IDEA0", "ID": "d4f0b026-088d-4117-a623-5338a9466bf5", "DetectTime": "2023-10-30T14:08:18.007143+02:00", "EventTime": "2023-10-30T14:08:18.007164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C3cLEF3TMBXiHpCTD4"]} -{"Format": "IDEA0", "ID": "128affc3-a48a-452e-8b48-3020f5de7e40", "DetectTime": "2023-10-30T14:08:18.045079+02:00", "EventTime": "2023-10-30T14:08:18.045100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CBGvpG3mtBaA0MSyQe"]} -{"Format": "IDEA0", "ID": "5265d93c-73f7-40fa-aa9b-ebbcbaab6f03", "DetectTime": "2023-10-30T14:08:18.071737+02:00", "EventTime": "2023-10-30T14:08:18.071753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CG4wi6CePhU1ivXj"]} -{"Format": "IDEA0", "ID": "08993d9d-865d-40ad-a688-37039918b4b1", "DetectTime": "2023-10-30T14:08:18.108715+02:00", "EventTime": "2023-10-30T14:08:18.108731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Ckva561pPThs6wi3Eb"]} -{"Format": "Json", "ID": "08993d9d-865d-40ad-a688-37039918b4b1", "DetectTime": "2023-10-30T14:08:18.108715+02:00", "EventTime": "2023-10-30T14:08:18.108731+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:51:36.656194+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:18.182384)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c03d48b5-956a-4305-a831-eeb63f7a2784", "DetectTime": "2023-10-30T14:08:18.186647+02:00", "EventTime": "2023-10-30T14:08:18.186664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CWpZwN3gL5vkppJkzd"]} -{"Format": "IDEA0", "ID": "e5fe1c75-8bec-487a-90f2-e89dfe138bc4", "DetectTime": "2023-10-30T14:08:18.220329+02:00", "EventTime": "2023-10-30T14:08:18.220344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CDRUrE3i02kXjpnitc"]} -{"Format": "IDEA0", "ID": "df80bcf3-fb18-4c8c-bcb0-b31cb6473454", "DetectTime": "2023-10-30T14:08:18.254306+02:00", "EventTime": "2023-10-30T14:08:18.254328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CBw1bx4nUwXOyhoYd1"]} -{"Format": "IDEA0", "ID": "e9b93f94-0ff5-400b-914e-5e1923c1f9d4", "DetectTime": "2023-10-30T14:08:18.284325+02:00", "EventTime": "2023-10-30T14:08:18.284336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. ", "ContentType": "text/plain"}], "uids": ["Ccu8jw38IASswDOysb"]} -{"Format": "IDEA0", "ID": "c6dd1760-db6b-4e60-9182-fc4f7ff113c7", "DetectTime": "2023-10-30T14:08:18.314044+02:00", "EventTime": "2023-10-30T14:08:18.314055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C5bRF2ptjlcT3C5w"]} -{"Format": "IDEA0", "ID": "50644d37-277a-4a52-8937-d790dbeb99b5", "DetectTime": "2023-10-30T14:08:18.344361+02:00", "EventTime": "2023-10-30T14:08:18.344373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CSrSJn1KWEcZJnmzdh"]} -{"Format": "IDEA0", "ID": "e4367773-356f-41d6-9fef-2f060cecd022", "DetectTime": "2023-10-30T14:08:18.372326+02:00", "EventTime": "2023-10-30T14:08:18.372345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CbmVieoP3aoxIllZ2"]} -{"Format": "IDEA0", "ID": "02371868-5268-4877-a4d6-7c1bc609bffe", "DetectTime": "2023-10-30T14:08:18.403431+02:00", "EventTime": "2023-10-30T14:08:18.403444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CnXokS2XMGkp8wU0k3"]} -{"Format": "IDEA0", "ID": "b13c620c-da08-4fde-887b-032c681f7289", "DetectTime": "2023-10-30T14:08:18.422447+02:00", "EventTime": "2023-10-30T14:08:18.422463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CSceks1JqgHdv51Grg"]} -{"Format": "Json", "ID": "b13c620c-da08-4fde-887b-032c681f7289", "DetectTime": "2023-10-30T14:08:18.422447+02:00", "EventTime": "2023-10-30T14:08:18.422463+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:51:40.987917+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:18.492457)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e7ff35d-e783-4ac5-9e9d-54cbc494599b", "DetectTime": "2023-10-30T14:08:18.497884+02:00", "EventTime": "2023-10-30T14:08:18.497900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CGniZ545Naqfh0LWge"]} -{"Format": "IDEA0", "ID": "7b25c809-49d8-4d1e-944e-a8c728d96462", "DetectTime": "2023-10-30T14:08:18.525361+02:00", "EventTime": "2023-10-30T14:08:18.525373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C90sSq2zgy9xooMSP3"]} -{"Format": "IDEA0", "ID": "97a73891-7e82-4272-af25-37a7ba92c5e4", "DetectTime": "2023-10-30T14:08:18.569399+02:00", "EventTime": "2023-10-30T14:08:18.569413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27014], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. ", "ContentType": "text/plain"}], "uids": ["Cyvy1f7HxnBpz77rh"]} -{"Format": "IDEA0", "ID": "9c84e2b2-fb1a-405f-b9a9-bf7886d10d38", "DetectTime": "2023-10-30T14:08:18.593014+02:00", "EventTime": "2023-10-30T14:08:18.593027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CNwqae24wDZWhLQAMg"]} -{"Format": "IDEA0", "ID": "ad9de5f7-4acf-4ceb-86e0-dcc25864a9f2", "DetectTime": "2023-10-30T14:08:18.613222+02:00", "EventTime": "2023-10-30T14:08:18.613241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CbPP511L2fDA5upOG6"]} -{"Format": "IDEA0", "ID": "4f25b699-89e2-4c8d-aa82-7b3c9b9fb547", "DetectTime": "2023-10-30T14:08:18.645153+02:00", "EventTime": "2023-10-30T14:08:18.645178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CP6imAftyehcW97pa"]} -{"Format": "IDEA0", "ID": "a9a58213-ffa4-4265-90d7-c60dba7bec6c", "DetectTime": "2023-10-30T14:08:18.663131+02:00", "EventTime": "2023-10-30T14:08:18.663148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13676], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. ", "ContentType": "text/plain"}], "uids": ["CRPSAA1Z9dng2IoLlg"]} -{"Format": "IDEA0", "ID": "db7b823e-34f2-4e25-b812-cf3e6fd69b47", "DetectTime": "2023-10-30T14:08:18.696496+02:00", "EventTime": "2023-10-30T14:08:18.696517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12372], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12372/UDP destination IP 117.198.166.22. ", "ContentType": "text/plain"}], "uids": ["C6IjYMqqrRL4MmWJe"]} -{"Format": "IDEA0", "ID": "7c5e2a62-5948-46c2-aaa2-d5eea39d324f", "DetectTime": "2023-10-30T14:08:18.731993+02:00", "EventTime": "2023-10-30T14:08:18.732010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CRJyfW18vC807qnd92"]} -{"Format": "IDEA0", "ID": "79ba6ab5-dd3d-4eb1-8100-4eed99de6410", "DetectTime": "2023-10-30T14:08:18.770239+02:00", "EventTime": "2023-10-30T14:08:18.770259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9329/UDP destination IP 41.201.91.219. ", "ContentType": "text/plain"}], "uids": ["CEwEgIpYu7RUabhA5"]} -{"Format": "Json", "ID": "79ba6ab5-dd3d-4eb1-8100-4eed99de6410", "DetectTime": "2023-10-30T14:08:18.770239+02:00", "EventTime": "2023-10-30T14:08:18.770259+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:54:08.217794+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:18.838074)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7534b1d5-6873-4a45-a783-7fea4ce0621a", "DetectTime": "2023-10-30T14:08:18.843838+02:00", "EventTime": "2023-10-30T14:08:18.843857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7682], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 172.5.194.234. ", "ContentType": "text/plain"}], "uids": ["C4jcS62aYHjKtTI4Wj"]} -{"Format": "IDEA0", "ID": "55605105-b04d-4496-b876-8b2737178274", "DetectTime": "2023-10-30T14:08:18.872864+02:00", "EventTime": "2023-10-30T14:08:18.872877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CsU7022doNgXNrTdol"]} -{"Format": "IDEA0", "ID": "e728cf4a-b8ae-4dbb-9155-06e8fcd53dbd", "DetectTime": "2023-10-30T14:08:18.900560+02:00", "EventTime": "2023-10-30T14:08:18.900584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CnTRVSq2S7yh2K2U8"]} -{"Format": "IDEA0", "ID": "5809ede5-67bc-421e-ac98-c25bbe98732e", "DetectTime": "2023-10-30T14:08:18.941348+02:00", "EventTime": "2023-10-30T14:08:18.941369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12251/UDP destination IP 199.7.114.218. ", "ContentType": "text/plain"}], "uids": ["CenTRS394WE2Kmvjdd"]} -{"Format": "IDEA0", "ID": "fab7be55-f828-44d0-94af-92b43aa8c59d", "DetectTime": "2023-10-30T14:08:18.970441+02:00", "EventTime": "2023-10-30T14:08:18.970454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CxaJ842u4pYaFsGlEb"]} -{"Format": "IDEA0", "ID": "257bdbbe-efbb-43f1-a4ad-664866582619", "DetectTime": "2023-10-30T14:08:18.996036+02:00", "EventTime": "2023-10-30T14:08:18.996053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["C4UxV5Vb70MBaOT0c"]} -{"Format": "IDEA0", "ID": "d47c8dc1-1bb5-4677-9d99-f06aec9217f0", "DetectTime": "2023-10-30T14:08:19.020345+02:00", "EventTime": "2023-10-30T14:08:19.020359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CEC6ZVLhXNNtLMsXj"]} -{"Format": "IDEA0", "ID": "41553e97-20f7-4876-8de0-d8f4b6f76082", "DetectTime": "2023-10-30T14:08:19.055937+02:00", "EventTime": "2023-10-30T14:08:19.055968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CgYgsq29AgdAPjOw79"]} -{"Format": "IDEA0", "ID": "66d99baf-8248-40b1-a324-a7dedcdefbc5", "DetectTime": "2023-10-30T14:08:19.098036+02:00", "EventTime": "2023-10-30T14:08:19.098050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cq8gq41MVBlbRaSz6i"]} -{"Format": "IDEA0", "ID": "672c7b47-28b1-411e-85f4-7694c2ddd089", "DetectTime": "2023-10-30T14:08:19.126584+02:00", "EventTime": "2023-10-30T14:08:19.126600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["CWSs9e39J9BDcIEINf"]} -{"Format": "Json", "ID": "672c7b47-28b1-411e-85f4-7694c2ddd089", "DetectTime": "2023-10-30T14:08:19.126584+02:00", "EventTime": "2023-10-30T14:08:19.126600+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:55:34.175053+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:19.187716)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54ee18d0-4676-4e60-beae-d12b0f100283", "DetectTime": "2023-10-30T14:08:19.193678+02:00", "EventTime": "2023-10-30T14:08:19.193697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["C7yR4HKaUEATyj1jb"]} -{"Format": "IDEA0", "ID": "fd298c5a-6083-4233-bb06-1c4390e2b27c", "DetectTime": "2023-10-30T14:08:19.223527+02:00", "EventTime": "2023-10-30T14:08:19.223548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["Ctkz0p4mpzeHodPSdj"]} -{"Format": "IDEA0", "ID": "4eecb3a5-0196-40c8-b463-6a3064b55730", "DetectTime": "2023-10-30T14:08:19.250334+02:00", "EventTime": "2023-10-30T14:08:19.250351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CN5VKE2smkWsf8kAQ7"]} -{"Format": "IDEA0", "ID": "914abf71-d33c-4e60-a432-85bb6c97ecd7", "DetectTime": "2023-10-30T14:08:19.277122+02:00", "EventTime": "2023-10-30T14:08:19.277143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CeRYIl3NE8gn295Rxf"]} -{"Format": "IDEA0", "ID": "9d456787-c61b-4492-956b-b0bb95f193a7", "DetectTime": "2023-10-30T14:08:19.304787+02:00", "EventTime": "2023-10-30T14:08:19.304799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6367], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6367/UDP destination IP 46.49.50.155. ", "ContentType": "text/plain"}], "uids": ["CfvLu331ODFeXV1Fd1"]} -{"Format": "IDEA0", "ID": "23d7f1ea-96d5-434a-a406-811fab762d22", "DetectTime": "2023-10-30T14:08:19.323794+02:00", "EventTime": "2023-10-30T14:08:19.323808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CsPImt3VmPit7ljvjb"]} -{"Format": "IDEA0", "ID": "f34e9be9-b96f-42ca-bf6a-75dc93515e93", "DetectTime": "2023-10-30T14:08:19.350482+02:00", "EventTime": "2023-10-30T14:08:19.350498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. ", "ContentType": "text/plain"}], "uids": ["CYm6q2c7lpYmJ5Zo4"]} -{"Format": "IDEA0", "ID": "b690b406-4b49-4fcf-b718-d95e2523edaf", "DetectTime": "2023-10-30T14:08:19.378912+02:00", "EventTime": "2023-10-30T14:08:19.378933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CTzfLE46XwmumchBEf"]} -{"Format": "IDEA0", "ID": "7cc53687-77ea-40aa-8cd6-c53436f61fcb", "DetectTime": "2023-10-30T14:08:19.406288+02:00", "EventTime": "2023-10-30T14:08:19.406309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CidhqH3v7r2N2V4Vuc"]} -{"Format": "IDEA0", "ID": "b2bd4c94-28d6-4474-a135-b934eb149c78", "DetectTime": "2023-10-30T14:08:19.430214+02:00", "EventTime": "2023-10-30T14:08:19.430225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CRt8uL17Ey7A7CBQJ6"]} -{"Format": "Json", "ID": "b2bd4c94-28d6-4474-a135-b934eb149c78", "DetectTime": "2023-10-30T14:08:19.430214+02:00", "EventTime": "2023-10-30T14:08:19.430225+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T20:58:47.494706+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2023/10/30 14:08:19.490028)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "59421659-27a9-4b2f-834f-20b673772d0e", "DetectTime": "2023-10-30T14:08:19.494908+02:00", "EventTime": "2023-10-30T14:08:19.494926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CJTpUM26UQoasvcGkh"]} -{"Format": "IDEA0", "ID": "6c312d0b-54dd-49a6-a92f-ed10a7519641", "DetectTime": "2023-10-30T14:08:19.518828+02:00", "EventTime": "2023-10-30T14:08:19.518847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["CIQdQi4jbOiewUiKX8"]} -{"Format": "IDEA0", "ID": "c528122d-acfb-4d6f-8817-28311ebcb13b", "DetectTime": "2023-10-30T14:08:19.539185+02:00", "EventTime": "2023-10-30T14:08:19.539196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CbTEEy1pXyQk6iv55j"]} -{"Format": "IDEA0", "ID": "d14188fc-14f0-40ca-8939-aedbf8fd1867", "DetectTime": "2023-10-30T14:08:19.558016+02:00", "EventTime": "2023-10-30T14:08:19.558027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9820/UDP destination IP 88.135.199.117. ", "ContentType": "text/plain"}], "uids": ["CpoaSx4RqR9qjANK28"]} -{"Format": "IDEA0", "ID": "1ac3e512-1965-48e5-9d47-fecf23120cf0", "DetectTime": "2023-10-30T14:08:19.582377+02:00", "EventTime": "2023-10-30T14:08:19.582388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["Czfp4t4HGCytUqDRFb"]} -{"Format": "IDEA0", "ID": "eb2b246a-7cbd-42ca-960f-2beaf7326c88", "DetectTime": "2023-10-30T14:08:19.613147+02:00", "EventTime": "2023-10-30T14:08:19.613164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26707], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26707/UDP destination IP 85.75.97.132. ", "ContentType": "text/plain"}], "uids": ["CLWEnY3MLnSVxW4N9"]} -{"Format": "IDEA0", "ID": "b8053ecb-7f46-43dd-a1de-6b278f01c0f7", "DetectTime": "2023-10-30T14:08:19.645699+02:00", "EventTime": "2023-10-30T14:08:19.645719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14576], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. ", "ContentType": "text/plain"}], "uids": ["Ct2C73000rKIApf27"]} -{"Format": "IDEA0", "ID": "38acccb8-0fbe-4e41-ac39-dd506cecb881", "DetectTime": "2023-10-30T14:08:19.671185+02:00", "EventTime": "2023-10-30T14:08:19.671197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CW0wqu3yE7z973gPk"]} -{"Format": "IDEA0", "ID": "1e0e72e7-f70c-4e13-be2c-f4b3dec6ca73", "DetectTime": "2023-10-30T14:08:19.697697+02:00", "EventTime": "2023-10-30T14:08:19.697712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29927], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29927/UDP destination IP 187.233.248.248. ", "ContentType": "text/plain"}], "uids": ["C1jemp2KwMUec0NTYc"]} -{"Format": "IDEA0", "ID": "6c88f642-6fa5-430d-9aac-8b901211b9b2", "DetectTime": "2023-10-30T14:08:19.731578+02:00", "EventTime": "2023-10-30T14:08:19.731596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["CZSTMt3MYqpHx8T46i"]} -{"Format": "IDEA0", "ID": "34355396-6c87-48dc-8c46-685e5f13ab3b", "DetectTime": "2023-10-30T14:08:19.759775+02:00", "EventTime": "2023-10-30T14:08:19.759788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["Cp1VOF2cYlrTUwZz0j"]} -{"Format": "IDEA0", "ID": "a554f2ff-9089-4865-8b11-4a959641a320", "DetectTime": "2023-10-30T14:08:19.779400+02:00", "EventTime": "2023-10-30T14:08:19.779412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C2rmo3DDKE0ASiBXg"]} -{"Format": "IDEA0", "ID": "7c3b65be-d508-4f86-8ead-127dd9eecbd0", "DetectTime": "2023-10-30T14:08:19.812629+02:00", "EventTime": "2023-10-30T14:08:19.812649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3712], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3712/UDP destination IP 5.178.196.83. ", "ContentType": "text/plain"}], "uids": ["C1UK4r3BVgp29ZT989"]} -{"Format": "Json", "ID": "7c3b65be-d508-4f86-8ead-127dd9eecbd0", "DetectTime": "2023-10-30T14:08:19.812629+02:00", "EventTime": "2023-10-30T14:08:19.812649+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3712], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:02:43.203373+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:19.893633)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "602acbd2-da0a-47f2-bd69-4745a858000b", "DetectTime": "2023-10-30T14:08:19.897680+02:00", "EventTime": "2023-10-30T14:08:19.897691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CJ5rgGFZBoCQsqoj5"]} -{"Format": "IDEA0", "ID": "9f419070-777e-4a51-aead-f8de7363ed1e", "DetectTime": "2023-10-30T14:08:19.929814+02:00", "EventTime": "2023-10-30T14:08:19.929836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CaguVe1Lhle5Vf0az3"]} -{"Format": "IDEA0", "ID": "4933eb62-c535-4dab-bbd1-3813dab32fe5", "DetectTime": "2023-10-30T14:08:19.963703+02:00", "EventTime": "2023-10-30T14:08:19.963717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C8sY05KQ32iWShzMl"]} -{"Format": "IDEA0", "ID": "3b7623b0-f640-4d40-b482-b560f579ae56", "DetectTime": "2023-10-30T14:08:19.992358+02:00", "EventTime": "2023-10-30T14:08:19.992380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C1zKwZ3eMVOny5zOc4"]} -{"Format": "IDEA0", "ID": "01032cc6-2cc8-4935-918b-25839f60ff5b", "DetectTime": "2023-10-30T14:08:20.019358+02:00", "EventTime": "2023-10-30T14:08:20.019370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["COIMx63Q3H1UqTm2j9"]} -{"Format": "IDEA0", "ID": "bfc8c520-aa2e-4fa3-aaaa-f6ea0e34f35c", "DetectTime": "2023-10-30T14:08:20.040917+02:00", "EventTime": "2023-10-30T14:08:20.040933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CXcre24qs91mA5o9Yl"]} -{"Format": "IDEA0", "ID": "d5ba2881-f917-4311-968d-9d05b76084bf", "DetectTime": "2023-10-30T14:08:20.075562+02:00", "EventTime": "2023-10-30T14:08:20.075579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Con2dX37BNnAMMQzzb"]} -{"Format": "IDEA0", "ID": "d96fac8e-18fd-424e-b55a-a0c88257138d", "DetectTime": "2023-10-30T14:08:20.113295+02:00", "EventTime": "2023-10-30T14:08:20.113319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Ca0bgv1KQ9SNiylz36"]} -{"Format": "IDEA0", "ID": "5028eae0-6aff-43a5-939d-90d880f050eb", "DetectTime": "2023-10-30T14:08:20.149645+02:00", "EventTime": "2023-10-30T14:08:20.149664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CgM5i64ts8BWqzxUG1"]} -{"Format": "Json", "ID": "5028eae0-6aff-43a5-939d-90d880f050eb", "DetectTime": "2023-10-30T14:08:20.149645+02:00", "EventTime": "2023-10-30T14:08:20.149664+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:32:49.275441+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:20.212010)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e08beaf0-859a-4646-b9bc-1a71ea6bdb55", "DetectTime": "2023-10-30T14:08:20.217406+02:00", "EventTime": "2023-10-30T14:08:20.217423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CF6ge63CjqSGOtokWh"]} -{"Format": "IDEA0", "ID": "84982733-d06e-41a8-bbd5-8d9f1876c289", "DetectTime": "2023-10-30T14:08:20.246215+02:00", "EventTime": "2023-10-30T14:08:20.246233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cz4uje3Lh2Iv4VlYVd"]} -{"Format": "IDEA0", "ID": "7aabf981-fe92-4af5-9eed-2166ae4f8961", "DetectTime": "2023-10-30T14:08:20.274332+02:00", "EventTime": "2023-10-30T14:08:20.274348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C01SOy3FA749myEiJ8"]} -{"Format": "IDEA0", "ID": "41dbdfc5-e27c-43f3-9a4d-72f4697074ad", "DetectTime": "2023-10-30T14:08:20.306050+02:00", "EventTime": "2023-10-30T14:08:20.306066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CzQqi9UDYKUDvnih8"]} -{"Format": "IDEA0", "ID": "95782d93-e7a2-48de-90fe-c663880e68b5", "DetectTime": "2023-10-30T14:08:20.336268+02:00", "EventTime": "2023-10-30T14:08:20.336283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRNTWo1bzngReleT7"]} -{"Format": "IDEA0", "ID": "01527394-91af-458c-b569-1a483b9c2d34", "DetectTime": "2023-10-30T14:08:20.364602+02:00", "EventTime": "2023-10-30T14:08:20.364644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CJDUAx3C1gG0uHtVpk"]} -{"Format": "IDEA0", "ID": "049f44d4-7e72-4c62-98d8-a18ad0aed084", "DetectTime": "2023-10-30T14:08:20.390850+02:00", "EventTime": "2023-10-30T14:08:20.390868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CYO95X3DUck15algCj"]} -{"Format": "IDEA0", "ID": "3646f66b-c991-4770-a759-97b481281182", "DetectTime": "2023-10-30T14:08:20.421034+02:00", "EventTime": "2023-10-30T14:08:20.421047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C6QTRE44RcktGvi5nd"]} -{"Format": "IDEA0", "ID": "f75c45ce-10c2-4b78-b742-e36250413081", "DetectTime": "2023-10-30T14:08:20.449782+02:00", "EventTime": "2023-10-30T14:08:20.449798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CBhCVM2xImlzMocF8"]} -{"Format": "IDEA0", "ID": "dd73361d-7c20-40db-9242-2156ba152e1b", "DetectTime": "2023-10-30T14:08:20.478516+02:00", "EventTime": "2023-10-30T14:08:20.478534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CcTm5a3ztxPW2ge5L9"]} -{"Format": "Json", "ID": "dd73361d-7c20-40db-9242-2156ba152e1b", "DetectTime": "2023-10-30T14:08:20.478516+02:00", "EventTime": "2023-10-30T14:08:20.478534+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:32:51.182856+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:20.539736)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1d28ee84-8ea3-4a0d-8c7d-99cc26827998", "DetectTime": "2023-10-30T14:08:20.545037+02:00", "EventTime": "2023-10-30T14:08:20.545064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CTLuQD1rp8NRictHMj"]} -{"Format": "IDEA0", "ID": "1fc9b105-e9c1-46e4-a0bd-c5ff300255b3", "DetectTime": "2023-10-30T14:08:20.577754+02:00", "EventTime": "2023-10-30T14:08:20.577774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIi1tv4SFAv24A6Dgf"]} -{"Format": "IDEA0", "ID": "aa2dd148-0f75-4fef-be3d-370e6c2a194b", "DetectTime": "2023-10-30T14:08:20.602162+02:00", "EventTime": "2023-10-30T14:08:20.602185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CiQmqS11ASi1FtEzLk"]} -{"Format": "IDEA0", "ID": "a10d1fea-89b7-48d6-ae7d-2391688e94a1", "DetectTime": "2023-10-30T14:08:20.626023+02:00", "EventTime": "2023-10-30T14:08:20.626034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CsViBT3wVkVbAMiwz4"]} -{"Format": "IDEA0", "ID": "f687dff5-7df6-41e3-a542-88d7bb2e8d19", "DetectTime": "2023-10-30T14:08:20.654642+02:00", "EventTime": "2023-10-30T14:08:20.654654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27014], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. ", "ContentType": "text/plain"}], "uids": ["CRJBPt43zNYSTgWAbl"]} -{"Format": "IDEA0", "ID": "8201d81b-6924-4d78-9ce9-f4ff1e609187", "DetectTime": "2023-10-30T14:08:20.681433+02:00", "EventTime": "2023-10-30T14:08:20.681449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CP2s4COq7qjSN3u35"]} -{"Format": "IDEA0", "ID": "dba5439c-df29-4af6-b128-6df7d9bafc93", "DetectTime": "2023-10-30T14:08:20.708109+02:00", "EventTime": "2023-10-30T14:08:20.708126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12372], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12372/UDP destination IP 117.198.166.22. ", "ContentType": "text/plain"}], "uids": ["Cz5RlU2mLxmXM3Cfke"]} -{"Format": "IDEA0", "ID": "1bdd2503-102b-4acb-927f-bb4fd84c7d44", "DetectTime": "2023-10-30T14:08:20.733132+02:00", "EventTime": "2023-10-30T14:08:20.733144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13676], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. ", "ContentType": "text/plain"}], "uids": ["CrK9a9phqLJTh1Srl"]} -{"Format": "IDEA0", "ID": "125ea50e-2a4d-4b97-bf58-1240004abee9", "DetectTime": "2023-10-30T14:08:20.763310+02:00", "EventTime": "2023-10-30T14:08:20.763337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9329], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9329/UDP destination IP 41.201.91.219. ", "ContentType": "text/plain"}], "uids": ["C6J8Q34O1agv4MOlU5"]} -{"Format": "Json", "ID": "125ea50e-2a4d-4b97-bf58-1240004abee9", "DetectTime": "2023-10-30T14:08:20.763310+02:00", "EventTime": "2023-10-30T14:08:20.763337+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9329], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:33:10.168489+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:20.827137)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a158b74e-6c56-44e6-a0ad-b445e8751475", "DetectTime": "2023-10-30T14:08:20.831407+02:00", "EventTime": "2023-10-30T14:08:20.831418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CZUFbh2rmbuaFaRDze"]} -{"Format": "IDEA0", "ID": "d101c247-1fcd-49aa-8aca-d2dee12b1fa2", "DetectTime": "2023-10-30T14:08:20.856350+02:00", "EventTime": "2023-10-30T14:08:20.856367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2921], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. ", "ContentType": "text/plain"}], "uids": ["CCQ0snXQPeyiB3171"]} -{"Format": "IDEA0", "ID": "0556124a-5740-4c63-9cc2-34938fa954a0", "DetectTime": "2023-10-30T14:08:20.879963+02:00", "EventTime": "2023-10-30T14:08:20.879987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["C28i1q2pDxcgbtPiSl"]} -{"Format": "IDEA0", "ID": "bb93b876-4578-426b-8e87-d6d4d572a6df", "DetectTime": "2023-10-30T14:08:20.905841+02:00", "EventTime": "2023-10-30T14:08:20.905861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12251], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12251/UDP destination IP 199.7.114.218. ", "ContentType": "text/plain"}], "uids": ["Cw08nY0rlYsQS2rOk"]} -{"Format": "IDEA0", "ID": "f8215239-bba4-4890-9d73-06e424b788de", "DetectTime": "2023-10-30T14:08:20.930233+02:00", "EventTime": "2023-10-30T14:08:20.930245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CqFn133Q65PjlDngte"]} -{"Format": "IDEA0", "ID": "0c772ce8-0653-4c0a-a506-40d6a2d676aa", "DetectTime": "2023-10-30T14:08:20.955026+02:00", "EventTime": "2023-10-30T14:08:20.955044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CwtEzQuI4Jfx49BI6"]} -{"Format": "IDEA0", "ID": "5e121211-f878-4f8f-8701-65144c86b508", "DetectTime": "2023-10-30T14:08:20.988287+02:00", "EventTime": "2023-10-30T14:08:20.988304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["C19Vc3194EwQkHhHhl"]} -{"Format": "IDEA0", "ID": "3851618f-0d50-4cf6-9f66-12eba9a5a2c7", "DetectTime": "2023-10-30T14:08:21.017477+02:00", "EventTime": "2023-10-30T14:08:21.017494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["CF8yU14T02B5ketWb"]} -{"Format": "IDEA0", "ID": "637e88c5-c8f9-48a6-a2a3-d8e7420cb015", "DetectTime": "2023-10-30T14:08:21.041113+02:00", "EventTime": "2023-10-30T14:08:21.041135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["COwftW24FLG8UQfMwk"]} -{"Format": "Json", "ID": "637e88c5-c8f9-48a6-a2a3-d8e7420cb015", "DetectTime": "2023-10-30T14:08:21.041113+02:00", "EventTime": "2023-10-30T14:08:21.041135+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:33:11.982115+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:21.101345)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0655a4b7-f8c5-4e39-837b-666627bba035", "DetectTime": "2023-10-30T14:08:21.106340+02:00", "EventTime": "2023-10-30T14:08:21.106356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CUVt4E1iuftnWL4Mv4"]} -{"Format": "IDEA0", "ID": "1a5949be-4511-457b-a831-9c825a89cc91", "DetectTime": "2023-10-30T14:08:21.127428+02:00", "EventTime": "2023-10-30T14:08:21.127448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CK9oKP3B5tc5RiwmX5"]} -{"Format": "IDEA0", "ID": "3bfc9863-3681-41ea-b28d-d9402a6b955e", "DetectTime": "2023-10-30T14:08:21.152511+02:00", "EventTime": "2023-10-30T14:08:21.152529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["CrVM1i1sf3IgNCUJqf"]} -{"Format": "IDEA0", "ID": "f4238184-07d3-4c6e-ac5b-d083efb4d213", "DetectTime": "2023-10-30T14:08:21.176020+02:00", "EventTime": "2023-10-30T14:08:21.176048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C2FzVV33EVjZ0gMe5i"]} -{"Format": "IDEA0", "ID": "cb56c18d-42aa-460f-8fe4-02161d08ca5f", "DetectTime": "2023-10-30T14:08:21.199880+02:00", "EventTime": "2023-10-30T14:08:21.199913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6367], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6367/UDP destination IP 46.49.50.155. ", "ContentType": "text/plain"}], "uids": ["CBTukFXcioNSeqREj"]} -{"Format": "IDEA0", "ID": "a9c799c4-679a-4ff1-9573-a1f72337fe69", "DetectTime": "2023-10-30T14:08:21.222796+02:00", "EventTime": "2023-10-30T14:08:21.222813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CQTFVG2jqGnSpSn8Ra"]} -{"Format": "IDEA0", "ID": "9c102efb-2655-4f13-b942-ff09d4271625", "DetectTime": "2023-10-30T14:08:21.247451+02:00", "EventTime": "2023-10-30T14:08:21.247475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. ", "ContentType": "text/plain"}], "uids": ["C9W9mcNRX3h94fFNh"]} -{"Format": "IDEA0", "ID": "74edd9e8-d7c8-4319-a79b-542f6a5a82c4", "DetectTime": "2023-10-30T14:08:21.269471+02:00", "EventTime": "2023-10-30T14:08:21.269483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CFnWtK3hGkBAnawmRk"]} -{"Format": "IDEA0", "ID": "eac26313-8889-42d0-b507-e6fde3098d4b", "DetectTime": "2023-10-30T14:08:21.292422+02:00", "EventTime": "2023-10-30T14:08:21.292438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["ChM2r03MbTc9XbxiWl"]} -{"Format": "Json", "ID": "eac26313-8889-42d0-b507-e6fde3098d4b", "DetectTime": "2023-10-30T14:08:21.292422+02:00", "EventTime": "2023-10-30T14:08:21.292438+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:33:13.771303+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:21.358081)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "09eb71d7-67d7-4a65-8f4f-5f9128926bfe", "DetectTime": "2023-10-30T14:08:21.363622+02:00", "EventTime": "2023-10-30T14:08:21.363641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["CKZUuA2EfIz4cEUEV8"]} -{"Format": "IDEA0", "ID": "0486995e-2ad6-461e-a8c3-4a59c7de151b", "DetectTime": "2023-10-30T14:08:21.387221+02:00", "EventTime": "2023-10-30T14:08:21.387240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C4yV274Di7FukBjg9e"]} -{"Format": "IDEA0", "ID": "4a2c9388-76be-4a50-b592-773b277ccb91", "DetectTime": "2023-10-30T14:08:21.411545+02:00", "EventTime": "2023-10-30T14:08:21.411563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CxOeHmhK93fqcBOac"]} -{"Format": "IDEA0", "ID": "229e4aa3-414b-4494-a956-c4b32c41dcb3", "DetectTime": "2023-10-30T14:08:21.431965+02:00", "EventTime": "2023-10-30T14:08:21.431983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9820/UDP destination IP 88.135.199.117. ", "ContentType": "text/plain"}], "uids": ["CQG5GE3PKERIk5CxYf"]} -{"Format": "IDEA0", "ID": "cd74988a-30f4-4052-a3bb-1a3b874ea936", "DetectTime": "2023-10-30T14:08:21.452819+02:00", "EventTime": "2023-10-30T14:08:21.452829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CpYTAi1MmPo7oQkeP6"]} -{"Format": "IDEA0", "ID": "ed4f5267-3783-4d1c-9f9f-0bef962e7d47", "DetectTime": "2023-10-30T14:08:21.472773+02:00", "EventTime": "2023-10-30T14:08:21.472795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26707], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26707/UDP destination IP 85.75.97.132. ", "ContentType": "text/plain"}], "uids": ["ClvJvj3WtQF8UhleDk"]} -{"Format": "IDEA0", "ID": "156b16ac-719b-452f-b2ce-b416d431b221", "DetectTime": "2023-10-30T14:08:21.497085+02:00", "EventTime": "2023-10-30T14:08:21.497103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14576], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. ", "ContentType": "text/plain"}], "uids": ["CXA3Jfy3cmH0TneN"]} -{"Format": "IDEA0", "ID": "ef700931-8811-4f06-adf3-91ee188b38a7", "DetectTime": "2023-10-30T14:08:21.516816+02:00", "EventTime": "2023-10-30T14:08:21.516831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29927], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29927/UDP destination IP 187.233.248.248. ", "ContentType": "text/plain"}], "uids": ["CGVL3ejZ8r5DVUmcc"]} -{"Format": "IDEA0", "ID": "15364b3d-bc2a-439d-af7d-262e3b13ec72", "DetectTime": "2023-10-30T14:08:21.536668+02:00", "EventTime": "2023-10-30T14:08:21.536679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CrzbVu2u5RoW9LVDZa"]} -{"Format": "IDEA0", "ID": "f6ccf2e0-5875-4f1f-aad0-b1d4ef7554ca", "DetectTime": "2023-10-30T14:08:21.561068+02:00", "EventTime": "2023-10-30T14:08:21.561087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["CYRbWy4OLw68iv24El"]} -{"Format": "Json", "ID": "f6ccf2e0-5875-4f1f-aad0-b1d4ef7554ca", "DetectTime": "2023-10-30T14:08:21.561068+02:00", "EventTime": "2023-10-30T14:08:21.561087+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T21:33:15.416578+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2023/10/30 14:08:21.620499)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "75913a5f-99d1-4df6-b1be-e70da148eb95", "DetectTime": "2023-10-30T14:08:21.625933+02:00", "EventTime": "2023-10-30T14:08:21.625950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CvRHV23ueAxovShSJi"]} -{"Format": "IDEA0", "ID": "a8a8974a-d329-411e-b48b-c087571c4630", "DetectTime": "2023-10-30T14:08:21.645785+02:00", "EventTime": "2023-10-30T14:08:21.645811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CR22Yv3vMGA18dV0q2"]} -{"Format": "IDEA0", "ID": "c7fb0b07-a013-40a5-9ab7-d46c603211c0", "DetectTime": "2023-10-30T14:08:21.665495+02:00", "EventTime": "2023-10-30T14:08:21.665514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CHf3a44XXOeCAXWTFk"]} -{"Format": "IDEA0", "ID": "1dfab61b-bc94-4e9a-b9e2-1be6f12375da", "DetectTime": "2023-10-30T14:08:21.691036+02:00", "EventTime": "2023-10-30T14:08:21.691059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ConqeFzi2tq4DP7Va"]} -{"Format": "IDEA0", "ID": "33bf73f1-3ae9-4d06-b904-dd3aa1a0ee21", "DetectTime": "2023-10-30T14:08:21.748484+02:00", "EventTime": "2023-10-30T14:08:21.748496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CK3IA01Oc3ymlzTpck"]} -{"Format": "IDEA0", "ID": "d3a44bf2-5ab9-4d5e-a45c-af29f61e03b4", "DetectTime": "2023-10-30T14:08:21.804356+02:00", "EventTime": "2023-10-30T14:08:21.804369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CKiXS33ac5US3yHTda"]} -{"Format": "IDEA0", "ID": "efa34846-b614-434c-80fc-250e2de8774f", "DetectTime": "2023-10-30T14:08:21.860987+02:00", "EventTime": "2023-10-30T14:08:21.861004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CH6sCU1kxKbZ00SEe4"]} -{"Format": "IDEA0", "ID": "2bdb6ead-66f8-48d0-8fb2-acd2dc825239", "DetectTime": "2023-10-30T14:08:21.915805+02:00", "EventTime": "2023-10-30T14:08:21.915826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CDS38p4VJjbiFpGrH9"]} -{"Format": "IDEA0", "ID": "92dd6dcf-c6ff-4915-87a3-d7209db15a69", "DetectTime": "2023-10-30T14:08:21.972496+02:00", "EventTime": "2023-10-30T14:08:21.972508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CAHZHT2oP2hrFXPfW8"]} -{"Format": "Json", "ID": "92dd6dcf-c6ff-4915-87a3-d7209db15a69", "DetectTime": "2023-10-30T14:08:21.972496+02:00", "EventTime": "2023-10-30T14:08:21.972508+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:04:23.467686+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:22.127673)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ef639a0a-77ed-44a9-a44c-f517d1d8648a", "DetectTime": "2023-10-30T14:08:22.132315+02:00", "EventTime": "2023-10-30T14:08:22.132332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CaiKKt2W5ffmDSwOTc"]} -{"Format": "IDEA0", "ID": "7bec0618-85ea-467c-81e2-4a7fad466c98", "DetectTime": "2023-10-30T14:08:22.183635+02:00", "EventTime": "2023-10-30T14:08:22.183656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CI0Y0g13mYKIcqj4Dc"]} -{"Format": "IDEA0", "ID": "5e1b6e66-ca0c-480e-ae53-a8308be8a989", "DetectTime": "2023-10-30T14:08:22.230036+02:00", "EventTime": "2023-10-30T14:08:22.230049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C78ORM1LVxciM4j8k9"]} -{"Format": "IDEA0", "ID": "c4cb8448-3baa-4a80-a373-91e78f14f11f", "DetectTime": "2023-10-30T14:08:22.255980+02:00", "EventTime": "2023-10-30T14:08:22.255992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3pPGZYB2H25a5lN3"]} -{"Format": "IDEA0", "ID": "8018f36c-bd78-4c2b-ae5a-6b6f3c421eb0", "DetectTime": "2023-10-30T14:08:22.301873+02:00", "EventTime": "2023-10-30T14:08:22.301885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CClzKW2rxrrPY21oi9"]} -{"Format": "IDEA0", "ID": "f58f8c00-14b0-4af2-9d2a-ac0a6cdc2568", "DetectTime": "2023-10-30T14:08:22.351039+02:00", "EventTime": "2023-10-30T14:08:22.351053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CUMu1T26UsSN4WLcmk"]} -{"Format": "IDEA0", "ID": "ff47c8f1-23f3-463f-9972-089ee7f78a53", "DetectTime": "2023-10-30T14:08:22.398119+02:00", "EventTime": "2023-10-30T14:08:22.398136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CVJjdISF4v8HrIHLg"]} -{"Format": "IDEA0", "ID": "7adacfcd-86d1-4f87-8601-474bc90b99a7", "DetectTime": "2023-10-30T14:08:22.452737+02:00", "EventTime": "2023-10-30T14:08:22.452756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CoHGwiKIgdYtsTtxg"]} -{"Format": "IDEA0", "ID": "07a80328-a338-4766-a9b6-516e855ace2d", "DetectTime": "2023-10-30T14:08:22.510202+02:00", "EventTime": "2023-10-30T14:08:22.510228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CRGb63CA7QmDGW5Ii"]} -{"Format": "Json", "ID": "07a80328-a338-4766-a9b6-516e855ace2d", "DetectTime": "2023-10-30T14:08:22.510202+02:00", "EventTime": "2023-10-30T14:08:22.510228+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:04:25.409921+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:22.593894)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31b98838-3ce6-49d4-8faf-b043733a1ea0", "DetectTime": "2023-10-30T14:08:22.598578+02:00", "EventTime": "2023-10-30T14:08:22.598590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Crls7p2mFVlwkY4m83"]} -{"Format": "IDEA0", "ID": "e59c2d9a-60ca-44c5-a641-465b608408ee", "DetectTime": "2023-10-30T14:08:22.650307+02:00", "EventTime": "2023-10-30T14:08:22.650326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CrLrvQ1GORBBGRVccj"]} -{"Format": "IDEA0", "ID": "51377894-3ce8-4dad-93fb-58d361d1f6f6", "DetectTime": "2023-10-30T14:08:22.703677+02:00", "EventTime": "2023-10-30T14:08:22.703706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CueHBS2uJIvRtfIkBd"]} -{"Format": "IDEA0", "ID": "98a97fef-3c4c-4c7f-8f2b-a0281a415f70", "DetectTime": "2023-10-30T14:08:22.752424+02:00", "EventTime": "2023-10-30T14:08:22.752445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C9JSqX1tSYw2zrNNg3"]} -{"Format": "IDEA0", "ID": "439c9f0e-f71b-458e-ad76-d8a34e3dead0", "DetectTime": "2023-10-30T14:08:22.800830+02:00", "EventTime": "2023-10-30T14:08:22.800844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27014], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. ", "ContentType": "text/plain"}], "uids": ["CqB9ci1zdkaXFNoKOc"]} -{"Format": "IDEA0", "ID": "e08c5d18-c0c9-49ed-be96-f75831fb6b9f", "DetectTime": "2023-10-30T14:08:22.854813+02:00", "EventTime": "2023-10-30T14:08:22.854833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["ChAIW5j8DM62b8zuj"]} -{"Format": "IDEA0", "ID": "a84d424b-ee24-4e81-80b9-c1c7205e24ba", "DetectTime": "2023-10-30T14:08:22.882952+02:00", "EventTime": "2023-10-30T14:08:22.882975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12372], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12372/UDP destination IP 117.198.166.22. ", "ContentType": "text/plain"}], "uids": ["CwkbM43OuVPCeVBjL9"]} -{"Format": "IDEA0", "ID": "caee54b9-259c-4084-8c88-eefbefb1f14e", "DetectTime": "2023-10-30T14:08:22.933665+02:00", "EventTime": "2023-10-30T14:08:22.933678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cw04Vt2ChJ7lPqdmOa"]} -{"Format": "IDEA0", "ID": "edbcc0a8-9442-4de7-b134-c00a6d315e63", "DetectTime": "2023-10-30T14:08:22.981583+02:00", "EventTime": "2023-10-30T14:08:22.981603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13676], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. ", "ContentType": "text/plain"}], "uids": ["Ca7Grr1FswEtENqjbe"]} -{"Format": "Json", "ID": "edbcc0a8-9442-4de7-b134-c00a6d315e63", "DetectTime": "2023-10-30T14:08:22.981583+02:00", "EventTime": "2023-10-30T14:08:22.981603+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13676], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:04:27.734421+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:23.069188)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "856a37e5-ebb5-48cf-8ffd-535c2b5aba78", "DetectTime": "2023-10-30T14:08:23.074734+02:00", "EventTime": "2023-10-30T14:08:23.074757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["Cghqsd1UKCQV2nltgc"]} -{"Format": "IDEA0", "ID": "805accf2-4ae8-4f87-92b5-a89cd53b23eb", "DetectTime": "2023-10-30T14:08:23.123926+02:00", "EventTime": "2023-10-30T14:08:23.123947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["C6zOjl1CBsq4LsgPh7"]} -{"Format": "IDEA0", "ID": "103065c8-0d10-4bf3-afe1-79fad84edea7", "DetectTime": "2023-10-30T14:08:23.175158+02:00", "EventTime": "2023-10-30T14:08:23.175175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CjyJnTXvRs2o3iyCj"]} -{"Format": "IDEA0", "ID": "9360b9f5-2ca5-4df5-a09d-0fedc7727559", "DetectTime": "2023-10-30T14:08:23.225286+02:00", "EventTime": "2023-10-30T14:08:23.225298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CAVkY235U77XE7VDu4"]} -{"Format": "IDEA0", "ID": "90fe3593-9b11-4c23-91d4-e86d26eaac91", "DetectTime": "2023-10-30T14:08:23.268787+02:00", "EventTime": "2023-10-30T14:08:23.268802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CFF3bC2tVHBXWcDN5h"]} -{"Format": "IDEA0", "ID": "3a91acd3-cec2-4dd8-a442-af6419e5bc48", "DetectTime": "2023-10-30T14:08:23.320199+02:00", "EventTime": "2023-10-30T14:08:23.320213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. ", "ContentType": "text/plain"}], "uids": ["CmcQjrGJr7eeC6Byk"]} -{"Format": "IDEA0", "ID": "9c242888-9a14-418f-a45f-909a46e55d67", "DetectTime": "2023-10-30T14:08:23.366678+02:00", "EventTime": "2023-10-30T14:08:23.366695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXIpSrKM6fvjKiYek"]} -{"Format": "IDEA0", "ID": "986ed534-ada2-45c6-b27c-eca29204b25d", "DetectTime": "2023-10-30T14:08:23.391698+02:00", "EventTime": "2023-10-30T14:08:23.391714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["CdhV20141hcyfoe7jh"]} -{"Format": "IDEA0", "ID": "8c367626-c1ac-413a-82c5-2aba565f8a29", "DetectTime": "2023-10-30T14:08:23.448111+02:00", "EventTime": "2023-10-30T14:08:23.448123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CyJpZA4CyLGsDcc57f"]} -{"Format": "Json", "ID": "8c367626-c1ac-413a-82c5-2aba565f8a29", "DetectTime": "2023-10-30T14:08:23.448111+02:00", "EventTime": "2023-10-30T14:08:23.448123+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:05:23.305714+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:23.540772)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2b89e898-b5f2-4de2-8b7e-abc53866b7fc", "DetectTime": "2023-10-30T14:08:23.546002+02:00", "EventTime": "2023-10-30T14:08:23.546064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CSMdON39Oehh8VimA1"]} -{"Format": "IDEA0", "ID": "ad40b803-9702-4f09-8cd9-6596c5df33b2", "DetectTime": "2023-10-30T14:08:23.592842+02:00", "EventTime": "2023-10-30T14:08:23.592868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. ", "ContentType": "text/plain"}], "uids": ["Cu5LZO3Fug3yHPXw5d"]} -{"Format": "IDEA0", "ID": "3f3b1851-cb43-41d1-b77b-494f9bce5138", "DetectTime": "2023-10-30T14:08:23.640327+02:00", "EventTime": "2023-10-30T14:08:23.640352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CzDaaF44GrTunfN2ob"]} -{"Format": "IDEA0", "ID": "6e1c9d43-219f-4ff7-b7fe-f6e859a810e6", "DetectTime": "2023-10-30T14:08:23.684542+02:00", "EventTime": "2023-10-30T14:08:23.684562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["ClQJV62KfZAdLvS0a9"]} -{"Format": "IDEA0", "ID": "acbd41b3-90c8-48c1-872c-9782c2130011", "DetectTime": "2023-10-30T14:08:23.728900+02:00", "EventTime": "2023-10-30T14:08:23.728928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CU54dF1YS3PHwzHE31"]} -{"Format": "IDEA0", "ID": "c8f6a0b1-81ef-41c5-abb2-bebe192135f9", "DetectTime": "2023-10-30T14:08:23.774623+02:00", "EventTime": "2023-10-30T14:08:23.774639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["ChmvMP1dVzZQxeoqui"]} -{"Format": "IDEA0", "ID": "e53fdba5-07b6-431b-9814-598512e22c55", "DetectTime": "2023-10-30T14:08:23.820997+02:00", "EventTime": "2023-10-30T14:08:23.821019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["Cnewaj35eqCV3rOhl8"]} -{"Format": "IDEA0", "ID": "71f95c96-bc6b-433b-ad0c-07aa3602a957", "DetectTime": "2023-10-30T14:08:23.953547+02:00", "EventTime": "2023-10-30T14:08:23.953564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["Cm5N6K1Ipx8iYV2Z5f"]} -{"Format": "IDEA0", "ID": "8e440ae8-839c-4155-a788-17af8e65fad7", "DetectTime": "2023-10-30T14:08:23.983909+02:00", "EventTime": "2023-10-30T14:08:23.983929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CGL93qFCRVTh9R7Tc"]} -{"Format": "Json", "ID": "8e440ae8-839c-4155-a788-17af8e65fad7", "DetectTime": "2023-10-30T14:08:23.983909+02:00", "EventTime": "2023-10-30T14:08:23.983929+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:05:59.091570+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:24.072498)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae974c31-57b6-45b5-b2c6-3ebf53f22c14", "DetectTime": "2023-10-30T14:08:24.077246+02:00", "EventTime": "2023-10-30T14:08:24.077266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [29927], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 29927/UDP destination IP 187.233.248.248. ", "ContentType": "text/plain"}], "uids": ["CWSLMz4ZjR1BIf3vQk"]} -{"Format": "IDEA0", "ID": "8432c963-7e57-408d-9ca1-47fe880f510e", "DetectTime": "2023-10-30T14:08:24.127242+02:00", "EventTime": "2023-10-30T14:08:24.127258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["C8dKn63kI8yw6wliXd"]} -{"Format": "IDEA0", "ID": "24e096bd-37ec-4627-b195-651e1b5303c6", "DetectTime": "2023-10-30T14:08:24.169151+02:00", "EventTime": "2023-10-30T14:08:24.169167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14576], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. ", "ContentType": "text/plain"}], "uids": ["CZD1qLfjKREeMqvG"]} -{"Format": "IDEA0", "ID": "1e7b64d5-67f1-46f3-91b9-ff625f10e424", "DetectTime": "2023-10-30T14:08:24.219167+02:00", "EventTime": "2023-10-30T14:08:24.219183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CU0gLW16KWW4Mtj0X8"]} -{"Format": "IDEA0", "ID": "58af50a6-fcdc-434a-8f60-cdb62b5aae18", "DetectTime": "2023-10-30T14:08:24.267444+02:00", "EventTime": "2023-10-30T14:08:24.267464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CtCMRB3jlom9QLIb0l"]} -{"Format": "IDEA0", "ID": "98fb1169-75d7-4976-a18b-360a73a0a8e5", "DetectTime": "2023-10-30T14:08:24.314597+02:00", "EventTime": "2023-10-30T14:08:24.314625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CKcMUv2iuxy2e2Z9Qh"]} -{"Format": "IDEA0", "ID": "7abfaf0b-7f1a-4ed1-89c5-66785ad0a693", "DetectTime": "2023-10-30T14:08:24.345531+02:00", "EventTime": "2023-10-30T14:08:24.345563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CE6b813FSNoOlr6Oma"]} -{"Format": "IDEA0", "ID": "38b9a3f8-2f9f-48d5-b2b5-bfeb2984ef06", "DetectTime": "2023-10-30T14:08:24.377340+02:00", "EventTime": "2023-10-30T14:08:24.377361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ch1aHq3nyljqe8QK0a"]} -{"Format": "IDEA0", "ID": "e68ba575-5a16-4863-88ee-99e7c84a83c6", "DetectTime": "2023-10-30T14:08:24.423776+02:00", "EventTime": "2023-10-30T14:08:24.423795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CBcJ9p1V8Jr5hfvSk7"]} -{"Format": "IDEA0", "ID": "ac371b8c-2327-45d1-8606-f81612e4d4ad", "DetectTime": "2023-10-30T14:08:24.472483+02:00", "EventTime": "2023-10-30T14:08:24.472500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJQIh02ZZXeYpNyTQh"]} -{"Format": "Json", "ID": "ac371b8c-2327-45d1-8606-f81612e4d4ad", "DetectTime": "2023-10-30T14:08:24.472483+02:00", "EventTime": "2023-10-30T14:08:24.472500+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:38:08.937848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:24.560116)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "78ea16d6-c637-4c01-ab25-1595e4477bba", "DetectTime": "2023-10-30T14:08:24.566383+02:00", "EventTime": "2023-10-30T14:08:24.566406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CL9yXA4puSRZWhxel3"]} -{"Format": "IDEA0", "ID": "830c79fa-6b06-4405-a8fe-146cde3ef660", "DetectTime": "2023-10-30T14:08:24.613265+02:00", "EventTime": "2023-10-30T14:08:24.613284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CNyMUy4ZqYwk9Ag5Ic"]} -{"Format": "IDEA0", "ID": "9237db6f-8c97-4a11-8abf-6d85229099b0", "DetectTime": "2023-10-30T14:08:24.640043+02:00", "EventTime": "2023-10-30T14:08:24.640064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cnerlyc8moIjjeY01"]} -{"Format": "IDEA0", "ID": "fa4249e9-8f95-4ef3-8122-9bc5ac31d4b0", "DetectTime": "2023-10-30T14:08:24.682184+02:00", "EventTime": "2023-10-30T14:08:24.682205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CHnGEo1bw06rubpzqd"]} -{"Format": "IDEA0", "ID": "f10f8f85-fe13-432b-a6f3-4bb1dbc399c0", "DetectTime": "2023-10-30T14:08:24.726609+02:00", "EventTime": "2023-10-30T14:08:24.726629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CoCsTWzMctC3zY95"]} -{"Format": "IDEA0", "ID": "cad80c77-2b3e-4ff5-a74f-b46f5fcda835", "DetectTime": "2023-10-30T14:08:24.773806+02:00", "EventTime": "2023-10-30T14:08:24.773828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CpmBnCGUPzDCgj9ol"]} -{"Format": "IDEA0", "ID": "1efdd577-107e-4a08-bcb4-ea0217cbad12", "DetectTime": "2023-10-30T14:08:24.818473+02:00", "EventTime": "2023-10-30T14:08:24.818485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C40q4422pfzhJYG4D"]} -{"Format": "IDEA0", "ID": "7456e221-2d63-4968-a576-f22bfdbf83f5", "DetectTime": "2023-10-30T14:08:24.864560+02:00", "EventTime": "2023-10-30T14:08:24.864573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CfVP1t486EvW8SUOU2"]} -{"Format": "IDEA0", "ID": "cec9e66f-9e68-42a0-97cf-1e624a19cf37", "DetectTime": "2023-10-30T14:08:24.908621+02:00", "EventTime": "2023-10-30T14:08:24.908637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CbxFpF2jxr3y51v5L7"]} -{"Format": "Json", "ID": "cec9e66f-9e68-42a0-97cf-1e624a19cf37", "DetectTime": "2023-10-30T14:08:24.908621+02:00", "EventTime": "2023-10-30T14:08:24.908637+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:38:10.823200+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:24.994359)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "08350958-0c02-4168-ae1d-8c4356a007e0", "DetectTime": "2023-10-30T14:08:25.000460+02:00", "EventTime": "2023-10-30T14:08:25.000480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C2Pl6w4oKG5601PTo"]} -{"Format": "IDEA0", "ID": "9976f759-0773-44d2-b113-4e0f2439fc42", "DetectTime": "2023-10-30T14:08:25.046953+02:00", "EventTime": "2023-10-30T14:08:25.046971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CXfogU1oKM3YKZDaNf"]} -{"Format": "IDEA0", "ID": "3b4976bc-b00a-4b22-9cc9-0b4abcc7049c", "DetectTime": "2023-10-30T14:08:25.079342+02:00", "EventTime": "2023-10-30T14:08:25.079360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CFbc3z2HTMVpMTMopa"]} -{"Format": "IDEA0", "ID": "df60766a-4489-4139-8cc9-cf15a0b7d379", "DetectTime": "2023-10-30T14:08:25.122114+02:00", "EventTime": "2023-10-30T14:08:25.122125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CLmft4z1ra9HKNdXa"]} -{"Format": "IDEA0", "ID": "fc34d555-6561-42e0-bb92-e06fed382731", "DetectTime": "2023-10-30T14:08:25.165372+02:00", "EventTime": "2023-10-30T14:08:25.165389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CcPl5E5TWigAGTJp2"]} -{"Format": "IDEA0", "ID": "cc0ba1d1-5680-495f-ae5e-6b68376c6df3", "DetectTime": "2023-10-30T14:08:25.209249+02:00", "EventTime": "2023-10-30T14:08:25.209273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CcEay64VDUWPTdCN1f"]} -{"Format": "IDEA0", "ID": "d1646607-b5df-461a-8428-55689bd7e6b3", "DetectTime": "2023-10-30T14:08:25.255700+02:00", "EventTime": "2023-10-30T14:08:25.255717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [27014], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. ", "ContentType": "text/plain"}], "uids": ["ClOO1L2PkHpGZdtKAh"]} -{"Format": "IDEA0", "ID": "3df72f14-d8d6-4489-9586-642e6ac8c8be", "DetectTime": "2023-10-30T14:08:25.299154+02:00", "EventTime": "2023-10-30T14:08:25.299176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CwrbK7cVlKh983Tq6"]} -{"Format": "IDEA0", "ID": "291a8048-185d-440c-a613-b2e90577bfd2", "DetectTime": "2023-10-30T14:08:25.340626+02:00", "EventTime": "2023-10-30T14:08:25.340639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CggUyh2tSZkxNO1tU8"]} -{"Format": "IDEA0", "ID": "0c05be91-4ec3-451f-bd2f-a09d9b69b89b", "DetectTime": "2023-10-30T14:08:25.367610+02:00", "EventTime": "2023-10-30T14:08:25.367630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CyH1mU34252gYuSoyd"]} -{"Format": "Json", "ID": "0c05be91-4ec3-451f-bd2f-a09d9b69b89b", "DetectTime": "2023-10-30T14:08:25.367610+02:00", "EventTime": "2023-10-30T14:08:25.367630+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:38:12.877106+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:25.444232)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0f181d2c-ab3c-4565-ab2a-abbec5966246", "DetectTime": "2023-10-30T14:08:25.452568+02:00", "EventTime": "2023-10-30T14:08:25.452584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CJwAGVoDgt3VvwhV4"]} -{"Format": "IDEA0", "ID": "1f15b54d-a4d0-47c8-8bec-be6a5aaf69fc", "DetectTime": "2023-10-30T14:08:25.493567+02:00", "EventTime": "2023-10-30T14:08:25.493584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13676], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. ", "ContentType": "text/plain"}], "uids": ["CGix4A7uWnWTqwQNj"]} -{"Format": "IDEA0", "ID": "4edd161a-e17c-42ee-aace-4ce082356851", "DetectTime": "2023-10-30T14:08:25.531682+02:00", "EventTime": "2023-10-30T14:08:25.531704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CrKc9SYWgJxhjGXx4"]} -{"Format": "IDEA0", "ID": "38bebbae-b8d8-4c00-bd35-c41e7ae13e64", "DetectTime": "2023-10-30T14:08:25.564548+02:00", "EventTime": "2023-10-30T14:08:25.564567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CsP1Qn1wvSfN36luW1"]} -{"Format": "IDEA0", "ID": "6e17811b-f064-48d9-b62e-338388eb3970", "DetectTime": "2023-10-30T14:08:25.600589+02:00", "EventTime": "2023-10-30T14:08:25.600606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Ce1AdX22bSCHXCDgc"]} -{"Format": "IDEA0", "ID": "c5122b6a-9fbb-41d8-9151-61aa48d8a1f8", "DetectTime": "2023-10-30T14:08:25.628128+02:00", "EventTime": "2023-10-30T14:08:25.628149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["C1kcjm3vkKBts6AxU2"]} -{"Format": "IDEA0", "ID": "09727d3a-bece-458b-8f1a-c281fdd3b9c2", "DetectTime": "2023-10-30T14:08:25.664112+02:00", "EventTime": "2023-10-30T14:08:25.664140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["ColqRf1398AcDspjU4"]} -{"Format": "IDEA0", "ID": "c71238d1-54a8-4063-bfa5-17aef6dfc250", "DetectTime": "2023-10-30T14:08:25.700216+02:00", "EventTime": "2023-10-30T14:08:25.700234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["C5zvNChOESeS9bTz7"]} -{"Format": "IDEA0", "ID": "fcd8a188-bb0d-48e4-ae00-4ed9ceedbb2d", "DetectTime": "2023-10-30T14:08:25.732902+02:00", "EventTime": "2023-10-30T14:08:25.732921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["CGipd8PKpSD395Lo"]} -{"Format": "Json", "ID": "fcd8a188-bb0d-48e4-ae00-4ed9ceedbb2d", "DetectTime": "2023-10-30T14:08:25.732902+02:00", "EventTime": "2023-10-30T14:08:25.732921+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:38:53.429780+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:25.808470)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "44804bfa-5141-416a-b222-ab289ea8a045", "DetectTime": "2023-10-30T14:08:25.813898+02:00", "EventTime": "2023-10-30T14:08:25.813915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cusoxt2PEQz1fDip18"]} -{"Format": "IDEA0", "ID": "bfa8f4df-e06b-42ef-8acd-c6f58bf3f0f3", "DetectTime": "2023-10-30T14:08:25.849439+02:00", "EventTime": "2023-10-30T14:08:25.849456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CZFpY3CpYU6UpU39d"]} -{"Format": "IDEA0", "ID": "a17f071a-143e-4c46-814c-16fa361605d3", "DetectTime": "2023-10-30T14:08:25.875135+02:00", "EventTime": "2023-10-30T14:08:25.875154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. ", "ContentType": "text/plain"}], "uids": ["CQX0Ax4HnrgUDtl4q7"]} -{"Format": "IDEA0", "ID": "3f83adad-78f6-4a12-81de-bbfb374c6589", "DetectTime": "2023-10-30T14:08:25.906835+02:00", "EventTime": "2023-10-30T14:08:25.906851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CKRr4k3uCH2bQBcjb4"]} -{"Format": "IDEA0", "ID": "47029dc9-2998-4378-9118-9cef05d3ea40", "DetectTime": "2023-10-30T14:08:25.940240+02:00", "EventTime": "2023-10-30T14:08:25.940257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C3yD4j1y2D8eGqUNb5"]} -{"Format": "IDEA0", "ID": "b8afb7ed-cf00-4478-9757-14a79414cb69", "DetectTime": "2023-10-30T14:08:25.972348+02:00", "EventTime": "2023-10-30T14:08:25.972361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CYAEix27XKNsVes1I9"]} -{"Format": "IDEA0", "ID": "bc6348be-192f-4e32-8f8e-91c4f48cc083", "DetectTime": "2023-10-30T14:08:26.079913+02:00", "EventTime": "2023-10-30T14:08:26.079929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["Cxgk1x3KX9yLuQYkw1"]} -{"Format": "IDEA0", "ID": "408db38d-cfdc-42d5-ae4a-2a4fb63e78da", "DetectTime": "2023-10-30T14:08:26.120193+02:00", "EventTime": "2023-10-30T14:08:26.120209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CCW0p5V5RPNeNGc0b"]} -{"Format": "IDEA0", "ID": "3bd89ed5-073b-4602-9c94-e6da01c50d48", "DetectTime": "2023-10-30T14:08:26.159417+02:00", "EventTime": "2023-10-30T14:08:26.159435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CViPi41m3m7b8Z8dg"]} -{"Format": "IDEA0", "ID": "386eccf8-1f29-4fb1-8dd7-fa29a7faa3d6", "DetectTime": "2023-10-30T14:08:26.188496+02:00", "EventTime": "2023-10-30T14:08:26.188518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["C0ONwL2C4elB7RRxV5"]} -{"Format": "Json", "ID": "386eccf8-1f29-4fb1-8dd7-fa29a7faa3d6", "DetectTime": "2023-10-30T14:08:26.188496+02:00", "EventTime": "2023-10-30T14:08:26.188518+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T22:39:12.415910+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2023/10/30 14:08:26.266491)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "faf24714-d5e2-421d-983b-6ccf6803b336", "DetectTime": "2023-10-30T14:08:26.271780+02:00", "EventTime": "2023-10-30T14:08:26.271806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14576], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. ", "ContentType": "text/plain"}], "uids": ["CIm2jn3P1p0wOEZshj"]} -{"Format": "IDEA0", "ID": "cc984b98-b2f3-4002-8972-ca234f139d1a", "DetectTime": "2023-10-30T14:08:26.308785+02:00", "EventTime": "2023-10-30T14:08:26.308807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["CSGkfL1isAmWLvR3K3"]} -{"Format": "IDEA0", "ID": "884b4fdc-ec37-4cde-9dfa-b97751371be1", "DetectTime": "2023-10-30T14:08:26.347821+02:00", "EventTime": "2023-10-30T14:08:26.347841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CVEgf8MxGWSns1rO5"]} -{"Format": "IDEA0", "ID": "fafc1ae5-ba86-4ccf-945c-4dd6cddabfaa", "DetectTime": "2023-10-30T14:08:26.380195+02:00", "EventTime": "2023-10-30T14:08:26.380221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CKwqg81TOXMHYOOQM5"]} -{"Format": "IDEA0", "ID": "4194341d-0e75-4091-abbf-17befd4446fe", "DetectTime": "2023-10-30T14:08:26.410590+02:00", "EventTime": "2023-10-30T14:08:26.410607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C1gBNE38KD8KOltRWf"]} -{"Format": "IDEA0", "ID": "bec66399-3aac-463b-8f14-7d22453b475e", "DetectTime": "2023-10-30T14:08:26.447154+02:00", "EventTime": "2023-10-30T14:08:26.447180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CzwGyH3zBQIbgU4wYk"]} -{"Format": "IDEA0", "ID": "85f179e6-fced-4987-b107-4bb4eab7f55a", "DetectTime": "2023-10-30T14:08:26.481677+02:00", "EventTime": "2023-10-30T14:08:26.481692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CAaZLs2XKMjCEvem3l"]} -{"Format": "IDEA0", "ID": "6124cf79-b4a8-4914-b95c-0b58b738191c", "DetectTime": "2023-10-30T14:08:26.535521+02:00", "EventTime": "2023-10-30T14:08:26.535535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CfjFb328WivFRg0FT3"]} -{"Format": "IDEA0", "ID": "caa3817b-9ada-466d-805f-ea7ca41bb5df", "DetectTime": "2023-10-30T14:08:26.593791+02:00", "EventTime": "2023-10-30T14:08:26.593809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNCEXGpob9WXfB9Uf"]} -{"Format": "IDEA0", "ID": "ac4893ed-6f87-4aa1-b227-60cda8a7d0f4", "DetectTime": "2023-10-30T14:08:26.649895+02:00", "EventTime": "2023-10-30T14:08:26.649916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cr1x1g4ZVm31G2GNQh"]} -{"Format": "IDEA0", "ID": "9765a259-d707-43af-8007-4502db33b414", "DetectTime": "2023-10-30T14:08:26.704221+02:00", "EventTime": "2023-10-30T14:08:26.704240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CpEH4H2sEvr0QBkBy9"]} -{"Format": "IDEA0", "ID": "7d928739-f491-44b1-81c1-0afdd655b67d", "DetectTime": "2023-10-30T14:08:26.761972+02:00", "EventTime": "2023-10-30T14:08:26.762000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRlr2s21ypj6utI1a1"]} -{"Format": "Json", "ID": "7d928739-f491-44b1-81c1-0afdd655b67d", "DetectTime": "2023-10-30T14:08:26.761972+02:00", "EventTime": "2023-10-30T14:08:26.762000+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:10:08.816229+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:26.919739)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "edc23784-08b1-4181-8376-ca459ddb8edc", "DetectTime": "2023-10-30T14:08:26.925458+02:00", "EventTime": "2023-10-30T14:08:26.925473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CsHirV3iXbuomCwfn1"]} -{"Format": "IDEA0", "ID": "d3597897-889f-4513-a444-dc9af71890c7", "DetectTime": "2023-10-30T14:08:26.979300+02:00", "EventTime": "2023-10-30T14:08:26.979325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CM6eFu4U6Icf4WPZfc"]} -{"Format": "IDEA0", "ID": "060dbd36-ddbb-4d4a-9987-e4a2eaf0ecc3", "DetectTime": "2023-10-30T14:08:27.029563+02:00", "EventTime": "2023-10-30T14:08:27.029578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CjTShxPP67Q5rqoc7"]} -{"Format": "IDEA0", "ID": "f61dfea8-d0e1-4f52-b919-c6130632ecc1", "DetectTime": "2023-10-30T14:08:27.077304+02:00", "EventTime": "2023-10-30T14:08:27.077324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C31OwNOGqbVXZAv28"]} -{"Format": "IDEA0", "ID": "edd7498b-702d-4e5a-8522-b5a006fad309", "DetectTime": "2023-10-30T14:08:27.129305+02:00", "EventTime": "2023-10-30T14:08:27.129331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CW6e4r2rjb6ySXVmMh"]} -{"Format": "IDEA0", "ID": "2a2deda1-2142-4232-bb51-4dd5f210348b", "DetectTime": "2023-10-30T14:08:27.175889+02:00", "EventTime": "2023-10-30T14:08:27.175906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C7PA2d3y0JllsRLUd"]} -{"Format": "IDEA0", "ID": "afbdb8b9-acaf-4561-86d3-a5af67ded117", "DetectTime": "2023-10-30T14:08:27.224907+02:00", "EventTime": "2023-10-30T14:08:27.224925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CPx3ia349ZvkfGGhh1"]} -{"Format": "IDEA0", "ID": "a7971253-40ad-498c-aa02-a9c5b05552c8", "DetectTime": "2023-10-30T14:08:27.253924+02:00", "EventTime": "2023-10-30T14:08:27.253944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CQ92Da3Ok7PshmAC08"]} -{"Format": "IDEA0", "ID": "69f0befa-428a-41b1-9edf-dd7e21081d5a", "DetectTime": "2023-10-30T14:08:27.300417+02:00", "EventTime": "2023-10-30T14:08:27.300436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Cmuwn42B1cU1zzDLXl"]} -{"Format": "Json", "ID": "69f0befa-428a-41b1-9edf-dd7e21081d5a", "DetectTime": "2023-10-30T14:08:27.300417+02:00", "EventTime": "2023-10-30T14:08:27.300436+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:10:49.239006+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:27.384800)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dbb26051-2f08-43db-a2e2-3bdc7333fca3", "DetectTime": "2023-10-30T14:08:27.389614+02:00", "EventTime": "2023-10-30T14:08:27.389625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C6Wnq12PimKgsZZssl"]} -{"Format": "IDEA0", "ID": "451560ad-ab9c-47d7-8868-2e3e9bc0cd9c", "DetectTime": "2023-10-30T14:08:27.439674+02:00", "EventTime": "2023-10-30T14:08:27.439694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13676], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. ", "ContentType": "text/plain"}], "uids": ["C6Fnh14gcsUz5lEMAh"]} -{"Format": "IDEA0", "ID": "280a107a-d194-4771-95f0-8aad6c1fca5b", "DetectTime": "2023-10-30T14:08:27.485707+02:00", "EventTime": "2023-10-30T14:08:27.485719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CmcQrz4C9Phu0LwfU3"]} -{"Format": "IDEA0", "ID": "0fb53280-d12d-46f4-a3d1-76dcd39f1dae", "DetectTime": "2023-10-30T14:08:27.529538+02:00", "EventTime": "2023-10-30T14:08:27.529555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CZr6vY1Im7gSViEelf"]} -{"Format": "IDEA0", "ID": "3fc05e76-c9c3-42d6-8fb9-04516c37052d", "DetectTime": "2023-10-30T14:08:27.575878+02:00", "EventTime": "2023-10-30T14:08:27.575898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CmkX1a39Sv1VipNlI1"]} -{"Format": "IDEA0", "ID": "d02e4fce-1d72-458a-b8ee-5f14ff73136a", "DetectTime": "2023-10-30T14:08:27.614393+02:00", "EventTime": "2023-10-30T14:08:27.614409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CrZylr4Ptn6ETKDxQ4"]} -{"Format": "IDEA0", "ID": "9710e458-6130-48fa-a4c9-e912b1b37569", "DetectTime": "2023-10-30T14:08:27.657109+02:00", "EventTime": "2023-10-30T14:08:27.657125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6210], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. ", "ContentType": "text/plain"}], "uids": ["CdwP2SU3Z8hqSFf2h"]} -{"Format": "IDEA0", "ID": "ffe1a1d4-0837-469c-93e4-a34e23fbfb8a", "DetectTime": "2023-10-30T14:08:27.699365+02:00", "EventTime": "2023-10-30T14:08:27.699378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CsoH66iwIVNQezyAc"]} -{"Format": "Json", "ID": "ffe1a1d4-0837-469c-93e4-a34e23fbfb8a", "DetectTime": "2023-10-30T14:08:27.699365+02:00", "EventTime": "2023-10-30T14:08:27.699378+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:11:09.987691+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:27.784266)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4223b341-569b-47f6-a228-9ffb090c90e1", "DetectTime": "2023-10-30T14:08:27.789317+02:00", "EventTime": "2023-10-30T14:08:27.789343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C5x09X22gDLXSZUDZk"]} -{"Format": "IDEA0", "ID": "975c00ce-0c9e-4bf9-93a5-07d562764950", "DetectTime": "2023-10-30T14:08:27.828859+02:00", "EventTime": "2023-10-30T14:08:27.828882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CjKKLR1sTiSthwNAcg"]} -{"Format": "IDEA0", "ID": "97942115-f61b-4786-a1e1-10905a79496c", "DetectTime": "2023-10-30T14:08:27.865676+02:00", "EventTime": "2023-10-30T14:08:27.865690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["CUUjnB4wXZ6GSAqPC9"]} -{"Format": "IDEA0", "ID": "d1bd0cb1-5522-4a51-b099-06ff450f3c5d", "DetectTime": "2023-10-30T14:08:27.906943+02:00", "EventTime": "2023-10-30T14:08:27.906965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CwBd5A2uYelZFIP5h7"]} -{"Format": "IDEA0", "ID": "c87db2f6-eed7-4134-a8fd-98fe3a68b8bb", "DetectTime": "2023-10-30T14:08:27.947584+02:00", "EventTime": "2023-10-30T14:08:27.947596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CJi48k4sSJLmssxUyh"]} -{"Format": "IDEA0", "ID": "212d0295-5f91-4e4b-80f0-ddb59bde866c", "DetectTime": "2023-10-30T14:08:27.988962+02:00", "EventTime": "2023-10-30T14:08:27.988973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CcNLDl3y23jmNwcWS2"]} -{"Format": "IDEA0", "ID": "df21aac2-225b-41f8-b2f0-d20afe95203d", "DetectTime": "2023-10-30T14:08:28.029011+02:00", "EventTime": "2023-10-30T14:08:28.029028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CgQj0F1hU8UcZS4VHj"]} -{"Format": "IDEA0", "ID": "665438a7-2648-4c6c-9371-6137280ea4e8", "DetectTime": "2023-10-30T14:08:28.052110+02:00", "EventTime": "2023-10-30T14:08:28.052129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CALIZuyvkFKnJpuLe"]} -{"Format": "IDEA0", "ID": "e0e99646-2db3-4695-a198-d6a44400f8d9", "DetectTime": "2023-10-30T14:08:28.094019+02:00", "EventTime": "2023-10-30T14:08:28.094033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["Co9OFAfKE3aGKdsRf"]} -{"Format": "Json", "ID": "e0e99646-2db3-4695-a198-d6a44400f8d9", "DetectTime": "2023-10-30T14:08:28.094019+02:00", "EventTime": "2023-10-30T14:08:28.094033+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:11:46.347762+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:28.172776)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1d32807b-f879-404b-a34c-4d5fdc3981ab", "DetectTime": "2023-10-30T14:08:28.178560+02:00", "EventTime": "2023-10-30T14:08:28.178580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14576], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. ", "ContentType": "text/plain"}], "uids": ["CyPUuH3QZ8tKbLrdQ5"]} -{"Format": "IDEA0", "ID": "b0ec481a-dd16-4c15-98f9-6adde37d1ee2", "DetectTime": "2023-10-30T14:08:28.221957+02:00", "EventTime": "2023-10-30T14:08:28.221972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["ChDqec2hCPg5UumNee"]} -{"Format": "IDEA0", "ID": "6d787a7f-ca69-448c-a470-897b992866a7", "DetectTime": "2023-10-30T14:08:28.259347+02:00", "EventTime": "2023-10-30T14:08:28.259363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["CQmJB935pEngZbKmwi"]} -{"Format": "IDEA0", "ID": "a011a207-a93b-4715-bb5a-cd873e48b858", "DetectTime": "2023-10-30T14:08:28.297340+02:00", "EventTime": "2023-10-30T14:08:28.297367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CR874d1QZ5ePbn6Edh"]} -{"Format": "IDEA0", "ID": "dbfb79f8-3387-415b-8fec-94836766750f", "DetectTime": "2023-10-30T14:08:28.333980+02:00", "EventTime": "2023-10-30T14:08:28.333994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["C8reR23ix3QWsDvrnc"]} -{"Format": "IDEA0", "ID": "ab260bec-ee68-4e4c-ba7a-864eb4590322", "DetectTime": "2023-10-30T14:08:28.370236+02:00", "EventTime": "2023-10-30T14:08:28.370261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["C27D121185VlShk1d5"]} -{"Format": "IDEA0", "ID": "c8284526-8693-4e95-b8ea-379b51f419ca", "DetectTime": "2023-10-30T14:08:28.404876+02:00", "EventTime": "2023-10-30T14:08:28.404902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZOJx011qtKBer9jHi"]} -{"Format": "IDEA0", "ID": "093bd7f0-49ac-4bfb-b166-d578d72389cb", "DetectTime": "2023-10-30T14:08:28.430434+02:00", "EventTime": "2023-10-30T14:08:28.430460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CG8xFq238bHpJ1B7qa"]} -{"Format": "IDEA0", "ID": "6776a3bd-7361-48aa-b150-3e5daf704e15", "DetectTime": "2023-10-30T14:08:28.464952+02:00", "EventTime": "2023-10-30T14:08:28.464970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CLvVas3sNlG0QRHIfb"]} -{"Format": "Json", "ID": "6776a3bd-7361-48aa-b150-3e5daf704e15", "DetectTime": "2023-10-30T14:08:28.464952+02:00", "EventTime": "2023-10-30T14:08:28.464970+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:42:58.803078+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:28.536293)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "18cf9c31-4fa4-45fe-9e89-569cedaf3104", "DetectTime": "2023-10-30T14:08:28.541839+02:00", "EventTime": "2023-10-30T14:08:28.541855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CELiXO11agR9nQ21ob"]} -{"Format": "IDEA0", "ID": "812c5e3d-7c86-412f-8a79-3ef3d437d74e", "DetectTime": "2023-10-30T14:08:28.577186+02:00", "EventTime": "2023-10-30T14:08:28.577210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CZBvhO3dxoM5J3fBj1"]} -{"Format": "IDEA0", "ID": "7228175a-d009-48e4-9a49-fad03ca2f631", "DetectTime": "2023-10-30T14:08:28.607464+02:00", "EventTime": "2023-10-30T14:08:28.607482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C2Cr1j14bHAJv6bGL4"]} -{"Format": "IDEA0", "ID": "42d043b6-a156-4392-87f7-b5fa0342abf6", "DetectTime": "2023-10-30T14:08:28.642128+02:00", "EventTime": "2023-10-30T14:08:28.642149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CVrUiq6JnLz1ysg01"]} -{"Format": "IDEA0", "ID": "fdb55129-ecf4-4cb1-95d9-a51c32562fcb", "DetectTime": "2023-10-30T14:08:28.667046+02:00", "EventTime": "2023-10-30T14:08:28.667065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ChY2Ps3hSOz1Uu0i0i"]} -{"Format": "IDEA0", "ID": "c4f49c94-5b5c-442e-8095-a5944649788a", "DetectTime": "2023-10-30T14:08:28.700793+02:00", "EventTime": "2023-10-30T14:08:28.700810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CkegMl31gqdJP2dsA6"]} -{"Format": "IDEA0", "ID": "959c7b8b-434c-4a60-b0bb-cd60c1b8b67c", "DetectTime": "2023-10-30T14:08:28.734216+02:00", "EventTime": "2023-10-30T14:08:28.734229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cfm6XEe6kZnuyAZE6"]} -{"Format": "IDEA0", "ID": "e7b1e417-fb89-4d4d-ac50-44ca8110ffbd", "DetectTime": "2023-10-30T14:08:28.768971+02:00", "EventTime": "2023-10-30T14:08:28.768986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["COX8Jc2KZ7FYzReNNd"]} -{"Format": "IDEA0", "ID": "a6a2886a-8b8c-4309-b732-2916503a302c", "DetectTime": "2023-10-30T14:08:28.804637+02:00", "EventTime": "2023-10-30T14:08:28.804657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CCGAjB3g1BKfyFQ5Nc"]} -{"Format": "IDEA0", "ID": "9028b5d1-f546-4997-92a8-3f944125e838", "DetectTime": "2023-10-30T14:08:28.832984+02:00", "EventTime": "2023-10-30T14:08:28.833005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CxLr8C1Q5WUbSk6SNe"]} -{"Format": "Json", "ID": "9028b5d1-f546-4997-92a8-3f944125e838", "DetectTime": "2023-10-30T14:08:28.832984+02:00", "EventTime": "2023-10-30T14:08:28.833005+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:43:00.800961+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:28.910257)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "086d995c-a5b1-4a69-8362-b1d718a700bc", "DetectTime": "2023-10-30T14:08:28.916342+02:00", "EventTime": "2023-10-30T14:08:28.916364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CL2f1n4EpaPeSIL2i3"]} -{"Format": "IDEA0", "ID": "2bca2989-ec42-4f77-8487-db08bc8556fc", "DetectTime": "2023-10-30T14:08:28.952144+02:00", "EventTime": "2023-10-30T14:08:28.952169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CpUkC3ZF43iv2HOFj"]} -{"Format": "IDEA0", "ID": "02059da0-4c3c-41b7-8204-58423aa0198c", "DetectTime": "2023-10-30T14:08:28.981480+02:00", "EventTime": "2023-10-30T14:08:28.981498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C3s9Qq44qfJd6f1LM5"]} -{"Format": "IDEA0", "ID": "23819469-72af-4d71-9a27-fa0583c5cf0d", "DetectTime": "2023-10-30T14:08:29.013730+02:00", "EventTime": "2023-10-30T14:08:29.013745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cbc6M12XGsHyDewZEd"]} -{"Format": "IDEA0", "ID": "5f20cf6a-50e1-47f0-95d4-a4616f81d201", "DetectTime": "2023-10-30T14:08:29.041461+02:00", "EventTime": "2023-10-30T14:08:29.041473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CV1aKt3y3iPcDHNB14"]} -{"Format": "IDEA0", "ID": "356ed70c-5052-4c3d-aaf3-34a8e07b27cd", "DetectTime": "2023-10-30T14:08:29.074964+02:00", "EventTime": "2023-10-30T14:08:29.074983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["COuZMw4pCdB2hPrMQl"]} -{"Format": "IDEA0", "ID": "2d9fbc40-c85a-4b36-b00a-6d7dfc62e053", "DetectTime": "2023-10-30T14:08:29.107772+02:00", "EventTime": "2023-10-30T14:08:29.107795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cr6qwd2y67M4sulf4g"]} -{"Format": "IDEA0", "ID": "85124961-393f-4d58-a227-0c28a779291b", "DetectTime": "2023-10-30T14:08:29.131284+02:00", "EventTime": "2023-10-30T14:08:29.131304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C1k4hU23xP59eZmjHd"]} -{"Format": "IDEA0", "ID": "4c2a6b0c-f26b-4d36-83be-052e40523e09", "DetectTime": "2023-10-30T14:08:29.163643+02:00", "EventTime": "2023-10-30T14:08:29.163661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CYiiCI3kXqvdsGZIWa"]} -{"Format": "Json", "ID": "4c2a6b0c-f26b-4d36-83be-052e40523e09", "DetectTime": "2023-10-30T14:08:29.163643+02:00", "EventTime": "2023-10-30T14:08:29.163661+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:43:20.349637+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:29.235039)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0ad1c65e-c63b-4bdc-be55-f1d5c602d938", "DetectTime": "2023-10-30T14:08:29.240225+02:00", "EventTime": "2023-10-30T14:08:29.240236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CNMeIZ3S79uxtieIJl"]} -{"Format": "IDEA0", "ID": "af8b1f28-2fcc-433e-8de0-37028561a9a6", "DetectTime": "2023-10-30T14:08:29.272535+02:00", "EventTime": "2023-10-30T14:08:29.272552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbMA9Z1F0r6sDo6m4b"]} -{"Format": "IDEA0", "ID": "d0f53446-7aaf-48d6-aa20-586d5039fbac", "DetectTime": "2023-10-30T14:08:29.306149+02:00", "EventTime": "2023-10-30T14:08:29.306174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["Cn4gpGFcCkBVeOKFk"]} -{"Format": "IDEA0", "ID": "0a5746ae-d621-4d9d-b0ae-ee924e6a1514", "DetectTime": "2023-10-30T14:08:29.340788+02:00", "EventTime": "2023-10-30T14:08:29.340816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CTfXkECBCHRWjEbD9"]} -{"Format": "IDEA0", "ID": "6bfce3df-8013-4279-a698-e07ae7046dbb", "DetectTime": "2023-10-30T14:08:29.373084+02:00", "EventTime": "2023-10-30T14:08:29.373100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CN9ABywk0LPif0Qfi"]} -{"Format": "IDEA0", "ID": "ac9ee2d7-6ebc-4614-acca-8e57ce84b69d", "DetectTime": "2023-10-30T14:08:29.405125+02:00", "EventTime": "2023-10-30T14:08:29.405147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["Cufh2pDvc7LbzI3N3"]} -{"Format": "IDEA0", "ID": "cb4dbd58-52a1-40e8-8b62-21dbb189db3a", "DetectTime": "2023-10-30T14:08:29.437775+02:00", "EventTime": "2023-10-30T14:08:29.437789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CQ7ts93P2D06vgEjik"]} -{"Format": "IDEA0", "ID": "0a9e8212-0cf3-44d8-9385-bc723b7c6571", "DetectTime": "2023-10-30T14:08:29.463106+02:00", "EventTime": "2023-10-30T14:08:29.463123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CYSzvfsMamAnbtk22"]} -{"Format": "IDEA0", "ID": "c622df1a-f567-4120-86f6-1649be09a577", "DetectTime": "2023-10-30T14:08:29.492373+02:00", "EventTime": "2023-10-30T14:08:29.492391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["C4UHFF2DCHOzw3TbT4"]} -{"Format": "Json", "ID": "c622df1a-f567-4120-86f6-1649be09a577", "DetectTime": "2023-10-30T14:08:29.492373+02:00", "EventTime": "2023-10-30T14:08:29.492391+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-05T23:43:38.723499+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2023/10/30 14:08:29.552425)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8ac452fb-1794-4792-9b62-060411fea162", "DetectTime": "2023-10-30T14:08:29.557424+02:00", "EventTime": "2023-10-30T14:08:29.557453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["ChAxrp4QXy0xoTI1U4"]} -{"Format": "IDEA0", "ID": "30c5aed8-cb7b-46b9-a5bb-eb21b3cbd850", "DetectTime": "2023-10-30T14:08:29.588894+02:00", "EventTime": "2023-10-30T14:08:29.588905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CPM79ypNbsvFrMKDk"]} -{"Format": "IDEA0", "ID": "2f1c7101-39a6-4f49-bea1-06fca4a5d571", "DetectTime": "2023-10-30T14:08:29.618281+02:00", "EventTime": "2023-10-30T14:08:29.618304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["Csaaic4AOhdSCSKm7i"]} -{"Format": "IDEA0", "ID": "65202d14-acb1-457b-b3f3-ec3207ef3502", "DetectTime": "2023-10-30T14:08:29.646741+02:00", "EventTime": "2023-10-30T14:08:29.646758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CW0Vw03swS4yh2i8L7"]} -{"Format": "IDEA0", "ID": "fd513c8e-eecc-44b0-970d-6f856b678053", "DetectTime": "2023-10-30T14:08:29.671839+02:00", "EventTime": "2023-10-30T14:08:29.671850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C73oG416yyo56aIeV2"]} -{"Format": "IDEA0", "ID": "3f99be34-6943-4b2c-be2a-30c1492003c1", "DetectTime": "2023-10-30T14:08:29.701497+02:00", "EventTime": "2023-10-30T14:08:29.701517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["CeX0zd1zkvBmCh8mZ3"]} -{"Format": "IDEA0", "ID": "3a3ad44e-2c31-4cd1-83a9-445bd4813262", "DetectTime": "2023-10-30T14:08:29.729601+02:00", "EventTime": "2023-10-30T14:08:29.729617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CWZgmY21nLjMuhGNZb"]} -{"Format": "IDEA0", "ID": "db44d915-1239-46db-9f28-0e1aa136fa27", "DetectTime": "2023-10-30T14:08:29.757529+02:00", "EventTime": "2023-10-30T14:08:29.757545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CeKhch2jqPHtaVSuW9"]} -{"Format": "IDEA0", "ID": "a4e5e8af-69b0-4c3b-bad7-2ceafb97f5f6", "DetectTime": "2023-10-30T14:08:29.782600+02:00", "EventTime": "2023-10-30T14:08:29.782616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CW4OEA2emgvHpY2OK2"]} -{"Format": "IDEA0", "ID": "b2179755-1a8a-4182-bfea-301b4879314a", "DetectTime": "2023-10-30T14:08:29.821591+02:00", "EventTime": "2023-10-30T14:08:29.821612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CadRlq4LFh3imxOeaj"]} -{"Format": "IDEA0", "ID": "3108c8f5-3284-4f8d-a0cf-66d41aaf75a7", "DetectTime": "2023-10-30T14:08:29.864592+02:00", "EventTime": "2023-10-30T14:08:29.864610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CVX8H9146Z6Pusjye8"]} -{"Format": "IDEA0", "ID": "1b2e2393-3637-44ad-be18-a81835b9c9e6", "DetectTime": "2023-10-30T14:08:29.905130+02:00", "EventTime": "2023-10-30T14:08:29.905144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CCqsaX2qLPeKbcGpTb"]} -{"Format": "IDEA0", "ID": "d402a00c-24d3-4a16-83a4-025c3748c624", "DetectTime": "2023-10-30T14:08:29.946566+02:00", "EventTime": "2023-10-30T14:08:29.946592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Ce6dxn1Jm7GC8AD7Qk"]} -{"Format": "IDEA0", "ID": "49f96246-906f-41ce-b560-11c81d0fd5b3", "DetectTime": "2023-10-30T14:08:29.991134+02:00", "EventTime": "2023-10-30T14:08:29.991150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CBtB0w19onUei6EdJ5"]} -{"Format": "Json", "ID": "49f96246-906f-41ce-b560-11c81d0fd5b3", "DetectTime": "2023-10-30T14:08:29.991134+02:00", "EventTime": "2023-10-30T14:08:29.991150+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:15:25.752188+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:30.111471)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "610c40b4-1e60-4b46-8ce6-fa7486654528", "DetectTime": "2023-10-30T14:08:30.117213+02:00", "EventTime": "2023-10-30T14:08:30.117230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CDNRKi2UTx70wEPqO7"]} -{"Format": "IDEA0", "ID": "c77566e1-d261-400b-aabb-bbecd68826c9", "DetectTime": "2023-10-30T14:08:30.159982+02:00", "EventTime": "2023-10-30T14:08:30.159996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CsFr5G4QxPDPvY0rRh"]} -{"Format": "IDEA0", "ID": "1289fae3-0968-4122-bcbb-8702fb608926", "DetectTime": "2023-10-30T14:08:30.204214+02:00", "EventTime": "2023-10-30T14:08:30.204241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["ChfcfW3DpIl1GAF3Q6"]} -{"Format": "IDEA0", "ID": "613bafa7-bef4-42da-8085-02fc3d2aa6a1", "DetectTime": "2023-10-30T14:08:30.245354+02:00", "EventTime": "2023-10-30T14:08:30.245372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["Cgh6rsZoHsEDdg1W4"]} -{"Format": "IDEA0", "ID": "88cf829e-0baf-49a8-930a-a2ec55053647", "DetectTime": "2023-10-30T14:08:30.287156+02:00", "EventTime": "2023-10-30T14:08:30.287184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CFn3LT3KxMBluVjFz2"]} -{"Format": "IDEA0", "ID": "d83210e6-77cc-4ae5-bb5c-1b93a7f7e3ee", "DetectTime": "2023-10-30T14:08:30.324916+02:00", "EventTime": "2023-10-30T14:08:30.324939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C1zQya4LB7QFgmY8"]} -{"Format": "IDEA0", "ID": "eae42241-1025-4ebb-8245-5d1318a09d38", "DetectTime": "2023-10-30T14:08:30.364217+02:00", "EventTime": "2023-10-30T14:08:30.364234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CzldyTTLFPVj3qxLa"]} -{"Format": "IDEA0", "ID": "81e3a7af-e66f-4464-af79-eadea18a8e02", "DetectTime": "2023-10-30T14:08:30.409220+02:00", "EventTime": "2023-10-30T14:08:30.409235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVqGIUSPL9wx6qZG8"]} -{"Format": "Json", "ID": "81e3a7af-e66f-4464-af79-eadea18a8e02", "DetectTime": "2023-10-30T14:08:30.409220+02:00", "EventTime": "2023-10-30T14:08:30.409235+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:15:27.587371+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:30.478768)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "16ac58e9-0fc2-4f97-b210-96b907865ff3", "DetectTime": "2023-10-30T14:08:30.484389+02:00", "EventTime": "2023-10-30T14:08:30.484405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C7ZtNN3iab4dzS9HSj"]} -{"Format": "IDEA0", "ID": "ad0aaacb-fdc6-487c-94ba-a6360de25863", "DetectTime": "2023-10-30T14:08:30.525551+02:00", "EventTime": "2023-10-30T14:08:30.525574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CO4hre1fVdtoca1QUl"]} -{"Format": "IDEA0", "ID": "e82483a9-5820-4223-9ac8-77e30a72d239", "DetectTime": "2023-10-30T14:08:30.563871+02:00", "EventTime": "2023-10-30T14:08:30.563899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CsCAfXPMG07u5oj23"]} -{"Format": "IDEA0", "ID": "a5b712d6-cae6-4416-84ae-14297dc0d579", "DetectTime": "2023-10-30T14:08:30.608488+02:00", "EventTime": "2023-10-30T14:08:30.608505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["C2bQBH33SeIj0Vehs2"]} -{"Format": "IDEA0", "ID": "0823e054-f1ef-45b5-ad34-3cb87319df38", "DetectTime": "2023-10-30T14:08:30.647931+02:00", "EventTime": "2023-10-30T14:08:30.647951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CGmQIc35bs2ztDSJj"]} -{"Format": "IDEA0", "ID": "f232e33a-fbe8-429e-b015-7da624f2a9d8", "DetectTime": "2023-10-30T14:08:30.688866+02:00", "EventTime": "2023-10-30T14:08:30.688883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["Cm7nt94Qf7vF5IBski"]} -{"Format": "IDEA0", "ID": "4e0452de-499f-47cb-b5b3-bcaa48349ea4", "DetectTime": "2023-10-30T14:08:30.725956+02:00", "EventTime": "2023-10-30T14:08:30.725968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["Cm348R2rI9ysZMMrah"]} -{"Format": "IDEA0", "ID": "d8294a3d-c6d0-4e55-828d-b5a075a88841", "DetectTime": "2023-10-30T14:08:30.763990+02:00", "EventTime": "2023-10-30T14:08:30.764014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CsC6FF1Y6OpUmFWqs6"]} -{"Format": "Json", "ID": "d8294a3d-c6d0-4e55-828d-b5a075a88841", "DetectTime": "2023-10-30T14:08:30.763990+02:00", "EventTime": "2023-10-30T14:08:30.764014+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:15:29.858398+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:30.840304)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "26015dbb-2ac7-466b-b7f8-b0b66e0c762e", "DetectTime": "2023-10-30T14:08:30.845584+02:00", "EventTime": "2023-10-30T14:08:30.845611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CcgZOK140xCWw2EYc9"]} -{"Format": "IDEA0", "ID": "33522096-85ab-4676-bf62-e058137c6759", "DetectTime": "2023-10-30T14:08:30.880755+02:00", "EventTime": "2023-10-30T14:08:30.880772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CLS64U3viKN0zxsOI5"]} -{"Format": "IDEA0", "ID": "2d1ca1de-433b-4742-a938-ef64cfe5ec74", "DetectTime": "2023-10-30T14:08:30.907764+02:00", "EventTime": "2023-10-30T14:08:30.907777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CNWQ6m3nB2zfFMCu0f"]} -{"Format": "IDEA0", "ID": "c7786e06-faf3-4353-9f49-9a2a48bebd2a", "DetectTime": "2023-10-30T14:08:30.944921+02:00", "EventTime": "2023-10-30T14:08:30.944943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CQdDln2FmJK2C9AWHb"]} -{"Format": "IDEA0", "ID": "113f3d38-4638-4409-871f-beda8ebf5f5f", "DetectTime": "2023-10-30T14:08:30.982808+02:00", "EventTime": "2023-10-30T14:08:30.982833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CcMltd3bnN0FF4dDj4"]} -{"Format": "IDEA0", "ID": "5f77cc35-31a5-4eae-a374-3ba330f3739f", "DetectTime": "2023-10-30T14:08:31.017470+02:00", "EventTime": "2023-10-30T14:08:31.017496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15362], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. ", "ContentType": "text/plain"}], "uids": ["CREFAC1oy8Ju5VjNtk"]} -{"Format": "IDEA0", "ID": "7515f2d3-458c-42b4-ab8f-5206899edbbe", "DetectTime": "2023-10-30T14:08:31.054687+02:00", "EventTime": "2023-10-30T14:08:31.054709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["C0iF942xK63JThc6E6"]} -{"Format": "IDEA0", "ID": "a7b51051-da76-4588-935c-e8256a5610f6", "DetectTime": "2023-10-30T14:08:31.091709+02:00", "EventTime": "2023-10-30T14:08:31.091730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CJeKTI1M8hGYHgD5Tk"]} -{"Format": "IDEA0", "ID": "d379fb58-7482-42b5-acde-327f56ea5109", "DetectTime": "2023-10-30T14:08:31.132120+02:00", "EventTime": "2023-10-30T14:08:31.132131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. ", "ContentType": "text/plain"}], "uids": ["CFhAe52OxCXn7mWZ84"]} -{"Format": "Json", "ID": "d379fb58-7482-42b5-acde-327f56ea5109", "DetectTime": "2023-10-30T14:08:31.132120+02:00", "EventTime": "2023-10-30T14:08:31.132131+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1197], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:15:32.600524+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:31.203547)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6931591-b981-496d-b61d-f1b01312c7b9", "DetectTime": "2023-10-30T14:08:31.209049+02:00", "EventTime": "2023-10-30T14:08:31.209071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["C0OszW1nD3QwYZ99s6"]} -{"Format": "IDEA0", "ID": "e8c02f18-e702-424e-b89c-10cf55128382", "DetectTime": "2023-10-30T14:08:31.244465+02:00", "EventTime": "2023-10-30T14:08:31.244487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CuqiEI256pvpegpw91"]} -{"Format": "IDEA0", "ID": "57fc8c54-98b1-47fb-8062-226c52b7a995", "DetectTime": "2023-10-30T14:08:31.278367+02:00", "EventTime": "2023-10-30T14:08:31.278392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6761], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. ", "ContentType": "text/plain"}], "uids": ["CeJxCGCWbmclDyfck"]} -{"Format": "IDEA0", "ID": "a34f1904-d904-4a55-b1c6-8d21ca83ef55", "DetectTime": "2023-10-30T14:08:31.311497+02:00", "EventTime": "2023-10-30T14:08:31.311516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CujWhq4vXtiEfuhK5g"]} -{"Format": "IDEA0", "ID": "027df389-9ecb-46a7-9f81-7880cffbc010", "DetectTime": "2023-10-30T14:08:31.343686+02:00", "EventTime": "2023-10-30T14:08:31.343699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQWaeOzFijgAViJ6l"]} -{"Format": "IDEA0", "ID": "74cc29ea-d3ca-4dd6-9b83-73d1d9b6c27d", "DetectTime": "2023-10-30T14:08:31.375637+02:00", "EventTime": "2023-10-30T14:08:31.375655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CaHhV14P4AGy0oC3C7"]} -{"Format": "IDEA0", "ID": "3563d6ba-9437-452c-905f-f29b0324f266", "DetectTime": "2023-10-30T14:08:31.407133+02:00", "EventTime": "2023-10-30T14:08:31.407146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CnsXgF38E7zSqPnFgf"]} -{"Format": "IDEA0", "ID": "204a398a-5489-473f-b2c7-f544c4293335", "DetectTime": "2023-10-30T14:08:31.433249+02:00", "EventTime": "2023-10-30T14:08:31.433271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cur8hm2i8oxbgpHsvg"]} -{"Format": "IDEA0", "ID": "33c5acf2-3493-4edc-be50-7ec9cdf1595b", "DetectTime": "2023-10-30T14:08:31.468597+02:00", "EventTime": "2023-10-30T14:08:31.468616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CY7LPIdkausQPWrjd"]} -{"Format": "Json", "ID": "33c5acf2-3493-4edc-be50-7ec9cdf1595b", "DetectTime": "2023-10-30T14:08:31.468597+02:00", "EventTime": "2023-10-30T14:08:31.468616+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:46:22.452477+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:31.544888)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cfdfa0e4-b21b-4e18-8861-a005798ad88b", "DetectTime": "2023-10-30T14:08:31.550188+02:00", "EventTime": "2023-10-30T14:08:31.550203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CUjsgL19GK7YUeRyoe"]} -{"Format": "IDEA0", "ID": "49b794bf-9c20-472e-8c1d-d2d90c69324d", "DetectTime": "2023-10-30T14:08:31.581363+02:00", "EventTime": "2023-10-30T14:08:31.581388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CL0Hj5yTB3QltYRD1"]} -{"Format": "IDEA0", "ID": "b15961ca-7f24-44e3-9253-0147f17fb545", "DetectTime": "2023-10-30T14:08:31.611790+02:00", "EventTime": "2023-10-30T14:08:31.611817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C7ff7qUebKYR5ccD"]} -{"Format": "IDEA0", "ID": "85cfa826-aa02-4dd2-ab65-fdbd44091d6c", "DetectTime": "2023-10-30T14:08:31.646119+02:00", "EventTime": "2023-10-30T14:08:31.646154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Ck5wAB4OrGnSmyFvQ6"]} -{"Format": "IDEA0", "ID": "2ebe0d9b-5816-42b9-98ca-5723a0503f91", "DetectTime": "2023-10-30T14:08:31.677520+02:00", "EventTime": "2023-10-30T14:08:31.677547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMficw2Yyiy82CDU86"]} -{"Format": "IDEA0", "ID": "26dce173-2c28-4c0a-a072-3ebf43791fbe", "DetectTime": "2023-10-30T14:08:31.709926+02:00", "EventTime": "2023-10-30T14:08:31.709942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CJYWTj2Rt3Kzk3jGi3"]} -{"Format": "IDEA0", "ID": "ab0ecd8c-682d-4597-9b3d-7a6d9917ebb1", "DetectTime": "2023-10-30T14:08:31.740021+02:00", "EventTime": "2023-10-30T14:08:31.740039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CNywOS2rxZaThOeFAf"]} -{"Format": "IDEA0", "ID": "d5e60758-1e92-42db-85d8-7b4f86196ca6", "DetectTime": "2023-10-30T14:08:31.772750+02:00", "EventTime": "2023-10-30T14:08:31.772777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C9D0Fr1Iog8YopvYg5"]} -{"Format": "Json", "ID": "d5e60758-1e92-42db-85d8-7b4f86196ca6", "DetectTime": "2023-10-30T14:08:31.772750+02:00", "EventTime": "2023-10-30T14:08:31.772777+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:46:24.269002+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:31.844029)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bfbdeafd-f421-416f-b7d9-8c237262e0ee", "DetectTime": "2023-10-30T14:08:31.850309+02:00", "EventTime": "2023-10-30T14:08:31.850328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cg6QEU3WpyNMKVXzGh"]} -{"Format": "IDEA0", "ID": "338466a4-d636-4487-84b1-23746612e376", "DetectTime": "2023-10-30T14:08:31.880471+02:00", "EventTime": "2023-10-30T14:08:31.880498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CAo9AWrtEdJihRU07"]} -{"Format": "IDEA0", "ID": "cfd49caa-b97f-49c4-8385-f995f9dd50e7", "DetectTime": "2023-10-30T14:08:31.909914+02:00", "EventTime": "2023-10-30T14:08:31.909935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CQP8FX3w4fyIHqjIR8"]} -{"Format": "IDEA0", "ID": "56b30d95-0542-40cf-8389-8accdafca746", "DetectTime": "2023-10-30T14:08:31.941481+02:00", "EventTime": "2023-10-30T14:08:31.941503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CUF5KAz7wxcLpTnCf"]} -{"Format": "IDEA0", "ID": "4bcaf1ec-0de0-44e7-89ef-3e734529fe38", "DetectTime": "2023-10-30T14:08:31.969784+02:00", "EventTime": "2023-10-30T14:08:31.969806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CX4Ftz3kRll6b32tf4"]} -{"Format": "IDEA0", "ID": "dcf3e11e-7c60-492c-9752-47d23caf5477", "DetectTime": "2023-10-30T14:08:31.996916+02:00", "EventTime": "2023-10-30T14:08:31.996933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CRhXAr4yMFPDPYEU7h"]} -{"Format": "IDEA0", "ID": "48332310-d426-4d96-9d59-db630369533a", "DetectTime": "2023-10-30T14:08:32.025678+02:00", "EventTime": "2023-10-30T14:08:32.025705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CHpZyC39ypHdZs1mt3"]} -{"Format": "IDEA0", "ID": "4b0adbfa-8904-442d-a48f-c263ed3388ae", "DetectTime": "2023-10-30T14:08:32.061045+02:00", "EventTime": "2023-10-30T14:08:32.061064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C8GMaYMLPsCcYzvn6"]} -{"Format": "IDEA0", "ID": "750aa4ef-1e92-4585-a0f0-a8575f6f557f", "DetectTime": "2023-10-30T14:08:32.085585+02:00", "EventTime": "2023-10-30T14:08:32.085601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CFaanSK2sq83nu7Il"]} -{"Format": "Json", "ID": "750aa4ef-1e92-4585-a0f0-a8575f6f557f", "DetectTime": "2023-10-30T14:08:32.085585+02:00", "EventTime": "2023-10-30T14:08:32.085601+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T00:46:26.556147+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:32.152183)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0e91d006-b98f-4a45-b3c1-cdb3c292b0e4", "DetectTime": "2023-10-30T14:08:32.157986+02:00", "EventTime": "2023-10-30T14:08:32.158003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CqtJ9Q2RqbEbwvr8i5"]} -{"Format": "IDEA0", "ID": "2cf84ab2-0edf-45a4-b7e2-52f834c943e5", "DetectTime": "2023-10-30T14:08:32.188548+02:00", "EventTime": "2023-10-30T14:08:32.188569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CgB5bE2NJunhOTyRJf"]} -{"Format": "IDEA0", "ID": "2d49da55-ef3e-4e88-bffe-188e1b75290f", "DetectTime": "2023-10-30T14:08:32.219759+02:00", "EventTime": "2023-10-30T14:08:32.219779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CEpQ4M3a5CgBM32hF5"]} -{"Format": "IDEA0", "ID": "274fb3dd-ec62-4cb8-a241-6937e6480bdd", "DetectTime": "2023-10-30T14:08:32.246182+02:00", "EventTime": "2023-10-30T14:08:32.246202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CZpyTqsuzRGgLen6e"]} -{"Format": "IDEA0", "ID": "21cb6535-6cc8-4572-bc5a-53f2e82bff7e", "DetectTime": "2023-10-30T14:08:32.275550+02:00", "EventTime": "2023-10-30T14:08:32.275571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CDwTHJ2J3WPzl6HSIk"]} -{"Format": "IDEA0", "ID": "0a0f8486-c5d2-4fb5-9f58-f565091360bc", "DetectTime": "2023-10-30T14:08:32.305318+02:00", "EventTime": "2023-10-30T14:08:32.305335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["C91dxz3TjJVD6bcM2a"]} -{"Format": "IDEA0", "ID": "ad3be3a3-2726-41a3-87eb-5810c2ff0673", "DetectTime": "2023-10-30T14:08:32.334556+02:00", "EventTime": "2023-10-30T14:08:32.334584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CMVe3gjZbfhPCNEX3"]} -{"Format": "IDEA0", "ID": "c529221f-3cf4-4a5d-8997-fedf76614791", "DetectTime": "2023-10-30T14:08:32.363049+02:00", "EventTime": "2023-10-30T14:08:32.363070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVTcwN30XFV7dI3H2j"]} -{"Format": "Json", "ID": "c529221f-3cf4-4a5d-8997-fedf76614791", "DetectTime": "2023-10-30T14:08:32.363049+02:00", "EventTime": "2023-10-30T14:08:32.363070+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-06T00:51:48.852447+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2023/10/30 14:08:32.436343)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c8a882ee-befb-4bfe-ab9a-455a913abae6", "DetectTime": "2023-10-30T14:08:32.442017+02:00", "EventTime": "2023-10-30T14:08:32.442031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CcB6pDVyLvtfkKOp"]} -{"Format": "IDEA0", "ID": "16095557-b293-4c3d-87f3-cfdcf76f160e", "DetectTime": "2023-10-30T14:08:32.470093+02:00", "EventTime": "2023-10-30T14:08:32.470119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CrmKpB1KCUZEOGCZYa"]} -{"Format": "IDEA0", "ID": "4fc4468c-834c-4b16-b07f-1aa036094c15", "DetectTime": "2023-10-30T14:08:32.518333+02:00", "EventTime": "2023-10-30T14:08:32.518351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CxEucF3M9eaMCpPuB2"]} -{"Format": "IDEA0", "ID": "e7f52948-d5dc-4185-98ab-e5023d3f2899", "DetectTime": "2023-10-30T14:08:32.566931+02:00", "EventTime": "2023-10-30T14:08:32.566950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CczV1x3M9rnQ70TZq2"]} -{"Format": "IDEA0", "ID": "0c3b6176-df7f-4521-801c-336bf1644b1b", "DetectTime": "2023-10-30T14:08:32.609001+02:00", "EventTime": "2023-10-30T14:08:32.609028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["ClL9ZERHtf1HAG4Q"]} -{"Format": "IDEA0", "ID": "64b27d98-2f6f-4a50-aa5c-d7684be3d371", "DetectTime": "2023-10-30T14:08:32.655867+02:00", "EventTime": "2023-10-30T14:08:32.655886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CeJhJEvZL2VOxNoi"]} -{"Format": "IDEA0", "ID": "0049f3a2-c514-4013-addf-965efe13b331", "DetectTime": "2023-10-30T14:08:32.700672+02:00", "EventTime": "2023-10-30T14:08:32.700692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cfwf7chPMKCXdxWZ6"]} -{"Format": "IDEA0", "ID": "9d0afd77-150c-4814-aea6-f66abb3f4dd2", "DetectTime": "2023-10-30T14:08:32.742453+02:00", "EventTime": "2023-10-30T14:08:32.742468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CdgdYcaDVrxhpQfqc"]} -{"Format": "Json", "ID": "9d0afd77-150c-4814-aea6-f66abb3f4dd2", "DetectTime": "2023-10-30T14:08:32.742453+02:00", "EventTime": "2023-10-30T14:08:32.742468+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T01:18:20.782758+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:32.839335)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a93b7441-a27c-4bd8-8cd0-03a01cc3e30b", "DetectTime": "2023-10-30T14:08:32.845560+02:00", "EventTime": "2023-10-30T14:08:32.845583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["C2IuWg1LNFMb7fFlkj"]} -{"Format": "IDEA0", "ID": "c1e91456-4a3a-4ca4-9a6d-e31f50149468", "DetectTime": "2023-10-30T14:08:32.888515+02:00", "EventTime": "2023-10-30T14:08:32.888538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cv7LbD13UQHnTutuel"]} -{"Format": "IDEA0", "ID": "f99d3973-3ab8-4f22-ba3b-7ba1b27b3c38", "DetectTime": "2023-10-30T14:08:32.929765+02:00", "EventTime": "2023-10-30T14:08:32.929785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cta5ZJ2T7PdLbAuIA5"]} -{"Format": "IDEA0", "ID": "8d2b637b-68f1-4549-8e62-281b6cf657ba", "DetectTime": "2023-10-30T14:08:32.968042+02:00", "EventTime": "2023-10-30T14:08:32.968059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["CzIr1nUEo0bIqXMN6"]} -{"Format": "IDEA0", "ID": "b3d8076a-d1ad-4048-87d2-e8ea02c52c47", "DetectTime": "2023-10-30T14:08:32.993117+02:00", "EventTime": "2023-10-30T14:08:32.993134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C1Wd714vPlgrYaxXg6"]} -{"Format": "IDEA0", "ID": "76046e22-6ab4-4632-b350-da74dbce1bce", "DetectTime": "2023-10-30T14:08:33.035042+02:00", "EventTime": "2023-10-30T14:08:33.035059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CRBCDM2AnLM61w2yWe"]} -{"Format": "IDEA0", "ID": "4179e48b-5206-4332-b5f0-a43bd70995f8", "DetectTime": "2023-10-30T14:08:33.102077+02:00", "EventTime": "2023-10-30T14:08:33.102101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CnxRso3VOBzu6f0Ije"]} -{"Format": "IDEA0", "ID": "30c42479-5d97-4d3f-9c46-1b60afb913e9", "DetectTime": "2023-10-30T14:08:33.151596+02:00", "EventTime": "2023-10-30T14:08:33.151608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C3NpbZ1G99HfU0HITj"]} -{"Format": "IDEA0", "ID": "df5d3e5c-e75a-4378-ab6b-0b2f9baa7281", "DetectTime": "2023-10-30T14:08:33.200263+02:00", "EventTime": "2023-10-30T14:08:33.200283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C56goKce6neqdOM36"]} -{"Format": "Json", "ID": "df5d3e5c-e75a-4378-ab6b-0b2f9baa7281", "DetectTime": "2023-10-30T14:08:33.200263+02:00", "EventTime": "2023-10-30T14:08:33.200283+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T01:18:22.516900+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:33.294533)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dd39cc5c-4d7e-4d56-ae3d-567de0e6a3d3", "DetectTime": "2023-10-30T14:08:33.300593+02:00", "EventTime": "2023-10-30T14:08:33.300619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CDN2ph2h4wtX3b8Gkl"]} -{"Format": "IDEA0", "ID": "c73e864e-194d-400f-a1a3-d5351c633bc4", "DetectTime": "2023-10-30T14:08:33.349579+02:00", "EventTime": "2023-10-30T14:08:33.349605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CP4iW04pqFfdO0Nx34"]} -{"Format": "IDEA0", "ID": "bda4f7e3-920e-4687-a9f7-3636cc39e6c0", "DetectTime": "2023-10-30T14:08:33.395793+02:00", "EventTime": "2023-10-30T14:08:33.395822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CberUR3j1oXsxWR7G7"]} -{"Format": "IDEA0", "ID": "bf9b327e-939f-4f14-8682-121516da960f", "DetectTime": "2023-10-30T14:08:33.439170+02:00", "EventTime": "2023-10-30T14:08:33.439186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CedWlw4mPmDWC5SOk"]} -{"Format": "IDEA0", "ID": "270744a8-1e53-46d0-a150-901f63b965b9", "DetectTime": "2023-10-30T14:08:33.483562+02:00", "EventTime": "2023-10-30T14:08:33.483579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["ClkEau2OorebX3pm4j"]} -{"Format": "IDEA0", "ID": "21153a3c-8719-4921-8fd5-a57a92ab5a89", "DetectTime": "2023-10-30T14:08:33.511900+02:00", "EventTime": "2023-10-30T14:08:33.511995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["COfC5t1MVvrLIkmTK4"]} -{"Format": "IDEA0", "ID": "7e7f4391-459c-4b13-a3c1-c499a7c0d7f9", "DetectTime": "2023-10-30T14:08:33.557640+02:00", "EventTime": "2023-10-30T14:08:33.557669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CDmf7823jejd5V0Zh7"]} -{"Format": "IDEA0", "ID": "2cfbe4c0-f0fe-49f9-b791-776b76c1c3f0", "DetectTime": "2023-10-30T14:08:33.607662+02:00", "EventTime": "2023-10-30T14:08:33.607684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CbRr1L1DXjBAMCQt2"]} -{"Format": "IDEA0", "ID": "65fb25b3-811a-4d47-978f-e35e4aad2170", "DetectTime": "2023-10-30T14:08:33.651561+02:00", "EventTime": "2023-10-30T14:08:33.651585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ca7bmz3KvSJBupNxP"]} -{"Format": "IDEA0", "ID": "8519bbfe-6c2c-4d2c-a063-27a4ddc7a220", "DetectTime": "2023-10-30T14:08:33.686824+02:00", "EventTime": "2023-10-30T14:08:33.686849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["COJ5ay2GAOU0ADMTfi"]} -{"Format": "Json", "ID": "8519bbfe-6c2c-4d2c-a063-27a4ddc7a220", "DetectTime": "2023-10-30T14:08:33.686824+02:00", "EventTime": "2023-10-30T14:08:33.686849+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T01:18:24.717674+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:33.783610)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ad01f140-b16f-4fa7-b244-4586c8c81264", "DetectTime": "2023-10-30T14:08:33.789665+02:00", "EventTime": "2023-10-30T14:08:33.789683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C577Ki3RuldFHC4lyd"]} -{"Format": "IDEA0", "ID": "a1814eea-df88-4680-830b-0f22bac20b06", "DetectTime": "2023-10-30T14:08:33.842930+02:00", "EventTime": "2023-10-30T14:08:33.842954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CwogHe1oTzR9aKrWrb"]} -{"Format": "IDEA0", "ID": "440d58f8-2386-4506-9527-69a969370cef", "DetectTime": "2023-10-30T14:08:33.874338+02:00", "EventTime": "2023-10-30T14:08:33.874353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CF1ifp4rKSHASVmIQ8"]} -{"Format": "IDEA0", "ID": "4ae66f0c-95d4-461a-9a66-ecf97a144a6d", "DetectTime": "2023-10-30T14:08:33.904875+02:00", "EventTime": "2023-10-30T14:08:33.904904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CyusFCfojRgJGxH6h"]} -{"Format": "IDEA0", "ID": "c1f4c546-01c6-4427-95fe-824769a97c5c", "DetectTime": "2023-10-30T14:08:33.939231+02:00", "EventTime": "2023-10-30T14:08:33.939259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CNWQg71WUnLhfyc5Ra"]} -{"Format": "IDEA0", "ID": "add49a9f-e0ab-4cd3-bb83-eba4e4cbad02", "DetectTime": "2023-10-30T14:08:33.970937+02:00", "EventTime": "2023-10-30T14:08:33.970965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CVg3s625ChE4S1A3c6"]} -{"Format": "IDEA0", "ID": "124b074e-05c8-43d6-856c-5dab8da3062c", "DetectTime": "2023-10-30T14:08:34.002593+02:00", "EventTime": "2023-10-30T14:08:34.002610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CXjKdg2vwOjJz0FL09"]} -{"Format": "IDEA0", "ID": "7c77ea78-1145-407c-b870-2200ae80dabf", "DetectTime": "2023-10-30T14:08:34.046608+02:00", "EventTime": "2023-10-30T14:08:34.046652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CueQuI1YW6D9LK3HCl"]} -{"Format": "IDEA0", "ID": "5d2d050a-3c11-41b1-97a5-86e26afa0fc0", "DetectTime": "2023-10-30T14:08:34.076779+02:00", "EventTime": "2023-10-30T14:08:34.076804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CJvxpwLdA9VpONnCd"]} -{"Format": "IDEA0", "ID": "bec08f7f-8d20-4045-aa5b-120354a13afd", "DetectTime": "2023-10-30T14:08:34.113099+02:00", "EventTime": "2023-10-30T14:08:34.113113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C2rXgH1DGBYEi36mq7"]} -{"Format": "IDEA0", "ID": "46f1e6eb-f2e2-4976-ac08-602f84617e39", "DetectTime": "2023-10-30T14:08:34.143596+02:00", "EventTime": "2023-10-30T14:08:34.143614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["Cg6go12GBhOdMjjBWb"]} -{"Format": "IDEA0", "ID": "08c84c40-9b09-4d0d-a3d1-5d0f3d601dd9", "DetectTime": "2023-10-30T14:08:34.175500+02:00", "EventTime": "2023-10-30T14:08:34.175523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CW7KCPbDTHOahJMwj"]} -{"Format": "IDEA0", "ID": "47d3a640-d8ac-4156-822b-57bab0c6e364", "DetectTime": "2023-10-30T14:08:34.204617+02:00", "EventTime": "2023-10-30T14:08:34.204634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CqNrbY2EKQSHfBehp5"]} -{"Format": "IDEA0", "ID": "ba47a650-20af-4e40-872f-6fdc6ba291a7", "DetectTime": "2023-10-30T14:08:34.235702+02:00", "EventTime": "2023-10-30T14:08:34.235718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CkHJR21znBTqJFdU3b"]} -{"Format": "IDEA0", "ID": "215b055a-5540-4c22-a099-e8a211661c29", "DetectTime": "2023-10-30T14:08:34.268813+02:00", "EventTime": "2023-10-30T14:08:34.268842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CBXQ1A2xgg3Zsq4hde"]} -{"Format": "IDEA0", "ID": "8cd95ba4-7858-4253-bcb3-ec3a5297df79", "DetectTime": "2023-10-30T14:08:34.303203+02:00", "EventTime": "2023-10-30T14:08:34.303229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C6na8N3wSJfGiwTHa3"]} -{"Format": "IDEA0", "ID": "8f0badce-e8d6-4a32-9dea-8cb0eca48b74", "DetectTime": "2023-10-30T14:08:34.337170+02:00", "EventTime": "2023-10-30T14:08:34.337192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CIAo8eTMUkKrWFc41"]} -{"Format": "IDEA0", "ID": "30b1cdbf-dad1-415b-8fb4-8811d8fddc35", "DetectTime": "2023-10-30T14:08:34.381345+02:00", "EventTime": "2023-10-30T14:08:34.381364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CZ8HRr25746HzDwedi"]} -{"Format": "IDEA0", "ID": "41637218-f635-4f4f-8a55-330ff8ad43a1", "DetectTime": "2023-10-30T14:08:34.414678+02:00", "EventTime": "2023-10-30T14:08:34.414710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CmdkA13yTW7FxoXfla"]} -{"Format": "IDEA0", "ID": "205e00b9-bfd8-4dcf-8252-f0b348cbd350", "DetectTime": "2023-10-30T14:08:34.448129+02:00", "EventTime": "2023-10-30T14:08:34.448146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CIbxzSv02ehp274td"]} -{"Format": "IDEA0", "ID": "35411107-bea0-4a57-9bb0-7cfe23261044", "DetectTime": "2023-10-30T14:08:34.481743+02:00", "EventTime": "2023-10-30T14:08:34.481808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.112.233.128 ", "ContentType": "text/plain"}], "uids": ["CzdAKb3L6HxQUPvVad"]} -{"Format": "IDEA0", "ID": "7b196c93-d733-4c35-8d64-285fc72e333c", "DetectTime": "2023-10-30T14:08:34.516902+02:00", "EventTime": "2023-10-30T14:08:34.516950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CpOKIk39QuXSLLeN69"]} -{"Format": "IDEA0", "ID": "e612e910-5552-4f20-a746-5873cab1dca9", "DetectTime": "2023-10-30T14:08:34.557214+02:00", "EventTime": "2023-10-30T14:08:34.557237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["Co0CJUBYoWUVfvlTe"]} -{"Format": "IDEA0", "ID": "15e714f1-b214-49ea-80a2-73bcc7e967d9", "DetectTime": "2023-10-30T14:08:34.595021+02:00", "EventTime": "2023-10-30T14:08:34.595039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.28.73.174 ", "ContentType": "text/plain"}], "uids": ["CSvpuR2k2woN4kRlYa"]} -{"Format": "IDEA0", "ID": "990a0c75-bdb6-43a1-ad2c-88529c3bc66a", "DetectTime": "2023-10-30T14:08:34.629531+02:00", "EventTime": "2023-10-30T14:08:34.629559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.208.73.146 ", "ContentType": "text/plain"}], "uids": ["CiTH5N3qC2M6oZzCQ6"]} -{"Format": "IDEA0", "ID": "b308d2fa-fffd-452a-8d81-452d1c2cc3ef", "DetectTime": "2023-10-30T14:08:34.664159+02:00", "EventTime": "2023-10-30T14:08:34.664186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CfyO2f2vASz15jTJQ2"]} -{"Format": "IDEA0", "ID": "1737894a-1f9b-4be2-b646-eecc12bd2495", "DetectTime": "2023-10-30T14:08:34.700046+02:00", "EventTime": "2023-10-30T14:08:34.700076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.222.48.200 ", "ContentType": "text/plain"}], "uids": ["CU1dTO1ndpfBE6akKg"]} -{"Format": "IDEA0", "ID": "30e5febe-8920-4a83-901a-45a502903d22", "DetectTime": "2023-10-30T14:08:34.733917+02:00", "EventTime": "2023-10-30T14:08:34.733935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8awIsW1NiYszyqVi"]} -{"Format": "IDEA0", "ID": "3ee335ea-30d9-4d12-9446-f5e0add51e1e", "DetectTime": "2023-10-30T14:08:34.772321+02:00", "EventTime": "2023-10-30T14:08:34.772344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.111.237.222 ", "ContentType": "text/plain"}], "uids": ["CBmEKB3MAal2OdYunc"]} -{"Format": "IDEA0", "ID": "a8963336-2461-472b-ace1-61228c54744c", "DetectTime": "2023-10-30T14:08:34.807266+02:00", "EventTime": "2023-10-30T14:08:34.807295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cl2t4C368oYKOvryl8"]} -{"Format": "IDEA0", "ID": "009f9313-1c4e-46b2-bbab-f53979694b47", "DetectTime": "2023-10-30T14:08:34.852632+02:00", "EventTime": "2023-10-30T14:08:34.852653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CG4wi6CePhU1ivXj"]} -{"Format": "IDEA0", "ID": "005278a4-0936-4169-881d-29613993c96f", "DetectTime": "2023-10-30T14:08:34.884592+02:00", "EventTime": "2023-10-30T14:08:34.884611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C3cLEF3TMBXiHpCTD4"]} -{"Format": "IDEA0", "ID": "84d0a976-110a-44d4-a2dc-c0cdbafebadf", "DetectTime": "2023-10-30T14:08:34.916155+02:00", "EventTime": "2023-10-30T14:08:34.916181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CDRUrE3i02kXjpnitc"]} -{"Format": "IDEA0", "ID": "afcfca0b-37d8-4e0b-a0f9-da51a93ba11f", "DetectTime": "2023-10-30T14:08:34.949128+02:00", "EventTime": "2023-10-30T14:08:34.949156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CWpZwN3gL5vkppJkzd"]} -{"Format": "IDEA0", "ID": "50f297e7-b710-4632-88cf-e8f6c562fce5", "DetectTime": "2023-10-30T14:08:34.983537+02:00", "EventTime": "2023-10-30T14:08:34.983566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Ckva561pPThs6wi3Eb"]} -{"Format": "IDEA0", "ID": "a8fed179-e158-4d81-8952-75a440cf4afc", "DetectTime": "2023-10-30T14:08:35.018244+02:00", "EventTime": "2023-10-30T14:08:35.018263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CBw1bx4nUwXOyhoYd1"]} -{"Format": "IDEA0", "ID": "fd09dde6-0a95-4dc3-925d-8cc830002880", "DetectTime": "2023-10-30T14:08:35.050275+02:00", "EventTime": "2023-10-30T14:08:35.050300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C5bRF2ptjlcT3C5w"]} -{"Format": "IDEA0", "ID": "94e1d46a-a6ce-4dee-bc08-6b9c1f527ab6", "DetectTime": "2023-10-30T14:08:35.080577+02:00", "EventTime": "2023-10-30T14:08:35.080597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CSrSJn1KWEcZJnmzdh"]} -{"Format": "IDEA0", "ID": "1850e6d2-c263-4393-8231-2158442cdbac", "DetectTime": "2023-10-30T14:08:35.108888+02:00", "EventTime": "2023-10-30T14:08:35.108901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.138.163.107 ", "ContentType": "text/plain"}], "uids": ["Ccu8jw38IASswDOysb"]} -{"Format": "IDEA0", "ID": "2c6c3ec0-6d85-4593-8b35-c37bcd9450fc", "DetectTime": "2023-10-30T14:08:35.136540+02:00", "EventTime": "2023-10-30T14:08:35.136558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CbmVieoP3aoxIllZ2"]} -{"Format": "IDEA0", "ID": "69af72a9-890e-4361-b457-81f0d7d9e515", "DetectTime": "2023-10-30T14:08:35.168321+02:00", "EventTime": "2023-10-30T14:08:35.168340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C90sSq2zgy9xooMSP3"]} -{"Format": "IDEA0", "ID": "1c47a186-46d0-4366-a347-c66bafc93804", "DetectTime": "2023-10-30T14:08:35.200590+02:00", "EventTime": "2023-10-30T14:08:35.200615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CSceks1JqgHdv51Grg"]} -{"Format": "IDEA0", "ID": "dfc9de31-2706-4792-85a0-d79916b8efa0", "DetectTime": "2023-10-30T14:08:35.231124+02:00", "EventTime": "2023-10-30T14:08:35.231149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CGniZ545Naqfh0LWge"]} -{"Format": "IDEA0", "ID": "cd9684ef-cb20-4469-a0ca-dc9d2412ebd9", "DetectTime": "2023-10-30T14:08:35.260348+02:00", "EventTime": "2023-10-30T14:08:35.260384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.143.9.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.143.9.54 ", "ContentType": "text/plain"}], "uids": ["C4hxyv492UQkzN8e2c"]} -{"Format": "IDEA0", "ID": "7245767b-6318-46e4-bf30-68b06c580d61", "DetectTime": "2023-10-30T14:08:35.290091+02:00", "EventTime": "2023-10-30T14:08:35.290110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.237.226.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.237.226.20 ", "ContentType": "text/plain"}], "uids": ["CEGUzM3F6Qc8NuYFp1"]} -{"Format": "IDEA0", "ID": "2a107403-0e8f-4590-b646-80dc25b9eb2f", "DetectTime": "2023-10-30T14:08:35.321635+02:00", "EventTime": "2023-10-30T14:08:35.321653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CUXNbvmKAxuZprdY3"]} -{"Format": "IDEA0", "ID": "bc746bb1-94b4-466f-824b-aca31df87d76", "DetectTime": "2023-10-30T14:08:35.363433+02:00", "EventTime": "2023-10-30T14:08:35.363456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.26 ", "ContentType": "text/plain"}], "uids": ["Cpf9lb3KFSzQ9jbBOe"]} -{"Format": "IDEA0", "ID": "b1615c6d-b21f-445a-a663-34341757b425", "DetectTime": "2023-10-30T14:08:35.394160+02:00", "EventTime": "2023-10-30T14:08:35.394182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.223.109.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.223.109.218 ", "ContentType": "text/plain"}], "uids": ["CQ0qBO3FtwnlHff279"]} -{"Format": "IDEA0", "ID": "a6a684d7-fca2-40a5-b0b3-4cb902f948e6", "DetectTime": "2023-10-30T14:08:35.430997+02:00", "EventTime": "2023-10-30T14:08:35.431020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.157.234.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.157.234.166 ", "ContentType": "text/plain"}], "uids": ["CGLhGj4OPM2QO15uR7"]} -{"Format": "IDEA0", "ID": "326f2325-443c-43d6-9fa2-6fdd6802d850", "DetectTime": "2023-10-30T14:08:35.462271+02:00", "EventTime": "2023-10-30T14:08:35.462290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.176.250.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.176.250.91 ", "ContentType": "text/plain"}], "uids": ["CQlcgf3K4DinWmVE2i"]} -{"Format": "IDEA0", "ID": "2d4937fa-9ea0-4dda-991b-a8ce38e59f22", "DetectTime": "2023-10-30T14:08:35.490735+02:00", "EventTime": "2023-10-30T14:08:35.490767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["207.47.88.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 207.47.88.6 ", "ContentType": "text/plain"}], "uids": ["C5bmfg4BiPsMXLkUWf"]} -{"Format": "IDEA0", "ID": "9216bffa-1338-4eb2-9309-3a448a908720", "DetectTime": "2023-10-30T14:08:35.525099+02:00", "EventTime": "2023-10-30T14:08:35.525153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.175.49 ", "ContentType": "text/plain"}], "uids": ["Cyvy1f7HxnBpz77rh"]} -{"Format": "IDEA0", "ID": "ab541949-422f-4b22-a73f-ca545c75d61e", "DetectTime": "2023-10-30T14:08:35.554059+02:00", "EventTime": "2023-10-30T14:08:35.554076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.138.249.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.138.249.239 ", "ContentType": "text/plain"}], "uids": ["C6o12E31NYLX6mbYp1"]} -{"Format": "IDEA0", "ID": "41d5dc1d-258a-4cc8-8ccf-28e1896b9cfc", "DetectTime": "2023-10-30T14:08:35.584656+02:00", "EventTime": "2023-10-30T14:08:35.584685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CbPP511L2fDA5upOG6"]} -{"Format": "IDEA0", "ID": "81a16047-3b1b-485c-ae2f-af9a51fb6062", "DetectTime": "2023-10-30T14:08:35.619230+02:00", "EventTime": "2023-10-30T14:08:35.619256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.76.5.252"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.76.5.252 ", "ContentType": "text/plain"}], "uids": ["CcbNtiBaXXb78b8Cc"]} -{"Format": "IDEA0", "ID": "5d23acb2-d0d9-4a3c-bbac-61bad814ba09", "DetectTime": "2023-10-30T14:08:35.653018+02:00", "EventTime": "2023-10-30T14:08:35.653041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["CRPSAA1Z9dng2IoLlg"]} -{"Format": "IDEA0", "ID": "cfd9d83a-1517-47db-9721-82dcfb161445", "DetectTime": "2023-10-30T14:08:35.685427+02:00", "EventTime": "2023-10-30T14:08:35.685442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.228.154.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.228.154.5 ", "ContentType": "text/plain"}], "uids": ["C8j5SB4MHOJcCGUplc"]} -{"Format": "IDEA0", "ID": "7483112a-96a2-4a2a-b0cd-28eb1348242e", "DetectTime": "2023-10-30T14:08:35.719375+02:00", "EventTime": "2023-10-30T14:08:35.719393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.234.251.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.234.251.167 ", "ContentType": "text/plain"}], "uids": ["CqvUh94KhZxg249CQk"]} -{"Format": "IDEA0", "ID": "ed91a8ad-2b4c-4b16-ba0d-06cf28d7bea3", "DetectTime": "2023-10-30T14:08:35.751561+02:00", "EventTime": "2023-10-30T14:08:35.751585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.130.73.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.130.73.198 ", "ContentType": "text/plain"}], "uids": ["CUE6aK1M8f83ZlQYmi"]} -{"Format": "IDEA0", "ID": "58c16bfe-9df2-4979-86fc-a50f111edccf", "DetectTime": "2023-10-30T14:08:35.783331+02:00", "EventTime": "2023-10-30T14:08:35.783348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.166.193.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.166.193.152 ", "ContentType": "text/plain"}], "uids": ["Cju7Sg1lk5dicrL9m4"]} -{"Format": "IDEA0", "ID": "681f56fd-3634-4c46-ad49-9887ac4870ca", "DetectTime": "2023-10-30T14:08:35.816469+02:00", "EventTime": "2023-10-30T14:08:35.816500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["158.82.202.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 158.82.202.5 ", "ContentType": "text/plain"}], "uids": ["CZAAjp1PxHuylqQ1f2"]} -{"Format": "IDEA0", "ID": "db833769-7408-435c-96d6-ee3d4940a042", "DetectTime": "2023-10-30T14:08:35.843164+02:00", "EventTime": "2023-10-30T14:08:35.843180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.157.126.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.157.126.49 ", "ContentType": "text/plain"}], "uids": ["CFok2x2KNCXmylLHSa"]} -{"Format": "IDEA0", "ID": "94a7c1df-f8a3-44db-9415-094c8b6eece1", "DetectTime": "2023-10-30T14:08:35.873267+02:00", "EventTime": "2023-10-30T14:08:35.873282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.74.153.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.74.153.34 ", "ContentType": "text/plain"}], "uids": ["Cf9qjq2LtVgIDQVFD"]} -{"Format": "IDEA0", "ID": "1ffe072a-786b-4588-a83f-f227835e66ca", "DetectTime": "2023-10-30T14:08:35.903708+02:00", "EventTime": "2023-10-30T14:08:35.903726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.132.120.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.132.120.17 ", "ContentType": "text/plain"}], "uids": ["CD9A9a1gQkP1FL2eKi"]} -{"Format": "IDEA0", "ID": "0669c119-04ab-47e4-915a-7310674c0f60", "DetectTime": "2023-10-30T14:08:35.938217+02:00", "EventTime": "2023-10-30T14:08:35.938235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.141.12"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.141.12 ", "ContentType": "text/plain"}], "uids": ["COCZ6n2z0KwXNrLMJe"]} -{"Format": "IDEA0", "ID": "3a96ac3c-c460-419b-bb9b-14973f2a1c4e", "DetectTime": "2023-10-30T14:08:35.975646+02:00", "EventTime": "2023-10-30T14:08:35.975713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CRJyfW18vC807qnd92"]} -{"Format": "IDEA0", "ID": "c6aa71db-afa7-4b01-87d7-dfc25790b2e8", "DetectTime": "2023-10-30T14:08:36.010586+02:00", "EventTime": "2023-10-30T14:08:36.010605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.45.240.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.45.240.226 ", "ContentType": "text/plain"}], "uids": ["Cp1cCu2eFb1sJXhOWc"]} -{"Format": "IDEA0", "ID": "2f0204cc-b20e-44d4-a812-34b3aba23ffb", "DetectTime": "2023-10-30T14:08:36.049601+02:00", "EventTime": "2023-10-30T14:08:36.049701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.14.171.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.14.171.25 ", "ContentType": "text/plain"}], "uids": ["CW5pDV2tqpt780cMl7"]} -{"Format": "IDEA0", "ID": "0660d300-62b2-4eb5-86b9-fdc247aefb69", "DetectTime": "2023-10-30T14:08:36.092455+02:00", "EventTime": "2023-10-30T14:08:36.092479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.20.182.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.20.182.29 ", "ContentType": "text/plain"}], "uids": ["CEuSzo4JOGNfUj91hj"]} -{"Format": "IDEA0", "ID": "5b54582d-bd3f-46a5-9683-ad71c3640e05", "DetectTime": "2023-10-30T14:08:36.130301+02:00", "EventTime": "2023-10-30T14:08:36.130330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CzcY8t2zrfZMqmZcMl"]} -{"Format": "IDEA0", "ID": "0bea2720-ae2e-4a86-bdad-d3a44e7888ba", "DetectTime": "2023-10-30T14:08:36.161787+02:00", "EventTime": "2023-10-30T14:08:36.161815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.7.114.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.7.114.218 ", "ContentType": "text/plain"}], "uids": ["CenTRS394WE2Kmvjdd"]} -{"Format": "IDEA0", "ID": "8ec19a6b-f14d-419c-951b-a9ba1546ba71", "DetectTime": "2023-10-30T14:08:36.188872+02:00", "EventTime": "2023-10-30T14:08:36.188888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.166.22 ", "ContentType": "text/plain"}], "uids": ["C6IjYMqqrRL4MmWJe"]} -{"Format": "IDEA0", "ID": "38f96a1b-6209-4469-908b-70c59b11e2bc", "DetectTime": "2023-10-30T14:08:36.215454+02:00", "EventTime": "2023-10-30T14:08:36.215476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.245.43.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.245.43.241 ", "ContentType": "text/plain"}], "uids": ["Ci0rWt3j1IJfuIbP8f"]} -{"Format": "IDEA0", "ID": "868248b9-d4de-409c-b8ac-d540aabcb687", "DetectTime": "2023-10-30T14:08:36.242111+02:00", "EventTime": "2023-10-30T14:08:36.242129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.91.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.201.91.219 ", "ContentType": "text/plain"}], "uids": ["CEwEgIpYu7RUabhA5"]} -{"Format": "IDEA0", "ID": "b327a3d5-bf9e-4625-aa07-448f05704cf4", "DetectTime": "2023-10-30T14:08:36.269228+02:00", "EventTime": "2023-10-30T14:08:36.269250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.109.41.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.109.41.48 ", "ContentType": "text/plain"}], "uids": ["C1waxh1Nt389r635ce"]} -{"Format": "IDEA0", "ID": "84f10d2a-a435-459e-afaf-f75641e5f755", "DetectTime": "2023-10-30T14:08:36.295540+02:00", "EventTime": "2023-10-30T14:08:36.295559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.24.108.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.24.108.105 ", "ContentType": "text/plain"}], "uids": ["C6TOdQ1Ntgcv8rLQrd"]} -{"Format": "IDEA0", "ID": "0d92dc5c-9a12-42cf-852a-0e8c2a7768a1", "DetectTime": "2023-10-30T14:08:36.322892+02:00", "EventTime": "2023-10-30T14:08:36.322912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cq8gq41MVBlbRaSz6i"]} -{"Format": "IDEA0", "ID": "e5bbe87a-5263-4ab5-9b28-7b7fc1440b09", "DetectTime": "2023-10-30T14:08:36.349433+02:00", "EventTime": "2023-10-30T14:08:36.349459+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"], "Hostname": ["ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.193.194.29 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C3cksS3Wj6jQZW88hj"]} -{"Format": "IDEA0", "ID": "f8dfa925-3b4a-4f7d-a430-bf7c47601cca", "DetectTime": "2023-10-30T14:08:36.385654+02:00", "EventTime": "2023-10-30T14:08:36.385666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CxBTwO3S8ptx6TKOCg"]} -{"Format": "IDEA0", "ID": "3edc5755-5ea8-41a9-9f30-0464b3513e04", "DetectTime": "2023-10-30T14:08:36.421803+02:00", "EventTime": "2023-10-30T14:08:36.421816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.105.49.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.105.49.245 ", "ContentType": "text/plain"}], "uids": ["C1dI8lFLj8eAGNz54"]} -{"Format": "IDEA0", "ID": "d6932bbb-d07c-4927-a44c-3ff922f69b04", "DetectTime": "2023-10-30T14:08:36.451206+02:00", "EventTime": "2023-10-30T14:08:36.451233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CnTRVSq2S7yh2K2U8"]} -{"Format": "IDEA0", "ID": "43ec1f37-ff9d-4a51-8ad5-ea8f19ae50dd", "DetectTime": "2023-10-30T14:08:36.479021+02:00", "EventTime": "2023-10-30T14:08:36.479034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CEC6ZVLhXNNtLMsXj"]} -{"Format": "IDEA0", "ID": "f916f576-f706-4966-8ee4-c4ae4ac7fb49", "DetectTime": "2023-10-30T14:08:36.505004+02:00", "EventTime": "2023-10-30T14:08:36.505028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.70.246.210"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.70.246.210 ", "ContentType": "text/plain"}], "uids": ["CU22ju2Y9GXeqw2Px8"]} -{"Format": "IDEA0", "ID": "14066ca6-b16e-4d93-a15b-f9fe6ce6d552", "DetectTime": "2023-10-30T14:08:36.529725+02:00", "EventTime": "2023-10-30T14:08:36.529737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["Ctkz0p4mpzeHodPSdj"]} -{"Format": "IDEA0", "ID": "f5ded513-f82c-4c87-bceb-86c1e911c246", "DetectTime": "2023-10-30T14:08:36.555415+02:00", "EventTime": "2023-10-30T14:08:36.555431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.196.162.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.196.162.114 ", "ContentType": "text/plain"}], "uids": ["CQ6F3f2j3AJoxCZjr5"]} -{"Format": "IDEA0", "ID": "c071f226-4ba2-4619-bbbc-eada0364da2c", "DetectTime": "2023-10-30T14:08:36.581963+02:00", "EventTime": "2023-10-30T14:08:36.581975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.5.194.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.5.194.234 ", "ContentType": "text/plain"}], "uids": ["C4jcS62aYHjKtTI4Wj"]} -{"Format": "IDEA0", "ID": "9f56ea44-4b63-4308-b667-dce0f8de0e9f", "DetectTime": "2023-10-30T14:08:36.609692+02:00", "EventTime": "2023-10-30T14:08:36.609707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["Cs5e3O2Gm3JJ5amXS1"]} -{"Format": "IDEA0", "ID": "caa6d74d-4a3b-4568-8ba4-05d16ce05ab4", "DetectTime": "2023-10-30T14:08:36.637673+02:00", "EventTime": "2023-10-30T14:08:36.637687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CgYgsq29AgdAPjOw79"]} -{"Format": "IDEA0", "ID": "bb0e1141-fa97-45b3-9ad9-029204871495", "DetectTime": "2023-10-30T14:08:36.662677+02:00", "EventTime": "2023-10-30T14:08:36.662695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.147.74.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.147.74.118 ", "ContentType": "text/plain"}], "uids": ["CjWukL28xqFiqKwEJd"]} -{"Format": "IDEA0", "ID": "ca0fb997-115b-4a78-b992-230b5046213e", "DetectTime": "2023-10-30T14:08:36.690568+02:00", "EventTime": "2023-10-30T14:08:36.690595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CeRYIl3NE8gn295Rxf"]} -{"Format": "IDEA0", "ID": "4b8524bb-16cd-47df-ac42-8fb2d74f2aff", "DetectTime": "2023-10-30T14:08:36.718237+02:00", "EventTime": "2023-10-30T14:08:36.718256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.67.14.221"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.67.14.221 ", "ContentType": "text/plain"}], "uids": ["CYq1fSJxcMgmQ2Lc2"]} -{"Format": "IDEA0", "ID": "5510d711-2c77-4f9d-88a5-a7f8566fdde8", "DetectTime": "2023-10-30T14:08:36.746148+02:00", "EventTime": "2023-10-30T14:08:36.746174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.105.247.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.105.247.235 ", "ContentType": "text/plain"}], "uids": ["CQwnts4Rsh6qyscFWk"]} -{"Format": "IDEA0", "ID": "5c08e666-2c8f-43b8-b281-e723b2698c24", "DetectTime": "2023-10-30T14:08:36.767014+02:00", "EventTime": "2023-10-30T14:08:36.767027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CWSs9e39J9BDcIEINf"]} -{"Format": "IDEA0", "ID": "7c8454a3-0662-44a5-acb6-924d0a4b1577", "DetectTime": "2023-10-30T14:08:36.794496+02:00", "EventTime": "2023-10-30T14:08:36.794518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.20.232.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.20.232.79 ", "ContentType": "text/plain"}], "uids": ["CNMOQh45OzO4fTYXB2"]} -{"Format": "IDEA0", "ID": "c517d243-4095-4575-b03a-2efc5f5db72b", "DetectTime": "2023-10-30T14:08:36.820197+02:00", "EventTime": "2023-10-30T14:08:36.820225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.78.165.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.78.165.38 ", "ContentType": "text/plain"}], "uids": ["CsppS32RUJ0mOuRVS3"]} -{"Format": "IDEA0", "ID": "62dfef82-bb3c-4a90-9b0c-5435fff52f1d", "DetectTime": "2023-10-30T14:08:36.846350+02:00", "EventTime": "2023-10-30T14:08:36.846366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.54.223.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.54.223.139 ", "ContentType": "text/plain"}], "uids": ["CcyfvCtPCGa1EnnSg"]} -{"Format": "IDEA0", "ID": "ea7ee5ea-3a10-4566-aaeb-a0a5110549d9", "DetectTime": "2023-10-30T14:08:36.870116+02:00", "EventTime": "2023-10-30T14:08:36.870133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["23.24.76.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 23.24.76.117 ", "ContentType": "text/plain"}], "uids": ["CaT7vD2oagCzzwDzic"]} -{"Format": "IDEA0", "ID": "d1454b00-3ccb-40d6-8149-0865efc085e3", "DetectTime": "2023-10-30T14:08:36.893393+02:00", "EventTime": "2023-10-30T14:08:36.893420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.167.175.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.167.175.79 ", "ContentType": "text/plain"}], "uids": ["CPpY7v40dOOIseLPN5"]} -{"Format": "IDEA0", "ID": "9778f168-971a-48da-9b86-32cd837c473e", "DetectTime": "2023-10-30T14:08:36.912091+02:00", "EventTime": "2023-10-30T14:08:36.912112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.115.172.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.115.172.168 ", "ContentType": "text/plain"}], "uids": ["CpiS9R3y523aQoAGZe"]} -{"Format": "IDEA0", "ID": "33c4def1-097b-4df9-b525-ba50ec646704", "DetectTime": "2023-10-30T14:08:36.940354+02:00", "EventTime": "2023-10-30T14:08:36.940370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.29.210.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.29.210.40 ", "ContentType": "text/plain"}], "uids": ["CHqpHv4TLsQkYe1ILc"]} -{"Format": "IDEA0", "ID": "10e7bbb1-d1d1-4feb-9f02-387aa5c103ba", "DetectTime": "2023-10-30T14:08:36.965576+02:00", "EventTime": "2023-10-30T14:08:36.965615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C2rmo3DDKE0ASiBXg"]} -{"Format": "IDEA0", "ID": "303fc8bf-5169-41ad-9703-0f692df11b53", "DetectTime": "2023-10-30T14:08:36.983722+02:00", "EventTime": "2023-10-30T14:08:36.983748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.31.232.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.31.232.218 ", "ContentType": "text/plain"}], "uids": ["CI3Q994c444xaxIs44"]} -{"Format": "IDEA0", "ID": "bd814699-6ef2-4ca6-8d2e-dae2d58ff7a0", "DetectTime": "2023-10-30T14:08:37.005520+02:00", "EventTime": "2023-10-30T14:08:37.005548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.174.119.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.174.119.158 ", "ContentType": "text/plain"}], "uids": ["C3HB3Ar2DNTtFhwp4"]} -{"Format": "IDEA0", "ID": "a443b133-0676-453e-9a64-1e9643bdc04b", "DetectTime": "2023-10-30T14:08:37.036238+02:00", "EventTime": "2023-10-30T14:08:37.036285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.37.17.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.37.17.195 ", "ContentType": "text/plain"}], "uids": ["CXVlxY1G2ZgciOth7j"]} -{"Format": "IDEA0", "ID": "d98801a4-2dc7-4e11-9eff-42a6446dcf7b", "DetectTime": "2023-10-30T14:08:37.063191+02:00", "EventTime": "2023-10-30T14:08:37.063220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["Ct2C73000rKIApf27"]} -{"Format": "IDEA0", "ID": "2bfdf0e9-91c8-4024-bf41-81e0f6e25138", "DetectTime": "2023-10-30T14:08:37.082484+02:00", "EventTime": "2023-10-30T14:08:37.082507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.44.21.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.44.21.6 ", "ContentType": "text/plain"}], "uids": ["CX44b54ruX2rh3naYi"]} -{"Format": "IDEA0", "ID": "a355eaef-9363-490d-9601-53ad3ce41c7c", "DetectTime": "2023-10-30T14:08:37.102847+02:00", "EventTime": "2023-10-30T14:08:37.102864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.196.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.196.83 ", "ContentType": "text/plain"}], "uids": ["C1UK4r3BVgp29ZT989"]} -{"Format": "IDEA0", "ID": "05c0b0b3-4ffa-4fc9-9500-23a437ae8364", "DetectTime": "2023-10-30T14:08:37.120122+02:00", "EventTime": "2023-10-30T14:08:37.120147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.248.248 ", "ContentType": "text/plain"}], "uids": ["C1jemp2KwMUec0NTYc"]} -{"Format": "IDEA0", "ID": "c62f3f60-1a64-4629-a196-b511f41bb563", "DetectTime": "2023-10-30T14:08:37.140622+02:00", "EventTime": "2023-10-30T14:08:37.140643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.193.148.144"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 98.193.148.144 ", "ContentType": "text/plain"}], "uids": ["CcbCu44I077Zl8PqN2"]} -{"Format": "IDEA0", "ID": "740a562a-0342-4953-85db-c0bd2a4a01c7", "DetectTime": "2023-10-30T14:08:37.166773+02:00", "EventTime": "2023-10-30T14:08:37.166816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.53.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.129.53.83 ", "ContentType": "text/plain"}], "uids": ["CUdZ6q2dPTpDsN8ndd"]} -{"Format": "IDEA0", "ID": "45dc6648-b16b-4c50-b27f-d0318d4e9505", "DetectTime": "2023-10-30T14:08:37.193611+02:00", "EventTime": "2023-10-30T14:08:37.193627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["220.245.237.118"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 220.245.237.118 ", "ContentType": "text/plain"}], "uids": ["CoGt6a0HX68cHTtJ8"]} -{"Format": "IDEA0", "ID": "ae5f5fa4-690d-4ab0-9f7d-b3de68fdae1f", "DetectTime": "2023-10-30T14:08:37.220123+02:00", "EventTime": "2023-10-30T14:08:37.220138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["C7yR4HKaUEATyj1jb"]} -{"Format": "IDEA0", "ID": "1d839194-dacf-4a45-89ac-dfb216569474", "DetectTime": "2023-10-30T14:08:37.245611+02:00", "EventTime": "2023-10-30T14:08:37.245637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.45.221.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.45.221.63 ", "ContentType": "text/plain"}], "uids": ["CnHKjZSdgBtrZcxuc"]} -{"Format": "IDEA0", "ID": "e1d42cc6-0139-4354-80db-82c5a707a6d3", "DetectTime": "2023-10-30T14:08:37.272605+02:00", "EventTime": "2023-10-30T14:08:37.272617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.145.249.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.145.249.220 ", "ContentType": "text/plain"}], "uids": ["CRUEIq1UTlfyJrAxYi"]} -{"Format": "IDEA0", "ID": "5cd3e943-8fb3-43ee-9b80-33195daa2942", "DetectTime": "2023-10-30T14:08:37.289938+02:00", "EventTime": "2023-10-30T14:08:37.289959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.131.58.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.131.58.186 ", "ContentType": "text/plain"}], "uids": ["CbhOWFUrDTvGA8lHl"]} -{"Format": "IDEA0", "ID": "61960b98-ce85-4dd4-9666-b54e60a7ebe0", "DetectTime": "2023-10-30T14:08:37.308888+02:00", "EventTime": "2023-10-30T14:08:37.308904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.238.172.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.238.172.134 ", "ContentType": "text/plain"}], "uids": ["CpRn6r1iCvKkLU5ru5"]} -{"Format": "IDEA0", "ID": "0645d641-bb37-413f-b0c4-353074d98a48", "DetectTime": "2023-10-30T14:08:37.329739+02:00", "EventTime": "2023-10-30T14:08:37.329760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.97.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.97.132 ", "ContentType": "text/plain"}], "uids": ["CLWEnY3MLnSVxW4N9"]} -{"Format": "IDEA0", "ID": "8d1dd651-bf61-4309-ad69-af3bf907619a", "DetectTime": "2023-10-30T14:08:37.349167+02:00", "EventTime": "2023-10-30T14:08:37.349184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CxaJ842u4pYaFsGlEb"]} -{"Format": "IDEA0", "ID": "1f87034a-834e-4acd-b0da-5a753aa44c07", "DetectTime": "2023-10-30T14:08:37.374644+02:00", "EventTime": "2023-10-30T14:08:37.374660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.203.192.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.203.192.142 ", "ContentType": "text/plain"}], "uids": ["C9OOm639IM8ztfcvSl"]} -{"Format": "IDEA0", "ID": "05bcd15f-becc-4d6d-ac37-08610213e138", "DetectTime": "2023-10-30T14:08:37.399891+02:00", "EventTime": "2023-10-30T14:08:37.399906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.92.77.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.92.77.113 ", "ContentType": "text/plain"}], "uids": ["CmH6Cy10zzYMeY5Y7f"]} -{"Format": "IDEA0", "ID": "0c021842-4496-4c8a-9b7b-ce6db5b1e3c9", "DetectTime": "2023-10-30T14:08:37.419934+02:00", "EventTime": "2023-10-30T14:08:37.419951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.178.166"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.71.178.166 ", "ContentType": "text/plain"}], "uids": ["CvPh3s2DPCWif1YNza"]} -{"Format": "IDEA0", "ID": "646be750-3857-4ca8-9a97-f745c0d9523e", "DetectTime": "2023-10-30T14:08:37.438321+02:00", "EventTime": "2023-10-30T14:08:37.438335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.122.80.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.122.80.132 ", "ContentType": "text/plain"}], "uids": ["CStirf40sOH4VCK652"]} -{"Format": "IDEA0", "ID": "ea23a569-2ccd-4150-a303-153778dce3fa", "DetectTime": "2023-10-30T14:08:37.457288+02:00", "EventTime": "2023-10-30T14:08:37.457305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cz4uje3Lh2Iv4VlYVd"]} -{"Format": "IDEA0", "ID": "c3167ff1-3717-41fb-a367-205bcfdd699c", "DetectTime": "2023-10-30T14:08:37.477800+02:00", "EventTime": "2023-10-30T14:08:37.477823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.97.28.139"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.97.28.139 ", "ContentType": "text/plain"}], "uids": ["CAIBjR11CYZbrBfLm7"]} -{"Format": "IDEA0", "ID": "f16609c7-78b1-423d-9ae6-b95075d34911", "DetectTime": "2023-10-30T14:08:37.505029+02:00", "EventTime": "2023-10-30T14:08:37.505046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.146.14.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.146.14.21 ", "ContentType": "text/plain"}], "uids": ["CNTlDC1J5t9eMNK0Ah"]} -{"Format": "IDEA0", "ID": "9d96b20c-18cb-4108-b521-c73b83c4f742", "DetectTime": "2023-10-30T14:08:37.532023+02:00", "EventTime": "2023-10-30T14:08:37.532043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CsPImt3VmPit7ljvjb"]} -{"Format": "IDEA0", "ID": "f10513c8-7b6e-452c-a859-c019a62cc34b", "DetectTime": "2023-10-30T14:08:37.557714+02:00", "EventTime": "2023-10-30T14:08:37.557725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["207.170.238.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 207.170.238.204 ", "ContentType": "text/plain"}], "uids": ["COCgEA2MZ4ixQneUWa"]} -{"Format": "IDEA0", "ID": "45df7a95-a2f3-454d-ace9-469ef7d38c45", "DetectTime": "2023-10-30T14:08:37.584438+02:00", "EventTime": "2023-10-30T14:08:37.584456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.50.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.50.155 ", "ContentType": "text/plain"}], "uids": ["CfvLu331ODFeXV1Fd1"]} -{"Format": "IDEA0", "ID": "1bac9c2b-5fce-4d8f-bbc8-1077daf9d0bc", "DetectTime": "2023-10-30T14:08:37.611010+02:00", "EventTime": "2023-10-30T14:08:37.611025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.34.76.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.34.76.162 ", "ContentType": "text/plain"}], "uids": ["CtuWeh4EGHGPWQLL06"]} -{"Format": "IDEA0", "ID": "5f083a4c-d4e3-49bc-976d-7b71f9ebb5fa", "DetectTime": "2023-10-30T14:08:37.633487+02:00", "EventTime": "2023-10-30T14:08:37.633501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.235.22.116 ", "ContentType": "text/plain"}], "uids": ["Cl1TeL2rbMHMsA3KY8"]} -{"Format": "IDEA0", "ID": "69c4dcd1-b9cc-48d8-9618-972609f7fc49", "DetectTime": "2023-10-30T14:08:37.658578+02:00", "EventTime": "2023-10-30T14:08:37.658595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.103.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.103.145 ", "ContentType": "text/plain"}], "uids": ["C0y7NL1OrNUY9iOhn3"]} -{"Format": "IDEA0", "ID": "4bcead7e-83e7-4579-933d-d7e5a6d3d267", "DetectTime": "2023-10-30T14:08:37.687079+02:00", "EventTime": "2023-10-30T14:08:37.687090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.51.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.51.31 ", "ContentType": "text/plain"}], "uids": ["CvVwWg3WQEPXi7K8A2"]} -{"Format": "IDEA0", "ID": "173f8bc4-ac25-40e3-b387-2c67870e40e9", "DetectTime": "2023-10-30T14:08:37.713554+02:00", "EventTime": "2023-10-30T14:08:37.713575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["Czfp4t4HGCytUqDRFb"]} -{"Format": "IDEA0", "ID": "8924db62-0f87-4895-9abb-adbc0fcb3d47", "DetectTime": "2023-10-30T14:08:37.731882+02:00", "EventTime": "2023-10-30T14:08:37.731898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.45.14.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.45.14.10 ", "ContentType": "text/plain"}], "uids": ["CYeOxv4gZ8BOHw10nb"]} -{"Format": "IDEA0", "ID": "521eb8eb-89f9-4d11-be68-4197d436f276", "DetectTime": "2023-10-30T14:08:37.750309+02:00", "EventTime": "2023-10-30T14:08:37.750324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.199.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.148.199.6 ", "ContentType": "text/plain"}], "uids": ["C2AVkP1ZnnXfyOvgi5"]} -{"Format": "IDEA0", "ID": "ab19a1d4-0499-4903-9406-13453a008616", "DetectTime": "2023-10-30T14:08:37.768456+02:00", "EventTime": "2023-10-30T14:08:37.768478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.29.147.203"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.29.147.203 ", "ContentType": "text/plain"}], "uids": ["CTqKRm1HEVEjrLV71c"]} -{"Format": "IDEA0", "ID": "fed9528b-3319-4d71-ac08-2ef6cc7eb4d9", "DetectTime": "2023-10-30T14:08:37.794223+02:00", "EventTime": "2023-10-30T14:08:37.794243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["CZSTMt3MYqpHx8T46i"]} -{"Format": "IDEA0", "ID": "de58588d-a7ec-4036-bf96-d8fb370e05ef", "DetectTime": "2023-10-30T14:08:37.812344+02:00", "EventTime": "2023-10-30T14:08:37.812355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CRt8uL17Ey7A7CBQJ6"]} -{"Format": "IDEA0", "ID": "12723998-c37a-4d29-ad2d-f09f2545d234", "DetectTime": "2023-10-30T14:08:37.837020+02:00", "EventTime": "2023-10-30T14:08:37.837033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.80.99.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.80.99.25 ", "ContentType": "text/plain"}], "uids": ["CLAjkPfPU3rZR3UEd"]} -{"Format": "IDEA0", "ID": "ef213d3c-c7c9-49da-90b2-ea38e9d30544", "DetectTime": "2023-10-30T14:08:37.862057+02:00", "EventTime": "2023-10-30T14:08:37.862068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.7.100.23"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.7.100.23 ", "ContentType": "text/plain"}], "uids": ["CkRekf1YBs0Z06oO5b"]} -{"Format": "IDEA0", "ID": "bb7d4547-61d6-4572-8595-d5ff58a60f10", "DetectTime": "2023-10-30T14:08:37.878376+02:00", "EventTime": "2023-10-30T14:08:37.878392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.132.10.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.132.10.168 ", "ContentType": "text/plain"}], "uids": ["C4aCdu2wMbYejQ86ej"]} -{"Format": "IDEA0", "ID": "f1778c16-a5c8-4caf-91ef-32866b66dc6c", "DetectTime": "2023-10-30T14:08:37.895770+02:00", "EventTime": "2023-10-30T14:08:37.895781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.91.81.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.91.81.212 ", "ContentType": "text/plain"}], "uids": ["Clkump2qaJZIiWIsae"]} -{"Format": "IDEA0", "ID": "f2d970ca-9ff0-4eb2-a568-51c981d73530", "DetectTime": "2023-10-30T14:08:37.909722+02:00", "EventTime": "2023-10-30T14:08:37.909734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.5.179.11"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.5.179.11 ", "ContentType": "text/plain"}], "uids": ["CpmZy5dDk4DhSEJVa"]} -{"Format": "IDEA0", "ID": "db242410-24a5-460c-80d7-47debb29cb71", "DetectTime": "2023-10-30T14:08:37.926730+02:00", "EventTime": "2023-10-30T14:08:37.926746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.166.170.48"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.166.170.48 ", "ContentType": "text/plain"}], "uids": ["Ck3o1Z2v3ceihRNEJ8"]} -{"Format": "IDEA0", "ID": "6cfb28d0-8cad-4071-bd0f-c13b0b1944e0", "DetectTime": "2023-10-30T14:08:37.946275+02:00", "EventTime": "2023-10-30T14:08:37.946292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CYO95X3DUck15algCj"]} -{"Format": "IDEA0", "ID": "e08f07c6-4d2c-4d35-bc23-8a46cad669fa", "DetectTime": "2023-10-30T14:08:37.966875+02:00", "EventTime": "2023-10-30T14:08:37.966896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.43.242.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.43.242.41 ", "ContentType": "text/plain"}], "uids": ["CZPanvjpqDl1sQlff"]} -{"Format": "IDEA0", "ID": "351622f4-740d-401c-b2fe-9a78f0669273", "DetectTime": "2023-10-30T14:08:37.993470+02:00", "EventTime": "2023-10-30T14:08:37.993491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.62.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.212.62.135 ", "ContentType": "text/plain"}], "uids": ["C33kiF3mbt84ltj35l"]} -{"Format": "IDEA0", "ID": "a0ac49a7-5a57-45e8-b964-23c899cd475b", "DetectTime": "2023-10-30T14:08:38.012914+02:00", "EventTime": "2023-10-30T14:08:38.012936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.66.184.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.66.184.240 ", "ContentType": "text/plain"}], "uids": ["CbALqF4WltEU5y1Mxc"]} -{"Format": "IDEA0", "ID": "1090fc68-95dd-4be5-8ec0-0a833dfda155", "DetectTime": "2023-10-30T14:08:38.039052+02:00", "EventTime": "2023-10-30T14:08:38.039073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C01SOy3FA749myEiJ8"]} -{"Format": "IDEA0", "ID": "e7de9557-4b06-4d5e-89cb-1409a5c46455", "DetectTime": "2023-10-30T14:08:38.058534+02:00", "EventTime": "2023-10-30T14:08:38.058550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Con2dX37BNnAMMQzzb"]} -{"Format": "IDEA0", "ID": "fb8c726f-e222-42e2-bf82-9a57e16b91f7", "DetectTime": "2023-10-30T14:08:38.076715+02:00", "EventTime": "2023-10-30T14:08:38.076728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.64.9.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.64.9.66 ", "ContentType": "text/plain"}], "uids": ["CrCaIi1XwGjdv11RQc"]} -{"Format": "IDEA0", "ID": "2bdc8433-17cf-4bbb-8076-b53e93cb37fb", "DetectTime": "2023-10-30T14:08:38.100748+02:00", "EventTime": "2023-10-30T14:08:38.100764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.76.242.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.76.242.49 ", "ContentType": "text/plain"}], "uids": ["CqeNUD1GhB0A8N7nr"]} -{"Format": "IDEA0", "ID": "ac3e7277-af75-453d-8ea4-6f36c8542d2c", "DetectTime": "2023-10-30T14:08:38.116588+02:00", "EventTime": "2023-10-30T14:08:38.116601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.95.62.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.95.62.18 ", "ContentType": "text/plain"}], "uids": ["CJHXX81m948rzn700e"]} -{"Format": "IDEA0", "ID": "c55ad0c3-c834-48ea-800f-d1efa903e036", "DetectTime": "2023-10-30T14:08:38.139112+02:00", "EventTime": "2023-10-30T14:08:38.139123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C1zKwZ3eMVOny5zOc4"]} -{"Format": "IDEA0", "ID": "36002d21-0f09-4b4f-848f-426b462aab8b", "DetectTime": "2023-10-30T14:08:38.156311+02:00", "EventTime": "2023-10-30T14:08:38.156327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CidhqH3v7r2N2V4Vuc"]} -{"Format": "IDEA0", "ID": "cdbbb90c-6f40-4b22-9576-1bd4c926ca55", "DetectTime": "2023-10-30T14:08:38.178861+02:00", "EventTime": "2023-10-30T14:08:38.178872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CJ5rgGFZBoCQsqoj5"]} -{"Format": "IDEA0", "ID": "a4d0e0f3-c67e-4bda-9f54-b729246d8e0e", "DetectTime": "2023-10-30T14:08:38.193483+02:00", "EventTime": "2023-10-30T14:08:38.193499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.153.227.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.153.227.64 ", "ContentType": "text/plain"}], "uids": ["C4A7XL1RfO2KA2OiD6"]} -{"Format": "IDEA0", "ID": "740ce7d9-6d35-4a15-83c1-637907f13d71", "DetectTime": "2023-10-30T14:08:38.211519+02:00", "EventTime": "2023-10-30T14:08:38.211536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.200.204.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.200.204.37 ", "ContentType": "text/plain"}], "uids": ["C0fQhU3ExrfbDIxWKl"]} -{"Format": "IDEA0", "ID": "0732847d-d299-456b-bd3c-9ee13ede1644", "DetectTime": "2023-10-30T14:08:38.234355+02:00", "EventTime": "2023-10-30T14:08:38.234376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXcre24qs91mA5o9Yl"]} -{"Format": "IDEA0", "ID": "0e3acd04-f39f-4c28-9f3a-26615926c6c7", "DetectTime": "2023-10-30T14:08:38.254047+02:00", "EventTime": "2023-10-30T14:08:38.254069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.208.48.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.208.48.140 ", "ContentType": "text/plain"}], "uids": ["CuZSAH31N4wj8aQ6W2"]} -{"Format": "IDEA0", "ID": "f609610c-1d15-4626-8a83-e40027341648", "DetectTime": "2023-10-30T14:08:38.281479+02:00", "EventTime": "2023-10-30T14:08:38.281495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.151.227.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.151.227.134 ", "ContentType": "text/plain"}], "uids": ["CVlWOr32yAY6AKX1dd"]} -{"Format": "IDEA0", "ID": "432ade58-27f4-4f2c-b2b0-9cfc74093eed", "DetectTime": "2023-10-30T14:08:38.305398+02:00", "EventTime": "2023-10-30T14:08:38.305414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.135.199.117 ", "ContentType": "text/plain"}], "uids": ["CpoaSx4RqR9qjANK28"]} -{"Format": "IDEA0", "ID": "ff383d28-f677-4e5c-8c6b-df97d3d1434d", "DetectTime": "2023-10-30T14:08:38.329217+02:00", "EventTime": "2023-10-30T14:08:38.329233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.136.130.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.136.130.125 ", "ContentType": "text/plain"}], "uids": ["C0lalu1PrDB5Mc3Mxd"]} -{"Format": "IDEA0", "ID": "44a390e5-3e22-4ce4-a77b-2297fade1928", "DetectTime": "2023-10-30T14:08:38.353835+02:00", "EventTime": "2023-10-30T14:08:38.353849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.168.172.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.168.172.46 ", "ContentType": "text/plain"}], "uids": ["CoIJsp3hYIfeV5Um5k"]} -{"Format": "IDEA0", "ID": "cdb7040a-52bf-4b8a-a793-9d622ea647d5", "DetectTime": "2023-10-30T14:08:38.378637+02:00", "EventTime": "2023-10-30T14:08:38.378658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CcTm5a3ztxPW2ge5L9"]} -{"Format": "IDEA0", "ID": "d0d94872-e0af-4fbe-932f-10edfc13ffe8", "DetectTime": "2023-10-30T14:08:38.398952+02:00", "EventTime": "2023-10-30T14:08:38.398974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.200.62.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.200.62.2 ", "ContentType": "text/plain"}], "uids": ["CXrigX3IwMzE9EUL46"]} -{"Format": "IDEA0", "ID": "c2a717eb-0477-4bcb-b415-3cca4f64e72d", "DetectTime": "2023-10-30T14:08:38.423625+02:00", "EventTime": "2023-10-30T14:08:38.423642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CaguVe1Lhle5Vf0az3"]} -{"Format": "IDEA0", "ID": "a2d62777-f91d-452c-bd25-35bf0325a119", "DetectTime": "2023-10-30T14:08:38.439974+02:00", "EventTime": "2023-10-30T14:08:38.439986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.41.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.68.41.115 ", "ContentType": "text/plain"}], "uids": ["CRHMDBACJR0fyWE8f"]} -{"Format": "IDEA0", "ID": "cce42355-ce27-45e7-b10d-62ea5461923d", "DetectTime": "2023-10-30T14:08:38.463495+02:00", "EventTime": "2023-10-30T14:08:38.463507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CwtEzQuI4Jfx49BI6"]} -{"Format": "IDEA0", "ID": "1833c20e-ece6-43bd-a05b-0b6fc58ad8b8", "DetectTime": "2023-10-30T14:08:38.479614+02:00", "EventTime": "2023-10-30T14:08:38.479632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Ca0bgv1KQ9SNiylz36"]} -{"Format": "IDEA0", "ID": "af8a0d18-f6c2-47e5-8a6d-e58552e74953", "DetectTime": "2023-10-30T14:08:38.494186+02:00", "EventTime": "2023-10-30T14:08:38.494199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CbTEEy1pXyQk6iv55j"]} -{"Format": "IDEA0", "ID": "2a945cca-0d9b-4f7a-b38b-24332132842b", "DetectTime": "2023-10-30T14:08:38.518800+02:00", "EventTime": "2023-10-30T14:08:38.518816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CgM5i64ts8BWqzxUG1"]} -{"Format": "IDEA0", "ID": "f06795c4-d398-4837-9db3-dab22b446ea1", "DetectTime": "2023-10-30T14:08:38.538099+02:00", "EventTime": "2023-10-30T14:08:38.538120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C8sY05KQ32iWShzMl"]} -{"Format": "IDEA0", "ID": "12fee4ee-1bce-4db2-a050-aba86c0eca55", "DetectTime": "2023-10-30T14:08:38.557204+02:00", "EventTime": "2023-10-30T14:08:38.557229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CUVt4E1iuftnWL4Mv4"]} -{"Format": "IDEA0", "ID": "92f0c518-d7ae-4e6f-8032-684095361295", "DetectTime": "2023-10-30T14:08:38.574627+02:00", "EventTime": "2023-10-30T14:08:38.574637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CzQqi9UDYKUDvnih8"]} -{"Format": "IDEA0", "ID": "a7c85a69-da5c-47f6-858a-4a80be3456d6", "DetectTime": "2023-10-30T14:08:38.591897+02:00", "EventTime": "2023-10-30T14:08:38.591912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CsViBT3wVkVbAMiwz4"]} -{"Format": "IDEA0", "ID": "06010916-9a43-470b-b7d5-c11b28bf5154", "DetectTime": "2023-10-30T14:08:38.610072+02:00", "EventTime": "2023-10-30T14:08:38.610088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.130.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.130.241 ", "ContentType": "text/plain"}], "uids": ["CZCb4y2heZesqQbf5a"]} -{"Format": "IDEA0", "ID": "e3914a36-51f9-43b2-9bfa-32dd435aad25", "DetectTime": "2023-10-30T14:08:38.629995+02:00", "EventTime": "2023-10-30T14:08:38.630007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.175.49 ", "ContentType": "text/plain"}], "uids": ["CRJBPt43zNYSTgWAbl"]} -{"Format": "IDEA0", "ID": "6e087f32-0c79-4374-91d7-aa604d11fc6d", "DetectTime": "2023-10-30T14:08:38.642025+02:00", "EventTime": "2023-10-30T14:08:38.642036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CqFn133Q65PjlDngte"]} -{"Format": "IDEA0", "ID": "84e5760b-da77-4a05-95f4-a5ed5d2dcf13", "DetectTime": "2023-10-30T14:08:38.656813+02:00", "EventTime": "2023-10-30T14:08:38.656830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.26.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.43.26.3 ", "ContentType": "text/plain"}], "uids": ["CRdUuoDx0MTx9aWbe"]} -{"Format": "IDEA0", "ID": "4deb23f2-e98d-4f37-9a6a-f1efd4b047d1", "DetectTime": "2023-10-30T14:08:38.679415+02:00", "EventTime": "2023-10-30T14:08:38.679431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.142.172.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.142.172.63 ", "ContentType": "text/plain"}], "uids": ["CuXqml2hYhqDn4E279"]} -{"Format": "IDEA0", "ID": "6a443819-7bdb-488f-90a6-00528a10a663", "DetectTime": "2023-10-30T14:08:38.707334+02:00", "EventTime": "2023-10-30T14:08:38.707354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CCQ0snXQPeyiB3171"]} -{"Format": "IDEA0", "ID": "e4f89300-5389-4390-bd22-5996bcfc78a3", "DetectTime": "2023-10-30T14:08:38.726377+02:00", "EventTime": "2023-10-30T14:08:38.726399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CBhCVM2xImlzMocF8"]} -{"Format": "IDEA0", "ID": "dcb1b160-9c4c-4d42-907b-0900a1c5a96d", "DetectTime": "2023-10-30T14:08:38.744653+02:00", "EventTime": "2023-10-30T14:08:38.744669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CF8yU14T02B5ketWb"]} -{"Format": "IDEA0", "ID": "57c72362-4989-4a49-8611-7928981aee7c", "DetectTime": "2023-10-30T14:08:38.760557+02:00", "EventTime": "2023-10-30T14:08:38.760577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.185.46.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.185.46.132 ", "ContentType": "text/plain"}], "uids": ["C9lyUD1Ydf5zJRPLG9"]} -{"Format": "IDEA0", "ID": "8284254a-5a16-4f06-a91a-345963de6a0f", "DetectTime": "2023-10-30T14:08:38.785262+02:00", "EventTime": "2023-10-30T14:08:38.785278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CF6ge63CjqSGOtokWh"]} -{"Format": "IDEA0", "ID": "496c27f2-de74-4e61-aefa-bdc159be70e1", "DetectTime": "2023-10-30T14:08:38.803842+02:00", "EventTime": "2023-10-30T14:08:38.803858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C6QTRE44RcktGvi5nd"]} -{"Format": "IDEA0", "ID": "1a5b2fd5-1987-4e4b-9e14-12809a104d1a", "DetectTime": "2023-10-30T14:08:38.819913+02:00", "EventTime": "2023-10-30T14:08:38.819924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CrVM1i1sf3IgNCUJqf"]} -{"Format": "IDEA0", "ID": "f4be69e9-492d-4177-b8da-a97d2fd554a5", "DetectTime": "2023-10-30T14:08:38.835056+02:00", "EventTime": "2023-10-30T14:08:38.835075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.50.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.50.155 ", "ContentType": "text/plain"}], "uids": ["CBTukFXcioNSeqREj"]} -{"Format": "IDEA0", "ID": "b420d3e9-d064-445a-a8fe-03bc491d72e8", "DetectTime": "2023-10-30T14:08:38.848004+02:00", "EventTime": "2023-10-30T14:08:38.848015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CTLuQD1rp8NRictHMj"]} -{"Format": "IDEA0", "ID": "bffa6bb3-1a53-4adc-98f8-eb5f0c80cf68", "DetectTime": "2023-10-30T14:08:38.863099+02:00", "EventTime": "2023-10-30T14:08:38.863121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.91.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.201.91.219 ", "ContentType": "text/plain"}], "uids": ["C6J8Q34O1agv4MOlU5"]} -{"Format": "IDEA0", "ID": "719db3b1-cea1-4c5e-bdc3-52d0cf94b4aa", "DetectTime": "2023-10-30T14:08:38.883086+02:00", "EventTime": "2023-10-30T14:08:38.883107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.3.80.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.3.80.98 ", "ContentType": "text/plain"}], "uids": ["CYpkYu13RmnkDiKTM8"]} -{"Format": "IDEA0", "ID": "76789b95-550a-445f-bf6a-cf1bafe001c0", "DetectTime": "2023-10-30T14:08:38.909171+02:00", "EventTime": "2023-10-30T14:08:38.909188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.150.59 ", "ContentType": "text/plain"}], "uids": ["CYm6q2c7lpYmJ5Zo4"]} -{"Format": "IDEA0", "ID": "c71e8290-73ae-4266-9b24-f0f38030291e", "DetectTime": "2023-10-30T14:08:38.933962+02:00", "EventTime": "2023-10-30T14:08:38.933981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CIQdQi4jbOiewUiKX8"]} -{"Format": "IDEA0", "ID": "07e3d60d-1342-42c2-91b3-44061ee464b0", "DetectTime": "2023-10-30T14:08:38.956496+02:00", "EventTime": "2023-10-30T14:08:38.956507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.135.199.117 ", "ContentType": "text/plain"}], "uids": ["CQG5GE3PKERIk5CxYf"]} -{"Format": "IDEA0", "ID": "ebd4b166-66ed-4d75-b749-191353b27c09", "DetectTime": "2023-10-30T14:08:38.973582+02:00", "EventTime": "2023-10-30T14:08:38.973598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.166.22 ", "ContentType": "text/plain"}], "uids": ["Cz5RlU2mLxmXM3Cfke"]} -{"Format": "IDEA0", "ID": "5547ad7c-b99b-4506-a58b-5caa591cc675", "DetectTime": "2023-10-30T14:08:38.991570+02:00", "EventTime": "2023-10-30T14:08:38.991582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C2FzVV33EVjZ0gMe5i"]} -{"Format": "IDEA0", "ID": "1e20aeb5-9d52-48ca-b68f-bf6c86f41854", "DetectTime": "2023-10-30T14:08:39.009571+02:00", "EventTime": "2023-10-30T14:08:39.009591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CP2s4COq7qjSN3u35"]} -{"Format": "IDEA0", "ID": "a4b33c86-aa14-4280-a8db-62f6069149b3", "DetectTime": "2023-10-30T14:08:39.026212+02:00", "EventTime": "2023-10-30T14:08:39.026223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.5.194.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.5.194.234 ", "ContentType": "text/plain"}], "uids": ["COmzJktF2RoKvPT0l"]} -{"Format": "IDEA0", "ID": "b21bd619-432b-4981-91a1-c619f7beceaa", "DetectTime": "2023-10-30T14:08:39.046616+02:00", "EventTime": "2023-10-30T14:08:39.046644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CjKqFE4TSHwJPSZdD3"]} -{"Format": "IDEA0", "ID": "d9fe330e-5135-46a3-a4c9-7b8aba7885f5", "DetectTime": "2023-10-30T14:08:39.074625+02:00", "EventTime": "2023-10-30T14:08:39.074640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CiQmqS11ASi1FtEzLk"]} -{"Format": "IDEA0", "ID": "63354cff-1077-4f6b-a5b7-ceae729429f8", "DetectTime": "2023-10-30T14:08:39.095084+02:00", "EventTime": "2023-10-30T14:08:39.095106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.7.114.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.7.114.218 ", "ContentType": "text/plain"}], "uids": ["Cw08nY0rlYsQS2rOk"]} -{"Format": "IDEA0", "ID": "b9a71cff-8be4-410d-8903-891728654ac3", "DetectTime": "2023-10-30T14:08:39.114737+02:00", "EventTime": "2023-10-30T14:08:39.114757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["C28i1q2pDxcgbtPiSl"]} -{"Format": "IDEA0", "ID": "8092c93c-2b96-46da-8ed4-85280f9a5184", "DetectTime": "2023-10-30T14:08:39.134839+02:00", "EventTime": "2023-10-30T14:08:39.134856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.150.59 ", "ContentType": "text/plain"}], "uids": ["C9W9mcNRX3h94fFNh"]} -{"Format": "IDEA0", "ID": "0bb05933-ee2e-496b-912d-749355892ddf", "DetectTime": "2023-10-30T14:08:39.153748+02:00", "EventTime": "2023-10-30T14:08:39.153766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CvRHV23ueAxovShSJi"]} -{"Format": "IDEA0", "ID": "49241411-b57f-4eb9-ad09-9b07300e4070", "DetectTime": "2023-10-30T14:08:39.173381+02:00", "EventTime": "2023-10-30T14:08:39.173396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6713], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. ", "ContentType": "text/plain"}], "uids": ["C4C3p12ppyPBu3X5ab"]} -{"Format": "IDEA0", "ID": "6b3c1075-ab8e-4440-bcc0-294043aa285c", "DetectTime": "2023-10-30T14:08:39.207507+02:00", "EventTime": "2023-10-30T14:08:39.207523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["CrK9a9phqLJTh1Srl"]} -{"Format": "IDEA0", "ID": "c4245b8d-5d02-44a4-9328-889c15e3b7c5", "DetectTime": "2023-10-30T14:08:39.227787+02:00", "EventTime": "2023-10-30T14:08:39.227802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CKZUuA2EfIz4cEUEV8"]} -{"Format": "IDEA0", "ID": "a5714c53-df3d-4f7f-8c69-2ee8231469dc", "DetectTime": "2023-10-30T14:08:39.242044+02:00", "EventTime": "2023-10-30T14:08:39.242060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CFnWtK3hGkBAnawmRk"]} -{"Format": "IDEA0", "ID": "35d6afcb-1478-4c8e-afc7-ba4ead4f791d", "DetectTime": "2023-10-30T14:08:39.261362+02:00", "EventTime": "2023-10-30T14:08:39.261378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["C19Vc3194EwQkHhHhl"]} -{"Format": "IDEA0", "ID": "d07c5b5a-e1e4-4aa6-a8c8-4b436fc58e10", "DetectTime": "2023-10-30T14:08:39.279263+02:00", "EventTime": "2023-10-30T14:08:39.279284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["ChM2r03MbTc9XbxiWl"]} -{"Format": "IDEA0", "ID": "7b8a74d1-6786-4e2f-922f-577f894f1f3a", "DetectTime": "2023-10-30T14:08:39.294703+02:00", "EventTime": "2023-10-30T14:08:39.294719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CxOeHmhK93fqcBOac"]} -{"Format": "IDEA0", "ID": "26f428a5-2298-43cf-89fd-5350be323540", "DetectTime": "2023-10-30T14:08:39.310419+02:00", "EventTime": "2023-10-30T14:08:39.310438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.196.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.196.83 ", "ContentType": "text/plain"}], "uids": ["C5v5IC4PULX69Inidh"]} -{"Format": "IDEA0", "ID": "a08271fb-d654-4e9c-820d-b6b622888730", "DetectTime": "2023-10-30T14:08:39.326341+02:00", "EventTime": "2023-10-30T14:08:39.326357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CQTFVG2jqGnSpSn8Ra"]} -{"Format": "IDEA0", "ID": "07493d0e-4ae8-4f2a-b5bb-ffc3c9d36a69", "DetectTime": "2023-10-30T14:08:39.347080+02:00", "EventTime": "2023-10-30T14:08:39.347098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.248.248 ", "ContentType": "text/plain"}], "uids": ["CGVL3ejZ8r5DVUmcc"]} -{"Format": "IDEA0", "ID": "f06159dd-cb3f-4859-9ad7-d34c61c88075", "DetectTime": "2023-10-30T14:08:39.362474+02:00", "EventTime": "2023-10-30T14:08:39.362495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["CYRbWy4OLw68iv24El"]} -{"Format": "IDEA0", "ID": "169017a7-064f-4eaf-979f-11c4d7c6b436", "DetectTime": "2023-10-30T14:08:39.375092+02:00", "EventTime": "2023-10-30T14:08:39.375103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["COwftW24FLG8UQfMwk"]} -{"Format": "IDEA0", "ID": "b10b4829-7c4e-42c5-828e-10486cef9e47", "DetectTime": "2023-10-30T14:08:39.391940+02:00", "EventTime": "2023-10-30T14:08:39.391956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CR22Yv3vMGA18dV0q2"]} -{"Format": "IDEA0", "ID": "792b83ad-87a2-4df2-bb2e-ceb8a8e250a1", "DetectTime": "2023-10-30T14:08:39.413733+02:00", "EventTime": "2023-10-30T14:08:39.413755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.97.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.97.132 ", "ContentType": "text/plain"}], "uids": ["ClvJvj3WtQF8UhleDk"]} -{"Format": "IDEA0", "ID": "20bff987-fb7c-4c43-9e20-bcf0f664a7fb", "DetectTime": "2023-10-30T14:08:39.433002+02:00", "EventTime": "2023-10-30T14:08:39.433023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CpYTAi1MmPo7oQkeP6"]} -{"Format": "IDEA0", "ID": "dd60dfff-a321-4dd1-aeb4-5cda9a0b3be3", "DetectTime": "2023-10-30T14:08:39.452667+02:00", "EventTime": "2023-10-30T14:08:39.452683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["CXA3Jfy3cmH0TneN"]} -{"Format": "IDEA0", "ID": "d3834b9a-42e8-4b9a-8220-c9debcbe1892", "DetectTime": "2023-10-30T14:08:39.470886+02:00", "EventTime": "2023-10-30T14:08:39.470903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cjn0GB40jb4cadI5I3"]} -{"Format": "Json", "ID": "d3834b9a-42e8-4b9a-8220-c9debcbe1892", "DetectTime": "2023-10-30T14:08:39.470886+02:00", "EventTime": "2023-10-30T14:08:39.470903+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-06T01:21:49.556282+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:39.532959)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8fbcfd97-c7a2-40a0-a827-4d900755a8e5", "DetectTime": "2023-10-30T14:08:39.539154+02:00", "EventTime": "2023-10-30T14:08:39.539170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.91.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.201.91.219 ", "ContentType": "text/plain"}], "uids": ["C8u2VIeDMj5FVgrt9"]} -{"Format": "IDEA0", "ID": "4125bec7-6ea3-458e-aa30-51489c27476e", "DetectTime": "2023-10-30T14:08:39.569294+02:00", "EventTime": "2023-10-30T14:08:39.569314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.7.114.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.7.114.218 ", "ContentType": "text/plain"}], "uids": ["CNHM5H2lMnns6FRG0g"]} -{"Format": "IDEA0", "ID": "7f7fc12a-07f3-43b0-9017-ceb6742ab55c", "DetectTime": "2023-10-30T14:08:39.592178+02:00", "EventTime": "2023-10-30T14:08:39.592195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CI0Y0g13mYKIcqj4Dc"]} -{"Format": "IDEA0", "ID": "368d021b-f531-4b09-8bcd-d17ee64ef6ef", "DetectTime": "2023-10-30T14:08:39.618543+02:00", "EventTime": "2023-10-30T14:08:39.618557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.196.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.178.196.83 ", "ContentType": "text/plain"}], "uids": ["C0aeqI28wlf1QlkyI4"]} -{"Format": "IDEA0", "ID": "161187fa-ea01-4b54-bf98-c900f808bc5a", "DetectTime": "2023-10-30T14:08:39.647504+02:00", "EventTime": "2023-10-30T14:08:39.647515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.5.194.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.5.194.234 ", "ContentType": "text/plain"}], "uids": ["CxGCzT381OEU5gyvv8"]} -{"Format": "IDEA0", "ID": "89f3d3e5-36ca-4056-b538-e229aecd22f9", "DetectTime": "2023-10-30T14:08:39.668567+02:00", "EventTime": "2023-10-30T14:08:39.668579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CKiXS33ac5US3yHTda"]} -{"Format": "IDEA0", "ID": "44135ae5-45ee-4c92-826c-799842747b59", "DetectTime": "2023-10-30T14:08:39.690211+02:00", "EventTime": "2023-10-30T14:08:39.690223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CDS38p4VJjbiFpGrH9"]} -{"Format": "IDEA0", "ID": "1f2d745b-2921-4b11-8ddd-15a619ad85ee", "DetectTime": "2023-10-30T14:08:39.716915+02:00", "EventTime": "2023-10-30T14:08:39.716931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CRGb63CA7QmDGW5Ii"]} -{"Format": "IDEA0", "ID": "15649481-913b-43bd-917f-b05c5d3624e3", "DetectTime": "2023-10-30T14:08:39.740945+02:00", "EventTime": "2023-10-30T14:08:39.740957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CoHGwiKIgdYtsTtxg"]} -{"Format": "IDEA0", "ID": "5d957c05-3e09-4d38-b092-748862eab993", "DetectTime": "2023-10-30T14:08:39.767181+02:00", "EventTime": "2023-10-30T14:08:39.767196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CUMu1T26UsSN4WLcmk"]} -{"Format": "IDEA0", "ID": "1de38885-df19-4a42-bb53-cc91986e02fd", "DetectTime": "2023-10-30T14:08:39.795433+02:00", "EventTime": "2023-10-30T14:08:39.795450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CK3IA01Oc3ymlzTpck"]} -{"Format": "IDEA0", "ID": "92b013d2-b33e-4c3c-a175-31a9dc549366", "DetectTime": "2023-10-30T14:08:39.821063+02:00", "EventTime": "2023-10-30T14:08:39.821073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CFF3bC2tVHBXWcDN5h"]} -{"Format": "IDEA0", "ID": "cca19ccf-b346-45d4-aabf-a5e794d5e9a7", "DetectTime": "2023-10-30T14:08:39.841874+02:00", "EventTime": "2023-10-30T14:08:39.841892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.166.22 ", "ContentType": "text/plain"}], "uids": ["CwkbM43OuVPCeVBjL9"]} -{"Format": "IDEA0", "ID": "7d916b15-3fc2-4ccb-b841-346f986f3029", "DetectTime": "2023-10-30T14:08:39.868466+02:00", "EventTime": "2023-10-30T14:08:39.868484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CmcQjrGJr7eeC6Byk"]} -{"Format": "IDEA0", "ID": "478ce855-f319-4720-8a85-c29ebee7b14c", "DetectTime": "2023-10-30T14:08:39.896816+02:00", "EventTime": "2023-10-30T14:08:39.896827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.175.49 ", "ContentType": "text/plain"}], "uids": ["CqB9ci1zdkaXFNoKOc"]} -{"Format": "IDEA0", "ID": "8de63259-3487-45b7-8fb0-22a2ea48a8bf", "DetectTime": "2023-10-30T14:08:39.923328+02:00", "EventTime": "2023-10-30T14:08:39.923344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CaiKKt2W5ffmDSwOTc"]} -{"Format": "IDEA0", "ID": "1b26a7f6-cbe4-43c5-919f-282461764872", "DetectTime": "2023-10-30T14:08:39.952320+02:00", "EventTime": "2023-10-30T14:08:39.952336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3pPGZYB2H25a5lN3"]} -{"Format": "IDEA0", "ID": "6f6b5f79-062b-4439-8b83-579ff10c9053", "DetectTime": "2023-10-30T14:08:39.984456+02:00", "EventTime": "2023-10-30T14:08:39.984476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ConqeFzi2tq4DP7Va"]} -{"Format": "IDEA0", "ID": "d106d988-0025-42a3-93c6-e7cca9e93d5a", "DetectTime": "2023-10-30T14:08:40.016579+02:00", "EventTime": "2023-10-30T14:08:40.016597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CrLrvQ1GORBBGRVccj"]} -{"Format": "IDEA0", "ID": "9128271c-fd5d-4cd6-ac0f-23d45b8301e6", "DetectTime": "2023-10-30T14:08:40.048520+02:00", "EventTime": "2023-10-30T14:08:40.048537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CAHZHT2oP2hrFXPfW8"]} -{"Format": "IDEA0", "ID": "9c5175bf-23fe-4e49-b303-94be57399473", "DetectTime": "2023-10-30T14:08:40.070720+02:00", "EventTime": "2023-10-30T14:08:40.070731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cw04Vt2ChJ7lPqdmOa"]} -{"Format": "IDEA0", "ID": "041405cd-c1f1-423f-a9e2-0b34a1523873", "DetectTime": "2023-10-30T14:08:40.092863+02:00", "EventTime": "2023-10-30T14:08:40.092883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["Ca7Grr1FswEtENqjbe"]} -{"Format": "IDEA0", "ID": "e23399ef-5fe5-41bb-870d-6b4ecaa8f8d6", "DetectTime": "2023-10-30T14:08:40.126824+02:00", "EventTime": "2023-10-30T14:08:40.126841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CVJjdISF4v8HrIHLg"]} -{"Format": "IDEA0", "ID": "9d6f7a63-0d8c-4515-a715-a118369bd227", "DetectTime": "2023-10-30T14:08:40.155918+02:00", "EventTime": "2023-10-30T14:08:40.155933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CU54dF1YS3PHwzHE31"]} -{"Format": "IDEA0", "ID": "92ca11ce-dac1-46e0-9110-5a84b7931154", "DetectTime": "2023-10-30T14:08:40.184561+02:00", "EventTime": "2023-10-30T14:08:40.184577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C9JSqX1tSYw2zrNNg3"]} -{"Format": "IDEA0", "ID": "3ca596e7-1987-44a3-89c4-44723f3ce2f4", "DetectTime": "2023-10-30T14:08:40.214193+02:00", "EventTime": "2023-10-30T14:08:40.214209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CClzKW2rxrrPY21oi9"]} -{"Format": "IDEA0", "ID": "a944f679-7fa5-421f-9916-b43801bffadd", "DetectTime": "2023-10-30T14:08:40.238718+02:00", "EventTime": "2023-10-30T14:08:40.238729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CueHBS2uJIvRtfIkBd"]} -{"Format": "IDEA0", "ID": "a5bdc5a9-17d9-4aa0-a041-966559edb881", "DetectTime": "2023-10-30T14:08:40.269979+02:00", "EventTime": "2023-10-30T14:08:40.270007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CH6sCU1kxKbZ00SEe4"]} -{"Format": "IDEA0", "ID": "136afdac-801f-4e4e-9b0b-e4b1b3cb2cc2", "DetectTime": "2023-10-30T14:08:40.300344+02:00", "EventTime": "2023-10-30T14:08:40.300358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CAVkY235U77XE7VDu4"]} -{"Format": "IDEA0", "ID": "18541ce0-882a-4a02-86ff-d92ce3d1f0c1", "DetectTime": "2023-10-30T14:08:40.327738+02:00", "EventTime": "2023-10-30T14:08:40.327752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["CqUkjn3XNYDliOvFxl"]} -{"Format": "IDEA0", "ID": "a3351c74-3a03-4e4d-b23a-1df30959a90f", "DetectTime": "2023-10-30T14:08:40.359041+02:00", "EventTime": "2023-10-30T14:08:40.359057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.150.59 ", "ContentType": "text/plain"}], "uids": ["Cu5LZO3Fug3yHPXw5d"]} -{"Format": "IDEA0", "ID": "9996f16a-e939-4fb8-bf3f-a130d22da776", "DetectTime": "2023-10-30T14:08:40.387909+02:00", "EventTime": "2023-10-30T14:08:40.387926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CGL93qFCRVTh9R7Tc"]} -{"Format": "IDEA0", "ID": "45a4ce5d-e55d-46db-89ea-bd463e587144", "DetectTime": "2023-10-30T14:08:40.417857+02:00", "EventTime": "2023-10-30T14:08:40.417874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CSMdON39Oehh8VimA1"]} -{"Format": "IDEA0", "ID": "83d97643-9566-4a3d-9aaf-a3f0a5ece303", "DetectTime": "2023-10-30T14:08:40.439408+02:00", "EventTime": "2023-10-30T14:08:40.439419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Crls7p2mFVlwkY4m83"]} -{"Format": "IDEA0", "ID": "a300029c-9f5a-46cd-b16e-0e95e0e148ee", "DetectTime": "2023-10-30T14:08:40.462327+02:00", "EventTime": "2023-10-30T14:08:40.462343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["CZD1qLfjKREeMqvG"]} -{"Format": "IDEA0", "ID": "832ed395-ab9b-4a4d-aea7-2c5f190d79ae", "DetectTime": "2023-10-30T14:08:40.485983+02:00", "EventTime": "2023-10-30T14:08:40.485999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CjyJnTXvRs2o3iyCj"]} -{"Format": "IDEA0", "ID": "b1120dd3-66a2-45d0-90e8-3bb7106687df", "DetectTime": "2023-10-30T14:08:40.511691+02:00", "EventTime": "2023-10-30T14:08:40.511702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C6zOjl1CBsq4LsgPh7"]} -{"Format": "IDEA0", "ID": "c4117001-0261-4128-9a4c-63aa8866a5e9", "DetectTime": "2023-10-30T14:08:40.538576+02:00", "EventTime": "2023-10-30T14:08:40.538592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["Cnewaj35eqCV3rOhl8"]} -{"Format": "IDEA0", "ID": "70b09f8b-a649-4ba1-a412-65cbcaee9817", "DetectTime": "2023-10-30T14:08:40.563699+02:00", "EventTime": "2023-10-30T14:08:40.563719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["Cghqsd1UKCQV2nltgc"]} -{"Format": "IDEA0", "ID": "6b1fc6b3-46ba-451d-835f-6c5cb2e24235", "DetectTime": "2023-10-30T14:08:40.594832+02:00", "EventTime": "2023-10-30T14:08:40.594850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CdhV20141hcyfoe7jh"]} -{"Format": "IDEA0", "ID": "4973830e-f3cc-4da4-9a6f-b52909ec27c5", "DetectTime": "2023-10-30T14:08:40.619056+02:00", "EventTime": "2023-10-30T14:08:40.619068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.50.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.50.155 ", "ContentType": "text/plain"}], "uids": ["CRTOel13J3IhOtssZa"]} -{"Format": "IDEA0", "ID": "0fbb0a0f-36b2-49cb-818d-04a820d8c69c", "DetectTime": "2023-10-30T14:08:40.642307+02:00", "EventTime": "2023-10-30T14:08:40.642324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["C8dKn63kI8yw6wliXd"]} -{"Format": "IDEA0", "ID": "341878e4-d8c3-49c6-b3a0-4e3ec310929a", "DetectTime": "2023-10-30T14:08:40.666317+02:00", "EventTime": "2023-10-30T14:08:40.666337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.135.199.117 ", "ContentType": "text/plain"}], "uids": ["CT3Af245mhKJS1lS7h"]} -{"Format": "IDEA0", "ID": "bc87ab54-b4ba-487b-b0f9-9ddaa9dd13ac", "DetectTime": "2023-10-30T14:08:40.693268+02:00", "EventTime": "2023-10-30T14:08:40.693285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.50.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.50.155 ", "ContentType": "text/plain"}], "uids": ["CYJmSo1cGiaKSS65U9"]} -{"Format": "IDEA0", "ID": "9fe76db5-18c0-4135-addc-5421340166d1", "DetectTime": "2023-10-30T14:08:40.712610+02:00", "EventTime": "2023-10-30T14:08:40.712625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.248.248 ", "ContentType": "text/plain"}], "uids": ["CWSLMz4ZjR1BIf3vQk"]} -{"Format": "IDEA0", "ID": "dd3e3285-6afc-4cde-9b33-ae404e16e102", "DetectTime": "2023-10-30T14:08:40.736169+02:00", "EventTime": "2023-10-30T14:08:40.736179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CzDaaF44GrTunfN2ob"]} -{"Format": "IDEA0", "ID": "0fce958f-10b7-4d5e-b97c-b4331e5a1e9c", "DetectTime": "2023-10-30T14:08:40.761097+02:00", "EventTime": "2023-10-30T14:08:40.761113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ClQJV62KfZAdLvS0a9"]} -{"Format": "IDEA0", "ID": "f2ac6058-aac6-4599-9ade-1bfa13ad3a51", "DetectTime": "2023-10-30T14:08:40.789055+02:00", "EventTime": "2023-10-30T14:08:40.789071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CtCMRB3jlom9QLIb0l"]} -{"Format": "IDEA0", "ID": "f7cd072f-91f9-4df9-8dad-8a9331d10b41", "DetectTime": "2023-10-30T14:08:40.819240+02:00", "EventTime": "2023-10-30T14:08:40.819260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.97.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.97.132 ", "ContentType": "text/plain"}], "uids": ["CbvbKo4NIGbvuKDQa2"]} -{"Format": "IDEA0", "ID": "4b49d578-0d15-465a-a8b4-e7f70e25d528", "DetectTime": "2023-10-30T14:08:40.846153+02:00", "EventTime": "2023-10-30T14:08:40.846166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.135.199.117 ", "ContentType": "text/plain"}], "uids": ["Cthnkt4CZMJpdncq0a"]} -{"Format": "IDEA0", "ID": "ed188b07-45e0-4ad5-b3b3-6aac9f0ca3d4", "DetectTime": "2023-10-30T14:08:40.866890+02:00", "EventTime": "2023-10-30T14:08:40.866902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["ChmvMP1dVzZQxeoqui"]} -{"Format": "IDEA0", "ID": "79fa4003-7d54-4990-978a-da2bfc824719", "DetectTime": "2023-10-30T14:08:40.885668+02:00", "EventTime": "2023-10-30T14:08:40.885679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.91.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.201.91.219 ", "ContentType": "text/plain"}], "uids": ["CzcYb625hPVLozdTLd"]} -{"Format": "IDEA0", "ID": "0fb23260-612c-4fc7-87fa-5e516ac81f7c", "DetectTime": "2023-10-30T14:08:40.907952+02:00", "EventTime": "2023-10-30T14:08:40.907965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CyJpZA4CyLGsDcc57f"]} -{"Format": "IDEA0", "ID": "7420dae3-3a27-402d-9103-7d33282cd882", "DetectTime": "2023-10-30T14:08:40.935793+02:00", "EventTime": "2023-10-30T14:08:40.935806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CHnGEo1bw06rubpzqd"]} -{"Format": "IDEA0", "ID": "619dbdf9-aef0-4cf3-9f31-b3b4fbe51042", "DetectTime": "2023-10-30T14:08:40.962187+02:00", "EventTime": "2023-10-30T14:08:40.962204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.7.114.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.7.114.218 ", "ContentType": "text/plain"}], "uids": ["Ccdk26wVK1dD0KOlg"]} -{"Format": "IDEA0", "ID": "7ab4e970-771c-4e21-8eed-7ea57ab6c18e", "DetectTime": "2023-10-30T14:08:40.987268+02:00", "EventTime": "2023-10-30T14:08:40.987282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ch1aHq3nyljqe8QK0a"]} -{"Format": "IDEA0", "ID": "038fa21f-8901-462f-8ab5-6b51401574f1", "DetectTime": "2023-10-30T14:08:41.012674+02:00", "EventTime": "2023-10-30T14:08:41.012690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C40q4422pfzhJYG4D"]} -{"Format": "IDEA0", "ID": "3bd4fb87-4f02-4df1-b474-6894737c7113", "DetectTime": "2023-10-30T14:08:41.039806+02:00", "EventTime": "2023-10-30T14:08:41.039819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.132.4.58 ", "ContentType": "text/plain"}], "uids": ["C24OVU12osAX9vJggb"]} -{"Format": "IDEA0", "ID": "6b947bfa-6227-47b0-b7a8-056d4c927b6e", "DetectTime": "2023-10-30T14:08:41.062907+02:00", "EventTime": "2023-10-30T14:08:41.062923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CU0gLW16KWW4Mtj0X8"]} -{"Format": "IDEA0", "ID": "ecee204c-406c-46d7-a2a8-e60543506719", "DetectTime": "2023-10-30T14:08:41.087251+02:00", "EventTime": "2023-10-30T14:08:41.087271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CBcJ9p1V8Jr5hfvSk7"]} -{"Format": "IDEA0", "ID": "531339df-1cc4-4193-a3b3-d2c28c7d142c", "DetectTime": "2023-10-30T14:08:41.117909+02:00", "EventTime": "2023-10-30T14:08:41.117921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CcEay64VDUWPTdCN1f"]} -{"Format": "IDEA0", "ID": "e9067d84-225d-43f6-ad42-8bfc08185ba3", "DetectTime": "2023-10-30T14:08:41.144073+02:00", "EventTime": "2023-10-30T14:08:41.144084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CcPl5E5TWigAGTJp2"]} -{"Format": "IDEA0", "ID": "9ef4b629-2b15-4199-8edd-6d35a23bd27d", "DetectTime": "2023-10-30T14:08:41.165199+02:00", "EventTime": "2023-10-30T14:08:41.165212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.97.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.75.97.132 ", "ContentType": "text/plain"}], "uids": ["CJdnko3O5574Luk7j5"]} -{"Format": "IDEA0", "ID": "f3f2b6b6-8c2c-439d-8143-95a90331c271", "DetectTime": "2023-10-30T14:08:41.190925+02:00", "EventTime": "2023-10-30T14:08:41.190941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["C5zvNChOESeS9bTz7"]} -{"Format": "IDEA0", "ID": "9b3dbbb9-f493-4a23-b3cc-a48e9adbf5e8", "DetectTime": "2023-10-30T14:08:41.218279+02:00", "EventTime": "2023-10-30T14:08:41.218295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CfVP1t486EvW8SUOU2"]} -{"Format": "IDEA0", "ID": "60d163e7-c9e3-4e7c-a192-ce4f2e732a52", "DetectTime": "2023-10-30T14:08:41.246112+02:00", "EventTime": "2023-10-30T14:08:41.246134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJQIh02ZZXeYpNyTQh"]} -{"Format": "IDEA0", "ID": "ae6e19a7-9456-470b-9bb3-81db07655f93", "DetectTime": "2023-10-30T14:08:41.276898+02:00", "EventTime": "2023-10-30T14:08:41.276917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C2Pl6w4oKG5601PTo"]} -{"Format": "IDEA0", "ID": "bec80091-f0d8-47b0-9058-4e17296f9c4c", "DetectTime": "2023-10-30T14:08:41.302989+02:00", "EventTime": "2023-10-30T14:08:41.303001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CFbc3z2HTMVpMTMopa"]} -{"Format": "IDEA0", "ID": "e0bb24fc-b065-4cf1-963c-b949e161491f", "DetectTime": "2023-10-30T14:08:41.331348+02:00", "EventTime": "2023-10-30T14:08:41.331370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CbxFpF2jxr3y51v5L7"]} -{"Format": "IDEA0", "ID": "65f42e8d-c069-4e7a-a6be-9c15243055d0", "DetectTime": "2023-10-30T14:08:41.361372+02:00", "EventTime": "2023-10-30T14:08:41.361391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CoCsTWzMctC3zY95"]} -{"Format": "IDEA0", "ID": "1ad21dff-6b53-4fbf-9c61-add8c58a7d2e", "DetectTime": "2023-10-30T14:08:41.387363+02:00", "EventTime": "2023-10-30T14:08:41.387380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CLmft4z1ra9HKNdXa"]} -{"Format": "IDEA0", "ID": "a5e08d9d-bf44-412f-a6ff-a4f05a97296a", "DetectTime": "2023-10-30T14:08:41.418222+02:00", "EventTime": "2023-10-30T14:08:41.418244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["C1kcjm3vkKBts6AxU2"]} -{"Format": "IDEA0", "ID": "8314a715-5aae-4be4-a39c-83f653e557e9", "DetectTime": "2023-10-30T14:08:41.448399+02:00", "EventTime": "2023-10-30T14:08:41.448418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CwrbK7cVlKh983Tq6"]} -{"Format": "IDEA0", "ID": "eef08011-5982-430d-a140-44a05a7c757b", "DetectTime": "2023-10-30T14:08:41.480537+02:00", "EventTime": "2023-10-30T14:08:41.480554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CL9yXA4puSRZWhxel3"]} -{"Format": "IDEA0", "ID": "eb2ddc26-703f-47a6-8ca8-210edc2fa518", "DetectTime": "2023-10-30T14:08:41.510965+02:00", "EventTime": "2023-10-30T14:08:41.510986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.175.49 ", "ContentType": "text/plain"}], "uids": ["ClOO1L2PkHpGZdtKAh"]} -{"Format": "IDEA0", "ID": "d6c1a710-e8b2-4d80-a75b-be0c0c11d9ac", "DetectTime": "2023-10-30T14:08:41.541029+02:00", "EventTime": "2023-10-30T14:08:41.541046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["ColqRf1398AcDspjU4"]} -{"Format": "IDEA0", "ID": "8c671c53-0de9-4524-9e4c-42a0db79a9f8", "DetectTime": "2023-10-30T14:08:41.567806+02:00", "EventTime": "2023-10-30T14:08:41.567824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CpmBnCGUPzDCgj9ol"]} -{"Format": "IDEA0", "ID": "b9d05cf5-6e1a-476f-9d9c-0e97864d97b1", "DetectTime": "2023-10-30T14:08:41.595448+02:00", "EventTime": "2023-10-30T14:08:41.595474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.166.22 ", "ContentType": "text/plain"}], "uids": ["CazHr28Tz0c6gZNOh"]} -{"Format": "IDEA0", "ID": "4e03a1e7-627e-4012-ac45-97b437954c93", "DetectTime": "2023-10-30T14:08:41.626245+02:00", "EventTime": "2023-10-30T14:08:41.626265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CJwAGVoDgt3VvwhV4"]} -{"Format": "IDEA0", "ID": "680225d3-1605-4cbc-b34c-bdd08ecd8a55", "DetectTime": "2023-10-30T14:08:41.754963+02:00", "EventTime": "2023-10-30T14:08:41.754983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CGipd8PKpSD395Lo"]} -{"Format": "IDEA0", "ID": "9f866e2d-dcff-449c-851e-4894a369f294", "DetectTime": "2023-10-30T14:08:41.786487+02:00", "EventTime": "2023-10-30T14:08:41.786507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C3yD4j1y2D8eGqUNb5"]} -{"Format": "IDEA0", "ID": "c700d3be-34ff-4bd0-a427-b52b3b13e522", "DetectTime": "2023-10-30T14:08:41.815940+02:00", "EventTime": "2023-10-30T14:08:41.815954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CsP1Qn1wvSfN36luW1"]} -{"Format": "IDEA0", "ID": "51714b08-1586-4c47-ac1f-797f631a9c8f", "DetectTime": "2023-10-30T14:08:41.845275+02:00", "EventTime": "2023-10-30T14:08:41.845295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CrKc9SYWgJxhjGXx4"]} -{"Format": "IDEA0", "ID": "7632e4f5-8a7d-448d-9e9f-76c13881e3f0", "DetectTime": "2023-10-30T14:08:41.872912+02:00", "EventTime": "2023-10-30T14:08:41.872923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["CGix4A7uWnWTqwQNj"]} -{"Format": "IDEA0", "ID": "61370332-c0e7-4aa7-913d-addd1d06b2b5", "DetectTime": "2023-10-30T14:08:41.899880+02:00", "EventTime": "2023-10-30T14:08:41.899892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CyH1mU34252gYuSoyd"]} -{"Format": "IDEA0", "ID": "13e266be-68a4-42e5-97c8-44498cfa4c19", "DetectTime": "2023-10-30T14:08:41.927992+02:00", "EventTime": "2023-10-30T14:08:41.928008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.198.166.22 ", "ContentType": "text/plain"}], "uids": ["CAG0dOZhsBs195V07"]} -{"Format": "IDEA0", "ID": "a9c36de1-c51b-4797-b1d1-47140ee06d79", "DetectTime": "2023-10-30T14:08:41.951226+02:00", "EventTime": "2023-10-30T14:08:41.951237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CBFlbGYCD2fP3dCk2"]} -{"Format": "IDEA0", "ID": "bcb60c6a-cc64-4283-994e-174c7fa6c000", "DetectTime": "2023-10-30T14:08:41.977004+02:00", "EventTime": "2023-10-30T14:08:41.977022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cusoxt2PEQz1fDip18"]} -{"Format": "IDEA0", "ID": "df99edea-1006-4c82-8f05-6cade5587e9a", "DetectTime": "2023-10-30T14:08:42.003446+02:00", "EventTime": "2023-10-30T14:08:42.003465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CfjFb328WivFRg0FT3"]} -{"Format": "IDEA0", "ID": "78291352-059d-45d0-a090-d9b4372c9f9c", "DetectTime": "2023-10-30T14:08:42.031653+02:00", "EventTime": "2023-10-30T14:08:42.031675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cr1x1g4ZVm31G2GNQh"]} -{"Format": "IDEA0", "ID": "f427210a-efd4-492b-8e70-c86ec7265b1d", "DetectTime": "2023-10-30T14:08:42.059531+02:00", "EventTime": "2023-10-30T14:08:42.059552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.150.59 ", "ContentType": "text/plain"}], "uids": ["CQX0Ax4HnrgUDtl4q7"]} -{"Format": "IDEA0", "ID": "e70ecb66-68bf-4bb9-95aa-cbdcf1c7f036", "DetectTime": "2023-10-30T14:08:42.091401+02:00", "EventTime": "2023-10-30T14:08:42.091422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cnerlyc8moIjjeY01"]} -{"Format": "IDEA0", "ID": "12b80084-3479-425a-b13d-f18de5879883", "DetectTime": "2023-10-30T14:08:42.120504+02:00", "EventTime": "2023-10-30T14:08:42.120517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["C0ONwL2C4elB7RRxV5"]} -{"Format": "IDEA0", "ID": "06614c31-1c18-425f-8cb3-47008f195d7a", "DetectTime": "2023-10-30T14:08:42.149183+02:00", "EventTime": "2023-10-30T14:08:42.149195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CpEH4H2sEvr0QBkBy9"]} -{"Format": "IDEA0", "ID": "ecddc8e2-ac74-48e4-a87b-d262d632c532", "DetectTime": "2023-10-30T14:08:42.172761+02:00", "EventTime": "2023-10-30T14:08:42.172777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CYAEix27XKNsVes1I9"]} -{"Format": "IDEA0", "ID": "87243c6a-6053-4d65-bbbf-979dd1ed0466", "DetectTime": "2023-10-30T14:08:42.201874+02:00", "EventTime": "2023-10-30T14:08:42.201888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CCW0p5V5RPNeNGc0b"]} -{"Format": "IDEA0", "ID": "4d8deb3d-e01c-4b41-8e05-6f974cda1a98", "DetectTime": "2023-10-30T14:08:42.231478+02:00", "EventTime": "2023-10-30T14:08:42.231494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CSGkfL1isAmWLvR3K3"]} -{"Format": "IDEA0", "ID": "81834738-a3c1-414d-bbea-eea58f393bc5", "DetectTime": "2023-10-30T14:08:42.260116+02:00", "EventTime": "2023-10-30T14:08:42.260132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.129.163.108 ", "ContentType": "text/plain"}], "uids": ["CibSkN3oyschATmiR1"]} -{"Format": "IDEA0", "ID": "90fefcbd-504b-43a1-9a15-26b34250f3ab", "DetectTime": "2023-10-30T14:08:42.288137+02:00", "EventTime": "2023-10-30T14:08:42.288153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNCEXGpob9WXfB9Uf"]} -{"Format": "IDEA0", "ID": "d1345c83-39d2-4ab3-b26f-4f1556a21eda", "DetectTime": "2023-10-30T14:08:42.316847+02:00", "EventTime": "2023-10-30T14:08:42.316860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CLrPfU3SLxWMDWkOqd"]} -{"Format": "IDEA0", "ID": "f316cb7e-2d02-42d5-a2ec-29a3b08e7677", "DetectTime": "2023-10-30T14:08:42.346501+02:00", "EventTime": "2023-10-30T14:08:42.346523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.248.248 ", "ContentType": "text/plain"}], "uids": ["CvQaop2aBC6ZOBUnk"]} -{"Format": "IDEA0", "ID": "97009d9b-3695-4a30-9f2b-d472215f6172", "DetectTime": "2023-10-30T14:08:42.375759+02:00", "EventTime": "2023-10-30T14:08:42.375780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["CIm2jn3P1p0wOEZshj"]} -{"Format": "IDEA0", "ID": "4c7ca051-bbf0-488c-ad25-83d013df1997", "DetectTime": "2023-10-30T14:08:42.405685+02:00", "EventTime": "2023-10-30T14:08:42.405703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CM6eFu4U6Icf4WPZfc"]} -{"Format": "IDEA0", "ID": "abe289a3-b558-4be2-bf93-40141d2d7b4a", "DetectTime": "2023-10-30T14:08:42.435812+02:00", "EventTime": "2023-10-30T14:08:42.435828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CsHirV3iXbuomCwfn1"]} -{"Format": "IDEA0", "ID": "710237e6-9f7f-4007-aaaf-e00818a95631", "DetectTime": "2023-10-30T14:08:42.465351+02:00", "EventTime": "2023-10-30T14:08:42.465369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.175.49 ", "ContentType": "text/plain"}], "uids": ["CgAFgQ2UneWTAjxi07"]} -{"Format": "IDEA0", "ID": "fe71251c-63e2-45f4-b7b1-c343dda32dc2", "DetectTime": "2023-10-30T14:08:42.492232+02:00", "EventTime": "2023-10-30T14:08:42.492256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRlr2s21ypj6utI1a1"]} -{"Format": "IDEA0", "ID": "d8580281-93f0-4598-9e18-9e25b0dc9fb0", "DetectTime": "2023-10-30T14:08:42.515117+02:00", "EventTime": "2023-10-30T14:08:42.515134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.233.248.248 ", "ContentType": "text/plain"}], "uids": ["CGufvAdy2NflZFyR2"]} -{"Format": "IDEA0", "ID": "8cdcd8dd-be17-4a46-bea1-7981375ef50b", "DetectTime": "2023-10-30T14:08:42.544571+02:00", "EventTime": "2023-10-30T14:08:42.544592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CAaZLs2XKMjCEvem3l"]} -{"Format": "IDEA0", "ID": "2a6bb5c0-bb1b-4b2c-a2c2-13cd5fa0c8c0", "DetectTime": "2023-10-30T14:08:42.571924+02:00", "EventTime": "2023-10-30T14:08:42.571944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CVEgf8MxGWSns1rO5"]} -{"Format": "IDEA0", "ID": "69dcd114-4f6b-4257-96ca-fe2efadb754e", "DetectTime": "2023-10-30T14:08:42.604646+02:00", "EventTime": "2023-10-30T14:08:42.604666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CW6e4r2rjb6ySXVmMh"]} -{"Format": "IDEA0", "ID": "1f41d17f-9c72-4736-b4e7-03023e90974c", "DetectTime": "2023-10-30T14:08:42.633001+02:00", "EventTime": "2023-10-30T14:08:42.633021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C1gBNE38KD8KOltRWf"]} -{"Format": "IDEA0", "ID": "a66a9960-71fc-42f3-9765-639e8601d03e", "DetectTime": "2023-10-30T14:08:42.664727+02:00", "EventTime": "2023-10-30T14:08:42.664748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["Cxgk1x3KX9yLuQYkw1"]} -{"Format": "IDEA0", "ID": "2efb56bc-2061-4843-b95e-7bb13d8774b6", "DetectTime": "2023-10-30T14:08:42.698187+02:00", "EventTime": "2023-10-30T14:08:42.698210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CJi48k4sSJLmssxUyh"]} -{"Format": "IDEA0", "ID": "6e1b8228-a582-481a-93f0-4fcfaa4590ec", "DetectTime": "2023-10-30T14:08:42.728423+02:00", "EventTime": "2023-10-30T14:08:42.728439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C5x09X22gDLXSZUDZk"]} -{"Format": "IDEA0", "ID": "e889e18a-227b-4137-ac97-0946d017e53b", "DetectTime": "2023-10-30T14:08:42.755553+02:00", "EventTime": "2023-10-30T14:08:42.755567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C6Wnq12PimKgsZZssl"]} -{"Format": "IDEA0", "ID": "9954aeb1-74c5-4d42-ad19-4fdedcca81a3", "DetectTime": "2023-10-30T14:08:42.779279+02:00", "EventTime": "2023-10-30T14:08:42.779297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CKRr4k3uCH2bQBcjb4"]} -{"Format": "IDEA0", "ID": "c31ca552-ea45-46a2-a3f7-fbe9add2a8f6", "DetectTime": "2023-10-30T14:08:42.808924+02:00", "EventTime": "2023-10-30T14:08:42.808943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CzwGyH3zBQIbgU4wYk"]} -{"Format": "IDEA0", "ID": "bc61f5aa-efbe-4d93-a93d-d6d75ce31aee", "DetectTime": "2023-10-30T14:08:42.840272+02:00", "EventTime": "2023-10-30T14:08:42.840294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["C5G7Ck1hk47lFYHiEk"]} -{"Format": "IDEA0", "ID": "9a299a59-f932-4499-af0e-7b31a0d48d03", "DetectTime": "2023-10-30T14:08:42.867906+02:00", "EventTime": "2023-10-30T14:08:42.867922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.150.59 ", "ContentType": "text/plain"}], "uids": ["Cz5LNXCs9hiNgLTV3"]} -{"Format": "IDEA0", "ID": "882f6815-9928-4cb8-8e61-8870f00b7758", "DetectTime": "2023-10-30T14:08:42.894679+02:00", "EventTime": "2023-10-30T14:08:42.894696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C7PA2d3y0JllsRLUd"]} -{"Format": "IDEA0", "ID": "0b52d2a0-3d7b-4563-a4b6-486232448b9c", "DetectTime": "2023-10-30T14:08:42.925859+02:00", "EventTime": "2023-10-30T14:08:42.925879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C31OwNOGqbVXZAv28"]} -{"Format": "IDEA0", "ID": "97524a56-c1ba-452f-a7af-701d96a82cbe", "DetectTime": "2023-10-30T14:08:42.957409+02:00", "EventTime": "2023-10-30T14:08:42.957431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CjKKLR1sTiSthwNAcg"]} -{"Format": "IDEA0", "ID": "f8b3e4de-e381-4fec-85a4-0c076e4a4bb0", "DetectTime": "2023-10-30T14:08:42.986521+02:00", "EventTime": "2023-10-30T14:08:42.986537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CUUjnB4wXZ6GSAqPC9"]} -{"Format": "IDEA0", "ID": "bee43a3e-54aa-4adb-a999-56402a478a49", "DetectTime": "2023-10-30T14:08:43.015297+02:00", "EventTime": "2023-10-30T14:08:43.015316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CjTShxPP67Q5rqoc7"]} -{"Format": "IDEA0", "ID": "f9434e54-2fba-4c28-923d-50eb10a8e91b", "DetectTime": "2023-10-30T14:08:43.045256+02:00", "EventTime": "2023-10-30T14:08:43.045278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CrZylr4Ptn6ETKDxQ4"]} -{"Format": "IDEA0", "ID": "0c4898eb-0454-46bb-92b6-89eaca6b4cc4", "DetectTime": "2023-10-30T14:08:43.070119+02:00", "EventTime": "2023-10-30T14:08:43.070132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CZr6vY1Im7gSViEelf"]} -{"Format": "IDEA0", "ID": "28be35fc-2512-46d3-9d48-45086189988d", "DetectTime": "2023-10-30T14:08:43.092664+02:00", "EventTime": "2023-10-30T14:08:43.092678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CmkX1a39Sv1VipNlI1"]} -{"Format": "IDEA0", "ID": "015f01b3-18cf-462f-a6bd-6d281b03b29f", "DetectTime": "2023-10-30T14:08:43.120077+02:00", "EventTime": "2023-10-30T14:08:43.120093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CwBd5A2uYelZFIP5h7"]} -{"Format": "IDEA0", "ID": "ea06e5a8-db07-48b1-9e14-cfceb49639d5", "DetectTime": "2023-10-30T14:08:43.146490+02:00", "EventTime": "2023-10-30T14:08:43.146502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CALIZuyvkFKnJpuLe"]} -{"Format": "IDEA0", "ID": "5b9a14e3-905e-485b-99f3-a5d31c240b53", "DetectTime": "2023-10-30T14:08:43.170432+02:00", "EventTime": "2023-10-30T14:08:43.170459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CQmJB935pEngZbKmwi"]} -{"Format": "IDEA0", "ID": "6c2dca57-40bb-436d-95b5-e1299d0d6dd6", "DetectTime": "2023-10-30T14:08:43.196370+02:00", "EventTime": "2023-10-30T14:08:43.196381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CsoH66iwIVNQezyAc"]} -{"Format": "IDEA0", "ID": "6d5e6673-7372-43d0-9bfd-46a4b2779af9", "DetectTime": "2023-10-30T14:08:43.221430+02:00", "EventTime": "2023-10-30T14:08:43.221446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CQ92Da3Ok7PshmAC08"]} -{"Format": "IDEA0", "ID": "efb915a0-1b91-4cdb-b2c6-02d38092d665", "DetectTime": "2023-10-30T14:08:43.249022+02:00", "EventTime": "2023-10-30T14:08:43.249039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["C6Fnh14gcsUz5lEMAh"]} -{"Format": "IDEA0", "ID": "67c4d73a-a761-482e-bfa9-725836cab643", "DetectTime": "2023-10-30T14:08:43.273444+02:00", "EventTime": "2023-10-30T14:08:43.273460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CdwP2SU3Z8hqSFf2h"]} -{"Format": "IDEA0", "ID": "3e0dc346-ded2-402a-bdfe-5f97a0468e6d", "DetectTime": "2023-10-30T14:08:43.298959+02:00", "EventTime": "2023-10-30T14:08:43.298988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["CyPUuH3QZ8tKbLrdQ5"]} -{"Format": "IDEA0", "ID": "00cf6d2f-380d-4f21-805d-2952b9caa6d7", "DetectTime": "2023-10-30T14:08:43.325437+02:00", "EventTime": "2023-10-30T14:08:43.325455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["Co9OFAfKE3aGKdsRf"]} -{"Format": "IDEA0", "ID": "69c066ae-aa4e-4c0d-8298-c0bb82eceec7", "DetectTime": "2023-10-30T14:08:43.350829+02:00", "EventTime": "2023-10-30T14:08:43.350842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CmcQrz4C9Phu0LwfU3"]} -{"Format": "IDEA0", "ID": "d19de117-cf4a-4496-a2e9-a3eac17eb753", "DetectTime": "2023-10-30T14:08:43.377189+02:00", "EventTime": "2023-10-30T14:08:43.377208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CMoIc63QFv7nSjtMXa"]} -{"Format": "IDEA0", "ID": "b86066c6-20eb-4943-8fa0-be7f8cd7c439", "DetectTime": "2023-10-30T14:08:43.398990+02:00", "EventTime": "2023-10-30T14:08:43.399009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Cmuwn42B1cU1zzDLXl"]} -{"Format": "IDEA0", "ID": "89c9437a-137e-41ed-85d9-62b124e162c4", "DetectTime": "2023-10-30T14:08:43.421835+02:00", "EventTime": "2023-10-30T14:08:43.421846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C2Cr1j14bHAJv6bGL4"]} -{"Format": "IDEA0", "ID": "3cb55795-0e91-42fd-a33f-cc8171865cad", "DetectTime": "2023-10-30T14:08:43.441621+02:00", "EventTime": "2023-10-30T14:08:43.441632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["ChDqec2hCPg5UumNee"]} -{"Format": "IDEA0", "ID": "de518af2-d1e4-487e-bfcb-ebd120f95051", "DetectTime": "2023-10-30T14:08:43.462616+02:00", "EventTime": "2023-10-30T14:08:43.462635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["C27D121185VlShk1d5"]} -{"Format": "IDEA0", "ID": "4d5dc749-2486-4735-b275-5503fd5fc18b", "DetectTime": "2023-10-30T14:08:43.484786+02:00", "EventTime": "2023-10-30T14:08:43.484807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CcNLDl3y23jmNwcWS2"]} -{"Format": "IDEA0", "ID": "531c6363-07be-475d-9fa0-88fcd43d1ba6", "DetectTime": "2023-10-30T14:08:43.507163+02:00", "EventTime": "2023-10-30T14:08:43.507178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cbc6M12XGsHyDewZEd"]} -{"Format": "IDEA0", "ID": "1d6edb97-3837-47d0-be0b-99905ffef76e", "DetectTime": "2023-10-30T14:08:43.529988+02:00", "EventTime": "2023-10-30T14:08:43.530004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CZBvhO3dxoM5J3fBj1"]} -{"Format": "IDEA0", "ID": "d0b865a6-f64c-448e-b3d9-cf1f47e7c6ce", "DetectTime": "2023-10-30T14:08:43.550265+02:00", "EventTime": "2023-10-30T14:08:43.550280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CxTrR24Bd6mPDguoE2"]} -{"Format": "IDEA0", "ID": "24ac216e-a1ae-4ef6-b840-2cd77c3692c9", "DetectTime": "2023-10-30T14:08:43.575226+02:00", "EventTime": "2023-10-30T14:08:43.575237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CG8xFq238bHpJ1B7qa"]} -{"Format": "IDEA0", "ID": "089c3a89-0871-4505-8b44-ddd01eef24b7", "DetectTime": "2023-10-30T14:08:43.597851+02:00", "EventTime": "2023-10-30T14:08:43.597863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CELiXO11agR9nQ21ob"]} -{"Format": "IDEA0", "ID": "7cb746d2-cd12-46ad-bb3a-2a4b464f1590", "DetectTime": "2023-10-30T14:08:43.619103+02:00", "EventTime": "2023-10-30T14:08:43.619117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["ColZTZ1b1Zqt4Pl2F1"]} -{"Format": "IDEA0", "ID": "950ec293-8764-4a03-b984-31bb0eba94c2", "DetectTime": "2023-10-30T14:08:43.642606+02:00", "EventTime": "2023-10-30T14:08:43.642620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CpUkC3ZF43iv2HOFj"]} -{"Format": "IDEA0", "ID": "8cb33313-96ad-4f3b-a758-6de616ba5283", "DetectTime": "2023-10-30T14:08:43.662181+02:00", "EventTime": "2023-10-30T14:08:43.662202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["COX8Jc2KZ7FYzReNNd"]} -{"Format": "IDEA0", "ID": "e6fb68d7-7e91-4254-8e84-4863dabb6bdd", "DetectTime": "2023-10-30T14:08:43.681256+02:00", "EventTime": "2023-10-30T14:08:43.681268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CL2f1n4EpaPeSIL2i3"]} -{"Format": "IDEA0", "ID": "6855833d-46fd-4e6c-ae37-3946cca2bdae", "DetectTime": "2023-10-30T14:08:43.701723+02:00", "EventTime": "2023-10-30T14:08:43.701740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.150.59 ", "ContentType": "text/plain"}], "uids": ["CuKO184fDpxaglgSi"]} -{"Format": "IDEA0", "ID": "259761ef-d37d-4ab3-8219-22e07069033f", "DetectTime": "2023-10-30T14:08:43.727217+02:00", "EventTime": "2023-10-30T14:08:43.727241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["C8reR23ix3QWsDvrnc"]} -{"Format": "IDEA0", "ID": "1c36e1cb-cc2b-494d-b1ab-df9244830233", "DetectTime": "2023-10-30T14:08:43.751299+02:00", "EventTime": "2023-10-30T14:08:43.751313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CV1aKt3y3iPcDHNB14"]} -{"Format": "IDEA0", "ID": "ab1cc98a-9601-48cf-9cfc-024da33c6be4", "DetectTime": "2023-10-30T14:08:43.772778+02:00", "EventTime": "2023-10-30T14:08:43.772791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CLvVas3sNlG0QRHIfb"]} -{"Format": "IDEA0", "ID": "2fad19b7-f98a-4f0f-8cb2-fb336e79f0eb", "DetectTime": "2023-10-30T14:08:43.796172+02:00", "EventTime": "2023-10-30T14:08:43.796190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["CdQbz22EOMG4btDswk"]} -{"Format": "IDEA0", "ID": "3f773653-ec3e-4ea6-9bbf-595570ab70cc", "DetectTime": "2023-10-30T14:08:43.815768+02:00", "EventTime": "2023-10-30T14:08:43.815779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CR874d1QZ5ePbn6Edh"]} -{"Format": "IDEA0", "ID": "17c453d1-c89e-4f78-90c2-19c32b1ec272", "DetectTime": "2023-10-30T14:08:43.839745+02:00", "EventTime": "2023-10-30T14:08:43.839763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ChY2Ps3hSOz1Uu0i0i"]} -{"Format": "IDEA0", "ID": "9292780a-da71-4920-b8f6-0a798f95b85d", "DetectTime": "2023-10-30T14:08:43.861713+02:00", "EventTime": "2023-10-30T14:08:43.861728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.251.175.49 ", "ContentType": "text/plain"}], "uids": ["CqQbo54mPWYLHE8DSc"]} -{"Format": "IDEA0", "ID": "2866da33-ca0e-4bd5-86ee-3be3bd225333", "DetectTime": "2023-10-30T14:08:43.883123+02:00", "EventTime": "2023-10-30T14:08:43.883139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CYiiCI3kXqvdsGZIWa"]} -{"Format": "IDEA0", "ID": "8891615e-2817-499d-a3dc-5020642a406d", "DetectTime": "2023-10-30T14:08:43.964742+02:00", "EventTime": "2023-10-30T14:08:43.964777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cfm6XEe6kZnuyAZE6"]} -{"Format": "IDEA0", "ID": "87af9c38-cfcd-4638-88ee-6f2dcac5dbcf", "DetectTime": "2023-10-30T14:08:43.994491+02:00", "EventTime": "2023-10-30T14:08:43.994509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CTfXkECBCHRWjEbD9"]} -{"Format": "IDEA0", "ID": "c3820b2f-3357-4d4c-a46b-79582f77ba7f", "DetectTime": "2023-10-30T14:08:44.021442+02:00", "EventTime": "2023-10-30T14:08:44.021456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CkegMl31gqdJP2dsA6"]} -{"Format": "IDEA0", "ID": "87fa1331-8d27-4718-8961-84d93695e95f", "DetectTime": "2023-10-30T14:08:44.046390+02:00", "EventTime": "2023-10-30T14:08:44.046406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ChAxrp4QXy0xoTI1U4"]} -{"Format": "IDEA0", "ID": "7b56bee7-a506-4a05-846e-50791210e5ee", "DetectTime": "2023-10-30T14:08:44.071669+02:00", "EventTime": "2023-10-30T14:08:44.071681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CYSzvfsMamAnbtk22"]} -{"Format": "IDEA0", "ID": "c0c815f4-fa75-417f-bb05-1fbcf28a5ac9", "DetectTime": "2023-10-30T14:08:44.096327+02:00", "EventTime": "2023-10-30T14:08:44.096344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CxLr8C1Q5WUbSk6SNe"]} -{"Format": "IDEA0", "ID": "6e39136b-98b4-45f7-823a-d5a849d901b8", "DetectTime": "2023-10-30T14:08:44.118259+02:00", "EventTime": "2023-10-30T14:08:44.118278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["C4UHFF2DCHOzw3TbT4"]} -{"Format": "IDEA0", "ID": "87adbd7c-6d92-40ca-98f9-f8d8fa78eefa", "DetectTime": "2023-10-30T14:08:44.145316+02:00", "EventTime": "2023-10-30T14:08:44.145332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["Cn4gpGFcCkBVeOKFk"]} -{"Format": "IDEA0", "ID": "3327f282-28fb-48ba-9347-ce789cb118e3", "DetectTime": "2023-10-30T14:08:44.171222+02:00", "EventTime": "2023-10-30T14:08:44.171237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["CV4RqRDV73krkj7aa"]} -{"Format": "IDEA0", "ID": "629e9e0e-0184-45d2-b070-a52a2518b55d", "DetectTime": "2023-10-30T14:08:44.199038+02:00", "EventTime": "2023-10-30T14:08:44.199058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["Csaaic4AOhdSCSKm7i"]} -{"Format": "IDEA0", "ID": "3fad92dc-9d2b-4c90-a49a-06e213bf4536", "DetectTime": "2023-10-30T14:08:44.227725+02:00", "EventTime": "2023-10-30T14:08:44.227741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbMA9Z1F0r6sDo6m4b"]} -{"Format": "IDEA0", "ID": "991b4e96-ae0c-4cac-8ed1-46e03038b7e5", "DetectTime": "2023-10-30T14:08:44.253966+02:00", "EventTime": "2023-10-30T14:08:44.253982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.185.55 ", "ContentType": "text/plain"}], "uids": ["C8LWrK1nipCY4UFGWc"]} -{"Format": "IDEA0", "ID": "1873d91c-c54a-490a-bae0-83e3ef5b9aef", "DetectTime": "2023-10-30T14:08:44.276897+02:00", "EventTime": "2023-10-30T14:08:44.276913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["COuZMw4pCdB2hPrMQl"]} -{"Format": "IDEA0", "ID": "0f0fb995-fa51-4105-ab1f-80cfa8d3fee2", "DetectTime": "2023-10-30T14:08:44.304608+02:00", "EventTime": "2023-10-30T14:08:44.304629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CW4OEA2emgvHpY2OK2"]} -{"Format": "IDEA0", "ID": "eb19127a-a2ae-47cb-98ce-ad9027963680", "DetectTime": "2023-10-30T14:08:44.328850+02:00", "EventTime": "2023-10-30T14:08:44.328867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C3s9Qq44qfJd6f1LM5"]} -{"Format": "IDEA0", "ID": "ff617085-bd57-454b-9a42-413e68d696f2", "DetectTime": "2023-10-30T14:08:44.359176+02:00", "EventTime": "2023-10-30T14:08:44.359192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CNMeIZ3S79uxtieIJl"]} -{"Format": "IDEA0", "ID": "f5f4d516-9041-4656-9199-e2afd3273b13", "DetectTime": "2023-10-30T14:08:44.386968+02:00", "EventTime": "2023-10-30T14:08:44.386984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.244.90.42 ", "ContentType": "text/plain"}], "uids": ["CeWqpcIGnmEwipkk6"]} -{"Format": "IDEA0", "ID": "6543fdbd-77ea-4e8d-89c0-2c8de5cdfc9e", "DetectTime": "2023-10-30T14:08:44.411289+02:00", "EventTime": "2023-10-30T14:08:44.411309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CVX8H9146Z6Pusjye8"]} -{"Format": "IDEA0", "ID": "f2ec9d98-e569-4843-a077-503c11a7d17e", "DetectTime": "2023-10-30T14:08:44.435524+02:00", "EventTime": "2023-10-30T14:08:44.435546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CW0Vw03swS4yh2i8L7"]} -{"Format": "IDEA0", "ID": "887af1e0-b59e-45ec-b05b-0e3b875c0f4a", "DetectTime": "2023-10-30T14:08:44.465812+02:00", "EventTime": "2023-10-30T14:08:44.465829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["CID8uuBPoVlGDxhIa"]} -{"Format": "IDEA0", "ID": "d44e0a7c-5651-4747-85fe-58d32570924d", "DetectTime": "2023-10-30T14:08:44.495357+02:00", "EventTime": "2023-10-30T14:08:44.495372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.75.176.98 ", "ContentType": "text/plain"}], "uids": ["CAGI6x3MHvk9MFgh82"]} -{"Format": "IDEA0", "ID": "ee577870-deb1-49a3-b54e-4b93fb69d847", "DetectTime": "2023-10-30T14:08:44.518734+02:00", "EventTime": "2023-10-30T14:08:44.518750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["Cufh2pDvc7LbzI3N3"]} -{"Format": "IDEA0", "ID": "4f8dae77-90ef-42e8-8c48-833b1e99b902", "DetectTime": "2023-10-30T14:08:44.548150+02:00", "EventTime": "2023-10-30T14:08:44.548172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CBNcQA4lYL9Zj4hUFk"]} -{"Format": "IDEA0", "ID": "f548782e-2d2b-46f1-a5a3-3fff92b0e6d4", "DetectTime": "2023-10-30T14:08:44.581470+02:00", "EventTime": "2023-10-30T14:08:44.581492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C1k4hU23xP59eZmjHd"]} -{"Format": "IDEA0", "ID": "1e9a7ca1-59ce-420c-9018-a8fb8e443585", "DetectTime": "2023-10-30T14:08:44.613716+02:00", "EventTime": "2023-10-30T14:08:44.613786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CN9ABywk0LPif0Qfi"]} -{"Format": "IDEA0", "ID": "3f6c8fee-1bab-4333-acfd-23798ffa1145", "DetectTime": "2023-10-30T14:08:44.644145+02:00", "EventTime": "2023-10-30T14:08:44.644158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CsCAfXPMG07u5oj23"]} -{"Format": "IDEA0", "ID": "5978418d-af4f-4f37-a4ff-1b7f66a122d9", "DetectTime": "2023-10-30T14:08:44.670351+02:00", "EventTime": "2023-10-30T14:08:44.670373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CzldyTTLFPVj3qxLa"]} -{"Format": "IDEA0", "ID": "6411588d-bc6f-4d0f-9df2-a562b92fd752", "DetectTime": "2023-10-30T14:08:44.696127+02:00", "EventTime": "2023-10-30T14:08:44.696149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Ce6dxn1Jm7GC8AD7Qk"]} -{"Format": "IDEA0", "ID": "bb1129c9-6939-423f-a9a3-7b80b8e25e91", "DetectTime": "2023-10-30T14:08:44.720926+02:00", "EventTime": "2023-10-30T14:08:44.720948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CadRlq4LFh3imxOeaj"]} -{"Format": "IDEA0", "ID": "7574176b-4e72-477f-bfe9-86ad95fd8f8b", "DetectTime": "2023-10-30T14:08:44.746157+02:00", "EventTime": "2023-10-30T14:08:44.746173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CsFr5G4QxPDPvY0rRh"]} -{"Format": "IDEA0", "ID": "37744aba-72be-43ca-b48f-a2b6a73acae7", "DetectTime": "2023-10-30T14:08:44.770248+02:00", "EventTime": "2023-10-30T14:08:44.770278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CDNRKi2UTx70wEPqO7"]} -{"Format": "IDEA0", "ID": "c0bd0c1e-84a0-413e-b72d-843039197160", "DetectTime": "2023-10-30T14:08:44.791531+02:00", "EventTime": "2023-10-30T14:08:44.791543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVqGIUSPL9wx6qZG8"]} -{"Format": "IDEA0", "ID": "24d46a6b-e8de-4dae-8a60-49f1169a76ba", "DetectTime": "2023-10-30T14:08:44.816729+02:00", "EventTime": "2023-10-30T14:08:44.816746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cgh6rsZoHsEDdg1W4"]} -{"Format": "IDEA0", "ID": "b21b74ec-2d9e-44ce-9c41-da4b02132214", "DetectTime": "2023-10-30T14:08:44.836955+02:00", "EventTime": "2023-10-30T14:08:44.836971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CeX0zd1zkvBmCh8mZ3"]} -{"Format": "IDEA0", "ID": "4e6ddd44-d9a9-4366-8bf6-757d46a63cf8", "DetectTime": "2023-10-30T14:08:44.858580+02:00", "EventTime": "2023-10-30T14:08:44.858599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["Cm7nt94Qf7vF5IBski"]} -{"Format": "IDEA0", "ID": "11bd21e2-9cd7-4315-a2c7-84ab24319907", "DetectTime": "2023-10-30T14:08:44.876768+02:00", "EventTime": "2023-10-30T14:08:44.876790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CBtB0w19onUei6EdJ5"]} -{"Format": "IDEA0", "ID": "2221d97d-fc26-476f-b56b-e89461658bdc", "DetectTime": "2023-10-30T14:08:44.894646+02:00", "EventTime": "2023-10-30T14:08:44.894664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CCqsaX2qLPeKbcGpTb"]} -{"Format": "IDEA0", "ID": "2462133d-ef9e-4120-8386-119eac981881", "DetectTime": "2023-10-30T14:08:44.915693+02:00", "EventTime": "2023-10-30T14:08:44.915709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CFn3LT3KxMBluVjFz2"]} -{"Format": "IDEA0", "ID": "7abf5498-4bb6-45db-b849-0c6afb1b5036", "DetectTime": "2023-10-30T14:08:44.935179+02:00", "EventTime": "2023-10-30T14:08:44.935195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C73oG416yyo56aIeV2"]} -{"Format": "IDEA0", "ID": "320370f6-a0dd-4a7b-adf1-99e20bdb21a9", "DetectTime": "2023-10-30T14:08:44.957453+02:00", "EventTime": "2023-10-30T14:08:44.957469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CJeKTI1M8hGYHgD5Tk"]} -{"Format": "IDEA0", "ID": "f448b829-7c9f-433a-9330-5d05f5a02c6a", "DetectTime": "2023-10-30T14:08:44.979412+02:00", "EventTime": "2023-10-30T14:08:44.979432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CWZgmY21nLjMuhGNZb"]} -{"Format": "IDEA0", "ID": "da5df7bb-5dbe-4f61-8e40-4f17c6fb3104", "DetectTime": "2023-10-30T14:08:45.005663+02:00", "EventTime": "2023-10-30T14:08:45.005675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["C2bQBH33SeIj0Vehs2"]} -{"Format": "IDEA0", "ID": "db4186a6-df89-4d34-ad5e-35f9ead1b26d", "DetectTime": "2023-10-30T14:08:45.027893+02:00", "EventTime": "2023-10-30T14:08:45.027919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CPM79ypNbsvFrMKDk"]} -{"Format": "IDEA0", "ID": "d0fd6e1f-5c28-438f-82fc-37355d41aa1d", "DetectTime": "2023-10-30T14:08:45.055542+02:00", "EventTime": "2023-10-30T14:08:45.055559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CNWQ6m3nB2zfFMCu0f"]} -{"Format": "IDEA0", "ID": "bb5a7c21-a20e-4c38-ba03-b8c933616424", "DetectTime": "2023-10-30T14:08:45.078270+02:00", "EventTime": "2023-10-30T14:08:45.078283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CO4hre1fVdtoca1QUl"]} -{"Format": "IDEA0", "ID": "42745468-40bd-4e69-8570-acc9dda8ea29", "DetectTime": "2023-10-30T14:08:45.096563+02:00", "EventTime": "2023-10-30T14:08:45.096581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["ChfcfW3DpIl1GAF3Q6"]} -{"Format": "IDEA0", "ID": "bc3af2ce-bdda-40fb-b6f7-9125f0834902", "DetectTime": "2023-10-30T14:08:45.116805+02:00", "EventTime": "2023-10-30T14:08:45.116817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["Cm348R2rI9ysZMMrah"]} -{"Format": "IDEA0", "ID": "32c8f169-748a-425e-9120-649932da4887", "DetectTime": "2023-10-30T14:08:45.137358+02:00", "EventTime": "2023-10-30T14:08:45.137373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CcMltd3bnN0FF4dDj4"]} -{"Format": "IDEA0", "ID": "1e004d69-4206-4ce2-b3ce-46ae9517218c", "DetectTime": "2023-10-30T14:08:45.159362+02:00", "EventTime": "2023-10-30T14:08:45.159375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cur8hm2i8oxbgpHsvg"]} -{"Format": "IDEA0", "ID": "24217161-6f24-434f-a3d9-26f6e43bf4c3", "DetectTime": "2023-10-30T14:08:45.180591+02:00", "EventTime": "2023-10-30T14:08:45.180613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CsC6FF1Y6OpUmFWqs6"]} -{"Format": "IDEA0", "ID": "04529f01-9e8f-4f4c-8dd2-2f5bf9479e06", "DetectTime": "2023-10-30T14:08:45.200972+02:00", "EventTime": "2023-10-30T14:08:45.200993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CaHhV14P4AGy0oC3C7"]} -{"Format": "IDEA0", "ID": "3667b4a5-d8bd-4d52-a425-536cbe9cdda1", "DetectTime": "2023-10-30T14:08:45.224113+02:00", "EventTime": "2023-10-30T14:08:45.224134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CGmQIc35bs2ztDSJj"]} -{"Format": "IDEA0", "ID": "4ebae2f7-9631-455d-bcdf-97888272f0bc", "DetectTime": "2023-10-30T14:08:45.249360+02:00", "EventTime": "2023-10-30T14:08:45.249377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C7ff7qUebKYR5ccD"]} -{"Format": "IDEA0", "ID": "27660573-ea37-445b-a55d-cd5acf413a46", "DetectTime": "2023-10-30T14:08:45.273566+02:00", "EventTime": "2023-10-30T14:08:45.273588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C1zQya4LB7QFgmY8"]} -{"Format": "IDEA0", "ID": "d7859b44-caf1-42a9-b8ea-8644382feb71", "DetectTime": "2023-10-30T14:08:45.297289+02:00", "EventTime": "2023-10-30T14:08:45.297306+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"], "Hostname": ["host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 95.104.77.164 from 10.0.2.19. blacklisted IP AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CByaXu2ck5M0fvGIe"]} -{"Format": "IDEA0", "ID": "67311282-a5d6-48a1-bdc1-9f55322e6693", "DetectTime": "2023-10-30T14:08:45.326559+02:00", "EventTime": "2023-10-30T14:08:45.326580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CQJMu71ZdTUox8a3E3"]} -{"Format": "IDEA0", "ID": "8dc41dd7-2ada-4097-a91d-43b5567972d8", "DetectTime": "2023-10-30T14:08:45.348212+02:00", "EventTime": "2023-10-30T14:08:45.348229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CQP8FX3w4fyIHqjIR8"]} -{"Format": "IDEA0", "ID": "be775c90-10ba-4697-a44b-98497ad0b98a", "DetectTime": "2023-10-30T14:08:45.370655+02:00", "EventTime": "2023-10-30T14:08:45.370667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQWaeOzFijgAViJ6l"]} -{"Format": "IDEA0", "ID": "840e579d-8ec5-4d1f-b36b-88806604cbcd", "DetectTime": "2023-10-30T14:08:45.389404+02:00", "EventTime": "2023-10-30T14:08:45.389415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CeJhJEvZL2VOxNoi"]} -{"Format": "IDEA0", "ID": "6369a649-4d34-433b-ae4f-2f27d8219cc5", "DetectTime": "2023-10-30T14:08:45.414710+02:00", "EventTime": "2023-10-30T14:08:45.414726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CeJxCGCWbmclDyfck"]} -{"Format": "IDEA0", "ID": "f6b5cd17-98ef-4ba6-8f61-588072e44f5a", "DetectTime": "2023-10-30T14:08:45.437128+02:00", "EventTime": "2023-10-30T14:08:45.437145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["ClL9ZERHtf1HAG4Q"]} -{"Format": "IDEA0", "ID": "94dc950d-57b2-4956-aec8-0868098f975a", "DetectTime": "2023-10-30T14:08:45.469860+02:00", "EventTime": "2023-10-30T14:08:45.469878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C0iF942xK63JThc6E6"]} -{"Format": "IDEA0", "ID": "ab8ecb9d-e235-482c-a632-5557f9c937b4", "DetectTime": "2023-10-30T14:08:45.490420+02:00", "EventTime": "2023-10-30T14:08:45.490437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CcgZOK140xCWw2EYc9"]} -{"Format": "IDEA0", "ID": "5a12e9c1-de9e-4439-b1dd-7ef269fa4c2a", "DetectTime": "2023-10-30T14:08:45.508893+02:00", "EventTime": "2023-10-30T14:08:45.508911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CXJMDc2wlq0q4ERQn1"]} -{"Format": "IDEA0", "ID": "df1ce3b7-f046-4251-8fd4-3c255e5ae5be", "DetectTime": "2023-10-30T14:08:45.532915+02:00", "EventTime": "2023-10-30T14:08:45.532927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CEhkVy4Gji7nREB7T"]} -{"Format": "IDEA0", "ID": "392b32ec-c8fc-4403-9a3d-f8ed2b42d1a4", "DetectTime": "2023-10-30T14:08:45.554531+02:00", "EventTime": "2023-10-30T14:08:45.554549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CxEucF3M9eaMCpPuB2"]} -{"Format": "IDEA0", "ID": "c0c4d40d-b07c-4dac-b277-5cf92e088d3d", "DetectTime": "2023-10-30T14:08:45.580347+02:00", "EventTime": "2023-10-30T14:08:45.580362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CUjsgL19GK7YUeRyoe"]} -{"Format": "IDEA0", "ID": "f9079d15-1545-4f9a-98ad-c9963dc76794", "DetectTime": "2023-10-30T14:08:45.601215+02:00", "EventTime": "2023-10-30T14:08:45.601233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CrmKpB1KCUZEOGCZYa"]} -{"Format": "IDEA0", "ID": "77e31510-a9a2-40bb-b6a0-073be3555306", "DetectTime": "2023-10-30T14:08:45.623859+02:00", "EventTime": "2023-10-30T14:08:45.623871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CnxRso3VOBzu6f0Ije"]} -{"Format": "IDEA0", "ID": "862da712-5703-4fe3-a9bc-5455f9133299", "DetectTime": "2023-10-30T14:08:45.648828+02:00", "EventTime": "2023-10-30T14:08:45.648840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["CREFAC1oy8Ju5VjNtk"]} -{"Format": "IDEA0", "ID": "c36cc135-c713-4ba9-bf39-ce6321b611a4", "DetectTime": "2023-10-30T14:08:45.665095+02:00", "EventTime": "2023-10-30T14:08:45.665107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CL0Hj5yTB3QltYRD1"]} -{"Format": "IDEA0", "ID": "7454fa72-3a74-4fdb-850d-91e1a4c87021", "DetectTime": "2023-10-30T14:08:45.687285+02:00", "EventTime": "2023-10-30T14:08:45.687301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CHpZyC39ypHdZs1mt3"]} -{"Format": "IDEA0", "ID": "7a69d145-c565-4bb2-a8da-1e2939f90787", "DetectTime": "2023-10-30T14:08:45.708834+02:00", "EventTime": "2023-10-30T14:08:45.708853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CRBCDM2AnLM61w2yWe"]} -{"Format": "IDEA0", "ID": "d8d918b3-fe3b-4169-a059-28f3ea2faecf", "DetectTime": "2023-10-30T14:08:45.742588+02:00", "EventTime": "2023-10-30T14:08:45.742605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C7ZtNN3iab4dzS9HSj"]} -{"Format": "IDEA0", "ID": "5819f2a2-f2cf-45a5-98cf-382ebea2608a", "DetectTime": "2023-10-30T14:08:45.761116+02:00", "EventTime": "2023-10-30T14:08:45.761129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CdgdYcaDVrxhpQfqc"]} -{"Format": "IDEA0", "ID": "322cddd8-7d5d-4004-9f15-1ef38c5ccf94", "DetectTime": "2023-10-30T14:08:45.792935+02:00", "EventTime": "2023-10-30T14:08:45.792951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cfwf7chPMKCXdxWZ6"]} -{"Format": "IDEA0", "ID": "a53c869b-4e91-4e98-bb75-902c8f4a1ca3", "DetectTime": "2023-10-30T14:08:45.820863+02:00", "EventTime": "2023-10-30T14:08:45.820881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C9D0Fr1Iog8YopvYg5"]} -{"Format": "IDEA0", "ID": "99d25964-fc5d-4f33-8ead-c6d03f85759d", "DetectTime": "2023-10-30T14:08:45.842068+02:00", "EventTime": "2023-10-30T14:08:45.842084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CQdDln2FmJK2C9AWHb"]} -{"Format": "IDEA0", "ID": "a37d659a-1a02-4f61-9b88-a078ed629ccf", "DetectTime": "2023-10-30T14:08:45.863550+02:00", "EventTime": "2023-10-30T14:08:45.863566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CuqiEI256pvpegpw91"]} -{"Format": "IDEA0", "ID": "c5e1ca6a-ed65-4c12-b7d3-2f9c976cf14d", "DetectTime": "2023-10-30T14:08:45.884716+02:00", "EventTime": "2023-10-30T14:08:45.884731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C1Wd714vPlgrYaxXg6"]} -{"Format": "IDEA0", "ID": "00ea026b-9349-46f9-bcca-1ec8c7a264ed", "DetectTime": "2023-10-30T14:08:45.912017+02:00", "EventTime": "2023-10-30T14:08:45.912036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CRhXAr4yMFPDPYEU7h"]} -{"Format": "IDEA0", "ID": "845f2c7d-fc5c-49c7-8a9e-7e653363a133", "DetectTime": "2023-10-30T14:08:45.936123+02:00", "EventTime": "2023-10-30T14:08:45.936139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["Cr4Tul3xLgVkOolOq1"]} -{"Format": "IDEA0", "ID": "236ac09b-67ec-42f4-8edc-371c876a0302", "DetectTime": "2023-10-30T14:08:45.960672+02:00", "EventTime": "2023-10-30T14:08:45.960693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.200.232.125 ", "ContentType": "text/plain"}], "uids": ["CFhAe52OxCXn7mWZ84"]} -{"Format": "IDEA0", "ID": "9450fe8f-205d-4cfe-905b-c8cf8d057a1b", "DetectTime": "2023-10-30T14:08:45.983459+02:00", "EventTime": "2023-10-30T14:08:45.983479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Ck5wAB4OrGnSmyFvQ6"]} -{"Format": "IDEA0", "ID": "71f90cd6-7ad2-4926-bb62-285f5aca7806", "DetectTime": "2023-10-30T14:08:46.005756+02:00", "EventTime": "2023-10-30T14:08:46.005768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C3NpbZ1G99HfU0HITj"]} -{"Format": "IDEA0", "ID": "a69f5266-2e0e-40d3-978d-19148710fc90", "DetectTime": "2023-10-30T14:08:46.028198+02:00", "EventTime": "2023-10-30T14:08:46.028210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["C0OszW1nD3QwYZ99s6"]} -{"Format": "IDEA0", "ID": "329711b4-d667-402c-9cdf-02e271615d00", "DetectTime": "2023-10-30T14:08:46.052480+02:00", "EventTime": "2023-10-30T14:08:46.052501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C2IuWg1LNFMb7fFlkj"]} -{"Format": "IDEA0", "ID": "a90a59e2-82b7-41cd-9176-5245835912cb", "DetectTime": "2023-10-30T14:08:46.082294+02:00", "EventTime": "2023-10-30T14:08:46.082306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CczV1x3M9rnQ70TZq2"]} -{"Format": "IDEA0", "ID": "4efc15d5-b5f5-4596-8b50-cc50345caf2a", "DetectTime": "2023-10-30T14:08:46.110710+02:00", "EventTime": "2023-10-30T14:08:46.110722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CEpQ4M3a5CgBM32hF5"]} -{"Format": "IDEA0", "ID": "a50aaa62-aa11-4303-b33b-048fdfc7c0df", "DetectTime": "2023-10-30T14:08:46.132670+02:00", "EventTime": "2023-10-30T14:08:46.132691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["COfC5t1MVvrLIkmTK4"]} -{"Format": "IDEA0", "ID": "f125f4b6-5cd2-4800-ab83-377d8176d9fa", "DetectTime": "2023-10-30T14:08:46.164694+02:00", "EventTime": "2023-10-30T14:08:46.164705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CujWhq4vXtiEfuhK5g"]} -{"Format": "IDEA0", "ID": "a3cfce1c-6357-4f16-9e03-fc1ba3eb02b2", "DetectTime": "2023-10-30T14:08:46.185668+02:00", "EventTime": "2023-10-30T14:08:46.185684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["C91dxz3TjJVD6bcM2a"]} -{"Format": "IDEA0", "ID": "1ce70f56-ff39-4c7c-9236-0263606b86ea", "DetectTime": "2023-10-30T14:08:46.208894+02:00", "EventTime": "2023-10-30T14:08:46.208911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cv7LbD13UQHnTutuel"]} -{"Format": "IDEA0", "ID": "0b6a7814-8620-4b6a-8199-fa7d3bf3dd34", "DetectTime": "2023-10-30T14:08:46.241807+02:00", "EventTime": "2023-10-30T14:08:46.241829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CedWlw4mPmDWC5SOk"]} -{"Format": "IDEA0", "ID": "51f2b30b-9f98-4af4-9942-7955443e0705", "DetectTime": "2023-10-30T14:08:46.269939+02:00", "EventTime": "2023-10-30T14:08:46.269951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CDN2ph2h4wtX3b8Gkl"]} -{"Format": "IDEA0", "ID": "e32ebf95-40be-489f-ba32-6269e1f5174a", "DetectTime": "2023-10-30T14:08:46.298293+02:00", "EventTime": "2023-10-30T14:08:46.298308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CP4iW04pqFfdO0Nx34"]} -{"Format": "IDEA0", "ID": "3319c763-ebfa-4e06-bb64-66ab698528ec", "DetectTime": "2023-10-30T14:08:46.321903+02:00", "EventTime": "2023-10-30T14:08:46.321915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C0whJy4BzNKTkEJm57"]} -{"Format": "IDEA0", "ID": "bd54976f-8e35-4ede-a690-2d169ee012c6", "DetectTime": "2023-10-30T14:08:46.347037+02:00", "EventTime": "2023-10-30T14:08:46.347055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CY7LPIdkausQPWrjd"]} -{"Format": "IDEA0", "ID": "3f9816ad-9f1b-4b1e-87ed-44b0eb9ee8ce", "DetectTime": "2023-10-30T14:08:46.370204+02:00", "EventTime": "2023-10-30T14:08:46.370221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CUF5KAz7wxcLpTnCf"]} -{"Format": "IDEA0", "ID": "6e603334-1c96-4dc8-b0f2-949e8e3a53a4", "DetectTime": "2023-10-30T14:08:46.390134+02:00", "EventTime": "2023-10-30T14:08:46.390154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cta5ZJ2T7PdLbAuIA5"]} -{"Format": "IDEA0", "ID": "c8ef20df-3763-4858-8527-28a647247bb5", "DetectTime": "2023-10-30T14:08:46.413375+02:00", "EventTime": "2023-10-30T14:08:46.413395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["C760TK34ucVSTgXcJ6"]} -{"Format": "IDEA0", "ID": "ce606ee8-2a56-4ef3-abd2-474c3820789a", "DetectTime": "2023-10-30T14:08:46.430832+02:00", "EventTime": "2023-10-30T14:08:46.430844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C56goKce6neqdOM36"]} -{"Format": "IDEA0", "ID": "0298f80f-92f2-447a-84da-c5fda7d855bc", "DetectTime": "2023-10-30T14:08:46.458544+02:00", "EventTime": "2023-10-30T14:08:46.458562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CAo9AWrtEdJihRU07"]} -{"Format": "IDEA0", "ID": "0e6d567d-9089-4740-b6ba-4530dbbc7454", "DetectTime": "2023-10-30T14:08:46.478053+02:00", "EventTime": "2023-10-30T14:08:46.478065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CNywOS2rxZaThOeFAf"]} -{"Format": "IDEA0", "ID": "9b3a5c5c-e63e-4660-b756-0501049131e7", "DetectTime": "2023-10-30T14:08:46.493373+02:00", "EventTime": "2023-10-30T14:08:46.493391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CDmf7823jejd5V0Zh7"]} -{"Format": "IDEA0", "ID": "5c1562f1-8009-4beb-9b99-42803a8a58f5", "DetectTime": "2023-10-30T14:08:46.522303+02:00", "EventTime": "2023-10-30T14:08:46.522320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CMVe3gjZbfhPCNEX3"]} -{"Format": "IDEA0", "ID": "b04e4662-60c1-49d3-ad0b-8a19836df8c8", "DetectTime": "2023-10-30T14:08:46.541905+02:00", "EventTime": "2023-10-30T14:08:46.541927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CberUR3j1oXsxWR7G7"]} -{"Format": "IDEA0", "ID": "e2e69134-b7bf-447a-aa70-ce9adc2ef710", "DetectTime": "2023-10-30T14:08:46.569267+02:00", "EventTime": "2023-10-30T14:08:46.569284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CFaanSK2sq83nu7Il"]} -{"Format": "IDEA0", "ID": "c4f748a0-6c8f-4f35-8eb2-4fda8ccc1993", "DetectTime": "2023-10-30T14:08:46.660749+02:00", "EventTime": "2023-10-30T14:08:46.660767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMficw2Yyiy82CDU86"]} -{"Format": "IDEA0", "ID": "14a0e8e7-3cbe-4e05-9d25-df6ef2e1845d", "DetectTime": "2023-10-30T14:08:46.685605+02:00", "EventTime": "2023-10-30T14:08:46.685626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CX4Ftz3kRll6b32tf4"]} -{"Format": "IDEA0", "ID": "fda78bce-2eec-43b8-86b2-fddcd707eff6", "DetectTime": "2023-10-30T14:08:46.709978+02:00", "EventTime": "2023-10-30T14:08:46.709993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CqtJ9Q2RqbEbwvr8i5"]} -{"Format": "IDEA0", "ID": "7f84a3ea-a6bc-431a-ab29-25a793a6ec58", "DetectTime": "2023-10-30T14:08:46.734079+02:00", "EventTime": "2023-10-30T14:08:46.734095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["COJ5ay2GAOU0ADMTfi"]} -{"Format": "IDEA0", "ID": "1fa596e2-2e98-4b50-b0e8-27083d11e993", "DetectTime": "2023-10-30T14:08:46.765242+02:00", "EventTime": "2023-10-30T14:08:46.765258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cg6QEU3WpyNMKVXzGh"]} -{"Format": "IDEA0", "ID": "fafee724-6651-476b-8fc8-1bbb22a02a50", "DetectTime": "2023-10-30T14:08:46.788298+02:00", "EventTime": "2023-10-30T14:08:46.788314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CJYWTj2Rt3Kzk3jGi3"]} -{"Format": "IDEA0", "ID": "3d8761ea-eabf-480b-88cb-6b2a95182e93", "DetectTime": "2023-10-30T14:08:46.809618+02:00", "EventTime": "2023-10-30T14:08:46.809635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CIzIhB2mKtD2bvuHZ3"]} -{"Format": "IDEA0", "ID": "6db7aa97-b90d-4a06-8de3-3f8251aa40a8", "DetectTime": "2023-10-30T14:08:46.830731+02:00", "EventTime": "2023-10-30T14:08:46.830749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CgB5bE2NJunhOTyRJf"]} -{"Format": "IDEA0", "ID": "9c953b0e-ac5e-4add-8270-4166e75c1fc7", "DetectTime": "2023-10-30T14:08:46.855948+02:00", "EventTime": "2023-10-30T14:08:46.855969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.184.175 ", "ContentType": "text/plain"}], "uids": ["Csm1Vp1a2jOfTKKgR1"]} -{"Format": "IDEA0", "ID": "6d7729b9-238f-4c7f-b1aa-0fcd42b34128", "DetectTime": "2023-10-30T14:08:46.879095+02:00", "EventTime": "2023-10-30T14:08:46.879116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS1601", "ContentType": "text/plain"}], "uids": ["CA1wPm2DdOqgjZjn8f"]} -{"Format": "IDEA0", "ID": "07174a27-8477-41bf-a06e-c87aa6a652a3", "DetectTime": "2023-10-30T14:08:46.904951+02:00", "EventTime": "2023-10-30T14:08:46.904973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C577Ki3RuldFHC4lyd"]} -{"Format": "IDEA0", "ID": "7cee57d1-542c-4ed9-9ac5-39048470ab4a", "DetectTime": "2023-10-30T14:08:46.935544+02:00", "EventTime": "2023-10-30T14:08:46.935556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CZpyTqsuzRGgLen6e"]} -{"Format": "IDEA0", "ID": "aaf7e58a-35fd-4569-afe8-215231e305b0", "DetectTime": "2023-10-30T14:08:46.955398+02:00", "EventTime": "2023-10-30T14:08:46.955410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.67.124.167 ", "ContentType": "text/plain"}], "uids": ["CHYMpP33khrnegLCeg"]} -{"Format": "IDEA0", "ID": "993489cc-ea4a-4761-b19b-5e92080508bf", "DetectTime": "2023-10-30T14:08:46.978881+02:00", "EventTime": "2023-10-30T14:08:46.978895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CbRr1L1DXjBAMCQt2"]} -{"Format": "IDEA0", "ID": "a74af4df-0a46-408a-8fd5-7bedc7843aa5", "DetectTime": "2023-10-30T14:08:47.008646+02:00", "EventTime": "2023-10-30T14:08:47.008662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CDwTHJ2J3WPzl6HSIk"]} -{"Format": "IDEA0", "ID": "1996c747-482f-4ccc-8505-400a63199142", "DetectTime": "2023-10-30T14:08:47.032262+02:00", "EventTime": "2023-10-30T14:08:47.032279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CXjKdg2vwOjJz0FL09"]} -{"Format": "IDEA0", "ID": "6ef24c06-a087-461b-baa9-6a8b6d6c943d", "DetectTime": "2023-10-30T14:08:47.065792+02:00", "EventTime": "2023-10-30T14:08:47.065814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.143.18 ", "ContentType": "text/plain"}], "uids": ["CP6Xog3Zs9crVigLyb"]} -{"Format": "IDEA0", "ID": "b913d017-8bc0-43c2-b4b3-c56e2757e3ef", "DetectTime": "2023-10-30T14:08:47.089450+02:00", "EventTime": "2023-10-30T14:08:47.089469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVTcwN30XFV7dI3H2j"]} -{"Format": "IDEA0", "ID": "adb8e5d6-5197-4515-8a3b-cefa43c8cdde", "DetectTime": "2023-10-30T14:08:47.114975+02:00", "EventTime": "2023-10-30T14:08:47.114994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CIAo8eTMUkKrWFc41"]} -{"Format": "IDEA0", "ID": "7bd5de0b-3583-4ac6-a6b4-f4d793f3b2c0", "DetectTime": "2023-10-30T14:08:47.147740+02:00", "EventTime": "2023-10-30T14:08:47.147760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CGD9CN72tcnJ0TUHi"]} -{"Format": "IDEA0", "ID": "3fba2549-c30c-4193-8587-d9da0e2c6aba", "DetectTime": "2023-10-30T14:08:47.180780+02:00", "EventTime": "2023-10-30T14:08:47.180800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C7nQjX38fC5k60peIh"]} -{"Format": "IDEA0", "ID": "8cae8378-057a-4112-9389-f5bd3c10a4eb", "DetectTime": "2023-10-30T14:08:47.210743+02:00", "EventTime": "2023-10-30T14:08:47.210760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CdGwsh1N8zAAnFoOld"]} -{"Format": "IDEA0", "ID": "35ba5a41-1750-49ad-9f45-3500958a651f", "DetectTime": "2023-10-30T14:08:47.242211+02:00", "EventTime": "2023-10-30T14:08:47.242227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CRUdBaknNqGaUzRB8"]} -{"Format": "IDEA0", "ID": "2b9ebf22-14e3-4b13-9fc6-dd6bfdd042d4", "DetectTime": "2023-10-30T14:08:47.274679+02:00", "EventTime": "2023-10-30T14:08:47.274695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CYTcCW3tZ0uHh7UlU4"]} -{"Format": "IDEA0", "ID": "f496240a-ab4a-48f1-a6ee-b9a73659d9e3", "DetectTime": "2023-10-30T14:08:47.308843+02:00", "EventTime": "2023-10-30T14:08:47.308864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CgYGG8Xcjq85sMNPg"]} -{"Format": "IDEA0", "ID": "99c4bd73-9907-41b7-b754-17e2e28aa842", "DetectTime": "2023-10-30T14:08:47.336946+02:00", "EventTime": "2023-10-30T14:08:47.336957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Ci5T3G3gOuYZ6Gsfo9"]} -{"Format": "Json", "ID": "99c4bd73-9907-41b7-b754-17e2e28aa842", "DetectTime": "2023-10-30T14:08:47.336946+02:00", "EventTime": "2023-10-30T14:08:47.336957+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T01:48:41.743670+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:47.398574)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "25554dc1-4435-476f-a444-0d3f0291bf1b", "DetectTime": "2023-10-30T14:08:47.404223+02:00", "EventTime": "2023-10-30T14:08:47.404239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ciw2Fo2hjPCMRZziM3"]} -{"Format": "IDEA0", "ID": "a1541d0d-1d27-4e92-a2ee-a72b769026b8", "DetectTime": "2023-10-30T14:08:47.436151+02:00", "EventTime": "2023-10-30T14:08:47.436165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CaRpbNpxZObhVv0B"]} -{"Format": "IDEA0", "ID": "4d238dc0-846a-4e4e-8dde-b964bd6bd93c", "DetectTime": "2023-10-30T14:08:47.458861+02:00", "EventTime": "2023-10-30T14:08:47.458873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CiZIxC3CiwaIGPjrQ"]} -{"Format": "IDEA0", "ID": "5f760c2a-02be-4cab-aefd-f02fcb55e4aa", "DetectTime": "2023-10-30T14:08:47.482833+02:00", "EventTime": "2023-10-30T14:08:47.482850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CGnkgm2Jz4CjlQqTkk"]} -{"Format": "IDEA0", "ID": "83b000c8-0f1c-4579-bb7c-86d85769e144", "DetectTime": "2023-10-30T14:08:47.506641+02:00", "EventTime": "2023-10-30T14:08:47.506653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["ChPoJv4BXrRxQNeSv2"]} -{"Format": "IDEA0", "ID": "b9487316-3681-4e45-81e2-ab4333e1117e", "DetectTime": "2023-10-30T14:08:47.537483+02:00", "EventTime": "2023-10-30T14:08:47.537499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cl2t4C368oYKOvryl8"]} -{"Format": "IDEA0", "ID": "5c63f044-f404-44a3-9d9b-bfa5d1ff38e0", "DetectTime": "2023-10-30T14:08:47.565125+02:00", "EventTime": "2023-10-30T14:08:47.565136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CEfeXcNj2suE1cSI8"]} -{"Format": "IDEA0", "ID": "81926b11-6a47-437b-86c2-abebba2be5ea", "DetectTime": "2023-10-30T14:08:47.591793+02:00", "EventTime": "2023-10-30T14:08:47.591812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CTMrDK3R4tGKLhAl8h"]} -{"Format": "IDEA0", "ID": "6734fdf9-e6ba-4e2e-a9ce-c62a4e697e49", "DetectTime": "2023-10-30T14:08:47.617734+02:00", "EventTime": "2023-10-30T14:08:47.617746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["C0Z90R23ka0RMSgAa2"]} -{"Format": "Json", "ID": "6734fdf9-e6ba-4e2e-a9ce-c62a4e697e49", "DetectTime": "2023-10-30T14:08:47.617734+02:00", "EventTime": "2023-10-30T14:08:47.617746+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T01:49:01.204101+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:47.680012)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1a72eb07-de9f-4338-b322-acff4b3dddc4", "DetectTime": "2023-10-30T14:08:47.684479+02:00", "EventTime": "2023-10-30T14:08:47.684490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CzGTcB205w0MdyC1j2"]} -{"Format": "IDEA0", "ID": "8cf56d1e-ccd7-4bcc-bd63-03ed4d691a00", "DetectTime": "2023-10-30T14:08:47.711578+02:00", "EventTime": "2023-10-30T14:08:47.711601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C1mvYZt7jxM73RIQg"]} -{"Format": "IDEA0", "ID": "c5c6c5ba-6443-4bfb-983c-8a8d7941533a", "DetectTime": "2023-10-30T14:08:47.741199+02:00", "EventTime": "2023-10-30T14:08:47.741217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CI9TBKInxcIS8Npt3"]} -{"Format": "IDEA0", "ID": "e96683b3-107e-4e07-814a-fde36271cc29", "DetectTime": "2023-10-30T14:08:47.769809+02:00", "EventTime": "2023-10-30T14:08:47.769827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CX81F01Di0VJ6G8rb1"]} -{"Format": "IDEA0", "ID": "b1b0130a-4acb-4027-a9f3-a1cc6b3b00cc", "DetectTime": "2023-10-30T14:08:47.798046+02:00", "EventTime": "2023-10-30T14:08:47.798063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Ci8bLb1eZXEfcpQ9Wd"]} -{"Format": "IDEA0", "ID": "2ae6c1ef-7a52-4f42-a003-9d0a3692ca87", "DetectTime": "2023-10-30T14:08:47.821996+02:00", "EventTime": "2023-10-30T14:08:47.822013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cj8PyB4fm259roUA53"]} -{"Format": "IDEA0", "ID": "dd9e321d-a9db-46ad-826d-ef73b407ee16", "DetectTime": "2023-10-30T14:08:47.844551+02:00", "EventTime": "2023-10-30T14:08:47.844572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3015], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. ", "ContentType": "text/plain"}], "uids": ["CWrgN5sRY5PykyV3g"]} -{"Format": "IDEA0", "ID": "8aeb380e-14c7-4f04-9a2b-2e85c2ca358c", "DetectTime": "2023-10-30T14:08:47.868613+02:00", "EventTime": "2023-10-30T14:08:47.868634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CR4nvY1ooTiROs22wh"]} -{"Format": "Json", "ID": "8aeb380e-14c7-4f04-9a2b-2e85c2ca358c", "DetectTime": "2023-10-30T14:08:47.868613+02:00", "EventTime": "2023-10-30T14:08:47.868634+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T01:49:03.097892+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2023/10/30 14:08:47.931454)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e167722-312e-4a1f-bf39-aa9704049cb9", "DetectTime": "2023-10-30T14:08:47.936994+02:00", "EventTime": "2023-10-30T14:08:47.937010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CJgiFc2n2eAh22mjdc"]} -{"Format": "IDEA0", "ID": "8e2d654f-af1e-4c1d-9018-7210950e32a3", "DetectTime": "2023-10-30T14:08:47.962482+02:00", "EventTime": "2023-10-30T14:08:47.962500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CGO4oi3HNMfJb9vu99"]} -{"Format": "IDEA0", "ID": "e5a22165-4180-430e-915b-b72a0ede8744", "DetectTime": "2023-10-30T14:08:47.981143+02:00", "EventTime": "2023-10-30T14:08:47.981158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRBrgJFBvLaHVYP6l"]} -{"Format": "IDEA0", "ID": "0434fb8e-9239-4f1c-a19e-f96822b54b18", "DetectTime": "2023-10-30T14:08:48.002912+02:00", "EventTime": "2023-10-30T14:08:48.002931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CDa4it3Xwdu64CPlEl"]} -{"Format": "IDEA0", "ID": "1b7b5041-7df8-4767-bbfc-34306000d78a", "DetectTime": "2023-10-30T14:08:48.041881+02:00", "EventTime": "2023-10-30T14:08:48.041902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4bUsv4Tp0T71vbuHc"]} -{"Format": "IDEA0", "ID": "172be25b-6598-40e6-9629-c4e81b0067ed", "DetectTime": "2023-10-30T14:08:48.080054+02:00", "EventTime": "2023-10-30T14:08:48.080065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CwI7COvSTwJA6yzSj"]} -{"Format": "IDEA0", "ID": "12b2f18f-78bf-489f-8d27-97fd6268954a", "DetectTime": "2023-10-30T14:08:48.108854+02:00", "EventTime": "2023-10-30T14:08:48.108870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["C2ezhz37OfcTMClkve"]} -{"Format": "IDEA0", "ID": "c136ef63-47f2-4cb6-aa30-e51d5f7703cc", "DetectTime": "2023-10-30T14:08:48.140366+02:00", "EventTime": "2023-10-30T14:08:48.140377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CgW7szoFio3LexCL3"]} -{"Format": "IDEA0", "ID": "916fd055-4f4c-4a81-b265-66af7e3a482b", "DetectTime": "2023-10-30T14:08:48.169856+02:00", "EventTime": "2023-10-30T14:08:48.169872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CV4DrK3Go3YPDNYiN7"]} -{"Format": "IDEA0", "ID": "eeeea4d5-23fd-4a72-b1c1-75b6227e60a5", "DetectTime": "2023-10-30T14:08:48.203507+02:00", "EventTime": "2023-10-30T14:08:48.203519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CH6XJt1Lo0lOa1eVn7"]} -{"Format": "Json", "ID": "eeeea4d5-23fd-4a72-b1c1-75b6227e60a5", "DetectTime": "2023-10-30T14:08:48.203507+02:00", "EventTime": "2023-10-30T14:08:48.203519+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:20:23.895750+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:48.284439)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3c8c97c0-ecc0-4753-899f-03104a739679", "DetectTime": "2023-10-30T14:08:48.288389+02:00", "EventTime": "2023-10-30T14:08:48.288400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cdl87qlOQjGJwBTNf"]} -{"Format": "IDEA0", "ID": "dbcc45ae-d201-42ee-94d2-188f5ad510de", "DetectTime": "2023-10-30T14:08:48.321925+02:00", "EventTime": "2023-10-30T14:08:48.321942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CVwS602IOitj3o9c89"]} -{"Format": "IDEA0", "ID": "7e0cf55c-cae8-4144-a3d1-c163b957b5d5", "DetectTime": "2023-10-30T14:08:48.457942+02:00", "EventTime": "2023-10-30T14:08:48.457955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C6aZDzIdxOuXKks8h"]} -{"Format": "IDEA0", "ID": "92249223-c141-4f19-b7f0-919d76f71521", "DetectTime": "2023-10-30T14:08:48.491589+02:00", "EventTime": "2023-10-30T14:08:48.491610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CAhVxOOAXxHwTaB27"]} -{"Format": "IDEA0", "ID": "c084047f-6236-4f45-856a-573d13556893", "DetectTime": "2023-10-30T14:08:48.519757+02:00", "EventTime": "2023-10-30T14:08:48.519768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRfb7W3nMm6XPPIa38"]} -{"Format": "IDEA0", "ID": "dc925030-c164-428f-bd64-f349ea87bf2e", "DetectTime": "2023-10-30T14:08:48.550042+02:00", "EventTime": "2023-10-30T14:08:48.550053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CxPSE317E9BCz9iEY4"]} -{"Format": "IDEA0", "ID": "a9f0202f-b85f-46cc-9039-7c58d5d3972f", "DetectTime": "2023-10-30T14:08:48.578377+02:00", "EventTime": "2023-10-30T14:08:48.578393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CrswSV1M4b6VPVzur6"]} -{"Format": "IDEA0", "ID": "b0e37e45-d0bf-4544-a867-606c7f19a460", "DetectTime": "2023-10-30T14:08:48.611838+02:00", "EventTime": "2023-10-30T14:08:48.611857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Co5pk8AIA0ra3FMi1"]} -{"Format": "Json", "ID": "b0e37e45-d0bf-4544-a867-606c7f19a460", "DetectTime": "2023-10-30T14:08:48.611838+02:00", "EventTime": "2023-10-30T14:08:48.611857+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:20:25.787207+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:48.678507)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "665f47c0-f444-4225-9823-225a0cff9004", "DetectTime": "2023-10-30T14:08:48.684238+02:00", "EventTime": "2023-10-30T14:08:48.684254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CV8ovq28EziyghXgH7"]} -{"Format": "IDEA0", "ID": "03463f97-e96b-499c-8a1e-ef4c228e6b4a", "DetectTime": "2023-10-30T14:08:48.721723+02:00", "EventTime": "2023-10-30T14:08:48.721739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Cogxc13H8iaZUg4OC5"]} -{"Format": "IDEA0", "ID": "96e20136-a266-44da-9963-a93317be80c8", "DetectTime": "2023-10-30T14:08:48.759703+02:00", "EventTime": "2023-10-30T14:08:48.759721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CVShxe2v72kgQ2ykb1"]} -{"Format": "IDEA0", "ID": "e98cf6a7-fdb4-48a0-adc2-c5e7bc96917e", "DetectTime": "2023-10-30T14:08:48.791979+02:00", "EventTime": "2023-10-30T14:08:48.791999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CFEwbu35Q9IND3YPOd"]} -{"Format": "IDEA0", "ID": "592a19b7-6d29-495e-9a1c-d18f7897b0e7", "DetectTime": "2023-10-30T14:08:48.824567+02:00", "EventTime": "2023-10-30T14:08:48.824583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CeWytTo8QDFehIEw8"]} -{"Format": "IDEA0", "ID": "cdcaa597-fbcd-4e01-b82e-3becb758a11b", "DetectTime": "2023-10-30T14:08:48.862084+02:00", "EventTime": "2023-10-30T14:08:48.862102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CDhkSI1bjUv0bbgVbf"]} -{"Format": "IDEA0", "ID": "bb672201-8eb1-4fe5-babd-1fb1cc3627c2", "DetectTime": "2023-10-30T14:08:48.894934+02:00", "EventTime": "2023-10-30T14:08:48.894952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CjdUUE1mwotPZDwhq1"]} -{"Format": "IDEA0", "ID": "e981806e-0bc7-437e-a72d-617b186e3aab", "DetectTime": "2023-10-30T14:08:48.936747+02:00", "EventTime": "2023-10-30T14:08:48.936762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cf6Xlv2LXT5Ztsdbok"]} -{"Format": "Json", "ID": "e981806e-0bc7-437e-a72d-617b186e3aab", "DetectTime": "2023-10-30T14:08:48.936747+02:00", "EventTime": "2023-10-30T14:08:48.936762+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:20:28.632108+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:49.017740)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "32cbd7f8-556b-4fa1-be5e-5774f9984cf3", "DetectTime": "2023-10-30T14:08:49.022972+02:00", "EventTime": "2023-10-30T14:08:49.022999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CsxsxG2U88BckrHP52"]} -{"Format": "IDEA0", "ID": "f3bff5a9-64e5-45f8-a62e-4cfb4b65bfad", "DetectTime": "2023-10-30T14:08:49.062070+02:00", "EventTime": "2023-10-30T14:08:49.062087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cx0vkP2awoM0gZppAk"]} -{"Format": "IDEA0", "ID": "fef8a0b6-00a9-4687-a59e-a06f8aecb64b", "DetectTime": "2023-10-30T14:08:49.100839+02:00", "EventTime": "2023-10-30T14:08:49.100857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CeJBZRwMG8TGpBsX"]} -{"Format": "IDEA0", "ID": "53b06ef9-77c0-4054-9a69-320f879d4d6c", "DetectTime": "2023-10-30T14:08:49.147794+02:00", "EventTime": "2023-10-30T14:08:49.147814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["Ci1CAr3g4DY6zm8By5"]} -{"Format": "IDEA0", "ID": "5f7be4dd-9dc0-44d5-b0f6-f50207b9c5a4", "DetectTime": "2023-10-30T14:08:49.188588+02:00", "EventTime": "2023-10-30T14:08:49.188610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CXdvm54oB73IqfLiFc"]} -{"Format": "IDEA0", "ID": "a0a67926-b409-435a-8eb4-23783c2528fa", "DetectTime": "2023-10-30T14:08:49.223976+02:00", "EventTime": "2023-10-30T14:08:49.223989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CalGHe2SGPn6oMIvib"]} -{"Format": "IDEA0", "ID": "94525704-9cbb-4802-945d-101bd2732096", "DetectTime": "2023-10-30T14:08:49.255154+02:00", "EventTime": "2023-10-30T14:08:49.255170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGwYcKfYwqYuOD2Gg"]} -{"Format": "IDEA0", "ID": "7426fb72-d18a-44dc-b84f-b14b5e156659", "DetectTime": "2023-10-30T14:08:49.288784+02:00", "EventTime": "2023-10-30T14:08:49.288804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["ClRwgY3EblNMhVf4n7"]} -{"Format": "Json", "ID": "7426fb72-d18a-44dc-b84f-b14b5e156659", "DetectTime": "2023-10-30T14:08:49.288784+02:00", "EventTime": "2023-10-30T14:08:49.288804+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:51:27.851842+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:49.354732)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d71b85be-1cc7-41f0-b23f-6f8eb385d4fa", "DetectTime": "2023-10-30T14:08:49.358882+02:00", "EventTime": "2023-10-30T14:08:49.358895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CrdNQw4v7dapEH977b"]} -{"Format": "IDEA0", "ID": "d4f11349-8f7e-4bd2-a29d-6ccd28dac564", "DetectTime": "2023-10-30T14:08:49.387158+02:00", "EventTime": "2023-10-30T14:08:49.387176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CUoATw1jJLUDiXU1nf"]} -{"Format": "IDEA0", "ID": "d0bf2bc5-cc10-4909-a1f8-2d72bad120c5", "DetectTime": "2023-10-30T14:08:49.416212+02:00", "EventTime": "2023-10-30T14:08:49.416233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C38kZ137JDfghU89Y"]} -{"Format": "IDEA0", "ID": "be573d72-4c18-4cfe-a4e6-ed44beb42a2d", "DetectTime": "2023-10-30T14:08:49.447312+02:00", "EventTime": "2023-10-30T14:08:49.447328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ckok9D1iDdJZlZUEJ9"]} -{"Format": "IDEA0", "ID": "22e0a254-06f5-4288-b1ba-ba85fd1eb95d", "DetectTime": "2023-10-30T14:08:49.475492+02:00", "EventTime": "2023-10-30T14:08:49.475507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CrCAHn19IdlUMkbhh1"]} -{"Format": "IDEA0", "ID": "4b260d8c-2814-4d71-8ce5-fd316c6ddf89", "DetectTime": "2023-10-30T14:08:49.497489+02:00", "EventTime": "2023-10-30T14:08:49.497505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CHZw2v1jEwwrTHduQ"]} -{"Format": "IDEA0", "ID": "594c1941-57b7-45b8-9a2b-6fcf0d1b2b7d", "DetectTime": "2023-10-30T14:08:49.525184+02:00", "EventTime": "2023-10-30T14:08:49.525200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CmfgrO1qZTzzMMKzvf"]} -{"Format": "IDEA0", "ID": "038ddf28-762e-48c1-9a83-ea960bbcfd41", "DetectTime": "2023-10-30T14:08:49.550214+02:00", "EventTime": "2023-10-30T14:08:49.550230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CUXNbvmKAxuZprdY3"]} -{"Format": "IDEA0", "ID": "5b06813a-368a-4007-b9dd-0a517a26dfbd", "DetectTime": "2023-10-30T14:08:49.573505+02:00", "EventTime": "2023-10-30T14:08:49.573521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CNaPMl2rpq0O4xaBU9"]} -{"Format": "Json", "ID": "5b06813a-368a-4007-b9dd-0a517a26dfbd", "DetectTime": "2023-10-30T14:08:49.573505+02:00", "EventTime": "2023-10-30T14:08:49.573521+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:51:46.670457+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:49.646216)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0f99e40a-458e-42a2-80d2-ceb113efdb44", "DetectTime": "2023-10-30T14:08:49.651452+02:00", "EventTime": "2023-10-30T14:08:49.651479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [26750], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. ", "ContentType": "text/plain"}], "uids": ["CuIzmY3owsEQuItE5b"]} -{"Format": "IDEA0", "ID": "c0187018-7904-4d1c-8048-3b53dd3b6643", "DetectTime": "2023-10-30T14:08:49.679234+02:00", "EventTime": "2023-10-30T14:08:49.679255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CSGoy82qXWPGNzwhmj"]} -{"Format": "IDEA0", "ID": "b0fd33b9-ca6c-452c-ad3b-6c42c45ed94a", "DetectTime": "2023-10-30T14:08:49.704785+02:00", "EventTime": "2023-10-30T14:08:49.704805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C5ORhb4N7VJx3w0Q27"]} -{"Format": "IDEA0", "ID": "6a6ea810-55f6-44ee-ba93-f36a27412a61", "DetectTime": "2023-10-30T14:08:49.725824+02:00", "EventTime": "2023-10-30T14:08:49.725840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CkcXUr2kYvoELHNf6a"]} -{"Format": "IDEA0", "ID": "b592cebc-890b-4bc3-aefa-27bde447fa17", "DetectTime": "2023-10-30T14:08:49.746768+02:00", "EventTime": "2023-10-30T14:08:49.746837+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CikjHC3qgK39AZl3li"]} -{"Format": "IDEA0", "ID": "35a3010f-57ca-4147-b128-50dec5f4f27d", "DetectTime": "2023-10-30T14:08:49.774288+02:00", "EventTime": "2023-10-30T14:08:49.774300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C5dsHi41UG0GU0nF2e"]} -{"Format": "IDEA0", "ID": "c5ddea7a-92cc-435e-85bd-43758f88ddea", "DetectTime": "2023-10-30T14:08:49.801078+02:00", "EventTime": "2023-10-30T14:08:49.801094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CSl6qv3oIlBSF8j2Mf"]} -{"Format": "IDEA0", "ID": "b00bfc8e-2b1f-4365-a10c-ac9e6a3e5cb9", "DetectTime": "2023-10-30T14:08:49.826915+02:00", "EventTime": "2023-10-30T14:08:49.826938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cw3g0LuWRKOh2aRc6"]} -{"Format": "IDEA0", "ID": "3d29dce0-ead5-4b3e-b407-8937e29bc4c0", "DetectTime": "2023-10-30T14:08:49.854363+02:00", "EventTime": "2023-10-30T14:08:49.854381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CKT1t34yGqCgYCtsh8"]} -{"Format": "Json", "ID": "3d29dce0-ead5-4b3e-b407-8937e29bc4c0", "DetectTime": "2023-10-30T14:08:49.854363+02:00", "EventTime": "2023-10-30T14:08:49.854381+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:51:48.668963+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:49.911135)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54ee3764-b129-433b-8b2f-7b652caa3e7b", "DetectTime": "2023-10-30T14:08:49.916912+02:00", "EventTime": "2023-10-30T14:08:49.916928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CSCPCV3jONOZj5MwN2"]} -{"Format": "IDEA0", "ID": "a652067f-f154-4896-98eb-f1f099ec1f75", "DetectTime": "2023-10-30T14:08:49.942114+02:00", "EventTime": "2023-10-30T14:08:49.942130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CKt1nEgDYgMdBNzy"]} -{"Format": "IDEA0", "ID": "8ca87bb7-46c5-4c8a-80de-18b11f4ec1e1", "DetectTime": "2023-10-30T14:08:49.965174+02:00", "EventTime": "2023-10-30T14:08:49.965195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CSiva12w8T7Sm4o1Lg"]} -{"Format": "IDEA0", "ID": "bdff8e50-c007-4dac-bba8-8a8cc771be21", "DetectTime": "2023-10-30T14:08:49.983091+02:00", "EventTime": "2023-10-30T14:08:49.983103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CQHgLW3xZ2eP6krcHa"]} -{"Format": "IDEA0", "ID": "7983ead6-69df-4ff0-9c26-0e1742355492", "DetectTime": "2023-10-30T14:08:50.006553+02:00", "EventTime": "2023-10-30T14:08:50.006571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CTduHYzrEODaApefb"]} -{"Format": "IDEA0", "ID": "c97327e8-fcbf-4fe4-a0d7-ee8ec83c185a", "DetectTime": "2023-10-30T14:08:50.029411+02:00", "EventTime": "2023-10-30T14:08:50.029427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CE54x61I6JQr43iHVa"]} -{"Format": "IDEA0", "ID": "cb01a672-f165-45e1-ba21-109317883f0d", "DetectTime": "2023-10-30T14:08:50.051872+02:00", "EventTime": "2023-10-30T14:08:50.051888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CFEasa2JPRaIfgHVn2"]} -{"Format": "IDEA0", "ID": "af83fc6e-4492-4991-b0e4-2aa19ce4b399", "DetectTime": "2023-10-30T14:08:50.074230+02:00", "EventTime": "2023-10-30T14:08:50.074246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CjOjTG26hpKRutQdK2"]} -{"Format": "Json", "ID": "af83fc6e-4492-4991-b0e4-2aa19ce4b399", "DetectTime": "2023-10-30T14:08:50.074230+02:00", "EventTime": "2023-10-30T14:08:50.074246+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T02:52:13.217657+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2023/10/30 14:08:50.136341)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f5063a73-ba1a-4e07-b2c9-6135ad9b3573", "DetectTime": "2023-10-30T14:08:50.142155+02:00", "EventTime": "2023-10-30T14:08:50.142176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CzCjv6j5r9ZJD9cQj"]} -{"Format": "IDEA0", "ID": "945a4ac7-9af2-4580-a790-a7b61396e118", "DetectTime": "2023-10-30T14:08:50.161369+02:00", "EventTime": "2023-10-30T14:08:50.161385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CJnPhu6CdnQtZrfie"]} -{"Format": "IDEA0", "ID": "47be3ce4-ba19-4a65-9d2e-8cfce8f29a5f", "DetectTime": "2023-10-30T14:08:50.193799+02:00", "EventTime": "2023-10-30T14:08:50.193814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CAPiIhAOpp9OOVqz3"]} -{"Format": "IDEA0", "ID": "c0abf2db-8539-45ce-8a4b-e6463374d098", "DetectTime": "2023-10-30T14:08:50.229362+02:00", "EventTime": "2023-10-30T14:08:50.229383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CufBY53SToIDlMS5Qh"]} -{"Format": "IDEA0", "ID": "6b203397-cd23-4268-af8f-6d78d7386925", "DetectTime": "2023-10-30T14:08:50.260358+02:00", "EventTime": "2023-10-30T14:08:50.260381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CiMvpfZlfQoCmjR01"]} -{"Format": "IDEA0", "ID": "bb1982a3-e384-4c47-a77f-98d78c4ffcac", "DetectTime": "2023-10-30T14:08:50.287249+02:00", "EventTime": "2023-10-30T14:08:50.287261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CD1woK3hzdbMsPMJE8"]} -{"Format": "IDEA0", "ID": "8add33d9-0875-478c-82e9-e17e32c89611", "DetectTime": "2023-10-30T14:08:50.317450+02:00", "EventTime": "2023-10-30T14:08:50.317463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbihzVIvbhF6Kur52"]} -{"Format": "IDEA0", "ID": "512e9233-9401-4d97-a108-67f9c3b70955", "DetectTime": "2023-10-30T14:08:50.344326+02:00", "EventTime": "2023-10-30T14:08:50.344340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CWkmf21gfCP2EdDeq7"]} -{"Format": "Json", "ID": "512e9233-9401-4d97-a108-67f9c3b70955", "DetectTime": "2023-10-30T14:08:50.344326+02:00", "EventTime": "2023-10-30T14:08:50.344340+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:22:10.441894+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:50.423869)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "70ff729a-727a-4290-ba48-e582f1c7795c", "DetectTime": "2023-10-30T14:08:50.429060+02:00", "EventTime": "2023-10-30T14:08:50.429070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CYoL765YimHfMIre2"]} -{"Format": "IDEA0", "ID": "458cdaa1-3d3b-4628-b4fc-55c4fd929857", "DetectTime": "2023-10-30T14:08:50.503202+02:00", "EventTime": "2023-10-30T14:08:50.503223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CcTBDm14JUtku6p6id"]} -{"Format": "IDEA0", "ID": "7693d612-aa7f-41d8-b1b4-4f3fadaa3a30", "DetectTime": "2023-10-30T14:08:50.538964+02:00", "EventTime": "2023-10-30T14:08:50.538979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLrybB27Xd051ji4s"]} -{"Format": "IDEA0", "ID": "5d567d23-1807-498e-8768-f6a1c4afeac1", "DetectTime": "2023-10-30T14:08:50.570869+02:00", "EventTime": "2023-10-30T14:08:50.570886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmJNrUBVjXSmID54h"]} -{"Format": "IDEA0", "ID": "685172ac-d1cd-4a8e-a67a-5539339dc4ed", "DetectTime": "2023-10-30T14:08:50.601504+02:00", "EventTime": "2023-10-30T14:08:50.601524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CJCCpt2cE9skyS3EX1"]} -{"Format": "IDEA0", "ID": "766f3c46-d7ff-4ead-a125-91e77023cdb2", "DetectTime": "2023-10-30T14:08:50.636778+02:00", "EventTime": "2023-10-30T14:08:50.636800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CZCKOm33jTWv7YXjeb"]} -{"Format": "IDEA0", "ID": "bde0e968-a907-4cd4-a483-65c2c6b7437d", "DetectTime": "2023-10-30T14:08:50.669670+02:00", "EventTime": "2023-10-30T14:08:50.669682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cga46BntlSVXGVJsd"]} -{"Format": "IDEA0", "ID": "96e900af-0176-48f3-8a73-5f1b2ad592cc", "DetectTime": "2023-10-30T14:08:50.698037+02:00", "EventTime": "2023-10-30T14:08:50.698060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CxH1Sl1bB2nB9OT9If"]} -{"Format": "Json", "ID": "96e900af-0176-48f3-8a73-5f1b2ad592cc", "DetectTime": "2023-10-30T14:08:50.698037+02:00", "EventTime": "2023-10-30T14:08:50.698060+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:22:30.938874+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:50.764223)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c44c5930-8791-45c5-9327-ead7b013f280", "DetectTime": "2023-10-30T14:08:50.768170+02:00", "EventTime": "2023-10-30T14:08:50.768181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CLUBIc3HpRp0uHDtDa"]} -{"Format": "IDEA0", "ID": "9e5e5ef4-2ff9-45a7-bfaf-874c8941354d", "DetectTime": "2023-10-30T14:08:50.800329+02:00", "EventTime": "2023-10-30T14:08:50.800341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cp3bAk2bBfDbl00BG1"]} -{"Format": "IDEA0", "ID": "a1a19147-b4e8-4dc2-a037-344a7ee6a67e", "DetectTime": "2023-10-30T14:08:50.829730+02:00", "EventTime": "2023-10-30T14:08:50.829753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CIpMmo2qbPdklbpaS"]} -{"Format": "IDEA0", "ID": "760ae0d6-139c-419b-9f34-4090501262f4", "DetectTime": "2023-10-30T14:08:50.853649+02:00", "EventTime": "2023-10-30T14:08:50.853666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CWYVX7qsxU5UGeeVe"]} -{"Format": "IDEA0", "ID": "0329ca98-9acf-4e02-8fa6-442bb4881ffc", "DetectTime": "2023-10-30T14:08:50.884151+02:00", "EventTime": "2023-10-30T14:08:50.884169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CNeZcE4ZuOly4fODwf"]} -{"Format": "IDEA0", "ID": "0bc24863-5bea-42e5-9dc3-d7468aeadb89", "DetectTime": "2023-10-30T14:08:50.914029+02:00", "EventTime": "2023-10-30T14:08:50.914051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CjnHOtPVNJXW8s3Ec"]} -{"Format": "IDEA0", "ID": "063dea33-41ce-437d-823d-956fa6d82c72", "DetectTime": "2023-10-30T14:08:50.944706+02:00", "EventTime": "2023-10-30T14:08:50.944726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CKEtAv4lrKqWV6Xlzj"]} -{"Format": "IDEA0", "ID": "45a56167-adcf-43ba-b4b4-c2925879e249", "DetectTime": "2023-10-30T14:08:51.036830+02:00", "EventTime": "2023-10-30T14:08:51.036843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CsKAax48PjecPx92qk"]} -{"Format": "Json", "ID": "45a56167-adcf-43ba-b4b4-c2925879e249", "DetectTime": "2023-10-30T14:08:51.036830+02:00", "EventTime": "2023-10-30T14:08:51.036843+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:22:33.395827+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:51.107533)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6d629337-3c85-422d-84d3-866c8796172c", "DetectTime": "2023-10-30T14:08:51.113551+02:00", "EventTime": "2023-10-30T14:08:51.113562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CH35riW2vo4bPg9c1"]} -{"Format": "IDEA0", "ID": "079910c2-bfbe-48e6-982e-8074d06d309b", "DetectTime": "2023-10-30T14:08:51.142927+02:00", "EventTime": "2023-10-30T14:08:51.142956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CLRY3847vRbk5uMZi3"]} -{"Format": "IDEA0", "ID": "c92f61fb-8fb1-4583-943d-90bc5d2841e9", "DetectTime": "2023-10-30T14:08:51.169923+02:00", "EventTime": "2023-10-30T14:08:51.169938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C77sUo1KgXxZhO3Oyb"]} -{"Format": "IDEA0", "ID": "a98b93f0-288f-4f1c-94a7-8a6039579368", "DetectTime": "2023-10-30T14:08:51.213007+02:00", "EventTime": "2023-10-30T14:08:51.213020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CEVVAV20oujQPbPr48"]} -{"Format": "IDEA0", "ID": "25cf9d60-69be-482f-aa66-74f9c41290c1", "DetectTime": "2023-10-30T14:08:51.239053+02:00", "EventTime": "2023-10-30T14:08:51.239068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CfzKB81914NPbOtlha"]} -{"Format": "IDEA0", "ID": "527ab2d9-f428-448f-8dce-a5cfde78f21f", "DetectTime": "2023-10-30T14:08:51.266946+02:00", "EventTime": "2023-10-30T14:08:51.266963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CC5Az5hnrazFqwmI4"]} -{"Format": "IDEA0", "ID": "ab524c4a-c3c6-4545-81a1-c0a17c069322", "DetectTime": "2023-10-30T14:08:51.295055+02:00", "EventTime": "2023-10-30T14:08:51.295072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVJtEF2nz20jR9gDr3"]} -{"Format": "IDEA0", "ID": "3b82c4e4-ca44-48f8-bf57-74dd45f5fda5", "DetectTime": "2023-10-30T14:08:51.323793+02:00", "EventTime": "2023-10-30T14:08:51.323808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CZCIvU2OQxkSGMWtGl"]} -{"Format": "Json", "ID": "3b82c4e4-ca44-48f8-bf57-74dd45f5fda5", "DetectTime": "2023-10-30T14:08:51.323793+02:00", "EventTime": "2023-10-30T14:08:51.323808+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:53:13.880847+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:51.381049)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8a34a913-3538-4267-b2db-fb8982c247b1", "DetectTime": "2023-10-30T14:08:51.386818+02:00", "EventTime": "2023-10-30T14:08:51.386834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CbDJtc3m8UoAIPk3ng"]} -{"Format": "IDEA0", "ID": "438cb2f1-08f6-47e6-86cc-4d31eeb3d573", "DetectTime": "2023-10-30T14:08:51.416249+02:00", "EventTime": "2023-10-30T14:08:51.416264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbHMHr3ZYVifWvMh4j"]} -{"Format": "IDEA0", "ID": "13086609-004a-4f1c-a2e0-5f91fc10c4f8", "DetectTime": "2023-10-30T14:08:51.441934+02:00", "EventTime": "2023-10-30T14:08:51.441950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CnAFDI2hAgUea83Fzd"]} -{"Format": "IDEA0", "ID": "7323d5c8-88ba-46c4-8522-a5dda9c564e3", "DetectTime": "2023-10-30T14:08:51.467986+02:00", "EventTime": "2023-10-30T14:08:51.468003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ca51mw1EN0GeK2COxh"]} -{"Format": "IDEA0", "ID": "7264db4f-f615-47d4-8a93-8224f6e87ab9", "DetectTime": "2023-10-30T14:08:51.491422+02:00", "EventTime": "2023-10-30T14:08:51.491438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CYMyT84YcSdrlhUpv9"]} -{"Format": "IDEA0", "ID": "12e46285-b3ea-43a4-97d4-8725c4723cac", "DetectTime": "2023-10-30T14:08:51.513425+02:00", "EventTime": "2023-10-30T14:08:51.513449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CNnO033246XNAlq8Yi"]} -{"Format": "IDEA0", "ID": "7d7024ca-55f1-4a56-8c99-e5da273cd4b9", "DetectTime": "2023-10-30T14:08:51.538459+02:00", "EventTime": "2023-10-30T14:08:51.538479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CozPXp181ncgCFEiCj"]} -{"Format": "IDEA0", "ID": "7dd0c4f2-f874-4e4a-b92a-3b80f9c0d5e7", "DetectTime": "2023-10-30T14:08:51.561802+02:00", "EventTime": "2023-10-30T14:08:51.561818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["ClQydi37nO6GT96DMc"]} -{"Format": "Json", "ID": "7dd0c4f2-f874-4e4a-b92a-3b80f9c0d5e7", "DetectTime": "2023-10-30T14:08:51.561802+02:00", "EventTime": "2023-10-30T14:08:51.561818+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:53:16.239478+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:51.616547)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1f693a15-cd5a-4e0c-9fca-e6655d928ed8", "DetectTime": "2023-10-30T14:08:51.620533+02:00", "EventTime": "2023-10-30T14:08:51.620544+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.231.62.73 from 10.0.2.19. blacklisted IP AS: KOBA-AS Polish ISP, PL AS3452 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cr7Fm328OHQXGnL6ue"]} -{"Format": "IDEA0", "ID": "8d53731c-0cda-44f5-9e25-2bafac72aca1", "DetectTime": "2023-10-30T14:08:51.649942+02:00", "EventTime": "2023-10-30T14:08:51.649955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CG0VT7278jjLGLovU5"]} -{"Format": "IDEA0", "ID": "259583c0-9297-4216-bd70-7f3690808a9d", "DetectTime": "2023-10-30T14:08:51.671307+02:00", "EventTime": "2023-10-30T14:08:51.671328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CWNyMsBazEA6NbQNa"]} -{"Format": "IDEA0", "ID": "185f6737-4d67-4935-b675-39ad49edf209", "DetectTime": "2023-10-30T14:08:51.696649+02:00", "EventTime": "2023-10-30T14:08:51.696665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CTryYu2NjFusO5DApa"]} -{"Format": "IDEA0", "ID": "193e8c52-9fca-4321-a815-461646c4970f", "DetectTime": "2023-10-30T14:08:51.718018+02:00", "EventTime": "2023-10-30T14:08:51.718039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CdBhO82uGQv7228lE4"]} -{"Format": "IDEA0", "ID": "b68cbaef-91bc-4bb7-9019-165e3f4a142a", "DetectTime": "2023-10-30T14:08:51.737915+02:00", "EventTime": "2023-10-30T14:08:51.737933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Crb5lw1aStJo2aAro5"]} -{"Format": "IDEA0", "ID": "3259ea3c-8a74-4bdb-bf4c-6e9ac81ee37b", "DetectTime": "2023-10-30T14:08:51.764746+02:00", "EventTime": "2023-10-30T14:08:51.764767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CG9BTjJyRZT8596h2"]} -{"Format": "IDEA0", "ID": "554017de-466d-4483-834a-5414603a2c3f", "DetectTime": "2023-10-30T14:08:51.786597+02:00", "EventTime": "2023-10-30T14:08:51.786612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CBXclW2gmXvWDLqbE8"]} -{"Format": "IDEA0", "ID": "f0054125-248f-4467-a2cd-f0a94f21dffc", "DetectTime": "2023-10-30T14:08:51.847179+02:00", "EventTime": "2023-10-30T14:08:51.847212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CPKtM93nl97DaYBf4h"]} -{"Format": "Json", "ID": "f0054125-248f-4467-a2cd-f0a94f21dffc", "DetectTime": "2023-10-30T14:08:51.847179+02:00", "EventTime": "2023-10-30T14:08:51.847212+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:53:36.811177+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:51.935098)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3ce67816-2ff9-4202-b46b-b74c0b758a8b", "DetectTime": "2023-10-30T14:08:51.940844+02:00", "EventTime": "2023-10-30T14:08:51.940865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C9g78w22DAqNTkNlB4"]} -{"Format": "IDEA0", "ID": "0d108778-9713-4356-9797-1dd5e63e523b", "DetectTime": "2023-10-30T14:08:51.990688+02:00", "EventTime": "2023-10-30T14:08:51.990707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CTwi2F175rwtepxxyb"]} -{"Format": "IDEA0", "ID": "5e492d3f-ca56-4a06-bca5-f45e5e8f30fd", "DetectTime": "2023-10-30T14:08:52.010706+02:00", "EventTime": "2023-10-30T14:08:52.010732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CxBTwO3S8ptx6TKOCg"]} -{"Format": "IDEA0", "ID": "57ce5218-32f7-43b5-a1d1-a2fec4d1dd23", "DetectTime": "2023-10-30T14:08:52.033623+02:00", "EventTime": "2023-10-30T14:08:52.033644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11186], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. ", "ContentType": "text/plain"}], "uids": ["CkLCm133ckdREyhw0c"]} -{"Format": "IDEA0", "ID": "4a3e422a-a96d-4134-9231-7f09056e8946", "DetectTime": "2023-10-30T14:08:52.055120+02:00", "EventTime": "2023-10-30T14:08:52.055142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CuCbHl4MMdmONbKnJl"]} -{"Format": "IDEA0", "ID": "b76bbd31-665c-42bf-95d6-02b40b14f08b", "DetectTime": "2023-10-30T14:08:52.076045+02:00", "EventTime": "2023-10-30T14:08:52.076066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cg9HTY2QcgC3PLWp8e"]} -{"Format": "IDEA0", "ID": "4eae6525-3f5a-41e7-b04c-f004833804f3", "DetectTime": "2023-10-30T14:08:52.095916+02:00", "EventTime": "2023-10-30T14:08:52.095930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cus3HO1tOmXvnQAVbj"]} -{"Format": "IDEA0", "ID": "6634a735-1730-45be-9077-6d0005ebf5b2", "DetectTime": "2023-10-30T14:08:52.114127+02:00", "EventTime": "2023-10-30T14:08:52.114140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cdw0sk41oP67svXtoc"]} -{"Format": "IDEA0", "ID": "78ecc96a-6363-4b92-8c09-6d644026d773", "DetectTime": "2023-10-30T14:08:52.132350+02:00", "EventTime": "2023-10-30T14:08:52.132366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CYPTgtGqItbBoHsqd"]} -{"Format": "Json", "ID": "78ecc96a-6363-4b92-8c09-6d644026d773", "DetectTime": "2023-10-30T14:08:52.132350+02:00", "EventTime": "2023-10-30T14:08:52.132366+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T03:53:38.893130+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2023/10/30 14:08:52.182153)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c359db4a-0e4f-45c8-99dc-05659f385f8e", "DetectTime": "2023-10-30T14:08:52.187919+02:00", "EventTime": "2023-10-30T14:08:52.187935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7l7xq34C5qxIFZvqg"]} -{"Format": "IDEA0", "ID": "2ddcb5c6-4b30-45c5-89f3-deec7909037b", "DetectTime": "2023-10-30T14:08:52.224725+02:00", "EventTime": "2023-10-30T14:08:52.224743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CujrRd1aWWph7WGwD3"]} -{"Format": "IDEA0", "ID": "469880bd-148f-4f95-8d58-f6f7ae22a84a", "DetectTime": "2023-10-30T14:08:52.262047+02:00", "EventTime": "2023-10-30T14:08:52.262064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C3KXIc1lDBMKwqYZO1"]} -{"Format": "IDEA0", "ID": "6190688a-45d4-4bd6-8f70-766d703d3f3b", "DetectTime": "2023-10-30T14:08:52.295697+02:00", "EventTime": "2023-10-30T14:08:52.295723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CJHJii2A0L8iY5jcGg"]} -{"Format": "IDEA0", "ID": "f0658648-292e-4dc1-a1b1-420b04047332", "DetectTime": "2023-10-30T14:08:52.330367+02:00", "EventTime": "2023-10-30T14:08:52.330383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CmKnHP1QvLYqxapVNh"]} -{"Format": "IDEA0", "ID": "032c8411-c076-4b53-a158-51c462f1e8d2", "DetectTime": "2023-10-30T14:08:52.360750+02:00", "EventTime": "2023-10-30T14:08:52.360767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CUvDWpNPUfyF9K4Q4"]} -{"Format": "IDEA0", "ID": "14be73cb-de11-421c-9afb-1d6fc7213737", "DetectTime": "2023-10-30T14:08:52.395094+02:00", "EventTime": "2023-10-30T14:08:52.395112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CjZ5AG3KeWQLP7av6g"]} -{"Format": "Json", "ID": "14be73cb-de11-421c-9afb-1d6fc7213737", "DetectTime": "2023-10-30T14:08:52.395094+02:00", "EventTime": "2023-10-30T14:08:52.395112+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T04:24:20.814602+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2023/10/30 14:08:52.479979)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c1fa3574-784d-4e79-8a1d-3238374f647e", "DetectTime": "2023-10-30T14:08:52.485288+02:00", "EventTime": "2023-10-30T14:08:52.485304+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C8nR0s2HBezeXdJDvf"]} -{"Format": "IDEA0", "ID": "eeec50a4-0af6-41ae-a21d-d283da76fd03", "DetectTime": "2023-10-30T14:08:52.522109+02:00", "EventTime": "2023-10-30T14:08:52.522126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["Cjlrt23zyFL3pAQ2Lf"]} -{"Format": "IDEA0", "ID": "72ff4400-b63e-4cfa-8878-e57033f0969e", "DetectTime": "2023-10-30T14:08:52.555171+02:00", "EventTime": "2023-10-30T14:08:52.555187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CsEtgU3ysUA2mT0dob"]} -{"Format": "IDEA0", "ID": "fb439f05-9198-4610-9376-7e4da9bd0433", "DetectTime": "2023-10-30T14:08:52.585855+02:00", "EventTime": "2023-10-30T14:08:52.585869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRCkov4NWxhhoO2T8f"]} -{"Format": "IDEA0", "ID": "9ae56195-03cc-4aff-8cb9-f6acac4307ea", "DetectTime": "2023-10-30T14:08:52.618220+02:00", "EventTime": "2023-10-30T14:08:52.618242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cf9sQpO8hDzL2nI4j"]} -{"Format": "IDEA0", "ID": "461cd148-2896-4b42-9242-b54c2b92a999", "DetectTime": "2023-10-30T14:08:52.651494+02:00", "EventTime": "2023-10-30T14:08:52.651506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C3SU7J286iCQMeHHdc"]} -{"Format": "IDEA0", "ID": "6cc6833c-a7e8-4268-9cba-d9c73820fc80", "DetectTime": "2023-10-30T14:08:52.682350+02:00", "EventTime": "2023-10-30T14:08:52.682370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CN28qg7UU0Cyj5ewa"]} -{"Format": "IDEA0", "ID": "67303d17-fdf1-4051-b239-5af5bf034c22", "DetectTime": "2023-10-30T14:08:52.714603+02:00", "EventTime": "2023-10-30T14:08:52.714621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C1p2fa2dNt1EDWM8f"]} -{"Format": "IDEA0", "ID": "5feccf0a-9bbc-495b-98e2-23941620a9c0", "DetectTime": "2023-10-30T14:08:52.741174+02:00", "EventTime": "2023-10-30T14:08:52.741186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CwEYqp446zKS9PCJBb"]} -{"Format": "Json", "ID": "5feccf0a-9bbc-495b-98e2-23941620a9c0", "DetectTime": "2023-10-30T14:08:52.741174+02:00", "EventTime": "2023-10-30T14:08:52.741186+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T04:24:22.815709+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2023/10/30 14:08:52.816261)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bca3b182-70ea-437e-9ad5-cd2556b26e3c", "DetectTime": "2023-10-30T14:08:52.822091+02:00", "EventTime": "2023-10-30T14:08:52.822115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CduJhp20FAHhkxkExl"]} -{"Format": "IDEA0", "ID": "670d31dd-8beb-41e1-9ee3-7e04d746fb7d", "DetectTime": "2023-10-30T14:08:52.850454+02:00", "EventTime": "2023-10-30T14:08:52.850465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CkVJi2NbyGU64Q1T8"]} -{"Format": "IDEA0", "ID": "0fc62e0f-bc3e-4ba3-b0a2-b1333d0c9ae0", "DetectTime": "2023-10-30T14:08:52.873702+02:00", "EventTime": "2023-10-30T14:08:52.873718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["C69di2tUHTL3bfDZk"]} -{"Format": "IDEA0", "ID": "e32af0f5-e053-4850-ad86-8b52db35bb2b", "DetectTime": "2023-10-30T14:08:52.969953+02:00", "EventTime": "2023-10-30T14:08:52.969976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CFR5UA24QOBwIg3CP5"]} -{"Format": "IDEA0", "ID": "d29c084e-00ea-4069-9906-613be85368d9", "DetectTime": "2023-10-30T14:08:53.003001+02:00", "EventTime": "2023-10-30T14:08:53.003019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CPAupVAcIQXGOJypi"]} -{"Format": "IDEA0", "ID": "96270398-4b5c-4323-b963-94a3dfe63c28", "DetectTime": "2023-10-30T14:08:53.033644+02:00", "EventTime": "2023-10-30T14:08:53.033665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C7Lkly3MdlAyvni8Ci"]} -{"Format": "IDEA0", "ID": "0387aaed-a0c4-4195-8bc9-293b6dcc6a67", "DetectTime": "2023-10-30T14:08:53.063695+02:00", "EventTime": "2023-10-30T14:08:53.063713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["ChDyCF2E5uOcczzvJg"]} -{"Format": "IDEA0", "ID": "7410e001-dbc4-4732-bf5c-1f11ca703d01", "DetectTime": "2023-10-30T14:08:53.094519+02:00", "EventTime": "2023-10-30T14:08:53.094532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CkHbPi2idMvAaIutVf"]} -{"Format": "Json", "ID": "7410e001-dbc4-4732-bf5c-1f11ca703d01", "DetectTime": "2023-10-30T14:08:53.094519+02:00", "EventTime": "2023-10-30T14:08:53.094532+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T04:24:40.714233+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2023/10/30 14:08:53.168208)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0aaa212d-6efe-4e0c-b030-001e8e6c35b4", "DetectTime": "2023-10-30T14:08:53.173389+02:00", "EventTime": "2023-10-30T14:08:53.173406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C6mlwd49qKZWg5BLBh"]} -{"Format": "IDEA0", "ID": "f3c06c9d-dc20-4580-b80b-395aff2c5f70", "DetectTime": "2023-10-30T14:08:53.200790+02:00", "EventTime": "2023-10-30T14:08:53.200805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C5oGxK2vbuernrjjIc"]} -{"Format": "IDEA0", "ID": "3c287e8a-0b96-4ade-acba-402d8d937567", "DetectTime": "2023-10-30T14:08:53.230961+02:00", "EventTime": "2023-10-30T14:08:53.230981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CyOsoU3NKfURWRuz1"]} -{"Format": "IDEA0", "ID": "463e2c15-bed4-445f-818a-65c66125b3af", "DetectTime": "2023-10-30T14:08:53.261442+02:00", "EventTime": "2023-10-30T14:08:53.261470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXW5Bs4t2uYiLDf6Dg"]} -{"Format": "IDEA0", "ID": "788042c0-79ef-47b2-8e06-4f1452f69743", "DetectTime": "2023-10-30T14:08:53.290191+02:00", "EventTime": "2023-10-30T14:08:53.290203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CKguxTpcsHTFu8j3d"]} -{"Format": "IDEA0", "ID": "da6fbf87-bbf4-43fd-abc3-48514f6d3ed2", "DetectTime": "2023-10-30T14:08:53.320991+02:00", "EventTime": "2023-10-30T14:08:53.321013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CRy1QB3nQ1E3cycPg2"]} -{"Format": "IDEA0", "ID": "244914fb-fae8-417f-9a1d-b9ffc0f28120", "DetectTime": "2023-10-30T14:08:53.348742+02:00", "EventTime": "2023-10-30T14:08:53.348758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Czsy4r2Lw8Kbexb7sk"]} -{"Format": "IDEA0", "ID": "c66e9668-6aa6-4de1-8b20-e392e9792231", "DetectTime": "2023-10-30T14:08:53.377659+02:00", "EventTime": "2023-10-30T14:08:53.377681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cba5kk4mAvrKqFRila"]} -{"Format": "Json", "ID": "c66e9668-6aa6-4de1-8b20-e392e9792231", "DetectTime": "2023-10-30T14:08:53.377659+02:00", "EventTime": "2023-10-30T14:08:53.377681+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T04:55:18.135463+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2023/10/30 14:08:53.445944)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ebf8a2ed-5271-4c1e-9187-06dc9fa7348e", "DetectTime": "2023-10-30T14:08:53.451928+02:00", "EventTime": "2023-10-30T14:08:53.451951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CusbWF4Hhu8TBZ2Vj3"]} -{"Format": "IDEA0", "ID": "e04b7fae-f21c-4601-bfca-75277ffef225", "DetectTime": "2023-10-30T14:08:53.482213+02:00", "EventTime": "2023-10-30T14:08:53.482228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CXBRGepSLM6KjWssk"]} -{"Format": "IDEA0", "ID": "1450868f-8a10-45e9-a97b-a3ea46d38e2d", "DetectTime": "2023-10-30T14:08:53.507891+02:00", "EventTime": "2023-10-30T14:08:53.507908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CytCuJ38mMNsZos5Kh"]} -{"Format": "IDEA0", "ID": "8acb4f1a-39c5-4f02-b133-302f2b3f035d", "DetectTime": "2023-10-30T14:08:53.532196+02:00", "EventTime": "2023-10-30T14:08:53.532212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmZ4RD1vCRTwjF7fbg"]} -{"Format": "IDEA0", "ID": "64061617-2b88-4f39-94e5-ce40d9b29e4b", "DetectTime": "2023-10-30T14:08:53.560090+02:00", "EventTime": "2023-10-30T14:08:53.560111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CODvo1hge2rByoAOi"]} -{"Format": "IDEA0", "ID": "d45be7c1-2dd4-4442-9643-c65bfaf1c694", "DetectTime": "2023-10-30T14:08:53.589016+02:00", "EventTime": "2023-10-30T14:08:53.589034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CFgrsG4psdCyeD03y6"]} -{"Format": "IDEA0", "ID": "8d11e96d-23ec-451a-baaf-dee09acc9a6e", "DetectTime": "2023-10-30T14:08:53.622666+02:00", "EventTime": "2023-10-30T14:08:53.622681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cr0sMw420pgbDnHYGh"]} -{"Format": "IDEA0", "ID": "ffbb02e5-83d7-4bb3-91cf-7db2ba5965aa", "DetectTime": "2023-10-30T14:08:53.653577+02:00", "EventTime": "2023-10-30T14:08:53.653600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["COr8zB4XGCWUa4Omc3"]} -{"Format": "Json", "ID": "ffbb02e5-83d7-4bb3-91cf-7db2ba5965aa", "DetectTime": "2023-10-30T14:08:53.653577+02:00", "EventTime": "2023-10-30T14:08:53.653600+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T04:55:20.668828+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2023/10/30 14:08:53.714744)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4cc0a2a9-4d3b-4aab-b741-5f5e5e23eaa8", "DetectTime": "2023-10-30T14:08:53.720380+02:00", "EventTime": "2023-10-30T14:08:53.720396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CSYTst3zDLQ3OUWYn1"]} -{"Format": "IDEA0", "ID": "2ea724b8-c35f-44e3-967c-0702a5fa674d", "DetectTime": "2023-10-30T14:08:53.747348+02:00", "EventTime": "2023-10-30T14:08:53.747366+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cn3KSA3XpExWRAfK2i"]} -{"Format": "IDEA0", "ID": "9cd10549-779d-4759-ae21-168522af52e3", "DetectTime": "2023-10-30T14:08:53.781585+02:00", "EventTime": "2023-10-30T14:08:53.781614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CsUaOO3eniDsTkldQb"]} -{"Format": "IDEA0", "ID": "9e3009bd-2b00-449a-a1d9-8bf86023c498", "DetectTime": "2023-10-30T14:08:53.809836+02:00", "EventTime": "2023-10-30T14:08:53.809855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C9w82p1UUIVXGsvz9g"]} -{"Format": "IDEA0", "ID": "23603901-1339-4355-9dec-51a29cb62e69", "DetectTime": "2023-10-30T14:08:53.834923+02:00", "EventTime": "2023-10-30T14:08:53.834944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CQtdsy3bIPkZpZ6Gi"]} -{"Format": "IDEA0", "ID": "8faf99a7-520f-41b6-a63f-d0ab482b2b53", "DetectTime": "2023-10-30T14:08:53.859234+02:00", "EventTime": "2023-10-30T14:08:53.859252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CYv63n3qMiUAwJD5M2"]} -{"Format": "IDEA0", "ID": "c1ae87fd-19be-4f21-bc4c-14ee3cfe2a6d", "DetectTime": "2023-10-30T14:08:53.885397+02:00", "EventTime": "2023-10-30T14:08:53.885420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CckaZn2NKCpJD8EY62"]} -{"Format": "IDEA0", "ID": "3dbbc656-8de8-4e95-9d6f-b4dc31970efd", "DetectTime": "2023-10-30T14:08:53.910211+02:00", "EventTime": "2023-10-30T14:08:53.910228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CZ27jsZIFaSfU2M8b"]} -{"Format": "IDEA0", "ID": "6b9724de-9505-4982-bbd6-1ef829761d25", "DetectTime": "2023-10-30T14:08:53.934951+02:00", "EventTime": "2023-10-30T14:08:53.934969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CCOONt1pbwkq6VGore"]} -{"Format": "Json", "ID": "6b9724de-9505-4982-bbd6-1ef829761d25", "DetectTime": "2023-10-30T14:08:53.934951+02:00", "EventTime": "2023-10-30T14:08:53.934969+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T04:55:23.512406+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2023/10/30 14:08:54.002362)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f5b311ea-1613-4cbc-ad88-2eb791231f1a", "DetectTime": "2023-10-30T14:08:54.007599+02:00", "EventTime": "2023-10-30T14:08:54.007617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CZ6vpL3CI8xRosxQO4"]} -{"Format": "IDEA0", "ID": "d9e90e02-66ae-4386-b252-1de416de230d", "DetectTime": "2023-10-30T14:08:54.032011+02:00", "EventTime": "2023-10-30T14:08:54.032027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CG2hXryuyFpmaDgj3"]} -{"Format": "IDEA0", "ID": "42344752-d2d5-4dc2-ab40-690bc10c836c", "DetectTime": "2023-10-30T14:08:54.053866+02:00", "EventTime": "2023-10-30T14:08:54.053887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C3UgkX1L7hsY4QgFec"]} -{"Format": "IDEA0", "ID": "15e0b1b3-577a-4b57-9873-cdaaf41f25d9", "DetectTime": "2023-10-30T14:08:54.079618+02:00", "EventTime": "2023-10-30T14:08:54.079645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CMwF772NtwGJqLKGr7"]} -{"Format": "IDEA0", "ID": "d6044f3b-417d-4cb7-8a4f-d833fdccf6bc", "DetectTime": "2023-10-30T14:08:54.099908+02:00", "EventTime": "2023-10-30T14:08:54.099926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CMR7sO8n024ziJeN"]} -{"Format": "IDEA0", "ID": "7ec4dc01-50b8-4657-a1f2-f71ad22f9605", "DetectTime": "2023-10-30T14:08:54.120800+02:00", "EventTime": "2023-10-30T14:08:54.120826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTwu8RyUE7wOXlkff"]} -{"Format": "IDEA0", "ID": "4c2a8143-9c95-4dc8-9db2-624f56a3cd08", "DetectTime": "2023-10-30T14:08:54.153878+02:00", "EventTime": "2023-10-30T14:08:54.153890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CoDkwM1oteNnDvpuP1"]} -{"Format": "IDEA0", "ID": "f230189c-f601-4f4c-862d-dd166e9bb0f5", "DetectTime": "2023-10-30T14:08:54.188337+02:00", "EventTime": "2023-10-30T14:08:54.188355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CuyN7ff0Rg3jRQdA2"]} -{"Format": "IDEA0", "ID": "3481ca3e-6951-4246-a8fa-f67358f71ec4", "DetectTime": "2023-10-30T14:08:54.228330+02:00", "EventTime": "2023-10-30T14:08:54.228361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CAl4R93hrEktgc2S9k"]} -{"Format": "IDEA0", "ID": "a9ff8e90-5bbb-45f8-a6af-bf66d1b66dc6", "DetectTime": "2023-10-30T14:08:54.268070+02:00", "EventTime": "2023-10-30T14:08:54.268090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3U3l412QUr1IlPPA9"]} -{"Format": "IDEA0", "ID": "bed98059-3858-4f8d-91b9-82294bce9f57", "DetectTime": "2023-10-30T14:08:54.304603+02:00", "EventTime": "2023-10-30T14:08:54.304616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CZvz3J1bCPRTFJsU"]} -{"Format": "IDEA0", "ID": "82fb1a3d-24bd-48c9-91eb-5ab69edd2a21", "DetectTime": "2023-10-30T14:08:54.344409+02:00", "EventTime": "2023-10-30T14:08:54.344422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C4w0OO1b2mfBvgOr7"]} -{"Format": "IDEA0", "ID": "5b913c58-dda6-4e0c-ab47-f1d920942403", "DetectTime": "2023-10-30T14:08:54.381299+02:00", "EventTime": "2023-10-30T14:08:54.381322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ClxO7v4zPu7IG2W4m2"]} -{"Format": "Json", "ID": "5b913c58-dda6-4e0c-ab47-f1d920942403", "DetectTime": "2023-10-30T14:08:54.381299+02:00", "EventTime": "2023-10-30T14:08:54.381322+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T05:26:08.658393+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2023/10/30 14:08:54.463843)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "673c289e-dd6f-4a0d-956f-4b57df015b1d", "DetectTime": "2023-10-30T14:08:54.470002+02:00", "EventTime": "2023-10-30T14:08:54.470021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CuwxPT1Ta1quMQwFm3"]} -{"Format": "IDEA0", "ID": "72b30f48-f04a-4ff5-9dbf-9c013bb3c2f8", "DetectTime": "2023-10-30T14:08:54.516946+02:00", "EventTime": "2023-10-30T14:08:54.516974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CPtbJq2BbexIIhF9Q1"]} -{"Format": "IDEA0", "ID": "4daec53e-83c8-46f4-ae7c-eae5c32c0fee", "DetectTime": "2023-10-30T14:08:54.551073+02:00", "EventTime": "2023-10-30T14:08:54.551098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CUsHRz4cwg2OWFueR3"]} -{"Format": "IDEA0", "ID": "3bf6ec36-0a5a-4687-a716-10f34ce3aca5", "DetectTime": "2023-10-30T14:08:54.584719+02:00", "EventTime": "2023-10-30T14:08:54.584745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CfOohTPshKg8ttZUh"]} -{"Format": "IDEA0", "ID": "e5b2e57b-4a88-44bf-88d5-e16058cef730", "DetectTime": "2023-10-30T14:08:54.620687+02:00", "EventTime": "2023-10-30T14:08:54.620705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C2S5YAwQYevnNUNt"]} -{"Format": "IDEA0", "ID": "64982de8-be72-4b5e-b654-37ecfd4ce4ca", "DetectTime": "2023-10-30T14:08:54.650718+02:00", "EventTime": "2023-10-30T14:08:54.650733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CUQqeg2wz6bk033bm3"]} -{"Format": "IDEA0", "ID": "0c536078-44e2-48cc-ac00-e0c2f3478dac", "DetectTime": "2023-10-30T14:08:54.680857+02:00", "EventTime": "2023-10-30T14:08:54.680871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CQsnB5KJYkzCcqSs"]} -{"Format": "IDEA0", "ID": "b7963707-74fa-431e-9243-15902971df7e", "DetectTime": "2023-10-30T14:08:54.708993+02:00", "EventTime": "2023-10-30T14:08:54.709013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CMyK8G3CgGjm3ODy2"]} -{"Format": "Json", "ID": "b7963707-74fa-431e-9243-15902971df7e", "DetectTime": "2023-10-30T14:08:54.708993+02:00", "EventTime": "2023-10-30T14:08:54.709013+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T05:26:10.761771+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2023/10/30 14:08:54.782361)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b919e2ad-0046-4f8e-adea-4c6bd47f6780", "DetectTime": "2023-10-30T14:08:54.787674+02:00", "EventTime": "2023-10-30T14:08:54.787692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CSzOB2donYC6hCH1"]} -{"Format": "IDEA0", "ID": "10620c8c-be94-44aa-8f24-a79cda8ed4b0", "DetectTime": "2023-10-30T14:08:54.819495+02:00", "EventTime": "2023-10-30T14:08:54.819511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CJnXjaXMWc9a6s3ne"]} -{"Format": "IDEA0", "ID": "f7c73d2a-b2eb-4f28-9ade-46f9c843eeb2", "DetectTime": "2023-10-30T14:08:54.848964+02:00", "EventTime": "2023-10-30T14:08:54.848983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C02HYS2EbR5s9QKEk9"]} -{"Format": "IDEA0", "ID": "88e9d828-8b83-47e9-ba1b-550fb6aaa440", "DetectTime": "2023-10-30T14:08:54.878392+02:00", "EventTime": "2023-10-30T14:08:54.878410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Crc9XC30QL7XFroVrc"]} -{"Format": "IDEA0", "ID": "c3c82d6b-062e-4433-b352-bd07a99a3145", "DetectTime": "2023-10-30T14:08:54.908560+02:00", "EventTime": "2023-10-30T14:08:54.908576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C6RJrb2htMS2NgLJPk"]} -{"Format": "IDEA0", "ID": "00a9fd6e-0167-4082-8ae1-58181a445fd5", "DetectTime": "2023-10-30T14:08:54.936877+02:00", "EventTime": "2023-10-30T14:08:54.936896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CrpdZL1lHOWJPrLIVc"]} -{"Format": "IDEA0", "ID": "b99f126a-4907-4d24-872a-7bcbea1bd602", "DetectTime": "2023-10-30T14:08:54.967566+02:00", "EventTime": "2023-10-30T14:08:54.967590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C92zH81wH6BjjDKkcb"]} -{"Format": "IDEA0", "ID": "c8b8cb91-1389-4309-9fe9-5e0cf186c37a", "DetectTime": "2023-10-30T14:08:54.996878+02:00", "EventTime": "2023-10-30T14:08:54.996899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CwsZQExXnvoz1tEGi"]} -{"Format": "Json", "ID": "c8b8cb91-1389-4309-9fe9-5e0cf186c37a", "DetectTime": "2023-10-30T14:08:54.996878+02:00", "EventTime": "2023-10-30T14:08:54.996899+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T05:26:13.367536+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2023/10/30 14:08:55.065334)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "edecd47e-5349-4dda-8590-12df84fc24a5", "DetectTime": "2023-10-30T14:08:55.070408+02:00", "EventTime": "2023-10-30T14:08:55.070423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["C3vTmx2UTuBN5NS4wk"]} -{"Format": "IDEA0", "ID": "f178193f-8370-4a79-b10a-f274d85ba650", "DetectTime": "2023-10-30T14:08:55.098090+02:00", "EventTime": "2023-10-30T14:08:55.098108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7aB1D3YEra73cRTF4"]} -{"Format": "IDEA0", "ID": "d39a49a0-7952-40a0-a185-a64941ec4711", "DetectTime": "2023-10-30T14:08:55.123076+02:00", "EventTime": "2023-10-30T14:08:55.123091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CSzQNF1DHe9LLlwqf"]} -{"Format": "IDEA0", "ID": "61a3ad6a-526e-4fc4-9837-6bb7e5ae4161", "DetectTime": "2023-10-30T14:08:55.146106+02:00", "EventTime": "2023-10-30T14:08:55.146132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C3ZmAj3dy83THTZqJi"]} -{"Format": "IDEA0", "ID": "f649d5b5-1352-4808-ba3c-d15b3895afae", "DetectTime": "2023-10-30T14:08:55.172668+02:00", "EventTime": "2023-10-30T14:08:55.172679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CSUxS4r8kVyWOcoa"]} -{"Format": "IDEA0", "ID": "e4388e4f-4f09-4acd-9fad-5a610c59fcdc", "DetectTime": "2023-10-30T14:08:55.198421+02:00", "EventTime": "2023-10-30T14:08:55.198438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CQc84f1KeOsReHSZF4"]} -{"Format": "IDEA0", "ID": "9b27f669-6c9c-4411-9e4a-b4a08aa86849", "DetectTime": "2023-10-30T14:08:55.222703+02:00", "EventTime": "2023-10-30T14:08:55.222722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CJtiQi2NbJr2EEgbz3"]} -{"Format": "IDEA0", "ID": "5f4b7ba3-861f-4ca7-9fa3-76a777c26082", "DetectTime": "2023-10-30T14:08:55.250007+02:00", "EventTime": "2023-10-30T14:08:55.250028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["C4C3p12ppyPBu3X5ab"]} -{"Format": "IDEA0", "ID": "1816891a-fd41-470e-8b84-8b1742ccec37", "DetectTime": "2023-10-30T14:08:55.272315+02:00", "EventTime": "2023-10-30T14:08:55.272327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CWci613QSWxJXd2ec8"]} -{"Format": "Json", "ID": "1816891a-fd41-470e-8b84-8b1742ccec37", "DetectTime": "2023-10-30T14:08:55.272315+02:00", "EventTime": "2023-10-30T14:08:55.272327+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T05:56:17.090410+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2023/10/30 14:08:55.337218)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "95a11930-3b07-4437-8ef3-2f89d58a50ea", "DetectTime": "2023-10-30T14:08:55.342742+02:00", "EventTime": "2023-10-30T14:08:55.342762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvSML04OZx16mUzU97"]} -{"Format": "IDEA0", "ID": "71f1a31c-f7a5-4750-a232-79a6e575533b", "DetectTime": "2023-10-30T14:08:55.365897+02:00", "EventTime": "2023-10-30T14:08:55.365913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cnz2Th3mhIM3GZD21c"]} -{"Format": "IDEA0", "ID": "36851793-6159-4552-afb1-322ed40b0930", "DetectTime": "2023-10-30T14:08:55.393013+02:00", "EventTime": "2023-10-30T14:08:55.393029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CWfRet2tyMjayN7SSh"]} -{"Format": "IDEA0", "ID": "9e4c6519-1f1f-439f-b469-7e101435146b", "DetectTime": "2023-10-30T14:08:55.414168+02:00", "EventTime": "2023-10-30T14:08:55.414180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C83WTkPBERaBlFctk"]} -{"Format": "IDEA0", "ID": "46bd3d36-d345-4185-a960-9f34bbb2be4a", "DetectTime": "2023-10-30T14:08:55.436083+02:00", "EventTime": "2023-10-30T14:08:55.436110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cc80fG1zKeKc86KVC5"]} -{"Format": "IDEA0", "ID": "0b532c32-42f1-45af-9214-5c35284dbd5b", "DetectTime": "2023-10-30T14:08:55.459855+02:00", "EventTime": "2023-10-30T14:08:55.459881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C3hGhD8eE8Rj5Npk6"]} -{"Format": "IDEA0", "ID": "83448a2c-6551-447f-9bac-d3f7197020d2", "DetectTime": "2023-10-30T14:08:55.482950+02:00", "EventTime": "2023-10-30T14:08:55.482967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C3vltq4OgpnzZawQHe"]} -{"Format": "IDEA0", "ID": "d7466900-1a93-4660-94c7-4e6f74a194a3", "DetectTime": "2023-10-30T14:08:55.504398+02:00", "EventTime": "2023-10-30T14:08:55.504411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CDDAP2u8IkbSyJTSj"]} -{"Format": "Json", "ID": "d7466900-1a93-4660-94c7-4e6f74a194a3", "DetectTime": "2023-10-30T14:08:55.504398+02:00", "EventTime": "2023-10-30T14:08:55.504411+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T05:56:18.868421+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2023/10/30 14:08:55.564630)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3c42bbc-b293-49f7-ad3a-34aa9d980780", "DetectTime": "2023-10-30T14:08:55.569500+02:00", "EventTime": "2023-10-30T14:08:55.569511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CVMygU3hhJHJHanBi9"]} -{"Format": "IDEA0", "ID": "e31e1969-3a10-44db-9217-700f305c68c8", "DetectTime": "2023-10-30T14:08:55.591725+02:00", "EventTime": "2023-10-30T14:08:55.591742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CzMHEq4Su7ukSfmiJc"]} -{"Format": "IDEA0", "ID": "6f4c9ded-2c16-426b-98b6-9cac15354234", "DetectTime": "2023-10-30T14:08:55.611656+02:00", "EventTime": "2023-10-30T14:08:55.611675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Ci8TMM1icBuYLk0fLa"]} -{"Format": "IDEA0", "ID": "692af6ee-16e1-4427-8447-0c082115a55c", "DetectTime": "2023-10-30T14:08:55.631973+02:00", "EventTime": "2023-10-30T14:08:55.631992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["Ce7AZK1AIV8xSfcyl6"]} -{"Format": "IDEA0", "ID": "31ca5650-e9aa-4ca1-8ef2-69664faa4439", "DetectTime": "2023-10-30T14:08:55.652056+02:00", "EventTime": "2023-10-30T14:08:55.652073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CGEPS3Sa4sn9oc8yh"]} -{"Format": "IDEA0", "ID": "d0737418-509f-4a9f-bccd-2343dc58196b", "DetectTime": "2023-10-30T14:08:55.671931+02:00", "EventTime": "2023-10-30T14:08:55.671949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C9shzv33LsPfy63nll"]} -{"Format": "IDEA0", "ID": "0b3fbc5c-4ec8-4dfa-b051-2153c1b51fd9", "DetectTime": "2023-10-30T14:08:55.690821+02:00", "EventTime": "2023-10-30T14:08:55.690839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CpvRqC3b0mvrmBle8i"]} -{"Format": "IDEA0", "ID": "8f8d658b-2d3c-43ec-b287-b3f2d1a1fc6b", "DetectTime": "2023-10-30T14:08:55.710811+02:00", "EventTime": "2023-10-30T14:08:55.710837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CgdaAw1mdzh6bzYlDk"]} -{"Format": "Json", "ID": "8f8d658b-2d3c-43ec-b287-b3f2d1a1fc6b", "DetectTime": "2023-10-30T14:08:55.710811+02:00", "EventTime": "2023-10-30T14:08:55.710837+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T05:56:21.204674+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2023/10/30 14:08:55.766600)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42d5dddf-0d9e-4669-be30-6ab533794b72", "DetectTime": "2023-10-30T14:08:55.771639+02:00", "EventTime": "2023-10-30T14:08:55.771654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CgmZds2KdOEfuLvaCc"]} -{"Format": "IDEA0", "ID": "e398fd1c-6b88-43c0-ba13-fa803468bab1", "DetectTime": "2023-10-30T14:08:55.796960+02:00", "EventTime": "2023-10-30T14:08:55.796975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CNmAy24bMZFlzqzqvi"]} -{"Format": "IDEA0", "ID": "3b9bb915-e24a-41c9-a19d-a1ad41b90334", "DetectTime": "2023-10-30T14:08:55.814566+02:00", "EventTime": "2023-10-30T14:08:55.814590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CMof2v4rt7iK4HaU95"]} -{"Format": "IDEA0", "ID": "4e25613e-5b2c-4024-8b4f-5c974f75d037", "DetectTime": "2023-10-30T14:08:55.833099+02:00", "EventTime": "2023-10-30T14:08:55.833124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIkC964MMFw7ww7s5e"]} -{"Format": "IDEA0", "ID": "edc49a75-17aa-45be-942c-8eefc6e335f8", "DetectTime": "2023-10-30T14:08:55.862074+02:00", "EventTime": "2023-10-30T14:08:55.862085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C9N78T3ZF4axfJUtNi"]} -{"Format": "IDEA0", "ID": "fcf4dc3d-fca4-43f2-8e77-8262543bd999", "DetectTime": "2023-10-30T14:08:55.895637+02:00", "EventTime": "2023-10-30T14:08:55.895665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C7Jnt93j9T2Io9Amth"]} -{"Format": "IDEA0", "ID": "2ab898b6-d24c-442c-9cb3-6546a43c15db", "DetectTime": "2023-10-30T14:08:55.929654+02:00", "EventTime": "2023-10-30T14:08:55.929672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CJyT0mq87vuto5LZh"]} -{"Format": "IDEA0", "ID": "f1d17c91-bd3d-4f19-acac-2b4a6558c77f", "DetectTime": "2023-10-30T14:08:55.960561+02:00", "EventTime": "2023-10-30T14:08:55.960587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CibFfa1Qa9n1GC7Lic"]} -{"Format": "IDEA0", "ID": "4dad6a98-0c07-40ea-8574-b0ff418f9091", "DetectTime": "2023-10-30T14:08:55.992270+02:00", "EventTime": "2023-10-30T14:08:55.992294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CIBpnN2KBw27Efg0wf"]} -{"Format": "IDEA0", "ID": "c9082d1d-acb7-44a2-84c8-4841ab2bce69", "DetectTime": "2023-10-30T14:08:56.029142+02:00", "EventTime": "2023-10-30T14:08:56.029159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C6pSup2GTu56SQprfb"]} -{"Format": "IDEA0", "ID": "72c3a2b9-e714-467f-81a2-d564dc754237", "DetectTime": "2023-10-30T14:08:56.064296+02:00", "EventTime": "2023-10-30T14:08:56.064317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C76hJv4PSlLU8cAa5e"]} -{"Format": "Json", "ID": "72c3a2b9-e714-467f-81a2-d564dc754237", "DetectTime": "2023-10-30T14:08:56.064296+02:00", "EventTime": "2023-10-30T14:08:56.064317+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T06:26:34.013667+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2023/10/30 14:08:56.197731)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "acd45859-9740-4409-81af-fb03981274d3", "DetectTime": "2023-10-30T14:08:56.203400+02:00", "EventTime": "2023-10-30T14:08:56.203419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["ClSi8622vXHA7nZyGh"]} -{"Format": "IDEA0", "ID": "dbab6c98-91a9-4710-b999-89adb2fabeaf", "DetectTime": "2023-10-30T14:08:56.238263+02:00", "EventTime": "2023-10-30T14:08:56.238280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CmhGfe2TrrmtAHsYff"]} -{"Format": "IDEA0", "ID": "4a0af497-ee70-4e2d-ad49-71131c42c1f7", "DetectTime": "2023-10-30T14:08:56.271008+02:00", "EventTime": "2023-10-30T14:08:56.271033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CZqYEh1JyskRpwK6o1"]} -{"Format": "IDEA0", "ID": "9a436ae8-ad07-4ce2-8500-9c08bd1e4b4d", "DetectTime": "2023-10-30T14:08:56.304718+02:00", "EventTime": "2023-10-30T14:08:56.304738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CaDwvccW02sOx7BFa"]} -{"Format": "IDEA0", "ID": "a6b7ec48-4be4-4564-b3be-610062f0e671", "DetectTime": "2023-10-30T14:08:56.337087+02:00", "EventTime": "2023-10-30T14:08:56.337103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CQr9PZ1JbckRUPCJZ3"]} -{"Format": "IDEA0", "ID": "2891fecf-a5fe-4475-94b4-f060d4acb78c", "DetectTime": "2023-10-30T14:08:56.368346+02:00", "EventTime": "2023-10-30T14:08:56.368369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CMQOXj2dj8tY2yOXbg"]} -{"Format": "IDEA0", "ID": "3eaf3bb3-f7ab-4564-9c6c-81d39bb3e740", "DetectTime": "2023-10-30T14:08:56.397598+02:00", "EventTime": "2023-10-30T14:08:56.397611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CymIsmzJLi1LTKXyj"]} -{"Format": "IDEA0", "ID": "2807b71c-be4e-4c0e-b287-fb182afe387b", "DetectTime": "2023-10-30T14:08:56.428483+02:00", "EventTime": "2023-10-30T14:08:56.428500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CqyPjmekygn2AGSv6"]} -{"Format": "Json", "ID": "2807b71c-be4e-4c0e-b287-fb182afe387b", "DetectTime": "2023-10-30T14:08:56.428483+02:00", "EventTime": "2023-10-30T14:08:56.428500+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T06:26:36.059733+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2023/10/30 14:08:56.495924)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d4e9c92d-f1ab-498b-8cdc-6fdd92a33be5", "DetectTime": "2023-10-30T14:08:56.501635+02:00", "EventTime": "2023-10-30T14:08:56.501652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CISN6h4eCD6Y2NkTd4"]} -{"Format": "IDEA0", "ID": "725f4a63-c8e0-4c4c-b6b8-fe9a25b48a24", "DetectTime": "2023-10-30T14:08:56.534877+02:00", "EventTime": "2023-10-30T14:08:56.534903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CVtVQR1PdSwZGuusHk"]} -{"Format": "IDEA0", "ID": "ecabeb10-9dfb-4c2d-b925-87534543d172", "DetectTime": "2023-10-30T14:08:56.565431+02:00", "EventTime": "2023-10-30T14:08:56.565457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["CM6uRm191YKIRJi9Ej"]} -{"Format": "IDEA0", "ID": "0b62664c-9deb-4497-aa39-bf7c8a5fb0ad", "DetectTime": "2023-10-30T14:08:56.592953+02:00", "EventTime": "2023-10-30T14:08:56.592974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CyBl2t1IWPEiV4iaEb"]} -{"Format": "IDEA0", "ID": "f7741cd9-bb9c-4c87-ac4d-ef0186b1e709", "DetectTime": "2023-10-30T14:08:56.621517+02:00", "EventTime": "2023-10-30T14:08:56.621533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CGfnAySpTmuSoQuM9"]} -{"Format": "IDEA0", "ID": "81918926-439a-4a21-8704-25e19b277bdc", "DetectTime": "2023-10-30T14:08:56.650317+02:00", "EventTime": "2023-10-30T14:08:56.650332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CpM6Y94OYLa07S49Ui"]} -{"Format": "IDEA0", "ID": "1be91619-1efc-41ef-b3d4-e7101a0007dc", "DetectTime": "2023-10-30T14:08:56.676244+02:00", "EventTime": "2023-10-30T14:08:56.676255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CgL9sK25qJnup85aOf"]} -{"Format": "IDEA0", "ID": "97599280-0882-4617-a330-7b1669935272", "DetectTime": "2023-10-30T14:08:56.702818+02:00", "EventTime": "2023-10-30T14:08:56.702830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CmOKvo2n5UA0aZwvm1"]} -{"Format": "Json", "ID": "97599280-0882-4617-a330-7b1669935272", "DetectTime": "2023-10-30T14:08:56.702818+02:00", "EventTime": "2023-10-30T14:08:56.702830+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T06:26:39.172638+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2023/10/30 14:08:56.768979)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a259d89e-f7e7-4d3c-aa73-39c95dabc724", "DetectTime": "2023-10-30T14:08:56.775049+02:00", "EventTime": "2023-10-30T14:08:56.775071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CI4uv94YhpsTQYiPv3"]} -{"Format": "IDEA0", "ID": "f212588d-475a-46f8-af74-6a7430305536", "DetectTime": "2023-10-30T14:08:56.802636+02:00", "EventTime": "2023-10-30T14:08:56.802661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["C7BHNc2WnCsC2tIIjk"]} -{"Format": "IDEA0", "ID": "d596e3b6-1a62-49bb-9399-d1e1528e2c9e", "DetectTime": "2023-10-30T14:08:56.829095+02:00", "EventTime": "2023-10-30T14:08:56.829109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4qjz33zRUw9oWm5Rf"]} -{"Format": "IDEA0", "ID": "32bc88bc-b451-4b2c-a01c-7f8b7c2117c1", "DetectTime": "2023-10-30T14:08:56.853256+02:00", "EventTime": "2023-10-30T14:08:56.853288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CsQVJVyimUz7cFf63"]} -{"Format": "IDEA0", "ID": "98862a0e-1862-49ee-91b0-0cd19454bbb2", "DetectTime": "2023-10-30T14:08:56.876197+02:00", "EventTime": "2023-10-30T14:08:56.876222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CAJT762FF2NHnXGfo5"]} -{"Format": "IDEA0", "ID": "56d3c7e3-c329-4ee2-acc2-38a0c879ff70", "DetectTime": "2023-10-30T14:08:56.904244+02:00", "EventTime": "2023-10-30T14:08:56.904267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CNOYZq4NgVzF34M3fc"]} -{"Format": "IDEA0", "ID": "9e2d3262-f661-4d1f-b813-6e2de44e3108", "DetectTime": "2023-10-30T14:08:56.930056+02:00", "EventTime": "2023-10-30T14:08:56.930073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CieVDzZbKfFz5Ubf6"]} -{"Format": "IDEA0", "ID": "16f36a48-7f63-46f9-bcb7-ad4d5c4ef4b4", "DetectTime": "2023-10-30T14:08:56.955032+02:00", "EventTime": "2023-10-30T14:08:56.955044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cx9Gcu215HitpzGLyd"]} -{"Format": "Json", "ID": "16f36a48-7f63-46f9-bcb7-ad4d5c4ef4b4", "DetectTime": "2023-10-30T14:08:56.955032+02:00", "EventTime": "2023-10-30T14:08:56.955044+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T06:56:53.191103+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2023/10/30 14:08:57.017331)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "87de3904-fd93-4e6b-b73e-7234c5068586", "DetectTime": "2023-10-30T14:08:57.022584+02:00", "EventTime": "2023-10-30T14:08:57.022595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9Aq9h3lLJUqzgJMcl"]} -{"Format": "IDEA0", "ID": "7d2fecde-9b04-4593-9060-ec7b78555f38", "DetectTime": "2023-10-30T14:08:57.043074+02:00", "EventTime": "2023-10-30T14:08:57.043087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CfzVBz3VRLPJItMyYf"]} -{"Format": "IDEA0", "ID": "eb7c1a4e-fe18-4e5a-b193-b2b0b7b7c117", "DetectTime": "2023-10-30T14:08:57.067306+02:00", "EventTime": "2023-10-30T14:08:57.067335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CSZInZiuyMI4UrTyg"]} -{"Format": "IDEA0", "ID": "efd84b8f-ecec-4287-b83b-9ca82b18fa8e", "DetectTime": "2023-10-30T14:08:57.089746+02:00", "EventTime": "2023-10-30T14:08:57.089762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBORTY3fOUKAWIU9qi"]} -{"Format": "IDEA0", "ID": "d4afe1ce-a19b-43c5-8d14-ec7f057d5b2e", "DetectTime": "2023-10-30T14:08:57.111755+02:00", "EventTime": "2023-10-30T14:08:57.111771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CuwmCo2sHQsyIb1zZ3"]} -{"Format": "IDEA0", "ID": "84a78ddd-61a7-4e81-a384-5d4b8f1f1a1a", "DetectTime": "2023-10-30T14:08:57.134930+02:00", "EventTime": "2023-10-30T14:08:57.134948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cjn0GB40jb4cadI5I3"]} -{"Format": "IDEA0", "ID": "434dea81-fa25-4d91-8607-75b04b09d909", "DetectTime": "2023-10-30T14:08:57.161129+02:00", "EventTime": "2023-10-30T14:08:57.161148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CMynzZFLr19zbosqb"]} -{"Format": "IDEA0", "ID": "89428a2e-ea45-4099-851d-2c3580aa6f49", "DetectTime": "2023-10-30T14:08:57.184706+02:00", "EventTime": "2023-10-30T14:08:57.184731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CP24Pn3gOZ6LUp0vd8"]} -{"Format": "IDEA0", "ID": "50dc6c9e-cb82-4a17-825a-5f132ba97f6e", "DetectTime": "2023-10-30T14:08:57.206188+02:00", "EventTime": "2023-10-30T14:08:57.206203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CLPKpp1fSecaDwXBEh"]} -{"Format": "Json", "ID": "50dc6c9e-cb82-4a17-825a-5f132ba97f6e", "DetectTime": "2023-10-30T14:08:57.206188+02:00", "EventTime": "2023-10-30T14:08:57.206203+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T06:56:54.938324+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2023/10/30 14:08:57.269621)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "69ce8a1f-b878-4979-b058-fa680a7863cb", "DetectTime": "2023-10-30T14:08:57.275048+02:00", "EventTime": "2023-10-30T14:08:57.275065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C0IW0y3supHqipMDs2"]} -{"Format": "IDEA0", "ID": "5481393b-5f4e-4c5f-9e52-c2e6ec5040f3", "DetectTime": "2023-10-30T14:08:57.296266+02:00", "EventTime": "2023-10-30T14:08:57.296282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CFl4dPLJhPBMQHGe7"]} -{"Format": "IDEA0", "ID": "193912ed-2ae1-4cfa-8236-6e3a125de00a", "DetectTime": "2023-10-30T14:08:57.315134+02:00", "EventTime": "2023-10-30T14:08:57.315151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CQzcPB3cuwWvVDAjpa"]} -{"Format": "IDEA0", "ID": "51bde2f7-c13a-4abc-8e0c-1f857b94ddca", "DetectTime": "2023-10-30T14:08:57.334639+02:00", "EventTime": "2023-10-30T14:08:57.334655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CaL6ws1gIfCa8vyXFk"]} -{"Format": "IDEA0", "ID": "f8e89e52-bf50-4b67-bbc7-3045cdb226ae", "DetectTime": "2023-10-30T14:08:57.356170+02:00", "EventTime": "2023-10-30T14:08:57.356187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C6kuA81hRL60XOqpsd"]} -{"Format": "IDEA0", "ID": "5c42f5a6-07ad-4105-bfc1-9de6310c47a0", "DetectTime": "2023-10-30T14:08:57.377859+02:00", "EventTime": "2023-10-30T14:08:57.377881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [19873], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. ", "ContentType": "text/plain"}], "uids": ["CUshNT3cQvZ0O3fgPb"]} -{"Format": "IDEA0", "ID": "6f16258a-ef4f-4041-abb2-16fa6afdeb83", "DetectTime": "2023-10-30T14:08:57.399520+02:00", "EventTime": "2023-10-30T14:08:57.399540+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COWD8p4DW55VQKWXui"]} -{"Format": "IDEA0", "ID": "e5a4ff96-b5c5-4976-99f3-282d403349bb", "DetectTime": "2023-10-30T14:08:57.430605+02:00", "EventTime": "2023-10-30T14:08:57.430618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CLFkLK1jHN2fBjtPL2"]} -{"Format": "IDEA0", "ID": "eb415e4f-b539-456c-bfee-45ebdb5551ae", "DetectTime": "2023-10-30T14:08:57.453879+02:00", "EventTime": "2023-10-30T14:08:57.453906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CzZRYb1D7DFDjwGVWc"]} -{"Format": "Json", "ID": "eb415e4f-b539-456c-bfee-45ebdb5551ae", "DetectTime": "2023-10-30T14:08:57.453879+02:00", "EventTime": "2023-10-30T14:08:57.453906+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T06:56:58.112544+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2023/10/30 14:08:57.508605)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d27325ad-4731-4fbf-bcfc-565960cd66aa", "DetectTime": "2023-10-30T14:08:57.513608+02:00", "EventTime": "2023-10-30T14:08:57.513624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C5tlGA3yontIrGQyAk"]} -{"Format": "IDEA0", "ID": "5e39e2cd-b4a6-4747-b66d-57e9ec8b0eb6", "DetectTime": "2023-10-30T14:08:57.531487+02:00", "EventTime": "2023-10-30T14:08:57.531505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CiqPeE2kslXdC2Excj"]} -{"Format": "IDEA0", "ID": "60d36d2a-fde0-48c0-b92e-cc9c03cb157c", "DetectTime": "2023-10-30T14:08:57.547009+02:00", "EventTime": "2023-10-30T14:08:57.547027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CzSOsG4fkJpvK538Sb"]} -{"Format": "IDEA0", "ID": "e66817c5-0e50-453d-8c64-ef9ee72c5fcb", "DetectTime": "2023-10-30T14:08:57.564292+02:00", "EventTime": "2023-10-30T14:08:57.564308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CQzbxo2K6rEr4tTncb"]} -{"Format": "IDEA0", "ID": "2770f743-e267-4e1e-b6f6-37936d5912f7", "DetectTime": "2023-10-30T14:08:57.582011+02:00", "EventTime": "2023-10-30T14:08:57.582036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGjd9F3mePZkFgyYX8"]} -{"Format": "IDEA0", "ID": "f5f53ee2-34cc-4b10-a7a4-bb5b282f4662", "DetectTime": "2023-10-30T14:08:57.616751+02:00", "EventTime": "2023-10-30T14:08:57.616764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CSFDOUdItemFi22i3"]} -{"Format": "IDEA0", "ID": "11c63da6-40f3-48b0-90f7-1add0b4b9a2b", "DetectTime": "2023-10-30T14:08:57.651318+02:00", "EventTime": "2023-10-30T14:08:57.651347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CJ40j72dnRXp2cbn3f"]} -{"Format": "IDEA0", "ID": "959d4592-2c50-4cf2-b60b-83e5b1d7d840", "DetectTime": "2023-10-30T14:08:57.685694+02:00", "EventTime": "2023-10-30T14:08:57.685710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CbxzbF2rtkfqBXkonf"]} -{"Format": "IDEA0", "ID": "949775f0-7f48-4cf7-a0a9-bbcc47b302ad", "DetectTime": "2023-10-30T14:08:57.722772+02:00", "EventTime": "2023-10-30T14:08:57.722809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CE8JEr3aGHdeqT3wZ4"]} -{"Format": "IDEA0", "ID": "59f59f09-818c-4afb-a76d-469d0f5eaab1", "DetectTime": "2023-10-30T14:08:57.760368+02:00", "EventTime": "2023-10-30T14:08:57.760381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["ChwHFG3hqDAAptJq11"]} -{"Format": "IDEA0", "ID": "6df999de-630f-4a51-846b-e35e47166039", "DetectTime": "2023-10-30T14:08:57.799122+02:00", "EventTime": "2023-10-30T14:08:57.799139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmgaxZ56GCIlXhHg8"]} -{"Format": "IDEA0", "ID": "aac93eb2-444a-4e57-9b60-82d8a363e67e", "DetectTime": "2023-10-30T14:08:57.834673+02:00", "EventTime": "2023-10-30T14:08:57.834688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CS5e9zr1K0ccqqRB2"]} -{"Format": "Json", "ID": "aac93eb2-444a-4e57-9b60-82d8a363e67e", "DetectTime": "2023-10-30T14:08:57.834673+02:00", "EventTime": "2023-10-30T14:08:57.834688+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:27:15.213233+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:57.906968)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "85797c81-9c41-42e0-87d0-c8651c23cfe0", "DetectTime": "2023-10-30T14:08:57.911160+02:00", "EventTime": "2023-10-30T14:08:57.911171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cyv75CW8D1UQs15z8"]} -{"Format": "IDEA0", "ID": "a0b5b937-7953-4083-acf6-a8b56fda4ec7", "DetectTime": "2023-10-30T14:08:57.945969+02:00", "EventTime": "2023-10-30T14:08:57.945980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CrPO7D1hNKscIn5WS"]} -{"Format": "IDEA0", "ID": "ee95b90c-66fe-4fe0-ad92-347eb8c7f1eb", "DetectTime": "2023-10-30T14:08:57.980512+02:00", "EventTime": "2023-10-30T14:08:57.980528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C5JJRq4Ulp0gjNDkee"]} -{"Format": "IDEA0", "ID": "21e99881-5adb-41cb-b8c7-344f968b3652", "DetectTime": "2023-10-30T14:08:58.010724+02:00", "EventTime": "2023-10-30T14:08:58.010751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CqMuEK2Aqv89JStgii"]} -{"Format": "IDEA0", "ID": "835591d6-97d7-4c2f-ad35-0bae078afda1", "DetectTime": "2023-10-30T14:08:58.044386+02:00", "EventTime": "2023-10-30T14:08:58.044406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cvk4qc3p0MCArR6aJ7"]} -{"Format": "IDEA0", "ID": "f4f197cc-9968-4eb9-ad53-c3e5ac753845", "DetectTime": "2023-10-30T14:08:58.077814+02:00", "EventTime": "2023-10-30T14:08:58.077832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CfRoqT1bzLLBSmgAXg"]} -{"Format": "IDEA0", "ID": "6f356d37-0796-46b6-89d6-cf905358491a", "DetectTime": "2023-10-30T14:08:58.113333+02:00", "EventTime": "2023-10-30T14:08:58.113351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CmZxYf4HyDfVswbQg7"]} -{"Format": "IDEA0", "ID": "06d7f1bd-b6dd-4028-9b27-3a3a74c8bd8e", "DetectTime": "2023-10-30T14:08:58.144743+02:00", "EventTime": "2023-10-30T14:08:58.144757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CQUfsx1TV7dkSNJGTb"]} -{"Format": "Json", "ID": "06d7f1bd-b6dd-4028-9b27-3a3a74c8bd8e", "DetectTime": "2023-10-30T14:08:58.144743+02:00", "EventTime": "2023-10-30T14:08:58.144757+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:27:17.174721+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:58.217531)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "99d02386-203b-4649-8cfe-c8d20e001b17", "DetectTime": "2023-10-30T14:08:58.223247+02:00", "EventTime": "2023-10-30T14:08:58.223267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["Cf0tDW3DGLc8fZoK1"]} -{"Format": "IDEA0", "ID": "84e16d18-21ec-4849-b132-878360b3504b", "DetectTime": "2023-10-30T14:08:58.260940+02:00", "EventTime": "2023-10-30T14:08:58.260960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CgZYdV3HDp3XiK2uOh"]} -{"Format": "IDEA0", "ID": "3da9bc9e-3258-418e-bb51-5ed57316662f", "DetectTime": "2023-10-30T14:08:58.294286+02:00", "EventTime": "2023-10-30T14:08:58.294306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["COXXW11Do1LhJfLNLk"]} -{"Format": "IDEA0", "ID": "10e04052-fe99-41ed-a470-5dda1fe1483f", "DetectTime": "2023-10-30T14:08:58.326546+02:00", "EventTime": "2023-10-30T14:08:58.326562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CIwZjN2UZLVvYHZ7B5"]} -{"Format": "IDEA0", "ID": "3c6528a4-3001-475d-8c35-47aa2f2886f3", "DetectTime": "2023-10-30T14:08:58.358091+02:00", "EventTime": "2023-10-30T14:08:58.358119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cu3mmA1m9CKWkK78Bc"]} -{"Format": "IDEA0", "ID": "1a49eba6-9b72-4277-b1c7-fa4111984200", "DetectTime": "2023-10-30T14:08:58.390013+02:00", "EventTime": "2023-10-30T14:08:58.390032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CWVnII1ojeYB44nrxb"]} -{"Format": "IDEA0", "ID": "c4bfbab5-c3fe-4678-8521-c9d216af75bb", "DetectTime": "2023-10-30T14:08:58.420848+02:00", "EventTime": "2023-10-30T14:08:58.420869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["COzlSy3tp1HnKBxeJ5"]} -{"Format": "IDEA0", "ID": "f4500251-ddb8-4cce-9358-0c6567be91e0", "DetectTime": "2023-10-30T14:08:58.456947+02:00", "EventTime": "2023-10-30T14:08:58.456959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["C1PjIQ2SzuCa7J9nlf"]} -{"Format": "Json", "ID": "f4500251-ddb8-4cce-9358-0c6567be91e0", "DetectTime": "2023-10-30T14:08:58.456947+02:00", "EventTime": "2023-10-30T14:08:58.456959+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:27:37.431409+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:58.529548)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea18ebdf-079f-44a9-b606-cd4a7238ae45", "DetectTime": "2023-10-30T14:08:58.534974+02:00", "EventTime": "2023-10-30T14:08:58.534993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CP49SE3UXqTdK4GFAk"]} -{"Format": "IDEA0", "ID": "f9779fb5-ddd3-44c6-bc6f-9683d4bc4c22", "DetectTime": "2023-10-30T14:08:58.565625+02:00", "EventTime": "2023-10-30T14:08:58.565642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CmXjB01nH4Lz4FUhVb"]} -{"Format": "IDEA0", "ID": "b7a74370-56ea-40fe-b3ad-65382a169315", "DetectTime": "2023-10-30T14:08:58.596658+02:00", "EventTime": "2023-10-30T14:08:58.596683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CLI9HL2baaAMonLJv8"]} -{"Format": "IDEA0", "ID": "efc21445-89fd-4709-9bce-928b39b0ece0", "DetectTime": "2023-10-30T14:08:58.625439+02:00", "EventTime": "2023-10-30T14:08:58.625459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CLMT6A1VKUYGgU8TP6"]} -{"Format": "IDEA0", "ID": "bef73a24-198f-4e6a-91b5-ec6b0f05c9cc", "DetectTime": "2023-10-30T14:08:58.654994+02:00", "EventTime": "2023-10-30T14:08:58.655014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CIadRt2Bo8f1W2ajPf"]} -{"Format": "IDEA0", "ID": "a14ab32e-71c9-4e03-bbd9-31b7d13f899c", "DetectTime": "2023-10-30T14:08:58.684096+02:00", "EventTime": "2023-10-30T14:08:58.684108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CGk2qd37VsetYNoZS4"]} -{"Format": "IDEA0", "ID": "1abb3830-29b5-4226-9170-f51acb2ed5dd", "DetectTime": "2023-10-30T14:08:58.709099+02:00", "EventTime": "2023-10-30T14:08:58.709111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CZ6Bon2Of2AeBJeUZ2"]} -{"Format": "IDEA0", "ID": "d9e2c4ce-b742-465a-b9b0-9e7355b1aa68", "DetectTime": "2023-10-30T14:08:58.736807+02:00", "EventTime": "2023-10-30T14:08:58.736819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ClOBfb48TVWbxGua6"]} -{"Format": "Json", "ID": "d9e2c4ce-b742-465a-b9b0-9e7355b1aa68", "DetectTime": "2023-10-30T14:08:58.736807+02:00", "EventTime": "2023-10-30T14:08:58.736819+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:58:01.551146+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:58.811796)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3f801954-72f4-4fda-96da-554a0dfb7b3e", "DetectTime": "2023-10-30T14:08:58.816712+02:00", "EventTime": "2023-10-30T14:08:58.816739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Ca27fdFZcofQGvvj3"]} -{"Format": "IDEA0", "ID": "4f5f040e-85ac-43ec-acb8-de6ce70af410", "DetectTime": "2023-10-30T14:08:58.844261+02:00", "EventTime": "2023-10-30T14:08:58.844282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBGdSc2Yk6JIUAyARh"]} -{"Format": "IDEA0", "ID": "8184449f-2264-4ef8-85eb-7ebe5be1d029", "DetectTime": "2023-10-30T14:08:58.868545+02:00", "EventTime": "2023-10-30T14:08:58.868561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CrkHPG2ofLu0YuEmW8"]} -{"Format": "IDEA0", "ID": "85d13447-b450-41a8-9524-6bbe95c56fdd", "DetectTime": "2023-10-30T14:08:58.893600+02:00", "EventTime": "2023-10-30T14:08:58.893615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["CGC3GC2CMQrXzDwxv4"]} -{"Format": "IDEA0", "ID": "9bfb1e1a-597d-4001-9402-912fac6a9513", "DetectTime": "2023-10-30T14:08:58.918341+02:00", "EventTime": "2023-10-30T14:08:58.918354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CQ1Wk73LuLbGiFJVGi"]} -{"Format": "IDEA0", "ID": "1259e106-f0ec-4ab0-b8d1-fca0afd10985", "DetectTime": "2023-10-30T14:08:58.942069+02:00", "EventTime": "2023-10-30T14:08:58.942087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CBSSgp1iLa4jihBTFe"]} -{"Format": "IDEA0", "ID": "4159e5b4-b557-4de6-b54c-3deb5da0a36f", "DetectTime": "2023-10-30T14:08:58.968060+02:00", "EventTime": "2023-10-30T14:08:58.968085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CK8MLDHtl7w2pRG42"]} -{"Format": "IDEA0", "ID": "78afa2bb-b6f9-4bdc-adf7-facc10dbdcbe", "DetectTime": "2023-10-30T14:08:58.997316+02:00", "EventTime": "2023-10-30T14:08:58.997343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CFrrxP2TdAjw1EzXwb"]} -{"Format": "Json", "ID": "78afa2bb-b6f9-4bdc-adf7-facc10dbdcbe", "DetectTime": "2023-10-30T14:08:58.997316+02:00", "EventTime": "2023-10-30T14:08:58.997343+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:58:03.420404+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:59.065176)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "61699a42-344e-432a-aa5b-fb39bc67601d", "DetectTime": "2023-10-30T14:08:59.071235+02:00", "EventTime": "2023-10-30T14:08:59.071254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9099], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. ", "ContentType": "text/plain"}], "uids": ["C7gO7O2UUKpJR5sjYf"]} -{"Format": "IDEA0", "ID": "fb39baa8-f31a-48c7-9c14-6c980e658420", "DetectTime": "2023-10-30T14:08:59.103487+02:00", "EventTime": "2023-10-30T14:08:59.103505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7904], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. ", "ContentType": "text/plain"}], "uids": ["CQ8fDY3Lj7YLUT3EKl"]} -{"Format": "IDEA0", "ID": "2621bcbc-2e45-43c6-ba59-f155afe9bcba", "DetectTime": "2023-10-30T14:08:59.131901+02:00", "EventTime": "2023-10-30T14:08:59.131916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C3zMvU2VKxbW8IYAkh"]} -{"Format": "IDEA0", "ID": "22e747a8-dde9-4ec8-844c-0aac94751d6f", "DetectTime": "2023-10-30T14:08:59.157552+02:00", "EventTime": "2023-10-30T14:08:59.157570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CWclbGm7VWJqouPc"]} -{"Format": "IDEA0", "ID": "130b199a-cda5-4e18-b646-26befb3ec533", "DetectTime": "2023-10-30T14:08:59.181606+02:00", "EventTime": "2023-10-30T14:08:59.181621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CfHCb93jpOrjdvLru4"]} -{"Format": "IDEA0", "ID": "23790fa9-9704-44c9-98e9-0607b17c873d", "DetectTime": "2023-10-30T14:08:59.208067+02:00", "EventTime": "2023-10-30T14:08:59.208095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CuKPJS1hwCQnLr0Ly7"]} -{"Format": "IDEA0", "ID": "26b7dafa-fb2b-41d9-9c00-1df90fcca7ff", "DetectTime": "2023-10-30T14:08:59.231154+02:00", "EventTime": "2023-10-30T14:08:59.231165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFKLE22jL2H9LB8spj"]} -{"Format": "IDEA0", "ID": "0da75241-a3ca-441b-9e1f-d863d227f736", "DetectTime": "2023-10-30T14:08:59.255292+02:00", "EventTime": "2023-10-30T14:08:59.255306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CdE9tx29okOi0sOvdg"]} -{"Format": "Json", "ID": "0da75241-a3ca-441b-9e1f-d863d227f736", "DetectTime": "2023-10-30T14:08:59.255292+02:00", "EventTime": "2023-10-30T14:08:59.255306+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:58:05.533095+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:59.318902)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7fc065fb-40ed-4b25-a71f-7476ac4a5f3a", "DetectTime": "2023-10-30T14:08:59.324505+02:00", "EventTime": "2023-10-30T14:08:59.324522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["ClYZOl25sg3qy2Tzp1"]} -{"Format": "IDEA0", "ID": "b4bebdf0-6d50-4dfb-8904-11e8d50066c2", "DetectTime": "2023-10-30T14:08:59.352492+02:00", "EventTime": "2023-10-30T14:08:59.352508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CKA49f4FwdRfK3koyd"]} -{"Format": "IDEA0", "ID": "594624e1-0b5b-40ea-ac63-c55aa6c3d5d2", "DetectTime": "2023-10-30T14:08:59.377711+02:00", "EventTime": "2023-10-30T14:08:59.377729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["ClArlE1ez7DpvbYc7j"]} -{"Format": "IDEA0", "ID": "637eae97-2771-4b89-aa3f-677d0bf3fcda", "DetectTime": "2023-10-30T14:08:59.400491+02:00", "EventTime": "2023-10-30T14:08:59.400512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24770], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["Cz7V84232MEP0mxGe"]} -{"Format": "IDEA0", "ID": "f9f028d8-b5c1-40c6-a321-32671f67ecaa", "DetectTime": "2023-10-30T14:08:59.421967+02:00", "EventTime": "2023-10-30T14:08:59.421978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["CF4pBH3v1oxH4V4g62"]} -{"Format": "IDEA0", "ID": "f421749e-5111-452d-be21-ceaba0e5d568", "DetectTime": "2023-10-30T14:08:59.445891+02:00", "EventTime": "2023-10-30T14:08:59.445912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CX9oXY3onwZKjyJq3k"]} -{"Format": "IDEA0", "ID": "ab9cf9c8-b265-462a-a99c-cfe56c24f77c", "DetectTime": "2023-10-30T14:08:59.468756+02:00", "EventTime": "2023-10-30T14:08:59.468773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CXfLbBViMuWrReWd9"]} -{"Format": "IDEA0", "ID": "d9700414-051a-4a2b-af37-a09d5e33c333", "DetectTime": "2023-10-30T14:08:59.492804+02:00", "EventTime": "2023-10-30T14:08:59.492826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Ccn2fCtXUsaIZLb88"]} -{"Format": "Json", "ID": "d9700414-051a-4a2b-af37-a09d5e33c333", "DetectTime": "2023-10-30T14:08:59.492804+02:00", "EventTime": "2023-10-30T14:08:59.492826+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T07:59:01.591393+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2023/10/30 14:08:59.544723)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "216eed00-11a4-4303-b291-cd9369f91db4", "DetectTime": "2023-10-30T14:08:59.549478+02:00", "EventTime": "2023-10-30T14:08:59.549495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYRDxQ1Omlomt74boj"]} -{"Format": "IDEA0", "ID": "627a4fc9-d462-495f-9aa0-5c0c6ec0f7e7", "DetectTime": "2023-10-30T14:08:59.570381+02:00", "EventTime": "2023-10-30T14:08:59.570397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["Ce8yee1FgQDsSXMKY6"]} -{"Format": "IDEA0", "ID": "e9f20d50-df57-4508-a00f-3ed72561fd5a", "DetectTime": "2023-10-30T14:08:59.589300+02:00", "EventTime": "2023-10-30T14:08:59.589317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9683/UDP destination IP 122.214.58.197. ", "ContentType": "text/plain"}], "uids": ["CARI0H2C4MoWCayWRf"]} -{"Format": "IDEA0", "ID": "74f7f57a-c051-46af-8632-ed8c530898be", "DetectTime": "2023-10-30T14:08:59.634517+02:00", "EventTime": "2023-10-30T14:08:59.634539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["C2yqWq1ceDKOePm4Pd"]} -{"Format": "IDEA0", "ID": "c8524bd1-f510-4971-9856-c9aabb14eebd", "DetectTime": "2023-10-30T14:08:59.678601+02:00", "EventTime": "2023-10-30T14:08:59.678614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C7LJ9RzzVk4i10Ne8"]} -{"Format": "IDEA0", "ID": "3e3a4277-0513-4dc5-b196-e75ea9bc0c26", "DetectTime": "2023-10-30T14:08:59.716415+02:00", "EventTime": "2023-10-30T14:08:59.716434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CugiEZ2bJ4ApZTVc51"]} -{"Format": "IDEA0", "ID": "8c0ce583-b7ad-4ecf-83f7-7e15368ab344", "DetectTime": "2023-10-30T14:08:59.756956+02:00", "EventTime": "2023-10-30T14:08:59.756981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. ", "ContentType": "text/plain"}], "uids": ["CnpqU6UCzGJZABRb1"]} -{"Format": "IDEA0", "ID": "1a857d19-a8e7-4249-904c-894e3518ab99", "DetectTime": "2023-10-30T14:08:59.795135+02:00", "EventTime": "2023-10-30T14:08:59.795147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13355], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13355/UDP destination IP 110.138.249.237. ", "ContentType": "text/plain"}], "uids": ["CXXx8Prhtf9pjN6Cj"]} -{"Format": "IDEA0", "ID": "5ee703c4-eac3-41cc-9e6b-1b8371ff8532", "DetectTime": "2023-10-30T14:08:59.837518+02:00", "EventTime": "2023-10-30T14:08:59.837534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 28478/UDP destination IP 125.164.33.173. ", "ContentType": "text/plain"}], "uids": ["C1YorS3KzUilW3fl5h"]} -{"Format": "Json", "ID": "5ee703c4-eac3-41cc-9e6b-1b8371ff8532", "DetectTime": "2023-10-30T14:08:59.837518+02:00", "EventTime": "2023-10-30T14:08:59.837534+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [28478], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:04:22.386852+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:00.041567)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4de8460e-165f-4c4b-b222-690d039afda1", "DetectTime": "2023-10-30T14:09:00.046976+02:00", "EventTime": "2023-10-30T14:09:00.046996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CKxElX3NeSugmP3vUl"]} -{"Format": "IDEA0", "ID": "74205a40-50d8-425a-8b66-37a92af12a3b", "DetectTime": "2023-10-30T14:09:00.093720+02:00", "EventTime": "2023-10-30T14:09:00.093737+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COtn1S34YB28Qd5ZPk"]} -{"Format": "IDEA0", "ID": "3fcc416a-3b72-4b4d-8e3c-c7069324ef74", "DetectTime": "2023-10-30T14:09:00.130598+02:00", "EventTime": "2023-10-30T14:09:00.130627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CVQsg84a5geltwUDna"]} -{"Format": "IDEA0", "ID": "fe8a9cb4-1037-40c6-a325-2142b2e6cd6c", "DetectTime": "2023-10-30T14:09:00.173723+02:00", "EventTime": "2023-10-30T14:09:00.173735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C9A2do4xBtEUjDBnR2"]} -{"Format": "IDEA0", "ID": "4916f43a-3550-4790-b77c-06a2562e8ff5", "DetectTime": "2023-10-30T14:09:00.216835+02:00", "EventTime": "2023-10-30T14:09:00.216854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cdq5884IdnAV8dR4l4"]} -{"Format": "IDEA0", "ID": "c0466432-6b51-47b1-92c3-0a79832b8303", "DetectTime": "2023-10-30T14:09:00.260806+02:00", "EventTime": "2023-10-30T14:09:00.260827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12777], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. ", "ContentType": "text/plain"}], "uids": ["C7vzHw16c4nPaCA8C7"]} -{"Format": "IDEA0", "ID": "fe25e3c0-920f-44e9-8825-85391478a768", "DetectTime": "2023-10-30T14:09:00.310614+02:00", "EventTime": "2023-10-30T14:09:00.310633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["Cu2k6r1oeRtiJpL3fk"]} -{"Format": "IDEA0", "ID": "68940515-5d5c-47f5-87a0-f92f4b61a9d8", "DetectTime": "2023-10-30T14:09:00.357444+02:00", "EventTime": "2023-10-30T14:09:00.357467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["Cp8fSF4D1ije7JE9Vd"]} -{"Format": "IDEA0", "ID": "7f15fbab-5205-4ef3-93b3-96bd98b511b8", "DetectTime": "2023-10-30T14:09:00.402751+02:00", "EventTime": "2023-10-30T14:09:00.402815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15739], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15739/UDP destination IP 181.64.166.201. ", "ContentType": "text/plain"}], "uids": ["CtQAMrZR6l50FzALh"]} -{"Format": "Json", "ID": "7f15fbab-5205-4ef3-93b3-96bd98b511b8", "DetectTime": "2023-10-30T14:09:00.402751+02:00", "EventTime": "2023-10-30T14:09:00.402815+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15739], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:06:40.621655+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:00.489735)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6cd8c816-2f72-41d4-9249-7b620962754b", "DetectTime": "2023-10-30T14:09:00.494935+02:00", "EventTime": "2023-10-30T14:09:00.494957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CQyZZd3hplbqIsJvdh"]} -{"Format": "IDEA0", "ID": "97ef29af-8821-4194-806a-153df0eeba95", "DetectTime": "2023-10-30T14:09:00.541857+02:00", "EventTime": "2023-10-30T14:09:00.541874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CvULQy3SrJpOAkgOGa"]} -{"Format": "IDEA0", "ID": "6ee345f2-6164-4aa0-a7d4-ccc492adf38b", "DetectTime": "2023-10-30T14:09:00.588648+02:00", "EventTime": "2023-10-30T14:09:00.588665+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cu5M2W373oaEMUGGt"]} -{"Format": "IDEA0", "ID": "bce9b1f0-46c1-4654-bcc3-55f51652f1f6", "DetectTime": "2023-10-30T14:09:00.628158+02:00", "EventTime": "2023-10-30T14:09:00.628186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14433], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. ", "ContentType": "text/plain"}], "uids": ["Cx2i7u4g8soPBcir1d"]} -{"Format": "IDEA0", "ID": "039b0c2b-4a32-4180-8eaa-24f2686814ce", "DetectTime": "2023-10-30T14:09:00.670524+02:00", "EventTime": "2023-10-30T14:09:00.670541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2810], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. ", "ContentType": "text/plain"}], "uids": ["CLKkdF1mhkd45rvyMj"]} -{"Format": "IDEA0", "ID": "b3d0039a-0f8d-4832-9c26-79b6a69cd1d3", "DetectTime": "2023-10-30T14:09:00.715127+02:00", "EventTime": "2023-10-30T14:09:00.715153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CTATEl3LFm9W5MJdK2"]} -{"Format": "IDEA0", "ID": "ad211fa7-9859-4f9b-a4dd-c3593d566f39", "DetectTime": "2023-10-30T14:09:00.755559+02:00", "EventTime": "2023-10-30T14:09:00.755577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CPzPHl2Tx1TG2RS7hd"]} -{"Format": "IDEA0", "ID": "42a83ffc-a69e-4777-860f-18eb3367316c", "DetectTime": "2023-10-30T14:09:00.797052+02:00", "EventTime": "2023-10-30T14:09:00.797068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CLKiMf3dHngsd4szqh"]} -{"Format": "IDEA0", "ID": "965399e2-f1ad-4e56-9f1b-dc3d887c5e2c", "DetectTime": "2023-10-30T14:09:00.848902+02:00", "EventTime": "2023-10-30T14:09:00.848918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGRJnl3bd3ioe91jfi"]} -{"Format": "Json", "ID": "965399e2-f1ad-4e56-9f1b-dc3d887c5e2c", "DetectTime": "2023-10-30T14:09:00.848902+02:00", "EventTime": "2023-10-30T14:09:00.848918+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:40:10.900479+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:00.931091)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6495d2fc-8ee2-4976-abaa-556b4dd9b59d", "DetectTime": "2023-10-30T14:09:00.936883+02:00", "EventTime": "2023-10-30T14:09:00.936903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cslb1B2XmWUglhqOj3"]} -{"Format": "IDEA0", "ID": "f602cb44-b6fd-4754-860a-87ec36cbb63a", "DetectTime": "2023-10-30T14:09:00.982916+02:00", "EventTime": "2023-10-30T14:09:00.982934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CNNKUCgGhlRcpusze"]} -{"Format": "IDEA0", "ID": "11e17524-2890-45b0-92bf-8f8cd74dbd4b", "DetectTime": "2023-10-30T14:09:01.023853+02:00", "EventTime": "2023-10-30T14:09:01.023872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CLhyJf2tAmhCaJ68a3"]} -{"Format": "IDEA0", "ID": "205bac76-935b-47b0-88fe-62bc25b6294b", "DetectTime": "2023-10-30T14:09:01.069395+02:00", "EventTime": "2023-10-30T14:09:01.069421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CfxoZds7uWC7j1EGc"]} -{"Format": "IDEA0", "ID": "405f0b65-b135-4e6f-af31-f2da9885fddb", "DetectTime": "2023-10-30T14:09:01.112237+02:00", "EventTime": "2023-10-30T14:09:01.112264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["C9XJFW2CtPlXXf7VBh"]} -{"Format": "IDEA0", "ID": "a52afe3c-3915-4fd9-8d5f-1f388ded6dc7", "DetectTime": "2023-10-30T14:09:01.150243+02:00", "EventTime": "2023-10-30T14:09:01.150265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C5M5NFbiIPO2Fbyg3"]} -{"Format": "IDEA0", "ID": "a6ce344c-ca43-455a-a18f-287d807a50aa", "DetectTime": "2023-10-30T14:09:01.193705+02:00", "EventTime": "2023-10-30T14:09:01.193722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CZDgALm2Edtp1FNh9"]} -{"Format": "IDEA0", "ID": "278d75ce-3cd5-476b-98fc-46eaff1389d8", "DetectTime": "2023-10-30T14:09:01.235443+02:00", "EventTime": "2023-10-30T14:09:01.235460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C8PvK42iLECFgF8tr"]} -{"Format": "Json", "ID": "278d75ce-3cd5-476b-98fc-46eaff1389d8", "DetectTime": "2023-10-30T14:09:01.235443+02:00", "EventTime": "2023-10-30T14:09:01.235460+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:40:13.491021+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:01.323893)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "61ca9792-d9d4-4ece-9985-9dc1edcedf6e", "DetectTime": "2023-10-30T14:09:01.332140+02:00", "EventTime": "2023-10-30T14:09:01.332202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CC1SuU3JG0GWMfNnvc"]} -{"Format": "IDEA0", "ID": "929b4f48-1b3d-4724-a5e5-13a8050ee72d", "DetectTime": "2023-10-30T14:09:01.377565+02:00", "EventTime": "2023-10-30T14:09:01.377582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C6iJOk2kbVUm5P901"]} -{"Format": "IDEA0", "ID": "c36ac358-f906-44bc-b1c0-201a6e8bd81a", "DetectTime": "2023-10-30T14:09:01.428468+02:00", "EventTime": "2023-10-30T14:09:01.428489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CtTSLdsslwXGwJK8a"]} -{"Format": "IDEA0", "ID": "f8bc5300-70e3-4904-b584-3e30e7be777b", "DetectTime": "2023-10-30T14:09:01.485107+02:00", "EventTime": "2023-10-30T14:09:01.485132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cx1SvP2OgtgNSdusV7"]} -{"Format": "IDEA0", "ID": "a4bead87-138a-458c-93e1-f5ab79a40f45", "DetectTime": "2023-10-30T14:09:01.526723+02:00", "EventTime": "2023-10-30T14:09:01.526740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C40kyW2h81lFNH9Nwe"]} -{"Format": "IDEA0", "ID": "7991593f-d872-492e-b7b9-107e5910f83b", "DetectTime": "2023-10-30T14:09:01.565676+02:00", "EventTime": "2023-10-30T14:09:01.565697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C0gpfY1g3IBgCxYCf3"]} -{"Format": "IDEA0", "ID": "bf3f142f-65ce-415a-b630-65efb2345cf1", "DetectTime": "2023-10-30T14:09:01.603457+02:00", "EventTime": "2023-10-30T14:09:01.603474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CZ4DniZy6So2hdRD5"]} -{"Format": "IDEA0", "ID": "9dcd3825-5c11-4f78-bfa6-d22b6adfb082", "DetectTime": "2023-10-30T14:09:01.640073+02:00", "EventTime": "2023-10-30T14:09:01.640094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CMBPRr4wpEdiY719S5"]} -{"Format": "Json", "ID": "9dcd3825-5c11-4f78-bfa6-d22b6adfb082", "DetectTime": "2023-10-30T14:09:01.640073+02:00", "EventTime": "2023-10-30T14:09:01.640094+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:40:34.782016+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:01.713690)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b9d8173-a2c2-47d5-9b0a-01f5bb518366", "DetectTime": "2023-10-30T14:09:01.719541+02:00", "EventTime": "2023-10-30T14:09:01.719558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C0oI9g2loapGiYcjY6"]} -{"Format": "IDEA0", "ID": "fae970d5-a5d6-463f-9fd7-7ff7ccb22976", "DetectTime": "2023-10-30T14:09:01.754328+02:00", "EventTime": "2023-10-30T14:09:01.754353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CAYSOu3wt6jO4MjTVg"]} -{"Format": "IDEA0", "ID": "8d7f8d3d-60f8-45de-8335-0b628e3d403b", "DetectTime": "2023-10-30T14:09:01.786452+02:00", "EventTime": "2023-10-30T14:09:01.786477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CrVNUdn2mKTF1rel6"]} -{"Format": "IDEA0", "ID": "ffc0dfa3-c028-4ccd-abdc-155cc4c0036d", "DetectTime": "2023-10-30T14:09:01.821866+02:00", "EventTime": "2023-10-30T14:09:01.821896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CoAd371uNrtJ8Ki4v8"]} -{"Format": "IDEA0", "ID": "c83c8e26-9f23-4b64-8058-176fd953de73", "DetectTime": "2023-10-30T14:09:01.855097+02:00", "EventTime": "2023-10-30T14:09:01.855115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24770], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CFUCbi3PoHWsxcIHVf"]} -{"Format": "IDEA0", "ID": "cc084003-d65c-4b41-a636-335d407ff0cb", "DetectTime": "2023-10-30T14:09:01.887107+02:00", "EventTime": "2023-10-30T14:09:01.887120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["CTAN5o3ct3dd0eZLOk"]} -{"Format": "IDEA0", "ID": "84cf9619-0f81-41c9-a597-42943543f34b", "DetectTime": "2023-10-30T14:09:01.916949+02:00", "EventTime": "2023-10-30T14:09:01.916967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["COGW6H1czdUIm4LQV1"]} -{"Format": "IDEA0", "ID": "b0215aa8-66aa-40c7-9591-8d41242905b7", "DetectTime": "2023-10-30T14:09:01.947083+02:00", "EventTime": "2023-10-30T14:09:01.947102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CpfsUm3J8XJ5DNSICj"]} -{"Format": "Json", "ID": "b0215aa8-66aa-40c7-9591-8d41242905b7", "DetectTime": "2023-10-30T14:09:01.947083+02:00", "EventTime": "2023-10-30T14:09:01.947102+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:40:37.972771+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:02.086611)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4ba86b58-d526-4902-a639-1b4d34a9fbc5", "DetectTime": "2023-10-30T14:09:02.095076+02:00", "EventTime": "2023-10-30T14:09:02.095095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CWhtpR2AHlYdgXERle"]} -{"Format": "IDEA0", "ID": "a6e5b83f-0c74-41dc-9f56-789ef41fdf7d", "DetectTime": "2023-10-30T14:09:02.130565+02:00", "EventTime": "2023-10-30T14:09:02.130583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CiDJUEyIxcQaTaJx1"]} -{"Format": "IDEA0", "ID": "54a045fd-d454-4487-a081-c340aa1adc5f", "DetectTime": "2023-10-30T14:09:02.163224+02:00", "EventTime": "2023-10-30T14:09:02.163248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["CsgAoZfT9tsswhind"]} -{"Format": "IDEA0", "ID": "50b2fb0a-8a56-40d2-a89a-dbb61e9b779b", "DetectTime": "2023-10-30T14:09:02.192318+02:00", "EventTime": "2023-10-30T14:09:02.192349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["Cx0fTk3lncLy6TDb08"]} -{"Format": "IDEA0", "ID": "a6063ad2-849b-4223-a0ca-1180d13cbe33", "DetectTime": "2023-10-30T14:09:02.236366+02:00", "EventTime": "2023-10-30T14:09:02.236382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Clh6Bb31KREIrtrkp4"]} -{"Format": "IDEA0", "ID": "8b178849-6419-4c7d-87ad-cc739e1ea9b8", "DetectTime": "2023-10-30T14:09:02.269320+02:00", "EventTime": "2023-10-30T14:09:02.269337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CYvzlUIg05aaghugj"]} -{"Format": "IDEA0", "ID": "34f36914-d874-4c7c-97be-353a9de94d05", "DetectTime": "2023-10-30T14:09:02.303878+02:00", "EventTime": "2023-10-30T14:09:02.303891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. ", "ContentType": "text/plain"}], "uids": ["CuKMTj3PUiPzUbITP4"]} -{"Format": "IDEA0", "ID": "318ec2fc-4085-4dc2-98d9-fce8da18d368", "DetectTime": "2023-10-30T14:09:02.334517+02:00", "EventTime": "2023-10-30T14:09:02.334535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13355], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13355/UDP destination IP 110.138.249.237. ", "ContentType": "text/plain"}], "uids": ["Cz3tvwFi7yY4FBILk"]} -{"Format": "Json", "ID": "318ec2fc-4085-4dc2-98d9-fce8da18d368", "DetectTime": "2023-10-30T14:09:02.334517+02:00", "EventTime": "2023-10-30T14:09:02.334535+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13355], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:40:58.427064+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:02.397878)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "363437b8-aa7a-42c1-911f-1ebd25eeae6f", "DetectTime": "2023-10-30T14:09:02.405615+02:00", "EventTime": "2023-10-30T14:09:02.405632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CUKkAl1o9yxFiMh4Qc"]} -{"Format": "IDEA0", "ID": "0f9b4982-a5fd-4ada-aa4b-32a41b3e3094", "DetectTime": "2023-10-30T14:09:02.440088+02:00", "EventTime": "2023-10-30T14:09:02.440118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CLd5Ot1n2w1or5UAK"]} -{"Format": "IDEA0", "ID": "b802a66a-bec8-436f-a9dd-b5c847af51b7", "DetectTime": "2023-10-30T14:09:02.471324+02:00", "EventTime": "2023-10-30T14:09:02.471366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C2DRfrmFBItf5NPc2"]} -{"Format": "IDEA0", "ID": "96816a46-3b32-4cd8-966d-5850cef1181b", "DetectTime": "2023-10-30T14:09:02.501339+02:00", "EventTime": "2023-10-30T14:09:02.501356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12777], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. ", "ContentType": "text/plain"}], "uids": ["C5deApDgQN44uLXb"]} -{"Format": "IDEA0", "ID": "5bba6463-c641-4c14-9719-5479c7c7891a", "DetectTime": "2023-10-30T14:09:02.528457+02:00", "EventTime": "2023-10-30T14:09:02.528477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CxTrR24Bd6mPDguoE2"]} -{"Format": "IDEA0", "ID": "af3747d0-003c-47d8-98bb-01146b9f0dc7", "DetectTime": "2023-10-30T14:09:02.555756+02:00", "EventTime": "2023-10-30T14:09:02.555773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CWH3062JH9qdZv8fk7"]} -{"Format": "IDEA0", "ID": "72f84637-c504-4f8d-b262-a2c98f3de767", "DetectTime": "2023-10-30T14:09:02.588620+02:00", "EventTime": "2023-10-30T14:09:02.588637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["CNvNLd2GAJc9y2LTsl"]} -{"Format": "IDEA0", "ID": "7e159add-958a-46b7-a623-e1acc9cc2cac", "DetectTime": "2023-10-30T14:09:02.617647+02:00", "EventTime": "2023-10-30T14:09:02.617666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["C8GUL41pxhddJXaCcg"]} -{"Format": "IDEA0", "ID": "025ddef2-1382-4391-aa3e-6672ce2a98d2", "DetectTime": "2023-10-30T14:09:02.648090+02:00", "EventTime": "2023-10-30T14:09:02.648103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["COvFvdKeu5pSa8M6e"]} -{"Format": "Json", "ID": "025ddef2-1382-4391-aa3e-6672ce2a98d2", "DetectTime": "2023-10-30T14:09:02.648090+02:00", "EventTime": "2023-10-30T14:09:02.648103+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T08:41:39.948227+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2023/10/30 14:09:02.720034)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1295cda9-bac4-4a5b-bb09-ed4602e23de7", "DetectTime": "2023-10-30T14:09:02.726008+02:00", "EventTime": "2023-10-30T14:09:02.726034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CS3wuv23z5jJbebky8"]} -{"Format": "IDEA0", "ID": "4cdf5e64-86e3-4116-8d63-c542f176555c", "DetectTime": "2023-10-30T14:09:02.752642+02:00", "EventTime": "2023-10-30T14:09:02.752661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14433], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. ", "ContentType": "text/plain"}], "uids": ["CYu2433R8wSxDPnSi3"]} -{"Format": "IDEA0", "ID": "a1868a17-ac3e-470a-8e1f-c05e710203ad", "DetectTime": "2023-10-30T14:09:02.776066+02:00", "EventTime": "2023-10-30T14:09:02.776122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2810], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. ", "ContentType": "text/plain"}], "uids": ["CjJDd72Ef7x6ujVb4j"]} -{"Format": "IDEA0", "ID": "3dd9c0ca-ed66-4f05-ad45-854fb3022404", "DetectTime": "2023-10-30T14:09:02.803222+02:00", "EventTime": "2023-10-30T14:09:02.803250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CyDQHq3pJNI30oau7f"]} -{"Format": "IDEA0", "ID": "cb1068fb-ae03-46ee-ab24-2027fe7874a7", "DetectTime": "2023-10-30T14:09:02.826636+02:00", "EventTime": "2023-10-30T14:09:02.826653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwYHJnpbSLFFXEdze"]} -{"Format": "IDEA0", "ID": "2df1e549-5d7b-4829-9802-dd7aad05ac96", "DetectTime": "2023-10-30T14:09:02.853129+02:00", "EventTime": "2023-10-30T14:09:02.853141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CMYByPGgkTtFaIHrj"]} -{"Format": "IDEA0", "ID": "177ccab3-895d-43e1-9f76-57fd7745884d", "DetectTime": "2023-10-30T14:09:02.917005+02:00", "EventTime": "2023-10-30T14:09:02.917032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9683/UDP destination IP 122.214.58.197. ", "ContentType": "text/plain"}], "uids": ["CDu25N1ZezCRKdCmzb"]} -{"Format": "IDEA0", "ID": "6ad5026d-298b-4379-905c-d15e858621fb", "DetectTime": "2023-10-30T14:09:02.980317+02:00", "EventTime": "2023-10-30T14:09:02.980335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CD7u9x1Mw5cxA2viD1"]} -{"Format": "IDEA0", "ID": "bf98437e-51e9-4875-96ef-5fb725ec4c49", "DetectTime": "2023-10-30T14:09:03.044372+02:00", "EventTime": "2023-10-30T14:09:03.044394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C6UJ3e2W1My8pFbXMg"]} -{"Format": "IDEA0", "ID": "332744d9-1b9b-4a86-b791-93bf6604aaf3", "DetectTime": "2023-10-30T14:09:03.104429+02:00", "EventTime": "2023-10-30T14:09:03.104445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CHUwOe4P5deztSQtqd"]} -{"Format": "IDEA0", "ID": "8b0e32a6-9c8b-43aa-b381-e78e17c14749", "DetectTime": "2023-10-30T14:09:03.166451+02:00", "EventTime": "2023-10-30T14:09:03.166471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cj4fZc2bzWcuYDeiYj"]} -{"Format": "IDEA0", "ID": "c7219bdb-9dc0-4a7a-8493-76888878f836", "DetectTime": "2023-10-30T14:09:03.226844+02:00", "EventTime": "2023-10-30T14:09:03.226870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CEDCk3IUGts0gax4b"]} -{"Format": "Json", "ID": "c7219bdb-9dc0-4a7a-8493-76888878f836", "DetectTime": "2023-10-30T14:09:03.226844+02:00", "EventTime": "2023-10-30T14:09:03.226870+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:13:00.412766+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:03.356492)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3fbb4f90-a17b-45c6-859a-701aaf7c67ef", "DetectTime": "2023-10-30T14:09:03.363145+02:00", "EventTime": "2023-10-30T14:09:03.363163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1563], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. ", "ContentType": "text/plain"}], "uids": ["Cqh6zq1mNNDWpemF2d"]} -{"Format": "IDEA0", "ID": "c7f3cdf7-1703-4fdb-b4c5-09957314fa97", "DetectTime": "2023-10-30T14:09:03.425916+02:00", "EventTime": "2023-10-30T14:09:03.425938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CAa4Sp4IsJFzpAS2bf"]} -{"Format": "IDEA0", "ID": "9a45e8dc-c58e-422a-a60a-3aecf2155880", "DetectTime": "2023-10-30T14:09:03.486291+02:00", "EventTime": "2023-10-30T14:09:03.486320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CgAAW749kks64Kv2Z"]} -{"Format": "IDEA0", "ID": "6be21978-a5a4-4edb-9189-6d1987047591", "DetectTime": "2023-10-30T14:09:03.546308+02:00", "EventTime": "2023-10-30T14:09:03.546324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cy2LGO2VbWFt9qLRRk"]} -{"Format": "IDEA0", "ID": "3d7195c5-8a17-4c4d-867d-7fab5c2ed0c6", "DetectTime": "2023-10-30T14:09:03.607716+02:00", "EventTime": "2023-10-30T14:09:03.607728+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CWVvyv1AppYZCVLIj4"]} -{"Format": "IDEA0", "ID": "5e25df87-4b55-4512-b1f0-a7c8d5a46650", "DetectTime": "2023-10-30T14:09:03.645897+02:00", "EventTime": "2023-10-30T14:09:03.645920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQWgnjyWqRxpU7xFh"]} -{"Format": "IDEA0", "ID": "4ba99b54-9d70-43b9-b508-41986f9bac66", "DetectTime": "2023-10-30T14:09:03.705363+02:00", "EventTime": "2023-10-30T14:09:03.705375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C4EegM3jAXh3YUwK62"]} -{"Format": "IDEA0", "ID": "545e9b7e-e7f9-4862-9ec5-d5f7ceb65d52", "DetectTime": "2023-10-30T14:09:03.766262+02:00", "EventTime": "2023-10-30T14:09:03.766279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ci1ymC2rDQrLGIlZO6"]} -{"Format": "IDEA0", "ID": "16165dbd-f096-44df-89b4-3450b60d3f50", "DetectTime": "2023-10-30T14:09:03.836421+02:00", "EventTime": "2023-10-30T14:09:03.836434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CkYujzmieQIYX32S3"]} -{"Format": "Json", "ID": "16165dbd-f096-44df-89b4-3450b60d3f50", "DetectTime": "2023-10-30T14:09:03.836421+02:00", "EventTime": "2023-10-30T14:09:03.836434+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:13:02.273434+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:03.933008)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4beb7262-3e12-47e2-8987-ba74a8463e56", "DetectTime": "2023-10-30T14:09:03.939422+02:00", "EventTime": "2023-10-30T14:09:03.939440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CYGQMZ2g4wVcpV3rDe"]} -{"Format": "IDEA0", "ID": "c2da5d8c-c26f-42bf-8dda-ee4a21300da3", "DetectTime": "2023-10-30T14:09:03.995914+02:00", "EventTime": "2023-10-30T14:09:03.995942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CjJSRk2FyOJy8jTE0c"]} -{"Format": "IDEA0", "ID": "ecf51ca9-8ac2-4692-a467-fb50b068afa6", "DetectTime": "2023-10-30T14:09:04.050809+02:00", "EventTime": "2023-10-30T14:09:04.050830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CFWO5r2KMGXPbbA4wd"]} -{"Format": "IDEA0", "ID": "91413f50-c33c-43d7-ac60-500e0f86e420", "DetectTime": "2023-10-30T14:09:04.108850+02:00", "EventTime": "2023-10-30T14:09:04.108937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CWzqps1uWhwqc9GMu7"]} -{"Format": "IDEA0", "ID": "4af094f0-cbbf-40c8-8eec-d68922ec75a2", "DetectTime": "2023-10-30T14:09:04.168461+02:00", "EventTime": "2023-10-30T14:09:04.168479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C3yiDi1KC0yy7F6m"]} -{"Format": "IDEA0", "ID": "50535234-ec66-4a37-acbf-03323c22162e", "DetectTime": "2023-10-30T14:09:04.228709+02:00", "EventTime": "2023-10-30T14:09:04.228735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CdUl4k2bfi612w1uQ5"]} -{"Format": "IDEA0", "ID": "f9111990-50b2-47f6-aeab-44d9cbb86c6c", "DetectTime": "2023-10-30T14:09:04.285200+02:00", "EventTime": "2023-10-30T14:09:04.285221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CEZridOGPUx3tsFc2"]} -{"Format": "IDEA0", "ID": "ad606c9d-354e-4e05-9a8b-e226e6e987f8", "DetectTime": "2023-10-30T14:09:04.343951+02:00", "EventTime": "2023-10-30T14:09:04.343979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["C7Gop63uFtKqgV3Jbe"]} -{"Format": "Json", "ID": "ad606c9d-354e-4e05-9a8b-e226e6e987f8", "DetectTime": "2023-10-30T14:09:04.343951+02:00", "EventTime": "2023-10-30T14:09:04.343979+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:13:04.251949+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:04.440180)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6b236f91-47b4-4b58-8b33-a974cf85b823", "DetectTime": "2023-10-30T14:09:04.447207+02:00", "EventTime": "2023-10-30T14:09:04.447228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24770], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CS0FWn4tNIU966Anq1"]} -{"Format": "IDEA0", "ID": "f87ccfa5-3280-42db-a66c-6f814ed7bebc", "DetectTime": "2023-10-30T14:09:04.506902+02:00", "EventTime": "2023-10-30T14:09:04.506927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["C3nmdYAoSO3uKZBMb"]} -{"Format": "IDEA0", "ID": "862ec84d-030d-4181-a90d-1e847125ca07", "DetectTime": "2023-10-30T14:09:04.554944+02:00", "EventTime": "2023-10-30T14:09:04.554961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CdhODi2LfwGNkhxz0h"]} -{"Format": "IDEA0", "ID": "37908124-d847-426b-9bc8-fb6757417b5c", "DetectTime": "2023-10-30T14:09:04.605874+02:00", "EventTime": "2023-10-30T14:09:04.605888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CeGXezl9UC6sZcj1g"]} -{"Format": "IDEA0", "ID": "b23a52dc-551e-4cb8-8ceb-5a8d6e0f9b19", "DetectTime": "2023-10-30T14:09:04.660342+02:00", "EventTime": "2023-10-30T14:09:04.660362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CiNnuX2Jof48uxnvp3"]} -{"Format": "IDEA0", "ID": "9d369dfb-35a9-4269-8118-aad5cc18a849", "DetectTime": "2023-10-30T14:09:04.711624+02:00", "EventTime": "2023-10-30T14:09:04.711642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CRFsB3B69q0q1GvKi"]} -{"Format": "IDEA0", "ID": "e9316627-dd71-42be-a3f7-dff137f135ff", "DetectTime": "2023-10-30T14:09:04.761461+02:00", "EventTime": "2023-10-30T14:09:04.761478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["Cu5NMo1HRhzSNW4MZe"]} -{"Format": "IDEA0", "ID": "c794cd16-7bd0-4ef4-9d7d-2d23a033b79f", "DetectTime": "2023-10-30T14:09:04.812971+02:00", "EventTime": "2023-10-30T14:09:04.812999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CvmAIx3jEvT9AaEObk"]} -{"Format": "Json", "ID": "c794cd16-7bd0-4ef4-9d7d-2d23a033b79f", "DetectTime": "2023-10-30T14:09:04.812971+02:00", "EventTime": "2023-10-30T14:09:04.812999+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:13:07.209138+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:04.911287)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c084db63-45c4-41dd-bb2c-bb850d4ab515", "DetectTime": "2023-10-30T14:09:04.916122+02:00", "EventTime": "2023-10-30T14:09:04.916138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CEROMA1MvJuxiRpYda"]} -{"Format": "IDEA0", "ID": "d2521b57-8058-4288-bae7-cb5bb226362b", "DetectTime": "2023-10-30T14:09:04.968938+02:00", "EventTime": "2023-10-30T14:09:04.968952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CiByOL3xnjTOVQTAjf"]} -{"Format": "IDEA0", "ID": "85c283f6-baba-435a-9a85-496482f68b23", "DetectTime": "2023-10-30T14:09:05.018614+02:00", "EventTime": "2023-10-30T14:09:05.018628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. ", "ContentType": "text/plain"}], "uids": ["C0p4kb47ff2dSkzM9k"]} -{"Format": "IDEA0", "ID": "becae11b-40e1-4ac8-891c-5c60037bd1a9", "DetectTime": "2023-10-30T14:09:05.067277+02:00", "EventTime": "2023-10-30T14:09:05.067288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["Cq5lxk2hSG8OIXhd2a"]} -{"Format": "IDEA0", "ID": "76940467-823c-4b1c-8d9b-173b2c1e7314", "DetectTime": "2023-10-30T14:09:05.118999+02:00", "EventTime": "2023-10-30T14:09:05.119028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C3xDki3zigUZmKfxc"]} -{"Format": "IDEA0", "ID": "5676a8f4-2c2a-48fc-aba8-dcc86588c059", "DetectTime": "2023-10-30T14:09:05.164271+02:00", "EventTime": "2023-10-30T14:09:05.164284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CORaD04tmubpkeQ3Ce"]} -{"Format": "IDEA0", "ID": "aafee7e3-1092-44b3-8d56-930b8c568ef7", "DetectTime": "2023-10-30T14:09:05.216043+02:00", "EventTime": "2023-10-30T14:09:05.216065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CJ7nHS2DpYq17QLeQf"]} -{"Format": "IDEA0", "ID": "37abaaa6-1ee2-4a99-9b95-235fd7b93cae", "DetectTime": "2023-10-30T14:09:05.266445+02:00", "EventTime": "2023-10-30T14:09:05.266467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12777], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. ", "ContentType": "text/plain"}], "uids": ["C0MB9x2M4BxIOkrb"]} -{"Format": "Json", "ID": "37abaaa6-1ee2-4a99-9b95-235fd7b93cae", "DetectTime": "2023-10-30T14:09:05.266445+02:00", "EventTime": "2023-10-30T14:09:05.266467+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12777], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:13:28.613021+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:05.352038)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "68651d2a-22e2-4b41-9363-0fe8111832de", "DetectTime": "2023-10-30T14:09:05.356897+02:00", "EventTime": "2023-10-30T14:09:05.356908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["CA3ReG2BftyIXCH4Cj"]} -{"Format": "IDEA0", "ID": "295e5ccd-6af0-41cb-b241-2b5cf687ef1a", "DetectTime": "2023-10-30T14:09:05.405069+02:00", "EventTime": "2023-10-30T14:09:05.405084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CgcMDX1SgFZ2cVV8Ta"]} -{"Format": "IDEA0", "ID": "2bf4fa9d-65aa-424f-8e87-b60030255210", "DetectTime": "2023-10-30T14:09:05.450453+02:00", "EventTime": "2023-10-30T14:09:05.450479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["Cm422Z2x68L2MhJuQj"]} -{"Format": "IDEA0", "ID": "244c21e7-241a-4fc5-98c8-29a29db7acfe", "DetectTime": "2023-10-30T14:09:05.494628+02:00", "EventTime": "2023-10-30T14:09:05.494655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cmaagf4MWAxugBTm1h"]} -{"Format": "IDEA0", "ID": "954303d9-4399-457c-926e-1e57e29e1bf0", "DetectTime": "2023-10-30T14:09:05.540322+02:00", "EventTime": "2023-10-30T14:09:05.540348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14433], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. ", "ContentType": "text/plain"}], "uids": ["CMisbUy9y56Vzffmg"]} -{"Format": "IDEA0", "ID": "a79b3c65-a97d-44e0-b686-0b3b48d5a021", "DetectTime": "2023-10-30T14:09:05.588620+02:00", "EventTime": "2023-10-30T14:09:05.588639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2810], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. ", "ContentType": "text/plain"}], "uids": ["CMnKRP3a1l2m8LT03l"]} -{"Format": "IDEA0", "ID": "392bc995-69aa-4701-b012-db4ca145a7ad", "DetectTime": "2023-10-30T14:09:05.636252+02:00", "EventTime": "2023-10-30T14:09:05.636264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXbeCK1bzatGPXlQY7"]} -{"Format": "IDEA0", "ID": "d143e7bc-3693-42f5-b9fb-95c55fece54b", "DetectTime": "2023-10-30T14:09:05.679093+02:00", "EventTime": "2023-10-30T14:09:05.679110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXYlZG1Qs9sOUCcBph"]} -{"Format": "Json", "ID": "d143e7bc-3693-42f5-b9fb-95c55fece54b", "DetectTime": "2023-10-30T14:09:05.679093+02:00", "EventTime": "2023-10-30T14:09:05.679110+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-06T09:22:57.962611+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:05.760910)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed4cacd5-eade-432e-8867-6a77eedd68f5", "DetectTime": "2023-10-30T14:09:05.766796+02:00", "EventTime": "2023-10-30T14:09:05.766818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CaZcDBQVsc6pUvJdc"]} -{"Format": "IDEA0", "ID": "d69272d7-0312-4a8d-9506-765c2adfc2d1", "DetectTime": "2023-10-30T14:09:05.812604+02:00", "EventTime": "2023-10-30T14:09:05.812627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CjkbE4X6rEmtERack"]} -{"Format": "IDEA0", "ID": "d903014d-58cd-43b5-b1af-0bdce5022704", "DetectTime": "2023-10-30T14:09:05.859715+02:00", "EventTime": "2023-10-30T14:09:05.859738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CpMjdI2JIoBywjpQPb"]} -{"Format": "IDEA0", "ID": "faca9bdc-638e-432a-91ee-c9a41b76517e", "DetectTime": "2023-10-30T14:09:05.900824+02:00", "EventTime": "2023-10-30T14:09:05.900846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CgtyG61NwVTHa7W4ri"]} -{"Format": "IDEA0", "ID": "836bd76b-59b8-4681-a5d1-288a3ae6e4e5", "DetectTime": "2023-10-30T14:09:05.945120+02:00", "EventTime": "2023-10-30T14:09:05.945144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C0whJy4BzNKTkEJm57"]} -{"Format": "IDEA0", "ID": "dee58faf-990e-478e-ba0a-8be6d2be404c", "DetectTime": "2023-10-30T14:09:05.967183+02:00", "EventTime": "2023-10-30T14:09:05.967200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CEpcOxtGNlKfY3ub9"]} -{"Format": "IDEA0", "ID": "7fd24636-a058-48ce-a30b-7dc3a39a8f79", "DetectTime": "2023-10-30T14:09:06.012122+02:00", "EventTime": "2023-10-30T14:09:06.012137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Czrm62NFqBQNflQpl"]} -{"Format": "IDEA0", "ID": "96a56b30-d863-4c93-92d6-5c343b216a37", "DetectTime": "2023-10-30T14:09:06.054326+02:00", "EventTime": "2023-10-30T14:09:06.054338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CGD9CN72tcnJ0TUHi"]} -{"Format": "IDEA0", "ID": "dc08ead2-81a5-434d-8a2c-19439fdca711", "DetectTime": "2023-10-30T14:09:06.076474+02:00", "EventTime": "2023-10-30T14:09:06.076499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C01AVxkUceqvAUcic"]} -{"Format": "IDEA0", "ID": "4d16ed07-d9c5-4857-9fa3-5117eeb7b99b", "DetectTime": "2023-10-30T14:09:06.120272+02:00", "EventTime": "2023-10-30T14:09:06.120291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C7nQjX38fC5k60peIh"]} -{"Format": "IDEA0", "ID": "a1a83a61-44c5-43bc-a0c1-bdffa23337b2", "DetectTime": "2023-10-30T14:09:06.145304+02:00", "EventTime": "2023-10-30T14:09:06.145322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C6BXRl1BQb8msNtPH8"]} -{"Format": "Json", "ID": "a1a83a61-44c5-43bc-a0c1-bdffa23337b2", "DetectTime": "2023-10-30T14:09:06.145304+02:00", "EventTime": "2023-10-30T14:09:06.145322+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:44:27.122474+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:06.232989)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "19417474-77ac-4e2c-a86c-05f36ec39ce5", "DetectTime": "2023-10-30T14:09:06.238799+02:00", "EventTime": "2023-10-30T14:09:06.238819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CdGwsh1N8zAAnFoOld"]} -{"Format": "IDEA0", "ID": "425f7d0d-0b3a-423a-98fc-0868e5a5679d", "DetectTime": "2023-10-30T14:09:06.268305+02:00", "EventTime": "2023-10-30T14:09:06.268332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CRUdBaknNqGaUzRB8"]} -{"Format": "IDEA0", "ID": "132d5ddc-781b-4212-b105-4da29b4c03ad", "DetectTime": "2023-10-30T14:09:06.295494+02:00", "EventTime": "2023-10-30T14:09:06.295513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CeTMHQ1pJQJQzdEaj"]} -{"Format": "IDEA0", "ID": "e95aef43-e610-49ca-ac0a-bd9af3fae9b1", "DetectTime": "2023-10-30T14:09:06.343331+02:00", "EventTime": "2023-10-30T14:09:06.343349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CYTcCW3tZ0uHh7UlU4"]} -{"Format": "IDEA0", "ID": "9abcaa96-fbc0-438a-882e-bbfb177fdf38", "DetectTime": "2023-10-30T14:09:06.370814+02:00", "EventTime": "2023-10-30T14:09:06.370837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CgYGG8Xcjq85sMNPg"]} -{"Format": "IDEA0", "ID": "b10c7116-f2a2-4189-9544-75450c310cc0", "DetectTime": "2023-10-30T14:09:06.398179+02:00", "EventTime": "2023-10-30T14:09:06.398195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cjt4bbKoBZXwHbpR1"]} -{"Format": "IDEA0", "ID": "a5b2c498-b61c-4d89-adcc-96b611fe2c60", "DetectTime": "2023-10-30T14:09:06.443410+02:00", "EventTime": "2023-10-30T14:09:06.443434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CEIIaFEHIvz03uGOe"]} -{"Format": "IDEA0", "ID": "2c704cd7-34a0-465e-828e-e12a6efa6e15", "DetectTime": "2023-10-30T14:09:06.487775+02:00", "EventTime": "2023-10-30T14:09:06.487788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Ci5T3G3gOuYZ6Gsfo9"]} -{"Format": "IDEA0", "ID": "8bd0f75a-0f1d-4b7b-97a0-54e792329122", "DetectTime": "2023-10-30T14:09:06.513132+02:00", "EventTime": "2023-10-30T14:09:06.513153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ciw2Fo2hjPCMRZziM3"]} -{"Format": "IDEA0", "ID": "93674e4d-9604-4310-bbe6-b7dc9baaf81c", "DetectTime": "2023-10-30T14:09:06.535701+02:00", "EventTime": "2023-10-30T14:09:06.535722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFTKkhjpmwBygzsf6"]} -{"Format": "IDEA0", "ID": "217e9693-ee44-4e7d-9d2c-18edfdd8e452", "DetectTime": "2023-10-30T14:09:06.573540+02:00", "EventTime": "2023-10-30T14:09:06.573552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CaRpbNpxZObhVv0B"]} -{"Format": "IDEA0", "ID": "52cd53d2-f2b0-40c6-b88b-07efe4604e59", "DetectTime": "2023-10-30T14:09:06.599533+02:00", "EventTime": "2023-10-30T14:09:06.599549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CY9TUD2IiIwZBU1uAj"]} -{"Format": "IDEA0", "ID": "4d89584a-dd0d-4854-9ed7-4f74fff86c89", "DetectTime": "2023-10-30T14:09:06.641731+02:00", "EventTime": "2023-10-30T14:09:06.641749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CiZIxC3CiwaIGPjrQ"]} -{"Format": "IDEA0", "ID": "641db6df-88f4-4b19-a3c7-c5287b0f9e24", "DetectTime": "2023-10-30T14:09:06.672171+02:00", "EventTime": "2023-10-30T14:09:06.672188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C8I9RE4suDAzAwVby5"]} -{"Format": "IDEA0", "ID": "c200ad81-98aa-4bbd-a25a-1f43b79f853f", "DetectTime": "2023-10-30T14:09:06.697755+02:00", "EventTime": "2023-10-30T14:09:06.697771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CVqt9C4TgwPe6jpS06"]} -{"Format": "IDEA0", "ID": "579c0ab4-33c5-473d-a6d0-b0491f63aeaf", "DetectTime": "2023-10-30T14:09:06.740198+02:00", "EventTime": "2023-10-30T14:09:06.740218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CGnkgm2Jz4CjlQqTkk"]} -{"Format": "IDEA0", "ID": "28b1a18b-35af-45b3-8e7e-dc0b283f3533", "DetectTime": "2023-10-30T14:09:06.765337+02:00", "EventTime": "2023-10-30T14:09:06.765348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["ChPoJv4BXrRxQNeSv2"]} -{"Format": "IDEA0", "ID": "db5def1b-626f-48dd-ae69-11ec2158403b", "DetectTime": "2023-10-30T14:09:06.790092+02:00", "EventTime": "2023-10-30T14:09:06.790114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CfCd80495rpNMTClV3"]} -{"Format": "IDEA0", "ID": "5d360a4e-1631-4c58-9694-7f60eba80b3f", "DetectTime": "2023-10-30T14:09:06.826308+02:00", "EventTime": "2023-10-30T14:09:06.826335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CEfeXcNj2suE1cSI8"]} -{"Format": "IDEA0", "ID": "418f1e46-8d10-4ee3-bd6c-9ebe8dbd1230", "DetectTime": "2023-10-30T14:09:06.855609+02:00", "EventTime": "2023-10-30T14:09:06.855630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CTMrDK3R4tGKLhAl8h"]} -{"Format": "IDEA0", "ID": "60f33581-d7af-4b80-a624-f23f0500063e", "DetectTime": "2023-10-30T14:09:06.881790+02:00", "EventTime": "2023-10-30T14:09:06.881808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["C0Z90R23ka0RMSgAa2"]} -{"Format": "IDEA0", "ID": "bafcf53e-7954-4f01-bdfb-e454bc8623c0", "DetectTime": "2023-10-30T14:09:06.912117+02:00", "EventTime": "2023-10-30T14:09:06.912141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CzGTcB205w0MdyC1j2"]} -{"Format": "IDEA0", "ID": "c4e5953e-d06d-4552-9006-b41642cd55cc", "DetectTime": "2023-10-30T14:09:06.937743+02:00", "EventTime": "2023-10-30T14:09:06.937760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CqISnj4GUN7fhA8yO9"]} -{"Format": "Json", "ID": "c4e5953e-d06d-4552-9006-b41642cd55cc", "DetectTime": "2023-10-30T14:09:06.937743+02:00", "EventTime": "2023-10-30T14:09:06.937760+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:44:48.234946+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:07.023697)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "548c789d-91c5-49fb-8a08-fb2bf8b0f2a5", "DetectTime": "2023-10-30T14:09:07.030043+02:00", "EventTime": "2023-10-30T14:09:07.030072+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CRqnr640sADTQLCL3f"]} -{"Format": "IDEA0", "ID": "d4abf62c-2381-4861-9202-7b56aeb24056", "DetectTime": "2023-10-30T14:09:07.066257+02:00", "EventTime": "2023-10-30T14:09:07.066379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C1mvYZt7jxM73RIQg"]} -{"Format": "IDEA0", "ID": "ed6a51c7-e25c-4aa7-af0a-a8fc9353511b", "DetectTime": "2023-10-30T14:09:07.091257+02:00", "EventTime": "2023-10-30T14:09:07.091274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CI9TBKInxcIS8Npt3"]} -{"Format": "IDEA0", "ID": "d14258a8-6b89-4004-af00-c9783b41298e", "DetectTime": "2023-10-30T14:09:07.116897+02:00", "EventTime": "2023-10-30T14:09:07.116918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Ci8bLb1eZXEfcpQ9Wd"]} -{"Format": "IDEA0", "ID": "6a94e719-dc6f-4090-afe2-09492b9f7128", "DetectTime": "2023-10-30T14:09:07.142992+02:00", "EventTime": "2023-10-30T14:09:07.143011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CX81F01Di0VJ6G8rb1"]} -{"Format": "IDEA0", "ID": "c4d7efc6-7652-4522-aa81-bb74ffa53f65", "DetectTime": "2023-10-30T14:09:07.170021+02:00", "EventTime": "2023-10-30T14:09:07.170034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C7pU954pvERDjktw0h"]} -{"Format": "IDEA0", "ID": "23ba4eea-52f6-4d56-81c1-dc338d63b9d4", "DetectTime": "2023-10-30T14:09:07.206711+02:00", "EventTime": "2023-10-30T14:09:07.206731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cj8PyB4fm259roUA53"]} -{"Format": "IDEA0", "ID": "1e43e6f4-d792-4c30-8cf9-65ebc5e516f3", "DetectTime": "2023-10-30T14:09:07.232742+02:00", "EventTime": "2023-10-30T14:09:07.232758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CWrgN5sRY5PykyV3g"]} -{"Format": "IDEA0", "ID": "1825d131-fde7-425f-bd02-09fce8b8ee07", "DetectTime": "2023-10-30T14:09:07.258625+02:00", "EventTime": "2023-10-30T14:09:07.258647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CR4nvY1ooTiROs22wh"]} -{"Format": "IDEA0", "ID": "aa831d89-9caa-4df4-b614-1fa5457a5405", "DetectTime": "2023-10-30T14:09:07.283932+02:00", "EventTime": "2023-10-30T14:09:07.283949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CJgiFc2n2eAh22mjdc"]} -{"Format": "IDEA0", "ID": "c91ed704-14d7-4613-85b0-b2e189ee7d15", "DetectTime": "2023-10-30T14:09:07.309432+02:00", "EventTime": "2023-10-30T14:09:07.309450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["CYzejmyb464E296G7"]} -{"Format": "IDEA0", "ID": "990761c3-6570-4631-9b8c-cd222a46cc2f", "DetectTime": "2023-10-30T14:09:07.333637+02:00", "EventTime": "2023-10-30T14:09:07.333656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CGO4oi3HNMfJb9vu99"]} -{"Format": "IDEA0", "ID": "109e2cb6-f77d-4f8f-a5f4-c71ea806a424", "DetectTime": "2023-10-30T14:09:07.360427+02:00", "EventTime": "2023-10-30T14:09:07.360444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CRuKBm4xCA60ax3BH2"]} -{"Format": "IDEA0", "ID": "e99851db-649f-48f2-81c0-99c2fe59fcb6", "DetectTime": "2023-10-30T14:09:07.384478+02:00", "EventTime": "2023-10-30T14:09:07.384504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CQwrSVI1LlPSC4ww5"]} -{"Format": "IDEA0", "ID": "0f06e65e-f5cb-4c86-afed-17f5cff12348", "DetectTime": "2023-10-30T14:09:07.423238+02:00", "EventTime": "2023-10-30T14:09:07.423259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CDa4it3Xwdu64CPlEl"]} -{"Format": "IDEA0", "ID": "6f6cf2eb-2895-48a2-8be4-8d269e94868f", "DetectTime": "2023-10-30T14:09:07.443738+02:00", "EventTime": "2023-10-30T14:09:07.443759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRBrgJFBvLaHVYP6l"]} -{"Format": "IDEA0", "ID": "adeda8f9-b000-4a0e-98c1-bc6fbfc7469a", "DetectTime": "2023-10-30T14:09:07.468547+02:00", "EventTime": "2023-10-30T14:09:07.468558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4bUsv4Tp0T71vbuHc"]} -{"Format": "IDEA0", "ID": "2573aca2-186a-4abb-b828-2b8d126ce001", "DetectTime": "2023-10-30T14:09:07.488034+02:00", "EventTime": "2023-10-30T14:09:07.488045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CwI7COvSTwJA6yzSj"]} -{"Format": "IDEA0", "ID": "05748567-d751-4cb0-af90-bcdfab0b5542", "DetectTime": "2023-10-30T14:09:07.510113+02:00", "EventTime": "2023-10-30T14:09:07.510132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CgW7szoFio3LexCL3"]} -{"Format": "IDEA0", "ID": "79eaf256-7051-4a7f-aa39-18ff2fce253e", "DetectTime": "2023-10-30T14:09:07.531265+02:00", "EventTime": "2023-10-30T14:09:07.531285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.248.108.82 ", "ContentType": "text/plain"}], "uids": ["C41Kv661X4uDYx0V8"]} -{"Format": "IDEA0", "ID": "5f2c82fb-be20-48f4-81f9-18eef6c31bf8", "DetectTime": "2023-10-30T14:09:07.550066+02:00", "EventTime": "2023-10-30T14:09:07.550083+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cs3k251pP0K10mW3v3"]} -{"Format": "IDEA0", "ID": "f7604059-617f-49f8-bec2-1696a537cc55", "DetectTime": "2023-10-30T14:09:07.585181+02:00", "EventTime": "2023-10-30T14:09:07.585200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["C2ezhz37OfcTMClkve"]} -{"Format": "IDEA0", "ID": "4d11dc35-9549-4963-812a-8380dc7f471c", "DetectTime": "2023-10-30T14:09:07.605490+02:00", "EventTime": "2023-10-30T14:09:07.605503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CV4DrK3Go3YPDNYiN7"]} -{"Format": "IDEA0", "ID": "ea3d390b-8579-4709-9182-879daf66b379", "DetectTime": "2023-10-30T14:09:07.623667+02:00", "EventTime": "2023-10-30T14:09:07.623678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CVwS602IOitj3o9c89"]} -{"Format": "IDEA0", "ID": "c3ed1808-9430-4de8-b625-3cbadccb362e", "DetectTime": "2023-10-30T14:09:07.643604+02:00", "EventTime": "2023-10-30T14:09:07.643620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cdl87qlOQjGJwBTNf"]} -{"Format": "IDEA0", "ID": "b2cba06d-8bd4-41c1-8a17-52437ea0e7ed", "DetectTime": "2023-10-30T14:09:07.663369+02:00", "EventTime": "2023-10-30T14:09:07.663382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CH6XJt1Lo0lOa1eVn7"]} -{"Format": "IDEA0", "ID": "ff9ab17a-ee85-4819-a85d-72d6680ba613", "DetectTime": "2023-10-30T14:09:07.683755+02:00", "EventTime": "2023-10-30T14:09:07.683782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C6aZDzIdxOuXKks8h"]} -{"Format": "IDEA0", "ID": "8086fd98-b30e-47b6-9a03-2b232e0ed84b", "DetectTime": "2023-10-30T14:09:07.705420+02:00", "EventTime": "2023-10-30T14:09:07.705436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CAhVxOOAXxHwTaB27"]} -{"Format": "IDEA0", "ID": "c007caa4-47ab-4d9e-ba88-81cc2f496a04", "DetectTime": "2023-10-30T14:09:07.728776+02:00", "EventTime": "2023-10-30T14:09:07.728796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRfb7W3nMm6XPPIa38"]} -{"Format": "IDEA0", "ID": "10921bd7-aa4f-42aa-8201-0004f118b9e3", "DetectTime": "2023-10-30T14:09:07.750256+02:00", "EventTime": "2023-10-30T14:09:07.750276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CxPSE317E9BCz9iEY4"]} -{"Format": "IDEA0", "ID": "bf8ce279-f2fd-4968-be1d-bda9e1c264b4", "DetectTime": "2023-10-30T14:09:07.771163+02:00", "EventTime": "2023-10-30T14:09:07.771184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Cogxc13H8iaZUg4OC5"]} -{"Format": "IDEA0", "ID": "61653df3-e92b-4045-ac73-d649cf011050", "DetectTime": "2023-10-30T14:09:07.793283+02:00", "EventTime": "2023-10-30T14:09:07.793305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CrswSV1M4b6VPVzur6"]} -{"Format": "IDEA0", "ID": "3cffd911-f423-4900-b4c2-c2bddb48f223", "DetectTime": "2023-10-30T14:09:07.814558+02:00", "EventTime": "2023-10-30T14:09:07.814569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CV8ovq28EziyghXgH7"]} -{"Format": "IDEA0", "ID": "c5a91be0-ddb2-4f90-bff4-9d9d56125e16", "DetectTime": "2023-10-30T14:09:07.833873+02:00", "EventTime": "2023-10-30T14:09:07.833902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CSOYES3CFBN20BsW93"]} -{"Format": "IDEA0", "ID": "c5b01c66-4080-4816-a292-2ce60110751b", "DetectTime": "2023-10-30T14:09:07.881769+02:00", "EventTime": "2023-10-30T14:09:07.881786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CeWytTo8QDFehIEw8"]} -{"Format": "IDEA0", "ID": "b3c21dc9-5a1c-419d-9a99-97006434dae8", "DetectTime": "2023-10-30T14:09:07.901368+02:00", "EventTime": "2023-10-30T14:09:07.901387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Co5pk8AIA0ra3FMi1"]} -{"Format": "IDEA0", "ID": "21b43fb1-6fa9-4115-aa43-5294c783493b", "DetectTime": "2023-10-30T14:09:07.922112+02:00", "EventTime": "2023-10-30T14:09:07.922128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CFEwbu35Q9IND3YPOd"]} -{"Format": "IDEA0", "ID": "6ec88ce0-8db7-4584-96ed-d4a31cf6fb88", "DetectTime": "2023-10-30T14:09:07.942204+02:00", "EventTime": "2023-10-30T14:09:07.942220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CVShxe2v72kgQ2ykb1"]} -{"Format": "IDEA0", "ID": "9bea6998-9eb8-427b-bfde-b3920e7d0b6a", "DetectTime": "2023-10-30T14:09:07.963490+02:00", "EventTime": "2023-10-30T14:09:07.963501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cf6Xlv2LXT5Ztsdbok"]} -{"Format": "IDEA0", "ID": "2969c761-e0ad-47fa-8ebd-6f65d89cce7f", "DetectTime": "2023-10-30T14:09:07.984044+02:00", "EventTime": "2023-10-30T14:09:07.984057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CjdUUE1mwotPZDwhq1"]} -{"Format": "IDEA0", "ID": "64f5b835-6a3b-4399-98ef-e1da681232e8", "DetectTime": "2023-10-30T14:09:08.005751+02:00", "EventTime": "2023-10-30T14:09:08.005778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CsxsxG2U88BckrHP52"]} -{"Format": "IDEA0", "ID": "d9a1a3fb-3200-4d9c-ac9b-af9723b20be2", "DetectTime": "2023-10-30T14:09:08.025192+02:00", "EventTime": "2023-10-30T14:09:08.025211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CDhkSI1bjUv0bbgVbf"]} -{"Format": "IDEA0", "ID": "263a4820-c3b6-498c-910c-dc09ac696008", "DetectTime": "2023-10-30T14:09:08.046472+02:00", "EventTime": "2023-10-30T14:09:08.046487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cx0vkP2awoM0gZppAk"]} -{"Format": "IDEA0", "ID": "3e844512-3731-47c0-9cc7-16476e98e4dd", "DetectTime": "2023-10-30T14:09:08.067840+02:00", "EventTime": "2023-10-30T14:09:08.067858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CeJBZRwMG8TGpBsX"]} -{"Format": "IDEA0", "ID": "eee1e92a-3d8d-4990-98b7-5b15eb202a95", "DetectTime": "2023-10-30T14:09:08.087374+02:00", "EventTime": "2023-10-30T14:09:08.087393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["Ci1CAr3g4DY6zm8By5"]} -{"Format": "IDEA0", "ID": "27be13c6-f2e6-4b47-9778-b015e302fadf", "DetectTime": "2023-10-30T14:09:08.112000+02:00", "EventTime": "2023-10-30T14:09:08.112023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CJgeK03Pqurv9lZ22d"]} -{"Format": "IDEA0", "ID": "1b079696-6010-4256-9b20-ecd1d56c86ac", "DetectTime": "2023-10-30T14:09:08.135136+02:00", "EventTime": "2023-10-30T14:09:08.135154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CXdvm54oB73IqfLiFc"]} -{"Format": "IDEA0", "ID": "ec11ff49-34c1-43a9-bcc5-b76d499cba19", "DetectTime": "2023-10-30T14:09:08.159380+02:00", "EventTime": "2023-10-30T14:09:08.159399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.231.214.106 ", "ContentType": "text/plain"}], "uids": ["CBINic3PQ0uxUOg26h"]} -{"Format": "IDEA0", "ID": "1ec1fab6-8adf-4065-b70b-881b31eb4135", "DetectTime": "2023-10-30T14:09:08.186232+02:00", "EventTime": "2023-10-30T14:09:08.186253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CrdNQw4v7dapEH977b"]} -{"Format": "IDEA0", "ID": "6a7fce65-f74b-415c-b2ae-a64b85a1600d", "DetectTime": "2023-10-30T14:09:08.209504+02:00", "EventTime": "2023-10-30T14:09:08.209520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["ClRwgY3EblNMhVf4n7"]} -{"Format": "IDEA0", "ID": "b2bb7963-ca18-4057-bd71-f0ce67119b98", "DetectTime": "2023-10-30T14:09:08.230547+02:00", "EventTime": "2023-10-30T14:09:08.230571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CalGHe2SGPn6oMIvib"]} -{"Format": "IDEA0", "ID": "00cef91d-b3b3-435d-a44d-5397606aabc4", "DetectTime": "2023-10-30T14:09:08.254972+02:00", "EventTime": "2023-10-30T14:09:08.254989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CsrGdp1INtHycQtH"]} -{"Format": "IDEA0", "ID": "e4f11bd9-40fd-4efe-a568-c358198ab98d", "DetectTime": "2023-10-30T14:09:08.295944+02:00", "EventTime": "2023-10-30T14:09:08.295965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CPDVjkXUwR3CQVgd9"]} -{"Format": "IDEA0", "ID": "13c0ae72-b722-4cd1-b6a1-e4d2cb8d8ec2", "DetectTime": "2023-10-30T14:09:08.316156+02:00", "EventTime": "2023-10-30T14:09:08.316167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGwYcKfYwqYuOD2Gg"]} -{"Format": "IDEA0", "ID": "6ef7ee69-9e85-40bf-84b8-b173d8a7cd65", "DetectTime": "2023-10-30T14:09:08.336986+02:00", "EventTime": "2023-10-30T14:09:08.336997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C38kZ137JDfghU89Y"]} -{"Format": "IDEA0", "ID": "917bc763-179c-4f00-8bb2-09b043371857", "DetectTime": "2023-10-30T14:09:08.356558+02:00", "EventTime": "2023-10-30T14:09:08.356575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CUoATw1jJLUDiXU1nf"]} -{"Format": "IDEA0", "ID": "1f6eb6c2-8311-456d-a42a-0d2ad72e2914", "DetectTime": "2023-10-30T14:09:08.379494+02:00", "EventTime": "2023-10-30T14:09:08.379509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CNaPMl2rpq0O4xaBU9"]} -{"Format": "IDEA0", "ID": "9e08559c-123f-427d-beb3-7924b7e0b9d5", "DetectTime": "2023-10-30T14:09:08.401400+02:00", "EventTime": "2023-10-30T14:09:08.401418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ckok9D1iDdJZlZUEJ9"]} -{"Format": "IDEA0", "ID": "3b1eedcd-e4ac-4fff-8aa5-1fb379ab5083", "DetectTime": "2023-10-30T14:09:08.422172+02:00", "EventTime": "2023-10-30T14:09:08.422189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CmfgrO1qZTzzMMKzvf"]} -{"Format": "IDEA0", "ID": "a10f8468-794d-460f-9b0f-da84e61eb7a7", "DetectTime": "2023-10-30T14:09:08.445470+02:00", "EventTime": "2023-10-30T14:09:08.445492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CHZw2v1jEwwrTHduQ"]} -{"Format": "IDEA0", "ID": "44600bb9-52cf-4261-ba4e-e9cfc3167693", "DetectTime": "2023-10-30T14:09:08.466925+02:00", "EventTime": "2023-10-30T14:09:08.466944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CrCAHn19IdlUMkbhh1"]} -{"Format": "IDEA0", "ID": "e355ec5f-4700-40f8-a7ec-f806c015af5b", "DetectTime": "2023-10-30T14:09:08.487792+02:00", "EventTime": "2023-10-30T14:09:08.487806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CuIzmY3owsEQuItE5b"]} -{"Format": "IDEA0", "ID": "64b8d516-4098-4aa0-8616-287fea74bf03", "DetectTime": "2023-10-30T14:09:08.508014+02:00", "EventTime": "2023-10-30T14:09:08.508032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CSGoy82qXWPGNzwhmj"]} -{"Format": "IDEA0", "ID": "0e7f13c5-7f9f-45a5-ac44-75ae67233605", "DetectTime": "2023-10-30T14:09:08.528398+02:00", "EventTime": "2023-10-30T14:09:08.528417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C5ORhb4N7VJx3w0Q27"]} -{"Format": "IDEA0", "ID": "9bc44959-945e-4da7-b3f9-6b9ec1316c49", "DetectTime": "2023-10-30T14:09:08.547827+02:00", "EventTime": "2023-10-30T14:09:08.547842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C5dsHi41UG0GU0nF2e"]} -{"Format": "IDEA0", "ID": "42e65814-749f-4f76-8c38-c41905bbc2ea", "DetectTime": "2023-10-30T14:09:08.564345+02:00", "EventTime": "2023-10-30T14:09:08.564363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cw3g0LuWRKOh2aRc6"]} -{"Format": "IDEA0", "ID": "2883c9e7-f734-4c07-bbc5-04fe93aeed6c", "DetectTime": "2023-10-30T14:09:08.583859+02:00", "EventTime": "2023-10-30T14:09:08.583876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CSl6qv3oIlBSF8j2Mf"]} -{"Format": "IDEA0", "ID": "b0d11b2c-fca1-4fad-b631-cece878c1f88", "DetectTime": "2023-10-30T14:09:08.603973+02:00", "EventTime": "2023-10-30T14:09:08.603986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CkcXUr2kYvoELHNf6a"]} -{"Format": "IDEA0", "ID": "23f2e370-a6ff-49ba-ad2e-0d68ac921e29", "DetectTime": "2023-10-30T14:09:08.622888+02:00", "EventTime": "2023-10-30T14:09:08.622913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CSiva12w8T7Sm4o1Lg"]} -{"Format": "IDEA0", "ID": "c9fdd312-d605-44ca-bc48-e304844b2950", "DetectTime": "2023-10-30T14:09:08.642454+02:00", "EventTime": "2023-10-30T14:09:08.642467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CKT1t34yGqCgYCtsh8"]} -{"Format": "IDEA0", "ID": "86e17ee0-ca38-4fb4-a11e-b3388ae423c7", "DetectTime": "2023-10-30T14:09:08.661167+02:00", "EventTime": "2023-10-30T14:09:08.661178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CSCPCV3jONOZj5MwN2"]} -{"Format": "IDEA0", "ID": "a93e57fb-9563-405c-bc25-03c06d121ccc", "DetectTime": "2023-10-30T14:09:08.680406+02:00", "EventTime": "2023-10-30T14:09:08.680424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CKt1nEgDYgMdBNzy"]} -{"Format": "IDEA0", "ID": "45d549f2-b4a1-4235-91c7-5d10896816c8", "DetectTime": "2023-10-30T14:09:08.700124+02:00", "EventTime": "2023-10-30T14:09:08.700138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CTduHYzrEODaApefb"]} -{"Format": "IDEA0", "ID": "b8407234-bcc9-4104-877a-3f5f29422021", "DetectTime": "2023-10-30T14:09:08.718576+02:00", "EventTime": "2023-10-30T14:09:08.718594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CQHgLW3xZ2eP6krcHa"]} -{"Format": "IDEA0", "ID": "87c14cef-cd0e-4b49-85f4-30566f4b4658", "DetectTime": "2023-10-30T14:09:08.739604+02:00", "EventTime": "2023-10-30T14:09:08.739620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CfdmZC4aumcgbbGLL"]} -{"Format": "IDEA0", "ID": "f14f5960-f2d9-4cbc-b21b-a08b1cd5e6b6", "DetectTime": "2023-10-30T14:09:08.759701+02:00", "EventTime": "2023-10-30T14:09:08.759713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13102], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. ", "ContentType": "text/plain"}], "uids": ["CK4TPG3tmCprdaQJs"]} -{"Format": "IDEA0", "ID": "5c2fbc44-1478-400d-b738-cb980024358d", "DetectTime": "2023-10-30T14:09:08.791899+02:00", "EventTime": "2023-10-30T14:09:08.791918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CFEasa2JPRaIfgHVn2"]} -{"Format": "IDEA0", "ID": "e7a343c5-55b7-4632-bd78-fa17c3494cc8", "DetectTime": "2023-10-30T14:09:08.813490+02:00", "EventTime": "2023-10-30T14:09:08.813512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CE54x61I6JQr43iHVa"]} -{"Format": "IDEA0", "ID": "5ad49ab0-7b83-45df-a45d-3e24bb129a1a", "DetectTime": "2023-10-30T14:09:08.831848+02:00", "EventTime": "2023-10-30T14:09:08.831874+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 24.139.178.44 from 10.0.2.19. blacklisted IP AS: LCPRL, US AS1463 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C79c923GfyR8pZPmx7"]} -{"Format": "IDEA0", "ID": "a8aa3408-3cea-42bf-ac62-c5066b55566c", "DetectTime": "2023-10-30T14:09:08.865085+02:00", "EventTime": "2023-10-30T14:09:08.865097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CjOjTG26hpKRutQdK2"]} -{"Format": "IDEA0", "ID": "ab55c4ff-25c4-4dd8-965c-b5ffa9af9211", "DetectTime": "2023-10-30T14:09:08.882402+02:00", "EventTime": "2023-10-30T14:09:08.882414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CzCjv6j5r9ZJD9cQj"]} -{"Format": "IDEA0", "ID": "2be97651-c8be-4b7a-b87a-3f7f6b6f33bc", "DetectTime": "2023-10-30T14:09:08.898039+02:00", "EventTime": "2023-10-30T14:09:08.898053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CufBY53SToIDlMS5Qh"]} -{"Format": "IDEA0", "ID": "2ca33339-c1c0-40b4-ba82-cde88d7c2743", "DetectTime": "2023-10-30T14:09:08.912769+02:00", "EventTime": "2023-10-30T14:09:08.912787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CAPiIhAOpp9OOVqz3"]} -{"Format": "IDEA0", "ID": "918c05ed-60af-47cc-8789-d91a5e7cc1e7", "DetectTime": "2023-10-30T14:09:08.927021+02:00", "EventTime": "2023-10-30T14:09:08.927033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CJnPhu6CdnQtZrfie"]} -{"Format": "IDEA0", "ID": "39e7a4a2-aa92-460a-b0f9-5870838a77b3", "DetectTime": "2023-10-30T14:09:08.942086+02:00", "EventTime": "2023-10-30T14:09:08.942097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CiMvpfZlfQoCmjR01"]} -{"Format": "IDEA0", "ID": "f5e08bbc-fbe8-49d5-8308-eb0db45550f2", "DetectTime": "2023-10-30T14:09:08.958576+02:00", "EventTime": "2023-10-30T14:09:08.958591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CYoL765YimHfMIre2"]} -{"Format": "IDEA0", "ID": "5cc98695-b720-4ac9-a369-18fd6eebcc90", "DetectTime": "2023-10-30T14:09:08.974200+02:00", "EventTime": "2023-10-30T14:09:08.974216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CD1woK3hzdbMsPMJE8"]} -{"Format": "IDEA0", "ID": "456f45a1-6cd5-4be2-85e0-928ed89ece76", "DetectTime": "2023-10-30T14:09:08.990954+02:00", "EventTime": "2023-10-30T14:09:08.990980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CWkmf21gfCP2EdDeq7"]} -{"Format": "IDEA0", "ID": "a3d3cdad-a514-4513-9d4f-948913499eb2", "DetectTime": "2023-10-30T14:09:09.007083+02:00", "EventTime": "2023-10-30T14:09:09.007096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbihzVIvbhF6Kur52"]} -{"Format": "IDEA0", "ID": "ece31c50-6b3e-4f95-adf8-f14e8916ead7", "DetectTime": "2023-10-30T14:09:09.024638+02:00", "EventTime": "2023-10-30T14:09:09.024654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CcTBDm14JUtku6p6id"]} -{"Format": "IDEA0", "ID": "d0143477-b9c4-4159-bd16-e07270fa74b8", "DetectTime": "2023-10-30T14:09:09.041300+02:00", "EventTime": "2023-10-30T14:09:09.041312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLrybB27Xd051ji4s"]} -{"Format": "IDEA0", "ID": "fd3d3819-013d-4ae9-902b-2bd61f9b1267", "DetectTime": "2023-10-30T14:09:09.056373+02:00", "EventTime": "2023-10-30T14:09:09.056385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CJCCpt2cE9skyS3EX1"]} -{"Format": "IDEA0", "ID": "1a98a48a-89ee-47c4-bb4c-fb9551b8e8b9", "DetectTime": "2023-10-30T14:09:09.069819+02:00", "EventTime": "2023-10-30T14:09:09.069830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmJNrUBVjXSmID54h"]} -{"Format": "IDEA0", "ID": "3ef5d8a1-881e-494d-a4c1-128b58fedea4", "DetectTime": "2023-10-30T14:09:09.082145+02:00", "EventTime": "2023-10-30T14:09:09.082157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cga46BntlSVXGVJsd"]} -{"Format": "IDEA0", "ID": "8cdd47de-0e21-40c9-b717-1d1e89d182a5", "DetectTime": "2023-10-30T14:09:09.098005+02:00", "EventTime": "2023-10-30T14:09:09.098016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["CDT2Tr1nnsaYMUQax4"]} -{"Format": "IDEA0", "ID": "f1ed523f-d6a5-4dd8-b62f-a9cb429047a7", "DetectTime": "2023-10-30T14:09:09.110767+02:00", "EventTime": "2023-10-30T14:09:09.110805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CIpMmo2qbPdklbpaS"]} -{"Format": "IDEA0", "ID": "910f5607-a567-4091-8422-8a5cce640f07", "DetectTime": "2023-10-30T14:09:09.125711+02:00", "EventTime": "2023-10-30T14:09:09.125722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CZCKOm33jTWv7YXjeb"]} -{"Format": "IDEA0", "ID": "6c78dac6-de73-4f86-834d-c66deaae7b32", "DetectTime": "2023-10-30T14:09:09.141619+02:00", "EventTime": "2023-10-30T14:09:09.141630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CLUBIc3HpRp0uHDtDa"]} -{"Format": "IDEA0", "ID": "b4912fdc-1a5c-4df0-9f0a-8459776e4d0e", "DetectTime": "2023-10-30T14:09:09.157075+02:00", "EventTime": "2023-10-30T14:09:09.157087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CNeZcE4ZuOly4fODwf"]} -{"Format": "IDEA0", "ID": "c9ebfab3-2089-4d0e-a95d-7e3aad7f0f37", "DetectTime": "2023-10-30T14:09:09.174251+02:00", "EventTime": "2023-10-30T14:09:09.174267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CxH1Sl1bB2nB9OT9If"]} -{"Format": "IDEA0", "ID": "da06e3ed-8494-4494-8fac-1a1b50158c1b", "DetectTime": "2023-10-30T14:09:09.190964+02:00", "EventTime": "2023-10-30T14:09:09.190981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CKEtAv4lrKqWV6Xlzj"]} -{"Format": "IDEA0", "ID": "2220027d-070b-4f05-994e-6621e4456788", "DetectTime": "2023-10-30T14:09:09.209058+02:00", "EventTime": "2023-10-30T14:09:09.209075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CpzlXTD9Usv8kF2Ce"]} -{"Format": "IDEA0", "ID": "e672bb6a-c059-40fa-b489-4bdeb7504ea2", "DetectTime": "2023-10-30T14:09:09.245632+02:00", "EventTime": "2023-10-30T14:09:09.245651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cp3bAk2bBfDbl00BG1"]} -{"Format": "IDEA0", "ID": "ac7c3849-10e6-4deb-903a-78b7994667c7", "DetectTime": "2023-10-30T14:09:09.265350+02:00", "EventTime": "2023-10-30T14:09:09.265371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CWYVX7qsxU5UGeeVe"]} -{"Format": "IDEA0", "ID": "8ab46cd7-689e-4151-b16e-5b8b144139c5", "DetectTime": "2023-10-30T14:09:09.285140+02:00", "EventTime": "2023-10-30T14:09:09.285161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CjnHOtPVNJXW8s3Ec"]} -{"Format": "IDEA0", "ID": "e29b0f46-1967-4196-8dcd-b83f356148b3", "DetectTime": "2023-10-30T14:09:09.302016+02:00", "EventTime": "2023-10-30T14:09:09.302027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C77sUo1KgXxZhO3Oyb"]} -{"Format": "IDEA0", "ID": "00732564-2408-4c21-8cf1-707462d98939", "DetectTime": "2023-10-30T14:09:09.314582+02:00", "EventTime": "2023-10-30T14:09:09.314609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CsKAax48PjecPx92qk"]} -{"Format": "IDEA0", "ID": "26d45d08-3509-485f-873e-51e54489fa94", "DetectTime": "2023-10-30T14:09:09.334155+02:00", "EventTime": "2023-10-30T14:09:09.334177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CLRY3847vRbk5uMZi3"]} -{"Format": "IDEA0", "ID": "4ef9afa0-7a9a-4639-86ab-4e24597f9d02", "DetectTime": "2023-10-30T14:09:09.351292+02:00", "EventTime": "2023-10-30T14:09:09.351303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CfzKB81914NPbOtlha"]} -{"Format": "IDEA0", "ID": "8ae0b364-18bc-4c64-9d67-4ff13b90c769", "DetectTime": "2023-10-30T14:09:09.368346+02:00", "EventTime": "2023-10-30T14:09:09.368368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CEVVAV20oujQPbPr48"]} -{"Format": "IDEA0", "ID": "dd20c6df-5a82-431a-b42f-00e3808d6f1c", "DetectTime": "2023-10-30T14:09:09.386543+02:00", "EventTime": "2023-10-30T14:09:09.386563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CH35riW2vo4bPg9c1"]} -{"Format": "IDEA0", "ID": "7ce1539a-ff52-443c-b0c9-7cee9d784b98", "DetectTime": "2023-10-30T14:09:09.404929+02:00", "EventTime": "2023-10-30T14:09:09.404949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.117.252.6 ", "ContentType": "text/plain"}], "uids": ["C6xjurnBfdwDhJxR1"]} -{"Format": "IDEA0", "ID": "1f8cd34d-cad5-4e27-8db5-2afcfd9607b6", "DetectTime": "2023-10-30T14:09:09.423484+02:00", "EventTime": "2023-10-30T14:09:09.423504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVJtEF2nz20jR9gDr3"]} -{"Format": "IDEA0", "ID": "2638d0b4-c34e-4788-8b7b-9c781279a375", "DetectTime": "2023-10-30T14:09:09.441970+02:00", "EventTime": "2023-10-30T14:09:09.441987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbHMHr3ZYVifWvMh4j"]} -{"Format": "IDEA0", "ID": "0b654af4-8e06-47b0-9fd5-d0631a2e7247", "DetectTime": "2023-10-30T14:09:09.459391+02:00", "EventTime": "2023-10-30T14:09:09.459406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CZCIvU2OQxkSGMWtGl"]} -{"Format": "IDEA0", "ID": "927b5e13-52b0-4bd9-95cf-7f80350e8117", "DetectTime": "2023-10-30T14:09:09.477283+02:00", "EventTime": "2023-10-30T14:09:09.477299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CnAFDI2hAgUea83Fzd"]} -{"Format": "IDEA0", "ID": "0a5ab0bd-92cf-4d32-9d69-73c5234e2663", "DetectTime": "2023-10-30T14:09:09.494297+02:00", "EventTime": "2023-10-30T14:09:09.494322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CbDJtc3m8UoAIPk3ng"]} -{"Format": "IDEA0", "ID": "f187dbcb-1ee9-48f5-979c-47166b628ac6", "DetectTime": "2023-10-30T14:09:09.511617+02:00", "EventTime": "2023-10-30T14:09:09.511634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CC5Az5hnrazFqwmI4"]} -{"Format": "IDEA0", "ID": "f15a3c58-c88e-4418-9c2e-b7908b81048a", "DetectTime": "2023-10-30T14:09:09.527176+02:00", "EventTime": "2023-10-30T14:09:09.527193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ca51mw1EN0GeK2COxh"]} -{"Format": "IDEA0", "ID": "b912c40c-3e8a-4d3d-b5aa-29ff04b6400c", "DetectTime": "2023-10-30T14:09:09.542641+02:00", "EventTime": "2023-10-30T14:09:09.542654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CYMyT84YcSdrlhUpv9"]} -{"Format": "IDEA0", "ID": "3c5ccbad-eead-4ec4-bc70-5b4f48067def", "DetectTime": "2023-10-30T14:09:09.558834+02:00", "EventTime": "2023-10-30T14:09:09.558846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CozPXp181ncgCFEiCj"]} -{"Format": "IDEA0", "ID": "7c569e63-7bd1-4caa-8ac0-776178d88e36", "DetectTime": "2023-10-30T14:09:09.575552+02:00", "EventTime": "2023-10-30T14:09:09.575573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CWNyMsBazEA6NbQNa"]} -{"Format": "IDEA0", "ID": "409ac553-d89e-404b-b0f8-970a52cb78cd", "DetectTime": "2023-10-30T14:09:09.593723+02:00", "EventTime": "2023-10-30T14:09:09.593751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CNnO033246XNAlq8Yi"]} -{"Format": "IDEA0", "ID": "0bd87cfe-2036-4b2b-9f02-72d9c0811395", "DetectTime": "2023-10-30T14:09:09.611121+02:00", "EventTime": "2023-10-30T14:09:09.611138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CdBhO82uGQv7228lE4"]} -{"Format": "IDEA0", "ID": "36e08a9b-e9fc-49b7-9281-c80f4d893906", "DetectTime": "2023-10-30T14:09:09.630060+02:00", "EventTime": "2023-10-30T14:09:09.630080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CG0VT7278jjLGLovU5"]} -{"Format": "IDEA0", "ID": "d17ab9dc-fafb-4890-b598-c199a90bf0bd", "DetectTime": "2023-10-30T14:09:09.649255+02:00", "EventTime": "2023-10-30T14:09:09.649278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CTryYu2NjFusO5DApa"]} -{"Format": "IDEA0", "ID": "4adc02a2-3272-4c9f-9a09-c321b02f4377", "DetectTime": "2023-10-30T14:09:09.663510+02:00", "EventTime": "2023-10-30T14:09:09.663531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["ClQydi37nO6GT96DMc"]} -{"Format": "IDEA0", "ID": "03866edc-683c-4477-b497-923b8c06b4b0", "DetectTime": "2023-10-30T14:09:09.677943+02:00", "EventTime": "2023-10-30T14:09:09.677958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CBXclW2gmXvWDLqbE8"]} -{"Format": "IDEA0", "ID": "c79af6d8-832c-48f6-8af2-349857ff18dc", "DetectTime": "2023-10-30T14:09:09.694940+02:00", "EventTime": "2023-10-30T14:09:09.694956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [24770], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. ", "ContentType": "text/plain"}], "uids": ["CMlJJc1wi44evG6Kra"]} -{"Format": "IDEA0", "ID": "dc2ac813-9eb3-4f43-a950-e804a232fbd5", "DetectTime": "2023-10-30T14:09:09.729656+02:00", "EventTime": "2023-10-30T14:09:09.729668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Crb5lw1aStJo2aAro5"]} -{"Format": "IDEA0", "ID": "7bcd0cb5-1732-46b2-84fa-56d6f0aeb4a4", "DetectTime": "2023-10-30T14:09:09.743209+02:00", "EventTime": "2023-10-30T14:09:09.743220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CPKtM93nl97DaYBf4h"]} -{"Format": "IDEA0", "ID": "502252f4-64ef-4c03-8b38-bb75cf2c6fc1", "DetectTime": "2023-10-30T14:09:09.757477+02:00", "EventTime": "2023-10-30T14:09:09.757490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Ck6rCC2gYSryxAiJm"]} -{"Format": "IDEA0", "ID": "b6af1ad6-a299-4639-be45-a2c9a224845a", "DetectTime": "2023-10-30T14:09:09.770757+02:00", "EventTime": "2023-10-30T14:09:09.770773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C9g78w22DAqNTkNlB4"]} -{"Format": "IDEA0", "ID": "0614f676-e20d-4959-8e11-3f8a026ac246", "DetectTime": "2023-10-30T14:09:09.787147+02:00", "EventTime": "2023-10-30T14:09:09.787170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CTwi2F175rwtepxxyb"]} -{"Format": "IDEA0", "ID": "113e2845-0689-4d86-a311-0ecdf8d41294", "DetectTime": "2023-10-30T14:09:09.803683+02:00", "EventTime": "2023-10-30T14:09:09.803695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CkLCm133ckdREyhw0c"]} -{"Format": "IDEA0", "ID": "46cc012b-0dfb-47dc-bd93-7db0ca91ad9f", "DetectTime": "2023-10-30T14:09:09.817789+02:00", "EventTime": "2023-10-30T14:09:09.817806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CG9BTjJyRZT8596h2"]} -{"Format": "IDEA0", "ID": "a779e111-47f7-4808-bd91-b80e9ed4662e", "DetectTime": "2023-10-30T14:09:09.833848+02:00", "EventTime": "2023-10-30T14:09:09.833870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cus3HO1tOmXvnQAVbj"]} -{"Format": "IDEA0", "ID": "eae0f2fe-39f7-40c5-9499-27da924b6db5", "DetectTime": "2023-10-30T14:09:09.853455+02:00", "EventTime": "2023-10-30T14:09:09.853472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cg9HTY2QcgC3PLWp8e"]} -{"Format": "IDEA0", "ID": "aa9560df-8324-4e2f-9fdb-8e7f82ff17ec", "DetectTime": "2023-10-30T14:09:09.872706+02:00", "EventTime": "2023-10-30T14:09:09.872726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CuCbHl4MMdmONbKnJl"]} -{"Format": "IDEA0", "ID": "8167b130-78c3-4f66-8cd0-01626ba66d2e", "DetectTime": "2023-10-30T14:09:09.886329+02:00", "EventTime": "2023-10-30T14:09:09.886348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CYPTgtGqItbBoHsqd"]} -{"Format": "IDEA0", "ID": "8f8a2151-95ff-4b56-a7c8-ec18a2e99219", "DetectTime": "2023-10-30T14:09:09.903419+02:00", "EventTime": "2023-10-30T14:09:09.903436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cdw0sk41oP67svXtoc"]} -{"Format": "IDEA0", "ID": "086819ac-c7ff-47ff-bc11-10350d071ef3", "DetectTime": "2023-10-30T14:09:09.917260+02:00", "EventTime": "2023-10-30T14:09:09.917272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C3KXIc1lDBMKwqYZO1"]} -{"Format": "IDEA0", "ID": "6a5afdbd-72f7-4549-9627-824467c7a7de", "DetectTime": "2023-10-30T14:09:09.932653+02:00", "EventTime": "2023-10-30T14:09:09.932679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CfZSWm3xbILiLd4Kkf"]} -{"Format": "IDEA0", "ID": "6ae1002b-df58-44b0-a4a6-f589a52288d6", "DetectTime": "2023-10-30T14:09:09.952389+02:00", "EventTime": "2023-10-30T14:09:09.952409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CjZ5AG3KeWQLP7av6g"]} -{"Format": "IDEA0", "ID": "0cb906a7-a296-4296-b4ab-746c75d13310", "DetectTime": "2023-10-30T14:09:09.973737+02:00", "EventTime": "2023-10-30T14:09:09.973758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CujrRd1aWWph7WGwD3"]} -{"Format": "IDEA0", "ID": "eb2311a1-b119-49c0-969d-b4ff641567c9", "DetectTime": "2023-10-30T14:09:09.994573+02:00", "EventTime": "2023-10-30T14:09:09.994587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CJHJii2A0L8iY5jcGg"]} -{"Format": "IDEA0", "ID": "91bdd501-971b-4ed4-89af-a98e93332b55", "DetectTime": "2023-10-30T14:09:10.012046+02:00", "EventTime": "2023-10-30T14:09:10.012062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CUvDWpNPUfyF9K4Q4"]} -{"Format": "IDEA0", "ID": "48b68197-bb7e-4c0e-8974-1bf07c42da29", "DetectTime": "2023-10-30T14:09:10.031701+02:00", "EventTime": "2023-10-30T14:09:10.031718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CmKnHP1QvLYqxapVNh"]} -{"Format": "IDEA0", "ID": "4e6fea23-e695-4885-830c-00a9409a4ef4", "DetectTime": "2023-10-30T14:09:10.052452+02:00", "EventTime": "2023-10-30T14:09:10.052469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["Cjlrt23zyFL3pAQ2Lf"]} -{"Format": "IDEA0", "ID": "cedbea6f-78e3-43fc-b944-fbc2e626e1e0", "DetectTime": "2023-10-30T14:09:10.068734+02:00", "EventTime": "2023-10-30T14:09:10.068750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7l7xq34C5qxIFZvqg"]} -{"Format": "IDEA0", "ID": "792ce95a-210a-4e29-9451-5e0a3733162a", "DetectTime": "2023-10-30T14:09:10.085937+02:00", "EventTime": "2023-10-30T14:09:10.085949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C3SU7J286iCQMeHHdc"]} -{"Format": "IDEA0", "ID": "6e444875-df79-4052-bbb8-92d9bb3e6c04", "DetectTime": "2023-10-30T14:09:10.104623+02:00", "EventTime": "2023-10-30T14:09:10.104642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRCkov4NWxhhoO2T8f"]} -{"Format": "IDEA0", "ID": "b7eacdec-77d9-4e2f-9066-746670789f2b", "DetectTime": "2023-10-30T14:09:10.123304+02:00", "EventTime": "2023-10-30T14:09:10.123323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cf9sQpO8hDzL2nI4j"]} -{"Format": "IDEA0", "ID": "413caf04-6e3c-45c3-b130-abb4b85a30d8", "DetectTime": "2023-10-30T14:09:10.142678+02:00", "EventTime": "2023-10-30T14:09:10.142695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CsEtgU3ysUA2mT0dob"]} -{"Format": "IDEA0", "ID": "8054a659-b769-41ef-8a5d-02513d771b3a", "DetectTime": "2023-10-30T14:09:10.164413+02:00", "EventTime": "2023-10-30T14:09:10.164435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CduJhp20FAHhkxkExl"]} -{"Format": "IDEA0", "ID": "cef2f905-96bd-4fc3-9e43-2a61a4b2e03e", "DetectTime": "2023-10-30T14:09:10.186637+02:00", "EventTime": "2023-10-30T14:09:10.186657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CwEYqp446zKS9PCJBb"]} -{"Format": "IDEA0", "ID": "9837cb59-6dbd-45e3-a335-134bb3ceab26", "DetectTime": "2023-10-30T14:09:10.203700+02:00", "EventTime": "2023-10-30T14:09:10.203711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CkVJi2NbyGU64Q1T8"]} -{"Format": "IDEA0", "ID": "8c5586b8-9566-460e-b976-ebcc66ee5ab7", "DetectTime": "2023-10-30T14:09:10.218946+02:00", "EventTime": "2023-10-30T14:09:10.218958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CN28qg7UU0Cyj5ewa"]} -{"Format": "IDEA0", "ID": "ea9e5c95-6bc7-4fce-9560-c4b7421e3b0b", "DetectTime": "2023-10-30T14:09:10.236279+02:00", "EventTime": "2023-10-30T14:09:10.236295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C1p2fa2dNt1EDWM8f"]} -{"Format": "IDEA0", "ID": "fdc085cf-d56e-46cc-99e1-24f4041fed4b", "DetectTime": "2023-10-30T14:09:10.255718+02:00", "EventTime": "2023-10-30T14:09:10.255735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CniQn11MBr252o5tq2"]} -{"Format": "IDEA0", "ID": "9a44f7d9-3e93-4c1d-8bdd-9b9fb6fa42b9", "DetectTime": "2023-10-30T14:09:10.273160+02:00", "EventTime": "2023-10-30T14:09:10.273176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CPAupVAcIQXGOJypi"]} -{"Format": "IDEA0", "ID": "6df4538c-e96c-4996-a51e-73938268d1e8", "DetectTime": "2023-10-30T14:09:10.291629+02:00", "EventTime": "2023-10-30T14:09:10.291644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["C69di2tUHTL3bfDZk"]} -{"Format": "IDEA0", "ID": "34160d06-8d54-4f2f-817f-c3fa27f1c63d", "DetectTime": "2023-10-30T14:09:10.313206+02:00", "EventTime": "2023-10-30T14:09:10.313227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C7Lkly3MdlAyvni8Ci"]} -{"Format": "IDEA0", "ID": "00d5f206-c3f0-40a7-8b59-6a15aabcdd9e", "DetectTime": "2023-10-30T14:09:10.333792+02:00", "EventTime": "2023-10-30T14:09:10.333815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C6mlwd49qKZWg5BLBh"]} -{"Format": "IDEA0", "ID": "a529bfd9-82e6-416a-a570-db2ba8d70a2e", "DetectTime": "2023-10-30T14:09:10.353376+02:00", "EventTime": "2023-10-30T14:09:10.353387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CFR5UA24QOBwIg3CP5"]} -{"Format": "IDEA0", "ID": "5aabe304-1c75-4bf2-b4ba-fc98187e5a81", "DetectTime": "2023-10-30T14:09:10.368735+02:00", "EventTime": "2023-10-30T14:09:10.368753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CyOsoU3NKfURWRuz1"]} -{"Format": "IDEA0", "ID": "7d3a333d-fdc6-45a0-8c66-bc804d7f9ab9", "DetectTime": "2023-10-30T14:09:10.388358+02:00", "EventTime": "2023-10-30T14:09:10.388380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["ChDyCF2E5uOcczzvJg"]} -{"Format": "IDEA0", "ID": "65e14481-69f9-4df4-baea-ca4a344317bf", "DetectTime": "2023-10-30T14:09:10.407548+02:00", "EventTime": "2023-10-30T14:09:10.407559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CkHbPi2idMvAaIutVf"]} -{"Format": "IDEA0", "ID": "abae985b-5afe-4524-84b9-86728ec1acd7", "DetectTime": "2023-10-30T14:09:10.421636+02:00", "EventTime": "2023-10-30T14:09:10.421649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CRy1QB3nQ1E3cycPg2"]} -{"Format": "IDEA0", "ID": "82ec01bd-9ff4-4175-9dc3-aedec0413484", "DetectTime": "2023-10-30T14:09:10.439452+02:00", "EventTime": "2023-10-30T14:09:10.439473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CKguxTpcsHTFu8j3d"]} -{"Format": "IDEA0", "ID": "58c39c58-9fce-47b2-b1d5-fa133f7e8252", "DetectTime": "2023-10-30T14:09:10.458910+02:00", "EventTime": "2023-10-30T14:09:10.458927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.232.7.128 ", "ContentType": "text/plain"}], "uids": ["CwOAEO29Kwx6rDw83d"]} -{"Format": "IDEA0", "ID": "1a400c9d-1794-4b6d-b79d-9bd611d9a873", "DetectTime": "2023-10-30T14:09:10.479043+02:00", "EventTime": "2023-10-30T14:09:10.479058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Czsy4r2Lw8Kbexb7sk"]} -{"Format": "IDEA0", "ID": "664023e1-ea81-4c67-a928-caa9c5cb5c74", "DetectTime": "2023-10-30T14:09:10.499240+02:00", "EventTime": "2023-10-30T14:09:10.499255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["CIsHCo4mtM9LhqFy53"]} -{"Format": "Json", "ID": "664023e1-ea81-4c67-a928-caa9c5cb5c74", "DetectTime": "2023-10-30T14:09:10.499240+02:00", "EventTime": "2023-10-30T14:09:10.499255+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:44:49.941598+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:10.576203)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07b7a8f3-9bb4-4ae9-9715-4ca975e57321", "DetectTime": "2023-10-30T14:09:10.581036+02:00", "EventTime": "2023-10-30T14:09:10.581048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C5oGxK2vbuernrjjIc"]} -{"Format": "IDEA0", "ID": "2fc16c46-aaae-4f53-b28a-b3718601310d", "DetectTime": "2023-10-30T14:09:10.601379+02:00", "EventTime": "2023-10-30T14:09:10.601394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXW5Bs4t2uYiLDf6Dg"]} -{"Format": "IDEA0", "ID": "1fe3612a-132b-4a02-b348-81d6de4a26f7", "DetectTime": "2023-10-30T14:09:10.619377+02:00", "EventTime": "2023-10-30T14:09:10.619392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CsUaOO3eniDsTkldQb"]} -{"Format": "IDEA0", "ID": "040bdbb9-71ef-4457-a069-307bac567b23", "DetectTime": "2023-10-30T14:09:10.637532+02:00", "EventTime": "2023-10-30T14:09:10.637546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cba5kk4mAvrKqFRila"]} -{"Format": "IDEA0", "ID": "3e95886f-20a2-4c02-b321-277d871574e9", "DetectTime": "2023-10-30T14:09:10.658487+02:00", "EventTime": "2023-10-30T14:09:10.658507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CFgrsG4psdCyeD03y6"]} -{"Format": "IDEA0", "ID": "72086c92-e1c6-44f7-a785-4921e80da593", "DetectTime": "2023-10-30T14:09:10.678592+02:00", "EventTime": "2023-10-30T14:09:10.678608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CusbWF4Hhu8TBZ2Vj3"]} -{"Format": "IDEA0", "ID": "e31a386c-a230-4f3e-aadf-7701d446adae", "DetectTime": "2023-10-30T14:09:10.697279+02:00", "EventTime": "2023-10-30T14:09:10.697289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CytCuJ38mMNsZos5Kh"]} -{"Format": "IDEA0", "ID": "3a72a57d-c1d3-4aba-a753-ea4fc65618f2", "DetectTime": "2023-10-30T14:09:10.718025+02:00", "EventTime": "2023-10-30T14:09:10.718040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CXBRGepSLM6KjWssk"]} -{"Format": "IDEA0", "ID": "7c284d4b-19ce-40d4-a4f5-342b7938a96c", "DetectTime": "2023-10-30T14:09:10.737277+02:00", "EventTime": "2023-10-30T14:09:10.737293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cr0sMw420pgbDnHYGh"]} -{"Format": "IDEA0", "ID": "d255b384-670f-4539-b157-8cd936f20ebd", "DetectTime": "2023-10-30T14:09:10.755328+02:00", "EventTime": "2023-10-30T14:09:10.755339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CODvo1hge2rByoAOi"]} -{"Format": "IDEA0", "ID": "566269cc-fefe-4f83-b453-8e3e9bfb074c", "DetectTime": "2023-10-30T14:09:10.771648+02:00", "EventTime": "2023-10-30T14:09:10.771661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmZ4RD1vCRTwjF7fbg"]} -{"Format": "IDEA0", "ID": "c907beb1-a345-410c-a111-e5d46da1e31a", "DetectTime": "2023-10-30T14:09:10.786344+02:00", "EventTime": "2023-10-30T14:09:10.786356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CSYTst3zDLQ3OUWYn1"]} -{"Format": "IDEA0", "ID": "e357a631-96b4-4067-958d-320547a76904", "DetectTime": "2023-10-30T14:09:10.804957+02:00", "EventTime": "2023-10-30T14:09:10.804981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["COr8zB4XGCWUa4Omc3"]} -{"Format": "IDEA0", "ID": "ed87253a-70d6-448b-8686-ed44b167c1bb", "DetectTime": "2023-10-30T14:09:10.825742+02:00", "EventTime": "2023-10-30T14:09:10.825761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C9w82p1UUIVXGsvz9g"]} -{"Format": "IDEA0", "ID": "a7519db1-f6c7-4fdb-8d21-3a4d8431ff2d", "DetectTime": "2023-10-30T14:09:10.847624+02:00", "EventTime": "2023-10-30T14:09:10.847646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CZ27jsZIFaSfU2M8b"]} -{"Format": "IDEA0", "ID": "04bfbf3d-7de6-4a8a-a4cb-e728b328e43e", "DetectTime": "2023-10-30T14:09:10.867951+02:00", "EventTime": "2023-10-30T14:09:10.867966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CQtdsy3bIPkZpZ6Gi"]} -{"Format": "IDEA0", "ID": "5c9589e6-deca-49b1-8990-877b78cc7eff", "DetectTime": "2023-10-30T14:09:10.884409+02:00", "EventTime": "2023-10-30T14:09:10.884420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CYv63n3qMiUAwJD5M2"]} -{"Format": "IDEA0", "ID": "fc38ed1e-b104-402e-bf8b-2b4b88709762", "DetectTime": "2023-10-30T14:09:10.903998+02:00", "EventTime": "2023-10-30T14:09:10.904019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CG2hXryuyFpmaDgj3"]} -{"Format": "IDEA0", "ID": "3ff5c175-ba19-44c2-9968-64f6954fe83c", "DetectTime": "2023-10-30T14:09:10.920719+02:00", "EventTime": "2023-10-30T14:09:10.920731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CZ6vpL3CI8xRosxQO4"]} -{"Format": "IDEA0", "ID": "15d1c64d-5c08-4bbb-88c6-9afed83d590a", "DetectTime": "2023-10-30T14:09:10.935507+02:00", "EventTime": "2023-10-30T14:09:10.935517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CCOONt1pbwkq6VGore"]} -{"Format": "IDEA0", "ID": "2c11ce5c-b04c-48dc-819c-119f2f39bf6a", "DetectTime": "2023-10-30T14:09:10.953587+02:00", "EventTime": "2023-10-30T14:09:10.953604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CckaZn2NKCpJD8EY62"]} -{"Format": "IDEA0", "ID": "a0806043-c4fa-4245-b27d-713a5358b457", "DetectTime": "2023-10-30T14:09:10.969761+02:00", "EventTime": "2023-10-30T14:09:10.969777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CMwF772NtwGJqLKGr7"]} -{"Format": "IDEA0", "ID": "478c57b9-a76c-4af2-bb10-8c5946280be1", "DetectTime": "2023-10-30T14:09:10.987306+02:00", "EventTime": "2023-10-30T14:09:10.987322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTwu8RyUE7wOXlkff"]} -{"Format": "IDEA0", "ID": "6470ae04-795f-4cac-94c2-91bc8e27b0d7", "DetectTime": "2023-10-30T14:09:11.002793+02:00", "EventTime": "2023-10-30T14:09:11.002806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CMR7sO8n024ziJeN"]} -{"Format": "IDEA0", "ID": "0e6066f1-40f3-4267-aa4a-6a1bab55cb21", "DetectTime": "2023-10-30T14:09:11.017787+02:00", "EventTime": "2023-10-30T14:09:11.017799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CAl4R93hrEktgc2S9k"]} -{"Format": "IDEA0", "ID": "87d5162a-0ffd-41d9-b582-f13cdc1f38a2", "DetectTime": "2023-10-30T14:09:11.033897+02:00", "EventTime": "2023-10-30T14:09:11.033916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CuwxPT1Ta1quMQwFm3"]} -{"Format": "IDEA0", "ID": "14ad4e4f-13d8-4989-ae01-dbffcec901e8", "DetectTime": "2023-10-30T14:09:11.049758+02:00", "EventTime": "2023-10-30T14:09:11.049769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C3UgkX1L7hsY4QgFec"]} -{"Format": "IDEA0", "ID": "cc340efb-8183-4cd1-b387-8b3019eb7e6b", "DetectTime": "2023-10-30T14:09:11.063281+02:00", "EventTime": "2023-10-30T14:09:11.063292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CoDkwM1oteNnDvpuP1"]} -{"Format": "IDEA0", "ID": "54128731-5b72-4fce-923d-c3bc185f9916", "DetectTime": "2023-10-30T14:09:11.074521+02:00", "EventTime": "2023-10-30T14:09:11.074536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CUzveariv9av5yPXa"]} -{"Format": "IDEA0", "ID": "0e747560-b94c-4669-9b67-1006ef8ed414", "DetectTime": "2023-10-30T14:09:11.087513+02:00", "EventTime": "2023-10-30T14:09:11.087524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3U3l412QUr1IlPPA9"]} -{"Format": "IDEA0", "ID": "2e086330-fff5-488d-8f07-a4e3de08a594", "DetectTime": "2023-10-30T14:09:11.100455+02:00", "EventTime": "2023-10-30T14:09:11.100474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CUsHRz4cwg2OWFueR3"]} -{"Format": "IDEA0", "ID": "55b4bdd5-c2b0-49d7-a737-c65ce5ccc579", "DetectTime": "2023-10-30T14:09:11.117270+02:00", "EventTime": "2023-10-30T14:09:11.117289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CuyN7ff0Rg3jRQdA2"]} -{"Format": "IDEA0", "ID": "ca098edd-6f10-4eab-a6d5-2fa33ce4fc2e", "DetectTime": "2023-10-30T14:09:11.135458+02:00", "EventTime": "2023-10-30T14:09:11.135471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CPtbJq2BbexIIhF9Q1"]} -{"Format": "IDEA0", "ID": "11b84f8e-7dca-4390-af00-1741a2d25c2d", "DetectTime": "2023-10-30T14:09:11.149929+02:00", "EventTime": "2023-10-30T14:09:11.149941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CZvz3J1bCPRTFJsU"]} -{"Format": "IDEA0", "ID": "c7d3862f-5caa-41be-9ff9-27db77285d1d", "DetectTime": "2023-10-30T14:09:11.163411+02:00", "EventTime": "2023-10-30T14:09:11.163421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CrpdZL1lHOWJPrLIVc"]} -{"Format": "IDEA0", "ID": "7605a60a-31fa-4fb3-9397-28a1da053a1d", "DetectTime": "2023-10-30T14:09:11.174720+02:00", "EventTime": "2023-10-30T14:09:11.174736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CfOohTPshKg8ttZUh"]} -{"Format": "IDEA0", "ID": "8c363b7f-ee30-4e6b-8967-e65d236612a7", "DetectTime": "2023-10-30T14:09:11.186971+02:00", "EventTime": "2023-10-30T14:09:11.186982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Crc9XC30QL7XFroVrc"]} -{"Format": "IDEA0", "ID": "63cd2521-1bac-4aad-b8af-794db1217aee", "DetectTime": "2023-10-30T14:09:11.199974+02:00", "EventTime": "2023-10-30T14:09:11.199997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C2S5YAwQYevnNUNt"]} -{"Format": "IDEA0", "ID": "c7502a6f-8d39-4002-90c6-9dc471a8b3fb", "DetectTime": "2023-10-30T14:09:11.217860+02:00", "EventTime": "2023-10-30T14:09:11.217880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4w0OO1b2mfBvgOr7"]} -{"Format": "IDEA0", "ID": "7e0806c4-845f-4f56-91a0-e21bfcf5940f", "DetectTime": "2023-10-30T14:09:11.235717+02:00", "EventTime": "2023-10-30T14:09:11.235737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CUQqeg2wz6bk033bm3"]} -{"Format": "IDEA0", "ID": "754d7711-9352-4863-b4cf-43488c98433a", "DetectTime": "2023-10-30T14:09:11.250391+02:00", "EventTime": "2023-10-30T14:09:11.250404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CQsnB5KJYkzCcqSs"]} -{"Format": "IDEA0", "ID": "cb90c1f6-4f22-4c96-a6e8-533e85708412", "DetectTime": "2023-10-30T14:09:11.266602+02:00", "EventTime": "2023-10-30T14:09:11.266613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CSzOB2donYC6hCH1"]} -{"Format": "IDEA0", "ID": "4744d28e-9856-49f7-a81b-9431069105c8", "DetectTime": "2023-10-30T14:09:11.281434+02:00", "EventTime": "2023-10-30T14:09:11.281450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ClxO7v4zPu7IG2W4m2"]} -{"Format": "IDEA0", "ID": "f2720cd5-3c25-43a5-b929-ae848ffd9a02", "DetectTime": "2023-10-30T14:09:11.297576+02:00", "EventTime": "2023-10-30T14:09:11.297588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C6RJrb2htMS2NgLJPk"]} -{"Format": "IDEA0", "ID": "469276a6-0900-4bd1-a862-730554074858", "DetectTime": "2023-10-30T14:09:11.314986+02:00", "EventTime": "2023-10-30T14:09:11.315003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CJnXjaXMWc9a6s3ne"]} -{"Format": "IDEA0", "ID": "37f00edf-874e-447d-87bb-6f475ddfb779", "DetectTime": "2023-10-30T14:09:11.331661+02:00", "EventTime": "2023-10-30T14:09:11.331681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CwsZQExXnvoz1tEGi"]} -{"Format": "IDEA0", "ID": "d1f6bcd9-8616-42f7-8a2a-103c18d982df", "DetectTime": "2023-10-30T14:09:11.346072+02:00", "EventTime": "2023-10-30T14:09:11.346084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C3vTmx2UTuBN5NS4wk"]} -{"Format": "IDEA0", "ID": "b19f8a53-7d05-4376-9800-a560f90f4241", "DetectTime": "2023-10-30T14:09:11.362074+02:00", "EventTime": "2023-10-30T14:09:11.362091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C02HYS2EbR5s9QKEk9"]} -{"Format": "IDEA0", "ID": "1184dfb7-c9d5-4d62-b390-2fc366d2281b", "DetectTime": "2023-10-30T14:09:11.380053+02:00", "EventTime": "2023-10-30T14:09:11.380074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C92zH81wH6BjjDKkcb"]} -{"Format": "IDEA0", "ID": "7bbed7ac-be5e-4c17-a728-5cbe64d9b280", "DetectTime": "2023-10-30T14:09:11.397983+02:00", "EventTime": "2023-10-30T14:09:11.397999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CMyK8G3CgGjm3ODy2"]} -{"Format": "IDEA0", "ID": "872f602a-3dda-498b-a300-ee059ec4b2c2", "DetectTime": "2023-10-30T14:09:11.415769+02:00", "EventTime": "2023-10-30T14:09:11.415785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CWci613QSWxJXd2ec8"]} -{"Format": "IDEA0", "ID": "36ccbb33-cdf2-408b-8d27-aea68dacd81e", "DetectTime": "2023-10-30T14:09:11.434689+02:00", "EventTime": "2023-10-30T14:09:11.434710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C3ZmAj3dy83THTZqJi"]} -{"Format": "IDEA0", "ID": "0177b1c6-c499-46d1-9767-bef2f513d3bd", "DetectTime": "2023-10-30T14:09:11.452918+02:00", "EventTime": "2023-10-30T14:09:11.452928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CSzQNF1DHe9LLlwqf"]} -{"Format": "IDEA0", "ID": "5978968e-94cf-4c06-be7d-60a209c8360a", "DetectTime": "2023-10-30T14:09:11.465107+02:00", "EventTime": "2023-10-30T14:09:11.465118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CWPZov1QCziZ2RSNO4"]} -{"Format": "IDEA0", "ID": "541b41ea-09a5-43f0-9747-d4bbadd5d2c4", "DetectTime": "2023-10-30T14:09:11.489159+02:00", "EventTime": "2023-10-30T14:09:11.489170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7aB1D3YEra73cRTF4"]} -{"Format": "IDEA0", "ID": "47a468c6-585b-4b6d-a1bf-aa6b67d509c4", "DetectTime": "2023-10-30T14:09:11.505919+02:00", "EventTime": "2023-10-30T14:09:11.505935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CWfRet2tyMjayN7SSh"]} -{"Format": "IDEA0", "ID": "c74cada9-e8b0-4a17-81e2-24594bf8bd75", "DetectTime": "2023-10-30T14:09:11.521464+02:00", "EventTime": "2023-10-30T14:09:11.521475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CQc84f1KeOsReHSZF4"]} -{"Format": "IDEA0", "ID": "94e52b36-5d7f-4d2f-96cb-53ab90196716", "DetectTime": "2023-10-30T14:09:11.535818+02:00", "EventTime": "2023-10-30T14:09:11.535829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CDDAP2u8IkbSyJTSj"]} -{"Format": "IDEA0", "ID": "c8d96b76-660c-4d6f-af76-20db8906750b", "DetectTime": "2023-10-30T14:09:11.552623+02:00", "EventTime": "2023-10-30T14:09:11.552643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CJtiQi2NbJr2EEgbz3"]} -{"Format": "IDEA0", "ID": "7e078e00-1733-48d4-8ff9-19135b98ca25", "DetectTime": "2023-10-30T14:09:11.570501+02:00", "EventTime": "2023-10-30T14:09:11.570521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvSML04OZx16mUzU97"]} -{"Format": "IDEA0", "ID": "743a087e-7923-4bd7-8c00-84d94305a144", "DetectTime": "2023-10-30T14:09:11.588815+02:00", "EventTime": "2023-10-30T14:09:11.588836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CSUxS4r8kVyWOcoa"]} -{"Format": "IDEA0", "ID": "6df6b4ea-17ae-4171-85c6-2a3c9daf5946", "DetectTime": "2023-10-30T14:09:11.607840+02:00", "EventTime": "2023-10-30T14:09:11.607860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cnz2Th3mhIM3GZD21c"]} -{"Format": "IDEA0", "ID": "4e57f114-f1a3-4d64-97db-8e23b1ae1be0", "DetectTime": "2023-10-30T14:09:11.626208+02:00", "EventTime": "2023-10-30T14:09:11.626229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C83WTkPBERaBlFctk"]} -{"Format": "IDEA0", "ID": "ca3d0fec-938b-4187-9158-1d1a4ff20db9", "DetectTime": "2023-10-30T14:09:11.642287+02:00", "EventTime": "2023-10-30T14:09:11.642304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C3vltq4OgpnzZawQHe"]} -{"Format": "IDEA0", "ID": "5054e58b-9a9b-4f73-8e22-26390b219e7b", "DetectTime": "2023-10-30T14:09:11.658255+02:00", "EventTime": "2023-10-30T14:09:11.658269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CGEPS3Sa4sn9oc8yh"]} -{"Format": "IDEA0", "ID": "6dd16472-a6de-403d-91d3-5e1298ef41b5", "DetectTime": "2023-10-30T14:09:11.672211+02:00", "EventTime": "2023-10-30T14:09:11.672229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C3hGhD8eE8Rj5Npk6"]} -{"Format": "IDEA0", "ID": "b0cdc159-73cc-4048-967d-21792e5d9d8c", "DetectTime": "2023-10-30T14:09:11.691351+02:00", "EventTime": "2023-10-30T14:09:11.691367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CpvRqC3b0mvrmBle8i"]} -{"Format": "IDEA0", "ID": "6073ece7-0ebf-4a25-8a87-3cad1aae32ea", "DetectTime": "2023-10-30T14:09:11.706702+02:00", "EventTime": "2023-10-30T14:09:11.706718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CVMygU3hhJHJHanBi9"]} -{"Format": "IDEA0", "ID": "32a76344-ed2c-455a-ac09-dcdf7ce2453f", "DetectTime": "2023-10-30T14:09:11.722923+02:00", "EventTime": "2023-10-30T14:09:11.722941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C9shzv33LsPfy63nll"]} -{"Format": "IDEA0", "ID": "614b51ac-b4c9-43dc-a202-8722114ecd64", "DetectTime": "2023-10-30T14:09:11.741827+02:00", "EventTime": "2023-10-30T14:09:11.741847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cc80fG1zKeKc86KVC5"]} -{"Format": "IDEA0", "ID": "e250d602-582b-44dc-81ad-a640952e4785", "DetectTime": "2023-10-30T14:09:11.760793+02:00", "EventTime": "2023-10-30T14:09:11.760811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Ci8TMM1icBuYLk0fLa"]} -{"Format": "IDEA0", "ID": "4519c6f3-0aff-439a-bf7b-877b894a0b1e", "DetectTime": "2023-10-30T14:09:11.775726+02:00", "EventTime": "2023-10-30T14:09:11.775738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CgmZds2KdOEfuLvaCc"]} -{"Format": "IDEA0", "ID": "609f3057-d479-4e8b-abf0-5a3160117a2d", "DetectTime": "2023-10-30T14:09:11.794241+02:00", "EventTime": "2023-10-30T14:09:11.794256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["Ce7AZK1AIV8xSfcyl6"]} -{"Format": "IDEA0", "ID": "ad3626f1-61a2-4532-8c26-547ce7169616", "DetectTime": "2023-10-30T14:09:11.814465+02:00", "EventTime": "2023-10-30T14:09:11.814485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CzMHEq4Su7ukSfmiJc"]} -{"Format": "IDEA0", "ID": "b4a319fa-dfc0-494a-b61e-e5fd00cb2b30", "DetectTime": "2023-10-30T14:09:11.832509+02:00", "EventTime": "2023-10-30T14:09:11.832521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CgdaAw1mdzh6bzYlDk"]} -{"Format": "IDEA0", "ID": "a59a0aa2-3bbc-43b1-8cd9-c324454724f1", "DetectTime": "2023-10-30T14:09:11.847893+02:00", "EventTime": "2023-10-30T14:09:11.847904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C7Jnt93j9T2Io9Amth"]} -{"Format": "IDEA0", "ID": "6dbb59f9-43ff-4057-83d7-6f65e5d9507a", "DetectTime": "2023-10-30T14:09:11.863592+02:00", "EventTime": "2023-10-30T14:09:11.863611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CMof2v4rt7iK4HaU95"]} -{"Format": "IDEA0", "ID": "1f8f654e-c798-4363-9979-54752fe385ea", "DetectTime": "2023-10-30T14:09:11.879585+02:00", "EventTime": "2023-10-30T14:09:11.879601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CibFfa1Qa9n1GC7Lic"]} -{"Format": "IDEA0", "ID": "3506f0d5-22e8-4a5e-a9f3-c6e697aa6b6c", "DetectTime": "2023-10-30T14:09:11.897310+02:00", "EventTime": "2023-10-30T14:09:11.897327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CNmAy24bMZFlzqzqvi"]} -{"Format": "IDEA0", "ID": "3facbc7c-9524-44bd-9093-d17d7820fd1b", "DetectTime": "2023-10-30T14:09:11.914078+02:00", "EventTime": "2023-10-30T14:09:11.914099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C9N78T3ZF4axfJUtNi"]} -{"Format": "IDEA0", "ID": "58d85813-4bea-4764-a971-aa1f6173403e", "DetectTime": "2023-10-30T14:09:11.932171+02:00", "EventTime": "2023-10-30T14:09:11.932183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CIBpnN2KBw27Efg0wf"]} -{"Format": "IDEA0", "ID": "cc17f95c-6af1-4fde-be13-b1ef606e4277", "DetectTime": "2023-10-30T14:09:11.946564+02:00", "EventTime": "2023-10-30T14:09:11.946575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CaDwvccW02sOx7BFa"]} -{"Format": "IDEA0", "ID": "d4d9cfe3-0005-4c09-81e8-6a9f5b9ad971", "DetectTime": "2023-10-30T14:09:11.957997+02:00", "EventTime": "2023-10-30T14:09:11.958012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CmhGfe2TrrmtAHsYff"]} -{"Format": "IDEA0", "ID": "5a40345c-afef-4337-822c-6fb4de2c55ca", "DetectTime": "2023-10-30T14:09:11.972481+02:00", "EventTime": "2023-10-30T14:09:11.972493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C6pSup2GTu56SQprfb"]} -{"Format": "IDEA0", "ID": "9f85119e-446f-414f-a951-040e71d9f399", "DetectTime": "2023-10-30T14:09:11.987055+02:00", "EventTime": "2023-10-30T14:09:11.987065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CVtVQR1PdSwZGuusHk"]} -{"Format": "IDEA0", "ID": "9c922c58-9ec1-4f90-b91a-1136da0abe19", "DetectTime": "2023-10-30T14:09:12.002826+02:00", "EventTime": "2023-10-30T14:09:12.002843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CMQOXj2dj8tY2yOXbg"]} -{"Format": "IDEA0", "ID": "bc1caf3b-5574-4398-a470-458ce978820a", "DetectTime": "2023-10-30T14:09:12.020318+02:00", "EventTime": "2023-10-30T14:09:12.020334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CJyT0mq87vuto5LZh"]} -{"Format": "IDEA0", "ID": "d951a4b3-9676-41a2-b0d1-fb5cdb0f4b14", "DetectTime": "2023-10-30T14:09:12.034062+02:00", "EventTime": "2023-10-30T14:09:12.034073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CZqYEh1JyskRpwK6o1"]} -{"Format": "IDEA0", "ID": "e54d61ea-1458-41ef-be2e-3d3ff8a14785", "DetectTime": "2023-10-30T14:09:12.048553+02:00", "EventTime": "2023-10-30T14:09:12.048570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIkC964MMFw7ww7s5e"]} -{"Format": "IDEA0", "ID": "1764df3c-f94a-41bf-925b-69091a9ad905", "DetectTime": "2023-10-30T14:09:12.061842+02:00", "EventTime": "2023-10-30T14:09:12.061853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C76hJv4PSlLU8cAa5e"]} -{"Format": "IDEA0", "ID": "84ee2609-f170-4435-bab7-8853daf6531a", "DetectTime": "2023-10-30T14:09:12.073413+02:00", "EventTime": "2023-10-30T14:09:12.073440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CpM6Y94OYLa07S49Ui"]} -{"Format": "IDEA0", "ID": "debd04e1-6b85-4c17-86ce-9b5aa463ba98", "DetectTime": "2023-10-30T14:09:12.089435+02:00", "EventTime": "2023-10-30T14:09:12.089447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CQr9PZ1JbckRUPCJZ3"]} -{"Format": "IDEA0", "ID": "de549fe0-4717-431e-9edb-7948b8517c01", "DetectTime": "2023-10-30T14:09:12.107215+02:00", "EventTime": "2023-10-30T14:09:12.107237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["ClSi8622vXHA7nZyGh"]} -{"Format": "IDEA0", "ID": "b949f0c4-52b4-4b52-ac23-7d7def057e46", "DetectTime": "2023-10-30T14:09:12.125984+02:00", "EventTime": "2023-10-30T14:09:12.126005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CmOKvo2n5UA0aZwvm1"]} -{"Format": "IDEA0", "ID": "8a76645b-a8de-4f3e-8238-e8b2580843d1", "DetectTime": "2023-10-30T14:09:12.144901+02:00", "EventTime": "2023-10-30T14:09:12.144921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CymIsmzJLi1LTKXyj"]} -{"Format": "IDEA0", "ID": "ebf083e4-558c-43d0-af8d-45f5c7865cd1", "DetectTime": "2023-10-30T14:09:12.163391+02:00", "EventTime": "2023-10-30T14:09:12.163412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CqyPjmekygn2AGSv6"]} -{"Format": "IDEA0", "ID": "da6e07ac-e68b-414f-b1b6-9767b0411ed6", "DetectTime": "2023-10-30T14:09:12.176508+02:00", "EventTime": "2023-10-30T14:09:12.176520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CISN6h4eCD6Y2NkTd4"]} -{"Format": "IDEA0", "ID": "7329658d-0ea8-464d-9dd5-fe2221065623", "DetectTime": "2023-10-30T14:09:12.190008+02:00", "EventTime": "2023-10-30T14:09:12.190019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CI4uv94YhpsTQYiPv3"]} -{"Format": "IDEA0", "ID": "22a0f2ef-cd93-441d-b3f7-ebdc86bdadd6", "DetectTime": "2023-10-30T14:09:12.206586+02:00", "EventTime": "2023-10-30T14:09:12.206601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CyBl2t1IWPEiV4iaEb"]} -{"Format": "IDEA0", "ID": "965998bf-5c77-4155-8491-edcc77c67d9a", "DetectTime": "2023-10-30T14:09:12.222076+02:00", "EventTime": "2023-10-30T14:09:12.222099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CgL9sK25qJnup85aOf"]} -{"Format": "IDEA0", "ID": "97049675-1df8-4c3e-8c8b-83435ca08dc4", "DetectTime": "2023-10-30T14:09:12.239046+02:00", "EventTime": "2023-10-30T14:09:12.239062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["CM6uRm191YKIRJi9Ej"]} -{"Format": "IDEA0", "ID": "c204ce7c-6c2a-4881-a796-bc1afe886ba5", "DetectTime": "2023-10-30T14:09:12.255417+02:00", "EventTime": "2023-10-30T14:09:12.255434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cx9Gcu215HitpzGLyd"]} -{"Format": "IDEA0", "ID": "29488312-e235-47a8-b448-1b9484ac5489", "DetectTime": "2023-10-30T14:09:12.272354+02:00", "EventTime": "2023-10-30T14:09:12.272371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CNOYZq4NgVzF34M3fc"]} -{"Format": "IDEA0", "ID": "022e4688-5db6-4bf1-9583-ccda6a8af688", "DetectTime": "2023-10-30T14:09:12.287604+02:00", "EventTime": "2023-10-30T14:09:12.287615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CGfnAySpTmuSoQuM9"]} -{"Format": "IDEA0", "ID": "b7d3fca2-9971-4599-9757-2f44906bcc97", "DetectTime": "2023-10-30T14:09:12.306664+02:00", "EventTime": "2023-10-30T14:09:12.306685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CieVDzZbKfFz5Ubf6"]} -{"Format": "IDEA0", "ID": "145e5e40-f935-40c6-b7ef-492c3daacdeb", "DetectTime": "2023-10-30T14:09:12.325100+02:00", "EventTime": "2023-10-30T14:09:12.325120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CSZInZiuyMI4UrTyg"]} -{"Format": "IDEA0", "ID": "bb45417b-a36f-4511-a9da-2af5b28fd22a", "DetectTime": "2023-10-30T14:09:12.343318+02:00", "EventTime": "2023-10-30T14:09:12.343338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4qjz33zRUw9oWm5Rf"]} -{"Format": "IDEA0", "ID": "c4f08804-c1b0-4b1f-b758-0e0f237e5c52", "DetectTime": "2023-10-30T14:09:12.360516+02:00", "EventTime": "2023-10-30T14:09:12.360543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C7BHNc2WnCsC2tIIjk"]} -{"Format": "IDEA0", "ID": "827c680e-e57e-4a89-bd9f-edccf2dc0525", "DetectTime": "2023-10-30T14:09:12.377542+02:00", "EventTime": "2023-10-30T14:09:12.377552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CAJT762FF2NHnXGfo5"]} -{"Format": "IDEA0", "ID": "b00d166a-8b63-4453-b41d-3098913579f8", "DetectTime": "2023-10-30T14:09:12.394239+02:00", "EventTime": "2023-10-30T14:09:12.394260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9Aq9h3lLJUqzgJMcl"]} -{"Format": "IDEA0", "ID": "5667e153-850b-4675-ac29-26ee5987b566", "DetectTime": "2023-10-30T14:09:12.413572+02:00", "EventTime": "2023-10-30T14:09:12.413593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CsQVJVyimUz7cFf63"]} -{"Format": "IDEA0", "ID": "96e3435e-8e8a-4bb4-91b3-945ba2c09ad9", "DetectTime": "2023-10-30T14:09:12.430667+02:00", "EventTime": "2023-10-30T14:09:12.430678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CfzVBz3VRLPJItMyYf"]} -{"Format": "IDEA0", "ID": "56371e1d-9fbe-4f2a-acbb-e76d05c799d3", "DetectTime": "2023-10-30T14:09:12.447360+02:00", "EventTime": "2023-10-30T14:09:12.447389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBORTY3fOUKAWIU9qi"]} -{"Format": "IDEA0", "ID": "dec92746-cab0-42d5-8c67-c5575ab18535", "DetectTime": "2023-10-30T14:09:12.465350+02:00", "EventTime": "2023-10-30T14:09:12.465367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CP24Pn3gOZ6LUp0vd8"]} -{"Format": "IDEA0", "ID": "6a60c470-62cc-486c-a0cc-054fb4f3e185", "DetectTime": "2023-10-30T14:09:12.483204+02:00", "EventTime": "2023-10-30T14:09:12.483220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CuwmCo2sHQsyIb1zZ3"]} -{"Format": "IDEA0", "ID": "e545259c-b82f-46d5-8986-ef90767d11d3", "DetectTime": "2023-10-30T14:09:12.498930+02:00", "EventTime": "2023-10-30T14:09:12.498957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CLPKpp1fSecaDwXBEh"]} -{"Format": "IDEA0", "ID": "b5f22e1f-0a6f-49d4-b1a4-b26d2f67bd8c", "DetectTime": "2023-10-30T14:09:12.517996+02:00", "EventTime": "2023-10-30T14:09:12.518012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CQzcPB3cuwWvVDAjpa"]} -{"Format": "IDEA0", "ID": "6c000f68-6d4b-4eb1-ba93-77b7f5d0a846", "DetectTime": "2023-10-30T14:09:12.535673+02:00", "EventTime": "2023-10-30T14:09:12.535689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C0IW0y3supHqipMDs2"]} -{"Format": "IDEA0", "ID": "33d9952b-8d3e-47b1-ad85-e8f4798766d2", "DetectTime": "2023-10-30T14:09:12.556018+02:00", "EventTime": "2023-10-30T14:09:12.556145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cpyv5U2F4AKKWg05Od"]} -{"Format": "IDEA0", "ID": "ce1bc850-59a1-46c0-8c81-c9b6086f8c48", "DetectTime": "2023-10-30T14:09:12.588770+02:00", "EventTime": "2023-10-30T14:09:12.588783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CaL6ws1gIfCa8vyXFk"]} -{"Format": "IDEA0", "ID": "47190239-a696-4d99-84fa-e448567e2851", "DetectTime": "2023-10-30T14:09:12.603462+02:00", "EventTime": "2023-10-30T14:09:12.603478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C6kuA81hRL60XOqpsd"]} -{"Format": "IDEA0", "ID": "24d5aee4-6d66-4310-abaf-1c23ac70bd03", "DetectTime": "2023-10-30T14:09:12.622069+02:00", "EventTime": "2023-10-30T14:09:12.622085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CFl4dPLJhPBMQHGe7"]} -{"Format": "IDEA0", "ID": "4475e8b4-0e19-4990-9fb1-7dd1fc2d383c", "DetectTime": "2023-10-30T14:09:12.637430+02:00", "EventTime": "2023-10-30T14:09:12.637441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CzZRYb1D7DFDjwGVWc"]} -{"Format": "IDEA0", "ID": "99e052a8-c2cd-4a0a-aee5-eeee6d757980", "DetectTime": "2023-10-30T14:09:12.656115+02:00", "EventTime": "2023-10-30T14:09:12.656135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CMynzZFLr19zbosqb"]} -{"Format": "IDEA0", "ID": "f4a71130-3c9c-4f90-97a4-5052bb946692", "DetectTime": "2023-10-30T14:09:12.671612+02:00", "EventTime": "2023-10-30T14:09:12.671626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CiqPeE2kslXdC2Excj"]} -{"Format": "IDEA0", "ID": "95c51d51-faca-4218-a470-f8ad33db80ec", "DetectTime": "2023-10-30T14:09:12.688086+02:00", "EventTime": "2023-10-30T14:09:12.688104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CzSOsG4fkJpvK538Sb"]} -{"Format": "IDEA0", "ID": "e0ba4651-bc29-4346-aec9-16f4b23d6a86", "DetectTime": "2023-10-30T14:09:12.700953+02:00", "EventTime": "2023-10-30T14:09:12.700963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CUshNT3cQvZ0O3fgPb"]} -{"Format": "IDEA0", "ID": "6e27a1ac-6298-4ee7-82c3-035b742e06be", "DetectTime": "2023-10-30T14:09:12.718754+02:00", "EventTime": "2023-10-30T14:09:12.718772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CQzbxo2K6rEr4tTncb"]} -{"Format": "IDEA0", "ID": "c137c7d0-b9ed-4131-a679-9c00c00ea619", "DetectTime": "2023-10-30T14:09:12.735046+02:00", "EventTime": "2023-10-30T14:09:12.735063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C5tlGA3yontIrGQyAk"]} -{"Format": "IDEA0", "ID": "53d4e134-0dd8-43ef-bffd-34567b3565fe", "DetectTime": "2023-10-30T14:09:12.748477+02:00", "EventTime": "2023-10-30T14:09:12.748488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CLFkLK1jHN2fBjtPL2"]} -{"Format": "IDEA0", "ID": "47baec94-1642-4a4a-81ae-8af7544aa598", "DetectTime": "2023-10-30T14:09:12.760147+02:00", "EventTime": "2023-10-30T14:09:12.760158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CSFDOUdItemFi22i3"]} -{"Format": "IDEA0", "ID": "3e665c54-5183-4feb-937f-ae80171ae03e", "DetectTime": "2023-10-30T14:09:12.777973+02:00", "EventTime": "2023-10-30T14:09:12.777991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CJ40j72dnRXp2cbn3f"]} -{"Format": "IDEA0", "ID": "b0eed16c-4a6a-438b-838d-dfb13c021c29", "DetectTime": "2023-10-30T14:09:12.795278+02:00", "EventTime": "2023-10-30T14:09:12.795290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CE8JEr3aGHdeqT3wZ4"]} -{"Format": "IDEA0", "ID": "d0e26f7e-0d23-45b8-b231-bdac705b5e4b", "DetectTime": "2023-10-30T14:09:12.812732+02:00", "EventTime": "2023-10-30T14:09:12.812744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CS5e9zr1K0ccqqRB2"]} -{"Format": "IDEA0", "ID": "abc2d668-d4ab-4bb1-857e-fc721b6c6bfd", "DetectTime": "2023-10-30T14:09:12.827404+02:00", "EventTime": "2023-10-30T14:09:12.827420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CrPO7D1hNKscIn5WS"]} -{"Format": "IDEA0", "ID": "5f34fa5a-bd99-4d34-b391-825495ff7d2f", "DetectTime": "2023-10-30T14:09:12.846758+02:00", "EventTime": "2023-10-30T14:09:12.846773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmgaxZ56GCIlXhHg8"]} -{"Format": "IDEA0", "ID": "bfa2fe8b-e0c3-402c-a24d-002696d186cb", "DetectTime": "2023-10-30T14:09:12.863876+02:00", "EventTime": "2023-10-30T14:09:12.863887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CbxzbF2rtkfqBXkonf"]} -{"Format": "IDEA0", "ID": "a42eec1b-fa3c-4baa-8374-18e6dee4a384", "DetectTime": "2023-10-30T14:09:12.878939+02:00", "EventTime": "2023-10-30T14:09:12.878955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cyv75CW8D1UQs15z8"]} -{"Format": "IDEA0", "ID": "1c4c01bb-2c4f-47fb-b1f2-7d349193c5c5", "DetectTime": "2023-10-30T14:09:12.899207+02:00", "EventTime": "2023-10-30T14:09:12.899225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C5JJRq4Ulp0gjNDkee"]} -{"Format": "IDEA0", "ID": "a6373af9-7716-430c-80e0-833136332479", "DetectTime": "2023-10-30T14:09:12.915309+02:00", "EventTime": "2023-10-30T14:09:12.915325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["ChwHFG3hqDAAptJq11"]} -{"Format": "IDEA0", "ID": "bdaf02c6-cdf5-4240-ac26-66ef181c2e37", "DetectTime": "2023-10-30T14:09:12.932758+02:00", "EventTime": "2023-10-30T14:09:12.932769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CqMuEK2Aqv89JStgii"]} -{"Format": "IDEA0", "ID": "5f5ec213-a788-437b-86b1-6c6564916f4d", "DetectTime": "2023-10-30T14:09:12.948441+02:00", "EventTime": "2023-10-30T14:09:12.948457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CgZYdV3HDp3XiK2uOh"]} -{"Format": "IDEA0", "ID": "34f24ae0-cf1d-4658-94e7-d68c13ccaa68", "DetectTime": "2023-10-30T14:09:12.962085+02:00", "EventTime": "2023-10-30T14:09:12.962096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cvk4qc3p0MCArR6aJ7"]} -{"Format": "IDEA0", "ID": "2a443386-18c3-4b51-b03b-2279b7627801", "DetectTime": "2023-10-30T14:09:12.978882+02:00", "EventTime": "2023-10-30T14:09:12.978901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cu3mmA1m9CKWkK78Bc"]} -{"Format": "IDEA0", "ID": "af689ed1-e38b-4b53-ba99-3db2704c5bf2", "DetectTime": "2023-10-30T14:09:12.993695+02:00", "EventTime": "2023-10-30T14:09:12.993707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CWVnII1ojeYB44nrxb"]} -{"Format": "IDEA0", "ID": "81c6b722-68e4-47c1-b253-309d154219a2", "DetectTime": "2023-10-30T14:09:13.005956+02:00", "EventTime": "2023-10-30T14:09:13.005968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CfRoqT1bzLLBSmgAXg"]} -{"Format": "IDEA0", "ID": "fbdca705-b696-41c4-9311-ad1004ad96be", "DetectTime": "2023-10-30T14:09:13.019461+02:00", "EventTime": "2023-10-30T14:09:13.019473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["Cf0tDW3DGLc8fZoK1"]} -{"Format": "IDEA0", "ID": "71dcfee6-19d2-49ed-b19c-17f32276935c", "DetectTime": "2023-10-30T14:09:13.037582+02:00", "EventTime": "2023-10-30T14:09:13.037603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["COXXW11Do1LhJfLNLk"]} -{"Format": "IDEA0", "ID": "dda02568-a675-4211-a4fc-1773454c8b99", "DetectTime": "2023-10-30T14:09:13.056047+02:00", "EventTime": "2023-10-30T14:09:13.056071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["C6aGmG4pVJ9BFvYKpf"]} -{"Format": "IDEA0", "ID": "becd2ef8-8699-47d4-b03f-ef40596904e6", "DetectTime": "2023-10-30T14:09:13.073464+02:00", "EventTime": "2023-10-30T14:09:13.073482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C1PjIQ2SzuCa7J9nlf"]} -{"Format": "IDEA0", "ID": "91355cac-57b4-442e-adfb-487c31a53f1c", "DetectTime": "2023-10-30T14:09:13.086549+02:00", "EventTime": "2023-10-30T14:09:13.086562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CP49SE3UXqTdK4GFAk"]} -{"Format": "IDEA0", "ID": "3f731701-5455-4c0e-b477-c56ffd17e1f1", "DetectTime": "2023-10-30T14:09:13.103543+02:00", "EventTime": "2023-10-30T14:09:13.103559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CIwZjN2UZLVvYHZ7B5"]} -{"Format": "IDEA0", "ID": "6dcfd692-4d26-4fd6-b043-43b3f55b3d80", "DetectTime": "2023-10-30T14:09:13.117766+02:00", "EventTime": "2023-10-30T14:09:13.117777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGjd9F3mePZkFgyYX8"]} -{"Format": "IDEA0", "ID": "b710854a-c417-45b1-a721-d7f6bedd29a7", "DetectTime": "2023-10-30T14:09:13.131928+02:00", "EventTime": "2023-10-30T14:09:13.131942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.9.171.230 ", "ContentType": "text/plain"}], "uids": ["CTkBQM1gJU67qfjYo1"]} -{"Format": "IDEA0", "ID": "34eb76db-28ce-41e5-b9cd-5689037a1d00", "DetectTime": "2023-10-30T14:09:13.147350+02:00", "EventTime": "2023-10-30T14:09:13.147362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CmZxYf4HyDfVswbQg7"]} -{"Format": "IDEA0", "ID": "e43f2dd3-5274-48d5-baf5-4c9172abaafa", "DetectTime": "2023-10-30T14:09:13.161357+02:00", "EventTime": "2023-10-30T14:09:13.161374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CQUfsx1TV7dkSNJGTb"]} -{"Format": "IDEA0", "ID": "f6787081-daad-4674-82e1-8ae4d75bcc08", "DetectTime": "2023-10-30T14:09:13.174147+02:00", "EventTime": "2023-10-30T14:09:13.174160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CLI9HL2baaAMonLJv8"]} -{"Format": "IDEA0", "ID": "ed0ab361-0d1d-478d-b4ef-626772faf004", "DetectTime": "2023-10-30T14:09:13.189110+02:00", "EventTime": "2023-10-30T14:09:13.189124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ClOBfb48TVWbxGua6"]} -{"Format": "IDEA0", "ID": "d303646a-8576-4911-9377-9c62a1ab5a13", "DetectTime": "2023-10-30T14:09:13.205387+02:00", "EventTime": "2023-10-30T14:09:13.205399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Ca27fdFZcofQGvvj3"]} -{"Format": "IDEA0", "ID": "c5f1056d-32e2-4f1a-9a18-cad6fd1fb8f5", "DetectTime": "2023-10-30T14:09:13.220283+02:00", "EventTime": "2023-10-30T14:09:13.220295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CIadRt2Bo8f1W2ajPf"]} -{"Format": "IDEA0", "ID": "654228a9-93b2-46aa-98f9-0d4421d933f1", "DetectTime": "2023-10-30T14:09:13.233405+02:00", "EventTime": "2023-10-30T14:09:13.233424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["COzlSy3tp1HnKBxeJ5"]} -{"Format": "IDEA0", "ID": "2afbdac3-a33e-4825-aa6e-b01f9c0563a4", "DetectTime": "2023-10-30T14:09:13.247153+02:00", "EventTime": "2023-10-30T14:09:13.247170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CGk2qd37VsetYNoZS4"]} -{"Format": "IDEA0", "ID": "1f063275-757a-4d10-acc3-b1f76beeefe9", "DetectTime": "2023-10-30T14:09:13.263924+02:00", "EventTime": "2023-10-30T14:09:13.263940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBGdSc2Yk6JIUAyARh"]} -{"Format": "IDEA0", "ID": "39e48b80-f071-4e85-88db-bceae91f809e", "DetectTime": "2023-10-30T14:09:13.280476+02:00", "EventTime": "2023-10-30T14:09:13.280488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CmXjB01nH4Lz4FUhVb"]} -{"Format": "IDEA0", "ID": "b93793d2-fe6c-4f34-bc1d-634201463ca3", "DetectTime": "2023-10-30T14:09:13.297247+02:00", "EventTime": "2023-10-30T14:09:13.297261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CrkHPG2ofLu0YuEmW8"]} -{"Format": "IDEA0", "ID": "54fd9243-1084-4740-addf-bd095cbcdbdd", "DetectTime": "2023-10-30T14:09:13.313332+02:00", "EventTime": "2023-10-30T14:09:13.313348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["CVVP6y2O1sS4w7XLpc"]} -{"Format": "IDEA0", "ID": "df0f4438-a5f1-40da-863b-bff29f187929", "DetectTime": "2023-10-30T14:09:13.342638+02:00", "EventTime": "2023-10-30T14:09:13.342656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CGC3GC2CMQrXzDwxv4"]} -{"Format": "IDEA0", "ID": "49b4c6f8-5b37-4646-bfa6-19de3d0a72df", "DetectTime": "2023-10-30T14:09:13.360439+02:00", "EventTime": "2023-10-30T14:09:13.360455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CFrrxP2TdAjw1EzXwb"]} -{"Format": "IDEA0", "ID": "3d5397f5-9124-4f98-9e6f-d8eee37d2c21", "DetectTime": "2023-10-30T14:09:13.376961+02:00", "EventTime": "2023-10-30T14:09:13.376971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CLMT6A1VKUYGgU8TP6"]} -{"Format": "IDEA0", "ID": "ea5dd2c3-305c-4f54-a7c9-1a080a65741d", "DetectTime": "2023-10-30T14:09:13.391362+02:00", "EventTime": "2023-10-30T14:09:13.391379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CK8MLDHtl7w2pRG42"]} -{"Format": "IDEA0", "ID": "3212c189-708d-48a6-8e5b-559ae56d9968", "DetectTime": "2023-10-30T14:09:13.408815+02:00", "EventTime": "2023-10-30T14:09:13.408833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CZ6Bon2Of2AeBJeUZ2"]} -{"Format": "IDEA0", "ID": "97543d45-705b-4643-b13e-239ef3d04a8b", "DetectTime": "2023-10-30T14:09:13.426514+02:00", "EventTime": "2023-10-30T14:09:13.426532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CQ1Wk73LuLbGiFJVGi"]} -{"Format": "IDEA0", "ID": "7be8a467-cc89-4e8d-b4c9-d2c1928c3269", "DetectTime": "2023-10-30T14:09:13.441971+02:00", "EventTime": "2023-10-30T14:09:13.441991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CBSSgp1iLa4jihBTFe"]} -{"Format": "IDEA0", "ID": "3bb5ae70-e907-417f-95e1-cf60831856da", "DetectTime": "2023-10-30T14:09:13.457169+02:00", "EventTime": "2023-10-30T14:09:13.457183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.139.191.162 ", "ContentType": "text/plain"}], "uids": ["CQ8fDY3Lj7YLUT3EKl"]} -{"Format": "IDEA0", "ID": "fff89153-39e9-40e7-bfcf-22465030ee24", "DetectTime": "2023-10-30T14:09:13.468944+02:00", "EventTime": "2023-10-30T14:09:13.468954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CuKPJS1hwCQnLr0Ly7"]} -{"Format": "IDEA0", "ID": "d58a0aa2-d0a6-4c66-bd50-cef5ce318ba3", "DetectTime": "2023-10-30T14:09:13.483505+02:00", "EventTime": "2023-10-30T14:09:13.483517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CWclbGm7VWJqouPc"]} -{"Format": "IDEA0", "ID": "d4d7a8ca-a48e-4698-9f25-ae8be6f1b58d", "DetectTime": "2023-10-30T14:09:13.501889+02:00", "EventTime": "2023-10-30T14:09:13.501911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C3zMvU2VKxbW8IYAkh"]} -{"Format": "IDEA0", "ID": "b9c81364-6b44-40cb-a04f-bef34a3d7544", "DetectTime": "2023-10-30T14:09:13.521410+02:00", "EventTime": "2023-10-30T14:09:13.521427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.6.169.122 ", "ContentType": "text/plain"}], "uids": ["C7gO7O2UUKpJR5sjYf"]} -{"Format": "IDEA0", "ID": "8cac4f6b-7ef7-4ec9-8e37-8d33d9a8f6ce", "DetectTime": "2023-10-30T14:09:13.535932+02:00", "EventTime": "2023-10-30T14:09:13.535948+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cjimww3EZDeoGludc1"]} -{"Format": "IDEA0", "ID": "375bf042-c91c-4112-a747-8dcbf1acdad3", "DetectTime": "2023-10-30T14:09:13.560671+02:00", "EventTime": "2023-10-30T14:09:13.560683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CfHCb93jpOrjdvLru4"]} -{"Format": "IDEA0", "ID": "f7dc8328-f638-4908-9001-4d2997f6d289", "DetectTime": "2023-10-30T14:09:13.578602+02:00", "EventTime": "2023-10-30T14:09:13.578617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ClYZOl25sg3qy2Tzp1"]} -{"Format": "IDEA0", "ID": "76951e8e-4cd6-4d5f-9180-ce69bf8d5fa0", "DetectTime": "2023-10-30T14:09:13.597173+02:00", "EventTime": "2023-10-30T14:09:13.597188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CKA49f4FwdRfK3koyd"]} -{"Format": "IDEA0", "ID": "f46b7c08-8b62-4645-81a0-1a476bb1a6d9", "DetectTime": "2023-10-30T14:09:13.617908+02:00", "EventTime": "2023-10-30T14:09:13.617930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["ClArlE1ez7DpvbYc7j"]} -{"Format": "IDEA0", "ID": "58e9f821-bb6a-48bd-bca0-569f52d44784", "DetectTime": "2023-10-30T14:09:13.637350+02:00", "EventTime": "2023-10-30T14:09:13.637369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFKLE22jL2H9LB8spj"]} -{"Format": "IDEA0", "ID": "6a9e2393-1455-47be-9c31-2f00e3eb3a94", "DetectTime": "2023-10-30T14:09:13.653956+02:00", "EventTime": "2023-10-30T14:09:13.653967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.237.226.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.237.226.20 ", "ContentType": "text/plain"}], "uids": ["CzkEUA4RyvA7Zhr8fc"]} -{"Format": "IDEA0", "ID": "ea1cf121-a833-4358-9617-4d89285bfa0c", "DetectTime": "2023-10-30T14:09:13.667245+02:00", "EventTime": "2023-10-30T14:09:13.667256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.7.241.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.7.241.110 ", "ContentType": "text/plain"}], "uids": ["Cso93i4nZiIbBZn6F9"]} -{"Format": "IDEA0", "ID": "c20ebede-d4e3-42d5-99b7-2bdeaf515b9c", "DetectTime": "2023-10-30T14:09:13.681280+02:00", "EventTime": "2023-10-30T14:09:13.681300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.143.9.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.143.9.54 ", "ContentType": "text/plain"}], "uids": ["CB4JyriDt6TPsrt3l"]} -{"Format": "IDEA0", "ID": "49f86390-5ae7-40f4-b6f8-1fffcb935c50", "DetectTime": "2023-10-30T14:09:13.695394+02:00", "EventTime": "2023-10-30T14:09:13.695405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["CF4pBH3v1oxH4V4g62"]} -{"Format": "IDEA0", "ID": "21ad3236-dbb0-43e1-8bcb-e901bdc31fd3", "DetectTime": "2023-10-30T14:09:13.711336+02:00", "EventTime": "2023-10-30T14:09:13.711352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CdE9tx29okOi0sOvdg"]} -{"Format": "IDEA0", "ID": "51e33e2d-7477-4201-91ef-4a3b1eb42f75", "DetectTime": "2023-10-30T14:09:13.729177+02:00", "EventTime": "2023-10-30T14:09:13.729192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.26 ", "ContentType": "text/plain"}], "uids": ["Chg2fE12XQtCSeGENk"]} -{"Format": "IDEA0", "ID": "bf3bebd5-2663-4356-b818-cfcec172d786", "DetectTime": "2023-10-30T14:09:13.747706+02:00", "EventTime": "2023-10-30T14:09:13.747729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CX9oXY3onwZKjyJq3k"]} -{"Format": "IDEA0", "ID": "05b315ff-0947-4cec-a965-5271f01fdcab", "DetectTime": "2023-10-30T14:09:13.766170+02:00", "EventTime": "2023-10-30T14:09:13.766187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.53.147.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.53.147.81 ", "ContentType": "text/plain"}], "uids": ["CLwEx72ukOFO46vDhk"]} -{"Format": "IDEA0", "ID": "f4fc495b-d3e0-4ab5-8b22-43511b37f20f", "DetectTime": "2023-10-30T14:09:13.783645+02:00", "EventTime": "2023-10-30T14:09:13.783664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.130.73.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.130.73.198 ", "ContentType": "text/plain"}], "uids": ["CI7hw93lC8Q4S29SL"]} -{"Format": "IDEA0", "ID": "b452ff3f-f6ee-45cb-978f-d53b1aa5d3d2", "DetectTime": "2023-10-30T14:09:13.803291+02:00", "EventTime": "2023-10-30T14:09:13.803310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.172.62.31"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.172.62.31 ", "ContentType": "text/plain"}], "uids": ["CVTeWF2VxW2xgSaQw3"]} -{"Format": "IDEA0", "ID": "e47955b4-e91b-49d5-812b-97d62f532e70", "DetectTime": "2023-10-30T14:09:13.823537+02:00", "EventTime": "2023-10-30T14:09:13.823553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.24.108.105"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.24.108.105 ", "ContentType": "text/plain"}], "uids": ["Cp8X0v1qTtLX3Sq9Bl"]} -{"Format": "IDEA0", "ID": "a0e76532-51d7-430a-816e-2cba9dfd02f4", "DetectTime": "2023-10-30T14:09:13.844245+02:00", "EventTime": "2023-10-30T14:09:13.844261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.88.11.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.88.11.18 ", "ContentType": "text/plain"}], "uids": ["CacGK91flbIn31dT98"]} -{"Format": "IDEA0", "ID": "b1cacd57-eda7-4654-a153-36179df9dca3", "DetectTime": "2023-10-30T14:09:13.862501+02:00", "EventTime": "2023-10-30T14:09:13.862514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Ccn2fCtXUsaIZLb88"]} -{"Format": "IDEA0", "ID": "3dc5c079-ea0b-42bc-b327-0f23dba086cc", "DetectTime": "2023-10-30T14:09:13.879882+02:00", "EventTime": "2023-10-30T14:09:13.879894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CXfLbBViMuWrReWd9"]} -{"Format": "IDEA0", "ID": "5e5f57d8-568b-46aa-a3a6-dad5782781ea", "DetectTime": "2023-10-30T14:09:13.898854+02:00", "EventTime": "2023-10-30T14:09:13.898871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYRDxQ1Omlomt74boj"]} -{"Format": "IDEA0", "ID": "e0a34313-1f46-48b2-9bd5-43e7700e158a", "DetectTime": "2023-10-30T14:09:13.914496+02:00", "EventTime": "2023-10-30T14:09:13.914512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.60.76.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.60.76.38 ", "ContentType": "text/plain"}], "uids": ["C2ADzG43xjChjCZ0ug"]} -{"Format": "IDEA0", "ID": "e663933d-3f7f-486b-961a-bf5e19c722c5", "DetectTime": "2023-10-30T14:09:13.928841+02:00", "EventTime": "2023-10-30T14:09:13.928853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.37.144.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.37.144.9 ", "ContentType": "text/plain"}], "uids": ["CMJuGq9xOAPng0Zoj"]} -{"Format": "IDEA0", "ID": "6103f254-2c88-487d-9330-3359d58a5572", "DetectTime": "2023-10-30T14:09:13.948401+02:00", "EventTime": "2023-10-30T14:09:13.948422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.173.221.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.173.221.146 ", "ContentType": "text/plain"}], "uids": ["CNUIMj16Yr0bYCovf4"]} -{"Format": "IDEA0", "ID": "3832df5e-4d28-4cb3-be8a-ae3bb374c53a", "DetectTime": "2023-10-30T14:09:13.967070+02:00", "EventTime": "2023-10-30T14:09:13.967086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["Cz7V84232MEP0mxGe"]} -{"Format": "IDEA0", "ID": "e1f4d10d-a109-479c-840c-f149d9b964c1", "DetectTime": "2023-10-30T14:09:13.982885+02:00", "EventTime": "2023-10-30T14:09:13.982897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.120.24.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 124.120.24.167 ", "ContentType": "text/plain"}], "uids": ["C07zqW38bDubcl6X7a"]} -{"Format": "IDEA0", "ID": "d5abbb26-d80b-42d8-be39-217e6cb8d230", "DetectTime": "2023-10-30T14:09:13.995934+02:00", "EventTime": "2023-10-30T14:09:13.995950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.157.126.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.157.126.49 ", "ContentType": "text/plain"}], "uids": ["CIkGpN3EdxF8vkWCf5"]} -{"Format": "IDEA0", "ID": "65be8527-b2fa-4507-b8cd-ca953c8d08cd", "DetectTime": "2023-10-30T14:09:14.013877+02:00", "EventTime": "2023-10-30T14:09:14.013899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.133.62.246"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.133.62.246 ", "ContentType": "text/plain"}], "uids": ["C2yYf62WSON3WHfxqk"]} -{"Format": "IDEA0", "ID": "edbcfc70-cb1b-4aff-96e6-4e361904c1ef", "DetectTime": "2023-10-30T14:09:14.033961+02:00", "EventTime": "2023-10-30T14:09:14.033972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["Ce8yee1FgQDsSXMKY6"]} -{"Format": "IDEA0", "ID": "c171abfe-2e8d-409e-b2c2-790d9fd2e3b0", "DetectTime": "2023-10-30T14:09:14.053300+02:00", "EventTime": "2023-10-30T14:09:14.053316+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2LxDWe1XWMXUOTza"]} -{"Format": "IDEA0", "ID": "92b3df99-632c-4360-b278-9da85ae2fae8", "DetectTime": "2023-10-30T14:09:14.088088+02:00", "EventTime": "2023-10-30T14:09:14.088105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CugiEZ2bJ4ApZTVc51"]} -{"Format": "IDEA0", "ID": "6a166031-3915-4a4c-b771-78bd7114bd62", "DetectTime": "2023-10-30T14:09:14.110972+02:00", "EventTime": "2023-10-30T14:09:14.110989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.74.142.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.74.142.90 ", "ContentType": "text/plain"}], "uids": ["CRc7FG4iHrv3ljiB1k"]} -{"Format": "IDEA0", "ID": "592ca2ad-dc0f-41ad-9550-586d21e96974", "DetectTime": "2023-10-30T14:09:14.135364+02:00", "EventTime": "2023-10-30T14:09:14.135385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.14.30.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.14.30.94 ", "ContentType": "text/plain"}], "uids": ["C4aQA02l1nxqVgvzu"]} -{"Format": "IDEA0", "ID": "0268e913-9988-4237-9285-6a675ad97211", "DetectTime": "2023-10-30T14:09:14.154203+02:00", "EventTime": "2023-10-30T14:09:14.154220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["C2yqWq1ceDKOePm4Pd"]} -{"Format": "IDEA0", "ID": "feeae61e-d1f4-4bac-9178-6536cf47cb63", "DetectTime": "2023-10-30T14:09:14.178104+02:00", "EventTime": "2023-10-30T14:09:14.178126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.249.225.199"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.249.225.199 ", "ContentType": "text/plain"}], "uids": ["CtkvZi1CwklKqJ8h6"]} -{"Format": "IDEA0", "ID": "fcbce35b-93cb-4784-8072-3231257f44b2", "DetectTime": "2023-10-30T14:09:14.201939+02:00", "EventTime": "2023-10-30T14:09:14.201959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.242.20.25"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.242.20.25 ", "ContentType": "text/plain"}], "uids": ["CucrSjFfIfhHhwIp2"]} -{"Format": "IDEA0", "ID": "3a7b4d51-0f78-400d-9d85-df369aff3669", "DetectTime": "2023-10-30T14:09:14.224827+02:00", "EventTime": "2023-10-30T14:09:14.224847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["CnpqU6UCzGJZABRb1"]} -{"Format": "IDEA0", "ID": "fbe88daa-c1fe-4ee6-9a3b-8ed20706ed52", "DetectTime": "2023-10-30T14:09:14.248639+02:00", "EventTime": "2023-10-30T14:09:14.248661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C7LJ9RzzVk4i10Ne8"]} -{"Format": "IDEA0", "ID": "f275dfe1-e90c-41bf-94b0-2d0664d8c229", "DetectTime": "2023-10-30T14:09:14.268061+02:00", "EventTime": "2023-10-30T14:09:14.268073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.166.169.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.166.169.3 ", "ContentType": "text/plain"}], "uids": ["C0Gq953MVp4HbGNHq"]} -{"Format": "IDEA0", "ID": "c3337989-35a7-4363-a006-2f8f1f0b1949", "DetectTime": "2023-10-30T14:09:14.287553+02:00", "EventTime": "2023-10-30T14:09:14.287571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.13.194.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.13.194.197 ", "ContentType": "text/plain"}], "uids": ["CKPcFg1Hx2p8sDOiKc"]} -{"Format": "IDEA0", "ID": "04dec5a8-6048-49e7-831a-289900e33958", "DetectTime": "2023-10-30T14:09:14.309635+02:00", "EventTime": "2023-10-30T14:09:14.309662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.130.112.172"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.130.112.172 ", "ContentType": "text/plain"}], "uids": ["CIT1Tk4qwAFtepzep5"]} -{"Format": "IDEA0", "ID": "0781bde5-ced0-4f14-a914-b85dd1554ee3", "DetectTime": "2023-10-30T14:09:14.324858+02:00", "EventTime": "2023-10-30T14:09:14.324884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.174.252.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.174.252.22 ", "ContentType": "text/plain"}], "uids": ["CgaxDR31A2s0lBObia"]} -{"Format": "IDEA0", "ID": "51f21ffd-74b7-4767-b99f-1abbd5498c85", "DetectTime": "2023-10-30T14:09:14.347412+02:00", "EventTime": "2023-10-30T14:09:14.347423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.128.195.71"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.128.195.71 ", "ContentType": "text/plain"}], "uids": ["CEZoVg3TpEOqYvLcuj"]} -{"Format": "IDEA0", "ID": "1f1d2bf9-451e-4d55-87bf-789a80ca33f1", "DetectTime": "2023-10-30T14:09:14.368524+02:00", "EventTime": "2023-10-30T14:09:14.368540+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CbEQiL341exFTqv93b"]} -{"Format": "IDEA0", "ID": "b38585b5-3165-47b4-af9b-277c51c32309", "DetectTime": "2023-10-30T14:09:14.398551+02:00", "EventTime": "2023-10-30T14:09:14.398564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["162.198.54.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 162.198.54.128 ", "ContentType": "text/plain"}], "uids": ["COqre2lWHMs1Ntk8"]} -{"Format": "IDEA0", "ID": "5927c62f-cd02-4037-9d28-7fceff22b5ff", "DetectTime": "2023-10-30T14:09:14.420853+02:00", "EventTime": "2023-10-30T14:09:14.420872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.254.242.62"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.254.242.62 ", "ContentType": "text/plain"}], "uids": ["CSkWxg2aKQ1BQhVKgb"]} -{"Format": "IDEA0", "ID": "9bca9394-76da-4ef5-86cc-732e3b30a225", "DetectTime": "2023-10-30T14:09:14.443740+02:00", "EventTime": "2023-10-30T14:09:14.443757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.214.58.197 ", "ContentType": "text/plain"}], "uids": ["CARI0H2C4MoWCayWRf"]} -{"Format": "IDEA0", "ID": "e4bfc47b-9330-4833-b53b-08ce900aca37", "DetectTime": "2023-10-30T14:09:14.465209+02:00", "EventTime": "2023-10-30T14:09:14.465225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.93.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.235.93.6 ", "ContentType": "text/plain"}], "uids": ["C77XeU1DeNmI6rIet7"]} -{"Format": "IDEA0", "ID": "cc2a8577-5a61-4a67-afb0-ce00e4411cf3", "DetectTime": "2023-10-30T14:09:14.484398+02:00", "EventTime": "2023-10-30T14:09:14.484409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.96.72.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.96.72.60 ", "ContentType": "text/plain"}], "uids": ["CbXwIigfSkwq2uEnk"]} -{"Format": "IDEA0", "ID": "cfe967f2-57b6-4304-91a1-8b07df9ccd19", "DetectTime": "2023-10-30T14:09:14.500173+02:00", "EventTime": "2023-10-30T14:09:14.500190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.249.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.249.237 ", "ContentType": "text/plain"}], "uids": ["CXXx8Prhtf9pjN6Cj"]} -{"Format": "IDEA0", "ID": "87de7306-a95e-478e-b46a-f30296eea662", "DetectTime": "2023-10-30T14:09:14.518573+02:00", "EventTime": "2023-10-30T14:09:14.518590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.231.42.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.231.42.234 ", "ContentType": "text/plain"}], "uids": ["CHpV7x3jGbedTa0LFe"]} -{"Format": "IDEA0", "ID": "236f5443-6dd4-47e6-bd22-548f517aa323", "DetectTime": "2023-10-30T14:09:14.538429+02:00", "EventTime": "2023-10-30T14:09:14.538441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.29.210.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.29.210.40 ", "ContentType": "text/plain"}], "uids": ["C2CrYJ2QAViFgUxbHl"]} -{"Format": "IDEA0", "ID": "95c949c0-06a5-4e46-838b-89599a1a2415", "DetectTime": "2023-10-30T14:09:14.559053+02:00", "EventTime": "2023-10-30T14:09:14.559071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.228.163.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.228.163.130 ", "ContentType": "text/plain"}], "uids": ["CMB1SM3MytbBvv1MP9"]} -{"Format": "IDEA0", "ID": "6d542e3f-685c-4c6f-8532-b4fbe4bf78d5", "DetectTime": "2023-10-30T14:09:14.576513+02:00", "EventTime": "2023-10-30T14:09:14.576525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.20.156.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.20.156.222 ", "ContentType": "text/plain"}], "uids": ["Cf0BDcDj8r7498ewk"]} -{"Format": "IDEA0", "ID": "64725271-afe6-4dae-9599-a62596e7e560", "DetectTime": "2023-10-30T14:09:14.593786+02:00", "EventTime": "2023-10-30T14:09:14.593801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.66.184.240"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.66.184.240 ", "ContentType": "text/plain"}], "uids": ["CGMqBd13zWE5cAf4i5"]} -{"Format": "IDEA0", "ID": "e3df1f46-3be1-4104-b96a-b505a881235b", "DetectTime": "2023-10-30T14:09:14.614899+02:00", "EventTime": "2023-10-30T14:09:14.614911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.27.195.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.27.195.133 ", "ContentType": "text/plain"}], "uids": ["CaxeDlXwB1cLWk2Ze"]} -{"Format": "IDEA0", "ID": "50f7f477-f1fe-4d2a-9bba-0298ccefe1be", "DetectTime": "2023-10-30T14:09:14.630359+02:00", "EventTime": "2023-10-30T14:09:14.630374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.226.159.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.226.159.77 ", "ContentType": "text/plain"}], "uids": ["CHb27d75F8B2yMmwg"]} -{"Format": "IDEA0", "ID": "04e975c4-bd4e-408a-a48e-381fa7ffa980", "DetectTime": "2023-10-30T14:09:14.653940+02:00", "EventTime": "2023-10-30T14:09:14.653961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["204.120.192.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 204.120.192.86 ", "ContentType": "text/plain"}], "uids": ["CFKTG32HcuFFeOsQJ8"]} -{"Format": "IDEA0", "ID": "836fa330-79f7-400a-a7de-f705e0ac6993", "DetectTime": "2023-10-30T14:09:14.676741+02:00", "EventTime": "2023-10-30T14:09:14.676761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.161.50.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 101.161.50.176 ", "ContentType": "text/plain"}], "uids": ["CP6cgZ1JQA3mqMtlP3"]} -{"Format": "IDEA0", "ID": "b5b93145-e56f-424f-b07c-6ea3dc2555b5", "DetectTime": "2023-10-30T14:09:14.694539+02:00", "EventTime": "2023-10-30T14:09:14.694556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.225.238.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.225.238.247 ", "ContentType": "text/plain"}], "uids": ["CNJpdu42SIjLCJ3ng5"]} -{"Format": "IDEA0", "ID": "40c780df-ac2f-40fd-93a4-aca25bd405ae", "DetectTime": "2023-10-30T14:09:14.709970+02:00", "EventTime": "2023-10-30T14:09:14.709982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.166.164.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.166.164.52 ", "ContentType": "text/plain"}], "uids": ["CdcneU22CWjP3Yy032"]} -{"Format": "IDEA0", "ID": "088996b1-011e-4f89-b9b7-383c8fb2e04b", "DetectTime": "2023-10-30T14:09:14.728167+02:00", "EventTime": "2023-10-30T14:09:14.728178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.15.14.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.15.14.142 ", "ContentType": "text/plain"}], "uids": ["CgO2vcEd85obzA5b2"]} -{"Format": "IDEA0", "ID": "fd4adf36-1c6e-4c94-94e6-69c38a204191", "DetectTime": "2023-10-30T14:09:14.745241+02:00", "EventTime": "2023-10-30T14:09:14.745254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.71.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.224.71.93 ", "ContentType": "text/plain"}], "uids": ["C6YFeY3PGC26zmTa1c"]} -{"Format": "IDEA0", "ID": "cd96e922-11f7-4b43-8e1d-209babd7585f", "DetectTime": "2023-10-30T14:09:14.762706+02:00", "EventTime": "2023-10-30T14:09:14.762723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.188.248.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.188.248.3 ", "ContentType": "text/plain"}], "uids": ["Cm7UYpJWSLhCc8VJ4"]} -{"Format": "IDEA0", "ID": "d0c80287-ffc6-49e8-a04f-9d1134c34f24", "DetectTime": "2023-10-30T14:09:14.779746+02:00", "EventTime": "2023-10-30T14:09:14.779758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CVQsg84a5geltwUDna"]} -{"Format": "IDEA0", "ID": "30858644-7dae-41ba-813c-d2a44236e704", "DetectTime": "2023-10-30T14:09:14.798203+02:00", "EventTime": "2023-10-30T14:09:14.798218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.136.130.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.136.130.125 ", "ContentType": "text/plain"}], "uids": ["CNz7vn4mg1iRx0yRJi"]} -{"Format": "IDEA0", "ID": "1e687d2d-a36c-4d95-bae9-c1ce1a27c27f", "DetectTime": "2023-10-30T14:09:14.819333+02:00", "EventTime": "2023-10-30T14:09:14.819345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.4.124.235"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.4.124.235 ", "ContentType": "text/plain"}], "uids": ["C55Od028osTqiOkvVd"]} -{"Format": "IDEA0", "ID": "04d84344-3869-4dc5-a8cd-80fb2bdfc425", "DetectTime": "2023-10-30T14:09:14.837550+02:00", "EventTime": "2023-10-30T14:09:14.837566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.208.48.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 195.208.48.140 ", "ContentType": "text/plain"}], "uids": ["CvEAhV36kjtvJ9JTzl"]} -{"Format": "IDEA0", "ID": "12256af0-7d91-4bf2-9788-979066dff123", "DetectTime": "2023-10-30T14:09:14.856890+02:00", "EventTime": "2023-10-30T14:09:14.856905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.98.145.136"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.98.145.136 ", "ContentType": "text/plain"}], "uids": ["C3O9ae2F5LNJe6hpbk"]} -{"Format": "IDEA0", "ID": "185f3b96-6ae8-40b3-b341-ce9d1411c186", "DetectTime": "2023-10-30T14:09:14.876601+02:00", "EventTime": "2023-10-30T14:09:14.876619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.227.12.60"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.227.12.60 ", "ContentType": "text/plain"}], "uids": ["CWVHJ44aqXgh9rORy7"]} -{"Format": "IDEA0", "ID": "78e1366f-11b7-4db9-9c03-c37b6e8cb959", "DetectTime": "2023-10-30T14:09:14.899421+02:00", "EventTime": "2023-10-30T14:09:14.899442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.137.209.94"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.137.209.94 ", "ContentType": "text/plain"}], "uids": ["Cw4jRk4FEMdyzv9H69"]} -{"Format": "IDEA0", "ID": "cecd472d-8800-46b7-b091-6e5a827886d4", "DetectTime": "2023-10-30T14:09:14.923059+02:00", "EventTime": "2023-10-30T14:09:14.923079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["67.217.130.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 67.217.130.83 ", "ContentType": "text/plain"}], "uids": ["CNAscB1BBMd8kHhYad"]} -{"Format": "IDEA0", "ID": "f388ed58-ec71-4fb9-b760-5e7f28d01137", "DetectTime": "2023-10-30T14:09:14.947240+02:00", "EventTime": "2023-10-30T14:09:14.947261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.70.113"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.70.113 ", "ContentType": "text/plain"}], "uids": ["C86jhbbv3mAPukx07"]} -{"Format": "IDEA0", "ID": "48d438ab-5a79-4d29-8496-f7147523462a", "DetectTime": "2023-10-30T14:09:14.967734+02:00", "EventTime": "2023-10-30T14:09:14.967753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.20.182.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.20.182.29 ", "ContentType": "text/plain"}], "uids": ["C3abS04ku3yru6dfL"]} -{"Format": "IDEA0", "ID": "6aca8e59-84c4-4a8d-a360-9223bcd991a9", "DetectTime": "2023-10-30T14:09:14.987535+02:00", "EventTime": "2023-10-30T14:09:14.987548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CiyYmAP4UqsNQX1Hj"]} -{"Format": "IDEA0", "ID": "4c424c61-bc3c-48a7-bb04-9b938d8987fb", "DetectTime": "2023-10-30T14:09:15.014622+02:00", "EventTime": "2023-10-30T14:09:15.014634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.74.14.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.74.14.220 ", "ContentType": "text/plain"}], "uids": ["CrrIa4Fyz2O3B4hYg"]} -{"Format": "IDEA0", "ID": "dcab16c0-1541-4fe4-8bc8-9ad01f52fab2", "DetectTime": "2023-10-30T14:09:15.033832+02:00", "EventTime": "2023-10-30T14:09:15.033853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["27.54.51.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 27.54.51.115 ", "ContentType": "text/plain"}], "uids": ["C6CQTM1GmIKtHcNDgi"]} -{"Format": "IDEA0", "ID": "0b623fa3-06bf-455e-86df-7178c8cda305", "DetectTime": "2023-10-30T14:09:15.051929+02:00", "EventTime": "2023-10-30T14:09:15.051940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.76.242.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.76.242.49 ", "ContentType": "text/plain"}], "uids": ["C1WMVY2UhUhTkIHZTd"]} -{"Format": "IDEA0", "ID": "ca6c3772-fd0b-4ffd-884e-f1fe8cbb62be", "DetectTime": "2023-10-30T14:09:15.068586+02:00", "EventTime": "2023-10-30T14:09:15.068600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.114.245.252"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.114.245.252 ", "ContentType": "text/plain"}], "uids": ["C5XPp54CPwaTtVwfO3"]} -{"Format": "IDEA0", "ID": "9f8d3dca-c513-442c-8329-9b508ea8b39e", "DetectTime": "2023-10-30T14:09:15.088687+02:00", "EventTime": "2023-10-30T14:09:15.088701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.98.108.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.98.108.145 ", "ContentType": "text/plain"}], "uids": ["CkukYT1ULys9wlIV2a"]} -{"Format": "IDEA0", "ID": "c67ea904-cfd8-435f-9c2d-3644650a34b4", "DetectTime": "2023-10-30T14:09:15.109041+02:00", "EventTime": "2023-10-30T14:09:15.109060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.46.165.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.46.165.141 ", "ContentType": "text/plain"}], "uids": ["C8FZT84jYzSoS7JF7"]} -{"Format": "IDEA0", "ID": "67789265-283e-47be-ab10-e9bf4599d2b2", "DetectTime": "2023-10-30T14:09:15.127747+02:00", "EventTime": "2023-10-30T14:09:15.127764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.103.206.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.103.206.134 ", "ContentType": "text/plain"}], "uids": ["CSrvqf13J0uv7czSuh"]} -{"Format": "IDEA0", "ID": "868423da-2cc9-4db5-abb7-92cb3187c711", "DetectTime": "2023-10-30T14:09:15.144355+02:00", "EventTime": "2023-10-30T14:09:15.144373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.200.62.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.200.62.2 ", "ContentType": "text/plain"}], "uids": ["Cje2Xl1vd4WAwOnPfk"]} -{"Format": "IDEA0", "ID": "854e2bfa-65e1-4eb2-821a-fda2945f2f24", "DetectTime": "2023-10-30T14:09:15.161383+02:00", "EventTime": "2023-10-30T14:09:15.161399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.111.232.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.111.232.214 ", "ContentType": "text/plain"}], "uids": ["CC6P9t2L0wQdJeGgl7"]} -{"Format": "IDEA0", "ID": "e1a39004-1dae-4a7c-9420-8ffcb0d5098f", "DetectTime": "2023-10-30T14:09:15.184002+02:00", "EventTime": "2023-10-30T14:09:15.184022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CKxElX3NeSugmP3vUl"]} -{"Format": "IDEA0", "ID": "a55a46b2-f9cd-4ab4-a3fc-bab3574e4a6c", "DetectTime": "2023-10-30T14:09:15.207724+02:00", "EventTime": "2023-10-30T14:09:15.207744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.91.101.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.91.101.29 ", "ContentType": "text/plain"}], "uids": ["CbbrY83JtOAOo3dtfl"]} -{"Format": "IDEA0", "ID": "15ec2e22-ff54-47b3-8027-508688b38a9e", "DetectTime": "2023-10-30T14:09:15.227818+02:00", "EventTime": "2023-10-30T14:09:15.227829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cdq5884IdnAV8dR4l4"]} -{"Format": "IDEA0", "ID": "5c78a0d9-d634-456d-8e47-baba35b546c3", "DetectTime": "2023-10-30T14:09:15.249032+02:00", "EventTime": "2023-10-30T14:09:15.249054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.57.179.61"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.57.179.61 ", "ContentType": "text/plain"}], "uids": ["CYd88o1vq0NHSu49c2"]} -{"Format": "IDEA0", "ID": "0746d3ec-e2ef-4ece-a3a1-8faa56cf007e", "DetectTime": "2023-10-30T14:09:15.270690+02:00", "EventTime": "2023-10-30T14:09:15.270707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["Cu2k6r1oeRtiJpL3fk"]} -{"Format": "IDEA0", "ID": "e2dbf225-7284-4434-800d-f0b5e4b095a6", "DetectTime": "2023-10-30T14:09:15.292484+02:00", "EventTime": "2023-10-30T14:09:15.292500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.164.33.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.164.33.173 ", "ContentType": "text/plain"}], "uids": ["C1YorS3KzUilW3fl5h"]} -{"Format": "IDEA0", "ID": "a98673f3-39e4-445e-9dc0-b2077ead9bea", "DetectTime": "2023-10-30T14:09:15.311798+02:00", "EventTime": "2023-10-30T14:09:15.311810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.46.208.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 65.46.208.198 ", "ContentType": "text/plain"}], "uids": ["CP4QrW2pV7uYSZZvFf"]} -{"Format": "IDEA0", "ID": "799da380-98b1-4d74-be53-3f0f57c275d6", "DetectTime": "2023-10-30T14:09:15.329804+02:00", "EventTime": "2023-10-30T14:09:15.329823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.117.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.76.117.214 ", "ContentType": "text/plain"}], "uids": ["Cjfsw62LLlcjMZ0Sal"]} -{"Format": "IDEA0", "ID": "c0fae4ff-44c1-43c4-a28f-a6d9c6692f6e", "DetectTime": "2023-10-30T14:09:15.371148+02:00", "EventTime": "2023-10-30T14:09:15.371170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.131.201.146"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 212.131.201.146 ", "ContentType": "text/plain"}], "uids": ["C3Qwub2gZPzjlHVCej"]} -{"Format": "IDEA0", "ID": "76ac20c7-6e81-4ff9-8dea-b9704163f8db", "DetectTime": "2023-10-30T14:09:15.393921+02:00", "EventTime": "2023-10-30T14:09:15.393938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.111.217.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 218.111.217.219 ", "ContentType": "text/plain"}], "uids": ["CGY7In37bd3025Uhd3"]} -{"Format": "IDEA0", "ID": "09ef92de-f16e-4714-8f19-1be30a1b17a5", "DetectTime": "2023-10-30T14:09:15.414959+02:00", "EventTime": "2023-10-30T14:09:15.414971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.90.163.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.90.163.104 ", "ContentType": "text/plain"}], "uids": ["CVUsjw1hYvFhPctV39"]} -{"Format": "IDEA0", "ID": "674d29f0-db18-42f7-bca6-a03c08bbd70c", "DetectTime": "2023-10-30T14:09:15.434621+02:00", "EventTime": "2023-10-30T14:09:15.434638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.91.153.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.91.153.245 ", "ContentType": "text/plain"}], "uids": ["CX8vfz4Z59GX0Z7T0c"]} -{"Format": "IDEA0", "ID": "75cdc3ff-7597-4b84-b73e-2dd18db778df", "DetectTime": "2023-10-30T14:09:15.454077+02:00", "EventTime": "2023-10-30T14:09:15.454087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.172.120.192"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.172.120.192 ", "ContentType": "text/plain"}], "uids": ["C3QJhn2CmtHJGhwjGh"]} -{"Format": "IDEA0", "ID": "1be946aa-5828-47ce-b4e0-f4aa6effc7ae", "DetectTime": "2023-10-30T14:09:15.470957+02:00", "EventTime": "2023-10-30T14:09:15.470968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["Cp8fSF4D1ije7JE9Vd"]} -{"Format": "IDEA0", "ID": "b1784a95-2b58-4280-b36c-657f260eb716", "DetectTime": "2023-10-30T14:09:15.492158+02:00", "EventTime": "2023-10-30T14:09:15.492174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.44.21.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.44.21.6 ", "ContentType": "text/plain"}], "uids": ["C48AzK2PL0Zza1MtEj"]} -{"Format": "IDEA0", "ID": "4be99555-435f-45ac-8dea-1051e0dbb813", "DetectTime": "2023-10-30T14:09:15.513921+02:00", "EventTime": "2023-10-30T14:09:15.513936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.32.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.32.69 ", "ContentType": "text/plain"}], "uids": ["CQHzD81LzXlByTlwNg"]} -{"Format": "IDEA0", "ID": "f8a38d60-a01f-4474-afe6-63e290a3bd84", "DetectTime": "2023-10-30T14:09:15.536387+02:00", "EventTime": "2023-10-30T14:09:15.536403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.230.228.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.230.228.174 ", "ContentType": "text/plain"}], "uids": ["C2WoOe3S2DQgkvhB9"]} -{"Format": "IDEA0", "ID": "a2035a1f-7a15-4ebd-b336-ca4706395a0f", "DetectTime": "2023-10-30T14:09:15.552924+02:00", "EventTime": "2023-10-30T14:09:15.552936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.179.199.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.179.199.81 ", "ContentType": "text/plain"}], "uids": ["CruBmo3WHv1UIPZL27"]} -{"Format": "IDEA0", "ID": "beb48da3-a55e-4caf-81cc-cc039105e961", "DetectTime": "2023-10-30T14:09:15.569084+02:00", "EventTime": "2023-10-30T14:09:15.569096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.12.235.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.12.235.173 ", "ContentType": "text/plain"}], "uids": ["CZRcfS2n8ZDMH9kO9l"]} -{"Format": "IDEA0", "ID": "f7ede797-7da3-4e1e-92c0-ba6f1f50ce89", "DetectTime": "2023-10-30T14:09:15.588387+02:00", "EventTime": "2023-10-30T14:09:15.588402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C9A2do4xBtEUjDBnR2"]} -{"Format": "IDEA0", "ID": "7846e538-6892-44b7-8b9d-859d8dd90418", "DetectTime": "2023-10-30T14:09:15.609301+02:00", "EventTime": "2023-10-30T14:09:15.609312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.100.74.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.100.74.17 ", "ContentType": "text/plain"}], "uids": ["CZMTHT1Ixtb7vUBrCg"]} -{"Format": "IDEA0", "ID": "c5fad659-ef87-4b87-a283-d5ba6f3315a0", "DetectTime": "2023-10-30T14:09:15.630620+02:00", "EventTime": "2023-10-30T14:09:15.630640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.114.0.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.114.0.197 ", "ContentType": "text/plain"}], "uids": ["C24MYU1bnzRbjuaAXl"]} -{"Format": "IDEA0", "ID": "c55f481b-54f6-424f-943e-8e5ea0599993", "DetectTime": "2023-10-30T14:09:15.652251+02:00", "EventTime": "2023-10-30T14:09:15.652261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.187.127.225"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.187.127.225 ", "ContentType": "text/plain"}], "uids": ["Ct2S2433hseMMs6BP5"]} -{"Format": "IDEA0", "ID": "3be5afab-9958-4d56-9a20-4cc64f118dad", "DetectTime": "2023-10-30T14:09:15.671579+02:00", "EventTime": "2023-10-30T14:09:15.671597+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cna8d54VD7yZ0eNFh"]} -{"Format": "IDEA0", "ID": "72b8caf7-5aef-4db1-a840-f95989b6fc76", "DetectTime": "2023-10-30T14:09:15.694275+02:00", "EventTime": "2023-10-30T14:09:15.694286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.100.192.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.100.192.99 ", "ContentType": "text/plain"}], "uids": ["CN3ymT37AxN1xCbtK1"]} -{"Format": "IDEA0", "ID": "07af7149-a4e0-45f7-ba07-6430eb286af0", "DetectTime": "2023-10-30T14:09:15.711086+02:00", "EventTime": "2023-10-30T14:09:15.711102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.163.69.33"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.163.69.33 ", "ContentType": "text/plain"}], "uids": ["CDfX8m0tHPqA6vh0h"]} -{"Format": "IDEA0", "ID": "bc5eaf71-b26f-49a0-b380-5fcc9f5e7c93", "DetectTime": "2023-10-30T14:09:15.730134+02:00", "EventTime": "2023-10-30T14:09:15.730147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.238.172.134"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.238.172.134 ", "ContentType": "text/plain"}], "uids": ["CpCh664z615XreDli6"]} -{"Format": "IDEA0", "ID": "2e5ee71b-1e12-48b0-b2bf-3bb64a555263", "DetectTime": "2023-10-30T14:09:15.746995+02:00", "EventTime": "2023-10-30T14:09:15.747012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.160.131.3"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.160.131.3 ", "ContentType": "text/plain"}], "uids": ["CyNALw7Z7hZ9HDU65"]} -{"Format": "IDEA0", "ID": "489e3ecf-ac37-4905-a7c0-7e0c98ee1686", "DetectTime": "2023-10-30T14:09:15.767402+02:00", "EventTime": "2023-10-30T14:09:15.767415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.166.201"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.64.166.201 ", "ContentType": "text/plain"}], "uids": ["CtQAMrZR6l50FzALh"]} -{"Format": "IDEA0", "ID": "5038ccce-17b3-4c18-97f7-d9ed9f602680", "DetectTime": "2023-10-30T14:09:15.783016+02:00", "EventTime": "2023-10-30T14:09:15.783027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.107.16.215"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.107.16.215 ", "ContentType": "text/plain"}], "uids": ["C9zflA33zOp2Fg4Mhk"]} -{"Format": "IDEA0", "ID": "b2e1ca72-95a7-41f1-ae69-75f843f7ffcf", "DetectTime": "2023-10-30T14:09:15.799680+02:00", "EventTime": "2023-10-30T14:09:15.799692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.3.80.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.3.80.98 ", "ContentType": "text/plain"}], "uids": ["CcumOI2H4TBYemgz93"]} -{"Format": "IDEA0", "ID": "810b5ad6-9e45-49e8-8308-5da7bf2fb98f", "DetectTime": "2023-10-30T14:09:15.818800+02:00", "EventTime": "2023-10-30T14:09:15.818812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.165.149.239"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.165.149.239 ", "ContentType": "text/plain"}], "uids": ["C7RgYw3d4ZzTvjKlw7"]} -{"Format": "IDEA0", "ID": "455e6906-2483-42b6-83c3-96cfd247138c", "DetectTime": "2023-10-30T14:09:15.836691+02:00", "EventTime": "2023-10-30T14:09:15.836706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.178.43.207"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.178.43.207 ", "ContentType": "text/plain"}], "uids": ["CeEkN1Ai6jeV8KDn9"]} -{"Format": "IDEA0", "ID": "8b798f34-03cb-405a-a79a-a37f7da50b33", "DetectTime": "2023-10-30T14:09:15.857748+02:00", "EventTime": "2023-10-30T14:09:15.857763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["Cx2i7u4g8soPBcir1d"]} -{"Format": "IDEA0", "ID": "6d2d1cff-cbeb-427e-bc5c-335ceb2abe4d", "DetectTime": "2023-10-30T14:09:15.878363+02:00", "EventTime": "2023-10-30T14:09:15.878386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.22.206.204 ", "ContentType": "text/plain"}], "uids": ["Cu7kCN1ag3N82wsved"]} -{"Format": "IDEA0", "ID": "f7506180-5aa5-4f74-9f98-e9660c24e036", "DetectTime": "2023-10-30T14:09:15.901883+02:00", "EventTime": "2023-10-30T14:09:15.901895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CvULQy3SrJpOAkgOGa"]} -{"Format": "IDEA0", "ID": "c88385f6-5238-4663-8243-7e91629ffedf", "DetectTime": "2023-10-30T14:09:15.919144+02:00", "EventTime": "2023-10-30T14:09:15.919156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["121.1.53.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 121.1.53.24 ", "ContentType": "text/plain"}], "uids": ["C5S38x3JjCjFGnT8ti"]} -{"Format": "IDEA0", "ID": "45811fa7-214d-40f1-86d5-b513a2cac55f", "DetectTime": "2023-10-30T14:09:15.936018+02:00", "EventTime": "2023-10-30T14:09:15.936033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.184.233.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 201.184.233.131 ", "ContentType": "text/plain"}], "uids": ["C7PPUw1o3BSYiKnmSd"]} -{"Format": "IDEA0", "ID": "0f988240-8f62-46e6-a208-82c231ac4c5c", "DetectTime": "2023-10-30T14:09:15.952417+02:00", "EventTime": "2023-10-30T14:09:15.952428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["CLKkdF1mhkd45rvyMj"]} -{"Format": "IDEA0", "ID": "a3d08457-8744-43c0-ae04-75602a287bdb", "DetectTime": "2023-10-30T14:09:15.969402+02:00", "EventTime": "2023-10-30T14:09:15.969413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.92.34.65"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.92.34.65 ", "ContentType": "text/plain"}], "uids": ["C6OEzy40XlQOD2vBHd"]} -{"Format": "IDEA0", "ID": "4681cac7-f709-4283-9275-e5ba2d8141c1", "DetectTime": "2023-10-30T14:09:15.991235+02:00", "EventTime": "2023-10-30T14:09:15.991251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.248.160.37"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 193.248.160.37 ", "ContentType": "text/plain"}], "uids": ["CNw5qc1fOVb3KbXiH"]} -{"Format": "IDEA0", "ID": "717255da-6b43-4cb8-9542-bb3682fb42fd", "DetectTime": "2023-10-30T14:09:16.008464+02:00", "EventTime": "2023-10-30T14:09:16.008477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["C7vzHw16c4nPaCA8C7"]} -{"Format": "IDEA0", "ID": "127136cb-bb3b-4fe3-b2e4-7a63e1e1fa7b", "DetectTime": "2023-10-30T14:09:16.023570+02:00", "EventTime": "2023-10-30T14:09:16.023582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CTATEl3LFm9W5MJdK2"]} -{"Format": "IDEA0", "ID": "fad8d8ea-f0d7-4921-8cbe-7a6f9c6ae764", "DetectTime": "2023-10-30T14:09:16.043573+02:00", "EventTime": "2023-10-30T14:09:16.043584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.120.58 ", "ContentType": "text/plain"}], "uids": ["C8RfgT12Yf46veiI42"]} -{"Format": "IDEA0", "ID": "00fb01bd-df29-4382-8361-7280a87df414", "DetectTime": "2023-10-30T14:09:16.062275+02:00", "EventTime": "2023-10-30T14:09:16.062286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["63.172.252.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 63.172.252.79 ", "ContentType": "text/plain"}], "uids": ["CgiNONN0xR9fHZqCh"]} -{"Format": "IDEA0", "ID": "5db6a0a6-8a95-4894-8078-fc87105ca3ec", "DetectTime": "2023-10-30T14:09:16.078515+02:00", "EventTime": "2023-10-30T14:09:16.078527+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C62TwA44orQkVzjCDh"]} -{"Format": "IDEA0", "ID": "f4607cf0-69bb-4649-abf3-5c3f09cc864b", "DetectTime": "2023-10-30T14:09:16.105950+02:00", "EventTime": "2023-10-30T14:09:16.105967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C5M5NFbiIPO2Fbyg3"]} -{"Format": "IDEA0", "ID": "346259cd-2cfb-4811-af45-feb410a9a6c2", "DetectTime": "2023-10-30T14:09:16.127664+02:00", "EventTime": "2023-10-30T14:09:16.127679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CAYSOu3wt6jO4MjTVg"]} -{"Format": "IDEA0", "ID": "053dc334-f478-4fc1-a3c1-a678c0f36bcd", "DetectTime": "2023-10-30T14:09:16.148437+02:00", "EventTime": "2023-10-30T14:09:16.148456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGRJnl3bd3ioe91jfi"]} -{"Format": "IDEA0", "ID": "baeac7f1-8032-48b5-9dd0-6579eb598aff", "DetectTime": "2023-10-30T14:09:16.168024+02:00", "EventTime": "2023-10-30T14:09:16.168040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.91.41.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 178.91.41.40 ", "ContentType": "text/plain"}], "uids": ["CD01eW1U4wr30T7gv"]} -{"Format": "IDEA0", "ID": "3a56bb09-d10d-4e9e-9c20-c1328eb26529", "DetectTime": "2023-10-30T14:09:16.185890+02:00", "EventTime": "2023-10-30T14:09:16.185910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.208.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.183.208.97 ", "ContentType": "text/plain"}], "uids": ["CT85Xb2kFtUFKu2ctg"]} -{"Format": "IDEA0", "ID": "73f5b206-f52c-4826-8aad-e685de5197e8", "DetectTime": "2023-10-30T14:09:16.208905+02:00", "EventTime": "2023-10-30T14:09:16.208925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cslb1B2XmWUglhqOj3"]} -{"Format": "IDEA0", "ID": "3e6bc97c-283d-419c-acb5-1e1b8f93ba13", "DetectTime": "2023-10-30T14:09:16.230718+02:00", "EventTime": "2023-10-30T14:09:16.230740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C0oI9g2loapGiYcjY6"]} -{"Format": "IDEA0", "ID": "e308dae4-1f67-4bf5-9136-ce15e53e206d", "DetectTime": "2023-10-30T14:09:16.255511+02:00", "EventTime": "2023-10-30T14:09:16.255530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.185.247.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.185.247.82 ", "ContentType": "text/plain"}], "uids": ["Chglda1RrIxynS4caj"]} -{"Format": "IDEA0", "ID": "00753f6b-be62-4eae-b0cb-ea9a6e835dd1", "DetectTime": "2023-10-30T14:09:16.276563+02:00", "EventTime": "2023-10-30T14:09:16.276579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CMBPRr4wpEdiY719S5"]} -{"Format": "IDEA0", "ID": "505face8-18f7-4e52-bce3-d073d6dfa0d0", "DetectTime": "2023-10-30T14:09:16.298086+02:00", "EventTime": "2023-10-30T14:09:16.298101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.103.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.98.103.145 ", "ContentType": "text/plain"}], "uids": ["Cnw4LL1OWyoLB1hpT6"]} -{"Format": "IDEA0", "ID": "bda382f8-4cdc-4dfd-a25c-c7e795d23339", "DetectTime": "2023-10-30T14:09:16.322636+02:00", "EventTime": "2023-10-30T14:09:16.322653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C8PvK42iLECFgF8tr"]} -{"Format": "IDEA0", "ID": "83a7a660-f75f-4855-a6d8-25861ce0c04e", "DetectTime": "2023-10-30T14:09:16.340853+02:00", "EventTime": "2023-10-30T14:09:16.340871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CfxoZds7uWC7j1EGc"]} -{"Format": "IDEA0", "ID": "bf1de7f7-f0c6-4bf0-8575-6767036ea9d5", "DetectTime": "2023-10-30T14:09:16.364681+02:00", "EventTime": "2023-10-30T14:09:16.364702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CtTSLdsslwXGwJK8a"]} -{"Format": "IDEA0", "ID": "79e3bac1-571a-41b3-9d36-dd4318a38768", "DetectTime": "2023-10-30T14:09:16.383754+02:00", "EventTime": "2023-10-30T14:09:16.383766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.48.189"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.189.48.189 ", "ContentType": "text/plain"}], "uids": ["CgxFBn2VrT3BpYEYwg"]} -{"Format": "IDEA0", "ID": "a6b79d2f-ed83-4b76-9d08-1aa0d761a392", "DetectTime": "2023-10-30T14:09:16.399495+02:00", "EventTime": "2023-10-30T14:09:16.399510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CFUCbi3PoHWsxcIHVf"]} -{"Format": "IDEA0", "ID": "06d718bd-b4d4-4d81-8c59-636508d0934f", "DetectTime": "2023-10-30T14:09:16.417135+02:00", "EventTime": "2023-10-30T14:09:16.417146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CnLISP8APw9DkZ6j8"]} -{"Format": "IDEA0", "ID": "121306e4-02da-4975-9a0e-aa67b6c26899", "DetectTime": "2023-10-30T14:09:16.432913+02:00", "EventTime": "2023-10-30T14:09:16.432924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CNNKUCgGhlRcpusze"]} -{"Format": "IDEA0", "ID": "f53a3685-5c81-46d5-8c93-a925d3d5e1a0", "DetectTime": "2023-10-30T14:09:16.451352+02:00", "EventTime": "2023-10-30T14:09:16.451364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CQyZZd3hplbqIsJvdh"]} -{"Format": "IDEA0", "ID": "4be091f0-93e0-4166-8ca2-55d194bf40e4", "DetectTime": "2023-10-30T14:09:16.466614+02:00", "EventTime": "2023-10-30T14:09:16.466628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["C9XJFW2CtPlXXf7VBh"]} -{"Format": "IDEA0", "ID": "6eb2bc5a-e9d5-4206-b180-30952cae3fae", "DetectTime": "2023-10-30T14:09:16.482943+02:00", "EventTime": "2023-10-30T14:09:16.482955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CLKiMf3dHngsd4szqh"]} -{"Format": "IDEA0", "ID": "af158a6a-e63d-4f1f-bc3d-68aef15d25b2", "DetectTime": "2023-10-30T14:09:16.497149+02:00", "EventTime": "2023-10-30T14:09:16.497161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["CTAN5o3ct3dd0eZLOk"]} -{"Format": "IDEA0", "ID": "7b94f7b4-3795-46ed-ae4f-0522f73818fe", "DetectTime": "2023-10-30T14:09:16.512914+02:00", "EventTime": "2023-10-30T14:09:16.512925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CZDgALm2Edtp1FNh9"]} -{"Format": "IDEA0", "ID": "993e8ed5-d0ba-4232-95ba-2ab135866227", "DetectTime": "2023-10-30T14:09:16.531534+02:00", "EventTime": "2023-10-30T14:09:16.531551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.143.95.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.143.95.30 ", "ContentType": "text/plain"}], "uids": ["Cz6opt1QoXo7HhKkza"]} -{"Format": "IDEA0", "ID": "c1c9197d-e7e3-4eab-8c69-f52092630640", "DetectTime": "2023-10-30T14:09:16.549749+02:00", "EventTime": "2023-10-30T14:09:16.549766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["COGW6H1czdUIm4LQV1"]} -{"Format": "IDEA0", "ID": "6a6bdeb8-5709-4e19-8013-4b93bd6f4f28", "DetectTime": "2023-10-30T14:09:16.569900+02:00", "EventTime": "2023-10-30T14:09:16.569917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CZ4DniZy6So2hdRD5"]} -{"Format": "IDEA0", "ID": "df16e9c2-cd32-4618-9d38-3fa187360bf7", "DetectTime": "2023-10-30T14:09:16.591103+02:00", "EventTime": "2023-10-30T14:09:16.591117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C6iJOk2kbVUm5P901"]} -{"Format": "IDEA0", "ID": "2e9af1c8-a9df-459d-bad7-42a77de2b192", "DetectTime": "2023-10-30T14:09:16.611206+02:00", "EventTime": "2023-10-30T14:09:16.611225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cx1SvP2OgtgNSdusV7"]} -{"Format": "IDEA0", "ID": "fdb77852-44ae-43f0-8e23-7428b31e8d6c", "DetectTime": "2023-10-30T14:09:16.631745+02:00", "EventTime": "2023-10-30T14:09:16.631757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CWH3062JH9qdZv8fk7"]} -{"Format": "IDEA0", "ID": "7803bd02-c1cd-45b9-b2b3-3bf447a10ad1", "DetectTime": "2023-10-30T14:09:16.653899+02:00", "EventTime": "2023-10-30T14:09:16.653920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CLhyJf2tAmhCaJ68a3"]} -{"Format": "IDEA0", "ID": "e51e87fa-72f3-4b85-b7b2-3b55ba247921", "DetectTime": "2023-10-30T14:09:16.678573+02:00", "EventTime": "2023-10-30T14:09:16.678590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.164.33.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.164.33.173 ", "ContentType": "text/plain"}], "uids": ["CJBhyE2N2RS2pMcCXc"]} -{"Format": "IDEA0", "ID": "eaff3fc6-3bcc-461e-b3a4-a654db73d9ae", "DetectTime": "2023-10-30T14:09:16.699623+02:00", "EventTime": "2023-10-30T14:09:16.699639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CYvzlUIg05aaghugj"]} -{"Format": "IDEA0", "ID": "3168f760-a5cc-49e0-aef2-530f190d78b1", "DetectTime": "2023-10-30T14:09:16.718687+02:00", "EventTime": "2023-10-30T14:09:16.718704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CPzPHl2Tx1TG2RS7hd"]} -{"Format": "IDEA0", "ID": "b6f4ffa0-76e8-4b3a-9d00-e8f6eecf2cd5", "DetectTime": "2023-10-30T14:09:16.739483+02:00", "EventTime": "2023-10-30T14:09:16.739500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C40kyW2h81lFNH9Nwe"]} -{"Format": "IDEA0", "ID": "3e03e5b6-7f3b-4038-acb7-f1319059bedb", "DetectTime": "2023-10-30T14:09:16.756644+02:00", "EventTime": "2023-10-30T14:09:16.756663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["COvFvdKeu5pSa8M6e"]} -{"Format": "IDEA0", "ID": "badaf68c-d8b1-4391-acb5-7098ea78468a", "DetectTime": "2023-10-30T14:09:16.776998+02:00", "EventTime": "2023-10-30T14:09:16.777014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CoAd371uNrtJ8Ki4v8"]} -{"Format": "IDEA0", "ID": "38332c73-ea94-477b-b336-981ecf2bbf1a", "DetectTime": "2023-10-30T14:09:16.797433+02:00", "EventTime": "2023-10-30T14:09:16.797452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Clh6Bb31KREIrtrkp4"]} -{"Format": "IDEA0", "ID": "59d0e777-c808-425b-b3c9-dafe38c7f0bc", "DetectTime": "2023-10-30T14:09:16.813817+02:00", "EventTime": "2023-10-30T14:09:16.813828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["Cx0fTk3lncLy6TDb08"]} -{"Format": "IDEA0", "ID": "6449ddde-e4c3-42da-a023-0ab0079632e8", "DetectTime": "2023-10-30T14:09:16.830679+02:00", "EventTime": "2023-10-30T14:09:16.830691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C0gpfY1g3IBgCxYCf3"]} -{"Format": "IDEA0", "ID": "4e0b03de-c4c4-47aa-af5a-4c78bfcf04f5", "DetectTime": "2023-10-30T14:09:16.851262+02:00", "EventTime": "2023-10-30T14:09:16.851279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CyDQHq3pJNI30oau7f"]} -{"Format": "IDEA0", "ID": "555062c3-df26-4fa9-b715-913b08632f99", "DetectTime": "2023-10-30T14:09:16.870597+02:00", "EventTime": "2023-10-30T14:09:16.870608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CLd5Ot1n2w1or5UAK"]} -{"Format": "IDEA0", "ID": "46bd67fc-2057-4671-b7f2-d6062419bff9", "DetectTime": "2023-10-30T14:09:16.888586+02:00", "EventTime": "2023-10-30T14:09:16.888602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CC1SuU3JG0GWMfNnvc"]} -{"Format": "IDEA0", "ID": "a6dc543a-0b15-4cf3-b783-a0b656d276ab", "DetectTime": "2023-10-30T14:09:16.913645+02:00", "EventTime": "2023-10-30T14:09:16.913661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.214.58.197 ", "ContentType": "text/plain"}], "uids": ["Cl0Vwr2KdnpKtDvy8a"]} -{"Format": "IDEA0", "ID": "8458e76a-6b9e-41ba-a8eb-440645f0eb5b", "DetectTime": "2023-10-30T14:09:16.931664+02:00", "EventTime": "2023-10-30T14:09:16.931675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["CsgAoZfT9tsswhind"]} -{"Format": "IDEA0", "ID": "ba7f4dec-1c34-4f67-a580-87a7adea5cab", "DetectTime": "2023-10-30T14:09:16.948849+02:00", "EventTime": "2023-10-30T14:09:16.948860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CiDJUEyIxcQaTaJx1"]} -{"Format": "IDEA0", "ID": "eb923ae2-e01d-4f23-b538-005b10c87d47", "DetectTime": "2023-10-30T14:09:16.969587+02:00", "EventTime": "2023-10-30T14:09:16.969600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CrVNUdn2mKTF1rel6"]} -{"Format": "IDEA0", "ID": "d1a59c52-556e-4980-86e2-87d7c0cb82a9", "DetectTime": "2023-10-30T14:09:16.989429+02:00", "EventTime": "2023-10-30T14:09:16.989442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["C8GUL41pxhddJXaCcg"]} -{"Format": "IDEA0", "ID": "bcf3789b-0a0e-4f56-b163-d2cab1cafbd6", "DetectTime": "2023-10-30T14:09:17.007546+02:00", "EventTime": "2023-10-30T14:09:17.007572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CUKkAl1o9yxFiMh4Qc"]} -{"Format": "IDEA0", "ID": "9bf629c4-7fcb-41fb-9604-95999f3224d2", "DetectTime": "2023-10-30T14:09:17.022521+02:00", "EventTime": "2023-10-30T14:09:17.022537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CpfsUm3J8XJ5DNSICj"]} -{"Format": "IDEA0", "ID": "d8fad05d-89ea-4cf3-8851-3baf919ae925", "DetectTime": "2023-10-30T14:09:17.039635+02:00", "EventTime": "2023-10-30T14:09:17.039647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["CjJDd72Ef7x6ujVb4j"]} -{"Format": "IDEA0", "ID": "e3129155-20b6-47ec-a17d-699c162a0697", "DetectTime": "2023-10-30T14:09:17.057405+02:00", "EventTime": "2023-10-30T14:09:17.057417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["CYu2433R8wSxDPnSi3"]} -{"Format": "IDEA0", "ID": "6cdc8c7f-cf58-4742-8bc1-1c3d206f37bc", "DetectTime": "2023-10-30T14:09:17.074548+02:00", "EventTime": "2023-10-30T14:09:17.074561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.214.58.197 ", "ContentType": "text/plain"}], "uids": ["CDu25N1ZezCRKdCmzb"]} -{"Format": "IDEA0", "ID": "7704b661-f377-452d-b623-6b909fc12d0c", "DetectTime": "2023-10-30T14:09:17.102409+02:00", "EventTime": "2023-10-30T14:09:17.102422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["CuKMTj3PUiPzUbITP4"]} -{"Format": "IDEA0", "ID": "2ffe1675-0724-4e55-b198-f6308587e269", "DetectTime": "2023-10-30T14:09:17.117316+02:00", "EventTime": "2023-10-30T14:09:17.117326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.249.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.249.237 ", "ContentType": "text/plain"}], "uids": ["Cz3tvwFi7yY4FBILk"]} -{"Format": "IDEA0", "ID": "00b57867-6204-449d-94e9-f515fe223ea0", "DetectTime": "2023-10-30T14:09:17.136186+02:00", "EventTime": "2023-10-30T14:09:17.136197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CWhtpR2AHlYdgXERle"]} -{"Format": "IDEA0", "ID": "2bd65558-9c73-485b-a988-2b9aa3aed25a", "DetectTime": "2023-10-30T14:09:17.151805+02:00", "EventTime": "2023-10-30T14:09:17.151816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.166.201"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.64.166.201 ", "ContentType": "text/plain"}], "uids": ["CA5Ann1cpVcURxAk2e"]} -{"Format": "IDEA0", "ID": "674036ff-3c87-41fc-83a0-0f0ba66a20e6", "DetectTime": "2023-10-30T14:09:17.168067+02:00", "EventTime": "2023-10-30T14:09:17.168079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwYHJnpbSLFFXEdze"]} -{"Format": "IDEA0", "ID": "75440cb8-b54f-44d0-814e-b8f48e3d0bc6", "DetectTime": "2023-10-30T14:09:17.186391+02:00", "EventTime": "2023-10-30T14:09:17.186403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["CNvNLd2GAJc9y2LTsl"]} -{"Format": "IDEA0", "ID": "c729d3a3-321a-4292-9d2b-f5667f1851f5", "DetectTime": "2023-10-30T14:09:17.207836+02:00", "EventTime": "2023-10-30T14:09:17.207853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C6UJ3e2W1My8pFbXMg"]} -{"Format": "IDEA0", "ID": "60e2f11a-4aa0-4b99-846b-c6594b0c311b", "DetectTime": "2023-10-30T14:09:17.240897+02:00", "EventTime": "2023-10-30T14:09:17.240914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CD7u9x1Mw5cxA2viD1"]} -{"Format": "IDEA0", "ID": "8ec865a0-45af-434b-857c-517a3def5892", "DetectTime": "2023-10-30T14:09:17.269089+02:00", "EventTime": "2023-10-30T14:09:17.269105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["C5deApDgQN44uLXb"]} -{"Format": "IDEA0", "ID": "bdafd593-c2a4-470c-b49f-3a5d22ce8132", "DetectTime": "2023-10-30T14:09:17.288874+02:00", "EventTime": "2023-10-30T14:09:17.288887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CiNnuX2Jof48uxnvp3"]} -{"Format": "IDEA0", "ID": "68acd850-c86f-4a08-8eae-be37ddebaa6d", "DetectTime": "2023-10-30T14:09:17.314510+02:00", "EventTime": "2023-10-30T14:09:17.314522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C2DRfrmFBItf5NPc2"]} -{"Format": "IDEA0", "ID": "4b82d638-4c24-465a-8270-40dbcc43b50e", "DetectTime": "2023-10-30T14:09:17.332028+02:00", "EventTime": "2023-10-30T14:09:17.332039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQWgnjyWqRxpU7xFh"]} -{"Format": "IDEA0", "ID": "90af3ca8-e56e-4de5-ac2e-ed2f74183a33", "DetectTime": "2023-10-30T14:09:17.354945+02:00", "EventTime": "2023-10-30T14:09:17.354957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CS3wuv23z5jJbebky8"]} -{"Format": "IDEA0", "ID": "9d5d67b4-344c-4b76-b9e4-662f2a1f4e34", "DetectTime": "2023-10-30T14:09:17.374943+02:00", "EventTime": "2023-10-30T14:09:17.374955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CjJSRk2FyOJy8jTE0c"]} -{"Format": "IDEA0", "ID": "91727b74-e186-4d98-a30e-e39c95d97895", "DetectTime": "2023-10-30T14:09:17.403454+02:00", "EventTime": "2023-10-30T14:09:17.403465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CgAAW749kks64Kv2Z"]} -{"Format": "IDEA0", "ID": "5976c0ed-f5ce-4e1f-888a-d1a5a4be32de", "DetectTime": "2023-10-30T14:09:17.429535+02:00", "EventTime": "2023-10-30T14:09:17.429546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.166.201"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.64.166.201 ", "ContentType": "text/plain"}], "uids": ["ChbZb1RE3yinNM0X3"]} -{"Format": "IDEA0", "ID": "f8d5ba29-de29-4bff-a6e0-83f7b3919c14", "DetectTime": "2023-10-30T14:09:17.455558+02:00", "EventTime": "2023-10-30T14:09:17.455579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CHUwOe4P5deztSQtqd"]} -{"Format": "IDEA0", "ID": "6c976477-3492-48f6-9859-222d9eb6ed1f", "DetectTime": "2023-10-30T14:09:17.479066+02:00", "EventTime": "2023-10-30T14:09:17.479078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CEDCk3IUGts0gax4b"]} -{"Format": "IDEA0", "ID": "ab3254fc-eca5-49a1-ba7e-328eea1d5d51", "DetectTime": "2023-10-30T14:09:17.508148+02:00", "EventTime": "2023-10-30T14:09:17.508165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["Cqh6zq1mNNDWpemF2d"]} -{"Format": "IDEA0", "ID": "a2dc25ec-e7fe-4906-8e60-3b96ab9a93e9", "DetectTime": "2023-10-30T14:09:17.533182+02:00", "EventTime": "2023-10-30T14:09:17.533193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CzO0l2lQCWKv1Rms9"]} -{"Format": "IDEA0", "ID": "b49ea092-6420-4fad-8d88-2807ab83a659", "DetectTime": "2023-10-30T14:09:17.555835+02:00", "EventTime": "2023-10-30T14:09:17.555851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cj4fZc2bzWcuYDeiYj"]} -{"Format": "IDEA0", "ID": "f1d75cb9-f3cc-4a22-bb68-75a649dd8508", "DetectTime": "2023-10-30T14:09:17.583417+02:00", "EventTime": "2023-10-30T14:09:17.583430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CWzqps1uWhwqc9GMu7"]} -{"Format": "IDEA0", "ID": "d06c963b-73d0-47fc-b082-8a9f564ec3bb", "DetectTime": "2023-10-30T14:09:17.609833+02:00", "EventTime": "2023-10-30T14:09:17.609849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C4EegM3jAXh3YUwK62"]} -{"Format": "IDEA0", "ID": "f1976056-748c-4e0d-a517-8e14fc944980", "DetectTime": "2023-10-30T14:09:17.639082+02:00", "EventTime": "2023-10-30T14:09:17.639093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["CMnKRP3a1l2m8LT03l"]} -{"Format": "IDEA0", "ID": "72622058-b3c3-4209-bd74-79c3bfa7c96b", "DetectTime": "2023-10-30T14:09:17.667088+02:00", "EventTime": "2023-10-30T14:09:17.667101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.249.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.249.237 ", "ContentType": "text/plain"}], "uids": ["Ca2DCp2bizq0D5Ntha"]} -{"Format": "IDEA0", "ID": "71fffc2e-0895-4eb6-a629-88879b6e54f9", "DetectTime": "2023-10-30T14:09:17.694246+02:00", "EventTime": "2023-10-30T14:09:17.694258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CYGQMZ2g4wVcpV3rDe"]} -{"Format": "IDEA0", "ID": "7762df02-6566-4b51-98e5-c5d45b2ba936", "DetectTime": "2023-10-30T14:09:17.719829+02:00", "EventTime": "2023-10-30T14:09:17.719842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CeGXezl9UC6sZcj1g"]} -{"Format": "IDEA0", "ID": "fb7ada9c-b34e-4ae4-9d94-8eab07bbe730", "DetectTime": "2023-10-30T14:09:17.749148+02:00", "EventTime": "2023-10-30T14:09:17.749163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CMYByPGgkTtFaIHrj"]} -{"Format": "IDEA0", "ID": "8cb98e6c-ac83-4b3e-828e-a3acffa6805f", "DetectTime": "2023-10-30T14:09:17.776117+02:00", "EventTime": "2023-10-30T14:09:17.776128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CS0FWn4tNIU966Anq1"]} -{"Format": "IDEA0", "ID": "8fb5cd2c-1e8b-4a1c-847c-88fb4e931b04", "DetectTime": "2023-10-30T14:09:17.798516+02:00", "EventTime": "2023-10-30T14:09:17.798528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cy2LGO2VbWFt9qLRRk"]} -{"Format": "IDEA0", "ID": "7bb652a4-52f0-404c-a377-31cbc07a4f09", "DetectTime": "2023-10-30T14:09:17.826430+02:00", "EventTime": "2023-10-30T14:09:17.826446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CdUl4k2bfi612w1uQ5"]} -{"Format": "IDEA0", "ID": "ce89cf44-a82d-44c8-8685-199b239761f5", "DetectTime": "2023-10-30T14:09:17.856514+02:00", "EventTime": "2023-10-30T14:09:17.856526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["CA3ReG2BftyIXCH4Cj"]} -{"Format": "IDEA0", "ID": "a211d4de-915e-40ab-a64f-dfe6b09ef9f9", "DetectTime": "2023-10-30T14:09:17.884710+02:00", "EventTime": "2023-10-30T14:09:17.884721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.164.33.173"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.164.33.173 ", "ContentType": "text/plain"}], "uids": ["C6QZog138zgy17Zjld"]} -{"Format": "IDEA0", "ID": "55e38128-7aee-4522-b26b-0cece1e6b031", "DetectTime": "2023-10-30T14:09:17.914450+02:00", "EventTime": "2023-10-30T14:09:17.914463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["C0MB9x2M4BxIOkrb"]} -{"Format": "IDEA0", "ID": "5b29aaa1-be06-4840-a092-5f30d5a5a844", "DetectTime": "2023-10-30T14:09:17.942978+02:00", "EventTime": "2023-10-30T14:09:17.942991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CFWO5r2KMGXPbbA4wd"]} -{"Format": "IDEA0", "ID": "4e2ca1c2-c848-4b94-b918-c09eb69169e8", "DetectTime": "2023-10-30T14:09:17.974196+02:00", "EventTime": "2023-10-30T14:09:17.974212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CvmAIx3jEvT9AaEObk"]} -{"Format": "IDEA0", "ID": "eb02e226-659d-496c-bf75-47d5765fdb74", "DetectTime": "2023-10-30T14:09:18.001816+02:00", "EventTime": "2023-10-30T14:09:18.001826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CEZridOGPUx3tsFc2"]} -{"Format": "IDEA0", "ID": "07cd9239-2053-44ab-b2b3-d37cd3c2bab2", "DetectTime": "2023-10-30T14:09:18.025716+02:00", "EventTime": "2023-10-30T14:09:18.025730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cmaagf4MWAxugBTm1h"]} -{"Format": "IDEA0", "ID": "6d3a0bdd-c90f-4b93-be99-0094781fb08d", "DetectTime": "2023-10-30T14:09:18.054814+02:00", "EventTime": "2023-10-30T14:09:18.054832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CRFsB3B69q0q1GvKi"]} -{"Format": "IDEA0", "ID": "e5d0acf3-083d-4af5-bec6-279833a1d8c7", "DetectTime": "2023-10-30T14:09:18.084600+02:00", "EventTime": "2023-10-30T14:09:18.084610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["Cm422Z2x68L2MhJuQj"]} -{"Format": "IDEA0", "ID": "3d260959-c4f1-4005-b191-8f3e28461734", "DetectTime": "2023-10-30T14:09:18.109653+02:00", "EventTime": "2023-10-30T14:09:18.109664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CgcMDX1SgFZ2cVV8Ta"]} -{"Format": "IDEA0", "ID": "4a61be77-14d3-488a-a834-e7244defcbad", "DetectTime": "2023-10-30T14:09:18.138639+02:00", "EventTime": "2023-10-30T14:09:18.138652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.249.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.138.249.237 ", "ContentType": "text/plain"}], "uids": ["CTzND72TnZtlkPi2Zg"]} -{"Format": "IDEA0", "ID": "c90b859f-9698-486e-98a7-5c17256f95d5", "DetectTime": "2023-10-30T14:09:18.163774+02:00", "EventTime": "2023-10-30T14:09:18.163798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CjkbE4X6rEmtERack"]} -{"Format": "IDEA0", "ID": "192f2c44-9c0d-4363-b3c4-a3655c6f41c3", "DetectTime": "2023-10-30T14:09:18.195200+02:00", "EventTime": "2023-10-30T14:09:18.195215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["C3nmdYAoSO3uKZBMb"]} -{"Format": "IDEA0", "ID": "30564194-3cbb-4044-9271-c86d753e15e1", "DetectTime": "2023-10-30T14:09:18.225823+02:00", "EventTime": "2023-10-30T14:09:18.225836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Czrm62NFqBQNflQpl"]} -{"Format": "IDEA0", "ID": "f85ba3e2-22c2-43bf-9d47-ba7b89a12c1b", "DetectTime": "2023-10-30T14:09:18.255886+02:00", "EventTime": "2023-10-30T14:09:18.255902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ci1ymC2rDQrLGIlZO6"]} -{"Format": "IDEA0", "ID": "fb0821cb-714f-41bd-8f95-66019fc54ebd", "DetectTime": "2023-10-30T14:09:18.285198+02:00", "EventTime": "2023-10-30T14:09:18.285211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CEpcOxtGNlKfY3ub9"]} -{"Format": "IDEA0", "ID": "8854e1b0-fe63-4006-b363-d2ba2c845be7", "DetectTime": "2023-10-30T14:09:18.311031+02:00", "EventTime": "2023-10-30T14:09:18.311041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CiByOL3xnjTOVQTAjf"]} -{"Format": "IDEA0", "ID": "3440cc37-cd45-4c6c-9472-e1276a5c5889", "DetectTime": "2023-10-30T14:09:18.338457+02:00", "EventTime": "2023-10-30T14:09:18.338470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CkYujzmieQIYX32S3"]} -{"Format": "IDEA0", "ID": "9c41979e-61fa-41a3-9dd3-63d9683a9659", "DetectTime": "2023-10-30T14:09:18.362076+02:00", "EventTime": "2023-10-30T14:09:18.362087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CORaD04tmubpkeQ3Ce"]} -{"Format": "IDEA0", "ID": "cbafffaa-2391-415f-836c-b524803ab6a0", "DetectTime": "2023-10-30T14:09:18.393619+02:00", "EventTime": "2023-10-30T14:09:18.393636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C3xDki3zigUZmKfxc"]} -{"Format": "IDEA0", "ID": "e9af7abf-c4ac-4bc0-9a72-ef36ed0b300d", "DetectTime": "2023-10-30T14:09:18.420494+02:00", "EventTime": "2023-10-30T14:09:18.420505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["Cu5NMo1HRhzSNW4MZe"]} -{"Format": "IDEA0", "ID": "87bab083-a0ef-4d2d-9c14-4aa7b6ffef3a", "DetectTime": "2023-10-30T14:09:18.443760+02:00", "EventTime": "2023-10-30T14:09:18.443775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C01AVxkUceqvAUcic"]} -{"Format": "IDEA0", "ID": "c63ecfdc-574c-4bc7-81fb-bcf54c0ade45", "DetectTime": "2023-10-30T14:09:18.470005+02:00", "EventTime": "2023-10-30T14:09:18.470019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CEROMA1MvJuxiRpYda"]} -{"Format": "IDEA0", "ID": "e33f830f-82f0-4bc7-8502-885d2832fe84", "DetectTime": "2023-10-30T14:09:18.503367+02:00", "EventTime": "2023-10-30T14:09:18.503383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CJ7nHS2DpYq17QLeQf"]} -{"Format": "IDEA0", "ID": "176ab662-6693-42c6-b466-41590de6e0ef", "DetectTime": "2023-10-30T14:09:18.538312+02:00", "EventTime": "2023-10-30T14:09:18.538334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CdhODi2LfwGNkhxz0h"]} -{"Format": "IDEA0", "ID": "fd9e48ec-f31f-4ac7-b126-2bfe7702b70e", "DetectTime": "2023-10-30T14:09:18.568756+02:00", "EventTime": "2023-10-30T14:09:18.568769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C7Gop63uFtKqgV3Jbe"]} -{"Format": "IDEA0", "ID": "2ffc2ba6-0940-4a86-8be0-aea6415511bf", "DetectTime": "2023-10-30T14:09:18.596355+02:00", "EventTime": "2023-10-30T14:09:18.596366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CEVHI52p0kbAiPnVAb"]} -{"Format": "IDEA0", "ID": "0caba723-2f64-4c8c-be3a-34788b8f4cf7", "DetectTime": "2023-10-30T14:09:18.620760+02:00", "EventTime": "2023-10-30T14:09:18.620772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFTKkhjpmwBygzsf6"]} -{"Format": "IDEA0", "ID": "eacf2735-59fb-4159-95a9-a90b2174222d", "DetectTime": "2023-10-30T14:09:18.652777+02:00", "EventTime": "2023-10-30T14:09:18.652793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C3yiDi1KC0yy7F6m"]} -{"Format": "IDEA0", "ID": "d64645e9-6591-4c03-9f85-9aa071cb140a", "DetectTime": "2023-10-30T14:09:18.685881+02:00", "EventTime": "2023-10-30T14:09:18.685898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["CMisbUy9y56Vzffmg"]} -{"Format": "IDEA0", "ID": "55d6570b-1552-46db-aac9-4340f07d24dc", "DetectTime": "2023-10-30T14:09:18.716158+02:00", "EventTime": "2023-10-30T14:09:18.716174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["Cq5lxk2hSG8OIXhd2a"]} -{"Format": "IDEA0", "ID": "74c99990-51c9-4068-90e8-66ab6fa42a77", "DetectTime": "2023-10-30T14:09:18.749484+02:00", "EventTime": "2023-10-30T14:09:18.749501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.214.58.197 ", "ContentType": "text/plain"}], "uids": ["Ce1J433bScwmtuG1Lj"]} -{"Format": "IDEA0", "ID": "d22d22bf-6697-4912-a76d-63c69b56a28d", "DetectTime": "2023-10-30T14:09:18.781557+02:00", "EventTime": "2023-10-30T14:09:18.781568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CAa4Sp4IsJFzpAS2bf"]} -{"Format": "IDEA0", "ID": "877c6643-eeab-40ec-ac36-3fce74453378", "DetectTime": "2023-10-30T14:09:18.808563+02:00", "EventTime": "2023-10-30T14:09:18.808582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXbeCK1bzatGPXlQY7"]} -{"Format": "IDEA0", "ID": "e5dbf4b5-65ac-436b-b605-f53fd333408c", "DetectTime": "2023-10-30T14:09:18.844040+02:00", "EventTime": "2023-10-30T14:09:18.844062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CeTMHQ1pJQJQzdEaj"]} -{"Format": "IDEA0", "ID": "5d6f5add-cf5e-4660-adf0-11681122ec84", "DetectTime": "2023-10-30T14:09:18.882118+02:00", "EventTime": "2023-10-30T14:09:18.882140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CVqt9C4TgwPe6jpS06"]} -{"Format": "IDEA0", "ID": "a5be7d89-8103-482a-91ec-fc7d4513a0c4", "DetectTime": "2023-10-30T14:09:18.920955+02:00", "EventTime": "2023-10-30T14:09:18.920967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CaZcDBQVsc6pUvJdc"]} -{"Format": "IDEA0", "ID": "71730a67-2cd3-4497-b07a-a45432cff4b3", "DetectTime": "2023-10-30T14:09:18.945249+02:00", "EventTime": "2023-10-30T14:09:18.945264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cjt4bbKoBZXwHbpR1"]} -{"Format": "IDEA0", "ID": "6d6ee7d2-7f52-4614-b377-d38b4af2d1ad", "DetectTime": "2023-10-30T14:09:18.977898+02:00", "EventTime": "2023-10-30T14:09:18.977919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CpMjdI2JIoBywjpQPb"]} -{"Format": "IDEA0", "ID": "9d50073c-c6f1-46d0-9213-355be86c0808", "DetectTime": "2023-10-30T14:09:19.012860+02:00", "EventTime": "2023-10-30T14:09:19.012882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C6BXRl1BQb8msNtPH8"]} -{"Format": "IDEA0", "ID": "ed90fc3d-8e30-4762-b850-df668aa70661", "DetectTime": "2023-10-30T14:09:19.047947+02:00", "EventTime": "2023-10-30T14:09:19.047958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CqISnj4GUN7fhA8yO9"]} -{"Format": "IDEA0", "ID": "f8af6fb8-8183-4927-92e1-8697ed866460", "DetectTime": "2023-10-30T14:09:19.080934+02:00", "EventTime": "2023-10-30T14:09:19.080945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CfCd80495rpNMTClV3"]} -{"Format": "IDEA0", "ID": "aedda44a-afd5-45f4-a3d5-d47fb110616e", "DetectTime": "2023-10-30T14:09:19.111532+02:00", "EventTime": "2023-10-30T14:09:19.111550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXYlZG1Qs9sOUCcBph"]} -{"Format": "IDEA0", "ID": "cd3aa43a-963f-49de-b52b-874ccd25bd7e", "DetectTime": "2023-10-30T14:09:19.144704+02:00", "EventTime": "2023-10-30T14:09:19.144720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CY9TUD2IiIwZBU1uAj"]} -{"Format": "IDEA0", "ID": "f620c27d-51c2-4f8e-84ab-28ffd9068207", "DetectTime": "2023-10-30T14:09:19.179816+02:00", "EventTime": "2023-10-30T14:09:19.179831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["Co7Ews2VD4SFDrAXl5"]} -{"Format": "IDEA0", "ID": "64ab3230-6a1d-4096-ab62-9c0df0c9f725", "DetectTime": "2023-10-30T14:09:19.209736+02:00", "EventTime": "2023-10-30T14:09:19.209748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CEIIaFEHIvz03uGOe"]} -{"Format": "IDEA0", "ID": "afbf5037-8395-42b2-b76b-4a5046558805", "DetectTime": "2023-10-30T14:09:19.243710+02:00", "EventTime": "2023-10-30T14:09:19.243726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CgtyG61NwVTHa7W4ri"]} -{"Format": "IDEA0", "ID": "1a097439-aa20-4dd0-90df-8db9ea8dbeba", "DetectTime": "2023-10-30T14:09:19.271067+02:00", "EventTime": "2023-10-30T14:09:19.271078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["C0p4kb47ff2dSkzM9k"]} -{"Format": "IDEA0", "ID": "21746288-d92a-496f-8c11-da2e30fd35ca", "DetectTime": "2023-10-30T14:09:19.302874+02:00", "EventTime": "2023-10-30T14:09:19.302895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C7pU954pvERDjktw0h"]} -{"Format": "IDEA0", "ID": "168a03a7-d45e-46a5-aeb8-b0a5a5275095", "DetectTime": "2023-10-30T14:09:19.337026+02:00", "EventTime": "2023-10-30T14:09:19.337052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CQwrSVI1LlPSC4ww5"]} -{"Format": "IDEA0", "ID": "7e2f173a-02a3-469f-b780-be8dd4f53163", "DetectTime": "2023-10-30T14:09:19.377479+02:00", "EventTime": "2023-10-30T14:09:19.377492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CSOYES3CFBN20BsW93"]} -{"Format": "IDEA0", "ID": "44d7abd1-b2df-4b84-9710-f82f38ae06d4", "DetectTime": "2023-10-30T14:09:19.414189+02:00", "EventTime": "2023-10-30T14:09:19.414209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CsrGdp1INtHycQtH"]} -{"Format": "IDEA0", "ID": "b8ac9edd-2aec-43d7-8ac0-285d3efd1686", "DetectTime": "2023-10-30T14:09:19.453705+02:00", "EventTime": "2023-10-30T14:09:19.453723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CG0drp3QPKeloTzAVd"]} -{"Format": "IDEA0", "ID": "8b3d671e-b7b1-407f-8da6-61e4556b2c1b", "DetectTime": "2023-10-30T14:09:19.488386+02:00", "EventTime": "2023-10-30T14:09:19.488407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CYkizKKZdFAUSQCXc"]} -{"Format": "IDEA0", "ID": "86a822fa-70c8-4b1e-8982-3b9633294b7c", "DetectTime": "2023-10-30T14:09:19.529498+02:00", "EventTime": "2023-10-30T14:09:19.529517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CeZZHS1p2e84AIQuz8"]} -{"Format": "IDEA0", "ID": "3ca89203-ad87-4b64-8cab-c4c22c56eb83", "DetectTime": "2023-10-30T14:09:19.558591+02:00", "EventTime": "2023-10-30T14:09:19.558612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. ", "ContentType": "text/plain"}], "uids": ["C5Z4Ki45ynIpUUnfDe"]} -{"Format": "Json", "ID": "3ca89203-ad87-4b64-8cab-c4c22c56eb83", "DetectTime": "2023-10-30T14:09:19.558591+02:00", "EventTime": "2023-10-30T14:09:19.558612+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:44:53.019221+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:19.629217)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d8b0571b-c90d-4ed7-b5ae-a88f4cc9c7b6", "DetectTime": "2023-10-30T14:09:19.634256+02:00", "EventTime": "2023-10-30T14:09:19.634289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CdWL2l28IKtWn4DbWe"]} -{"Format": "IDEA0", "ID": "74b8e7ee-a803-47ba-863e-afaff61f7075", "DetectTime": "2023-10-30T14:09:19.674325+02:00", "EventTime": "2023-10-30T14:09:19.674343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["Cni0OA2UYZh7AhLUC3"]} -{"Format": "IDEA0", "ID": "54d942c7-d1d7-424d-bfe1-8687aec01042", "DetectTime": "2023-10-30T14:09:19.718352+02:00", "EventTime": "2023-10-30T14:09:19.718378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CF66Wb2W08z37GizD3"]} -{"Format": "IDEA0", "ID": "05b67aa5-70c2-4b56-a941-87fa8a4b2796", "DetectTime": "2023-10-30T14:09:19.747617+02:00", "EventTime": "2023-10-30T14:09:19.747630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CXC9Ub1mesFrcGWuPf"]} -{"Format": "IDEA0", "ID": "e39439c2-b6e3-4364-aa5c-79b1960f663b", "DetectTime": "2023-10-30T14:09:19.783591+02:00", "EventTime": "2023-10-30T14:09:19.783607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12777], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. ", "ContentType": "text/plain"}], "uids": ["CmsXGA2aOxKV63e3A8"]} -{"Format": "IDEA0", "ID": "bbd2fbf3-781e-42a6-9771-835c554dae0e", "DetectTime": "2023-10-30T14:09:19.820269+02:00", "EventTime": "2023-10-30T14:09:19.820281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["C0WfNa2QyH8y7C05Bf"]} -{"Format": "IDEA0", "ID": "30798af2-4a3d-4688-b17c-2106bf6470a0", "DetectTime": "2023-10-30T14:09:19.853789+02:00", "EventTime": "2023-10-30T14:09:19.853815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CtvZWB1ylwAL1zx4u4"]} -{"Format": "IDEA0", "ID": "f6d7a8b4-62a8-4c77-b0ad-1d24d8ef0c7e", "DetectTime": "2023-10-30T14:09:19.895404+02:00", "EventTime": "2023-10-30T14:09:19.895429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["Coq7g33wOY8MI1fOh1"]} -{"Format": "Json", "ID": "f6d7a8b4-62a8-4c77-b0ad-1d24d8ef0c7e", "DetectTime": "2023-10-30T14:09:19.895404+02:00", "EventTime": "2023-10-30T14:09:19.895429+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T09:44:55.690814+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2023/10/30 14:09:19.966225)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8711fc8d-c9eb-4d3e-9cee-097b6a76bcd9", "DetectTime": "2023-10-30T14:09:19.972039+02:00", "EventTime": "2023-10-30T14:09:19.972060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CR1yoa1rpZ8oxb8jp6"]} -{"Format": "IDEA0", "ID": "43f0fdb0-74c1-4176-a6d4-b7fa059a6440", "DetectTime": "2023-10-30T14:09:20.003058+02:00", "EventTime": "2023-10-30T14:09:20.003078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14433], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. ", "ContentType": "text/plain"}], "uids": ["C0g3ftkgNhx9pn7Gj"]} -{"Format": "IDEA0", "ID": "b565aef7-9922-4f9d-8a8f-d5aedd51cdf5", "DetectTime": "2023-10-30T14:09:20.037474+02:00", "EventTime": "2023-10-30T14:09:20.037492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CK4TPG3tmCprdaQJs"]} -{"Format": "IDEA0", "ID": "5d7e114a-32a9-4320-91b1-619a724bec1d", "DetectTime": "2023-10-30T14:09:20.070517+02:00", "EventTime": "2023-10-30T14:09:20.070532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2810], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. ", "ContentType": "text/plain"}], "uids": ["CM48F83f7zPKD1C745"]} -{"Format": "IDEA0", "ID": "ca1be3b6-073e-4a0c-95a5-929485e95807", "DetectTime": "2023-10-30T14:09:20.106615+02:00", "EventTime": "2023-10-30T14:09:20.106633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CsbjDw3JsOzFxu6uBh"]} -{"Format": "IDEA0", "ID": "87e57cda-28ed-4e69-942d-c8df41e7e1a4", "DetectTime": "2023-10-30T14:09:20.151180+02:00", "EventTime": "2023-10-30T14:09:20.151199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9HQSNA6zKvRDvgh"]} -{"Format": "IDEA0", "ID": "2739598e-0f21-48f8-9e7f-5e4f3ecd9fc7", "DetectTime": "2023-10-30T14:09:20.188130+02:00", "EventTime": "2023-10-30T14:09:20.188154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CzadvD3qtrwlKU6885"]} -{"Format": "IDEA0", "ID": "6961945e-78ec-42cf-947d-5dc739f5cbf0", "DetectTime": "2023-10-30T14:09:20.248411+02:00", "EventTime": "2023-10-30T14:09:20.248425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CpF10R1MIz1BA1h7R2"]} -{"Format": "IDEA0", "ID": "19d96cc3-ce2e-400e-b24b-8e393a1250ff", "DetectTime": "2023-10-30T14:09:20.308278+02:00", "EventTime": "2023-10-30T14:09:20.308301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CHiaVs34JziIgtwWgb"]} -{"Format": "IDEA0", "ID": "8990721e-db35-4e2f-b172-ee0ce3ec59dd", "DetectTime": "2023-10-30T14:09:20.362694+02:00", "EventTime": "2023-10-30T14:09:20.362708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C3jMvC4p1osPDsuMz9"]} -{"Format": "IDEA0", "ID": "48e9c96e-7c99-4184-8292-0dfb0216784a", "DetectTime": "2023-10-30T14:09:20.423686+02:00", "EventTime": "2023-10-30T14:09:20.423707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["COB3WD1ABOu75c7JX5"]} -{"Format": "IDEA0", "ID": "81b35dc6-3b99-4a7d-aa3f-06976db8f62f", "DetectTime": "2023-10-30T14:09:20.484700+02:00", "EventTime": "2023-10-30T14:09:20.484716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C2T8TH31VlaHQ81IOg"]} -{"Format": "IDEA0", "ID": "ec0984af-f07c-4266-a676-ddf41d8c6be3", "DetectTime": "2023-10-30T14:09:20.544390+02:00", "EventTime": "2023-10-30T14:09:20.544405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CXKfzG4x14wYxSe5ng"]} -{"Format": "Json", "ID": "ec0984af-f07c-4266-a676-ddf41d8c6be3", "DetectTime": "2023-10-30T14:09:20.544390+02:00", "EventTime": "2023-10-30T14:09:20.544405+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:15:57.692288+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:20.651918)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "90c7f461-ebd1-4c52-9ddc-924591b126da", "DetectTime": "2023-10-30T14:09:20.656394+02:00", "EventTime": "2023-10-30T14:09:20.656408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CAfBGn3v9077GD9o71"]} -{"Format": "IDEA0", "ID": "fa814b38-ba22-4450-8ba4-c29ee3c05b1c", "DetectTime": "2023-10-30T14:09:20.702120+02:00", "EventTime": "2023-10-30T14:09:20.702133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CpKXM9I7w0JfH360f"]} -{"Format": "IDEA0", "ID": "595705fe-b6ca-4411-a2e8-10c81542b1cb", "DetectTime": "2023-10-30T14:09:20.744910+02:00", "EventTime": "2023-10-30T14:09:20.744924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CaDBou4KIRzTzONteh"]} -{"Format": "IDEA0", "ID": "e45e54bf-34da-4323-9619-e7eca062a29a", "DetectTime": "2023-10-30T14:09:20.799198+02:00", "EventTime": "2023-10-30T14:09:20.799221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLyGML30IyBm8oHgnj"]} -{"Format": "IDEA0", "ID": "93aefc51-52d7-48c5-9025-65f60dc7cbdc", "DetectTime": "2023-10-30T14:09:20.845689+02:00", "EventTime": "2023-10-30T14:09:20.845706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CsnINY3twp2KpQvd6i"]} -{"Format": "IDEA0", "ID": "e90e19eb-8c58-41ef-9888-0433ecbe5ecf", "DetectTime": "2023-10-30T14:09:20.901682+02:00", "EventTime": "2023-10-30T14:09:20.901696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CNESSw17ATfs7YKJE1"]} -{"Format": "IDEA0", "ID": "57b4f759-60db-4fb2-bc36-2f28469cda4a", "DetectTime": "2023-10-30T14:09:20.962875+02:00", "EventTime": "2023-10-30T14:09:20.962889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C14Pel3oPBG2NmDldj"]} -{"Format": "IDEA0", "ID": "f0319eca-be1c-4221-9c94-cb44392739b4", "DetectTime": "2023-10-30T14:09:21.018446+02:00", "EventTime": "2023-10-30T14:09:21.018465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Ca692T3AQWBe3uJ0e1"]} -{"Format": "Json", "ID": "f0319eca-be1c-4221-9c94-cb44392739b4", "DetectTime": "2023-10-30T14:09:21.018446+02:00", "EventTime": "2023-10-30T14:09:21.018465+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:15:59.705374+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:21.107665)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab244f14-7a48-4465-89cd-992a5352f691", "DetectTime": "2023-10-30T14:09:21.113766+02:00", "EventTime": "2023-10-30T14:09:21.113786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["ChwaJz1HTexSuO4wM6"]} -{"Format": "IDEA0", "ID": "1fa32413-a5ea-4cf3-9902-47670c8e5223", "DetectTime": "2023-10-30T14:09:21.163253+02:00", "EventTime": "2023-10-30T14:09:21.163271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C3VltX2Cu5qbOsiyNc"]} -{"Format": "IDEA0", "ID": "aa9cba48-668d-4c31-94f6-0bb7d2ba8f2b", "DetectTime": "2023-10-30T14:09:21.205231+02:00", "EventTime": "2023-10-30T14:09:21.205250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C7RIWjRUHYni41157"]} -{"Format": "IDEA0", "ID": "5ed8e81d-4027-4b3d-b057-a803cd97996b", "DetectTime": "2023-10-30T14:09:21.254211+02:00", "EventTime": "2023-10-30T14:09:21.254223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["ClV80B2UCAnYudW9B9"]} -{"Format": "IDEA0", "ID": "2f5bd3d9-dde1-45a7-8af6-bdb00cff7aa0", "DetectTime": "2023-10-30T14:09:21.300209+02:00", "EventTime": "2023-10-30T14:09:21.300220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CpzlXTD9Usv8kF2Ce"]} -{"Format": "IDEA0", "ID": "09e0a204-9a40-45ff-9df3-046c1452f8d3", "DetectTime": "2023-10-30T14:09:21.328169+02:00", "EventTime": "2023-10-30T14:09:21.328181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CwaIzY1JABVHBnLoYe"]} -{"Format": "IDEA0", "ID": "b82b0de3-9efb-4aa6-b40b-2e0a3fb30594", "DetectTime": "2023-10-30T14:09:21.364216+02:00", "EventTime": "2023-10-30T14:09:21.364227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CKTAzw1Ed2VnRrcuoe"]} -{"Format": "IDEA0", "ID": "ea19447e-70a1-4691-ba5a-bc887bf48ce9", "DetectTime": "2023-10-30T14:09:21.404375+02:00", "EventTime": "2023-10-30T14:09:21.404386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CJPUNuqAtLZfXIUDg"]} -{"Format": "IDEA0", "ID": "fcebe200-204c-4162-9dc3-8f42f1f617e2", "DetectTime": "2023-10-30T14:09:21.447835+02:00", "EventTime": "2023-10-30T14:09:21.447851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["CKYgaq4R2gLvEe7C7b"]} -{"Format": "Json", "ID": "fcebe200-204c-4162-9dc3-8f42f1f617e2", "DetectTime": "2023-10-30T14:09:21.447835+02:00", "EventTime": "2023-10-30T14:09:21.447851+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:16:50.602508+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:21.535241)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb6de320-ab9f-4869-9bf0-2b92d3136c18", "DetectTime": "2023-10-30T14:09:21.541148+02:00", "EventTime": "2023-10-30T14:09:21.541176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["C5h0o94mx5ob1kmZlc"]} -{"Format": "IDEA0", "ID": "04b9807c-e148-421d-b39d-5ba983089645", "DetectTime": "2023-10-30T14:09:21.586770+02:00", "EventTime": "2023-10-30T14:09:21.586803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CR16kj13m6EYqTp8sj"]} -{"Format": "IDEA0", "ID": "f1e3c1cb-627f-45cb-a204-7e19eea14110", "DetectTime": "2023-10-30T14:09:21.630598+02:00", "EventTime": "2023-10-30T14:09:21.630613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CS14PVyUpfIGweRy2"]} -{"Format": "IDEA0", "ID": "6398a653-db54-41e0-81ca-c3dc010d2556", "DetectTime": "2023-10-30T14:09:21.681556+02:00", "EventTime": "2023-10-30T14:09:21.681577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CYMsIV1EIktELODIp6"]} -{"Format": "IDEA0", "ID": "269679fb-16fc-40cb-9c80-365f89a67d40", "DetectTime": "2023-10-30T14:09:21.735268+02:00", "EventTime": "2023-10-30T14:09:21.735291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CJfgTZ3d9TGBwA76y8"]} -{"Format": "IDEA0", "ID": "c20b1fa7-3792-4da4-aebf-e2779a9246dd", "DetectTime": "2023-10-30T14:09:21.782548+02:00", "EventTime": "2023-10-30T14:09:21.782567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CKBGpW1EZ55KTM1J29"]} -{"Format": "IDEA0", "ID": "9b599d4b-6f57-477a-8d00-093b712a4fde", "DetectTime": "2023-10-30T14:09:21.823797+02:00", "EventTime": "2023-10-30T14:09:21.823814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. ", "ContentType": "text/plain"}], "uids": ["COu4DmbnE9AfNG1tb"]} -{"Format": "IDEA0", "ID": "6fbe19a7-aa80-4c27-8ddb-dd6104048810", "DetectTime": "2023-10-30T14:09:21.858044+02:00", "EventTime": "2023-10-30T14:09:21.858068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CmVHMv1PvVXJIXj2w"]} -{"Format": "Json", "ID": "6fbe19a7-aa80-4c27-8ddb-dd6104048810", "DetectTime": "2023-10-30T14:09:21.858044+02:00", "EventTime": "2023-10-30T14:09:21.858068+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:16:54.333415+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:21.926820)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd8bf45e-8a6d-47b4-ad39-88af46171981", "DetectTime": "2023-10-30T14:09:21.932369+02:00", "EventTime": "2023-10-30T14:09:21.932384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CZXPCC17Jy27Y5vP67"]} -{"Format": "IDEA0", "ID": "370aa885-5726-408c-98bd-d11c0a4cca49", "DetectTime": "2023-10-30T14:09:21.969516+02:00", "EventTime": "2023-10-30T14:09:21.969536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["C4wkaK3yPUIiNPlZI9"]} -{"Format": "IDEA0", "ID": "560d7fe8-6c45-4176-8bd2-bae0dae79044", "DetectTime": "2023-10-30T14:09:22.007262+02:00", "EventTime": "2023-10-30T14:09:22.007284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["CziUmg2Cpmf4Hib90k"]} -{"Format": "IDEA0", "ID": "5e6a4e99-b7d7-46f5-a313-49f877aa8a5c", "DetectTime": "2023-10-30T14:09:22.044417+02:00", "EventTime": "2023-10-30T14:09:22.044433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CA1BKqmXqvXqjRyCg"]} -{"Format": "IDEA0", "ID": "aacf15d7-823d-4e8e-aeb0-ee66312c9e3a", "DetectTime": "2023-10-30T14:09:22.081785+02:00", "EventTime": "2023-10-30T14:09:22.081801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [12777], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. ", "ContentType": "text/plain"}], "uids": ["CAIF8m1HBEMWMRRb33"]} -{"Format": "IDEA0", "ID": "b0a09e94-1df7-4008-af00-6cc4337765db", "DetectTime": "2023-10-30T14:09:22.121753+02:00", "EventTime": "2023-10-30T14:09:22.121770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CnKh5F2q4EAYWLFGAc"]} -{"Format": "IDEA0", "ID": "b3c58a30-8d57-4d71-abd1-0ec96a44acc6", "DetectTime": "2023-10-30T14:09:22.155232+02:00", "EventTime": "2023-10-30T14:09:22.155253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CjNRh12LetPA2gopC8"]} -{"Format": "IDEA0", "ID": "e92e4652-ab79-4c9f-9da6-ce9930ae3d4e", "DetectTime": "2023-10-30T14:09:22.193914+02:00", "EventTime": "2023-10-30T14:09:22.193943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CjCxHA2JGACI57Gu0j"]} -{"Format": "Json", "ID": "e92e4652-ab79-4c9f-9da6-ce9930ae3d4e", "DetectTime": "2023-10-30T14:09:22.193914+02:00", "EventTime": "2023-10-30T14:09:22.193943+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:16:56.899875+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:22.269434)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "26ec668a-f6d0-4ea4-a4a1-b0f1a22939f1", "DetectTime": "2023-10-30T14:09:22.274045+02:00", "EventTime": "2023-10-30T14:09:22.274063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14433], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. ", "ContentType": "text/plain"}], "uids": ["CHxPcE4goJqQvJAjH7"]} -{"Format": "IDEA0", "ID": "d261c8ab-7275-453e-974f-a0fdb01f2db0", "DetectTime": "2023-10-30T14:09:22.309375+02:00", "EventTime": "2023-10-30T14:09:22.309402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2810], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. ", "ContentType": "text/plain"}], "uids": ["C4a7pH2K3o5hAqxMv2"]} -{"Format": "IDEA0", "ID": "1c891353-1211-4f48-97e9-1baaae516463", "DetectTime": "2023-10-30T14:09:22.345610+02:00", "EventTime": "2023-10-30T14:09:22.345631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C3HAxW2PfEFMAY5obl"]} -{"Format": "IDEA0", "ID": "bafe992d-ce4b-47ba-bf77-986c0f2e7e4a", "DetectTime": "2023-10-30T14:09:22.388059+02:00", "EventTime": "2023-10-30T14:09:22.388071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C8CAdr2KvB2TOliFn6"]} -{"Format": "IDEA0", "ID": "a2295d84-f3b1-47f9-81fd-b10010d8152f", "DetectTime": "2023-10-30T14:09:22.416689+02:00", "EventTime": "2023-10-30T14:09:22.416700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CV3EmGYPBfV6RAF38"]} -{"Format": "IDEA0", "ID": "0ad5eb93-6657-45f2-9dfe-b17b7b0c7663", "DetectTime": "2023-10-30T14:09:22.453821+02:00", "EventTime": "2023-10-30T14:09:22.453841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CFnh5d4taKQJJDc4da"]} -{"Format": "IDEA0", "ID": "ab7529f7-480e-48e1-a4a8-ddf715b71ad9", "DetectTime": "2023-10-30T14:09:22.494664+02:00", "EventTime": "2023-10-30T14:09:22.494678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CE1jUg196goEWjYFQ2"]} -{"Format": "IDEA0", "ID": "b343a901-1fc0-4625-8708-7a24467c64cd", "DetectTime": "2023-10-30T14:09:22.538209+02:00", "EventTime": "2023-10-30T14:09:22.538229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CuxbTE1e503edvxxg2"]} -{"Format": "Json", "ID": "b343a901-1fc0-4625-8708-7a24467c64cd", "DetectTime": "2023-10-30T14:09:22.538209+02:00", "EventTime": "2023-10-30T14:09:22.538229+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:47:46.879192+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:22.611130)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "17ca8981-26ac-4157-89f6-782a6a9684c3", "DetectTime": "2023-10-30T14:09:22.615068+02:00", "EventTime": "2023-10-30T14:09:22.615078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["COfcrc1Xf9icRTI2sa"]} -{"Format": "IDEA0", "ID": "913d8a2d-6d3d-47ad-87c1-ae706e5cbc34", "DetectTime": "2023-10-30T14:09:22.650393+02:00", "EventTime": "2023-10-30T14:09:22.650404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CrVTCA4DHpIIRXTjib"]} -{"Format": "IDEA0", "ID": "41de59ee-aa23-45ea-bebd-ee1aeed2d522", "DetectTime": "2023-10-30T14:09:22.681306+02:00", "EventTime": "2023-10-30T14:09:22.681319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CABjYk1Xa8881Rov54"]} -{"Format": "IDEA0", "ID": "4669a2b0-e318-4f80-ab22-85e716a6e017", "DetectTime": "2023-10-30T14:09:22.714565+02:00", "EventTime": "2023-10-30T14:09:22.714576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CMlJJc1wi44evG6Kra"]} -{"Format": "IDEA0", "ID": "06990948-2944-4f96-a49d-49285c2b0879", "DetectTime": "2023-10-30T14:09:22.744232+02:00", "EventTime": "2023-10-30T14:09:22.744248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CQ6VMZGg1VaPmyHae"]} -{"Format": "IDEA0", "ID": "49ce69cb-3dfa-46b1-9c42-fb1770f7f36b", "DetectTime": "2023-10-30T14:09:22.773936+02:00", "EventTime": "2023-10-30T14:09:22.773953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CsTtWqVo9TvJvot81"]} -{"Format": "IDEA0", "ID": "b97282de-960c-41ba-bd63-dfe93c4df7e9", "DetectTime": "2023-10-30T14:09:22.806116+02:00", "EventTime": "2023-10-30T14:09:22.806132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cpj4Yx4qcTXm6DwZ4a"]} -{"Format": "IDEA0", "ID": "3aef7265-5cd3-4c48-82f3-be0c613bf6f6", "DetectTime": "2023-10-30T14:09:22.844777+02:00", "EventTime": "2023-10-30T14:09:22.844801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKwySy40xEUc4Swv2i"]} -{"Format": "IDEA0", "ID": "ad4f0662-d52e-4ee6-b457-f50a54a8fed9", "DetectTime": "2023-10-30T14:09:22.884641+02:00", "EventTime": "2023-10-30T14:09:22.884658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ckhitc245LX3Ftauw5"]} -{"Format": "Json", "ID": "ad4f0662-d52e-4ee6-b457-f50a54a8fed9", "DetectTime": "2023-10-30T14:09:22.884641+02:00", "EventTime": "2023-10-30T14:09:22.884658+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:47:48.858469+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:22.961525)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "afbcd929-a3c4-4978-8065-6cb0e38aa1e3", "DetectTime": "2023-10-30T14:09:22.965830+02:00", "EventTime": "2023-10-30T14:09:22.965846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CWf8yz2eIIuvo7sBL1"]} -{"Format": "IDEA0", "ID": "1713b7f7-0eca-4685-bf44-fe42b4c48bb0", "DetectTime": "2023-10-30T14:09:22.997490+02:00", "EventTime": "2023-10-30T14:09:22.997503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CSmcnEir8jR2paus5"]} -{"Format": "IDEA0", "ID": "8f573a2a-9e3d-41f0-8d17-e0b285cb27c5", "DetectTime": "2023-10-30T14:09:23.030153+02:00", "EventTime": "2023-10-30T14:09:23.030169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C1aerD2AThIS4vpfD3"]} -{"Format": "IDEA0", "ID": "e7cefab3-9d18-446a-8ea7-af06cdb1f23a", "DetectTime": "2023-10-30T14:09:23.068206+02:00", "EventTime": "2023-10-30T14:09:23.068226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CSiOnZ3Knr85XPHpT1"]} -{"Format": "IDEA0", "ID": "ab51fdbe-5a81-45c2-960f-49329976b3bc", "DetectTime": "2023-10-30T14:09:23.102635+02:00", "EventTime": "2023-10-30T14:09:23.102651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CfM5rd3rDPassd5wVc"]} -{"Format": "IDEA0", "ID": "cb10d8ab-46a7-4fe6-8dc8-9021821b1047", "DetectTime": "2023-10-30T14:09:23.133954+02:00", "EventTime": "2023-10-30T14:09:23.133970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CYR4704KARjkKmiDW2"]} -{"Format": "IDEA0", "ID": "8c1420c1-5cdd-4b23-8620-feaf20a41ff2", "DetectTime": "2023-10-30T14:09:23.171199+02:00", "EventTime": "2023-10-30T14:09:23.171220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CVBaj02ydz80UtctLc"]} -{"Format": "IDEA0", "ID": "df93e5ef-1d0d-4ed8-beac-9338e1c066b0", "DetectTime": "2023-10-30T14:09:23.208170+02:00", "EventTime": "2023-10-30T14:09:23.208191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CGanRW3IjcSS15D5M5"]} -{"Format": "Json", "ID": "df93e5ef-1d0d-4ed8-beac-9338e1c066b0", "DetectTime": "2023-10-30T14:09:23.208170+02:00", "EventTime": "2023-10-30T14:09:23.208191+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:47:50.875254+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:23.283757)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3edfefa5-5517-40bc-96bd-5bdf4a1322db", "DetectTime": "2023-10-30T14:09:23.288898+02:00", "EventTime": "2023-10-30T14:09:23.288913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cum2Kb4nXTvBEtqvN2"]} -{"Format": "IDEA0", "ID": "22858846-3320-4486-a30c-2e7aedaa3ae0", "DetectTime": "2023-10-30T14:09:23.320691+02:00", "EventTime": "2023-10-30T14:09:23.320708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CWvJ2S2lBl5b8Ud3bl"]} -{"Format": "IDEA0", "ID": "ec4c7ed2-5072-4b74-9b82-b96c3a974130", "DetectTime": "2023-10-30T14:09:23.346667+02:00", "EventTime": "2023-10-30T14:09:23.346678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CvSGYf1Xie4Z6udyO5"]} -{"Format": "IDEA0", "ID": "b2175b76-9f94-4bd9-9897-078f72658566", "DetectTime": "2023-10-30T14:09:23.371390+02:00", "EventTime": "2023-10-30T14:09:23.371408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["Cqltbd4ZL0K10uNDvg"]} -{"Format": "IDEA0", "ID": "3126f4f1-75de-4959-9265-097e2acb88ee", "DetectTime": "2023-10-30T14:09:23.402141+02:00", "EventTime": "2023-10-30T14:09:23.402160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["CtcmQ64FLyk2hlteuf"]} -{"Format": "IDEA0", "ID": "3860c794-3169-410c-83a4-99a8721d5e24", "DetectTime": "2023-10-30T14:09:23.432183+02:00", "EventTime": "2023-10-30T14:09:23.432194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CXDgqFtK2bapIGt1a"]} -{"Format": "IDEA0", "ID": "4a2fcedc-b636-431a-9373-303be1de818c", "DetectTime": "2023-10-30T14:09:23.461404+02:00", "EventTime": "2023-10-30T14:09:23.461426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CkMOcS3dIWZZydeC7h"]} -{"Format": "IDEA0", "ID": "7142dbec-2383-4140-b15c-dc3744c33a15", "DetectTime": "2023-10-30T14:09:23.494493+02:00", "EventTime": "2023-10-30T14:09:23.494511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["C0f4Wu2jym5AmparHi"]} -{"Format": "Json", "ID": "7142dbec-2383-4140-b15c-dc3744c33a15", "DetectTime": "2023-10-30T14:09:23.494493+02:00", "EventTime": "2023-10-30T14:09:23.494511+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:47:53.760990+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:23.568623)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2fd6eec7-8b55-44fa-a5df-5a28a354c10a", "DetectTime": "2023-10-30T14:09:23.573196+02:00", "EventTime": "2023-10-30T14:09:23.573211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CaonxX3HjpWxh9s2di"]} -{"Format": "IDEA0", "ID": "b27ff735-7780-42bd-8965-79c8a0183347", "DetectTime": "2023-10-30T14:09:23.601882+02:00", "EventTime": "2023-10-30T14:09:23.601897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["Cign862Jbl7LxV8Pqf"]} -{"Format": "IDEA0", "ID": "54f0475b-42c2-4b07-8a85-6a20fee47ee4", "DetectTime": "2023-10-30T14:09:23.635061+02:00", "EventTime": "2023-10-30T14:09:23.635079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C6f9Mk23W6BPnZLSwj"]} -{"Format": "IDEA0", "ID": "b3ae06fd-e060-4b59-a0b5-4c22b0af5afd", "DetectTime": "2023-10-30T14:09:23.661758+02:00", "EventTime": "2023-10-30T14:09:23.661772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CKns212mI1LyMFzVUj"]} -{"Format": "IDEA0", "ID": "e57b6a48-4d7b-4547-9e26-c8dd01fd46e6", "DetectTime": "2023-10-30T14:09:23.684876+02:00", "EventTime": "2023-10-30T14:09:23.684889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10635], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. ", "ContentType": "text/plain"}], "uids": ["CJsdSU3U7mVe4lEKki"]} -{"Format": "IDEA0", "ID": "2b335f17-f280-4bea-84dc-3d2ec86b7ab9", "DetectTime": "2023-10-30T14:09:23.712934+02:00", "EventTime": "2023-10-30T14:09:23.712951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["C6ZmZA29VtYp1prJMe"]} -{"Format": "IDEA0", "ID": "8c615527-8151-4fcc-a1f1-b7d8f511279e", "DetectTime": "2023-10-30T14:09:23.735429+02:00", "EventTime": "2023-10-30T14:09:23.735456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CqjZBJ3r9YY5zVc9Xb"]} -{"Format": "IDEA0", "ID": "16e8989f-1791-41bd-9fe9-5e3a9ae0ee2d", "DetectTime": "2023-10-30T14:09:23.767146+02:00", "EventTime": "2023-10-30T14:09:23.767165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["CChvUg2EV4m1JZUaBj"]} -{"Format": "Json", "ID": "16e8989f-1791-41bd-9fe9-5e3a9ae0ee2d", "DetectTime": "2023-10-30T14:09:23.767146+02:00", "EventTime": "2023-10-30T14:09:23.767165+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T10:48:15.077843+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2023/10/30 14:09:23.833107)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea186f8d-0a6f-4736-ae15-36304db770dd", "DetectTime": "2023-10-30T14:09:23.837201+02:00", "EventTime": "2023-10-30T14:09:23.837213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C5HSif3Ar1EuDbDkQ4"]} -{"Format": "IDEA0", "ID": "4995a3c8-68c5-4bc0-a603-6e8082dbbf9c", "DetectTime": "2023-10-30T14:09:23.862171+02:00", "EventTime": "2023-10-30T14:09:23.862183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CKYFihvYbNDyXzz6f"]} -{"Format": "IDEA0", "ID": "d51b9a2b-db06-411f-8337-bebe0202df46", "DetectTime": "2023-10-30T14:09:23.884006+02:00", "EventTime": "2023-10-30T14:09:23.884023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CIAFjC3LinDrd3almf"]} -{"Format": "IDEA0", "ID": "299778dd-2cf7-4a61-a582-b09ed95a1149", "DetectTime": "2023-10-30T14:09:23.909625+02:00", "EventTime": "2023-10-30T14:09:23.909639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [14433], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. ", "ContentType": "text/plain"}], "uids": ["C3wX2T3Sa65ddZ8X9g"]} -{"Format": "IDEA0", "ID": "12e0f046-ef07-43d0-abb4-193a6267c314", "DetectTime": "2023-10-30T14:09:23.943495+02:00", "EventTime": "2023-10-30T14:09:23.943512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2810], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. ", "ContentType": "text/plain"}], "uids": ["CD61CvGzstdofa65a"]} -{"Format": "IDEA0", "ID": "97e164ec-a0f0-41ee-9eea-1cfde649e548", "DetectTime": "2023-10-30T14:09:23.974485+02:00", "EventTime": "2023-10-30T14:09:23.974506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXtAve2nnjQPzrWPjl"]} -{"Format": "IDEA0", "ID": "396ebd00-6e64-4923-8d55-bdfcb869877f", "DetectTime": "2023-10-30T14:09:24.000776+02:00", "EventTime": "2023-10-30T14:09:24.000793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFXy8V399zx8lha6df"]} -{"Format": "IDEA0", "ID": "7eaf4506-1ce0-45ff-b3a5-7e17d69456b9", "DetectTime": "2023-10-30T14:09:24.031935+02:00", "EventTime": "2023-10-30T14:09:24.031962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["CIsHCo4mtM9LhqFy53"]} -{"Format": "IDEA0", "ID": "f17ead2b-10be-4a82-b847-19670febeb3c", "DetectTime": "2023-10-30T14:09:24.061635+02:00", "EventTime": "2023-10-30T14:09:24.061650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CFxzjE37g1CPwr14pk"]} -{"Format": "IDEA0", "ID": "1ff3f5ba-784c-4f2f-9fdc-8cef9911e18b", "DetectTime": "2023-10-30T14:09:24.109497+02:00", "EventTime": "2023-10-30T14:09:24.109522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["COj1Is1FAQYOleNuGd"]} -{"Format": "IDEA0", "ID": "b0d81e22-8c98-46c1-a0b2-e493bfd372ba", "DetectTime": "2023-10-30T14:09:24.157707+02:00", "EventTime": "2023-10-30T14:09:24.157734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cx56k031nSTxp5CrN3"]} -{"Format": "IDEA0", "ID": "899e370a-e304-4960-abab-c79a8a4aa7b3", "DetectTime": "2023-10-30T14:09:24.208307+02:00", "EventTime": "2023-10-30T14:09:24.208329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cn7Mf114IvfkxtObQ1"]} -{"Format": "IDEA0", "ID": "0efcc7b2-8888-4b55-bf12-24c390124903", "DetectTime": "2023-10-30T14:09:24.265777+02:00", "EventTime": "2023-10-30T14:09:24.265791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CHtGDZ2c2HeBbiktYh"]} -{"Format": "IDEA0", "ID": "b8d98b96-9a36-402f-9a3c-4fad788f0db0", "DetectTime": "2023-10-30T14:09:24.322736+02:00", "EventTime": "2023-10-30T14:09:24.322762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CDvx12rMVcdXMce7e"]} -{"Format": "Json", "ID": "b8d98b96-9a36-402f-9a3c-4fad788f0db0", "DetectTime": "2023-10-30T14:09:24.322736+02:00", "EventTime": "2023-10-30T14:09:24.322762+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:19:05.651482+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:24.455755)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f63bf90-3de7-4150-a259-74598916ac46", "DetectTime": "2023-10-30T14:09:24.461964+02:00", "EventTime": "2023-10-30T14:09:24.461981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CIbboC4t9S7F0Hrs46"]} -{"Format": "IDEA0", "ID": "c26fad52-7cd7-4d5f-808a-7c6571dddcab", "DetectTime": "2023-10-30T14:09:24.506580+02:00", "EventTime": "2023-10-30T14:09:24.506596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C7JLXp3ZvS0OgZp4J9"]} -{"Format": "IDEA0", "ID": "78422478-1e78-4c96-a6da-a0e7aa278006", "DetectTime": "2023-10-30T14:09:24.548576+02:00", "EventTime": "2023-10-30T14:09:24.548602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cej00ycd3uCxuhXha"]} -{"Format": "IDEA0", "ID": "42afb7d9-afd8-4360-8de2-080fd1762197", "DetectTime": "2023-10-30T14:09:24.594406+02:00", "EventTime": "2023-10-30T14:09:24.594433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CesFpx7606GLXYXw2"]} -{"Format": "IDEA0", "ID": "b332e198-c2d7-4226-ada4-f8ab9fc37609", "DetectTime": "2023-10-30T14:09:24.635944+02:00", "EventTime": "2023-10-30T14:09:24.635961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CrvyXI2zMSv4IczgWa"]} -{"Format": "IDEA0", "ID": "67fad078-389d-49d6-8722-a5e9282a2e6e", "DetectTime": "2023-10-30T14:09:24.683912+02:00", "EventTime": "2023-10-30T14:09:24.683932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CpPLTU9YLefz7NoZ1"]} -{"Format": "IDEA0", "ID": "f7135f6f-f632-45d9-96ba-3d5f4495a531", "DetectTime": "2023-10-30T14:09:24.729099+02:00", "EventTime": "2023-10-30T14:09:24.729110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CV8BQy4g25qpyg9h6f"]} -{"Format": "IDEA0", "ID": "e092aa7a-c830-4d08-a7b9-1222a802effe", "DetectTime": "2023-10-30T14:09:24.773266+02:00", "EventTime": "2023-10-30T14:09:24.773282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C3NiN44RCPRU99muwa"]} -{"Format": "Json", "ID": "e092aa7a-c830-4d08-a7b9-1222a802effe", "DetectTime": "2023-10-30T14:09:24.773266+02:00", "EventTime": "2023-10-30T14:09:24.773282+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:19:07.478246+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:24.854252)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4f449fbf-e43a-4a44-9e76-e26b0992acd1", "DetectTime": "2023-10-30T14:09:24.859324+02:00", "EventTime": "2023-10-30T14:09:24.859346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CJI2rM2f5KpgPxkrF8"]} -{"Format": "IDEA0", "ID": "ba6c5dbb-04c4-4595-ae3c-680ff980c26e", "DetectTime": "2023-10-30T14:09:24.911044+02:00", "EventTime": "2023-10-30T14:09:24.911066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CzRMZc2hav1e8Mke7j"]} -{"Format": "IDEA0", "ID": "c46777af-2b57-42e4-9729-76e9c93e630a", "DetectTime": "2023-10-30T14:09:24.955793+02:00", "EventTime": "2023-10-30T14:09:24.955805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CJ4mF7YQjbb1x1h3d"]} -{"Format": "IDEA0", "ID": "37214a1e-d9de-4c75-a88c-630101669ab3", "DetectTime": "2023-10-30T14:09:25.003445+02:00", "EventTime": "2023-10-30T14:09:25.003465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Ckem5W3zz0xlFTXGok"]} -{"Format": "IDEA0", "ID": "047cef06-a77e-4be3-87ab-c2c79036bc88", "DetectTime": "2023-10-30T14:09:25.054446+02:00", "EventTime": "2023-10-30T14:09:25.054477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CcG3J32ZZIedNqa6u3"]} -{"Format": "IDEA0", "ID": "0f35968e-d2a7-482a-86cb-663e41498ec2", "DetectTime": "2023-10-30T14:09:25.100755+02:00", "EventTime": "2023-10-30T14:09:25.100767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cq1XGI3znJwXGb5dT5"]} -{"Format": "IDEA0", "ID": "87bd543f-50c3-49bb-9da7-b4b5f7ec82f9", "DetectTime": "2023-10-30T14:09:25.147165+02:00", "EventTime": "2023-10-30T14:09:25.147181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CIF2Ns4KwUr5suQjM"]} -{"Format": "IDEA0", "ID": "bd882dc2-9311-47f0-a158-c56288b8cd75", "DetectTime": "2023-10-30T14:09:25.195542+02:00", "EventTime": "2023-10-30T14:09:25.195559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C8Rh5f3Hh0MbZskdh7"]} -{"Format": "Json", "ID": "bd882dc2-9311-47f0-a158-c56288b8cd75", "DetectTime": "2023-10-30T14:09:25.195542+02:00", "EventTime": "2023-10-30T14:09:25.195559+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:19:09.575185+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:25.268350)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a7a0e733-25ca-4b17-9d4c-065b03ed8c22", "DetectTime": "2023-10-30T14:09:25.273283+02:00", "EventTime": "2023-10-30T14:09:25.273295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CakchQpJgXIIUGuGd"]} -{"Format": "IDEA0", "ID": "616b2a99-2f61-4760-bfd2-271a283db3af", "DetectTime": "2023-10-30T14:09:25.311505+02:00", "EventTime": "2023-10-30T14:09:25.311518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["C5y7HJ2XkCZDmSTHb5"]} -{"Format": "IDEA0", "ID": "4e364ec5-68ff-4d93-b0d6-f11158b5e5aa", "DetectTime": "2023-10-30T14:09:25.348526+02:00", "EventTime": "2023-10-30T14:09:25.348540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8624], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. ", "ContentType": "text/plain"}], "uids": ["CEgrIc4JROObaiP0ge"]} -{"Format": "IDEA0", "ID": "224c62ef-08d2-4cfd-b65e-7eb25b23fd80", "DetectTime": "2023-10-30T14:09:25.387230+02:00", "EventTime": "2023-10-30T14:09:25.387245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CRDpbL2kkEOAY6cvrb"]} -{"Format": "IDEA0", "ID": "985a2769-b516-461d-8b0c-1f46bf3ab730", "DetectTime": "2023-10-30T14:09:25.435178+02:00", "EventTime": "2023-10-30T14:09:25.435198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CHO36k1biNAOgIocM5"]} -{"Format": "IDEA0", "ID": "0ac88a59-ddda-4d59-abe5-f438f620662b", "DetectTime": "2023-10-30T14:09:25.475001+02:00", "EventTime": "2023-10-30T14:09:25.475019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CaoFnV3eeQwXbvPpT3"]} -{"Format": "IDEA0", "ID": "df7792ea-3592-4a12-ba2e-8472309e6acf", "DetectTime": "2023-10-30T14:09:25.511386+02:00", "EventTime": "2023-10-30T14:09:25.511402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CAH4qu1UkIzLvfMUTh"]} -{"Format": "IDEA0", "ID": "72e7efdc-e92a-4370-a5ee-5d623b56a662", "DetectTime": "2023-10-30T14:09:25.552154+02:00", "EventTime": "2023-10-30T14:09:25.552170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CyKd4s3PKncUAOsBJf"]} -{"Format": "Json", "ID": "72e7efdc-e92a-4370-a5ee-5d623b56a662", "DetectTime": "2023-10-30T14:09:25.552154+02:00", "EventTime": "2023-10-30T14:09:25.552170+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:19:12.970637+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:25.632952)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b4572f0d-c481-465e-a488-c783306faf45", "DetectTime": "2023-10-30T14:09:25.637203+02:00", "EventTime": "2023-10-30T14:09:25.637218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CEexBW1Rj9Ma4LGvHh"]} -{"Format": "IDEA0", "ID": "439806a1-02e1-4207-bf5c-9394a0558493", "DetectTime": "2023-10-30T14:09:25.677808+02:00", "EventTime": "2023-10-30T14:09:25.677826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CjmOcKuFh0pOF4nNg"]} -{"Format": "IDEA0", "ID": "b9790b9f-9840-4aa8-a591-74576fbd31e6", "DetectTime": "2023-10-30T14:09:25.716968+02:00", "EventTime": "2023-10-30T14:09:25.716991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CSwJLg4MGHeVJMP8z9"]} -{"Format": "IDEA0", "ID": "c61841ae-7d8f-41f6-acdd-383fc64f8999", "DetectTime": "2023-10-30T14:09:25.755167+02:00", "EventTime": "2023-10-30T14:09:25.755195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CAPl6E39r110OKeZvl"]} -{"Format": "IDEA0", "ID": "7e15064b-09a5-4fec-be4a-0e310060e286", "DetectTime": "2023-10-30T14:09:25.791985+02:00", "EventTime": "2023-10-30T14:09:25.792007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [13801], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. ", "ContentType": "text/plain"}], "uids": ["C4ZGUi3eO7Pd65AWA5"]} -{"Format": "IDEA0", "ID": "6bc2dc3c-0db0-49ff-b8df-e9ae35e06c2f", "DetectTime": "2023-10-30T14:09:25.833550+02:00", "EventTime": "2023-10-30T14:09:25.833566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CyOLLk4X72Eb30wxY2"]} -{"Format": "IDEA0", "ID": "58b3857c-72d1-4ac4-b4e6-2e85523d8565", "DetectTime": "2023-10-30T14:09:25.874379+02:00", "EventTime": "2023-10-30T14:09:25.874397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cvj2Ry3HplJjjdQjt6"]} -{"Format": "IDEA0", "ID": "af77d5b2-3cb8-4db6-a2d7-703989cf9c96", "DetectTime": "2023-10-30T14:09:25.923873+02:00", "EventTime": "2023-10-30T14:09:25.923969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CieANr3pfXWJqomjK7"]} -{"Format": "Json", "ID": "af77d5b2-3cb8-4db6-a2d7-703989cf9c96", "DetectTime": "2023-10-30T14:09:25.923873+02:00", "EventTime": "2023-10-30T14:09:25.923969+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:19:32.822867+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:26.010328)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4d28aa4f-69cf-4f50-8810-b53c51fa4d9f", "DetectTime": "2023-10-30T14:09:26.015137+02:00", "EventTime": "2023-10-30T14:09:26.015149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C6jlj63bJdcGx1ZIQ3"]} -{"Format": "IDEA0", "ID": "f49d9063-eda8-453b-8218-7561009067e5", "DetectTime": "2023-10-30T14:09:26.055741+02:00", "EventTime": "2023-10-30T14:09:26.055763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqeeCh2LsZZ1x5pcx2"]} -{"Format": "IDEA0", "ID": "b66460ce-c7cf-406d-93eb-c3f404914fc5", "DetectTime": "2023-10-30T14:09:26.095381+02:00", "EventTime": "2023-10-30T14:09:26.095402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CBqfb5RBt9hs2rqPg"]} -{"Format": "IDEA0", "ID": "61bf69ba-ed50-4486-910d-370876686ddc", "DetectTime": "2023-10-30T14:09:26.129780+02:00", "EventTime": "2023-10-30T14:09:26.129796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C2RNR141FPje8DMjoh"]} -{"Format": "IDEA0", "ID": "eebfc500-4301-4b42-afe4-f656ee3c19d7", "DetectTime": "2023-10-30T14:09:26.167941+02:00", "EventTime": "2023-10-30T14:09:26.167958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CsHMY71uCQbPqfaObh"]} -{"Format": "IDEA0", "ID": "d7f29aa3-2f5c-4973-ad9f-fcf25c6004d8", "DetectTime": "2023-10-30T14:09:26.207165+02:00", "EventTime": "2023-10-30T14:09:26.207180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CWPZov1QCziZ2RSNO4"]} -{"Format": "IDEA0", "ID": "73d99f1d-3a32-4433-9efd-f44891a1e43e", "DetectTime": "2023-10-30T14:09:26.236513+02:00", "EventTime": "2023-10-30T14:09:26.236528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CBSdmlCOZshGp2w7h"]} -{"Format": "IDEA0", "ID": "cdba0a3b-93d1-4f7b-b45e-d644ffec4ed1", "DetectTime": "2023-10-30T14:09:26.278101+02:00", "EventTime": "2023-10-30T14:09:26.278115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CZ8HN412Bzao8NLaP9"]} -{"Format": "IDEA0", "ID": "4724aa3c-a411-4614-b0c5-cd655d1c1491", "DetectTime": "2023-10-30T14:09:26.316249+02:00", "EventTime": "2023-10-30T14:09:26.316265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cj5Xg1Pwe4iYP6vb4"]} -{"Format": "Json", "ID": "4724aa3c-a411-4614-b0c5-cd655d1c1491", "DetectTime": "2023-10-30T14:09:26.316249+02:00", "EventTime": "2023-10-30T14:09:26.316265+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:51:30.948240+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:26.396072)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c79dc3a1-4028-4ccf-9ec3-91edcc699e1b", "DetectTime": "2023-10-30T14:09:26.401378+02:00", "EventTime": "2023-10-30T14:09:26.401390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CXbBRsbLBtFktgev4"]} -{"Format": "IDEA0", "ID": "1fec95c6-ed10-4fc3-97aa-0624d406b8d6", "DetectTime": "2023-10-30T14:09:26.438066+02:00", "EventTime": "2023-10-30T14:09:26.438090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CailAOlRkXNcg0UWi"]} -{"Format": "IDEA0", "ID": "b6a939a9-0759-48bc-a6aa-52dc40592d8f", "DetectTime": "2023-10-30T14:09:26.476797+02:00", "EventTime": "2023-10-30T14:09:26.476818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cgsu9Z23MAISR4QBU2"]} -{"Format": "IDEA0", "ID": "35759cba-5944-4454-bf38-900eb5410b0f", "DetectTime": "2023-10-30T14:09:26.512504+02:00", "EventTime": "2023-10-30T14:09:26.512524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CNqcsj1JCQxsyZtox2"]} -{"Format": "IDEA0", "ID": "745c45e7-bd2c-413d-896f-29ea5123a99b", "DetectTime": "2023-10-30T14:09:26.547206+02:00", "EventTime": "2023-10-30T14:09:26.547218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4lcX14nErwrG9C7ad"]} -{"Format": "IDEA0", "ID": "ab51025a-eb93-47a3-9216-8b5bb41b2c0e", "DetectTime": "2023-10-30T14:09:26.582906+02:00", "EventTime": "2023-10-30T14:09:26.582928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C817DC2uwsFLvv84Mk"]} -{"Format": "IDEA0", "ID": "fec66308-bdfb-4381-a0e7-19e58a31c4c7", "DetectTime": "2023-10-30T14:09:26.617355+02:00", "EventTime": "2023-10-30T14:09:26.617371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CW0cUbeqnvGNiPfd7"]} -{"Format": "IDEA0", "ID": "0947da7f-f8c0-4db6-ad01-6fa68b383ec4", "DetectTime": "2023-10-30T14:09:26.653299+02:00", "EventTime": "2023-10-30T14:09:26.653319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CNNOxa2L41HI9397Cg"]} -{"Format": "Json", "ID": "0947da7f-f8c0-4db6-ad01-6fa68b383ec4", "DetectTime": "2023-10-30T14:09:26.653299+02:00", "EventTime": "2023-10-30T14:09:26.653319+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:51:33.212270+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:26.725148)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "38b6412b-8a49-4e3b-a3b2-a60705db6044", "DetectTime": "2023-10-30T14:09:26.731499+02:00", "EventTime": "2023-10-30T14:09:26.731519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cv6Jos1U4Pr5xIdl57"]} -{"Format": "IDEA0", "ID": "01db8b35-2d62-4429-ba58-87837dd236d9", "DetectTime": "2023-10-30T14:09:26.769880+02:00", "EventTime": "2023-10-30T14:09:26.769893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CazH7r19UUirrNuZyc"]} -{"Format": "IDEA0", "ID": "d8650c91-d688-44bd-b341-cd4fa7ff7eae", "DetectTime": "2023-10-30T14:09:26.800005+02:00", "EventTime": "2023-10-30T14:09:26.800023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CEGGU525QNuTiD82o7"]} -{"Format": "IDEA0", "ID": "08fec06c-65cc-473e-8322-d4724325e1e7", "DetectTime": "2023-10-30T14:09:26.832130+02:00", "EventTime": "2023-10-30T14:09:26.832150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CuNhAZ2ispm6OSGRFd"]} -{"Format": "IDEA0", "ID": "df6ac297-eaf5-48aa-817e-cd74858e8fcd", "DetectTime": "2023-10-30T14:09:26.866233+02:00", "EventTime": "2023-10-30T14:09:26.866249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CFv0vD1C5jUeyGmA0j"]} -{"Format": "IDEA0", "ID": "c3f670df-d891-4c35-b20d-d2d22b804fc5", "DetectTime": "2023-10-30T14:09:26.900422+02:00", "EventTime": "2023-10-30T14:09:26.900434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C00qz53fNWZqR3O3Ck"]} -{"Format": "IDEA0", "ID": "c1ff8364-6651-4dcd-8e0e-43ae91f31627", "DetectTime": "2023-10-30T14:09:26.930378+02:00", "EventTime": "2023-10-30T14:09:26.930390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CH3ml29juDoSUooMa"]} -{"Format": "IDEA0", "ID": "bbe05f35-7290-4ed4-994e-88fec83788bf", "DetectTime": "2023-10-30T14:09:26.965899+02:00", "EventTime": "2023-10-30T14:09:26.965920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CspAIKPABRCdY0708"]} -{"Format": "Json", "ID": "bbe05f35-7290-4ed4-994e-88fec83788bf", "DetectTime": "2023-10-30T14:09:26.965899+02:00", "EventTime": "2023-10-30T14:09:26.965920+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:51:35.327685+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:27.037292)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "34b5717b-d4a2-4f90-a091-f7a5b695d56f", "DetectTime": "2023-10-30T14:09:27.043029+02:00", "EventTime": "2023-10-30T14:09:27.043047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["CGk9ZT306p8lgEm7md"]} -{"Format": "IDEA0", "ID": "61550b41-1986-4025-af24-2d1cb7c344b4", "DetectTime": "2023-10-30T14:09:27.073288+02:00", "EventTime": "2023-10-30T14:09:27.073309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CrPshT1F6cacYp4Kt8"]} -{"Format": "IDEA0", "ID": "5d5a13c7-6b2b-4312-9365-fc76125c480f", "DetectTime": "2023-10-30T14:09:27.105531+02:00", "EventTime": "2023-10-30T14:09:27.105548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CCX12X30ogGNXieRNf"]} -{"Format": "IDEA0", "ID": "f3a2624e-671d-4e45-bf86-287aa900c63c", "DetectTime": "2023-10-30T14:09:27.133784+02:00", "EventTime": "2023-10-30T14:09:27.133797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CSTlSnxF8bW7Dhlsc"]} -{"Format": "IDEA0", "ID": "afcb5268-6b4f-4b56-8c8f-859d002df821", "DetectTime": "2023-10-30T14:09:27.163055+02:00", "EventTime": "2023-10-30T14:09:27.163069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CTaNQd4Ia8erYehfs3"]} -{"Format": "IDEA0", "ID": "0990a485-4ce1-49cf-9ebd-16d7e08019b5", "DetectTime": "2023-10-30T14:09:27.189722+02:00", "EventTime": "2023-10-30T14:09:27.189736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CnbDV24jZhNvszoML"]} -{"Format": "IDEA0", "ID": "a778c1f9-1a58-4671-806c-e66a04326670", "DetectTime": "2023-10-30T14:09:27.221473+02:00", "EventTime": "2023-10-30T14:09:27.221488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CS7VHK3fdno9UyuJKl"]} -{"Format": "IDEA0", "ID": "8e6760e9-0749-42a0-b7df-b7dd9fb93eae", "DetectTime": "2023-10-30T14:09:27.251106+02:00", "EventTime": "2023-10-30T14:09:27.251120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CcSFScBRjWTqTowp7"]} -{"Format": "Json", "ID": "8e6760e9-0749-42a0-b7df-b7dd9fb93eae", "DetectTime": "2023-10-30T14:09:27.251106+02:00", "EventTime": "2023-10-30T14:09:27.251120+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T11:52:28.533571+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2023/10/30 14:09:27.319817)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "df7e14e2-6eec-4e08-8734-5a74b8209a95", "DetectTime": "2023-10-30T14:09:27.325350+02:00", "EventTime": "2023-10-30T14:09:27.325367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["C3Dxxo2rdZQAYqfBGc"]} -{"Format": "IDEA0", "ID": "cac3fa45-7dec-439e-8d78-46c9cb65a47f", "DetectTime": "2023-10-30T14:09:27.355881+02:00", "EventTime": "2023-10-30T14:09:27.355906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["Cmz7iV2b63a9wytspc"]} -{"Format": "IDEA0", "ID": "b88c0fe8-07cc-4a1d-8f38-0530b9ac3945", "DetectTime": "2023-10-30T14:09:27.383308+02:00", "EventTime": "2023-10-30T14:09:27.383323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CtJlRtPUJSSyxEHfe"]} -{"Format": "IDEA0", "ID": "cf6e3755-f7e9-4ff7-8542-7f3c8cf67fd4", "DetectTime": "2023-10-30T14:09:27.410276+02:00", "EventTime": "2023-10-30T14:09:27.410309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CrbR78TkHbwmJ6a7a"]} -{"Format": "IDEA0", "ID": "a659045a-e28c-4a1f-b12f-774c55e16328", "DetectTime": "2023-10-30T14:09:27.435770+02:00", "EventTime": "2023-10-30T14:09:27.435784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C6cxVc2GcSDLx7bJc2"]} -{"Format": "IDEA0", "ID": "f22a51a5-3b37-49e2-93f7-71c1e87bfd56", "DetectTime": "2023-10-30T14:09:27.462899+02:00", "EventTime": "2023-10-30T14:09:27.462919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CPtJEaDMxLgpyTXP1"]} -{"Format": "IDEA0", "ID": "cb7851fd-fea7-443e-adb5-5cf6a56140f5", "DetectTime": "2023-10-30T14:09:27.487743+02:00", "EventTime": "2023-10-30T14:09:27.487763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C8pT0D2ZYfDJUyrkVg"]} -{"Format": "IDEA0", "ID": "fb93ecbc-f5f6-4a40-a417-dec3a797e4fb", "DetectTime": "2023-10-30T14:09:27.535035+02:00", "EventTime": "2023-10-30T14:09:27.535049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C6gNA12uCKblMFdPbf"]} -{"Format": "IDEA0", "ID": "e6ca0f0d-4b35-4d9e-bf40-161859e0e0b4", "DetectTime": "2023-10-30T14:09:27.582326+02:00", "EventTime": "2023-10-30T14:09:27.582339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cpyv5U2F4AKKWg05Od"]} -{"Format": "IDEA0", "ID": "f98b642a-6e25-4931-902f-7114f43c51de", "DetectTime": "2023-10-30T14:09:27.612523+02:00", "EventTime": "2023-10-30T14:09:27.612552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Co7jEQvm2DAuPiyvi"]} -{"Format": "IDEA0", "ID": "937558df-2ebf-4f2a-8546-a4086d720487", "DetectTime": "2023-10-30T14:09:27.660694+02:00", "EventTime": "2023-10-30T14:09:27.660715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CShDaP2ryHG2mcRby7"]} -{"Format": "IDEA0", "ID": "43b24594-623e-454f-93e3-065ed78a60da", "DetectTime": "2023-10-30T14:09:27.702551+02:00", "EventTime": "2023-10-30T14:09:27.702571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CHcMiZ2cE4VC2mOmyl"]} -{"Format": "IDEA0", "ID": "7f10cd10-37b5-4e3a-89ab-6b9832fde363", "DetectTime": "2023-10-30T14:09:27.743154+02:00", "EventTime": "2023-10-30T14:09:27.743166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cj4mOS2haHTA5DGq2h"]} -{"Format": "IDEA0", "ID": "1c1f727a-bbe8-4d01-9b91-f5bfc286b615", "DetectTime": "2023-10-30T14:09:27.785405+02:00", "EventTime": "2023-10-30T14:09:27.785419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C13VpR1pJTw5PMrf46"]} -{"Format": "Json", "ID": "1c1f727a-bbe8-4d01-9b91-f5bfc286b615", "DetectTime": "2023-10-30T14:09:27.785405+02:00", "EventTime": "2023-10-30T14:09:27.785419+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:24:07.756876+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:27.882084)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7250c4b9-27cd-40f7-942a-271f246b0313", "DetectTime": "2023-10-30T14:09:27.887282+02:00", "EventTime": "2023-10-30T14:09:27.887298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CvRTKc2ZBhWRnNhc7k"]} -{"Format": "IDEA0", "ID": "975703a5-faaa-442e-b6d0-d94b5656c066", "DetectTime": "2023-10-30T14:09:27.931686+02:00", "EventTime": "2023-10-30T14:09:27.931701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CVGtok1YYbv799EjRc"]} -{"Format": "IDEA0", "ID": "cb713da8-505c-4657-a9a3-31a2e32947cb", "DetectTime": "2023-10-30T14:09:27.978388+02:00", "EventTime": "2023-10-30T14:09:27.978406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CN88cQ2gLkhzPT9Vr3"]} -{"Format": "IDEA0", "ID": "bfa28b8e-8d17-40a6-a580-695a9d2eb607", "DetectTime": "2023-10-30T14:09:28.015794+02:00", "EventTime": "2023-10-30T14:09:28.015811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CdPENS2osuGyeSowN3"]} -{"Format": "IDEA0", "ID": "52ce17a2-1aaf-471c-89c2-1757af19eeb7", "DetectTime": "2023-10-30T14:09:28.052006+02:00", "EventTime": "2023-10-30T14:09:28.052019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CJQIgV1wMRhv4Uk2Me"]} -{"Format": "IDEA0", "ID": "1dfb3547-5e84-415c-b875-4d2cb0549075", "DetectTime": "2023-10-30T14:09:28.098050+02:00", "EventTime": "2023-10-30T14:09:28.098066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CclCDC3M19SIVv8axf"]} -{"Format": "IDEA0", "ID": "dc6ca47e-e2f5-435a-a479-32a734839c7b", "DetectTime": "2023-10-30T14:09:28.136686+02:00", "EventTime": "2023-10-30T14:09:28.136702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRkbEW2ogy8RdVWIm9"]} -{"Format": "IDEA0", "ID": "ee0c3432-c613-4f3c-bf9e-7d3553e33b97", "DetectTime": "2023-10-30T14:09:28.178004+02:00", "EventTime": "2023-10-30T14:09:28.178020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CHwgt02puJB2mK85b4"]} -{"Format": "Json", "ID": "ee0c3432-c613-4f3c-bf9e-7d3553e33b97", "DetectTime": "2023-10-30T14:09:28.178004+02:00", "EventTime": "2023-10-30T14:09:28.178020+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:24:09.485565+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:28.257182)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b2b32de8-d59f-47bb-ac44-9b52522af450", "DetectTime": "2023-10-30T14:09:28.261832+02:00", "EventTime": "2023-10-30T14:09:28.261858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C3CBG73zXbgwYRO6mc"]} -{"Format": "IDEA0", "ID": "62e7e323-dafc-45c8-9951-7d099e56125d", "DetectTime": "2023-10-30T14:09:28.304008+02:00", "EventTime": "2023-10-30T14:09:28.304024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CVTz3p1r4Ua5ZvzaPi"]} -{"Format": "IDEA0", "ID": "fbc10e80-f4ae-4613-a296-3416486a24e2", "DetectTime": "2023-10-30T14:09:28.346051+02:00", "EventTime": "2023-10-30T14:09:28.346070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C5Qlp51w9GWNevhs38"]} -{"Format": "IDEA0", "ID": "fe44c0f7-cbc2-4c04-a262-69e981f59e8f", "DetectTime": "2023-10-30T14:09:28.385914+02:00", "EventTime": "2023-10-30T14:09:28.385928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPJEmK3VFKH6tFAKi9"]} -{"Format": "IDEA0", "ID": "69c6d35c-9899-413f-bc1c-550b11a190d8", "DetectTime": "2023-10-30T14:09:28.423974+02:00", "EventTime": "2023-10-30T14:09:28.423993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cktb3DAlfiYjVTdz1"]} -{"Format": "IDEA0", "ID": "87a4bc82-db62-4dbf-92e0-4baa1b6e666d", "DetectTime": "2023-10-30T14:09:28.464698+02:00", "EventTime": "2023-10-30T14:09:28.464715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cc0Q4V2wkriLlMG8Bc"]} -{"Format": "IDEA0", "ID": "091db2c3-b598-4739-8f7a-35a834b407a0", "DetectTime": "2023-10-30T14:09:28.507226+02:00", "EventTime": "2023-10-30T14:09:28.507240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cjx6p33jYgmPza0jK2"]} -{"Format": "IDEA0", "ID": "802826b0-f66b-4a5e-ac56-1e2243112bd8", "DetectTime": "2023-10-30T14:09:28.546806+02:00", "EventTime": "2023-10-30T14:09:28.546823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C2fxiACmIKbc8URY7"]} -{"Format": "Json", "ID": "802826b0-f66b-4a5e-ac56-1e2243112bd8", "DetectTime": "2023-10-30T14:09:28.546806+02:00", "EventTime": "2023-10-30T14:09:28.546823+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:24:11.865126+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:28.622995)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f115953b-e829-4ef9-b163-626ccb1843b0", "DetectTime": "2023-10-30T14:09:28.628513+02:00", "EventTime": "2023-10-30T14:09:28.628530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CbrYKr45gEYmkBQ2u4"]} -{"Format": "IDEA0", "ID": "71c13466-442f-4238-8150-3985bae7321b", "DetectTime": "2023-10-30T14:09:28.669235+02:00", "EventTime": "2023-10-30T14:09:28.669256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CdV2WK24ejomBeSP5e"]} -{"Format": "IDEA0", "ID": "5054e845-23cf-4ec8-a68d-50147f4a2d1a", "DetectTime": "2023-10-30T14:09:28.706737+02:00", "EventTime": "2023-10-30T14:09:28.706760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18496], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. ", "ContentType": "text/plain"}], "uids": ["C3otN414t8qA2qf2d"]} -{"Format": "IDEA0", "ID": "95307ac7-03f8-41e3-be02-88fb1712232d", "DetectTime": "2023-10-30T14:09:28.748314+02:00", "EventTime": "2023-10-30T14:09:28.748335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["C5JimX1Jk9irjscLYj"]} -{"Format": "IDEA0", "ID": "82e589ae-4236-4139-9ab5-7486d5e38ea1", "DetectTime": "2023-10-30T14:09:28.786839+02:00", "EventTime": "2023-10-30T14:09:28.786855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["C8FCB74Izjvl0N4D6k"]} -{"Format": "IDEA0", "ID": "f498c964-0bac-4d91-8806-da34f6fb3824", "DetectTime": "2023-10-30T14:09:28.825354+02:00", "EventTime": "2023-10-30T14:09:28.825370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CPb9mO2obkp5DOK4rl"]} -{"Format": "IDEA0", "ID": "77acbd8c-02ca-40e8-845e-0e0792aa801a", "DetectTime": "2023-10-30T14:09:28.865226+02:00", "EventTime": "2023-10-30T14:09:28.865248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CRHW0E45pQekPbiaD2"]} -{"Format": "IDEA0", "ID": "52b21161-4508-40b3-a8aa-f5493f51d9c3", "DetectTime": "2023-10-30T14:09:28.902289+02:00", "EventTime": "2023-10-30T14:09:28.902307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["Cq9we54gvfc8KRHzAi"]} -{"Format": "Json", "ID": "52b21161-4508-40b3-a8aa-f5493f51d9c3", "DetectTime": "2023-10-30T14:09:28.902289+02:00", "EventTime": "2023-10-30T14:09:28.902307+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:24:14.827805+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:28.979227)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f0416bbe-a487-4d80-9978-3f4f0fa6a8cb", "DetectTime": "2023-10-30T14:09:28.985066+02:00", "EventTime": "2023-10-30T14:09:28.985087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["C8dODg1sIhcRxxa5"]} -{"Format": "IDEA0", "ID": "24ea62bc-c23c-4671-9bdb-53491bfd2daa", "DetectTime": "2023-10-30T14:09:29.023584+02:00", "EventTime": "2023-10-30T14:09:29.023597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["C3gcPCk1Mff02Zs09"]} -{"Format": "IDEA0", "ID": "31419a6b-34df-400d-9248-557255d0d9b5", "DetectTime": "2023-10-30T14:09:29.058645+02:00", "EventTime": "2023-10-30T14:09:29.058662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CvyhxF3pocnFXHCW85"]} -{"Format": "IDEA0", "ID": "e459cf22-abf2-4c5e-b8c2-eec29037f2f6", "DetectTime": "2023-10-30T14:09:29.090227+02:00", "EventTime": "2023-10-30T14:09:29.090242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CluoR14a7BM1sx6R9"]} -{"Format": "IDEA0", "ID": "3a90fcf1-d3f2-44c4-a456-0ba8577ef327", "DetectTime": "2023-10-30T14:09:29.121359+02:00", "EventTime": "2023-10-30T14:09:29.121381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CY3N2C36gWRUw8y12d"]} -{"Format": "IDEA0", "ID": "877fb356-ffd1-45df-a5c1-c9282bdc0331", "DetectTime": "2023-10-30T14:09:29.158523+02:00", "EventTime": "2023-10-30T14:09:29.158541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CSoQQezPghKAVhUr4"]} -{"Format": "IDEA0", "ID": "7d69991b-341e-4422-a017-27e29bffb285", "DetectTime": "2023-10-30T14:09:29.194699+02:00", "EventTime": "2023-10-30T14:09:29.194717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C1Rzc1REbVnvBrr93"]} -{"Format": "IDEA0", "ID": "fe486e7e-add5-4e08-88db-537dafe54932", "DetectTime": "2023-10-30T14:09:29.229777+02:00", "EventTime": "2023-10-30T14:09:29.229795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CwW6ljS0BXdbWYah6"]} -{"Format": "Json", "ID": "fe486e7e-add5-4e08-88db-537dafe54932", "DetectTime": "2023-10-30T14:09:29.229777+02:00", "EventTime": "2023-10-30T14:09:29.229795+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:54:34.297655+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:29.300904)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2083aae3-3aa3-4324-8a08-ead56639a0d2", "DetectTime": "2023-10-30T14:09:29.305406+02:00", "EventTime": "2023-10-30T14:09:29.305423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CkyVOQ2zAMbvfb6N22"]} -{"Format": "IDEA0", "ID": "54c73906-7ff7-44c7-ac38-c7c27f3e142d", "DetectTime": "2023-10-30T14:09:29.342229+02:00", "EventTime": "2023-10-30T14:09:29.342246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CVM89U3bE6rpNl9Oqc"]} -{"Format": "IDEA0", "ID": "7a363ee4-110e-4dd1-a35d-414d1e7fa1f3", "DetectTime": "2023-10-30T14:09:29.375973+02:00", "EventTime": "2023-10-30T14:09:29.375985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cx6aGq1yHDqQ3uJYbg"]} -{"Format": "IDEA0", "ID": "64f5640e-11e0-4bb8-b81b-c258f5641e30", "DetectTime": "2023-10-30T14:09:29.404775+02:00", "EventTime": "2023-10-30T14:09:29.404800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CYyNRm4EfZSu5I3Tja"]} -{"Format": "IDEA0", "ID": "ad8fdc6a-8ac3-4db9-9281-8fd428260846", "DetectTime": "2023-10-30T14:09:29.435714+02:00", "EventTime": "2023-10-30T14:09:29.435729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CJoruO1ivi6MXVpFm9"]} -{"Format": "IDEA0", "ID": "86d342f8-aeab-4ca2-b186-beca6fd6fdcd", "DetectTime": "2023-10-30T14:09:29.466189+02:00", "EventTime": "2023-10-30T14:09:29.466203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CQKgl91LuHTk46vWml"]} -{"Format": "IDEA0", "ID": "1a79dbfa-df78-4ecb-9743-dbfc6e37b474", "DetectTime": "2023-10-30T14:09:29.495145+02:00", "EventTime": "2023-10-30T14:09:29.495157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Ca3ar32uTJOEbvMRa4"]} -{"Format": "IDEA0", "ID": "9c404209-d639-4c3a-ab9b-0a9f1129d617", "DetectTime": "2023-10-30T14:09:29.524806+02:00", "EventTime": "2023-10-30T14:09:29.524825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVTWdc3bbsFVrNou88"]} -{"Format": "Json", "ID": "9c404209-d639-4c3a-ab9b-0a9f1129d617", "DetectTime": "2023-10-30T14:09:29.524806+02:00", "EventTime": "2023-10-30T14:09:29.524825+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:54:37.614150+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:29.590225)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1f6b1c8d-d895-4031-9e2d-43df49ae7a27", "DetectTime": "2023-10-30T14:09:29.595926+02:00", "EventTime": "2023-10-30T14:09:29.595942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C6XEsc3oKX7FTLho3j"]} -{"Format": "IDEA0", "ID": "a4efe7c9-e09b-427f-a32a-d9704d1c1d3d", "DetectTime": "2023-10-30T14:09:29.624430+02:00", "EventTime": "2023-10-30T14:09:29.624457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CIo5Wz2c0EOouPlXEi"]} -{"Format": "IDEA0", "ID": "4463eab4-891b-41f2-b44b-eb3c99021eec", "DetectTime": "2023-10-30T14:09:29.651519+02:00", "EventTime": "2023-10-30T14:09:29.651534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Csbtut4Jq6tZlovoX5"]} -{"Format": "IDEA0", "ID": "43c31a0d-004f-47c9-aaaa-48483f83ac05", "DetectTime": "2023-10-30T14:09:29.678920+02:00", "EventTime": "2023-10-30T14:09:29.678933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CvQjKu4ceF6D6F3the"]} -{"Format": "IDEA0", "ID": "ea8db44f-fd94-4ed9-8aea-aac30ee23587", "DetectTime": "2023-10-30T14:09:29.705175+02:00", "EventTime": "2023-10-30T14:09:29.705194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CfK3Si2L0o4u1PysWb"]} -{"Format": "IDEA0", "ID": "aae0fbb3-00a5-4900-a8a7-6eb85b5e8f45", "DetectTime": "2023-10-30T14:09:29.732482+02:00", "EventTime": "2023-10-30T14:09:29.732500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["CVVP6y2O1sS4w7XLpc"]} -{"Format": "IDEA0", "ID": "a0bb99e0-34a4-474a-89aa-9bc7f8245c0f", "DetectTime": "2023-10-30T14:09:29.758316+02:00", "EventTime": "2023-10-30T14:09:29.758334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CiDUMj3BzHPMLca1n2"]} -{"Format": "IDEA0", "ID": "61b0f50f-fff9-4e01-9ddc-8054151cde0d", "DetectTime": "2023-10-30T14:09:29.785226+02:00", "EventTime": "2023-10-30T14:09:29.785250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CCklwz3G4B0DFYAya7"]} -{"Format": "IDEA0", "ID": "696067bb-7eb9-411f-a99c-e27562d17962", "DetectTime": "2023-10-30T14:09:29.810912+02:00", "EventTime": "2023-10-30T14:09:29.810932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CnlmT025BRMwpgc6H7"]} -{"Format": "Json", "ID": "696067bb-7eb9-411f-a99c-e27562d17962", "DetectTime": "2023-10-30T14:09:29.810912+02:00", "EventTime": "2023-10-30T14:09:29.810932+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:54:38.259444+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:29.878263)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "36b1f9c9-ac9d-42f7-853e-d0546f643be5", "DetectTime": "2023-10-30T14:09:29.884051+02:00", "EventTime": "2023-10-30T14:09:29.884069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["ColD754ZWm87y9nhMi"]} -{"Format": "IDEA0", "ID": "14e98de1-00ff-42ec-9bd6-743c71125ad7", "DetectTime": "2023-10-30T14:09:29.913040+02:00", "EventTime": "2023-10-30T14:09:29.913057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Che6L14KeRPaTFwpbf"]} -{"Format": "IDEA0", "ID": "750e25cd-7be6-4e33-9d56-4820515ab9e3", "DetectTime": "2023-10-30T14:09:29.937345+02:00", "EventTime": "2023-10-30T14:09:29.937362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CGpr003BB2DMPw6Lw7"]} -{"Format": "IDEA0", "ID": "3b68cb30-11b9-4ebb-af0b-9f741f358b18", "DetectTime": "2023-10-30T14:09:29.961159+02:00", "EventTime": "2023-10-30T14:09:29.961170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CTaAnjlEVe9spdaFd"]} -{"Format": "IDEA0", "ID": "c4090c68-4a98-4b36-85d3-42373ccc66b0", "DetectTime": "2023-10-30T14:09:29.988504+02:00", "EventTime": "2023-10-30T14:09:29.988524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CjWSR94wFbZi4VtSP4"]} -{"Format": "IDEA0", "ID": "9bebc2d8-9b69-40fe-aed8-dcd7855d18bf", "DetectTime": "2023-10-30T14:09:30.014628+02:00", "EventTime": "2023-10-30T14:09:30.014644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CqP2Ah3H1zyPRYqKI9"]} -{"Format": "IDEA0", "ID": "aeb38638-f6c5-4c50-9311-edd14171e17b", "DetectTime": "2023-10-30T14:09:30.038028+02:00", "EventTime": "2023-10-30T14:09:30.038043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["COzgTi2qvAVu3Ia33b"]} -{"Format": "IDEA0", "ID": "4795ae89-3904-454e-b95c-ec0cb19e455f", "DetectTime": "2023-10-30T14:09:30.062184+02:00", "EventTime": "2023-10-30T14:09:30.062200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CyKyPZzeePVeUCsZa"]} -{"Format": "Json", "ID": "4795ae89-3904-454e-b95c-ec0cb19e455f", "DetectTime": "2023-10-30T14:09:30.062184+02:00", "EventTime": "2023-10-30T14:09:30.062200+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:54:44.957414+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:30.125018)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eded299a-6ded-4e99-ac9c-07a5eda4eb90", "DetectTime": "2023-10-30T14:09:30.130417+02:00", "EventTime": "2023-10-30T14:09:30.130435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CpRzXR26jd3hWe50V"]} -{"Format": "IDEA0", "ID": "bf4dff90-52d6-4fd9-a07f-1424d84f604f", "DetectTime": "2023-10-30T14:09:30.154507+02:00", "EventTime": "2023-10-30T14:09:30.154519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CFnL9h2AXbErNex8di"]} -{"Format": "IDEA0", "ID": "86093979-70f3-4539-9ba9-55bf74822eab", "DetectTime": "2023-10-30T14:09:30.179044+02:00", "EventTime": "2023-10-30T14:09:30.179056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CwHRyb3U5joc2sobSg"]} -{"Format": "IDEA0", "ID": "f239b4ac-73ab-4e52-a368-a5315f1d3549", "DetectTime": "2023-10-30T14:09:30.200619+02:00", "EventTime": "2023-10-30T14:09:30.200631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CG4AcYmk86jHCrZRj"]} -{"Format": "IDEA0", "ID": "7a2d999c-e40b-4207-a246-f14e3a574b44", "DetectTime": "2023-10-30T14:09:30.224094+02:00", "EventTime": "2023-10-30T14:09:30.224107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CiNLJu3pMAphnVwVb"]} -{"Format": "IDEA0", "ID": "5cd464d5-f2f9-4ae6-b527-5d346deb2852", "DetectTime": "2023-10-30T14:09:30.245431+02:00", "EventTime": "2023-10-30T14:09:30.245450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CRwcEI1fuE5oy1HVbc"]} -{"Format": "IDEA0", "ID": "526b3df6-adeb-4016-bfab-8f8173998ac7", "DetectTime": "2023-10-30T14:09:30.271169+02:00", "EventTime": "2023-10-30T14:09:30.271185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CjjRre1dVlAVKaYcx1"]} -{"Format": "IDEA0", "ID": "e93b1d91-a09e-4dd9-934d-92a83edb6705", "DetectTime": "2023-10-30T14:09:30.296573+02:00", "EventTime": "2023-10-30T14:09:30.296589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CY5hns20M6G00YY0Fb"]} -{"Format": "Json", "ID": "e93b1d91-a09e-4dd9-934d-92a83edb6705", "DetectTime": "2023-10-30T14:09:30.296573+02:00", "EventTime": "2023-10-30T14:09:30.296589+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T12:54:44.958422+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2023/10/30 14:09:30.362455)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4b171214-47b0-497c-ada5-ca158b90925f", "DetectTime": "2023-10-30T14:09:30.367512+02:00", "EventTime": "2023-10-30T14:09:30.367528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CbOSzo2GCcFhydYhLl"]} -{"Format": "IDEA0", "ID": "8c766bc6-0b2a-45de-ab22-7f2354c198d2", "DetectTime": "2023-10-30T14:09:30.392064+02:00", "EventTime": "2023-10-30T14:09:30.392081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CQK3IS1JElQg0v4V3j"]} -{"Format": "IDEA0", "ID": "201ae520-c31b-452a-a89b-0bb6d81356d5", "DetectTime": "2023-10-30T14:09:30.414123+02:00", "EventTime": "2023-10-30T14:09:30.414141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CA59uo4Ok1ZgEc14mg"]} -{"Format": "IDEA0", "ID": "06ccc320-a52b-4c19-965c-1b6d60e8c2f7", "DetectTime": "2023-10-30T14:09:30.453390+02:00", "EventTime": "2023-10-30T14:09:30.453406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cb328ku86DJWGB6Tl"]} -{"Format": "IDEA0", "ID": "4c5e69b6-6d02-4816-9ac3-4f2cb2b5e9d2", "DetectTime": "2023-10-30T14:09:30.491379+02:00", "EventTime": "2023-10-30T14:09:30.491396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C5EG1O3ctwUdNCoQBb"]} -{"Format": "IDEA0", "ID": "1b7014fc-45b9-480d-aefd-926c1e03e6d7", "DetectTime": "2023-10-30T14:09:30.530055+02:00", "EventTime": "2023-10-30T14:09:30.530072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CS3GvG3HronbRfChD5"]} -{"Format": "IDEA0", "ID": "7a020abd-baa4-407b-9353-e308bb107f93", "DetectTime": "2023-10-30T14:09:30.568211+02:00", "EventTime": "2023-10-30T14:09:30.568223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1ntV83T4v1BPhvN53"]} -{"Format": "IDEA0", "ID": "8ad59f17-5c72-440b-9017-f49fcc1bb806", "DetectTime": "2023-10-30T14:09:30.614633+02:00", "EventTime": "2023-10-30T14:09:30.614650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKCsbj1H8Y7xJHnwF8"]} -{"Format": "IDEA0", "ID": "9c856390-23a7-4037-92ed-bd45810fc4c9", "DetectTime": "2023-10-30T14:09:30.658523+02:00", "EventTime": "2023-10-30T14:09:30.658536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CYPCqp2gAzUIYQ51ca"]} -{"Format": "IDEA0", "ID": "88709633-9307-41c9-a57f-8ead179f3e6d", "DetectTime": "2023-10-30T14:09:30.700093+02:00", "EventTime": "2023-10-30T14:09:30.700105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CJAF4s3gY1OcViLsh"]} -{"Format": "Json", "ID": "88709633-9307-41c9-a57f-8ead179f3e6d", "DetectTime": "2023-10-30T14:09:30.700093+02:00", "EventTime": "2023-10-30T14:09:30.700105+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:25:55.393572+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:30.774837)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2eb54bde-fb7a-46f2-b46d-65e38ba8bc78", "DetectTime": "2023-10-30T14:09:30.780578+02:00", "EventTime": "2023-10-30T14:09:30.780602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CUkRdz2SO9HaLmC2S"]} -{"Format": "IDEA0", "ID": "1549e98b-f58c-45f6-8bbc-3398c6f2766e", "DetectTime": "2023-10-30T14:09:30.817151+02:00", "EventTime": "2023-10-30T14:09:30.817163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CUOi6f3chdhE4Nt8Qh"]} -{"Format": "IDEA0", "ID": "1331e283-07d3-4940-95ee-684ad7b15f58", "DetectTime": "2023-10-30T14:09:30.855374+02:00", "EventTime": "2023-10-30T14:09:30.855391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CbIaA52BI8NiZOrCzf"]} -{"Format": "IDEA0", "ID": "950dadc0-d38a-4815-a1d0-320916541589", "DetectTime": "2023-10-30T14:09:30.893012+02:00", "EventTime": "2023-10-30T14:09:30.893032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cfv4zb2Yw6KkoxBUAg"]} -{"Format": "IDEA0", "ID": "a908b5c3-0790-4e2a-aa17-c513a09dc79a", "DetectTime": "2023-10-30T14:09:30.929223+02:00", "EventTime": "2023-10-30T14:09:30.929233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CbYv9t4KqiWfidkjM9"]} -{"Format": "IDEA0", "ID": "0db24ff1-5f63-4ea1-a6ea-84e86d2e0620", "DetectTime": "2023-10-30T14:09:30.963084+02:00", "EventTime": "2023-10-30T14:09:30.963101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CAYppQ10wmhwdbdaie"]} -{"Format": "IDEA0", "ID": "860d23ff-cb3b-49e6-b8ac-71c278578493", "DetectTime": "2023-10-30T14:09:31.002444+02:00", "EventTime": "2023-10-30T14:09:31.002463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cz0kEC1ECULxdJ6eJh"]} -{"Format": "IDEA0", "ID": "b9b03eac-d1b1-493d-8625-5eba5c586b56", "DetectTime": "2023-10-30T14:09:31.039177+02:00", "EventTime": "2023-10-30T14:09:31.039204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cza4LKdro3vb0OJSh"]} -{"Format": "Json", "ID": "b9b03eac-d1b1-493d-8625-5eba5c586b56", "DetectTime": "2023-10-30T14:09:31.039177+02:00", "EventTime": "2023-10-30T14:09:31.039204+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:25:57.137416+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:31.111257)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "de23a3b6-1b82-41f6-a2f6-5f76e1d0d3b1", "DetectTime": "2023-10-30T14:09:31.115847+02:00", "EventTime": "2023-10-30T14:09:31.115858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbKLdG1uMVYRQViH64"]} -{"Format": "IDEA0", "ID": "21640020-b2bd-450e-8e90-32d39cdb3062", "DetectTime": "2023-10-30T14:09:31.150525+02:00", "EventTime": "2023-10-30T14:09:31.150538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CSn5DB37XlWYwBxPqc"]} -{"Format": "IDEA0", "ID": "61b681e1-d2c9-4779-b0f1-a38109f9601f", "DetectTime": "2023-10-30T14:09:31.182317+02:00", "EventTime": "2023-10-30T14:09:31.182330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C5H5OKgEcWoxzQFd2"]} -{"Format": "IDEA0", "ID": "faa935f5-7501-4192-a482-e1745436e324", "DetectTime": "2023-10-30T14:09:31.214802+02:00", "EventTime": "2023-10-30T14:09:31.214821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CXcWvf0EtWkmLgfQ2"]} -{"Format": "IDEA0", "ID": "3c922221-8fc7-4f6b-98e4-0d81c6cb54a0", "DetectTime": "2023-10-30T14:09:31.246195+02:00", "EventTime": "2023-10-30T14:09:31.246209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C4yxcR1AgZ80Kg7Bvg"]} -{"Format": "IDEA0", "ID": "adbdfb8a-e8b5-4be9-8ca1-929ad5422a26", "DetectTime": "2023-10-30T14:09:31.277242+02:00", "EventTime": "2023-10-30T14:09:31.277258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cy8yo6220xKanL9jP3"]} -{"Format": "IDEA0", "ID": "cfb144fb-c8a9-4180-a526-70e439ae9af6", "DetectTime": "2023-10-30T14:09:31.309193+02:00", "EventTime": "2023-10-30T14:09:31.309208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cxp1gs4Npgr8JVtnvc"]} -{"Format": "IDEA0", "ID": "b4d7f315-6a34-4728-9e9f-30b170cfcde7", "DetectTime": "2023-10-30T14:09:31.342030+02:00", "EventTime": "2023-10-30T14:09:31.342052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CFxLkF4t0vo8jCW1hh"]} -{"Format": "Json", "ID": "b4d7f315-6a34-4728-9e9f-30b170cfcde7", "DetectTime": "2023-10-30T14:09:31.342030+02:00", "EventTime": "2023-10-30T14:09:31.342052+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:25:59.321140+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:31.411549)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dbb8fd57-c985-4e15-b874-1a6806829fe0", "DetectTime": "2023-10-30T14:09:31.415876+02:00", "EventTime": "2023-10-30T14:09:31.415892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CNiuf24LThSIq5rYB5"]} -{"Format": "IDEA0", "ID": "d32085bd-b378-4c75-826b-10239699143e", "DetectTime": "2023-10-30T14:09:31.450003+02:00", "EventTime": "2023-10-30T14:09:31.450015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C1Uaz11wx2uY4KvAd3"]} -{"Format": "IDEA0", "ID": "e4bbf7c2-33d0-4ebd-9dad-7c740647efff", "DetectTime": "2023-10-30T14:09:31.478465+02:00", "EventTime": "2023-10-30T14:09:31.478482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CRINWh3yLbpxROr3jd"]} -{"Format": "IDEA0", "ID": "7372aa6e-d09d-430f-9686-db9d8dd6cfbb", "DetectTime": "2023-10-30T14:09:31.509444+02:00", "EventTime": "2023-10-30T14:09:31.509459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cb0grV1hzRQmNK803k"]} -{"Format": "IDEA0", "ID": "6a6e27a6-92fa-4c52-a044-2cc40b88df85", "DetectTime": "2023-10-30T14:09:31.539608+02:00", "EventTime": "2023-10-30T14:09:31.539624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CZKvwp3hiYGKF7Sm5a"]} -{"Format": "IDEA0", "ID": "cab6a61c-f86e-40c3-a214-3896dd7828dd", "DetectTime": "2023-10-30T14:09:31.571738+02:00", "EventTime": "2023-10-30T14:09:31.571752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CeFsCgi8OEcvoUyZ"]} -{"Format": "IDEA0", "ID": "864c30df-67e2-4ed0-89e9-b432c5a1b290", "DetectTime": "2023-10-30T14:09:31.602094+02:00", "EventTime": "2023-10-30T14:09:31.602106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CHgl1G440lwpFnQsI9"]} -{"Format": "IDEA0", "ID": "6cedae8b-f97c-44a0-bafa-00a0bcf5c23f", "DetectTime": "2023-10-30T14:09:31.635418+02:00", "EventTime": "2023-10-30T14:09:31.635435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CiuiPl45sijzGhBY43"]} -{"Format": "Json", "ID": "6cedae8b-f97c-44a0-bafa-00a0bcf5c23f", "DetectTime": "2023-10-30T14:09:31.635418+02:00", "EventTime": "2023-10-30T14:09:31.635435+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:26:04.494439+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:31.702892)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93ac86d6-499a-437a-94b7-e066b739926f", "DetectTime": "2023-10-30T14:09:31.708221+02:00", "EventTime": "2023-10-30T14:09:31.708239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CumDTS1eMhuqD7Neq5"]} -{"Format": "IDEA0", "ID": "2d1052a8-89a1-462a-9207-5a873158a1ab", "DetectTime": "2023-10-30T14:09:31.737839+02:00", "EventTime": "2023-10-30T14:09:31.737862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CtsPSD3eHBkikV2p0f"]} -{"Format": "IDEA0", "ID": "f421c106-19fc-42f9-ac9f-2caf49806cd7", "DetectTime": "2023-10-30T14:09:31.766193+02:00", "EventTime": "2023-10-30T14:09:31.766210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CqxjlO3i3OeVceGrKd"]} -{"Format": "IDEA0", "ID": "a7dc850a-8eb1-47dc-bccc-c03275d25c9a", "DetectTime": "2023-10-30T14:09:31.794839+02:00", "EventTime": "2023-10-30T14:09:31.794856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CN1f4f49ewh0j3m5l2"]} -{"Format": "IDEA0", "ID": "3f4d9f3e-53db-49a1-b77e-3fe7228a1e88", "DetectTime": "2023-10-30T14:09:31.823216+02:00", "EventTime": "2023-10-30T14:09:31.823231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cmgua54H8aghuNq3K5"]} -{"Format": "IDEA0", "ID": "fddf768f-0429-4708-8d22-1c4784190ebd", "DetectTime": "2023-10-30T14:09:31.850533+02:00", "EventTime": "2023-10-30T14:09:31.850547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cy7N691hgzXZzH54y1"]} -{"Format": "IDEA0", "ID": "1730addc-df8e-4e12-be7f-3633084a02ad", "DetectTime": "2023-10-30T14:09:31.876639+02:00", "EventTime": "2023-10-30T14:09:31.876656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CPvvoH2huXL7Ff6vu"]} -{"Format": "IDEA0", "ID": "21eb290c-b1e6-4220-a4e8-f5ba1aa67a39", "DetectTime": "2023-10-30T14:09:31.903696+02:00", "EventTime": "2023-10-30T14:09:31.903712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CiqKuPKALyb5LzUv7"]} -{"Format": "Json", "ID": "21eb290c-b1e6-4220-a4e8-f5ba1aa67a39", "DetectTime": "2023-10-30T14:09:31.903696+02:00", "EventTime": "2023-10-30T14:09:31.903712+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:56:35.452960+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:31.960084)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5ae4fc66-0b56-4075-bd41-67375e80449b", "DetectTime": "2023-10-30T14:09:31.965319+02:00", "EventTime": "2023-10-30T14:09:31.965336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CymtRi4NQnm3q3Yvc7"]} -{"Format": "IDEA0", "ID": "50b1fb3c-1f63-492c-87ac-786e01864bbc", "DetectTime": "2023-10-30T14:09:31.995804+02:00", "EventTime": "2023-10-30T14:09:31.995822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CIFgn33QZyMWTwg7Wf"]} -{"Format": "IDEA0", "ID": "53777a93-eb4f-45b9-bba5-25e8f83fe57a", "DetectTime": "2023-10-30T14:09:32.021059+02:00", "EventTime": "2023-10-30T14:09:32.021076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ckni8K2oEBR9Xbmlcg"]} -{"Format": "IDEA0", "ID": "598a3f85-7a29-400d-acb3-e18fb9127e3f", "DetectTime": "2023-10-30T14:09:32.047864+02:00", "EventTime": "2023-10-30T14:09:32.047879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["ChnPCF34dvXyiQYgCj"]} -{"Format": "IDEA0", "ID": "d030906b-e4ad-4d9b-aeea-d22906589653", "DetectTime": "2023-10-30T14:09:32.073853+02:00", "EventTime": "2023-10-30T14:09:32.073864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cp1JrW1sHaH759Ea55"]} -{"Format": "IDEA0", "ID": "1aad74c2-9ab5-46e8-ac64-42334b2fe12d", "DetectTime": "2023-10-30T14:09:32.101195+02:00", "EventTime": "2023-10-30T14:09:32.101207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CbZrf91yMjgkskQ7M3"]} -{"Format": "IDEA0", "ID": "2865c039-35a3-4dcb-b1e3-c90cdbd1ac41", "DetectTime": "2023-10-30T14:09:32.128792+02:00", "EventTime": "2023-10-30T14:09:32.128809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CnRt9s4QP7weOQQgUk"]} -{"Format": "IDEA0", "ID": "40b9238b-f1e9-4dba-93e9-3794aa257a52", "DetectTime": "2023-10-30T14:09:32.155897+02:00", "EventTime": "2023-10-30T14:09:32.155913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["COdzAK2HgdODp4PVF3"]} -{"Format": "Json", "ID": "40b9238b-f1e9-4dba-93e9-3794aa257a52", "DetectTime": "2023-10-30T14:09:32.155897+02:00", "EventTime": "2023-10-30T14:09:32.155913+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:56:53.992013+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:32.218776)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "154e5f32-4159-4054-9de1-1ef7243838ff", "DetectTime": "2023-10-30T14:09:32.224097+02:00", "EventTime": "2023-10-30T14:09:32.224113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C8XXAa4ahcYHZlfiwj"]} -{"Format": "IDEA0", "ID": "b285c98a-c237-4641-8e72-f3c341578968", "DetectTime": "2023-10-30T14:09:32.251862+02:00", "EventTime": "2023-10-30T14:09:32.251873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C31QpY2iFQdGJam9k7"]} -{"Format": "IDEA0", "ID": "e5522a13-5808-4146-86ff-220397ec1253", "DetectTime": "2023-10-30T14:09:32.276412+02:00", "EventTime": "2023-10-30T14:09:32.276437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C8wyeYPiq5npzlYIi"]} -{"Format": "IDEA0", "ID": "c22b2130-0f51-41c4-ad08-4c77333a933f", "DetectTime": "2023-10-30T14:09:32.299706+02:00", "EventTime": "2023-10-30T14:09:32.299722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C0jhKV3fJ0IKDbHRRj"]} -{"Format": "IDEA0", "ID": "9e0a4400-d653-4943-903f-af9eb57f863a", "DetectTime": "2023-10-30T14:09:32.323294+02:00", "EventTime": "2023-10-30T14:09:32.323313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CJN3hB2WjYt4HxPqT6"]} -{"Format": "IDEA0", "ID": "c42e3d0c-5071-4a33-b9ea-d920975db122", "DetectTime": "2023-10-30T14:09:32.346017+02:00", "EventTime": "2023-10-30T14:09:32.346045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CaEZ3k43LqrGkzJzN5"]} -{"Format": "IDEA0", "ID": "8e75eef6-6466-4430-93b8-dddfda1e28ce", "DetectTime": "2023-10-30T14:09:32.370454+02:00", "EventTime": "2023-10-30T14:09:32.370469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CZlLKP2DnlXw7WOu1k"]} -{"Format": "IDEA0", "ID": "73ab6d88-b690-4ab8-b085-be3b715265ba", "DetectTime": "2023-10-30T14:09:32.394326+02:00", "EventTime": "2023-10-30T14:09:32.394342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CWIahGIhZMcw5tjki"]} -{"Format": "Json", "ID": "73ab6d88-b690-4ab8-b085-be3b715265ba", "DetectTime": "2023-10-30T14:09:32.394326+02:00", "EventTime": "2023-10-30T14:09:32.394342+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:56:55.687770+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:32.455446)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "11baefdc-463b-4a9b-8108-d3460a038d86", "DetectTime": "2023-10-30T14:09:32.460940+02:00", "EventTime": "2023-10-30T14:09:32.460958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CEZrFD3MPJ5JsakT0h"]} -{"Format": "IDEA0", "ID": "52c5cf5d-4a44-4b04-a579-b971ee631dbf", "DetectTime": "2023-10-30T14:09:32.482973+02:00", "EventTime": "2023-10-30T14:09:32.482987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CBlcZo2YsrJMW8IBC7"]} -{"Format": "IDEA0", "ID": "559f8f16-47a4-4e00-a5bf-531e39f57cc8", "DetectTime": "2023-10-30T14:09:32.507620+02:00", "EventTime": "2023-10-30T14:09:32.507636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C3Rwlf2v9DeGJ8nn1l"]} -{"Format": "IDEA0", "ID": "c8a42ce5-0a32-431f-a115-d7ac2b48d106", "DetectTime": "2023-10-30T14:09:32.531736+02:00", "EventTime": "2023-10-30T14:09:32.531764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CWPZD5pQHH9ONhFw3"]} -{"Format": "IDEA0", "ID": "b198992a-fdd3-4fdb-9a8b-6294d83ac873", "DetectTime": "2023-10-30T14:09:32.629470+02:00", "EventTime": "2023-10-30T14:09:32.629488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CgA6Ak4541UtjSsDD5"]} -{"Format": "IDEA0", "ID": "67cff5b7-ee2d-4e98-a2ca-c22f59e38e97", "DetectTime": "2023-10-30T14:09:32.656755+02:00", "EventTime": "2023-10-30T14:09:32.656772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CxJo7e4udehOhYdlh1"]} -{"Format": "IDEA0", "ID": "bc77e1fe-a8b1-4ab8-b150-a7c03dade489", "DetectTime": "2023-10-30T14:09:32.682385+02:00", "EventTime": "2023-10-30T14:09:32.682401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CAZUbl4mxF0pyjEo82"]} -{"Format": "IDEA0", "ID": "69b4c8ec-676a-4b32-bbfc-2c6b11b656a8", "DetectTime": "2023-10-30T14:09:32.705232+02:00", "EventTime": "2023-10-30T14:09:32.705248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CVvobW2112cO4wIKAk"]} -{"Format": "Json", "ID": "69b4c8ec-676a-4b32-bbfc-2c6b11b656a8", "DetectTime": "2023-10-30T14:09:32.705232+02:00", "EventTime": "2023-10-30T14:09:32.705248+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T13:56:58.492370+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2023/10/30 14:09:32.769660)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b04d3991-c180-4fb4-9045-0e4ea2233061", "DetectTime": "2023-10-30T14:09:32.775036+02:00", "EventTime": "2023-10-30T14:09:32.775051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CHQ2fq34T1oR329x6"]} -{"Format": "IDEA0", "ID": "2c961a9b-8da7-48ac-87ba-ade3b578ed00", "DetectTime": "2023-10-30T14:09:32.798081+02:00", "EventTime": "2023-10-30T14:09:32.798096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["Cm0Ceu10VAKHfLCiH8"]} -{"Format": "IDEA0", "ID": "658b8711-b28f-41ce-8570-3a16cfa51f0b", "DetectTime": "2023-10-30T14:09:32.818074+02:00", "EventTime": "2023-10-30T14:09:32.818092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CpTUMf1RTxAHaGkrJc"]} -{"Format": "IDEA0", "ID": "930ed06b-1a48-4a4f-a540-eb0c8007be04", "DetectTime": "2023-10-30T14:09:32.837365+02:00", "EventTime": "2023-10-30T14:09:32.837379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["C0YNt46SAfdoMPSSf"]} -{"Format": "IDEA0", "ID": "d74b06d1-74be-4bd5-a913-f4f8e6b38a58", "DetectTime": "2023-10-30T14:09:32.859132+02:00", "EventTime": "2023-10-30T14:09:32.859144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CTinEuoEDcPWUMSd2"]} -{"Format": "IDEA0", "ID": "fd25c98f-592a-4928-b51c-c96cdd9f3c58", "DetectTime": "2023-10-30T14:09:32.878673+02:00", "EventTime": "2023-10-30T14:09:32.878686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CQqzfY3vxCPlveUA0b"]} -{"Format": "IDEA0", "ID": "d9717769-277b-4afa-9de0-a9412e49d806", "DetectTime": "2023-10-30T14:09:32.900138+02:00", "EventTime": "2023-10-30T14:09:32.900155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4WkmFegLLILXsIRl"]} -{"Format": "IDEA0", "ID": "63cfb64a-34db-428b-98ec-df1bb8b913ef", "DetectTime": "2023-10-30T14:09:32.923647+02:00", "EventTime": "2023-10-30T14:09:32.923661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cfzvfk3NSqKLRZFAjg"]} -{"Format": "IDEA0", "ID": "0cf27059-e970-4911-ab6a-de000ad2168c", "DetectTime": "2023-10-30T14:09:32.967494+02:00", "EventTime": "2023-10-30T14:09:32.967510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CppSHv3pZiRFEGsye4"]} -{"Format": "IDEA0", "ID": "1b85cf9c-4ae4-4ed2-b0f0-0210575106fa", "DetectTime": "2023-10-30T14:09:33.008687+02:00", "EventTime": "2023-10-30T14:09:33.008701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CUOjsN2vAF4PgOzjU1"]} -{"Format": "IDEA0", "ID": "dc73a6a1-0ce0-40ef-8ac3-0ca1d6c7a0e0", "DetectTime": "2023-10-30T14:09:33.050551+02:00", "EventTime": "2023-10-30T14:09:33.050567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C2bobP3CghlcVjiw"]} -{"Format": "IDEA0", "ID": "2d4ef689-d51b-4cd8-af3f-682a3ec0dfd5", "DetectTime": "2023-10-30T14:09:33.092572+02:00", "EventTime": "2023-10-30T14:09:33.092585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CVw6g42yA5DjglR9nl"]} -{"Format": "IDEA0", "ID": "3def3e74-c4cd-4721-b3a3-05ade8f58575", "DetectTime": "2023-10-30T14:09:33.135515+02:00", "EventTime": "2023-10-30T14:09:33.135532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CpVsB62dfKRDB9oGW4"]} -{"Format": "IDEA0", "ID": "1b9e9cc3-440c-4396-834e-a42b4d81d4c4", "DetectTime": "2023-10-30T14:09:33.180075+02:00", "EventTime": "2023-10-30T14:09:33.180129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CAJqBp4tRqhc1olVQ1"]} -{"Format": "IDEA0", "ID": "d3fb63eb-5eb1-4df8-810c-562b6d3f3ad1", "DetectTime": "2023-10-30T14:09:33.224093+02:00", "EventTime": "2023-10-30T14:09:33.224118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CrNQWjqJjE1vI7fh"]} -{"Format": "Json", "ID": "d3fb63eb-5eb1-4df8-810c-562b6d3f3ad1", "DetectTime": "2023-10-30T14:09:33.224093+02:00", "EventTime": "2023-10-30T14:09:33.224118+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:27:05.337929+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:33.302578)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1007dbc3-9a32-45dc-86cb-81a6a7c8b721", "DetectTime": "2023-10-30T14:09:33.307801+02:00", "EventTime": "2023-10-30T14:09:33.307821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C14yrM9d2Qvj9rEa7"]} -{"Format": "IDEA0", "ID": "7b16fa68-9059-4dca-a5d8-d218d23f01c8", "DetectTime": "2023-10-30T14:09:33.349353+02:00", "EventTime": "2023-10-30T14:09:33.349369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CohS7t3SWZbRHpE0y6"]} -{"Format": "IDEA0", "ID": "df9b1f70-c6b0-489f-a46a-072cbad0624e", "DetectTime": "2023-10-30T14:09:33.388589+02:00", "EventTime": "2023-10-30T14:09:33.388608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C1mLW63kkdtDvlTvh3"]} -{"Format": "IDEA0", "ID": "16bbc783-4427-45db-98c9-d1f3d023d752", "DetectTime": "2023-10-30T14:09:33.426579+02:00", "EventTime": "2023-10-30T14:09:33.426605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C042v41PWcoX1cxso1"]} -{"Format": "IDEA0", "ID": "1012d7d1-b696-43c8-8e20-2d5a58723ee1", "DetectTime": "2023-10-30T14:09:33.465257+02:00", "EventTime": "2023-10-30T14:09:33.465284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CXHzBH2z1yFtZFbavg"]} -{"Format": "IDEA0", "ID": "fe9c0657-97be-4171-b64b-64f4918cd723", "DetectTime": "2023-10-30T14:09:33.505583+02:00", "EventTime": "2023-10-30T14:09:33.505600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CYYo3p3ixBaIwHbM4c"]} -{"Format": "IDEA0", "ID": "46f3cde0-fe8b-44e2-82f5-349b47ec9833", "DetectTime": "2023-10-30T14:09:33.543866+02:00", "EventTime": "2023-10-30T14:09:33.543884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Co3z422VkEXUOkTVdi"]} -{"Format": "IDEA0", "ID": "0441f69b-b08d-42c7-b985-0e83a082c6f5", "DetectTime": "2023-10-30T14:09:33.582695+02:00", "EventTime": "2023-10-30T14:09:33.582722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CVxeim3yimQ4l04lA2"]} -{"Format": "Json", "ID": "0441f69b-b08d-42c7-b985-0e83a082c6f5", "DetectTime": "2023-10-30T14:09:33.582695+02:00", "EventTime": "2023-10-30T14:09:33.582722+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:27:06.903026+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:33.660730)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c45dd7c9-1104-4625-8602-d697521267ab", "DetectTime": "2023-10-30T14:09:33.665967+02:00", "EventTime": "2023-10-30T14:09:33.665981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbA9k23dnwHHcXudih"]} -{"Format": "IDEA0", "ID": "be51cd62-bff3-4d48-9bf7-fd5157e57196", "DetectTime": "2023-10-30T14:09:33.703697+02:00", "EventTime": "2023-10-30T14:09:33.703715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CEZLwm2XakaoDrslr8"]} -{"Format": "IDEA0", "ID": "60115f04-5540-4f3c-bb61-7a688f27ff72", "DetectTime": "2023-10-30T14:09:33.739643+02:00", "EventTime": "2023-10-30T14:09:33.739669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CnVlfG1oszOVRaSWec"]} -{"Format": "IDEA0", "ID": "c2ad3734-b135-4168-b937-e15d4c765139", "DetectTime": "2023-10-30T14:09:33.775711+02:00", "EventTime": "2023-10-30T14:09:33.775733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CPD9Y42aP9HXpPz0Fl"]} -{"Format": "IDEA0", "ID": "4461312f-316e-4c5c-bbab-1d00bfe67da4", "DetectTime": "2023-10-30T14:09:33.813654+02:00", "EventTime": "2023-10-30T14:09:33.813682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CxDhaK11ByplSkMBaj"]} -{"Format": "IDEA0", "ID": "0cab3cb3-b4e9-487b-83d7-b82ea0718e91", "DetectTime": "2023-10-30T14:09:33.850151+02:00", "EventTime": "2023-10-30T14:09:33.850172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CKN2UT3f8dG3BGAsCd"]} -{"Format": "IDEA0", "ID": "f51111f3-be33-4da6-a955-5a35d131bbb5", "DetectTime": "2023-10-30T14:09:33.889960+02:00", "EventTime": "2023-10-30T14:09:33.889976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CIvbgg2x0dzYdO8Odf"]} -{"Format": "IDEA0", "ID": "59323283-7366-4b8c-8601-cdb1955fb4c9", "DetectTime": "2023-10-30T14:09:33.925826+02:00", "EventTime": "2023-10-30T14:09:33.925837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CfmTUZ27H8Qty7sej8"]} -{"Format": "Json", "ID": "59323283-7366-4b8c-8601-cdb1955fb4c9", "DetectTime": "2023-10-30T14:09:33.925826+02:00", "EventTime": "2023-10-30T14:09:33.925837+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:27:08.763939+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:33.998412)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c1e201b2-d2c2-4662-b8bf-fc81ee556da3", "DetectTime": "2023-10-30T14:09:34.003611+02:00", "EventTime": "2023-10-30T14:09:34.003638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CLm4s61dqUOWFNMBf9"]} -{"Format": "IDEA0", "ID": "8003ee5f-9e1f-44d8-b034-933050c6ac87", "DetectTime": "2023-10-30T14:09:34.036129+02:00", "EventTime": "2023-10-30T14:09:34.036142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cis5rd4B7Ex54vpsm8"]} -{"Format": "IDEA0", "ID": "9b861e18-fadf-44f9-ad96-012bbceb7a04", "DetectTime": "2023-10-30T14:09:34.066254+02:00", "EventTime": "2023-10-30T14:09:34.066275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ceo67V2kOugQrDugT2"]} -{"Format": "IDEA0", "ID": "faba23ab-95d7-4575-a0d0-9604eba259ce", "DetectTime": "2023-10-30T14:09:34.098716+02:00", "EventTime": "2023-10-30T14:09:34.098734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cwz1qI2q4utuc78Ob6"]} -{"Format": "IDEA0", "ID": "e7bf2dba-d3ea-4816-9c85-e938365e66a0", "DetectTime": "2023-10-30T14:09:34.132207+02:00", "EventTime": "2023-10-30T14:09:34.132223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["C8Jdub2SNK0LWsRC0c"]} -{"Format": "IDEA0", "ID": "6bd92dbf-ea94-4264-8ed5-4e7bb6bde985", "DetectTime": "2023-10-30T14:09:34.165706+02:00", "EventTime": "2023-10-30T14:09:34.165723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CnGC6F2UhJV8vdma8h"]} -{"Format": "IDEA0", "ID": "85a98617-8f67-4f30-9ddc-70205e454415", "DetectTime": "2023-10-30T14:09:34.198645+02:00", "EventTime": "2023-10-30T14:09:34.198665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["CqvMn53PxT8rvhUZsj"]} -{"Format": "IDEA0", "ID": "90a4b803-73d6-4e55-b1fe-b326497ab7f9", "DetectTime": "2023-10-30T14:09:34.224552+02:00", "EventTime": "2023-10-30T14:09:34.224566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CD0BDFL6Y91WejPsh"]} -{"Format": "Json", "ID": "90a4b803-73d6-4e55-b1fe-b326497ab7f9", "DetectTime": "2023-10-30T14:09:34.224552+02:00", "EventTime": "2023-10-30T14:09:34.224566+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:27:11.356547+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:34.288287)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31d5dc0b-e63e-4210-b63e-e6ae85e4c779", "DetectTime": "2023-10-30T14:09:34.293470+02:00", "EventTime": "2023-10-30T14:09:34.293482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CB5xIs4UhoChYzuGYi"]} -{"Format": "IDEA0", "ID": "b487265a-6ea6-4b68-b7b0-cd75a00c4ea5", "DetectTime": "2023-10-30T14:09:34.322864+02:00", "EventTime": "2023-10-30T14:09:34.322881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["CBFDcK1X8yAwlSD3U4"]} -{"Format": "IDEA0", "ID": "408dafc2-fb65-401d-84bd-38c1b48ba8cb", "DetectTime": "2023-10-30T14:09:34.353644+02:00", "EventTime": "2023-10-30T14:09:34.353657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CCbXtc1vD8kD68V5f"]} -{"Format": "IDEA0", "ID": "7f6de4f6-4a1d-4b70-a400-8d32ddcd2edf", "DetectTime": "2023-10-30T14:09:34.382119+02:00", "EventTime": "2023-10-30T14:09:34.382132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C9H7gS23ABaESxYj6i"]} -{"Format": "IDEA0", "ID": "2b357774-5ca8-4221-bcc1-a264970aa558", "DetectTime": "2023-10-30T14:09:34.410754+02:00", "EventTime": "2023-10-30T14:09:34.410766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSdy5n3YSNvhgXIVti"]} -{"Format": "IDEA0", "ID": "2ebc5397-4faa-42c5-9387-7d6a2a06e481", "DetectTime": "2023-10-30T14:09:34.438077+02:00", "EventTime": "2023-10-30T14:09:34.438093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C1EATQ1U84JLgJy1j"]} -{"Format": "IDEA0", "ID": "1c50ae05-ae86-406e-a500-cf3314e1ca43", "DetectTime": "2023-10-30T14:09:34.469813+02:00", "EventTime": "2023-10-30T14:09:34.469829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C19bue1sILjdnO8Wa6"]} -{"Format": "IDEA0", "ID": "165f57f1-9701-455a-bdf7-a0a1237dae6d", "DetectTime": "2023-10-30T14:09:34.498901+02:00", "EventTime": "2023-10-30T14:09:34.498920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CDJKxn2cRtIssNPvca"]} -{"Format": "Json", "ID": "165f57f1-9701-455a-bdf7-a0a1237dae6d", "DetectTime": "2023-10-30T14:09:34.498901+02:00", "EventTime": "2023-10-30T14:09:34.498920+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:57:43.875871+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:34.566569)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "72928c57-5993-40d3-90b9-7b60a16279f8", "DetectTime": "2023-10-30T14:09:34.571723+02:00", "EventTime": "2023-10-30T14:09:34.571749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C0peBO1qG4rFZoQR8b"]} -{"Format": "IDEA0", "ID": "b461f0bd-4289-4d2a-a9be-262b97b5afec", "DetectTime": "2023-10-30T14:09:34.668448+02:00", "EventTime": "2023-10-30T14:09:34.668466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C8kzObeVnk3cdiZhj"]} -{"Format": "IDEA0", "ID": "c485a3f8-e03c-4ede-a5f8-96e2415d62b1", "DetectTime": "2023-10-30T14:09:34.702207+02:00", "EventTime": "2023-10-30T14:09:34.702224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["COfJiV3gQjAG0yhnE7"]} -{"Format": "IDEA0", "ID": "09022e9c-8265-4384-b56b-a98d7a84ae91", "DetectTime": "2023-10-30T14:09:34.734249+02:00", "EventTime": "2023-10-30T14:09:34.734265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CcMNA30Uyt21Sh5q4"]} -{"Format": "IDEA0", "ID": "af6a5407-e51e-40d3-8391-c7d1cf35b6ac", "DetectTime": "2023-10-30T14:09:34.765423+02:00", "EventTime": "2023-10-30T14:09:34.765452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C9JkS31bAn8wy8L4Al"]} -{"Format": "IDEA0", "ID": "37f2949f-03f2-41b4-a884-07079cbd8da3", "DetectTime": "2023-10-30T14:09:34.797298+02:00", "EventTime": "2023-10-30T14:09:34.797315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CmEJpv179emTlkuwWl"]} -{"Format": "IDEA0", "ID": "47f20168-15b0-4db8-8014-f6034b0e3913", "DetectTime": "2023-10-30T14:09:34.829059+02:00", "EventTime": "2023-10-30T14:09:34.829076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CB0rnE45bsn2YiBmDd"]} -{"Format": "IDEA0", "ID": "2122d9d4-a083-4100-bf94-4a5e83f0434f", "DetectTime": "2023-10-30T14:09:34.859193+02:00", "EventTime": "2023-10-30T14:09:34.859219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C0YPez4DpiyXt4Bkuj"]} -{"Format": "Json", "ID": "2122d9d4-a083-4100-bf94-4a5e83f0434f", "DetectTime": "2023-10-30T14:09:34.859193+02:00", "EventTime": "2023-10-30T14:09:34.859219+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:57:45.763020+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:34.926116)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8cd65f3c-5669-42bb-8e93-fe41dbf4dff8", "DetectTime": "2023-10-30T14:09:34.931432+02:00", "EventTime": "2023-10-30T14:09:34.931449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C888oD1oQ5k8AqH56k"]} -{"Format": "IDEA0", "ID": "1bc1a3cc-9680-40d0-a620-4fa1d8fa0de3", "DetectTime": "2023-10-30T14:09:34.961783+02:00", "EventTime": "2023-10-30T14:09:34.961795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCLrL64QkkSDt6w5vl"]} -{"Format": "IDEA0", "ID": "dd3222cf-7326-410f-8838-d1a1b2c9db6a", "DetectTime": "2023-10-30T14:09:34.994577+02:00", "EventTime": "2023-10-30T14:09:34.994594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CfAWD32FG8ZiftcF3k"]} -{"Format": "IDEA0", "ID": "beff5192-a21b-4456-b780-31414bf8cf0d", "DetectTime": "2023-10-30T14:09:35.020749+02:00", "EventTime": "2023-10-30T14:09:35.020766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CJ688zDkmvTe4bLMb"]} -{"Format": "IDEA0", "ID": "c6a5e00d-cbd6-4e2f-9aaf-6f4b4ded8f1f", "DetectTime": "2023-10-30T14:09:35.045911+02:00", "EventTime": "2023-10-30T14:09:35.045929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRtWKa1I4ObqezQ7Ia"]} -{"Format": "IDEA0", "ID": "afa948c1-3120-4c23-be24-a16521d30f36", "DetectTime": "2023-10-30T14:09:35.071449+02:00", "EventTime": "2023-10-30T14:09:35.071462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CLCDyNm2KTkLmcgLa"]} -{"Format": "IDEA0", "ID": "84ba9dfb-6b22-4ae8-b56c-9da383146a4a", "DetectTime": "2023-10-30T14:09:35.097063+02:00", "EventTime": "2023-10-30T14:09:35.097080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CWk9O13scvMm5g28fl"]} -{"Format": "IDEA0", "ID": "35acafe5-238a-42a0-8c23-f9f7535dedfd", "DetectTime": "2023-10-30T14:09:35.126528+02:00", "EventTime": "2023-10-30T14:09:35.126541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["ChIcJzA1FnAG1yVJ1"]} -{"Format": "Json", "ID": "35acafe5-238a-42a0-8c23-f9f7535dedfd", "DetectTime": "2023-10-30T14:09:35.126528+02:00", "EventTime": "2023-10-30T14:09:35.126541+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:57:47.595908+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:35.196478)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "67ddb996-473c-4334-ba72-23bf4d62c2d6", "DetectTime": "2023-10-30T14:09:35.201428+02:00", "EventTime": "2023-10-30T14:09:35.201440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ce1zGnDzipOtAGIab"]} -{"Format": "IDEA0", "ID": "69fa30cf-ebb5-464a-a765-458cee09f4be", "DetectTime": "2023-10-30T14:09:35.226990+02:00", "EventTime": "2023-10-30T14:09:35.227011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CEYpw4OtWvNPcGxi"]} -{"Format": "IDEA0", "ID": "aaf4f819-e821-4e02-88f9-89d5160239d2", "DetectTime": "2023-10-30T14:09:35.249992+02:00", "EventTime": "2023-10-30T14:09:35.250003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CSpuJt2L6Vl4kvwivh"]} -{"Format": "IDEA0", "ID": "73dd8765-ba35-44be-900b-6f299c1f2031", "DetectTime": "2023-10-30T14:09:35.273050+02:00", "EventTime": "2023-10-30T14:09:35.273068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CiyYmAP4UqsNQX1Hj"]} -{"Format": "IDEA0", "ID": "043ccd71-ff6a-4fc1-8721-b76f3babc234", "DetectTime": "2023-10-30T14:09:35.303300+02:00", "EventTime": "2023-10-30T14:09:35.303327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CvTTKNHTbF7PPLlhc"]} -{"Format": "IDEA0", "ID": "a4909c2f-97b4-4474-a9bd-b3f75d6d505f", "DetectTime": "2023-10-30T14:09:35.334006+02:00", "EventTime": "2023-10-30T14:09:35.334023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C2kOIwqCV2nxJDFW4"]} -{"Format": "IDEA0", "ID": "f3398b3d-3e25-4027-967b-aeef227d3cd6", "DetectTime": "2023-10-30T14:09:35.357961+02:00", "EventTime": "2023-10-30T14:09:35.357980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cvrxhw2QplFIlvXgXe"]} -{"Format": "IDEA0", "ID": "a73e6279-0e7c-4aa9-a3d7-873262ce0858", "DetectTime": "2023-10-30T14:09:35.385238+02:00", "EventTime": "2023-10-30T14:09:35.385265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CgSXJB41QEe3NtdNK3"]} -{"Format": "IDEA0", "ID": "6de3dda8-67db-4618-b7bb-aa85297f7e3b", "DetectTime": "2023-10-30T14:09:35.408129+02:00", "EventTime": "2023-10-30T14:09:35.408140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CKaf3I2CTynvpnVM17"]} -{"Format": "Json", "ID": "6de3dda8-67db-4618-b7bb-aa85297f7e3b", "DetectTime": "2023-10-30T14:09:35.408129+02:00", "EventTime": "2023-10-30T14:09:35.408140+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:57:49.571800+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:35.474934)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "40d1af1e-d64f-416d-b23a-0f16e506edd7", "DetectTime": "2023-10-30T14:09:35.480591+02:00", "EventTime": "2023-10-30T14:09:35.480608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["COaWaoTG7hSRmDIqh"]} -{"Format": "IDEA0", "ID": "2bbd3046-450c-4237-a18b-2599a4adf6b4", "DetectTime": "2023-10-30T14:09:35.507203+02:00", "EventTime": "2023-10-30T14:09:35.507230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CkshyuM7hzukUH4Dj"]} -{"Format": "IDEA0", "ID": "ec416f95-73fe-4803-bbe9-2b606367a62a", "DetectTime": "2023-10-30T14:09:35.529728+02:00", "EventTime": "2023-10-30T14:09:35.529744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["C2Uy8Hv6RWesxRVi7"]} -{"Format": "IDEA0", "ID": "c61fd732-7fe2-4ade-a033-f257d6712cde", "DetectTime": "2023-10-30T14:09:35.552042+02:00", "EventTime": "2023-10-30T14:09:35.552059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["CpHHXs3QJiNwCE63e7"]} -{"Format": "IDEA0", "ID": "0a26d41b-b008-40d1-9f22-649179878e6e", "DetectTime": "2023-10-30T14:09:35.574411+02:00", "EventTime": "2023-10-30T14:09:35.574422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CXz1To3juMw2Vdvkmi"]} -{"Format": "IDEA0", "ID": "4f133576-033c-4f59-b2ea-1d16e5362938", "DetectTime": "2023-10-30T14:09:35.594894+02:00", "EventTime": "2023-10-30T14:09:35.594914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CjkHoC41LVV6zQd7lh"]} -{"Format": "IDEA0", "ID": "98752306-f1ba-4fc2-9f28-ea79efdaacc7", "DetectTime": "2023-10-30T14:09:35.616790+02:00", "EventTime": "2023-10-30T14:09:35.616809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [16478], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. ", "ContentType": "text/plain"}], "uids": ["Csam4j4a5S75zdrG7i"]} -{"Format": "IDEA0", "ID": "897e4cc2-2bd2-4117-8ff2-c091706ce495", "DetectTime": "2023-10-30T14:09:35.642254+02:00", "EventTime": "2023-10-30T14:09:35.642271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["COAeatJHawoHm5lL4"]} -{"Format": "Json", "ID": "897e4cc2-2bd2-4117-8ff2-c091706ce495", "DetectTime": "2023-10-30T14:09:35.642254+02:00", "EventTime": "2023-10-30T14:09:35.642271+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T14:57:52.690215+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2023/10/30 14:09:35.712824)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "74395a04-a66e-4295-a3e9-70116da8b6bb", "DetectTime": "2023-10-30T14:09:35.718910+02:00", "EventTime": "2023-10-30T14:09:35.718934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4zdse28qegutayKHl"]} -{"Format": "IDEA0", "ID": "c72636da-0c2a-4a91-8ab5-0627e47cbdac", "DetectTime": "2023-10-30T14:09:35.763706+02:00", "EventTime": "2023-10-30T14:09:35.763736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C00ao12fUh2INM9Px5"]} -{"Format": "IDEA0", "ID": "cea5fbf7-dc34-4baf-bcae-d8e1d2dca7f2", "DetectTime": "2023-10-30T14:09:35.805858+02:00", "EventTime": "2023-10-30T14:09:35.805884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CW02J93j4VwoyPmfS7"]} -{"Format": "IDEA0", "ID": "543e133d-4023-4efc-9e30-c6d212bcf9cf", "DetectTime": "2023-10-30T14:09:35.846670+02:00", "EventTime": "2023-10-30T14:09:35.846697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Cxb1Tu46qmGwwmC4k7"]} -{"Format": "IDEA0", "ID": "81443db3-2725-4ca2-8cbf-a0d198289687", "DetectTime": "2023-10-30T14:09:35.887014+02:00", "EventTime": "2023-10-30T14:09:35.887034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CX7H7S288YpOcqgXQa"]} -{"Format": "IDEA0", "ID": "3f6fed1e-832d-49ae-9f1b-0d1f83e091f5", "DetectTime": "2023-10-30T14:09:35.921402+02:00", "EventTime": "2023-10-30T14:09:35.921414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CKovyH1lBz5Sl4r6Fi"]} -{"Format": "IDEA0", "ID": "d69dd494-8716-476e-9e5f-bf030f46bce6", "DetectTime": "2023-10-30T14:09:35.961922+02:00", "EventTime": "2023-10-30T14:09:35.961938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Caj77OHnmtjrpR264"]} -{"Format": "Json", "ID": "d69dd494-8716-476e-9e5f-bf030f46bce6", "DetectTime": "2023-10-30T14:09:35.961922+02:00", "EventTime": "2023-10-30T14:09:35.961938+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:28:14.686417+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:36.049319)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ffdf5a4-8503-4053-b476-3dc6f1101291", "DetectTime": "2023-10-30T14:09:36.054014+02:00", "EventTime": "2023-10-30T14:09:36.054025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CDHoaf4C7PyZwvQsQ5"]} -{"Format": "IDEA0", "ID": "44a0e212-468b-4e6d-9f53-13a106bc43eb", "DetectTime": "2023-10-30T14:09:36.091582+02:00", "EventTime": "2023-10-30T14:09:36.091600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C4j0iC16O0XbXpeqw2"]} -{"Format": "IDEA0", "ID": "c308058f-c08d-4d5e-a730-47f180a094c7", "DetectTime": "2023-10-30T14:09:36.128197+02:00", "EventTime": "2023-10-30T14:09:36.128224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CRCYTN1edLXOAymgY6"]} -{"Format": "IDEA0", "ID": "087b34e5-1e66-44bf-903d-ed5928c47603", "DetectTime": "2023-10-30T14:09:36.161053+02:00", "EventTime": "2023-10-30T14:09:36.161068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C5zm4SeiGxXpaGCYf"]} -{"Format": "IDEA0", "ID": "717cabc0-1053-455e-a355-93008b5da06b", "DetectTime": "2023-10-30T14:09:36.195411+02:00", "EventTime": "2023-10-30T14:09:36.195427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSYJcf1ldJdPm3UER9"]} -{"Format": "IDEA0", "ID": "27af0242-99bf-44f4-8345-c0821e3b6583", "DetectTime": "2023-10-30T14:09:36.228893+02:00", "EventTime": "2023-10-30T14:09:36.228904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFlB1L2F9lg6FkqzCd"]} -{"Format": "IDEA0", "ID": "86f5446d-05cb-44b0-9d30-989c16213df5", "DetectTime": "2023-10-30T14:09:36.257391+02:00", "EventTime": "2023-10-30T14:09:36.257410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CY6gAr15OslOwNYstb"]} -{"Format": "IDEA0", "ID": "708249bf-7462-4014-9c3e-1c9992b15f5c", "DetectTime": "2023-10-30T14:09:36.290755+02:00", "EventTime": "2023-10-30T14:09:36.290799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CvFC2H3ygT1hbsjZMk"]} -{"Format": "Json", "ID": "708249bf-7462-4014-9c3e-1c9992b15f5c", "DetectTime": "2023-10-30T14:09:36.290755+02:00", "EventTime": "2023-10-30T14:09:36.290799+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:28:16.567203+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:36.361313)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ce94158b-83f4-4f7d-a8bd-41dab17b7d45", "DetectTime": "2023-10-30T14:09:36.366739+02:00", "EventTime": "2023-10-30T14:09:36.366755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["COJjDb1T2qdvsovHOg"]} -{"Format": "IDEA0", "ID": "b5d229e7-5d5d-4db5-849e-d023e33d7f5e", "DetectTime": "2023-10-30T14:09:36.400416+02:00", "EventTime": "2023-10-30T14:09:36.400427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cpyuig1yiqzhoUu4W1"]} -{"Format": "IDEA0", "ID": "e62a8620-95d6-4dd9-af59-51b84a47c064", "DetectTime": "2023-10-30T14:09:36.428837+02:00", "EventTime": "2023-10-30T14:09:36.428856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CsPGE63cuTV2P11kAe"]} -{"Format": "IDEA0", "ID": "62f3963f-0267-4350-b1a4-5ea121653d98", "DetectTime": "2023-10-30T14:09:36.460334+02:00", "EventTime": "2023-10-30T14:09:36.460350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cxv3qT1xNsrzz4msW2"]} -{"Format": "IDEA0", "ID": "d046788e-caf5-46cd-9789-e0501ca8f4fa", "DetectTime": "2023-10-30T14:09:36.486547+02:00", "EventTime": "2023-10-30T14:09:36.486577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CaN3Xa42YDfxatkdF5"]} -{"Format": "IDEA0", "ID": "2b89f8ca-70a1-4c71-a915-cad1c4012741", "DetectTime": "2023-10-30T14:09:36.519051+02:00", "EventTime": "2023-10-30T14:09:36.519067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CQ1EU93Bj8YixxTfW"]} -{"Format": "IDEA0", "ID": "0cbe2191-f668-498b-b5cb-790c829ded49", "DetectTime": "2023-10-30T14:09:36.549593+02:00", "EventTime": "2023-10-30T14:09:36.549611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CDENtWZQHGQnEw9w2"]} -{"Format": "IDEA0", "ID": "30b5585e-0624-47fb-94f1-a38a25c309c1", "DetectTime": "2023-10-30T14:09:36.580488+02:00", "EventTime": "2023-10-30T14:09:36.580506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CfgOo23VtUaSVhcKn7"]} -{"Format": "Json", "ID": "30b5585e-0624-47fb-94f1-a38a25c309c1", "DetectTime": "2023-10-30T14:09:36.580488+02:00", "EventTime": "2023-10-30T14:09:36.580506+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:28:21.522405+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:36.646588)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "92db85cc-f6fa-4610-951a-3e6b0a3a6d4d", "DetectTime": "2023-10-30T14:09:36.651455+02:00", "EventTime": "2023-10-30T14:09:36.651470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CQe5pEepzQtUI1Rzc"]} -{"Format": "IDEA0", "ID": "4660dd3f-045c-4a1e-b61d-3d8ce536a801", "DetectTime": "2023-10-30T14:09:36.679549+02:00", "EventTime": "2023-10-30T14:09:36.679565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["C1qrF4ffDmr1yM8Ba"]} -{"Format": "IDEA0", "ID": "dc73067a-8602-4646-abe7-fbf1f384a217", "DetectTime": "2023-10-30T14:09:36.705236+02:00", "EventTime": "2023-10-30T14:09:36.705253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CqlWFv3HTooZEZjKKb"]} -{"Format": "IDEA0", "ID": "266a2939-3783-4466-a56f-0d2f711c9250", "DetectTime": "2023-10-30T14:09:36.733251+02:00", "EventTime": "2023-10-30T14:09:36.733263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CtuLZibamVhf62Zka"]} -{"Format": "IDEA0", "ID": "0c5d4230-bec2-418b-ba5c-bea4d3f6c17b", "DetectTime": "2023-10-30T14:09:36.763639+02:00", "EventTime": "2023-10-30T14:09:36.763659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cwm9vx3d8k0woZB7cc"]} -{"Format": "IDEA0", "ID": "9e5cde0e-0732-4dbb-82d6-13881a8148ab", "DetectTime": "2023-10-30T14:09:36.791320+02:00", "EventTime": "2023-10-30T14:09:36.791331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1625], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. ", "ContentType": "text/plain"}], "uids": ["CBJoB41821pT6g8bzc"]} -{"Format": "IDEA0", "ID": "3d5dbe19-add3-4cd4-970f-ebc9695d2831", "DetectTime": "2023-10-30T14:09:36.818543+02:00", "EventTime": "2023-10-30T14:09:36.818560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5473], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. ", "ContentType": "text/plain"}], "uids": ["Co4jZ3VyO6HIoOp79"]} -{"Format": "IDEA0", "ID": "253ba55f-bf52-4fbe-a3fe-68ad98b129e9", "DetectTime": "2023-10-30T14:09:36.844829+02:00", "EventTime": "2023-10-30T14:09:36.844846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C8yksh1JRSC2MUPKl3"]} -{"Format": "Json", "ID": "253ba55f-bf52-4fbe-a3fe-68ad98b129e9", "DetectTime": "2023-10-30T14:09:36.844829+02:00", "EventTime": "2023-10-30T14:09:36.844846+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:28:24.313283+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:36.910459)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a29ac767-cc1c-445a-b1fc-de59f101678e", "DetectTime": "2023-10-30T14:09:36.914653+02:00", "EventTime": "2023-10-30T14:09:36.914666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [18973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. ", "ContentType": "text/plain"}], "uids": ["Cgm1Zq1eHmwdbXZpWc"]} -{"Format": "IDEA0", "ID": "0c559644-3857-4807-8495-e8dbfd027c69", "DetectTime": "2023-10-30T14:09:36.942069+02:00", "EventTime": "2023-10-30T14:09:36.942088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CklVF94pOIVxYPtdZ3"]} -{"Format": "IDEA0", "ID": "005da7b2-71f4-495b-8220-6ac05bb061a5", "DetectTime": "2023-10-30T14:09:36.966176+02:00", "EventTime": "2023-10-30T14:09:36.966187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CoBs9F3jqB1rvhharb"]} -{"Format": "IDEA0", "ID": "cf15a8c4-b97d-4a08-8745-175852dc5c43", "DetectTime": "2023-10-30T14:09:36.992310+02:00", "EventTime": "2023-10-30T14:09:36.992328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C7CucW26Ot3p9czjm2"]} -{"Format": "IDEA0", "ID": "6af378b5-6e76-475d-9344-14e698860e0b", "DetectTime": "2023-10-30T14:09:37.021634+02:00", "EventTime": "2023-10-30T14:09:37.021653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGiYU53wxc8maChbJ8"]} -{"Format": "IDEA0", "ID": "3ff5c9fa-4f97-432f-9782-d333ecfd979c", "DetectTime": "2023-10-30T14:09:37.048234+02:00", "EventTime": "2023-10-30T14:09:37.048245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CHN8ED2yZlkZzse8Ic"]} -{"Format": "IDEA0", "ID": "3bde4a2b-1fad-428b-bf8d-ed06d6533d78", "DetectTime": "2023-10-30T14:09:37.087207+02:00", "EventTime": "2023-10-30T14:09:37.087235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cp6TxtCnFRXxZQPv7"]} -{"Format": "IDEA0", "ID": "66e500ab-d490-467e-ad77-49cbb22f072d", "DetectTime": "2023-10-30T14:09:37.119736+02:00", "EventTime": "2023-10-30T14:09:37.119752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQZNcg2VHThBBNujaf"]} -{"Format": "Json", "ID": "66e500ab-d490-467e-ad77-49cbb22f072d", "DetectTime": "2023-10-30T14:09:37.119736+02:00", "EventTime": "2023-10-30T14:09:37.119752+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:59:35.798297+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:37.194635)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ccdf11d5-f6ab-4c25-ac5d-cdec21467527", "DetectTime": "2023-10-30T14:09:37.200129+02:00", "EventTime": "2023-10-30T14:09:37.200145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CP8Ga7fLwKMJPkgJg"]} -{"Format": "IDEA0", "ID": "29cd3e4b-9b0a-46d6-b93b-cb89e37e062b", "DetectTime": "2023-10-30T14:09:37.228294+02:00", "EventTime": "2023-10-30T14:09:37.228312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CHQMb52JL7aY3Qeqdj"]} -{"Format": "IDEA0", "ID": "72a4b1c1-c6ac-447b-8566-ba342141af8f", "DetectTime": "2023-10-30T14:09:37.333554+02:00", "EventTime": "2023-10-30T14:09:37.333571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CfJt0v1y31X3upK7s7"]} -{"Format": "IDEA0", "ID": "9dad1c8a-716b-4359-ba1d-b2ed832b7226", "DetectTime": "2023-10-30T14:09:37.365073+02:00", "EventTime": "2023-10-30T14:09:37.365091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CKjn5l3AMzXFLbokfh"]} -{"Format": "IDEA0", "ID": "99d8d132-cdba-490d-8398-57673efae214", "DetectTime": "2023-10-30T14:09:37.394487+02:00", "EventTime": "2023-10-30T14:09:37.394503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C49zF12GpKyFQ0HnH3"]} -{"Format": "IDEA0", "ID": "33362cac-105b-4ab7-a115-cf4fb391672e", "DetectTime": "2023-10-30T14:09:37.422948+02:00", "EventTime": "2023-10-30T14:09:37.422970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CTSfNx20HFRBmgNVL5"]} -{"Format": "IDEA0", "ID": "d4b58f3a-de3f-4534-b1eb-3fd90056d048", "DetectTime": "2023-10-30T14:09:37.453419+02:00", "EventTime": "2023-10-30T14:09:37.453435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C1eUf92zWyGnAVJ7ij"]} -{"Format": "IDEA0", "ID": "56081839-88c3-4269-b8c9-4ebb177c09bb", "DetectTime": "2023-10-30T14:09:37.483752+02:00", "EventTime": "2023-10-30T14:09:37.483765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CSrSrF4d8RddmrmhGf"]} -{"Format": "Json", "ID": "56081839-88c3-4269-b8c9-4ebb177c09bb", "DetectTime": "2023-10-30T14:09:37.483752+02:00", "EventTime": "2023-10-30T14:09:37.483765+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:59:38.069775+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:37.565283)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1149afef-616d-44be-b138-1928f43aa89f", "DetectTime": "2023-10-30T14:09:37.570631+02:00", "EventTime": "2023-10-30T14:09:37.570648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CsANl72r5Kyy49w9j1"]} -{"Format": "IDEA0", "ID": "257ed733-2c8b-40c4-8674-6c5781e6cdd4", "DetectTime": "2023-10-30T14:09:37.601097+02:00", "EventTime": "2023-10-30T14:09:37.601114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CV1zpr4SC8OMAj7GD5"]} -{"Format": "IDEA0", "ID": "d67a7bd4-21e6-4d18-8098-a307757e720a", "DetectTime": "2023-10-30T14:09:37.627904+02:00", "EventTime": "2023-10-30T14:09:37.627918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["ClKaC536pE7s0qQaX4"]} -{"Format": "IDEA0", "ID": "d33ba19e-0bcc-408e-8719-ef2b13526ad8", "DetectTime": "2023-10-30T14:09:37.654882+02:00", "EventTime": "2023-10-30T14:09:37.654897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CUhRXC237DJ2u6yDQg"]} -{"Format": "IDEA0", "ID": "096ef88a-492f-48c4-b1e8-d589468823fc", "DetectTime": "2023-10-30T14:09:37.683934+02:00", "EventTime": "2023-10-30T14:09:37.683960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CDZsAj1YwPwGeyVme7"]} -{"Format": "IDEA0", "ID": "ded65a58-dba3-4695-ba31-638c30d211d6", "DetectTime": "2023-10-30T14:09:37.708819+02:00", "EventTime": "2023-10-30T14:09:37.708838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cqj43b2wVzpgaOdz"]} -{"Format": "IDEA0", "ID": "08d76581-2bb4-499d-8800-1491f9fb3766", "DetectTime": "2023-10-30T14:09:37.735634+02:00", "EventTime": "2023-10-30T14:09:37.735652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYtAwt4kWGJCQbwGMh"]} -{"Format": "IDEA0", "ID": "a96ab597-053a-4a33-8aef-e8d8ccc812b4", "DetectTime": "2023-10-30T14:09:37.763082+02:00", "EventTime": "2023-10-30T14:09:37.763102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CqmTth4CPPN3idLPE3"]} -{"Format": "Json", "ID": "a96ab597-053a-4a33-8aef-e8d8ccc812b4", "DetectTime": "2023-10-30T14:09:37.763082+02:00", "EventTime": "2023-10-30T14:09:37.763102+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T15:59:56.573117+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2023/10/30 14:09:37.837018)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "09a938c7-d29f-4b90-9ca5-5615ad5c46f3", "DetectTime": "2023-10-30T14:09:37.843883+02:00", "EventTime": "2023-10-30T14:09:37.843903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CVtWZh2r7Q4hQ9uuSj"]} -{"Format": "IDEA0", "ID": "33fb51b4-b1ee-40c0-af85-c3f8771aed98", "DetectTime": "2023-10-30T14:09:37.870645+02:00", "EventTime": "2023-10-30T14:09:37.870664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CPPEq11T7BQVS0Hfng"]} -{"Format": "IDEA0", "ID": "e8fd9682-90ff-4d16-b7c8-2099b6b3307a", "DetectTime": "2023-10-30T14:09:37.898495+02:00", "EventTime": "2023-10-30T14:09:37.898512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cpx7hE3vmAMdb5Mbji"]} -{"Format": "IDEA0", "ID": "398d4a98-bc41-40d6-b7d4-977a6c97f096", "DetectTime": "2023-10-30T14:09:37.923311+02:00", "EventTime": "2023-10-30T14:09:37.923325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CHbLK83Gx2n1EBepyb"]} -{"Format": "IDEA0", "ID": "eebbd744-8cbd-4238-a1e1-b3626b9b464b", "DetectTime": "2023-10-30T14:09:37.945739+02:00", "EventTime": "2023-10-30T14:09:37.945758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ceee4K2dwL5jJtya4"]} -{"Format": "IDEA0", "ID": "f740a81f-77d6-4ec9-aaf9-2c8ece6f839a", "DetectTime": "2023-10-30T14:09:37.969167+02:00", "EventTime": "2023-10-30T14:09:37.969179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CbiAOWNCsMeyT91A5"]} -{"Format": "IDEA0", "ID": "fdcb0fd9-a1df-4f7a-8299-589f4c06d2af", "DetectTime": "2023-10-30T14:09:37.992452+02:00", "EventTime": "2023-10-30T14:09:37.992469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CEVHI52p0kbAiPnVAb"]} -{"Format": "IDEA0", "ID": "669008ce-c630-4997-9c93-4e4615d80362", "DetectTime": "2023-10-30T14:09:38.029882+02:00", "EventTime": "2023-10-30T14:09:38.029901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CNHdep2tMASujoSrK6"]} -{"Format": "IDEA0", "ID": "86f04eb0-96d9-4e55-a1e0-920b7168c747", "DetectTime": "2023-10-30T14:09:38.064814+02:00", "EventTime": "2023-10-30T14:09:38.064840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CJg0E7Z2xGRlmQg1"]} -{"Format": "IDEA0", "ID": "e3af611f-02f0-489f-99c0-9b2edd9032d1", "DetectTime": "2023-10-30T14:09:38.099768+02:00", "EventTime": "2023-10-30T14:09:38.099785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CznxpT16hGV1vJ1lJ3"]} -{"Format": "IDEA0", "ID": "2d883dfe-4ac8-4c5a-80d4-c84a0d6e28af", "DetectTime": "2023-10-30T14:09:38.135243+02:00", "EventTime": "2023-10-30T14:09:38.135260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C6KA0Z12jXch7oxSH1"]} -{"Format": "IDEA0", "ID": "3373e55c-a16d-4722-b0ed-cf1d342115c2", "DetectTime": "2023-10-30T14:09:38.168988+02:00", "EventTime": "2023-10-30T14:09:38.169003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CG0drp3QPKeloTzAVd"]} -{"Format": "IDEA0", "ID": "f09cc238-8aca-4217-881c-004654ee515d", "DetectTime": "2023-10-30T14:09:38.201376+02:00", "EventTime": "2023-10-30T14:09:38.201392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CYkizKKZdFAUSQCXc"]} -{"Format": "IDEA0", "ID": "7802cebd-22d3-4171-ba77-b5fc5cd68f01", "DetectTime": "2023-10-30T14:09:38.232815+02:00", "EventTime": "2023-10-30T14:09:38.232832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["C5Z4Ki45ynIpUUnfDe"]} -{"Format": "IDEA0", "ID": "a7e9d18a-0723-45b9-8b22-5d2ef14282b0", "DetectTime": "2023-10-30T14:09:38.265718+02:00", "EventTime": "2023-10-30T14:09:38.265735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CeZZHS1p2e84AIQuz8"]} -{"Format": "IDEA0", "ID": "927d67e6-e82e-4bd6-9d35-717a1d5902c5", "DetectTime": "2023-10-30T14:09:38.298695+02:00", "EventTime": "2023-10-30T14:09:38.298713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CdWL2l28IKtWn4DbWe"]} -{"Format": "IDEA0", "ID": "5e048e57-60bd-4d0c-aea8-a4046b90fe43", "DetectTime": "2023-10-30T14:09:38.330432+02:00", "EventTime": "2023-10-30T14:09:38.330448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["Cni0OA2UYZh7AhLUC3"]} -{"Format": "IDEA0", "ID": "5830280b-de90-41c7-b1b2-018a55daffcd", "DetectTime": "2023-10-30T14:09:38.365262+02:00", "EventTime": "2023-10-30T14:09:38.365282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CXC9Ub1mesFrcGWuPf"]} -{"Format": "IDEA0", "ID": "efb09bd7-4cbc-4540-8669-561c254696fa", "DetectTime": "2023-10-30T14:09:38.397435+02:00", "EventTime": "2023-10-30T14:09:38.397462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKb9iN2TgPST6R0IBb"]} -{"Format": "IDEA0", "ID": "e6349a67-4c70-4c35-abb8-3bf9cfe87b80", "DetectTime": "2023-10-30T14:09:38.435127+02:00", "EventTime": "2023-10-30T14:09:38.435144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CF66Wb2W08z37GizD3"]} -{"Format": "IDEA0", "ID": "99938c7f-4f6c-483c-b51b-bd82d24ccabe", "DetectTime": "2023-10-30T14:09:38.466867+02:00", "EventTime": "2023-10-30T14:09:38.466895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["C0WfNa2QyH8y7C05Bf"]} -{"Format": "IDEA0", "ID": "e6d5e0d6-0bc5-405c-81ab-cc9b1362b374", "DetectTime": "2023-10-30T14:09:38.501815+02:00", "EventTime": "2023-10-30T14:09:38.501832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["CmsXGA2aOxKV63e3A8"]} -{"Format": "IDEA0", "ID": "8f547bf3-01c2-4aeb-b637-afeb078a336e", "DetectTime": "2023-10-30T14:09:38.533786+02:00", "EventTime": "2023-10-30T14:09:38.533802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["Coq7g33wOY8MI1fOh1"]} -{"Format": "IDEA0", "ID": "c6bf6c8f-231b-488b-962b-5fce622a9829", "DetectTime": "2023-10-30T14:09:38.568519+02:00", "EventTime": "2023-10-30T14:09:38.568548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CtvZWB1ylwAL1zx4u4"]} -{"Format": "IDEA0", "ID": "2c0c47e2-1343-4e70-a29b-73df15ad7e25", "DetectTime": "2023-10-30T14:09:38.600546+02:00", "EventTime": "2023-10-30T14:09:38.600575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CR1yoa1rpZ8oxb8jp6"]} -{"Format": "IDEA0", "ID": "7dc7e39b-6a23-4fa0-b86d-2127bb2cec52", "DetectTime": "2023-10-30T14:09:38.632165+02:00", "EventTime": "2023-10-30T14:09:38.632183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["C0g3ftkgNhx9pn7Gj"]} -{"Format": "IDEA0", "ID": "31dcca0d-5fce-4748-a5bc-8de1a6e1375c", "DetectTime": "2023-10-30T14:09:38.663825+02:00", "EventTime": "2023-10-30T14:09:38.663844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["CM48F83f7zPKD1C745"]} -{"Format": "IDEA0", "ID": "ee32ccf5-1047-485d-97cc-90efe7021a7f", "DetectTime": "2023-10-30T14:09:38.696278+02:00", "EventTime": "2023-10-30T14:09:38.696294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CsbjDw3JsOzFxu6uBh"]} -{"Format": "IDEA0", "ID": "e50ef009-638b-4064-83e2-8b68cc443185", "DetectTime": "2023-10-30T14:09:38.729350+02:00", "EventTime": "2023-10-30T14:09:38.729363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 122.214.58.197 ", "ContentType": "text/plain"}], "uids": ["CknOGvOCRt07QZpAb"]} -{"Format": "IDEA0", "ID": "f63e8b05-9f84-4682-b010-97d94f75e90c", "DetectTime": "2023-10-30T14:09:38.757735+02:00", "EventTime": "2023-10-30T14:09:38.757755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CAZo2k2t1Td3JOkv41"]} -{"Format": "IDEA0", "ID": "52add4bc-9165-48f2-aefc-2a30aac55fd2", "DetectTime": "2023-10-30T14:09:38.795311+02:00", "EventTime": "2023-10-30T14:09:38.795330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 105.228.46.98 ", "ContentType": "text/plain"}], "uids": ["CFyBYy2zOnBR6kh2ef"]} -{"Format": "IDEA0", "ID": "0e0d1356-c69d-4af7-ade6-b7eef12ae5bd", "DetectTime": "2023-10-30T14:09:38.828716+02:00", "EventTime": "2023-10-30T14:09:38.828731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CzadvD3qtrwlKU6885"]} -{"Format": "IDEA0", "ID": "b7c3d558-958a-4b54-a92b-87179b789592", "DetectTime": "2023-10-30T14:09:38.862085+02:00", "EventTime": "2023-10-30T14:09:38.862102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9HQSNA6zKvRDvgh"]} -{"Format": "IDEA0", "ID": "b385735a-508b-4447-ad93-8183afb69a04", "DetectTime": "2023-10-30T14:09:38.896747+02:00", "EventTime": "2023-10-30T14:09:38.896764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CpF10R1MIz1BA1h7R2"]} -{"Format": "IDEA0", "ID": "b0c09c86-659f-4aac-8a66-9b4c501074ac", "DetectTime": "2023-10-30T14:09:38.931020+02:00", "EventTime": "2023-10-30T14:09:38.931046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CHiaVs34JziIgtwWgb"]} -{"Format": "IDEA0", "ID": "f83ecd4e-66b5-4bf1-9ff5-8d9e516cf16e", "DetectTime": "2023-10-30T14:09:38.959343+02:00", "EventTime": "2023-10-30T14:09:38.959355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["COB3WD1ABOu75c7JX5"]} -{"Format": "IDEA0", "ID": "fe0c55fc-ef40-472c-a482-69444092d58d", "DetectTime": "2023-10-30T14:09:38.993705+02:00", "EventTime": "2023-10-30T14:09:38.993718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C2T8TH31VlaHQ81IOg"]} -{"Format": "IDEA0", "ID": "dce62121-b2f7-4fd6-8f0a-d3c80a05914f", "DetectTime": "2023-10-30T14:09:39.023412+02:00", "EventTime": "2023-10-30T14:09:39.023431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CXKfzG4x14wYxSe5ng"]} -{"Format": "IDEA0", "ID": "7986d895-01fa-47cf-a4a6-adbfbff63d3c", "DetectTime": "2023-10-30T14:09:39.052291+02:00", "EventTime": "2023-10-30T14:09:39.052308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CwanNL2u3rW1b6Ncj6"]} -{"Format": "Json", "ID": "7986d895-01fa-47cf-a4a6-adbfbff63d3c", "DetectTime": "2023-10-30T14:09:39.052291+02:00", "EventTime": "2023-10-30T14:09:39.052308+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T16:31:23.486610+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 135. (real time 2023/10/30 14:09:39.172295)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "993e4073-69a2-42fd-a0d2-a884134c2b9f", "DetectTime": "2023-10-30T14:09:39.178517+02:00", "EventTime": "2023-10-30T14:09:39.178545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C3jMvC4p1osPDsuMz9"]} -{"Format": "IDEA0", "ID": "e68a6d55-b35e-41e6-a1a7-c762a5d78f6a", "DetectTime": "2023-10-30T14:09:39.216303+02:00", "EventTime": "2023-10-30T14:09:39.216323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CAfBGn3v9077GD9o71"]} -{"Format": "IDEA0", "ID": "24a09654-39a7-478f-803b-c0988364e2e8", "DetectTime": "2023-10-30T14:09:39.250853+02:00", "EventTime": "2023-10-30T14:09:39.250874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CpKXM9I7w0JfH360f"]} -{"Format": "IDEA0", "ID": "a6d2192e-3478-4c81-a17e-41b489fd7d91", "DetectTime": "2023-10-30T14:09:39.282619+02:00", "EventTime": "2023-10-30T14:09:39.282646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CaheDP2orHhdDLzlR6"]} -{"Format": "IDEA0", "ID": "c08162f9-2b90-43aa-9636-f934b7bdb7e0", "DetectTime": "2023-10-30T14:09:39.317297+02:00", "EventTime": "2023-10-30T14:09:39.317327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CaDBou4KIRzTzONteh"]} -{"Format": "IDEA0", "ID": "3abaac8d-0c0a-4b5d-9c5a-177a92a5b3c2", "DetectTime": "2023-10-30T14:09:39.348523+02:00", "EventTime": "2023-10-30T14:09:39.348540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLyGML30IyBm8oHgnj"]} -{"Format": "IDEA0", "ID": "914402fa-9c8f-4866-980d-053ccc57c53f", "DetectTime": "2023-10-30T14:09:39.378008+02:00", "EventTime": "2023-10-30T14:09:39.378025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CsnINY3twp2KpQvd6i"]} -{"Format": "IDEA0", "ID": "e8530e12-af4f-4a95-a3d8-758c0180aff9", "DetectTime": "2023-10-30T14:09:39.406689+02:00", "EventTime": "2023-10-30T14:09:39.406701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Ca692T3AQWBe3uJ0e1"]} -{"Format": "IDEA0", "ID": "a0de3c20-16d9-41cf-b666-ce2b6d55c05f", "DetectTime": "2023-10-30T14:09:39.433415+02:00", "EventTime": "2023-10-30T14:09:39.433434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CNESSw17ATfs7YKJE1"]} -{"Format": "IDEA0", "ID": "cc320c68-791e-4360-b089-cb0afd7a13dd", "DetectTime": "2023-10-30T14:09:39.462346+02:00", "EventTime": "2023-10-30T14:09:39.462362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C14Pel3oPBG2NmDldj"]} -{"Format": "IDEA0", "ID": "12d145f2-641e-48b4-a0f4-574a9880025c", "DetectTime": "2023-10-30T14:09:39.490738+02:00", "EventTime": "2023-10-30T14:09:39.490765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C3VltX2Cu5qbOsiyNc"]} -{"Format": "IDEA0", "ID": "935d36c9-dccd-4a7c-844e-86a4ece809a2", "DetectTime": "2023-10-30T14:09:39.517973+02:00", "EventTime": "2023-10-30T14:09:39.517990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["ChwaJz1HTexSuO4wM6"]} -{"Format": "IDEA0", "ID": "7b8b0ed7-6ed2-4373-a8e1-c6d4d6c018ef", "DetectTime": "2023-10-30T14:09:39.545535+02:00", "EventTime": "2023-10-30T14:09:39.545551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["ClV80B2UCAnYudW9B9"]} -{"Format": "IDEA0", "ID": "9d115497-9a20-4b4b-b0dc-a45df037a399", "DetectTime": "2023-10-30T14:09:39.568844+02:00", "EventTime": "2023-10-30T14:09:39.568868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CJPUNuqAtLZfXIUDg"]} -{"Format": "IDEA0", "ID": "fa6822ea-62fc-4d34-b9e2-d16c6c5d655a", "DetectTime": "2023-10-30T14:09:39.591100+02:00", "EventTime": "2023-10-30T14:09:39.591117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CwaIzY1JABVHBnLoYe"]} -{"Format": "IDEA0", "ID": "09d44267-5114-422e-8e6d-1a6718ec9b79", "DetectTime": "2023-10-30T14:09:39.617567+02:00", "EventTime": "2023-10-30T14:09:39.617577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CKTAzw1Ed2VnRrcuoe"]} -{"Format": "IDEA0", "ID": "6599dd2c-9733-4b7d-b92d-4ba9c3083070", "DetectTime": "2023-10-30T14:09:39.644101+02:00", "EventTime": "2023-10-30T14:09:39.644113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["CJZmjf4ITeEB1Cj7S1"]} -{"Format": "IDEA0", "ID": "d900a966-fa06-4f75-9ed5-43009831e9ab", "DetectTime": "2023-10-30T14:09:39.671464+02:00", "EventTime": "2023-10-30T14:09:39.671480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C7RIWjRUHYni41157"]} -{"Format": "IDEA0", "ID": "5e9bdb61-c002-432f-bdce-95b9b2689b50", "DetectTime": "2023-10-30T14:09:39.698539+02:00", "EventTime": "2023-10-30T14:09:39.698551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["CKYgaq4R2gLvEe7C7b"]} -{"Format": "IDEA0", "ID": "49d9aeab-5098-4b0a-a35a-04b64d56ec51", "DetectTime": "2023-10-30T14:09:39.725863+02:00", "EventTime": "2023-10-30T14:09:39.725890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["C5h0o94mx5ob1kmZlc"]} -{"Format": "IDEA0", "ID": "d4f91ef6-d732-499c-9833-7f820413d868", "DetectTime": "2023-10-30T14:09:39.750445+02:00", "EventTime": "2023-10-30T14:09:39.750457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CR16kj13m6EYqTp8sj"]} -{"Format": "IDEA0", "ID": "58417788-b93e-488b-b60e-27a3cd6992d5", "DetectTime": "2023-10-30T14:09:39.777018+02:00", "EventTime": "2023-10-30T14:09:39.777033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["COu4DmbnE9AfNG1tb"]} -{"Format": "IDEA0", "ID": "70bd959b-b633-4b3c-88bb-f1060b3c18f4", "DetectTime": "2023-10-30T14:09:39.802720+02:00", "EventTime": "2023-10-30T14:09:39.802732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CKBGpW1EZ55KTM1J29"]} -{"Format": "IDEA0", "ID": "211655a9-69fc-4319-bc8b-fc7adf738aba", "DetectTime": "2023-10-30T14:09:39.895141+02:00", "EventTime": "2023-10-30T14:09:39.895159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CUF1cF1xEemp2oHQBl"]} -{"Format": "IDEA0", "ID": "66b09e0f-20ce-4a5d-9b1a-0506c05152a4", "DetectTime": "2023-10-30T14:09:39.924154+02:00", "EventTime": "2023-10-30T14:09:39.924185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CS14PVyUpfIGweRy2"]} -{"Format": "IDEA0", "ID": "0cc3123a-2ea5-4b00-a266-ae48ba0fd566", "DetectTime": "2023-10-30T14:09:39.950240+02:00", "EventTime": "2023-10-30T14:09:39.950257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["C4wkaK3yPUIiNPlZI9"]} -{"Format": "IDEA0", "ID": "452ccfe6-c6b6-4440-9a9f-6c6a3aa44612", "DetectTime": "2023-10-30T14:09:39.978835+02:00", "EventTime": "2023-10-30T14:09:39.978852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CYMsIV1EIktELODIp6"]} -{"Format": "IDEA0", "ID": "f7a612f0-81b4-4690-95a0-6941e08ee456", "DetectTime": "2023-10-30T14:09:40.002913+02:00", "EventTime": "2023-10-30T14:09:40.002925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CJfgTZ3d9TGBwA76y8"]} -{"Format": "IDEA0", "ID": "92108b0b-903e-455b-84cf-03c4bab290b0", "DetectTime": "2023-10-30T14:09:40.027071+02:00", "EventTime": "2023-10-30T14:09:40.027082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CWhhRz2Dwsdd2ukDH3"]} -{"Format": "IDEA0", "ID": "a4f09734-5ee5-4ec1-8274-a857af6d6985", "DetectTime": "2023-10-30T14:09:40.048133+02:00", "EventTime": "2023-10-30T14:09:40.048147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CA1BKqmXqvXqjRyCg"]} -{"Format": "IDEA0", "ID": "95a048dd-4bcd-40b9-9314-65674848b3fa", "DetectTime": "2023-10-30T14:09:40.074897+02:00", "EventTime": "2023-10-30T14:09:40.074915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CZXPCC17Jy27Y5vP67"]} -{"Format": "IDEA0", "ID": "53e7015f-d18b-4c1d-b6db-7bc02e3d98a6", "DetectTime": "2023-10-30T14:09:40.099319+02:00", "EventTime": "2023-10-30T14:09:40.099331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["C4a7pH2K3o5hAqxMv2"]} -{"Format": "IDEA0", "ID": "99c427c7-14d8-42f5-a0cf-7a30c20c20a2", "DetectTime": "2023-10-30T14:09:40.124417+02:00", "EventTime": "2023-10-30T14:09:40.124443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["CHxPcE4goJqQvJAjH7"]} -{"Format": "IDEA0", "ID": "bbbfaf8b-cf66-4156-bc50-ac66f5312f64", "DetectTime": "2023-10-30T14:09:40.158315+02:00", "EventTime": "2023-10-30T14:09:40.158337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CnKh5F2q4EAYWLFGAc"]} -{"Format": "IDEA0", "ID": "702445cc-edc4-4b64-a5c1-12184df00bf0", "DetectTime": "2023-10-30T14:09:40.187927+02:00", "EventTime": "2023-10-30T14:09:40.187940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CmVHMv1PvVXJIXj2w"]} -{"Format": "IDEA0", "ID": "8bb70782-8f86-4469-a637-55a9cb80579b", "DetectTime": "2023-10-30T14:09:40.216676+02:00", "EventTime": "2023-10-30T14:09:40.216696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["CziUmg2Cpmf4Hib90k"]} -{"Format": "IDEA0", "ID": "36859fa3-ba7c-4611-be0e-4d66b04b07a0", "DetectTime": "2023-10-30T14:09:40.256039+02:00", "EventTime": "2023-10-30T14:09:40.256061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CjNRh12LetPA2gopC8"]} -{"Format": "IDEA0", "ID": "78256570-0c47-45cf-838b-ce024d5421e1", "DetectTime": "2023-10-30T14:09:40.300094+02:00", "EventTime": "2023-10-30T14:09:40.300110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["CAIF8m1HBEMWMRRb33"]} -{"Format": "IDEA0", "ID": "1b0e95ab-c7f5-417e-adf1-52ea89d1061d", "DetectTime": "2023-10-30T14:09:40.327109+02:00", "EventTime": "2023-10-30T14:09:40.327125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CjCxHA2JGACI57Gu0j"]} -{"Format": "IDEA0", "ID": "a81b3315-27e6-485e-b184-d7d2c9da8534", "DetectTime": "2023-10-30T14:09:40.356350+02:00", "EventTime": "2023-10-30T14:09:40.356367+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 24.139.178.44 from 10.0.2.19. blacklisted IP AS: LCPRL, US AS1463 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CqaNaB3ySqyIGPw45g"]} -{"Format": "IDEA0", "ID": "9425ab9b-0997-4639-a4f3-a87da26fe84a", "DetectTime": "2023-10-30T14:09:40.377825+02:00", "EventTime": "2023-10-30T14:09:40.377840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CV3EmGYPBfV6RAF38"]} -{"Format": "IDEA0", "ID": "041c454d-ac41-4182-b62b-ead616a3c403", "DetectTime": "2023-10-30T14:09:40.406091+02:00", "EventTime": "2023-10-30T14:09:40.406112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CE1jUg196goEWjYFQ2"]} -{"Format": "IDEA0", "ID": "83cacaaf-fb56-4db7-ad24-af7d2151ec80", "DetectTime": "2023-10-30T14:09:40.435581+02:00", "EventTime": "2023-10-30T14:09:40.435599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CeRvZe3G4zrtCAkdHj"]} -{"Format": "IDEA0", "ID": "cadcd71c-9960-41cd-b990-6651e375a74f", "DetectTime": "2023-10-30T14:09:40.467109+02:00", "EventTime": "2023-10-30T14:09:40.467126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.30.5 ", "ContentType": "text/plain"}], "uids": ["CZ1BAh1ICzRhKjOkgk"]} -{"Format": "IDEA0", "ID": "bc890d61-aafc-4b02-8db0-b2f683632635", "DetectTime": "2023-10-30T14:09:40.496999+02:00", "EventTime": "2023-10-30T14:09:40.497017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C3HAxW2PfEFMAY5obl"]} -{"Format": "IDEA0", "ID": "5aadb160-83ea-426c-8810-6ad7b17c98fa", "DetectTime": "2023-10-30T14:09:40.530472+02:00", "EventTime": "2023-10-30T14:09:40.530489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CuxbTE1e503edvxxg2"]} -{"Format": "IDEA0", "ID": "6cfae676-c313-4357-be48-d994daf6fdbd", "DetectTime": "2023-10-30T14:09:40.557469+02:00", "EventTime": "2023-10-30T14:09:40.557481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.54.197.77 ", "ContentType": "text/plain"}], "uids": ["C3F4jB2R0puwicqJj6"]} -{"Format": "IDEA0", "ID": "b1ad1eb4-9092-4aaf-92de-c2e132502211", "DetectTime": "2023-10-30T14:09:40.584787+02:00", "EventTime": "2023-10-30T14:09:40.584803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C8CAdr2KvB2TOliFn6"]} -{"Format": "IDEA0", "ID": "124d2119-b3b6-4864-8aba-00186f379c6e", "DetectTime": "2023-10-30T14:09:40.614678+02:00", "EventTime": "2023-10-30T14:09:40.614694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CrVTCA4DHpIIRXTjib"]} -{"Format": "IDEA0", "ID": "a1b29ada-c59a-449d-bfd4-c5600b04df22", "DetectTime": "2023-10-30T14:09:40.642611+02:00", "EventTime": "2023-10-30T14:09:40.642637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CFnh5d4taKQJJDc4da"]} -{"Format": "IDEA0", "ID": "6546080f-879c-44eb-94d6-98d6758c9c65", "DetectTime": "2023-10-30T14:09:40.669797+02:00", "EventTime": "2023-10-30T14:09:40.669813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["COfcrc1Xf9icRTI2sa"]} -{"Format": "IDEA0", "ID": "4c8bdf14-b100-44a4-930d-728c91d36df3", "DetectTime": "2023-10-30T14:09:40.694236+02:00", "EventTime": "2023-10-30T14:09:40.694249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CsTtWqVo9TvJvot81"]} -{"Format": "IDEA0", "ID": "1dcabfe2-c9b2-4573-bec9-5ead2f62c778", "DetectTime": "2023-10-30T14:09:40.720731+02:00", "EventTime": "2023-10-30T14:09:40.720747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CWf8yz2eIIuvo7sBL1"]} -{"Format": "IDEA0", "ID": "5357b19c-5a82-47b3-acc3-c1a44190917e", "DetectTime": "2023-10-30T14:09:40.747605+02:00", "EventTime": "2023-10-30T14:09:40.747620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cpj4Yx4qcTXm6DwZ4a"]} -{"Format": "IDEA0", "ID": "60ad3463-8027-413f-9851-0deff1e1d2d8", "DetectTime": "2023-10-30T14:09:40.774424+02:00", "EventTime": "2023-10-30T14:09:40.774439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKwySy40xEUc4Swv2i"]} -{"Format": "IDEA0", "ID": "52f7cf5b-6f04-41c4-b3a6-090caecd11b8", "DetectTime": "2023-10-30T14:09:40.799999+02:00", "EventTime": "2023-10-30T14:09:40.800015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C1aerD2AThIS4vpfD3"]} -{"Format": "IDEA0", "ID": "beb57554-9e41-40cb-8923-7375f1bc90cf", "DetectTime": "2023-10-30T14:09:40.826694+02:00", "EventTime": "2023-10-30T14:09:40.826705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ckhitc245LX3Ftauw5"]} -{"Format": "IDEA0", "ID": "e4d98cb7-2b42-43fa-8fc3-a2954bd0be11", "DetectTime": "2023-10-30T14:09:40.850623+02:00", "EventTime": "2023-10-30T14:09:40.850640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CABjYk1Xa8881Rov54"]} -{"Format": "IDEA0", "ID": "d9aff605-11ee-43ff-8b5f-4d3f84b60c67", "DetectTime": "2023-10-30T14:09:40.877774+02:00", "EventTime": "2023-10-30T14:09:40.877791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CSiOnZ3Knr85XPHpT1"]} -{"Format": "IDEA0", "ID": "9331f60a-818c-4199-a349-3ca1a06ce0fe", "DetectTime": "2023-10-30T14:09:40.901312+02:00", "EventTime": "2023-10-30T14:09:40.901327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CfM5rd3rDPassd5wVc"]} -{"Format": "IDEA0", "ID": "c11caa84-d022-4446-8c6c-0d4374ebc1e9", "DetectTime": "2023-10-30T14:09:40.927977+02:00", "EventTime": "2023-10-30T14:09:40.927994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["Cqltbd4ZL0K10uNDvg"]} -{"Format": "IDEA0", "ID": "128c5ef3-9602-43ca-a548-aa01001604e3", "DetectTime": "2023-10-30T14:09:40.955735+02:00", "EventTime": "2023-10-30T14:09:40.955753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CQ6VMZGg1VaPmyHae"]} -{"Format": "IDEA0", "ID": "8d86b404-c086-41ef-815f-41bce5f2310d", "DetectTime": "2023-10-30T14:09:40.982492+02:00", "EventTime": "2023-10-30T14:09:40.982506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CVBaj02ydz80UtctLc"]} -{"Format": "IDEA0", "ID": "c21921d0-e235-4881-9edd-d73eb6db2a13", "DetectTime": "2023-10-30T14:09:41.011131+02:00", "EventTime": "2023-10-30T14:09:41.011149+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Ck1Cug3pGjn5zZbHTb"]} -{"Format": "IDEA0", "ID": "ccadfdec-6058-4389-a38e-17456b9cd09a", "DetectTime": "2023-10-30T14:09:41.039596+02:00", "EventTime": "2023-10-30T14:09:41.039612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CcE7AaRKXD3ia4hj2"]} -{"Format": "IDEA0", "ID": "2375c4ef-e274-447b-957d-a6643fd03f97", "DetectTime": "2023-10-30T14:09:41.069834+02:00", "EventTime": "2023-10-30T14:09:41.069850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CYR4704KARjkKmiDW2"]} -{"Format": "IDEA0", "ID": "dd842f26-59fd-4e07-8cbc-7276943d5a6d", "DetectTime": "2023-10-30T14:09:41.094177+02:00", "EventTime": "2023-10-30T14:09:41.094188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["CtcmQ64FLyk2hlteuf"]} -{"Format": "IDEA0", "ID": "d367084d-0737-4636-9c58-777fc171f7cb", "DetectTime": "2023-10-30T14:09:41.116294+02:00", "EventTime": "2023-10-30T14:09:41.116305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cum2Kb4nXTvBEtqvN2"]} -{"Format": "IDEA0", "ID": "6c9b8599-dc0c-462a-b16d-5aec0aa391b0", "DetectTime": "2023-10-30T14:09:41.143907+02:00", "EventTime": "2023-10-30T14:09:41.143924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CGanRW3IjcSS15D5M5"]} -{"Format": "IDEA0", "ID": "515599cf-3af9-4c2e-a10e-142ed9c7c2a7", "DetectTime": "2023-10-30T14:09:41.172829+02:00", "EventTime": "2023-10-30T14:09:41.172845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CWvJ2S2lBl5b8Ud3bl"]} -{"Format": "IDEA0", "ID": "7d5a8f82-9539-41fd-bd54-1dea4a9b52bf", "DetectTime": "2023-10-30T14:09:41.199853+02:00", "EventTime": "2023-10-30T14:09:41.199866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["C0f4Wu2jym5AmparHi"]} -{"Format": "IDEA0", "ID": "a2b6554b-83c8-40ec-b437-1b6dc22b8898", "DetectTime": "2023-10-30T14:09:41.223538+02:00", "EventTime": "2023-10-30T14:09:41.223549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CXDgqFtK2bapIGt1a"]} -{"Format": "IDEA0", "ID": "33c519ff-a146-4507-8ebe-452a45af6580", "DetectTime": "2023-10-30T14:09:41.244526+02:00", "EventTime": "2023-10-30T14:09:41.244537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CvSGYf1Xie4Z6udyO5"]} -{"Format": "IDEA0", "ID": "ab60d3a8-aaf0-41bd-af22-b6e7066657bd", "DetectTime": "2023-10-30T14:09:41.271695+02:00", "EventTime": "2023-10-30T14:09:41.271711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CaonxX3HjpWxh9s2di"]} -{"Format": "IDEA0", "ID": "c94aea1d-e93b-49e9-add1-d75278719c97", "DetectTime": "2023-10-30T14:09:41.299677+02:00", "EventTime": "2023-10-30T14:09:41.299694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CSmcnEir8jR2paus5"]} -{"Format": "IDEA0", "ID": "8d30ecdc-c596-49d2-b644-4fe92316f534", "DetectTime": "2023-10-30T14:09:41.323913+02:00", "EventTime": "2023-10-30T14:09:41.323925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CkMOcS3dIWZZydeC7h"]} -{"Format": "IDEA0", "ID": "24b54c42-60d4-476b-9cb0-f2e8fba8021a", "DetectTime": "2023-10-30T14:09:41.350630+02:00", "EventTime": "2023-10-30T14:09:41.350646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["C6ZmZA29VtYp1prJMe"]} -{"Format": "IDEA0", "ID": "a8d8ec5a-f70a-4839-b582-88f4df96bcc8", "DetectTime": "2023-10-30T14:09:41.376292+02:00", "EventTime": "2023-10-30T14:09:41.376304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["Cign862Jbl7LxV8Pqf"]} -{"Format": "IDEA0", "ID": "ad138c55-5f8f-4596-9d3f-c18d65863dfe", "DetectTime": "2023-10-30T14:09:41.395851+02:00", "EventTime": "2023-10-30T14:09:41.395870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["C2DGEG2dB6FZrWjwWc"]} -{"Format": "IDEA0", "ID": "65127a9f-d64e-43d7-86dd-f8a1e6d414c4", "DetectTime": "2023-10-30T14:09:41.414131+02:00", "EventTime": "2023-10-30T14:09:41.414142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CKns212mI1LyMFzVUj"]} -{"Format": "IDEA0", "ID": "8a36e2de-a5a5-4a80-985b-c811a3c0ee2d", "DetectTime": "2023-10-30T14:09:41.432996+02:00", "EventTime": "2023-10-30T14:09:41.433007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C5HSif3Ar1EuDbDkQ4"]} -{"Format": "IDEA0", "ID": "8e4f3d13-b9a7-4c97-adea-9659de26df79", "DetectTime": "2023-10-30T14:09:41.460123+02:00", "EventTime": "2023-10-30T14:09:41.460140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CqjZBJ3r9YY5zVc9Xb"]} -{"Format": "IDEA0", "ID": "6fa33749-3766-4542-9454-801b98829b31", "DetectTime": "2023-10-30T14:09:41.489305+02:00", "EventTime": "2023-10-30T14:09:41.489322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cpvudz3Aby4LIo3c4i"]} -{"Format": "IDEA0", "ID": "3e9e2bf2-1586-43b1-803a-41463a7d446f", "DetectTime": "2023-10-30T14:09:41.518682+02:00", "EventTime": "2023-10-30T14:09:41.518698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CIAFjC3LinDrd3almf"]} -{"Format": "IDEA0", "ID": "95196622-37f3-4957-926a-f93af8c30abc", "DetectTime": "2023-10-30T14:09:41.540367+02:00", "EventTime": "2023-10-30T14:09:41.540388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CKYFihvYbNDyXzz6f"]} -{"Format": "IDEA0", "ID": "5216d857-2a0e-48b4-808c-f07f28bf3097", "DetectTime": "2023-10-30T14:09:41.567300+02:00", "EventTime": "2023-10-30T14:09:41.567316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C6f9Mk23W6BPnZLSwj"]} -{"Format": "IDEA0", "ID": "a1b02c82-6da5-42dc-9bb5-bf756bc60b64", "DetectTime": "2023-10-30T14:09:41.589903+02:00", "EventTime": "2023-10-30T14:09:41.589916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXtAve2nnjQPzrWPjl"]} -{"Format": "IDEA0", "ID": "03b6cbc1-3d41-4d40-8077-7b75160d8222", "DetectTime": "2023-10-30T14:09:41.610994+02:00", "EventTime": "2023-10-30T14:09:41.611006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["CChvUg2EV4m1JZUaBj"]} -{"Format": "IDEA0", "ID": "0537ee05-0011-403b-97d3-393363216274", "DetectTime": "2023-10-30T14:09:41.629803+02:00", "EventTime": "2023-10-30T14:09:41.629814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["COj1Is1FAQYOleNuGd"]} -{"Format": "IDEA0", "ID": "231fa2c5-6167-4b2f-808b-274f83bd2dc0", "DetectTime": "2023-10-30T14:09:41.650988+02:00", "EventTime": "2023-10-30T14:09:41.651004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["CD61CvGzstdofa65a"]} -{"Format": "IDEA0", "ID": "ce05683e-6469-4803-a4db-101740a41fdc", "DetectTime": "2023-10-30T14:09:41.673471+02:00", "EventTime": "2023-10-30T14:09:41.673491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.142.75.253 ", "ContentType": "text/plain"}], "uids": ["CkgeSH2Jo6jJpiCXZ6"]} -{"Format": "IDEA0", "ID": "ad3b91ba-4eb3-40bb-bf2c-cb02e35760fe", "DetectTime": "2023-10-30T14:09:41.697228+02:00", "EventTime": "2023-10-30T14:09:41.697244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["CJsdSU3U7mVe4lEKki"]} -{"Format": "IDEA0", "ID": "9d62c267-5b33-4404-96d0-e171e7450770", "DetectTime": "2023-10-30T14:09:41.720317+02:00", "EventTime": "2023-10-30T14:09:41.720327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cn7Mf114IvfkxtObQ1"]} -{"Format": "IDEA0", "ID": "62c6afd0-496a-4faf-93e3-0b09a4efb2ee", "DetectTime": "2023-10-30T14:09:41.740176+02:00", "EventTime": "2023-10-30T14:09:41.740188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["C3wX2T3Sa65ddZ8X9g"]} -{"Format": "IDEA0", "ID": "d7ab26a5-d3a1-4ba5-ba59-fcc7f00eb63a", "DetectTime": "2023-10-30T14:09:41.761380+02:00", "EventTime": "2023-10-30T14:09:41.761392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CDvx12rMVcdXMce7e"]} -{"Format": "IDEA0", "ID": "5abdf8a9-f9fa-4f17-8223-812e5aa03101", "DetectTime": "2023-10-30T14:09:41.782495+02:00", "EventTime": "2023-10-30T14:09:41.782508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cx56k031nSTxp5CrN3"]} -{"Format": "IDEA0", "ID": "57d970d8-29b9-4a0c-a604-2cb1fd6c9ee3", "DetectTime": "2023-10-30T14:09:41.804610+02:00", "EventTime": "2023-10-30T14:09:41.804631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C7JLXp3ZvS0OgZp4J9"]} -{"Format": "IDEA0", "ID": "6f8ab782-28e5-4b21-bfcb-7cf5fc9a57a1", "DetectTime": "2023-10-30T14:09:41.823514+02:00", "EventTime": "2023-10-30T14:09:41.823526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cej00ycd3uCxuhXha"]} -{"Format": "IDEA0", "ID": "dad77ee6-6cd2-42be-bb9f-b8c448c57fc8", "DetectTime": "2023-10-30T14:09:41.846329+02:00", "EventTime": "2023-10-30T14:09:41.846346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CHtGDZ2c2HeBbiktYh"]} -{"Format": "IDEA0", "ID": "0e3c8638-f137-4029-977f-ed1c8a167b22", "DetectTime": "2023-10-30T14:09:41.872197+02:00", "EventTime": "2023-10-30T14:09:41.872214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CFxzjE37g1CPwr14pk"]} -{"Format": "IDEA0", "ID": "e49c6c9d-d4cb-45c0-85a6-193f907e2aae", "DetectTime": "2023-10-30T14:09:41.898257+02:00", "EventTime": "2023-10-30T14:09:41.898273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CIbboC4t9S7F0Hrs46"]} -{"Format": "IDEA0", "ID": "701d5563-8e54-4e15-82c5-e64184930bc8", "DetectTime": "2023-10-30T14:09:41.926064+02:00", "EventTime": "2023-10-30T14:09:41.926081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C4QA2BftcbU0EGbB9"]} -{"Format": "IDEA0", "ID": "7e7e5a78-2963-4fc8-bcd7-efc461c0fbee", "DetectTime": "2023-10-30T14:09:41.953938+02:00", "EventTime": "2023-10-30T14:09:41.953954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CrvyXI2zMSv4IczgWa"]} -{"Format": "IDEA0", "ID": "163845c3-8d7a-4aec-b272-9f9a03bca457", "DetectTime": "2023-10-30T14:09:41.976757+02:00", "EventTime": "2023-10-30T14:09:41.976768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CpPLTU9YLefz7NoZ1"]} -{"Format": "IDEA0", "ID": "60f34e77-f50a-4d1c-a234-3e39a128ecbc", "DetectTime": "2023-10-30T14:09:41.999542+02:00", "EventTime": "2023-10-30T14:09:41.999553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C3NiN44RCPRU99muwa"]} -{"Format": "IDEA0", "ID": "95ab9c2c-8858-4f99-a228-0aeaaeaa6d01", "DetectTime": "2023-10-30T14:09:42.024371+02:00", "EventTime": "2023-10-30T14:09:42.024388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CesFpx7606GLXYXw2"]} -{"Format": "IDEA0", "ID": "7451f80c-8722-455e-8129-ed86cbdd4dda", "DetectTime": "2023-10-30T14:09:42.045602+02:00", "EventTime": "2023-10-30T14:09:42.045619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CV8BQy4g25qpyg9h6f"]} -{"Format": "IDEA0", "ID": "2f5cd9c4-9c32-4baf-a645-d22215f81cdd", "DetectTime": "2023-10-30T14:09:42.066707+02:00", "EventTime": "2023-10-30T14:09:42.066719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CzRMZc2hav1e8Mke7j"]} -{"Format": "IDEA0", "ID": "ed98e536-38c3-47e9-98f1-df587826c3e2", "DetectTime": "2023-10-30T14:09:42.089982+02:00", "EventTime": "2023-10-30T14:09:42.089995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cq1XGI3znJwXGb5dT5"]} -{"Format": "IDEA0", "ID": "5be092b0-4d9e-4965-afa0-17b3dfd561a5", "DetectTime": "2023-10-30T14:09:42.112314+02:00", "EventTime": "2023-10-30T14:09:42.112330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CIF2Ns4KwUr5suQjM"]} -{"Format": "IDEA0", "ID": "24edf5eb-4820-4316-99ed-10847251de90", "DetectTime": "2023-10-30T14:09:42.137339+02:00", "EventTime": "2023-10-30T14:09:42.137349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFXy8V399zx8lha6df"]} -{"Format": "IDEA0", "ID": "b7b4197a-d7da-49cf-9b54-96572e889598", "DetectTime": "2023-10-30T14:09:42.160361+02:00", "EventTime": "2023-10-30T14:09:42.160372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CJI2rM2f5KpgPxkrF8"]} -{"Format": "IDEA0", "ID": "bc658d70-b8a8-4e0b-966c-7d9b8b74698b", "DetectTime": "2023-10-30T14:09:42.183651+02:00", "EventTime": "2023-10-30T14:09:42.183663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CJ4mF7YQjbb1x1h3d"]} -{"Format": "IDEA0", "ID": "9cdb3049-f648-4bcc-aa7e-be2764f4f93e", "DetectTime": "2023-10-30T14:09:42.206103+02:00", "EventTime": "2023-10-30T14:09:42.206121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CcG3J32ZZIedNqa6u3"]} -{"Format": "IDEA0", "ID": "d2579866-aabc-4574-9ba5-81e2af8f1f6c", "DetectTime": "2023-10-30T14:09:42.226118+02:00", "EventTime": "2023-10-30T14:09:42.226130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C8Rh5f3Hh0MbZskdh7"]} -{"Format": "IDEA0", "ID": "1e3783ab-43f5-4a51-9a6b-7db810d0049b", "DetectTime": "2023-10-30T14:09:42.247854+02:00", "EventTime": "2023-10-30T14:09:42.247871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CEexBW1Rj9Ma4LGvHh"]} -{"Format": "IDEA0", "ID": "c0726831-7e0a-496f-acf7-c12b188d071b", "DetectTime": "2023-10-30T14:09:42.273652+02:00", "EventTime": "2023-10-30T14:09:42.273663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CakchQpJgXIIUGuGd"]} -{"Format": "IDEA0", "ID": "386cb794-22be-4f65-8db1-159f3658d550", "DetectTime": "2023-10-30T14:09:42.290591+02:00", "EventTime": "2023-10-30T14:09:42.290609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["C5y7HJ2XkCZDmSTHb5"]} -{"Format": "IDEA0", "ID": "2ef4df05-2752-4260-a1e3-1984dcb37de0", "DetectTime": "2023-10-30T14:09:42.310416+02:00", "EventTime": "2023-10-30T14:09:42.310434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["CEgrIc4JROObaiP0ge"]} -{"Format": "IDEA0", "ID": "08c58e76-d43f-40df-913d-ae7ceba629da", "DetectTime": "2023-10-30T14:09:42.334089+02:00", "EventTime": "2023-10-30T14:09:42.334106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CHO36k1biNAOgIocM5"]} -{"Format": "IDEA0", "ID": "d2a9d61a-5f93-4ba3-89f8-67a9bf429442", "DetectTime": "2023-10-30T14:09:42.358462+02:00", "EventTime": "2023-10-30T14:09:42.358474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CyKd4s3PKncUAOsBJf"]} -{"Format": "IDEA0", "ID": "184364c2-e06f-40f2-94e9-a5cc3106a7db", "DetectTime": "2023-10-30T14:09:42.378515+02:00", "EventTime": "2023-10-30T14:09:42.378531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Ckem5W3zz0xlFTXGok"]} -{"Format": "IDEA0", "ID": "be0e55ca-01e3-4a9b-8a1f-f2331812f594", "DetectTime": "2023-10-30T14:09:42.400325+02:00", "EventTime": "2023-10-30T14:09:42.400336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CRDpbL2kkEOAY6cvrb"]} -{"Format": "IDEA0", "ID": "6de42e96-d4fb-42fa-8db0-509e2dc8a927", "DetectTime": "2023-10-30T14:09:42.419468+02:00", "EventTime": "2023-10-30T14:09:42.419483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CjmOcKuFh0pOF4nNg"]} -{"Format": "IDEA0", "ID": "e4e12c3e-3f0f-4a88-a19f-a7fa80d3e3ca", "DetectTime": "2023-10-30T14:09:42.439626+02:00", "EventTime": "2023-10-30T14:09:42.439639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CAH4qu1UkIzLvfMUTh"]} -{"Format": "IDEA0", "ID": "bba648c2-4a1f-4ca6-baf3-3222ed1c67fb", "DetectTime": "2023-10-30T14:09:42.463272+02:00", "EventTime": "2023-10-30T14:09:42.463287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cvj2Ry3HplJjjdQjt6"]} -{"Format": "IDEA0", "ID": "0dc2c866-ac58-4729-9cc4-018a1a794239", "DetectTime": "2023-10-30T14:09:42.569413+02:00", "EventTime": "2023-10-30T14:09:42.569430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CaoFnV3eeQwXbvPpT3"]} -{"Format": "IDEA0", "ID": "fe7353fd-af24-46d3-b4cb-f5bd1166ec83", "DetectTime": "2023-10-30T14:09:42.593865+02:00", "EventTime": "2023-10-30T14:09:42.593878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["C4ZGUi3eO7Pd65AWA5"]} -{"Format": "IDEA0", "ID": "7cddbb61-d631-47c4-92cd-8debf93c28bf", "DetectTime": "2023-10-30T14:09:42.614438+02:00", "EventTime": "2023-10-30T14:09:42.614454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["CkbA6MznKI1tn8Zz6"]} -{"Format": "IDEA0", "ID": "f1ae35a7-0c54-4d16-81b6-1884eb2c33a8", "DetectTime": "2023-10-30T14:09:42.640727+02:00", "EventTime": "2023-10-30T14:09:42.640738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CSwJLg4MGHeVJMP8z9"]} -{"Format": "IDEA0", "ID": "cd226d57-9d51-49f9-92c2-0f03b402318c", "DetectTime": "2023-10-30T14:09:42.668767+02:00", "EventTime": "2023-10-30T14:09:42.668786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C4PfXn1Z4HlsV5dw9a"]} -{"Format": "IDEA0", "ID": "dd657684-7612-4cc9-b381-3348c6f4f8c7", "DetectTime": "2023-10-30T14:09:42.693680+02:00", "EventTime": "2023-10-30T14:09:42.693696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CyOLLk4X72Eb30wxY2"]} -{"Format": "IDEA0", "ID": "cf094412-1c78-438c-b229-529b147a1292", "DetectTime": "2023-10-30T14:09:42.715897+02:00", "EventTime": "2023-10-30T14:09:42.715913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["C0UvBn2fAuCgpiChsi"]} -{"Format": "IDEA0", "ID": "9b409700-8d7b-41bd-b2ef-5e818b5fa1da", "DetectTime": "2023-10-30T14:09:42.742452+02:00", "EventTime": "2023-10-30T14:09:42.742468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CAPl6E39r110OKeZvl"]} -{"Format": "IDEA0", "ID": "1c2fc7ff-771d-4eea-922d-5d77c4dcec9d", "DetectTime": "2023-10-30T14:09:42.769543+02:00", "EventTime": "2023-10-30T14:09:42.769560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C6jlj63bJdcGx1ZIQ3"]} -{"Format": "IDEA0", "ID": "5ec0d539-d777-4ba1-a4ca-cbf34731543a", "DetectTime": "2023-10-30T14:09:42.796959+02:00", "EventTime": "2023-10-30T14:09:42.796976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["CFODOKGHgVBDhH46k"]} -{"Format": "IDEA0", "ID": "8af7cc22-d671-4c75-9946-9cb789dc3808", "DetectTime": "2023-10-30T14:09:42.823974+02:00", "EventTime": "2023-10-30T14:09:42.823991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CieANr3pfXWJqomjK7"]} -{"Format": "IDEA0", "ID": "9f681006-180d-4d72-b935-875a0ee4335c", "DetectTime": "2023-10-30T14:09:42.846578+02:00", "EventTime": "2023-10-30T14:09:42.846589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.166.194.69 ", "ContentType": "text/plain"}], "uids": ["CdlSU72IDT9Uz4HjM6"]} -{"Format": "IDEA0", "ID": "1f6d5e93-93c1-44fb-92fd-748989a04962", "DetectTime": "2023-10-30T14:09:42.867280+02:00", "EventTime": "2023-10-30T14:09:42.867292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqeeCh2LsZZ1x5pcx2"]} -{"Format": "IDEA0", "ID": "6dee1bcf-f5eb-433e-8460-ba0e458c3c84", "DetectTime": "2023-10-30T14:09:42.888686+02:00", "EventTime": "2023-10-30T14:09:42.888697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.95.34.99 ", "ContentType": "text/plain"}], "uids": ["CaRhqk1Roj78gzpXQd"]} -{"Format": "IDEA0", "ID": "ebb0e622-6ca9-45cf-ba30-a43783abe61a", "DetectTime": "2023-10-30T14:09:42.914812+02:00", "EventTime": "2023-10-30T14:09:42.914830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C2RNR141FPje8DMjoh"]} -{"Format": "IDEA0", "ID": "26f37613-eb85-4778-8964-9ff485d85c70", "DetectTime": "2023-10-30T14:09:42.937497+02:00", "EventTime": "2023-10-30T14:09:42.937510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 36.74.96.108 ", "ContentType": "text/plain"}], "uids": ["Cu9bhM2JCK2PvQsm49"]} -{"Format": "IDEA0", "ID": "320fe30f-3494-4cbb-9e60-239e855841e9", "DetectTime": "2023-10-30T14:09:42.962293+02:00", "EventTime": "2023-10-30T14:09:42.962308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.231.62.73 from 10.0.2.19. blacklisted IP AS: KOBA-AS Polish ISP, PL AS3452 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CQLdwP1HWjpeEND0cf"]} -{"Format": "IDEA0", "ID": "58e1efdc-ce91-4022-a725-99d80eb62338", "DetectTime": "2023-10-30T14:09:42.980013+02:00", "EventTime": "2023-10-30T14:09:42.980025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CXbBRsbLBtFktgev4"]} -{"Format": "IDEA0", "ID": "f51ec4fb-d97c-4b18-b293-9bdc695286b8", "DetectTime": "2023-10-30T14:09:43.001874+02:00", "EventTime": "2023-10-30T14:09:43.001886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CBqfb5RBt9hs2rqPg"]} -{"Format": "IDEA0", "ID": "d4c060a8-eeec-4526-864e-a43655d04773", "DetectTime": "2023-10-30T14:09:43.028092+02:00", "EventTime": "2023-10-30T14:09:43.028108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CsHMY71uCQbPqfaObh"]} -{"Format": "IDEA0", "ID": "e99b8f0d-6800-4cd5-b388-b210ffb5d2af", "DetectTime": "2023-10-30T14:09:43.055350+02:00", "EventTime": "2023-10-30T14:09:43.055362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cj5Xg1Pwe4iYP6vb4"]} -{"Format": "IDEA0", "ID": "02e8bb6c-5f9b-4b92-b0b8-40b2139e4ad6", "DetectTime": "2023-10-30T14:09:43.081049+02:00", "EventTime": "2023-10-30T14:09:43.081065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CDGDpm17wvTuqkVDbb"]} -{"Format": "IDEA0", "ID": "dc07c26d-1368-47ce-a027-32432266b52e", "DetectTime": "2023-10-30T14:09:43.109320+02:00", "EventTime": "2023-10-30T14:09:43.109334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CBSdmlCOZshGp2w7h"]} -{"Format": "IDEA0", "ID": "dc444c8a-af7a-432f-af9c-7b2532318434", "DetectTime": "2023-10-30T14:09:43.134251+02:00", "EventTime": "2023-10-30T14:09:43.134268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CZ8HN412Bzao8NLaP9"]} -{"Format": "IDEA0", "ID": "af071539-9abf-4b09-af3e-cc7d0ca29f9a", "DetectTime": "2023-10-30T14:09:43.160191+02:00", "EventTime": "2023-10-30T14:09:43.160202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CW0cUbeqnvGNiPfd7"]} -{"Format": "IDEA0", "ID": "795b5af1-2db0-4120-ab81-0f3f6ebc8531", "DetectTime": "2023-10-30T14:09:43.183267+02:00", "EventTime": "2023-10-30T14:09:43.183283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cgsu9Z23MAISR4QBU2"]} -{"Format": "IDEA0", "ID": "34a00609-02f6-4847-91ba-41830f38166b", "DetectTime": "2023-10-30T14:09:43.211017+02:00", "EventTime": "2023-10-30T14:09:43.211034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cv6Jos1U4Pr5xIdl57"]} -{"Format": "IDEA0", "ID": "ea86ab4a-9452-45ed-84ce-aca15e88dbf7", "DetectTime": "2023-10-30T14:09:43.238100+02:00", "EventTime": "2023-10-30T14:09:43.238128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CailAOlRkXNcg0UWi"]} -{"Format": "IDEA0", "ID": "fd09ecfb-87f5-49aa-985c-9f089b1b77c7", "DetectTime": "2023-10-30T14:09:43.259864+02:00", "EventTime": "2023-10-30T14:09:43.259877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4lcX14nErwrG9C7ad"]} -{"Format": "IDEA0", "ID": "22239cde-6f33-4b84-a5c6-d0faa80da508", "DetectTime": "2023-10-30T14:09:43.281167+02:00", "EventTime": "2023-10-30T14:09:43.281178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C817DC2uwsFLvv84Mk"]} -{"Format": "IDEA0", "ID": "5d8eb494-908c-428d-8a25-cd20c7259527", "DetectTime": "2023-10-30T14:09:43.307314+02:00", "EventTime": "2023-10-30T14:09:43.307330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CNNOxa2L41HI9397Cg"]} -{"Format": "IDEA0", "ID": "ba12378a-9273-4f47-b313-bbb301dc1ad6", "DetectTime": "2023-10-30T14:09:43.335161+02:00", "EventTime": "2023-10-30T14:09:43.335177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CH3ml29juDoSUooMa"]} -{"Format": "IDEA0", "ID": "cb8c8789-c789-437c-97cf-55788c9cafce", "DetectTime": "2023-10-30T14:09:43.362624+02:00", "EventTime": "2023-10-30T14:09:43.362641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CspAIKPABRCdY0708"]} -{"Format": "IDEA0", "ID": "d1dce8c7-90b3-4380-a757-c44468a30e7c", "DetectTime": "2023-10-30T14:09:43.392380+02:00", "EventTime": "2023-10-30T14:09:43.392394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CEGGU525QNuTiD82o7"]} -{"Format": "IDEA0", "ID": "6da4b783-2ab6-41c9-9d09-88c7485b47b1", "DetectTime": "2023-10-30T14:09:43.412714+02:00", "EventTime": "2023-10-30T14:09:43.412725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CuNhAZ2ispm6OSGRFd"]} -{"Format": "IDEA0", "ID": "9fc27e84-44e5-4359-b231-5b4c6f4cb6c9", "DetectTime": "2023-10-30T14:09:43.435145+02:00", "EventTime": "2023-10-30T14:09:43.435168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CNqcsj1JCQxsyZtox2"]} -{"Format": "IDEA0", "ID": "57b2e194-26d1-40e2-af8b-39fff8622e7d", "DetectTime": "2023-10-30T14:09:43.459156+02:00", "EventTime": "2023-10-30T14:09:43.459172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C00qz53fNWZqR3O3Ck"]} -{"Format": "IDEA0", "ID": "a42729dd-994f-4416-88bb-5e8a04a74549", "DetectTime": "2023-10-30T14:09:43.486230+02:00", "EventTime": "2023-10-30T14:09:43.486255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CrPshT1F6cacYp4Kt8"]} -{"Format": "IDEA0", "ID": "ed245cfe-b428-410e-804d-0be050818574", "DetectTime": "2023-10-30T14:09:43.512163+02:00", "EventTime": "2023-10-30T14:09:43.512179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CazH7r19UUirrNuZyc"]} -{"Format": "IDEA0", "ID": "4f5b4e51-57ae-47b9-b675-c5fdc350ddaa", "DetectTime": "2023-10-30T14:09:43.534169+02:00", "EventTime": "2023-10-30T14:09:43.534181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CFv0vD1C5jUeyGmA0j"]} -{"Format": "IDEA0", "ID": "29d6e48a-b63a-49ad-ae7e-0812cf3c7f08", "DetectTime": "2023-10-30T14:09:43.557720+02:00", "EventTime": "2023-10-30T14:09:43.557731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CbRrIm2inyZkJdSOOa"]} -{"Format": "IDEA0", "ID": "af3f0b29-b6d3-40c9-9baf-f3e13adfb014", "DetectTime": "2023-10-30T14:09:43.578081+02:00", "EventTime": "2023-10-30T14:09:43.578097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["CZPIX144JlKX5eEodj"]} -{"Format": "IDEA0", "ID": "bfa7064d-05d6-4021-97e2-0c87fcebbace", "DetectTime": "2023-10-30T14:09:43.605455+02:00", "EventTime": "2023-10-30T14:09:43.605473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CSTlSnxF8bW7Dhlsc"]} -{"Format": "IDEA0", "ID": "5be36d36-22ef-436d-b0c7-351d0dd44ac2", "DetectTime": "2023-10-30T14:09:43.627201+02:00", "EventTime": "2023-10-30T14:09:43.627214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["C3Dxxo2rdZQAYqfBGc"]} -{"Format": "IDEA0", "ID": "5fdfd663-fd38-4bc8-b32f-3b84e053fc2e", "DetectTime": "2023-10-30T14:09:43.647665+02:00", "EventTime": "2023-10-30T14:09:43.647676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CAVSC72VE8MM2TcR87"]} -{"Format": "IDEA0", "ID": "906b0516-e1dc-44eb-9324-552e863a8ad7", "DetectTime": "2023-10-30T14:09:43.673882+02:00", "EventTime": "2023-10-30T14:09:43.673899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CCX12X30ogGNXieRNf"]} -{"Format": "IDEA0", "ID": "68a5fc92-0811-4c38-8862-c3ff2bb668ed", "DetectTime": "2023-10-30T14:09:43.699328+02:00", "EventTime": "2023-10-30T14:09:43.699341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CnbDV24jZhNvszoML"]} -{"Format": "IDEA0", "ID": "3d1c8522-03ec-4e9c-a7df-1a0ebb8d6dc7", "DetectTime": "2023-10-30T14:09:43.723684+02:00", "EventTime": "2023-10-30T14:09:43.723697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CcSFScBRjWTqTowp7"]} -{"Format": "IDEA0", "ID": "7095627f-dbe4-4168-8cc3-46f0a2c1ef9e", "DetectTime": "2023-10-30T14:09:43.745329+02:00", "EventTime": "2023-10-30T14:09:43.745346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CTaNQd4Ia8erYehfs3"]} -{"Format": "IDEA0", "ID": "a53487e2-14da-4c88-96f6-da8be2fea176", "DetectTime": "2023-10-30T14:09:43.769572+02:00", "EventTime": "2023-10-30T14:09:43.769583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CS7VHK3fdno9UyuJKl"]} -{"Format": "IDEA0", "ID": "0a0fb7e7-0fb2-4457-a653-46320442f947", "DetectTime": "2023-10-30T14:09:43.793576+02:00", "EventTime": "2023-10-30T14:09:43.793593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.72.218.141 ", "ContentType": "text/plain"}], "uids": ["CfiStF4jBOODSjieH"]} -{"Format": "IDEA0", "ID": "0eab803d-8a51-4ecd-b3a1-88cdc1c077b1", "DetectTime": "2023-10-30T14:09:43.816717+02:00", "EventTime": "2023-10-30T14:09:43.816733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["Cmz7iV2b63a9wytspc"]} -{"Format": "IDEA0", "ID": "bb204f1b-61fc-4765-89b3-818bd4fa56cd", "DetectTime": "2023-10-30T14:09:43.843564+02:00", "EventTime": "2023-10-30T14:09:43.843579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C6cxVc2GcSDLx7bJc2"]} -{"Format": "IDEA0", "ID": "1eb8235b-b436-4458-befb-c75a91c7acba", "DetectTime": "2023-10-30T14:09:43.872057+02:00", "EventTime": "2023-10-30T14:09:43.872073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CtJlRtPUJSSyxEHfe"]} -{"Format": "IDEA0", "ID": "278a29cb-e637-407b-b7cf-2775e11b8ceb", "DetectTime": "2023-10-30T14:09:43.899985+02:00", "EventTime": "2023-10-30T14:09:43.900002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CpJCyl43vhehW1XQqe"]} -{"Format": "Json", "ID": "278a29cb-e637-407b-b7cf-2775e11b8ceb", "DetectTime": "2023-10-30T14:09:43.899985+02:00", "EventTime": "2023-10-30T14:09:43.900002+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T16:32:19.191211+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 135. (real time 2023/10/30 14:09:43.969164)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "204916f4-4430-4814-bd3c-319697f50eb2", "DetectTime": "2023-10-30T14:09:43.973651+02:00", "EventTime": "2023-10-30T14:09:43.973665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["CGk9ZT306p8lgEm7md"]} -{"Format": "IDEA0", "ID": "95776585-4b68-47e2-b751-af95f68e1a52", "DetectTime": "2023-10-30T14:09:43.996877+02:00", "EventTime": "2023-10-30T14:09:43.996897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["CDrL9o1m922om75SBa"]} -{"Format": "IDEA0", "ID": "8b78f3e9-5b00-4a89-bc8f-b09588779cd0", "DetectTime": "2023-10-30T14:09:44.022006+02:00", "EventTime": "2023-10-30T14:09:44.022022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cj4mOS2haHTA5DGq2h"]} -{"Format": "IDEA0", "ID": "578e54c1-a057-4586-a501-7b6a6c9b5d1d", "DetectTime": "2023-10-30T14:09:44.038269+02:00", "EventTime": "2023-10-30T14:09:44.038286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C13VpR1pJTw5PMrf46"]} -{"Format": "IDEA0", "ID": "a59d42ef-515b-4610-bbf9-d0af84097b0d", "DetectTime": "2023-10-30T14:09:44.063027+02:00", "EventTime": "2023-10-30T14:09:44.063048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CvRTKc2ZBhWRnNhc7k"]} -{"Format": "IDEA0", "ID": "c2a878ab-8fef-48aa-b1fd-f1e1c0c89d4d", "DetectTime": "2023-10-30T14:09:44.083473+02:00", "EventTime": "2023-10-30T14:09:44.083490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.241.169.218 ", "ContentType": "text/plain"}], "uids": ["CCIRNw2D03Ui1ExdB5"]} -{"Format": "IDEA0", "ID": "e0895571-53d4-4b5f-ab84-90a5b4dde906", "DetectTime": "2023-10-30T14:09:44.105231+02:00", "EventTime": "2023-10-30T14:09:44.105252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CVGtok1YYbv799EjRc"]} -{"Format": "IDEA0", "ID": "67f466e0-d761-4e6b-9d7c-f7563cb961ff", "DetectTime": "2023-10-30T14:09:44.122737+02:00", "EventTime": "2023-10-30T14:09:44.122749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CPtJEaDMxLgpyTXP1"]} -{"Format": "IDEA0", "ID": "919d16ee-f17a-48db-8a9c-35cac00eabdb", "DetectTime": "2023-10-30T14:09:44.142700+02:00", "EventTime": "2023-10-30T14:09:44.142711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CHcMiZ2cE4VC2mOmyl"]} -{"Format": "IDEA0", "ID": "1b50d132-13ab-4d78-8888-875fbb2631ba", "DetectTime": "2023-10-30T14:09:44.156343+02:00", "EventTime": "2023-10-30T14:09:44.156353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CVTz3p1r4Ua5ZvzaPi"]} -{"Format": "IDEA0", "ID": "33a2973a-fa60-438d-9103-b0a87eda50a5", "DetectTime": "2023-10-30T14:09:44.169836+02:00", "EventTime": "2023-10-30T14:09:44.169847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Co7jEQvm2DAuPiyvi"]} -{"Format": "IDEA0", "ID": "00b8efda-03f2-4d9b-9ed2-d5a862f846bc", "DetectTime": "2023-10-30T14:09:44.186027+02:00", "EventTime": "2023-10-30T14:09:44.186043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C6gNA12uCKblMFdPbf"]} -{"Format": "IDEA0", "ID": "bda32392-e763-4487-946a-6e7c7f54072f", "DetectTime": "2023-10-30T14:09:44.202730+02:00", "EventTime": "2023-10-30T14:09:44.202745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CShDaP2ryHG2mcRby7"]} -{"Format": "IDEA0", "ID": "3d02ed0e-e181-43fb-8b07-32d26ce659d8", "DetectTime": "2023-10-30T14:09:44.222839+02:00", "EventTime": "2023-10-30T14:09:44.222856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CrbR78TkHbwmJ6a7a"]} -{"Format": "IDEA0", "ID": "33e127a2-26b1-4bfd-b1e7-a56dff921f73", "DetectTime": "2023-10-30T14:09:44.245774+02:00", "EventTime": "2023-10-30T14:09:44.245790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C8pT0D2ZYfDJUyrkVg"]} -{"Format": "IDEA0", "ID": "94551969-8fb9-4922-af8d-e78e77460907", "DetectTime": "2023-10-30T14:09:44.266442+02:00", "EventTime": "2023-10-30T14:09:44.266459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CclCDC3M19SIVv8axf"]} -{"Format": "IDEA0", "ID": "c04adeca-b7d0-47a3-a6e8-8629f8eea3c0", "DetectTime": "2023-10-30T14:09:44.288484+02:00", "EventTime": "2023-10-30T14:09:44.288501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CPb9mO2obkp5DOK4rl"]} -{"Format": "IDEA0", "ID": "f903347c-12c2-42ee-b560-d2385b4feaa7", "DetectTime": "2023-10-30T14:09:44.309803+02:00", "EventTime": "2023-10-30T14:09:44.309819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPJEmK3VFKH6tFAKi9"]} -{"Format": "IDEA0", "ID": "43d7429a-3e5a-4a15-b694-0a56f6986263", "DetectTime": "2023-10-30T14:09:44.326204+02:00", "EventTime": "2023-10-30T14:09:44.326220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CoqLSo4wcuUtR0lvkf"]} -{"Format": "IDEA0", "ID": "cc9b1756-037a-4d35-9460-da38c0b92e62", "DetectTime": "2023-10-30T14:09:44.346659+02:00", "EventTime": "2023-10-30T14:09:44.346671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRkbEW2ogy8RdVWIm9"]} -{"Format": "IDEA0", "ID": "0715dd6f-7710-483e-9135-f76805041b91", "DetectTime": "2023-10-30T14:09:44.364418+02:00", "EventTime": "2023-10-30T14:09:44.364430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CJQIgV1wMRhv4Uk2Me"]} -{"Format": "IDEA0", "ID": "3f48c655-85ea-42d8-83a6-179e6db98edc", "DetectTime": "2023-10-30T14:09:44.382119+02:00", "EventTime": "2023-10-30T14:09:44.382131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C2fxiACmIKbc8URY7"]} -{"Format": "IDEA0", "ID": "ad5532b6-e634-4591-80f8-049bce8b081d", "DetectTime": "2023-10-30T14:09:44.397885+02:00", "EventTime": "2023-10-30T14:09:44.397896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C3CBG73zXbgwYRO6mc"]} -{"Format": "IDEA0", "ID": "c6804dd7-ecc9-4d9f-9e68-e801f26fc43b", "DetectTime": "2023-10-30T14:09:44.412909+02:00", "EventTime": "2023-10-30T14:09:44.412920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CluoR14a7BM1sx6R9"]} -{"Format": "IDEA0", "ID": "06fc7225-0ce0-482c-82a8-cfa725347ed6", "DetectTime": "2023-10-30T14:09:44.499814+02:00", "EventTime": "2023-10-30T14:09:44.499832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CdPENS2osuGyeSowN3"]} -{"Format": "IDEA0", "ID": "a0a7d5c0-5086-4d19-a039-5b6a681ff58c", "DetectTime": "2023-10-30T14:09:44.521377+02:00", "EventTime": "2023-10-30T14:09:44.521395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cc0Q4V2wkriLlMG8Bc"]} -{"Format": "IDEA0", "ID": "5981a06e-2ee2-4268-8e5c-2eee52de407f", "DetectTime": "2023-10-30T14:09:44.539590+02:00", "EventTime": "2023-10-30T14:09:44.539605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CN88cQ2gLkhzPT9Vr3"]} -{"Format": "IDEA0", "ID": "a555c166-3a35-4d8b-b220-0bccf3473a68", "DetectTime": "2023-10-30T14:09:44.559925+02:00", "EventTime": "2023-10-30T14:09:44.559941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CHwgt02puJB2mK85b4"]} -{"Format": "IDEA0", "ID": "4cdb172a-76ab-44fe-b61c-ad09ea460efb", "DetectTime": "2023-10-30T14:09:44.581484+02:00", "EventTime": "2023-10-30T14:09:44.581495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cktb3DAlfiYjVTdz1"]} -{"Format": "IDEA0", "ID": "aef8d66a-a1d2-47dc-93b1-89ba30645b52", "DetectTime": "2023-10-30T14:09:44.599171+02:00", "EventTime": "2023-10-30T14:09:44.599186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CY3N2C36gWRUw8y12d"]} -{"Format": "IDEA0", "ID": "b8206e2e-c4e0-4ac5-ba86-fbb6bb896f30", "DetectTime": "2023-10-30T14:09:44.620025+02:00", "EventTime": "2023-10-30T14:09:44.620037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CdV2WK24ejomBeSP5e"]} -{"Format": "IDEA0", "ID": "be5bccda-94c4-4de7-b6c0-ce6c70eb9144", "DetectTime": "2023-10-30T14:09:44.638095+02:00", "EventTime": "2023-10-30T14:09:44.638110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cjx6p33jYgmPza0jK2"]} -{"Format": "IDEA0", "ID": "76083c4f-8d7f-4d63-8020-f44810f15f52", "DetectTime": "2023-10-30T14:09:44.657919+02:00", "EventTime": "2023-10-30T14:09:44.657935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C5Qlp51w9GWNevhs38"]} -{"Format": "IDEA0", "ID": "f9ce0719-9e74-4713-85cd-93cab7c0af47", "DetectTime": "2023-10-30T14:09:44.680092+02:00", "EventTime": "2023-10-30T14:09:44.680107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CRHW0E45pQekPbiaD2"]} -{"Format": "IDEA0", "ID": "da4c4ced-5f0b-4c2d-bdef-dd3eb03838c2", "DetectTime": "2023-10-30T14:09:44.702623+02:00", "EventTime": "2023-10-30T14:09:44.702639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["C8FCB74Izjvl0N4D6k"]} -{"Format": "IDEA0", "ID": "6377e82f-56b9-48e8-adb9-e804b531e013", "DetectTime": "2023-10-30T14:09:44.722706+02:00", "EventTime": "2023-10-30T14:09:44.722716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["C8dODg1sIhcRxxa5"]} -{"Format": "IDEA0", "ID": "526d82aa-dcd2-4a7a-b476-354d496ebab2", "DetectTime": "2023-10-30T14:09:44.740798+02:00", "EventTime": "2023-10-30T14:09:44.740816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["Cq9we54gvfc8KRHzAi"]} -{"Format": "IDEA0", "ID": "20c4daa8-3d33-4b4e-86ac-0a3afc8af0ca", "DetectTime": "2023-10-30T14:09:44.760802+02:00", "EventTime": "2023-10-30T14:09:44.760812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CvyhxF3pocnFXHCW85"]} -{"Format": "IDEA0", "ID": "ef1fe7da-f94d-486b-8c3a-38a663c36c84", "DetectTime": "2023-10-30T14:09:44.777802+02:00", "EventTime": "2023-10-30T14:09:44.777815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CkyVOQ2zAMbvfb6N22"]} -{"Format": "IDEA0", "ID": "ca582f07-867b-4094-836c-e047484fe3a2", "DetectTime": "2023-10-30T14:09:44.795684+02:00", "EventTime": "2023-10-30T14:09:44.795701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["C3otN414t8qA2qf2d"]} -{"Format": "IDEA0", "ID": "a03138cf-595a-4fce-adfb-9a9a725a2500", "DetectTime": "2023-10-30T14:09:44.815287+02:00", "EventTime": "2023-10-30T14:09:44.815300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CbrYKr45gEYmkBQ2u4"]} -{"Format": "IDEA0", "ID": "b441dd4d-ddc4-4fd5-8722-34c83fd6ceaa", "DetectTime": "2023-10-30T14:09:44.832947+02:00", "EventTime": "2023-10-30T14:09:44.832957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CwW6ljS0BXdbWYah6"]} -{"Format": "IDEA0", "ID": "3979016b-2a14-4723-9bda-51292abd29c9", "DetectTime": "2023-10-30T14:09:44.851620+02:00", "EventTime": "2023-10-30T14:09:44.851631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["C5JimX1Jk9irjscLYj"]} -{"Format": "IDEA0", "ID": "54bea8db-bca5-4f13-a100-5cbbd1601574", "DetectTime": "2023-10-30T14:09:44.869287+02:00", "EventTime": "2023-10-30T14:09:44.869303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Ca3ar32uTJOEbvMRa4"]} -{"Format": "IDEA0", "ID": "463b13bf-3e31-44af-b18c-8da492f02da3", "DetectTime": "2023-10-30T14:09:44.889257+02:00", "EventTime": "2023-10-30T14:09:44.889273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["C3gcPCk1Mff02Zs09"]} -{"Format": "IDEA0", "ID": "6e3031fe-a33e-4642-9690-3a3e6f661536", "DetectTime": "2023-10-30T14:09:44.906424+02:00", "EventTime": "2023-10-30T14:09:44.906435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CJoruO1ivi6MXVpFm9"]} -{"Format": "IDEA0", "ID": "0e074191-c838-4fb9-943b-6dcb57d0b1c6", "DetectTime": "2023-10-30T14:09:44.926532+02:00", "EventTime": "2023-10-30T14:09:44.926545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVTWdc3bbsFVrNou88"]} -{"Format": "IDEA0", "ID": "09c6ad4e-43a3-4d22-916a-338b5e2c72e3", "DetectTime": "2023-10-30T14:09:44.948377+02:00", "EventTime": "2023-10-30T14:09:44.948393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CSoQQezPghKAVhUr4"]} -{"Format": "IDEA0", "ID": "8a1a9cab-1841-4f54-9c03-e17eb06c5b87", "DetectTime": "2023-10-30T14:09:44.967840+02:00", "EventTime": "2023-10-30T14:09:44.967857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CVM89U3bE6rpNl9Oqc"]} -{"Format": "IDEA0", "ID": "ccb65350-3bf6-48f9-8821-6f2320da8caa", "DetectTime": "2023-10-30T14:09:44.985744+02:00", "EventTime": "2023-10-30T14:09:44.985763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CYyNRm4EfZSu5I3Tja"]} -{"Format": "IDEA0", "ID": "d25c1904-d2a3-4ca7-a395-4669d0af2671", "DetectTime": "2023-10-30T14:09:45.003817+02:00", "EventTime": "2023-10-30T14:09:45.003828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cx6aGq1yHDqQ3uJYbg"]} -{"Format": "IDEA0", "ID": "03d2c974-07f1-4063-98ea-2a71134d1dd1", "DetectTime": "2023-10-30T14:09:45.024180+02:00", "EventTime": "2023-10-30T14:09:45.024192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CnlmT025BRMwpgc6H7"]} -{"Format": "IDEA0", "ID": "d73a28e2-1064-4457-8185-dfc45d1884eb", "DetectTime": "2023-10-30T14:09:45.044716+02:00", "EventTime": "2023-10-30T14:09:45.044756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["COzgTi2qvAVu3Ia33b"]} -{"Format": "IDEA0", "ID": "e8931a80-3ca6-4562-9d42-adab2132946b", "DetectTime": "2023-10-30T14:09:45.065222+02:00", "EventTime": "2023-10-30T14:09:45.065239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CEHwA34gokAmnEqoWd"]} -{"Format": "IDEA0", "ID": "7181edc9-cc2b-440f-ae9e-6d34543b8648", "DetectTime": "2023-10-30T14:09:45.091341+02:00", "EventTime": "2023-10-30T14:09:45.091353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CCklwz3G4B0DFYAya7"]} -{"Format": "IDEA0", "ID": "3a4ce454-da83-4930-a171-c65a653e334b", "DetectTime": "2023-10-30T14:09:45.109431+02:00", "EventTime": "2023-10-30T14:09:45.109455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CIo5Wz2c0EOouPlXEi"]} -{"Format": "IDEA0", "ID": "a758e085-215c-4f64-9d63-be702436970d", "DetectTime": "2023-10-30T14:09:45.125439+02:00", "EventTime": "2023-10-30T14:09:45.125458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CfK3Si2L0o4u1PysWb"]} -{"Format": "IDEA0", "ID": "6c15f812-d72d-4f77-a1ad-0a0f0c1375a6", "DetectTime": "2023-10-30T14:09:45.146966+02:00", "EventTime": "2023-10-30T14:09:45.146983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["ColD754ZWm87y9nhMi"]} -{"Format": "IDEA0", "ID": "12995be6-326c-4e57-b777-03141489294a", "DetectTime": "2023-10-30T14:09:45.171634+02:00", "EventTime": "2023-10-30T14:09:45.171661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CiDUMj3BzHPMLca1n2"]} -{"Format": "IDEA0", "ID": "1243562b-e21d-45aa-9f73-cf8a44bee3e8", "DetectTime": "2023-10-30T14:09:45.195284+02:00", "EventTime": "2023-10-30T14:09:45.195300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["Cd8CdK2dy2EsxBdaIk"]} -{"Format": "IDEA0", "ID": "2f453067-109d-428d-8047-e92bc4d0add0", "DetectTime": "2023-10-30T14:09:45.214909+02:00", "EventTime": "2023-10-30T14:09:45.214922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CvQjKu4ceF6D6F3the"]} -{"Format": "IDEA0", "ID": "dbdd45ae-a9aa-4b93-b643-87e2dcbbca8e", "DetectTime": "2023-10-30T14:09:45.232529+02:00", "EventTime": "2023-10-30T14:09:45.232539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C6XEsc3oKX7FTLho3j"]} -{"Format": "IDEA0", "ID": "634236aa-b6c5-46d5-9280-98bfb5ac155c", "DetectTime": "2023-10-30T14:09:45.251779+02:00", "EventTime": "2023-10-30T14:09:45.251792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CQKgl91LuHTk46vWml"]} -{"Format": "IDEA0", "ID": "5f524d7d-cb51-4acb-878c-3580927b2c2b", "DetectTime": "2023-10-30T14:09:45.269853+02:00", "EventTime": "2023-10-30T14:09:45.269864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CGpr003BB2DMPw6Lw7"]} -{"Format": "IDEA0", "ID": "da98d89c-cdf4-47ad-8a9c-1ab2fe454219", "DetectTime": "2023-10-30T14:09:45.288392+02:00", "EventTime": "2023-10-30T14:09:45.288404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C1Rzc1REbVnvBrr93"]} -{"Format": "IDEA0", "ID": "1516edd4-f22e-4850-9059-61eb7d33ac9e", "DetectTime": "2023-10-30T14:09:45.304976+02:00", "EventTime": "2023-10-30T14:09:45.304987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Csbtut4Jq6tZlovoX5"]} -{"Format": "IDEA0", "ID": "4a3dcb12-c5a4-4130-bda8-c376cd1f0f5d", "DetectTime": "2023-10-30T14:09:45.322890+02:00", "EventTime": "2023-10-30T14:09:45.322909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CwHRyb3U5joc2sobSg"]} -{"Format": "IDEA0", "ID": "ba3c08ef-cc4c-4e64-a1e4-0ddbda2164f7", "DetectTime": "2023-10-30T14:09:45.343339+02:00", "EventTime": "2023-10-30T14:09:45.343358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CTaAnjlEVe9spdaFd"]} -{"Format": "IDEA0", "ID": "7febf082-e272-488e-bcef-49b0b55cb69e", "DetectTime": "2023-10-30T14:09:45.365290+02:00", "EventTime": "2023-10-30T14:09:45.365306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CpRzXR26jd3hWe50V"]} -{"Format": "IDEA0", "ID": "eecc257b-c4bf-4d5d-b603-f9b5426bb1c2", "DetectTime": "2023-10-30T14:09:45.385777+02:00", "EventTime": "2023-10-30T14:09:45.385789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CjWSR94wFbZi4VtSP4"]} -{"Format": "IDEA0", "ID": "ff63d1c6-ef27-4d19-8dfc-cd4012c1fae7", "DetectTime": "2023-10-30T14:09:45.407137+02:00", "EventTime": "2023-10-30T14:09:45.407154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CjjRre1dVlAVKaYcx1"]} -{"Format": "IDEA0", "ID": "88cd81ec-289d-420e-9823-4f7d8702554f", "DetectTime": "2023-10-30T14:09:45.429177+02:00", "EventTime": "2023-10-30T14:09:45.429196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CqP2Ah3H1zyPRYqKI9"]} -{"Format": "IDEA0", "ID": "e2c5b6cb-24b9-49e0-ac21-0d0012541d4a", "DetectTime": "2023-10-30T14:09:45.451712+02:00", "EventTime": "2023-10-30T14:09:45.451724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cza4LKdro3vb0OJSh"]} -{"Format": "IDEA0", "ID": "5226aebf-472a-450c-84ae-c1f4a00d9f90", "DetectTime": "2023-10-30T14:09:45.471392+02:00", "EventTime": "2023-10-30T14:09:45.471409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1ntV83T4v1BPhvN53"]} -{"Format": "IDEA0", "ID": "14a66376-0996-4576-99f8-a099dab61dbd", "DetectTime": "2023-10-30T14:09:45.490384+02:00", "EventTime": "2023-10-30T14:09:45.490397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Che6L14KeRPaTFwpbf"]} -{"Format": "IDEA0", "ID": "ff3c7328-0475-44c0-9c75-5118690c30b2", "DetectTime": "2023-10-30T14:09:45.506889+02:00", "EventTime": "2023-10-30T14:09:45.506900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CG4AcYmk86jHCrZRj"]} -{"Format": "IDEA0", "ID": "7092e30b-d0b2-4f37-aeac-976d94f38e7f", "DetectTime": "2023-10-30T14:09:45.522355+02:00", "EventTime": "2023-10-30T14:09:45.522366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CFnL9h2AXbErNex8di"]} -{"Format": "IDEA0", "ID": "93d7285d-ff4c-4be0-b426-abb88212c35d", "DetectTime": "2023-10-30T14:09:45.544485+02:00", "EventTime": "2023-10-30T14:09:45.544503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CyKyPZzeePVeUCsZa"]} -{"Format": "IDEA0", "ID": "13a1e139-8503-49d3-aa9d-fe2e5042fb1b", "DetectTime": "2023-10-30T14:09:45.570201+02:00", "EventTime": "2023-10-30T14:09:45.570219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CbOSzo2GCcFhydYhLl"]} -{"Format": "IDEA0", "ID": "e661e416-74c0-48a6-b34e-4e771ae58efa", "DetectTime": "2023-10-30T14:09:45.587525+02:00", "EventTime": "2023-10-30T14:09:45.587536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CQK3IS1JElQg0v4V3j"]} -{"Format": "IDEA0", "ID": "0b01089e-8dd2-43e2-8699-441f09ede9b8", "DetectTime": "2023-10-30T14:09:45.605536+02:00", "EventTime": "2023-10-30T14:09:45.605553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CiNLJu3pMAphnVwVb"]} -{"Format": "IDEA0", "ID": "eee2e720-8c3f-417e-a835-c0c0186079d4", "DetectTime": "2023-10-30T14:09:45.623774+02:00", "EventTime": "2023-10-30T14:09:45.623785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CYPCqp2gAzUIYQ51ca"]} -{"Format": "IDEA0", "ID": "1cd4cbc2-081c-46ee-90c7-0421f14d77a9", "DetectTime": "2023-10-30T14:09:45.643551+02:00", "EventTime": "2023-10-30T14:09:45.643562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CS3GvG3HronbRfChD5"]} -{"Format": "IDEA0", "ID": "169662b3-829d-44e9-a260-33c11cc0c6e5", "DetectTime": "2023-10-30T14:09:45.662292+02:00", "EventTime": "2023-10-30T14:09:45.662308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.206.109.47 ", "ContentType": "text/plain"}], "uids": ["CrnqZNSfJ7izSvnb"]} -{"Format": "IDEA0", "ID": "163c629b-5856-4f72-ace9-ed848bb4e73f", "DetectTime": "2023-10-30T14:09:45.681070+02:00", "EventTime": "2023-10-30T14:09:45.681081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cz0kEC1ECULxdJ6eJh"]} -{"Format": "IDEA0", "ID": "403fe8f4-4362-4901-b301-d07ad0659ff5", "DetectTime": "2023-10-30T14:09:45.699687+02:00", "EventTime": "2023-10-30T14:09:45.699699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CUkRdz2SO9HaLmC2S"]} -{"Format": "IDEA0", "ID": "e2418c1a-c79f-41fe-86d5-cbe6ceb3b56a", "DetectTime": "2023-10-30T14:09:45.718568+02:00", "EventTime": "2023-10-30T14:09:45.718579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cb328ku86DJWGB6Tl"]} -{"Format": "IDEA0", "ID": "ebaf2abc-ebab-4e34-946f-fa11338b95df", "DetectTime": "2023-10-30T14:09:45.739524+02:00", "EventTime": "2023-10-30T14:09:45.739540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CFxLkF4t0vo8jCW1hh"]} -{"Format": "IDEA0", "ID": "f3b15422-4b2c-4358-8a82-d15cb3bf2299", "DetectTime": "2023-10-30T14:09:45.765640+02:00", "EventTime": "2023-10-30T14:09:45.765656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CY5hns20M6G00YY0Fb"]} -{"Format": "IDEA0", "ID": "dbcaaad8-aea6-4c80-a465-51b3d2ed4459", "DetectTime": "2023-10-30T14:09:45.788553+02:00", "EventTime": "2023-10-30T14:09:45.788569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C5EG1O3ctwUdNCoQBb"]} -{"Format": "IDEA0", "ID": "1f17e9bd-baa6-4110-b199-dd59b427f8f8", "DetectTime": "2023-10-30T14:09:45.811380+02:00", "EventTime": "2023-10-30T14:09:45.811402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CJAF4s3gY1OcViLsh"]} -{"Format": "IDEA0", "ID": "c2e8be32-b6c8-4039-94e0-c68183f2ae8d", "DetectTime": "2023-10-30T14:09:45.832962+02:00", "EventTime": "2023-10-30T14:09:45.832978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CbYv9t4KqiWfidkjM9"]} -{"Format": "IDEA0", "ID": "61b1c35f-73da-482d-83c4-524a1816ddee", "DetectTime": "2023-10-30T14:09:45.855924+02:00", "EventTime": "2023-10-30T14:09:45.855942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CRwcEI1fuE5oy1HVbc"]} -{"Format": "IDEA0", "ID": "b3d23a82-a518-4f2c-9042-cde16917b0f8", "DetectTime": "2023-10-30T14:09:45.877909+02:00", "EventTime": "2023-10-30T14:09:45.877930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKCsbj1H8Y7xJHnwF8"]} -{"Format": "IDEA0", "ID": "286f39b4-48a3-46fa-aa25-ff635b25dc59", "DetectTime": "2023-10-30T14:09:45.905136+02:00", "EventTime": "2023-10-30T14:09:45.905152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C5H5OKgEcWoxzQFd2"]} -{"Format": "IDEA0", "ID": "fa4173ec-339c-43eb-ae37-3d7f4f96302e", "DetectTime": "2023-10-30T14:09:45.927163+02:00", "EventTime": "2023-10-30T14:09:45.927180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cfv4zb2Yw6KkoxBUAg"]} -{"Format": "IDEA0", "ID": "fad17389-2d3b-46a0-b6ba-1ea8887ce011", "DetectTime": "2023-10-30T14:09:45.949495+02:00", "EventTime": "2023-10-30T14:09:45.949511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CRINWh3yLbpxROr3jd"]} -{"Format": "IDEA0", "ID": "86057734-0733-491d-ad76-26a26ce59a83", "DetectTime": "2023-10-30T14:09:45.973573+02:00", "EventTime": "2023-10-30T14:09:45.973601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CtsPSD3eHBkikV2p0f"]} -{"Format": "IDEA0", "ID": "e601cd37-431c-438a-95a5-e6c90961bc8a", "DetectTime": "2023-10-30T14:09:45.998513+02:00", "EventTime": "2023-10-30T14:09:45.998601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CHgl1G440lwpFnQsI9"]} -{"Format": "IDEA0", "ID": "1765d9d3-5f72-4892-97af-ed8ed6aad4f6", "DetectTime": "2023-10-30T14:09:46.024067+02:00", "EventTime": "2023-10-30T14:09:46.024088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C4yxcR1AgZ80Kg7Bvg"]} -{"Format": "IDEA0", "ID": "ac787d03-bb69-47c3-89f5-c9aec16f1283", "DetectTime": "2023-10-30T14:09:46.046067+02:00", "EventTime": "2023-10-30T14:09:46.046087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CAYppQ10wmhwdbdaie"]} -{"Format": "IDEA0", "ID": "5f7ba5ac-f21a-439d-9c57-37148ba03f15", "DetectTime": "2023-10-30T14:09:46.067545+02:00", "EventTime": "2023-10-30T14:09:46.067556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CbIaA52BI8NiZOrCzf"]} -{"Format": "IDEA0", "ID": "67ea7983-706b-4022-96ea-8c613c4ca29e", "DetectTime": "2023-10-30T14:09:46.087726+02:00", "EventTime": "2023-10-30T14:09:46.087737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CUOi6f3chdhE4Nt8Qh"]} -{"Format": "IDEA0", "ID": "885c20cb-6bed-4c21-988d-d72dc0293ae0", "DetectTime": "2023-10-30T14:09:46.106914+02:00", "EventTime": "2023-10-30T14:09:46.106932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CeFsCgi8OEcvoUyZ"]} -{"Format": "IDEA0", "ID": "a5e5bab0-f154-4f05-8eb2-931a2ee55765", "DetectTime": "2023-10-30T14:09:46.128762+02:00", "EventTime": "2023-10-30T14:09:46.128778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CXcWvf0EtWkmLgfQ2"]} -{"Format": "IDEA0", "ID": "580892fe-07eb-4fa9-a85c-db63b0480b0d", "DetectTime": "2023-10-30T14:09:46.151372+02:00", "EventTime": "2023-10-30T14:09:46.151393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CNiuf24LThSIq5rYB5"]} -{"Format": "IDEA0", "ID": "7fb06f6b-0c6d-431a-8614-5ff5a3c2b7b3", "DetectTime": "2023-10-30T14:09:46.174099+02:00", "EventTime": "2023-10-30T14:09:46.174110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cy8yo6220xKanL9jP3"]} -{"Format": "IDEA0", "ID": "4994dad8-7fcb-45a1-bc5e-069de2113356", "DetectTime": "2023-10-30T14:09:46.196840+02:00", "EventTime": "2023-10-30T14:09:46.196854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CZKvwp3hiYGKF7Sm5a"]} -{"Format": "IDEA0", "ID": "339cc9aa-950e-42ba-8aa6-6bd056801d7f", "DetectTime": "2023-10-30T14:09:46.215544+02:00", "EventTime": "2023-10-30T14:09:46.215555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cb0grV1hzRQmNK803k"]} -{"Format": "IDEA0", "ID": "0c80cc32-764d-4ff2-8c1d-22e5e4719227", "DetectTime": "2023-10-30T14:09:46.236202+02:00", "EventTime": "2023-10-30T14:09:46.236215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["ChnPCF34dvXyiQYgCj"]} -{"Format": "IDEA0", "ID": "e03af2ea-413d-4c48-bc15-6a7c98778b7c", "DetectTime": "2023-10-30T14:09:46.254502+02:00", "EventTime": "2023-10-30T14:09:46.254514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cy7N691hgzXZzH54y1"]} -{"Format": "IDEA0", "ID": "a8c42b8a-65e2-4479-a8e2-90e1f709c715", "DetectTime": "2023-10-30T14:09:46.275382+02:00", "EventTime": "2023-10-30T14:09:46.275392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C1Uaz11wx2uY4KvAd3"]} -{"Format": "IDEA0", "ID": "da3e33ce-8965-4936-aa1c-a63861d98daa", "DetectTime": "2023-10-30T14:09:46.291110+02:00", "EventTime": "2023-10-30T14:09:46.291127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CqxjlO3i3OeVceGrKd"]} -{"Format": "IDEA0", "ID": "8119c658-ab3a-4e1b-83d8-a8421538778e", "DetectTime": "2023-10-30T14:09:46.310444+02:00", "EventTime": "2023-10-30T14:09:46.310462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ckni8K2oEBR9Xbmlcg"]} -{"Format": "IDEA0", "ID": "04ac3d2a-b883-4033-8d01-bbdd95191305", "DetectTime": "2023-10-30T14:09:46.328208+02:00", "EventTime": "2023-10-30T14:09:46.328219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CA59uo4Ok1ZgEc14mg"]} -{"Format": "IDEA0", "ID": "7fa4e69b-d105-4d47-ab3e-1bca70ce7a3c", "DetectTime": "2023-10-30T14:09:46.345110+02:00", "EventTime": "2023-10-30T14:09:46.345124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C31QpY2iFQdGJam9k7"]} -{"Format": "IDEA0", "ID": "7f5d6f16-7dae-42e4-8198-f02e124ede71", "DetectTime": "2023-10-30T14:09:46.366047+02:00", "EventTime": "2023-10-30T14:09:46.366059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CSn5DB37XlWYwBxPqc"]} -{"Format": "IDEA0", "ID": "ae03141e-51f7-4ea7-8cbd-5e1ed0f5f8ad", "DetectTime": "2023-10-30T14:09:46.386742+02:00", "EventTime": "2023-10-30T14:09:46.386753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CiuiPl45sijzGhBY43"]} -{"Format": "IDEA0", "ID": "cc4990dd-9416-491a-8128-40aeba30161d", "DetectTime": "2023-10-30T14:09:46.404137+02:00", "EventTime": "2023-10-30T14:09:46.404149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cxp1gs4Npgr8JVtnvc"]} -{"Format": "IDEA0", "ID": "041f933f-e505-4fd7-9594-21361a3f06e6", "DetectTime": "2023-10-30T14:09:46.425654+02:00", "EventTime": "2023-10-30T14:09:46.425670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbKLdG1uMVYRQViH64"]} -{"Format": "IDEA0", "ID": "2e29350f-b4c6-4666-8a32-0a8b35ac6427", "DetectTime": "2023-10-30T14:09:46.445720+02:00", "EventTime": "2023-10-30T14:09:46.445734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CumDTS1eMhuqD7Neq5"]} -{"Format": "IDEA0", "ID": "40d93e11-3695-4545-8dc0-8799711542dd", "DetectTime": "2023-10-30T14:09:46.464737+02:00", "EventTime": "2023-10-30T14:09:46.464753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CofIQ72QBZw5VhwTk3"]} -{"Format": "IDEA0", "ID": "c6cbf12d-a072-4b32-9f01-9e47d86a986d", "DetectTime": "2023-10-30T14:09:46.490746+02:00", "EventTime": "2023-10-30T14:09:46.490762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cp1JrW1sHaH759Ea55"]} -{"Format": "IDEA0", "ID": "b3dc28f2-d9e3-4711-aac7-7889817486d8", "DetectTime": "2023-10-30T14:09:46.507839+02:00", "EventTime": "2023-10-30T14:09:46.507853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CRa7rYQgSEunU9lTc"]} -{"Format": "IDEA0", "ID": "80518e73-dd59-4e01-8e37-0a3dd21f9daf", "DetectTime": "2023-10-30T14:09:46.528759+02:00", "EventTime": "2023-10-30T14:09:46.528775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CPvvoH2huXL7Ff6vu"]} -{"Format": "IDEA0", "ID": "5561c3f2-5be9-48ff-ab62-a747c5f07f69", "DetectTime": "2023-10-30T14:09:46.548289+02:00", "EventTime": "2023-10-30T14:09:46.548306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CiqKuPKALyb5LzUv7"]} -{"Format": "IDEA0", "ID": "d1fff8a7-2a53-42b0-9b12-0cdd63d4f7f6", "DetectTime": "2023-10-30T14:09:46.568958+02:00", "EventTime": "2023-10-30T14:09:46.568970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CymtRi4NQnm3q3Yvc7"]} -{"Format": "IDEA0", "ID": "c1a7d833-3a45-4785-900e-b046f65705e0", "DetectTime": "2023-10-30T14:09:46.590365+02:00", "EventTime": "2023-10-30T14:09:46.590382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C8XXAa4ahcYHZlfiwj"]} -{"Format": "IDEA0", "ID": "e20ee8f8-e3d2-4067-b73e-d89cf84f9f2d", "DetectTime": "2023-10-30T14:09:46.607222+02:00", "EventTime": "2023-10-30T14:09:46.607233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CIFgn33QZyMWTwg7Wf"]} -{"Format": "IDEA0", "ID": "eddfcca0-95bb-4bd5-9026-c86a3f22a786", "DetectTime": "2023-10-30T14:09:46.623391+02:00", "EventTime": "2023-10-30T14:09:46.623408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CVvobW2112cO4wIKAk"]} -{"Format": "IDEA0", "ID": "8623fd40-3e23-4a0f-9b08-18025c37a4a5", "DetectTime": "2023-10-30T14:09:46.642517+02:00", "EventTime": "2023-10-30T14:09:46.642532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CN1f4f49ewh0j3m5l2"]} -{"Format": "IDEA0", "ID": "97da4504-39e9-422d-bb03-bc08f7fc625c", "DetectTime": "2023-10-30T14:09:46.662673+02:00", "EventTime": "2023-10-30T14:09:46.662684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["COdzAK2HgdODp4PVF3"]} -{"Format": "IDEA0", "ID": "57c720f2-f17d-41d6-a143-2606823a6839", "DetectTime": "2023-10-30T14:09:46.678725+02:00", "EventTime": "2023-10-30T14:09:46.678740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CEZrFD3MPJ5JsakT0h"]} -{"Format": "IDEA0", "ID": "02bce8fa-179e-4795-bf0e-d1eafd80098c", "DetectTime": "2023-10-30T14:09:46.694653+02:00", "EventTime": "2023-10-30T14:09:46.694664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CaEZ3k43LqrGkzJzN5"]} -{"Format": "IDEA0", "ID": "b655910c-cb46-4ded-a431-692535daa099", "DetectTime": "2023-10-30T14:09:46.711318+02:00", "EventTime": "2023-10-30T14:09:46.711330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cmgua54H8aghuNq3K5"]} -{"Format": "IDEA0", "ID": "f65a77bc-3bc8-4843-8884-1c62c46c60a0", "DetectTime": "2023-10-30T14:09:46.728964+02:00", "EventTime": "2023-10-30T14:09:46.728980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C0jhKV3fJ0IKDbHRRj"]} -{"Format": "IDEA0", "ID": "31047879-ee99-4ead-8e24-795d607bfb55", "DetectTime": "2023-10-30T14:09:46.748848+02:00", "EventTime": "2023-10-30T14:09:46.748859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CBlcZo2YsrJMW8IBC7"]} -{"Format": "IDEA0", "ID": "97fe430c-f59e-4715-9b4f-6df10e59bb6b", "DetectTime": "2023-10-30T14:09:46.765840+02:00", "EventTime": "2023-10-30T14:09:46.765852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CWIahGIhZMcw5tjki"]} -{"Format": "IDEA0", "ID": "dc0a5bf9-caec-41b8-9563-a766d802923e", "DetectTime": "2023-10-30T14:09:46.786003+02:00", "EventTime": "2023-10-30T14:09:46.786028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CbZrf91yMjgkskQ7M3"]} -{"Format": "IDEA0", "ID": "1642c6c1-e41b-4a99-b665-72d69a388474", "DetectTime": "2023-10-30T14:09:46.806532+02:00", "EventTime": "2023-10-30T14:09:46.806547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CTinEuoEDcPWUMSd2"]} -{"Format": "IDEA0", "ID": "8d8bc707-2e37-43a1-934f-61e297e915b4", "DetectTime": "2023-10-30T14:09:46.825482+02:00", "EventTime": "2023-10-30T14:09:46.825494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CnRt9s4QP7weOQQgUk"]} -{"Format": "IDEA0", "ID": "8cb10e7d-832b-40d0-8afd-9511831d8f0e", "DetectTime": "2023-10-30T14:09:46.844333+02:00", "EventTime": "2023-10-30T14:09:46.844344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CgA6Ak4541UtjSsDD5"]} -{"Format": "IDEA0", "ID": "19f6ca2c-8e1d-4944-97c5-59762b402515", "DetectTime": "2023-10-30T14:09:46.862566+02:00", "EventTime": "2023-10-30T14:09:46.862583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CxJo7e4udehOhYdlh1"]} -{"Format": "IDEA0", "ID": "764fad32-d956-4d56-a69d-e1c646141af5", "DetectTime": "2023-10-30T14:09:46.883496+02:00", "EventTime": "2023-10-30T14:09:46.883509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C3Rwlf2v9DeGJ8nn1l"]} -{"Format": "IDEA0", "ID": "f818a303-fd06-4994-8dbf-e267c1f3fa7c", "DetectTime": "2023-10-30T14:09:46.902816+02:00", "EventTime": "2023-10-30T14:09:46.902834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C8wyeYPiq5npzlYIi"]} -{"Format": "IDEA0", "ID": "4831a9e5-af3c-40d1-b602-3077e4f435bf", "DetectTime": "2023-10-30T14:09:46.920804+02:00", "EventTime": "2023-10-30T14:09:46.920821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CppSHv3pZiRFEGsye4"]} -{"Format": "IDEA0", "ID": "d68eb9e4-b0c1-496e-bfb8-ae6cd4eaf349", "DetectTime": "2023-10-30T14:09:46.938722+02:00", "EventTime": "2023-10-30T14:09:46.938739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CJN3hB2WjYt4HxPqT6"]} -{"Format": "IDEA0", "ID": "f38f7118-5d10-4460-a262-b153e9c944d8", "DetectTime": "2023-10-30T14:09:46.961351+02:00", "EventTime": "2023-10-30T14:09:46.961367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CWPZD5pQHH9ONhFw3"]} -{"Format": "IDEA0", "ID": "c6cd93cf-88d0-40fd-8b87-d97f4854ca85", "DetectTime": "2023-10-30T14:09:46.982028+02:00", "EventTime": "2023-10-30T14:09:46.982040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CAZUbl4mxF0pyjEo82"]} -{"Format": "IDEA0", "ID": "2bdb7b8a-5b7c-4465-821b-40250c2b1d85", "DetectTime": "2023-10-30T14:09:46.998048+02:00", "EventTime": "2023-10-30T14:09:46.998065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CpTUMf1RTxAHaGkrJc"]} -{"Format": "IDEA0", "ID": "8a418da4-d945-47b2-aa82-973abf84be55", "DetectTime": "2023-10-30T14:09:47.017735+02:00", "EventTime": "2023-10-30T14:09:47.017747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CZlLKP2DnlXw7WOu1k"]} -{"Format": "IDEA0", "ID": "af88057e-4497-4ff4-aff7-f09d5ccc7e33", "DetectTime": "2023-10-30T14:09:47.037853+02:00", "EventTime": "2023-10-30T14:09:47.037869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cfzvfk3NSqKLRZFAjg"]} -{"Format": "IDEA0", "ID": "5bcb4b4e-cffe-4039-a02e-41cbef99618a", "DetectTime": "2023-10-30T14:09:47.055332+02:00", "EventTime": "2023-10-30T14:09:47.055347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CVxeim3yimQ4l04lA2"]} -{"Format": "IDEA0", "ID": "0b551c2f-325c-4997-8337-6f8510740b0a", "DetectTime": "2023-10-30T14:09:47.068857+02:00", "EventTime": "2023-10-30T14:09:47.068867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CXHzBH2z1yFtZFbavg"]} -{"Format": "IDEA0", "ID": "a65e56cd-d4cf-49d7-b86f-022d6183f379", "DetectTime": "2023-10-30T14:09:47.083002+02:00", "EventTime": "2023-10-30T14:09:47.083013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CUOjsN2vAF4PgOzjU1"]} -{"Format": "IDEA0", "ID": "cdb8ba4f-c204-4519-8626-027485f7a8d0", "DetectTime": "2023-10-30T14:09:47.099103+02:00", "EventTime": "2023-10-30T14:09:47.099116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CHQ2fq34T1oR329x6"]} -{"Format": "IDEA0", "ID": "5a907a67-1e93-4e5d-b213-2ad42d21de6a", "DetectTime": "2023-10-30T14:09:47.118549+02:00", "EventTime": "2023-10-30T14:09:47.118565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CVw6g42yA5DjglR9nl"]} -{"Format": "IDEA0", "ID": "5c7317fc-2446-4d91-98b0-1a1c5d9f75e6", "DetectTime": "2023-10-30T14:09:47.136549+02:00", "EventTime": "2023-10-30T14:09:47.136566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CnGC6F2UhJV8vdma8h"]} -{"Format": "IDEA0", "ID": "58c33825-a733-4419-8435-3318b285d567", "DetectTime": "2023-10-30T14:09:47.151519+02:00", "EventTime": "2023-10-30T14:09:47.151532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CrNQWjqJjE1vI7fh"]} -{"Format": "IDEA0", "ID": "23f626da-5179-4252-882b-5614cee8d6cf", "DetectTime": "2023-10-30T14:09:47.166914+02:00", "EventTime": "2023-10-30T14:09:47.166931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C14yrM9d2Qvj9rEa7"]} -{"Format": "IDEA0", "ID": "9aaf7f5f-9a08-419e-a772-a033d5438cc0", "DetectTime": "2023-10-30T14:09:47.185462+02:00", "EventTime": "2023-10-30T14:09:47.185478+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CQcXbB42djw893hvr5"]} -{"Format": "IDEA0", "ID": "7da140d9-7049-403b-a96e-5e600919305d", "DetectTime": "2023-10-30T14:09:47.203139+02:00", "EventTime": "2023-10-30T14:09:47.203157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C042v41PWcoX1cxso1"]} -{"Format": "IDEA0", "ID": "c0cdc927-8ece-4ed7-b20d-21cfb089721d", "DetectTime": "2023-10-30T14:09:47.219238+02:00", "EventTime": "2023-10-30T14:09:47.219250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cis5rd4B7Ex54vpsm8"]} -{"Format": "IDEA0", "ID": "b1e3ebd5-7554-435b-8891-a3611ef9cf4b", "DetectTime": "2023-10-30T14:09:47.231385+02:00", "EventTime": "2023-10-30T14:09:47.231396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CQqzfY3vxCPlveUA0b"]} -{"Format": "IDEA0", "ID": "4f4b642e-26fe-4ef8-8c18-e41a9eaa0bc8", "DetectTime": "2023-10-30T14:09:47.248493+02:00", "EventTime": "2023-10-30T14:09:47.248506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CEZLwm2XakaoDrslr8"]} -{"Format": "IDEA0", "ID": "39635c43-58bc-47a7-8c3c-836c53404bdb", "DetectTime": "2023-10-30T14:09:47.264920+02:00", "EventTime": "2023-10-30T14:09:47.264936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C2bobP3CghlcVjiw"]} -{"Format": "IDEA0", "ID": "84ad2514-0b24-4843-8268-ef429475f895", "DetectTime": "2023-10-30T14:09:47.282042+02:00", "EventTime": "2023-10-30T14:09:47.282053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["C0YNt46SAfdoMPSSf"]} -{"Format": "IDEA0", "ID": "0daad412-6605-461d-ae2f-4a4210e70726", "DetectTime": "2023-10-30T14:09:47.296998+02:00", "EventTime": "2023-10-30T14:09:47.297008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbA9k23dnwHHcXudih"]} -{"Format": "IDEA0", "ID": "411c88ed-9df5-452f-802e-c009edd2ac3b", "DetectTime": "2023-10-30T14:09:47.309158+02:00", "EventTime": "2023-10-30T14:09:47.309170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CpVsB62dfKRDB9oGW4"]} -{"Format": "IDEA0", "ID": "94ea5c79-7c3b-45b5-99ba-c6f36415d2a5", "DetectTime": "2023-10-30T14:09:47.322738+02:00", "EventTime": "2023-10-30T14:09:47.322748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CIvbgg2x0dzYdO8Odf"]} -{"Format": "IDEA0", "ID": "50127013-55cf-496f-a391-e84a34035ffc", "DetectTime": "2023-10-30T14:09:47.335074+02:00", "EventTime": "2023-10-30T14:09:47.335086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["Cm0Ceu10VAKHfLCiH8"]} -{"Format": "IDEA0", "ID": "cb4c7ad0-b0db-4171-b9de-618d677c3571", "DetectTime": "2023-10-30T14:09:47.352078+02:00", "EventTime": "2023-10-30T14:09:47.352094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cwz1qI2q4utuc78Ob6"]} -{"Format": "IDEA0", "ID": "d49b2310-185e-4e56-9cbe-0875208868f7", "DetectTime": "2023-10-30T14:09:47.369110+02:00", "EventTime": "2023-10-30T14:09:47.369122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4WkmFegLLILXsIRl"]} -{"Format": "IDEA0", "ID": "d9f13937-8f42-4278-b2a1-484ddb110abd", "DetectTime": "2023-10-30T14:09:47.386041+02:00", "EventTime": "2023-10-30T14:09:47.386057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CnVlfG1oszOVRaSWec"]} -{"Format": "IDEA0", "ID": "e4f1175e-c53b-4449-a561-d00970cdc1fa", "DetectTime": "2023-10-30T14:09:47.404774+02:00", "EventTime": "2023-10-30T14:09:47.404789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CCbXtc1vD8kD68V5f"]} -{"Format": "IDEA0", "ID": "3eff7d8d-0ca7-457e-b5c3-e1cd5786ad89", "DetectTime": "2023-10-30T14:09:47.423540+02:00", "EventTime": "2023-10-30T14:09:47.423553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CYYo3p3ixBaIwHbM4c"]} -{"Format": "IDEA0", "ID": "3d46bbce-d001-4663-a8f3-b3701af8ae76", "DetectTime": "2023-10-30T14:09:47.442745+02:00", "EventTime": "2023-10-30T14:09:47.442761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C1mLW63kkdtDvlTvh3"]} -{"Format": "IDEA0", "ID": "df72e7da-a5d3-4c16-86a0-baad5e5d0be3", "DetectTime": "2023-10-30T14:09:47.460732+02:00", "EventTime": "2023-10-30T14:09:47.460743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Co3z422VkEXUOkTVdi"]} -{"Format": "IDEA0", "ID": "8f362abc-161f-4209-8e8b-426f3534d704", "DetectTime": "2023-10-30T14:09:47.477911+02:00", "EventTime": "2023-10-30T14:09:47.477926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["C8Jdub2SNK0LWsRC0c"]} -{"Format": "IDEA0", "ID": "b354529d-62eb-44b8-b69f-16c45393c71d", "DetectTime": "2023-10-30T14:09:47.492191+02:00", "EventTime": "2023-10-30T14:09:47.492201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CfmTUZ27H8Qty7sej8"]} -{"Format": "IDEA0", "ID": "4a1510a2-de1e-46dd-8c25-3a6095f2d889", "DetectTime": "2023-10-30T14:09:47.511294+02:00", "EventTime": "2023-10-30T14:09:47.511310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CPD9Y42aP9HXpPz0Fl"]} -{"Format": "IDEA0", "ID": "fcca2ca8-4bb5-4581-b8cd-bb44928fafa9", "DetectTime": "2023-10-30T14:09:47.529603+02:00", "EventTime": "2023-10-30T14:09:47.529620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CvPwK34yjdSeFZkYx8"]} -{"Format": "IDEA0", "ID": "e81ba7dd-043f-4662-8a44-de86bc3a1fc6", "DetectTime": "2023-10-30T14:09:47.554449+02:00", "EventTime": "2023-10-30T14:09:47.554464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CD0BDFL6Y91WejPsh"]} -{"Format": "IDEA0", "ID": "9444fa0e-d3d4-425d-b509-f27e9972719d", "DetectTime": "2023-10-30T14:09:47.570999+02:00", "EventTime": "2023-10-30T14:09:47.571011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C1EATQ1U84JLgJy1j"]} -{"Format": "IDEA0", "ID": "5d516bea-e2b7-43a0-8342-dc2293bc1449", "DetectTime": "2023-10-30T14:09:47.589507+02:00", "EventTime": "2023-10-30T14:09:47.589523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CxDhaK11ByplSkMBaj"]} -{"Format": "IDEA0", "ID": "b2eed1ab-3a9f-49bf-83af-fd34d108ac93", "DetectTime": "2023-10-30T14:09:47.608487+02:00", "EventTime": "2023-10-30T14:09:47.608503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CKN2UT3f8dG3BGAsCd"]} -{"Format": "IDEA0", "ID": "9804de6b-4678-4208-a19d-12b0f2e65f4f", "DetectTime": "2023-10-30T14:09:47.626707+02:00", "EventTime": "2023-10-30T14:09:47.626723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CB5xIs4UhoChYzuGYi"]} -{"Format": "IDEA0", "ID": "807c8854-a5f6-45b3-abef-ce05a543996e", "DetectTime": "2023-10-30T14:09:47.644025+02:00", "EventTime": "2023-10-30T14:09:47.644035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CLm4s61dqUOWFNMBf9"]} -{"Format": "IDEA0", "ID": "9bc11dff-07d9-456a-8f73-a21796c3952e", "DetectTime": "2023-10-30T14:09:47.661153+02:00", "EventTime": "2023-10-30T14:09:47.661168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CohS7t3SWZbRHpE0y6"]} -{"Format": "IDEA0", "ID": "7a5bc3ac-5ee6-4313-889c-abc09de0d873", "DetectTime": "2023-10-30T14:09:47.677312+02:00", "EventTime": "2023-10-30T14:09:47.677328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CAJqBp4tRqhc1olVQ1"]} -{"Format": "IDEA0", "ID": "e5b65f0e-1149-49a2-a207-18bf90bee3a8", "DetectTime": "2023-10-30T14:09:47.693112+02:00", "EventTime": "2023-10-30T14:09:47.693135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C9H7gS23ABaESxYj6i"]} -{"Format": "IDEA0", "ID": "4351461f-1889-4f85-bfce-03c2d983c07d", "DetectTime": "2023-10-30T14:09:47.709982+02:00", "EventTime": "2023-10-30T14:09:47.709993+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CcXVEM3O5lEgTuOOOi"]} -{"Format": "IDEA0", "ID": "2ea2c723-61f9-402d-84ec-d04ac062719b", "DetectTime": "2023-10-30T14:09:47.729681+02:00", "EventTime": "2023-10-30T14:09:47.729698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C0peBO1qG4rFZoQR8b"]} -{"Format": "IDEA0", "ID": "afcdac36-3f13-4aea-864d-df90ea0d1b6c", "DetectTime": "2023-10-30T14:09:47.747192+02:00", "EventTime": "2023-10-30T14:09:47.747209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CcMNA30Uyt21Sh5q4"]} -{"Format": "IDEA0", "ID": "6fac1085-0a04-4ab1-8d4f-851a2942f4d4", "DetectTime": "2023-10-30T14:09:47.763799+02:00", "EventTime": "2023-10-30T14:09:47.763814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CBFDcK1X8yAwlSD3U4"]} -{"Format": "IDEA0", "ID": "6400e51a-2aa1-4fd7-bc22-2e4ad4217a7d", "DetectTime": "2023-10-30T14:09:47.777829+02:00", "EventTime": "2023-10-30T14:09:47.777841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C8kzObeVnk3cdiZhj"]} -{"Format": "IDEA0", "ID": "8b65212f-54c9-4d2d-a2f8-d8ae26c1b959", "DetectTime": "2023-10-30T14:09:47.795173+02:00", "EventTime": "2023-10-30T14:09:47.795184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C888oD1oQ5k8AqH56k"]} -{"Format": "IDEA0", "ID": "d30912dd-a16e-4ae1-928d-1b19ef3a066d", "DetectTime": "2023-10-30T14:09:47.808630+02:00", "EventTime": "2023-10-30T14:09:47.808641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CqvMn53PxT8rvhUZsj"]} -{"Format": "IDEA0", "ID": "b072bf0f-9f4c-45a1-8714-a0c1f3126dbd", "DetectTime": "2023-10-30T14:09:47.822957+02:00", "EventTime": "2023-10-30T14:09:47.822971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ceo67V2kOugQrDugT2"]} -{"Format": "IDEA0", "ID": "6d0ada4f-e3ae-4bf6-b44e-6d65f44bfadb", "DetectTime": "2023-10-30T14:09:47.839699+02:00", "EventTime": "2023-10-30T14:09:47.839716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCLrL64QkkSDt6w5vl"]} -{"Format": "IDEA0", "ID": "fb966347-9a5e-4348-8a5b-0473c1fd53ad", "DetectTime": "2023-10-30T14:09:47.857370+02:00", "EventTime": "2023-10-30T14:09:47.857383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CWk9O13scvMm5g28fl"]} -{"Format": "IDEA0", "ID": "4aedd216-c93a-437e-b482-c84bdef947ce", "DetectTime": "2023-10-30T14:09:47.875589+02:00", "EventTime": "2023-10-30T14:09:47.875604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CfAWD32FG8ZiftcF3k"]} -{"Format": "IDEA0", "ID": "3b937ac0-cbd6-4dc8-85d0-699768ae8c3d", "DetectTime": "2023-10-30T14:09:47.891187+02:00", "EventTime": "2023-10-30T14:09:47.891203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CvTTKNHTbF7PPLlhc"]} -{"Format": "IDEA0", "ID": "c6fae364-1040-4af6-8d27-a6b32186b851", "DetectTime": "2023-10-30T14:09:47.909795+02:00", "EventTime": "2023-10-30T14:09:47.909810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRtWKa1I4ObqezQ7Ia"]} -{"Format": "IDEA0", "ID": "1769235b-81b2-43ab-81d2-96f5792ee01e", "DetectTime": "2023-10-30T14:09:47.927757+02:00", "EventTime": "2023-10-30T14:09:47.927769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CDJKxn2cRtIssNPvca"]} -{"Format": "IDEA0", "ID": "19e8cfc3-ef99-4bca-a45a-d0410ef24c52", "DetectTime": "2023-10-30T14:09:47.941993+02:00", "EventTime": "2023-10-30T14:09:47.942004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C19bue1sILjdnO8Wa6"]} -{"Format": "IDEA0", "ID": "38b476e2-8175-4211-960d-ce8deeb3211b", "DetectTime": "2023-10-30T14:09:47.956501+02:00", "EventTime": "2023-10-30T14:09:47.956517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C9JkS31bAn8wy8L4Al"]} -{"Format": "IDEA0", "ID": "7a0895a5-e199-4a73-9573-04523e04e33b", "DetectTime": "2023-10-30T14:09:47.974770+02:00", "EventTime": "2023-10-30T14:09:47.974797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cvrxhw2QplFIlvXgXe"]} -{"Format": "IDEA0", "ID": "9f281e4f-1e8c-4200-823b-940ee86ddb32", "DetectTime": "2023-10-30T14:09:47.990770+02:00", "EventTime": "2023-10-30T14:09:47.990796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C0YPez4DpiyXt4Bkuj"]} -{"Format": "IDEA0", "ID": "3b383c1d-bcd2-4a18-a9be-86230fc68758", "DetectTime": "2023-10-30T14:09:48.005736+02:00", "EventTime": "2023-10-30T14:09:48.005755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CEYpw4OtWvNPcGxi"]} -{"Format": "IDEA0", "ID": "ab4dbe97-849e-4f9a-8b49-87c7a45c79f6", "DetectTime": "2023-10-30T14:09:48.023380+02:00", "EventTime": "2023-10-30T14:09:48.023391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSdy5n3YSNvhgXIVti"]} -{"Format": "IDEA0", "ID": "3404da63-1441-4466-9d8b-624aa0ddcb63", "DetectTime": "2023-10-30T14:09:48.037910+02:00", "EventTime": "2023-10-30T14:09:48.037920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CLCDyNm2KTkLmcgLa"]} -{"Format": "IDEA0", "ID": "47be398d-c557-4026-a66d-5102c2ddda04", "DetectTime": "2023-10-30T14:09:48.055810+02:00", "EventTime": "2023-10-30T14:09:48.055826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["COfJiV3gQjAG0yhnE7"]} -{"Format": "IDEA0", "ID": "f5a4df5f-4dc3-48a0-8bd9-254fe7d51f2d", "DetectTime": "2023-10-30T14:09:48.074132+02:00", "EventTime": "2023-10-30T14:09:48.074149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CmEJpv179emTlkuwWl"]} -{"Format": "IDEA0", "ID": "079fc355-40d3-4400-a4ea-2c7fa9a93459", "DetectTime": "2023-10-30T14:09:48.092839+02:00", "EventTime": "2023-10-30T14:09:48.092859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CgSXJB41QEe3NtdNK3"]} -{"Format": "IDEA0", "ID": "389644df-ffb0-4f41-a28e-0703d84b1f14", "DetectTime": "2023-10-30T14:09:48.106452+02:00", "EventTime": "2023-10-30T14:09:48.106469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CkshyuM7hzukUH4Dj"]} -{"Format": "IDEA0", "ID": "c938ea7b-4b9d-4e74-b339-15d5cb96c798", "DetectTime": "2023-10-30T14:09:48.120166+02:00", "EventTime": "2023-10-30T14:09:48.120178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ce1zGnDzipOtAGIab"]} -{"Format": "IDEA0", "ID": "33ce004e-ebec-41c9-a50e-bedabd51467e", "DetectTime": "2023-10-30T14:09:48.133421+02:00", "EventTime": "2023-10-30T14:09:48.133432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CB0rnE45bsn2YiBmDd"]} -{"Format": "IDEA0", "ID": "88b34f79-7e12-4e9d-a5e8-4e12a09fd5b2", "DetectTime": "2023-10-30T14:09:48.150336+02:00", "EventTime": "2023-10-30T14:09:48.150347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C2kOIwqCV2nxJDFW4"]} -{"Format": "IDEA0", "ID": "680bd1aa-c429-439c-9d74-7138a6479205", "DetectTime": "2023-10-30T14:09:48.163506+02:00", "EventTime": "2023-10-30T14:09:48.163523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CX7H7S288YpOcqgXQa"]} -{"Format": "IDEA0", "ID": "7cc835b1-0465-4737-b83b-e55930787e18", "DetectTime": "2023-10-30T14:09:48.179051+02:00", "EventTime": "2023-10-30T14:09:48.179063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["COaWaoTG7hSRmDIqh"]} -{"Format": "IDEA0", "ID": "3f452106-36b9-4330-9a1a-0603cc20074d", "DetectTime": "2023-10-30T14:09:48.194370+02:00", "EventTime": "2023-10-30T14:09:48.194386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["Csam4j4a5S75zdrG7i"]} -{"Format": "IDEA0", "ID": "b0ddeb7c-7ace-4825-9f14-1284836f07f2", "DetectTime": "2023-10-30T14:09:48.213051+02:00", "EventTime": "2023-10-30T14:09:48.213066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CSpuJt2L6Vl4kvwivh"]} -{"Format": "IDEA0", "ID": "f7dc44c3-85e9-4281-bb0a-cf4c4d5e13c8", "DetectTime": "2023-10-30T14:09:48.231278+02:00", "EventTime": "2023-10-30T14:09:48.231293+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CDRbqg2tKtUiLCvR2h"]} -{"Format": "IDEA0", "ID": "e013f593-3474-4826-acfe-ad2969c7990b", "DetectTime": "2023-10-30T14:09:48.250254+02:00", "EventTime": "2023-10-30T14:09:48.250265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKovyH1lBz5Sl4r6Fi"]} -{"Format": "IDEA0", "ID": "89f1cad4-46b5-4cd0-9191-dca73edca204", "DetectTime": "2023-10-30T14:09:48.265174+02:00", "EventTime": "2023-10-30T14:09:48.265187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CJ688zDkmvTe4bLMb"]} -{"Format": "IDEA0", "ID": "c2b7e479-8e98-40fe-8271-daa5bc31d947", "DetectTime": "2023-10-30T14:09:48.280653+02:00", "EventTime": "2023-10-30T14:09:48.280665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["ChIcJzA1FnAG1yVJ1"]} -{"Format": "IDEA0", "ID": "f0355cf2-e0d3-44bc-bd38-270ecaa230ac", "DetectTime": "2023-10-30T14:09:48.294398+02:00", "EventTime": "2023-10-30T14:09:48.294410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CpHHXs3QJiNwCE63e7"]} -{"Format": "IDEA0", "ID": "a9068652-4ada-412a-ba6c-dd8101bf7a95", "DetectTime": "2023-10-30T14:09:48.308826+02:00", "EventTime": "2023-10-30T14:09:48.308837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CjkHoC41LVV6zQd7lh"]} -{"Format": "IDEA0", "ID": "7ac4819d-7807-4e04-813b-569358d1ecbe", "DetectTime": "2023-10-30T14:09:48.323727+02:00", "EventTime": "2023-10-30T14:09:48.323743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CvFC2H3ygT1hbsjZMk"]} -{"Format": "IDEA0", "ID": "09432755-eda9-45e4-be15-c32160ea41c9", "DetectTime": "2023-10-30T14:09:48.344875+02:00", "EventTime": "2023-10-30T14:09:48.344904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CW02J93j4VwoyPmfS7"]} -{"Format": "IDEA0", "ID": "42b47fd6-adf5-41d7-a6e2-8a9e949d8286", "DetectTime": "2023-10-30T14:09:48.360948+02:00", "EventTime": "2023-10-30T14:09:48.360962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CKaf3I2CTynvpnVM17"]} -{"Format": "IDEA0", "ID": "4830cfef-1cc8-44d0-bf26-d6dd423ed076", "DetectTime": "2023-10-30T14:09:48.376497+02:00", "EventTime": "2023-10-30T14:09:48.376512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["C2Uy8Hv6RWesxRVi7"]} -{"Format": "IDEA0", "ID": "370f7473-cd88-49ac-b45d-96446ef01098", "DetectTime": "2023-10-30T14:09:48.391845+02:00", "EventTime": "2023-10-30T14:09:48.391856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CDHoaf4C7PyZwvQsQ5"]} -{"Format": "IDEA0", "ID": "47262e37-c467-4306-aef4-42379746a76d", "DetectTime": "2023-10-30T14:09:48.408896+02:00", "EventTime": "2023-10-30T14:09:48.408908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFlB1L2F9lg6FkqzCd"]} -{"Format": "IDEA0", "ID": "9ba912bf-1a8d-4998-86f3-9151167d51fa", "DetectTime": "2023-10-30T14:09:48.424954+02:00", "EventTime": "2023-10-30T14:09:48.424967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CXz1To3juMw2Vdvkmi"]} -{"Format": "IDEA0", "ID": "70e03897-147f-410f-b30a-c51fa6e25273", "DetectTime": "2023-10-30T14:09:48.439059+02:00", "EventTime": "2023-10-30T14:09:48.439072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CY6gAr15OslOwNYstb"]} -{"Format": "IDEA0", "ID": "eecdaa69-439c-415c-bab7-74308f35e81a", "DetectTime": "2023-10-30T14:09:48.455699+02:00", "EventTime": "2023-10-30T14:09:48.455710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["COAeatJHawoHm5lL4"]} -{"Format": "IDEA0", "ID": "81f41299-b0f9-4da0-a462-ca4805383581", "DetectTime": "2023-10-30T14:09:48.469952+02:00", "EventTime": "2023-10-30T14:09:48.469969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CRCYTN1edLXOAymgY6"]} -{"Format": "IDEA0", "ID": "90940190-68b1-4e22-8096-fcf3706325bb", "DetectTime": "2023-10-30T14:09:48.488638+02:00", "EventTime": "2023-10-30T14:09:48.488650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["COJjDb1T2qdvsovHOg"]} -{"Format": "IDEA0", "ID": "8ceb786d-cabf-42ce-9ec6-b1a6662224bd", "DetectTime": "2023-10-30T14:09:48.502650+02:00", "EventTime": "2023-10-30T14:09:48.502662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Caj77OHnmtjrpR264"]} -{"Format": "IDEA0", "ID": "031fc94b-0f4f-4cfe-8f6f-cead11f40a8e", "DetectTime": "2023-10-30T14:09:48.517706+02:00", "EventTime": "2023-10-30T14:09:48.517721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Cxb1Tu46qmGwwmC4k7"]} -{"Format": "IDEA0", "ID": "852bfa09-26a9-473d-aa24-7c466809865c", "DetectTime": "2023-10-30T14:09:48.532641+02:00", "EventTime": "2023-10-30T14:09:48.532652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C00ao12fUh2INM9Px5"]} -{"Format": "IDEA0", "ID": "68309d27-583a-41ae-8897-04c1368811dd", "DetectTime": "2023-10-30T14:09:48.550043+02:00", "EventTime": "2023-10-30T14:09:48.550061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSYJcf1ldJdPm3UER9"]} -{"Format": "IDEA0", "ID": "aac10934-f9d7-4a3a-887b-968f09d77c41", "DetectTime": "2023-10-30T14:09:48.568133+02:00", "EventTime": "2023-10-30T14:09:48.568146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["Cgm1Zq1eHmwdbXZpWc"]} -{"Format": "IDEA0", "ID": "21beed51-f086-41fb-b5d3-af9dfe13efd2", "DetectTime": "2023-10-30T14:09:48.587620+02:00", "EventTime": "2023-10-30T14:09:48.587637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C5zm4SeiGxXpaGCYf"]} -{"Format": "IDEA0", "ID": "e5fe673b-d738-4304-bf5c-ba8526a6b70c", "DetectTime": "2023-10-30T14:09:48.602923+02:00", "EventTime": "2023-10-30T14:09:48.602936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C4j0iC16O0XbXpeqw2"]} -{"Format": "IDEA0", "ID": "ca547600-5294-432e-a13d-f937cb3dc8f8", "DetectTime": "2023-10-30T14:09:48.618234+02:00", "EventTime": "2023-10-30T14:09:48.618251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CQe5pEepzQtUI1Rzc"]} -{"Format": "IDEA0", "ID": "ac3686c1-4ed0-488b-af6b-96f3aebe93dd", "DetectTime": "2023-10-30T14:09:48.632889+02:00", "EventTime": "2023-10-30T14:09:48.632906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CqlWFv3HTooZEZjKKb"]} -{"Format": "IDEA0", "ID": "81fda1d8-03f8-4ff4-aeeb-c9bfb48128ca", "DetectTime": "2023-10-30T14:09:48.653802+02:00", "EventTime": "2023-10-30T14:09:48.653816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CfJzt33XDNLBbGDSW8"]} -{"Format": "IDEA0", "ID": "361df896-fbb7-4407-843d-ea6554c224c9", "DetectTime": "2023-10-30T14:09:48.673297+02:00", "EventTime": "2023-10-30T14:09:48.673308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4zdse28qegutayKHl"]} -{"Format": "IDEA0", "ID": "eb89284f-ff4d-49c5-9be2-e4adca097799", "DetectTime": "2023-10-30T14:09:48.689447+02:00", "EventTime": "2023-10-30T14:09:48.689464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CQ1EU93Bj8YixxTfW"]} -{"Format": "IDEA0", "ID": "049c61e8-52c2-43d4-9ebc-29dc9c3f2f10", "DetectTime": "2023-10-30T14:09:48.706992+02:00", "EventTime": "2023-10-30T14:09:48.707009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CfgOo23VtUaSVhcKn7"]} -{"Format": "IDEA0", "ID": "e6584994-f394-4639-8689-34703fa45c54", "DetectTime": "2023-10-30T14:09:48.726703+02:00", "EventTime": "2023-10-30T14:09:48.726722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CaN3Xa42YDfxatkdF5"]} -{"Format": "IDEA0", "ID": "291d2533-198b-4328-bdf3-3f7f31c5234b", "DetectTime": "2023-10-30T14:09:48.746093+02:00", "EventTime": "2023-10-30T14:09:48.746104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cpyuig1yiqzhoUu4W1"]} -{"Format": "IDEA0", "ID": "1b66685f-14b9-4ed3-b331-0a74e73c7c1e", "DetectTime": "2023-10-30T14:09:48.761267+02:00", "EventTime": "2023-10-30T14:09:48.761279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CoBs9F3jqB1rvhharb"]} -{"Format": "IDEA0", "ID": "17d860ed-2aaf-46f3-898f-783660e2cb43", "DetectTime": "2023-10-30T14:09:48.777837+02:00", "EventTime": "2023-10-30T14:09:48.777854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CDENtWZQHGQnEw9w2"]} -{"Format": "IDEA0", "ID": "b18afc2f-aebb-4822-acc1-766b90951d42", "DetectTime": "2023-10-30T14:09:48.793495+02:00", "EventTime": "2023-10-30T14:09:48.793516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CtuLZibamVhf62Zka"]} -{"Format": "IDEA0", "ID": "2b88ee35-4609-4c2a-9980-83d6fc84f6ff", "DetectTime": "2023-10-30T14:09:48.810170+02:00", "EventTime": "2023-10-30T14:09:48.810183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CsPGE63cuTV2P11kAe"]} -{"Format": "IDEA0", "ID": "ac83f9e1-be61-4eda-ba4d-820af5da7611", "DetectTime": "2023-10-30T14:09:48.824380+02:00", "EventTime": "2023-10-30T14:09:48.824390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cxv3qT1xNsrzz4msW2"]} -{"Format": "IDEA0", "ID": "99f49768-91a2-4837-ad42-d147e1b8c2d2", "DetectTime": "2023-10-30T14:09:48.837777+02:00", "EventTime": "2023-10-30T14:09:48.837789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CtcB3H1xC2oVyOv028"]} -{"Format": "IDEA0", "ID": "9cf150ae-761a-44b5-9434-07ce91cefdc2", "DetectTime": "2023-10-30T14:09:48.855094+02:00", "EventTime": "2023-10-30T14:09:48.855110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C7CucW26Ot3p9czjm2"]} -{"Format": "IDEA0", "ID": "13d47987-2818-46ee-8413-5a2c9bb53821", "DetectTime": "2023-10-30T14:09:48.871483+02:00", "EventTime": "2023-10-30T14:09:48.871496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["CVlKTZ11ud3uTSRbw6"]} -{"Format": "IDEA0", "ID": "4411e797-f2c2-4ecc-bf11-ad11c8cdfd11", "DetectTime": "2023-10-30T14:09:48.890523+02:00", "EventTime": "2023-10-30T14:09:48.890538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["Co4jZ3VyO6HIoOp79"]} -{"Format": "IDEA0", "ID": "bcf55d0e-f6aa-4e9b-86ce-821af55c5332", "DetectTime": "2023-10-30T14:09:48.909549+02:00", "EventTime": "2023-10-30T14:09:48.909565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["C1qrF4ffDmr1yM8Ba"]} -{"Format": "IDEA0", "ID": "32ccfd3e-072f-40e6-a4c3-5c70a8d4b092", "DetectTime": "2023-10-30T14:09:48.931377+02:00", "EventTime": "2023-10-30T14:09:48.931392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cp6TxtCnFRXxZQPv7"]} -{"Format": "IDEA0", "ID": "a08fa6e4-502b-4b92-9ee1-f5646ed1f973", "DetectTime": "2023-10-30T14:09:48.951739+02:00", "EventTime": "2023-10-30T14:09:48.951755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CklVF94pOIVxYPtdZ3"]} -{"Format": "IDEA0", "ID": "117832c8-3f04-417e-bbcd-e89c26d38ff0", "DetectTime": "2023-10-30T14:09:48.972434+02:00", "EventTime": "2023-10-30T14:09:48.972456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cwm9vx3d8k0woZB7cc"]} -{"Format": "IDEA0", "ID": "82d167a2-3d02-45eb-817c-0a345c7072e2", "DetectTime": "2023-10-30T14:09:48.993559+02:00", "EventTime": "2023-10-30T14:09:48.993587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CNHdep2tMASujoSrK6"]} -{"Format": "IDEA0", "ID": "92f65611-ed20-47c3-9f48-ccb24a2b8713", "DetectTime": "2023-10-30T14:09:49.021020+02:00", "EventTime": "2023-10-30T14:09:49.021038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CfJt0v1y31X3upK7s7"]} -{"Format": "IDEA0", "ID": "daec810c-b25c-4f26-96b7-fd3eb6c26d8e", "DetectTime": "2023-10-30T14:09:49.043193+02:00", "EventTime": "2023-10-30T14:09:49.043205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C8yksh1JRSC2MUPKl3"]} -{"Format": "IDEA0", "ID": "6274a038-ad1e-4e68-8683-dabcaa5e92bd", "DetectTime": "2023-10-30T14:09:49.063439+02:00", "EventTime": "2023-10-30T14:09:49.063457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CIEMPa3mi8nj7DUW72"]} -{"Format": "IDEA0", "ID": "ad754c62-1630-44c6-a41e-62eb6b70d092", "DetectTime": "2023-10-30T14:09:49.083939+02:00", "EventTime": "2023-10-30T14:09:49.083956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C1eUf92zWyGnAVJ7ij"]} -{"Format": "IDEA0", "ID": "1f7d4cd4-a349-47a7-9996-6db973018b18", "DetectTime": "2023-10-30T14:09:49.104595+02:00", "EventTime": "2023-10-30T14:09:49.104613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CKjn5l3AMzXFLbokfh"]} -{"Format": "IDEA0", "ID": "300a02ed-4f78-4b71-93a3-973a0ce2cfd3", "DetectTime": "2023-10-30T14:09:49.125869+02:00", "EventTime": "2023-10-30T14:09:49.125890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 125.167.115.164 ", "ContentType": "text/plain"}], "uids": ["COtwxu4VmtsH08GA9e"]} -{"Format": "IDEA0", "ID": "5e794bce-7685-4548-a2ea-60296077bf02", "DetectTime": "2023-10-30T14:09:49.147085+02:00", "EventTime": "2023-10-30T14:09:49.147102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CBJoB41821pT6g8bzc"]} -{"Format": "IDEA0", "ID": "82b677c2-f91b-4e30-847d-3e00a83aa23d", "DetectTime": "2023-10-30T14:09:49.171765+02:00", "EventTime": "2023-10-30T14:09:49.171781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CJg0E7Z2xGRlmQg1"]} -{"Format": "IDEA0", "ID": "0e325035-de52-428f-8319-155eed0f28c1", "DetectTime": "2023-10-30T14:09:49.196701+02:00", "EventTime": "2023-10-30T14:09:49.196712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CHQMb52JL7aY3Qeqdj"]} -{"Format": "IDEA0", "ID": "3adaf236-a376-4eb4-819b-2c2d50e1e8c9", "DetectTime": "2023-10-30T14:09:49.214928+02:00", "EventTime": "2023-10-30T14:09:49.214941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C49zF12GpKyFQ0HnH3"]} -{"Format": "IDEA0", "ID": "e291abc9-e537-4ce2-a7ae-5624ae4efa46", "DetectTime": "2023-10-30T14:09:49.232941+02:00", "EventTime": "2023-10-30T14:09:49.232952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQZNcg2VHThBBNujaf"]} -{"Format": "IDEA0", "ID": "027e1c1b-cf2d-42d4-9096-9a941f54a1bd", "DetectTime": "2023-10-30T14:09:49.252897+02:00", "EventTime": "2023-10-30T14:09:49.252918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CTSfNx20HFRBmgNVL5"]} -{"Format": "IDEA0", "ID": "983e368b-33cc-4434-ba19-a20bccc5fa94", "DetectTime": "2023-10-30T14:09:49.269630+02:00", "EventTime": "2023-10-30T14:09:49.269645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CP8Ga7fLwKMJPkgJg"]} -{"Format": "IDEA0", "ID": "0118eba6-5e90-4589-a74e-6bd9d2ad709e", "DetectTime": "2023-10-30T14:09:49.287072+02:00", "EventTime": "2023-10-30T14:09:49.287086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CV1zpr4SC8OMAj7GD5"]} -{"Format": "IDEA0", "ID": "c9906ac1-32ea-446b-be84-a70332840680", "DetectTime": "2023-10-30T14:09:49.305625+02:00", "EventTime": "2023-10-30T14:09:49.305641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C96JeY2zH8SUyTInM5"]} -{"Format": "IDEA0", "ID": "771a6e7b-15c3-46b1-bf0e-9d2bc9f17934", "DetectTime": "2023-10-30T14:09:49.324838+02:00", "EventTime": "2023-10-30T14:09:49.324854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CHN8ED2yZlkZzse8Ic"]} -{"Format": "IDEA0", "ID": "7b66fc89-6584-492f-92b2-5580286e4f4c", "DetectTime": "2023-10-30T14:09:49.347473+02:00", "EventTime": "2023-10-30T14:09:49.347491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["CznhQQ1FN5DQ4memlg"]} -{"Format": "IDEA0", "ID": "6aab94b7-f107-4c10-bdef-1fb766e14b2b", "DetectTime": "2023-10-30T14:09:49.369484+02:00", "EventTime": "2023-10-30T14:09:49.369512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CznxpT16hGV1vJ1lJ3"]} -{"Format": "IDEA0", "ID": "bf1c3c61-d2d4-4133-a262-62116708e5e1", "DetectTime": "2023-10-30T14:09:49.392622+02:00", "EventTime": "2023-10-30T14:09:49.392633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CsANl72r5Kyy49w9j1"]} -{"Format": "IDEA0", "ID": "1492363a-369a-4ec0-8453-a85b03fe975c", "DetectTime": "2023-10-30T14:09:49.412398+02:00", "EventTime": "2023-10-30T14:09:49.412415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CDZsAj1YwPwGeyVme7"]} -{"Format": "IDEA0", "ID": "f05a085a-dad2-4180-8a09-6504a41ca589", "DetectTime": "2023-10-30T14:09:49.429989+02:00", "EventTime": "2023-10-30T14:09:49.430003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CSrSrF4d8RddmrmhGf"]} -{"Format": "IDEA0", "ID": "ec2a22c4-b07d-451a-8b0f-11520619f4b7", "DetectTime": "2023-10-30T14:09:49.448513+02:00", "EventTime": "2023-10-30T14:09:49.448523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CUhRXC237DJ2u6yDQg"]} -{"Format": "IDEA0", "ID": "da6e4d09-4f67-4e97-9701-f62cac6f8921", "DetectTime": "2023-10-30T14:09:49.465475+02:00", "EventTime": "2023-10-30T14:09:49.465487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C6KA0Z12jXch7oxSH1"]} -{"Format": "IDEA0", "ID": "03e688e1-91a8-49fa-8190-d2ef82caa45b", "DetectTime": "2023-10-30T14:09:49.486393+02:00", "EventTime": "2023-10-30T14:09:49.486411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGiYU53wxc8maChbJ8"]} -{"Format": "IDEA0", "ID": "69698de3-e770-4e6b-a2f5-e1ac5a1b3d76", "DetectTime": "2023-10-30T14:09:49.502801+02:00", "EventTime": "2023-10-30T14:09:49.502818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["ClKaC536pE7s0qQaX4"]} -{"Format": "IDEA0", "ID": "bbf26870-3701-40d3-b769-dbfe385a9ffc", "DetectTime": "2023-10-30T14:09:49.524043+02:00", "EventTime": "2023-10-30T14:09:49.524056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYtAwt4kWGJCQbwGMh"]} -{"Format": "IDEA0", "ID": "b3246a5d-0025-43f5-b181-5604c607e348", "DetectTime": "2023-10-30T14:09:49.541295+02:00", "EventTime": "2023-10-30T14:09:49.541306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cpx7hE3vmAMdb5Mbji"]} -{"Format": "IDEA0", "ID": "2639f982-8a83-44fd-b079-236100d61d65", "DetectTime": "2023-10-30T14:09:49.556571+02:00", "EventTime": "2023-10-30T14:09:49.556590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ceee4K2dwL5jJtya4"]} -{"Format": "IDEA0", "ID": "0637b375-c2b3-4d67-99bd-efd638c58809", "DetectTime": "2023-10-30T14:09:49.572424+02:00", "EventTime": "2023-10-30T14:09:49.572437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CVtWZh2r7Q4hQ9uuSj"]} -{"Format": "IDEA0", "ID": "af9a2580-8da5-4684-98de-48c85fe3fd29", "DetectTime": "2023-10-30T14:09:49.589322+02:00", "EventTime": "2023-10-30T14:09:49.589349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cqj43b2wVzpgaOdz"]} -{"Format": "IDEA0", "ID": "ac7da301-5fd2-45a8-bedc-24e460a74acf", "DetectTime": "2023-10-30T14:09:49.610987+02:00", "EventTime": "2023-10-30T14:09:49.611004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CqmTth4CPPN3idLPE3"]} -{"Format": "IDEA0", "ID": "7c0a71f8-f498-421d-8e1f-d9e5d0424e3c", "DetectTime": "2023-10-30T14:09:49.630547+02:00", "EventTime": "2023-10-30T14:09:49.630559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CyPfZa3QRqMYwbzNz6"]} -{"Format": "IDEA0", "ID": "e0ba82b9-7c9d-4cd9-9296-a77219338d53", "DetectTime": "2023-10-30T14:09:49.647807+02:00", "EventTime": "2023-10-30T14:09:49.647818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CHekzn3vdjANurKUri"]} -{"Format": "IDEA0", "ID": "63e47665-b8b7-4233-9de2-ed1646ac076f", "DetectTime": "2023-10-30T14:09:49.663202+02:00", "EventTime": "2023-10-30T14:09:49.663219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CHbLK83Gx2n1EBepyb"]} -{"Format": "IDEA0", "ID": "82c75ea5-71d0-495f-8dd5-34576b30823b", "DetectTime": "2023-10-30T14:09:49.678573+02:00", "EventTime": "2023-10-30T14:09:49.678585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["Cj77Ij4Qz4tN6RLkp7"]} -{"Format": "IDEA0", "ID": "5f6104f5-4bfe-40cb-baf2-6c3775440f23", "DetectTime": "2023-10-30T14:09:49.695065+02:00", "EventTime": "2023-10-30T14:09:49.695077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CJfLLT1IaXGWGjDc4a"]} -{"Format": "IDEA0", "ID": "beb14c2d-9066-4fe6-9ff8-a967f027c4e2", "DetectTime": "2023-10-30T14:09:49.716474+02:00", "EventTime": "2023-10-30T14:09:49.716491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CPPEq11T7BQVS0Hfng"]} -{"Format": "IDEA0", "ID": "75e84f5c-1663-409c-a797-98de9bac4613", "DetectTime": "2023-10-30T14:09:49.734487+02:00", "EventTime": "2023-10-30T14:09:49.734501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CbiAOWNCsMeyT91A5"]} -{"Format": "IDEA0", "ID": "163d43cd-f3fb-423d-b77f-ee20420f3712", "DetectTime": "2023-10-30T14:09:49.755180+02:00", "EventTime": "2023-10-30T14:09:49.755195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKb9iN2TgPST6R0IBb"]} -{"Format": "IDEA0", "ID": "d70b5bf6-c7fd-4d11-b3da-d7131fea71d6", "DetectTime": "2023-10-30T14:09:49.777201+02:00", "EventTime": "2023-10-30T14:09:49.777213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CX2Wfs2mDpeop8YgN9"]} -{"Format": "IDEA0", "ID": "f7d258e6-1c8c-4d02-bde1-1028ee4b860e", "DetectTime": "2023-10-30T14:09:49.802628+02:00", "EventTime": "2023-10-30T14:09:49.802644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C29wyo2p7j8uOhqo6h"]} -{"Format": "IDEA0", "ID": "8fdb8d41-7ab0-444c-a028-3dc294d709dd", "DetectTime": "2023-10-30T14:09:49.829127+02:00", "EventTime": "2023-10-30T14:09:49.829144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CSrIBhGFsuUOjF8Cd"]} -{"Format": "IDEA0", "ID": "5a98a1a8-deda-4a76-89f7-fca5ef907211", "DetectTime": "2023-10-30T14:09:49.854092+02:00", "EventTime": "2023-10-30T14:09:49.854105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cwwr0g2AYpW0ssx6Y3"]} -{"Format": "Json", "ID": "5a98a1a8-deda-4a76-89f7-fca5ef907211", "DetectTime": "2023-10-30T14:09:49.854092+02:00", "EventTime": "2023-10-30T14:09:49.854105+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T16:32:21.229060+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 135. (real time 2023/10/30 14:09:49.908683)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "26592e07-89ce-441f-80b8-d776cfa85f85", "DetectTime": "2023-10-30T14:09:49.912489+02:00", "EventTime": "2023-10-30T14:09:49.912500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CfGprZ3V7PlVFsDLV6"]} -{"Format": "IDEA0", "ID": "fcb9eefb-781a-46bd-92da-2d13e7f9a648", "DetectTime": "2023-10-30T14:09:49.931955+02:00", "EventTime": "2023-10-30T14:09:49.931966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C4p0vF3wG7HwDTqPVd"]} -{"Format": "IDEA0", "ID": "088fd164-8cab-4e12-9378-7f0dbca904d9", "DetectTime": "2023-10-30T14:09:49.949742+02:00", "EventTime": "2023-10-30T14:09:49.949755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["C22o0SNG9yKCc5BCj"]} -{"Format": "IDEA0", "ID": "27c59398-6052-4fa0-b8a6-271486fc23c7", "DetectTime": "2023-10-30T14:09:49.968214+02:00", "EventTime": "2023-10-30T14:09:49.968227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C9lZF246dPpYV8OPac"]} -{"Format": "IDEA0", "ID": "ac2255b9-be91-4d63-937f-09f212b99413", "DetectTime": "2023-10-30T14:09:49.985756+02:00", "EventTime": "2023-10-30T14:09:49.985766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CoeZDF3cCJJ692kMLj"]} -{"Format": "IDEA0", "ID": "708363ce-2905-421d-bff1-b09b2590a2fd", "DetectTime": "2023-10-30T14:09:50.004253+02:00", "EventTime": "2023-10-30T14:09:50.004264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C1fkd32nwYLsTXTFG6"]} -{"Format": "IDEA0", "ID": "4221530f-f3a7-4616-87dd-c620e0ea9269", "DetectTime": "2023-10-30T14:09:50.023121+02:00", "EventTime": "2023-10-30T14:09:50.023139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CSO4TF3lFqip8Tyh5f"]} -{"Format": "IDEA0", "ID": "44ea9650-b915-4075-97c4-1204f36acd88", "DetectTime": "2023-10-30T14:09:50.040019+02:00", "EventTime": "2023-10-30T14:09:50.040030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CBsqkNEzSmoKEe0s"]} -{"Format": "Json", "ID": "44ea9650-b915-4075-97c4-1204f36acd88", "DetectTime": "2023-10-30T14:09:50.040019+02:00", "EventTime": "2023-10-30T14:09:50.040030+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T16:32:23.234339+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 135. (real time 2023/10/30 14:09:50.088938)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6e5cc69b-3f03-495d-bc7d-6701bdee3309", "DetectTime": "2023-10-30T14:09:50.094268+02:00", "EventTime": "2023-10-30T14:09:50.094284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CwMXn33VweRQ8cKG73"]} -{"Format": "IDEA0", "ID": "9d700b99-6176-49c6-8355-4eb939fdf1b8", "DetectTime": "2023-10-30T14:09:50.111748+02:00", "EventTime": "2023-10-30T14:09:50.111760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CAZo2k2t1Td3JOkv41"]} -{"Format": "IDEA0", "ID": "eb14a68a-9a41-4f86-afcd-86c47e0a91ea", "DetectTime": "2023-10-30T14:09:50.129149+02:00", "EventTime": "2023-10-30T14:09:50.129160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CoASh04gL70hZfHp07"]} -{"Format": "IDEA0", "ID": "31f5f112-cd0e-4650-ab4b-5a480d4a965a", "DetectTime": "2023-10-30T14:09:50.220840+02:00", "EventTime": "2023-10-30T14:09:50.220858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CHAnSZCGWSf8x2C6l"]} -{"Format": "IDEA0", "ID": "b9b7d2a8-d61b-4db1-96fd-5d1761d99f8e", "DetectTime": "2023-10-30T14:09:50.240461+02:00", "EventTime": "2023-10-30T14:09:50.240479+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CLVmjgPJQlSfq09Pc"]} -{"Format": "IDEA0", "ID": "49fe01f5-6013-4c42-94fc-a5e19a79cacf", "DetectTime": "2023-10-30T14:09:50.263883+02:00", "EventTime": "2023-10-30T14:09:50.263896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C0jCVZ2qaANBKsQ8H8"]} -{"Format": "IDEA0", "ID": "48afe09e-245f-4181-9f20-87f8dc9d4458", "DetectTime": "2023-10-30T14:09:50.281161+02:00", "EventTime": "2023-10-30T14:09:50.281173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDLXRQ3klbIJqiWTle"]} -{"Format": "IDEA0", "ID": "4d840e54-3f33-416e-97b5-2808c58a2edc", "DetectTime": "2023-10-30T14:09:50.296295+02:00", "EventTime": "2023-10-30T14:09:50.296306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CUXaSs1RKkHp8Lhwti"]} -{"Format": "IDEA0", "ID": "63039d9a-60bd-4de0-b5c8-236c61415989", "DetectTime": "2023-10-30T14:09:50.331478+02:00", "EventTime": "2023-10-30T14:09:50.331495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CMsqjT2qz5EssygqKd"]} -{"Format": "IDEA0", "ID": "1893e33b-f766-4166-a5db-6958e3d455a5", "DetectTime": "2023-10-30T14:09:50.370504+02:00", "EventTime": "2023-10-30T14:09:50.370517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Co06rGyft7ZNUKYZc"]} -{"Format": "IDEA0", "ID": "dfc2ecb8-ea4e-4e75-ba43-a521f4d6ef8f", "DetectTime": "2023-10-30T14:09:50.401891+02:00", "EventTime": "2023-10-30T14:09:50.401906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CcLUjX17HKsc9mH6fe"]} -{"Format": "IDEA0", "ID": "73ce31c9-e0a4-426b-92c4-5f532c31dd42", "DetectTime": "2023-10-30T14:09:50.446043+02:00", "EventTime": "2023-10-30T14:09:50.446060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CYcuBz2K2XMIxfDhZc"]} -{"Format": "IDEA0", "ID": "25c99ae1-007e-4bc3-8727-b48bd54273d5", "DetectTime": "2023-10-30T14:09:50.483395+02:00", "EventTime": "2023-10-30T14:09:50.483407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CT10CZ3MO5KzY89jN2"]} -{"Format": "IDEA0", "ID": "5c0de1f5-b84c-4292-b026-5390fa23bfe8", "DetectTime": "2023-10-30T14:09:50.517774+02:00", "EventTime": "2023-10-30T14:09:50.517790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CPfaPs31Js8aYCYjb8"]} -{"Format": "IDEA0", "ID": "7e4d7371-9291-4b52-a21a-bb9527568b91", "DetectTime": "2023-10-30T14:09:50.552465+02:00", "EventTime": "2023-10-30T14:09:50.552482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CqLkib365LM9teZo78"]} -{"Format": "Json", "ID": "7e4d7371-9291-4b52-a21a-bb9527568b91", "DetectTime": "2023-10-30T14:09:50.552465+02:00", "EventTime": "2023-10-30T14:09:50.552482+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:03:01.095030+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:50.619569)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b82112a3-1237-41b9-8cb0-4102c5cccf52", "DetectTime": "2023-10-30T14:09:50.625241+02:00", "EventTime": "2023-10-30T14:09:50.625256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C0ezQYkqMbs7Vysy7"]} -{"Format": "IDEA0", "ID": "d8a9c1ad-08c7-4e3e-80d0-8034b34007a2", "DetectTime": "2023-10-30T14:09:50.659079+02:00", "EventTime": "2023-10-30T14:09:50.659089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CjIJYl21do4MHBAWse"]} -{"Format": "IDEA0", "ID": "538e41e8-0513-4186-82de-3e41d5e2b879", "DetectTime": "2023-10-30T14:09:50.690880+02:00", "EventTime": "2023-10-30T14:09:50.690901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPPPBF4UTPRraqyspa"]} -{"Format": "IDEA0", "ID": "0a5c9f8c-fbf0-4508-9139-ba951c53402f", "DetectTime": "2023-10-30T14:09:50.728318+02:00", "EventTime": "2023-10-30T14:09:50.728334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CmG3tq2EHd5n6RYhgg"]} -{"Format": "IDEA0", "ID": "1cccace7-bc39-461f-bde4-ad4aa39d6cb6", "DetectTime": "2023-10-30T14:09:50.761319+02:00", "EventTime": "2023-10-30T14:09:50.761330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C17IaXBqZ4obVvje5"]} -{"Format": "IDEA0", "ID": "3c8863f5-b13b-4978-9fd1-0a04835fd305", "DetectTime": "2023-10-30T14:09:50.794464+02:00", "EventTime": "2023-10-30T14:09:50.794476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CwanNL2u3rW1b6Ncj6"]} -{"Format": "IDEA0", "ID": "363175c2-921b-403a-bd02-7de9dde43eef", "DetectTime": "2023-10-30T14:09:50.810322+02:00", "EventTime": "2023-10-30T14:09:50.810334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CX7a3rT9Xi2ScioQ1"]} -{"Format": "IDEA0", "ID": "c2259847-605f-4c7b-8c14-6edf7bdfeb4b", "DetectTime": "2023-10-30T14:09:50.840029+02:00", "EventTime": "2023-10-30T14:09:50.840045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cl5kdHDXUMAPFZhTd"]} -{"Format": "IDEA0", "ID": "ad4188a4-5cf5-4157-9ee9-dd768e1dd3b4", "DetectTime": "2023-10-30T14:09:50.875202+02:00", "EventTime": "2023-10-30T14:09:50.875214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CDZZhL24FYzjYg5Ey5"]} -{"Format": "Json", "ID": "ad4188a4-5cf5-4157-9ee9-dd768e1dd3b4", "DetectTime": "2023-10-30T14:09:50.875202+02:00", "EventTime": "2023-10-30T14:09:50.875214+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:03:03.118553+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:50.944672)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a419958b-8e7a-4c4d-bde3-4ff1f6fec8dc", "DetectTime": "2023-10-30T14:09:50.950146+02:00", "EventTime": "2023-10-30T14:09:50.950162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CJ1hVc2TGbueK5xuCh"]} -{"Format": "IDEA0", "ID": "938ce442-cca4-478a-b8fc-4c731bc1a1db", "DetectTime": "2023-10-30T14:09:50.983441+02:00", "EventTime": "2023-10-30T14:09:50.983454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C03XWs0RUfsLmoys8"]} -{"Format": "IDEA0", "ID": "8baf251f-135e-42f2-b274-08274922a882", "DetectTime": "2023-10-30T14:09:51.015280+02:00", "EventTime": "2023-10-30T14:09:51.015298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CZsuqr3gjS4tk4PLy2"]} -{"Format": "IDEA0", "ID": "96c7a9c8-d7a2-44df-a224-8dd2c4656dc0", "DetectTime": "2023-10-30T14:09:51.042229+02:00", "EventTime": "2023-10-30T14:09:51.042241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.254.66.253 ", "ContentType": "text/plain"}], "uids": ["CTMofB4fmy4gk8n0ja"]} -{"Format": "IDEA0", "ID": "f3e3d048-9cc6-47e8-b652-8c91390d21f7", "DetectTime": "2023-10-30T14:09:51.058465+02:00", "EventTime": "2023-10-30T14:09:51.058476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CwOhi14is6Aj35XBD2"]} -{"Format": "IDEA0", "ID": "9ea8174c-7b38-462f-812b-3f42e8864e4d", "DetectTime": "2023-10-30T14:09:51.095225+02:00", "EventTime": "2023-10-30T14:09:51.095237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CpDzf2km2VLVCzWAd"]} -{"Format": "IDEA0", "ID": "62c6b7fe-6f7c-403d-9783-a8bd8ae4303a", "DetectTime": "2023-10-30T14:09:51.122799+02:00", "EventTime": "2023-10-30T14:09:51.122817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CmY2Gx4FiruckuGBl1"]} -{"Format": "IDEA0", "ID": "808ffee3-c415-44d0-b261-93832488beb4", "DetectTime": "2023-10-30T14:09:51.148466+02:00", "EventTime": "2023-10-30T14:09:51.148482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CuxAtX3LjJIptIaaDc"]} -{"Format": "IDEA0", "ID": "9b0d908c-2bc7-41d3-8339-402f89205422", "DetectTime": "2023-10-30T14:09:51.176365+02:00", "EventTime": "2023-10-30T14:09:51.176393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CJ8dKJ10cbN2QpRfh"]} -{"Format": "Json", "ID": "9b0d908c-2bc7-41d3-8339-402f89205422", "DetectTime": "2023-10-30T14:09:51.176365+02:00", "EventTime": "2023-10-30T14:09:51.176393+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:03:05.187382+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:51.238521)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6b2239e5-6e70-4735-a4d6-0d1e70730449", "DetectTime": "2023-10-30T14:09:51.243566+02:00", "EventTime": "2023-10-30T14:09:51.243580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CO3Fol2YGD0RObXfK7"]} -{"Format": "IDEA0", "ID": "adc62f1f-7854-455e-8b7a-d295dfca188b", "DetectTime": "2023-10-30T14:09:51.273963+02:00", "EventTime": "2023-10-30T14:09:51.273976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CRR0QM2LX1A3T6Bzs3"]} -{"Format": "IDEA0", "ID": "1239da32-4d33-4409-96b8-91dbb61bec8d", "DetectTime": "2023-10-30T14:09:51.302010+02:00", "EventTime": "2023-10-30T14:09:51.302026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.237.162.38 ", "ContentType": "text/plain"}], "uids": ["Cy19Jf4Hgd7gELharc"]} -{"Format": "IDEA0", "ID": "b2ae74c8-4c65-4ec9-9af2-d83b554fd725", "DetectTime": "2023-10-30T14:09:51.324389+02:00", "EventTime": "2023-10-30T14:09:51.324403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CDce5c4nSyrHyNVPs9"]} -{"Format": "IDEA0", "ID": "12be33df-303a-4a00-a775-a853470457a7", "DetectTime": "2023-10-30T14:09:51.353968+02:00", "EventTime": "2023-10-30T14:09:51.353984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CC0F294ecLAbg430m2"]} -{"Format": "IDEA0", "ID": "2cffda0b-b9e5-4ea9-b037-9f17db8d15ec", "DetectTime": "2023-10-30T14:09:51.386956+02:00", "EventTime": "2023-10-30T14:09:51.386974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CcGiLm2aKPQEk9zTLh"]} -{"Format": "IDEA0", "ID": "6c2cf458-9636-4621-9e29-9ccf88b6cd1f", "DetectTime": "2023-10-30T14:09:51.419131+02:00", "EventTime": "2023-10-30T14:09:51.419147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdnuQR3vPxT5q3lUu5"]} -{"Format": "IDEA0", "ID": "5d16e067-aad3-48b1-a676-09643c5cd6df", "DetectTime": "2023-10-30T14:09:51.454071+02:00", "EventTime": "2023-10-30T14:09:51.454087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1142], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 1142/TCP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CrrpaS31ovBUTA4K8b"]} -{"Format": "IDEA0", "ID": "6c928dee-71d9-485c-8798-8617dae15856", "DetectTime": "2023-10-30T14:09:51.485844+02:00", "EventTime": "2023-10-30T14:09:51.485859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CWIaSS222qLlkSr3w1"]} -{"Format": "Json", "ID": "6c928dee-71d9-485c-8798-8617dae15856", "DetectTime": "2023-10-30T14:09:51.485844+02:00", "EventTime": "2023-10-30T14:09:51.485859+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:33:36.218416+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:51.551105)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab0ac860-bf8f-489b-a642-50b39d78e43b", "DetectTime": "2023-10-30T14:09:51.555068+02:00", "EventTime": "2023-10-30T14:09:51.555091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.103.236.242 ", "ContentType": "text/plain"}], "uids": ["CZPhOg3Svq3NPBW2E5"]} -{"Format": "IDEA0", "ID": "bad0f698-d073-4aa1-9e76-ead8eefc36ff", "DetectTime": "2023-10-30T14:09:51.574354+02:00", "EventTime": "2023-10-30T14:09:51.574386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1877], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CLCg1M2mazZUjJcEv2"]} -{"Format": "IDEA0", "ID": "09639c32-afbe-47a8-8684-931dee78e749", "DetectTime": "2023-10-30T14:09:51.601006+02:00", "EventTime": "2023-10-30T14:09:51.601022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CN3Ck527tCEolrAWf9"]} -{"Format": "IDEA0", "ID": "d8c02158-b6b6-4fb4-8d23-26371e0f036f", "DetectTime": "2023-10-30T14:09:51.627191+02:00", "EventTime": "2023-10-30T14:09:51.627207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CqhIin4axKJKxl2va"]} -{"Format": "IDEA0", "ID": "5eeb59dd-d024-4095-91cb-7d3db3c7be9e", "DetectTime": "2023-10-30T14:09:51.652842+02:00", "EventTime": "2023-10-30T14:09:51.652855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Ct5P4k4nqxVwPmXCBj"]} -{"Format": "IDEA0", "ID": "20fa0dc5-90bd-4f25-ad7f-622cab7a3019", "DetectTime": "2023-10-30T14:09:51.675448+02:00", "EventTime": "2023-10-30T14:09:51.675459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CiccT731yefkXWC5i2"]} -{"Format": "IDEA0", "ID": "3ca25793-5ad1-4461-94e9-0215883570f9", "DetectTime": "2023-10-30T14:09:51.698066+02:00", "EventTime": "2023-10-30T14:09:51.698082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CAySSvOXG5TnoNNr5"]} -{"Format": "IDEA0", "ID": "dc6d833c-0e54-41b8-92b6-7cf0db517fe1", "DetectTime": "2023-10-30T14:09:51.726253+02:00", "EventTime": "2023-10-30T14:09:51.726270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CEvHHx1tOYTLCWRvXf"]} -{"Format": "IDEA0", "ID": "278b1aad-ede5-43a6-a2a2-4028e01ff5a6", "DetectTime": "2023-10-30T14:09:51.747155+02:00", "EventTime": "2023-10-30T14:09:51.747168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cu9dVJ3pe85HadVLF9"]} -{"Format": "Json", "ID": "278b1aad-ede5-43a6-a2a2-4028e01ff5a6", "DetectTime": "2023-10-30T14:09:51.747155+02:00", "EventTime": "2023-10-30T14:09:51.747168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:33:37.942420+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:51.802500)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c7d79536-73b0-4200-a849-16e0f8f0d433", "DetectTime": "2023-10-30T14:09:51.807244+02:00", "EventTime": "2023-10-30T14:09:51.807273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C7kuge1JCePEzd06s9"]} -{"Format": "IDEA0", "ID": "dd0f0598-f265-4101-a40e-1ce00ab739ab", "DetectTime": "2023-10-30T14:09:51.831181+02:00", "EventTime": "2023-10-30T14:09:51.831197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C4JJwjeyarJfs2aN1"]} -{"Format": "IDEA0", "ID": "a53d4cf7-8af7-40f2-a524-a339507bc5cd", "DetectTime": "2023-10-30T14:09:51.855439+02:00", "EventTime": "2023-10-30T14:09:51.855450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["ChhNCdQYCbguYMt7a"]} -{"Format": "IDEA0", "ID": "4329b75a-4286-4c88-84ec-46af6bf41343", "DetectTime": "2023-10-30T14:09:51.880019+02:00", "EventTime": "2023-10-30T14:09:51.880032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CwGPas2JdTblPKpXMi"]} -{"Format": "IDEA0", "ID": "df434b36-a5ff-41fd-b2b4-c3041ecf9089", "DetectTime": "2023-10-30T14:09:51.904754+02:00", "EventTime": "2023-10-30T14:09:51.904770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CzWdpT2UupDSPbwN0j"]} -{"Format": "IDEA0", "ID": "ba1076a9-eed3-4545-9a60-6988048e9751", "DetectTime": "2023-10-30T14:09:51.927018+02:00", "EventTime": "2023-10-30T14:09:51.927031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CxzUaQ24vEtlFneWa9"]} -{"Format": "IDEA0", "ID": "c63e0bbf-b9df-41c2-839e-18d20fb22f9b", "DetectTime": "2023-10-30T14:09:52.028193+02:00", "EventTime": "2023-10-30T14:09:52.028221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["ClvZHM1TWbNuxYkG21"]} -{"Format": "IDEA0", "ID": "31a5872c-660a-41b7-95a8-b2fb8c03f978", "DetectTime": "2023-10-30T14:09:52.054728+02:00", "EventTime": "2023-10-30T14:09:52.054744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cpz0xqzTM35Ef1t43"]} -{"Format": "Json", "ID": "31a5872c-660a-41b7-95a8-b2fb8c03f978", "DetectTime": "2023-10-30T14:09:52.054728+02:00", "EventTime": "2023-10-30T14:09:52.054744+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:33:39.784238+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:52.126837)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b20490a-ee2a-4fb0-8317-6e8ddac27ff2", "DetectTime": "2023-10-30T14:09:52.132103+02:00", "EventTime": "2023-10-30T14:09:52.132119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CohGVB3I1rAM8kOqg1"]} -{"Format": "IDEA0", "ID": "b26d2273-9377-4dd2-ac67-528afda9f939", "DetectTime": "2023-10-30T14:09:52.152750+02:00", "EventTime": "2023-10-30T14:09:52.152768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CWRLLg3oO52gHdlkp8"]} -{"Format": "IDEA0", "ID": "866b9c94-3614-43db-ac9e-5d754b0a4d20", "DetectTime": "2023-10-30T14:09:52.176677+02:00", "EventTime": "2023-10-30T14:09:52.176693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CBEcjy1NLD64bMGs9h"]} -{"Format": "IDEA0", "ID": "1981ceca-3590-4012-9951-1d18e58f7f33", "DetectTime": "2023-10-30T14:09:52.198955+02:00", "EventTime": "2023-10-30T14:09:52.198968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CaycO91lZ610MUtwj"]} -{"Format": "IDEA0", "ID": "9a68e5c0-a5e4-4c93-bcc8-9b1e51485d84", "DetectTime": "2023-10-30T14:09:52.221247+02:00", "EventTime": "2023-10-30T14:09:52.221259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXhbGZDb6MxuAxjB9"]} -{"Format": "IDEA0", "ID": "3baee70e-d48d-436e-83f5-9bd06d706a9d", "DetectTime": "2023-10-30T14:09:52.245211+02:00", "EventTime": "2023-10-30T14:09:52.245227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CyZ9zJ2CkqiZ2YiCOk"]} -{"Format": "IDEA0", "ID": "96c23e2c-f666-4dc4-b2be-006734f37dd3", "DetectTime": "2023-10-30T14:09:52.265734+02:00", "EventTime": "2023-10-30T14:09:52.265746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CCQ4TUpyiFlUjfKl6"]} -{"Format": "IDEA0", "ID": "e6aab30c-3ec7-4ceb-b1f2-f29aba0564e6", "DetectTime": "2023-10-30T14:09:52.286471+02:00", "EventTime": "2023-10-30T14:09:52.286485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CWhhRz2Dwsdd2ukDH3"]} -{"Format": "IDEA0", "ID": "26d306d8-2d99-44ef-9948-7df9c98d5726", "DetectTime": "2023-10-30T14:09:52.307699+02:00", "EventTime": "2023-10-30T14:09:52.307716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CVuTaM36TxzjpjehAd"]} -{"Format": "Json", "ID": "26d306d8-2d99-44ef-9948-7df9c98d5726", "DetectTime": "2023-10-30T14:09:52.307699+02:00", "EventTime": "2023-10-30T14:09:52.307716+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T17:33:41.482946+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2023/10/30 14:09:52.361780)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a9e4f816-4d89-4356-83bc-f52ba6b88bf1", "DetectTime": "2023-10-30T14:09:52.367089+02:00", "EventTime": "2023-10-30T14:09:52.367106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CdibFI3ZWmvENebO1l"]} -{"Format": "IDEA0", "ID": "fde6c0c7-e0ee-4eed-8fce-819804c38711", "DetectTime": "2023-10-30T14:09:52.387555+02:00", "EventTime": "2023-10-30T14:09:52.387572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CUoMyw4LAYyRYoxnFi"]} -{"Format": "IDEA0", "ID": "d238153e-fb67-42a3-a555-31aa8bcf562c", "DetectTime": "2023-10-30T14:09:52.409690+02:00", "EventTime": "2023-10-30T14:09:52.409706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["C0YX684q9uiMAKHJU6"]} -{"Format": "IDEA0", "ID": "3de3101e-9470-4882-a214-746402d88fcf", "DetectTime": "2023-10-30T14:09:52.429929+02:00", "EventTime": "2023-10-30T14:09:52.429944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUfl135eD6qNPuxPl"]} -{"Format": "IDEA0", "ID": "2d4c7526-80e3-4957-8f48-b90611a4430b", "DetectTime": "2023-10-30T14:09:52.450153+02:00", "EventTime": "2023-10-30T14:09:52.450168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CWJRKf3DNfVnz1Z9zj"]} -{"Format": "IDEA0", "ID": "609a189a-72ee-4d5c-9594-e5e0f57d8914", "DetectTime": "2023-10-30T14:09:52.471303+02:00", "EventTime": "2023-10-30T14:09:52.471319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CsqNTg1I0KtNfeNCBi"]} -{"Format": "IDEA0", "ID": "7fe352b6-232e-43b9-b8d1-58ed832a8ff3", "DetectTime": "2023-10-30T14:09:52.493856+02:00", "EventTime": "2023-10-30T14:09:52.493873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTHVtY1LC5TjnIRKog"]} -{"Format": "IDEA0", "ID": "96b70323-38c0-42b1-9d33-f7847ffc5dd0", "DetectTime": "2023-10-30T14:09:52.515657+02:00", "EventTime": "2023-10-30T14:09:52.515688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CYvVMSBszv4qVMbT7"]} -{"Format": "IDEA0", "ID": "00bf84be-a441-47ec-a1bf-2f160ee5e240", "DetectTime": "2023-10-30T14:09:52.556318+02:00", "EventTime": "2023-10-30T14:09:52.556337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cu515d2ifVNKcbJ1al"]} -{"Format": "IDEA0", "ID": "90fcff91-393b-4d46-8edf-51d420b12f28", "DetectTime": "2023-10-30T14:09:52.595576+02:00", "EventTime": "2023-10-30T14:09:52.595592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CSuYdD2qvjVobORJAe"]} -{"Format": "IDEA0", "ID": "a1711afc-b179-4271-8ee7-bb66d89f5cf1", "DetectTime": "2023-10-30T14:09:52.629818+02:00", "EventTime": "2023-10-30T14:09:52.629833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CpSDeX1Cbx3Kqhiq05"]} -{"Format": "IDEA0", "ID": "fe82de05-79b6-497f-adf9-c1c511c0b1bc", "DetectTime": "2023-10-30T14:09:52.668163+02:00", "EventTime": "2023-10-30T14:09:52.668179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cg0iLH1WIqDfufYAqc"]} -{"Format": "IDEA0", "ID": "49721bb0-8e8a-4312-940a-013305edc959", "DetectTime": "2023-10-30T14:09:52.701064+02:00", "EventTime": "2023-10-30T14:09:52.701076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CgmPBg3PFmclHuUVr1"]} -{"Format": "IDEA0", "ID": "6d3825a4-1b65-4914-bd0f-14b273ee51e5", "DetectTime": "2023-10-30T14:09:52.731309+02:00", "EventTime": "2023-10-30T14:09:52.731327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C6BZ7x27xhZWJXL9dc"]} -{"Format": "Json", "ID": "6d3825a4-1b65-4914-bd0f-14b273ee51e5", "DetectTime": "2023-10-30T14:09:52.731309+02:00", "EventTime": "2023-10-30T14:09:52.731327+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:04:44.347360+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:52.822761)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ded4a14d-2eae-4dba-984e-7697addde7c6", "DetectTime": "2023-10-30T14:09:52.827102+02:00", "EventTime": "2023-10-30T14:09:52.827114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CrgceXCjjAmyRL0ai"]} -{"Format": "IDEA0", "ID": "a113b141-c55d-414d-a20a-d5cebd10b970", "DetectTime": "2023-10-30T14:09:52.860344+02:00", "EventTime": "2023-10-30T14:09:52.860355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CeRvZe3G4zrtCAkdHj"]} -{"Format": "IDEA0", "ID": "4fd2d6e4-94a1-4f27-8960-502035ff9919", "DetectTime": "2023-10-30T14:09:52.877144+02:00", "EventTime": "2023-10-30T14:09:52.877161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Ctn1Jc1qXMQDtKILel"]} -{"Format": "IDEA0", "ID": "430b4fdf-0bfc-42a5-8eb0-f4f7ebd2768d", "DetectTime": "2023-10-30T14:09:52.911628+02:00", "EventTime": "2023-10-30T14:09:52.911646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C7XfgD3wvFPlmedfP3"]} -{"Format": "IDEA0", "ID": "568f61c3-1b1b-43b5-82cf-614bad90643a", "DetectTime": "2023-10-30T14:09:52.941847+02:00", "EventTime": "2023-10-30T14:09:52.941861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CdTOzF3WmdYZmfREGg"]} -{"Format": "IDEA0", "ID": "672c5cb5-7a3f-4dbb-b46c-43cbeaf7478b", "DetectTime": "2023-10-30T14:09:52.968529+02:00", "EventTime": "2023-10-30T14:09:52.968541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CdgzX54GBsOF6OEGqh"]} -{"Format": "IDEA0", "ID": "e33ce60a-ede4-41c2-9cc6-55ddaa666c41", "DetectTime": "2023-10-30T14:09:52.998980+02:00", "EventTime": "2023-10-30T14:09:52.998992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C8PGtT2VxWpORkFwkc"]} -{"Format": "IDEA0", "ID": "0f3a46bd-60d7-4bec-9644-7e7960d7327a", "DetectTime": "2023-10-30T14:09:53.031241+02:00", "EventTime": "2023-10-30T14:09:53.031259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CbVK8v3iFSlgpmt2qb"]} -{"Format": "IDEA0", "ID": "cc1e5021-ceaa-49ee-a88f-a0f9767644c2", "DetectTime": "2023-10-30T14:09:53.064671+02:00", "EventTime": "2023-10-30T14:09:53.064688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cnl4KB3PtaOwcE1l8f"]} -{"Format": "Json", "ID": "cc1e5021-ceaa-49ee-a88f-a0f9767644c2", "DetectTime": "2023-10-30T14:09:53.064671+02:00", "EventTime": "2023-10-30T14:09:53.064688+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:04:45.963527+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:53.133077)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bb7ada5f-b1c3-44a2-bcaf-7c8ad660639d", "DetectTime": "2023-10-30T14:09:53.137575+02:00", "EventTime": "2023-10-30T14:09:53.137589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2990], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. ", "ContentType": "text/plain"}], "uids": ["CihIHxZsCpyDtMt1b"]} -{"Format": "IDEA0", "ID": "aafb28a6-0155-4bb2-b69c-d7f87d5c7a4e", "DetectTime": "2023-10-30T14:09:53.168177+02:00", "EventTime": "2023-10-30T14:09:53.168195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CJUmtk4PvbWle6SZG1"]} -{"Format": "IDEA0", "ID": "b21dd8c3-6cc8-440c-99db-87e71402adfe", "DetectTime": "2023-10-30T14:09:53.199648+02:00", "EventTime": "2023-10-30T14:09:53.199661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CzftqK3LxkAsFm7IE2"]} -{"Format": "IDEA0", "ID": "6e9af09e-80c0-498c-bcd2-4f13a4957a98", "DetectTime": "2023-10-30T14:09:53.230051+02:00", "EventTime": "2023-10-30T14:09:53.230066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cm82YC2cCJTui83m57"]} -{"Format": "IDEA0", "ID": "d9f7cab4-9150-4290-87ee-c75e381a7359", "DetectTime": "2023-10-30T14:09:53.256086+02:00", "EventTime": "2023-10-30T14:09:53.256106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CgwRQe3eD8FdxP4rh4"]} -{"Format": "IDEA0", "ID": "9b1b1921-f23d-495e-97ef-8a3b4792399a", "DetectTime": "2023-10-30T14:09:53.284614+02:00", "EventTime": "2023-10-30T14:09:53.284639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CeNCY73NZMirKDXXUi"]} -{"Format": "IDEA0", "ID": "514ed9b6-c77d-4ad1-9446-e314951ce612", "DetectTime": "2023-10-30T14:09:53.310362+02:00", "EventTime": "2023-10-30T14:09:53.310379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["ChzoK64ny304Rivt5l"]} -{"Format": "IDEA0", "ID": "1317d943-dbc8-4642-b7b9-55d8c60fbc2d", "DetectTime": "2023-10-30T14:09:53.338626+02:00", "EventTime": "2023-10-30T14:09:53.338638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C8f1aj3lsCdNIq21jf"]} -{"Format": "Json", "ID": "1317d943-dbc8-4642-b7b9-55d8c60fbc2d", "DetectTime": "2023-10-30T14:09:53.338626+02:00", "EventTime": "2023-10-30T14:09:53.338638+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:04:47.678856+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:53.400987)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "62763762-9b7b-41bf-94f1-119baaef3d7b", "DetectTime": "2023-10-30T14:09:53.406892+02:00", "EventTime": "2023-10-30T14:09:53.406909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C7vhoiXbdVbiQSnsc"]} -{"Format": "IDEA0", "ID": "5a538a42-d988-4407-b304-363327933c42", "DetectTime": "2023-10-30T14:09:53.438118+02:00", "EventTime": "2023-10-30T14:09:53.438139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C9g8rf4zuiPAOQgUkb"]} -{"Format": "IDEA0", "ID": "c725c205-828e-4d18-9a18-4e3ccbfb4a2e", "DetectTime": "2023-10-30T14:09:53.468190+02:00", "EventTime": "2023-10-30T14:09:53.468204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C8A5gS2YKS938inZyg"]} -{"Format": "IDEA0", "ID": "1666cc30-f8ef-4d41-bbab-2bcf382521aa", "DetectTime": "2023-10-30T14:09:53.494348+02:00", "EventTime": "2023-10-30T14:09:53.494363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CR0UAp39AL7d7HBF8"]} -{"Format": "IDEA0", "ID": "d5731d3f-d0b3-4755-a209-7545fc71b661", "DetectTime": "2023-10-30T14:09:53.519229+02:00", "EventTime": "2023-10-30T14:09:53.519240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CoP3ahNYxA2fuh5Md"]} -{"Format": "IDEA0", "ID": "83879ef3-2a09-4c1d-b103-00636a08cb61", "DetectTime": "2023-10-30T14:09:53.541533+02:00", "EventTime": "2023-10-30T14:09:53.541543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C9yc6P9hAjDd21l41"]} -{"Format": "IDEA0", "ID": "5ae273ef-98a4-4cfd-b49b-0ff0d5a3792d", "DetectTime": "2023-10-30T14:09:53.564681+02:00", "EventTime": "2023-10-30T14:09:53.564698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqwQYC2riCtBcuejg3"]} -{"Format": "IDEA0", "ID": "13ee9db5-8714-48f1-a580-d002490d2c3a", "DetectTime": "2023-10-30T14:09:53.589886+02:00", "EventTime": "2023-10-30T14:09:53.589898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CcE7AaRKXD3ia4hj2"]} -{"Format": "IDEA0", "ID": "4397c53e-2250-4f0c-aa6e-17f462d77de6", "DetectTime": "2023-10-30T14:09:53.606255+02:00", "EventTime": "2023-10-30T14:09:53.606267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CPkIrl3pXWQX04ZZTb"]} -{"Format": "Json", "ID": "4397c53e-2250-4f0c-aa6e-17f462d77de6", "DetectTime": "2023-10-30T14:09:53.606255+02:00", "EventTime": "2023-10-30T14:09:53.606267+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:35:47.453007+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:53.666977)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7c1b3053-93ca-4b6e-b82c-97ff5b51a2e4", "DetectTime": "2023-10-30T14:09:53.671587+02:00", "EventTime": "2023-10-30T14:09:53.671603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cw9hWv383Riy4vASo4"]} -{"Format": "IDEA0", "ID": "608b5004-1af4-431f-9e3d-1c0659fa05b2", "DetectTime": "2023-10-30T14:09:53.698377+02:00", "EventTime": "2023-10-30T14:09:53.698393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CVzaM7OH7x9L93Cad"]} -{"Format": "IDEA0", "ID": "d0e34455-3a7b-41ef-8ef8-570c2ee7dc1c", "DetectTime": "2023-10-30T14:09:53.725392+02:00", "EventTime": "2023-10-30T14:09:53.725405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C8wAlH2ixpvJ46XCYe"]} -{"Format": "IDEA0", "ID": "f8649302-1512-4251-8376-482ee0f6b923", "DetectTime": "2023-10-30T14:09:53.749313+02:00", "EventTime": "2023-10-30T14:09:53.749325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CqXMOh4a1D56Wj0eMi"]} -{"Format": "IDEA0", "ID": "42886408-8a99-4f2b-9af9-0429478526e5", "DetectTime": "2023-10-30T14:09:53.767340+02:00", "EventTime": "2023-10-30T14:09:53.767359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CVMsiJ16ZdYqLeoHBh"]} -{"Format": "IDEA0", "ID": "1a60ab23-2d0c-4bb4-bfb3-adedccf2b097", "DetectTime": "2023-10-30T14:09:53.789059+02:00", "EventTime": "2023-10-30T14:09:53.789079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CAJXBQ3WBCQzps30w5"]} -{"Format": "IDEA0", "ID": "1a1facd6-f254-4f90-bed8-18b4b562f772", "DetectTime": "2023-10-30T14:09:53.811818+02:00", "EventTime": "2023-10-30T14:09:53.811830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CukBT61MsxSaIXX4f9"]} -{"Format": "IDEA0", "ID": "67d3b617-8c15-4457-826b-bf840b175880", "DetectTime": "2023-10-30T14:09:53.832666+02:00", "EventTime": "2023-10-30T14:09:53.832681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CwX2ok1ColVEl6uiq2"]} -{"Format": "Json", "ID": "67d3b617-8c15-4457-826b-bf840b175880", "DetectTime": "2023-10-30T14:09:53.832666+02:00", "EventTime": "2023-10-30T14:09:53.832681+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:35:49.256067+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:53.894269)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a2b7a517-23ce-4142-85dc-0acf2e03bcbe", "DetectTime": "2023-10-30T14:09:53.898364+02:00", "EventTime": "2023-10-30T14:09:53.898375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CDNZ8b2EPrLUeNlNU6"]} -{"Format": "IDEA0", "ID": "a7d2e2f5-f536-4342-a4d9-b8f60d54addc", "DetectTime": "2023-10-30T14:09:53.919929+02:00", "EventTime": "2023-10-30T14:09:53.919940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CuJYRY3Vg3nvJuNpad"]} -{"Format": "IDEA0", "ID": "72feb3bc-d607-42de-bf2b-8142622f9442", "DetectTime": "2023-10-30T14:09:53.941720+02:00", "EventTime": "2023-10-30T14:09:53.941737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CFYHwg1XiGTGjEfZ21"]} -{"Format": "IDEA0", "ID": "3a76f0df-9dd5-4b24-89fe-80478c06f6d6", "DetectTime": "2023-10-30T14:09:53.964968+02:00", "EventTime": "2023-10-30T14:09:53.964980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CfYPio1cijBjkumK39"]} -{"Format": "IDEA0", "ID": "a7479273-9ed0-4cf0-b052-122d0fe305e5", "DetectTime": "2023-10-30T14:09:53.985468+02:00", "EventTime": "2023-10-30T14:09:53.985482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CxGEVi3igsHxvlWHMc"]} -{"Format": "IDEA0", "ID": "2b2e0846-db54-4719-89ab-40cb0502a6ab", "DetectTime": "2023-10-30T14:09:54.006256+02:00", "EventTime": "2023-10-30T14:09:54.006268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CV5u5v4aua8b9FSkJ4"]} -{"Format": "IDEA0", "ID": "ed6412e6-a51e-4cf5-90b7-3272277632a6", "DetectTime": "2023-10-30T14:09:54.028381+02:00", "EventTime": "2023-10-30T14:09:54.028397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cdb7kt1csgZymssRN7"]} -{"Format": "IDEA0", "ID": "3041d8cf-4908-4664-9e10-58c5026f0761", "DetectTime": "2023-10-30T14:09:54.054930+02:00", "EventTime": "2023-10-30T14:09:54.054946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CiWLmo1I31ie4Ewp42"]} -{"Format": "Json", "ID": "3041d8cf-4908-4664-9e10-58c5026f0761", "DetectTime": "2023-10-30T14:09:54.054930+02:00", "EventTime": "2023-10-30T14:09:54.054946+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:36:08.830432+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:54.110177)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ade86f56-84b2-4ede-8e8f-97cd7346c822", "DetectTime": "2023-10-30T14:09:54.115502+02:00", "EventTime": "2023-10-30T14:09:54.115517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CgAY8D2FeZqQ9wC0we"]} -{"Format": "IDEA0", "ID": "4c9f4f12-e0b7-4115-9342-d59df3793ce8", "DetectTime": "2023-10-30T14:09:54.138730+02:00", "EventTime": "2023-10-30T14:09:54.138746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cpvudz3Aby4LIo3c4i"]} -{"Format": "IDEA0", "ID": "70297022-a525-48ea-9a0f-9d79d4bb6016", "DetectTime": "2023-10-30T14:09:54.161253+02:00", "EventTime": "2023-10-30T14:09:54.161269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CoXG0LZoQHJxZxs9j"]} -{"Format": "IDEA0", "ID": "25ac399d-5c42-4e30-9fb2-6bfc66b4f2ec", "DetectTime": "2023-10-30T14:09:54.182725+02:00", "EventTime": "2023-10-30T14:09:54.182741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CeIalV1i5gRG2Q6cW2"]} -{"Format": "IDEA0", "ID": "255cbf6c-6876-4fcf-8f16-2e47176bd2e4", "DetectTime": "2023-10-30T14:09:54.201522+02:00", "EventTime": "2023-10-30T14:09:54.201534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CGDPgc2VpcBB27dbO7"]} -{"Format": "IDEA0", "ID": "ac4156ef-f917-47cf-b5ec-6677a04a8cd2", "DetectTime": "2023-10-30T14:09:54.217814+02:00", "EventTime": "2023-10-30T14:09:54.217825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CaUO4S2KT7u09UqyV6"]} -{"Format": "IDEA0", "ID": "fa051202-1177-4c46-95f0-488087709ef2", "DetectTime": "2023-10-30T14:09:54.237982+02:00", "EventTime": "2023-10-30T14:09:54.237992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C6N0A61XMq1EUR0016"]} -{"Format": "IDEA0", "ID": "470d26c2-036f-48b0-ac43-2cb5cf840291", "DetectTime": "2023-10-30T14:09:54.255670+02:00", "EventTime": "2023-10-30T14:09:54.255682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CvQCc04LWZ8f5pRGu4"]} -{"Format": "IDEA0", "ID": "6589b8a3-7f75-4ae5-ad17-7be9308d9e10", "DetectTime": "2023-10-30T14:09:54.276187+02:00", "EventTime": "2023-10-30T14:09:54.276204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CsdZD019RmqBRtcIBi"]} -{"Format": "Json", "ID": "6589b8a3-7f75-4ae5-ad17-7be9308d9e10", "DetectTime": "2023-10-30T14:09:54.276187+02:00", "EventTime": "2023-10-30T14:09:54.276204+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T18:36:10.637540+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2023/10/30 14:09:54.333500)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6f1b20f7-c491-45d8-9c73-f150987d35bb", "DetectTime": "2023-10-30T14:09:54.339150+02:00", "EventTime": "2023-10-30T14:09:54.339178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUmbLC2tvcpWo4P8V4"]} -{"Format": "IDEA0", "ID": "151266ab-14a1-43be-ba34-417d53b1baf8", "DetectTime": "2023-10-30T14:09:54.357276+02:00", "EventTime": "2023-10-30T14:09:54.357292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C75ykY1RvaoFDxLtUe"]} -{"Format": "IDEA0", "ID": "8e494610-343c-4a73-ad33-7a95936a865d", "DetectTime": "2023-10-30T14:09:54.377013+02:00", "EventTime": "2023-10-30T14:09:54.377030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3nqHI3f6WD8tKJDIe"]} -{"Format": "IDEA0", "ID": "097dca7d-8dab-4dff-96ea-2b58fda57135", "DetectTime": "2023-10-30T14:09:54.393995+02:00", "EventTime": "2023-10-30T14:09:54.394012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CkxR061zSGylWcGHCg"]} -{"Format": "IDEA0", "ID": "228ee2e3-c41a-4619-b8db-926b2fbfb1b3", "DetectTime": "2023-10-30T14:09:54.425075+02:00", "EventTime": "2023-10-30T14:09:54.425093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CYFuBIC1SHjongSJ6"]} -{"Format": "IDEA0", "ID": "aa95790d-6d10-4a03-8681-b9592f2c7e30", "DetectTime": "2023-10-30T14:09:54.454927+02:00", "EventTime": "2023-10-30T14:09:54.454944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CXMXdNOrb73gQfNFh"]} -{"Format": "IDEA0", "ID": "a22b4fbb-f330-4a3d-bcfa-b96680b9fe61", "DetectTime": "2023-10-30T14:09:54.484110+02:00", "EventTime": "2023-10-30T14:09:54.484126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CB6sM4llxvtvPDzM7"]} -{"Format": "IDEA0", "ID": "64e41ab2-ec80-465f-a162-c3f0722bf2b2", "DetectTime": "2023-10-30T14:09:54.516569+02:00", "EventTime": "2023-10-30T14:09:54.516585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CoN2NuEkYih48BCGb"]} -{"Format": "IDEA0", "ID": "3bbc3347-ec91-4d63-ba44-7d1bc6028ffa", "DetectTime": "2023-10-30T14:09:54.546598+02:00", "EventTime": "2023-10-30T14:09:54.546614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C5Gzyb4xI0vvslIf42"]} -{"Format": "IDEA0", "ID": "4c5a48a9-09a4-43ca-9b60-ca7fe67a3301", "DetectTime": "2023-10-30T14:09:54.577058+02:00", "EventTime": "2023-10-30T14:09:54.577073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CCKRGTW9Wr42QY59c"]} -{"Format": "Json", "ID": "4c5a48a9-09a4-43ca-9b60-ca7fe67a3301", "DetectTime": "2023-10-30T14:09:54.577058+02:00", "EventTime": "2023-10-30T14:09:54.577073+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:06:55.675487+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:54.656756)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7f1a021c-a90f-4c6c-ba16-b82301b0554f", "DetectTime": "2023-10-30T14:09:54.663893+02:00", "EventTime": "2023-10-30T14:09:54.663909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["COpoCR1uzH1gromqKd"]} -{"Format": "IDEA0", "ID": "1a8c959f-65a4-46e0-9356-899c881c88d0", "DetectTime": "2023-10-30T14:09:54.698123+02:00", "EventTime": "2023-10-30T14:09:54.698134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CUMvRGREnog8DBpz9"]} -{"Format": "IDEA0", "ID": "aad8dfff-c426-40da-b458-87a92abc55d2", "DetectTime": "2023-10-30T14:09:54.728007+02:00", "EventTime": "2023-10-30T14:09:54.728023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CmgGeC4lNHHcD6Cqyj"]} -{"Format": "IDEA0", "ID": "545ded4c-c590-4cb0-8862-9e3d4262480e", "DetectTime": "2023-10-30T14:09:54.760418+02:00", "EventTime": "2023-10-30T14:09:54.760430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CS3m9Z3wlIfJr2unal"]} -{"Format": "IDEA0", "ID": "7f372d37-e7b5-42db-a553-ab25d3343a1c", "DetectTime": "2023-10-30T14:09:54.792801+02:00", "EventTime": "2023-10-30T14:09:54.792819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CzCc2v4s7DiWOL1uc8"]} -{"Format": "IDEA0", "ID": "a42ee5af-458c-4960-8a64-ffeac24176a8", "DetectTime": "2023-10-30T14:09:54.824891+02:00", "EventTime": "2023-10-30T14:09:54.824908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CoELVq4eYlQnddxI35"]} -{"Format": "IDEA0", "ID": "4e53fee2-c3b7-4d59-901a-f699b880bbbf", "DetectTime": "2023-10-30T14:09:54.855507+02:00", "EventTime": "2023-10-30T14:09:54.855527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CPvPGduOat8sWh3W2"]} -{"Format": "IDEA0", "ID": "1bcb5d6d-663e-414d-aed0-98e93840ee5f", "DetectTime": "2023-10-30T14:09:54.885897+02:00", "EventTime": "2023-10-30T14:09:54.885909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C0hxLr4qlmNQGMNRP9"]} -{"Format": "Json", "ID": "1bcb5d6d-663e-414d-aed0-98e93840ee5f", "DetectTime": "2023-10-30T14:09:54.885897+02:00", "EventTime": "2023-10-30T14:09:54.885909+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:06:57.451115+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:54.951406)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f90f921d-2c50-4319-bda9-0ef616809156", "DetectTime": "2023-10-30T14:09:54.955757+02:00", "EventTime": "2023-10-30T14:09:54.955771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CEe6Mr4JeA4XYxkkCh"]} -{"Format": "IDEA0", "ID": "720598aa-f392-4046-bbff-4913a07bb633", "DetectTime": "2023-10-30T14:09:54.982316+02:00", "EventTime": "2023-10-30T14:09:54.982329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CqMPqn7s42ljQQyh1"]} -{"Format": "IDEA0", "ID": "29c9c3a1-b6e1-4576-bf44-7a4926d1c540", "DetectTime": "2023-10-30T14:09:55.011927+02:00", "EventTime": "2023-10-30T14:09:55.011940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CvuFvZ3APhx4NmMxod"]} -{"Format": "IDEA0", "ID": "512687bf-b78f-4f2d-8c1b-74717bbf1093", "DetectTime": "2023-10-30T14:09:55.038410+02:00", "EventTime": "2023-10-30T14:09:55.038421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C4QA2BftcbU0EGbB9"]} -{"Format": "IDEA0", "ID": "be03fb22-edbc-4f49-9c32-3680d829e3a0", "DetectTime": "2023-10-30T14:09:55.057989+02:00", "EventTime": "2023-10-30T14:09:55.058007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CP6haG1XY0pJZ3UBf"]} -{"Format": "IDEA0", "ID": "3282d92b-ed9e-4dfe-a678-bf9fd7cfd248", "DetectTime": "2023-10-30T14:09:55.087407+02:00", "EventTime": "2023-10-30T14:09:55.087431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CqNDgK3lQ40BirVe2"]} -{"Format": "IDEA0", "ID": "33849954-17e1-4b2e-b9fc-2382fd4b2c35", "DetectTime": "2023-10-30T14:09:55.117114+02:00", "EventTime": "2023-10-30T14:09:55.117125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CO7NJ9tvQ9m86SwYk"]} -{"Format": "IDEA0", "ID": "924342bc-1586-4db0-95ed-491ec2710967", "DetectTime": "2023-10-30T14:09:55.140314+02:00", "EventTime": "2023-10-30T14:09:55.140326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CpCJPt4dqLck3qh30g"]} -{"Format": "IDEA0", "ID": "b6657a5e-e61a-476a-a41a-71ca58c7b48c", "DetectTime": "2023-10-30T14:09:55.164955+02:00", "EventTime": "2023-10-30T14:09:55.164982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CwloJpVCtj3EtC4f1"]} -{"Format": "Json", "ID": "b6657a5e-e61a-476a-a41a-71ca58c7b48c", "DetectTime": "2023-10-30T14:09:55.164955+02:00", "EventTime": "2023-10-30T14:09:55.164982+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:07:14.743756+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:55.220137)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b8fb5d8d-c016-48f9-8a8d-43e2f6dafeda", "DetectTime": "2023-10-30T14:09:55.225341+02:00", "EventTime": "2023-10-30T14:09:55.225357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CpgB4f30AxVHEXCmOj"]} -{"Format": "IDEA0", "ID": "05ba3654-2dc1-49da-8a44-1e59588e0a79", "DetectTime": "2023-10-30T14:09:55.255132+02:00", "EventTime": "2023-10-30T14:09:55.255149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CIPq5h1LYdhUhAWsad"]} -{"Format": "IDEA0", "ID": "6496a775-d6bb-40be-a0ff-166e4f60fabe", "DetectTime": "2023-10-30T14:09:55.281327+02:00", "EventTime": "2023-10-30T14:09:55.281338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CMrGoo27VJZQLQrpZh"]} -{"Format": "IDEA0", "ID": "bc971059-6f0d-4106-b1ce-01592754c446", "DetectTime": "2023-10-30T14:09:55.305583+02:00", "EventTime": "2023-10-30T14:09:55.305606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CNxXcU3aEoix2P61Qe"]} -{"Format": "IDEA0", "ID": "ddb3a81f-65ac-40e0-b235-2bd991351a7d", "DetectTime": "2023-10-30T14:09:55.331209+02:00", "EventTime": "2023-10-30T14:09:55.331221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CD624i1D1Z1EaITiLd"]} -{"Format": "IDEA0", "ID": "5a13d6ef-3328-4cd7-a552-0ec47ebf4b2c", "DetectTime": "2023-10-30T14:09:55.353864+02:00", "EventTime": "2023-10-30T14:09:55.353879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C2Gh0G39947oN2vct6"]} -{"Format": "IDEA0", "ID": "7a69f78d-13f0-4ffa-b08c-b7abdb6b7ea2", "DetectTime": "2023-10-30T14:09:55.383663+02:00", "EventTime": "2023-10-30T14:09:55.383679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CuqywW1HHg9Z7KIUE3"]} -{"Format": "IDEA0", "ID": "8978c536-51c0-43a4-b38d-33eef6b9cbed", "DetectTime": "2023-10-30T14:09:55.409531+02:00", "EventTime": "2023-10-30T14:09:55.409558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CIVcLF2uTExyvL3v05"]} -{"Format": "Json", "ID": "8978c536-51c0-43a4-b38d-33eef6b9cbed", "DetectTime": "2023-10-30T14:09:55.409531+02:00", "EventTime": "2023-10-30T14:09:55.409558+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:37:53.942169+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:55.470591)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e3acbabe-fdcd-4a0a-ad41-a9ca605324be", "DetectTime": "2023-10-30T14:09:55.475520+02:00", "EventTime": "2023-10-30T14:09:55.475539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CDeELo2oSqMYRLQ7Gj"]} -{"Format": "IDEA0", "ID": "c0068835-c356-473b-b21a-e80303e5f1b8", "DetectTime": "2023-10-30T14:09:55.501298+02:00", "EventTime": "2023-10-30T14:09:55.501314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CryNMoJBmBT69zq1l"]} -{"Format": "IDEA0", "ID": "7ccec895-662d-4acc-871c-dcb2633f075c", "DetectTime": "2023-10-30T14:09:55.526329+02:00", "EventTime": "2023-10-30T14:09:55.526344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CSVX6f3CTJqTBLzFl6"]} -{"Format": "IDEA0", "ID": "12f62657-5aa1-4f11-8fa3-59f5730b9364", "DetectTime": "2023-10-30T14:09:55.549309+02:00", "EventTime": "2023-10-30T14:09:55.549323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CuXHaj2q2vFssWK76l"]} -{"Format": "IDEA0", "ID": "12e661fa-7ef5-4fa5-a17d-752ea1c6a471", "DetectTime": "2023-10-30T14:09:55.580002+02:00", "EventTime": "2023-10-30T14:09:55.580015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CjcbZn4LhhvuO9ZnK7"]} -{"Format": "IDEA0", "ID": "feb57359-11fe-4b9b-8a17-96681fcc91de", "DetectTime": "2023-10-30T14:09:55.602172+02:00", "EventTime": "2023-10-30T14:09:55.602184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CWvSaP2FBAQzgvDOdf"]} -{"Format": "IDEA0", "ID": "fbe57bc9-5be6-482a-b41a-0b336e38e11b", "DetectTime": "2023-10-30T14:09:55.623281+02:00", "EventTime": "2023-10-30T14:09:55.623297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CuOJ1h1XwNsz1loXX9"]} -{"Format": "IDEA0", "ID": "34583a27-ffa1-49c7-a0f1-aeed739e50a8", "DetectTime": "2023-10-30T14:09:55.645518+02:00", "EventTime": "2023-10-30T14:09:55.645533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cowsa54IpMpGg8Dk3a"]} -{"Format": "Json", "ID": "34583a27-ffa1-49c7-a0f1-aeed739e50a8", "DetectTime": "2023-10-30T14:09:55.645518+02:00", "EventTime": "2023-10-30T14:09:55.645533+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:37:57.037998+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:55.709250)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3bd11a0b-8186-479d-91cf-127308a161b4", "DetectTime": "2023-10-30T14:09:55.714660+02:00", "EventTime": "2023-10-30T14:09:55.714675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CRj6vjHk3v7Kcl1Jl"]} -{"Format": "IDEA0", "ID": "714767bf-a833-4c12-aa18-4f05e2503d9c", "DetectTime": "2023-10-30T14:09:55.740243+02:00", "EventTime": "2023-10-30T14:09:55.740263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CY49gURUNmh2xB9Fe"]} -{"Format": "IDEA0", "ID": "93c9932a-18a2-4175-a8a7-e28cdcdf0ac7", "DetectTime": "2023-10-30T14:09:55.763567+02:00", "EventTime": "2023-10-30T14:09:55.763578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CNGr6F4C9DGnV5fRE9"]} -{"Format": "IDEA0", "ID": "eb01fe3c-a517-49f1-9408-1f3c526edc17", "DetectTime": "2023-10-30T14:09:55.783509+02:00", "EventTime": "2023-10-30T14:09:55.783523+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CBxaik20Nl6QuIK4x8"]} -{"Format": "IDEA0", "ID": "41ca4e62-bce2-4696-9f8c-897f1a48dc1c", "DetectTime": "2023-10-30T14:09:55.805868+02:00", "EventTime": "2023-10-30T14:09:55.805882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cxi2Go3kOekPDM1gg2"]} -{"Format": "IDEA0", "ID": "785b9b6e-70e2-4fb4-9e76-5bcbe9f5b442", "DetectTime": "2023-10-30T14:09:55.827187+02:00", "EventTime": "2023-10-30T14:09:55.827205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C4PfXn1Z4HlsV5dw9a"]} -{"Format": "IDEA0", "ID": "3971ea65-94fe-4c8b-ad1d-ab900d82c47a", "DetectTime": "2023-10-30T14:09:55.848201+02:00", "EventTime": "2023-10-30T14:09:55.848219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CCHUzY3f57dnaS0iOl"]} -{"Format": "IDEA0", "ID": "dd041c5d-6e2d-4fd9-8905-d5a4623cde62", "DetectTime": "2023-10-30T14:09:55.869752+02:00", "EventTime": "2023-10-30T14:09:55.869770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CEWL3G2eThDozU46o"]} -{"Format": "IDEA0", "ID": "5dbf7de5-f203-41ee-b57d-b5290a0ee555", "DetectTime": "2023-10-30T14:09:55.890026+02:00", "EventTime": "2023-10-30T14:09:55.890041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CugkV2117z6RZ69qDc"]} -{"Format": "IDEA0", "ID": "55bfc868-9bf2-4aa1-a9b5-551e800ea602", "DetectTime": "2023-10-30T14:09:55.910812+02:00", "EventTime": "2023-10-30T14:09:55.910828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CJ4q4JhD1LLE6g816"]} -{"Format": "Json", "ID": "55bfc868-9bf2-4aa1-a9b5-551e800ea602", "DetectTime": "2023-10-30T14:09:55.910812+02:00", "EventTime": "2023-10-30T14:09:55.910828+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:37:58.835857+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:55.968657)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b73cd14-bbc5-4f19-aaf9-56e5e4da40fd", "DetectTime": "2023-10-30T14:09:55.974957+02:00", "EventTime": "2023-10-30T14:09:55.974977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["ChRooV3UJlenH04TFg"]} -{"Format": "IDEA0", "ID": "b27d55cb-7195-455f-ac6f-b95d2cefae2d", "DetectTime": "2023-10-30T14:09:55.996276+02:00", "EventTime": "2023-10-30T14:09:55.996293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CYjfwK2aQuHVM4ge2c"]} -{"Format": "IDEA0", "ID": "37f349a8-a9ce-4f1e-b3c1-fb2b036429e3", "DetectTime": "2023-10-30T14:09:56.015761+02:00", "EventTime": "2023-10-30T14:09:56.015777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CWUPO52TCaFEPaTqgj"]} -{"Format": "IDEA0", "ID": "0597a2b8-4cce-42a9-b5ae-95487a5394eb", "DetectTime": "2023-10-30T14:09:56.037827+02:00", "EventTime": "2023-10-30T14:09:56.037842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C6bnD93E6r0PDUgJaf"]} -{"Format": "IDEA0", "ID": "dccd36fe-3b16-4fe9-9ccb-5396e265d126", "DetectTime": "2023-10-30T14:09:56.059685+02:00", "EventTime": "2023-10-30T14:09:56.059701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CPEokw4AR6cxiUzA3b"]} -{"Format": "IDEA0", "ID": "68da343b-10bc-4670-832d-1e1b72091eea", "DetectTime": "2023-10-30T14:09:56.078003+02:00", "EventTime": "2023-10-30T14:09:56.078030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C41weY2tujAOvFzoAe"]} -{"Format": "IDEA0", "ID": "e3ce9cd1-9617-4e8a-9f2e-0cfb734e1a7b", "DetectTime": "2023-10-30T14:09:56.099885+02:00", "EventTime": "2023-10-30T14:09:56.099901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CNeqCc3pvSH5qbwzz4"]} -{"Format": "IDEA0", "ID": "d14a43cb-fb43-4ca7-9e58-0f1efe71dce0", "DetectTime": "2023-10-30T14:09:56.120964+02:00", "EventTime": "2023-10-30T14:09:56.120981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CK8CfEptIniANxub7"]} -{"Format": "Json", "ID": "d14a43cb-fb43-4ca7-9e58-0f1efe71dce0", "DetectTime": "2023-10-30T14:09:56.120964+02:00", "EventTime": "2023-10-30T14:09:56.120981+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T19:38:00.685270+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2023/10/30 14:09:56.178533)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "48a94a5f-c928-4d91-bf3a-ab4ca2e3835f", "DetectTime": "2023-10-30T14:09:56.183159+02:00", "EventTime": "2023-10-30T14:09:56.183170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CotvK7EGgTe4Kfb2a"]} -{"Format": "IDEA0", "ID": "d40bf421-fae1-4b6d-8548-71ea91600652", "DetectTime": "2023-10-30T14:09:56.199990+02:00", "EventTime": "2023-10-30T14:09:56.200014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cf5fCS2PlM2cJ4e6da"]} -{"Format": "IDEA0", "ID": "1ece6e7e-4aa9-4ca0-bfec-709c45442624", "DetectTime": "2023-10-30T14:09:56.230871+02:00", "EventTime": "2023-10-30T14:09:56.230889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["ClogP81J0qP1klUwK9"]} -{"Format": "IDEA0", "ID": "4393c9ae-97a0-4fb4-8055-c6c8d456aeb9", "DetectTime": "2023-10-30T14:09:56.264416+02:00", "EventTime": "2023-10-30T14:09:56.264431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CdahV54dSeQoMTisDb"]} -{"Format": "IDEA0", "ID": "0f011ba5-288a-438c-a7eb-d457b45522aa", "DetectTime": "2023-10-30T14:09:56.298903+02:00", "EventTime": "2023-10-30T14:09:56.298917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CsXze23I6JR3Fn5GKk"]} -{"Format": "IDEA0", "ID": "157c126c-38fa-45a1-9758-467ccd7b8687", "DetectTime": "2023-10-30T14:09:56.333022+02:00", "EventTime": "2023-10-30T14:09:56.333033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["COOJYa372W3Tye3c0k"]} -{"Format": "IDEA0", "ID": "13bdb93c-9647-44d0-b241-38398dcf5c68", "DetectTime": "2023-10-30T14:09:56.362369+02:00", "EventTime": "2023-10-30T14:09:56.362399+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9rv0t4oBePLu8g9xj"]} -{"Format": "IDEA0", "ID": "2b314dcb-01cc-461e-976c-bd2cf5d9326f", "DetectTime": "2023-10-30T14:09:56.382085+02:00", "EventTime": "2023-10-30T14:09:56.382099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ClpX2z3qumocK792D9"]} -{"Format": "IDEA0", "ID": "ddfd2094-b248-4daa-b70c-bcfae74f2721", "DetectTime": "2023-10-30T14:09:56.413341+02:00", "EventTime": "2023-10-30T14:09:56.413356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C3UKlKiSTt06p2xjl"]} -{"Format": "IDEA0", "ID": "32d9ec56-f273-4007-811d-264971e2309a", "DetectTime": "2023-10-30T14:09:56.446046+02:00", "EventTime": "2023-10-30T14:09:56.446059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C3gAFd2NoDiFc7hLe3"]} -{"Format": "Json", "ID": "32d9ec56-f273-4007-811d-264971e2309a", "DetectTime": "2023-10-30T14:09:56.446046+02:00", "EventTime": "2023-10-30T14:09:56.446059+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:08:26.615129+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:56.517845)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "654722e6-6b4e-486a-9557-7727abc4d0a3", "DetectTime": "2023-10-30T14:09:56.522432+02:00", "EventTime": "2023-10-30T14:09:56.522446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CFtfD62FBxajcPOoDj"]} -{"Format": "IDEA0", "ID": "f8f5b3c4-f0bc-4e79-a5b3-35282d71a56f", "DetectTime": "2023-10-30T14:09:56.552524+02:00", "EventTime": "2023-10-30T14:09:56.552540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CeR7m543HohPT7tWB3"]} -{"Format": "IDEA0", "ID": "f74aa766-77a7-4a92-919e-50c9bb5ba512", "DetectTime": "2023-10-30T14:09:56.582184+02:00", "EventTime": "2023-10-30T14:09:56.582195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CcmKK42KKoxy5jsO96"]} -{"Format": "IDEA0", "ID": "a45e9ece-d155-47c4-a728-d99c32860698", "DetectTime": "2023-10-30T14:09:56.612452+02:00", "EventTime": "2023-10-30T14:09:56.612463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CF3zoj4EChAC0FwGh4"]} -{"Format": "IDEA0", "ID": "6ffb89ca-0c84-4ed2-86a0-0dc1d86c3f53", "DetectTime": "2023-10-30T14:09:56.641783+02:00", "EventTime": "2023-10-30T14:09:56.641799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CeLhFa4Jc8d8r6cWjb"]} -{"Format": "IDEA0", "ID": "3761a623-a9a7-4921-a93b-c7f50f652ae8", "DetectTime": "2023-10-30T14:09:56.669185+02:00", "EventTime": "2023-10-30T14:09:56.669202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CRCJsK29534CUvvty7"]} -{"Format": "IDEA0", "ID": "2b8b083c-847a-421a-86e3-fffd59eee5d4", "DetectTime": "2023-10-30T14:09:56.698001+02:00", "EventTime": "2023-10-30T14:09:56.698016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C1zpjx2AjVwX00Uwg9"]} -{"Format": "IDEA0", "ID": "36372b53-5fb0-4fd1-ba42-736729b28fe1", "DetectTime": "2023-10-30T14:09:56.726479+02:00", "EventTime": "2023-10-30T14:09:56.726491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CYsURB3xZitgI26mtl"]} -{"Format": "Json", "ID": "36372b53-5fb0-4fd1-ba42-736729b28fe1", "DetectTime": "2023-10-30T14:09:56.726479+02:00", "EventTime": "2023-10-30T14:09:56.726491+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:08:29.065655+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:56.785392)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "61cb7ee0-fa8a-4da7-a5e8-a9805c736609", "DetectTime": "2023-10-30T14:09:56.791039+02:00", "EventTime": "2023-10-30T14:09:56.791055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CWWxD12e6Gg3rBiGi6"]} -{"Format": "IDEA0", "ID": "d787661f-5bb9-4ba7-bc86-1c1e32400314", "DetectTime": "2023-10-30T14:09:56.818648+02:00", "EventTime": "2023-10-30T14:09:56.818669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CP5hbV3ujwdpTUJ4m9"]} -{"Format": "IDEA0", "ID": "a8234ec9-02e9-428a-aa93-2e757b27ecd0", "DetectTime": "2023-10-30T14:09:56.848579+02:00", "EventTime": "2023-10-30T14:09:56.848594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CyCQqj29ispFude7g"]} -{"Format": "IDEA0", "ID": "2ece481c-009b-4204-bb11-e18e77dc887c", "DetectTime": "2023-10-30T14:09:56.878691+02:00", "EventTime": "2023-10-30T14:09:56.878707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cf8wLLcUcjGfzr15b"]} -{"Format": "IDEA0", "ID": "1e8a1502-11c4-4cf6-9351-0362d52abe8d", "DetectTime": "2023-10-30T14:09:56.907641+02:00", "EventTime": "2023-10-30T14:09:56.907659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CAkTxf4t1VPuuojwI6"]} -{"Format": "IDEA0", "ID": "5811f1c3-d3f4-49f2-94c1-85a048059f1c", "DetectTime": "2023-10-30T14:09:56.938153+02:00", "EventTime": "2023-10-30T14:09:56.938180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cudt8a3lfMD9Sc2qD7"]} -{"Format": "IDEA0", "ID": "1f3c91dc-1188-4fae-803c-0ea8322c3da1", "DetectTime": "2023-10-30T14:09:56.966092+02:00", "EventTime": "2023-10-30T14:09:56.966108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cb4Wtn4YhrvBlBT32i"]} -{"Format": "IDEA0", "ID": "e0f7f05f-0039-4bdd-a374-27cff9bb7153", "DetectTime": "2023-10-30T14:09:56.995151+02:00", "EventTime": "2023-10-30T14:09:56.995168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CWPyhq1d4gcmkeTVhc"]} -{"Format": "Json", "ID": "e0f7f05f-0039-4bdd-a374-27cff9bb7153", "DetectTime": "2023-10-30T14:09:56.995151+02:00", "EventTime": "2023-10-30T14:09:56.995168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:08:51.039313+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:57.054191)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8d487a7-b701-4c1b-8cad-10ce358cbdb9", "DetectTime": "2023-10-30T14:09:57.059612+02:00", "EventTime": "2023-10-30T14:09:57.059628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CDGDpm17wvTuqkVDbb"]} -{"Format": "IDEA0", "ID": "61f1903c-974f-4061-9559-bf2105d8325c", "DetectTime": "2023-10-30T14:09:57.080699+02:00", "EventTime": "2023-10-30T14:09:57.080716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CfKf3I3RkmC9e3baVa"]} -{"Format": "IDEA0", "ID": "05683b3b-7ef1-4ee6-b2d4-fd3837e90fcc", "DetectTime": "2023-10-30T14:09:57.107527+02:00", "EventTime": "2023-10-30T14:09:57.107540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CWyqJR5K9lzOOTLLk"]} -{"Format": "IDEA0", "ID": "218592c4-b83a-44d5-af3e-019c42db83a6", "DetectTime": "2023-10-30T14:09:57.133582+02:00", "EventTime": "2023-10-30T14:09:57.133593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CPE2KK3bJqOZuKObxh"]} -{"Format": "IDEA0", "ID": "315b0cdb-ae0d-4c99-bc79-5a0ed2bc1d1b", "DetectTime": "2023-10-30T14:09:57.158372+02:00", "EventTime": "2023-10-30T14:09:57.158388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C2h6NefwmLR8Wg6Yi"]} -{"Format": "IDEA0", "ID": "0e15e713-fca5-4557-bb8e-3536e6445634", "DetectTime": "2023-10-30T14:09:57.183914+02:00", "EventTime": "2023-10-30T14:09:57.183928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CyqAhk3ZMbHCbdb4Q5"]} -{"Format": "IDEA0", "ID": "df7edf74-339b-49b9-9eea-25c525f6eb34", "DetectTime": "2023-10-30T14:09:57.208455+02:00", "EventTime": "2023-10-30T14:09:57.208474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C5MgTV221MROi4XVZ8"]} -{"Format": "IDEA0", "ID": "e317af9f-a147-47a7-9f2e-c6b78b09e4f7", "DetectTime": "2023-10-30T14:09:57.234441+02:00", "EventTime": "2023-10-30T14:09:57.234456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CcLpWQ3GgKUrULLDV9"]} -{"Format": "IDEA0", "ID": "bbef474a-ccbb-4e46-9b2e-f9d1c3295b4c", "DetectTime": "2023-10-30T14:09:57.260068+02:00", "EventTime": "2023-10-30T14:09:57.260078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CUROEH2ff1l70Ytbq2"]} -{"Format": "Json", "ID": "bbef474a-ccbb-4e46-9b2e-f9d1c3295b4c", "DetectTime": "2023-10-30T14:09:57.260068+02:00", "EventTime": "2023-10-30T14:09:57.260078+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:39:07.212061+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:57.322164)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "73614dfb-fb5d-4c0b-a858-e07797221f51", "DetectTime": "2023-10-30T14:09:57.326537+02:00", "EventTime": "2023-10-30T14:09:57.326550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Czltb11NspN0h863Jl"]} -{"Format": "IDEA0", "ID": "39aa4339-1cce-47e4-a98a-76bf9f31d854", "DetectTime": "2023-10-30T14:09:57.351428+02:00", "EventTime": "2023-10-30T14:09:57.351444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CjOClg3rJ3eptDiZJe"]} -{"Format": "IDEA0", "ID": "5db985df-09f6-4400-a340-4c35778be9c3", "DetectTime": "2023-10-30T14:09:57.375321+02:00", "EventTime": "2023-10-30T14:09:57.375340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CrUAwZm8GSqOfP7gi"]} -{"Format": "IDEA0", "ID": "d54e2c93-1d35-43f2-95dd-34f735657f3c", "DetectTime": "2023-10-30T14:09:57.395982+02:00", "EventTime": "2023-10-30T14:09:57.396000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CCtuuE1B6LnRgiVcte"]} -{"Format": "IDEA0", "ID": "b3529c14-658a-479d-b8fc-a3a807602589", "DetectTime": "2023-10-30T14:09:57.418054+02:00", "EventTime": "2023-10-30T14:09:57.418070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CfdqPJ2VWn0XWZxbuf"]} -{"Format": "IDEA0", "ID": "2603739d-e5da-4557-be90-26098347fbbf", "DetectTime": "2023-10-30T14:09:57.442922+02:00", "EventTime": "2023-10-30T14:09:57.442939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CRu5cA1SsGYRUFXY79"]} -{"Format": "IDEA0", "ID": "f95c66e9-ea33-465b-aacf-016635c14250", "DetectTime": "2023-10-30T14:09:57.466356+02:00", "EventTime": "2023-10-30T14:09:57.466372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CW2C6G1fuSe0qkxFS2"]} -{"Format": "IDEA0", "ID": "69926bbd-d444-4e90-b049-710b59d796e5", "DetectTime": "2023-10-30T14:09:57.491185+02:00", "EventTime": "2023-10-30T14:09:57.491202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CS2Qt2171AIQqwYs9d"]} -{"Format": "IDEA0", "ID": "17abb462-dad9-4cab-a3d6-61356c8b0950", "DetectTime": "2023-10-30T14:09:57.512995+02:00", "EventTime": "2023-10-30T14:09:57.513006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CaAt3A4QljJXAhEfgh"]} -{"Format": "Json", "ID": "17abb462-dad9-4cab-a3d6-61356c8b0950", "DetectTime": "2023-10-30T14:09:57.512995+02:00", "EventTime": "2023-10-30T14:09:57.513006+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:39:08.832272+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:57.574815)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1011c752-b0f8-40c6-a245-fe468e2c86fe", "DetectTime": "2023-10-30T14:09:57.579910+02:00", "EventTime": "2023-10-30T14:09:57.579920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CKpNB21cGf6r5h6Pr7"]} -{"Format": "IDEA0", "ID": "341a64ff-75f0-43f9-b808-8f4e6d1d3019", "DetectTime": "2023-10-30T14:09:57.599771+02:00", "EventTime": "2023-10-30T14:09:57.599787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CGuzta4rl6jkfJMOA"]} -{"Format": "IDEA0", "ID": "d42813d2-83cd-4813-b5cf-2c8ba9cd51dc", "DetectTime": "2023-10-30T14:09:57.617101+02:00", "EventTime": "2023-10-30T14:09:57.617113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cwr8H84PspmBueY78d"]} -{"Format": "IDEA0", "ID": "ac1fd441-8706-470e-919e-fe4deea1de84", "DetectTime": "2023-10-30T14:09:57.635277+02:00", "EventTime": "2023-10-30T14:09:57.635288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C354tj3zIpWWY39k4e"]} -{"Format": "IDEA0", "ID": "76d5272f-d3af-4b1b-b51a-7e32baaa5fb4", "DetectTime": "2023-10-30T14:09:57.658773+02:00", "EventTime": "2023-10-30T14:09:57.658808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CbO5kL18ZDkdIMjNp3"]} -{"Format": "IDEA0", "ID": "be906247-f98e-4b8b-a45b-4739f2301485", "DetectTime": "2023-10-30T14:09:57.680299+02:00", "EventTime": "2023-10-30T14:09:57.680310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C1FugP39ErNYIz21A1"]} -{"Format": "IDEA0", "ID": "7625968b-90ff-478f-a8e2-2e7cb1c4c6f2", "DetectTime": "2023-10-30T14:09:57.700870+02:00", "EventTime": "2023-10-30T14:09:57.700882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C7k7k44TsA0Ck3Glt5"]} -{"Format": "IDEA0", "ID": "ebf0aff9-04c6-484f-9bcf-b6d2e20b849a", "DetectTime": "2023-10-30T14:09:57.719709+02:00", "EventTime": "2023-10-30T14:09:57.719727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CL1iog12XWSWyPrApe"]} -{"Format": "Json", "ID": "ebf0aff9-04c6-484f-9bcf-b6d2e20b849a", "DetectTime": "2023-10-30T14:09:57.719709+02:00", "EventTime": "2023-10-30T14:09:57.719727+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:39:11.248442+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:57.777139)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a3faf2a0-e8f2-44e8-9c02-13133c6bb1c0", "DetectTime": "2023-10-30T14:09:57.781487+02:00", "EventTime": "2023-10-30T14:09:57.781498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CbzlaCthu19xtYXV9"]} -{"Format": "IDEA0", "ID": "249b6a93-a5bf-434e-b976-6a8f786522a4", "DetectTime": "2023-10-30T14:09:57.802306+02:00", "EventTime": "2023-10-30T14:09:57.802337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CZrd8G23lLdOR0NGud"]} -{"Format": "IDEA0", "ID": "0c994b1c-4c57-4ebe-aec1-cfee73ad87c6", "DetectTime": "2023-10-30T14:09:57.822075+02:00", "EventTime": "2023-10-30T14:09:57.822087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CC5RXp2gVCQadMQ2ig"]} -{"Format": "IDEA0", "ID": "33ae2970-d168-4032-be26-7a85023e053e", "DetectTime": "2023-10-30T14:09:57.841386+02:00", "EventTime": "2023-10-30T14:09:57.841402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CkX0X42bF6A4Qwhcd"]} -{"Format": "IDEA0", "ID": "ef33b0d8-e77b-4ae8-abd3-cc38269c617d", "DetectTime": "2023-10-30T14:09:57.858900+02:00", "EventTime": "2023-10-30T14:09:57.858917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CFaCjx48aDgm4naURb"]} -{"Format": "IDEA0", "ID": "6365b0c8-2d80-4973-b069-7152230acb30", "DetectTime": "2023-10-30T14:09:57.877135+02:00", "EventTime": "2023-10-30T14:09:57.877147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CzfStI3Te09ayVqkkb"]} -{"Format": "IDEA0", "ID": "66a4e985-d4a2-41cc-ac9c-ab7f7250ca60", "DetectTime": "2023-10-30T14:09:57.894490+02:00", "EventTime": "2023-10-30T14:09:57.894506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CrrCGe2jdEoMSmW9ae"]} -{"Format": "IDEA0", "ID": "c6199b1a-4bdb-4909-b2ff-92fe6767dd19", "DetectTime": "2023-10-30T14:09:57.912723+02:00", "EventTime": "2023-10-30T14:09:57.912750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CD0w636vZGVFCS3a"]} -{"Format": "Json", "ID": "c6199b1a-4bdb-4909-b2ff-92fe6767dd19", "DetectTime": "2023-10-30T14:09:57.912723+02:00", "EventTime": "2023-10-30T14:09:57.912750+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T20:39:13.388803+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2023/10/30 14:09:57.972547)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1de0168d-0066-4631-b963-95a4d13d0bb4", "DetectTime": "2023-10-30T14:09:57.976819+02:00", "EventTime": "2023-10-30T14:09:57.976830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBti7a4KUZxzPGkPhj"]} -{"Format": "IDEA0", "ID": "7ecdb0be-78bf-4031-8bdc-106d37d730e3", "DetectTime": "2023-10-30T14:09:57.995027+02:00", "EventTime": "2023-10-30T14:09:57.995044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CxOo3t3L56uO9PT4C1"]} -{"Format": "IDEA0", "ID": "61348d70-6b63-429f-91a8-eed74888e15f", "DetectTime": "2023-10-30T14:09:58.027700+02:00", "EventTime": "2023-10-30T14:09:58.027714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CrQK53RnJm0U3gKQ4"]} -{"Format": "IDEA0", "ID": "fee33ef8-fc32-4c73-a2df-cce94b81f296", "DetectTime": "2023-10-30T14:09:58.058499+02:00", "EventTime": "2023-10-30T14:09:58.058515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C2guWf3cvJztCgcCVg"]} -{"Format": "IDEA0", "ID": "8b6ad933-359a-4d12-96aa-1a1b11d27db3", "DetectTime": "2023-10-30T14:09:58.089362+02:00", "EventTime": "2023-10-30T14:09:58.089388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CiyWjkbJz7fHBGTad"]} -{"Format": "IDEA0", "ID": "06b18f99-f4eb-4fe4-8139-7db28bf7295f", "DetectTime": "2023-10-30T14:09:58.124714+02:00", "EventTime": "2023-10-30T14:09:58.124727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CycXBI21eeILqKvEq6"]} -{"Format": "IDEA0", "ID": "6b496da3-e270-41db-a539-2d5e3fae3aac", "DetectTime": "2023-10-30T14:09:58.156591+02:00", "EventTime": "2023-10-30T14:09:58.156604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C13fl52aF7RKlivtul"]} -{"Format": "IDEA0", "ID": "17f10446-bbd5-48c4-baba-b46e505e5161", "DetectTime": "2023-10-30T14:09:58.187107+02:00", "EventTime": "2023-10-30T14:09:58.187121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CbGyFC2Zp0vaB05zxf"]} -{"Format": "IDEA0", "ID": "aa48e004-0845-4f9c-9b52-5e13a58d7fb7", "DetectTime": "2023-10-30T14:09:58.218912+02:00", "EventTime": "2023-10-30T14:09:58.218924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CbFz0B2yAvfaXkj0if"]} -{"Format": "Json", "ID": "aa48e004-0845-4f9c-9b52-5e13a58d7fb7", "DetectTime": "2023-10-30T14:09:58.218912+02:00", "EventTime": "2023-10-30T14:09:58.218924+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:09:34.915769+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:58.275431)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "285ebc4f-2c9b-4dac-a65b-9349e557dac9", "DetectTime": "2023-10-30T14:09:58.281361+02:00", "EventTime": "2023-10-30T14:09:58.281379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ci6Rrf4xYpPty59Omh"]} -{"Format": "IDEA0", "ID": "31f633b9-03ea-4dc0-853b-936e2adf1876", "DetectTime": "2023-10-30T14:09:58.313687+02:00", "EventTime": "2023-10-30T14:09:58.313700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CzIytm4mXd1Rzoa9cg"]} -{"Format": "IDEA0", "ID": "0b380a5a-21be-4659-b1f5-f83611c64df2", "DetectTime": "2023-10-30T14:09:58.343870+02:00", "EventTime": "2023-10-30T14:09:58.343886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CabUZI1O4qfOnjd0Xa"]} -{"Format": "IDEA0", "ID": "51d5ea5c-acca-4edd-b3a9-011baa6b9aba", "DetectTime": "2023-10-30T14:09:58.371381+02:00", "EventTime": "2023-10-30T14:09:58.371409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cd8Ool2b3YEjxhksK"]} -{"Format": "IDEA0", "ID": "3a8b8c51-57fb-48f2-8a6c-12b2a34d6523", "DetectTime": "2023-10-30T14:09:58.399948+02:00", "EventTime": "2023-10-30T14:09:58.399961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C1KeWt3eZtPu4wC7Oi"]} -{"Format": "IDEA0", "ID": "4e057eba-d5f9-4128-b321-c3deee9dba0c", "DetectTime": "2023-10-30T14:09:58.431252+02:00", "EventTime": "2023-10-30T14:09:58.431269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CNluQz3B6E538cvzK3"]} -{"Format": "IDEA0", "ID": "22f6308c-5246-43b9-a330-ab358b193b4f", "DetectTime": "2023-10-30T14:09:58.464728+02:00", "EventTime": "2023-10-30T14:09:58.464746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C0rOPaMuFH37wgdql"]} -{"Format": "IDEA0", "ID": "2c24af0f-332c-40b5-b686-c6e213efac76", "DetectTime": "2023-10-30T14:09:58.496082+02:00", "EventTime": "2023-10-30T14:09:58.496097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CNPCZ510P9YD6zopC"]} -{"Format": "Json", "ID": "2c24af0f-332c-40b5-b686-c6e213efac76", "DetectTime": "2023-10-30T14:09:58.496082+02:00", "EventTime": "2023-10-30T14:09:58.496097+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:09:37.279255+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:58.570155)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "312d9c0f-033d-4aea-af65-ab174aad4628", "DetectTime": "2023-10-30T14:09:58.575589+02:00", "EventTime": "2023-10-30T14:09:58.575606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CF5Yqe2oGXrA8lKr14"]} -{"Format": "IDEA0", "ID": "bfb51982-dacf-40e8-9e73-d48610f3c1ef", "DetectTime": "2023-10-30T14:09:58.606179+02:00", "EventTime": "2023-10-30T14:09:58.606197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CkiRlu3DhKdsdRs6Mi"]} -{"Format": "IDEA0", "ID": "6d2fa83c-bea2-41c7-9231-22f615662707", "DetectTime": "2023-10-30T14:09:58.635243+02:00", "EventTime": "2023-10-30T14:09:58.635261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C3YnFL3G5i8ofyERE"]} -{"Format": "IDEA0", "ID": "30cf3b68-3845-46a0-be31-07225fa0c7bb", "DetectTime": "2023-10-30T14:09:58.664234+02:00", "EventTime": "2023-10-30T14:09:58.664250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CcWYhG4GtLF7VBUZk1"]} -{"Format": "IDEA0", "ID": "52ea1986-ce9c-4ee8-8cc8-a577c480bed4", "DetectTime": "2023-10-30T14:09:58.691081+02:00", "EventTime": "2023-10-30T14:09:58.691098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CUNQij2aSEDN74kET4"]} -{"Format": "IDEA0", "ID": "91ff0bc5-d0d9-43ae-8a69-ed82524c88fb", "DetectTime": "2023-10-30T14:09:58.718416+02:00", "EventTime": "2023-10-30T14:09:58.718429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CmT3mr2uNZD45E3GO9"]} -{"Format": "IDEA0", "ID": "ea9b23db-a346-4242-9d18-cb81244b14fc", "DetectTime": "2023-10-30T14:09:58.745469+02:00", "EventTime": "2023-10-30T14:09:58.745480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CECeeb2x1lg5nQgEZ9"]} -{"Format": "IDEA0", "ID": "7a9cb0ed-984e-4360-9f75-7b33a985d4ea", "DetectTime": "2023-10-30T14:09:58.771826+02:00", "EventTime": "2023-10-30T14:09:58.771838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CPHX7r1srdy3eECyt8"]} -{"Format": "Json", "ID": "7a9cb0ed-984e-4360-9f75-7b33a985d4ea", "DetectTime": "2023-10-30T14:09:58.771826+02:00", "EventTime": "2023-10-30T14:09:58.771838+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:09:43.800371+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:58.839038)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7649b922-6817-4fb7-a0e9-67075a6e5b7e", "DetectTime": "2023-10-30T14:09:58.843502+02:00", "EventTime": "2023-10-30T14:09:58.843521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CeFd9D3U5LwTbupzp7"]} -{"Format": "IDEA0", "ID": "8abbfbec-4e75-4068-8d65-c00be7e0b0c3", "DetectTime": "2023-10-30T14:09:58.871006+02:00", "EventTime": "2023-10-30T14:09:58.871027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CEirs2IvIBil98pE8"]} -{"Format": "IDEA0", "ID": "b84a76a3-816f-4bab-96f8-14669f5ba58e", "DetectTime": "2023-10-30T14:09:58.896909+02:00", "EventTime": "2023-10-30T14:09:58.896925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["ChafuF37dQyfQItut7"]} -{"Format": "IDEA0", "ID": "61fcb9db-f692-42f3-9f0b-fc9f4dfc217d", "DetectTime": "2023-10-30T14:09:58.923897+02:00", "EventTime": "2023-10-30T14:09:58.923913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cf48h14R2xelpOpwr2"]} -{"Format": "IDEA0", "ID": "fa5bc3d3-5750-4178-a267-379baa614dad", "DetectTime": "2023-10-30T14:09:58.951107+02:00", "EventTime": "2023-10-30T14:09:58.951123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CI5afu1uXKPVREKqA5"]} -{"Format": "IDEA0", "ID": "eed0ec87-3f1c-48e1-8596-9a03dc2ac0ca", "DetectTime": "2023-10-30T14:09:58.974144+02:00", "EventTime": "2023-10-30T14:09:58.974162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C0HyHY1zYqFx3M00V9"]} -{"Format": "IDEA0", "ID": "7d739542-887d-4312-b766-eee29e3d85ac", "DetectTime": "2023-10-30T14:09:58.998309+02:00", "EventTime": "2023-10-30T14:09:58.998320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C3OFBO2RDahXPviC1"]} -{"Format": "IDEA0", "ID": "8f42cb80-6eb1-4775-9165-8bbc3d6c5d99", "DetectTime": "2023-10-30T14:09:59.024669+02:00", "EventTime": "2023-10-30T14:09:59.024683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CHQYuh2Nq5KP2sLqe6"]} -{"Format": "Json", "ID": "8f42cb80-6eb1-4775-9165-8bbc3d6c5d99", "DetectTime": "2023-10-30T14:09:59.024669+02:00", "EventTime": "2023-10-30T14:09:59.024683+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:40:13.015550+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:59.091566)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "121d73d2-b804-469c-b2fb-4a034b0895a8", "DetectTime": "2023-10-30T14:09:59.096456+02:00", "EventTime": "2023-10-30T14:09:59.096473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ChENEB2VOib54PSv5h"]} -{"Format": "IDEA0", "ID": "2d7869a7-e657-4c3e-bee6-8435d9e8c60d", "DetectTime": "2023-10-30T14:09:59.123466+02:00", "EventTime": "2023-10-30T14:09:59.123487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwClGh4lCl1RMK1MP3"]} -{"Format": "IDEA0", "ID": "a30e7cc1-7005-4e05-a26d-dc791e24efd3", "DetectTime": "2023-10-30T14:09:59.147680+02:00", "EventTime": "2023-10-30T14:09:59.147698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CpJCyl43vhehW1XQqe"]} -{"Format": "IDEA0", "ID": "c6ffb3d6-68da-4313-aa16-6fb0aab22932", "DetectTime": "2023-10-30T14:09:59.167056+02:00", "EventTime": "2023-10-30T14:09:59.167082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CrDcKiPEi1auZ4wc7"]} -{"Format": "IDEA0", "ID": "cdc570fc-aa14-443c-bf18-f82fd126bb72", "DetectTime": "2023-10-30T14:09:59.189104+02:00", "EventTime": "2023-10-30T14:09:59.189120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CRcOws1iP0KZqpRrA4"]} -{"Format": "IDEA0", "ID": "07d7c2fc-df92-4e53-8bf5-6fc1af74d380", "DetectTime": "2023-10-30T14:09:59.212509+02:00", "EventTime": "2023-10-30T14:09:59.212523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["C0JH9L3zLNK4E6rxJ8"]} -{"Format": "IDEA0", "ID": "aef189b4-4bca-41c7-88dd-6335521e13a1", "DetectTime": "2023-10-30T14:09:59.234851+02:00", "EventTime": "2023-10-30T14:09:59.234868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CORPif1FuINIPHgUp2"]} -{"Format": "IDEA0", "ID": "0e55e321-7171-46c3-a16e-0b7043648ede", "DetectTime": "2023-10-30T14:09:59.257432+02:00", "EventTime": "2023-10-30T14:09:59.257450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CBUQe32l1qTotAJZB2"]} -{"Format": "IDEA0", "ID": "8bb50243-5ddc-497f-8118-d420718ef8cf", "DetectTime": "2023-10-30T14:09:59.277368+02:00", "EventTime": "2023-10-30T14:09:59.277381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRJM5V1kMz5iprsDsj"]} -{"Format": "Json", "ID": "8bb50243-5ddc-497f-8118-d420718ef8cf", "DetectTime": "2023-10-30T14:09:59.277368+02:00", "EventTime": "2023-10-30T14:09:59.277381+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:40:17.728252+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:59.333728)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6d58312-beac-4b7e-b1df-996504633420", "DetectTime": "2023-10-30T14:09:59.339151+02:00", "EventTime": "2023-10-30T14:09:59.339169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CCGiA03EhXes96tpZ"]} -{"Format": "IDEA0", "ID": "7ea5ce6f-2f3e-4094-aa84-7a19483df01e", "DetectTime": "2023-10-30T14:09:59.361281+02:00", "EventTime": "2023-10-30T14:09:59.361295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["ClTawr41NzBZDFm0J"]} -{"Format": "IDEA0", "ID": "9ccaa071-7905-49dd-a2de-f299212819e7", "DetectTime": "2023-10-30T14:09:59.383087+02:00", "EventTime": "2023-10-30T14:09:59.383104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CQjEz1Jq97HRVG9Ha"]} -{"Format": "IDEA0", "ID": "8f566eb9-c6a3-46a5-b7de-225c5645a537", "DetectTime": "2023-10-30T14:09:59.404137+02:00", "EventTime": "2023-10-30T14:09:59.404151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1W4rt3xFq0NpqBFH6"]} -{"Format": "IDEA0", "ID": "46619858-9463-4177-a1d9-54a9e7420fb0", "DetectTime": "2023-10-30T14:09:59.424898+02:00", "EventTime": "2023-10-30T14:09:59.424913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CyUvgm3oPIgKGd37Xf"]} -{"Format": "IDEA0", "ID": "6c322c2d-da79-441b-936a-4e15f4b046c4", "DetectTime": "2023-10-30T14:09:59.446202+02:00", "EventTime": "2023-10-30T14:09:59.446219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQCZWv2La7g3xY5lU2"]} -{"Format": "IDEA0", "ID": "3ac8a0d6-3dae-4fb7-b011-9c48522ca0f4", "DetectTime": "2023-10-30T14:09:59.467336+02:00", "EventTime": "2023-10-30T14:09:59.467357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CaCnbt4Uh7o2Bkvyjd"]} -{"Format": "IDEA0", "ID": "f58de91e-b6e6-42a8-861e-24bfaade3977", "DetectTime": "2023-10-30T14:09:59.491602+02:00", "EventTime": "2023-10-30T14:09:59.491620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CccBPw1qWJlmTQOsV9"]} -{"Format": "Json", "ID": "f58de91e-b6e6-42a8-861e-24bfaade3977", "DetectTime": "2023-10-30T14:09:59.491602+02:00", "EventTime": "2023-10-30T14:09:59.491620+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:40:20.183526+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:59.550645)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e4dd765-d545-44ca-9642-257313654188", "DetectTime": "2023-10-30T14:09:59.556619+02:00", "EventTime": "2023-10-30T14:09:59.556798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CoH40A1cNf8wcO7Yl4"]} -{"Format": "IDEA0", "ID": "7bbe4756-4afa-4ea3-911c-6f0a8981dc23", "DetectTime": "2023-10-30T14:09:59.581167+02:00", "EventTime": "2023-10-30T14:09:59.581184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CNozXSZUR8rtMsKRe"]} -{"Format": "IDEA0", "ID": "19055331-aeaa-47b1-9569-1c9d5fa22b13", "DetectTime": "2023-10-30T14:09:59.601502+02:00", "EventTime": "2023-10-30T14:09:59.601514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CtXSXaum08lfvIlfc"]} -{"Format": "IDEA0", "ID": "06c112b8-f74f-4520-97df-f86d77bd7dd3", "DetectTime": "2023-10-30T14:09:59.621413+02:00", "EventTime": "2023-10-30T14:09:59.621426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CXQYLx1U77wOPJGDt"]} -{"Format": "IDEA0", "ID": "9689ca0c-64d6-425b-a842-19e8b462fb7b", "DetectTime": "2023-10-30T14:09:59.642108+02:00", "EventTime": "2023-10-30T14:09:59.642123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHQRRn19W1zIkJykO5"]} -{"Format": "IDEA0", "ID": "47fcbba0-24b0-4cb8-ac07-1e62d6cb1c87", "DetectTime": "2023-10-30T14:09:59.663399+02:00", "EventTime": "2023-10-30T14:09:59.663415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CYOKsF36LWpDMMRgxh"]} -{"Format": "IDEA0", "ID": "3880e488-f048-4e0a-9af3-b33d9b3b469c", "DetectTime": "2023-10-30T14:09:59.684388+02:00", "EventTime": "2023-10-30T14:09:59.684406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CCJdql2duHPAx74dLe"]} -{"Format": "IDEA0", "ID": "e1f9a1c3-4393-4fe8-8ba4-32bde5c7fd9b", "DetectTime": "2023-10-30T14:09:59.701944+02:00", "EventTime": "2023-10-30T14:09:59.701956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CCl6OArKGY9VqX09l"]} -{"Format": "Json", "ID": "e1f9a1c3-4393-4fe8-8ba4-32bde5c7fd9b", "DetectTime": "2023-10-30T14:09:59.701944+02:00", "EventTime": "2023-10-30T14:09:59.701956+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T21:40:22.408006+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2023/10/30 14:09:59.746884)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a5d55c56-c5a4-4ff1-a23d-b37f3fdac17c", "DetectTime": "2023-10-30T14:09:59.750952+02:00", "EventTime": "2023-10-30T14:09:59.750967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJwk0K1HmZSIicAM01"]} -{"Format": "IDEA0", "ID": "ee5314b2-c497-4efd-92d8-929162006452", "DetectTime": "2023-10-30T14:09:59.769470+02:00", "EventTime": "2023-10-30T14:09:59.769491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Czikxd471HZH7m397d"]} -{"Format": "IDEA0", "ID": "67bff483-bfe2-4b33-aec2-4d640ccc00e5", "DetectTime": "2023-10-30T14:09:59.787519+02:00", "EventTime": "2023-10-30T14:09:59.787537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C7q24j1ghqiFwTckT"]} -{"Format": "IDEA0", "ID": "bc51d988-180c-49e8-813d-0559f3b52dc6", "DetectTime": "2023-10-30T14:09:59.816913+02:00", "EventTime": "2023-10-30T14:09:59.816925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C9TB1V1AMVDgcHdfB6"]} -{"Format": "IDEA0", "ID": "12940273-27a1-44e1-af23-ad1c514ff517", "DetectTime": "2023-10-30T14:09:59.844224+02:00", "EventTime": "2023-10-30T14:09:59.844235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C06INX0dsCU5QJNP"]} -{"Format": "IDEA0", "ID": "f5d615d4-957c-44e6-89de-9e90b1d79b77", "DetectTime": "2023-10-30T14:09:59.875836+02:00", "EventTime": "2023-10-30T14:09:59.875853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CV7M9L3NmWTbJ18bA4"]} -{"Format": "IDEA0", "ID": "9c448c77-2728-4f8c-a8d0-86ec735181d0", "DetectTime": "2023-10-30T14:09:59.906989+02:00", "EventTime": "2023-10-30T14:09:59.907007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cx3E1q4HojP0192bE"]} -{"Format": "IDEA0", "ID": "a5b3b6a6-63fc-4447-8fba-74478b9848bd", "DetectTime": "2023-10-30T14:09:59.936892+02:00", "EventTime": "2023-10-30T14:09:59.936916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CEvOQ52I6YsM3dyGnb"]} -{"Format": "IDEA0", "ID": "192684ec-41c9-4f86-8459-ec30e640ed6e", "DetectTime": "2023-10-30T14:09:59.966337+02:00", "EventTime": "2023-10-30T14:09:59.966349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CyUU0N1FHYxatVSObg"]} -{"Format": "IDEA0", "ID": "727b56dc-7446-461d-bed0-2adecdc413eb", "DetectTime": "2023-10-30T14:09:59.998874+02:00", "EventTime": "2023-10-30T14:09:59.998891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CIuVag1hBlWjX1n2T9"]} -{"Format": "Json", "ID": "727b56dc-7446-461d-bed0-2adecdc413eb", "DetectTime": "2023-10-30T14:09:59.998874+02:00", "EventTime": "2023-10-30T14:09:59.998891+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:10:32.399598+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:00.065573)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "14a4ac5d-552a-4198-988d-975392e7d54e", "DetectTime": "2023-10-30T14:10:00.070964+02:00", "EventTime": "2023-10-30T14:10:00.070982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CLrXWenzmtwjd8hna"]} -{"Format": "IDEA0", "ID": "fb4ebcde-1557-4649-98d3-0e62d2bacb88", "DetectTime": "2023-10-30T14:10:00.102495+02:00", "EventTime": "2023-10-30T14:10:00.102507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C8I6Tr2nlyEp0YcNZd"]} -{"Format": "IDEA0", "ID": "38506107-a291-4e5d-817b-7b4df67659f7", "DetectTime": "2023-10-30T14:10:00.134526+02:00", "EventTime": "2023-10-30T14:10:00.134552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C5zYkRpHPlgVK02D4"]} -{"Format": "IDEA0", "ID": "d04883fd-a98b-4302-8cbc-a2b965c8c3fe", "DetectTime": "2023-10-30T14:10:00.162856+02:00", "EventTime": "2023-10-30T14:10:00.162883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C2EsAjav3uaFkRZff"]} -{"Format": "IDEA0", "ID": "2b607517-af5c-47d0-8e9c-08ab0dfae471", "DetectTime": "2023-10-30T14:10:00.192352+02:00", "EventTime": "2023-10-30T14:10:00.192380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CMYIjo4tFFnWzp6Fn2"]} -{"Format": "IDEA0", "ID": "62b82880-c07f-421d-9c61-7686c15e8ac2", "DetectTime": "2023-10-30T14:10:00.222715+02:00", "EventTime": "2023-10-30T14:10:00.222731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C5qIRQ1DHyTFLaTn68"]} -{"Format": "IDEA0", "ID": "e76db640-6706-4b67-a17d-28288f71e41b", "DetectTime": "2023-10-30T14:10:00.251027+02:00", "EventTime": "2023-10-30T14:10:00.251042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CwlgOH35aN7juntySd"]} -{"Format": "IDEA0", "ID": "b81a4d11-b2f6-4f44-8864-66cf40212d3d", "DetectTime": "2023-10-30T14:10:00.278834+02:00", "EventTime": "2023-10-30T14:10:00.278851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CD5Vgo8xeaMIa7YBk"]} -{"Format": "Json", "ID": "b81a4d11-b2f6-4f44-8864-66cf40212d3d", "DetectTime": "2023-10-30T14:10:00.278834+02:00", "EventTime": "2023-10-30T14:10:00.278851+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:10:34.832788+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:00.344713)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e8b4e218-a060-49e7-a4b0-05f0c054b3a8", "DetectTime": "2023-10-30T14:10:00.349609+02:00", "EventTime": "2023-10-30T14:10:00.349622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CGFbqu3TVLwe8HfCTj"]} -{"Format": "IDEA0", "ID": "b0792410-ad33-42ec-9fed-14ef0244a9d9", "DetectTime": "2023-10-30T14:10:00.374871+02:00", "EventTime": "2023-10-30T14:10:00.374889+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChX6281dzTx6Z1ANjj"]} -{"Format": "IDEA0", "ID": "f419b2d1-6df3-4a57-8914-b4fb9d393ca8", "DetectTime": "2023-10-30T14:10:00.394010+02:00", "EventTime": "2023-10-30T14:10:00.394022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CYd2KL3HsjXSYdezl9"]} -{"Format": "IDEA0", "ID": "8bfc935a-025e-4389-8c4b-0da5136721c5", "DetectTime": "2023-10-30T14:10:00.420979+02:00", "EventTime": "2023-10-30T14:10:00.420993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CBgyfL3dFsq2t7b7of"]} -{"Format": "IDEA0", "ID": "d6e3439e-71cc-4bda-9af2-e7ead22b74a9", "DetectTime": "2023-10-30T14:10:00.447552+02:00", "EventTime": "2023-10-30T14:10:00.447564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C85YqJ2hapfin8FZD3"]} -{"Format": "IDEA0", "ID": "9ca35f76-2b2c-45d7-9fb9-e676ce3f194d", "DetectTime": "2023-10-30T14:10:00.472538+02:00", "EventTime": "2023-10-30T14:10:00.472554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CThVfzTPsantfjTs9"]} -{"Format": "IDEA0", "ID": "72259c4d-3dc4-414e-8f90-b85e2107c0dc", "DetectTime": "2023-10-30T14:10:00.502632+02:00", "EventTime": "2023-10-30T14:10:00.502645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CxcigZ7t0epfbFmPg"]} -{"Format": "IDEA0", "ID": "b00ad975-d479-4953-ade5-586ca68d97da", "DetectTime": "2023-10-30T14:10:00.529049+02:00", "EventTime": "2023-10-30T14:10:00.529065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cv2T962FD8iEUPzcUl"]} -{"Format": "IDEA0", "ID": "e9722e2d-de75-4d58-b0a9-4d5dcf961749", "DetectTime": "2023-10-30T14:10:00.557906+02:00", "EventTime": "2023-10-30T14:10:00.557925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CSxveP3GPNFaIdfk7g"]} -{"Format": "Json", "ID": "e9722e2d-de75-4d58-b0a9-4d5dcf961749", "DetectTime": "2023-10-30T14:10:00.557906+02:00", "EventTime": "2023-10-30T14:10:00.557925+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:10:36.839142+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:00.624225)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b55cb6f1-8c13-4c7a-82c3-6d60f983c3f9", "DetectTime": "2023-10-30T14:10:00.628384+02:00", "EventTime": "2023-10-30T14:10:00.628401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CgRts74Q6VDqUo5SLe"]} -{"Format": "IDEA0", "ID": "d1893261-1bf0-432c-a4d3-21b031afbf1c", "DetectTime": "2023-10-30T14:10:00.652122+02:00", "EventTime": "2023-10-30T14:10:00.652149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CyaIAo3NGF73KaIlg"]} -{"Format": "IDEA0", "ID": "53bb3423-e3ff-4bfe-933e-20eb32f32e08", "DetectTime": "2023-10-30T14:10:00.678129+02:00", "EventTime": "2023-10-30T14:10:00.678142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CqrZdU3CniD13fh4Gl"]} -{"Format": "IDEA0", "ID": "23749220-1e05-497f-ae56-a009c34a31c6", "DetectTime": "2023-10-30T14:10:00.701529+02:00", "EventTime": "2023-10-30T14:10:00.701540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CbHhTv2wyXADrIUMLf"]} -{"Format": "IDEA0", "ID": "a331ad94-7ae1-44b4-97d1-ebf17957af31", "DetectTime": "2023-10-30T14:10:00.728058+02:00", "EventTime": "2023-10-30T14:10:00.728074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cr6htq26pDTa6ChdH2"]} -{"Format": "IDEA0", "ID": "be14a871-4429-4298-a6ff-3ba3dee341a2", "DetectTime": "2023-10-30T14:10:00.752176+02:00", "EventTime": "2023-10-30T14:10:00.752192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C5NIqG3AYGjam7pEN9"]} -{"Format": "IDEA0", "ID": "8b8df3f1-88c7-46ec-99e8-995d2ddd1c30", "DetectTime": "2023-10-30T14:10:00.777652+02:00", "EventTime": "2023-10-30T14:10:00.777665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["Cakmoy4kzjdwd8qWA7"]} -{"Format": "IDEA0", "ID": "206c92f4-76fa-4cbc-99e2-160d50bd74a7", "DetectTime": "2023-10-30T14:10:00.801556+02:00", "EventTime": "2023-10-30T14:10:00.801574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CoPY8d2CAareDuOAFi"]} -{"Format": "Json", "ID": "206c92f4-76fa-4cbc-99e2-160d50bd74a7", "DetectTime": "2023-10-30T14:10:00.801556+02:00", "EventTime": "2023-10-30T14:10:00.801574+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:41:02.381802+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:00.869182)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e10b21b6-554c-4c93-93a1-37e44aa5e0a4", "DetectTime": "2023-10-30T14:10:00.874854+02:00", "EventTime": "2023-10-30T14:10:00.874873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C3eeUIxlpueFHI5Fc"]} -{"Format": "IDEA0", "ID": "7cff35b5-eede-46e3-8aca-2c4a2fa8f30d", "DetectTime": "2023-10-30T14:10:00.898674+02:00", "EventTime": "2023-10-30T14:10:00.898691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4gxmr35K69Fp7dcba"]} -{"Format": "IDEA0", "ID": "b6a35ba2-9e82-4112-bf5a-189ad6f65847", "DetectTime": "2023-10-30T14:10:00.923502+02:00", "EventTime": "2023-10-30T14:10:00.923529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CigEfXFfl5AttWfK"]} -{"Format": "IDEA0", "ID": "347062a1-191c-4c89-a813-1b650a6298a2", "DetectTime": "2023-10-30T14:10:00.948516+02:00", "EventTime": "2023-10-30T14:10:00.948528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CZsOq2roequnDcrUb"]} -{"Format": "IDEA0", "ID": "2e9adc5f-9b49-44fe-9986-2ef62e91736e", "DetectTime": "2023-10-30T14:10:00.972194+02:00", "EventTime": "2023-10-30T14:10:00.972211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CjNvYy1kaM9MhOWc71"]} -{"Format": "IDEA0", "ID": "0f1c3332-d2a6-4c61-bf12-5cbf57c911b6", "DetectTime": "2023-10-30T14:10:00.993821+02:00", "EventTime": "2023-10-30T14:10:00.993835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cb8Vb7ze4UumWSkh6"]} -{"Format": "IDEA0", "ID": "e69be5ad-5f14-40a5-a722-e28a088f2bf0", "DetectTime": "2023-10-30T14:10:01.016901+02:00", "EventTime": "2023-10-30T14:10:01.016919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C5Cz5w1nRF4YZ7Mf84"]} -{"Format": "IDEA0", "ID": "bac14eef-a8f8-40eb-8b6d-f7f92d4b0473", "DetectTime": "2023-10-30T14:10:01.040824+02:00", "EventTime": "2023-10-30T14:10:01.040837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CrqPgK1cDigEpZgEj"]} -{"Format": "Json", "ID": "bac14eef-a8f8-40eb-8b6d-f7f92d4b0473", "DetectTime": "2023-10-30T14:10:01.040824+02:00", "EventTime": "2023-10-30T14:10:01.040837+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:41:04.152108+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:01.100948)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "839a2e0f-38c8-4516-a4d2-261e7054eab9", "DetectTime": "2023-10-30T14:10:01.105918+02:00", "EventTime": "2023-10-30T14:10:01.105931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C1QiVQ3WzhGfKFQ5Sg"]} -{"Format": "IDEA0", "ID": "f99efdc2-ee27-4a7a-ab82-82b18444c77b", "DetectTime": "2023-10-30T14:10:01.128591+02:00", "EventTime": "2023-10-30T14:10:01.128607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CG1e8GcQ9H37raEjd"]} -{"Format": "IDEA0", "ID": "b14adf58-2cfc-4107-805d-f2f7071a1a5c", "DetectTime": "2023-10-30T14:10:01.148713+02:00", "EventTime": "2023-10-30T14:10:01.148726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["COxGiqt6qLwwGBZ3"]} -{"Format": "IDEA0", "ID": "605679a3-8391-4080-b25b-78b7fdd46644", "DetectTime": "2023-10-30T14:10:01.169184+02:00", "EventTime": "2023-10-30T14:10:01.169203+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CeEEqf3rtsPWSLnl6i"]} -{"Format": "IDEA0", "ID": "b5e4c8b4-c1de-4c9c-a79b-de671593759e", "DetectTime": "2023-10-30T14:10:01.191945+02:00", "EventTime": "2023-10-30T14:10:01.191961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CHb8Ab1v1wCmAmpBPa"]} -{"Format": "IDEA0", "ID": "77fa8fe6-0609-48e5-ba42-0b65c3124449", "DetectTime": "2023-10-30T14:10:01.214927+02:00", "EventTime": "2023-10-30T14:10:01.214938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CCOtAp2oEM50ZXardc"]} -{"Format": "IDEA0", "ID": "9a7d7331-015f-4928-a666-6eab1a9a0e24", "DetectTime": "2023-10-30T14:10:01.236762+02:00", "EventTime": "2023-10-30T14:10:01.236778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CLPUJB3CQCEQw509L2"]} -{"Format": "IDEA0", "ID": "785ef39a-066d-4d6a-8bb4-bfc375618178", "DetectTime": "2023-10-30T14:10:01.258419+02:00", "EventTime": "2023-10-30T14:10:01.258434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["ClDOUX2RAhy4rwMVag"]} -{"Format": "IDEA0", "ID": "47af007f-a019-4d43-8038-489066abbb11", "DetectTime": "2023-10-30T14:10:01.278456+02:00", "EventTime": "2023-10-30T14:10:01.278470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CLriLk1eoXlARl4cXf"]} -{"Format": "Json", "ID": "47af007f-a019-4d43-8038-489066abbb11", "DetectTime": "2023-10-30T14:10:01.278456+02:00", "EventTime": "2023-10-30T14:10:01.278470+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:41:07.134047+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:01.335222)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0ac3e8a9-004b-468d-8b45-d91c0b388763", "DetectTime": "2023-10-30T14:10:01.340914+02:00", "EventTime": "2023-10-30T14:10:01.340930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cwhpd63ddZRACYaXsc"]} -{"Format": "IDEA0", "ID": "3653fc03-92ee-4afe-976e-2cb753628f29", "DetectTime": "2023-10-30T14:10:01.361246+02:00", "EventTime": "2023-10-30T14:10:01.361260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CS890Y2bKJTaRwKfl"]} -{"Format": "IDEA0", "ID": "5e117a5b-9a3a-4045-a5a8-d000d5558b66", "DetectTime": "2023-10-30T14:10:01.382533+02:00", "EventTime": "2023-10-30T14:10:01.382550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CYpjoS2AAhEmnhPJOk"]} -{"Format": "IDEA0", "ID": "75464847-5d52-445e-a673-743255ce0e1e", "DetectTime": "2023-10-30T14:10:01.400133+02:00", "EventTime": "2023-10-30T14:10:01.400145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CEHwA34gokAmnEqoWd"]} -{"Format": "IDEA0", "ID": "dad046a7-c4eb-4185-b372-1a8f7188541c", "DetectTime": "2023-10-30T14:10:01.420331+02:00", "EventTime": "2023-10-30T14:10:01.420351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CXJ1Yz1PwarhSRJB06"]} -{"Format": "IDEA0", "ID": "8473d4f2-9d3b-490e-bae6-1ee601d9e586", "DetectTime": "2023-10-30T14:10:01.438090+02:00", "EventTime": "2023-10-30T14:10:01.438101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CR4dU41fmRpO8t4UNj"]} -{"Format": "IDEA0", "ID": "3d9b5e31-40b0-48d5-85b0-79747628cd70", "DetectTime": "2023-10-30T14:10:01.455095+02:00", "EventTime": "2023-10-30T14:10:01.455108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C2UDqf4gobG5hX6zol"]} -{"Format": "IDEA0", "ID": "7868fb4a-f3f9-47e2-8aa4-ae23d19875ce", "DetectTime": "2023-10-30T14:10:01.473321+02:00", "EventTime": "2023-10-30T14:10:01.473342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CgjYR44wSTaMd0nEpc"]} -{"Format": "IDEA0", "ID": "979a21b5-2500-41e0-8231-b49fb064065d", "DetectTime": "2023-10-30T14:10:01.490954+02:00", "EventTime": "2023-10-30T14:10:01.490985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CPREkO2clwJdcmSGa5"]} -{"Format": "Json", "ID": "979a21b5-2500-41e0-8231-b49fb064065d", "DetectTime": "2023-10-30T14:10:01.490954+02:00", "EventTime": "2023-10-30T14:10:01.490985+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T22:41:09.643707+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2023/10/30 14:10:01.545875)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f85acf58-3301-40d9-82c5-a0a6b8fe7d38", "DetectTime": "2023-10-30T14:10:01.549775+02:00", "EventTime": "2023-10-30T14:10:01.549794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CNfrFG259OfmSARCs8"]} -{"Format": "IDEA0", "ID": "f62c183f-cc36-44c5-b7a9-bf3f129f0445", "DetectTime": "2023-10-30T14:10:01.566281+02:00", "EventTime": "2023-10-30T14:10:01.566298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C39gx03HfGmgAVAZwh"]} -{"Format": "IDEA0", "ID": "3d592dd7-7108-4e3e-a00e-bf5cf9d868a1", "DetectTime": "2023-10-30T14:10:01.584174+02:00", "EventTime": "2023-10-30T14:10:01.584190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C0vsK61USzi0jimAg5"]} -{"Format": "IDEA0", "ID": "b2a86982-55d9-4615-891d-6769e6b57c0d", "DetectTime": "2023-10-30T14:10:01.617984+02:00", "EventTime": "2023-10-30T14:10:01.618002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C2wvfw3IVfrrKyCtw6"]} -{"Format": "IDEA0", "ID": "cf5a9b6f-7eb8-460d-ad9e-d8bd4e84641e", "DetectTime": "2023-10-30T14:10:01.650312+02:00", "EventTime": "2023-10-30T14:10:01.650330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CItAib22c311fCkYta"]} -{"Format": "IDEA0", "ID": "d8792bd8-e4d5-42b7-a7cf-1623ae04f3fe", "DetectTime": "2023-10-30T14:10:01.683067+02:00", "EventTime": "2023-10-30T14:10:01.683080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CU2p3V1hhi2DrQjo0f"]} -{"Format": "IDEA0", "ID": "e5d137da-cd76-4b30-a0d6-e6bd03446c92", "DetectTime": "2023-10-30T14:10:01.710861+02:00", "EventTime": "2023-10-30T14:10:01.710873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CW85154ay0i4xeIAyk"]} -{"Format": "IDEA0", "ID": "4f16cdde-fdd5-4bd9-8fee-efee30faee93", "DetectTime": "2023-10-30T14:10:01.743152+02:00", "EventTime": "2023-10-30T14:10:01.743168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C3HjEk26r0shQ2r2Zb"]} -{"Format": "IDEA0", "ID": "5f07a8f3-dda8-4e58-ae8f-f46a209d710b", "DetectTime": "2023-10-30T14:10:01.774322+02:00", "EventTime": "2023-10-30T14:10:01.774335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CAjV3Y2qYDgfAxoXF9"]} -{"Format": "IDEA0", "ID": "7a6920d9-50b8-452e-be2f-f5fe6dd554de", "DetectTime": "2023-10-30T14:10:01.805237+02:00", "EventTime": "2023-10-30T14:10:01.805253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CyMswE1I1U52K0rtZ2"]} -{"Format": "Json", "ID": "7a6920d9-50b8-452e-be2f-f5fe6dd554de", "DetectTime": "2023-10-30T14:10:01.805237+02:00", "EventTime": "2023-10-30T14:10:01.805253+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:11:40.895026+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:01.870207)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3729b1e4-eb3a-47e9-a199-752b3acff3fe", "DetectTime": "2023-10-30T14:10:01.875483+02:00", "EventTime": "2023-10-30T14:10:01.875500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CczcmCIbaArhJQNZb"]} -{"Format": "IDEA0", "ID": "3c2ef817-45ad-4651-a86a-fc2eff37d971", "DetectTime": "2023-10-30T14:10:01.905996+02:00", "EventTime": "2023-10-30T14:10:01.906013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Czn2iV3VpjdmqHDafd"]} -{"Format": "IDEA0", "ID": "1bdebe9e-7189-47bf-9333-b62febe5bc31", "DetectTime": "2023-10-30T14:10:01.937519+02:00", "EventTime": "2023-10-30T14:10:01.937531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C2bA9mLRSlvW2lLP7"]} -{"Format": "IDEA0", "ID": "6acbc97f-7e11-40a5-97b5-5527ad5d2885", "DetectTime": "2023-10-30T14:10:01.965990+02:00", "EventTime": "2023-10-30T14:10:01.966007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CgQOHT2tgxvFI70dJ8"]} -{"Format": "IDEA0", "ID": "76cc5af5-79be-41de-911b-f3628b0e4a2b", "DetectTime": "2023-10-30T14:10:01.995010+02:00", "EventTime": "2023-10-30T14:10:01.995022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CY4QIj2TSHHec3RgP1"]} -{"Format": "IDEA0", "ID": "6f56e1f7-7eef-450e-9bd7-f370335b4c80", "DetectTime": "2023-10-30T14:10:02.025915+02:00", "EventTime": "2023-10-30T14:10:02.025932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CfSZL32SJQ1mYyrdbg"]} -{"Format": "IDEA0", "ID": "469dabb7-9248-4183-aea4-532f7459995e", "DetectTime": "2023-10-30T14:10:02.054324+02:00", "EventTime": "2023-10-30T14:10:02.054337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cc83rs2TNUieKIajZ8"]} -{"Format": "IDEA0", "ID": "3a7b94aa-980a-4d69-8228-a6d5ade0c8bf", "DetectTime": "2023-10-30T14:10:02.085704+02:00", "EventTime": "2023-10-30T14:10:02.085720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CekpQEV6D8GmCiAla"]} -{"Format": "Json", "ID": "3a7b94aa-980a-4d69-8228-a6d5ade0c8bf", "DetectTime": "2023-10-30T14:10:02.085704+02:00", "EventTime": "2023-10-30T14:10:02.085720+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:11:43.335673+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:02.154752)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f640d75-a7f6-48d9-8108-32dadd9cea93", "DetectTime": "2023-10-30T14:10:02.160360+02:00", "EventTime": "2023-10-30T14:10:02.160376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C2WL3D4eO6ZE2xYjfb"]} -{"Format": "IDEA0", "ID": "62528692-63ca-4e42-aec4-9f86dbc66f1f", "DetectTime": "2023-10-30T14:10:02.189225+02:00", "EventTime": "2023-10-30T14:10:02.189242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CMQtDb1Saj6TZ9MgU2"]} -{"Format": "IDEA0", "ID": "ea8a579b-08ad-4a63-a140-41a752b14b75", "DetectTime": "2023-10-30T14:10:02.216426+02:00", "EventTime": "2023-10-30T14:10:02.216445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CeloCCHEmzdXaGcIk"]} -{"Format": "IDEA0", "ID": "552031aa-d52f-4bfa-92ee-8fe196e64098", "DetectTime": "2023-10-30T14:10:02.241809+02:00", "EventTime": "2023-10-30T14:10:02.241822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CqOtIa4eH6oLcApHN8"]} -{"Format": "IDEA0", "ID": "2cdfbb92-ce4e-426a-be37-607cfde4c3aa", "DetectTime": "2023-10-30T14:10:02.266693+02:00", "EventTime": "2023-10-30T14:10:02.266709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["C2Bjrc32Cnuu4Cu1li"]} -{"Format": "IDEA0", "ID": "2135c229-c72e-4b76-9325-255510ccd60e", "DetectTime": "2023-10-30T14:10:02.298864+02:00", "EventTime": "2023-10-30T14:10:02.298881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSJCEyVKig7wm5oO5"]} -{"Format": "IDEA0", "ID": "44749e6a-2303-4f68-a923-b9cd133b6e33", "DetectTime": "2023-10-30T14:10:02.322481+02:00", "EventTime": "2023-10-30T14:10:02.322492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Ci8NVc4F3he1lDDiJ5"]} -{"Format": "IDEA0", "ID": "f16017db-4480-4f96-a8ca-09d9ad9f219b", "DetectTime": "2023-10-30T14:10:02.345543+02:00", "EventTime": "2023-10-30T14:10:02.345555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CuqSTC4jJIVTQTQvXf"]} -{"Format": "Json", "ID": "f16017db-4480-4f96-a8ca-09d9ad9f219b", "DetectTime": "2023-10-30T14:10:02.345543+02:00", "EventTime": "2023-10-30T14:10:02.345555+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:11:48.813111+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:02.403264)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc554e4c-47e6-4a72-8ac1-953cb8fd4633", "DetectTime": "2023-10-30T14:10:02.408795+02:00", "EventTime": "2023-10-30T14:10:02.408811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqVibB2zBNN2mg0Sxl"]} -{"Format": "IDEA0", "ID": "fcb77fe5-d699-4c22-ad44-12c92388aa11", "DetectTime": "2023-10-30T14:10:02.435343+02:00", "EventTime": "2023-10-30T14:10:02.435364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CVnV9j2ZYbQMKhauz3"]} -{"Format": "IDEA0", "ID": "87550b56-95f5-4422-90b1-156bcb6cf401", "DetectTime": "2023-10-30T14:10:02.463978+02:00", "EventTime": "2023-10-30T14:10:02.463994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CACMl61HS7EyXAz1Cl"]} -{"Format": "IDEA0", "ID": "548fb256-5ff4-4b15-a915-fa5dac23f259", "DetectTime": "2023-10-30T14:10:02.488490+02:00", "EventTime": "2023-10-30T14:10:02.488509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CV0cg64BFzbvkfZ3ha"]} -{"Format": "IDEA0", "ID": "6e374f56-31bb-4c52-8ee7-ae13815e0746", "DetectTime": "2023-10-30T14:10:02.517473+02:00", "EventTime": "2023-10-30T14:10:02.517490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgJjQl3HYMmSWHyQ12"]} -{"Format": "IDEA0", "ID": "0717d7d5-9770-4377-ba97-06066c18db9c", "DetectTime": "2023-10-30T14:10:02.544492+02:00", "EventTime": "2023-10-30T14:10:02.544505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CrgRIK1HVkAycPoQk1"]} -{"Format": "IDEA0", "ID": "4164b473-f6fd-4c70-984b-cb1fcd877bee", "DetectTime": "2023-10-30T14:10:02.568210+02:00", "EventTime": "2023-10-30T14:10:02.568233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CuuZtf4V8lgptFLSh2"]} -{"Format": "IDEA0", "ID": "c82e9c01-3f2c-4b98-a108-cb01aa31b1f2", "DetectTime": "2023-10-30T14:10:02.594638+02:00", "EventTime": "2023-10-30T14:10:02.594650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CpBD7xWJvVJj1Kfm7"]} -{"Format": "Json", "ID": "c82e9c01-3f2c-4b98-a108-cb01aa31b1f2", "DetectTime": "2023-10-30T14:10:02.594638+02:00", "EventTime": "2023-10-30T14:10:02.594650+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:42:17.845309+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:02.650081)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5512e7ee-428b-4c4c-9f5b-149ba85bb6c9", "DetectTime": "2023-10-30T14:10:02.655840+02:00", "EventTime": "2023-10-30T14:10:02.655857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CqZz1m4Ju5BgLpo4w2"]} -{"Format": "IDEA0", "ID": "92888f3c-73ed-4f3a-88d7-8fe980a99e7a", "DetectTime": "2023-10-30T14:10:02.681668+02:00", "EventTime": "2023-10-30T14:10:02.681679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C2uPmL1AfWePMcE6pk"]} -{"Format": "IDEA0", "ID": "b741fa9e-cdb3-4491-abb5-17be1598a15b", "DetectTime": "2023-10-30T14:10:02.706421+02:00", "EventTime": "2023-10-30T14:10:02.706432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cc6CDJ2GDETZ90CZqk"]} -{"Format": "IDEA0", "ID": "8c5ea682-c81f-4c3a-9213-0366a6e61249", "DetectTime": "2023-10-30T14:10:02.730347+02:00", "EventTime": "2023-10-30T14:10:02.730363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CDuMT11gYPcQUBod3b"]} -{"Format": "IDEA0", "ID": "9c27181b-d0f0-4260-8d68-e84272973374", "DetectTime": "2023-10-30T14:10:02.753615+02:00", "EventTime": "2023-10-30T14:10:02.753634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CmhHSs1lqwGpDbSKfc"]} -{"Format": "IDEA0", "ID": "d163f958-6ff2-4f9a-bfe7-68b87e0abc7c", "DetectTime": "2023-10-30T14:10:02.777550+02:00", "EventTime": "2023-10-30T14:10:02.777565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CSxzxB12X0oCAOOtOc"]} -{"Format": "IDEA0", "ID": "2a43e6c5-b09c-405c-8f48-868557e9106e", "DetectTime": "2023-10-30T14:10:02.799794+02:00", "EventTime": "2023-10-30T14:10:02.799804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CjgKch13AemdMUJAZ1"]} -{"Format": "IDEA0", "ID": "d3653bb6-9c57-403d-b7d6-7bc33673bacd", "DetectTime": "2023-10-30T14:10:02.823011+02:00", "EventTime": "2023-10-30T14:10:02.823027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CELT4XAbIFhRwTif7"]} -{"Format": "Json", "ID": "d3653bb6-9c57-403d-b7d6-7bc33673bacd", "DetectTime": "2023-10-30T14:10:02.823011+02:00", "EventTime": "2023-10-30T14:10:02.823027+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:42:19.726879+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:02.882582)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e451cb1a-bed4-4333-9398-bc49cc05ac86", "DetectTime": "2023-10-30T14:10:02.888182+02:00", "EventTime": "2023-10-30T14:10:02.888202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C3HYua2GoavHv1Fd14"]} -{"Format": "IDEA0", "ID": "3b94f4e6-3f66-4a66-a8db-e146ebc23ef2", "DetectTime": "2023-10-30T14:10:02.914082+02:00", "EventTime": "2023-10-30T14:10:02.914105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CfMUfS2VcAcw4WkRl6"]} -{"Format": "IDEA0", "ID": "174f7041-4195-4a24-8a64-f43c792a5cf5", "DetectTime": "2023-10-30T14:10:02.936315+02:00", "EventTime": "2023-10-30T14:10:02.936332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CARbRg2wXKhIC4Sxw3"]} -{"Format": "IDEA0", "ID": "16a91dc7-f250-4a56-a028-81d6de525340", "DetectTime": "2023-10-30T14:10:02.958935+02:00", "EventTime": "2023-10-30T14:10:02.958948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CWrRX6UbHZzBpmB5b"]} -{"Format": "IDEA0", "ID": "9cd043f4-c234-4063-95c4-d39895a72931", "DetectTime": "2023-10-30T14:10:02.979250+02:00", "EventTime": "2023-10-30T14:10:02.979262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CYAFlB3yWImOiIJZFd"]} -{"Format": "IDEA0", "ID": "b3f90f6d-49af-4168-943a-b083bbe79bc4", "DetectTime": "2023-10-30T14:10:02.999161+02:00", "EventTime": "2023-10-30T14:10:02.999177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CgoAdJ2PtS3rRj38M9"]} -{"Format": "IDEA0", "ID": "f09d9a3d-d251-4e4d-bef0-1c9e5b81e7bc", "DetectTime": "2023-10-30T14:10:03.019857+02:00", "EventTime": "2023-10-30T14:10:03.019868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CAlQ3VlFwKy0aQfze"]} -{"Format": "IDEA0", "ID": "746ec407-1be8-4937-b843-025ad928261b", "DetectTime": "2023-10-30T14:10:03.040394+02:00", "EventTime": "2023-10-30T14:10:03.040407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CSdHYGBGuXjWbnWfi"]} -{"Format": "Json", "ID": "746ec407-1be8-4937-b843-025ad928261b", "DetectTime": "2023-10-30T14:10:03.040394+02:00", "EventTime": "2023-10-30T14:10:03.040407+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:42:23.145106+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:03.098888)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0623cb9a-3422-4b68-b838-25abd34b24e1", "DetectTime": "2023-10-30T14:10:03.103395+02:00", "EventTime": "2023-10-30T14:10:03.103408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CQtxYN25P9w7aYSIll"]} -{"Format": "IDEA0", "ID": "5a5c4529-846c-45c7-88cc-dabc5988f9c8", "DetectTime": "2023-10-30T14:10:03.123116+02:00", "EventTime": "2023-10-30T14:10:03.123128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cp3WQUhcvKSafJXpj"]} -{"Format": "IDEA0", "ID": "180b11a8-c881-4b43-a952-4421a81dfc44", "DetectTime": "2023-10-30T14:10:03.140224+02:00", "EventTime": "2023-10-30T14:10:03.140237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CRtgnpL93jojM84z7"]} -{"Format": "IDEA0", "ID": "64446219-5668-4643-9947-fbf08167da14", "DetectTime": "2023-10-30T14:10:03.164427+02:00", "EventTime": "2023-10-30T14:10:03.164443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C6yoaL1tnP5ZQ5pERb"]} -{"Format": "IDEA0", "ID": "4fea24e1-5d89-4b62-a425-37ffbce294bf", "DetectTime": "2023-10-30T14:10:03.183917+02:00", "EventTime": "2023-10-30T14:10:03.183929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CRxvym2Q9kNYtiPmE6"]} -{"Format": "IDEA0", "ID": "d8e05cf3-421a-49c0-866c-6746ae1cda3c", "DetectTime": "2023-10-30T14:10:03.203533+02:00", "EventTime": "2023-10-30T14:10:03.203549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ct8sK52IEciKV5yTAc"]} -{"Format": "IDEA0", "ID": "cdae340e-0245-4e8d-81f0-52729ec939ed", "DetectTime": "2023-10-30T14:10:03.218227+02:00", "EventTime": "2023-10-30T14:10:03.218238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["CVnl0u1YAN2hkIOwGe"]} -{"Format": "IDEA0", "ID": "48324ed7-eab8-4ca9-8c69-15367a84d357", "DetectTime": "2023-10-30T14:10:03.234218+02:00", "EventTime": "2023-10-30T14:10:03.234233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C1ZzWJ3gnsL9bfM7x5"]} -{"Format": "Json", "ID": "48324ed7-eab8-4ca9-8c69-15367a84d357", "DetectTime": "2023-10-30T14:10:03.234218+02:00", "EventTime": "2023-10-30T14:10:03.234233+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-06T23:42:25.261067+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2023/10/30 14:10:03.288954)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f916ee3b-91b0-499d-9167-70278ac287a3", "DetectTime": "2023-10-30T14:10:03.294266+02:00", "EventTime": "2023-10-30T14:10:03.294282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C9n6kkeogDnygMNPh"]} -{"Format": "IDEA0", "ID": "5ced12f4-dacf-42f5-8c05-fd638d18a3da", "DetectTime": "2023-10-30T14:10:03.313235+02:00", "EventTime": "2023-10-30T14:10:03.313251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQFKWB1khFGAqhsbwa"]} -{"Format": "IDEA0", "ID": "1360e7fb-3d92-4a44-9cbe-a3d978c30ce8", "DetectTime": "2023-10-30T14:10:03.330106+02:00", "EventTime": "2023-10-30T14:10:03.330120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CsRiOs2TuJzKqKMXU2"]} -{"Format": "IDEA0", "ID": "c4447d6d-1709-4545-a08e-c4b0312a410b", "DetectTime": "2023-10-30T14:10:03.362667+02:00", "EventTime": "2023-10-30T14:10:03.362683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["Cj2rO3Yvh7OyUmIG3"]} -{"Format": "IDEA0", "ID": "fd8ea2dd-09e8-498a-b59f-161f2dafdf88", "DetectTime": "2023-10-30T14:10:03.398452+02:00", "EventTime": "2023-10-30T14:10:03.398470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CvfHet1xMDLeKxqiVk"]} -{"Format": "IDEA0", "ID": "c5637cfb-f361-4798-bb72-bb97bc36399a", "DetectTime": "2023-10-30T14:10:03.433990+02:00", "EventTime": "2023-10-30T14:10:03.434020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Csww4j1XFswIiubc7j"]} -{"Format": "IDEA0", "ID": "218bbaf4-22e2-4e6a-b088-9613176317bf", "DetectTime": "2023-10-30T14:10:03.466289+02:00", "EventTime": "2023-10-30T14:10:03.466306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CJKRBo1N8P3dPRYns5"]} -{"Format": "IDEA0", "ID": "c1379d82-817c-49c9-93d6-ef09fbd700b2", "DetectTime": "2023-10-30T14:10:03.499523+02:00", "EventTime": "2023-10-30T14:10:03.499542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C5Ce9t1k1nkaNh4sv2"]} -{"Format": "IDEA0", "ID": "5e916767-9aa0-4773-b2c9-353d4c9fe5b1", "DetectTime": "2023-10-30T14:10:03.532172+02:00", "EventTime": "2023-10-30T14:10:03.532188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CHI1oW1vl8ZylEslU6"]} -{"Format": "Json", "ID": "5e916767-9aa0-4773-b2c9-353d4c9fe5b1", "DetectTime": "2023-10-30T14:10:03.532172+02:00", "EventTime": "2023-10-30T14:10:03.532188+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T00:12:55.268153+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:03.612223)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f46caf05-1db0-4eec-87bf-b0e5f958b3dc", "DetectTime": "2023-10-30T14:10:03.616404+02:00", "EventTime": "2023-10-30T14:10:03.616417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CFUEHh3zBvTI5Y6A96"]} -{"Format": "IDEA0", "ID": "760138b9-8a79-42e1-a153-c56e7d2912e0", "DetectTime": "2023-10-30T14:10:03.649894+02:00", "EventTime": "2023-10-30T14:10:03.649911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CqlQCs3t9pc0c4pY58"]} -{"Format": "IDEA0", "ID": "2d8c5221-4194-416a-96fc-4ed1ffee5019", "DetectTime": "2023-10-30T14:10:03.681078+02:00", "EventTime": "2023-10-30T14:10:03.681104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cpqjmq4sn0ETqlASId"]} -{"Format": "IDEA0", "ID": "26e7baf0-7906-4879-9192-3ef65ca15478", "DetectTime": "2023-10-30T14:10:03.709945+02:00", "EventTime": "2023-10-30T14:10:03.709961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CClcxeszI1sVgzRu9"]} -{"Format": "IDEA0", "ID": "054dfc23-4292-47b3-a14a-805e064aef52", "DetectTime": "2023-10-30T14:10:03.739592+02:00", "EventTime": "2023-10-30T14:10:03.739608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cz6CWvN4CWCRpi8Bi"]} -{"Format": "IDEA0", "ID": "2b249f56-cdaa-4a91-8b4e-e83dfdc8eefb", "DetectTime": "2023-10-30T14:10:03.770182+02:00", "EventTime": "2023-10-30T14:10:03.770201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CofIQ72QBZw5VhwTk3"]} -{"Format": "IDEA0", "ID": "1fc2759b-d879-4db8-9613-78f604370b8b", "DetectTime": "2023-10-30T14:10:03.791464+02:00", "EventTime": "2023-10-30T14:10:03.791475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Canovd2KegTFaQ9Zp1"]} -{"Format": "IDEA0", "ID": "aa3f6ba6-7459-41db-9545-f2bf266582d0", "DetectTime": "2023-10-30T14:10:03.819838+02:00", "EventTime": "2023-10-30T14:10:03.819852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRBrKd4HvCGAkpVdye"]} -{"Format": "IDEA0", "ID": "3d82a720-6353-49e4-8919-24123bc0e93e", "DetectTime": "2023-10-30T14:10:03.850016+02:00", "EventTime": "2023-10-30T14:10:03.850030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cnrcxo2Pb33yyus67f"]} -{"Format": "Json", "ID": "3d82a720-6353-49e4-8919-24123bc0e93e", "DetectTime": "2023-10-30T14:10:03.850016+02:00", "EventTime": "2023-10-30T14:10:03.850030+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T00:12:58.797323+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:03.916896)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6ec66450-5c76-4506-a9d1-07ca69da0d8d", "DetectTime": "2023-10-30T14:10:03.921622+02:00", "EventTime": "2023-10-30T14:10:03.921635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CD3OT22YVUOLq8C6m4"]} -{"Format": "IDEA0", "ID": "4f16930f-e80c-4214-bcdd-3b247efa0dcf", "DetectTime": "2023-10-30T14:10:03.953344+02:00", "EventTime": "2023-10-30T14:10:03.953361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CSKngVY3odcKvjik3"]} -{"Format": "IDEA0", "ID": "44a11100-7e40-4d64-ac1e-3be396a0edf5", "DetectTime": "2023-10-30T14:10:03.982738+02:00", "EventTime": "2023-10-30T14:10:03.982749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["COQiwx3ju8NEglnpTj"]} -{"Format": "IDEA0", "ID": "65d06179-310e-4d2d-8d46-4291bdd29a25", "DetectTime": "2023-10-30T14:10:04.009765+02:00", "EventTime": "2023-10-30T14:10:04.009779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CWJjZW3pj4HsMyQ7eh"]} -{"Format": "IDEA0", "ID": "e8d7dd7a-fad3-4b05-82b4-9a70917eb583", "DetectTime": "2023-10-30T14:10:04.036442+02:00", "EventTime": "2023-10-30T14:10:04.036458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CU6Kn528lvUKz88iG3"]} -{"Format": "IDEA0", "ID": "e69691ca-da6e-46b8-bb49-ef7e1e2fbc4d", "DetectTime": "2023-10-30T14:10:04.065320+02:00", "EventTime": "2023-10-30T14:10:04.065336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CDOo1d1t7Wnf4ieAU7"]} -{"Format": "IDEA0", "ID": "16243a26-ab54-4d0c-93b0-895b728a2ceb", "DetectTime": "2023-10-30T14:10:04.094330+02:00", "EventTime": "2023-10-30T14:10:04.094357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CrNE3X1vuTyNAZzaIg"]} -{"Format": "IDEA0", "ID": "67918a54-574a-4b38-83da-60546b0cf787", "DetectTime": "2023-10-30T14:10:04.126100+02:00", "EventTime": "2023-10-30T14:10:04.126114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cvr0vxqo7ccdeAcT1"]} -{"Format": "Json", "ID": "67918a54-574a-4b38-83da-60546b0cf787", "DetectTime": "2023-10-30T14:10:04.126100+02:00", "EventTime": "2023-10-30T14:10:04.126114+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T00:13:00.793157+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:04.191987)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "353f5f58-6a89-40f4-8c6a-d5c7a0c19042", "DetectTime": "2023-10-30T14:10:04.196971+02:00", "EventTime": "2023-10-30T14:10:04.197000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CQijJj15QW1k52tLsk"]} -{"Format": "IDEA0", "ID": "957c97aa-f151-40e1-8fcd-6f4a22020ce5", "DetectTime": "2023-10-30T14:10:04.226837+02:00", "EventTime": "2023-10-30T14:10:04.226854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CBsf852LKCO3lTRkU2"]} -{"Format": "IDEA0", "ID": "835dd2eb-9575-41c7-a663-0971281cc70a", "DetectTime": "2023-10-30T14:10:04.251268+02:00", "EventTime": "2023-10-30T14:10:04.251285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ctn5yLfRPd4qLVRU1"]} -{"Format": "IDEA0", "ID": "7c45c483-03a4-4c3a-bf2d-0a521a2b767b", "DetectTime": "2023-10-30T14:10:04.278086+02:00", "EventTime": "2023-10-30T14:10:04.278098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CDhn162gTjjl80nlKc"]} -{"Format": "IDEA0", "ID": "7dd0cc90-27c6-4643-a1f2-c0fd84e2e017", "DetectTime": "2023-10-30T14:10:04.305784+02:00", "EventTime": "2023-10-30T14:10:04.305800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5571], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. ", "ContentType": "text/plain"}], "uids": ["Cjk9So25GLzc8c2B29"]} -{"Format": "IDEA0", "ID": "c4c31548-b769-4bbd-921a-d885a955b744", "DetectTime": "2023-10-30T14:10:04.332600+02:00", "EventTime": "2023-10-30T14:10:04.332620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuNCHbHGl5wSjYbc5"]} -{"Format": "IDEA0", "ID": "1a863482-aea8-4d4a-be4e-bdc5cf7c35da", "DetectTime": "2023-10-30T14:10:04.363073+02:00", "EventTime": "2023-10-30T14:10:04.363094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CVmESu2GkQvWKGrhZ9"]} -{"Format": "IDEA0", "ID": "57e92c20-dea0-4803-8497-ec489d63e65f", "DetectTime": "2023-10-30T14:10:04.392079+02:00", "EventTime": "2023-10-30T14:10:04.392097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKLHb4c60GV2Pvcqa"]} -{"Format": "Json", "ID": "57e92c20-dea0-4803-8497-ec489d63e65f", "DetectTime": "2023-10-30T14:10:04.392079+02:00", "EventTime": "2023-10-30T14:10:04.392097+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T00:43:11.328700+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:04.459772)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a274d64d-24b4-4443-a811-6c4875ddb627", "DetectTime": "2023-10-30T14:10:04.464751+02:00", "EventTime": "2023-10-30T14:10:04.464763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C1XHer3G73mvJ93cv7"]} -{"Format": "IDEA0", "ID": "254642d3-7ad1-4fb8-af17-03d0f268ef64", "DetectTime": "2023-10-30T14:10:04.492204+02:00", "EventTime": "2023-10-30T14:10:04.492220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CzzEho1OE9ecgZlZDf"]} -{"Format": "IDEA0", "ID": "ce5efcf8-65b7-4edd-a82a-423a341282b5", "DetectTime": "2023-10-30T14:10:04.515734+02:00", "EventTime": "2023-10-30T14:10:04.515746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["ClyI3UXdeDhvuAN0i"]} -{"Format": "IDEA0", "ID": "b91391fb-ffa6-48eb-851f-d9a28623bbbb", "DetectTime": "2023-10-30T14:10:04.540608+02:00", "EventTime": "2023-10-30T14:10:04.540634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CrQp8C1hWrtjY4GBV2"]} -{"Format": "IDEA0", "ID": "f6d2d826-2c43-417e-991c-72e8137aebf7", "DetectTime": "2023-10-30T14:10:04.565920+02:00", "EventTime": "2023-10-30T14:10:04.565932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CGuYO23v8KXPCWzA8c"]} -{"Format": "IDEA0", "ID": "7206f52f-8966-4ce3-b221-7319d0d92c0d", "DetectTime": "2023-10-30T14:10:04.588182+02:00", "EventTime": "2023-10-30T14:10:04.588200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CT2dkJ2wxuapfIyyDj"]} -{"Format": "IDEA0", "ID": "87b8eb0f-2727-426b-b30d-d4213522cdbe", "DetectTime": "2023-10-30T14:10:04.612704+02:00", "EventTime": "2023-10-30T14:10:04.612721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Crwy9C1EqRdQJBYvhj"]} -{"Format": "IDEA0", "ID": "5fd38814-5019-41dd-aed9-f0dc9e75f210", "DetectTime": "2023-10-30T14:10:04.637620+02:00", "EventTime": "2023-10-30T14:10:04.637635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CYC70L3vbiamsT5muf"]} -{"Format": "Json", "ID": "5fd38814-5019-41dd-aed9-f0dc9e75f210", "DetectTime": "2023-10-30T14:10:04.637620+02:00", "EventTime": "2023-10-30T14:10:04.637635+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T00:43:13.104394+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:04.691947)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b91ba096-0613-49d8-b372-9f262d0cf6ca", "DetectTime": "2023-10-30T14:10:04.697670+02:00", "EventTime": "2023-10-30T14:10:04.697687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cr4rTt1X0swFjpbGti"]} -{"Format": "IDEA0", "ID": "80d44889-7d71-4c1d-b611-d6e92c5c9091", "DetectTime": "2023-10-30T14:10:04.720940+02:00", "EventTime": "2023-10-30T14:10:04.720954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["C6rGvZ3jThYqGcJdl8"]} -{"Format": "IDEA0", "ID": "50fb5520-a6da-4af1-b395-12b60e37c856", "DetectTime": "2023-10-30T14:10:04.742864+02:00", "EventTime": "2023-10-30T14:10:04.742875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CSlb7v1RKb0SKWVjvg"]} -{"Format": "IDEA0", "ID": "fc1620bc-ba6f-47dc-9db0-96ed64cf4ca4", "DetectTime": "2023-10-30T14:10:04.765759+02:00", "EventTime": "2023-10-30T14:10:04.765774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ctoo5L4kqkf95B5e3"]} -{"Format": "IDEA0", "ID": "c7987ae6-4f68-4bc1-9278-827fa4c22bd0", "DetectTime": "2023-10-30T14:10:04.788811+02:00", "EventTime": "2023-10-30T14:10:04.788823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Ct15Yp3d1qwffOJnv7"]} -{"Format": "IDEA0", "ID": "cb53443e-6d94-4f76-8ddc-0ed1c7bc6ede", "DetectTime": "2023-10-30T14:10:04.810020+02:00", "EventTime": "2023-10-30T14:10:04.810038+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C7PoxZ27OutzBjBk76"]} -{"Format": "IDEA0", "ID": "4643c640-456a-43d7-9603-edacb5053d0c", "DetectTime": "2023-10-30T14:10:04.834473+02:00", "EventTime": "2023-10-30T14:10:04.834490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cr3T5s4mke9lGMCXYb"]} -{"Format": "IDEA0", "ID": "a45ea476-1db8-47db-9f15-ea2e7ff521ec", "DetectTime": "2023-10-30T14:10:04.857464+02:00", "EventTime": "2023-10-30T14:10:04.857476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CsOLAZ2QvBxGK8Gnh4"]} -{"Format": "IDEA0", "ID": "908a1f70-af46-4821-8070-eeb6237a6d42", "DetectTime": "2023-10-30T14:10:04.877869+02:00", "EventTime": "2023-10-30T14:10:04.877880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C6VRDa2XwThHaQZrY8"]} -{"Format": "Json", "ID": "908a1f70-af46-4821-8070-eeb6237a6d42", "DetectTime": "2023-10-30T14:10:04.877869+02:00", "EventTime": "2023-10-30T14:10:04.877880+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T00:43:32.021833+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:04.934081)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42d80c34-0f82-416b-975c-09baa745e1d6", "DetectTime": "2023-10-30T14:10:04.939375+02:00", "EventTime": "2023-10-30T14:10:04.939400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C5YK35A28SDY6Rmqa"]} -{"Format": "IDEA0", "ID": "39140438-e66a-4395-80e8-67b2a0322143", "DetectTime": "2023-10-30T14:10:04.961086+02:00", "EventTime": "2023-10-30T14:10:04.961098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CZVUVD4WFHoja8kW01"]} -{"Format": "IDEA0", "ID": "3076464b-b413-43ef-b3e1-57188c8b468f", "DetectTime": "2023-10-30T14:10:04.979887+02:00", "EventTime": "2023-10-30T14:10:04.979914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cq9yQK36Wq47HAIJhl"]} -{"Format": "IDEA0", "ID": "fad3a552-2ee2-4435-9983-d8a7dd5e10a0", "DetectTime": "2023-10-30T14:10:05.000222+02:00", "EventTime": "2023-10-30T14:10:05.000239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVefAS1k5X1zyd8kx6"]} -{"Format": "IDEA0", "ID": "dc0adc6d-29f6-438f-86ab-5fc698a6b56d", "DetectTime": "2023-10-30T14:10:05.021631+02:00", "EventTime": "2023-10-30T14:10:05.021648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CjH5wq2yszrYho2LS7"]} -{"Format": "IDEA0", "ID": "7ed315dc-d5be-424e-9ec3-89babe6cc6f8", "DetectTime": "2023-10-30T14:10:05.039637+02:00", "EventTime": "2023-10-30T14:10:05.039648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CdsCBz1tIhjxbmrL2f"]} -{"Format": "IDEA0", "ID": "ec65a9c5-b0e7-44ba-ab5e-f2dd372a1ace", "DetectTime": "2023-10-30T14:10:05.058319+02:00", "EventTime": "2023-10-30T14:10:05.058331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cp3eIFQXbB22QuOmh"]} -{"Format": "IDEA0", "ID": "18758a42-043c-437d-af28-cc0867b1386f", "DetectTime": "2023-10-30T14:10:05.079118+02:00", "EventTime": "2023-10-30T14:10:05.079134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyVhea3tJ7Hxe8B2g8"]} -{"Format": "Json", "ID": "18758a42-043c-437d-af28-cc0867b1386f", "DetectTime": "2023-10-30T14:10:05.079118+02:00", "EventTime": "2023-10-30T14:10:05.079134+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-07T00:54:52.786311+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2023/10/30 14:10:05.142467)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "19917b33-4448-4081-8c23-c55827eca5a8", "DetectTime": "2023-10-30T14:10:05.147086+02:00", "EventTime": "2023-10-30T14:10:05.147097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CnEDWZDNARlphHCSi"]} -{"Format": "IDEA0", "ID": "48fbefac-6123-40e7-a091-a86b7a4e6112", "DetectTime": "2023-10-30T14:10:05.181145+02:00", "EventTime": "2023-10-30T14:10:05.181161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CvPwK34yjdSeFZkYx8"]} -{"Format": "IDEA0", "ID": "53db7567-ebec-4fa6-9e06-564fd5c6380c", "DetectTime": "2023-10-30T14:10:05.203056+02:00", "EventTime": "2023-10-30T14:10:05.203072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["Cxox5f0nlUbSUCl9g"]} -{"Format": "IDEA0", "ID": "6e1b7830-3378-40b7-8d17-0550f6966265", "DetectTime": "2023-10-30T14:10:05.235153+02:00", "EventTime": "2023-10-30T14:10:05.235172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CuOMIa43DJkHwhSoJf"]} -{"Format": "IDEA0", "ID": "85989daa-70b6-427a-a5ff-7d63389fb57f", "DetectTime": "2023-10-30T14:10:05.265494+02:00", "EventTime": "2023-10-30T14:10:05.265504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CeXduy1IbHeGuzwNp8"]} -{"Format": "IDEA0", "ID": "23592b57-03e0-4029-b5ef-ad61dcc5dbbc", "DetectTime": "2023-10-30T14:10:05.296614+02:00", "EventTime": "2023-10-30T14:10:05.296627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Ct6L6Q12rKjE02rXT7"]} -{"Format": "IDEA0", "ID": "d3a61c16-2006-4b94-a2c5-79698eccc01c", "DetectTime": "2023-10-30T14:10:05.329745+02:00", "EventTime": "2023-10-30T14:10:05.329756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cp9DuG4Mn0Gj0vZXz"]} -{"Format": "IDEA0", "ID": "9cf55a36-caf6-4c42-b8e7-8b4397d762ad", "DetectTime": "2023-10-30T14:10:05.362197+02:00", "EventTime": "2023-10-30T14:10:05.362212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C5cQEK3l1n9pGQ6gzk"]} -{"Format": "IDEA0", "ID": "67f54ecf-f8a5-4e61-9734-bd5819b7ce48", "DetectTime": "2023-10-30T14:10:05.393952+02:00", "EventTime": "2023-10-30T14:10:05.393966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CzLKw4hEZxHoYW2bb"]} -{"Format": "Json", "ID": "67f54ecf-f8a5-4e61-9734-bd5819b7ce48", "DetectTime": "2023-10-30T14:10:05.393952+02:00", "EventTime": "2023-10-30T14:10:05.393966+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T01:14:59.079155+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:05.467924)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3ad13ccc-2a20-4fda-a173-b7af9ce755e1", "DetectTime": "2023-10-30T14:10:05.472731+02:00", "EventTime": "2023-10-30T14:10:05.472743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ChvbxTovWwgiwUcO2"]} -{"Format": "IDEA0", "ID": "776b7115-a5ce-4245-bdd1-3561e316a099", "DetectTime": "2023-10-30T14:10:05.499529+02:00", "EventTime": "2023-10-30T14:10:05.499540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CE7hY23UXipdn30Rg5"]} -{"Format": "IDEA0", "ID": "88dd3f9a-b01e-4fbb-bc01-9148f8f3ad0e", "DetectTime": "2023-10-30T14:10:05.529323+02:00", "EventTime": "2023-10-30T14:10:05.529338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CqFaLT39CxGRNeCwBb"]} -{"Format": "IDEA0", "ID": "1b5f7109-4a4f-454f-ab9e-72ee28fc3c12", "DetectTime": "2023-10-30T14:10:05.556888+02:00", "EventTime": "2023-10-30T14:10:05.556899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Co9yc6TsKBODJchCj"]} -{"Format": "IDEA0", "ID": "531e52a9-4679-4292-9b41-488fe57fec6c", "DetectTime": "2023-10-30T14:10:05.586492+02:00", "EventTime": "2023-10-30T14:10:05.586507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Ctbrx01AwHvnucCxC1"]} -{"Format": "IDEA0", "ID": "da7b1ada-7924-4516-bea9-44376a0508e6", "DetectTime": "2023-10-30T14:10:05.616102+02:00", "EventTime": "2023-10-30T14:10:05.616130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CdbMYzm7KIubDzBZc"]} -{"Format": "IDEA0", "ID": "45ad5b79-c452-4455-9cd5-4196defdccc8", "DetectTime": "2023-10-30T14:10:05.642515+02:00", "EventTime": "2023-10-30T14:10:05.642526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CE89bq4kY9fnDo4Oq4"]} -{"Format": "IDEA0", "ID": "442233bd-c777-4338-aa09-512557bfb61a", "DetectTime": "2023-10-30T14:10:05.673170+02:00", "EventTime": "2023-10-30T14:10:05.673191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CfJ0Y83CiKJxOu7q9d"]} -{"Format": "Json", "ID": "442233bd-c777-4338-aa09-512557bfb61a", "DetectTime": "2023-10-30T14:10:05.673170+02:00", "EventTime": "2023-10-30T14:10:05.673191+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T01:15:01.949112+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:05.739035)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "14bd7fbc-1527-4280-9982-057d7419c892", "DetectTime": "2023-10-30T14:10:05.743787+02:00", "EventTime": "2023-10-30T14:10:05.743799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CFwW0w1BbMTGTDUew3"]} -{"Format": "IDEA0", "ID": "f9525f35-11fb-43f3-9dbd-6b6f29036fbe", "DetectTime": "2023-10-30T14:10:05.768845+02:00", "EventTime": "2023-10-30T14:10:05.768863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C6AJaGOKulUM9Qrl5"]} -{"Format": "IDEA0", "ID": "b99c4f7c-9d32-4075-9833-60e3829a4465", "DetectTime": "2023-10-30T14:10:05.798256+02:00", "EventTime": "2023-10-30T14:10:05.798272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C3Gn7hMFYl7xZrW8b"]} -{"Format": "IDEA0", "ID": "e39f533b-e1f3-441b-ac54-830f5218e45d", "DetectTime": "2023-10-30T14:10:05.826747+02:00", "EventTime": "2023-10-30T14:10:05.826767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CRSN5C28iY3iolLVei"]} -{"Format": "IDEA0", "ID": "cd79346a-db8b-40ec-a767-9cd5e88a56d5", "DetectTime": "2023-10-30T14:10:05.851512+02:00", "EventTime": "2023-10-30T14:10:05.851525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C40zN32XghtpHqCRwk"]} -{"Format": "IDEA0", "ID": "98b0eced-dbb0-4044-a57f-972610ee028e", "DetectTime": "2023-10-30T14:10:05.878707+02:00", "EventTime": "2023-10-30T14:10:05.878719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CDubca4oU8EG3ikLV6"]} -{"Format": "IDEA0", "ID": "eb46a3f0-5a82-4850-897a-d27ccd79ba9c", "DetectTime": "2023-10-30T14:10:05.906888+02:00", "EventTime": "2023-10-30T14:10:05.906906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CHeGN72hF4EUfv2V1d"]} -{"Format": "IDEA0", "ID": "c25e167a-b580-4ddf-9c28-af6834b85a3d", "DetectTime": "2023-10-30T14:10:05.935340+02:00", "EventTime": "2023-10-30T14:10:05.935352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHTjps35wCD9vkTtz5"]} -{"Format": "Json", "ID": "c25e167a-b580-4ddf-9c28-af6834b85a3d", "DetectTime": "2023-10-30T14:10:05.935340+02:00", "EventTime": "2023-10-30T14:10:05.935352+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T01:15:03.791884+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:05.998859)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "159a3083-994c-4f6d-a873-2edebb739e35", "DetectTime": "2023-10-30T14:10:06.004593+02:00", "EventTime": "2023-10-30T14:10:06.004618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CIDG3q1gk1FE3Uz2Kc"]} -{"Format": "IDEA0", "ID": "6c3b8d71-8df5-40c0-b325-cfd0abc5750a", "DetectTime": "2023-10-30T14:10:06.030356+02:00", "EventTime": "2023-10-30T14:10:06.030368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CFKyed1YcVAmKYkiI"]} -{"Format": "IDEA0", "ID": "e95c3a69-714a-43f9-8f40-6f9a04060d7f", "DetectTime": "2023-10-30T14:10:06.057301+02:00", "EventTime": "2023-10-30T14:10:06.057327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CrrclAgGbJS82qkFb"]} -{"Format": "IDEA0", "ID": "afaa2233-06d6-4794-a405-8d2233248fa5", "DetectTime": "2023-10-30T14:10:06.082089+02:00", "EventTime": "2023-10-30T14:10:06.082100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CJsPNTdKEA9oZTSIh"]} -{"Format": "IDEA0", "ID": "5cd5d76c-5035-41d4-bf7c-e67c5b380f38", "DetectTime": "2023-10-30T14:10:06.107979+02:00", "EventTime": "2023-10-30T14:10:06.107992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CTID322HR3q8QDOjd"]} -{"Format": "IDEA0", "ID": "a9c8a838-480b-4bd5-86e6-2d1632e46a06", "DetectTime": "2023-10-30T14:10:06.132783+02:00", "EventTime": "2023-10-30T14:10:06.132799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CqIirr2Z3QIzkm2KNc"]} -{"Format": "IDEA0", "ID": "45e0bdb4-4b1c-46a0-9230-cf48d6384578", "DetectTime": "2023-10-30T14:10:06.162048+02:00", "EventTime": "2023-10-30T14:10:06.162075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cgn6KSSeUWbuBEzf7"]} -{"Format": "IDEA0", "ID": "59414446-44c6-4528-bc38-6800c8e79b72", "DetectTime": "2023-10-30T14:10:06.187629+02:00", "EventTime": "2023-10-30T14:10:06.187643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBBSKu2ldWdOQvKxTc"]} -{"Format": "Json", "ID": "59414446-44c6-4528-bc38-6800c8e79b72", "DetectTime": "2023-10-30T14:10:06.187629+02:00", "EventTime": "2023-10-30T14:10:06.187643+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T01:45:17.761102+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:06.251098)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f587f49f-ea50-43be-9c9c-a0066545b5de", "DetectTime": "2023-10-30T14:10:06.255723+02:00", "EventTime": "2023-10-30T14:10:06.255735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CFowSA2rsWp24V6zV1"]} -{"Format": "IDEA0", "ID": "8d4693ca-f0f1-455a-8508-850cb7b3de2c", "DetectTime": "2023-10-30T14:10:06.279743+02:00", "EventTime": "2023-10-30T14:10:06.279760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C9VT531rVGtz4O6FGf"]} -{"Format": "IDEA0", "ID": "661d1b5c-c790-4d88-aea1-2dd99eb62c31", "DetectTime": "2023-10-30T14:10:06.304057+02:00", "EventTime": "2023-10-30T14:10:06.304086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CprDKqPjQR1cYm1ul"]} -{"Format": "IDEA0", "ID": "f410fa6f-fd80-49af-9248-004a689f9e9e", "DetectTime": "2023-10-30T14:10:06.326616+02:00", "EventTime": "2023-10-30T14:10:06.326627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Com10U1bttLzT3Drs9"]} -{"Format": "IDEA0", "ID": "a7c6336a-2220-4e4e-b5ae-312400840e03", "DetectTime": "2023-10-30T14:10:06.348712+02:00", "EventTime": "2023-10-30T14:10:06.348732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CkIe3Of91qs69sPii"]} -{"Format": "IDEA0", "ID": "ab6e82fe-9532-4b7d-a814-d91ddd368b9b", "DetectTime": "2023-10-30T14:10:06.370800+02:00", "EventTime": "2023-10-30T14:10:06.370823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CwsmvM1ajGSHoGWvSl"]} -{"Format": "IDEA0", "ID": "8b97cc8d-5776-4032-b3f3-77604a270878", "DetectTime": "2023-10-30T14:10:06.393781+02:00", "EventTime": "2023-10-30T14:10:06.393797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C1WWBV1TnDoZEUSc8h"]} -{"Format": "IDEA0", "ID": "bccc2210-3bb1-4a9b-ab66-847757d6baac", "DetectTime": "2023-10-30T14:10:06.415272+02:00", "EventTime": "2023-10-30T14:10:06.415285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CN83h8E7Ulmomshz9"]} -{"Format": "Json", "ID": "bccc2210-3bb1-4a9b-ab66-847757d6baac", "DetectTime": "2023-10-30T14:10:06.415272+02:00", "EventTime": "2023-10-30T14:10:06.415285+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T01:45:19.557966+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:06.477605)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "736805d5-d78d-4d07-8f2e-898bf4ff3e98", "DetectTime": "2023-10-30T14:10:06.482764+02:00", "EventTime": "2023-10-30T14:10:06.482793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CpuP6e4Tnz9OqVbe34"]} -{"Format": "IDEA0", "ID": "d710aae2-6a6f-4ab2-acb0-4c9af856e1f7", "DetectTime": "2023-10-30T14:10:06.505745+02:00", "EventTime": "2023-10-30T14:10:06.505762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CGwrXz3vlSwSD9gxUd"]} -{"Format": "IDEA0", "ID": "f2bc9dc4-89f6-48d7-8fec-87601bafde96", "DetectTime": "2023-10-30T14:10:06.527436+02:00", "EventTime": "2023-10-30T14:10:06.527465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CYqrzao64lpzRIIha"]} -{"Format": "IDEA0", "ID": "a0ae7166-c73e-432a-9c5f-238334dd846f", "DetectTime": "2023-10-30T14:10:06.547896+02:00", "EventTime": "2023-10-30T14:10:06.547917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CAFTy22XQu0MXIw1ff"]} -{"Format": "IDEA0", "ID": "efea5487-3359-40ab-88fc-97d235f4ad83", "DetectTime": "2023-10-30T14:10:06.568964+02:00", "EventTime": "2023-10-30T14:10:06.568977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CeLs4x2EMV8N29JAi1"]} -{"Format": "IDEA0", "ID": "edf09701-9ec7-4855-b53d-7a14fdcf225e", "DetectTime": "2023-10-30T14:10:06.589654+02:00", "EventTime": "2023-10-30T14:10:06.589677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C46wr74C2wHUp3fgF7"]} -{"Format": "IDEA0", "ID": "368c567c-7cec-49d0-b8b9-016aeead2e5b", "DetectTime": "2023-10-30T14:10:06.611622+02:00", "EventTime": "2023-10-30T14:10:06.611636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CRhHS53gnZLE2tk9p5"]} -{"Format": "IDEA0", "ID": "caa0369e-6762-4f08-8856-525c9e71f980", "DetectTime": "2023-10-30T14:10:06.631333+02:00", "EventTime": "2023-10-30T14:10:06.631349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C8vuEf1iRs9yt8Pr7d"]} -{"Format": "Json", "ID": "caa0369e-6762-4f08-8856-525c9e71f980", "DetectTime": "2023-10-30T14:10:06.631333+02:00", "EventTime": "2023-10-30T14:10:06.631349+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T01:45:22.023432+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:06.689645)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6e367a59-ab16-4cda-a2c3-497e21236b2f", "DetectTime": "2023-10-30T14:10:06.694275+02:00", "EventTime": "2023-10-30T14:10:06.694286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CAuzT51Qv1TYJwR0wg"]} -{"Format": "IDEA0", "ID": "df9799fc-3215-4db4-aaab-894d32e7673c", "DetectTime": "2023-10-30T14:10:06.714194+02:00", "EventTime": "2023-10-30T14:10:06.714211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CBiE4hzQQgSj8mY8k"]} -{"Format": "IDEA0", "ID": "15648b01-7138-4152-be0f-1c24fb4ed40f", "DetectTime": "2023-10-30T14:10:06.732404+02:00", "EventTime": "2023-10-30T14:10:06.732421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVLIOt2HXseSUSFvPc"]} -{"Format": "IDEA0", "ID": "17bf41c2-a246-4aed-8fce-4f1f084e5013", "DetectTime": "2023-10-30T14:10:06.750543+02:00", "EventTime": "2023-10-30T14:10:06.750560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["ChrYWj10RPWKczr9Zb"]} -{"Format": "IDEA0", "ID": "308d1028-f9d0-4a71-84dc-7a2adcff7877", "DetectTime": "2023-10-30T14:10:06.769094+02:00", "EventTime": "2023-10-30T14:10:06.769111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CVfM6I1t3A0fPoCHY3"]} -{"Format": "IDEA0", "ID": "6dc076be-a52d-431d-8929-44de4c5f04c9", "DetectTime": "2023-10-30T14:10:06.789980+02:00", "EventTime": "2023-10-30T14:10:06.789995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CUCFqk3hOGDAlVf35g"]} -{"Format": "IDEA0", "ID": "b5c8394b-84f4-4bf2-b6dc-230d1b6a9ff9", "DetectTime": "2023-10-30T14:10:06.809131+02:00", "EventTime": "2023-10-30T14:10:06.809151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CfJzt33XDNLBbGDSW8"]} -{"Format": "IDEA0", "ID": "8a48f564-0f15-48fa-9864-e28a1a323665", "DetectTime": "2023-10-30T14:10:06.829695+02:00", "EventTime": "2023-10-30T14:10:06.829714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CGal34120ydq5RKHS9"]} -{"Format": "IDEA0", "ID": "39387d7b-80e7-4ef6-8b69-86edc8988fd4", "DetectTime": "2023-10-30T14:10:06.845624+02:00", "EventTime": "2023-10-30T14:10:06.845640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkON9o3wcl1X4reOp"]} -{"Format": "Json", "ID": "39387d7b-80e7-4ef6-8b69-86edc8988fd4", "DetectTime": "2023-10-30T14:10:06.845624+02:00", "EventTime": "2023-10-30T14:10:06.845640+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-07T01:55:00.993370+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2023/10/30 14:10:06.899324)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8fdf150a-78b3-43fc-ad57-d40ce806bc3c", "DetectTime": "2023-10-30T14:10:06.904272+02:00", "EventTime": "2023-10-30T14:10:06.904286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CL5Kry1PPkq5MnYcia"]} -{"Format": "IDEA0", "ID": "1c1938c2-7c00-4abf-98d8-9128bd8c82dd", "DetectTime": "2023-10-30T14:10:06.940804+02:00", "EventTime": "2023-10-30T14:10:06.940825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvN5M636aGren3lmE8"]} -{"Format": "IDEA0", "ID": "259003aa-2ca4-4d79-bd0c-fa6fd887a5f6", "DetectTime": "2023-10-30T14:10:06.976849+02:00", "EventTime": "2023-10-30T14:10:06.976862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CaF2Lk39BZxtfxIpXd"]} -{"Format": "IDEA0", "ID": "9ca3d918-8118-4fb2-8efb-bced33c6be24", "DetectTime": "2023-10-30T14:10:07.015770+02:00", "EventTime": "2023-10-30T14:10:07.015783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CPbj1M3dzxKQ4MgQT3"]} -{"Format": "IDEA0", "ID": "9b409099-046c-4ad0-8ad8-53f211c6b97b", "DetectTime": "2023-10-30T14:10:07.052820+02:00", "EventTime": "2023-10-30T14:10:07.052836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CvCjGZ1vNaihK7NHNk"]} -{"Format": "IDEA0", "ID": "f2ae7ba3-69c4-41ca-80de-4b5dc6c1b07e", "DetectTime": "2023-10-30T14:10:07.089807+02:00", "EventTime": "2023-10-30T14:10:07.089822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CDJnNFf1toIyhFR0g"]} -{"Format": "IDEA0", "ID": "77acefc7-2169-4d13-8bfd-a80153b300f2", "DetectTime": "2023-10-30T14:10:07.126736+02:00", "EventTime": "2023-10-30T14:10:07.126764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CchGFW3pROYV1Aomdj"]} -{"Format": "IDEA0", "ID": "46499c2d-2401-48d9-8b73-0778225cc63c", "DetectTime": "2023-10-30T14:10:07.161869+02:00", "EventTime": "2023-10-30T14:10:07.161895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CAp69HyRCnVEMDSKe"]} -{"Format": "Json", "ID": "46499c2d-2401-48d9-8b73-0778225cc63c", "DetectTime": "2023-10-30T14:10:07.161869+02:00", "EventTime": "2023-10-30T14:10:07.161895+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T02:15:30.167950+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2023/10/30 14:10:07.237700)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2ee6da9e-9d8a-4d47-b894-454a5f632520", "DetectTime": "2023-10-30T14:10:07.242366+02:00", "EventTime": "2023-10-30T14:10:07.242378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CGF175aunza2WylUf"]} -{"Format": "IDEA0", "ID": "b5c88766-d304-4c91-9385-0edb1e7c5450", "DetectTime": "2023-10-30T14:10:07.279284+02:00", "EventTime": "2023-10-30T14:10:07.279301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CsWj9a3GGPLJ4blKp8"]} -{"Format": "IDEA0", "ID": "b87f834b-608e-40d1-83c0-7da7c2f6fcb4", "DetectTime": "2023-10-30T14:10:07.313471+02:00", "EventTime": "2023-10-30T14:10:07.313482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CYv35n3SVEvpy816R8"]} -{"Format": "IDEA0", "ID": "91ffbf9e-8fc5-458a-9e3b-fc8cb542f798", "DetectTime": "2023-10-30T14:10:07.347608+02:00", "EventTime": "2023-10-30T14:10:07.347625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CegxXm3hnKZS6EnX0e"]} -{"Format": "IDEA0", "ID": "c32525c7-8cc4-47cb-a74d-02993a9205cd", "DetectTime": "2023-10-30T14:10:07.381232+02:00", "EventTime": "2023-10-30T14:10:07.381247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Cbigcp2qezZ7pbI2J"]} -{"Format": "IDEA0", "ID": "1a1bf18b-8591-4e5d-b826-b432f7464ae7", "DetectTime": "2023-10-30T14:10:07.415413+02:00", "EventTime": "2023-10-30T14:10:07.415430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CslQ612aMiKfb9O5qj"]} -{"Format": "IDEA0", "ID": "9beb979d-2a92-4e69-992e-b0ffec5c5597", "DetectTime": "2023-10-30T14:10:07.451643+02:00", "EventTime": "2023-10-30T14:10:07.451673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CJfLLT1IaXGWGjDc4a"]} -{"Format": "IDEA0", "ID": "07936434-b3d8-43d2-b8a8-25bb441f03a1", "DetectTime": "2023-10-30T14:10:07.470589+02:00", "EventTime": "2023-10-30T14:10:07.470602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C9Abqj2S3am2vT8QH2"]} -{"Format": "IDEA0", "ID": "1216276e-9560-4783-ad2a-130954136bd0", "DetectTime": "2023-10-30T14:10:07.506688+02:00", "EventTime": "2023-10-30T14:10:07.506714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CX2Wfs2mDpeop8YgN9"]} -{"Format": "IDEA0", "ID": "bcd63826-00dd-414c-959d-5d7e05930ac6", "DetectTime": "2023-10-30T14:10:07.526804+02:00", "EventTime": "2023-10-30T14:10:07.526818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C7G97R1Yb94HQYMi0g"]} -{"Format": "Json", "ID": "bcd63826-00dd-414c-959d-5d7e05930ac6", "DetectTime": "2023-10-30T14:10:07.526804+02:00", "EventTime": "2023-10-30T14:10:07.526818+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T02:15:31.910167+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2023/10/30 14:10:07.604441)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d94ce8df-de63-4351-b864-5621e9f05616", "DetectTime": "2023-10-30T14:10:07.609275+02:00", "EventTime": "2023-10-30T14:10:07.609300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C29wyo2p7j8uOhqo6h"]} -{"Format": "IDEA0", "ID": "416a71f5-f53e-48bf-bbeb-1aa1cb4c34fc", "DetectTime": "2023-10-30T14:10:07.629636+02:00", "EventTime": "2023-10-30T14:10:07.629654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CSbve33cyvSflIwMC9"]} -{"Format": "IDEA0", "ID": "ceba6967-473d-4bd2-a8e3-75ff59925469", "DetectTime": "2023-10-30T14:10:07.662243+02:00", "EventTime": "2023-10-30T14:10:07.662261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CSrIBhGFsuUOjF8Cd"]} -{"Format": "IDEA0", "ID": "6c49d537-ded7-40ed-be94-57a308a6304c", "DetectTime": "2023-10-30T14:10:07.681445+02:00", "EventTime": "2023-10-30T14:10:07.681462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cwwr0g2AYpW0ssx6Y3"]} -{"Format": "IDEA0", "ID": "1de1d557-e726-4f5c-8001-f330951aafa9", "DetectTime": "2023-10-30T14:10:07.700108+02:00", "EventTime": "2023-10-30T14:10:07.700124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CfGprZ3V7PlVFsDLV6"]} -{"Format": "IDEA0", "ID": "6bf25301-d01e-48e2-9ed5-8e80fa74c854", "DetectTime": "2023-10-30T14:10:07.722038+02:00", "EventTime": "2023-10-30T14:10:07.722059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["COw4Hi1F1whhG9nRpj"]} -{"Format": "IDEA0", "ID": "9a85b4b6-31da-42a3-9c5b-663f62567d9b", "DetectTime": "2023-10-30T14:10:07.753827+02:00", "EventTime": "2023-10-30T14:10:07.753843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C4p0vF3wG7HwDTqPVd"]} -{"Format": "IDEA0", "ID": "b71e4373-bb71-4a09-b114-88dbfec0f0dc", "DetectTime": "2023-10-30T14:10:07.773392+02:00", "EventTime": "2023-10-30T14:10:07.773408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["C22o0SNG9yKCc5BCj"]} -{"Format": "IDEA0", "ID": "03c34a54-314f-4958-9c3c-c20ef2b29330", "DetectTime": "2023-10-30T14:10:07.790450+02:00", "EventTime": "2023-10-30T14:10:07.790476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C9lZF246dPpYV8OPac"]} -{"Format": "IDEA0", "ID": "b3dc291a-9895-4fb4-96cc-153cd311ed37", "DetectTime": "2023-10-30T14:10:07.808761+02:00", "EventTime": "2023-10-30T14:10:07.808777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C2bIBG3h2nPtXSn2i7"]} -{"Format": "IDEA0", "ID": "48a4cd39-1e18-4462-9301-d7a1c6afb66e", "DetectTime": "2023-10-30T14:10:07.839914+02:00", "EventTime": "2023-10-30T14:10:07.839930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C1fkd32nwYLsTXTFG6"]} -{"Format": "IDEA0", "ID": "483acd8c-a664-430d-bb87-5fbafed22b57", "DetectTime": "2023-10-30T14:10:07.861004+02:00", "EventTime": "2023-10-30T14:10:07.861025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CoeZDF3cCJJ692kMLj"]} -{"Format": "IDEA0", "ID": "1af77a0b-ee4e-457a-8a94-457ee4089920", "DetectTime": "2023-10-30T14:10:07.881584+02:00", "EventTime": "2023-10-30T14:10:07.881610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CSO4TF3lFqip8Tyh5f"]} -{"Format": "IDEA0", "ID": "60e09b7c-1674-4e6e-a74d-4c878a871176", "DetectTime": "2023-10-30T14:10:07.902330+02:00", "EventTime": "2023-10-30T14:10:07.902347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CLW4pV1LAqdU52cjHf"]} -{"Format": "IDEA0", "ID": "bd2a0898-8f78-4ece-9e85-6a35d650c2bb", "DetectTime": "2023-10-30T14:10:07.934018+02:00", "EventTime": "2023-10-30T14:10:07.934033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CBsqkNEzSmoKEe0s"]} -{"Format": "IDEA0", "ID": "a2960089-b0ca-4344-95b3-eecbd01a6959", "DetectTime": "2023-10-30T14:10:07.955948+02:00", "EventTime": "2023-10-30T14:10:07.955968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CwMXn33VweRQ8cKG73"]} -{"Format": "IDEA0", "ID": "27c02a88-bf3f-4618-8706-94d34d4bbe8c", "DetectTime": "2023-10-30T14:10:07.977006+02:00", "EventTime": "2023-10-30T14:10:07.977018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["ClBxfv3FTPYGS2Rif2"]} -{"Format": "IDEA0", "ID": "586a683c-04e7-4a6f-8bf2-6cc165a54fcd", "DetectTime": "2023-10-30T14:10:08.014819+02:00", "EventTime": "2023-10-30T14:10:08.014836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CoASh04gL70hZfHp07"]} -{"Format": "IDEA0", "ID": "e5bc37e4-2ae6-4fdb-8de1-6904b458e9f0", "DetectTime": "2023-10-30T14:10:08.037873+02:00", "EventTime": "2023-10-30T14:10:08.037890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CHAnSZCGWSf8x2C6l"]} -{"Format": "IDEA0", "ID": "40b8b8b2-9299-4202-ac2e-f64ee1f9426f", "DetectTime": "2023-10-30T14:10:08.059100+02:00", "EventTime": "2023-10-30T14:10:08.059113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C0jCVZ2qaANBKsQ8H8"]} -{"Format": "IDEA0", "ID": "42c7332e-d397-4934-a23c-0b228ab1a14e", "DetectTime": "2023-10-30T14:10:08.079160+02:00", "EventTime": "2023-10-30T14:10:08.079177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CKvMQR3DwNUDlKDkPj"]} -{"Format": "IDEA0", "ID": "451fc5f2-d693-4c27-936c-78d891b6dd90", "DetectTime": "2023-10-30T14:10:08.115255+02:00", "EventTime": "2023-10-30T14:10:08.115268+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChyCCq4A8NLw49q5B1"]} -{"Format": "IDEA0", "ID": "306d37b8-da8d-42cf-928c-8877efa1b07e", "DetectTime": "2023-10-30T14:10:08.139973+02:00", "EventTime": "2023-10-30T14:10:08.139993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CmUjv32JOeg3s84L3"]} -{"Format": "IDEA0", "ID": "b7f83ef6-c0cc-4677-9a0d-583aea28e944", "DetectTime": "2023-10-30T14:10:08.161582+02:00", "EventTime": "2023-10-30T14:10:08.161598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Co06rGyft7ZNUKYZc"]} -{"Format": "IDEA0", "ID": "95acb520-731c-49a2-b0c3-49c4fba24eec", "DetectTime": "2023-10-30T14:10:08.189613+02:00", "EventTime": "2023-10-30T14:10:08.189628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CMsqjT2qz5EssygqKd"]} -{"Format": "IDEA0", "ID": "aa5a9f13-8a92-484f-b961-fa90298ab2d6", "DetectTime": "2023-10-30T14:10:08.208583+02:00", "EventTime": "2023-10-30T14:10:08.208596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDLXRQ3klbIJqiWTle"]} -{"Format": "IDEA0", "ID": "31e1d1de-f0f5-4ef7-99f4-a0f3bde452fd", "DetectTime": "2023-10-30T14:10:08.228399+02:00", "EventTime": "2023-10-30T14:10:08.228416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CQgPTt4HAs2J2MasFa"]} -{"Format": "IDEA0", "ID": "865d2080-226a-4677-a3ba-368a222a9161", "DetectTime": "2023-10-30T14:10:08.249278+02:00", "EventTime": "2023-10-30T14:10:08.249297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CUXaSs1RKkHp8Lhwti"]} -{"Format": "IDEA0", "ID": "69b21c47-8bbd-45ff-b25e-308a28417de6", "DetectTime": "2023-10-30T14:10:08.267632+02:00", "EventTime": "2023-10-30T14:10:08.267652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CcLUjX17HKsc9mH6fe"]} -{"Format": "IDEA0", "ID": "49b58254-f604-4049-9229-3b3260aed474", "DetectTime": "2023-10-30T14:10:08.286593+02:00", "EventTime": "2023-10-30T14:10:08.286605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["ClwXwR3m2tI6mUYem3"]} -{"Format": "IDEA0", "ID": "90904ec9-29f4-4025-911c-9aafa72268a1", "DetectTime": "2023-10-30T14:10:08.317507+02:00", "EventTime": "2023-10-30T14:10:08.317524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CYcuBz2K2XMIxfDhZc"]} -{"Format": "IDEA0", "ID": "34d20656-2200-4849-8fcf-840e99b21921", "DetectTime": "2023-10-30T14:10:08.338060+02:00", "EventTime": "2023-10-30T14:10:08.338078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CT10CZ3MO5KzY89jN2"]} -{"Format": "IDEA0", "ID": "74c1aabf-ef93-47f9-a0a8-499769c768a2", "DetectTime": "2023-10-30T14:10:08.355762+02:00", "EventTime": "2023-10-30T14:10:08.355776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKHOCO3OTZJgxaMyJi"]} -{"Format": "IDEA0", "ID": "eac49748-c7e5-4f80-8014-5b8665594482", "DetectTime": "2023-10-30T14:10:08.373340+02:00", "EventTime": "2023-10-30T14:10:08.373357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CPfaPs31Js8aYCYjb8"]} -{"Format": "IDEA0", "ID": "9c9c79e7-8938-4e7c-a855-cd52c013bbd1", "DetectTime": "2023-10-30T14:10:08.394280+02:00", "EventTime": "2023-10-30T14:10:08.394307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C0ezQYkqMbs7Vysy7"]} -{"Format": "IDEA0", "ID": "90c36e73-f869-4e3e-8a8a-059f7d777ff5", "DetectTime": "2023-10-30T14:10:08.415577+02:00", "EventTime": "2023-10-30T14:10:08.415605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CqLkib365LM9teZo78"]} -{"Format": "IDEA0", "ID": "703cf1f6-ebbc-46a8-b0e7-0864300fbee2", "DetectTime": "2023-10-30T14:10:08.434625+02:00", "EventTime": "2023-10-30T14:10:08.434647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CjIJYl21do4MHBAWse"]} -{"Format": "IDEA0", "ID": "e3ad62e6-13a6-43bb-a419-372cda759f18", "DetectTime": "2023-10-30T14:10:08.455759+02:00", "EventTime": "2023-10-30T14:10:08.455782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPPPBF4UTPRraqyspa"]} -{"Format": "IDEA0", "ID": "7ccd8e14-b3bd-4e42-8c35-e66ab7d7a9cb", "DetectTime": "2023-10-30T14:10:08.476106+02:00", "EventTime": "2023-10-30T14:10:08.476132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CmG3tq2EHd5n6RYhgg"]} -{"Format": "IDEA0", "ID": "d9fe6681-e42d-41a3-9a03-a3cca4c48731", "DetectTime": "2023-10-30T14:10:08.496034+02:00", "EventTime": "2023-10-30T14:10:08.496050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C17IaXBqZ4obVvje5"]} -{"Format": "IDEA0", "ID": "d25e719a-3081-423c-b00d-7a869ac2d9a8", "DetectTime": "2023-10-30T14:10:08.516954+02:00", "EventTime": "2023-10-30T14:10:08.516969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CJXBOw4sUmiMDzfo2k"]} -{"Format": "Json", "ID": "d25e719a-3081-423c-b00d-7a869ac2d9a8", "DetectTime": "2023-10-30T14:10:08.516954+02:00", "EventTime": "2023-10-30T14:10:08.516969+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T02:15:34.592486+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2023/10/30 14:10:08.585536)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "65a99883-20e4-402d-8fc2-b272d5495f09", "DetectTime": "2023-10-30T14:10:08.588751+02:00", "EventTime": "2023-10-30T14:10:08.588767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cl5kdHDXUMAPFZhTd"]} -{"Format": "IDEA0", "ID": "994f1c3b-0caa-44e2-9b0d-e2d49a108dcf", "DetectTime": "2023-10-30T14:10:08.608030+02:00", "EventTime": "2023-10-30T14:10:08.608049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C03XWs0RUfsLmoys8"]} -{"Format": "IDEA0", "ID": "25a1be0b-8a2c-492d-9a7f-da20cc7c0a66", "DetectTime": "2023-10-30T14:10:08.626034+02:00", "EventTime": "2023-10-30T14:10:08.626045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CJ1hVc2TGbueK5xuCh"]} -{"Format": "IDEA0", "ID": "b6c57652-ee68-4d1d-a0af-637136bcf1a7", "DetectTime": "2023-10-30T14:10:08.647242+02:00", "EventTime": "2023-10-30T14:10:08.647254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CDZZhL24FYzjYg5Ey5"]} -{"Format": "IDEA0", "ID": "42011e53-a433-4b57-87b2-75e8df59485b", "DetectTime": "2023-10-30T14:10:08.667432+02:00", "EventTime": "2023-10-30T14:10:08.667447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CX7a3rT9Xi2ScioQ1"]} -{"Format": "IDEA0", "ID": "4e3f1a9c-c9a4-46a9-8808-131da75e2578", "DetectTime": "2023-10-30T14:10:08.686156+02:00", "EventTime": "2023-10-30T14:10:08.686168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CmY2Gx4FiruckuGBl1"]} -{"Format": "IDEA0", "ID": "26d1ee1b-7280-431d-b9e7-2a662e2463ac", "DetectTime": "2023-10-30T14:10:08.705669+02:00", "EventTime": "2023-10-30T14:10:08.705686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CwOhi14is6Aj35XBD2"]} -{"Format": "IDEA0", "ID": "53bee3ad-a06c-4418-a001-17e545b234ba", "DetectTime": "2023-10-30T14:10:08.726846+02:00", "EventTime": "2023-10-30T14:10:08.726863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CpDzf2km2VLVCzWAd"]} -{"Format": "IDEA0", "ID": "93ce0377-76fd-4930-8231-b30ece70194c", "DetectTime": "2023-10-30T14:10:08.747678+02:00", "EventTime": "2023-10-30T14:10:08.747689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CZsuqr3gjS4tk4PLy2"]} -{"Format": "IDEA0", "ID": "5e764384-a481-4616-9717-f57bfaeb1075", "DetectTime": "2023-10-30T14:10:08.768366+02:00", "EventTime": "2023-10-30T14:10:08.768384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CJ8dKJ10cbN2QpRfh"]} -{"Format": "IDEA0", "ID": "1ce8f830-bf6d-4b12-8e09-a1d6c3e36c46", "DetectTime": "2023-10-30T14:10:08.786605+02:00", "EventTime": "2023-10-30T14:10:08.786617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CuxAtX3LjJIptIaaDc"]} -{"Format": "IDEA0", "ID": "a8fc20bc-cb50-4e10-ac38-6472e8ffbbac", "DetectTime": "2023-10-30T14:10:08.807356+02:00", "EventTime": "2023-10-30T14:10:08.807383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CRR0QM2LX1A3T6Bzs3"]} -{"Format": "IDEA0", "ID": "e4a309d2-3cc4-432f-b130-f89108277f8e", "DetectTime": "2023-10-30T14:10:08.828557+02:00", "EventTime": "2023-10-30T14:10:08.828575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CO3Fol2YGD0RObXfK7"]} -{"Format": "IDEA0", "ID": "ba86c557-0d5d-4424-93d1-54679000073f", "DetectTime": "2023-10-30T14:10:08.848410+02:00", "EventTime": "2023-10-30T14:10:08.848427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CZ30CnCX0LihJTM71"]} -{"Format": "IDEA0", "ID": "7904c3d6-0e35-4a2d-8936-15b35473bfd1", "DetectTime": "2023-10-30T14:10:08.879323+02:00", "EventTime": "2023-10-30T14:10:08.879351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CDce5c4nSyrHyNVPs9"]} -{"Format": "IDEA0", "ID": "b0bee3f8-450c-479d-851e-c0767cb8d363", "DetectTime": "2023-10-30T14:10:08.902063+02:00", "EventTime": "2023-10-30T14:10:08.902077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CcGiLm2aKPQEk9zTLh"]} -{"Format": "IDEA0", "ID": "d5886e2b-1d10-4e08-847d-f98a88f10ffb", "DetectTime": "2023-10-30T14:10:08.923031+02:00", "EventTime": "2023-10-30T14:10:08.923049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CC0F294ecLAbg430m2"]} -{"Format": "IDEA0", "ID": "5a64c426-3d01-4be0-8081-e21358a35734", "DetectTime": "2023-10-30T14:10:08.942906+02:00", "EventTime": "2023-10-30T14:10:08.942918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CrrpaS31ovBUTA4K8b"]} -{"Format": "IDEA0", "ID": "b3f994a9-894d-4317-950f-091476619f8a", "DetectTime": "2023-10-30T14:10:08.960092+02:00", "EventTime": "2023-10-30T14:10:08.960109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdnuQR3vPxT5q3lUu5"]} -{"Format": "IDEA0", "ID": "e39c9134-1136-4e5b-ae42-7fbfd9e9f265", "DetectTime": "2023-10-30T14:10:08.981599+02:00", "EventTime": "2023-10-30T14:10:08.981611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Ct5P4k4nqxVwPmXCBj"]} -{"Format": "IDEA0", "ID": "12dffa2e-ae22-4a37-8648-304457db880d", "DetectTime": "2023-10-30T14:10:08.999242+02:00", "EventTime": "2023-10-30T14:10:08.999258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CLCg1M2mazZUjJcEv2"]} -{"Format": "IDEA0", "ID": "9b49ea58-2e9c-424d-88d5-7d3dfbff6b14", "DetectTime": "2023-10-30T14:10:09.019678+02:00", "EventTime": "2023-10-30T14:10:09.019694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CqhIin4axKJKxl2va"]} -{"Format": "IDEA0", "ID": "047dbf4c-0bb8-455c-93f9-d9e8660c28fe", "DetectTime": "2023-10-30T14:10:09.038206+02:00", "EventTime": "2023-10-30T14:10:09.038226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CWIaSS222qLlkSr3w1"]} -{"Format": "IDEA0", "ID": "10174d0f-277b-44ff-9bf9-ca658855d1aa", "DetectTime": "2023-10-30T14:10:09.057313+02:00", "EventTime": "2023-10-30T14:10:09.057324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CiccT731yefkXWC5i2"]} -{"Format": "IDEA0", "ID": "2fd0d9f3-260c-4506-a77c-7243d9749994", "DetectTime": "2023-10-30T14:10:09.075045+02:00", "EventTime": "2023-10-30T14:10:09.075059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CN3Ck527tCEolrAWf9"]} -{"Format": "IDEA0", "ID": "7c309260-4470-4e4b-b129-c38267f3963d", "DetectTime": "2023-10-30T14:10:09.095050+02:00", "EventTime": "2023-10-30T14:10:09.095064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CEEfCx4sndtFGmU5V8"]} -{"Format": "IDEA0", "ID": "9df3b0af-9678-44c3-a0f9-136bd95b052d", "DetectTime": "2023-10-30T14:10:09.122967+02:00", "EventTime": "2023-10-30T14:10:09.122987+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CIF9IL3WXPkPy0Fjoi"]} -{"Format": "IDEA0", "ID": "842d165d-d196-4320-b9a6-b8672dfee55b", "DetectTime": "2023-10-30T14:10:09.146035+02:00", "EventTime": "2023-10-30T14:10:09.146047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CAySSvOXG5TnoNNr5"]} -{"Format": "IDEA0", "ID": "23335e32-9f82-4771-85e3-62724a50dd9b", "DetectTime": "2023-10-30T14:10:09.165405+02:00", "EventTime": "2023-10-30T14:10:09.165427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cu9dVJ3pe85HadVLF9"]} -{"Format": "IDEA0", "ID": "d2e2d247-5ebf-455a-abb4-8e1fc1127797", "DetectTime": "2023-10-30T14:10:09.187978+02:00", "EventTime": "2023-10-30T14:10:09.187995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C4JJwjeyarJfs2aN1"]} -{"Format": "IDEA0", "ID": "969ba712-4529-4379-bed0-61a991580b95", "DetectTime": "2023-10-30T14:10:09.210378+02:00", "EventTime": "2023-10-30T14:10:09.210394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["ChhNCdQYCbguYMt7a"]} -{"Format": "IDEA0", "ID": "e497e4a4-3ba4-4b5b-b278-a19c4431fcc5", "DetectTime": "2023-10-30T14:10:09.228499+02:00", "EventTime": "2023-10-30T14:10:09.228510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CEvHHx1tOYTLCWRvXf"]} -{"Format": "IDEA0", "ID": "813096fe-dfd9-4cb4-a28b-26cbab98b5c2", "DetectTime": "2023-10-30T14:10:09.249191+02:00", "EventTime": "2023-10-30T14:10:09.249202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C7kuge1JCePEzd06s9"]} -{"Format": "IDEA0", "ID": "0fe1733d-197b-493e-b85b-68b893745358", "DetectTime": "2023-10-30T14:10:09.266966+02:00", "EventTime": "2023-10-30T14:10:09.266984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CxzUaQ24vEtlFneWa9"]} -{"Format": "IDEA0", "ID": "abd0c7ce-8f74-4506-9408-964a4ac1525d", "DetectTime": "2023-10-30T14:10:09.287594+02:00", "EventTime": "2023-10-30T14:10:09.287606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CzWdpT2UupDSPbwN0j"]} -{"Format": "IDEA0", "ID": "36de41f3-efb0-471b-a882-5cbd96b70786", "DetectTime": "2023-10-30T14:10:09.305282+02:00", "EventTime": "2023-10-30T14:10:09.305301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cpz0xqzTM35Ef1t43"]} -{"Format": "IDEA0", "ID": "d8f45be3-945c-4e8f-ad5d-461bef02a4f0", "DetectTime": "2023-10-30T14:10:09.324815+02:00", "EventTime": "2023-10-30T14:10:09.324842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CwGPas2JdTblPKpXMi"]} -{"Format": "IDEA0", "ID": "0b74adc1-30ae-422c-b39c-d8640da00a0c", "DetectTime": "2023-10-30T14:10:09.346086+02:00", "EventTime": "2023-10-30T14:10:09.346102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["ClvZHM1TWbNuxYkG21"]} -{"Format": "IDEA0", "ID": "e7a20f61-8ef0-4eb9-82ae-a05e54f146fa", "DetectTime": "2023-10-30T14:10:09.367337+02:00", "EventTime": "2023-10-30T14:10:09.367363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CohGVB3I1rAM8kOqg1"]} -{"Format": "IDEA0", "ID": "508f4764-dae3-4661-a476-b5a4a749a108", "DetectTime": "2023-10-30T14:10:09.388265+02:00", "EventTime": "2023-10-30T14:10:09.388285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C2nr0g20mO0VGDCuyf"]} -{"Format": "IDEA0", "ID": "94cd0e42-bdfe-4834-a185-f756a3d7a132", "DetectTime": "2023-10-30T14:10:09.418200+02:00", "EventTime": "2023-10-30T14:10:09.418218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CWRLLg3oO52gHdlkp8"]} -{"Format": "IDEA0", "ID": "c50a6fea-2788-438f-bebc-3e955e8b871f", "DetectTime": "2023-10-30T14:10:09.438277+02:00", "EventTime": "2023-10-30T14:10:09.438304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CyZ9zJ2CkqiZ2YiCOk"]} -{"Format": "IDEA0", "ID": "80e8ea48-f2cb-4ebc-b7ed-de908ab5b351", "DetectTime": "2023-10-30T14:10:09.458275+02:00", "EventTime": "2023-10-30T14:10:09.458303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CBEcjy1NLD64bMGs9h"]} -{"Format": "IDEA0", "ID": "220bac2d-2d13-4ccb-a4fc-11d00e2286d6", "DetectTime": "2023-10-30T14:10:09.479890+02:00", "EventTime": "2023-10-30T14:10:09.479901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CaycO91lZ610MUtwj"]} -{"Format": "IDEA0", "ID": "2bebb335-77d7-470a-9e0f-d32192d370d8", "DetectTime": "2023-10-30T14:10:09.500283+02:00", "EventTime": "2023-10-30T14:10:09.500294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXhbGZDb6MxuAxjB9"]} -{"Format": "IDEA0", "ID": "6d71966d-a69f-47c3-8170-7e2a1ded972b", "DetectTime": "2023-10-30T14:10:09.519588+02:00", "EventTime": "2023-10-30T14:10:09.519606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CCQ4TUpyiFlUjfKl6"]} -{"Format": "IDEA0", "ID": "9195d0e9-f363-415c-8892-9099a7310941", "DetectTime": "2023-10-30T14:10:09.539314+02:00", "EventTime": "2023-10-30T14:10:09.539329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CdibFI3ZWmvENebO1l"]} -{"Format": "IDEA0", "ID": "077206c2-788a-4346-8e4b-33002eb3070c", "DetectTime": "2023-10-30T14:10:09.558631+02:00", "EventTime": "2023-10-30T14:10:09.558649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CVuTaM36TxzjpjehAd"]} -{"Format": "IDEA0", "ID": "a5fe60eb-aebe-486f-917b-28d752589228", "DetectTime": "2023-10-30T14:10:09.577538+02:00", "EventTime": "2023-10-30T14:10:09.577551+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ClpYly1v2sl2j1jVS2"]} -{"Format": "IDEA0", "ID": "c6a50e17-6a0b-4a20-a315-5599e60343f6", "DetectTime": "2023-10-30T14:10:09.601574+02:00", "EventTime": "2023-10-30T14:10:09.601585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CUoMyw4LAYyRYoxnFi"]} -{"Format": "IDEA0", "ID": "d643c58b-4771-4611-a2ef-02f5bd218316", "DetectTime": "2023-10-30T14:10:09.622985+02:00", "EventTime": "2023-10-30T14:10:09.623005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUfl135eD6qNPuxPl"]} -{"Format": "IDEA0", "ID": "67c96df3-e5be-4c7b-9ab0-8a270a86777f", "DetectTime": "2023-10-30T14:10:09.643429+02:00", "EventTime": "2023-10-30T14:10:09.643453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CWJRKf3DNfVnz1Z9zj"]} -{"Format": "IDEA0", "ID": "a89b532e-bfdd-446d-b769-c0c3324b39d8", "DetectTime": "2023-10-30T14:10:09.663544+02:00", "EventTime": "2023-10-30T14:10:09.663562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["C0YX684q9uiMAKHJU6"]} -{"Format": "IDEA0", "ID": "365d33b2-d1a7-4d60-9d4f-22fcc83ae354", "DetectTime": "2023-10-30T14:10:09.685524+02:00", "EventTime": "2023-10-30T14:10:09.685545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CsqNTg1I0KtNfeNCBi"]} -{"Format": "IDEA0", "ID": "b8ba74dc-9099-418c-ab6a-7d8e69783675", "DetectTime": "2023-10-30T14:10:09.707314+02:00", "EventTime": "2023-10-30T14:10:09.707335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtSWDn18XPJxs3Urwf"]} -{"Format": "IDEA0", "ID": "c5454494-01c9-4fce-84a7-ad11728f6f8d", "DetectTime": "2023-10-30T14:10:09.738774+02:00", "EventTime": "2023-10-30T14:10:09.738812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTHVtY1LC5TjnIRKog"]} -{"Format": "IDEA0", "ID": "da901e4e-3939-46f2-a597-83c34073fb83", "DetectTime": "2023-10-30T14:10:09.761292+02:00", "EventTime": "2023-10-30T14:10:09.761307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cu515d2ifVNKcbJ1al"]} -{"Format": "IDEA0", "ID": "dad00262-ef23-437b-a535-66157efb363f", "DetectTime": "2023-10-30T14:10:09.782069+02:00", "EventTime": "2023-10-30T14:10:09.782084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CzqzhS1ciQIxeS7vT"]} -{"Format": "IDEA0", "ID": "6bf159a6-c245-4cff-ae8a-7f6213cc950f", "DetectTime": "2023-10-30T14:10:09.806145+02:00", "EventTime": "2023-10-30T14:10:09.806161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CpSDeX1Cbx3Kqhiq05"]} -{"Format": "IDEA0", "ID": "bfca2c69-35d8-41a9-83f9-49a4c43bcf76", "DetectTime": "2023-10-30T14:10:09.828740+02:00", "EventTime": "2023-10-30T14:10:09.828765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cg0iLH1WIqDfufYAqc"]} -{"Format": "IDEA0", "ID": "e944a3a4-d164-469a-93b9-8e305e4e86e0", "DetectTime": "2023-10-30T14:10:09.848606+02:00", "EventTime": "2023-10-30T14:10:09.848623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CgmPBg3PFmclHuUVr1"]} -{"Format": "IDEA0", "ID": "4e219cdf-4d74-437f-8c6b-7992858c8b58", "DetectTime": "2023-10-30T14:10:09.868505+02:00", "EventTime": "2023-10-30T14:10:09.868522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CYvVMSBszv4qVMbT7"]} -{"Format": "IDEA0", "ID": "1212b05c-237c-4041-9cdb-64ddc812a7f8", "DetectTime": "2023-10-30T14:10:09.888873+02:00", "EventTime": "2023-10-30T14:10:09.888889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CSuYdD2qvjVobORJAe"]} -{"Format": "IDEA0", "ID": "d1d2f50e-ab59-46df-b522-5c2d4f52bb02", "DetectTime": "2023-10-30T14:10:09.907691+02:00", "EventTime": "2023-10-30T14:10:09.907702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C6BZ7x27xhZWJXL9dc"]} -{"Format": "IDEA0", "ID": "5f829908-03be-4a2a-a389-1c87c90741ce", "DetectTime": "2023-10-30T14:10:09.927604+02:00", "EventTime": "2023-10-30T14:10:09.927617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CNcjNV1DPJAABcXU48"]} -{"Format": "IDEA0", "ID": "2164187a-dfb4-44cc-862d-c57c46cd0860", "DetectTime": "2023-10-30T14:10:09.946399+02:00", "EventTime": "2023-10-30T14:10:09.946414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CrgceXCjjAmyRL0ai"]} -{"Format": "IDEA0", "ID": "53476e32-9e75-44cc-a414-6088046d90ee", "DetectTime": "2023-10-30T14:10:09.966570+02:00", "EventTime": "2023-10-30T14:10:09.966586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Ctn1Jc1qXMQDtKILel"]} -{"Format": "IDEA0", "ID": "e881aaf6-ddf9-434e-800e-eee270a9a273", "DetectTime": "2023-10-30T14:10:09.984812+02:00", "EventTime": "2023-10-30T14:10:09.984823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C7XfgD3wvFPlmedfP3"]} -{"Format": "IDEA0", "ID": "844269ca-9571-4058-822b-cfe8d6572565", "DetectTime": "2023-10-30T14:10:10.002638+02:00", "EventTime": "2023-10-30T14:10:10.002653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CdTOzF3WmdYZmfREGg"]} -{"Format": "IDEA0", "ID": "820c327d-7b59-462b-8ad1-0dc0c843e376", "DetectTime": "2023-10-30T14:10:10.020944+02:00", "EventTime": "2023-10-30T14:10:10.020959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CdgzX54GBsOF6OEGqh"]} -{"Format": "IDEA0", "ID": "11123038-73e6-42f9-b592-c041b78a225f", "DetectTime": "2023-10-30T14:10:10.040252+02:00", "EventTime": "2023-10-30T14:10:10.040264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cnl4KB3PtaOwcE1l8f"]} -{"Format": "IDEA0", "ID": "3b924a60-46ba-4854-9891-972b6c515fba", "DetectTime": "2023-10-30T14:10:10.060732+02:00", "EventTime": "2023-10-30T14:10:10.060744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CbVK8v3iFSlgpmt2qb"]} -{"Format": "IDEA0", "ID": "0ee84b04-6efa-4468-9ee5-45468740a1e5", "DetectTime": "2023-10-30T14:10:10.080531+02:00", "EventTime": "2023-10-30T14:10:10.080548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CihIHxZsCpyDtMt1b"]} -{"Format": "IDEA0", "ID": "75029df2-573e-4a84-84e0-799f7a776a20", "DetectTime": "2023-10-30T14:10:10.100267+02:00", "EventTime": "2023-10-30T14:10:10.100283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C8PGtT2VxWpORkFwkc"]} -{"Format": "IDEA0", "ID": "14bdbe5f-b06d-4f54-8602-b9605aeaaad3", "DetectTime": "2023-10-30T14:10:10.119797+02:00", "EventTime": "2023-10-30T14:10:10.119815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CJUmtk4PvbWle6SZG1"]} -{"Format": "IDEA0", "ID": "e63ba0e8-730d-4f0a-971d-449ce47c21b1", "DetectTime": "2023-10-30T14:10:10.141489+02:00", "EventTime": "2023-10-30T14:10:10.141507+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CwHDLY2KLQyIeMIHwj"]} -{"Format": "IDEA0", "ID": "3e59b204-7c85-4a8f-81f0-90d156dd8cf9", "DetectTime": "2023-10-30T14:10:10.166989+02:00", "EventTime": "2023-10-30T14:10:10.167017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cm82YC2cCJTui83m57"]} -{"Format": "IDEA0", "ID": "7d263114-2a94-450d-b19d-6ed947ffe5f7", "DetectTime": "2023-10-30T14:10:10.194820+02:00", "EventTime": "2023-10-30T14:10:10.194845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CzftqK3LxkAsFm7IE2"]} -{"Format": "IDEA0", "ID": "ebbebf1d-dfa1-4fba-b5e9-799eca57ba33", "DetectTime": "2023-10-30T14:10:10.217727+02:00", "EventTime": "2023-10-30T14:10:10.217739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C8f1aj3lsCdNIq21jf"]} -{"Format": "IDEA0", "ID": "7a10075b-1ed4-45f2-86a3-0d6758354d92", "DetectTime": "2023-10-30T14:10:10.235253+02:00", "EventTime": "2023-10-30T14:10:10.235265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CgwRQe3eD8FdxP4rh4"]} -{"Format": "IDEA0", "ID": "aae96081-d0ea-4f9e-ab46-2b28617e058e", "DetectTime": "2023-10-30T14:10:10.254367+02:00", "EventTime": "2023-10-30T14:10:10.254384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ChzoK64ny304Rivt5l"]} -{"Format": "IDEA0", "ID": "705b31bb-0de2-416b-8861-4cdbe36de060", "DetectTime": "2023-10-30T14:10:10.271843+02:00", "EventTime": "2023-10-30T14:10:10.271855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CeNCY73NZMirKDXXUi"]} -{"Format": "IDEA0", "ID": "0847b27b-6cd6-42b5-b6f2-8536c8561442", "DetectTime": "2023-10-30T14:10:10.292168+02:00", "EventTime": "2023-10-30T14:10:10.292183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C7vhoiXbdVbiQSnsc"]} -{"Format": "IDEA0", "ID": "e1a6ba09-7d88-41bf-9175-cab8c0a6318d", "DetectTime": "2023-10-30T14:10:10.309598+02:00", "EventTime": "2023-10-30T14:10:10.309609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C8A5gS2YKS938inZyg"]} -{"Format": "IDEA0", "ID": "e11c8a8f-e384-43fa-b853-5c773eddedad", "DetectTime": "2023-10-30T14:10:10.328447+02:00", "EventTime": "2023-10-30T14:10:10.328472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C9g8rf4zuiPAOQgUkb"]} -{"Format": "IDEA0", "ID": "ba23cdb3-9af3-4b70-ba6e-f370e1c7c6bb", "DetectTime": "2023-10-30T14:10:10.346877+02:00", "EventTime": "2023-10-30T14:10:10.346889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CR0UAp39AL7d7HBF8"]} -{"Format": "IDEA0", "ID": "64cf48eb-563a-4e9f-8b99-750df1939841", "DetectTime": "2023-10-30T14:10:10.365715+02:00", "EventTime": "2023-10-30T14:10:10.365731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C9yc6P9hAjDd21l41"]} -{"Format": "IDEA0", "ID": "71531b9c-de44-4421-a415-37c27933aa8c", "DetectTime": "2023-10-30T14:10:10.385158+02:00", "EventTime": "2023-10-30T14:10:10.385175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CoP3ahNYxA2fuh5Md"]} -{"Format": "IDEA0", "ID": "eb6decdb-5855-4009-a7db-17aae5ee8c07", "DetectTime": "2023-10-30T14:10:10.404087+02:00", "EventTime": "2023-10-30T14:10:10.404101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CS2WI8szosX4euPFj"]} -{"Format": "IDEA0", "ID": "1394838d-97fd-4161-8cdc-16740b5d9cc3", "DetectTime": "2023-10-30T14:10:10.440276+02:00", "EventTime": "2023-10-30T14:10:10.440299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C8DOzn4iIQZ8EQ7oI5"]} -{"Format": "IDEA0", "ID": "ab5804b8-4e28-4e19-94ba-63bcfc26b8eb", "DetectTime": "2023-10-30T14:10:10.459566+02:00", "EventTime": "2023-10-30T14:10:10.459577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CbxLgo4JRQpX1Qlos3"]} -{"Format": "IDEA0", "ID": "9da71f57-64fc-4216-af2b-e91702523733", "DetectTime": "2023-10-30T14:10:10.476470+02:00", "EventTime": "2023-10-30T14:10:10.476481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqwQYC2riCtBcuejg3"]} -{"Format": "IDEA0", "ID": "cbaffbb5-8ca1-4887-9894-557790a8d0f5", "DetectTime": "2023-10-30T14:10:10.493385+02:00", "EventTime": "2023-10-30T14:10:10.493397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CPkIrl3pXWQX04ZZTb"]} -{"Format": "IDEA0", "ID": "53069f17-eba7-49a4-a043-7e37fb425706", "DetectTime": "2023-10-30T14:10:10.510317+02:00", "EventTime": "2023-10-30T14:10:10.510334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CQx2Zy3sRBNWACuD9l"]} -{"Format": "IDEA0", "ID": "317c4e1b-f2ec-416d-92eb-343b6c29f0bd", "DetectTime": "2023-10-30T14:10:10.528790+02:00", "EventTime": "2023-10-30T14:10:10.528800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CVzaM7OH7x9L93Cad"]} -{"Format": "IDEA0", "ID": "616620ef-52bb-4eb8-9485-8dc1d344020a", "DetectTime": "2023-10-30T14:10:10.545256+02:00", "EventTime": "2023-10-30T14:10:10.545267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CAJXBQ3WBCQzps30w5"]} -{"Format": "IDEA0", "ID": "fee8ab98-f1eb-4db0-847e-0919fc945a23", "DetectTime": "2023-10-30T14:10:10.562385+02:00", "EventTime": "2023-10-30T14:10:10.562401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cw9hWv383Riy4vASo4"]} -{"Format": "IDEA0", "ID": "3fa616f0-48f1-4891-aa58-d9672354bf12", "DetectTime": "2023-10-30T14:10:10.583679+02:00", "EventTime": "2023-10-30T14:10:10.583694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CukBT61MsxSaIXX4f9"]} -{"Format": "IDEA0", "ID": "17828e31-e6f8-4f36-a176-6c704ff6c97c", "DetectTime": "2023-10-30T14:10:10.601126+02:00", "EventTime": "2023-10-30T14:10:10.601138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CqXMOh4a1D56Wj0eMi"]} -{"Format": "IDEA0", "ID": "57fafe57-5c7b-4fbd-949c-93d13ded8162", "DetectTime": "2023-10-30T14:10:10.617223+02:00", "EventTime": "2023-10-30T14:10:10.617234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C8wAlH2ixpvJ46XCYe"]} -{"Format": "IDEA0", "ID": "7dfecbf1-d110-44f2-bd73-4680ddebab66", "DetectTime": "2023-10-30T14:10:10.632825+02:00", "EventTime": "2023-10-30T14:10:10.632835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CVMsiJ16ZdYqLeoHBh"]} -{"Format": "IDEA0", "ID": "9fc8e29f-e065-4188-a47f-ba3ac2822dd4", "DetectTime": "2023-10-30T14:10:10.651807+02:00", "EventTime": "2023-10-30T14:10:10.651819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CwX2ok1ColVEl6uiq2"]} -{"Format": "IDEA0", "ID": "1a14359e-2884-45e1-8d29-fc50160f02cc", "DetectTime": "2023-10-30T14:10:10.668294+02:00", "EventTime": "2023-10-30T14:10:10.668304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CuJYRY3Vg3nvJuNpad"]} -{"Format": "IDEA0", "ID": "e268ea7f-73fd-4e00-9d09-b1cfbdbe417b", "DetectTime": "2023-10-30T14:10:10.683836+02:00", "EventTime": "2023-10-30T14:10:10.683851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CDNZ8b2EPrLUeNlNU6"]} -{"Format": "IDEA0", "ID": "30b73c3f-7bd7-4969-af76-f587beaa8fe7", "DetectTime": "2023-10-30T14:10:10.697985+02:00", "EventTime": "2023-10-30T14:10:10.697995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CZWWSQ1cJHDwjfjfM1"]} -{"Format": "IDEA0", "ID": "4f7ddeec-5d20-4791-9db7-271fcc4a01a4", "DetectTime": "2023-10-30T14:10:10.723925+02:00", "EventTime": "2023-10-30T14:10:10.723941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CxGEVi3igsHxvlWHMc"]} -{"Format": "IDEA0", "ID": "32ddc7fd-2e66-49dc-a148-ba8af1684a66", "DetectTime": "2023-10-30T14:10:10.744246+02:00", "EventTime": "2023-10-30T14:10:10.744263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CFYHwg1XiGTGjEfZ21"]} -{"Format": "IDEA0", "ID": "216d993e-f778-437e-bed3-4ebca880ff46", "DetectTime": "2023-10-30T14:10:10.759703+02:00", "EventTime": "2023-10-30T14:10:10.759714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["C7Wh9U19OrlC92mYXg"]} -{"Format": "IDEA0", "ID": "40bd7bbf-3cea-41e7-abae-9f91ebdc16eb", "DetectTime": "2023-10-30T14:10:10.778080+02:00", "EventTime": "2023-10-30T14:10:10.778096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CfYPio1cijBjkumK39"]} -{"Format": "IDEA0", "ID": "2bc9578a-097f-436f-abf6-aa6f556d9bb2", "DetectTime": "2023-10-30T14:10:10.795709+02:00", "EventTime": "2023-10-30T14:10:10.795725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CV5u5v4aua8b9FSkJ4"]} -{"Format": "IDEA0", "ID": "78a54982-69cb-485c-977b-d2cffbc7ad76", "DetectTime": "2023-10-30T14:10:10.817334+02:00", "EventTime": "2023-10-30T14:10:10.817350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cdb7kt1csgZymssRN7"]} -{"Format": "IDEA0", "ID": "16c6417d-c5a9-4b50-8e19-39c58c236a7d", "DetectTime": "2023-10-30T14:10:10.838773+02:00", "EventTime": "2023-10-30T14:10:10.838802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CgAY8D2FeZqQ9wC0we"]} -{"Format": "IDEA0", "ID": "09b3af74-c377-425a-b646-6a3fd420c5ca", "DetectTime": "2023-10-30T14:10:10.858961+02:00", "EventTime": "2023-10-30T14:10:10.858974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CiWLmo1I31ie4Ewp42"]} -{"Format": "IDEA0", "ID": "46b3a8fd-ad49-4012-a911-7fd9c289ebf3", "DetectTime": "2023-10-30T14:10:10.877610+02:00", "EventTime": "2023-10-30T14:10:10.877627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CoXG0LZoQHJxZxs9j"]} -{"Format": "IDEA0", "ID": "7cc36ec6-f197-45f3-b1db-47aa7d0e2bc8", "DetectTime": "2023-10-30T14:10:10.895649+02:00", "EventTime": "2023-10-30T14:10:10.895667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CeIalV1i5gRG2Q6cW2"]} -{"Format": "IDEA0", "ID": "f6628b67-d12d-4b07-8f93-ee3156a80410", "DetectTime": "2023-10-30T14:10:10.913653+02:00", "EventTime": "2023-10-30T14:10:10.913668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CGDPgc2VpcBB27dbO7"]} -{"Format": "IDEA0", "ID": "839ad26a-735f-4f2d-aa0f-0528772a109d", "DetectTime": "2023-10-30T14:10:10.932814+02:00", "EventTime": "2023-10-30T14:10:10.932825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CaUO4S2KT7u09UqyV6"]} -{"Format": "IDEA0", "ID": "c6e8741b-48d4-4e58-9c27-1510403c3401", "DetectTime": "2023-10-30T14:10:10.948885+02:00", "EventTime": "2023-10-30T14:10:10.948896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C6N0A61XMq1EUR0016"]} -{"Format": "IDEA0", "ID": "5ef0b869-60dc-4c7e-9f98-5c2f995888e3", "DetectTime": "2023-10-30T14:10:10.967101+02:00", "EventTime": "2023-10-30T14:10:10.967122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVhQXI27SON31KRVgf"]} -{"Format": "IDEA0", "ID": "6aa7fee4-5e62-4b41-a2e0-8f30b2dc8997", "DetectTime": "2023-10-30T14:10:10.996691+02:00", "EventTime": "2023-10-30T14:10:10.996702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CvQCc04LWZ8f5pRGu4"]} -{"Format": "IDEA0", "ID": "02c7a436-9b7b-46ed-8db8-af7aec1385a8", "DetectTime": "2023-10-30T14:10:11.015848+02:00", "EventTime": "2023-10-30T14:10:11.015859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C75ykY1RvaoFDxLtUe"]} -{"Format": "IDEA0", "ID": "ce423b81-d8f9-44aa-b07b-5837f828f20d", "DetectTime": "2023-10-30T14:10:11.035489+02:00", "EventTime": "2023-10-30T14:10:11.035505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUmbLC2tvcpWo4P8V4"]} -{"Format": "IDEA0", "ID": "dcfa7088-8b9e-41f2-8a8e-03d05172a63c", "DetectTime": "2023-10-30T14:10:11.053347+02:00", "EventTime": "2023-10-30T14:10:11.053362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkxR061zSGylWcGHCg"]} -{"Format": "IDEA0", "ID": "a7915752-8922-4075-9013-4dc53d17efcb", "DetectTime": "2023-10-30T14:10:11.067672+02:00", "EventTime": "2023-10-30T14:10:11.067683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CsdZD019RmqBRtcIBi"]} -{"Format": "IDEA0", "ID": "e6d171fd-fd7a-4c6c-881d-534bd1f5d4bb", "DetectTime": "2023-10-30T14:10:11.084478+02:00", "EventTime": "2023-10-30T14:10:11.084490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.38.35.229 ", "ContentType": "text/plain"}], "uids": ["CJmGonBwXaB88vahc"]} -{"Format": "IDEA0", "ID": "9fac18f6-64c0-488f-8642-8ec96aca88b7", "DetectTime": "2023-10-30T14:10:11.096956+02:00", "EventTime": "2023-10-30T14:10:11.096967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CoN2NuEkYih48BCGb"]} -{"Format": "IDEA0", "ID": "a5da0f4a-da7a-436d-9e32-a26694811a11", "DetectTime": "2023-10-30T14:10:11.112603+02:00", "EventTime": "2023-10-30T14:10:11.112615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CCKRGTW9Wr42QY59c"]} -{"Format": "IDEA0", "ID": "09433619-c3e7-4aca-96b0-1b5b7f9c40e6", "DetectTime": "2023-10-30T14:10:11.127238+02:00", "EventTime": "2023-10-30T14:10:11.127254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CYFuBIC1SHjongSJ6"]} -{"Format": "IDEA0", "ID": "46b6bbde-82e1-4179-ba04-1354832e5893", "DetectTime": "2023-10-30T14:10:11.143633+02:00", "EventTime": "2023-10-30T14:10:11.143645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3nqHI3f6WD8tKJDIe"]} -{"Format": "IDEA0", "ID": "e0dddb53-4db2-439d-94c1-dddbd4d6e408", "DetectTime": "2023-10-30T14:10:11.162538+02:00", "EventTime": "2023-10-30T14:10:11.162554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CXMXdNOrb73gQfNFh"]} -{"Format": "IDEA0", "ID": "27250ec3-7264-4bfc-86c6-8b3209c9c307", "DetectTime": "2023-10-30T14:10:11.181465+02:00", "EventTime": "2023-10-30T14:10:11.181480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CB6sM4llxvtvPDzM7"]} -{"Format": "IDEA0", "ID": "93fa9fc4-0f04-423c-a16a-fac16dbff172", "DetectTime": "2023-10-30T14:10:11.195908+02:00", "EventTime": "2023-10-30T14:10:11.195919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C4LGI02LAWZHzhrcc4"]} -{"Format": "Json", "ID": "93fa9fc4-0f04-423c-a16a-fac16dbff172", "DetectTime": "2023-10-30T14:10:11.195908+02:00", "EventTime": "2023-10-30T14:10:11.195919+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T02:46:19.920074+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2023/10/30 14:10:11.256750)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f64faa32-fb03-4f30-bd5e-6fba182a77b0", "DetectTime": "2023-10-30T14:10:11.262123+02:00", "EventTime": "2023-10-30T14:10:11.262139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C5Gzyb4xI0vvslIf42"]} -{"Format": "IDEA0", "ID": "969c161b-8c49-4a31-87e3-103019ea1426", "DetectTime": "2023-10-30T14:10:11.280729+02:00", "EventTime": "2023-10-30T14:10:11.280745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["COpoCR1uzH1gromqKd"]} -{"Format": "IDEA0", "ID": "877073d5-858e-475a-b21c-e6006ed0b452", "DetectTime": "2023-10-30T14:10:11.296741+02:00", "EventTime": "2023-10-30T14:10:11.296755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CUMvRGREnog8DBpz9"]} -{"Format": "IDEA0", "ID": "9b5b311c-a75c-4dc1-9b35-beb27e31aef8", "DetectTime": "2023-10-30T14:10:11.311913+02:00", "EventTime": "2023-10-30T14:10:11.311925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CS3m9Z3wlIfJr2unal"]} -{"Format": "IDEA0", "ID": "0a82936c-5d1b-4e09-b82f-c6238a7254b9", "DetectTime": "2023-10-30T14:10:11.327855+02:00", "EventTime": "2023-10-30T14:10:11.327866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CzCc2v4s7DiWOL1uc8"]} -{"Format": "IDEA0", "ID": "a6f6218b-9e1b-40f1-a267-cb15b18271a7", "DetectTime": "2023-10-30T14:10:11.342186+02:00", "EventTime": "2023-10-30T14:10:11.342197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CmgGeC4lNHHcD6Cqyj"]} -{"Format": "IDEA0", "ID": "5ad12b77-0207-4e17-af87-28a5fb707e5d", "DetectTime": "2023-10-30T14:10:11.355115+02:00", "EventTime": "2023-10-30T14:10:11.355135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CoELVq4eYlQnddxI35"]} -{"Format": "IDEA0", "ID": "26d73edc-5303-4640-ab5a-835022a8d00e", "DetectTime": "2023-10-30T14:10:11.372362+02:00", "EventTime": "2023-10-30T14:10:11.372375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CPvPGduOat8sWh3W2"]} -{"Format": "IDEA0", "ID": "bf4125bf-2366-4650-a0d4-431124f9f83d", "DetectTime": "2023-10-30T14:10:11.386550+02:00", "EventTime": "2023-10-30T14:10:11.386569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CqMPqn7s42ljQQyh1"]} -{"Format": "IDEA0", "ID": "a9911402-63f1-42fa-bf99-f4e0b8f99e57", "DetectTime": "2023-10-30T14:10:11.404145+02:00", "EventTime": "2023-10-30T14:10:11.404156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C0hxLr4qlmNQGMNRP9"]} -{"Format": "IDEA0", "ID": "52ccad27-56bc-4126-b4b6-6bb29b603468", "DetectTime": "2023-10-30T14:10:11.417628+02:00", "EventTime": "2023-10-30T14:10:11.417640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CBZmYJ3vPZSDx7XMY3"]} -{"Format": "IDEA0", "ID": "ae48a7a8-0e4d-4660-a78b-d782c90d412a", "DetectTime": "2023-10-30T14:10:11.432930+02:00", "EventTime": "2023-10-30T14:10:11.432942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CvuFvZ3APhx4NmMxod"]} -{"Format": "IDEA0", "ID": "9b395820-7c7c-4d81-bf7f-0b32e1818792", "DetectTime": "2023-10-30T14:10:11.451772+02:00", "EventTime": "2023-10-30T14:10:11.451791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CEe6Mr4JeA4XYxkkCh"]} -{"Format": "IDEA0", "ID": "a8b82e89-db69-4a32-866c-b6245251d01d", "DetectTime": "2023-10-30T14:10:11.469002+02:00", "EventTime": "2023-10-30T14:10:11.469015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CP6haG1XY0pJZ3UBf"]} -{"Format": "IDEA0", "ID": "5102054b-d556-4cf3-84ab-02f5c7cbd3cb", "DetectTime": "2023-10-30T14:10:11.483171+02:00", "EventTime": "2023-10-30T14:10:11.483181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CwloJpVCtj3EtC4f1"]} -{"Format": "IDEA0", "ID": "ced641ce-9592-4288-bcbd-3d6b56d471fe", "DetectTime": "2023-10-30T14:10:11.499179+02:00", "EventTime": "2023-10-30T14:10:11.499191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CpCJPt4dqLck3qh30g"]} -{"Format": "IDEA0", "ID": "23d6062f-3985-42ed-8d65-5a61d85bae67", "DetectTime": "2023-10-30T14:10:11.514742+02:00", "EventTime": "2023-10-30T14:10:11.514758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CO7NJ9tvQ9m86SwYk"]} -{"Format": "IDEA0", "ID": "c7407d8e-f679-4b85-8c7f-8643f5b7910e", "DetectTime": "2023-10-30T14:10:11.530626+02:00", "EventTime": "2023-10-30T14:10:11.530642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CpgB4f30AxVHEXCmOj"]} -{"Format": "IDEA0", "ID": "1b5a7412-5d22-48f9-ae35-69650140404a", "DetectTime": "2023-10-30T14:10:11.546410+02:00", "EventTime": "2023-10-30T14:10:11.546423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C9OHD92b4fjHAe5K6a"]} -{"Format": "IDEA0", "ID": "1c466c4a-2090-4eb6-80df-61ead70d3e63", "DetectTime": "2023-10-30T14:10:11.575863+02:00", "EventTime": "2023-10-30T14:10:11.575880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CqNDgK3lQ40BirVe2"]} -{"Format": "IDEA0", "ID": "98a4b156-2463-41c0-b3a7-0517599ea860", "DetectTime": "2023-10-30T14:10:11.594033+02:00", "EventTime": "2023-10-30T14:10:11.594049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CMrGoo27VJZQLQrpZh"]} -{"Format": "IDEA0", "ID": "28ba35ae-159b-4b12-9800-2b24ac5f50b1", "DetectTime": "2023-10-30T14:10:11.608480+02:00", "EventTime": "2023-10-30T14:10:11.608491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CIPq5h1LYdhUhAWsad"]} -{"Format": "IDEA0", "ID": "eab6f338-9209-492b-b2bb-8422f1fc17cd", "DetectTime": "2023-10-30T14:10:11.622459+02:00", "EventTime": "2023-10-30T14:10:11.622472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CNxXcU3aEoix2P61Qe"]} -{"Format": "IDEA0", "ID": "578be9fa-7147-4fbc-b1f5-6f539e3e1848", "DetectTime": "2023-10-30T14:10:11.638100+02:00", "EventTime": "2023-10-30T14:10:11.638116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5wTSV2RitBwA4QLt5"]} -{"Format": "IDEA0", "ID": "414a9712-4323-4dbf-9fee-79848fcb01e0", "DetectTime": "2023-10-30T14:10:11.651104+02:00", "EventTime": "2023-10-30T14:10:11.651123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CD624i1D1Z1EaITiLd"]} -{"Format": "IDEA0", "ID": "5bdb2791-7f61-4da0-8024-327b31a41b18", "DetectTime": "2023-10-30T14:10:11.668659+02:00", "EventTime": "2023-10-30T14:10:11.668670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CuqywW1HHg9Z7KIUE3"]} -{"Format": "IDEA0", "ID": "040bf9f0-3c73-4a1e-9238-92d0c9e611f6", "DetectTime": "2023-10-30T14:10:11.683835+02:00", "EventTime": "2023-10-30T14:10:11.683850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CDeELo2oSqMYRLQ7Gj"]} -{"Format": "IDEA0", "ID": "2ac98d7f-3f94-488f-abd6-8b2b6bb19187", "DetectTime": "2023-10-30T14:10:11.701078+02:00", "EventTime": "2023-10-30T14:10:11.701088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C2Gh0G39947oN2vct6"]} -{"Format": "IDEA0", "ID": "39de3042-6dc4-415c-85bf-3531b8f65376", "DetectTime": "2023-10-30T14:10:11.714222+02:00", "EventTime": "2023-10-30T14:10:11.714233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CryNMoJBmBT69zq1l"]} -{"Format": "IDEA0", "ID": "4f7cc964-0a13-45a2-a00d-e52ce83724d8", "DetectTime": "2023-10-30T14:10:11.733558+02:00", "EventTime": "2023-10-30T14:10:11.733575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CIVcLF2uTExyvL3v05"]} -{"Format": "IDEA0", "ID": "80e7d440-15f1-4620-adba-ccc0e16b718f", "DetectTime": "2023-10-30T14:10:11.752075+02:00", "EventTime": "2023-10-30T14:10:11.752096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CMW5COFA75nDhHeD9"]} -{"Format": "IDEA0", "ID": "05b31091-a0df-4fa4-9d94-960e61f5453f", "DetectTime": "2023-10-30T14:10:11.775008+02:00", "EventTime": "2023-10-30T14:10:11.775020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CjcbZn4LhhvuO9ZnK7"]} -{"Format": "IDEA0", "ID": "fe1bc9b9-027b-4b1e-8f91-9900b1d28c84", "DetectTime": "2023-10-30T14:10:11.788808+02:00", "EventTime": "2023-10-30T14:10:11.788824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cowsa54IpMpGg8Dk3a"]} -{"Format": "IDEA0", "ID": "f7efdb8b-af52-4ebd-874a-e3d2faec33f0", "DetectTime": "2023-10-30T14:10:11.805649+02:00", "EventTime": "2023-10-30T14:10:11.805667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CSVX6f3CTJqTBLzFl6"]} -{"Format": "IDEA0", "ID": "8225eea9-4912-4204-b4da-d84a640fc959", "DetectTime": "2023-10-30T14:10:11.820280+02:00", "EventTime": "2023-10-30T14:10:11.820294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CuXHaj2q2vFssWK76l"]} -{"Format": "IDEA0", "ID": "03682a63-29a0-4f87-94db-bde4d43d0e3c", "DetectTime": "2023-10-30T14:10:11.838349+02:00", "EventTime": "2023-10-30T14:10:11.838360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CRj6vjHk3v7Kcl1Jl"]} -{"Format": "IDEA0", "ID": "00076259-b5a8-49f0-a114-256a2f18b499", "DetectTime": "2023-10-30T14:10:11.856590+02:00", "EventTime": "2023-10-30T14:10:11.856607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CWvSaP2FBAQzgvDOdf"]} -{"Format": "IDEA0", "ID": "741c4fee-614f-4de1-a3f3-2c161b89b763", "DetectTime": "2023-10-30T14:10:11.874641+02:00", "EventTime": "2023-10-30T14:10:11.874657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CuOJ1h1XwNsz1loXX9"]} -{"Format": "IDEA0", "ID": "1f5b366b-b6a8-45dc-a306-aa6a33b4322d", "DetectTime": "2023-10-30T14:10:11.890253+02:00", "EventTime": "2023-10-30T14:10:11.890264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CNGr6F4C9DGnV5fRE9"]} -{"Format": "IDEA0", "ID": "00f67035-2f58-4c84-bcfb-6c3420ecf6f2", "DetectTime": "2023-10-30T14:10:11.907590+02:00", "EventTime": "2023-10-30T14:10:11.907605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CY49gURUNmh2xB9Fe"]} -{"Format": "IDEA0", "ID": "574f0768-48a4-484b-a8b5-07e0d92db37e", "DetectTime": "2023-10-30T14:10:11.923501+02:00", "EventTime": "2023-10-30T14:10:11.923513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CugkV2117z6RZ69qDc"]} -{"Format": "IDEA0", "ID": "bdb3d8bc-76ce-4215-b7c0-90c08dc727e4", "DetectTime": "2023-10-30T14:10:11.937452+02:00", "EventTime": "2023-10-30T14:10:11.937464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cxi2Go3kOekPDM1gg2"]} -{"Format": "IDEA0", "ID": "376b1d0b-2195-42dd-abb5-b7b6699b5927", "DetectTime": "2023-10-30T14:10:11.952006+02:00", "EventTime": "2023-10-30T14:10:11.952019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CJ4q4JhD1LLE6g816"]} -{"Format": "IDEA0", "ID": "43f1c46c-d94a-430a-b264-10dce8ccee24", "DetectTime": "2023-10-30T14:10:11.966421+02:00", "EventTime": "2023-10-30T14:10:11.966432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CEWL3G2eThDozU46o"]} -{"Format": "IDEA0", "ID": "9fe71088-5127-479a-82a2-c6a6d9bee5d0", "DetectTime": "2023-10-30T14:10:11.984147+02:00", "EventTime": "2023-10-30T14:10:11.984163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["ChRooV3UJlenH04TFg"]} -{"Format": "IDEA0", "ID": "7566cc67-d955-47ff-8a7d-f8f54585f640", "DetectTime": "2023-10-30T14:10:12.000979+02:00", "EventTime": "2023-10-30T14:10:12.000990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CCHUzY3f57dnaS0iOl"]} -{"Format": "IDEA0", "ID": "91bbb799-2d5e-4780-aac8-26665b07bd7d", "DetectTime": "2023-10-30T14:10:12.016853+02:00", "EventTime": "2023-10-30T14:10:12.016867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CWUPO52TCaFEPaTqgj"]} -{"Format": "IDEA0", "ID": "712383e2-bcb0-4d52-81ba-16d4b55c394f", "DetectTime": "2023-10-30T14:10:12.030360+02:00", "EventTime": "2023-10-30T14:10:12.030371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CYjfwK2aQuHVM4ge2c"]} -{"Format": "IDEA0", "ID": "afcb0435-ed09-4c3a-9dee-d7b22aeeeb56", "DetectTime": "2023-10-30T14:10:12.043032+02:00", "EventTime": "2023-10-30T14:10:12.043052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CNeqCc3pvSH5qbwzz4"]} -{"Format": "IDEA0", "ID": "7acaa7da-1788-4d00-ae50-a67ac28c2278", "DetectTime": "2023-10-30T14:10:12.058203+02:00", "EventTime": "2023-10-30T14:10:12.058214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CPEokw4AR6cxiUzA3b"]} -{"Format": "IDEA0", "ID": "fe42fddd-a45c-44cf-8218-2f8e1de5fa55", "DetectTime": "2023-10-30T14:10:12.075635+02:00", "EventTime": "2023-10-30T14:10:12.075651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C41weY2tujAOvFzoAe"]} -{"Format": "IDEA0", "ID": "9ece9ed3-a4ad-4676-8fb7-7054e5ad27e0", "DetectTime": "2023-10-30T14:10:12.094168+02:00", "EventTime": "2023-10-30T14:10:12.094184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C6bnD93E6r0PDUgJaf"]} -{"Format": "IDEA0", "ID": "e721a200-97cb-48ee-807e-08f600a27c12", "DetectTime": "2023-10-30T14:10:12.110857+02:00", "EventTime": "2023-10-30T14:10:12.110869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C4LrWD4Zlp4CFNeBC4"]} -{"Format": "IDEA0", "ID": "1fe0ac7a-5774-4a74-922d-161356734e30", "DetectTime": "2023-10-30T14:10:12.135943+02:00", "EventTime": "2023-10-30T14:10:12.135954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CK8CfEptIniANxub7"]} -{"Format": "IDEA0", "ID": "1d8085de-ae0d-475b-bbac-4f18da9875d8", "DetectTime": "2023-10-30T14:10:12.153046+02:00", "EventTime": "2023-10-30T14:10:12.153061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cf5fCS2PlM2cJ4e6da"]} -{"Format": "IDEA0", "ID": "823a9957-d671-4f42-9006-d7d52284e639", "DetectTime": "2023-10-30T14:10:12.169954+02:00", "EventTime": "2023-10-30T14:10:12.169982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["ClogP81J0qP1klUwK9"]} -{"Format": "IDEA0", "ID": "d094167e-4f40-42ca-b6f9-455c3eab75f1", "DetectTime": "2023-10-30T14:10:12.186190+02:00", "EventTime": "2023-10-30T14:10:12.186209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CsXze23I6JR3Fn5GKk"]} -{"Format": "IDEA0", "ID": "6b24be2e-d6d6-411a-b33e-5cd13a001be4", "DetectTime": "2023-10-30T14:10:12.207778+02:00", "EventTime": "2023-10-30T14:10:12.207791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CdahV54dSeQoMTisDb"]} -{"Format": "IDEA0", "ID": "7609fb2f-95bf-4ec9-8bb2-fc5a216b3255", "DetectTime": "2023-10-30T14:10:12.222833+02:00", "EventTime": "2023-10-30T14:10:12.222845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CotvK7EGgTe4Kfb2a"]} -{"Format": "IDEA0", "ID": "2b18747b-32ac-49dd-9b9b-ec166c174648", "DetectTime": "2023-10-30T14:10:12.237117+02:00", "EventTime": "2023-10-30T14:10:12.237140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CeR7m543HohPT7tWB3"]} -{"Format": "IDEA0", "ID": "421c2994-bee2-4e43-bc36-89b016c964d9", "DetectTime": "2023-10-30T14:10:12.254816+02:00", "EventTime": "2023-10-30T14:10:12.254831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C3UKlKiSTt06p2xjl"]} -{"Format": "IDEA0", "ID": "b9b90426-f44c-407a-948c-8319ccc3c4a4", "DetectTime": "2023-10-30T14:10:12.271064+02:00", "EventTime": "2023-10-30T14:10:12.271082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CFtfD62FBxajcPOoDj"]} -{"Format": "IDEA0", "ID": "9a41b727-261e-407a-abd1-27c54c08373e", "DetectTime": "2023-10-30T14:10:12.286155+02:00", "EventTime": "2023-10-30T14:10:12.286166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["COOJYa372W3Tye3c0k"]} -{"Format": "IDEA0", "ID": "70082202-cf84-4dcf-a108-f4cba64957c9", "DetectTime": "2023-10-30T14:10:12.298580+02:00", "EventTime": "2023-10-30T14:10:12.298590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C3gAFd2NoDiFc7hLe3"]} -{"Format": "IDEA0", "ID": "fe805428-841e-406b-9554-fd384ddc9079", "DetectTime": "2023-10-30T14:10:12.311977+02:00", "EventTime": "2023-10-30T14:10:12.311994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CcmKK42KKoxy5jsO96"]} -{"Format": "IDEA0", "ID": "99ad8ddd-1200-4262-953f-2066fc6e37b6", "DetectTime": "2023-10-30T14:10:12.330438+02:00", "EventTime": "2023-10-30T14:10:12.330454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ClpX2z3qumocK792D9"]} -{"Format": "IDEA0", "ID": "d8b1b8b5-dc56-4b63-9c94-cf04e160fd89", "DetectTime": "2023-10-30T14:10:12.348647+02:00", "EventTime": "2023-10-30T14:10:12.348662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CWWxD12e6Gg3rBiGi6"]} -{"Format": "IDEA0", "ID": "c964ea54-f0ad-4049-9ae6-5358ce99b34f", "DetectTime": "2023-10-30T14:10:12.366648+02:00", "EventTime": "2023-10-30T14:10:12.366664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CF3zoj4EChAC0FwGh4"]} -{"Format": "IDEA0", "ID": "533f22cf-9499-4cf5-959e-8c2ef20a2246", "DetectTime": "2023-10-30T14:10:12.383986+02:00", "EventTime": "2023-10-30T14:10:12.384002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CeLhFa4Jc8d8r6cWjb"]} -{"Format": "IDEA0", "ID": "15df4cdf-9d8b-4989-814e-98103d688fdc", "DetectTime": "2023-10-30T14:10:12.401475+02:00", "EventTime": "2023-10-30T14:10:12.401485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CRCJsK29534CUvvty7"]} -{"Format": "IDEA0", "ID": "39e97367-e7ba-411b-beb8-924a8ac051a6", "DetectTime": "2023-10-30T14:10:12.416651+02:00", "EventTime": "2023-10-30T14:10:12.416666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CYsURB3xZitgI26mtl"]} -{"Format": "IDEA0", "ID": "f7a8c5a8-00df-436c-b1b0-28bc494b937e", "DetectTime": "2023-10-30T14:10:12.431821+02:00", "EventTime": "2023-10-30T14:10:12.431833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CuOrRk4iPAIJ4XTazc"]} -{"Format": "IDEA0", "ID": "d95c20ae-39e6-4ddf-963c-f56009411507", "DetectTime": "2023-10-30T14:10:12.458475+02:00", "EventTime": "2023-10-30T14:10:12.458487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C1zpjx2AjVwX00Uwg9"]} -{"Format": "IDEA0", "ID": "5ad0230f-84bb-4085-abd8-a8fb471b03f8", "DetectTime": "2023-10-30T14:10:12.472237+02:00", "EventTime": "2023-10-30T14:10:12.472253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CyCQqj29ispFude7g"]} -{"Format": "IDEA0", "ID": "f8d10216-4cc5-416f-9b4b-e229fc872ae5", "DetectTime": "2023-10-30T14:10:12.490847+02:00", "EventTime": "2023-10-30T14:10:12.490876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cf8wLLcUcjGfzr15b"]} -{"Format": "IDEA0", "ID": "1d97dda0-ea3d-491a-84b0-0f2bdfe264ec", "DetectTime": "2023-10-30T14:10:12.507810+02:00", "EventTime": "2023-10-30T14:10:12.507826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CP5hbV3ujwdpTUJ4m9"]} -{"Format": "IDEA0", "ID": "9efb8b50-2b7f-4f6a-a778-e535f81d265b", "DetectTime": "2023-10-30T14:10:12.524806+02:00", "EventTime": "2023-10-30T14:10:12.524823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CAkTxf4t1VPuuojwI6"]} -{"Format": "IDEA0", "ID": "3d311e5b-90f5-4316-85a4-4afc64b7fa58", "DetectTime": "2023-10-30T14:10:12.541841+02:00", "EventTime": "2023-10-30T14:10:12.541858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cudt8a3lfMD9Sc2qD7"]} -{"Format": "IDEA0", "ID": "6aa44ed7-bd05-4e47-b90b-59eab133120e", "DetectTime": "2023-10-30T14:10:12.560347+02:00", "EventTime": "2023-10-30T14:10:12.560363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CRgj2a4ovgauT5HmIa"]} -{"Format": "IDEA0", "ID": "fcd08d84-6071-4720-8205-22c78f5625d0", "DetectTime": "2023-10-30T14:10:12.578321+02:00", "EventTime": "2023-10-30T14:10:12.578336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cb4Wtn4YhrvBlBT32i"]} -{"Format": "IDEA0", "ID": "3b87ced5-4d62-4f99-83d4-e2f52e825f6c", "DetectTime": "2023-10-30T14:10:12.597563+02:00", "EventTime": "2023-10-30T14:10:12.597580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CWPyhq1d4gcmkeTVhc"]} -{"Format": "IDEA0", "ID": "f1b8a067-06cd-4fed-bd25-b8785565357f", "DetectTime": "2023-10-30T14:10:12.616799+02:00", "EventTime": "2023-10-30T14:10:12.616814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CfKf3I3RkmC9e3baVa"]} -{"Format": "IDEA0", "ID": "6a528920-a1c9-4496-a299-afa20a1cdf64", "DetectTime": "2023-10-30T14:10:12.630274+02:00", "EventTime": "2023-10-30T14:10:12.630284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CPE2KK3bJqOZuKObxh"]} -{"Format": "IDEA0", "ID": "8a032d22-ebb5-422d-91c7-9cb76b34c382", "DetectTime": "2023-10-30T14:10:12.645652+02:00", "EventTime": "2023-10-30T14:10:12.645664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CWyqJR5K9lzOOTLLk"]} -{"Format": "IDEA0", "ID": "b4be528c-bf56-41d8-85ff-6bdf13788f17", "DetectTime": "2023-10-30T14:10:12.661352+02:00", "EventTime": "2023-10-30T14:10:12.661373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CcLpWQ3GgKUrULLDV9"]} -{"Format": "IDEA0", "ID": "97203004-f473-4f6c-b87e-e55ab8d8fb7f", "DetectTime": "2023-10-30T14:10:12.678486+02:00", "EventTime": "2023-10-30T14:10:12.678502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CyqAhk3ZMbHCbdb4Q5"]} -{"Format": "IDEA0", "ID": "56019d7d-f7e5-49f6-ba93-d92d92245d9e", "DetectTime": "2023-10-30T14:10:12.692719+02:00", "EventTime": "2023-10-30T14:10:12.692730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C3mLz1232dR0qpTc73"]} -{"Format": "IDEA0", "ID": "0907bd0e-8bef-4a3e-a67d-4bea25ad9bbc", "DetectTime": "2023-10-30T14:10:12.716036+02:00", "EventTime": "2023-10-30T14:10:12.716057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5MgTV221MROi4XVZ8"]} -{"Format": "IDEA0", "ID": "46402b5d-922d-4f83-8cd2-014647a7865a", "DetectTime": "2023-10-30T14:10:12.730877+02:00", "EventTime": "2023-10-30T14:10:12.730887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CUROEH2ff1l70Ytbq2"]} -{"Format": "IDEA0", "ID": "5220ac0a-cd41-4dbd-98f3-f19d70ba4776", "DetectTime": "2023-10-30T14:10:12.745897+02:00", "EventTime": "2023-10-30T14:10:12.745912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C2h6NefwmLR8Wg6Yi"]} -{"Format": "IDEA0", "ID": "2d855d17-2c26-4f68-9ef3-67b4db353bdf", "DetectTime": "2023-10-30T14:10:12.760008+02:00", "EventTime": "2023-10-30T14:10:12.760020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CjOClg3rJ3eptDiZJe"]} -{"Format": "IDEA0", "ID": "0848e9c4-6932-492e-aea1-30cf19467bee", "DetectTime": "2023-10-30T14:10:12.774661+02:00", "EventTime": "2023-10-30T14:10:12.774672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CCtuuE1B6LnRgiVcte"]} -{"Format": "IDEA0", "ID": "b9714a6a-644b-4316-a9ab-52f2fbc5c7f8", "DetectTime": "2023-10-30T14:10:12.791564+02:00", "EventTime": "2023-10-30T14:10:12.791576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CfdqPJ2VWn0XWZxbuf"]} -{"Format": "IDEA0", "ID": "5893e5a8-7cdd-41b4-bea0-303f6789e754", "DetectTime": "2023-10-30T14:10:12.809045+02:00", "EventTime": "2023-10-30T14:10:12.809061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Czltb11NspN0h863Jl"]} -{"Format": "IDEA0", "ID": "cbbc2aa3-55ec-41ef-8e35-24e94567cb70", "DetectTime": "2023-10-30T14:10:12.825918+02:00", "EventTime": "2023-10-30T14:10:12.825930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CS2Qt2171AIQqwYs9d"]} -{"Format": "IDEA0", "ID": "e942d9bf-6cf0-4baa-98d6-bebac5d59551", "DetectTime": "2023-10-30T14:10:12.839703+02:00", "EventTime": "2023-10-30T14:10:12.839717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CaAt3A4QljJXAhEfgh"]} -{"Format": "IDEA0", "ID": "42d53605-08e1-48da-b041-777803e903e1", "DetectTime": "2023-10-30T14:10:12.855883+02:00", "EventTime": "2023-10-30T14:10:12.855896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CRu5cA1SsGYRUFXY79"]} -{"Format": "IDEA0", "ID": "e8e61ebd-5f60-425c-8e49-129958b35c77", "DetectTime": "2023-10-30T14:10:12.871427+02:00", "EventTime": "2023-10-30T14:10:12.871438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CKpNB21cGf6r5h6Pr7"]} -{"Format": "IDEA0", "ID": "ca422ec3-9816-4253-bc70-4b10d974074c", "DetectTime": "2023-10-30T14:10:12.885146+02:00", "EventTime": "2023-10-30T14:10:12.885166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CW2C6G1fuSe0qkxFS2"]} -{"Format": "IDEA0", "ID": "0596e967-1e88-486a-b479-364e0c1246d1", "DetectTime": "2023-10-30T14:10:12.902135+02:00", "EventTime": "2023-10-30T14:10:12.902146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CGuzta4rl6jkfJMOA"]} -{"Format": "IDEA0", "ID": "14ae134f-ad54-4e86-bb65-40cda9fc8f58", "DetectTime": "2023-10-30T14:10:12.916054+02:00", "EventTime": "2023-10-30T14:10:12.916069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C354tj3zIpWWY39k4e"]} -{"Format": "IDEA0", "ID": "9c9421af-b410-4ba0-af1c-da71f0046e07", "DetectTime": "2023-10-30T14:10:12.930162+02:00", "EventTime": "2023-10-30T14:10:12.930172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cwr8H84PspmBueY78d"]} -{"Format": "IDEA0", "ID": "e37066fd-1b30-4ae9-a151-c4006e6bec92", "DetectTime": "2023-10-30T14:10:12.943336+02:00", "EventTime": "2023-10-30T14:10:12.943347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CEkVSZ286WBhjVnVug"]} -{"Format": "IDEA0", "ID": "9069ec72-b6e8-44ab-9220-ac4be47280e8", "DetectTime": "2023-10-30T14:10:12.967763+02:00", "EventTime": "2023-10-30T14:10:12.967780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C1FugP39ErNYIz21A1"]} -{"Format": "IDEA0", "ID": "75510533-f870-4869-a768-2c73cb268729", "DetectTime": "2023-10-30T14:10:12.982948+02:00", "EventTime": "2023-10-30T14:10:12.982960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CbzlaCthu19xtYXV9"]} -{"Format": "IDEA0", "ID": "6f419212-8480-4e4c-9449-285ff637044f", "DetectTime": "2023-10-30T14:10:12.998336+02:00", "EventTime": "2023-10-30T14:10:12.998352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CbO5kL18ZDkdIMjNp3"]} -{"Format": "IDEA0", "ID": "3e3c69ba-a2e1-4f2f-ad7b-d6d8b690b84f", "DetectTime": "2023-10-30T14:10:13.014055+02:00", "EventTime": "2023-10-30T14:10:13.014066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CL1iog12XWSWyPrApe"]} -{"Format": "IDEA0", "ID": "9120f699-2846-46e5-899a-9bc4fe3a1c18", "DetectTime": "2023-10-30T14:10:13.028158+02:00", "EventTime": "2023-10-30T14:10:13.028169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C7k7k44TsA0Ck3Glt5"]} -{"Format": "IDEA0", "ID": "652a9543-acae-4739-b42f-cb921df1d6da", "DetectTime": "2023-10-30T14:10:13.041642+02:00", "EventTime": "2023-10-30T14:10:13.041658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CZrd8G23lLdOR0NGud"]} -{"Format": "IDEA0", "ID": "cdf1877e-378a-47ed-a3e2-fa64ceacb617", "DetectTime": "2023-10-30T14:10:13.055350+02:00", "EventTime": "2023-10-30T14:10:13.055367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CkX0X42bF6A4Qwhcd"]} -{"Format": "IDEA0", "ID": "2f53d3d6-3266-47e5-87b8-4adc104d55e2", "DetectTime": "2023-10-30T14:10:13.068110+02:00", "EventTime": "2023-10-30T14:10:13.068126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CC5RXp2gVCQadMQ2ig"]} -{"Format": "IDEA0", "ID": "2578c86c-490f-468a-bbb1-cdab73f6d689", "DetectTime": "2023-10-30T14:10:13.083916+02:00", "EventTime": "2023-10-30T14:10:13.083933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CzfStI3Te09ayVqkkb"]} -{"Format": "IDEA0", "ID": "6663108a-9c60-407f-b7c7-bb26657729e1", "DetectTime": "2023-10-30T14:10:13.097900+02:00", "EventTime": "2023-10-30T14:10:13.097911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CrrCGe2jdEoMSmW9ae"]} -{"Format": "IDEA0", "ID": "fb9faf90-f425-4049-9e50-04a728de8b0d", "DetectTime": "2023-10-30T14:10:13.113706+02:00", "EventTime": "2023-10-30T14:10:13.113719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CFaCjx48aDgm4naURb"]} -{"Format": "IDEA0", "ID": "4061ff6b-126a-4508-ab53-95d7bab66eaf", "DetectTime": "2023-10-30T14:10:13.129081+02:00", "EventTime": "2023-10-30T14:10:13.129092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CD0w636vZGVFCS3a"]} -{"Format": "IDEA0", "ID": "562ae9fc-b2a8-46cd-bed9-78ff7eb7fffd", "DetectTime": "2023-10-30T14:10:13.142958+02:00", "EventTime": "2023-10-30T14:10:13.142970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CbY72r2kHadLMfTf29"]} -{"Format": "IDEA0", "ID": "9cc167f0-3c8f-475e-b1a6-675edb9e10ee", "DetectTime": "2023-10-30T14:10:13.166625+02:00", "EventTime": "2023-10-30T14:10:13.166643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CrQK53RnJm0U3gKQ4"]} -{"Format": "IDEA0", "ID": "824272ed-a973-4038-a131-89b4ac16f5f4", "DetectTime": "2023-10-30T14:10:13.182758+02:00", "EventTime": "2023-10-30T14:10:13.182775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C2guWf3cvJztCgcCVg"]} -{"Format": "IDEA0", "ID": "0b4a75c7-156d-4789-8cec-955ff582d063", "DetectTime": "2023-10-30T14:10:13.197686+02:00", "EventTime": "2023-10-30T14:10:13.197697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C13fl52aF7RKlivtul"]} -{"Format": "IDEA0", "ID": "0c346217-c3f8-4031-809d-cce2de06a990", "DetectTime": "2023-10-30T14:10:13.211587+02:00", "EventTime": "2023-10-30T14:10:13.211598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBti7a4KUZxzPGkPhj"]} -{"Format": "IDEA0", "ID": "d9ee274e-b794-454b-87e4-7d556b75641b", "DetectTime": "2023-10-30T14:10:13.223703+02:00", "EventTime": "2023-10-30T14:10:13.223716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CbGyFC2Zp0vaB05zxf"]} -{"Format": "IDEA0", "ID": "18d58cea-1107-419a-b1ff-a4b1c4489fe0", "DetectTime": "2023-10-30T14:10:13.237959+02:00", "EventTime": "2023-10-30T14:10:13.237980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CxOo3t3L56uO9PT4C1"]} -{"Format": "IDEA0", "ID": "69ec0979-8441-4028-8622-799f21f2da33", "DetectTime": "2023-10-30T14:10:13.250105+02:00", "EventTime": "2023-10-30T14:10:13.250115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CycXBI21eeILqKvEq6"]} -{"Format": "IDEA0", "ID": "3da615d2-3db8-4678-bb2c-ecb3c1e53472", "DetectTime": "2023-10-30T14:10:13.266441+02:00", "EventTime": "2023-10-30T14:10:13.266457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CiyWjkbJz7fHBGTad"]} -{"Format": "IDEA0", "ID": "df345ea2-bd14-4627-ba51-3eb94a0bcc71", "DetectTime": "2023-10-30T14:10:13.283363+02:00", "EventTime": "2023-10-30T14:10:13.283379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CbFz0B2yAvfaXkj0if"]} -{"Format": "IDEA0", "ID": "a8ed0b0f-b732-482e-945f-17b3e1b80c6b", "DetectTime": "2023-10-30T14:10:13.300488+02:00", "EventTime": "2023-10-30T14:10:13.300503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cd8Ool2b3YEjxhksK"]} -{"Format": "IDEA0", "ID": "9afdd0d9-e8cf-43be-9684-3d443953c033", "DetectTime": "2023-10-30T14:10:13.314519+02:00", "EventTime": "2023-10-30T14:10:13.314535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CabUZI1O4qfOnjd0Xa"]} -{"Format": "IDEA0", "ID": "b3884d78-4129-410d-9b83-a58793cea4cc", "DetectTime": "2023-10-30T14:10:13.330885+02:00", "EventTime": "2023-10-30T14:10:13.330905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CzIytm4mXd1Rzoa9cg"]} -{"Format": "IDEA0", "ID": "47296e56-e6de-439f-8004-dbad20287483", "DetectTime": "2023-10-30T14:10:13.344908+02:00", "EventTime": "2023-10-30T14:10:13.344918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ci6Rrf4xYpPty59Omh"]} -{"Format": "IDEA0", "ID": "ab17d8b4-b60e-4899-b443-baf2657cadcf", "DetectTime": "2023-10-30T14:10:13.359718+02:00", "EventTime": "2023-10-30T14:10:13.359731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CNluQz3B6E538cvzK3"]} -{"Format": "IDEA0", "ID": "c050bfe3-8d01-49ee-aaf9-d4ab794dbca2", "DetectTime": "2023-10-30T14:10:13.372474+02:00", "EventTime": "2023-10-30T14:10:13.372484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C1KeWt3eZtPu4wC7Oi"]} -{"Format": "IDEA0", "ID": "76919297-9883-4c40-a319-15f4905593cb", "DetectTime": "2023-10-30T14:10:13.388238+02:00", "EventTime": "2023-10-30T14:10:13.388254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CF5Yqe2oGXrA8lKr14"]} -{"Format": "IDEA0", "ID": "98b1d5c4-e8c8-4e35-98ff-53f19b3a91e4", "DetectTime": "2023-10-30T14:10:13.404004+02:00", "EventTime": "2023-10-30T14:10:13.404029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C3YnFL3G5i8ofyERE"]} -{"Format": "IDEA0", "ID": "ab9df388-85fa-4d0c-b4ae-09de454351ec", "DetectTime": "2023-10-30T14:10:13.418097+02:00", "EventTime": "2023-10-30T14:10:13.418120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C0rOPaMuFH37wgdql"]} -{"Format": "IDEA0", "ID": "ce05db29-5f41-410f-8307-1e25d018c128", "DetectTime": "2023-10-30T14:10:13.434492+02:00", "EventTime": "2023-10-30T14:10:13.434509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CNPCZ510P9YD6zopC"]} -{"Format": "IDEA0", "ID": "0c117809-3ddd-48d8-a004-63ecb24231b7", "DetectTime": "2023-10-30T14:10:13.447378+02:00", "EventTime": "2023-10-30T14:10:13.447389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CDxoqH1fA4Hk7uZ5Cj"]} -{"Format": "Json", "ID": "0c117809-3ddd-48d8-a004-63ecb24231b7", "DetectTime": "2023-10-30T14:10:13.447378+02:00", "EventTime": "2023-10-30T14:10:13.447389+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T02:46:38.640825+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2023/10/30 14:10:13.510707)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c0a4b7d-e61f-4d72-9b24-d3e1b0970fcc", "DetectTime": "2023-10-30T14:10:13.514794+02:00", "EventTime": "2023-10-30T14:10:13.514807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CcWYhG4GtLF7VBUZk1"]} -{"Format": "IDEA0", "ID": "964eaca2-5787-424f-8272-13d1b0029345", "DetectTime": "2023-10-30T14:10:13.532381+02:00", "EventTime": "2023-10-30T14:10:13.532397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CUNQij2aSEDN74kET4"]} -{"Format": "IDEA0", "ID": "0a4ed0bf-fcd8-475f-8ec1-186efa69eaf6", "DetectTime": "2023-10-30T14:10:13.548697+02:00", "EventTime": "2023-10-30T14:10:13.548707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CmT3mr2uNZD45E3GO9"]} -{"Format": "IDEA0", "ID": "652f7ef1-ede5-4bea-8e8b-a48fe9a71661", "DetectTime": "2023-10-30T14:10:13.562046+02:00", "EventTime": "2023-10-30T14:10:13.562060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CkiRlu3DhKdsdRs6Mi"]} -{"Format": "IDEA0", "ID": "361abf70-42dc-4fe4-848b-8c045f567b16", "DetectTime": "2023-10-30T14:10:13.576289+02:00", "EventTime": "2023-10-30T14:10:13.576300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CPHX7r1srdy3eECyt8"]} -{"Format": "IDEA0", "ID": "89c75b0c-768f-4670-8c0b-66e76e625f2a", "DetectTime": "2023-10-30T14:10:13.590503+02:00", "EventTime": "2023-10-30T14:10:13.590514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CECeeb2x1lg5nQgEZ9"]} -{"Format": "IDEA0", "ID": "96af208e-8098-48fe-9f22-62c33b2599a8", "DetectTime": "2023-10-30T14:10:13.604712+02:00", "EventTime": "2023-10-30T14:10:13.604727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CEirs2IvIBil98pE8"]} -{"Format": "IDEA0", "ID": "c81aa08d-66f5-42be-8ed1-01b2ac6f7edb", "DetectTime": "2023-10-30T14:10:13.619925+02:00", "EventTime": "2023-10-30T14:10:13.619942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CeFd9D3U5LwTbupzp7"]} -{"Format": "IDEA0", "ID": "e12b6f1e-3a1f-4158-8dcb-4378812e96f0", "DetectTime": "2023-10-30T14:10:13.632323+02:00", "EventTime": "2023-10-30T14:10:13.632333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["ChafuF37dQyfQItut7"]} -{"Format": "IDEA0", "ID": "518b1866-d2bb-482e-9043-0ff13cd658b8", "DetectTime": "2023-10-30T14:10:13.648274+02:00", "EventTime": "2023-10-30T14:10:13.648290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cf48h14R2xelpOpwr2"]} -{"Format": "IDEA0", "ID": "9c50a958-086c-4016-bc09-d3c48c0af96f", "DetectTime": "2023-10-30T14:10:13.666432+02:00", "EventTime": "2023-10-30T14:10:13.666447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CnSpF23s6uPW8SzxY7"]} -{"Format": "IDEA0", "ID": "c489a143-8a90-4c37-bb17-969887ad0c74", "DetectTime": "2023-10-30T14:10:13.694170+02:00", "EventTime": "2023-10-30T14:10:13.694187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CI5afu1uXKPVREKqA5"]} -{"Format": "IDEA0", "ID": "5a8c07c0-1567-4b14-9774-44b0d83aeb31", "DetectTime": "2023-10-30T14:10:13.708685+02:00", "EventTime": "2023-10-30T14:10:13.708696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C3OFBO2RDahXPviC1"]} -{"Format": "IDEA0", "ID": "968a1439-5df1-4b38-84cb-a4411cef3963", "DetectTime": "2023-10-30T14:10:13.721627+02:00", "EventTime": "2023-10-30T14:10:13.721644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CrDcKiPEi1auZ4wc7"]} -{"Format": "IDEA0", "ID": "36dbf24d-b19f-4487-8b59-410b6b212d7b", "DetectTime": "2023-10-30T14:10:13.736635+02:00", "EventTime": "2023-10-30T14:10:13.736646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C0HyHY1zYqFx3M00V9"]} -{"Format": "IDEA0", "ID": "c5ad4605-aaf6-493c-af85-9d74357336d4", "DetectTime": "2023-10-30T14:10:13.750320+02:00", "EventTime": "2023-10-30T14:10:13.750332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ChENEB2VOib54PSv5h"]} -{"Format": "IDEA0", "ID": "dea9695a-7a30-41fd-adbf-1b80bcd6bcf9", "DetectTime": "2023-10-30T14:10:13.764328+02:00", "EventTime": "2023-10-30T14:10:13.764340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CHQYuh2Nq5KP2sLqe6"]} -{"Format": "IDEA0", "ID": "e2a5387a-dbd9-4951-8eb7-400bce52336d", "DetectTime": "2023-10-30T14:10:13.778229+02:00", "EventTime": "2023-10-30T14:10:13.778240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwClGh4lCl1RMK1MP3"]} -{"Format": "IDEA0", "ID": "a461c8ad-31d2-476a-be99-c3a8d7928e7d", "DetectTime": "2023-10-30T14:10:13.790575+02:00", "EventTime": "2023-10-30T14:10:13.790587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CRcOws1iP0KZqpRrA4"]} -{"Format": "IDEA0", "ID": "664c2fbc-3b28-4174-88e4-e248be8d0581", "DetectTime": "2023-10-30T14:10:13.806314+02:00", "EventTime": "2023-10-30T14:10:13.806332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CORPif1FuINIPHgUp2"]} -{"Format": "IDEA0", "ID": "36cbf351-6f90-4b08-af74-b15fc66bc851", "DetectTime": "2023-10-30T14:10:13.823498+02:00", "EventTime": "2023-10-30T14:10:13.823509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["C0JH9L3zLNK4E6rxJ8"]} -{"Format": "IDEA0", "ID": "8bb62a5c-4259-4fd2-99f9-f9e2a64833f3", "DetectTime": "2023-10-30T14:10:13.836040+02:00", "EventTime": "2023-10-30T14:10:13.836055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRJM5V1kMz5iprsDsj"]} -{"Format": "IDEA0", "ID": "998ed9aa-8859-4669-b420-1d2fec6a40c2", "DetectTime": "2023-10-30T14:10:13.853103+02:00", "EventTime": "2023-10-30T14:10:13.853114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CBUQe32l1qTotAJZB2"]} -{"Format": "IDEA0", "ID": "b0c8e7e7-a4a8-4fc9-a029-edff1530b592", "DetectTime": "2023-10-30T14:10:13.867254+02:00", "EventTime": "2023-10-30T14:10:13.867265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CCGiA03EhXes96tpZ"]} -{"Format": "IDEA0", "ID": "6713cc24-d9e9-4b06-9e5c-25238efedcf1", "DetectTime": "2023-10-30T14:10:13.881339+02:00", "EventTime": "2023-10-30T14:10:13.881350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CQjEz1Jq97HRVG9Ha"]} -{"Format": "IDEA0", "ID": "f614e9b5-a52d-4aff-bda9-f9466dc32a21", "DetectTime": "2023-10-30T14:10:13.900056+02:00", "EventTime": "2023-10-30T14:10:13.900072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["ClTawr41NzBZDFm0J"]} -{"Format": "IDEA0", "ID": "28a82c01-d302-470b-a0a5-dba376039f7d", "DetectTime": "2023-10-30T14:10:13.919358+02:00", "EventTime": "2023-10-30T14:10:13.919382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CK2m2R1ClXfhA2MMWj"]} -{"Format": "IDEA0", "ID": "e87e967d-66d8-4b0f-a136-107725ae2144", "DetectTime": "2023-10-30T14:10:13.942378+02:00", "EventTime": "2023-10-30T14:10:13.942389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CyUvgm3oPIgKGd37Xf"]} -{"Format": "IDEA0", "ID": "bf14f0c8-9c5b-4a2d-b9bb-af92c9a4f4cd", "DetectTime": "2023-10-30T14:10:13.954521+02:00", "EventTime": "2023-10-30T14:10:13.954535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1W4rt3xFq0NpqBFH6"]} -{"Format": "IDEA0", "ID": "b542e460-a38a-4eb3-b6c6-3e29d452854e", "DetectTime": "2023-10-30T14:10:13.967714+02:00", "EventTime": "2023-10-30T14:10:13.967724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQCZWv2La7g3xY5lU2"]} -{"Format": "IDEA0", "ID": "6e768c30-bf11-4901-9f82-5d2abf98da37", "DetectTime": "2023-10-30T14:10:13.981334+02:00", "EventTime": "2023-10-30T14:10:13.981346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CccBPw1qWJlmTQOsV9"]} -{"Format": "IDEA0", "ID": "30d5d1a7-722b-4b0d-b4fc-c1855086b574", "DetectTime": "2023-10-30T14:10:13.996550+02:00", "EventTime": "2023-10-30T14:10:13.996561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CaCnbt4Uh7o2Bkvyjd"]} -{"Format": "IDEA0", "ID": "928c7b23-89c9-47cd-b24f-16b4cf27b267", "DetectTime": "2023-10-30T14:10:14.011345+02:00", "EventTime": "2023-10-30T14:10:14.011363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CoH40A1cNf8wcO7Yl4"]} -{"Format": "IDEA0", "ID": "795fc460-a8e8-4688-ae86-6732b2c117c5", "DetectTime": "2023-10-30T14:10:14.024068+02:00", "EventTime": "2023-10-30T14:10:14.024079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CNozXSZUR8rtMsKRe"]} -{"Format": "IDEA0", "ID": "e6362992-47c4-4053-86d0-f42f1592636f", "DetectTime": "2023-10-30T14:10:14.039000+02:00", "EventTime": "2023-10-30T14:10:14.039017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CtXSXaum08lfvIlfc"]} -{"Format": "IDEA0", "ID": "cd4829a0-636d-46c8-abb5-71d4eb8bc703", "DetectTime": "2023-10-30T14:10:14.050424+02:00", "EventTime": "2023-10-30T14:10:14.050434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHQRRn19W1zIkJykO5"]} -{"Format": "IDEA0", "ID": "dbbd8bdf-a9d0-4240-83e7-c2afa15c8552", "DetectTime": "2023-10-30T14:10:14.065826+02:00", "EventTime": "2023-10-30T14:10:14.065841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CXQYLx1U77wOPJGDt"]} -{"Format": "IDEA0", "ID": "0c513d2d-9f0c-4dc7-ad82-19f4d09e0806", "DetectTime": "2023-10-30T14:10:14.084437+02:00", "EventTime": "2023-10-30T14:10:14.084453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CQREXB4l4sfH0YFW25"]} -{"Format": "IDEA0", "ID": "0bd051f7-2bdb-4d18-9032-791625fc8a42", "DetectTime": "2023-10-30T14:10:14.109114+02:00", "EventTime": "2023-10-30T14:10:14.109129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CYOKsF36LWpDMMRgxh"]} -{"Format": "IDEA0", "ID": "cf3ac7ab-c0ba-4b80-917d-dc2fb644b3e9", "DetectTime": "2023-10-30T14:10:14.122150+02:00", "EventTime": "2023-10-30T14:10:14.122161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CCl6OArKGY9VqX09l"]} -{"Format": "IDEA0", "ID": "0e401251-c0f1-4a39-b9d6-d6ef1b0c2090", "DetectTime": "2023-10-30T14:10:14.135087+02:00", "EventTime": "2023-10-30T14:10:14.135097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CCJdql2duHPAx74dLe"]} -{"Format": "IDEA0", "ID": "06f06411-cce9-4966-833f-ee6ca7521252", "DetectTime": "2023-10-30T14:10:14.152943+02:00", "EventTime": "2023-10-30T14:10:14.152958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJwk0K1HmZSIicAM01"]} -{"Format": "IDEA0", "ID": "d24c062b-316c-4508-bacc-91c98fec2af9", "DetectTime": "2023-10-30T14:10:14.171092+02:00", "EventTime": "2023-10-30T14:10:14.171107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C7q24j1ghqiFwTckT"]} -{"Format": "IDEA0", "ID": "fc1d842f-3979-42f4-992e-f6a23c0a0dcb", "DetectTime": "2023-10-30T14:10:14.186075+02:00", "EventTime": "2023-10-30T14:10:14.186092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CLrXWenzmtwjd8hna"]} -{"Format": "IDEA0", "ID": "2beba369-9871-4710-ade9-6a85217093bc", "DetectTime": "2023-10-30T14:10:14.202531+02:00", "EventTime": "2023-10-30T14:10:14.202547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C9TB1V1AMVDgcHdfB6"]} -{"Format": "IDEA0", "ID": "8fbbde6c-bd5e-4ff7-ad8e-b6b550a7018f", "DetectTime": "2023-10-30T14:10:14.217780+02:00", "EventTime": "2023-10-30T14:10:14.217790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CV7M9L3NmWTbJ18bA4"]} -{"Format": "IDEA0", "ID": "4fe40540-65f1-4788-a31c-79ea64cc506c", "DetectTime": "2023-10-30T14:10:14.231975+02:00", "EventTime": "2023-10-30T14:10:14.231986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CEvOQ52I6YsM3dyGnb"]} -{"Format": "IDEA0", "ID": "e22ae263-3c46-4114-9bc4-e93ffd7f7fac", "DetectTime": "2023-10-30T14:10:14.248270+02:00", "EventTime": "2023-10-30T14:10:14.248281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cx3E1q4HojP0192bE"]} -{"Format": "IDEA0", "ID": "0dc863d7-bf99-43cd-baf3-a1b5037fec68", "DetectTime": "2023-10-30T14:10:14.261963+02:00", "EventTime": "2023-10-30T14:10:14.261984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Czikxd471HZH7m397d"]} -{"Format": "IDEA0", "ID": "34cf8e20-953e-43f4-ac20-c947e352b144", "DetectTime": "2023-10-30T14:10:14.277811+02:00", "EventTime": "2023-10-30T14:10:14.277829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C8I6Tr2nlyEp0YcNZd"]} -{"Format": "IDEA0", "ID": "6f489939-95d3-43cd-aeca-427cdab8ca99", "DetectTime": "2023-10-30T14:10:14.294768+02:00", "EventTime": "2023-10-30T14:10:14.294796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CyUU0N1FHYxatVSObg"]} -{"Format": "IDEA0", "ID": "e213da48-d564-43c0-9e2b-31383c8e0b34", "DetectTime": "2023-10-30T14:10:14.311389+02:00", "EventTime": "2023-10-30T14:10:14.311405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CpQpnA5tLxisqYVMj"]} -{"Format": "IDEA0", "ID": "62153769-a9c0-4a6f-a2fe-17e6bdda8e07", "DetectTime": "2023-10-30T14:10:14.333869+02:00", "EventTime": "2023-10-30T14:10:14.333886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C06INX0dsCU5QJNP"]} -{"Format": "IDEA0", "ID": "9914cabf-159b-4672-a332-d706925fab93", "DetectTime": "2023-10-30T14:10:14.349867+02:00", "EventTime": "2023-10-30T14:10:14.349881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CIuVag1hBlWjX1n2T9"]} -{"Format": "IDEA0", "ID": "063f0919-8a09-46a1-a830-b710c5846ade", "DetectTime": "2023-10-30T14:10:14.367283+02:00", "EventTime": "2023-10-30T14:10:14.367298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CMYIjo4tFFnWzp6Fn2"]} -{"Format": "IDEA0", "ID": "c82e6630-8b52-42b8-abd0-ebb9bf974ca3", "DetectTime": "2023-10-30T14:10:14.382561+02:00", "EventTime": "2023-10-30T14:10:14.382572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C5zYkRpHPlgVK02D4"]} -{"Format": "IDEA0", "ID": "8f599673-0b9d-463d-862c-91f27a204692", "DetectTime": "2023-10-30T14:10:14.397717+02:00", "EventTime": "2023-10-30T14:10:14.397732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C2EsAjav3uaFkRZff"]} -{"Format": "IDEA0", "ID": "9dc4168a-408d-4835-9f40-e76a693ddd83", "DetectTime": "2023-10-30T14:10:14.411792+02:00", "EventTime": "2023-10-30T14:10:14.411803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C5qIRQ1DHyTFLaTn68"]} -{"Format": "IDEA0", "ID": "576d6e2f-2fc7-42a2-b82e-51958cc7f7a2", "DetectTime": "2023-10-30T14:10:14.427094+02:00", "EventTime": "2023-10-30T14:10:14.427105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CGFbqu3TVLwe8HfCTj"]} -{"Format": "IDEA0", "ID": "d38bfaad-084c-4ba2-8bc6-a2996bab3480", "DetectTime": "2023-10-30T14:10:14.440058+02:00", "EventTime": "2023-10-30T14:10:14.440069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CwlgOH35aN7juntySd"]} -{"Format": "IDEA0", "ID": "86067aa8-a003-4798-8111-17540eaa99ca", "DetectTime": "2023-10-30T14:10:14.455024+02:00", "EventTime": "2023-10-30T14:10:14.455041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C85YqJ2hapfin8FZD3"]} -{"Format": "IDEA0", "ID": "0cc16c97-ef79-4cf4-9ce7-b7814bf93e7e", "DetectTime": "2023-10-30T14:10:14.469073+02:00", "EventTime": "2023-10-30T14:10:14.469085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CBgyfL3dFsq2t7b7of"]} -{"Format": "IDEA0", "ID": "82e0d1d6-1638-4fe7-ad9f-e1ff358b73bf", "DetectTime": "2023-10-30T14:10:14.484403+02:00", "EventTime": "2023-10-30T14:10:14.484418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CxcigZ7t0epfbFmPg"]} -{"Format": "IDEA0", "ID": "57595c6d-b752-4584-979c-94c6abff77a6", "DetectTime": "2023-10-30T14:10:14.500183+02:00", "EventTime": "2023-10-30T14:10:14.500193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CYd2KL3HsjXSYdezl9"]} -{"Format": "IDEA0", "ID": "486ef8a9-ef11-4263-9b05-96824cfdb52d", "DetectTime": "2023-10-30T14:10:14.514257+02:00", "EventTime": "2023-10-30T14:10:14.514268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CThVfzTPsantfjTs9"]} -{"Format": "IDEA0", "ID": "37971a2a-395e-40a8-9f9d-51822a557198", "DetectTime": "2023-10-30T14:10:14.532158+02:00", "EventTime": "2023-10-30T14:10:14.532174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CD5Vgo8xeaMIa7YBk"]} -{"Format": "IDEA0", "ID": "1d2cbf52-bce2-4b0e-8a0f-bb9b65dae7f2", "DetectTime": "2023-10-30T14:10:14.550953+02:00", "EventTime": "2023-10-30T14:10:14.550966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cv2T962FD8iEUPzcUl"]} -{"Format": "IDEA0", "ID": "f919a2a2-9b06-48a2-ba64-56cc3eef1a1e", "DetectTime": "2023-10-30T14:10:14.565223+02:00", "EventTime": "2023-10-30T14:10:14.565235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CqrZdU3CniD13fh4Gl"]} -{"Format": "IDEA0", "ID": "4f19d591-d159-4aa1-82d9-0ed5573d3111", "DetectTime": "2023-10-30T14:10:14.577231+02:00", "EventTime": "2023-10-30T14:10:14.577243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CgRts74Q6VDqUo5SLe"]} -{"Format": "IDEA0", "ID": "95c09ea3-b791-4015-abe9-2a1dbb29aa4b", "DetectTime": "2023-10-30T14:10:14.593970+02:00", "EventTime": "2023-10-30T14:10:14.593986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CyaIAo3NGF73KaIlg"]} -{"Format": "IDEA0", "ID": "33b685eb-d6ef-405b-8827-95315b86ec2f", "DetectTime": "2023-10-30T14:10:14.611824+02:00", "EventTime": "2023-10-30T14:10:14.611840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CSxveP3GPNFaIdfk7g"]} -{"Format": "IDEA0", "ID": "418955a6-beb7-4cde-b287-1d43527f50bb", "DetectTime": "2023-10-30T14:10:14.629848+02:00", "EventTime": "2023-10-30T14:10:14.629863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CbHhTv2wyXADrIUMLf"]} -{"Format": "IDEA0", "ID": "d66baf25-2510-44fb-81d0-6522d13c8add", "DetectTime": "2023-10-30T14:10:14.645423+02:00", "EventTime": "2023-10-30T14:10:14.645534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C5NIqG3AYGjam7pEN9"]} -{"Format": "IDEA0", "ID": "cd7da031-e14f-4fe7-b33a-4318c31a1dca", "DetectTime": "2023-10-30T14:10:14.659578+02:00", "EventTime": "2023-10-30T14:10:14.659595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CoPY8d2CAareDuOAFi"]} -{"Format": "IDEA0", "ID": "e6828b2d-3ca6-40e4-9955-382021577e37", "DetectTime": "2023-10-30T14:10:14.676562+02:00", "EventTime": "2023-10-30T14:10:14.676573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cr6htq26pDTa6ChdH2"]} -{"Format": "IDEA0", "ID": "7b96800d-e697-4655-bc99-a206d2887c12", "DetectTime": "2023-10-30T14:10:14.688550+02:00", "EventTime": "2023-10-30T14:10:14.688561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C3eeUIxlpueFHI5Fc"]} -{"Format": "IDEA0", "ID": "15256b29-d10f-47b5-b095-897445ec740b", "DetectTime": "2023-10-30T14:10:14.702211+02:00", "EventTime": "2023-10-30T14:10:14.702227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["Cakmoy4kzjdwd8qWA7"]} -{"Format": "IDEA0", "ID": "59fdce7e-0a22-405d-9b72-279cd74bde93", "DetectTime": "2023-10-30T14:10:14.715386+02:00", "EventTime": "2023-10-30T14:10:14.715397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C004LG26EMd0Bivipg"]} -{"Format": "IDEA0", "ID": "87cc2f9a-7e93-4364-88f8-85656861ad1c", "DetectTime": "2023-10-30T14:10:14.734020+02:00", "EventTime": "2023-10-30T14:10:14.734034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CZsOq2roequnDcrUb"]} -{"Format": "IDEA0", "ID": "1641c32a-81f2-4347-a936-786604f3aa4e", "DetectTime": "2023-10-30T14:10:14.748746+02:00", "EventTime": "2023-10-30T14:10:14.748759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CjNvYy1kaM9MhOWc71"]} -{"Format": "IDEA0", "ID": "d0266fc6-e15b-456c-b1a4-d36f35053a86", "DetectTime": "2023-10-30T14:10:14.762727+02:00", "EventTime": "2023-10-30T14:10:14.762738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CigEfXFfl5AttWfK"]} -{"Format": "IDEA0", "ID": "cc7fa6a0-fbbe-4605-8483-baea0b2b9465", "DetectTime": "2023-10-30T14:10:14.776453+02:00", "EventTime": "2023-10-30T14:10:14.776468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C5Cz5w1nRF4YZ7Mf84"]} -{"Format": "IDEA0", "ID": "a3c703e6-6550-4438-a83e-9a10d7334569", "DetectTime": "2023-10-30T14:10:14.791270+02:00", "EventTime": "2023-10-30T14:10:14.791280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cb8Vb7ze4UumWSkh6"]} -{"Format": "IDEA0", "ID": "a8d8fb57-b63e-431c-8507-cb27e5223396", "DetectTime": "2023-10-30T14:10:14.804692+02:00", "EventTime": "2023-10-30T14:10:14.804708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4gxmr35K69Fp7dcba"]} -{"Format": "IDEA0", "ID": "15402f51-fa94-4ca1-8f86-10c1585d43c2", "DetectTime": "2023-10-30T14:10:14.821368+02:00", "EventTime": "2023-10-30T14:10:14.821388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CG1e8GcQ9H37raEjd"]} -{"Format": "IDEA0", "ID": "41a9ac00-7781-4b3d-8927-14f0e5b4a69a", "DetectTime": "2023-10-30T14:10:14.839090+02:00", "EventTime": "2023-10-30T14:10:14.839102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C1QiVQ3WzhGfKFQ5Sg"]} -{"Format": "IDEA0", "ID": "b188bd9b-845d-4e1e-85d3-453e82de3929", "DetectTime": "2023-10-30T14:10:14.855035+02:00", "EventTime": "2023-10-30T14:10:14.855055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CHb8Ab1v1wCmAmpBPa"]} -{"Format": "IDEA0", "ID": "c4d7f146-7f98-46b3-a79b-48fc8ae2b96f", "DetectTime": "2023-10-30T14:10:14.867847+02:00", "EventTime": "2023-10-30T14:10:14.867859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["COxGiqt6qLwwGBZ3"]} -{"Format": "IDEA0", "ID": "1bb6fc19-9835-4312-a7e2-381545bf5fc4", "DetectTime": "2023-10-30T14:10:14.881902+02:00", "EventTime": "2023-10-30T14:10:14.881914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CLriLk1eoXlARl4cXf"]} -{"Format": "IDEA0", "ID": "7d4badde-1bbe-4dce-92d3-e7b9ad248e8e", "DetectTime": "2023-10-30T14:10:14.898375+02:00", "EventTime": "2023-10-30T14:10:14.898386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CrqPgK1cDigEpZgEj"]} -{"Format": "IDEA0", "ID": "874766bc-49ee-4041-9b72-038c14e97948", "DetectTime": "2023-10-30T14:10:14.911294+02:00", "EventTime": "2023-10-30T14:10:14.911306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CCOtAp2oEM50ZXardc"]} -{"Format": "IDEA0", "ID": "4cf875d4-155f-49fd-8007-23e3f4a4b9b7", "DetectTime": "2023-10-30T14:10:14.925338+02:00", "EventTime": "2023-10-30T14:10:14.925350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CYpjoS2AAhEmnhPJOk"]} -{"Format": "IDEA0", "ID": "31b26a27-7b7c-4458-9363-256e70d1757f", "DetectTime": "2023-10-30T14:10:14.939909+02:00", "EventTime": "2023-10-30T14:10:14.939921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["ClDOUX2RAhy4rwMVag"]} -{"Format": "IDEA0", "ID": "a31ef310-8996-475d-8b2a-e58fd9770e0c", "DetectTime": "2023-10-30T14:10:14.954059+02:00", "EventTime": "2023-10-30T14:10:14.954074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cwhpd63ddZRACYaXsc"]} -{"Format": "IDEA0", "ID": "e044f29d-83f7-4fd9-95b1-9be6c2fe322a", "DetectTime": "2023-10-30T14:10:14.968392+02:00", "EventTime": "2023-10-30T14:10:14.968405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CLPUJB3CQCEQw509L2"]} -{"Format": "IDEA0", "ID": "f8cce84e-a78e-442c-a301-339129a6e291", "DetectTime": "2023-10-30T14:10:14.980825+02:00", "EventTime": "2023-10-30T14:10:14.980839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CS890Y2bKJTaRwKfl"]} -{"Format": "IDEA0", "ID": "d3d4bed4-35a1-49c3-bec6-82411e938043", "DetectTime": "2023-10-30T14:10:14.995272+02:00", "EventTime": "2023-10-30T14:10:14.995284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CgjYR44wSTaMd0nEpc"]} -{"Format": "IDEA0", "ID": "29ce2dda-d4ad-43a2-b7e2-4d84c0bacab3", "DetectTime": "2023-10-30T14:10:15.013098+02:00", "EventTime": "2023-10-30T14:10:15.013115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C2UDqf4gobG5hX6zol"]} -{"Format": "IDEA0", "ID": "67678d6c-ed1c-4457-aa21-c2cfcc5dba50", "DetectTime": "2023-10-30T14:10:15.028340+02:00", "EventTime": "2023-10-30T14:10:15.028351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CXJ1Yz1PwarhSRJB06"]} -{"Format": "IDEA0", "ID": "319e8e5b-6051-43d5-aaf8-e07025261a26", "DetectTime": "2023-10-30T14:10:15.040727+02:00", "EventTime": "2023-10-30T14:10:15.040739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CNfrFG259OfmSARCs8"]} -{"Format": "IDEA0", "ID": "615ecc48-259d-4c7c-9ae0-f42e13bf4adc", "DetectTime": "2023-10-30T14:10:15.055515+02:00", "EventTime": "2023-10-30T14:10:15.055530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CR4dU41fmRpO8t4UNj"]} -{"Format": "IDEA0", "ID": "4232d5ec-bc11-4d63-a5c4-0d4c62825bde", "DetectTime": "2023-10-30T14:10:15.068117+02:00", "EventTime": "2023-10-30T14:10:15.068130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C0vsK61USzi0jimAg5"]} -{"Format": "IDEA0", "ID": "97ff9cda-2f39-4edd-86da-9d7ddc7eaf83", "DetectTime": "2023-10-30T14:10:15.082144+02:00", "EventTime": "2023-10-30T14:10:15.082154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CkrxF32KLhK4BmWPu2"]} -{"Format": "IDEA0", "ID": "f15cae23-2ed1-4016-b3bb-5fae8ab74b74", "DetectTime": "2023-10-30T14:10:15.105859+02:00", "EventTime": "2023-10-30T14:10:15.105877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CPREkO2clwJdcmSGa5"]} -{"Format": "IDEA0", "ID": "fb881ffb-3ca5-46f2-bc2b-5018b00e64cd", "DetectTime": "2023-10-30T14:10:15.120591+02:00", "EventTime": "2023-10-30T14:10:15.120602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C2wvfw3IVfrrKyCtw6"]} -{"Format": "IDEA0", "ID": "2ae95841-4316-4c5a-82a6-6de2e8369417", "DetectTime": "2023-10-30T14:10:15.136212+02:00", "EventTime": "2023-10-30T14:10:15.136232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CItAib22c311fCkYta"]} -{"Format": "IDEA0", "ID": "11f017b7-f292-4ae0-8442-ec44faaf3ab9", "DetectTime": "2023-10-30T14:10:15.149463+02:00", "EventTime": "2023-10-30T14:10:15.149473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CU2p3V1hhi2DrQjo0f"]} -{"Format": "IDEA0", "ID": "b9489d81-d325-4750-9695-5a5b82b5a680", "DetectTime": "2023-10-30T14:10:15.166728+02:00", "EventTime": "2023-10-30T14:10:15.166744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CW85154ay0i4xeIAyk"]} -{"Format": "IDEA0", "ID": "49e11b57-9516-45a3-87ef-9a26851ecf7f", "DetectTime": "2023-10-30T14:10:15.183962+02:00", "EventTime": "2023-10-30T14:10:15.183974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CczcmCIbaArhJQNZb"]} -{"Format": "IDEA0", "ID": "82b07f8f-172f-4bb3-9910-9e5e96ea57d1", "DetectTime": "2023-10-30T14:10:15.198054+02:00", "EventTime": "2023-10-30T14:10:15.198065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C3HjEk26r0shQ2r2Zb"]} -{"Format": "IDEA0", "ID": "257e0bc4-ecbc-4508-bdf2-3d45bbf12c3c", "DetectTime": "2023-10-30T14:10:15.213251+02:00", "EventTime": "2023-10-30T14:10:15.213261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CAjV3Y2qYDgfAxoXF9"]} -{"Format": "IDEA0", "ID": "1e52f7cd-095b-48ee-9923-ad804b9919f0", "DetectTime": "2023-10-30T14:10:15.230006+02:00", "EventTime": "2023-10-30T14:10:15.230017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CyMswE1I1U52K0rtZ2"]} -{"Format": "IDEA0", "ID": "0cb85d7a-0fdf-47c7-983f-d17d2824bfb8", "DetectTime": "2023-10-30T14:10:15.244964+02:00", "EventTime": "2023-10-30T14:10:15.244974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C2bA9mLRSlvW2lLP7"]} -{"Format": "IDEA0", "ID": "3a93847e-f4a9-43c7-96e0-7e4724617b19", "DetectTime": "2023-10-30T14:10:15.258976+02:00", "EventTime": "2023-10-30T14:10:15.258992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cc83rs2TNUieKIajZ8"]} -{"Format": "IDEA0", "ID": "87529d87-8acc-4f00-9077-c31e00e31295", "DetectTime": "2023-10-30T14:10:15.272613+02:00", "EventTime": "2023-10-30T14:10:15.272630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C39gx03HfGmgAVAZwh"]} -{"Format": "IDEA0", "ID": "e0f25332-2889-455c-bb50-29172ef8a9e6", "DetectTime": "2023-10-30T14:10:15.290264+02:00", "EventTime": "2023-10-30T14:10:15.290275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CfSZL32SJQ1mYyrdbg"]} -{"Format": "IDEA0", "ID": "a008759e-793a-4b32-870b-996272223d20", "DetectTime": "2023-10-30T14:10:15.303327+02:00", "EventTime": "2023-10-30T14:10:15.303351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Czn2iV3VpjdmqHDafd"]} -{"Format": "IDEA0", "ID": "714b82cb-c1dc-46aa-80ab-a5251ba75432", "DetectTime": "2023-10-30T14:10:15.316704+02:00", "EventTime": "2023-10-30T14:10:15.316714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CgQOHT2tgxvFI70dJ8"]} -{"Format": "IDEA0", "ID": "1746cd7a-a64f-4a2a-82a0-c3a6f2a87981", "DetectTime": "2023-10-30T14:10:15.331487+02:00", "EventTime": "2023-10-30T14:10:15.331502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CeloCCHEmzdXaGcIk"]} -{"Format": "IDEA0", "ID": "eccbfca9-2f52-475d-92ba-a8f01a5fed81", "DetectTime": "2023-10-30T14:10:15.349138+02:00", "EventTime": "2023-10-30T14:10:15.349153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CY4QIj2TSHHec3RgP1"]} -{"Format": "IDEA0", "ID": "31880d4b-f30d-41e5-8e7c-ffdd6ed8d0d9", "DetectTime": "2023-10-30T14:10:15.366378+02:00", "EventTime": "2023-10-30T14:10:15.366394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CekpQEV6D8GmCiAla"]} -{"Format": "IDEA0", "ID": "64a2659d-073b-47c5-b594-4fd337628aed", "DetectTime": "2023-10-30T14:10:15.381600+02:00", "EventTime": "2023-10-30T14:10:15.381611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CMQtDb1Saj6TZ9MgU2"]} -{"Format": "IDEA0", "ID": "dd0561b8-1bf9-45c3-95a7-4b3eac134d00", "DetectTime": "2023-10-30T14:10:15.395021+02:00", "EventTime": "2023-10-30T14:10:15.395036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C2WL3D4eO6ZE2xYjfb"]} -{"Format": "IDEA0", "ID": "caaedb12-3709-4be1-8c12-ef737524ee37", "DetectTime": "2023-10-30T14:10:15.409383+02:00", "EventTime": "2023-10-30T14:10:15.409399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CqOtIa4eH6oLcApHN8"]} -{"Format": "IDEA0", "ID": "9045e060-3c36-4ca7-9dc4-9960a4d67cb8", "DetectTime": "2023-10-30T14:10:15.423300+02:00", "EventTime": "2023-10-30T14:10:15.423310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSJCEyVKig7wm5oO5"]} -{"Format": "IDEA0", "ID": "e0c2b916-5af7-4056-82d3-b72755e90e5a", "DetectTime": "2023-10-30T14:10:15.435229+02:00", "EventTime": "2023-10-30T14:10:15.435239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C2Bjrc32Cnuu4Cu1li"]} -{"Format": "IDEA0", "ID": "05bd1672-cda7-4cc6-a5a3-6952627c2b9d", "DetectTime": "2023-10-30T14:10:15.450043+02:00", "EventTime": "2023-10-30T14:10:15.450055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Ci8NVc4F3he1lDDiJ5"]} -{"Format": "IDEA0", "ID": "8bcfabac-2b3a-4bc9-9438-848bbe6c3612", "DetectTime": "2023-10-30T14:10:15.467543+02:00", "EventTime": "2023-10-30T14:10:15.467558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CuqSTC4jJIVTQTQvXf"]} -{"Format": "IDEA0", "ID": "a52a5e5f-150a-4d31-b440-43063912c702", "DetectTime": "2023-10-30T14:10:15.485912+02:00", "EventTime": "2023-10-30T14:10:15.485928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CVnV9j2ZYbQMKhauz3"]} -{"Format": "IDEA0", "ID": "cd3fdb2b-ab4e-4b27-8748-35be0c6a5a62", "DetectTime": "2023-10-30T14:10:15.503323+02:00", "EventTime": "2023-10-30T14:10:15.503338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CV0cg64BFzbvkfZ3ha"]} -{"Format": "IDEA0", "ID": "bfbbb183-e3e3-4a1b-afbf-7d6b6adea1a0", "DetectTime": "2023-10-30T14:10:15.520091+02:00", "EventTime": "2023-10-30T14:10:15.520103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqVibB2zBNN2mg0Sxl"]} -{"Format": "IDEA0", "ID": "b86729b8-53af-4e58-ae11-f412ceffbf05", "DetectTime": "2023-10-30T14:10:15.535058+02:00", "EventTime": "2023-10-30T14:10:15.535069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CACMl61HS7EyXAz1Cl"]} -{"Format": "IDEA0", "ID": "2c0e585e-7572-4312-a994-a905defec3f2", "DetectTime": "2023-10-30T14:10:15.553088+02:00", "EventTime": "2023-10-30T14:10:15.553103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Crp0xZ1I02o3MG77pi"]} -{"Format": "IDEA0", "ID": "4c6201ff-798e-4c82-b010-b90770b44c45", "DetectTime": "2023-10-30T14:10:15.577541+02:00", "EventTime": "2023-10-30T14:10:15.577560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CuuZtf4V8lgptFLSh2"]} -{"Format": "IDEA0", "ID": "5b4da1ac-a2af-4c4a-9458-050eb8572001", "DetectTime": "2023-10-30T14:10:15.591471+02:00", "EventTime": "2023-10-30T14:10:15.591482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CrgRIK1HVkAycPoQk1"]} -{"Format": "IDEA0", "ID": "b2ee0eda-3fd9-47fe-b1a3-7e0661b387d2", "DetectTime": "2023-10-30T14:10:15.608241+02:00", "EventTime": "2023-10-30T14:10:15.608257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CpBD7xWJvVJj1Kfm7"]} -{"Format": "IDEA0", "ID": "77bf1df5-07b8-4351-a13d-9fce29311003", "DetectTime": "2023-10-30T14:10:15.623413+02:00", "EventTime": "2023-10-30T14:10:15.623429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgJjQl3HYMmSWHyQ12"]} -{"Format": "IDEA0", "ID": "45762b2f-3189-4fb8-84dd-f41dbad9d6e7", "DetectTime": "2023-10-30T14:10:15.640172+02:00", "EventTime": "2023-10-30T14:10:15.640186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CqZz1m4Ju5BgLpo4w2"]} -{"Format": "IDEA0", "ID": "ee6c11ed-69f6-4d13-85ff-21fc54b16398", "DetectTime": "2023-10-30T14:10:15.654586+02:00", "EventTime": "2023-10-30T14:10:15.654597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CmhHSs1lqwGpDbSKfc"]} -{"Format": "IDEA0", "ID": "ab35cc46-60d5-4886-af72-6c978bb847c4", "DetectTime": "2023-10-30T14:10:15.672128+02:00", "EventTime": "2023-10-30T14:10:15.672144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C2uPmL1AfWePMcE6pk"]} -{"Format": "IDEA0", "ID": "01eef985-fd9e-4fe2-b625-7fe0fea55f99", "DetectTime": "2023-10-30T14:10:15.689431+02:00", "EventTime": "2023-10-30T14:10:15.689448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CDuMT11gYPcQUBod3b"]} -{"Format": "IDEA0", "ID": "b1ad62f8-6621-40a2-a495-5cdb8b8ff029", "DetectTime": "2023-10-30T14:10:15.702307+02:00", "EventTime": "2023-10-30T14:10:15.702318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cc6CDJ2GDETZ90CZqk"]} -{"Format": "IDEA0", "ID": "eb5eee01-1238-436e-9b33-77c80fd4bed6", "DetectTime": "2023-10-30T14:10:15.719471+02:00", "EventTime": "2023-10-30T14:10:15.719482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CSxzxB12X0oCAOOtOc"]} -{"Format": "IDEA0", "ID": "dc0fba49-5e94-4d17-81ad-1258c3987f65", "DetectTime": "2023-10-30T14:10:15.732807+02:00", "EventTime": "2023-10-30T14:10:15.732817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CELT4XAbIFhRwTif7"]} -{"Format": "IDEA0", "ID": "3223b8fd-af3e-4750-ac72-4215d7744c0a", "DetectTime": "2023-10-30T14:10:15.745194+02:00", "EventTime": "2023-10-30T14:10:15.745207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CARbRg2wXKhIC4Sxw3"]} -{"Format": "IDEA0", "ID": "36bc3b09-a29d-43ed-9035-032cb6f9deb7", "DetectTime": "2023-10-30T14:10:15.762259+02:00", "EventTime": "2023-10-30T14:10:15.762272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CjgKch13AemdMUJAZ1"]} -{"Format": "IDEA0", "ID": "a3a2390e-8929-4423-b9cb-020df0cbfaa4", "DetectTime": "2023-10-30T14:10:15.779260+02:00", "EventTime": "2023-10-30T14:10:15.779276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C3HYua2GoavHv1Fd14"]} -{"Format": "IDEA0", "ID": "df0ab7f0-cc4c-442a-b168-8d3f06519db9", "DetectTime": "2023-10-30T14:10:15.796009+02:00", "EventTime": "2023-10-30T14:10:15.796024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CfMUfS2VcAcw4WkRl6"]} -{"Format": "IDEA0", "ID": "6ed97a3e-a7e7-4dc7-a6d9-845927a1cc59", "DetectTime": "2023-10-30T14:10:15.811175+02:00", "EventTime": "2023-10-30T14:10:15.811190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CYAFlB3yWImOiIJZFd"]} -{"Format": "IDEA0", "ID": "45860e9b-e317-41b6-baad-aab6befd2d18", "DetectTime": "2023-10-30T14:10:15.828825+02:00", "EventTime": "2023-10-30T14:10:15.828840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CWrRX6UbHZzBpmB5b"]} -{"Format": "IDEA0", "ID": "d7aa4caa-76fe-4035-b7c4-e5fa2e98f38c", "DetectTime": "2023-10-30T14:10:15.845616+02:00", "EventTime": "2023-10-30T14:10:15.845628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CAlQ3VlFwKy0aQfze"]} -{"Format": "IDEA0", "ID": "e95b7840-e165-402e-ac17-b619c8e2aab2", "DetectTime": "2023-10-30T14:10:15.861146+02:00", "EventTime": "2023-10-30T14:10:15.861157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CSdHYGBGuXjWbnWfi"]} -{"Format": "IDEA0", "ID": "2f9ccb40-db0b-4273-863d-926c93e1e5b6", "DetectTime": "2023-10-30T14:10:15.876398+02:00", "EventTime": "2023-10-30T14:10:15.876409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CgoAdJ2PtS3rRj38M9"]} -{"Format": "IDEA0", "ID": "04dbfbac-7a58-48f4-8958-add7c9c87016", "DetectTime": "2023-10-30T14:10:15.892393+02:00", "EventTime": "2023-10-30T14:10:15.892409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cp3WQUhcvKSafJXpj"]} -{"Format": "IDEA0", "ID": "ec228ac2-54ae-4860-9716-281434d00d64", "DetectTime": "2023-10-30T14:10:15.907635+02:00", "EventTime": "2023-10-30T14:10:15.907651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CQtxYN25P9w7aYSIll"]} -{"Format": "IDEA0", "ID": "85d2e0bd-b320-4117-a017-bd3df00665be", "DetectTime": "2023-10-30T14:10:15.920633+02:00", "EventTime": "2023-10-30T14:10:15.920651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CRtgnpL93jojM84z7"]} -{"Format": "IDEA0", "ID": "595c7a98-57be-4017-93ee-597fddfa0b2b", "DetectTime": "2023-10-30T14:10:15.938031+02:00", "EventTime": "2023-10-30T14:10:15.938048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CVnl0u1YAN2hkIOwGe"]} -{"Format": "IDEA0", "ID": "a0f1e5e6-30bb-45c6-807e-aa59034c3301", "DetectTime": "2023-10-30T14:10:15.950012+02:00", "EventTime": "2023-10-30T14:10:15.950022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ct8sK52IEciKV5yTAc"]} -{"Format": "IDEA0", "ID": "20783509-bd15-4f0d-9c44-73f504e8b437", "DetectTime": "2023-10-30T14:10:15.968134+02:00", "EventTime": "2023-10-30T14:10:15.968150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CRxvym2Q9kNYtiPmE6"]} -{"Format": "IDEA0", "ID": "12b2e0ce-7635-43bd-809f-a2e5bbe6c5b4", "DetectTime": "2023-10-30T14:10:15.986134+02:00", "EventTime": "2023-10-30T14:10:15.986149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cickmj4BP2AzC7fMyi"]} -{"Format": "Json", "ID": "12b2e0ce-7635-43bd-809f-a2e5bbe6c5b4", "DetectTime": "2023-10-30T14:10:15.986134+02:00", "EventTime": "2023-10-30T14:10:15.986149+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T02:46:41.833693+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2023/10/30 14:10:16.049724)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8f3f24f4-08e5-4b32-a742-8215d4c430c6", "DetectTime": "2023-10-30T14:10:16.055031+02:00", "EventTime": "2023-10-30T14:10:16.055049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C6yoaL1tnP5ZQ5pERb"]} -{"Format": "IDEA0", "ID": "4e5f15d6-5c81-421c-86d4-27ad268693ed", "DetectTime": "2023-10-30T14:10:16.070972+02:00", "EventTime": "2023-10-30T14:10:16.070985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C9n6kkeogDnygMNPh"]} -{"Format": "IDEA0", "ID": "dd0f7c8c-5712-4589-a77f-466dee5ffbd3", "DetectTime": "2023-10-30T14:10:16.084943+02:00", "EventTime": "2023-10-30T14:10:16.084954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C1ZzWJ3gnsL9bfM7x5"]} -{"Format": "IDEA0", "ID": "1fa19f30-3ac0-4588-8f0f-0955a3a3bb33", "DetectTime": "2023-10-30T14:10:16.099727+02:00", "EventTime": "2023-10-30T14:10:16.099739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["Cj2rO3Yvh7OyUmIG3"]} -{"Format": "IDEA0", "ID": "bc023adc-0c3c-4727-a83b-72abec84b5d3", "DetectTime": "2023-10-30T14:10:16.116248+02:00", "EventTime": "2023-10-30T14:10:16.116265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CvfHet1xMDLeKxqiVk"]} -{"Format": "IDEA0", "ID": "3d05604d-3926-4124-ab39-98587782ac46", "DetectTime": "2023-10-30T14:10:16.134005+02:00", "EventTime": "2023-10-30T14:10:16.134022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CJKRBo1N8P3dPRYns5"]} -{"Format": "IDEA0", "ID": "7178d326-be41-480a-8828-1bdb5f17f39d", "DetectTime": "2023-10-30T14:10:16.148870+02:00", "EventTime": "2023-10-30T14:10:16.148881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C5Ce9t1k1nkaNh4sv2"]} -{"Format": "IDEA0", "ID": "28ae81c2-833f-41c6-b7e6-5f0bc47c4364", "DetectTime": "2023-10-30T14:10:16.163696+02:00", "EventTime": "2023-10-30T14:10:16.163707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQFKWB1khFGAqhsbwa"]} -{"Format": "IDEA0", "ID": "0a28dad3-b516-4ddc-982d-7cccb01d0d10", "DetectTime": "2023-10-30T14:10:16.177266+02:00", "EventTime": "2023-10-30T14:10:16.177276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CsRiOs2TuJzKqKMXU2"]} -{"Format": "IDEA0", "ID": "78814548-887b-48e2-88f7-bf20051d4bcb", "DetectTime": "2023-10-30T14:10:16.191308+02:00", "EventTime": "2023-10-30T14:10:16.191319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Csww4j1XFswIiubc7j"]} -{"Format": "IDEA0", "ID": "45dd2c6a-3497-4f55-b88c-d9dfc5aa0eaa", "DetectTime": "2023-10-30T14:10:16.205403+02:00", "EventTime": "2023-10-30T14:10:16.205413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CFUEHh3zBvTI5Y6A96"]} -{"Format": "IDEA0", "ID": "317a168a-341b-4a90-a687-d8be014e0bb0", "DetectTime": "2023-10-30T14:10:16.224784+02:00", "EventTime": "2023-10-30T14:10:16.224796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cp5b4a2ujspk76jfy8"]} -{"Format": "IDEA0", "ID": "93ce1565-a8ed-454c-b99c-97d8dca5de77", "DetectTime": "2023-10-30T14:10:16.245915+02:00", "EventTime": "2023-10-30T14:10:16.245930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cz6CWvN4CWCRpi8Bi"]} -{"Format": "IDEA0", "ID": "7d62b9ba-bb04-4846-9b6a-51a970c5b94c", "DetectTime": "2023-10-30T14:10:16.263705+02:00", "EventTime": "2023-10-30T14:10:16.263716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CHI1oW1vl8ZylEslU6"]} -{"Format": "IDEA0", "ID": "cf28c87b-0b91-4401-a19c-27d64bf914ba", "DetectTime": "2023-10-30T14:10:16.279222+02:00", "EventTime": "2023-10-30T14:10:16.279238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CqlQCs3t9pc0c4pY58"]} -{"Format": "IDEA0", "ID": "6b121fb1-9f79-4073-84d7-edd4cd8906f2", "DetectTime": "2023-10-30T14:10:16.295415+02:00", "EventTime": "2023-10-30T14:10:16.295425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRBrKd4HvCGAkpVdye"]} -{"Format": "IDEA0", "ID": "9347297b-22d3-446a-9c32-d62bdd01553c", "DetectTime": "2023-10-30T14:10:16.309913+02:00", "EventTime": "2023-10-30T14:10:16.309924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cpqjmq4sn0ETqlASId"]} -{"Format": "IDEA0", "ID": "5df7e3d9-a400-4a56-8a59-4d060267f73d", "DetectTime": "2023-10-30T14:10:16.324437+02:00", "EventTime": "2023-10-30T14:10:16.324452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CClcxeszI1sVgzRu9"]} -{"Format": "IDEA0", "ID": "4d78e144-f15d-4424-8fe1-98f093d61ff0", "DetectTime": "2023-10-30T14:10:16.338016+02:00", "EventTime": "2023-10-30T14:10:16.338029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CD3OT22YVUOLq8C6m4"]} -{"Format": "IDEA0", "ID": "7fb0c067-e592-4b40-b085-50a4a39200b8", "DetectTime": "2023-10-30T14:10:16.353495+02:00", "EventTime": "2023-10-30T14:10:16.353506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cnrcxo2Pb33yyus67f"]} -{"Format": "IDEA0", "ID": "cfa90f75-792d-42a3-b14b-edfe5422c3e3", "DetectTime": "2023-10-30T14:10:16.370323+02:00", "EventTime": "2023-10-30T14:10:16.370342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CSKngVY3odcKvjik3"]} -{"Format": "IDEA0", "ID": "d3cef397-c29e-4662-97e5-acb2b1fa7daf", "DetectTime": "2023-10-30T14:10:16.383444+02:00", "EventTime": "2023-10-30T14:10:16.383454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["COQiwx3ju8NEglnpTj"]} -{"Format": "IDEA0", "ID": "08e8966c-3f48-41f6-b577-6445e32494f2", "DetectTime": "2023-10-30T14:10:16.399090+02:00", "EventTime": "2023-10-30T14:10:16.399114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CWJjZW3pj4HsMyQ7eh"]} -{"Format": "IDEA0", "ID": "631afa34-6560-4923-baef-b7817495cd53", "DetectTime": "2023-10-30T14:10:16.415750+02:00", "EventTime": "2023-10-30T14:10:16.415762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Canovd2KegTFaQ9Zp1"]} -{"Format": "IDEA0", "ID": "10062106-ce72-453c-9aa6-ef8f19ca386a", "DetectTime": "2023-10-30T14:10:16.434917+02:00", "EventTime": "2023-10-30T14:10:16.434934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CDOo1d1t7Wnf4ieAU7"]} -{"Format": "IDEA0", "ID": "71516ecf-11d0-4a95-be2c-456e013d875d", "DetectTime": "2023-10-30T14:10:16.452901+02:00", "EventTime": "2023-10-30T14:10:16.452914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CrNE3X1vuTyNAZzaIg"]} -{"Format": "IDEA0", "ID": "459594de-fff1-47be-b0d2-d7adc5f1c1b5", "DetectTime": "2023-10-30T14:10:16.466579+02:00", "EventTime": "2023-10-30T14:10:16.466593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cvr0vxqo7ccdeAcT1"]} -{"Format": "IDEA0", "ID": "e88de43e-7534-4ade-ab75-9f8d20a0f7ea", "DetectTime": "2023-10-30T14:10:16.483823+02:00", "EventTime": "2023-10-30T14:10:16.483839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CU6Kn528lvUKz88iG3"]} -{"Format": "IDEA0", "ID": "149d26db-9b2c-4ab3-8f58-b79a8f9464ae", "DetectTime": "2023-10-30T14:10:16.498207+02:00", "EventTime": "2023-10-30T14:10:16.498218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ctn5yLfRPd4qLVRU1"]} -{"Format": "IDEA0", "ID": "c29d7cdd-89ea-4a27-8f7e-d4063fbcbf08", "DetectTime": "2023-10-30T14:10:16.513699+02:00", "EventTime": "2023-10-30T14:10:16.513710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["Cjk9So25GLzc8c2B29"]} -{"Format": "IDEA0", "ID": "72fdc9bc-44d1-4588-9965-23d2bb118b6a", "DetectTime": "2023-10-30T14:10:16.532101+02:00", "EventTime": "2023-10-30T14:10:16.532124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CDhn162gTjjl80nlKc"]} -{"Format": "IDEA0", "ID": "31c55871-6bd8-494f-979e-a8d7476aeabf", "DetectTime": "2023-10-30T14:10:16.546164+02:00", "EventTime": "2023-10-30T14:10:16.546178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CBsf852LKCO3lTRkU2"]} -{"Format": "IDEA0", "ID": "a1be728a-b8df-4b7b-b9e4-210d81e30a7b", "DetectTime": "2023-10-30T14:10:16.559342+02:00", "EventTime": "2023-10-30T14:10:16.559354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CQijJj15QW1k52tLsk"]} -{"Format": "IDEA0", "ID": "e4626d5b-c90d-4cb0-9c82-8c1e02f83a5b", "DetectTime": "2023-10-30T14:10:16.574743+02:00", "EventTime": "2023-10-30T14:10:16.574763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CH34ASzy7LyFHWDNb"]} -{"Format": "IDEA0", "ID": "5b5bee15-fec4-4bf6-b900-d2c6f39ea5bd", "DetectTime": "2023-10-30T14:10:16.594701+02:00", "EventTime": "2023-10-30T14:10:16.594716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CVmESu2GkQvWKGrhZ9"]} -{"Format": "IDEA0", "ID": "4d145123-670b-4945-815e-96e4c61ef24b", "DetectTime": "2023-10-30T14:10:16.608887+02:00", "EventTime": "2023-10-30T14:10:16.608898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKLHb4c60GV2Pvcqa"]} -{"Format": "IDEA0", "ID": "4ebbf360-0c82-4218-ab10-82b1f44ffb18", "DetectTime": "2023-10-30T14:10:16.623380+02:00", "EventTime": "2023-10-30T14:10:16.623391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuNCHbHGl5wSjYbc5"]} -{"Format": "IDEA0", "ID": "9e7eb446-4036-4bdd-9ed4-c64ac5415658", "DetectTime": "2023-10-30T14:10:16.638743+02:00", "EventTime": "2023-10-30T14:10:16.638753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["ClyI3UXdeDhvuAN0i"]} -{"Format": "IDEA0", "ID": "c0d66af5-5cd9-4576-8b90-4815f326880a", "DetectTime": "2023-10-30T14:10:16.651139+02:00", "EventTime": "2023-10-30T14:10:16.651150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CzzEho1OE9ecgZlZDf"]} -{"Format": "IDEA0", "ID": "d66a50e8-9ea0-4b10-a628-9c549777d9e0", "DetectTime": "2023-10-30T14:10:16.665545+02:00", "EventTime": "2023-10-30T14:10:16.665556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C1XHer3G73mvJ93cv7"]} -{"Format": "IDEA0", "ID": "01358f96-f573-4b1f-8480-7c1c236ac25b", "DetectTime": "2023-10-30T14:10:16.684581+02:00", "EventTime": "2023-10-30T14:10:16.684596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CrQp8C1hWrtjY4GBV2"]} -{"Format": "IDEA0", "ID": "b2a9571d-8859-4d4a-b634-54974eab6d17", "DetectTime": "2023-10-30T14:10:16.702057+02:00", "EventTime": "2023-10-30T14:10:16.702072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CGuYO23v8KXPCWzA8c"]} -{"Format": "IDEA0", "ID": "c2e45491-764c-4f2c-be8f-e31f87d9d98d", "DetectTime": "2023-10-30T14:10:16.717681+02:00", "EventTime": "2023-10-30T14:10:16.717696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Crwy9C1EqRdQJBYvhj"]} -{"Format": "IDEA0", "ID": "6a3e91db-eb33-45e8-b080-1b138f405270", "DetectTime": "2023-10-30T14:10:16.730123+02:00", "EventTime": "2023-10-30T14:10:16.730134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CYC70L3vbiamsT5muf"]} -{"Format": "IDEA0", "ID": "54d3c4f0-7723-44ab-8160-3b6163e7ad63", "DetectTime": "2023-10-30T14:10:16.745386+02:00", "EventTime": "2023-10-30T14:10:16.745402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cr4rTt1X0swFjpbGti"]} -{"Format": "IDEA0", "ID": "7fa98458-bf22-4a32-9964-c9b1d175032f", "DetectTime": "2023-10-30T14:10:16.760762+02:00", "EventTime": "2023-10-30T14:10:16.760773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CT2dkJ2wxuapfIyyDj"]} -{"Format": "IDEA0", "ID": "bf0f4a57-0ae0-4441-ab67-5d446bc1734d", "DetectTime": "2023-10-30T14:10:16.773116+02:00", "EventTime": "2023-10-30T14:10:16.773128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["C6rGvZ3jThYqGcJdl8"]} -{"Format": "IDEA0", "ID": "25e179d8-8e42-467f-bdab-028f02e6512b", "DetectTime": "2023-10-30T14:10:16.788556+02:00", "EventTime": "2023-10-30T14:10:16.788567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CSlb7v1RKb0SKWVjvg"]} -{"Format": "IDEA0", "ID": "1267187c-dfd3-4344-bf01-4e0cb027b75e", "DetectTime": "2023-10-30T14:10:16.805622+02:00", "EventTime": "2023-10-30T14:10:16.805638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CSsNdI1FjJvh1L8ICa"]} -{"Format": "IDEA0", "ID": "d3f064a3-1b0b-4923-8693-ac8137b9a694", "DetectTime": "2023-10-30T14:10:16.827250+02:00", "EventTime": "2023-10-30T14:10:16.827261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ctoo5L4kqkf95B5e3"]} -{"Format": "IDEA0", "ID": "f24e4b05-7788-4f00-af32-e63c788b5a7d", "DetectTime": "2023-10-30T14:10:16.841782+02:00", "EventTime": "2023-10-30T14:10:16.841793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Ct15Yp3d1qwffOJnv7"]} -{"Format": "IDEA0", "ID": "4d8cbcca-95f0-4d1a-a3b8-cd1a0003e7ab", "DetectTime": "2023-10-30T14:10:16.857143+02:00", "EventTime": "2023-10-30T14:10:16.857157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cr3T5s4mke9lGMCXYb"]} -{"Format": "IDEA0", "ID": "ac2564c9-6e02-441a-8a20-760b4000a8c5", "DetectTime": "2023-10-30T14:10:16.868950+02:00", "EventTime": "2023-10-30T14:10:16.868960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CEuqv94Qtej24GQwgf"]} -{"Format": "IDEA0", "ID": "42ec23c4-b446-4bda-a800-a807369e4a42", "DetectTime": "2023-10-30T14:10:16.885452+02:00", "EventTime": "2023-10-30T14:10:16.885469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CsOLAZ2QvBxGK8Gnh4"]} -{"Format": "IDEA0", "ID": "03f8c041-d57b-47e8-a837-7119044fd141", "DetectTime": "2023-10-30T14:10:16.902607+02:00", "EventTime": "2023-10-30T14:10:16.902623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C6VRDa2XwThHaQZrY8"]} -{"Format": "IDEA0", "ID": "77083727-ed89-4cbc-acbd-3250422afd3c", "DetectTime": "2023-10-30T14:10:16.918942+02:00", "EventTime": "2023-10-30T14:10:16.918962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C5YK35A28SDY6Rmqa"]} -{"Format": "IDEA0", "ID": "2c8cf46c-697c-4aa1-b378-072b163cdadb", "DetectTime": "2023-10-30T14:10:16.932633+02:00", "EventTime": "2023-10-30T14:10:16.932644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CQPtSs3Q6pHuw6UGEa"]} -{"Format": "IDEA0", "ID": "51273a3a-c40e-4069-871c-80fffa8aead3", "DetectTime": "2023-10-30T14:10:16.947691+02:00", "EventTime": "2023-10-30T14:10:16.947702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CZVUVD4WFHoja8kW01"]} -{"Format": "IDEA0", "ID": "019f3a8b-4f13-4080-8f7f-2077af904c24", "DetectTime": "2023-10-30T14:10:16.965097+02:00", "EventTime": "2023-10-30T14:10:16.965116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CwuVPo1UdcN9v8HsZ6"]} -{"Format": "IDEA0", "ID": "6484e875-a2bc-4e8a-83e1-e6424118e5f6", "DetectTime": "2023-10-30T14:10:16.990548+02:00", "EventTime": "2023-10-30T14:10:16.990561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cq9yQK36Wq47HAIJhl"]} -{"Format": "IDEA0", "ID": "49d3ad70-5a7f-48e9-9145-66a905df0e92", "DetectTime": "2023-10-30T14:10:17.007197+02:00", "EventTime": "2023-10-30T14:10:17.007213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVefAS1k5X1zyd8kx6"]} -{"Format": "IDEA0", "ID": "a679e09e-5d1a-47a8-b121-ba75f71cfe3d", "DetectTime": "2023-10-30T14:10:17.021967+02:00", "EventTime": "2023-10-30T14:10:17.021983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CjH5wq2yszrYho2LS7"]} -{"Format": "IDEA0", "ID": "aa9a0935-da02-4d95-a18f-28eefc71e91d", "DetectTime": "2023-10-30T14:10:17.035257+02:00", "EventTime": "2023-10-30T14:10:17.035269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CdsCBz1tIhjxbmrL2f"]} -{"Format": "IDEA0", "ID": "421e3260-6f07-4ee4-8207-6aab3161a5ad", "DetectTime": "2023-10-30T14:10:17.052623+02:00", "EventTime": "2023-10-30T14:10:17.052637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cp3eIFQXbB22QuOmh"]} -{"Format": "IDEA0", "ID": "b0f9986b-0373-48c6-8917-dc40def01450", "DetectTime": "2023-10-30T14:10:17.065318+02:00", "EventTime": "2023-10-30T14:10:17.065330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CwtLPnTjNsJrM4TVi"]} -{"Format": "IDEA0", "ID": "bdb86083-a4fe-4580-86e3-8fb92461cb02", "DetectTime": "2023-10-30T14:10:17.080888+02:00", "EventTime": "2023-10-30T14:10:17.080899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CyP2uJ1eznNi28pIlj"]} -{"Format": "IDEA0", "ID": "40d1cc83-080f-4aeb-b2a9-dfcd90bed3ad", "DetectTime": "2023-10-30T14:10:17.104466+02:00", "EventTime": "2023-10-30T14:10:17.104480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyVhea3tJ7Hxe8B2g8"]} -{"Format": "IDEA0", "ID": "a21b5ef1-2097-4f33-96db-e19bc78dceef", "DetectTime": "2023-10-30T14:10:17.121153+02:00", "EventTime": "2023-10-30T14:10:17.121165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CnEDWZDNARlphHCSi"]} -{"Format": "IDEA0", "ID": "86f3252f-de48-4aed-a092-239cc096ab9c", "DetectTime": "2023-10-30T14:10:17.132822+02:00", "EventTime": "2023-10-30T14:10:17.132836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.101.238.77 ", "ContentType": "text/plain"}], "uids": ["CAzrSS2JaZPkRxgGW1"]} -{"Format": "IDEA0", "ID": "b85ba4fd-8f90-4488-9f03-768cb1ab334c", "DetectTime": "2023-10-30T14:10:17.146609+02:00", "EventTime": "2023-10-30T14:10:17.146626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CuOMIa43DJkHwhSoJf"]} -{"Format": "IDEA0", "ID": "20f0f9df-ca5e-4ef6-9f3c-7dae32f24b11", "DetectTime": "2023-10-30T14:10:17.160168+02:00", "EventTime": "2023-10-30T14:10:17.160180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cxox5f0nlUbSUCl9g"]} -{"Format": "IDEA0", "ID": "24427bb1-491e-4c95-b0a1-2111680a04ef", "DetectTime": "2023-10-30T14:10:17.172358+02:00", "EventTime": "2023-10-30T14:10:17.172368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cp9DuG4Mn0Gj0vZXz"]} -{"Format": "IDEA0", "ID": "9643a437-8f2b-44e2-afac-13547e026e0c", "DetectTime": "2023-10-30T14:10:17.186485+02:00", "EventTime": "2023-10-30T14:10:17.186502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CzLKw4hEZxHoYW2bb"]} -{"Format": "IDEA0", "ID": "a770fc6d-82b6-4b89-b679-3b11f36f8039", "DetectTime": "2023-10-30T14:10:17.198256+02:00", "EventTime": "2023-10-30T14:10:17.198267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CeXduy1IbHeGuzwNp8"]} -{"Format": "IDEA0", "ID": "6d4eaff1-4c8e-4ced-a23e-5efa2c142dec", "DetectTime": "2023-10-30T14:10:17.212598+02:00", "EventTime": "2023-10-30T14:10:17.212612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Ct6L6Q12rKjE02rXT7"]} -{"Format": "IDEA0", "ID": "5dee9628-73be-4ed2-866d-5a5759d8f0ad", "DetectTime": "2023-10-30T14:10:17.230771+02:00", "EventTime": "2023-10-30T14:10:17.230800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CqFaLT39CxGRNeCwBb"]} -{"Format": "IDEA0", "ID": "183c8c8c-62f1-41b0-9c14-8d5a09dc2b40", "DetectTime": "2023-10-30T14:10:17.244508+02:00", "EventTime": "2023-10-30T14:10:17.244519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5cQEK3l1n9pGQ6gzk"]} -{"Format": "IDEA0", "ID": "c115c975-6a21-45fe-81bd-2952700d2ddf", "DetectTime": "2023-10-30T14:10:17.258441+02:00", "EventTime": "2023-10-30T14:10:17.258456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ChvbxTovWwgiwUcO2"]} -{"Format": "IDEA0", "ID": "c7953f99-eb55-4670-8461-95459cbd5326", "DetectTime": "2023-10-30T14:10:17.272075+02:00", "EventTime": "2023-10-30T14:10:17.272091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CdbMYzm7KIubDzBZc"]} -{"Format": "IDEA0", "ID": "634a25b3-7a90-449a-b9ba-d512d61ca0d9", "DetectTime": "2023-10-30T14:10:17.284194+02:00", "EventTime": "2023-10-30T14:10:17.284206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CE7hY23UXipdn30Rg5"]} -{"Format": "IDEA0", "ID": "10e7a8c4-8127-48ff-9a97-0b440e5b12ef", "DetectTime": "2023-10-30T14:10:17.298401+02:00", "EventTime": "2023-10-30T14:10:17.298412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Ctbrx01AwHvnucCxC1"]} -{"Format": "IDEA0", "ID": "b04aaee9-8551-452a-82c9-f016d66cd732", "DetectTime": "2023-10-30T14:10:17.311050+02:00", "EventTime": "2023-10-30T14:10:17.311063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CE89bq4kY9fnDo4Oq4"]} -{"Format": "IDEA0", "ID": "03b1a739-efff-4a5b-a811-280349e909ae", "DetectTime": "2023-10-30T14:10:17.324710+02:00", "EventTime": "2023-10-30T14:10:17.324722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Co9yc6TsKBODJchCj"]} -{"Format": "IDEA0", "ID": "e525e503-698b-4b70-8dbd-97016c2031f8", "DetectTime": "2023-10-30T14:10:17.336934+02:00", "EventTime": "2023-10-30T14:10:17.336950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CfJ0Y83CiKJxOu7q9d"]} -{"Format": "IDEA0", "ID": "c1444688-8cc2-4d57-885c-3f6e1d9dcb90", "DetectTime": "2023-10-30T14:10:17.348744+02:00", "EventTime": "2023-10-30T14:10:17.348755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C6AJaGOKulUM9Qrl5"]} -{"Format": "IDEA0", "ID": "2012c3b5-c8cc-45d6-9e1e-2681084bcb24", "DetectTime": "2023-10-30T14:10:17.363612+02:00", "EventTime": "2023-10-30T14:10:17.363628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C40zN32XghtpHqCRwk"]} -{"Format": "IDEA0", "ID": "7c7cffa9-66b1-4abb-a01a-e51f3219926b", "DetectTime": "2023-10-30T14:10:17.377970+02:00", "EventTime": "2023-10-30T14:10:17.377982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C3Gn7hMFYl7xZrW8b"]} -{"Format": "IDEA0", "ID": "49b1c532-2652-49a9-b1dc-8e11d7ecf0fb", "DetectTime": "2023-10-30T14:10:17.391066+02:00", "EventTime": "2023-10-30T14:10:17.391077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CDubca4oU8EG3ikLV6"]} -{"Format": "IDEA0", "ID": "6555dd0e-0bce-4a6e-8b94-35c4ddf3e539", "DetectTime": "2023-10-30T14:10:17.406617+02:00", "EventTime": "2023-10-30T14:10:17.406633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CRSN5C28iY3iolLVei"]} -{"Format": "IDEA0", "ID": "7c958060-df28-44b8-b8d9-dacfa1625bba", "DetectTime": "2023-10-30T14:10:17.422696+02:00", "EventTime": "2023-10-30T14:10:17.422712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CFwW0w1BbMTGTDUew3"]} -{"Format": "IDEA0", "ID": "1c2e703d-b433-45e1-af53-be89d888ab34", "DetectTime": "2023-10-30T14:10:17.436442+02:00", "EventTime": "2023-10-30T14:10:17.436453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CrrclAgGbJS82qkFb"]} -{"Format": "IDEA0", "ID": "b35c0f0b-df95-41da-8745-6b9bc2a89868", "DetectTime": "2023-10-30T14:10:17.449268+02:00", "EventTime": "2023-10-30T14:10:17.449280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CHeGN72hF4EUfv2V1d"]} -{"Format": "IDEA0", "ID": "c5859943-eb57-47c2-9a7b-7abc0fd45be1", "DetectTime": "2023-10-30T14:10:17.463863+02:00", "EventTime": "2023-10-30T14:10:17.463879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHTjps35wCD9vkTtz5"]} -{"Format": "IDEA0", "ID": "e3324298-c17b-45bd-9790-549036968cc5", "DetectTime": "2023-10-30T14:10:17.482162+02:00", "EventTime": "2023-10-30T14:10:17.482178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CIDG3q1gk1FE3Uz2Kc"]} -{"Format": "IDEA0", "ID": "cb87205e-147e-4ff5-88ab-9d8dcb11f057", "DetectTime": "2023-10-30T14:10:17.499205+02:00", "EventTime": "2023-10-30T14:10:17.499220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CFKyed1YcVAmKYkiI"]} -{"Format": "IDEA0", "ID": "6d9024bd-563a-4831-a3d7-1caf1699cc91", "DetectTime": "2023-10-30T14:10:17.515595+02:00", "EventTime": "2023-10-30T14:10:17.515607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGV1EbKsrwrLBoUs2"]} -{"Format": "IDEA0", "ID": "082cac33-f5bb-4164-9846-d6e090a86980", "DetectTime": "2023-10-30T14:10:17.534752+02:00", "EventTime": "2023-10-30T14:10:17.534763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CqIirr2Z3QIzkm2KNc"]} -{"Format": "IDEA0", "ID": "5e14b347-c4f4-4ce5-b17f-bfd2912f57aa", "DetectTime": "2023-10-30T14:10:17.547230+02:00", "EventTime": "2023-10-30T14:10:17.547241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CTID322HR3q8QDOjd"]} -{"Format": "IDEA0", "ID": "230cf4d9-082d-4c8b-bb26-a080ac950685", "DetectTime": "2023-10-30T14:10:17.560069+02:00", "EventTime": "2023-10-30T14:10:17.560096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CprDKqPjQR1cYm1ul"]} -{"Format": "IDEA0", "ID": "5dac2ad3-1428-44c1-b69e-2d521964e8c2", "DetectTime": "2023-10-30T14:10:17.571998+02:00", "EventTime": "2023-10-30T14:10:17.572008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBBSKu2ldWdOQvKxTc"]} -{"Format": "IDEA0", "ID": "e6b73793-dc7a-4afa-9c4d-4a12dd114015", "DetectTime": "2023-10-30T14:10:17.584023+02:00", "EventTime": "2023-10-30T14:10:17.584034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C9VT531rVGtz4O6FGf"]} -{"Format": "IDEA0", "ID": "1f23a9b3-e8c1-45ce-a981-d3fef84e9d84", "DetectTime": "2023-10-30T14:10:17.596185+02:00", "EventTime": "2023-10-30T14:10:17.596195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CJsPNTdKEA9oZTSIh"]} -{"Format": "IDEA0", "ID": "fc6d5759-35db-47bf-b502-562ac9f984e4", "DetectTime": "2023-10-30T14:10:17.613040+02:00", "EventTime": "2023-10-30T14:10:17.613055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CFowSA2rsWp24V6zV1"]} -{"Format": "IDEA0", "ID": "d62e6ca5-567d-42b4-bb79-7b001ebf77a0", "DetectTime": "2023-10-30T14:10:17.630805+02:00", "EventTime": "2023-10-30T14:10:17.630821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CN83h8E7Ulmomshz9"]} -{"Format": "IDEA0", "ID": "58a2113a-db51-4aaa-8cc4-eec9d0716a13", "DetectTime": "2023-10-30T14:10:17.646218+02:00", "EventTime": "2023-10-30T14:10:17.646234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CpuP6e4Tnz9OqVbe34"]} -{"Format": "IDEA0", "ID": "35c45d29-4375-4ff8-9a0b-fb65ffd05531", "DetectTime": "2023-10-30T14:10:17.659432+02:00", "EventTime": "2023-10-30T14:10:17.659448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Com10U1bttLzT3Drs9"]} -{"Format": "IDEA0", "ID": "537aca22-dc05-41e3-9912-716eb98ce36a", "DetectTime": "2023-10-30T14:10:17.673758+02:00", "EventTime": "2023-10-30T14:10:17.673775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cgn6KSSeUWbuBEzf7"]} -{"Format": "IDEA0", "ID": "527843c2-88fb-4ff6-b671-e5ade5d32235", "DetectTime": "2023-10-30T14:10:17.690536+02:00", "EventTime": "2023-10-30T14:10:17.690548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CwsmvM1ajGSHoGWvSl"]} -{"Format": "IDEA0", "ID": "460a167d-2efa-4902-9150-43ea5bddd4d3", "DetectTime": "2023-10-30T14:10:17.706018+02:00", "EventTime": "2023-10-30T14:10:17.706034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CYqrzao64lpzRIIha"]} -{"Format": "IDEA0", "ID": "4d52cd4a-8682-4748-ae6e-e42de960c3f3", "DetectTime": "2023-10-30T14:10:17.720873+02:00", "EventTime": "2023-10-30T14:10:17.720883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CAFTy22XQu0MXIw1ff"]} -{"Format": "IDEA0", "ID": "6b5e5077-3919-456a-b3d5-b57b5eb365d7", "DetectTime": "2023-10-30T14:10:17.736277+02:00", "EventTime": "2023-10-30T14:10:17.736295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CkIe3Of91qs69sPii"]} -{"Format": "IDEA0", "ID": "74905376-8f8d-4680-9f43-227b66b0c268", "DetectTime": "2023-10-30T14:10:17.748741+02:00", "EventTime": "2023-10-30T14:10:17.748751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C1WWBV1TnDoZEUSc8h"]} -{"Format": "IDEA0", "ID": "fd36c6a4-226e-48a9-af23-1bb600d83686", "DetectTime": "2023-10-30T14:10:17.765717+02:00", "EventTime": "2023-10-30T14:10:17.765735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CGwrXz3vlSwSD9gxUd"]} -{"Format": "IDEA0", "ID": "5949e35c-0936-455b-a102-c3f40352a6ff", "DetectTime": "2023-10-30T14:10:17.781886+02:00", "EventTime": "2023-10-30T14:10:17.781901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CRhHS53gnZLE2tk9p5"]} -{"Format": "IDEA0", "ID": "3fc3d1c3-9efd-40a9-af6f-34606ffaee65", "DetectTime": "2023-10-30T14:10:17.797908+02:00", "EventTime": "2023-10-30T14:10:17.797922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C8vuEf1iRs9yt8Pr7d"]} -{"Format": "IDEA0", "ID": "6f754136-efe5-4112-ab0c-7cf588a30950", "DetectTime": "2023-10-30T14:10:17.814930+02:00", "EventTime": "2023-10-30T14:10:17.814946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C46wr74C2wHUp3fgF7"]} -{"Format": "IDEA0", "ID": "6751db1e-581f-45a7-bc98-c7790a76e56c", "DetectTime": "2023-10-30T14:10:17.831663+02:00", "EventTime": "2023-10-30T14:10:17.831679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CeLs4x2EMV8N29JAi1"]} -{"Format": "IDEA0", "ID": "680768fb-0b59-4fbe-815f-e405f47c9097", "DetectTime": "2023-10-30T14:10:17.845987+02:00", "EventTime": "2023-10-30T14:10:17.845997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CVfM6I1t3A0fPoCHY3"]} -{"Format": "IDEA0", "ID": "9f2d10ee-2ba7-4a0e-89db-e0297ed7ce9b", "DetectTime": "2023-10-30T14:10:17.862416+02:00", "EventTime": "2023-10-30T14:10:17.862431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CBiE4hzQQgSj8mY8k"]} -{"Format": "IDEA0", "ID": "3b7426a7-5ce6-4b2e-a9d9-fcd750a863e3", "DetectTime": "2023-10-30T14:10:17.878051+02:00", "EventTime": "2023-10-30T14:10:17.878067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CUCFqk3hOGDAlVf35g"]} -{"Format": "IDEA0", "ID": "b4a555af-ae45-4d3d-9f4b-44e759db2811", "DetectTime": "2023-10-30T14:10:17.892540+02:00", "EventTime": "2023-10-30T14:10:17.892556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CAuzT51Qv1TYJwR0wg"]} -{"Format": "IDEA0", "ID": "23165f9a-7bcc-4f54-a89d-6717adf6bbe4", "DetectTime": "2023-10-30T14:10:17.905468+02:00", "EventTime": "2023-10-30T14:10:17.905485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVLIOt2HXseSUSFvPc"]} -{"Format": "IDEA0", "ID": "e3c0908e-b64a-46b6-ade5-189d3f04e3bd", "DetectTime": "2023-10-30T14:10:17.921811+02:00", "EventTime": "2023-10-30T14:10:17.921821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvN5M636aGren3lmE8"]} -{"Format": "IDEA0", "ID": "39eb561b-db47-4418-ac03-aac759ec97bf", "DetectTime": "2023-10-30T14:10:17.943315+02:00", "EventTime": "2023-10-30T14:10:17.943330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8354], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. ", "ContentType": "text/plain"}], "uids": ["CrL7UKvjzMwS0QNYb"]} -{"Format": "IDEA0", "ID": "0e87315f-90ef-4fcf-a4e4-08eb6bff5257", "DetectTime": "2023-10-30T14:10:17.974222+02:00", "EventTime": "2023-10-30T14:10:17.974234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CL5Kry1PPkq5MnYcia"]} -{"Format": "IDEA0", "ID": "c699f4f1-272f-44e8-8df4-a42ce3f912e6", "DetectTime": "2023-10-30T14:10:17.994450+02:00", "EventTime": "2023-10-30T14:10:17.994462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["ChrYWj10RPWKczr9Zb"]} -{"Format": "IDEA0", "ID": "a6b4f031-2f99-4f1d-9111-874f515f47a1", "DetectTime": "2023-10-30T14:10:18.006692+02:00", "EventTime": "2023-10-30T14:10:18.006703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CGal34120ydq5RKHS9"]} -{"Format": "IDEA0", "ID": "9d6b12fe-12f6-4a9b-9f68-66cb4eecee21", "DetectTime": "2023-10-30T14:10:18.018203+02:00", "EventTime": "2023-10-30T14:10:18.018217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CDJnNFf1toIyhFR0g"]} -{"Format": "IDEA0", "ID": "a29c44ef-2afe-4fdb-a63c-4f7b543cd0ad", "DetectTime": "2023-10-30T14:10:18.035141+02:00", "EventTime": "2023-10-30T14:10:18.035152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkON9o3wcl1X4reOp"]} -{"Format": "IDEA0", "ID": "eaa210a2-f52a-43a6-a334-8a1461137046", "DetectTime": "2023-10-30T14:10:18.050362+02:00", "EventTime": "2023-10-30T14:10:18.050378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CPbj1M3dzxKQ4MgQT3"]} -{"Format": "IDEA0", "ID": "cb1a2f50-edc8-4fc4-a010-247b1937c292", "DetectTime": "2023-10-30T14:10:18.072751+02:00", "EventTime": "2023-10-30T14:10:18.072767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CaF2Lk39BZxtfxIpXd"]} -{"Format": "IDEA0", "ID": "8c85030a-0dc1-4b3c-a428-eaaa5ad17fa2", "DetectTime": "2023-10-30T14:10:18.094363+02:00", "EventTime": "2023-10-30T14:10:18.094380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CvCjGZ1vNaihK7NHNk"]} -{"Format": "IDEA0", "ID": "8d9df98f-1108-42cc-be60-6c8cb5ef13d4", "DetectTime": "2023-10-30T14:10:18.117692+02:00", "EventTime": "2023-10-30T14:10:18.117701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Cbigcp2qezZ7pbI2J"]} -{"Format": "IDEA0", "ID": "b3b015ab-e6bc-4279-946c-c220f01662a0", "DetectTime": "2023-10-30T14:10:18.137280+02:00", "EventTime": "2023-10-30T14:10:18.137290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CYv35n3SVEvpy816R8"]} -{"Format": "IDEA0", "ID": "7662c46c-4987-4385-8923-58b563c7fbbc", "DetectTime": "2023-10-30T14:10:18.159317+02:00", "EventTime": "2023-10-30T14:10:18.159328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CchGFW3pROYV1Aomdj"]} -{"Format": "IDEA0", "ID": "f0d7aa66-de8d-4bbc-a020-681e1afee719", "DetectTime": "2023-10-30T14:10:18.180068+02:00", "EventTime": "2023-10-30T14:10:18.180083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cw14du4QvRRTUsThc8"]} -{"Format": "IDEA0", "ID": "547d941c-5734-4798-a3b5-c9fcaf48d5d4", "DetectTime": "2023-10-30T14:10:18.208622+02:00", "EventTime": "2023-10-30T14:10:18.208633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CAp69HyRCnVEMDSKe"]} -{"Format": "IDEA0", "ID": "87ca9356-54cd-43f4-98f7-07ae7102838e", "DetectTime": "2023-10-30T14:10:18.229625+02:00", "EventTime": "2023-10-30T14:10:18.229636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CslQ612aMiKfb9O5qj"]} -{"Format": "IDEA0", "ID": "d660eec5-d1d7-451a-9ccb-0c1fed4d9da9", "DetectTime": "2023-10-30T14:10:18.247708+02:00", "EventTime": "2023-10-30T14:10:18.247721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C9Abqj2S3am2vT8QH2"]} -{"Format": "IDEA0", "ID": "126450b9-8005-4fa5-a561-48b8bcf0e330", "DetectTime": "2023-10-30T14:10:18.268109+02:00", "EventTime": "2023-10-30T14:10:18.268121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CGF175aunza2WylUf"]} -{"Format": "IDEA0", "ID": "b78ce028-4e3d-46ae-8aec-d7203bd36aa3", "DetectTime": "2023-10-30T14:10:18.291679+02:00", "EventTime": "2023-10-30T14:10:18.291690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CsWj9a3GGPLJ4blKp8"]} -{"Format": "IDEA0", "ID": "24cc4406-75d2-4be8-a8d7-3164570969ee", "DetectTime": "2023-10-30T14:10:18.311174+02:00", "EventTime": "2023-10-30T14:10:18.311187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CegxXm3hnKZS6EnX0e"]} -{"Format": "IDEA0", "ID": "a52b0f58-9092-431a-9536-5f799e11f015", "DetectTime": "2023-10-30T14:10:18.329293+02:00", "EventTime": "2023-10-30T14:10:18.329306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C7G97R1Yb94HQYMi0g"]} -{"Format": "IDEA0", "ID": "ee1b2421-c4f9-4a08-8e45-60f92ebb19fe", "DetectTime": "2023-10-30T14:10:18.346939+02:00", "EventTime": "2023-10-30T14:10:18.346951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CSbve33cyvSflIwMC9"]} -{"Format": "IDEA0", "ID": "f2b5e14a-36c1-4aff-bd4c-1215bc9202c5", "DetectTime": "2023-10-30T14:10:18.364318+02:00", "EventTime": "2023-10-30T14:10:18.364329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["COw4Hi1F1whhG9nRpj"]} -{"Format": "IDEA0", "ID": "43e91d8a-c17c-4146-88fe-b6529fa23ce4", "DetectTime": "2023-10-30T14:10:18.385041+02:00", "EventTime": "2023-10-30T14:10:18.385058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C7o51I2qZaWn3jTNN2"]} -{"Format": "IDEA0", "ID": "7d35ddff-f822-4e77-be1c-d37e0c1c91de", "DetectTime": "2023-10-30T14:10:18.417807+02:00", "EventTime": "2023-10-30T14:10:18.417818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C2bIBG3h2nPtXSn2i7"]} -{"Format": "IDEA0", "ID": "94eacfbd-3357-422f-ae84-41f9dbcd755d", "DetectTime": "2023-10-30T14:10:18.437479+02:00", "EventTime": "2023-10-30T14:10:18.437506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CLW4pV1LAqdU52cjHf"]} -{"Format": "IDEA0", "ID": "080c04d4-14ff-4417-ae2d-13da194608bb", "DetectTime": "2023-10-30T14:10:18.461015+02:00", "EventTime": "2023-10-30T14:10:18.461032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CotOFYtz4hs7M4q43"]} -{"Format": "IDEA0", "ID": "3d215d77-6470-4fe0-89b5-619ef2478828", "DetectTime": "2023-10-30T14:10:18.493171+02:00", "EventTime": "2023-10-30T14:10:18.493192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CT7x8b1aaGzRbxCkH7"]} -{"Format": "IDEA0", "ID": "1fb44dbb-f94e-42d7-8b3c-c962a9560d2d", "DetectTime": "2023-10-30T14:10:18.522361+02:00", "EventTime": "2023-10-30T14:10:18.522377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CvAjD24LkzwEbMqEci"]} -{"Format": "IDEA0", "ID": "a4e0db20-4f33-4c36-a1f1-dc1aa1502cd3", "DetectTime": "2023-10-30T14:10:18.552076+02:00", "EventTime": "2023-10-30T14:10:18.552086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CBe5tu4jUYymuFmRgg"]} -{"Format": "Json", "ID": "a4e0db20-4f33-4c36-a1f1-dc1aa1502cd3", "DetectTime": "2023-10-30T14:10:18.552076+02:00", "EventTime": "2023-10-30T14:10:18.552086+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T03:17:05.474780+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2023/10/30 14:10:18.638480)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e4960795-cfe0-4e18-b53f-ba6bb78970de", "DetectTime": "2023-10-30T14:10:18.642506+02:00", "EventTime": "2023-10-30T14:10:18.642516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CLj4sw1EEM5vWbnRWj"]} -{"Format": "IDEA0", "ID": "7491008b-a40e-4ec2-a7f7-4a5a569c2dc0", "DetectTime": "2023-10-30T14:10:18.675129+02:00", "EventTime": "2023-10-30T14:10:18.675148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["ClBxfv3FTPYGS2Rif2"]} -{"Format": "IDEA0", "ID": "38ca9e61-d778-4bcd-ba7c-712543f2b158", "DetectTime": "2023-10-30T14:10:18.695735+02:00", "EventTime": "2023-10-30T14:10:18.695747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C3zwLa4cfNy4RkHl69"]} -{"Format": "IDEA0", "ID": "546c8581-ec14-45cf-bf92-eff62ffbaee0", "DetectTime": "2023-10-30T14:10:18.726693+02:00", "EventTime": "2023-10-30T14:10:18.726717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CECuUV3yyyMHATaUG2"]} -{"Format": "IDEA0", "ID": "fcb38f05-5449-4afb-94be-4b23f0e837ae", "DetectTime": "2023-10-30T14:10:18.757019+02:00", "EventTime": "2023-10-30T14:10:18.757035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXDtfn2b5aPHee7yFl"]} -{"Format": "IDEA0", "ID": "b9021c85-22b7-4dde-81ff-3b18ec07af95", "DetectTime": "2023-10-30T14:10:18.791869+02:00", "EventTime": "2023-10-30T14:10:18.791881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CA6Tal3bLTFC5eXLb5"]} -{"Format": "IDEA0", "ID": "c1d54515-abab-404b-871e-6c0862323aba", "DetectTime": "2023-10-30T14:10:18.818595+02:00", "EventTime": "2023-10-30T14:10:18.818606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["CWsIPo1g3KWK76zYuf"]} -{"Format": "IDEA0", "ID": "8bf60069-6988-4558-a9e8-96ed3d303c83", "DetectTime": "2023-10-30T14:10:18.845075+02:00", "EventTime": "2023-10-30T14:10:18.845092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CPeoMn1nMUQvEPPS8c"]} -{"Format": "IDEA0", "ID": "ef5afb8a-d90e-4fc7-bef8-c7261b09ecd8", "DetectTime": "2023-10-30T14:10:18.871098+02:00", "EventTime": "2023-10-30T14:10:18.871115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cktkmt4h7463pbZHnf"]} -{"Format": "Json", "ID": "ef5afb8a-d90e-4fc7-bef8-c7261b09ecd8", "DetectTime": "2023-10-30T14:10:18.871098+02:00", "EventTime": "2023-10-30T14:10:18.871115+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T03:17:07.343651+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2023/10/30 14:10:18.938792)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bb7f21c9-8e8e-4048-8d0b-58f063ebdfac", "DetectTime": "2023-10-30T14:10:18.943094+02:00", "EventTime": "2023-10-30T14:10:18.943107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CKvMQR3DwNUDlKDkPj"]} -{"Format": "IDEA0", "ID": "0be4713f-7559-4f1d-bafc-5552a263a395", "DetectTime": "2023-10-30T14:10:18.968093+02:00", "EventTime": "2023-10-30T14:10:18.968110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CCqdEfQig0DkBMGu9"]} -{"Format": "IDEA0", "ID": "de44a396-90ac-41fd-b9c8-aafd6885d9e8", "DetectTime": "2023-10-30T14:10:19.003007+02:00", "EventTime": "2023-10-30T14:10:19.003024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ch92HPkdCzuq8llge"]} -{"Format": "IDEA0", "ID": "eab0c21b-5be3-4b52-a426-d6e5beff4c80", "DetectTime": "2023-10-30T14:10:19.038403+02:00", "EventTime": "2023-10-30T14:10:19.038420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cf6cwd25bM9MkIdQBa"]} -{"Format": "IDEA0", "ID": "f08c1302-86ec-4299-857f-2167c321cd08", "DetectTime": "2023-10-30T14:10:19.067505+02:00", "EventTime": "2023-10-30T14:10:19.067516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0Lttx4n6WkCowmyH1"]} -{"Format": "IDEA0", "ID": "a29d70d3-bff6-4657-95cb-bf2a5c346dfe", "DetectTime": "2023-10-30T14:10:19.099173+02:00", "EventTime": "2023-10-30T14:10:19.099190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CDlLN4My4to2k8obi"]} -{"Format": "IDEA0", "ID": "21fdbe21-c378-4462-9199-6ecaae029ef9", "DetectTime": "2023-10-30T14:10:19.127767+02:00", "EventTime": "2023-10-30T14:10:19.127779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C7mXdC197ohzTDt7a6"]} -{"Format": "IDEA0", "ID": "2cba9013-cea4-4f63-ad6d-dd657fa166ca", "DetectTime": "2023-10-30T14:10:19.159822+02:00", "EventTime": "2023-10-30T14:10:19.159837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZWMKi4gbPoeO8UTe2"]} -{"Format": "IDEA0", "ID": "13b94434-4651-4360-bc77-70cddc2d8d20", "DetectTime": "2023-10-30T14:10:19.197150+02:00", "EventTime": "2023-10-30T14:10:19.197173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["ClwXwR3m2tI6mUYem3"]} -{"Format": "IDEA0", "ID": "569c7a88-7159-403c-a37b-e3a0454f3c17", "DetectTime": "2023-10-30T14:10:19.226550+02:00", "EventTime": "2023-10-30T14:10:19.226566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CYozBGFEN1WRu1HVl"]} -{"Format": "Json", "ID": "569c7a88-7159-403c-a37b-e3a0454f3c17", "DetectTime": "2023-10-30T14:10:19.226550+02:00", "EventTime": "2023-10-30T14:10:19.226566+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T03:17:11.051638+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2023/10/30 14:10:19.288391)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0e5d5af0-881d-4cd1-8904-6ed1b3e3071a", "DetectTime": "2023-10-30T14:10:19.292511+02:00", "EventTime": "2023-10-30T14:10:19.292521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CZlIdR3SC7JwmmKiJ7"]} -{"Format": "IDEA0", "ID": "919bb6f7-3fcc-497c-81bd-fae0b1486761", "DetectTime": "2023-10-30T14:10:19.317880+02:00", "EventTime": "2023-10-30T14:10:19.317895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CH3MtC1R5dMTg6YFid"]} -{"Format": "IDEA0", "ID": "18e25c05-1995-4223-b45a-7391ca0bba2b", "DetectTime": "2023-10-30T14:10:19.347816+02:00", "EventTime": "2023-10-30T14:10:19.347832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CDZtge1hDJ7txM4Yb2"]} -{"Format": "IDEA0", "ID": "74fe1e58-108a-4021-9cab-2b77f688608b", "DetectTime": "2023-10-30T14:10:19.373442+02:00", "EventTime": "2023-10-30T14:10:19.373453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CUvU7x40RDUuB4NMX8"]} -{"Format": "IDEA0", "ID": "6fe7adaf-19dd-4527-a284-888b6e869438", "DetectTime": "2023-10-30T14:10:19.396945+02:00", "EventTime": "2023-10-30T14:10:19.396956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEJtnR2kT9bBgZr9be"]} -{"Format": "IDEA0", "ID": "2186a71f-2dcd-40f5-a1f5-2fb56ad142a4", "DetectTime": "2023-10-30T14:10:19.420594+02:00", "EventTime": "2023-10-30T14:10:19.420610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Coxbqc2HfIS1JoFnMd"]} -{"Format": "IDEA0", "ID": "976c50fb-3877-4f04-b7b4-740714aebb31", "DetectTime": "2023-10-30T14:10:19.444062+02:00", "EventTime": "2023-10-30T14:10:19.444073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CElYAz2pa3MkYAyMI6"]} -{"Format": "IDEA0", "ID": "0cd4db82-edcc-4361-9042-c8353fe7e794", "DetectTime": "2023-10-30T14:10:19.470894+02:00", "EventTime": "2023-10-30T14:10:19.470911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CJXBOw4sUmiMDzfo2k"]} -{"Format": "IDEA0", "ID": "23e5c259-2a45-4fff-baff-2f8ec59ac8b7", "DetectTime": "2023-10-30T14:10:19.489021+02:00", "EventTime": "2023-10-30T14:10:19.489032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C1rchDSP9fsaHkbVj"]} -{"Format": "Json", "ID": "23e5c259-2a45-4fff-baff-2f8ec59ac8b7", "DetectTime": "2023-10-30T14:10:19.489021+02:00", "EventTime": "2023-10-30T14:10:19.489032+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T03:47:41.652045+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2023/10/30 14:10:19.555926)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a88afbba-11b9-4952-99de-caa52a36a644", "DetectTime": "2023-10-30T14:10:19.560285+02:00", "EventTime": "2023-10-30T14:10:19.560296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CZgBev45gBFATf19Q6"]} -{"Format": "IDEA0", "ID": "ce5c3159-8f86-4b9a-94aa-6dad8ed8955d", "DetectTime": "2023-10-30T14:10:19.585780+02:00", "EventTime": "2023-10-30T14:10:19.585797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CVlIG04YtPDgOUgzNi"]} -{"Format": "IDEA0", "ID": "39836a68-59f9-467c-a581-09ad14317922", "DetectTime": "2023-10-30T14:10:19.610333+02:00", "EventTime": "2023-10-30T14:10:19.610345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CzJCj44R2FKh6tl8Tk"]} -{"Format": "IDEA0", "ID": "5aa7ff90-a947-4ea2-95b0-45a22e3971f9", "DetectTime": "2023-10-30T14:10:19.633344+02:00", "EventTime": "2023-10-30T14:10:19.633360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CkuqZohkt4Da2uDed"]} -{"Format": "IDEA0", "ID": "f6110080-a83c-4fa0-83ff-48f567824fc0", "DetectTime": "2023-10-30T14:10:19.654200+02:00", "EventTime": "2023-10-30T14:10:19.654212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CCQGR13sOX6nQ5D1B4"]} -{"Format": "IDEA0", "ID": "dd6de715-a574-4194-ad51-acdcc9b89b7e", "DetectTime": "2023-10-30T14:10:19.677493+02:00", "EventTime": "2023-10-30T14:10:19.677508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CTK5Gi2OwQ9B0N35a7"]} -{"Format": "IDEA0", "ID": "20210f0c-6969-4318-ab65-49380142a6de", "DetectTime": "2023-10-30T14:10:19.704065+02:00", "EventTime": "2023-10-30T14:10:19.704077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Ctuj0s4Mi41LA6tdd2"]} -{"Format": "IDEA0", "ID": "2fa827f0-c1ba-4e24-8f8e-f70ed73a0f51", "DetectTime": "2023-10-30T14:10:19.725736+02:00", "EventTime": "2023-10-30T14:10:19.725755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNUxl11b4aSxTguFM4"]} -{"Format": "Json", "ID": "2fa827f0-c1ba-4e24-8f8e-f70ed73a0f51", "DetectTime": "2023-10-30T14:10:19.725736+02:00", "EventTime": "2023-10-30T14:10:19.725755+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T03:47:43.452915+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2023/10/30 14:10:19.775213)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "65366ae6-78b2-49b3-ad94-1409d2e7e5d4", "DetectTime": "2023-10-30T14:10:19.779544+02:00", "EventTime": "2023-10-30T14:10:19.779556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CLBoGl4se3sy6KjZk3"]} -{"Format": "IDEA0", "ID": "db420a63-ebfc-4410-a091-a3e7d2a77cff", "DetectTime": "2023-10-30T14:10:19.806245+02:00", "EventTime": "2023-10-30T14:10:19.806261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CSfKKyJAgr1xAolh4"]} -{"Format": "IDEA0", "ID": "053bb650-8ea6-46a5-86d8-eca50ee5bad2", "DetectTime": "2023-10-30T14:10:19.830327+02:00", "EventTime": "2023-10-30T14:10:19.830343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CPmdIzKJ1RdIOsol1"]} -{"Format": "IDEA0", "ID": "5e2892db-7cdd-4c97-be18-39d3e5d6f491", "DetectTime": "2023-10-30T14:10:19.856225+02:00", "EventTime": "2023-10-30T14:10:19.856242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CdV6JBXvJijOONvzh"]} -{"Format": "IDEA0", "ID": "cc3a5699-9c66-4c95-b6ef-638348422cf7", "DetectTime": "2023-10-30T14:10:19.881448+02:00", "EventTime": "2023-10-30T14:10:19.881464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CZ30CnCX0LihJTM71"]} -{"Format": "IDEA0", "ID": "7d930fca-739d-4804-a3cd-5b0cd9b33bc6", "DetectTime": "2023-10-30T14:10:19.900754+02:00", "EventTime": "2023-10-30T14:10:19.900775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CpsCJUxRUYk8p1UG9"]} -{"Format": "IDEA0", "ID": "3e270ccb-f3be-4ccf-825d-194a22365ea0", "DetectTime": "2023-10-30T14:10:19.919767+02:00", "EventTime": "2023-10-30T14:10:19.919778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKCtnf3yAI4yckXtBd"]} -{"Format": "IDEA0", "ID": "6fe93a3e-b5b8-4603-a1ab-a49da0d20802", "DetectTime": "2023-10-30T14:10:19.942190+02:00", "EventTime": "2023-10-30T14:10:19.942202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cgxz0N2VqcXFv2Zz7e"]} -{"Format": "IDEA0", "ID": "1cb93800-3859-45d0-8aa5-4e837009d29b", "DetectTime": "2023-10-30T14:10:19.960634+02:00", "EventTime": "2023-10-30T14:10:19.960644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ci1f9ylVTTmuQf1Ch"]} -{"Format": "Json", "ID": "1cb93800-3859-45d0-8aa5-4e837009d29b", "DetectTime": "2023-10-30T14:10:19.960634+02:00", "EventTime": "2023-10-30T14:10:19.960644+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T03:48:06.388044+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2023/10/30 14:10:20.016741)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "560d6a7f-d455-4b84-97d5-46d1791e7a31", "DetectTime": "2023-10-30T14:10:20.021111+02:00", "EventTime": "2023-10-30T14:10:20.021123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CrdZxD25sA0VwntOch"]} -{"Format": "IDEA0", "ID": "5c09edb8-f626-4959-a2ec-e25b39105daf", "DetectTime": "2023-10-30T14:10:20.040046+02:00", "EventTime": "2023-10-30T14:10:20.040058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CGyIo72wFlKzh7MB27"]} -{"Format": "IDEA0", "ID": "4c0ce213-6ecf-4f01-9328-ca3dc3b71383", "DetectTime": "2023-10-30T14:10:20.058060+02:00", "EventTime": "2023-10-30T14:10:20.058072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C1qwpa4EtJ426I4jNj"]} -{"Format": "IDEA0", "ID": "e472ccd3-2fe0-4803-9bd9-8b8fadb2f128", "DetectTime": "2023-10-30T14:10:20.075921+02:00", "EventTime": "2023-10-30T14:10:20.075937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CtTq324CDAoBOF1duh"]} -{"Format": "IDEA0", "ID": "e38a2432-3834-4a66-a72e-7c76e30aca12", "DetectTime": "2023-10-30T14:10:20.096313+02:00", "EventTime": "2023-10-30T14:10:20.096324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CEWPDO3JGfA4wqzUkk"]} -{"Format": "IDEA0", "ID": "5096bca7-d6d3-4bd3-a351-f15df29dde91", "DetectTime": "2023-10-30T14:10:20.117366+02:00", "EventTime": "2023-10-30T14:10:20.117382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CDAgw031EVtxx7PpIe"]} -{"Format": "IDEA0", "ID": "91b177a8-6337-4a18-a48f-0c1173712746", "DetectTime": "2023-10-30T14:10:20.137859+02:00", "EventTime": "2023-10-30T14:10:20.137884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CixxCJL59vDCTuB5b"]} -{"Format": "IDEA0", "ID": "40418528-253e-406b-a340-38a659ec3ce4", "DetectTime": "2023-10-30T14:10:20.160829+02:00", "EventTime": "2023-10-30T14:10:20.160845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CEEfCx4sndtFGmU5V8"]} -{"Format": "IDEA0", "ID": "df1e9950-50b8-480b-8da8-f0a60729994a", "DetectTime": "2023-10-30T14:10:20.182079+02:00", "EventTime": "2023-10-30T14:10:20.182090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CvbAhV1tN7KD2bCR3k"]} -{"Format": "IDEA0", "ID": "47d83565-3000-427a-a309-31410a59454d", "DetectTime": "2023-10-30T14:10:20.212847+02:00", "EventTime": "2023-10-30T14:10:20.212863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CY2BBK3jvupIq40NV7"]} -{"Format": "IDEA0", "ID": "c89ca257-511d-4cfd-a829-eef15c885264", "DetectTime": "2023-10-30T14:10:20.244389+02:00", "EventTime": "2023-10-30T14:10:20.244400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CBIiBr2tyWBUAbgVI3"]} -{"Format": "IDEA0", "ID": "3f0ecab9-ed51-47d7-9723-45c648bc2fec", "DetectTime": "2023-10-30T14:10:20.270658+02:00", "EventTime": "2023-10-30T14:10:20.270678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C4M0P04qwrdQ1yEMb7"]} -{"Format": "IDEA0", "ID": "aaa1c32d-8c18-43de-a8e3-524f4873b75d", "DetectTime": "2023-10-30T14:10:20.300831+02:00", "EventTime": "2023-10-30T14:10:20.300843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CvopAg33IM2dTlEVag"]} -{"Format": "IDEA0", "ID": "3936e1e3-2011-4a5a-9a8c-76c88b7dfda6", "DetectTime": "2023-10-30T14:10:20.328640+02:00", "EventTime": "2023-10-30T14:10:20.328653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CqzX9K1Qs89nOL7F67"]} -{"Format": "IDEA0", "ID": "2f0c961a-63d0-4cc0-a42f-ca96f96061a1", "DetectTime": "2023-10-30T14:10:20.354400+02:00", "EventTime": "2023-10-30T14:10:20.354412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CPyJznfHeNKPlNaz6"]} -{"Format": "IDEA0", "ID": "f1bca30d-6bcd-4212-9db2-7b0291481eaa", "DetectTime": "2023-10-30T14:10:20.384817+02:00", "EventTime": "2023-10-30T14:10:20.384831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CdVaFWiTGTAsSiwTh"]} -{"Format": "Json", "ID": "f1bca30d-6bcd-4212-9db2-7b0291481eaa", "DetectTime": "2023-10-30T14:10:20.384817+02:00", "EventTime": "2023-10-30T14:10:20.384831+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T04:18:51.507595+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2023/10/30 14:10:20.450554)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "35622601-4632-4d04-a717-d7b78a9cccf7", "DetectTime": "2023-10-30T14:10:20.455819+02:00", "EventTime": "2023-10-30T14:10:20.455834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9753], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. ", "ContentType": "text/plain"}], "uids": ["Clerst41UL3lNRBbb1"]} -{"Format": "IDEA0", "ID": "17bbe70f-d14b-41d8-a0ce-ee1cb7850f8b", "DetectTime": "2023-10-30T14:10:20.481287+02:00", "EventTime": "2023-10-30T14:10:20.481303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CdaMKknPs1JZlPHde"]} -{"Format": "IDEA0", "ID": "77982900-fd87-41ef-93cb-686b8cf79366", "DetectTime": "2023-10-30T14:10:20.508471+02:00", "EventTime": "2023-10-30T14:10:20.508488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["C9Lin91rnYZJixSnK9"]} -{"Format": "IDEA0", "ID": "145b4abe-6c17-44e1-9716-8db9ae62765e", "DetectTime": "2023-10-30T14:10:20.541280+02:00", "EventTime": "2023-10-30T14:10:20.541295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CgtZGXsoXFAhorJL5"]} -{"Format": "IDEA0", "ID": "9fd07a13-115b-4f2e-bae8-82acb5f25d76", "DetectTime": "2023-10-30T14:10:20.571571+02:00", "EventTime": "2023-10-30T14:10:20.571585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CtBFTf3gMW0yXdZAob"]} -{"Format": "IDEA0", "ID": "6234898b-7a1c-4335-9848-1dda98582218", "DetectTime": "2023-10-30T14:10:20.599415+02:00", "EventTime": "2023-10-30T14:10:20.599429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C2nr0g20mO0VGDCuyf"]} -{"Format": "IDEA0", "ID": "c8a1f1f8-73b8-4ba7-8838-053c7ab82777", "DetectTime": "2023-10-30T14:10:20.619359+02:00", "EventTime": "2023-10-30T14:10:20.619372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CHHBnb1AwhVT0aXZfk"]} -{"Format": "IDEA0", "ID": "07b39d75-0826-40e7-94c8-bd3bcb79e031", "DetectTime": "2023-10-30T14:10:20.644873+02:00", "EventTime": "2023-10-30T14:10:20.644884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C0FoMS3GNgg1gp7zWi"]} -{"Format": "IDEA0", "ID": "c2bd15ec-5f7b-4994-a70e-2bbf8598bfd6", "DetectTime": "2023-10-30T14:10:20.668503+02:00", "EventTime": "2023-10-30T14:10:20.668515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CyCPbu1aA4fTqokhxc"]} -{"Format": "Json", "ID": "c2bd15ec-5f7b-4994-a70e-2bbf8598bfd6", "DetectTime": "2023-10-30T14:10:20.668503+02:00", "EventTime": "2023-10-30T14:10:20.668515+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T04:18:53.316388+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2023/10/30 14:10:20.724593)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ad6b478-c8ca-4c10-bb25-3786335c4995", "DetectTime": "2023-10-30T14:10:20.729992+02:00", "EventTime": "2023-10-30T14:10:20.730008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CiOAEK1KRbjIIvTjv7"]} -{"Format": "IDEA0", "ID": "97e32500-b464-4cf5-bcc6-e3787ab9be44", "DetectTime": "2023-10-30T14:10:20.755176+02:00", "EventTime": "2023-10-30T14:10:20.755191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CxT1as4IPLlWyer6C"]} -{"Format": "IDEA0", "ID": "775ba0e2-af75-4fa0-b82a-f7945e75bd30", "DetectTime": "2023-10-30T14:10:20.777592+02:00", "EventTime": "2023-10-30T14:10:20.777605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["C324g62m4y7FApCHYi"]} -{"Format": "IDEA0", "ID": "5ed00a09-0e08-4a5f-b37b-544581f155ba", "DetectTime": "2023-10-30T14:10:20.802126+02:00", "EventTime": "2023-10-30T14:10:20.802137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CsznjV2ETNAovWyCxj"]} -{"Format": "IDEA0", "ID": "a5cbf2f8-8070-4efb-b8b5-23281d94be4b", "DetectTime": "2023-10-30T14:10:20.822584+02:00", "EventTime": "2023-10-30T14:10:20.822595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSxB731QSsY9BbByXd"]} -{"Format": "IDEA0", "ID": "3d252233-74a2-4ee8-87d5-e6ade29f0fc3", "DetectTime": "2023-10-30T14:10:20.845529+02:00", "EventTime": "2023-10-30T14:10:20.845545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cm0m7P2bmvoObxGuc4"]} -{"Format": "IDEA0", "ID": "bf68c5fa-769e-45eb-893a-13c4a4aa6d61", "DetectTime": "2023-10-30T14:10:20.871686+02:00", "EventTime": "2023-10-30T14:10:20.871697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CjJ36HuWk6hFtoT0l"]} -{"Format": "IDEA0", "ID": "e7d2225c-6f6b-42f3-add4-83590c8c96aa", "DetectTime": "2023-10-30T14:10:20.900896+02:00", "EventTime": "2023-10-30T14:10:20.900912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CC8vH8378k7bke55v8"]} -{"Format": "Json", "ID": "e7d2225c-6f6b-42f3-add4-83590c8c96aa", "DetectTime": "2023-10-30T14:10:20.900896+02:00", "EventTime": "2023-10-30T14:10:20.900912+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T04:18:56.115492+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2023/10/30 14:10:20.963579)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d785847c-b87b-4a28-a5a4-71abae91240d", "DetectTime": "2023-10-30T14:10:20.968983+02:00", "EventTime": "2023-10-30T14:10:20.969001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Cij9l43M3bHIezTy7g"]} -{"Format": "IDEA0", "ID": "a4183caa-3636-40e5-ac74-7f71aafc54c4", "DetectTime": "2023-10-30T14:10:20.995607+02:00", "EventTime": "2023-10-30T14:10:20.995623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CiR1uS2lGxUqX3vPU4"]} -{"Format": "IDEA0", "ID": "ee8ee9ad-5522-4bcd-873d-9f3e3ea3ba8f", "DetectTime": "2023-10-30T14:10:21.023053+02:00", "EventTime": "2023-10-30T14:10:21.023064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZDVzS2PRwb3DEGUy4"]} -{"Format": "IDEA0", "ID": "660355e3-1e7d-45fa-b73c-b7d378643cd4", "DetectTime": "2023-10-30T14:10:21.044411+02:00", "EventTime": "2023-10-30T14:10:21.044422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtSWDn18XPJxs3Urwf"]} -{"Format": "IDEA0", "ID": "b5ea7c6b-9e77-4717-aa18-b58a3c67e14f", "DetectTime": "2023-10-30T14:10:21.068943+02:00", "EventTime": "2023-10-30T14:10:21.068959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CJ7pQI38Xom607wLGb"]} -{"Format": "IDEA0", "ID": "b6a97bb2-0dcc-4330-b815-5d5fc557c5e7", "DetectTime": "2023-10-30T14:10:21.098471+02:00", "EventTime": "2023-10-30T14:10:21.098487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CL7PCM3EuWdNG3a2Ej"]} -{"Format": "IDEA0", "ID": "1336060a-cd4d-4b67-a8ed-3235a1031621", "DetectTime": "2023-10-30T14:10:21.124341+02:00", "EventTime": "2023-10-30T14:10:21.124357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CkYi4y7WuxfxbCWDk"]} -{"Format": "IDEA0", "ID": "66258786-68fa-47f2-bb9a-30b6a177f58a", "DetectTime": "2023-10-30T14:10:21.148549+02:00", "EventTime": "2023-10-30T14:10:21.148564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CASKhu2m4r6A62kCp6"]} -{"Format": "IDEA0", "ID": "5df086dd-9d0d-44f2-b104-f8125f9d30f0", "DetectTime": "2023-10-30T14:10:21.174103+02:00", "EventTime": "2023-10-30T14:10:21.174118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CtNVJt4nx1iJgxX4S2"]} -{"Format": "Json", "ID": "5df086dd-9d0d-44f2-b104-f8125f9d30f0", "DetectTime": "2023-10-30T14:10:21.174103+02:00", "EventTime": "2023-10-30T14:10:21.174118+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T04:49:17.124918+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2023/10/30 14:10:21.240031)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8efd2f37-e713-4ecc-9c1e-ef47c124dd4f", "DetectTime": "2023-10-30T14:10:21.247085+02:00", "EventTime": "2023-10-30T14:10:21.247098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cajh5JWdbxr6r74Nb"]} -{"Format": "IDEA0", "ID": "1a8c3ec1-c55f-4d79-a3ce-b62ca27abf06", "DetectTime": "2023-10-30T14:10:21.267370+02:00", "EventTime": "2023-10-30T14:10:21.267387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CBI1Wx2WWzW0vL8wCh"]} -{"Format": "IDEA0", "ID": "d5433de1-365d-460d-9d24-50fc97fa5b25", "DetectTime": "2023-10-30T14:10:21.292981+02:00", "EventTime": "2023-10-30T14:10:21.292997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CSJ63w2iWL42aiose4"]} -{"Format": "IDEA0", "ID": "4e3233d6-9183-452a-9ac2-e0f6df1b41a9", "DetectTime": "2023-10-30T14:10:21.317438+02:00", "EventTime": "2023-10-30T14:10:21.317453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CVJ1qlw1ih1GWuii8"]} -{"Format": "IDEA0", "ID": "d1dbafa4-a626-4259-928f-d85d3250cf6c", "DetectTime": "2023-10-30T14:10:21.334691+02:00", "EventTime": "2023-10-30T14:10:21.334707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CW7s932RYduB97kn2"]} -{"Format": "IDEA0", "ID": "1da88163-e879-419a-9f6f-504475713148", "DetectTime": "2023-10-30T14:10:21.353285+02:00", "EventTime": "2023-10-30T14:10:21.353300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C8gLdlvNZrlw2pZI"]} -{"Format": "IDEA0", "ID": "a44f062a-1692-4b2b-8a18-b5e12c0b5701", "DetectTime": "2023-10-30T14:10:21.371413+02:00", "EventTime": "2023-10-30T14:10:21.371429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C5K7hX3e1e2iLwjdT1"]} -{"Format": "IDEA0", "ID": "4c70c979-87e9-4fca-b125-3b02409836f7", "DetectTime": "2023-10-30T14:10:21.394831+02:00", "EventTime": "2023-10-30T14:10:21.394857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CYdpWu4tvl2C0JEK59"]} -{"Format": "Json", "ID": "4c70c979-87e9-4fca-b125-3b02409836f7", "DetectTime": "2023-10-30T14:10:21.394831+02:00", "EventTime": "2023-10-30T14:10:21.394857+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T04:49:36.025439+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2023/10/30 14:10:21.447904)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "85e061ec-d896-4d1b-b81e-350e0d79c457", "DetectTime": "2023-10-30T14:10:21.453331+02:00", "EventTime": "2023-10-30T14:10:21.453350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CbXc3ndQJezjiUyZ"]} -{"Format": "IDEA0", "ID": "d073c9be-f5e8-45b6-8b1e-fb449537dae8", "DetectTime": "2023-10-30T14:10:21.477603+02:00", "EventTime": "2023-10-30T14:10:21.477618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C4cEUd3wXQ1utrp2ud"]} -{"Format": "IDEA0", "ID": "eb28d996-2be5-41c6-bb18-385d4bf61d69", "DetectTime": "2023-10-30T14:10:21.499323+02:00", "EventTime": "2023-10-30T14:10:21.499334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CjApff4e4c3eP5qDMf"]} -{"Format": "IDEA0", "ID": "f23b274c-516f-4bba-869e-b42d8b8ace92", "DetectTime": "2023-10-30T14:10:21.518765+02:00", "EventTime": "2023-10-30T14:10:21.518791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Co67RQ2J2mwO2qXDh2"]} -{"Format": "IDEA0", "ID": "b1108264-cd31-472e-aa47-de772fe30816", "DetectTime": "2023-10-30T14:10:21.541337+02:00", "EventTime": "2023-10-30T14:10:21.541353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CVUQ6EATVKeVBWpS2"]} -{"Format": "IDEA0", "ID": "a70d9270-6332-4653-a739-af270d144019", "DetectTime": "2023-10-30T14:10:21.562906+02:00", "EventTime": "2023-10-30T14:10:21.562920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CpeR3z4Jh2FxLCBaBh"]} -{"Format": "IDEA0", "ID": "7a18c96a-d6ee-4e7e-b31f-6137b44fb154", "DetectTime": "2023-10-30T14:10:21.582924+02:00", "EventTime": "2023-10-30T14:10:21.582936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C76J0529vqsgmnoMi"]} -{"Format": "IDEA0", "ID": "f9bc4114-8b24-40c1-a0a0-5d52945d0708", "DetectTime": "2023-10-30T14:10:21.601831+02:00", "EventTime": "2023-10-30T14:10:21.601847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C6ZTZN2Jp1wCuEFdcd"]} -{"Format": "Json", "ID": "f9bc4114-8b24-40c1-a0a0-5d52945d0708", "DetectTime": "2023-10-30T14:10:21.601831+02:00", "EventTime": "2023-10-30T14:10:21.601847+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T04:49:38.572649+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2023/10/30 14:10:21.654581)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e5336b25-7922-48fd-97ff-b7e50a06896f", "DetectTime": "2023-10-30T14:10:21.660087+02:00", "EventTime": "2023-10-30T14:10:21.660103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CTy2ts1DFFPuDU66Xc"]} -{"Format": "IDEA0", "ID": "7cec5c47-63c2-4bf9-a7f2-bbe8ad6f7744", "DetectTime": "2023-10-30T14:10:21.678359+02:00", "EventTime": "2023-10-30T14:10:21.678369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CaBA7J19c8KT0ZV7Bf"]} -{"Format": "IDEA0", "ID": "d2899a04-d061-4274-8938-a128a08660be", "DetectTime": "2023-10-30T14:10:21.693604+02:00", "EventTime": "2023-10-30T14:10:21.693616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CW4Ua62xIeL6XisF3d"]} -{"Format": "IDEA0", "ID": "9d6d6f94-5e91-4850-8b4f-e10a0ff4455b", "DetectTime": "2023-10-30T14:10:21.708833+02:00", "EventTime": "2023-10-30T14:10:21.708844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cw4ZGq4uABvx08tdT3"]} -{"Format": "IDEA0", "ID": "721d48da-2bc0-4315-a1ec-ae2b33025a7a", "DetectTime": "2023-10-30T14:10:21.723008+02:00", "EventTime": "2023-10-30T14:10:21.723020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN8lmu2KdmaXxHY5A9"]} -{"Format": "IDEA0", "ID": "5045943e-292d-44cd-a693-c7b1e2e93057", "DetectTime": "2023-10-30T14:10:21.737492+02:00", "EventTime": "2023-10-30T14:10:21.737521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CbMDKh2AHUz0FXsk2j"]} -{"Format": "IDEA0", "ID": "24ba24f6-f581-422f-9dd3-2dfc2a3ef8da", "DetectTime": "2023-10-30T14:10:21.767562+02:00", "EventTime": "2023-10-30T14:10:21.767573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQb2pH3KHYk7GoTuG4"]} -{"Format": "IDEA0", "ID": "3c47c389-61d6-419f-b274-4cbe77359ca6", "DetectTime": "2023-10-30T14:10:21.801023+02:00", "EventTime": "2023-10-30T14:10:21.801039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CS2WI8szosX4euPFj"]} -{"Format": "IDEA0", "ID": "d7d493a8-4965-42b8-9a76-2c91a9e6c7d9", "DetectTime": "2023-10-30T14:10:21.826062+02:00", "EventTime": "2023-10-30T14:10:21.826078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CMPwDmaqNpJ5IfYtg"]} -{"Format": "IDEA0", "ID": "4177cd56-cdd3-44fe-859a-7d878e62e711", "DetectTime": "2023-10-30T14:10:21.854771+02:00", "EventTime": "2023-10-30T14:10:21.854806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C7eIoM1ytZD1y5rpwb"]} -{"Format": "IDEA0", "ID": "716aba20-9b7e-4684-a556-02da97050eed", "DetectTime": "2023-10-30T14:10:21.883058+02:00", "EventTime": "2023-10-30T14:10:21.883076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CXZXsP2AWJL6tg6ec3"]} -{"Format": "IDEA0", "ID": "6583b1ae-7525-471c-adcd-10560df72ee9", "DetectTime": "2023-10-30T14:10:21.911353+02:00", "EventTime": "2023-10-30T14:10:21.911364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CCKlD44aF0504rEFA5"]} -{"Format": "IDEA0", "ID": "c19ea040-fcbb-451d-889d-15c15c59ccf4", "DetectTime": "2023-10-30T14:10:21.938905+02:00", "EventTime": "2023-10-30T14:10:21.938923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CBkHOb1vyHi3xUKmQe"]} -{"Format": "Json", "ID": "c19ea040-fcbb-451d-889d-15c15c59ccf4", "DetectTime": "2023-10-30T14:10:21.938905+02:00", "EventTime": "2023-10-30T14:10:21.938923+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T05:20:29.694783+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2023/10/30 14:10:22.012819)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0e11ffcc-0648-40c3-8220-390db2dbe7a2", "DetectTime": "2023-10-30T14:10:22.018008+02:00", "EventTime": "2023-10-30T14:10:22.018024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CdEuEe45iRdl3ij3hi"]} -{"Format": "IDEA0", "ID": "45a8b451-4e9a-46a6-b805-03ca6f8b4221", "DetectTime": "2023-10-30T14:10:22.043977+02:00", "EventTime": "2023-10-30T14:10:22.043993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZN6H68JyFgMN92b"]} -{"Format": "IDEA0", "ID": "43d954a2-c3ef-4bd9-9318-07794bed900f", "DetectTime": "2023-10-30T14:10:22.073948+02:00", "EventTime": "2023-10-30T14:10:22.073965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CjB6O3GaC742TVI6f"]} -{"Format": "IDEA0", "ID": "015310a7-cb39-44fb-8a7a-320e37310467", "DetectTime": "2023-10-30T14:10:22.099250+02:00", "EventTime": "2023-10-30T14:10:22.099262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CBia9U212icweztQXg"]} -{"Format": "IDEA0", "ID": "b0ab427f-71c2-4391-9d36-af89cbe8d038", "DetectTime": "2023-10-30T14:10:22.123101+02:00", "EventTime": "2023-10-30T14:10:22.123112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CckbTl3VY48X4rzyc9"]} -{"Format": "IDEA0", "ID": "6ec3b88d-a431-4aca-916b-e304036f55f3", "DetectTime": "2023-10-30T14:10:22.147323+02:00", "EventTime": "2023-10-30T14:10:22.147339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CfnDlr1YuQQW6Zzs1"]} -{"Format": "IDEA0", "ID": "e87342af-3a2d-4e3e-98fe-2bc2d294994d", "DetectTime": "2023-10-30T14:10:22.178050+02:00", "EventTime": "2023-10-30T14:10:22.178063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CKK9zy2j67ymGuguU5"]} -{"Format": "IDEA0", "ID": "24e49196-0a87-4824-9631-96d73d69854f", "DetectTime": "2023-10-30T14:10:22.203481+02:00", "EventTime": "2023-10-30T14:10:22.203497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C94wma1Hx040qLkV5g"]} -{"Format": "Json", "ID": "24e49196-0a87-4824-9631-96d73d69854f", "DetectTime": "2023-10-30T14:10:22.203481+02:00", "EventTime": "2023-10-30T14:10:22.203497+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T05:20:31.281089+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2023/10/30 14:10:22.265302)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5f6e9eda-b5c4-40f8-b040-0c28c282e885", "DetectTime": "2023-10-30T14:10:22.269979+02:00", "EventTime": "2023-10-30T14:10:22.269996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CZPwUf4HufIIg61Ho5"]} -{"Format": "IDEA0", "ID": "474893ca-83d0-48b7-bb72-0536eca56c14", "DetectTime": "2023-10-30T14:10:22.299628+02:00", "EventTime": "2023-10-30T14:10:22.299644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0YiEC43V7uPLCwfPa"]} -{"Format": "IDEA0", "ID": "fe0630b3-da3a-4d4c-b04e-b65861a36244", "DetectTime": "2023-10-30T14:10:22.329737+02:00", "EventTime": "2023-10-30T14:10:22.329753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C5fZPq1SrxuLisa2Ng"]} -{"Format": "IDEA0", "ID": "ef3159e8-d81f-4f92-b08c-ce1c406f204f", "DetectTime": "2023-10-30T14:10:22.354200+02:00", "EventTime": "2023-10-30T14:10:22.354216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CZWWSQ1cJHDwjfjfM1"]} -{"Format": "IDEA0", "ID": "9c18bb42-d70d-40dd-8da2-1bfd834657ec", "DetectTime": "2023-10-30T14:10:22.374755+02:00", "EventTime": "2023-10-30T14:10:22.374771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CTeysz32jP7Ma6xYj2"]} -{"Format": "IDEA0", "ID": "568eec09-f709-4b2b-a2b3-554a344020c2", "DetectTime": "2023-10-30T14:10:22.401178+02:00", "EventTime": "2023-10-30T14:10:22.401189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CxnAcV1DfyQmGxY9H4"]} -{"Format": "IDEA0", "ID": "4be71746-df3c-4626-868d-e6f4820d06be", "DetectTime": "2023-10-30T14:10:22.427093+02:00", "EventTime": "2023-10-30T14:10:22.427108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C05Nz11BqLAXQQIX1b"]} -{"Format": "IDEA0", "ID": "a9566709-0cb6-443f-af09-41e5cea0775b", "DetectTime": "2023-10-30T14:10:22.453827+02:00", "EventTime": "2023-10-30T14:10:22.453846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CaYkDE27qa2by5g2Ma"]} -{"Format": "IDEA0", "ID": "1dd01934-2a20-4aaf-906d-3c7954969216", "DetectTime": "2023-10-30T14:10:22.477464+02:00", "EventTime": "2023-10-30T14:10:22.477480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cc3lwY2caDZnRMtTDl"]} -{"Format": "Json", "ID": "1dd01934-2a20-4aaf-906d-3c7954969216", "DetectTime": "2023-10-30T14:10:22.477464+02:00", "EventTime": "2023-10-30T14:10:22.477480+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T05:20:33.847675+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2023/10/30 14:10:22.543014)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c2fb3d5c-9df9-41e4-af84-690e968d9193", "DetectTime": "2023-10-30T14:10:22.546922+02:00", "EventTime": "2023-10-30T14:10:22.546933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C5WigH1HwgELWQ9LPi"]} -{"Format": "IDEA0", "ID": "9b63b1cb-d8fb-49e7-996f-2cd306fbfd1a", "DetectTime": "2023-10-30T14:10:22.572152+02:00", "EventTime": "2023-10-30T14:10:22.572171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CSuxEz46sNQ1vao6K3"]} -{"Format": "IDEA0", "ID": "e2626547-55da-4239-8b29-7da52013c1cb", "DetectTime": "2023-10-30T14:10:22.597495+02:00", "EventTime": "2023-10-30T14:10:22.597509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYtgtj9voZ10mxNd3"]} -{"Format": "IDEA0", "ID": "f020f192-5731-4fac-bcc1-9c01a2f95054", "DetectTime": "2023-10-30T14:10:22.620964+02:00", "EventTime": "2023-10-30T14:10:22.620975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CozdHt1vdG8o5QU3H4"]} -{"Format": "IDEA0", "ID": "f3b3c067-8a56-47bc-887a-772296a8afa8", "DetectTime": "2023-10-30T14:10:22.645762+02:00", "EventTime": "2023-10-30T14:10:22.645775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVC9bv2SHY2neXj273"]} -{"Format": "IDEA0", "ID": "6c746dba-c037-4af0-be9f-e2f1facba7de", "DetectTime": "2023-10-30T14:10:22.665588+02:00", "EventTime": "2023-10-30T14:10:22.665599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CvSLDJ3NueFwaqZfl4"]} -{"Format": "IDEA0", "ID": "0d4cdb60-e566-4726-bdbb-6688b997019b", "DetectTime": "2023-10-30T14:10:22.691079+02:00", "EventTime": "2023-10-30T14:10:22.691095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cjyu41hAkuOl0YYx6"]} -{"Format": "IDEA0", "ID": "a7e65ef7-a557-4e90-858f-bc110ee373fd", "DetectTime": "2023-10-30T14:10:22.712675+02:00", "EventTime": "2023-10-30T14:10:22.712692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CY076D31JbFG0GMItl"]} -{"Format": "Json", "ID": "a7e65ef7-a557-4e90-858f-bc110ee373fd", "DetectTime": "2023-10-30T14:10:22.712675+02:00", "EventTime": "2023-10-30T14:10:22.712692+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T05:51:04.242724+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2023/10/30 14:10:22.776111)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "38178e7d-df72-47b6-abe6-d6a406f5ccec", "DetectTime": "2023-10-30T14:10:22.781415+02:00", "EventTime": "2023-10-30T14:10:22.781430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVhQXI27SON31KRVgf"]} -{"Format": "IDEA0", "ID": "11224f12-5fe1-495b-9b88-2ad04cc61a5b", "DetectTime": "2023-10-30T14:10:22.802439+02:00", "EventTime": "2023-10-30T14:10:22.802456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CZhyzx17Rtv02Bzb97"]} -{"Format": "IDEA0", "ID": "bae849f0-0511-4336-8ab6-12ce08a7274f", "DetectTime": "2023-10-30T14:10:22.827559+02:00", "EventTime": "2023-10-30T14:10:22.827577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CCTZN74s7tMUoYwezd"]} -{"Format": "IDEA0", "ID": "a76e268a-49e6-4518-8062-3e032f2bd134", "DetectTime": "2023-10-30T14:10:22.851028+02:00", "EventTime": "2023-10-30T14:10:22.851045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CbwvjR2YochirAsiki"]} -{"Format": "IDEA0", "ID": "a9b7525f-e599-4278-840a-dcd716015622", "DetectTime": "2023-10-30T14:10:22.876446+02:00", "EventTime": "2023-10-30T14:10:22.876458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CVGU8X38zXHXAvclck"]} -{"Format": "IDEA0", "ID": "ef0a92e6-ba43-48e3-b961-bed8cf6b76dd", "DetectTime": "2023-10-30T14:10:22.897493+02:00", "EventTime": "2023-10-30T14:10:22.897505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CPzZ4l3XoS0m2bP1l9"]} -{"Format": "IDEA0", "ID": "82504b74-619d-4cb6-89b9-060b4f58cb2a", "DetectTime": "2023-10-30T14:10:22.916907+02:00", "EventTime": "2023-10-30T14:10:22.916931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["Cxsivi2zoG5FgM1xV6"]} -{"Format": "IDEA0", "ID": "17907994-0785-403c-a4b2-8123177f7d70", "DetectTime": "2023-10-30T14:10:22.936934+02:00", "EventTime": "2023-10-30T14:10:22.936951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Ct1W44363UjZ9wwUwi"]} -{"Format": "IDEA0", "ID": "4474b84c-c605-43c5-8d12-546c98c15fa0", "DetectTime": "2023-10-30T14:10:22.956380+02:00", "EventTime": "2023-10-30T14:10:22.956397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CSgpYkSuElBUBYOhd"]} -{"Format": "IDEA0", "ID": "394bc331-4d37-4eeb-a5d2-b12ed820459f", "DetectTime": "2023-10-30T14:10:22.975733+02:00", "EventTime": "2023-10-30T14:10:22.975746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CMwWMji0ST8aWSgcc"]} -{"Format": "Json", "ID": "394bc331-4d37-4eeb-a5d2-b12ed820459f", "DetectTime": "2023-10-30T14:10:22.975733+02:00", "EventTime": "2023-10-30T14:10:22.975746+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T05:51:06.131301+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2023/10/30 14:10:23.028167)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3b24a29b-a1a1-4eea-8aab-de724f601246", "DetectTime": "2023-10-30T14:10:23.032643+02:00", "EventTime": "2023-10-30T14:10:23.032654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CKs39h2b4Ko0R0JnV6"]} -{"Format": "IDEA0", "ID": "13790f81-b5d8-4cbb-8364-fff30d1f1cba", "DetectTime": "2023-10-30T14:10:23.051427+02:00", "EventTime": "2023-10-30T14:10:23.051438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C1fzUKwp1UUciKyaj"]} -{"Format": "IDEA0", "ID": "6d8a58c7-d53d-4f08-a81f-fa901d039ebc", "DetectTime": "2023-10-30T14:10:23.070949+02:00", "EventTime": "2023-10-30T14:10:23.070965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CEnjUA4VmaeRnolUt"]} -{"Format": "IDEA0", "ID": "651dfe6e-f06a-4492-8b63-5fb514afb984", "DetectTime": "2023-10-30T14:10:23.089616+02:00", "EventTime": "2023-10-30T14:10:23.089628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CsgD501rmxgPMV0Wg8"]} -{"Format": "IDEA0", "ID": "39914ba8-086b-44b5-a835-3418ee3273d1", "DetectTime": "2023-10-30T14:10:23.109299+02:00", "EventTime": "2023-10-30T14:10:23.109314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CsWMZs4bE8C7VJLETl"]} -{"Format": "IDEA0", "ID": "ce22c649-fb73-4119-9c07-00a61314aa82", "DetectTime": "2023-10-30T14:10:23.129491+02:00", "EventTime": "2023-10-30T14:10:23.129501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cz0Gyb4Fpf44FNIZR"]} -{"Format": "IDEA0", "ID": "5ee77acc-985a-427b-a0ec-3bd4be317293", "DetectTime": "2023-10-30T14:10:23.144032+02:00", "EventTime": "2023-10-30T14:10:23.144042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CNE1IhJvywv1u6Z36"]} -{"Format": "IDEA0", "ID": "4434a6c4-7327-4ef3-9a10-7107657dc607", "DetectTime": "2023-10-30T14:10:23.160501+02:00", "EventTime": "2023-10-30T14:10:23.160519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C4LGI02LAWZHzhrcc4"]} -{"Format": "IDEA0", "ID": "59b6b94b-4239-49d7-9784-9b9ace1751e2", "DetectTime": "2023-10-30T14:10:23.179388+02:00", "EventTime": "2023-10-30T14:10:23.179405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CK8wiI3B0RO9c7hB92"]} -{"Format": "Json", "ID": "59b6b94b-4239-49d7-9784-9b9ace1751e2", "DetectTime": "2023-10-30T14:10:23.179388+02:00", "EventTime": "2023-10-30T14:10:23.179405+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T05:51:09.187045+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2023/10/30 14:10:23.236786)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3a91907f-4521-495d-81f1-807f08607c60", "DetectTime": "2023-10-30T14:10:23.241078+02:00", "EventTime": "2023-10-30T14:10:23.241096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C1hgqw2EimHNoUi3Nk"]} -{"Format": "IDEA0", "ID": "c3f041a5-b050-4b10-b2d6-c34448babf62", "DetectTime": "2023-10-30T14:10:23.264238+02:00", "EventTime": "2023-10-30T14:10:23.264254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CbcW751UApo6hT6rs9"]} -{"Format": "IDEA0", "ID": "bbdd8bb1-2c58-453e-939e-7cd4e7ceb50f", "DetectTime": "2023-10-30T14:10:23.281511+02:00", "EventTime": "2023-10-30T14:10:23.281526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CXWuEs1D6muG3neha"]} -{"Format": "IDEA0", "ID": "f6020df2-9cb0-4c6e-bb87-75326c8a0262", "DetectTime": "2023-10-30T14:10:23.296478+02:00", "EventTime": "2023-10-30T14:10:23.296493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CnvTUn1IbjFoSLiuO7"]} -{"Format": "IDEA0", "ID": "b07e2ad7-0a0f-470c-b1af-2d3382f36c4a", "DetectTime": "2023-10-30T14:10:23.310991+02:00", "EventTime": "2023-10-30T14:10:23.311001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3xlPYfyxgOpHW9d3"]} -{"Format": "IDEA0", "ID": "85447997-182d-43e0-8d21-d709228dfb9b", "DetectTime": "2023-10-30T14:10:23.327907+02:00", "EventTime": "2023-10-30T14:10:23.327919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C4ijCj19lZpe39IQWf"]} -{"Format": "IDEA0", "ID": "a0833f60-97b4-4385-8391-5e0b590fc8b0", "DetectTime": "2023-10-30T14:10:23.353634+02:00", "EventTime": "2023-10-30T14:10:23.353652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CkkIec2rL9X0D3u3kj"]} -{"Format": "IDEA0", "ID": "622ff958-afa5-4768-aa57-3a37e2b75aa4", "DetectTime": "2023-10-30T14:10:23.381601+02:00", "EventTime": "2023-10-30T14:10:23.381612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CEoifq3By5GV2yGMNk"]} -{"Format": "IDEA0", "ID": "48bacaa2-0e5b-44f6-b0db-1e922eff1702", "DetectTime": "2023-10-30T14:10:23.405595+02:00", "EventTime": "2023-10-30T14:10:23.405605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C8Zwbo3c236cgMFvnk"]} -{"Format": "IDEA0", "ID": "70cc5c59-80a8-4781-b920-ea1abd216db7", "DetectTime": "2023-10-30T14:10:23.429832+02:00", "EventTime": "2023-10-30T14:10:23.429844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CEHxtOzAm2PcRJMnj"]} -{"Format": "IDEA0", "ID": "b465decb-e315-4818-9b00-cf9267d2322b", "DetectTime": "2023-10-30T14:10:23.464883+02:00", "EventTime": "2023-10-30T14:10:23.464901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CVJyPb3t8Kp275jW4e"]} -{"Format": "IDEA0", "ID": "9aa6ada0-cc12-4f4b-bc94-fb91e619d840", "DetectTime": "2023-10-30T14:10:23.497177+02:00", "EventTime": "2023-10-30T14:10:23.497195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C5P31z3u5ILotBoV4c"]} -{"Format": "IDEA0", "ID": "0aba95bd-c0c7-4703-ae81-b6cb534b6f3f", "DetectTime": "2023-10-30T14:10:23.520465+02:00", "EventTime": "2023-10-30T14:10:23.520490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CVxrAg4FDdkKZuNfCc"]} -{"Format": "Json", "ID": "0aba95bd-c0c7-4703-ae81-b6cb534b6f3f", "DetectTime": "2023-10-30T14:10:23.520465+02:00", "EventTime": "2023-10-30T14:10:23.520490+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T06:22:11.468363+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2023/10/30 14:10:23.593202)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0674e743-2b85-4221-ae8b-90e702ae7e01", "DetectTime": "2023-10-30T14:10:23.597669+02:00", "EventTime": "2023-10-30T14:10:23.597684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CqVzzc1PzjKstiyZyi"]} -{"Format": "IDEA0", "ID": "69f968a8-c3bd-43a3-9e9b-be9b865a73eb", "DetectTime": "2023-10-30T14:10:23.623037+02:00", "EventTime": "2023-10-30T14:10:23.623048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C9OHD92b4fjHAe5K6a"]} -{"Format": "IDEA0", "ID": "b9c761bb-8e2a-4553-8224-103d428276d4", "DetectTime": "2023-10-30T14:10:23.641288+02:00", "EventTime": "2023-10-30T14:10:23.641298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ClJg424PPFYhEK2r71"]} -{"Format": "IDEA0", "ID": "5e9cf99e-5409-417c-803e-30595dbd12c7", "DetectTime": "2023-10-30T14:10:23.669171+02:00", "EventTime": "2023-10-30T14:10:23.669189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cm2wdq2FA4tsvUWCIh"]} -{"Format": "IDEA0", "ID": "d421bd33-b0bd-4bd5-b3e9-bb3ef0bdc088", "DetectTime": "2023-10-30T14:10:23.691961+02:00", "EventTime": "2023-10-30T14:10:23.691972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CVtFer4KhiHki2MZTg"]} -{"Format": "IDEA0", "ID": "cd0b5f1e-580a-4a35-b0f3-2c9e93cecd00", "DetectTime": "2023-10-30T14:10:23.714224+02:00", "EventTime": "2023-10-30T14:10:23.714240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CbqRr14eqEfYyzrStd"]} -{"Format": "IDEA0", "ID": "91fd1207-eabe-4abd-949a-ebe45412b239", "DetectTime": "2023-10-30T14:10:23.735927+02:00", "EventTime": "2023-10-30T14:10:23.735943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C4SEgo3wJzmpMnSGJk"]} -{"Format": "IDEA0", "ID": "56ab38a8-cf30-43fb-bce1-1e18072ce6cd", "DetectTime": "2023-10-30T14:10:23.765352+02:00", "EventTime": "2023-10-30T14:10:23.765368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cyjvzl2UBfwJnxCfY5"]} -{"Format": "IDEA0", "ID": "b8a14f2e-7fb7-439d-876d-495d08518a5a", "DetectTime": "2023-10-30T14:10:23.792328+02:00", "EventTime": "2023-10-30T14:10:23.792338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CEewOdOW1xiVMoZwg"]} -{"Format": "Json", "ID": "b8a14f2e-7fb7-439d-876d-495d08518a5a", "DetectTime": "2023-10-30T14:10:23.792328+02:00", "EventTime": "2023-10-30T14:10:23.792338+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T06:22:13.233600+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2023/10/30 14:10:23.849335)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "111f7c22-d491-4720-a516-80e783ca76f1", "DetectTime": "2023-10-30T14:10:23.854069+02:00", "EventTime": "2023-10-30T14:10:23.854085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CMgv7g2U6x4zMyIiW4"]} -{"Format": "IDEA0", "ID": "8a9f6d75-3f5e-4455-8a7b-0560f7c48247", "DetectTime": "2023-10-30T14:10:23.879700+02:00", "EventTime": "2023-10-30T14:10:23.879717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["ClWGAh369Ew6u9wmf7"]} -{"Format": "IDEA0", "ID": "e4c307fc-9df2-4376-8337-65c818aff983", "DetectTime": "2023-10-30T14:10:23.908458+02:00", "EventTime": "2023-10-30T14:10:23.908474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CcAOh7239ntuTRVOI1"]} -{"Format": "IDEA0", "ID": "013e4197-82dc-4ab6-a37a-f2fbc6343d26", "DetectTime": "2023-10-30T14:10:23.936065+02:00", "EventTime": "2023-10-30T14:10:23.936080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVUIB74ac2whQmFJee"]} -{"Format": "IDEA0", "ID": "bbe438b7-46f7-4ab9-98e9-24aa42396dd7", "DetectTime": "2023-10-30T14:10:23.956419+02:00", "EventTime": "2023-10-30T14:10:23.956435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CMW5COFA75nDhHeD9"]} -{"Format": "IDEA0", "ID": "2d4fcd0c-0855-4ac9-b969-f2f7c8036d9d", "DetectTime": "2023-10-30T14:10:23.976592+02:00", "EventTime": "2023-10-30T14:10:23.976611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["COQb7g4LXTxYtHPFlj"]} -{"Format": "IDEA0", "ID": "900dcd99-fc57-4b34-ab21-d462cd80d54b", "DetectTime": "2023-10-30T14:10:23.999075+02:00", "EventTime": "2023-10-30T14:10:23.999086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CmtayL21mngA4nDtc"]} -{"Format": "IDEA0", "ID": "341b2233-2bd6-4cc7-8010-ed388c48dfc9", "DetectTime": "2023-10-30T14:10:24.020476+02:00", "EventTime": "2023-10-30T14:10:24.020504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CyPgSf2KqSYJJmIf93"]} -{"Format": "IDEA0", "ID": "192088bc-ba21-4dbb-8633-1dc7cb444e62", "DetectTime": "2023-10-30T14:10:24.041902+02:00", "EventTime": "2023-10-30T14:10:24.041913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CPXwpawYiPUqRL0Ig"]} -{"Format": "IDEA0", "ID": "fa30226e-2d23-4845-ad63-a98370cb8d1d", "DetectTime": "2023-10-30T14:10:24.063314+02:00", "EventTime": "2023-10-30T14:10:24.063325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CbGcDH23rOwxgyeytj"]} -{"Format": "Json", "ID": "fa30226e-2d23-4845-ad63-a98370cb8d1d", "DetectTime": "2023-10-30T14:10:24.063314+02:00", "EventTime": "2023-10-30T14:10:24.063325+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-07T06:25:28.044734+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2023/10/30 14:10:24.199098)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ce28624f-d001-4bdf-89fe-16021def2b77", "DetectTime": "2023-10-30T14:10:24.204738+02:00", "EventTime": "2023-10-30T14:10:24.204763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C8Jc8M2KkQKddOlA93"]} -{"Format": "IDEA0", "ID": "fadffb22-f81f-491d-8575-d0a685289dba", "DetectTime": "2023-10-30T14:10:24.230545+02:00", "EventTime": "2023-10-30T14:10:24.230555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CbOU0oNpDfl5XFaXa"]} -{"Format": "IDEA0", "ID": "44fdba9c-40b7-47c2-bca2-c5884517bfc9", "DetectTime": "2023-10-30T14:10:24.257361+02:00", "EventTime": "2023-10-30T14:10:24.257392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CUL2kr1CqBbMY6x2Gd"]} -{"Format": "IDEA0", "ID": "c0246701-0ec6-4fc7-ba87-28a214ab26a2", "DetectTime": "2023-10-30T14:10:24.279746+02:00", "EventTime": "2023-10-30T14:10:24.279758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CnDbWm3ZyvsCTo4wDj"]} -{"Format": "IDEA0", "ID": "dddbb2f4-0f16-4d1e-9bb4-2dc877762635", "DetectTime": "2023-10-30T14:10:24.300079+02:00", "EventTime": "2023-10-30T14:10:24.300090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CumYSZ3BLENR6QAQ2k"]} -{"Format": "IDEA0", "ID": "d94a11d1-b3f5-4184-8012-de540dcb4250", "DetectTime": "2023-10-30T14:10:24.321021+02:00", "EventTime": "2023-10-30T14:10:24.321039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["CQZRom2NuoLT9PU6Yh"]} -{"Format": "IDEA0", "ID": "7b8b9258-c4e0-43d3-945c-36deaddaf357", "DetectTime": "2023-10-30T14:10:24.349254+02:00", "EventTime": "2023-10-30T14:10:24.349269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CqE2ok1iNhNLlMHCHl"]} -{"Format": "IDEA0", "ID": "8ef0ad7f-f8e1-4f70-bb59-b0284cd1a8d5", "DetectTime": "2023-10-30T14:10:24.370653+02:00", "EventTime": "2023-10-30T14:10:24.370664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CCqOiFqzrVU39u3mk"]} -{"Format": "Json", "ID": "8ef0ad7f-f8e1-4f70-bb59-b0284cd1a8d5", "DetectTime": "2023-10-30T14:10:24.370653+02:00", "EventTime": "2023-10-30T14:10:24.370664+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T06:52:30.384200+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2023/10/30 14:10:24.425351)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b565ede1-9767-42ba-8b36-2d197090b7db", "DetectTime": "2023-10-30T14:10:24.430567+02:00", "EventTime": "2023-10-30T14:10:24.430582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C3rrZV3SkhfQ4B0GS"]} -{"Format": "IDEA0", "ID": "55fc9418-0b75-43ab-9f4f-fe7314db73d1", "DetectTime": "2023-10-30T14:10:24.455510+02:00", "EventTime": "2023-10-30T14:10:24.455526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CCrBRn4H0NWgHFs1w"]} -{"Format": "IDEA0", "ID": "b23ca82a-9289-43b8-af83-d2438214a7d9", "DetectTime": "2023-10-30T14:10:24.479437+02:00", "EventTime": "2023-10-30T14:10:24.479454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CosjY4iBoEYRUBQZ4"]} -{"Format": "IDEA0", "ID": "5f35226c-a343-4b74-a466-c7e86c887066", "DetectTime": "2023-10-30T14:10:24.498442+02:00", "EventTime": "2023-10-30T14:10:24.498454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CwXrdz2P5NxRLRgt91"]} -{"Format": "IDEA0", "ID": "3d4dc26d-7ced-442a-8865-958ef3bc0f86", "DetectTime": "2023-10-30T14:10:24.522542+02:00", "EventTime": "2023-10-30T14:10:24.522557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CCKO0H2xP1fh5KCvZh"]} -{"Format": "IDEA0", "ID": "2ac9fcba-54ff-4e3f-bc6d-940a9cd4a3a5", "DetectTime": "2023-10-30T14:10:24.546108+02:00", "EventTime": "2023-10-30T14:10:24.546124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CW2eRo2wv1hPstEYH3"]} -{"Format": "IDEA0", "ID": "6b53d181-7952-4294-af7e-3d5180b69969", "DetectTime": "2023-10-30T14:10:24.569596+02:00", "EventTime": "2023-10-30T14:10:24.569621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C4LrWD4Zlp4CFNeBC4"]} -{"Format": "IDEA0", "ID": "efe5e63b-8493-4318-a2f6-97416951c3e8", "DetectTime": "2023-10-30T14:10:24.591617+02:00", "EventTime": "2023-10-30T14:10:24.591645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CKWcMa4L8SzjNX0W7d"]} -{"Format": "IDEA0", "ID": "b0c27b97-f9ba-4f9d-b692-a76dcf33cc46", "DetectTime": "2023-10-30T14:10:24.610755+02:00", "EventTime": "2023-10-30T14:10:24.610766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["ClOHng21GmWFGa6bAe"]} -{"Format": "Json", "ID": "b0c27b97-f9ba-4f9d-b692-a76dcf33cc46", "DetectTime": "2023-10-30T14:10:24.610755+02:00", "EventTime": "2023-10-30T14:10:24.610766+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T06:52:32.771119+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2023/10/30 14:10:24.667285)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9dfea9ba-1375-4508-b6fe-c75f4be3280c", "DetectTime": "2023-10-30T14:10:24.672782+02:00", "EventTime": "2023-10-30T14:10:24.672797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CvcDFdJxFMfKhtXGf"]} -{"Format": "IDEA0", "ID": "da22ad27-5333-432a-ad82-18488ea3a683", "DetectTime": "2023-10-30T14:10:24.693496+02:00", "EventTime": "2023-10-30T14:10:24.693510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CiyJRIgYzu2Fm8123"]} -{"Format": "IDEA0", "ID": "e603ab7f-fb83-4ee8-8149-3399be32c953", "DetectTime": "2023-10-30T14:10:24.709680+02:00", "EventTime": "2023-10-30T14:10:24.709691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CuoC3W2mmUvyUWpORj"]} -{"Format": "IDEA0", "ID": "00161164-feff-4d8e-86f2-1ded9245597c", "DetectTime": "2023-10-30T14:10:24.728905+02:00", "EventTime": "2023-10-30T14:10:24.728922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cvj9tN2Fv9IDZXwpfh"]} -{"Format": "IDEA0", "ID": "24ac7182-ae8e-49e5-9279-58e19b7d17bb", "DetectTime": "2023-10-30T14:10:24.744833+02:00", "EventTime": "2023-10-30T14:10:24.744844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CDgKWH16i4Dhe4amA5"]} -{"Format": "IDEA0", "ID": "cc91e350-2531-44b7-a36b-7d14267d9cdc", "DetectTime": "2023-10-30T14:10:24.764927+02:00", "EventTime": "2023-10-30T14:10:24.764942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C0IPvXamrOuHgtXr5"]} -{"Format": "IDEA0", "ID": "00d449ce-fd7e-44f0-81cb-2bcba0a5c878", "DetectTime": "2023-10-30T14:10:24.781931+02:00", "EventTime": "2023-10-30T14:10:24.781953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C6Nwpt487y7I5Imuf4"]} -{"Format": "IDEA0", "ID": "58229921-77b9-4b1d-a9e4-c3b720cfb93f", "DetectTime": "2023-10-30T14:10:24.799941+02:00", "EventTime": "2023-10-30T14:10:24.799955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CvCyHP3NM26g9bCR7e"]} -{"Format": "Json", "ID": "58229921-77b9-4b1d-a9e4-c3b720cfb93f", "DetectTime": "2023-10-30T14:10:24.799941+02:00", "EventTime": "2023-10-30T14:10:24.799955+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T06:52:35.443485+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2023/10/30 14:10:24.863679)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "99810123-949a-436a-8ba7-1c95870ea26f", "DetectTime": "2023-10-30T14:10:24.867907+02:00", "EventTime": "2023-10-30T14:10:24.867917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CunXRH2PW3Kpye9waa"]} -{"Format": "IDEA0", "ID": "05b98ab2-62c5-4172-bc82-d1cd022522a2", "DetectTime": "2023-10-30T14:10:24.887313+02:00", "EventTime": "2023-10-30T14:10:24.887324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoHYsV1FxhyrxKpJo7"]} -{"Format": "IDEA0", "ID": "10c54d31-544d-43e4-99a6-25045c3ea2e0", "DetectTime": "2023-10-30T14:10:24.907105+02:00", "EventTime": "2023-10-30T14:10:24.907122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["C87nSa2O2lg5tCNRFk"]} -{"Format": "IDEA0", "ID": "0dcd1e23-0f6f-4ff8-9c43-3a0377766f27", "DetectTime": "2023-10-30T14:10:24.937492+02:00", "EventTime": "2023-10-30T14:10:24.937508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C8CiWu1p4ogBQXkOl4"]} -{"Format": "IDEA0", "ID": "5829cea2-4e79-4615-8ca7-7085d29ac1bc", "DetectTime": "2023-10-30T14:10:24.965302+02:00", "EventTime": "2023-10-30T14:10:24.965319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Chpzea4kHCU4RyKs8l"]} -{"Format": "IDEA0", "ID": "715cd7c7-7f7a-4972-a455-8fefeafa77c7", "DetectTime": "2023-10-30T14:10:24.995353+02:00", "EventTime": "2023-10-30T14:10:24.995370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cfs9zA4qdRXJhoTGbc"]} -{"Format": "IDEA0", "ID": "a0fc80d8-d93f-4f5b-97b9-193c73ee260d", "DetectTime": "2023-10-30T14:10:25.024629+02:00", "EventTime": "2023-10-30T14:10:25.024644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CRAhPm3yYE4lUYJkW8"]} -{"Format": "IDEA0", "ID": "a3c73017-353f-4a97-b6a7-d1afb3499392", "DetectTime": "2023-10-30T14:10:25.052875+02:00", "EventTime": "2023-10-30T14:10:25.052891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["C7m1w42cvnjueLPEg2"]} -{"Format": "IDEA0", "ID": "c5ee6b12-070f-48c0-9053-6d47ae57b814", "DetectTime": "2023-10-30T14:10:25.081844+02:00", "EventTime": "2023-10-30T14:10:25.081859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C8DCaj1Vd4Jfvk7G35"]} -{"Format": "IDEA0", "ID": "c141b247-ab3a-430f-98ad-02e0937065c0", "DetectTime": "2023-10-30T14:10:25.116660+02:00", "EventTime": "2023-10-30T14:10:25.116680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CuOrRk4iPAIJ4XTazc"]} -{"Format": "IDEA0", "ID": "31aaf8b1-d44b-4364-8dcf-b86c5d6148fb", "DetectTime": "2023-10-30T14:10:25.144618+02:00", "EventTime": "2023-10-30T14:10:25.144636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CERR7q4CWLWeyEzhMg"]} -{"Format": "Json", "ID": "31aaf8b1-d44b-4364-8dcf-b86c5d6148fb", "DetectTime": "2023-10-30T14:10:25.144618+02:00", "EventTime": "2023-10-30T14:10:25.144636+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T07:22:57.237743+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2023/10/30 14:10:25.215298)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a0117cd6-7fba-4b9a-b593-b5e7339e5ce4", "DetectTime": "2023-10-30T14:10:25.220693+02:00", "EventTime": "2023-10-30T14:10:25.220709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4LyUf3eN4KlSQlWuk"]} -{"Format": "IDEA0", "ID": "d103fa4d-a3e7-47d1-8456-5cdf3cfecd9d", "DetectTime": "2023-10-30T14:10:25.248106+02:00", "EventTime": "2023-10-30T14:10:25.248121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CXvU5a1Nbv7R1ijELi"]} -{"Format": "IDEA0", "ID": "21a2cd6f-8442-4629-a1bd-73fa729d27d6", "DetectTime": "2023-10-30T14:10:25.285901+02:00", "EventTime": "2023-10-30T14:10:25.285916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["Cxgw7y29w9wqdLVb1g"]} -{"Format": "IDEA0", "ID": "c6603fc4-c43e-4266-90b7-23aef35190cc", "DetectTime": "2023-10-30T14:10:25.313324+02:00", "EventTime": "2023-10-30T14:10:25.313341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZResI5GRLJcvVsVh"]} -{"Format": "IDEA0", "ID": "653aa2a8-fbca-438d-9282-2c0e43e097a0", "DetectTime": "2023-10-30T14:10:25.336758+02:00", "EventTime": "2023-10-30T14:10:25.336769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CkgVqBAerk9Fu4J93"]} -{"Format": "IDEA0", "ID": "ba0d3b90-1a08-4675-97f2-7994701efbfc", "DetectTime": "2023-10-30T14:10:25.361281+02:00", "EventTime": "2023-10-30T14:10:25.361293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cw724j4EYqeHvqUEJ2"]} -{"Format": "IDEA0", "ID": "1fbca8ca-10b6-48dd-a69a-f0064a7c0615", "DetectTime": "2023-10-30T14:10:25.386071+02:00", "EventTime": "2023-10-30T14:10:25.386096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CGDPXk24PGuM2uLadi"]} -{"Format": "IDEA0", "ID": "f9453c1e-d95f-4ba0-bfa5-a99b5c2fffb9", "DetectTime": "2023-10-30T14:10:25.412958+02:00", "EventTime": "2023-10-30T14:10:25.412972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C0JHrWLwtIl2KeUc8"]} -{"Format": "Json", "ID": "f9453c1e-d95f-4ba0-bfa5-a99b5c2fffb9", "DetectTime": "2023-10-30T14:10:25.412958+02:00", "EventTime": "2023-10-30T14:10:25.412972+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T07:22:59.259910+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2023/10/30 14:10:25.480544)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2e5ad794-d6b6-40fa-82ad-8288acca026f", "DetectTime": "2023-10-30T14:10:25.486487+02:00", "EventTime": "2023-10-30T14:10:25.486507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cw3W1wckXnc1tkclj"]} -{"Format": "IDEA0", "ID": "8f4657ab-2896-4443-a50e-879bbf2d25d8", "DetectTime": "2023-10-30T14:10:25.516546+02:00", "EventTime": "2023-10-30T14:10:25.516562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CQxJ9V3BVEdX8xusqc"]} -{"Format": "IDEA0", "ID": "c037a1fd-fdf4-41e4-8b16-a68f69b92f86", "DetectTime": "2023-10-30T14:10:25.546744+02:00", "EventTime": "2023-10-30T14:10:25.546756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CqXjOw2rCJmorjh2Dd"]} -{"Format": "IDEA0", "ID": "a239c5b9-1cc8-4dc6-a6e0-6095f337e473", "DetectTime": "2023-10-30T14:10:25.572316+02:00", "EventTime": "2023-10-30T14:10:25.572333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CM9hs03jgZSsu7lq78"]} -{"Format": "IDEA0", "ID": "1d26a1a2-5ec2-4f8f-b0c7-f377460d6f46", "DetectTime": "2023-10-30T14:10:25.597932+02:00", "EventTime": "2023-10-30T14:10:25.597943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cq9Vx13KCUhwttdYce"]} -{"Format": "IDEA0", "ID": "3dbd3eb3-9693-4513-b48d-de1c21fd0cff", "DetectTime": "2023-10-30T14:10:25.627236+02:00", "EventTime": "2023-10-30T14:10:25.627252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CSgjFr3KIOzlomzEf9"]} -{"Format": "IDEA0", "ID": "61c88f09-75aa-4f61-b280-bdf9a860348c", "DetectTime": "2023-10-30T14:10:25.654971+02:00", "EventTime": "2023-10-30T14:10:25.654987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C3mLz1232dR0qpTc73"]} -{"Format": "IDEA0", "ID": "05806e97-548a-4766-af78-553854371c72", "DetectTime": "2023-10-30T14:10:25.679750+02:00", "EventTime": "2023-10-30T14:10:25.679764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CCF8954lHOvaqsu6ze"]} -{"Format": "IDEA0", "ID": "e8fd23fb-2d61-45f3-a7ac-a63245abb59d", "DetectTime": "2023-10-30T14:10:25.704375+02:00", "EventTime": "2023-10-30T14:10:25.704392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CtrMhq3HlxF34UzmCe"]} -{"Format": "Json", "ID": "e8fd23fb-2d61-45f3-a7ac-a63245abb59d", "DetectTime": "2023-10-30T14:10:25.704375+02:00", "EventTime": "2023-10-30T14:10:25.704392+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T07:23:01.736303+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2023/10/30 14:10:25.765934)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "971eb8fd-0b17-479f-a26e-a7800f9f508e", "DetectTime": "2023-10-30T14:10:25.771114+02:00", "EventTime": "2023-10-30T14:10:25.771129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CjwsFh4j38AHJOlCNc"]} -{"Format": "IDEA0", "ID": "7cd0256f-f8e8-4e15-84c9-c4f9699793a2", "DetectTime": "2023-10-30T14:10:25.796917+02:00", "EventTime": "2023-10-30T14:10:25.796929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CAEk9U1F13ERqe0lLg"]} -{"Format": "IDEA0", "ID": "8ca31ae5-8245-4884-9ec1-271641aa0ec8", "DetectTime": "2023-10-30T14:10:25.819681+02:00", "EventTime": "2023-10-30T14:10:25.819696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIIfuousD0e0GTEPg"]} -{"Format": "IDEA0", "ID": "310d08e2-42f5-4006-ad03-9b27fab64223", "DetectTime": "2023-10-30T14:10:25.844503+02:00", "EventTime": "2023-10-30T14:10:25.844528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C8J9lA4OmU8AvciSK9"]} -{"Format": "IDEA0", "ID": "c95d435b-4cda-4155-a6fc-60f9574f4b40", "DetectTime": "2023-10-30T14:10:25.867835+02:00", "EventTime": "2023-10-30T14:10:25.867852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CE959v4CYcHm0VTdC3"]} -{"Format": "IDEA0", "ID": "80a43aa6-2f4a-4380-b485-40876c0901c3", "DetectTime": "2023-10-30T14:10:25.890088+02:00", "EventTime": "2023-10-30T14:10:25.890104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C0gunR2Ej2gybOExw6"]} -{"Format": "IDEA0", "ID": "7833d179-416b-493c-bf83-f5408c5804cf", "DetectTime": "2023-10-30T14:10:25.914056+02:00", "EventTime": "2023-10-30T14:10:25.914076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CibuctG0Ar8goFmgf"]} -{"Format": "IDEA0", "ID": "668687f0-a8f2-48cb-a99f-5a2f07c32328", "DetectTime": "2023-10-30T14:10:25.938920+02:00", "EventTime": "2023-10-30T14:10:25.938936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CEkVSZ286WBhjVnVug"]} -{"Format": "IDEA0", "ID": "25d4a405-d73d-4853-9326-ae28723593bc", "DetectTime": "2023-10-30T14:10:25.961679+02:00", "EventTime": "2023-10-30T14:10:25.961690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Ck1bf63awGWeyjI0bc"]} -{"Format": "Json", "ID": "25d4a405-d73d-4853-9326-ae28723593bc", "DetectTime": "2023-10-30T14:10:25.961679+02:00", "EventTime": "2023-10-30T14:10:25.961690+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T07:53:29.784214+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2023/10/30 14:10:26.091282)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "201a508d-1620-43f7-9a2f-17b0888c9874", "DetectTime": "2023-10-30T14:10:26.096979+02:00", "EventTime": "2023-10-30T14:10:26.097000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CESc033eQgntVY5mdg"]} -{"Format": "IDEA0", "ID": "a9efb59c-416a-47f5-9722-2308c368371c", "DetectTime": "2023-10-30T14:10:26.125879+02:00", "EventTime": "2023-10-30T14:10:26.125902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CocW3j1ArhEvTSWKj4"]} -{"Format": "IDEA0", "ID": "072cdb49-13ab-4d53-96b8-866d4307fff9", "DetectTime": "2023-10-30T14:10:26.147322+02:00", "EventTime": "2023-10-30T14:10:26.147338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C7f2IlQd7ROnzzyag"]} -{"Format": "IDEA0", "ID": "476ed0ae-5a17-4fcb-a87e-24efd04a1086", "DetectTime": "2023-10-30T14:10:26.172642+02:00", "EventTime": "2023-10-30T14:10:26.172663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CGIf9h2DM8iSAT3ozk"]} -{"Format": "IDEA0", "ID": "c89254d4-8382-4d27-901f-8d4ae1a8f7bb", "DetectTime": "2023-10-30T14:10:26.194071+02:00", "EventTime": "2023-10-30T14:10:26.194082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CGoOhjojtwFIpgIq3"]} -{"Format": "IDEA0", "ID": "ffc5e5fa-f531-4a39-ac25-f22d11ffe06a", "DetectTime": "2023-10-30T14:10:26.218820+02:00", "EventTime": "2023-10-30T14:10:26.218838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CmbSvaDjdkALVzmEc"]} -{"Format": "IDEA0", "ID": "08da5c97-9466-426d-add0-4811b7a924f0", "DetectTime": "2023-10-30T14:10:26.242445+02:00", "EventTime": "2023-10-30T14:10:26.242462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cl4FCr3mnwe4MPuFPd"]} -{"Format": "IDEA0", "ID": "7dad298a-281e-451b-9b7b-748c19965fd0", "DetectTime": "2023-10-30T14:10:26.271189+02:00", "EventTime": "2023-10-30T14:10:26.271213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CCfkE03FdB9nGR3ve"]} -{"Format": "Json", "ID": "7dad298a-281e-451b-9b7b-748c19965fd0", "DetectTime": "2023-10-30T14:10:26.271189+02:00", "EventTime": "2023-10-30T14:10:26.271213+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T07:53:32.204479+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2023/10/30 14:10:26.336720)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd55680e-244b-4b4a-b4ed-cb0204498ca8", "DetectTime": "2023-10-30T14:10:26.342643+02:00", "EventTime": "2023-10-30T14:10:26.342661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CrN9bl31m3Nds75WC1"]} -{"Format": "IDEA0", "ID": "8c0d9b54-e085-48a9-a201-656bd5d14b71", "DetectTime": "2023-10-30T14:10:26.367807+02:00", "EventTime": "2023-10-30T14:10:26.367826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CFt2Oe4hsDS5sDaTVj"]} -{"Format": "IDEA0", "ID": "fe94442e-1243-49a1-8c04-2c49575c7af6", "DetectTime": "2023-10-30T14:10:26.390109+02:00", "EventTime": "2023-10-30T14:10:26.390125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C87AEa4kpBloc7nJc9"]} -{"Format": "IDEA0", "ID": "6655d33a-1b09-41c4-9dc6-68da08b61133", "DetectTime": "2023-10-30T14:10:26.412638+02:00", "EventTime": "2023-10-30T14:10:26.412669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CczRvp2wZRiKyvYOIa"]} -{"Format": "IDEA0", "ID": "81266ef4-4422-4203-8038-2cd8dafbc20b", "DetectTime": "2023-10-30T14:10:26.437073+02:00", "EventTime": "2023-10-30T14:10:26.437092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["Cm50S41hftpZ0R2Rvk"]} -{"Format": "IDEA0", "ID": "96bba4bc-1671-4679-a96c-f5b21299c243", "DetectTime": "2023-10-30T14:10:26.458698+02:00", "EventTime": "2023-10-30T14:10:26.458714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3TBnx1ffdfGc8PEz4"]} -{"Format": "IDEA0", "ID": "9f819f3a-9c9d-43e1-ae6e-d5ef9efe59f4", "DetectTime": "2023-10-30T14:10:26.482697+02:00", "EventTime": "2023-10-30T14:10:26.482713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C99TMt399wzJwCKIx6"]} -{"Format": "IDEA0", "ID": "7bbce8d8-4488-4f50-9f00-cd9b1b504203", "DetectTime": "2023-10-30T14:10:26.505625+02:00", "EventTime": "2023-10-30T14:10:26.505636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CRrxcJ1DNww7kNBqe"]} -{"Format": "Json", "ID": "7bbce8d8-4488-4f50-9f00-cd9b1b504203", "DetectTime": "2023-10-30T14:10:26.505625+02:00", "EventTime": "2023-10-30T14:10:26.505636+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T07:53:34.991417+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2023/10/30 14:10:26.565903)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f566fce-d58e-47b0-97dd-9511faf7ff13", "DetectTime": "2023-10-30T14:10:26.571492+02:00", "EventTime": "2023-10-30T14:10:26.571508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CbY72r2kHadLMfTf29"]} -{"Format": "IDEA0", "ID": "cfda5ca7-6c12-400a-a973-c775b224015d", "DetectTime": "2023-10-30T14:10:26.599716+02:00", "EventTime": "2023-10-30T14:10:26.599738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CUIqh02Ham8MSkd2s3"]} -{"Format": "IDEA0", "ID": "dc507b97-8477-4640-b242-3294252b65ff", "DetectTime": "2023-10-30T14:10:26.617458+02:00", "EventTime": "2023-10-30T14:10:26.617471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C5S72I37LDCzTthGM1"]} -{"Format": "IDEA0", "ID": "98bcd140-a106-4761-a539-5d53e8d6f64f", "DetectTime": "2023-10-30T14:10:26.635587+02:00", "EventTime": "2023-10-30T14:10:26.635612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CrheBc2MNKo8DID4ub"]} -{"Format": "IDEA0", "ID": "752e7b09-bab9-4a1c-bde1-47e057a88004", "DetectTime": "2023-10-30T14:10:26.654097+02:00", "EventTime": "2023-10-30T14:10:26.654108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CCeSZl2dbRiSvblFNd"]} -{"Format": "IDEA0", "ID": "45a9ae8a-81ef-49b8-94f6-9107aa14019f", "DetectTime": "2023-10-30T14:10:26.671308+02:00", "EventTime": "2023-10-30T14:10:26.671319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CPFbcy42NT1fIwINqh"]} -{"Format": "IDEA0", "ID": "94922233-4978-44f2-b12a-f395576878c5", "DetectTime": "2023-10-30T14:10:26.706139+02:00", "EventTime": "2023-10-30T14:10:26.706155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CE3eLf2ieRS2uCZnpa"]} -{"Format": "IDEA0", "ID": "6a56af5b-1408-435e-bd66-bea3e740c0de", "DetectTime": "2023-10-30T14:10:26.742974+02:00", "EventTime": "2023-10-30T14:10:26.742992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CXqF2m2jtFTp2LkeL7"]} -{"Format": "IDEA0", "ID": "1b45aadb-0a6f-4d47-a86a-c86d9678412e", "DetectTime": "2023-10-30T14:10:26.776022+02:00", "EventTime": "2023-10-30T14:10:26.776047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CsK1wu1DGqH0mknGKb"]} -{"Format": "IDEA0", "ID": "4bd2b9a2-f764-4263-9985-a9c8adc282c6", "DetectTime": "2023-10-30T14:10:26.812570+02:00", "EventTime": "2023-10-30T14:10:26.812586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cd4aPg38YMjHZlhy23"]} -{"Format": "IDEA0", "ID": "e3008517-8c8f-401a-a4dc-3c14a5d76de5", "DetectTime": "2023-10-30T14:10:26.844440+02:00", "EventTime": "2023-10-30T14:10:26.844456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10047], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. ", "ContentType": "text/plain"}], "uids": ["Cv1Vu2136ZysvQO4Ee"]} -{"Format": "IDEA0", "ID": "f19296c0-a380-4923-98b1-f7b7bcc93700", "DetectTime": "2023-10-30T14:10:26.878606+02:00", "EventTime": "2023-10-30T14:10:26.878624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CAieC71IV0hbZWJexa"]} -{"Format": "Json", "ID": "f19296c0-a380-4923-98b1-f7b7bcc93700", "DetectTime": "2023-10-30T14:10:26.878606+02:00", "EventTime": "2023-10-30T14:10:26.878624+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T08:23:38.241112+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2023/10/30 14:10:26.968897)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0f0cf874-c2b5-43c4-9c03-9cc2b523e423", "DetectTime": "2023-10-30T14:10:26.974530+02:00", "EventTime": "2023-10-30T14:10:26.974543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["Cywowh1IduBbqMzNOc"]} -{"Format": "IDEA0", "ID": "4bb5bc3f-41c0-4310-8b52-448a10c4dd75", "DetectTime": "2023-10-30T14:10:27.008000+02:00", "EventTime": "2023-10-30T14:10:27.008012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CDxoqH1fA4Hk7uZ5Cj"]} -{"Format": "IDEA0", "ID": "568a0e39-5a5c-46bd-a5e2-c46f87f45eff", "DetectTime": "2023-10-30T14:10:27.037543+02:00", "EventTime": "2023-10-30T14:10:27.037560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CmXsPb1XvDRch0v1Il"]} -{"Format": "IDEA0", "ID": "e5317b5a-450e-4653-bae3-5116cf49d141", "DetectTime": "2023-10-30T14:10:27.071536+02:00", "EventTime": "2023-10-30T14:10:27.071553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cax3By31GPfqTg0u13"]} -{"Format": "IDEA0", "ID": "496f9673-a85a-4409-87f0-b51b637c97df", "DetectTime": "2023-10-30T14:10:27.102759+02:00", "EventTime": "2023-10-30T14:10:27.102776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CBtCLp1AAUBOEbbns"]} -{"Format": "IDEA0", "ID": "7da72dc5-fc92-47a7-9b3f-b3b3d1bf5f15", "DetectTime": "2023-10-30T14:10:27.131352+02:00", "EventTime": "2023-10-30T14:10:27.131367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CPkYQz13QETJrllet5"]} -{"Format": "IDEA0", "ID": "decee9c1-71cb-4a48-9e08-d32cbdd78d08", "DetectTime": "2023-10-30T14:10:27.162445+02:00", "EventTime": "2023-10-30T14:10:27.162461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CutMU0438r3vFqG5M4"]} -{"Format": "IDEA0", "ID": "26424a80-317e-41b9-8d41-aeb3fd1d3091", "DetectTime": "2023-10-30T14:10:27.194207+02:00", "EventTime": "2023-10-30T14:10:27.194218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C1qQYF2cEK2RID7qs2"]} -{"Format": "IDEA0", "ID": "2eab8282-2c7b-420d-b950-68451b8c3aed", "DetectTime": "2023-10-30T14:10:27.223159+02:00", "EventTime": "2023-10-30T14:10:27.223182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cg99mZ2Z6u6OhhX0n3"]} -{"Format": "Json", "ID": "2eab8282-2c7b-420d-b950-68451b8c3aed", "DetectTime": "2023-10-30T14:10:27.223159+02:00", "EventTime": "2023-10-30T14:10:27.223182+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T08:23:39.989150+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2023/10/30 14:10:27.294542)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31b1a0cd-4287-466e-ae04-9b5d85b724e3", "DetectTime": "2023-10-30T14:10:27.299821+02:00", "EventTime": "2023-10-30T14:10:27.299841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CXvfCq3RgunIw96Byk"]} -{"Format": "IDEA0", "ID": "3dd4389d-bfe2-4a16-8e0c-8fa7b0810585", "DetectTime": "2023-10-30T14:10:27.331827+02:00", "EventTime": "2023-10-30T14:10:27.331844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXEHGd2UHsnr3EjZG9"]} -{"Format": "IDEA0", "ID": "52f8b915-0961-4462-9537-2dd3f6723b87", "DetectTime": "2023-10-30T14:10:27.365757+02:00", "EventTime": "2023-10-30T14:10:27.365775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CvzCWF2DshGohxF2A2"]} -{"Format": "IDEA0", "ID": "1378df52-c862-46fe-9c54-e3b6e20f30b3", "DetectTime": "2023-10-30T14:10:27.397612+02:00", "EventTime": "2023-10-30T14:10:27.397629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7296], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. ", "ContentType": "text/plain"}], "uids": ["CdT7Or1aEyBFDpip6l"]} -{"Format": "IDEA0", "ID": "58297df4-33db-48aa-a76e-818f27a27c4f", "DetectTime": "2023-10-30T14:10:27.431355+02:00", "EventTime": "2023-10-30T14:10:27.431383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cjc5TpIRGE36PJTL3"]} -{"Format": "IDEA0", "ID": "22663db2-fc54-4473-b90f-1f5a5a0f12a6", "DetectTime": "2023-10-30T14:10:27.464349+02:00", "EventTime": "2023-10-30T14:10:27.464368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C0RXVc2Jvl367u8kW4"]} -{"Format": "IDEA0", "ID": "ddfe7cd5-f561-4da5-b31a-0e729d6855e3", "DetectTime": "2023-10-30T14:10:27.498622+02:00", "EventTime": "2023-10-30T14:10:27.498640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CpcpyImUAG54Zuwa6"]} -{"Format": "IDEA0", "ID": "ea431069-c6c6-4c77-8f26-575e9e52d227", "DetectTime": "2023-10-30T14:10:27.533245+02:00", "EventTime": "2023-10-30T14:10:27.533257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CnSpF23s6uPW8SzxY7"]} -{"Format": "IDEA0", "ID": "9b6fe627-1b7e-44ad-ad99-c5252135003a", "DetectTime": "2023-10-30T14:10:27.560321+02:00", "EventTime": "2023-10-30T14:10:27.560337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CQYrv71tez7zF9ETtk"]} -{"Format": "Json", "ID": "9b6fe627-1b7e-44ad-ad99-c5252135003a", "DetectTime": "2023-10-30T14:10:27.560321+02:00", "EventTime": "2023-10-30T14:10:27.560337+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T08:23:42.471640+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2023/10/30 14:10:27.630104)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "36f92f32-ab35-4d00-9f75-860a45be5ccc", "DetectTime": "2023-10-30T14:10:27.634873+02:00", "EventTime": "2023-10-30T14:10:27.634889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CCuvgndKysJDQI5Ki"]} -{"Format": "IDEA0", "ID": "8b1926e2-f95a-4beb-9128-b8b62279d7af", "DetectTime": "2023-10-30T14:10:27.660827+02:00", "EventTime": "2023-10-30T14:10:27.660846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHBLE8Kms66Q6gPGa"]} -{"Format": "IDEA0", "ID": "a2870ecc-e4cd-42fb-bd8e-b9f2595d46ab", "DetectTime": "2023-10-30T14:10:27.685952+02:00", "EventTime": "2023-10-30T14:10:27.685978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CO8sPL3mghQEE7YUY3"]} -{"Format": "IDEA0", "ID": "6351252b-87e3-4136-8a18-3b551097ad08", "DetectTime": "2023-10-30T14:10:27.708721+02:00", "EventTime": "2023-10-30T14:10:27.708740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C1WJgg1y26KqN8mWjj"]} -{"Format": "IDEA0", "ID": "a2d1b8c4-1404-42d4-be29-0770b0a453c2", "DetectTime": "2023-10-30T14:10:27.733291+02:00", "EventTime": "2023-10-30T14:10:27.733304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CBq3QR2WtTluzyojij"]} -{"Format": "IDEA0", "ID": "2fed93dc-efd5-467e-ab0a-0d82adae452d", "DetectTime": "2023-10-30T14:10:27.757399+02:00", "EventTime": "2023-10-30T14:10:27.757412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["CExlpo4ZCU2lNGYaba"]} -{"Format": "IDEA0", "ID": "6d4ca2b0-2a0f-4a60-8e68-16e679b9227f", "DetectTime": "2023-10-30T14:10:27.785121+02:00", "EventTime": "2023-10-30T14:10:27.785137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CK2m2R1ClXfhA2MMWj"]} -{"Format": "IDEA0", "ID": "e9575020-ca65-4c4a-aaad-ed73681238c5", "DetectTime": "2023-10-30T14:10:27.809312+02:00", "EventTime": "2023-10-30T14:10:27.809328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CMzkY83BQl2BTkSYPg"]} -{"Format": "IDEA0", "ID": "c4cfe4b2-a69d-4a20-8e09-7b273d0c7236", "DetectTime": "2023-10-30T14:10:27.834056+02:00", "EventTime": "2023-10-30T14:10:27.834071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CsfU6uc7hWxmuG8rb"]} -{"Format": "Json", "ID": "c4cfe4b2-a69d-4a20-8e09-7b273d0c7236", "DetectTime": "2023-10-30T14:10:27.834056+02:00", "EventTime": "2023-10-30T14:10:27.834071+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T08:54:19.525309+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2023/10/30 14:10:27.896772)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed7ba549-a449-4d38-b355-8994fa50d381", "DetectTime": "2023-10-30T14:10:27.900964+02:00", "EventTime": "2023-10-30T14:10:27.900982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmS3YD1HglonRebd12"]} -{"Format": "IDEA0", "ID": "ab4f12a7-d6fa-475d-ab0e-e56e44949ddf", "DetectTime": "2023-10-30T14:10:27.925764+02:00", "EventTime": "2023-10-30T14:10:27.925779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["CsZxf01Q6oV8JIqSF7"]} -{"Format": "IDEA0", "ID": "1ccdb62f-2019-4759-b85c-3c42d8ce2a00", "DetectTime": "2023-10-30T14:10:27.949483+02:00", "EventTime": "2023-10-30T14:10:27.949499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXZzpxxXOt0kC1M53"]} -{"Format": "IDEA0", "ID": "d12802b1-9a0e-4c77-84b4-498da3d06ac6", "DetectTime": "2023-10-30T14:10:27.970929+02:00", "EventTime": "2023-10-30T14:10:27.970943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ChIxVB3ZtU1DbyXUm4"]} -{"Format": "IDEA0", "ID": "99e71232-24a5-412f-9190-f89e333ee721", "DetectTime": "2023-10-30T14:10:27.993005+02:00", "EventTime": "2023-10-30T14:10:27.993017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CgYV1Y1hMtsS5RKXCh"]} -{"Format": "IDEA0", "ID": "33e178cc-197a-486d-8dfb-53f118858523", "DetectTime": "2023-10-30T14:10:28.014885+02:00", "EventTime": "2023-10-30T14:10:28.014903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C6GFq33JcL4xodexq2"]} -{"Format": "IDEA0", "ID": "b48521c2-5bea-4e2e-9eec-d418ec4985c5", "DetectTime": "2023-10-30T14:10:28.037942+02:00", "EventTime": "2023-10-30T14:10:28.037962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CeXRgs22q3fsrXkek6"]} -{"Format": "IDEA0", "ID": "13a30324-d37f-40b1-99aa-839ec5b82c53", "DetectTime": "2023-10-30T14:10:28.061297+02:00", "EventTime": "2023-10-30T14:10:28.061314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CGPW2Qiu8K803bWjh"]} -{"Format": "Json", "ID": "13a30324-d37f-40b1-99aa-839ec5b82c53", "DetectTime": "2023-10-30T14:10:28.061297+02:00", "EventTime": "2023-10-30T14:10:28.061314+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T08:54:37.632868+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2023/10/30 14:10:28.122089)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "56744956-03b7-41c3-b967-e83ae2b78d1c", "DetectTime": "2023-10-30T14:10:28.127514+02:00", "EventTime": "2023-10-30T14:10:28.127530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CyJqfEG00BNu4osua"]} -{"Format": "IDEA0", "ID": "04030520-f9a0-4e38-9f80-27f1041af7f1", "DetectTime": "2023-10-30T14:10:28.150319+02:00", "EventTime": "2023-10-30T14:10:28.150335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CyF1iEAJe5ORwfa1k"]} -{"Format": "IDEA0", "ID": "3faf292a-4796-4803-bf88-9acb55c1edb6", "DetectTime": "2023-10-30T14:10:28.172615+02:00", "EventTime": "2023-10-30T14:10:28.172626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CJ613834U2vjfxniNb"]} -{"Format": "IDEA0", "ID": "c9a1d6a0-69b7-49b0-9dd6-4e43277f308d", "DetectTime": "2023-10-30T14:10:28.193308+02:00", "EventTime": "2023-10-30T14:10:28.193326+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 109.231.62.73 from 10.0.2.19. blacklisted IP AS: KOBA-AS Polish ISP, PL AS3452 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C3L0yU1fnf1o14hvTd"]} -{"Format": "IDEA0", "ID": "7bb37161-14ec-4c88-bedd-a8ce2fe81752", "DetectTime": "2023-10-30T14:10:28.219689+02:00", "EventTime": "2023-10-30T14:10:28.219718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CSpoDZ3eppXbWSUc9c"]} -{"Format": "IDEA0", "ID": "02539a54-6875-447a-9eea-5a3152d9c608", "DetectTime": "2023-10-30T14:10:28.238934+02:00", "EventTime": "2023-10-30T14:10:28.238946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C69MHt3xgrVqXhFtzb"]} -{"Format": "IDEA0", "ID": "1e8df0c4-a3a7-465f-916d-f7dfb617cfa5", "DetectTime": "2023-10-30T14:10:28.260006+02:00", "EventTime": "2023-10-30T14:10:28.260022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C5asM43NEYefG2nYqa"]} -{"Format": "IDEA0", "ID": "44a57720-4795-4e3f-b9cf-b46f1f23d7eb", "DetectTime": "2023-10-30T14:10:28.281628+02:00", "EventTime": "2023-10-30T14:10:28.281643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CQREXB4l4sfH0YFW25"]} -{"Format": "IDEA0", "ID": "299274ba-980f-41b6-8801-b5014b5ddb01", "DetectTime": "2023-10-30T14:10:28.306607+02:00", "EventTime": "2023-10-30T14:10:28.306622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CsPAaZ2b95YXXDfkPc"]} -{"Format": "IDEA0", "ID": "d5b5fee0-2225-4651-b262-9135a3c2514e", "DetectTime": "2023-10-30T14:10:28.325899+02:00", "EventTime": "2023-10-30T14:10:28.325910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cm7Ine4u19RFAoyk5"]} -{"Format": "Json", "ID": "d5b5fee0-2225-4651-b262-9135a3c2514e", "DetectTime": "2023-10-30T14:10:28.325899+02:00", "EventTime": "2023-10-30T14:10:28.325910+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T08:54:55.975969+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2023/10/30 14:10:28.383864)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2defccad-6bbb-4470-ac91-1837eec953b7", "DetectTime": "2023-10-30T14:10:28.388211+02:00", "EventTime": "2023-10-30T14:10:28.388228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C6D0Di12A2XPoJeXn7"]} -{"Format": "IDEA0", "ID": "9dd323c4-3f00-4f81-8840-5fefb6a4674b", "DetectTime": "2023-10-30T14:10:28.407312+02:00", "EventTime": "2023-10-30T14:10:28.407328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CKWHQp2rP1PwMcrmL2"]} -{"Format": "IDEA0", "ID": "bfe97737-4d85-413b-83d8-ed7e231d551a", "DetectTime": "2023-10-30T14:10:28.424712+02:00", "EventTime": "2023-10-30T14:10:28.424734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMNi0x1C1wkul5AZt2"]} -{"Format": "IDEA0", "ID": "5d5abd51-68f0-425e-ac12-7a39b41bb6dd", "DetectTime": "2023-10-30T14:10:28.443212+02:00", "EventTime": "2023-10-30T14:10:28.443228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CCBtV51zDXebx8BWF4"]} -{"Format": "IDEA0", "ID": "f236f665-ea17-476a-b3a2-e7f0fc27b212", "DetectTime": "2023-10-30T14:10:28.476743+02:00", "EventTime": "2023-10-30T14:10:28.476759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CWrBEy5qfLnO3d7Qe"]} -{"Format": "IDEA0", "ID": "6fa2f404-440e-402c-a2ed-aaa30259bba8", "DetectTime": "2023-10-30T14:10:28.510110+02:00", "EventTime": "2023-10-30T14:10:28.510130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CXq52Qz8qFSl6bQW7"]} -{"Format": "IDEA0", "ID": "68103b19-4e86-4541-af8e-c89a642830e2", "DetectTime": "2023-10-30T14:10:28.543034+02:00", "EventTime": "2023-10-30T14:10:28.543046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CxDUdi2r9HF8wqzyJc"]} -{"Format": "IDEA0", "ID": "bb72238f-9bca-4761-b8ea-474f0c63ca83", "DetectTime": "2023-10-30T14:10:28.576912+02:00", "EventTime": "2023-10-30T14:10:28.576928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8272], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. ", "ContentType": "text/plain"}], "uids": ["Cd67mAfDF6MEaH1p"]} -{"Format": "IDEA0", "ID": "6326985b-698b-476d-b2f3-9be35cbd0689", "DetectTime": "2023-10-30T14:10:28.610758+02:00", "EventTime": "2023-10-30T14:10:28.610773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C71R75XBxKgm8djvd"]} -{"Format": "IDEA0", "ID": "e7fec3ed-60de-4e8e-8440-711f21f3df5f", "DetectTime": "2023-10-30T14:10:28.640716+02:00", "EventTime": "2023-10-30T14:10:28.640729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyakW51t91WovvYpd1"]} -{"Format": "IDEA0", "ID": "2de96f85-ebb3-49e9-b8c5-7448e89a458c", "DetectTime": "2023-10-30T14:10:28.673888+02:00", "EventTime": "2023-10-30T14:10:28.673905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CUMhZN2r7yLhQOg5Tk"]} -{"Format": "Json", "ID": "2de96f85-ebb3-49e9-b8c5-7448e89a458c", "DetectTime": "2023-10-30T14:10:28.673888+02:00", "EventTime": "2023-10-30T14:10:28.673905+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T09:25:32.540948+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2023/10/30 14:10:28.741487)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b58821e3-0472-4d0e-80fe-6fcd56ef011d", "DetectTime": "2023-10-30T14:10:28.746092+02:00", "EventTime": "2023-10-30T14:10:28.746105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6049], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. ", "ContentType": "text/plain"}], "uids": ["Cz7rCm1qHXY6e8JzBi"]} -{"Format": "IDEA0", "ID": "39d46ffa-ef7f-478c-9f44-9a25e49e0a3c", "DetectTime": "2023-10-30T14:10:28.779931+02:00", "EventTime": "2023-10-30T14:10:28.779946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6553], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. ", "ContentType": "text/plain"}], "uids": ["CeAOPx2OSrWPReleD9"]} -{"Format": "IDEA0", "ID": "c7dd305b-639e-44ab-9d90-de9644507d41", "DetectTime": "2023-10-30T14:10:28.814051+02:00", "EventTime": "2023-10-30T14:10:28.814067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CjhIpN2CoucQdPJ5v6"]} -{"Format": "IDEA0", "ID": "90177abb-f78e-4e3f-b86d-51e6e4009696", "DetectTime": "2023-10-30T14:10:28.842971+02:00", "EventTime": "2023-10-30T14:10:28.842986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Ckq8c12vCUZEyWaXfj"]} -{"Format": "IDEA0", "ID": "d625982c-7902-4821-9bc7-01d88430e241", "DetectTime": "2023-10-30T14:10:28.871703+02:00", "EventTime": "2023-10-30T14:10:28.871713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CpQpnA5tLxisqYVMj"]} -{"Format": "IDEA0", "ID": "d3319211-86b3-4244-9078-583f706d2c64", "DetectTime": "2023-10-30T14:10:28.895083+02:00", "EventTime": "2023-10-30T14:10:28.895099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CKmt2C10hQtro2DnW"]} -{"Format": "IDEA0", "ID": "b2553464-9a7d-412f-9e4f-c061ab15dc14", "DetectTime": "2023-10-30T14:10:28.927867+02:00", "EventTime": "2023-10-30T14:10:28.927882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CvOMOH38Bba3XTlS06"]} -{"Format": "IDEA0", "ID": "4010d1f8-13dd-45b7-bba3-6c110852d8f8", "DetectTime": "2023-10-30T14:10:28.958357+02:00", "EventTime": "2023-10-30T14:10:28.958372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CQqzkl2ireOQ710rYi"]} -{"Format": "IDEA0", "ID": "bfe49981-1d51-439a-9d17-cffa2bb05d5b", "DetectTime": "2023-10-30T14:10:28.987962+02:00", "EventTime": "2023-10-30T14:10:28.987977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CIPfxziwrPCvmBPLh"]} -{"Format": "Json", "ID": "bfe49981-1d51-439a-9d17-cffa2bb05d5b", "DetectTime": "2023-10-30T14:10:28.987962+02:00", "EventTime": "2023-10-30T14:10:28.987977+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T09:25:34.486888+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2023/10/30 14:10:29.046891)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b98d0774-d6f9-4566-9293-44651c6de519", "DetectTime": "2023-10-30T14:10:29.051555+02:00", "EventTime": "2023-10-30T14:10:29.051570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CaHhPG24A43OHHnbv6"]} -{"Format": "IDEA0", "ID": "6ed0e5c0-0e58-4515-a6ee-9dea7134d43d", "DetectTime": "2023-10-30T14:10:29.081980+02:00", "EventTime": "2023-10-30T14:10:29.081996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cbk9Ur3ahbSH0aZIBg"]} -{"Format": "IDEA0", "ID": "16bd4efb-6e31-4bf1-9acd-41833d7385eb", "DetectTime": "2023-10-30T14:10:29.109406+02:00", "EventTime": "2023-10-30T14:10:29.109420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CaTDxv3qfC4cNsUfs4"]} -{"Format": "IDEA0", "ID": "a59dd0ea-6883-4d93-b305-78ca53056aa9", "DetectTime": "2023-10-30T14:10:29.135603+02:00", "EventTime": "2023-10-30T14:10:29.135620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CR92u92kxpWO8GfOQ9"]} -{"Format": "IDEA0", "ID": "6be32768-0ca6-4c9f-9054-3333a9c70e41", "DetectTime": "2023-10-30T14:10:29.161211+02:00", "EventTime": "2023-10-30T14:10:29.161235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Co5SZ93OS3JgJeq5If"]} -{"Format": "IDEA0", "ID": "9218d599-5ffc-4f30-a9ac-a688b9b2fa15", "DetectTime": "2023-10-30T14:10:29.187167+02:00", "EventTime": "2023-10-30T14:10:29.187179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CDM6lHQL2i1DYebBa"]} -{"Format": "IDEA0", "ID": "813f4a7d-ec53-4207-9267-bb9c5e35b316", "DetectTime": "2023-10-30T14:10:29.213988+02:00", "EventTime": "2023-10-30T14:10:29.214004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["ChTbGB4zWW64TKMBf3"]} -{"Format": "IDEA0", "ID": "1c1a8d1e-f62c-41ed-8140-f64f2180283c", "DetectTime": "2023-10-30T14:10:29.244017+02:00", "EventTime": "2023-10-30T14:10:29.244035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C0NtJ312U9TFq48Fa3"]} -{"Format": "Json", "ID": "1c1a8d1e-f62c-41ed-8140-f64f2180283c", "DetectTime": "2023-10-30T14:10:29.244017+02:00", "EventTime": "2023-10-30T14:10:29.244035+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T09:25:36.340156+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2023/10/30 14:10:29.313454)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bcefed65-8cbc-4fdb-bb19-bf4fca060c60", "DetectTime": "2023-10-30T14:10:29.319281+02:00", "EventTime": "2023-10-30T14:10:29.319301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6975], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6975/UDP destination IP 79.20.148.198. ", "ContentType": "text/plain"}], "uids": ["CiOfWo1I7DXz0CYb8f"]} -{"Format": "IDEA0", "ID": "9473f1e9-83b3-446e-aea8-0b6e8d5cc5e9", "DetectTime": "2023-10-30T14:10:29.348333+02:00", "EventTime": "2023-10-30T14:10:29.348347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CF2Uco4DhvENotdUF9"]} -{"Format": "IDEA0", "ID": "2428f6c3-c99c-44ae-9e68-917cb37076e8", "DetectTime": "2023-10-30T14:10:29.374017+02:00", "EventTime": "2023-10-30T14:10:29.374030+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CyuF5f3PR8zUo5bkQ8"]} -{"Format": "IDEA0", "ID": "58ad6b64-8734-428c-af8b-c424e7ddf395", "DetectTime": "2023-10-30T14:10:29.399976+02:00", "EventTime": "2023-10-30T14:10:29.399992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cxuwx03BycMkB9AJv2"]} -{"Format": "IDEA0", "ID": "289a5077-780d-43f6-9238-d76387c9a5b1", "DetectTime": "2023-10-30T14:10:29.429262+02:00", "EventTime": "2023-10-30T14:10:29.429279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CpjQjU3LJ9CiRVACn9"]} -{"Format": "IDEA0", "ID": "cda190ff-36ac-4cff-abb8-01eca68b2441", "DetectTime": "2023-10-30T14:10:29.456568+02:00", "EventTime": "2023-10-30T14:10:29.456583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["ClEwT3tDJSDIgzL53"]} -{"Format": "IDEA0", "ID": "78b0297a-3ee3-4cdd-ae81-55138fa161b7", "DetectTime": "2023-10-30T14:10:29.482686+02:00", "EventTime": "2023-10-30T14:10:29.482701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5248], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5248/UDP destination IP 87.17.251.64. ", "ContentType": "text/plain"}], "uids": ["Cz9TaL1SgdHB6jWLzl"]} -{"Format": "IDEA0", "ID": "8480caac-621a-456f-b581-2ff8f6f63621", "DetectTime": "2023-10-30T14:10:29.509775+02:00", "EventTime": "2023-10-30T14:10:29.509790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C4aWtP3RzpWck03fY3"]} -{"Format": "IDEA0", "ID": "94d55cf1-451f-43de-b6cb-9f12bdd26fec", "DetectTime": "2023-10-30T14:10:29.536783+02:00", "EventTime": "2023-10-30T14:10:29.536800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. ", "ContentType": "text/plain"}], "uids": ["CLIDnjGyi0VVOliVe"]} -{"Format": "Json", "ID": "94d55cf1-451f-43de-b6cb-9f12bdd26fec", "DetectTime": "2023-10-30T14:10:29.536783+02:00", "EventTime": "2023-10-30T14:10:29.536800+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T09:27:39.686974+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2023/10/30 14:10:29.597944)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4f2c587f-f0f2-476b-94ce-8f5e3ee82cd8", "DetectTime": "2023-10-30T14:10:29.603314+02:00", "EventTime": "2023-10-30T14:10:29.603329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C004LG26EMd0Bivipg"]} -{"Format": "IDEA0", "ID": "8c5fa8fb-4e46-475a-8092-507aa2652381", "DetectTime": "2023-10-30T14:10:29.629810+02:00", "EventTime": "2023-10-30T14:10:29.629826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3691], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3691/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["CkqeVkQ3SYfzxmQli"]} -{"Format": "IDEA0", "ID": "506921f3-2163-4738-b621-0811bd4effd9", "DetectTime": "2023-10-30T14:10:29.653369+02:00", "EventTime": "2023-10-30T14:10:29.653389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C0iuur2UAWPjIESQqc"]} -{"Format": "IDEA0", "ID": "fffc0898-5aa4-4cab-96d2-ece31736372b", "DetectTime": "2023-10-30T14:10:29.751485+02:00", "EventTime": "2023-10-30T14:10:29.751502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C7hPvq2qUYeaGcpQL"]} -{"Format": "IDEA0", "ID": "334d537c-5bc8-46ac-9368-9c99653e18d7", "DetectTime": "2023-10-30T14:10:29.779060+02:00", "EventTime": "2023-10-30T14:10:29.779081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CmO8Ks4b36QVuegtTd"]} -{"Format": "IDEA0", "ID": "2d84c646-2ae6-4dda-afcc-98efbba2310b", "DetectTime": "2023-10-30T14:10:29.803940+02:00", "EventTime": "2023-10-30T14:10:29.803957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C9QafE160q4nXY7dE4"]} -{"Format": "IDEA0", "ID": "1ef01525-150c-4cb8-806f-ddf7183cd896", "DetectTime": "2023-10-30T14:10:29.828220+02:00", "EventTime": "2023-10-30T14:10:29.828245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C3WOHNIL0gX8AcHpi"]} -{"Format": "IDEA0", "ID": "48430e42-6594-4334-b68a-04223697aed0", "DetectTime": "2023-10-30T14:10:29.858589+02:00", "EventTime": "2023-10-30T14:10:29.858601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CkrxF32KLhK4BmWPu2"]} -{"Format": "IDEA0", "ID": "0fbeb907-5764-461b-922b-1bcff2886c74", "DetectTime": "2023-10-30T14:10:29.884174+02:00", "EventTime": "2023-10-30T14:10:29.884193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CYDMTV33PTokFsVht5"]} -{"Format": "IDEA0", "ID": "a8548514-2ab1-49df-965a-6ff40547d280", "DetectTime": "2023-10-30T14:10:29.909282+02:00", "EventTime": "2023-10-30T14:10:29.909293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. ", "ContentType": "text/plain"}], "uids": ["CznUyZvAYoAuvFqI6"]} -{"Format": "Json", "ID": "a8548514-2ab1-49df-965a-6ff40547d280", "DetectTime": "2023-10-30T14:10:29.909282+02:00", "EventTime": "2023-10-30T14:10:29.909293+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2299], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T09:31:34.489651+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2023/10/30 14:10:29.973751)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "589ca523-dc3a-4304-8d47-fe65b806bdda", "DetectTime": "2023-10-30T14:10:29.978947+02:00", "EventTime": "2023-10-30T14:10:29.978962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CQjNHd1HC9pzhUbl"]} -{"Format": "IDEA0", "ID": "6b438720-8dfb-49cf-bef9-c86a0ebf68e0", "DetectTime": "2023-10-30T14:10:30.001997+02:00", "EventTime": "2023-10-30T14:10:30.002016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CWPfqd6IhpS2sVEUk"]} -{"Format": "IDEA0", "ID": "414490ad-9971-4601-90e2-332116a72477", "DetectTime": "2023-10-30T14:10:30.026315+02:00", "EventTime": "2023-10-30T14:10:30.026332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CvHGvB31DAInXEdTE3"]} -{"Format": "IDEA0", "ID": "90967861-3228-4276-b6c7-37e7a4fb61a2", "DetectTime": "2023-10-30T14:10:30.051225+02:00", "EventTime": "2023-10-30T14:10:30.051242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CeWxVZ2NGSAOjTq1Ll"]} -{"Format": "IDEA0", "ID": "c0630a12-1c8b-4b53-8d39-78a169f6d8bf", "DetectTime": "2023-10-30T14:10:30.076674+02:00", "EventTime": "2023-10-30T14:10:30.076694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CVzUfb13JTZyjQJgtc"]} -{"Format": "IDEA0", "ID": "3ce9fa17-925b-4980-b808-6007ae0fe444", "DetectTime": "2023-10-30T14:10:30.100834+02:00", "EventTime": "2023-10-30T14:10:30.100853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Crp0xZ1I02o3MG77pi"]} -{"Format": "IDEA0", "ID": "0f4c1be1-406b-4302-90b8-5adcda5cb644", "DetectTime": "2023-10-30T14:10:30.124191+02:00", "EventTime": "2023-10-30T14:10:30.124206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C1LISGkAxc0yaksMj"]} -{"Format": "IDEA0", "ID": "d67db063-f60b-4806-a0bc-a349324155af", "DetectTime": "2023-10-30T14:10:30.147456+02:00", "EventTime": "2023-10-30T14:10:30.147474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11614], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. ", "ContentType": "text/plain"}], "uids": ["CZiFXFKS9gliN8qbi"]} -{"Format": "IDEA0", "ID": "bdd77b39-065a-4e0b-883b-ce6b6f705bed", "DetectTime": "2023-10-30T14:10:30.172818+02:00", "EventTime": "2023-10-30T14:10:30.172834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CAw4TGTWPR38Pku8k"]} -{"Format": "Json", "ID": "bdd77b39-065a-4e0b-883b-ce6b6f705bed", "DetectTime": "2023-10-30T14:10:30.172818+02:00", "EventTime": "2023-10-30T14:10:30.172834+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T09:34:54.682425+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2023/10/30 14:10:30.240393)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a1c5ce4-41a2-42cb-b27a-79022153cf0a", "DetectTime": "2023-10-30T14:10:30.245554+02:00", "EventTime": "2023-10-30T14:10:30.245571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1943], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1943/UDP destination IP 181.135.143.64. ", "ContentType": "text/plain"}], "uids": ["CL8FvQ1SFLnMtqkCR7"]} -{"Format": "IDEA0", "ID": "68732560-9818-4620-949b-938fd936e382", "DetectTime": "2023-10-30T14:10:30.269815+02:00", "EventTime": "2023-10-30T14:10:30.269831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CxNtVN1Kqp83iJSjbg"]} -{"Format": "IDEA0", "ID": "ccdbcbf5-5d3c-40f6-872f-21a5fb5b003f", "DetectTime": "2023-10-30T14:10:30.295743+02:00", "EventTime": "2023-10-30T14:10:30.295755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["Cb2UjN1zZv8qY1gLah"]} -{"Format": "IDEA0", "ID": "02c89008-9cd7-4ede-becb-ea078c5e459d", "DetectTime": "2023-10-30T14:10:30.317347+02:00", "EventTime": "2023-10-30T14:10:30.317374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CB2zCJ5DcWrJ4di9i"]} -{"Format": "IDEA0", "ID": "eae44159-8517-4c59-8269-af716fdc6c19", "DetectTime": "2023-10-30T14:10:30.340382+02:00", "EventTime": "2023-10-30T14:10:30.340399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CgfZi529S8JiUrSIJb"]} -{"Format": "IDEA0", "ID": "02ea6d1e-301e-453c-9309-9239575cb850", "DetectTime": "2023-10-30T14:10:30.360076+02:00", "EventTime": "2023-10-30T14:10:30.360090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ChNWg71e6wCFOc0D2f"]} -{"Format": "IDEA0", "ID": "72724058-e20b-4466-8235-0a6c68962a29", "DetectTime": "2023-10-30T14:10:30.382529+02:00", "EventTime": "2023-10-30T14:10:30.382547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cickmj4BP2AzC7fMyi"]} -{"Format": "IDEA0", "ID": "7dc619b2-7c41-4bda-85c8-14abaa3ba158", "DetectTime": "2023-10-30T14:10:30.409838+02:00", "EventTime": "2023-10-30T14:10:30.409856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyZtnR2qqmUak9xBzf"]} -{"Format": "IDEA0", "ID": "8703efe1-4377-41d6-9d54-0795ec3755ac", "DetectTime": "2023-10-30T14:10:30.431854+02:00", "EventTime": "2023-10-30T14:10:30.431870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CIBRmi2W1bdJAatW98"]} -{"Format": "IDEA0", "ID": "117c3a28-8a4c-4051-a144-2231225ab289", "DetectTime": "2023-10-30T14:10:30.491652+02:00", "EventTime": "2023-10-30T14:10:30.491669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cmbu1w4Bq1XIl3HAyb"]} -{"Format": "IDEA0", "ID": "4c142bea-510e-46ca-b637-aee56c529b02", "DetectTime": "2023-10-30T14:10:30.553885+02:00", "EventTime": "2023-10-30T14:10:30.553898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CdmDV6uKhYQJlIn23"]} -{"Format": "IDEA0", "ID": "67cced8f-7eae-4e07-809c-2615a0a48833", "DetectTime": "2023-10-30T14:10:30.614089+02:00", "EventTime": "2023-10-30T14:10:30.614100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNB51g4fbVhvRstyl9"]} -{"Format": "IDEA0", "ID": "83db36e3-c4fb-41fb-94f4-54a6303e7c25", "DetectTime": "2023-10-30T14:10:30.671195+02:00", "EventTime": "2023-10-30T14:10:30.671212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CkdvJi3frYp6BfT9S6"]} -{"Format": "IDEA0", "ID": "8de0fcde-3041-4940-9793-b10420b25c9c", "DetectTime": "2023-10-30T14:10:30.725860+02:00", "EventTime": "2023-10-30T14:10:30.725878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CCGQ2z1XMJ5xw8nFvk"]} -{"Format": "Json", "ID": "8de0fcde-3041-4940-9793-b10420b25c9c", "DetectTime": "2023-10-30T14:10:30.725860+02:00", "EventTime": "2023-10-30T14:10:30.725878+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:07:52.117343+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:30.878041)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b7b08b89-7a59-48fd-b839-7e222415558c", "DetectTime": "2023-10-30T14:10:30.882843+02:00", "EventTime": "2023-10-30T14:10:30.882860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C8CxDw1o92W6zPzLA2"]} -{"Format": "IDEA0", "ID": "3ef5c01b-be58-412f-a88f-b85e389b3022", "DetectTime": "2023-10-30T14:10:30.939248+02:00", "EventTime": "2023-10-30T14:10:30.939262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CHwxTj5KKO3ootLrj"]} -{"Format": "IDEA0", "ID": "37938b19-3910-4ec3-8818-929f11b3539f", "DetectTime": "2023-10-30T14:10:30.994719+02:00", "EventTime": "2023-10-30T14:10:30.994735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CFvCLC2WO5TP32lkdj"]} -{"Format": "IDEA0", "ID": "81f84d90-070e-418d-9f71-d8c6395af441", "DetectTime": "2023-10-30T14:10:31.047896+02:00", "EventTime": "2023-10-30T14:10:31.047912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CcREY44tOJtSkQVubi"]} -{"Format": "IDEA0", "ID": "97cdf67e-5b06-4a26-b3d0-c59dffcb5c96", "DetectTime": "2023-10-30T14:10:31.099562+02:00", "EventTime": "2023-10-30T14:10:31.099580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cp5b4a2ujspk76jfy8"]} -{"Format": "IDEA0", "ID": "586bc68e-5451-438e-817f-902ac16f582b", "DetectTime": "2023-10-30T14:10:31.128342+02:00", "EventTime": "2023-10-30T14:10:31.128358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["C8rkJn4IBHqDcoNB5b"]} -{"Format": "IDEA0", "ID": "bae42336-cd0e-473b-a5a2-198ec8b27dfc", "DetectTime": "2023-10-30T14:10:31.185469+02:00", "EventTime": "2023-10-30T14:10:31.185484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CMBUE924oAiZJUR93k"]} -{"Format": "IDEA0", "ID": "8e25479a-daa4-40d2-aaa4-ec2005381862", "DetectTime": "2023-10-30T14:10:31.239356+02:00", "EventTime": "2023-10-30T14:10:31.239367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cjzq7a3Z2u7CgZRzO"]} -{"Format": "IDEA0", "ID": "7aa3b9c8-076b-4b35-9856-0b2dda88cd90", "DetectTime": "2023-10-30T14:10:31.291028+02:00", "EventTime": "2023-10-30T14:10:31.291042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CNr0qVfh2wCbsKgkj"]} -{"Format": "Json", "ID": "7aa3b9c8-076b-4b35-9856-0b2dda88cd90", "DetectTime": "2023-10-30T14:10:31.291028+02:00", "EventTime": "2023-10-30T14:10:31.291042+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:07:55.374533+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:31.380685)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "284861cb-7aaf-4028-a95b-e41c1ab0cb6b", "DetectTime": "2023-10-30T14:10:31.385992+02:00", "EventTime": "2023-10-30T14:10:31.386008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CrNPjg1Ev5v1XUlM1e"]} -{"Format": "IDEA0", "ID": "48aed651-77db-45d9-bb3d-19bbb04629ab", "DetectTime": "2023-10-30T14:10:31.438054+02:00", "EventTime": "2023-10-30T14:10:31.438081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CdIDRO1cEpOQuzuive"]} -{"Format": "IDEA0", "ID": "f0bcad57-b4e5-48f9-bd1b-ec850d2e17ac", "DetectTime": "2023-10-30T14:10:31.481265+02:00", "EventTime": "2023-10-30T14:10:31.481280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CBbaSF4TZZj44zFqB"]} -{"Format": "IDEA0", "ID": "c6285871-9cb4-4351-9963-c91e12c1b9c7", "DetectTime": "2023-10-30T14:10:31.524223+02:00", "EventTime": "2023-10-30T14:10:31.524240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHvidH3gqs3X7CT67c"]} -{"Format": "IDEA0", "ID": "4217f53a-7d89-4f2b-948f-9615959f4669", "DetectTime": "2023-10-30T14:10:31.570267+02:00", "EventTime": "2023-10-30T14:10:31.570295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["C519Xt1CCwq2RoYZnl"]} -{"Format": "IDEA0", "ID": "acd77a1b-13b6-4703-8aa4-d263b97c9001", "DetectTime": "2023-10-30T14:10:31.614925+02:00", "EventTime": "2023-10-30T14:10:31.614938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C4vfrRqHv8L7CS3D6"]} -{"Format": "IDEA0", "ID": "3880f874-1e1b-45bf-bb72-8b7a2581f1a5", "DetectTime": "2023-10-30T14:10:31.734287+02:00", "EventTime": "2023-10-30T14:10:31.734303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CKcA734XUbsr4veIk8"]} -{"Format": "IDEA0", "ID": "03171045-defd-404b-ae94-dc6b8e918920", "DetectTime": "2023-10-30T14:10:31.786044+02:00", "EventTime": "2023-10-30T14:10:31.786064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CwzezR2bJtzFccsy99"]} -{"Format": "Json", "ID": "03171045-defd-404b-ae94-dc6b8e918920", "DetectTime": "2023-10-30T14:10:31.786044+02:00", "EventTime": "2023-10-30T14:10:31.786064+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:08:37.727536+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:31.877665)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "48c562d1-95cd-4de0-9536-3cc44211618c", "DetectTime": "2023-10-30T14:10:31.883073+02:00", "EventTime": "2023-10-30T14:10:31.883091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CH34ASzy7LyFHWDNb"]} -{"Format": "IDEA0", "ID": "9c8752e6-144c-4f32-a8cb-90318627608e", "DetectTime": "2023-10-30T14:10:31.917599+02:00", "EventTime": "2023-10-30T14:10:31.917626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CSZOdF4OJksTIYX7Od"]} -{"Format": "IDEA0", "ID": "5d2af1b3-8823-41ac-8288-b2804e502eef", "DetectTime": "2023-10-30T14:10:31.970698+02:00", "EventTime": "2023-10-30T14:10:31.970713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. ", "ContentType": "text/plain"}], "uids": ["CN3Fx6aGwhihptixk"]} -{"Format": "IDEA0", "ID": "2ce67c8d-e510-4e9c-aee5-e8557e7a18f3", "DetectTime": "2023-10-30T14:10:32.024787+02:00", "EventTime": "2023-10-30T14:10:32.024799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3691], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3691/UDP destination IP 69.250.218.50. ", "ContentType": "text/plain"}], "uids": ["C9gesw19GV2lpkdU9b"]} -{"Format": "IDEA0", "ID": "14f5b434-98b9-414b-aff3-82c4ee6ea8c8", "DetectTime": "2023-10-30T14:10:32.071467+02:00", "EventTime": "2023-10-30T14:10:32.071485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CX7fpF2xXza4rlAK95"]} -{"Format": "IDEA0", "ID": "e63037d8-fe90-4add-a356-286773ba7fd7", "DetectTime": "2023-10-30T14:10:32.121392+02:00", "EventTime": "2023-10-30T14:10:32.121409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CqmohC2IP7SA1se1E8"]} -{"Format": "IDEA0", "ID": "28abf012-b919-4f60-bb07-f928c44d916b", "DetectTime": "2023-10-30T14:10:32.171373+02:00", "EventTime": "2023-10-30T14:10:32.171402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CjX5zckulgZznSJk"]} -{"Format": "IDEA0", "ID": "3405915b-34f3-4dcb-8665-c6ac0b91ead4", "DetectTime": "2023-10-30T14:10:32.225285+02:00", "EventTime": "2023-10-30T14:10:32.225302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CSsNdI1FjJvh1L8ICa"]} -{"Format": "IDEA0", "ID": "e92154ec-e4a8-4eeb-b7b8-8412d97ee43f", "DetectTime": "2023-10-30T14:10:32.253456+02:00", "EventTime": "2023-10-30T14:10:32.253480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CljAZs1R7XtAlBf5pf"]} -{"Format": "IDEA0", "ID": "cc8fa316-ec5f-41ea-b83e-fcd60ff68af1", "DetectTime": "2023-10-30T14:10:32.302977+02:00", "EventTime": "2023-10-30T14:10:32.302995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cle1fW3Ao4ddJACmpb"]} -{"Format": "Json", "ID": "cc8fa316-ec5f-41ea-b83e-fcd60ff68af1", "DetectTime": "2023-10-30T14:10:32.302977+02:00", "EventTime": "2023-10-30T14:10:32.302995+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:09:15.179412+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:32.393823)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6afdf473-36b5-4016-9483-929f32e84da2", "DetectTime": "2023-10-30T14:10:32.398711+02:00", "EventTime": "2023-10-30T14:10:32.398725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CjwFxE1SBAORrLVZM6"]} -{"Format": "IDEA0", "ID": "7fd323a2-2116-43f1-9f5c-ee5f166b161b", "DetectTime": "2023-10-30T14:10:32.445400+02:00", "EventTime": "2023-10-30T14:10:32.445412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CS3vXk1FgUyAJRAQmg"]} -{"Format": "IDEA0", "ID": "85eb5807-1ce7-421c-bc08-99bd62db6039", "DetectTime": "2023-10-30T14:10:32.489358+02:00", "EventTime": "2023-10-30T14:10:32.489371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CRWLOW1YEXcgAlyCa5"]} -{"Format": "IDEA0", "ID": "dc334e06-c68e-4d04-a755-7334dabc7bef", "DetectTime": "2023-10-30T14:10:32.537346+02:00", "EventTime": "2023-10-30T14:10:32.537361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CwuVPo1UdcN9v8HsZ6"]} -{"Format": "IDEA0", "ID": "64c5b9e7-f9dc-454d-b128-20c4f52abde6", "DetectTime": "2023-10-30T14:10:32.562914+02:00", "EventTime": "2023-10-30T14:10:32.562936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C8KcWV148Y2H3KfmS2"]} -{"Format": "IDEA0", "ID": "7f21ac2b-3627-40a8-9c46-99bf93148981", "DetectTime": "2023-10-30T14:10:32.609542+02:00", "EventTime": "2023-10-30T14:10:32.609556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cze4Ii4iYItuEExc1i"]} -{"Format": "IDEA0", "ID": "511a28e5-4949-4cdc-80a8-aa1df73cb84c", "DetectTime": "2023-10-30T14:10:32.656793+02:00", "EventTime": "2023-10-30T14:10:32.656809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CgTku23BkSa9PstBX"]} -{"Format": "IDEA0", "ID": "2b69eda1-c8ef-4fee-a7dd-0aa9b41f6bcd", "DetectTime": "2023-10-30T14:10:32.702873+02:00", "EventTime": "2023-10-30T14:10:32.702889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11614], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. ", "ContentType": "text/plain"}], "uids": ["CEsxQk27ax6CaE4DH2"]} -{"Format": "IDEA0", "ID": "8a87c702-8426-48e5-a3b6-8e9bf8dcf1ec", "DetectTime": "2023-10-30T14:10:32.749364+02:00", "EventTime": "2023-10-30T14:10:32.749380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["Cl4yd44egJX07fRRmk"]} -{"Format": "Json", "ID": "8a87c702-8426-48e5-a3b6-8e9bf8dcf1ec", "DetectTime": "2023-10-30T14:10:32.749364+02:00", "EventTime": "2023-10-30T14:10:32.749380+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:09:36.390705+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:32.833081)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45d3deba-af98-4448-ae2e-1a1b6a7564c7", "DetectTime": "2023-10-30T14:10:32.838326+02:00", "EventTime": "2023-10-30T14:10:32.838346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CQ2i2434Yf9Wf4YFH4"]} -{"Format": "IDEA0", "ID": "fb8e2f17-abca-4e56-8b07-59275a2c03c3", "DetectTime": "2023-10-30T14:10:32.885217+02:00", "EventTime": "2023-10-30T14:10:32.885240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CL6Qe4eztLA4Wf0bb"]} -{"Format": "IDEA0", "ID": "6325aca4-d83e-4544-a24c-e3fee5f6c9d7", "DetectTime": "2023-10-30T14:10:32.931295+02:00", "EventTime": "2023-10-30T14:10:32.931307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CI8DBW2yZOeIS6I8S5"]} -{"Format": "IDEA0", "ID": "67138834-c638-43e8-bcca-740ea3f670eb", "DetectTime": "2023-10-30T14:10:32.976293+02:00", "EventTime": "2023-10-30T14:10:32.976310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CkdZJg8GJUyog8bTd"]} -{"Format": "IDEA0", "ID": "ef6ba9a2-e704-44fc-b80a-fef51b60648f", "DetectTime": "2023-10-30T14:10:33.019233+02:00", "EventTime": "2023-10-30T14:10:33.019252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cc4gGd3KcCgldTaE62"]} -{"Format": "IDEA0", "ID": "d159e7bd-b8b2-45e1-af1b-a4522c2ebf85", "DetectTime": "2023-10-30T14:10:33.063234+02:00", "EventTime": "2023-10-30T14:10:33.063251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CANYpoAm2W3eVVBtf"]} -{"Format": "IDEA0", "ID": "9df64f20-378c-41d5-8956-b23de5bcbae1", "DetectTime": "2023-10-30T14:10:33.106645+02:00", "EventTime": "2023-10-30T14:10:33.106669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CVvSnk1bd1jdraSIh8"]} -{"Format": "IDEA0", "ID": "7f1246fb-31d0-4847-9dff-72788fa16580", "DetectTime": "2023-10-30T14:10:33.151392+02:00", "EventTime": "2023-10-30T14:10:33.151416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CyP2uJ1eznNi28pIlj"]} -{"Format": "IDEA0", "ID": "d6484e3c-cb17-4b0e-a7de-b421555f5875", "DetectTime": "2023-10-30T14:10:33.176941+02:00", "EventTime": "2023-10-30T14:10:33.176957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Ca3euk1APCyE7N4oG8"]} -{"Format": "Json", "ID": "d6484e3c-cb17-4b0e-a7de-b421555f5875", "DetectTime": "2023-10-30T14:10:33.176941+02:00", "EventTime": "2023-10-30T14:10:33.176957+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:40:42.962674+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:33.261515)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e30287a9-c279-4e65-92a9-79050422f085", "DetectTime": "2023-10-30T14:10:33.265437+02:00", "EventTime": "2023-10-30T14:10:33.265447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CrRR4B2oMSG1fG1rz"]} -{"Format": "IDEA0", "ID": "abf25c80-185c-43e3-afe5-809247731748", "DetectTime": "2023-10-30T14:10:33.307556+02:00", "EventTime": "2023-10-30T14:10:33.307572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CBL5rT3KhEcNBNqJ7e"]} -{"Format": "IDEA0", "ID": "562794ea-a58f-4f52-8a38-e74189435b7a", "DetectTime": "2023-10-30T14:10:33.347762+02:00", "EventTime": "2023-10-30T14:10:33.347778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C9xreZ3wj7RlkPWBV"]} -{"Format": "IDEA0", "ID": "283a6872-8d6b-4045-ae0f-9fa64e5681ea", "DetectTime": "2023-10-30T14:10:33.384694+02:00", "EventTime": "2023-10-30T14:10:33.384717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C0wRQP2figIq1gZGHb"]} -{"Format": "IDEA0", "ID": "e6265f4a-431a-4010-afa6-f0cebbebb65b", "DetectTime": "2023-10-30T14:10:33.420108+02:00", "EventTime": "2023-10-30T14:10:33.420118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CpSN4Q146wDBO9J7ze"]} -{"Format": "IDEA0", "ID": "19d73bf4-76fb-4d06-bd27-690c0cec9a6e", "DetectTime": "2023-10-30T14:10:33.454473+02:00", "EventTime": "2023-10-30T14:10:33.454499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CpkhCqPpRjRIMm7oi"]} -{"Format": "IDEA0", "ID": "a185b85d-2e1a-4e29-9786-7543e0f9ac68", "DetectTime": "2023-10-30T14:10:33.494976+02:00", "EventTime": "2023-10-30T14:10:33.494989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CKWZKn33yL9c5rWLDb"]} -{"Format": "IDEA0", "ID": "3ba5e7c5-5686-44a5-9d07-1bd44b93f5d6", "DetectTime": "2023-10-30T14:10:33.532968+02:00", "EventTime": "2023-10-30T14:10:33.532987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. ", "ContentType": "text/plain"}], "uids": ["CULD3v46v8lNejmv18"]} -{"Format": "Json", "ID": "3ba5e7c5-5686-44a5-9d07-1bd44b93f5d6", "DetectTime": "2023-10-30T14:10:33.532968+02:00", "EventTime": "2023-10-30T14:10:33.532987+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:41:21.449209+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:33.609913)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "59e97ec7-8c03-4d4d-b008-528b9274f31b", "DetectTime": "2023-10-30T14:10:33.615740+02:00", "EventTime": "2023-10-30T14:10:33.615756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C57K5q2sVhrA4roT8"]} -{"Format": "IDEA0", "ID": "3ba4c354-8eaa-409b-a89e-5548ef16eb5f", "DetectTime": "2023-10-30T14:10:33.655867+02:00", "EventTime": "2023-10-30T14:10:33.655883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CCu5fv3AUQGZQ1c4fb"]} -{"Format": "IDEA0", "ID": "e0c19f7e-509e-4a4b-8ef8-a261ed08cfc7", "DetectTime": "2023-10-30T14:10:33.691628+02:00", "EventTime": "2023-10-30T14:10:33.691639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C2lnyA3GxJ1pUF8m88"]} -{"Format": "IDEA0", "ID": "2e45c1f5-ebb3-46c0-994a-cb66e3c4968a", "DetectTime": "2023-10-30T14:10:33.726950+02:00", "EventTime": "2023-10-30T14:10:33.726976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CYi5MpzyasD9QNN72"]} -{"Format": "IDEA0", "ID": "e1b0aa62-a2cd-4357-91e8-4d84039b4843", "DetectTime": "2023-10-30T14:10:33.762536+02:00", "EventTime": "2023-10-30T14:10:33.762550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["COC2Db1gLwX4CnOYWg"]} -{"Format": "IDEA0", "ID": "74c1ae05-7150-4682-8ecd-c6aeb3ad5f21", "DetectTime": "2023-10-30T14:10:33.797218+02:00", "EventTime": "2023-10-30T14:10:33.797234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CpGTqc14uCioPeMRqh"]} -{"Format": "IDEA0", "ID": "7beed073-9f64-4364-8594-a8d088da6ad7", "DetectTime": "2023-10-30T14:10:33.833315+02:00", "EventTime": "2023-10-30T14:10:33.833331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CM770s2uY1pcHzNs4l"]} -{"Format": "IDEA0", "ID": "09db3029-a967-4d4e-83b7-b490eaec7f9f", "DetectTime": "2023-10-30T14:10:33.868826+02:00", "EventTime": "2023-10-30T14:10:33.868851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cvc5gC2ZeG0c9PUxb6"]} -{"Format": "Json", "ID": "09db3029-a967-4d4e-83b7-b490eaec7f9f", "DetectTime": "2023-10-30T14:10:33.868826+02:00", "EventTime": "2023-10-30T14:10:33.868851+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:41:56.865411+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:33.936997)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f42890d7-234f-4502-9f27-17bf1dfd7e78", "DetectTime": "2023-10-30T14:10:33.941638+02:00", "EventTime": "2023-10-30T14:10:33.941655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CR8T4x3c8fNBFCKxy5"]} -{"Format": "IDEA0", "ID": "9bf57781-1951-41c4-bbf8-e5f65936c2a6", "DetectTime": "2023-10-30T14:10:33.976528+02:00", "EventTime": "2023-10-30T14:10:33.976545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CEnJXm1NFVQFmudEQ7"]} -{"Format": "IDEA0", "ID": "20142e54-7a45-479b-a8ea-d0fdad501848", "DetectTime": "2023-10-30T14:10:34.014059+02:00", "EventTime": "2023-10-30T14:10:34.014070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CGV1EbKsrwrLBoUs2"]} -{"Format": "IDEA0", "ID": "0d749bb5-a290-484b-88da-1aa224cd9529", "DetectTime": "2023-10-30T14:10:34.038957+02:00", "EventTime": "2023-10-30T14:10:34.038971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11614], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. ", "ContentType": "text/plain"}], "uids": ["CEfcug4TGvE080734"]} -{"Format": "IDEA0", "ID": "7df8596c-c7d2-43ad-a13c-90900ac02876", "DetectTime": "2023-10-30T14:10:34.071773+02:00", "EventTime": "2023-10-30T14:10:34.071788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CP71fc48Pfr4fMC1U1"]} -{"Format": "IDEA0", "ID": "7c5f7e7f-81ed-4c61-acff-73be96b1d9e9", "DetectTime": "2023-10-30T14:10:34.107260+02:00", "EventTime": "2023-10-30T14:10:34.107272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["C5QA2l4YmgL7HiNKH9"]} -{"Format": "IDEA0", "ID": "078aed2a-1d61-431d-8fd9-76782d570fd2", "DetectTime": "2023-10-30T14:10:34.142154+02:00", "EventTime": "2023-10-30T14:10:34.142166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["C7X9lZ2PwfbufcRbde"]} -{"Format": "IDEA0", "ID": "8f853edb-4ec6-428d-953d-fd299272bc64", "DetectTime": "2023-10-30T14:10:34.175301+02:00", "EventTime": "2023-10-30T14:10:34.175328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CIMpK93qCnoK2Gm8O1"]} -{"Format": "IDEA0", "ID": "e1cd4344-7829-4d2d-8e8d-a066d78ea10d", "DetectTime": "2023-10-30T14:10:34.209281+02:00", "EventTime": "2023-10-30T14:10:34.209299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C3leDE3iTfSlK0JDAa"]} -{"Format": "Json", "ID": "e1cd4344-7829-4d2d-8e8d-a066d78ea10d", "DetectTime": "2023-10-30T14:10:34.209281+02:00", "EventTime": "2023-10-30T14:10:34.209299+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:41:58.850199+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:34.279544)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "53acb890-898b-4266-aac5-85db17d97802", "DetectTime": "2023-10-30T14:10:34.284428+02:00", "EventTime": "2023-10-30T14:10:34.284443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CzPHgJ2NcY964Skfbk"]} -{"Format": "IDEA0", "ID": "32bf4295-4f59-4d16-9424-a926bd34793c", "DetectTime": "2023-10-30T14:10:34.322027+02:00", "EventTime": "2023-10-30T14:10:34.322042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Czf08ofJafJnpeRUa"]} -{"Format": "IDEA0", "ID": "26842c9e-b2c3-433c-86ad-d8dd8989e485", "DetectTime": "2023-10-30T14:10:34.356403+02:00", "EventTime": "2023-10-30T14:10:34.356420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CR9KlBfiiQJeNobdl"]} -{"Format": "IDEA0", "ID": "0682529c-85bf-4d96-91cc-66f893ad3bc8", "DetectTime": "2023-10-30T14:10:34.383936+02:00", "EventTime": "2023-10-30T14:10:34.383949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C5kEin1CM063EKuVgh"]} -{"Format": "IDEA0", "ID": "0ed509cd-354a-47a6-869f-ba6c8a6a225d", "DetectTime": "2023-10-30T14:10:34.412768+02:00", "EventTime": "2023-10-30T14:10:34.412785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cz11lS2wLsA5ylHTM8"]} -{"Format": "IDEA0", "ID": "0dd51ee0-5d16-40fa-b7ab-d918875f5db9", "DetectTime": "2023-10-30T14:10:34.445359+02:00", "EventTime": "2023-10-30T14:10:34.445376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CL4iae1ORKzHeWvzC4"]} -{"Format": "IDEA0", "ID": "ac6ea40d-1123-458f-a799-fd3f204a60df", "DetectTime": "2023-10-30T14:10:34.475362+02:00", "EventTime": "2023-10-30T14:10:34.475377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CBZ16s2neeUNLwjWKe"]} -{"Format": "IDEA0", "ID": "5c34018c-dca0-44e0-ad6c-b7748d8b76f5", "DetectTime": "2023-10-30T14:10:34.578494+02:00", "EventTime": "2023-10-30T14:10:34.578509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C3Yw4g22L05SN0Ln9"]} -{"Format": "Json", "ID": "5c34018c-dca0-44e0-ad6c-b7748d8b76f5", "DetectTime": "2023-10-30T14:10:34.578494+02:00", "EventTime": "2023-10-30T14:10:34.578509+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:42:00.401999+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:34.657376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1e950928-72d4-49f2-9b54-12974d60fd47", "DetectTime": "2023-10-30T14:10:34.662885+02:00", "EventTime": "2023-10-30T14:10:34.662901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CLkHIc4pGizPGjmACa"]} -{"Format": "IDEA0", "ID": "22c03bbb-3686-4c31-b13b-517d3cf31d14", "DetectTime": "2023-10-30T14:10:34.698088+02:00", "EventTime": "2023-10-30T14:10:34.698105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C8V3z24rMLY5Isy4yj"]} -{"Format": "IDEA0", "ID": "93a8788b-663c-40a3-b09d-573e52ac2924", "DetectTime": "2023-10-30T14:10:34.731785+02:00", "EventTime": "2023-10-30T14:10:34.731799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CmbFuWHYiDaxA4ZRf"]} -{"Format": "IDEA0", "ID": "f7a7410e-be0b-4be8-9387-3f68fb6a0576", "DetectTime": "2023-10-30T14:10:34.764450+02:00", "EventTime": "2023-10-30T14:10:34.764461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cl4ds94h723uv2W81d"]} -{"Format": "IDEA0", "ID": "341939ca-cecc-4a80-8f19-ccd358a1a5c6", "DetectTime": "2023-10-30T14:10:34.796678+02:00", "EventTime": "2023-10-30T14:10:34.796696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["CrL7UKvjzMwS0QNYb"]} -{"Format": "IDEA0", "ID": "2fc05991-393b-4939-909f-71dcd53385db", "DetectTime": "2023-10-30T14:10:34.820119+02:00", "EventTime": "2023-10-30T14:10:34.820130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CrRcH61Kfm9I9f3Fa3"]} -{"Format": "IDEA0", "ID": "33113449-b3a1-4f53-80a1-e89e11b560b0", "DetectTime": "2023-10-30T14:10:34.848430+02:00", "EventTime": "2023-10-30T14:10:34.848444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CweojY3npd8kHK0yY1"]} -{"Format": "IDEA0", "ID": "6403a1e2-da9d-4630-931a-fa31bfa3269c", "DetectTime": "2023-10-30T14:10:34.884719+02:00", "EventTime": "2023-10-30T14:10:34.884745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CA95vw4ZwRikYWcGVb"]} -{"Format": "IDEA0", "ID": "7425e247-54d2-4bb1-82ae-62462329dccc", "DetectTime": "2023-10-30T14:10:34.917330+02:00", "EventTime": "2023-10-30T14:10:34.917347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cw14du4QvRRTUsThc8"]} -{"Format": "IDEA0", "ID": "9b689745-043e-4006-bd88-9c2276e7c1b7", "DetectTime": "2023-10-30T14:10:34.941360+02:00", "EventTime": "2023-10-30T14:10:34.941377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CNyu0L13nc1uWhJvT7"]} -{"Format": "Json", "ID": "9b689745-043e-4006-bd88-9c2276e7c1b7", "DetectTime": "2023-10-30T14:10:34.941360+02:00", "EventTime": "2023-10-30T14:10:34.941377+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T10:42:02.650337+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2023/10/30 14:10:35.011660)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aef4dc0c-70ce-47d2-b88a-3cce5d79cb71", "DetectTime": "2023-10-30T14:10:35.017202+02:00", "EventTime": "2023-10-30T14:10:35.017222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C7o51I2qZaWn3jTNN2"]} -{"Format": "IDEA0", "ID": "a845aa22-b0c2-4b2c-8ba0-d1a37b2f6ce4", "DetectTime": "2023-10-30T14:10:35.042409+02:00", "EventTime": "2023-10-30T14:10:35.042425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CotOFYtz4hs7M4q43"]} -{"Format": "IDEA0", "ID": "23d8f5cd-4088-4d6e-8c96-7b23c9285559", "DetectTime": "2023-10-30T14:10:35.069290+02:00", "EventTime": "2023-10-30T14:10:35.069314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVmpGJDkz7Cdin3S2"]} -{"Format": "IDEA0", "ID": "d483b36a-45e3-4139-98d3-18a4d64a1c8a", "DetectTime": "2023-10-30T14:10:35.101445+02:00", "EventTime": "2023-10-30T14:10:35.101472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CT7x8b1aaGzRbxCkH7"]} -{"Format": "IDEA0", "ID": "b04f5b9f-fb5d-495a-b040-994be2dcd045", "DetectTime": "2023-10-30T14:10:35.126375+02:00", "EventTime": "2023-10-30T14:10:35.126391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CvAjD24LkzwEbMqEci"]} -{"Format": "IDEA0", "ID": "bbc52864-f9ee-486d-b35f-1b7f4467a9d0", "DetectTime": "2023-10-30T14:10:35.149688+02:00", "EventTime": "2023-10-30T14:10:35.149699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CBe5tu4jUYymuFmRgg"]} -{"Format": "IDEA0", "ID": "b64e9822-39ff-4e0e-9823-142de8de177f", "DetectTime": "2023-10-30T14:10:35.172010+02:00", "EventTime": "2023-10-30T14:10:35.172028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CLj4sw1EEM5vWbnRWj"]} -{"Format": "IDEA0", "ID": "4750b071-06b5-4ee7-ba58-da101aaf76e3", "DetectTime": "2023-10-30T14:10:35.195896+02:00", "EventTime": "2023-10-30T14:10:35.195925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C3zwLa4cfNy4RkHl69"]} -{"Format": "IDEA0", "ID": "2aed96bf-1e3b-413a-96be-29d3f5bf67d5", "DetectTime": "2023-10-30T14:10:35.220903+02:00", "EventTime": "2023-10-30T14:10:35.220929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CECuUV3yyyMHATaUG2"]} -{"Format": "IDEA0", "ID": "edf01afa-b186-45c8-9212-4a6ed006d6ad", "DetectTime": "2023-10-30T14:10:35.246341+02:00", "EventTime": "2023-10-30T14:10:35.246357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXDtfn2b5aPHee7yFl"]} -{"Format": "IDEA0", "ID": "7c57ff51-12fe-4314-bf58-ab13ea92cf9b", "DetectTime": "2023-10-30T14:10:35.273119+02:00", "EventTime": "2023-10-30T14:10:35.273130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cwv7zSiv4s7oUWhTg"]} -{"Format": "IDEA0", "ID": "1b4aec0d-f714-44df-b7fd-e7a783854902", "DetectTime": "2023-10-30T14:10:35.304431+02:00", "EventTime": "2023-10-30T14:10:35.304447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CA6Tal3bLTFC5eXLb5"]} -{"Format": "IDEA0", "ID": "2868139c-dc1b-437c-bc98-f0dcccb19adc", "DetectTime": "2023-10-30T14:10:35.333202+02:00", "EventTime": "2023-10-30T14:10:35.333214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CWsIPo1g3KWK76zYuf"]} -{"Format": "IDEA0", "ID": "d1b7c702-580a-4c92-90d2-02c03801255c", "DetectTime": "2023-10-30T14:10:35.356390+02:00", "EventTime": "2023-10-30T14:10:35.356406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CPeoMn1nMUQvEPPS8c"]} -{"Format": "IDEA0", "ID": "2c031b3c-e2b4-4d05-93bf-8ca7ddaee055", "DetectTime": "2023-10-30T14:10:35.381584+02:00", "EventTime": "2023-10-30T14:10:35.381609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cktkmt4h7463pbZHnf"]} -{"Format": "IDEA0", "ID": "00762437-08bd-4e60-a9fe-eac244f11c2e", "DetectTime": "2023-10-30T14:10:35.406305+02:00", "EventTime": "2023-10-30T14:10:35.406323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ch92HPkdCzuq8llge"]} -{"Format": "IDEA0", "ID": "b5498626-c9a4-4c5c-8f06-b4fcb23d155c", "DetectTime": "2023-10-30T14:10:35.428827+02:00", "EventTime": "2023-10-30T14:10:35.428852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CCqdEfQig0DkBMGu9"]} -{"Format": "IDEA0", "ID": "dbf191d2-2596-450c-9568-281878ea7620", "DetectTime": "2023-10-30T14:10:35.454092+02:00", "EventTime": "2023-10-30T14:10:35.454115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cf6cwd25bM9MkIdQBa"]} -{"Format": "IDEA0", "ID": "a3f3f92e-85d1-4056-b349-1fbd3a867c6f", "DetectTime": "2023-10-30T14:10:35.478700+02:00", "EventTime": "2023-10-30T14:10:35.478718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0Lttx4n6WkCowmyH1"]} -{"Format": "IDEA0", "ID": "dcf473a5-7d1a-451a-a3a4-d1aa44d11ef8", "DetectTime": "2023-10-30T14:10:35.503882+02:00", "EventTime": "2023-10-30T14:10:35.503909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CDlLN4My4to2k8obi"]} -{"Format": "IDEA0", "ID": "d8c33951-f609-47d3-9de2-3815c743f10a", "DetectTime": "2023-10-30T14:10:35.528893+02:00", "EventTime": "2023-10-30T14:10:35.528912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C487IE36nFd6LDqYp4"]} -{"Format": "IDEA0", "ID": "8af05d7c-e807-43fb-88bb-771f4faf39be", "DetectTime": "2023-10-30T14:10:35.591389+02:00", "EventTime": "2023-10-30T14:10:35.591418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C7mXdC197ohzTDt7a6"]} -{"Format": "IDEA0", "ID": "fb86778b-7dca-4de4-bc33-d7f90eac102f", "DetectTime": "2023-10-30T14:10:35.615700+02:00", "EventTime": "2023-10-30T14:10:35.615717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZWMKi4gbPoeO8UTe2"]} -{"Format": "IDEA0", "ID": "9f0dcbd4-5a75-4c90-9c86-624df7f676d5", "DetectTime": "2023-10-30T14:10:35.639033+02:00", "EventTime": "2023-10-30T14:10:35.639048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4W6LE1Dpk9mi8GuT2"]} -{"Format": "IDEA0", "ID": "642de4d6-a483-4036-88eb-15a4ef8acbf8", "DetectTime": "2023-10-30T14:10:35.700865+02:00", "EventTime": "2023-10-30T14:10:35.700890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CYozBGFEN1WRu1HVl"]} -{"Format": "IDEA0", "ID": "cf901809-54b5-493d-bcc2-7795cebbdc55", "DetectTime": "2023-10-30T14:10:35.725669+02:00", "EventTime": "2023-10-30T14:10:35.725705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C1brTd3pTyY3e7lH3c"]} -{"Format": "IDEA0", "ID": "0fcae4c4-2fca-4068-ae23-6e3b280898dd", "DetectTime": "2023-10-30T14:10:35.787242+02:00", "EventTime": "2023-10-30T14:10:35.787252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CZlIdR3SC7JwmmKiJ7"]} -{"Format": "IDEA0", "ID": "c57e29e5-7db2-4249-b5ab-42962c48463d", "DetectTime": "2023-10-30T14:10:35.811053+02:00", "EventTime": "2023-10-30T14:10:35.811065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CQfIL618KYPKXjgvH8"]} -{"Format": "IDEA0", "ID": "a4509a43-39df-46ed-9699-3c55e9e036a8", "DetectTime": "2023-10-30T14:10:35.873084+02:00", "EventTime": "2023-10-30T14:10:35.873100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CH3MtC1R5dMTg6YFid"]} -{"Format": "IDEA0", "ID": "5e876d4f-ac24-4d01-90fb-c75910c29c63", "DetectTime": "2023-10-30T14:10:35.896342+02:00", "EventTime": "2023-10-30T14:10:35.896360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CWSUUn1PIYDyR0NvL2"]} -{"Format": "IDEA0", "ID": "dee8bee5-0008-44b2-b7e2-61efbf55ab6d", "DetectTime": "2023-10-30T14:10:35.961165+02:00", "EventTime": "2023-10-30T14:10:35.961183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CDZtge1hDJ7txM4Yb2"]} -{"Format": "IDEA0", "ID": "56b7eaf4-34e4-4c11-9dde-306276eaf075", "DetectTime": "2023-10-30T14:10:35.987359+02:00", "EventTime": "2023-10-30T14:10:35.987378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CUvU7x40RDUuB4NMX8"]} -{"Format": "IDEA0", "ID": "cf80d3bb-c995-4dbc-85ed-1291a59e739b", "DetectTime": "2023-10-30T14:10:36.011810+02:00", "EventTime": "2023-10-30T14:10:36.011825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CVJjxu4MeOzApTZiz7"]} -{"Format": "IDEA0", "ID": "2e4ea3a9-0f93-4158-b7e7-bcdb20e39306", "DetectTime": "2023-10-30T14:10:36.070565+02:00", "EventTime": "2023-10-30T14:10:36.070586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEJtnR2kT9bBgZr9be"]} -{"Format": "IDEA0", "ID": "ae259ee5-40fc-4225-b046-248ba7bd1383", "DetectTime": "2023-10-30T14:10:36.094829+02:00", "EventTime": "2023-10-30T14:10:36.094847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CES6Ho3sE3F1Er9Ry"]} -{"Format": "Json", "ID": "ae259ee5-40fc-4225-b046-248ba7bd1383", "DetectTime": "2023-10-30T14:10:36.094829+02:00", "EventTime": "2023-10-30T14:10:36.094847+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:12:53.747280+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:36.198590)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bc8ec786-a818-44a6-96d8-34f69bdc4ea3", "DetectTime": "2023-10-30T14:10:36.203291+02:00", "EventTime": "2023-10-30T14:10:36.203302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["C8oLcb1xkh2nLIggx6"]} -{"Format": "IDEA0", "ID": "ad2b389d-a9db-4cc9-95d8-53bd22269557", "DetectTime": "2023-10-30T14:10:36.225711+02:00", "EventTime": "2023-10-30T14:10:36.225728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CezYiRnpGd65Vyc71"]} -{"Format": "IDEA0", "ID": "eb4def79-99fd-4ed0-afa7-1468daa369af", "DetectTime": "2023-10-30T14:10:36.278825+02:00", "EventTime": "2023-10-30T14:10:36.278838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Coxbqc2HfIS1JoFnMd"]} -{"Format": "IDEA0", "ID": "4843b536-5610-490d-99ea-31725d5913ce", "DetectTime": "2023-10-30T14:10:36.302095+02:00", "EventTime": "2023-10-30T14:10:36.302106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CFIE011JVoezOfqwEb"]} -{"Format": "IDEA0", "ID": "e450e6b3-84a2-4e2a-a332-eb4cb3913978", "DetectTime": "2023-10-30T14:10:36.353731+02:00", "EventTime": "2023-10-30T14:10:36.353752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CElYAz2pa3MkYAyMI6"]} -{"Format": "IDEA0", "ID": "788f3fd3-70d6-4bde-922e-5644776201df", "DetectTime": "2023-10-30T14:10:36.376541+02:00", "EventTime": "2023-10-30T14:10:36.376553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cg35Rn4AoRXqFto7ge"]} -{"Format": "IDEA0", "ID": "6fa0b1f1-49b4-427b-b19e-e015749a401d", "DetectTime": "2023-10-30T14:10:36.426706+02:00", "EventTime": "2023-10-30T14:10:36.426722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C1rchDSP9fsaHkbVj"]} -{"Format": "IDEA0", "ID": "326504f0-fc69-453d-beee-854f2761d5b7", "DetectTime": "2023-10-30T14:10:36.534342+02:00", "EventTime": "2023-10-30T14:10:36.534366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6491], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. ", "ContentType": "text/plain"}], "uids": ["CKl2vR2Sb1mosELjki"]} -{"Format": "IDEA0", "ID": "854bfd1b-e3ed-4d97-a662-7a700d765d19", "DetectTime": "2023-10-30T14:10:36.592695+02:00", "EventTime": "2023-10-30T14:10:36.592710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CZgBev45gBFATf19Q6"]} -{"Format": "IDEA0", "ID": "a854ba4c-eb1e-4da9-88b5-40d454df147e", "DetectTime": "2023-10-30T14:10:36.616652+02:00", "EventTime": "2023-10-30T14:10:36.616682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CEOCXE1ISW3p3MNFe4"]} -{"Format": "IDEA0", "ID": "8c98fd2d-1fb0-4997-bc60-e8bd404db80b", "DetectTime": "2023-10-30T14:10:36.672693+02:00", "EventTime": "2023-10-30T14:10:36.672709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CVlIG04YtPDgOUgzNi"]} -{"Format": "IDEA0", "ID": "7701848d-88a3-4907-87c0-9cfab509489d", "DetectTime": "2023-10-30T14:10:36.697652+02:00", "EventTime": "2023-10-30T14:10:36.697668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CzJCj44R2FKh6tl8Tk"]} -{"Format": "IDEA0", "ID": "0cb59f82-bf65-4b7d-a4b2-a5933aa7e2ec", "DetectTime": "2023-10-30T14:10:36.723955+02:00", "EventTime": "2023-10-30T14:10:36.723972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CH6YDA1j4nCQZKVEbf"]} -{"Format": "IDEA0", "ID": "8994cf92-e6f5-47db-a0f1-e48e6b9b59c0", "DetectTime": "2023-10-30T14:10:36.781410+02:00", "EventTime": "2023-10-30T14:10:36.781425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CkuqZohkt4Da2uDed"]} -{"Format": "IDEA0", "ID": "650549b0-27a1-4147-9a31-30598c67f5c2", "DetectTime": "2023-10-30T14:10:36.806648+02:00", "EventTime": "2023-10-30T14:10:36.806665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CCQGR13sOX6nQ5D1B4"]} -{"Format": "IDEA0", "ID": "16e33140-de1e-4131-8f18-50961b2d9b41", "DetectTime": "2023-10-30T14:10:36.829458+02:00", "EventTime": "2023-10-30T14:10:36.829469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CQHYqn2I96Ss70j36e"]} -{"Format": "IDEA0", "ID": "fb5560aa-c761-4b66-9842-2fc90ab0a2d6", "DetectTime": "2023-10-30T14:10:36.882995+02:00", "EventTime": "2023-10-30T14:10:36.883014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CTK5Gi2OwQ9B0N35a7"]} -{"Format": "IDEA0", "ID": "2584084f-52a8-488e-859e-16ec80e30614", "DetectTime": "2023-10-30T14:10:36.910018+02:00", "EventTime": "2023-10-30T14:10:36.910044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Ctuj0s4Mi41LA6tdd2"]} -{"Format": "IDEA0", "ID": "c27d8877-3fbb-41a0-9da9-cf5d442625c0", "DetectTime": "2023-10-30T14:10:36.934874+02:00", "EventTime": "2023-10-30T14:10:36.934899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNUxl11b4aSxTguFM4"]} -{"Format": "IDEA0", "ID": "e4ffacff-87cf-425c-ab4a-6bb9f38362a1", "DetectTime": "2023-10-30T14:10:36.961902+02:00", "EventTime": "2023-10-30T14:10:36.961919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["ChqgKQ192mwixX1SU7"]} -{"Format": "Json", "ID": "e4ffacff-87cf-425c-ab4a-6bb9f38362a1", "DetectTime": "2023-10-30T14:10:36.961902+02:00", "EventTime": "2023-10-30T14:10:36.961919+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:12:55.495386+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:37.063226)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4d4042f1-ba90-4713-95a1-01df7877ec2d", "DetectTime": "2023-10-30T14:10:37.068551+02:00", "EventTime": "2023-10-30T14:10:37.068566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C0nZ9e2HQd3bD2F4c4"]} -{"Format": "IDEA0", "ID": "0468f2a0-21d2-421e-9dc2-a1e80c6aaadc", "DetectTime": "2023-10-30T14:10:37.097058+02:00", "EventTime": "2023-10-30T14:10:37.097075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CLBoGl4se3sy6KjZk3"]} -{"Format": "IDEA0", "ID": "35634cae-638f-4eac-8b80-682db86c72b3", "DetectTime": "2023-10-30T14:10:37.122748+02:00", "EventTime": "2023-10-30T14:10:37.122765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CSfKKyJAgr1xAolh4"]} -{"Format": "IDEA0", "ID": "d18609fa-c020-48c7-82d6-eabcd2d3c9b4", "DetectTime": "2023-10-30T14:10:37.149105+02:00", "EventTime": "2023-10-30T14:10:37.149121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CPmdIzKJ1RdIOsol1"]} -{"Format": "IDEA0", "ID": "9ca23fb4-4e64-4abb-8925-1645df7aef96", "DetectTime": "2023-10-30T14:10:37.173848+02:00", "EventTime": "2023-10-30T14:10:37.173864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C9tIef3Q3wCfEEyYqf"]} -{"Format": "IDEA0", "ID": "c978ae07-d6a6-4b95-b274-d670c539aaf7", "DetectTime": "2023-10-30T14:10:37.231288+02:00", "EventTime": "2023-10-30T14:10:37.231301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CdV6JBXvJijOONvzh"]} -{"Format": "IDEA0", "ID": "d5e52b90-221b-4edd-9bb7-504c31e94266", "DetectTime": "2023-10-30T14:10:37.253954+02:00", "EventTime": "2023-10-30T14:10:37.253976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CpsCJUxRUYk8p1UG9"]} -{"Format": "IDEA0", "ID": "534a5a16-5459-4979-8b2c-50002823caa7", "DetectTime": "2023-10-30T14:10:37.275853+02:00", "EventTime": "2023-10-30T14:10:37.275864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKCtnf3yAI4yckXtBd"]} -{"Format": "IDEA0", "ID": "78c9a701-7ed7-4ad6-a441-afe14af94d56", "DetectTime": "2023-10-30T14:10:37.299314+02:00", "EventTime": "2023-10-30T14:10:37.299333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cgxz0N2VqcXFv2Zz7e"]} -{"Format": "IDEA0", "ID": "7fd2dd6e-6191-4055-8e68-e01969e1526c", "DetectTime": "2023-10-30T14:10:37.329836+02:00", "EventTime": "2023-10-30T14:10:37.329863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C0rxJ23g3ZBy49TUwa"]} -{"Format": "IDEA0", "ID": "cb959654-8396-4db8-a56c-602e359f1221", "DetectTime": "2023-10-30T14:10:37.384495+02:00", "EventTime": "2023-10-30T14:10:37.384512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ci1f9ylVTTmuQf1Ch"]} -{"Format": "IDEA0", "ID": "260b1fec-81d0-44db-b4db-cd40da8ddc6c", "DetectTime": "2023-10-30T14:10:37.407018+02:00", "EventTime": "2023-10-30T14:10:37.407045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CrdZxD25sA0VwntOch"]} -{"Format": "IDEA0", "ID": "02c60aa1-6b84-49bd-b782-a69d3b17bb81", "DetectTime": "2023-10-30T14:10:37.428714+02:00", "EventTime": "2023-10-30T14:10:37.428729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CGyIo72wFlKzh7MB27"]} -{"Format": "IDEA0", "ID": "6c56ccc2-f251-41c5-a01f-08dc93bb6166", "DetectTime": "2023-10-30T14:10:37.451651+02:00", "EventTime": "2023-10-30T14:10:37.451662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C2w3QN3omvnEif8CG3"]} -{"Format": "IDEA0", "ID": "e0c86978-0b05-4223-b09a-c7780a0fc27a", "DetectTime": "2023-10-30T14:10:37.506685+02:00", "EventTime": "2023-10-30T14:10:37.506701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CtTq324CDAoBOF1duh"]} -{"Format": "IDEA0", "ID": "2e5ed9b1-feae-4629-a74c-abc7b56ec801", "DetectTime": "2023-10-30T14:10:37.532079+02:00", "EventTime": "2023-10-30T14:10:37.532099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C1qwpa4EtJ426I4jNj"]} -{"Format": "IDEA0", "ID": "d4733c5b-12ee-4e06-85e7-b08725b63d21", "DetectTime": "2023-10-30T14:10:37.556359+02:00", "EventTime": "2023-10-30T14:10:37.556375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CEWPDO3JGfA4wqzUkk"]} -{"Format": "IDEA0", "ID": "1744532b-148d-4666-92ff-d84cf6d0464b", "DetectTime": "2023-10-30T14:10:37.578932+02:00", "EventTime": "2023-10-30T14:10:37.578945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CDAgw031EVtxx7PpIe"]} -{"Format": "IDEA0", "ID": "e1659b03-81fd-4ec1-884f-acbce8fa56b7", "DetectTime": "2023-10-30T14:10:37.602881+02:00", "EventTime": "2023-10-30T14:10:37.602907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C1ayhM1Abk1lWHRGd2"]} -{"Format": "IDEA0", "ID": "f67aebe8-878c-4e25-9522-6bfe67b0a676", "DetectTime": "2023-10-30T14:10:37.660295+02:00", "EventTime": "2023-10-30T14:10:37.660306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Cq7jk04O2s7HsTLF3k"]} -{"Format": "IDEA0", "ID": "fbee150e-7526-4ad8-a568-c64dc0645e83", "DetectTime": "2023-10-30T14:10:37.683776+02:00", "EventTime": "2023-10-30T14:10:37.683799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CvbAhV1tN7KD2bCR3k"]} -{"Format": "IDEA0", "ID": "bb18a81e-fc13-445e-957f-6d24b82a8b5b", "DetectTime": "2023-10-30T14:10:37.703902+02:00", "EventTime": "2023-10-30T14:10:37.703916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CY2BBK3jvupIq40NV7"]} -{"Format": "IDEA0", "ID": "c634842e-ba40-42c9-b70c-37f6cf4d2124", "DetectTime": "2023-10-30T14:10:37.727544+02:00", "EventTime": "2023-10-30T14:10:37.727564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CBIiBr2tyWBUAbgVI3"]} -{"Format": "IDEA0", "ID": "ebda4fae-9f5b-477e-834f-00eafcd735f4", "DetectTime": "2023-10-30T14:10:37.748928+02:00", "EventTime": "2023-10-30T14:10:37.748938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4M0P04qwrdQ1yEMb7"]} -{"Format": "IDEA0", "ID": "afef1258-31f1-47b7-afcc-348ed98423d5", "DetectTime": "2023-10-30T14:10:37.769380+02:00", "EventTime": "2023-10-30T14:10:37.769396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CixxCJL59vDCTuB5b"]} -{"Format": "IDEA0", "ID": "3433f847-130d-412d-917b-47b6b2fac765", "DetectTime": "2023-10-30T14:10:37.794979+02:00", "EventTime": "2023-10-30T14:10:37.794994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CqzX9K1Qs89nOL7F67"]} -{"Format": "IDEA0", "ID": "06552b6f-e6a1-4702-b908-9bf8d5c05724", "DetectTime": "2023-10-30T14:10:37.818457+02:00", "EventTime": "2023-10-30T14:10:37.818471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CvopAg33IM2dTlEVag"]} -{"Format": "IDEA0", "ID": "209749df-d4ca-405c-9ed5-aab5a9b7506f", "DetectTime": "2023-10-30T14:10:37.839600+02:00", "EventTime": "2023-10-30T14:10:37.839616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CHaTZx2p1bryzWwiLe"]} -{"Format": "IDEA0", "ID": "dcb5dc5a-83d1-4306-ac50-939fe1d4c28c", "DetectTime": "2023-10-30T14:10:37.892151+02:00", "EventTime": "2023-10-30T14:10:37.892167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CPyJznfHeNKPlNaz6"]} -{"Format": "IDEA0", "ID": "65e019d9-a6a5-410a-84ba-f62dc9b894bf", "DetectTime": "2023-10-30T14:10:37.912632+02:00", "EventTime": "2023-10-30T14:10:37.912649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CdVaFWiTGTAsSiwTh"]} -{"Format": "IDEA0", "ID": "12ca3572-241c-4048-8cff-da23fbbc7522", "DetectTime": "2023-10-30T14:10:37.935908+02:00", "EventTime": "2023-10-30T14:10:37.935924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["Clerst41UL3lNRBbb1"]} -{"Format": "IDEA0", "ID": "0fb83c10-d85c-4cea-8428-1fc00715d0c1", "DetectTime": "2023-10-30T14:10:37.957311+02:00", "EventTime": "2023-10-30T14:10:37.957328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["C9Lin91rnYZJixSnK9"]} -{"Format": "IDEA0", "ID": "082ccdae-99b9-4a25-8e59-e5012adafb38", "DetectTime": "2023-10-30T14:10:37.977816+02:00", "EventTime": "2023-10-30T14:10:37.977828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CgtZGXsoXFAhorJL5"]} -{"Format": "IDEA0", "ID": "79c82809-1c66-4f8c-866c-eeaf62bcd45d", "DetectTime": "2023-10-30T14:10:37.999577+02:00", "EventTime": "2023-10-30T14:10:37.999594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CdaMKknPs1JZlPHde"]} -{"Format": "IDEA0", "ID": "8070fe9a-e8e6-4ca8-88e1-67df413cf778", "DetectTime": "2023-10-30T14:10:38.021710+02:00", "EventTime": "2023-10-30T14:10:38.021726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CtBFTf3gMW0yXdZAob"]} -{"Format": "IDEA0", "ID": "ce34a44c-604e-4399-b1bb-1bfaf8cf8fc8", "DetectTime": "2023-10-30T14:10:38.042037+02:00", "EventTime": "2023-10-30T14:10:38.042056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CHHBnb1AwhVT0aXZfk"]} -{"Format": "IDEA0", "ID": "41f05155-4634-430b-9188-dcc79303a41e", "DetectTime": "2023-10-30T14:10:38.064093+02:00", "EventTime": "2023-10-30T14:10:38.064119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C0FoMS3GNgg1gp7zWi"]} -{"Format": "IDEA0", "ID": "7ccc1014-63f0-45ca-97ae-40c07d876bd1", "DetectTime": "2023-10-30T14:10:38.082207+02:00", "EventTime": "2023-10-30T14:10:38.082221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["C4Wcs7PYrjSO3tY8f"]} -{"Format": "IDEA0", "ID": "23fdb495-5427-42f7-bf68-1b141a0db862", "DetectTime": "2023-10-30T14:10:38.130817+02:00", "EventTime": "2023-10-30T14:10:38.130833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CyCPbu1aA4fTqokhxc"]} -{"Format": "IDEA0", "ID": "0e332266-b364-4a01-9646-9c84fb153f31", "DetectTime": "2023-10-30T14:10:38.149994+02:00", "EventTime": "2023-10-30T14:10:38.150009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CxT1as4IPLlWyer6C"]} -{"Format": "IDEA0", "ID": "175a7fea-1e34-4521-bc6f-65540f707f50", "DetectTime": "2023-10-30T14:10:38.170702+02:00", "EventTime": "2023-10-30T14:10:38.170719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CiOAEK1KRbjIIvTjv7"]} -{"Format": "IDEA0", "ID": "070dfe87-4db6-4701-bf26-85a97b095ef7", "DetectTime": "2023-10-30T14:10:38.190395+02:00", "EventTime": "2023-10-30T14:10:38.190413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["C324g62m4y7FApCHYi"]} -{"Format": "IDEA0", "ID": "811d78fb-52ac-4c85-9f8e-3dab9f69adfe", "DetectTime": "2023-10-30T14:10:38.212151+02:00", "EventTime": "2023-10-30T14:10:38.212167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [11614], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. ", "ContentType": "text/plain"}], "uids": ["CTHYP4G0T9r1rTOM2"]} -{"Format": "IDEA0", "ID": "ad88fa30-b377-4a9a-a690-919c71018e4d", "DetectTime": "2023-10-30T14:10:38.265849+02:00", "EventTime": "2023-10-30T14:10:38.265862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CsznjV2ETNAovWyCxj"]} -{"Format": "IDEA0", "ID": "d9d46269-5684-4bf9-af51-6d1bb883ef4e", "DetectTime": "2023-10-30T14:10:38.286052+02:00", "EventTime": "2023-10-30T14:10:38.286069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cm0m7P2bmvoObxGuc4"]} -{"Format": "IDEA0", "ID": "37e61621-327b-48ae-8216-645009d21ff7", "DetectTime": "2023-10-30T14:10:38.305893+02:00", "EventTime": "2023-10-30T14:10:38.305905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSxB731QSsY9BbByXd"]} -{"Format": "IDEA0", "ID": "dfd2647a-9c50-48ec-972b-9223ed47a305", "DetectTime": "2023-10-30T14:10:38.326301+02:00", "EventTime": "2023-10-30T14:10:38.326328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CjJ36HuWk6hFtoT0l"]} -{"Format": "IDEA0", "ID": "c4592659-3b05-4756-9270-ae18ab40e07b", "DetectTime": "2023-10-30T14:10:38.346695+02:00", "EventTime": "2023-10-30T14:10:38.346713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Cij9l43M3bHIezTy7g"]} -{"Format": "IDEA0", "ID": "e6b317aa-c8a6-43cf-9e09-c743f3faa968", "DetectTime": "2023-10-30T14:10:38.366468+02:00", "EventTime": "2023-10-30T14:10:38.366486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CC8vH8378k7bke55v8"]} -{"Format": "IDEA0", "ID": "cf6807eb-6cc4-4a3e-b0d9-b9150c77d5a0", "DetectTime": "2023-10-30T14:10:38.385382+02:00", "EventTime": "2023-10-30T14:10:38.385398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CU4DdI2xVopYNuupX8"]} -{"Format": "Json", "ID": "cf6807eb-6cc4-4a3e-b0d9-b9150c77d5a0", "DetectTime": "2023-10-30T14:10:38.385382+02:00", "EventTime": "2023-10-30T14:10:38.385398+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:12:57.829509+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:38.473807)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "55f8c35c-ea05-453d-98a7-1e0fca02f095", "DetectTime": "2023-10-30T14:10:38.479277+02:00", "EventTime": "2023-10-30T14:10:38.479294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CiR1uS2lGxUqX3vPU4"]} -{"Format": "IDEA0", "ID": "399679cc-775c-440e-bffc-19fad3d31f11", "DetectTime": "2023-10-30T14:10:38.500773+02:00", "EventTime": "2023-10-30T14:10:38.500792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZDVzS2PRwb3DEGUy4"]} -{"Format": "IDEA0", "ID": "edc3a1f0-711f-4507-844c-b900f3345a22", "DetectTime": "2023-10-30T14:10:38.521593+02:00", "EventTime": "2023-10-30T14:10:38.521608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CE3E9p4dkngELV3xE3"]} -{"Format": "IDEA0", "ID": "779e35c3-f3ef-40c1-9f72-262d3539f41a", "DetectTime": "2023-10-30T14:10:38.571763+02:00", "EventTime": "2023-10-30T14:10:38.571775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CJ7pQI38Xom607wLGb"]} -{"Format": "IDEA0", "ID": "6e22333e-abc7-4110-be1e-89b4a721db00", "DetectTime": "2023-10-30T14:10:38.592210+02:00", "EventTime": "2023-10-30T14:10:38.592234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CL7PCM3EuWdNG3a2Ej"]} -{"Format": "IDEA0", "ID": "8679515f-7570-4366-b227-461ac474d62d", "DetectTime": "2023-10-30T14:10:38.613619+02:00", "EventTime": "2023-10-30T14:10:38.613644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CkYi4y7WuxfxbCWDk"]} -{"Format": "IDEA0", "ID": "5ae6efcb-24be-4ef4-9aac-b8e38cbd55b9", "DetectTime": "2023-10-30T14:10:38.634949+02:00", "EventTime": "2023-10-30T14:10:38.634974+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C4Qbfi38CU5l7AFGDg"]} -{"Format": "IDEA0", "ID": "84844f07-56b9-4f3f-8d0e-0532560e601c", "DetectTime": "2023-10-30T14:10:38.661880+02:00", "EventTime": "2023-10-30T14:10:38.661899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["C22Zke1t8oOO873gW"]} -{"Format": "IDEA0", "ID": "efab1d1e-f272-43a6-bfc7-3f68d7cf1c35", "DetectTime": "2023-10-30T14:10:38.713683+02:00", "EventTime": "2023-10-30T14:10:38.713707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CASKhu2m4r6A62kCp6"]} -{"Format": "IDEA0", "ID": "93885f4f-c654-4d93-a672-febdde5d0ae5", "DetectTime": "2023-10-30T14:10:38.733858+02:00", "EventTime": "2023-10-30T14:10:38.733876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CtNVJt4nx1iJgxX4S2"]} -{"Format": "IDEA0", "ID": "b55ebbe9-28b2-4a5c-90dc-cad943b179f0", "DetectTime": "2023-10-30T14:10:38.755615+02:00", "EventTime": "2023-10-30T14:10:38.755627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CY553u1NeyOm5m1Pzi"]} -{"Format": "IDEA0", "ID": "e0b5dd2d-8972-4806-bada-64f22d964235", "DetectTime": "2023-10-30T14:10:38.776225+02:00", "EventTime": "2023-10-30T14:10:38.776241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cajh5JWdbxr6r74Nb"]} -{"Format": "IDEA0", "ID": "9539b1d8-bcc1-458a-88b4-2932970980b8", "DetectTime": "2023-10-30T14:10:38.796426+02:00", "EventTime": "2023-10-30T14:10:38.796452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CQnk7M3KOESgwc6dyb"]} -{"Format": "IDEA0", "ID": "8b59584c-aa96-4984-a9b4-568466ba7ce7", "DetectTime": "2023-10-30T14:10:38.845803+02:00", "EventTime": "2023-10-30T14:10:38.845821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CBI1Wx2WWzW0vL8wCh"]} -{"Format": "IDEA0", "ID": "3f52b3ce-69ff-4bd2-8622-4987966ee671", "DetectTime": "2023-10-30T14:10:38.866392+02:00", "EventTime": "2023-10-30T14:10:38.866411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CVJ1qlw1ih1GWuii8"]} -{"Format": "IDEA0", "ID": "34c65909-2082-46ff-a43d-af5e2f9568aa", "DetectTime": "2023-10-30T14:10:38.889192+02:00", "EventTime": "2023-10-30T14:10:38.889209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CSJ63w2iWL42aiose4"]} -{"Format": "IDEA0", "ID": "68f173aa-5070-4856-b159-e77c52eb3d1b", "DetectTime": "2023-10-30T14:10:38.910089+02:00", "EventTime": "2023-10-30T14:10:38.910117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CW7s932RYduB97kn2"]} -{"Format": "IDEA0", "ID": "f1cbbdbd-21f6-4f6d-b36f-50743936fe42", "DetectTime": "2023-10-30T14:10:38.930694+02:00", "EventTime": "2023-10-30T14:10:38.930705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C8gLdlvNZrlw2pZI"]} -{"Format": "IDEA0", "ID": "4b530646-4537-4b62-beb0-d93054c9d9e2", "DetectTime": "2023-10-30T14:10:38.949705+02:00", "EventTime": "2023-10-30T14:10:38.949720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cv2By43bl0vjopAQ5h"]} -{"Format": "IDEA0", "ID": "8d06851f-b664-4fee-b4ad-e0e7770a9a7a", "DetectTime": "2023-10-30T14:10:38.996630+02:00", "EventTime": "2023-10-30T14:10:38.996651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C5K7hX3e1e2iLwjdT1"]} -{"Format": "IDEA0", "ID": "ee1aaf59-5f81-422e-b3af-535a446613c1", "DetectTime": "2023-10-30T14:10:39.017848+02:00", "EventTime": "2023-10-30T14:10:39.017863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CYdpWu4tvl2C0JEK59"]} -{"Format": "IDEA0", "ID": "6c227d1a-4c17-437b-91cb-5837f70f80b9", "DetectTime": "2023-10-30T14:10:39.036965+02:00", "EventTime": "2023-10-30T14:10:39.036985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CbXc3ndQJezjiUyZ"]} -{"Format": "IDEA0", "ID": "437fb1f9-5c71-4be0-b8a2-4fa093ad718e", "DetectTime": "2023-10-30T14:10:39.055690+02:00", "EventTime": "2023-10-30T14:10:39.055703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C4cEUd3wXQ1utrp2ud"]} -{"Format": "IDEA0", "ID": "500099df-49fc-4ed6-bdd3-6ae73bb76023", "DetectTime": "2023-10-30T14:10:39.072705+02:00", "EventTime": "2023-10-30T14:10:39.072717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CjApff4e4c3eP5qDMf"]} -{"Format": "IDEA0", "ID": "84c79ba6-3594-4ad8-92f2-19cbf0e9fa21", "DetectTime": "2023-10-30T14:10:39.093750+02:00", "EventTime": "2023-10-30T14:10:39.093766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["C8DwmK1FCATqa3jEzi"]} -{"Format": "IDEA0", "ID": "6a5ae80f-dfa0-4d80-b035-1921461be170", "DetectTime": "2023-10-30T14:10:39.146006+02:00", "EventTime": "2023-10-30T14:10:39.146025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Co67RQ2J2mwO2qXDh2"]} -{"Format": "IDEA0", "ID": "27558a00-10d4-42a9-ae9f-feffaee84c09", "DetectTime": "2023-10-30T14:10:39.169157+02:00", "EventTime": "2023-10-30T14:10:39.169173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CVUQ6EATVKeVBWpS2"]} -{"Format": "IDEA0", "ID": "b968eeef-a00f-483f-8ed0-ffd0c33469df", "DetectTime": "2023-10-30T14:10:39.188861+02:00", "EventTime": "2023-10-30T14:10:39.188872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CpeR3z4Jh2FxLCBaBh"]} -{"Format": "IDEA0", "ID": "36422f0f-1c7d-4dd0-a348-7b1e085b9589", "DetectTime": "2023-10-30T14:10:39.207099+02:00", "EventTime": "2023-10-30T14:10:39.207115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C76J0529vqsgmnoMi"]} -{"Format": "IDEA0", "ID": "078168a0-8d1d-4e8c-a813-3bdce33daf4f", "DetectTime": "2023-10-30T14:10:39.226803+02:00", "EventTime": "2023-10-30T14:10:39.226814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C6ZTZN2Jp1wCuEFdcd"]} -{"Format": "IDEA0", "ID": "57049c86-8f5d-48f4-8c27-c5b2cb87fe92", "DetectTime": "2023-10-30T14:10:39.244406+02:00", "EventTime": "2023-10-30T14:10:39.244416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CNsDrlUj0pL1kcxJ7"]} -{"Format": "IDEA0", "ID": "85dc6799-48d4-432b-b604-f7f285d80967", "DetectTime": "2023-10-30T14:10:39.291160+02:00", "EventTime": "2023-10-30T14:10:39.291175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CTy2ts1DFFPuDU66Xc"]} -{"Format": "IDEA0", "ID": "8912eaec-54b9-46a2-beb1-e3cc93606d52", "DetectTime": "2023-10-30T14:10:39.309886+02:00", "EventTime": "2023-10-30T14:10:39.309905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CaBA7J19c8KT0ZV7Bf"]} -{"Format": "IDEA0", "ID": "8d0ccfd4-c598-48bd-be87-ff8ef1693807", "DetectTime": "2023-10-30T14:10:39.330166+02:00", "EventTime": "2023-10-30T14:10:39.330185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CW4Ua62xIeL6XisF3d"]} -{"Format": "IDEA0", "ID": "743ccd18-8115-4046-abaf-ecb535b99399", "DetectTime": "2023-10-30T14:10:39.358070+02:00", "EventTime": "2023-10-30T14:10:39.358086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cw4ZGq4uABvx08tdT3"]} -{"Format": "IDEA0", "ID": "348839e9-cbcc-4d4e-b3dd-79f9dae9bbdc", "DetectTime": "2023-10-30T14:10:39.377725+02:00", "EventTime": "2023-10-30T14:10:39.377735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cu0slOZOhL20oE1g9"]} -{"Format": "IDEA0", "ID": "b38308e0-efb9-4de3-80bd-45a436208c5a", "DetectTime": "2023-10-30T14:10:39.430512+02:00", "EventTime": "2023-10-30T14:10:39.430529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN8lmu2KdmaXxHY5A9"]} -{"Format": "IDEA0", "ID": "98488eae-2785-408f-8867-2a8115e2697f", "DetectTime": "2023-10-30T14:10:39.450882+02:00", "EventTime": "2023-10-30T14:10:39.450898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CQQTj33COkSgbnCk6d"]} -{"Format": "Json", "ID": "98488eae-2785-408f-8867-2a8115e2697f", "DetectTime": "2023-10-30T14:10:39.450882+02:00", "EventTime": "2023-10-30T14:10:39.450898+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:12:59.664647+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:39.534581)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "738aef81-732a-438b-a95c-c841c1b741cb", "DetectTime": "2023-10-30T14:10:39.539303+02:00", "EventTime": "2023-10-30T14:10:39.539315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CZnMoj4O6xYDDY91ij"]} -{"Format": "IDEA0", "ID": "a871d68e-2573-4be2-8d26-5385d58f562a", "DetectTime": "2023-10-30T14:10:39.587682+02:00", "EventTime": "2023-10-30T14:10:39.587707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.187.41.194 ", "ContentType": "text/plain"}], "uids": ["CUaWRL3UGGpVL5KSKc"]} -{"Format": "IDEA0", "ID": "fdf5cc13-8960-4f17-983a-cd6d2d04a241", "DetectTime": "2023-10-30T14:10:39.606566+02:00", "EventTime": "2023-10-30T14:10:39.606584+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CEgwYb1WufZudSbq61"]} -{"Format": "IDEA0", "ID": "9f96d18c-74cc-4010-bfd7-fe60195f50f9", "DetectTime": "2023-10-30T14:10:39.630065+02:00", "EventTime": "2023-10-30T14:10:39.630077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CwdeBu3uaVP4PnudMd"]} -{"Format": "IDEA0", "ID": "cb5d37d5-39c2-4cb4-893a-0280978a70e3", "DetectTime": "2023-10-30T14:10:39.676298+02:00", "EventTime": "2023-10-30T14:10:39.676311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CbMDKh2AHUz0FXsk2j"]} -{"Format": "IDEA0", "ID": "7267c80d-1e4b-423b-a9cc-a26ce4152e00", "DetectTime": "2023-10-30T14:10:39.696131+02:00", "EventTime": "2023-10-30T14:10:39.696145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQb2pH3KHYk7GoTuG4"]} -{"Format": "IDEA0", "ID": "546fd81c-8edb-4c20-918c-12b3dfc6786f", "DetectTime": "2023-10-30T14:10:39.713420+02:00", "EventTime": "2023-10-30T14:10:39.713430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CWlI4g1G4DTRg6k9C6"]} -{"Format": "IDEA0", "ID": "84f82c13-4f08-4fca-9cf5-d8288418cf2a", "DetectTime": "2023-10-30T14:10:39.762723+02:00", "EventTime": "2023-10-30T14:10:39.762739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CMPwDmaqNpJ5IfYtg"]} -{"Format": "IDEA0", "ID": "804a2061-8503-4bf9-a0d6-ab211b18f461", "DetectTime": "2023-10-30T14:10:39.781684+02:00", "EventTime": "2023-10-30T14:10:39.781694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C7eIoM1ytZD1y5rpwb"]} -{"Format": "IDEA0", "ID": "dacd1c4e-dcef-4dbe-8963-409b5b45b2af", "DetectTime": "2023-10-30T14:10:39.801596+02:00", "EventTime": "2023-10-30T14:10:39.801609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CXZXsP2AWJL6tg6ec3"]} -{"Format": "IDEA0", "ID": "9d937fba-1f1f-4614-b576-68c4747e7c15", "DetectTime": "2023-10-30T14:10:39.819242+02:00", "EventTime": "2023-10-30T14:10:39.819256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cti5BG1rRSNxfpmDG"]} -{"Format": "IDEA0", "ID": "c63fef07-bd5c-42ef-a907-945e06b5fc00", "DetectTime": "2023-10-30T14:10:39.864540+02:00", "EventTime": "2023-10-30T14:10:39.864556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CCKlD44aF0504rEFA5"]} -{"Format": "IDEA0", "ID": "d85e90d4-3e39-4e5a-a9db-5cb1b3761da9", "DetectTime": "2023-10-30T14:10:39.886645+02:00", "EventTime": "2023-10-30T14:10:39.886666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CBkHOb1vyHi3xUKmQe"]} -{"Format": "IDEA0", "ID": "c9c08b71-365e-492f-85a4-78ef6c76ba22", "DetectTime": "2023-10-30T14:10:39.907255+02:00", "EventTime": "2023-10-30T14:10:39.907268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CdEuEe45iRdl3ij3hi"]} -{"Format": "IDEA0", "ID": "7517496d-6b22-415e-a512-e77732cda6db", "DetectTime": "2023-10-30T14:10:39.926885+02:00", "EventTime": "2023-10-30T14:10:39.926902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZN6H68JyFgMN92b"]} -{"Format": "IDEA0", "ID": "0b10ed0d-8392-4dd6-a979-48c92474bd9a", "DetectTime": "2023-10-30T14:10:39.948123+02:00", "EventTime": "2023-10-30T14:10:39.948139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CjB6O3GaC742TVI6f"]} -{"Format": "IDEA0", "ID": "740d6ff4-591c-462c-97fd-02763dc12672", "DetectTime": "2023-10-30T14:10:39.967379+02:00", "EventTime": "2023-10-30T14:10:39.967394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CN01hE47pFqMEUjcVg"]} -{"Format": "IDEA0", "ID": "bb85b222-bb46-4a5f-b49a-434a9c1cd403", "DetectTime": "2023-10-30T14:10:40.027463+02:00", "EventTime": "2023-10-30T14:10:40.027491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CBia9U212icweztQXg"]} -{"Format": "IDEA0", "ID": "136adaf8-252f-4db3-9f33-5b35940a568a", "DetectTime": "2023-10-30T14:10:40.050315+02:00", "EventTime": "2023-10-30T14:10:40.050343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CckbTl3VY48X4rzyc9"]} -{"Format": "IDEA0", "ID": "f525f50a-2414-43b5-941f-ba3e4ae989eb", "DetectTime": "2023-10-30T14:10:40.072038+02:00", "EventTime": "2023-10-30T14:10:40.072055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CfnDlr1YuQQW6Zzs1"]} -{"Format": "IDEA0", "ID": "79363f25-eacc-4614-8a4c-ae0be9032625", "DetectTime": "2023-10-30T14:10:40.093373+02:00", "EventTime": "2023-10-30T14:10:40.093389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKK9zy2j67ymGuguU5"]} -{"Format": "IDEA0", "ID": "2ab7ad57-a14a-403e-b2b3-4fa77cda8c74", "DetectTime": "2023-10-30T14:10:40.117101+02:00", "EventTime": "2023-10-30T14:10:40.117118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C94wma1Hx040qLkV5g"]} -{"Format": "IDEA0", "ID": "16c25292-6b68-4d8e-b0d6-f3f6e6006984", "DetectTime": "2023-10-30T14:10:40.138838+02:00", "EventTime": "2023-10-30T14:10:40.138851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CZPwUf4HufIIg61Ho5"]} -{"Format": "IDEA0", "ID": "a522e495-fd88-455e-b639-79c049ed077a", "DetectTime": "2023-10-30T14:10:40.162505+02:00", "EventTime": "2023-10-30T14:10:40.162529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0YiEC43V7uPLCwfPa"]} -{"Format": "IDEA0", "ID": "b30b3bc7-4fb2-4bfa-bab2-52f0f8a04aa9", "DetectTime": "2023-10-30T14:10:40.184068+02:00", "EventTime": "2023-10-30T14:10:40.184085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CdhD5910M6r6LoMIec"]} -{"Format": "IDEA0", "ID": "242ad170-c95d-4440-bc8b-b4447ed749dc", "DetectTime": "2023-10-30T14:10:40.233965+02:00", "EventTime": "2023-10-30T14:10:40.233977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C5fZPq1SrxuLisa2Ng"]} -{"Format": "IDEA0", "ID": "c4269af7-7a47-44e7-9941-764cedeb3d9d", "DetectTime": "2023-10-30T14:10:40.253841+02:00", "EventTime": "2023-10-30T14:10:40.253858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CTeysz32jP7Ma6xYj2"]} -{"Format": "IDEA0", "ID": "6c46763c-21c5-46db-9657-59d8a9435078", "DetectTime": "2023-10-30T14:10:40.276293+02:00", "EventTime": "2023-10-30T14:10:40.276309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CxnAcV1DfyQmGxY9H4"]} -{"Format": "IDEA0", "ID": "40c18c88-b014-4040-a1aa-d49b6bd08014", "DetectTime": "2023-10-30T14:10:40.296992+02:00", "EventTime": "2023-10-30T14:10:40.297008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C05Nz11BqLAXQQIX1b"]} -{"Format": "IDEA0", "ID": "c2be7d3e-af11-4ef1-a0c3-6798aa186ab5", "DetectTime": "2023-10-30T14:10:40.316786+02:00", "EventTime": "2023-10-30T14:10:40.316805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CaYkDE27qa2by5g2Ma"]} -{"Format": "IDEA0", "ID": "4b958953-4e60-48df-8ec8-bbdad6044960", "DetectTime": "2023-10-30T14:10:40.338408+02:00", "EventTime": "2023-10-30T14:10:40.338431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cc3lwY2caDZnRMtTDl"]} -{"Format": "IDEA0", "ID": "49009ad4-2165-4a47-8ef3-c297eb65ee6a", "DetectTime": "2023-10-30T14:10:40.360340+02:00", "EventTime": "2023-10-30T14:10:40.360358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CebNEk2ZpSfNIf6yY5"]} -{"Format": "IDEA0", "ID": "94bc12c8-7bec-4fa0-be65-42608d1ed7e5", "DetectTime": "2023-10-30T14:10:40.411371+02:00", "EventTime": "2023-10-30T14:10:40.411389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C5WigH1HwgELWQ9LPi"]} -{"Format": "IDEA0", "ID": "7eed99b4-5e3d-415f-82d7-385eed2ce105", "DetectTime": "2023-10-30T14:10:40.432874+02:00", "EventTime": "2023-10-30T14:10:40.432894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CSuxEz46sNQ1vao6K3"]} -{"Format": "IDEA0", "ID": "88d99d11-4ab0-4aef-a120-ce5b24c320fc", "DetectTime": "2023-10-30T14:10:40.456417+02:00", "EventTime": "2023-10-30T14:10:40.456436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYtgtj9voZ10mxNd3"]} -{"Format": "IDEA0", "ID": "5574c603-d711-4b95-9c03-f92f873ac462", "DetectTime": "2023-10-30T14:10:40.478022+02:00", "EventTime": "2023-10-30T14:10:40.478035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CvSLDJ3NueFwaqZfl4"]} -{"Format": "IDEA0", "ID": "57b1d362-a9ba-41c1-a0cb-402d6460306a", "DetectTime": "2023-10-30T14:10:40.500468+02:00", "EventTime": "2023-10-30T14:10:40.500489+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C10H491jQqqQshrcqc"]} -{"Format": "IDEA0", "ID": "26d1dc46-0f63-4d4d-9a24-82c5150451e9", "DetectTime": "2023-10-30T14:10:40.527447+02:00", "EventTime": "2023-10-30T14:10:40.527458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVC9bv2SHY2neXj273"]} -{"Format": "IDEA0", "ID": "fbb9846a-55f0-41ee-8354-9bec45486579", "DetectTime": "2023-10-30T14:10:40.547816+02:00", "EventTime": "2023-10-30T14:10:40.547829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CozdHt1vdG8o5QU3H4"]} -{"Format": "IDEA0", "ID": "8eaf23c5-079b-4ba0-bbc4-1e4979728392", "DetectTime": "2023-10-30T14:10:40.570322+02:00", "EventTime": "2023-10-30T14:10:40.570338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CxMooc4IQ8mUiLrmP9"]} -{"Format": "Json", "ID": "8eaf23c5-079b-4ba0-bbc4-1e4979728392", "DetectTime": "2023-10-30T14:10:40.570322+02:00", "EventTime": "2023-10-30T14:10:40.570338+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:13:02.621371+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:40.670344)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb2e88fe-374a-4dc8-94eb-272c52b399d9", "DetectTime": "2023-10-30T14:10:40.675271+02:00", "EventTime": "2023-10-30T14:10:40.675285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cjyu41hAkuOl0YYx6"]} -{"Format": "IDEA0", "ID": "461c9fa9-af36-45b7-bf1a-fc60dfafa020", "DetectTime": "2023-10-30T14:10:40.698521+02:00", "EventTime": "2023-10-30T14:10:40.698548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CY076D31JbFG0GMItl"]} -{"Format": "IDEA0", "ID": "c667bc90-6815-452a-abb3-ff6511bf95b5", "DetectTime": "2023-10-30T14:10:40.721292+02:00", "EventTime": "2023-10-30T14:10:40.721308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CZhyzx17Rtv02Bzb97"]} -{"Format": "IDEA0", "ID": "10602f67-d1c8-4ee5-8dbd-70c684393ea2", "DetectTime": "2023-10-30T14:10:40.741083+02:00", "EventTime": "2023-10-30T14:10:40.741099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CCTZN74s7tMUoYwezd"]} -{"Format": "IDEA0", "ID": "f21c8601-1d3a-41bb-a2c9-2aba0f644669", "DetectTime": "2023-10-30T14:10:40.760992+02:00", "EventTime": "2023-10-30T14:10:40.761008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CbwvjR2YochirAsiki"]} -{"Format": "IDEA0", "ID": "bd5ff77d-e411-4df5-a5bf-b76d9d2b1627", "DetectTime": "2023-10-30T14:10:40.782076+02:00", "EventTime": "2023-10-30T14:10:40.782091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CPzZ4l3XoS0m2bP1l9"]} -{"Format": "IDEA0", "ID": "e13cfc72-b604-474d-8510-982f06266d4f", "DetectTime": "2023-10-30T14:10:40.805075+02:00", "EventTime": "2023-10-30T14:10:40.805092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["Cxsivi2zoG5FgM1xV6"]} -{"Format": "IDEA0", "ID": "473addf1-529d-4486-bbe5-4f3cadcc5789", "DetectTime": "2023-10-30T14:10:40.825382+02:00", "EventTime": "2023-10-30T14:10:40.825399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CZEK6F3v4sGpmt5KIh"]} -{"Format": "IDEA0", "ID": "5d8f8fd5-81ca-44f8-9079-440be322dac8", "DetectTime": "2023-10-30T14:10:40.874283+02:00", "EventTime": "2023-10-30T14:10:40.874299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Ct1W44363UjZ9wwUwi"]} -{"Format": "IDEA0", "ID": "a83ebe86-30b5-4ac4-a4ca-ea05bf3413a5", "DetectTime": "2023-10-30T14:10:40.898488+02:00", "EventTime": "2023-10-30T14:10:40.898505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CSgpYkSuElBUBYOhd"]} -{"Format": "IDEA0", "ID": "be55e89f-6ffe-433c-8617-d79372deb923", "DetectTime": "2023-10-30T14:10:40.919705+02:00", "EventTime": "2023-10-30T14:10:40.919727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CMwWMji0ST8aWSgcc"]} -{"Format": "IDEA0", "ID": "03261801-9c35-45df-9b3b-a9d3f61ef866", "DetectTime": "2023-10-30T14:10:40.942142+02:00", "EventTime": "2023-10-30T14:10:40.942155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKs39h2b4Ko0R0JnV6"]} -{"Format": "IDEA0", "ID": "792ab1b8-1833-412d-be56-5ddf828540eb", "DetectTime": "2023-10-30T14:10:40.962856+02:00", "EventTime": "2023-10-30T14:10:40.963010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C1fzUKwp1UUciKyaj"]} -{"Format": "IDEA0", "ID": "ff35dd7b-7453-408e-a7e4-c6099e7ac742", "DetectTime": "2023-10-30T14:10:40.983865+02:00", "EventTime": "2023-10-30T14:10:40.983884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CARgR1W3sJg4Zv7Oa"]} -{"Format": "IDEA0", "ID": "1f607663-786c-4c9b-9c40-c63b982da51e", "DetectTime": "2023-10-30T14:10:41.029076+02:00", "EventTime": "2023-10-30T14:10:41.029092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CEnjUA4VmaeRnolUt"]} -{"Format": "IDEA0", "ID": "5958c8bf-34f8-49fa-a3b0-502060982b85", "DetectTime": "2023-10-30T14:10:41.048138+02:00", "EventTime": "2023-10-30T14:10:41.048153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CsgD501rmxgPMV0Wg8"]} -{"Format": "IDEA0", "ID": "3e554cce-97d6-4051-a958-738a7694bb16", "DetectTime": "2023-10-30T14:10:41.069179+02:00", "EventTime": "2023-10-30T14:10:41.069196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CsWMZs4bE8C7VJLETl"]} -{"Format": "IDEA0", "ID": "19f48d5c-62e4-475b-a2ef-818ad572e5be", "DetectTime": "2023-10-30T14:10:41.089567+02:00", "EventTime": "2023-10-30T14:10:41.089593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cz0Gyb4Fpf44FNIZR"]} -{"Format": "IDEA0", "ID": "7a66976f-87d7-492c-b1ce-a87e8a94dbd9", "DetectTime": "2023-10-30T14:10:41.110382+02:00", "EventTime": "2023-10-30T14:10:41.110407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CNE1IhJvywv1u6Z36"]} -{"Format": "IDEA0", "ID": "e98f29e4-48af-4e82-b4be-3aaa93f77c58", "DetectTime": "2023-10-30T14:10:41.133022+02:00", "EventTime": "2023-10-30T14:10:41.133041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CXuDqS3C2aopHcmDHd"]} -{"Format": "IDEA0", "ID": "6bcdd44c-a43a-4294-a530-5fb1537ca8cb", "DetectTime": "2023-10-30T14:10:41.184612+02:00", "EventTime": "2023-10-30T14:10:41.184629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CK8wiI3B0RO9c7hB92"]} -{"Format": "IDEA0", "ID": "d355789c-7bd8-4660-bde9-3e99ee411b8b", "DetectTime": "2023-10-30T14:10:41.205130+02:00", "EventTime": "2023-10-30T14:10:41.205143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C1hgqw2EimHNoUi3Nk"]} -{"Format": "IDEA0", "ID": "00105b94-d4a9-40f3-9c83-cdd20c2219b3", "DetectTime": "2023-10-30T14:10:41.226557+02:00", "EventTime": "2023-10-30T14:10:41.226569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CbcW751UApo6hT6rs9"]} -{"Format": "IDEA0", "ID": "f2b5fd46-2a6b-429c-9701-abca129b9af1", "DetectTime": "2023-10-30T14:10:41.245574+02:00", "EventTime": "2023-10-30T14:10:41.245591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CXWuEs1D6muG3neha"]} -{"Format": "IDEA0", "ID": "f46dc315-44b3-4b63-a8f6-f5780dc147bf", "DetectTime": "2023-10-30T14:10:41.267641+02:00", "EventTime": "2023-10-30T14:10:41.267652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CiZzM54MT4MCX8hrEh"]} -{"Format": "IDEA0", "ID": "08df1ce2-5e7b-4a3d-9f9c-cd7122d130c5", "DetectTime": "2023-10-30T14:10:41.319906+02:00", "EventTime": "2023-10-30T14:10:41.319924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CnvTUn1IbjFoSLiuO7"]} -{"Format": "IDEA0", "ID": "196051c1-a1ae-4166-ac61-e37c572aa3a3", "DetectTime": "2023-10-30T14:10:41.342500+02:00", "EventTime": "2023-10-30T14:10:41.342520+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CpgStc3gPHrkiCFAf1"]} -{"Format": "IDEA0", "ID": "1e4b0896-6030-4ec0-b0c0-b9ed10d2f371", "DetectTime": "2023-10-30T14:10:41.375963+02:00", "EventTime": "2023-10-30T14:10:41.375986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3xlPYfyxgOpHW9d3"]} -{"Format": "IDEA0", "ID": "a03c06f7-11b6-437b-a152-4d78877e7996", "DetectTime": "2023-10-30T14:10:41.397646+02:00", "EventTime": "2023-10-30T14:10:41.397658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CtPLVs3gsoKMqElrs1"]} -{"Format": "IDEA0", "ID": "f3318152-d228-4784-a3be-00b6ec7385c1", "DetectTime": "2023-10-30T14:10:41.417847+02:00", "EventTime": "2023-10-30T14:10:41.417864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C4ijCj19lZpe39IQWf"]} -{"Format": "IDEA0", "ID": "666cc92d-640b-4100-91e8-810f86c54602", "DetectTime": "2023-10-30T14:10:41.436196+02:00", "EventTime": "2023-10-30T14:10:41.436216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CBgqNE4OrdkV6h5v1j"]} -{"Format": "IDEA0", "ID": "b8eccc39-0e81-4f0b-ab77-67220668f265", "DetectTime": "2023-10-30T14:10:41.485632+02:00", "EventTime": "2023-10-30T14:10:41.485651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CkkIec2rL9X0D3u3kj"]} -{"Format": "IDEA0", "ID": "08ffd6e5-94b0-48aa-9a49-09dc87f07dc2", "DetectTime": "2023-10-30T14:10:41.504904+02:00", "EventTime": "2023-10-30T14:10:41.504928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CEoifq3By5GV2yGMNk"]} -{"Format": "IDEA0", "ID": "8a9598db-c885-4694-9430-c2f13773f6fc", "DetectTime": "2023-10-30T14:10:41.524825+02:00", "EventTime": "2023-10-30T14:10:41.524843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C8Zwbo3c236cgMFvnk"]} -{"Format": "IDEA0", "ID": "dc3d4cb5-e442-4858-825c-278b4450876c", "DetectTime": "2023-10-30T14:10:41.545154+02:00", "EventTime": "2023-10-30T14:10:41.545172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CZGDac4Dun265OOYt7"]} -{"Format": "IDEA0", "ID": "1d6088b8-967c-4b51-a39b-dea140c37b4a", "DetectTime": "2023-10-30T14:10:41.567204+02:00", "EventTime": "2023-10-30T14:10:41.567217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CEHxtOzAm2PcRJMnj"]} -{"Format": "IDEA0", "ID": "a26471a4-56d0-4a7e-a310-b7ef98f7cc3a", "DetectTime": "2023-10-30T14:10:41.589047+02:00", "EventTime": "2023-10-30T14:10:41.589076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5P31z3u5ILotBoV4c"]} -{"Format": "IDEA0", "ID": "f8e74b7e-638c-4aee-9394-b3f1c68b036f", "DetectTime": "2023-10-30T14:10:41.609161+02:00", "EventTime": "2023-10-30T14:10:41.609173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CVJyPb3t8Kp275jW4e"]} -{"Format": "IDEA0", "ID": "ca9eee0b-a7d7-4dc7-93b3-b2a019109c7d", "DetectTime": "2023-10-30T14:10:41.629308+02:00", "EventTime": "2023-10-30T14:10:41.629338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CVxrAg4FDdkKZuNfCc"]} -{"Format": "IDEA0", "ID": "43123469-ab34-4cb7-be7d-e0c14b3ed1f4", "DetectTime": "2023-10-30T14:10:41.651148+02:00", "EventTime": "2023-10-30T14:10:41.651166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CqVzzc1PzjKstiyZyi"]} -{"Format": "IDEA0", "ID": "0b7671ef-cf6a-4c36-8114-b87484cae8a8", "DetectTime": "2023-10-30T14:10:41.670648+02:00", "EventTime": "2023-10-30T14:10:41.670665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ClJg424PPFYhEK2r71"]} -{"Format": "IDEA0", "ID": "3fb2cafd-4dd0-4b78-a281-654674ae8f9f", "DetectTime": "2023-10-30T14:10:41.690132+02:00", "EventTime": "2023-10-30T14:10:41.690149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cm2wdq2FA4tsvUWCIh"]} -{"Format": "IDEA0", "ID": "a5eda5b4-473c-4993-af4b-18bb4682bbeb", "DetectTime": "2023-10-30T14:10:41.712067+02:00", "EventTime": "2023-10-30T14:10:41.712084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CVtFer4KhiHki2MZTg"]} -{"Format": "IDEA0", "ID": "e7465f4a-005a-44a9-b28f-f9f5e95e3fb2", "DetectTime": "2023-10-30T14:10:41.730665+02:00", "EventTime": "2023-10-30T14:10:41.730677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CbqRr14eqEfYyzrStd"]} -{"Format": "IDEA0", "ID": "da3bd180-7215-4b36-b28a-9561083e4cc3", "DetectTime": "2023-10-30T14:10:41.749526+02:00", "EventTime": "2023-10-30T14:10:41.749542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuQaYd4kKzBzK8eZj6"]} -{"Format": "IDEA0", "ID": "3f2dde27-aa72-4bea-a023-b9ffa104915d", "DetectTime": "2023-10-30T14:10:41.793930+02:00", "EventTime": "2023-10-30T14:10:41.793946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cyjvzl2UBfwJnxCfY5"]} -{"Format": "IDEA0", "ID": "84974ad0-7efe-4771-a4ba-94f2456a5e24", "DetectTime": "2023-10-30T14:10:41.812621+02:00", "EventTime": "2023-10-30T14:10:41.812632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C4SEgo3wJzmpMnSGJk"]} -{"Format": "IDEA0", "ID": "bb5146a1-972e-4126-a066-ebe104e3c03a", "DetectTime": "2023-10-30T14:10:41.827033+02:00", "EventTime": "2023-10-30T14:10:41.827044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CEewOdOW1xiVMoZwg"]} -{"Format": "IDEA0", "ID": "5cc0055d-227f-4f2c-bee8-47bbb6410f7b", "DetectTime": "2023-10-30T14:10:41.842171+02:00", "EventTime": "2023-10-30T14:10:41.842183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CMgv7g2U6x4zMyIiW4"]} -{"Format": "IDEA0", "ID": "4168d6de-29d7-4049-8906-a5266fe70ba1", "DetectTime": "2023-10-30T14:10:41.859047+02:00", "EventTime": "2023-10-30T14:10:41.859065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["ClWGAh369Ew6u9wmf7"]} -{"Format": "IDEA0", "ID": "45f2a05a-ebad-453e-9207-39424d6bed02", "DetectTime": "2023-10-30T14:10:41.878812+02:00", "EventTime": "2023-10-30T14:10:41.878824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CcAOh7239ntuTRVOI1"]} -{"Format": "IDEA0", "ID": "060615b4-6785-4177-b256-8c9f937762b7", "DetectTime": "2023-10-30T14:10:41.899120+02:00", "EventTime": "2023-10-30T14:10:41.899137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVUIB74ac2whQmFJee"]} -{"Format": "IDEA0", "ID": "816b05f8-ea63-4833-ba51-50d996189b77", "DetectTime": "2023-10-30T14:10:41.920717+02:00", "EventTime": "2023-10-30T14:10:41.920735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["COQb7g4LXTxYtHPFlj"]} -{"Format": "IDEA0", "ID": "7f25404b-c0e6-417b-8a4f-b6e7e3b322b1", "DetectTime": "2023-10-30T14:10:41.937338+02:00", "EventTime": "2023-10-30T14:10:41.937348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CmtayL21mngA4nDtc"]} -{"Format": "IDEA0", "ID": "88710a95-d399-467f-8d37-fa58318c9ca6", "DetectTime": "2023-10-30T14:10:41.956707+02:00", "EventTime": "2023-10-30T14:10:41.956724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CyPgSf2KqSYJJmIf93"]} -{"Format": "IDEA0", "ID": "2bd2e61a-23f7-4176-8c98-f93cb9e6f3f3", "DetectTime": "2023-10-30T14:10:41.974724+02:00", "EventTime": "2023-10-30T14:10:41.974741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CrVTaS2FXXwLEDEYq1"]} -{"Format": "IDEA0", "ID": "53da515e-befa-4880-a96c-eca0180bad55", "DetectTime": "2023-10-30T14:10:42.012900+02:00", "EventTime": "2023-10-30T14:10:42.012916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CbGcDH23rOwxgyeytj"]} -{"Format": "IDEA0", "ID": "0d5b929f-75fd-493a-aa6e-1276931b928c", "DetectTime": "2023-10-30T14:10:42.031514+02:00", "EventTime": "2023-10-30T14:10:42.031529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C8Jc8M2KkQKddOlA93"]} -{"Format": "IDEA0", "ID": "a6289197-9451-4ede-a663-e0889aaa95d1", "DetectTime": "2023-10-30T14:10:42.048535+02:00", "EventTime": "2023-10-30T14:10:42.048548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CbOU0oNpDfl5XFaXa"]} -{"Format": "IDEA0", "ID": "8c74125d-2952-46cb-bdfa-56d2e38c86a7", "DetectTime": "2023-10-30T14:10:42.064386+02:00", "EventTime": "2023-10-30T14:10:42.064405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CUL2kr1CqBbMY6x2Gd"]} -{"Format": "IDEA0", "ID": "07a32fdf-7673-431c-9da5-5eb2c8848c3f", "DetectTime": "2023-10-30T14:10:42.081353+02:00", "EventTime": "2023-10-30T14:10:42.081365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CnDbWm3ZyvsCTo4wDj"]} -{"Format": "IDEA0", "ID": "262ee8ff-5987-41e0-812a-9ac9b105192b", "DetectTime": "2023-10-30T14:10:42.097757+02:00", "EventTime": "2023-10-30T14:10:42.097770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CumYSZ3BLENR6QAQ2k"]} -{"Format": "IDEA0", "ID": "368a9693-3b30-4604-92f7-f1f7671cc02a", "DetectTime": "2023-10-30T14:10:42.114386+02:00", "EventTime": "2023-10-30T14:10:42.114398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["ClAddZ3FPnjsSHxIq7"]} -{"Format": "Json", "ID": "368a9693-3b30-4604-92f7-f1f7671cc02a", "DetectTime": "2023-10-30T14:10:42.114386+02:00", "EventTime": "2023-10-30T14:10:42.114398+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:43:20.099166+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:42.219234)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0613f353-48e4-4838-abd2-81e2be465944", "DetectTime": "2023-10-30T14:10:42.223346+02:00", "EventTime": "2023-10-30T14:10:42.223357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CQZRom2NuoLT9PU6Yh"]} -{"Format": "IDEA0", "ID": "12879367-d248-4a1d-867b-4541e9d94766", "DetectTime": "2023-10-30T14:10:42.241692+02:00", "EventTime": "2023-10-30T14:10:42.241708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CqE2ok1iNhNLlMHCHl"]} -{"Format": "IDEA0", "ID": "9248ca9a-c0fb-4e53-89ef-9730d142e880", "DetectTime": "2023-10-30T14:10:42.256133+02:00", "EventTime": "2023-10-30T14:10:42.256143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CCqOiFqzrVU39u3mk"]} -{"Format": "IDEA0", "ID": "45a5f188-d164-41bc-910d-95ec04b3a7b4", "DetectTime": "2023-10-30T14:10:42.276323+02:00", "EventTime": "2023-10-30T14:10:42.276340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C3rrZV3SkhfQ4B0GS"]} -{"Format": "IDEA0", "ID": "68ae6be9-036b-4283-84b7-6078a9eb36a1", "DetectTime": "2023-10-30T14:10:42.291535+02:00", "EventTime": "2023-10-30T14:10:42.291551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CCrBRn4H0NWgHFs1w"]} -{"Format": "IDEA0", "ID": "548677ac-571f-4930-a2fb-d80d660a6f9b", "DetectTime": "2023-10-30T14:10:42.307938+02:00", "EventTime": "2023-10-30T14:10:42.307953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CosjY4iBoEYRUBQZ4"]} -{"Format": "IDEA0", "ID": "e6124887-a097-42f8-889c-5a4526533838", "DetectTime": "2023-10-30T14:10:42.326910+02:00", "EventTime": "2023-10-30T14:10:42.326924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CnqHd6148DGvzyWsig"]} -{"Format": "IDEA0", "ID": "f6f6ed24-fc92-452c-92f6-ce8d1d353077", "DetectTime": "2023-10-30T14:10:42.368015+02:00", "EventTime": "2023-10-30T14:10:42.368041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CwXrdz2P5NxRLRgt91"]} -{"Format": "IDEA0", "ID": "aff9ac9d-039f-4e0b-9053-c8843ba2ee61", "DetectTime": "2023-10-30T14:10:42.386948+02:00", "EventTime": "2023-10-30T14:10:42.386965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CCKO0H2xP1fh5KCvZh"]} -{"Format": "IDEA0", "ID": "ee860b82-36d5-4f05-90f5-efdd1f26b5d4", "DetectTime": "2023-10-30T14:10:42.402033+02:00", "EventTime": "2023-10-30T14:10:42.402047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CW2eRo2wv1hPstEYH3"]} -{"Format": "IDEA0", "ID": "4bde5887-6643-496d-9b0a-a19ef3d69cc5", "DetectTime": "2023-10-30T14:10:42.419744+02:00", "EventTime": "2023-10-30T14:10:42.419755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CKWcMa4L8SzjNX0W7d"]} -{"Format": "IDEA0", "ID": "5444222a-c5cc-400a-a269-b0da7ef4ccc7", "DetectTime": "2023-10-30T14:10:42.438125+02:00", "EventTime": "2023-10-30T14:10:42.438137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["ClOHng21GmWFGa6bAe"]} -{"Format": "IDEA0", "ID": "baa0526d-16a3-49a8-ab1a-0811e67f5af9", "DetectTime": "2023-10-30T14:10:42.455742+02:00", "EventTime": "2023-10-30T14:10:42.455758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CejZM93VdfDHSUfy0e"]} -{"Format": "IDEA0", "ID": "3803b57c-00bc-48e2-80a0-ce7af5f8ee7b", "DetectTime": "2023-10-30T14:10:42.500297+02:00", "EventTime": "2023-10-30T14:10:42.500310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CvcDFdJxFMfKhtXGf"]} -{"Format": "IDEA0", "ID": "1b906dc3-d07e-47bb-ad0d-2cd1fd536e06", "DetectTime": "2023-10-30T14:10:42.516546+02:00", "EventTime": "2023-10-30T14:10:42.516557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CiyJRIgYzu2Fm8123"]} -{"Format": "IDEA0", "ID": "015b1a3f-34c8-4c12-8d47-f8a11edb0078", "DetectTime": "2023-10-30T14:10:42.536263+02:00", "EventTime": "2023-10-30T14:10:42.536282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CuoC3W2mmUvyUWpORj"]} -{"Format": "IDEA0", "ID": "b15afa2d-7458-468c-97fd-e0222be625cc", "DetectTime": "2023-10-30T14:10:42.554438+02:00", "EventTime": "2023-10-30T14:10:42.554454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cvj9tN2Fv9IDZXwpfh"]} -{"Format": "IDEA0", "ID": "4d0e4386-86d7-440f-9871-333be0a53ca9", "DetectTime": "2023-10-30T14:10:42.574223+02:00", "EventTime": "2023-10-30T14:10:42.574238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CMiLy82b30CoH3IlK9"]} -{"Format": "IDEA0", "ID": "202ba352-8a63-43c4-9a8d-4154a81a3100", "DetectTime": "2023-10-30T14:10:42.615111+02:00", "EventTime": "2023-10-30T14:10:42.615126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CDgKWH16i4Dhe4amA5"]} -{"Format": "IDEA0", "ID": "e184050c-db91-4de7-aaff-9d173720f510", "DetectTime": "2023-10-30T14:10:42.632794+02:00", "EventTime": "2023-10-30T14:10:42.632811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C0IPvXamrOuHgtXr5"]} -{"Format": "IDEA0", "ID": "238c1b9b-0daa-4344-afc4-417c26c51c63", "DetectTime": "2023-10-30T14:10:42.651917+02:00", "EventTime": "2023-10-30T14:10:42.651933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C6Nwpt487y7I5Imuf4"]} -{"Format": "IDEA0", "ID": "1a71a88c-c94d-4e77-a314-19dde43e4a70", "DetectTime": "2023-10-30T14:10:42.671738+02:00", "EventTime": "2023-10-30T14:10:42.671755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C5j7Lb2gFTxqFJy7Ae"]} -{"Format": "IDEA0", "ID": "45d267b4-f972-40d2-b96d-a90afd2b8e3b", "DetectTime": "2023-10-30T14:10:42.715629+02:00", "EventTime": "2023-10-30T14:10:42.715645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CvCyHP3NM26g9bCR7e"]} -{"Format": "IDEA0", "ID": "f8954c9b-8b82-45fd-94ba-8e15295fe276", "DetectTime": "2023-10-30T14:10:42.736179+02:00", "EventTime": "2023-10-30T14:10:42.736190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CunXRH2PW3Kpye9waa"]} -{"Format": "IDEA0", "ID": "826a27c3-4638-445c-9b77-ae5cdbbbc674", "DetectTime": "2023-10-30T14:10:42.749136+02:00", "EventTime": "2023-10-30T14:10:42.749146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C8CiWu1p4ogBQXkOl4"]} -{"Format": "IDEA0", "ID": "170415fb-a581-4f43-846d-16ad2d76223f", "DetectTime": "2023-10-30T14:10:42.766368+02:00", "EventTime": "2023-10-30T14:10:42.766383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["C87nSa2O2lg5tCNRFk"]} -{"Format": "IDEA0", "ID": "88ebf05b-9bcc-40e9-85c0-b1ca9213c6a9", "DetectTime": "2023-10-30T14:10:42.779611+02:00", "EventTime": "2023-10-30T14:10:42.779627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Chpzea4kHCU4RyKs8l"]} -{"Format": "IDEA0", "ID": "1bdfb34a-b7ca-4f5c-ab3f-80c551cc618c", "DetectTime": "2023-10-30T14:10:42.797742+02:00", "EventTime": "2023-10-30T14:10:42.797753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoHYsV1FxhyrxKpJo7"]} -{"Format": "IDEA0", "ID": "06225af2-df55-4fe9-8d8f-f0f22ea46037", "DetectTime": "2023-10-30T14:10:42.813664+02:00", "EventTime": "2023-10-30T14:10:42.813680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CRAhPm3yYE4lUYJkW8"]} -{"Format": "IDEA0", "ID": "846020d9-9c23-4fa0-89f0-025f6ba45ba6", "DetectTime": "2023-10-30T14:10:42.830239+02:00", "EventTime": "2023-10-30T14:10:42.830250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cfs9zA4qdRXJhoTGbc"]} -{"Format": "IDEA0", "ID": "9a7cfa5f-9f29-4b7b-b9c0-dce0b5515841", "DetectTime": "2023-10-30T14:10:42.843142+02:00", "EventTime": "2023-10-30T14:10:42.843152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["C7m1w42cvnjueLPEg2"]} -{"Format": "IDEA0", "ID": "9b85992d-a273-45bf-b379-d74d5f7b8274", "DetectTime": "2023-10-30T14:10:42.858311+02:00", "EventTime": "2023-10-30T14:10:42.858324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CMvYsR1ZqrbMHznRcg"]} -{"Format": "IDEA0", "ID": "acc427c9-e961-4629-a92a-0ad6f3acba9e", "DetectTime": "2023-10-30T14:10:42.900009+02:00", "EventTime": "2023-10-30T14:10:42.900021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C8DCaj1Vd4Jfvk7G35"]} -{"Format": "IDEA0", "ID": "ff5cc398-57d7-4cde-9348-96beddcb7962", "DetectTime": "2023-10-30T14:10:42.913075+02:00", "EventTime": "2023-10-30T14:10:42.913085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CERR7q4CWLWeyEzhMg"]} -{"Format": "IDEA0", "ID": "3752a2dc-9143-4469-8501-6802f94cad49", "DetectTime": "2023-10-30T14:10:42.928268+02:00", "EventTime": "2023-10-30T14:10:42.928284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CXvU5a1Nbv7R1ijELi"]} -{"Format": "IDEA0", "ID": "bd04bd5d-d12e-4669-96f9-565b23c37cee", "DetectTime": "2023-10-30T14:10:42.943386+02:00", "EventTime": "2023-10-30T14:10:42.943397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4LyUf3eN4KlSQlWuk"]} -{"Format": "IDEA0", "ID": "5fe5b19e-3acd-4c01-8c33-38ec29098334", "DetectTime": "2023-10-30T14:10:42.957329+02:00", "EventTime": "2023-10-30T14:10:42.957344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["Cxgw7y29w9wqdLVb1g"]} -{"Format": "IDEA0", "ID": "e659645c-f64c-4ca9-a3de-7984e24d6016", "DetectTime": "2023-10-30T14:10:42.975421+02:00", "EventTime": "2023-10-30T14:10:42.975437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZResI5GRLJcvVsVh"]} -{"Format": "IDEA0", "ID": "7da6dca9-211b-4e04-9f84-d32009359265", "DetectTime": "2023-10-30T14:10:42.993519+02:00", "EventTime": "2023-10-30T14:10:42.993535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CkgVqBAerk9Fu4J93"]} -{"Format": "IDEA0", "ID": "e5035e7d-53a1-4537-aa45-3c20406018d2", "DetectTime": "2023-10-30T14:10:43.012201+02:00", "EventTime": "2023-10-30T14:10:43.012216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CGDPXk24PGuM2uLadi"]} -{"Format": "IDEA0", "ID": "3e515a13-a0d1-41bc-b45b-eed97636198d", "DetectTime": "2023-10-30T14:10:43.030660+02:00", "EventTime": "2023-10-30T14:10:43.030676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cw724j4EYqeHvqUEJ2"]} -{"Format": "IDEA0", "ID": "4ffd126f-6bf0-4b17-98e4-8746070c8f60", "DetectTime": "2023-10-30T14:10:43.045841+02:00", "EventTime": "2023-10-30T14:10:43.045852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cw3W1wckXnc1tkclj"]} -{"Format": "IDEA0", "ID": "ae43256d-3596-4f53-a957-e665597138f1", "DetectTime": "2023-10-30T14:10:43.062042+02:00", "EventTime": "2023-10-30T14:10:43.062055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C0JHrWLwtIl2KeUc8"]} -{"Format": "IDEA0", "ID": "ac6f9e71-ef63-476c-a36e-727ca24762f2", "DetectTime": "2023-10-30T14:10:43.077245+02:00", "EventTime": "2023-10-30T14:10:43.077267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CQxJ9V3BVEdX8xusqc"]} -{"Format": "IDEA0", "ID": "d9066ffd-d8f9-42dd-a45e-8c3a7c900cbd", "DetectTime": "2023-10-30T14:10:43.095072+02:00", "EventTime": "2023-10-30T14:10:43.095088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CmjRL6mVbI3z96RXb"]} -{"Format": "IDEA0", "ID": "2bbe5a1d-0ce9-4224-a12c-256a774fa694", "DetectTime": "2023-10-30T14:10:43.131103+02:00", "EventTime": "2023-10-30T14:10:43.131113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CqXjOw2rCJmorjh2Dd"]} -{"Format": "IDEA0", "ID": "2e9d3822-7051-4a20-9e99-63f8604fa3b5", "DetectTime": "2023-10-30T14:10:43.146181+02:00", "EventTime": "2023-10-30T14:10:43.146199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CM9hs03jgZSsu7lq78"]} -{"Format": "IDEA0", "ID": "eeea16e4-b628-4012-91f6-b4e6e548ec17", "DetectTime": "2023-10-30T14:10:43.164056+02:00", "EventTime": "2023-10-30T14:10:43.164071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cq9Vx13KCUhwttdYce"]} -{"Format": "IDEA0", "ID": "0fb748b8-4c37-4ead-a48c-e0d1d0bc0ea3", "DetectTime": "2023-10-30T14:10:43.178532+02:00", "EventTime": "2023-10-30T14:10:43.178544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CSgjFr3KIOzlomzEf9"]} -{"Format": "IDEA0", "ID": "c9ae240f-bff6-40bf-85dc-9a5639d243bb", "DetectTime": "2023-10-30T14:10:43.196061+02:00", "EventTime": "2023-10-30T14:10:43.196076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CCF8954lHOvaqsu6ze"]} -{"Format": "IDEA0", "ID": "3d0a72d1-316d-4ebc-947b-d622bbbbd35d", "DetectTime": "2023-10-30T14:10:43.211798+02:00", "EventTime": "2023-10-30T14:10:43.211809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CtrMhq3HlxF34UzmCe"]} -{"Format": "IDEA0", "ID": "85e7e9b2-3058-4393-bb9f-6bf0fd45a258", "DetectTime": "2023-10-30T14:10:43.230023+02:00", "EventTime": "2023-10-30T14:10:43.230039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CjwsFh4j38AHJOlCNc"]} -{"Format": "IDEA0", "ID": "ad65a4d6-be6a-4730-b0d0-42b53eaef13d", "DetectTime": "2023-10-30T14:10:43.246271+02:00", "EventTime": "2023-10-30T14:10:43.246281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CO7JUs1RwB9v4Xjeqe"]} -{"Format": "IDEA0", "ID": "cb7ebd4e-d2c2-448e-b8cb-13df6ce1e71c", "DetectTime": "2023-10-30T14:10:43.278228+02:00", "EventTime": "2023-10-30T14:10:43.278238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CAEk9U1F13ERqe0lLg"]} -{"Format": "IDEA0", "ID": "a72c72bb-0570-4256-a5ff-eabdca624a5f", "DetectTime": "2023-10-30T14:10:43.293835+02:00", "EventTime": "2023-10-30T14:10:43.293847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C8J9lA4OmU8AvciSK9"]} -{"Format": "IDEA0", "ID": "5bfbec7c-9e43-4763-8025-3ab6177c93d1", "DetectTime": "2023-10-30T14:10:43.306297+02:00", "EventTime": "2023-10-30T14:10:43.306309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIIfuousD0e0GTEPg"]} -{"Format": "IDEA0", "ID": "236e60ad-b525-48d9-bf7c-8a65145d2142", "DetectTime": "2023-10-30T14:10:43.319636+02:00", "EventTime": "2023-10-30T14:10:43.319648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CE959v4CYcHm0VTdC3"]} -{"Format": "IDEA0", "ID": "ac92aaf9-49d9-4db0-9339-7c1ffddc0866", "DetectTime": "2023-10-30T14:10:43.333294+02:00", "EventTime": "2023-10-30T14:10:43.333308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CibuctG0Ar8goFmgf"]} -{"Format": "IDEA0", "ID": "a251d5ec-3851-4438-b6c4-6ecc96a3410c", "DetectTime": "2023-10-30T14:10:43.348354+02:00", "EventTime": "2023-10-30T14:10:43.348366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C0gunR2Ej2gybOExw6"]} -{"Format": "IDEA0", "ID": "f6f5901c-5188-4efb-8707-71fb0815fc43", "DetectTime": "2023-10-30T14:10:43.370217+02:00", "EventTime": "2023-10-30T14:10:43.370228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Ck1bf63awGWeyjI0bc"]} -{"Format": "IDEA0", "ID": "1f4a8a10-be6d-47ae-b180-674bd96feeeb", "DetectTime": "2023-10-30T14:10:43.384372+02:00", "EventTime": "2023-10-30T14:10:43.384382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CESc033eQgntVY5mdg"]} -{"Format": "IDEA0", "ID": "6cd43378-1267-4c74-8082-1162b2c13934", "DetectTime": "2023-10-30T14:10:43.398282+02:00", "EventTime": "2023-10-30T14:10:43.398294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CocW3j1ArhEvTSWKj4"]} -{"Format": "IDEA0", "ID": "7571ef24-580d-4f4f-935b-4610c5c75dd4", "DetectTime": "2023-10-30T14:10:43.413504+02:00", "EventTime": "2023-10-30T14:10:43.413515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CazrYH1pvGnzmSeeL5"]} -{"Format": "Json", "ID": "7571ef24-580d-4f4f-935b-4610c5c75dd4", "DetectTime": "2023-10-30T14:10:43.413504+02:00", "EventTime": "2023-10-30T14:10:43.413515+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:43:21.686376+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:43.485507)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "156787ed-11ef-4884-bbb3-c912ed088cd4", "DetectTime": "2023-10-30T14:10:43.489527+02:00", "EventTime": "2023-10-30T14:10:43.489538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C7f2IlQd7ROnzzyag"]} -{"Format": "IDEA0", "ID": "07896521-41b3-4914-88ec-f4ee02bee566", "DetectTime": "2023-10-30T14:10:43.506065+02:00", "EventTime": "2023-10-30T14:10:43.506082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CGoOhjojtwFIpgIq3"]} -{"Format": "IDEA0", "ID": "6ec21e56-5784-4f58-b2c2-c76343d5d7af", "DetectTime": "2023-10-30T14:10:43.524029+02:00", "EventTime": "2023-10-30T14:10:43.524048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CGIf9h2DM8iSAT3ozk"]} -{"Format": "IDEA0", "ID": "db3163d3-e2ac-4c00-aaf3-696081fe385d", "DetectTime": "2023-10-30T14:10:43.538382+02:00", "EventTime": "2023-10-30T14:10:43.538396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CmbSvaDjdkALVzmEc"]} -{"Format": "IDEA0", "ID": "80714722-8663-4ce8-84a7-39936d2cf362", "DetectTime": "2023-10-30T14:10:43.556243+02:00", "EventTime": "2023-10-30T14:10:43.556258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cl4FCr3mnwe4MPuFPd"]} -{"Format": "IDEA0", "ID": "74a89466-9725-4e74-ada0-b76d626b8a6d", "DetectTime": "2023-10-30T14:10:43.571394+02:00", "EventTime": "2023-10-30T14:10:43.571409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CCfkE03FdB9nGR3ve"]} -{"Format": "IDEA0", "ID": "0dd6d728-3569-43b2-861f-57c749b42421", "DetectTime": "2023-10-30T14:10:43.590132+02:00", "EventTime": "2023-10-30T14:10:43.590146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CFt2Oe4hsDS5sDaTVj"]} -{"Format": "IDEA0", "ID": "d1765671-e1f6-43d7-9039-bbbdfb2aaf14", "DetectTime": "2023-10-30T14:10:43.608880+02:00", "EventTime": "2023-10-30T14:10:43.608896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CrN9bl31m3Nds75WC1"]} -{"Format": "IDEA0", "ID": "5def95c7-e824-4bd9-a301-50abad639e8e", "DetectTime": "2023-10-30T14:10:43.625824+02:00", "EventTime": "2023-10-30T14:10:43.625834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C87AEa4kpBloc7nJc9"]} -{"Format": "IDEA0", "ID": "6ffc06c4-94c4-46e4-a435-c3deaf61b54a", "DetectTime": "2023-10-30T14:10:43.640501+02:00", "EventTime": "2023-10-30T14:10:43.640513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CczRvp2wZRiKyvYOIa"]} -{"Format": "IDEA0", "ID": "a94eb8e7-5c3f-4deb-b85e-ce681f043684", "DetectTime": "2023-10-30T14:10:43.655639+02:00", "EventTime": "2023-10-30T14:10:43.655651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["Cm50S41hftpZ0R2Rvk"]} -{"Format": "IDEA0", "ID": "d76ad84e-3654-4810-be55-1e7960f55a6b", "DetectTime": "2023-10-30T14:10:43.671586+02:00", "EventTime": "2023-10-30T14:10:43.671603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3TBnx1ffdfGc8PEz4"]} -{"Format": "IDEA0", "ID": "074a141a-da34-405f-8714-691e73c5dccd", "DetectTime": "2023-10-30T14:10:43.690588+02:00", "EventTime": "2023-10-30T14:10:43.690603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C99TMt399wzJwCKIx6"]} -{"Format": "IDEA0", "ID": "728d2c35-989c-42ec-b7a1-bde29b91e7d5", "DetectTime": "2023-10-30T14:10:43.706012+02:00", "EventTime": "2023-10-30T14:10:43.706027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CRrxcJ1DNww7kNBqe"]} -{"Format": "IDEA0", "ID": "9196e0b5-7932-4e4b-a5f1-32c9fbfb8c72", "DetectTime": "2023-10-30T14:10:43.724261+02:00", "EventTime": "2023-10-30T14:10:43.724276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CUIqh02Ham8MSkd2s3"]} -{"Format": "IDEA0", "ID": "570605c9-8a3b-4a1c-a95e-fc36cbe03134", "DetectTime": "2023-10-30T14:10:43.740787+02:00", "EventTime": "2023-10-30T14:10:43.740797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C5S72I37LDCzTthGM1"]} -{"Format": "IDEA0", "ID": "e6b1ecc0-7b4b-4938-88f8-5eaaa859dad4", "DetectTime": "2023-10-30T14:10:43.754132+02:00", "EventTime": "2023-10-30T14:10:43.754144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C6UBOm3eQTvNZAy59e"]} -{"Format": "IDEA0", "ID": "57c36814-9fca-4318-bdb1-583df4a43ca9", "DetectTime": "2023-10-30T14:10:43.786864+02:00", "EventTime": "2023-10-30T14:10:43.786881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CrheBc2MNKo8DID4ub"]} -{"Format": "IDEA0", "ID": "cea0f9b3-9ef1-4b34-a067-a400a74394ee", "DetectTime": "2023-10-30T14:10:43.802864+02:00", "EventTime": "2023-10-30T14:10:43.802882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CCeSZl2dbRiSvblFNd"]} -{"Format": "IDEA0", "ID": "9cd3a10b-71bd-45cf-8c7d-26eaa3572260", "DetectTime": "2023-10-30T14:10:43.818678+02:00", "EventTime": "2023-10-30T14:10:43.818689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CPFbcy42NT1fIwINqh"]} -{"Format": "IDEA0", "ID": "540d12fc-8b6a-46a7-a35b-d2f673597ee3", "DetectTime": "2023-10-30T14:10:43.834732+02:00", "EventTime": "2023-10-30T14:10:43.834745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CE3eLf2ieRS2uCZnpa"]} -{"Format": "IDEA0", "ID": "7e597613-1d36-4301-8b56-967b728c39a1", "DetectTime": "2023-10-30T14:10:43.849095+02:00", "EventTime": "2023-10-30T14:10:43.849113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CXqF2m2jtFTp2LkeL7"]} -{"Format": "IDEA0", "ID": "92a44b0c-8801-434b-8846-540a0dcba4f9", "DetectTime": "2023-10-30T14:10:43.864628+02:00", "EventTime": "2023-10-30T14:10:43.864638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CIOTqE2nUuw4ejPCGf"]} -{"Format": "IDEA0", "ID": "74c31607-a4e0-4689-ab8d-3d2ab7eff7d5", "DetectTime": "2023-10-30T14:10:43.899440+02:00", "EventTime": "2023-10-30T14:10:43.899453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CsK1wu1DGqH0mknGKb"]} -{"Format": "IDEA0", "ID": "61eae589-a6fa-4674-b9fa-746284c90927", "DetectTime": "2023-10-30T14:10:43.914963+02:00", "EventTime": "2023-10-30T14:10:43.914977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cd4aPg38YMjHZlhy23"]} -{"Format": "IDEA0", "ID": "9a4e949f-e70a-4409-9b49-647944000a17", "DetectTime": "2023-10-30T14:10:43.931550+02:00", "EventTime": "2023-10-30T14:10:43.931563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["Cv1Vu2136ZysvQO4Ee"]} -{"Format": "IDEA0", "ID": "239e5e21-8463-4701-89f9-bcfb94e299ac", "DetectTime": "2023-10-30T14:10:43.949215+02:00", "EventTime": "2023-10-30T14:10:43.949226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CAieC71IV0hbZWJexa"]} -{"Format": "IDEA0", "ID": "12093ec8-a7ff-4212-848a-2476037dbc9e", "DetectTime": "2023-10-30T14:10:43.963993+02:00", "EventTime": "2023-10-30T14:10:43.964005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CmXsPb1XvDRch0v1Il"]} -{"Format": "IDEA0", "ID": "748f0893-c24f-41f8-8fdc-15ea7dfe5863", "DetectTime": "2023-10-30T14:10:43.978073+02:00", "EventTime": "2023-10-30T14:10:43.978087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["Cywowh1IduBbqMzNOc"]} -{"Format": "IDEA0", "ID": "f435b2e8-c1e9-47b6-aa68-47282d696804", "DetectTime": "2023-10-30T14:10:43.991680+02:00", "EventTime": "2023-10-30T14:10:43.991691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CBtCLp1AAUBOEbbns"]} -{"Format": "IDEA0", "ID": "8d9455ae-12b3-4984-b084-c8775caee003", "DetectTime": "2023-10-30T14:10:44.005278+02:00", "EventTime": "2023-10-30T14:10:44.005296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CPkYQz13QETJrllet5"]} -{"Format": "IDEA0", "ID": "12f8858c-ed69-4818-8220-9632f1a59d01", "DetectTime": "2023-10-30T14:10:44.022134+02:00", "EventTime": "2023-10-30T14:10:44.022145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cax3By31GPfqTg0u13"]} -{"Format": "IDEA0", "ID": "81c74bdd-d014-4d66-8905-30fdc1f82f40", "DetectTime": "2023-10-30T14:10:44.038617+02:00", "EventTime": "2023-10-30T14:10:44.038629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CutMU0438r3vFqG5M4"]} -{"Format": "IDEA0", "ID": "0ce84321-6850-45c6-a1d5-b2c1dac2c2d1", "DetectTime": "2023-10-30T14:10:44.054140+02:00", "EventTime": "2023-10-30T14:10:44.054154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CuKXOh2TCzc7fXdm09"]} -{"Format": "IDEA0", "ID": "0c97a420-d735-458d-afb5-6c959fa42dca", "DetectTime": "2023-10-30T14:10:44.094560+02:00", "EventTime": "2023-10-30T14:10:44.094573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C1qQYF2cEK2RID7qs2"]} -{"Format": "IDEA0", "ID": "4ca534ba-e8c2-4060-a50b-449ba0993eac", "DetectTime": "2023-10-30T14:10:44.112671+02:00", "EventTime": "2023-10-30T14:10:44.112685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cg99mZ2Z6u6OhhX0n3"]} -{"Format": "IDEA0", "ID": "3fbfe347-f041-4680-87d6-2abde23babef", "DetectTime": "2023-10-30T14:10:44.128675+02:00", "EventTime": "2023-10-30T14:10:44.128686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CXvfCq3RgunIw96Byk"]} -{"Format": "IDEA0", "ID": "99d1198e-4c03-4c9a-9b4c-05e7de1c478a", "DetectTime": "2023-10-30T14:10:44.146402+02:00", "EventTime": "2023-10-30T14:10:44.146419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXEHGd2UHsnr3EjZG9"]} -{"Format": "IDEA0", "ID": "4ae3745e-bf74-4bdc-8cee-40e6c67c9253", "DetectTime": "2023-10-30T14:10:44.167505+02:00", "EventTime": "2023-10-30T14:10:44.167522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CvzCWF2DshGohxF2A2"]} -{"Format": "IDEA0", "ID": "421e7357-0aaf-4e2e-809a-f9a7644df5ea", "DetectTime": "2023-10-30T14:10:44.185401+02:00", "EventTime": "2023-10-30T14:10:44.185412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CdT7Or1aEyBFDpip6l"]} -{"Format": "IDEA0", "ID": "f142f597-b84e-45b5-808b-5fffe461a300", "DetectTime": "2023-10-30T14:10:44.199251+02:00", "EventTime": "2023-10-30T14:10:44.199266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cjc5TpIRGE36PJTL3"]} -{"Format": "IDEA0", "ID": "8df30b13-5b0f-45ae-b373-f096495491a8", "DetectTime": "2023-10-30T14:10:44.215052+02:00", "EventTime": "2023-10-30T14:10:44.215068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C0RXVc2Jvl367u8kW4"]} -{"Format": "IDEA0", "ID": "d2db7074-4262-4bd5-9102-b577abc1f30c", "DetectTime": "2023-10-30T14:10:44.232633+02:00", "EventTime": "2023-10-30T14:10:44.232648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CpcpyImUAG54Zuwa6"]} -{"Format": "IDEA0", "ID": "5a71b554-1d99-4633-be5d-431f5620ee6f", "DetectTime": "2023-10-30T14:10:44.251515+02:00", "EventTime": "2023-10-30T14:10:44.251530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CQYrv71tez7zF9ETtk"]} -{"Format": "IDEA0", "ID": "47dac3f5-f496-4a16-b464-4587155477e8", "DetectTime": "2023-10-30T14:10:44.269746+02:00", "EventTime": "2023-10-30T14:10:44.269761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cw8vD82QxaBeRt3VA3"]} -{"Format": "IDEA0", "ID": "2f4cc060-77f4-427f-be1b-ca2fa1568641", "DetectTime": "2023-10-30T14:10:44.307314+02:00", "EventTime": "2023-10-30T14:10:44.307325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHBLE8Kms66Q6gPGa"]} -{"Format": "IDEA0", "ID": "00ba8e30-1b7f-41b2-9da6-c2d36f982b86", "DetectTime": "2023-10-30T14:10:44.322775+02:00", "EventTime": "2023-10-30T14:10:44.322841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CCuvgndKysJDQI5Ki"]} -{"Format": "IDEA0", "ID": "05fb51b5-0051-4fb0-a6dd-4d42b0464a41", "DetectTime": "2023-10-30T14:10:44.340506+02:00", "EventTime": "2023-10-30T14:10:44.340527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CO8sPL3mghQEE7YUY3"]} -{"Format": "IDEA0", "ID": "aca22378-160e-4b3f-839c-a4a81c44bbd5", "DetectTime": "2023-10-30T14:10:44.357645+02:00", "EventTime": "2023-10-30T14:10:44.357662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C1WJgg1y26KqN8mWjj"]} -{"Format": "IDEA0", "ID": "6f45a3a3-4409-4003-b335-ba6219d7d1b3", "DetectTime": "2023-10-30T14:10:44.372834+02:00", "EventTime": "2023-10-30T14:10:44.372849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CBq3QR2WtTluzyojij"]} -{"Format": "IDEA0", "ID": "ad67e609-aa2f-410e-9cd1-ca5af242364a", "DetectTime": "2023-10-30T14:10:44.388479+02:00", "EventTime": "2023-10-30T14:10:44.388494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["CExlpo4ZCU2lNGYaba"]} -{"Format": "IDEA0", "ID": "4d29d431-46a6-4d8a-b229-a5d7cab14c3d", "DetectTime": "2023-10-30T14:10:44.406971+02:00", "EventTime": "2023-10-30T14:10:44.406987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CsoHJi2BP9lAagWz06"]} -{"Format": "IDEA0", "ID": "ab884ee8-f861-4488-bc78-47a7128d8a1c", "DetectTime": "2023-10-30T14:10:44.447604+02:00", "EventTime": "2023-10-30T14:10:44.447617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CBMoLu2TquDzgB9zEi"]} -{"Format": "IDEA0", "ID": "a5cbd9fb-0682-472e-8878-8492ece48d26", "DetectTime": "2023-10-30T14:10:44.463740+02:00", "EventTime": "2023-10-30T14:10:44.463752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CsfU6uc7hWxmuG8rb"]} -{"Format": "IDEA0", "ID": "316dd28a-0ca4-4443-9202-aa4b9d20d7f5", "DetectTime": "2023-10-30T14:10:44.482207+02:00", "EventTime": "2023-10-30T14:10:44.482221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CMzkY83BQl2BTkSYPg"]} -{"Format": "IDEA0", "ID": "e7fb6447-afde-41ae-9d38-7ade0c01f23d", "DetectTime": "2023-10-30T14:10:44.498965+02:00", "EventTime": "2023-10-30T14:10:44.499030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CsZxf01Q6oV8JIqSF7"]} -{"Format": "IDEA0", "ID": "a5d4aad9-a65e-4796-8157-0b912b820624", "DetectTime": "2023-10-30T14:10:44.513230+02:00", "EventTime": "2023-10-30T14:10:44.513241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmS3YD1HglonRebd12"]} -{"Format": "IDEA0", "ID": "d780a182-0a65-41d3-ba4c-920bf14dc7d5", "DetectTime": "2023-10-30T14:10:44.528308+02:00", "EventTime": "2023-10-30T14:10:44.528324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ChIxVB3ZtU1DbyXUm4"]} -{"Format": "IDEA0", "ID": "05092923-7af3-46cd-ad4c-3a674b32770d", "DetectTime": "2023-10-30T14:10:44.541614+02:00", "EventTime": "2023-10-30T14:10:44.541629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXZzpxxXOt0kC1M53"]} -{"Format": "IDEA0", "ID": "c4a2a4f0-05a7-4813-9d7d-3c30fbf583a4", "DetectTime": "2023-10-30T14:10:44.555710+02:00", "EventTime": "2023-10-30T14:10:44.555727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CgYV1Y1hMtsS5RKXCh"]} -{"Format": "IDEA0", "ID": "cb78bde2-47c9-431c-bab9-8f346c45ae4f", "DetectTime": "2023-10-30T14:10:44.572568+02:00", "EventTime": "2023-10-30T14:10:44.572580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CaRiWX2oudOmWbo9mc"]} -{"Format": "IDEA0", "ID": "19a26357-08bf-40b8-a844-17a324ef0117", "DetectTime": "2023-10-30T14:10:44.602621+02:00", "EventTime": "2023-10-30T14:10:44.602636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C6GFq33JcL4xodexq2"]} -{"Format": "IDEA0", "ID": "a2f4df96-45ce-40a4-96e6-dd3e910dd8ca", "DetectTime": "2023-10-30T14:10:44.619397+02:00", "EventTime": "2023-10-30T14:10:44.619412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CeXRgs22q3fsrXkek6"]} -{"Format": "IDEA0", "ID": "07d386cd-226c-436f-8998-77085925dd9f", "DetectTime": "2023-10-30T14:10:44.637730+02:00", "EventTime": "2023-10-30T14:10:44.637746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CGPW2Qiu8K803bWjh"]} -{"Format": "IDEA0", "ID": "647dfbeb-b244-403a-bd83-56241fbe1af8", "DetectTime": "2023-10-30T14:10:44.654415+02:00", "EventTime": "2023-10-30T14:10:44.654428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CyJqfEG00BNu4osua"]} -{"Format": "IDEA0", "ID": "4cf12f73-86c7-4b7b-84c6-dafa4876921c", "DetectTime": "2023-10-30T14:10:44.669887+02:00", "EventTime": "2023-10-30T14:10:44.669903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CyF1iEAJe5ORwfa1k"]} -{"Format": "IDEA0", "ID": "107c30b1-5d11-4fd3-a0a6-18fa20daf550", "DetectTime": "2023-10-30T14:10:44.685038+02:00", "EventTime": "2023-10-30T14:10:44.685050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CJ613834U2vjfxniNb"]} -{"Format": "IDEA0", "ID": "6dc705be-0b5a-45d3-81ce-373d21435ad5", "DetectTime": "2023-10-30T14:10:44.703434+02:00", "EventTime": "2023-10-30T14:10:44.703444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CSpoDZ3eppXbWSUc9c"]} -{"Format": "IDEA0", "ID": "e2f6bef5-b4d9-429d-84a6-d5b05ae8e928", "DetectTime": "2023-10-30T14:10:44.718596+02:00", "EventTime": "2023-10-30T14:10:44.718609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["CbO6zRwt8O2zM1tV1"]} -{"Format": "IDEA0", "ID": "129af173-fa3e-45a8-add3-3efa5bce9854", "DetectTime": "2023-10-30T14:10:44.733332+02:00", "EventTime": "2023-10-30T14:10:44.733345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C69MHt3xgrVqXhFtzb"]} -{"Format": "IDEA0", "ID": "e366b339-0eb2-4306-aa7e-a6d8f19c65d9", "DetectTime": "2023-10-30T14:10:44.748360+02:00", "EventTime": "2023-10-30T14:10:44.748372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CbZMipvANDs2f4aR3"]} -{"Format": "IDEA0", "ID": "6f9d6f72-06eb-4de7-91cb-851f49f3418c", "DetectTime": "2023-10-30T14:10:44.781273+02:00", "EventTime": "2023-10-30T14:10:44.781289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C5asM43NEYefG2nYqa"]} -{"Format": "IDEA0", "ID": "5ff2efed-3641-4413-a6da-bd74f449b63a", "DetectTime": "2023-10-30T14:10:44.800536+02:00", "EventTime": "2023-10-30T14:10:44.800551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CsPAaZ2b95YXXDfkPc"]} -{"Format": "IDEA0", "ID": "29c7abd6-b59b-470e-8a61-c407a7fe49b5", "DetectTime": "2023-10-30T14:10:44.815519+02:00", "EventTime": "2023-10-30T14:10:44.815538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cm7Ine4u19RFAoyk5"]} -{"Format": "IDEA0", "ID": "573b72b9-8a8e-4a75-ad23-3e0bb2c71610", "DetectTime": "2023-10-30T14:10:44.830414+02:00", "EventTime": "2023-10-30T14:10:44.830431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C6D0Di12A2XPoJeXn7"]} -{"Format": "IDEA0", "ID": "b9693873-d22c-437a-9290-24684db6d6d3", "DetectTime": "2023-10-30T14:10:44.843635+02:00", "EventTime": "2023-10-30T14:10:44.843644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CKWHQp2rP1PwMcrmL2"]} -{"Format": "IDEA0", "ID": "71baa590-763f-4335-affc-c8179586e370", "DetectTime": "2023-10-30T14:10:44.856176+02:00", "EventTime": "2023-10-30T14:10:44.856186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["ClTGiq2ZxJwir3yCM3"]} -{"Format": "Json", "ID": "71baa590-763f-4335-affc-c8179586e370", "DetectTime": "2023-10-30T14:10:44.856176+02:00", "EventTime": "2023-10-30T14:10:44.856186+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:43:42.846267+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:44.926734)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e59a6f71-bd1b-4a5f-b7b5-ad06854cecf1", "DetectTime": "2023-10-30T14:10:44.931088+02:00", "EventTime": "2023-10-30T14:10:44.931100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMNi0x1C1wkul5AZt2"]} -{"Format": "IDEA0", "ID": "96a10062-44b2-438a-84bd-68caaf82a54c", "DetectTime": "2023-10-30T14:10:44.946171+02:00", "EventTime": "2023-10-30T14:10:44.946181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CCBtV51zDXebx8BWF4"]} -{"Format": "IDEA0", "ID": "6d62b903-f989-4cbc-a855-f6dd38ec4ff3", "DetectTime": "2023-10-30T14:10:44.963239+02:00", "EventTime": "2023-10-30T14:10:44.963252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.54.61.128 ", "ContentType": "text/plain"}], "uids": ["CGsHbY1cLx5CgwLbU7"]} -{"Format": "IDEA0", "ID": "f1e053f8-3902-4b14-8918-e3d3333a2f1b", "DetectTime": "2023-10-30T14:10:44.980147+02:00", "EventTime": "2023-10-30T14:10:44.980159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CXq52Qz8qFSl6bQW7"]} -{"Format": "IDEA0", "ID": "c9236189-fd88-43fd-918a-2443ad9d4b4c", "DetectTime": "2023-10-30T14:10:44.998689+02:00", "EventTime": "2023-10-30T14:10:44.998707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CWrBEy5qfLnO3d7Qe"]} -{"Format": "IDEA0", "ID": "4d588d74-9dde-4946-aef6-2b30667cbdbe", "DetectTime": "2023-10-30T14:10:45.019461+02:00", "EventTime": "2023-10-30T14:10:45.019483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CxDUdi2r9HF8wqzyJc"]} -{"Format": "IDEA0", "ID": "941bf335-c2fb-45e6-a40d-f5618504b119", "DetectTime": "2023-10-30T14:10:45.035533+02:00", "EventTime": "2023-10-30T14:10:45.035559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.176.144.253 ", "ContentType": "text/plain"}], "uids": ["C4ipVX3CvtaYcVxWne"]} -{"Format": "IDEA0", "ID": "3bda6264-4f8b-486d-8e73-11863cef8efa", "DetectTime": "2023-10-30T14:10:45.053522+02:00", "EventTime": "2023-10-30T14:10:45.053538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C71R75XBxKgm8djvd"]} -{"Format": "IDEA0", "ID": "d11e97d7-a8e8-44d4-ac70-aee0139eac98", "DetectTime": "2023-10-30T14:10:45.074076+02:00", "EventTime": "2023-10-30T14:10:45.074092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CUMhZN2r7yLhQOg5Tk"]} -{"Format": "IDEA0", "ID": "bd4deb88-1108-44f3-9c8d-a6a0bd035b79", "DetectTime": "2023-10-30T14:10:45.093872+02:00", "EventTime": "2023-10-30T14:10:45.093887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["Cz7rCm1qHXY6e8JzBi"]} -{"Format": "IDEA0", "ID": "daba9ff1-7b24-4e96-91c5-32f69cd3cd01", "DetectTime": "2023-10-30T14:10:45.113477+02:00", "EventTime": "2023-10-30T14:10:45.113492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.43.102.110 ", "ContentType": "text/plain"}], "uids": ["Cd67mAfDF6MEaH1p"]} -{"Format": "IDEA0", "ID": "836f4fe3-656e-4e4a-94fe-60e19be0413d", "DetectTime": "2023-10-30T14:10:45.131128+02:00", "EventTime": "2023-10-30T14:10:45.131142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 92.98.14.8 ", "ContentType": "text/plain"}], "uids": ["CeAOPx2OSrWPReleD9"]} -{"Format": "IDEA0", "ID": "44aa9aa8-5d5b-4653-8327-2e713dfc51a1", "DetectTime": "2023-10-30T14:10:45.147054+02:00", "EventTime": "2023-10-30T14:10:45.147071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyakW51t91WovvYpd1"]} -{"Format": "IDEA0", "ID": "a6c24649-181a-4656-a917-27e283d13c73", "DetectTime": "2023-10-30T14:10:45.168373+02:00", "EventTime": "2023-10-30T14:10:45.168396+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CdhNF648o3qbbkc0r4"]} -{"Format": "IDEA0", "ID": "4e5d4477-bf7a-43bd-8942-eb134246bacd", "DetectTime": "2023-10-30T14:10:45.189297+02:00", "EventTime": "2023-10-30T14:10:45.189309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CjhIpN2CoucQdPJ5v6"]} -{"Format": "IDEA0", "ID": "eeefb1ab-0e48-4b55-863f-b17dc97c2687", "DetectTime": "2023-10-30T14:10:45.206074+02:00", "EventTime": "2023-10-30T14:10:45.206091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Ckq8c12vCUZEyWaXfj"]} -{"Format": "IDEA0", "ID": "bf2d4e6a-563c-4339-9a70-988c804b6324", "DetectTime": "2023-10-30T14:10:45.224686+02:00", "EventTime": "2023-10-30T14:10:45.224700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CvOMOH38Bba3XTlS06"]} -{"Format": "IDEA0", "ID": "131adfc0-8cc4-4ec7-8889-5587545fc1f5", "DetectTime": "2023-10-30T14:10:45.242829+02:00", "EventTime": "2023-10-30T14:10:45.242842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CaHhPG24A43OHHnbv6"]} -{"Format": "IDEA0", "ID": "22f04719-8fcb-46c1-a415-4df74379c4af", "DetectTime": "2023-10-30T14:10:45.262856+02:00", "EventTime": "2023-10-30T14:10:45.262872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CKmt2C10hQtro2DnW"]} -{"Format": "IDEA0", "ID": "1be6c37e-2faa-4e44-a44b-29d0cc1acf71", "DetectTime": "2023-10-30T14:10:45.283862+02:00", "EventTime": "2023-10-30T14:10:45.283878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cbk9Ur3ahbSH0aZIBg"]} -{"Format": "IDEA0", "ID": "74b6076e-1afe-4fea-8538-bea86d80ec3d", "DetectTime": "2023-10-30T14:10:45.304645+02:00", "EventTime": "2023-10-30T14:10:45.304659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CsS2Og15ikQPzN31Va"]} -{"Format": "IDEA0", "ID": "fb54dc73-b521-4ff5-8652-c47bc8da5174", "DetectTime": "2023-10-30T14:10:45.341651+02:00", "EventTime": "2023-10-30T14:10:45.341667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CIPfxziwrPCvmBPLh"]} -{"Format": "IDEA0", "ID": "b6789627-7a3a-4267-94d9-d903fffe4f1b", "DetectTime": "2023-10-30T14:10:45.359097+02:00", "EventTime": "2023-10-30T14:10:45.359109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CQqzkl2ireOQ710rYi"]} -{"Format": "IDEA0", "ID": "8825008c-d89d-4edc-a496-2e27801c8cdb", "DetectTime": "2023-10-30T14:10:45.382247+02:00", "EventTime": "2023-10-30T14:10:45.382259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CaTDxv3qfC4cNsUfs4"]} -{"Format": "IDEA0", "ID": "463f028a-41af-4527-bb93-1f7f503dc6d9", "DetectTime": "2023-10-30T14:10:45.399197+02:00", "EventTime": "2023-10-30T14:10:45.399208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CR92u92kxpWO8GfOQ9"]} -{"Format": "IDEA0", "ID": "4e6e2405-5a9d-4085-80fa-49a179605f97", "DetectTime": "2023-10-30T14:10:45.414372+02:00", "EventTime": "2023-10-30T14:10:45.414383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Co5SZ93OS3JgJeq5If"]} -{"Format": "IDEA0", "ID": "a1c82788-c8e8-4399-819e-fdd8000f1620", "DetectTime": "2023-10-30T14:10:45.431293+02:00", "EventTime": "2023-10-30T14:10:45.431306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CDM6lHQL2i1DYebBa"]} -{"Format": "IDEA0", "ID": "2f08c233-72a8-4722-b572-f268a6471937", "DetectTime": "2023-10-30T14:10:45.451334+02:00", "EventTime": "2023-10-30T14:10:45.451360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["ChTbGB4zWW64TKMBf3"]} -{"Format": "IDEA0", "ID": "2c57341b-9462-4071-8de1-9dbbe3bd0cf4", "DetectTime": "2023-10-30T14:10:45.470884+02:00", "EventTime": "2023-10-30T14:10:45.470896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C0NtJ312U9TFq48Fa3"]} -{"Format": "IDEA0", "ID": "569f614e-0ff4-415f-bade-de83f234b393", "DetectTime": "2023-10-30T14:10:45.485565+02:00", "EventTime": "2023-10-30T14:10:45.485581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.39.67.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.39.67.168 ", "ContentType": "text/plain"}], "uids": ["CcffaaSeSMPmUbiY8"]} -{"Format": "IDEA0", "ID": "92cad424-8cfc-4dcd-8848-bf06846aa942", "DetectTime": "2023-10-30T14:10:45.500126+02:00", "EventTime": "2023-10-30T14:10:45.500143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.20.148.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.20.148.198 ", "ContentType": "text/plain"}], "uids": ["CiOfWo1I7DXz0CYb8f"]} -{"Format": "IDEA0", "ID": "545bbe9f-4fcc-4dc3-94d5-d8540ca85609", "DetectTime": "2023-10-30T14:10:45.516236+02:00", "EventTime": "2023-10-30T14:10:45.516247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.145.164.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.145.164.234 ", "ContentType": "text/plain"}], "uids": ["C8MTmb2VRzY6ENdhki"]} -{"Format": "IDEA0", "ID": "b5ca562d-d726-4e27-8529-a224693d4c3d", "DetectTime": "2023-10-30T14:10:45.533298+02:00", "EventTime": "2023-10-30T14:10:45.533314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.92.163.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.92.163.74 ", "ContentType": "text/plain"}], "uids": ["Ctf1W82N9F8tWaIrY9"]} -{"Format": "IDEA0", "ID": "006c21c3-b8c2-41d1-96f8-9417237809cf", "DetectTime": "2023-10-30T14:10:45.553596+02:00", "EventTime": "2023-10-30T14:10:45.553609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.143.9.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.143.9.54 ", "ContentType": "text/plain"}], "uids": ["CpxebJ1eeUjlZpH20e"]} -{"Format": "IDEA0", "ID": "9b9be365-a1c4-4e83-b2f4-c4327fa9d467", "DetectTime": "2023-10-30T14:10:45.569969+02:00", "EventTime": "2023-10-30T14:10:45.569989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CF2Uco4DhvENotdUF9"]} -{"Format": "IDEA0", "ID": "aa63e710-afda-4505-b2eb-0a887b6a5961", "DetectTime": "2023-10-30T14:10:45.586806+02:00", "EventTime": "2023-10-30T14:10:45.586819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["159.213.140.53"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 159.213.140.53 ", "ContentType": "text/plain"}], "uids": ["CxhIGW1TCwGe6oMEO4"]} -{"Format": "IDEA0", "ID": "296359ef-33c3-48f1-a673-24c823b6b339", "DetectTime": "2023-10-30T14:10:45.604465+02:00", "EventTime": "2023-10-30T14:10:45.604482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cxuwx03BycMkB9AJv2"]} -{"Format": "IDEA0", "ID": "cac2760d-f2cf-4431-9fd7-a77ff3eeadea", "DetectTime": "2023-10-30T14:10:45.622481+02:00", "EventTime": "2023-10-30T14:10:45.622492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["23.24.76.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 23.24.76.117 ", "ContentType": "text/plain"}], "uids": ["CVUWSgvi24QfMWzQl"]} -{"Format": "IDEA0", "ID": "c15f6eaa-fc6e-4225-9852-1e11df9d0cd3", "DetectTime": "2023-10-30T14:10:45.640510+02:00", "EventTime": "2023-10-30T14:10:45.640525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.7.66.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.7.66.226 ", "ContentType": "text/plain"}], "uids": ["CsaauX18OTXiViQCe7"]} -{"Format": "IDEA0", "ID": "dbee2848-d4d9-4d9f-89e3-bb7110deaa9f", "DetectTime": "2023-10-30T14:10:45.658882+02:00", "EventTime": "2023-10-30T14:10:45.658898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CpjQjU3LJ9CiRVACn9"]} -{"Format": "IDEA0", "ID": "cce0cd26-b57a-4c78-afe5-5b24b6eb22a7", "DetectTime": "2023-10-30T14:10:45.679265+02:00", "EventTime": "2023-10-30T14:10:45.679281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.216.210.52"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 117.216.210.52 ", "ContentType": "text/plain"}], "uids": ["CxAzhY2ylWgjThax0k"]} -{"Format": "IDEA0", "ID": "7dc95b0e-ab2d-4144-966b-b90439493d97", "DetectTime": "2023-10-30T14:10:45.696857+02:00", "EventTime": "2023-10-30T14:10:45.696868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.17.251.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.17.251.64 ", "ContentType": "text/plain"}], "uids": ["Cz9TaL1SgdHB6jWLzl"]} -{"Format": "IDEA0", "ID": "930f5e30-1022-4ac7-b345-9a329c4e20cd", "DetectTime": "2023-10-30T14:10:45.712932+02:00", "EventTime": "2023-10-30T14:10:45.712943+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2PjOL3zVxu9fbbPel"]} -{"Format": "IDEA0", "ID": "1c14fff1-34f8-41bf-81dc-0b9f5ba7dc95", "DetectTime": "2023-10-30T14:10:45.738709+02:00", "EventTime": "2023-10-30T14:10:45.738725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.157.126.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.157.126.49 ", "ContentType": "text/plain"}], "uids": ["C9tWCe1fepFIwf1gEi"]} -{"Format": "IDEA0", "ID": "afe64404-8741-47ee-8b17-a75ea0feec09", "DetectTime": "2023-10-30T14:10:45.756073+02:00", "EventTime": "2023-10-30T14:10:45.756084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.2.71.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.2.71.76 ", "ContentType": "text/plain"}], "uids": ["ChGWVQ21LALh0MbZPf"]} -{"Format": "IDEA0", "ID": "a2cd0128-c0ac-4a85-a786-87d649531104", "DetectTime": "2023-10-30T14:10:45.770731+02:00", "EventTime": "2023-10-30T14:10:45.770743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["Cn5CUp4X1U22SfQfWj"]} -{"Format": "IDEA0", "ID": "50b01a1d-8fc2-41b6-af2d-0c3e8a0ea437", "DetectTime": "2023-10-30T14:10:45.807949+02:00", "EventTime": "2023-10-30T14:10:45.807965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C4aWtP3RzpWck03fY3"]} -{"Format": "IDEA0", "ID": "a1e462af-d8f0-4f20-a1ef-cf15b2da65e5", "DetectTime": "2023-10-30T14:10:45.828043+02:00", "EventTime": "2023-10-30T14:10:45.828059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.244.46.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.244.46.205 ", "ContentType": "text/plain"}], "uids": ["C1tmou2fKSGP281NNa"]} -{"Format": "IDEA0", "ID": "c817be7e-2b12-42cb-be40-b267f6f7d44f", "DetectTime": "2023-10-30T14:10:45.847191+02:00", "EventTime": "2023-10-30T14:10:45.847204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.78.12.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.78.12.24 ", "ContentType": "text/plain"}], "uids": ["C6A9oG2o3iL4RWP278"]} -{"Format": "IDEA0", "ID": "792e32e5-204f-43d1-9449-eede9b2d9a1a", "DetectTime": "2023-10-30T14:10:45.862254+02:00", "EventTime": "2023-10-30T14:10:45.862267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.13.164.195 ", "ContentType": "text/plain"}], "uids": ["CLIDnjGyi0VVOliVe"]} -{"Format": "IDEA0", "ID": "ca7e7e2e-4e4f-458f-a10a-b98dcad6e7f0", "DetectTime": "2023-10-30T14:10:45.883116+02:00", "EventTime": "2023-10-30T14:10:45.883147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["ClEwT3tDJSDIgzL53"]} -{"Format": "IDEA0", "ID": "3c145ab9-e632-4650-8b28-0850b1c77064", "DetectTime": "2023-10-30T14:10:45.899513+02:00", "EventTime": "2023-10-30T14:10:45.899524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.49.17.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.49.17.214 ", "ContentType": "text/plain"}], "uids": ["CUL7fz3iaohwNHBs52"]} -{"Format": "IDEA0", "ID": "18ddc76b-eaa4-439d-b71d-ee0ae0341d2a", "DetectTime": "2023-10-30T14:10:45.913721+02:00", "EventTime": "2023-10-30T14:10:45.913732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.87.217.145"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.87.217.145 ", "ContentType": "text/plain"}], "uids": ["CWo5Y02WhjacsyGiKj"]} -{"Format": "IDEA0", "ID": "1f126dfe-3d21-48ac-b63a-d2d9b8c7edee", "DetectTime": "2023-10-30T14:10:45.933214+02:00", "EventTime": "2023-10-30T14:10:45.933226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["140.247.230.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 140.247.230.102 ", "ContentType": "text/plain"}], "uids": ["Cv4aEf1M9WtAgqWVaf"]} -{"Format": "IDEA0", "ID": "53c73dd7-01f4-4167-8b57-b9a1484d108c", "DetectTime": "2023-10-30T14:10:45.952560+02:00", "EventTime": "2023-10-30T14:10:45.952574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.251.57"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.251.57 ", "ContentType": "text/plain"}], "uids": ["C0CuE8nSYXvxl0iF4"]} -{"Format": "IDEA0", "ID": "c3d882dd-dac9-4d0c-ade6-15ee3eac0a5d", "DetectTime": "2023-10-30T14:10:45.970072+02:00", "EventTime": "2023-10-30T14:10:45.970082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.127.220.186"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.127.220.186 ", "ContentType": "text/plain"}], "uids": ["Cg1Dg71ruU9zU6nxei"]} -{"Format": "IDEA0", "ID": "f07f2a75-11a6-4b0e-9b75-cbeab3fe419e", "DetectTime": "2023-10-30T14:10:45.988068+02:00", "EventTime": "2023-10-30T14:10:45.988079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.0.232.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.0.232.228 ", "ContentType": "text/plain"}], "uids": ["CmCfOg9frHYUAMTm"]} -{"Format": "IDEA0", "ID": "4cbc335b-4390-45ed-8075-304db575acfb", "DetectTime": "2023-10-30T14:10:46.004433+02:00", "EventTime": "2023-10-30T14:10:46.004447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["194.90.217.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 194.90.217.151 ", "ContentType": "text/plain"}], "uids": ["CJH01K2fIoBgqmtTr4"]} -{"Format": "IDEA0", "ID": "e3f26f1c-93eb-4362-b6d9-463090c867bd", "DetectTime": "2023-10-30T14:10:46.021198+02:00", "EventTime": "2023-10-30T14:10:46.021210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.23.121.108"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.23.121.108 ", "ContentType": "text/plain"}], "uids": ["CASIx82ZyKAiekuvOg"]} -{"Format": "IDEA0", "ID": "453a5b1f-f3e0-419b-addc-8075fb6150bc", "DetectTime": "2023-10-30T14:10:46.034912+02:00", "EventTime": "2023-10-30T14:10:46.034923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C0iuur2UAWPjIESQqc"]} -{"Format": "IDEA0", "ID": "e93ee7b0-0600-4b51-99d4-ee88afd178c7", "DetectTime": "2023-10-30T14:10:46.051304+02:00", "EventTime": "2023-10-30T14:10:46.051316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["207.250.82.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 207.250.82.102 ", "ContentType": "text/plain"}], "uids": ["C3QJkx4SbIL5Qpalr6"]} -{"Format": "IDEA0", "ID": "7b6d51d2-43dc-4dbb-b6ce-96076211a284", "DetectTime": "2023-10-30T14:10:46.066821+02:00", "EventTime": "2023-10-30T14:10:46.066835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["CkqeVkQ3SYfzxmQli"]} -{"Format": "IDEA0", "ID": "97741ad5-3a51-4e92-9e2d-e7eb5ca9621a", "DetectTime": "2023-10-30T14:10:46.081968+02:00", "EventTime": "2023-10-30T14:10:46.081984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.181.179.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.181.179.142 ", "ContentType": "text/plain"}], "uids": ["CkEXtcoHbCUt7kmhb"]} -{"Format": "IDEA0", "ID": "4955231a-f88a-4284-b856-e9ce76f01f5d", "DetectTime": "2023-10-30T14:10:46.101863+02:00", "EventTime": "2023-10-30T14:10:46.101879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C7hPvq2qUYeaGcpQL"]} -{"Format": "IDEA0", "ID": "6b56b2cf-6519-4c2d-9bab-ce7ee92fbe8f", "DetectTime": "2023-10-30T14:10:46.117365+02:00", "EventTime": "2023-10-30T14:10:46.117378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.141.117.232"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.141.117.232 ", "ContentType": "text/plain"}], "uids": ["CfZynE34cVR6VWQD06"]} -{"Format": "IDEA0", "ID": "a92f2cee-1d43-4855-acba-e74fc56ada36", "DetectTime": "2023-10-30T14:10:46.135609+02:00", "EventTime": "2023-10-30T14:10:46.135620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.28.24.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.28.24.185 ", "ContentType": "text/plain"}], "uids": ["Czp39JEJqLxYCTMs8"]} -{"Format": "IDEA0", "ID": "67372f69-ac63-426a-ad97-3857d7ad930b", "DetectTime": "2023-10-30T14:10:46.150682+02:00", "EventTime": "2023-10-30T14:10:46.150698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.98.52.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.98.52.56 ", "ContentType": "text/plain"}], "uids": ["CbWqNC3QVf0Q5eQ1th"]} -{"Format": "IDEA0", "ID": "c8828d55-8c8b-4bda-9579-9cef01860415", "DetectTime": "2023-10-30T14:10:46.168229+02:00", "EventTime": "2023-10-30T14:10:46.168239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CmO8Ks4b36QVuegtTd"]} -{"Format": "IDEA0", "ID": "305f1df2-e604-433f-bd3c-a4f5e86968c1", "DetectTime": "2023-10-30T14:10:46.186152+02:00", "EventTime": "2023-10-30T14:10:46.186169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.21.140.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 118.21.140.162 ", "ContentType": "text/plain"}], "uids": ["CpA6fGuYRAvBfDDp1"]} -{"Format": "IDEA0", "ID": "471f9a9a-df38-4c34-ab85-05845475d283", "DetectTime": "2023-10-30T14:10:46.202491+02:00", "EventTime": "2023-10-30T14:10:46.202504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["162.202.76.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 162.202.76.209 ", "ContentType": "text/plain"}], "uids": ["CCQBvA2Bwll7A8G1u7"]} -{"Format": "IDEA0", "ID": "6f1947ce-cecd-40c2-96ec-b047a8f27440", "DetectTime": "2023-10-30T14:10:46.218508+02:00", "EventTime": "2023-10-30T14:10:46.218519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.130.73.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.130.73.198 ", "ContentType": "text/plain"}], "uids": ["C5fM9U36m53MmR7vJ6"]} -{"Format": "IDEA0", "ID": "417312ca-2c19-4729-bc16-d9b380f0e075", "DetectTime": "2023-10-30T14:10:46.233660+02:00", "EventTime": "2023-10-30T14:10:46.233671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.237.171.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.237.171.29 ", "ContentType": "text/plain"}], "uids": ["CVIzaJ9IfVc0Le8xh"]} -{"Format": "IDEA0", "ID": "a248289f-c57e-4316-ae4f-840b11c4a089", "DetectTime": "2023-10-30T14:10:46.249744+02:00", "EventTime": "2023-10-30T14:10:46.249754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.167.102.135"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.167.102.135 ", "ContentType": "text/plain"}], "uids": ["C6KnUW2tlRLSgJxjSh"]} -{"Format": "IDEA0", "ID": "f526c8f5-3ff1-43c7-aefc-50392cdb08cb", "DetectTime": "2023-10-30T14:10:46.266106+02:00", "EventTime": "2023-10-30T14:10:46.266116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C3WOHNIL0gX8AcHpi"]} -{"Format": "IDEA0", "ID": "a3ea1570-3cd0-4265-a384-16f93c28b6d6", "DetectTime": "2023-10-30T14:10:46.285857+02:00", "EventTime": "2023-10-30T14:10:46.285875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.19.159.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.19.159.160 ", "ContentType": "text/plain"}], "uids": ["CyLysUQaqswGvyZHe"]} -{"Format": "IDEA0", "ID": "2372bf24-852b-4764-82a6-09a994a55c0b", "DetectTime": "2023-10-30T14:10:46.305923+02:00", "EventTime": "2023-10-30T14:10:46.305939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.206.220.184"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 203.206.220.184 ", "ContentType": "text/plain"}], "uids": ["CKYpsq18dkAmKLMDTg"]} -{"Format": "IDEA0", "ID": "c11ed529-f15b-4004-98c1-36b9c548938d", "DetectTime": "2023-10-30T14:10:46.322995+02:00", "EventTime": "2023-10-30T14:10:46.323009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.190.211.236"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.190.211.236 ", "ContentType": "text/plain"}], "uids": ["C3vfk22AwTxgsCk4T4"]} -{"Format": "IDEA0", "ID": "46174e82-6400-4d5f-a5d8-b0a334423b0c", "DetectTime": "2023-10-30T14:10:46.343805+02:00", "EventTime": "2023-10-30T14:10:46.343821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.209.71.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 77.209.71.84 ", "ContentType": "text/plain"}], "uids": ["CM1TMhv6oD7N4R0m3"]} -{"Format": "IDEA0", "ID": "90d6e00b-2bd6-4dd0-b476-7b81942a07f9", "DetectTime": "2023-10-30T14:10:46.363437+02:00", "EventTime": "2023-10-30T14:10:46.363451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C9QafE160q4nXY7dE4"]} -{"Format": "IDEA0", "ID": "ce79c8aa-2d80-432b-8ca6-d602902057d5", "DetectTime": "2023-10-30T14:10:46.380154+02:00", "EventTime": "2023-10-30T14:10:46.380165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.190.132.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.190.132.228 ", "ContentType": "text/plain"}], "uids": ["Cfnsjw4MhKfDOSp6O8"]} -{"Format": "IDEA0", "ID": "4980b240-5c8b-46b9-b5fa-455dcf155661", "DetectTime": "2023-10-30T14:10:46.395582+02:00", "EventTime": "2023-10-30T14:10:46.395594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["204.120.192.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 204.120.192.86 ", "ContentType": "text/plain"}], "uids": ["C2KIZ74lSly3NtVtF7"]} -{"Format": "IDEA0", "ID": "034dfb64-3dbb-4756-932b-3ce0856cc6c8", "DetectTime": "2023-10-30T14:10:46.412743+02:00", "EventTime": "2023-10-30T14:10:46.412759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.14.124.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.14.124.198 ", "ContentType": "text/plain"}], "uids": ["CcYuLG1It7LCUsNg17"]} -{"Format": "IDEA0", "ID": "6471b0db-60eb-4b18-8f11-a8e09e8d8d0b", "DetectTime": "2023-10-30T14:10:46.431724+02:00", "EventTime": "2023-10-30T14:10:46.431741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.186.85.117"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.186.85.117 ", "ContentType": "text/plain"}], "uids": ["CQzKxi3Hm9H3NRbru3"]} -{"Format": "IDEA0", "ID": "026f28a2-4ca0-4aab-91f0-463929a63d37", "DetectTime": "2023-10-30T14:10:46.448780+02:00", "EventTime": "2023-10-30T14:10:46.448791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["150.101.100.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 150.101.100.34 ", "ContentType": "text/plain"}], "uids": ["C0P12746PvSmyjUK5c"]} -{"Format": "IDEA0", "ID": "c1a708b3-e4c4-4126-b5ad-5fae772ea3cf", "DetectTime": "2023-10-30T14:10:46.467551+02:00", "EventTime": "2023-10-30T14:10:46.467579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.75.48.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.75.48.164 ", "ContentType": "text/plain"}], "uids": ["C225G81dPhGaQWauT5"]} -{"Format": "IDEA0", "ID": "ff8bc2ff-4b94-490b-b764-2aab0d40f4e8", "DetectTime": "2023-10-30T14:10:46.484923+02:00", "EventTime": "2023-10-30T14:10:46.484935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.193.16.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.193.16.198 ", "ContentType": "text/plain"}], "uids": ["CeAuJf2IqlvBIQAL15"]} -{"Format": "IDEA0", "ID": "3871f612-d7e2-437b-a489-40bc48a224f4", "DetectTime": "2023-10-30T14:10:46.503735+02:00", "EventTime": "2023-10-30T14:10:46.503751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.221.7.245"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.221.7.245 ", "ContentType": "text/plain"}], "uids": ["CZvHA24u81TfS46hIl"]} -{"Format": "IDEA0", "ID": "53f26255-ff18-4767-bf41-0a78882c9658", "DetectTime": "2023-10-30T14:10:46.518170+02:00", "EventTime": "2023-10-30T14:10:46.518188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.224.214.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.224.214.119 ", "ContentType": "text/plain"}], "uids": ["ClOxHQ2amo3iacHpX1"]} -{"Format": "IDEA0", "ID": "07096ef7-5834-4519-9cee-0cc1746c56ce", "DetectTime": "2023-10-30T14:10:46.534546+02:00", "EventTime": "2023-10-30T14:10:46.534564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.236.250.104"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.236.250.104 ", "ContentType": "text/plain"}], "uids": ["CYv8k35wJmYfAC9f6"]} -{"Format": "IDEA0", "ID": "7657bc14-159b-40d9-a13d-69e729fc2e85", "DetectTime": "2023-10-30T14:10:46.550751+02:00", "EventTime": "2023-10-30T14:10:46.550769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.231.149.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.231.149.46 ", "ContentType": "text/plain"}], "uids": ["Cz4PRL3hcyJe5m76x8"]} -{"Format": "IDEA0", "ID": "032aa8ce-f528-468e-bb3e-98786b68104a", "DetectTime": "2023-10-30T14:10:46.565708+02:00", "EventTime": "2023-10-30T14:10:46.565722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CYDMTV33PTokFsVht5"]} -{"Format": "IDEA0", "ID": "2ddc4ab3-d166-4f66-9059-bc89fcb9259b", "DetectTime": "2023-10-30T14:10:46.583109+02:00", "EventTime": "2023-10-30T14:10:46.583125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.195.224.76"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 199.195.224.76 ", "ContentType": "text/plain"}], "uids": ["CweHKQ1c2t13aGoA29"]} -{"Format": "IDEA0", "ID": "5162cfee-54c1-4e0a-9f14-100c43a20788", "DetectTime": "2023-10-30T14:10:46.599497+02:00", "EventTime": "2023-10-30T14:10:46.599514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.13.239.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.13.239.90 ", "ContentType": "text/plain"}], "uids": ["CkZy1e2Lm3g3vuYnJd"]} -{"Format": "IDEA0", "ID": "9b66b3c8-5811-4b8b-8154-98e7489fa0f1", "DetectTime": "2023-10-30T14:10:46.617541+02:00", "EventTime": "2023-10-30T14:10:46.617556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.50.48.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.50.48.101 ", "ContentType": "text/plain"}], "uids": ["C82SfA1KjDUXzkvzR2"]} -{"Format": "IDEA0", "ID": "290c380a-1f44-41df-9bc3-e82490039d74", "DetectTime": "2023-10-30T14:10:46.638496+02:00", "EventTime": "2023-10-30T14:10:46.638511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.143.90.138"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.143.90.138 ", "ContentType": "text/plain"}], "uids": ["CwAwmP24T4OsGziMj2"]} -{"Format": "IDEA0", "ID": "8275885e-11a7-4bab-9647-e8c62f6e1847", "DetectTime": "2023-10-30T14:10:46.659073+02:00", "EventTime": "2023-10-30T14:10:46.659090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.88.177.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.88.177.45 ", "ContentType": "text/plain"}], "uids": ["CcX9Jy3KW9KXAtDTOa"]} -{"Format": "IDEA0", "ID": "5f5cfe78-9caa-459c-a89f-f560cdbd98f6", "DetectTime": "2023-10-30T14:10:46.679610+02:00", "EventTime": "2023-10-30T14:10:46.679627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.142.65.193"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.142.65.193 ", "ContentType": "text/plain"}], "uids": ["Cap6If3eEIKtTpCj7h"]} -{"Format": "IDEA0", "ID": "c166b405-a5af-4b02-9ca6-ee6705d612bf", "DetectTime": "2023-10-30T14:10:46.700289+02:00", "EventTime": "2023-10-30T14:10:46.700307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.113.64.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.113.64.151 ", "ContentType": "text/plain"}], "uids": ["CyRCad45h639CGVYY"]} -{"Format": "IDEA0", "ID": "3884467e-5cf9-4dad-9e3c-ae8108b2e276", "DetectTime": "2023-10-30T14:10:46.716047+02:00", "EventTime": "2023-10-30T14:10:46.716067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CWLKsv23B5TlOMUNX3"]} -{"Format": "IDEA0", "ID": "9c9aca20-b570-4586-85a9-460fc24d192f", "DetectTime": "2023-10-30T14:10:46.746816+02:00", "EventTime": "2023-10-30T14:10:46.746828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CznUyZvAYoAuvFqI6"]} -{"Format": "IDEA0", "ID": "2f797aa7-7c86-436f-a65d-d7c2d7973d68", "DetectTime": "2023-10-30T14:10:46.765532+02:00", "EventTime": "2023-10-30T14:10:46.765547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.162.222.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.162.222.216 ", "ContentType": "text/plain"}], "uids": ["CB7L9b3nkddihRvnQd"]} -{"Format": "IDEA0", "ID": "df5af109-df2d-428f-9f33-041c5430834c", "DetectTime": "2023-10-30T14:10:46.785134+02:00", "EventTime": "2023-10-30T14:10:46.785151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.26"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.169.55.26 ", "ContentType": "text/plain"}], "uids": ["CNmNV727PlnVYuPpOc"]} -{"Format": "IDEA0", "ID": "c2ea7fc3-59a7-43ec-afa6-22d3fa016134", "DetectTime": "2023-10-30T14:10:46.802870+02:00", "EventTime": "2023-10-30T14:10:46.802882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.75.95.70"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.75.95.70 ", "ContentType": "text/plain"}], "uids": ["CKqvAt3mvkA0b6pnJ2"]} -{"Format": "IDEA0", "ID": "6a9511ab-6b3d-4d82-9cae-25dc547b1d32", "DetectTime": "2023-10-30T14:10:46.820712+02:00", "EventTime": "2023-10-30T14:10:46.820723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.144.241.54"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.144.241.54 ", "ContentType": "text/plain"}], "uids": ["CnoPa61Ztks8oasswa"]} -{"Format": "IDEA0", "ID": "8cd6c76f-a6fe-46ae-8bce-bd0950700110", "DetectTime": "2023-10-30T14:10:46.836012+02:00", "EventTime": "2023-10-30T14:10:46.836028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.107.189.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.107.189.85 ", "ContentType": "text/plain"}], "uids": ["C9SJdS1wlM4xXzhE37"]} -{"Format": "IDEA0", "ID": "31cbaef0-b393-49f8-8ac5-1206ca64a20b", "DetectTime": "2023-10-30T14:10:46.854393+02:00", "EventTime": "2023-10-30T14:10:46.854403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.213.173.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.213.173.163 ", "ContentType": "text/plain"}], "uids": ["CGcXdYc0AIFQFw85j"]} -{"Format": "IDEA0", "ID": "31be6a3c-d130-4e51-8c30-ae272ffcb12e", "DetectTime": "2023-10-30T14:10:46.871429+02:00", "EventTime": "2023-10-30T14:10:46.871450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.111.73"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.210.111.73 ", "ContentType": "text/plain"}], "uids": ["Cqhg8jusxMttLcCRf"]} -{"Format": "IDEA0", "ID": "2733abc1-f8d0-4923-8bd1-aaa337e5bb88", "DetectTime": "2023-10-30T14:10:46.891295+02:00", "EventTime": "2023-10-30T14:10:46.891311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["27.253.110.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 27.253.110.22 ", "ContentType": "text/plain"}], "uids": ["CtbfKs419ATA9rNla2"]} -{"Format": "IDEA0", "ID": "8252eb11-add4-40c7-8edf-6d6ab47e31aa", "DetectTime": "2023-10-30T14:10:46.910104+02:00", "EventTime": "2023-10-30T14:10:46.910114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.91.151.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.91.151.50 ", "ContentType": "text/plain"}], "uids": ["C0mWEG23WSfRek7pab"]} -{"Format": "IDEA0", "ID": "1545ca36-fb25-47aa-9554-90d650c80724", "DetectTime": "2023-10-30T14:10:46.930298+02:00", "EventTime": "2023-10-30T14:10:46.930310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CeWxVZ2NGSAOjTq1Ll"]} -{"Format": "IDEA0", "ID": "71c30b1d-7d2e-4611-8426-8f3edc9abf7e", "DetectTime": "2023-10-30T14:10:46.947543+02:00", "EventTime": "2023-10-30T14:10:46.947554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CQjNHd1HC9pzhUbl"]} -{"Format": "IDEA0", "ID": "2f388e4f-e2e3-44aa-ba52-d5e90d805217", "DetectTime": "2023-10-30T14:10:46.961901+02:00", "EventTime": "2023-10-30T14:10:46.961928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.47.79"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.47.79 ", "ContentType": "text/plain"}], "uids": ["CmR768145mWblsSuWg"]} -{"Format": "IDEA0", "ID": "5dc2d048-f22c-464f-a96b-db49abdcc936", "DetectTime": "2023-10-30T14:10:46.982942+02:00", "EventTime": "2023-10-30T14:10:46.982959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CvHGvB31DAInXEdTE3"]} -{"Format": "IDEA0", "ID": "8bb3c052-1024-43f8-9fd9-37eec337953f", "DetectTime": "2023-10-30T14:10:47.002776+02:00", "EventTime": "2023-10-30T14:10:47.002821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.74.118.238"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 219.74.118.238 ", "ContentType": "text/plain"}], "uids": ["Ccdgdk2OQUcN1b9qag"]} -{"Format": "IDEA0", "ID": "fa6dfcb2-03a6-4281-9e15-ac536cf10ec8", "DetectTime": "2023-10-30T14:10:47.021942+02:00", "EventTime": "2023-10-30T14:10:47.021953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.124.111.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.124.111.49 ", "ContentType": "text/plain"}], "uids": ["C4o9Ql4d8TXyQpDrGg"]} -{"Format": "IDEA0", "ID": "1f4e8545-194b-419b-a97a-9dee5012b70f", "DetectTime": "2023-10-30T14:10:47.037062+02:00", "EventTime": "2023-10-30T14:10:47.037079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.145.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.146.145.5 ", "ContentType": "text/plain"}], "uids": ["CfDexT5EUTh6sVjTg"]} -{"Format": "IDEA0", "ID": "c9a87183-f8e3-4d5d-bbd4-eedad928e8ca", "DetectTime": "2023-10-30T14:10:47.051902+02:00", "EventTime": "2023-10-30T14:10:47.051914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.213.189.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.213.189.250 ", "ContentType": "text/plain"}], "uids": ["CnSyRR3ohPr1FuguC2"]} -{"Format": "IDEA0", "ID": "4e042831-9058-44c2-8ebc-9e2681d542db", "DetectTime": "2023-10-30T14:10:47.067797+02:00", "EventTime": "2023-10-30T14:10:47.067808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CVzUfb13JTZyjQJgtc"]} -{"Format": "IDEA0", "ID": "7a5e42f9-81d6-4a71-98f5-2309e424ec6b", "DetectTime": "2023-10-30T14:10:47.084229+02:00", "EventTime": "2023-10-30T14:10:47.084244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.64.105.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.64.105.130 ", "ContentType": "text/plain"}], "uids": ["Cpqog02gb0730g9Uug"]} -{"Format": "IDEA0", "ID": "4ee532e4-5882-4335-a06f-3783a27dbe6c", "DetectTime": "2023-10-30T14:10:47.105369+02:00", "EventTime": "2023-10-30T14:10:47.105384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.253.112.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.253.112.131 ", "ContentType": "text/plain"}], "uids": ["CNLSRN1yLycSdJJxP5"]} -{"Format": "IDEA0", "ID": "2a009244-0736-4a6a-8390-f650ef27b274", "DetectTime": "2023-10-30T14:10:47.125930+02:00", "EventTime": "2023-10-30T14:10:47.125945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.110.137.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.110.137.93 ", "ContentType": "text/plain"}], "uids": ["CztfJu1hmHteFyxSvf"]} -{"Format": "IDEA0", "ID": "a31a2c4e-25ca-42c6-9416-b1b3a257eb07", "DetectTime": "2023-10-30T14:10:47.143795+02:00", "EventTime": "2023-10-30T14:10:47.143811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CWPfqd6IhpS2sVEUk"]} -{"Format": "IDEA0", "ID": "7dd53151-c803-48aa-bc80-e56b5e7bf2df", "DetectTime": "2023-10-30T14:10:47.160565+02:00", "EventTime": "2023-10-30T14:10:47.160576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CAw4TGTWPR38Pku8k"]} -{"Format": "IDEA0", "ID": "ab4bbe3c-c409-4afc-9ffc-9155d8f9b0c3", "DetectTime": "2023-10-30T14:10:47.177297+02:00", "EventTime": "2023-10-30T14:10:47.177314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.202.161.209 ", "ContentType": "text/plain"}], "uids": ["CZiFXFKS9gliN8qbi"]} -{"Format": "IDEA0", "ID": "c3eb84e1-bc13-42aa-ab74-e9f5e04d7bf9", "DetectTime": "2023-10-30T14:10:47.197263+02:00", "EventTime": "2023-10-30T14:10:47.197278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.56.204.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.56.204.248 ", "ContentType": "text/plain"}], "uids": ["C8UrtO3OxnbcqN6iW4"]} -{"Format": "IDEA0", "ID": "aea1e429-05b4-4919-b7f4-64511d1586e0", "DetectTime": "2023-10-30T14:10:47.218542+02:00", "EventTime": "2023-10-30T14:10:47.218565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.163.123.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.163.123.111 ", "ContentType": "text/plain"}], "uids": ["CopSna4HkBZ5G9Qzoa"]} -{"Format": "IDEA0", "ID": "cf9aeed1-8b6a-464a-93f1-725befe75509", "DetectTime": "2023-10-30T14:10:47.238620+02:00", "EventTime": "2023-10-30T14:10:47.238637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.14.48.130"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 216.14.48.130 ", "ContentType": "text/plain"}], "uids": ["C6eWD93XQlTFswm5be"]} -{"Format": "IDEA0", "ID": "3143aba5-1a59-40cc-aa20-d2b1f105fa0a", "DetectTime": "2023-10-30T14:10:47.257726+02:00", "EventTime": "2023-10-30T14:10:47.257742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CxNtVN1Kqp83iJSjbg"]} -{"Format": "IDEA0", "ID": "3291bfc1-4ff5-4b7a-8f7e-41b591a2b4d3", "DetectTime": "2023-10-30T14:10:47.275218+02:00", "EventTime": "2023-10-30T14:10:47.275229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.117.241.68"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.117.241.68 ", "ContentType": "text/plain"}], "uids": ["CaIOYr3RmqIgmiZiXc"]} -{"Format": "IDEA0", "ID": "552351f2-e25f-4001-abf9-da0144ad7b71", "DetectTime": "2023-10-30T14:10:47.290930+02:00", "EventTime": "2023-10-30T14:10:47.290943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CgfZi529S8JiUrSIJb"]} -{"Format": "IDEA0", "ID": "3fb3e086-794c-4387-92dd-6dc94259e49e", "DetectTime": "2023-10-30T14:10:47.305558+02:00", "EventTime": "2023-10-30T14:10:47.305569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C1LISGkAxc0yaksMj"]} -{"Format": "IDEA0", "ID": "41b7c38e-1a05-4b5d-871b-c7bcb8c0344c", "DetectTime": "2023-10-30T14:10:47.320804+02:00", "EventTime": "2023-10-30T14:10:47.320814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.165.79.77"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.165.79.77 ", "ContentType": "text/plain"}], "uids": ["CKInR73uhCwgqAvm6g"]} -{"Format": "IDEA0", "ID": "03dedd3e-c268-4176-afa9-5ea0ff7ea733", "DetectTime": "2023-10-30T14:10:47.336151+02:00", "EventTime": "2023-10-30T14:10:47.336162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.73.35.55"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.73.35.55 ", "ContentType": "text/plain"}], "uids": ["Ckq2tq2ppexJ1YNpw"]} -{"Format": "IDEA0", "ID": "47ae80d3-46d9-48db-8cdc-424389a54d8e", "DetectTime": "2023-10-30T14:10:47.349214+02:00", "EventTime": "2023-10-30T14:10:47.349224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.37.144.9"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.37.144.9 ", "ContentType": "text/plain"}], "uids": ["CT1FNm1t18NWcwTCR5"]} -{"Format": "IDEA0", "ID": "12b4389e-fc2e-44e1-9ebd-6a6ddb034d22", "DetectTime": "2023-10-30T14:10:47.363862+02:00", "EventTime": "2023-10-30T14:10:47.363872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.135.143.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.135.143.64 ", "ContentType": "text/plain"}], "uids": ["CL8FvQ1SFLnMtqkCR7"]} -{"Format": "IDEA0", "ID": "69fc3ff7-5c06-44ec-a11e-45569f83d83c", "DetectTime": "2023-10-30T14:10:47.379647+02:00", "EventTime": "2023-10-30T14:10:47.379662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.201.208.1"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.201.208.1 ", "ContentType": "text/plain"}], "uids": ["Cm6FgJ2lwzRyplJBul"]} -{"Format": "IDEA0", "ID": "76ed6455-abea-4d7a-9d6e-8b87385dee43", "DetectTime": "2023-10-30T14:10:47.395371+02:00", "EventTime": "2023-10-30T14:10:47.395382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.15.14.142"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.15.14.142 ", "ContentType": "text/plain"}], "uids": ["CqONQK2mfgJ3jzUnB2"]} -{"Format": "IDEA0", "ID": "623957cd-370d-4733-ae4f-28e7adea72d2", "DetectTime": "2023-10-30T14:10:47.409089+02:00", "EventTime": "2023-10-30T14:10:47.409099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["Cb2UjN1zZv8qY1gLah"]} -{"Format": "IDEA0", "ID": "e068b873-b500-402d-90bc-d1746068e8fc", "DetectTime": "2023-10-30T14:10:47.424708+02:00", "EventTime": "2023-10-30T14:10:47.424719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CB2zCJ5DcWrJ4di9i"]} -{"Format": "IDEA0", "ID": "2d81e4c5-4a61-4cfb-9c6d-603bf620a7e4", "DetectTime": "2023-10-30T14:10:47.439465+02:00", "EventTime": "2023-10-30T14:10:47.439478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ChNWg71e6wCFOc0D2f"]} -{"Format": "IDEA0", "ID": "fbb53110-772e-407b-a6a3-b882711bdf0f", "DetectTime": "2023-10-30T14:10:47.454299+02:00", "EventTime": "2023-10-30T14:10:47.454310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.60.76.38"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 200.60.76.38 ", "ContentType": "text/plain"}], "uids": ["C0JWTm494zRQnvJKY2"]} -{"Format": "IDEA0", "ID": "11f6ee6a-a74e-43b3-9113-bcdf17a1fdf4", "DetectTime": "2023-10-30T14:10:47.470976+02:00", "EventTime": "2023-10-30T14:10:47.470990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.74.153.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.74.153.34 ", "ContentType": "text/plain"}], "uids": ["CC1Rj34EQhfySTGZrf"]} -{"Format": "IDEA0", "ID": "716ca77f-d214-48b8-986f-8a8ef9a4d8f8", "DetectTime": "2023-10-30T14:10:47.487077+02:00", "EventTime": "2023-10-30T14:10:47.487093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.232.254.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.232.254.72 ", "ContentType": "text/plain"}], "uids": ["CvWPL01HlsJY36C9Jb"]} -{"Format": "IDEA0", "ID": "85d81590-534d-4ce3-afea-f44e3e109616", "DetectTime": "2023-10-30T14:10:47.503861+02:00", "EventTime": "2023-10-30T14:10:47.503872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.232.141.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.232.141.226 ", "ContentType": "text/plain"}], "uids": ["CcgsmC4PT3HprCn9sb"]} -{"Format": "IDEA0", "ID": "f0c86379-22c1-4d26-8062-1fac6cdb8e8e", "DetectTime": "2023-10-30T14:10:47.520450+02:00", "EventTime": "2023-10-30T14:10:47.520461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["202.130.129.114"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 202.130.129.114 ", "ContentType": "text/plain"}], "uids": ["CW4vsF4hauftYnuA14"]} -{"Format": "IDEA0", "ID": "d3b5d7ca-4493-4e51-bd6e-a593eb3ade92", "DetectTime": "2023-10-30T14:10:47.538858+02:00", "EventTime": "2023-10-30T14:10:47.538870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.91.101.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 82.91.101.29 ", "ContentType": "text/plain"}], "uids": ["CLobSo3M7VMJBF11Bi"]} -{"Format": "IDEA0", "ID": "86d5ce7f-02e5-4cbc-add6-eb8772ff3ffb", "DetectTime": "2023-10-30T14:10:47.556157+02:00", "EventTime": "2023-10-30T14:10:47.556167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.29.210.40"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.29.210.40 ", "ContentType": "text/plain"}], "uids": ["CmcExv2ny8mF4pX8V3"]} -{"Format": "IDEA0", "ID": "3a35b7fa-9f64-4b9c-8cc6-95d076802ea4", "DetectTime": "2023-10-30T14:10:47.572597+02:00", "EventTime": "2023-10-30T14:10:47.572610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["C84ZQ12hnyp0w18pl5"]} -{"Format": "IDEA0", "ID": "de8cfe20-65a7-4628-918b-86ff17b2acc8", "DetectTime": "2023-10-30T14:10:47.587779+02:00", "EventTime": "2023-10-30T14:10:47.587794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.168.177.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.168.177.131 ", "ContentType": "text/plain"}], "uids": ["CMyTmtgiWNCeTnH21"]} -{"Format": "IDEA0", "ID": "d9d17464-bcc2-43cb-b3c4-7951afb73f1a", "DetectTime": "2023-10-30T14:10:47.607417+02:00", "EventTime": "2023-10-30T14:10:47.607429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.135.177.131"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.135.177.131 ", "ContentType": "text/plain"}], "uids": ["CpCDWD4n2P5HuXyCH1"]} -{"Format": "IDEA0", "ID": "07a3d16a-0d72-4083-af95-c9132f79794d", "DetectTime": "2023-10-30T14:10:47.626295+02:00", "EventTime": "2023-10-30T14:10:47.626311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.154.58.45"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.154.58.45 ", "ContentType": "text/plain"}], "uids": ["CjYe3i48i7TeHKMGi5"]} -{"Format": "IDEA0", "ID": "a1c3a9b6-ff33-4870-a2a4-a4227c3e01ca", "DetectTime": "2023-10-30T14:10:47.646028+02:00", "EventTime": "2023-10-30T14:10:47.646047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["Cu4jbz4CuaIBhO8tWe"]} -{"Format": "IDEA0", "ID": "1954d23a-2b67-4153-8b71-5fe8313b5797", "DetectTime": "2023-10-30T14:10:47.679432+02:00", "EventTime": "2023-10-30T14:10:47.679444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.1.58.126"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.1.58.126 ", "ContentType": "text/plain"}], "uids": ["COixK2AZApLVm4Jlg"]} -{"Format": "IDEA0", "ID": "8fbd178e-44c9-493c-80d9-c5fc5701a1dd", "DetectTime": "2023-10-30T14:10:47.696810+02:00", "EventTime": "2023-10-30T14:10:47.696822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.165.72.230 ", "ContentType": "text/plain"}], "uids": ["Csa4kx3F9t5U8I2fmi"]} -{"Format": "IDEA0", "ID": "7cd1ef24-2b26-49d8-8a13-5ba0409246c8", "DetectTime": "2023-10-30T14:10:47.712181+02:00", "EventTime": "2023-10-30T14:10:47.712199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.27.183.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 83.27.183.30 ", "ContentType": "text/plain"}], "uids": ["CV7nYM2wsJhhkyo8Ii"]} -{"Format": "IDEA0", "ID": "c5eda93a-7743-4ff3-b2b3-786860dd74b1", "DetectTime": "2023-10-30T14:10:47.729216+02:00", "EventTime": "2023-10-30T14:10:47.729226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.114.245.252"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.114.245.252 ", "ContentType": "text/plain"}], "uids": ["CIAP1809ziOgSNe5b"]} -{"Format": "IDEA0", "ID": "5a455dd1-7bb1-4600-b337-c6246f3c8742", "DetectTime": "2023-10-30T14:10:47.745131+02:00", "EventTime": "2023-10-30T14:10:47.745141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyZtnR2qqmUak9xBzf"]} -{"Format": "IDEA0", "ID": "5457daad-bbca-4196-98d6-6af83c7196eb", "DetectTime": "2023-10-30T14:10:47.759949+02:00", "EventTime": "2023-10-30T14:10:47.759967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CdmDV6uKhYQJlIn23"]} -{"Format": "IDEA0", "ID": "a750b063-8023-43dc-8822-0c998a51f587", "DetectTime": "2023-10-30T14:10:47.782541+02:00", "EventTime": "2023-10-30T14:10:47.782560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cmbu1w4Bq1XIl3HAyb"]} -{"Format": "IDEA0", "ID": "05717c9a-a2af-4e70-b704-fe3f9eccffc8", "DetectTime": "2023-10-30T14:10:47.805275+02:00", "EventTime": "2023-10-30T14:10:47.805292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNB51g4fbVhvRstyl9"]} -{"Format": "IDEA0", "ID": "a9039eca-8b52-43f2-b039-e3db6466c373", "DetectTime": "2023-10-30T14:10:47.826667+02:00", "EventTime": "2023-10-30T14:10:47.826677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CIBRmi2W1bdJAatW98"]} -{"Format": "IDEA0", "ID": "d562f1d9-fe87-40d0-84a5-ee06f3d25fb2", "DetectTime": "2023-10-30T14:10:47.848750+02:00", "EventTime": "2023-10-30T14:10:47.848762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CcREY44tOJtSkQVubi"]} -{"Format": "IDEA0", "ID": "639b4c6b-96ce-4706-8760-05a9f8701537", "DetectTime": "2023-10-30T14:10:47.870553+02:00", "EventTime": "2023-10-30T14:10:47.870568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CHwxTj5KKO3ootLrj"]} -{"Format": "IDEA0", "ID": "f432724e-a9cf-49fa-b4b5-14bd75ee6fab", "DetectTime": "2023-10-30T14:10:47.896038+02:00", "EventTime": "2023-10-30T14:10:47.896049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CkdvJi3frYp6BfT9S6"]} -{"Format": "IDEA0", "ID": "233c4070-ab6b-4c4d-9b2c-f7cfbbefb5b1", "DetectTime": "2023-10-30T14:10:47.923430+02:00", "EventTime": "2023-10-30T14:10:47.923445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CCGQ2z1XMJ5xw8nFvk"]} -{"Format": "IDEA0", "ID": "25df80de-bbcd-4d86-a2d3-6738575e6d3a", "DetectTime": "2023-10-30T14:10:47.950355+02:00", "EventTime": "2023-10-30T14:10:47.950370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CbOlCRZsnDoNBMgX5"]} -{"Format": "IDEA0", "ID": "a26df6b7-ad1f-4e05-8117-b0d8aaf3dfab", "DetectTime": "2023-10-30T14:10:47.971349+02:00", "EventTime": "2023-10-30T14:10:47.971360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C8rkJn4IBHqDcoNB5b"]} -{"Format": "IDEA0", "ID": "a96ad8d8-7075-4fec-91f6-be36dbfeec7d", "DetectTime": "2023-10-30T14:10:47.994101+02:00", "EventTime": "2023-10-30T14:10:47.994117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C8CxDw1o92W6zPzLA2"]} -{"Format": "IDEA0", "ID": "d68b1298-b0f2-43cc-9b65-1ae250f19def", "DetectTime": "2023-10-30T14:10:48.016300+02:00", "EventTime": "2023-10-30T14:10:48.016311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CdIDRO1cEpOQuzuive"]} -{"Format": "IDEA0", "ID": "ee60ae64-333a-41cf-b548-814c018d7b09", "DetectTime": "2023-10-30T14:10:48.034618+02:00", "EventTime": "2023-10-30T14:10:48.034637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CMBUE924oAiZJUR93k"]} -{"Format": "IDEA0", "ID": "bce49043-058d-4066-9b91-816fcbaaf9e7", "DetectTime": "2023-10-30T14:10:48.056998+02:00", "EventTime": "2023-10-30T14:10:48.057009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CFvCLC2WO5TP32lkdj"]} -{"Format": "IDEA0", "ID": "9eed6cc9-6c78-4874-8ade-6590966a173e", "DetectTime": "2023-10-30T14:10:48.080898+02:00", "EventTime": "2023-10-30T14:10:48.080914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cjzq7a3Z2u7CgZRzO"]} -{"Format": "IDEA0", "ID": "2d0d83e0-7a74-4a26-bfbc-d94d4ada0c45", "DetectTime": "2023-10-30T14:10:48.105857+02:00", "EventTime": "2023-10-30T14:10:48.105923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CrNPjg1Ev5v1XUlM1e"]} -{"Format": "IDEA0", "ID": "c68adad3-5656-4baa-b1a7-9bf425d31b48", "DetectTime": "2023-10-30T14:10:48.130930+02:00", "EventTime": "2023-10-30T14:10:48.130946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CEDJQB2vZ4aRO0LSc9"]} -{"Format": "IDEA0", "ID": "66e2a1a0-cea0-483d-9469-478704fae31a", "DetectTime": "2023-10-30T14:10:48.170049+02:00", "EventTime": "2023-10-30T14:10:48.170064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C519Xt1CCwq2RoYZnl"]} -{"Format": "IDEA0", "ID": "c86ab0e1-f3ac-4387-aca0-87a32b1d2408", "DetectTime": "2023-10-30T14:10:48.193547+02:00", "EventTime": "2023-10-30T14:10:48.193559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CwzezR2bJtzFccsy99"]} -{"Format": "IDEA0", "ID": "c510acb5-5175-4fc8-a572-4422c7d3e90a", "DetectTime": "2023-10-30T14:10:48.215833+02:00", "EventTime": "2023-10-30T14:10:48.215845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CBbaSF4TZZj44zFqB"]} -{"Format": "IDEA0", "ID": "efa01128-efb2-49a8-84c2-3649de996a14", "DetectTime": "2023-10-30T14:10:48.239172+02:00", "EventTime": "2023-10-30T14:10:48.239188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHvidH3gqs3X7CT67c"]} -{"Format": "IDEA0", "ID": "f69828da-e447-442e-a45e-a877fb11b257", "DetectTime": "2023-10-30T14:10:48.263310+02:00", "EventTime": "2023-10-30T14:10:48.263322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CGP3Xe1OoaQTRUy4Pc"]} -{"Format": "IDEA0", "ID": "e1fb79e9-6186-455a-82a8-9e38d2ae1b1e", "DetectTime": "2023-10-30T14:10:48.281807+02:00", "EventTime": "2023-10-30T14:10:48.281818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CNr0qVfh2wCbsKgkj"]} -{"Format": "IDEA0", "ID": "5e98f3fb-035c-424b-9154-34b6efb1a46d", "DetectTime": "2023-10-30T14:10:48.303282+02:00", "EventTime": "2023-10-30T14:10:48.303302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C4vfrRqHv8L7CS3D6"]} -{"Format": "IDEA0", "ID": "a482f42a-edf6-4056-b593-ee2331129f52", "DetectTime": "2023-10-30T14:10:48.326592+02:00", "EventTime": "2023-10-30T14:10:48.326607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.17.251.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.17.251.64 ", "ContentType": "text/plain"}], "uids": ["CXzLrJ1Vn2kWfEi5od"]} -{"Format": "IDEA0", "ID": "0e580816-f625-4b8a-8027-1b88b8a48808", "DetectTime": "2023-10-30T14:10:48.350594+02:00", "EventTime": "2023-10-30T14:10:48.350604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.13.164.195 ", "ContentType": "text/plain"}], "uids": ["CN3Fx6aGwhihptixk"]} -{"Format": "IDEA0", "ID": "e9e918b3-02db-4b3b-a690-a4f1f2818420", "DetectTime": "2023-10-30T14:10:48.370332+02:00", "EventTime": "2023-10-30T14:10:48.370348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CSZOdF4OJksTIYX7Od"]} -{"Format": "IDEA0", "ID": "149a5c4b-56ad-47d0-b9a8-5d8b312467c8", "DetectTime": "2023-10-30T14:10:48.393171+02:00", "EventTime": "2023-10-30T14:10:48.393183+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CBnQnspzVW61pgS1"]} -{"Format": "IDEA0", "ID": "d731cd9c-53cf-4aa5-9bc5-7b3c50e94f7d", "DetectTime": "2023-10-30T14:10:48.412659+02:00", "EventTime": "2023-10-30T14:10:48.412670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["C9gesw19GV2lpkdU9b"]} -{"Format": "IDEA0", "ID": "17475482-985b-4a88-8911-7698c8cc4273", "DetectTime": "2023-10-30T14:10:48.435426+02:00", "EventTime": "2023-10-30T14:10:48.435451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CKcA734XUbsr4veIk8"]} -{"Format": "IDEA0", "ID": "54593b53-a769-4767-a39a-8aac84bb3952", "DetectTime": "2023-10-30T14:10:48.460698+02:00", "EventTime": "2023-10-30T14:10:48.460708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.20.148.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.20.148.198 ", "ContentType": "text/plain"}], "uids": ["CJVAbe4fAnQcCpTzg9"]} -{"Format": "IDEA0", "ID": "d6577a9d-7c32-49dc-8e9b-46479f6f7f01", "DetectTime": "2023-10-30T14:10:48.482455+02:00", "EventTime": "2023-10-30T14:10:48.482466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CjX5zckulgZznSJk"]} -{"Format": "IDEA0", "ID": "01e67fc1-c59d-45fd-86fb-7267a0ae577f", "DetectTime": "2023-10-30T14:10:48.506095+02:00", "EventTime": "2023-10-30T14:10:48.506111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CTTYKt3FdJ55JnxyXe"]} -{"Format": "IDEA0", "ID": "c96d5bda-19fd-4f85-bbc9-0ce842455876", "DetectTime": "2023-10-30T14:10:48.531024+02:00", "EventTime": "2023-10-30T14:10:48.531036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CX7fpF2xXza4rlAK95"]} -{"Format": "IDEA0", "ID": "83ff4c8b-f4df-4738-9a5a-abc420db6de7", "DetectTime": "2023-10-30T14:10:48.553349+02:00", "EventTime": "2023-10-30T14:10:48.553372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cle1fW3Ao4ddJACmpb"]} -{"Format": "IDEA0", "ID": "ce5c5323-280c-49fc-aad4-d9d5f6879853", "DetectTime": "2023-10-30T14:10:48.579331+02:00", "EventTime": "2023-10-30T14:10:48.579347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CqmohC2IP7SA1se1E8"]} -{"Format": "IDEA0", "ID": "630e5498-08f0-4471-8cde-c3bd4161aa0e", "DetectTime": "2023-10-30T14:10:48.603599+02:00", "EventTime": "2023-10-30T14:10:48.603615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CljAZs1R7XtAlBf5pf"]} -{"Format": "IDEA0", "ID": "3dfefb6a-9d79-4ba0-adf9-69ad66181a43", "DetectTime": "2023-10-30T14:10:48.631278+02:00", "EventTime": "2023-10-30T14:10:48.631294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CjwFxE1SBAORrLVZM6"]} -{"Format": "IDEA0", "ID": "d0acea2b-2086-4845-ba7d-4808f71066d8", "DetectTime": "2023-10-30T14:10:48.653300+02:00", "EventTime": "2023-10-30T14:10:48.653313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CXbefp2Tze3llFrRc4"]} -{"Format": "IDEA0", "ID": "176b7ad9-50fc-49a3-abaf-c1b3cb128789", "DetectTime": "2023-10-30T14:10:48.679712+02:00", "EventTime": "2023-10-30T14:10:48.679728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CS3vXk1FgUyAJRAQmg"]} -{"Format": "IDEA0", "ID": "0498d8a7-3957-4e3b-9876-65775b8bad57", "DetectTime": "2023-10-30T14:10:48.704478+02:00", "EventTime": "2023-10-30T14:10:48.704495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CRWLOW1YEXcgAlyCa5"]} -{"Format": "IDEA0", "ID": "817201a2-14b8-47a0-9e38-bc41f326bbe3", "DetectTime": "2023-10-30T14:10:48.735104+02:00", "EventTime": "2023-10-30T14:10:48.735117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.202.161.209 ", "ContentType": "text/plain"}], "uids": ["CEsxQk27ax6CaE4DH2"]} -{"Format": "IDEA0", "ID": "880de3b9-fe3c-405b-a013-8700210e4397", "DetectTime": "2023-10-30T14:10:48.758251+02:00", "EventTime": "2023-10-30T14:10:48.758268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cze4Ii4iYItuEExc1i"]} -{"Format": "IDEA0", "ID": "c9f40604-8b4b-4bf9-900f-b74d5862ec0d", "DetectTime": "2023-10-30T14:10:48.780529+02:00", "EventTime": "2023-10-30T14:10:48.780544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.135.143.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.135.143.64 ", "ContentType": "text/plain"}], "uids": ["CXJ0LV36NFUjexPf5e"]} -{"Format": "IDEA0", "ID": "6590909d-1af1-4b79-aacd-991e2177e0ee", "DetectTime": "2023-10-30T14:10:48.801385+02:00", "EventTime": "2023-10-30T14:10:48.801411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CQ2i2434Yf9Wf4YFH4"]} -{"Format": "IDEA0", "ID": "4b313115-6889-4c9e-8600-c50e4e3ddc16", "DetectTime": "2023-10-30T14:10:48.829540+02:00", "EventTime": "2023-10-30T14:10:48.829555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C8KcWV148Y2H3KfmS2"]} -{"Format": "IDEA0", "ID": "4c9756c2-c4bb-495a-b446-2daca56bf3a0", "DetectTime": "2023-10-30T14:10:48.854123+02:00", "EventTime": "2023-10-30T14:10:48.854135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CL6Qe4eztLA4Wf0bb"]} -{"Format": "IDEA0", "ID": "dd55c269-1558-4321-b527-44b20eb56aef", "DetectTime": "2023-10-30T14:10:48.878981+02:00", "EventTime": "2023-10-30T14:10:48.878999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["Cl4yd44egJX07fRRmk"]} -{"Format": "IDEA0", "ID": "a9477e7d-ba70-41b2-b472-a0a0e1e55bc6", "DetectTime": "2023-10-30T14:10:48.908654+02:00", "EventTime": "2023-10-30T14:10:48.908669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cc4gGd3KcCgldTaE62"]} -{"Format": "IDEA0", "ID": "6a5e3a55-cdde-4e91-a210-0ff48abe5f20", "DetectTime": "2023-10-30T14:10:48.936836+02:00", "EventTime": "2023-10-30T14:10:48.936851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CgTku23BkSa9PstBX"]} -{"Format": "IDEA0", "ID": "cec39071-fb64-44a0-8c5c-715986229f58", "DetectTime": "2023-10-30T14:10:48.974842+02:00", "EventTime": "2023-10-30T14:10:48.974855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CkdZJg8GJUyog8bTd"]} -{"Format": "IDEA0", "ID": "2b604583-e6f8-4b6b-8034-2405c3a77acb", "DetectTime": "2023-10-30T14:10:49.000188+02:00", "EventTime": "2023-10-30T14:10:49.000209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CI8DBW2yZOeIS6I8S5"]} -{"Format": "IDEA0", "ID": "787cbb39-809a-4899-ab7a-4c4a7f21e4be", "DetectTime": "2023-10-30T14:10:49.027980+02:00", "EventTime": "2023-10-30T14:10:49.027993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CvFqTa1Jnk0hiyp4c"]} -{"Format": "IDEA0", "ID": "70e9ab82-5daa-4601-9305-4caced1a1bca", "DetectTime": "2023-10-30T14:10:49.065126+02:00", "EventTime": "2023-10-30T14:10:49.065138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.17.251.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.17.251.64 ", "ContentType": "text/plain"}], "uids": ["CCykV71CgmrUE2YEP7"]} -{"Format": "IDEA0", "ID": "9ddfb4c8-e67e-4e04-9a1e-87d5941abeb8", "DetectTime": "2023-10-30T14:10:49.087208+02:00", "EventTime": "2023-10-30T14:10:49.087219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.107.40.140 ", "ContentType": "text/plain"}], "uids": ["CfLkCLfr2ItI6qcQi"]} -{"Format": "IDEA0", "ID": "b08f3822-5d7f-48fd-bd19-f0fb8e23f19c", "DetectTime": "2023-10-30T14:10:49.110488+02:00", "EventTime": "2023-10-30T14:10:49.110500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.20.148.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 79.20.148.198 ", "ContentType": "text/plain"}], "uids": ["CmvnyU2mu5lTKukD34"]} -{"Format": "IDEA0", "ID": "6cb8b63c-6d21-4845-9cc7-0ed67f8719c4", "DetectTime": "2023-10-30T14:10:49.137205+02:00", "EventTime": "2023-10-30T14:10:49.137222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CVvSnk1bd1jdraSIh8"]} -{"Format": "IDEA0", "ID": "df789dd9-25c9-4f27-9d9f-4cee7426c13d", "DetectTime": "2023-10-30T14:10:49.167767+02:00", "EventTime": "2023-10-30T14:10:49.167780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CANYpoAm2W3eVVBtf"]} -{"Format": "IDEA0", "ID": "a0575007-cfd1-40b8-84c0-5c367656906c", "DetectTime": "2023-10-30T14:10:49.198301+02:00", "EventTime": "2023-10-30T14:10:49.198318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Ca3euk1APCyE7N4oG8"]} -{"Format": "IDEA0", "ID": "a9f51d41-a5bb-4b56-b96b-3c3c7ed851ac", "DetectTime": "2023-10-30T14:10:49.222573+02:00", "EventTime": "2023-10-30T14:10:49.222591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.227.70.250 ", "ContentType": "text/plain"}], "uids": ["CSxOGp4ugORB1KWxO2"]} -{"Format": "IDEA0", "ID": "921a950d-c8ee-4f8d-a48e-42bb4b70398d", "DetectTime": "2023-10-30T14:10:49.245542+02:00", "EventTime": "2023-10-30T14:10:49.245559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.135.143.64"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.135.143.64 ", "ContentType": "text/plain"}], "uids": ["CBnWwz4105goWZp5l"]} -{"Format": "IDEA0", "ID": "1e18a48f-6c06-4437-a488-d89d4a0a4642", "DetectTime": "2023-10-30T14:10:49.273255+02:00", "EventTime": "2023-10-30T14:10:49.273271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CBL5rT3KhEcNBNqJ7e"]} -{"Format": "IDEA0", "ID": "6d317976-2f45-4804-8c24-d657f39e4924", "DetectTime": "2023-10-30T14:10:49.302216+02:00", "EventTime": "2023-10-30T14:10:49.302227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["Cangxe1YChQezmcNXe"]} -{"Format": "IDEA0", "ID": "46c70c6d-4d6b-473d-b455-c5597c14f4a5", "DetectTime": "2023-10-30T14:10:49.326414+02:00", "EventTime": "2023-10-30T14:10:49.326430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.13.164.195 ", "ContentType": "text/plain"}], "uids": ["CULD3v46v8lNejmv18"]} -{"Format": "IDEA0", "ID": "91ef3677-812e-44e9-b717-30be1436f291", "DetectTime": "2023-10-30T14:10:49.353437+02:00", "EventTime": "2023-10-30T14:10:49.353452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CpkhCqPpRjRIMm7oi"]} -{"Format": "IDEA0", "ID": "027f353c-3fea-4852-b540-d9f396f8876e", "DetectTime": "2023-10-30T14:10:49.377519+02:00", "EventTime": "2023-10-30T14:10:49.377535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CpSN4Q146wDBO9J7ze"]} -{"Format": "IDEA0", "ID": "fab9e92b-f0bb-41c2-882c-c2d2a6335c8f", "DetectTime": "2023-10-30T14:10:49.408322+02:00", "EventTime": "2023-10-30T14:10:49.408337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C0wRQP2figIq1gZGHb"]} -{"Format": "IDEA0", "ID": "899dc8ba-cd14-48a7-8b79-926d717453e2", "DetectTime": "2023-10-30T14:10:49.432301+02:00", "EventTime": "2023-10-30T14:10:49.432317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CrRR4B2oMSG1fG1rz"]} -{"Format": "IDEA0", "ID": "7206c639-46c7-4d68-ae10-76cc76d58b1a", "DetectTime": "2023-10-30T14:10:49.459067+02:00", "EventTime": "2023-10-30T14:10:49.459082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CCu5fv3AUQGZQ1c4fb"]} -{"Format": "IDEA0", "ID": "e90743b4-4dd7-4073-987b-2f2866ff571d", "DetectTime": "2023-10-30T14:10:49.484166+02:00", "EventTime": "2023-10-30T14:10:49.484182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CKWZKn33yL9c5rWLDb"]} -{"Format": "IDEA0", "ID": "2af66ee7-4d85-4fcb-b2ce-e8151a95203a", "DetectTime": "2023-10-30T14:10:49.512404+02:00", "EventTime": "2023-10-30T14:10:49.512419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C9xreZ3wj7RlkPWBV"]} -{"Format": "IDEA0", "ID": "6eec4be4-b4ac-4642-be8d-d79199122d78", "DetectTime": "2023-10-30T14:10:49.541483+02:00", "EventTime": "2023-10-30T14:10:49.541499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CYi5MpzyasD9QNN72"]} -{"Format": "IDEA0", "ID": "decd8fe4-505a-4383-82ce-c6143edb46c8", "DetectTime": "2023-10-30T14:10:49.570606+02:00", "EventTime": "2023-10-30T14:10:49.570622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C57K5q2sVhrA4roT8"]} -{"Format": "IDEA0", "ID": "6f72b8d8-68b3-4306-badf-c33f859d76a4", "DetectTime": "2023-10-30T14:10:49.598971+02:00", "EventTime": "2023-10-30T14:10:49.598987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CS30rH2zezOaaTlWWi"]} -{"Format": "IDEA0", "ID": "980f2340-4d25-45b3-a4dd-e7aac695947f", "DetectTime": "2023-10-30T14:10:49.625467+02:00", "EventTime": "2023-10-30T14:10:49.625481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C2lnyA3GxJ1pUF8m88"]} -{"Format": "IDEA0", "ID": "489858f5-3fba-4526-aaf0-69676ac50b0a", "DetectTime": "2023-10-30T14:10:49.723072+02:00", "EventTime": "2023-10-30T14:10:49.723087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["COC2Db1gLwX4CnOYWg"]} -{"Format": "IDEA0", "ID": "3b07c57b-48c8-49a3-82ba-99d4ec133d56", "DetectTime": "2023-10-30T14:10:49.749637+02:00", "EventTime": "2023-10-30T14:10:49.749653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cvc5gC2ZeG0c9PUxb6"]} -{"Format": "IDEA0", "ID": "9fcf9302-e617-473f-aade-74bcdc68e7f0", "DetectTime": "2023-10-30T14:10:49.776298+02:00", "EventTime": "2023-10-30T14:10:49.776308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CpGTqc14uCioPeMRqh"]} -{"Format": "IDEA0", "ID": "31ea9414-1b83-4674-bf85-2f29431cc148", "DetectTime": "2023-10-30T14:10:49.805844+02:00", "EventTime": "2023-10-30T14:10:49.805862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CM770s2uY1pcHzNs4l"]} -{"Format": "IDEA0", "ID": "eedec7e7-85a8-4892-94bb-ea683fec0abf", "DetectTime": "2023-10-30T14:10:49.828086+02:00", "EventTime": "2023-10-30T14:10:49.828096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CR8T4x3c8fNBFCKxy5"]} -{"Format": "IDEA0", "ID": "e4dbb155-2e4c-4f50-acea-f37a0e790223", "DetectTime": "2023-10-30T14:10:49.852054+02:00", "EventTime": "2023-10-30T14:10:49.852072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CEnJXm1NFVQFmudEQ7"]} -{"Format": "IDEA0", "ID": "7c270291-386f-47bf-8565-b54457434357", "DetectTime": "2023-10-30T14:10:49.874376+02:00", "EventTime": "2023-10-30T14:10:49.874389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.202.161.209 ", "ContentType": "text/plain"}], "uids": ["CEfcug4TGvE080734"]} -{"Format": "IDEA0", "ID": "a4b80e42-40aa-4f63-9021-ccd2716c84d5", "DetectTime": "2023-10-30T14:10:49.900291+02:00", "EventTime": "2023-10-30T14:10:49.900313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["C5QA2l4YmgL7HiNKH9"]} -{"Format": "IDEA0", "ID": "2ecc825b-5081-4fd0-962d-b8a71f6bc8ad", "DetectTime": "2023-10-30T14:10:49.926574+02:00", "EventTime": "2023-10-30T14:10:49.926589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CIMpK93qCnoK2Gm8O1"]} -{"Format": "IDEA0", "ID": "399678fe-5385-416b-b724-7923d74c91ce", "DetectTime": "2023-10-30T14:10:49.951078+02:00", "EventTime": "2023-10-30T14:10:49.951093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C3leDE3iTfSlK0JDAa"]} -{"Format": "IDEA0", "ID": "53508bd2-df7c-4d15-b7f6-859964d4a4d7", "DetectTime": "2023-10-30T14:10:49.975034+02:00", "EventTime": "2023-10-30T14:10:49.975047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cr9wLn4AJ72IN1YLr8"]} -{"Format": "IDEA0", "ID": "e23f5625-0ba1-4e8f-b10a-897c2a4b24fa", "DetectTime": "2023-10-30T14:10:50.008617+02:00", "EventTime": "2023-10-30T14:10:50.008628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CzPHgJ2NcY964Skfbk"]} -{"Format": "IDEA0", "ID": "001191b8-a791-45de-b965-3d21959d068a", "DetectTime": "2023-10-30T14:10:50.032011+02:00", "EventTime": "2023-10-30T14:10:50.032028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["C7X9lZ2PwfbufcRbde"]} -{"Format": "IDEA0", "ID": "71c811ad-359e-4b94-bd20-856b11bbe2d4", "DetectTime": "2023-10-30T14:10:50.057431+02:00", "EventTime": "2023-10-30T14:10:50.057442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CP71fc48Pfr4fMC1U1"]} -{"Format": "IDEA0", "ID": "5c67c4e1-d148-4a53-8889-f7bb362d45ce", "DetectTime": "2023-10-30T14:10:50.077508+02:00", "EventTime": "2023-10-30T14:10:50.077525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CR9KlBfiiQJeNobdl"]} -{"Format": "IDEA0", "ID": "7577b6b3-7af7-4ae2-a547-68db1a6200cf", "DetectTime": "2023-10-30T14:10:50.100100+02:00", "EventTime": "2023-10-30T14:10:50.100113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CL4iae1ORKzHeWvzC4"]} -{"Format": "IDEA0", "ID": "2b23037d-f08b-4878-9bf5-c1111f2fe678", "DetectTime": "2023-10-30T14:10:50.125087+02:00", "EventTime": "2023-10-30T14:10:50.125099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C5kEin1CM063EKuVgh"]} -{"Format": "IDEA0", "ID": "77726bba-f05f-4a9a-8406-c3db35d77b52", "DetectTime": "2023-10-30T14:10:50.151714+02:00", "EventTime": "2023-10-30T14:10:50.151730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Czf08ofJafJnpeRUa"]} -{"Format": "IDEA0", "ID": "bfe9d475-1687-48d5-af98-3cdfb577ed6f", "DetectTime": "2023-10-30T14:10:50.181306+02:00", "EventTime": "2023-10-30T14:10:50.181322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C3Yw4g22L05SN0Ln9"]} -{"Format": "IDEA0", "ID": "5ad0f9d9-ea4c-4648-837d-e604bbd55ef0", "DetectTime": "2023-10-30T14:10:50.203159+02:00", "EventTime": "2023-10-30T14:10:50.203173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cz11lS2wLsA5ylHTM8"]} -{"Format": "IDEA0", "ID": "ae9db4a7-54b0-4a6f-89ea-6e31e2899a12", "DetectTime": "2023-10-30T14:10:50.227391+02:00", "EventTime": "2023-10-30T14:10:50.227402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CLkHIc4pGizPGjmACa"]} -{"Format": "IDEA0", "ID": "381f78dc-0a6f-47f2-983e-de9f1fa9ba3d", "DetectTime": "2023-10-30T14:10:50.254510+02:00", "EventTime": "2023-10-30T14:10:50.254529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CmbFuWHYiDaxA4ZRf"]} -{"Format": "IDEA0", "ID": "e77bbeaf-3f47-4bee-8b3f-26a6bb87c7e2", "DetectTime": "2023-10-30T14:10:50.279914+02:00", "EventTime": "2023-10-30T14:10:50.279925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cl4ds94h723uv2W81d"]} -{"Format": "IDEA0", "ID": "7bec8de2-5d69-4027-8740-7cd59da37839", "DetectTime": "2023-10-30T14:10:50.305479+02:00", "EventTime": "2023-10-30T14:10:50.305489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C8V3z24rMLY5Isy4yj"]} -{"Format": "IDEA0", "ID": "34015f0a-7f4a-4a18-9f3f-18cbd0366329", "DetectTime": "2023-10-30T14:10:50.336247+02:00", "EventTime": "2023-10-30T14:10:50.336264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CBZ16s2neeUNLwjWKe"]} -{"Format": "IDEA0", "ID": "6b377937-d156-49c3-9e03-b9c07b0610ca", "DetectTime": "2023-10-30T14:10:50.364462+02:00", "EventTime": "2023-10-30T14:10:50.364480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CA95vw4ZwRikYWcGVb"]} -{"Format": "IDEA0", "ID": "478c9d76-7951-470f-8e90-41ed58b87ca9", "DetectTime": "2023-10-30T14:10:50.387921+02:00", "EventTime": "2023-10-30T14:10:50.387934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CrRcH61Kfm9I9f3Fa3"]} -{"Format": "IDEA0", "ID": "b0d1e685-a8dc-49a7-84f3-f9be057e8e02", "DetectTime": "2023-10-30T14:10:50.419759+02:00", "EventTime": "2023-10-30T14:10:50.419774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CweojY3npd8kHK0yY1"]} -{"Format": "IDEA0", "ID": "57785c0e-f16b-4cec-bd49-ef4758ef2f9d", "DetectTime": "2023-10-30T14:10:50.460398+02:00", "EventTime": "2023-10-30T14:10:50.460414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVmpGJDkz7Cdin3S2"]} -{"Format": "IDEA0", "ID": "629c4ea8-472a-4545-8dfe-c01d0c4e8b2c", "DetectTime": "2023-10-30T14:10:50.488439+02:00", "EventTime": "2023-10-30T14:10:50.488449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CNyu0L13nc1uWhJvT7"]} -{"Format": "IDEA0", "ID": "e2a55492-6577-4108-a66f-3038e31333b6", "DetectTime": "2023-10-30T14:10:50.515964+02:00", "EventTime": "2023-10-30T14:10:50.515977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C487IE36nFd6LDqYp4"]} -{"Format": "IDEA0", "ID": "9255f5a9-1776-49fb-8985-b14e03f3f1ac", "DetectTime": "2023-10-30T14:10:50.552717+02:00", "EventTime": "2023-10-30T14:10:50.552734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ce9e7j1827WGqKRoBk"]} -{"Format": "IDEA0", "ID": "9c339a52-dee6-4cb0-8d0e-24337313cbd7", "DetectTime": "2023-10-30T14:10:50.593026+02:00", "EventTime": "2023-10-30T14:10:50.593044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.250.218.50 ", "ContentType": "text/plain"}], "uids": ["C85zZ11jWttiWgh093"]} -{"Format": "IDEA0", "ID": "48e3b3f1-dd89-4d1c-a230-b6f3300fe97f", "DetectTime": "2023-10-30T14:10:50.635197+02:00", "EventTime": "2023-10-30T14:10:50.635213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4W6LE1Dpk9mi8GuT2"]} -{"Format": "IDEA0", "ID": "da5f6a13-7e07-4c4a-80fb-82e911cc8b5f", "DetectTime": "2023-10-30T14:10:50.670527+02:00", "EventTime": "2023-10-30T14:10:50.670539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C1brTd3pTyY3e7lH3c"]} -{"Format": "IDEA0", "ID": "b388b228-2290-42f0-bac5-62439b3030eb", "DetectTime": "2023-10-30T14:10:50.708018+02:00", "EventTime": "2023-10-30T14:10:50.708034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cwv7zSiv4s7oUWhTg"]} -{"Format": "IDEA0", "ID": "100f12ff-75c5-4fb7-93a9-e21081448ed5", "DetectTime": "2023-10-30T14:10:50.736825+02:00", "EventTime": "2023-10-30T14:10:50.736841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CQfIL618KYPKXjgvH8"]} -{"Format": "IDEA0", "ID": "1aa19fcb-d638-48eb-94bf-37d4ac829a86", "DetectTime": "2023-10-30T14:10:50.777362+02:00", "EventTime": "2023-10-30T14:10:50.777378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CWSUUn1PIYDyR0NvL2"]} -{"Format": "IDEA0", "ID": "e323f65f-806d-4e83-8430-5d26e7b71664", "DetectTime": "2023-10-30T14:10:50.815533+02:00", "EventTime": "2023-10-30T14:10:50.815558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CVJjxu4MeOzApTZiz7"]} -{"Format": "IDEA0", "ID": "ef7da800-9adf-45b1-bd23-35449dd69c5c", "DetectTime": "2023-10-30T14:10:50.856742+02:00", "EventTime": "2023-10-30T14:10:50.856758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CES6Ho3sE3F1Er9Ry"]} -{"Format": "IDEA0", "ID": "50e076b0-d06a-4b8b-8f49-95fa38b55c50", "DetectTime": "2023-10-30T14:10:50.897967+02:00", "EventTime": "2023-10-30T14:10:50.897982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CezYiRnpGd65Vyc71"]} -{"Format": "IDEA0", "ID": "96605db4-9f79-4da5-b146-d62c28014676", "DetectTime": "2023-10-30T14:10:50.937942+02:00", "EventTime": "2023-10-30T14:10:50.937953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C3O6Y13ZvwHclumzp1"]} -{"Format": "Json", "ID": "96605db4-9f79-4da5-b146-d62c28014676", "DetectTime": "2023-10-30T14:10:50.937942+02:00", "EventTime": "2023-10-30T14:10:50.937953+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:44:20.747316+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:51.011238)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3cb9d6b5-d090-4a1f-9ef5-d2ec9fe97cd5", "DetectTime": "2023-10-30T14:10:51.015167+02:00", "EventTime": "2023-10-30T14:10:51.015178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CFIE011JVoezOfqwEb"]} -{"Format": "IDEA0", "ID": "e3e92b5a-c06e-4165-a226-cf16ef2d24f9", "DetectTime": "2023-10-30T14:10:51.056327+02:00", "EventTime": "2023-10-30T14:10:51.056340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cg35Rn4AoRXqFto7ge"]} -{"Format": "IDEA0", "ID": "dc141d9f-b89f-42fe-9926-ef8cd02e3db3", "DetectTime": "2023-10-30T14:10:51.090669+02:00", "EventTime": "2023-10-30T14:10:51.090684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CC2Fnh2ehsvFKyTZjc"]} -{"Format": "IDEA0", "ID": "64f289c7-b1ee-4ef0-b2db-2851c4026c1c", "DetectTime": "2023-10-30T14:10:51.120363+02:00", "EventTime": "2023-10-30T14:10:51.120374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.13.164.195 ", "ContentType": "text/plain"}], "uids": ["CKl2vR2Sb1mosELjki"]} -{"Format": "IDEA0", "ID": "88096e8b-d619-4ebd-9e22-dd9d3d098bc8", "DetectTime": "2023-10-30T14:10:51.150678+02:00", "EventTime": "2023-10-30T14:10:51.150692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CEOCXE1ISW3p3MNFe4"]} -{"Format": "IDEA0", "ID": "f00dd29d-515c-4f5e-89aa-aba8a02f4a5c", "DetectTime": "2023-10-30T14:10:51.186099+02:00", "EventTime": "2023-10-30T14:10:51.186123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CDSRZE322hRCAAvU88"]} -{"Format": "IDEA0", "ID": "f9e9d9a0-fa71-41e3-bd52-4d35cf2a3392", "DetectTime": "2023-10-30T14:10:51.217681+02:00", "EventTime": "2023-10-30T14:10:51.217694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CRvHFjSxVhSBwXDj4"]} -{"Format": "IDEA0", "ID": "0e5b73eb-2674-47ea-91e7-8cd221f013d6", "DetectTime": "2023-10-30T14:10:51.251413+02:00", "EventTime": "2023-10-30T14:10:51.251429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CH6YDA1j4nCQZKVEbf"]} -{"Format": "IDEA0", "ID": "a37fdb92-3026-4b31-8c73-8f1ac4406835", "DetectTime": "2023-10-30T14:10:51.289797+02:00", "EventTime": "2023-10-30T14:10:51.289814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CJ5Iud4dzBjFo0ulla"]} -{"Format": "IDEA0", "ID": "d9f542d2-fc4e-4a1d-8190-08e0eaf1b4f7", "DetectTime": "2023-10-30T14:10:51.321604+02:00", "EventTime": "2023-10-30T14:10:51.321616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CD6dPn4nVJCih8SLo2"]} -{"Format": "IDEA0", "ID": "b64737a6-3166-4e93-8eaa-625ce546dcb4", "DetectTime": "2023-10-30T14:10:51.348898+02:00", "EventTime": "2023-10-30T14:10:51.348908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CSjAKJ1hn1mcf1URM8"]} -{"Format": "IDEA0", "ID": "08088f61-fe4f-46b7-9123-14712eaa1e83", "DetectTime": "2023-10-30T14:10:51.378398+02:00", "EventTime": "2023-10-30T14:10:51.378410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CQHYqn2I96Ss70j36e"]} -{"Format": "IDEA0", "ID": "b89e2e1f-dc90-472a-90ba-a604bd1f6a4e", "DetectTime": "2023-10-30T14:10:51.411895+02:00", "EventTime": "2023-10-30T14:10:51.411912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cm0h944Nrnqf7H7x3c"]} -{"Format": "IDEA0", "ID": "55206804-df87-4f47-b452-1a0d30012cc4", "DetectTime": "2023-10-30T14:10:51.448649+02:00", "EventTime": "2023-10-30T14:10:51.448664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CGBvVq36Zi6zZGfvoi"]} -{"Format": "IDEA0", "ID": "39412abe-a866-4b75-9c83-00e3a2e83ce8", "DetectTime": "2023-10-30T14:10:51.485278+02:00", "EventTime": "2023-10-30T14:10:51.485293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["ChqgKQ192mwixX1SU7"]} -{"Format": "IDEA0", "ID": "06aae2e6-edeb-46a6-95fa-19c0a11d8198", "DetectTime": "2023-10-30T14:10:51.521028+02:00", "EventTime": "2023-10-30T14:10:51.521039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CNKyw14wryZ7yrIc21"]} -{"Format": "IDEA0", "ID": "96726050-410b-4841-97bf-60c1f916d911", "DetectTime": "2023-10-30T14:10:51.554295+02:00", "EventTime": "2023-10-30T14:10:51.554305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Ck4okj3ccBR9X9z8Ol"]} -{"Format": "IDEA0", "ID": "2793f7fe-6540-4909-8104-d9a5c81fc814", "DetectTime": "2023-10-30T14:10:51.581611+02:00", "EventTime": "2023-10-30T14:10:51.581622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C9tIef3Q3wCfEEyYqf"]} -{"Format": "IDEA0", "ID": "a9e6861a-f836-491c-a06c-7633518185de", "DetectTime": "2023-10-30T14:10:51.616600+02:00", "EventTime": "2023-10-30T14:10:51.616616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CPFq5v3WPcIi6Adfw7"]} -{"Format": "IDEA0", "ID": "7b193223-8e36-4b1f-a8a0-d256465151c4", "DetectTime": "2023-10-30T14:10:51.650624+02:00", "EventTime": "2023-10-30T14:10:51.650636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CByC061keYU0y8aLue"]} -{"Format": "Json", "ID": "7b193223-8e36-4b1f-a8a0-d256465151c4", "DetectTime": "2023-10-30T14:10:51.650624+02:00", "EventTime": "2023-10-30T14:10:51.650636+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T11:44:24.379693+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2023/10/30 14:10:51.720233)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "11bb6677-c2aa-4bb2-abc0-f928ff6bec40", "DetectTime": "2023-10-30T14:10:51.725243+02:00", "EventTime": "2023-10-30T14:10:51.725257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJnauhG4jVjTEpgjd"]} -{"Format": "IDEA0", "ID": "e7dc6505-67a0-41af-844d-4a06e463b532", "DetectTime": "2023-10-30T14:10:51.753848+02:00", "EventTime": "2023-10-30T14:10:51.753859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CF809s1g7dmUJ3TQRf"]} -{"Format": "IDEA0", "ID": "2cb4e0ae-fd8c-4d9a-b181-78a1d94cc3ca", "DetectTime": "2023-10-30T14:10:51.781501+02:00", "EventTime": "2023-10-30T14:10:51.781517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C0rxJ23g3ZBy49TUwa"]} -{"Format": "IDEA0", "ID": "792c371a-cddb-4c94-a5bb-e07ec7c20388", "DetectTime": "2023-10-30T14:10:51.810834+02:00", "EventTime": "2023-10-30T14:10:51.810850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cd2jTg45ddLpSKxj4k"]} -{"Format": "IDEA0", "ID": "48537aa4-ba60-437c-bc2c-71703937a355", "DetectTime": "2023-10-30T14:10:51.941668+02:00", "EventTime": "2023-10-30T14:10:51.941705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C2w3QN3omvnEif8CG3"]} -{"Format": "IDEA0", "ID": "89d3e0c0-0c7c-4e3f-ac9d-03b3af86a8f2", "DetectTime": "2023-10-30T14:10:51.979803+02:00", "EventTime": "2023-10-30T14:10:51.979818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CRf9HB4pADBEeIH6bk"]} -{"Format": "IDEA0", "ID": "f2a67364-991c-4fe5-bb5f-0c02ab4ba051", "DetectTime": "2023-10-30T14:10:52.025167+02:00", "EventTime": "2023-10-30T14:10:52.025183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CuUD7g1hWTg6NgJJc5"]} -{"Format": "IDEA0", "ID": "6346b229-5db9-4e57-80a3-633cbcf14e76", "DetectTime": "2023-10-30T14:10:52.068628+02:00", "EventTime": "2023-10-30T14:10:52.068650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C2Fe8F3BIxccJoWGe1"]} -{"Format": "IDEA0", "ID": "93bcfe53-5e41-4806-b571-37e6f505dd08", "DetectTime": "2023-10-30T14:10:52.113727+02:00", "EventTime": "2023-10-30T14:10:52.113749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C1ayhM1Abk1lWHRGd2"]} -{"Format": "IDEA0", "ID": "1d052b2b-50f4-4f5e-8f1b-b58ada89a3f9", "DetectTime": "2023-10-30T14:10:52.138833+02:00", "EventTime": "2023-10-30T14:10:52.138849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C5ZlxeaN91H6P5UI1"]} -{"Format": "IDEA0", "ID": "7ff7e8a6-0909-47c1-9ca8-6f7f00a1345d", "DetectTime": "2023-10-30T14:10:52.184407+02:00", "EventTime": "2023-10-30T14:10:52.184424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CIljs92WxjWBSv1ylj"]} -{"Format": "IDEA0", "ID": "e0671254-8fea-4570-9ccd-e9159ff98e8d", "DetectTime": "2023-10-30T14:10:52.231379+02:00", "EventTime": "2023-10-30T14:10:52.231393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CA6tUBjtRuUy1pYSl"]} -{"Format": "IDEA0", "ID": "1af13d12-5a62-4a77-aba7-78ebd6541983", "DetectTime": "2023-10-30T14:10:52.277419+02:00", "EventTime": "2023-10-30T14:10:52.277434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CdAvz4tFiAvN2j6i2"]} -{"Format": "Json", "ID": "1af13d12-5a62-4a77-aba7-78ebd6541983", "DetectTime": "2023-10-30T14:10:52.277419+02:00", "EventTime": "2023-10-30T14:10:52.277434+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:15:37.645483+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:52.381145)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "639e2e5d-d89e-4c27-b5b7-3382849aaacb", "DetectTime": "2023-10-30T14:10:52.386828+02:00", "EventTime": "2023-10-30T14:10:52.386844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CQpFt21QCUikIHQhG5"]} -{"Format": "IDEA0", "ID": "f61a3c0a-a944-44f6-b3a5-246adcd7196f", "DetectTime": "2023-10-30T14:10:52.428820+02:00", "EventTime": "2023-10-30T14:10:52.428832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Crpseg2BnrXZbJd3O6"]} -{"Format": "IDEA0", "ID": "527149d1-94b3-4b8b-a0a6-a7b8620157d9", "DetectTime": "2023-10-30T14:10:52.472104+02:00", "EventTime": "2023-10-30T14:10:52.472116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CyXniP3sOva1T1sodh"]} -{"Format": "IDEA0", "ID": "441f35c2-647a-4a1b-9abe-9a5b2eba4fd0", "DetectTime": "2023-10-30T14:10:52.517005+02:00", "EventTime": "2023-10-30T14:10:52.517021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C21ZGoc3fBJ9tg1vl"]} -{"Format": "IDEA0", "ID": "b639d479-0d93-4f09-810a-a8f61450e662", "DetectTime": "2023-10-30T14:10:52.560419+02:00", "EventTime": "2023-10-30T14:10:52.560431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CHaTZx2p1bryzWwiLe"]} -{"Format": "IDEA0", "ID": "d0f92cbb-6fc0-4b50-9220-b001cbde32cc", "DetectTime": "2023-10-30T14:10:52.593322+02:00", "EventTime": "2023-10-30T14:10:52.593337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CTuYuc1Ovk9KhMX6T3"]} -{"Format": "IDEA0", "ID": "8825bc38-8f85-4118-a4f0-e0f97c87346a", "DetectTime": "2023-10-30T14:10:52.634191+02:00", "EventTime": "2023-10-30T14:10:52.634208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CBFlD6dCoNOlUecLa"]} -{"Format": "IDEA0", "ID": "da534faa-9499-4d8b-b4ac-c756b61f30d0", "DetectTime": "2023-10-30T14:10:52.671948+02:00", "EventTime": "2023-10-30T14:10:52.671963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CAuwSV25WehdS08uWa"]} -{"Format": "IDEA0", "ID": "20911593-16ed-4d41-833b-dc86f4497e9c", "DetectTime": "2023-10-30T14:10:52.718775+02:00", "EventTime": "2023-10-30T14:10:52.718824+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CjjLqu4NjKfE77EKo7"]} -{"Format": "IDEA0", "ID": "c0b2b330-db18-4016-849e-ac071806d4e9", "DetectTime": "2023-10-30T14:10:52.738631+02:00", "EventTime": "2023-10-30T14:10:52.738649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CKqnTq4N1ZFoMK4dZ1"]} -{"Format": "Json", "ID": "c0b2b330-db18-4016-849e-ac071806d4e9", "DetectTime": "2023-10-30T14:10:52.738631+02:00", "EventTime": "2023-10-30T14:10:52.738649+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:15:58.417807+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:52.817580)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "623377eb-7a41-49ce-9fe9-b390c06d4cc1", "DetectTime": "2023-10-30T14:10:52.821828+02:00", "EventTime": "2023-10-30T14:10:52.821839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cyohkn2qwjd50RZwu8"]} -{"Format": "IDEA0", "ID": "05a580ff-071a-4fa1-99d7-3428201a0d32", "DetectTime": "2023-10-30T14:10:52.861278+02:00", "EventTime": "2023-10-30T14:10:52.861294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["C4Wcs7PYrjSO3tY8f"]} -{"Format": "IDEA0", "ID": "64e95285-08b0-48c6-b73a-199c71c06c78", "DetectTime": "2023-10-30T14:10:52.892958+02:00", "EventTime": "2023-10-30T14:10:52.892974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CRVRV725fLazgKo7b3"]} -{"Format": "IDEA0", "ID": "08255241-4907-4f47-8f53-268224ca1a12", "DetectTime": "2023-10-30T14:10:52.930024+02:00", "EventTime": "2023-10-30T14:10:52.930039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CzNMuy1N7udFcnkYui"]} -{"Format": "IDEA0", "ID": "7c943eb8-e5ba-404c-ba75-0a7320b7246a", "DetectTime": "2023-10-30T14:10:52.972432+02:00", "EventTime": "2023-10-30T14:10:52.972448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["Cg5HLt4BUp0yiQipAg"]} -{"Format": "IDEA0", "ID": "64962bf1-841b-40a4-919e-2502efa3dafb", "DetectTime": "2023-10-30T14:10:53.009259+02:00", "EventTime": "2023-10-30T14:10:53.009273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CYsgB13GbaDI4Z9LRh"]} -{"Format": "IDEA0", "ID": "77ee53d3-39c8-443b-affd-4a9467510aa2", "DetectTime": "2023-10-30T14:10:53.047783+02:00", "EventTime": "2023-10-30T14:10:53.047796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["Ct3aJR2MWsL0NTwXdd"]} -{"Format": "IDEA0", "ID": "e38a1567-00f5-4afc-9f23-bafff42f3cdf", "DetectTime": "2023-10-30T14:10:53.089724+02:00", "EventTime": "2023-10-30T14:10:53.089737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.202.161.209 ", "ContentType": "text/plain"}], "uids": ["CTHYP4G0T9r1rTOM2"]} -{"Format": "IDEA0", "ID": "c5286c0d-b323-4df4-88e8-fe329fa15b58", "DetectTime": "2023-10-30T14:10:53.116296+02:00", "EventTime": "2023-10-30T14:10:53.116311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CIm8yJ3erLjajWr0O8"]} -{"Format": "IDEA0", "ID": "5b8d62b7-d5bc-43c1-a34e-33f60ebc9d13", "DetectTime": "2023-10-30T14:10:53.153959+02:00", "EventTime": "2023-10-30T14:10:53.153971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CnhPmziXBjE67eBz9"]} -{"Format": "Json", "ID": "5b8d62b7-d5bc-43c1-a34e-33f60ebc9d13", "DetectTime": "2023-10-30T14:10:53.153959+02:00", "EventTime": "2023-10-30T14:10:53.153971+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:16:00.474255+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:53.224313)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "502ae9b2-7ee1-4b97-a3f3-2f8e46754efb", "DetectTime": "2023-10-30T14:10:53.229024+02:00", "EventTime": "2023-10-30T14:10:53.229040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CGmfau1lQyagElP3R8"]} -{"Format": "IDEA0", "ID": "0d6b0976-7479-4ef7-ab37-e579197b892e", "DetectTime": "2023-10-30T14:10:53.267921+02:00", "EventTime": "2023-10-30T14:10:53.267941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CSO0vjAkIeLvMWLz9"]} -{"Format": "IDEA0", "ID": "ac752455-ba58-44b8-bb4a-589ca10a8412", "DetectTime": "2023-10-30T14:10:53.295603+02:00", "EventTime": "2023-10-30T14:10:53.295616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CqVodC1umBOdlPpnXb"]} -{"Format": "IDEA0", "ID": "21cbb3ca-5aa6-4f63-bb40-f5d5d1d1b0ca", "DetectTime": "2023-10-30T14:10:53.333731+02:00", "EventTime": "2023-10-30T14:10:53.333756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CM4bSF4vQOztBa2tOg"]} -{"Format": "IDEA0", "ID": "3f3d66fc-2dac-4367-a57a-a39e87ed9d45", "DetectTime": "2023-10-30T14:10:53.368766+02:00", "EventTime": "2023-10-30T14:10:53.368777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CU4DdI2xVopYNuupX8"]} -{"Format": "IDEA0", "ID": "17f9eab4-a296-4a00-b07d-f47ae6c8e60a", "DetectTime": "2023-10-30T14:10:53.393838+02:00", "EventTime": "2023-10-30T14:10:53.393850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CMY6451f04K2WJlSMd"]} -{"Format": "IDEA0", "ID": "f5eee386-e90e-4076-99a8-056a1410c8d2", "DetectTime": "2023-10-30T14:10:53.434228+02:00", "EventTime": "2023-10-30T14:10:53.434246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C2exipxY8nJXHMx74"]} -{"Format": "IDEA0", "ID": "2a96118a-5128-4dee-8534-425871be8838", "DetectTime": "2023-10-30T14:10:53.467069+02:00", "EventTime": "2023-10-30T14:10:53.467090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CE3E9p4dkngELV3xE3"]} -{"Format": "IDEA0", "ID": "c8d4f515-dc82-40cc-bc52-b26e8bd62268", "DetectTime": "2023-10-30T14:10:53.495130+02:00", "EventTime": "2023-10-30T14:10:53.495142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CUMx1MQW9UYgCCIJk"]} -{"Format": "IDEA0", "ID": "f3671cf8-a76f-4ca1-be27-23c237cd0fa7", "DetectTime": "2023-10-30T14:10:53.528925+02:00", "EventTime": "2023-10-30T14:10:53.528942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C8LebA3uRIRcVl0Ol3"]} -{"Format": "Json", "ID": "f3671cf8-a76f-4ca1-be27-23c237cd0fa7", "DetectTime": "2023-10-30T14:10:53.528925+02:00", "EventTime": "2023-10-30T14:10:53.528942+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:16:02.143244+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:53.590154)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "79eae585-0646-41ee-b059-71f6a02e1b87", "DetectTime": "2023-10-30T14:10:53.595423+02:00", "EventTime": "2023-10-30T14:10:53.595439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C846UasWnFHsYKu38"]} -{"Format": "IDEA0", "ID": "8b72f8be-3792-4466-9104-d1807bac2807", "DetectTime": "2023-10-30T14:10:53.630836+02:00", "EventTime": "2023-10-30T14:10:53.630849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["C22Zke1t8oOO873gW"]} -{"Format": "IDEA0", "ID": "7792b3d5-b1ff-4588-a21a-fbc5505a3771", "DetectTime": "2023-10-30T14:10:53.658463+02:00", "EventTime": "2023-10-30T14:10:53.658481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CwfdhmsbjIykOhji1"]} -{"Format": "IDEA0", "ID": "76995a68-4044-4257-bec9-2e4638a3eaff", "DetectTime": "2023-10-30T14:10:53.692170+02:00", "EventTime": "2023-10-30T14:10:53.692187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cmdu4J1N7KHvGlZTh6"]} -{"Format": "IDEA0", "ID": "6b5a614f-863e-4ee0-bcc8-b2595adcfd84", "DetectTime": "2023-10-30T14:10:53.721560+02:00", "EventTime": "2023-10-30T14:10:53.721570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cwd1ET26JCEVcoOZ71"]} -{"Format": "IDEA0", "ID": "b1b0b2c2-982f-42e8-bbfb-0e75dd4ebda7", "DetectTime": "2023-10-30T14:10:53.755813+02:00", "EventTime": "2023-10-30T14:10:53.755831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CjJdHQ1CnFRjf22SQg"]} -{"Format": "IDEA0", "ID": "2569bd23-7201-44a8-9ab6-187272bbfb4c", "DetectTime": "2023-10-30T14:10:53.790051+02:00", "EventTime": "2023-10-30T14:10:53.790062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CQnk7M3KOESgwc6dyb"]} -{"Format": "IDEA0", "ID": "6cc8c556-e933-49c7-9773-de8941e70ec8", "DetectTime": "2023-10-30T14:10:53.821062+02:00", "EventTime": "2023-10-30T14:10:53.821073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["ClnbJe2y1mepLxE6Yl"]} -{"Format": "IDEA0", "ID": "c0709188-ce5d-427f-8cd4-cd2e9dc9865a", "DetectTime": "2023-10-30T14:10:53.852651+02:00", "EventTime": "2023-10-30T14:10:53.852664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C5uuxJ1xXgH9Z87EA"]} -{"Format": "IDEA0", "ID": "b66a79e8-a99d-4ce6-a562-17353694a6c7", "DetectTime": "2023-10-30T14:10:53.884813+02:00", "EventTime": "2023-10-30T14:10:53.884838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CqOzO23ltclDoLBH0a"]} -{"Format": "Json", "ID": "b66a79e8-a99d-4ce6-a562-17353694a6c7", "DetectTime": "2023-10-30T14:10:53.884813+02:00", "EventTime": "2023-10-30T14:10:53.884838+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:16:08.052692+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:53.954446)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7eff75b8-963a-4cf7-9917-4da616203d6c", "DetectTime": "2023-10-30T14:10:53.958855+02:00", "EventTime": "2023-10-30T14:10:53.958867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CnjXtC3hfiYrDEIWl3"]} -{"Format": "IDEA0", "ID": "7d96dce7-cdce-455d-9a98-ead093c41347", "DetectTime": "2023-10-30T14:10:53.986823+02:00", "EventTime": "2023-10-30T14:10:53.986836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZX1Fd2Q5g1vmTnym6"]} -{"Format": "IDEA0", "ID": "2b35bc53-1b10-471e-bab0-87a0548af6cf", "DetectTime": "2023-10-30T14:10:54.014158+02:00", "EventTime": "2023-10-30T14:10:54.014171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cv2By43bl0vjopAQ5h"]} -{"Format": "IDEA0", "ID": "85c192bb-cf07-4278-bb69-177d32aa0cce", "DetectTime": "2023-10-30T14:10:54.040802+02:00", "EventTime": "2023-10-30T14:10:54.040818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CwtAqi4muVh0Ct6Rx5"]} -{"Format": "IDEA0", "ID": "ffb483f6-1e10-4c43-b8bd-eb276e47d59e", "DetectTime": "2023-10-30T14:10:54.074489+02:00", "EventTime": "2023-10-30T14:10:54.074502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["C8DwmK1FCATqa3jEzi"]} -{"Format": "IDEA0", "ID": "b16f373c-4349-4d35-ac17-7488273ce1b9", "DetectTime": "2023-10-30T14:10:54.105443+02:00", "EventTime": "2023-10-30T14:10:54.105459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CZsVrQdWRm4XqrDYj"]} -{"Format": "IDEA0", "ID": "331e5c87-2348-4cd3-9907-ac34f4623a66", "DetectTime": "2023-10-30T14:10:54.132149+02:00", "EventTime": "2023-10-30T14:10:54.132162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CoFugVbqRxnd2ks38"]} -{"Format": "IDEA0", "ID": "0687e1b2-fd64-4d05-8d01-c648af9314d2", "DetectTime": "2023-10-30T14:10:54.167674+02:00", "EventTime": "2023-10-30T14:10:54.167692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CwoNzQ3EpcHrRTBOKb"]} -{"Format": "IDEA0", "ID": "cc7b4892-b60b-4408-a742-57ca126fdc1e", "DetectTime": "2023-10-30T14:10:54.197250+02:00", "EventTime": "2023-10-30T14:10:54.197263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cm9HaJ1qNOf17ZWz7k"]} -{"Format": "IDEA0", "ID": "e149a752-ed7a-4965-9a1f-9ec37657860d", "DetectTime": "2023-10-30T14:10:54.227429+02:00", "EventTime": "2023-10-30T14:10:54.227444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CNsDrlUj0pL1kcxJ7"]} -{"Format": "IDEA0", "ID": "c2b6949b-1f98-45cb-8ece-c6c89f1fd827", "DetectTime": "2023-10-30T14:10:54.257465+02:00", "EventTime": "2023-10-30T14:10:54.257477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CKDLc91viCFo6oioOl"]} -{"Format": "Json", "ID": "c2b6949b-1f98-45cb-8ece-c6c89f1fd827", "DetectTime": "2023-10-30T14:10:54.257465+02:00", "EventTime": "2023-10-30T14:10:54.257477+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:46:38.858386+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:54.319784)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "06708c8e-11bb-4f0b-87b4-c1343777ccad", "DetectTime": "2023-10-30T14:10:54.323681+02:00", "EventTime": "2023-10-30T14:10:54.323692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C9dljVJ1SiNkgGNCc"]} -{"Format": "IDEA0", "ID": "70ad0119-15bf-456b-baa5-ade5831bc3cd", "DetectTime": "2023-10-30T14:10:54.355604+02:00", "EventTime": "2023-10-30T14:10:54.355621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CHsTAv2UeJjCkrZaLb"]} -{"Format": "IDEA0", "ID": "1248d6f7-e581-4162-a493-b509e66959a4", "DetectTime": "2023-10-30T14:10:54.385049+02:00", "EventTime": "2023-10-30T14:10:54.385062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cu0slOZOhL20oE1g9"]} -{"Format": "IDEA0", "ID": "27581312-5493-41d6-8946-af81e65e9d2c", "DetectTime": "2023-10-30T14:10:54.410433+02:00", "EventTime": "2023-10-30T14:10:54.410445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C6dAbi29DSvG3LoMLl"]} -{"Format": "IDEA0", "ID": "bf66efa8-90ae-40f4-971b-ca1510e5f68c", "DetectTime": "2023-10-30T14:10:54.439453+02:00", "EventTime": "2023-10-30T14:10:54.439471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CQQTj33COkSgbnCk6d"]} -{"Format": "IDEA0", "ID": "9ca19bc0-818f-4683-94f8-49add98e036a", "DetectTime": "2023-10-30T14:10:54.465514+02:00", "EventTime": "2023-10-30T14:10:54.465530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C683LJmTywPckFMAd"]} -{"Format": "IDEA0", "ID": "9129285b-e956-47e2-95f9-0a76134f7c61", "DetectTime": "2023-10-30T14:10:54.491286+02:00", "EventTime": "2023-10-30T14:10:54.491303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CZnMoj4O6xYDDY91ij"]} -{"Format": "IDEA0", "ID": "85ef2134-c401-44a6-9b43-a39856eed704", "DetectTime": "2023-10-30T14:10:54.517409+02:00", "EventTime": "2023-10-30T14:10:54.517419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CStaPL1nUDNrMu0kOd"]} -{"Format": "IDEA0", "ID": "1d32f19a-16a3-43ee-8b1b-66da7400296f", "DetectTime": "2023-10-30T14:10:54.541800+02:00", "EventTime": "2023-10-30T14:10:54.541814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CwdeBu3uaVP4PnudMd"]} -{"Format": "IDEA0", "ID": "49fe51a9-53fc-4e58-b985-3638ee86b7a7", "DetectTime": "2023-10-30T14:10:54.569439+02:00", "EventTime": "2023-10-30T14:10:54.569451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cou5NX2KX9RYFKzQj2"]} -{"Format": "IDEA0", "ID": "e692bc4e-3d3e-4686-af9c-7bab98ccdd68", "DetectTime": "2023-10-30T14:10:54.593821+02:00", "EventTime": "2023-10-30T14:10:54.593832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CggmHsES2BDfIs6td"]} -{"Format": "IDEA0", "ID": "47aedc65-9bba-4398-9c30-c95dc215315e", "DetectTime": "2023-10-30T14:10:54.620042+02:00", "EventTime": "2023-10-30T14:10:54.620059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CWlI4g1G4DTRg6k9C6"]} -{"Format": "IDEA0", "ID": "7736c93a-6c51-463d-9e2a-11f40b6a5a75", "DetectTime": "2023-10-30T14:10:54.646883+02:00", "EventTime": "2023-10-30T14:10:54.646901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CAqiSi2YO7oqK76gUe"]} -{"Format": "Json", "ID": "7736c93a-6c51-463d-9e2a-11f40b6a5a75", "DetectTime": "2023-10-30T14:10:54.646883+02:00", "EventTime": "2023-10-30T14:10:54.646901+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:46:56.006563+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:54.710693)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2bb96e60-3f9e-4838-996b-ae0ec536e40c", "DetectTime": "2023-10-30T14:10:54.714678+02:00", "EventTime": "2023-10-30T14:10:54.714693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C8osy82Nz3TwwOcrnb"]} -{"Format": "IDEA0", "ID": "9db165c1-7c19-4252-8e53-d2728f853449", "DetectTime": "2023-10-30T14:10:54.741567+02:00", "EventTime": "2023-10-30T14:10:54.741577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CBiChdnX33qFaGZuh"]} -{"Format": "IDEA0", "ID": "87cb8c91-317e-46eb-b04e-565788883871", "DetectTime": "2023-10-30T14:10:54.771532+02:00", "EventTime": "2023-10-30T14:10:54.771548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cti5BG1rRSNxfpmDG"]} -{"Format": "IDEA0", "ID": "ced0975e-fbfa-4158-bd5d-b548244390c0", "DetectTime": "2023-10-30T14:10:54.800531+02:00", "EventTime": "2023-10-30T14:10:54.800548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Ck6M3v3c8DYYhDxOT8"]} -{"Format": "IDEA0", "ID": "a2850a46-f659-4fb8-b525-71747cb0e0f7", "DetectTime": "2023-10-30T14:10:54.832039+02:00", "EventTime": "2023-10-30T14:10:54.832060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CZqkre4XWZN7TmXqNh"]} -{"Format": "IDEA0", "ID": "120b10ff-2802-47c6-9614-4a5e18160cd5", "DetectTime": "2023-10-30T14:10:54.866221+02:00", "EventTime": "2023-10-30T14:10:54.866241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CmXrWkAsmFj4dPZed"]} -{"Format": "IDEA0", "ID": "ca296c26-e9e6-4646-9dba-e8a019a68529", "DetectTime": "2023-10-30T14:10:54.895980+02:00", "EventTime": "2023-10-30T14:10:54.895998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CuenY24TQ4r66odlg6"]} -{"Format": "IDEA0", "ID": "f7bb4541-2a97-49d2-a6c8-225f787c6b8b", "DetectTime": "2023-10-30T14:10:54.921128+02:00", "EventTime": "2023-10-30T14:10:54.921139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CN01hE47pFqMEUjcVg"]} -{"Format": "IDEA0", "ID": "9f1c1920-f39d-4a1a-8687-be1bbf835e4a", "DetectTime": "2023-10-30T14:10:54.950462+02:00", "EventTime": "2023-10-30T14:10:54.950488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CcSYL3221eSy7Djjxb"]} -{"Format": "IDEA0", "ID": "556bddec-5f4f-44bb-b186-9371d93ce622", "DetectTime": "2023-10-30T14:10:54.975810+02:00", "EventTime": "2023-10-30T14:10:54.975821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["C9Z5Ei1OpZGHxn3Hbg"]} -{"Format": "Json", "ID": "556bddec-5f4f-44bb-b186-9371d93ce622", "DetectTime": "2023-10-30T14:10:54.975810+02:00", "EventTime": "2023-10-30T14:10:54.975821+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:46:58.142833+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:55.032301)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a9a825c3-0745-416d-879b-e78c354f5b3e", "DetectTime": "2023-10-30T14:10:55.036942+02:00", "EventTime": "2023-10-30T14:10:55.036953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CzFJ7K3CQYMim188Rl"]} -{"Format": "IDEA0", "ID": "92f99850-f8e5-4248-a3d8-b339a4cd28ef", "DetectTime": "2023-10-30T14:10:55.059473+02:00", "EventTime": "2023-10-30T14:10:55.059489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["Ct2mFA48tlzQHNN2s6"]} -{"Format": "IDEA0", "ID": "6211070f-af30-438c-be25-e25ecb062733", "DetectTime": "2023-10-30T14:10:55.080055+02:00", "EventTime": "2023-10-30T14:10:55.080067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CPgE77j6p4KGnRMRa"]} -{"Format": "IDEA0", "ID": "cda4fae9-45d8-4c04-888a-b0cb51fd4f8a", "DetectTime": "2023-10-30T14:10:55.102137+02:00", "EventTime": "2023-10-30T14:10:55.102161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CdhD5910M6r6LoMIec"]} -{"Format": "IDEA0", "ID": "8e0e36bf-14d7-4312-a733-87b123080f7e", "DetectTime": "2023-10-30T14:10:55.131333+02:00", "EventTime": "2023-10-30T14:10:55.131345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CRUCH22j4BNwxglCE7"]} -{"Format": "IDEA0", "ID": "a9ce6b81-4b2f-4fcb-ac52-88f7b6980367", "DetectTime": "2023-10-30T14:10:55.153198+02:00", "EventTime": "2023-10-30T14:10:55.153211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CnscaU3GdqCpW1Q5z4"]} -{"Format": "IDEA0", "ID": "d2385355-0868-436f-a39c-10396146c5c7", "DetectTime": "2023-10-30T14:10:55.178927+02:00", "EventTime": "2023-10-30T14:10:55.178944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CDtMS836sfJGDMO195"]} -{"Format": "IDEA0", "ID": "66c67d59-d3d8-4241-88e8-7704fdbc3a23", "DetectTime": "2023-10-30T14:10:55.204510+02:00", "EventTime": "2023-10-30T14:10:55.204525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CKe5wi1e1wX4fAryU2"]} -{"Format": "IDEA0", "ID": "acfab90b-efdf-4b4e-ac5e-80821d4d5c4c", "DetectTime": "2023-10-30T14:10:55.230859+02:00", "EventTime": "2023-10-30T14:10:55.230876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CNPm9g3epW8KlvIqz8"]} -{"Format": "Json", "ID": "acfab90b-efdf-4b4e-ac5e-80821d4d5c4c", "DetectTime": "2023-10-30T14:10:55.230859+02:00", "EventTime": "2023-10-30T14:10:55.230876+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:46:59.729110+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:55.295231)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb9a0214-a2a5-407d-a99b-e0553816d4f8", "DetectTime": "2023-10-30T14:10:55.299553+02:00", "EventTime": "2023-10-30T14:10:55.299572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CLZNeOoXPe4eOTrth"]} -{"Format": "IDEA0", "ID": "c303bb1a-72c3-41fc-b47c-2f565efe9e78", "DetectTime": "2023-10-30T14:10:55.323081+02:00", "EventTime": "2023-10-30T14:10:55.323092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CebNEk2ZpSfNIf6yY5"]} -{"Format": "IDEA0", "ID": "2959fd32-9b5e-479b-bfc9-70fdf15e0c94", "DetectTime": "2023-10-30T14:10:55.353110+02:00", "EventTime": "2023-10-30T14:10:55.353122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C6Q8AtiSa4GZPWCj6"]} -{"Format": "IDEA0", "ID": "41b27e38-308e-413d-80a1-09f135cedb59", "DetectTime": "2023-10-30T14:10:55.375689+02:00", "EventTime": "2023-10-30T14:10:55.375701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CgjWdy3Jw7I5VXKG9i"]} -{"Format": "IDEA0", "ID": "9d2bf363-8853-4411-a99c-e7d04439a2bc", "DetectTime": "2023-10-30T14:10:55.396299+02:00", "EventTime": "2023-10-30T14:10:55.396316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CWbJeW3Xhaw69z8c5a"]} -{"Format": "IDEA0", "ID": "61a379a1-8c54-4804-9f6c-c07455787993", "DetectTime": "2023-10-30T14:10:55.416704+02:00", "EventTime": "2023-10-30T14:10:55.416716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CEkdjF1ndtuZzjvHSg"]} -{"Format": "IDEA0", "ID": "bf9aff4f-4386-48ee-91e9-a6f9ab17f10f", "DetectTime": "2023-10-30T14:10:55.438977+02:00", "EventTime": "2023-10-30T14:10:55.438993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CxMooc4IQ8mUiLrmP9"]} -{"Format": "IDEA0", "ID": "78b56701-9612-41d9-9baf-03446352efc9", "DetectTime": "2023-10-30T14:10:55.472087+02:00", "EventTime": "2023-10-30T14:10:55.472102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cnwbwq1fyaipnn0we2"]} -{"Format": "IDEA0", "ID": "a53825b2-1657-4721-91eb-815c0e185bf2", "DetectTime": "2023-10-30T14:10:55.494982+02:00", "EventTime": "2023-10-30T14:10:55.494998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0LnBb25sUqTlAxk51"]} -{"Format": "IDEA0", "ID": "2d434e63-2433-4306-9666-10b72de2631d", "DetectTime": "2023-10-30T14:10:55.517183+02:00", "EventTime": "2023-10-30T14:10:55.517194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CkDLHR1QXi46G9eIsl"]} -{"Format": "Json", "ID": "2d434e63-2433-4306-9666-10b72de2631d", "DetectTime": "2023-10-30T14:10:55.517183+02:00", "EventTime": "2023-10-30T14:10:55.517194+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T12:47:02.288427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2023/10/30 14:10:55.575924)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2eae0a56-3f99-4c4b-be8b-9e410d831c60", "DetectTime": "2023-10-30T14:10:55.580175+02:00", "EventTime": "2023-10-30T14:10:55.580185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CxTvKG2qUhOTngVRt3"]} -{"Format": "IDEA0", "ID": "a6de0856-6b9a-4672-aa20-60e9f4ffe4af", "DetectTime": "2023-10-30T14:10:55.604447+02:00", "EventTime": "2023-10-30T14:10:55.604460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CFnwQo3o751f0ODqO5"]} -{"Format": "IDEA0", "ID": "4a2783cd-6f35-43ce-a490-c942aecd7d0e", "DetectTime": "2023-10-30T14:10:55.623066+02:00", "EventTime": "2023-10-30T14:10:55.623078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CZEK6F3v4sGpmt5KIh"]} -{"Format": "IDEA0", "ID": "4d8f9735-e30c-4923-88d6-0bd8991ea35a", "DetectTime": "2023-10-30T14:10:55.651832+02:00", "EventTime": "2023-10-30T14:10:55.651849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaguTE1qkQ0xDDY0Hl"]} -{"Format": "IDEA0", "ID": "0d9e43ce-9d0b-4d26-81c7-92b4205bceed", "DetectTime": "2023-10-30T14:10:55.671062+02:00", "EventTime": "2023-10-30T14:10:55.671075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CARgR1W3sJg4Zv7Oa"]} -{"Format": "IDEA0", "ID": "712b8399-65b5-4aac-8b66-3cc62e11d5a0", "DetectTime": "2023-10-30T14:10:55.698371+02:00", "EventTime": "2023-10-30T14:10:55.698385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CzkV6K1B6WOW56jKj"]} -{"Format": "IDEA0", "ID": "5164d381-7528-4a26-bdec-5022fbf52a46", "DetectTime": "2023-10-30T14:10:55.730561+02:00", "EventTime": "2023-10-30T14:10:55.730572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CmccIps47oOD7dvbj"]} -{"Format": "IDEA0", "ID": "2a65c13f-2831-487e-847e-44ddc2397782", "DetectTime": "2023-10-30T14:10:55.766462+02:00", "EventTime": "2023-10-30T14:10:55.766476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CwJbli1mRtmVHSYxVi"]} -{"Format": "IDEA0", "ID": "92bb8299-6f23-4ede-ae29-bbe5c5ecbec6", "DetectTime": "2023-10-30T14:10:55.798269+02:00", "EventTime": "2023-10-30T14:10:55.798286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["C3ScIc4UjCOJZFQ8X1"]} -{"Format": "IDEA0", "ID": "4e5fa101-4fe9-43c1-b08f-86925a7c1a5d", "DetectTime": "2023-10-30T14:10:55.831265+02:00", "EventTime": "2023-10-30T14:10:55.831276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CXuDqS3C2aopHcmDHd"]} -{"Format": "IDEA0", "ID": "e267abc4-7204-419a-bca5-b311c3dcc7d5", "DetectTime": "2023-10-30T14:10:55.858277+02:00", "EventTime": "2023-10-30T14:10:55.858288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Cct4XQHSuqSV0ArAg"]} -{"Format": "IDEA0", "ID": "84bccfe7-e796-418d-a672-e01e2b60e030", "DetectTime": "2023-10-30T14:10:55.895155+02:00", "EventTime": "2023-10-30T14:10:55.895171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CEeZqG1fJTQbTwXI8c"]} -{"Format": "IDEA0", "ID": "4a3c753d-87c7-493b-a99c-f22d8c2db469", "DetectTime": "2023-10-30T14:10:55.934200+02:00", "EventTime": "2023-10-30T14:10:55.934212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CKHvFn8PqG54KJNac"]} -{"Format": "IDEA0", "ID": "280f069e-1fa3-4967-9c25-797296adf5bf", "DetectTime": "2023-10-30T14:10:56.018822+02:00", "EventTime": "2023-10-30T14:10:56.018843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C2zajdWD3yonPV7wd"]} -{"Format": "Json", "ID": "280f069e-1fa3-4967-9c25-797296adf5bf", "DetectTime": "2023-10-30T14:10:56.018822+02:00", "EventTime": "2023-10-30T14:10:56.018843+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:17:52.628122+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:56.187327)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f3a7324a-c06f-4c55-bf45-a6cf24b83ef9", "DetectTime": "2023-10-30T14:10:56.200044+02:00", "EventTime": "2023-10-30T14:10:56.200077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C08Gp62lYThLWEMPxj"]} -{"Format": "IDEA0", "ID": "a75bda39-79e1-49df-b0f9-3310e9a4cb4a", "DetectTime": "2023-10-30T14:10:56.259606+02:00", "EventTime": "2023-10-30T14:10:56.259624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CdZKbP34slLjKrsNC4"]} -{"Format": "IDEA0", "ID": "0cb5253a-b931-4d81-9f5f-e009f1425aa7", "DetectTime": "2023-10-30T14:10:56.320005+02:00", "EventTime": "2023-10-30T14:10:56.320018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CQBfFi4kJ5eWeUvfR3"]} -{"Format": "IDEA0", "ID": "0f8803e8-e3e4-4ae5-8006-142039faecc6", "DetectTime": "2023-10-30T14:10:56.361622+02:00", "EventTime": "2023-10-30T14:10:56.361636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CdM5lW3uOpZMQzJZj4"]} -{"Format": "IDEA0", "ID": "a88a3b86-9d90-4eb8-8727-a26111404634", "DetectTime": "2023-10-30T14:10:56.397730+02:00", "EventTime": "2023-10-30T14:10:56.397743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CiZzM54MT4MCX8hrEh"]} -{"Format": "IDEA0", "ID": "3fa1126a-64e2-40fc-be1d-710373dcca12", "DetectTime": "2023-10-30T14:10:56.425442+02:00", "EventTime": "2023-10-30T14:10:56.425453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C3muN42FtMbtND212h"]} -{"Format": "IDEA0", "ID": "1072a8ee-55ae-4c14-9eed-13605376d894", "DetectTime": "2023-10-30T14:10:56.467317+02:00", "EventTime": "2023-10-30T14:10:56.467333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C8VZvF3Mlwh0UEzWmj"]} -{"Format": "IDEA0", "ID": "e4bf6f7e-cde5-4c3e-bf6e-89a51e4c35af", "DetectTime": "2023-10-30T14:10:56.507697+02:00", "EventTime": "2023-10-30T14:10:56.507708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CqOeDo3ylgewuh4Cd9"]} -{"Format": "IDEA0", "ID": "19fcf383-aa01-4d14-a404-e23b9191c972", "DetectTime": "2023-10-30T14:10:56.542609+02:00", "EventTime": "2023-10-30T14:10:56.542620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CKUxHw1JrTQlYSV4B"]} -{"Format": "Json", "ID": "19fcf383-aa01-4d14-a404-e23b9191c972", "DetectTime": "2023-10-30T14:10:56.542609+02:00", "EventTime": "2023-10-30T14:10:56.542620+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:17:55.005807+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:56.613077)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "51362a4a-8e89-4ca6-b597-3126baf29ef6", "DetectTime": "2023-10-30T14:10:56.617661+02:00", "EventTime": "2023-10-30T14:10:56.617672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CdemBgg7cVg0WVrub"]} -{"Format": "IDEA0", "ID": "a31910ae-4d00-4e6c-abd9-2f42e05bec24", "DetectTime": "2023-10-30T14:10:56.654499+02:00", "EventTime": "2023-10-30T14:10:56.654510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CJ6fXN2BbkSuBvx717"]} -{"Format": "IDEA0", "ID": "a844ffc3-d618-4e0e-9536-47232407ed46", "DetectTime": "2023-10-30T14:10:56.687649+02:00", "EventTime": "2023-10-30T14:10:56.687660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cuk6mw1ZOJAJ2fuO95"]} -{"Format": "IDEA0", "ID": "ca0e6809-9fd3-4c4f-8549-f05aecd6668d", "DetectTime": "2023-10-30T14:10:56.720556+02:00", "EventTime": "2023-10-30T14:10:56.720572+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CaWPQo4Imf4UJF7p7f"]} -{"Format": "IDEA0", "ID": "1a01712a-1d3b-4eea-90d0-0f1221a84872", "DetectTime": "2023-10-30T14:10:56.742131+02:00", "EventTime": "2023-10-30T14:10:56.742149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CeIone4ayHqTZ2Wr41"]} -{"Format": "IDEA0", "ID": "c6cf9b25-cae0-4de8-92e0-d251f8240bc2", "DetectTime": "2023-10-30T14:10:56.778141+02:00", "EventTime": "2023-10-30T14:10:56.778156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C3E9Pa21IinS36pCze"]} -{"Format": "IDEA0", "ID": "469c1d2d-54cd-4b92-9980-50aa7e32763b", "DetectTime": "2023-10-30T14:10:56.809861+02:00", "EventTime": "2023-10-30T14:10:56.809871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CBgqNE4OrdkV6h5v1j"]} -{"Format": "IDEA0", "ID": "ee90fa52-e8ac-4551-aa5f-b0807e822d22", "DetectTime": "2023-10-30T14:10:56.843460+02:00", "EventTime": "2023-10-30T14:10:56.843476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CQzNb917i1u8nPJd6j"]} -{"Format": "IDEA0", "ID": "232ac063-67d8-4f6e-a6ce-47f343bc2e01", "DetectTime": "2023-10-30T14:10:56.878049+02:00", "EventTime": "2023-10-30T14:10:56.878065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cc6p1R2myCWWEwSeK9"]} -{"Format": "IDEA0", "ID": "3fb27e6d-c5da-487e-913e-33c3f15c29c8", "DetectTime": "2023-10-30T14:10:56.914542+02:00", "EventTime": "2023-10-30T14:10:56.914552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CyOFCNvYLUWghQsAf"]} -{"Format": "Json", "ID": "3fb27e6d-c5da-487e-913e-33c3f15c29c8", "DetectTime": "2023-10-30T14:10:56.914542+02:00", "EventTime": "2023-10-30T14:10:56.914552+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:17:57.576300+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:56.989695)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45f21d4a-8aaa-4892-81f0-bb8d2a7514af", "DetectTime": "2023-10-30T14:10:56.994636+02:00", "EventTime": "2023-10-30T14:10:56.994648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CHkfey3WPWJ1VNGHW4"]} -{"Format": "IDEA0", "ID": "1c3d66e0-68fc-4565-a4d4-b396aff34f44", "DetectTime": "2023-10-30T14:10:57.031716+02:00", "EventTime": "2023-10-30T14:10:57.031727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CwxzoAPhBFvmfUcdk"]} -{"Format": "IDEA0", "ID": "445822b2-4e04-4453-8edb-07ab6e9301c0", "DetectTime": "2023-10-30T14:10:57.070237+02:00", "EventTime": "2023-10-30T14:10:57.070256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CL7KhXqxqXGCNLO21"]} -{"Format": "IDEA0", "ID": "c9277ec5-1b4a-40bd-919a-2a180846b945", "DetectTime": "2023-10-30T14:10:57.107931+02:00", "EventTime": "2023-10-30T14:10:57.107943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CKpvR22zcJpDkQFaWa"]} -{"Format": "IDEA0", "ID": "f44f8b00-e885-47d0-b335-19126f0c37c4", "DetectTime": "2023-10-30T14:10:57.148184+02:00", "EventTime": "2023-10-30T14:10:57.148200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C5GYZq1qCJyRO3YUM8"]} -{"Format": "IDEA0", "ID": "27fd3c44-b985-4417-8ebb-1deb9ddee911", "DetectTime": "2023-10-30T14:10:57.185333+02:00", "EventTime": "2023-10-30T14:10:57.185348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cxhl2j1I8y4mSUgY33"]} -{"Format": "IDEA0", "ID": "d478dc08-333e-471d-b5e1-c5a929cedd7e", "DetectTime": "2023-10-30T14:10:57.223013+02:00", "EventTime": "2023-10-30T14:10:57.223031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CHfi1k4gdIzyl7bex8"]} -{"Format": "IDEA0", "ID": "6010ab3c-2a52-42c7-bd59-830bc3feb222", "DetectTime": "2023-10-30T14:10:57.256596+02:00", "EventTime": "2023-10-30T14:10:57.256607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CQEJR7DNoW103JQ0g"]} -{"Format": "Json", "ID": "6010ab3c-2a52-42c7-bd59-830bc3feb222", "DetectTime": "2023-10-30T14:10:57.256596+02:00", "EventTime": "2023-10-30T14:10:57.256607+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:17:58.939590+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:57.336897)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "854cf431-89dc-40e8-9825-a7b5ec3c4b8a", "DetectTime": "2023-10-30T14:10:57.342417+02:00", "EventTime": "2023-10-30T14:10:57.342431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuQaYd4kKzBzK8eZj6"]} -{"Format": "IDEA0", "ID": "185c2fb7-3456-42fd-b1bf-9de939363821", "DetectTime": "2023-10-30T14:10:57.374222+02:00", "EventTime": "2023-10-30T14:10:57.374237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CSM4dIW9eGWLaYsNe"]} -{"Format": "IDEA0", "ID": "68eb655b-bf93-4c82-bf83-9a5d047ffa7a", "DetectTime": "2023-10-30T14:10:57.406333+02:00", "EventTime": "2023-10-30T14:10:57.406347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C27bzZ1bQcYiZeRHx7"]} -{"Format": "IDEA0", "ID": "bd86e7e0-d914-4a89-a209-fe76d7be4818", "DetectTime": "2023-10-30T14:10:57.438868+02:00", "EventTime": "2023-10-30T14:10:57.438882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CTloU54U4z830WYH97"]} -{"Format": "IDEA0", "ID": "876cefe2-35ad-41d8-af8e-aad5ae5cb09b", "DetectTime": "2023-10-30T14:10:57.475128+02:00", "EventTime": "2023-10-30T14:10:57.475140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CULtksk6KULDuANq9"]} -{"Format": "IDEA0", "ID": "a379963a-9de0-4211-9325-839617040109", "DetectTime": "2023-10-30T14:10:57.510037+02:00", "EventTime": "2023-10-30T14:10:57.510049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CNC88K3x5fdp4AjA7"]} -{"Format": "IDEA0", "ID": "d4364258-8929-4b12-8a72-be446a4688f1", "DetectTime": "2023-10-30T14:10:57.542107+02:00", "EventTime": "2023-10-30T14:10:57.542126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cs1vHltUya5K78df5"]} -{"Format": "IDEA0", "ID": "16612f6f-9e6e-4079-bd82-a3e1549703c7", "DetectTime": "2023-10-30T14:10:57.575537+02:00", "EventTime": "2023-10-30T14:10:57.575556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["ClCfHC23Dzt6yf7oUj"]} -{"Format": "IDEA0", "ID": "49016791-8060-4405-9d0a-42018326367f", "DetectTime": "2023-10-30T14:10:57.608664+02:00", "EventTime": "2023-10-30T14:10:57.608737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CXVRPl4TEGh2L3CQKb"]} -{"Format": "Json", "ID": "49016791-8060-4405-9d0a-42018326367f", "DetectTime": "2023-10-30T14:10:57.608664+02:00", "EventTime": "2023-10-30T14:10:57.608737+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:18:01.261152+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:57.685967)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6f6696f8-f769-429f-bfd5-5d44cbf5ec3e", "DetectTime": "2023-10-30T14:10:57.690799+02:00", "EventTime": "2023-10-30T14:10:57.690815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ckx6hW2YTNv61yz603"]} -{"Format": "IDEA0", "ID": "59d225f5-0f04-4c70-b58f-d462ca550b44", "DetectTime": "2023-10-30T14:10:57.723256+02:00", "EventTime": "2023-10-30T14:10:57.723268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CrVTaS2FXXwLEDEYq1"]} -{"Format": "IDEA0", "ID": "24dee84b-cfbb-4c3f-8224-df208d2aadb2", "DetectTime": "2023-10-30T14:10:57.756147+02:00", "EventTime": "2023-10-30T14:10:57.756163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CZr1nV3bEBsPmi93D5"]} -{"Format": "IDEA0", "ID": "9fa8e355-3dd0-4e32-9ebb-a67904d3328a", "DetectTime": "2023-10-30T14:10:57.785701+02:00", "EventTime": "2023-10-30T14:10:57.785717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CsAfwG3vOziBLPFNwl"]} -{"Format": "IDEA0", "ID": "d2f9948b-a679-4573-96e2-bc7e6dc3df5b", "DetectTime": "2023-10-30T14:10:57.817475+02:00", "EventTime": "2023-10-30T14:10:57.817493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMzwDX2xi5qLXazgC7"]} -{"Format": "IDEA0", "ID": "42d672c0-e0a6-4101-9924-e0041d352d1b", "DetectTime": "2023-10-30T14:10:57.849779+02:00", "EventTime": "2023-10-30T14:10:57.849792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CkPbBY3IgT0z96r4Uf"]} -{"Format": "IDEA0", "ID": "44e6b1e8-94b9-4cf9-9af3-67f6140125f4", "DetectTime": "2023-10-30T14:10:57.880391+02:00", "EventTime": "2023-10-30T14:10:57.880406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CA1njv3Adr0ndppRPk"]} -{"Format": "IDEA0", "ID": "75ccb538-dc17-423c-afc3-89b61cc7a9c6", "DetectTime": "2023-10-30T14:10:57.912692+02:00", "EventTime": "2023-10-30T14:10:57.912705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["ClAddZ3FPnjsSHxIq7"]} -{"Format": "IDEA0", "ID": "18a43b9c-2b80-457e-ab11-a16c00136cff", "DetectTime": "2023-10-30T14:10:57.944296+02:00", "EventTime": "2023-10-30T14:10:57.944314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CwUEGchBXKHCy35Ne"]} -{"Format": "IDEA0", "ID": "80e61222-230e-42bb-818c-37bb98af43d5", "DetectTime": "2023-10-30T14:10:57.975772+02:00", "EventTime": "2023-10-30T14:10:57.975783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CevO8Q39vt7jKM2Iq"]} -{"Format": "Json", "ID": "80e61222-230e-42bb-818c-37bb98af43d5", "DetectTime": "2023-10-30T14:10:57.975772+02:00", "EventTime": "2023-10-30T14:10:57.975783+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:48:17.442657+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:58.040478)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f0fdd28f-06cf-41eb-80fa-d7ba0c021c30", "DetectTime": "2023-10-30T14:10:58.044616+02:00", "EventTime": "2023-10-30T14:10:58.044633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cj3VmqY92x4dWZhQk"]} -{"Format": "IDEA0", "ID": "701aed45-5c79-4ab5-b123-82941ffab16f", "DetectTime": "2023-10-30T14:10:58.075608+02:00", "EventTime": "2023-10-30T14:10:58.075620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CkOzwdJA4CGBkauKg"]} -{"Format": "IDEA0", "ID": "e636b4ec-51cf-4a59-bb8b-b5a02d8c2f38", "DetectTime": "2023-10-30T14:10:58.104088+02:00", "EventTime": "2023-10-30T14:10:58.104105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CnqHd6148DGvzyWsig"]} -{"Format": "IDEA0", "ID": "caddb759-ca83-4c11-9349-d5cffc8d67c6", "DetectTime": "2023-10-30T14:10:58.134140+02:00", "EventTime": "2023-10-30T14:10:58.134157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CVrhIm4VbNEYAOeTee"]} -{"Format": "IDEA0", "ID": "e8699558-406b-4fe5-9ec9-d3377eee426f", "DetectTime": "2023-10-30T14:10:58.161200+02:00", "EventTime": "2023-10-30T14:10:58.161215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CSP7Sp3FDZVdEN3bXa"]} -{"Format": "IDEA0", "ID": "be21460b-829c-4b26-bf55-f9f689dd46d1", "DetectTime": "2023-10-30T14:10:58.191414+02:00", "EventTime": "2023-10-30T14:10:58.191429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CjeCJeD9Oztp8yZp2"]} -{"Format": "IDEA0", "ID": "9da086b2-4d47-4690-b6ea-ddd775252d94", "DetectTime": "2023-10-30T14:10:58.221581+02:00", "EventTime": "2023-10-30T14:10:58.221598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CccX1V1uKvgm4BKIb3"]} -{"Format": "IDEA0", "ID": "e045f717-b258-4d9d-8370-66d5de03ae60", "DetectTime": "2023-10-30T14:10:58.251731+02:00", "EventTime": "2023-10-30T14:10:58.251748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CejZM93VdfDHSUfy0e"]} -{"Format": "IDEA0", "ID": "2ebb92a7-8ee0-4bbe-b348-c3a6d7505b8c", "DetectTime": "2023-10-30T14:10:58.285357+02:00", "EventTime": "2023-10-30T14:10:58.285373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cz5FEG2nG1ulonOcNg"]} -{"Format": "IDEA0", "ID": "3f10c5ee-a0ff-4bb7-a01d-1884fd2df1b5", "DetectTime": "2023-10-30T14:10:58.317473+02:00", "EventTime": "2023-10-30T14:10:58.317485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CcoVP14lRDLY0idpu2"]} -{"Format": "Json", "ID": "3f10c5ee-a0ff-4bb7-a01d-1884fd2df1b5", "DetectTime": "2023-10-30T14:10:58.317473+02:00", "EventTime": "2023-10-30T14:10:58.317485+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:48:19.206231+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:58.384624)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ece6bec6-b31e-4020-8f22-31fd16d6a472", "DetectTime": "2023-10-30T14:10:58.389640+02:00", "EventTime": "2023-10-30T14:10:58.389656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C7QzZ11O385YCUqWa8"]} -{"Format": "IDEA0", "ID": "4bb7e85a-db0a-4660-b71f-80efb49793ac", "DetectTime": "2023-10-30T14:10:58.418183+02:00", "EventTime": "2023-10-30T14:10:58.418195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C0yzWLthpXx8X0fZj"]} -{"Format": "IDEA0", "ID": "d1f06f9f-a027-43c4-9106-11764bbef663", "DetectTime": "2023-10-30T14:10:58.443821+02:00", "EventTime": "2023-10-30T14:10:58.443837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CMiLy82b30CoH3IlK9"]} -{"Format": "IDEA0", "ID": "c9c78313-b697-4e61-be8a-5b9795e86a3f", "DetectTime": "2023-10-30T14:10:58.480041+02:00", "EventTime": "2023-10-30T14:10:58.480057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CvljhL2G696taC19R6"]} -{"Format": "IDEA0", "ID": "9519401e-b1c2-470f-b63d-eb186a252415", "DetectTime": "2023-10-30T14:10:58.509364+02:00", "EventTime": "2023-10-30T14:10:58.509381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C9z7SBSf3tlyvF1qk"]} -{"Format": "IDEA0", "ID": "393bcdee-1670-4a27-8c58-d782e435b6ce", "DetectTime": "2023-10-30T14:10:58.535536+02:00", "EventTime": "2023-10-30T14:10:58.535558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CudJr64OP65Gpfed4"]} -{"Format": "IDEA0", "ID": "81d57e03-9d9a-4abc-bc8f-a0f70c1d3341", "DetectTime": "2023-10-30T14:10:58.561534+02:00", "EventTime": "2023-10-30T14:10:58.561548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CZ2eQm292NdFKIMdpi"]} -{"Format": "IDEA0", "ID": "e833a6a6-31fa-4820-9e81-7f95fcc8909b", "DetectTime": "2023-10-30T14:10:58.589753+02:00", "EventTime": "2023-10-30T14:10:58.589765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCtLdzh3gc4zqm5Ma"]} -{"Format": "IDEA0", "ID": "e2978a50-aec4-4b8b-a126-02a81a300dac", "DetectTime": "2023-10-30T14:10:58.616600+02:00", "EventTime": "2023-10-30T14:10:58.616617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CrOh253u17FytHlAXg"]} -{"Format": "Json", "ID": "e2978a50-aec4-4b8b-a126-02a81a300dac", "DetectTime": "2023-10-30T14:10:58.616600+02:00", "EventTime": "2023-10-30T14:10:58.616617+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:48:22.128465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:58.681996)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "213a2125-5211-4c46-8094-ca771043c270", "DetectTime": "2023-10-30T14:10:58.686870+02:00", "EventTime": "2023-10-30T14:10:58.686887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIAtTS28z9CKKPmj3k"]} -{"Format": "IDEA0", "ID": "c66918fc-181a-4dfd-ac8a-8e07364b6c8c", "DetectTime": "2023-10-30T14:10:58.712780+02:00", "EventTime": "2023-10-30T14:10:58.712792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C5j7Lb2gFTxqFJy7Ae"]} -{"Format": "IDEA0", "ID": "9851b2ba-40bd-40ae-aa79-c2bd0ce50af6", "DetectTime": "2023-10-30T14:10:58.745435+02:00", "EventTime": "2023-10-30T14:10:58.745457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cw9ulc4MZTEM8GhtA6"]} -{"Format": "IDEA0", "ID": "a035aa3c-3f69-4c54-9d57-65fdcc4bf4c3", "DetectTime": "2023-10-30T14:10:58.769464+02:00", "EventTime": "2023-10-30T14:10:58.769476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CtVTBt2WzMSg9NhLO7"]} -{"Format": "IDEA0", "ID": "4ee89fdc-7e27-4726-b963-5050e4f76705", "DetectTime": "2023-10-30T14:10:58.791715+02:00", "EventTime": "2023-10-30T14:10:58.791729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CwhglD1GtaL6PfFMj9"]} -{"Format": "IDEA0", "ID": "a0f4d131-a48e-4a1e-8139-7a10da19b151", "DetectTime": "2023-10-30T14:10:58.816546+02:00", "EventTime": "2023-10-30T14:10:58.816561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXXQva4NQtFvyC3W06"]} -{"Format": "IDEA0", "ID": "7769bc30-3b83-411f-9db4-6ad047ba7cde", "DetectTime": "2023-10-30T14:10:58.842711+02:00", "EventTime": "2023-10-30T14:10:58.842728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["CyObD02IYlf9rBFFra"]} -{"Format": "IDEA0", "ID": "1a8ac02a-9d91-469b-8f23-0b97f882e4f1", "DetectTime": "2023-10-30T14:10:58.868942+02:00", "EventTime": "2023-10-30T14:10:58.868959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C82lOt8Df8rcrNlti"]} -{"Format": "IDEA0", "ID": "db76e289-535b-46bf-8222-615e2eea9479", "DetectTime": "2023-10-30T14:10:58.895302+02:00", "EventTime": "2023-10-30T14:10:58.895319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CpefId2MpPPYguvDN7"]} -{"Format": "Json", "ID": "db76e289-535b-46bf-8222-615e2eea9479", "DetectTime": "2023-10-30T14:10:58.895302+02:00", "EventTime": "2023-10-30T14:10:58.895319+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:48:23.715999+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:58.965007)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b7c66033-395e-4015-a1fa-a33e27e4d32d", "DetectTime": "2023-10-30T14:10:58.971486+02:00", "EventTime": "2023-10-30T14:10:58.971502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CMvYsR1ZqrbMHznRcg"]} -{"Format": "IDEA0", "ID": "054d3f1e-2d9a-4603-9667-34197edcfcea", "DetectTime": "2023-10-30T14:10:59.008595+02:00", "EventTime": "2023-10-30T14:10:59.008612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZMaK32FMKK6t0Qm6i"]} -{"Format": "IDEA0", "ID": "5d914885-8296-4c99-a4f0-24f764b1ccfa", "DetectTime": "2023-10-30T14:10:59.034701+02:00", "EventTime": "2023-10-30T14:10:59.034724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cezb4j2Hr3EKQDSSW3"]} -{"Format": "IDEA0", "ID": "25943476-4e90-447e-8bd7-2d6b85cf2cb0", "DetectTime": "2023-10-30T14:10:59.062394+02:00", "EventTime": "2023-10-30T14:10:59.062406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CawwmrxqzIuKzkfV"]} -{"Format": "IDEA0", "ID": "1a0cb5d7-8a9d-4075-8aad-faebb394c444", "DetectTime": "2023-10-30T14:10:59.083927+02:00", "EventTime": "2023-10-30T14:10:59.083950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cajsbr2360dgRCta3e"]} -{"Format": "IDEA0", "ID": "9b6caa0c-25ce-4dff-a7a0-d3d2377f5c83", "DetectTime": "2023-10-30T14:10:59.106760+02:00", "EventTime": "2023-10-30T14:10:59.106776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CqXK8a3I51Ee4D2z01"]} -{"Format": "IDEA0", "ID": "5693ea53-458b-44b7-a342-726e6fbfc2c4", "DetectTime": "2023-10-30T14:10:59.131050+02:00", "EventTime": "2023-10-30T14:10:59.131077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Csqn2s1pxKWfugf6w"]} -{"Format": "IDEA0", "ID": "ee737f8d-2b73-4378-89da-1ee1d04b2dff", "DetectTime": "2023-10-30T14:10:59.153699+02:00", "EventTime": "2023-10-30T14:10:59.153710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJ6Mz83mGGp4Aroqp7"]} -{"Format": "IDEA0", "ID": "d424bc9a-434d-4630-bc61-fba9e4375cd4", "DetectTime": "2023-10-30T14:10:59.175377+02:00", "EventTime": "2023-10-30T14:10:59.175395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["CGKFoA2qNSg7K8Gz09"]} -{"Format": "Json", "ID": "d424bc9a-434d-4630-bc61-fba9e4375cd4", "DetectTime": "2023-10-30T14:10:59.175377+02:00", "EventTime": "2023-10-30T14:10:59.175395+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T13:48:25.560837+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2023/10/30 14:10:59.245365)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "83116c5d-05fe-415f-abc2-0d82f5601784", "DetectTime": "2023-10-30T14:10:59.250619+02:00", "EventTime": "2023-10-30T14:10:59.250629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CmjRL6mVbI3z96RXb"]} -{"Format": "IDEA0", "ID": "657b6d83-6227-49fd-a783-fdc4f77ed1e9", "DetectTime": "2023-10-30T14:10:59.288709+02:00", "EventTime": "2023-10-30T14:10:59.288724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CrPiFU11SMzDz6IOPa"]} -{"Format": "IDEA0", "ID": "5da937ff-daa2-44a6-98f1-4103f182cd81", "DetectTime": "2023-10-30T14:10:59.310267+02:00", "EventTime": "2023-10-30T14:10:59.310278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CwAGkz3ydP8caeuwXb"]} -{"Format": "IDEA0", "ID": "ff334fc1-5316-47eb-8cd2-9b2979f4434a", "DetectTime": "2023-10-30T14:10:59.331399+02:00", "EventTime": "2023-10-30T14:10:59.331414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFGcT41yQPQSIOba1c"]} -{"Format": "IDEA0", "ID": "faeba230-0039-4088-bc3d-e59305b1fbcd", "DetectTime": "2023-10-30T14:10:59.356285+02:00", "EventTime": "2023-10-30T14:10:59.356299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CUBlTv1wMu6sqvNQt5"]} -{"Format": "IDEA0", "ID": "a00c97be-c260-4829-bd21-caca51588ad1", "DetectTime": "2023-10-30T14:10:59.398245+02:00", "EventTime": "2023-10-30T14:10:59.398264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C9azXj2NgQhq6FaQb2"]} -{"Format": "IDEA0", "ID": "e9999a40-5703-41bf-9c47-7cdb43935d67", "DetectTime": "2023-10-30T14:10:59.438873+02:00", "EventTime": "2023-10-30T14:10:59.438884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CX5orh1n5AnpuhY8pb"]} -{"Format": "IDEA0", "ID": "f5b1269a-a64c-4a5d-a224-2dddcb8f886e", "DetectTime": "2023-10-30T14:10:59.485801+02:00", "EventTime": "2023-10-30T14:10:59.485818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Cdt2c21Sm0j7Gw2INd"]} -{"Format": "IDEA0", "ID": "7ec63ba2-af7a-4500-86c5-b38155dc50f6", "DetectTime": "2023-10-30T14:10:59.529358+02:00", "EventTime": "2023-10-30T14:10:59.529374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CShyf71ICRGjT93Vta"]} -{"Format": "IDEA0", "ID": "4dc316b4-ffeb-43d0-850d-e2416f03a396", "DetectTime": "2023-10-30T14:10:59.572924+02:00", "EventTime": "2023-10-30T14:10:59.572942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CO7JUs1RwB9v4Xjeqe"]} -{"Format": "IDEA0", "ID": "f4fe374e-b036-4add-acbd-908d88047d4f", "DetectTime": "2023-10-30T14:10:59.601080+02:00", "EventTime": "2023-10-30T14:10:59.601095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cbe7rO5zfxily1Ed8"]} -{"Format": "IDEA0", "ID": "eee60cff-2350-4af7-8275-cdb00fc570d8", "DetectTime": "2023-10-30T14:10:59.643927+02:00", "EventTime": "2023-10-30T14:10:59.643943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["C2U5Fb4E6xYVIHGS6"]} -{"Format": "IDEA0", "ID": "ad0b7676-2ecf-4db4-b385-a3c34b58c02b", "DetectTime": "2023-10-30T14:10:59.683092+02:00", "EventTime": "2023-10-30T14:10:59.683111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C2BDocO7A9r1RjQC4"]} -{"Format": "Json", "ID": "ad0b7676-2ecf-4db4-b385-a3c34b58c02b", "DetectTime": "2023-10-30T14:10:59.683092+02:00", "EventTime": "2023-10-30T14:10:59.683111+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:18:37.861576+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:10:59.759002)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "94627cda-239e-426f-9d27-baa04d1dad82", "DetectTime": "2023-10-30T14:10:59.763497+02:00", "EventTime": "2023-10-30T14:10:59.763513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CCcNg224Whpel5IJZ7"]} -{"Format": "IDEA0", "ID": "15f51276-7eb1-4a6e-85f8-fd5d2cb6a6a7", "DetectTime": "2023-10-30T14:10:59.805062+02:00", "EventTime": "2023-10-30T14:10:59.805078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CFE3Ak2mk4DMHotiO6"]} -{"Format": "IDEA0", "ID": "7e8e1091-e106-4616-b158-a03d67a94e5f", "DetectTime": "2023-10-30T14:10:59.840586+02:00", "EventTime": "2023-10-30T14:10:59.840601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CEj8Cd1Caj6UJQziY4"]} -{"Format": "IDEA0", "ID": "444cb53c-5d88-4de8-bc39-58e0b8c135fe", "DetectTime": "2023-10-30T14:10:59.880570+02:00", "EventTime": "2023-10-30T14:10:59.880590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CFT7ue2jezWJj7KAJb"]} -{"Format": "IDEA0", "ID": "2bcb971e-6e81-4371-8e9f-9e6cf3f62af8", "DetectTime": "2023-10-30T14:10:59.922108+02:00", "EventTime": "2023-10-30T14:10:59.922124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CVp7pR2d7gmbtWQL2j"]} -{"Format": "IDEA0", "ID": "1ef0e9ce-2e32-4eb5-97d5-4d19e5f55f5b", "DetectTime": "2023-10-30T14:10:59.960180+02:00", "EventTime": "2023-10-30T14:10:59.960196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CZgXh11yq6TQb6cRP5"]} -{"Format": "IDEA0", "ID": "6124b8f7-77a3-4945-a4c9-571a93be460c", "DetectTime": "2023-10-30T14:11:00.000317+02:00", "EventTime": "2023-10-30T14:11:00.000330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CVZDJN1r0btDkHuS31"]} -{"Format": "IDEA0", "ID": "9b1d0799-ec8e-4abf-bd7c-e81972d0c97f", "DetectTime": "2023-10-30T14:11:00.040843+02:00", "EventTime": "2023-10-30T14:11:00.040860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CGKLCm4JJDgqm35LOi"]} -{"Format": "Json", "ID": "9b1d0799-ec8e-4abf-bd7c-e81972d0c97f", "DetectTime": "2023-10-30T14:11:00.040843+02:00", "EventTime": "2023-10-30T14:11:00.040860+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:18:39.622162+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:00.122737)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "de4d9e60-3c2d-4af9-a45a-9697f756737b", "DetectTime": "2023-10-30T14:11:00.127674+02:00", "EventTime": "2023-10-30T14:11:00.127692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CazrYH1pvGnzmSeeL5"]} -{"Format": "IDEA0", "ID": "2d65e435-f121-4490-969f-9d6af2559b5d", "DetectTime": "2023-10-30T14:11:00.162483+02:00", "EventTime": "2023-10-30T14:11:00.162495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CxnVAY1E0kLrWtht8"]} -{"Format": "IDEA0", "ID": "4ab04aaa-baa6-4fdd-bd49-0fddb208a51c", "DetectTime": "2023-10-30T14:11:00.202885+02:00", "EventTime": "2023-10-30T14:11:00.202901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.13.164.195 ", "ContentType": "text/plain"}], "uids": ["C4HN5erxpNbqiJ2sk"]} -{"Format": "IDEA0", "ID": "8f5b5256-ead4-4648-ab7a-f4fdef37b233", "DetectTime": "2023-10-30T14:11:00.234653+02:00", "EventTime": "2023-10-30T14:11:00.234667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CH2dPR2WAGAI5RHXVk"]} -{"Format": "IDEA0", "ID": "e70fdb16-3b0d-4276-b113-ce3d9c891efe", "DetectTime": "2023-10-30T14:11:00.273649+02:00", "EventTime": "2023-10-30T14:11:00.273662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CKAVfI2LKQoNQcPN48"]} -{"Format": "IDEA0", "ID": "8a324e99-dd44-4057-b12b-80610aed8796", "DetectTime": "2023-10-30T14:11:00.310329+02:00", "EventTime": "2023-10-30T14:11:00.310341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C8DsRJ1vcmYKHTorBa"]} -{"Format": "IDEA0", "ID": "d518570a-e111-4fe7-a438-dc5548cad7c1", "DetectTime": "2023-10-30T14:11:00.348242+02:00", "EventTime": "2023-10-30T14:11:00.348263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CLBiJ73J47PQrBY3x4"]} -{"Format": "IDEA0", "ID": "66e8dff9-a190-4e94-ba73-e39338297f40", "DetectTime": "2023-10-30T14:11:00.386838+02:00", "EventTime": "2023-10-30T14:11:00.386854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CREQga1dEekAVfHU3"]} -{"Format": "IDEA0", "ID": "0b47177c-0d5d-4f56-b708-b39c1f2e16a7", "DetectTime": "2023-10-30T14:11:00.424908+02:00", "EventTime": "2023-10-30T14:11:00.424923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CUY9CS3eC5m9ChbS3e"]} -{"Format": "IDEA0", "ID": "0049fa45-5c26-4e01-8bfa-42c548bbeaa3", "DetectTime": "2023-10-30T14:11:00.464140+02:00", "EventTime": "2023-10-30T14:11:00.464168+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CTcBou4P9UcvWadZfa"]} -{"Format": "IDEA0", "ID": "8beb3cc6-04da-48d2-aa30-45ea3ce7a3dc", "DetectTime": "2023-10-30T14:11:00.487374+02:00", "EventTime": "2023-10-30T14:11:00.487393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["COjx8C1g60L6Is1bX6"]} -{"Format": "Json", "ID": "8beb3cc6-04da-48d2-aa30-45ea3ce7a3dc", "DetectTime": "2023-10-30T14:11:00.487374+02:00", "EventTime": "2023-10-30T14:11:00.487393+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:18:41.582972+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:00.561942)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "41135f46-3c63-4840-ad3e-c1899d1f1284", "DetectTime": "2023-10-30T14:11:00.566649+02:00", "EventTime": "2023-10-30T14:11:00.566665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["ClsGJ723fYkq3RbGXf"]} -{"Format": "IDEA0", "ID": "9889d244-4744-488f-afc7-aba721dde6bd", "DetectTime": "2023-10-30T14:11:00.607865+02:00", "EventTime": "2023-10-30T14:11:00.607885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C9DyfRS8sBZbuVd97"]} -{"Format": "IDEA0", "ID": "198a4283-e667-4974-ace4-c410535f55cc", "DetectTime": "2023-10-30T14:11:00.637322+02:00", "EventTime": "2023-10-30T14:11:00.637333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["Cs4Tw860b5fYF9wpi"]} -{"Format": "IDEA0", "ID": "0a7c3b94-0ae2-4282-b0cc-fbc9f7979f59", "DetectTime": "2023-10-30T14:11:00.672936+02:00", "EventTime": "2023-10-30T14:11:00.672947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ChoXgK2W3RrLVCucGd"]} -{"Format": "IDEA0", "ID": "2902005f-0235-469e-8cea-8b2b2a690315", "DetectTime": "2023-10-30T14:11:00.706458+02:00", "EventTime": "2023-10-30T14:11:00.706474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CsTqvA4TyA0sUpUUsf"]} -{"Format": "IDEA0", "ID": "38bb203f-e1a8-4766-aaf6-8ac01accec34", "DetectTime": "2023-10-30T14:11:00.742855+02:00", "EventTime": "2023-10-30T14:11:00.742869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C6UBOm3eQTvNZAy59e"]} -{"Format": "IDEA0", "ID": "57bc15ab-d44c-4b71-a1e7-98af49dfca7a", "DetectTime": "2023-10-30T14:11:00.775179+02:00", "EventTime": "2023-10-30T14:11:00.775196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CAWRId2Q5cmiKX2re8"]} -{"Format": "IDEA0", "ID": "0f6fa27d-2d10-4268-856a-09443a60f42b", "DetectTime": "2023-10-30T14:11:00.811380+02:00", "EventTime": "2023-10-30T14:11:00.811392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CbORFC2jozfUb0iU5f"]} -{"Format": "IDEA0", "ID": "7816df70-a27e-4882-8c26-c4226fd192b9", "DetectTime": "2023-10-30T14:11:00.848104+02:00", "EventTime": "2023-10-30T14:11:00.848120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CSEHNQ2xgnqqvszEU7"]} -{"Format": "Json", "ID": "7816df70-a27e-4882-8c26-c4226fd192b9", "DetectTime": "2023-10-30T14:11:00.848104+02:00", "EventTime": "2023-10-30T14:11:00.848120+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:18:43.228665+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:00.929553)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d3e7b667-beb6-41ed-823c-4651178d7939", "DetectTime": "2023-10-30T14:11:00.935967+02:00", "EventTime": "2023-10-30T14:11:00.935984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C6WWq84UxNreUWltvc"]} -{"Format": "IDEA0", "ID": "076aefd8-86af-4565-93b8-b85bbfec11dd", "DetectTime": "2023-10-30T14:11:00.972477+02:00", "EventTime": "2023-10-30T14:11:00.972489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CqDEXR1I4N7X9Ye344"]} -{"Format": "IDEA0", "ID": "d369b4b8-75d6-446d-a00f-3262cf87584e", "DetectTime": "2023-10-30T14:11:01.007816+02:00", "EventTime": "2023-10-30T14:11:01.007834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CXuvgZ2dgWF02G94cf"]} -{"Format": "IDEA0", "ID": "452fa6cd-163d-48ed-a07a-897f28231912", "DetectTime": "2023-10-30T14:11:01.042397+02:00", "EventTime": "2023-10-30T14:11:01.042419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C9G1fu3lgUl4oz8sh1"]} -{"Format": "IDEA0", "ID": "04bb8c92-8b66-4fbb-b3cd-96c3dda2060f", "DetectTime": "2023-10-30T14:11:01.080644+02:00", "EventTime": "2023-10-30T14:11:01.080661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CIOTqE2nUuw4ejPCGf"]} -{"Format": "IDEA0", "ID": "3649da25-0b08-41c0-b751-a59ba3eae855", "DetectTime": "2023-10-30T14:11:01.109796+02:00", "EventTime": "2023-10-30T14:11:01.109807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cdu4o03BG3Xcvap7m3"]} -{"Format": "IDEA0", "ID": "c15c7aaa-9c76-47bc-b7df-cb466bd8fa01", "DetectTime": "2023-10-30T14:11:01.146312+02:00", "EventTime": "2023-10-30T14:11:01.146329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CMKxJf2eHFugCdK8c6"]} -{"Format": "IDEA0", "ID": "dac97105-532b-43e5-91d7-6d3ec7053cbd", "DetectTime": "2023-10-30T14:11:01.180690+02:00", "EventTime": "2023-10-30T14:11:01.180706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C0ff96O0ZZtATpsod"]} -{"Format": "IDEA0", "ID": "407dc91b-17e5-4ee6-8810-7bc9a8e1e081", "DetectTime": "2023-10-30T14:11:01.214807+02:00", "EventTime": "2023-10-30T14:11:01.214826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Ci3WAr45F2PmlWZRy4"]} -{"Format": "Json", "ID": "407dc91b-17e5-4ee6-8810-7bc9a8e1e081", "DetectTime": "2023-10-30T14:11:01.214807+02:00", "EventTime": "2023-10-30T14:11:01.214826+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:18:45.010714+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:01.278842)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "236f5c7b-8074-4c37-9667-be10950e6bda", "DetectTime": "2023-10-30T14:11:01.283979+02:00", "EventTime": "2023-10-30T14:11:01.283995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C3NnNN2HKtHOT2RgKb"]} -{"Format": "IDEA0", "ID": "8a2a66be-3ef2-403e-925c-530ccd55f672", "DetectTime": "2023-10-30T14:11:01.313826+02:00", "EventTime": "2023-10-30T14:11:01.313842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsNwet1c0njSFd6YWc"]} -{"Format": "IDEA0", "ID": "fc467769-f7de-4ba7-a805-6eb28cc012d7", "DetectTime": "2023-10-30T14:11:01.343999+02:00", "EventTime": "2023-10-30T14:11:01.344018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CuKXOh2TCzc7fXdm09"]} -{"Format": "IDEA0", "ID": "faec463a-ff95-45b5-999a-8601256e65c6", "DetectTime": "2023-10-30T14:11:01.377415+02:00", "EventTime": "2023-10-30T14:11:01.377427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CyG87w4T0LkXuxljg9"]} -{"Format": "IDEA0", "ID": "6b9c2a2a-8729-45ef-a790-95c1bf625311", "DetectTime": "2023-10-30T14:11:01.406647+02:00", "EventTime": "2023-10-30T14:11:01.406669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CI0nhj2qkdUiAehwmk"]} -{"Format": "IDEA0", "ID": "6cd415c3-9f46-4b69-b138-fcbded976fbd", "DetectTime": "2023-10-30T14:11:01.439504+02:00", "EventTime": "2023-10-30T14:11:01.439518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CftWm81lN7vsuieWHc"]} -{"Format": "IDEA0", "ID": "159ef743-86c4-44be-8396-957bce1e8236", "DetectTime": "2023-10-30T14:11:01.469927+02:00", "EventTime": "2023-10-30T14:11:01.469943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CvcuUR3HlQpuPDloji"]} -{"Format": "IDEA0", "ID": "955bce08-bc88-446d-893a-9a3080ff8e62", "DetectTime": "2023-10-30T14:11:01.502137+02:00", "EventTime": "2023-10-30T14:11:01.502153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CfmuRq3Ra3EVIA5kmc"]} -{"Format": "IDEA0", "ID": "1e083ea3-0e26-4ce6-8c00-feb9912b492d", "DetectTime": "2023-10-30T14:11:01.533539+02:00", "EventTime": "2023-10-30T14:11:01.533557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["ChGJai3LuMX2bwOR7e"]} -{"Format": "Json", "ID": "1e083ea3-0e26-4ce6-8c00-feb9912b492d", "DetectTime": "2023-10-30T14:11:01.533539+02:00", "EventTime": "2023-10-30T14:11:01.533557+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:48:57.295939+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:01.603391)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4055b64f-a7a6-4e96-8242-b9b8ab99b2b3", "DetectTime": "2023-10-30T14:11:01.608827+02:00", "EventTime": "2023-10-30T14:11:01.608844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CEZGcv1lBeQdRsNTa"]} -{"Format": "IDEA0", "ID": "17547d21-e787-484c-aa39-41b3240f1f1f", "DetectTime": "2023-10-30T14:11:01.644835+02:00", "EventTime": "2023-10-30T14:11:01.644852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CEhP2e2W5DO476TS3d"]} -{"Format": "IDEA0", "ID": "0edc1803-31aa-45f7-bb25-c6b9bad4e0e5", "DetectTime": "2023-10-30T14:11:01.675616+02:00", "EventTime": "2023-10-30T14:11:01.675628+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CdocC51hTg0uQ0fm1i"]} -{"Format": "IDEA0", "ID": "37440798-6105-4643-a50a-89efdd7a6717", "DetectTime": "2023-10-30T14:11:01.701056+02:00", "EventTime": "2023-10-30T14:11:01.701072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CvIFiD1BxcjU0hb8ce"]} -{"Format": "IDEA0", "ID": "1e0efd5a-991e-459e-a73c-b961345f27f4", "DetectTime": "2023-10-30T14:11:01.729257+02:00", "EventTime": "2023-10-30T14:11:01.729272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CeJT643qNNLngD9OGk"]} -{"Format": "IDEA0", "ID": "b607c1e1-548f-4ea2-a231-6b8afc33a4c6", "DetectTime": "2023-10-30T14:11:01.759830+02:00", "EventTime": "2023-10-30T14:11:01.759843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cw8vD82QxaBeRt3VA3"]} -{"Format": "IDEA0", "ID": "8f35f753-b9d4-4095-8833-b5706938041c", "DetectTime": "2023-10-30T14:11:01.792932+02:00", "EventTime": "2023-10-30T14:11:01.792948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cm9ZDw43mll4zU4bT4"]} -{"Format": "IDEA0", "ID": "8db054a0-d6dc-4d3a-b999-18fb726dc1df", "DetectTime": "2023-10-30T14:11:01.824040+02:00", "EventTime": "2023-10-30T14:11:01.824050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CeCL8A04PnYE24Tyc"]} -{"Format": "IDEA0", "ID": "378bfd78-8b56-4345-ac81-7c45ef4ce9ed", "DetectTime": "2023-10-30T14:11:01.855165+02:00", "EventTime": "2023-10-30T14:11:01.855182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CVujlH2A5u8Z8V0g68"]} -{"Format": "IDEA0", "ID": "eeddff8f-4016-4c41-8978-6f4defdf6a8b", "DetectTime": "2023-10-30T14:11:01.886056+02:00", "EventTime": "2023-10-30T14:11:01.886075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CrET0X240UIH9nUARe"]} -{"Format": "Json", "ID": "eeddff8f-4016-4c41-8978-6f4defdf6a8b", "DetectTime": "2023-10-30T14:11:01.886056+02:00", "EventTime": "2023-10-30T14:11:01.886075+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:49:02.940296+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:01.953562)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "433dd9e2-3e95-45c0-8bc3-d8d84cd24145", "DetectTime": "2023-10-30T14:11:01.957257+02:00", "EventTime": "2023-10-30T14:11:01.957267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CMnRuI1YtKqFo9Cjj"]} -{"Format": "IDEA0", "ID": "3dc4dc2a-4f0f-40f0-9805-464c152a530f", "DetectTime": "2023-10-30T14:11:01.986434+02:00", "EventTime": "2023-10-30T14:11:01.986451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CsoHJi2BP9lAagWz06"]} -{"Format": "IDEA0", "ID": "bea642bc-2ca7-463e-81ea-3387753d7c32", "DetectTime": "2023-10-30T14:11:02.017160+02:00", "EventTime": "2023-10-30T14:11:02.017174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CkIaPb2wxqtDfPrrCa"]} -{"Format": "IDEA0", "ID": "6956a5df-312c-4bf1-a559-731eb208bd78", "DetectTime": "2023-10-30T14:11:02.046032+02:00", "EventTime": "2023-10-30T14:11:02.046046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CNpzPI25QuyC26muI5"]} -{"Format": "IDEA0", "ID": "a1deaf0f-f4aa-4eb4-a2ef-08b34386373f", "DetectTime": "2023-10-30T14:11:02.072350+02:00", "EventTime": "2023-10-30T14:11:02.072365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CEnLL731RvYQhHKA6g"]} -{"Format": "IDEA0", "ID": "9e408382-d6cf-4198-9503-4e677cc9123f", "DetectTime": "2023-10-30T14:11:02.099128+02:00", "EventTime": "2023-10-30T14:11:02.099140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CUGjh81ib3g4G5vLh9"]} -{"Format": "IDEA0", "ID": "5a218d5b-9414-4b91-8f8a-af3d79be79e7", "DetectTime": "2023-10-30T14:11:02.125260+02:00", "EventTime": "2023-10-30T14:11:02.125271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["Cmtx9BowL5wUd7OO4"]} -{"Format": "IDEA0", "ID": "58181784-210a-4feb-807a-a2776d2e04cb", "DetectTime": "2023-10-30T14:11:02.152991+02:00", "EventTime": "2023-10-30T14:11:02.153002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C4L3g0470wVomOjcb3"]} -{"Format": "IDEA0", "ID": "1c77e09e-ef2e-44b8-9f7a-5716239c3f05", "DetectTime": "2023-10-30T14:11:02.175838+02:00", "EventTime": "2023-10-30T14:11:02.175858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CdJS3X3TmP43j0VnH3"]} -{"Format": "Json", "ID": "1c77e09e-ef2e-44b8-9f7a-5716239c3f05", "DetectTime": "2023-10-30T14:11:02.175838+02:00", "EventTime": "2023-10-30T14:11:02.175858+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:49:22.398193+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:02.234721)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "267884a1-8243-4b64-906e-4043ff7afa68", "DetectTime": "2023-10-30T14:11:02.239056+02:00", "EventTime": "2023-10-30T14:11:02.239068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CaRiWX2oudOmWbo9mc"]} -{"Format": "IDEA0", "ID": "70d1a5b4-87b9-47bd-87b0-3b40fa9fc215", "DetectTime": "2023-10-30T14:11:02.270844+02:00", "EventTime": "2023-10-30T14:11:02.270856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CBFDFr1e3pqqEZYq69"]} -{"Format": "IDEA0", "ID": "a9e64712-b721-4ca9-a557-12c505aca266", "DetectTime": "2023-10-30T14:11:02.294722+02:00", "EventTime": "2023-10-30T14:11:02.294733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [10492], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. ", "ContentType": "text/plain"}], "uids": ["Ccf2wt2eRuLoFceEdb"]} -{"Format": "IDEA0", "ID": "007b7313-ae63-457f-ac80-a37112291d57", "DetectTime": "2023-10-30T14:11:02.317491+02:00", "EventTime": "2023-10-30T14:11:02.317502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CezWRZ2z5eStf3pWA4"]} -{"Format": "IDEA0", "ID": "b68d3e3e-6661-4931-94d5-7192d214464e", "DetectTime": "2023-10-30T14:11:02.343832+02:00", "EventTime": "2023-10-30T14:11:02.343843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CZRc5i4MBfLXYxXfJi"]} -{"Format": "IDEA0", "ID": "250778f4-da6d-40b4-806e-512a7d06c99e", "DetectTime": "2023-10-30T14:11:02.368971+02:00", "EventTime": "2023-10-30T14:11:02.368991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6AGEn3a7Y8Xo45trk"]} -{"Format": "IDEA0", "ID": "97de4d17-5046-42a4-91b3-dfe1ca831670", "DetectTime": "2023-10-30T14:11:02.391449+02:00", "EventTime": "2023-10-30T14:11:02.391461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CifElX2yX7zght7ppk"]} -{"Format": "IDEA0", "ID": "2f9f4013-6fb8-481f-a7cf-39265d98eeb3", "DetectTime": "2023-10-30T14:11:02.417058+02:00", "EventTime": "2023-10-30T14:11:02.417074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CgYq925yQ7ozj2jsj"]} -{"Format": "IDEA0", "ID": "b8ff4473-7de9-498e-a21d-6939f1d49b7f", "DetectTime": "2023-10-30T14:11:02.444121+02:00", "EventTime": "2023-10-30T14:11:02.444137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CbZMipvANDs2f4aR3"]} -{"Format": "IDEA0", "ID": "79c21c8d-0729-47c2-9320-b1ae83a2a323", "DetectTime": "2023-10-30T14:11:02.478563+02:00", "EventTime": "2023-10-30T14:11:02.478576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CcfW0E2HXsM5nvGFW"]} -{"Format": "Json", "ID": "79c21c8d-0729-47c2-9320-b1ae83a2a323", "DetectTime": "2023-10-30T14:11:02.478563+02:00", "EventTime": "2023-10-30T14:11:02.478576+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:49:24.081056+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:02.538492)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "47d0db43-4809-4e98-88d3-88c21c2ad4cf", "DetectTime": "2023-10-30T14:11:02.543439+02:00", "EventTime": "2023-10-30T14:11:02.543456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CW569BN72LtvqA7L3"]} -{"Format": "IDEA0", "ID": "45d8dd03-8c7b-4aa1-8d12-e7cdcf1dbdbe", "DetectTime": "2023-10-30T14:11:02.569244+02:00", "EventTime": "2023-10-30T14:11:02.569258+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CAf4Id2yB4AF2JPKTj"]} -{"Format": "IDEA0", "ID": "5c0e06f1-c3b0-4ad7-8c81-336019e8a391", "DetectTime": "2023-10-30T14:11:02.595401+02:00", "EventTime": "2023-10-30T14:11:02.595418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cmy5lF4nfiM0wmESZi"]} -{"Format": "IDEA0", "ID": "8e76c27a-16f9-436e-b2c9-87803ebe87fa", "DetectTime": "2023-10-30T14:11:02.618944+02:00", "EventTime": "2023-10-30T14:11:02.618962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CnAF7618pfk4JFRgCb"]} -{"Format": "IDEA0", "ID": "3461fed9-b249-434f-8f38-92430b939263", "DetectTime": "2023-10-30T14:11:02.640571+02:00", "EventTime": "2023-10-30T14:11:02.640582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUi6g94pfmJElbjnq"]} -{"Format": "IDEA0", "ID": "6e1ad461-65fb-45d7-9e2f-126fdb2fcfb6", "DetectTime": "2023-10-30T14:11:02.660914+02:00", "EventTime": "2023-10-30T14:11:02.660926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cl81wA2zUcJKCrkhn1"]} -{"Format": "IDEA0", "ID": "6cff0837-00e6-41c5-a8b7-b1b9f6b3dcb4", "DetectTime": "2023-10-30T14:11:02.683330+02:00", "EventTime": "2023-10-30T14:11:02.683357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CA8JHf1z6XVwBIOSV6"]} -{"Format": "IDEA0", "ID": "defa3d32-7d44-4cfd-a93f-1677ccb3baae", "DetectTime": "2023-10-30T14:11:02.708226+02:00", "EventTime": "2023-10-30T14:11:02.708242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CgS49h38WU4bwbN0K9"]} -{"Format": "IDEA0", "ID": "c9ec4d94-ac77-495f-97a2-4fbf9ed83e98", "DetectTime": "2023-10-30T14:11:02.729388+02:00", "EventTime": "2023-10-30T14:11:02.729399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQydQ6JS72vLtJCv"]} -{"Format": "Json", "ID": "c9ec4d94-ac77-495f-97a2-4fbf9ed83e98", "DetectTime": "2023-10-30T14:11:02.729388+02:00", "EventTime": "2023-10-30T14:11:02.729399+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T14:49:32.556425+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2023/10/30 14:11:02.789412)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1861b0e3-b3a4-49d2-a8ff-0403afddf66c", "DetectTime": "2023-10-30T14:11:02.794120+02:00", "EventTime": "2023-10-30T14:11:02.794134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CfZNf620tsvNu43Iec"]} -{"Format": "IDEA0", "ID": "0fa84e9e-28e4-4a28-bb46-e0df3111282f", "DetectTime": "2023-10-30T14:11:02.816662+02:00", "EventTime": "2023-10-30T14:11:02.816686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["ClTGiq2ZxJwir3yCM3"]} -{"Format": "IDEA0", "ID": "d2fc61aa-cf1c-4cbc-915b-f79cae3d151e", "DetectTime": "2023-10-30T14:11:02.847657+02:00", "EventTime": "2023-10-30T14:11:02.847674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8150], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. ", "ContentType": "text/plain"}], "uids": ["Cnhp51rjdULqVBbH4"]} -{"Format": "IDEA0", "ID": "e84913c4-9d14-435e-88c1-92351479e21c", "DetectTime": "2023-10-30T14:11:02.870351+02:00", "EventTime": "2023-10-30T14:11:02.870369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrBTub6IuIMm4Jggg"]} -{"Format": "IDEA0", "ID": "8c16d331-b68d-497e-88c0-7fdf51eddb18", "DetectTime": "2023-10-30T14:11:02.890972+02:00", "EventTime": "2023-10-30T14:11:02.890985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CcvIpr2MoPii4Y2XL1"]} -{"Format": "IDEA0", "ID": "90120132-5053-4519-b245-f9a8c7b635ec", "DetectTime": "2023-10-30T14:11:02.936599+02:00", "EventTime": "2023-10-30T14:11:02.936612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CJ6B4F3qmCtpwwdpxa"]} -{"Format": "IDEA0", "ID": "b8ddf58c-0848-46df-a754-a5612c48e17f", "DetectTime": "2023-10-30T14:11:02.977334+02:00", "EventTime": "2023-10-30T14:11:02.977350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Cq05oY2JrJynjVcd0i"]} -{"Format": "IDEA0", "ID": "78c5d797-bfe2-4fae-83c1-88e0526baf57", "DetectTime": "2023-10-30T14:11:03.020030+02:00", "EventTime": "2023-10-30T14:11:03.020044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C7Fpgn2dqfOFWdLvgg"]} -{"Format": "IDEA0", "ID": "63a680ef-9370-4337-a4d6-1afdfcba863f", "DetectTime": "2023-10-30T14:11:03.063662+02:00", "EventTime": "2023-10-30T14:11:03.063678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CWdxqR2NA0QuXUTM76"]} -{"Format": "IDEA0", "ID": "f7999b29-ce59-49f3-a0ff-a605f54f08fa", "DetectTime": "2023-10-30T14:11:03.107111+02:00", "EventTime": "2023-10-30T14:11:03.107129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C7Nf9s3KVBXv33HZB1"]} -{"Format": "IDEA0", "ID": "03851874-5e9a-4397-8dbe-5bcc07bf5b75", "DetectTime": "2023-10-30T14:11:03.148885+02:00", "EventTime": "2023-10-30T14:11:03.148899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CVs39i1Y256zjljBdg"]} -{"Format": "Json", "ID": "03851874-5e9a-4397-8dbe-5bcc07bf5b75", "DetectTime": "2023-10-30T14:11:03.148885+02:00", "EventTime": "2023-10-30T14:11:03.148899+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:19:40.606650+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:03.241767)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f0a28be5-32d3-4d35-b077-2d85793299ff", "DetectTime": "2023-10-30T14:11:03.247391+02:00", "EventTime": "2023-10-30T14:11:03.247411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CDWYWC4WZwdtNrvtXk"]} -{"Format": "IDEA0", "ID": "a41b59bb-ed93-4fe6-8cfd-fd19f1e77678", "DetectTime": "2023-10-30T14:11:03.293660+02:00", "EventTime": "2023-10-30T14:11:03.293678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CEWO4J1B1OmqmqQSFf"]} -{"Format": "IDEA0", "ID": "83a15a70-b166-4998-a93f-d0ebaa7d0a38", "DetectTime": "2023-10-30T14:11:03.333148+02:00", "EventTime": "2023-10-30T14:11:03.333164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C0lOOdgsTbyZNiczb"]} -{"Format": "IDEA0", "ID": "41057d86-6ab0-43b6-a6d8-87ef10527464", "DetectTime": "2023-10-30T14:11:03.372287+02:00", "EventTime": "2023-10-30T14:11:03.372304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CkmvVR3jgT2gWJPppe"]} -{"Format": "IDEA0", "ID": "279520ef-4a32-42e3-a48d-8a48c2ff2725", "DetectTime": "2023-10-30T14:11:03.412530+02:00", "EventTime": "2023-10-30T14:11:03.412542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C64sn43In8sleL1Ksl"]} -{"Format": "IDEA0", "ID": "dfd417a2-3e30-4a8f-887e-d5bfce3061d6", "DetectTime": "2023-10-30T14:11:03.451559+02:00", "EventTime": "2023-10-30T14:11:03.451576+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CqMztttFCX3PPKFe"]} -{"Format": "IDEA0", "ID": "46c7e7a5-c6c5-454d-946b-c34e97977497", "DetectTime": "2023-10-30T14:11:03.480301+02:00", "EventTime": "2023-10-30T14:11:03.480311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C0c5Q14gj819zaoOb3"]} -{"Format": "IDEA0", "ID": "9c0129a1-d4ba-4863-97f0-f2705ea3921c", "DetectTime": "2023-10-30T14:11:03.523454+02:00", "EventTime": "2023-10-30T14:11:03.523471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CLJntr4KOJKsLmMa0j"]} -{"Format": "IDEA0", "ID": "58bd0504-d2f2-47a9-a18d-23bda4b10481", "DetectTime": "2023-10-30T14:11:03.565594+02:00", "EventTime": "2023-10-30T14:11:03.565605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CWFNv63eGAhRkq0S5d"]} -{"Format": "Json", "ID": "58bd0504-d2f2-47a9-a18d-23bda4b10481", "DetectTime": "2023-10-30T14:11:03.565594+02:00", "EventTime": "2023-10-30T14:11:03.565605+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:19:42.043163+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:03.641398)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "24a04004-9158-4123-869d-571246cab30f", "DetectTime": "2023-10-30T14:11:03.646559+02:00", "EventTime": "2023-10-30T14:11:03.646577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CXEFloUmf9t3pKro7"]} -{"Format": "IDEA0", "ID": "93fe5665-2100-46fd-a934-d2c081b8ac02", "DetectTime": "2023-10-30T14:11:03.689598+02:00", "EventTime": "2023-10-30T14:11:03.689611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CsS2Og15ikQPzN31Va"]} -{"Format": "IDEA0", "ID": "0ec18fd5-b70c-4cbc-931c-7749416a05ee", "DetectTime": "2023-10-30T14:11:03.725700+02:00", "EventTime": "2023-10-30T14:11:03.725716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CyHqMKBswGBnHJg08"]} -{"Format": "IDEA0", "ID": "fc0172c0-a9a7-4ffc-909e-e27d5d788bfb", "DetectTime": "2023-10-30T14:11:03.766940+02:00", "EventTime": "2023-10-30T14:11:03.766956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CeQwch9YCaUdGFfEb"]} -{"Format": "IDEA0", "ID": "65219a4f-5f7e-47ea-b708-1facd04ce4ae", "DetectTime": "2023-10-30T14:11:03.808509+02:00", "EventTime": "2023-10-30T14:11:03.808536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CSOkqi4dF7ZWdQONxh"]} -{"Format": "IDEA0", "ID": "fd285ef9-11e9-4471-8030-792011a62478", "DetectTime": "2023-10-30T14:11:03.851483+02:00", "EventTime": "2023-10-30T14:11:03.851501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CIdFOA4KoxpNXgUyyb"]} -{"Format": "IDEA0", "ID": "df5a7056-cd24-492b-9607-e1c4e3f51ca6", "DetectTime": "2023-10-30T14:11:03.888696+02:00", "EventTime": "2023-10-30T14:11:03.888714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CpdOmt1GT8w37ZVPJb"]} -{"Format": "IDEA0", "ID": "3f99ab83-d2b0-47fd-9026-3c571966df69", "DetectTime": "2023-10-30T14:11:03.927796+02:00", "EventTime": "2023-10-30T14:11:03.927812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Clgbxu2cxddtfYK0Ca"]} -{"Format": "IDEA0", "ID": "96e38a7d-9ec0-4df9-9244-e06d693bc912", "DetectTime": "2023-10-30T14:11:03.966456+02:00", "EventTime": "2023-10-30T14:11:03.966482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CWG2dr1djgbgmzk3u2"]} -{"Format": "Json", "ID": "96e38a7d-9ec0-4df9-9244-e06d693bc912", "DetectTime": "2023-10-30T14:11:03.966456+02:00", "EventTime": "2023-10-30T14:11:03.966482+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:19:43.387425+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:04.044287)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e5e50eb-6e78-4049-8c02-5ad661515426", "DetectTime": "2023-10-30T14:11:04.048733+02:00", "EventTime": "2023-10-30T14:11:04.048751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZzI5f3ZugEE0y7JMk"]} -{"Format": "IDEA0", "ID": "70a20169-8b64-4c37-b7ac-dceaa83d8c6e", "DetectTime": "2023-10-30T14:11:04.086772+02:00", "EventTime": "2023-10-30T14:11:04.086803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CzXYGG3FttLjAMu6m8"]} -{"Format": "IDEA0", "ID": "e7ff42a1-65d8-49c5-ba7d-6315a31b85da", "DetectTime": "2023-10-30T14:11:04.122376+02:00", "EventTime": "2023-10-30T14:11:04.122405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cohr9b1GxfuoxSjdmg"]} -{"Format": "IDEA0", "ID": "3723cd64-0e08-4991-9e0a-0e919fbcb087", "DetectTime": "2023-10-30T14:11:04.159814+02:00", "EventTime": "2023-10-30T14:11:04.159842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ca6S8p2wvRjjvhJiH7"]} -{"Format": "IDEA0", "ID": "69dc832e-b0cf-460f-a37c-7e517c4f4722", "DetectTime": "2023-10-30T14:11:04.195335+02:00", "EventTime": "2023-10-30T14:11:04.195347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CoC38A4OuWksgLYws9"]} -{"Format": "IDEA0", "ID": "7ef4876f-248d-419c-87f5-19cfba022197", "DetectTime": "2023-10-30T14:11:04.230379+02:00", "EventTime": "2023-10-30T14:11:04.230392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CQ5XP82Yvot4OVu5Ui"]} -{"Format": "IDEA0", "ID": "e3ad3ac8-129a-422e-9c59-20919853d7ca", "DetectTime": "2023-10-30T14:11:04.266099+02:00", "EventTime": "2023-10-30T14:11:04.266116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9tRxG3eyXLVt0M9oe"]} -{"Format": "IDEA0", "ID": "98b3d97f-1857-4b9e-a9ed-683231182a8a", "DetectTime": "2023-10-30T14:11:04.302042+02:00", "EventTime": "2023-10-30T14:11:04.302058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CFxFwK1qj3Xcx4tz82"]} -{"Format": "Json", "ID": "98b3d97f-1857-4b9e-a9ed-683231182a8a", "DetectTime": "2023-10-30T14:11:04.302042+02:00", "EventTime": "2023-10-30T14:11:04.302058+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:20:02.127244+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:04.383201)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9f53f1f8-3ba2-4dfe-914c-82195e5e7a37", "DetectTime": "2023-10-30T14:11:04.387829+02:00", "EventTime": "2023-10-30T14:11:04.387854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CdM4hzmNX5QWJkz9l"]} -{"Format": "IDEA0", "ID": "96fdf6b4-adca-4a80-a9a6-79b76aae1c4a", "DetectTime": "2023-10-30T14:11:04.421712+02:00", "EventTime": "2023-10-30T14:11:04.421736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C5NPal42E3KbGhvJV3"]} -{"Format": "IDEA0", "ID": "c0d8d68b-0a60-44e7-8d70-1d527d1aa142", "DetectTime": "2023-10-30T14:11:04.455447+02:00", "EventTime": "2023-10-30T14:11:04.455457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CSJo5e3am1qBDQmJGd"]} -{"Format": "IDEA0", "ID": "06613e50-6946-4e86-b3d8-9c88e113d2c2", "DetectTime": "2023-10-30T14:11:04.488298+02:00", "EventTime": "2023-10-30T14:11:04.488311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CRawZO3kCcDzAwFC8"]} -{"Format": "IDEA0", "ID": "5012cb76-868e-416f-8ea0-81ab1756928f", "DetectTime": "2023-10-30T14:11:04.522467+02:00", "EventTime": "2023-10-30T14:11:04.522484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C1GzkN3vN57b4wIHB"]} -{"Format": "IDEA0", "ID": "23a2e35e-2b20-4f21-950d-b05395388783", "DetectTime": "2023-10-30T14:11:04.558572+02:00", "EventTime": "2023-10-30T14:11:04.558583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C0GIyg4RO3xG90sDJ"]} -{"Format": "IDEA0", "ID": "3d562a91-6ad9-4526-96eb-32c0588c7d54", "DetectTime": "2023-10-30T14:11:04.593613+02:00", "EventTime": "2023-10-30T14:11:04.593627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CP1S311NyyeukHjsFc"]} -{"Format": "IDEA0", "ID": "cbe1088a-b8ee-4805-8cbe-9c390e73822e", "DetectTime": "2023-10-30T14:11:04.626606+02:00", "EventTime": "2023-10-30T14:11:04.626620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ce6JVA2BeYKMNER5d2"]} -{"Format": "Json", "ID": "cbe1088a-b8ee-4805-8cbe-9c390e73822e", "DetectTime": "2023-10-30T14:11:04.626606+02:00", "EventTime": "2023-10-30T14:11:04.626620+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:20:03.288776+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:04.704709)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dd21c853-1e48-458a-9567-23c429f59f6c", "DetectTime": "2023-10-30T14:11:04.709653+02:00", "EventTime": "2023-10-30T14:11:04.709671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwX9qHGRw9T8NnLkj"]} -{"Format": "IDEA0", "ID": "35f39adc-3300-4ed0-bbba-479db6b2b26f", "DetectTime": "2023-10-30T14:11:04.743192+02:00", "EventTime": "2023-10-30T14:11:04.743209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["Cn5CUp4X1U22SfQfWj"]} -{"Format": "IDEA0", "ID": "84a090e9-3fc2-416e-bd60-e03698e706b1", "DetectTime": "2023-10-30T14:11:04.780076+02:00", "EventTime": "2023-10-30T14:11:04.780092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["Cv5mdb2BXRdCNX8O0i"]} -{"Format": "IDEA0", "ID": "fcba4b2c-1d0f-4341-841b-8950e852f194", "DetectTime": "2023-10-30T14:11:04.814296+02:00", "EventTime": "2023-10-30T14:11:04.814312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CSm9sKUKBbJcSlwI4"]} -{"Format": "IDEA0", "ID": "f55125f4-79e1-465d-97ff-236c9efdf962", "DetectTime": "2023-10-30T14:11:04.845753+02:00", "EventTime": "2023-10-30T14:11:04.845768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CE3i8e70xjvtOJAvg"]} -{"Format": "IDEA0", "ID": "a072e31f-761b-4e91-91fe-a6f5ac9fbdc5", "DetectTime": "2023-10-30T14:11:04.877152+02:00", "EventTime": "2023-10-30T14:11:04.877169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["C5mKos13vxrsOGzWzd"]} -{"Format": "IDEA0", "ID": "c4f21e4c-82c7-40c7-a888-4fb50f71dddf", "DetectTime": "2023-10-30T14:11:04.908914+02:00", "EventTime": "2023-10-30T14:11:04.908926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cm0MRO1orfrVhGbzTg"]} -{"Format": "IDEA0", "ID": "910a282a-606e-4097-9a2e-d8c49c59d89b", "DetectTime": "2023-10-30T14:11:04.943744+02:00", "EventTime": "2023-10-30T14:11:04.943762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.202.161.209 ", "ContentType": "text/plain"}], "uids": ["CtxzTNqDRRjkYDLzb"]} -{"Format": "IDEA0", "ID": "1831bb18-eb1d-48d3-afff-657e496bb542", "DetectTime": "2023-10-30T14:11:04.978202+02:00", "EventTime": "2023-10-30T14:11:04.978218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["Cy1Flv34s8YLexT2j1"]} -{"Format": "IDEA0", "ID": "23411b6c-db9f-4733-8518-75a362567abf", "DetectTime": "2023-10-30T14:11:05.010336+02:00", "EventTime": "2023-10-30T14:11:05.010350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Cc7roK3rWGTIlgwDrh"]} -{"Format": "Json", "ID": "23411b6c-db9f-4733-8518-75a362567abf", "DetectTime": "2023-10-30T14:11:05.010336+02:00", "EventTime": "2023-10-30T14:11:05.010350+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:51:13.925270+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:05.084199)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "23e2e460-92e3-4070-a174-b770292f4314", "DetectTime": "2023-10-30T14:11:05.088372+02:00", "EventTime": "2023-10-30T14:11:05.088385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CcOWH4B2D2lSAIa7l"]} -{"Format": "IDEA0", "ID": "e8ac0714-5e84-45a0-bede-7ab12f413143", "DetectTime": "2023-10-30T14:11:05.121923+02:00", "EventTime": "2023-10-30T14:11:05.121950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["C5bqoS536C7A91Td7"]} -{"Format": "IDEA0", "ID": "5c55b226-290b-41f5-92d7-1ab26b998263", "DetectTime": "2023-10-30T14:11:05.152369+02:00", "EventTime": "2023-10-30T14:11:05.152385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CezbLd1hfgnKkZnHwk"]} -{"Format": "IDEA0", "ID": "c7861206-fdf2-460b-b3cd-a3938ec84430", "DetectTime": "2023-10-30T14:11:05.183428+02:00", "EventTime": "2023-10-30T14:11:05.183444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C4iQEx1rvLmiaZFlef"]} -{"Format": "IDEA0", "ID": "42f0d0bc-4602-46d0-b6d5-7e57882e2193", "DetectTime": "2023-10-30T14:11:05.213969+02:00", "EventTime": "2023-10-30T14:11:05.213989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CiN5ak3h9wweJ7I015"]} -{"Format": "IDEA0", "ID": "0e9973f6-3085-40fb-9dea-2ce88a4a460e", "DetectTime": "2023-10-30T14:11:05.246541+02:00", "EventTime": "2023-10-30T14:11:05.246558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CQ5C3uONKCmaIShbi"]} -{"Format": "IDEA0", "ID": "c3687b23-1d51-4430-9129-53dd4fddfe17", "DetectTime": "2023-10-30T14:11:05.275291+02:00", "EventTime": "2023-10-30T14:11:05.275308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C42JHyKBtIXnxLy58"]} -{"Format": "IDEA0", "ID": "336c79c0-242d-4a39-8ff3-f9dfa187be91", "DetectTime": "2023-10-30T14:11:05.305776+02:00", "EventTime": "2023-10-30T14:11:05.305788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CmFnRHLM7ebrTlPkh"]} -{"Format": "Json", "ID": "336c79c0-242d-4a39-8ff3-f9dfa187be91", "DetectTime": "2023-10-30T14:11:05.305776+02:00", "EventTime": "2023-10-30T14:11:05.305788+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:51:19.877122+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:05.375935)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "68fa5496-fe2e-4d8d-b189-4d2b920f4e6b", "DetectTime": "2023-10-30T14:11:05.380271+02:00", "EventTime": "2023-10-30T14:11:05.380283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CaRoRu2G1W9sOKG24d"]} -{"Format": "IDEA0", "ID": "f9481563-0a2d-4a40-9815-3775d713d270", "DetectTime": "2023-10-30T14:11:05.408078+02:00", "EventTime": "2023-10-30T14:11:05.408091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CzHb5b3LvPXizA9QY2"]} -{"Format": "IDEA0", "ID": "268a125c-1de5-4647-9040-bde85c3d54c6", "DetectTime": "2023-10-30T14:11:05.435221+02:00", "EventTime": "2023-10-30T14:11:05.435237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXr6JbajKQOQW4Mxe"]} -{"Format": "IDEA0", "ID": "dae308b4-cd9b-4ea2-b620-d85ae780bafc", "DetectTime": "2023-10-30T14:11:05.464385+02:00", "EventTime": "2023-10-30T14:11:05.464400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C8zGJr4h2OvaDiK0kk"]} -{"Format": "IDEA0", "ID": "9551fd38-262b-40f2-8d39-fdf3ed99512b", "DetectTime": "2023-10-30T14:11:05.496085+02:00", "EventTime": "2023-10-30T14:11:05.496101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CjoXli4kfe2YeIXAYg"]} -{"Format": "IDEA0", "ID": "8a815edb-1f35-49f4-87ce-fdce9ff2b3cb", "DetectTime": "2023-10-30T14:11:05.522347+02:00", "EventTime": "2023-10-30T14:11:05.522359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CRdRNR2IyCpn6M8Kic"]} -{"Format": "IDEA0", "ID": "2c2d34dc-6539-4c92-8994-628d5b062194", "DetectTime": "2023-10-30T14:11:05.550584+02:00", "EventTime": "2023-10-30T14:11:05.550601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CwIFa96DRUqohXhq5"]} -{"Format": "IDEA0", "ID": "05d256c2-d276-4d53-ab59-1e772bf899f9", "DetectTime": "2023-10-30T14:11:05.579836+02:00", "EventTime": "2023-10-30T14:11:05.579853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CW9ulH2ka1KtVqypOb"]} -{"Format": "Json", "ID": "05d256c2-d276-4d53-ab59-1e772bf899f9", "DetectTime": "2023-10-30T14:11:05.579836+02:00", "EventTime": "2023-10-30T14:11:05.579853+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:51:21.506139+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:05.642515)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c5776bd9-4c39-40c6-8ef9-94026b5ae7b4", "DetectTime": "2023-10-30T14:11:05.647348+02:00", "EventTime": "2023-10-30T14:11:05.647367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CxuNLWjBbPyScOgMe"]} -{"Format": "IDEA0", "ID": "c2ea3d4e-34db-40ab-88ed-072105599a30", "DetectTime": "2023-10-30T14:11:05.673707+02:00", "EventTime": "2023-10-30T14:11:05.673725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CQLrTM3xnvwtGV5Jw9"]} -{"Format": "IDEA0", "ID": "884d9590-ccc7-4343-adfb-f59e33195e1d", "DetectTime": "2023-10-30T14:11:05.697666+02:00", "EventTime": "2023-10-30T14:11:05.697682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CM0nZf1hv9nNtYBsYb"]} -{"Format": "IDEA0", "ID": "f581cc42-43e3-47f8-a135-d93d031fe58a", "DetectTime": "2023-10-30T14:11:05.722606+02:00", "EventTime": "2023-10-30T14:11:05.722623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CQeYPD3CR7IoC5gbx"]} -{"Format": "IDEA0", "ID": "04c88952-8819-472b-8ff8-bcd7db19f7e7", "DetectTime": "2023-10-30T14:11:05.747614+02:00", "EventTime": "2023-10-30T14:11:05.747632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [1024], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CLIuGV2D5mqdnqn4G9"]} -{"Format": "IDEA0", "ID": "ac66a657-9bb5-434c-8498-a98cf2741169", "DetectTime": "2023-10-30T14:11:05.774224+02:00", "EventTime": "2023-10-30T14:11:05.774241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CGzo2c1gaiKlvOqgt9"]} -{"Format": "IDEA0", "ID": "0caaacda-09ba-4f54-a340-16cb21c1d95a", "DetectTime": "2023-10-30T14:11:05.795874+02:00", "EventTime": "2023-10-30T14:11:05.795884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CiBTIz2jg6KvD9PnW8"]} -{"Format": "IDEA0", "ID": "0311788b-607e-4124-abfb-e3b4a40c8acb", "DetectTime": "2023-10-30T14:11:05.818588+02:00", "EventTime": "2023-10-30T14:11:05.818606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CsNyBQvY2FxK8XjF6"]} -{"Format": "Json", "ID": "0311788b-607e-4124-abfb-e3b4a40c8acb", "DetectTime": "2023-10-30T14:11:05.818588+02:00", "EventTime": "2023-10-30T14:11:05.818606+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:51:23.496293+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:05.880004)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3228b6a9-4cb6-4034-a678-75cb4283b450", "DetectTime": "2023-10-30T14:11:05.884842+02:00", "EventTime": "2023-10-30T14:11:05.884858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CUzTJ423NbGJmD4SLj"]} -{"Format": "IDEA0", "ID": "624ec667-ebd4-4a98-a695-c1e153f208e4", "DetectTime": "2023-10-30T14:11:05.909039+02:00", "EventTime": "2023-10-30T14:11:05.909055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8989], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. ", "ContentType": "text/plain"}], "uids": ["CO72sdMoCneDre3p"]} -{"Format": "IDEA0", "ID": "a8da64d1-82bb-4941-b2b6-220fb86ef1c8", "DetectTime": "2023-10-30T14:11:05.934614+02:00", "EventTime": "2023-10-30T14:11:05.934633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CwFx7m19K0kGQzPxF5"]} -{"Format": "IDEA0", "ID": "19b85003-eba5-4b4a-a57c-77d86a314377", "DetectTime": "2023-10-30T14:11:05.955161+02:00", "EventTime": "2023-10-30T14:11:05.955173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C42cHA2e4VUawvj4k"]} -{"Format": "IDEA0", "ID": "adfab1c4-b6d6-4919-b958-a5cd3c921513", "DetectTime": "2023-10-30T14:11:05.979097+02:00", "EventTime": "2023-10-30T14:11:05.979114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C4LNWl2XIw2TiD95M3"]} -{"Format": "IDEA0", "ID": "4f8ab919-7614-4a8d-af39-e7361530f0c9", "DetectTime": "2023-10-30T14:11:06.004650+02:00", "EventTime": "2023-10-30T14:11:06.004666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CLnkXu39Wmb33mtHwg"]} -{"Format": "IDEA0", "ID": "a73841cc-3bcc-49d9-bffa-26f3467583b0", "DetectTime": "2023-10-30T14:11:06.027396+02:00", "EventTime": "2023-10-30T14:11:06.027411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CCQIVgUknC2WvS3z9"]} -{"Format": "IDEA0", "ID": "e68b0ce8-5551-40d8-b9e4-e098912bb141", "DetectTime": "2023-10-30T14:11:06.050541+02:00", "EventTime": "2023-10-30T14:11:06.050553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJqAXM2j3p2UZD6VCe"]} -{"Format": "Json", "ID": "e68b0ce8-5551-40d8-b9e4-e098912bb141", "DetectTime": "2023-10-30T14:11:06.050541+02:00", "EventTime": "2023-10-30T14:11:06.050553+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T15:51:25.337143+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2023/10/30 14:11:06.110552)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ec3bd77f-0157-4ac0-a3cf-550a05d7dce0", "DetectTime": "2023-10-30T14:11:06.115354+02:00", "EventTime": "2023-10-30T14:11:06.115379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4j73gM6RXk2eI71j"]} -{"Format": "IDEA0", "ID": "c4e12b13-b2ef-4d0a-8951-1d19a73c8191", "DetectTime": "2023-10-30T14:11:06.137628+02:00", "EventTime": "2023-10-30T14:11:06.137643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CWLKsv23B5TlOMUNX3"]} -{"Format": "IDEA0", "ID": "a8fd4ab4-bab0-467c-b874-7dcdd1f0279a", "DetectTime": "2023-10-30T14:11:06.168656+02:00", "EventTime": "2023-10-30T14:11:06.168668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CzAmzF1EmIrcH6dw1f"]} -{"Format": "IDEA0", "ID": "11e2640f-e2a7-4960-b777-b8c8e30a44c8", "DetectTime": "2023-10-30T14:11:06.206118+02:00", "EventTime": "2023-10-30T14:11:06.206135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CNi6D54cfLhwDzGeb6"]} -{"Format": "IDEA0", "ID": "4239fe45-b804-48fb-bc5e-2f648659a38e", "DetectTime": "2023-10-30T14:11:06.251163+02:00", "EventTime": "2023-10-30T14:11:06.251175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C9h5yo2Dykj0vYkuIe"]} -{"Format": "IDEA0", "ID": "5e0c33cf-9b62-410a-96f5-9e735f40ce47", "DetectTime": "2023-10-30T14:11:06.295902+02:00", "EventTime": "2023-10-30T14:11:06.295914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CnzO7q3gYmUfR7HTb2"]} -{"Format": "IDEA0", "ID": "3d2f4ff1-5f25-4c5e-b486-9765135d5205", "DetectTime": "2023-10-30T14:11:06.336289+02:00", "EventTime": "2023-10-30T14:11:06.336306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CF0Ay73AXt1tMUfWBf"]} -{"Format": "IDEA0", "ID": "e7992615-4369-4a78-8474-e828a7c27cdb", "DetectTime": "2023-10-30T14:11:06.376672+02:00", "EventTime": "2023-10-30T14:11:06.376685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["Ct4ZICuTkW04HMwz1"]} -{"Format": "IDEA0", "ID": "5c69a59b-eb0f-4d0d-8f73-220c4dad0764", "DetectTime": "2023-10-30T14:11:06.419997+02:00", "EventTime": "2023-10-30T14:11:06.420012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CUOGUNvhHiTvC6LQi"]} -{"Format": "Json", "ID": "5c69a59b-eb0f-4d0d-8f73-220c4dad0764", "DetectTime": "2023-10-30T14:11:06.419997+02:00", "EventTime": "2023-10-30T14:11:06.420012+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:22:00.555292+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:06.513166)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b1646a6d-355a-4839-af60-531f49b28ccd", "DetectTime": "2023-10-30T14:11:06.518695+02:00", "EventTime": "2023-10-30T14:11:06.518713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CXDGLdu9wFlW9HZra"]} -{"Format": "IDEA0", "ID": "cfb3f257-41da-48ab-bdc8-6a047a92a0c8", "DetectTime": "2023-10-30T14:11:06.559446+02:00", "EventTime": "2023-10-30T14:11:06.559465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CN7W891TTz8oRG4e9c"]} -{"Format": "IDEA0", "ID": "4dfa5789-c092-4f16-87ae-b1f5b4fe5e88", "DetectTime": "2023-10-30T14:11:06.600562+02:00", "EventTime": "2023-10-30T14:11:06.600578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CrqF8E4u5nGKL2N0dk"]} -{"Format": "IDEA0", "ID": "2f59515f-d0b2-4a3b-8c60-a23e1341d881", "DetectTime": "2023-10-30T14:11:06.639355+02:00", "EventTime": "2023-10-30T14:11:06.639385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C0cf7y1nQOXBJBNEe4"]} -{"Format": "IDEA0", "ID": "6ca7ef23-452d-4a90-93aa-35f9789efe36", "DetectTime": "2023-10-30T14:11:06.675072+02:00", "EventTime": "2023-10-30T14:11:06.675084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C91hvB21u6vMRMkjUd"]} -{"Format": "IDEA0", "ID": "0fef01c1-f707-4d23-a1ec-121fa4489c90", "DetectTime": "2023-10-30T14:11:06.712873+02:00", "EventTime": "2023-10-30T14:11:06.712884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cz1Nus2df5RrVBSF46"]} -{"Format": "IDEA0", "ID": "1394cb4e-505b-41fa-bad9-3ec0b1f9d9a5", "DetectTime": "2023-10-30T14:11:06.753426+02:00", "EventTime": "2023-10-30T14:11:06.753442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["COU4YbNPXTzBsDQXa"]} -{"Format": "IDEA0", "ID": "d11ed10b-5858-4de6-b5ac-6d942a53e1a6", "DetectTime": "2023-10-30T14:11:06.789302+02:00", "EventTime": "2023-10-30T14:11:06.789313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cb9KL91ixFQwkTRLXb"]} -{"Format": "Json", "ID": "d11ed10b-5858-4de6-b5ac-6d942a53e1a6", "DetectTime": "2023-10-30T14:11:06.789302+02:00", "EventTime": "2023-10-30T14:11:06.789313+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:22:02.361315+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:06.867028)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "66df7366-fc81-4db6-904f-13168072a349", "DetectTime": "2023-10-30T14:11:06.872292+02:00", "EventTime": "2023-10-30T14:11:06.872309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CVjOIYyaFZhy53WYe"]} -{"Format": "IDEA0", "ID": "c79e4d1a-f046-4e7b-a537-e3c3f0ba2d78", "DetectTime": "2023-10-30T14:11:06.909692+02:00", "EventTime": "2023-10-30T14:11:06.909705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C0wI2c2I1W1zoTMena"]} -{"Format": "IDEA0", "ID": "60b322e8-ad29-4626-b95e-1b3b82970609", "DetectTime": "2023-10-30T14:11:06.944741+02:00", "EventTime": "2023-10-30T14:11:06.944757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cg7rzn2sRi2orDowLc"]} -{"Format": "IDEA0", "ID": "94e20c37-0099-4421-a2b7-a43823ce067f", "DetectTime": "2023-10-30T14:11:06.983689+02:00", "EventTime": "2023-10-30T14:11:06.983704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CBRa7G3tKeCJQ3hqyj"]} -{"Format": "IDEA0", "ID": "32f63b14-4b9d-440c-a4b7-bc0dab3bc5ac", "DetectTime": "2023-10-30T14:11:07.020629+02:00", "EventTime": "2023-10-30T14:11:07.020655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNnKqdExelpbIoUcf"]} -{"Format": "IDEA0", "ID": "75451c55-da96-4e86-8af3-9cf9fffc6363", "DetectTime": "2023-10-30T14:11:07.057319+02:00", "EventTime": "2023-10-30T14:11:07.057329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CZRlbj4kdAeYttdZKh"]} -{"Format": "IDEA0", "ID": "da0580a7-3722-4a52-8da8-6b6c987d718b", "DetectTime": "2023-10-30T14:11:07.088643+02:00", "EventTime": "2023-10-30T14:11:07.088655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["Ca5zN8P4OsY6ik2s"]} -{"Format": "IDEA0", "ID": "8a1efb7c-9560-4c25-b0bd-fc74098652e6", "DetectTime": "2023-10-30T14:11:07.123618+02:00", "EventTime": "2023-10-30T14:11:07.123635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CTOiGGi7AjxxYXtSa"]} -{"Format": "Json", "ID": "8a1efb7c-9560-4c25-b0bd-fc74098652e6", "DetectTime": "2023-10-30T14:11:07.123618+02:00", "EventTime": "2023-10-30T14:11:07.123635+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:22:04.104188+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:07.193809)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "505f01b2-beeb-4762-9914-48b301fb5bb0", "DetectTime": "2023-10-30T14:11:07.198952+02:00", "EventTime": "2023-10-30T14:11:07.198968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CNQdYk2V8Pubgy32Qa"]} -{"Format": "IDEA0", "ID": "89f029c5-a605-4610-9cc0-ab9d2a7ad9eb", "DetectTime": "2023-10-30T14:11:07.232783+02:00", "EventTime": "2023-10-30T14:11:07.232811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CZcaq54ThA585qqWyi"]} -{"Format": "IDEA0", "ID": "c84b677f-3394-4897-ad7a-581d8bc08e73", "DetectTime": "2023-10-30T14:11:07.269675+02:00", "EventTime": "2023-10-30T14:11:07.269692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["C7l0yK39rbJN0JQRli"]} -{"Format": "IDEA0", "ID": "de245f44-6a55-4f8a-83d9-9771fd558cd2", "DetectTime": "2023-10-30T14:11:07.302619+02:00", "EventTime": "2023-10-30T14:11:07.302647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C2aZGAIEpvAKZSvC6"]} -{"Format": "IDEA0", "ID": "8aaa9cc0-8e86-4245-876a-3ad9ba77d5a4", "DetectTime": "2023-10-30T14:11:07.336373+02:00", "EventTime": "2023-10-30T14:11:07.336389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CuKdWU191zkl3NIPG5"]} -{"Format": "IDEA0", "ID": "738e0f2a-95d0-495d-ac0d-226bec008cb4", "DetectTime": "2023-10-30T14:11:07.369138+02:00", "EventTime": "2023-10-30T14:11:07.369155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C8Ey2J2ReiQnpzZhbc"]} -{"Format": "IDEA0", "ID": "4f2c81be-8a5a-431a-8303-ae625f22ab11", "DetectTime": "2023-10-30T14:11:07.402462+02:00", "EventTime": "2023-10-30T14:11:07.402474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CFAA343SFzsIRzHWki"]} -{"Format": "IDEA0", "ID": "c0288ff1-2785-4552-b071-c18b4131a063", "DetectTime": "2023-10-30T14:11:07.435967+02:00", "EventTime": "2023-10-30T14:11:07.435981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C6owfZ2zVtPJ41Oq3"]} -{"Format": "Json", "ID": "c0288ff1-2785-4552-b071-c18b4131a063", "DetectTime": "2023-10-30T14:11:07.435967+02:00", "EventTime": "2023-10-30T14:11:07.435981+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:22:41.213768+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:07.508416)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a8e2a179-3083-4ddb-9aa2-52ec2791db16", "DetectTime": "2023-10-30T14:11:07.513772+02:00", "EventTime": "2023-10-30T14:11:07.513788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CxUmhi47bt5L3OCa0b"]} -{"Format": "IDEA0", "ID": "ae8b7a2d-c9ba-49d9-b4a0-54bab2a310ce", "DetectTime": "2023-10-30T14:11:07.546256+02:00", "EventTime": "2023-10-30T14:11:07.546267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cz4V4p48yTjUzQ0Tqj"]} -{"Format": "IDEA0", "ID": "0ecfa731-2380-4c83-8a0b-8150911f7c7a", "DetectTime": "2023-10-30T14:11:07.578590+02:00", "EventTime": "2023-10-30T14:11:07.578601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CqOxIj2Ju5g8U4ry85"]} -{"Format": "IDEA0", "ID": "1ba3dda0-4682-4618-9f3a-463feef4b161", "DetectTime": "2023-10-30T14:11:07.609379+02:00", "EventTime": "2023-10-30T14:11:07.609390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CUSoV8n3eIxKH9obh"]} -{"Format": "IDEA0", "ID": "e831e634-28ba-4153-9f4d-1c1723da1cf7", "DetectTime": "2023-10-30T14:11:07.643019+02:00", "EventTime": "2023-10-30T14:11:07.643036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CIKo5E2s7qPEwGUjef"]} -{"Format": "IDEA0", "ID": "104c1c67-4eb2-4c3f-baae-383fc7d6c30c", "DetectTime": "2023-10-30T14:11:07.677903+02:00", "EventTime": "2023-10-30T14:11:07.677917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJZa0718W6r8uBJfEg"]} -{"Format": "IDEA0", "ID": "b9f0bc79-9552-4897-80e2-34c6018b4bd4", "DetectTime": "2023-10-30T14:11:07.711869+02:00", "EventTime": "2023-10-30T14:11:07.711881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CJawd22o0yj3lwDfgj"]} -{"Format": "IDEA0", "ID": "d4c93732-395a-464e-a06f-28fb514bc51d", "DetectTime": "2023-10-30T14:11:07.742566+02:00", "EventTime": "2023-10-30T14:11:07.742578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CABRQb2VyhnAhJKiVg"]} -{"Format": "Json", "ID": "d4c93732-395a-464e-a06f-28fb514bc51d", "DetectTime": "2023-10-30T14:11:07.742566+02:00", "EventTime": "2023-10-30T14:11:07.742578+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:53:24.701624+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:07.810243)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b27c83d1-31fe-406a-aa26-be8c411c51c0", "DetectTime": "2023-10-30T14:11:07.814564+02:00", "EventTime": "2023-10-30T14:11:07.814580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C76hih2xUfj8gZJWvj"]} -{"Format": "IDEA0", "ID": "16144c72-0e0c-42ff-a919-bc2c0a881195", "DetectTime": "2023-10-30T14:11:07.845728+02:00", "EventTime": "2023-10-30T14:11:07.845745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CZitnr1i9M95d4nS4j"]} -{"Format": "IDEA0", "ID": "64f17809-78e0-4a82-a9e8-c282aed68617", "DetectTime": "2023-10-30T14:11:07.878102+02:00", "EventTime": "2023-10-30T14:11:07.878114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CVF0gM1WwKblIRMlUc"]} -{"Format": "IDEA0", "ID": "4b84bcaa-a6b3-4236-8f44-385a32876da7", "DetectTime": "2023-10-30T14:11:07.905441+02:00", "EventTime": "2023-10-30T14:11:07.905459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CtMJjgGEFlzdVaNv5"]} -{"Format": "IDEA0", "ID": "a3ed51d9-f8c1-47f5-824c-42fad8217bfc", "DetectTime": "2023-10-30T14:11:07.933128+02:00", "EventTime": "2023-10-30T14:11:07.933146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3735], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. ", "ContentType": "text/plain"}], "uids": ["CTs0IXwUNxn6FCyI"]} -{"Format": "IDEA0", "ID": "e90b2c62-19b3-49d6-ae46-dae0dab28b7b", "DetectTime": "2023-10-30T14:11:07.961449+02:00", "EventTime": "2023-10-30T14:11:07.961468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CN6RCl28pysv9J06X5"]} -{"Format": "IDEA0", "ID": "4aab1419-f1d7-41f5-9fa4-ed495e5b57ea", "DetectTime": "2023-10-30T14:11:07.992067+02:00", "EventTime": "2023-10-30T14:11:07.992078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["Cu4jbz4CuaIBhO8tWe"]} -{"Format": "IDEA0", "ID": "65d4d6a6-61da-4e02-9a6b-f75ff3b1de95", "DetectTime": "2023-10-30T14:11:08.021452+02:00", "EventTime": "2023-10-30T14:11:08.021467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Cyerim459H2DH3uWJj"]} -{"Format": "IDEA0", "ID": "14e53a8b-e925-45ed-9df5-53639f68170a", "DetectTime": "2023-10-30T14:11:08.049565+02:00", "EventTime": "2023-10-30T14:11:08.049584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYRLng3sWk7S7OE6Wb"]} -{"Format": "Json", "ID": "14e53a8b-e925-45ed-9df5-53639f68170a", "DetectTime": "2023-10-30T14:11:08.049565+02:00", "EventTime": "2023-10-30T14:11:08.049584+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:53:26.286035+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:08.120441)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e76bfc71-04f5-45af-8e43-08d449a45baf", "DetectTime": "2023-10-30T14:11:08.124688+02:00", "EventTime": "2023-10-30T14:11:08.124702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CajD943Nt7Xn9PTtG8"]} -{"Format": "IDEA0", "ID": "ad342131-1a06-4490-8bcc-f55b3b5ec36a", "DetectTime": "2023-10-30T14:11:08.152355+02:00", "EventTime": "2023-10-30T14:11:08.152368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CBBaYf2t7aZzkHPiNd"]} -{"Format": "IDEA0", "ID": "a8a54de8-9ae2-4c29-bcf7-69d9028ac18c", "DetectTime": "2023-10-30T14:11:08.179441+02:00", "EventTime": "2023-10-30T14:11:08.179453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C6SBzv327TnFQPyPMf"]} -{"Format": "IDEA0", "ID": "895a37f5-e601-4e85-8a59-64ca281ee8e1", "DetectTime": "2023-10-30T14:11:08.209400+02:00", "EventTime": "2023-10-30T14:11:08.209418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C4u4bxwMCKgAD4EL5"]} -{"Format": "IDEA0", "ID": "30027d1d-40de-4c52-92f1-71259c6e8f30", "DetectTime": "2023-10-30T14:11:08.236840+02:00", "EventTime": "2023-10-30T14:11:08.236851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CDWZAflKaKi5Eecui"]} -{"Format": "IDEA0", "ID": "d9f2341d-c034-4b25-a6a2-0b3a374cedbb", "DetectTime": "2023-10-30T14:11:08.263563+02:00", "EventTime": "2023-10-30T14:11:08.263578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CCjb6W3Qtzbmfmbdmi"]} -{"Format": "IDEA0", "ID": "99b42356-7122-4806-b84c-ef734b3474f5", "DetectTime": "2023-10-30T14:11:08.292576+02:00", "EventTime": "2023-10-30T14:11:08.292591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CeQPho1zIALvWUjNic"]} -{"Format": "IDEA0", "ID": "84be5db4-ab15-4ea7-ab75-2d0b09edbe90", "DetectTime": "2023-10-30T14:11:08.321400+02:00", "EventTime": "2023-10-30T14:11:08.321416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CeVpVF1XPxJFONJF4i"]} -{"Format": "Json", "ID": "84be5db4-ab15-4ea7-ab75-2d0b09edbe90", "DetectTime": "2023-10-30T14:11:08.321400+02:00", "EventTime": "2023-10-30T14:11:08.321416+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:53:28.106165+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:08.386426)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8f17352-ccde-4679-8188-1d9e357b0e4a", "DetectTime": "2023-10-30T14:11:08.390738+02:00", "EventTime": "2023-10-30T14:11:08.390763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLRwer1UtQFbzCFgb3"]} -{"Format": "IDEA0", "ID": "6477aa3f-55e2-475a-9265-62d55dbf44a0", "DetectTime": "2023-10-30T14:11:08.417211+02:00", "EventTime": "2023-10-30T14:11:08.417229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Ceunur26h1Oqsv4py9"]} -{"Format": "IDEA0", "ID": "20a4cb8c-d3ba-48e2-a89c-42f1a981b7bc", "DetectTime": "2023-10-30T14:11:08.443752+02:00", "EventTime": "2023-10-30T14:11:08.443765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CENKNx3bzBoU4WEPr3"]} -{"Format": "IDEA0", "ID": "01fe31af-d1cf-43f7-b0f2-c076a52f9bac", "DetectTime": "2023-10-30T14:11:08.469846+02:00", "EventTime": "2023-10-30T14:11:08.469861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6afnC1dkRrXm8Zql8"]} -{"Format": "IDEA0", "ID": "25f72e4f-44ab-46eb-95d7-21a50c154b22", "DetectTime": "2023-10-30T14:11:08.501017+02:00", "EventTime": "2023-10-30T14:11:08.501042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["CnKDqr4KX7J1WetNc3"]} -{"Format": "IDEA0", "ID": "ac90f64c-6fcd-4ec0-9bb5-f30d225f7f5d", "DetectTime": "2023-10-30T14:11:08.527110+02:00", "EventTime": "2023-10-30T14:11:08.527123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C0SP7W3cjCcLd0kt11"]} -{"Format": "IDEA0", "ID": "be1bb90a-35b9-4e9b-8e61-5c2ed75655d9", "DetectTime": "2023-10-30T14:11:08.552255+02:00", "EventTime": "2023-10-30T14:11:08.552269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CDzVAu4xgHwsBPMdRl"]} -{"Format": "IDEA0", "ID": "d7181577-6d13-4476-95fc-f9e017281d8b", "DetectTime": "2023-10-30T14:11:08.580958+02:00", "EventTime": "2023-10-30T14:11:08.580975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cnm2M3IvEcSPPWSm9"]} -{"Format": "Json", "ID": "d7181577-6d13-4476-95fc-f9e017281d8b", "DetectTime": "2023-10-30T14:11:08.580958+02:00", "EventTime": "2023-10-30T14:11:08.580975+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:53:29.934775+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:08.653791)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b2bfd4b-0df1-4bc8-a3b4-3a403266d5ed", "DetectTime": "2023-10-30T14:11:08.656987+02:00", "EventTime": "2023-10-30T14:11:08.656998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CjASsB4K36GJi40jL"]} -{"Format": "IDEA0", "ID": "c6c46b79-a43f-4871-b530-fe37827ddb9a", "DetectTime": "2023-10-30T14:11:08.684246+02:00", "EventTime": "2023-10-30T14:11:08.684263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["CcAiS12lbRUKw3agA4"]} -{"Format": "IDEA0", "ID": "b981ce2b-cad9-440b-b18a-e8e763d7dce1", "DetectTime": "2023-10-30T14:11:08.706821+02:00", "EventTime": "2023-10-30T14:11:08.706847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cu9Nub1rFPiWrxBZb"]} -{"Format": "IDEA0", "ID": "a369623c-533f-475b-a0cf-e17bd79d47a3", "DetectTime": "2023-10-30T14:11:08.733460+02:00", "EventTime": "2023-10-30T14:11:08.733474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CQj2FS3BDSHO3NKZsc"]} -{"Format": "IDEA0", "ID": "2128e677-1e9f-48ca-a060-41eda13a452a", "DetectTime": "2023-10-30T14:11:08.760493+02:00", "EventTime": "2023-10-30T14:11:08.760509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C8ejkbhw0okQXWSMf"]} -{"Format": "IDEA0", "ID": "4eea0d83-28d6-47db-9c8e-5f093e07a057", "DetectTime": "2023-10-30T14:11:08.786018+02:00", "EventTime": "2023-10-30T14:11:08.786037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CEE9iErBESXAKDuz9"]} -{"Format": "IDEA0", "ID": "2add16ff-b263-4da2-8fd5-1622f5f8550a", "DetectTime": "2023-10-30T14:11:08.811962+02:00", "EventTime": "2023-10-30T14:11:08.811977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCwmrP04qTYhoWFd2"]} -{"Format": "IDEA0", "ID": "296714b4-845f-4fbd-ab38-011ab26146c4", "DetectTime": "2023-10-30T14:11:08.835198+02:00", "EventTime": "2023-10-30T14:11:08.835214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CX1mjD3TRyYqB485cb"]} -{"Format": "Json", "ID": "296714b4-845f-4fbd-ab38-011ab26146c4", "DetectTime": "2023-10-30T14:11:08.835198+02:00", "EventTime": "2023-10-30T14:11:08.835214+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T16:53:31.827874+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2023/10/30 14:11:08.895890)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "967f4fc2-c642-4500-b249-e839d9285a28", "DetectTime": "2023-10-30T14:11:08.900636+02:00", "EventTime": "2023-10-30T14:11:08.900647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cl22Bd3WNWgBAvT9Pg"]} -{"Format": "IDEA0", "ID": "77f1ab41-9b5b-4728-9178-46834d36d43e", "DetectTime": "2023-10-30T14:11:08.922566+02:00", "EventTime": "2023-10-30T14:11:08.922577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cg0E7a1jzGAxuTp58k"]} -{"Format": "IDEA0", "ID": "a761ac7e-8a39-4bfe-aeac-79854ca64ed5", "DetectTime": "2023-10-30T14:11:08.945496+02:00", "EventTime": "2023-10-30T14:11:08.945510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CI7yBv3f43zwQ4Jmj4"]} -{"Format": "IDEA0", "ID": "fb867614-2eb1-46ae-9c4a-2cb2348655a3", "DetectTime": "2023-10-30T14:11:08.965870+02:00", "EventTime": "2023-10-30T14:11:08.965895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CwCEXf1t9AAAMQvTmj"]} -{"Format": "IDEA0", "ID": "bdcc84b3-eeb6-4c79-a3e0-2c7158343964", "DetectTime": "2023-10-30T14:11:08.987472+02:00", "EventTime": "2023-10-30T14:11:08.987489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuCp5o3ai4nO848Rc4"]} -{"Format": "IDEA0", "ID": "fd714ab1-7965-4ce0-8970-02a00075c007", "DetectTime": "2023-10-30T14:11:09.008611+02:00", "EventTime": "2023-10-30T14:11:09.008623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Czedj03P1Gl7QOajPi"]} -{"Format": "IDEA0", "ID": "4e1db196-68dd-4f28-ab39-433600da8051", "DetectTime": "2023-10-30T14:11:09.044836+02:00", "EventTime": "2023-10-30T14:11:09.044852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CPEI1n2F8eiEqqqJma"]} -{"Format": "IDEA0", "ID": "fd6f796e-edc1-48b9-acca-7ab1d2b20393", "DetectTime": "2023-10-30T14:11:09.085202+02:00", "EventTime": "2023-10-30T14:11:09.085219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CEcRHX1zePvkhsO8T8"]} -{"Format": "IDEA0", "ID": "5f5537f6-8ec1-4ff9-84b7-bfcdd8c4b037", "DetectTime": "2023-10-30T14:11:09.123844+02:00", "EventTime": "2023-10-30T14:11:09.123860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["CooF3F4gsVTq8MQd7"]} -{"Format": "IDEA0", "ID": "669e28e4-f9db-4596-8310-2bb05211ca6a", "DetectTime": "2023-10-30T14:11:09.164079+02:00", "EventTime": "2023-10-30T14:11:09.164090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C8VSnN28c0qdEtUWN5"]} -{"Format": "IDEA0", "ID": "15dee009-8669-4068-bad6-b6cf5df47d45", "DetectTime": "2023-10-30T14:11:09.205022+02:00", "EventTime": "2023-10-30T14:11:09.205039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CEDJQB2vZ4aRO0LSc9"]} -{"Format": "IDEA0", "ID": "98d1874a-8267-4802-9af3-f3eb5520ee3c", "DetectTime": "2023-10-30T14:11:09.237413+02:00", "EventTime": "2023-10-30T14:11:09.237424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CT5rFW25m2h6QJbgRc"]} -{"Format": "IDEA0", "ID": "090990c8-4621-4113-a25a-f25cd0f0ae7e", "DetectTime": "2023-10-30T14:11:09.275973+02:00", "EventTime": "2023-10-30T14:11:09.275986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CpZjIx4zfjpVEArB2"]} -{"Format": "Json", "ID": "090990c8-4621-4113-a25a-f25cd0f0ae7e", "DetectTime": "2023-10-30T14:11:09.275973+02:00", "EventTime": "2023-10-30T14:11:09.275986+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:24:22.648926+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:09.364102)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b902cb31-ad73-4fcc-beec-d4a1cafb3c63", "DetectTime": "2023-10-30T14:11:09.369119+02:00", "EventTime": "2023-10-30T14:11:09.369132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cwz13h2kanmKkdK8h8"]} -{"Format": "IDEA0", "ID": "7b3238b6-0501-4c82-8acb-b05bb20a154a", "DetectTime": "2023-10-30T14:11:09.407464+02:00", "EventTime": "2023-10-30T14:11:09.407476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CPr4A24dSSLnM1Nugd"]} -{"Format": "IDEA0", "ID": "2cd7d504-e2e1-4c49-89df-44d384128484", "DetectTime": "2023-10-30T14:11:09.444235+02:00", "EventTime": "2023-10-30T14:11:09.444263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CVtU9E37eGsZUizjR5"]} -{"Format": "IDEA0", "ID": "b15528e8-ed55-44ea-b80a-4210f69064cd", "DetectTime": "2023-10-30T14:11:09.480099+02:00", "EventTime": "2023-10-30T14:11:09.480110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["ClJXjf3oMMTcw9ng0a"]} -{"Format": "IDEA0", "ID": "3f865551-baff-4987-915c-e05c2c5eeacd", "DetectTime": "2023-10-30T14:11:09.517779+02:00", "EventTime": "2023-10-30T14:11:09.517792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CBxCSsR2iGuxasnti"]} -{"Format": "IDEA0", "ID": "63c7498f-4b2e-42a4-a949-561db1fcd5a2", "DetectTime": "2023-10-30T14:11:09.557126+02:00", "EventTime": "2023-10-30T14:11:09.557144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CsUh911LgA4Ka3mdWk"]} -{"Format": "IDEA0", "ID": "f4104436-e3e3-4b5c-9377-9b2ce814cce4", "DetectTime": "2023-10-30T14:11:09.592210+02:00", "EventTime": "2023-10-30T14:11:09.592221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CJLFw63vupiJNdIbu5"]} -{"Format": "IDEA0", "ID": "4def271e-6acf-4bc7-8a29-54f86de8c45a", "DetectTime": "2023-10-30T14:11:09.629559+02:00", "EventTime": "2023-10-30T14:11:09.629575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CzTRjy4yqBVp3hsfX8"]} -{"Format": "Json", "ID": "4def271e-6acf-4bc7-8a29-54f86de8c45a", "DetectTime": "2023-10-30T14:11:09.629559+02:00", "EventTime": "2023-10-30T14:11:09.629575+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:24:24.530063+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:09.700363)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f2617fd2-9764-4dc9-b4a4-3791d7354eed", "DetectTime": "2023-10-30T14:11:09.704937+02:00", "EventTime": "2023-10-30T14:11:09.704950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cj1AgM1Y9SyFxnbiC5"]} -{"Format": "IDEA0", "ID": "d14d7e62-e788-4611-b3c3-bd80b28eca29", "DetectTime": "2023-10-30T14:11:09.741486+02:00", "EventTime": "2023-10-30T14:11:09.741502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CrImrg2CKd2Rg6AaWk"]} -{"Format": "IDEA0", "ID": "01dc621f-7b7e-4f52-86dc-32370efe3bac", "DetectTime": "2023-10-30T14:11:09.779391+02:00", "EventTime": "2023-10-30T14:11:09.779409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CaVZE54m9uFu5YJwz"]} -{"Format": "IDEA0", "ID": "89984678-e8ca-4a32-abd5-627853be8957", "DetectTime": "2023-10-30T14:11:09.815153+02:00", "EventTime": "2023-10-30T14:11:09.815171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9661], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. ", "ContentType": "text/plain"}], "uids": ["Ch7NLU37e6Vyf0P7Fi"]} -{"Format": "IDEA0", "ID": "80e94be2-ab8e-496b-995d-040bb7e3047d", "DetectTime": "2023-10-30T14:11:09.852250+02:00", "EventTime": "2023-10-30T14:11:09.852270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CwoTqdxMzaFyy9YCf"]} -{"Format": "IDEA0", "ID": "35ca290a-9e82-4698-958a-8dda21298dd3", "DetectTime": "2023-10-30T14:11:09.886201+02:00", "EventTime": "2023-10-30T14:11:09.886214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CtM2dt3eB8Gd9kNs7"]} -{"Format": "IDEA0", "ID": "a5e8a4af-3b1d-4a54-81c5-7cf9dd1671a7", "DetectTime": "2023-10-30T14:11:09.918138+02:00", "EventTime": "2023-10-30T14:11:09.918154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C0S2TB3KnoAF01MHj7"]} -{"Format": "IDEA0", "ID": "d18c3287-cce2-4f70-a9e3-491646e5a06c", "DetectTime": "2023-10-30T14:11:09.954794+02:00", "EventTime": "2023-10-30T14:11:09.954811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ChAWLATKONUD9sil8"]} -{"Format": "Json", "ID": "d18c3287-cce2-4f70-a9e3-491646e5a06c", "DetectTime": "2023-10-30T14:11:09.954794+02:00", "EventTime": "2023-10-30T14:11:09.954811+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:24:26.427210+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:10.033775)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1d27adde-003f-408a-a0b2-bae166812c44", "DetectTime": "2023-10-30T14:11:10.039135+02:00", "EventTime": "2023-10-30T14:11:10.039151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [15517], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. ", "ContentType": "text/plain"}], "uids": ["Cvg7Rl14ueSSHRF3Vj"]} -{"Format": "IDEA0", "ID": "f9f79ca1-c067-4205-a1ac-cb5f94b05568", "DetectTime": "2023-10-30T14:11:10.073160+02:00", "EventTime": "2023-10-30T14:11:10.073172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CNoQMf3lphMqUSCTCb"]} -{"Format": "IDEA0", "ID": "f9ba101d-a495-4820-8586-894b1a12f921", "DetectTime": "2023-10-30T14:11:10.103517+02:00", "EventTime": "2023-10-30T14:11:10.103528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cg1cZP3aDzJgbXH14j"]} -{"Format": "IDEA0", "ID": "f350058c-2037-4a5b-a063-95dffbbd6bd2", "DetectTime": "2023-10-30T14:11:10.136987+02:00", "EventTime": "2023-10-30T14:11:10.137002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CKevr31y2Le0kw7KAc"]} -{"Format": "IDEA0", "ID": "608b60fd-145b-4998-a42b-1794c75f8da8", "DetectTime": "2023-10-30T14:11:10.176722+02:00", "EventTime": "2023-10-30T14:11:10.176738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CTLHBm4WX07nQ7FLe"]} -{"Format": "IDEA0", "ID": "41305f85-ad66-4b4a-85d7-e32db38da3b2", "DetectTime": "2023-10-30T14:11:10.217866+02:00", "EventTime": "2023-10-30T14:11:10.217894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CSRrPbNxUBSV1jKs9"]} -{"Format": "IDEA0", "ID": "2618f43e-2d94-4c95-a86a-1e35b3e52631", "DetectTime": "2023-10-30T14:11:10.255315+02:00", "EventTime": "2023-10-30T14:11:10.255333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CODyFa3yg3J1JVBHe8"]} -{"Format": "IDEA0", "ID": "80402521-6175-4448-b01b-d0007af711c7", "DetectTime": "2023-10-30T14:11:10.286428+02:00", "EventTime": "2023-10-30T14:11:10.286444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CNDIeF3CrBukW0ggSj"]} -{"Format": "Json", "ID": "80402521-6175-4448-b01b-d0007af711c7", "DetectTime": "2023-10-30T14:11:10.286428+02:00", "EventTime": "2023-10-30T14:11:10.286444+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:24:28.364275+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:10.361161)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "41ecb60b-c8a8-439f-94a1-c451cce78f86", "DetectTime": "2023-10-30T14:11:10.365644+02:00", "EventTime": "2023-10-30T14:11:10.365662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CZaVe61DayyAkeJvg"]} -{"Format": "IDEA0", "ID": "17e91227-580b-4d4b-9f1d-752f915cc6c1", "DetectTime": "2023-10-30T14:11:10.397894+02:00", "EventTime": "2023-10-30T14:11:10.397910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CD0nu52obHpmbO6a31"]} -{"Format": "IDEA0", "ID": "99548124-d1e4-4f89-b313-5702ed09d642", "DetectTime": "2023-10-30T14:11:10.430819+02:00", "EventTime": "2023-10-30T14:11:10.430836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["COxeFY14ht6X7oyLy8"]} -{"Format": "IDEA0", "ID": "ffbd723d-de98-480c-a671-32228c0485e3", "DetectTime": "2023-10-30T14:11:10.462722+02:00", "EventTime": "2023-10-30T14:11:10.462734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C7x5Y31tP61kjOobma"]} -{"Format": "IDEA0", "ID": "5f14fb3b-403d-4836-b804-9c14427a1208", "DetectTime": "2023-10-30T14:11:10.496434+02:00", "EventTime": "2023-10-30T14:11:10.496452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CzGlP7BpX2HOK7I8h"]} -{"Format": "IDEA0", "ID": "f3a1ac14-0d57-4c0a-9feb-3153fc7719da", "DetectTime": "2023-10-30T14:11:10.528757+02:00", "EventTime": "2023-10-30T14:11:10.528785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZdwmSExZGy7fR8sj"]} -{"Format": "IDEA0", "ID": "775f7c8d-c90d-4bdd-88f5-00a4d6865ec0", "DetectTime": "2023-10-30T14:11:10.561536+02:00", "EventTime": "2023-10-30T14:11:10.561549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CQD0F61SWc3EuLYF3c"]} -{"Format": "IDEA0", "ID": "6fb40237-b554-4110-a48d-d5482f3d01f9", "DetectTime": "2023-10-30T14:11:10.593542+02:00", "EventTime": "2023-10-30T14:11:10.593553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CvFqTa1Jnk0hiyp4c"]} -{"Format": "IDEA0", "ID": "a2a872b9-6322-48e7-a65e-d22b3352b76c", "DetectTime": "2023-10-30T14:11:10.626263+02:00", "EventTime": "2023-10-30T14:11:10.626274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CJpjBTZoMM6462Tg6"]} -{"Format": "Json", "ID": "a2a872b9-6322-48e7-a65e-d22b3352b76c", "DetectTime": "2023-10-30T14:11:10.626263+02:00", "EventTime": "2023-10-30T14:11:10.626274+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:55:00.519798+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:10.694231)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e4aa5022-98fe-431b-8dee-536a5aa56ed4", "DetectTime": "2023-10-30T14:11:10.699454+02:00", "EventTime": "2023-10-30T14:11:10.699470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C4Y8jT1lo1fw0pxr2"]} -{"Format": "IDEA0", "ID": "b8d46ead-4dcb-48c3-8878-4fb36a52980c", "DetectTime": "2023-10-30T14:11:10.729167+02:00", "EventTime": "2023-10-30T14:11:10.729179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2982], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. ", "ContentType": "text/plain"}], "uids": ["C1d5zt1MV3LKQg4Jgd"]} -{"Format": "IDEA0", "ID": "7efb2942-9c4c-410b-9184-98c7755805e1", "DetectTime": "2023-10-30T14:11:10.759229+02:00", "EventTime": "2023-10-30T14:11:10.759246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CYx1ns4SOUS6Ve1RAg"]} -{"Format": "IDEA0", "ID": "d440e6f5-1194-4b64-acc6-10a3c725bb89", "DetectTime": "2023-10-30T14:11:10.787757+02:00", "EventTime": "2023-10-30T14:11:10.787770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CVgP8K1qMBFeKlIUFb"]} -{"Format": "IDEA0", "ID": "60744408-7d52-4b9e-b274-2cc75421e4cf", "DetectTime": "2023-10-30T14:11:10.813647+02:00", "EventTime": "2023-10-30T14:11:10.813658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CSWmGsNR8lCFCnjl2"]} -{"Format": "IDEA0", "ID": "c17ddc13-56f4-439b-98ff-046c4968f8b6", "DetectTime": "2023-10-30T14:11:10.839170+02:00", "EventTime": "2023-10-30T14:11:10.839191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYlPmEY5V7VXSAnGc"]} -{"Format": "IDEA0", "ID": "8bfb59b3-4a77-421e-99ee-e86a5509f8e4", "DetectTime": "2023-10-30T14:11:10.869403+02:00", "EventTime": "2023-10-30T14:11:10.869414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C2MpbuS0g9ch4WEva"]} -{"Format": "IDEA0", "ID": "dde7d591-72f8-4452-b00c-afac40bbbaa3", "DetectTime": "2023-10-30T14:11:10.898966+02:00", "EventTime": "2023-10-30T14:11:10.898988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CK3JAb2fVVVXGwZZh2"]} -{"Format": "Json", "ID": "dde7d591-72f8-4452-b00c-afac40bbbaa3", "DetectTime": "2023-10-30T14:11:10.898966+02:00", "EventTime": "2023-10-30T14:11:10.898988+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:55:02.361646+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:10.974478)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8b4af3f-3136-4d54-9c94-43b6fa9ba250", "DetectTime": "2023-10-30T14:11:10.979871+02:00", "EventTime": "2023-10-30T14:11:10.979887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cahrss1Ox26VDP1IL5"]} -{"Format": "IDEA0", "ID": "105966b3-e5a6-490f-9d3b-b63cfe6f1893", "DetectTime": "2023-10-30T14:11:11.009642+02:00", "EventTime": "2023-10-30T14:11:11.009659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cma7oYNsMjkh7OJ5"]} -{"Format": "IDEA0", "ID": "0c618c11-3234-4b86-a7be-9a536c77fd19", "DetectTime": "2023-10-30T14:11:11.035476+02:00", "EventTime": "2023-10-30T14:11:11.035493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cm6e4C3zVc6oBUgJV7"]} -{"Format": "IDEA0", "ID": "3241fd04-22a1-4e2b-9012-970c3f917d8d", "DetectTime": "2023-10-30T14:11:11.061840+02:00", "EventTime": "2023-10-30T14:11:11.061857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQuhX1bAAdfBN5wO2"]} -{"Format": "IDEA0", "ID": "5aa61a0d-e068-43fb-b86c-22583eb2eeb5", "DetectTime": "2023-10-30T14:11:11.088144+02:00", "EventTime": "2023-10-30T14:11:11.088155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CHk0cV2ecAGttnC6u7"]} -{"Format": "IDEA0", "ID": "1b1e25fb-21e2-4574-b615-9c622721bed1", "DetectTime": "2023-10-30T14:11:11.117007+02:00", "EventTime": "2023-10-30T14:11:11.117023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C2MSCV3Y0wuLiSygPh"]} -{"Format": "IDEA0", "ID": "7325374e-122a-49f9-a936-57e6d6670ab0", "DetectTime": "2023-10-30T14:11:11.143996+02:00", "EventTime": "2023-10-30T14:11:11.144008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CMDqxV1hblzWCeMjw"]} -{"Format": "IDEA0", "ID": "480e2f1a-f051-4cb8-8d35-7b77ac4a7944", "DetectTime": "2023-10-30T14:11:11.172141+02:00", "EventTime": "2023-10-30T14:11:11.172169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CdmACW3E8LvqNX4YSd"]} -{"Format": "Json", "ID": "480e2f1a-f051-4cb8-8d35-7b77ac4a7944", "DetectTime": "2023-10-30T14:11:11.172141+02:00", "EventTime": "2023-10-30T14:11:11.172169+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:55:03.842443+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:11.236457)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45c06202-bf99-4d6a-9ec7-190307216bd5", "DetectTime": "2023-10-30T14:11:11.240807+02:00", "EventTime": "2023-10-30T14:11:11.240819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Co94bI1XUZO0n4SrSk"]} -{"Format": "IDEA0", "ID": "58c67fe4-6df8-43f8-9bfc-40e1d4058935", "DetectTime": "2023-10-30T14:11:11.265870+02:00", "EventTime": "2023-10-30T14:11:11.265881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C8W4qz4IywueHy3IMj"]} -{"Format": "IDEA0", "ID": "579b8cf3-cf23-4b91-ba13-40eb4ff6fe1a", "DetectTime": "2023-10-30T14:11:11.288605+02:00", "EventTime": "2023-10-30T14:11:11.288616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQ91px40kKy7uQOfm4"]} -{"Format": "IDEA0", "ID": "132def29-6785-4dbd-bb0b-4aff2b86cbaf", "DetectTime": "2023-10-30T14:11:11.309022+02:00", "EventTime": "2023-10-30T14:11:11.309033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6IrDY2aAxlD35cNKa"]} -{"Format": "IDEA0", "ID": "d5d71120-a6e0-4f32-9d4e-8e6cfa24ae27", "DetectTime": "2023-10-30T14:11:11.332909+02:00", "EventTime": "2023-10-30T14:11:11.332923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C1lU7y3LclrK7vFteb"]} -{"Format": "IDEA0", "ID": "c3cc6bba-fe5c-4dc8-b810-a0a308995618", "DetectTime": "2023-10-30T14:11:11.356257+02:00", "EventTime": "2023-10-30T14:11:11.356269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cr9wLn4AJ72IN1YLr8"]} -{"Format": "IDEA0", "ID": "23fde57b-6b67-4326-b843-a3760d2a5e47", "DetectTime": "2023-10-30T14:11:11.387966+02:00", "EventTime": "2023-10-30T14:11:11.387978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ccgeny4qwBnhZ9jYOa"]} -{"Format": "IDEA0", "ID": "c3e5b687-0302-4e24-8db5-0dec62545083", "DetectTime": "2023-10-30T14:11:11.412557+02:00", "EventTime": "2023-10-30T14:11:11.412573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CmdeOo48o44Sah8ieh"]} -{"Format": "IDEA0", "ID": "b4860215-deae-4fc6-a30b-74b79cf2fe04", "DetectTime": "2023-10-30T14:11:11.436945+02:00", "EventTime": "2023-10-30T14:11:11.436962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CTGCt72ogAmMmJPF22"]} -{"Format": "Json", "ID": "b4860215-deae-4fc6-a30b-74b79cf2fe04", "DetectTime": "2023-10-30T14:11:11.436945+02:00", "EventTime": "2023-10-30T14:11:11.436962+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:55:41.525950+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:11.501198)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "be6e7dae-6d43-4c51-8be0-2d4d741ce9cd", "DetectTime": "2023-10-30T14:11:11.505888+02:00", "EventTime": "2023-10-30T14:11:11.505904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPAkF1rwBL9EzeED7"]} -{"Format": "IDEA0", "ID": "12d34cfe-c384-41bc-8a2d-f447a995c14e", "DetectTime": "2023-10-30T14:11:11.529899+02:00", "EventTime": "2023-10-30T14:11:11.529910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CxS3z53HQUfruTfWp3"]} -{"Format": "IDEA0", "ID": "86d6248f-6707-42ab-9426-1d3335ba8875", "DetectTime": "2023-10-30T14:11:11.552653+02:00", "EventTime": "2023-10-30T14:11:11.552668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["COgwWF1InZzwU9Ljud"]} -{"Format": "IDEA0", "ID": "55b6d3d2-3d86-4bdd-847e-041c2415c1ff", "DetectTime": "2023-10-30T14:11:11.577160+02:00", "EventTime": "2023-10-30T14:11:11.577176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CK1xKukSBWmkF8pug"]} -{"Format": "IDEA0", "ID": "aacb2718-4e6f-48e3-ae25-0186776c8d90", "DetectTime": "2023-10-30T14:11:11.598303+02:00", "EventTime": "2023-10-30T14:11:11.598323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CxZdg51bRvLnVdEsie"]} -{"Format": "IDEA0", "ID": "50b46bf8-081d-44e9-b891-73344974d873", "DetectTime": "2023-10-30T14:11:11.620098+02:00", "EventTime": "2023-10-30T14:11:11.620109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CqKk1u49ByxFaojVia"]} -{"Format": "IDEA0", "ID": "90ee0991-b65e-438c-9a24-4e015a777aa1", "DetectTime": "2023-10-30T14:11:11.641236+02:00", "EventTime": "2023-10-30T14:11:11.641250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cpu61Z3gvBDzfgWB68"]} -{"Format": "IDEA0", "ID": "f67bea75-7159-431d-a719-9f599c3e2092", "DetectTime": "2023-10-30T14:11:11.663885+02:00", "EventTime": "2023-10-30T14:11:11.663901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C0naWb3Ac2u96qfcI6"]} -{"Format": "Json", "ID": "f67bea75-7159-431d-a719-9f599c3e2092", "DetectTime": "2023-10-30T14:11:11.663885+02:00", "EventTime": "2023-10-30T14:11:11.663901+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T17:55:43.117731+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2023/10/30 14:11:11.782581)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d3f08244-58db-4add-a916-03a1d2ea13f5", "DetectTime": "2023-10-30T14:11:11.787684+02:00", "EventTime": "2023-10-30T14:11:11.787696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CEhl1E3twQzzC32xIg"]} -{"Format": "IDEA0", "ID": "6b5bc5f4-0741-48a9-a617-bde7534ec397", "DetectTime": "2023-10-30T14:11:11.810670+02:00", "EventTime": "2023-10-30T14:11:11.810688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ce9e7j1827WGqKRoBk"]} -{"Format": "IDEA0", "ID": "27ebcdb1-d7d6-4c9f-bdc1-c1eead66d6a5", "DetectTime": "2023-10-30T14:11:11.841617+02:00", "EventTime": "2023-10-30T14:11:11.841633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CPvQiM3J5au54NZub9"]} -{"Format": "IDEA0", "ID": "3376dfbe-2842-4a85-8ef3-72948d1f6829", "DetectTime": "2023-10-30T14:11:11.874113+02:00", "EventTime": "2023-10-30T14:11:11.874129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cm96pzSLcUIpxqlKa"]} -{"Format": "IDEA0", "ID": "7bc62a99-4a14-4828-a868-8badc8b2bbeb", "DetectTime": "2023-10-30T14:11:11.916520+02:00", "EventTime": "2023-10-30T14:11:11.916531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C3O6Y13ZvwHclumzp1"]} -{"Format": "IDEA0", "ID": "2b59396c-67c6-4279-8499-0b90efa3ceb7", "DetectTime": "2023-10-30T14:11:11.949207+02:00", "EventTime": "2023-10-30T14:11:11.949220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C7RSYd2HxSxNJ4w561"]} -{"Format": "IDEA0", "ID": "af330c01-3ee3-4973-bb75-c6b805a62ab9", "DetectTime": "2023-10-30T14:11:11.990491+02:00", "EventTime": "2023-10-30T14:11:11.990510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C4M5Ga3BufidCmST6d"]} -{"Format": "IDEA0", "ID": "28ca2cb0-52b7-48b5-b4e1-096fde7614dc", "DetectTime": "2023-10-30T14:11:12.029952+02:00", "EventTime": "2023-10-30T14:11:12.029968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CC2Fnh2ehsvFKyTZjc"]} -{"Format": "IDEA0", "ID": "1d636d4d-abce-4589-943a-a92484e94946", "DetectTime": "2023-10-30T14:11:12.059549+02:00", "EventTime": "2023-10-30T14:11:12.059561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CqvEt11UGO9ASqe4Ui"]} -{"Format": "IDEA0", "ID": "debd1172-857e-4f01-b502-c14a753ad2bd", "DetectTime": "2023-10-30T14:11:12.095073+02:00", "EventTime": "2023-10-30T14:11:12.095090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CmLyx22vhgYYI6msWl"]} -{"Format": "IDEA0", "ID": "3423a474-3642-448a-a125-099eb37324b9", "DetectTime": "2023-10-30T14:11:12.128440+02:00", "EventTime": "2023-10-30T14:11:12.128451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CDSRZE322hRCAAvU88"]} -{"Format": "IDEA0", "ID": "2e8f1ce9-61f6-4313-84de-b5c1f6d98867", "DetectTime": "2023-10-30T14:11:12.155708+02:00", "EventTime": "2023-10-30T14:11:12.155729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["ClF1J826gMxIOWpOOk"]} -{"Format": "IDEA0", "ID": "47b78a8a-08fb-4f60-833c-4245b43bb596", "DetectTime": "2023-10-30T14:11:12.194300+02:00", "EventTime": "2023-10-30T14:11:12.194315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CRvHFjSxVhSBwXDj4"]} -{"Format": "IDEA0", "ID": "75bb31f1-0a98-455a-8f6d-3a0d0c1ae9b2", "DetectTime": "2023-10-30T14:11:12.224204+02:00", "EventTime": "2023-10-30T14:11:12.224220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cu2YE4JIpBWMVKoRj"]} -{"Format": "Json", "ID": "75bb31f1-0a98-455a-8f6d-3a0d0c1ae9b2", "DetectTime": "2023-10-30T14:11:12.224204+02:00", "EventTime": "2023-10-30T14:11:12.224220+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:26:34.351640+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:12.306420)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea8d9b9c-50f4-425e-b6f2-588113a81b2f", "DetectTime": "2023-10-30T14:11:12.310822+02:00", "EventTime": "2023-10-30T14:11:12.310838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CJ5Iud4dzBjFo0ulla"]} -{"Format": "IDEA0", "ID": "69c2772f-56c3-4b89-ae61-d09b162e755e", "DetectTime": "2023-10-30T14:11:12.341496+02:00", "EventTime": "2023-10-30T14:11:12.341509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CD6dPn4nVJCih8SLo2"]} -{"Format": "IDEA0", "ID": "b68f32a6-8105-4890-9138-1021fff73f39", "DetectTime": "2023-10-30T14:11:12.375779+02:00", "EventTime": "2023-10-30T14:11:12.375798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CI5Mbp2ymZneyZ5MR1"]} -{"Format": "IDEA0", "ID": "f9a5c279-c75a-4af2-8570-c6052b61400c", "DetectTime": "2023-10-30T14:11:12.407110+02:00", "EventTime": "2023-10-30T14:11:12.407121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CSjAKJ1hn1mcf1URM8"]} -{"Format": "IDEA0", "ID": "8f39b428-056f-4f94-9134-d83427110456", "DetectTime": "2023-10-30T14:11:12.435425+02:00", "EventTime": "2023-10-30T14:11:12.435438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cm0h944Nrnqf7H7x3c"]} -{"Format": "IDEA0", "ID": "e46a5283-b4b6-4650-824e-1372142d3229", "DetectTime": "2023-10-30T14:11:12.461567+02:00", "EventTime": "2023-10-30T14:11:12.461578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CJKdocbFgTf0balxa"]} -{"Format": "IDEA0", "ID": "45b6f63e-2e86-4562-96a4-9d88fdd930c2", "DetectTime": "2023-10-30T14:11:12.492660+02:00", "EventTime": "2023-10-30T14:11:12.492674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CGBvVq36Zi6zZGfvoi"]} -{"Format": "IDEA0", "ID": "47f7a84f-cee8-4130-b57e-e3837d34f87a", "DetectTime": "2023-10-30T14:11:12.524715+02:00", "EventTime": "2023-10-30T14:11:12.524726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CquyID4kx1KPmO2qbd"]} -{"Format": "IDEA0", "ID": "1ff22b9b-9f95-498d-bad1-f65cd6504c7b", "DetectTime": "2023-10-30T14:11:12.560799+02:00", "EventTime": "2023-10-30T14:11:12.560816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CNKyw14wryZ7yrIc21"]} -{"Format": "IDEA0", "ID": "ad5f58ef-9860-4246-9f8e-45b69b2ae9ef", "DetectTime": "2023-10-30T14:11:12.588027+02:00", "EventTime": "2023-10-30T14:11:12.588042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ck4okj3ccBR9X9z8Ol"]} -{"Format": "IDEA0", "ID": "fdc31b56-5228-4f14-a7e3-610ffda026ce", "DetectTime": "2023-10-30T14:11:12.617826+02:00", "EventTime": "2023-10-30T14:11:12.617844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cjv4aDA2puVIG28V"]} -{"Format": "IDEA0", "ID": "518930ab-6f2e-4781-834d-0209f4bc5c1b", "DetectTime": "2023-10-30T14:11:12.652372+02:00", "EventTime": "2023-10-30T14:11:12.652390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CPFq5v3WPcIi6Adfw7"]} -{"Format": "IDEA0", "ID": "d5582443-25d5-4003-abaa-1770f45e34e6", "DetectTime": "2023-10-30T14:11:12.688144+02:00", "EventTime": "2023-10-30T14:11:12.688159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cl1zKc3BAKIc6KpFX1"]} -{"Format": "IDEA0", "ID": "3c77a766-0f33-4887-b75e-ebaedf0ab238", "DetectTime": "2023-10-30T14:11:12.721218+02:00", "EventTime": "2023-10-30T14:11:12.721230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CByC061keYU0y8aLue"]} -{"Format": "IDEA0", "ID": "97213937-de45-4bde-ac2b-336dacbd09ae", "DetectTime": "2023-10-30T14:11:12.752287+02:00", "EventTime": "2023-10-30T14:11:12.752304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJnauhG4jVjTEpgjd"]} -{"Format": "IDEA0", "ID": "c332a5a6-3a9b-4944-abdb-fa7217eb6c50", "DetectTime": "2023-10-30T14:11:12.787108+02:00", "EventTime": "2023-10-30T14:11:12.787120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Czdbcg3Njq1tJTVlWd"]} -{"Format": "IDEA0", "ID": "ae081524-f8bf-4d89-a948-3d060a8ccd76", "DetectTime": "2023-10-30T14:11:12.820209+02:00", "EventTime": "2023-10-30T14:11:12.820220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 5.202.161.209 ", "ContentType": "text/plain"}], "uids": ["Cz9sDb13toxptrVQg9"]} -{"Format": "IDEA0", "ID": "29b37f55-9d45-42c3-bae9-7bd04d717c4f", "DetectTime": "2023-10-30T14:11:12.841747+02:00", "EventTime": "2023-10-30T14:11:12.841759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CivYa04wwBQeAaOFJa"]} -{"Format": "IDEA0", "ID": "7853832e-da97-48cc-9cb4-bfbfb104630e", "DetectTime": "2023-10-30T14:11:12.861957+02:00", "EventTime": "2023-10-30T14:11:12.861973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.13.164.195 ", "ContentType": "text/plain"}], "uids": ["CkxnGL23MyZfvUt7wb"]} -{"Format": "IDEA0", "ID": "003763df-5eff-498d-890c-9a195ab89de7", "DetectTime": "2023-10-30T14:11:12.885331+02:00", "EventTime": "2023-10-30T14:11:12.885346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CF809s1g7dmUJ3TQRf"]} -{"Format": "IDEA0", "ID": "551f1f9c-b33e-4b08-8754-a6f6221b0f90", "DetectTime": "2023-10-30T14:11:12.917560+02:00", "EventTime": "2023-10-30T14:11:12.917572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C5ZlxeaN91H6P5UI1"]} -{"Format": "IDEA0", "ID": "5d48d1d3-72b5-4087-baba-602c91f0ba4d", "DetectTime": "2023-10-30T14:11:12.937274+02:00", "EventTime": "2023-10-30T14:11:12.937290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CRf9HB4pADBEeIH6bk"]} -{"Format": "IDEA0", "ID": "b8d01fe7-094d-43ae-b8dc-5451bddc93eb", "DetectTime": "2023-10-30T14:11:12.961874+02:00", "EventTime": "2023-10-30T14:11:12.961886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CuUD7g1hWTg6NgJJc5"]} -{"Format": "IDEA0", "ID": "79514f71-ee85-4c22-a24c-fd60007b7568", "DetectTime": "2023-10-30T14:11:12.986393+02:00", "EventTime": "2023-10-30T14:11:12.986409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CFD88X1nX7WC3oue81"]} -{"Format": "IDEA0", "ID": "4bb2c6c5-9fa6-4c39-a705-06105c7d8a6e", "DetectTime": "2023-10-30T14:11:13.022142+02:00", "EventTime": "2023-10-30T14:11:13.022158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C2Fe8F3BIxccJoWGe1"]} -{"Format": "IDEA0", "ID": "8a260282-2d7f-402d-9791-68c035deff53", "DetectTime": "2023-10-30T14:11:13.046181+02:00", "EventTime": "2023-10-30T14:11:13.046200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CA6tUBjtRuUy1pYSl"]} -{"Format": "IDEA0", "ID": "d3bf9d4d-4c87-4824-9d3b-13dda3478dac", "DetectTime": "2023-10-30T14:11:13.067796+02:00", "EventTime": "2023-10-30T14:11:13.067813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CIljs92WxjWBSv1ylj"]} -{"Format": "IDEA0", "ID": "5b58322d-0a3a-4b84-9d05-902aa11371aa", "DetectTime": "2023-10-30T14:11:13.092523+02:00", "EventTime": "2023-10-30T14:11:13.092539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cd2jTg45ddLpSKxj4k"]} -{"Format": "IDEA0", "ID": "0558a052-15ad-4439-933d-2c8ca65ebce4", "DetectTime": "2023-10-30T14:11:13.122105+02:00", "EventTime": "2023-10-30T14:11:13.122122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CdAvz4tFiAvN2j6i2"]} -{"Format": "IDEA0", "ID": "3fd69405-20c0-4baa-adf4-d8f47500a2ff", "DetectTime": "2023-10-30T14:11:13.144964+02:00", "EventTime": "2023-10-30T14:11:13.144975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CyXniP3sOva1T1sodh"]} -{"Format": "IDEA0", "ID": "78cb0c20-8b91-4f9f-8277-f08ad4925deb", "DetectTime": "2023-10-30T14:11:13.164339+02:00", "EventTime": "2023-10-30T14:11:13.164350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Crpseg2BnrXZbJd3O6"]} -{"Format": "IDEA0", "ID": "6ecf83ee-db8c-4226-9c33-918ecf7a280e", "DetectTime": "2023-10-30T14:11:13.186084+02:00", "EventTime": "2023-10-30T14:11:13.186095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CQpFt21QCUikIHQhG5"]} -{"Format": "IDEA0", "ID": "26c32d17-5c9d-4206-ba4c-f2c39fa3d761", "DetectTime": "2023-10-30T14:11:13.206580+02:00", "EventTime": "2023-10-30T14:11:13.206593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C21ZGoc3fBJ9tg1vl"]} -{"Format": "IDEA0", "ID": "1a646315-3662-4338-ad95-0c628c3f1d28", "DetectTime": "2023-10-30T14:11:13.226306+02:00", "EventTime": "2023-10-30T14:11:13.226318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C7qwxVJI1QT1KZ6g8"]} -{"Format": "IDEA0", "ID": "03bf6bf5-c175-4404-86a6-131c8f16a85c", "DetectTime": "2023-10-30T14:11:13.246751+02:00", "EventTime": "2023-10-30T14:11:13.246769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CTuYuc1Ovk9KhMX6T3"]} -{"Format": "IDEA0", "ID": "94abf1fe-9c59-40ff-a60b-8ebed260df91", "DetectTime": "2023-10-30T14:11:13.263757+02:00", "EventTime": "2023-10-30T14:11:13.263769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CBFlD6dCoNOlUecLa"]} -{"Format": "IDEA0", "ID": "161e36d9-8d8b-4ff9-8cf7-0cc6798aa09c", "DetectTime": "2023-10-30T14:11:13.282346+02:00", "EventTime": "2023-10-30T14:11:13.282357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CAuwSV25WehdS08uWa"]} -{"Format": "IDEA0", "ID": "d228e989-0422-4234-8e36-9da2fd09ee71", "DetectTime": "2023-10-30T14:11:13.301501+02:00", "EventTime": "2023-10-30T14:11:13.301512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cyohkn2qwjd50RZwu8"]} -{"Format": "IDEA0", "ID": "cdca8997-0810-48aa-b145-3f802d7fe3f6", "DetectTime": "2023-10-30T14:11:13.319003+02:00", "EventTime": "2023-10-30T14:11:13.319015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C8dLQ41SoqQ3mnypTb"]} -{"Format": "Json", "ID": "cdca8997-0810-48aa-b145-3f802d7fe3f6", "DetectTime": "2023-10-30T14:11:13.319003+02:00", "EventTime": "2023-10-30T14:11:13.319015+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:26:51.723666+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:13.385398)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b7431242-3fa6-4c44-9efd-1caa0b6adcac", "DetectTime": "2023-10-30T14:11:13.389298+02:00", "EventTime": "2023-10-30T14:11:13.389312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CzNMuy1N7udFcnkYui"]} -{"Format": "IDEA0", "ID": "1ba56914-5f3b-4c2e-8e6e-4d6537b39d66", "DetectTime": "2023-10-30T14:11:13.410029+02:00", "EventTime": "2023-10-30T14:11:13.410047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CKqnTq4N1ZFoMK4dZ1"]} -{"Format": "IDEA0", "ID": "07e00a6d-7a9a-489a-9ee4-c813630b9808", "DetectTime": "2023-10-30T14:11:13.430503+02:00", "EventTime": "2023-10-30T14:11:13.430516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CRVRV725fLazgKo7b3"]} -{"Format": "IDEA0", "ID": "cdfeb686-511d-46eb-9b7f-d972232c9282", "DetectTime": "2023-10-30T14:11:13.455481+02:00", "EventTime": "2023-10-30T14:11:13.455496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["Ct3aJR2MWsL0NTwXdd"]} -{"Format": "IDEA0", "ID": "2be8e878-cb7f-47cd-ab12-7786be349a65", "DetectTime": "2023-10-30T14:11:13.477245+02:00", "EventTime": "2023-10-30T14:11:13.477262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["Cg5HLt4BUp0yiQipAg"]} -{"Format": "IDEA0", "ID": "8d4d5e62-72c0-4aa8-8cc0-40e42b3a4ef5", "DetectTime": "2023-10-30T14:11:13.501080+02:00", "EventTime": "2023-10-30T14:11:13.501096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CYsgB13GbaDI4Z9LRh"]} -{"Format": "IDEA0", "ID": "5405c519-d396-4524-9726-0589e1d2b49f", "DetectTime": "2023-10-30T14:11:13.527712+02:00", "EventTime": "2023-10-30T14:11:13.527723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CnhPmziXBjE67eBz9"]} -{"Format": "IDEA0", "ID": "7ee3a582-97f5-44dc-8c02-1a7d45fd3bd3", "DetectTime": "2023-10-30T14:11:13.548028+02:00", "EventTime": "2023-10-30T14:11:13.548045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CIm8yJ3erLjajWr0O8"]} -{"Format": "IDEA0", "ID": "8ba7ff9b-7413-4c01-98c9-9fc8469951a2", "DetectTime": "2023-10-30T14:11:13.572773+02:00", "EventTime": "2023-10-30T14:11:13.572790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CGmfau1lQyagElP3R8"]} -{"Format": "IDEA0", "ID": "91262a26-0a9e-4ac7-ab8e-91e3a5a595ba", "DetectTime": "2023-10-30T14:11:13.594468+02:00", "EventTime": "2023-10-30T14:11:13.594484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CqVodC1umBOdlPpnXb"]} -{"Format": "IDEA0", "ID": "be831a5d-52ba-44d9-a72a-ce1441ca058e", "DetectTime": "2023-10-30T14:11:13.616704+02:00", "EventTime": "2023-10-30T14:11:13.616714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CM4bSF4vQOztBa2tOg"]} -{"Format": "IDEA0", "ID": "4c034278-3cf5-4ec5-b01f-967b733dbcf6", "DetectTime": "2023-10-30T14:11:13.634696+02:00", "EventTime": "2023-10-30T14:11:13.634720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CSO0vjAkIeLvMWLz9"]} -{"Format": "IDEA0", "ID": "7b31daf1-d2a5-4cf0-b65b-6f90ba3c8cd7", "DetectTime": "2023-10-30T14:11:13.651747+02:00", "EventTime": "2023-10-30T14:11:13.651758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CMY6451f04K2WJlSMd"]} -{"Format": "IDEA0", "ID": "b62df52e-4a0a-4930-8ad5-523a783c4289", "DetectTime": "2023-10-30T14:11:13.671566+02:00", "EventTime": "2023-10-30T14:11:13.671582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CliBn8wMHpxWri5mi"]} -{"Format": "IDEA0", "ID": "4c3b50da-4e30-4e78-98be-ad9602fdecfb", "DetectTime": "2023-10-30T14:11:13.705761+02:00", "EventTime": "2023-10-30T14:11:13.705777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CUMx1MQW9UYgCCIJk"]} -{"Format": "IDEA0", "ID": "74aba2f8-14e9-498a-834e-c67b8d0e5375", "DetectTime": "2023-10-30T14:11:13.728978+02:00", "EventTime": "2023-10-30T14:11:13.728992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C8LebA3uRIRcVl0Ol3"]} -{"Format": "IDEA0", "ID": "22e5b098-eb04-4148-b505-19da71adcfc6", "DetectTime": "2023-10-30T14:11:13.750342+02:00", "EventTime": "2023-10-30T14:11:13.750357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C2exipxY8nJXHMx74"]} -{"Format": "IDEA0", "ID": "5a6b6ef1-c259-4fc9-83e6-613ee4e4caab", "DetectTime": "2023-10-30T14:11:13.771042+02:00", "EventTime": "2023-10-30T14:11:13.771061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cmdu4J1N7KHvGlZTh6"]} -{"Format": "IDEA0", "ID": "83257746-1103-4cef-9795-9a97aa0080ea", "DetectTime": "2023-10-30T14:11:13.790070+02:00", "EventTime": "2023-10-30T14:11:13.790084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cwd1ET26JCEVcoOZ71"]} -{"Format": "IDEA0", "ID": "c1a6ebe1-441e-48fe-b29f-ed324334d8fe", "DetectTime": "2023-10-30T14:11:13.807223+02:00", "EventTime": "2023-10-30T14:11:13.807237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CwfdhmsbjIykOhji1"]} -{"Format": "IDEA0", "ID": "14fe1869-657f-4ce2-9c3e-9ff1d635e652", "DetectTime": "2023-10-30T14:11:13.826107+02:00", "EventTime": "2023-10-30T14:11:13.826118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C846UasWnFHsYKu38"]} -{"Format": "IDEA0", "ID": "ab58abcf-0fd6-4d23-833c-60b64f7d3675", "DetectTime": "2023-10-30T14:11:13.844247+02:00", "EventTime": "2023-10-30T14:11:13.844257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CjJdHQ1CnFRjf22SQg"]} -{"Format": "IDEA0", "ID": "edb1df63-2b36-4bdb-b889-68549ebf3c3e", "DetectTime": "2023-10-30T14:11:13.867198+02:00", "EventTime": "2023-10-30T14:11:13.867213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["ClnbJe2y1mepLxE6Yl"]} -{"Format": "IDEA0", "ID": "026ca085-05a0-4e57-afd3-e8c9a82c6e3a", "DetectTime": "2023-10-30T14:11:13.891892+02:00", "EventTime": "2023-10-30T14:11:13.891908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CqOzO23ltclDoLBH0a"]} -{"Format": "IDEA0", "ID": "c321f881-7de7-4876-86d6-4897f337c155", "DetectTime": "2023-10-30T14:11:13.912001+02:00", "EventTime": "2023-10-30T14:11:13.912012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C5uuxJ1xXgH9Z87EA"]} -{"Format": "IDEA0", "ID": "12d13bc9-3345-4589-a752-e69375f34ad3", "DetectTime": "2023-10-30T14:11:13.932386+02:00", "EventTime": "2023-10-30T14:11:13.932406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CnjXtC3hfiYrDEIWl3"]} -{"Format": "IDEA0", "ID": "928d8a19-dc95-4332-baaf-55c5df964e9e", "DetectTime": "2023-10-30T14:11:13.955989+02:00", "EventTime": "2023-10-30T14:11:13.956005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CoFugVbqRxnd2ks38"]} -{"Format": "IDEA0", "ID": "ab657bc1-d4e6-4c2a-a0e5-891065a31389", "DetectTime": "2023-10-30T14:11:13.979583+02:00", "EventTime": "2023-10-30T14:11:13.979599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZX1Fd2Q5g1vmTnym6"]} -{"Format": "IDEA0", "ID": "ac0fb742-7296-405a-b919-9836e0aec500", "DetectTime": "2023-10-30T14:11:14.002029+02:00", "EventTime": "2023-10-30T14:11:14.002039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CuCIOv3oynqeWQpP8a"]} -{"Format": "IDEA0", "ID": "b76000f1-19fb-493e-aef2-2e3c9cdf0b37", "DetectTime": "2023-10-30T14:11:14.029311+02:00", "EventTime": "2023-10-30T14:11:14.029325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CwtAqi4muVh0Ct6Rx5"]} -{"Format": "IDEA0", "ID": "36ecd1b8-8185-44b0-9d70-5e6c717d013b", "DetectTime": "2023-10-30T14:11:14.052564+02:00", "EventTime": "2023-10-30T14:11:14.052579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cm9HaJ1qNOf17ZWz7k"]} -{"Format": "IDEA0", "ID": "6ff4bca4-ed67-4ce1-9e74-fda4bdf0ebfb", "DetectTime": "2023-10-30T14:11:14.072382+02:00", "EventTime": "2023-10-30T14:11:14.072397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CHsTAv2UeJjCkrZaLb"]} -{"Format": "IDEA0", "ID": "6d8f70fd-8974-41bd-8369-992b683f3d72", "DetectTime": "2023-10-30T14:11:14.091497+02:00", "EventTime": "2023-10-30T14:11:14.091509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CwoNzQ3EpcHrRTBOKb"]} -{"Format": "IDEA0", "ID": "6ed79a40-c014-43f6-902a-2b91bf3cab35", "DetectTime": "2023-10-30T14:11:14.107500+02:00", "EventTime": "2023-10-30T14:11:14.107510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CZsVrQdWRm4XqrDYj"]} -{"Format": "IDEA0", "ID": "a915fd3a-fd60-48a2-9e78-08f384ae0ed8", "DetectTime": "2023-10-30T14:11:14.125803+02:00", "EventTime": "2023-10-30T14:11:14.125814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CKDLc91viCFo6oioOl"]} -{"Format": "IDEA0", "ID": "cc80e297-b296-4930-9061-0cb13a77b30e", "DetectTime": "2023-10-30T14:11:14.144840+02:00", "EventTime": "2023-10-30T14:11:14.144851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["Ci8uLV1iSFeEIHLyTl"]} -{"Format": "IDEA0", "ID": "1bb6bf1b-b64a-4edd-873d-ed23e78aa162", "DetectTime": "2023-10-30T14:11:14.169640+02:00", "EventTime": "2023-10-30T14:11:14.169656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CStaPL1nUDNrMu0kOd"]} -{"Format": "IDEA0", "ID": "273241d0-5c2e-4d8f-a82f-1cdb968e5b07", "DetectTime": "2023-10-30T14:11:14.191609+02:00", "EventTime": "2023-10-30T14:11:14.191620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C9dljVJ1SiNkgGNCc"]} -{"Format": "IDEA0", "ID": "0e54e88e-4c72-49df-bac0-f3575920e1da", "DetectTime": "2023-10-30T14:11:14.211813+02:00", "EventTime": "2023-10-30T14:11:14.211828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CggmHsES2BDfIs6td"]} -{"Format": "IDEA0", "ID": "83c1f77c-d59b-47a6-9870-fee54a3aa83f", "DetectTime": "2023-10-30T14:11:14.231698+02:00", "EventTime": "2023-10-30T14:11:14.231709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C683LJmTywPckFMAd"]} -{"Format": "IDEA0", "ID": "3478ab56-d87b-48ab-ba3a-c310a9c7fb03", "DetectTime": "2023-10-30T14:11:14.249957+02:00", "EventTime": "2023-10-30T14:11:14.249971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C6dAbi29DSvG3LoMLl"]} -{"Format": "IDEA0", "ID": "7a4a33a8-9dce-4d62-8319-01647f464fc6", "DetectTime": "2023-10-30T14:11:14.265807+02:00", "EventTime": "2023-10-30T14:11:14.265818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ChEi8c2CbvJ0TZZIf"]} -{"Format": "IDEA0", "ID": "13fba1ec-f42a-4d82-ac44-074d70e756db", "DetectTime": "2023-10-30T14:11:14.297523+02:00", "EventTime": "2023-10-30T14:11:14.297540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cou5NX2KX9RYFKzQj2"]} -{"Format": "IDEA0", "ID": "6ef9670a-c347-4336-a6e3-44ab468b6bde", "DetectTime": "2023-10-30T14:11:14.315989+02:00", "EventTime": "2023-10-30T14:11:14.316000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CAqiSi2YO7oqK76gUe"]} -{"Format": "IDEA0", "ID": "5e499dec-1dfc-4732-b3c8-8ce1afc4a251", "DetectTime": "2023-10-30T14:11:14.337425+02:00", "EventTime": "2023-10-30T14:11:14.337435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CBiChdnX33qFaGZuh"]} -{"Format": "IDEA0", "ID": "b8dc3327-7778-48ce-a433-eaf7a58f4afe", "DetectTime": "2023-10-30T14:11:14.359351+02:00", "EventTime": "2023-10-30T14:11:14.359363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Ck6M3v3c8DYYhDxOT8"]} -{"Format": "IDEA0", "ID": "1c25e55b-0168-4420-8a7c-ddc8aa894bcc", "DetectTime": "2023-10-30T14:11:14.378143+02:00", "EventTime": "2023-10-30T14:11:14.378154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CmXrWkAsmFj4dPZed"]} -{"Format": "IDEA0", "ID": "87f8048b-b594-4ee0-96b6-b608bcd6b058", "DetectTime": "2023-10-30T14:11:14.400043+02:00", "EventTime": "2023-10-30T14:11:14.400055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C8osy82Nz3TwwOcrnb"]} -{"Format": "IDEA0", "ID": "d7bcec80-02a8-45e4-99ff-8f8903a05581", "DetectTime": "2023-10-30T14:11:14.418331+02:00", "EventTime": "2023-10-30T14:11:14.418346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CZqkre4XWZN7TmXqNh"]} -{"Format": "IDEA0", "ID": "e12bfd5c-8ef1-4284-ad0e-495123084efc", "DetectTime": "2023-10-30T14:11:14.444208+02:00", "EventTime": "2023-10-30T14:11:14.444224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CcSYL3221eSy7Djjxb"]} -{"Format": "IDEA0", "ID": "a6d6c40a-803f-4b08-96c0-a338e04f5330", "DetectTime": "2023-10-30T14:11:14.467941+02:00", "EventTime": "2023-10-30T14:11:14.467958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CPgE77j6p4KGnRMRa"]} -{"Format": "IDEA0", "ID": "79fe1618-fcf3-4527-bd48-ef657cb0fb7a", "DetectTime": "2023-10-30T14:11:14.490179+02:00", "EventTime": "2023-10-30T14:11:14.490190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CuenY24TQ4r66odlg6"]} -{"Format": "IDEA0", "ID": "60b2c3ed-66cd-44ce-88c1-cb4e3f5c0623", "DetectTime": "2023-10-30T14:11:14.511736+02:00", "EventTime": "2023-10-30T14:11:14.511752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["C9Z5Ei1OpZGHxn3Hbg"]} -{"Format": "IDEA0", "ID": "47c62b4c-d850-4199-9bdb-4fc20174c985", "DetectTime": "2023-10-30T14:11:14.533971+02:00", "EventTime": "2023-10-30T14:11:14.533986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CzFJ7K3CQYMim188Rl"]} -{"Format": "IDEA0", "ID": "fe5f59ad-2e53-4f01-9391-cf6f35d4a8f5", "DetectTime": "2023-10-30T14:11:14.554102+02:00", "EventTime": "2023-10-30T14:11:14.554113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["Ct2mFA48tlzQHNN2s6"]} -{"Format": "IDEA0", "ID": "9617a4df-ee7d-4a2a-8a1e-1c2a1e2fc7fd", "DetectTime": "2023-10-30T14:11:14.574247+02:00", "EventTime": "2023-10-30T14:11:14.574263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CMqiSq4ENTu2USPrT7"]} -{"Format": "IDEA0", "ID": "ccde2dac-f6b9-46a3-8b96-b57a15289927", "DetectTime": "2023-10-30T14:11:14.607224+02:00", "EventTime": "2023-10-30T14:11:14.607235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CnscaU3GdqCpW1Q5z4"]} -{"Format": "IDEA0", "ID": "6e15b835-2411-49fa-91cf-5c8a19d4827d", "DetectTime": "2023-10-30T14:11:14.624705+02:00", "EventTime": "2023-10-30T14:11:14.624716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CRUCH22j4BNwxglCE7"]} -{"Format": "IDEA0", "ID": "581bd5ef-9a8a-4a99-a1f4-913bfbbb81c5", "DetectTime": "2023-10-30T14:11:14.644372+02:00", "EventTime": "2023-10-30T14:11:14.644383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C6Q8AtiSa4GZPWCj6"]} -{"Format": "IDEA0", "ID": "8febc0ad-572b-462b-9080-655d2dec1aa5", "DetectTime": "2023-10-30T14:11:14.663283+02:00", "EventTime": "2023-10-30T14:11:14.663297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CKe5wi1e1wX4fAryU2"]} -{"Format": "IDEA0", "ID": "a9a4c1f1-e1db-41bd-86e1-11720fa5db7c", "DetectTime": "2023-10-30T14:11:14.681736+02:00", "EventTime": "2023-10-30T14:11:14.681753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CNPm9g3epW8KlvIqz8"]} -{"Format": "IDEA0", "ID": "584ee3b3-c073-4150-9a9c-f3a17b17677b", "DetectTime": "2023-10-30T14:11:14.706665+02:00", "EventTime": "2023-10-30T14:11:14.706686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CDtMS836sfJGDMO195"]} -{"Format": "IDEA0", "ID": "9b3c7eae-9e12-4477-bdb9-cd4253ed4c74", "DetectTime": "2023-10-30T14:11:14.724274+02:00", "EventTime": "2023-10-30T14:11:14.724286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CLZNeOoXPe4eOTrth"]} -{"Format": "IDEA0", "ID": "ff8a93b0-af6b-4109-932c-b4b19dd42db0", "DetectTime": "2023-10-30T14:11:14.744953+02:00", "EventTime": "2023-10-30T14:11:14.744969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CWbJeW3Xhaw69z8c5a"]} -{"Format": "IDEA0", "ID": "56be40fa-96f8-42e9-a586-c878c7428492", "DetectTime": "2023-10-30T14:11:14.766342+02:00", "EventTime": "2023-10-30T14:11:14.766353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CgjWdy3Jw7I5VXKG9i"]} -{"Format": "IDEA0", "ID": "5c5f9724-ebdc-41e3-ac17-dbe38a1f4d3d", "DetectTime": "2023-10-30T14:11:14.784166+02:00", "EventTime": "2023-10-30T14:11:14.784177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CEkdjF1ndtuZzjvHSg"]} -{"Format": "IDEA0", "ID": "a38711ae-6bf8-4e84-bc88-6b7913f586e8", "DetectTime": "2023-10-30T14:11:14.800867+02:00", "EventTime": "2023-10-30T14:11:14.800879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["COkbhr3F7sskgnLbb5"]} -{"Format": "IDEA0", "ID": "84d4f0df-407c-472e-b341-49ab2c34fcd7", "DetectTime": "2023-10-30T14:11:14.828420+02:00", "EventTime": "2023-10-30T14:11:14.828433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0LnBb25sUqTlAxk51"]} -{"Format": "IDEA0", "ID": "5d7b2f54-f417-420a-a712-b1ebfc6cb287", "DetectTime": "2023-10-30T14:11:14.848653+02:00", "EventTime": "2023-10-30T14:11:14.848663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cnwbwq1fyaipnn0we2"]} -{"Format": "IDEA0", "ID": "0f2ebbfc-bb94-4c5a-823e-67c0139a748a", "DetectTime": "2023-10-30T14:11:14.868003+02:00", "EventTime": "2023-10-30T14:11:14.868015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CFnwQo3o751f0ODqO5"]} -{"Format": "IDEA0", "ID": "e3b971b8-b28f-4294-85d9-832931573235", "DetectTime": "2023-10-30T14:11:14.889927+02:00", "EventTime": "2023-10-30T14:11:14.889939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CkDLHR1QXi46G9eIsl"]} -{"Format": "IDEA0", "ID": "87cfddf2-1abf-4515-88c6-daa245a75c15", "DetectTime": "2023-10-30T14:11:14.912731+02:00", "EventTime": "2023-10-30T14:11:14.912746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CxTvKG2qUhOTngVRt3"]} -{"Format": "IDEA0", "ID": "65605e06-a603-4f9c-b9d5-105b96ce98a1", "DetectTime": "2023-10-30T14:11:14.932110+02:00", "EventTime": "2023-10-30T14:11:14.932129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CmccIps47oOD7dvbj"]} -{"Format": "IDEA0", "ID": "fc1442cf-3f11-4674-87ed-6e43cd08549f", "DetectTime": "2023-10-30T14:11:14.953761+02:00", "EventTime": "2023-10-30T14:11:14.953776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CLk04w1r9L5hn79n0i"]} -{"Format": "IDEA0", "ID": "a75e3d85-2c53-41a4-bd34-182e3790ca10", "DetectTime": "2023-10-30T14:11:14.991955+02:00", "EventTime": "2023-10-30T14:11:14.991967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CwJbli1mRtmVHSYxVi"]} -{"Format": "IDEA0", "ID": "ebfe7338-e785-487b-af7a-823618334c58", "DetectTime": "2023-10-30T14:11:15.014551+02:00", "EventTime": "2023-10-30T14:11:15.014567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaguTE1qkQ0xDDY0Hl"]} -{"Format": "IDEA0", "ID": "5748bedd-3543-43a0-8db2-f97e8a8fa15c", "DetectTime": "2023-10-30T14:11:15.038046+02:00", "EventTime": "2023-10-30T14:11:15.038057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cct4XQHSuqSV0ArAg"]} -{"Format": "IDEA0", "ID": "e085b703-c003-4da1-b1da-34a31db60dc2", "DetectTime": "2023-10-30T14:11:15.057980+02:00", "EventTime": "2023-10-30T14:11:15.057996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CzkV6K1B6WOW56jKj"]} -{"Format": "IDEA0", "ID": "34a83d28-6af9-4224-bb39-4d7e5f9ceeb7", "DetectTime": "2023-10-30T14:11:15.080407+02:00", "EventTime": "2023-10-30T14:11:15.080424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CJ7zU24HSEAXeugFQc"]} -{"Format": "IDEA0", "ID": "8e3eddf7-7b6c-4a0f-ba04-60919584f8e2", "DetectTime": "2023-10-30T14:11:15.098485+02:00", "EventTime": "2023-10-30T14:11:15.098504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C3ScIc4UjCOJZFQ8X1"]} -{"Format": "IDEA0", "ID": "9dc550f2-ff82-48c9-86e6-d0103566c0aa", "DetectTime": "2023-10-30T14:11:15.115800+02:00", "EventTime": "2023-10-30T14:11:15.115813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C2zajdWD3yonPV7wd"]} -{"Format": "IDEA0", "ID": "84f11ef3-8416-4815-9e82-e3df81af6d8d", "DetectTime": "2023-10-30T14:11:15.136730+02:00", "EventTime": "2023-10-30T14:11:15.136745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CEeZqG1fJTQbTwXI8c"]} -{"Format": "IDEA0", "ID": "2861a4d0-2696-46ac-96cc-a0600ba767ed", "DetectTime": "2023-10-30T14:11:15.156987+02:00", "EventTime": "2023-10-30T14:11:15.156996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CdM5lW3uOpZMQzJZj4"]} -{"Format": "IDEA0", "ID": "eb6a4a54-79b0-496d-8699-6220a9feebf6", "DetectTime": "2023-10-30T14:11:15.174969+02:00", "EventTime": "2023-10-30T14:11:15.174981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C08Gp62lYThLWEMPxj"]} -{"Format": "IDEA0", "ID": "a0d2823a-019d-4c85-83ef-a30a11f82fa0", "DetectTime": "2023-10-30T14:11:15.191365+02:00", "EventTime": "2023-10-30T14:11:15.191377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQBfFi4kJ5eWeUvfR3"]} -{"Format": "IDEA0", "ID": "a06de299-112b-427e-b400-b69300a999c5", "DetectTime": "2023-10-30T14:11:15.209624+02:00", "EventTime": "2023-10-30T14:11:15.209639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CdZKbP34slLjKrsNC4"]} -{"Format": "IDEA0", "ID": "5f481c70-1dd7-4261-ba8a-3480a9252b1e", "DetectTime": "2023-10-30T14:11:15.231726+02:00", "EventTime": "2023-10-30T14:11:15.231741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CKHvFn8PqG54KJNac"]} -{"Format": "IDEA0", "ID": "7e0638ea-5afb-48a5-8176-38eafa39ca22", "DetectTime": "2023-10-30T14:11:15.253727+02:00", "EventTime": "2023-10-30T14:11:15.253738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C8VZvF3Mlwh0UEzWmj"]} -{"Format": "IDEA0", "ID": "9f9f42f7-0253-4af6-8a49-56bcf917dce9", "DetectTime": "2023-10-30T14:11:15.271471+02:00", "EventTime": "2023-10-30T14:11:15.271484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C3muN42FtMbtND212h"]} -{"Format": "IDEA0", "ID": "1b5486ab-013a-4e08-ac67-eae908dc35fa", "DetectTime": "2023-10-30T14:11:15.288516+02:00", "EventTime": "2023-10-30T14:11:15.288527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C14ujp1pd5Ot13MSZ"]} -{"Format": "IDEA0", "ID": "10deef20-5aff-4703-83fb-de15c1dedd64", "DetectTime": "2023-10-30T14:11:15.317669+02:00", "EventTime": "2023-10-30T14:11:15.317685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CdemBgg7cVg0WVrub"]} -{"Format": "IDEA0", "ID": "6c3653f7-d24d-441c-8ce8-a7860110321c", "DetectTime": "2023-10-30T14:11:15.336813+02:00", "EventTime": "2023-10-30T14:11:15.336826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CqOeDo3ylgewuh4Cd9"]} -{"Format": "IDEA0", "ID": "4adb0341-6934-4e2b-9203-00dcd330f730", "DetectTime": "2023-10-30T14:11:15.358795+02:00", "EventTime": "2023-10-30T14:11:15.358811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CKUxHw1JrTQlYSV4B"]} -{"Format": "IDEA0", "ID": "cb5d7101-09b7-4bda-bcf4-4aed3c2e45f4", "DetectTime": "2023-10-30T14:11:15.380394+02:00", "EventTime": "2023-10-30T14:11:15.380410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cuk6mw1ZOJAJ2fuO95"]} -{"Format": "IDEA0", "ID": "9ef0de34-44cc-4264-9b62-7701b587f4c1", "DetectTime": "2023-10-30T14:11:15.401592+02:00", "EventTime": "2023-10-30T14:11:15.401603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CeIone4ayHqTZ2Wr41"]} -{"Format": "IDEA0", "ID": "92bef9a4-ac7a-4e80-86b4-c58dcd74c4b1", "DetectTime": "2023-10-30T14:11:15.419337+02:00", "EventTime": "2023-10-30T14:11:15.419349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CJ6fXN2BbkSuBvx717"]} -{"Format": "IDEA0", "ID": "eb8661f6-0d1e-4244-8a35-d1cda42f0ded", "DetectTime": "2023-10-30T14:11:15.436845+02:00", "EventTime": "2023-10-30T14:11:15.436856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CHkfey3WPWJ1VNGHW4"]} -{"Format": "IDEA0", "ID": "64471ed0-64b1-49a6-b23b-dc0959f0339e", "DetectTime": "2023-10-30T14:11:15.455405+02:00", "EventTime": "2023-10-30T14:11:15.455416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CKpvR22zcJpDkQFaWa"]} -{"Format": "IDEA0", "ID": "b408d321-029a-47bf-82b6-cec8788f80d4", "DetectTime": "2023-10-30T14:11:15.473567+02:00", "EventTime": "2023-10-30T14:11:15.473582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C3E9Pa21IinS36pCze"]} -{"Format": "IDEA0", "ID": "b6ed34f5-398a-4a96-92a2-cd37b7f16c17", "DetectTime": "2023-10-30T14:11:15.492384+02:00", "EventTime": "2023-10-30T14:11:15.492395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CQzNb917i1u8nPJd6j"]} -{"Format": "IDEA0", "ID": "5183c2ca-fab9-43d4-a1a7-fed4d0c62cc2", "DetectTime": "2023-10-30T14:11:15.510015+02:00", "EventTime": "2023-10-30T14:11:15.510026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CyOFCNvYLUWghQsAf"]} -{"Format": "IDEA0", "ID": "69925e37-06f6-4524-ab97-b35ee41e1993", "DetectTime": "2023-10-30T14:11:15.528170+02:00", "EventTime": "2023-10-30T14:11:15.528181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cc6p1R2myCWWEwSeK9"]} -{"Format": "IDEA0", "ID": "4b69f3f5-1074-4db0-89e0-df0dda685340", "DetectTime": "2023-10-30T14:11:15.565304+02:00", "EventTime": "2023-10-30T14:11:15.565322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CL7KhXqxqXGCNLO21"]} -{"Format": "IDEA0", "ID": "4f195524-b246-46c1-927e-8ce8e94864e8", "DetectTime": "2023-10-30T14:11:15.586320+02:00", "EventTime": "2023-10-30T14:11:15.586334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CB0LD94bKxOqjAfjXa"]} -{"Format": "Json", "ID": "4f195524-b246-46c1-927e-8ce8e94864e8", "DetectTime": "2023-10-30T14:11:15.586320+02:00", "EventTime": "2023-10-30T14:11:15.586334+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:26:53.541256+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:15.654484)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6e60abf-e473-40e3-b538-91488499891b", "DetectTime": "2023-10-30T14:11:15.659716+02:00", "EventTime": "2023-10-30T14:11:15.659732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CwxzoAPhBFvmfUcdk"]} -{"Format": "IDEA0", "ID": "9eff0f8c-c23c-4f9d-bace-2faddd09ba1b", "DetectTime": "2023-10-30T14:11:15.681636+02:00", "EventTime": "2023-10-30T14:11:15.681652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cxhl2j1I8y4mSUgY33"]} -{"Format": "IDEA0", "ID": "acff44cf-9950-45b1-ac83-e157d681e638", "DetectTime": "2023-10-30T14:11:15.698950+02:00", "EventTime": "2023-10-30T14:11:15.698965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C5GYZq1qCJyRO3YUM8"]} -{"Format": "IDEA0", "ID": "4a161874-38e8-465c-a499-8a61ea5eb076", "DetectTime": "2023-10-30T14:11:15.719819+02:00", "EventTime": "2023-10-30T14:11:15.719835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CSM4dIW9eGWLaYsNe"]} -{"Format": "IDEA0", "ID": "81ca6c4a-8508-4265-b121-b26f7498cbc6", "DetectTime": "2023-10-30T14:11:15.738198+02:00", "EventTime": "2023-10-30T14:11:15.738214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CQEJR7DNoW103JQ0g"]} -{"Format": "IDEA0", "ID": "9c003727-3fd5-4307-9d38-bf9b6abdf74a", "DetectTime": "2023-10-30T14:11:15.759347+02:00", "EventTime": "2023-10-30T14:11:15.759363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CHfi1k4gdIzyl7bex8"]} -{"Format": "IDEA0", "ID": "ad66f515-19b4-4009-9e94-c7469909650c", "DetectTime": "2023-10-30T14:11:15.777563+02:00", "EventTime": "2023-10-30T14:11:15.777576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cs1vHltUya5K78df5"]} -{"Format": "IDEA0", "ID": "c3b972f5-7078-4ad1-b410-94c711f66a1d", "DetectTime": "2023-10-30T14:11:15.799840+02:00", "EventTime": "2023-10-30T14:11:15.799855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CTloU54U4z830WYH97"]} -{"Format": "IDEA0", "ID": "6a426963-deb4-4b07-bc30-1357b88bc203", "DetectTime": "2023-10-30T14:11:15.818511+02:00", "EventTime": "2023-10-30T14:11:15.818522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CULtksk6KULDuANq9"]} -{"Format": "IDEA0", "ID": "9f8cba6e-4afe-4ebe-ba38-5cac41390025", "DetectTime": "2023-10-30T14:11:15.835529+02:00", "EventTime": "2023-10-30T14:11:15.835542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C27bzZ1bQcYiZeRHx7"]} -{"Format": "IDEA0", "ID": "52f7152d-8154-44f6-913f-2acdd2905f67", "DetectTime": "2023-10-30T14:11:15.851854+02:00", "EventTime": "2023-10-30T14:11:15.851865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["ClCfHC23Dzt6yf7oUj"]} -{"Format": "IDEA0", "ID": "0b3c4bd7-51f8-483d-afd1-044b8b39f26e", "DetectTime": "2023-10-30T14:11:15.872093+02:00", "EventTime": "2023-10-30T14:11:15.872112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CXVRPl4TEGh2L3CQKb"]} -{"Format": "IDEA0", "ID": "88a49a02-42e6-4ed8-b46c-5609dd5a574b", "DetectTime": "2023-10-30T14:11:15.889877+02:00", "EventTime": "2023-10-30T14:11:15.889888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CNC88K3x5fdp4AjA7"]} -{"Format": "IDEA0", "ID": "d4f39af4-f53d-4ea7-baed-8cdd5768adc5", "DetectTime": "2023-10-30T14:11:15.909865+02:00", "EventTime": "2023-10-30T14:11:15.909881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CkPbBY3IgT0z96r4Uf"]} -{"Format": "IDEA0", "ID": "9047062c-775c-475a-88ef-37874e6f673c", "DetectTime": "2023-10-30T14:11:15.929826+02:00", "EventTime": "2023-10-30T14:11:15.929840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CA1njv3Adr0ndppRPk"]} -{"Format": "IDEA0", "ID": "9d4605e3-4595-478f-9dc3-6111079247a5", "DetectTime": "2023-10-30T14:11:15.951661+02:00", "EventTime": "2023-10-30T14:11:15.951674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CwUEGchBXKHCy35Ne"]} -{"Format": "IDEA0", "ID": "f7eedb87-5275-469c-bdf8-a22983f8b20c", "DetectTime": "2023-10-30T14:11:15.969994+02:00", "EventTime": "2023-10-30T14:11:15.970011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C4Zpws3XMsmdjWjXhk"]} -{"Format": "IDEA0", "ID": "e40cc0e9-cbed-46be-8130-2caae5f0f7d4", "DetectTime": "2023-10-30T14:11:16.005160+02:00", "EventTime": "2023-10-30T14:11:16.005171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CsAfwG3vOziBLPFNwl"]} -{"Format": "IDEA0", "ID": "1e302c09-668a-4a4e-8e6e-16b061a5ad14", "DetectTime": "2023-10-30T14:11:16.022736+02:00", "EventTime": "2023-10-30T14:11:16.022747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cj3VmqY92x4dWZhQk"]} -{"Format": "IDEA0", "ID": "8c9ee32b-bc80-48fd-812e-75d083bebc6e", "DetectTime": "2023-10-30T14:11:16.042250+02:00", "EventTime": "2023-10-30T14:11:16.042266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CZr1nV3bEBsPmi93D5"]} -{"Format": "IDEA0", "ID": "632e556d-7cca-4c28-bbe6-56e0da1b0b90", "DetectTime": "2023-10-30T14:11:16.062974+02:00", "EventTime": "2023-10-30T14:11:16.062991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ckx6hW2YTNv61yz603"]} -{"Format": "IDEA0", "ID": "8796cc9c-86c9-4ee8-9a5f-0b938ef25991", "DetectTime": "2023-10-30T14:11:16.083028+02:00", "EventTime": "2023-10-30T14:11:16.083046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMzwDX2xi5qLXazgC7"]} -{"Format": "IDEA0", "ID": "78c2b985-e7a4-412c-abcf-94b7a35bad25", "DetectTime": "2023-10-30T14:11:16.105131+02:00", "EventTime": "2023-10-30T14:11:16.105147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CkOzwdJA4CGBkauKg"]} -{"Format": "IDEA0", "ID": "b005c8fd-0c08-45fc-9bf0-b8a88b90a10d", "DetectTime": "2023-10-30T14:11:16.128271+02:00", "EventTime": "2023-10-30T14:11:16.128289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CccX1V1uKvgm4BKIb3"]} -{"Format": "IDEA0", "ID": "fa86ce1d-7818-42ac-ba4f-279d09e213a9", "DetectTime": "2023-10-30T14:11:16.147156+02:00", "EventTime": "2023-10-30T14:11:16.147169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CevO8Q39vt7jKM2Iq"]} -{"Format": "IDEA0", "ID": "eeb2b282-1ccb-4c1f-8ec5-c9ddedd21135", "DetectTime": "2023-10-30T14:11:16.165163+02:00", "EventTime": "2023-10-30T14:11:16.165174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CSP7Sp3FDZVdEN3bXa"]} -{"Format": "IDEA0", "ID": "636a23a3-3c83-4f44-ae33-6f548ca5ebbd", "DetectTime": "2023-10-30T14:11:16.184526+02:00", "EventTime": "2023-10-30T14:11:16.184549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CVrhIm4VbNEYAOeTee"]} -{"Format": "IDEA0", "ID": "716a7383-bf36-4a1e-a4e5-a673cbcef38d", "DetectTime": "2023-10-30T14:11:16.202226+02:00", "EventTime": "2023-10-30T14:11:16.202244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cz5FEG2nG1ulonOcNg"]} -{"Format": "IDEA0", "ID": "1b756c61-1132-4640-a628-1bdddd32a51a", "DetectTime": "2023-10-30T14:11:16.220354+02:00", "EventTime": "2023-10-30T14:11:16.220366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C7QzZ11O385YCUqWa8"]} -{"Format": "IDEA0", "ID": "dc097d7b-f552-41cc-b7c5-35487830da75", "DetectTime": "2023-10-30T14:11:16.239164+02:00", "EventTime": "2023-10-30T14:11:16.239175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C9z7SBSf3tlyvF1qk"]} -{"Format": "IDEA0", "ID": "571b8885-ecc7-41f0-a45a-9f6401bd6039", "DetectTime": "2023-10-30T14:11:16.258046+02:00", "EventTime": "2023-10-30T14:11:16.258056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CjeCJeD9Oztp8yZp2"]} -{"Format": "IDEA0", "ID": "873a6579-b6a5-4034-b1bf-d33751daba7d", "DetectTime": "2023-10-30T14:11:16.279186+02:00", "EventTime": "2023-10-30T14:11:16.279211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CZ2eQm292NdFKIMdpi"]} -{"Format": "IDEA0", "ID": "a48c2c9e-b46c-4447-bd36-5b16ca5f29de", "DetectTime": "2023-10-30T14:11:16.302627+02:00", "EventTime": "2023-10-30T14:11:16.302643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C0yzWLthpXx8X0fZj"]} -{"Format": "IDEA0", "ID": "8b5ff435-8ced-41bc-b688-d32b4618f665", "DetectTime": "2023-10-30T14:11:16.324670+02:00", "EventTime": "2023-10-30T14:11:16.324680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CcoVP14lRDLY0idpu2"]} -{"Format": "IDEA0", "ID": "8789942b-8e5f-4994-8729-d9e7981d1174", "DetectTime": "2023-10-30T14:11:16.342114+02:00", "EventTime": "2023-10-30T14:11:16.342133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCtLdzh3gc4zqm5Ma"]} -{"Format": "IDEA0", "ID": "e700fe36-52d1-43b1-9ab6-2c7457618c76", "DetectTime": "2023-10-30T14:11:16.361233+02:00", "EventTime": "2023-10-30T14:11:16.361244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CudJr64OP65Gpfed4"]} -{"Format": "IDEA0", "ID": "0efb8542-8d9e-49ca-adc3-7440aaf5eedc", "DetectTime": "2023-10-30T14:11:16.381028+02:00", "EventTime": "2023-10-30T14:11:16.381039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CvljhL2G696taC19R6"]} -{"Format": "IDEA0", "ID": "574eb387-1f96-48b8-9732-6963bc4a0178", "DetectTime": "2023-10-30T14:11:16.399790+02:00", "EventTime": "2023-10-30T14:11:16.399801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CtVTBt2WzMSg9NhLO7"]} -{"Format": "IDEA0", "ID": "f1c3c6ee-f078-4267-96b0-bfe868b8f820", "DetectTime": "2023-10-30T14:11:16.420994+02:00", "EventTime": "2023-10-30T14:11:16.421009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CrOh253u17FytHlAXg"]} -{"Format": "IDEA0", "ID": "3f6f9266-a098-4eab-a425-2412b8f3cca0", "DetectTime": "2023-10-30T14:11:16.439854+02:00", "EventTime": "2023-10-30T14:11:16.439865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIAtTS28z9CKKPmj3k"]} -{"Format": "IDEA0", "ID": "4d429355-1f7b-471f-809f-58181be349eb", "DetectTime": "2023-10-30T14:11:16.462517+02:00", "EventTime": "2023-10-30T14:11:16.462529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cw9ulc4MZTEM8GhtA6"]} -{"Format": "IDEA0", "ID": "21b893c3-1fdf-439c-847f-ee291929a9ec", "DetectTime": "2023-10-30T14:11:16.484918+02:00", "EventTime": "2023-10-30T14:11:16.484934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C0QbBr3xXrR4n9KjMa"]} -{"Format": "IDEA0", "ID": "93ca765b-188c-4593-8bce-ffa2a275ea76", "DetectTime": "2023-10-30T14:11:16.516607+02:00", "EventTime": "2023-10-30T14:11:16.516618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXXQva4NQtFvyC3W06"]} -{"Format": "IDEA0", "ID": "efc33ef3-719a-4760-8b0f-f11598cfef6a", "DetectTime": "2023-10-30T14:11:16.535698+02:00", "EventTime": "2023-10-30T14:11:16.535715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CwhglD1GtaL6PfFMj9"]} -{"Format": "IDEA0", "ID": "2a318841-d307-4157-b123-5f400fc6e9d3", "DetectTime": "2023-10-30T14:11:16.556572+02:00", "EventTime": "2023-10-30T14:11:16.556585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CyObD02IYlf9rBFFra"]} -{"Format": "IDEA0", "ID": "6e24f322-bc99-4e4a-806f-c1f4f2defa19", "DetectTime": "2023-10-30T14:11:16.573596+02:00", "EventTime": "2023-10-30T14:11:16.573619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C82lOt8Df8rcrNlti"]} -{"Format": "IDEA0", "ID": "2429b710-7680-4397-9e49-66b8ac9465fc", "DetectTime": "2023-10-30T14:11:16.593280+02:00", "EventTime": "2023-10-30T14:11:16.593290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZMaK32FMKK6t0Qm6i"]} -{"Format": "IDEA0", "ID": "296cbc85-0273-4993-b039-3ff01de16ee1", "DetectTime": "2023-10-30T14:11:16.613297+02:00", "EventTime": "2023-10-30T14:11:16.613312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CpefId2MpPPYguvDN7"]} -{"Format": "IDEA0", "ID": "63cdb428-370f-4681-9f8f-710495a85516", "DetectTime": "2023-10-30T14:11:16.632926+02:00", "EventTime": "2023-10-30T14:11:16.632947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cajsbr2360dgRCta3e"]} -{"Format": "IDEA0", "ID": "0d4757ef-8b62-4c17-84b0-271aecc2bb1e", "DetectTime": "2023-10-30T14:11:16.651889+02:00", "EventTime": "2023-10-30T14:11:16.651904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Csqn2s1pxKWfugf6w"]} -{"Format": "IDEA0", "ID": "c6b4f55c-4382-4a17-9f0d-e17a23421fbe", "DetectTime": "2023-10-30T14:11:16.670712+02:00", "EventTime": "2023-10-30T14:11:16.670730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJ6Mz83mGGp4Aroqp7"]} -{"Format": "IDEA0", "ID": "cf544bc9-8365-46e4-a442-b86246446f80", "DetectTime": "2023-10-30T14:11:16.690212+02:00", "EventTime": "2023-10-30T14:11:16.690231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CawwmrxqzIuKzkfV"]} -{"Format": "IDEA0", "ID": "3759a731-7dc4-434e-b18d-65ba2b6efcf9", "DetectTime": "2023-10-30T14:11:16.708810+02:00", "EventTime": "2023-10-30T14:11:16.708828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["CGKFoA2qNSg7K8Gz09"]} -{"Format": "IDEA0", "ID": "68c2dc71-99c2-495a-87e1-b8335a1979d9", "DetectTime": "2023-10-30T14:11:16.729646+02:00", "EventTime": "2023-10-30T14:11:16.729659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cezb4j2Hr3EKQDSSW3"]} -{"Format": "IDEA0", "ID": "a1961dc5-105a-42b5-8863-c7c7d8e4b8e1", "DetectTime": "2023-10-30T14:11:16.748046+02:00", "EventTime": "2023-10-30T14:11:16.748057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CqXK8a3I51Ee4D2z01"]} -{"Format": "IDEA0", "ID": "90a44877-c571-4c57-ba6b-4f5694d477b6", "DetectTime": "2023-10-30T14:11:16.767866+02:00", "EventTime": "2023-10-30T14:11:16.767878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CUBlTv1wMu6sqvNQt5"]} -{"Format": "IDEA0", "ID": "37a99561-8a47-4b27-af08-c007652b1db5", "DetectTime": "2023-10-30T14:11:16.785947+02:00", "EventTime": "2023-10-30T14:11:16.785964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CX5orh1n5AnpuhY8pb"]} -{"Format": "IDEA0", "ID": "e6d4e0cd-a962-44ea-b9bf-3f9cb54107f2", "DetectTime": "2023-10-30T14:11:16.806667+02:00", "EventTime": "2023-10-30T14:11:16.806683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CrPiFU11SMzDz6IOPa"]} -{"Format": "IDEA0", "ID": "75619883-af18-43bb-9e56-76d6dd2c1a86", "DetectTime": "2023-10-30T14:11:16.830553+02:00", "EventTime": "2023-10-30T14:11:16.830569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C9azXj2NgQhq6FaQb2"]} -{"Format": "IDEA0", "ID": "f3d1ce57-231b-4c8f-b80b-ba36861e24dc", "DetectTime": "2023-10-30T14:11:16.853776+02:00", "EventTime": "2023-10-30T14:11:16.853792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CwAGkz3ydP8caeuwXb"]} -{"Format": "IDEA0", "ID": "520c91bc-a76d-43a2-98f8-4a65fe10a682", "DetectTime": "2023-10-30T14:11:16.872359+02:00", "EventTime": "2023-10-30T14:11:16.872372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CR0oS5PKuqRSpgn5"]} -{"Format": "IDEA0", "ID": "604352ee-394a-4ca8-9549-cb033bcadccf", "DetectTime": "2023-10-30T14:11:16.904317+02:00", "EventTime": "2023-10-30T14:11:16.904329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cdt2c21Sm0j7Gw2INd"]} -{"Format": "IDEA0", "ID": "889b48c1-874c-44c5-9602-6ade19a1e83e", "DetectTime": "2023-10-30T14:11:16.925125+02:00", "EventTime": "2023-10-30T14:11:16.925143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CFE3Ak2mk4DMHotiO6"]} -{"Format": "IDEA0", "ID": "df5ccd65-9067-4898-af08-3d57ff091436", "DetectTime": "2023-10-30T14:11:16.945076+02:00", "EventTime": "2023-10-30T14:11:16.945092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cbe7rO5zfxily1Ed8"]} -{"Format": "IDEA0", "ID": "649fb964-abff-4161-b87d-685c878d259a", "DetectTime": "2023-10-30T14:11:16.965143+02:00", "EventTime": "2023-10-30T14:11:16.965160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CCcNg224Whpel5IJZ7"]} -{"Format": "IDEA0", "ID": "784dbfcc-4a95-4ded-a79a-c455eedd2cd1", "DetectTime": "2023-10-30T14:11:16.988106+02:00", "EventTime": "2023-10-30T14:11:16.988122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CEj8Cd1Caj6UJQziY4"]} -{"Format": "IDEA0", "ID": "7e4c0ee9-df2e-4128-84b9-8e8f9e2270da", "DetectTime": "2023-10-30T14:11:17.010860+02:00", "EventTime": "2023-10-30T14:11:17.010875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CShyf71ICRGjT93Vta"]} -{"Format": "IDEA0", "ID": "68995037-fc11-4efa-b9c4-dae0025cb829", "DetectTime": "2023-10-30T14:11:17.030979+02:00", "EventTime": "2023-10-30T14:11:17.030997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C2U5Fb4E6xYVIHGS6"]} -{"Format": "IDEA0", "ID": "6f3ecc05-3661-433f-8e79-1ab7077a312f", "DetectTime": "2023-10-30T14:11:17.052262+02:00", "EventTime": "2023-10-30T14:11:17.052278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CVZDJN1r0btDkHuS31"]} -{"Format": "IDEA0", "ID": "f4df6ab4-4599-402e-9e88-e667f6a42e3b", "DetectTime": "2023-10-30T14:11:17.072091+02:00", "EventTime": "2023-10-30T14:11:17.072102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CFT7ue2jezWJj7KAJb"]} -{"Format": "IDEA0", "ID": "b9d00697-6eca-448e-a63d-d46ebf7a3784", "DetectTime": "2023-10-30T14:11:17.090093+02:00", "EventTime": "2023-10-30T14:11:17.090109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CKAVfI2LKQoNQcPN48"]} -{"Format": "IDEA0", "ID": "a6360bc2-dcfd-4d6c-93cc-2ab2c1d3cb75", "DetectTime": "2023-10-30T14:11:17.111153+02:00", "EventTime": "2023-10-30T14:11:17.111169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CGKLCm4JJDgqm35LOi"]} -{"Format": "IDEA0", "ID": "2dac0bc5-1cc5-49fd-9d4a-07b07bf689cb", "DetectTime": "2023-10-30T14:11:17.130553+02:00", "EventTime": "2023-10-30T14:11:17.130564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C2BDocO7A9r1RjQC4"]} -{"Format": "IDEA0", "ID": "88e55643-38f9-4e88-af60-faa0f022acad", "DetectTime": "2023-10-30T14:11:17.147443+02:00", "EventTime": "2023-10-30T14:11:17.147460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CVp7pR2d7gmbtWQL2j"]} -{"Format": "IDEA0", "ID": "874189b9-4448-435f-9db0-3196e9d5183b", "DetectTime": "2023-10-30T14:11:17.169832+02:00", "EventTime": "2023-10-30T14:11:17.169849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CxnVAY1E0kLrWtht8"]} -{"Format": "IDEA0", "ID": "8c4243fb-c4dc-4e64-8cd7-9bd8127feba7", "DetectTime": "2023-10-30T14:11:17.190665+02:00", "EventTime": "2023-10-30T14:11:17.190682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFGcT41yQPQSIOba1c"]} -{"Format": "IDEA0", "ID": "13958549-154d-4f2c-8868-085c67191a56", "DetectTime": "2023-10-30T14:11:17.213205+02:00", "EventTime": "2023-10-30T14:11:17.213217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CH2dPR2WAGAI5RHXVk"]} -{"Format": "IDEA0", "ID": "52fd875c-a09e-4eb1-88ce-24eda216a8f5", "DetectTime": "2023-10-30T14:11:17.230042+02:00", "EventTime": "2023-10-30T14:11:17.230053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CUY9CS3eC5m9ChbS3e"]} -{"Format": "IDEA0", "ID": "5ede092a-441f-4dd6-bc5d-64f9fac1d488", "DetectTime": "2023-10-30T14:11:17.247190+02:00", "EventTime": "2023-10-30T14:11:17.247205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["COjx8C1g60L6Is1bX6"]} -{"Format": "IDEA0", "ID": "11c62493-34a5-46b4-ac75-f69862560622", "DetectTime": "2023-10-30T14:11:17.265012+02:00", "EventTime": "2023-10-30T14:11:17.265027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CsTqvA4TyA0sUpUUsf"]} -{"Format": "IDEA0", "ID": "ef1d8206-b872-4315-9c4c-7314010b6d8e", "DetectTime": "2023-10-30T14:11:17.287882+02:00", "EventTime": "2023-10-30T14:11:17.287899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["ClsGJ723fYkq3RbGXf"]} -{"Format": "IDEA0", "ID": "f0e9aa72-efe2-491e-bddb-9f318ac2a810", "DetectTime": "2023-10-30T14:11:17.304790+02:00", "EventTime": "2023-10-30T14:11:17.304801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CZgXh11yq6TQb6cRP5"]} -{"Format": "IDEA0", "ID": "cfc92c0d-f17f-4587-b8ab-ab47e6b9c4a4", "DetectTime": "2023-10-30T14:11:17.323323+02:00", "EventTime": "2023-10-30T14:11:17.323341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C9DyfRS8sBZbuVd97"]} -{"Format": "IDEA0", "ID": "a344f05a-9182-416e-92b8-0f9b883e7720", "DetectTime": "2023-10-30T14:11:17.342232+02:00", "EventTime": "2023-10-30T14:11:17.342248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["Cs4Tw860b5fYF9wpi"]} -{"Format": "IDEA0", "ID": "de2726e8-ae47-4d84-a5f8-c01bf20a6daf", "DetectTime": "2023-10-30T14:11:17.361744+02:00", "EventTime": "2023-10-30T14:11:17.361766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ChoXgK2W3RrLVCucGd"]} -{"Format": "IDEA0", "ID": "a6c09aac-1fc4-49c5-848c-a9193793f8d3", "DetectTime": "2023-10-30T14:11:17.380856+02:00", "EventTime": "2023-10-30T14:11:17.380876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C8DsRJ1vcmYKHTorBa"]} -{"Format": "IDEA0", "ID": "098520ed-b4b4-40b0-9c40-a4195d718c2a", "DetectTime": "2023-10-30T14:11:17.396894+02:00", "EventTime": "2023-10-30T14:11:17.396905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CLBiJ73J47PQrBY3x4"]} -{"Format": "IDEA0", "ID": "2a02456d-b35c-4648-9cdb-5c9175e2707c", "DetectTime": "2023-10-30T14:11:17.419096+02:00", "EventTime": "2023-10-30T14:11:17.419113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CREQga1dEekAVfHU3"]} -{"Format": "IDEA0", "ID": "94a74dd7-2901-42cb-b00d-60fb0b613a40", "DetectTime": "2023-10-30T14:11:17.441841+02:00", "EventTime": "2023-10-30T14:11:17.441857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CbORFC2jozfUb0iU5f"]} -{"Format": "IDEA0", "ID": "ade20e7d-8e5c-4672-bfbb-8f14d108c5ea", "DetectTime": "2023-10-30T14:11:17.463835+02:00", "EventTime": "2023-10-30T14:11:17.463850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C6WWq84UxNreUWltvc"]} -{"Format": "IDEA0", "ID": "5cf1a397-d2b6-4e4e-bf43-d4329c2f3951", "DetectTime": "2023-10-30T14:11:17.485624+02:00", "EventTime": "2023-10-30T14:11:17.485638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CXuvgZ2dgWF02G94cf"]} -{"Format": "IDEA0", "ID": "84d16d75-d257-4bf6-aeb3-5389f546d025", "DetectTime": "2023-10-30T14:11:17.506118+02:00", "EventTime": "2023-10-30T14:11:17.506128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CAWRId2Q5cmiKX2re8"]} -{"Format": "IDEA0", "ID": "db3daa77-75b7-465a-9be2-5a3bffa1ccef", "DetectTime": "2023-10-30T14:11:17.526038+02:00", "EventTime": "2023-10-30T14:11:17.526055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CqDEXR1I4N7X9Ye344"]} -{"Format": "IDEA0", "ID": "dc03e361-267f-4539-b4e2-7d429eb2cf99", "DetectTime": "2023-10-30T14:11:17.546333+02:00", "EventTime": "2023-10-30T14:11:17.546352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Ci3WAr45F2PmlWZRy4"]} -{"Format": "IDEA0", "ID": "210ecae5-494d-4d3d-ab44-6f5ddbb17c06", "DetectTime": "2023-10-30T14:11:17.567211+02:00", "EventTime": "2023-10-30T14:11:17.567222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CSEHNQ2xgnqqvszEU7"]} -{"Format": "IDEA0", "ID": "630ef8ae-ee9b-42e2-bba8-381f8933f050", "DetectTime": "2023-10-30T14:11:17.585431+02:00", "EventTime": "2023-10-30T14:11:17.585443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CAs1XJ18Mk8v3E8h06"]} -{"Format": "IDEA0", "ID": "72dcb025-b6e5-4b1f-b313-7bcb75573d78", "DetectTime": "2023-10-30T14:11:17.611860+02:00", "EventTime": "2023-10-30T14:11:17.611877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CMKxJf2eHFugCdK8c6"]} -{"Format": "IDEA0", "ID": "de91575c-0830-4f68-b620-f76691102da7", "DetectTime": "2023-10-30T14:11:17.627784+02:00", "EventTime": "2023-10-30T14:11:17.627795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C9G1fu3lgUl4oz8sh1"]} -{"Format": "IDEA0", "ID": "888f88f6-0fc2-4cdc-b135-66362f9af626", "DetectTime": "2023-10-30T14:11:17.646852+02:00", "EventTime": "2023-10-30T14:11:17.646868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C3NnNN2HKtHOT2RgKb"]} -{"Format": "IDEA0", "ID": "0eb52de6-b9b4-4429-84e7-f8d378a1ae0b", "DetectTime": "2023-10-30T14:11:17.663559+02:00", "EventTime": "2023-10-30T14:11:17.663573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C0ff96O0ZZtATpsod"]} -{"Format": "IDEA0", "ID": "c77f2368-c037-4c10-bc07-2b6b91f6f5ca", "DetectTime": "2023-10-30T14:11:17.682527+02:00", "EventTime": "2023-10-30T14:11:17.682543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["ChGJai3LuMX2bwOR7e"]} -{"Format": "IDEA0", "ID": "9e53dbba-355b-4da8-aeb2-346c9986c075", "DetectTime": "2023-10-30T14:11:17.701820+02:00", "EventTime": "2023-10-30T14:11:17.701831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CyG87w4T0LkXuxljg9"]} -{"Format": "IDEA0", "ID": "015c0a68-2cd2-43f0-8cdd-be9a00a274c6", "DetectTime": "2023-10-30T14:11:17.719785+02:00", "EventTime": "2023-10-30T14:11:17.719795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cdu4o03BG3Xcvap7m3"]} -{"Format": "IDEA0", "ID": "0e0c7782-9eb4-4ee1-b51a-c5fa94f02f9d", "DetectTime": "2023-10-30T14:11:17.738404+02:00", "EventTime": "2023-10-30T14:11:17.738420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CEhP2e2W5DO476TS3d"]} -{"Format": "IDEA0", "ID": "50101300-e7e7-4ada-8ef0-ae8212340479", "DetectTime": "2023-10-30T14:11:17.754315+02:00", "EventTime": "2023-10-30T14:11:17.754326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CftWm81lN7vsuieWHc"]} -{"Format": "IDEA0", "ID": "79007c9a-f528-4480-bf7c-f6cd74804e36", "DetectTime": "2023-10-30T14:11:17.775006+02:00", "EventTime": "2023-10-30T14:11:17.775022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CeCL8A04PnYE24Tyc"]} -{"Format": "IDEA0", "ID": "e4d40385-379a-4893-a238-bac8fbdf3471", "DetectTime": "2023-10-30T14:11:17.796088+02:00", "EventTime": "2023-10-30T14:11:17.796098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CfmuRq3Ra3EVIA5kmc"]} -{"Format": "IDEA0", "ID": "35fded72-1ce1-4cf8-9ef3-e57d93dc0ffe", "DetectTime": "2023-10-30T14:11:17.818255+02:00", "EventTime": "2023-10-30T14:11:17.818273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CvcuUR3HlQpuPDloji"]} -{"Format": "IDEA0", "ID": "fff6c1da-3dc2-4bb8-b601-5eadd57d3687", "DetectTime": "2023-10-30T14:11:17.843239+02:00", "EventTime": "2023-10-30T14:11:17.843257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CI0nhj2qkdUiAehwmk"]} -{"Format": "IDEA0", "ID": "118996fa-6789-4ee1-bf26-d6e21cd68178", "DetectTime": "2023-10-30T14:11:17.865665+02:00", "EventTime": "2023-10-30T14:11:17.865682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CEZGcv1lBeQdRsNTa"]} -{"Format": "IDEA0", "ID": "5c794a12-8dbd-481f-992b-07b695f4141a", "DetectTime": "2023-10-30T14:11:17.885212+02:00", "EventTime": "2023-10-30T14:11:17.885225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CVujlH2A5u8Z8V0g68"]} -{"Format": "IDEA0", "ID": "4276242f-e9bf-4446-9ebf-5402fb21f61e", "DetectTime": "2023-10-30T14:11:17.907858+02:00", "EventTime": "2023-10-30T14:11:17.907873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CkIaPb2wxqtDfPrrCa"]} -{"Format": "IDEA0", "ID": "08d1bac8-f340-4589-b7b2-4012171b9566", "DetectTime": "2023-10-30T14:11:17.930171+02:00", "EventTime": "2023-10-30T14:11:17.930186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CvIFiD1BxcjU0hb8ce"]} -{"Format": "IDEA0", "ID": "93566dc7-abe2-4d40-aa8e-d25cb2b439ff", "DetectTime": "2023-10-30T14:11:17.947984+02:00", "EventTime": "2023-10-30T14:11:17.947996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CeJT643qNNLngD9OGk"]} -{"Format": "IDEA0", "ID": "8a4298e3-b93d-4c8e-bd24-c8cc0ee80121", "DetectTime": "2023-10-30T14:11:17.965426+02:00", "EventTime": "2023-10-30T14:11:17.965437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQdkOp4fEWn5GWyT74"]} -{"Format": "IDEA0", "ID": "b4a912cd-48f2-451b-b6c7-b4e7b6c89b31", "DetectTime": "2023-10-30T14:11:17.988561+02:00", "EventTime": "2023-10-30T14:11:17.988577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsNwet1c0njSFd6YWc"]} -{"Format": "IDEA0", "ID": "49480ac5-2725-455d-b7e8-d7a4ca42fe93", "DetectTime": "2023-10-30T14:11:18.009227+02:00", "EventTime": "2023-10-30T14:11:18.009238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4L3g0470wVomOjcb3"]} -{"Format": "IDEA0", "ID": "f79dce71-bc44-4854-bcaa-da157b0d041d", "DetectTime": "2023-10-30T14:11:18.029519+02:00", "EventTime": "2023-10-30T14:11:18.029535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CrET0X240UIH9nUARe"]} -{"Format": "IDEA0", "ID": "67faa45c-50b7-4756-a10e-1fa45cddc1d0", "DetectTime": "2023-10-30T14:11:18.046609+02:00", "EventTime": "2023-10-30T14:11:18.046620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CMnRuI1YtKqFo9Cjj"]} -{"Format": "IDEA0", "ID": "041a4044-30e0-4d64-a33e-383a6beba7a9", "DetectTime": "2023-10-30T14:11:18.064188+02:00", "EventTime": "2023-10-30T14:11:18.064198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CNpzPI25QuyC26muI5"]} -{"Format": "IDEA0", "ID": "f73a097b-a710-415e-9bab-95e9a34267b1", "DetectTime": "2023-10-30T14:11:18.081675+02:00", "EventTime": "2023-10-30T14:11:18.081691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["Cmtx9BowL5wUd7OO4"]} -{"Format": "IDEA0", "ID": "cdef17b0-7c79-41ad-a863-472e2089e55b", "DetectTime": "2023-10-30T14:11:18.103631+02:00", "EventTime": "2023-10-30T14:11:18.103648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cm9ZDw43mll4zU4bT4"]} -{"Format": "IDEA0", "ID": "56cf0967-83da-492c-b661-8582d9d0e9c3", "DetectTime": "2023-10-30T14:11:18.121326+02:00", "EventTime": "2023-10-30T14:11:18.121348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CUGjh81ib3g4G5vLh9"]} -{"Format": "IDEA0", "ID": "145e28ab-c2b2-4a3f-823f-1c19fb6e03ca", "DetectTime": "2023-10-30T14:11:18.138556+02:00", "EventTime": "2023-10-30T14:11:18.138570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CGZxXb3cwKOCGOYWp3"]} -{"Format": "IDEA0", "ID": "05298956-3c87-4942-ac47-139ddccff61c", "DetectTime": "2023-10-30T14:11:18.168696+02:00", "EventTime": "2023-10-30T14:11:18.168707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CEnLL731RvYQhHKA6g"]} -{"Format": "IDEA0", "ID": "2e883a88-127a-46aa-8986-1201725c5fa4", "DetectTime": "2023-10-30T14:11:18.185616+02:00", "EventTime": "2023-10-30T14:11:18.185626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["Ccf2wt2eRuLoFceEdb"]} -{"Format": "IDEA0", "ID": "fb4f840e-37b7-49cf-8d14-781c5cc523db", "DetectTime": "2023-10-30T14:11:18.202197+02:00", "EventTime": "2023-10-30T14:11:18.202213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CW569BN72LtvqA7L3"]} -{"Format": "IDEA0", "ID": "0bba2643-12be-4729-85ff-8eb70ec53350", "DetectTime": "2023-10-30T14:11:18.224531+02:00", "EventTime": "2023-10-30T14:11:18.224547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CBFDFr1e3pqqEZYq69"]} -{"Format": "IDEA0", "ID": "abc6c66a-688c-462a-85fd-6bfec81255b9", "DetectTime": "2023-10-30T14:11:18.246626+02:00", "EventTime": "2023-10-30T14:11:18.246643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CdJS3X3TmP43j0VnH3"]} -{"Format": "IDEA0", "ID": "bbad43ff-ea10-4274-b82c-185f12ccfe22", "DetectTime": "2023-10-30T14:11:18.264594+02:00", "EventTime": "2023-10-30T14:11:18.264613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CifElX2yX7zght7ppk"]} -{"Format": "IDEA0", "ID": "688fadb2-ade0-4c2d-b88d-82cbaebda16d", "DetectTime": "2023-10-30T14:11:18.280714+02:00", "EventTime": "2023-10-30T14:11:18.280725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CgYq925yQ7ozj2jsj"]} -{"Format": "IDEA0", "ID": "ce99b3c0-7840-4ac8-83b0-d2c825c26d64", "DetectTime": "2023-10-30T14:11:18.296862+02:00", "EventTime": "2023-10-30T14:11:18.296875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CcfW0E2HXsM5nvGFW"]} -{"Format": "IDEA0", "ID": "2232d99d-8a2d-44bf-8915-a5638a22115b", "DetectTime": "2023-10-30T14:11:18.315050+02:00", "EventTime": "2023-10-30T14:11:18.315062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cmy5lF4nfiM0wmESZi"]} -{"Format": "IDEA0", "ID": "a22e0b7d-fb94-4b25-8f1c-1aac76720747", "DetectTime": "2023-10-30T14:11:18.331533+02:00", "EventTime": "2023-10-30T14:11:18.331551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6AGEn3a7Y8Xo45trk"]} -{"Format": "IDEA0", "ID": "0d7b6bdd-58c5-4476-bded-dff5bd84b09d", "DetectTime": "2023-10-30T14:11:18.352693+02:00", "EventTime": "2023-10-30T14:11:18.352710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CezWRZ2z5eStf3pWA4"]} -{"Format": "IDEA0", "ID": "659fb1a6-3577-4514-b680-ed1ec719c868", "DetectTime": "2023-10-30T14:11:18.376398+02:00", "EventTime": "2023-10-30T14:11:18.376413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CgS49h38WU4bwbN0K9"]} -{"Format": "IDEA0", "ID": "d813225a-0d7c-4dfc-ba2d-64efb53cf075", "DetectTime": "2023-10-30T14:11:18.396332+02:00", "EventTime": "2023-10-30T14:11:18.396343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CZRc5i4MBfLXYxXfJi"]} -{"Format": "IDEA0", "ID": "cd07b7b9-55e4-4663-9111-1e2e9a72bb80", "DetectTime": "2023-10-30T14:11:18.412538+02:00", "EventTime": "2023-10-30T14:11:18.412549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUi6g94pfmJElbjnq"]} -{"Format": "IDEA0", "ID": "e896b6fd-f1df-4c7f-bd06-a01323cc2dd6", "DetectTime": "2023-10-30T14:11:18.426804+02:00", "EventTime": "2023-10-30T14:11:18.426815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cl81wA2zUcJKCrkhn1"]} -{"Format": "IDEA0", "ID": "702b862a-c919-42c3-a8a3-9f9ed15fb511", "DetectTime": "2023-10-30T14:11:18.444486+02:00", "EventTime": "2023-10-30T14:11:18.444501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cnhp51rjdULqVBbH4"]} -{"Format": "IDEA0", "ID": "17842338-e408-4548-bded-2e91c08f0d12", "DetectTime": "2023-10-30T14:11:18.460790+02:00", "EventTime": "2023-10-30T14:11:18.460800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CfZNf620tsvNu43Iec"]} -{"Format": "IDEA0", "ID": "bf4062cb-84da-4ce5-86c8-43463c5c95f1", "DetectTime": "2023-10-30T14:11:18.480507+02:00", "EventTime": "2023-10-30T14:11:18.480524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CA8JHf1z6XVwBIOSV6"]} -{"Format": "IDEA0", "ID": "3479c21c-7816-4ab1-a71b-66f9bcf67003", "DetectTime": "2023-10-30T14:11:18.497063+02:00", "EventTime": "2023-10-30T14:11:18.497080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQydQ6JS72vLtJCv"]} -{"Format": "IDEA0", "ID": "4cd8bb99-6137-45de-b006-1ce5cc070b0e", "DetectTime": "2023-10-30T14:11:18.512655+02:00", "EventTime": "2023-10-30T14:11:18.512665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CnAF7618pfk4JFRgCb"]} -{"Format": "IDEA0", "ID": "f6f8e4af-09a8-4cc1-81ce-3fa8ee262f86", "DetectTime": "2023-10-30T14:11:18.531131+02:00", "EventTime": "2023-10-30T14:11:18.531143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CcvIpr2MoPii4Y2XL1"]} -{"Format": "IDEA0", "ID": "c8a25a92-b8d0-4f7e-9192-2ff37e67de5f", "DetectTime": "2023-10-30T14:11:18.549549+02:00", "EventTime": "2023-10-30T14:11:18.549563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CJ6B4F3qmCtpwwdpxa"]} -{"Format": "IDEA0", "ID": "210e588e-6a11-4ffd-aba2-1b25f61f907a", "DetectTime": "2023-10-30T14:11:18.572639+02:00", "EventTime": "2023-10-30T14:11:18.572655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CkmvVR3jgT2gWJPppe"]} -{"Format": "IDEA0", "ID": "26a3dd5f-7027-4dec-8ec0-80302e2668a2", "DetectTime": "2023-10-30T14:11:18.594121+02:00", "EventTime": "2023-10-30T14:11:18.594138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CWdxqR2NA0QuXUTM76"]} -{"Format": "IDEA0", "ID": "230c2265-eeb1-469b-9bb4-e67806dbbdf8", "DetectTime": "2023-10-30T14:11:18.613527+02:00", "EventTime": "2023-10-30T14:11:18.613540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cq05oY2JrJynjVcd0i"]} -{"Format": "IDEA0", "ID": "7acd446c-611e-4fea-b91f-15ea62eb43c1", "DetectTime": "2023-10-30T14:11:18.631462+02:00", "EventTime": "2023-10-30T14:11:18.631477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C6sIQx4EDsCOO7BXHc"]} -{"Format": "IDEA0", "ID": "b69b2cb6-fea5-42ad-9713-3e3f355f8e26", "DetectTime": "2023-10-30T14:11:18.661351+02:00", "EventTime": "2023-10-30T14:11:18.661364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CVs39i1Y256zjljBdg"]} -{"Format": "IDEA0", "ID": "a9018f73-701a-405d-af3f-c8057de2fc85", "DetectTime": "2023-10-30T14:11:18.678819+02:00", "EventTime": "2023-10-30T14:11:18.678832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CDWYWC4WZwdtNrvtXk"]} -{"Format": "IDEA0", "ID": "72355b82-3405-4681-97bc-a7c596eae8e1", "DetectTime": "2023-10-30T14:11:18.695451+02:00", "EventTime": "2023-10-30T14:11:18.695462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CLJntr4KOJKsLmMa0j"]} -{"Format": "IDEA0", "ID": "212dbf1b-93e8-4fb8-8f29-acf27b2a6f5c", "DetectTime": "2023-10-30T14:11:18.712655+02:00", "EventTime": "2023-10-30T14:11:18.712673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CEWO4J1B1OmqmqQSFf"]} -{"Format": "IDEA0", "ID": "48b6412f-8beb-4ba1-bf94-cd10d0ff36bb", "DetectTime": "2023-10-30T14:11:18.735401+02:00", "EventTime": "2023-10-30T14:11:18.735413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C7Nf9s3KVBXv33HZB1"]} -{"Format": "IDEA0", "ID": "19c41e35-9a05-4e86-938c-21a920cfb233", "DetectTime": "2023-10-30T14:11:18.753568+02:00", "EventTime": "2023-10-30T14:11:18.753583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrBTub6IuIMm4Jggg"]} -{"Format": "IDEA0", "ID": "193cd8c2-a9cc-488b-b069-92415eb2d0bc", "DetectTime": "2023-10-30T14:11:18.774143+02:00", "EventTime": "2023-10-30T14:11:18.774164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C0c5Q14gj819zaoOb3"]} -{"Format": "IDEA0", "ID": "da361f24-ca83-4664-b103-12084876258f", "DetectTime": "2023-10-30T14:11:18.797288+02:00", "EventTime": "2023-10-30T14:11:18.797303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C7Fpgn2dqfOFWdLvgg"]} -{"Format": "IDEA0", "ID": "878b83be-8ffc-48dd-9661-07b5e6b68e34", "DetectTime": "2023-10-30T14:11:18.816930+02:00", "EventTime": "2023-10-30T14:11:18.816941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C0lOOdgsTbyZNiczb"]} -{"Format": "IDEA0", "ID": "a4188b86-ce30-4da5-8b0e-ebb3b60f5291", "DetectTime": "2023-10-30T14:11:18.836966+02:00", "EventTime": "2023-10-30T14:11:18.836978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CWFNv63eGAhRkq0S5d"]} -{"Format": "IDEA0", "ID": "35c4009b-6e9d-4207-b5f2-4ae2bf0d43b9", "DetectTime": "2023-10-30T14:11:18.853230+02:00", "EventTime": "2023-10-30T14:11:18.853240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CpdOmt1GT8w37ZVPJb"]} -{"Format": "IDEA0", "ID": "37c168d5-5779-4e28-9464-fc7286a5e2c7", "DetectTime": "2023-10-30T14:11:18.875166+02:00", "EventTime": "2023-10-30T14:11:18.875181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CSOkqi4dF7ZWdQONxh"]} -{"Format": "IDEA0", "ID": "354dc583-516a-404b-9d14-1126218984eb", "DetectTime": "2023-10-30T14:11:18.898357+02:00", "EventTime": "2023-10-30T14:11:18.898369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C64sn43In8sleL1Ksl"]} -{"Format": "IDEA0", "ID": "fecc28a9-158c-42b5-ac6d-8653e58e7eed", "DetectTime": "2023-10-30T14:11:18.916912+02:00", "EventTime": "2023-10-30T14:11:18.916922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CeQwch9YCaUdGFfEb"]} -{"Format": "IDEA0", "ID": "a16db710-813f-4c31-a92d-4e248e1d9f5f", "DetectTime": "2023-10-30T14:11:18.938737+02:00", "EventTime": "2023-10-30T14:11:18.938753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CXEFloUmf9t3pKro7"]} -{"Format": "IDEA0", "ID": "39aa6f2b-0315-428c-a4d3-1fa9f3595200", "DetectTime": "2023-10-30T14:11:18.959895+02:00", "EventTime": "2023-10-30T14:11:18.959907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CWG2dr1djgbgmzk3u2"]} -{"Format": "IDEA0", "ID": "78b53f59-5b5f-46b2-bee0-5d8ef97976e5", "DetectTime": "2023-10-30T14:11:18.978673+02:00", "EventTime": "2023-10-30T14:11:18.978685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CIdFOA4KoxpNXgUyyb"]} -{"Format": "IDEA0", "ID": "d5f0178d-5316-4f00-9b58-b8cfd6b219c5", "DetectTime": "2023-10-30T14:11:18.996370+02:00", "EventTime": "2023-10-30T14:11:18.996390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CzXYGG3FttLjAMu6m8"]} -{"Format": "IDEA0", "ID": "72b209f2-3591-495f-a1b1-b8276a61bf10", "DetectTime": "2023-10-30T14:11:19.012061+02:00", "EventTime": "2023-10-30T14:11:19.012073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CyHqMKBswGBnHJg08"]} -{"Format": "IDEA0", "ID": "b29d73e3-dccc-410f-9da6-4bc332ce5f34", "DetectTime": "2023-10-30T14:11:19.033594+02:00", "EventTime": "2023-10-30T14:11:19.033610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9tRxG3eyXLVt0M9oe"]} -{"Format": "IDEA0", "ID": "a06a7511-b2e0-4230-a257-765da2bad437", "DetectTime": "2023-10-30T14:11:19.052761+02:00", "EventTime": "2023-10-30T14:11:19.052772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cohr9b1GxfuoxSjdmg"]} -{"Format": "IDEA0", "ID": "e6d2908b-f8f6-4b54-9538-d055850bc88d", "DetectTime": "2023-10-30T14:11:19.071376+02:00", "EventTime": "2023-10-30T14:11:19.071391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZzI5f3ZugEE0y7JMk"]} -{"Format": "IDEA0", "ID": "06d9ecc9-4f3d-4086-9a70-0ba349970fd4", "DetectTime": "2023-10-30T14:11:19.087783+02:00", "EventTime": "2023-10-30T14:11:19.087795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CSJo5e3am1qBDQmJGd"]} -{"Format": "IDEA0", "ID": "ce160d32-182f-4a86-9898-2792cc752091", "DetectTime": "2023-10-30T14:11:19.106588+02:00", "EventTime": "2023-10-30T14:11:19.106601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Clgbxu2cxddtfYK0Ca"]} -{"Format": "IDEA0", "ID": "e441a52e-6120-440f-aa1c-f6612c40eb18", "DetectTime": "2023-10-30T14:11:19.126072+02:00", "EventTime": "2023-10-30T14:11:19.126083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ca6S8p2wvRjjvhJiH7"]} -{"Format": "IDEA0", "ID": "9f3ff615-6295-4bd6-8a14-4290e8b3a932", "DetectTime": "2023-10-30T14:11:19.145451+02:00", "EventTime": "2023-10-30T14:11:19.145462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ce6JVA2BeYKMNER5d2"]} -{"Format": "IDEA0", "ID": "91fb6cd5-2ff3-41f3-9d36-8ec846524b66", "DetectTime": "2023-10-30T14:11:19.163685+02:00", "EventTime": "2023-10-30T14:11:19.163706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CFxFwK1qj3Xcx4tz82"]} -{"Format": "IDEA0", "ID": "bde333d4-83b8-4e35-b205-930105952472", "DetectTime": "2023-10-30T14:11:19.182320+02:00", "EventTime": "2023-10-30T14:11:19.182332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C1GzkN3vN57b4wIHB"]} -{"Format": "IDEA0", "ID": "d1dec95b-d2ff-415d-9291-d7ace46cab1d", "DetectTime": "2023-10-30T14:11:19.200301+02:00", "EventTime": "2023-10-30T14:11:19.200325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C5NPal42E3KbGhvJV3"]} -{"Format": "IDEA0", "ID": "d33083d8-3e20-4f69-a5ac-9ce35901a84a", "DetectTime": "2023-10-30T14:11:19.220076+02:00", "EventTime": "2023-10-30T14:11:19.220087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CRawZO3kCcDzAwFC8"]} -{"Format": "IDEA0", "ID": "3c915245-02af-457f-bcc9-734e511cc2e5", "DetectTime": "2023-10-30T14:11:19.241781+02:00", "EventTime": "2023-10-30T14:11:19.241797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CP1S311NyyeukHjsFc"]} -{"Format": "IDEA0", "ID": "1c956d26-4892-4449-af99-b6eaacd5766d", "DetectTime": "2023-10-30T14:11:19.262478+02:00", "EventTime": "2023-10-30T14:11:19.262499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CWNd8u3jrfvgjypm3l"]} -{"Format": "IDEA0", "ID": "3d13cfc5-b10d-4091-9703-8ccfdc76fc11", "DetectTime": "2023-10-30T14:11:19.285568+02:00", "EventTime": "2023-10-30T14:11:19.285581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CoC38A4OuWksgLYws9"]} -{"Format": "IDEA0", "ID": "396526d7-7a23-4d51-b3a6-1617c80e00d7", "DetectTime": "2023-10-30T14:11:19.306982+02:00", "EventTime": "2023-10-30T14:11:19.306993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CSm9sKUKBbJcSlwI4"]} -{"Format": "IDEA0", "ID": "aa376a60-06cb-4484-82e0-050a297a469f", "DetectTime": "2023-10-30T14:11:19.325605+02:00", "EventTime": "2023-10-30T14:11:19.325622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CdM4hzmNX5QWJkz9l"]} -{"Format": "IDEA0", "ID": "f330fd52-36c2-4702-99a1-1dcbd0c80ae9", "DetectTime": "2023-10-30T14:11:19.346167+02:00", "EventTime": "2023-10-30T14:11:19.346186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cyt2FF4b2n40dOoEKk"]} -{"Format": "IDEA0", "ID": "530bf362-46b5-423d-abd3-12975769925d", "DetectTime": "2023-10-30T14:11:19.369932+02:00", "EventTime": "2023-10-30T14:11:19.369946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CE3i8e70xjvtOJAvg"]} -{"Format": "IDEA0", "ID": "d4c2d16f-25b1-4ac8-b6cb-a5f07a60ba23", "DetectTime": "2023-10-30T14:11:19.396082+02:00", "EventTime": "2023-10-30T14:11:19.396102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C1bReB1vvqqxrVON5c"]} -{"Format": "IDEA0", "ID": "190ca681-dd7a-47f6-a283-a5455ecc7401", "DetectTime": "2023-10-30T14:11:19.433186+02:00", "EventTime": "2023-10-30T14:11:19.433200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CQ5XP82Yvot4OVu5Ui"]} -{"Format": "IDEA0", "ID": "a40903f8-0c29-426e-8162-f27bad13498b", "DetectTime": "2023-10-30T14:11:19.451125+02:00", "EventTime": "2023-10-30T14:11:19.451137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["Cm10z549jIiOBFP7u7"]} -{"Format": "IDEA0", "ID": "52d37e61-fed8-47a4-a39c-f889bb5613dc", "DetectTime": "2023-10-30T14:11:19.468160+02:00", "EventTime": "2023-10-30T14:11:19.468178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cm0MRO1orfrVhGbzTg"]} -{"Format": "IDEA0", "ID": "927990b2-6b63-41e3-963c-83c8e904bf66", "DetectTime": "2023-10-30T14:11:19.483521+02:00", "EventTime": "2023-10-30T14:11:19.483537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["Cy1Flv34s8YLexT2j1"]} -{"Format": "IDEA0", "ID": "9cf42577-e644-4846-b578-53d1254e6487", "DetectTime": "2023-10-30T14:11:19.504475+02:00", "EventTime": "2023-10-30T14:11:19.504502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwX9qHGRw9T8NnLkj"]} -{"Format": "IDEA0", "ID": "fc9437a9-de82-4500-be1d-61cc801be6bd", "DetectTime": "2023-10-30T14:11:19.527066+02:00", "EventTime": "2023-10-30T14:11:19.527082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C0GIyg4RO3xG90sDJ"]} -{"Format": "IDEA0", "ID": "7bf2eff6-d7fa-40d3-a681-01d4374c4882", "DetectTime": "2023-10-30T14:11:19.550604+02:00", "EventTime": "2023-10-30T14:11:19.550619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.164.123.17 ", "ContentType": "text/plain"}], "uids": ["CtPaJGv9cXOdPyUQc"]} -{"Format": "IDEA0", "ID": "c44fd7ec-e5c8-4525-94dd-0f9821d26477", "DetectTime": "2023-10-30T14:11:19.573536+02:00", "EventTime": "2023-10-30T14:11:19.573548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CQ5C3uONKCmaIShbi"]} -{"Format": "IDEA0", "ID": "204cca62-0961-41c7-a2d7-95105d0167a6", "DetectTime": "2023-10-30T14:11:19.591066+02:00", "EventTime": "2023-10-30T14:11:19.591077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C4iQEx1rvLmiaZFlef"]} -{"Format": "IDEA0", "ID": "2f7af986-c38d-408b-9e82-1f0e17c55295", "DetectTime": "2023-10-30T14:11:19.608240+02:00", "EventTime": "2023-10-30T14:11:19.608256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CezbLd1hfgnKkZnHwk"]} -{"Format": "IDEA0", "ID": "41004553-7153-4acc-bba0-ecf382c4ad64", "DetectTime": "2023-10-30T14:11:19.626421+02:00", "EventTime": "2023-10-30T14:11:19.626436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["C5mKos13vxrsOGzWzd"]} -{"Format": "IDEA0", "ID": "8f7d1b5c-6c0e-496e-900f-014e6b2565b4", "DetectTime": "2023-10-30T14:11:19.646982+02:00", "EventTime": "2023-10-30T14:11:19.646994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CzHb5b3LvPXizA9QY2"]} -{"Format": "IDEA0", "ID": "f101f9c7-d100-46c9-ab85-0c470a53116a", "DetectTime": "2023-10-30T14:11:19.661587+02:00", "EventTime": "2023-10-30T14:11:19.661600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["Cv5mdb2BXRdCNX8O0i"]} -{"Format": "IDEA0", "ID": "49cf14dc-affe-4d0b-bc09-e551d03728b8", "DetectTime": "2023-10-30T14:11:19.681187+02:00", "EventTime": "2023-10-30T14:11:19.681204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CaRoRu2G1W9sOKG24d"]} -{"Format": "IDEA0", "ID": "dcad5173-fa09-4ae7-99a0-eb6bc2c2dd34", "DetectTime": "2023-10-30T14:11:19.703620+02:00", "EventTime": "2023-10-30T14:11:19.703636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CQeYPD3CR7IoC5gbx"]} -{"Format": "IDEA0", "ID": "bfa48940-ba94-426c-ba9f-a6655eb94f87", "DetectTime": "2023-10-30T14:11:19.721538+02:00", "EventTime": "2023-10-30T14:11:19.721553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CcOWH4B2D2lSAIa7l"]} -{"Format": "IDEA0", "ID": "fb3a0754-3722-4ad1-a1ef-cdffbb6ea86e", "DetectTime": "2023-10-30T14:11:19.740999+02:00", "EventTime": "2023-10-30T14:11:19.741018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C5bqoS536C7A91Td7"]} -{"Format": "IDEA0", "ID": "fd8adc42-8b3a-4746-adc4-697fce878211", "DetectTime": "2023-10-30T14:11:19.758997+02:00", "EventTime": "2023-10-30T14:11:19.759009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXr6JbajKQOQW4Mxe"]} -{"Format": "IDEA0", "ID": "7073a4ef-96f2-4b61-9dbc-1f1b17071f64", "DetectTime": "2023-10-30T14:11:19.777458+02:00", "EventTime": "2023-10-30T14:11:19.777475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cc7roK3rWGTIlgwDrh"]} -{"Format": "IDEA0", "ID": "8da9721e-584a-4654-af2c-f562498149bc", "DetectTime": "2023-10-30T14:11:19.796571+02:00", "EventTime": "2023-10-30T14:11:19.796583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CiN5ak3h9wweJ7I015"]} -{"Format": "IDEA0", "ID": "bacb7551-9928-4615-8524-fb79f1405d13", "DetectTime": "2023-10-30T14:11:19.815554+02:00", "EventTime": "2023-10-30T14:11:19.815564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CRdRNR2IyCpn6M8Kic"]} -{"Format": "IDEA0", "ID": "f7cafa60-92b2-4dfd-9223-27caca254dd2", "DetectTime": "2023-10-30T14:11:19.835206+02:00", "EventTime": "2023-10-30T14:11:19.835222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C42JHyKBtIXnxLy58"]} -{"Format": "IDEA0", "ID": "bcc14f26-ed1d-4304-ae06-2313dd05d890", "DetectTime": "2023-10-30T14:11:19.857452+02:00", "EventTime": "2023-10-30T14:11:19.857463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CjoXli4kfe2YeIXAYg"]} -{"Format": "IDEA0", "ID": "7dcad47b-1b97-4e1a-a065-8c5b59d65392", "DetectTime": "2023-10-30T14:11:19.874358+02:00", "EventTime": "2023-10-30T14:11:19.874371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CmFnRHLM7ebrTlPkh"]} -{"Format": "IDEA0", "ID": "472c313f-22e5-4bc8-abec-2eef60eec8a9", "DetectTime": "2023-10-30T14:11:19.892178+02:00", "EventTime": "2023-10-30T14:11:19.892193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CwIFa96DRUqohXhq5"]} -{"Format": "IDEA0", "ID": "30c88ea4-10c7-421d-8982-c49237574a98", "DetectTime": "2023-10-30T14:11:19.910146+02:00", "EventTime": "2023-10-30T14:11:19.910162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CO72sdMoCneDre3p"]} -{"Format": "IDEA0", "ID": "cbd44599-78a1-48d6-a195-40abda47a826", "DetectTime": "2023-10-30T14:11:19.933422+02:00", "EventTime": "2023-10-30T14:11:19.933437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C8zGJr4h2OvaDiK0kk"]} -{"Format": "IDEA0", "ID": "00c859fb-4d41-4278-b8a0-372bff6ca220", "DetectTime": "2023-10-30T14:11:19.953889+02:00", "EventTime": "2023-10-30T14:11:19.953907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CQLrTM3xnvwtGV5Jw9"]} -{"Format": "IDEA0", "ID": "9e3fcc5a-e50a-4c3f-9d0b-16286a2d7a31", "DetectTime": "2023-10-30T14:11:19.973370+02:00", "EventTime": "2023-10-30T14:11:19.973382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CLIuGV2D5mqdnqn4G9"]} -{"Format": "IDEA0", "ID": "918359c5-3f6d-4378-94a6-a8f97bdf6d60", "DetectTime": "2023-10-30T14:11:19.990714+02:00", "EventTime": "2023-10-30T14:11:19.990725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CUzTJ423NbGJmD4SLj"]} -{"Format": "IDEA0", "ID": "5535e7a1-e1c1-4fb4-be4e-9f189531c699", "DetectTime": "2023-10-30T14:11:20.009471+02:00", "EventTime": "2023-10-30T14:11:20.009482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CW9ulH2ka1KtVqypOb"]} -{"Format": "IDEA0", "ID": "7ed37a0e-29bf-4565-b95e-e506dfb84df7", "DetectTime": "2023-10-30T14:11:20.030752+02:00", "EventTime": "2023-10-30T14:11:20.030767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CGzo2c1gaiKlvOqgt9"]} -{"Format": "IDEA0", "ID": "d8dde963-31b2-45a8-bf6d-62dba83d579d", "DetectTime": "2023-10-30T14:11:20.047693+02:00", "EventTime": "2023-10-30T14:11:20.047706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CM0nZf1hv9nNtYBsYb"]} -{"Format": "IDEA0", "ID": "a56a0c70-af7d-435c-8552-0ce1d3c764c9", "DetectTime": "2023-10-30T14:11:20.068490+02:00", "EventTime": "2023-10-30T14:11:20.068506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C4LNWl2XIw2TiD95M3"]} -{"Format": "IDEA0", "ID": "5cbbc6d8-0793-4f57-8550-12391ca5a019", "DetectTime": "2023-10-30T14:11:20.085939+02:00", "EventTime": "2023-10-30T14:11:20.085950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CwFx7m19K0kGQzPxF5"]} -{"Format": "IDEA0", "ID": "f47406dd-34d1-4034-97e9-2c38ed480623", "DetectTime": "2023-10-30T14:11:20.101805+02:00", "EventTime": "2023-10-30T14:11:20.101822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CsNyBQvY2FxK8XjF6"]} -{"Format": "IDEA0", "ID": "667c287c-a610-429f-881d-ec0e04342610", "DetectTime": "2023-10-30T14:11:20.121608+02:00", "EventTime": "2023-10-30T14:11:20.121620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CLnkXu39Wmb33mtHwg"]} -{"Format": "IDEA0", "ID": "17e76bd3-f1d4-4276-ba29-1c01c8462108", "DetectTime": "2023-10-30T14:11:20.140182+02:00", "EventTime": "2023-10-30T14:11:20.140195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CF0Ay73AXt1tMUfWBf"]} -{"Format": "IDEA0", "ID": "2b8bf611-4419-4ff3-96c6-f9b791b58eaf", "DetectTime": "2023-10-30T14:11:20.160525+02:00", "EventTime": "2023-10-30T14:11:20.160552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CxuNLWjBbPyScOgMe"]} -{"Format": "IDEA0", "ID": "a4a48a91-0769-444d-8577-95bc0749d32a", "DetectTime": "2023-10-30T14:11:20.180210+02:00", "EventTime": "2023-10-30T14:11:20.180220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CiBTIz2jg6KvD9PnW8"]} -{"Format": "IDEA0", "ID": "ebe52f68-5aaa-47f5-a511-b4ada487f7c9", "DetectTime": "2023-10-30T14:11:20.198079+02:00", "EventTime": "2023-10-30T14:11:20.198089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJqAXM2j3p2UZD6VCe"]} -{"Format": "IDEA0", "ID": "b3f3616f-b6ea-475a-b261-20b7a5789f4d", "DetectTime": "2023-10-30T14:11:20.216987+02:00", "EventTime": "2023-10-30T14:11:20.217004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CCQIVgUknC2WvS3z9"]} -{"Format": "IDEA0", "ID": "1fbcd6a8-94ac-4547-9a78-da2d05f01384", "DetectTime": "2023-10-30T14:11:20.238991+02:00", "EventTime": "2023-10-30T14:11:20.239009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CnzO7q3gYmUfR7HTb2"]} -{"Format": "IDEA0", "ID": "ce01b494-fe42-42f1-b586-ee3cf1ecc2e8", "DetectTime": "2023-10-30T14:11:20.260058+02:00", "EventTime": "2023-10-30T14:11:20.260073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CXDGLdu9wFlW9HZra"]} -{"Format": "IDEA0", "ID": "c90aa979-3fa5-47d1-aa86-cb5535049a74", "DetectTime": "2023-10-30T14:11:20.282843+02:00", "EventTime": "2023-10-30T14:11:20.282855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C9h5yo2Dykj0vYkuIe"]} -{"Format": "IDEA0", "ID": "f6bb0ba7-a094-4d08-893e-032ac075eacf", "DetectTime": "2023-10-30T14:11:20.302744+02:00", "EventTime": "2023-10-30T14:11:20.302757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQamHGt5twSqCMiZa"]} -{"Format": "Json", "ID": "f6bb0ba7-a094-4d08-893e-032ac075eacf", "DetectTime": "2023-10-30T14:11:20.302744+02:00", "EventTime": "2023-10-30T14:11:20.302757+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:26:55.456964+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:20.383420)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c602875-8cb6-4dd1-99ae-34c8d7317d28", "DetectTime": "2023-10-30T14:11:20.388601+02:00", "EventTime": "2023-10-30T14:11:20.388612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cz1Nus2df5RrVBSF46"]} -{"Format": "IDEA0", "ID": "ee839d55-cc73-4ff2-b891-51bc8c3cae4e", "DetectTime": "2023-10-30T14:11:20.415143+02:00", "EventTime": "2023-10-30T14:11:20.415169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CN7W891TTz8oRG4e9c"]} -{"Format": "IDEA0", "ID": "5b306dd1-a352-4ca4-923d-ce384b6f9764", "DetectTime": "2023-10-30T14:11:20.440865+02:00", "EventTime": "2023-10-30T14:11:20.440882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C42cHA2e4VUawvj4k"]} -{"Format": "IDEA0", "ID": "dbd710f4-4128-4213-b5dd-74b5f79b146b", "DetectTime": "2023-10-30T14:11:20.489066+02:00", "EventTime": "2023-10-30T14:11:20.489088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["Ct4ZICuTkW04HMwz1"]} -{"Format": "IDEA0", "ID": "feced03e-0993-4d3b-af7a-83fe7752f37c", "DetectTime": "2023-10-30T14:11:20.542906+02:00", "EventTime": "2023-10-30T14:11:20.542934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CNi6D54cfLhwDzGeb6"]} -{"Format": "IDEA0", "ID": "28ff4e1f-c7c0-4961-9022-d8d00d3e98bf", "DetectTime": "2023-10-30T14:11:20.580015+02:00", "EventTime": "2023-10-30T14:11:20.580039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cb9KL91ixFQwkTRLXb"]} -{"Format": "IDEA0", "ID": "97e8b720-6b38-476f-818f-d97d0ad11517", "DetectTime": "2023-10-30T14:11:20.606636+02:00", "EventTime": "2023-10-30T14:11:20.606655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C91hvB21u6vMRMkjUd"]} -{"Format": "IDEA0", "ID": "87f2a890-ead7-4022-be2c-8fa5585d61a4", "DetectTime": "2023-10-30T14:11:20.633206+02:00", "EventTime": "2023-10-30T14:11:20.633233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CBRa7G3tKeCJQ3hqyj"]} -{"Format": "IDEA0", "ID": "25c7a428-6048-48dd-aca5-5278d02a29b5", "DetectTime": "2023-10-30T14:11:20.659854+02:00", "EventTime": "2023-10-30T14:11:20.659870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNnKqdExelpbIoUcf"]} -{"Format": "IDEA0", "ID": "469c3459-341a-4e6c-9c25-0f793b53aa70", "DetectTime": "2023-10-30T14:11:20.682298+02:00", "EventTime": "2023-10-30T14:11:20.682319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CZRlbj4kdAeYttdZKh"]} -{"Format": "IDEA0", "ID": "5db6c6f5-1da9-4c10-9327-665ae0f6f937", "DetectTime": "2023-10-30T14:11:20.706539+02:00", "EventTime": "2023-10-30T14:11:20.706555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C0wI2c2I1W1zoTMena"]} -{"Format": "IDEA0", "ID": "24ad6396-2578-4edb-9b98-140fe61320a0", "DetectTime": "2023-10-30T14:11:20.727680+02:00", "EventTime": "2023-10-30T14:11:20.727691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cg7rzn2sRi2orDowLc"]} -{"Format": "IDEA0", "ID": "c3656cec-1f7f-4b70-b17f-99003d8d5e1a", "DetectTime": "2023-10-30T14:11:20.748803+02:00", "EventTime": "2023-10-30T14:11:20.748825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CNQdYk2V8Pubgy32Qa"]} -{"Format": "IDEA0", "ID": "7e6a44d8-38a6-40bc-b4f9-6eac39ca579a", "DetectTime": "2023-10-30T14:11:20.773204+02:00", "EventTime": "2023-10-30T14:11:20.773224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["COU4YbNPXTzBsDQXa"]} -{"Format": "IDEA0", "ID": "8ced4dd4-7a03-457f-95dd-fa9e99402e8f", "DetectTime": "2023-10-30T14:11:20.804508+02:00", "EventTime": "2023-10-30T14:11:20.804526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CZYdPQ1srMVCxOJsfh"]} -{"Format": "IDEA0", "ID": "35e177b9-eb13-4844-aff0-e20b1893a31e", "DetectTime": "2023-10-30T14:11:20.831936+02:00", "EventTime": "2023-10-30T14:11:20.831960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["Ca5zN8P4OsY6ik2s"]} -{"Format": "IDEA0", "ID": "88077445-5ef6-447d-a1fa-fdb2b65e4151", "DetectTime": "2023-10-30T14:11:20.864487+02:00", "EventTime": "2023-10-30T14:11:20.864499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C0cf7y1nQOXBJBNEe4"]} -{"Format": "IDEA0", "ID": "d777b886-a6ae-4c9b-b059-c0e394d140ec", "DetectTime": "2023-10-30T14:11:20.888614+02:00", "EventTime": "2023-10-30T14:11:20.888627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CVjOIYyaFZhy53WYe"]} -{"Format": "IDEA0", "ID": "2d17782a-b249-4d5f-9af4-bec2eb5d8ad4", "DetectTime": "2023-10-30T14:11:20.912918+02:00", "EventTime": "2023-10-30T14:11:20.912929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4j73gM6RXk2eI71j"]} -{"Format": "IDEA0", "ID": "eacdc61e-be47-45f4-8be4-be582323db13", "DetectTime": "2023-10-30T14:11:20.935282+02:00", "EventTime": "2023-10-30T14:11:20.935305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CZcaq54ThA585qqWyi"]} -{"Format": "IDEA0", "ID": "50ebc672-f55b-4524-9535-e20bca70c6c5", "DetectTime": "2023-10-30T14:11:20.959715+02:00", "EventTime": "2023-10-30T14:11:20.959732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CrqF8E4u5nGKL2N0dk"]} -{"Format": "IDEA0", "ID": "863713f6-dc2c-4286-8c19-4f3fa8029721", "DetectTime": "2023-10-30T14:11:20.981454+02:00", "EventTime": "2023-10-30T14:11:20.981467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CxUmhi47bt5L3OCa0b"]} -{"Format": "IDEA0", "ID": "644f137c-fc67-4b7e-8f33-dfbfbf3e5e13", "DetectTime": "2023-10-30T14:11:21.006736+02:00", "EventTime": "2023-10-30T14:11:21.006754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CuKdWU191zkl3NIPG5"]} -{"Format": "IDEA0", "ID": "0fe61441-899e-4d8d-bb1b-c73a4e8d2821", "DetectTime": "2023-10-30T14:11:21.030517+02:00", "EventTime": "2023-10-30T14:11:21.030533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CFAA343SFzsIRzHWki"]} -{"Format": "IDEA0", "ID": "9c7a04a9-91e4-4566-b3e0-21579ad86bd2", "DetectTime": "2023-10-30T14:11:21.056983+02:00", "EventTime": "2023-10-30T14:11:21.057000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CUOGUNvhHiTvC6LQi"]} -{"Format": "IDEA0", "ID": "e7321c61-dcff-480c-990f-21b03d463a90", "DetectTime": "2023-10-30T14:11:21.081102+02:00", "EventTime": "2023-10-30T14:11:21.081122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CyEJFzVt3fzEF8Cp1"]} -{"Format": "IDEA0", "ID": "6529be60-4f69-4ab0-9766-ad7f9a9fb734", "DetectTime": "2023-10-30T14:11:21.108393+02:00", "EventTime": "2023-10-30T14:11:21.108422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CzAmzF1EmIrcH6dw1f"]} -{"Format": "IDEA0", "ID": "f2990275-3b0e-49d3-a816-7bbb57214c5e", "DetectTime": "2023-10-30T14:11:21.133547+02:00", "EventTime": "2023-10-30T14:11:21.133563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CqOxIj2Ju5g8U4ry85"]} -{"Format": "IDEA0", "ID": "06168ab5-4559-4227-b5f5-dd24617e7315", "DetectTime": "2023-10-30T14:11:21.156548+02:00", "EventTime": "2023-10-30T14:11:21.156574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["C7l0yK39rbJN0JQRli"]} -{"Format": "IDEA0", "ID": "d0753b92-f639-428d-8c50-e497917e6e4c", "DetectTime": "2023-10-30T14:11:21.183414+02:00", "EventTime": "2023-10-30T14:11:21.183426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cz4V4p48yTjUzQ0Tqj"]} -{"Format": "IDEA0", "ID": "389b6d6a-45c2-4883-aee6-bf3422bde0b5", "DetectTime": "2023-10-30T14:11:21.207296+02:00", "EventTime": "2023-10-30T14:11:21.207313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C6owfZ2zVtPJ41Oq3"]} -{"Format": "IDEA0", "ID": "835c6dbc-8f27-4373-8046-ed24fe512702", "DetectTime": "2023-10-30T14:11:21.235213+02:00", "EventTime": "2023-10-30T14:11:21.235243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C2aZGAIEpvAKZSvC6"]} -{"Format": "IDEA0", "ID": "65220659-b960-4758-b1d1-f51daf27fda6", "DetectTime": "2023-10-30T14:11:21.258428+02:00", "EventTime": "2023-10-30T14:11:21.258446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CIKo5E2s7qPEwGUjef"]} -{"Format": "IDEA0", "ID": "cfa26404-edda-4ade-854a-cdc16e301b72", "DetectTime": "2023-10-30T14:11:21.282668+02:00", "EventTime": "2023-10-30T14:11:21.282790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C8Ey2J2ReiQnpzZhbc"]} -{"Format": "IDEA0", "ID": "744d7828-cf48-4c20-8a75-761d8e0ce311", "DetectTime": "2023-10-30T14:11:21.305227+02:00", "EventTime": "2023-10-30T14:11:21.305245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYRLng3sWk7S7OE6Wb"]} -{"Format": "IDEA0", "ID": "be4b5ec9-b5c3-4041-98b4-251b71ed6175", "DetectTime": "2023-10-30T14:11:21.327173+02:00", "EventTime": "2023-10-30T14:11:21.327184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CZitnr1i9M95d4nS4j"]} -{"Format": "IDEA0", "ID": "7156a876-24ae-438b-8310-40b766b2ada8", "DetectTime": "2023-10-30T14:11:21.352637+02:00", "EventTime": "2023-10-30T14:11:21.352649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CVF0gM1WwKblIRMlUc"]} -{"Format": "IDEA0", "ID": "e90dfde8-9b75-44dd-81ad-23d67dda4180", "DetectTime": "2023-10-30T14:11:21.375578+02:00", "EventTime": "2023-10-30T14:11:21.375593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJZa0718W6r8uBJfEg"]} -{"Format": "IDEA0", "ID": "15a2bf19-97c8-4d13-8e18-a358c04f3d1a", "DetectTime": "2023-10-30T14:11:21.397894+02:00", "EventTime": "2023-10-30T14:11:21.397923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CTOiGGi7AjxxYXtSa"]} -{"Format": "IDEA0", "ID": "a48ed6ae-8057-45f8-bdbf-deb4146e43e3", "DetectTime": "2023-10-30T14:11:21.419979+02:00", "EventTime": "2023-10-30T14:11:21.420004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Cyerim459H2DH3uWJj"]} -{"Format": "IDEA0", "ID": "f4efb2b1-94f6-489c-8ae8-8ace18f446a2", "DetectTime": "2023-10-30T14:11:21.443386+02:00", "EventTime": "2023-10-30T14:11:21.443398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["CTs0IXwUNxn6FCyI"]} -{"Format": "IDEA0", "ID": "94a6e708-f457-4038-aab7-c557df1f69fc", "DetectTime": "2023-10-30T14:11:21.467053+02:00", "EventTime": "2023-10-30T14:11:21.467076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CtMJjgGEFlzdVaNv5"]} -{"Format": "IDEA0", "ID": "aa47dcf1-403d-4106-91cd-e49acce4f2b4", "DetectTime": "2023-10-30T14:11:21.494127+02:00", "EventTime": "2023-10-30T14:11:21.494146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C6SBzv327TnFQPyPMf"]} -{"Format": "IDEA0", "ID": "3f7eb688-a7aa-421f-9389-e6a27972fefd", "DetectTime": "2023-10-30T14:11:21.514772+02:00", "EventTime": "2023-10-30T14:11:21.514808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CABRQb2VyhnAhJKiVg"]} -{"Format": "IDEA0", "ID": "6b9a8d87-6523-47c1-9ef8-80d3f9c740f5", "DetectTime": "2023-10-30T14:11:21.535818+02:00", "EventTime": "2023-10-30T14:11:21.535828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CUSoV8n3eIxKH9obh"]} -{"Format": "IDEA0", "ID": "7d813bba-4424-40e1-bcca-289629b8d1a2", "DetectTime": "2023-10-30T14:11:21.558340+02:00", "EventTime": "2023-10-30T14:11:21.558352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C76hih2xUfj8gZJWvj"]} -{"Format": "IDEA0", "ID": "47b834e5-200f-4c96-ac7c-af01fec8d6d3", "DetectTime": "2023-10-30T14:11:21.585094+02:00", "EventTime": "2023-10-30T14:11:21.585106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CajD943Nt7Xn9PTtG8"]} -{"Format": "IDEA0", "ID": "24a5c98a-14c3-4bc6-9167-1c8aadc2b1d1", "DetectTime": "2023-10-30T14:11:21.606208+02:00", "EventTime": "2023-10-30T14:11:21.606224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CeQPho1zIALvWUjNic"]} -{"Format": "IDEA0", "ID": "660b67b1-3fa9-4a8f-a0f2-8a470a89211d", "DetectTime": "2023-10-30T14:11:21.628570+02:00", "EventTime": "2023-10-30T14:11:21.628585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CHoBkz4uvdqQtgiF48"]} -{"Format": "IDEA0", "ID": "a6fc0877-50f7-4f2c-b7c0-31393e210af0", "DetectTime": "2023-10-30T14:11:21.651266+02:00", "EventTime": "2023-10-30T14:11:21.651277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CJawd22o0yj3lwDfgj"]} -{"Format": "IDEA0", "ID": "e9662125-01db-4d80-bb1a-eadaf1452530", "DetectTime": "2023-10-30T14:11:21.670279+02:00", "EventTime": "2023-10-30T14:11:21.670293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CDWZAflKaKi5Eecui"]} -{"Format": "IDEA0", "ID": "e1cde664-be39-480f-bfb9-758bab0389c6", "DetectTime": "2023-10-30T14:11:21.691672+02:00", "EventTime": "2023-10-30T14:11:21.691691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.189.57.28 ", "ContentType": "text/plain"}], "uids": ["CUeCLv3jouxQlMtSJ"]} -{"Format": "IDEA0", "ID": "f2539c42-9340-4491-b644-be125c6371a6", "DetectTime": "2023-10-30T14:11:21.715191+02:00", "EventTime": "2023-10-30T14:11:21.715207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CcAiS12lbRUKw3agA4"]} -{"Format": "IDEA0", "ID": "de7ec668-3c97-4236-b80c-c4c0d88a7654", "DetectTime": "2023-10-30T14:11:21.739493+02:00", "EventTime": "2023-10-30T14:11:21.739509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CN6RCl28pysv9J06X5"]} -{"Format": "IDEA0", "ID": "f6fd1daf-7a6b-4b78-a4ca-d8834a13f253", "DetectTime": "2023-10-30T14:11:21.760208+02:00", "EventTime": "2023-10-30T14:11:21.760219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CDzVAu4xgHwsBPMdRl"]} -{"Format": "IDEA0", "ID": "b04fbc3b-7a3b-4581-8c70-5b02588d6459", "DetectTime": "2023-10-30T14:11:21.779100+02:00", "EventTime": "2023-10-30T14:11:21.779117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CI7yBv3f43zwQ4Jmj4"]} -{"Format": "IDEA0", "ID": "cea8b2df-f826-45cf-a63c-0b93eafeb65b", "DetectTime": "2023-10-30T14:11:21.795808+02:00", "EventTime": "2023-10-30T14:11:21.795819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CnKDqr4KX7J1WetNc3"]} -{"Format": "IDEA0", "ID": "e486ee09-cef1-4806-9b64-2b5abb8e01b1", "DetectTime": "2023-10-30T14:11:21.814271+02:00", "EventTime": "2023-10-30T14:11:21.814291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Ceunur26h1Oqsv4py9"]} -{"Format": "IDEA0", "ID": "d2068d48-3a5b-4d98-9a8c-16a0f652e328", "DetectTime": "2023-10-30T14:11:21.834254+02:00", "EventTime": "2023-10-30T14:11:21.834264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C4u4bxwMCKgAD4EL5"]} -{"Format": "IDEA0", "ID": "5275d578-0bbb-4e65-ab88-770a2d75eb71", "DetectTime": "2023-10-30T14:11:21.856154+02:00", "EventTime": "2023-10-30T14:11:21.856164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C8ejkbhw0okQXWSMf"]} -{"Format": "IDEA0", "ID": "a6be1a54-9135-49c3-a58b-7e6732bcad46", "DetectTime": "2023-10-30T14:11:21.875609+02:00", "EventTime": "2023-10-30T14:11:21.875625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLRwer1UtQFbzCFgb3"]} -{"Format": "IDEA0", "ID": "c7752886-2567-42ed-8abe-b70297593097", "DetectTime": "2023-10-30T14:11:21.897157+02:00", "EventTime": "2023-10-30T14:11:21.897175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CCjb6W3Qtzbmfmbdmi"]} -{"Format": "IDEA0", "ID": "ac73b16a-61c8-40fb-bb1c-ae73cd3bd475", "DetectTime": "2023-10-30T14:11:21.917029+02:00", "EventTime": "2023-10-30T14:11:21.917046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C0SP7W3cjCcLd0kt11"]} -{"Format": "IDEA0", "ID": "c51bbd49-bdde-4e1c-831d-76d32cce70ac", "DetectTime": "2023-10-30T14:11:21.935522+02:00", "EventTime": "2023-10-30T14:11:21.935534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CBBaYf2t7aZzkHPiNd"]} -{"Format": "IDEA0", "ID": "1318a69e-a965-4c99-a85f-fb705d3aca56", "DetectTime": "2023-10-30T14:11:21.954895+02:00", "EventTime": "2023-10-30T14:11:21.954908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CENKNx3bzBoU4WEPr3"]} -{"Format": "IDEA0", "ID": "06930e51-8fdc-4bcb-b966-90f880a8c6dc", "DetectTime": "2023-10-30T14:11:21.973242+02:00", "EventTime": "2023-10-30T14:11:21.973255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CjASsB4K36GJi40jL"]} -{"Format": "IDEA0", "ID": "8d7866ff-ac5f-4271-9037-bd0fb14ae88e", "DetectTime": "2023-10-30T14:11:21.993621+02:00", "EventTime": "2023-10-30T14:11:21.993632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cnm2M3IvEcSPPWSm9"]} -{"Format": "IDEA0", "ID": "55ec21bc-99c9-49af-811b-e77e14b6d0d3", "DetectTime": "2023-10-30T14:11:22.016337+02:00", "EventTime": "2023-10-30T14:11:22.016348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6afnC1dkRrXm8Zql8"]} -{"Format": "IDEA0", "ID": "d59e33f3-be43-4eaf-a28f-6f1a420d1b95", "DetectTime": "2023-10-30T14:11:22.035204+02:00", "EventTime": "2023-10-30T14:11:22.035223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cl22Bd3WNWgBAvT9Pg"]} -{"Format": "IDEA0", "ID": "85e40562-e649-4e33-bcd3-a4fd81b54af9", "DetectTime": "2023-10-30T14:11:22.056503+02:00", "EventTime": "2023-10-30T14:11:22.056520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cu9Nub1rFPiWrxBZb"]} -{"Format": "IDEA0", "ID": "d1ab1e66-3e3d-48dd-be52-eefd6bb95d31", "DetectTime": "2023-10-30T14:11:22.075155+02:00", "EventTime": "2023-10-30T14:11:22.075172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CeVpVF1XPxJFONJF4i"]} -{"Format": "IDEA0", "ID": "d8a0a16e-9782-47bc-a02b-3f8badd259e7", "DetectTime": "2023-10-30T14:11:22.095831+02:00", "EventTime": "2023-10-30T14:11:22.095848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CwCEXf1t9AAAMQvTmj"]} -{"Format": "IDEA0", "ID": "728915cb-0375-4864-8a67-8fb3f9b88da8", "DetectTime": "2023-10-30T14:11:22.117967+02:00", "EventTime": "2023-10-30T14:11:22.117981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Czedj03P1Gl7QOajPi"]} -{"Format": "IDEA0", "ID": "b2b69e0a-ae51-42c0-8e1c-203e9f8e18b9", "DetectTime": "2023-10-30T14:11:22.139591+02:00", "EventTime": "2023-10-30T14:11:22.139607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CKBGSZ195Nc5vzSfa6"]} -{"Format": "IDEA0", "ID": "5271913d-7cfb-46d3-af00-690d55dee031", "DetectTime": "2023-10-30T14:11:22.170418+02:00", "EventTime": "2023-10-30T14:11:22.170430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CooF3F4gsVTq8MQd7"]} -{"Format": "IDEA0", "ID": "bd11548f-b4a7-4dbc-b6b8-723e4744b284", "DetectTime": "2023-10-30T14:11:22.189486+02:00", "EventTime": "2023-10-30T14:11:22.189502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cg0E7a1jzGAxuTp58k"]} -{"Format": "IDEA0", "ID": "788843bb-eeca-4712-b4f9-7b433facd06a", "DetectTime": "2023-10-30T14:11:22.211149+02:00", "EventTime": "2023-10-30T14:11:22.211162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CzTRjy4yqBVp3hsfX8"]} -{"Format": "IDEA0", "ID": "3fb84ead-31a7-4fbe-91f8-bb733dbda956", "DetectTime": "2023-10-30T14:11:22.230364+02:00", "EventTime": "2023-10-30T14:11:22.230376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CQj2FS3BDSHO3NKZsc"]} -{"Format": "IDEA0", "ID": "8455e8dc-1ca1-41c8-8a90-2aacd78b2651", "DetectTime": "2023-10-30T14:11:22.247434+02:00", "EventTime": "2023-10-30T14:11:22.247453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["C3CXYcjoHiPlBmY2c"]} -{"Format": "IDEA0", "ID": "91e44c73-c3eb-4a2d-b79e-4ee4a9ab8de7", "DetectTime": "2023-10-30T14:11:22.267449+02:00", "EventTime": "2023-10-30T14:11:22.267463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CNoQMf3lphMqUSCTCb"]} -{"Format": "IDEA0", "ID": "b1ddea63-9117-40af-8347-7786fc8245a8", "DetectTime": "2023-10-30T14:11:22.285676+02:00", "EventTime": "2023-10-30T14:11:22.285688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["Ch7NLU37e6Vyf0P7Fi"]} -{"Format": "IDEA0", "ID": "0b367d85-ddf4-4786-bbc1-3bd423eae9f2", "DetectTime": "2023-10-30T14:11:22.304083+02:00", "EventTime": "2023-10-30T14:11:22.304094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C8VSnN28c0qdEtUWN5"]} -{"Format": "IDEA0", "ID": "122d75a3-a04c-4f77-a770-94b12da6c079", "DetectTime": "2023-10-30T14:11:22.320990+02:00", "EventTime": "2023-10-30T14:11:22.321002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["ClJXjf3oMMTcw9ng0a"]} -{"Format": "IDEA0", "ID": "74807a78-9a12-46db-b5a8-a8d8733c39a7", "DetectTime": "2023-10-30T14:11:22.338983+02:00", "EventTime": "2023-10-30T14:11:22.339001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CpZjIx4zfjpVEArB2"]} -{"Format": "IDEA0", "ID": "1d1748f5-7ec4-45b3-b6ec-7aae8b7d2fe4", "DetectTime": "2023-10-30T14:11:22.362026+02:00", "EventTime": "2023-10-30T14:11:22.362042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCwmrP04qTYhoWFd2"]} -{"Format": "IDEA0", "ID": "94a061f5-a942-417e-8acd-7c04f8b1df67", "DetectTime": "2023-10-30T14:11:22.383924+02:00", "EventTime": "2023-10-30T14:11:22.383953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CEE9iErBESXAKDuz9"]} -{"Format": "IDEA0", "ID": "720427bb-0c24-46b3-9799-81c6f22d3b0f", "DetectTime": "2023-10-30T14:11:22.401264+02:00", "EventTime": "2023-10-30T14:11:22.401278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cj1AgM1Y9SyFxnbiC5"]} -{"Format": "IDEA0", "ID": "8ed1c9fe-daaa-4a9f-88b2-dcfac18aeee7", "DetectTime": "2023-10-30T14:11:22.420976+02:00", "EventTime": "2023-10-30T14:11:22.420993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ChAWLATKONUD9sil8"]} -{"Format": "IDEA0", "ID": "a4350a13-902c-45fb-8dae-f24fa0af5e89", "DetectTime": "2023-10-30T14:11:22.441703+02:00", "EventTime": "2023-10-30T14:11:22.441719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CJLFw63vupiJNdIbu5"]} -{"Format": "IDEA0", "ID": "a12b5751-539b-48c2-863f-75d840c93063", "DetectTime": "2023-10-30T14:11:22.461591+02:00", "EventTime": "2023-10-30T14:11:22.461605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CsUh911LgA4Ka3mdWk"]} -{"Format": "IDEA0", "ID": "8ce05685-a03d-4848-b59a-5a503d74a35a", "DetectTime": "2023-10-30T14:11:22.481715+02:00", "EventTime": "2023-10-30T14:11:22.481737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CEcRHX1zePvkhsO8T8"]} -{"Format": "IDEA0", "ID": "82a2ec96-345e-49a5-bd2a-65ed54de4bf7", "DetectTime": "2023-10-30T14:11:22.505459+02:00", "EventTime": "2023-10-30T14:11:22.505476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cwz13h2kanmKkdK8h8"]} -{"Format": "IDEA0", "ID": "71d84a5c-19f6-48aa-b9cc-d375206a8697", "DetectTime": "2023-10-30T14:11:22.528453+02:00", "EventTime": "2023-10-30T14:11:22.528469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CPEI1n2F8eiEqqqJma"]} -{"Format": "IDEA0", "ID": "7d518d50-39eb-4752-931d-0633f007093b", "DetectTime": "2023-10-30T14:11:22.550312+02:00", "EventTime": "2023-10-30T14:11:22.550329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CPr4A24dSSLnM1Nugd"]} -{"Format": "IDEA0", "ID": "dd6792b9-13ee-44ca-aa17-ca95790e9dab", "DetectTime": "2023-10-30T14:11:22.568830+02:00", "EventTime": "2023-10-30T14:11:22.568847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["COxeFY14ht6X7oyLy8"]} -{"Format": "IDEA0", "ID": "29a9411c-ddea-48de-bf6b-db38c8880e30", "DetectTime": "2023-10-30T14:11:22.589187+02:00", "EventTime": "2023-10-30T14:11:22.589202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CVtU9E37eGsZUizjR5"]} -{"Format": "IDEA0", "ID": "86cf4d38-6b8c-4b72-82d0-bbe4dc9d5edd", "DetectTime": "2023-10-30T14:11:22.607556+02:00", "EventTime": "2023-10-30T14:11:22.607568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKevr31y2Le0kw7KAc"]} -{"Format": "IDEA0", "ID": "bf09bbff-e73a-4d50-a2bb-8d84859eb778", "DetectTime": "2023-10-30T14:11:22.627484+02:00", "EventTime": "2023-10-30T14:11:22.627500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CT5rFW25m2h6QJbgRc"]} -{"Format": "IDEA0", "ID": "e1260ca9-e49d-4c0f-8750-d12702e0c844", "DetectTime": "2023-10-30T14:11:22.648542+02:00", "EventTime": "2023-10-30T14:11:22.648566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CX1mjD3TRyYqB485cb"]} -{"Format": "IDEA0", "ID": "7940fa91-140d-4428-9d97-e32cb7c2f608", "DetectTime": "2023-10-30T14:11:22.665448+02:00", "EventTime": "2023-10-30T14:11:22.665464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CtM2dt3eB8Gd9kNs7"]} -{"Format": "IDEA0", "ID": "6012da70-1ca7-4efe-9783-da4f5c5fb7c6", "DetectTime": "2023-10-30T14:11:22.689296+02:00", "EventTime": "2023-10-30T14:11:22.689327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CSRrPbNxUBSV1jKs9"]} -{"Format": "IDEA0", "ID": "8a90a178-0f02-4a14-acd6-f0cacce4baed", "DetectTime": "2023-10-30T14:11:22.714114+02:00", "EventTime": "2023-10-30T14:11:22.714141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuCp5o3ai4nO848Rc4"]} -{"Format": "IDEA0", "ID": "a66f2edf-3365-45d1-bac1-b41559fef209", "DetectTime": "2023-10-30T14:11:22.735133+02:00", "EventTime": "2023-10-30T14:11:22.735144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CODyFa3yg3J1JVBHe8"]} -{"Format": "IDEA0", "ID": "334b63a0-9854-4eab-9862-6a00a8d4ed4d", "DetectTime": "2023-10-30T14:11:22.751296+02:00", "EventTime": "2023-10-30T14:11:22.751308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CrImrg2CKd2Rg6AaWk"]} -{"Format": "IDEA0", "ID": "ad0f8d7f-c4b7-4c67-a6dd-38c77c3e8820", "DetectTime": "2023-10-30T14:11:22.768075+02:00", "EventTime": "2023-10-30T14:11:22.768090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CwoTqdxMzaFyy9YCf"]} -{"Format": "IDEA0", "ID": "b16799ba-6f47-4dc1-90dd-02c5aec35782", "DetectTime": "2023-10-30T14:11:22.788680+02:00", "EventTime": "2023-10-30T14:11:22.788695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CBxCSsR2iGuxasnti"]} -{"Format": "IDEA0", "ID": "0ea346a9-d316-445a-8b57-cfb728dc8983", "DetectTime": "2023-10-30T14:11:22.806985+02:00", "EventTime": "2023-10-30T14:11:22.806998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CaVZE54m9uFu5YJwz"]} -{"Format": "IDEA0", "ID": "73fdc16f-0c38-4f8e-86c3-35d0c0523701", "DetectTime": "2023-10-30T14:11:22.825431+02:00", "EventTime": "2023-10-30T14:11:22.825446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CNDIeF3CrBukW0ggSj"]} -{"Format": "IDEA0", "ID": "85be8b8b-9341-4d20-ab1f-1cb526b874ba", "DetectTime": "2023-10-30T14:11:22.846929+02:00", "EventTime": "2023-10-30T14:11:22.846946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CTLHBm4WX07nQ7FLe"]} -{"Format": "IDEA0", "ID": "d697ee65-221d-4a69-8fa4-1a96263d2a96", "DetectTime": "2023-10-30T14:11:22.868170+02:00", "EventTime": "2023-10-30T14:11:22.868185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CQD0F61SWc3EuLYF3c"]} -{"Format": "IDEA0", "ID": "13e66452-6d96-4ec5-ae22-38012f308b9e", "DetectTime": "2023-10-30T14:11:22.886329+02:00", "EventTime": "2023-10-30T14:11:22.886340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C7x5Y31tP61kjOobma"]} -{"Format": "IDEA0", "ID": "e7750597-db68-4b79-837e-921e40c45c67", "DetectTime": "2023-10-30T14:11:22.905502+02:00", "EventTime": "2023-10-30T14:11:22.905518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["Cvg7Rl14ueSSHRF3Vj"]} -{"Format": "IDEA0", "ID": "2b7aca7f-cc6e-4c42-ad69-297004c12d64", "DetectTime": "2023-10-30T14:11:22.925112+02:00", "EventTime": "2023-10-30T14:11:22.925127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C0S2TB3KnoAF01MHj7"]} -{"Format": "IDEA0", "ID": "77e53b90-e4bd-4e12-984c-2a96bee65dd0", "DetectTime": "2023-10-30T14:11:22.943414+02:00", "EventTime": "2023-10-30T14:11:22.943426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CZaVe61DayyAkeJvg"]} -{"Format": "IDEA0", "ID": "d5f7902f-b073-4405-9e11-b41902a6dd98", "DetectTime": "2023-10-30T14:11:22.962186+02:00", "EventTime": "2023-10-30T14:11:22.962201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQuhX1bAAdfBN5wO2"]} -{"Format": "IDEA0", "ID": "bd1e5c21-adcb-4d90-8eee-e055e85684ea", "DetectTime": "2023-10-30T14:11:22.982771+02:00", "EventTime": "2023-10-30T14:11:22.982814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CzGlP7BpX2HOK7I8h"]} -{"Format": "IDEA0", "ID": "618b4e5a-71bf-42e8-9c82-137697acff09", "DetectTime": "2023-10-30T14:11:23.001833+02:00", "EventTime": "2023-10-30T14:11:23.001844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CD0nu52obHpmbO6a31"]} -{"Format": "IDEA0", "ID": "f6cbbb01-1557-45e1-b008-72d27740bedc", "DetectTime": "2023-10-30T14:11:23.023033+02:00", "EventTime": "2023-10-30T14:11:23.023049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CK3JAb2fVVVXGwZZh2"]} -{"Format": "IDEA0", "ID": "c80b50d1-9225-4350-90c7-0361b0390fa3", "DetectTime": "2023-10-30T14:11:23.044492+02:00", "EventTime": "2023-10-30T14:11:23.044508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CJpjBTZoMM6462Tg6"]} -{"Format": "IDEA0", "ID": "7b5a1300-3c98-438c-8859-239aaba5ae9e", "DetectTime": "2023-10-30T14:11:23.063830+02:00", "EventTime": "2023-10-30T14:11:23.063854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cg1cZP3aDzJgbXH14j"]} -{"Format": "IDEA0", "ID": "97f18bcd-73d2-4bd9-8cc3-bc9178b91757", "DetectTime": "2023-10-30T14:11:23.082160+02:00", "EventTime": "2023-10-30T14:11:23.082180+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CcBccv27WFwsJmumaj"]} -{"Format": "IDEA0", "ID": "9ca53f52-fda9-47d4-944e-81afb996c004", "DetectTime": "2023-10-30T14:11:23.100849+02:00", "EventTime": "2023-10-30T14:11:23.100860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C2MpbuS0g9ch4WEva"]} -{"Format": "IDEA0", "ID": "de5b67f6-1b9d-4f57-a688-d69d9d10b825", "DetectTime": "2023-10-30T14:11:23.117581+02:00", "EventTime": "2023-10-30T14:11:23.117596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.199.176 ", "ContentType": "text/plain"}], "uids": ["C7QNpc4jCsOGCwZBjc"]} -{"Format": "IDEA0", "ID": "93320440-92fc-4b39-a843-e9d621058619", "DetectTime": "2023-10-30T14:11:23.136846+02:00", "EventTime": "2023-10-30T14:11:23.136864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["C1d5zt1MV3LKQg4Jgd"]} -{"Format": "IDEA0", "ID": "fc31171c-79e8-4092-90d9-bbc19abad777", "DetectTime": "2023-10-30T14:11:23.153568+02:00", "EventTime": "2023-10-30T14:11:23.153582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["CJ1mtG23GunR8G739"]} -{"Format": "IDEA0", "ID": "6988be73-36a8-4dff-8c65-bfbe0d9e1d02", "DetectTime": "2023-10-30T14:11:23.180727+02:00", "EventTime": "2023-10-30T14:11:23.180737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CVgP8K1qMBFeKlIUFb"]} -{"Format": "IDEA0", "ID": "8ca7b7b7-15f3-4db7-859a-b4d43b129d74", "DetectTime": "2023-10-30T14:11:23.197503+02:00", "EventTime": "2023-10-30T14:11:23.197520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cma7oYNsMjkh7OJ5"]} -{"Format": "IDEA0", "ID": "5c01ac9e-5065-449b-a42e-c2f3bfa3d31d", "DetectTime": "2023-10-30T14:11:23.219011+02:00", "EventTime": "2023-10-30T14:11:23.219027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZdwmSExZGy7fR8sj"]} -{"Format": "IDEA0", "ID": "ab90de43-ccb1-42cf-bced-28675ab3618d", "DetectTime": "2023-10-30T14:11:23.238567+02:00", "EventTime": "2023-10-30T14:11:23.238584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CqvEt11UGO9ASqe4Ui"]} -{"Format": "IDEA0", "ID": "484b0803-f22d-4d9c-ba89-ab16b6df2681", "DetectTime": "2023-10-30T14:11:23.273430+02:00", "EventTime": "2023-10-30T14:11:23.273447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CSWmGsNR8lCFCnjl2"]} -{"Format": "IDEA0", "ID": "153410bb-abaa-4d83-bf77-6a1d839c05bd", "DetectTime": "2023-10-30T14:11:23.294503+02:00", "EventTime": "2023-10-30T14:11:23.294518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CHk0cV2ecAGttnC6u7"]} -{"Format": "IDEA0", "ID": "1511a3ee-b324-48b4-9fec-709ff3f6b0b2", "DetectTime": "2023-10-30T14:11:23.311840+02:00", "EventTime": "2023-10-30T14:11:23.311852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6IrDY2aAxlD35cNKa"]} -{"Format": "IDEA0", "ID": "ef167e4a-03ce-40bd-b647-c3488b3ffb94", "DetectTime": "2023-10-30T14:11:23.326185+02:00", "EventTime": "2023-10-30T14:11:23.326196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C4Y8jT1lo1fw0pxr2"]} -{"Format": "IDEA0", "ID": "3ba39c90-3710-484e-9f62-7aa3402e6870", "DetectTime": "2023-10-30T14:11:23.343478+02:00", "EventTime": "2023-10-30T14:11:23.343496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRNNuU3owgtgwBSwtd"]} -{"Format": "IDEA0", "ID": "93910bc0-ac0d-4c11-aa49-4e08aacf0b83", "DetectTime": "2023-10-30T14:11:23.368329+02:00", "EventTime": "2023-10-30T14:11:23.368340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CMDqxV1hblzWCeMjw"]} -{"Format": "IDEA0", "ID": "889df2a0-65f3-4efc-b728-9054514a1571", "DetectTime": "2023-10-30T14:11:23.389359+02:00", "EventTime": "2023-10-30T14:11:23.389375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["ClF1J826gMxIOWpOOk"]} -{"Format": "IDEA0", "ID": "1662a22d-5462-45ac-ba68-6c90f2d80ad1", "DetectTime": "2023-10-30T14:11:23.421865+02:00", "EventTime": "2023-10-30T14:11:23.421882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["C2b5fE5CFc5SPoFD9"]} -{"Format": "IDEA0", "ID": "27ba9ebb-042c-467e-841d-ac32cd03e928", "DetectTime": "2023-10-30T14:11:23.440486+02:00", "EventTime": "2023-10-30T14:11:23.440507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYlPmEY5V7VXSAnGc"]} -{"Format": "IDEA0", "ID": "2e669615-f4c2-4056-ab37-a27ac3d6ad3d", "DetectTime": "2023-10-30T14:11:23.460040+02:00", "EventTime": "2023-10-30T14:11:23.460056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CYx1ns4SOUS6Ve1RAg"]} -{"Format": "IDEA0", "ID": "21c7bfc6-4c0b-4c0b-9244-156102f4dd70", "DetectTime": "2023-10-30T14:11:23.480033+02:00", "EventTime": "2023-10-30T14:11:23.480053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cahrss1Ox26VDP1IL5"]} -{"Format": "IDEA0", "ID": "6fc4246a-cc9f-478c-84c2-86a118a17ec0", "DetectTime": "2023-10-30T14:11:23.500950+02:00", "EventTime": "2023-10-30T14:11:23.500974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 171.97.1.132 ", "ContentType": "text/plain"}], "uids": ["CFKeLE3VcS2QHq1yL2"]} -{"Format": "IDEA0", "ID": "342253e8-d2f9-446d-96f5-ddabc1b746be", "DetectTime": "2023-10-30T14:11:23.525857+02:00", "EventTime": "2023-10-30T14:11:23.525869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CmLyx22vhgYYI6msWl"]} -{"Format": "IDEA0", "ID": "28c9fd2a-72e9-4107-a10e-207373803d19", "DetectTime": "2023-10-30T14:11:23.555013+02:00", "EventTime": "2023-10-30T14:11:23.555026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cu2YE4JIpBWMVKoRj"]} -{"Format": "IDEA0", "ID": "2e91194f-093a-488c-9dd1-bf99f4a7c84c", "DetectTime": "2023-10-30T14:11:23.587009+02:00", "EventTime": "2023-10-30T14:11:23.587026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CdmACW3E8LvqNX4YSd"]} -{"Format": "IDEA0", "ID": "5bbb5287-e196-4d5d-bec6-6399baf8c969", "DetectTime": "2023-10-30T14:11:23.609057+02:00", "EventTime": "2023-10-30T14:11:23.609072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C7RSYd2HxSxNJ4w561"]} -{"Format": "IDEA0", "ID": "ddd4e8ed-e24b-4836-84d5-85f72751937c", "DetectTime": "2023-10-30T14:11:23.644555+02:00", "EventTime": "2023-10-30T14:11:23.644573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C2MSCV3Y0wuLiSygPh"]} -{"Format": "IDEA0", "ID": "36bd7af6-b56c-44ee-8f04-c43bdcf2ea0d", "DetectTime": "2023-10-30T14:11:23.663665+02:00", "EventTime": "2023-10-30T14:11:23.663684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CmdeOo48o44Sah8ieh"]} -{"Format": "IDEA0", "ID": "45a8fcda-de7c-4253-b197-9b809b4da8b9", "DetectTime": "2023-10-30T14:11:23.681016+02:00", "EventTime": "2023-10-30T14:11:23.681036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C4M5Ga3BufidCmST6d"]} -{"Format": "IDEA0", "ID": "3a28f4d5-5dc6-4126-b388-279fadb1b1fc", "DetectTime": "2023-10-30T14:11:23.712066+02:00", "EventTime": "2023-10-30T14:11:23.712082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Co94bI1XUZO0n4SrSk"]} -{"Format": "IDEA0", "ID": "d312d188-632e-4eb1-a148-48a2f0981159", "DetectTime": "2023-10-30T14:11:23.731886+02:00", "EventTime": "2023-10-30T14:11:23.731906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQ91px40kKy7uQOfm4"]} -{"Format": "IDEA0", "ID": "b2a56911-2b0f-4d08-91a7-2e67c787ddeb", "DetectTime": "2023-10-30T14:11:23.752354+02:00", "EventTime": "2023-10-30T14:11:23.752366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CxS3z53HQUfruTfWp3"]} -{"Format": "IDEA0", "ID": "4e44b5be-ede0-4c7c-80db-b26e258b32a9", "DetectTime": "2023-10-30T14:11:23.771218+02:00", "EventTime": "2023-10-30T14:11:23.771234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPAkF1rwBL9EzeED7"]} -{"Format": "IDEA0", "ID": "33af2797-8d75-4ad9-8127-a21be694ee23", "DetectTime": "2023-10-30T14:11:23.790573+02:00", "EventTime": "2023-10-30T14:11:23.790585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cm96pzSLcUIpxqlKa"]} -{"Format": "IDEA0", "ID": "2fa5cb5a-e894-4a40-9b1a-f2fb4b48e6fa", "DetectTime": "2023-10-30T14:11:23.821586+02:00", "EventTime": "2023-10-30T14:11:23.821601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C8W4qz4IywueHy3IMj"]} -{"Format": "IDEA0", "ID": "b628a460-1432-414d-ac2e-68dc6db52e8d", "DetectTime": "2023-10-30T14:11:23.843636+02:00", "EventTime": "2023-10-30T14:11:23.843651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CqKk1u49ByxFaojVia"]} -{"Format": "IDEA0", "ID": "4874f527-679f-4edd-a30b-9297b9c39711", "DetectTime": "2023-10-30T14:11:23.860316+02:00", "EventTime": "2023-10-30T14:11:23.860327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CK1xKukSBWmkF8pug"]} -{"Format": "IDEA0", "ID": "20be2e62-067c-4840-af18-ca8e6e6644a7", "DetectTime": "2023-10-30T14:11:23.877063+02:00", "EventTime": "2023-10-30T14:11:23.877075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.204.35.137 ", "ContentType": "text/plain"}], "uids": ["C1tqA41vnAuGKrXqH"]} -{"Format": "IDEA0", "ID": "a3f4516b-ef58-444d-8aa4-57b8d6993d75", "DetectTime": "2023-10-30T14:11:23.896089+02:00", "EventTime": "2023-10-30T14:11:23.896101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cm6e4C3zVc6oBUgJV7"]} -{"Format": "IDEA0", "ID": "5e593875-4078-4729-9f68-c5740ff6ae5c", "DetectTime": "2023-10-30T14:11:23.912687+02:00", "EventTime": "2023-10-30T14:11:23.912697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CxZdg51bRvLnVdEsie"]} -{"Format": "IDEA0", "ID": "66052d70-bb87-4637-83d1-c444cd83c1c9", "DetectTime": "2023-10-30T14:11:23.931119+02:00", "EventTime": "2023-10-30T14:11:23.931137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["COgwWF1InZzwU9Ljud"]} -{"Format": "IDEA0", "ID": "763e9834-bae4-46d2-96e5-8aaabdbe2129", "DetectTime": "2023-10-30T14:11:23.946676+02:00", "EventTime": "2023-10-30T14:11:23.946698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CEhl1E3twQzzC32xIg"]} -{"Format": "IDEA0", "ID": "076bef84-b130-4e79-9352-19971fa35a54", "DetectTime": "2023-10-30T14:11:23.964081+02:00", "EventTime": "2023-10-30T14:11:23.964093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C0naWb3Ac2u96qfcI6"]} -{"Format": "IDEA0", "ID": "8bbba697-31b2-4488-b129-79a8d614189e", "DetectTime": "2023-10-30T14:11:23.984535+02:00", "EventTime": "2023-10-30T14:11:23.984545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cpu61Z3gvBDzfgWB68"]} -{"Format": "IDEA0", "ID": "1d914214-faa9-431e-8707-f5942d521d16", "DetectTime": "2023-10-30T14:11:24.001154+02:00", "EventTime": "2023-10-30T14:11:24.001166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CEwl4x1TO1YfLyzkea"]} -{"Format": "IDEA0", "ID": "7c7cb0b0-494c-4729-9c64-981137210231", "DetectTime": "2023-10-30T14:11:24.029783+02:00", "EventTime": "2023-10-30T14:11:24.029800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CTGCt72ogAmMmJPF22"]} -{"Format": "IDEA0", "ID": "28f45aa3-392d-4722-af01-8567db003396", "DetectTime": "2023-10-30T14:11:24.051134+02:00", "EventTime": "2023-10-30T14:11:24.051160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CquyID4kx1KPmO2qbd"]} -{"Format": "IDEA0", "ID": "9768feb0-7aa2-4bf7-9fa4-b5d081deffc9", "DetectTime": "2023-10-30T14:11:24.087939+02:00", "EventTime": "2023-10-30T14:11:24.087950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C1lU7y3LclrK7vFteb"]} -{"Format": "IDEA0", "ID": "4a19bd97-6215-4390-b545-57c4b2ec61ab", "DetectTime": "2023-10-30T14:11:24.108377+02:00", "EventTime": "2023-10-30T14:11:24.108392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CI5Mbp2ymZneyZ5MR1"]} -{"Format": "IDEA0", "ID": "d87bab0e-2a6c-40b1-bde5-9ed5daee9111", "DetectTime": "2023-10-30T14:11:24.140969+02:00", "EventTime": "2023-10-30T14:11:24.140985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ccgeny4qwBnhZ9jYOa"]} -{"Format": "IDEA0", "ID": "8d439ff0-11ac-4ce7-98b5-70580d7b5463", "DetectTime": "2023-10-30T14:11:24.158996+02:00", "EventTime": "2023-10-30T14:11:24.159012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CJKdocbFgTf0balxa"]} -{"Format": "IDEA0", "ID": "806c8800-6968-4265-b300-0e97bfb0e768", "DetectTime": "2023-10-30T14:11:24.193165+02:00", "EventTime": "2023-10-30T14:11:24.193176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cjv4aDA2puVIG28V"]} -{"Format": "IDEA0", "ID": "30917951-a931-44be-ad13-7a10e74894b7", "DetectTime": "2023-10-30T14:11:24.224865+02:00", "EventTime": "2023-10-30T14:11:24.224879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cl1zKc3BAKIc6KpFX1"]} -{"Format": "IDEA0", "ID": "6d27996d-9798-4c05-999c-74b20105e8d2", "DetectTime": "2023-10-30T14:11:24.254671+02:00", "EventTime": "2023-10-30T14:11:24.254688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["ChJHay1SpkktbDPxY7"]} -{"Format": "IDEA0", "ID": "bbf02f8d-25d4-48f8-a9b8-bd4465b49cc4", "DetectTime": "2023-10-30T14:11:24.285516+02:00", "EventTime": "2023-10-30T14:11:24.285526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Czdbcg3Njq1tJTVlWd"]} -{"Format": "IDEA0", "ID": "43a2088b-06cc-434f-acfa-1bd7d37983a3", "DetectTime": "2023-10-30T14:11:24.310001+02:00", "EventTime": "2023-10-30T14:11:24.310014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C35Kdj2NojlVTJSFva"]} -{"Format": "IDEA0", "ID": "89041838-f3d1-4e33-9d70-5f2c0adf33fd", "DetectTime": "2023-10-30T14:11:24.336687+02:00", "EventTime": "2023-10-30T14:11:24.336703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C67s9I16gI2HUkyv9"]} -{"Format": "IDEA0", "ID": "494f09a9-855f-4c1e-86a4-778403162332", "DetectTime": "2023-10-30T14:11:24.369254+02:00", "EventTime": "2023-10-30T14:11:24.369265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CzRviq4Efcqi3MW9M1"]} -{"Format": "IDEA0", "ID": "74134630-8970-4bda-ace0-7d8af20b0bcc", "DetectTime": "2023-10-30T14:11:24.402975+02:00", "EventTime": "2023-10-30T14:11:24.402993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CU7PSH2cV1jZseMqf7"]} -{"Format": "IDEA0", "ID": "97c51497-429f-4690-9ba8-28c6818cb8a4", "DetectTime": "2023-10-30T14:11:24.431316+02:00", "EventTime": "2023-10-30T14:11:24.431368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CRmuaG3TY7vRdf1p42"]} -{"Format": "IDEA0", "ID": "14639c2d-888e-4484-8e36-41a3317f8bbc", "DetectTime": "2023-10-30T14:11:24.461422+02:00", "EventTime": "2023-10-30T14:11:24.461438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CFD88X1nX7WC3oue81"]} -{"Format": "IDEA0", "ID": "e299e795-817f-423d-96f4-090fa1436043", "DetectTime": "2023-10-30T14:11:24.492657+02:00", "EventTime": "2023-10-30T14:11:24.492668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CDr48u12z3Z9RfyPUi"]} -{"Format": "IDEA0", "ID": "4f1717ab-8804-4cf3-b5f7-6720cc3e9277", "DetectTime": "2023-10-30T14:11:24.522239+02:00", "EventTime": "2023-10-30T14:11:24.522252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CvQwYc2y65x9kNtAzc"]} -{"Format": "IDEA0", "ID": "6dca0e13-82c2-4cd7-921a-1be88f7dec7d", "DetectTime": "2023-10-30T14:11:24.554550+02:00", "EventTime": "2023-10-30T14:11:24.554563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CJik5R1QUN0Sed4t61"]} -{"Format": "Json", "ID": "6dca0e13-82c2-4cd7-921a-1be88f7dec7d", "DetectTime": "2023-10-30T14:11:24.554550+02:00", "EventTime": "2023-10-30T14:11:24.554563+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:57:23.136980+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:24.618142)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc51fcc5-be3b-48cb-af49-375e504b4987", "DetectTime": "2023-10-30T14:11:24.622307+02:00", "EventTime": "2023-10-30T14:11:24.622319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CNFd1i3O4pK0XJ0LG2"]} -{"Format": "IDEA0", "ID": "44ecb924-2e13-4fde-9052-810aabe1fee6", "DetectTime": "2023-10-30T14:11:24.650421+02:00", "EventTime": "2023-10-30T14:11:24.650434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CEI8Lg2P74u6UDDvx4"]} -{"Format": "IDEA0", "ID": "4ce0c098-e3dc-42be-80a1-1a22e4c1c326", "DetectTime": "2023-10-30T14:11:24.674575+02:00", "EventTime": "2023-10-30T14:11:24.674586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C38AtH14XRRKStZg82"]} -{"Format": "IDEA0", "ID": "612503a6-9c42-4023-890e-ab9dbbedd6bd", "DetectTime": "2023-10-30T14:11:24.700316+02:00", "EventTime": "2023-10-30T14:11:24.700327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CBu2BY2xy6q1qphHN1"]} -{"Format": "IDEA0", "ID": "d94a970c-f84a-4e47-b8fd-396cdd4b4456", "DetectTime": "2023-10-30T14:11:24.725250+02:00", "EventTime": "2023-10-30T14:11:24.725266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C6MSCq3joMxvWE7gsj"]} -{"Format": "IDEA0", "ID": "3d713a4a-5f0e-4326-a924-6e2e03c041a1", "DetectTime": "2023-10-30T14:11:24.747837+02:00", "EventTime": "2023-10-30T14:11:24.747857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CnUKIi4lQOLNe7ZGT6"]} -{"Format": "IDEA0", "ID": "a8263025-c064-4908-83d3-d5f7433f8ab8", "DetectTime": "2023-10-30T14:11:24.773056+02:00", "EventTime": "2023-10-30T14:11:24.773067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbJGUg4rUSRsHgTTdg"]} -{"Format": "IDEA0", "ID": "2dc351cf-4f15-4a88-8995-bdad849f8b47", "DetectTime": "2023-10-30T14:11:24.802603+02:00", "EventTime": "2023-10-30T14:11:24.802614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CZjLdP3iPE70MJZLAa"]} -{"Format": "Json", "ID": "2dc351cf-4f15-4a88-8995-bdad849f8b47", "DetectTime": "2023-10-30T14:11:24.802603+02:00", "EventTime": "2023-10-30T14:11:24.802614+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:57:24.813314+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:24.861056)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6f4e5f4-d805-444b-8c79-51783e1306fa", "DetectTime": "2023-10-30T14:11:24.865298+02:00", "EventTime": "2023-10-30T14:11:24.865311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cp48HLsC1SEiGl7pe"]} -{"Format": "IDEA0", "ID": "a119b935-f681-4b8f-88d0-0b0bc56bfc63", "DetectTime": "2023-10-30T14:11:24.890644+02:00", "EventTime": "2023-10-30T14:11:24.890655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C1QINF29xtWQLTVtR3"]} -{"Format": "IDEA0", "ID": "b58c08cf-e2a3-47fd-bd2d-6786336fcb1b", "DetectTime": "2023-10-30T14:11:24.916641+02:00", "EventTime": "2023-10-30T14:11:24.916652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CdGfJw4HSLVRRTLgua"]} -{"Format": "IDEA0", "ID": "457eb6f9-65c0-4747-b72e-19f2d6d2edb8", "DetectTime": "2023-10-30T14:11:24.942742+02:00", "EventTime": "2023-10-30T14:11:24.942753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CEPsGi3bxzZcuf4xLj"]} -{"Format": "IDEA0", "ID": "c3e69fe6-772f-483c-86e2-a28ad828e368", "DetectTime": "2023-10-30T14:11:24.971031+02:00", "EventTime": "2023-10-30T14:11:24.971049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CVW7YwerDBvw2cQsi"]} -{"Format": "IDEA0", "ID": "8b1af1dd-e3c4-41ae-8598-68838c5fe769", "DetectTime": "2023-10-30T14:11:24.994793+02:00", "EventTime": "2023-10-30T14:11:24.994808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8dLQ41SoqQ3mnypTb"]} -{"Format": "IDEA0", "ID": "f4b086df-1c22-47e7-acfb-4fdc2b5d3ce3", "DetectTime": "2023-10-30T14:11:25.021505+02:00", "EventTime": "2023-10-30T14:11:25.021519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6ipCw2F2MHumaIYu2"]} -{"Format": "IDEA0", "ID": "7246ebea-c196-42ae-bf00-e326566cc2c6", "DetectTime": "2023-10-30T14:11:25.050909+02:00", "EventTime": "2023-10-30T14:11:25.050925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CuGSRG2wChoWRSyF7"]} -{"Format": "IDEA0", "ID": "13da5114-9e5d-48af-ab1a-70df16263e2a", "DetectTime": "2023-10-30T14:11:25.076625+02:00", "EventTime": "2023-10-30T14:11:25.076637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CSfnIz1JecLLUd8sTg"]} -{"Format": "IDEA0", "ID": "042f6f7e-5a87-4dc8-aa93-ff3fceb7d24a", "DetectTime": "2023-10-30T14:11:25.097164+02:00", "EventTime": "2023-10-30T14:11:25.097181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CsS5Q22MYYXYmRJhuj"]} -{"Format": "Json", "ID": "042f6f7e-5a87-4dc8-aa93-ff3fceb7d24a", "DetectTime": "2023-10-30T14:11:25.097164+02:00", "EventTime": "2023-10-30T14:11:25.097181+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:57:26.847859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:25.146730)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "39faf29c-931b-468a-8a25-1643fd996678", "DetectTime": "2023-10-30T14:11:25.151972+02:00", "EventTime": "2023-10-30T14:11:25.151988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["ChAAue3nDs8N3ELJZd"]} -{"Format": "IDEA0", "ID": "f697f746-905c-4e8a-8c21-46e9ac8e5603", "DetectTime": "2023-10-30T14:11:25.177823+02:00", "EventTime": "2023-10-30T14:11:25.177838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cl23TivZCzvk6S5di"]} -{"Format": "IDEA0", "ID": "877fe739-d430-476d-a13c-c3bcfd61bfee", "DetectTime": "2023-10-30T14:11:25.203309+02:00", "EventTime": "2023-10-30T14:11:25.203321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CFQKzr14wuGYKaVwJ"]} -{"Format": "IDEA0", "ID": "38a7ab4d-ea12-4f51-b5d7-6d4a65fcbcc4", "DetectTime": "2023-10-30T14:11:25.225453+02:00", "EventTime": "2023-10-30T14:11:25.225466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CMlqXJ20B6OXSxbAB1"]} -{"Format": "IDEA0", "ID": "6f3eb50d-ceec-42b3-ad62-4ab6e1a2809f", "DetectTime": "2023-10-30T14:11:25.253245+02:00", "EventTime": "2023-10-30T14:11:25.253261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C9BRPf21owhNYqtT34"]} -{"Format": "IDEA0", "ID": "bc112d14-5f51-4e00-9db7-784275c868ea", "DetectTime": "2023-10-30T14:11:25.280506+02:00", "EventTime": "2023-10-30T14:11:25.280522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cjyksd4EqdQ4C7fOe1"]} -{"Format": "IDEA0", "ID": "9182ea7d-a5db-40d2-ba48-29fd8697024d", "DetectTime": "2023-10-30T14:11:25.301732+02:00", "EventTime": "2023-10-30T14:11:25.301743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C3ynph2DuEtbDQMZCj"]} -{"Format": "IDEA0", "ID": "052a8f8f-046f-4a8c-8195-b0e5bb1b02f9", "DetectTime": "2023-10-30T14:11:25.321848+02:00", "EventTime": "2023-10-30T14:11:25.321860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C20IEp3kzIuIejKPil"]} -{"Format": "Json", "ID": "052a8f8f-046f-4a8c-8195-b0e5bb1b02f9", "DetectTime": "2023-10-30T14:11:25.321848+02:00", "EventTime": "2023-10-30T14:11:25.321860+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T18:57:28.487804+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2023/10/30 14:11:25.378679)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d538cab5-ec81-457f-9bb7-d98323511e09", "DetectTime": "2023-10-30T14:11:25.383819+02:00", "EventTime": "2023-10-30T14:11:25.383840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["ChjEgc1nqgjnKeRSxj"]} -{"Format": "IDEA0", "ID": "7e11b611-2fa0-4d40-875a-60d722a1a7d0", "DetectTime": "2023-10-30T14:11:25.405252+02:00", "EventTime": "2023-10-30T14:11:25.405267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CswKSK2Cli87jAc6ph"]} -{"Format": "IDEA0", "ID": "e9e6d642-4438-4f1d-92ce-e767d9be4527", "DetectTime": "2023-10-30T14:11:25.443972+02:00", "EventTime": "2023-10-30T14:11:25.443988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CYdkYHO5z8btU99u4"]} -{"Format": "IDEA0", "ID": "42daf4c7-67fd-431c-b10f-3f04bf70c9c4", "DetectTime": "2023-10-30T14:11:25.478468+02:00", "EventTime": "2023-10-30T14:11:25.478484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CpfWTv2t22HcQozDec"]} -{"Format": "IDEA0", "ID": "2fe56d08-e06d-40ad-a372-9b50b515e724", "DetectTime": "2023-10-30T14:11:25.515491+02:00", "EventTime": "2023-10-30T14:11:25.515507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CliBn8wMHpxWri5mi"]} -{"Format": "IDEA0", "ID": "c75bff42-051b-459e-82d9-971793cf673e", "DetectTime": "2023-10-30T14:11:25.539637+02:00", "EventTime": "2023-10-30T14:11:25.539652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CeC71c1u6Q7LgqQNl8"]} -{"Format": "IDEA0", "ID": "8e615d71-097b-4c38-861e-42e7707c59d6", "DetectTime": "2023-10-30T14:11:25.574961+02:00", "EventTime": "2023-10-30T14:11:25.574976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["Cx8HwR2iZwnVV5a6uh"]} -{"Format": "IDEA0", "ID": "07e53230-f50b-459d-83ea-bd510677ee6a", "DetectTime": "2023-10-30T14:11:25.605384+02:00", "EventTime": "2023-10-30T14:11:25.605400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CiLXbi1xG5m5PfoWZh"]} -{"Format": "IDEA0", "ID": "574f1916-d42c-4a19-a053-f9547fcccc48", "DetectTime": "2023-10-30T14:11:25.636546+02:00", "EventTime": "2023-10-30T14:11:25.636563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CbhCzD2mOXNUlcXY5"]} -{"Format": "IDEA0", "ID": "47387663-a613-41b8-b3e9-8f9897aa704d", "DetectTime": "2023-10-30T14:11:25.668530+02:00", "EventTime": "2023-10-30T14:11:25.668543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CvdAuL14XR6eWr4bP8"]} -{"Format": "Json", "ID": "47387663-a613-41b8-b3e9-8f9897aa704d", "DetectTime": "2023-10-30T14:11:25.668530+02:00", "EventTime": "2023-10-30T14:11:25.668543+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:27:58.453757+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:25.734977)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "51daf934-43b7-4265-9a2f-ce05b557cfc9", "DetectTime": "2023-10-30T14:11:25.738933+02:00", "EventTime": "2023-10-30T14:11:25.738946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CDusx72h8leMLMgYi3"]} -{"Format": "IDEA0", "ID": "898862cb-6ef7-44de-8fca-763a1ad30ce9", "DetectTime": "2023-10-30T14:11:25.771905+02:00", "EventTime": "2023-10-30T14:11:25.771917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CshjK22syaHVtqRUtg"]} -{"Format": "IDEA0", "ID": "3769b7c6-d852-4da6-8f69-9dad917d17c1", "DetectTime": "2023-10-30T14:11:25.797873+02:00", "EventTime": "2023-10-30T14:11:25.797884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CBR0y21qLq1HbGH8m1"]} -{"Format": "IDEA0", "ID": "c5353fbe-52f3-474e-9432-c2d5db938741", "DetectTime": "2023-10-30T14:11:25.826160+02:00", "EventTime": "2023-10-30T14:11:25.826172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CzBUVI39dgUjkf33pc"]} -{"Format": "IDEA0", "ID": "9b2d379d-3dd8-418a-87ed-caf71c60b514", "DetectTime": "2023-10-30T14:11:25.860757+02:00", "EventTime": "2023-10-30T14:11:25.860768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CLPYfi4BBTeP225651"]} -{"Format": "IDEA0", "ID": "6936b57e-6c85-40ba-9c2c-54582fb3333f", "DetectTime": "2023-10-30T14:11:25.887848+02:00", "EventTime": "2023-10-30T14:11:25.887858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CcUfet30xXZt47Mmp2"]} -{"Format": "IDEA0", "ID": "60787663-6874-4e4a-8e1c-61ea1b5ef6ee", "DetectTime": "2023-10-30T14:11:25.914113+02:00", "EventTime": "2023-10-30T14:11:25.914130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C89sp74u7jEPE2T4n3"]} -{"Format": "IDEA0", "ID": "fae01313-0ade-4bf5-9f1c-011eceaa0243", "DetectTime": "2023-10-30T14:11:25.941926+02:00", "EventTime": "2023-10-30T14:11:25.941938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CumU8jEZpT41zYTo1"]} -{"Format": "Json", "ID": "fae01313-0ade-4bf5-9f1c-011eceaa0243", "DetectTime": "2023-10-30T14:11:25.941926+02:00", "EventTime": "2023-10-30T14:11:25.941938+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:28:00.128693+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:26.013836)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "70fadd91-c9e9-4f9e-b010-60ccf0ac9310", "DetectTime": "2023-10-30T14:11:26.018015+02:00", "EventTime": "2023-10-30T14:11:26.018026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cl35um4Sr2X4U9VfA9"]} -{"Format": "IDEA0", "ID": "ac3f1492-14b6-47af-9cbc-3d2929fc2265", "DetectTime": "2023-10-30T14:11:26.046306+02:00", "EventTime": "2023-10-30T14:11:26.046321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CljsuZ3flF1ed4lkXc"]} -{"Format": "IDEA0", "ID": "ba4ad763-f215-480f-9167-ab84668683a7", "DetectTime": "2023-10-30T14:11:26.079267+02:00", "EventTime": "2023-10-30T14:11:26.079296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CuCIOv3oynqeWQpP8a"]} -{"Format": "IDEA0", "ID": "669df227-cb09-4a6d-95fd-e44a24ed881f", "DetectTime": "2023-10-30T14:11:26.104134+02:00", "EventTime": "2023-10-30T14:11:26.104156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ChMcg61Lv1RUlX2Wn9"]} -{"Format": "IDEA0", "ID": "61a956b0-9c04-4ccd-a021-cd44de33062a", "DetectTime": "2023-10-30T14:11:26.138856+02:00", "EventTime": "2023-10-30T14:11:26.138875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CW0QlG4MM0W2i37T06"]} -{"Format": "IDEA0", "ID": "a4259ca4-1225-4d69-92db-896290ca4ab7", "DetectTime": "2023-10-30T14:11:26.167043+02:00", "EventTime": "2023-10-30T14:11:26.167071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cyn1J62c4yfEcVuFAd"]} -{"Format": "IDEA0", "ID": "14e930bd-5432-45e1-a71f-da0ccad0584d", "DetectTime": "2023-10-30T14:11:26.201135+02:00", "EventTime": "2023-10-30T14:11:26.201152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CgiKim2YMM2KsPHsx8"]} -{"Format": "IDEA0", "ID": "5903c865-ae73-493b-880a-f9d76d7669b0", "DetectTime": "2023-10-30T14:11:26.228103+02:00", "EventTime": "2023-10-30T14:11:26.228116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CsrrW32imufey8iET7"]} -{"Format": "IDEA0", "ID": "5067a1b7-7edc-46ed-9fd3-1249cbf9b917", "DetectTime": "2023-10-30T14:11:26.256325+02:00", "EventTime": "2023-10-30T14:11:26.256341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CifD3i4Tf1GtOaos2f"]} -{"Format": "Json", "ID": "5067a1b7-7edc-46ed-9fd3-1249cbf9b917", "DetectTime": "2023-10-30T14:11:26.256325+02:00", "EventTime": "2023-10-30T14:11:26.256341+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:28:02.093889+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:26.326657)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8e7850ba-b036-4499-901e-aec247cc02cc", "DetectTime": "2023-10-30T14:11:26.331247+02:00", "EventTime": "2023-10-30T14:11:26.331266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1RJnU1dW4Nt0J76Pc"]} -{"Format": "IDEA0", "ID": "82e353de-3607-48ea-a4e8-0f9b9bac3a99", "DetectTime": "2023-10-30T14:11:26.363740+02:00", "EventTime": "2023-10-30T14:11:26.363757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CCVbP3Y0CzlR5kj2i"]} -{"Format": "IDEA0", "ID": "2c2b33b0-c9d3-4f6a-beb7-fd41f5d8757d", "DetectTime": "2023-10-30T14:11:26.387084+02:00", "EventTime": "2023-10-30T14:11:26.387096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CzX0G84c6AiSyaRzh3"]} -{"Format": "IDEA0", "ID": "a84206f0-bb6f-4774-a18d-f175f81adcc4", "DetectTime": "2023-10-30T14:11:26.412871+02:00", "EventTime": "2023-10-30T14:11:26.412883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["COLyyg2AYfkoOpez9l"]} -{"Format": "IDEA0", "ID": "ee8edd28-49ed-4d8b-9ed7-c42aa4264bd3", "DetectTime": "2023-10-30T14:11:26.439316+02:00", "EventTime": "2023-10-30T14:11:26.439332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CfFTXc2ianYmnKfVq3"]} -{"Format": "IDEA0", "ID": "d2f77bbe-43b1-4fc9-b183-2c7f6bf73b16", "DetectTime": "2023-10-30T14:11:26.468689+02:00", "EventTime": "2023-10-30T14:11:26.468701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C6Z8l81o8xD6h2MKX7"]} -{"Format": "IDEA0", "ID": "e7203da3-05f7-4696-986e-5b3b46b7fd5b", "DetectTime": "2023-10-30T14:11:26.498529+02:00", "EventTime": "2023-10-30T14:11:26.498540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CazdNR1E5ICVYEhqgc"]} -{"Format": "IDEA0", "ID": "6a2bb576-9541-442c-98ef-d47e513b6160", "DetectTime": "2023-10-30T14:11:26.527192+02:00", "EventTime": "2023-10-30T14:11:26.527208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ChEi8c2CbvJ0TZZIf"]} -{"Format": "IDEA0", "ID": "a94bae89-a3b8-4453-a32a-aac8f06be4a3", "DetectTime": "2023-10-30T14:11:26.550471+02:00", "EventTime": "2023-10-30T14:11:26.550485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CiTY3r26DklGDBX7ol"]} -{"Format": "Json", "ID": "a94bae89-a3b8-4453-a32a-aac8f06be4a3", "DetectTime": "2023-10-30T14:11:26.550471+02:00", "EventTime": "2023-10-30T14:11:26.550485+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:28:03.679554+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:26.606425)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "78491b5f-4aab-4890-8221-58ccf362f1f8", "DetectTime": "2023-10-30T14:11:26.612310+02:00", "EventTime": "2023-10-30T14:11:26.612331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CxG2L331WviKvJiVY5"]} -{"Format": "IDEA0", "ID": "4761a989-a76c-49a1-bce5-14f1d2c96c5e", "DetectTime": "2023-10-30T14:11:26.636860+02:00", "EventTime": "2023-10-30T14:11:26.636871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CJ0dcz2UxlJJ6AFCS9"]} -{"Format": "IDEA0", "ID": "d8620fc4-81ba-4b1e-9122-8b2e1e58f99f", "DetectTime": "2023-10-30T14:11:26.659864+02:00", "EventTime": "2023-10-30T14:11:26.659875+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9KtBq19mqfDxIFWm"]} -{"Format": "IDEA0", "ID": "6b0aafe8-7401-4c9a-b1fb-a8e6b1a7e303", "DetectTime": "2023-10-30T14:11:26.678223+02:00", "EventTime": "2023-10-30T14:11:26.678242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CzDnvs4YAQk6lRg3te"]} -{"Format": "IDEA0", "ID": "d4e8978e-b878-4d4e-8b3d-1017af6cb8e3", "DetectTime": "2023-10-30T14:11:26.704475+02:00", "EventTime": "2023-10-30T14:11:26.704491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C7ouk5oV5yTWDebva"]} -{"Format": "IDEA0", "ID": "204039c9-6735-4656-8a30-8b474feb78cf", "DetectTime": "2023-10-30T14:11:26.727050+02:00", "EventTime": "2023-10-30T14:11:26.727066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CgTwvcc1jp7PiPLif"]} -{"Format": "IDEA0", "ID": "35e0e2e0-a383-44b6-8aaa-f3987ff0fcfe", "DetectTime": "2023-10-30T14:11:26.752938+02:00", "EventTime": "2023-10-30T14:11:26.752949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["ChDOG64tz47RUxtGO5"]} -{"Format": "IDEA0", "ID": "8f552f61-15ad-4295-8d46-dc2c087eef9a", "DetectTime": "2023-10-30T14:11:26.772843+02:00", "EventTime": "2023-10-30T14:11:26.772854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CIXtsVi4ngsLpxEef"]} -{"Format": "IDEA0", "ID": "8de0ea2d-1ed7-4dbf-9336-4d0dbf41c9d3", "DetectTime": "2023-10-30T14:11:26.800052+02:00", "EventTime": "2023-10-30T14:11:26.800068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C7ASoE2C9EuRKWHZF3"]} -{"Format": "Json", "ID": "8de0ea2d-1ed7-4dbf-9336-4d0dbf41c9d3", "DetectTime": "2023-10-30T14:11:26.800052+02:00", "EventTime": "2023-10-30T14:11:26.800068+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:58:12.910914+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:26.862879)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3ec22aed-58b4-4667-b0ce-5b957a7df27b", "DetectTime": "2023-10-30T14:11:26.867544+02:00", "EventTime": "2023-10-30T14:11:26.867560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CHs8LQPkd9UF9rWYd"]} -{"Format": "IDEA0", "ID": "a24c4f01-ae16-4826-ad66-1411de8a6a8a", "DetectTime": "2023-10-30T14:11:26.890866+02:00", "EventTime": "2023-10-30T14:11:26.890893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CMqiSq4ENTu2USPrT7"]} -{"Format": "IDEA0", "ID": "838f876f-38b2-40bc-bcc0-f63a47d1c46f", "DetectTime": "2023-10-30T14:11:26.913758+02:00", "EventTime": "2023-10-30T14:11:26.913776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CGISJE2q9d22U0CFra"]} -{"Format": "IDEA0", "ID": "db715b13-ebd7-4c22-af88-3b969bd073de", "DetectTime": "2023-10-30T14:11:26.940223+02:00", "EventTime": "2023-10-30T14:11:26.940240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CxJWml1LhzpVDHSGxc"]} -{"Format": "IDEA0", "ID": "0c05d419-03a6-4b62-a3cf-96d93b3ec334", "DetectTime": "2023-10-30T14:11:26.964542+02:00", "EventTime": "2023-10-30T14:11:26.964553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C5Ri4V3wXSH0UB7cj"]} -{"Format": "IDEA0", "ID": "07027a38-bf4f-415f-a255-f27a54ed4b30", "DetectTime": "2023-10-30T14:11:26.986772+02:00", "EventTime": "2023-10-30T14:11:26.986801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CLq7wr4DsiYRcfL4u4"]} -{"Format": "IDEA0", "ID": "e87ed831-2baa-40a7-bad9-7e8b60f47122", "DetectTime": "2023-10-30T14:11:27.010182+02:00", "EventTime": "2023-10-30T14:11:27.010199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CaeiwX3AKZme9UeuR6"]} -{"Format": "IDEA0", "ID": "6b23c1c0-d4e9-4749-aa91-292ad93c83b3", "DetectTime": "2023-10-30T14:11:27.034936+02:00", "EventTime": "2023-10-30T14:11:27.034954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ctmpad3Gzi5Fuo5AHd"]} -{"Format": "IDEA0", "ID": "1d9043a6-c970-4bcd-b640-803860b3ad4e", "DetectTime": "2023-10-30T14:11:27.056135+02:00", "EventTime": "2023-10-30T14:11:27.056154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C9A2trUgGVN8zGL2a"]} -{"Format": "Json", "ID": "1d9043a6-c970-4bcd-b640-803860b3ad4e", "DetectTime": "2023-10-30T14:11:27.056135+02:00", "EventTime": "2023-10-30T14:11:27.056154+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:58:16.380813+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:27.115458)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cc785b7c-5cc5-4398-a7d6-7829252b4fd0", "DetectTime": "2023-10-30T14:11:27.119776+02:00", "EventTime": "2023-10-30T14:11:27.119802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C1XKYDWvJ3x7J7xVg"]} -{"Format": "IDEA0", "ID": "7c97b54d-2a11-4a1c-971e-73aeb9888ed2", "DetectTime": "2023-10-30T14:11:27.143011+02:00", "EventTime": "2023-10-30T14:11:27.143025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CI2ZuL1UdAJGc5GFj4"]} -{"Format": "IDEA0", "ID": "d7f45918-1b89-4a39-987f-321998beb860", "DetectTime": "2023-10-30T14:11:27.165019+02:00", "EventTime": "2023-10-30T14:11:27.165032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CI31MK2EmDcYEb3MK"]} -{"Format": "IDEA0", "ID": "8e02ed7a-37c7-4ea2-996e-d9491f665065", "DetectTime": "2023-10-30T14:11:27.186753+02:00", "EventTime": "2023-10-30T14:11:27.186765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cc8QOZ2HMd6k13b7k2"]} -{"Format": "IDEA0", "ID": "3b89fac2-85ab-4cef-a9c8-c343063d6ed7", "DetectTime": "2023-10-30T14:11:27.211195+02:00", "EventTime": "2023-10-30T14:11:27.211211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Ccbyaq2wu6Fahbouf8"]} -{"Format": "IDEA0", "ID": "91605fef-76a0-4e5f-a712-c2556f23345b", "DetectTime": "2023-10-30T14:11:27.233119+02:00", "EventTime": "2023-10-30T14:11:27.233138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["COkbhr3F7sskgnLbb5"]} -{"Format": "IDEA0", "ID": "94078f84-35ba-4c82-9d56-53b7e4ffb87b", "DetectTime": "2023-10-30T14:11:27.255616+02:00", "EventTime": "2023-10-30T14:11:27.255633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CH1pdw3tLfw8DguNuj"]} -{"Format": "IDEA0", "ID": "b698a020-b2a6-4783-8358-d4d512b5b31c", "DetectTime": "2023-10-30T14:11:27.279897+02:00", "EventTime": "2023-10-30T14:11:27.279915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CAHJhS3g7m7O6uixs"]} -{"Format": "IDEA0", "ID": "74283ab1-542c-4abf-a608-1c5a34184905", "DetectTime": "2023-10-30T14:11:27.304974+02:00", "EventTime": "2023-10-30T14:11:27.304985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["Cp608b0HayNLSAITa"]} -{"Format": "Json", "ID": "74283ab1-542c-4abf-a608-1c5a34184905", "DetectTime": "2023-10-30T14:11:27.304974+02:00", "EventTime": "2023-10-30T14:11:27.304985+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:58:24.775932+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:27.367133)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a8137ea0-9edb-44c2-9868-0f8c537e8f9e", "DetectTime": "2023-10-30T14:11:27.371581+02:00", "EventTime": "2023-10-30T14:11:27.371593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZYjuf4BXa7FS0gSl4"]} -{"Format": "IDEA0", "ID": "cd61bbb6-b824-4c26-aef5-3f1bf951aa92", "DetectTime": "2023-10-30T14:11:27.393778+02:00", "EventTime": "2023-10-30T14:11:27.393791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CODV2bPDV9l26q3nd"]} -{"Format": "IDEA0", "ID": "7aee2951-8335-488d-8b59-9e6998765372", "DetectTime": "2023-10-30T14:11:27.414864+02:00", "EventTime": "2023-10-30T14:11:27.414881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CR9DcP3KKBhUndcwt7"]} -{"Format": "IDEA0", "ID": "bcd77a75-fc67-43a7-a54d-f43da077c167", "DetectTime": "2023-10-30T14:11:27.435673+02:00", "EventTime": "2023-10-30T14:11:27.435689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C5LVmO35CUSVwTeLi"]} -{"Format": "IDEA0", "ID": "717e85f0-0c87-49a4-b8c2-c768f0e26494", "DetectTime": "2023-10-30T14:11:27.456760+02:00", "EventTime": "2023-10-30T14:11:27.456776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cp4604yw0jNOuXena"]} -{"Format": "IDEA0", "ID": "24204d3f-db83-4d12-8937-356e0485bf6e", "DetectTime": "2023-10-30T14:11:27.478015+02:00", "EventTime": "2023-10-30T14:11:27.478028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CyGiqf1H7yAkOKcc6d"]} -{"Format": "IDEA0", "ID": "c104ffa7-7423-4522-8641-9d635b4143a2", "DetectTime": "2023-10-30T14:11:27.500364+02:00", "EventTime": "2023-10-30T14:11:27.500378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CuZ1z6fTXSC3aoP7"]} -{"Format": "IDEA0", "ID": "45c2fa54-eb46-4f40-a8b5-bd52266a93a0", "DetectTime": "2023-10-30T14:11:27.520690+02:00", "EventTime": "2023-10-30T14:11:27.520705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Cu2VsF1H6uEWSbCDQh"]} -{"Format": "Json", "ID": "45c2fa54-eb46-4f40-a8b5-bd52266a93a0", "DetectTime": "2023-10-30T14:11:27.520690+02:00", "EventTime": "2023-10-30T14:11:27.520705+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T19:58:27.736488+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2023/10/30 14:11:27.582062)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b09a7599-ddf5-4a5a-af97-39d302e2a871", "DetectTime": "2023-10-30T14:11:27.587152+02:00", "EventTime": "2023-10-30T14:11:27.587167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CtQX1c2hcRmS1lYj5a"]} -{"Format": "IDEA0", "ID": "d86110f8-5e3a-4e3b-9cf6-722741aae6fe", "DetectTime": "2023-10-30T14:11:27.608687+02:00", "EventTime": "2023-10-30T14:11:27.608704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CLk04w1r9L5hn79n0i"]} -{"Format": "IDEA0", "ID": "bac36c51-0eb8-4fac-9061-0436734d8227", "DetectTime": "2023-10-30T14:11:27.630656+02:00", "EventTime": "2023-10-30T14:11:27.630672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C2p2Qs2I0PhIQpMUea"]} -{"Format": "IDEA0", "ID": "960892c2-9256-4ed4-94a3-da1106aaf91b", "DetectTime": "2023-10-30T14:11:27.650896+02:00", "EventTime": "2023-10-30T14:11:27.650916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CaUMLl1XdJZGANx4z2"]} -{"Format": "IDEA0", "ID": "0dcbc25c-67d7-4c21-95a4-fb0036d321ab", "DetectTime": "2023-10-30T14:11:27.669635+02:00", "EventTime": "2023-10-30T14:11:27.669645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C6BwEindEAq1KWXV2"]} -{"Format": "IDEA0", "ID": "762907a0-397c-4a5e-b3a1-e21dff363b0b", "DetectTime": "2023-10-30T14:11:27.688077+02:00", "EventTime": "2023-10-30T14:11:27.688094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNCBNa1MhnMaltJGnl"]} -{"Format": "IDEA0", "ID": "329bffa0-04b5-4b1f-9160-96ebaeae276c", "DetectTime": "2023-10-30T14:11:27.723382+02:00", "EventTime": "2023-10-30T14:11:27.723398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CMw3a53RPM4oozjQY6"]} -{"Format": "IDEA0", "ID": "eaddcc34-74c6-4b84-a2d8-ed11b25e9d4e", "DetectTime": "2023-10-30T14:11:27.763765+02:00", "EventTime": "2023-10-30T14:11:27.763780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CW0lZ84CJqJPXInIQe"]} -{"Format": "IDEA0", "ID": "96da99c0-a4e5-487d-8b4c-208dec7ae83d", "DetectTime": "2023-10-30T14:11:27.801904+02:00", "EventTime": "2023-10-30T14:11:27.801917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CqexVN2IzTkr7q7cD2"]} -{"Format": "IDEA0", "ID": "3364fd0d-2780-4d50-af8e-077e35b18d3c", "DetectTime": "2023-10-30T14:11:27.838085+02:00", "EventTime": "2023-10-30T14:11:27.838102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C9PAjj1ERV0kIySag6"]} -{"Format": "IDEA0", "ID": "ac5cdc82-c78d-43c0-905b-57d32af7d3eb", "DetectTime": "2023-10-30T14:11:27.872620+02:00", "EventTime": "2023-10-30T14:11:27.872648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CQMa7w1HLFXZZrZI1j"]} -{"Format": "IDEA0", "ID": "558ee782-a6d2-4490-abd9-ff942b06386e", "DetectTime": "2023-10-30T14:11:27.908735+02:00", "EventTime": "2023-10-30T14:11:27.908747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C9wH6c3LW8kcfpr9Q8"]} -{"Format": "Json", "ID": "558ee782-a6d2-4490-abd9-ff942b06386e", "DetectTime": "2023-10-30T14:11:27.908735+02:00", "EventTime": "2023-10-30T14:11:27.908747+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:28:35.760124+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:27.996445)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6d82c389-ca5c-4a2a-8bfc-8c20ced63208", "DetectTime": "2023-10-30T14:11:28.002095+02:00", "EventTime": "2023-10-30T14:11:28.002112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CrhQRP1vDRLXYwfjx5"]} -{"Format": "IDEA0", "ID": "efdaad7b-39fe-4ecf-9a0b-ce86b8b99bee", "DetectTime": "2023-10-30T14:11:28.038651+02:00", "EventTime": "2023-10-30T14:11:28.038662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CgdwHb1b2S4UNBESa7"]} -{"Format": "IDEA0", "ID": "db1c2c2a-be81-417e-a128-6e8c3967000a", "DetectTime": "2023-10-30T14:11:28.075015+02:00", "EventTime": "2023-10-30T14:11:28.075032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CxIAyj2FfQ2KPzuslf"]} -{"Format": "IDEA0", "ID": "6f17059d-1165-4e07-8369-b1d41ff1e1d4", "DetectTime": "2023-10-30T14:11:28.107290+02:00", "EventTime": "2023-10-30T14:11:28.107301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CPNIWP2fku0FKIklWl"]} -{"Format": "IDEA0", "ID": "07945c36-d2d6-4856-93e8-f0848cae1690", "DetectTime": "2023-10-30T14:11:28.142579+02:00", "EventTime": "2023-10-30T14:11:28.142595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C4aAEX3wlQXLn28Ny2"]} -{"Format": "IDEA0", "ID": "d29227d5-8d36-4a85-b15f-bbc62fc5269a", "DetectTime": "2023-10-30T14:11:28.178168+02:00", "EventTime": "2023-10-30T14:11:28.178184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CoDqH644zD0ZKl41Zj"]} -{"Format": "IDEA0", "ID": "79948da1-1f9a-4b25-b11a-4e209000c6d8", "DetectTime": "2023-10-30T14:11:28.213024+02:00", "EventTime": "2023-10-30T14:11:28.213041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CCmHwJY72sSxnDn54"]} -{"Format": "IDEA0", "ID": "677aa45c-2da8-4308-a040-c90fae6d0ae1", "DetectTime": "2023-10-30T14:11:28.248661+02:00", "EventTime": "2023-10-30T14:11:28.248682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CCN2wa28qbTzyQpt3l"]} -{"Format": "Json", "ID": "677aa45c-2da8-4308-a040-c90fae6d0ae1", "DetectTime": "2023-10-30T14:11:28.248661+02:00", "EventTime": "2023-10-30T14:11:28.248682+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:28:37.419858+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:28.326543)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cfaa945d-6a7f-45f9-a8e8-a433d51dc417", "DetectTime": "2023-10-30T14:11:28.331276+02:00", "EventTime": "2023-10-30T14:11:28.331292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CwbsaD3IamzLyCUFk4"]} -{"Format": "IDEA0", "ID": "413c2804-8bfd-4a71-a200-af206c06afc3", "DetectTime": "2023-10-30T14:11:28.368699+02:00", "EventTime": "2023-10-30T14:11:28.368715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CUUZo62nkzxqlCUBh5"]} -{"Format": "IDEA0", "ID": "4628ff28-c296-4014-933d-ed08519f6270", "DetectTime": "2023-10-30T14:11:28.402605+02:00", "EventTime": "2023-10-30T14:11:28.402620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CPWUcvUgi0agQzqga"]} -{"Format": "IDEA0", "ID": "11b9653d-e17a-45cf-925d-27f3d65eec5a", "DetectTime": "2023-10-30T14:11:28.433884+02:00", "EventTime": "2023-10-30T14:11:28.433901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CRBq1Y2DN9jF1RhZ1f"]} -{"Format": "IDEA0", "ID": "0392ffa1-5f3d-46b1-a213-59011c9cb0d4", "DetectTime": "2023-10-30T14:11:28.469184+02:00", "EventTime": "2023-10-30T14:11:28.469199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CAESdm2vWuzlh5Owe4"]} -{"Format": "IDEA0", "ID": "a0ebed74-c357-49eb-9434-53029364170f", "DetectTime": "2023-10-30T14:11:28.501564+02:00", "EventTime": "2023-10-30T14:11:28.501580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C2ccF53elyaGNVbIhh"]} -{"Format": "IDEA0", "ID": "0c19ef06-08c8-4daa-ba1b-290ae555d1e9", "DetectTime": "2023-10-30T14:11:28.536486+02:00", "EventTime": "2023-10-30T14:11:28.536498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C3Dkw61EHQYYDlJ4Q8"]} -{"Format": "IDEA0", "ID": "680415bd-83a3-473a-9fe1-d69ed8bba242", "DetectTime": "2023-10-30T14:11:28.572272+02:00", "EventTime": "2023-10-30T14:11:28.572290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C14ujp1pd5Ot13MSZ"]} -{"Format": "IDEA0", "ID": "b4485f7b-8751-40f9-900d-4eaec4bfecf3", "DetectTime": "2023-10-30T14:11:28.601772+02:00", "EventTime": "2023-10-30T14:11:28.601839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["C7YrVg1wuegisxu3Ac"]} -{"Format": "Json", "ID": "b4485f7b-8751-40f9-900d-4eaec4bfecf3", "DetectTime": "2023-10-30T14:11:28.601772+02:00", "EventTime": "2023-10-30T14:11:28.601839+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:28:39.297305+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:28.690457)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dfe6128d-fade-48fe-a6c8-7c476c8ee384", "DetectTime": "2023-10-30T14:11:28.694711+02:00", "EventTime": "2023-10-30T14:11:28.694727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CqmwPQQYwE9QENtef"]} -{"Format": "IDEA0", "ID": "640bf101-2499-415c-8eac-69e82481dd7c", "DetectTime": "2023-10-30T14:11:28.728596+02:00", "EventTime": "2023-10-30T14:11:28.728623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Ctx8wVyNGHSdCgzC"]} -{"Format": "IDEA0", "ID": "41a14598-73dc-46b5-9b68-4bb5171866fb", "DetectTime": "2023-10-30T14:11:28.763055+02:00", "EventTime": "2023-10-30T14:11:28.763071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CWAANb1KqbaS9MaXlf"]} -{"Format": "IDEA0", "ID": "d3adc552-c291-4ba9-b355-ebb56e0f420d", "DetectTime": "2023-10-30T14:11:28.794117+02:00", "EventTime": "2023-10-30T14:11:28.794131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CxA1UM3KhIdKMna4ic"]} -{"Format": "IDEA0", "ID": "82af8808-3b05-4706-ba35-06cce0444d81", "DetectTime": "2023-10-30T14:11:28.827499+02:00", "EventTime": "2023-10-30T14:11:28.827512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CfH9zD3mU3K7SGxQ8k"]} -{"Format": "IDEA0", "ID": "e036b4ea-524d-40b9-93fc-eeb7cf920c3b", "DetectTime": "2023-10-30T14:11:28.860468+02:00", "EventTime": "2023-10-30T14:11:28.860481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C2Fg1x3WEKqtbXYiF7"]} -{"Format": "IDEA0", "ID": "78014d45-6123-4c41-adcd-3ec55f8787d8", "DetectTime": "2023-10-30T14:11:28.891045+02:00", "EventTime": "2023-10-30T14:11:28.891061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CApzAo4UBEOcIPjlY5"]} -{"Format": "IDEA0", "ID": "2644f188-28ec-4ce7-9fec-136bb43f6985", "DetectTime": "2023-10-30T14:11:28.922098+02:00", "EventTime": "2023-10-30T14:11:28.922111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CElHVr3fHErRvc6Jqj"]} -{"Format": "Json", "ID": "2644f188-28ec-4ce7-9fec-136bb43f6985", "DetectTime": "2023-10-30T14:11:28.922098+02:00", "EventTime": "2023-10-30T14:11:28.922111+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:28:40.967159+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:28.999969)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93da921c-4414-4219-a495-de0bdd417949", "DetectTime": "2023-10-30T14:11:29.005566+02:00", "EventTime": "2023-10-30T14:11:29.005582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C9UnKJ3ZRSHD0HkpBf"]} -{"Format": "IDEA0", "ID": "78772883-0586-4422-aa41-f0a88f535a10", "DetectTime": "2023-10-30T14:11:29.035631+02:00", "EventTime": "2023-10-30T14:11:29.035645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CfIj8b3vxGX2VTd8Me"]} -{"Format": "IDEA0", "ID": "6e57784f-d9b1-4387-8d80-83148415e6f9", "DetectTime": "2023-10-30T14:11:29.066423+02:00", "EventTime": "2023-10-30T14:11:29.066438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUXEv4pp9NVr6YtP6"]} -{"Format": "IDEA0", "ID": "a55529b7-947a-43ad-b61d-acb5054d844f", "DetectTime": "2023-10-30T14:11:29.097788+02:00", "EventTime": "2023-10-30T14:11:29.097804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9yFZFLGFhVEXAa7d"]} -{"Format": "IDEA0", "ID": "6ccc341e-bb5a-4723-98a3-39ae37c299bd", "DetectTime": "2023-10-30T14:11:29.125622+02:00", "EventTime": "2023-10-30T14:11:29.125635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CWoHIhsVaCfqe49ph"]} -{"Format": "IDEA0", "ID": "38a04d46-0a74-493b-9bef-5937ef641914", "DetectTime": "2023-10-30T14:11:29.152065+02:00", "EventTime": "2023-10-30T14:11:29.152091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ca40hc4EE4kp2N6Qb8"]} -{"Format": "IDEA0", "ID": "b87e328c-28da-4b66-bbf9-b6c0707770f5", "DetectTime": "2023-10-30T14:11:29.178917+02:00", "EventTime": "2023-10-30T14:11:29.178933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVfp5P1mY9bS6VoOXh"]} -{"Format": "IDEA0", "ID": "abe74e28-b6b3-455f-8541-3ff8ad09e8c9", "DetectTime": "2023-10-30T14:11:29.209201+02:00", "EventTime": "2023-10-30T14:11:29.209220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CB0LD94bKxOqjAfjXa"]} -{"Format": "IDEA0", "ID": "a40ee732-8cd8-4694-889e-de89c7243f79", "DetectTime": "2023-10-30T14:11:29.228413+02:00", "EventTime": "2023-10-30T14:11:29.228423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CIXjmk28Z5pAIKqWC6"]} -{"Format": "Json", "ID": "a40ee732-8cd8-4694-889e-de89c7243f79", "DetectTime": "2023-10-30T14:11:29.228413+02:00", "EventTime": "2023-10-30T14:11:29.228423+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:58:59.436871+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:29.300635)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0421bbe3-b5e0-45e1-8b40-b1bd782b7903", "DetectTime": "2023-10-30T14:11:29.305576+02:00", "EventTime": "2023-10-30T14:11:29.305596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CrYUZD4WrRBluuNe4"]} -{"Format": "IDEA0", "ID": "248ac73e-e8df-4c58-be46-d9ac41a9e5c7", "DetectTime": "2023-10-30T14:11:29.333726+02:00", "EventTime": "2023-10-30T14:11:29.333746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CYTl2B49qjbnGpkPd7"]} -{"Format": "IDEA0", "ID": "135d877a-5214-43e1-8c4c-305fea01e5fb", "DetectTime": "2023-10-30T14:11:29.362601+02:00", "EventTime": "2023-10-30T14:11:29.362622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CQy4ZpZ2yVHpXGRz9"]} -{"Format": "IDEA0", "ID": "16c5cfff-9a6f-4707-ba6e-4fa1dded8547", "DetectTime": "2023-10-30T14:11:29.390295+02:00", "EventTime": "2023-10-30T14:11:29.390307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CkHogzFhsqGfRsJ5"]} -{"Format": "IDEA0", "ID": "6ba89286-fd36-4d36-8012-cd251ba830b3", "DetectTime": "2023-10-30T14:11:29.415121+02:00", "EventTime": "2023-10-30T14:11:29.415142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CUdDxi4nYdDordLPt6"]} -{"Format": "IDEA0", "ID": "cf5367ed-6bb6-4309-9b27-783104d1aa57", "DetectTime": "2023-10-30T14:11:29.440925+02:00", "EventTime": "2023-10-30T14:11:29.440941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cgs1sn21aen1KyTc2"]} -{"Format": "IDEA0", "ID": "7764cae3-24cc-4b84-b33b-6d0cefe68a02", "DetectTime": "2023-10-30T14:11:29.466381+02:00", "EventTime": "2023-10-30T14:11:29.466397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CM77fo122xDc0Hwzwb"]} -{"Format": "IDEA0", "ID": "0d4104ec-b0ff-4b4e-9d49-fc9fb01cacf1", "DetectTime": "2023-10-30T14:11:29.496344+02:00", "EventTime": "2023-10-30T14:11:29.496360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CEYD084Wbdd9dpn9Cb"]} -{"Format": "Json", "ID": "0d4104ec-b0ff-4b4e-9d49-fc9fb01cacf1", "DetectTime": "2023-10-30T14:11:29.496344+02:00", "EventTime": "2023-10-30T14:11:29.496360+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:59:20.162216+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:29.569115)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "130e0a80-bffd-4593-9748-5a4d701f8618", "DetectTime": "2023-10-30T14:11:29.574561+02:00", "EventTime": "2023-10-30T14:11:29.574576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C9xAdy1Y87tbBih3ra"]} -{"Format": "IDEA0", "ID": "af79ec15-0700-4935-8b6e-695ed98458bb", "DetectTime": "2023-10-30T14:11:29.599683+02:00", "EventTime": "2023-10-30T14:11:29.599703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cbdxfk3RVAQeR7eAOg"]} -{"Format": "IDEA0", "ID": "578e3b8a-77f8-4713-bab9-2c1cbea9109d", "DetectTime": "2023-10-30T14:11:29.628155+02:00", "EventTime": "2023-10-30T14:11:29.628171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CZNiy8C5nGx5ldyg1"]} -{"Format": "IDEA0", "ID": "92d38701-ae20-442e-a216-04a01215ab74", "DetectTime": "2023-10-30T14:11:29.652761+02:00", "EventTime": "2023-10-30T14:11:29.652777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cpaw5e4vC2ZyOIZxze"]} -{"Format": "IDEA0", "ID": "a5bc71d0-22c8-4d01-be8e-4d03f6501c2b", "DetectTime": "2023-10-30T14:11:29.676792+02:00", "EventTime": "2023-10-30T14:11:29.676810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CaYWUwzO9BgLaQCN7"]} -{"Format": "IDEA0", "ID": "6222e047-aadc-4dd1-ae9f-23b02e98c929", "DetectTime": "2023-10-30T14:11:29.704476+02:00", "EventTime": "2023-10-30T14:11:29.704489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CzgFwn35T6kF5SbRCl"]} -{"Format": "IDEA0", "ID": "cf638d5a-ae90-4522-99a4-b156fe61bb8e", "DetectTime": "2023-10-30T14:11:29.729264+02:00", "EventTime": "2023-10-30T14:11:29.729281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CYreGJ3Zm360zmjwQ"]} -{"Format": "IDEA0", "ID": "a8b6d4cb-e4e9-44f4-b012-f397b859b4a8", "DetectTime": "2023-10-30T14:11:29.753412+02:00", "EventTime": "2023-10-30T14:11:29.753428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1CR7d3TURj1Hbtd7h"]} -{"Format": "Json", "ID": "a8b6d4cb-e4e9-44f4-b012-f397b859b4a8", "DetectTime": "2023-10-30T14:11:29.753412+02:00", "EventTime": "2023-10-30T14:11:29.753428+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:59:21.896237+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:29.820687)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42001010-5ec3-4952-9127-74933bb9972a", "DetectTime": "2023-10-30T14:11:29.825543+02:00", "EventTime": "2023-10-30T14:11:29.825563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CmKLDACvR8ekACozb"]} -{"Format": "IDEA0", "ID": "3aae3f6b-336d-49d5-91f6-eb3b68e5c84a", "DetectTime": "2023-10-30T14:11:29.849620+02:00", "EventTime": "2023-10-30T14:11:29.849636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C37t0743Z7zeFjZLUg"]} -{"Format": "IDEA0", "ID": "c65ee77b-76b3-419e-9137-b88e6a23684e", "DetectTime": "2023-10-30T14:11:29.871397+02:00", "EventTime": "2023-10-30T14:11:29.871413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CGWV8O6XFLQe6oiEc"]} -{"Format": "IDEA0", "ID": "271292c1-f0d8-4399-8777-e5d333900076", "DetectTime": "2023-10-30T14:11:29.965971+02:00", "EventTime": "2023-10-30T14:11:29.965990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C4Zpws3XMsmdjWjXhk"]} -{"Format": "IDEA0", "ID": "cac6bf57-a89a-4bc1-a2eb-2300ba61b51a", "DetectTime": "2023-10-30T14:11:29.994577+02:00", "EventTime": "2023-10-30T14:11:29.994594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C2TsG1Fxl6Kj235lc"]} -{"Format": "IDEA0", "ID": "6f0eefe6-8894-4a19-a98f-378761110a5c", "DetectTime": "2023-10-30T14:11:30.021240+02:00", "EventTime": "2023-10-30T14:11:30.021257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CNHouA4hANrI7GOdh1"]} -{"Format": "IDEA0", "ID": "4a21fc69-c4f9-47cd-b33c-e801887d58c1", "DetectTime": "2023-10-30T14:11:30.043040+02:00", "EventTime": "2023-10-30T14:11:30.043062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CXhsrb41A4PFz2Puk4"]} -{"Format": "IDEA0", "ID": "3fc2c455-71dc-4d2a-ad42-ce3691ea3f72", "DetectTime": "2023-10-30T14:11:30.068461+02:00", "EventTime": "2023-10-30T14:11:30.068478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CmKxmN32UFSzQD8Nul"]} -{"Format": "IDEA0", "ID": "52a41016-d035-4cef-a0eb-4a7f21241f3f", "DetectTime": "2023-10-30T14:11:30.089522+02:00", "EventTime": "2023-10-30T14:11:30.089538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Ch47Ye2GI2ndJIKlo5"]} -{"Format": "Json", "ID": "52a41016-d035-4cef-a0eb-4a7f21241f3f", "DetectTime": "2023-10-30T14:11:30.089522+02:00", "EventTime": "2023-10-30T14:11:30.089538+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T20:59:24.220303+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2023/10/30 14:11:30.152439)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea4773c8-03dc-4140-8a1f-e11950475a53", "DetectTime": "2023-10-30T14:11:30.158337+02:00", "EventTime": "2023-10-30T14:11:30.158357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C8tuC14hQzbTKptsL1"]} -{"Format": "IDEA0", "ID": "baa45840-35e8-47ed-8fc5-4f51318d8dcc", "DetectTime": "2023-10-30T14:11:30.183051+02:00", "EventTime": "2023-10-30T14:11:30.183068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CBDgjt4pmlExGA0mz2"]} -{"Format": "IDEA0", "ID": "40e75b4e-88d2-4657-9507-f469a74902bb", "DetectTime": "2023-10-30T14:11:30.205108+02:00", "EventTime": "2023-10-30T14:11:30.205124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ch9MxE3G6mdTiEuJjj"]} -{"Format": "IDEA0", "ID": "6fb19426-557d-4fb4-9ee6-947b84872e08", "DetectTime": "2023-10-30T14:11:30.228030+02:00", "EventTime": "2023-10-30T14:11:30.228049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CmLTIK3U8suIYo3aA2"]} -{"Format": "IDEA0", "ID": "e16cea3a-f881-4b7d-a072-13813bd18f98", "DetectTime": "2023-10-30T14:11:30.249499+02:00", "EventTime": "2023-10-30T14:11:30.249511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSGwY52MuhcZQ7o5el"]} -{"Format": "IDEA0", "ID": "d3f5c864-6472-495a-884e-49b918334977", "DetectTime": "2023-10-30T14:11:30.272961+02:00", "EventTime": "2023-10-30T14:11:30.272984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CX03tMFkbXtkEg3Tf"]} -{"Format": "IDEA0", "ID": "c2a54cf7-e36f-4ef8-838c-9718c8c7bc1a", "DetectTime": "2023-10-30T14:11:30.298220+02:00", "EventTime": "2023-10-30T14:11:30.298243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CRiJDL2Ek2eFXWLNz6"]} -{"Format": "IDEA0", "ID": "0a0a8d52-3f8f-4bb9-acf6-60a86e9feb3c", "DetectTime": "2023-10-30T14:11:30.325925+02:00", "EventTime": "2023-10-30T14:11:30.325941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CKxUZs11ysLmNx1Ek6"]} -{"Format": "IDEA0", "ID": "748c6470-7a3e-4f0e-841f-857a11fbe99d", "DetectTime": "2023-10-30T14:11:30.349753+02:00", "EventTime": "2023-10-30T14:11:30.349764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ci2ejWAhFJMSOhmM2"]} -{"Format": "IDEA0", "ID": "e5bd5a38-690b-48f5-b483-27edb8b664a5", "DetectTime": "2023-10-30T14:11:30.373930+02:00", "EventTime": "2023-10-30T14:11:30.373945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CZLBK74J7n3QkdCt7"]} -{"Format": "IDEA0", "ID": "e4ec45ec-9cd2-4aa5-8130-a920b59f7403", "DetectTime": "2023-10-30T14:11:30.400509+02:00", "EventTime": "2023-10-30T14:11:30.400525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CgwRrS2Il8UUPhQeb1"]} -{"Format": "IDEA0", "ID": "03d919bd-aedf-4974-b49d-ce1b47fd60e9", "DetectTime": "2023-10-30T14:11:30.424546+02:00", "EventTime": "2023-10-30T14:11:30.424558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CW7Ue32vmxpM6tORIk"]} -{"Format": "Json", "ID": "03d919bd-aedf-4974-b49d-ce1b47fd60e9", "DetectTime": "2023-10-30T14:11:30.424546+02:00", "EventTime": "2023-10-30T14:11:30.424558+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T21:29:56.760277+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 164. (real time 2023/10/30 14:11:30.498112)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3d8d640b-7039-4fe5-833d-64e3cefdc005", "DetectTime": "2023-10-30T14:11:30.503410+02:00", "EventTime": "2023-10-30T14:11:30.503428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CqVjFe1RcpI0L3Jgn4"]} -{"Format": "IDEA0", "ID": "7d56bca2-594f-48c0-8196-55493c2798b4", "DetectTime": "2023-10-30T14:11:30.526865+02:00", "EventTime": "2023-10-30T14:11:30.526881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CBfCPL3BoBIqqPKZw4"]} -{"Format": "IDEA0", "ID": "42bce0ca-5828-45ff-a6b2-4d5f7d8f4445", "DetectTime": "2023-10-30T14:11:30.550237+02:00", "EventTime": "2023-10-30T14:11:30.550253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CjKy8A3NRkxPpuPjz9"]} -{"Format": "IDEA0", "ID": "63efcb17-2529-419d-887b-e5ffc054fa5f", "DetectTime": "2023-10-30T14:11:30.575360+02:00", "EventTime": "2023-10-30T14:11:30.575377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CC0ldn4CeO4KGwH8A2"]} -{"Format": "IDEA0", "ID": "7d1ec546-8654-482f-a39f-1f83b6392d25", "DetectTime": "2023-10-30T14:11:30.600282+02:00", "EventTime": "2023-10-30T14:11:30.600301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CcCzQnFELMBR1XvHj"]} -{"Format": "IDEA0", "ID": "1996df50-3407-45bd-86cb-40a082f93a51", "DetectTime": "2023-10-30T14:11:30.623459+02:00", "EventTime": "2023-10-30T14:11:30.623471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CHzMHW9YjHmS9Ltxa"]} -{"Format": "IDEA0", "ID": "5daaf6a4-9d21-4a8a-850d-59a53d01cd99", "DetectTime": "2023-10-30T14:11:30.646354+02:00", "EventTime": "2023-10-30T14:11:30.646377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C06VHcGjQ7AahMMDc"]} -{"Format": "IDEA0", "ID": "aa3d5a36-8af8-4903-987d-d6c06654de26", "DetectTime": "2023-10-30T14:11:30.670437+02:00", "EventTime": "2023-10-30T14:11:30.670454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["ClVrGu2KipYo15pPgj"]} -{"Format": "Json", "ID": "aa3d5a36-8af8-4903-987d-d6c06654de26", "DetectTime": "2023-10-30T14:11:30.670437+02:00", "EventTime": "2023-10-30T14:11:30.670454+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T21:29:58.723220+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 164. (real time 2023/10/30 14:11:30.730421)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b48ed96f-02a8-42ae-9b87-dc197c9b9f7e", "DetectTime": "2023-10-30T14:11:30.736303+02:00", "EventTime": "2023-10-30T14:11:30.736320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CKhBBw2sNajc8mX4l4"]} -{"Format": "IDEA0", "ID": "4ae569c9-b0c0-42b0-8efe-a120aa20d157", "DetectTime": "2023-10-30T14:11:30.757534+02:00", "EventTime": "2023-10-30T14:11:30.757562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CsJeEB46rsBP2H6pHa"]} -{"Format": "IDEA0", "ID": "2cb51cfd-2009-4345-b921-b64d3e00425d", "DetectTime": "2023-10-30T14:11:30.778040+02:00", "EventTime": "2023-10-30T14:11:30.778056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CR0RkmltKYq9TSukj"]} -{"Format": "IDEA0", "ID": "6fc18c4d-3048-4a6d-bc3e-949dc9eb6f07", "DetectTime": "2023-10-30T14:11:30.800278+02:00", "EventTime": "2023-10-30T14:11:30.800306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CxYR8k1hYtq3VRbbT3"]} -{"Format": "IDEA0", "ID": "e21427fa-8a63-4b81-92aa-c6a5bd4f4eb9", "DetectTime": "2023-10-30T14:11:30.822464+02:00", "EventTime": "2023-10-30T14:11:30.822479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6xB093G8i8kJ1j5Qc"]} -{"Format": "IDEA0", "ID": "a55a0a16-adb8-4584-9a7b-db4f7e788068", "DetectTime": "2023-10-30T14:11:30.840185+02:00", "EventTime": "2023-10-30T14:11:30.840205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CQmlrD3faacRwULE7b"]} -{"Format": "IDEA0", "ID": "cb2b9461-0da3-4604-af8c-528835a14b9d", "DetectTime": "2023-10-30T14:11:30.860512+02:00", "EventTime": "2023-10-30T14:11:30.860524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C0KEjm28eZG47AiNrf"]} -{"Format": "IDEA0", "ID": "0f681f14-6501-4599-965e-0c5dc7f65276", "DetectTime": "2023-10-30T14:11:30.880838+02:00", "EventTime": "2023-10-30T14:11:30.880854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CD7Lgp4m0s87EH4f5b"]} -{"Format": "Json", "ID": "0f681f14-6501-4599-965e-0c5dc7f65276", "DetectTime": "2023-10-30T14:11:30.880838+02:00", "EventTime": "2023-10-30T14:11:30.880854+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T21:30:00.763904+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 164. (real time 2023/10/30 14:11:30.944340)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1688475a-a97d-4a3e-9204-0a08f2de211f", "DetectTime": "2023-10-30T14:11:30.949095+02:00", "EventTime": "2023-10-30T14:11:30.949113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C0QbBr3xXrR4n9KjMa"]} -{"Format": "IDEA0", "ID": "eb68430c-b167-4b91-b4ee-36ee7d43d382", "DetectTime": "2023-10-30T14:11:30.977476+02:00", "EventTime": "2023-10-30T14:11:30.977496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CTm1Y61dO4LDPOaDl7"]} -{"Format": "IDEA0", "ID": "470dab24-b456-4d97-bf31-d6a092fbf026", "DetectTime": "2023-10-30T14:11:30.996081+02:00", "EventTime": "2023-10-30T14:11:30.996107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CkQFk64ANu5tGkGq09"]} -{"Format": "IDEA0", "ID": "fc115d7f-eb06-4deb-8fc5-c0f4e45ce5fe", "DetectTime": "2023-10-30T14:11:31.013445+02:00", "EventTime": "2023-10-30T14:11:31.013459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CbFm391LdZWT1CEQ24"]} -{"Format": "IDEA0", "ID": "266e38b0-1c01-4ffd-a6d4-802c8ce1f08b", "DetectTime": "2023-10-30T14:11:31.030930+02:00", "EventTime": "2023-10-30T14:11:31.030949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ComBhl1kp6RoX3Ivga"]} -{"Format": "IDEA0", "ID": "e2f37310-8730-4f14-80fd-7708315e6aa8", "DetectTime": "2023-10-30T14:11:31.048892+02:00", "EventTime": "2023-10-30T14:11:31.048912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CeMMTb3ZKdKhUZFeDc"]} -{"Format": "IDEA0", "ID": "08a43843-c213-4c73-990c-54a44006d50b", "DetectTime": "2023-10-30T14:11:31.066590+02:00", "EventTime": "2023-10-30T14:11:31.066606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CKFGbl1rapdXtCTWGi"]} -{"Format": "IDEA0", "ID": "6528149c-daab-4fb4-b079-0b7d982139ae", "DetectTime": "2023-10-30T14:11:31.083271+02:00", "EventTime": "2023-10-30T14:11:31.083285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C98CaH2oXdHMEdizha"]} -{"Format": "IDEA0", "ID": "a980e615-ad3c-47d0-b00a-53571641bac0", "DetectTime": "2023-10-30T14:11:31.098723+02:00", "EventTime": "2023-10-30T14:11:31.098744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cv9qGx1M7C1t6FaNig"]} -{"Format": "Json", "ID": "a980e615-ad3c-47d0-b00a-53571641bac0", "DetectTime": "2023-10-30T14:11:31.098723+02:00", "EventTime": "2023-10-30T14:11:31.098744+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T21:30:02.629882+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 164. (real time 2023/10/30 14:11:31.150797)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1b290da3-1d15-4e18-a47a-ba442ab5c936", "DetectTime": "2023-10-30T14:11:31.155863+02:00", "EventTime": "2023-10-30T14:11:31.155874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CP66c22TTihvGx0lY7"]} -{"Format": "IDEA0", "ID": "0699280c-ab26-4799-9b12-e516d841555a", "DetectTime": "2023-10-30T14:11:31.171451+02:00", "EventTime": "2023-10-30T14:11:31.171466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CP7Rqf2QbTtuhhYNR9"]} -{"Format": "IDEA0", "ID": "947a1edb-db8e-49d5-b2f4-37ef1ef93e39", "DetectTime": "2023-10-30T14:11:31.187009+02:00", "EventTime": "2023-10-30T14:11:31.187032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcrjbR3BIc9iMcODqc"]} -{"Format": "IDEA0", "ID": "2a22977d-44a2-48ce-a5a9-92055eed79c1", "DetectTime": "2023-10-30T14:11:31.202774+02:00", "EventTime": "2023-10-30T14:11:31.202803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C1OlfY2QFKVPUmvLm"]} -{"Format": "IDEA0", "ID": "225fbd1f-bc2c-4a4b-8ece-06e19c615b8d", "DetectTime": "2023-10-30T14:11:31.241156+02:00", "EventTime": "2023-10-30T14:11:31.241170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CuertL2WK09I4wd2Vg"]} -{"Format": "IDEA0", "ID": "adcd4692-0fef-43d8-9390-f4b472c426fa", "DetectTime": "2023-10-30T14:11:31.286132+02:00", "EventTime": "2023-10-30T14:11:31.286149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CEWjkW2Eg8XEIdPHT4"]} -{"Format": "IDEA0", "ID": "d44147ac-48d0-401b-9257-6da039ae453b", "DetectTime": "2023-10-30T14:11:31.327698+02:00", "EventTime": "2023-10-30T14:11:31.327711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CeiHgi2TYd4jg2miP7"]} -{"Format": "IDEA0", "ID": "bf1bbd67-dff2-4dab-bc10-b8a4cc670142", "DetectTime": "2023-10-30T14:11:31.371906+02:00", "EventTime": "2023-10-30T14:11:31.371923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3EXqq3u4Wo7bkMib2"]} -{"Format": "IDEA0", "ID": "c3de9fcd-7293-4b76-ae58-bf47141dc7e3", "DetectTime": "2023-10-30T14:11:31.409911+02:00", "EventTime": "2023-10-30T14:11:31.409930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CIb0XW8oMzEpPLtl8"]} -{"Format": "IDEA0", "ID": "1381b363-2294-42b0-b28f-4faf391a04c6", "DetectTime": "2023-10-30T14:11:31.453644+02:00", "EventTime": "2023-10-30T14:11:31.453657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CT6gwm3LF88hI2lDoj"]} -{"Format": "IDEA0", "ID": "b36c10ba-e730-48f3-93f4-73cc06b6df97", "DetectTime": "2023-10-30T14:11:31.493752+02:00", "EventTime": "2023-10-30T14:11:31.493769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CMW7gj2l2OsVF7heE"]} -{"Format": "Json", "ID": "b36c10ba-e730-48f3-93f4-73cc06b6df97", "DetectTime": "2023-10-30T14:11:31.493752+02:00", "EventTime": "2023-10-30T14:11:31.493769+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:00:18.840469+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:31.572154)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fb9d407d-8ec6-48ca-880f-d8dd51919f8d", "DetectTime": "2023-10-30T14:11:31.577360+02:00", "EventTime": "2023-10-30T14:11:31.577377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cf6UABQODOwFRjQxf"]} -{"Format": "IDEA0", "ID": "11bc278f-973b-44ef-9042-73a63fe6624c", "DetectTime": "2023-10-30T14:11:31.612153+02:00", "EventTime": "2023-10-30T14:11:31.612169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cmiwtv2vyq2ihv5zg1"]} -{"Format": "IDEA0", "ID": "57a14af5-75fc-4f19-aeca-33954077d2c8", "DetectTime": "2023-10-30T14:11:31.649854+02:00", "EventTime": "2023-10-30T14:11:31.649865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CPXSGu3jmaJHkhvEx4"]} -{"Format": "IDEA0", "ID": "46ece7fc-13fa-45af-9abc-1cd529dc260c", "DetectTime": "2023-10-30T14:11:31.680481+02:00", "EventTime": "2023-10-30T14:11:31.680495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CAVOehpZAjwlQbPD5"]} -{"Format": "IDEA0", "ID": "5af3559e-bea1-4f7e-a8fb-b4b6c8c4e7f0", "DetectTime": "2023-10-30T14:11:31.717151+02:00", "EventTime": "2023-10-30T14:11:31.717166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CaacQh25xOCO1LKGah"]} -{"Format": "IDEA0", "ID": "4fafc207-ab9a-4f3d-bcc8-a018c4e19457", "DetectTime": "2023-10-30T14:11:31.752194+02:00", "EventTime": "2023-10-30T14:11:31.752216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CX8W6e1eblvc9vx1e2"]} -{"Format": "IDEA0", "ID": "2c0252bd-3060-4627-9d7f-e47da31ac67b", "DetectTime": "2023-10-30T14:11:31.786151+02:00", "EventTime": "2023-10-30T14:11:31.786166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPcAvQrVvPq5uRm7d"]} -{"Format": "IDEA0", "ID": "6a1e9ec0-9d0f-4aae-89c0-5e6f632a43e0", "DetectTime": "2023-10-30T14:11:31.823891+02:00", "EventTime": "2023-10-30T14:11:31.823907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CkqIAB2Q0iyYaRUKhj"]} -{"Format": "Json", "ID": "6a1e9ec0-9d0f-4aae-89c0-5e6f632a43e0", "DetectTime": "2023-10-30T14:11:31.823891+02:00", "EventTime": "2023-10-30T14:11:31.823907+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:00:20.709465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:31.977144)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8c449a4a-0d8f-4923-8abf-e2d44795d97b", "DetectTime": "2023-10-30T14:11:31.982721+02:00", "EventTime": "2023-10-30T14:11:31.982741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CawGOB113mutDE6w7f"]} -{"Format": "IDEA0", "ID": "fae6a155-8900-454d-b72f-58f4eb7c0d02", "DetectTime": "2023-10-30T14:11:32.022970+02:00", "EventTime": "2023-10-30T14:11:32.022989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["CudTzJfGqHKKjmCkb"]} -{"Format": "IDEA0", "ID": "c70f4f02-7037-4955-82df-94341092a34f", "DetectTime": "2023-10-30T14:11:32.057391+02:00", "EventTime": "2023-10-30T14:11:32.057404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CDfZwK1J2LBo5NuUV"]} -{"Format": "IDEA0", "ID": "1a2c013d-48ed-4141-b0b9-1834f0e479ee", "DetectTime": "2023-10-30T14:11:32.094564+02:00", "EventTime": "2023-10-30T14:11:32.094579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cpt8NQ1Tq8R8fpwdxd"]} -{"Format": "IDEA0", "ID": "6c1095d7-8783-4ec9-83c4-ca43eb8b5991", "DetectTime": "2023-10-30T14:11:32.129861+02:00", "EventTime": "2023-10-30T14:11:32.129882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cy5khUx9STCcWA8u5"]} -{"Format": "IDEA0", "ID": "08545be9-6750-4413-a847-99178f1ed9a8", "DetectTime": "2023-10-30T14:11:32.165926+02:00", "EventTime": "2023-10-30T14:11:32.165944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CJHnIu2c95GBabOrl8"]} -{"Format": "IDEA0", "ID": "f0ed6bc3-7137-4efb-aec6-ed6458ac7f07", "DetectTime": "2023-10-30T14:11:32.197714+02:00", "EventTime": "2023-10-30T14:11:32.197740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7OKyf2FvaE8Vyz1j"]} -{"Format": "IDEA0", "ID": "4a781ef5-c898-4f1e-a681-ab03a5747c59", "DetectTime": "2023-10-30T14:11:32.236476+02:00", "EventTime": "2023-10-30T14:11:32.236495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZfxyP2e3skY2QYxhe"]} -{"Format": "Json", "ID": "4a781ef5-c898-4f1e-a681-ab03a5747c59", "DetectTime": "2023-10-30T14:11:32.236476+02:00", "EventTime": "2023-10-30T14:11:32.236495+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:00:22.576494+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:32.305159)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fd05cc79-74dd-4e6c-92b5-9846a6a24003", "DetectTime": "2023-10-30T14:11:32.309464+02:00", "EventTime": "2023-10-30T14:11:32.309475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C8arMuMUNKyRglXLj"]} -{"Format": "IDEA0", "ID": "ae44b011-e973-46f2-8e48-4bb1620b5064", "DetectTime": "2023-10-30T14:11:32.345374+02:00", "EventTime": "2023-10-30T14:11:32.345389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cesn6Jvo8Soro2HIh"]} -{"Format": "IDEA0", "ID": "a99bcbaa-f41b-4456-b100-deb441d7aabd", "DetectTime": "2023-10-30T14:11:32.380408+02:00", "EventTime": "2023-10-30T14:11:32.380428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ci3W131ZTNHaohN9ml"]} -{"Format": "IDEA0", "ID": "661c49d2-e85f-44d4-8a36-baf6028dab20", "DetectTime": "2023-10-30T14:11:32.412786+02:00", "EventTime": "2023-10-30T14:11:32.412798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CbrIfn4qRAfTesgTzb"]} -{"Format": "IDEA0", "ID": "ab90b8fa-7992-482d-8de4-e15eb64842e5", "DetectTime": "2023-10-30T14:11:32.446345+02:00", "EventTime": "2023-10-30T14:11:32.446356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CBN3vb3u01oQMk80ai"]} -{"Format": "IDEA0", "ID": "dd42f353-32a4-4521-9eee-28ffaf0189ff", "DetectTime": "2023-10-30T14:11:32.480548+02:00", "EventTime": "2023-10-30T14:11:32.480565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CsWRd33L1PoKwn3M41"]} -{"Format": "IDEA0", "ID": "48627921-7c6a-45a6-badf-f032b644ab4e", "DetectTime": "2023-10-30T14:11:32.512800+02:00", "EventTime": "2023-10-30T14:11:32.512815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Ci9huW2B220BNwiTM7"]} -{"Format": "IDEA0", "ID": "76815253-f44c-4c09-82ca-0e899d908970", "DetectTime": "2023-10-30T14:11:32.547575+02:00", "EventTime": "2023-10-30T14:11:32.547594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CHrGk23YTV0QkQ1Oyb"]} -{"Format": "Json", "ID": "76815253-f44c-4c09-82ca-0e899d908970", "DetectTime": "2023-10-30T14:11:32.547575+02:00", "EventTime": "2023-10-30T14:11:32.547594+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:00:24.472228+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:32.623255)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a885736-75fd-4780-bb4b-b286d240b92c", "DetectTime": "2023-10-30T14:11:32.632388+02:00", "EventTime": "2023-10-30T14:11:32.632411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CWYypB3x0qtpo7w3N"]} -{"Format": "IDEA0", "ID": "93295d7a-f436-4bf4-aa95-124f9f9b3820", "DetectTime": "2023-10-30T14:11:32.667041+02:00", "EventTime": "2023-10-30T14:11:32.667057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CR0oS5PKuqRSpgn5"]} -{"Format": "IDEA0", "ID": "b2a7d946-c7cb-4b35-bed3-8e5fcecf6245", "DetectTime": "2023-10-30T14:11:32.692846+02:00", "EventTime": "2023-10-30T14:11:32.692859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMb2KD2WKjxNynLX22"]} -{"Format": "IDEA0", "ID": "2e0c378b-a7e3-48da-bfe3-7958db576485", "DetectTime": "2023-10-30T14:11:32.725154+02:00", "EventTime": "2023-10-30T14:11:32.725165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CKUwJU1XUbtCgceee5"]} -{"Format": "IDEA0", "ID": "fe1d954c-ba95-4518-bc34-8ee27731bf70", "DetectTime": "2023-10-30T14:11:32.756063+02:00", "EventTime": "2023-10-30T14:11:32.756082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CXUrcl4YKH3K22ilLd"]} -{"Format": "IDEA0", "ID": "f016ffcb-25c2-46a6-9950-b9574619411f", "DetectTime": "2023-10-30T14:11:32.786666+02:00", "EventTime": "2023-10-30T14:11:32.786692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C6vFAB1RwdCm1teSRi"]} -{"Format": "IDEA0", "ID": "ed8ce7af-08f2-46cd-a8cf-2f3aa9dc9a9c", "DetectTime": "2023-10-30T14:11:32.816663+02:00", "EventTime": "2023-10-30T14:11:32.816690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVBf3p3UKYyvpittHi"]} -{"Format": "IDEA0", "ID": "f82368b5-c838-46da-b6e8-1390a4e0d4c4", "DetectTime": "2023-10-30T14:11:32.847698+02:00", "EventTime": "2023-10-30T14:11:32.847724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["C4TNmg1seSn3vdwVo1"]} -{"Format": "IDEA0", "ID": "93e9a9ea-06f0-40d6-9873-4be12510c5d4", "DetectTime": "2023-10-30T14:11:32.877647+02:00", "EventTime": "2023-10-30T14:11:32.877662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMsOGZ2uHfDApXmDY8"]} -{"Format": "Json", "ID": "93e9a9ea-06f0-40d6-9873-4be12510c5d4", "DetectTime": "2023-10-30T14:11:32.877647+02:00", "EventTime": "2023-10-30T14:11:32.877662+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:30:39.036530+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:32.955963)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5fa8aca7-86b7-49a6-a0a4-ce7708869275", "DetectTime": "2023-10-30T14:11:32.961953+02:00", "EventTime": "2023-10-30T14:11:32.961970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C9Dqp23cO2ab1hMEph"]} -{"Format": "IDEA0", "ID": "77025d3d-c25e-4fc4-a36e-9d9db8ba2588", "DetectTime": "2023-10-30T14:11:33.000036+02:00", "EventTime": "2023-10-30T14:11:33.000060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CbLNEpCsOb65FTiC6"]} -{"Format": "IDEA0", "ID": "5732ac78-5893-4bb2-b4e6-1789379ed353", "DetectTime": "2023-10-30T14:11:33.025941+02:00", "EventTime": "2023-10-30T14:11:33.025954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CmC0eD4TQ7uXHzJcsa"]} -{"Format": "IDEA0", "ID": "e96f456f-69cb-4495-b974-2c7aa6289f8b", "DetectTime": "2023-10-30T14:11:33.054826+02:00", "EventTime": "2023-10-30T14:11:33.054846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CB42BJTgfpBCxOQM3"]} -{"Format": "IDEA0", "ID": "67a72dd2-a81a-4fe5-8ef3-73175edb87e0", "DetectTime": "2023-10-30T14:11:33.083376+02:00", "EventTime": "2023-10-30T14:11:33.083393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CK9K7b4QZu4XT0xcq4"]} -{"Format": "IDEA0", "ID": "3ac6ac3c-5e13-4e57-aa0a-76e2506f706f", "DetectTime": "2023-10-30T14:11:33.111451+02:00", "EventTime": "2023-10-30T14:11:33.111470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CoLdCD5SujYsf5kfj"]} -{"Format": "IDEA0", "ID": "0523ef8f-1296-4440-8204-65af95f450da", "DetectTime": "2023-10-30T14:11:33.143176+02:00", "EventTime": "2023-10-30T14:11:33.143192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CDMxps3EbRzSWjSk7j"]} -{"Format": "IDEA0", "ID": "8976032b-c168-419e-83f3-28442b65f8b9", "DetectTime": "2023-10-30T14:11:33.170977+02:00", "EventTime": "2023-10-30T14:11:33.171005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cbhddk34T9LnFgnxPk"]} -{"Format": "Json", "ID": "8976032b-c168-419e-83f3-28442b65f8b9", "DetectTime": "2023-10-30T14:11:33.170977+02:00", "EventTime": "2023-10-30T14:11:33.171005+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:30:40.957282+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:33.242669)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "427abcb5-5de4-4541-abd2-1273b3f7de93", "DetectTime": "2023-10-30T14:11:33.248140+02:00", "EventTime": "2023-10-30T14:11:33.248155+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C1K5sC4IuYDuS30otf"]} -{"Format": "IDEA0", "ID": "85094dd1-6e82-43d8-9065-d3d80b5def7f", "DetectTime": "2023-10-30T14:11:33.273735+02:00", "EventTime": "2023-10-30T14:11:33.273751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CiG1na21hQZ7BZduqg"]} -{"Format": "IDEA0", "ID": "6358bd3f-ac7f-43f0-8d17-f4c1435851e5", "DetectTime": "2023-10-30T14:11:33.298613+02:00", "EventTime": "2023-10-30T14:11:33.298638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CbS5p113PDzjnSW2O4"]} -{"Format": "IDEA0", "ID": "c5ac749d-9663-4ff1-bfe7-6b26058560bb", "DetectTime": "2023-10-30T14:11:33.325818+02:00", "EventTime": "2023-10-30T14:11:33.325834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["COPbbD3VgFPMKWfVWg"]} -{"Format": "IDEA0", "ID": "0bfe85a3-864c-41c0-890e-1ad9521eee1c", "DetectTime": "2023-10-30T14:11:33.354427+02:00", "EventTime": "2023-10-30T14:11:33.354446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CLw4wo219027ij1Ve3"]} -{"Format": "IDEA0", "ID": "04d1dfad-d9c3-4895-9f73-54f2b2cf3203", "DetectTime": "2023-10-30T14:11:33.380667+02:00", "EventTime": "2023-10-30T14:11:33.380681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8649], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. ", "ContentType": "text/plain"}], "uids": ["C3P5qV3Q8hfm5Yts8"]} -{"Format": "IDEA0", "ID": "6ad89293-6312-4913-84f2-44cd42269e3f", "DetectTime": "2023-10-30T14:11:33.408302+02:00", "EventTime": "2023-10-30T14:11:33.408329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CPbEkQ2lE7GFZDZRpj"]} -{"Format": "IDEA0", "ID": "cb4dd4b9-f5d5-46f0-ba79-fb4ec03a4b7b", "DetectTime": "2023-10-30T14:11:33.437971+02:00", "EventTime": "2023-10-30T14:11:33.437988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C3R94pcS8NMXsRKi8"]} -{"Format": "IDEA0", "ID": "c1bac63c-0296-4772-b1e5-548c43ace5a6", "DetectTime": "2023-10-30T14:11:33.461562+02:00", "EventTime": "2023-10-30T14:11:33.461574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CGJxcl1JzSuKGyBwm8"]} -{"Format": "Json", "ID": "c1bac63c-0296-4772-b1e5-548c43ace5a6", "DetectTime": "2023-10-30T14:11:33.461562+02:00", "EventTime": "2023-10-30T14:11:33.461574+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:30:42.819625+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:33.528576)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dbc5f845-8e20-433a-b142-9b1555615219", "DetectTime": "2023-10-30T14:11:33.534063+02:00", "EventTime": "2023-10-30T14:11:33.534080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CjIjuq3Fkc0WUBULLe"]} -{"Format": "IDEA0", "ID": "39affc1c-6381-4acc-bec1-dbd3611012da", "DetectTime": "2023-10-30T14:11:33.558893+02:00", "EventTime": "2023-10-30T14:11:33.558909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CnsLSM2Tb7ku6X1KY8"]} -{"Format": "IDEA0", "ID": "2862a1d2-3c99-49e0-8742-97c34bceae10", "DetectTime": "2023-10-30T14:11:33.582284+02:00", "EventTime": "2023-10-30T14:11:33.582302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CkyCMB3Th0tZ7QNOGj"]} -{"Format": "IDEA0", "ID": "24043413-e710-4e89-a180-03fe24f325c7", "DetectTime": "2023-10-30T14:11:33.607096+02:00", "EventTime": "2023-10-30T14:11:33.607107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CW5Lyu3NkMSjcUtSlf"]} -{"Format": "IDEA0", "ID": "b3ccb036-035f-4357-bb25-2728a4b65bf9", "DetectTime": "2023-10-30T14:11:33.639214+02:00", "EventTime": "2023-10-30T14:11:33.639241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CiGpqX3RJGTxhBY9D9"]} -{"Format": "IDEA0", "ID": "7a5cfecd-4b83-43ad-8fd4-e1be8cba477e", "DetectTime": "2023-10-30T14:11:33.661899+02:00", "EventTime": "2023-10-30T14:11:33.661913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CxbcaP1qplwGRZMKOg"]} -{"Format": "IDEA0", "ID": "a8bbd52a-2d31-4b3a-9f4d-8810fc880b26", "DetectTime": "2023-10-30T14:11:33.685672+02:00", "EventTime": "2023-10-30T14:11:33.685699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CnZdh54D1Lm6LKbhpf"]} -{"Format": "IDEA0", "ID": "17dfe268-25ec-415d-83e8-4471abfc889b", "DetectTime": "2023-10-30T14:11:33.708235+02:00", "EventTime": "2023-10-30T14:11:33.708245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CmqW3N3JG0jOyNpz3d"]} -{"Format": "Json", "ID": "17dfe268-25ec-415d-83e8-4471abfc889b", "DetectTime": "2023-10-30T14:11:33.708235+02:00", "EventTime": "2023-10-30T14:11:33.708245+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T22:30:45.272532+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2023/10/30 14:11:33.772980)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "51f3c8f3-c226-4670-90d9-1f1d65ac0888", "DetectTime": "2023-10-30T14:11:33.777968+02:00", "EventTime": "2023-10-30T14:11:33.777983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CG3P3OmpmxgJktpZ2"]} -{"Format": "IDEA0", "ID": "20d41294-8176-42f8-8f57-3c82153feeb5", "DetectTime": "2023-10-30T14:11:33.801507+02:00", "EventTime": "2023-10-30T14:11:33.801529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CbbPpJ2dyiyxBK6TYf"]} -{"Format": "IDEA0", "ID": "970b3197-66da-45dd-97af-ee70859ccdd3", "DetectTime": "2023-10-30T14:11:33.823310+02:00", "EventTime": "2023-10-30T14:11:33.823321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CAs1XJ18Mk8v3E8h06"]} -{"Format": "IDEA0", "ID": "bd6c1c59-4388-4392-8a7f-09c0a3ebbdcd", "DetectTime": "2023-10-30T14:11:33.846335+02:00", "EventTime": "2023-10-30T14:11:33.846351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CFJv171ykrmGxTfRlh"]} -{"Format": "IDEA0", "ID": "41634edb-2b63-4738-b0ff-618ea186c3e3", "DetectTime": "2023-10-30T14:11:33.864920+02:00", "EventTime": "2023-10-30T14:11:33.864942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkRPBj1SXtK7DM2Ufg"]} -{"Format": "IDEA0", "ID": "412ac4db-fec1-48aa-bd76-d7b99a034240", "DetectTime": "2023-10-30T14:11:33.884213+02:00", "EventTime": "2023-10-30T14:11:33.884228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C83OWAcZRxFkDaDv9"]} -{"Format": "IDEA0", "ID": "f0e6ad7f-a9d7-4ebc-8f11-c5dab7c62bec", "DetectTime": "2023-10-30T14:11:33.920308+02:00", "EventTime": "2023-10-30T14:11:33.920322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CkpKWO1HxrruVkFJxk"]} -{"Format": "IDEA0", "ID": "cb82142d-ab28-4ee7-b1d0-d5e3345ade0d", "DetectTime": "2023-10-30T14:11:33.954929+02:00", "EventTime": "2023-10-30T14:11:33.954954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CQMSWU38JSHh4L6DE"]} -{"Format": "IDEA0", "ID": "70b479c1-45f9-4a28-8157-075345b32802", "DetectTime": "2023-10-30T14:11:33.990634+02:00", "EventTime": "2023-10-30T14:11:33.990644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMXFEOOZdcqtA5Ske"]} -{"Format": "IDEA0", "ID": "b822f9c9-0a8c-4e9b-aefe-b369698e9f0c", "DetectTime": "2023-10-30T14:11:34.028751+02:00", "EventTime": "2023-10-30T14:11:34.028767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CJSyes2AQmawVTf4Ub"]} -{"Format": "IDEA0", "ID": "4de86460-abf2-4ced-864a-df655fa3d16f", "DetectTime": "2023-10-30T14:11:34.068313+02:00", "EventTime": "2023-10-30T14:11:34.068328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C9kOwT2CoxKP92GAgf"]} -{"Format": "IDEA0", "ID": "a0f4377a-b118-434d-a449-e6526c7df8c2", "DetectTime": "2023-10-30T14:11:34.109302+02:00", "EventTime": "2023-10-30T14:11:34.109318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ce0hba3gQN1BfQXvD9"]} -{"Format": "IDEA0", "ID": "61dce0d0-2ed1-4989-a1be-7614f588e2c3", "DetectTime": "2023-10-30T14:11:34.145825+02:00", "EventTime": "2023-10-30T14:11:34.145841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cco844Q9p9wpjFoBa"]} -{"Format": "Json", "ID": "61dce0d0-2ed1-4989-a1be-7614f588e2c3", "DetectTime": "2023-10-30T14:11:34.145825+02:00", "EventTime": "2023-10-30T14:11:34.145841+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:00:51.006177+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:34.221980)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "60c6821c-d66b-4f77-9f76-f2dcc307dd23", "DetectTime": "2023-10-30T14:11:34.226167+02:00", "EventTime": "2023-10-30T14:11:34.226177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CIiaN41gg955C28rdg"]} -{"Format": "IDEA0", "ID": "c164ba17-6677-4490-aa20-a1a9243be095", "DetectTime": "2023-10-30T14:11:34.261417+02:00", "EventTime": "2023-10-30T14:11:34.261428+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CCmd5p3yrkE0d5fuC9"]} -{"Format": "IDEA0", "ID": "0cf83a48-227e-4324-9488-dd724491b55b", "DetectTime": "2023-10-30T14:11:34.281808+02:00", "EventTime": "2023-10-30T14:11:34.281824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C32A3u1e5sRZH9RnU6"]} -{"Format": "IDEA0", "ID": "cf5e7e6e-e702-4c9c-aa85-283d920f1f97", "DetectTime": "2023-10-30T14:11:34.318598+02:00", "EventTime": "2023-10-30T14:11:34.318610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CMuMwv1H7nurcRQkR1"]} -{"Format": "IDEA0", "ID": "4aee914d-2064-40bc-b5e9-3eee3b577c3b", "DetectTime": "2023-10-30T14:11:34.354034+02:00", "EventTime": "2023-10-30T14:11:34.354059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cvvcbv3oiplTKBvIxh"]} -{"Format": "IDEA0", "ID": "62879185-cd77-4fbe-8a12-052e866eaf8f", "DetectTime": "2023-10-30T14:11:34.388801+02:00", "EventTime": "2023-10-30T14:11:34.388818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CAI2fz21OQuZAieFdl"]} -{"Format": "IDEA0", "ID": "5e919982-6ddb-477d-ae3e-237d3278491e", "DetectTime": "2023-10-30T14:11:34.425458+02:00", "EventTime": "2023-10-30T14:11:34.425486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C0MCWm3vxb8Dg78yz3"]} -{"Format": "IDEA0", "ID": "1a36bbe6-2428-4ab1-b6e4-cc58b995a978", "DetectTime": "2023-10-30T14:11:34.460110+02:00", "EventTime": "2023-10-30T14:11:34.460122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CgGXae2CvY5liqXt8h"]} -{"Format": "IDEA0", "ID": "2ef92f75-cfaa-465f-96af-36e8083ecd9d", "DetectTime": "2023-10-30T14:11:34.494594+02:00", "EventTime": "2023-10-30T14:11:34.494605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C8fYtl29TN1Gg8NSra"]} -{"Format": "Json", "ID": "2ef92f75-cfaa-465f-96af-36e8083ecd9d", "DetectTime": "2023-10-30T14:11:34.494594+02:00", "EventTime": "2023-10-30T14:11:34.494605+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:00:53.083504+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:34.567985)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f70bff52-383a-4141-bc24-c5aedcc7110e", "DetectTime": "2023-10-30T14:11:34.573034+02:00", "EventTime": "2023-10-30T14:11:34.573047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CkE2pV3DWqKru0XER1"]} -{"Format": "IDEA0", "ID": "90739a6c-a2ec-44b7-bfff-e41407cdccf8", "DetectTime": "2023-10-30T14:11:34.605619+02:00", "EventTime": "2023-10-30T14:11:34.605640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CTdcW83QBow21Y8fsc"]} -{"Format": "IDEA0", "ID": "428ee163-63ad-4302-aa47-bed2c0cb74f3", "DetectTime": "2023-10-30T14:11:34.638640+02:00", "EventTime": "2023-10-30T14:11:34.638667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZ2eK716l0456hqQe3"]} -{"Format": "IDEA0", "ID": "9b8baa03-c1f4-4044-851b-dabab5091bcf", "DetectTime": "2023-10-30T14:11:34.669939+02:00", "EventTime": "2023-10-30T14:11:34.669951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C8SLyyarRo4EyXGm4"]} -{"Format": "IDEA0", "ID": "8df83d23-348e-406a-9d3c-850c4075c1b7", "DetectTime": "2023-10-30T14:11:34.704070+02:00", "EventTime": "2023-10-30T14:11:34.704083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CxAiXM1Px9ZdsmLBR1"]} -{"Format": "IDEA0", "ID": "21c66fc9-3d35-40e8-adf9-f0046e72e048", "DetectTime": "2023-10-30T14:11:34.736248+02:00", "EventTime": "2023-10-30T14:11:34.736266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CBhBhC3KZyS71lQKGk"]} -{"Format": "IDEA0", "ID": "f708afb9-9419-4bcd-aa65-415735fd436e", "DetectTime": "2023-10-30T14:11:34.769400+02:00", "EventTime": "2023-10-30T14:11:34.769415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C51vke2S8iebGtDiY9"]} -{"Format": "IDEA0", "ID": "7ca01c15-d228-4a22-8c9e-9f734299c6a7", "DetectTime": "2023-10-30T14:11:34.801538+02:00", "EventTime": "2023-10-30T14:11:34.801561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CaZRAm1SVsvNhWT8Q8"]} -{"Format": "Json", "ID": "7ca01c15-d228-4a22-8c9e-9f734299c6a7", "DetectTime": "2023-10-30T14:11:34.801538+02:00", "EventTime": "2023-10-30T14:11:34.801561+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:01:12.769167+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:34.867765)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d236db75-032c-41de-b685-337f360708fe", "DetectTime": "2023-10-30T14:11:34.872662+02:00", "EventTime": "2023-10-30T14:11:34.872675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmSk7T183xSCTdZTcc"]} -{"Format": "IDEA0", "ID": "49b74324-cfcf-48fd-a301-29bd10b3fafd", "DetectTime": "2023-10-30T14:11:34.906467+02:00", "EventTime": "2023-10-30T14:11:34.906486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CGZxXb3cwKOCGOYWp3"]} -{"Format": "IDEA0", "ID": "3bef5ed3-c8d4-4f48-bd17-cff4d18d4a6a", "DetectTime": "2023-10-30T14:11:34.928809+02:00", "EventTime": "2023-10-30T14:11:34.928825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Chh7EC4je6NWCXGjm4"]} -{"Format": "IDEA0", "ID": "0e04c99e-14da-4c5e-a9d8-f77842337734", "DetectTime": "2023-10-30T14:11:34.960368+02:00", "EventTime": "2023-10-30T14:11:34.960384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJYGpc4E3WiYJHqwOb"]} -{"Format": "IDEA0", "ID": "9a6d3f2f-0e95-4ccf-9f15-00df379d0424", "DetectTime": "2023-10-30T14:11:34.992669+02:00", "EventTime": "2023-10-30T14:11:34.992689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CZph5N4xB1uV0LZu5"]} -{"Format": "IDEA0", "ID": "af936228-5f7e-411f-bc70-c2a220939996", "DetectTime": "2023-10-30T14:11:35.025385+02:00", "EventTime": "2023-10-30T14:11:35.025403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CRQzRMnos9uqyj4p4"]} -{"Format": "IDEA0", "ID": "8bdb75b1-bf97-44d9-9e90-bc8bda8dabe3", "DetectTime": "2023-10-30T14:11:35.060263+02:00", "EventTime": "2023-10-30T14:11:35.060279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CRiGzK4XamAX4HMa6"]} -{"Format": "IDEA0", "ID": "e29b3642-9df7-43f9-9a09-eed864b07011", "DetectTime": "2023-10-30T14:11:35.091242+02:00", "EventTime": "2023-10-30T14:11:35.091259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CIKIKq1JVauWSTJHLl"]} -{"Format": "IDEA0", "ID": "5a395252-ce8a-4ba4-b232-7fdc5cae5881", "DetectTime": "2023-10-30T14:11:35.120543+02:00", "EventTime": "2023-10-30T14:11:35.120564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CBehiJ3nfm9whjW6p6"]} -{"Format": "Json", "ID": "5a395252-ce8a-4ba4-b232-7fdc5cae5881", "DetectTime": "2023-10-30T14:11:35.120543+02:00", "EventTime": "2023-10-30T14:11:35.120564+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:01:14.668442+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:35.190184)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ffbc7c07-e092-4442-ba0f-b4c17a3e94e4", "DetectTime": "2023-10-30T14:11:35.194634+02:00", "EventTime": "2023-10-30T14:11:35.194646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C6UmXj34yRJ7AcKbUi"]} -{"Format": "IDEA0", "ID": "f7553bb0-a259-44ee-8fcf-07c8c99af143", "DetectTime": "2023-10-30T14:11:35.222872+02:00", "EventTime": "2023-10-30T14:11:35.222891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CgZWFD3yxIL9xvEefb"]} -{"Format": "IDEA0", "ID": "a77d0b10-5832-4d14-8da3-9aa288834ff9", "DetectTime": "2023-10-30T14:11:35.250929+02:00", "EventTime": "2023-10-30T14:11:35.250942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C1ov9E3P2q5hmPtzA9"]} -{"Format": "IDEA0", "ID": "d08445dd-3477-48c2-94dc-452777e25bc3", "DetectTime": "2023-10-30T14:11:35.277747+02:00", "EventTime": "2023-10-30T14:11:35.277774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CSLsUYu6Vh0KZX0D6"]} -{"Format": "IDEA0", "ID": "96b1d95e-9e6c-4101-99a0-0ef2da81c5ac", "DetectTime": "2023-10-30T14:11:35.303552+02:00", "EventTime": "2023-10-30T14:11:35.303565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CJRGmM3C3kUlw02hl"]} -{"Format": "IDEA0", "ID": "43342b52-c010-42ee-a9f4-f5ba9b561f99", "DetectTime": "2023-10-30T14:11:35.332698+02:00", "EventTime": "2023-10-30T14:11:35.332725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CLuteY1oceUzxtoWHe"]} -{"Format": "IDEA0", "ID": "01a6d2a5-06a5-4087-87ec-bf0d44129268", "DetectTime": "2023-10-30T14:11:35.361572+02:00", "EventTime": "2023-10-30T14:11:35.361585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CKgIpJ2YNBNFLMF54e"]} -{"Format": "IDEA0", "ID": "f9bdd239-954f-4bec-a414-0a26eea12209", "DetectTime": "2023-10-30T14:11:35.387903+02:00", "EventTime": "2023-10-30T14:11:35.387919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C6gJ5I2w9duvnxlJ13"]} -{"Format": "Json", "ID": "f9bdd239-954f-4bec-a414-0a26eea12209", "DetectTime": "2023-10-30T14:11:35.387903+02:00", "EventTime": "2023-10-30T14:11:35.387919+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:31:53.243017+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:35.452011)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e3164a3f-5a1c-4a79-9233-1c4c4c34125a", "DetectTime": "2023-10-30T14:11:35.456343+02:00", "EventTime": "2023-10-30T14:11:35.456354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["COXQQ925pSbgWoDWl"]} -{"Format": "IDEA0", "ID": "5be8573f-4b6d-4edf-87f0-3338587c927a", "DetectTime": "2023-10-30T14:11:35.483852+02:00", "EventTime": "2023-10-30T14:11:35.483867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CwyvhdtKob55e1Iac"]} -{"Format": "IDEA0", "ID": "99357d3f-2e6f-4d24-bf5d-d96035cd798f", "DetectTime": "2023-10-30T14:11:35.510629+02:00", "EventTime": "2023-10-30T14:11:35.510646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CLhhsS7uyOgcLNjoa"]} -{"Format": "IDEA0", "ID": "7d43c1ce-4716-4bdf-8da2-3eabbb135249", "DetectTime": "2023-10-30T14:11:35.536377+02:00", "EventTime": "2023-10-30T14:11:35.536389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ct2ect4ywUGSyFOyCc"]} -{"Format": "IDEA0", "ID": "20e76573-9f63-49e4-9693-2258e8db6698", "DetectTime": "2023-10-30T14:11:35.561648+02:00", "EventTime": "2023-10-30T14:11:35.561674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CZFqdU11lb8VnxE6Hg"]} -{"Format": "IDEA0", "ID": "1510523b-cdf6-4c81-8b4b-82fb49be82b2", "DetectTime": "2023-10-30T14:11:35.587325+02:00", "EventTime": "2023-10-30T14:11:35.587343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C2NRaI3hbwWzgeaTh7"]} -{"Format": "IDEA0", "ID": "a3cc6bfb-374d-4710-8ed2-7f12000ae61c", "DetectTime": "2023-10-30T14:11:35.613115+02:00", "EventTime": "2023-10-30T14:11:35.613131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CJprmI2beBPbfioMAd"]} -{"Format": "IDEA0", "ID": "10eba071-c5e8-4f3c-b457-4177e6e8f237", "DetectTime": "2023-10-30T14:11:35.637726+02:00", "EventTime": "2023-10-30T14:11:35.637737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C1Ll3n4DQynYQxK3sf"]} -{"Format": "Json", "ID": "10eba071-c5e8-4f3c-b457-4177e6e8f237", "DetectTime": "2023-10-30T14:11:35.637726+02:00", "EventTime": "2023-10-30T14:11:35.637737+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:31:55.118672+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:35.708483)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "20d92042-8328-4fbe-a404-503234012305", "DetectTime": "2023-10-30T14:11:35.713321+02:00", "EventTime": "2023-10-30T14:11:35.713338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C6bcFT7HoBOWhMwU1"]} -{"Format": "IDEA0", "ID": "65d76d90-d8fd-468a-b7a2-c8483ec6463b", "DetectTime": "2023-10-30T14:11:35.741212+02:00", "EventTime": "2023-10-30T14:11:35.741226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CeMng34pXwikZKHNA1"]} -{"Format": "IDEA0", "ID": "24b4b23c-204d-4d0a-a727-e0ac4ce68538", "DetectTime": "2023-10-30T14:11:35.765568+02:00", "EventTime": "2023-10-30T14:11:35.765589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVjXQ41SFImm1w8Czc"]} -{"Format": "IDEA0", "ID": "0981de69-aa37-4ee4-8655-0ed956966228", "DetectTime": "2023-10-30T14:11:35.790527+02:00", "EventTime": "2023-10-30T14:11:35.790541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CUfBtk4TtXP10YsFa5"]} -{"Format": "IDEA0", "ID": "b3f1005f-0975-4932-bad8-2756cb1caca2", "DetectTime": "2023-10-30T14:11:35.816369+02:00", "EventTime": "2023-10-30T14:11:35.816381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CMXfSx2ypdMGpegh19"]} -{"Format": "IDEA0", "ID": "17bd18ab-984c-4cae-b728-c31875338d8d", "DetectTime": "2023-10-30T14:11:35.841444+02:00", "EventTime": "2023-10-30T14:11:35.841460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CJ1jStzey6GO8DUK3"]} -{"Format": "IDEA0", "ID": "897ea993-2f0c-4e1a-bdf2-1ecbfc98046c", "DetectTime": "2023-10-30T14:11:35.864715+02:00", "EventTime": "2023-10-30T14:11:35.864739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C9WY8X2fRTjcCHlDpc"]} -{"Format": "IDEA0", "ID": "8c7c4a7e-9d4f-4fb4-80ee-824529ab5766", "DetectTime": "2023-10-30T14:11:35.889679+02:00", "EventTime": "2023-10-30T14:11:35.889697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CTQZ7r188R5Obhgcn3"]} -{"Format": "Json", "ID": "8c7c4a7e-9d4f-4fb4-80ee-824529ab5766", "DetectTime": "2023-10-30T14:11:35.889679+02:00", "EventTime": "2023-10-30T14:11:35.889697+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:31:57.061780+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:35.950705)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2c9c2e61-3584-4adc-8236-cb079f0f39ec", "DetectTime": "2023-10-30T14:11:35.955517+02:00", "EventTime": "2023-10-30T14:11:35.955530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C7ydGy49x8MAA4R7Aj"]} -{"Format": "IDEA0", "ID": "d1d8ed11-9cde-4a1f-bcd5-e656fd507786", "DetectTime": "2023-10-30T14:11:35.976745+02:00", "EventTime": "2023-10-30T14:11:35.976757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CKHeKz2gmyhAyhCsa"]} -{"Format": "IDEA0", "ID": "78ad75c0-b342-498b-b0ad-49137a968239", "DetectTime": "2023-10-30T14:11:35.999560+02:00", "EventTime": "2023-10-30T14:11:35.999583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CiEg0p23PsAmR6a429"]} -{"Format": "IDEA0", "ID": "5e6357f5-e629-486c-9b8e-e7d7e3a030fb", "DetectTime": "2023-10-30T14:11:36.021585+02:00", "EventTime": "2023-10-30T14:11:36.021614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVzEN24y4yK4BXFwf7"]} -{"Format": "IDEA0", "ID": "0dc5d561-0d37-4549-bd3e-3e4fc429f302", "DetectTime": "2023-10-30T14:11:36.045025+02:00", "EventTime": "2023-10-30T14:11:36.045036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C4QkKD1N9B7SahFIRj"]} -{"Format": "IDEA0", "ID": "f1613c7b-cd36-4d48-8df6-8ead7bc5d6da", "DetectTime": "2023-10-30T14:11:36.067005+02:00", "EventTime": "2023-10-30T14:11:36.067026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CrnvBP3PkN2JGUsfqe"]} -{"Format": "IDEA0", "ID": "9b15047e-c724-4fc6-bc65-c5c2b2cdddb8", "DetectTime": "2023-10-30T14:11:36.085434+02:00", "EventTime": "2023-10-30T14:11:36.085445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CzxYu63EMBCdN8o9Q"]} -{"Format": "IDEA0", "ID": "9f6abb5f-b380-4bbe-a2c2-94a29d3e88e2", "DetectTime": "2023-10-30T14:11:36.104528+02:00", "EventTime": "2023-10-30T14:11:36.104541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C6sIQx4EDsCOO7BXHc"]} -{"Format": "IDEA0", "ID": "dba5bdf9-fd22-4c05-847c-f820e99269e7", "DetectTime": "2023-10-30T14:11:36.128209+02:00", "EventTime": "2023-10-30T14:11:36.128224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CDy2B53IAUk3OVTk73"]} -{"Format": "Json", "ID": "dba5bdf9-fd22-4c05-847c-f820e99269e7", "DetectTime": "2023-10-30T14:11:36.128209+02:00", "EventTime": "2023-10-30T14:11:36.128224+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-07T23:31:58.831386+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2023/10/30 14:11:36.187119)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b93c8d18-29fe-49bc-95af-83342ad1e0f2", "DetectTime": "2023-10-30T14:11:36.191363+02:00", "EventTime": "2023-10-30T14:11:36.191373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CA0jkw1mWPJ8m7gJi"]} -{"Format": "IDEA0", "ID": "d0f844ba-6d2e-492c-81c9-7381adcf5f0b", "DetectTime": "2023-10-30T14:11:36.211890+02:00", "EventTime": "2023-10-30T14:11:36.211911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CPwLnw45OWOxcY7Dj3"]} -{"Format": "IDEA0", "ID": "de323d5d-674f-4651-b5ba-330ae79e41cd", "DetectTime": "2023-10-30T14:11:36.230121+02:00", "EventTime": "2023-10-30T14:11:36.230144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CBzgZkK7T3T0gBSWa"]} -{"Format": "IDEA0", "ID": "8d31523d-430f-41dd-94af-e87e89bbf336", "DetectTime": "2023-10-30T14:11:36.350145+02:00", "EventTime": "2023-10-30T14:11:36.350157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CdA34q2sh4ISky85rl"]} -{"Format": "IDEA0", "ID": "cc6e75cb-c36b-47f9-8060-d5891cebff2d", "DetectTime": "2023-10-30T14:11:36.390096+02:00", "EventTime": "2023-10-30T14:11:36.390112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CFHzF6315KdkUHfW3l"]} -{"Format": "IDEA0", "ID": "ca405209-7824-4170-94d7-bbf99a3a1ac2", "DetectTime": "2023-10-30T14:11:36.430420+02:00", "EventTime": "2023-10-30T14:11:36.430436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CeUfsk469f6HWFoMzb"]} -{"Format": "IDEA0", "ID": "44e0ef4d-71bf-4cc2-93b5-7086d592afde", "DetectTime": "2023-10-30T14:11:36.470534+02:00", "EventTime": "2023-10-30T14:11:36.470562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CjCyQN3vpKPlXZh9R7"]} -{"Format": "IDEA0", "ID": "2078db5d-f8c9-48f1-9336-54e17e5cb6e1", "DetectTime": "2023-10-30T14:11:36.511566+02:00", "EventTime": "2023-10-30T14:11:36.511581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Crtg26JU2rBwxqz46"]} -{"Format": "IDEA0", "ID": "313cd346-c10f-4f27-a693-70a771b1033b", "DetectTime": "2023-10-30T14:11:36.553358+02:00", "EventTime": "2023-10-30T14:11:36.553375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C97NKd1pq7EmIXEO4g"]} -{"Format": "IDEA0", "ID": "3e70d42f-1b2f-4c34-9293-3718a668d1da", "DetectTime": "2023-10-30T14:11:36.592461+02:00", "EventTime": "2023-10-30T14:11:36.592477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CsGIdMLDUpdmqdr8h"]} -{"Format": "Json", "ID": "3e70d42f-1b2f-4c34-9293-3718a668d1da", "DetectTime": "2023-10-30T14:11:36.592461+02:00", "EventTime": "2023-10-30T14:11:36.592477+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:02:15.275527+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:36.673816)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c237cb39-6bd6-40dc-852b-e7654670b942", "DetectTime": "2023-10-30T14:11:36.679194+02:00", "EventTime": "2023-10-30T14:11:36.679210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CdTSPL12nHvpyuqwDl"]} -{"Format": "IDEA0", "ID": "76b85e1e-194b-4b71-950e-6d1fed5fe410", "DetectTime": "2023-10-30T14:11:36.716956+02:00", "EventTime": "2023-10-30T14:11:36.716974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CydWws4MDmr0QdHIs6"]} -{"Format": "IDEA0", "ID": "72827f55-ba2c-4e8b-a11b-b9e6837b5f70", "DetectTime": "2023-10-30T14:11:36.757606+02:00", "EventTime": "2023-10-30T14:11:36.757628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CSbS3F2e3dexDyJB4l"]} -{"Format": "IDEA0", "ID": "d184acbc-4e3a-42b2-8d4f-36acfd593c40", "DetectTime": "2023-10-30T14:11:36.798888+02:00", "EventTime": "2023-10-30T14:11:36.798906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C0njLK3sM1gatkE5o4"]} -{"Format": "IDEA0", "ID": "7fe5ff25-7ecc-4eeb-9ca7-a4925ea6878b", "DetectTime": "2023-10-30T14:11:36.837228+02:00", "EventTime": "2023-10-30T14:11:36.837249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CH4JDp1J7c59r4eQFe"]} -{"Format": "IDEA0", "ID": "31f5e347-2fc1-464e-a543-55c6b051f165", "DetectTime": "2023-10-30T14:11:36.872022+02:00", "EventTime": "2023-10-30T14:11:36.872041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C3vKoIVHDa1Ybb7Ml"]} -{"Format": "IDEA0", "ID": "49509f60-18f1-43cd-8bc4-0db8011e6ce4", "DetectTime": "2023-10-30T14:11:36.907792+02:00", "EventTime": "2023-10-30T14:11:36.907808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CRjmf42iNBBCKNMNK1"]} -{"Format": "IDEA0", "ID": "f4005d0a-48be-410d-8b1f-4a1753d8691c", "DetectTime": "2023-10-30T14:11:36.944612+02:00", "EventTime": "2023-10-30T14:11:36.944628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C4qLHv3AQduPy2yUa"]} -{"Format": "Json", "ID": "f4005d0a-48be-410d-8b1f-4a1753d8691c", "DetectTime": "2023-10-30T14:11:36.944612+02:00", "EventTime": "2023-10-30T14:11:36.944628+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:02:17.223379+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:37.022917)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "63f8fa63-3163-412f-a7f1-9a44a19c68bc", "DetectTime": "2023-10-30T14:11:37.028772+02:00", "EventTime": "2023-10-30T14:11:37.028799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CcYWuV2u3anvRWikx9"]} -{"Format": "IDEA0", "ID": "bb67f161-b850-49af-9234-7912b9810263", "DetectTime": "2023-10-30T14:11:37.067360+02:00", "EventTime": "2023-10-30T14:11:37.067378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CTuMy31Sy10gsvcKU1"]} -{"Format": "IDEA0", "ID": "a1771c83-f99b-4d8f-82a5-9c03838918a7", "DetectTime": "2023-10-30T14:11:37.104620+02:00", "EventTime": "2023-10-30T14:11:37.104632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C1AhxB3Se5uZKzzuxf"]} -{"Format": "IDEA0", "ID": "5fe15064-8886-466d-a53f-71615fe87d47", "DetectTime": "2023-10-30T14:11:37.142153+02:00", "EventTime": "2023-10-30T14:11:37.142173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CciDwp4sybQvTOuO58"]} -{"Format": "IDEA0", "ID": "60ef67d4-ea39-41f2-9b43-526c8d9613f5", "DetectTime": "2023-10-30T14:11:37.178857+02:00", "EventTime": "2023-10-30T14:11:37.178873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CKtXUa2FZlel1ZogVa"]} -{"Format": "IDEA0", "ID": "171bce7d-3355-42f5-ba78-51ba496ed38b", "DetectTime": "2023-10-30T14:11:37.213944+02:00", "EventTime": "2023-10-30T14:11:37.213967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CMZwQtrDyV10GxC55"]} -{"Format": "IDEA0", "ID": "4dc44114-e411-4d42-8919-d4331c303a9d", "DetectTime": "2023-10-30T14:11:37.248669+02:00", "EventTime": "2023-10-30T14:11:37.248697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CgZWPG1cw1CMU22HZc"]} -{"Format": "IDEA0", "ID": "0bce6f3b-4358-4df6-9f00-8b6ba2db3613", "DetectTime": "2023-10-30T14:11:37.282058+02:00", "EventTime": "2023-10-30T14:11:37.282071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C1dPAh1yVlhSZlWAqj"]} -{"Format": "Json", "ID": "0bce6f3b-4358-4df6-9f00-8b6ba2db3613", "DetectTime": "2023-10-30T14:11:37.282058+02:00", "EventTime": "2023-10-30T14:11:37.282071+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:02:20.755740+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:37.356460)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3479b8e-f858-40a9-9b77-76290f52c321", "DetectTime": "2023-10-30T14:11:37.362198+02:00", "EventTime": "2023-10-30T14:11:37.362223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJbnx91dhMy7oYbqn8"]} -{"Format": "IDEA0", "ID": "bff9885e-161a-4e45-b2c9-702c51061bfd", "DetectTime": "2023-10-30T14:11:37.399029+02:00", "EventTime": "2023-10-30T14:11:37.399050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cbkwgf12s7zrAHVUN3"]} -{"Format": "IDEA0", "ID": "38a0e38b-3a49-4c0a-a8a6-9157b0a77041", "DetectTime": "2023-10-30T14:11:37.429804+02:00", "EventTime": "2023-10-30T14:11:37.429818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CsZ8xz3RGwggu0bcya"]} -{"Format": "IDEA0", "ID": "52460aa9-8d2f-4a63-afac-b9c7261f2b9a", "DetectTime": "2023-10-30T14:11:37.465403+02:00", "EventTime": "2023-10-30T14:11:37.465420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C76Ih64u71hekff1u9"]} -{"Format": "IDEA0", "ID": "060e8173-1a90-4aeb-93a6-79b68e917cf2", "DetectTime": "2023-10-30T14:11:37.495822+02:00", "EventTime": "2023-10-30T14:11:37.495834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CrcNhO82153myA2T5"]} -{"Format": "IDEA0", "ID": "60e43b0f-5759-4237-af78-cfcfad4e1306", "DetectTime": "2023-10-30T14:11:37.523831+02:00", "EventTime": "2023-10-30T14:11:37.523843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CHFPxu3AweQSzuuhqh"]} -{"Format": "IDEA0", "ID": "e54e7905-ff1e-463a-adbf-8eefc2d2de61", "DetectTime": "2023-10-30T14:11:37.557989+02:00", "EventTime": "2023-10-30T14:11:37.558006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CmfV530qDcnMOqSi"]} -{"Format": "IDEA0", "ID": "35c4ff40-118d-4f75-97b9-c6a4ab958a1f", "DetectTime": "2023-10-30T14:11:37.591773+02:00", "EventTime": "2023-10-30T14:11:37.591789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cnrx6L1AMsEvSnjcs2"]} -{"Format": "Json", "ID": "35c4ff40-118d-4f75-97b9-c6a4ab958a1f", "DetectTime": "2023-10-30T14:11:37.591773+02:00", "EventTime": "2023-10-30T14:11:37.591789+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:02:23.169758+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:37.662446)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7a4dec42-888c-4095-9292-9b015d50307a", "DetectTime": "2023-10-30T14:11:37.668740+02:00", "EventTime": "2023-10-30T14:11:37.668771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C2Gz622VluERXPV2Q"]} -{"Format": "IDEA0", "ID": "6c9136bc-5f2d-4eb1-8473-8c16248b6760", "DetectTime": "2023-10-30T14:11:37.701138+02:00", "EventTime": "2023-10-30T14:11:37.701150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C8gi2WvqffXrqTkS"]} -{"Format": "IDEA0", "ID": "6d2d49de-ed53-415c-b89d-c724c239ff2a", "DetectTime": "2023-10-30T14:11:37.731885+02:00", "EventTime": "2023-10-30T14:11:37.731902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Cw24It3ieDSCj5YjFj"]} -{"Format": "IDEA0", "ID": "b0f9b69e-ea30-4b21-b20a-25ebd869f930", "DetectTime": "2023-10-30T14:11:37.762420+02:00", "EventTime": "2023-10-30T14:11:37.762435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CGZx8k1s5q5ZtuK5Rg"]} -{"Format": "IDEA0", "ID": "03906f0e-f0c7-45b3-9049-8293aa82c992", "DetectTime": "2023-10-30T14:11:37.794122+02:00", "EventTime": "2023-10-30T14:11:37.794148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C9EU3Z2SMrpZVH7nta"]} -{"Format": "IDEA0", "ID": "e79f3112-ae03-47ac-ba3e-e2c1491265db", "DetectTime": "2023-10-30T14:11:37.823023+02:00", "EventTime": "2023-10-30T14:11:37.823039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Ctadaw4EwjN6KNajJi"]} -{"Format": "IDEA0", "ID": "64947ccb-af5e-435c-9e62-94971a96c2c0", "DetectTime": "2023-10-30T14:11:37.853667+02:00", "EventTime": "2023-10-30T14:11:37.853683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CUjsz84F0BGL6NZyIj"]} -{"Format": "IDEA0", "ID": "f8e0984f-2899-4c3d-9d1d-8a010b329941", "DetectTime": "2023-10-30T14:11:37.879753+02:00", "EventTime": "2023-10-30T14:11:37.879769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C50NWM1bwjiucJHQV9"]} -{"Format": "Json", "ID": "f8e0984f-2899-4c3d-9d1d-8a010b329941", "DetectTime": "2023-10-30T14:11:37.879753+02:00", "EventTime": "2023-10-30T14:11:37.879769+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:32:39.241921+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:37.947434)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0380c323-5c36-4d7a-9eba-7b256882725f", "DetectTime": "2023-10-30T14:11:37.953097+02:00", "EventTime": "2023-10-30T14:11:37.953114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CjGDbuxMXAIxuuxyd"]} -{"Format": "IDEA0", "ID": "37407bb5-3bfb-44c1-b9e6-9d02ed64a392", "DetectTime": "2023-10-30T14:11:37.981248+02:00", "EventTime": "2023-10-30T14:11:37.981275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C3TIK51o3EXo0BW1V9"]} -{"Format": "IDEA0", "ID": "fdba5908-41d8-4c06-93a3-343ff765a1bc", "DetectTime": "2023-10-30T14:11:38.006854+02:00", "EventTime": "2023-10-30T14:11:38.006872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Csr9Iw6jHHjMmxnp"]} -{"Format": "IDEA0", "ID": "77a04772-51e5-4580-b31a-3c70c13b3536", "DetectTime": "2023-10-30T14:11:38.033501+02:00", "EventTime": "2023-10-30T14:11:38.033517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyHNQ9HNF1C2CDSq9"]} -{"Format": "IDEA0", "ID": "3e5a63e1-3fa6-4a72-8f10-ea84e7e2223e", "DetectTime": "2023-10-30T14:11:38.057948+02:00", "EventTime": "2023-10-30T14:11:38.057964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CSA7IF23hs0JpEDk04"]} -{"Format": "IDEA0", "ID": "6bf4cae8-d210-446d-80d9-f4fa1c4c12fc", "DetectTime": "2023-10-30T14:11:38.083964+02:00", "EventTime": "2023-10-30T14:11:38.083979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CNrGQFQPQFuHusGth"]} -{"Format": "IDEA0", "ID": "c6176def-0990-42f2-ab92-41cf8451dd9d", "DetectTime": "2023-10-30T14:11:38.107659+02:00", "EventTime": "2023-10-30T14:11:38.107669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CTLuvh2qEclbgTDN2g"]} -{"Format": "IDEA0", "ID": "ecc26d07-7858-4ee6-9503-f8fff7ad6642", "DetectTime": "2023-10-30T14:11:38.212764+02:00", "EventTime": "2023-10-30T14:11:38.212834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CniVjV2jzd1I5NnKx5"]} -{"Format": "Json", "ID": "ecc26d07-7858-4ee6-9503-f8fff7ad6642", "DetectTime": "2023-10-30T14:11:38.212764+02:00", "EventTime": "2023-10-30T14:11:38.212834+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:32:40.982575+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:38.282650)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "df89af79-09ea-447b-a96a-cad3bc1c46bd", "DetectTime": "2023-10-30T14:11:38.288245+02:00", "EventTime": "2023-10-30T14:11:38.288259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C1bReB1vvqqxrVON5c"]} -{"Format": "IDEA0", "ID": "69050633-fcd4-487a-87b7-e750b258993f", "DetectTime": "2023-10-30T14:11:38.313794+02:00", "EventTime": "2023-10-30T14:11:38.313821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CfEcB74CXzU11lek19"]} -{"Format": "IDEA0", "ID": "bb5a4457-a4a3-4b92-9b52-99e6b9bd7d58", "DetectTime": "2023-10-30T14:11:38.340650+02:00", "EventTime": "2023-10-30T14:11:38.340662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CdSZ354L1sKrrWru16"]} -{"Format": "IDEA0", "ID": "f0137bdc-622b-4632-bde0-864fadfc87cd", "DetectTime": "2023-10-30T14:11:38.364179+02:00", "EventTime": "2023-10-30T14:11:38.364196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C55jcv14AY0nUO1008"]} -{"Format": "IDEA0", "ID": "9c763a18-6ba0-4778-9f51-a86d56db4925", "DetectTime": "2023-10-30T14:11:38.391714+02:00", "EventTime": "2023-10-30T14:11:38.391730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CJVl2L2D8uVSvEhrj1"]} -{"Format": "IDEA0", "ID": "94e4cea7-0630-4ce4-9a9c-83b026454e3f", "DetectTime": "2023-10-30T14:11:38.415238+02:00", "EventTime": "2023-10-30T14:11:38.415258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CAuzpp21chfoC59bc9"]} -{"Format": "IDEA0", "ID": "e6ddd022-2493-4b69-98ad-3d6604b18621", "DetectTime": "2023-10-30T14:11:38.440871+02:00", "EventTime": "2023-10-30T14:11:38.440888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CtJ33I2ELVEkGi8Jzi"]} -{"Format": "IDEA0", "ID": "fedf3226-3fa3-4868-8bff-d1d31ff36f86", "DetectTime": "2023-10-30T14:11:38.465954+02:00", "EventTime": "2023-10-30T14:11:38.465971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cmuy1B4PwQQ92mWDJ"]} -{"Format": "IDEA0", "ID": "db1c6926-b19e-4ffc-9cd3-b539e026acab", "DetectTime": "2023-10-30T14:11:38.490796+02:00", "EventTime": "2023-10-30T14:11:38.490808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CUmrua3zCLsQe4ooVi"]} -{"Format": "Json", "ID": "db1c6926-b19e-4ffc-9cd3-b539e026acab", "DetectTime": "2023-10-30T14:11:38.490796+02:00", "EventTime": "2023-10-30T14:11:38.490808+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:32:43.026261+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:38.554060)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8a608a64-cb7f-40f9-9d18-bfdd193477af", "DetectTime": "2023-10-30T14:11:38.559294+02:00", "EventTime": "2023-10-30T14:11:38.559313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C1D6m721IIvyalAZd5"]} -{"Format": "IDEA0", "ID": "73efd844-ad3c-4a04-a01c-990c4b163352", "DetectTime": "2023-10-30T14:11:38.582746+02:00", "EventTime": "2023-10-30T14:11:38.582766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CbzlAV1pv9DmJT5L8b"]} -{"Format": "IDEA0", "ID": "00657e00-da4f-4f5a-b96c-9c93b42f3df1", "DetectTime": "2023-10-30T14:11:38.604346+02:00", "EventTime": "2023-10-30T14:11:38.604363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CI8UfZ1gJoIxhw03rc"]} -{"Format": "IDEA0", "ID": "a4922613-20e4-44e7-a970-598d4494817a", "DetectTime": "2023-10-30T14:11:38.628053+02:00", "EventTime": "2023-10-30T14:11:38.628069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CE3NrK1TiUYfHV6izi"]} -{"Format": "IDEA0", "ID": "988481cb-aa87-4f39-b6ef-5c1a625e3c57", "DetectTime": "2023-10-30T14:11:38.650844+02:00", "EventTime": "2023-10-30T14:11:38.650871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Co4j9VPvsQ0wFlZn4"]} -{"Format": "IDEA0", "ID": "b3a9cf86-ca0a-461f-b2a9-9c30b16c2897", "DetectTime": "2023-10-30T14:11:38.674306+02:00", "EventTime": "2023-10-30T14:11:38.674317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZ6unn49nqV7km4my3"]} -{"Format": "IDEA0", "ID": "f8aa1c63-2216-494a-b144-62fd2540440a", "DetectTime": "2023-10-30T14:11:38.697016+02:00", "EventTime": "2023-10-30T14:11:38.697032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C09APs2P2xckLd1Yb5"]} -{"Format": "IDEA0", "ID": "849a5d8f-8e8c-44ed-84af-3f585c6d5956", "DetectTime": "2023-10-30T14:11:38.721985+02:00", "EventTime": "2023-10-30T14:11:38.722005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CQkcOo4N78xFhjBQH"]} -{"Format": "Json", "ID": "849a5d8f-8e8c-44ed-84af-3f585c6d5956", "DetectTime": "2023-10-30T14:11:38.721985+02:00", "EventTime": "2023-10-30T14:11:38.722005+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T00:32:44.702368+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2023/10/30 14:11:38.788418)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d3302c6b-4dbe-4e9e-8d24-712493a5356e", "DetectTime": "2023-10-30T14:11:38.793821+02:00", "EventTime": "2023-10-30T14:11:38.793836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C72nun1nhqqGxH6nba"]} -{"Format": "IDEA0", "ID": "dabacc8f-d64f-4d1e-8db2-3a10835a14e4", "DetectTime": "2023-10-30T14:11:38.816730+02:00", "EventTime": "2023-10-30T14:11:38.816743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIxzAp4iHrWzqD3Mkl"]} -{"Format": "IDEA0", "ID": "80cb8c17-bf18-48b5-852b-7ea16c29f0c6", "DetectTime": "2023-10-30T14:11:38.839110+02:00", "EventTime": "2023-10-30T14:11:38.839128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CfuDpx1NCE45dbfuek"]} -{"Format": "IDEA0", "ID": "4e24b361-c334-457b-bcca-debd831946b8", "DetectTime": "2023-10-30T14:11:38.879188+02:00", "EventTime": "2023-10-30T14:11:38.879208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C2cBPc1QQWOUnYBxHj"]} -{"Format": "IDEA0", "ID": "209e9661-a969-4d3b-9622-30b219f20c8a", "DetectTime": "2023-10-30T14:11:38.919829+02:00", "EventTime": "2023-10-30T14:11:38.919848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CdaqrO3sbfyd79GI3l"]} -{"Format": "IDEA0", "ID": "8e917d8f-e998-4fef-9c67-62a8e6015ff6", "DetectTime": "2023-10-30T14:11:38.955262+02:00", "EventTime": "2023-10-30T14:11:38.955278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Cp9Yve3wFqy1RQz6Ue"]} -{"Format": "IDEA0", "ID": "0402a197-f70d-418e-a9d1-25332b15ec55", "DetectTime": "2023-10-30T14:11:38.998646+02:00", "EventTime": "2023-10-30T14:11:38.998665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CBrVu72A1KvLPv61Mb"]} -{"Format": "IDEA0", "ID": "8f434f89-5e61-496d-a490-9797efec0313", "DetectTime": "2023-10-30T14:11:39.036779+02:00", "EventTime": "2023-10-30T14:11:39.036797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["ClaiL4oU5jTJ0ENI9"]} -{"Format": "IDEA0", "ID": "668d038b-2252-461d-8ae5-075c37edccba", "DetectTime": "2023-10-30T14:11:39.076422+02:00", "EventTime": "2023-10-30T14:11:39.076434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["Ce7kqg1vXpf8U24dq9"]} -{"Format": "IDEA0", "ID": "c302d638-3beb-4170-93d4-87a7c3923e61", "DetectTime": "2023-10-30T14:11:39.117541+02:00", "EventTime": "2023-10-30T14:11:39.117557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CU8wEZ1J0RPeJjPL3c"]} -{"Format": "Json", "ID": "c302d638-3beb-4170-93d4-87a7c3923e61", "DetectTime": "2023-10-30T14:11:39.117541+02:00", "EventTime": "2023-10-30T14:11:39.117557+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:02:49.676067+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:39.204990)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d48b4dd3-082c-4cf1-9e4a-c4623f4406ca", "DetectTime": "2023-10-30T14:11:39.210964+02:00", "EventTime": "2023-10-30T14:11:39.210981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C7WmKq4YkiPcLMUrQk"]} -{"Format": "IDEA0", "ID": "2a43e73f-e4bd-4ae3-a255-f19d10ad23b2", "DetectTime": "2023-10-30T14:11:39.252319+02:00", "EventTime": "2023-10-30T14:11:39.252346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CSgXuD25mtAOYwYiT7"]} -{"Format": "IDEA0", "ID": "58f471c8-8aee-44bc-a2ab-02ed9ce17627", "DetectTime": "2023-10-30T14:11:39.290038+02:00", "EventTime": "2023-10-30T14:11:39.290063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CzvE2r4hreY7qj3Ij"]} -{"Format": "IDEA0", "ID": "86dba522-1893-4caa-9a8c-2520877ab06a", "DetectTime": "2023-10-30T14:11:39.326899+02:00", "EventTime": "2023-10-30T14:11:39.326915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CXvFeD2BrYcWEFS5U7"]} -{"Format": "IDEA0", "ID": "f7bab381-3e27-4c57-ad5b-dbcb57d6c820", "DetectTime": "2023-10-30T14:11:39.368118+02:00", "EventTime": "2023-10-30T14:11:39.368133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cruw9eLwV0yfQmrqa"]} -{"Format": "IDEA0", "ID": "62e0d49e-36d0-45aa-b380-226274d44903", "DetectTime": "2023-10-30T14:11:39.403346+02:00", "EventTime": "2023-10-30T14:11:39.403370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CWZyVm4HxHpH6tB2k5"]} -{"Format": "IDEA0", "ID": "cb3d9ac1-973d-460e-9dce-02a825030105", "DetectTime": "2023-10-30T14:11:39.439195+02:00", "EventTime": "2023-10-30T14:11:39.439227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CI1yxg3sg2TMb9pGih"]} -{"Format": "IDEA0", "ID": "19f0cbb2-91ee-4f3a-8029-792683a1741f", "DetectTime": "2023-10-30T14:11:39.475719+02:00", "EventTime": "2023-10-30T14:11:39.475730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CXalzE46sGKo0lg5N1"]} -{"Format": "Json", "ID": "19f0cbb2-91ee-4f3a-8029-792683a1741f", "DetectTime": "2023-10-30T14:11:39.475719+02:00", "EventTime": "2023-10-30T14:11:39.475730+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:02:51.525848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:39.555293)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e1750a4-4c65-4aaa-ac5b-c5cb85dc051e", "DetectTime": "2023-10-30T14:11:39.560516+02:00", "EventTime": "2023-10-30T14:11:39.560531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C0lC8SuCbU2HjsvJl"]} -{"Format": "IDEA0", "ID": "ccbd1b8d-7357-418d-83a7-f2a7e18e8a58", "DetectTime": "2023-10-30T14:11:39.596272+02:00", "EventTime": "2023-10-30T14:11:39.596288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CYj3HX2L9UHIRynKze"]} -{"Format": "IDEA0", "ID": "ad29e90f-074a-45dd-b816-11e22bc9b834", "DetectTime": "2023-10-30T14:11:39.631899+02:00", "EventTime": "2023-10-30T14:11:39.631915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Chuz9S2inw6uoMEb18"]} -{"Format": "IDEA0", "ID": "9baa4ed3-5199-4099-8435-5f125be4e2ee", "DetectTime": "2023-10-30T14:11:39.667031+02:00", "EventTime": "2023-10-30T14:11:39.667059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Ckc2xE3lfo1GsL0Ivf"]} -{"Format": "IDEA0", "ID": "d690038d-b407-4f6e-a87f-13650ec8ae33", "DetectTime": "2023-10-30T14:11:39.700164+02:00", "EventTime": "2023-10-30T14:11:39.700180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CVmAMd2HxRo9PtEWx9"]} -{"Format": "IDEA0", "ID": "7a2d2d6f-0bc5-4559-a9cc-a766ac41eff5", "DetectTime": "2023-10-30T14:11:39.733320+02:00", "EventTime": "2023-10-30T14:11:39.733342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CtBEMO2rp0OMfisTIh"]} -{"Format": "IDEA0", "ID": "2e8868ca-d2b0-4ea0-be62-4d5617413235", "DetectTime": "2023-10-30T14:11:39.764200+02:00", "EventTime": "2023-10-30T14:11:39.764215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CStSpS1w7GiTNK9im7"]} -{"Format": "IDEA0", "ID": "3666e132-cd77-4754-9468-49ec1dbf4c83", "DetectTime": "2023-10-30T14:11:39.793438+02:00", "EventTime": "2023-10-30T14:11:39.793450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C58M5V2jXFin2rSXz7"]} -{"Format": "Json", "ID": "3666e132-cd77-4754-9468-49ec1dbf4c83", "DetectTime": "2023-10-30T14:11:39.793438+02:00", "EventTime": "2023-10-30T14:11:39.793450+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:02:53.524104+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:39.855116)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "63bc869f-b7cd-4abe-919a-5ec0be4a7cc7", "DetectTime": "2023-10-30T14:11:39.859298+02:00", "EventTime": "2023-10-30T14:11:39.859313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmjD4WNC893Fa0YO9"]} -{"Format": "IDEA0", "ID": "eead75e8-56b7-48fa-874d-9fd8d491a0d3", "DetectTime": "2023-10-30T14:11:39.888263+02:00", "EventTime": "2023-10-30T14:11:39.888280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cn3SlzWupr7k7G9k7"]} -{"Format": "IDEA0", "ID": "2a8961fd-042a-4fbf-a376-a131b3487641", "DetectTime": "2023-10-30T14:11:39.919502+02:00", "EventTime": "2023-10-30T14:11:39.919520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cf9BpJ1yl71AAQ2Yq"]} -{"Format": "IDEA0", "ID": "c5462555-f84c-4946-a6b8-a56bf92a2cd9", "DetectTime": "2023-10-30T14:11:39.946524+02:00", "EventTime": "2023-10-30T14:11:39.946541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CVViHtOr7dhqiW4D"]} -{"Format": "IDEA0", "ID": "24e90624-95dc-4c47-8d40-d3bebb026c7a", "DetectTime": "2023-10-30T14:11:39.970874+02:00", "EventTime": "2023-10-30T14:11:39.970892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CX470x44OHY851KbDe"]} -{"Format": "IDEA0", "ID": "484b7e96-5b68-4c97-94e0-d06b95e7d5db", "DetectTime": "2023-10-30T14:11:39.999632+02:00", "EventTime": "2023-10-30T14:11:39.999649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CY7SCWImAGDfoBBk"]} -{"Format": "IDEA0", "ID": "9a685949-69d0-4722-85da-586f7b665a25", "DetectTime": "2023-10-30T14:11:40.031893+02:00", "EventTime": "2023-10-30T14:11:40.031913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CxaCpN1hbiCNcR2bia"]} -{"Format": "IDEA0", "ID": "0c62f4d0-9cfc-451e-8000-2dc7fed68154", "DetectTime": "2023-10-30T14:11:40.061989+02:00", "EventTime": "2023-10-30T14:11:40.062006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cw7FHM2RbL5964V5Vk"]} -{"Format": "Json", "ID": "0c62f4d0-9cfc-451e-8000-2dc7fed68154", "DetectTime": "2023-10-30T14:11:40.061989+02:00", "EventTime": "2023-10-30T14:11:40.062006+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-08T01:27:17.685928+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:40.128849)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6258d77a-2ea3-4932-a129-e9a472c0a383", "DetectTime": "2023-10-30T14:11:40.134306+02:00", "EventTime": "2023-10-30T14:11:40.134326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CrPNyx20uirZ8ety7d"]} -{"Format": "IDEA0", "ID": "25e352ff-141c-4be2-86b0-1ebc92cee77b", "DetectTime": "2023-10-30T14:11:40.162500+02:00", "EventTime": "2023-10-30T14:11:40.162526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CW7aZe3CM2Ry0Xhp6h"]} -{"Format": "IDEA0", "ID": "83898e96-e388-4903-b75c-45ae02ecc8da", "DetectTime": "2023-10-30T14:11:40.191437+02:00", "EventTime": "2023-10-30T14:11:40.191453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CUb7zS3ocJIt8GpJec"]} -{"Format": "IDEA0", "ID": "894519ca-a61d-48d8-80dd-17358df05ea5", "DetectTime": "2023-10-30T14:11:40.219726+02:00", "EventTime": "2023-10-30T14:11:40.219738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C2Unz552KtSiXCqdl"]} -{"Format": "IDEA0", "ID": "ea7163e0-6f25-443a-baac-c8ea881c7bc5", "DetectTime": "2023-10-30T14:11:40.242430+02:00", "EventTime": "2023-10-30T14:11:40.242441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CILkHBQqn0dBsvSI4"]} -{"Format": "IDEA0", "ID": "fa33170c-6d51-4994-b581-b453f2c608b2", "DetectTime": "2023-10-30T14:11:40.272689+02:00", "EventTime": "2023-10-30T14:11:40.272716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C4LNaB2f2Q2yvLcoXc"]} -{"Format": "IDEA0", "ID": "242bc4b6-6fe8-4b14-811a-67ca9c751878", "DetectTime": "2023-10-30T14:11:40.301082+02:00", "EventTime": "2023-10-30T14:11:40.301104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Craw1i3e2IFQuUuae9"]} -{"Format": "IDEA0", "ID": "989c3577-f538-411a-83f5-f3ecac5956bf", "DetectTime": "2023-10-30T14:11:40.329890+02:00", "EventTime": "2023-10-30T14:11:40.329906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C65u9F4L8CpVYaavEc"]} -{"Format": "Json", "ID": "989c3577-f538-411a-83f5-f3ecac5956bf", "DetectTime": "2023-10-30T14:11:40.329890+02:00", "EventTime": "2023-10-30T14:11:40.329906+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:33:27.167496+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:40.396958)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e827abce-41d4-45e9-866d-690b083d5f7a", "DetectTime": "2023-10-30T14:11:40.402253+02:00", "EventTime": "2023-10-30T14:11:40.402265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CvEyeXpttMgAf5Q11"]} -{"Format": "IDEA0", "ID": "1e41fd93-b0e3-49c7-94bc-ed519955cf78", "DetectTime": "2023-10-30T14:11:40.431224+02:00", "EventTime": "2023-10-30T14:11:40.431239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C4Zqx61sZw8PIXjc37"]} -{"Format": "IDEA0", "ID": "5b423232-840e-49d1-8bfc-d98b658a289b", "DetectTime": "2023-10-30T14:11:40.456585+02:00", "EventTime": "2023-10-30T14:11:40.456602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CYXgqs33TQ9ZJBFepl"]} -{"Format": "IDEA0", "ID": "db2a574c-cbfb-4929-a36f-eecc066acaa3", "DetectTime": "2023-10-30T14:11:40.480868+02:00", "EventTime": "2023-10-30T14:11:40.480891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CJCmfO2dyHs1DewDSj"]} -{"Format": "IDEA0", "ID": "7d96a504-8d69-4bcd-bf3c-39340bc6dded", "DetectTime": "2023-10-30T14:11:40.506999+02:00", "EventTime": "2023-10-30T14:11:40.507015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CxB1TR1osigjLBNgyc"]} -{"Format": "IDEA0", "ID": "7d1418a6-3e82-4870-ade4-461db2770fce", "DetectTime": "2023-10-30T14:11:40.533932+02:00", "EventTime": "2023-10-30T14:11:40.533948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQamHGt5twSqCMiZa"]} -{"Format": "IDEA0", "ID": "5847470e-b298-4cd3-bb4c-943dbd15758d", "DetectTime": "2023-10-30T14:11:40.560877+02:00", "EventTime": "2023-10-30T14:11:40.560895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C4sXqW38YmDqY5AMX2"]} -{"Format": "IDEA0", "ID": "8aa3e5c6-3cda-4bb2-9641-9ea80e9fcf41", "DetectTime": "2023-10-30T14:11:40.590143+02:00", "EventTime": "2023-10-30T14:11:40.590159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cx9IEA1rBEGfEvmfb2"]} -{"Format": "IDEA0", "ID": "3c9c3619-9e49-4e41-8de5-cdbad393dc0b", "DetectTime": "2023-10-30T14:11:40.614554+02:00", "EventTime": "2023-10-30T14:11:40.614578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CG5NJm42mptiTeJY89"]} -{"Format": "Json", "ID": "3c9c3619-9e49-4e41-8de5-cdbad393dc0b", "DetectTime": "2023-10-30T14:11:40.614554+02:00", "EventTime": "2023-10-30T14:11:40.614578+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:33:29.034571+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:40.679505)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d7824424-2626-433f-91ab-3c73a385a9b7", "DetectTime": "2023-10-30T14:11:40.683900+02:00", "EventTime": "2023-10-30T14:11:40.683918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Coub034lsIPR8Gbzy3"]} -{"Format": "IDEA0", "ID": "295b32cc-c476-4942-bb58-273876c60e90", "DetectTime": "2023-10-30T14:11:40.708852+02:00", "EventTime": "2023-10-30T14:11:40.708870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C4iBcT2UzYKXHiiGGl"]} -{"Format": "IDEA0", "ID": "b4dd0b3a-9612-4bb6-8adf-25538cdb283e", "DetectTime": "2023-10-30T14:11:40.729612+02:00", "EventTime": "2023-10-30T14:11:40.729627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CHbL29400J8r2ZQB6c"]} -{"Format": "IDEA0", "ID": "47d843aa-cd94-4213-9b58-72816ecac289", "DetectTime": "2023-10-30T14:11:40.751887+02:00", "EventTime": "2023-10-30T14:11:40.751903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbH6Uw3qgInHF982t2"]} -{"Format": "IDEA0", "ID": "b4513f82-8a94-4150-96ed-fb3e5e4a4fa6", "DetectTime": "2023-10-30T14:11:40.773650+02:00", "EventTime": "2023-10-30T14:11:40.773662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C7I20haVuRsDPcPTl"]} -{"Format": "IDEA0", "ID": "cf0c4f9e-a2c9-4df4-90f5-568342c50de9", "DetectTime": "2023-10-30T14:11:40.795631+02:00", "EventTime": "2023-10-30T14:11:40.795647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CtY7iQ1PGI2EEysTS5"]} -{"Format": "IDEA0", "ID": "58730609-5ddc-4418-88bf-e0bda20b5993", "DetectTime": "2023-10-30T14:11:40.816456+02:00", "EventTime": "2023-10-30T14:11:40.816474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C3iCOY2sbZWIBFxBbe"]} -{"Format": "IDEA0", "ID": "d91018f1-1e4b-4c64-bccc-7fdc1fc02731", "DetectTime": "2023-10-30T14:11:40.839772+02:00", "EventTime": "2023-10-30T14:11:40.839783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CYxf823qacnGuwaLLi"]} -{"Format": "Json", "ID": "d91018f1-1e4b-4c64-bccc-7fdc1fc02731", "DetectTime": "2023-10-30T14:11:40.839772+02:00", "EventTime": "2023-10-30T14:11:40.839783+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:33:31.043106+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:40.902100)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f7c2b474-c9d3-4348-aacb-5e6b93dc2cd5", "DetectTime": "2023-10-30T14:11:40.906850+02:00", "EventTime": "2023-10-30T14:11:40.906867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CWT1M14iLywNGLygN2"]} -{"Format": "IDEA0", "ID": "6e2afd86-38be-42a7-a238-8cb0ff0bce0c", "DetectTime": "2023-10-30T14:11:40.926439+02:00", "EventTime": "2023-10-30T14:11:40.926465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cr9gaw3ohUINcbXyXk"]} -{"Format": "IDEA0", "ID": "810fbfa6-6ff8-48d9-9a5b-b63031ebe1b4", "DetectTime": "2023-10-30T14:11:40.946089+02:00", "EventTime": "2023-10-30T14:11:40.946105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRMUtf2CBeo8JKPkgb"]} -{"Format": "IDEA0", "ID": "990fddfa-f11e-40a6-84b9-205a9d5e691d", "DetectTime": "2023-10-30T14:11:40.965809+02:00", "EventTime": "2023-10-30T14:11:40.965821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CeMgXu3blOb7dnxR4"]} -{"Format": "IDEA0", "ID": "82cb5d77-070a-4990-a1a1-209de82baa74", "DetectTime": "2023-10-30T14:11:40.986198+02:00", "EventTime": "2023-10-30T14:11:40.986217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CIPy9h1G7WSOjrE6U8"]} -{"Format": "IDEA0", "ID": "ba81e2de-b54d-4afd-84b6-51848557069f", "DetectTime": "2023-10-30T14:11:41.006187+02:00", "EventTime": "2023-10-30T14:11:41.006199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C4Tcbq3nAYZL6KoiH8"]} -{"Format": "IDEA0", "ID": "ea45c557-fadc-4b40-a09e-13b9eba25b9e", "DetectTime": "2023-10-30T14:11:41.027089+02:00", "EventTime": "2023-10-30T14:11:41.027100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CG1aod3UGDH5utqfoc"]} -{"Format": "IDEA0", "ID": "729c1b1e-6b56-4a21-b41a-61ef632fdbfb", "DetectTime": "2023-10-30T14:11:41.046150+02:00", "EventTime": "2023-10-30T14:11:41.046168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ck7P2z2VK1POnaRn14"]} -{"Format": "Json", "ID": "729c1b1e-6b56-4a21-b41a-61ef632fdbfb", "DetectTime": "2023-10-30T14:11:41.046150+02:00", "EventTime": "2023-10-30T14:11:41.046168+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T01:33:32.938874+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2023/10/30 14:11:41.103461)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f833a787-68ac-4e1c-874a-9e1e03c2bb3e", "DetectTime": "2023-10-30T14:11:41.108468+02:00", "EventTime": "2023-10-30T14:11:41.108485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyoWYI32BaYrdGI7y8"]} -{"Format": "IDEA0", "ID": "6b12ecab-cab1-46d0-8bc2-4b76962ad443", "DetectTime": "2023-10-30T14:11:41.129359+02:00", "EventTime": "2023-10-30T14:11:41.129386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Csi1NfFrVD5Uq3i4d"]} -{"Format": "IDEA0", "ID": "69b6bc7f-7bff-4907-80ad-ff6127078924", "DetectTime": "2023-10-30T14:11:41.165241+02:00", "EventTime": "2023-10-30T14:11:41.165268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CKBZUY3El4C3uwuNE1"]} -{"Format": "IDEA0", "ID": "15de964f-9150-4d53-bf9f-dd434281fe38", "DetectTime": "2023-10-30T14:11:41.201306+02:00", "EventTime": "2023-10-30T14:11:41.201324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CN4ayd1karSh3I4eX"]} -{"Format": "IDEA0", "ID": "05e74f9b-b35f-4bf2-9556-bc46913eb336", "DetectTime": "2023-10-30T14:11:41.239325+02:00", "EventTime": "2023-10-30T14:11:41.239344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cc3zoP1zIos5SmSGok"]} -{"Format": "IDEA0", "ID": "bd10f00f-e8ba-4a18-9305-0327e3d62fd6", "DetectTime": "2023-10-30T14:11:41.278956+02:00", "EventTime": "2023-10-30T14:11:41.278975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CGz91y3cnFOzkN66si"]} -{"Format": "IDEA0", "ID": "da15102b-6b99-4e66-9c1a-424a0cda5a85", "DetectTime": "2023-10-30T14:11:41.313589+02:00", "EventTime": "2023-10-30T14:11:41.313600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CGPdPX3eyWQJvvNlIe"]} -{"Format": "IDEA0", "ID": "e4c00af2-fa8c-4c8b-b61e-c2f5a4cb2aa1", "DetectTime": "2023-10-30T14:11:41.348213+02:00", "EventTime": "2023-10-30T14:11:41.348230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CxeOca2mwNlgkMzcu2"]} -{"Format": "Json", "ID": "e4c00af2-fa8c-4c8b-b61e-c2f5a4cb2aa1", "DetectTime": "2023-10-30T14:11:41.348213+02:00", "EventTime": "2023-10-30T14:11:41.348230+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:04:16.168608+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:41.434561)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "71ffcf6d-60be-4fea-a125-4b7cc14b0b95", "DetectTime": "2023-10-30T14:11:41.438869+02:00", "EventTime": "2023-10-30T14:11:41.438880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CLfOyw2kHD2lwyD0Cj"]} -{"Format": "IDEA0", "ID": "c5de24d8-01f4-4ef3-82cc-1aea3f4b2f78", "DetectTime": "2023-10-30T14:11:41.478159+02:00", "EventTime": "2023-10-30T14:11:41.478170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C3PTaw3soKkA3se28"]} -{"Format": "IDEA0", "ID": "39d70d8b-4323-4160-bb47-06ebe8733163", "DetectTime": "2023-10-30T14:11:41.515040+02:00", "EventTime": "2023-10-30T14:11:41.515052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CxCPLW3adMzD7Hz0ia"]} -{"Format": "IDEA0", "ID": "9e0a027e-b3d3-4765-9bd5-10e635b3d7b8", "DetectTime": "2023-10-30T14:11:41.549839+02:00", "EventTime": "2023-10-30T14:11:41.549854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CjbyCe1Ss6KUTpWiK1"]} -{"Format": "IDEA0", "ID": "bcbb844b-73ef-4707-bfe6-ed4a1fdea6fa", "DetectTime": "2023-10-30T14:11:41.581898+02:00", "EventTime": "2023-10-30T14:11:41.581914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CI7hTJ3buWUCsps2S8"]} -{"Format": "IDEA0", "ID": "33a7302c-b2be-49bd-9d7e-4d9c825e85db", "DetectTime": "2023-10-30T14:11:41.618119+02:00", "EventTime": "2023-10-30T14:11:41.618135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CUKWLN25Dfi1EuJmEd"]} -{"Format": "IDEA0", "ID": "bf283ce3-d4f9-4561-8e54-f8e005371f34", "DetectTime": "2023-10-30T14:11:41.654010+02:00", "EventTime": "2023-10-30T14:11:41.654021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C7TIqi2J5kv8zRIx3e"]} -{"Format": "IDEA0", "ID": "27e77f48-4513-4605-8578-a66a4ac2a51e", "DetectTime": "2023-10-30T14:11:41.687637+02:00", "EventTime": "2023-10-30T14:11:41.687649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CV2p3g24FpTWdclR69"]} -{"Format": "Json", "ID": "27e77f48-4513-4605-8578-a66a4ac2a51e", "DetectTime": "2023-10-30T14:11:41.687637+02:00", "EventTime": "2023-10-30T14:11:41.687649+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:04:18.233778+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:41.764791)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "551d6cf3-c803-4459-bd9e-30a023e4d513", "DetectTime": "2023-10-30T14:11:41.770298+02:00", "EventTime": "2023-10-30T14:11:41.770314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C86rrG4CXnaWnvQsSg"]} -{"Format": "IDEA0", "ID": "323008eb-585b-4a79-a6b5-44d0df66b3e1", "DetectTime": "2023-10-30T14:11:41.804108+02:00", "EventTime": "2023-10-30T14:11:41.804120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CU6NGm47mHIjWRAsB2"]} -{"Format": "IDEA0", "ID": "0c6758cd-3a11-4bea-99cc-113932f2dc01", "DetectTime": "2023-10-30T14:11:41.833711+02:00", "EventTime": "2023-10-30T14:11:41.833722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CX17NsHZy2CIGmeW3"]} -{"Format": "IDEA0", "ID": "738b6aa4-4568-4cc6-897e-18f315a1300e", "DetectTime": "2023-10-30T14:11:41.864959+02:00", "EventTime": "2023-10-30T14:11:41.864973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CHSoA43qOugJIK89lg"]} -{"Format": "IDEA0", "ID": "f3e6d19e-cf2a-469b-9eb0-b951afde1496", "DetectTime": "2023-10-30T14:11:41.894615+02:00", "EventTime": "2023-10-30T14:11:41.894635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CflQ3kNdAlGyRRaBk"]} -{"Format": "IDEA0", "ID": "25a2b58e-6c0a-488d-9b02-a60d36b93fd9", "DetectTime": "2023-10-30T14:11:41.925773+02:00", "EventTime": "2023-10-30T14:11:41.925785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CHmADu2CCkZk7dV5Ie"]} -{"Format": "IDEA0", "ID": "b48fbf6f-d2a3-4567-8a5f-c260f1acc103", "DetectTime": "2023-10-30T14:11:41.961798+02:00", "EventTime": "2023-10-30T14:11:41.961814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CDmElG4VQISmPxNys5"]} -{"Format": "IDEA0", "ID": "212280aa-c90b-4035-b046-8033532829ed", "DetectTime": "2023-10-30T14:11:41.992326+02:00", "EventTime": "2023-10-30T14:11:41.992337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXwWQQOfU3w1FRtZ1"]} -{"Format": "Json", "ID": "212280aa-c90b-4035-b046-8033532829ed", "DetectTime": "2023-10-30T14:11:41.992326+02:00", "EventTime": "2023-10-30T14:11:41.992337+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:04:24.841256+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:42.060697)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2df2d0ef-ff18-4c02-bca5-a2f162ddcf81", "DetectTime": "2023-10-30T14:11:42.065326+02:00", "EventTime": "2023-10-30T14:11:42.065339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CiRkgW1JF0J3CUaAde"]} -{"Format": "IDEA0", "ID": "07963877-2daa-414f-b9a0-31481da9bf0b", "DetectTime": "2023-10-30T14:11:42.096364+02:00", "EventTime": "2023-10-30T14:11:42.096385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CrZS9S3WTrx2xtAFl4"]} -{"Format": "IDEA0", "ID": "d4484c17-1079-42c1-88b5-df9b597a4184", "DetectTime": "2023-10-30T14:11:42.128419+02:00", "EventTime": "2023-10-30T14:11:42.128431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CRz1Dk34uwDuuXu3x8"]} -{"Format": "IDEA0", "ID": "9cb84ebc-4417-42c4-bd20-b621424a0e19", "DetectTime": "2023-10-30T14:11:42.159073+02:00", "EventTime": "2023-10-30T14:11:42.159089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CgNOyFJNkza0SDUY5"]} -{"Format": "IDEA0", "ID": "5709828b-1c55-47a6-879e-5452105926bf", "DetectTime": "2023-10-30T14:11:42.190151+02:00", "EventTime": "2023-10-30T14:11:42.190167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CPwbew3LsYFbZkjh6"]} -{"Format": "IDEA0", "ID": "6f126bdd-3d12-400b-a071-3b8951dc39c0", "DetectTime": "2023-10-30T14:11:42.221201+02:00", "EventTime": "2023-10-30T14:11:42.221212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CnUTKT11T4NkjiHfAe"]} -{"Format": "IDEA0", "ID": "cc8bfb29-5cb7-43f6-82fe-ea2297c082f1", "DetectTime": "2023-10-30T14:11:42.247758+02:00", "EventTime": "2023-10-30T14:11:42.247780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CyuLJ1tEYtJ7DOf9l"]} -{"Format": "IDEA0", "ID": "1c5642f4-303b-4881-a4fc-5f7b6dfd5239", "DetectTime": "2023-10-30T14:11:42.277399+02:00", "EventTime": "2023-10-30T14:11:42.277409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CyNiSUZR4aw4QfDx2"]} -{"Format": "Json", "ID": "1c5642f4-303b-4881-a4fc-5f7b6dfd5239", "DetectTime": "2023-10-30T14:11:42.277399+02:00", "EventTime": "2023-10-30T14:11:42.277409+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:04:26.658165+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:42.341160)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "94a21da2-b471-4e4e-967d-31b69873c4b7", "DetectTime": "2023-10-30T14:11:42.346116+02:00", "EventTime": "2023-10-30T14:11:42.346129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CrFvU52mT0Qqr8Hbeh"]} -{"Format": "IDEA0", "ID": "cc5f30eb-a8ea-4f40-a2e9-bbabcf9920a1", "DetectTime": "2023-10-30T14:11:42.370625+02:00", "EventTime": "2023-10-30T14:11:42.370636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CttyPv4S5SeCmRu3T5"]} -{"Format": "IDEA0", "ID": "f0dabf07-5e1c-4562-984d-e8e6380c1bb9", "DetectTime": "2023-10-30T14:11:42.394835+02:00", "EventTime": "2023-10-30T14:11:42.394849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CshKFTH3rCo7oWeCj"]} -{"Format": "IDEA0", "ID": "8f3cf280-b08d-4705-b1cf-ec0630e932e9", "DetectTime": "2023-10-30T14:11:42.417866+02:00", "EventTime": "2023-10-30T14:11:42.417877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CamTA02rCyn55RG5I1"]} -{"Format": "IDEA0", "ID": "a8e000dd-31be-4221-a92a-937346f1128f", "DetectTime": "2023-10-30T14:11:42.440690+02:00", "EventTime": "2023-10-30T14:11:42.440706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Ce5Bxh64gHrsRU1yi"]} -{"Format": "IDEA0", "ID": "243a6d6a-70e4-4753-b863-3155fe81f7ec", "DetectTime": "2023-10-30T14:11:42.463667+02:00", "EventTime": "2023-10-30T14:11:42.463679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CDNlaq2SPDeQUFha76"]} -{"Format": "IDEA0", "ID": "0f641201-ca08-4bb6-93aa-3530c0f1526b", "DetectTime": "2023-10-30T14:11:42.491754+02:00", "EventTime": "2023-10-30T14:11:42.491780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["ChCvpBQnCpaexQB1g"]} -{"Format": "IDEA0", "ID": "599daa42-41f7-4947-84c5-9930da92fa79", "DetectTime": "2023-10-30T14:11:42.520339+02:00", "EventTime": "2023-10-30T14:11:42.520354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CEXUNJ3vKC1HrMf0El"]} -{"Format": "Json", "ID": "599daa42-41f7-4947-84c5-9930da92fa79", "DetectTime": "2023-10-30T14:11:42.520339+02:00", "EventTime": "2023-10-30T14:11:42.520354+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:34:40.206256+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:42.584617)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "66b8ab5c-8603-448f-bf62-10461b70ee1e", "DetectTime": "2023-10-30T14:11:42.590149+02:00", "EventTime": "2023-10-30T14:11:42.590168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CyoQda36xfDhMYBLQ7"]} -{"Format": "IDEA0", "ID": "a783d130-872c-406a-b650-e880bdf5040e", "DetectTime": "2023-10-30T14:11:42.620204+02:00", "EventTime": "2023-10-30T14:11:42.620220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CuJ8HB17ry0dSPyXwk"]} -{"Format": "IDEA0", "ID": "5f753354-2cd0-47c3-925f-cee09371a456", "DetectTime": "2023-10-30T14:11:42.644168+02:00", "EventTime": "2023-10-30T14:11:42.644184+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cb3r5B2ghZHxjWxkCf"]} -{"Format": "IDEA0", "ID": "f8f4d3a7-d9a9-4311-ba54-be7e3a292668", "DetectTime": "2023-10-30T14:11:42.661877+02:00", "EventTime": "2023-10-30T14:11:42.661892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CfMk4G3yQWnGgfis52"]} -{"Format": "IDEA0", "ID": "b2d79992-bf5e-4500-9ca4-e7c6c5d9bd87", "DetectTime": "2023-10-30T14:11:42.684193+02:00", "EventTime": "2023-10-30T14:11:42.684204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C0Gj3m3SJJBBhsfTbd"]} -{"Format": "IDEA0", "ID": "8a578761-8f3e-4dd5-b993-2dc7e8f23390", "DetectTime": "2023-10-30T14:11:42.704417+02:00", "EventTime": "2023-10-30T14:11:42.704435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C5ha0m2m4lKj6H5eV"]} -{"Format": "IDEA0", "ID": "f5c7054d-ef2a-458e-a612-39356f829ad4", "DetectTime": "2023-10-30T14:11:42.726613+02:00", "EventTime": "2023-10-30T14:11:42.726632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cg6wXCiExTTYPXIo6"]} -{"Format": "IDEA0", "ID": "745284ee-09dc-4657-a44e-e7f3a5b2134c", "DetectTime": "2023-10-30T14:11:42.750045+02:00", "EventTime": "2023-10-30T14:11:42.750056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C1AQri4MZQJZGDES1e"]} -{"Format": "IDEA0", "ID": "4888ffda-bf48-4363-91b3-1d03665dff5b", "DetectTime": "2023-10-30T14:11:42.771890+02:00", "EventTime": "2023-10-30T14:11:42.771901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CcCz0Q2SOfoCZJ1w9"]} -{"Format": "Json", "ID": "4888ffda-bf48-4363-91b3-1d03665dff5b", "DetectTime": "2023-10-30T14:11:42.771890+02:00", "EventTime": "2023-10-30T14:11:42.771901+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:34:41.953065+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:42.839021)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "530267c0-5e83-4ba2-8bfd-ee39bc208d2c", "DetectTime": "2023-10-30T14:11:42.843556+02:00", "EventTime": "2023-10-30T14:11:42.843568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CmG9F34aXKAIoptSX5"]} -{"Format": "IDEA0", "ID": "a36712de-e55e-4ca3-973c-4f47767a0f18", "DetectTime": "2023-10-30T14:11:42.863686+02:00", "EventTime": "2023-10-30T14:11:42.863708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CcpOhg9AN1X1diIqd"]} -{"Format": "IDEA0", "ID": "ebbf83a3-b3ae-4ac3-915b-2482413e703d", "DetectTime": "2023-10-30T14:11:42.886976+02:00", "EventTime": "2023-10-30T14:11:42.886988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CkyjhRarcskX95EM8"]} -{"Format": "IDEA0", "ID": "a55cfdad-e245-4f01-a213-0b304295b311", "DetectTime": "2023-10-30T14:11:42.908824+02:00", "EventTime": "2023-10-30T14:11:42.908840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C6Bdw02dC0fx9r0ZGl"]} -{"Format": "IDEA0", "ID": "840a95a3-9bb3-4ba2-a544-acaf768c8173", "DetectTime": "2023-10-30T14:11:42.929878+02:00", "EventTime": "2023-10-30T14:11:42.929894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CdjnK932OBKattcqG4"]} -{"Format": "IDEA0", "ID": "b9a57283-4116-4327-96a1-ba7464b751ab", "DetectTime": "2023-10-30T14:11:42.952782+02:00", "EventTime": "2023-10-30T14:11:42.952794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C85n0X1CvvuycSUZO3"]} -{"Format": "IDEA0", "ID": "0041311e-3324-4810-91e9-34f702130a26", "DetectTime": "2023-10-30T14:11:42.972750+02:00", "EventTime": "2023-10-30T14:11:42.972760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cvb05G4k9au01akdNj"]} -{"Format": "IDEA0", "ID": "9e733337-ec51-44e0-83ba-57072808759d", "DetectTime": "2023-10-30T14:11:42.989984+02:00", "EventTime": "2023-10-30T14:11:42.989995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CKBGSZ195Nc5vzSfa6"]} -{"Format": "IDEA0", "ID": "554cf7d3-546f-40f1-bcab-17969a1d7a74", "DetectTime": "2023-10-30T14:11:43.009204+02:00", "EventTime": "2023-10-30T14:11:43.009215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CWeNll2yMeCfGW2pUf"]} -{"Format": "Json", "ID": "554cf7d3-546f-40f1-bcab-17969a1d7a74", "DetectTime": "2023-10-30T14:11:43.009204+02:00", "EventTime": "2023-10-30T14:11:43.009215+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:34:59.988662+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:43.088769)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ef2059b2-207f-450a-96fd-4f7c88d076e7", "DetectTime": "2023-10-30T14:11:43.092647+02:00", "EventTime": "2023-10-30T14:11:43.092657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cn1Voi1tNstt8VDHEj"]} -{"Format": "IDEA0", "ID": "eb882a28-c0ed-47e3-9f01-ebfa932bbcc3", "DetectTime": "2023-10-30T14:11:43.110334+02:00", "EventTime": "2023-10-30T14:11:43.110344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CY6K8Q1Qp6Mh1GKln"]} -{"Format": "IDEA0", "ID": "cd3f9c24-4d6d-4bdd-b5bd-71a2899aa531", "DetectTime": "2023-10-30T14:11:43.128270+02:00", "EventTime": "2023-10-30T14:11:43.128287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CWCHYs2JgPAOkVv0Q9"]} -{"Format": "IDEA0", "ID": "dc7d4ea1-ae18-4533-a0ec-135eecc34861", "DetectTime": "2023-10-30T14:11:43.148403+02:00", "EventTime": "2023-10-30T14:11:43.148417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CQ2cQu1fLDMscebxza"]} -{"Format": "IDEA0", "ID": "55b07ca1-6424-4a09-ac18-5aba6171e1e3", "DetectTime": "2023-10-30T14:11:43.165240+02:00", "EventTime": "2023-10-30T14:11:43.165250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cza1dw43VRRk65Zaye"]} -{"Format": "IDEA0", "ID": "0ca2b1c2-6a1e-40e6-b060-8b9b6a9f46c9", "DetectTime": "2023-10-30T14:11:43.181242+02:00", "EventTime": "2023-10-30T14:11:43.181258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CSeRzP3uo1AWJzOTn9"]} -{"Format": "IDEA0", "ID": "ef980d7d-5292-438c-a679-11cf24667e2e", "DetectTime": "2023-10-30T14:11:43.204590+02:00", "EventTime": "2023-10-30T14:11:43.204602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CWwQ4T2EyHbdn3FFF9"]} -{"Format": "IDEA0", "ID": "c4100d20-73c9-477d-97b1-eb9b55de2011", "DetectTime": "2023-10-30T14:11:43.222725+02:00", "EventTime": "2023-10-30T14:11:43.222741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CU1vWN1SiBna3PRCzi"]} -{"Format": "Json", "ID": "c4100d20-73c9-477d-97b1-eb9b55de2011", "DetectTime": "2023-10-30T14:11:43.222725+02:00", "EventTime": "2023-10-30T14:11:43.222741+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T02:35:02.791096+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2023/10/30 14:11:43.276283)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "38345aab-8d97-42d6-987a-4ebba0e7362d", "DetectTime": "2023-10-30T14:11:43.280776+02:00", "EventTime": "2023-10-30T14:11:43.280790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CTvOjO1Vo7fZncXKmh"]} -{"Format": "IDEA0", "ID": "54c74298-ac33-4e1a-820e-ccdc32c2cb8e", "DetectTime": "2023-10-30T14:11:43.296853+02:00", "EventTime": "2023-10-30T14:11:43.296869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrG71u38wdIamLcGej"]} -{"Format": "IDEA0", "ID": "2840fac1-0f96-47a4-ae1b-e9802ada13bd", "DetectTime": "2023-10-30T14:11:43.317484+02:00", "EventTime": "2023-10-30T14:11:43.317500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CdR8Ny3fkldTmCIlK1"]} -{"Format": "IDEA0", "ID": "9d4241a5-1cb0-45cb-834b-fb84684e7133", "DetectTime": "2023-10-30T14:11:43.358490+02:00", "EventTime": "2023-10-30T14:11:43.358506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Clarqj3Hm6ofXDLPd"]} -{"Format": "IDEA0", "ID": "e1b540a0-92f4-44d3-a2a3-7f5dac987a91", "DetectTime": "2023-10-30T14:11:43.393059+02:00", "EventTime": "2023-10-30T14:11:43.393070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CRea5Y8RKT36MPQO2"]} -{"Format": "IDEA0", "ID": "4deeb748-e382-4a0d-b5cb-f5e13814fed6", "DetectTime": "2023-10-30T14:11:43.432954+02:00", "EventTime": "2023-10-30T14:11:43.432965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMG6iD1Cw0EIx4bDRb"]} -{"Format": "IDEA0", "ID": "46965c8b-0a61-4a38-9208-200abaf18595", "DetectTime": "2023-10-30T14:11:43.473049+02:00", "EventTime": "2023-10-30T14:11:43.473065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CPtXjQ168cCkZy3XI3"]} -{"Format": "IDEA0", "ID": "cdc092c3-0596-43ad-8b75-88e7c5141d59", "DetectTime": "2023-10-30T14:11:43.512464+02:00", "EventTime": "2023-10-30T14:11:43.512475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CJ9mXn3vCvAo2EN6Of"]} -{"Format": "IDEA0", "ID": "d6a3aae8-880b-4727-bb3e-950f87bc77cf", "DetectTime": "2023-10-30T14:11:43.551310+02:00", "EventTime": "2023-10-30T14:11:43.551320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CCbhcs2X2ddasrfcU7"]} -{"Format": "IDEA0", "ID": "f0e78d1f-b130-4df6-9b40-93a3de3d347b", "DetectTime": "2023-10-30T14:11:43.589470+02:00", "EventTime": "2023-10-30T14:11:43.589486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CiffbE3lvHCJXwqWyd"]} -{"Format": "Json", "ID": "f0e78d1f-b130-4df6-9b40-93a3de3d347b", "DetectTime": "2023-10-30T14:11:43.589470+02:00", "EventTime": "2023-10-30T14:11:43.589486+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:05:25.444416+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:43.672387)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "77054f95-b47b-44ba-9c7a-75af41f00f8b", "DetectTime": "2023-10-30T14:11:43.676250+02:00", "EventTime": "2023-10-30T14:11:43.676260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CILZu32oTSVmmyu975"]} -{"Format": "IDEA0", "ID": "27ba6e66-c110-42f5-97be-0abbe80e60c5", "DetectTime": "2023-10-30T14:11:43.713909+02:00", "EventTime": "2023-10-30T14:11:43.713925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CHkEFK3rOBpwVzZJog"]} -{"Format": "IDEA0", "ID": "f2e80526-29ef-4d01-a18d-789992592af0", "DetectTime": "2023-10-30T14:11:43.754284+02:00", "EventTime": "2023-10-30T14:11:43.754301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CtIfeu1UomoWlvGFH7"]} -{"Format": "IDEA0", "ID": "19e3ef5f-ad4b-4502-bad5-a1f5e3f125fa", "DetectTime": "2023-10-30T14:11:43.789344+02:00", "EventTime": "2023-10-30T14:11:43.789362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CH33Nxh0POSL57Zp9"]} -{"Format": "IDEA0", "ID": "a761b082-69eb-4199-9473-02850a3226f1", "DetectTime": "2023-10-30T14:11:43.823921+02:00", "EventTime": "2023-10-30T14:11:43.823932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cy9mtI1Iiv6OEKEgN8"]} -{"Format": "IDEA0", "ID": "311de244-e0e0-44ac-920d-f0e1d39c9647", "DetectTime": "2023-10-30T14:11:43.859257+02:00", "EventTime": "2023-10-30T14:11:43.859269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CcEOqG47YhqqOaeeg3"]} -{"Format": "IDEA0", "ID": "6baab6d0-d0a4-4b51-8fb8-02471a151df6", "DetectTime": "2023-10-30T14:11:43.893367+02:00", "EventTime": "2023-10-30T14:11:43.893379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CKVQ7526N1teQfWKe5"]} -{"Format": "IDEA0", "ID": "14a0f4ff-7ad9-498b-8965-92cddf5ca2b5", "DetectTime": "2023-10-30T14:11:43.926658+02:00", "EventTime": "2023-10-30T14:11:43.926670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C5jCTg1jWERinZFQ55"]} -{"Format": "Json", "ID": "14a0f4ff-7ad9-498b-8965-92cddf5ca2b5", "DetectTime": "2023-10-30T14:11:43.926658+02:00", "EventTime": "2023-10-30T14:11:43.926670+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:05:27.689019+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:44.003103)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86addd27-5625-482f-bcfe-c2e52b0791c8", "DetectTime": "2023-10-30T14:11:44.008417+02:00", "EventTime": "2023-10-30T14:11:44.008432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CUxxQm4XDhdZaM4Vfg"]} -{"Format": "IDEA0", "ID": "d4cee119-a0a1-4443-891f-a8614a54af55", "DetectTime": "2023-10-30T14:11:44.049116+02:00", "EventTime": "2023-10-30T14:11:44.049132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CJ2WZJ11X8ohS56j12"]} -{"Format": "IDEA0", "ID": "8dfdba8e-0277-4da2-9436-cdd4db78880f", "DetectTime": "2023-10-30T14:11:44.082589+02:00", "EventTime": "2023-10-30T14:11:44.082611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CAZxCVOeuQsxJXdE9"]} -{"Format": "IDEA0", "ID": "7d4cbce7-6bb5-482d-86cd-b7980f1a9951", "DetectTime": "2023-10-30T14:11:44.117280+02:00", "EventTime": "2023-10-30T14:11:44.117291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CuBI4S3XOLZ43zPWaj"]} -{"Format": "IDEA0", "ID": "302b1e55-0196-495c-a879-e3c9f5bfb203", "DetectTime": "2023-10-30T14:11:44.153237+02:00", "EventTime": "2023-10-30T14:11:44.153248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C9Eo8V1VCu0q765325"]} -{"Format": "IDEA0", "ID": "9a5f8c01-046b-4221-8904-a40c0896638f", "DetectTime": "2023-10-30T14:11:44.189127+02:00", "EventTime": "2023-10-30T14:11:44.189148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CohVmP1WpVqFbjlY1d"]} -{"Format": "IDEA0", "ID": "895de64f-2a4d-43df-853d-6fd08475381d", "DetectTime": "2023-10-30T14:11:44.225720+02:00", "EventTime": "2023-10-30T14:11:44.225731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C6LSxi39zb9utOv4A1"]} -{"Format": "IDEA0", "ID": "79e125eb-585e-4e6e-b96a-3f2bceb04f15", "DetectTime": "2023-10-30T14:11:44.261593+02:00", "EventTime": "2023-10-30T14:11:44.261606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXSUuk4DYX3ATEDLu7"]} -{"Format": "Json", "ID": "79e125eb-585e-4e6e-b96a-3f2bceb04f15", "DetectTime": "2023-10-30T14:11:44.261593+02:00", "EventTime": "2023-10-30T14:11:44.261606+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:05:29.671958+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:44.341196)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5dd995ab-2283-464b-8783-6941249617cc", "DetectTime": "2023-10-30T14:11:44.347861+02:00", "EventTime": "2023-10-30T14:11:44.347873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CW0kQ61bkHZR5hZvh"]} -{"Format": "IDEA0", "ID": "836d17f3-98f5-42b3-8a5b-5a8917bdb25d", "DetectTime": "2023-10-30T14:11:44.383303+02:00", "EventTime": "2023-10-30T14:11:44.383317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cum5Q64PNrGTtqiR3l"]} -{"Format": "IDEA0", "ID": "eefd30a8-761f-4a6c-bb3e-1aa438103129", "DetectTime": "2023-10-30T14:11:44.414836+02:00", "EventTime": "2023-10-30T14:11:44.414848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CScW0p2sHt9h1aER8l"]} -{"Format": "IDEA0", "ID": "657b04f8-ae8b-4911-84f7-7f668eaa6bb0", "DetectTime": "2023-10-30T14:11:44.448805+02:00", "EventTime": "2023-10-30T14:11:44.448822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CR2cgnQQqeIFRaA6l"]} -{"Format": "IDEA0", "ID": "0abb22bc-e2fc-400c-ac8d-64eadd365e11", "DetectTime": "2023-10-30T14:11:44.475521+02:00", "EventTime": "2023-10-30T14:11:44.475532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXQ5Xz1HZdOj6Cbrk7"]} -{"Format": "IDEA0", "ID": "51dfa616-ef34-4800-8741-51d21e09cb12", "DetectTime": "2023-10-30T14:11:44.505985+02:00", "EventTime": "2023-10-30T14:11:44.506002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CfPiFW2ILrCt3mDMKi"]} -{"Format": "IDEA0", "ID": "7fd17e51-7dfb-443d-b914-b31f4dbffe72", "DetectTime": "2023-10-30T14:11:44.537876+02:00", "EventTime": "2023-10-30T14:11:44.537888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CboXxT3OvZlQvykhDa"]} -{"Format": "IDEA0", "ID": "3f291207-dff2-4145-9d1e-f8671e27e363", "DetectTime": "2023-10-30T14:11:44.569483+02:00", "EventTime": "2023-10-30T14:11:44.569503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRNNuU3owgtgwBSwtd"]} -{"Format": "IDEA0", "ID": "ee5940a4-4263-4dbe-afa8-9cbea6dfe6cd", "DetectTime": "2023-10-30T14:11:44.595484+02:00", "EventTime": "2023-10-30T14:11:44.595505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Czscpm3rxnmq5K4Ubk"]} -{"Format": "Json", "ID": "ee5940a4-4263-4dbe-afa8-9cbea6dfe6cd", "DetectTime": "2023-10-30T14:11:44.595484+02:00", "EventTime": "2023-10-30T14:11:44.595505+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:05:31.723464+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:44.678348)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa690ccb-f210-4dc5-915d-8718a1b976a6", "DetectTime": "2023-10-30T14:11:44.684135+02:00", "EventTime": "2023-10-30T14:11:44.684152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyHHWkg1Bri85hoD3"]} -{"Format": "IDEA0", "ID": "d1648f38-775b-4df1-949a-587da2b8345c", "DetectTime": "2023-10-30T14:11:44.716255+02:00", "EventTime": "2023-10-30T14:11:44.716273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CV7sv82cgczTMEU47g"]} -{"Format": "IDEA0", "ID": "f6e9b4e7-732b-4fab-97ad-88b10670c9f0", "DetectTime": "2023-10-30T14:11:44.748465+02:00", "EventTime": "2023-10-30T14:11:44.748479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CFUKLhf9Tr4eFEn76"]} -{"Format": "IDEA0", "ID": "72d1d0dc-9e88-4921-a059-6f4cf5e8a28e", "DetectTime": "2023-10-30T14:11:44.781422+02:00", "EventTime": "2023-10-30T14:11:44.781445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["ChJHay1SpkktbDPxY7"]} -{"Format": "IDEA0", "ID": "e71022db-2e7d-41e0-bb29-6cb6ee39dd43", "DetectTime": "2023-10-30T14:11:44.804617+02:00", "EventTime": "2023-10-30T14:11:44.804635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CAE5xObBwHbJ6Duyb"]} -{"Format": "IDEA0", "ID": "66ad4e29-265a-4adb-9978-7ba2c98fd8b5", "DetectTime": "2023-10-30T14:11:44.839991+02:00", "EventTime": "2023-10-30T14:11:44.840019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CEW9FK1ETQXUyqktHc"]} -{"Format": "IDEA0", "ID": "cc64ae35-25bf-45a7-919b-5eff51516680", "DetectTime": "2023-10-30T14:11:44.868292+02:00", "EventTime": "2023-10-30T14:11:44.868307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CyOCx4A8dtGNtsr6f"]} -{"Format": "IDEA0", "ID": "ca6ea8d3-36ca-4813-9f05-2906fffbf285", "DetectTime": "2023-10-30T14:11:44.901535+02:00", "EventTime": "2023-10-30T14:11:44.901552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C35Kdj2NojlVTJSFva"]} -{"Format": "IDEA0", "ID": "eda51bd0-9718-459a-b0e3-69ec45178637", "DetectTime": "2023-10-30T14:11:44.925654+02:00", "EventTime": "2023-10-30T14:11:44.925669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["C1lCzQ3nX1toPfQ0P2"]} -{"Format": "IDEA0", "ID": "150f9fd4-e3b9-4dd4-9bad-5a965dabc1d9", "DetectTime": "2023-10-30T14:11:44.953835+02:00", "EventTime": "2023-10-30T14:11:44.953847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.197.43.156 ", "ContentType": "text/plain"}], "uids": ["CRhZHK3autwBjmnQvk"]} -{"Format": "IDEA0", "ID": "16a257c4-2689-4607-ae05-0c11bba66f71", "DetectTime": "2023-10-30T14:11:44.977300+02:00", "EventTime": "2023-10-30T14:11:44.977316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C67s9I16gI2HUkyv9"]} -{"Format": "IDEA0", "ID": "dbb7c6df-07c4-49c1-bdb4-caa493db1b93", "DetectTime": "2023-10-30T14:11:44.999224+02:00", "EventTime": "2023-10-30T14:11:44.999241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CU7PSH2cV1jZseMqf7"]} -{"Format": "IDEA0", "ID": "c1442ccf-78a4-4575-b73d-0fc5a2d20c60", "DetectTime": "2023-10-30T14:11:45.023538+02:00", "EventTime": "2023-10-30T14:11:45.023567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CzRviq4Efcqi3MW9M1"]} -{"Format": "IDEA0", "ID": "7abec0c1-c35a-473f-a170-fcdd7b33c3c0", "DetectTime": "2023-10-30T14:11:45.046301+02:00", "EventTime": "2023-10-30T14:11:45.046320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXv0W530EdrsdCpDA1"]} -{"Format": "Json", "ID": "7abec0c1-c35a-473f-a170-fcdd7b33c3c0", "DetectTime": "2023-10-30T14:11:45.046301+02:00", "EventTime": "2023-10-30T14:11:45.046320+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:35:49.298523+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:45.132067)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "813a3152-8d4a-4ee4-b3d5-0382b30c08cd", "DetectTime": "2023-10-30T14:11:45.138323+02:00", "EventTime": "2023-10-30T14:11:45.138341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CRmuaG3TY7vRdf1p42"]} -{"Format": "IDEA0", "ID": "8d021d97-3417-4b1a-b65f-0560a5b51307", "DetectTime": "2023-10-30T14:11:45.166368+02:00", "EventTime": "2023-10-30T14:11:45.166396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CDr48u12z3Z9RfyPUi"]} -{"Format": "IDEA0", "ID": "bfd6baef-2f35-449e-8f61-257ca23eead3", "DetectTime": "2023-10-30T14:11:45.191341+02:00", "EventTime": "2023-10-30T14:11:45.191356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CJik5R1QUN0Sed4t61"]} -{"Format": "IDEA0", "ID": "0b0bcfe4-2617-400e-bd04-926bafc9e2fd", "DetectTime": "2023-10-30T14:11:45.215073+02:00", "EventTime": "2023-10-30T14:11:45.215089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CvQwYc2y65x9kNtAzc"]} -{"Format": "IDEA0", "ID": "75e7b981-9899-41f7-b661-175d33f369d0", "DetectTime": "2023-10-30T14:11:45.236840+02:00", "EventTime": "2023-10-30T14:11:45.236854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CNFd1i3O4pK0XJ0LG2"]} -{"Format": "IDEA0", "ID": "3c5b781e-ac5e-4b48-aea7-ca4a86b76840", "DetectTime": "2023-10-30T14:11:45.259761+02:00", "EventTime": "2023-10-30T14:11:45.259777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CDlQfz4llRFFuxcmQj"]} -{"Format": "IDEA0", "ID": "d92b6f30-751b-4439-a78e-e0c7aacfc943", "DetectTime": "2023-10-30T14:11:45.292742+02:00", "EventTime": "2023-10-30T14:11:45.292772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CEI8Lg2P74u6UDDvx4"]} -{"Format": "IDEA0", "ID": "7d1fbb0d-b243-4d1d-9bda-5ac04f6509b0", "DetectTime": "2023-10-30T14:11:45.318010+02:00", "EventTime": "2023-10-30T14:11:45.318028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C38AtH14XRRKStZg82"]} -{"Format": "IDEA0", "ID": "ff4facbe-2c0c-4ef7-818f-9a0a27d1fe00", "DetectTime": "2023-10-30T14:11:45.345216+02:00", "EventTime": "2023-10-30T14:11:45.345231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CBu2BY2xy6q1qphHN1"]} -{"Format": "IDEA0", "ID": "92345dbd-1e2b-481f-af04-e7f849e70802", "DetectTime": "2023-10-30T14:11:45.368239+02:00", "EventTime": "2023-10-30T14:11:45.368250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C6MSCq3joMxvWE7gsj"]} -{"Format": "IDEA0", "ID": "651ce369-2e47-41ad-bd8a-bf1445d31067", "DetectTime": "2023-10-30T14:11:45.388139+02:00", "EventTime": "2023-10-30T14:11:45.388157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CnUKIi4lQOLNe7ZGT6"]} -{"Format": "IDEA0", "ID": "3572ac93-e30a-450a-ac0c-a7d8eeb0860e", "DetectTime": "2023-10-30T14:11:45.408711+02:00", "EventTime": "2023-10-30T14:11:45.408722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CkFMkj3QtWWQFy18v7"]} -{"Format": "IDEA0", "ID": "5acdfedf-d654-4aef-a85b-a7164f68b547", "DetectTime": "2023-10-30T14:11:45.431231+02:00", "EventTime": "2023-10-30T14:11:45.431243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbJGUg4rUSRsHgTTdg"]} -{"Format": "IDEA0", "ID": "fee9caa1-2147-4cb1-b5f3-4336884858e3", "DetectTime": "2023-10-30T14:11:45.453469+02:00", "EventTime": "2023-10-30T14:11:45.453483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CZjLdP3iPE70MJZLAa"]} -{"Format": "IDEA0", "ID": "2e77e2a6-ddb9-449f-89c1-2b9b035bfbe0", "DetectTime": "2023-10-30T14:11:45.474950+02:00", "EventTime": "2023-10-30T14:11:45.474969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cp48HLsC1SEiGl7pe"]} -{"Format": "IDEA0", "ID": "93e6c2a7-a7ad-44c6-b91e-f79403b225a5", "DetectTime": "2023-10-30T14:11:45.498721+02:00", "EventTime": "2023-10-30T14:11:45.498743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C1QINF29xtWQLTVtR3"]} -{"Format": "IDEA0", "ID": "d35a33ab-3058-465e-9a30-f245eff9386d", "DetectTime": "2023-10-30T14:11:45.525283+02:00", "EventTime": "2023-10-30T14:11:45.525300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Cd6CME3RqcqtzdqRd7"]} -{"Format": "IDEA0", "ID": "b75f0449-0a5a-4cdc-a9e3-fb45c2726d5e", "DetectTime": "2023-10-30T14:11:45.554603+02:00", "EventTime": "2023-10-30T14:11:45.554614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CEPsGi3bxzZcuf4xLj"]} -{"Format": "IDEA0", "ID": "d0d0578b-1882-43b4-aa90-573249080c75", "DetectTime": "2023-10-30T14:11:45.579981+02:00", "EventTime": "2023-10-30T14:11:45.579997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CdGfJw4HSLVRRTLgua"]} -{"Format": "IDEA0", "ID": "dade3647-a069-4bc4-9329-47fd0c6d6804", "DetectTime": "2023-10-30T14:11:45.601455+02:00", "EventTime": "2023-10-30T14:11:45.601482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CVW7YwerDBvw2cQsi"]} -{"Format": "IDEA0", "ID": "b595688f-4697-412e-9af9-db431c9fed97", "DetectTime": "2023-10-30T14:11:45.624239+02:00", "EventTime": "2023-10-30T14:11:45.624257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6ipCw2F2MHumaIYu2"]} -{"Format": "IDEA0", "ID": "07b2fcd9-bd71-4c9f-aa92-ee6f2c8cbdf7", "DetectTime": "2023-10-30T14:11:45.644847+02:00", "EventTime": "2023-10-30T14:11:45.644858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CuGSRG2wChoWRSyF7"]} -{"Format": "IDEA0", "ID": "66fd5842-dd8a-4a38-b7d7-320eb9546d51", "DetectTime": "2023-10-30T14:11:45.666126+02:00", "EventTime": "2023-10-30T14:11:45.666141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CSfnIz1JecLLUd8sTg"]} -{"Format": "IDEA0", "ID": "8c6b733c-0481-4664-af76-4e58fe746344", "DetectTime": "2023-10-30T14:11:45.687884+02:00", "EventTime": "2023-10-30T14:11:45.687901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CsS5Q22MYYXYmRJhuj"]} -{"Format": "IDEA0", "ID": "090061ec-69d4-4309-b667-07d138999449", "DetectTime": "2023-10-30T14:11:45.710186+02:00", "EventTime": "2023-10-30T14:11:45.710198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CE1J3b4i2fED7SYbWd"]} -{"Format": "IDEA0", "ID": "2766029e-67a6-41fb-8491-0abd572406b9", "DetectTime": "2023-10-30T14:11:45.739105+02:00", "EventTime": "2023-10-30T14:11:45.739121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["ChAAue3nDs8N3ELJZd"]} -{"Format": "IDEA0", "ID": "8425394b-54e1-4eb5-bc77-7716c09a7d6b", "DetectTime": "2023-10-30T14:11:45.763650+02:00", "EventTime": "2023-10-30T14:11:45.763675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cl23TivZCzvk6S5di"]} -{"Format": "IDEA0", "ID": "78bd7233-c7c3-41e3-99e2-b11e151d7b2e", "DetectTime": "2023-10-30T14:11:45.788801+02:00", "EventTime": "2023-10-30T14:11:45.788813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CFQKzr14wuGYKaVwJ"]} -{"Format": "IDEA0", "ID": "64e33649-2141-4a16-a2b2-883026386b7a", "DetectTime": "2023-10-30T14:11:45.812202+02:00", "EventTime": "2023-10-30T14:11:45.812255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CMlqXJ20B6OXSxbAB1"]} -{"Format": "IDEA0", "ID": "9c5dd268-9581-4116-a192-81730f9afb06", "DetectTime": "2023-10-30T14:11:45.839301+02:00", "EventTime": "2023-10-30T14:11:45.839316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C9BRPf21owhNYqtT34"]} -{"Format": "IDEA0", "ID": "eeb31d19-304d-4383-8fcf-cceae1385e60", "DetectTime": "2023-10-30T14:11:45.864211+02:00", "EventTime": "2023-10-30T14:11:45.864222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cjyksd4EqdQ4C7fOe1"]} -{"Format": "IDEA0", "ID": "ae8470d4-7dfd-453e-908c-0f873c96eb98", "DetectTime": "2023-10-30T14:11:45.886287+02:00", "EventTime": "2023-10-30T14:11:45.886302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CLriQF1ACMSBIHpM82"]} -{"Format": "IDEA0", "ID": "67e588fe-519a-462d-95aa-aab3f63acc60", "DetectTime": "2023-10-30T14:11:45.911983+02:00", "EventTime": "2023-10-30T14:11:45.911995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C3ynph2DuEtbDQMZCj"]} -{"Format": "IDEA0", "ID": "cc50f78d-a49b-4582-9416-c2aa624ed900", "DetectTime": "2023-10-30T14:11:45.934548+02:00", "EventTime": "2023-10-30T14:11:45.934560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["ChjEgc1nqgjnKeRSxj"]} -{"Format": "IDEA0", "ID": "89766362-48ce-42b4-a9a2-22acc160a57e", "DetectTime": "2023-10-30T14:11:45.953369+02:00", "EventTime": "2023-10-30T14:11:45.953379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C20IEp3kzIuIejKPil"]} -{"Format": "IDEA0", "ID": "aec8d3d3-9b0c-474d-8652-fd909c1836d6", "DetectTime": "2023-10-30T14:11:45.972281+02:00", "EventTime": "2023-10-30T14:11:45.972299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CYdkYHO5z8btU99u4"]} -{"Format": "IDEA0", "ID": "802f13a2-be9f-4587-adb2-32bb59af735f", "DetectTime": "2023-10-30T14:11:45.991106+02:00", "EventTime": "2023-10-30T14:11:45.991122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CpfWTv2t22HcQozDec"]} -{"Format": "IDEA0", "ID": "49dea2f5-fcc4-49dd-8cb5-e7a50934d18b", "DetectTime": "2023-10-30T14:11:46.010366+02:00", "EventTime": "2023-10-30T14:11:46.010382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CswKSK2Cli87jAc6ph"]} -{"Format": "IDEA0", "ID": "431900f9-f18f-46bd-b4db-96ed1031d32b", "DetectTime": "2023-10-30T14:11:46.029215+02:00", "EventTime": "2023-10-30T14:11:46.029231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CrlnJz2vwxLmqExpeh"]} -{"Format": "IDEA0", "ID": "6cd4804c-8e6a-430f-a937-42f48ba87df7", "DetectTime": "2023-10-30T14:11:46.054455+02:00", "EventTime": "2023-10-30T14:11:46.054467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["Cx8HwR2iZwnVV5a6uh"]} -{"Format": "IDEA0", "ID": "ca73e7bf-0d71-4810-8fb8-5f96af491153", "DetectTime": "2023-10-30T14:11:46.070651+02:00", "EventTime": "2023-10-30T14:11:46.070662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CeC71c1u6Q7LgqQNl8"]} -{"Format": "IDEA0", "ID": "1dcac90b-03ad-4604-901c-9318e7194ae6", "DetectTime": "2023-10-30T14:11:46.086200+02:00", "EventTime": "2023-10-30T14:11:46.086212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CiLXbi1xG5m5PfoWZh"]} -{"Format": "IDEA0", "ID": "36938ecb-415c-4649-82f1-57c56ab29a4b", "DetectTime": "2023-10-30T14:11:46.103450+02:00", "EventTime": "2023-10-30T14:11:46.103460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CbhCzD2mOXNUlcXY5"]} -{"Format": "IDEA0", "ID": "169c8ea9-02ca-4028-9c24-1fe10ffd796e", "DetectTime": "2023-10-30T14:11:46.120757+02:00", "EventTime": "2023-10-30T14:11:46.120767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CvdAuL14XR6eWr4bP8"]} -{"Format": "IDEA0", "ID": "f8db0303-06eb-4a8b-82f5-eefb7aabc5c8", "DetectTime": "2023-10-30T14:11:46.138765+02:00", "EventTime": "2023-10-30T14:11:46.138776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CDusx72h8leMLMgYi3"]} -{"Format": "IDEA0", "ID": "ba50c35e-b56e-4849-8858-869d59f8d3fb", "DetectTime": "2023-10-30T14:11:46.157089+02:00", "EventTime": "2023-10-30T14:11:46.157100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CshjK22syaHVtqRUtg"]} -{"Format": "IDEA0", "ID": "a32b16ab-e2fd-4f05-a398-d78d594e1ca4", "DetectTime": "2023-10-30T14:11:46.173550+02:00", "EventTime": "2023-10-30T14:11:46.173570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBR0y21qLq1HbGH8m1"]} -{"Format": "IDEA0", "ID": "ec88c12b-d3af-455e-946d-aaaf95a4359f", "DetectTime": "2023-10-30T14:11:46.191981+02:00", "EventTime": "2023-10-30T14:11:46.191993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CzBUVI39dgUjkf33pc"]} -{"Format": "IDEA0", "ID": "7eda78f7-11d1-4975-bcc5-aa01edd3ccf9", "DetectTime": "2023-10-30T14:11:46.207916+02:00", "EventTime": "2023-10-30T14:11:46.207926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLPYfi4BBTeP225651"]} -{"Format": "IDEA0", "ID": "b5e45c67-f21e-407c-a239-87ae1be4abcd", "DetectTime": "2023-10-30T14:11:46.222118+02:00", "EventTime": "2023-10-30T14:11:46.222128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C89sp74u7jEPE2T4n3"]} -{"Format": "IDEA0", "ID": "5d347c30-910d-4fe6-92c6-4ddda58529df", "DetectTime": "2023-10-30T14:11:46.236363+02:00", "EventTime": "2023-10-30T14:11:46.236374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CumU8jEZpT41zYTo1"]} -{"Format": "IDEA0", "ID": "5355729f-a905-427d-b736-e9f252c26703", "DetectTime": "2023-10-30T14:11:46.250771+02:00", "EventTime": "2023-10-30T14:11:46.250802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CcUfet30xXZt47Mmp2"]} -{"Format": "IDEA0", "ID": "eaa72445-d586-4893-b6da-f12f43c1de02", "DetectTime": "2023-10-30T14:11:46.267787+02:00", "EventTime": "2023-10-30T14:11:46.267798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CljsuZ3flF1ed4lkXc"]} -{"Format": "IDEA0", "ID": "2d11aa95-8e99-48c5-804f-43676acb1791", "DetectTime": "2023-10-30T14:11:46.283136+02:00", "EventTime": "2023-10-30T14:11:46.283146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ChMcg61Lv1RUlX2Wn9"]} -{"Format": "IDEA0", "ID": "84805e16-c5d6-43ea-bf20-6819a22e1d40", "DetectTime": "2023-10-30T14:11:46.298966+02:00", "EventTime": "2023-10-30T14:11:46.298983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cl35um4Sr2X4U9VfA9"]} -{"Format": "IDEA0", "ID": "0b61c333-cc76-4457-b197-628ab31bac61", "DetectTime": "2023-10-30T14:11:46.315021+02:00", "EventTime": "2023-10-30T14:11:46.315033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CgiKim2YMM2KsPHsx8"]} -{"Format": "IDEA0", "ID": "9a8aaa02-2325-4d00-a379-7770a4bae518", "DetectTime": "2023-10-30T14:11:46.334086+02:00", "EventTime": "2023-10-30T14:11:46.334101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cyn1J62c4yfEcVuFAd"]} -{"Format": "IDEA0", "ID": "20f98a21-6370-45dc-9188-988ad79762af", "DetectTime": "2023-10-30T14:11:46.352463+02:00", "EventTime": "2023-10-30T14:11:46.352475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CUkCUs496qkeWVKsrf"]} -{"Format": "IDEA0", "ID": "d5269e5e-5cf9-4ea8-b428-47ec5fc91efe", "DetectTime": "2023-10-30T14:11:46.383290+02:00", "EventTime": "2023-10-30T14:11:46.383302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CsrrW32imufey8iET7"]} -{"Format": "IDEA0", "ID": "cb88b489-a767-45d2-a745-6a3c48c056e5", "DetectTime": "2023-10-30T14:11:46.401177+02:00", "EventTime": "2023-10-30T14:11:46.401193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CifD3i4Tf1GtOaos2f"]} -{"Format": "IDEA0", "ID": "7de697c0-78e4-494a-be49-1769867ba143", "DetectTime": "2023-10-30T14:11:46.419333+02:00", "EventTime": "2023-10-30T14:11:46.419344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CCVbP3Y0CzlR5kj2i"]} -{"Format": "IDEA0", "ID": "752abb88-949c-47e3-a9fd-50bd5cc78782", "DetectTime": "2023-10-30T14:11:46.435466+02:00", "EventTime": "2023-10-30T14:11:46.435482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CW0QlG4MM0W2i37T06"]} -{"Format": "IDEA0", "ID": "36881bbe-3ce2-4498-b4c8-2cf992c7a08a", "DetectTime": "2023-10-30T14:11:46.450356+02:00", "EventTime": "2023-10-30T14:11:46.450367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1RJnU1dW4Nt0J76Pc"]} -{"Format": "IDEA0", "ID": "1b217f2e-a9aa-4b97-abc3-a67bcf991098", "DetectTime": "2023-10-30T14:11:46.465054+02:00", "EventTime": "2023-10-30T14:11:46.465071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["COLyyg2AYfkoOpez9l"]} -{"Format": "IDEA0", "ID": "ba3aff49-f8c8-49d3-91d6-9014791c9736", "DetectTime": "2023-10-30T14:11:46.482220+02:00", "EventTime": "2023-10-30T14:11:46.482237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C6Z8l81o8xD6h2MKX7"]} -{"Format": "IDEA0", "ID": "b4d35648-f1a5-440e-9827-02449deec97b", "DetectTime": "2023-10-30T14:11:46.502508+02:00", "EventTime": "2023-10-30T14:11:46.502524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CzX0G84c6AiSyaRzh3"]} -{"Format": "IDEA0", "ID": "89f35c11-916f-49a8-ac4e-cd1008f7baa9", "DetectTime": "2023-10-30T14:11:46.519698+02:00", "EventTime": "2023-10-30T14:11:46.519714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CazdNR1E5ICVYEhqgc"]} -{"Format": "IDEA0", "ID": "e1529a86-bc21-4c64-b2aa-cfa3fc6df799", "DetectTime": "2023-10-30T14:11:46.535523+02:00", "EventTime": "2023-10-30T14:11:46.535534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CfFTXc2ianYmnKfVq3"]} -{"Format": "IDEA0", "ID": "0184527c-1faf-4027-b4f1-f0443430701d", "DetectTime": "2023-10-30T14:11:46.549863+02:00", "EventTime": "2023-10-30T14:11:46.549882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CxG2L331WviKvJiVY5"]} -{"Format": "IDEA0", "ID": "7dd77c10-7048-4eb9-bdd5-016bb8c6fb6f", "DetectTime": "2023-10-30T14:11:46.565510+02:00", "EventTime": "2023-10-30T14:11:46.565523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CiTY3r26DklGDBX7ol"]} -{"Format": "IDEA0", "ID": "d2fef1eb-a491-43d5-870d-2c8c4bbbd10e", "DetectTime": "2023-10-30T14:11:46.581307+02:00", "EventTime": "2023-10-30T14:11:46.581321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CJ0dcz2UxlJJ6AFCS9"]} -{"Format": "IDEA0", "ID": "2caab6dc-905b-42fc-8f7b-5c600e8ce7cc", "DetectTime": "2023-10-30T14:11:46.599327+02:00", "EventTime": "2023-10-30T14:11:46.599344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CgTwvcc1jp7PiPLif"]} -{"Format": "IDEA0", "ID": "0f567e81-300a-4184-9a88-5d585e273c93", "DetectTime": "2023-10-30T14:11:46.616209+02:00", "EventTime": "2023-10-30T14:11:46.616221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["ChIEC33VO1U17eHHB"]} -{"Format": "Json", "ID": "0f567e81-300a-4184-9a88-5d585e273c93", "DetectTime": "2023-10-30T14:11:46.616209+02:00", "EventTime": "2023-10-30T14:11:46.616221+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:35:51.212900+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:46.676488)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "feda2f03-3ba4-495e-ba46-1098ee983edc", "DetectTime": "2023-10-30T14:11:46.681692+02:00", "EventTime": "2023-10-30T14:11:46.681707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C7ouk5oV5yTWDebva"]} -{"Format": "IDEA0", "ID": "6b5168b6-d2f0-4dfa-bbbf-c0b8fc21436c", "DetectTime": "2023-10-30T14:11:46.701092+02:00", "EventTime": "2023-10-30T14:11:46.701108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CzDnvs4YAQk6lRg3te"]} -{"Format": "IDEA0", "ID": "fad4016e-ef49-4673-aa50-ba069babcb5c", "DetectTime": "2023-10-30T14:11:46.720093+02:00", "EventTime": "2023-10-30T14:11:46.720108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["ChDOG64tz47RUxtGO5"]} -{"Format": "IDEA0", "ID": "80e34d00-318e-47eb-aa60-ea93fdbc0ef9", "DetectTime": "2023-10-30T14:11:46.735399+02:00", "EventTime": "2023-10-30T14:11:46.735410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CxJWml1LhzpVDHSGxc"]} -{"Format": "IDEA0", "ID": "cd0d30e9-c162-4251-8b6e-9103774137c0", "DetectTime": "2023-10-30T14:11:46.755572+02:00", "EventTime": "2023-10-30T14:11:46.755588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C7ASoE2C9EuRKWHZF3"]} -{"Format": "IDEA0", "ID": "609d9dd7-5b9c-431d-a6fc-7e87af3200e4", "DetectTime": "2023-10-30T14:11:46.770177+02:00", "EventTime": "2023-10-30T14:11:46.770187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CIXtsVi4ngsLpxEef"]} -{"Format": "IDEA0", "ID": "29e3cd1f-272f-40dd-894e-5ce2105eca48", "DetectTime": "2023-10-30T14:11:46.785591+02:00", "EventTime": "2023-10-30T14:11:46.785607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CHs8LQPkd9UF9rWYd"]} -{"Format": "IDEA0", "ID": "cbedc4cd-81ec-4dea-a7de-343b57135281", "DetectTime": "2023-10-30T14:11:46.804811+02:00", "EventTime": "2023-10-30T14:11:46.804827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C5Ri4V3wXSH0UB7cj"]} -{"Format": "IDEA0", "ID": "2432c4a4-1fcd-4d2d-9ce5-9d93b4640d78", "DetectTime": "2023-10-30T14:11:46.823088+02:00", "EventTime": "2023-10-30T14:11:46.823103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CGISJE2q9d22U0CFra"]} -{"Format": "IDEA0", "ID": "43111528-6d6b-49d9-a685-bdcc9e5e5dd8", "DetectTime": "2023-10-30T14:11:46.843717+02:00", "EventTime": "2023-10-30T14:11:46.843733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ctmpad3Gzi5Fuo5AHd"]} -{"Format": "IDEA0", "ID": "e153314f-d11a-4ded-9029-6abf7a51e4f4", "DetectTime": "2023-10-30T14:11:46.864147+02:00", "EventTime": "2023-10-30T14:11:46.864162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CaeiwX3AKZme9UeuR6"]} -{"Format": "IDEA0", "ID": "53641345-17d7-43fd-a39f-5388f5421a9d", "DetectTime": "2023-10-30T14:11:46.884407+02:00", "EventTime": "2023-10-30T14:11:46.884422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CLq7wr4DsiYRcfL4u4"]} -{"Format": "IDEA0", "ID": "c2397021-7da7-46b3-a80c-3a2773ce3afa", "DetectTime": "2023-10-30T14:11:46.904708+02:00", "EventTime": "2023-10-30T14:11:46.904723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C9A2trUgGVN8zGL2a"]} -{"Format": "IDEA0", "ID": "2288d168-f7a8-42ac-8999-3942b1822d66", "DetectTime": "2023-10-30T14:11:46.923164+02:00", "EventTime": "2023-10-30T14:11:46.923180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C1XKYDWvJ3x7J7xVg"]} -{"Format": "IDEA0", "ID": "4306b5ba-0885-4115-826e-4034c06949a5", "DetectTime": "2023-10-30T14:11:46.941625+02:00", "EventTime": "2023-10-30T14:11:46.941636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CI2ZuL1UdAJGc5GFj4"]} -{"Format": "IDEA0", "ID": "f6c80537-b8e9-4a08-b36d-3f88125da7d1", "DetectTime": "2023-10-30T14:11:46.957335+02:00", "EventTime": "2023-10-30T14:11:46.957353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C7Cabu3hE9qw8oHgth"]} -{"Format": "IDEA0", "ID": "749f7e33-4009-481c-afda-7d9c2fc9e81d", "DetectTime": "2023-10-30T14:11:46.981956+02:00", "EventTime": "2023-10-30T14:11:46.981973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CI31MK2EmDcYEb3MK"]} -{"Format": "IDEA0", "ID": "678f50fd-36a1-4457-b6e4-cc151da8ca46", "DetectTime": "2023-10-30T14:11:47.000048+02:00", "EventTime": "2023-10-30T14:11:47.000061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cc8QOZ2HMd6k13b7k2"]} -{"Format": "IDEA0", "ID": "c0d2e7e7-93e5-4d5d-b7e1-f323695711e9", "DetectTime": "2023-10-30T14:11:47.013930+02:00", "EventTime": "2023-10-30T14:11:47.013946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Ccbyaq2wu6Fahbouf8"]} -{"Format": "IDEA0", "ID": "25797320-f7bc-406b-ba5b-d0c45a3816d4", "DetectTime": "2023-10-30T14:11:47.029621+02:00", "EventTime": "2023-10-30T14:11:47.029632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CH1pdw3tLfw8DguNuj"]} -{"Format": "IDEA0", "ID": "a4a0bc23-d039-4657-aa2f-eda40f3c51a0", "DetectTime": "2023-10-30T14:11:47.045902+02:00", "EventTime": "2023-10-30T14:11:47.045912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZYjuf4BXa7FS0gSl4"]} -{"Format": "IDEA0", "ID": "0e158dd9-e292-46dd-9c98-bf914f51e17e", "DetectTime": "2023-10-30T14:11:47.063299+02:00", "EventTime": "2023-10-30T14:11:47.063311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["Cp608b0HayNLSAITa"]} -{"Format": "IDEA0", "ID": "714d7677-b0e4-4199-ab2d-787e1a5b990a", "DetectTime": "2023-10-30T14:11:47.080477+02:00", "EventTime": "2023-10-30T14:11:47.080488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CAHJhS3g7m7O6uixs"]} -{"Format": "IDEA0", "ID": "28d6d470-dc60-4d31-a0a8-dff392dc1690", "DetectTime": "2023-10-30T14:11:47.096412+02:00", "EventTime": "2023-10-30T14:11:47.096428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CR9DcP3KKBhUndcwt7"]} -{"Format": "IDEA0", "ID": "dd872ecb-8735-4cb2-a7b0-7840f48d618a", "DetectTime": "2023-10-30T14:11:47.115656+02:00", "EventTime": "2023-10-30T14:11:47.115671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CODV2bPDV9l26q3nd"]} -{"Format": "IDEA0", "ID": "32a15031-d33b-45d6-8b59-a1723a2ba18d", "DetectTime": "2023-10-30T14:11:47.135403+02:00", "EventTime": "2023-10-30T14:11:47.135419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5LVmO35CUSVwTeLi"]} -{"Format": "IDEA0", "ID": "48d9257a-3ee1-4ee2-8771-2ca7899cf433", "DetectTime": "2023-10-30T14:11:47.156120+02:00", "EventTime": "2023-10-30T14:11:47.156135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cp4604yw0jNOuXena"]} -{"Format": "IDEA0", "ID": "80524046-620c-49cf-98bf-a69adf54c672", "DetectTime": "2023-10-30T14:11:47.173202+02:00", "EventTime": "2023-10-30T14:11:47.173219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CyGiqf1H7yAkOKcc6d"]} -{"Format": "IDEA0", "ID": "5310cc6d-1a49-40e2-9bc4-93cc2a857dfd", "DetectTime": "2023-10-30T14:11:47.188518+02:00", "EventTime": "2023-10-30T14:11:47.188530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CuZ1z6fTXSC3aoP7"]} -{"Format": "IDEA0", "ID": "89ee2e55-b01b-4c10-9aff-803d4fbc311c", "DetectTime": "2023-10-30T14:11:47.203228+02:00", "EventTime": "2023-10-30T14:11:47.203249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Cu2VsF1H6uEWSbCDQh"]} -{"Format": "IDEA0", "ID": "9510be4b-e616-49d8-9226-b5fdc3527073", "DetectTime": "2023-10-30T14:11:47.217474+02:00", "EventTime": "2023-10-30T14:11:47.217484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cp6UIb23mEyxmNf9i4"]} -{"Format": "IDEA0", "ID": "303323e2-ff0d-4ade-b3a4-47df4f9956c6", "DetectTime": "2023-10-30T14:11:47.236599+02:00", "EventTime": "2023-10-30T14:11:47.236609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CtQX1c2hcRmS1lYj5a"]} -{"Format": "IDEA0", "ID": "42b88940-2532-4dbd-bbfc-21bffa1685b6", "DetectTime": "2023-10-30T14:11:47.251770+02:00", "EventTime": "2023-10-30T14:11:47.251786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C2p2Qs2I0PhIQpMUea"]} -{"Format": "IDEA0", "ID": "a43dcc4a-fec3-4ccd-a578-d09bf89f8131", "DetectTime": "2023-10-30T14:11:47.273093+02:00", "EventTime": "2023-10-30T14:11:47.273105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CaUMLl1XdJZGANx4z2"]} -{"Format": "IDEA0", "ID": "df305615-e25b-4045-8abb-1be2e277763c", "DetectTime": "2023-10-30T14:11:47.291792+02:00", "EventTime": "2023-10-30T14:11:47.291808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C6BwEindEAq1KWXV2"]} -{"Format": "IDEA0", "ID": "2d3dbfec-6938-4b57-bd2d-657f371ffffe", "DetectTime": "2023-10-30T14:11:47.308025+02:00", "EventTime": "2023-10-30T14:11:47.308036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNCBNa1MhnMaltJGnl"]} -{"Format": "IDEA0", "ID": "e477f2b3-ab17-4c16-bd58-1ec81ce4471a", "DetectTime": "2023-10-30T14:11:47.328320+02:00", "EventTime": "2023-10-30T14:11:47.328335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CMw3a53RPM4oozjQY6"]} -{"Format": "IDEA0", "ID": "ba5b0138-1c82-4437-a131-9adea735582f", "DetectTime": "2023-10-30T14:11:47.349272+02:00", "EventTime": "2023-10-30T14:11:47.349286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CqexVN2IzTkr7q7cD2"]} -{"Format": "IDEA0", "ID": "0bab8ddb-d692-4110-8607-d79006fa96cc", "DetectTime": "2023-10-30T14:11:47.369788+02:00", "EventTime": "2023-10-30T14:11:47.369803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C9PAjj1ERV0kIySag6"]} -{"Format": "IDEA0", "ID": "cd7214f0-6e18-4aa8-9e82-25a8b88f4b33", "DetectTime": "2023-10-30T14:11:47.390747+02:00", "EventTime": "2023-10-30T14:11:47.390762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CW0lZ84CJqJPXInIQe"]} -{"Format": "IDEA0", "ID": "4d4e273e-513d-44f6-8327-43baf39d31d9", "DetectTime": "2023-10-30T14:11:47.411860+02:00", "EventTime": "2023-10-30T14:11:47.411888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CQMa7w1HLFXZZrZI1j"]} -{"Format": "IDEA0", "ID": "ed0f2755-1367-4f3e-91e5-7d18f6fd649f", "DetectTime": "2023-10-30T14:11:47.432467+02:00", "EventTime": "2023-10-30T14:11:47.432483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CgdwHb1b2S4UNBESa7"]} -{"Format": "IDEA0", "ID": "f684e7f9-e6c1-4a38-bad8-fb561c996c8d", "DetectTime": "2023-10-30T14:11:47.451699+02:00", "EventTime": "2023-10-30T14:11:47.451710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C9wH6c3LW8kcfpr9Q8"]} -{"Format": "IDEA0", "ID": "1187879a-31d9-4dab-84a5-2a53b389c69d", "DetectTime": "2023-10-30T14:11:47.467256+02:00", "EventTime": "2023-10-30T14:11:47.467267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CPNIWP2fku0FKIklWl"]} -{"Format": "IDEA0", "ID": "eeef224c-480e-452c-b250-1ae74e586f51", "DetectTime": "2023-10-30T14:11:47.482343+02:00", "EventTime": "2023-10-30T14:11:47.482359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CrhQRP1vDRLXYwfjx5"]} -{"Format": "IDEA0", "ID": "d1a3ae1d-e78c-47d2-bd4a-81ef2024f420", "DetectTime": "2023-10-30T14:11:47.499359+02:00", "EventTime": "2023-10-30T14:11:47.499384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C4aAEX3wlQXLn28Ny2"]} -{"Format": "IDEA0", "ID": "aa2ae7e1-ffbe-45b9-8bd4-c458d595659a", "DetectTime": "2023-10-30T14:11:47.517540+02:00", "EventTime": "2023-10-30T14:11:47.517553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CxIAyj2FfQ2KPzuslf"]} -{"Format": "IDEA0", "ID": "274f49b4-2ff5-49a9-87dc-6242b2d0a86b", "DetectTime": "2023-10-30T14:11:47.535487+02:00", "EventTime": "2023-10-30T14:11:47.535498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CRXo23z7YbKvH7x3"]} -{"Format": "IDEA0", "ID": "5a905a74-96b2-40fd-b9d9-56ce6b36f263", "DetectTime": "2023-10-30T14:11:47.555792+02:00", "EventTime": "2023-10-30T14:11:47.555804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CCN2wa28qbTzyQpt3l"]} -{"Format": "IDEA0", "ID": "3a5c447e-4e56-4465-9ca7-be831e1bd56d", "DetectTime": "2023-10-30T14:11:47.571341+02:00", "EventTime": "2023-10-30T14:11:47.571358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CoDqH644zD0ZKl41Zj"]} -{"Format": "IDEA0", "ID": "8e810f09-d6ab-48cd-985b-9e1b855d56a1", "DetectTime": "2023-10-30T14:11:47.588871+02:00", "EventTime": "2023-10-30T14:11:47.588881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CCmHwJY72sSxnDn54"]} -{"Format": "IDEA0", "ID": "6de21e5c-7a8a-4d46-b658-5fa8e489dce8", "DetectTime": "2023-10-30T14:11:47.602592+02:00", "EventTime": "2023-10-30T14:11:47.602606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CPWUcvUgi0agQzqga"]} -{"Format": "IDEA0", "ID": "00936fa5-d926-4dbc-a0bf-adc675440fb5", "DetectTime": "2023-10-30T14:11:47.617271+02:00", "EventTime": "2023-10-30T14:11:47.617282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CwbsaD3IamzLyCUFk4"]} -{"Format": "IDEA0", "ID": "38ddd368-cbf7-46f7-8023-0c8189884e1c", "DetectTime": "2023-10-30T14:11:47.631927+02:00", "EventTime": "2023-10-30T14:11:47.631937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CAESdm2vWuzlh5Owe4"]} -{"Format": "IDEA0", "ID": "1688e7b6-0d0f-4e7c-97c8-08cc9558814f", "DetectTime": "2023-10-30T14:11:47.651754+02:00", "EventTime": "2023-10-30T14:11:47.651764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CUUZo62nkzxqlCUBh5"]} -{"Format": "IDEA0", "ID": "ce65526b-d183-4a56-bfb5-5a42a12ee0e4", "DetectTime": "2023-10-30T14:11:47.672322+02:00", "EventTime": "2023-10-30T14:11:47.672339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CRBq1Y2DN9jF1RhZ1f"]} -{"Format": "IDEA0", "ID": "e7da6972-191b-4c05-af86-8cff9ef201f3", "DetectTime": "2023-10-30T14:11:47.688971+02:00", "EventTime": "2023-10-30T14:11:47.688981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C2ccF53elyaGNVbIhh"]} -{"Format": "IDEA0", "ID": "7cb11c5c-9fc1-4558-b45e-a1252be770a9", "DetectTime": "2023-10-30T14:11:47.706824+02:00", "EventTime": "2023-10-30T14:11:47.706836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C3Dkw61EHQYYDlJ4Q8"]} -{"Format": "IDEA0", "ID": "31ebdce9-9884-4042-a6ce-8a0ac12a824e", "DetectTime": "2023-10-30T14:11:47.722052+02:00", "EventTime": "2023-10-30T14:11:47.722067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["C7YrVg1wuegisxu3Ac"]} -{"Format": "IDEA0", "ID": "65dbcd3d-35b3-496f-8c08-7afa976e1c6a", "DetectTime": "2023-10-30T14:11:47.739271+02:00", "EventTime": "2023-10-30T14:11:47.739289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Ctx8wVyNGHSdCgzC"]} -{"Format": "IDEA0", "ID": "7da5e24f-76c4-4380-87de-e718b92698ba", "DetectTime": "2023-10-30T14:11:47.756032+02:00", "EventTime": "2023-10-30T14:11:47.756047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZhSLAMKRqsPrlZz6"]} -{"Format": "IDEA0", "ID": "dbcb3a20-fd50-4cf6-9102-0a777aed81fa", "DetectTime": "2023-10-30T14:11:47.779509+02:00", "EventTime": "2023-10-30T14:11:47.779525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CqmwPQQYwE9QENtef"]} -{"Format": "IDEA0", "ID": "92b39c57-e818-4d3a-8fdc-831650186a49", "DetectTime": "2023-10-30T14:11:47.795296+02:00", "EventTime": "2023-10-30T14:11:47.795313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CWAANb1KqbaS9MaXlf"]} -{"Format": "IDEA0", "ID": "d20abbc6-be2b-4034-a406-2739e5c5a5de", "DetectTime": "2023-10-30T14:11:47.815528+02:00", "EventTime": "2023-10-30T14:11:47.815541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CxA1UM3KhIdKMna4ic"]} -{"Format": "IDEA0", "ID": "7b8530ba-62bf-4e11-baa3-8bdf433878b0", "DetectTime": "2023-10-30T14:11:47.832667+02:00", "EventTime": "2023-10-30T14:11:47.832678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CApzAo4UBEOcIPjlY5"]} -{"Format": "IDEA0", "ID": "3001f127-3f83-4c49-b06f-f0e9a11323f2", "DetectTime": "2023-10-30T14:11:47.850446+02:00", "EventTime": "2023-10-30T14:11:47.850463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CfH9zD3mU3K7SGxQ8k"]} -{"Format": "IDEA0", "ID": "a8a6cdde-8ed3-45ad-8e14-fed25acff9be", "DetectTime": "2023-10-30T14:11:47.871401+02:00", "EventTime": "2023-10-30T14:11:47.871418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C2Fg1x3WEKqtbXYiF7"]} -{"Format": "IDEA0", "ID": "a886b915-2594-4992-a17c-37323f8839d9", "DetectTime": "2023-10-30T14:11:47.892431+02:00", "EventTime": "2023-10-30T14:11:47.892447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CfIj8b3vxGX2VTd8Me"]} -{"Format": "IDEA0", "ID": "633a7ce1-6c4f-4e3c-9dfd-f9f94d72ff08", "DetectTime": "2023-10-30T14:11:47.913707+02:00", "EventTime": "2023-10-30T14:11:47.913721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUXEv4pp9NVr6YtP6"]} -{"Format": "IDEA0", "ID": "0839a062-e3cb-4be4-aead-389bbda5e1c1", "DetectTime": "2023-10-30T14:11:47.933695+02:00", "EventTime": "2023-10-30T14:11:47.933712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CElHVr3fHErRvc6Jqj"]} -{"Format": "IDEA0", "ID": "b1670c63-1e43-4384-96b6-0a110837d4bd", "DetectTime": "2023-10-30T14:11:47.948985+02:00", "EventTime": "2023-10-30T14:11:47.948997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C9UnKJ3ZRSHD0HkpBf"]} -{"Format": "IDEA0", "ID": "3caa41b8-f295-4527-b04a-c7b552b26af6", "DetectTime": "2023-10-30T14:11:47.968235+02:00", "EventTime": "2023-10-30T14:11:47.968251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CX1CcfQeoqLenUNn1"]} -{"Format": "IDEA0", "ID": "240f6824-24cf-485e-ab24-f38ebc8f1444", "DetectTime": "2023-10-30T14:11:47.993728+02:00", "EventTime": "2023-10-30T14:11:47.993744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ca40hc4EE4kp2N6Qb8"]} -{"Format": "IDEA0", "ID": "9c16fd45-5ad4-4c2c-bde1-cbf11aaca7bf", "DetectTime": "2023-10-30T14:11:48.014603+02:00", "EventTime": "2023-10-30T14:11:48.014619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9yFZFLGFhVEXAa7d"]} -{"Format": "IDEA0", "ID": "7b34079f-42ef-4294-8929-a1e30c696cf4", "DetectTime": "2023-10-30T14:11:48.033252+02:00", "EventTime": "2023-10-30T14:11:48.033264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CWoHIhsVaCfqe49ph"]} -{"Format": "IDEA0", "ID": "a5a64f77-d1d8-425e-ba3e-73b262e02b61", "DetectTime": "2023-10-30T14:11:48.048827+02:00", "EventTime": "2023-10-30T14:11:48.048839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVfp5P1mY9bS6VoOXh"]} -{"Format": "IDEA0", "ID": "24683f51-dcef-4158-a8b9-cfa608731e5b", "DetectTime": "2023-10-30T14:11:48.064890+02:00", "EventTime": "2023-10-30T14:11:48.064905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CIXjmk28Z5pAIKqWC6"]} -{"Format": "IDEA0", "ID": "a08d7924-736b-4f7e-bf60-340e7ce7f25d", "DetectTime": "2023-10-30T14:11:48.083414+02:00", "EventTime": "2023-10-30T14:11:48.083430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CrYUZD4WrRBluuNe4"]} -{"Format": "IDEA0", "ID": "8cf7811b-67c5-4b1e-8452-e1d71df1e579", "DetectTime": "2023-10-30T14:11:48.103037+02:00", "EventTime": "2023-10-30T14:11:48.103053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CQy4ZpZ2yVHpXGRz9"]} -{"Format": "IDEA0", "ID": "cbe1ae9f-198f-4aac-a864-fbb97ed49799", "DetectTime": "2023-10-30T14:11:48.120132+02:00", "EventTime": "2023-10-30T14:11:48.120143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CYTl2B49qjbnGpkPd7"]} -{"Format": "IDEA0", "ID": "dfdb4cea-59f6-496a-9591-ade5d65c30ae", "DetectTime": "2023-10-30T14:11:48.135915+02:00", "EventTime": "2023-10-30T14:11:48.135931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CkHogzFhsqGfRsJ5"]} -{"Format": "IDEA0", "ID": "1d0a573d-712a-4434-8195-a73607027411", "DetectTime": "2023-10-30T14:11:48.152064+02:00", "EventTime": "2023-10-30T14:11:48.152075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CUdDxi4nYdDordLPt6"]} -{"Format": "IDEA0", "ID": "ae10452d-e8e1-4382-a0d2-8337757c2902", "DetectTime": "2023-10-30T14:11:48.168828+02:00", "EventTime": "2023-10-30T14:11:48.168844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CPRFgj3SUPS7Ojq3Zb"]} -{"Format": "IDEA0", "ID": "844a097a-f41b-4d81-9459-9b88d8ef9a81", "DetectTime": "2023-10-30T14:11:48.190088+02:00", "EventTime": "2023-10-30T14:11:48.190104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CM77fo122xDc0Hwzwb"]} -{"Format": "IDEA0", "ID": "d3d4b9a5-a692-48aa-a23b-c9a486878b9c", "DetectTime": "2023-10-30T14:11:48.209053+02:00", "EventTime": "2023-10-30T14:11:48.209064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cgs1sn21aen1KyTc2"]} -{"Format": "IDEA0", "ID": "6dfe3d8d-5eba-4208-83e1-362ff86c73b7", "DetectTime": "2023-10-30T14:11:48.224518+02:00", "EventTime": "2023-10-30T14:11:48.224529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CEYD084Wbdd9dpn9Cb"]} -{"Format": "IDEA0", "ID": "0ddf8b0c-77f8-40a9-90de-e4e07a88247d", "DetectTime": "2023-10-30T14:11:48.239544+02:00", "EventTime": "2023-10-30T14:11:48.239555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C9xAdy1Y87tbBih3ra"]} -{"Format": "IDEA0", "ID": "46861c65-fd91-4979-9124-e4d0995b34f1", "DetectTime": "2023-10-30T14:11:48.259445+02:00", "EventTime": "2023-10-30T14:11:48.259460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cxap1ZCSobNpJxEYf"]} -{"Format": "IDEA0", "ID": "ccbbf745-014a-4a0a-aa15-860a5e6a2f1e", "DetectTime": "2023-10-30T14:11:48.280486+02:00", "EventTime": "2023-10-30T14:11:48.280501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cbdxfk3RVAQeR7eAOg"]} -{"Format": "IDEA0", "ID": "f13d5029-7d2d-499a-9a11-017f4f2891dd", "DetectTime": "2023-10-30T14:11:48.296616+02:00", "EventTime": "2023-10-30T14:11:48.296633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CZNiy8C5nGx5ldyg1"]} -{"Format": "IDEA0", "ID": "366c9218-570e-4087-9b71-7a31d392d4b5", "DetectTime": "2023-10-30T14:11:48.311295+02:00", "EventTime": "2023-10-30T14:11:48.311306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cpaw5e4vC2ZyOIZxze"]} -{"Format": "IDEA0", "ID": "d6e16052-57f9-4faa-b373-089e12200bcc", "DetectTime": "2023-10-30T14:11:48.330248+02:00", "EventTime": "2023-10-30T14:11:48.330263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CzgFwn35T6kF5SbRCl"]} -{"Format": "IDEA0", "ID": "db954253-c21a-4560-91bd-9075ed4045e0", "DetectTime": "2023-10-30T14:11:48.348336+02:00", "EventTime": "2023-10-30T14:11:48.348351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CaYWUwzO9BgLaQCN7"]} -{"Format": "IDEA0", "ID": "1367c4cf-e516-40db-acfe-49a3f911d8b5", "DetectTime": "2023-10-30T14:11:48.363841+02:00", "EventTime": "2023-10-30T14:11:48.363853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1CR7d3TURj1Hbtd7h"]} -{"Format": "IDEA0", "ID": "dae3d206-95a9-4533-8f2c-dea254aee287", "DetectTime": "2023-10-30T14:11:48.379026+02:00", "EventTime": "2023-10-30T14:11:48.379044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CYreGJ3Zm360zmjwQ"]} -{"Format": "IDEA0", "ID": "39926576-eb67-43c7-8ce1-ade5b521857f", "DetectTime": "2023-10-30T14:11:48.397033+02:00", "EventTime": "2023-10-30T14:11:48.397049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CGWV8O6XFLQe6oiEc"]} -{"Format": "IDEA0", "ID": "420413b2-5967-41ff-8884-845479a37aaf", "DetectTime": "2023-10-30T14:11:48.414121+02:00", "EventTime": "2023-10-30T14:11:48.414147+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C37t0743Z7zeFjZLUg"]} -{"Format": "IDEA0", "ID": "b9420c3a-4a94-4b3b-82bb-5036410e6154", "DetectTime": "2023-10-30T14:11:48.434517+02:00", "EventTime": "2023-10-30T14:11:48.434530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C2TsG1Fxl6Kj235lc"]} -{"Format": "IDEA0", "ID": "1a345663-47c6-4ac1-87d6-712cd4146d26", "DetectTime": "2023-10-30T14:11:48.449397+02:00", "EventTime": "2023-10-30T14:11:48.449408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CmKLDACvR8ekACozb"]} -{"Format": "IDEA0", "ID": "b45721e6-6eac-4154-8fb5-ad5a4e37207d", "DetectTime": "2023-10-30T14:11:48.464735+02:00", "EventTime": "2023-10-30T14:11:48.464745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CNHouA4hANrI7GOdh1"]} -{"Format": "IDEA0", "ID": "39773be9-89c1-43b8-adc8-2d24da9f4b89", "DetectTime": "2023-10-30T14:11:48.479846+02:00", "EventTime": "2023-10-30T14:11:48.479857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CfnSRH31cIU3Wl98Ye"]} -{"Format": "IDEA0", "ID": "d5e5ea93-c1c8-4ac6-9cd1-da4f22afe4b8", "DetectTime": "2023-10-30T14:11:48.504415+02:00", "EventTime": "2023-10-30T14:11:48.504433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CXhsrb41A4PFz2Puk4"]} -{"Format": "IDEA0", "ID": "85c1465e-a4ad-4c57-a86c-fff1a18bb168", "DetectTime": "2023-10-30T14:11:48.523991+02:00", "EventTime": "2023-10-30T14:11:48.524008+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CnWHpnStBFSpmx1Sj"]} -{"Format": "IDEA0", "ID": "d1152c6e-6fc6-4db4-bbc0-7997e1daab87", "DetectTime": "2023-10-30T14:11:48.544051+02:00", "EventTime": "2023-10-30T14:11:48.544068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CmKxmN32UFSzQD8Nul"]} -{"Format": "IDEA0", "ID": "fd3bf35a-ab2e-425b-8c01-e1287039055c", "DetectTime": "2023-10-30T14:11:48.563533+02:00", "EventTime": "2023-10-30T14:11:48.563550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ch47Ye2GI2ndJIKlo5"]} -{"Format": "IDEA0", "ID": "72b00225-3282-41f9-bb88-4a153da58eca", "DetectTime": "2023-10-30T14:11:48.579325+02:00", "EventTime": "2023-10-30T14:11:48.579335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ch9MxE3G6mdTiEuJjj"]} -{"Format": "IDEA0", "ID": "949c4fed-f417-4f6b-b8d0-7d6883cf5d86", "DetectTime": "2023-10-30T14:11:48.596078+02:00", "EventTime": "2023-10-30T14:11:48.596094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C8tuC14hQzbTKptsL1"]} -{"Format": "IDEA0", "ID": "899be1d6-a35d-4f42-9dbc-bf8e08310ed8", "DetectTime": "2023-10-30T14:11:48.614233+02:00", "EventTime": "2023-10-30T14:11:48.614250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CBDgjt4pmlExGA0mz2"]} -{"Format": "IDEA0", "ID": "f57d1ffd-3db3-4511-8e54-2c3bda5d0da1", "DetectTime": "2023-10-30T14:11:48.633972+02:00", "EventTime": "2023-10-30T14:11:48.633987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CX03tMFkbXtkEg3Tf"]} -{"Format": "IDEA0", "ID": "a73913c9-3b3a-44fa-bc28-d46980ec1df7", "DetectTime": "2023-10-30T14:11:48.646806+02:00", "EventTime": "2023-10-30T14:11:48.646817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CmLTIK3U8suIYo3aA2"]} -{"Format": "IDEA0", "ID": "164ab2e9-5c93-4226-a157-528c6bf723a0", "DetectTime": "2023-10-30T14:11:48.666524+02:00", "EventTime": "2023-10-30T14:11:48.666542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CKxUZs11ysLmNx1Ek6"]} -{"Format": "IDEA0", "ID": "24aa9e31-377d-4774-a30b-2a12cd310a84", "DetectTime": "2023-10-30T14:11:48.680516+02:00", "EventTime": "2023-10-30T14:11:48.680529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CSGwY52MuhcZQ7o5el"]} -{"Format": "IDEA0", "ID": "3a01e467-1cb4-47d0-9879-88390fa2555c", "DetectTime": "2023-10-30T14:11:48.691932+02:00", "EventTime": "2023-10-30T14:11:48.691942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CRiJDL2Ek2eFXWLNz6"]} -{"Format": "IDEA0", "ID": "27640234-bd9a-44a3-bd26-a0a097629de0", "DetectTime": "2023-10-30T14:11:48.705183+02:00", "EventTime": "2023-10-30T14:11:48.705198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CW7Ue32vmxpM6tORIk"]} -{"Format": "IDEA0", "ID": "009c80f9-153e-4efd-a4db-f2e4aa27c5ab", "DetectTime": "2023-10-30T14:11:48.723538+02:00", "EventTime": "2023-10-30T14:11:48.723556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ci2ejWAhFJMSOhmM2"]} -{"Format": "IDEA0", "ID": "21b49484-2383-4286-80c5-3e3723e49411", "DetectTime": "2023-10-30T14:11:48.739780+02:00", "EventTime": "2023-10-30T14:11:48.739796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CBfCPL3BoBIqqPKZw4"]} -{"Format": "IDEA0", "ID": "083a52c0-cc49-4569-abf1-f5087eaacca8", "DetectTime": "2023-10-30T14:11:48.752912+02:00", "EventTime": "2023-10-30T14:11:48.752922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CZLBK74J7n3QkdCt7"]} -{"Format": "IDEA0", "ID": "08fe8def-3672-4d68-973b-fe0ca94ea3b4", "DetectTime": "2023-10-30T14:11:48.766131+02:00", "EventTime": "2023-10-30T14:11:48.766150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CjKy8A3NRkxPpuPjz9"]} -{"Format": "IDEA0", "ID": "fa18f555-177b-408b-85ce-1f35fa79be67", "DetectTime": "2023-10-30T14:11:48.777569+02:00", "EventTime": "2023-10-30T14:11:48.777580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CgwRrS2Il8UUPhQeb1"]} -{"Format": "IDEA0", "ID": "f964dde0-b29f-4480-b40f-ff97cb954dcb", "DetectTime": "2023-10-30T14:11:48.788349+02:00", "EventTime": "2023-10-30T14:11:48.788366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CqVjFe1RcpI0L3Jgn4"]} -{"Format": "IDEA0", "ID": "b934773c-c0d3-4817-b830-2d6f3ab4b8f6", "DetectTime": "2023-10-30T14:11:48.802274+02:00", "EventTime": "2023-10-30T14:11:48.802291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CHzMHW9YjHmS9Ltxa"]} -{"Format": "IDEA0", "ID": "8f5460a7-8dce-4e56-b967-1c1741805cf5", "DetectTime": "2023-10-30T14:11:48.816298+02:00", "EventTime": "2023-10-30T14:11:48.816308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CcCzQnFELMBR1XvHj"]} -{"Format": "IDEA0", "ID": "c4ab0b77-b9c7-44e6-9508-2a786825a7d0", "DetectTime": "2023-10-30T14:11:48.826629+02:00", "EventTime": "2023-10-30T14:11:48.826640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CC0ldn4CeO4KGwH8A2"]} -{"Format": "IDEA0", "ID": "8057d571-f75c-4987-b5a6-7545d70f38c2", "DetectTime": "2023-10-30T14:11:48.837288+02:00", "EventTime": "2023-10-30T14:11:48.837302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CQ32MqPNFJ8dTfnpf"]} -{"Format": "Json", "ID": "8057d571-f75c-4987-b5a6-7545d70f38c2", "DetectTime": "2023-10-30T14:11:48.837288+02:00", "EventTime": "2023-10-30T14:11:48.837302+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:35:53.068789+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:48.891961)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fff711f6-cb3d-41c9-bcf1-22f99948cd90", "DetectTime": "2023-10-30T14:11:48.896317+02:00", "EventTime": "2023-10-30T14:11:48.896329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["ClVrGu2KipYo15pPgj"]} -{"Format": "IDEA0", "ID": "b429705e-034f-422f-aa97-69e3a450cd9c", "DetectTime": "2023-10-30T14:11:48.907328+02:00", "EventTime": "2023-10-30T14:11:48.907340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C06VHcGjQ7AahMMDc"]} -{"Format": "IDEA0", "ID": "0913eb06-9d1b-46ca-b844-14a0b625b303", "DetectTime": "2023-10-30T14:11:48.921408+02:00", "EventTime": "2023-10-30T14:11:48.921419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CsJeEB46rsBP2H6pHa"]} -{"Format": "IDEA0", "ID": "3be95885-4277-4845-a05a-a4716df824b6", "DetectTime": "2023-10-30T14:11:48.934430+02:00", "EventTime": "2023-10-30T14:11:48.934446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CR0RkmltKYq9TSukj"]} -{"Format": "IDEA0", "ID": "973adccc-1f4d-4175-ae45-e5c06077f2e1", "DetectTime": "2023-10-30T14:11:48.950581+02:00", "EventTime": "2023-10-30T14:11:48.950596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CKhBBw2sNajc8mX4l4"]} -{"Format": "IDEA0", "ID": "202dd322-dba2-4799-83cb-a3faa063b2b3", "DetectTime": "2023-10-30T14:11:48.966196+02:00", "EventTime": "2023-10-30T14:11:48.966212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6xB093G8i8kJ1j5Qc"]} -{"Format": "IDEA0", "ID": "0006c403-d983-4aff-b950-9e922fe88313", "DetectTime": "2023-10-30T14:11:48.981756+02:00", "EventTime": "2023-10-30T14:11:48.981772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CxYR8k1hYtq3VRbbT3"]} -{"Format": "IDEA0", "ID": "92aba891-84c6-4a21-87b4-e431fb5e61b2", "DetectTime": "2023-10-30T14:11:48.996640+02:00", "EventTime": "2023-10-30T14:11:48.996656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C0KEjm28eZG47AiNrf"]} -{"Format": "IDEA0", "ID": "91b55216-e839-41be-bd3e-a135507ecd0e", "DetectTime": "2023-10-30T14:11:49.008452+02:00", "EventTime": "2023-10-30T14:11:49.008463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CQmlrD3faacRwULE7b"]} -{"Format": "IDEA0", "ID": "7e687d97-2c21-4a9c-9f96-c9838e63562c", "DetectTime": "2023-10-30T14:11:49.021263+02:00", "EventTime": "2023-10-30T14:11:49.021283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CD7Lgp4m0s87EH4f5b"]} -{"Format": "IDEA0", "ID": "b7ec7404-7fa5-4894-addc-5cdc627e0f35", "DetectTime": "2023-10-30T14:11:49.034680+02:00", "EventTime": "2023-10-30T14:11:49.034700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CTm1Y61dO4LDPOaDl7"]} -{"Format": "IDEA0", "ID": "d9d01c01-899b-4f0a-bd7f-048ba8747ea0", "DetectTime": "2023-10-30T14:11:49.044792+02:00", "EventTime": "2023-10-30T14:11:49.044803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkQFk64ANu5tGkGq09"]} -{"Format": "IDEA0", "ID": "3d4ecb1c-6356-49cd-84dd-8704526170ed", "DetectTime": "2023-10-30T14:11:49.057106+02:00", "EventTime": "2023-10-30T14:11:49.057117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ComBhl1kp6RoX3Ivga"]} -{"Format": "IDEA0", "ID": "c8dd0a3b-1314-4d55-98df-faedcfdf1fe4", "DetectTime": "2023-10-30T14:11:49.067465+02:00", "EventTime": "2023-10-30T14:11:49.067476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CbFm391LdZWT1CEQ24"]} -{"Format": "IDEA0", "ID": "dcc202a6-08f9-4a81-93f5-872fc3ce5faa", "DetectTime": "2023-10-30T14:11:49.079654+02:00", "EventTime": "2023-10-30T14:11:49.079666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CeMMTb3ZKdKhUZFeDc"]} -{"Format": "IDEA0", "ID": "d7fbf488-2808-4f44-94f3-3267704c5f77", "DetectTime": "2023-10-30T14:11:49.092472+02:00", "EventTime": "2023-10-30T14:11:49.092483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C98CaH2oXdHMEdizha"]} -{"Format": "IDEA0", "ID": "1f881363-5000-4d54-a8f6-3ee3c0683285", "DetectTime": "2023-10-30T14:11:49.104069+02:00", "EventTime": "2023-10-30T14:11:49.104083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXH3He2mR28bRKt8le"]} -{"Format": "IDEA0", "ID": "80042e43-3174-4ebc-b645-e1671927de4d", "DetectTime": "2023-10-30T14:11:49.129243+02:00", "EventTime": "2023-10-30T14:11:49.129255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CKFGbl1rapdXtCTWGi"]} -{"Format": "IDEA0", "ID": "ae0dbe87-727c-4c52-ba9b-0ae0b7caf7cb", "DetectTime": "2023-10-30T14:11:49.142666+02:00", "EventTime": "2023-10-30T14:11:49.142678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cv9qGx1M7C1t6FaNig"]} -{"Format": "IDEA0", "ID": "3b915048-f060-4fc0-9e0f-9e373aff58c9", "DetectTime": "2023-10-30T14:11:49.155250+02:00", "EventTime": "2023-10-30T14:11:49.155276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CP66c22TTihvGx0lY7"]} -{"Format": "IDEA0", "ID": "c62d2a14-3dbd-4d0b-bffb-4ae8e411cffe", "DetectTime": "2023-10-30T14:11:49.167993+02:00", "EventTime": "2023-10-30T14:11:49.168004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CP7Rqf2QbTtuhhYNR9"]} -{"Format": "IDEA0", "ID": "86b8c98a-9ea5-4a46-9a3f-5841d72c1228", "DetectTime": "2023-10-30T14:11:49.180349+02:00", "EventTime": "2023-10-30T14:11:49.180359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcrjbR3BIc9iMcODqc"]} -{"Format": "IDEA0", "ID": "e29ba39f-bbb9-4141-a4dc-3385ac782646", "DetectTime": "2023-10-30T14:11:49.193602+02:00", "EventTime": "2023-10-30T14:11:49.193615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CQQ1WF4JoqmGREPXl1"]} -{"Format": "IDEA0", "ID": "ba16088b-509d-4a1b-9f42-9f9196012b2c", "DetectTime": "2023-10-30T14:11:49.222004+02:00", "EventTime": "2023-10-30T14:11:49.222019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C1OlfY2QFKVPUmvLm"]} -{"Format": "IDEA0", "ID": "a78713a3-7ce7-40ae-a1cc-fbd1a3edda2f", "DetectTime": "2023-10-30T14:11:49.243402+02:00", "EventTime": "2023-10-30T14:11:49.243419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CEWjkW2Eg8XEIdPHT4"]} -{"Format": "IDEA0", "ID": "a28674b1-5db1-4432-8e4a-35e57307f5e8", "DetectTime": "2023-10-30T14:11:49.267970+02:00", "EventTime": "2023-10-30T14:11:49.267990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CuertL2WK09I4wd2Vg"]} -{"Format": "IDEA0", "ID": "7106c8c8-42f6-405d-8257-a3f2e8bf289e", "DetectTime": "2023-10-30T14:11:49.285988+02:00", "EventTime": "2023-10-30T14:11:49.286002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3EXqq3u4Wo7bkMib2"]} -{"Format": "IDEA0", "ID": "ed18b156-2957-4988-b2c1-79f463b26b3b", "DetectTime": "2023-10-30T14:11:49.303239+02:00", "EventTime": "2023-10-30T14:11:49.303255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CIb0XW8oMzEpPLtl8"]} -{"Format": "IDEA0", "ID": "6b6fa6d1-9c44-467d-8203-817f91d2809e", "DetectTime": "2023-10-30T14:11:49.322462+02:00", "EventTime": "2023-10-30T14:11:49.322475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CeiHgi2TYd4jg2miP7"]} -{"Format": "IDEA0", "ID": "d5a78ff0-9cf3-4622-819d-d2743e77d4f9", "DetectTime": "2023-10-30T14:11:49.339263+02:00", "EventTime": "2023-10-30T14:11:49.339281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CT6gwm3LF88hI2lDoj"]} -{"Format": "IDEA0", "ID": "00f3fe34-57e8-44a2-893f-5f6490b5b86f", "DetectTime": "2023-10-30T14:11:49.358504+02:00", "EventTime": "2023-10-30T14:11:49.358516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CMW7gj2l2OsVF7heE"]} -{"Format": "IDEA0", "ID": "48e7fb88-aafc-4a4f-a6c6-5784ac0fe632", "DetectTime": "2023-10-30T14:11:49.375504+02:00", "EventTime": "2023-10-30T14:11:49.375519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cmiwtv2vyq2ihv5zg1"]} -{"Format": "IDEA0", "ID": "c09e941a-2a8d-4ec8-b2d4-300c35e2d596", "DetectTime": "2023-10-30T14:11:49.392310+02:00", "EventTime": "2023-10-30T14:11:49.392321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cf6UABQODOwFRjQxf"]} -{"Format": "IDEA0", "ID": "4350a63f-a685-4d8f-85ed-5fe2eea839b8", "DetectTime": "2023-10-30T14:11:49.410034+02:00", "EventTime": "2023-10-30T14:11:49.410047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CAVOehpZAjwlQbPD5"]} -{"Format": "IDEA0", "ID": "3f5841ee-ba14-4efa-9df1-748e1bce747c", "DetectTime": "2023-10-30T14:11:49.424291+02:00", "EventTime": "2023-10-30T14:11:49.424302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C9Tuo019vxMfJWKFfh"]} -{"Format": "IDEA0", "ID": "2be57597-89d7-4487-884c-e4c9368b890b", "DetectTime": "2023-10-30T14:11:49.441756+02:00", "EventTime": "2023-10-30T14:11:49.441771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CaacQh25xOCO1LKGah"]} -{"Format": "IDEA0", "ID": "d17deb96-cd66-4479-8607-527e978db41f", "DetectTime": "2023-10-30T14:11:49.460430+02:00", "EventTime": "2023-10-30T14:11:49.460442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CPXSGu3jmaJHkhvEx4"]} -{"Format": "IDEA0", "ID": "60c314d0-73d6-4ca3-bbcc-04c2238118bc", "DetectTime": "2023-10-30T14:11:49.476189+02:00", "EventTime": "2023-10-30T14:11:49.476204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CX8W6e1eblvc9vx1e2"]} -{"Format": "IDEA0", "ID": "79f4cf59-9733-4966-9d12-52238a70755b", "DetectTime": "2023-10-30T14:11:49.494188+02:00", "EventTime": "2023-10-30T14:11:49.494204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CkqIAB2Q0iyYaRUKhj"]} -{"Format": "IDEA0", "ID": "97b97b5d-8c85-4c72-9334-78031202422c", "DetectTime": "2023-10-30T14:11:49.515903+02:00", "EventTime": "2023-10-30T14:11:49.515921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPcAvQrVvPq5uRm7d"]} -{"Format": "IDEA0", "ID": "31de93c0-c759-4a67-b997-7e38c3aef642", "DetectTime": "2023-10-30T14:11:49.536485+02:00", "EventTime": "2023-10-30T14:11:49.536500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CudTzJfGqHKKjmCkb"]} -{"Format": "IDEA0", "ID": "90f6dc49-56e7-431e-af10-5bc746f2f2cd", "DetectTime": "2023-10-30T14:11:49.557366+02:00", "EventTime": "2023-10-30T14:11:49.557383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CawGOB113mutDE6w7f"]} -{"Format": "IDEA0", "ID": "3d89047d-88c2-4c2d-83e4-72180b575006", "DetectTime": "2023-10-30T14:11:49.574594+02:00", "EventTime": "2023-10-30T14:11:49.574609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CDfZwK1J2LBo5NuUV"]} -{"Format": "IDEA0", "ID": "362c9d47-9b2e-42b2-aa2a-8805eb3f2136", "DetectTime": "2023-10-30T14:11:49.590068+02:00", "EventTime": "2023-10-30T14:11:49.590079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cpt8NQ1Tq8R8fpwdxd"]} -{"Format": "IDEA0", "ID": "427f26a0-e23b-48d1-8098-7018cca2bf65", "DetectTime": "2023-10-30T14:11:49.604764+02:00", "EventTime": "2023-10-30T14:11:49.604794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CJHnIu2c95GBabOrl8"]} -{"Format": "IDEA0", "ID": "638a1a59-b56c-4149-8eb3-5037a6336c50", "DetectTime": "2023-10-30T14:11:49.620673+02:00", "EventTime": "2023-10-30T14:11:49.620685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZfxyP2e3skY2QYxhe"]} -{"Format": "IDEA0", "ID": "3ed22ad4-11bb-4e09-a797-24b7aee78c38", "DetectTime": "2023-10-30T14:11:49.636433+02:00", "EventTime": "2023-10-30T14:11:49.636449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cy5khUx9STCcWA8u5"]} -{"Format": "IDEA0", "ID": "aba31ef1-1905-46ef-a604-90b44c889664", "DetectTime": "2023-10-30T14:11:49.653935+02:00", "EventTime": "2023-10-30T14:11:49.653946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7OKyf2FvaE8Vyz1j"]} -{"Format": "IDEA0", "ID": "18799aea-cdde-46e7-baa7-879f66d05cc9", "DetectTime": "2023-10-30T14:11:49.668606+02:00", "EventTime": "2023-10-30T14:11:49.668618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C8arMuMUNKyRglXLj"]} -{"Format": "IDEA0", "ID": "99b3b505-db90-42a6-92e6-d23e88feecbd", "DetectTime": "2023-10-30T14:11:49.684625+02:00", "EventTime": "2023-10-30T14:11:49.684637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CbrIfn4qRAfTesgTzb"]} -{"Format": "IDEA0", "ID": "cf82f324-5d79-4999-bb5a-a2affc2dcf08", "DetectTime": "2023-10-30T14:11:49.699812+02:00", "EventTime": "2023-10-30T14:11:49.699823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CBN3vb3u01oQMk80ai"]} -{"Format": "IDEA0", "ID": "d927314e-4f00-48a3-9320-c2586893fc0b", "DetectTime": "2023-10-30T14:11:49.720224+02:00", "EventTime": "2023-10-30T14:11:49.720236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CeH2Yq2M5Ke3svUgI6"]} -{"Format": "IDEA0", "ID": "2e48fb6a-8468-45cf-b835-be1d81bb2023", "DetectTime": "2023-10-30T14:11:49.740650+02:00", "EventTime": "2023-10-30T14:11:49.740662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cesn6Jvo8Soro2HIh"]} -{"Format": "IDEA0", "ID": "5ac85cd6-ecd5-428c-a5e5-a8b85d781e12", "DetectTime": "2023-10-30T14:11:49.757047+02:00", "EventTime": "2023-10-30T14:11:49.757059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ci3W131ZTNHaohN9ml"]} -{"Format": "IDEA0", "ID": "c79f68b1-f033-407b-aefc-c21770ea4c26", "DetectTime": "2023-10-30T14:11:49.774738+02:00", "EventTime": "2023-10-30T14:11:49.774749+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C8GYpm1hIuArEu43s6"]} -{"Format": "IDEA0", "ID": "c87e9ea7-11bd-4215-85ae-7458e32c7769", "DetectTime": "2023-10-30T14:11:49.791578+02:00", "EventTime": "2023-10-30T14:11:49.791590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CsWRd33L1PoKwn3M41"]} -{"Format": "IDEA0", "ID": "cbb3bf01-0988-47d0-99c7-f754c8582041", "DetectTime": "2023-10-30T14:11:49.806936+02:00", "EventTime": "2023-10-30T14:11:49.806947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ci9huW2B220BNwiTM7"]} -{"Format": "IDEA0", "ID": "fe3e2452-cebe-421e-94fe-651f5addc765", "DetectTime": "2023-10-30T14:11:49.827551+02:00", "EventTime": "2023-10-30T14:11:49.827566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CHrGk23YTV0QkQ1Oyb"]} -{"Format": "IDEA0", "ID": "6fec02c3-dfb2-40d0-9a92-660fe56dc5bd", "DetectTime": "2023-10-30T14:11:49.845803+02:00", "EventTime": "2023-10-30T14:11:49.845815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CWYypB3x0qtpo7w3N"]} -{"Format": "IDEA0", "ID": "8908cdf7-6d81-4ae9-b591-b6f3c21a0d79", "DetectTime": "2023-10-30T14:11:49.864787+02:00", "EventTime": "2023-10-30T14:11:49.864799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CXUrcl4YKH3K22ilLd"]} -{"Format": "IDEA0", "ID": "50cf46a4-60aa-4bde-a727-3552959bd1be", "DetectTime": "2023-10-30T14:11:49.885107+02:00", "EventTime": "2023-10-30T14:11:49.885123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CKUwJU1XUbtCgceee5"]} -{"Format": "IDEA0", "ID": "0f4579ff-14c9-4e74-8bc4-674d0435c53e", "DetectTime": "2023-10-30T14:11:49.906018+02:00", "EventTime": "2023-10-30T14:11:49.906034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C6vFAB1RwdCm1teSRi"]} -{"Format": "IDEA0", "ID": "fdbcd4b7-909f-4093-8ad5-6e8f122f2106", "DetectTime": "2023-10-30T14:11:49.926275+02:00", "EventTime": "2023-10-30T14:11:49.926287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C4TNmg1seSn3vdwVo1"]} -{"Format": "IDEA0", "ID": "49c61ecd-1216-4311-bfaf-b04da00f8c81", "DetectTime": "2023-10-30T14:11:49.944467+02:00", "EventTime": "2023-10-30T14:11:49.944482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMb2KD2WKjxNynLX22"]} -{"Format": "IDEA0", "ID": "3b1855c7-1886-4afd-9d23-e700304fa760", "DetectTime": "2023-10-30T14:11:49.964617+02:00", "EventTime": "2023-10-30T14:11:49.964632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMsOGZ2uHfDApXmDY8"]} -{"Format": "IDEA0", "ID": "be7035db-204e-4ade-b4da-4d3b93ea1d95", "DetectTime": "2023-10-30T14:11:49.985233+02:00", "EventTime": "2023-10-30T14:11:49.985248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVBf3p3UKYyvpittHi"]} -{"Format": "IDEA0", "ID": "4b4397b7-ca60-47a3-a44d-278c4c2dcc57", "DetectTime": "2023-10-30T14:11:50.004438+02:00", "EventTime": "2023-10-30T14:11:50.004450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CmC0eD4TQ7uXHzJcsa"]} -{"Format": "IDEA0", "ID": "d9350def-595c-4564-9c9f-4ebf9232a3c5", "DetectTime": "2023-10-30T14:11:50.019030+02:00", "EventTime": "2023-10-30T14:11:50.019042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CbLNEpCsOb65FTiC6"]} -{"Format": "IDEA0", "ID": "82ec977d-487a-4767-90a1-ac2875bc7249", "DetectTime": "2023-10-30T14:11:50.033999+02:00", "EventTime": "2023-10-30T14:11:50.034015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C9Dqp23cO2ab1hMEph"]} -{"Format": "IDEA0", "ID": "86995ca0-713a-4585-b3cb-d044d8ad0930", "DetectTime": "2023-10-30T14:11:50.049653+02:00", "EventTime": "2023-10-30T14:11:50.049670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CDXpPX11paku6zTcQb"]} -{"Format": "IDEA0", "ID": "8ee03974-1775-4a61-8c34-e683d40005c9", "DetectTime": "2023-10-30T14:11:50.072411+02:00", "EventTime": "2023-10-30T14:11:50.072429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CoLdCD5SujYsf5kfj"]} -{"Format": "IDEA0", "ID": "44eeadb7-ef07-45d6-94cd-c408841ef4d9", "DetectTime": "2023-10-30T14:11:50.088055+02:00", "EventTime": "2023-10-30T14:11:50.088069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CB42BJTgfpBCxOQM3"]} -{"Format": "IDEA0", "ID": "6f358432-3ce4-4cda-998b-d0767c3be771", "DetectTime": "2023-10-30T14:11:50.102662+02:00", "EventTime": "2023-10-30T14:11:50.102674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CK9K7b4QZu4XT0xcq4"]} -{"Format": "IDEA0", "ID": "e6b9850d-f781-4138-abb2-d84b8b603855", "DetectTime": "2023-10-30T14:11:50.117123+02:00", "EventTime": "2023-10-30T14:11:50.117138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cbhddk34T9LnFgnxPk"]} -{"Format": "IDEA0", "ID": "3e8defa5-e1d9-4dc1-937d-09f858ad885e", "DetectTime": "2023-10-30T14:11:50.136233+02:00", "EventTime": "2023-10-30T14:11:50.136249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CDMxps3EbRzSWjSk7j"]} -{"Format": "IDEA0", "ID": "002fb1bf-92a7-45a3-9ac0-ce3e75d53fff", "DetectTime": "2023-10-30T14:11:50.155705+02:00", "EventTime": "2023-10-30T14:11:50.155716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CiG1na21hQZ7BZduqg"]} -{"Format": "IDEA0", "ID": "cacdde1f-f2d6-4c1e-ad84-f3e6f118cf86", "DetectTime": "2023-10-30T14:11:50.172963+02:00", "EventTime": "2023-10-30T14:11:50.172974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["COPbbD3VgFPMKWfVWg"]} -{"Format": "IDEA0", "ID": "f4075ee7-3262-454a-a16d-6150597c37af", "DetectTime": "2023-10-30T14:11:50.192035+02:00", "EventTime": "2023-10-30T14:11:50.192053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CbS5p113PDzjnSW2O4"]} -{"Format": "IDEA0", "ID": "3e3fb542-eff4-47f6-bc31-fffb1240e308", "DetectTime": "2023-10-30T14:11:50.208907+02:00", "EventTime": "2023-10-30T14:11:50.208918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CPbEkQ2lE7GFZDZRpj"]} -{"Format": "IDEA0", "ID": "353e572b-0042-4183-8e9e-31f37b54d458", "DetectTime": "2023-10-30T14:11:50.231558+02:00", "EventTime": "2023-10-30T14:11:50.231586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CLw4wo219027ij1Ve3"]} -{"Format": "IDEA0", "ID": "0b81be8b-e841-44af-9ea8-01be0572946e", "DetectTime": "2023-10-30T14:11:50.249891+02:00", "EventTime": "2023-10-30T14:11:50.249902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["C3P5qV3Q8hfm5Yts8"]} -{"Format": "IDEA0", "ID": "547677be-3b55-45fb-a079-7314e4292393", "DetectTime": "2023-10-30T14:11:50.264689+02:00", "EventTime": "2023-10-30T14:11:50.264704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CGJxcl1JzSuKGyBwm8"]} -{"Format": "IDEA0", "ID": "0522c26c-9f41-4a1a-8709-3f4fc754a052", "DetectTime": "2023-10-30T14:11:50.279400+02:00", "EventTime": "2023-10-30T14:11:50.279414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CjIjuq3Fkc0WUBULLe"]} -{"Format": "IDEA0", "ID": "b74ae8ae-f3c0-4a92-b7cd-ad5663cf62af", "DetectTime": "2023-10-30T14:11:50.299320+02:00", "EventTime": "2023-10-30T14:11:50.299332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C3R94pcS8NMXsRKi8"]} -{"Format": "IDEA0", "ID": "5ac2bbf3-a075-4653-b91c-930005d53c7f", "DetectTime": "2023-10-30T14:11:50.314459+02:00", "EventTime": "2023-10-30T14:11:50.314471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CW5Lyu3NkMSjcUtSlf"]} -{"Format": "IDEA0", "ID": "4ab51c50-ee5e-4f35-a87c-680010a0df1b", "DetectTime": "2023-10-30T14:11:50.332097+02:00", "EventTime": "2023-10-30T14:11:50.332109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLRU7ZqFO6u6DTKL6"]} -{"Format": "IDEA0", "ID": "52092c4c-b096-4de1-9fae-3e3fc5fc3616", "DetectTime": "2023-10-30T14:11:50.353533+02:00", "EventTime": "2023-10-30T14:11:50.353546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CnsLSM2Tb7ku6X1KY8"]} -{"Format": "IDEA0", "ID": "5fb3df5e-43e6-407e-a920-17e9cc324e51", "DetectTime": "2023-10-30T14:11:50.372061+02:00", "EventTime": "2023-10-30T14:11:50.372073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CiGpqX3RJGTxhBY9D9"]} -{"Format": "IDEA0", "ID": "bd70a31b-0c06-447e-9a74-3efb74b4f982", "DetectTime": "2023-10-30T14:11:50.391901+02:00", "EventTime": "2023-10-30T14:11:50.391913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkyCMB3Th0tZ7QNOGj"]} -{"Format": "IDEA0", "ID": "cdad423f-de3b-4dd6-9381-3a3c27d1416c", "DetectTime": "2023-10-30T14:11:50.407527+02:00", "EventTime": "2023-10-30T14:11:50.407544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CxbcaP1qplwGRZMKOg"]} -{"Format": "IDEA0", "ID": "15eaf725-4838-433d-90d4-8fb028c51292", "DetectTime": "2023-10-30T14:11:50.426687+02:00", "EventTime": "2023-10-30T14:11:50.426699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CmqW3N3JG0jOyNpz3d"]} -{"Format": "IDEA0", "ID": "ca8d2fed-5183-4c97-9a43-d749530761f8", "DetectTime": "2023-10-30T14:11:50.455511+02:00", "EventTime": "2023-10-30T14:11:50.455531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CG3P3OmpmxgJktpZ2"]} -{"Format": "IDEA0", "ID": "6197b62a-4f59-4488-94f4-f31808b21e0c", "DetectTime": "2023-10-30T14:11:50.474428+02:00", "EventTime": "2023-10-30T14:11:50.474447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CnZdh54D1Lm6LKbhpf"]} -{"Format": "IDEA0", "ID": "ab91a893-b601-46cb-8f4b-f21e3103a1af", "DetectTime": "2023-10-30T14:11:50.490444+02:00", "EventTime": "2023-10-30T14:11:50.490457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CbbPpJ2dyiyxBK6TYf"]} -{"Format": "IDEA0", "ID": "1435053a-99dd-4be1-aeec-9fe1289f3596", "DetectTime": "2023-10-30T14:11:50.506895+02:00", "EventTime": "2023-10-30T14:11:50.506907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CFJv171ykrmGxTfRlh"]} -{"Format": "IDEA0", "ID": "143fa5d1-5f7a-4b9e-afeb-d7d9e4aac156", "DetectTime": "2023-10-30T14:11:50.525224+02:00", "EventTime": "2023-10-30T14:11:50.525236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CEn3Gd3WeZaaicEQN"]} -{"Format": "IDEA0", "ID": "7dbd4830-6147-469c-aa0a-35ea7fe65a18", "DetectTime": "2023-10-30T14:11:50.548773+02:00", "EventTime": "2023-10-30T14:11:50.548785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CQMSWU38JSHh4L6DE"]} -{"Format": "IDEA0", "ID": "152a9ec4-5612-4a5f-8508-f6629cbf82b6", "DetectTime": "2023-10-30T14:11:50.565068+02:00", "EventTime": "2023-10-30T14:11:50.565079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C83OWAcZRxFkDaDv9"]} -{"Format": "IDEA0", "ID": "61fff44f-7caa-4a3b-a24f-0dde1f9800d0", "DetectTime": "2023-10-30T14:11:50.583760+02:00", "EventTime": "2023-10-30T14:11:50.583775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkRPBj1SXtK7DM2Ufg"]} -{"Format": "IDEA0", "ID": "14b0e1d6-68e0-4977-9c21-7b914d8177ae", "DetectTime": "2023-10-30T14:11:50.602219+02:00", "EventTime": "2023-10-30T14:11:50.602230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CkpKWO1HxrruVkFJxk"]} -{"Format": "IDEA0", "ID": "990ae3b6-7d70-44dc-a900-6298cf1dbad7", "DetectTime": "2023-10-30T14:11:50.622389+02:00", "EventTime": "2023-10-30T14:11:50.622405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMXFEOOZdcqtA5Ske"]} -{"Format": "IDEA0", "ID": "b618fa78-a9b1-4373-a79f-63821d387de9", "DetectTime": "2023-10-30T14:11:50.641554+02:00", "EventTime": "2023-10-30T14:11:50.641565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ce0hba3gQN1BfQXvD9"]} -{"Format": "IDEA0", "ID": "4e1666ec-403f-4d8e-8b49-416ac440d747", "DetectTime": "2023-10-30T14:11:50.657234+02:00", "EventTime": "2023-10-30T14:11:50.657245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C9kOwT2CoxKP92GAgf"]} -{"Format": "IDEA0", "ID": "9375fc69-7f47-47cb-a3f4-6b6f14889794", "DetectTime": "2023-10-30T14:11:50.674578+02:00", "EventTime": "2023-10-30T14:11:50.674592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CJSyes2AQmawVTf4Ub"]} -{"Format": "IDEA0", "ID": "9a5cf027-f19e-4fe4-a4ba-55837880d421", "DetectTime": "2023-10-30T14:11:50.690308+02:00", "EventTime": "2023-10-30T14:11:50.690319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cco844Q9p9wpjFoBa"]} -{"Format": "IDEA0", "ID": "ca0c3492-d1ff-48b1-9f2b-e1855a5ac6c3", "DetectTime": "2023-10-30T14:11:50.707371+02:00", "EventTime": "2023-10-30T14:11:50.707387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C32A3u1e5sRZH9RnU6"]} -{"Format": "IDEA0", "ID": "736bad33-cfb4-4c78-acd1-74ab9c2c5dae", "DetectTime": "2023-10-30T14:11:50.728046+02:00", "EventTime": "2023-10-30T14:11:50.728063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CIiaN41gg955C28rdg"]} -{"Format": "IDEA0", "ID": "5adc62e9-7d4c-4da8-8a90-8fd8ed762233", "DetectTime": "2023-10-30T14:11:50.745112+02:00", "EventTime": "2023-10-30T14:11:50.745129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cvvcbv3oiplTKBvIxh"]} -{"Format": "IDEA0", "ID": "0574462d-320f-471e-9b91-4b3100fbb48d", "DetectTime": "2023-10-30T14:11:50.759865+02:00", "EventTime": "2023-10-30T14:11:50.759876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CAI2fz21OQuZAieFdl"]} -{"Format": "IDEA0", "ID": "23b3e13d-547a-405f-a131-c206eaa1591c", "DetectTime": "2023-10-30T14:11:50.778552+02:00", "EventTime": "2023-10-30T14:11:50.778562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CMuMwv1H7nurcRQkR1"]} -{"Format": "IDEA0", "ID": "06d197c5-3045-4324-9612-898652098600", "DetectTime": "2023-10-30T14:11:50.797216+02:00", "EventTime": "2023-10-30T14:11:50.797236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CgGXae2CvY5liqXt8h"]} -{"Format": "IDEA0", "ID": "88818f66-7396-4c17-bab0-98a43015efa5", "DetectTime": "2023-10-30T14:11:50.817274+02:00", "EventTime": "2023-10-30T14:11:50.817284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C0MCWm3vxb8Dg78yz3"]} -{"Format": "IDEA0", "ID": "a0cbc4cf-b4d7-45cd-a7cd-4335f9b6d910", "DetectTime": "2023-10-30T14:11:50.833893+02:00", "EventTime": "2023-10-30T14:11:50.833910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CTdcW83QBow21Y8fsc"]} -{"Format": "IDEA0", "ID": "37b477d0-5d0b-4f3b-9456-fff2d39b8b2b", "DetectTime": "2023-10-30T14:11:50.849259+02:00", "EventTime": "2023-10-30T14:11:50.849269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CkE2pV3DWqKru0XER1"]} -{"Format": "IDEA0", "ID": "9cdc29de-8c95-4d7f-9da8-f6897979bd0d", "DetectTime": "2023-10-30T14:11:50.865351+02:00", "EventTime": "2023-10-30T14:11:50.865363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZ2eK716l0456hqQe3"]} -{"Format": "IDEA0", "ID": "fa79b760-a3c3-46ae-a590-8734bddff64f", "DetectTime": "2023-10-30T14:11:50.883008+02:00", "EventTime": "2023-10-30T14:11:50.883024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C8fYtl29TN1Gg8NSra"]} -{"Format": "IDEA0", "ID": "106ce8d6-546e-4bb8-8334-c0c5c6fe3739", "DetectTime": "2023-10-30T14:11:50.901315+02:00", "EventTime": "2023-10-30T14:11:50.901325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CJL4XD49Rsq52Lk5Jb"]} -{"Format": "Json", "ID": "106ce8d6-546e-4bb8-8334-c0c5c6fe3739", "DetectTime": "2023-10-30T14:11:50.901315+02:00", "EventTime": "2023-10-30T14:11:50.901325+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T03:35:55.040127+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2023/10/30 14:11:50.956960)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "118f38a6-65e3-4c31-885d-9f59b8472af7", "DetectTime": "2023-10-30T14:11:50.961453+02:00", "EventTime": "2023-10-30T14:11:50.961463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CxRaiV38vEqkfNvfXk"]} -{"Format": "IDEA0", "ID": "e12088e7-824d-4d09-9528-012669363e77", "DetectTime": "2023-10-30T14:11:50.979371+02:00", "EventTime": "2023-10-30T14:11:50.979383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CxAiXM1Px9ZdsmLBR1"]} -{"Format": "IDEA0", "ID": "0bb2e874-404c-4bac-86f7-eb0efcf7c551", "DetectTime": "2023-10-30T14:11:50.998442+02:00", "EventTime": "2023-10-30T14:11:50.998454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CBhBhC3KZyS71lQKGk"]} -{"Format": "IDEA0", "ID": "549f1a3f-2060-4989-9ff0-bb67632be63f", "DetectTime": "2023-10-30T14:11:51.013810+02:00", "EventTime": "2023-10-30T14:11:51.013821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C8SLyyarRo4EyXGm4"]} -{"Format": "IDEA0", "ID": "5a1a319b-ab62-425b-9e5a-8f4baf1e9e46", "DetectTime": "2023-10-30T14:11:51.030224+02:00", "EventTime": "2023-10-30T14:11:51.030242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C51vke2S8iebGtDiY9"]} -{"Format": "IDEA0", "ID": "73c9797e-5760-4231-a0a6-ffc727b4b94c", "DetectTime": "2023-10-30T14:11:51.050875+02:00", "EventTime": "2023-10-30T14:11:51.050893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmSk7T183xSCTdZTcc"]} -{"Format": "IDEA0", "ID": "b2c67502-31ba-4ddd-a535-5446641a37f9", "DetectTime": "2023-10-30T14:11:51.067131+02:00", "EventTime": "2023-10-30T14:11:51.067142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CaZRAm1SVsvNhWT8Q8"]} -{"Format": "IDEA0", "ID": "81854912-1004-46bf-92b0-8a1a94d4f3e7", "DetectTime": "2023-10-30T14:11:51.082281+02:00", "EventTime": "2023-10-30T14:11:51.082292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJYGpc4E3WiYJHqwOb"]} -{"Format": "IDEA0", "ID": "18100f24-7117-41b8-9561-81e17d18eef3", "DetectTime": "2023-10-30T14:11:51.099697+02:00", "EventTime": "2023-10-30T14:11:51.099710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CZph5N4xB1uV0LZu5"]} -{"Format": "IDEA0", "ID": "4c2c33b3-654d-4d9c-9d41-dd9d74a8b7b8", "DetectTime": "2023-10-30T14:11:51.114505+02:00", "EventTime": "2023-10-30T14:11:51.114515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Chh7EC4je6NWCXGjm4"]} -{"Format": "IDEA0", "ID": "f24b74c3-e262-42e5-af04-dae14a71cfdd", "DetectTime": "2023-10-30T14:11:51.128428+02:00", "EventTime": "2023-10-30T14:11:51.128453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CRiGzK4XamAX4HMa6"]} -{"Format": "IDEA0", "ID": "415a9b85-65ee-416f-9ed1-49cdaceb0665", "DetectTime": "2023-10-30T14:11:51.143200+02:00", "EventTime": "2023-10-30T14:11:51.143214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CIKIKq1JVauWSTJHLl"]} -{"Format": "IDEA0", "ID": "733a73b1-6faa-42bb-803c-844e4b5df4ac", "DetectTime": "2023-10-30T14:11:51.162516+02:00", "EventTime": "2023-10-30T14:11:51.162533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CRQzRMnos9uqyj4p4"]} -{"Format": "IDEA0", "ID": "e6a6a399-49a7-4c81-94c1-7468a5d525d1", "DetectTime": "2023-10-30T14:11:51.178728+02:00", "EventTime": "2023-10-30T14:11:51.178748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CBehiJ3nfm9whjW6p6"]} -{"Format": "IDEA0", "ID": "6f034751-0883-477a-88d7-355fbf394c37", "DetectTime": "2023-10-30T14:11:51.193763+02:00", "EventTime": "2023-10-30T14:11:51.193788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CLUvPi3uk2vVX0BQMc"]} -{"Format": "IDEA0", "ID": "3bab659c-f6f3-48da-adec-b14f4608a5a1", "DetectTime": "2023-10-30T14:11:51.210675+02:00", "EventTime": "2023-10-30T14:11:51.210695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C6UmXj34yRJ7AcKbUi"]} -{"Format": "IDEA0", "ID": "999de130-8261-4031-bcaa-11060fe1aa1c", "DetectTime": "2023-10-30T14:11:51.227434+02:00", "EventTime": "2023-10-30T14:11:51.227447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 46.49.109.30 ", "ContentType": "text/plain"}], "uids": ["CskLBI31upvOtGntSi"]} -{"Format": "IDEA0", "ID": "681fdae3-94ea-4c12-98d7-ee547017f98b", "DetectTime": "2023-10-30T14:11:51.242851+02:00", "EventTime": "2023-10-30T14:11:51.242863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CgZWFD3yxIL9xvEefb"]} -{"Format": "IDEA0", "ID": "694f6134-60cb-46df-b961-8079ee193cf4", "DetectTime": "2023-10-30T14:11:51.257242+02:00", "EventTime": "2023-10-30T14:11:51.257251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CLuteY1oceUzxtoWHe"]} -{"Format": "IDEA0", "ID": "391db8f2-ce1b-49d4-8396-eb8c62937580", "DetectTime": "2023-10-30T14:11:51.271319+02:00", "EventTime": "2023-10-30T14:11:51.271331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C1ov9E3P2q5hmPtzA9"]} -{"Format": "IDEA0", "ID": "8a076756-eb5c-498c-b202-63c5a08e9229", "DetectTime": "2023-10-30T14:11:51.285501+02:00", "EventTime": "2023-10-30T14:11:51.285515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CJRGmM3C3kUlw02hl"]} -{"Format": "IDEA0", "ID": "d6e8d20c-4468-4e56-a52f-31fa06820409", "DetectTime": "2023-10-30T14:11:51.300003+02:00", "EventTime": "2023-10-30T14:11:51.300018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CSLsUYu6Vh0KZX0D6"]} -{"Format": "IDEA0", "ID": "a8ce34b3-3d43-4a00-bf71-782a87e38214", "DetectTime": "2023-10-30T14:11:51.313609+02:00", "EventTime": "2023-10-30T14:11:51.313635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C6gJ5I2w9duvnxlJ13"]} -{"Format": "IDEA0", "ID": "8848e287-09d4-4cb9-9caa-dcc9d76248de", "DetectTime": "2023-10-30T14:11:51.332001+02:00", "EventTime": "2023-10-30T14:11:51.332012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["COXQQ925pSbgWoDWl"]} -{"Format": "IDEA0", "ID": "21cca180-5a32-45e9-82ef-11dba4031a76", "DetectTime": "2023-10-30T14:11:51.347390+02:00", "EventTime": "2023-10-30T14:11:51.347407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CKgIpJ2YNBNFLMF54e"]} -{"Format": "IDEA0", "ID": "bd21aaa6-afad-4366-a926-b841b1c48e5d", "DetectTime": "2023-10-30T14:11:51.364124+02:00", "EventTime": "2023-10-30T14:11:51.364140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CwyvhdtKob55e1Iac"]} -{"Format": "IDEA0", "ID": "98a4278c-33c1-411c-ad29-81addf7936d7", "DetectTime": "2023-10-30T14:11:51.384232+02:00", "EventTime": "2023-10-30T14:11:51.384248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ct2ect4ywUGSyFOyCc"]} -{"Format": "IDEA0", "ID": "637c8fc7-fe83-48c4-9a14-be76a4189d97", "DetectTime": "2023-10-30T14:11:51.405074+02:00", "EventTime": "2023-10-30T14:11:51.405089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CLhhsS7uyOgcLNjoa"]} -{"Format": "IDEA0", "ID": "c3252224-97b2-494a-8e07-56995a85ef0f", "DetectTime": "2023-10-30T14:11:51.424783+02:00", "EventTime": "2023-10-30T14:11:51.424794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CZFqdU11lb8VnxE6Hg"]} -{"Format": "IDEA0", "ID": "65edd0ff-080b-46b3-b56e-56f6ce89626f", "DetectTime": "2023-10-30T14:11:51.439393+02:00", "EventTime": "2023-10-30T14:11:51.439403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C2NRaI3hbwWzgeaTh7"]} -{"Format": "IDEA0", "ID": "2e2b05bf-4e45-4fb9-9a6b-847263ce0593", "DetectTime": "2023-10-30T14:11:51.454465+02:00", "EventTime": "2023-10-30T14:11:51.454477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtmaIFu5hATfmzChi"]} -{"Format": "IDEA0", "ID": "efc3b583-63a2-4b5c-bbc9-f83cc3314f59", "DetectTime": "2023-10-30T14:11:51.478177+02:00", "EventTime": "2023-10-30T14:11:51.478193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CJprmI2beBPbfioMAd"]} -{"Format": "IDEA0", "ID": "f7b524f2-ff0d-43fe-85de-f2bd52787e35", "DetectTime": "2023-10-30T14:11:51.498480+02:00", "EventTime": "2023-10-30T14:11:51.498490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C6bcFT7HoBOWhMwU1"]} -{"Format": "IDEA0", "ID": "378fa013-bd84-4c72-93cd-7e2cf70cd4b7", "DetectTime": "2023-10-30T14:11:51.513140+02:00", "EventTime": "2023-10-30T14:11:51.513156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CeMng34pXwikZKHNA1"]} -{"Format": "IDEA0", "ID": "0c5be204-2b34-4765-8803-aeb33a7deda9", "DetectTime": "2023-10-30T14:11:51.531246+02:00", "EventTime": "2023-10-30T14:11:51.531264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C1Ll3n4DQynYQxK3sf"]} -{"Format": "IDEA0", "ID": "8fe699f8-12e0-49b5-bdca-a6982ec9e3a5", "DetectTime": "2023-10-30T14:11:51.547898+02:00", "EventTime": "2023-10-30T14:11:51.547911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVjXQ41SFImm1w8Czc"]} -{"Format": "IDEA0", "ID": "7f3c89b4-a66c-48f9-b52d-62f71cfd374e", "DetectTime": "2023-10-30T14:11:51.562468+02:00", "EventTime": "2023-10-30T14:11:51.562478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CMXfSx2ypdMGpegh19"]} -{"Format": "IDEA0", "ID": "bc9ddec3-1363-4e47-9b80-e4394bfb8d24", "DetectTime": "2023-10-30T14:11:51.578246+02:00", "EventTime": "2023-10-30T14:11:51.578257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CUfBtk4TtXP10YsFa5"]} -{"Format": "IDEA0", "ID": "51c067c2-cf2d-410b-95b0-b87763466b4a", "DetectTime": "2023-10-30T14:11:51.597113+02:00", "EventTime": "2023-10-30T14:11:51.597125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CJ1jStzey6GO8DUK3"]} -{"Format": "IDEA0", "ID": "3a6be690-e4bc-4f84-83a1-0f339a55d65c", "DetectTime": "2023-10-30T14:11:51.612387+02:00", "EventTime": "2023-10-30T14:11:51.612397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C9WY8X2fRTjcCHlDpc"]} -{"Format": "IDEA0", "ID": "dda88ed2-ba99-4f7a-8feb-d34ba3fbc525", "DetectTime": "2023-10-30T14:11:51.626381+02:00", "EventTime": "2023-10-30T14:11:51.626392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CJbT9EO6cRWlpFuZ1"]} -{"Format": "IDEA0", "ID": "b68e6a7a-21d8-42ea-9048-a6a8ad73f4a3", "DetectTime": "2023-10-30T14:11:51.658624+02:00", "EventTime": "2023-10-30T14:11:51.658634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C7ydGy49x8MAA4R7Aj"]} -{"Format": "IDEA0", "ID": "1edde455-bd39-4850-8cca-a9ea87cb1da3", "DetectTime": "2023-10-30T14:11:51.673590+02:00", "EventTime": "2023-10-30T14:11:51.673601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CKHeKz2gmyhAyhCsa"]} -{"Format": "IDEA0", "ID": "a6950074-4df5-4d9a-8b62-6b6b1b92cc11", "DetectTime": "2023-10-30T14:11:51.688800+02:00", "EventTime": "2023-10-30T14:11:51.688811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CiEg0p23PsAmR6a429"]} -{"Format": "IDEA0", "ID": "1f104f7e-f88d-4ec5-a6c3-e339d54213d0", "DetectTime": "2023-10-30T14:11:51.705148+02:00", "EventTime": "2023-10-30T14:11:51.705165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CTQZ7r188R5Obhgcn3"]} -{"Format": "IDEA0", "ID": "11efc8f1-a4bb-46a7-9c60-a1719513cf28", "DetectTime": "2023-10-30T14:11:51.727739+02:00", "EventTime": "2023-10-30T14:11:51.727759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C4QkKD1N9B7SahFIRj"]} -{"Format": "IDEA0", "ID": "d2c9cdd3-9619-4a9e-a7db-7e1602a7941f", "DetectTime": "2023-10-30T14:11:51.744646+02:00", "EventTime": "2023-10-30T14:11:51.744663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVzEN24y4yK4BXFwf7"]} -{"Format": "IDEA0", "ID": "dc075cb6-8762-4a83-9f26-d4d2e0a14741", "DetectTime": "2023-10-30T14:11:51.760003+02:00", "EventTime": "2023-10-30T14:11:51.760013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CmR8RiraYOreJX5zi"]} -{"Format": "IDEA0", "ID": "3cdc2807-0b98-4701-91bd-5f64d3f0ad2c", "DetectTime": "2023-10-30T14:11:51.791885+02:00", "EventTime": "2023-10-30T14:11:51.791896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CrnvBP3PkN2JGUsfqe"]} -{"Format": "IDEA0", "ID": "e6c831ce-ea38-4230-bbe5-68f1e644271c", "DetectTime": "2023-10-30T14:11:51.811945+02:00", "EventTime": "2023-10-30T14:11:51.811962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CzxYu63EMBCdN8o9Q"]} -{"Format": "IDEA0", "ID": "70bbc771-679d-4518-8233-5b400c874bc5", "DetectTime": "2023-10-30T14:11:51.827453+02:00", "EventTime": "2023-10-30T14:11:51.827465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CxETyF2VyvWYBBmkXc"]} -{"Format": "IDEA0", "ID": "0b71ad8b-986d-471a-ab0b-7215424814bb", "DetectTime": "2023-10-30T14:11:51.861917+02:00", "EventTime": "2023-10-30T14:11:51.861934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CDy2B53IAUk3OVTk73"]} -{"Format": "IDEA0", "ID": "79b93e7d-59e0-404d-a5e7-a39a7d61976c", "DetectTime": "2023-10-30T14:11:51.878881+02:00", "EventTime": "2023-10-30T14:11:51.878901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CA0jkw1mWPJ8m7gJi"]} -{"Format": "IDEA0", "ID": "cb45f14f-010c-4b3c-a105-3fecdea08281", "DetectTime": "2023-10-30T14:11:51.893208+02:00", "EventTime": "2023-10-30T14:11:51.893223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["COAuRGIoepuEktoci"]} -{"Format": "IDEA0", "ID": "be5e0bd5-8f0c-4fe1-9b3b-90f2534f03d3", "DetectTime": "2023-10-30T14:11:51.926619+02:00", "EventTime": "2023-10-30T14:11:51.926631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CBzgZkK7T3T0gBSWa"]} -{"Format": "IDEA0", "ID": "d7495421-566a-4cbd-89af-140dbc3e2886", "DetectTime": "2023-10-30T14:11:51.940697+02:00", "EventTime": "2023-10-30T14:11:51.940708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CdA34q2sh4ISky85rl"]} -{"Format": "IDEA0", "ID": "f5cfb522-8320-4e7b-901f-1d0d1b5aa330", "DetectTime": "2023-10-30T14:11:51.955260+02:00", "EventTime": "2023-10-30T14:11:51.955274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CFHzF6315KdkUHfW3l"]} -{"Format": "IDEA0", "ID": "fedd88a6-14dc-4237-b63a-38bbe763be36", "DetectTime": "2023-10-30T14:11:51.970941+02:00", "EventTime": "2023-10-30T14:11:51.970954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CPwLnw45OWOxcY7Dj3"]} -{"Format": "IDEA0", "ID": "7c2a83de-3f16-492d-8a7c-f0721d50aa87", "DetectTime": "2023-10-30T14:11:51.987526+02:00", "EventTime": "2023-10-30T14:11:51.987537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Crtg26JU2rBwxqz46"]} -{"Format": "IDEA0", "ID": "6d1289c8-9f54-4d5c-ad80-6c5dc4abccc9", "DetectTime": "2023-10-30T14:11:52.003481+02:00", "EventTime": "2023-10-30T14:11:52.003492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C97NKd1pq7EmIXEO4g"]} -{"Format": "IDEA0", "ID": "60c47c33-185d-47a1-aac1-b485fefe25e7", "DetectTime": "2023-10-30T14:11:52.021413+02:00", "EventTime": "2023-10-30T14:11:52.021429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CeUfsk469f6HWFoMzb"]} -{"Format": "IDEA0", "ID": "3b4c555e-e63d-413a-bf10-8ec4bc94e865", "DetectTime": "2023-10-30T14:11:52.039610+02:00", "EventTime": "2023-10-30T14:11:52.039621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CjCyQN3vpKPlXZh9R7"]} -{"Format": "IDEA0", "ID": "f5a7e0f3-d86f-4bc2-9947-ec01aaaf62f8", "DetectTime": "2023-10-30T14:11:52.054708+02:00", "EventTime": "2023-10-30T14:11:52.054725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CcY15U1M4nLcrc0GM4"]} -{"Format": "IDEA0", "ID": "68eca085-76e7-456c-afcb-b6933ca1511e", "DetectTime": "2023-10-30T14:11:52.093581+02:00", "EventTime": "2023-10-30T14:11:52.093593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CdTSPL12nHvpyuqwDl"]} -{"Format": "IDEA0", "ID": "5c551019-6d2e-4fbf-a5cd-2a6769e19388", "DetectTime": "2023-10-30T14:11:52.113498+02:00", "EventTime": "2023-10-30T14:11:52.113516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CSbS3F2e3dexDyJB4l"]} -{"Format": "IDEA0", "ID": "75ab84a9-c850-47fa-a13c-2e8c127f6335", "DetectTime": "2023-10-30T14:11:52.131982+02:00", "EventTime": "2023-10-30T14:11:52.131998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CsGIdMLDUpdmqdr8h"]} -{"Format": "IDEA0", "ID": "3298f312-87be-4128-ac6e-2f13fbd601b8", "DetectTime": "2023-10-30T14:11:52.149075+02:00", "EventTime": "2023-10-30T14:11:52.149094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CydWws4MDmr0QdHIs6"]} -{"Format": "IDEA0", "ID": "afd02af4-f8c4-4272-9a24-a8075c511cc1", "DetectTime": "2023-10-30T14:11:52.167112+02:00", "EventTime": "2023-10-30T14:11:52.167123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C3vKoIVHDa1Ybb7Ml"]} -{"Format": "IDEA0", "ID": "bee58655-3724-40f1-bff0-88136daac5d2", "DetectTime": "2023-10-30T14:11:52.185452+02:00", "EventTime": "2023-10-30T14:11:52.185463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C0njLK3sM1gatkE5o4"]} -{"Format": "IDEA0", "ID": "0835dc51-99bf-4430-95ec-d0937240e9e5", "DetectTime": "2023-10-30T14:11:52.203059+02:00", "EventTime": "2023-10-30T14:11:52.203072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CldscQ6XVjkyVhefe"]} -{"Format": "IDEA0", "ID": "7d07bbae-4e33-4aac-8697-273ab182e427", "DetectTime": "2023-10-30T14:11:52.237547+02:00", "EventTime": "2023-10-30T14:11:52.237566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CH4JDp1J7c59r4eQFe"]} -{"Format": "IDEA0", "ID": "b5e03472-5404-475a-be96-58deaa76c55b", "DetectTime": "2023-10-30T14:11:52.252076+02:00", "EventTime": "2023-10-30T14:11:52.252093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CRjmf42iNBBCKNMNK1"]} -{"Format": "IDEA0", "ID": "ab105f15-3386-4832-98cd-e7599137026f", "DetectTime": "2023-10-30T14:11:52.267802+02:00", "EventTime": "2023-10-30T14:11:52.267819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CcYWuV2u3anvRWikx9"]} -{"Format": "IDEA0", "ID": "40b0bd47-df72-4663-9ad7-1d704c8742cd", "DetectTime": "2023-10-30T14:11:52.282577+02:00", "EventTime": "2023-10-30T14:11:52.282588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C4qLHv3AQduPy2yUa"]} -{"Format": "IDEA0", "ID": "d0375416-469a-4b68-b509-27bb582db9f2", "DetectTime": "2023-10-30T14:11:52.299055+02:00", "EventTime": "2023-10-30T14:11:52.299070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CciDwp4sybQvTOuO58"]} -{"Format": "IDEA0", "ID": "c12ac50d-5eb4-4165-87d1-20175e8f57f2", "DetectTime": "2023-10-30T14:11:52.315664+02:00", "EventTime": "2023-10-30T14:11:52.315675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CKtXUa2FZlel1ZogVa"]} -{"Format": "IDEA0", "ID": "98cd2ec4-6025-450e-9ab9-847c550b3792", "DetectTime": "2023-10-30T14:11:52.331681+02:00", "EventTime": "2023-10-30T14:11:52.331691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CTuMy31Sy10gsvcKU1"]} -{"Format": "IDEA0", "ID": "ff3e4a1c-f96d-4b83-893e-69014b861991", "DetectTime": "2023-10-30T14:11:52.345037+02:00", "EventTime": "2023-10-30T14:11:52.345047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C1AhxB3Se5uZKzzuxf"]} -{"Format": "IDEA0", "ID": "1a3a2d26-22f4-43a8-b5ab-b705f2cb23ce", "DetectTime": "2023-10-30T14:11:52.361756+02:00", "EventTime": "2023-10-30T14:11:52.361769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CgZWPG1cw1CMU22HZc"]} -{"Format": "IDEA0", "ID": "38a141fd-610d-45ee-8a20-def13d5a20f3", "DetectTime": "2023-10-30T14:11:52.379067+02:00", "EventTime": "2023-10-30T14:11:52.379083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXfDNyNsqRA2U5d55"]} -{"Format": "IDEA0", "ID": "c885adc2-161c-431e-abf1-58ffe4531fc2", "DetectTime": "2023-10-30T14:11:52.418032+02:00", "EventTime": "2023-10-30T14:11:52.418043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CMZwQtrDyV10GxC55"]} -{"Format": "IDEA0", "ID": "2f280f04-cfda-441c-a482-5b384b6bc0ee", "DetectTime": "2023-10-30T14:11:52.437996+02:00", "EventTime": "2023-10-30T14:11:52.438014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJbnx91dhMy7oYbqn8"]} -{"Format": "IDEA0", "ID": "2b4ca8f1-935e-4255-a505-3b07ef3db184", "DetectTime": "2023-10-30T14:11:52.456337+02:00", "EventTime": "2023-10-30T14:11:52.456355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cbkwgf12s7zrAHVUN3"]} -{"Format": "IDEA0", "ID": "d90751d4-de7d-47ba-8f72-32a9e069bda4", "DetectTime": "2023-10-30T14:11:52.476670+02:00", "EventTime": "2023-10-30T14:11:52.476685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C76Ih64u71hekff1u9"]} -{"Format": "IDEA0", "ID": "c067fe5e-e8ca-465b-b23a-d60facbfd317", "DetectTime": "2023-10-30T14:11:52.495941+02:00", "EventTime": "2023-10-30T14:11:52.495957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CsZ8xz3RGwggu0bcya"]} -{"Format": "IDEA0", "ID": "f85f0a32-d57f-451e-8cd1-ccc3510d84c8", "DetectTime": "2023-10-30T14:11:52.514520+02:00", "EventTime": "2023-10-30T14:11:52.514534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CmfV530qDcnMOqSi"]} -{"Format": "IDEA0", "ID": "2d5142d6-3a07-4e1c-a12a-a2a05533c881", "DetectTime": "2023-10-30T14:11:52.532509+02:00", "EventTime": "2023-10-30T14:11:52.532520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CHFPxu3AweQSzuuhqh"]} -{"Format": "IDEA0", "ID": "b261c561-b266-477e-87cd-91e1400db3c3", "DetectTime": "2023-10-30T14:11:52.546414+02:00", "EventTime": "2023-10-30T14:11:52.546439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CobHSo41PAmK9ecMf9"]} -{"Format": "Json", "ID": "b261c561-b266-477e-87cd-91e1400db3c3", "DetectTime": "2023-10-30T14:11:52.546414+02:00", "EventTime": "2023-10-30T14:11:52.546439+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:06:37.379250+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:52.623783)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1eaffa01-a7b1-4329-974e-4f9db630cfcd", "DetectTime": "2023-10-30T14:11:52.627609+02:00", "EventTime": "2023-10-30T14:11:52.627620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cnrx6L1AMsEvSnjcs2"]} -{"Format": "IDEA0", "ID": "58d6baaf-1f3d-413f-a393-30b3fa9fa167", "DetectTime": "2023-10-30T14:11:52.646410+02:00", "EventTime": "2023-10-30T14:11:52.646427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C1dPAh1yVlhSZlWAqj"]} -{"Format": "IDEA0", "ID": "85d6c841-f8bf-4229-991b-cbae032c90a1", "DetectTime": "2023-10-30T14:11:52.663720+02:00", "EventTime": "2023-10-30T14:11:52.663735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CrcNhO82153myA2T5"]} -{"Format": "IDEA0", "ID": "768ed0c8-37d9-46db-a6f7-709ef59e63ba", "DetectTime": "2023-10-30T14:11:52.681705+02:00", "EventTime": "2023-10-30T14:11:52.681721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Cw24It3ieDSCj5YjFj"]} -{"Format": "IDEA0", "ID": "f6575e92-3d76-43d1-a5c5-35f89ae33504", "DetectTime": "2023-10-30T14:11:52.697079+02:00", "EventTime": "2023-10-30T14:11:52.697091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C8gi2WvqffXrqTkS"]} -{"Format": "IDEA0", "ID": "d7657217-f6ec-4fbf-a21b-e8296bfaa8e0", "DetectTime": "2023-10-30T14:11:52.711662+02:00", "EventTime": "2023-10-30T14:11:52.711677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CGZx8k1s5q5ZtuK5Rg"]} -{"Format": "IDEA0", "ID": "661dde09-c555-440f-8c33-1be6c05a8700", "DetectTime": "2023-10-30T14:11:52.727284+02:00", "EventTime": "2023-10-30T14:11:52.727303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C9EU3Z2SMrpZVH7nta"]} -{"Format": "IDEA0", "ID": "10167b05-e222-4ff4-91f6-5abb18f5ab40", "DetectTime": "2023-10-30T14:11:52.747823+02:00", "EventTime": "2023-10-30T14:11:52.747834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Ctadaw4EwjN6KNajJi"]} -{"Format": "IDEA0", "ID": "3ba40dc5-0bfb-423e-b124-e03b81b780e2", "DetectTime": "2023-10-30T14:11:52.767008+02:00", "EventTime": "2023-10-30T14:11:52.767024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CUjsz84F0BGL6NZyIj"]} -{"Format": "IDEA0", "ID": "58515b10-d5b9-4f10-bb43-772e4c307c03", "DetectTime": "2023-10-30T14:11:52.786459+02:00", "EventTime": "2023-10-30T14:11:52.786476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CtGuVr4kEUQvkA7WG1"]} -{"Format": "IDEA0", "ID": "7db959a7-22d7-4faf-8739-1f1a9e333704", "DetectTime": "2023-10-30T14:11:52.822504+02:00", "EventTime": "2023-10-30T14:11:52.822519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C2Gz622VluERXPV2Q"]} -{"Format": "IDEA0", "ID": "82a1b0bc-414b-4b8d-b645-372857d22b19", "DetectTime": "2023-10-30T14:11:52.842476+02:00", "EventTime": "2023-10-30T14:11:52.842491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C50NWM1bwjiucJHQV9"]} -{"Format": "IDEA0", "ID": "0efb3844-ddca-4f22-b386-13fb0940ea60", "DetectTime": "2023-10-30T14:11:52.860973+02:00", "EventTime": "2023-10-30T14:11:52.860990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Csr9Iw6jHHjMmxnp"]} -{"Format": "IDEA0", "ID": "8762bd84-b048-41e6-aa6c-6bddadd1bf77", "DetectTime": "2023-10-30T14:11:52.877976+02:00", "EventTime": "2023-10-30T14:11:52.877994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CSA7IF23hs0JpEDk04"]} -{"Format": "IDEA0", "ID": "018e3f36-4469-4220-bd13-b4057faed457", "DetectTime": "2023-10-30T14:11:52.896304+02:00", "EventTime": "2023-10-30T14:11:52.896316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CjGDbuxMXAIxuuxyd"]} -{"Format": "IDEA0", "ID": "ede3e9af-a963-4348-baff-d52f8d199d81", "DetectTime": "2023-10-30T14:11:52.914461+02:00", "EventTime": "2023-10-30T14:11:52.914471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C3TIK51o3EXo0BW1V9"]} -{"Format": "IDEA0", "ID": "fe1a10bb-73dd-48e0-a5db-395afc322fbd", "DetectTime": "2023-10-30T14:11:52.931613+02:00", "EventTime": "2023-10-30T14:11:52.931630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CNrGQFQPQFuHusGth"]} -{"Format": "IDEA0", "ID": "5c707ceb-1a6b-4659-b12e-c0748a1d6474", "DetectTime": "2023-10-30T14:11:52.946754+02:00", "EventTime": "2023-10-30T14:11:52.946771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyHNQ9HNF1C2CDSq9"]} -{"Format": "IDEA0", "ID": "2792c22b-34b2-41ef-ac76-1278397a96d2", "DetectTime": "2023-10-30T14:11:52.962915+02:00", "EventTime": "2023-10-30T14:11:52.962928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CTLuvh2qEclbgTDN2g"]} -{"Format": "IDEA0", "ID": "99a80d63-4992-4f35-9843-8ba54dee1889", "DetectTime": "2023-10-30T14:11:52.980218+02:00", "EventTime": "2023-10-30T14:11:52.980229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ctvc6e2tS8TwBU09e7"]} -{"Format": "IDEA0", "ID": "6ed13c4a-5bd7-477b-9fd0-191b71433d76", "DetectTime": "2023-10-30T14:11:53.013479+02:00", "EventTime": "2023-10-30T14:11:53.013497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CniVjV2jzd1I5NnKx5"]} -{"Format": "IDEA0", "ID": "ba0ca5fd-8c5c-4b6b-bb7c-59cb7d3da784", "DetectTime": "2023-10-30T14:11:53.029880+02:00", "EventTime": "2023-10-30T14:11:53.029899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CfEcB74CXzU11lek19"]} -{"Format": "IDEA0", "ID": "3f448b15-035b-4b78-a81a-b93d491af6ae", "DetectTime": "2023-10-30T14:11:53.045364+02:00", "EventTime": "2023-10-30T14:11:53.045377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CdSZ354L1sKrrWru16"]} -{"Format": "IDEA0", "ID": "1adb4546-d6cb-430e-9d75-b32a96b83809", "DetectTime": "2023-10-30T14:11:53.059974+02:00", "EventTime": "2023-10-30T14:11:53.059985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C55jcv14AY0nUO1008"]} -{"Format": "IDEA0", "ID": "081bee16-c213-49f2-ad44-40ded2843c3b", "DetectTime": "2023-10-30T14:11:53.073712+02:00", "EventTime": "2023-10-30T14:11:53.073724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CJVl2L2D8uVSvEhrj1"]} -{"Format": "IDEA0", "ID": "c4a1aefc-453e-483b-9202-6d31db0f3f32", "DetectTime": "2023-10-30T14:11:53.087224+02:00", "EventTime": "2023-10-30T14:11:53.087235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CAuzpp21chfoC59bc9"]} -{"Format": "IDEA0", "ID": "2c0c926c-50df-49c5-aabb-d78ef4d2b984", "DetectTime": "2023-10-30T14:11:53.101177+02:00", "EventTime": "2023-10-30T14:11:53.101190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CJ2XQg14RLzErrK7Zf"]} -{"Format": "IDEA0", "ID": "6a68397b-0614-4833-8eec-30b818d29a26", "DetectTime": "2023-10-30T14:11:53.132116+02:00", "EventTime": "2023-10-30T14:11:53.132127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cmuy1B4PwQQ92mWDJ"]} -{"Format": "IDEA0", "ID": "c61ca2b4-aedc-4ef2-93da-53456e266044", "DetectTime": "2023-10-30T14:11:53.150516+02:00", "EventTime": "2023-10-30T14:11:53.150528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CtJ33I2ELVEkGi8Jzi"]} -{"Format": "IDEA0", "ID": "38c7a7eb-b6ec-4eda-b66c-762f3094f60a", "DetectTime": "2023-10-30T14:11:53.167814+02:00", "EventTime": "2023-10-30T14:11:53.167826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CUmrua3zCLsQe4ooVi"]} -{"Format": "IDEA0", "ID": "16ce25dd-69e5-40c3-ad72-5380002dcf7a", "DetectTime": "2023-10-30T14:11:53.182699+02:00", "EventTime": "2023-10-30T14:11:53.182710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C1D6m721IIvyalAZd5"]} -{"Format": "IDEA0", "ID": "5d1e78dc-9ef5-4c88-8b12-9adae3f372ae", "DetectTime": "2023-10-30T14:11:53.197172+02:00", "EventTime": "2023-10-30T14:11:53.197183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CbzlAV1pv9DmJT5L8b"]} -{"Format": "IDEA0", "ID": "9a13a5ad-f811-4987-ac3d-d2ac99788ada", "DetectTime": "2023-10-30T14:11:53.211479+02:00", "EventTime": "2023-10-30T14:11:53.211495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CI8UfZ1gJoIxhw03rc"]} -{"Format": "IDEA0", "ID": "07f7c20c-be38-4677-be97-010236cede99", "DetectTime": "2023-10-30T14:11:53.231511+02:00", "EventTime": "2023-10-30T14:11:53.231529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CE3NrK1TiUYfHV6izi"]} -{"Format": "IDEA0", "ID": "6a78a116-74ae-4857-ac53-2834f4f9b683", "DetectTime": "2023-10-30T14:11:53.251800+02:00", "EventTime": "2023-10-30T14:11:53.251816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Cx3Woh2gFkYm24rwYd"]} -{"Format": "IDEA0", "ID": "24a803b1-eb89-4ed1-ac6c-6dc5adcd83bd", "DetectTime": "2023-10-30T14:11:53.293164+02:00", "EventTime": "2023-10-30T14:11:53.293182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Co4j9VPvsQ0wFlZn4"]} -{"Format": "IDEA0", "ID": "51818edf-9a73-4d85-8a6c-bf161a37c148", "DetectTime": "2023-10-30T14:11:53.307543+02:00", "EventTime": "2023-10-30T14:11:53.307554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZ6unn49nqV7km4my3"]} -{"Format": "IDEA0", "ID": "2724ebc2-2291-4f4c-9a6b-fea706b96a33", "DetectTime": "2023-10-30T14:11:53.321468+02:00", "EventTime": "2023-10-30T14:11:53.321484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C09APs2P2xckLd1Yb5"]} -{"Format": "IDEA0", "ID": "a29c3c6c-7e37-4e19-8c58-f70808a62d9d", "DetectTime": "2023-10-30T14:11:53.337705+02:00", "EventTime": "2023-10-30T14:11:53.337720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CQkcOo4N78xFhjBQH"]} -{"Format": "IDEA0", "ID": "64682e2f-7ac6-4b53-9908-faae995713af", "DetectTime": "2023-10-30T14:11:53.354731+02:00", "EventTime": "2023-10-30T14:11:53.354747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CMKfRu4p2Nyul3I4q8"]} -{"Format": "IDEA0", "ID": "fefb7d11-eed0-491d-8066-801c1a011d65", "DetectTime": "2023-10-30T14:11:53.387316+02:00", "EventTime": "2023-10-30T14:11:53.387328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C72nun1nhqqGxH6nba"]} -{"Format": "IDEA0", "ID": "9910dddc-d7cb-4909-9241-2435e4818367", "DetectTime": "2023-10-30T14:11:53.401342+02:00", "EventTime": "2023-10-30T14:11:53.401353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CQsNOr1IWf2ucgjuKc"]} -{"Format": "IDEA0", "ID": "330bb819-1208-4095-bae4-320bafd4c23f", "DetectTime": "2023-10-30T14:11:53.431295+02:00", "EventTime": "2023-10-30T14:11:53.431313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CfuDpx1NCE45dbfuek"]} -{"Format": "IDEA0", "ID": "fbfc3af7-1781-44dd-975c-b3790273f3c6", "DetectTime": "2023-10-30T14:11:53.446537+02:00", "EventTime": "2023-10-30T14:11:53.446555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIxzAp4iHrWzqD3Mkl"]} -{"Format": "IDEA0", "ID": "835a354b-dd19-4612-8a5b-2b21933d5d85", "DetectTime": "2023-10-30T14:11:53.462477+02:00", "EventTime": "2023-10-30T14:11:53.462488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CdaqrO3sbfyd79GI3l"]} -{"Format": "IDEA0", "ID": "15a03abd-98be-49bf-953e-cbd06ee359eb", "DetectTime": "2023-10-30T14:11:53.476473+02:00", "EventTime": "2023-10-30T14:11:53.476484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CBrVu72A1KvLPv61Mb"]} -{"Format": "IDEA0", "ID": "fa89bffd-d2c1-4b0f-bef0-beb451a8f910", "DetectTime": "2023-10-30T14:11:53.491786+02:00", "EventTime": "2023-10-30T14:11:53.491803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CyMwsa4jdPAIyPyGe8"]} -{"Format": "IDEA0", "ID": "1efc7587-69ce-41ca-9c10-972e3b1460c6", "DetectTime": "2023-10-30T14:11:53.524118+02:00", "EventTime": "2023-10-30T14:11:53.524131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Cp9Yve3wFqy1RQz6Ue"]} -{"Format": "IDEA0", "ID": "d18a481b-2938-42e3-8b83-718b4670d1ca", "DetectTime": "2023-10-30T14:11:53.539598+02:00", "EventTime": "2023-10-30T14:11:53.539609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C2cBPc1QQWOUnYBxHj"]} -{"Format": "IDEA0", "ID": "a991fdb7-a7aa-4d14-bf75-b22c8c154ddb", "DetectTime": "2023-10-30T14:11:53.556054+02:00", "EventTime": "2023-10-30T14:11:53.556066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["ClaiL4oU5jTJ0ENI9"]} -{"Format": "IDEA0", "ID": "c8a582a3-fb88-44b2-97e9-4769555bc6ef", "DetectTime": "2023-10-30T14:11:53.571039+02:00", "EventTime": "2023-10-30T14:11:53.571052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CU8wEZ1J0RPeJjPL3c"]} -{"Format": "IDEA0", "ID": "fa140dd0-1c95-41bd-a89e-275fa178220c", "DetectTime": "2023-10-30T14:11:53.587710+02:00", "EventTime": "2023-10-30T14:11:53.587726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["Ce7kqg1vXpf8U24dq9"]} -{"Format": "IDEA0", "ID": "67249a85-6dee-4142-8dcb-809c081c0d36", "DetectTime": "2023-10-30T14:11:53.605553+02:00", "EventTime": "2023-10-30T14:11:53.605568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CzvE2r4hreY7qj3Ij"]} -{"Format": "IDEA0", "ID": "ae364c4d-ce07-466e-827f-cea58c53835d", "DetectTime": "2023-10-30T14:11:53.621338+02:00", "EventTime": "2023-10-30T14:11:53.621352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CKKf1O3djo17IzvXDa"]} -{"Format": "Json", "ID": "ae364c4d-ce07-466e-827f-cea58c53835d", "DetectTime": "2023-10-30T14:11:53.621338+02:00", "EventTime": "2023-10-30T14:11:53.621352+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:06:39.445218+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:53.692128)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "19ca83f0-14c2-4354-9446-659dbc8b53a2", "DetectTime": "2023-10-30T14:11:53.696717+02:00", "EventTime": "2023-10-30T14:11:53.696734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C7WmKq4YkiPcLMUrQk"]} -{"Format": "IDEA0", "ID": "0cfbca08-de5d-435b-8c63-10585aa23120", "DetectTime": "2023-10-30T14:11:53.718193+02:00", "EventTime": "2023-10-30T14:11:53.718209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CSgXuD25mtAOYwYiT7"]} -{"Format": "IDEA0", "ID": "8c5ef9b6-fe4f-40a7-9d58-8cb5254e78e1", "DetectTime": "2023-10-30T14:11:53.739241+02:00", "EventTime": "2023-10-30T14:11:53.739258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cruw9eLwV0yfQmrqa"]} -{"Format": "IDEA0", "ID": "412037c0-7877-4575-b3ac-5ce17bcc9e66", "DetectTime": "2023-10-30T14:11:53.757294+02:00", "EventTime": "2023-10-30T14:11:53.757312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CXalzE46sGKo0lg5N1"]} -{"Format": "IDEA0", "ID": "27c166a1-5d9a-4a7a-9b5f-50138ad6d19a", "DetectTime": "2023-10-30T14:11:53.776414+02:00", "EventTime": "2023-10-30T14:11:53.776429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CI1yxg3sg2TMb9pGih"]} -{"Format": "IDEA0", "ID": "968663fb-a1ea-4d75-92a6-f380ce47719c", "DetectTime": "2023-10-30T14:11:53.792786+02:00", "EventTime": "2023-10-30T14:11:53.792797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CXvFeD2BrYcWEFS5U7"]} -{"Format": "IDEA0", "ID": "e0af63dd-e33c-4ceb-b3b3-4983efd3023f", "DetectTime": "2023-10-30T14:11:53.807876+02:00", "EventTime": "2023-10-30T14:11:53.807891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CWZyVm4HxHpH6tB2k5"]} -{"Format": "IDEA0", "ID": "39a2bbf8-2734-44db-bbdb-7ad779af7e98", "DetectTime": "2023-10-30T14:11:53.824758+02:00", "EventTime": "2023-10-30T14:11:53.824768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Ch8OhSYKlcDPUJJZf"]} -{"Format": "IDEA0", "ID": "caae7738-974c-4004-9bdc-28007c0b6651", "DetectTime": "2023-10-30T14:11:53.855742+02:00", "EventTime": "2023-10-30T14:11:53.855754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C0lC8SuCbU2HjsvJl"]} -{"Format": "IDEA0", "ID": "e685fc93-35d0-4f88-a314-820f69f72661", "DetectTime": "2023-10-30T14:11:53.870813+02:00", "EventTime": "2023-10-30T14:11:53.870832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Ckc2xE3lfo1GsL0Ivf"]} -{"Format": "IDEA0", "ID": "3b6e3f58-8bad-4c05-a10d-44808e4f6638", "DetectTime": "2023-10-30T14:11:53.886021+02:00", "EventTime": "2023-10-30T14:11:53.886031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CYj3HX2L9UHIRynKze"]} -{"Format": "IDEA0", "ID": "8cc42ea9-41d0-44cb-a1a2-6477ac958280", "DetectTime": "2023-10-30T14:11:53.904579+02:00", "EventTime": "2023-10-30T14:11:53.904595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Chuz9S2inw6uoMEb18"]} -{"Format": "IDEA0", "ID": "eb05d642-9dd2-44be-9e58-6aef3bf358d0", "DetectTime": "2023-10-30T14:11:53.923483+02:00", "EventTime": "2023-10-30T14:11:53.923493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CStSpS1w7GiTNK9im7"]} -{"Format": "IDEA0", "ID": "643baf50-f580-4044-b106-47116adcfb22", "DetectTime": "2023-10-30T14:11:53.939022+02:00", "EventTime": "2023-10-30T14:11:53.939033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CtBEMO2rp0OMfisTIh"]} -{"Format": "IDEA0", "ID": "e5a69921-ae3c-46ee-8432-ae2cce715e1b", "DetectTime": "2023-10-30T14:11:53.955848+02:00", "EventTime": "2023-10-30T14:11:53.955860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CVmAMd2HxRo9PtEWx9"]} -{"Format": "IDEA0", "ID": "3645e6e4-c0af-4fff-88e2-0150e008ed75", "DetectTime": "2023-10-30T14:11:53.972457+02:00", "EventTime": "2023-10-30T14:11:53.972470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C58M5V2jXFin2rSXz7"]} -{"Format": "IDEA0", "ID": "6d47077b-d60c-444f-8086-51e072b86ffd", "DetectTime": "2023-10-30T14:11:53.985948+02:00", "EventTime": "2023-10-30T14:11:53.985961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXO2FA2KNBGibcHn3"]} -{"Format": "IDEA0", "ID": "b2a72351-d1e4-49f9-aac9-b142714e56f3", "DetectTime": "2023-10-30T14:11:54.002709+02:00", "EventTime": "2023-10-30T14:11:54.002728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmjD4WNC893Fa0YO9"]} -{"Format": "IDEA0", "ID": "bc96c110-857e-4e0d-a3b8-aa5fd66f4baa", "DetectTime": "2023-10-30T14:11:54.021453+02:00", "EventTime": "2023-10-30T14:11:54.021470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CqtEPW3RcD3aGXRhii"]} -{"Format": "IDEA0", "ID": "215c708b-06e3-4f2d-87c2-a83b1676f7a1", "DetectTime": "2023-10-30T14:11:54.053843+02:00", "EventTime": "2023-10-30T14:11:54.053856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CX470x44OHY851KbDe"]} -{"Format": "IDEA0", "ID": "93034fae-09d4-4f5b-b918-804ed19f163a", "DetectTime": "2023-10-30T14:11:54.069858+02:00", "EventTime": "2023-10-30T14:11:54.069875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cn3SlzWupr7k7G9k7"]} -{"Format": "IDEA0", "ID": "7a0122e8-955c-4be5-a952-a37d3562861b", "DetectTime": "2023-10-30T14:11:54.085077+02:00", "EventTime": "2023-10-30T14:11:54.085088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CVViHtOr7dhqiW4D"]} -{"Format": "IDEA0", "ID": "0e235a47-b220-4ca7-816f-c5a28086fe06", "DetectTime": "2023-10-30T14:11:54.102343+02:00", "EventTime": "2023-10-30T14:11:54.102359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cf9BpJ1yl71AAQ2Yq"]} -{"Format": "IDEA0", "ID": "796e586f-5512-45bb-aaa1-451552439974", "DetectTime": "2023-10-30T14:11:54.119377+02:00", "EventTime": "2023-10-30T14:11:54.119390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CY7SCWImAGDfoBBk"]} -{"Format": "IDEA0", "ID": "715a2245-0ba1-4c2c-b563-e9daa61be82e", "DetectTime": "2023-10-30T14:11:54.136043+02:00", "EventTime": "2023-10-30T14:11:54.136057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CxaCpN1hbiCNcR2bia"]} -{"Format": "IDEA0", "ID": "d70c9df0-857d-4cf7-a6bc-8174cf3c5a46", "DetectTime": "2023-10-30T14:11:54.151568+02:00", "EventTime": "2023-10-30T14:11:54.151590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CIWOPD3ZPdu3xg54x6"]} -{"Format": "IDEA0", "ID": "77c6e5f0-6f69-49d2-b057-ea23b3c97f01", "DetectTime": "2023-10-30T14:11:54.181829+02:00", "EventTime": "2023-10-30T14:11:54.181841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C2Unz552KtSiXCqdl"]} -{"Format": "IDEA0", "ID": "2c783169-2073-41e8-b374-df4d77abc68e", "DetectTime": "2023-10-30T14:11:54.195934+02:00", "EventTime": "2023-10-30T14:11:54.195947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CrPNyx20uirZ8ety7d"]} -{"Format": "IDEA0", "ID": "80fb5305-c0be-45f9-9eb1-18891671f879", "DetectTime": "2023-10-30T14:11:54.215539+02:00", "EventTime": "2023-10-30T14:11:54.215560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CW7aZe3CM2Ry0Xhp6h"]} -{"Format": "IDEA0", "ID": "c095bc2a-7373-48d3-b2a7-bcea0ce56db0", "DetectTime": "2023-10-30T14:11:54.236404+02:00", "EventTime": "2023-10-30T14:11:54.236423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cw7FHM2RbL5964V5Vk"]} -{"Format": "IDEA0", "ID": "221294e6-d5c0-4a58-8b16-06584a5bc920", "DetectTime": "2023-10-30T14:11:54.252202+02:00", "EventTime": "2023-10-30T14:11:54.252223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CILkHBQqn0dBsvSI4"]} -{"Format": "IDEA0", "ID": "3596a9c6-45c4-45f5-91fe-88e7260680c9", "DetectTime": "2023-10-30T14:11:54.267585+02:00", "EventTime": "2023-10-30T14:11:54.267596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C4LNaB2f2Q2yvLcoXc"]} -{"Format": "IDEA0", "ID": "fdf6c0d9-783c-4cf8-bb58-2a343f5dfab7", "DetectTime": "2023-10-30T14:11:54.284952+02:00", "EventTime": "2023-10-30T14:11:54.284964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CUb7zS3ocJIt8GpJec"]} -{"Format": "IDEA0", "ID": "6e9b88dc-6162-45a0-a0ef-995bd300a60c", "DetectTime": "2023-10-30T14:11:54.301054+02:00", "EventTime": "2023-10-30T14:11:54.301070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C65u9F4L8CpVYaavEc"]} -{"Format": "IDEA0", "ID": "ca9442f1-ebff-4362-84fc-3ed707a7dcdc", "DetectTime": "2023-10-30T14:11:54.316199+02:00", "EventTime": "2023-10-30T14:11:54.316209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Craw1i3e2IFQuUuae9"]} -{"Format": "IDEA0", "ID": "de212510-c004-49df-8bf8-02d072fc1df6", "DetectTime": "2023-10-30T14:11:54.332707+02:00", "EventTime": "2023-10-30T14:11:54.332723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C4Zqx61sZw8PIXjc37"]} -{"Format": "IDEA0", "ID": "bc3ced78-2ac8-4077-8c13-4e2ad3c9c004", "DetectTime": "2023-10-30T14:11:54.353031+02:00", "EventTime": "2023-10-30T14:11:54.353047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CvEyeXpttMgAf5Q11"]} -{"Format": "IDEA0", "ID": "26ce222e-bc77-4468-93b7-cec5f3324d3b", "DetectTime": "2023-10-30T14:11:54.369931+02:00", "EventTime": "2023-10-30T14:11:54.369946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CYXgqs33TQ9ZJBFepl"]} -{"Format": "IDEA0", "ID": "eea08d47-0788-4946-b730-b8ff726c11b2", "DetectTime": "2023-10-30T14:11:54.384037+02:00", "EventTime": "2023-10-30T14:11:54.384047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CxB1TR1osigjLBNgyc"]} -{"Format": "IDEA0", "ID": "82d506dd-5b27-427d-86fa-b215c8371fbc", "DetectTime": "2023-10-30T14:11:54.398206+02:00", "EventTime": "2023-10-30T14:11:54.398217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CJCmfO2dyHs1DewDSj"]} -{"Format": "IDEA0", "ID": "cb42a035-994d-4ab5-9a64-08f9c0316eb4", "DetectTime": "2023-10-30T14:11:54.413407+02:00", "EventTime": "2023-10-30T14:11:54.413423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C4sXqW38YmDqY5AMX2"]} -{"Format": "IDEA0", "ID": "c0b513a2-ba71-4f76-b78e-29a5610f0901", "DetectTime": "2023-10-30T14:11:54.427820+02:00", "EventTime": "2023-10-30T14:11:54.427831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C8zszG2DpxAGQa7Lr3"]} -{"Format": "IDEA0", "ID": "5cf11260-bdd9-496f-b6f3-04a385474712", "DetectTime": "2023-10-30T14:11:54.463614+02:00", "EventTime": "2023-10-30T14:11:54.463626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CHbL29400J8r2ZQB6c"]} -{"Format": "IDEA0", "ID": "34d3675b-3ae0-4404-bfa4-95c3fb518a4f", "DetectTime": "2023-10-30T14:11:54.477222+02:00", "EventTime": "2023-10-30T14:11:54.477234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cx9IEA1rBEGfEvmfb2"]} -{"Format": "IDEA0", "ID": "7d2af609-0de3-4068-88f5-ae9e17eca464", "DetectTime": "2023-10-30T14:11:54.494029+02:00", "EventTime": "2023-10-30T14:11:54.494040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CG5NJm42mptiTeJY89"]} -{"Format": "IDEA0", "ID": "cec32bb8-95ba-42a9-a2e9-4f27d1b9abc1", "DetectTime": "2023-10-30T14:11:54.511031+02:00", "EventTime": "2023-10-30T14:11:54.511045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C4iBcT2UzYKXHiiGGl"]} -{"Format": "IDEA0", "ID": "b42156b8-e77b-49e9-9c72-31c7e7ceaa4b", "DetectTime": "2023-10-30T14:11:54.526587+02:00", "EventTime": "2023-10-30T14:11:54.526602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Coub034lsIPR8Gbzy3"]} -{"Format": "IDEA0", "ID": "d1fb7fc7-566b-4c18-bbb3-cd6a28e1ffbc", "DetectTime": "2023-10-30T14:11:54.543577+02:00", "EventTime": "2023-10-30T14:11:54.543593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CtY7iQ1PGI2EEysTS5"]} -{"Format": "IDEA0", "ID": "7d30f1ba-20ee-4f0e-a5bb-3ea911349e14", "DetectTime": "2023-10-30T14:11:54.560574+02:00", "EventTime": "2023-10-30T14:11:54.560591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbH6Uw3qgInHF982t2"]} -{"Format": "IDEA0", "ID": "33b76d18-83fe-4969-8e9d-aaeeb3845c63", "DetectTime": "2023-10-30T14:11:54.575233+02:00", "EventTime": "2023-10-30T14:11:54.575244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C3iCOY2sbZWIBFxBbe"]} -{"Format": "IDEA0", "ID": "bb0f5636-7c29-4760-8069-bde2c4c9e331", "DetectTime": "2023-10-30T14:11:54.589290+02:00", "EventTime": "2023-10-30T14:11:54.589310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CYxf823qacnGuwaLLi"]} -{"Format": "IDEA0", "ID": "92d99be1-b8e1-43c3-bf50-f186924657cf", "DetectTime": "2023-10-30T14:11:54.605305+02:00", "EventTime": "2023-10-30T14:11:54.605316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C7I20haVuRsDPcPTl"]} -{"Format": "IDEA0", "ID": "30d18e10-582c-458e-83f8-2b41bdf47fd6", "DetectTime": "2023-10-30T14:11:54.621949+02:00", "EventTime": "2023-10-30T14:11:54.621959+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Czb3gl191NJOqv6Sre"]} -{"Format": "IDEA0", "ID": "bc25ff29-d544-4721-9b55-69f4adf2df1b", "DetectTime": "2023-10-30T14:11:54.640867+02:00", "EventTime": "2023-10-30T14:11:54.640882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CWT1M14iLywNGLygN2"]} -{"Format": "IDEA0", "ID": "7c257a6a-fe99-47f2-a7aa-c1580211d00b", "DetectTime": "2023-10-30T14:11:54.655852+02:00", "EventTime": "2023-10-30T14:11:54.655863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cr9gaw3ohUINcbXyXk"]} -{"Format": "IDEA0", "ID": "92c70c6b-24ca-4c56-98c9-6acbcc80e5cb", "DetectTime": "2023-10-30T14:11:54.673430+02:00", "EventTime": "2023-10-30T14:11:54.673445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CDDpb5JWdzoJegPCa"]} -{"Format": "IDEA0", "ID": "f81f30c4-bbaa-42b4-a93d-c1a0359115fd", "DetectTime": "2023-10-30T14:11:54.711091+02:00", "EventTime": "2023-10-30T14:11:54.711107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRMUtf2CBeo8JKPkgb"]} -{"Format": "IDEA0", "ID": "310e4dfe-ecd6-4e1b-b4e6-78fdc47b5c3d", "DetectTime": "2023-10-30T14:11:54.729771+02:00", "EventTime": "2023-10-30T14:11:54.729788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CIPy9h1G7WSOjrE6U8"]} -{"Format": "IDEA0", "ID": "cb3f918e-5e2c-448a-ba3e-9659b33fdc99", "DetectTime": "2023-10-30T14:11:54.745017+02:00", "EventTime": "2023-10-30T14:11:54.745034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CeMgXu3blOb7dnxR4"]} -{"Format": "IDEA0", "ID": "ce8eb5ef-9d31-42bf-beef-3822efb8d43e", "DetectTime": "2023-10-30T14:11:54.759342+02:00", "EventTime": "2023-10-30T14:11:54.759355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CG1aod3UGDH5utqfoc"]} -{"Format": "IDEA0", "ID": "1f6c8877-f831-4791-acc6-cf79b692c6ae", "DetectTime": "2023-10-30T14:11:54.774296+02:00", "EventTime": "2023-10-30T14:11:54.774309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C4Tcbq3nAYZL6KoiH8"]} -{"Format": "IDEA0", "ID": "9735158b-0043-444a-bb09-ebb48d65dbe4", "DetectTime": "2023-10-30T14:11:54.787450+02:00", "EventTime": "2023-10-30T14:11:54.787463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ck7P2z2VK1POnaRn14"]} -{"Format": "IDEA0", "ID": "2661c463-4b62-4285-8ecd-c88906ebf83a", "DetectTime": "2023-10-30T14:11:54.802349+02:00", "EventTime": "2023-10-30T14:11:54.802367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CgNB5l4dhwHAdrGOS6"]} -{"Format": "IDEA0", "ID": "c6f07ea3-9486-40e4-9136-21ee9978eefd", "DetectTime": "2023-10-30T14:11:54.830403+02:00", "EventTime": "2023-10-30T14:11:54.830414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CKBZUY3El4C3uwuNE1"]} -{"Format": "IDEA0", "ID": "b4edd375-7ce5-4923-a588-5c98b97643a7", "DetectTime": "2023-10-30T14:11:54.844616+02:00", "EventTime": "2023-10-30T14:11:54.844630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyoWYI32BaYrdGI7y8"]} -{"Format": "IDEA0", "ID": "86043bdd-cd8a-4206-aff6-55825fe99ebc", "DetectTime": "2023-10-30T14:11:54.862249+02:00", "EventTime": "2023-10-30T14:11:54.862259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Csi1NfFrVD5Uq3i4d"]} -{"Format": "IDEA0", "ID": "0edb0bde-ca5e-41a8-a823-0b4cc4511fd7", "DetectTime": "2023-10-30T14:11:54.879003+02:00", "EventTime": "2023-10-30T14:11:54.879015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CN4ayd1karSh3I4eX"]} -{"Format": "IDEA0", "ID": "c49e0a8c-e5f8-4cca-9a22-fe7ac4613acf", "DetectTime": "2023-10-30T14:11:54.893739+02:00", "EventTime": "2023-10-30T14:11:54.893750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CGz91y3cnFOzkN66si"]} -{"Format": "IDEA0", "ID": "106ad8a3-3b36-44a6-9890-42dd1176208d", "DetectTime": "2023-10-30T14:11:54.912040+02:00", "EventTime": "2023-10-30T14:11:54.912055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cc3zoP1zIos5SmSGok"]} -{"Format": "IDEA0", "ID": "cc7eb89f-7fd0-44b0-a38d-24409dd1b754", "DetectTime": "2023-10-30T14:11:54.926679+02:00", "EventTime": "2023-10-30T14:11:54.926698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CUKWLN25Dfi1EuJmEd"]} -{"Format": "IDEA0", "ID": "117a579e-824b-4f35-ab40-ca70292011a1", "DetectTime": "2023-10-30T14:11:54.944734+02:00", "EventTime": "2023-10-30T14:11:54.944749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CxeOca2mwNlgkMzcu2"]} -{"Format": "IDEA0", "ID": "842a9624-1f4b-4204-9537-48d249cee0c9", "DetectTime": "2023-10-30T14:11:54.963606+02:00", "EventTime": "2023-10-30T14:11:54.963617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CGPdPX3eyWQJvvNlIe"]} -{"Format": "IDEA0", "ID": "52d946f6-12ec-4a86-9a1a-da08ba2664fb", "DetectTime": "2023-10-30T14:11:54.980307+02:00", "EventTime": "2023-10-30T14:11:54.980318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CI7hTJ3buWUCsps2S8"]} -{"Format": "IDEA0", "ID": "cdd627ee-4069-4b36-8767-7e8f0bf56262", "DetectTime": "2023-10-30T14:11:54.995183+02:00", "EventTime": "2023-10-30T14:11:54.995194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CLfOyw2kHD2lwyD0Cj"]} -{"Format": "IDEA0", "ID": "9333c353-b6df-414e-b62f-d1f21aaf3b82", "DetectTime": "2023-10-30T14:11:55.015679+02:00", "EventTime": "2023-10-30T14:11:55.015696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CxCPLW3adMzD7Hz0ia"]} -{"Format": "IDEA0", "ID": "235b0452-e78d-4366-9ac2-86f644b63e1b", "DetectTime": "2023-10-30T14:11:55.032809+02:00", "EventTime": "2023-10-30T14:11:55.032820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CjbyCe1Ss6KUTpWiK1"]} -{"Format": "IDEA0", "ID": "47b4b6e8-0cf1-4911-8a57-55e89f8ed8d5", "DetectTime": "2023-10-30T14:11:55.046517+02:00", "EventTime": "2023-10-30T14:11:55.046530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJTEww1cZT5NHtrdQd"]} -{"Format": "IDEA0", "ID": "59c918e3-cd8e-4d14-b924-36260b36ce3c", "DetectTime": "2023-10-30T14:11:55.079556+02:00", "EventTime": "2023-10-30T14:11:55.079577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C3PTaw3soKkA3se28"]} -{"Format": "IDEA0", "ID": "dbc48342-4974-4de6-a1ba-afd30092db76", "DetectTime": "2023-10-30T14:11:55.096822+02:00", "EventTime": "2023-10-30T14:11:55.096838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C7TIqi2J5kv8zRIx3e"]} -{"Format": "IDEA0", "ID": "3499e7c2-71d7-48fe-b739-ff04fef16a2d", "DetectTime": "2023-10-30T14:11:55.111761+02:00", "EventTime": "2023-10-30T14:11:55.111773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C86rrG4CXnaWnvQsSg"]} -{"Format": "IDEA0", "ID": "efdd1daa-93a7-49ce-8311-95c787346f81", "DetectTime": "2023-10-30T14:11:55.130658+02:00", "EventTime": "2023-10-30T14:11:55.130674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CV2p3g24FpTWdclR69"]} -{"Format": "IDEA0", "ID": "8e961bd1-3406-4751-9bb3-32a066e7df2f", "DetectTime": "2023-10-30T14:11:55.147168+02:00", "EventTime": "2023-10-30T14:11:55.147180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CX17NsHZy2CIGmeW3"]} -{"Format": "IDEA0", "ID": "b1a4c191-959c-40ed-a849-e98f5deea4b5", "DetectTime": "2023-10-30T14:11:55.164483+02:00", "EventTime": "2023-10-30T14:11:55.164494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CHSoA43qOugJIK89lg"]} -{"Format": "IDEA0", "ID": "c5b1c4e6-508c-4896-88d8-f1e0320b7b13", "DetectTime": "2023-10-30T14:11:55.179715+02:00", "EventTime": "2023-10-30T14:11:55.179729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CDmElG4VQISmPxNys5"]} -{"Format": "IDEA0", "ID": "f1736928-b986-432d-b8b4-aa5760c93898", "DetectTime": "2023-10-30T14:11:55.197022+02:00", "EventTime": "2023-10-30T14:11:55.197033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CU6NGm47mHIjWRAsB2"]} -{"Format": "IDEA0", "ID": "db3a2e4c-fee8-4f71-9ff2-5679aad27d2e", "DetectTime": "2023-10-30T14:11:55.212914+02:00", "EventTime": "2023-10-30T14:11:55.212928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CflQ3kNdAlGyRRaBk"]} -{"Format": "IDEA0", "ID": "d0a1fa4a-3f84-4c0a-b100-b064dce17897", "DetectTime": "2023-10-30T14:11:55.226378+02:00", "EventTime": "2023-10-30T14:11:55.226389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CiRkgW1JF0J3CUaAde"]} -{"Format": "IDEA0", "ID": "810f07c9-eb32-4e7a-8757-29e1161bc817", "DetectTime": "2023-10-30T14:11:55.241218+02:00", "EventTime": "2023-10-30T14:11:55.241229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXwWQQOfU3w1FRtZ1"]} -{"Format": "IDEA0", "ID": "c141b9b1-8c89-4ae0-a6f5-b6d03882f68b", "DetectTime": "2023-10-30T14:11:55.256151+02:00", "EventTime": "2023-10-30T14:11:55.256161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CRz1Dk34uwDuuXu3x8"]} -{"Format": "IDEA0", "ID": "402ecf91-e030-43ae-83f7-f4e6876dc150", "DetectTime": "2023-10-30T14:11:55.271032+02:00", "EventTime": "2023-10-30T14:11:55.271046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CrZS9S3WTrx2xtAFl4"]} -{"Format": "IDEA0", "ID": "cba8f7d3-5850-4904-bbc6-931eac5f1212", "DetectTime": "2023-10-30T14:11:55.285760+02:00", "EventTime": "2023-10-30T14:11:55.285772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CRs5ii3nAl3lBEpa98"]} -{"Format": "Json", "ID": "cba8f7d3-5850-4904-bbc6-931eac5f1212", "DetectTime": "2023-10-30T14:11:55.285760+02:00", "EventTime": "2023-10-30T14:11:55.285772+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:06:41.147513+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:55.351629)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f48919d2-4243-4c2b-9caa-41a53df2abca", "DetectTime": "2023-10-30T14:11:55.356045+02:00", "EventTime": "2023-10-30T14:11:55.356059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CgNOyFJNkza0SDUY5"]} -{"Format": "IDEA0", "ID": "526aea4b-7e6d-4f8c-99a0-e722f95b5f96", "DetectTime": "2023-10-30T14:11:55.377672+02:00", "EventTime": "2023-10-30T14:11:55.377695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CyuLJ1tEYtJ7DOf9l"]} -{"Format": "IDEA0", "ID": "6e4f334a-5dcc-4c05-9a9f-710a7d86a2dc", "DetectTime": "2023-10-30T14:11:55.395039+02:00", "EventTime": "2023-10-30T14:11:55.395052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CHmADu2CCkZk7dV5Ie"]} -{"Format": "IDEA0", "ID": "12a8eb3a-6ae8-43ed-8567-97ed89ca932d", "DetectTime": "2023-10-30T14:11:55.415972+02:00", "EventTime": "2023-10-30T14:11:55.415991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CnUTKT11T4NkjiHfAe"]} -{"Format": "IDEA0", "ID": "97e9081c-1c82-4cd1-84ad-57f751a14eea", "DetectTime": "2023-10-30T14:11:55.434522+02:00", "EventTime": "2023-10-30T14:11:55.434539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CPwbew3LsYFbZkjh6"]} -{"Format": "IDEA0", "ID": "22bc9db7-6753-4354-bed6-15e381e72416", "DetectTime": "2023-10-30T14:11:55.453343+02:00", "EventTime": "2023-10-30T14:11:55.453358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CyNiSUZR4aw4QfDx2"]} -{"Format": "IDEA0", "ID": "2a601483-a7dd-46cb-ab19-693b99c0e114", "DetectTime": "2023-10-30T14:11:55.467391+02:00", "EventTime": "2023-10-30T14:11:55.467403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CrFvU52mT0Qqr8Hbeh"]} -{"Format": "IDEA0", "ID": "bc8f36a3-690b-423c-94d4-447d12be19ec", "DetectTime": "2023-10-30T14:11:55.486021+02:00", "EventTime": "2023-10-30T14:11:55.486032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CTkkgq225EQxe2E34j"]} -{"Format": "IDEA0", "ID": "d24f4411-1a0e-481b-999b-372acb41dc61", "DetectTime": "2023-10-30T14:11:55.512414+02:00", "EventTime": "2023-10-30T14:11:55.512427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CshKFTH3rCo7oWeCj"]} -{"Format": "IDEA0", "ID": "9f7aa04c-d566-4b43-b442-11d944b37632", "DetectTime": "2023-10-30T14:11:55.526893+02:00", "EventTime": "2023-10-30T14:11:55.526909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CttyPv4S5SeCmRu3T5"]} -{"Format": "IDEA0", "ID": "74ba97b9-2452-4e58-80fa-3a05082c3bab", "DetectTime": "2023-10-30T14:11:55.542671+02:00", "EventTime": "2023-10-30T14:11:55.542684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CamTA02rCyn55RG5I1"]} -{"Format": "IDEA0", "ID": "d95d6733-c432-4dfc-80a5-5737f03bd9c2", "DetectTime": "2023-10-30T14:11:55.562344+02:00", "EventTime": "2023-10-30T14:11:55.562360+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CCSROwXj0KkcSoit5"]} -{"Format": "IDEA0", "ID": "95d33755-7046-4121-bcc2-02b90d54b8c2", "DetectTime": "2023-10-30T14:11:55.586642+02:00", "EventTime": "2023-10-30T14:11:55.586658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CDNlaq2SPDeQUFha76"]} -{"Format": "IDEA0", "ID": "ea5a44bf-085d-45d4-909b-3f3fd9500f1f", "DetectTime": "2023-10-30T14:11:55.606302+02:00", "EventTime": "2023-10-30T14:11:55.606317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["ChCvpBQnCpaexQB1g"]} -{"Format": "IDEA0", "ID": "f69623c1-3628-4194-8a47-5d7c1502520f", "DetectTime": "2023-10-30T14:11:55.623429+02:00", "EventTime": "2023-10-30T14:11:55.623445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Ce5Bxh64gHrsRU1yi"]} -{"Format": "IDEA0", "ID": "3eb008db-f824-4d34-9e55-78cfcdb534e4", "DetectTime": "2023-10-30T14:11:55.642235+02:00", "EventTime": "2023-10-30T14:11:55.642250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CyoQda36xfDhMYBLQ7"]} -{"Format": "IDEA0", "ID": "f2b73c4f-b2fc-46c5-b00f-ff46e873853e", "DetectTime": "2023-10-30T14:11:55.659196+02:00", "EventTime": "2023-10-30T14:11:55.659207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CuJ8HB17ry0dSPyXwk"]} -{"Format": "IDEA0", "ID": "1664e766-fb6c-4b15-a079-eacb5cd0c27a", "DetectTime": "2023-10-30T14:11:55.678209+02:00", "EventTime": "2023-10-30T14:11:55.678224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CfMk4G3yQWnGgfis52"]} -{"Format": "IDEA0", "ID": "ba67bbe1-8b82-4d96-8512-9aa9d3ba4f91", "DetectTime": "2023-10-30T14:11:55.697954+02:00", "EventTime": "2023-10-30T14:11:55.697970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CEXUNJ3vKC1HrMf0El"]} -{"Format": "IDEA0", "ID": "157f6948-c906-4d17-960c-7d157fabb4e4", "DetectTime": "2023-10-30T14:11:55.717847+02:00", "EventTime": "2023-10-30T14:11:55.717863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C0Gj3m3SJJBBhsfTbd"]} -{"Format": "IDEA0", "ID": "1c6e5fad-d85e-42b3-8c2c-67efbe9a1717", "DetectTime": "2023-10-30T14:11:55.738428+02:00", "EventTime": "2023-10-30T14:11:55.738443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C5ha0m2m4lKj6H5eV"]} -{"Format": "IDEA0", "ID": "1a5a33fa-f594-4994-819e-a5901dd7261f", "DetectTime": "2023-10-30T14:11:55.760670+02:00", "EventTime": "2023-10-30T14:11:55.760683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ca7DrstSjeHWaVUn9"]} -{"Format": "IDEA0", "ID": "d084cb9c-6815-4f43-b291-7327563f032b", "DetectTime": "2023-10-30T14:11:55.789120+02:00", "EventTime": "2023-10-30T14:11:55.789140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cg6wXCiExTTYPXIo6"]} -{"Format": "IDEA0", "ID": "b2ee0579-4a81-427c-85ba-f149da8a5157", "DetectTime": "2023-10-30T14:11:55.803089+02:00", "EventTime": "2023-10-30T14:11:55.803100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C1AQri4MZQJZGDES1e"]} -{"Format": "IDEA0", "ID": "566fbc40-3e7a-4558-9e45-03fe46fc59a1", "DetectTime": "2023-10-30T14:11:55.817573+02:00", "EventTime": "2023-10-30T14:11:55.817585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CcCz0Q2SOfoCZJ1w9"]} -{"Format": "IDEA0", "ID": "82181e07-eb6a-4459-8d83-5f952d25ccb6", "DetectTime": "2023-10-30T14:11:55.835095+02:00", "EventTime": "2023-10-30T14:11:55.835111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CmG9F34aXKAIoptSX5"]} -{"Format": "IDEA0", "ID": "0cde335a-928d-49cf-895d-a9a5b1ba0f19", "DetectTime": "2023-10-30T14:11:55.853654+02:00", "EventTime": "2023-10-30T14:11:55.853671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CkyjhRarcskX95EM8"]} -{"Format": "IDEA0", "ID": "e31e429b-101f-4405-a7a6-e9663828716c", "DetectTime": "2023-10-30T14:11:55.870591+02:00", "EventTime": "2023-10-30T14:11:55.870604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CcpOhg9AN1X1diIqd"]} -{"Format": "IDEA0", "ID": "c58a41b6-f61a-434b-b419-f54aa49cf225", "DetectTime": "2023-10-30T14:11:55.884606+02:00", "EventTime": "2023-10-30T14:11:55.884618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C85n0X1CvvuycSUZO3"]} -{"Format": "IDEA0", "ID": "e3052dc3-dc4d-4dac-a001-243c6cd5a4a2", "DetectTime": "2023-10-30T14:11:55.902535+02:00", "EventTime": "2023-10-30T14:11:55.902549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CdjnK932OBKattcqG4"]} -{"Format": "IDEA0", "ID": "e91c4b30-6ab3-4f43-88df-308eb9733502", "DetectTime": "2023-10-30T14:11:55.916587+02:00", "EventTime": "2023-10-30T14:11:55.916598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C6Bdw02dC0fx9r0ZGl"]} -{"Format": "IDEA0", "ID": "5da8c955-ff7b-42b2-8ec4-a07fb801a71b", "DetectTime": "2023-10-30T14:11:55.931815+02:00", "EventTime": "2023-10-30T14:11:55.931832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cvb05G4k9au01akdNj"]} -{"Format": "IDEA0", "ID": "7de4edcd-bd1f-4290-aa38-e45f56be63f5", "DetectTime": "2023-10-30T14:11:55.946638+02:00", "EventTime": "2023-10-30T14:11:55.946652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cvvpf6lXlo7EZ92w"]} -{"Format": "IDEA0", "ID": "d400cccf-87b4-4927-8982-e580a5b93da4", "DetectTime": "2023-10-30T14:11:55.961951+02:00", "EventTime": "2023-10-30T14:11:55.961963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CWeNll2yMeCfGW2pUf"]} -{"Format": "IDEA0", "ID": "7492ea53-3aee-4c84-a1a6-7a90030c931d", "DetectTime": "2023-10-30T14:11:55.976934+02:00", "EventTime": "2023-10-30T14:11:55.976944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CY6K8Q1Qp6Mh1GKln"]} -{"Format": "IDEA0", "ID": "d15481d5-4705-4812-9885-d6da7542bff1", "DetectTime": "2023-10-30T14:11:55.993179+02:00", "EventTime": "2023-10-30T14:11:55.993195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cn1Voi1tNstt8VDHEj"]} -{"Format": "IDEA0", "ID": "5e752f9b-01c0-46c4-8794-fab39164bb41", "DetectTime": "2023-10-30T14:11:56.013186+02:00", "EventTime": "2023-10-30T14:11:56.013202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CQ2cQu1fLDMscebxza"]} -{"Format": "IDEA0", "ID": "5de5c2a3-a2af-43ff-b3f6-84fa84ffe865", "DetectTime": "2023-10-30T14:11:56.029255+02:00", "EventTime": "2023-10-30T14:11:56.029275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CN1YTd2Xprxya3XDg3"]} -{"Format": "IDEA0", "ID": "10d93674-5f38-438e-8183-8ea4f1de11b4", "DetectTime": "2023-10-30T14:11:56.061060+02:00", "EventTime": "2023-10-30T14:11:56.061075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CWCHYs2JgPAOkVv0Q9"]} -{"Format": "IDEA0", "ID": "5c646529-5ff3-4b31-b3a0-3507ee43136f", "DetectTime": "2023-10-30T14:11:56.076979+02:00", "EventTime": "2023-10-30T14:11:56.077006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cza1dw43VRRk65Zaye"]} -{"Format": "IDEA0", "ID": "a2eb1b9a-974d-4d12-adb0-8c210f48bce6", "DetectTime": "2023-10-30T14:11:56.092623+02:00", "EventTime": "2023-10-30T14:11:56.092638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CSeRzP3uo1AWJzOTn9"]} -{"Format": "IDEA0", "ID": "0a464156-2e02-4e0c-8334-8918c9663745", "DetectTime": "2023-10-30T14:11:56.108244+02:00", "EventTime": "2023-10-30T14:11:56.108256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CU1vWN1SiBna3PRCzi"]} -{"Format": "IDEA0", "ID": "2295bd3e-2380-4343-8880-35929ad1987d", "DetectTime": "2023-10-30T14:11:56.123165+02:00", "EventTime": "2023-10-30T14:11:56.123176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CWwQ4T2EyHbdn3FFF9"]} -{"Format": "IDEA0", "ID": "3c248532-1ac6-46a8-be63-4a8032acaa0a", "DetectTime": "2023-10-30T14:11:56.137579+02:00", "EventTime": "2023-10-30T14:11:56.137590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CTvOjO1Vo7fZncXKmh"]} -{"Format": "IDEA0", "ID": "8d097c74-6edb-4c8c-8f9c-0bee1ce680cc", "DetectTime": "2023-10-30T14:11:56.153318+02:00", "EventTime": "2023-10-30T14:11:56.153331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C8Ez2n1LmqO3ftpim7"]} -{"Format": "IDEA0", "ID": "5760b832-49f4-409e-a3f0-7dba6434761f", "DetectTime": "2023-10-30T14:11:56.177985+02:00", "EventTime": "2023-10-30T14:11:56.178000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Clarqj3Hm6ofXDLPd"]} -{"Format": "IDEA0", "ID": "acc4b908-7124-47c1-9dd6-67b10abedfa2", "DetectTime": "2023-10-30T14:11:56.201759+02:00", "EventTime": "2023-10-30T14:11:56.201772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CdR8Ny3fkldTmCIlK1"]} -{"Format": "IDEA0", "ID": "7ac9977f-6806-4054-b262-309967ff1301", "DetectTime": "2023-10-30T14:11:56.220542+02:00", "EventTime": "2023-10-30T14:11:56.220553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMG6iD1Cw0EIx4bDRb"]} -{"Format": "IDEA0", "ID": "13c71c21-8d58-4794-bf66-cc0c8557d403", "DetectTime": "2023-10-30T14:11:56.238838+02:00", "EventTime": "2023-10-30T14:11:56.238850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CRea5Y8RKT36MPQO2"]} -{"Format": "IDEA0", "ID": "3f2c4afe-7b9f-4bf1-9b7f-f5d7adf3a6a5", "DetectTime": "2023-10-30T14:11:56.257328+02:00", "EventTime": "2023-10-30T14:11:56.257339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CJ9mXn3vCvAo2EN6Of"]} -{"Format": "IDEA0", "ID": "589e34c7-521d-47e1-85bf-2cb86edb4652", "DetectTime": "2023-10-30T14:11:56.274648+02:00", "EventTime": "2023-10-30T14:11:56.274665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrG71u38wdIamLcGej"]} -{"Format": "IDEA0", "ID": "1f25ad77-e1f4-4537-ae4a-a9aa64f61510", "DetectTime": "2023-10-30T14:11:56.315144+02:00", "EventTime": "2023-10-30T14:11:56.315165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CPtXjQ168cCkZy3XI3"]} -{"Format": "IDEA0", "ID": "8b106a90-0799-4a52-a339-13a257ff0ecb", "DetectTime": "2023-10-30T14:11:56.363985+02:00", "EventTime": "2023-10-30T14:11:56.364009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CCbhcs2X2ddasrfcU7"]} -{"Format": "IDEA0", "ID": "33a83717-6bf9-40ba-8af4-e3fbf9c6f488", "DetectTime": "2023-10-30T14:11:56.416863+02:00", "EventTime": "2023-10-30T14:11:56.416883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CiffbE3lvHCJXwqWyd"]} -{"Format": "IDEA0", "ID": "d3dd70fb-c0c4-416e-8196-a49145ae63e1", "DetectTime": "2023-10-30T14:11:56.450759+02:00", "EventTime": "2023-10-30T14:11:56.450797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CILZu32oTSVmmyu975"]} -{"Format": "IDEA0", "ID": "f1077cea-f56e-4cc7-ba47-76e8e814bdfe", "DetectTime": "2023-10-30T14:11:56.513017+02:00", "EventTime": "2023-10-30T14:11:56.513039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CHkEFK3rOBpwVzZJog"]} -{"Format": "IDEA0", "ID": "f7b7c4e4-c281-498b-8d4d-a7144540d877", "DetectTime": "2023-10-30T14:11:56.583997+02:00", "EventTime": "2023-10-30T14:11:56.584021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CJBEWA24fJznhcY2J5"]} -{"Format": "IDEA0", "ID": "90b1c0a8-ee49-4fea-8e83-9f57672435e0", "DetectTime": "2023-10-30T14:11:56.631488+02:00", "EventTime": "2023-10-30T14:11:56.631505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CtIfeu1UomoWlvGFH7"]} -{"Format": "IDEA0", "ID": "36c7a51e-9bce-4ecb-8b56-45aefd567b5b", "DetectTime": "2023-10-30T14:11:56.652593+02:00", "EventTime": "2023-10-30T14:11:56.652605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CH33Nxh0POSL57Zp9"]} -{"Format": "IDEA0", "ID": "40dd3d2a-7cc8-4f1f-9ea8-f0f5b2186632", "DetectTime": "2023-10-30T14:11:56.673041+02:00", "EventTime": "2023-10-30T14:11:56.673058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cy9mtI1Iiv6OEKEgN8"]} -{"Format": "IDEA0", "ID": "1c86c46c-bec9-4c88-9fc1-dfd5ecdc7eb2", "DetectTime": "2023-10-30T14:11:56.689527+02:00", "EventTime": "2023-10-30T14:11:56.689537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CKVQ7526N1teQfWKe5"]} -{"Format": "IDEA0", "ID": "e5c9a3da-5800-45ba-ac3d-031293cf82de", "DetectTime": "2023-10-30T14:11:56.709102+02:00", "EventTime": "2023-10-30T14:11:56.709112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CcEOqG47YhqqOaeeg3"]} -{"Format": "IDEA0", "ID": "14383386-f378-44d2-a0a2-4b802a51fa28", "DetectTime": "2023-10-30T14:11:56.731245+02:00", "EventTime": "2023-10-30T14:11:56.731260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CUxxQm4XDhdZaM4Vfg"]} -{"Format": "IDEA0", "ID": "8cb85079-8e56-42ed-b17e-8aa16e4c609d", "DetectTime": "2023-10-30T14:11:56.755122+02:00", "EventTime": "2023-10-30T14:11:56.755134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C5jCTg1jWERinZFQ55"]} -{"Format": "IDEA0", "ID": "4f0fd20a-b027-4a9d-a612-b1ca26e82686", "DetectTime": "2023-10-30T14:11:56.772852+02:00", "EventTime": "2023-10-30T14:11:56.772862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CAZxCVOeuQsxJXdE9"]} -{"Format": "IDEA0", "ID": "f435ad68-b4b5-44e6-a903-d6df6da916d7", "DetectTime": "2023-10-30T14:11:56.791070+02:00", "EventTime": "2023-10-30T14:11:56.791082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CuBI4S3XOLZ43zPWaj"]} -{"Format": "IDEA0", "ID": "1f27545b-a594-40bd-a856-f0daf8bf7fc3", "DetectTime": "2023-10-30T14:11:56.809918+02:00", "EventTime": "2023-10-30T14:11:56.809930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CJ2WZJ11X8ohS56j12"]} -{"Format": "IDEA0", "ID": "8670d8a6-bc1d-4beb-98d0-a9bec8d7ec97", "DetectTime": "2023-10-30T14:11:56.829178+02:00", "EventTime": "2023-10-30T14:11:56.829188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CSBlA917jlqgiauhs3"]} -{"Format": "IDEA0", "ID": "a1956e6a-e493-4b6a-80cd-d6d838cf5113", "DetectTime": "2023-10-30T14:11:56.862945+02:00", "EventTime": "2023-10-30T14:11:56.862962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C9Eo8V1VCu0q765325"]} -{"Format": "IDEA0", "ID": "83f34d8e-3ca5-40fa-8cdd-39dd36a5ad19", "DetectTime": "2023-10-30T14:11:56.886973+02:00", "EventTime": "2023-10-30T14:11:56.886989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CohVmP1WpVqFbjlY1d"]} -{"Format": "IDEA0", "ID": "40ae4f16-cfe6-490b-b3a2-2761a4a48222", "DetectTime": "2023-10-30T14:11:56.905877+02:00", "EventTime": "2023-10-30T14:11:56.905887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CW0kQ61bkHZR5hZvh"]} -{"Format": "IDEA0", "ID": "a5aa9b52-e5b2-4d3d-b346-2d8ed892aa96", "DetectTime": "2023-10-30T14:11:56.925808+02:00", "EventTime": "2023-10-30T14:11:56.925820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C6LSxi39zb9utOv4A1"]} -{"Format": "IDEA0", "ID": "f346441e-319d-466f-a40f-19612355280d", "DetectTime": "2023-10-30T14:11:56.950835+02:00", "EventTime": "2023-10-30T14:11:56.950851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cum5Q64PNrGTtqiR3l"]} -{"Format": "IDEA0", "ID": "11298f11-a711-4166-9291-386e65052a1d", "DetectTime": "2023-10-30T14:11:56.975595+02:00", "EventTime": "2023-10-30T14:11:56.975614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXSUuk4DYX3ATEDLu7"]} -{"Format": "IDEA0", "ID": "9adbff53-aedf-422e-85b1-53bc67925cdb", "DetectTime": "2023-10-30T14:11:56.996186+02:00", "EventTime": "2023-10-30T14:11:56.996205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXQ5Xz1HZdOj6Cbrk7"]} -{"Format": "IDEA0", "ID": "174a372d-8238-4e5e-a13a-688cf069a72c", "DetectTime": "2023-10-30T14:11:57.020295+02:00", "EventTime": "2023-10-30T14:11:57.020307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CScW0p2sHt9h1aER8l"]} -{"Format": "IDEA0", "ID": "10cd8811-21d2-49f5-b2bf-6c7205582822", "DetectTime": "2023-10-30T14:11:57.038801+02:00", "EventTime": "2023-10-30T14:11:57.038813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CR2cgnQQqeIFRaA6l"]} -{"Format": "IDEA0", "ID": "25e80c5a-abd5-4906-8053-ba2fe9505097", "DetectTime": "2023-10-30T14:11:57.057266+02:00", "EventTime": "2023-10-30T14:11:57.057278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CfPiFW2ILrCt3mDMKi"]} -{"Format": "IDEA0", "ID": "91c47d81-8a7e-492b-a408-1d04e907c7ef", "DetectTime": "2023-10-30T14:11:57.078289+02:00", "EventTime": "2023-10-30T14:11:57.078305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Czscpm3rxnmq5K4Ubk"]} -{"Format": "IDEA0", "ID": "1ae0f62a-3ee5-4a1a-aa73-ddd1d551f006", "DetectTime": "2023-10-30T14:11:57.095978+02:00", "EventTime": "2023-10-30T14:11:57.095997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CeOb7889dZQxNwWc7"]} -{"Format": "IDEA0", "ID": "143835ae-4126-42e1-8173-3f12f48253d3", "DetectTime": "2023-10-30T14:11:57.124163+02:00", "EventTime": "2023-10-30T14:11:57.124174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CboXxT3OvZlQvykhDa"]} -{"Format": "IDEA0", "ID": "0029ab63-22a1-4148-bdd2-26c1cdbf61e5", "DetectTime": "2023-10-30T14:11:57.147682+02:00", "EventTime": "2023-10-30T14:11:57.147698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CyHHWkg1Bri85hoD3"]} -{"Format": "IDEA0", "ID": "8e8ac5c6-83b6-4083-a8d5-5f39015906d7", "DetectTime": "2023-10-30T14:11:57.169744+02:00", "EventTime": "2023-10-30T14:11:57.169757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CAE5xObBwHbJ6Duyb"]} -{"Format": "IDEA0", "ID": "1592aa60-4d2c-4c8f-9b99-47f2fca6d131", "DetectTime": "2023-10-30T14:11:57.190213+02:00", "EventTime": "2023-10-30T14:11:57.190228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CV7sv82cgczTMEU47g"]} -{"Format": "IDEA0", "ID": "fd834d79-3663-4512-b6be-18a2ca18ae7a", "DetectTime": "2023-10-30T14:11:57.213652+02:00", "EventTime": "2023-10-30T14:11:57.213667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CEW9FK1ETQXUyqktHc"]} -{"Format": "IDEA0", "ID": "c7903e73-aa10-4ed8-b29c-9e0375c3095b", "DetectTime": "2023-10-30T14:11:57.235001+02:00", "EventTime": "2023-10-30T14:11:57.235015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CFUKLhf9Tr4eFEn76"]} -{"Format": "IDEA0", "ID": "dd3bd41e-f50d-4db0-816e-0afa3445a9b3", "DetectTime": "2023-10-30T14:11:57.257263+02:00", "EventTime": "2023-10-30T14:11:57.257279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CyOCx4A8dtGNtsr6f"]} -{"Format": "IDEA0", "ID": "d4b6559e-e9b6-4572-ac6d-c2c0e6707529", "DetectTime": "2023-10-30T14:11:57.281298+02:00", "EventTime": "2023-10-30T14:11:57.281313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CawyuYrhIpj7tscdg"]} -{"Format": "Json", "ID": "d4b6559e-e9b6-4572-ac6d-c2c0e6707529", "DetectTime": "2023-10-30T14:11:57.281298+02:00", "EventTime": "2023-10-30T14:11:57.281313+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:06:43.147331+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:57.357965)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3cd2914-c625-4243-b8f0-34ceede15c7a", "DetectTime": "2023-10-30T14:11:57.363694+02:00", "EventTime": "2023-10-30T14:11:57.363712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["C1lCzQ3nX1toPfQ0P2"]} -{"Format": "IDEA0", "ID": "60752217-ef26-41d8-b957-578d892af7d1", "DetectTime": "2023-10-30T14:11:57.384350+02:00", "EventTime": "2023-10-30T14:11:57.384362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cn7Pp61NhDqF24btH4"]} -{"Format": "IDEA0", "ID": "05f12355-0660-4367-b900-d9124be8c2de", "DetectTime": "2023-10-30T14:11:57.415245+02:00", "EventTime": "2023-10-30T14:11:57.415260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CGT3wn2uX8LEN6VHX"]} -{"Format": "IDEA0", "ID": "09c9e294-bf06-4ce9-bafa-027b26efd56a", "DetectTime": "2023-10-30T14:11:57.447452+02:00", "EventTime": "2023-10-30T14:11:57.447468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXv0W530EdrsdCpDA1"]} -{"Format": "IDEA0", "ID": "68606377-5dcc-4cf6-8531-0c65a2bebe73", "DetectTime": "2023-10-30T14:11:57.468985+02:00", "EventTime": "2023-10-30T14:11:57.469002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0y0kU30bpWnpN26Q1"]} -{"Format": "IDEA0", "ID": "b3280766-0bed-47ed-ab24-480b4e7bac3f", "DetectTime": "2023-10-30T14:11:57.498281+02:00", "EventTime": "2023-10-30T14:11:57.498299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CzltOP2qvNsGdiq7nf"]} -{"Format": "IDEA0", "ID": "16a2a558-c923-4c27-95b8-175f95319c12", "DetectTime": "2023-10-30T14:11:57.529343+02:00", "EventTime": "2023-10-30T14:11:57.529356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CPX6694DLYfcoWY1U8"]} -{"Format": "IDEA0", "ID": "f938bb91-559d-4e98-be37-920af5c9ba9b", "DetectTime": "2023-10-30T14:11:57.558919+02:00", "EventTime": "2023-10-30T14:11:57.558936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CxmOQu2WDJjSS7KO93"]} -{"Format": "IDEA0", "ID": "7a0f9f18-fdbd-43b0-9143-01addce3ed14", "DetectTime": "2023-10-30T14:11:57.589040+02:00", "EventTime": "2023-10-30T14:11:57.589055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C9qleh3R0kDygjNA0i"]} -{"Format": "IDEA0", "ID": "e6c9ec36-a753-4491-b007-13ed23761a48", "DetectTime": "2023-10-30T14:11:57.618587+02:00", "EventTime": "2023-10-30T14:11:57.618598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CvhTF32cQ1j7K6bZ2h"]} -{"Format": "Json", "ID": "e6c9ec36-a753-4491-b007-13ed23761a48", "DetectTime": "2023-10-30T14:11:57.618587+02:00", "EventTime": "2023-10-30T14:11:57.618598+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:37:01.280028+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:57.687616)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6857ddf9-4865-4060-8b43-57ae468d31e5", "DetectTime": "2023-10-30T14:11:57.692528+02:00", "EventTime": "2023-10-30T14:11:57.692539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CDlQfz4llRFFuxcmQj"]} -{"Format": "IDEA0", "ID": "166b348d-3c83-4e09-908c-8a85acde889c", "DetectTime": "2023-10-30T14:11:57.713018+02:00", "EventTime": "2023-10-30T14:11:57.713042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["ChehQTGmRPC7Lbok4"]} -{"Format": "IDEA0", "ID": "69b6ecbc-4376-4b72-9e38-09fdd95dddd4", "DetectTime": "2023-10-30T14:11:57.741472+02:00", "EventTime": "2023-10-30T14:11:57.741489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["COOfmC0CKl3nrpCFf"]} -{"Format": "IDEA0", "ID": "aa8f4c9b-0455-4c14-b80d-93d0cac7f47d", "DetectTime": "2023-10-30T14:11:57.774384+02:00", "EventTime": "2023-10-30T14:11:57.774403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CEPzu34yV6LASwLEqd"]} -{"Format": "IDEA0", "ID": "4e199e80-767d-4c47-8c93-bfb15ca3c174", "DetectTime": "2023-10-30T14:11:57.804604+02:00", "EventTime": "2023-10-30T14:11:57.804620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CNERzv45XbjLK7LOh8"]} -{"Format": "IDEA0", "ID": "5d5433eb-cacc-40aa-aa28-21fc6f27b9d5", "DetectTime": "2023-10-30T14:11:57.836061+02:00", "EventTime": "2023-10-30T14:11:57.836078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CUUupv3oPqRr3sqY7"]} -{"Format": "IDEA0", "ID": "267ac4e0-41b1-442e-ae2f-d59adafca248", "DetectTime": "2023-10-30T14:11:57.869329+02:00", "EventTime": "2023-10-30T14:11:57.869342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CQlJBd2hvT0SOcnd5k"]} -{"Format": "IDEA0", "ID": "b8465acc-d224-4bae-82ed-710a4b985be5", "DetectTime": "2023-10-30T14:11:57.901432+02:00", "EventTime": "2023-10-30T14:11:57.901450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CkFMkj3QtWWQFy18v7"]} -{"Format": "IDEA0", "ID": "d8d19d11-8e4f-40ad-a533-810fcb548385", "DetectTime": "2023-10-30T14:11:57.922615+02:00", "EventTime": "2023-10-30T14:11:57.922632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CQyPZI3tiU5ynIHVii"]} -{"Format": "IDEA0", "ID": "c6a60f26-dbb3-4334-a97a-2d73202463f3", "DetectTime": "2023-10-30T14:11:57.953253+02:00", "EventTime": "2023-10-30T14:11:57.953270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["COj2MJ3leQluQSCQRg"]} -{"Format": "Json", "ID": "c6a60f26-dbb3-4334-a97a-2d73202463f3", "DetectTime": "2023-10-30T14:11:57.953253+02:00", "EventTime": "2023-10-30T14:11:57.953270+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:37:03.427835+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:58.018117)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "75f35a1b-9ca7-4365-8a1a-dc47c964ec07", "DetectTime": "2023-10-30T14:11:58.022268+02:00", "EventTime": "2023-10-30T14:11:58.022282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CO2yUt29PGsni8tvuc"]} -{"Format": "IDEA0", "ID": "f52ef296-9d2a-4b10-b626-7adf03916df1", "DetectTime": "2023-10-30T14:11:58.052132+02:00", "EventTime": "2023-10-30T14:11:58.052153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CvQE0k2DnTukyO0PIe"]} -{"Format": "IDEA0", "ID": "f97f0ccd-2004-4f04-a8ec-f8dc2320377e", "DetectTime": "2023-10-30T14:11:58.079547+02:00", "EventTime": "2023-10-30T14:11:58.079575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CZshdK2AAGl6vbLxL7"]} -{"Format": "IDEA0", "ID": "a4ac4cee-ad57-43e7-b619-58ebdfc974ca", "DetectTime": "2023-10-30T14:11:58.106356+02:00", "EventTime": "2023-10-30T14:11:58.106369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Cd6CME3RqcqtzdqRd7"]} -{"Format": "IDEA0", "ID": "8c1f0bf4-7f81-4509-aa82-fb07fe8b1984", "DetectTime": "2023-10-30T14:11:58.127775+02:00", "EventTime": "2023-10-30T14:11:58.127791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C0AzyP8xcD0yOyRp9"]} -{"Format": "IDEA0", "ID": "4d67695d-f3c5-4133-946a-b1927209c176", "DetectTime": "2023-10-30T14:11:58.153276+02:00", "EventTime": "2023-10-30T14:11:58.153289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cw4OHc3EScxo9YL2hf"]} -{"Format": "IDEA0", "ID": "4f99ba8b-1c8d-46e1-87fd-cad7b77bd7a4", "DetectTime": "2023-10-30T14:11:58.178709+02:00", "EventTime": "2023-10-30T14:11:58.178722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C5i4gY1GRHPu2N4fEb"]} -{"Format": "IDEA0", "ID": "5d1a0836-56d6-4931-83d6-c18622d06a64", "DetectTime": "2023-10-30T14:11:58.203197+02:00", "EventTime": "2023-10-30T14:11:58.203213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Ce1vZSjhkQLNwWYa8"]} -{"Format": "IDEA0", "ID": "2a78b3c7-aca3-4bf7-a34d-56d3994fb8ff", "DetectTime": "2023-10-30T14:11:58.229686+02:00", "EventTime": "2023-10-30T14:11:58.229702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C6bB0N1eXAkjzLdDf8"]} -{"Format": "Json", "ID": "2a78b3c7-aca3-4bf7-a34d-56d3994fb8ff", "DetectTime": "2023-10-30T14:11:58.229686+02:00", "EventTime": "2023-10-30T14:11:58.229702+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:37:05.122254+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:58.294539)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e4ad00b-cc45-4610-a748-5c0617ae0b15", "DetectTime": "2023-10-30T14:11:58.299474+02:00", "EventTime": "2023-10-30T14:11:58.299491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPH4DT38g0dEBLq0A1"]} -{"Format": "IDEA0", "ID": "f189e357-978b-4694-9253-534f65f4d77e", "DetectTime": "2023-10-30T14:11:58.325605+02:00", "EventTime": "2023-10-30T14:11:58.325624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CqwAAc3ssLQ9jMVgxb"]} -{"Format": "IDEA0", "ID": "d8ec9ae4-f016-4cb7-95f2-270e6e26ac79", "DetectTime": "2023-10-30T14:11:58.349866+02:00", "EventTime": "2023-10-30T14:11:58.349881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CE1J3b4i2fED7SYbWd"]} -{"Format": "IDEA0", "ID": "caa33ea9-dfd2-4cbd-a613-9ac0cc0519e8", "DetectTime": "2023-10-30T14:11:58.372850+02:00", "EventTime": "2023-10-30T14:11:58.372866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C1er2Q1tj1YPEdUQm8"]} -{"Format": "IDEA0", "ID": "983b5385-cf53-4145-9a8e-90aed70e7de1", "DetectTime": "2023-10-30T14:11:58.397688+02:00", "EventTime": "2023-10-30T14:11:58.397708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CCQ0hV1zOS8nk7Leh1"]} -{"Format": "IDEA0", "ID": "3d8ff5dd-c387-4a3c-84dd-17204d5861f9", "DetectTime": "2023-10-30T14:11:58.422759+02:00", "EventTime": "2023-10-30T14:11:58.422771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C4NH072AvEBkS1Fzzl"]} -{"Format": "IDEA0", "ID": "3f30887a-b243-4dd1-aa03-18e3f8ff61d0", "DetectTime": "2023-10-30T14:11:58.449171+02:00", "EventTime": "2023-10-30T14:11:58.449188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CI36lY27zkd6L6mz58"]} -{"Format": "IDEA0", "ID": "a3bd911c-0590-4572-97a7-812414fa19c7", "DetectTime": "2023-10-30T14:11:58.474696+02:00", "EventTime": "2023-10-30T14:11:58.474708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CiIg7C1jA2sviOzCa9"]} -{"Format": "IDEA0", "ID": "e30697a1-70f0-4455-96d9-95822e127d80", "DetectTime": "2023-10-30T14:11:58.498699+02:00", "EventTime": "2023-10-30T14:11:58.498711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ck6SJ92BQ8cPavt4H4"]} -{"Format": "Json", "ID": "e30697a1-70f0-4455-96d9-95822e127d80", "DetectTime": "2023-10-30T14:11:58.498699+02:00", "EventTime": "2023-10-30T14:11:58.498711+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T04:37:07.214958+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2023/10/30 14:11:58.562964)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "42ef0717-044b-4006-a905-ec6ab7beecd2", "DetectTime": "2023-10-30T14:11:58.567366+02:00", "EventTime": "2023-10-30T14:11:58.567378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cf2abA2qJ4GFj2BxXc"]} -{"Format": "IDEA0", "ID": "5c648bc0-2966-4679-a229-fb11c442b5a1", "DetectTime": "2023-10-30T14:11:58.589311+02:00", "EventTime": "2023-10-30T14:11:58.589328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLriQF1ACMSBIHpM82"]} -{"Format": "IDEA0", "ID": "343f07ec-afc9-4477-a782-e6457acf7338", "DetectTime": "2023-10-30T14:11:58.610771+02:00", "EventTime": "2023-10-30T14:11:58.610800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["Cmzt4w45aHuvL1JGjc"]} -{"Format": "IDEA0", "ID": "c3576b1c-9122-4dde-b43f-485476928af7", "DetectTime": "2023-10-30T14:11:58.645088+02:00", "EventTime": "2023-10-30T14:11:58.645105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CCxuJj1dFpfYwU1yNk"]} -{"Format": "IDEA0", "ID": "6b5b132a-bbf1-45f6-b3f2-977d1eab9fe2", "DetectTime": "2023-10-30T14:11:58.683247+02:00", "EventTime": "2023-10-30T14:11:58.683265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C6dcuWylES8yu4vo1"]} -{"Format": "IDEA0", "ID": "b97e97c0-a67f-4675-92c8-548e06e0c37f", "DetectTime": "2023-10-30T14:11:58.717611+02:00", "EventTime": "2023-10-30T14:11:58.717627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C7uFog2bFGkiotlzIb"]} -{"Format": "IDEA0", "ID": "3e5f94a4-88ca-454f-8622-dc981bd4fe61", "DetectTime": "2023-10-30T14:11:58.752041+02:00", "EventTime": "2023-10-30T14:11:58.752054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CiefdX3ouMCXFRJaKf"]} -{"Format": "IDEA0", "ID": "c69da7bb-f6c3-4bd4-9015-0bb4cfcdd5c3", "DetectTime": "2023-10-30T14:11:58.792205+02:00", "EventTime": "2023-10-30T14:11:58.792216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C2bhhTOFY6bEdj4N2"]} -{"Format": "IDEA0", "ID": "561eb3a5-0577-4afd-b42e-3d155e234a69", "DetectTime": "2023-10-30T14:11:58.828871+02:00", "EventTime": "2023-10-30T14:11:58.828888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CfGhJy2M4sccyzuIml"]} -{"Format": "IDEA0", "ID": "398db2d4-61e0-49d3-866e-3fc4229f99d3", "DetectTime": "2023-10-30T14:11:58.866229+02:00", "EventTime": "2023-10-30T14:11:58.866246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CMVhn62lbUymYi40Ge"]} -{"Format": "Json", "ID": "398db2d4-61e0-49d3-866e-3fc4229f99d3", "DetectTime": "2023-10-30T14:11:58.866229+02:00", "EventTime": "2023-10-30T14:11:58.866246+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:07:32.298859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:11:58.942025)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "68344de7-9dbb-4a9a-b672-f1c4617359e6", "DetectTime": "2023-10-30T14:11:58.947765+02:00", "EventTime": "2023-10-30T14:11:58.947791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CeURSH2hMVrUdKHV34"]} -{"Format": "IDEA0", "ID": "d524fe26-57bf-4aa4-876e-cba8542ba5b2", "DetectTime": "2023-10-30T14:11:58.981972+02:00", "EventTime": "2023-10-30T14:11:58.981987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNz0z92tJUq59ZPq44"]} -{"Format": "IDEA0", "ID": "a54173be-0dc9-4f9f-9ac2-30b5737eb0a2", "DetectTime": "2023-10-30T14:11:59.011384+02:00", "EventTime": "2023-10-30T14:11:59.011400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CTXP6j3c2lhzrR3Zb"]} -{"Format": "IDEA0", "ID": "e5e57bbe-83e6-45fe-b122-5a13969a4428", "DetectTime": "2023-10-30T14:11:59.041856+02:00", "EventTime": "2023-10-30T14:11:59.041869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CowZue3QjOcmk8MEok"]} -{"Format": "IDEA0", "ID": "73e2b80c-a788-44dc-9f86-fd6d44597e1a", "DetectTime": "2023-10-30T14:11:59.074440+02:00", "EventTime": "2023-10-30T14:11:59.074456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cs6vJ14EeXOpncdtc6"]} -{"Format": "IDEA0", "ID": "c2f96ef8-aa4a-4a5f-8a6f-1c1c1e77dd16", "DetectTime": "2023-10-30T14:11:59.110358+02:00", "EventTime": "2023-10-30T14:11:59.110374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CzCNI0167Y99lqMrel"]} -{"Format": "IDEA0", "ID": "081e0fbe-757a-460e-b686-c8e279ccc12d", "DetectTime": "2023-10-30T14:11:59.143728+02:00", "EventTime": "2023-10-30T14:11:59.143745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C1qYo24LOHG5agZVJ3"]} -{"Format": "IDEA0", "ID": "2bd34fb3-d42c-48c5-b69e-7528f3346e69", "DetectTime": "2023-10-30T14:11:59.176690+02:00", "EventTime": "2023-10-30T14:11:59.176705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C7C4nr1MWhmYvGo0kf"]} -{"Format": "Json", "ID": "2bd34fb3-d42c-48c5-b69e-7528f3346e69", "DetectTime": "2023-10-30T14:11:59.176690+02:00", "EventTime": "2023-10-30T14:11:59.176705+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:07:34.333221+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:11:59.252117)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "538abd3c-09b0-4213-9876-0da9ac62372d", "DetectTime": "2023-10-30T14:11:59.257456+02:00", "EventTime": "2023-10-30T14:11:59.257469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cv4dhG1vRSzCQHG2v"]} -{"Format": "IDEA0", "ID": "04cd01c9-af00-429c-b06f-ef5f95c64d08", "DetectTime": "2023-10-30T14:11:59.289039+02:00", "EventTime": "2023-10-30T14:11:59.289054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cw8ICp1YLuKL1P7X16"]} -{"Format": "IDEA0", "ID": "83985dea-4660-473f-822f-398b4ac050a2", "DetectTime": "2023-10-30T14:11:59.322950+02:00", "EventTime": "2023-10-30T14:11:59.322966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CrlnJz2vwxLmqExpeh"]} -{"Format": "IDEA0", "ID": "213e2922-de8e-4dc0-893b-adf589f5ddc0", "DetectTime": "2023-10-30T14:11:59.346116+02:00", "EventTime": "2023-10-30T14:11:59.346136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0xj6p2VPu7fNBzWC1"]} -{"Format": "IDEA0", "ID": "ef21a92b-db36-498b-88b4-ca52f0be9a10", "DetectTime": "2023-10-30T14:11:59.375144+02:00", "EventTime": "2023-10-30T14:11:59.375155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cn92mu3gvkM7xfTug8"]} -{"Format": "IDEA0", "ID": "0c7fc969-5db5-45f4-9ec8-c4cd3e5dcce2", "DetectTime": "2023-10-30T14:11:59.404902+02:00", "EventTime": "2023-10-30T14:11:59.404919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CBvsgM2JWNAvVCttwl"]} -{"Format": "IDEA0", "ID": "9c9223c5-8bf3-4fd0-9b00-8b2190bcf0a8", "DetectTime": "2023-10-30T14:11:59.435006+02:00", "EventTime": "2023-10-30T14:11:59.435024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CKSmfb2pFreEU6bk26"]} -{"Format": "IDEA0", "ID": "c0a287b6-1317-443c-ba26-9c4fc1c5522e", "DetectTime": "2023-10-30T14:11:59.467015+02:00", "EventTime": "2023-10-30T14:11:59.467027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CsePy44OOtWALV2Wdf"]} -{"Format": "IDEA0", "ID": "07b8a148-16cf-4b14-9a45-f52cc464ab86", "DetectTime": "2023-10-30T14:11:59.499032+02:00", "EventTime": "2023-10-30T14:11:59.499053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYvGpz1qaSblFp4775"]} -{"Format": "Json", "ID": "07b8a148-16cf-4b14-9a45-f52cc464ab86", "DetectTime": "2023-10-30T14:11:59.499032+02:00", "EventTime": "2023-10-30T14:11:59.499053+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:07:36.197107+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:11:59.569495)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "422813cb-01d2-4c96-9a59-9560b9a81cf0", "DetectTime": "2023-10-30T14:11:59.573943+02:00", "EventTime": "2023-10-30T14:11:59.573955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CThvy61SMmKLLUnFF2"]} -{"Format": "IDEA0", "ID": "afe73388-e8d5-47bc-9073-5b9e9c74a42c", "DetectTime": "2023-10-30T14:11:59.604002+02:00", "EventTime": "2023-10-30T14:11:59.604020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CxpeRK2zgCNyohKk2f"]} -{"Format": "IDEA0", "ID": "64b3f326-c040-47de-b2ca-70ac2fba2342", "DetectTime": "2023-10-30T14:11:59.632275+02:00", "EventTime": "2023-10-30T14:11:59.632291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CFmvLb1i1THIjtxJKg"]} -{"Format": "IDEA0", "ID": "da336498-731f-4a33-9264-072b998be52b", "DetectTime": "2023-10-30T14:11:59.660039+02:00", "EventTime": "2023-10-30T14:11:59.660058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C5HzDO1BnpFryrunh"]} -{"Format": "IDEA0", "ID": "be9a9b77-851e-46de-9ff1-b454d215f416", "DetectTime": "2023-10-30T14:11:59.686719+02:00", "EventTime": "2023-10-30T14:11:59.686731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Ctmjjm33aXaNEEx1da"]} -{"Format": "IDEA0", "ID": "b44584d4-9f3c-4a8a-89e1-1c294e5dc0af", "DetectTime": "2023-10-30T14:11:59.715494+02:00", "EventTime": "2023-10-30T14:11:59.715510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C68FHz2bDEgphH2Ad6"]} -{"Format": "IDEA0", "ID": "21913903-2b04-4f35-981b-554364b8d625", "DetectTime": "2023-10-30T14:11:59.745841+02:00", "EventTime": "2023-10-30T14:11:59.745857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Cezgigb8yUnW3lZjf"]} -{"Format": "IDEA0", "ID": "8d440f3f-a160-480d-90d2-4dd6ec955b19", "DetectTime": "2023-10-30T14:11:59.779393+02:00", "EventTime": "2023-10-30T14:11:59.779409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CW9tDo2EuSgYgCsXU5"]} -{"Format": "Json", "ID": "8d440f3f-a160-480d-90d2-4dd6ec955b19", "DetectTime": "2023-10-30T14:11:59.779393+02:00", "EventTime": "2023-10-30T14:11:59.779409+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:07:37.963728+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:11:59.846095)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c929616f-77ea-49bb-a2fe-215cd92e6539", "DetectTime": "2023-10-30T14:11:59.849965+02:00", "EventTime": "2023-10-30T14:11:59.849975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwFQF3410jD3n2UZU4"]} -{"Format": "IDEA0", "ID": "20ae52ee-d76d-4883-8671-2eb1db1d3386", "DetectTime": "2023-10-30T14:11:59.873278+02:00", "EventTime": "2023-10-30T14:11:59.873294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C31hqf2Xzqi87DsNwc"]} -{"Format": "IDEA0", "ID": "ff4538f6-af8c-4294-a718-bfec1303bd83", "DetectTime": "2023-10-30T14:11:59.894100+02:00", "EventTime": "2023-10-30T14:11:59.894112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CUkCUs496qkeWVKsrf"]} -{"Format": "IDEA0", "ID": "761497a3-f442-43d0-a93c-a9282a786a33", "DetectTime": "2023-10-30T14:11:59.911788+02:00", "EventTime": "2023-10-30T14:11:59.911799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CYO2xL3G9dRzcoi5Q8"]} -{"Format": "IDEA0", "ID": "15b47c99-1cc5-435d-ab3f-e191b5614c69", "DetectTime": "2023-10-30T14:11:59.939060+02:00", "EventTime": "2023-10-30T14:11:59.939076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C6jjp82FGVztLAxozb"]} -{"Format": "IDEA0", "ID": "d0d8c56a-183c-434a-ba41-17bad0b01211", "DetectTime": "2023-10-30T14:11:59.968001+02:00", "EventTime": "2023-10-30T14:11:59.968016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CbH8kD18Z0794wYAcg"]} -{"Format": "IDEA0", "ID": "0ec3225a-49cf-498a-9467-b85c44e155e3", "DetectTime": "2023-10-30T14:11:59.993709+02:00", "EventTime": "2023-10-30T14:11:59.993728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CN6Lx5IGmXe5espY2"]} -{"Format": "IDEA0", "ID": "8de1434e-4888-459f-886a-c0fa7db28b8e", "DetectTime": "2023-10-30T14:12:00.019546+02:00", "EventTime": "2023-10-30T14:12:00.019563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CqXLryt3VUCJTbpVi"]} -{"Format": "IDEA0", "ID": "b472dd13-23e0-497b-a8e2-34b9f91fa627", "DetectTime": "2023-10-30T14:12:00.047140+02:00", "EventTime": "2023-10-30T14:12:00.047156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CapHiCAAfyh032Nh3"]} -{"Format": "Json", "ID": "b472dd13-23e0-497b-a8e2-34b9f91fa627", "DetectTime": "2023-10-30T14:12:00.047140+02:00", "EventTime": "2023-10-30T14:12:00.047156+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:38:25.225747+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:12:00.117631)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "40bae282-16f7-40f4-94be-a99cb35cb137", "DetectTime": "2023-10-30T14:12:00.122013+02:00", "EventTime": "2023-10-30T14:12:00.122023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CvQiuo3QBpryvlrj6b"]} -{"Format": "IDEA0", "ID": "065198b4-a418-4a7b-97f4-a8e4ecb94828", "DetectTime": "2023-10-30T14:12:00.150380+02:00", "EventTime": "2023-10-30T14:12:00.150407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C00n414zVpvpqKHU5"]} -{"Format": "IDEA0", "ID": "3d433c20-6a91-4438-9e3b-4cdedc7795bd", "DetectTime": "2023-10-30T14:12:00.175247+02:00", "EventTime": "2023-10-30T14:12:00.175259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CQHbQz4jMuFt5iwBF7"]} -{"Format": "IDEA0", "ID": "4539cd8a-c00a-4c80-a21f-6af21068da46", "DetectTime": "2023-10-30T14:12:00.199145+02:00", "EventTime": "2023-10-30T14:12:00.199162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CWoqDz19ILOsmJUdab"]} -{"Format": "IDEA0", "ID": "b3025896-a8ac-4df7-a98c-029cb44dd2a4", "DetectTime": "2023-10-30T14:12:00.224090+02:00", "EventTime": "2023-10-30T14:12:00.224105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cdrs6N28W9085KW6Ee"]} -{"Format": "IDEA0", "ID": "e906665b-4b5d-4ecb-8b5e-858de9666899", "DetectTime": "2023-10-30T14:12:00.247386+02:00", "EventTime": "2023-10-30T14:12:00.247397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CBFSjY3M5Wkf0XfTaf"]} -{"Format": "IDEA0", "ID": "38dd6c3e-30a5-4f3d-8cd3-a4efd7283c49", "DetectTime": "2023-10-30T14:12:00.268706+02:00", "EventTime": "2023-10-30T14:12:00.268717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CXQrlg31MXGObEfH5"]} -{"Format": "IDEA0", "ID": "91c2925d-e988-4557-ba41-db903fcaa571", "DetectTime": "2023-10-30T14:12:00.294484+02:00", "EventTime": "2023-10-30T14:12:00.294501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["ChIEC33VO1U17eHHB"]} -{"Format": "IDEA0", "ID": "3a7692db-7f15-4c93-950d-21c01b13e801", "DetectTime": "2023-10-30T14:12:00.321973+02:00", "EventTime": "2023-10-30T14:12:00.321992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CVcnx8wO1UqHKUCw2"]} -{"Format": "Json", "ID": "3a7692db-7f15-4c93-950d-21c01b13e801", "DetectTime": "2023-10-30T14:12:00.321973+02:00", "EventTime": "2023-10-30T14:12:00.321992+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:38:27.230849+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:12:00.386247)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "58eca368-1707-4c1e-944c-df124e699d87", "DetectTime": "2023-10-30T14:12:00.390519+02:00", "EventTime": "2023-10-30T14:12:00.390535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CEYwzf2vWtF3eUYk45"]} -{"Format": "IDEA0", "ID": "02c589c0-898e-4e13-aca6-5dd48ce7b758", "DetectTime": "2023-10-30T14:12:00.413021+02:00", "EventTime": "2023-10-30T14:12:00.413044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIaCZp3lDkxklRbvS8"]} -{"Format": "IDEA0", "ID": "d2b158ac-aee6-43f6-9844-15cc2a3610e1", "DetectTime": "2023-10-30T14:12:00.435830+02:00", "EventTime": "2023-10-30T14:12:00.435848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CLlVJu3oEQ8AK80oTi"]} -{"Format": "IDEA0", "ID": "18f8bb45-5cf3-49ac-9a6b-c52c77257976", "DetectTime": "2023-10-30T14:12:00.458002+02:00", "EventTime": "2023-10-30T14:12:00.458018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CcZoGM2a4qIODudIha"]} -{"Format": "IDEA0", "ID": "f3fe938d-4fdf-4824-8b34-eb6635393e19", "DetectTime": "2023-10-30T14:12:00.478651+02:00", "EventTime": "2023-10-30T14:12:00.478664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CPDhOS2A1jmuZ2dpo3"]} -{"Format": "IDEA0", "ID": "185b1128-4763-4163-a814-4896b8f1c614", "DetectTime": "2023-10-30T14:12:00.502462+02:00", "EventTime": "2023-10-30T14:12:00.502484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CQ8DDM1bmxwVbZD4Id"]} -{"Format": "IDEA0", "ID": "2b04ee00-6c49-4a38-a6ce-105682d2d43d", "DetectTime": "2023-10-30T14:12:00.525095+02:00", "EventTime": "2023-10-30T14:12:00.525114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CzVVcs21c9CCKcHM6g"]} -{"Format": "IDEA0", "ID": "04f4593c-d09a-4730-b4aa-432a7a7a946c", "DetectTime": "2023-10-30T14:12:00.548755+02:00", "EventTime": "2023-10-30T14:12:00.548770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C0xjcxuzADDC1uDM1"]} -{"Format": "Json", "ID": "04f4593c-d09a-4730-b4aa-432a7a7a946c", "DetectTime": "2023-10-30T14:12:00.548755+02:00", "EventTime": "2023-10-30T14:12:00.548770+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:38:28.904000+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:12:00.613592)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "21f41459-f519-48a2-9605-ec5ec4b6dcd9", "DetectTime": "2023-10-30T14:12:00.619092+02:00", "EventTime": "2023-10-30T14:12:00.619108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CE0X2G1qRarhh5V8l7"]} -{"Format": "IDEA0", "ID": "c6921981-d5a4-4d87-98b5-45e78e40009e", "DetectTime": "2023-10-30T14:12:00.640830+02:00", "EventTime": "2023-10-30T14:12:00.640842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CDAUaT3FEcJny4GyB6"]} -{"Format": "IDEA0", "ID": "759c3a02-815d-4fb0-ad3b-8534c47ed98c", "DetectTime": "2023-10-30T14:12:00.660087+02:00", "EventTime": "2023-10-30T14:12:00.660115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CqKwfQ4ryWEax3CT1"]} -{"Format": "IDEA0", "ID": "74ebb979-05b9-4ace-95b0-1fe85e91d736", "DetectTime": "2023-10-30T14:12:00.681006+02:00", "EventTime": "2023-10-30T14:12:00.681017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C7Cabu3hE9qw8oHgth"]} -{"Format": "IDEA0", "ID": "cb24e887-4ad9-49d0-8090-66e140e7c81e", "DetectTime": "2023-10-30T14:12:00.702423+02:00", "EventTime": "2023-10-30T14:12:00.702442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CpeqtB2yAxoplpwjSk"]} -{"Format": "IDEA0", "ID": "86192f73-b1ca-4466-bd53-ee9a8cd62ed7", "DetectTime": "2023-10-30T14:12:00.720752+02:00", "EventTime": "2023-10-30T14:12:00.720780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CPxA1g4yPFuzwIL3Mb"]} -{"Format": "IDEA0", "ID": "0b961aed-9356-4676-b7e4-60050f7c510d", "DetectTime": "2023-10-30T14:12:00.739734+02:00", "EventTime": "2023-10-30T14:12:00.739754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C0iq4N3atBLeyrSH17"]} -{"Format": "IDEA0", "ID": "0b0e9464-36aa-49ed-bab3-38cd1a53c8f0", "DetectTime": "2023-10-30T14:12:00.759840+02:00", "EventTime": "2023-10-30T14:12:00.759859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Cs1Nor3RGi77qDWkE3"]} -{"Format": "IDEA0", "ID": "28597912-b0bd-47f8-8157-9c097a308505", "DetectTime": "2023-10-30T14:12:00.784617+02:00", "EventTime": "2023-10-30T14:12:00.784630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cf4ouj1d0QzeuCsfAb"]} -{"Format": "Json", "ID": "28597912-b0bd-47f8-8157-9c097a308505", "DetectTime": "2023-10-30T14:12:00.784617+02:00", "EventTime": "2023-10-30T14:12:00.784630+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T05:38:31.518298+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2023/10/30 14:12:00.847228)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "71273abe-bd91-4468-bcfb-f615044dbe7b", "DetectTime": "2023-10-30T14:12:00.852578+02:00", "EventTime": "2023-10-30T14:12:00.852594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CAouHh2vWZKaWaR3h"]} -{"Format": "IDEA0", "ID": "ab043c67-4644-4016-8cdc-1e3e106eb3aa", "DetectTime": "2023-10-30T14:12:00.873270+02:00", "EventTime": "2023-10-30T14:12:00.873288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CKCZUg2snwLJJei8D2"]} -{"Format": "IDEA0", "ID": "0675969d-87dd-417c-a0e0-3706df9ee751", "DetectTime": "2023-10-30T14:12:00.911509+02:00", "EventTime": "2023-10-30T14:12:00.911537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CysEXk22hpGiDHHU4"]} -{"Format": "IDEA0", "ID": "77e6c66b-247d-45d9-ac74-d4e0cbc7f1fd", "DetectTime": "2023-10-30T14:12:00.952954+02:00", "EventTime": "2023-10-30T14:12:00.952989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cru3KI3YLOxzfTTgye"]} -{"Format": "IDEA0", "ID": "8880bec0-9558-429f-8219-3b8fc454ab71", "DetectTime": "2023-10-30T14:12:00.990291+02:00", "EventTime": "2023-10-30T14:12:00.990307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Ce9gvvTVLiLydrAjl"]} -{"Format": "IDEA0", "ID": "3790adc8-32c3-4c68-a177-8343a6e205d9", "DetectTime": "2023-10-30T14:12:01.024948+02:00", "EventTime": "2023-10-30T14:12:01.024960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CHJMGJ2WiujXTZyGwl"]} -{"Format": "IDEA0", "ID": "3c67145b-19ef-420c-86c2-8ca942958b9c", "DetectTime": "2023-10-30T14:12:01.062447+02:00", "EventTime": "2023-10-30T14:12:01.062465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CAOX6d2rQgYcLaAln7"]} -{"Format": "IDEA0", "ID": "bf08c05c-3b04-427b-8607-4af890123373", "DetectTime": "2023-10-30T14:12:01.099951+02:00", "EventTime": "2023-10-30T14:12:01.099966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cp6UIb23mEyxmNf9i4"]} -{"Format": "IDEA0", "ID": "3e733ff7-40bd-4b89-8657-93f4dde70a53", "DetectTime": "2023-10-30T14:12:01.122038+02:00", "EventTime": "2023-10-30T14:12:01.122067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CQLgNYf0xZJHW0mk2"]} -{"Format": "IDEA0", "ID": "e2ec8cef-c091-4f31-8ec9-0707977dc64e", "DetectTime": "2023-10-30T14:12:01.156381+02:00", "EventTime": "2023-10-30T14:12:01.156398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqUGmv2IxyI1WPMpQc"]} -{"Format": "Json", "ID": "e2ec8cef-c091-4f31-8ec9-0707977dc64e", "DetectTime": "2023-10-30T14:12:01.156381+02:00", "EventTime": "2023-10-30T14:12:01.156398+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:08:45.415590+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:01.233924)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0500f77b-e198-4a9e-bc71-f91a7cbf5445", "DetectTime": "2023-10-30T14:12:01.238918+02:00", "EventTime": "2023-10-30T14:12:01.238935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CWoHWE4GjGa98rOoYk"]} -{"Format": "IDEA0", "ID": "17b7901b-0b7a-4134-94aa-f1fd8ebfe89a", "DetectTime": "2023-10-30T14:12:01.275922+02:00", "EventTime": "2023-10-30T14:12:01.275939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ce1371hfz5KNfkX1g"]} -{"Format": "IDEA0", "ID": "cf2fe71b-abac-419e-ab85-df4905c09fb5", "DetectTime": "2023-10-30T14:12:01.307783+02:00", "EventTime": "2023-10-30T14:12:01.307794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CVcn145JOK7cJCB5"]} -{"Format": "IDEA0", "ID": "cf861ccd-96b9-4d02-9bc3-6925561f41a4", "DetectTime": "2023-10-30T14:12:01.340312+02:00", "EventTime": "2023-10-30T14:12:01.340327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CjrxUQ2qsC4HOuPPn3"]} -{"Format": "IDEA0", "ID": "93cfbfe9-6776-4f91-8008-d5069b6c55ab", "DetectTime": "2023-10-30T14:12:01.372583+02:00", "EventTime": "2023-10-30T14:12:01.372594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C744dYMIUZFDNcHha"]} -{"Format": "IDEA0", "ID": "10bc029d-3251-4b9a-8f12-a52746ec1408", "DetectTime": "2023-10-30T14:12:01.404186+02:00", "EventTime": "2023-10-30T14:12:01.404200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CXUQM22OaSPx8uP5K6"]} -{"Format": "IDEA0", "ID": "14716dc1-9b31-4e70-8daf-2cbd1f9ea61f", "DetectTime": "2023-10-30T14:12:01.439015+02:00", "EventTime": "2023-10-30T14:12:01.439028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CEB5tN18Xrklbblcb6"]} -{"Format": "IDEA0", "ID": "2fbc17df-161e-4373-8813-f3f9180a5260", "DetectTime": "2023-10-30T14:12:01.473727+02:00", "EventTime": "2023-10-30T14:12:01.473739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cac8RC2MdDb7xESXXf"]} -{"Format": "Json", "ID": "2fbc17df-161e-4373-8813-f3f9180a5260", "DetectTime": "2023-10-30T14:12:01.473727+02:00", "EventTime": "2023-10-30T14:12:01.473739+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:08:47.610895+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:01.544858)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed8aa766-8e01-4ae2-9f85-ea917a4156d8", "DetectTime": "2023-10-30T14:12:01.549808+02:00", "EventTime": "2023-10-30T14:12:01.549820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CpzYBD2c4AWzvO71zc"]} -{"Format": "IDEA0", "ID": "da934d1c-c6d2-4979-8975-99be395e7bed", "DetectTime": "2023-10-30T14:12:01.575155+02:00", "EventTime": "2023-10-30T14:12:01.575168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C1C5lZ1nSJDu0iCMj3"]} -{"Format": "IDEA0", "ID": "e354ea5f-4f07-4a4e-a1c1-3ccbfa1feb97", "DetectTime": "2023-10-30T14:12:01.605953+02:00", "EventTime": "2023-10-30T14:12:01.605971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CVy4W61yXZEs7CMLx2"]} -{"Format": "IDEA0", "ID": "085e5368-fb51-4063-8694-18347f6efcf3", "DetectTime": "2023-10-30T14:12:01.640460+02:00", "EventTime": "2023-10-30T14:12:01.640477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Ca3W963BfE1Lky1zAl"]} -{"Format": "IDEA0", "ID": "e0d4491f-0584-4fbe-bdf7-a7c11034073f", "DetectTime": "2023-10-30T14:12:01.673730+02:00", "EventTime": "2023-10-30T14:12:01.673745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQyPAglgnR9AcYl2k"]} -{"Format": "IDEA0", "ID": "d6e8800f-1ba1-4298-bc59-aee19799beea", "DetectTime": "2023-10-30T14:12:01.705150+02:00", "EventTime": "2023-10-30T14:12:01.705166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C97zr218mLb3PcDXdf"]} -{"Format": "IDEA0", "ID": "5691a88b-e518-4ace-ac3c-183f0e794d51", "DetectTime": "2023-10-30T14:12:01.734205+02:00", "EventTime": "2023-10-30T14:12:01.734216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Ccowy94xeCMzKloXa5"]} -{"Format": "IDEA0", "ID": "06961bac-f4f2-4e0b-a29a-ebe7d1ee10b1", "DetectTime": "2023-10-30T14:12:01.765569+02:00", "EventTime": "2023-10-30T14:12:01.765587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C0sUSM32S0Hmt0JxRc"]} -{"Format": "Json", "ID": "06961bac-f4f2-4e0b-a29a-ebe7d1ee10b1", "DetectTime": "2023-10-30T14:12:01.765569+02:00", "EventTime": "2023-10-30T14:12:01.765587+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:08:49.335944+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:01.839729)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "20fdf1f6-d595-4ea0-bb58-895a477532f2", "DetectTime": "2023-10-30T14:12:01.844567+02:00", "EventTime": "2023-10-30T14:12:01.844583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CueTT62pcEkqBuo5Og"]} -{"Format": "IDEA0", "ID": "1a5ca51c-8e4e-4781-8849-66452e5c0134", "DetectTime": "2023-10-30T14:12:01.874254+02:00", "EventTime": "2023-10-30T14:12:01.874266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cg9ZhO3ChH4rY1WIkk"]} -{"Format": "IDEA0", "ID": "22b454b4-b482-43f5-9123-c78625d23dd6", "DetectTime": "2023-10-30T14:12:01.901262+02:00", "EventTime": "2023-10-30T14:12:01.901282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C3eTZe3ONTrz1ZzBkg"]} -{"Format": "IDEA0", "ID": "6c1782da-3bee-45f3-a047-c6a0ef60c0a1", "DetectTime": "2023-10-30T14:12:01.931050+02:00", "EventTime": "2023-10-30T14:12:01.931062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CRXo23z7YbKvH7x3"]} -{"Format": "IDEA0", "ID": "b602c70d-3634-4d80-a6b7-39c879e65f1c", "DetectTime": "2023-10-30T14:12:01.951075+02:00", "EventTime": "2023-10-30T14:12:01.951094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CWSyXi4MPss2twBFcf"]} -{"Format": "IDEA0", "ID": "6c86beb7-92a0-43de-a27f-c8a872a621d6", "DetectTime": "2023-10-30T14:12:01.977186+02:00", "EventTime": "2023-10-30T14:12:01.977202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CM6tC41KqnaJGwEcN2"]} -{"Format": "IDEA0", "ID": "f14bc908-721d-492e-9bec-28da8ca5801b", "DetectTime": "2023-10-30T14:12:02.004624+02:00", "EventTime": "2023-10-30T14:12:02.004637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CA5b1k2hDothUlqIY8"]} -{"Format": "IDEA0", "ID": "2b1f2ced-de85-406d-931b-ec4746783432", "DetectTime": "2023-10-30T14:12:02.031391+02:00", "EventTime": "2023-10-30T14:12:02.031406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CBOHSn1ahlfLJnMxWa"]} -{"Format": "IDEA0", "ID": "ae1c53bb-228e-4855-85f9-6ff1d722ac2e", "DetectTime": "2023-10-30T14:12:02.058649+02:00", "EventTime": "2023-10-30T14:12:02.058660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CtyqT71LKxLJfQxpC1"]} -{"Format": "Json", "ID": "ae1c53bb-228e-4855-85f9-6ff1d722ac2e", "DetectTime": "2023-10-30T14:12:02.058649+02:00", "EventTime": "2023-10-30T14:12:02.058660+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:08:51.287541+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:02.127585)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "45f92cdc-8e85-4fab-90a8-08d0dca1e70d", "DetectTime": "2023-10-30T14:12:02.133224+02:00", "EventTime": "2023-10-30T14:12:02.133242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5HY9B1lAplakrNbig"]} -{"Format": "IDEA0", "ID": "b5fa1af9-da84-470b-b0bd-d3ea852b3107", "DetectTime": "2023-10-30T14:12:02.161746+02:00", "EventTime": "2023-10-30T14:12:02.161765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CQeZdXy1MAT30TPO8"]} -{"Format": "IDEA0", "ID": "48806eaa-8b24-43ab-9b89-4188855bb6b9", "DetectTime": "2023-10-30T14:12:02.186260+02:00", "EventTime": "2023-10-30T14:12:02.186275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CPJJw03QJ6kV6wvtMh"]} -{"Format": "IDEA0", "ID": "0a37860e-54bd-4d78-857d-366d39be438d", "DetectTime": "2023-10-30T14:12:02.213090+02:00", "EventTime": "2023-10-30T14:12:02.213107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Co0Rc1luovWeya5Yg"]} -{"Format": "IDEA0", "ID": "a0b1e091-d04b-4ff4-af66-d33500782ad1", "DetectTime": "2023-10-30T14:12:02.242261+02:00", "EventTime": "2023-10-30T14:12:02.242276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZhSLAMKRqsPrlZz6"]} -{"Format": "IDEA0", "ID": "6f0fbd25-14cd-4007-b5bc-b4512907225e", "DetectTime": "2023-10-30T14:12:02.265638+02:00", "EventTime": "2023-10-30T14:12:02.265666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cp3JXC2B5av3Lvmne5"]} -{"Format": "IDEA0", "ID": "ca0a44b6-31be-4ff5-952f-553cb512f40f", "DetectTime": "2023-10-30T14:12:02.286405+02:00", "EventTime": "2023-10-30T14:12:02.286421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CGszfu4JG8zfBYWITl"]} -{"Format": "IDEA0", "ID": "d6e3bc9c-1a24-4a60-b0e7-d5ee4fa82ad0", "DetectTime": "2023-10-30T14:12:02.313353+02:00", "EventTime": "2023-10-30T14:12:02.313365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CyK8MWORIvomMWbK"]} -{"Format": "IDEA0", "ID": "8fd0c474-7d67-48c7-8644-f5116408437f", "DetectTime": "2023-10-30T14:12:02.342403+02:00", "EventTime": "2023-10-30T14:12:02.342422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CmJisSxwFzMmxo2Vj"]} -{"Format": "Json", "ID": "8fd0c474-7d67-48c7-8644-f5116408437f", "DetectTime": "2023-10-30T14:12:02.342403+02:00", "EventTime": "2023-10-30T14:12:02.342422+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:39:12.597278+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:02.408308)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a29dddd-fff0-42bd-a68f-762c6a9afc33", "DetectTime": "2023-10-30T14:12:02.413433+02:00", "EventTime": "2023-10-30T14:12:02.413445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CxJjMe4XH8GVU27Px5"]} -{"Format": "IDEA0", "ID": "5da3575f-4cad-49da-9b63-a91b9de7c372", "DetectTime": "2023-10-30T14:12:02.437202+02:00", "EventTime": "2023-10-30T14:12:02.437220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cugrau3Lm0XwaiTk9i"]} -{"Format": "IDEA0", "ID": "5fba21c6-45fd-4127-a5e9-445edb71b68d", "DetectTime": "2023-10-30T14:12:02.461973+02:00", "EventTime": "2023-10-30T14:12:02.461985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNQRqm2N1Iw8HJsd34"]} -{"Format": "IDEA0", "ID": "2f661e76-d8d6-46e7-9344-7706cd1398e8", "DetectTime": "2023-10-30T14:12:02.487359+02:00", "EventTime": "2023-10-30T14:12:02.487380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CFR2Qi1xS4KOWkEz9h"]} -{"Format": "IDEA0", "ID": "4e2e9757-95ca-41bf-b168-c0ede9506062", "DetectTime": "2023-10-30T14:12:02.510423+02:00", "EventTime": "2023-10-30T14:12:02.510438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CQUsei42SotGSZxhxk"]} -{"Format": "IDEA0", "ID": "e040c7c9-695d-436f-9fc3-ee7ecee87589", "DetectTime": "2023-10-30T14:12:02.532771+02:00", "EventTime": "2023-10-30T14:12:02.532793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYkpwI1cOMTm1e3Ule"]} -{"Format": "IDEA0", "ID": "7cc19f32-1229-4d01-849b-5d6a1467cd70", "DetectTime": "2023-10-30T14:12:02.558605+02:00", "EventTime": "2023-10-30T14:12:02.558621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CHO7zc33ulte1jVbNe"]} -{"Format": "IDEA0", "ID": "d1310a86-72de-4546-b920-ac3829f85c8d", "DetectTime": "2023-10-30T14:12:02.581619+02:00", "EventTime": "2023-10-30T14:12:02.581635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C0MQPl3ixx6noIdGsg"]} -{"Format": "Json", "ID": "d1310a86-72de-4546-b920-ac3829f85c8d", "DetectTime": "2023-10-30T14:12:02.581619+02:00", "EventTime": "2023-10-30T14:12:02.581635+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:39:14.614971+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:02.642971)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4808f70e-10b0-41f0-b084-cc0fb528e0af", "DetectTime": "2023-10-30T14:12:02.648480+02:00", "EventTime": "2023-10-30T14:12:02.648497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CIjnS33oXQpoBJevsh"]} -{"Format": "IDEA0", "ID": "9d6080d5-5c5f-46c5-b44e-efb4c3e3c774", "DetectTime": "2023-10-30T14:12:02.673069+02:00", "EventTime": "2023-10-30T14:12:02.673082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CX1CcfQeoqLenUNn1"]} -{"Format": "IDEA0", "ID": "a626f80f-ae6c-499d-a1ad-0bd7f78851c2", "DetectTime": "2023-10-30T14:12:02.694361+02:00", "EventTime": "2023-10-30T14:12:02.694374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCdvtR1kBmoaMmPFNi"]} -{"Format": "IDEA0", "ID": "92182f91-010d-4263-8aaf-ba6a12c6fee9", "DetectTime": "2023-10-30T14:12:02.714327+02:00", "EventTime": "2023-10-30T14:12:02.714343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CEmVZt43TepFPAXms3"]} -{"Format": "IDEA0", "ID": "1e55c7e6-49d6-460c-94ac-0e9b4ed12dd1", "DetectTime": "2023-10-30T14:12:02.735714+02:00", "EventTime": "2023-10-30T14:12:02.735726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C5T9fCgQ56quhX4F7"]} -{"Format": "IDEA0", "ID": "db596287-aefb-4559-bbe1-409f6db550e2", "DetectTime": "2023-10-30T14:12:02.758338+02:00", "EventTime": "2023-10-30T14:12:02.758353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CWjyVEoVlKp6AyHxa"]} -{"Format": "IDEA0", "ID": "c12f3c6b-65bf-430c-b8f3-2a83d0f9f98d", "DetectTime": "2023-10-30T14:12:02.781777+02:00", "EventTime": "2023-10-30T14:12:02.781794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CjkX1syP4Yvm56sb"]} -{"Format": "IDEA0", "ID": "4f00eea7-40c9-47ea-aeef-e4910fa38c02", "DetectTime": "2023-10-30T14:12:02.805728+02:00", "EventTime": "2023-10-30T14:12:02.805743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C9geum47SinnDkM0Kj"]} -{"Format": "IDEA0", "ID": "9430e0f0-af7f-4817-a739-f6bdbcf867af", "DetectTime": "2023-10-30T14:12:02.826039+02:00", "EventTime": "2023-10-30T14:12:02.826056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CappMo2JPGVEbo0gxg"]} -{"Format": "Json", "ID": "9430e0f0-af7f-4817-a739-f6bdbcf867af", "DetectTime": "2023-10-30T14:12:02.826039+02:00", "EventTime": "2023-10-30T14:12:02.826056+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:39:16.262538+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:02.884255)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "000db1a9-35a4-4d8a-9e3e-718bd2f57c98", "DetectTime": "2023-10-30T14:12:02.888967+02:00", "EventTime": "2023-10-30T14:12:02.888978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Csg9D032Iy86rGHX07"]} -{"Format": "IDEA0", "ID": "ca09102b-93d7-4c16-97b9-27747045445e", "DetectTime": "2023-10-30T14:12:02.909286+02:00", "EventTime": "2023-10-30T14:12:02.909306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C9HrFT1HNdCIWAbB0d"]} -{"Format": "IDEA0", "ID": "9f35295b-db1f-4180-bb8c-0983379c663b", "DetectTime": "2023-10-30T14:12:02.928663+02:00", "EventTime": "2023-10-30T14:12:02.928682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CcJRW54YDaquw7TOZk"]} -{"Format": "IDEA0", "ID": "5e1a9b58-b724-4a26-a2f1-5152124277d1", "DetectTime": "2023-10-30T14:12:02.945753+02:00", "EventTime": "2023-10-30T14:12:02.945773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CLKyX82IhqRuDkRy2c"]} -{"Format": "IDEA0", "ID": "b3d7ad51-d922-4cf7-bdd0-8f50d5430dc5", "DetectTime": "2023-10-30T14:12:02.967455+02:00", "EventTime": "2023-10-30T14:12:02.967471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CoeKFg19LhJRLJ9jVl"]} -{"Format": "IDEA0", "ID": "a5e00952-cb8e-4678-9cf1-b9a0b27576f8", "DetectTime": "2023-10-30T14:12:02.986995+02:00", "EventTime": "2023-10-30T14:12:02.987013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRZ4jE2ouBkEmQQk2b"]} -{"Format": "IDEA0", "ID": "1f4f7b68-5c5f-4f1a-b0b2-a6f311629aa9", "DetectTime": "2023-10-30T14:12:03.007070+02:00", "EventTime": "2023-10-30T14:12:03.007086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cxap1ZCSobNpJxEYf"]} -{"Format": "IDEA0", "ID": "cdd50ed2-33d7-4be8-a49e-e5ec8a8e2eb5", "DetectTime": "2023-10-30T14:12:03.027272+02:00", "EventTime": "2023-10-30T14:12:03.027285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CmZnc618ay9XOclvMf"]} -{"Format": "IDEA0", "ID": "0f096ed6-06c4-4237-9974-de8f87faf06c", "DetectTime": "2023-10-30T14:12:03.049368+02:00", "EventTime": "2023-10-30T14:12:03.049385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CZCfFM1t4BqL6bX1de"]} -{"Format": "Json", "ID": "0f096ed6-06c4-4237-9974-de8f87faf06c", "DetectTime": "2023-10-30T14:12:03.049368+02:00", "EventTime": "2023-10-30T14:12:03.049385+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T06:39:18.114409+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2023/10/30 14:12:03.111439)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "29adffaf-36f6-45f0-b9ec-e5cfb7f41f76", "DetectTime": "2023-10-30T14:12:03.116446+02:00", "EventTime": "2023-10-30T14:12:03.116462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CsCTfHUesHmUf05Ff"]} -{"Format": "IDEA0", "ID": "1c66dc70-b166-4d8b-ad1a-5c06c6808d69", "DetectTime": "2023-10-30T14:12:03.134766+02:00", "EventTime": "2023-10-30T14:12:03.134801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaPpVu2xT1iMsjQ493"]} -{"Format": "IDEA0", "ID": "e8ccdd43-133e-431c-960c-4880cebd2c09", "DetectTime": "2023-10-30T14:12:03.152046+02:00", "EventTime": "2023-10-30T14:12:03.152072+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CP7GLF10jrkn2Sg9Xe"]} -{"Format": "IDEA0", "ID": "e2cf5109-3a21-4243-938e-bf175c442ad7", "DetectTime": "2023-10-30T14:12:03.174854+02:00", "EventTime": "2023-10-30T14:12:03.174866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CQVgbP2FJ3zH7Cify8"]} -{"Format": "IDEA0", "ID": "77fd6227-49f7-4d38-bb42-888a1179968b", "DetectTime": "2023-10-30T14:12:03.208561+02:00", "EventTime": "2023-10-30T14:12:03.208576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cr5T36Px6rUUDDmod"]} -{"Format": "IDEA0", "ID": "8f92969f-5ea9-4a95-9fdb-c7838fc2ba44", "DetectTime": "2023-10-30T14:12:03.243745+02:00", "EventTime": "2023-10-30T14:12:03.243764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CIWm144HnFQsfESQsa"]} -{"Format": "IDEA0", "ID": "5dc27798-e593-4845-aa63-e59667cda00d", "DetectTime": "2023-10-30T14:12:03.277441+02:00", "EventTime": "2023-10-30T14:12:03.277457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CbTPpX13iGjrLXk4h3"]} -{"Format": "IDEA0", "ID": "aeaf449b-8bdd-4c1c-98e7-a9663b0fc882", "DetectTime": "2023-10-30T14:12:03.314638+02:00", "EventTime": "2023-10-30T14:12:03.314654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CD9ZdQ3ZCsf9XbIa65"]} -{"Format": "IDEA0", "ID": "54ae7d06-02f0-4f0f-833a-384b8b1a7830", "DetectTime": "2023-10-30T14:12:03.348611+02:00", "EventTime": "2023-10-30T14:12:03.348622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["C58wARJJ7DIHe2wD7"]} -{"Format": "IDEA0", "ID": "63be72ac-bca7-41af-be84-9082d13baa53", "DetectTime": "2023-10-30T14:12:03.384144+02:00", "EventTime": "2023-10-30T14:12:03.384158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CvgrWz10ZwM5bxdGb6"]} -{"Format": "IDEA0", "ID": "d6f60fb5-a249-40d0-ae7e-c41a702ec8dd", "DetectTime": "2023-10-30T14:12:03.419086+02:00", "EventTime": "2023-10-30T14:12:03.419105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CVlKNUxZ6dfADFH04"]} -{"Format": "Json", "ID": "d6f60fb5-a249-40d0-ae7e-c41a702ec8dd", "DetectTime": "2023-10-30T14:12:03.419086+02:00", "EventTime": "2023-10-30T14:12:03.419105+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:09:34.598978+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:03.492970)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9586c4af-09fd-4c41-b12a-b6fbc3840c73", "DetectTime": "2023-10-30T14:12:03.497612+02:00", "EventTime": "2023-10-30T14:12:03.497625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CfnSRH31cIU3Wl98Ye"]} -{"Format": "IDEA0", "ID": "a507a29c-0544-45b9-84a9-1f5bd47dcf31", "DetectTime": "2023-10-30T14:12:03.520722+02:00", "EventTime": "2023-10-30T14:12:03.520734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Chknou2aVvLPrU9Ch9"]} -{"Format": "IDEA0", "ID": "ebec9016-e826-47ef-9292-d797d7258949", "DetectTime": "2023-10-30T14:12:03.551350+02:00", "EventTime": "2023-10-30T14:12:03.551362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C0AMYh3bLWUf54ZUea"]} -{"Format": "IDEA0", "ID": "7d10f42c-df6e-41b7-bda5-bda773966831", "DetectTime": "2023-10-30T14:12:03.583762+02:00", "EventTime": "2023-10-30T14:12:03.583849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cn1XE02a97Z3XT3rV2"]} -{"Format": "IDEA0", "ID": "ffe24e7c-21cd-4207-b10c-c2abf50220ae", "DetectTime": "2023-10-30T14:12:03.615830+02:00", "EventTime": "2023-10-30T14:12:03.615842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Ccvfi52TtsiPo11aJh"]} -{"Format": "IDEA0", "ID": "8bcfac92-821f-47d1-a75e-b26493fff668", "DetectTime": "2023-10-30T14:12:03.646945+02:00", "EventTime": "2023-10-30T14:12:03.646961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C9ZoublJTEFC5GVw2"]} -{"Format": "IDEA0", "ID": "b6c7a177-8f18-42dc-bab3-d86e7e9a6939", "DetectTime": "2023-10-30T14:12:03.682505+02:00", "EventTime": "2023-10-30T14:12:03.682521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CRibU1uQ4cEJbs5a1"]} -{"Format": "IDEA0", "ID": "ee4d43d8-2007-46f0-8a83-524ba1a78d2e", "DetectTime": "2023-10-30T14:12:03.717020+02:00", "EventTime": "2023-10-30T14:12:03.717036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CaK9qB3MuHGIavwVif"]} -{"Format": "IDEA0", "ID": "b6f203bb-6690-4922-932d-2afaf70de757", "DetectTime": "2023-10-30T14:12:03.749980+02:00", "EventTime": "2023-10-30T14:12:03.749993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C4OiEt46TaG8FL6ad"]} -{"Format": "Json", "ID": "b6f203bb-6690-4922-932d-2afaf70de757", "DetectTime": "2023-10-30T14:12:03.749980+02:00", "EventTime": "2023-10-30T14:12:03.749993+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:09:36.605800+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:03.819872)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b01db23-b7c4-4096-900e-4d14e7b5c55c", "DetectTime": "2023-10-30T14:12:03.824854+02:00", "EventTime": "2023-10-30T14:12:03.824870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C2fzCZ1mObNJrUMWB1"]} -{"Format": "IDEA0", "ID": "8005df50-4e21-4bd3-8aaa-d67e6e5d4759", "DetectTime": "2023-10-30T14:12:03.856031+02:00", "EventTime": "2023-10-30T14:12:03.856047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CdEY8TGKgNQwNO5Di"]} -{"Format": "IDEA0", "ID": "d304af22-4937-4a2d-8b7f-2aaeef5e9bde", "DetectTime": "2023-10-30T14:12:03.885881+02:00", "EventTime": "2023-10-30T14:12:03.885897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cb92BA4Of1R4Q6LnU2"]} -{"Format": "IDEA0", "ID": "003c4e7e-6e87-446e-9737-62c8e4efa836", "DetectTime": "2023-10-30T14:12:03.914707+02:00", "EventTime": "2023-10-30T14:12:03.914724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CWrPEZ1a0b9iP3VDm1"]} -{"Format": "IDEA0", "ID": "dc6ff1ed-2731-4f13-856d-739681199a79", "DetectTime": "2023-10-30T14:12:03.946350+02:00", "EventTime": "2023-10-30T14:12:03.946367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CNTPZT14rQi6AOSfTg"]} -{"Format": "IDEA0", "ID": "4c8a89b0-261c-4656-966e-ce5b6a4571ce", "DetectTime": "2023-10-30T14:12:03.977178+02:00", "EventTime": "2023-10-30T14:12:03.977190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CJa9eJxAIKj9oEQw4"]} -{"Format": "IDEA0", "ID": "27c6680a-ed30-49c4-bd4d-5c396c194432", "DetectTime": "2023-10-30T14:12:04.005623+02:00", "EventTime": "2023-10-30T14:12:04.005635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CwuurF1jDpqyRwgpdl"]} -{"Format": "IDEA0", "ID": "38c8c892-2fa5-4466-860c-31347ff1dfdc", "DetectTime": "2023-10-30T14:12:04.037591+02:00", "EventTime": "2023-10-30T14:12:04.037606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C0xgmm2Svmwtnf7V93"]} -{"Format": "Json", "ID": "38c8c892-2fa5-4466-860c-31347ff1dfdc", "DetectTime": "2023-10-30T14:12:04.037591+02:00", "EventTime": "2023-10-30T14:12:04.037606+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:09:38.235052+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:04.108181)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d6f4750a-0dc0-4d1b-b560-9add34fc6391", "DetectTime": "2023-10-30T14:12:04.113066+02:00", "EventTime": "2023-10-30T14:12:04.113092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CDG4x63Vb1SiKae0la"]} -{"Format": "IDEA0", "ID": "86ebef8f-2ccb-4992-8f4d-65e628e62d5f", "DetectTime": "2023-10-30T14:12:04.142846+02:00", "EventTime": "2023-10-30T14:12:04.142860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CQ32MqPNFJ8dTfnpf"]} -{"Format": "IDEA0", "ID": "f001e124-4c67-4341-b88a-6332d8f4d43b", "DetectTime": "2023-10-30T14:12:04.167611+02:00", "EventTime": "2023-10-30T14:12:04.167627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cj6YTx32R8V2aYu08c"]} -{"Format": "IDEA0", "ID": "ba698e46-6968-4bce-9b65-04330e389d88", "DetectTime": "2023-10-30T14:12:04.195659+02:00", "EventTime": "2023-10-30T14:12:04.195674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CqH7AB1jzpdiKEAm75"]} -{"Format": "IDEA0", "ID": "c37ca254-ff0f-4cd5-aea6-d334cbae316a", "DetectTime": "2023-10-30T14:12:04.225350+02:00", "EventTime": "2023-10-30T14:12:04.225375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CD9GfitW8M531d2Wd"]} -{"Format": "IDEA0", "ID": "92df91f8-d411-478f-a8f0-903c29706423", "DetectTime": "2023-10-30T14:12:04.251982+02:00", "EventTime": "2023-10-30T14:12:04.252004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cg8ydV3lzV6X8Xgttg"]} -{"Format": "IDEA0", "ID": "770c9a18-43c3-49d6-804f-b08c84e22f1b", "DetectTime": "2023-10-30T14:12:04.279280+02:00", "EventTime": "2023-10-30T14:12:04.279296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cg1VeC12ziF2fFGasg"]} -{"Format": "IDEA0", "ID": "e5ea858e-8ba3-4989-b47e-d581ed02db6b", "DetectTime": "2023-10-30T14:12:04.307046+02:00", "EventTime": "2023-10-30T14:12:04.307062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CCsae24c6UriBKkEm4"]} -{"Format": "IDEA0", "ID": "058ae98b-be49-4ec6-bc2b-f63469161cba", "DetectTime": "2023-10-30T14:12:04.335239+02:00", "EventTime": "2023-10-30T14:12:04.335256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C0Vc8B3eHAgBx1ElEf"]} -{"Format": "Json", "ID": "058ae98b-be49-4ec6-bc2b-f63469161cba", "DetectTime": "2023-10-30T14:12:04.335239+02:00", "EventTime": "2023-10-30T14:12:04.335256+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:09:40.429848+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:04.405282)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7a321d05-31d4-453f-b695-06d644b6cbbd", "DetectTime": "2023-10-30T14:12:04.410768+02:00", "EventTime": "2023-10-30T14:12:04.410796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C54zJo4obnWy9PuVW1"]} -{"Format": "IDEA0", "ID": "f58cd4fd-2935-4acb-9135-7d9d7b8a20a3", "DetectTime": "2023-10-30T14:12:04.440091+02:00", "EventTime": "2023-10-30T14:12:04.440105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXH3He2mR28bRKt8le"]} -{"Format": "IDEA0", "ID": "abcfbeee-81fe-4c03-ab08-8247c35253a9", "DetectTime": "2023-10-30T14:12:04.461851+02:00", "EventTime": "2023-10-30T14:12:04.461870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C72Bet2EpY8TktOqyh"]} -{"Format": "IDEA0", "ID": "a2ec49f4-9f30-4c64-ad06-a076998350a5", "DetectTime": "2023-10-30T14:12:04.486892+02:00", "EventTime": "2023-10-30T14:12:04.486903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C58FDS3z8iVMMNGaik"]} -{"Format": "IDEA0", "ID": "556c1b2e-f345-42af-a0a6-c87cc88fd71a", "DetectTime": "2023-10-30T14:12:04.513286+02:00", "EventTime": "2023-10-30T14:12:04.513308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CdbYpW4wRWx8vJXt9"]} -{"Format": "IDEA0", "ID": "9b0236c6-40e5-4f9d-8254-5b2bcfe17572", "DetectTime": "2023-10-30T14:12:04.538530+02:00", "EventTime": "2023-10-30T14:12:04.538542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CkJRfB4kTIY0OOg5m4"]} -{"Format": "IDEA0", "ID": "053b0605-8da7-4c88-812c-424ce588ec6c", "DetectTime": "2023-10-30T14:12:04.565588+02:00", "EventTime": "2023-10-30T14:12:04.565605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CxCQOm3roougg3c2pa"]} -{"Format": "IDEA0", "ID": "3f62420f-dcd5-4665-9d8e-dc5efdd5ebcf", "DetectTime": "2023-10-30T14:12:04.591338+02:00", "EventTime": "2023-10-30T14:12:04.591350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CZs8up0HnVGW5Dny6"]} -{"Format": "IDEA0", "ID": "17445a47-1d20-46e4-96f7-d121a02f361a", "DetectTime": "2023-10-30T14:12:04.618746+02:00", "EventTime": "2023-10-30T14:12:04.618763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CAHWPZ1BOnGxkYjBZb"]} -{"Format": "Json", "ID": "17445a47-1d20-46e4-96f7-d121a02f361a", "DetectTime": "2023-10-30T14:12:04.618746+02:00", "EventTime": "2023-10-30T14:12:04.618763+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:40:05.674200+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:04.684486)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f85967ef-f76e-4f56-a89b-cde03d96b289", "DetectTime": "2023-10-30T14:12:04.689737+02:00", "EventTime": "2023-10-30T14:12:04.689754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CQQ1WF4JoqmGREPXl1"]} -{"Format": "IDEA0", "ID": "b628bb55-eadc-4b0d-8370-37f5e367d05e", "DetectTime": "2023-10-30T14:12:04.714910+02:00", "EventTime": "2023-10-30T14:12:04.714935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CVObxk3ef0KVPMKcQ1"]} -{"Format": "IDEA0", "ID": "7ff42a7b-a23e-449b-8e2c-d78480058c5d", "DetectTime": "2023-10-30T14:12:04.739361+02:00", "EventTime": "2023-10-30T14:12:04.739374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CahTNo4SWPAiOiQmmk"]} -{"Format": "IDEA0", "ID": "5065a132-5b8e-412c-a117-44c53759a738", "DetectTime": "2023-10-30T14:12:04.762518+02:00", "EventTime": "2023-10-30T14:12:04.762535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CktAIG3tC6heuKLLL"]} -{"Format": "IDEA0", "ID": "56260f6c-18c6-48e4-8451-7c8c52023636", "DetectTime": "2023-10-30T14:12:04.789751+02:00", "EventTime": "2023-10-30T14:12:04.789769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C2PNZ349XbaCKAhcGc"]} -{"Format": "IDEA0", "ID": "106035ab-776f-46d9-9e0a-ad6f1ebf4c4d", "DetectTime": "2023-10-30T14:12:04.816576+02:00", "EventTime": "2023-10-30T14:12:04.816589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CanL3AuuGxROCI851"]} -{"Format": "IDEA0", "ID": "a2666a47-8178-46e2-84ee-f2c00d135ebe", "DetectTime": "2023-10-30T14:12:04.840941+02:00", "EventTime": "2023-10-30T14:12:04.840963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cs5n7t1pgZoTNH8Vj4"]} -{"Format": "IDEA0", "ID": "d9af7362-774e-4c48-81fb-d1056dd3268c", "DetectTime": "2023-10-30T14:12:04.865726+02:00", "EventTime": "2023-10-30T14:12:04.865737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CG08Us19MhQ6agYtkc"]} -{"Format": "IDEA0", "ID": "dd638c17-a060-485a-8620-ae60da08f84d", "DetectTime": "2023-10-30T14:12:04.889538+02:00", "EventTime": "2023-10-30T14:12:04.889550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CLFQ3D4zg4FO1ASxu8"]} -{"Format": "Json", "ID": "dd638c17-a060-485a-8620-ae60da08f84d", "DetectTime": "2023-10-30T14:12:04.889538+02:00", "EventTime": "2023-10-30T14:12:04.889550+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:40:24.241945+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:04.947204)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "26f8cbaa-c4ea-4190-a6f2-21958a95237a", "DetectTime": "2023-10-30T14:12:04.951451+02:00", "EventTime": "2023-10-30T14:12:04.951468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C05j6g1hBB3jPorCUf"]} -{"Format": "IDEA0", "ID": "cf99d8cb-84b0-4f85-9bd2-7940d010f478", "DetectTime": "2023-10-30T14:12:04.974432+02:00", "EventTime": "2023-10-30T14:12:04.974448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CoklV5gtVIjSToWb4"]} -{"Format": "IDEA0", "ID": "9c3db150-7cf2-4ae3-8f5b-3eaf4e1d1269", "DetectTime": "2023-10-30T14:12:05.000234+02:00", "EventTime": "2023-10-30T14:12:05.000246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CPUDURlCzbGZ4QMYf"]} -{"Format": "IDEA0", "ID": "783d3e37-3c66-4afd-ae2e-de9de7231cd1", "DetectTime": "2023-10-30T14:12:05.021636+02:00", "EventTime": "2023-10-30T14:12:05.021652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C6zvvn1vwO430NBud4"]} -{"Format": "IDEA0", "ID": "cb712b67-eb3f-417e-a2bf-2d21fc0e454c", "DetectTime": "2023-10-30T14:12:05.045357+02:00", "EventTime": "2023-10-30T14:12:05.045374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C3CSE8UnYNo9j0SY6"]} -{"Format": "IDEA0", "ID": "237b1fda-dcc0-4363-bcf4-d75083a58815", "DetectTime": "2023-10-30T14:12:05.068362+02:00", "EventTime": "2023-10-30T14:12:05.068378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZ8rkVFiFl8j2tq8e"]} -{"Format": "IDEA0", "ID": "9da03b88-29b9-4920-aa7d-a03b29ce780d", "DetectTime": "2023-10-30T14:12:05.091100+02:00", "EventTime": "2023-10-30T14:12:05.091123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C9Tuo019vxMfJWKFfh"]} -{"Format": "IDEA0", "ID": "b73ee1e9-1dbf-4ee2-87aa-749b3d70f96b", "DetectTime": "2023-10-30T14:12:05.115234+02:00", "EventTime": "2023-10-30T14:12:05.115257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CGbGjgM3Reks4r0P5"]} -{"Format": "IDEA0", "ID": "7cbe41e9-50ec-4ab2-9fb0-5abc25f3618f", "DetectTime": "2023-10-30T14:12:05.138459+02:00", "EventTime": "2023-10-30T14:12:05.138471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C2cKcI14kZsNGCaNok"]} -{"Format": "Json", "ID": "7cbe41e9-50ec-4ab2-9fb0-5abc25f3618f", "DetectTime": "2023-10-30T14:12:05.138459+02:00", "EventTime": "2023-10-30T14:12:05.138471+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:40:25.874830+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:05.197785)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b9fa3480-925d-4217-a0de-354faab7a772", "DetectTime": "2023-10-30T14:12:05.202772+02:00", "EventTime": "2023-10-30T14:12:05.202823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C4Obh44LW6qOQLuX9b"]} -{"Format": "IDEA0", "ID": "d971d4c1-c0cf-4163-a38f-363517622332", "DetectTime": "2023-10-30T14:12:05.225413+02:00", "EventTime": "2023-10-30T14:12:05.225428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CXQFSf2E40tF2fEr2j"]} -{"Format": "IDEA0", "ID": "47de549d-9a66-4ed3-84ff-89ce2baeff4b", "DetectTime": "2023-10-30T14:12:05.247043+02:00", "EventTime": "2023-10-30T14:12:05.247060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CaOe4MVEi7Z1rYFyc"]} -{"Format": "IDEA0", "ID": "57ced31e-5f17-467c-9bb3-6dbf19ca6e5b", "DetectTime": "2023-10-30T14:12:05.268136+02:00", "EventTime": "2023-10-30T14:12:05.268156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CRLlxg15F0VjVwRXo1"]} -{"Format": "IDEA0", "ID": "ddc706de-be80-42e0-82b0-169981fedea0", "DetectTime": "2023-10-30T14:12:05.288935+02:00", "EventTime": "2023-10-30T14:12:05.288947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CgtlTZ3Fbp1wW5Viqb"]} -{"Format": "IDEA0", "ID": "bd1b2ac7-5874-4d12-81f0-442b6e06cdfc", "DetectTime": "2023-10-30T14:12:05.306632+02:00", "EventTime": "2023-10-30T14:12:05.306645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CIxXMJ2Z9qz6nqB4Kh"]} -{"Format": "IDEA0", "ID": "f6d31885-76c3-4059-805c-f7e9ede28490", "DetectTime": "2023-10-30T14:12:05.326854+02:00", "EventTime": "2023-10-30T14:12:05.326866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C7UD8x1U9SMFsdgOx"]} -{"Format": "IDEA0", "ID": "e3bfad7e-e44c-4c47-b7aa-375110dce886", "DetectTime": "2023-10-30T14:12:05.348399+02:00", "EventTime": "2023-10-30T14:12:05.348417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cw6arf1LjlLTNynNb6"]} -{"Format": "Json", "ID": "e3bfad7e-e44c-4c47-b7aa-375110dce886", "DetectTime": "2023-10-30T14:12:05.348399+02:00", "EventTime": "2023-10-30T14:12:05.348417+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T07:40:27.772038+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2023/10/30 14:12:05.407198)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8c86b307-8a22-4d6f-a4b6-93bd67d26bcb", "DetectTime": "2023-10-30T14:12:05.412724+02:00", "EventTime": "2023-10-30T14:12:05.412740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZS9IAg1I3PVUodsk"]} -{"Format": "IDEA0", "ID": "5d3128cc-c23b-47a4-8210-e7c310a2191f", "DetectTime": "2023-10-30T14:12:05.431845+02:00", "EventTime": "2023-10-30T14:12:05.431862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CUNaTA4I0jVeaWkEdg"]} -{"Format": "IDEA0", "ID": "0a969989-58fa-4e00-bad1-9f9fa8675ff2", "DetectTime": "2023-10-30T14:12:05.463880+02:00", "EventTime": "2023-10-30T14:12:05.463891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6283], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. ", "ContentType": "text/plain"}], "uids": ["CAedAb4xbcTBdtW9z8"]} -{"Format": "IDEA0", "ID": "0599a106-6186-44a8-87f2-0de3e4f5d0ad", "DetectTime": "2023-10-30T14:12:05.498227+02:00", "EventTime": "2023-10-30T14:12:05.498244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CeH2Yq2M5Ke3svUgI6"]} -{"Format": "IDEA0", "ID": "a1b5d15f-f606-4dd3-b1cd-b3edd6b607f7", "DetectTime": "2023-10-30T14:12:05.521168+02:00", "EventTime": "2023-10-30T14:12:05.521181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CR2vW03di4QBPBDLEb"]} -{"Format": "IDEA0", "ID": "9641e7df-00f4-4bf0-aaa8-1dc229b8a8cf", "DetectTime": "2023-10-30T14:12:05.559879+02:00", "EventTime": "2023-10-30T14:12:05.559892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CzrRYJ2oxj46sKtYYk"]} -{"Format": "IDEA0", "ID": "9c44d97c-4b89-4d39-b020-a1c9da0c80ed", "DetectTime": "2023-10-30T14:12:05.595051+02:00", "EventTime": "2023-10-30T14:12:05.595065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CtF5gd1ehuTMUFcjUa"]} -{"Format": "IDEA0", "ID": "77e2aa5e-13ef-4d10-8ef4-7d631212f980", "DetectTime": "2023-10-30T14:12:05.628127+02:00", "EventTime": "2023-10-30T14:12:05.628149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CjvC6a2muE3MuFlie4"]} -{"Format": "IDEA0", "ID": "459f6f50-e381-4285-b5b1-37d51b689a25", "DetectTime": "2023-10-30T14:12:05.664232+02:00", "EventTime": "2023-10-30T14:12:05.664243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ck8gpC2tyImP1DXyae"]} -{"Format": "Json", "ID": "459f6f50-e381-4285-b5b1-37d51b689a25", "DetectTime": "2023-10-30T14:12:05.664232+02:00", "EventTime": "2023-10-30T14:12:05.664243+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:10:40.280209+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:05.750342)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "288c864e-6e96-416f-99d0-4a979b466a8e", "DetectTime": "2023-10-30T14:12:05.754710+02:00", "EventTime": "2023-10-30T14:12:05.754735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Ch9tom2kMvEhHvjoe7"]} -{"Format": "IDEA0", "ID": "3abb0afd-cdff-414b-a73c-ea03d1eeb6af", "DetectTime": "2023-10-30T14:12:05.789486+02:00", "EventTime": "2023-10-30T14:12:05.789498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CsfWxl46y2LT0s6xv2"]} -{"Format": "IDEA0", "ID": "47eeefd7-2e94-4d16-bab2-0047fac341f3", "DetectTime": "2023-10-30T14:12:05.827683+02:00", "EventTime": "2023-10-30T14:12:05.827702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cmd5BA2QyorNm0cxff"]} -{"Format": "IDEA0", "ID": "991a83fd-3893-4dcc-b129-946ba2a8c961", "DetectTime": "2023-10-30T14:12:05.860152+02:00", "EventTime": "2023-10-30T14:12:05.860168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CwUqxM27mE5ZVbLDea"]} -{"Format": "IDEA0", "ID": "2a6c838c-37b2-47f2-a3d2-8669154aeb7c", "DetectTime": "2023-10-30T14:12:05.890707+02:00", "EventTime": "2023-10-30T14:12:05.890722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRFuFs384sq9ZIzZ7c"]} -{"Format": "IDEA0", "ID": "b8868b81-e470-40c5-b90e-43ae98257df9", "DetectTime": "2023-10-30T14:12:05.925438+02:00", "EventTime": "2023-10-30T14:12:05.925450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CzVE5chbwW2jfumC8"]} -{"Format": "IDEA0", "ID": "c70feeab-45f0-40b8-a46f-086f94b99e27", "DetectTime": "2023-10-30T14:12:05.961185+02:00", "EventTime": "2023-10-30T14:12:05.961201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CLkRUn4dwZvffvc1H5"]} -{"Format": "IDEA0", "ID": "0e2a6421-75b7-414a-80be-0d570ea75564", "DetectTime": "2023-10-30T14:12:05.994252+02:00", "EventTime": "2023-10-30T14:12:05.994270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CUmcwk1Xj6k4GKsvvi"]} -{"Format": "Json", "ID": "0e2a6421-75b7-414a-80be-0d570ea75564", "DetectTime": "2023-10-30T14:12:05.994252+02:00", "EventTime": "2023-10-30T14:12:05.994270+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:10:42.011069+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:06.064308)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "76e99a7c-4334-4c96-9a43-e3bd0e7f6438", "DetectTime": "2023-10-30T14:12:06.068936+02:00", "EventTime": "2023-10-30T14:12:06.068952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CKZEOW14VEFI1zvIe8"]} -{"Format": "IDEA0", "ID": "6cacb084-a88e-45c4-b1df-505251476d96", "DetectTime": "2023-10-30T14:12:06.099557+02:00", "EventTime": "2023-10-30T14:12:06.099584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CPDV0XOCUk2OhL8w5"]} -{"Format": "IDEA0", "ID": "b74650aa-23b5-4cad-a0ee-6a70b9eeda49", "DetectTime": "2023-10-30T14:12:06.129953+02:00", "EventTime": "2023-10-30T14:12:06.129969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CjAFps28CsDt7SgyWa"]} -{"Format": "IDEA0", "ID": "0d263e5c-9301-4ff7-9f0a-9b3022c4b656", "DetectTime": "2023-10-30T14:12:06.156608+02:00", "EventTime": "2023-10-30T14:12:06.156626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGh80W1eVrQEp3rDi3"]} -{"Format": "IDEA0", "ID": "17de7502-aaad-456c-861c-12dfcc9ed4d0", "DetectTime": "2023-10-30T14:12:06.183431+02:00", "EventTime": "2023-10-30T14:12:06.183443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CDXpPX11paku6zTcQb"]} -{"Format": "IDEA0", "ID": "86a745e1-c036-48d6-8eea-9a65a859acaf", "DetectTime": "2023-10-30T14:12:06.202764+02:00", "EventTime": "2023-10-30T14:12:06.202776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CaTPEL2YZ7VKI7sLrl"]} -{"Format": "IDEA0", "ID": "96479695-89b8-48e8-8b4f-4f69fb74eddd", "DetectTime": "2023-10-30T14:12:06.229865+02:00", "EventTime": "2023-10-30T14:12:06.229881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CxI29L35clvCmMKF77"]} -{"Format": "IDEA0", "ID": "5a21a7e7-8c72-4f89-992d-c2140975fb6a", "DetectTime": "2023-10-30T14:12:06.258968+02:00", "EventTime": "2023-10-30T14:12:06.258981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CuErzK1zTB4cLuWuQi"]} -{"Format": "IDEA0", "ID": "60eac511-aef7-4942-a182-7e52e6d560de", "DetectTime": "2023-10-30T14:12:06.287230+02:00", "EventTime": "2023-10-30T14:12:06.287241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CSuouO2hXlAboEAyH8"]} -{"Format": "Json", "ID": "60eac511-aef7-4942-a182-7e52e6d560de", "DetectTime": "2023-10-30T14:12:06.287230+02:00", "EventTime": "2023-10-30T14:12:06.287241+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:10:43.641629+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:06.362184)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc7d2924-a7e8-4fd9-befd-ae874fe26b04", "DetectTime": "2023-10-30T14:12:06.366887+02:00", "EventTime": "2023-10-30T14:12:06.366900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C5nQO14htfhezo9Lef"]} -{"Format": "IDEA0", "ID": "8203c33c-a07d-46df-8091-af46753a6d96", "DetectTime": "2023-10-30T14:12:06.393170+02:00", "EventTime": "2023-10-30T14:12:06.393185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CaT5xqh6gLcqXL4nh"]} -{"Format": "IDEA0", "ID": "30a67e92-3bca-473f-a761-1811eb59b88e", "DetectTime": "2023-10-30T14:12:06.421526+02:00", "EventTime": "2023-10-30T14:12:06.421543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CAGAK32UrANAV33tlh"]} -{"Format": "IDEA0", "ID": "755922f1-2ff4-4ce3-953b-29ed02db2188", "DetectTime": "2023-10-30T14:12:06.451469+02:00", "EventTime": "2023-10-30T14:12:06.451492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CsHV7QXLFRZgiB544"]} -{"Format": "IDEA0", "ID": "c07030d0-a05d-4994-8c88-8dc7f59332e0", "DetectTime": "2023-10-30T14:12:06.478761+02:00", "EventTime": "2023-10-30T14:12:06.478795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CQOuY21ASCzxnniqge"]} -{"Format": "IDEA0", "ID": "99fb8c5b-3557-4142-985e-cacdd575bd7f", "DetectTime": "2023-10-30T14:12:06.510424+02:00", "EventTime": "2023-10-30T14:12:06.510443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CxE8se3x53q6l16ZM5"]} -{"Format": "IDEA0", "ID": "40a1bd9f-63e9-46d5-8b30-2f1e8bdf18b1", "DetectTime": "2023-10-30T14:12:06.538692+02:00", "EventTime": "2023-10-30T14:12:06.538706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CvtMA94FPH4EKet9Ag"]} -{"Format": "IDEA0", "ID": "976d2e58-5f1b-4d83-b4d1-326bef157ef4", "DetectTime": "2023-10-30T14:12:06.567967+02:00", "EventTime": "2023-10-30T14:12:06.567983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CzLyUq2WVhBZqOIfmg"]} -{"Format": "Json", "ID": "976d2e58-5f1b-4d83-b4d1-326bef157ef4", "DetectTime": "2023-10-30T14:12:06.567967+02:00", "EventTime": "2023-10-30T14:12:06.567983+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:11:02.836045+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:06.634793)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d6124e42-1165-415b-baee-86834c39fba8", "DetectTime": "2023-10-30T14:12:06.640404+02:00", "EventTime": "2023-10-30T14:12:06.640430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLRU7ZqFO6u6DTKL6"]} -{"Format": "IDEA0", "ID": "cdf4b402-e147-455e-82a0-3036264e3911", "DetectTime": "2023-10-30T14:12:06.664170+02:00", "EventTime": "2023-10-30T14:12:06.664184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNRcvY13hRyod5yO5"]} -{"Format": "IDEA0", "ID": "571281ad-fba8-4af0-bdfb-746f5cd05c5d", "DetectTime": "2023-10-30T14:12:06.692180+02:00", "EventTime": "2023-10-30T14:12:06.692191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CPc0iP26VjE8hLHDh"]} -{"Format": "IDEA0", "ID": "ad66f863-5a37-44a5-9f8d-fc4ec20ecedd", "DetectTime": "2023-10-30T14:12:06.716688+02:00", "EventTime": "2023-10-30T14:12:06.716702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CZKWJ44cdJ3ZmBZ8w5"]} -{"Format": "IDEA0", "ID": "146c91e1-8533-4992-8a7e-fa47fd0e3005", "DetectTime": "2023-10-30T14:12:06.741870+02:00", "EventTime": "2023-10-30T14:12:06.741884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CC2I6ZwTpiEHm4qZh"]} -{"Format": "IDEA0", "ID": "1ee53a9f-5ca8-48ac-b02b-10a1e4bcf61f", "DetectTime": "2023-10-30T14:12:06.769261+02:00", "EventTime": "2023-10-30T14:12:06.769281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CPkBCA4PV8ln73fvCc"]} -{"Format": "IDEA0", "ID": "6d256679-6c24-460e-9cf4-59a8a0a5f1ca", "DetectTime": "2023-10-30T14:12:06.793321+02:00", "EventTime": "2023-10-30T14:12:06.793338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["ChcY2e2k4yH9Q93AU"]} -{"Format": "IDEA0", "ID": "4bb49b7d-223f-476b-a522-7dea48dd906c", "DetectTime": "2023-10-30T14:12:06.826337+02:00", "EventTime": "2023-10-30T14:12:06.826353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CEn3Gd3WeZaaicEQN"]} -{"Format": "IDEA0", "ID": "7aa6c1b4-4b27-4c9b-892d-95f7f8c5edb7", "DetectTime": "2023-10-30T14:12:06.850765+02:00", "EventTime": "2023-10-30T14:12:06.850794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cf7P9T2we0fAU4AG9j"]} -{"Format": "IDEA0", "ID": "fa11b740-52e0-413d-ab03-1082e8c555e9", "DetectTime": "2023-10-30T14:12:06.875847+02:00", "EventTime": "2023-10-30T14:12:06.875858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cj4d3r4XUTwewxnbOb"]} -{"Format": "Json", "ID": "fa11b740-52e0-413d-ab03-1082e8c555e9", "DetectTime": "2023-10-30T14:12:06.875847+02:00", "EventTime": "2023-10-30T14:12:06.875858+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:42:05.687981+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:06.932374)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b091097c-2e6a-4fee-866b-f1601399846f", "DetectTime": "2023-10-30T14:12:06.937566+02:00", "EventTime": "2023-10-30T14:12:06.937583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CxBrEBodAiacw5NV9"]} -{"Format": "IDEA0", "ID": "76b7f73a-d352-401f-b777-5070f70ffd0a", "DetectTime": "2023-10-30T14:12:06.963198+02:00", "EventTime": "2023-10-30T14:12:06.963210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Co9avvJKkALrgRdYf"]} -{"Format": "IDEA0", "ID": "b2028d9d-4073-48d2-8171-6daeafac187c", "DetectTime": "2023-10-30T14:12:06.985174+02:00", "EventTime": "2023-10-30T14:12:06.985187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Compco4mlpScVngEFe"]} -{"Format": "IDEA0", "ID": "a3255ca7-ca54-4ac4-87ca-93b01d555ff8", "DetectTime": "2023-10-30T14:12:07.006703+02:00", "EventTime": "2023-10-30T14:12:07.006722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CAZdmo1ZfN3mukIaa4"]} -{"Format": "IDEA0", "ID": "9e9698a9-43c6-43de-8ab9-a41a41baa9f6", "DetectTime": "2023-10-30T14:12:07.032208+02:00", "EventTime": "2023-10-30T14:12:07.032224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cpckyt3r7VXGaPTvul"]} -{"Format": "IDEA0", "ID": "32fd20df-7841-410d-97f2-293557057165", "DetectTime": "2023-10-30T14:12:07.054629+02:00", "EventTime": "2023-10-30T14:12:07.054643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ChNICX2xiRFKr3awRg"]} -{"Format": "IDEA0", "ID": "da266ce4-6cdb-4a2d-8268-39744fd15d62", "DetectTime": "2023-10-30T14:12:07.076690+02:00", "EventTime": "2023-10-30T14:12:07.076706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CNq1Hr4TGopVyhqUD1"]} -{"Format": "IDEA0", "ID": "22c812de-ebb7-4b22-9d22-2d94d29ebc9e", "DetectTime": "2023-10-30T14:12:07.102072+02:00", "EventTime": "2023-10-30T14:12:07.102088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CWutUg09yY3Gga1X"]} -{"Format": "Json", "ID": "22c812de-ebb7-4b22-9d22-2d94d29ebc9e", "DetectTime": "2023-10-30T14:12:07.102072+02:00", "EventTime": "2023-10-30T14:12:07.102088+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:42:07.537202+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:07.159388)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7ad8303c-203c-4970-adf3-47741116acc8", "DetectTime": "2023-10-30T14:12:07.164228+02:00", "EventTime": "2023-10-30T14:12:07.164248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C70C902Fw3QthX9Oi4"]} -{"Format": "IDEA0", "ID": "527bdd23-41bb-40b9-b330-d89d9bb63006", "DetectTime": "2023-10-30T14:12:07.185617+02:00", "EventTime": "2023-10-30T14:12:07.185630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CukppvU7xF9AY1663"]} -{"Format": "IDEA0", "ID": "55b719f1-91d3-4ca0-8349-cb8c39c3327c", "DetectTime": "2023-10-30T14:12:07.207974+02:00", "EventTime": "2023-10-30T14:12:07.207986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CQin5w4KbpI7qi7ZTj"]} -{"Format": "IDEA0", "ID": "6532aed4-37bd-4868-b1ab-3d986087f518", "DetectTime": "2023-10-30T14:12:07.228889+02:00", "EventTime": "2023-10-30T14:12:07.228908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CaQa9mnatKVVj8Iy2"]} -{"Format": "IDEA0", "ID": "0c991ff4-2035-40d3-9a4d-032328e705f0", "DetectTime": "2023-10-30T14:12:07.249316+02:00", "EventTime": "2023-10-30T14:12:07.249329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C6lIHm1HhxdbBQqu4"]} -{"Format": "IDEA0", "ID": "886e689a-e4cd-4cfb-a9db-ee58bbfeb9e8", "DetectTime": "2023-10-30T14:12:07.270587+02:00", "EventTime": "2023-10-30T14:12:07.270607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXhjpl1EAbitR5ttgk"]} -{"Format": "IDEA0", "ID": "95d69824-d5cd-4a5c-8775-ca1bf7655a2b", "DetectTime": "2023-10-30T14:12:07.290886+02:00", "EventTime": "2023-10-30T14:12:07.290901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C0gdlt4zOh1xGt5BZd"]} -{"Format": "IDEA0", "ID": "e7bd2bd3-33a8-4ab4-94d8-4438885956d8", "DetectTime": "2023-10-30T14:12:07.312722+02:00", "EventTime": "2023-10-30T14:12:07.312746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CJL4XD49Rsq52Lk5Jb"]} -{"Format": "IDEA0", "ID": "28cfd01b-e95d-4326-96b3-c4646004042f", "DetectTime": "2023-10-30T14:12:07.335512+02:00", "EventTime": "2023-10-30T14:12:07.335526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CqpB7QPgx2salYHZj"]} -{"Format": "Json", "ID": "28cfd01b-e95d-4326-96b3-c4646004042f", "DetectTime": "2023-10-30T14:12:07.335512+02:00", "EventTime": "2023-10-30T14:12:07.335526+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T08:42:08.547455+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:07.389991)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "815b375c-f4b1-4b96-8a73-9a99d7e17a1d", "DetectTime": "2023-10-30T14:12:07.395425+02:00", "EventTime": "2023-10-30T14:12:07.395441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cjgv7b38IYPIWOZhS5"]} -{"Format": "IDEA0", "ID": "3ce3f560-49ca-432c-9bd1-3b58a18a39f2", "DetectTime": "2023-10-30T14:12:07.417396+02:00", "EventTime": "2023-10-30T14:12:07.417410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CBoGRX1TlsWBC1hWfi"]} -{"Format": "IDEA0", "ID": "39f358fe-063a-45bd-bc49-9757fec77116", "DetectTime": "2023-10-30T14:12:07.437420+02:00", "EventTime": "2023-10-30T14:12:07.437432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CHzjdA1JIo9Eg5kxUi"]} -{"Format": "IDEA0", "ID": "f10127f2-26bc-4fed-b498-9e4e4e2c963d", "DetectTime": "2023-10-30T14:12:07.458285+02:00", "EventTime": "2023-10-30T14:12:07.458301+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CLDprwiJh1902tPkb"]} -{"Format": "IDEA0", "ID": "6ac78a74-57bc-4720-870c-142ac3f51180", "DetectTime": "2023-10-30T14:12:07.481681+02:00", "EventTime": "2023-10-30T14:12:07.481693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C3PNn24IbGqNM5679f"]} -{"Format": "IDEA0", "ID": "19374a1b-2c29-4655-9e5e-128a18adea9c", "DetectTime": "2023-10-30T14:12:07.501145+02:00", "EventTime": "2023-10-30T14:12:07.501162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CFRARNzhIbNULZDU7"]} -{"Format": "IDEA0", "ID": "96fdd7cc-0d2d-40ef-bd06-ed6d60ab96ec", "DetectTime": "2023-10-30T14:12:07.520418+02:00", "EventTime": "2023-10-30T14:12:07.520434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CKdcqd10q5IYy9KfVd"]} -{"Format": "IDEA0", "ID": "c2dfebd0-bc64-45d0-aa27-3da1ad3a4b29", "DetectTime": "2023-10-30T14:12:07.539108+02:00", "EventTime": "2023-10-30T14:12:07.539120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Czgl8duvyinhFjXo7"]} -{"Format": "IDEA0", "ID": "6d329a5d-9fd7-40c8-9a0c-dd279c10a01f", "DetectTime": "2023-10-30T14:12:07.558246+02:00", "EventTime": "2023-10-30T14:12:07.558258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CosP1T1FAg3h6dPrq1"]} -{"Format": "Json", "ID": "6d329a5d-9fd7-40c8-9a0c-dd279c10a01f", "DetectTime": "2023-10-30T14:12:07.558246+02:00", "EventTime": "2023-10-30T14:12:07.558258+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-08T08:58:13.406180+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2023/10/30 14:12:07.613343)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "517d0b9e-7543-4c3b-89ef-7dae539fd375", "DetectTime": "2023-10-30T14:12:07.617757+02:00", "EventTime": "2023-10-30T14:12:07.617775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["Cxog1h1roVRyevvXm6"]} -{"Format": "IDEA0", "ID": "a27805e5-cbe8-49ed-b376-05760421743d", "DetectTime": "2023-10-30T14:12:07.654753+02:00", "EventTime": "2023-10-30T14:12:07.654765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CHXPdD3jpVuzxTvwpf"]} -{"Format": "IDEA0", "ID": "6089271c-89b9-4600-bdfa-3599754981d6", "DetectTime": "2023-10-30T14:12:07.686635+02:00", "EventTime": "2023-10-30T14:12:07.686653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CLUvPi3uk2vVX0BQMc"]} -{"Format": "IDEA0", "ID": "e305ce18-80a9-4536-8bc1-3d0a961e16c6", "DetectTime": "2023-10-30T14:12:07.706472+02:00", "EventTime": "2023-10-30T14:12:07.706489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cw8GLi4jomI47xP5P8"]} -{"Format": "IDEA0", "ID": "771f5af1-e00c-41ac-8fcc-614b9c578ea5", "DetectTime": "2023-10-30T14:12:07.739554+02:00", "EventTime": "2023-10-30T14:12:07.739564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C0ik5G12ukXdJgWr7i"]} -{"Format": "IDEA0", "ID": "a62f78c4-d325-4e50-809e-17ee592c77bd", "DetectTime": "2023-10-30T14:12:07.776316+02:00", "EventTime": "2023-10-30T14:12:07.776330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CIdghTvwvgFgQGVWa"]} -{"Format": "IDEA0", "ID": "d4f1d4ae-d232-4fc0-a158-a9b55e90edec", "DetectTime": "2023-10-30T14:12:07.808142+02:00", "EventTime": "2023-10-30T14:12:07.808158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C3xTUS1yUbAtCHdTS4"]} -{"Format": "IDEA0", "ID": "c774f25d-fe43-4cf0-846b-7e8e5458edbc", "DetectTime": "2023-10-30T14:12:07.842132+02:00", "EventTime": "2023-10-30T14:12:07.842145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CYYmDm1k1JQL5IN4M5"]} -{"Format": "Json", "ID": "c774f25d-fe43-4cf0-846b-7e8e5458edbc", "DetectTime": "2023-10-30T14:12:07.842132+02:00", "EventTime": "2023-10-30T14:12:07.842145+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:12:49.958605+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:07.919675)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2cae19a3-1224-4bb6-9acb-71823ee31563", "DetectTime": "2023-10-30T14:12:07.924695+02:00", "EventTime": "2023-10-30T14:12:07.924712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CRg3Sd22EUYHBKItkk"]} -{"Format": "IDEA0", "ID": "bb1166c0-4357-4d0a-bace-80e19baf5ff1", "DetectTime": "2023-10-30T14:12:07.957870+02:00", "EventTime": "2023-10-30T14:12:07.957884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CKX4W13iOykBlzHVm1"]} -{"Format": "IDEA0", "ID": "343952fd-1e0f-4e1f-85b8-a46ed6bc365d", "DetectTime": "2023-10-30T14:12:07.992959+02:00", "EventTime": "2023-10-30T14:12:07.992977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CASSG728cXrgN7J1jc"]} -{"Format": "IDEA0", "ID": "4a7e1d7c-de2b-4bc7-9c5d-0060ea494f86", "DetectTime": "2023-10-30T14:12:08.029671+02:00", "EventTime": "2023-10-30T14:12:08.029687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CPEFLC3hLUaA35pp23"]} -{"Format": "IDEA0", "ID": "8e9a60f5-0ffb-4eea-9b71-336b468678ac", "DetectTime": "2023-10-30T14:12:08.063716+02:00", "EventTime": "2023-10-30T14:12:08.063743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CyjTrL8JfdHrbzVM4"]} -{"Format": "IDEA0", "ID": "aa805bf7-3d8c-4950-a1e8-6f51c27930d3", "DetectTime": "2023-10-30T14:12:08.093899+02:00", "EventTime": "2023-10-30T14:12:08.093912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CyHJTg1pe3sRgqayJk"]} -{"Format": "IDEA0", "ID": "d0185e20-2ddd-4260-858a-895050ff49bf", "DetectTime": "2023-10-30T14:12:08.125526+02:00", "EventTime": "2023-10-30T14:12:08.125538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CcHqM01vUhJjLyEpVg"]} -{"Format": "IDEA0", "ID": "4988d235-4284-48a9-9d9d-222ddc2ebab8", "DetectTime": "2023-10-30T14:12:08.158210+02:00", "EventTime": "2023-10-30T14:12:08.158236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C0guZv3msbnc1wSHC5"]} -{"Format": "Json", "ID": "4988d235-4284-48a9-9d9d-222ddc2ebab8", "DetectTime": "2023-10-30T14:12:08.158210+02:00", "EventTime": "2023-10-30T14:12:08.158236+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:12:51.813174+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:08.233495)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9dfb7a6e-8360-4e58-b475-20f3738df918", "DetectTime": "2023-10-30T14:12:08.237451+02:00", "EventTime": "2023-10-30T14:12:08.237461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C0YS6f41opjcoj5td7"]} -{"Format": "IDEA0", "ID": "402d3ce2-048e-4925-a1b7-a7088f767f36", "DetectTime": "2023-10-30T14:12:08.267110+02:00", "EventTime": "2023-10-30T14:12:08.267130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CIz2xVLHdpQ5Gvcb"]} -{"Format": "IDEA0", "ID": "3eea3279-579f-425c-b9f1-5f007c5f3cd7", "DetectTime": "2023-10-30T14:12:08.296948+02:00", "EventTime": "2023-10-30T14:12:08.296965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCYQbH3Mw3fwsflBgd"]} -{"Format": "IDEA0", "ID": "56d71f26-7232-4841-acfb-b1920b2f67e0", "DetectTime": "2023-10-30T14:12:08.327325+02:00", "EventTime": "2023-10-30T14:12:08.327342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CAe4RQ3J4nmmJ5ZIq"]} -{"Format": "IDEA0", "ID": "37c6e904-ad5c-4a7c-8316-7522ab1052e4", "DetectTime": "2023-10-30T14:12:08.355869+02:00", "EventTime": "2023-10-30T14:12:08.355881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CsMUNW2quWtoK3b4T8"]} -{"Format": "IDEA0", "ID": "78267a29-b1ec-47e3-93e9-867937fa9d36", "DetectTime": "2023-10-30T14:12:08.381482+02:00", "EventTime": "2023-10-30T14:12:08.381495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CDi5d22HUoKxjkz63c"]} -{"Format": "IDEA0", "ID": "d980b648-aaf4-4ff4-8006-b89737ef6e3f", "DetectTime": "2023-10-30T14:12:08.412085+02:00", "EventTime": "2023-10-30T14:12:08.412102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtmaIFu5hATfmzChi"]} -{"Format": "IDEA0", "ID": "72192d6b-62b5-48df-b3cf-04861b3bab0f", "DetectTime": "2023-10-30T14:12:08.433092+02:00", "EventTime": "2023-10-30T14:12:08.433103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CQUqqS3J8fQ5dpixob"]} -{"Format": "IDEA0", "ID": "4e250eb1-3a2f-46c9-b74a-24d6cc17f66f", "DetectTime": "2023-10-30T14:12:08.464866+02:00", "EventTime": "2023-10-30T14:12:08.464887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C4RAOT2AZJ5AW691oi"]} -{"Format": "Json", "ID": "4e250eb1-3a2f-46c9-b74a-24d6cc17f66f", "DetectTime": "2023-10-30T14:12:08.464866+02:00", "EventTime": "2023-10-30T14:12:08.464887+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:12:53.412859+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:08.534518)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8db65e7e-a379-4f91-a38e-ecbe0fddd768", "DetectTime": "2023-10-30T14:12:08.539491+02:00", "EventTime": "2023-10-30T14:12:08.539506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CJbT9EO6cRWlpFuZ1"]} -{"Format": "IDEA0", "ID": "d1d9b1b1-58c0-498e-9d39-2e96588b27a1", "DetectTime": "2023-10-30T14:12:08.562800+02:00", "EventTime": "2023-10-30T14:12:08.562825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CHO5Qp2F8lLH8fpSGf"]} -{"Format": "IDEA0", "ID": "d33a6309-3837-4141-a70f-b881c15817a6", "DetectTime": "2023-10-30T14:12:08.593561+02:00", "EventTime": "2023-10-30T14:12:08.593576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CxwGem31026XpJBmb5"]} -{"Format": "IDEA0", "ID": "63b3d7e5-bda4-4f87-b367-6da056561228", "DetectTime": "2023-10-30T14:12:08.622498+02:00", "EventTime": "2023-10-30T14:12:08.622511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CzbGw02GuPlaQFMO"]} -{"Format": "IDEA0", "ID": "17db8b9d-6f99-46b2-b3d0-fac111ea1fbb", "DetectTime": "2023-10-30T14:12:08.655155+02:00", "EventTime": "2023-10-30T14:12:08.655172+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Ca6qnT1NY52lA68KV8"]} -{"Format": "IDEA0", "ID": "98a7a793-7ac4-4fc4-a2af-1f77da4f84f6", "DetectTime": "2023-10-30T14:12:08.680768+02:00", "EventTime": "2023-10-30T14:12:08.680786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CmR8RiraYOreJX5zi"]} -{"Format": "IDEA0", "ID": "ff6c459f-ce7d-4845-b81e-c91d694aabee", "DetectTime": "2023-10-30T14:12:08.702465+02:00", "EventTime": "2023-10-30T14:12:08.702477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CShadt16q2JghhExvc"]} -{"Format": "IDEA0", "ID": "010e2c54-9e93-4e98-b033-6f6287a00c63", "DetectTime": "2023-10-30T14:12:08.730042+02:00", "EventTime": "2023-10-30T14:12:08.730061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CwBKZvfyf46lk0VYd"]} -{"Format": "IDEA0", "ID": "acf7e649-5400-4c97-a3f2-4a3fc68ecfbf", "DetectTime": "2023-10-30T14:12:08.757810+02:00", "EventTime": "2023-10-30T14:12:08.757823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CuPSXS3Hlho4OqLqDa"]} -{"Format": "IDEA0", "ID": "6d854670-6659-47bf-8c97-dcb8246888a5", "DetectTime": "2023-10-30T14:12:08.786304+02:00", "EventTime": "2023-10-30T14:12:08.786330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ch9xp81MwjdlUgSJyg"]} -{"Format": "IDEA0", "ID": "64855997-75a6-43fe-b66c-2568ea0522fb", "DetectTime": "2023-10-30T14:12:08.812182+02:00", "EventTime": "2023-10-30T14:12:08.812196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CxETyF2VyvWYBBmkXc"]} -{"Format": "IDEA0", "ID": "b480ae3c-dac1-4302-a52b-03242869ea92", "DetectTime": "2023-10-30T14:12:08.834766+02:00", "EventTime": "2023-10-30T14:12:08.834829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CezHpv3p4dQHtaBWf5"]} -{"Format": "Json", "ID": "b480ae3c-dac1-4302-a52b-03242869ea92", "DetectTime": "2023-10-30T14:12:08.834766+02:00", "EventTime": "2023-10-30T14:12:08.834829+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:12:55.184690+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:08.908659)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fe3909cf-3aad-46db-a53d-18ba5fe24fae", "DetectTime": "2023-10-30T14:12:08.914041+02:00", "EventTime": "2023-10-30T14:12:08.914057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkU9Qo18lNu300Sh19"]} -{"Format": "IDEA0", "ID": "0b574af3-f31d-478b-9ae1-c0b0b745d800", "DetectTime": "2023-10-30T14:12:08.942976+02:00", "EventTime": "2023-10-30T14:12:08.942987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["COAuRGIoepuEktoci"]} -{"Format": "IDEA0", "ID": "95c9dc77-91f3-4c25-9cd9-960c733f1a27", "DetectTime": "2023-10-30T14:12:08.966702+02:00", "EventTime": "2023-10-30T14:12:08.966720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["CrE3sA3M22QGHSzBta"]} -{"Format": "IDEA0", "ID": "6f72b225-20c7-44fa-a663-8bf2c057290f", "DetectTime": "2023-10-30T14:12:08.992047+02:00", "EventTime": "2023-10-30T14:12:08.992063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CKhlmBv2dukDFTKu1"]} -{"Format": "IDEA0", "ID": "50576999-ae26-4c67-befc-06eac8aed937", "DetectTime": "2023-10-30T14:12:09.017601+02:00", "EventTime": "2023-10-30T14:12:09.017616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CZbG3I3VUOYUiO7c66"]} -{"Format": "IDEA0", "ID": "bd55f490-a3f1-47a3-8a66-df5522095ef9", "DetectTime": "2023-10-30T14:12:09.043936+02:00", "EventTime": "2023-10-30T14:12:09.043950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CrgViGSP1bOAnFwGj"]} -{"Format": "IDEA0", "ID": "c26b1df0-92dc-4fdd-8a6a-c006582d991c", "DetectTime": "2023-10-30T14:12:09.066308+02:00", "EventTime": "2023-10-30T14:12:09.066324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CKyHMIHMro8pu849f"]} -{"Format": "IDEA0", "ID": "634fd831-8061-4672-a498-60e0bffee824", "DetectTime": "2023-10-30T14:12:09.091497+02:00", "EventTime": "2023-10-30T14:12:09.091514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CpVlDs1HNOdgEGYHyj"]} -{"Format": "IDEA0", "ID": "46be90e5-98b8-48da-8fb8-337af0860952", "DetectTime": "2023-10-30T14:12:09.119127+02:00", "EventTime": "2023-10-30T14:12:09.119143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cvdh6k3EVts1ux35xb"]} -{"Format": "Json", "ID": "46be90e5-98b8-48da-8fb8-337af0860952", "DetectTime": "2023-10-30T14:12:09.119127+02:00", "EventTime": "2023-10-30T14:12:09.119143+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:43:28.086746+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:09.181122)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "259dc1d7-2cf3-4eb3-baa7-b91bf78431d2", "DetectTime": "2023-10-30T14:12:09.185553+02:00", "EventTime": "2023-10-30T14:12:09.185565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CcY15U1M4nLcrc0GM4"]} -{"Format": "IDEA0", "ID": "681ff625-0b8c-4f46-9528-f22ff1ae3910", "DetectTime": "2023-10-30T14:12:09.211049+02:00", "EventTime": "2023-10-30T14:12:09.211061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CblV8j25dAQUTtefsb"]} -{"Format": "IDEA0", "ID": "50edd5d0-ad9c-47dc-afe5-beb5e10bbf1b", "DetectTime": "2023-10-30T14:12:09.234705+02:00", "EventTime": "2023-10-30T14:12:09.234721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CAD5uU1y6LdkoEVipb"]} -{"Format": "IDEA0", "ID": "d62e74a3-6d47-4706-9b5d-f698453e3709", "DetectTime": "2023-10-30T14:12:09.259869+02:00", "EventTime": "2023-10-30T14:12:09.259881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CllQYg3ifzWR6USauc"]} -{"Format": "IDEA0", "ID": "2dfe7247-67e1-4ffa-a9e8-f47a70e80709", "DetectTime": "2023-10-30T14:12:09.280330+02:00", "EventTime": "2023-10-30T14:12:09.280347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C3O5Zb6Ubjdr2oe5"]} -{"Format": "IDEA0", "ID": "36263971-1e6b-414f-bba0-c8493c0ef579", "DetectTime": "2023-10-30T14:12:09.304370+02:00", "EventTime": "2023-10-30T14:12:09.304387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CqPqW74jsefvv4fr4e"]} -{"Format": "IDEA0", "ID": "451c2d14-ef16-4c1a-ba61-d48a599696d9", "DetectTime": "2023-10-30T14:12:09.328914+02:00", "EventTime": "2023-10-30T14:12:09.328933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CldscQ6XVjkyVhefe"]} -{"Format": "IDEA0", "ID": "f63240fe-e119-42c0-a086-ab5988bb850d", "DetectTime": "2023-10-30T14:12:09.353115+02:00", "EventTime": "2023-10-30T14:12:09.353128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Crbcwm3HRT9qjnV44k"]} -{"Format": "IDEA0", "ID": "7a5a870f-c63d-4b91-9ed3-db349e7fded2", "DetectTime": "2023-10-30T14:12:09.376876+02:00", "EventTime": "2023-10-30T14:12:09.376896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CJLboh22T1gNrRMAE7"]} -{"Format": "IDEA0", "ID": "5f9ad78f-b33a-4033-ab00-d294e2272cc7", "DetectTime": "2023-10-30T14:12:09.398966+02:00", "EventTime": "2023-10-30T14:12:09.398992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CE7gKu209fOp929DOe"]} -{"Format": "Json", "ID": "5f9ad78f-b33a-4033-ab00-d294e2272cc7", "DetectTime": "2023-10-30T14:12:09.398966+02:00", "EventTime": "2023-10-30T14:12:09.398992+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:43:29.899337+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:09.463436)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "59066a1d-ba59-44a1-97cd-13955485b914", "DetectTime": "2023-10-30T14:12:09.467917+02:00", "EventTime": "2023-10-30T14:12:09.467928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cs95F62u41tvpGxlrg"]} -{"Format": "IDEA0", "ID": "3291519f-7192-48dd-8833-d2152a086c89", "DetectTime": "2023-10-30T14:12:09.491643+02:00", "EventTime": "2023-10-30T14:12:09.491659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0r7tbHVsLqllitoi"]} -{"Format": "IDEA0", "ID": "dfdf1b27-0b7f-4750-8caa-91c9d9f696e5", "DetectTime": "2023-10-30T14:12:09.513254+02:00", "EventTime": "2023-10-30T14:12:09.513282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CkMKMv3ylt6qy6yq03"]} -{"Format": "IDEA0", "ID": "0e2086b9-cfa2-4599-bb31-f0e55e67584d", "DetectTime": "2023-10-30T14:12:09.537355+02:00", "EventTime": "2023-10-30T14:12:09.537372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CdOPH11byAFbOIj3O6"]} -{"Format": "IDEA0", "ID": "78ab927e-f053-47e2-aabc-f7ceb2ae0be6", "DetectTime": "2023-10-30T14:12:09.559426+02:00", "EventTime": "2023-10-30T14:12:09.559451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CkKCRF0N5plwlTYe6"]} -{"Format": "IDEA0", "ID": "808b1acd-3c80-4f42-8f25-e59e80e21daf", "DetectTime": "2023-10-30T14:12:09.579380+02:00", "EventTime": "2023-10-30T14:12:09.579395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXfDNyNsqRA2U5d55"]} -{"Format": "IDEA0", "ID": "93484c4b-795c-44b5-b1ef-95b7ed8f768c", "DetectTime": "2023-10-30T14:12:09.601846+02:00", "EventTime": "2023-10-30T14:12:09.601858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CRiC5c4KdVCMeGIlOf"]} -{"Format": "IDEA0", "ID": "a05fd994-3795-41e9-a9c7-39393b860a63", "DetectTime": "2023-10-30T14:12:09.623081+02:00", "EventTime": "2023-10-30T14:12:09.623098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cw9F4Y3tDSLBYrbgm"]} -{"Format": "IDEA0", "ID": "b29f4e21-4807-45e9-a23f-9b5d16809646", "DetectTime": "2023-10-30T14:12:09.645349+02:00", "EventTime": "2023-10-30T14:12:09.645361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CFOc2v4GokLkeH4RI6"]} -{"Format": "Json", "ID": "b29f4e21-4807-45e9-a23f-9b5d16809646", "DetectTime": "2023-10-30T14:12:09.645349+02:00", "EventTime": "2023-10-30T14:12:09.645361+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T09:43:49.528950+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2023/10/30 14:12:09.704470)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5b122394-92c7-4f88-868d-41a7c9357787", "DetectTime": "2023-10-30T14:12:09.709244+02:00", "EventTime": "2023-10-30T14:12:09.709260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CdgbFBGVH410FDM18"]} -{"Format": "IDEA0", "ID": "8704775d-8b59-41da-a3f4-745d1bb7450f", "DetectTime": "2023-10-30T14:12:09.729369+02:00", "EventTime": "2023-10-30T14:12:09.729383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXTm213Hd3LiN36lff"]} -{"Format": "IDEA0", "ID": "11f9b54a-4182-4e37-960b-28cdab8205fe", "DetectTime": "2023-10-30T14:12:09.748195+02:00", "EventTime": "2023-10-30T14:12:09.748207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CmwKPu13HWctoaqn48"]} -{"Format": "IDEA0", "ID": "c1fd46bf-ff7a-42b8-8f4f-833a215f5c0e", "DetectTime": "2023-10-30T14:12:09.767894+02:00", "EventTime": "2023-10-30T14:12:09.767905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CEdLBk2mdr6HrZi8nh"]} -{"Format": "IDEA0", "ID": "625bb141-1bf1-4438-9191-d61b46b19d24", "DetectTime": "2023-10-30T14:12:09.784275+02:00", "EventTime": "2023-10-30T14:12:09.784289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CobHSo41PAmK9ecMf9"]} -{"Format": "IDEA0", "ID": "8119298a-ac6e-4591-99ca-9855bbc7c971", "DetectTime": "2023-10-30T14:12:09.807126+02:00", "EventTime": "2023-10-30T14:12:09.807142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CaKhMb4xe0hhT2YQmg"]} -{"Format": "IDEA0", "ID": "20e09366-a436-42a4-8317-981cc3e0593f", "DetectTime": "2023-10-30T14:12:09.827787+02:00", "EventTime": "2023-10-30T14:12:09.827809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CUXOaR1v8Y8IZwj0bf"]} -{"Format": "IDEA0", "ID": "95c7ef18-9723-4d31-a94a-81be76cd5428", "DetectTime": "2023-10-30T14:12:09.849390+02:00", "EventTime": "2023-10-30T14:12:09.849410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CM47Ba41LlwCGsVd9j"]} -{"Format": "IDEA0", "ID": "5301b4fe-d6f2-486f-867b-6085b00d0329", "DetectTime": "2023-10-30T14:12:09.868732+02:00", "EventTime": "2023-10-30T14:12:09.868748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CtGuVr4kEUQvkA7WG1"]} -{"Format": "IDEA0", "ID": "4db776f9-7f27-45f0-b08d-44438b8a14f0", "DetectTime": "2023-10-30T14:12:09.890442+02:00", "EventTime": "2023-10-30T14:12:09.890463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CErOGS1OcKAqwu8mR7"]} -{"Format": "IDEA0", "ID": "fbf3ee21-f4aa-42e8-b3f3-333d188d3338", "DetectTime": "2023-10-30T14:12:09.924046+02:00", "EventTime": "2023-10-30T14:12:09.924062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CbV1Xl3NMWeDzsN3Dd"]} -{"Format": "IDEA0", "ID": "65217179-6eb1-4e16-bda3-3e7072452dde", "DetectTime": "2023-10-30T14:12:09.957193+02:00", "EventTime": "2023-10-30T14:12:09.957207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CSvkTi1HPfTqexQ5Qa"]} -{"Format": "IDEA0", "ID": "622e9e01-1cbf-47cd-96d6-06c0897402e7", "DetectTime": "2023-10-30T14:12:09.990976+02:00", "EventTime": "2023-10-30T14:12:09.990995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CovbYB4XZgbEUnRKsj"]} -{"Format": "IDEA0", "ID": "6033b60f-9c06-474f-a86c-594f15f65eed", "DetectTime": "2023-10-30T14:12:10.023940+02:00", "EventTime": "2023-10-30T14:12:10.023954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CLYvtp3cLbZpN4MD0j"]} -{"Format": "IDEA0", "ID": "9be5e0b6-e8c5-4056-b04c-54a233ae7f8e", "DetectTime": "2023-10-30T14:12:10.057286+02:00", "EventTime": "2023-10-30T14:12:10.057303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CWv08i12WIae8pwL3j"]} -{"Format": "IDEA0", "ID": "c660d55d-bc52-44b9-b90a-da9872d0f102", "DetectTime": "2023-10-30T14:12:10.091461+02:00", "EventTime": "2023-10-30T14:12:10.091473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CYlt3FiTUfcGNI4gk"]} -{"Format": "IDEA0", "ID": "d2657184-ef98-4e85-b02b-47ab621cd3ad", "DetectTime": "2023-10-30T14:12:10.129001+02:00", "EventTime": "2023-10-30T14:12:10.129021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ctvc6e2tS8TwBU09e7"]} -{"Format": "IDEA0", "ID": "f723fdee-ab95-46ce-9353-19a125857f3b", "DetectTime": "2023-10-30T14:12:10.149004+02:00", "EventTime": "2023-10-30T14:12:10.149016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQnQjF2RChu0xNabj3"]} -{"Format": "Json", "ID": "f723fdee-ab95-46ce-9353-19a125857f3b", "DetectTime": "2023-10-30T14:12:10.149004+02:00", "EventTime": "2023-10-30T14:12:10.149016+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:14:49.660330+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:10.228649)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8b9a3bbf-726f-4547-bcca-cf1dbe7cda00", "DetectTime": "2023-10-30T14:12:10.236384+02:00", "EventTime": "2023-10-30T14:12:10.236411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CUFFuG2JJGCJKpy0Gh"]} -{"Format": "IDEA0", "ID": "11e9d292-3763-49cc-9363-1b80b4838858", "DetectTime": "2023-10-30T14:12:10.274960+02:00", "EventTime": "2023-10-30T14:12:10.274975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CJlzdv1qMHkPIkxgC6"]} -{"Format": "IDEA0", "ID": "da16f7f7-b408-42f9-a2b1-76ca96564f86", "DetectTime": "2023-10-30T14:12:10.307363+02:00", "EventTime": "2023-10-30T14:12:10.307378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C8jk7Mi78R2pyvCYb"]} -{"Format": "IDEA0", "ID": "a05bd2d9-19d9-4866-947c-824eccd66877", "DetectTime": "2023-10-30T14:12:10.341814+02:00", "EventTime": "2023-10-30T14:12:10.341825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CkMMjq1ALZ5l9nS1ol"]} -{"Format": "IDEA0", "ID": "28a330da-a3b8-4e52-ab8b-732a5ca1104e", "DetectTime": "2023-10-30T14:12:10.374845+02:00", "EventTime": "2023-10-30T14:12:10.374858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C5SZu63qledb2tUCcc"]} -{"Format": "IDEA0", "ID": "e76daf9c-4cdd-4e48-aa28-5f0f7122b8b8", "DetectTime": "2023-10-30T14:12:10.405673+02:00", "EventTime": "2023-10-30T14:12:10.405685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CJ2XQg14RLzErrK7Zf"]} -{"Format": "IDEA0", "ID": "aead3db4-f0d3-4ddf-95c4-b45531586c52", "DetectTime": "2023-10-30T14:12:10.427058+02:00", "EventTime": "2023-10-30T14:12:10.427082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CIuSIX3DKf5WTS3Xz7"]} -{"Format": "IDEA0", "ID": "27e8681a-36a3-4747-8b22-c0fcabe7e1e9", "DetectTime": "2023-10-30T14:12:10.457144+02:00", "EventTime": "2023-10-30T14:12:10.457160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C1Wjnq3YiQX8oAmUtl"]} -{"Format": "IDEA0", "ID": "769a1935-5dad-4e81-a935-e2e7edb019a6", "DetectTime": "2023-10-30T14:12:10.490659+02:00", "EventTime": "2023-10-30T14:12:10.490670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C7oePe8VmUCBNlXTb"]} -{"Format": "Json", "ID": "769a1935-5dad-4e81-a935-e2e7edb019a6", "DetectTime": "2023-10-30T14:12:10.490659+02:00", "EventTime": "2023-10-30T14:12:10.490670+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:14:51.449153+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:10.562141)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d352a209-f1a4-4c1e-9fbf-fa6d06c7df9c", "DetectTime": "2023-10-30T14:12:10.566724+02:00", "EventTime": "2023-10-30T14:12:10.566735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Crx5PJ3YToueJ0bGtl"]} -{"Format": "IDEA0", "ID": "1934042b-6fba-4f20-bf67-f51a14bbc7ee", "DetectTime": "2023-10-30T14:12:10.598279+02:00", "EventTime": "2023-10-30T14:12:10.598291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Cx3Woh2gFkYm24rwYd"]} -{"Format": "IDEA0", "ID": "6e4167f1-fd81-4fe0-aa73-17e9b0f53356", "DetectTime": "2023-10-30T14:12:10.620122+02:00", "EventTime": "2023-10-30T14:12:10.620138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CF9qtQY5Kdi4byDF"]} -{"Format": "IDEA0", "ID": "ea7a53aa-b5d4-484f-afe8-7ef7c76ead57", "DetectTime": "2023-10-30T14:12:10.645607+02:00", "EventTime": "2023-10-30T14:12:10.645620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CS2sDZ1TAy3eLeShfk"]} -{"Format": "IDEA0", "ID": "5859e5d6-b374-400b-9c75-3d6925c14ddc", "DetectTime": "2023-10-30T14:12:10.675102+02:00", "EventTime": "2023-10-30T14:12:10.675118+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cl2zht4uWB2j017WD9"]} -{"Format": "IDEA0", "ID": "01f6d50c-9cbe-4b06-834a-b00ae8bf8584", "DetectTime": "2023-10-30T14:12:10.695945+02:00", "EventTime": "2023-10-30T14:12:10.695968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C1Isfi2mRteSoDNeeh"]} -{"Format": "IDEA0", "ID": "4a60da59-7654-4900-b2b4-217f8ce5ea1e", "DetectTime": "2023-10-30T14:12:10.726811+02:00", "EventTime": "2023-10-30T14:12:10.726828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CjgMUr2n7N8ljqo8Ac"]} -{"Format": "IDEA0", "ID": "9abfd405-16ee-445a-954a-24912139a78a", "DetectTime": "2023-10-30T14:12:10.754947+02:00", "EventTime": "2023-10-30T14:12:10.754960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C5UM2k4Q1si3CK0lQa"]} -{"Format": "IDEA0", "ID": "171b708d-ce75-4ac4-854c-9d8401418cca", "DetectTime": "2023-10-30T14:12:10.786125+02:00", "EventTime": "2023-10-30T14:12:10.786140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CMKfRu4p2Nyul3I4q8"]} -{"Format": "IDEA0", "ID": "9220b33d-9e5a-4642-8540-5f8c6a88628d", "DetectTime": "2023-10-30T14:12:10.808904+02:00", "EventTime": "2023-10-30T14:12:10.808917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CG7EBW2CWZ4UfuSP78"]} -{"Format": "IDEA0", "ID": "e41b83a9-13c8-4e1d-b4bd-b5118d5fa31f", "DetectTime": "2023-10-30T14:12:10.837400+02:00", "EventTime": "2023-10-30T14:12:10.837413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C7Tl784DSccEmHYyfe"]} -{"Format": "Json", "ID": "e41b83a9-13c8-4e1d-b4bd-b5118d5fa31f", "DetectTime": "2023-10-30T14:12:10.837400+02:00", "EventTime": "2023-10-30T14:12:10.837413+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:14:53.770939+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:10.908593)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "deeb1e9c-2ac6-4c54-9f29-b7576d1392eb", "DetectTime": "2023-10-30T14:12:10.913356+02:00", "EventTime": "2023-10-30T14:12:10.913367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CrOcBu3WmXoUbwojo1"]} -{"Format": "IDEA0", "ID": "9356dd98-6f4d-4d74-9c92-e9d26e450e62", "DetectTime": "2023-10-30T14:12:10.942812+02:00", "EventTime": "2023-10-30T14:12:10.942828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cfjv9t3pDR8ENE11Qd"]} -{"Format": "IDEA0", "ID": "64e01b1d-a50f-43ee-b92c-233f46511abf", "DetectTime": "2023-10-30T14:12:10.971681+02:00", "EventTime": "2023-10-30T14:12:10.971699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CQsNOr1IWf2ucgjuKc"]} -{"Format": "IDEA0", "ID": "db9ec016-dfb1-4e91-9476-9671cc43698b", "DetectTime": "2023-10-30T14:12:10.994595+02:00", "EventTime": "2023-10-30T14:12:10.994610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CTosuo2YMApPdj4Y56"]} -{"Format": "IDEA0", "ID": "39140dc3-13d2-4dd4-9ba8-bd28cc3fe4e2", "DetectTime": "2023-10-30T14:12:11.020316+02:00", "EventTime": "2023-10-30T14:12:11.020332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Ce4cBq1VpGPErWemd4"]} -{"Format": "IDEA0", "ID": "31406604-1077-4143-9757-b33005c611d3", "DetectTime": "2023-10-30T14:12:11.048716+02:00", "EventTime": "2023-10-30T14:12:11.048729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CKXxBvSNFn76wPwF5"]} -{"Format": "IDEA0", "ID": "352aec83-d724-483a-b806-f2c173766c01", "DetectTime": "2023-10-30T14:12:11.073894+02:00", "EventTime": "2023-10-30T14:12:11.073904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CgbfV94djE0m4w9L13"]} -{"Format": "IDEA0", "ID": "f6fd32fb-487e-4406-a2b0-73ffc11266cf", "DetectTime": "2023-10-30T14:12:11.101737+02:00", "EventTime": "2023-10-30T14:12:11.101757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CyMwsa4jdPAIyPyGe8"]} -{"Format": "IDEA0", "ID": "2decd601-e7ce-4edd-9270-371d709bd43e", "DetectTime": "2023-10-30T14:12:11.126007+02:00", "EventTime": "2023-10-30T14:12:11.126024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CfsZjA2aGGZpxrWUg6"]} -{"Format": "IDEA0", "ID": "1837bfd9-3869-47dc-950b-5774be48a009", "DetectTime": "2023-10-30T14:12:11.153333+02:00", "EventTime": "2023-10-30T14:12:11.153343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. ", "ContentType": "text/plain"}], "uids": ["ChQYh7Mr32XEiR2Ge"]} -{"Format": "Json", "ID": "1837bfd9-3869-47dc-950b-5774be48a009", "DetectTime": "2023-10-30T14:12:11.153333+02:00", "EventTime": "2023-10-30T14:12:11.153343+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7824], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:45:09.527414+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:11.222299)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c43b0f40-f2a1-4c05-a7bc-2d48eba808d7", "DetectTime": "2023-10-30T14:12:11.226560+02:00", "EventTime": "2023-10-30T14:12:11.226571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CG18703gKNEulX63Sj"]} -{"Format": "IDEA0", "ID": "93705617-36f7-4537-a6c8-041ef9236699", "DetectTime": "2023-10-30T14:12:11.250687+02:00", "EventTime": "2023-10-30T14:12:11.250699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CySnno25Iv2Ba43Ogi"]} -{"Format": "IDEA0", "ID": "3622b7d6-265f-4261-8313-071d766b7bdb", "DetectTime": "2023-10-30T14:12:11.272762+02:00", "EventTime": "2023-10-30T14:12:11.272778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CV77MX3MnbyVUK6JGb"]} -{"Format": "IDEA0", "ID": "818bd84e-1a32-46fb-92be-0d263e63cb71", "DetectTime": "2023-10-30T14:12:11.298676+02:00", "EventTime": "2023-10-30T14:12:11.298692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CSep5e4A4eAuJEiebj"]} -{"Format": "IDEA0", "ID": "4c48c3d2-f449-4bc1-b2ab-3c35af011716", "DetectTime": "2023-10-30T14:12:11.322908+02:00", "EventTime": "2023-10-30T14:12:11.322920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CKKf1O3djo17IzvXDa"]} -{"Format": "IDEA0", "ID": "f5e8e32b-58e5-4433-bd26-53be11211821", "DetectTime": "2023-10-30T14:12:11.347909+02:00", "EventTime": "2023-10-30T14:12:11.347927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CfQ2EC17fFoKIbD3ma"]} -{"Format": "IDEA0", "ID": "172fa91b-7e1c-43eb-ad3b-c644efaea988", "DetectTime": "2023-10-30T14:12:11.373044+02:00", "EventTime": "2023-10-30T14:12:11.373055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CG3Yjk3cI4Ur6vDyC8"]} -{"Format": "IDEA0", "ID": "06993e43-7c69-4866-9c40-8673765da3c7", "DetectTime": "2023-10-30T14:12:11.398835+02:00", "EventTime": "2023-10-30T14:12:11.398851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CejVEn1HLmWBve4Sn"]} -{"Format": "IDEA0", "ID": "7ab4e770-3eca-4367-bc03-f7d9bc122f4b", "DetectTime": "2023-10-30T14:12:11.420109+02:00", "EventTime": "2023-10-30T14:12:11.420123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["ChkJRi3KhWgaXUuwU8"]} -{"Format": "Json", "ID": "7ab4e770-3eca-4367-bc03-f7d9bc122f4b", "DetectTime": "2023-10-30T14:12:11.420109+02:00", "EventTime": "2023-10-30T14:12:11.420123+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:45:28.483772+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:11.481130)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "edb9d73c-c230-4729-9816-1884c87be1f2", "DetectTime": "2023-10-30T14:12:11.486692+02:00", "EventTime": "2023-10-30T14:12:11.486710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVTyNa2eug6GvYYkcb"]} -{"Format": "IDEA0", "ID": "a0fb1acd-2637-4275-9278-a55421262e28", "DetectTime": "2023-10-30T14:12:11.510813+02:00", "EventTime": "2023-10-30T14:12:11.510841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CjbESC2shFFSc2FhC9"]} -{"Format": "IDEA0", "ID": "f6314228-1d16-4cd0-884b-cc7450d09616", "DetectTime": "2023-10-30T14:12:11.532429+02:00", "EventTime": "2023-10-30T14:12:11.532440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CiUOtc4EAmvSvo5RIh"]} -{"Format": "IDEA0", "ID": "0ede091f-7a26-40ec-8c8e-c1c55f48b3ff", "DetectTime": "2023-10-30T14:12:11.551993+02:00", "EventTime": "2023-10-30T14:12:11.552003+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9qqKw2soMtA5c3Ahh"]} -{"Format": "IDEA0", "ID": "bfb03bb8-74ed-4214-bdea-1066e9124b5e", "DetectTime": "2023-10-30T14:12:11.571512+02:00", "EventTime": "2023-10-30T14:12:11.571523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CIH4uj29sjhh1BCNO6"]} -{"Format": "IDEA0", "ID": "f9f0c398-1ac1-4968-917d-4e96fdce43d9", "DetectTime": "2023-10-30T14:12:11.594192+02:00", "EventTime": "2023-10-30T14:12:11.594204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CtyFNq8AdgNl2ApI8"]} -{"Format": "IDEA0", "ID": "a881bb52-f10c-41bc-9cf5-1e749c639db2", "DetectTime": "2023-10-30T14:12:11.619680+02:00", "EventTime": "2023-10-30T14:12:11.619695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Ch8OhSYKlcDPUJJZf"]} -{"Format": "IDEA0", "ID": "94277bd4-e441-44c9-90e1-9530ed1da31a", "DetectTime": "2023-10-30T14:12:11.641066+02:00", "EventTime": "2023-10-30T14:12:11.641077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBK0Yn3FUlypDkzadh"]} -{"Format": "IDEA0", "ID": "b003df10-d8c5-4f59-8ef1-7d7f5da5fe88", "DetectTime": "2023-10-30T14:12:11.664455+02:00", "EventTime": "2023-10-30T14:12:11.664469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CU5AK31KazbgTuKfbh"]} -{"Format": "IDEA0", "ID": "42deb9a1-7d71-4a1d-abe6-0c2376d7f251", "DetectTime": "2023-10-30T14:12:11.685888+02:00", "EventTime": "2023-10-30T14:12:11.685905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CddXjH2OUiKXQbXZO5"]} -{"Format": "Json", "ID": "42deb9a1-7d71-4a1d-abe6-0c2376d7f251", "DetectTime": "2023-10-30T14:12:11.685888+02:00", "EventTime": "2023-10-30T14:12:11.685905+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:45:30.324399+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:11.750001)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d95d7eaa-1595-4514-b787-29e87e5223f2", "DetectTime": "2023-10-30T14:12:11.754167+02:00", "EventTime": "2023-10-30T14:12:11.754178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ChCr19393Ac8x3oMa"]} -{"Format": "IDEA0", "ID": "97e7f1bb-3415-45c3-9d59-4590b136461f", "DetectTime": "2023-10-30T14:12:11.776428+02:00", "EventTime": "2023-10-30T14:12:11.776445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C1vveT3Xj8VYvF9vml"]} -{"Format": "IDEA0", "ID": "65359214-b8d0-43ec-95d1-9dc5bcca20c6", "DetectTime": "2023-10-30T14:12:11.797995+02:00", "EventTime": "2023-10-30T14:12:11.798006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CcJqYH15O9nviAyOXd"]} -{"Format": "IDEA0", "ID": "d305cf1c-3cf4-4a95-909f-09c4ec1d1fa9", "DetectTime": "2023-10-30T14:12:11.817946+02:00", "EventTime": "2023-10-30T14:12:11.817964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CKIAoS3dXqSdaWfzS"]} -{"Format": "IDEA0", "ID": "b2f23764-4619-4d3d-a6d2-6d1876ec56b0", "DetectTime": "2023-10-30T14:12:11.839038+02:00", "EventTime": "2023-10-30T14:12:11.839059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CmIcRt4FWIAVtvXOqe"]} -{"Format": "IDEA0", "ID": "6a449eaf-c48c-47bd-80f7-c392afeecc34", "DetectTime": "2023-10-30T14:12:11.861499+02:00", "EventTime": "2023-10-30T14:12:11.861523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CDJzKV164Q8o0cLB33"]} -{"Format": "IDEA0", "ID": "a87dad9e-7635-4ca2-8cea-3aca15329025", "DetectTime": "2023-10-30T14:12:11.881666+02:00", "EventTime": "2023-10-30T14:12:11.881682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C1rgEt3slUtdPEqV06"]} -{"Format": "IDEA0", "ID": "eb896004-af33-4537-97da-791b6d08f421", "DetectTime": "2023-10-30T14:12:11.901771+02:00", "EventTime": "2023-10-30T14:12:11.901782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CqtEPW3RcD3aGXRhii"]} -{"Format": "IDEA0", "ID": "e84199c8-a61c-4589-9f8e-1f52b9b40648", "DetectTime": "2023-10-30T14:12:11.922947+02:00", "EventTime": "2023-10-30T14:12:11.922960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C2PZtq4FnmelBxXQn7"]} -{"Format": "Json", "ID": "e84199c8-a61c-4589-9f8e-1f52b9b40648", "DetectTime": "2023-10-30T14:12:11.922947+02:00", "EventTime": "2023-10-30T14:12:11.922960+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T10:45:33.644616+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2023/10/30 14:12:11.987716)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "22104ae6-5a65-4225-9e15-48305e4ef139", "DetectTime": "2023-10-30T14:12:11.992788+02:00", "EventTime": "2023-10-30T14:12:11.992801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CTAPyQ1O8j3l5d4ZLd"]} -{"Format": "IDEA0", "ID": "eb4d49fd-25e9-448f-aa13-0ae5ceb5018e", "DetectTime": "2023-10-30T14:12:12.012409+02:00", "EventTime": "2023-10-30T14:12:12.012426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CrY5In28jV1eP3Fbz1"]} -{"Format": "IDEA0", "ID": "667db3ec-0685-4c51-ae1e-af573c4292e1", "DetectTime": "2023-10-30T14:12:12.029521+02:00", "EventTime": "2023-10-30T14:12:12.029534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C7xvow1AkMoz7rFEU4"]} -{"Format": "IDEA0", "ID": "3b85f0b6-5bac-432c-9db1-ac42876499ad", "DetectTime": "2023-10-30T14:12:12.048820+02:00", "EventTime": "2023-10-30T14:12:12.048836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CUZLGB4IWiVE2rAHJ3"]} -{"Format": "IDEA0", "ID": "d5df70a0-1976-49ca-9a6b-28bc78b11b2a", "DetectTime": "2023-10-30T14:12:12.068571+02:00", "EventTime": "2023-10-30T14:12:12.068583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C8CvoY3NlHDRnZ48ui"]} -{"Format": "IDEA0", "ID": "a9233f65-e89c-4e82-9053-099cccaf79f7", "DetectTime": "2023-10-30T14:12:12.091233+02:00", "EventTime": "2023-10-30T14:12:12.091250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxrI6J1Y4d0Q43WUlb"]} -{"Format": "IDEA0", "ID": "dd9c065e-8202-4211-a2dc-ca5a9bc67923", "DetectTime": "2023-10-30T14:12:12.106923+02:00", "EventTime": "2023-10-30T14:12:12.106946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CIWOPD3ZPdu3xg54x6"]} -{"Format": "IDEA0", "ID": "1b4c6cbc-14c3-4b08-919e-2c2f56024fa1", "DetectTime": "2023-10-30T14:12:12.129409+02:00", "EventTime": "2023-10-30T14:12:12.129430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CGhhB84do4tRRoSsE9"]} -{"Format": "IDEA0", "ID": "6e8c7196-22c3-498e-86b3-2d87ac58f817", "DetectTime": "2023-10-30T14:12:12.163733+02:00", "EventTime": "2023-10-30T14:12:12.163745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cvob7X1eQNJFiCOCB2"]} -{"Format": "IDEA0", "ID": "aff6772c-bb3d-40e1-bbde-708f3b4560df", "DetectTime": "2023-10-30T14:12:12.197384+02:00", "EventTime": "2023-10-30T14:12:12.197395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CTYShn3OfWueWUbfac"]} -{"Format": "IDEA0", "ID": "b7615053-981d-4ad5-9134-66797c11b625", "DetectTime": "2023-10-30T14:12:12.233983+02:00", "EventTime": "2023-10-30T14:12:12.234009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CNnKAn2bEZPnQYMeQj"]} -{"Format": "IDEA0", "ID": "f05238f7-bee8-49df-966f-8916d8d96b5b", "DetectTime": "2023-10-30T14:12:12.266371+02:00", "EventTime": "2023-10-30T14:12:12.266388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXdNH81sDgmV69wc4i"]} -{"Format": "IDEA0", "ID": "39c69284-061a-4a60-87d9-a5ab9c2222da", "DetectTime": "2023-10-30T14:12:12.303009+02:00", "EventTime": "2023-10-30T14:12:12.303022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CN2dGv3MvjM57i69He"]} -{"Format": "IDEA0", "ID": "97bf8e2c-e113-41dc-ac1b-fb3c558dafbc", "DetectTime": "2023-10-30T14:12:12.330185+02:00", "EventTime": "2023-10-30T14:12:12.330196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CpYvmD4ql2k82GQ4N8"]} -{"Format": "Json", "ID": "97bf8e2c-e113-41dc-ac1b-fb3c558dafbc", "DetectTime": "2023-10-30T14:12:12.330185+02:00", "EventTime": "2023-10-30T14:12:12.330196+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:16:23.099875+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:12.427262)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e02efa74-d6f5-4416-a7b4-4f4ac62ef057", "DetectTime": "2023-10-30T14:12:12.431049+02:00", "EventTime": "2023-10-30T14:12:12.431060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C6sdtGWuZnZjHsF47"]} -{"Format": "IDEA0", "ID": "0a326a3d-7ed9-46c7-85da-c0ae015b8e27", "DetectTime": "2023-10-30T14:12:12.461275+02:00", "EventTime": "2023-10-30T14:12:12.461287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C8zszG2DpxAGQa7Lr3"]} -{"Format": "IDEA0", "ID": "56a60a75-99c7-4fbc-ab13-51d96d87c8fc", "DetectTime": "2023-10-30T14:12:12.480203+02:00", "EventTime": "2023-10-30T14:12:12.480214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CiYmfr3sVTHQdtthOk"]} -{"Format": "IDEA0", "ID": "b881ca1a-ccaf-43e7-8545-3419e9a2386c", "DetectTime": "2023-10-30T14:12:12.504697+02:00", "EventTime": "2023-10-30T14:12:12.504709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CueqnGNODCD7s6tW8"]} -{"Format": "IDEA0", "ID": "03721043-736c-43de-87d5-9bc0ad5772ad", "DetectTime": "2023-10-30T14:12:12.535163+02:00", "EventTime": "2023-10-30T14:12:12.535175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CxWOuR3S5jGndvbGFd"]} -{"Format": "IDEA0", "ID": "cfe28f20-92eb-47f1-b713-f35621b1dc13", "DetectTime": "2023-10-30T14:12:12.563632+02:00", "EventTime": "2023-10-30T14:12:12.563647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CZE5Q14ufuMBwIpGgc"]} -{"Format": "IDEA0", "ID": "97e36419-1ae0-4d1d-a169-388b3dc85043", "DetectTime": "2023-10-30T14:12:12.590773+02:00", "EventTime": "2023-10-30T14:12:12.590801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CmK9Kx4IyfPLvQyMT1"]} -{"Format": "IDEA0", "ID": "73d8ab88-de2b-44e0-bb96-3eb0cb22a9de", "DetectTime": "2023-10-30T14:12:12.621642+02:00", "EventTime": "2023-10-30T14:12:12.621653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CxR3oC3LPxYI1QttP8"]} -{"Format": "IDEA0", "ID": "0b1cc866-b817-4101-9d30-36f0b3017d45", "DetectTime": "2023-10-30T14:12:12.651337+02:00", "EventTime": "2023-10-30T14:12:12.651351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CGh5xsUhTDHltnKO4"]} -{"Format": "Json", "ID": "0b1cc866-b817-4101-9d30-36f0b3017d45", "DetectTime": "2023-10-30T14:12:12.651337+02:00", "EventTime": "2023-10-30T14:12:12.651351+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:16:25.060059+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:12.716018)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a3dd6559-0e5a-42ad-a3ab-45d5030410f8", "DetectTime": "2023-10-30T14:12:12.720562+02:00", "EventTime": "2023-10-30T14:12:12.720575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CB6x1o1z4u9KzoX1H1"]} -{"Format": "IDEA0", "ID": "62a85cd0-873c-48b8-841a-f729419e5a82", "DetectTime": "2023-10-30T14:12:12.748970+02:00", "EventTime": "2023-10-30T14:12:12.748985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CHAUNq39YGxJlOJABj"]} -{"Format": "IDEA0", "ID": "07df88c7-6b32-4d6c-8e82-39275f35a687", "DetectTime": "2023-10-30T14:12:12.775079+02:00", "EventTime": "2023-10-30T14:12:12.775097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C9q7eU3OSWhO6k6Lxb"]} -{"Format": "IDEA0", "ID": "4f0085b4-fac7-4947-b3d1-d0502cfa2a0e", "DetectTime": "2023-10-30T14:12:12.802971+02:00", "EventTime": "2023-10-30T14:12:12.802982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cjh7kSYCLOzUo9oA4"]} -{"Format": "IDEA0", "ID": "fefb27a2-452f-4901-95ce-8b6e5144c703", "DetectTime": "2023-10-30T14:12:12.827541+02:00", "EventTime": "2023-10-30T14:12:12.827552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CpWS6h3Gzp6RiYa5x6"]} -{"Format": "IDEA0", "ID": "a11a14d2-092f-450b-ad8f-2027eff79fec", "DetectTime": "2023-10-30T14:12:12.857141+02:00", "EventTime": "2023-10-30T14:12:12.857152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCs8zIXxidfAPktSd"]} -{"Format": "IDEA0", "ID": "8e105da7-842b-4790-98e0-e4ddf785a758", "DetectTime": "2023-10-30T14:12:12.888962+02:00", "EventTime": "2023-10-30T14:12:12.888978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CDDpb5JWdzoJegPCa"]} -{"Format": "IDEA0", "ID": "41210dcb-6832-44ef-9adf-42788182f9dc", "DetectTime": "2023-10-30T14:12:12.910674+02:00", "EventTime": "2023-10-30T14:12:12.910689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVYZWjqKiZnvQQXXc"]} -{"Format": "IDEA0", "ID": "e8bb30b7-bd99-40b7-83d9-fefa131bba01", "DetectTime": "2023-10-30T14:12:12.942216+02:00", "EventTime": "2023-10-30T14:12:12.942239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C71eay3w0bsPstnCF9"]} -{"Format": "Json", "ID": "e8bb30b7-bd99-40b7-83d9-fefa131bba01", "DetectTime": "2023-10-30T14:12:12.942216+02:00", "EventTime": "2023-10-30T14:12:12.942239+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:16:26.867656+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:12.996759)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b67adbdb-7750-4229-a21c-947c56ce0560", "DetectTime": "2023-10-30T14:12:13.000721+02:00", "EventTime": "2023-10-30T14:12:13.000731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CMjzL013irZnMXejy5"]} -{"Format": "IDEA0", "ID": "f858d07a-d96c-4975-9dcc-50031aafa8d1", "DetectTime": "2023-10-30T14:12:13.026992+02:00", "EventTime": "2023-10-30T14:12:13.027013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZklFT3wEp6h7TMZJ5"]} -{"Format": "IDEA0", "ID": "489a1ab1-716a-43be-ad19-0de8add51980", "DetectTime": "2023-10-30T14:12:13.049517+02:00", "EventTime": "2023-10-30T14:12:13.049533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C8th0T31TSLgCgQ9c5"]} -{"Format": "IDEA0", "ID": "156e4d00-fe28-46c4-8c0a-edfae157abf9", "DetectTime": "2023-10-30T14:12:13.077493+02:00", "EventTime": "2023-10-30T14:12:13.077510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CSvtET2DXYXHYGrpA4"]} -{"Format": "IDEA0", "ID": "a605550f-04ed-43dd-9224-47698014b971", "DetectTime": "2023-10-30T14:12:13.102230+02:00", "EventTime": "2023-10-30T14:12:13.102245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CAOQmebFXzp2cs6Ti"]} -{"Format": "IDEA0", "ID": "cd22cfad-9dfc-4d3c-969d-c3bfec017977", "DetectTime": "2023-10-30T14:12:13.126477+02:00", "EventTime": "2023-10-30T14:12:13.126494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CDBVRc2LqbaDyFa1Ql"]} -{"Format": "IDEA0", "ID": "cdce843d-fabf-4e04-bd62-132343880d40", "DetectTime": "2023-10-30T14:12:13.155758+02:00", "EventTime": "2023-10-30T14:12:13.155776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuBeXZ1p30rR0bqs8"]} -{"Format": "IDEA0", "ID": "f70f54dc-ea2c-4d7b-837e-c5a71cb9c82c", "DetectTime": "2023-10-30T14:12:13.176519+02:00", "EventTime": "2023-10-30T14:12:13.176530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CgNB5l4dhwHAdrGOS6"]} -{"Format": "IDEA0", "ID": "d4c085a8-db08-4ca7-94bf-e71b874eb77b", "DetectTime": "2023-10-30T14:12:13.195299+02:00", "EventTime": "2023-10-30T14:12:13.195310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZEb5Emjzpl803pp9"]} -{"Format": "Json", "ID": "d4c085a8-db08-4ca7-94bf-e71b874eb77b", "DetectTime": "2023-10-30T14:12:13.195299+02:00", "EventTime": "2023-10-30T14:12:13.195310+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:46:43.792167+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:13.258018)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "095a71ce-b4dd-4375-9360-045c9b7a6012", "DetectTime": "2023-10-30T14:12:13.262023+02:00", "EventTime": "2023-10-30T14:12:13.262035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CqGrNl1vto1zI2fzlb"]} -{"Format": "IDEA0", "ID": "71dde890-f793-40e0-9bbf-c90974cc6fda", "DetectTime": "2023-10-30T14:12:13.281890+02:00", "EventTime": "2023-10-30T14:12:13.281900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CYCFff374G5jLNimz7"]} -{"Format": "IDEA0", "ID": "cb5fc390-ce89-4ad6-a4e6-6e6f6dfd164e", "DetectTime": "2023-10-30T14:12:13.303367+02:00", "EventTime": "2023-10-30T14:12:13.303385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CrCGNl2jfac6lJKzp2"]} -{"Format": "IDEA0", "ID": "d9df5167-c157-40f0-9c33-aba156e015e5", "DetectTime": "2023-10-30T14:12:13.325882+02:00", "EventTime": "2023-10-30T14:12:13.325900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CoVHqy2ad8JIMQoB8b"]} -{"Format": "IDEA0", "ID": "6fa347bb-b20c-450f-a89e-97c3b909c771", "DetectTime": "2023-10-30T14:12:13.352378+02:00", "EventTime": "2023-10-30T14:12:13.352389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Co9yfE478Gg15FIdY5"]} -{"Format": "IDEA0", "ID": "874fce2b-b152-4442-b225-6fd1319a7ba9", "DetectTime": "2023-10-30T14:12:13.374357+02:00", "EventTime": "2023-10-30T14:12:13.374368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CrgY5P299woyMyt6Mj"]} -{"Format": "IDEA0", "ID": "ca07c147-9003-415a-92a4-00a099049c88", "DetectTime": "2023-10-30T14:12:13.393224+02:00", "EventTime": "2023-10-30T14:12:13.393234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CJFLul27VqM3E5Wpk2"]} -{"Format": "IDEA0", "ID": "082804da-77bc-41b8-ad67-4c34d134bab5", "DetectTime": "2023-10-30T14:12:13.416653+02:00", "EventTime": "2023-10-30T14:12:13.416663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJTEww1cZT5NHtrdQd"]} -{"Format": "IDEA0", "ID": "4834d684-120e-43ad-95e6-9b580e5279ae", "DetectTime": "2023-10-30T14:12:13.442101+02:00", "EventTime": "2023-10-30T14:12:13.442117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cq8SFtVZyPZ3ztO61"]} -{"Format": "Json", "ID": "4834d684-120e-43ad-95e6-9b580e5279ae", "DetectTime": "2023-10-30T14:12:13.442101+02:00", "EventTime": "2023-10-30T14:12:13.442117+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:47:40.251411+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:13.513875)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7994cd38-6b80-4829-8bc2-91edc8f09ae6", "DetectTime": "2023-10-30T14:12:13.519068+02:00", "EventTime": "2023-10-30T14:12:13.519083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CQKxlc3pZMbo8MiB55"]} -{"Format": "IDEA0", "ID": "02a14405-0182-4f9f-bd2a-a91ef23eaa3e", "DetectTime": "2023-10-30T14:12:13.541348+02:00", "EventTime": "2023-10-30T14:12:13.541359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cw4oS2439aKrRc4sj3"]} -{"Format": "IDEA0", "ID": "d35d7357-829e-4e8f-a122-f2ce8ff4d939", "DetectTime": "2023-10-30T14:12:13.560094+02:00", "EventTime": "2023-10-30T14:12:13.560105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CoasCZ2Wr5ouQwjF82"]} -{"Format": "IDEA0", "ID": "b63adf7e-7971-4210-9f1e-9c5ec087c7ad", "DetectTime": "2023-10-30T14:12:13.579330+02:00", "EventTime": "2023-10-30T14:12:13.579341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cu9shy2ijHllM5XFH2"]} -{"Format": "IDEA0", "ID": "714c44ac-4c2e-4e36-8376-4c4731cf9a1c", "DetectTime": "2023-10-30T14:12:13.599517+02:00", "EventTime": "2023-10-30T14:12:13.599529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CHhIa449CMSG4zYx55"]} -{"Format": "IDEA0", "ID": "2921960b-328d-44af-bc13-b307588a5865", "DetectTime": "2023-10-30T14:12:13.619532+02:00", "EventTime": "2023-10-30T14:12:13.619548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CUiBK93gTLHNWqZNm5"]} -{"Format": "IDEA0", "ID": "153771d7-3731-4401-9798-7c025b748109", "DetectTime": "2023-10-30T14:12:13.640722+02:00", "EventTime": "2023-10-30T14:12:13.640738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLIZDp1cdd87CUZsia"]} -{"Format": "IDEA0", "ID": "4dbcb70f-94ec-44d2-8eec-ecea4ce18d52", "DetectTime": "2023-10-30T14:12:13.664200+02:00", "EventTime": "2023-10-30T14:12:13.664216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CRs5ii3nAl3lBEpa98"]} -{"Format": "IDEA0", "ID": "89e3a656-8199-4ee2-802b-643d7132540b", "DetectTime": "2023-10-30T14:12:13.686408+02:00", "EventTime": "2023-10-30T14:12:13.686424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CBs0lG20MAQV131ida"]} -{"Format": "Json", "ID": "89e3a656-8199-4ee2-802b-643d7132540b", "DetectTime": "2023-10-30T14:12:13.686408+02:00", "EventTime": "2023-10-30T14:12:13.686424+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:47:42.040233+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:13.739932)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b580edc-266b-4426-8a8f-096ec8261824", "DetectTime": "2023-10-30T14:12:13.744564+02:00", "EventTime": "2023-10-30T14:12:13.744580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C3B5Qu29ptlI1C4uWd"]} -{"Format": "IDEA0", "ID": "5144c23c-525c-41d2-a1ce-faeee2627cda", "DetectTime": "2023-10-30T14:12:13.765144+02:00", "EventTime": "2023-10-30T14:12:13.765160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIapkd4bbebf9wIeVa"]} -{"Format": "IDEA0", "ID": "a12cf4aa-0093-437e-b517-87a973531e65", "DetectTime": "2023-10-30T14:12:13.785364+02:00", "EventTime": "2023-10-30T14:12:13.785380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CiADwO3us0mpnyDG8c"]} -{"Format": "IDEA0", "ID": "5a4e95c3-85ae-456f-9c67-237c8e774f45", "DetectTime": "2023-10-30T14:12:13.807592+02:00", "EventTime": "2023-10-30T14:12:13.807602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CLBAT94pDJZ9IGspue"]} -{"Format": "IDEA0", "ID": "61ce76f1-1875-42d4-9d91-28a325e54090", "DetectTime": "2023-10-30T14:12:13.828698+02:00", "EventTime": "2023-10-30T14:12:13.828708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CrLCmg346zt7PEVJ9c"]} -{"Format": "IDEA0", "ID": "4d5afc26-3328-4c7a-85a3-e009404bbc27", "DetectTime": "2023-10-30T14:12:13.846711+02:00", "EventTime": "2023-10-30T14:12:13.846735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CmqatP2Sx7TjBahcd1"]} -{"Format": "IDEA0", "ID": "bcd821e3-bcd6-4836-ba1c-1d3de0a275e7", "DetectTime": "2023-10-30T14:12:13.864182+02:00", "EventTime": "2023-10-30T14:12:13.864198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cg3tBH2FMiWfXU0YAe"]} -{"Format": "IDEA0", "ID": "b818edeb-b754-4c5d-9fbb-3fccb0fa340a", "DetectTime": "2023-10-30T14:12:13.881560+02:00", "EventTime": "2023-10-30T14:12:13.881571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CTkkgq225EQxe2E34j"]} -{"Format": "IDEA0", "ID": "6ef7a6e7-5d62-496f-9d1e-eee3561e67d2", "DetectTime": "2023-10-30T14:12:13.903203+02:00", "EventTime": "2023-10-30T14:12:13.903217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C3HIqU3U1gawAnWEW4"]} -{"Format": "Json", "ID": "6ef7a6e7-5d62-496f-9d1e-eee3561e67d2", "DetectTime": "2023-10-30T14:12:13.903203+02:00", "EventTime": "2023-10-30T14:12:13.903217+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T11:47:45.065885+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2023/10/30 14:12:13.955493)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f6d721a-40d8-4d00-b402-db0ae2d6aa6b", "DetectTime": "2023-10-30T14:12:13.959504+02:00", "EventTime": "2023-10-30T14:12:13.959514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CTPQOm2gYvHg1nXRwd"]} -{"Format": "IDEA0", "ID": "515c6f6d-98f9-4bca-a1b8-169e6bd9e85d", "DetectTime": "2023-10-30T14:12:13.978810+02:00", "EventTime": "2023-10-30T14:12:13.978827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["COu6UHlWWjLPzGV6k"]} -{"Format": "IDEA0", "ID": "9edc19ad-35a7-4b24-a090-78dd73cd93dc", "DetectTime": "2023-10-30T14:12:13.995608+02:00", "EventTime": "2023-10-30T14:12:13.995622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ch8k3NPSKQTUZ6bte"]} -{"Format": "IDEA0", "ID": "9ca16c2d-32e2-44e7-ac59-df2fe061f278", "DetectTime": "2023-10-30T14:12:14.010454+02:00", "EventTime": "2023-10-30T14:12:14.010467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYIOAx4TfuEcvddKXg"]} -{"Format": "IDEA0", "ID": "ac9e1485-77c7-434b-bff8-1ec425cb125b", "DetectTime": "2023-10-30T14:12:14.027137+02:00", "EventTime": "2023-10-30T14:12:14.027153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CJWpAd3cyMBkEEW4g4"]} -{"Format": "IDEA0", "ID": "193d5577-463e-471f-9da1-8feeeccfaf42", "DetectTime": "2023-10-30T14:12:14.058276+02:00", "EventTime": "2023-10-30T14:12:14.058293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CbvwjH3ycUfAH8v5uf"]} -{"Format": "IDEA0", "ID": "bb65cd0f-d13e-4c4e-8838-f0f5810fa93a", "DetectTime": "2023-10-30T14:12:14.088794+02:00", "EventTime": "2023-10-30T14:12:14.088806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZXRiR30LyMN2ddFX8"]} -{"Format": "IDEA0", "ID": "1c9e0f18-dfd1-40d5-9f6b-8849ba8f4288", "DetectTime": "2023-10-30T14:12:14.120880+02:00", "EventTime": "2023-10-30T14:12:14.120890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C2ZZaA7SvoyG7YiGf"]} -{"Format": "IDEA0", "ID": "5764c8f4-746f-4b28-af47-476ea8c4c655", "DetectTime": "2023-10-30T14:12:14.149348+02:00", "EventTime": "2023-10-30T14:12:14.149364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CT1DFj3jEXv2R9V9Wl"]} -{"Format": "IDEA0", "ID": "4b590373-1f09-4b9e-905b-8398796f48de", "DetectTime": "2023-10-30T14:12:14.178900+02:00", "EventTime": "2023-10-30T14:12:14.178921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ca7DrstSjeHWaVUn9"]} -{"Format": "IDEA0", "ID": "2e342fa0-3e60-4d4c-8035-50aa2f518b74", "DetectTime": "2023-10-30T14:12:14.197829+02:00", "EventTime": "2023-10-30T14:12:14.197847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CZJO3U2nkG5NaGYkUb"]} -{"Format": "IDEA0", "ID": "63c38e34-5734-424e-974a-8a0a3211f91d", "DetectTime": "2023-10-30T14:12:14.229521+02:00", "EventTime": "2023-10-30T14:12:14.229534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CJPgJD2kSoy5PvikJ6"]} -{"Format": "IDEA0", "ID": "a48e8e7c-58ce-4c11-a3a8-0308099cf643", "DetectTime": "2023-10-30T14:12:14.258267+02:00", "EventTime": "2023-10-30T14:12:14.258279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CkaGww1jXC310SrzT4"]} -{"Format": "Json", "ID": "a48e8e7c-58ce-4c11-a3a8-0308099cf643", "DetectTime": "2023-10-30T14:12:14.258267+02:00", "EventTime": "2023-10-30T14:12:14.258279+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:18:06.418629+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:14.320369)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "145f9403-4f98-44ab-a9b2-2e5e8db83a8f", "DetectTime": "2023-10-30T14:12:14.324456+02:00", "EventTime": "2023-10-30T14:12:14.324471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C98xMJ3ElEIG4kDe95"]} -{"Format": "IDEA0", "ID": "9f6d299b-0061-40f5-a6cc-a3938d8678f7", "DetectTime": "2023-10-30T14:12:14.351654+02:00", "EventTime": "2023-10-30T14:12:14.351666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C9nfUr2O0qsHjDloZ4"]} -{"Format": "IDEA0", "ID": "3109d1de-9ea3-4ac7-8ca7-14b0ce0137ee", "DetectTime": "2023-10-30T14:12:14.377982+02:00", "EventTime": "2023-10-30T14:12:14.378010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C51YzW3dB83EB3wHp"]} -{"Format": "IDEA0", "ID": "2a939491-103f-49e9-b953-ad6ab08282eb", "DetectTime": "2023-10-30T14:12:14.405752+02:00", "EventTime": "2023-10-30T14:12:14.405764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C6DeSi1jgtEhV5nsbh"]} -{"Format": "IDEA0", "ID": "659748f0-5b6f-4678-9f7c-42b6482b2b92", "DetectTime": "2023-10-30T14:12:14.432985+02:00", "EventTime": "2023-10-30T14:12:14.433005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C3PROC4OMit7wd3d51"]} -{"Format": "IDEA0", "ID": "4d76a4db-24bc-4070-98f5-d623e77f1894", "DetectTime": "2023-10-30T14:12:14.461415+02:00", "EventTime": "2023-10-30T14:12:14.461427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C4IO9Q1NeRygn0xYB4"]} -{"Format": "IDEA0", "ID": "4957961d-2c1e-4b81-beea-1bec7cf75975", "DetectTime": "2023-10-30T14:12:14.490507+02:00", "EventTime": "2023-10-30T14:12:14.490518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CQm0sO3cdOyTkUZjvd"]} -{"Format": "IDEA0", "ID": "cc5267d6-1da8-4a35-9756-b509e4ff500f", "DetectTime": "2023-10-30T14:12:14.521884+02:00", "EventTime": "2023-10-30T14:12:14.521901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CrwIwo4JmdwIF5jkpg"]} -{"Format": "Json", "ID": "cc5267d6-1da8-4a35-9756-b509e4ff500f", "DetectTime": "2023-10-30T14:12:14.521884+02:00", "EventTime": "2023-10-30T14:12:14.521901+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:18:08.333008+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:14.585745)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "edb1e068-5796-47af-9cf4-378c6eed718b", "DetectTime": "2023-10-30T14:12:14.589715+02:00", "EventTime": "2023-10-30T14:12:14.589725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CwSoD514DcFGdUdCDd"]} -{"Format": "IDEA0", "ID": "6be9853b-5096-491e-9ee0-a9264b3c5112", "DetectTime": "2023-10-30T14:12:14.616729+02:00", "EventTime": "2023-10-30T14:12:14.616745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cgzj162I0UnRp9drt9"]} -{"Format": "IDEA0", "ID": "e93cc9a2-e951-4e2a-ab16-107b5c2427b9", "DetectTime": "2023-10-30T14:12:14.643383+02:00", "EventTime": "2023-10-30T14:12:14.643406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CFiTLy2YIBt1ePLB3"]} -{"Format": "IDEA0", "ID": "29fc9e00-c598-4031-a760-7472c1bfbe85", "DetectTime": "2023-10-30T14:12:14.674529+02:00", "EventTime": "2023-10-30T14:12:14.674545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CG9wZ02uyMHyzbq6qg"]} -{"Format": "IDEA0", "ID": "0bc0e2dc-bf4a-4adf-b935-6f7655f5cde5", "DetectTime": "2023-10-30T14:12:14.704627+02:00", "EventTime": "2023-10-30T14:12:14.704638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CpeNvI1m0YLEkDB679"]} -{"Format": "IDEA0", "ID": "136ea891-24a4-471f-8530-1373ebbb4c76", "DetectTime": "2023-10-30T14:12:14.731148+02:00", "EventTime": "2023-10-30T14:12:14.731160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CWEmjK1wINF6qAHmvh"]} -{"Format": "IDEA0", "ID": "24815fc9-3539-4c25-af85-1c75498be0e0", "DetectTime": "2023-10-30T14:12:14.758967+02:00", "EventTime": "2023-10-30T14:12:14.758980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CN1YTd2Xprxya3XDg3"]} -{"Format": "IDEA0", "ID": "c15e9d26-5a3b-43ae-82f5-60e3b3253905", "DetectTime": "2023-10-30T14:12:14.781581+02:00", "EventTime": "2023-10-30T14:12:14.781597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C83IiF2virkDoydJ09"]} -{"Format": "IDEA0", "ID": "a282ca62-b559-4fb2-a61c-8e34a25cc4d2", "DetectTime": "2023-10-30T14:12:14.812597+02:00", "EventTime": "2023-10-30T14:12:14.812613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CYIFhz2RHsy9JDFvcg"]} -{"Format": "Json", "ID": "a282ca62-b559-4fb2-a61c-8e34a25cc4d2", "DetectTime": "2023-10-30T14:12:14.812597+02:00", "EventTime": "2023-10-30T14:12:14.812613+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:18:10.256998+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:14.879089)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ab0e7be7-5844-4353-b5fe-b29438362630", "DetectTime": "2023-10-30T14:12:14.883555+02:00", "EventTime": "2023-10-30T14:12:14.883571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CrJzjfHhIhkU7RTM1"]} -{"Format": "IDEA0", "ID": "be30411e-5084-418b-b829-66d825709644", "DetectTime": "2023-10-30T14:12:14.912337+02:00", "EventTime": "2023-10-30T14:12:14.912350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CVClf4yU7vIVQwg61"]} -{"Format": "IDEA0", "ID": "a6370a6e-92b1-4054-a064-b1ad5a7a1397", "DetectTime": "2023-10-30T14:12:14.933484+02:00", "EventTime": "2023-10-30T14:12:14.933504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C6Isde2TT0aWq5Mbae"]} -{"Format": "IDEA0", "ID": "216a6f6b-f0d7-4ce6-a359-b5f2bd359204", "DetectTime": "2023-10-30T14:12:14.959344+02:00", "EventTime": "2023-10-30T14:12:14.959354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CyFtn938GlH5a4dIce"]} -{"Format": "IDEA0", "ID": "07eb8048-a635-48de-820b-012c06f76eef", "DetectTime": "2023-10-30T14:12:14.987232+02:00", "EventTime": "2023-10-30T14:12:14.987248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C8Ez2n1LmqO3ftpim7"]} -{"Format": "IDEA0", "ID": "524f6f7e-22ec-4874-b388-386e498c694f", "DetectTime": "2023-10-30T14:12:15.007814+02:00", "EventTime": "2023-10-30T14:12:15.007825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CLthDu3VEsIuwN5ln5"]} -{"Format": "IDEA0", "ID": "d41b740a-94da-4ba5-a102-b6eeb22d30fd", "DetectTime": "2023-10-30T14:12:15.031612+02:00", "EventTime": "2023-10-30T14:12:15.031624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CX6cFumbgGSmtypTd"]} -{"Format": "IDEA0", "ID": "78c7e558-f61e-4f25-a441-889f6dc59ca3", "DetectTime": "2023-10-30T14:12:15.054111+02:00", "EventTime": "2023-10-30T14:12:15.054124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3zAF12fdamwrhyHMh"]} -{"Format": "IDEA0", "ID": "b41f5a42-f26c-4bd3-a6da-895cb5754681", "DetectTime": "2023-10-30T14:12:15.074673+02:00", "EventTime": "2023-10-30T14:12:15.074684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CmbdAxYjzlVmvKQg1"]} -{"Format": "Json", "ID": "b41f5a42-f26c-4bd3-a6da-895cb5754681", "DetectTime": "2023-10-30T14:12:15.074673+02:00", "EventTime": "2023-10-30T14:12:15.074684+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:48:16.644836+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:15.135804)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "838ec3da-9f7d-43d5-9897-4edd640a55c1", "DetectTime": "2023-10-30T14:12:15.140218+02:00", "EventTime": "2023-10-30T14:12:15.140235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CJbGFC6b7aUV70pC3"]} -{"Format": "IDEA0", "ID": "357da55a-138b-4c9c-8f99-f568ca43a7d0", "DetectTime": "2023-10-30T14:12:15.163576+02:00", "EventTime": "2023-10-30T14:12:15.163589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CCtV3j2FmymD7EWrNc"]} -{"Format": "IDEA0", "ID": "7d2d45bd-a447-4fb6-9482-32bd7f42b66d", "DetectTime": "2023-10-30T14:12:15.187085+02:00", "EventTime": "2023-10-30T14:12:15.187101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CXq7qt3BBs62NdjIFd"]} -{"Format": "IDEA0", "ID": "2eb7cb83-aebd-4923-81fa-9ddbd11b8f9e", "DetectTime": "2023-10-30T14:12:15.214514+02:00", "EventTime": "2023-10-30T14:12:15.214530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CJBEWA24fJznhcY2J5"]} -{"Format": "IDEA0", "ID": "5138bcad-3e7a-42c9-88b5-aea6de1ca00f", "DetectTime": "2023-10-30T14:12:15.238312+02:00", "EventTime": "2023-10-30T14:12:15.238324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["COYAmngw58Ns55Yig"]} -{"Format": "IDEA0", "ID": "4cba2a23-5dbd-498f-8f71-25a99886a3f4", "DetectTime": "2023-10-30T14:12:15.265290+02:00", "EventTime": "2023-10-30T14:12:15.265306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cyrxrj3WurCTURzg6g"]} -{"Format": "IDEA0", "ID": "9d99eecd-0fe5-40f1-8f6a-13d3e354fa37", "DetectTime": "2023-10-30T14:12:15.291889+02:00", "EventTime": "2023-10-30T14:12:15.291904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CnC6PT2WsbkLiMY935"]} -{"Format": "IDEA0", "ID": "37d5d384-fe05-4e7a-9ec9-bef9299c1d41", "DetectTime": "2023-10-30T14:12:15.318746+02:00", "EventTime": "2023-10-30T14:12:15.318764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CR4MAC3oFlwLNiko7i"]} -{"Format": "IDEA0", "ID": "3572c66a-dbef-47d4-a0bc-9b3532c70d4c", "DetectTime": "2023-10-30T14:12:15.344065+02:00", "EventTime": "2023-10-30T14:12:15.344075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CO2MmD48Y070z00aIc"]} -{"Format": "Json", "ID": "3572c66a-dbef-47d4-a0bc-9b3532c70d4c", "DetectTime": "2023-10-30T14:12:15.344065+02:00", "EventTime": "2023-10-30T14:12:15.344075+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:48:18.642346+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:15.402062)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6932e8fb-bfef-483b-a1a3-5c5d7900c444", "DetectTime": "2023-10-30T14:12:15.406340+02:00", "EventTime": "2023-10-30T14:12:15.406355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CpGlch3fw03PLOh0ll"]} -{"Format": "IDEA0", "ID": "18da17c0-6f85-4a0f-920f-f3a6a6c57947", "DetectTime": "2023-10-30T14:12:15.426424+02:00", "EventTime": "2023-10-30T14:12:15.426437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CbuzB038AIXZcNqQs1"]} -{"Format": "IDEA0", "ID": "ffbe36e3-5941-494e-a788-f1cc3f8654c2", "DetectTime": "2023-10-30T14:12:15.448880+02:00", "EventTime": "2023-10-30T14:12:15.448895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CDAQt43Ta4KOnXWh2a"]} -{"Format": "IDEA0", "ID": "1e42ce9b-8884-4d5e-8359-771cd6297d58", "DetectTime": "2023-10-30T14:12:15.471719+02:00", "EventTime": "2023-10-30T14:12:15.471735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C1MOd41WPtlmOHYqad"]} -{"Format": "IDEA0", "ID": "9c55d218-594a-47c5-928e-fd876543ffa3", "DetectTime": "2023-10-30T14:12:15.497147+02:00", "EventTime": "2023-10-30T14:12:15.497165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbWyNi1eNWvDIH0qy1"]} -{"Format": "IDEA0", "ID": "aa30ddd0-be37-480a-b4a5-bc320f183847", "DetectTime": "2023-10-30T14:12:15.521995+02:00", "EventTime": "2023-10-30T14:12:15.522010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CHt9nx13dPpK6qI6al"]} -{"Format": "IDEA0", "ID": "9b547c8b-c2d9-4dcf-8abc-3bef9fbdedd9", "DetectTime": "2023-10-30T14:12:15.542660+02:00", "EventTime": "2023-10-30T14:12:15.542672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CGJih12GkvaieQiEZh"]} -{"Format": "IDEA0", "ID": "6590ecef-8bb1-4655-970a-9b4dbe5d69f5", "DetectTime": "2023-10-30T14:12:15.562455+02:00", "EventTime": "2023-10-30T14:12:15.562472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CEpWxBMd9idWdDn09"]} -{"Format": "Json", "ID": "6590ecef-8bb1-4655-970a-9b4dbe5d69f5", "DetectTime": "2023-10-30T14:12:15.562455+02:00", "EventTime": "2023-10-30T14:12:15.562472+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:48:20.339212+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:15.620442)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "73fbb2af-c803-4da9-83bf-ce4907af2755", "DetectTime": "2023-10-30T14:12:15.625691+02:00", "EventTime": "2023-10-30T14:12:15.625706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CSBlA917jlqgiauhs3"]} -{"Format": "IDEA0", "ID": "f24558ed-972e-4210-bf77-c0fd896749b2", "DetectTime": "2023-10-30T14:12:15.650704+02:00", "EventTime": "2023-10-30T14:12:15.650716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CvzMiTVDGThKTSX3i"]} -{"Format": "IDEA0", "ID": "8d3da9af-79dc-44de-bc95-039d200699de", "DetectTime": "2023-10-30T14:12:15.668000+02:00", "EventTime": "2023-10-30T14:12:15.668016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CHvmbz3k7hGAkiBYY2"]} -{"Format": "IDEA0", "ID": "06285d89-02cc-46ba-bd20-0fb0bd6bbc0a", "DetectTime": "2023-10-30T14:12:15.687492+02:00", "EventTime": "2023-10-30T14:12:15.687509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGdmyK2QNPopxBffSe"]} -{"Format": "IDEA0", "ID": "5fcf1d05-d164-4b20-85db-b4d57f3a4e88", "DetectTime": "2023-10-30T14:12:15.706415+02:00", "EventTime": "2023-10-30T14:12:15.706427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CYBmV810D2mJQuL5md"]} -{"Format": "IDEA0", "ID": "dfe60cf3-c89d-4289-9c41-6dcd8e5852ac", "DetectTime": "2023-10-30T14:12:15.724757+02:00", "EventTime": "2023-10-30T14:12:15.724769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CQobjzHc39jkcl1Kc"]} -{"Format": "IDEA0", "ID": "ca70e04d-dded-4bc4-9e68-84ea97a29055", "DetectTime": "2023-10-30T14:12:15.740451+02:00", "EventTime": "2023-10-30T14:12:15.740462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C1BXCO3B9Y7VLKZVFd"]} -{"Format": "IDEA0", "ID": "6145e04e-2dec-43ba-9a1f-28f009edc673", "DetectTime": "2023-10-30T14:12:15.758369+02:00", "EventTime": "2023-10-30T14:12:15.758379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["ChSqUa1fWCRhuh3m2c"]} -{"Format": "IDEA0", "ID": "816e3f13-eff3-4bf9-9235-70bca8f5e6d6", "DetectTime": "2023-10-30T14:12:15.780907+02:00", "EventTime": "2023-10-30T14:12:15.780922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CeOb7889dZQxNwWc7"]} -{"Format": "IDEA0", "ID": "a3db2a13-5e59-4b21-afbe-d38218f6267f", "DetectTime": "2023-10-30T14:12:15.801546+02:00", "EventTime": "2023-10-30T14:12:15.801557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CgkHjn3vADHzJEZPE5"]} -{"Format": "Json", "ID": "a3db2a13-5e59-4b21-afbe-d38218f6267f", "DetectTime": "2023-10-30T14:12:15.801546+02:00", "EventTime": "2023-10-30T14:12:15.801557+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T12:48:24.037157+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2023/10/30 14:12:15.854609)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e2960c32-bc84-4298-8078-68b0a79c042b", "DetectTime": "2023-10-30T14:12:15.858649+02:00", "EventTime": "2023-10-30T14:12:15.858661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C1dviH3YogMYMjyOhf"]} -{"Format": "IDEA0", "ID": "f5490124-36b3-46fb-99c8-04380eb8bd98", "DetectTime": "2023-10-30T14:12:15.873373+02:00", "EventTime": "2023-10-30T14:12:15.873386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CawyuYrhIpj7tscdg"]} -{"Format": "IDEA0", "ID": "e34c9ad7-6d21-4bf5-ad81-c30cce334ab4", "DetectTime": "2023-10-30T14:12:15.893127+02:00", "EventTime": "2023-10-30T14:12:15.893139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CWbNKz2gNtTCdZX2pj"]} -{"Format": "IDEA0", "ID": "543580b1-862e-4923-aacd-87d5023c6d6e", "DetectTime": "2023-10-30T14:12:15.913173+02:00", "EventTime": "2023-10-30T14:12:15.913186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cn7Pp61NhDqF24btH4"]} -{"Format": "IDEA0", "ID": "1ee852b9-8500-40da-88ad-3d8a885882c5", "DetectTime": "2023-10-30T14:12:15.932482+02:00", "EventTime": "2023-10-30T14:12:15.932493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CGT3wn2uX8LEN6VHX"]} -{"Format": "IDEA0", "ID": "3c167148-7344-4a39-819a-b12cc0639b87", "DetectTime": "2023-10-30T14:12:15.951174+02:00", "EventTime": "2023-10-30T14:12:15.951185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CoraK34JAdvh35wA97"]} -{"Format": "IDEA0", "ID": "fff489e3-74af-46f6-b283-ee7a2d9b3533", "DetectTime": "2023-10-30T14:12:15.967393+02:00", "EventTime": "2023-10-30T14:12:15.967406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0y0kU30bpWnpN26Q1"]} -{"Format": "IDEA0", "ID": "130f3aad-d52a-4051-8b31-c90b5144b196", "DetectTime": "2023-10-30T14:12:15.986122+02:00", "EventTime": "2023-10-30T14:12:15.986133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CzltOP2qvNsGdiq7nf"]} -{"Format": "IDEA0", "ID": "5b7c934b-b03d-4600-8440-6cb4f3a59ffc", "DetectTime": "2023-10-30T14:12:16.004123+02:00", "EventTime": "2023-10-30T14:12:16.004135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CfzX3Hbo0ibnVATI1"]} -{"Format": "IDEA0", "ID": "a9305813-cbba-4b31-b178-74f530dc26d9", "DetectTime": "2023-10-30T14:12:16.027453+02:00", "EventTime": "2023-10-30T14:12:16.027469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CPX6694DLYfcoWY1U8"]} -{"Format": "IDEA0", "ID": "d7fc0fc5-f4ac-4415-a585-7ac5da6a2b46", "DetectTime": "2023-10-30T14:12:16.051757+02:00", "EventTime": "2023-10-30T14:12:16.051773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CxmOQu2WDJjSS7KO93"]} -{"Format": "IDEA0", "ID": "fef72864-289d-4c80-9c45-525df78bb19b", "DetectTime": "2023-10-30T14:12:16.076088+02:00", "EventTime": "2023-10-30T14:12:16.076104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLQqBD1hOTbsiiYkP7"]} -{"Format": "IDEA0", "ID": "e9e71595-f2fc-4d97-b50d-680f86c82e0f", "DetectTime": "2023-10-30T14:12:16.096038+02:00", "EventTime": "2023-10-30T14:12:16.096058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C9qleh3R0kDygjNA0i"]} -{"Format": "IDEA0", "ID": "50f46651-a33a-473c-ab20-67b247c9c130", "DetectTime": "2023-10-30T14:12:16.116091+02:00", "EventTime": "2023-10-30T14:12:16.116107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CvhTF32cQ1j7K6bZ2h"]} -{"Format": "IDEA0", "ID": "fd53f810-70fc-4a34-b004-fd83700a98cd", "DetectTime": "2023-10-30T14:12:16.136263+02:00", "EventTime": "2023-10-30T14:12:16.136275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["ChehQTGmRPC7Lbok4"]} -{"Format": "IDEA0", "ID": "f5db0523-5ee4-463b-8c18-6c1897bf347a", "DetectTime": "2023-10-30T14:12:16.156034+02:00", "EventTime": "2023-10-30T14:12:16.156044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["COOfmC0CKl3nrpCFf"]} -{"Format": "IDEA0", "ID": "0a12090c-9ce6-429c-b4b1-f345872b76d3", "DetectTime": "2023-10-30T14:12:16.178018+02:00", "EventTime": "2023-10-30T14:12:16.178032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CIaieR2unQftIjhGQf"]} -{"Format": "IDEA0", "ID": "89cffd6d-5516-4300-b9ba-9d8f331d8101", "DetectTime": "2023-10-30T14:12:16.197565+02:00", "EventTime": "2023-10-30T14:12:16.197578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CEPzu34yV6LASwLEqd"]} -{"Format": "IDEA0", "ID": "99cbe087-262e-4ac0-9e33-9e6077e36cbf", "DetectTime": "2023-10-30T14:12:16.215907+02:00", "EventTime": "2023-10-30T14:12:16.215924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CNERzv45XbjLK7LOh8"]} -{"Format": "IDEA0", "ID": "1d5fa5d1-8ecf-41ac-b7d4-97ecd6b64f92", "DetectTime": "2023-10-30T14:12:16.237876+02:00", "EventTime": "2023-10-30T14:12:16.237886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CUUupv3oPqRr3sqY7"]} -{"Format": "IDEA0", "ID": "d60ef4de-3317-476a-b151-65235b3e1bc2", "DetectTime": "2023-10-30T14:12:16.257028+02:00", "EventTime": "2023-10-30T14:12:16.257039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CQlJBd2hvT0SOcnd5k"]} -{"Format": "IDEA0", "ID": "0b4944e4-b69f-42dd-9d4a-15a1c1820fb5", "DetectTime": "2023-10-30T14:12:16.279117+02:00", "EventTime": "2023-10-30T14:12:16.279128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQyPZI3tiU5ynIHVii"]} -{"Format": "IDEA0", "ID": "9b8e15aa-f437-42f6-8e70-138de3deab38", "DetectTime": "2023-10-30T14:12:16.298364+02:00", "EventTime": "2023-10-30T14:12:16.298375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["COj2MJ3leQluQSCQRg"]} -{"Format": "IDEA0", "ID": "df3b966b-cc17-4a77-b223-8b7636e9bf63", "DetectTime": "2023-10-30T14:12:16.318067+02:00", "EventTime": "2023-10-30T14:12:16.318084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CO2yUt29PGsni8tvuc"]} -{"Format": "IDEA0", "ID": "bd6e3bae-abc2-4a9c-9404-8d28fe254a62", "DetectTime": "2023-10-30T14:12:16.338137+02:00", "EventTime": "2023-10-30T14:12:16.338153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CvQE0k2DnTukyO0PIe"]} -{"Format": "IDEA0", "ID": "83ae4b05-774f-464e-ae55-c086b7ba699a", "DetectTime": "2023-10-30T14:12:16.359001+02:00", "EventTime": "2023-10-30T14:12:16.359017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLCzzy12DWgLPiCAQb"]} -{"Format": "IDEA0", "ID": "aba29f05-24a1-4e20-a5a8-6795c8f4171f", "DetectTime": "2023-10-30T14:12:16.377093+02:00", "EventTime": "2023-10-30T14:12:16.377105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C0AzyP8xcD0yOyRp9"]} -{"Format": "IDEA0", "ID": "d47e7aa5-4ff3-44ec-8388-f7f222c9b561", "DetectTime": "2023-10-30T14:12:16.402939+02:00", "EventTime": "2023-10-30T14:12:16.402955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CZshdK2AAGl6vbLxL7"]} -{"Format": "IDEA0", "ID": "f131d4a1-b0a8-45d8-8a91-6b25fdeeea80", "DetectTime": "2023-10-30T14:12:16.423624+02:00", "EventTime": "2023-10-30T14:12:16.423638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C5i4gY1GRHPu2N4fEb"]} -{"Format": "IDEA0", "ID": "8f40e490-25e1-4d61-a600-22675ea7cad3", "DetectTime": "2023-10-30T14:12:16.443776+02:00", "EventTime": "2023-10-30T14:12:16.443786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cw4OHc3EScxo9YL2hf"]} -{"Format": "IDEA0", "ID": "775aec72-cb9f-469a-b165-78bf44055408", "DetectTime": "2023-10-30T14:12:16.465358+02:00", "EventTime": "2023-10-30T14:12:16.465369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Ce1vZSjhkQLNwWYa8"]} -{"Format": "IDEA0", "ID": "0c932b9b-87a3-44ce-8e27-8cefcbf5a864", "DetectTime": "2023-10-30T14:12:16.483030+02:00", "EventTime": "2023-10-30T14:12:16.483042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C6bB0N1eXAkjzLdDf8"]} -{"Format": "IDEA0", "ID": "a97783d9-edc9-4f60-8019-6df7130e6f01", "DetectTime": "2023-10-30T14:12:16.506424+02:00", "EventTime": "2023-10-30T14:12:16.506436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPH4DT38g0dEBLq0A1"]} -{"Format": "IDEA0", "ID": "6cf7dc58-74b4-4ae7-94fb-f4930118e8a8", "DetectTime": "2023-10-30T14:12:16.524112+02:00", "EventTime": "2023-10-30T14:12:16.524123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CqwAAc3ssLQ9jMVgxb"]} -{"Format": "IDEA0", "ID": "556eb248-57c1-4a63-8b62-922e436c5633", "DetectTime": "2023-10-30T14:12:16.548828+02:00", "EventTime": "2023-10-30T14:12:16.548839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CCQ0hV1zOS8nk7Leh1"]} -{"Format": "IDEA0", "ID": "3d588173-0bae-4993-9d50-33dc1a972a5d", "DetectTime": "2023-10-30T14:12:16.572514+02:00", "EventTime": "2023-10-30T14:12:16.572525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C1er2Q1tj1YPEdUQm8"]} -{"Format": "IDEA0", "ID": "69d74c86-5933-4d81-b927-c202a4e1c97c", "DetectTime": "2023-10-30T14:12:16.592871+02:00", "EventTime": "2023-10-30T14:12:16.592885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CbXKcj4gMTy3GRsCv3"]} -{"Format": "IDEA0", "ID": "140037a9-5baf-4c3b-8ba8-467eb3539569", "DetectTime": "2023-10-30T14:12:16.629737+02:00", "EventTime": "2023-10-30T14:12:16.629750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C4NH072AvEBkS1Fzzl"]} -{"Format": "IDEA0", "ID": "1c423d5f-25f1-4955-bf67-c65f206b1a8a", "DetectTime": "2023-10-30T14:12:16.650331+02:00", "EventTime": "2023-10-30T14:12:16.650347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CiIg7C1jA2sviOzCa9"]} -{"Format": "IDEA0", "ID": "2fc08816-e45b-4a76-aaa3-151f69ee027e", "DetectTime": "2023-10-30T14:12:16.670321+02:00", "EventTime": "2023-10-30T14:12:16.670337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CI36lY27zkd6L6mz58"]} -{"Format": "IDEA0", "ID": "bd1bb13b-197b-4236-b3ba-e7a83592f565", "DetectTime": "2023-10-30T14:12:16.695646+02:00", "EventTime": "2023-10-30T14:12:16.695662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ck6SJ92BQ8cPavt4H4"]} -{"Format": "IDEA0", "ID": "65ef4609-cfb2-4b3c-a20d-88f458ab7e6a", "DetectTime": "2023-10-30T14:12:16.721266+02:00", "EventTime": "2023-10-30T14:12:16.721281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C9kECA3Bjrg1xuFydj"]} -{"Format": "IDEA0", "ID": "c4c61a2d-00e3-4b75-a259-64a280879747", "DetectTime": "2023-10-30T14:12:16.763225+02:00", "EventTime": "2023-10-30T14:12:16.763241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["Cmzt4w45aHuvL1JGjc"]} -{"Format": "IDEA0", "ID": "32858869-7926-49b8-b752-9aff75b9eefe", "DetectTime": "2023-10-30T14:12:16.782811+02:00", "EventTime": "2023-10-30T14:12:16.782837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CMVhn62lbUymYi40Ge"]} -{"Format": "IDEA0", "ID": "172711cb-a568-4eff-a937-d8438c5de4f4", "DetectTime": "2023-10-30T14:12:16.800637+02:00", "EventTime": "2023-10-30T14:12:16.800653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C6dcuWylES8yu4vo1"]} -{"Format": "IDEA0", "ID": "82c4b11d-cbc5-4604-8a2f-872efab75851", "DetectTime": "2023-10-30T14:12:16.815205+02:00", "EventTime": "2023-10-30T14:12:16.815218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C7uFog2bFGkiotlzIb"]} -{"Format": "IDEA0", "ID": "e3c28f93-014d-48dd-90fe-6db1c093cb55", "DetectTime": "2023-10-30T14:12:16.830398+02:00", "EventTime": "2023-10-30T14:12:16.830415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CTXP6j3c2lhzrR3Zb"]} -{"Format": "IDEA0", "ID": "f9980b05-0996-4105-8bcc-8f075d2435be", "DetectTime": "2023-10-30T14:12:16.844672+02:00", "EventTime": "2023-10-30T14:12:16.844683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C2bhhTOFY6bEdj4N2"]} -{"Format": "IDEA0", "ID": "bd63d3d0-b1e3-43e1-9080-756a0fd093bd", "DetectTime": "2023-10-30T14:12:16.860960+02:00", "EventTime": "2023-10-30T14:12:16.860975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CiefdX3ouMCXFRJaKf"]} -{"Format": "IDEA0", "ID": "c89c0922-94da-4eb2-b183-844e7d5dc557", "DetectTime": "2023-10-30T14:12:16.879124+02:00", "EventTime": "2023-10-30T14:12:16.879141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CeURSH2hMVrUdKHV34"]} -{"Format": "IDEA0", "ID": "6158804f-94c3-4283-8137-972c89d9183a", "DetectTime": "2023-10-30T14:12:16.897718+02:00", "EventTime": "2023-10-30T14:12:16.897733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CCxuJj1dFpfYwU1yNk"]} -{"Format": "IDEA0", "ID": "75c1c6cd-8814-4927-80aa-01c5fe1d6c4c", "DetectTime": "2023-10-30T14:12:16.912538+02:00", "EventTime": "2023-10-30T14:12:16.912548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CfGhJy2M4sccyzuIml"]} -{"Format": "IDEA0", "ID": "becd4893-42bd-4728-91e7-179703e76415", "DetectTime": "2023-10-30T14:12:16.927154+02:00", "EventTime": "2023-10-30T14:12:16.927170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CzCNI0167Y99lqMrel"]} -{"Format": "IDEA0", "ID": "af3485d7-daec-40a5-8cf6-7a780fd3a70f", "DetectTime": "2023-10-30T14:12:16.942359+02:00", "EventTime": "2023-10-30T14:12:16.942374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNz0z92tJUq59ZPq44"]} -{"Format": "IDEA0", "ID": "281710cc-8182-41d9-b016-582ee5bca830", "DetectTime": "2023-10-30T14:12:16.956809+02:00", "EventTime": "2023-10-30T14:12:16.956821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CowZue3QjOcmk8MEok"]} -{"Format": "IDEA0", "ID": "2f06355f-6613-45ee-9d98-138f39f998dc", "DetectTime": "2023-10-30T14:12:16.970364+02:00", "EventTime": "2023-10-30T14:12:16.970376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CbqhKf1bqcFc4dWlO7"]} -{"Format": "IDEA0", "ID": "13c4c498-3322-4016-b352-4ea4ac2ad359", "DetectTime": "2023-10-30T14:12:17.003020+02:00", "EventTime": "2023-10-30T14:12:17.003031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C1qYo24LOHG5agZVJ3"]} -{"Format": "IDEA0", "ID": "274a1ae6-bd94-476a-ba9e-8b7677f84264", "DetectTime": "2023-10-30T14:12:17.017647+02:00", "EventTime": "2023-10-30T14:12:17.017664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cv4dhG1vRSzCQHG2v"]} -{"Format": "IDEA0", "ID": "4ab6a458-f04d-4908-8bf3-6a9c8b14985a", "DetectTime": "2023-10-30T14:12:17.032396+02:00", "EventTime": "2023-10-30T14:12:17.032408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cs6vJ14EeXOpncdtc6"]} -{"Format": "IDEA0", "ID": "3ba7fc73-4937-4cff-9218-13257235a47a", "DetectTime": "2023-10-30T14:12:17.048010+02:00", "EventTime": "2023-10-30T14:12:17.048021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cw8ICp1YLuKL1P7X16"]} -{"Format": "IDEA0", "ID": "1911dcb8-d08a-45b2-bc29-fe0c9f1fca85", "DetectTime": "2023-10-30T14:12:17.061626+02:00", "EventTime": "2023-10-30T14:12:17.061639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cf2abA2qJ4GFj2BxXc"]} -{"Format": "IDEA0", "ID": "c1da8ccb-be8b-4bcc-a0b2-1c9e1507a016", "DetectTime": "2023-10-30T14:12:17.078544+02:00", "EventTime": "2023-10-30T14:12:17.078557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C7C4nr1MWhmYvGo0kf"]} -{"Format": "IDEA0", "ID": "7cf593c7-485e-4f07-a831-e23ec4612aaa", "DetectTime": "2023-10-30T14:12:17.092479+02:00", "EventTime": "2023-10-30T14:12:17.092498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cn92mu3gvkM7xfTug8"]} -{"Format": "IDEA0", "ID": "63690e73-eba8-487c-8628-64a08dc82505", "DetectTime": "2023-10-30T14:12:17.111987+02:00", "EventTime": "2023-10-30T14:12:17.112003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0xj6p2VPu7fNBzWC1"]} -{"Format": "IDEA0", "ID": "a539a577-3dd0-4108-8d9f-173c03f53ef8", "DetectTime": "2023-10-30T14:12:17.130719+02:00", "EventTime": "2023-10-30T14:12:17.130745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CThvy61SMmKLLUnFF2"]} -{"Format": "IDEA0", "ID": "b30e949d-c4b3-43d8-9a85-f769bb2511c3", "DetectTime": "2023-10-30T14:12:17.145909+02:00", "EventTime": "2023-10-30T14:12:17.145927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CUwQ5d373hEmsLumAc"]} -{"Format": "IDEA0", "ID": "694c52db-bcfc-4ad4-81fb-f87e70043379", "DetectTime": "2023-10-30T14:12:17.181812+02:00", "EventTime": "2023-10-30T14:12:17.181823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYvGpz1qaSblFp4775"]} -{"Format": "IDEA0", "ID": "edd1969e-4101-4be4-90cc-bffbca6e623a", "DetectTime": "2023-10-30T14:12:17.199658+02:00", "EventTime": "2023-10-30T14:12:17.199674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C5HzDO1BnpFryrunh"]} -{"Format": "IDEA0", "ID": "5143e5cc-4495-4aa4-bbed-bf09d65dce7a", "DetectTime": "2023-10-30T14:12:17.216213+02:00", "EventTime": "2023-10-30T14:12:17.216224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CxpeRK2zgCNyohKk2f"]} -{"Format": "IDEA0", "ID": "ba0dc7be-dc4d-4f15-8b0b-123c000af166", "DetectTime": "2023-10-30T14:12:17.230394+02:00", "EventTime": "2023-10-30T14:12:17.230410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CBvsgM2JWNAvVCttwl"]} -{"Format": "IDEA0", "ID": "f30c43e3-420c-4825-a569-9fac5f07d9f4", "DetectTime": "2023-10-30T14:12:17.245144+02:00", "EventTime": "2023-10-30T14:12:17.245157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CKSmfb2pFreEU6bk26"]} -{"Format": "IDEA0", "ID": "1921af6b-9d11-4d90-9f58-7dc744165246", "DetectTime": "2023-10-30T14:12:17.259102+02:00", "EventTime": "2023-10-30T14:12:17.259117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ctmjjm33aXaNEEx1da"]} -{"Format": "IDEA0", "ID": "95fc3354-2fec-4c50-b87e-8f345ade4a98", "DetectTime": "2023-10-30T14:12:17.274126+02:00", "EventTime": "2023-10-30T14:12:17.274137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CsePy44OOtWALV2Wdf"]} -{"Format": "IDEA0", "ID": "3001557f-32a8-4a57-8fda-8b3e00851aee", "DetectTime": "2023-10-30T14:12:17.288690+02:00", "EventTime": "2023-10-30T14:12:17.288701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C68FHz2bDEgphH2Ad6"]} -{"Format": "IDEA0", "ID": "06fc316d-ffa7-4793-9766-cc1e7a4d8aa8", "DetectTime": "2023-10-30T14:12:17.305729+02:00", "EventTime": "2023-10-30T14:12:17.305745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Cezgigb8yUnW3lZjf"]} -{"Format": "IDEA0", "ID": "071d9c31-f2ad-4dfb-a0c2-6e47940907cf", "DetectTime": "2023-10-30T14:12:17.319991+02:00", "EventTime": "2023-10-30T14:12:17.320004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CFmvLb1i1THIjtxJKg"]} -{"Format": "IDEA0", "ID": "3344179e-3cfb-4de9-98c3-b1cb735e340f", "DetectTime": "2023-10-30T14:12:17.336896+02:00", "EventTime": "2023-10-30T14:12:17.336907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CW9tDo2EuSgYgCsXU5"]} -{"Format": "IDEA0", "ID": "67a51d90-18a1-4c7c-9fa9-8d06e653ec3f", "DetectTime": "2023-10-30T14:12:17.351581+02:00", "EventTime": "2023-10-30T14:12:17.351597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CtR42z1zv5JhCTqF3k"]} -{"Format": "IDEA0", "ID": "6e31f0fb-af29-4d13-a407-7cbaab3c4de8", "DetectTime": "2023-10-30T14:12:17.364882+02:00", "EventTime": "2023-10-30T14:12:17.364893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C31hqf2Xzqi87DsNwc"]} -{"Format": "IDEA0", "ID": "4eb884ae-e4b2-4b50-a47b-1106e02a22b3", "DetectTime": "2023-10-30T14:12:17.380011+02:00", "EventTime": "2023-10-30T14:12:17.380023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CYO2xL3G9dRzcoi5Q8"]} -{"Format": "IDEA0", "ID": "5d0245ad-5ba3-4c57-bba4-fdb68bd2c22b", "DetectTime": "2023-10-30T14:12:17.394523+02:00", "EventTime": "2023-10-30T14:12:17.394549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CkwT1Hj4NKrfKjQpk"]} -{"Format": "IDEA0", "ID": "3e0a3924-0bbb-4921-88ec-390af8511e86", "DetectTime": "2023-10-30T14:12:17.435805+02:00", "EventTime": "2023-10-30T14:12:17.435823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CapHiCAAfyh032Nh3"]} -{"Format": "IDEA0", "ID": "2b6d995d-4894-4a91-9d35-793d797ab9ba", "DetectTime": "2023-10-30T14:12:17.451376+02:00", "EventTime": "2023-10-30T14:12:17.451387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C6jjp82FGVztLAxozb"]} -{"Format": "IDEA0", "ID": "52674668-bfef-4f81-b277-b9ab5d88be43", "DetectTime": "2023-10-30T14:12:17.466402+02:00", "EventTime": "2023-10-30T14:12:17.466416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CqXLryt3VUCJTbpVi"]} -{"Format": "IDEA0", "ID": "88902bc7-fb28-424a-bca3-eff7d62c0b05", "DetectTime": "2023-10-30T14:12:17.482827+02:00", "EventTime": "2023-10-30T14:12:17.482838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CbH8kD18Z0794wYAcg"]} -{"Format": "IDEA0", "ID": "5805da6d-6de4-4215-ba2c-8887a42dd1fa", "DetectTime": "2023-10-30T14:12:17.498206+02:00", "EventTime": "2023-10-30T14:12:17.498224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CN6Lx5IGmXe5espY2"]} -{"Format": "IDEA0", "ID": "32980c12-24db-4bc3-856f-3bf366972a94", "DetectTime": "2023-10-30T14:12:17.512680+02:00", "EventTime": "2023-10-30T14:12:17.512695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwFQF3410jD3n2UZU4"]} -{"Format": "IDEA0", "ID": "3db6039e-c54f-46af-999f-1c4c3664b022", "DetectTime": "2023-10-30T14:12:17.528080+02:00", "EventTime": "2023-10-30T14:12:17.528091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CvQiuo3QBpryvlrj6b"]} -{"Format": "IDEA0", "ID": "6ec81c92-5f69-45bb-805b-b7f8b0b52811", "DetectTime": "2023-10-30T14:12:17.543013+02:00", "EventTime": "2023-10-30T14:12:17.543029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C00n414zVpvpqKHU5"]} -{"Format": "IDEA0", "ID": "c921bf35-12a6-40a0-bb52-6d605174a980", "DetectTime": "2023-10-30T14:12:17.557472+02:00", "EventTime": "2023-10-30T14:12:17.557487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CXQrlg31MXGObEfH5"]} -{"Format": "IDEA0", "ID": "fcb193cf-03c8-4795-b144-8e405d9c0318", "DetectTime": "2023-10-30T14:12:17.576541+02:00", "EventTime": "2023-10-30T14:12:17.576557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CWoqDz19ILOsmJUdab"]} -{"Format": "IDEA0", "ID": "b88027a4-c6fb-4748-95ff-1aab4c327afb", "DetectTime": "2023-10-30T14:12:17.592703+02:00", "EventTime": "2023-10-30T14:12:17.592720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CuFjWm1aY4DFNpLcDj"]} -{"Format": "IDEA0", "ID": "067c9367-c002-4833-bdee-78be7c6a846f", "DetectTime": "2023-10-30T14:12:17.630012+02:00", "EventTime": "2023-10-30T14:12:17.630029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CBFSjY3M5Wkf0XfTaf"]} -{"Format": "IDEA0", "ID": "0ed3cc5d-599d-4ae3-a0ee-97c0bbb795dc", "DetectTime": "2023-10-30T14:12:17.644428+02:00", "EventTime": "2023-10-30T14:12:17.644447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CVcnx8wO1UqHKUCw2"]} -{"Format": "IDEA0", "ID": "172518f3-5167-4334-b856-2da491fe5fce", "DetectTime": "2023-10-30T14:12:17.659624+02:00", "EventTime": "2023-10-30T14:12:17.659644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CQHbQz4jMuFt5iwBF7"]} -{"Format": "IDEA0", "ID": "72ed6f89-cdea-4e5e-8c1e-2766312df6b8", "DetectTime": "2023-10-30T14:12:17.673078+02:00", "EventTime": "2023-10-30T14:12:17.673089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cdrs6N28W9085KW6Ee"]} -{"Format": "IDEA0", "ID": "e1789966-5160-44fc-b7d8-97b1de45fd16", "DetectTime": "2023-10-30T14:12:17.689895+02:00", "EventTime": "2023-10-30T14:12:17.689916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CEYwzf2vWtF3eUYk45"]} -{"Format": "IDEA0", "ID": "7530e9fd-b916-452f-80be-18bb60dd82f8", "DetectTime": "2023-10-30T14:12:17.711057+02:00", "EventTime": "2023-10-30T14:12:17.711075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIaCZp3lDkxklRbvS8"]} -{"Format": "IDEA0", "ID": "10a53dcd-fd19-4f04-bbee-993f4d034ef4", "DetectTime": "2023-10-30T14:12:17.727716+02:00", "EventTime": "2023-10-30T14:12:17.727728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CLlVJu3oEQ8AK80oTi"]} -{"Format": "IDEA0", "ID": "c981cdac-19d7-4d1a-8eb8-3a5cb190536d", "DetectTime": "2023-10-30T14:12:17.744139+02:00", "EventTime": "2023-10-30T14:12:17.744157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C0xjcxuzADDC1uDM1"]} -{"Format": "IDEA0", "ID": "38475918-7cab-4854-9a48-f5f9f7b53ec3", "DetectTime": "2023-10-30T14:12:17.760172+02:00", "EventTime": "2023-10-30T14:12:17.760186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CcZoGM2a4qIODudIha"]} -{"Format": "IDEA0", "ID": "5638c9ef-b923-43be-b549-075fbe32e7ad", "DetectTime": "2023-10-30T14:12:17.775831+02:00", "EventTime": "2023-10-30T14:12:17.775846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CPDhOS2A1jmuZ2dpo3"]} -{"Format": "IDEA0", "ID": "845a9ee9-ad43-42fc-be99-229ab8638066", "DetectTime": "2023-10-30T14:12:17.789295+02:00", "EventTime": "2023-10-30T14:12:17.789306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CciJPY2faEsaG8Bbd"]} -{"Format": "IDEA0", "ID": "3e9635b6-b14d-4519-b041-f91bd82ab2c7", "DetectTime": "2023-10-30T14:12:17.820054+02:00", "EventTime": "2023-10-30T14:12:17.820066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CzVVcs21c9CCKcHM6g"]} -{"Format": "IDEA0", "ID": "c8d261d5-46a0-4800-a903-f6412a08d429", "DetectTime": "2023-10-30T14:12:17.837436+02:00", "EventTime": "2023-10-30T14:12:17.837448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CQ8DDM1bmxwVbZD4Id"]} -{"Format": "IDEA0", "ID": "fcd39838-88b4-4ba2-8fff-29257db12989", "DetectTime": "2023-10-30T14:12:17.852229+02:00", "EventTime": "2023-10-30T14:12:17.852252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CPxA1g4yPFuzwIL3Mb"]} -{"Format": "IDEA0", "ID": "48d5c40c-e0e4-4020-b783-d817f4ff09eb", "DetectTime": "2023-10-30T14:12:17.870387+02:00", "EventTime": "2023-10-30T14:12:17.870403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CDAUaT3FEcJny4GyB6"]} -{"Format": "IDEA0", "ID": "7db7de74-86db-43a0-95f2-e49ab8c3157e", "DetectTime": "2023-10-30T14:12:17.883904+02:00", "EventTime": "2023-10-30T14:12:17.883914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CE0X2G1qRarhh5V8l7"]} -{"Format": "IDEA0", "ID": "f1b39369-c539-4cb4-afd7-94f1cacd46c8", "DetectTime": "2023-10-30T14:12:17.898144+02:00", "EventTime": "2023-10-30T14:12:17.898154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cf4ouj1d0QzeuCsfAb"]} -{"Format": "IDEA0", "ID": "15dd445d-944f-41f5-a019-43c1d5e47c6f", "DetectTime": "2023-10-30T14:12:17.915414+02:00", "EventTime": "2023-10-30T14:12:17.915429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CqKwfQ4ryWEax3CT1"]} -{"Format": "IDEA0", "ID": "7e508c7c-1df1-4cec-9934-79d59413ae03", "DetectTime": "2023-10-30T14:12:17.933100+02:00", "EventTime": "2023-10-30T14:12:17.933111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CpeqtB2yAxoplpwjSk"]} -{"Format": "IDEA0", "ID": "294e4228-2331-4935-a77a-12b42c925880", "DetectTime": "2023-10-30T14:12:17.946840+02:00", "EventTime": "2023-10-30T14:12:17.946851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C0iq4N3atBLeyrSH17"]} -{"Format": "IDEA0", "ID": "197a2cf1-cb45-4884-a577-83aa36e7717b", "DetectTime": "2023-10-30T14:12:17.960412+02:00", "EventTime": "2023-10-30T14:12:17.960424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Cs1Nor3RGi77qDWkE3"]} -{"Format": "IDEA0", "ID": "da791619-d8c0-4e99-bb02-731c3e5fe12c", "DetectTime": "2023-10-30T14:12:17.976867+02:00", "EventTime": "2023-10-30T14:12:17.976883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CWGiaw41L3dAHIcCF6"]} -{"Format": "Json", "ID": "da791619-d8c0-4e99-bb02-731c3e5fe12c", "DetectTime": "2023-10-30T14:12:17.976867+02:00", "EventTime": "2023-10-30T14:12:17.976883+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:18:53.715783+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:18.046968)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f5d5b64-3d71-4daa-b22d-bc92a887acc1", "DetectTime": "2023-10-30T14:12:18.050887+02:00", "EventTime": "2023-10-30T14:12:18.050899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cru3KI3YLOxzfTTgye"]} -{"Format": "IDEA0", "ID": "1b37f099-69c0-44a1-a716-d92763b48dad", "DetectTime": "2023-10-30T14:12:18.067984+02:00", "EventTime": "2023-10-30T14:12:18.068001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CQLgNYf0xZJHW0mk2"]} -{"Format": "IDEA0", "ID": "fb13fbe7-cad0-4488-89c6-2d8138c2e22a", "DetectTime": "2023-10-30T14:12:18.083926+02:00", "EventTime": "2023-10-30T14:12:18.083941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CHJMGJ2WiujXTZyGwl"]} -{"Format": "IDEA0", "ID": "390435e2-678a-4d3e-a0fe-8aaaf076b4db", "DetectTime": "2023-10-30T14:12:18.101343+02:00", "EventTime": "2023-10-30T14:12:18.101358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Ce9gvvTVLiLydrAjl"]} -{"Format": "IDEA0", "ID": "485a3b86-52b3-4e5d-b1bf-7d5a919d880f", "DetectTime": "2023-10-30T14:12:18.120228+02:00", "EventTime": "2023-10-30T14:12:18.120243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CAOX6d2rQgYcLaAln7"]} -{"Format": "IDEA0", "ID": "3be59f0d-9263-4062-b6c6-f36eef994b22", "DetectTime": "2023-10-30T14:12:18.139143+02:00", "EventTime": "2023-10-30T14:12:18.139159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CjrxUQ2qsC4HOuPPn3"]} -{"Format": "IDEA0", "ID": "7c72babb-f260-40dd-8bed-58b9ec878c24", "DetectTime": "2023-10-30T14:12:18.154925+02:00", "EventTime": "2023-10-30T14:12:18.154939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CysEXk22hpGiDHHU4"]} -{"Format": "IDEA0", "ID": "ebe3950b-7b4c-477c-a544-94dc964248ed", "DetectTime": "2023-10-30T14:12:18.168346+02:00", "EventTime": "2023-10-30T14:12:18.168357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CKCZUg2snwLJJei8D2"]} -{"Format": "IDEA0", "ID": "565f6bf7-f0ab-43ca-bd5b-a8397628ed2f", "DetectTime": "2023-10-30T14:12:18.185472+02:00", "EventTime": "2023-10-30T14:12:18.185487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C744dYMIUZFDNcHha"]} -{"Format": "IDEA0", "ID": "ddfbed5b-f424-47e0-8ef1-9e4efca98828", "DetectTime": "2023-10-30T14:12:18.203967+02:00", "EventTime": "2023-10-30T14:12:18.203986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqUGmv2IxyI1WPMpQc"]} -{"Format": "IDEA0", "ID": "f2e70ba8-ecb1-4ae1-9fc8-32d24eab6ea9", "DetectTime": "2023-10-30T14:12:18.219840+02:00", "EventTime": "2023-10-30T14:12:18.219855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C1C5lZ1nSJDu0iCMj3"]} -{"Format": "IDEA0", "ID": "21e65a89-dea5-440b-9fc4-fc9c0f690057", "DetectTime": "2023-10-30T14:12:18.233933+02:00", "EventTime": "2023-10-30T14:12:18.233943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CXUQM22OaSPx8uP5K6"]} -{"Format": "IDEA0", "ID": "4c572792-0913-4ebb-bb39-aa244e701b46", "DetectTime": "2023-10-30T14:12:18.248501+02:00", "EventTime": "2023-10-30T14:12:18.248513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CVy4W61yXZEs7CMLx2"]} -{"Format": "IDEA0", "ID": "2b7c9888-cafd-4434-9f55-a37f26161a3e", "DetectTime": "2023-10-30T14:12:18.264419+02:00", "EventTime": "2023-10-30T14:12:18.264432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cac8RC2MdDb7xESXXf"]} -{"Format": "IDEA0", "ID": "8d15fc51-0c18-4435-bb01-4df9805ceec0", "DetectTime": "2023-10-30T14:12:18.280867+02:00", "EventTime": "2023-10-30T14:12:18.280878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CWoHWE4GjGa98rOoYk"]} -{"Format": "IDEA0", "ID": "c2287a2a-e88e-46ff-ad49-fc3c9e09f661", "DetectTime": "2023-10-30T14:12:18.296455+02:00", "EventTime": "2023-10-30T14:12:18.296469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQyPAglgnR9AcYl2k"]} -{"Format": "IDEA0", "ID": "89a1ad86-9183-4f2f-a9df-fc52cac2eff2", "DetectTime": "2023-10-30T14:12:18.310573+02:00", "EventTime": "2023-10-30T14:12:18.310584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ce1371hfz5KNfkX1g"]} -{"Format": "IDEA0", "ID": "82fe881b-b66d-49bd-8ac1-55e9135ecb38", "DetectTime": "2023-10-30T14:12:18.327740+02:00", "EventTime": "2023-10-30T14:12:18.327751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C97zr218mLb3PcDXdf"]} -{"Format": "IDEA0", "ID": "da1cf92d-2a32-47e7-af4e-034b2b820bbb", "DetectTime": "2023-10-30T14:12:18.342349+02:00", "EventTime": "2023-10-30T14:12:18.342366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CAouHh2vWZKaWaR3h"]} -{"Format": "IDEA0", "ID": "3d15e37e-428f-40b4-99ee-7882688e6a1f", "DetectTime": "2023-10-30T14:12:18.358403+02:00", "EventTime": "2023-10-30T14:12:18.358415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CVcn145JOK7cJCB5"]} -{"Format": "IDEA0", "ID": "0fb0057a-e8c0-46e4-a069-d3db03666724", "DetectTime": "2023-10-30T14:12:18.372199+02:00", "EventTime": "2023-10-30T14:12:18.372215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Ccowy94xeCMzKloXa5"]} -{"Format": "IDEA0", "ID": "c49b6bb8-77e7-4ddb-8b33-4ad95dc00eaa", "DetectTime": "2023-10-30T14:12:18.386976+02:00", "EventTime": "2023-10-30T14:12:18.386994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Ca3W963BfE1Lky1zAl"]} -{"Format": "IDEA0", "ID": "109630b8-df19-4162-8d89-97037eec7ff8", "DetectTime": "2023-10-30T14:12:18.401775+02:00", "EventTime": "2023-10-30T14:12:18.401786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CEB5tN18Xrklbblcb6"]} -{"Format": "IDEA0", "ID": "0084af52-7ebe-4b22-8d6d-72f746927382", "DetectTime": "2023-10-30T14:12:18.415399+02:00", "EventTime": "2023-10-30T14:12:18.415410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CpzYBD2c4AWzvO71zc"]} -{"Format": "IDEA0", "ID": "4ca95132-089f-434f-960f-9bd61f5fe15a", "DetectTime": "2023-10-30T14:12:18.432648+02:00", "EventTime": "2023-10-30T14:12:18.432662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cgf6W421Xhd5QHM672"]} -{"Format": "IDEA0", "ID": "9c2971cb-6bcb-4cc4-bcb6-74adfbe7b642", "DetectTime": "2023-10-30T14:12:18.465424+02:00", "EventTime": "2023-10-30T14:12:18.465440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CWSyXi4MPss2twBFcf"]} -{"Format": "IDEA0", "ID": "d7a28855-d209-4816-a85b-1ef4b4a5b940", "DetectTime": "2023-10-30T14:12:18.481336+02:00", "EventTime": "2023-10-30T14:12:18.481347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C3eTZe3ONTrz1ZzBkg"]} -{"Format": "IDEA0", "ID": "e80f45b1-b07b-4abb-9037-6dad1db75561", "DetectTime": "2023-10-30T14:12:18.497560+02:00", "EventTime": "2023-10-30T14:12:18.497571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C0sUSM32S0Hmt0JxRc"]} -{"Format": "IDEA0", "ID": "8025a409-c764-4574-8925-eba32bbaece5", "DetectTime": "2023-10-30T14:12:18.515025+02:00", "EventTime": "2023-10-30T14:12:18.515043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cg9ZhO3ChH4rY1WIkk"]} -{"Format": "IDEA0", "ID": "505a4fac-ef34-49db-aa3c-805c023acecc", "DetectTime": "2023-10-30T14:12:18.533308+02:00", "EventTime": "2023-10-30T14:12:18.533325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CueTT62pcEkqBuo5Og"]} -{"Format": "IDEA0", "ID": "c6cd504f-abb6-438a-9dc3-b93bad5de21c", "DetectTime": "2023-10-30T14:12:18.552966+02:00", "EventTime": "2023-10-30T14:12:18.552984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CBOHSn1ahlfLJnMxWa"]} -{"Format": "IDEA0", "ID": "ee3c7631-c429-47fe-a84f-0e12c2da0d29", "DetectTime": "2023-10-30T14:12:18.573396+02:00", "EventTime": "2023-10-30T14:12:18.573415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CM6tC41KqnaJGwEcN2"]} -{"Format": "IDEA0", "ID": "e7097d7e-1713-4495-8c2d-c49bafa34a1b", "DetectTime": "2023-10-30T14:12:18.592659+02:00", "EventTime": "2023-10-30T14:12:18.592672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CA5b1k2hDothUlqIY8"]} -{"Format": "IDEA0", "ID": "d2ba1bd1-30a4-4b1a-8b1a-1aa70952e67f", "DetectTime": "2023-10-30T14:12:18.611112+02:00", "EventTime": "2023-10-30T14:12:18.611128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CtyqT71LKxLJfQxpC1"]} -{"Format": "IDEA0", "ID": "08432f2f-a341-4c35-8d58-bac740e60bbc", "DetectTime": "2023-10-30T14:12:18.629900+02:00", "EventTime": "2023-10-30T14:12:18.629915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Co0Rc1luovWeya5Yg"]} -{"Format": "IDEA0", "ID": "9c110104-abde-4448-9d2f-8f957d8d9a05", "DetectTime": "2023-10-30T14:12:18.647653+02:00", "EventTime": "2023-10-30T14:12:18.647664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CGszfu4JG8zfBYWITl"]} -{"Format": "IDEA0", "ID": "c37df902-3764-459d-9ba0-36b3f65cbd68", "DetectTime": "2023-10-30T14:12:18.662222+02:00", "EventTime": "2023-10-30T14:12:18.662233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CPJJw03QJ6kV6wvtMh"]} -{"Format": "IDEA0", "ID": "89ecd05e-e1ea-4971-a1c5-90a12258dcfa", "DetectTime": "2023-10-30T14:12:18.678207+02:00", "EventTime": "2023-10-30T14:12:18.678219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5HY9B1lAplakrNbig"]} -{"Format": "IDEA0", "ID": "166c443c-6ed0-46bd-b1f3-deda1b5ff804", "DetectTime": "2023-10-30T14:12:18.691645+02:00", "EventTime": "2023-10-30T14:12:18.691656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C6iMz21ZiCcqWEZ6vj"]} -{"Format": "IDEA0", "ID": "dbd66bd5-5576-4d51-9db9-4d0b4cd7cea2", "DetectTime": "2023-10-30T14:12:18.722346+02:00", "EventTime": "2023-10-30T14:12:18.722366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CyK8MWORIvomMWbK"]} -{"Format": "IDEA0", "ID": "b3e969fb-f540-4d15-a3f7-f18cf0e89219", "DetectTime": "2023-10-30T14:12:18.741146+02:00", "EventTime": "2023-10-30T14:12:18.741157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CmJisSxwFzMmxo2Vj"]} -{"Format": "IDEA0", "ID": "fae2a20a-57a1-4392-9517-50b43c95f7cd", "DetectTime": "2023-10-30T14:12:18.759371+02:00", "EventTime": "2023-10-30T14:12:18.759387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CQeZdXy1MAT30TPO8"]} -{"Format": "IDEA0", "ID": "343dd556-3a0b-4654-9744-75da0a191d1e", "DetectTime": "2023-10-30T14:12:18.775663+02:00", "EventTime": "2023-10-30T14:12:18.775674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cp3JXC2B5av3Lvmne5"]} -{"Format": "IDEA0", "ID": "a483d562-54ad-48aa-b3d4-34b2c8da042f", "DetectTime": "2023-10-30T14:12:18.790031+02:00", "EventTime": "2023-10-30T14:12:18.790043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CQUsei42SotGSZxhxk"]} -{"Format": "IDEA0", "ID": "f6bebe53-7af0-49db-98ee-f54fafef32b3", "DetectTime": "2023-10-30T14:12:18.803312+02:00", "EventTime": "2023-10-30T14:12:18.803327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cugrau3Lm0XwaiTk9i"]} -{"Format": "IDEA0", "ID": "85b1752a-7f10-476b-a0c8-340b931c8cbf", "DetectTime": "2023-10-30T14:12:18.818469+02:00", "EventTime": "2023-10-30T14:12:18.818482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CFR2Qi1xS4KOWkEz9h"]} -{"Format": "IDEA0", "ID": "4c388dc9-6ee7-4aaf-aac5-3462dcfa9afe", "DetectTime": "2023-10-30T14:12:18.831196+02:00", "EventTime": "2023-10-30T14:12:18.831206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CHO7zc33ulte1jVbNe"]} -{"Format": "IDEA0", "ID": "3e4d7d7b-6429-4379-9fbd-fa9ebd94b7c5", "DetectTime": "2023-10-30T14:12:18.844648+02:00", "EventTime": "2023-10-30T14:12:18.844660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNQRqm2N1Iw8HJsd34"]} -{"Format": "IDEA0", "ID": "5b6107f5-a861-4361-89ab-fc6fd6bcd081", "DetectTime": "2023-10-30T14:12:18.858827+02:00", "EventTime": "2023-10-30T14:12:18.858842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYkpwI1cOMTm1e3Ule"]} -{"Format": "IDEA0", "ID": "cdae05c1-e4a0-4c5b-ac26-7559ede6cfb5", "DetectTime": "2023-10-30T14:12:18.874646+02:00", "EventTime": "2023-10-30T14:12:18.874656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CxJjMe4XH8GVU27Px5"]} -{"Format": "IDEA0", "ID": "1b403ffc-7901-4c42-bfbf-4ae1764bbcac", "DetectTime": "2023-10-30T14:12:18.889491+02:00", "EventTime": "2023-10-30T14:12:18.889503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C5T9fCgQ56quhX4F7"]} -{"Format": "IDEA0", "ID": "17294adc-6a13-4961-818e-382db1517f4f", "DetectTime": "2023-10-30T14:12:18.904674+02:00", "EventTime": "2023-10-30T14:12:18.904685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCdvtR1kBmoaMmPFNi"]} -{"Format": "IDEA0", "ID": "7be94956-5068-47aa-961f-c2b4a96055ff", "DetectTime": "2023-10-30T14:12:18.920344+02:00", "EventTime": "2023-10-30T14:12:18.920355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CIjnS33oXQpoBJevsh"]} -{"Format": "IDEA0", "ID": "c418f999-7dd1-48da-bfc9-08a413846c44", "DetectTime": "2023-10-30T14:12:18.936619+02:00", "EventTime": "2023-10-30T14:12:18.936636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CappMo2JPGVEbo0gxg"]} -{"Format": "IDEA0", "ID": "6d752186-3923-400d-8de3-a15662537ee6", "DetectTime": "2023-10-30T14:12:18.956374+02:00", "EventTime": "2023-10-30T14:12:18.956389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C9geum47SinnDkM0Kj"]} -{"Format": "IDEA0", "ID": "d2d7633b-8169-415f-b9eb-f2458dc89d4c", "DetectTime": "2023-10-30T14:12:18.975146+02:00", "EventTime": "2023-10-30T14:12:18.975162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CcJRW54YDaquw7TOZk"]} -{"Format": "IDEA0", "ID": "b792ed1c-2b58-4fc3-95f0-5b396d3d3ced", "DetectTime": "2023-10-30T14:12:18.993822+02:00", "EventTime": "2023-10-30T14:12:18.993838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C0MQPl3ixx6noIdGsg"]} -{"Format": "IDEA0", "ID": "1b5c2c39-3a86-4329-a013-362de182c899", "DetectTime": "2023-10-30T14:12:19.012137+02:00", "EventTime": "2023-10-30T14:12:19.012163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CjkX1syP4Yvm56sb"]} -{"Format": "IDEA0", "ID": "2c4a878f-1962-4785-a73f-5b624a79d1c1", "DetectTime": "2023-10-30T14:12:19.035970+02:00", "EventTime": "2023-10-30T14:12:19.035990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Csg9D032Iy86rGHX07"]} -{"Format": "IDEA0", "ID": "cbec786c-28a9-491a-b665-a385e94e8cbe", "DetectTime": "2023-10-30T14:12:19.055968+02:00", "EventTime": "2023-10-30T14:12:19.055981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CEmVZt43TepFPAXms3"]} -{"Format": "IDEA0", "ID": "e6bb1efd-c731-418d-beb5-b52c3f768d17", "DetectTime": "2023-10-30T14:12:19.077658+02:00", "EventTime": "2023-10-30T14:12:19.077675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CWjyVEoVlKp6AyHxa"]} -{"Format": "IDEA0", "ID": "524353aa-eca7-4ff4-a7cd-5a6f4786634f", "DetectTime": "2023-10-30T14:12:19.097317+02:00", "EventTime": "2023-10-30T14:12:19.097335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CLLM8R1mMhqHowUB6k"]} -{"Format": "IDEA0", "ID": "2fc4ff5e-c7fd-4ed1-83f1-90f7e6356ea7", "DetectTime": "2023-10-30T14:12:19.136893+02:00", "EventTime": "2023-10-30T14:12:19.136904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CmZnc618ay9XOclvMf"]} -{"Format": "IDEA0", "ID": "4750ebd8-da0e-4eb0-8deb-cbdc96256b52", "DetectTime": "2023-10-30T14:12:19.152883+02:00", "EventTime": "2023-10-30T14:12:19.152895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C9HrFT1HNdCIWAbB0d"]} -{"Format": "IDEA0", "ID": "68704190-b56b-4b31-82f0-e323d7a19255", "DetectTime": "2023-10-30T14:12:19.170968+02:00", "EventTime": "2023-10-30T14:12:19.170987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CZCfFM1t4BqL6bX1de"]} -{"Format": "IDEA0", "ID": "e53bb6ea-0066-43d9-bc76-9dd609861c4d", "DetectTime": "2023-10-30T14:12:19.188834+02:00", "EventTime": "2023-10-30T14:12:19.188853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CoeKFg19LhJRLJ9jVl"]} -{"Format": "IDEA0", "ID": "5713ed86-4579-4f8c-bac7-dd161e746835", "DetectTime": "2023-10-30T14:12:19.214475+02:00", "EventTime": "2023-10-30T14:12:19.214500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CLKyX82IhqRuDkRy2c"]} -{"Format": "IDEA0", "ID": "ab59273a-8db7-4bca-8d58-7175162e5b42", "DetectTime": "2023-10-30T14:12:19.240723+02:00", "EventTime": "2023-10-30T14:12:19.240752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CsCTfHUesHmUf05Ff"]} -{"Format": "IDEA0", "ID": "39098598-a7b1-4e51-927c-a9bd4a0e4891", "DetectTime": "2023-10-30T14:12:19.261320+02:00", "EventTime": "2023-10-30T14:12:19.261346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRZ4jE2ouBkEmQQk2b"]} -{"Format": "IDEA0", "ID": "6db52e28-a438-44c1-bab3-4d0d39847123", "DetectTime": "2023-10-30T14:12:19.276705+02:00", "EventTime": "2023-10-30T14:12:19.276718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CIWm144HnFQsfESQsa"]} -{"Format": "IDEA0", "ID": "8bf9a5fe-809e-45b9-9ed0-5098705e99e3", "DetectTime": "2023-10-30T14:12:19.292451+02:00", "EventTime": "2023-10-30T14:12:19.292467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cn1XE02a97Z3XT3rV2"]} -{"Format": "IDEA0", "ID": "d27391c5-cecd-4d9a-9326-d5af7de69b6d", "DetectTime": "2023-10-30T14:12:19.306019+02:00", "EventTime": "2023-10-30T14:12:19.306029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["C58wARJJ7DIHe2wD7"]} -{"Format": "IDEA0", "ID": "d9444f36-3a5d-4451-8fbd-aa950b24abac", "DetectTime": "2023-10-30T14:12:19.321313+02:00", "EventTime": "2023-10-30T14:12:19.321328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CQVgbP2FJ3zH7Cify8"]} -{"Format": "IDEA0", "ID": "db57ef91-6b11-45cb-b73b-75ab871b075e", "DetectTime": "2023-10-30T14:12:19.341025+02:00", "EventTime": "2023-10-30T14:12:19.341040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cr5T36Px6rUUDDmod"]} -{"Format": "IDEA0", "ID": "b25d8442-f3dc-4b62-bd61-603c5ce0e8a5", "DetectTime": "2023-10-30T14:12:19.357672+02:00", "EventTime": "2023-10-30T14:12:19.357687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Ccvfi52TtsiPo11aJh"]} -{"Format": "IDEA0", "ID": "9961dfab-a691-4014-956c-c95bef236c0c", "DetectTime": "2023-10-30T14:12:19.375648+02:00", "EventTime": "2023-10-30T14:12:19.375664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CbTPpX13iGjrLXk4h3"]} -{"Format": "IDEA0", "ID": "5790df5d-a1a0-4d9b-b2ce-026a387d0632", "DetectTime": "2023-10-30T14:12:19.394449+02:00", "EventTime": "2023-10-30T14:12:19.394459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CaPpVu2xT1iMsjQ493"]} -{"Format": "IDEA0", "ID": "b9cce37a-cb42-4fb4-a4a8-8a982e836883", "DetectTime": "2023-10-30T14:12:19.413389+02:00", "EventTime": "2023-10-30T14:12:19.413405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CD9ZdQ3ZCsf9XbIa65"]} -{"Format": "IDEA0", "ID": "7d9a0ba4-dab0-470c-843a-7d0164afe179", "DetectTime": "2023-10-30T14:12:19.428229+02:00", "EventTime": "2023-10-30T14:12:19.428240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CrpwKT3gAuw064IQDc"]} -{"Format": "IDEA0", "ID": "0956591e-8f0d-46d5-88c9-2d778f735672", "DetectTime": "2023-10-30T14:12:19.461884+02:00", "EventTime": "2023-10-30T14:12:19.461896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C4OiEt46TaG8FL6ad"]} -{"Format": "IDEA0", "ID": "610c09cd-c32a-409a-9867-d6810ae1073d", "DetectTime": "2023-10-30T14:12:19.476141+02:00", "EventTime": "2023-10-30T14:12:19.476157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CvgrWz10ZwM5bxdGb6"]} -{"Format": "IDEA0", "ID": "1c716986-e6ca-4f0d-8035-fb93b39f8f94", "DetectTime": "2023-10-30T14:12:19.491593+02:00", "EventTime": "2023-10-30T14:12:19.491605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C0AMYh3bLWUf54ZUea"]} -{"Format": "IDEA0", "ID": "2a576e7b-99a1-44a9-a06a-418ad930162e", "DetectTime": "2023-10-30T14:12:19.506932+02:00", "EventTime": "2023-10-30T14:12:19.506946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C0xgmm2Svmwtnf7V93"]} -{"Format": "IDEA0", "ID": "b4c41404-f009-4323-adc7-96e4177bb21a", "DetectTime": "2023-10-30T14:12:19.524792+02:00", "EventTime": "2023-10-30T14:12:19.524807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CRibU1uQ4cEJbs5a1"]} -{"Format": "IDEA0", "ID": "ce40403a-8c77-4b8a-8d1d-9e295aab8560", "DetectTime": "2023-10-30T14:12:19.543694+02:00", "EventTime": "2023-10-30T14:12:19.543709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CNTPZT14rQi6AOSfTg"]} -{"Format": "IDEA0", "ID": "12bd4681-f26f-4e89-8d27-944820449f98", "DetectTime": "2023-10-30T14:12:19.562832+02:00", "EventTime": "2023-10-30T14:12:19.562849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CdEY8TGKgNQwNO5Di"]} -{"Format": "IDEA0", "ID": "1c6c3d66-8eea-4cf7-b542-b6249b72a5b5", "DetectTime": "2023-10-30T14:12:19.582059+02:00", "EventTime": "2023-10-30T14:12:19.582075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C9ZoublJTEFC5GVw2"]} -{"Format": "IDEA0", "ID": "7c3daa89-cbf6-4148-ad75-025c452498ee", "DetectTime": "2023-10-30T14:12:19.600644+02:00", "EventTime": "2023-10-30T14:12:19.600659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CaK9qB3MuHGIavwVif"]} -{"Format": "IDEA0", "ID": "742b7024-d878-4762-b5b8-57a04ba72005", "DetectTime": "2023-10-30T14:12:19.616101+02:00", "EventTime": "2023-10-30T14:12:19.616114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C2fzCZ1mObNJrUMWB1"]} -{"Format": "IDEA0", "ID": "d08fee12-a119-46be-aa5f-4b97f67a8d28", "DetectTime": "2023-10-30T14:12:19.631339+02:00", "EventTime": "2023-10-30T14:12:19.631350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CVlKNUxZ6dfADFH04"]} -{"Format": "IDEA0", "ID": "088eff41-80e9-4610-9a9b-39a7b7917ab8", "DetectTime": "2023-10-30T14:12:19.644690+02:00", "EventTime": "2023-10-30T14:12:19.644700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CwuurF1jDpqyRwgpdl"]} -{"Format": "IDEA0", "ID": "758e2e24-7399-49e9-b922-80b51d8769e0", "DetectTime": "2023-10-30T14:12:19.657042+02:00", "EventTime": "2023-10-30T14:12:19.657053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cj6YTx32R8V2aYu08c"]} -{"Format": "IDEA0", "ID": "0b60399f-fd0b-4466-aadb-05d863608ec5", "DetectTime": "2023-10-30T14:12:19.671082+02:00", "EventTime": "2023-10-30T14:12:19.671099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CWrPEZ1a0b9iP3VDm1"]} -{"Format": "IDEA0", "ID": "58b2ceb3-2291-49de-919a-fb1f265e97ca", "DetectTime": "2023-10-30T14:12:19.685749+02:00", "EventTime": "2023-10-30T14:12:19.685762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CD9GfitW8M531d2Wd"]} -{"Format": "IDEA0", "ID": "5881976d-8b6d-4a3d-a1e3-800fc13ee6bf", "DetectTime": "2023-10-30T14:12:19.702824+02:00", "EventTime": "2023-10-30T14:12:19.702841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Chknou2aVvLPrU9Ch9"]} -{"Format": "IDEA0", "ID": "5f6cd488-060f-4e20-bf2f-ef906a269892", "DetectTime": "2023-10-30T14:12:19.721034+02:00", "EventTime": "2023-10-30T14:12:19.721045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cg1VeC12ziF2fFGasg"]} -{"Format": "IDEA0", "ID": "6d38e94e-419a-4cbe-b361-2985c69ac8f1", "DetectTime": "2023-10-30T14:12:19.736776+02:00", "EventTime": "2023-10-30T14:12:19.736788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cg8ydV3lzV6X8Xgttg"]} -{"Format": "IDEA0", "ID": "4b924589-9176-4155-a3d7-bd11f9717c84", "DetectTime": "2023-10-30T14:12:19.751293+02:00", "EventTime": "2023-10-30T14:12:19.751303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CJa9eJxAIKj9oEQw4"]} -{"Format": "IDEA0", "ID": "8e97aa8e-bb41-4815-a31c-4edb69e27221", "DetectTime": "2023-10-30T14:12:19.765737+02:00", "EventTime": "2023-10-30T14:12:19.765754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CqH7AB1jzpdiKEAm75"]} -{"Format": "IDEA0", "ID": "2410cede-dfc5-47df-8abd-6562f050fc73", "DetectTime": "2023-10-30T14:12:19.784443+02:00", "EventTime": "2023-10-30T14:12:19.784461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cb92BA4Of1R4Q6LnU2"]} -{"Format": "IDEA0", "ID": "e8e15ff1-760e-4639-9c6c-569aa3a1c78d", "DetectTime": "2023-10-30T14:12:19.802129+02:00", "EventTime": "2023-10-30T14:12:19.802141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C0Vc8B3eHAgBx1ElEf"]} -{"Format": "IDEA0", "ID": "05ece12a-47e3-4cf0-82c6-221860bcbd8e", "DetectTime": "2023-10-30T14:12:19.816663+02:00", "EventTime": "2023-10-30T14:12:19.816673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CDG4x63Vb1SiKae0la"]} -{"Format": "IDEA0", "ID": "2a889531-5e4a-459d-9214-64d41559fb50", "DetectTime": "2023-10-30T14:12:19.830856+02:00", "EventTime": "2023-10-30T14:12:19.830867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CZs8up0HnVGW5Dny6"]} -{"Format": "IDEA0", "ID": "7c384cd4-9be5-40c6-95f6-be824e9934be", "DetectTime": "2023-10-30T14:12:19.849546+02:00", "EventTime": "2023-10-30T14:12:19.849562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CAHWPZ1BOnGxkYjBZb"]} -{"Format": "IDEA0", "ID": "31317e9f-4fda-406c-9936-b4fc12c5bea7", "DetectTime": "2023-10-30T14:12:19.867930+02:00", "EventTime": "2023-10-30T14:12:19.867945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C54zJo4obnWy9PuVW1"]} -{"Format": "IDEA0", "ID": "2a2aa111-f68c-48e5-84df-bca9585c44d9", "DetectTime": "2023-10-30T14:12:19.887085+02:00", "EventTime": "2023-10-30T14:12:19.887101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CxCQOm3roougg3c2pa"]} -{"Format": "IDEA0", "ID": "4d323f1b-6605-478c-a438-e20c830f3d1e", "DetectTime": "2023-10-30T14:12:19.905499+02:00", "EventTime": "2023-10-30T14:12:19.905514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C72Bet2EpY8TktOqyh"]} -{"Format": "IDEA0", "ID": "55732504-2897-4c9e-8bbc-6017e4c6da76", "DetectTime": "2023-10-30T14:12:19.924845+02:00", "EventTime": "2023-10-30T14:12:19.924860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C2PNZ349XbaCKAhcGc"]} -{"Format": "IDEA0", "ID": "a493bb96-0e29-40e8-a592-49ca11064408", "DetectTime": "2023-10-30T14:12:19.943376+02:00", "EventTime": "2023-10-30T14:12:19.943391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CktAIG3tC6heuKLLL"]} -{"Format": "IDEA0", "ID": "cecb30ab-d120-474b-80be-dc6d31babcfc", "DetectTime": "2023-10-30T14:12:19.962381+02:00", "EventTime": "2023-10-30T14:12:19.962397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CdbYpW4wRWx8vJXt9"]} -{"Format": "IDEA0", "ID": "77c64214-7e29-4493-96c5-473c6d462c65", "DetectTime": "2023-10-30T14:12:19.978386+02:00", "EventTime": "2023-10-30T14:12:19.978396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CG08Us19MhQ6agYtkc"]} -{"Format": "IDEA0", "ID": "9860b00f-a2a6-469f-a342-1b557b5d471c", "DetectTime": "2023-10-30T14:12:19.993288+02:00", "EventTime": "2023-10-30T14:12:19.993300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C58FDS3z8iVMMNGaik"]} -{"Format": "IDEA0", "ID": "9b273467-104f-4103-a299-5a52543d273f", "DetectTime": "2023-10-30T14:12:20.006443+02:00", "EventTime": "2023-10-30T14:12:20.006455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CCsae24c6UriBKkEm4"]} -{"Format": "IDEA0", "ID": "89efef1b-804c-4bf9-bcf4-7a92fd1f4e83", "DetectTime": "2023-10-30T14:12:20.022041+02:00", "EventTime": "2023-10-30T14:12:20.022052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CahTNo4SWPAiOiQmmk"]} -{"Format": "IDEA0", "ID": "40af3614-4083-45d2-9c53-f2b15f8683bd", "DetectTime": "2023-10-30T14:12:20.039030+02:00", "EventTime": "2023-10-30T14:12:20.039045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CkJRfB4kTIY0OOg5m4"]} -{"Format": "IDEA0", "ID": "b3d40619-27e2-4822-9f9e-44628e3fee09", "DetectTime": "2023-10-30T14:12:20.057526+02:00", "EventTime": "2023-10-30T14:12:20.057541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cs5n7t1pgZoTNH8Vj4"]} -{"Format": "IDEA0", "ID": "0a4e00b0-4c5b-478a-9d37-9cb5c527012d", "DetectTime": "2023-10-30T14:12:20.075360+02:00", "EventTime": "2023-10-30T14:12:20.075379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["C5BgQg1kQp3kqE2Ssj"]} -{"Format": "IDEA0", "ID": "157b9060-540d-41cc-b4bc-2d5f1a3c124b", "DetectTime": "2023-10-30T14:12:20.088773+02:00", "EventTime": "2023-10-30T14:12:20.088784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CsWXpH1sqxJYx0c1Ge"]} -{"Format": "IDEA0", "ID": "071c82e8-143b-48c8-ad47-27fdfc98661d", "DetectTime": "2023-10-30T14:12:20.124604+02:00", "EventTime": "2023-10-30T14:12:20.124618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CPUDURlCzbGZ4QMYf"]} -{"Format": "IDEA0", "ID": "0e544501-b532-429e-bba2-a252d1af2650", "DetectTime": "2023-10-30T14:12:20.141221+02:00", "EventTime": "2023-10-30T14:12:20.141237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CanL3AuuGxROCI851"]} -{"Format": "IDEA0", "ID": "8ed64aca-5d71-416a-9d47-9fd64695ed26", "DetectTime": "2023-10-30T14:12:20.156161+02:00", "EventTime": "2023-10-30T14:12:20.156173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C3CSE8UnYNo9j0SY6"]} -{"Format": "IDEA0", "ID": "0f617ce8-0943-4f79-a837-8385cc73ae4b", "DetectTime": "2023-10-30T14:12:20.172280+02:00", "EventTime": "2023-10-30T14:12:20.172296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CoklV5gtVIjSToWb4"]} -{"Format": "IDEA0", "ID": "d66568ff-9719-4c1c-8fce-cc9e75296470", "DetectTime": "2023-10-30T14:12:20.190378+02:00", "EventTime": "2023-10-30T14:12:20.190394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CLFQ3D4zg4FO1ASxu8"]} -{"Format": "IDEA0", "ID": "8b0bb9a0-823a-4d37-a689-985fb89c91cc", "DetectTime": "2023-10-30T14:12:20.209957+02:00", "EventTime": "2023-10-30T14:12:20.209973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CVObxk3ef0KVPMKcQ1"]} -{"Format": "IDEA0", "ID": "483c3c57-600a-465c-84b5-bdbd82897a55", "DetectTime": "2023-10-30T14:12:20.224784+02:00", "EventTime": "2023-10-30T14:12:20.224794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C05j6g1hBB3jPorCUf"]} -{"Format": "IDEA0", "ID": "b2416e47-0152-4edf-8619-55f6a3210e2d", "DetectTime": "2023-10-30T14:12:20.242983+02:00", "EventTime": "2023-10-30T14:12:20.242999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C6zvvn1vwO430NBud4"]} -{"Format": "IDEA0", "ID": "bfb9ec74-e5af-4df5-b69e-a27f9d1cdca2", "DetectTime": "2023-10-30T14:12:20.257868+02:00", "EventTime": "2023-10-30T14:12:20.257878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZ8rkVFiFl8j2tq8e"]} -{"Format": "IDEA0", "ID": "656c5661-1b4c-45b1-8ae9-a101a50ea76c", "DetectTime": "2023-10-30T14:12:20.271001+02:00", "EventTime": "2023-10-30T14:12:20.271019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CGbGjgM3Reks4r0P5"]} -{"Format": "IDEA0", "ID": "76f5d996-8ecb-48f9-8910-4b6165252a60", "DetectTime": "2023-10-30T14:12:20.285102+02:00", "EventTime": "2023-10-30T14:12:20.285113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXQFSf2E40tF2fEr2j"]} -{"Format": "IDEA0", "ID": "70f4b92c-33b0-4b2a-9b69-d393d199a5bd", "DetectTime": "2023-10-30T14:12:20.299301+02:00", "EventTime": "2023-10-30T14:12:20.299316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C4Obh44LW6qOQLuX9b"]} -{"Format": "IDEA0", "ID": "485ac542-6eda-48d4-8981-ba1fb634f7df", "DetectTime": "2023-10-30T14:12:20.313707+02:00", "EventTime": "2023-10-30T14:12:20.313721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CIxXMJ2Z9qz6nqB4Kh"]} -{"Format": "IDEA0", "ID": "de701aa4-b0ce-4dbb-944d-121aa47f92d0", "DetectTime": "2023-10-30T14:12:20.327312+02:00", "EventTime": "2023-10-30T14:12:20.327329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C2cKcI14kZsNGCaNok"]} -{"Format": "IDEA0", "ID": "0cfb3165-7e0b-4b19-99f1-76567da06f60", "DetectTime": "2023-10-30T14:12:20.342865+02:00", "EventTime": "2023-10-30T14:12:20.342876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CRLlxg15F0VjVwRXo1"]} -{"Format": "IDEA0", "ID": "ec1393da-3208-45e5-9f8d-bd1ea58fea27", "DetectTime": "2023-10-30T14:12:20.356760+02:00", "EventTime": "2023-10-30T14:12:20.356770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CaOe4MVEi7Z1rYFyc"]} -{"Format": "IDEA0", "ID": "5a03bd24-3c80-49f9-ba86-cd01c8a00eec", "DetectTime": "2023-10-30T14:12:20.373989+02:00", "EventTime": "2023-10-30T14:12:20.374006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CjvC6a2muE3MuFlie4"]} -{"Format": "IDEA0", "ID": "5f117449-ee6e-49b1-a7e3-c3d1d1645bcc", "DetectTime": "2023-10-30T14:12:20.390074+02:00", "EventTime": "2023-10-30T14:12:20.390085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CgtlTZ3Fbp1wW5Viqb"]} -{"Format": "IDEA0", "ID": "405f6d9b-c4ac-4aa5-9479-9617cc850099", "DetectTime": "2023-10-30T14:12:20.405215+02:00", "EventTime": "2023-10-30T14:12:20.405232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CR2vW03di4QBPBDLEb"]} -{"Format": "IDEA0", "ID": "f2acd99c-7b0a-455b-84b1-0590420819bc", "DetectTime": "2023-10-30T14:12:20.424069+02:00", "EventTime": "2023-10-30T14:12:20.424085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cw6arf1LjlLTNynNb6"]} -{"Format": "IDEA0", "ID": "d4e7549e-e3f7-443b-b0c1-8ad346e339d9", "DetectTime": "2023-10-30T14:12:20.442011+02:00", "EventTime": "2023-10-30T14:12:20.442027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CzPzvg1b4mYMt78Ij7"]} -{"Format": "IDEA0", "ID": "23cffa6f-b4a4-4f75-9089-9e2a09b47bf3", "DetectTime": "2023-10-30T14:12:20.480944+02:00", "EventTime": "2023-10-30T14:12:20.480960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Ch9tom2kMvEhHvjoe7"]} -{"Format": "IDEA0", "ID": "2e036f0c-eb33-4ea7-97c4-7dec94c726e8", "DetectTime": "2023-10-30T14:12:20.500008+02:00", "EventTime": "2023-10-30T14:12:20.500027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CsfWxl46y2LT0s6xv2"]} -{"Format": "IDEA0", "ID": "0317c520-71f6-496e-a9f7-ff94dc4d183d", "DetectTime": "2023-10-30T14:12:20.513166+02:00", "EventTime": "2023-10-30T14:12:20.513178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CKZEOW14VEFI1zvIe8"]} -{"Format": "IDEA0", "ID": "795b6267-77ef-4f9d-a56f-047c3cd03cfb", "DetectTime": "2023-10-30T14:12:20.529832+02:00", "EventTime": "2023-10-30T14:12:20.529848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C7UD8x1U9SMFsdgOx"]} -{"Format": "IDEA0", "ID": "9e1f4998-ae19-407e-bef3-fe5c4b0a08a6", "DetectTime": "2023-10-30T14:12:20.548152+02:00", "EventTime": "2023-10-30T14:12:20.548168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CUNaTA4I0jVeaWkEdg"]} -{"Format": "IDEA0", "ID": "387a0892-3e74-4089-8d2f-31ba3d3f8728", "DetectTime": "2023-10-30T14:12:20.566596+02:00", "EventTime": "2023-10-30T14:12:20.566611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CAedAb4xbcTBdtW9z8"]} -{"Format": "IDEA0", "ID": "5e5ed310-d825-4955-9c6a-68fdd11b90b5", "DetectTime": "2023-10-30T14:12:20.586190+02:00", "EventTime": "2023-10-30T14:12:20.586206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CwUqxM27mE5ZVbLDea"]} -{"Format": "IDEA0", "ID": "fb553e83-eb70-41a0-a7e5-bfd194f0395b", "DetectTime": "2023-10-30T14:12:20.603122+02:00", "EventTime": "2023-10-30T14:12:20.603133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRFuFs384sq9ZIzZ7c"]} -{"Format": "IDEA0", "ID": "bec569a5-b549-4c2d-a461-924941dcc5f5", "DetectTime": "2023-10-30T14:12:20.617902+02:00", "EventTime": "2023-10-30T14:12:20.617913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CaTPEL2YZ7VKI7sLrl"]} -{"Format": "IDEA0", "ID": "68cc6d91-db8a-4cb1-91ea-53eeb8ea0146", "DetectTime": "2023-10-30T14:12:20.632478+02:00", "EventTime": "2023-10-30T14:12:20.632490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CzVE5chbwW2jfumC8"]} -{"Format": "IDEA0", "ID": "0b1df811-7055-4204-b294-56e2e4deb48f", "DetectTime": "2023-10-30T14:12:20.648364+02:00", "EventTime": "2023-10-30T14:12:20.648379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CLkRUn4dwZvffvc1H5"]} -{"Format": "IDEA0", "ID": "ecb97eb1-3283-4401-beab-67357b8b6533", "DetectTime": "2023-10-30T14:12:20.665213+02:00", "EventTime": "2023-10-30T14:12:20.665224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CzrRYJ2oxj46sKtYYk"]} -{"Format": "IDEA0", "ID": "ab7cdbb8-0f49-4bcf-884b-7dbb1655ac8a", "DetectTime": "2023-10-30T14:12:20.678424+02:00", "EventTime": "2023-10-30T14:12:20.678435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZS9IAg1I3PVUodsk"]} -{"Format": "IDEA0", "ID": "5b9c3cf1-e1b3-4aea-9f7e-b9aa9d905ea5", "DetectTime": "2023-10-30T14:12:20.694405+02:00", "EventTime": "2023-10-30T14:12:20.694415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ck8gpC2tyImP1DXyae"]} -{"Format": "IDEA0", "ID": "8a3d3c84-755d-4c6f-9ce4-05b5784efb26", "DetectTime": "2023-10-30T14:12:20.708330+02:00", "EventTime": "2023-10-30T14:12:20.708341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CUmcwk1Xj6k4GKsvvi"]} -{"Format": "IDEA0", "ID": "96a76d93-c52d-41fc-b668-773ff06693a7", "DetectTime": "2023-10-30T14:12:20.724075+02:00", "EventTime": "2023-10-30T14:12:20.724086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cmd5BA2QyorNm0cxff"]} -{"Format": "IDEA0", "ID": "81f4f348-826f-4802-9ab3-0be596fa3b22", "DetectTime": "2023-10-30T14:12:20.738817+02:00", "EventTime": "2023-10-30T14:12:20.738829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGh80W1eVrQEp3rDi3"]} -{"Format": "IDEA0", "ID": "a41584e4-6dc2-4cce-a1f4-1c909a0643c4", "DetectTime": "2023-10-30T14:12:20.756577+02:00", "EventTime": "2023-10-30T14:12:20.756593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CuErzK1zTB4cLuWuQi"]} -{"Format": "IDEA0", "ID": "edb145c9-bde7-4f2f-b9be-f6d466d196a2", "DetectTime": "2023-10-30T14:12:20.776306+02:00", "EventTime": "2023-10-30T14:12:20.776321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CtF5gd1ehuTMUFcjUa"]} -{"Format": "IDEA0", "ID": "2fe5bcf7-e5f0-4a32-a51b-aec25599e56d", "DetectTime": "2023-10-30T14:12:20.795337+02:00", "EventTime": "2023-10-30T14:12:20.795351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CAGAK32UrANAV33tlh"]} -{"Format": "IDEA0", "ID": "c0841d5a-c4a7-4e3a-baa5-c841f10c7853", "DetectTime": "2023-10-30T14:12:20.814605+02:00", "EventTime": "2023-10-30T14:12:20.814618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CaT5xqh6gLcqXL4nh"]} -{"Format": "IDEA0", "ID": "0f209a1f-a3a1-41df-a7f7-1705cdd3309e", "DetectTime": "2023-10-30T14:12:20.829745+02:00", "EventTime": "2023-10-30T14:12:20.829757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C5nQO14htfhezo9Lef"]} -{"Format": "IDEA0", "ID": "a407a02c-a54e-49a8-9b9e-9e7b329cc27c", "DetectTime": "2023-10-30T14:12:20.843604+02:00", "EventTime": "2023-10-30T14:12:20.843614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CjAFps28CsDt7SgyWa"]} -{"Format": "IDEA0", "ID": "5694b468-da88-47b8-b508-4dcde008901a", "DetectTime": "2023-10-30T14:12:20.857885+02:00", "EventTime": "2023-10-30T14:12:20.857895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CQOuY21ASCzxnniqge"]} -{"Format": "IDEA0", "ID": "dad7f21f-5337-4ca4-b065-3f642407c258", "DetectTime": "2023-10-30T14:12:20.874463+02:00", "EventTime": "2023-10-30T14:12:20.874479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CxI29L35clvCmMKF77"]} -{"Format": "IDEA0", "ID": "5278a852-1802-41f7-b07e-5752772f912b", "DetectTime": "2023-10-30T14:12:20.893900+02:00", "EventTime": "2023-10-30T14:12:20.893916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CPDV0XOCUk2OhL8w5"]} -{"Format": "IDEA0", "ID": "0425a174-1eda-436d-8e7c-ac604269dea7", "DetectTime": "2023-10-30T14:12:20.911724+02:00", "EventTime": "2023-10-30T14:12:20.911738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CSuouO2hXlAboEAyH8"]} -{"Format": "IDEA0", "ID": "67582b2e-bbfc-4192-afa2-4399405473b8", "DetectTime": "2023-10-30T14:12:20.927816+02:00", "EventTime": "2023-10-30T14:12:20.927827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C3BbJW1y4qz9DPcDza"]} -{"Format": "IDEA0", "ID": "89b2b9ca-bfd8-492a-aac0-44226b523336", "DetectTime": "2023-10-30T14:12:20.943251+02:00", "EventTime": "2023-10-30T14:12:20.943267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C6oxAx3nzasSgZBoL8"]} -{"Format": "IDEA0", "ID": "8cbe41c9-1fd5-4e4d-ae7d-bb4df4285b0a", "DetectTime": "2023-10-30T14:12:20.980240+02:00", "EventTime": "2023-10-30T14:12:20.980251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CxE8se3x53q6l16ZM5"]} -{"Format": "IDEA0", "ID": "f921e2a1-8072-415b-acf7-494c077aae69", "DetectTime": "2023-10-30T14:12:20.993869+02:00", "EventTime": "2023-10-30T14:12:20.993886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CsHV7QXLFRZgiB544"]} -{"Format": "IDEA0", "ID": "de8bbe07-6c41-4a47-aeaf-b2930d189e7e", "DetectTime": "2023-10-30T14:12:21.012538+02:00", "EventTime": "2023-10-30T14:12:21.012553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CF045B2awbqjIerNdg"]} -{"Format": "IDEA0", "ID": "7fedf76d-eada-4437-8573-9f7819dd15de", "DetectTime": "2023-10-30T14:12:21.031102+02:00", "EventTime": "2023-10-30T14:12:21.031119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CzLyUq2WVhBZqOIfmg"]} -{"Format": "IDEA0", "ID": "5ff3da95-5e4a-47fa-a2d1-c956ff37af72", "DetectTime": "2023-10-30T14:12:21.045894+02:00", "EventTime": "2023-10-30T14:12:21.045905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CC2I6ZwTpiEHm4qZh"]} -{"Format": "IDEA0", "ID": "4cb7bc7c-f41f-45f0-8b7a-05c283d0b707", "DetectTime": "2023-10-30T14:12:21.064360+02:00", "EventTime": "2023-10-30T14:12:21.064376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CvtMA94FPH4EKet9Ag"]} -{"Format": "IDEA0", "ID": "b8dc0e90-13af-4c74-bc91-2e9445e824ab", "DetectTime": "2023-10-30T14:12:21.081885+02:00", "EventTime": "2023-10-30T14:12:21.081899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["ClfuCLf9rc0Zr5Is7"]} -{"Format": "IDEA0", "ID": "dac4b4c0-cca7-45e8-90cf-0070b790925a", "DetectTime": "2023-10-30T14:12:21.100319+02:00", "EventTime": "2023-10-30T14:12:21.100329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CxBrEBodAiacw5NV9"]} -{"Format": "IDEA0", "ID": "fc64cbdf-97ec-4e10-bd17-10df1f232ea7", "DetectTime": "2023-10-30T14:12:21.115503+02:00", "EventTime": "2023-10-30T14:12:21.115520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CvOSzZ3IvcGMB4cAcl"]} -{"Format": "IDEA0", "ID": "d3de7dd8-624d-4615-9443-b5aeeb757c29", "DetectTime": "2023-10-30T14:12:21.132867+02:00", "EventTime": "2023-10-30T14:12:21.132884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CZKWJ44cdJ3ZmBZ8w5"]} -{"Format": "IDEA0", "ID": "7ef858a8-f3f8-455c-b512-b4f38b6cfafd", "DetectTime": "2023-10-30T14:12:21.145740+02:00", "EventTime": "2023-10-30T14:12:21.145757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cf7P9T2we0fAU4AG9j"]} -{"Format": "IDEA0", "ID": "087591cb-c92c-4d43-ba53-5c707271cec2", "DetectTime": "2023-10-30T14:12:21.161101+02:00", "EventTime": "2023-10-30T14:12:21.161116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CPc0iP26VjE8hLHDh"]} -{"Format": "IDEA0", "ID": "dc6651ed-39c1-4116-85f7-547fedce1b1b", "DetectTime": "2023-10-30T14:12:21.178200+02:00", "EventTime": "2023-10-30T14:12:21.178217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CBYsYxbhPytQkzLul"]} -{"Format": "IDEA0", "ID": "4538e345-2702-466b-b2a1-f6d07cbca0b3", "DetectTime": "2023-10-30T14:12:21.194881+02:00", "EventTime": "2023-10-30T14:12:21.194893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["ChcY2e2k4yH9Q93AU"]} -{"Format": "IDEA0", "ID": "6eb05aeb-0558-483a-85d3-f26482bb0eea", "DetectTime": "2023-10-30T14:12:21.211832+02:00", "EventTime": "2023-10-30T14:12:21.211843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CAZdmo1ZfN3mukIaa4"]} -{"Format": "IDEA0", "ID": "e2e7d28c-3dea-4695-8822-b3824b71ddfc", "DetectTime": "2023-10-30T14:12:21.229168+02:00", "EventTime": "2023-10-30T14:12:21.229184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CqWw4W3muhxBS4twYb"]} -{"Format": "IDEA0", "ID": "bba912aa-955a-4579-8225-d9ad308a02d1", "DetectTime": "2023-10-30T14:12:21.247632+02:00", "EventTime": "2023-10-30T14:12:21.247648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cj4d3r4XUTwewxnbOb"]} -{"Format": "IDEA0", "ID": "0fe8c586-5365-4fe0-80ec-66432e50c8f4", "DetectTime": "2023-10-30T14:12:21.339621+02:00", "EventTime": "2023-10-30T14:12:21.339639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Compco4mlpScVngEFe"]} -{"Format": "IDEA0", "ID": "990832c5-cf5c-49c0-8686-a4df25e7e3f0", "DetectTime": "2023-10-30T14:12:21.360822+02:00", "EventTime": "2023-10-30T14:12:21.360839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNRcvY13hRyod5yO5"]} -{"Format": "IDEA0", "ID": "a5a05e9a-ef58-4b88-9aa3-e00992412cc2", "DetectTime": "2023-10-30T14:12:21.378617+02:00", "EventTime": "2023-10-30T14:12:21.378637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cpckyt3r7VXGaPTvul"]} -{"Format": "IDEA0", "ID": "dbff50c4-bfc2-4157-9f94-398ec3a1b83d", "DetectTime": "2023-10-30T14:12:21.392691+02:00", "EventTime": "2023-10-30T14:12:21.392702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CWutUg09yY3Gga1X"]} -{"Format": "IDEA0", "ID": "00b99661-c462-4b5a-b193-33aaa4f2f5db", "DetectTime": "2023-10-30T14:12:21.411603+02:00", "EventTime": "2023-10-30T14:12:21.411619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C6lIHm1HhxdbBQqu4"]} -{"Format": "IDEA0", "ID": "a9bf01b0-cc87-4652-bddb-c9cedd7955be", "DetectTime": "2023-10-30T14:12:21.430122+02:00", "EventTime": "2023-10-30T14:12:21.430138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C70C902Fw3QthX9Oi4"]} -{"Format": "IDEA0", "ID": "f09fe35c-ea2f-4137-8130-b1868e9e8129", "DetectTime": "2023-10-30T14:12:21.449004+02:00", "EventTime": "2023-10-30T14:12:21.449019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CPkBCA4PV8ln73fvCc"]} -{"Format": "IDEA0", "ID": "c9150871-9337-4e94-85ac-f3af562c43a3", "DetectTime": "2023-10-30T14:12:21.467285+02:00", "EventTime": "2023-10-30T14:12:21.467301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ChNICX2xiRFKr3awRg"]} -{"Format": "IDEA0", "ID": "198526e6-6c56-4a1a-838a-9c1cd44c8335", "DetectTime": "2023-10-30T14:12:21.486472+02:00", "EventTime": "2023-10-30T14:12:21.486488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CAFIJB30Rli1xj4Fd"]} -{"Format": "Json", "ID": "198526e6-6c56-4a1a-838a-9c1cd44c8335", "DetectTime": "2023-10-30T14:12:21.486472+02:00", "EventTime": "2023-10-30T14:12:21.486488+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:18:55.775789+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:21.571295)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ecabcbe-ce83-41e2-a5ed-feaaa73553a9", "DetectTime": "2023-10-30T14:12:21.575457+02:00", "EventTime": "2023-10-30T14:12:21.575467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CukppvU7xF9AY1663"]} -{"Format": "IDEA0", "ID": "8aee0eb7-dd3b-4ff8-82b4-e45030da9185", "DetectTime": "2023-10-30T14:12:21.592783+02:00", "EventTime": "2023-10-30T14:12:21.592799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Co9avvJKkALrgRdYf"]} -{"Format": "IDEA0", "ID": "6e5d266e-e39b-4b94-9aea-dd0230b0cf32", "DetectTime": "2023-10-30T14:12:21.611765+02:00", "EventTime": "2023-10-30T14:12:21.611783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXhjpl1EAbitR5ttgk"]} -{"Format": "IDEA0", "ID": "f3988c29-8459-40a3-8719-9efcb9ef05c1", "DetectTime": "2023-10-30T14:12:21.629547+02:00", "EventTime": "2023-10-30T14:12:21.629563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CQin5w4KbpI7qi7ZTj"]} -{"Format": "IDEA0", "ID": "22e2a755-3fcf-4fe1-9a65-0a3dddad489d", "DetectTime": "2023-10-30T14:12:21.650345+02:00", "EventTime": "2023-10-30T14:12:21.650361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CNq1Hr4TGopVyhqUD1"]} -{"Format": "IDEA0", "ID": "7e10e3a0-65a0-4e2a-89fd-450d52cf70c4", "DetectTime": "2023-10-30T14:12:21.670243+02:00", "EventTime": "2023-10-30T14:12:21.670259+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"], "Hostname": ["177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 177.68.90.31 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 177-68-90-31.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CjsW7x4f6a0bOyXni4"]} -{"Format": "IDEA0", "ID": "04cbe373-cf80-47ed-89d2-a4bd16effaf7", "DetectTime": "2023-10-30T14:12:21.693911+02:00", "EventTime": "2023-10-30T14:12:21.693928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CaQa9mnatKVVj8Iy2"]} -{"Format": "IDEA0", "ID": "5a39aa60-7fbb-421c-896c-29aad67d590c", "DetectTime": "2023-10-30T14:12:21.709564+02:00", "EventTime": "2023-10-30T14:12:21.709578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CKdcqd10q5IYy9KfVd"]} -{"Format": "IDEA0", "ID": "3482a814-bacf-4d2d-a0f1-d5e137384e95", "DetectTime": "2023-10-30T14:12:21.728820+02:00", "EventTime": "2023-10-30T14:12:21.728836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cjgv7b38IYPIWOZhS5"]} -{"Format": "IDEA0", "ID": "584b56c2-87c8-415b-94cb-bbe66d6d7287", "DetectTime": "2023-10-30T14:12:21.748800+02:00", "EventTime": "2023-10-30T14:12:21.748816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C0gdlt4zOh1xGt5BZd"]} -{"Format": "IDEA0", "ID": "c9c2ad0e-f737-4cea-b012-5b2af7c4d61b", "DetectTime": "2023-10-30T14:12:21.769422+02:00", "EventTime": "2023-10-30T14:12:21.769440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CHzjdA1JIo9Eg5kxUi"]} -{"Format": "IDEA0", "ID": "b3c216b2-e945-41bf-9408-a14da3fe443a", "DetectTime": "2023-10-30T14:12:21.786025+02:00", "EventTime": "2023-10-30T14:12:21.786037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CBoGRX1TlsWBC1hWfi"]} -{"Format": "IDEA0", "ID": "1cc28d0d-2df9-4572-9df5-1e8a577f1be1", "DetectTime": "2023-10-30T14:12:21.800844+02:00", "EventTime": "2023-10-30T14:12:21.800855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CqpB7QPgx2salYHZj"]} -{"Format": "IDEA0", "ID": "6f1f4562-6867-4585-93fa-9b780dc2db8f", "DetectTime": "2023-10-30T14:12:21.816668+02:00", "EventTime": "2023-10-30T14:12:21.816678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CIdghTvwvgFgQGVWa"]} -{"Format": "IDEA0", "ID": "ef332487-c76a-447e-a8f8-470c1f60320d", "DetectTime": "2023-10-30T14:12:21.834106+02:00", "EventTime": "2023-10-30T14:12:21.834117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CHXPdD3jpVuzxTvwpf"]} -{"Format": "IDEA0", "ID": "99e813fc-9d79-40e8-a84f-c4e0c89b81be", "DetectTime": "2023-10-30T14:12:21.851604+02:00", "EventTime": "2023-10-30T14:12:21.851619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CFRARNzhIbNULZDU7"]} -{"Format": "IDEA0", "ID": "82601e25-e25b-4ffe-8bb7-9e2f407d1a42", "DetectTime": "2023-10-30T14:12:21.865277+02:00", "EventTime": "2023-10-30T14:12:21.865290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Czgl8duvyinhFjXo7"]} -{"Format": "IDEA0", "ID": "6867ac8d-c486-418c-a37f-3736476ef730", "DetectTime": "2023-10-30T14:12:21.882934+02:00", "EventTime": "2023-10-30T14:12:21.882951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C3PNn24IbGqNM5679f"]} -{"Format": "IDEA0", "ID": "5041a623-f25d-4cf8-8d95-a26bd09fc30d", "DetectTime": "2023-10-30T14:12:21.901208+02:00", "EventTime": "2023-10-30T14:12:21.901233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CyjTrL8JfdHrbzVM4"]} -{"Format": "IDEA0", "ID": "8c09183f-7c89-43d4-9e5e-ad10b600a003", "DetectTime": "2023-10-30T14:12:21.920381+02:00", "EventTime": "2023-10-30T14:12:21.920400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cw8GLi4jomI47xP5P8"]} -{"Format": "IDEA0", "ID": "5964770e-2903-42b9-9054-4d189e953be2", "DetectTime": "2023-10-30T14:12:21.944187+02:00", "EventTime": "2023-10-30T14:12:21.944203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["Cxog1h1roVRyevvXm6"]} -{"Format": "IDEA0", "ID": "9219ec30-fbcf-422d-ac0f-02488de4a8cb", "DetectTime": "2023-10-30T14:12:21.964827+02:00", "EventTime": "2023-10-30T14:12:21.964844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CKX4W13iOykBlzHVm1"]} -{"Format": "IDEA0", "ID": "da1f4ded-f1c3-4627-a79b-3774f4f27ea4", "DetectTime": "2023-10-30T14:12:21.984180+02:00", "EventTime": "2023-10-30T14:12:21.984196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C0ik5G12ukXdJgWr7i"]} -{"Format": "IDEA0", "ID": "817a42af-0895-4b0b-90e6-f892f20a621a", "DetectTime": "2023-10-30T14:12:22.002630+02:00", "EventTime": "2023-10-30T14:12:22.002643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CYYmDm1k1JQL5IN4M5"]} -{"Format": "IDEA0", "ID": "ab0e7576-a8fb-4d9e-b82e-c8e18a10f759", "DetectTime": "2023-10-30T14:12:22.022519+02:00", "EventTime": "2023-10-30T14:12:22.022534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7EuMN1iZMUhCkuol9"]} -{"Format": "IDEA0", "ID": "e183d084-53a3-4319-a3b8-7ad60242d6a7", "DetectTime": "2023-10-30T14:12:22.061366+02:00", "EventTime": "2023-10-30T14:12:22.061378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C3xTUS1yUbAtCHdTS4"]} -{"Format": "IDEA0", "ID": "9249aa78-fa36-4412-883c-b1229a6d738a", "DetectTime": "2023-10-30T14:12:22.080679+02:00", "EventTime": "2023-10-30T14:12:22.080694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CPEFLC3hLUaA35pp23"]} -{"Format": "IDEA0", "ID": "8e8a3377-861a-466c-bba9-0287ee16c063", "DetectTime": "2023-10-30T14:12:22.097893+02:00", "EventTime": "2023-10-30T14:12:22.097906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C0guZv3msbnc1wSHC5"]} -{"Format": "IDEA0", "ID": "a41aca5d-96d5-4120-a177-079d9c50e2a8", "DetectTime": "2023-10-30T14:12:22.113832+02:00", "EventTime": "2023-10-30T14:12:22.113844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CyHJTg1pe3sRgqayJk"]} -{"Format": "IDEA0", "ID": "e0578214-9e2c-4fcd-a367-191a1f92a525", "DetectTime": "2023-10-30T14:12:22.130837+02:00", "EventTime": "2023-10-30T14:12:22.130849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CEpqc43kwS4kKijKYk"]} -{"Format": "IDEA0", "ID": "bc307d06-2cb8-4256-bca3-fa5a83eae8d7", "DetectTime": "2023-10-30T14:12:22.152401+02:00", "EventTime": "2023-10-30T14:12:22.152417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CosP1T1FAg3h6dPrq1"]} -{"Format": "IDEA0", "ID": "dd339e07-7189-40cc-b410-0135ceabee7f", "DetectTime": "2023-10-30T14:12:22.171845+02:00", "EventTime": "2023-10-30T14:12:22.171864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CASSG728cXrgN7J1jc"]} -{"Format": "IDEA0", "ID": "ac088813-f63d-4e67-8aa1-530b3e9ec9b8", "DetectTime": "2023-10-30T14:12:22.189659+02:00", "EventTime": "2023-10-30T14:12:22.189670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C0YS6f41opjcoj5td7"]} -{"Format": "IDEA0", "ID": "38ae3668-c387-418d-b97d-6b0287543329", "DetectTime": "2023-10-30T14:12:22.211424+02:00", "EventTime": "2023-10-30T14:12:22.211441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CcHqM01vUhJjLyEpVg"]} -{"Format": "IDEA0", "ID": "b404f808-4626-4aff-a8f6-ddd82ad06c31", "DetectTime": "2023-10-30T14:12:22.229613+02:00", "EventTime": "2023-10-30T14:12:22.229624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCYQbH3Mw3fwsflBgd"]} -{"Format": "IDEA0", "ID": "8c918d0b-5948-405e-b947-90a0afdeb119", "DetectTime": "2023-10-30T14:12:22.249709+02:00", "EventTime": "2023-10-30T14:12:22.249725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CIz2xVLHdpQ5Gvcb"]} -{"Format": "IDEA0", "ID": "904f6a99-80b6-4dd5-86c9-e9d82a9caaa5", "DetectTime": "2023-10-30T14:12:22.265702+02:00", "EventTime": "2023-10-30T14:12:22.265718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CRg3Sd22EUYHBKItkk"]} -{"Format": "IDEA0", "ID": "2256f291-6fba-4e19-8d74-7f0b5d4e7e4b", "DetectTime": "2023-10-30T14:12:22.286805+02:00", "EventTime": "2023-10-30T14:12:22.286821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C4RAOT2AZJ5AW691oi"]} -{"Format": "IDEA0", "ID": "c6e57dd5-a794-408d-88bc-98b49896d48b", "DetectTime": "2023-10-30T14:12:22.307220+02:00", "EventTime": "2023-10-30T14:12:22.307232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CDi5d22HUoKxjkz63c"]} -{"Format": "IDEA0", "ID": "f1e24fb0-ff77-4f74-b191-c6996bd8365d", "DetectTime": "2023-10-30T14:12:22.324596+02:00", "EventTime": "2023-10-30T14:12:22.324608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CsMUNW2quWtoK3b4T8"]} -{"Format": "IDEA0", "ID": "fbfaaee5-eb2d-49a8-a864-a19d08caa428", "DetectTime": "2023-10-30T14:12:22.343154+02:00", "EventTime": "2023-10-30T14:12:22.343170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CAe4RQ3J4nmmJ5ZIq"]} -{"Format": "IDEA0", "ID": "817ddf41-2df3-4bdb-bd45-4dcff6e50179", "DetectTime": "2023-10-30T14:12:22.360714+02:00", "EventTime": "2023-10-30T14:12:22.360726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CHO5Qp2F8lLH8fpSGf"]} -{"Format": "IDEA0", "ID": "865bcdb9-d4f4-4822-91f3-c96645a8a54f", "DetectTime": "2023-10-30T14:12:22.377432+02:00", "EventTime": "2023-10-30T14:12:22.377444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CQUqqS3J8fQ5dpixob"]} -{"Format": "IDEA0", "ID": "de7f5eda-4ff9-4d0e-a311-cc9721a7f4e4", "DetectTime": "2023-10-30T14:12:22.397543+02:00", "EventTime": "2023-10-30T14:12:22.397558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CrzHje4LUF41TqarPd"]} -{"Format": "IDEA0", "ID": "676920b6-5c97-44dc-95d0-803598c1817f", "DetectTime": "2023-10-30T14:12:22.432987+02:00", "EventTime": "2023-10-30T14:12:22.433003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CzbGw02GuPlaQFMO"]} -{"Format": "IDEA0", "ID": "4bc5eb47-661b-46f9-b052-92b56111cb67", "DetectTime": "2023-10-30T14:12:22.452810+02:00", "EventTime": "2023-10-30T14:12:22.452823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CuPSXS3Hlho4OqLqDa"]} -{"Format": "IDEA0", "ID": "7b83a95c-d9cf-4e66-b059-6066c99178e0", "DetectTime": "2023-10-30T14:12:22.475795+02:00", "EventTime": "2023-10-30T14:12:22.475815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CShadt16q2JghhExvc"]} -{"Format": "IDEA0", "ID": "07375190-bb14-43da-b1c9-134f1d5ba542", "DetectTime": "2023-10-30T14:12:22.497721+02:00", "EventTime": "2023-10-30T14:12:22.497735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CxwGem31026XpJBmb5"]} -{"Format": "IDEA0", "ID": "aecb952d-dbcc-4e4f-b3d1-f1d16d808089", "DetectTime": "2023-10-30T14:12:22.519196+02:00", "EventTime": "2023-10-30T14:12:22.519213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CwBKZvfyf46lk0VYd"]} -{"Format": "IDEA0", "ID": "acdd1704-9fd5-40c7-aa22-4fce8c511793", "DetectTime": "2023-10-30T14:12:22.537616+02:00", "EventTime": "2023-10-30T14:12:22.537630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CezHpv3p4dQHtaBWf5"]} -{"Format": "IDEA0", "ID": "73398fb0-078d-4e9f-93b4-6d774e2b894f", "DetectTime": "2023-10-30T14:12:22.557119+02:00", "EventTime": "2023-10-30T14:12:22.557135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ch9xp81MwjdlUgSJyg"]} -{"Format": "IDEA0", "ID": "0806d353-30ee-443f-b944-c2a04960073e", "DetectTime": "2023-10-30T14:12:22.579223+02:00", "EventTime": "2023-10-30T14:12:22.579242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CKyHMIHMro8pu849f"]} -{"Format": "IDEA0", "ID": "65dea98b-6378-45cc-9bd5-3ff2032c8b87", "DetectTime": "2023-10-30T14:12:22.600230+02:00", "EventTime": "2023-10-30T14:12:22.600246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CKhlmBv2dukDFTKu1"]} -{"Format": "IDEA0", "ID": "5a9ac053-060e-46b0-a0dd-97bb1755be02", "DetectTime": "2023-10-30T14:12:22.621376+02:00", "EventTime": "2023-10-30T14:12:22.621392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CrE3sA3M22QGHSzBta"]} -{"Format": "IDEA0", "ID": "1aec492d-c2df-4b0e-a1b7-2627badf420f", "DetectTime": "2023-10-30T14:12:22.644269+02:00", "EventTime": "2023-10-30T14:12:22.644285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CnpZ7A7VJgB6X1Ik"]} -{"Format": "IDEA0", "ID": "e4f503f5-8310-4961-ad61-34866c36721e", "DetectTime": "2023-10-30T14:12:22.680780+02:00", "EventTime": "2023-10-30T14:12:22.680797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CpVlDs1HNOdgEGYHyj"]} -{"Format": "IDEA0", "ID": "04822b66-5789-4f28-812d-7bda171169de", "DetectTime": "2023-10-30T14:12:22.695357+02:00", "EventTime": "2023-10-30T14:12:22.695377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkU9Qo18lNu300Sh19"]} -{"Format": "IDEA0", "ID": "00ef4a74-548c-43f7-97e4-711fbdb135d4", "DetectTime": "2023-10-30T14:12:22.715065+02:00", "EventTime": "2023-10-30T14:12:22.715081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CllQYg3ifzWR6USauc"]} -{"Format": "IDEA0", "ID": "b90e5b79-2f19-4ecc-bc9c-5d4d5ec7896a", "DetectTime": "2023-10-30T14:12:22.736636+02:00", "EventTime": "2023-10-30T14:12:22.736653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CblV8j25dAQUTtefsb"]} -{"Format": "IDEA0", "ID": "d0104304-8392-4f7b-9854-4cf536e28e6d", "DetectTime": "2023-10-30T14:12:22.754642+02:00", "EventTime": "2023-10-30T14:12:22.754652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CrgViGSP1bOAnFwGj"]} -{"Format": "IDEA0", "ID": "c31dd4d6-ecbb-4a61-a9ef-bd42daab820f", "DetectTime": "2023-10-30T14:12:22.771903+02:00", "EventTime": "2023-10-30T14:12:22.771913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CZbG3I3VUOYUiO7c66"]} -{"Format": "IDEA0", "ID": "5c507c02-8a2f-4f28-9c53-480a686bddf8", "DetectTime": "2023-10-30T14:12:22.793253+02:00", "EventTime": "2023-10-30T14:12:22.793263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cvdh6k3EVts1ux35xb"]} -{"Format": "IDEA0", "ID": "12a4eba9-040a-4936-aaaa-5345098135c0", "DetectTime": "2023-10-30T14:12:22.811668+02:00", "EventTime": "2023-10-30T14:12:22.811681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CqPqW74jsefvv4fr4e"]} -{"Format": "IDEA0", "ID": "efc24dc4-6d7d-4e06-bd75-d28c50caef32", "DetectTime": "2023-10-30T14:12:22.828523+02:00", "EventTime": "2023-10-30T14:12:22.828534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C3O5Zb6Ubjdr2oe5"]} -{"Format": "IDEA0", "ID": "b09cd7f1-db82-4ce0-8c11-60d7e2779b98", "DetectTime": "2023-10-30T14:12:22.845014+02:00", "EventTime": "2023-10-30T14:12:22.845025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CE7gKu209fOp929DOe"]} -{"Format": "IDEA0", "ID": "9758ff48-104c-450b-ac96-3cc2019dda28", "DetectTime": "2023-10-30T14:12:22.865486+02:00", "EventTime": "2023-10-30T14:12:22.865501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Crbcwm3HRT9qjnV44k"]} -{"Format": "IDEA0", "ID": "0c6d07f2-56a7-4dc0-b765-6b520ff967ec", "DetectTime": "2023-10-30T14:12:22.883183+02:00", "EventTime": "2023-10-30T14:12:22.883194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CAD5uU1y6LdkoEVipb"]} -{"Format": "IDEA0", "ID": "41f3624e-9430-43cd-8f30-6a9d96dbf231", "DetectTime": "2023-10-30T14:12:22.901233+02:00", "EventTime": "2023-10-30T14:12:22.901250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CJLboh22T1gNrRMAE7"]} -{"Format": "IDEA0", "ID": "ddfd0e9f-87fc-4d7a-831d-f172e8549cc9", "DetectTime": "2023-10-30T14:12:22.922846+02:00", "EventTime": "2023-10-30T14:12:22.922863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CUSw1F3G4iy7Ue0zF"]} -{"Format": "IDEA0", "ID": "bdfa6709-313f-4a06-8947-b132ab533e4e", "DetectTime": "2023-10-30T14:12:22.944772+02:00", "EventTime": "2023-10-30T14:12:22.944788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CkMKMv3ylt6qy6yq03"]} -{"Format": "IDEA0", "ID": "65e6175d-1dd1-4de3-9d55-c86680d5be6e", "DetectTime": "2023-10-30T14:12:22.966658+02:00", "EventTime": "2023-10-30T14:12:22.966676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cs95F62u41tvpGxlrg"]} -{"Format": "IDEA0", "ID": "bba735cc-648e-4eba-b02c-a785d938d765", "DetectTime": "2023-10-30T14:12:22.987756+02:00", "EventTime": "2023-10-30T14:12:22.987772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CdOPH11byAFbOIj3O6"]} -{"Format": "IDEA0", "ID": "c9241ec8-d33f-4abf-a98a-4cd688c6a4b8", "DetectTime": "2023-10-30T14:12:23.008000+02:00", "EventTime": "2023-10-30T14:12:23.008015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cw9F4Y3tDSLBYrbgm"]} -{"Format": "IDEA0", "ID": "47a4e740-c8b5-4b5d-9560-df5307755d99", "DetectTime": "2023-10-30T14:12:23.022852+02:00", "EventTime": "2023-10-30T14:12:23.022868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0r7tbHVsLqllitoi"]} -{"Format": "IDEA0", "ID": "f1b49135-c142-4a23-ad17-413e65e626d9", "DetectTime": "2023-10-30T14:12:23.042551+02:00", "EventTime": "2023-10-30T14:12:23.042567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C6Ice32QXKrzJWrJjj"]} -{"Format": "IDEA0", "ID": "84d5191b-6f7d-4506-9342-406d1bc1337f", "DetectTime": "2023-10-30T14:12:23.073312+02:00", "EventTime": "2023-10-30T14:12:23.073325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CkKCRF0N5plwlTYe6"]} -{"Format": "IDEA0", "ID": "4b5d74a5-27d0-4289-af9d-61ade6028c5d", "DetectTime": "2023-10-30T14:12:23.091046+02:00", "EventTime": "2023-10-30T14:12:23.091060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CFOc2v4GokLkeH4RI6"]} -{"Format": "IDEA0", "ID": "a2d7ab97-5aaf-47e0-bc02-64f4aec68742", "DetectTime": "2023-10-30T14:12:23.107469+02:00", "EventTime": "2023-10-30T14:12:23.107481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CRiC5c4KdVCMeGIlOf"]} -{"Format": "IDEA0", "ID": "015a71e4-b0dc-48fb-bee8-7685b59c71e5", "DetectTime": "2023-10-30T14:12:23.127177+02:00", "EventTime": "2023-10-30T14:12:23.127199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXTm213Hd3LiN36lff"]} -{"Format": "IDEA0", "ID": "91e4949d-3c73-4b81-b376-050778213d30", "DetectTime": "2023-10-30T14:12:23.218110+02:00", "EventTime": "2023-10-30T14:12:23.218128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CdgbFBGVH410FDM18"]} -{"Format": "IDEA0", "ID": "c001ddc2-4510-4ddc-aa01-f9cda5a4d6df", "DetectTime": "2023-10-30T14:12:23.243732+02:00", "EventTime": "2023-10-30T14:12:23.243750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CmwKPu13HWctoaqn48"]} -{"Format": "IDEA0", "ID": "d00551e9-2f3b-43bf-ba54-c3dd644aee70", "DetectTime": "2023-10-30T14:12:23.262360+02:00", "EventTime": "2023-10-30T14:12:23.262387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CEdLBk2mdr6HrZi8nh"]} -{"Format": "IDEA0", "ID": "59e9b435-095f-4926-9824-5531a1fcdde0", "DetectTime": "2023-10-30T14:12:23.282819+02:00", "EventTime": "2023-10-30T14:12:23.282838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cs1SGy4UOxHfny13Zc"]} -{"Format": "IDEA0", "ID": "2ecea860-47f4-4e1a-8c86-435e668fd19b", "DetectTime": "2023-10-30T14:12:23.302593+02:00", "EventTime": "2023-10-30T14:12:23.302605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CUXOaR1v8Y8IZwj0bf"]} -{"Format": "IDEA0", "ID": "ca845501-f6d7-41f9-a6b0-741b6b8817b5", "DetectTime": "2023-10-30T14:12:23.320423+02:00", "EventTime": "2023-10-30T14:12:23.320434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CaKhMb4xe0hhT2YQmg"]} -{"Format": "IDEA0", "ID": "c71e4f30-bfe1-4ea2-9c7b-ef8920d993a6", "DetectTime": "2023-10-30T14:12:23.338884+02:00", "EventTime": "2023-10-30T14:12:23.338896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CErOGS1OcKAqwu8mR7"]} -{"Format": "IDEA0", "ID": "a301e73f-ccac-4bbd-a054-3d2ec733893f", "DetectTime": "2023-10-30T14:12:23.356715+02:00", "EventTime": "2023-10-30T14:12:23.356730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CYlt3FiTUfcGNI4gk"]} -{"Format": "IDEA0", "ID": "c1d4ee7c-2195-440d-b95d-3c3adefb403b", "DetectTime": "2023-10-30T14:12:23.375006+02:00", "EventTime": "2023-10-30T14:12:23.375019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CbV1Xl3NMWeDzsN3Dd"]} -{"Format": "IDEA0", "ID": "01e2b7fe-db45-4e08-8a3c-cec3fa8a2275", "DetectTime": "2023-10-30T14:12:23.390401+02:00", "EventTime": "2023-10-30T14:12:23.390413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C3LwD33SIFOZNZ1TM8"]} -{"Format": "IDEA0", "ID": "438bad0a-3e35-44a1-a161-47e9ec42cbae", "DetectTime": "2023-10-30T14:12:23.418691+02:00", "EventTime": "2023-10-30T14:12:23.418703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CM47Ba41LlwCGsVd9j"]} -{"Format": "IDEA0", "ID": "cf0da7eb-3013-4c9c-8ada-f63bbdd165ea", "DetectTime": "2023-10-30T14:12:23.436585+02:00", "EventTime": "2023-10-30T14:12:23.436596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CWv08i12WIae8pwL3j"]} -{"Format": "IDEA0", "ID": "f89bfc3b-bf3b-46c8-9907-04c1da649c0c", "DetectTime": "2023-10-30T14:12:23.450686+02:00", "EventTime": "2023-10-30T14:12:23.450702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CUFFuG2JJGCJKpy0Gh"]} -{"Format": "IDEA0", "ID": "758603d7-a650-45f2-9d77-c5d50c3e6844", "DetectTime": "2023-10-30T14:12:23.465862+02:00", "EventTime": "2023-10-30T14:12:23.465874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CLYvtp3cLbZpN4MD0j"]} -{"Format": "IDEA0", "ID": "fbd76241-a5ae-4bc0-96a9-4fb398e5ac2a", "DetectTime": "2023-10-30T14:12:23.484607+02:00", "EventTime": "2023-10-30T14:12:23.484620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQnQjF2RChu0xNabj3"]} -{"Format": "IDEA0", "ID": "7da3c384-f49b-4cd2-9da9-32981aa7cadb", "DetectTime": "2023-10-30T14:12:23.501563+02:00", "EventTime": "2023-10-30T14:12:23.501588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CovbYB4XZgbEUnRKsj"]} -{"Format": "IDEA0", "ID": "f9f8b09b-ebbc-4eec-a65e-1bc4eecbbd22", "DetectTime": "2023-10-30T14:12:23.519228+02:00", "EventTime": "2023-10-30T14:12:23.519246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CSvkTi1HPfTqexQ5Qa"]} -{"Format": "IDEA0", "ID": "3afeb2f1-d90e-42b9-86f4-9efec73ccbb0", "DetectTime": "2023-10-30T14:12:23.538073+02:00", "EventTime": "2023-10-30T14:12:23.538087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CXunwe34UuLEWQPmS4"]} -{"Format": "IDEA0", "ID": "b50c3119-52ed-441d-8a26-d0e7add5b5ce", "DetectTime": "2023-10-30T14:12:23.553675+02:00", "EventTime": "2023-10-30T14:12:23.553690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C1Wjnq3YiQX8oAmUtl"]} -{"Format": "IDEA0", "ID": "d238fd6b-59c6-474c-a18c-85513b3f4a60", "DetectTime": "2023-10-30T14:12:23.569296+02:00", "EventTime": "2023-10-30T14:12:23.569307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CkMMjq1ALZ5l9nS1ol"]} -{"Format": "IDEA0", "ID": "a7e38978-6869-47a1-88b2-e20b910c0099", "DetectTime": "2023-10-30T14:12:23.584646+02:00", "EventTime": "2023-10-30T14:12:23.584658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CJlzdv1qMHkPIkxgC6"]} -{"Format": "IDEA0", "ID": "b8e7ab77-428a-41dd-b9ca-4f0887e21923", "DetectTime": "2023-10-30T14:12:23.602168+02:00", "EventTime": "2023-10-30T14:12:23.602182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CIuSIX3DKf5WTS3Xz7"]} -{"Format": "IDEA0", "ID": "c893059f-e054-4594-9263-25275f42b58c", "DetectTime": "2023-10-30T14:12:23.619315+02:00", "EventTime": "2023-10-30T14:12:23.619334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C8jk7Mi78R2pyvCYb"]} -{"Format": "IDEA0", "ID": "9bb5c01f-1c34-4576-ab9f-cf750a37c818", "DetectTime": "2023-10-30T14:12:23.636077+02:00", "EventTime": "2023-10-30T14:12:23.636098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Crx5PJ3YToueJ0bGtl"]} -{"Format": "IDEA0", "ID": "65e10490-af0c-4e00-aac1-9cd6226bd13c", "DetectTime": "2023-10-30T14:12:23.654295+02:00", "EventTime": "2023-10-30T14:12:23.654307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C5SZu63qledb2tUCcc"]} -{"Format": "IDEA0", "ID": "8c4c4089-4af0-4d57-aa3a-43bdcf0ea27d", "DetectTime": "2023-10-30T14:12:23.673571+02:00", "EventTime": "2023-10-30T14:12:23.673584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CF9qtQY5Kdi4byDF"]} -{"Format": "IDEA0", "ID": "d8e35d41-7e28-4b0c-a8d4-9ca60004da2e", "DetectTime": "2023-10-30T14:12:23.691909+02:00", "EventTime": "2023-10-30T14:12:23.691926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C7oePe8VmUCBNlXTb"]} -{"Format": "IDEA0", "ID": "1556e772-8732-4036-ae64-5f6d9a85f718", "DetectTime": "2023-10-30T14:12:23.710507+02:00", "EventTime": "2023-10-30T14:12:23.710526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CG7EBW2CWZ4UfuSP78"]} -{"Format": "IDEA0", "ID": "c3ad3a4e-4dd5-4a55-aaea-e5ebfabcbf1d", "DetectTime": "2023-10-30T14:12:23.729294+02:00", "EventTime": "2023-10-30T14:12:23.729311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C1Isfi2mRteSoDNeeh"]} -{"Format": "IDEA0", "ID": "0d080a5e-937b-419e-a1f8-c2f3983d8590", "DetectTime": "2023-10-30T14:12:23.750001+02:00", "EventTime": "2023-10-30T14:12:23.750016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C5UM2k4Q1si3CK0lQa"]} -{"Format": "IDEA0", "ID": "7be90392-91e1-4008-b6d9-8c21345eb700", "DetectTime": "2023-10-30T14:12:23.770860+02:00", "EventTime": "2023-10-30T14:12:23.770874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C7Tl784DSccEmHYyfe"]} -{"Format": "IDEA0", "ID": "4d5cd9bc-2053-4bb4-afb3-1b21db001a14", "DetectTime": "2023-10-30T14:12:23.788014+02:00", "EventTime": "2023-10-30T14:12:23.788031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CjgMUr2n7N8ljqo8Ac"]} -{"Format": "IDEA0", "ID": "fc53d8fc-5205-4979-ada7-1a9bbf771d73", "DetectTime": "2023-10-30T14:12:23.804689+02:00", "EventTime": "2023-10-30T14:12:23.804706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CrOcBu3WmXoUbwojo1"]} -{"Format": "IDEA0", "ID": "109c197a-e934-47ab-90db-2bc1a4502200", "DetectTime": "2023-10-30T14:12:23.824646+02:00", "EventTime": "2023-10-30T14:12:23.824661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cfjv9t3pDR8ENE11Qd"]} -{"Format": "IDEA0", "ID": "03f918a3-5ff1-4e6e-a888-f14f6f1e8915", "DetectTime": "2023-10-30T14:12:23.845667+02:00", "EventTime": "2023-10-30T14:12:23.845686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Ce4cBq1VpGPErWemd4"]} -{"Format": "IDEA0", "ID": "d30597b4-4980-4235-8299-8d609d7a3f42", "DetectTime": "2023-10-30T14:12:23.866649+02:00", "EventTime": "2023-10-30T14:12:23.866664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CS2sDZ1TAy3eLeShfk"]} -{"Format": "IDEA0", "ID": "e295dbdf-0293-4f5d-857c-da8810fda112", "DetectTime": "2023-10-30T14:12:23.883820+02:00", "EventTime": "2023-10-30T14:12:23.883844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CgbfV94djE0m4w9L13"]} -{"Format": "IDEA0", "ID": "e5c1b9a3-1f6e-495b-96e5-41013bd72def", "DetectTime": "2023-10-30T14:12:23.906616+02:00", "EventTime": "2023-10-30T14:12:23.906632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C5hsSO3044KboSGNFg"]} -{"Format": "IDEA0", "ID": "90e09fed-70c2-41ce-85fd-4cdf2c92c5dc", "DetectTime": "2023-10-30T14:12:23.943010+02:00", "EventTime": "2023-10-30T14:12:23.943027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CTosuo2YMApPdj4Y56"]} -{"Format": "IDEA0", "ID": "a6443b66-7e4d-4639-9b7c-6f151e88b4bc", "DetectTime": "2023-10-30T14:12:23.961446+02:00", "EventTime": "2023-10-30T14:12:23.961458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CKXxBvSNFn76wPwF5"]} -{"Format": "IDEA0", "ID": "58f69be0-471d-4716-bf7c-5d5b3352dd42", "DetectTime": "2023-10-30T14:12:23.978147+02:00", "EventTime": "2023-10-30T14:12:23.978164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["ChQYh7Mr32XEiR2Ge"]} -{"Format": "IDEA0", "ID": "5f7741cb-0164-4a8f-b921-3f187ee0c7aa", "DetectTime": "2023-10-30T14:12:23.995757+02:00", "EventTime": "2023-10-30T14:12:23.995769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CySnno25Iv2Ba43Ogi"]} -{"Format": "IDEA0", "ID": "a3af0b29-4cb3-422a-a23d-6f6b89052e93", "DetectTime": "2023-10-30T14:12:24.011297+02:00", "EventTime": "2023-10-30T14:12:24.011312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CSNK48cHeC5xtPV9j"]} -{"Format": "IDEA0", "ID": "6d8e4eaa-6cef-4bcb-b65b-2a67577468ac", "DetectTime": "2023-10-30T14:12:24.030365+02:00", "EventTime": "2023-10-30T14:12:24.030382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CG18703gKNEulX63Sj"]} -{"Format": "IDEA0", "ID": "0fed2e28-6576-4620-a2f6-c7b8552f7dd2", "DetectTime": "2023-10-30T14:12:24.050847+02:00", "EventTime": "2023-10-30T14:12:24.050863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CfsZjA2aGGZpxrWUg6"]} -{"Format": "IDEA0", "ID": "4b5de46c-69cb-49a9-b439-b222767604f1", "DetectTime": "2023-10-30T14:12:24.072988+02:00", "EventTime": "2023-10-30T14:12:24.073003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CfQ2EC17fFoKIbD3ma"]} -{"Format": "IDEA0", "ID": "2158ec44-1433-477e-b556-f2c18751f44c", "DetectTime": "2023-10-30T14:12:24.092911+02:00", "EventTime": "2023-10-30T14:12:24.092931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CG3Yjk3cI4Ur6vDyC8"]} -{"Format": "IDEA0", "ID": "79863b1e-67a4-42bf-9af2-c95272890c65", "DetectTime": "2023-10-30T14:12:24.107552+02:00", "EventTime": "2023-10-30T14:12:24.107562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVTyNa2eug6GvYYkcb"]} -{"Format": "IDEA0", "ID": "68f09bad-c32f-4c6a-b733-488470af4bd8", "DetectTime": "2023-10-30T14:12:24.122353+02:00", "EventTime": "2023-10-30T14:12:24.122365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CSep5e4A4eAuJEiebj"]} -{"Format": "IDEA0", "ID": "4a49cbf0-2479-4196-a9b1-7a1db941db5a", "DetectTime": "2023-10-30T14:12:24.139607+02:00", "EventTime": "2023-10-30T14:12:24.139620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CI1PkB1jzsdqzTih9"]} -{"Format": "IDEA0", "ID": "f284c486-66a1-40fd-afa3-5d931191f985", "DetectTime": "2023-10-30T14:12:24.177330+02:00", "EventTime": "2023-10-30T14:12:24.177345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CV77MX3MnbyVUK6JGb"]} -{"Format": "IDEA0", "ID": "ced4ba3d-8a9d-4871-afc3-dfb4ff46d39d", "DetectTime": "2023-10-30T14:12:24.199195+02:00", "EventTime": "2023-10-30T14:12:24.199211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CejVEn1HLmWBve4Sn"]} -{"Format": "IDEA0", "ID": "daa85677-5880-4fc4-a62b-89246288c269", "DetectTime": "2023-10-30T14:12:24.219138+02:00", "EventTime": "2023-10-30T14:12:24.219152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CiUOtc4EAmvSvo5RIh"]} -{"Format": "IDEA0", "ID": "89228d06-293f-4edb-a0f6-098d6328d45b", "DetectTime": "2023-10-30T14:12:24.239620+02:00", "EventTime": "2023-10-30T14:12:24.239635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CtyFNq8AdgNl2ApI8"]} -{"Format": "IDEA0", "ID": "9b204e56-5670-448a-a61b-4ef8eb1ce41c", "DetectTime": "2023-10-30T14:12:24.256661+02:00", "EventTime": "2023-10-30T14:12:24.256671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["ChkJRi3KhWgaXUuwU8"]} -{"Format": "IDEA0", "ID": "c181cc4f-0e48-473e-98ff-6c8c1721b3ea", "DetectTime": "2023-10-30T14:12:24.277980+02:00", "EventTime": "2023-10-30T14:12:24.277999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CIH4uj29sjhh1BCNO6"]} -{"Format": "IDEA0", "ID": "4f17d3e5-5b19-4c04-a849-172ac191fbbc", "DetectTime": "2023-10-30T14:12:24.297142+02:00", "EventTime": "2023-10-30T14:12:24.297153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CjbESC2shFFSc2FhC9"]} -{"Format": "IDEA0", "ID": "2d2a23dd-a861-4aa7-a682-bb8221fc036a", "DetectTime": "2023-10-30T14:12:24.314233+02:00", "EventTime": "2023-10-30T14:12:24.314245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBK0Yn3FUlypDkzadh"]} -{"Format": "IDEA0", "ID": "a9661afc-4f9a-4885-a004-a97d6423e33a", "DetectTime": "2023-10-30T14:12:24.333465+02:00", "EventTime": "2023-10-30T14:12:24.333481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ChCr19393Ac8x3oMa"]} -{"Format": "IDEA0", "ID": "337d2065-224d-4605-93a7-6de2b3d7462e", "DetectTime": "2023-10-30T14:12:24.354377+02:00", "EventTime": "2023-10-30T14:12:24.354393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CU5AK31KazbgTuKfbh"]} -{"Format": "IDEA0", "ID": "f11daf24-cc7c-4758-8571-ac3379d7b69c", "DetectTime": "2023-10-30T14:12:24.369566+02:00", "EventTime": "2023-10-30T14:12:24.369577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C1vveT3Xj8VYvF9vml"]} -{"Format": "IDEA0", "ID": "22c26176-dd1e-4eea-a4b6-33e26d45c604", "DetectTime": "2023-10-30T14:12:24.387693+02:00", "EventTime": "2023-10-30T14:12:24.387709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CddXjH2OUiKXQbXZO5"]} -{"Format": "IDEA0", "ID": "9d1b2c44-d5cf-4743-b31f-731bf4937e6c", "DetectTime": "2023-10-30T14:12:24.408975+02:00", "EventTime": "2023-10-30T14:12:24.408991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CcJqYH15O9nviAyOXd"]} -{"Format": "IDEA0", "ID": "3c9f4bfe-c723-465c-8656-61e0ecb86d56", "DetectTime": "2023-10-30T14:12:24.424994+02:00", "EventTime": "2023-10-30T14:12:24.425004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CDJzKV164Q8o0cLB33"]} -{"Format": "IDEA0", "ID": "e368c5f8-e010-4fa9-b400-98a5b83d3333", "DetectTime": "2023-10-30T14:12:24.443336+02:00", "EventTime": "2023-10-30T14:12:24.443347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CmIcRt4FWIAVtvXOqe"]} -{"Format": "IDEA0", "ID": "7e2867a7-d460-42f3-ae4c-2a678b8b4df5", "DetectTime": "2023-10-30T14:12:24.464472+02:00", "EventTime": "2023-10-30T14:12:24.464484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CKIAoS3dXqSdaWfzS"]} -{"Format": "IDEA0", "ID": "63b3027e-f265-4ef3-a0a6-bb05d6028c5b", "DetectTime": "2023-10-30T14:12:24.487051+02:00", "EventTime": "2023-10-30T14:12:24.487068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CTAPyQ1O8j3l5d4ZLd"]} -{"Format": "IDEA0", "ID": "ad4c4c7e-dff1-4321-acf5-a59580d26c03", "DetectTime": "2023-10-30T14:12:24.504834+02:00", "EventTime": "2023-10-30T14:12:24.504850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C2PZtq4FnmelBxXQn7"]} -{"Format": "IDEA0", "ID": "7bc7f54f-3fe0-4337-8554-eee549808ed6", "DetectTime": "2023-10-30T14:12:24.526474+02:00", "EventTime": "2023-10-30T14:12:24.526490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C7xvow1AkMoz7rFEU4"]} -{"Format": "IDEA0", "ID": "2912b4f0-68e3-4173-98a3-a28251d741e9", "DetectTime": "2023-10-30T14:12:24.547678+02:00", "EventTime": "2023-10-30T14:12:24.547694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C1rgEt3slUtdPEqV06"]} -{"Format": "IDEA0", "ID": "510f9846-dd1f-45a0-8316-806fb543cf66", "DetectTime": "2023-10-30T14:12:24.568559+02:00", "EventTime": "2023-10-30T14:12:24.568575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CUZLGB4IWiVE2rAHJ3"]} -{"Format": "IDEA0", "ID": "c5ff7fc9-679c-4d2c-9467-8fd17b7ae932", "DetectTime": "2023-10-30T14:12:24.586066+02:00", "EventTime": "2023-10-30T14:12:24.586078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CCQsIh4ELlk9iMxPbh"]} -{"Format": "Json", "ID": "c5ff7fc9-679c-4d2c-9467-8fd17b7ae932", "DetectTime": "2023-10-30T14:12:24.586066+02:00", "EventTime": "2023-10-30T14:12:24.586078+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:18:57.699673+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:24.661290)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a43f46d9-26d6-4bd6-b153-83016e3b9f59", "DetectTime": "2023-10-30T14:12:24.666067+02:00", "EventTime": "2023-10-30T14:12:24.666079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C8CvoY3NlHDRnZ48ui"]} -{"Format": "IDEA0", "ID": "7c488a1e-10f1-49c7-bc50-b985f91d6967", "DetectTime": "2023-10-30T14:12:24.683518+02:00", "EventTime": "2023-10-30T14:12:24.683534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CrY5In28jV1eP3Fbz1"]} -{"Format": "IDEA0", "ID": "1ac32d92-0b8f-4556-8ee9-37d0dfcd4be8", "DetectTime": "2023-10-30T14:12:24.702340+02:00", "EventTime": "2023-10-30T14:12:24.702356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CCYxE14vKAad8xmJL6"]} -{"Format": "IDEA0", "ID": "a1c7236e-b25c-432e-8e4e-17d09b1daafc", "DetectTime": "2023-10-30T14:12:24.726059+02:00", "EventTime": "2023-10-30T14:12:24.726080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cvob7X1eQNJFiCOCB2"]} -{"Format": "IDEA0", "ID": "7a26e2e1-a595-4a5e-8d23-f26cca82fc5c", "DetectTime": "2023-10-30T14:12:24.748078+02:00", "EventTime": "2023-10-30T14:12:24.748094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxrI6J1Y4d0Q43WUlb"]} -{"Format": "IDEA0", "ID": "890f9fa5-a389-41a3-a133-ec98b8155a69", "DetectTime": "2023-10-30T14:12:24.764790+02:00", "EventTime": "2023-10-30T14:12:24.764802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CLLXlMvONUzQDreq3"]} -{"Format": "IDEA0", "ID": "1fb57c2f-46b8-4ac2-b65b-b8cbaab3574b", "DetectTime": "2023-10-30T14:12:24.785094+02:00", "EventTime": "2023-10-30T14:12:24.785110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CNnKAn2bEZPnQYMeQj"]} -{"Format": "IDEA0", "ID": "2f7b0de9-86db-49ac-956b-1069ff790a05", "DetectTime": "2023-10-30T14:12:24.803130+02:00", "EventTime": "2023-10-30T14:12:24.803140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CGhhB84do4tRRoSsE9"]} -{"Format": "IDEA0", "ID": "8e2e1449-1fe1-4193-a6b6-3cec9fc9d954", "DetectTime": "2023-10-30T14:12:24.821805+02:00", "EventTime": "2023-10-30T14:12:24.821822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CTYShn3OfWueWUbfac"]} -{"Format": "IDEA0", "ID": "dda38208-ee87-4cbd-b77a-ba463f78f795", "DetectTime": "2023-10-30T14:12:24.842226+02:00", "EventTime": "2023-10-30T14:12:24.842242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CpYvmD4ql2k82GQ4N8"]} -{"Format": "IDEA0", "ID": "ab0ae6fa-f6e0-4d81-bf79-c42a8c19ba6a", "DetectTime": "2023-10-30T14:12:24.861604+02:00", "EventTime": "2023-10-30T14:12:24.861620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CueqnGNODCD7s6tW8"]} -{"Format": "IDEA0", "ID": "f3733083-0830-48be-ac35-9322a416ccf5", "DetectTime": "2023-10-30T14:12:24.877239+02:00", "EventTime": "2023-10-30T14:12:24.877250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXdNH81sDgmV69wc4i"]} -{"Format": "IDEA0", "ID": "12c97084-beba-42ee-aa15-ce2221bf8d6c", "DetectTime": "2023-10-30T14:12:24.895399+02:00", "EventTime": "2023-10-30T14:12:24.895416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CiYmfr3sVTHQdtthOk"]} -{"Format": "IDEA0", "ID": "e0255f56-b78a-42dd-ac90-c15007ef7a51", "DetectTime": "2023-10-30T14:12:24.911724+02:00", "EventTime": "2023-10-30T14:12:24.911739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CN2dGv3MvjM57i69He"]} -{"Format": "IDEA0", "ID": "31d1ae09-cd7c-421e-85ef-9c0b05cc56c1", "DetectTime": "2023-10-30T14:12:24.929305+02:00", "EventTime": "2023-10-30T14:12:24.929316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CxWOuR3S5jGndvbGFd"]} -{"Format": "IDEA0", "ID": "b3a322f2-d2cf-46c4-9874-d23662c53448", "DetectTime": "2023-10-30T14:12:24.946653+02:00", "EventTime": "2023-10-30T14:12:24.946663+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYPFMi2apWgRqpaval"]} -{"Format": "IDEA0", "ID": "1dca00fd-771c-4a98-ace0-70c9b585490f", "DetectTime": "2023-10-30T14:12:24.975597+02:00", "EventTime": "2023-10-30T14:12:24.975609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C6sdtGWuZnZjHsF47"]} -{"Format": "IDEA0", "ID": "61d4e6c7-5db4-450e-91ea-516ba55275d0", "DetectTime": "2023-10-30T14:12:24.995684+02:00", "EventTime": "2023-10-30T14:12:24.995695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CGh5xsUhTDHltnKO4"]} -{"Format": "IDEA0", "ID": "af5db056-2187-4748-81c4-8e0b53a278e5", "DetectTime": "2023-10-30T14:12:25.013946+02:00", "EventTime": "2023-10-30T14:12:25.013963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CB6x1o1z4u9KzoX1H1"]} -{"Format": "IDEA0", "ID": "e48115e3-6304-4964-9c97-c320f76b4442", "DetectTime": "2023-10-30T14:12:25.033887+02:00", "EventTime": "2023-10-30T14:12:25.033899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CZE5Q14ufuMBwIpGgc"]} -{"Format": "IDEA0", "ID": "64eb84df-2801-4417-82b4-4d4665621c4b", "DetectTime": "2023-10-30T14:12:25.054549+02:00", "EventTime": "2023-10-30T14:12:25.054561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CxR3oC3LPxYI1QttP8"]} -{"Format": "IDEA0", "ID": "fa067433-66e9-46cc-a0dd-b9e84a17f681", "DetectTime": "2023-10-30T14:12:25.072628+02:00", "EventTime": "2023-10-30T14:12:25.072644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CmK9Kx4IyfPLvQyMT1"]} -{"Format": "IDEA0", "ID": "ac13af75-9af9-4ce8-b3d9-db04133553d3", "DetectTime": "2023-10-30T14:12:25.091231+02:00", "EventTime": "2023-10-30T14:12:25.091243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CpWS6h3Gzp6RiYa5x6"]} -{"Format": "IDEA0", "ID": "8d9c0d22-7814-4359-9cb9-99ccfd8b49fd", "DetectTime": "2023-10-30T14:12:25.110775+02:00", "EventTime": "2023-10-30T14:12:25.110807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CHAUNq39YGxJlOJABj"]} -{"Format": "IDEA0", "ID": "ffaabdc6-bf4b-4bfa-842c-f8d92c867b07", "DetectTime": "2023-10-30T14:12:25.130736+02:00", "EventTime": "2023-10-30T14:12:25.130747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C9q7eU3OSWhO6k6Lxb"]} -{"Format": "IDEA0", "ID": "5750d7d1-e9a3-493a-90e2-b32ba0f6cbcc", "DetectTime": "2023-10-30T14:12:25.145870+02:00", "EventTime": "2023-10-30T14:12:25.145882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCs8zIXxidfAPktSd"]} -{"Format": "IDEA0", "ID": "19383c48-d504-472c-b359-14e33f636e15", "DetectTime": "2023-10-30T14:12:25.165242+02:00", "EventTime": "2023-10-30T14:12:25.165258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZklFT3wEp6h7TMZJ5"]} -{"Format": "IDEA0", "ID": "9cf22ef1-a66e-452f-9995-1428524a1165", "DetectTime": "2023-10-30T14:12:25.182915+02:00", "EventTime": "2023-10-30T14:12:25.182927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CDBVRc2LqbaDyFa1Ql"]} -{"Format": "IDEA0", "ID": "6f222973-73f9-4584-8e44-8482e06c0ef5", "DetectTime": "2023-10-30T14:12:25.198076+02:00", "EventTime": "2023-10-30T14:12:25.198088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cjh7kSYCLOzUo9oA4"]} -{"Format": "IDEA0", "ID": "09f9a9b9-9b1c-451f-b904-e7fc0818824f", "DetectTime": "2023-10-30T14:12:25.212962+02:00", "EventTime": "2023-10-30T14:12:25.212973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C8th0T31TSLgCgQ9c5"]} -{"Format": "IDEA0", "ID": "05017dbc-7e72-40bf-9cc0-10c3f7793421", "DetectTime": "2023-10-30T14:12:25.232555+02:00", "EventTime": "2023-10-30T14:12:25.232571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVYZWjqKiZnvQQXXc"]} -{"Format": "IDEA0", "ID": "6699a91b-e258-42f6-b674-62967ff90000", "DetectTime": "2023-10-30T14:12:25.251987+02:00", "EventTime": "2023-10-30T14:12:25.251998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C71eay3w0bsPstnCF9"]} -{"Format": "IDEA0", "ID": "f22960b2-84fa-4b40-89fe-d728afdab082", "DetectTime": "2023-10-30T14:12:25.268134+02:00", "EventTime": "2023-10-30T14:12:25.268149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CSvtET2DXYXHYGrpA4"]} -{"Format": "IDEA0", "ID": "316795d6-8440-4e0a-a5f0-117bed874581", "DetectTime": "2023-10-30T14:12:25.288524+02:00", "EventTime": "2023-10-30T14:12:25.288540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CMjzL013irZnMXejy5"]} -{"Format": "IDEA0", "ID": "f5ee1b51-f6b5-4bdb-b438-b9e567c9d7ae", "DetectTime": "2023-10-30T14:12:25.305598+02:00", "EventTime": "2023-10-30T14:12:25.305609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CAOQmebFXzp2cs6Ti"]} -{"Format": "IDEA0", "ID": "6de5873e-bedd-4c46-952e-987bad9a9f26", "DetectTime": "2023-10-30T14:12:25.325620+02:00", "EventTime": "2023-10-30T14:12:25.325635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CN07Sl35Yjx9UdPze7"]} -{"Format": "IDEA0", "ID": "fe8c7d29-cb7f-48b2-9e9b-e31290584821", "DetectTime": "2023-10-30T14:12:25.357886+02:00", "EventTime": "2023-10-30T14:12:25.357901+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CSMFDV1dJ72g0SKXbf"]} -{"Format": "IDEA0", "ID": "fad355f2-3ea4-41d3-a13b-5a4f6dcc78d3", "DetectTime": "2023-10-30T14:12:25.379090+02:00", "EventTime": "2023-10-30T14:12:25.379106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 113.108.254.151 ", "ContentType": "text/plain"}], "uids": ["CHjZVy1SDIEaxv3xd9"]} -{"Format": "IDEA0", "ID": "7af5f166-9dbc-42f1-9254-13b243316dec", "DetectTime": "2023-10-30T14:12:25.398914+02:00", "EventTime": "2023-10-30T14:12:25.398929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CoVHqy2ad8JIMQoB8b"]} -{"Format": "IDEA0", "ID": "f7dcade0-1224-4b33-8a7e-30d3ae536638", "DetectTime": "2023-10-30T14:12:25.418369+02:00", "EventTime": "2023-10-30T14:12:25.418379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZEb5Emjzpl803pp9"]} -{"Format": "IDEA0", "ID": "a958198a-3ff5-437e-8b7b-59b34985bd59", "DetectTime": "2023-10-30T14:12:25.432238+02:00", "EventTime": "2023-10-30T14:12:25.432250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CYCFff374G5jLNimz7"]} -{"Format": "IDEA0", "ID": "cffd7621-bda1-4d0e-a657-d8cb1f3fa872", "DetectTime": "2023-10-30T14:12:25.449447+02:00", "EventTime": "2023-10-30T14:12:25.449459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CqGrNl1vto1zI2fzlb"]} -{"Format": "IDEA0", "ID": "7313b32f-cb1c-45cb-921e-f271f33c120a", "DetectTime": "2023-10-30T14:12:25.464047+02:00", "EventTime": "2023-10-30T14:12:25.464058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CrCGNl2jfac6lJKzp2"]} -{"Format": "IDEA0", "ID": "9cdada03-b098-446e-b10c-0a0a5e894935", "DetectTime": "2023-10-30T14:12:25.480271+02:00", "EventTime": "2023-10-30T14:12:25.480283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CpvXj4235WfhgWqQqe"]} -{"Format": "IDEA0", "ID": "e06cf14d-3e81-4c0f-831a-9e46954760b0", "DetectTime": "2023-10-30T14:12:25.497044+02:00", "EventTime": "2023-10-30T14:12:25.497060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuBeXZ1p30rR0bqs8"]} -{"Format": "IDEA0", "ID": "0138632b-6bd5-4b37-ac6e-4ba2013fd806", "DetectTime": "2023-10-30T14:12:25.517351+02:00", "EventTime": "2023-10-30T14:12:25.517361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cjwa792fPEJ7fDXXN2"]} -{"Format": "IDEA0", "ID": "bfcf2a0e-09ee-4b8c-bcbe-41e0bdaa27e8", "DetectTime": "2023-10-30T14:12:25.534217+02:00", "EventTime": "2023-10-30T14:12:25.534228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CJFLul27VqM3E5Wpk2"]} -{"Format": "IDEA0", "ID": "82ff410a-ff7d-40ae-aac7-eee326f62038", "DetectTime": "2023-10-30T14:12:25.551199+02:00", "EventTime": "2023-10-30T14:12:25.551214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Co9yfE478Gg15FIdY5"]} -{"Format": "IDEA0", "ID": "f9edf75e-c872-41e7-8f6a-45cb230abb95", "DetectTime": "2023-10-30T14:12:25.569563+02:00", "EventTime": "2023-10-30T14:12:25.569575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CoasCZ2Wr5ouQwjF82"]} -{"Format": "IDEA0", "ID": "0d2c87c2-503c-479d-a5a4-6f56d5c44757", "DetectTime": "2023-10-30T14:12:25.586842+02:00", "EventTime": "2023-10-30T14:12:25.586855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cq8SFtVZyPZ3ztO61"]} -{"Format": "IDEA0", "ID": "654f3ca7-2a68-428a-b9a1-7654d1a53ff0", "DetectTime": "2023-10-30T14:12:25.603307+02:00", "EventTime": "2023-10-30T14:12:25.603323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cw4oS2439aKrRc4sj3"]} -{"Format": "IDEA0", "ID": "10bdec3c-f8f7-494f-a342-4ca2139f4a98", "DetectTime": "2023-10-30T14:12:25.620498+02:00", "EventTime": "2023-10-30T14:12:25.620510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CQKxlc3pZMbo8MiB55"]} -{"Format": "IDEA0", "ID": "2e78600f-2e59-4ab6-be87-99735a27fa79", "DetectTime": "2023-10-30T14:12:25.640015+02:00", "EventTime": "2023-10-30T14:12:25.640030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["C9dZ7d1Zsn9xAmM881"]} -{"Format": "IDEA0", "ID": "845d0652-dd9b-4a34-9e7d-adcae94489f9", "DetectTime": "2023-10-30T14:12:25.669967+02:00", "EventTime": "2023-10-30T14:12:25.669983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cu9shy2ijHllM5XFH2"]} -{"Format": "IDEA0", "ID": "319a5975-d6a6-46dc-b7fb-cdc3c69e0b2b", "DetectTime": "2023-10-30T14:12:25.689638+02:00", "EventTime": "2023-10-30T14:12:25.689653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CrgY5P299woyMyt6Mj"]} -{"Format": "IDEA0", "ID": "78ad3c0e-be43-404a-8ccb-2c0872240a28", "DetectTime": "2023-10-30T14:12:25.707268+02:00", "EventTime": "2023-10-30T14:12:25.707286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CUiBK93gTLHNWqZNm5"]} -{"Format": "IDEA0", "ID": "03e3e3a7-8f5b-4210-b4ac-22087b18844a", "DetectTime": "2023-10-30T14:12:25.724221+02:00", "EventTime": "2023-10-30T14:12:25.724239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CHhIa449CMSG4zYx55"]} -{"Format": "IDEA0", "ID": "6dcf5fe1-cfda-4eb4-8c89-8cbf44715f0c", "DetectTime": "2023-10-30T14:12:25.740336+02:00", "EventTime": "2023-10-30T14:12:25.740347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLIZDp1cdd87CUZsia"]} -{"Format": "IDEA0", "ID": "47823d8a-579b-446d-a707-c4157697858d", "DetectTime": "2023-10-30T14:12:25.759853+02:00", "EventTime": "2023-10-30T14:12:25.759869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIapkd4bbebf9wIeVa"]} -{"Format": "IDEA0", "ID": "fc140e48-a9b6-4023-9fd3-d3bad739ff93", "DetectTime": "2023-10-30T14:12:25.780847+02:00", "EventTime": "2023-10-30T14:12:25.780862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CBs0lG20MAQV131ida"]} -{"Format": "IDEA0", "ID": "952da0b7-24a0-45b3-81f0-24e4a28a085f", "DetectTime": "2023-10-30T14:12:25.801906+02:00", "EventTime": "2023-10-30T14:12:25.801923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CLBAT94pDJZ9IGspue"]} -{"Format": "IDEA0", "ID": "e02d510e-1514-4674-9ae0-70a9530889cc", "DetectTime": "2023-10-30T14:12:25.817280+02:00", "EventTime": "2023-10-30T14:12:25.817291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CiADwO3us0mpnyDG8c"]} -{"Format": "IDEA0", "ID": "f2ffd645-ecec-4e7c-869a-20f0fb9a93bb", "DetectTime": "2023-10-30T14:12:25.834880+02:00", "EventTime": "2023-10-30T14:12:25.834897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C3B5Qu29ptlI1C4uWd"]} -{"Format": "IDEA0", "ID": "40c7260b-ce76-4bc8-8379-70549d49524b", "DetectTime": "2023-10-30T14:12:25.856773+02:00", "EventTime": "2023-10-30T14:12:25.856789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CrLCmg346zt7PEVJ9c"]} -{"Format": "IDEA0", "ID": "1748bfc2-1d5c-4d1a-9da2-564a166d9333", "DetectTime": "2023-10-30T14:12:25.877619+02:00", "EventTime": "2023-10-30T14:12:25.877635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cg3tBH2FMiWfXU0YAe"]} -{"Format": "IDEA0", "ID": "be5cb91d-854c-4d2d-88b2-76579475a200", "DetectTime": "2023-10-30T14:12:25.893962+02:00", "EventTime": "2023-10-30T14:12:25.893988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CmqatP2Sx7TjBahcd1"]} -{"Format": "IDEA0", "ID": "29cfef70-dd6a-4fb6-ae5a-f0ecc55efe64", "DetectTime": "2023-10-30T14:12:25.917487+02:00", "EventTime": "2023-10-30T14:12:25.917502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C3HIqU3U1gawAnWEW4"]} -{"Format": "IDEA0", "ID": "d24798ae-47e4-4101-85a6-51a557b3f706", "DetectTime": "2023-10-30T14:12:25.936889+02:00", "EventTime": "2023-10-30T14:12:25.936901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CrpQfp2bVTPqkhsAPk"]} -{"Format": "IDEA0", "ID": "3818d0b4-7eae-4708-aef6-78ea090edb11", "DetectTime": "2023-10-30T14:12:25.963714+02:00", "EventTime": "2023-10-30T14:12:25.963729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CTPQOm2gYvHg1nXRwd"]} -{"Format": "IDEA0", "ID": "50279dce-ef4a-488e-b5df-2babad83f5d2", "DetectTime": "2023-10-30T14:12:25.985116+02:00", "EventTime": "2023-10-30T14:12:25.985131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["COu6UHlWWjLPzGV6k"]} -{"Format": "IDEA0", "ID": "f3d27c6c-9e3f-4fed-b132-bb6816a57cee", "DetectTime": "2023-10-30T14:12:26.003787+02:00", "EventTime": "2023-10-30T14:12:26.003802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ch8k3NPSKQTUZ6bte"]} -{"Format": "IDEA0", "ID": "70f6aa40-feb5-44d4-95d3-2bf455dcd5bc", "DetectTime": "2023-10-30T14:12:26.020827+02:00", "EventTime": "2023-10-30T14:12:26.020839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CbvwjH3ycUfAH8v5uf"]} -{"Format": "IDEA0", "ID": "068921fc-9e06-4aa7-ba11-f344c6493aab", "DetectTime": "2023-10-30T14:12:26.037299+02:00", "EventTime": "2023-10-30T14:12:26.037313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CJWpAd3cyMBkEEW4g4"]} -{"Format": "IDEA0", "ID": "ad32f65a-d6d0-426d-b657-3370b7c12d75", "DetectTime": "2023-10-30T14:12:26.053759+02:00", "EventTime": "2023-10-30T14:12:26.053770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZXRiR30LyMN2ddFX8"]} -{"Format": "IDEA0", "ID": "ae95ef1c-16ba-41de-b0a5-6b274bb02e9d", "DetectTime": "2023-10-30T14:12:26.068324+02:00", "EventTime": "2023-10-30T14:12:26.068335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C2ZZaA7SvoyG7YiGf"]} -{"Format": "IDEA0", "ID": "f18a9573-f7c5-44c0-ba03-37c967aed762", "DetectTime": "2023-10-30T14:12:26.083323+02:00", "EventTime": "2023-10-30T14:12:26.083336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CT1DFj3jEXv2R9V9Wl"]} -{"Format": "IDEA0", "ID": "513269f7-7f40-4de7-aec1-a4bd398bfa55", "DetectTime": "2023-10-30T14:12:26.097975+02:00", "EventTime": "2023-10-30T14:12:26.097986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CJPgJD2kSoy5PvikJ6"]} -{"Format": "IDEA0", "ID": "96b0e454-251d-40a4-98c5-275b2f836d70", "DetectTime": "2023-10-30T14:12:26.112853+02:00", "EventTime": "2023-10-30T14:12:26.112865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYIOAx4TfuEcvddKXg"]} -{"Format": "IDEA0", "ID": "2b741925-1636-4bbf-811d-78c4d194a58a", "DetectTime": "2023-10-30T14:12:26.128240+02:00", "EventTime": "2023-10-30T14:12:26.128254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CZJO3U2nkG5NaGYkUb"]} -{"Format": "IDEA0", "ID": "8e0df4e0-80aa-4a32-91ee-e37f927ac9ea", "DetectTime": "2023-10-30T14:12:26.146501+02:00", "EventTime": "2023-10-30T14:12:26.146512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C3PROC4OMit7wd3d51"]} -{"Format": "IDEA0", "ID": "4582a315-0bc1-4dd6-bff9-c034699dfee6", "DetectTime": "2023-10-30T14:12:26.161582+02:00", "EventTime": "2023-10-30T14:12:26.161598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C9nfUr2O0qsHjDloZ4"]} -{"Format": "IDEA0", "ID": "db6dfbf9-e2ae-4ef8-b070-9d2529d9d436", "DetectTime": "2023-10-30T14:12:26.179390+02:00", "EventTime": "2023-10-30T14:12:26.179406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CkaGww1jXC310SrzT4"]} -{"Format": "IDEA0", "ID": "d2e7753c-5fd9-4759-b8c7-a47f3ee9e71b", "DetectTime": "2023-10-30T14:12:26.198531+02:00", "EventTime": "2023-10-30T14:12:26.198547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C98xMJ3ElEIG4kDe95"]} -{"Format": "IDEA0", "ID": "15816ac8-0c4c-4b9c-92bc-cee70982b586", "DetectTime": "2023-10-30T14:12:26.218144+02:00", "EventTime": "2023-10-30T14:12:26.218157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CrwIwo4JmdwIF5jkpg"]} -{"Format": "IDEA0", "ID": "ecdb5ad0-958c-4102-8eaa-2e576cf02d75", "DetectTime": "2023-10-30T14:12:26.233928+02:00", "EventTime": "2023-10-30T14:12:26.233939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C6DeSi1jgtEhV5nsbh"]} -{"Format": "IDEA0", "ID": "7e659109-c7ba-4279-a7ce-cddb063ec0cf", "DetectTime": "2023-10-30T14:12:26.250916+02:00", "EventTime": "2023-10-30T14:12:26.250931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CGwHCV1M3Pa9oN9Guj"]} -{"Format": "IDEA0", "ID": "70e41df8-6e0c-4d80-a2f5-9252cdef06ae", "DetectTime": "2023-10-30T14:12:26.282045+02:00", "EventTime": "2023-10-30T14:12:26.282059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CwSoD514DcFGdUdCDd"]} -{"Format": "IDEA0", "ID": "9cb2d6ba-99a9-47f2-bb08-708eb4fecf02", "DetectTime": "2023-10-30T14:12:26.300395+02:00", "EventTime": "2023-10-30T14:12:26.300411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C4IO9Q1NeRygn0xYB4"]} -{"Format": "IDEA0", "ID": "38fc35f8-58a3-4991-afd2-f5316522c1b9", "DetectTime": "2023-10-30T14:12:26.317012+02:00", "EventTime": "2023-10-30T14:12:26.317023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C51YzW3dB83EB3wHp"]} -{"Format": "IDEA0", "ID": "b9e557fa-fe46-4c71-ac09-5490f59e991d", "DetectTime": "2023-10-30T14:12:26.333674+02:00", "EventTime": "2023-10-30T14:12:26.333696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CQm0sO3cdOyTkUZjvd"]} -{"Format": "IDEA0", "ID": "8684a72e-d555-478e-abfb-641125ae8805", "DetectTime": "2023-10-30T14:12:26.350474+02:00", "EventTime": "2023-10-30T14:12:26.350490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CFiTLy2YIBt1ePLB3"]} -{"Format": "IDEA0", "ID": "f76fc18f-5c55-4cd4-852a-557f70081c5a", "DetectTime": "2023-10-30T14:12:26.368066+02:00", "EventTime": "2023-10-30T14:12:26.368078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CpeNvI1m0YLEkDB679"]} -{"Format": "IDEA0", "ID": "361f6365-b39c-419d-ac23-10a22c445758", "DetectTime": "2023-10-30T14:12:26.383884+02:00", "EventTime": "2023-10-30T14:12:26.383900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CWEmjK1wINF6qAHmvh"]} -{"Format": "IDEA0", "ID": "4ee71dc4-617e-4d38-a0f3-8e48d68685a4", "DetectTime": "2023-10-30T14:12:26.399007+02:00", "EventTime": "2023-10-30T14:12:26.399019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cgzj162I0UnRp9drt9"]} -{"Format": "IDEA0", "ID": "c00f5a72-dd45-47bf-a393-6e65c0aeeb5d", "DetectTime": "2023-10-30T14:12:26.416892+02:00", "EventTime": "2023-10-30T14:12:26.416903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CG9wZ02uyMHyzbq6qg"]} -{"Format": "IDEA0", "ID": "81f76dfd-617e-4aa5-9d70-6a55fb1c9805", "DetectTime": "2023-10-30T14:12:26.431543+02:00", "EventTime": "2023-10-30T14:12:26.431554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C83IiF2virkDoydJ09"]} -{"Format": "IDEA0", "ID": "9edfd07d-7739-472c-91bb-8851ca458565", "DetectTime": "2023-10-30T14:12:26.448359+02:00", "EventTime": "2023-10-30T14:12:26.448370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CYIFhz2RHsy9JDFvcg"]} -{"Format": "IDEA0", "ID": "df45ba9e-90e5-4d02-b936-30d26ee71741", "DetectTime": "2023-10-30T14:12:26.463702+02:00", "EventTime": "2023-10-30T14:12:26.463713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C6Isde2TT0aWq5Mbae"]} -{"Format": "IDEA0", "ID": "f7f29e6b-e0f9-4aab-9e9a-3f05be420104", "DetectTime": "2023-10-30T14:12:26.481105+02:00", "EventTime": "2023-10-30T14:12:26.481125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CVClf4yU7vIVQwg61"]} -{"Format": "IDEA0", "ID": "c68cd3b7-5fb2-42b3-8eac-e22fa9f6b924", "DetectTime": "2023-10-30T14:12:26.496694+02:00", "EventTime": "2023-10-30T14:12:26.496706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CrJzjfHhIhkU7RTM1"]} -{"Format": "IDEA0", "ID": "a12263b9-4cd4-415a-b02c-6dfe303b0183", "DetectTime": "2023-10-30T14:12:26.514581+02:00", "EventTime": "2023-10-30T14:12:26.514593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CX6cFumbgGSmtypTd"]} -{"Format": "IDEA0", "ID": "2933dd72-2afa-449b-867a-6c0d6fdc1ed9", "DetectTime": "2023-10-30T14:12:26.531302+02:00", "EventTime": "2023-10-30T14:12:26.531312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CmbdAxYjzlVmvKQg1"]} -{"Format": "IDEA0", "ID": "1d6cfb3f-d3d3-4ddd-ad58-80af8ed3473f", "DetectTime": "2023-10-30T14:12:26.546032+02:00", "EventTime": "2023-10-30T14:12:26.546042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CyFtn938GlH5a4dIce"]} -{"Format": "IDEA0", "ID": "e9028ad1-d42c-49f0-b3a4-8f2ba6997ea3", "DetectTime": "2023-10-30T14:12:26.561102+02:00", "EventTime": "2023-10-30T14:12:26.561112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CCtV3j2FmymD7EWrNc"]} -{"Format": "IDEA0", "ID": "e742e3b9-8de0-40af-8f7e-20971c65d74d", "DetectTime": "2023-10-30T14:12:26.579001+02:00", "EventTime": "2023-10-30T14:12:26.579013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CLthDu3VEsIuwN5ln5"]} -{"Format": "IDEA0", "ID": "31b7da96-2dde-4985-9ce8-2dbea7af138d", "DetectTime": "2023-10-30T14:12:26.595310+02:00", "EventTime": "2023-10-30T14:12:26.595326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CJbGFC6b7aUV70pC3"]} -{"Format": "IDEA0", "ID": "e14438f3-ad3b-4ac6-af98-5a9714df308b", "DetectTime": "2023-10-30T14:12:26.616312+02:00", "EventTime": "2023-10-30T14:12:26.616328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVRnWg4qhzUz8rLXv9"]} -{"Format": "IDEA0", "ID": "c1fafc73-5465-44f7-bcd2-92efb809dffe", "DetectTime": "2023-10-30T14:12:26.641746+02:00", "EventTime": "2023-10-30T14:12:26.641756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3zAF12fdamwrhyHMh"]} -{"Format": "IDEA0", "ID": "f814247c-00e2-4a16-885a-f216424be0e3", "DetectTime": "2023-10-30T14:12:26.656937+02:00", "EventTime": "2023-10-30T14:12:26.656948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CR4MAC3oFlwLNiko7i"]} -{"Format": "IDEA0", "ID": "45aa8f38-b51e-47ae-a4bd-09f8268f3b8f", "DetectTime": "2023-10-30T14:12:26.677894+02:00", "EventTime": "2023-10-30T14:12:26.677911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cyrxrj3WurCTURzg6g"]} -{"Format": "IDEA0", "ID": "2e73c54d-e271-479f-8fea-14ea2707cc0c", "DetectTime": "2023-10-30T14:12:26.697852+02:00", "EventTime": "2023-10-30T14:12:26.697864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["COYAmngw58Ns55Yig"]} -{"Format": "IDEA0", "ID": "1187a668-1cb6-4009-94e3-a74058546120", "DetectTime": "2023-10-30T14:12:26.711958+02:00", "EventTime": "2023-10-30T14:12:26.711974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CbuzB038AIXZcNqQs1"]} -{"Format": "IDEA0", "ID": "00d16665-cf0c-45c1-b8ff-bf416a6649df", "DetectTime": "2023-10-30T14:12:26.728401+02:00", "EventTime": "2023-10-30T14:12:26.728416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CpGlch3fw03PLOh0ll"]} -{"Format": "IDEA0", "ID": "7a371377-9408-4628-86cf-3f84918100d0", "DetectTime": "2023-10-30T14:12:26.742486+02:00", "EventTime": "2023-10-30T14:12:26.742497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CXq7qt3BBs62NdjIFd"]} -{"Format": "IDEA0", "ID": "f285e85f-ddcc-4ac1-b3dc-15af8bad1891", "DetectTime": "2023-10-30T14:12:26.757342+02:00", "EventTime": "2023-10-30T14:12:26.757353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CO2MmD48Y070z00aIc"]} -{"Format": "IDEA0", "ID": "4d1fc530-36b9-437f-908b-cb9251968e93", "DetectTime": "2023-10-30T14:12:26.774368+02:00", "EventTime": "2023-10-30T14:12:26.774384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CnC6PT2WsbkLiMY935"]} -{"Format": "IDEA0", "ID": "5eb459dc-b69e-4781-bdc2-ac7dfb1f56c6", "DetectTime": "2023-10-30T14:12:26.795799+02:00", "EventTime": "2023-10-30T14:12:26.795815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CDAQt43Ta4KOnXWh2a"]} -{"Format": "IDEA0", "ID": "f5bb059c-1293-4c59-a504-d38596caf4fe", "DetectTime": "2023-10-30T14:12:26.813057+02:00", "EventTime": "2023-10-30T14:12:26.813067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C1MOd41WPtlmOHYqad"]} -{"Format": "IDEA0", "ID": "ae64d706-2821-449a-99cc-ae555139f28a", "DetectTime": "2023-10-30T14:12:26.831814+02:00", "EventTime": "2023-10-30T14:12:26.831830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbWyNi1eNWvDIH0qy1"]} -{"Format": "IDEA0", "ID": "39fe72e0-5f16-4a0c-b096-cde8e3138682", "DetectTime": "2023-10-30T14:12:26.848738+02:00", "EventTime": "2023-10-30T14:12:26.848749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CHt9nx13dPpK6qI6al"]} -{"Format": "IDEA0", "ID": "7b5cc37e-a584-4350-bf59-78dd02cadd75", "DetectTime": "2023-10-30T14:12:26.867996+02:00", "EventTime": "2023-10-30T14:12:26.868011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CGJih12GkvaieQiEZh"]} -{"Format": "IDEA0", "ID": "5037efc0-d7bb-4b6a-83e2-2fe2828c5738", "DetectTime": "2023-10-30T14:12:26.886426+02:00", "EventTime": "2023-10-30T14:12:26.886437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CEpWxBMd9idWdDn09"]} -{"Format": "IDEA0", "ID": "9196213c-e542-4394-9c1e-08037b5ecfa9", "DetectTime": "2023-10-30T14:12:26.902649+02:00", "EventTime": "2023-10-30T14:12:26.902666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CHvmbz3k7hGAkiBYY2"]} -{"Format": "IDEA0", "ID": "649fcd03-3dc0-409c-8e92-0647d637cb04", "DetectTime": "2023-10-30T14:12:26.923147+02:00", "EventTime": "2023-10-30T14:12:26.923162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CvzMiTVDGThKTSX3i"]} -{"Format": "IDEA0", "ID": "165e6ad7-fd27-470d-8673-5b0b137dfb15", "DetectTime": "2023-10-30T14:12:26.944475+02:00", "EventTime": "2023-10-30T14:12:26.944494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CYBmV810D2mJQuL5md"]} -{"Format": "IDEA0", "ID": "62741fac-0efd-49a8-9082-f06d977f431e", "DetectTime": "2023-10-30T14:12:26.960049+02:00", "EventTime": "2023-10-30T14:12:26.960059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGdmyK2QNPopxBffSe"]} -{"Format": "IDEA0", "ID": "4baf83b7-80af-4f1b-a2ff-e9c1e6d6dbbe", "DetectTime": "2023-10-30T14:12:26.978389+02:00", "EventTime": "2023-10-30T14:12:26.978405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["ChSqUa1fWCRhuh3m2c"]} -{"Format": "IDEA0", "ID": "dd03645e-d2cc-44f2-a2cf-c93542d5732f", "DetectTime": "2023-10-30T14:12:26.999509+02:00", "EventTime": "2023-10-30T14:12:26.999525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CQobjzHc39jkcl1Kc"]} -{"Format": "IDEA0", "ID": "332f7566-e2ba-4cde-9536-3cf2ae38bc83", "DetectTime": "2023-10-30T14:12:27.019762+02:00", "EventTime": "2023-10-30T14:12:27.019779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C1BXCO3B9Y7VLKZVFd"]} -{"Format": "IDEA0", "ID": "e1fa5e11-2738-456b-b905-1488dfb4b36a", "DetectTime": "2023-10-30T14:12:27.038417+02:00", "EventTime": "2023-10-30T14:12:27.038433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CGU7Fr4a3JPbXYmQTj"]} -{"Format": "IDEA0", "ID": "b5bfeeb7-1be5-4d2e-9820-ab99df46a4ca", "DetectTime": "2023-10-30T14:12:27.071652+02:00", "EventTime": "2023-10-30T14:12:27.071668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CgkHjn3vADHzJEZPE5"]} -{"Format": "IDEA0", "ID": "13c509f9-ba11-413c-ade1-e70ba838bd83", "DetectTime": "2023-10-30T14:12:27.093071+02:00", "EventTime": "2023-10-30T14:12:27.093089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C1dviH3YogMYMjyOhf"]} -{"Format": "IDEA0", "ID": "6bd4fa90-1393-4e56-9b16-3558791008e0", "DetectTime": "2023-10-30T14:12:27.112166+02:00", "EventTime": "2023-10-30T14:12:27.112182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CWbNKz2gNtTCdZX2pj"]} -{"Format": "IDEA0", "ID": "c0d9be19-23dd-4cb5-8316-6bbf7d1738fe", "DetectTime": "2023-10-30T14:12:27.133337+02:00", "EventTime": "2023-10-30T14:12:27.133352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["Cy8wYL2d3bZDsbU6a7"]} -{"Format": "Json", "ID": "c0d9be19-23dd-4cb5-8316-6bbf7d1738fe", "DetectTime": "2023-10-30T14:12:27.133337+02:00", "EventTime": "2023-10-30T14:12:27.133352+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:49:08.672078+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:27.213445)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ad303979-bf34-499b-97fa-ec1bcccc8efb", "DetectTime": "2023-10-30T14:12:27.218707+02:00", "EventTime": "2023-10-30T14:12:27.218723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CrqeHH8UFYs2Mczbf"]} -{"Format": "IDEA0", "ID": "cebaa774-ddbd-4b2d-a579-10168d7ab11a", "DetectTime": "2023-10-30T14:12:27.248400+02:00", "EventTime": "2023-10-30T14:12:27.248415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CERg8Q1LiSMgPBrGh4"]} -{"Format": "IDEA0", "ID": "f38eb801-6a8b-49b6-9269-85df7f303ab5", "DetectTime": "2023-10-30T14:12:27.279782+02:00", "EventTime": "2023-10-30T14:12:27.279795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Co4Gqm2Yz82tqWqfh6"]} -{"Format": "IDEA0", "ID": "42a4ad53-2b10-4ee1-9301-adf59bbc05bc", "DetectTime": "2023-10-30T14:12:27.310225+02:00", "EventTime": "2023-10-30T14:12:27.310242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CoraK34JAdvh35wA97"]} -{"Format": "IDEA0", "ID": "1a385e65-a9e7-4783-9ab7-e9ce01f40d79", "DetectTime": "2023-10-30T14:12:27.326552+02:00", "EventTime": "2023-10-30T14:12:27.326570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CriBcX1PquoM2JMxx6"]} -{"Format": "IDEA0", "ID": "b539b42b-ac0c-4f60-af96-995d53988b6c", "DetectTime": "2023-10-30T14:12:27.357117+02:00", "EventTime": "2023-10-30T14:12:27.357132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CnPpkU1YvDXt4T8LT"]} -{"Format": "IDEA0", "ID": "1db3e610-69a2-4bbb-a4a4-9857c8ac0070", "DetectTime": "2023-10-30T14:12:27.387910+02:00", "EventTime": "2023-10-30T14:12:27.387922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CMrkDI2aQTFYOMq4g6"]} -{"Format": "IDEA0", "ID": "c5e9f6dc-f5aa-4c0b-88d4-ffd364ad4429", "DetectTime": "2023-10-30T14:12:27.412471+02:00", "EventTime": "2023-10-30T14:12:27.412482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cj0mZD2SWfl8K0GVh"]} -{"Format": "IDEA0", "ID": "9844c6fc-978f-454a-a7b6-904e8d80d14a", "DetectTime": "2023-10-30T14:12:27.440111+02:00", "EventTime": "2023-10-30T14:12:27.440122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Ck18WE19TlY1m5PwAb"]} -{"Format": "Json", "ID": "9844c6fc-978f-454a-a7b6-904e8d80d14a", "DetectTime": "2023-10-30T14:12:27.440111+02:00", "EventTime": "2023-10-30T14:12:27.440122+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:49:10.062854+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:27.509477)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a4cb83f3-f3d2-47d0-ad92-4e4ed4b09855", "DetectTime": "2023-10-30T14:12:27.513980+02:00", "EventTime": "2023-10-30T14:12:27.513990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cf8I6BuhSQaaRC8J5"]} -{"Format": "IDEA0", "ID": "2d3b2e20-4bbd-4dee-bad0-e60c6bfaa5ea", "DetectTime": "2023-10-30T14:12:27.542829+02:00", "EventTime": "2023-10-30T14:12:27.542846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C9ITyG3V4XB7BcRbLb"]} -{"Format": "IDEA0", "ID": "244750b2-a235-4904-a298-b24246054fd8", "DetectTime": "2023-10-30T14:12:27.570480+02:00", "EventTime": "2023-10-30T14:12:27.570498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLQqBD1hOTbsiiYkP7"]} -{"Format": "IDEA0", "ID": "70e006bc-83d5-439e-ac80-9657398e5719", "DetectTime": "2023-10-30T14:12:27.588363+02:00", "EventTime": "2023-10-30T14:12:27.588374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CI9vyB2UPzg3Xp2OE2"]} -{"Format": "IDEA0", "ID": "2f449953-eb54-42c1-b9c2-8a0e90affd75", "DetectTime": "2023-10-30T14:12:27.614392+02:00", "EventTime": "2023-10-30T14:12:27.614410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ck7Y4a4ZvabfvZlSFb"]} -{"Format": "IDEA0", "ID": "ddbb894d-2f96-4078-9279-c27a3748ba72", "DetectTime": "2023-10-30T14:12:27.643715+02:00", "EventTime": "2023-10-30T14:12:27.643731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CIWlps4ZhnZm5S8uG"]} -{"Format": "IDEA0", "ID": "1168ef4a-b063-4714-9704-46e6881c0c01", "DetectTime": "2023-10-30T14:12:27.670467+02:00", "EventTime": "2023-10-30T14:12:27.670478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CuxRYn2Pb090VkGXgb"]} -{"Format": "IDEA0", "ID": "eef908c2-5b9c-4d29-9e11-a18a098eae03", "DetectTime": "2023-10-30T14:12:27.697323+02:00", "EventTime": "2023-10-30T14:12:27.697339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQt1Idr9Az5Ae01C"]} -{"Format": "IDEA0", "ID": "f5cbc215-b00f-4147-8dc7-0f6912cc47ff", "DetectTime": "2023-10-30T14:12:27.722302+02:00", "EventTime": "2023-10-30T14:12:27.722313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Crc9i13YwMNkhFeSRl"]} -{"Format": "Json", "ID": "f5cbc215-b00f-4147-8dc7-0f6912cc47ff", "DetectTime": "2023-10-30T14:12:27.722302+02:00", "EventTime": "2023-10-30T14:12:27.722313+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:49:12.092494+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:27.793460)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1bce54ac-debb-4b64-be78-88d6f68ab315", "DetectTime": "2023-10-30T14:12:27.797712+02:00", "EventTime": "2023-10-30T14:12:27.797725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CZMIW832ZIyLFoft9"]} -{"Format": "IDEA0", "ID": "32d7e051-cdb5-422a-a1ba-ee6ba4c4d8c2", "DetectTime": "2023-10-30T14:12:27.824900+02:00", "EventTime": "2023-10-30T14:12:27.824917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C61lgg4Ckn9fJwgOnc"]} -{"Format": "IDEA0", "ID": "526c2af6-cc18-4699-a8ad-268048437867", "DetectTime": "2023-10-30T14:12:27.854140+02:00", "EventTime": "2023-10-30T14:12:27.854159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CIaieR2unQftIjhGQf"]} -{"Format": "IDEA0", "ID": "2ef39ea5-a0f5-4501-96cd-7c45d70aa299", "DetectTime": "2023-10-30T14:12:27.874544+02:00", "EventTime": "2023-10-30T14:12:27.874574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLEOb522n0Kfi4uNhh"]} -{"Format": "IDEA0", "ID": "fe3f65c4-3011-4d11-aa21-66fa499692ad", "DetectTime": "2023-10-30T14:12:27.901495+02:00", "EventTime": "2023-10-30T14:12:27.901506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CpleVUfGiuYELQUNe"]} -{"Format": "IDEA0", "ID": "c562944e-b7b2-465b-9355-69ea5b2f323a", "DetectTime": "2023-10-30T14:12:27.930945+02:00", "EventTime": "2023-10-30T14:12:27.930959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CGTzuGSNDh8qgIU68"]} -{"Format": "IDEA0", "ID": "3ad74b79-7c56-4172-a6fc-1b98400acb06", "DetectTime": "2023-10-30T14:12:27.954913+02:00", "EventTime": "2023-10-30T14:12:27.954926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["COeSl12JvhrfHJ6MTa"]} -{"Format": "IDEA0", "ID": "2af357ec-2407-4d93-b258-a208f6f36bed", "DetectTime": "2023-10-30T14:12:27.980511+02:00", "EventTime": "2023-10-30T14:12:27.980527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CqxPRAHsctURTcX4l"]} -{"Format": "IDEA0", "ID": "3e5bac2f-21bf-4f8e-a821-fc68b2400797", "DetectTime": "2023-10-30T14:12:28.004496+02:00", "EventTime": "2023-10-30T14:12:28.004513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CpwZgf2ChyLRpy2yXb"]} -{"Format": "Json", "ID": "3e5bac2f-21bf-4f8e-a821-fc68b2400797", "DetectTime": "2023-10-30T14:12:28.004496+02:00", "EventTime": "2023-10-30T14:12:28.004513+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T13:49:13.773224+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2023/10/30 14:12:28.147170)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2cd81810-4278-40fe-b47e-954bccbefdc8", "DetectTime": "2023-10-30T14:12:28.151089+02:00", "EventTime": "2023-10-30T14:12:28.151101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRDF294W8iLDBvpq5f"]} -{"Format": "IDEA0", "ID": "87a2f09b-19b8-4d65-8654-624b16bf3b4a", "DetectTime": "2023-10-30T14:12:28.175932+02:00", "EventTime": "2023-10-30T14:12:28.175949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CM98Uv4KdPGPv28bA2"]} -{"Format": "IDEA0", "ID": "7900627a-3015-4224-9d49-0ec12cc9eb0f", "DetectTime": "2023-10-30T14:12:28.201137+02:00", "EventTime": "2023-10-30T14:12:28.201149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCRcUP2qzThmfvIxJ8"]} -{"Format": "IDEA0", "ID": "f2bda198-2cce-4382-b52e-ce15dd5703b9", "DetectTime": "2023-10-30T14:12:28.226036+02:00", "EventTime": "2023-10-30T14:12:28.226051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CszVLb1kFGaznUxc11"]} -{"Format": "IDEA0", "ID": "df7ef212-5b08-4afd-893c-725068215966", "DetectTime": "2023-10-30T14:12:28.251492+02:00", "EventTime": "2023-10-30T14:12:28.251517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLCzzy12DWgLPiCAQb"]} -{"Format": "IDEA0", "ID": "87d6cc17-a0be-4308-9188-0ac42ec23027", "DetectTime": "2023-10-30T14:12:28.273327+02:00", "EventTime": "2023-10-30T14:12:28.273344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRISHgnHgigZQI1ya"]} -{"Format": "IDEA0", "ID": "6b480407-46fe-465e-84b6-afc42d56b865", "DetectTime": "2023-10-30T14:12:28.299686+02:00", "EventTime": "2023-10-30T14:12:28.299703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CiJyHT3pF2T1AlG90j"]} -{"Format": "IDEA0", "ID": "394d67f5-9f9d-47e6-863b-b8abc5904b4f", "DetectTime": "2023-10-30T14:12:28.343584+02:00", "EventTime": "2023-10-30T14:12:28.343607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["COY5lP3OK1yh4Vq0r"]} -{"Format": "IDEA0", "ID": "cbd8332c-b21a-41c5-a6dd-f28e04358705", "DetectTime": "2023-10-30T14:12:28.388678+02:00", "EventTime": "2023-10-30T14:12:28.388706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CoeBCm1cy43k9lte3l"]} -{"Format": "IDEA0", "ID": "c167b652-e2fc-4351-a55c-33e92cbf03f2", "DetectTime": "2023-10-30T14:12:28.432809+02:00", "EventTime": "2023-10-30T14:12:28.432827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CmPiJX1UedJDe0BHCf"]} -{"Format": "IDEA0", "ID": "1af37ee0-09fa-4906-831b-b405bdf71e48", "DetectTime": "2023-10-30T14:12:28.479050+02:00", "EventTime": "2023-10-30T14:12:28.479071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CR8OeTMy6eIrkw7lj"]} -{"Format": "IDEA0", "ID": "d3932586-adee-4136-a144-100b4c5f1cf8", "DetectTime": "2023-10-30T14:12:28.521758+02:00", "EventTime": "2023-10-30T14:12:28.521774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CvihiY28cVeqK876Hb"]} -{"Format": "IDEA0", "ID": "8737d3a0-6820-4b5b-9430-911d427e43dc", "DetectTime": "2023-10-30T14:12:28.562079+02:00", "EventTime": "2023-10-30T14:12:28.562093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CApgaTemXWRcPVNB7"]} -{"Format": "IDEA0", "ID": "e1501bc5-6692-4429-b554-6becf0e37e73", "DetectTime": "2023-10-30T14:12:28.598392+02:00", "EventTime": "2023-10-30T14:12:28.598411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CJGULa4SfbOy48PLM5"]} -{"Format": "Json", "ID": "e1501bc5-6692-4429-b554-6becf0e37e73", "DetectTime": "2023-10-30T14:12:28.598392+02:00", "EventTime": "2023-10-30T14:12:28.598411+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:19:21.105228+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:28.678968)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "49dbb29c-af74-41e4-a17b-17554e0feb61", "DetectTime": "2023-10-30T14:12:28.684018+02:00", "EventTime": "2023-10-30T14:12:28.684035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CmLa0l46xOo8CQZSPf"]} -{"Format": "IDEA0", "ID": "a52b0acd-2c65-427d-8191-db21db8743bd", "DetectTime": "2023-10-30T14:12:28.723623+02:00", "EventTime": "2023-10-30T14:12:28.723639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CICESY2PoDw3sWU26k"]} -{"Format": "IDEA0", "ID": "0474a00b-a0f0-4b8c-ad54-e7dadfdd49da", "DetectTime": "2023-10-30T14:12:28.758523+02:00", "EventTime": "2023-10-30T14:12:28.758541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CbAyqN6SQIOWhl6gc"]} -{"Format": "IDEA0", "ID": "dd72dbff-ecb2-4e48-b7f1-9cf3f8232ff4", "DetectTime": "2023-10-30T14:12:28.795934+02:00", "EventTime": "2023-10-30T14:12:28.795949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cb0nBx13i1qKVj0km9"]} -{"Format": "IDEA0", "ID": "3d909575-95b9-40d3-a2f0-5550fb26dc85", "DetectTime": "2023-10-30T14:12:28.832829+02:00", "EventTime": "2023-10-30T14:12:28.832844+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CsvLVF3tHRimUYcMV1"]} -{"Format": "IDEA0", "ID": "a6b65e27-29e3-4f1c-8d56-d4e4f8668896", "DetectTime": "2023-10-30T14:12:28.859035+02:00", "EventTime": "2023-10-30T14:12:28.859046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C2LvPqR4aqijBX9K9"]} -{"Format": "IDEA0", "ID": "c3a2ddce-899b-4361-be5a-a0c71b321110", "DetectTime": "2023-10-30T14:12:28.893745+02:00", "EventTime": "2023-10-30T14:12:28.893757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CaqRZc399hWrtvdgof"]} -{"Format": "IDEA0", "ID": "01d2263f-3cb2-4c73-b4ee-4b81f9fc2080", "DetectTime": "2023-10-30T14:12:28.934393+02:00", "EventTime": "2023-10-30T14:12:28.934410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CqPYzQp0aC3hCu951"]} -{"Format": "IDEA0", "ID": "be47c2c6-c440-41b7-9694-e0a45bc22d63", "DetectTime": "2023-10-30T14:12:28.969538+02:00", "EventTime": "2023-10-30T14:12:28.969554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CtCLyJXPAkP0uN9ff"]} -{"Format": "Json", "ID": "be47c2c6-c440-41b7-9694-e0a45bc22d63", "DetectTime": "2023-10-30T14:12:28.969538+02:00", "EventTime": "2023-10-30T14:12:28.969554+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:19:22.952178+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:29.049306)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e3ab8e2b-eb27-4b0a-8cf7-d9fe71aeec62", "DetectTime": "2023-10-30T14:12:29.053687+02:00", "EventTime": "2023-10-30T14:12:29.053697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CbXKcj4gMTy3GRsCv3"]} -{"Format": "IDEA0", "ID": "c900d026-8204-4390-8573-d26659acb4d1", "DetectTime": "2023-10-30T14:12:29.082969+02:00", "EventTime": "2023-10-30T14:12:29.082992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CF01iF4WmB9Shi84cc"]} -{"Format": "IDEA0", "ID": "a99d5334-000a-4e88-8291-3a7e919ff1a0", "DetectTime": "2023-10-30T14:12:29.119400+02:00", "EventTime": "2023-10-30T14:12:29.119412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cfi5Po3TgzpIeNsdci"]} -{"Format": "IDEA0", "ID": "f842d6a7-77e1-4c39-9248-c25b9802cc68", "DetectTime": "2023-10-30T14:12:29.155656+02:00", "EventTime": "2023-10-30T14:12:29.155672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CE3XMC3rZK2pp2jS9j"]} -{"Format": "IDEA0", "ID": "0f470d03-bf79-4803-953a-a4609ee9c456", "DetectTime": "2023-10-30T14:12:29.187661+02:00", "EventTime": "2023-10-30T14:12:29.187677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CfdUWM2nEVCK2DPxs9"]} -{"Format": "IDEA0", "ID": "9b2982ad-6d09-4084-bc90-b77688882887", "DetectTime": "2023-10-30T14:12:29.219135+02:00", "EventTime": "2023-10-30T14:12:29.219150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CBUcgR1XLCclMkrlVh"]} -{"Format": "IDEA0", "ID": "f5d3705d-55ed-4443-b783-877a587c04af", "DetectTime": "2023-10-30T14:12:29.254776+02:00", "EventTime": "2023-10-30T14:12:29.254812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C15Elg4FP8ZT09huI4"]} -{"Format": "IDEA0", "ID": "4cb6073d-bbba-4522-8aed-6c07537da712", "DetectTime": "2023-10-30T14:12:29.289556+02:00", "EventTime": "2023-10-30T14:12:29.289567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CTUuuL1lmH9FA4aEt5"]} -{"Format": "IDEA0", "ID": "c8e72bb4-8a67-4eba-accf-5355acebcdcd", "DetectTime": "2023-10-30T14:12:29.323030+02:00", "EventTime": "2023-10-30T14:12:29.323044+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cz9SI51zlSZVZLyApl"]} -{"Format": "Json", "ID": "c8e72bb4-8a67-4eba-accf-5355acebcdcd", "DetectTime": "2023-10-30T14:12:29.323030+02:00", "EventTime": "2023-10-30T14:12:29.323044+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:19:24.752864+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:29.406822)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "809ea8f2-2171-4de1-a57a-c4ec137d4c91", "DetectTime": "2023-10-30T14:12:29.411960+02:00", "EventTime": "2023-10-30T14:12:29.411975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CvzZ8H26ESQTrRZ0V4"]} -{"Format": "IDEA0", "ID": "457b9d57-0ec8-4db3-b247-e54ecdf04d80", "DetectTime": "2023-10-30T14:12:29.443758+02:00", "EventTime": "2023-10-30T14:12:29.443774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CoRIGr2UgRxylx98ll"]} -{"Format": "IDEA0", "ID": "5e7c40dc-18b8-4898-9039-03131804d537", "DetectTime": "2023-10-30T14:12:29.476300+02:00", "EventTime": "2023-10-30T14:12:29.476316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLtIaq1GcFlevXw8jf"]} -{"Format": "IDEA0", "ID": "5e397ba8-82ae-4782-a4b8-34b13f1129d4", "DetectTime": "2023-10-30T14:12:29.506368+02:00", "EventTime": "2023-10-30T14:12:29.506385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CIvhTv218GlZXum2xd"]} -{"Format": "IDEA0", "ID": "da3f0c44-ff4d-4650-9f13-3a31c11071ab", "DetectTime": "2023-10-30T14:12:29.534891+02:00", "EventTime": "2023-10-30T14:12:29.534906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CfopGM11AmVm8vfDp6"]} -{"Format": "IDEA0", "ID": "eb70cd20-5f35-4752-a6a4-3226f478ae50", "DetectTime": "2023-10-30T14:12:29.569352+02:00", "EventTime": "2023-10-30T14:12:29.569363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C9kECA3Bjrg1xuFydj"]} -{"Format": "IDEA0", "ID": "a1ad0a1a-a617-4d35-a3db-1f6cd1419097", "DetectTime": "2023-10-30T14:12:29.594604+02:00", "EventTime": "2023-10-30T14:12:29.594629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CnHvkB1Ee3TMRMjGn"]} -{"Format": "IDEA0", "ID": "550657b2-b1b3-4238-8e94-6e5c200889a4", "DetectTime": "2023-10-30T14:12:29.625303+02:00", "EventTime": "2023-10-30T14:12:29.625319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDZb0I1HnTJcvZees7"]} -{"Format": "IDEA0", "ID": "21cdfd43-9930-4938-ab5e-0db96ebf2be2", "DetectTime": "2023-10-30T14:12:29.655211+02:00", "EventTime": "2023-10-30T14:12:29.655228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CrGr8w3AA6xDa8ITAj"]} -{"Format": "Json", "ID": "21cdfd43-9930-4938-ab5e-0db96ebf2be2", "DetectTime": "2023-10-30T14:12:29.655211+02:00", "EventTime": "2023-10-30T14:12:29.655228+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:49:48.816868+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:29.729798)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54b48eca-0e10-46c2-9348-6c44307c83f8", "DetectTime": "2023-10-30T14:12:29.735251+02:00", "EventTime": "2023-10-30T14:12:29.735269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CcT2Jk2x1YbsfQT8Rk"]} -{"Format": "IDEA0", "ID": "9ae9a0fc-1b13-441c-9f62-19c2bd1f4cc7", "DetectTime": "2023-10-30T14:12:29.765367+02:00", "EventTime": "2023-10-30T14:12:29.765384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CAUNoN2nyfmeSoHrhf"]} -{"Format": "IDEA0", "ID": "c84e9eba-abef-4438-b07e-ebcdd73e36bf", "DetectTime": "2023-10-30T14:12:29.790337+02:00", "EventTime": "2023-10-30T14:12:29.790348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CDrRYJbUErkMh6C3l"]} -{"Format": "IDEA0", "ID": "b48583ad-665c-4bb7-95c2-10a0d1c78d1c", "DetectTime": "2023-10-30T14:12:29.816428+02:00", "EventTime": "2023-10-30T14:12:29.816449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CbqhKf1bqcFc4dWlO7"]} -{"Format": "IDEA0", "ID": "5770b2bb-8b1d-4030-a887-21a8807a178b", "DetectTime": "2023-10-30T14:12:29.839034+02:00", "EventTime": "2023-10-30T14:12:29.839048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CSnA2x4wULHG0hw8Pd"]} -{"Format": "IDEA0", "ID": "c07004a9-bdee-4d01-b0f1-fde2e25985c4", "DetectTime": "2023-10-30T14:12:29.864628+02:00", "EventTime": "2023-10-30T14:12:29.864643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CAdJKw2yoYGsNKQOtc"]} -{"Format": "IDEA0", "ID": "cb8336b1-dd4d-4f91-9a73-e3ba25eeb786", "DetectTime": "2023-10-30T14:12:29.892649+02:00", "EventTime": "2023-10-30T14:12:29.892664+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CSSfEe2Nvjnm8C1VUf"]} -{"Format": "IDEA0", "ID": "5cfa90fc-94c8-4ca7-8d56-0f2c9c4bb460", "DetectTime": "2023-10-30T14:12:29.918015+02:00", "EventTime": "2023-10-30T14:12:29.918034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cx0irY1H4HaWk0AFQb"]} -{"Format": "IDEA0", "ID": "edc897f4-5cf6-474d-977d-910b46df2441", "DetectTime": "2023-10-30T14:12:29.947196+02:00", "EventTime": "2023-10-30T14:12:29.947212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CilzGP1dHwwf3g0Ca1"]} -{"Format": "IDEA0", "ID": "c222111d-2e1d-4ff5-8102-e0a822e48438", "DetectTime": "2023-10-30T14:12:29.973072+02:00", "EventTime": "2023-10-30T14:12:29.973087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CU7pjU1cScHId2qHC3"]} -{"Format": "Json", "ID": "c222111d-2e1d-4ff5-8102-e0a822e48438", "DetectTime": "2023-10-30T14:12:29.973072+02:00", "EventTime": "2023-10-30T14:12:29.973087+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:50:25.350761+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:30.030300)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fc327874-2d4e-4c12-80b1-d5b85ae4a49d", "DetectTime": "2023-10-30T14:12:30.035039+02:00", "EventTime": "2023-10-30T14:12:30.035054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CMp8OgYpXzHqCQ3mk"]} -{"Format": "IDEA0", "ID": "b200ed87-ea83-4413-b9ad-f4860e6f2a59", "DetectTime": "2023-10-30T14:12:30.060398+02:00", "EventTime": "2023-10-30T14:12:30.060418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CGqHWn242SjBi4tIy7"]} -{"Format": "IDEA0", "ID": "dc85f1c2-7b61-4a87-8b2f-0c30b0886a0f", "DetectTime": "2023-10-30T14:12:30.086938+02:00", "EventTime": "2023-10-30T14:12:30.086956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CU64Fy1YlyMOpo3YLd"]} -{"Format": "IDEA0", "ID": "1e545c04-c750-464f-8a68-527224e38565", "DetectTime": "2023-10-30T14:12:30.114074+02:00", "EventTime": "2023-10-30T14:12:30.114092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CoqOte2fhhOPGYtqKg"]} -{"Format": "IDEA0", "ID": "dcfc5b48-1e27-4722-81e8-fef870982e2d", "DetectTime": "2023-10-30T14:12:30.138223+02:00", "EventTime": "2023-10-30T14:12:30.138245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CcszwC12qK1CG1KgR8"]} -{"Format": "IDEA0", "ID": "36b9216a-a3dc-4b2a-a4a4-f7a0040618b6", "DetectTime": "2023-10-30T14:12:30.164474+02:00", "EventTime": "2023-10-30T14:12:30.164490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CbreDLvwrnuypM7yh"]} -{"Format": "IDEA0", "ID": "b4f1d15e-0027-4058-a3e6-616bc4e371ce", "DetectTime": "2023-10-30T14:12:30.193313+02:00", "EventTime": "2023-10-30T14:12:30.193333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CUwQ5d373hEmsLumAc"]} -{"Format": "IDEA0", "ID": "3c39934f-5dea-4325-ba60-8ac38ae10be2", "DetectTime": "2023-10-30T14:12:30.218008+02:00", "EventTime": "2023-10-30T14:12:30.218034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CGu7NW3mXZTA4GXOUe"]} -{"Format": "IDEA0", "ID": "47da9a6f-6124-4643-93d2-605e275a32c1", "DetectTime": "2023-10-30T14:12:30.241454+02:00", "EventTime": "2023-10-30T14:12:30.241467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C4lASf1Fdu3owptMIf"]} -{"Format": "Json", "ID": "47da9a6f-6124-4643-93d2-605e275a32c1", "DetectTime": "2023-10-30T14:12:30.241454+02:00", "EventTime": "2023-10-30T14:12:30.241467+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:50:27.232559+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:30.312200)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "08db9d43-7222-47dc-84b1-9f1e749decff", "DetectTime": "2023-10-30T14:12:30.317531+02:00", "EventTime": "2023-10-30T14:12:30.317547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ChrYSkieaJZoBHnb"]} -{"Format": "IDEA0", "ID": "30f02f60-4729-49c6-b12b-d23b940d8ade", "DetectTime": "2023-10-30T14:12:30.341080+02:00", "EventTime": "2023-10-30T14:12:30.341091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CHD3a54rUCm3izttD5"]} -{"Format": "IDEA0", "ID": "2320d085-68e7-40ac-bebb-c44eaf7e42cd", "DetectTime": "2023-10-30T14:12:30.364267+02:00", "EventTime": "2023-10-30T14:12:30.364278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVkeob1GUtKwSelbk2"]} -{"Format": "IDEA0", "ID": "75744934-a940-4edc-9821-352c9344f69d", "DetectTime": "2023-10-30T14:12:30.382860+02:00", "EventTime": "2023-10-30T14:12:30.382873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CYWNNkT0xHmvaoB79"]} -{"Format": "IDEA0", "ID": "d2439f9f-a50c-45e0-8a5e-489603ad966d", "DetectTime": "2023-10-30T14:12:30.405389+02:00", "EventTime": "2023-10-30T14:12:30.405400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cy1LNH141auAWTFLK2"]} -{"Format": "IDEA0", "ID": "b57f48e4-f7a7-47eb-80f0-da7000178825", "DetectTime": "2023-10-30T14:12:30.424714+02:00", "EventTime": "2023-10-30T14:12:30.424728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CkwT1Hj4NKrfKjQpk"]} -{"Format": "IDEA0", "ID": "412e251f-35d3-42d3-a454-275dae2ba8b2", "DetectTime": "2023-10-30T14:12:30.445312+02:00", "EventTime": "2023-10-30T14:12:30.445325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CmzEtk4fF09ypQ0Qkj"]} -{"Format": "IDEA0", "ID": "da72dcc4-49d9-4ac0-9f91-740b62dc9e25", "DetectTime": "2023-10-30T14:12:30.466079+02:00", "EventTime": "2023-10-30T14:12:30.466090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CjKJNW3FWXlQj95ECg"]} -{"Format": "IDEA0", "ID": "2cbafcc3-3894-4c9e-89a5-58d99ffe3cea", "DetectTime": "2023-10-30T14:12:30.487663+02:00", "EventTime": "2023-10-30T14:12:30.487674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CFR9hl1GNq9rGNepj9"]} -{"Format": "IDEA0", "ID": "0d87c7ca-ea4f-495b-841f-851e6ede7b2a", "DetectTime": "2023-10-30T14:12:30.591564+02:00", "EventTime": "2023-10-30T14:12:30.591588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLS1yE1upnIAraZIPc"]} -{"Format": "Json", "ID": "0d87c7ca-ea4f-495b-841f-851e6ede7b2a", "DetectTime": "2023-10-30T14:12:30.591564+02:00", "EventTime": "2023-10-30T14:12:30.591588+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T14:50:29.042375+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2023/10/30 14:12:30.661056)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b2a6317c-e490-4064-b927-86be87ca1e09", "DetectTime": "2023-10-30T14:12:30.666565+02:00", "EventTime": "2023-10-30T14:12:30.666580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CF100f2fRI9a4Nt1Xd"]} -{"Format": "IDEA0", "ID": "2480a339-2b16-45fd-82cd-9a71c93ed805", "DetectTime": "2023-10-30T14:12:30.690455+02:00", "EventTime": "2023-10-30T14:12:30.690473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUsNcG1KR3LbzrNQvh"]} -{"Format": "IDEA0", "ID": "07bb4169-9f25-4cc8-b6d5-160a8b7fc06a", "DetectTime": "2023-10-30T14:12:30.712289+02:00", "EventTime": "2023-10-30T14:12:30.712306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CQNNl62SvcVg3uFIV3"]} -{"Format": "IDEA0", "ID": "c69396a4-fadc-44a1-b724-ae9e465767ff", "DetectTime": "2023-10-30T14:12:30.733053+02:00", "EventTime": "2023-10-30T14:12:30.733064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CuFjWm1aY4DFNpLcDj"]} -{"Format": "IDEA0", "ID": "c4221bc9-b67a-44af-9b71-25fd61a5f490", "DetectTime": "2023-10-30T14:12:30.758654+02:00", "EventTime": "2023-10-30T14:12:30.758669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVvcWo3aXGJrmnSdle"]} -{"Format": "IDEA0", "ID": "549a3053-8424-4287-8aaa-506c3c9ce2ab", "DetectTime": "2023-10-30T14:12:30.780496+02:00", "EventTime": "2023-10-30T14:12:30.780506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CSlKx420hKMyVqYS9i"]} -{"Format": "IDEA0", "ID": "ee0cbaef-8cd8-4969-862a-77e2760743f1", "DetectTime": "2023-10-30T14:12:30.817837+02:00", "EventTime": "2023-10-30T14:12:30.817854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C9hRjk31FPvK7w1e9"]} -{"Format": "IDEA0", "ID": "658e17b5-c49b-4237-940c-59a02b6d0f64", "DetectTime": "2023-10-30T14:12:30.854977+02:00", "EventTime": "2023-10-30T14:12:30.855004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CjYLSz31gtWrnwu5wb"]} -{"Format": "IDEA0", "ID": "a83bf4ae-1d20-4dc9-97ba-5c02954fa36f", "DetectTime": "2023-10-30T14:12:30.894563+02:00", "EventTime": "2023-10-30T14:12:30.894578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CxExK94oOgwxxYTJD7"]} -{"Format": "IDEA0", "ID": "0abf048a-a0e5-4f36-b53b-03c7bc555070", "DetectTime": "2023-10-30T14:12:30.932467+02:00", "EventTime": "2023-10-30T14:12:30.932557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CY1ljj2mb8toAP07I9"]} -{"Format": "IDEA0", "ID": "8badb305-771d-4628-bbe7-4d2578211961", "DetectTime": "2023-10-30T14:12:30.974556+02:00", "EventTime": "2023-10-30T14:12:30.974576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cq444Mfb6o9Rr2MR"]} -{"Format": "IDEA0", "ID": "b0ded1f8-144b-4ca8-9318-219497d9e085", "DetectTime": "2023-10-30T14:12:31.013291+02:00", "EventTime": "2023-10-30T14:12:31.013311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CFlGjhiyRFTPJUMxb"]} -{"Format": "IDEA0", "ID": "ac32b585-9ea5-4ab3-9a4e-ebf671a6bb4d", "DetectTime": "2023-10-30T14:12:31.049281+02:00", "EventTime": "2023-10-30T14:12:31.049306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CD1QYs47QoWfH0jxzc"]} -{"Format": "Json", "ID": "ac32b585-9ea5-4ab3-9a4e-ebf671a6bb4d", "DetectTime": "2023-10-30T14:12:31.049281+02:00", "EventTime": "2023-10-30T14:12:31.049306+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:20:57.066129+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:31.129041)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "87c88f45-efdb-47f8-b906-4bd33ddb9d70", "DetectTime": "2023-10-30T14:12:31.134996+02:00", "EventTime": "2023-10-30T14:12:31.135013+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CKCBc22Pnmc9GZLVdh"]} -{"Format": "IDEA0", "ID": "5b01565d-e594-45cf-b310-0d52e1242281", "DetectTime": "2023-10-30T14:12:31.163213+02:00", "EventTime": "2023-10-30T14:12:31.163235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CkTKwLfbeL3ebUEb1"]} -{"Format": "IDEA0", "ID": "89f3cb17-4a11-44c4-9311-616a03ed034f", "DetectTime": "2023-10-30T14:12:31.197896+02:00", "EventTime": "2023-10-30T14:12:31.197914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CZuRTW13B4fXlapUs4"]} -{"Format": "IDEA0", "ID": "aa4f9d9a-32fa-465b-b5fc-a0762c5ba70e", "DetectTime": "2023-10-30T14:12:31.229700+02:00", "EventTime": "2023-10-30T14:12:31.229716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cl9DmJ30gmMJD27vpk"]} -{"Format": "IDEA0", "ID": "ea64ec5c-8d71-4e52-8c63-5f50b1ee5c77", "DetectTime": "2023-10-30T14:12:31.263781+02:00", "EventTime": "2023-10-30T14:12:31.263792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CQ7AhYQkYUfBd8Ike"]} -{"Format": "IDEA0", "ID": "f88f2600-8d23-428c-8c68-f9ed666a6672", "DetectTime": "2023-10-30T14:12:31.298034+02:00", "EventTime": "2023-10-30T14:12:31.298049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C1dkphtSkt76clM7"]} -{"Format": "IDEA0", "ID": "4c6c284f-8f60-4700-8c4f-4746f6283c11", "DetectTime": "2023-10-30T14:12:31.333062+02:00", "EventTime": "2023-10-30T14:12:31.333073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CLO7aS2KT4HXp2lla1"]} -{"Format": "IDEA0", "ID": "32604c8b-f9a4-4b85-96d2-7a25cb40b228", "DetectTime": "2023-10-30T14:12:31.369909+02:00", "EventTime": "2023-10-30T14:12:31.369925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CxaDRnhA9L5oxsf42"]} -{"Format": "IDEA0", "ID": "e55086ba-6039-4a62-8fb3-d0a6185b7334", "DetectTime": "2023-10-30T14:12:31.405453+02:00", "EventTime": "2023-10-30T14:12:31.405468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C4N05b4hOTBE2OMdob"]} -{"Format": "Json", "ID": "e55086ba-6039-4a62-8fb3-d0a6185b7334", "DetectTime": "2023-10-30T14:12:31.405453+02:00", "EventTime": "2023-10-30T14:12:31.405468+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:20:58.927566+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:31.482866)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "82cb4eca-538a-4f39-881e-bf1740ad6437", "DetectTime": "2023-10-30T14:12:31.488124+02:00", "EventTime": "2023-10-30T14:12:31.488139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CtZLAn21PeSNbF7qT9"]} -{"Format": "IDEA0", "ID": "e85668ef-4f57-470c-8f44-f53b4551d7e5", "DetectTime": "2023-10-30T14:12:31.522991+02:00", "EventTime": "2023-10-30T14:12:31.523008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CnAxYl148O0sEEjbyb"]} -{"Format": "IDEA0", "ID": "60d16ec6-863c-46a9-af9d-0418a533a345", "DetectTime": "2023-10-30T14:12:31.556806+02:00", "EventTime": "2023-10-30T14:12:31.556820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CCcJDg2Dn96rRiTkak"]} -{"Format": "IDEA0", "ID": "7a1c2e92-40df-4a85-9caf-22bba1eea474", "DetectTime": "2023-10-30T14:12:31.594032+02:00", "EventTime": "2023-10-30T14:12:31.594048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C8MlD72iYtVvNEZlwl"]} -{"Format": "IDEA0", "ID": "609403e5-68de-4f23-8399-a1f5af8bf466", "DetectTime": "2023-10-30T14:12:31.625646+02:00", "EventTime": "2023-10-30T14:12:31.625661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CciJPY2faEsaG8Bbd"]} -{"Format": "IDEA0", "ID": "7d069b0e-7890-46a5-a46f-a4b6d53a1ad1", "DetectTime": "2023-10-30T14:12:31.652932+02:00", "EventTime": "2023-10-30T14:12:31.652957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CZc4qi4ksBZcUGa2y6"]} -{"Format": "IDEA0", "ID": "227595f8-97b5-48dd-a9d1-32d73b4843b7", "DetectTime": "2023-10-30T14:12:31.686934+02:00", "EventTime": "2023-10-30T14:12:31.686950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CzacVU2y5fJne9wWu3"]} -{"Format": "IDEA0", "ID": "5332b860-f715-4c3e-8f95-72f6be761463", "DetectTime": "2023-10-30T14:12:31.720483+02:00", "EventTime": "2023-10-30T14:12:31.720499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CIYV211W13aPDQFpy1"]} -{"Format": "IDEA0", "ID": "d30af2ba-7320-48cb-bab6-fa3e8cbe004b", "DetectTime": "2023-10-30T14:12:31.748239+02:00", "EventTime": "2023-10-30T14:12:31.748253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CoVG3v1UEAqQe8IiDe"]} -{"Format": "Json", "ID": "d30af2ba-7320-48cb-bab6-fa3e8cbe004b", "DetectTime": "2023-10-30T14:12:31.748239+02:00", "EventTime": "2023-10-30T14:12:31.748253+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:21:01.715126+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:31.821839)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1eb55cb7-418e-4721-9182-69b37896f11f", "DetectTime": "2023-10-30T14:12:31.827424+02:00", "EventTime": "2023-10-30T14:12:31.827440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CK2xVe3LHvQpYRJ2Hd"]} -{"Format": "IDEA0", "ID": "cc79799a-82cc-4b2b-a23a-c3149c0d8ced", "DetectTime": "2023-10-30T14:12:31.856697+02:00", "EventTime": "2023-10-30T14:12:31.856714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CEqlnj1EJH7bwVvfS4"]} -{"Format": "IDEA0", "ID": "1df5e687-41ea-4208-a8b7-811b9da1430e", "DetectTime": "2023-10-30T14:12:31.881435+02:00", "EventTime": "2023-10-30T14:12:31.881452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CKQ53o4618uNkxPaA5"]} -{"Format": "IDEA0", "ID": "560a4f66-2613-43b2-9e49-95999a41563f", "DetectTime": "2023-10-30T14:12:31.909587+02:00", "EventTime": "2023-10-30T14:12:31.909606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CVRCpqUDRIYOuntl6"]} -{"Format": "IDEA0", "ID": "92238d1b-272a-4111-a998-3974127a93bb", "DetectTime": "2023-10-30T14:12:31.935738+02:00", "EventTime": "2023-10-30T14:12:31.935754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cci3wq3AvNx3kakPp9"]} -{"Format": "IDEA0", "ID": "027b83b9-df2d-4f25-9ef3-b956d0608894", "DetectTime": "2023-10-30T14:12:31.965401+02:00", "EventTime": "2023-10-30T14:12:31.965419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C0hqcl3taaW57ZOfB"]} -{"Format": "IDEA0", "ID": "8992e622-840b-41f4-aa08-b3b4409859a7", "DetectTime": "2023-10-30T14:12:31.993676+02:00", "EventTime": "2023-10-30T14:12:31.993692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFrnBp3G1pvzcW1m0f"]} -{"Format": "IDEA0", "ID": "2dbce83f-721b-4b09-b03d-493ddf241293", "DetectTime": "2023-10-30T14:12:32.024441+02:00", "EventTime": "2023-10-30T14:12:32.024459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CPlWZt3vToKTFYkKs2"]} -{"Format": "Json", "ID": "2dbce83f-721b-4b09-b03d-493ddf241293", "DetectTime": "2023-10-30T14:12:32.024441+02:00", "EventTime": "2023-10-30T14:12:32.024459+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:51:31.430118+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:32.104382)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86cd3e7a-deaa-48a1-8cee-d3f9a37043d3", "DetectTime": "2023-10-30T14:12:32.110025+02:00", "EventTime": "2023-10-30T14:12:32.110046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cwc4154KHYzYXU0Rtl"]} -{"Format": "IDEA0", "ID": "b609464e-b328-4485-9b77-1ce38b651fe5", "DetectTime": "2023-10-30T14:12:32.138280+02:00", "EventTime": "2023-10-30T14:12:32.138290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CBd40b4jsSuwKtB31c"]} -{"Format": "IDEA0", "ID": "800d00bc-cae8-47e2-aff2-5019cd053d87", "DetectTime": "2023-10-30T14:12:32.162820+02:00", "EventTime": "2023-10-30T14:12:32.162834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CgZCk636yrzlWLaAgk"]} -{"Format": "IDEA0", "ID": "ecf2c704-9aa6-4d37-ba63-2e98e5a648f7", "DetectTime": "2023-10-30T14:12:32.188174+02:00", "EventTime": "2023-10-30T14:12:32.188186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CotX9hhDg8r2cRa9l"]} -{"Format": "IDEA0", "ID": "05273a9f-5407-4b7d-82a4-8fb2d810854b", "DetectTime": "2023-10-30T14:12:32.211697+02:00", "EventTime": "2023-10-30T14:12:32.211712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CWGiaw41L3dAHIcCF6"]} -{"Format": "IDEA0", "ID": "70dcfc47-3874-4216-9c33-475b4f36aa50", "DetectTime": "2023-10-30T14:12:32.234795+02:00", "EventTime": "2023-10-30T14:12:32.234812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cr1yjBn7RfQWNTcld"]} -{"Format": "IDEA0", "ID": "a6f69fd1-12c1-4d99-a40d-e66dd9bed011", "DetectTime": "2023-10-30T14:12:32.260107+02:00", "EventTime": "2023-10-30T14:12:32.260118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CfAG0q1qeIvgK9TyAg"]} -{"Format": "IDEA0", "ID": "d24892a3-a68a-470e-9109-e4b2d44df8e0", "DetectTime": "2023-10-30T14:12:32.282913+02:00", "EventTime": "2023-10-30T14:12:32.282933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cv2wJb2qimhjMeLETa"]} -{"Format": "IDEA0", "ID": "2bfecd22-757f-47d2-9dfd-509964ccc9c8", "DetectTime": "2023-10-30T14:12:32.307943+02:00", "EventTime": "2023-10-30T14:12:32.307959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CGytjkzvyqnBVMnne"]} -{"Format": "Json", "ID": "2bfecd22-757f-47d2-9dfd-509964ccc9c8", "DetectTime": "2023-10-30T14:12:32.307943+02:00", "EventTime": "2023-10-30T14:12:32.307959+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:51:33.736313+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:32.374134)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c34f9cf1-5ddb-4f9e-8199-42b0859c4e66", "DetectTime": "2023-10-30T14:12:32.379193+02:00", "EventTime": "2023-10-30T14:12:32.379211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Co0K6KJQ8RQMdJiUg"]} -{"Format": "IDEA0", "ID": "33c2c673-0304-46af-a3d6-296f2455d241", "DetectTime": "2023-10-30T14:12:32.405254+02:00", "EventTime": "2023-10-30T14:12:32.405272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CsQzsD2QmQ7MLPeAke"]} -{"Format": "IDEA0", "ID": "90b46f98-03a4-4df3-b046-3b9788da33c4", "DetectTime": "2023-10-30T14:12:32.431617+02:00", "EventTime": "2023-10-30T14:12:32.431643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C8c6jA3q1lGVjxhT4b"]} -{"Format": "IDEA0", "ID": "5d3eab26-5426-4aad-91a2-01651d5de210", "DetectTime": "2023-10-30T14:12:32.457579+02:00", "EventTime": "2023-10-30T14:12:32.457595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHbL6Y1ZRUQkt7E5fl"]} -{"Format": "IDEA0", "ID": "4cf49963-e71c-42d3-955a-f91c160dad8f", "DetectTime": "2023-10-30T14:12:32.483033+02:00", "EventTime": "2023-10-30T14:12:32.483045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CYqama2KOC9aQ8bYLk"]} -{"Format": "IDEA0", "ID": "f99c24c9-c3a2-4ceb-8ad5-1290faba8d28", "DetectTime": "2023-10-30T14:12:32.506978+02:00", "EventTime": "2023-10-30T14:12:32.507003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cw05uO3mPfosZVEw7e"]} -{"Format": "IDEA0", "ID": "5e4444f4-b157-4f35-af25-a20cf7aceaa0", "DetectTime": "2023-10-30T14:12:32.528676+02:00", "EventTime": "2023-10-30T14:12:32.528686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C5MYemjEgTKdr4Z9k"]} -{"Format": "IDEA0", "ID": "a7b3ae74-9b76-437a-9832-2259a105b237", "DetectTime": "2023-10-30T14:12:32.551940+02:00", "EventTime": "2023-10-30T14:12:32.551958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CRji8k1jwGqtWdQdbh"]} -{"Format": "Json", "ID": "a7b3ae74-9b76-437a-9832-2259a105b237", "DetectTime": "2023-10-30T14:12:32.551940+02:00", "EventTime": "2023-10-30T14:12:32.551958+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:51:35.625771+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:32.611067)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f892cbb0-91b2-409e-a918-7e9e250f57f3", "DetectTime": "2023-10-30T14:12:32.616200+02:00", "EventTime": "2023-10-30T14:12:32.616216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CDItiSXVUzg97CMBf"]} -{"Format": "IDEA0", "ID": "8c48a5f5-7101-46dd-b424-851df561e9ab", "DetectTime": "2023-10-30T14:12:32.638565+02:00", "EventTime": "2023-10-30T14:12:32.638580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C4aff0338DDvZ8Lr0d"]} -{"Format": "IDEA0", "ID": "c3904668-4778-40a5-9dee-3412a282b2c1", "DetectTime": "2023-10-30T14:12:32.658108+02:00", "EventTime": "2023-10-30T14:12:32.658135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ClrZXR27OyssSA8kz"]} -{"Format": "IDEA0", "ID": "1e183f81-6e5f-474e-94a2-2e9d928af538", "DetectTime": "2023-10-30T14:12:32.679186+02:00", "EventTime": "2023-10-30T14:12:32.679200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C85KyC3xgYxUBzWZtl"]} -{"Format": "IDEA0", "ID": "93084977-cd4b-44d6-8d3a-91316b4f88ae", "DetectTime": "2023-10-30T14:12:32.699910+02:00", "EventTime": "2023-10-30T14:12:32.699921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CIne5I3iVGpT9uyvQ1"]} -{"Format": "IDEA0", "ID": "4605955d-8370-48a3-a661-e395e8d1a8c3", "DetectTime": "2023-10-30T14:12:32.722226+02:00", "EventTime": "2023-10-30T14:12:32.722244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CtRPxo47zl5eYJVong"]} -{"Format": "IDEA0", "ID": "7bcc933e-03b7-47a1-adc0-b76d8d8153f1", "DetectTime": "2023-10-30T14:12:32.743611+02:00", "EventTime": "2023-10-30T14:12:32.743623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CueClc4mQXLK6GyQHk"]} -{"Format": "IDEA0", "ID": "d2b07f77-c9b1-4a63-ba7a-eac10c65eafc", "DetectTime": "2023-10-30T14:12:32.768541+02:00", "EventTime": "2023-10-30T14:12:32.768566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CD2cud4RAmyne3krl4"]} -{"Format": "Json", "ID": "d2b07f77-c9b1-4a63-ba7a-eac10c65eafc", "DetectTime": "2023-10-30T14:12:32.768541+02:00", "EventTime": "2023-10-30T14:12:32.768566+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T15:51:37.488557+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2023/10/30 14:12:32.829784)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a6ca8168-f07b-4fe3-886f-22135b33377d", "DetectTime": "2023-10-30T14:12:32.834307+02:00", "EventTime": "2023-10-30T14:12:32.834324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CmsNtpwAYEGHf6lD1"]} -{"Format": "IDEA0", "ID": "f8492f85-5bda-4a4c-b8ff-12c2185f1a9c", "DetectTime": "2023-10-30T14:12:32.855242+02:00", "EventTime": "2023-10-30T14:12:32.855257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cg9N7E16xO6DC4amd2"]} -{"Format": "IDEA0", "ID": "840f8fd3-acf4-401b-81e6-5055570a66ad", "DetectTime": "2023-10-30T14:12:32.874978+02:00", "EventTime": "2023-10-30T14:12:32.874991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CLu8fQ1RRG9PaXQHwa"]} -{"Format": "IDEA0", "ID": "157beb64-9314-4eee-86ff-2c491223746a", "DetectTime": "2023-10-30T14:12:32.893277+02:00", "EventTime": "2023-10-30T14:12:32.893293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CjevegBDsSIApTdOi"]} -{"Format": "IDEA0", "ID": "bce3185f-8aea-4188-97c5-6177e33f54c9", "DetectTime": "2023-10-30T14:12:32.913344+02:00", "EventTime": "2023-10-30T14:12:32.913360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CDh7X93NTuX8Jyrfr3"]} -{"Format": "IDEA0", "ID": "4dca304e-f8e5-47cb-97b5-9c0139dcb8a0", "DetectTime": "2023-10-30T14:12:32.932813+02:00", "EventTime": "2023-10-30T14:12:32.932825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cgf6W421Xhd5QHM672"]} -{"Format": "IDEA0", "ID": "94a87fb4-cf7f-40aa-9cd4-d0d517551a9c", "DetectTime": "2023-10-30T14:12:32.956046+02:00", "EventTime": "2023-10-30T14:12:32.956058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBT01d40BtNXx4uE3d"]} -{"Format": "IDEA0", "ID": "5e3e417a-feb8-4815-9596-7f30580adeb6", "DetectTime": "2023-10-30T14:12:32.975015+02:00", "EventTime": "2023-10-30T14:12:32.975028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CnWLXR1GP6f6qedGl4"]} -{"Format": "IDEA0", "ID": "2576f3cb-0227-41ba-9aba-d217873bd9ef", "DetectTime": "2023-10-30T14:12:33.010361+02:00", "EventTime": "2023-10-30T14:12:33.010381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CvM2WG1ZlL6eHHM3gg"]} -{"Format": "IDEA0", "ID": "22017a83-4a36-4da4-abf7-912124805df3", "DetectTime": "2023-10-30T14:12:33.043617+02:00", "EventTime": "2023-10-30T14:12:33.043628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cj8hxG11c9q8QKnnFf"]} -{"Format": "IDEA0", "ID": "068f213a-5b0b-45b6-913b-a696f4a7f363", "DetectTime": "2023-10-30T14:12:33.080152+02:00", "EventTime": "2023-10-30T14:12:33.080168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5008], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. ", "ContentType": "text/plain"}], "uids": ["CMxvmn459YX5Ftmm83"]} -{"Format": "IDEA0", "ID": "01804ea6-d33e-4638-bc5b-08c0a452f366", "DetectTime": "2023-10-30T14:12:33.113081+02:00", "EventTime": "2023-10-30T14:12:33.113097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CIFCYO2ODMroEnIkul"]} -{"Format": "IDEA0", "ID": "ca26c228-94cb-48e5-8706-55dbf3680032", "DetectTime": "2023-10-30T14:12:33.147335+02:00", "EventTime": "2023-10-30T14:12:33.147347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C5FMyJ35RYAaL1yEXd"]} -{"Format": "IDEA0", "ID": "0cac50c7-5c42-4a25-8fbc-c075c9d063d4", "DetectTime": "2023-10-30T14:12:33.181219+02:00", "EventTime": "2023-10-30T14:12:33.181234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CnVe7g1ZLSpZTQutQf"]} -{"Format": "Json", "ID": "0cac50c7-5c42-4a25-8fbc-c075c9d063d4", "DetectTime": "2023-10-30T14:12:33.181219+02:00", "EventTime": "2023-10-30T14:12:33.181234+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T16:21:52.722983+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:33.262512)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6dab0d2b-b1c0-45c0-bd96-59dc92b51820", "DetectTime": "2023-10-30T14:12:33.267323+02:00", "EventTime": "2023-10-30T14:12:33.267341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CsNg3w3qjuFqqpubc8"]} -{"Format": "IDEA0", "ID": "54a0cc87-7e4c-47d4-b389-097377517969", "DetectTime": "2023-10-30T14:12:33.302308+02:00", "EventTime": "2023-10-30T14:12:33.302324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CdOjPlZj6GcOpxdJ3"]} -{"Format": "IDEA0", "ID": "009812f3-06c8-468d-b34e-cfe560a6e3af", "DetectTime": "2023-10-30T14:12:33.334203+02:00", "EventTime": "2023-10-30T14:12:33.334229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CGXwrQThRJawpcrme"]} -{"Format": "IDEA0", "ID": "6b6364cc-9efe-4406-80ec-a231d80c362e", "DetectTime": "2023-10-30T14:12:33.366290+02:00", "EventTime": "2023-10-30T14:12:33.366306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CBROzH1lUq99p4ah3c"]} -{"Format": "IDEA0", "ID": "4cbeb699-f2b0-456c-ab19-7590a29fc7fb", "DetectTime": "2023-10-30T14:12:33.401200+02:00", "EventTime": "2023-10-30T14:12:33.401215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0eEVb3U0mUn8JqCJi"]} -{"Format": "IDEA0", "ID": "7e19e3dd-2098-4b31-93a3-628e6ac7987b", "DetectTime": "2023-10-30T14:12:33.435536+02:00", "EventTime": "2023-10-30T14:12:33.435555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CV8EUjzLP2NC8URkb"]} -{"Format": "IDEA0", "ID": "9e289744-e108-4fcf-bf26-ce4dc5880273", "DetectTime": "2023-10-30T14:12:33.469371+02:00", "EventTime": "2023-10-30T14:12:33.469382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C0n19B2N9sRy5xAIPi"]} -{"Format": "IDEA0", "ID": "c8debdd5-0629-4f81-b1ea-f9c1c64ddf5b", "DetectTime": "2023-10-30T14:12:33.505681+02:00", "EventTime": "2023-10-30T14:12:33.505696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CcLnuLXEjIyKaSiJ2"]} -{"Format": "Json", "ID": "c8debdd5-0629-4f81-b1ea-f9c1c64ddf5b", "DetectTime": "2023-10-30T14:12:33.505681+02:00", "EventTime": "2023-10-30T14:12:33.505696+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T16:21:54.767605+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:33.579099)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "db195842-09a5-480d-99de-5ca4b95bb4cb", "DetectTime": "2023-10-30T14:12:33.583984+02:00", "EventTime": "2023-10-30T14:12:33.583999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C2aiBl2fH9dwjcj2se"]} -{"Format": "IDEA0", "ID": "1711eabf-5df3-4515-8807-2758b8e40650", "DetectTime": "2023-10-30T14:12:33.613608+02:00", "EventTime": "2023-10-30T14:12:33.613618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C6iMz21ZiCcqWEZ6vj"]} -{"Format": "IDEA0", "ID": "0dad2b64-4f1c-4d53-bc11-1f0321aeeb1e", "DetectTime": "2023-10-30T14:12:33.635950+02:00", "EventTime": "2023-10-30T14:12:33.635973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cg8xN927buMLbbMZyg"]} -{"Format": "IDEA0", "ID": "44a924cd-e3bf-4583-997d-d2cb9e64fc07", "DetectTime": "2023-10-30T14:12:33.665357+02:00", "EventTime": "2023-10-30T14:12:33.665374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CsJM971f1XyDWO67pa"]} -{"Format": "IDEA0", "ID": "98d6482c-6784-4275-bb1e-e7af51daad66", "DetectTime": "2023-10-30T14:12:33.694067+02:00", "EventTime": "2023-10-30T14:12:33.694083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cm2YNt2MBit24oHUwk"]} -{"Format": "IDEA0", "ID": "81b88eb8-0c58-45b4-ad41-a9e2c2b22bd7", "DetectTime": "2023-10-30T14:12:33.721430+02:00", "EventTime": "2023-10-30T14:12:33.721445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ClA87W2By0oeI1LyGi"]} -{"Format": "IDEA0", "ID": "e7a6bbeb-0dc5-470a-adf0-8cfe27373744", "DetectTime": "2023-10-30T14:12:33.748766+02:00", "EventTime": "2023-10-30T14:12:33.748785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C2oaUe1hbY2I0fyYB8"]} -{"Format": "IDEA0", "ID": "a2e37d55-8366-4e02-8d75-24d2e2763a1a", "DetectTime": "2023-10-30T14:12:33.781268+02:00", "EventTime": "2023-10-30T14:12:33.781284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CAHG9f17rMDN7WDeS3"]} -{"Format": "IDEA0", "ID": "cc5c9c5b-7079-4510-b143-5dd25ca199ba", "DetectTime": "2023-10-30T14:12:33.809043+02:00", "EventTime": "2023-10-30T14:12:33.809062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CAJWJA3eXM8Zbm3Ax4"]} -{"Format": "Json", "ID": "cc5c9c5b-7079-4510-b143-5dd25ca199ba", "DetectTime": "2023-10-30T14:12:33.809043+02:00", "EventTime": "2023-10-30T14:12:33.809062+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T16:21:56.688328+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:33.876768)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4092fb83-dd91-4aa8-b20b-811ffd1abbf6", "DetectTime": "2023-10-30T14:12:33.882237+02:00", "EventTime": "2023-10-30T14:12:33.882262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CjBaqxvhpp4Cw9IFg"]} -{"Format": "IDEA0", "ID": "093fef6f-5f5d-417c-b84d-61b2611b85e8", "DetectTime": "2023-10-30T14:12:33.906717+02:00", "EventTime": "2023-10-30T14:12:33.906728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CBTs0MuczCk8pSPTj"]} -{"Format": "IDEA0", "ID": "46bf33d9-fdb4-4678-b982-14596ce37f09", "DetectTime": "2023-10-30T14:12:33.936852+02:00", "EventTime": "2023-10-30T14:12:33.936869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CjHemy3hI1jqokNV5f"]} -{"Format": "IDEA0", "ID": "cc5221bb-a695-46a6-b78c-c4b2dae46d9c", "DetectTime": "2023-10-30T14:12:33.964536+02:00", "EventTime": "2023-10-30T14:12:33.964551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cp2gmAzGyvmHgfIGk"]} -{"Format": "IDEA0", "ID": "24e38e4e-4a61-4fa3-ac69-215e6183f4d7", "DetectTime": "2023-10-30T14:12:33.991286+02:00", "EventTime": "2023-10-30T14:12:33.991313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C5hDKi4m4n5TOjgPwc"]} -{"Format": "IDEA0", "ID": "d26c64b2-6d21-4ad5-b77d-0a7879bb47ee", "DetectTime": "2023-10-30T14:12:34.017432+02:00", "EventTime": "2023-10-30T14:12:34.017450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["COLpPl1aWerV53XDe5"]} -{"Format": "IDEA0", "ID": "cb6fc751-7956-4cdb-b7e2-5e49fb923750", "DetectTime": "2023-10-30T14:12:34.043652+02:00", "EventTime": "2023-10-30T14:12:34.043671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C2kwV11uw6qeclfEdj"]} -{"Format": "IDEA0", "ID": "57fd3cc0-4214-4f8c-b3ee-fb8da531af0d", "DetectTime": "2023-10-30T14:12:34.072716+02:00", "EventTime": "2023-10-30T14:12:34.072732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3fFpN3DB3WdQOCAx6"]} -{"Format": "Json", "ID": "57fd3cc0-4214-4f8c-b3ee-fb8da531af0d", "DetectTime": "2023-10-30T14:12:34.072716+02:00", "EventTime": "2023-10-30T14:12:34.072732+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-08T16:29:04.309130+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:34.219800)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d493e7c6-5cdc-4bb4-9cd5-41025965e48a", "DetectTime": "2023-10-30T14:12:34.224852+02:00", "EventTime": "2023-10-30T14:12:34.224869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C2h6U23xV2zlgJGI1f"]} -{"Format": "IDEA0", "ID": "eee9c7d6-7671-418e-8218-fb2b12c61012", "DetectTime": "2023-10-30T14:12:34.255365+02:00", "EventTime": "2023-10-30T14:12:34.255380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C4Ayxj2iZwJqBjABNd"]} -{"Format": "IDEA0", "ID": "930a9df8-ad29-48aa-a5e3-d6f115e94472", "DetectTime": "2023-10-30T14:12:34.284224+02:00", "EventTime": "2023-10-30T14:12:34.284237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CdmYdM3U39c6wlyUMc"]} -{"Format": "IDEA0", "ID": "84b79df6-c3f7-4b0d-937c-0038da8536af", "DetectTime": "2023-10-30T14:12:34.309942+02:00", "EventTime": "2023-10-30T14:12:34.309955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CmoiNF1JtVAWg48O26"]} -{"Format": "IDEA0", "ID": "38f63e0b-3623-4688-96df-65bf1ff3844e", "DetectTime": "2023-10-30T14:12:34.338975+02:00", "EventTime": "2023-10-30T14:12:34.338993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CucoLI1XE1NFy9FAe"]} -{"Format": "IDEA0", "ID": "cb04dd02-9a27-4f08-8583-c7ecbd187d59", "DetectTime": "2023-10-30T14:12:34.369220+02:00", "EventTime": "2023-10-30T14:12:34.369241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMdgvI1bvmGOafuDud"]} -{"Format": "IDEA0", "ID": "e32cab2a-fe6e-4238-96e5-7c0f8f5fd46d", "DetectTime": "2023-10-30T14:12:34.399804+02:00", "EventTime": "2023-10-30T14:12:34.399821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CqLxqT3JQByOTF7mW"]} -{"Format": "IDEA0", "ID": "fa43b69a-900b-446f-8e63-c131da8194d8", "DetectTime": "2023-10-30T14:12:34.428166+02:00", "EventTime": "2023-10-30T14:12:34.428181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CZECmP262px6PjmFEl"]} -{"Format": "Json", "ID": "fa43b69a-900b-446f-8e63-c131da8194d8", "DetectTime": "2023-10-30T14:12:34.428166+02:00", "EventTime": "2023-10-30T14:12:34.428181+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T16:52:43.335626+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:34.496839)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ef1b836-48cc-473c-ac65-23046a451238", "DetectTime": "2023-10-30T14:12:34.502562+02:00", "EventTime": "2023-10-30T14:12:34.502579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CHHcsX19mUkG66nhR8"]} -{"Format": "IDEA0", "ID": "072f2c91-bb14-44df-b864-32bd7d1e2598", "DetectTime": "2023-10-30T14:12:34.531350+02:00", "EventTime": "2023-10-30T14:12:34.531368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CEHieqFeMTqNWt0Ie"]} -{"Format": "IDEA0", "ID": "1a270d52-df50-47b8-9f4e-65166aed3c8a", "DetectTime": "2023-10-30T14:12:34.558847+02:00", "EventTime": "2023-10-30T14:12:34.558864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIw4yT2EQtuBUkM005"]} -{"Format": "IDEA0", "ID": "210c3c1b-b4b7-4b31-a8b2-b85a39d0c0bc", "DetectTime": "2023-10-30T14:12:34.583378+02:00", "EventTime": "2023-10-30T14:12:34.583395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cpbrzh4PkrM1TSg3q8"]} -{"Format": "IDEA0", "ID": "0a5e862d-5612-4403-8739-95dfd1cdb5a3", "DetectTime": "2023-10-30T14:12:34.609555+02:00", "EventTime": "2023-10-30T14:12:34.609570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CRDWsF4YgensHqDoFj"]} -{"Format": "IDEA0", "ID": "3aeb4d90-8809-496b-bb29-76b2b4c1d401", "DetectTime": "2023-10-30T14:12:34.634681+02:00", "EventTime": "2023-10-30T14:12:34.634694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CLLM8R1mMhqHowUB6k"]} -{"Format": "IDEA0", "ID": "c8ebf69a-26b5-4c3b-bc39-1522a6117588", "DetectTime": "2023-10-30T14:12:34.662418+02:00", "EventTime": "2023-10-30T14:12:34.662434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CizeC13KO3lT5ODyF7"]} -{"Format": "IDEA0", "ID": "37960986-0913-45d7-b944-5fc717fca4e3", "DetectTime": "2023-10-30T14:12:34.686722+02:00", "EventTime": "2023-10-30T14:12:34.686742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJVeqt2hd0AhOvlBc1"]} -{"Format": "IDEA0", "ID": "8cf63c1a-704b-4d6d-8ad4-2cfe384f1880", "DetectTime": "2023-10-30T14:12:34.713586+02:00", "EventTime": "2023-10-30T14:12:34.713602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CQtq382iazHoSTGATe"]} -{"Format": "Json", "ID": "8cf63c1a-704b-4d6d-8ad4-2cfe384f1880", "DetectTime": "2023-10-30T14:12:34.713586+02:00", "EventTime": "2023-10-30T14:12:34.713602+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T16:52:45.220001+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:34.784309)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9c947575-8835-4c4e-9607-b96cf7cb3dba", "DetectTime": "2023-10-30T14:12:34.788600+02:00", "EventTime": "2023-10-30T14:12:34.788616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CcsGOz1lx4WwsuKip9"]} -{"Format": "IDEA0", "ID": "93c3e344-1efa-4654-ab87-986c552279bc", "DetectTime": "2023-10-30T14:12:34.813736+02:00", "EventTime": "2023-10-30T14:12:34.813753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CyhbYm26mhGjydNYXl"]} -{"Format": "IDEA0", "ID": "70a2dbb2-cece-4a6d-96ba-ec4f56110628", "DetectTime": "2023-10-30T14:12:34.836388+02:00", "EventTime": "2023-10-30T14:12:34.836399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["ChQPPl3OMXmcXTRzHd"]} -{"Format": "IDEA0", "ID": "acad5561-8e6e-4791-a764-0c36f49867ab", "DetectTime": "2023-10-30T14:12:34.857055+02:00", "EventTime": "2023-10-30T14:12:34.857069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CLmVqL20AHTnyxlPcb"]} -{"Format": "IDEA0", "ID": "d89e86d8-4458-4767-94f4-c11d2509a36c", "DetectTime": "2023-10-30T14:12:34.880725+02:00", "EventTime": "2023-10-30T14:12:34.880742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CMtcSp4H3AACy7whNc"]} -{"Format": "IDEA0", "ID": "fd748111-1d53-4f5d-bc0b-220cfe6010b9", "DetectTime": "2023-10-30T14:12:34.905271+02:00", "EventTime": "2023-10-30T14:12:34.905286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CSFizF1e6ZY0YO0OZ4"]} -{"Format": "IDEA0", "ID": "64a9dac6-de9f-4b5c-bfbc-16fa6b4a4732", "DetectTime": "2023-10-30T14:12:34.929722+02:00", "EventTime": "2023-10-30T14:12:34.929742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CkFRZO2dFDdVlvq9fl"]} -{"Format": "IDEA0", "ID": "7e335c96-96c6-4c6c-b3c4-56a7e9bd4d2b", "DetectTime": "2023-10-30T14:12:34.954272+02:00", "EventTime": "2023-10-30T14:12:34.954289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CViVAJ1FVCgX7UjXBh"]} -{"Format": "Json", "ID": "7e335c96-96c6-4c6c-b3c4-56a7e9bd4d2b", "DetectTime": "2023-10-30T14:12:34.954272+02:00", "EventTime": "2023-10-30T14:12:34.954289+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T16:52:47.015743+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2023/10/30 14:12:35.014174)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e9eec72-7adb-4171-a13a-fdcece47df4b", "DetectTime": "2023-10-30T14:12:35.018701+02:00", "EventTime": "2023-10-30T14:12:35.018714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CtsjoN39IOsm6IsZDb"]} -{"Format": "IDEA0", "ID": "c77a79de-7616-496d-ab7f-833e45da7663", "DetectTime": "2023-10-30T14:12:35.039995+02:00", "EventTime": "2023-10-30T14:12:35.040012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJgCHK8G5b57ANLq3"]} -{"Format": "IDEA0", "ID": "c715b0c9-1b74-416b-9589-a50231174c2b", "DetectTime": "2023-10-30T14:12:35.062300+02:00", "EventTime": "2023-10-30T14:12:35.062316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CcHIW5bDRRbmeYcsl"]} -{"Format": "IDEA0", "ID": "0605cbb6-66ac-46d4-9110-eb7413769fed", "DetectTime": "2023-10-30T14:12:35.081927+02:00", "EventTime": "2023-10-30T14:12:35.081959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CISc1r3NO2Dy3Be1vf"]} -{"Format": "IDEA0", "ID": "0922b47f-4d5a-46a6-a3d1-388da7e312c7", "DetectTime": "2023-10-30T14:12:35.103896+02:00", "EventTime": "2023-10-30T14:12:35.103911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CagL5C155owFAoZsZ2"]} -{"Format": "IDEA0", "ID": "2e4a7f11-7a3c-433b-ab4e-f7820f407610", "DetectTime": "2023-10-30T14:12:35.128138+02:00", "EventTime": "2023-10-30T14:12:35.128154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYJZ3p11hLqFhzCVW8"]} -{"Format": "IDEA0", "ID": "92bdb661-f73e-488e-b630-39802aa6855d", "DetectTime": "2023-10-30T14:12:35.149472+02:00", "EventTime": "2023-10-30T14:12:35.149487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C31auo3kLM4E8uZH09"]} -{"Format": "IDEA0", "ID": "b5c3abdf-8832-4b5c-b76f-822730a09e42", "DetectTime": "2023-10-30T14:12:35.186696+02:00", "EventTime": "2023-10-30T14:12:35.186716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CXgXyV1MiPwmM0F2Ce"]} -{"Format": "IDEA0", "ID": "10016bf0-49df-42db-9d98-ab9123bc2718", "DetectTime": "2023-10-30T14:12:35.223471+02:00", "EventTime": "2023-10-30T14:12:35.223487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CXFgXB1ku3Jfjnrnfi"]} -{"Format": "IDEA0", "ID": "73299cae-f65e-4d37-8cf2-17ff57d78bc0", "DetectTime": "2023-10-30T14:12:35.260899+02:00", "EventTime": "2023-10-30T14:12:35.260926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cr2Zru4Glb6PtJbjE3"]} -{"Format": "IDEA0", "ID": "897233eb-ad7d-4c40-b7a4-40dbf11bcc54", "DetectTime": "2023-10-30T14:12:35.294003+02:00", "EventTime": "2023-10-30T14:12:35.294023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CZw3BU28qCvvZDArt"]} -{"Format": "IDEA0", "ID": "d7fd051e-31c6-4aad-aae0-37a886e073f3", "DetectTime": "2023-10-30T14:12:35.327909+02:00", "EventTime": "2023-10-30T14:12:35.327936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C7poy71VQITB9qwknh"]} -{"Format": "IDEA0", "ID": "1384b143-62a5-4ae1-97c1-d357e4412fd7", "DetectTime": "2023-10-30T14:12:35.365638+02:00", "EventTime": "2023-10-30T14:12:35.365654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CrpwKT3gAuw064IQDc"]} -{"Format": "IDEA0", "ID": "b25bbab2-f3c5-49b7-b647-4fb5db68aa60", "DetectTime": "2023-10-30T14:12:35.393589+02:00", "EventTime": "2023-10-30T14:12:35.393605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CoW5UD4NcXgnmCt3H3"]} -{"Format": "IDEA0", "ID": "5ec74d2c-78d9-471f-8862-b04a1993f6ba", "DetectTime": "2023-10-30T14:12:35.431680+02:00", "EventTime": "2023-10-30T14:12:35.431704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNUuxh1LX4fxvkgAOj"]} -{"Format": "Json", "ID": "5ec74d2c-78d9-471f-8862-b04a1993f6ba", "DetectTime": "2023-10-30T14:12:35.431680+02:00", "EventTime": "2023-10-30T14:12:35.431704+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:23:42.847420+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:35.508572)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a22eee65-d804-4979-8b6f-f6299798701f", "DetectTime": "2023-10-30T14:12:35.514122+02:00", "EventTime": "2023-10-30T14:12:35.514137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CPLuawbCIDlfs9bNd"]} -{"Format": "IDEA0", "ID": "36224609-d282-4a5f-9c60-6d24e3e50dca", "DetectTime": "2023-10-30T14:12:35.548315+02:00", "EventTime": "2023-10-30T14:12:35.548335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ccijj62JHbDWgFqMVg"]} -{"Format": "IDEA0", "ID": "8f040865-9c03-4b10-bf9f-13568aa700f1", "DetectTime": "2023-10-30T14:12:35.584890+02:00", "EventTime": "2023-10-30T14:12:35.584915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cn6zpQeSnUtDzNL17"]} -{"Format": "IDEA0", "ID": "18331211-ee1b-4430-b128-5cda34ad6eee", "DetectTime": "2023-10-30T14:12:35.617532+02:00", "EventTime": "2023-10-30T14:12:35.617545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqutHg4EaaEHlkJkse"]} -{"Format": "IDEA0", "ID": "f291bcff-58de-4a7e-afec-bfdca804160c", "DetectTime": "2023-10-30T14:12:35.650910+02:00", "EventTime": "2023-10-30T14:12:35.650927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CkUVyk2nU8MSFKlMU5"]} -{"Format": "IDEA0", "ID": "b90e8017-da12-40d6-b04a-107b52e3c9e5", "DetectTime": "2023-10-30T14:12:35.683059+02:00", "EventTime": "2023-10-30T14:12:35.683073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cihkhd3sb95UIbV1qa"]} -{"Format": "IDEA0", "ID": "eec56309-c0b2-4cc4-85f6-1b9b0c71434f", "DetectTime": "2023-10-30T14:12:35.715746+02:00", "EventTime": "2023-10-30T14:12:35.715757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CG8UUqqeu2hwN5W1g"]} -{"Format": "IDEA0", "ID": "1d7d7dc3-ef66-455c-a7ae-dbd35729f626", "DetectTime": "2023-10-30T14:12:35.746637+02:00", "EventTime": "2023-10-30T14:12:35.746648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVhcn820xgertwx5na"]} -{"Format": "Json", "ID": "1d7d7dc3-ef66-455c-a7ae-dbd35729f626", "DetectTime": "2023-10-30T14:12:35.746637+02:00", "EventTime": "2023-10-30T14:12:35.746648+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:23:44.731837+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:35.817280)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4fd948c0-a0be-4b48-b426-a1c72192da1d", "DetectTime": "2023-10-30T14:12:35.821918+02:00", "EventTime": "2023-10-30T14:12:35.821934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CCNXZQ22ETnclTH71c"]} -{"Format": "IDEA0", "ID": "0b341dc3-a179-4b6b-bff6-608b79bb2b11", "DetectTime": "2023-10-30T14:12:35.853612+02:00", "EventTime": "2023-10-30T14:12:35.853625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cafxq73wYUvXYjXw6d"]} -{"Format": "IDEA0", "ID": "7bb9f471-ac41-4f00-940d-9fed024d4432", "DetectTime": "2023-10-30T14:12:35.882245+02:00", "EventTime": "2023-10-30T14:12:35.882260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C19Azo4sAVvJ7d6z0i"]} -{"Format": "IDEA0", "ID": "76431389-5e6c-4b5e-b7b5-6e94e5b9f8d9", "DetectTime": "2023-10-30T14:12:35.914554+02:00", "EventTime": "2023-10-30T14:12:35.914584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CTaAJK2XO6ZyoucyAa"]} -{"Format": "IDEA0", "ID": "2e7893d9-cd94-4f95-acba-b3187b33d9b6", "DetectTime": "2023-10-30T14:12:35.945770+02:00", "EventTime": "2023-10-30T14:12:35.945786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C7DzmI1g5Iz5l69aZa"]} -{"Format": "IDEA0", "ID": "f75ba38a-fe9f-4ea9-b9ff-b2237ca4c7c0", "DetectTime": "2023-10-30T14:12:35.975584+02:00", "EventTime": "2023-10-30T14:12:35.975596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CjolNp2D8FTWnrvcW"]} -{"Format": "IDEA0", "ID": "2f445205-a5b4-442d-9713-8c86321e0fbc", "DetectTime": "2023-10-30T14:12:36.005335+02:00", "EventTime": "2023-10-30T14:12:36.005351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CEOrJk1Dd3aMtBPRLb"]} -{"Format": "IDEA0", "ID": "ee778179-9cf2-4abc-ab47-71a62f8ae7d4", "DetectTime": "2023-10-30T14:12:36.034745+02:00", "EventTime": "2023-10-30T14:12:36.034762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C8VaIu1LFS5YgRfJI3"]} -{"Format": "Json", "ID": "ee778179-9cf2-4abc-ab47-71a62f8ae7d4", "DetectTime": "2023-10-30T14:12:36.034745+02:00", "EventTime": "2023-10-30T14:12:36.034762+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:23:46.604282+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:36.104476)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "054b8c47-be64-4eaf-b220-8bc32d351ba8", "DetectTime": "2023-10-30T14:12:36.109764+02:00", "EventTime": "2023-10-30T14:12:36.109779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CCFyqa0jLFkEjQGwj"]} -{"Format": "IDEA0", "ID": "62d9c4af-ec65-4cb0-a56a-ddd86d34404c", "DetectTime": "2023-10-30T14:12:36.138001+02:00", "EventTime": "2023-10-30T14:12:36.138013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CwE5u44Yk3pMoL1iK3"]} -{"Format": "IDEA0", "ID": "06079449-e33d-4373-932d-3bc67a60a59c", "DetectTime": "2023-10-30T14:12:36.166119+02:00", "EventTime": "2023-10-30T14:12:36.166131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CWfFe94aeLvmyAn9U9"]} -{"Format": "IDEA0", "ID": "05eca166-d231-4db1-92f7-b2768c10e053", "DetectTime": "2023-10-30T14:12:36.192233+02:00", "EventTime": "2023-10-30T14:12:36.192248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C9BlBF1RAqkqK09lFi"]} -{"Format": "IDEA0", "ID": "7f473a1d-e915-4f48-88e2-13b9f45584fe", "DetectTime": "2023-10-30T14:12:36.217357+02:00", "EventTime": "2023-10-30T14:12:36.217373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CV9mpJ1ktGsM9TvbA8"]} -{"Format": "IDEA0", "ID": "118d748e-0ca4-43d9-877b-c9912ddf3436", "DetectTime": "2023-10-30T14:12:36.246116+02:00", "EventTime": "2023-10-30T14:12:36.246131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C5tKotioLm4ggCcS3"]} -{"Format": "IDEA0", "ID": "d7c473eb-1f36-46b4-8a75-9410e457cceb", "DetectTime": "2023-10-30T14:12:36.270003+02:00", "EventTime": "2023-10-30T14:12:36.270015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CNfPuh4MJobn1QKixh"]} -{"Format": "IDEA0", "ID": "91a98535-551c-40cd-b8b5-993efbea52ff", "DetectTime": "2023-10-30T14:12:36.298438+02:00", "EventTime": "2023-10-30T14:12:36.298454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CPeXIxp2BZY7L9"]} -{"Format": "Json", "ID": "91a98535-551c-40cd-b8b5-993efbea52ff", "DetectTime": "2023-10-30T14:12:36.298438+02:00", "EventTime": "2023-10-30T14:12:36.298454+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:54:33.933889+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:36.367641)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b588c17c-037c-473d-b490-85ea8731422d", "DetectTime": "2023-10-30T14:12:36.372864+02:00", "EventTime": "2023-10-30T14:12:36.372879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CksVK74TSMCe5Hh3Nl"]} -{"Format": "IDEA0", "ID": "b9cf55ac-d79d-4f63-95fa-61fc6b21c5a5", "DetectTime": "2023-10-30T14:12:36.401912+02:00", "EventTime": "2023-10-30T14:12:36.401929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CuVNvI32MdZ4rldd1j"]} -{"Format": "IDEA0", "ID": "e439a9f0-1a83-4db7-9d79-578821ad5283", "DetectTime": "2023-10-30T14:12:36.524905+02:00", "EventTime": "2023-10-30T14:12:36.524923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4UmFs4YNEEDaahxFb"]} -{"Format": "IDEA0", "ID": "a847f49c-5207-4ca1-9751-524adc3574b8", "DetectTime": "2023-10-30T14:12:36.553216+02:00", "EventTime": "2023-10-30T14:12:36.553230+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CdzsVf3btnRuC5p35"]} -{"Format": "IDEA0", "ID": "b1dd45e3-92ff-481f-a558-c7f9154e88ab", "DetectTime": "2023-10-30T14:12:36.578708+02:00", "EventTime": "2023-10-30T14:12:36.578724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cwz9kf2kDW1BH3oqT4"]} -{"Format": "IDEA0", "ID": "6fc1c242-a1eb-4b6f-88cd-e3727e5d3a40", "DetectTime": "2023-10-30T14:12:36.605955+02:00", "EventTime": "2023-10-30T14:12:36.605969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CURDvnkbQIKwRc1K1"]} -{"Format": "IDEA0", "ID": "241fa2c4-43dd-4c4f-90e6-489e9fd4b293", "DetectTime": "2023-10-30T14:12:36.631816+02:00", "EventTime": "2023-10-30T14:12:36.631827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Cq2vE44iuF00MVCR3"]} -{"Format": "IDEA0", "ID": "aaaa6725-33f3-404e-830d-abf24025bcd6", "DetectTime": "2023-10-30T14:12:36.660798+02:00", "EventTime": "2023-10-30T14:12:36.660809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CsWXpH1sqxJYx0c1Ge"]} -{"Format": "IDEA0", "ID": "782af4c4-5d56-425f-b3d1-38a7b6459cb7", "DetectTime": "2023-10-30T14:12:36.687284+02:00", "EventTime": "2023-10-30T14:12:36.687297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ck6MqD8ESYRePfMJa"]} -{"Format": "IDEA0", "ID": "e3646915-948d-4dcd-a7a5-3dda9a6ca86e", "DetectTime": "2023-10-30T14:12:36.713313+02:00", "EventTime": "2023-10-30T14:12:36.713324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CDzOb79Kte0M9zlT4"]} -{"Format": "Json", "ID": "e3646915-948d-4dcd-a7a5-3dda9a6ca86e", "DetectTime": "2023-10-30T14:12:36.713313+02:00", "EventTime": "2023-10-30T14:12:36.713324+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:54:36.412525+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:36.775490)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8609f51a-568c-4567-990a-b0c3341b29d6", "DetectTime": "2023-10-30T14:12:36.780167+02:00", "EventTime": "2023-10-30T14:12:36.780178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C8rSfZV98rPfsCzm7"]} -{"Format": "IDEA0", "ID": "5dac411c-43c4-4cfd-bf73-83b503cc090f", "DetectTime": "2023-10-30T14:12:36.806360+02:00", "EventTime": "2023-10-30T14:12:36.806376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CzDbno1VhPks2RduAj"]} -{"Format": "IDEA0", "ID": "45a58f58-7470-4ff5-8b60-641010fd6453", "DetectTime": "2023-10-30T14:12:36.832459+02:00", "EventTime": "2023-10-30T14:12:36.832476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C7GOv03iigMFGIcep9"]} -{"Format": "IDEA0", "ID": "9c4d41f8-3785-4b67-9ea8-8817529b59e5", "DetectTime": "2023-10-30T14:12:36.857355+02:00", "EventTime": "2023-10-30T14:12:36.857373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CslYy91rDGKjKK4LH5"]} -{"Format": "IDEA0", "ID": "8cc612fe-dfc9-4a7f-95cd-3aa6cc2653cf", "DetectTime": "2023-10-30T14:12:36.882981+02:00", "EventTime": "2023-10-30T14:12:36.882993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cwyf3a1RhoOWISI1m5"]} -{"Format": "IDEA0", "ID": "5af44235-f101-4000-ac9a-06d68caa258a", "DetectTime": "2023-10-30T14:12:36.907272+02:00", "EventTime": "2023-10-30T14:12:36.907298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CTSxNc2m5heTmd96v7"]} -{"Format": "IDEA0", "ID": "c5328d3b-dd01-4846-9ac6-a3cc8c33134b", "DetectTime": "2023-10-30T14:12:36.931385+02:00", "EventTime": "2023-10-30T14:12:36.931403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CmCNea42EPaRaqcWG"]} -{"Format": "IDEA0", "ID": "8132e359-19f2-4ce4-9fb9-5ee4d7019d5d", "DetectTime": "2023-10-30T14:12:36.954412+02:00", "EventTime": "2023-10-30T14:12:36.954428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CuFdKP3kmHXhK8Lsbb"]} -{"Format": "Json", "ID": "8132e359-19f2-4ce4-9fb9-5ee4d7019d5d", "DetectTime": "2023-10-30T14:12:36.954412+02:00", "EventTime": "2023-10-30T14:12:36.954428+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:54:39.104676+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:37.075041)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7e2f5be4-e459-4dbf-9d3d-d1a56ff078d4", "DetectTime": "2023-10-30T14:12:37.080858+02:00", "EventTime": "2023-10-30T14:12:37.080875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CjlD82OVm0X5S8Vh6"]} -{"Format": "IDEA0", "ID": "385ad922-a208-4847-a1f8-b1a89145e5df", "DetectTime": "2023-10-30T14:12:37.103699+02:00", "EventTime": "2023-10-30T14:12:37.103710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CAXhHa3vhTJUTusLif"]} -{"Format": "IDEA0", "ID": "0c2424ca-77de-41f3-873c-3f24b545898e", "DetectTime": "2023-10-30T14:12:37.128495+02:00", "EventTime": "2023-10-30T14:12:37.128506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C7HcG5qPdzIxgdWxl"]} -{"Format": "IDEA0", "ID": "05804a84-5b4b-4427-b912-cdebcd2a6631", "DetectTime": "2023-10-30T14:12:37.152072+02:00", "EventTime": "2023-10-30T14:12:37.152088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C51zWd22xznHbVBGQ"]} -{"Format": "IDEA0", "ID": "5eb20719-d612-483b-86d8-60dadb8fdc1e", "DetectTime": "2023-10-30T14:12:37.174961+02:00", "EventTime": "2023-10-30T14:12:37.174977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Ce3LDB48tH8wN6MTKc"]} -{"Format": "IDEA0", "ID": "05775d9c-1d4f-46be-98eb-bbadccef8b90", "DetectTime": "2023-10-30T14:12:37.196972+02:00", "EventTime": "2023-10-30T14:12:37.196996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C44sg8312AsDe83iFa"]} -{"Format": "IDEA0", "ID": "ffa6f183-3064-4d5b-9258-f92b65864e55", "DetectTime": "2023-10-30T14:12:37.217416+02:00", "EventTime": "2023-10-30T14:12:37.217431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CBAdJ8ggK5JjleAy9"]} -{"Format": "IDEA0", "ID": "cdaed15a-e8df-4747-8f26-e03c01af3b4d", "DetectTime": "2023-10-30T14:12:37.239066+02:00", "EventTime": "2023-10-30T14:12:37.239083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CESVJ3254pfiVeHm36"]} -{"Format": "Json", "ID": "cdaed15a-e8df-4747-8f26-e03c01af3b4d", "DetectTime": "2023-10-30T14:12:37.239066+02:00", "EventTime": "2023-10-30T14:12:37.239083+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T17:54:41.245519+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2023/10/30 14:12:37.303797)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dbcc2fd8-952e-4f4a-b338-647b252f2710", "DetectTime": "2023-10-30T14:12:37.308694+02:00", "EventTime": "2023-10-30T14:12:37.308706+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C4B7rg2R8Wxab1es5f"]} -{"Format": "IDEA0", "ID": "8e1e33f9-9647-4995-9853-c6894c50e21e", "DetectTime": "2023-10-30T14:12:37.334913+02:00", "EventTime": "2023-10-30T14:12:37.334926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CwpT0F1eYaZ3fa5ENi"]} -{"Format": "IDEA0", "ID": "0f77f1e9-4b54-4ec8-bea9-845b08eddf28", "DetectTime": "2023-10-30T14:12:37.353277+02:00", "EventTime": "2023-10-30T14:12:37.353292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDyB2BUilkDHQNs2j"]} -{"Format": "IDEA0", "ID": "c0553cf7-cb9c-40f5-be8f-84c3231f0a91", "DetectTime": "2023-10-30T14:12:37.373621+02:00", "EventTime": "2023-10-30T14:12:37.373640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CwgIp52t8hmEwqerBl"]} -{"Format": "IDEA0", "ID": "5dbd4007-d30d-4d38-8738-c02d86110c7a", "DetectTime": "2023-10-30T14:12:37.413747+02:00", "EventTime": "2023-10-30T14:12:37.413762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C456yR2Ol8cUya9NIg"]} -{"Format": "IDEA0", "ID": "3f7b2589-f3d7-4f7c-861b-c10bc3de0536", "DetectTime": "2023-10-30T14:12:37.452240+02:00", "EventTime": "2023-10-30T14:12:37.452253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C9WNR5M1EXdfNYui9"]} -{"Format": "IDEA0", "ID": "96a56402-87a9-4b67-8909-d86abb3fb94f", "DetectTime": "2023-10-30T14:12:37.491744+02:00", "EventTime": "2023-10-30T14:12:37.491772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CzPzvg1b4mYMt78Ij7"]} -{"Format": "IDEA0", "ID": "541db738-5c0a-4482-ba4f-5107d37c3d2f", "DetectTime": "2023-10-30T14:12:37.520702+02:00", "EventTime": "2023-10-30T14:12:37.520723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CXpDW133TCQJ02eNL3"]} -{"Format": "IDEA0", "ID": "ff3091cf-fe32-4b7b-8c50-8a5c9de854c8", "DetectTime": "2023-10-30T14:12:37.554772+02:00", "EventTime": "2023-10-30T14:12:37.554842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CAUOEw4pnaeG6n6Aw4"]} -{"Format": "IDEA0", "ID": "153de0a3-1b09-4b16-b1c6-854e718f4688", "DetectTime": "2023-10-30T14:12:37.591867+02:00", "EventTime": "2023-10-30T14:12:37.591882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CFeLkudcQMfDMVqe1"]} -{"Format": "IDEA0", "ID": "21c1d542-7045-4f1b-b067-65384ea041eb", "DetectTime": "2023-10-30T14:12:37.628318+02:00", "EventTime": "2023-10-30T14:12:37.628329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CrrAPs2AxQNhgNa9h9"]} -{"Format": "Json", "ID": "21c1d542-7045-4f1b-b067-65384ea041eb", "DetectTime": "2023-10-30T14:12:37.628318+02:00", "EventTime": "2023-10-30T14:12:37.628329+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:24:43.971691+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:37.722376)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "92a472aa-23f0-4e09-a2c2-2bd1b966915f", "DetectTime": "2023-10-30T14:12:37.726465+02:00", "EventTime": "2023-10-30T14:12:37.726484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CJPtBAP0o5i5FGtjc"]} -{"Format": "IDEA0", "ID": "b96bfee3-4b60-42de-a336-bf56f5dbd3f5", "DetectTime": "2023-10-30T14:12:37.763785+02:00", "EventTime": "2023-10-30T14:12:37.763800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKGLqC37459ChHGrec"]} -{"Format": "IDEA0", "ID": "cb98352e-846d-4a4b-a2fd-3d2d8bf7a3ed", "DetectTime": "2023-10-30T14:12:37.797690+02:00", "EventTime": "2023-10-30T14:12:37.797705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CktbFY2MHXSrgRPWgd"]} -{"Format": "IDEA0", "ID": "5d390365-6707-4d89-a6ba-367cbde86843", "DetectTime": "2023-10-30T14:12:37.831881+02:00", "EventTime": "2023-10-30T14:12:37.831896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CeKz8T3kq50gypG1Te"]} -{"Format": "IDEA0", "ID": "64cd85ea-e687-4998-a90a-6709f42499ec", "DetectTime": "2023-10-30T14:12:37.863816+02:00", "EventTime": "2023-10-30T14:12:37.863832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["ChOdoN3AD5tYNiCzRg"]} -{"Format": "IDEA0", "ID": "7923a621-d7bb-4cdd-81dd-1bb4e2ad253e", "DetectTime": "2023-10-30T14:12:37.897253+02:00", "EventTime": "2023-10-30T14:12:37.897271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cwp2EA2nGkv5wwXvLj"]} -{"Format": "IDEA0", "ID": "42105fa4-6a88-4819-831e-29dbae237bb6", "DetectTime": "2023-10-30T14:12:37.930852+02:00", "EventTime": "2023-10-30T14:12:37.930867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CJpEk31nf3rlH7yeh"]} -{"Format": "IDEA0", "ID": "abaa82bb-83d2-4ceb-ad09-84dac4a14167", "DetectTime": "2023-10-30T14:12:37.964497+02:00", "EventTime": "2023-10-30T14:12:37.964514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CqtEzzQBQsbmjJUl2"]} -{"Format": "Json", "ID": "abaa82bb-83d2-4ceb-ad09-84dac4a14167", "DetectTime": "2023-10-30T14:12:37.964497+02:00", "EventTime": "2023-10-30T14:12:37.964514+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:24:46.646388+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:38.045710)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54e9f9d5-87aa-48ee-a4b6-23de17c2d8a2", "DetectTime": "2023-10-30T14:12:38.050896+02:00", "EventTime": "2023-10-30T14:12:38.050916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLoPpu4hDxdWVgeoJb"]} -{"Format": "IDEA0", "ID": "407ac274-be57-480f-a8f7-35735b608cb6", "DetectTime": "2023-10-30T14:12:38.078928+02:00", "EventTime": "2023-10-30T14:12:38.078941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVDFz34RBjH4UF2df"]} -{"Format": "IDEA0", "ID": "ff82c7ab-7b26-4bdc-ba5e-cbbbf164b248", "DetectTime": "2023-10-30T14:12:38.104330+02:00", "EventTime": "2023-10-30T14:12:38.104347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C8ISSD2455INiqvhfd"]} -{"Format": "IDEA0", "ID": "5e41ca3c-6de5-441b-abec-7bd7035bc164", "DetectTime": "2023-10-30T14:12:38.131151+02:00", "EventTime": "2023-10-30T14:12:38.131162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CqWS4JoPSlVnQBg91"]} -{"Format": "IDEA0", "ID": "2d892139-a9c7-4628-a844-668cb8ea1bd0", "DetectTime": "2023-10-30T14:12:38.158836+02:00", "EventTime": "2023-10-30T14:12:38.158849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CtAA6iREZU9DAAuq2"]} -{"Format": "IDEA0", "ID": "38d4e20f-bfde-467e-af2c-a4d75a5e3f7c", "DetectTime": "2023-10-30T14:12:38.187875+02:00", "EventTime": "2023-10-30T14:12:38.187886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C8o829cvOMwPny0Uk"]} -{"Format": "IDEA0", "ID": "0e055137-1d2f-4957-a829-384970b7c8de", "DetectTime": "2023-10-30T14:12:38.217363+02:00", "EventTime": "2023-10-30T14:12:38.217381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C04VORftOPqZbXVpi"]} -{"Format": "IDEA0", "ID": "b4933e4a-6f26-4b9e-beee-d04fb63415f9", "DetectTime": "2023-10-30T14:12:38.245911+02:00", "EventTime": "2023-10-30T14:12:38.245925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSM412bjMB85n5hj"]} -{"Format": "Json", "ID": "b4933e4a-6f26-4b9e-beee-d04fb63415f9", "DetectTime": "2023-10-30T14:12:38.245911+02:00", "EventTime": "2023-10-30T14:12:38.245925+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:25:06.402301+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:38.313570)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b28f483f-f72c-485d-ad26-cb1f1dc9f884", "DetectTime": "2023-10-30T14:12:38.318618+02:00", "EventTime": "2023-10-30T14:12:38.318634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["ClzVVaOqfNs0A5Tn"]} -{"Format": "IDEA0", "ID": "aab5c1d6-7fd2-4408-8244-abecdc3d6b13", "DetectTime": "2023-10-30T14:12:38.350378+02:00", "EventTime": "2023-10-30T14:12:38.350394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["Cjs7Iq1qqg2qgcIBK2"]} -{"Format": "IDEA0", "ID": "ff2692b4-89c7-4eb6-894b-04bd1677dd96", "DetectTime": "2023-10-30T14:12:38.379911+02:00", "EventTime": "2023-10-30T14:12:38.379930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CFYdkl24jCCa6Ja21h"]} -{"Format": "IDEA0", "ID": "d1c8fd4b-40f7-4704-919d-5eeef165f02d", "DetectTime": "2023-10-30T14:12:38.407562+02:00", "EventTime": "2023-10-30T14:12:38.407582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CRi6Pr3J1ZNFl3I385"]} -{"Format": "IDEA0", "ID": "d6b3b297-7842-49f1-81fe-65ae1b85aee8", "DetectTime": "2023-10-30T14:12:38.436440+02:00", "EventTime": "2023-10-30T14:12:38.436453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CCpt1kSb47IpGZTej"]} -{"Format": "IDEA0", "ID": "d0ce5a43-5df7-41cc-bcfb-6553d884c30c", "DetectTime": "2023-10-30T14:12:38.464431+02:00", "EventTime": "2023-10-30T14:12:38.464448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C6oxAx3nzasSgZBoL8"]} -{"Format": "IDEA0", "ID": "85397c92-5054-4b2a-a94b-877dff1214c2", "DetectTime": "2023-10-30T14:12:38.488464+02:00", "EventTime": "2023-10-30T14:12:38.488479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMdmye4VJmd4935Evl"]} -{"Format": "IDEA0", "ID": "3f7ab39e-dad6-46ff-bae6-bfbafa24296c", "DetectTime": "2023-10-30T14:12:38.514581+02:00", "EventTime": "2023-10-30T14:12:38.514592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CPmT5lnS55NRSvXL8"]} -{"Format": "IDEA0", "ID": "19ad26de-ff73-491e-a040-fc7d74514b4b", "DetectTime": "2023-10-30T14:12:38.538348+02:00", "EventTime": "2023-10-30T14:12:38.538360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CA5DJzaOBBT2HXKN4"]} -{"Format": "Json", "ID": "19ad26de-ff73-491e-a040-fc7d74514b4b", "DetectTime": "2023-10-30T14:12:38.538348+02:00", "EventTime": "2023-10-30T14:12:38.538360+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:55:20.721205+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:38.595401)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "62b21df4-6499-4945-8924-718d1f7e4850", "DetectTime": "2023-10-30T14:12:38.600132+02:00", "EventTime": "2023-10-30T14:12:38.600157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C0ybON2w0QhfHZGn47"]} -{"Format": "IDEA0", "ID": "6235f4d1-f32b-4dad-b6ef-41d7e85b95f3", "DetectTime": "2023-10-30T14:12:38.629611+02:00", "EventTime": "2023-10-30T14:12:38.629623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CrmgNt10yKVnBsuq3j"]} -{"Format": "IDEA0", "ID": "c4a6e1d9-bb7e-4547-bbef-3e6b1f05742e", "DetectTime": "2023-10-30T14:12:38.653792+02:00", "EventTime": "2023-10-30T14:12:38.653808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C4o92vaRidoptxBEk"]} -{"Format": "IDEA0", "ID": "c8cabed5-1f0e-4698-9d19-acee103b36be", "DetectTime": "2023-10-30T14:12:38.680259+02:00", "EventTime": "2023-10-30T14:12:38.680271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CmXevd2TRF7vBuelCk"]} -{"Format": "IDEA0", "ID": "09a40c3d-ce19-4ad9-b4dc-ad44c5f5e270", "DetectTime": "2023-10-30T14:12:38.705181+02:00", "EventTime": "2023-10-30T14:12:38.705193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C4YIrlmyiejYbJwxe"]} -{"Format": "IDEA0", "ID": "07148a93-1b10-4e24-896a-2297bfad21db", "DetectTime": "2023-10-30T14:12:38.733793+02:00", "EventTime": "2023-10-30T14:12:38.733811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cjtw7E18MrVl52Uhwd"]} -{"Format": "IDEA0", "ID": "dfa31452-a450-4e3f-8db7-b2f434a551ee", "DetectTime": "2023-10-30T14:12:38.762342+02:00", "EventTime": "2023-10-30T14:12:38.762359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CUfu0w2Z2CXyvf6ZX7"]} -{"Format": "IDEA0", "ID": "8cb4609d-a5c3-4665-a982-781e25a3791a", "DetectTime": "2023-10-30T14:12:38.786762+02:00", "EventTime": "2023-10-30T14:12:38.786774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CBhd6ztRTPj2zLCnc"]} -{"Format": "Json", "ID": "8cb4609d-a5c3-4665-a982-781e25a3791a", "DetectTime": "2023-10-30T14:12:38.786762+02:00", "EventTime": "2023-10-30T14:12:38.786774+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:55:22.218434+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:38.855474)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b9130693-329c-414f-a24b-731e9d370761", "DetectTime": "2023-10-30T14:12:38.861355+02:00", "EventTime": "2023-10-30T14:12:38.861373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CNV5bf3tPUNhwgmdpa"]} -{"Format": "IDEA0", "ID": "3791ec08-23e2-4fad-bdc2-d3dce8dd236b", "DetectTime": "2023-10-30T14:12:38.887311+02:00", "EventTime": "2023-10-30T14:12:38.887325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CRDyYu3436lXBfDah4"]} -{"Format": "IDEA0", "ID": "67caf401-16e8-429c-a0bb-3fba970cbaf7", "DetectTime": "2023-10-30T14:12:38.909153+02:00", "EventTime": "2023-10-30T14:12:38.909165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C06CHp2yDpUE4zILFc"]} -{"Format": "IDEA0", "ID": "c288acee-d291-4dd0-b093-1097f5380499", "DetectTime": "2023-10-30T14:12:38.931506+02:00", "EventTime": "2023-10-30T14:12:38.931517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJJK2H1UW1Xbm0QPni"]} -{"Format": "IDEA0", "ID": "4a58e7f6-f669-45df-bf1f-29007edc4c53", "DetectTime": "2023-10-30T14:12:38.954635+02:00", "EventTime": "2023-10-30T14:12:38.954645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C4NFotUJ1393v8Axa"]} -{"Format": "IDEA0", "ID": "31e9de07-96f3-414e-b0dd-9300265b6b5a", "DetectTime": "2023-10-30T14:12:38.976709+02:00", "EventTime": "2023-10-30T14:12:38.976728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cztz6l4VBO30sqLmN3"]} -{"Format": "IDEA0", "ID": "13af0c66-5570-424c-adc6-eaa31760ce23", "DetectTime": "2023-10-30T14:12:38.998371+02:00", "EventTime": "2023-10-30T14:12:38.998384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CT5aXu3OkAhFQK3eUe"]} -{"Format": "IDEA0", "ID": "8f51eb55-8d15-4ccb-8c50-82b2263e8267", "DetectTime": "2023-10-30T14:12:39.020506+02:00", "EventTime": "2023-10-30T14:12:39.020524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CDfnBr1pyjEo1LX9P"]} -{"Format": "Json", "ID": "8f51eb55-8d15-4ccb-8c50-82b2263e8267", "DetectTime": "2023-10-30T14:12:39.020506+02:00", "EventTime": "2023-10-30T14:12:39.020524+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:55:24.178756+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:39.081577)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "245e4005-6787-40dd-95e2-6bad5e810e9d", "DetectTime": "2023-10-30T14:12:39.087168+02:00", "EventTime": "2023-10-30T14:12:39.087184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cem5W53mZ8o8uTEjMj"]} -{"Format": "IDEA0", "ID": "e794001f-07cc-4d81-8f93-b35d13167f35", "DetectTime": "2023-10-30T14:12:39.111599+02:00", "EventTime": "2023-10-30T14:12:39.111615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cgg7nl3g1XunRclWg3"]} -{"Format": "IDEA0", "ID": "1a06f2f7-7927-456b-9395-b9c959ca9247", "DetectTime": "2023-10-30T14:12:39.130406+02:00", "EventTime": "2023-10-30T14:12:39.130422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CAFIJB30Rli1xj4Fd"]} -{"Format": "IDEA0", "ID": "f756bd35-1d5d-4b73-8be8-b990849e31b4", "DetectTime": "2023-10-30T14:12:39.152891+02:00", "EventTime": "2023-10-30T14:12:39.152903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Ce9d0v4GFybwkLlVSc"]} -{"Format": "IDEA0", "ID": "9d229ab8-07da-4056-934e-dbf3c257a60c", "DetectTime": "2023-10-30T14:12:39.171288+02:00", "EventTime": "2023-10-30T14:12:39.171299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cy0pvv30DXGYLXHt1g"]} -{"Format": "IDEA0", "ID": "14a37141-8998-46fa-b22c-6d026a84a01a", "DetectTime": "2023-10-30T14:12:39.193884+02:00", "EventTime": "2023-10-30T14:12:39.193900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CQ6dWwmiAThzYOyVf"]} -{"Format": "IDEA0", "ID": "377d21bc-c12d-4e4f-97c6-fd7a64235f34", "DetectTime": "2023-10-30T14:12:39.216123+02:00", "EventTime": "2023-10-30T14:12:39.216149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CBigTi1czdeS1UDaAk"]} -{"Format": "IDEA0", "ID": "fa8914eb-b606-44ee-822c-73badb508424", "DetectTime": "2023-10-30T14:12:39.239097+02:00", "EventTime": "2023-10-30T14:12:39.239115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CcldzE3grksn60ktjc"]} -{"Format": "IDEA0", "ID": "e7032042-d6f8-4b97-ada5-3e45872881b4", "DetectTime": "2023-10-30T14:12:39.261450+02:00", "EventTime": "2023-10-30T14:12:39.261465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C7DNmafyIblZgKwOa"]} -{"Format": "Json", "ID": "e7032042-d6f8-4b97-ada5-3e45872881b4", "DetectTime": "2023-10-30T14:12:39.261450+02:00", "EventTime": "2023-10-30T14:12:39.261465+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T18:55:26.195843+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2023/10/30 14:12:39.322845)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5793b028-88b4-4bf4-a1aa-01a8ea9d6583", "DetectTime": "2023-10-30T14:12:39.327623+02:00", "EventTime": "2023-10-30T14:12:39.327639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cyypcf3aqSVYT1h7xe"]} -{"Format": "IDEA0", "ID": "ad282f8e-83cc-450b-af2c-b8d069e9453c", "DetectTime": "2023-10-30T14:12:39.351270+02:00", "EventTime": "2023-10-30T14:12:39.351292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ClWMJi2ND7560bjIa6"]} -{"Format": "IDEA0", "ID": "c6238612-2580-4887-ae7f-c0636aabe875", "DetectTime": "2023-10-30T14:12:39.369824+02:00", "EventTime": "2023-10-30T14:12:39.369835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C8sCVe4duBw96L1PVk"]} -{"Format": "IDEA0", "ID": "393ba767-19b9-4e2c-8cb9-3c0fba802ae4", "DetectTime": "2023-10-30T14:12:39.388410+02:00", "EventTime": "2023-10-30T14:12:39.388426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CWVi024VYhQ7O5OFI4"]} -{"Format": "IDEA0", "ID": "8b229e10-657c-4705-bacf-307e6cd602f2", "DetectTime": "2023-10-30T14:12:39.408014+02:00", "EventTime": "2023-10-30T14:12:39.408035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CDCZYn4OrXfKwGlVnf"]} -{"Format": "IDEA0", "ID": "15a001b1-3f38-4a31-ab07-c03c5fde2da6", "DetectTime": "2023-10-30T14:12:39.438654+02:00", "EventTime": "2023-10-30T14:12:39.438665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CtrUFA1SM5a5YYWaEk"]} -{"Format": "IDEA0", "ID": "24b01303-3d6b-4f7e-ac45-33c889938a52", "DetectTime": "2023-10-30T14:12:39.467785+02:00", "EventTime": "2023-10-30T14:12:39.467802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CJncMcPJ09SIwYpYj"]} -{"Format": "IDEA0", "ID": "5b09746d-a1cf-47e7-83d6-b4995f5b1490", "DetectTime": "2023-10-30T14:12:39.500072+02:00", "EventTime": "2023-10-30T14:12:39.500091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CLg48a2y7iglMp8xj2"]} -{"Format": "IDEA0", "ID": "d8f352ec-1717-46e0-b434-498d3a29c80f", "DetectTime": "2023-10-30T14:12:39.534192+02:00", "EventTime": "2023-10-30T14:12:39.534208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CsfO4R1PgaBm1Wn1Ad"]} -{"Format": "IDEA0", "ID": "902f3b0b-6437-4180-a7df-d9ba6d335be3", "DetectTime": "2023-10-30T14:12:39.568780+02:00", "EventTime": "2023-10-30T14:12:39.568796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CGvf983qPpbF2GkA39"]} -{"Format": "IDEA0", "ID": "0a6e9036-6136-4833-811e-1ccda3506a9a", "DetectTime": "2023-10-30T14:12:39.600268+02:00", "EventTime": "2023-10-30T14:12:39.600283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CnkxW13hcnrb3CL3K4"]} -{"Format": "IDEA0", "ID": "0d0b3943-a301-4b8a-aa92-9f9486b506c4", "DetectTime": "2023-10-30T14:12:39.635546+02:00", "EventTime": "2023-10-30T14:12:39.635558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CEE98B2QMCZnpVakb7"]} -{"Format": "Json", "ID": "0d0b3943-a301-4b8a-aa92-9f9486b506c4", "DetectTime": "2023-10-30T14:12:39.635546+02:00", "EventTime": "2023-10-30T14:12:39.635558+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:25:32.268015+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:39.710575)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ca08a33b-b336-4a70-b918-eb05a6674f38", "DetectTime": "2023-10-30T14:12:39.714946+02:00", "EventTime": "2023-10-30T14:12:39.714959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cwu7882weHHLDnKnb5"]} -{"Format": "IDEA0", "ID": "e76edef6-cfc4-4dbc-afe4-b025ee03eb9d", "DetectTime": "2023-10-30T14:12:39.742372+02:00", "EventTime": "2023-10-30T14:12:39.742387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYA1wO1go53JPLtcWb"]} -{"Format": "IDEA0", "ID": "1de4f7d1-23fc-43fc-9f01-594a966eaac8", "DetectTime": "2023-10-30T14:12:39.769605+02:00", "EventTime": "2023-10-30T14:12:39.769618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CERmwO134HrnYYOXXh"]} -{"Format": "IDEA0", "ID": "7dc4dbcd-f3fd-4687-bea6-760511a452f5", "DetectTime": "2023-10-30T14:12:39.795962+02:00", "EventTime": "2023-10-30T14:12:39.795980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CZ9Q5N16pDUwMIfDn4"]} -{"Format": "IDEA0", "ID": "60b2e873-e402-45ec-b966-81bfb34d02ee", "DetectTime": "2023-10-30T14:12:39.823177+02:00", "EventTime": "2023-10-30T14:12:39.823189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CGqszm3udLYFDZ9Eyi"]} -{"Format": "IDEA0", "ID": "9ff7d547-18e2-46b5-b1cd-ab117a96a97e", "DetectTime": "2023-10-30T14:12:39.853671+02:00", "EventTime": "2023-10-30T14:12:39.853683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CCokDH1KvziOaE30s5"]} -{"Format": "IDEA0", "ID": "287768ad-2871-4d82-8d14-280785b7b3b5", "DetectTime": "2023-10-30T14:12:39.883075+02:00", "EventTime": "2023-10-30T14:12:39.883091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7EuMN1iZMUhCkuol9"]} -{"Format": "IDEA0", "ID": "a25689f4-f753-438c-86dc-20273b4a627e", "DetectTime": "2023-10-30T14:12:39.908150+02:00", "EventTime": "2023-10-30T14:12:39.908167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C1jAF53dbLVmBb38ud"]} -{"Format": "IDEA0", "ID": "10e2611f-c1a6-47d8-b138-62cc0fe25b2c", "DetectTime": "2023-10-30T14:12:39.938147+02:00", "EventTime": "2023-10-30T14:12:39.938158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CuKgng3DeVITPj7kel"]} -{"Format": "Json", "ID": "10e2611f-c1a6-47d8-b138-62cc0fe25b2c", "DetectTime": "2023-10-30T14:12:39.938147+02:00", "EventTime": "2023-10-30T14:12:39.938158+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:25:35.134762+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:40.010486)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2a3616a4-7960-46e0-bd9b-cffa2862701c", "DetectTime": "2023-10-30T14:12:40.016187+02:00", "EventTime": "2023-10-30T14:12:40.016205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CNNEAg3OhF7psYvG19"]} -{"Format": "IDEA0", "ID": "9a01e584-9d56-448f-bc99-86ad6ed0228e", "DetectTime": "2023-10-30T14:12:40.046862+02:00", "EventTime": "2023-10-30T14:12:40.046882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CN9vM94f8TYoMJRy5i"]} -{"Format": "IDEA0", "ID": "80a757d2-c926-459c-aea8-48dfeafe8c63", "DetectTime": "2023-10-30T14:12:40.074696+02:00", "EventTime": "2023-10-30T14:12:40.074716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CbWL5A4HBpL4cr1Oe8"]} -{"Format": "IDEA0", "ID": "2adbdf1f-ab0c-4722-b665-de7a41047bd5", "DetectTime": "2023-10-30T14:12:40.103003+02:00", "EventTime": "2023-10-30T14:12:40.103019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C25OjZVdNfJtTcUN2"]} -{"Format": "IDEA0", "ID": "4a5ca116-6f4c-458a-9a7c-c7f69b4243c6", "DetectTime": "2023-10-30T14:12:40.130575+02:00", "EventTime": "2023-10-30T14:12:40.130587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cie1xi3BYDCiRH4Dc"]} -{"Format": "IDEA0", "ID": "c250c881-b171-4bc6-a4dc-162045bc361f", "DetectTime": "2023-10-30T14:12:40.156980+02:00", "EventTime": "2023-10-30T14:12:40.156995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFwGvG27Q6sxiU5FCc"]} -{"Format": "IDEA0", "ID": "90b96b66-fc80-4c02-a1f8-6d7fa5dd3215", "DetectTime": "2023-10-30T14:12:40.188766+02:00", "EventTime": "2023-10-30T14:12:40.188784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CWUDRH3pU9XTZs94Lg"]} -{"Format": "IDEA0", "ID": "c29a275c-4932-4d0d-b50b-494651c31d68", "DetectTime": "2023-10-30T14:12:40.219128+02:00", "EventTime": "2023-10-30T14:12:40.219141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cat33t4WdTPctwuXn3"]} -{"Format": "Json", "ID": "c29a275c-4932-4d0d-b50b-494651c31d68", "DetectTime": "2023-10-30T14:12:40.219128+02:00", "EventTime": "2023-10-30T14:12:40.219141+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:25:36.910240+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:40.286833)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0d1c5e50-fffb-4980-82e7-9ffb86d3b935", "DetectTime": "2023-10-30T14:12:40.292291+02:00", "EventTime": "2023-10-30T14:12:40.292307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CtI6V211sdBNCjp09j"]} -{"Format": "IDEA0", "ID": "6e61fc58-de3b-4989-9409-3560904fddcd", "DetectTime": "2023-10-30T14:12:40.320004+02:00", "EventTime": "2023-10-30T14:12:40.320019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["ChX2p92rkemCprBZGk"]} -{"Format": "IDEA0", "ID": "f9e74a5a-afae-4bf5-8d86-a64f9736fa3d", "DetectTime": "2023-10-30T14:12:40.347310+02:00", "EventTime": "2023-10-30T14:12:40.347326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRDEMu4iArQv3n9evh"]} -{"Format": "IDEA0", "ID": "1c09f663-8e89-4eb7-b19a-e554bf4a9e8f", "DetectTime": "2023-10-30T14:12:40.372796+02:00", "EventTime": "2023-10-30T14:12:40.372812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CrzHje4LUF41TqarPd"]} -{"Format": "IDEA0", "ID": "65299e5e-97cd-4c93-b4a0-36d9502274d0", "DetectTime": "2023-10-30T14:12:40.394737+02:00", "EventTime": "2023-10-30T14:12:40.394753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4aHZx42EjgfmSrgJ3"]} -{"Format": "IDEA0", "ID": "e5a5d261-245c-4f87-b730-d1e292f7a11f", "DetectTime": "2023-10-30T14:12:40.423920+02:00", "EventTime": "2023-10-30T14:12:40.423936+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CGb1BL1Snp2Fw1nGB8"]} -{"Format": "IDEA0", "ID": "4aa8477d-a2ab-4435-aa6a-4d650c85963e", "DetectTime": "2023-10-30T14:12:40.449417+02:00", "EventTime": "2023-10-30T14:12:40.449434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CBT1pYJVTtJZkrYrg"]} -{"Format": "IDEA0", "ID": "aedf1d3b-cd4f-415a-a007-c6fe4de51c46", "DetectTime": "2023-10-30T14:12:40.474973+02:00", "EventTime": "2023-10-30T14:12:40.474991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CduQXs1veFwe1zDjB6"]} -{"Format": "IDEA0", "ID": "02cab6a0-e915-45dc-8227-c57c46b1cf0a", "DetectTime": "2023-10-30T14:12:40.502181+02:00", "EventTime": "2023-10-30T14:12:40.502197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CCv4An1cR1HXSZlgY1"]} -{"Format": "IDEA0", "ID": "2ffc8638-9d0c-4c7d-8784-09ec9a1154b4", "DetectTime": "2023-10-30T14:12:40.527589+02:00", "EventTime": "2023-10-30T14:12:40.527605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CHj6CQ15qP5fNRgJ83"]} -{"Format": "Json", "ID": "2ffc8638-9d0c-4c7d-8784-09ec9a1154b4", "DetectTime": "2023-10-30T14:12:40.527589+02:00", "EventTime": "2023-10-30T14:12:40.527605+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:56:03.939611+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:40.593110)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "076a4c1f-bfd8-469a-9060-09bf644b52bc", "DetectTime": "2023-10-30T14:12:40.598271+02:00", "EventTime": "2023-10-30T14:12:40.598283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CAG0jA3736l0RwCZg4"]} -{"Format": "IDEA0", "ID": "4e510e21-86a6-4c84-8c42-8fb7da2441d7", "DetectTime": "2023-10-30T14:12:40.624305+02:00", "EventTime": "2023-10-30T14:12:40.624321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CG7FGK5eL5UutrrXh"]} -{"Format": "IDEA0", "ID": "58d7e798-12ee-4b80-ab5a-e819cb01cb53", "DetectTime": "2023-10-30T14:12:40.647184+02:00", "EventTime": "2023-10-30T14:12:40.647197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CIBNBV4iB9hlAf0Jd"]} -{"Format": "IDEA0", "ID": "55cd7e0d-545a-4c43-8eb3-f0a2b3d0819f", "DetectTime": "2023-10-30T14:12:40.671075+02:00", "EventTime": "2023-10-30T14:12:40.671086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CEhhzGilrwS2CS5mg"]} -{"Format": "IDEA0", "ID": "d6eb53f3-009f-4162-9e00-4e2089da5a1f", "DetectTime": "2023-10-30T14:12:40.696117+02:00", "EventTime": "2023-10-30T14:12:40.696133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CzV3JH3uUyPDS8OsNa"]} -{"Format": "IDEA0", "ID": "f47ebb0e-d48b-4e9a-a5f8-d5b86f428dcb", "DetectTime": "2023-10-30T14:12:40.720291+02:00", "EventTime": "2023-10-30T14:12:40.720313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CyBtwW24eXJ9drHBsd"]} -{"Format": "IDEA0", "ID": "5cddab08-5f78-41d2-b911-df0fbbc23c38", "DetectTime": "2023-10-30T14:12:40.747635+02:00", "EventTime": "2023-10-30T14:12:40.747659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cl4eUR3FJ6xx3rmkr3"]} -{"Format": "IDEA0", "ID": "c1e396bc-5c18-4c23-976a-b0eb5943ba5a", "DetectTime": "2023-10-30T14:12:40.773144+02:00", "EventTime": "2023-10-30T14:12:40.773160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRjHE33VziPTI7goTc"]} -{"Format": "Json", "ID": "c1e396bc-5c18-4c23-976a-b0eb5943ba5a", "DetectTime": "2023-10-30T14:12:40.773144+02:00", "EventTime": "2023-10-30T14:12:40.773160+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:56:05.488846+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:40.836952)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa437ea6-ee1e-4f3d-b9b2-e6bb5aa49d98", "DetectTime": "2023-10-30T14:12:40.842085+02:00", "EventTime": "2023-10-30T14:12:40.842099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXCSZq2aihk49KiQ35"]} -{"Format": "IDEA0", "ID": "be003923-a1a1-4222-9c5e-ce4e4fb708e6", "DetectTime": "2023-10-30T14:12:40.864933+02:00", "EventTime": "2023-10-30T14:12:40.864951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Ca2mf1C8ixJrKAj4f"]} -{"Format": "IDEA0", "ID": "e260454f-7b69-4794-975d-9b0be79edfd9", "DetectTime": "2023-10-30T14:12:40.887122+02:00", "EventTime": "2023-10-30T14:12:40.887134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CnpZ7A7VJgB6X1Ik"]} -{"Format": "IDEA0", "ID": "55b85476-56fd-45f6-a56a-1a4fa2fd674d", "DetectTime": "2023-10-30T14:12:40.910440+02:00", "EventTime": "2023-10-30T14:12:40.910460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CUAer349xku0XVeVxc"]} -{"Format": "IDEA0", "ID": "b4194923-67b4-49f7-8b49-9bab4c790b53", "DetectTime": "2023-10-30T14:12:40.929093+02:00", "EventTime": "2023-10-30T14:12:40.929103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CxffY51rGCHcoUqCcg"]} -{"Format": "IDEA0", "ID": "b35688cb-9279-4b59-8b7c-8e6e16c8555b", "DetectTime": "2023-10-30T14:12:40.948581+02:00", "EventTime": "2023-10-30T14:12:40.948594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CBEvFI3mdVz9hXd7z8"]} -{"Format": "IDEA0", "ID": "5bd7cc65-349f-4caf-973d-34c945ed0c71", "DetectTime": "2023-10-30T14:12:40.969531+02:00", "EventTime": "2023-10-30T14:12:40.969542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cmm5ki3idLIqz0pbHg"]} -{"Format": "IDEA0", "ID": "d44d55b4-839e-4b7a-9ab2-6e4abc6239c0", "DetectTime": "2023-10-30T14:12:40.989737+02:00", "EventTime": "2023-10-30T14:12:40.989757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CN69251HEuNJe6oR3l"]} -{"Format": "IDEA0", "ID": "799d1d33-a44d-435e-9827-57f659e95463", "DetectTime": "2023-10-30T14:12:41.013130+02:00", "EventTime": "2023-10-30T14:12:41.013145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CIFEwA2CrGAHHUG3tf"]} -{"Format": "Json", "ID": "799d1d33-a44d-435e-9827-57f659e95463", "DetectTime": "2023-10-30T14:12:41.013130+02:00", "EventTime": "2023-10-30T14:12:41.013145+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:56:07.299225+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:41.080221)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a788b0f4-0afd-47d1-9c60-1cb8c4a7786b", "DetectTime": "2023-10-30T14:12:41.085326+02:00", "EventTime": "2023-10-30T14:12:41.085338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C7Y3Eg2WAuInhyFUJ3"]} -{"Format": "IDEA0", "ID": "82b11c3b-8ff3-4486-8c88-0db028b9c8dc", "DetectTime": "2023-10-30T14:12:41.105881+02:00", "EventTime": "2023-10-30T14:12:41.105893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["COqiSA336PqRfVsGH7"]} -{"Format": "IDEA0", "ID": "5a6e856e-fbd1-42bc-9356-c61caa075ff1", "DetectTime": "2023-10-30T14:12:41.126356+02:00", "EventTime": "2023-10-30T14:12:41.126367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CSlcCv2jnhkbAddk8k"]} -{"Format": "IDEA0", "ID": "3ac56aa7-4644-4e02-8894-d37c2548885d", "DetectTime": "2023-10-30T14:12:41.145899+02:00", "EventTime": "2023-10-30T14:12:41.145910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cntgfp2RSJedSHyTpj"]} -{"Format": "IDEA0", "ID": "b63451e4-c6d9-407a-b46a-792efaf51d43", "DetectTime": "2023-10-30T14:12:41.164862+02:00", "EventTime": "2023-10-30T14:12:41.164881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cjhww23f4d4TgGH6tc"]} -{"Format": "IDEA0", "ID": "523288ba-938a-420d-8476-665cbc1d4e5d", "DetectTime": "2023-10-30T14:12:41.184310+02:00", "EventTime": "2023-10-30T14:12:41.184325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CPFwG016zlCV2dI537"]} -{"Format": "IDEA0", "ID": "1357780e-f09e-4354-8bff-036e0358f2bb", "DetectTime": "2023-10-30T14:12:41.202528+02:00", "EventTime": "2023-10-30T14:12:41.202543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CKumnU3QkPLFjf3Mb9"]} -{"Format": "IDEA0", "ID": "fa375156-0455-4c84-82e9-ec7deaa14386", "DetectTime": "2023-10-30T14:12:41.223722+02:00", "EventTime": "2023-10-30T14:12:41.223737+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CwBqYX22vlVSvtILwk"]} -{"Format": "Json", "ID": "fa375156-0455-4c84-82e9-ec7deaa14386", "DetectTime": "2023-10-30T14:12:41.223722+02:00", "EventTime": "2023-10-30T14:12:41.223737+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T19:56:09.259658+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2023/10/30 14:12:41.283311)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6494667e-01fa-411a-8d03-d15b9604a388", "DetectTime": "2023-10-30T14:12:41.288722+02:00", "EventTime": "2023-10-30T14:12:41.288739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C9a4yb1qebRD1Kqtke"]} -{"Format": "IDEA0", "ID": "e324e09e-c221-4332-833f-d0ee0718e5bf", "DetectTime": "2023-10-30T14:12:41.310563+02:00", "EventTime": "2023-10-30T14:12:41.310577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CpC5kt4hXZ9H3zhLyk"]} -{"Format": "IDEA0", "ID": "2b81f7ef-f9d7-4516-aee0-861f9d9b04f8", "DetectTime": "2023-10-30T14:12:41.328095+02:00", "EventTime": "2023-10-30T14:12:41.328113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CAsnHI1SiGRzpI8GWe"]} -{"Format": "IDEA0", "ID": "f0abbb0d-964b-44b7-baf2-9ff847e2c9fa", "DetectTime": "2023-10-30T14:12:41.344585+02:00", "EventTime": "2023-10-30T14:12:41.344600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTC5RI2EaxHSGhTZM7"]} -{"Format": "IDEA0", "ID": "aa550eb6-ae41-4e40-8f1b-85ad11105614", "DetectTime": "2023-10-30T14:12:41.383670+02:00", "EventTime": "2023-10-30T14:12:41.383687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C6Ice32QXKrzJWrJjj"]} -{"Format": "IDEA0", "ID": "0bd644c4-d613-4e3f-b6c3-d941bf56540c", "DetectTime": "2023-10-30T14:12:41.409652+02:00", "EventTime": "2023-10-30T14:12:41.409670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cjmr2J38pBhqutKPk4"]} -{"Format": "IDEA0", "ID": "cbe2a6ac-dd7c-4df2-8aa8-54c48b3cf04f", "DetectTime": "2023-10-30T14:12:41.444207+02:00", "EventTime": "2023-10-30T14:12:41.444219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cd9vJT2S7w5bTo2RDh"]} -{"Format": "IDEA0", "ID": "1ca039f8-7eb8-4ae1-b307-1c1fa89796ba", "DetectTime": "2023-10-30T14:12:41.478384+02:00", "EventTime": "2023-10-30T14:12:41.478400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CFkPRoziERFmNR7Rf"]} -{"Format": "IDEA0", "ID": "dea60045-292d-4258-b8aa-f1471ee2b6ec", "DetectTime": "2023-10-30T14:12:41.512310+02:00", "EventTime": "2023-10-30T14:12:41.512326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CdebnA3gAA9MVAe6Nf"]} -{"Format": "IDEA0", "ID": "cffca25d-a19b-468b-9877-8c2425a60b81", "DetectTime": "2023-10-30T14:12:41.544709+02:00", "EventTime": "2023-10-30T14:12:41.544723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CpYHOd1wG2tZZ62Jb9"]} -{"Format": "IDEA0", "ID": "ad30b205-7758-432c-a0a2-286d6db87bb1", "DetectTime": "2023-10-30T14:12:41.577799+02:00", "EventTime": "2023-10-30T14:12:41.577814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["COvejY3GbPxhqns27g"]} -{"Format": "IDEA0", "ID": "94541dde-c216-4951-8ac0-bdc34c6bfe4f", "DetectTime": "2023-10-30T14:12:41.608700+02:00", "EventTime": "2023-10-30T14:12:41.608725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["COyyhY1bBgplQPKS1f"]} -{"Format": "Json", "ID": "94541dde-c216-4951-8ac0-bdc34c6bfe4f", "DetectTime": "2023-10-30T14:12:41.608700+02:00", "EventTime": "2023-10-30T14:12:41.608725+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:26:38.317961+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:41.690633)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b2f06b17-0d71-4d2d-a2a4-6403c026907c", "DetectTime": "2023-10-30T14:12:41.696438+02:00", "EventTime": "2023-10-30T14:12:41.696454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CV0mEr43VIgnqEubU9"]} -{"Format": "IDEA0", "ID": "ff509f33-953e-4f9b-9c21-51eb313c44b8", "DetectTime": "2023-10-30T14:12:41.730771+02:00", "EventTime": "2023-10-30T14:12:41.730805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CPHdUFn7coqVU42i"]} -{"Format": "IDEA0", "ID": "f7d102a4-6dcc-47f5-9431-c26616aeb8fc", "DetectTime": "2023-10-30T14:12:41.760562+02:00", "EventTime": "2023-10-30T14:12:41.760582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CPq0edBJaLYWcZyy"]} -{"Format": "IDEA0", "ID": "126895e9-2ba5-4a26-9df7-1ca0df368100", "DetectTime": "2023-10-30T14:12:41.791010+02:00", "EventTime": "2023-10-30T14:12:41.791031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CqGi8C1epgd50bCQN2"]} -{"Format": "IDEA0", "ID": "9db08c03-03be-428d-9e55-b6220e3dea2e", "DetectTime": "2023-10-30T14:12:41.820784+02:00", "EventTime": "2023-10-30T14:12:41.820794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CzXEMb2fcgVO2orSf7"]} -{"Format": "IDEA0", "ID": "27696794-fc2c-4516-9b01-a7ca959a81d7", "DetectTime": "2023-10-30T14:12:41.852054+02:00", "EventTime": "2023-10-30T14:12:41.852065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CjwZFk3b9Th4INmFL4"]} -{"Format": "IDEA0", "ID": "3c8b5c3a-3d24-4737-8f04-70af030cccb9", "DetectTime": "2023-10-30T14:12:41.882203+02:00", "EventTime": "2023-10-30T14:12:41.882214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CWXIfe1Pdut5Lvsk39"]} -{"Format": "IDEA0", "ID": "130a6d50-6e3a-4994-8df0-62baa9b7db13", "DetectTime": "2023-10-30T14:12:41.910954+02:00", "EventTime": "2023-10-30T14:12:41.910970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["ClzqMb4PEbFB5cklNe"]} -{"Format": "Json", "ID": "130a6d50-6e3a-4994-8df0-62baa9b7db13", "DetectTime": "2023-10-30T14:12:41.910954+02:00", "EventTime": "2023-10-30T14:12:41.910970+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:26:40.134484+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:41.982948)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "437b3e51-cfdf-4deb-a1e2-63b22f43a99a", "DetectTime": "2023-10-30T14:12:41.987628+02:00", "EventTime": "2023-10-30T14:12:41.987642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cj5cpB2hKXjnPedzH4"]} -{"Format": "IDEA0", "ID": "117a3758-dc51-4c7e-be7f-60c427853ec7", "DetectTime": "2023-10-30T14:12:42.017948+02:00", "EventTime": "2023-10-30T14:12:42.017968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cr66A43m2ppIL92vGj"]} -{"Format": "IDEA0", "ID": "62ff1065-a6d5-4197-870a-34e7f5ad847b", "DetectTime": "2023-10-30T14:12:42.045968+02:00", "EventTime": "2023-10-30T14:12:42.045984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CZe7cV2D9todYhTyia"]} -{"Format": "IDEA0", "ID": "71fc9731-b130-4c61-a1df-c46e6006c1fc", "DetectTime": "2023-10-30T14:12:42.075433+02:00", "EventTime": "2023-10-30T14:12:42.075445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CmK0gS2Ej1aILRVWU4"]} -{"Format": "IDEA0", "ID": "52bec688-40e6-4dcc-9b07-ef5d27d4953c", "DetectTime": "2023-10-30T14:12:42.102997+02:00", "EventTime": "2023-10-30T14:12:42.103014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CiCnfG1MZXL3z2q992"]} -{"Format": "IDEA0", "ID": "2418a39b-1328-4bd8-a540-1d1fef0d91b9", "DetectTime": "2023-10-30T14:12:42.134140+02:00", "EventTime": "2023-10-30T14:12:42.134153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSLnL4BjJXPs4t50a"]} -{"Format": "IDEA0", "ID": "7e46625f-45e9-4894-80e8-a01ec36733b4", "DetectTime": "2023-10-30T14:12:42.163397+02:00", "EventTime": "2023-10-30T14:12:42.163408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbMo2R2isUdvBp4S0h"]} -{"Format": "IDEA0", "ID": "55f898e6-76cc-42e8-9b39-3ddc597075fc", "DetectTime": "2023-10-30T14:12:42.189813+02:00", "EventTime": "2023-10-30T14:12:42.189825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C5hmv81i1KbNveRDh"]} -{"Format": "Json", "ID": "55f898e6-76cc-42e8-9b39-3ddc597075fc", "DetectTime": "2023-10-30T14:12:42.189813+02:00", "EventTime": "2023-10-30T14:12:42.189825+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:26:41.907077+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:42.258715)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "40dfbee3-d564-47a5-9686-2854cadd5de1", "DetectTime": "2023-10-30T14:12:42.263358+02:00", "EventTime": "2023-10-30T14:12:42.263373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C3LwD33SIFOZNZ1TM8"]} -{"Format": "IDEA0", "ID": "81bde932-8bce-4d2b-a5d6-10b62dc7f8f1", "DetectTime": "2023-10-30T14:12:42.287996+02:00", "EventTime": "2023-10-30T14:12:42.288008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CiYuX12Fd1N6DVhwxk"]} -{"Format": "IDEA0", "ID": "d27ffcd6-0922-4f23-b0bd-a9219104ae7f", "DetectTime": "2023-10-30T14:12:42.310630+02:00", "EventTime": "2023-10-30T14:12:42.310640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CsEAqHIs2udhkRl09"]} -{"Format": "IDEA0", "ID": "de410821-3c14-4066-ad8b-ab858feb5d07", "DetectTime": "2023-10-30T14:12:42.336271+02:00", "EventTime": "2023-10-30T14:12:42.336283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CrDyWn3IffVQrRPTub"]} -{"Format": "IDEA0", "ID": "d90cd21d-1b1a-460f-bef4-e12c39726460", "DetectTime": "2023-10-30T14:12:42.359075+02:00", "EventTime": "2023-10-30T14:12:42.359092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cnh7uJ28qwGzqOKb3f"]} -{"Format": "IDEA0", "ID": "58d96ea4-f18c-40b6-b500-4a7616f069d1", "DetectTime": "2023-10-30T14:12:42.382281+02:00", "EventTime": "2023-10-30T14:12:42.382302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CC8SLZ30HJbNxF3Bc"]} -{"Format": "IDEA0", "ID": "a82aeb90-300f-4e4a-bd09-7cca1104ca5f", "DetectTime": "2023-10-30T14:12:42.405772+02:00", "EventTime": "2023-10-30T14:12:42.405783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CLxjzclJt8qeSqJOa"]} -{"Format": "IDEA0", "ID": "90ec784b-dc19-45b1-a668-9a32a80c9ff0", "DetectTime": "2023-10-30T14:12:42.433460+02:00", "EventTime": "2023-10-30T14:12:42.433477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CspCUM3lp6anqsyt5a"]} -{"Format": "IDEA0", "ID": "ff07efd7-b6a0-4c2f-a5a9-aa09ab6ad3c8", "DetectTime": "2023-10-30T14:12:42.458619+02:00", "EventTime": "2023-10-30T14:12:42.458633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CQ9wFw4cWLn5dSSye2"]} -{"Format": "Json", "ID": "ff07efd7-b6a0-4c2f-a5a9-aa09ab6ad3c8", "DetectTime": "2023-10-30T14:12:42.458619+02:00", "EventTime": "2023-10-30T14:12:42.458633+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:56:47.254390+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:42.520326)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "508c1706-bfee-43ed-85c0-133722416444", "DetectTime": "2023-10-30T14:12:42.524218+02:00", "EventTime": "2023-10-30T14:12:42.524228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CiiDET3zDWmAK2Dh0k"]} -{"Format": "IDEA0", "ID": "f4c3f1bb-ca58-4cff-bf5d-664c58bbc262", "DetectTime": "2023-10-30T14:12:42.545981+02:00", "EventTime": "2023-10-30T14:12:42.545991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CB8AXU3rNxKu8bhES"]} -{"Format": "IDEA0", "ID": "4396ac8c-9a45-445d-8d87-e8bc752ec07f", "DetectTime": "2023-10-30T14:12:42.564709+02:00", "EventTime": "2023-10-30T14:12:42.564727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C5gXTW3Cslh6oMlt0l"]} -{"Format": "IDEA0", "ID": "8f95d216-7555-44b2-8169-4a6d1e74b2d4", "DetectTime": "2023-10-30T14:12:42.585679+02:00", "EventTime": "2023-10-30T14:12:42.585691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Ct89hD3lJTN7d3MhJc"]} -{"Format": "IDEA0", "ID": "299b794e-1b07-472b-991b-c62d2ccc446f", "DetectTime": "2023-10-30T14:12:42.612567+02:00", "EventTime": "2023-10-30T14:12:42.612582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Ck4s8R3aWReoEugJZe"]} -{"Format": "IDEA0", "ID": "d75b22b9-a9c4-49f7-9bb9-280ef328570a", "DetectTime": "2023-10-30T14:12:42.635725+02:00", "EventTime": "2023-10-30T14:12:42.635736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CL6YfN2COb55KQUDr4"]} -{"Format": "IDEA0", "ID": "edbb935e-d635-45ff-aa81-e948fd0ad010", "DetectTime": "2023-10-30T14:12:42.659827+02:00", "EventTime": "2023-10-30T14:12:42.659842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cb0Xdu1XzQlT5YIeX2"]} -{"Format": "IDEA0", "ID": "776e7acf-3e0e-4c38-a53e-71581a7f0f89", "DetectTime": "2023-10-30T14:12:42.686264+02:00", "EventTime": "2023-10-30T14:12:42.686280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CnqthFmkJN9UDtsp4"]} -{"Format": "Json", "ID": "776e7acf-3e0e-4c38-a53e-71581a7f0f89", "DetectTime": "2023-10-30T14:12:42.686264+02:00", "EventTime": "2023-10-30T14:12:42.686280+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:56:48.942213+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:42.756272)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "11c86582-2fc1-4387-b7a9-52b3eb96f5df", "DetectTime": "2023-10-30T14:12:42.761864+02:00", "EventTime": "2023-10-30T14:12:42.761881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CGTegt2oWyRR6nC2Xh"]} -{"Format": "IDEA0", "ID": "4fcef7eb-d0a9-4437-a8d5-b5429f568bcb", "DetectTime": "2023-10-30T14:12:42.786945+02:00", "EventTime": "2023-10-30T14:12:42.786962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cxp4lb3E7MjYhRqB8d"]} -{"Format": "IDEA0", "ID": "1bc6bb4c-0e4c-4de9-85bf-f01b1bdfd619", "DetectTime": "2023-10-30T14:12:42.810437+02:00", "EventTime": "2023-10-30T14:12:42.810447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CMTvjH33hItJqKpcXc"]} -{"Format": "IDEA0", "ID": "c7a6114f-63a0-4c31-a574-4c6e27a8e2c7", "DetectTime": "2023-10-30T14:12:42.829014+02:00", "EventTime": "2023-10-30T14:12:42.829025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CUN1i5GpveTsuu0o8"]} -{"Format": "IDEA0", "ID": "e03372ca-ff60-4fa5-b180-60331faa02cf", "DetectTime": "2023-10-30T14:12:42.850152+02:00", "EventTime": "2023-10-30T14:12:42.850165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Ckp6et13OPlJ1tw34"]} -{"Format": "IDEA0", "ID": "7acf89a4-0abb-4156-a504-d27a526d34c3", "DetectTime": "2023-10-30T14:12:42.868944+02:00", "EventTime": "2023-10-30T14:12:42.868956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CRD4gr2F9jUmGmjCSc"]} -{"Format": "IDEA0", "ID": "aee07337-198e-46de-a462-7ec96199d01f", "DetectTime": "2023-10-30T14:12:42.889986+02:00", "EventTime": "2023-10-30T14:12:42.890001+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CFHVFzA1tFxsSojO1"]} -{"Format": "IDEA0", "ID": "99de8a1f-37fc-4ecc-8664-ac50d03fe5d0", "DetectTime": "2023-10-30T14:12:42.911750+02:00", "EventTime": "2023-10-30T14:12:42.911766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C5hsSO3044KboSGNFg"]} -{"Format": "IDEA0", "ID": "afa78d66-0ba7-4944-a130-cc5fd24a3e1f", "DetectTime": "2023-10-30T14:12:42.937459+02:00", "EventTime": "2023-10-30T14:12:42.937475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CNYwlxOsutqxSg3w1"]} -{"Format": "Json", "ID": "afa78d66-0ba7-4944-a130-cc5fd24a3e1f", "DetectTime": "2023-10-30T14:12:42.937459+02:00", "EventTime": "2023-10-30T14:12:42.937475+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:56:50.652802+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:42.995276)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "69279faf-ec2a-4d95-96ff-1df2ed4cb5ab", "DetectTime": "2023-10-30T14:12:42.999111+02:00", "EventTime": "2023-10-30T14:12:42.999121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cxdq3o2I5IdvcUSQVl"]} -{"Format": "IDEA0", "ID": "dc7cb09a-d2b1-4666-9ad1-09784926a84b", "DetectTime": "2023-10-30T14:12:43.016666+02:00", "EventTime": "2023-10-30T14:12:43.016677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C8sKL519ljnKHIheg1"]} -{"Format": "IDEA0", "ID": "08c42b82-e271-4eec-bcbe-50251d648c21", "DetectTime": "2023-10-30T14:12:43.037249+02:00", "EventTime": "2023-10-30T14:12:43.037265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C195Oh3gknvuoBgxGh"]} -{"Format": "IDEA0", "ID": "3e7fe6ab-9266-4fd2-af2f-5276b4853322", "DetectTime": "2023-10-30T14:12:43.053849+02:00", "EventTime": "2023-10-30T14:12:43.053861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CuqEBXtv2OxSUuS1k"]} -{"Format": "IDEA0", "ID": "0f7035dc-c0d7-45be-bc71-18a35bd6c4d8", "DetectTime": "2023-10-30T14:12:43.068130+02:00", "EventTime": "2023-10-30T14:12:43.068142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C4UmNL1GQGDxaCqsg9"]} -{"Format": "IDEA0", "ID": "80763e5b-504c-443e-871a-90c556f297b8", "DetectTime": "2023-10-30T14:12:43.083934+02:00", "EventTime": "2023-10-30T14:12:43.083945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CguFac28i2F14qj50d"]} -{"Format": "IDEA0", "ID": "367cc7a7-a03f-4054-bf65-342a21ad4baa", "DetectTime": "2023-10-30T14:12:43.100035+02:00", "EventTime": "2023-10-30T14:12:43.100056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cr4gY52d5DkEAUoIre"]} -{"Format": "IDEA0", "ID": "5848215e-7e0d-451a-9831-2effade2b95f", "DetectTime": "2023-10-30T14:12:43.116898+02:00", "EventTime": "2023-10-30T14:12:43.116913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cz5XGK1UidwcjMVBZj"]} -{"Format": "Json", "ID": "5848215e-7e0d-451a-9831-2effade2b95f", "DetectTime": "2023-10-30T14:12:43.116898+02:00", "EventTime": "2023-10-30T14:12:43.116913+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T20:56:52.526977+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2023/10/30 14:12:43.170933)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f1326cc1-5ee6-4edc-8889-89e6ce2d30de", "DetectTime": "2023-10-30T14:12:43.176129+02:00", "EventTime": "2023-10-30T14:12:43.176144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CWjj9GqXlsAR52JQ1"]} -{"Format": "IDEA0", "ID": "4209ed30-c1ca-492a-bfec-06f759200bf6", "DetectTime": "2023-10-30T14:12:43.193087+02:00", "EventTime": "2023-10-30T14:12:43.193098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cp2Ibt3ndDPngggVjf"]} -{"Format": "IDEA0", "ID": "11a83142-a502-46d8-9914-b515bdc19993", "DetectTime": "2023-10-30T14:12:43.208539+02:00", "EventTime": "2023-10-30T14:12:43.208556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cgkp8r2TaLw4VY92tf"]} -{"Format": "IDEA0", "ID": "b69d7194-4266-4d49-9ae2-d539614362c4", "DetectTime": "2023-10-30T14:12:43.221806+02:00", "EventTime": "2023-10-30T14:12:43.221816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9551], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. ", "ContentType": "text/plain"}], "uids": ["CTNTwT23M4EBL6XnSl"]} -{"Format": "IDEA0", "ID": "fdc80235-e123-4e18-a0e6-a521dbd593bb", "DetectTime": "2023-10-30T14:12:43.235954+02:00", "EventTime": "2023-10-30T14:12:43.235967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgdNHg4ebO2Rvkyuo4"]} -{"Format": "IDEA0", "ID": "c3144c54-5623-460c-b3d8-119c307fb267", "DetectTime": "2023-10-30T14:12:43.270434+02:00", "EventTime": "2023-10-30T14:12:43.270450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CI1PkB1jzsdqzTih9"]} -{"Format": "IDEA0", "ID": "870b3edf-0419-4411-93f2-8ee13913faf7", "DetectTime": "2023-10-30T14:12:43.296248+02:00", "EventTime": "2023-10-30T14:12:43.296266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cq67He1nQ5pXLIvG4"]} -{"Format": "IDEA0", "ID": "81191878-e2bf-45f6-b965-1e821eed5862", "DetectTime": "2023-10-30T14:12:43.322347+02:00", "EventTime": "2023-10-30T14:12:43.322358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CIujXVHztszteyVwj"]} -{"Format": "IDEA0", "ID": "b787b151-fe6f-42c1-bed6-d47a16068b23", "DetectTime": "2023-10-30T14:12:43.346520+02:00", "EventTime": "2023-10-30T14:12:43.346531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CXngRq1s2iV2UphGXl"]} -{"Format": "IDEA0", "ID": "4f99ef64-00a1-444d-a1b4-3929165ec1d1", "DetectTime": "2023-10-30T14:12:43.370947+02:00", "EventTime": "2023-10-30T14:12:43.370965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3Wbsb23USq7yYSdFc"]} -{"Format": "IDEA0", "ID": "20f77de7-1b0e-4699-9b8f-6ded2f04ea5b", "DetectTime": "2023-10-30T14:12:43.400718+02:00", "EventTime": "2023-10-30T14:12:43.400730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CooYb72WIA1JRuHPxa"]} -{"Format": "IDEA0", "ID": "05be53f6-5ce6-4e87-b2d6-c4dcff58399d", "DetectTime": "2023-10-30T14:12:43.435993+02:00", "EventTime": "2023-10-30T14:12:43.436009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CSYIBG2VVxbTpUlAOe"]} -{"Format": "IDEA0", "ID": "cc6641f4-c5cc-4762-975a-fef619537961", "DetectTime": "2023-10-30T14:12:43.462226+02:00", "EventTime": "2023-10-30T14:12:43.462242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CZgBYh4wMDrE7UmQl9"]} -{"Format": "Json", "ID": "cc6641f4-c5cc-4762-975a-fef619537961", "DetectTime": "2023-10-30T14:12:43.462226+02:00", "EventTime": "2023-10-30T14:12:43.462242+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:27:24.777418+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:43.527817)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8f7bf17d-eb2f-45ee-8bb3-271dd4bf3f39", "DetectTime": "2023-10-30T14:12:43.533261+02:00", "EventTime": "2023-10-30T14:12:43.533277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cq4ARpr0XXOEHNYX"]} -{"Format": "IDEA0", "ID": "879b026e-7199-46a5-938a-7a3f45ba3390", "DetectTime": "2023-10-30T14:12:43.566456+02:00", "EventTime": "2023-10-30T14:12:43.566468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Ces0iE24Z4WKoUoaF9"]} -{"Format": "IDEA0", "ID": "0806c298-5988-4ae3-bc1d-89ed62663599", "DetectTime": "2023-10-30T14:12:43.590590+02:00", "EventTime": "2023-10-30T14:12:43.590617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C0PWcLWc065b5uRkc"]} -{"Format": "IDEA0", "ID": "3fc93974-540e-475a-b26d-7ce9204d8062", "DetectTime": "2023-10-30T14:12:43.623502+02:00", "EventTime": "2023-10-30T14:12:43.623518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CQAtGM1byDKSNEU1vj"]} -{"Format": "IDEA0", "ID": "c19f8e2e-ccce-4611-96be-e240cfbe98b2", "DetectTime": "2023-10-30T14:12:43.654252+02:00", "EventTime": "2023-10-30T14:12:43.654264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cr7qar2IiVQISR84Jg"]} -{"Format": "IDEA0", "ID": "b1d10565-355d-463d-a194-37f51d6ab20c", "DetectTime": "2023-10-30T14:12:43.680208+02:00", "EventTime": "2023-10-30T14:12:43.680221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CsNWSj337FcmHCGEjd"]} -{"Format": "IDEA0", "ID": "20face02-1734-4445-b29d-c757ab9bd5cd", "DetectTime": "2023-10-30T14:12:43.707320+02:00", "EventTime": "2023-10-30T14:12:43.707331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Ck7jkF1IKhbMwxTnF9"]} -{"Format": "IDEA0", "ID": "2bda11c7-b2cb-44e4-8a30-eeca36f13efd", "DetectTime": "2023-10-30T14:12:43.739137+02:00", "EventTime": "2023-10-30T14:12:43.739155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CAe4rh2PI0GpK6ghof"]} -{"Format": "Json", "ID": "2bda11c7-b2cb-44e4-8a30-eeca36f13efd", "DetectTime": "2023-10-30T14:12:43.739137+02:00", "EventTime": "2023-10-30T14:12:43.739155+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:27:26.658035+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:43.803217)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7214034e-30d6-4c61-9397-5d95a1254287", "DetectTime": "2023-10-30T14:12:43.807127+02:00", "EventTime": "2023-10-30T14:12:43.807137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cx5xGn4oXTKeFFYq2"]} -{"Format": "IDEA0", "ID": "82b5246a-26c6-4549-8d1d-fa16bf17de03", "DetectTime": "2023-10-30T14:12:43.832768+02:00", "EventTime": "2023-10-30T14:12:43.832784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CR9zlT3y3ShEjbkwv6"]} -{"Format": "IDEA0", "ID": "f57536d7-688d-4e86-9086-ab1537b69d69", "DetectTime": "2023-10-30T14:12:43.858546+02:00", "EventTime": "2023-10-30T14:12:43.858562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CIaOi91tC8P9vyuxJ4"]} -{"Format": "IDEA0", "ID": "d7ee57a0-4b74-4856-8bda-a1a422303627", "DetectTime": "2023-10-30T14:12:43.881436+02:00", "EventTime": "2023-10-30T14:12:43.881447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CgvdWq1EH12YEFwBjh"]} -{"Format": "IDEA0", "ID": "490beeea-656f-4f85-a299-01da6ecc9700", "DetectTime": "2023-10-30T14:12:43.908882+02:00", "EventTime": "2023-10-30T14:12:43.908897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJElrL2OHSBP0V2nXe"]} -{"Format": "IDEA0", "ID": "b662f02d-91e9-419a-8cbf-132c5a94d5b7", "DetectTime": "2023-10-30T14:12:43.934214+02:00", "EventTime": "2023-10-30T14:12:43.934227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C1UsEC1PYNGEJaWjQi"]} -{"Format": "IDEA0", "ID": "c092bf85-a68d-45c5-9675-c83d7721eb64", "DetectTime": "2023-10-30T14:12:43.957075+02:00", "EventTime": "2023-10-30T14:12:43.957086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CCQsIh4ELlk9iMxPbh"]} -{"Format": "IDEA0", "ID": "b77e4a32-992d-4733-aca3-7d4b2e2d24f2", "DetectTime": "2023-10-30T14:12:43.980351+02:00", "EventTime": "2023-10-30T14:12:43.980363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CSIfr612rTXIbuJ4Lh"]} -{"Format": "IDEA0", "ID": "69c30764-7555-4ff4-9cd1-6cc0ea3a2acf", "DetectTime": "2023-10-30T14:12:44.004063+02:00", "EventTime": "2023-10-30T14:12:44.004075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CCz9rn1AutZ9cWeobk"]} -{"Format": "Json", "ID": "69c30764-7555-4ff4-9cd1-6cc0ea3a2acf", "DetectTime": "2023-10-30T14:12:44.004063+02:00", "EventTime": "2023-10-30T14:12:44.004075+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:27:28.448994+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:44.074068)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e10f4708-16b0-4b0e-86ce-07f9aa59244b", "DetectTime": "2023-10-30T14:12:44.079529+02:00", "EventTime": "2023-10-30T14:12:44.079545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CHy42p46v2zDaNJN3h"]} -{"Format": "IDEA0", "ID": "4fcaa7df-8101-4bbb-9f44-565f8093100b", "DetectTime": "2023-10-30T14:12:44.108961+02:00", "EventTime": "2023-10-30T14:12:44.108978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXnjSNlvoz3wa9Al2"]} -{"Format": "IDEA0", "ID": "c4f304f7-151a-4277-a4ff-e338970f5d81", "DetectTime": "2023-10-30T14:12:44.137433+02:00", "EventTime": "2023-10-30T14:12:44.137449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CbvY4QjmTo4tHHmgh"]} -{"Format": "IDEA0", "ID": "233619ac-852b-4079-92c0-a7d19b024454", "DetectTime": "2023-10-30T14:12:44.164610+02:00", "EventTime": "2023-10-30T14:12:44.164621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CT1TVd42O1QjLRZe4l"]} -{"Format": "IDEA0", "ID": "22b93b2e-fe6b-439a-b2ea-0eb81654ef58", "DetectTime": "2023-10-30T14:12:44.189190+02:00", "EventTime": "2023-10-30T14:12:44.189206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CSWJ6j1yfsEhXqIUKe"]} -{"Format": "IDEA0", "ID": "634662c1-a3bf-4500-ab2c-484f2b8691fb", "DetectTime": "2023-10-30T14:12:44.219419+02:00", "EventTime": "2023-10-30T14:12:44.219434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CUdvoj4KC4C0HMUg7b"]} -{"Format": "IDEA0", "ID": "9e97bdbd-e0f2-4ef1-a0a3-51f435f68c13", "DetectTime": "2023-10-30T14:12:44.243038+02:00", "EventTime": "2023-10-30T14:12:44.243058+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CcpEyo2XWmHTi0ay44"]} -{"Format": "IDEA0", "ID": "47e9db22-a489-4018-813f-c93ac5564664", "DetectTime": "2023-10-30T14:12:44.263768+02:00", "EventTime": "2023-10-30T14:12:44.263784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CMjAEA2l1eIWMZ1dzf"]} -{"Format": "IDEA0", "ID": "8ff09e44-5a97-4e9f-acd8-9ce8bc536faa", "DetectTime": "2023-10-30T14:12:44.286345+02:00", "EventTime": "2023-10-30T14:12:44.286356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CNmzOfdi2unWPTaT9"]} -{"Format": "Json", "ID": "8ff09e44-5a97-4e9f-acd8-9ce8bc536faa", "DetectTime": "2023-10-30T14:12:44.286345+02:00", "EventTime": "2023-10-30T14:12:44.286356+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:58:34.176262+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:44.345575)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c14aad35-47df-4f23-83bd-f74bfed1173f", "DetectTime": "2023-10-30T14:12:44.350421+02:00", "EventTime": "2023-10-30T14:12:44.350435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CQ91ur4CphMVwnMzq6"]} -{"Format": "IDEA0", "ID": "721039c8-367d-43ed-87d2-9018a9a57d79", "DetectTime": "2023-10-30T14:12:44.376614+02:00", "EventTime": "2023-10-30T14:12:44.376625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["COaKOf40JeSe8K0Gnb"]} -{"Format": "IDEA0", "ID": "9a7b092b-8387-4d49-a938-b4864c8512a9", "DetectTime": "2023-10-30T14:12:44.397109+02:00", "EventTime": "2023-10-30T14:12:44.397121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CYig2D2CZuTLzS5nL8"]} -{"Format": "IDEA0", "ID": "b16e75a0-eba4-483c-b6ac-c545ea36dfde", "DetectTime": "2023-10-30T14:12:44.421704+02:00", "EventTime": "2023-10-30T14:12:44.421720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CBEjqm1hyeyi0BizBf"]} -{"Format": "IDEA0", "ID": "dca0574a-097c-42a1-8c8e-a45831a0888e", "DetectTime": "2023-10-30T14:12:44.445476+02:00", "EventTime": "2023-10-30T14:12:44.445496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C4GxX52ocjhlOP25wb"]} -{"Format": "IDEA0", "ID": "015aa122-3ea0-4251-bce1-71ddf55aed87", "DetectTime": "2023-10-30T14:12:44.463813+02:00", "EventTime": "2023-10-30T14:12:44.463824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYPFMi2apWgRqpaval"]} -{"Format": "IDEA0", "ID": "d95f0adc-627f-4fff-bbd5-a3d831786fd5", "DetectTime": "2023-10-30T14:12:44.485253+02:00", "EventTime": "2023-10-30T14:12:44.485264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Ct9R4r2lrm3Kbrc6Ih"]} -{"Format": "IDEA0", "ID": "8643506b-32ee-4afe-ad63-2f5797b8b8bc", "DetectTime": "2023-10-30T14:12:44.507328+02:00", "EventTime": "2023-10-30T14:12:44.507352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cy033l35YHSaPexeH8"]} -{"Format": "IDEA0", "ID": "c8318b5e-c9bb-4d7a-a6f3-0ffa91b6a807", "DetectTime": "2023-10-30T14:12:44.531887+02:00", "EventTime": "2023-10-30T14:12:44.531904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cw5v2720AMnxh0YQD9"]} -{"Format": "Json", "ID": "c8318b5e-c9bb-4d7a-a6f3-0ffa91b6a807", "DetectTime": "2023-10-30T14:12:44.531887+02:00", "EventTime": "2023-10-30T14:12:44.531904+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:58:35.698572+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:44.597498)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "522ed5de-e381-4d86-a230-0cd27fd0ca70", "DetectTime": "2023-10-30T14:12:44.602906+02:00", "EventTime": "2023-10-30T14:12:44.602917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cg60HO1E6yXVt8aQcd"]} -{"Format": "IDEA0", "ID": "8f8b8367-25e8-484e-8684-54213262afe8", "DetectTime": "2023-10-30T14:12:44.621559+02:00", "EventTime": "2023-10-30T14:12:44.621569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CfE7ne30QsMGcEDN03"]} -{"Format": "IDEA0", "ID": "62537c4c-4791-495b-874a-07d43fa27321", "DetectTime": "2023-10-30T14:12:44.643068+02:00", "EventTime": "2023-10-30T14:12:44.643088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CBTZ3M1h8r3a9m6gy7"]} -{"Format": "IDEA0", "ID": "5f6cecc9-c212-48a5-b2e5-b103e0df5a5e", "DetectTime": "2023-10-30T14:12:44.661300+02:00", "EventTime": "2023-10-30T14:12:44.661312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CxMTFs4Psm3MOIoCDf"]} -{"Format": "IDEA0", "ID": "04c329f4-631d-422f-a9ca-efda61ae4c70", "DetectTime": "2023-10-30T14:12:44.680224+02:00", "EventTime": "2023-10-30T14:12:44.680235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CmyGvf42GImIYxGfQl"]} -{"Format": "IDEA0", "ID": "bee425ff-2358-4069-a911-231900d0264c", "DetectTime": "2023-10-30T14:12:44.700523+02:00", "EventTime": "2023-10-30T14:12:44.700533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CbdBVt3H42d4hG0sR3"]} -{"Format": "IDEA0", "ID": "09674dbc-d57b-459a-8314-823404c80d69", "DetectTime": "2023-10-30T14:12:44.720092+02:00", "EventTime": "2023-10-30T14:12:44.720110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CMFSc021lZWcd36mz5"]} -{"Format": "IDEA0", "ID": "4bcac1f2-09e5-45f6-bd18-82c8e6644dcb", "DetectTime": "2023-10-30T14:12:44.743048+02:00", "EventTime": "2023-10-30T14:12:44.743059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCV2jo3pCfNYKSONwk"]} -{"Format": "Json", "ID": "4bcac1f2-09e5-45f6-bd18-82c8e6644dcb", "DetectTime": "2023-10-30T14:12:44.743048+02:00", "EventTime": "2023-10-30T14:12:44.743059+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:58:37.730283+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:44.801854)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "58cbc2c4-f1b4-41ce-aaa3-5379cc1601de", "DetectTime": "2023-10-30T14:12:44.806832+02:00", "EventTime": "2023-10-30T14:12:44.806843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CPoDlH3nkBE7PWngw3"]} -{"Format": "IDEA0", "ID": "760cab5e-8042-44ff-aac2-c9c0b49f4db5", "DetectTime": "2023-10-30T14:12:44.826218+02:00", "EventTime": "2023-10-30T14:12:44.826233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CsFKja1t0PNJcL8G11"]} -{"Format": "IDEA0", "ID": "ba559009-83b8-4db9-80ab-722053f9d00d", "DetectTime": "2023-10-30T14:12:44.848998+02:00", "EventTime": "2023-10-30T14:12:44.849013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CokZ5j3HLYZtw4ezn8"]} -{"Format": "IDEA0", "ID": "8b3e464b-d30a-45e5-986d-aa95d8e8ae3a", "DetectTime": "2023-10-30T14:12:44.869654+02:00", "EventTime": "2023-10-30T14:12:44.869670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CA9UUB1uei70SQYfLj"]} -{"Format": "IDEA0", "ID": "7b230728-d424-48ac-b5dc-2d6c3e529068", "DetectTime": "2023-10-30T14:12:44.889258+02:00", "EventTime": "2023-10-30T14:12:44.889270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CN07Sl35Yjx9UdPze7"]} -{"Format": "IDEA0", "ID": "bc90013b-9bf8-4966-964a-dacca1e1cd21", "DetectTime": "2023-10-30T14:12:44.908448+02:00", "EventTime": "2023-10-30T14:12:44.908463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CpDU3a4WE39AsysUw"]} -{"Format": "IDEA0", "ID": "01fb8432-3752-46a3-ac37-a4a8b1120bc2", "DetectTime": "2023-10-30T14:12:44.928210+02:00", "EventTime": "2023-10-30T14:12:44.928232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["ChjF6m2NhAnrCx75l6"]} -{"Format": "IDEA0", "ID": "51a20063-2d1e-4913-a2bd-8e09388e3b70", "DetectTime": "2023-10-30T14:12:44.947680+02:00", "EventTime": "2023-10-30T14:12:44.947690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ch6dq03wvUUstVvUXd"]} -{"Format": "IDEA0", "ID": "02fca886-53a7-46da-9feb-10f423063d53", "DetectTime": "2023-10-30T14:12:44.966140+02:00", "EventTime": "2023-10-30T14:12:44.966159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CLin1r4RhFH7SjWnA8"]} -{"Format": "Json", "ID": "02fca886-53a7-46da-9feb-10f423063d53", "DetectTime": "2023-10-30T14:12:44.966140+02:00", "EventTime": "2023-10-30T14:12:44.966159+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T21:58:39.562402+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2023/10/30 14:12:45.013477)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "276d9160-b8d4-4fc9-8ba4-2e122a86aab9", "DetectTime": "2023-10-30T14:12:45.017433+02:00", "EventTime": "2023-10-30T14:12:45.017448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CZVIQ42xWDodwS2kZd"]} -{"Format": "IDEA0", "ID": "f88944cd-3561-4a3c-a00c-3f9f87b18c17", "DetectTime": "2023-10-30T14:12:45.034111+02:00", "EventTime": "2023-10-30T14:12:45.034128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C7Cfef4t9WMGNeJGI4"]} -{"Format": "IDEA0", "ID": "dd17ccb0-65e6-43ac-bebe-3e575403e04b", "DetectTime": "2023-10-30T14:12:45.057011+02:00", "EventTime": "2023-10-30T14:12:45.057028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDdwGy2WRxmNFwr8C3"]} -{"Format": "IDEA0", "ID": "78573613-e5a0-49a1-8b24-7c52b7174e10", "DetectTime": "2023-10-30T14:12:45.086764+02:00", "EventTime": "2023-10-30T14:12:45.086790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CvqjyxoaFVH6OZCLf"]} -{"Format": "IDEA0", "ID": "9f716be6-0451-4349-ba39-18738aba21d7", "DetectTime": "2023-10-30T14:12:45.115317+02:00", "EventTime": "2023-10-30T14:12:45.115332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CJtPYOUpljRoGoYd2"]} -{"Format": "IDEA0", "ID": "a28c0c7d-5482-4981-99ac-74e6413a2271", "DetectTime": "2023-10-30T14:12:45.147462+02:00", "EventTime": "2023-10-30T14:12:45.147477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CW2lqb3Qycvh6i98El"]} -{"Format": "IDEA0", "ID": "1490f9b2-da6f-4991-b49f-07513b537b7a", "DetectTime": "2023-10-30T14:12:45.177341+02:00", "EventTime": "2023-10-30T14:12:45.177355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["C9dZ7d1Zsn9xAmM881"]} -{"Format": "IDEA0", "ID": "2ad95346-1606-4f3b-9e28-f5d8d0960b48", "DetectTime": "2023-10-30T14:12:45.197309+02:00", "EventTime": "2023-10-30T14:12:45.197324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CpgaLl1akqzyuR06s1"]} -{"Format": "IDEA0", "ID": "67f18b25-d54b-44f1-9327-fa87eb79436f", "DetectTime": "2023-10-30T14:12:45.222208+02:00", "EventTime": "2023-10-30T14:12:45.222218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CqDd3m3YtsSCqqOFN4"]} -{"Format": "IDEA0", "ID": "331f5346-ffab-4fb2-82ce-cfb47218623d", "DetectTime": "2023-10-30T14:12:45.247595+02:00", "EventTime": "2023-10-30T14:12:45.247608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C90kzO2McKALQ2GfY9"]} -{"Format": "Json", "ID": "331f5346-ffab-4fb2-82ce-cfb47218623d", "DetectTime": "2023-10-30T14:12:45.247595+02:00", "EventTime": "2023-10-30T14:12:45.247608+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T22:29:06.332304+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2023/10/30 14:12:45.324911)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ec94ddcd-7973-44bc-8065-0b18bf345b22", "DetectTime": "2023-10-30T14:12:45.329485+02:00", "EventTime": "2023-10-30T14:12:45.329503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CtCqZE2GftHcj00ZAf"]} -{"Format": "IDEA0", "ID": "217c41bd-f9c9-450a-8fc2-51404ee6fcd1", "DetectTime": "2023-10-30T14:12:45.355406+02:00", "EventTime": "2023-10-30T14:12:45.355418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CZmLhC3DClDz08vlZ2"]} -{"Format": "IDEA0", "ID": "831255df-9b54-4962-b8f0-a8e8c8b0d188", "DetectTime": "2023-10-30T14:12:45.384461+02:00", "EventTime": "2023-10-30T14:12:45.384474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CpWwb12LHNDUl5Klr2"]} -{"Format": "IDEA0", "ID": "12f0019c-7c72-4b22-b778-658a37a4962a", "DetectTime": "2023-10-30T14:12:45.409025+02:00", "EventTime": "2023-10-30T14:12:45.409043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cv6mex1gvio6sNm67e"]} -{"Format": "IDEA0", "ID": "502d9390-dfa8-4fdf-8695-a5f07f9f17c6", "DetectTime": "2023-10-30T14:12:45.437677+02:00", "EventTime": "2023-10-30T14:12:45.437689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CugFQZ1IcFGfTnSngi"]} -{"Format": "IDEA0", "ID": "796514b8-1063-4c2d-9791-47688008a998", "DetectTime": "2023-10-30T14:12:45.465306+02:00", "EventTime": "2023-10-30T14:12:45.465323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["ClwFRN3MFwJ8u2xA51"]} -{"Format": "IDEA0", "ID": "9d4a1193-c08c-412a-9737-3c7c36bed385", "DetectTime": "2023-10-30T14:12:45.492145+02:00", "EventTime": "2023-10-30T14:12:45.492156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CcnN6M3rWmcNgin285"]} -{"Format": "IDEA0", "ID": "8d398ae6-cd83-468b-9492-e38d14daeda5", "DetectTime": "2023-10-30T14:12:45.522331+02:00", "EventTime": "2023-10-30T14:12:45.522348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CAP9Pj4U890laydQu4"]} -{"Format": "Json", "ID": "8d398ae6-cd83-468b-9492-e38d14daeda5", "DetectTime": "2023-10-30T14:12:45.522331+02:00", "EventTime": "2023-10-30T14:12:45.522348+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T22:29:25.425684+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2023/10/30 14:12:45.597206)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a92d572e-3593-42ad-bee1-8329aed834a5", "DetectTime": "2023-10-30T14:12:45.601693+02:00", "EventTime": "2023-10-30T14:12:45.601704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CLNXuB1Z0lkLCYt0L6"]} -{"Format": "IDEA0", "ID": "f658d4ea-8368-4fd0-a1f0-ccc9222a46ad", "DetectTime": "2023-10-30T14:12:45.629174+02:00", "EventTime": "2023-10-30T14:12:45.629185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CaIesr387C9oQGu9G4"]} -{"Format": "IDEA0", "ID": "2662d435-ca21-4f18-bdb4-732137150ff6", "DetectTime": "2023-10-30T14:12:45.653170+02:00", "EventTime": "2023-10-30T14:12:45.653181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CDwbdl4rRDaWIGr14c"]} -{"Format": "IDEA0", "ID": "9e55edd9-288d-43b8-9f7f-13b746b6b87f", "DetectTime": "2023-10-30T14:12:45.679190+02:00", "EventTime": "2023-10-30T14:12:45.679201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7LZZh4m3wRPjcflnl"]} -{"Format": "IDEA0", "ID": "f89baa38-3cfb-4cfd-9200-f13b1155e826", "DetectTime": "2023-10-30T14:12:45.702176+02:00", "EventTime": "2023-10-30T14:12:45.702188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CJ96Kj2w8ES95tA47c"]} -{"Format": "IDEA0", "ID": "2ee6383a-0449-486d-a1db-a7d565a82752", "DetectTime": "2023-10-30T14:12:45.727818+02:00", "EventTime": "2023-10-30T14:12:45.727836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C3RJbJij9pJd37SK5"]} -{"Format": "IDEA0", "ID": "a47005e1-c8fb-4031-a329-ed4d60b5da7f", "DetectTime": "2023-10-30T14:12:45.756623+02:00", "EventTime": "2023-10-30T14:12:45.756638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CElefC36X7DqwN7rJ7"]} -{"Format": "IDEA0", "ID": "aeed4c45-27c0-42cf-a85a-a5d2d4d05451", "DetectTime": "2023-10-30T14:12:45.786003+02:00", "EventTime": "2023-10-30T14:12:45.786014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Clrcfs3SLb3d01lP2j"]} -{"Format": "Json", "ID": "aeed4c45-27c0-42cf-a85a-a5d2d4d05451", "DetectTime": "2023-10-30T14:12:45.786003+02:00", "EventTime": "2023-10-30T14:12:45.786014+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T22:29:27.272711+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2023/10/30 14:12:45.854539)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "05670923-9536-4a54-83af-7de9f55095ea", "DetectTime": "2023-10-30T14:12:45.859915+02:00", "EventTime": "2023-10-30T14:12:45.859931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["ClzPt22yjfqSbV0x6g"]} -{"Format": "IDEA0", "ID": "0a4e2fdd-5de5-4c8d-a0d5-481d193e384a", "DetectTime": "2023-10-30T14:12:45.888295+02:00", "EventTime": "2023-10-30T14:12:45.888312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CrpQfp2bVTPqkhsAPk"]} -{"Format": "IDEA0", "ID": "0d856f35-851c-4ac3-815d-b4be9d6a37eb", "DetectTime": "2023-10-30T14:12:45.910937+02:00", "EventTime": "2023-10-30T14:12:45.910954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CPLji72i8DKRBrxFI7"]} -{"Format": "IDEA0", "ID": "dbabd718-1478-4ee9-b342-c7eb9411f599", "DetectTime": "2023-10-30T14:12:45.933803+02:00", "EventTime": "2023-10-30T14:12:45.933814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C4QInN30covXaxGvD2"]} -{"Format": "IDEA0", "ID": "979e9ef6-7d02-4fb3-8398-9c75c91c0138", "DetectTime": "2023-10-30T14:12:45.958184+02:00", "EventTime": "2023-10-30T14:12:45.958201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CmxuQi1dA9BNsas4J8"]} -{"Format": "IDEA0", "ID": "cbf86253-449f-4626-b889-5b93e26543a9", "DetectTime": "2023-10-30T14:12:45.983408+02:00", "EventTime": "2023-10-30T14:12:45.983423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLjeEj31hmgSG94fG4"]} -{"Format": "IDEA0", "ID": "0019968d-704d-411c-9763-66c8acbe63b6", "DetectTime": "2023-10-30T14:12:46.004062+02:00", "EventTime": "2023-10-30T14:12:46.004074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsJslv3MAkvfX4rNu6"]} -{"Format": "IDEA0", "ID": "b2fa3079-bb66-4428-a853-8bf790cde435", "DetectTime": "2023-10-30T14:12:46.037361+02:00", "EventTime": "2023-10-30T14:12:46.037381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CcNuRa2stbzvBRw2F2"]} -{"Format": "IDEA0", "ID": "4db9ca35-8a2d-4b97-8378-f8fbdd6ca9a5", "DetectTime": "2023-10-30T14:12:46.061031+02:00", "EventTime": "2023-10-30T14:12:46.061041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6ugBb4YmVO64zkBp3"]} -{"Format": "IDEA0", "ID": "96c3e38c-b317-4f67-96f6-6cf179cb48a8", "DetectTime": "2023-10-30T14:12:46.085631+02:00", "EventTime": "2023-10-30T14:12:46.085647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CAxIsq23FJOffhU5nj"]} -{"Format": "Json", "ID": "96c3e38c-b317-4f67-96f6-6cf179cb48a8", "DetectTime": "2023-10-30T14:12:46.085631+02:00", "EventTime": "2023-10-30T14:12:46.085647+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T23:00:04.143112+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2023/10/30 14:12:46.153630)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fa58e394-d676-43b8-9a8a-5ecc8abc384d", "DetectTime": "2023-10-30T14:12:46.157801+02:00", "EventTime": "2023-10-30T14:12:46.157815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cb4z261eOCGJChYIs7"]} -{"Format": "IDEA0", "ID": "98ef6ec7-0935-46cf-b0be-93ac098c9dcd", "DetectTime": "2023-10-30T14:12:46.182749+02:00", "EventTime": "2023-10-30T14:12:46.182765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CUdKIt2pwypdxh1PR9"]} -{"Format": "IDEA0", "ID": "17aef2e7-161e-40bf-bede-3f463cbadd84", "DetectTime": "2023-10-30T14:12:46.205669+02:00", "EventTime": "2023-10-30T14:12:46.205682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CGwHCV1M3Pa9oN9Guj"]} -{"Format": "IDEA0", "ID": "b31bbf95-6ad4-48da-a53e-78f2a36f1ed2", "DetectTime": "2023-10-30T14:12:46.229672+02:00", "EventTime": "2023-10-30T14:12:46.229687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CHKbrU9GLMy3maPU7"]} -{"Format": "IDEA0", "ID": "705b4d87-ba73-4c11-9938-8e89333fcbc1", "DetectTime": "2023-10-30T14:12:46.254908+02:00", "EventTime": "2023-10-30T14:12:46.254926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CzSysC4cM9wWqMiqTh"]} -{"Format": "IDEA0", "ID": "bf5326a5-8074-4af9-b9ad-3bb1bb8ae091", "DetectTime": "2023-10-30T14:12:46.278188+02:00", "EventTime": "2023-10-30T14:12:46.278205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["Ciu8IF3UBrKEQHEiji"]} -{"Format": "IDEA0", "ID": "abfec914-43b8-40a5-9ac0-e3fc78068d8d", "DetectTime": "2023-10-30T14:12:46.301508+02:00", "EventTime": "2023-10-30T14:12:46.301518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVLrkY15n8GnnBeWvc"]} -{"Format": "IDEA0", "ID": "4025630d-e5d8-482b-a9c3-40dd303fcb2f", "DetectTime": "2023-10-30T14:12:46.325553+02:00", "EventTime": "2023-10-30T14:12:46.325565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ckr8fT2PsJmyYamAe7"]} -{"Format": "IDEA0", "ID": "1ca4c8de-3729-4745-a6e3-8178bb36ef43", "DetectTime": "2023-10-30T14:12:46.346927+02:00", "EventTime": "2023-10-30T14:12:46.346944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C9OU3X3pZxx1HZ6Ppe"]} -{"Format": "Json", "ID": "1ca4c8de-3729-4745-a6e3-8178bb36ef43", "DetectTime": "2023-10-30T14:12:46.346927+02:00", "EventTime": "2023-10-30T14:12:46.346944+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T23:00:05.748214+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2023/10/30 14:12:46.419557)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9137b81c-a622-4431-97a0-32e776f66c9b", "DetectTime": "2023-10-30T14:12:46.424732+02:00", "EventTime": "2023-10-30T14:12:46.424748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cv4P8IzlYjfj4N34"]} -{"Format": "IDEA0", "ID": "a02d1ef8-7559-4919-a028-572c2528855f", "DetectTime": "2023-10-30T14:12:46.445941+02:00", "EventTime": "2023-10-30T14:12:46.445952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CYezLH2TF0DoNZfw8d"]} -{"Format": "IDEA0", "ID": "ee776e01-c942-46ff-8a3b-49b88965178d", "DetectTime": "2023-10-30T14:12:46.467916+02:00", "EventTime": "2023-10-30T14:12:46.467928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CK7wVoz3SlN96IdA4"]} -{"Format": "IDEA0", "ID": "5f2ae1c5-328b-4967-87cb-d6a8a212db0d", "DetectTime": "2023-10-30T14:12:46.490073+02:00", "EventTime": "2023-10-30T14:12:46.490085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXdyIM24XDn2acizib"]} -{"Format": "IDEA0", "ID": "7f0535d9-c7e8-46f1-a585-1950fb089d76", "DetectTime": "2023-10-30T14:12:46.510125+02:00", "EventTime": "2023-10-30T14:12:46.510135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CKA8a210CJW0s1agn1"]} -{"Format": "IDEA0", "ID": "38386b85-3ef2-445c-b7fe-3ad52a5d1508", "DetectTime": "2023-10-30T14:12:46.528157+02:00", "EventTime": "2023-10-30T14:12:46.528170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cz0onI2etQqu77CAzk"]} -{"Format": "IDEA0", "ID": "36348555-7620-4f2e-b4ab-103eb177cf5b", "DetectTime": "2023-10-30T14:12:46.546679+02:00", "EventTime": "2023-10-30T14:12:46.546691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CHgFTo3Stn48g6xVA2"]} -{"Format": "IDEA0", "ID": "af69d63b-06f1-42cd-86ad-97080f4cc227", "DetectTime": "2023-10-30T14:12:46.564394+02:00", "EventTime": "2023-10-30T14:12:46.564406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C9F9wK2VhQNypBSglc"]} -{"Format": "Json", "ID": "af69d63b-06f1-42cd-86ad-97080f4cc227", "DetectTime": "2023-10-30T14:12:46.564394+02:00", "EventTime": "2023-10-30T14:12:46.564406+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T23:00:07.730589+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2023/10/30 14:12:46.630908)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "83e0634c-b16c-4683-84ca-ee001ac85849", "DetectTime": "2023-10-30T14:12:46.635648+02:00", "EventTime": "2023-10-30T14:12:46.635659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C99bGS3cWfGqiPxd1h"]} -{"Format": "IDEA0", "ID": "850a54e3-ab60-4644-a705-700ff8f554da", "DetectTime": "2023-10-30T14:12:46.658417+02:00", "EventTime": "2023-10-30T14:12:46.658429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVRnWg4qhzUz8rLXv9"]} -{"Format": "IDEA0", "ID": "494e0d33-7e78-4080-a7bf-b753da064b2b", "DetectTime": "2023-10-30T14:12:46.682170+02:00", "EventTime": "2023-10-30T14:12:46.682187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CicyCB1Fx9WDkobkw1"]} -{"Format": "IDEA0", "ID": "12610055-6799-4090-b6ae-8f669b6aefde", "DetectTime": "2023-10-30T14:12:46.702325+02:00", "EventTime": "2023-10-30T14:12:46.702342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUemub1kCXbnpXVaqk"]} -{"Format": "IDEA0", "ID": "11bb1662-f4a9-422d-8729-87e312b507de", "DetectTime": "2023-10-30T14:12:46.721558+02:00", "EventTime": "2023-10-30T14:12:46.721569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C68Z2D1DCSbO2fytW4"]} -{"Format": "IDEA0", "ID": "3f3dba8a-d495-4e5b-bade-a84408350a5a", "DetectTime": "2023-10-30T14:12:46.738304+02:00", "EventTime": "2023-10-30T14:12:46.738315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CcAZp42wIb9y9qhZr8"]} -{"Format": "IDEA0", "ID": "7bb581b0-e0c3-4561-8c70-29e66165d5e4", "DetectTime": "2023-10-30T14:12:46.756280+02:00", "EventTime": "2023-10-30T14:12:46.756291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["COLSEZ353kZqKdadi4"]} -{"Format": "IDEA0", "ID": "a4ba0823-c2c2-4d2e-b1e9-5539100fee71", "DetectTime": "2023-10-30T14:12:46.786030+02:00", "EventTime": "2023-10-30T14:12:46.786046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C6IBfKrlQi0FhJsei"]} -{"Format": "IDEA0", "ID": "5236cdb2-1f20-4e9d-92b1-4081a3d26c2b", "DetectTime": "2023-10-30T14:12:46.812339+02:00", "EventTime": "2023-10-30T14:12:46.812355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CGU7Fr4a3JPbXYmQTj"]} -{"Format": "IDEA0", "ID": "206b087a-58d5-4111-8e7b-1e021455312c", "DetectTime": "2023-10-30T14:12:46.838969+02:00", "EventTime": "2023-10-30T14:12:46.838985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgyPYQ3YOWRVo1zQa9"]} -{"Format": "IDEA0", "ID": "5475a528-9a05-44bc-b838-e631cb1ea06e", "DetectTime": "2023-10-30T14:12:46.866192+02:00", "EventTime": "2023-10-30T14:12:46.866208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cy8wYL2d3bZDsbU6a7"]} -{"Format": "IDEA0", "ID": "e0cb5794-d755-4170-b55f-5010b310a220", "DetectTime": "2023-10-30T14:12:46.891660+02:00", "EventTime": "2023-10-30T14:12:46.891675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CrqeHH8UFYs2Mczbf"]} -{"Format": "IDEA0", "ID": "d513409d-e394-4b57-843c-77127fc67ede", "DetectTime": "2023-10-30T14:12:46.916943+02:00", "EventTime": "2023-10-30T14:12:46.916958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C6UW2Z3lXLECUoXVk1"]} -{"Format": "IDEA0", "ID": "7e521009-b4f9-4c39-a501-c4418335cb9f", "DetectTime": "2023-10-30T14:12:46.943587+02:00", "EventTime": "2023-10-30T14:12:46.943603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CERg8Q1LiSMgPBrGh4"]} -{"Format": "IDEA0", "ID": "e1e8eb5f-88cd-4388-817a-a1f32960e808", "DetectTime": "2023-10-30T14:12:46.964629+02:00", "EventTime": "2023-10-30T14:12:46.964645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cqjhzz148d9dfJmCs8"]} -{"Format": "IDEA0", "ID": "4653f257-67b4-4116-b925-f0e8c496c652", "DetectTime": "2023-10-30T14:12:46.984765+02:00", "EventTime": "2023-10-30T14:12:46.984777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Co4Gqm2Yz82tqWqfh6"]} -{"Format": "IDEA0", "ID": "321b945f-7cf3-49d6-8130-d5c38b8f56e6", "DetectTime": "2023-10-30T14:12:47.007078+02:00", "EventTime": "2023-10-30T14:12:47.007095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CriBcX1PquoM2JMxx6"]} -{"Format": "IDEA0", "ID": "3af756f3-009f-490c-842b-2adf1c702e3b", "DetectTime": "2023-10-30T14:12:47.032925+02:00", "EventTime": "2023-10-30T14:12:47.032937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cw4Fga0zqyE1Xy5ac"]} -{"Format": "IDEA0", "ID": "ad6fad2e-940b-4aa5-95d3-ed48d0d54f7f", "DetectTime": "2023-10-30T14:12:47.057681+02:00", "EventTime": "2023-10-30T14:12:47.057698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CnPpkU1YvDXt4T8LT"]} -{"Format": "IDEA0", "ID": "dcc192cc-37cb-4825-a266-0b2dc6baa60c", "DetectTime": "2023-10-30T14:12:47.080550+02:00", "EventTime": "2023-10-30T14:12:47.080562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CMrkDI2aQTFYOMq4g6"]} -{"Format": "IDEA0", "ID": "1008f32f-59ce-45dd-b7d5-288790d45308", "DetectTime": "2023-10-30T14:12:47.101993+02:00", "EventTime": "2023-10-30T14:12:47.102007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CRxk1OYQA5jAGsOci"]} -{"Format": "Json", "ID": "1008f32f-59ce-45dd-b7d5-288790d45308", "DetectTime": "2023-10-30T14:12:47.101993+02:00", "EventTime": "2023-10-30T14:12:47.102007+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T23:30:39.036533+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 190. (real time 2023/10/30 14:12:47.164819)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8eabfd80-67fd-439f-a59f-6588e8c440f4", "DetectTime": "2023-10-30T14:12:47.169375+02:00", "EventTime": "2023-10-30T14:12:47.169386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cj0mZD2SWfl8K0GVh"]} -{"Format": "IDEA0", "ID": "d3e5741b-4dd9-4a62-92f5-95e2d802ff26", "DetectTime": "2023-10-30T14:12:47.193416+02:00", "EventTime": "2023-10-30T14:12:47.193429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ck18WE19TlY1m5PwAb"]} -{"Format": "IDEA0", "ID": "f53190bd-9084-4616-8cf2-febf79e194df", "DetectTime": "2023-10-30T14:12:47.214095+02:00", "EventTime": "2023-10-30T14:12:47.214111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cf8I6BuhSQaaRC8J5"]} -{"Format": "IDEA0", "ID": "bab5045a-2f53-4262-8016-4cf92f5d85d9", "DetectTime": "2023-10-30T14:12:47.243218+02:00", "EventTime": "2023-10-30T14:12:47.243237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CiCdka2EY0dj8952z8"]} -{"Format": "IDEA0", "ID": "768cb047-79af-4dd9-8a37-75234dc4aaec", "DetectTime": "2023-10-30T14:12:47.267278+02:00", "EventTime": "2023-10-30T14:12:47.267295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C9ITyG3V4XB7BcRbLb"]} -{"Format": "IDEA0", "ID": "2cd83f32-24f1-4e3e-93c7-12b56e49d316", "DetectTime": "2023-10-30T14:12:47.294162+02:00", "EventTime": "2023-10-30T14:12:47.294186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CI9vyB2UPzg3Xp2OE2"]} -{"Format": "IDEA0", "ID": "5f00ace5-b088-449e-995c-204737c87dce", "DetectTime": "2023-10-30T14:12:47.316957+02:00", "EventTime": "2023-10-30T14:12:47.316975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ck7Y4a4ZvabfvZlSFb"]} -{"Format": "IDEA0", "ID": "67763947-8e1e-46b2-91b2-4d61cbbfddc4", "DetectTime": "2023-10-30T14:12:47.337518+02:00", "EventTime": "2023-10-30T14:12:47.337529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CDH5Pu16uWi085G2I9"]} -{"Format": "IDEA0", "ID": "07dd394c-eb15-4dc7-a1ed-4e838eedbc68", "DetectTime": "2023-10-30T14:12:47.360158+02:00", "EventTime": "2023-10-30T14:12:47.360178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CIWlps4ZhnZm5S8uG"]} -{"Format": "IDEA0", "ID": "d2098bce-01c9-4e98-b3d4-0ef481adb304", "DetectTime": "2023-10-30T14:12:47.383322+02:00", "EventTime": "2023-10-30T14:12:47.383342+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CAxWes3ZxNd5skLOQ"]} -{"Format": "IDEA0", "ID": "3919f81f-bfe6-4293-b027-1964e77b5e45", "DetectTime": "2023-10-30T14:12:47.482868+02:00", "EventTime": "2023-10-30T14:12:47.482886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CuxRYn2Pb090VkGXgb"]} -{"Format": "IDEA0", "ID": "11dfb9ae-4b06-4435-81c9-db2eee098bc2", "DetectTime": "2023-10-30T14:12:47.512619+02:00", "EventTime": "2023-10-30T14:12:47.512636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CXfRKa29C7oLaG7Zpk"]} -{"Format": "IDEA0", "ID": "7a951d9f-83ee-4048-8539-b945cdcc78fe", "DetectTime": "2023-10-30T14:12:47.541148+02:00", "EventTime": "2023-10-30T14:12:47.541165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQt1Idr9Az5Ae01C"]} -{"Format": "IDEA0", "ID": "02f4cfa4-e1ac-47ed-8d48-e99176c441a0", "DetectTime": "2023-10-30T14:12:47.567316+02:00", "EventTime": "2023-10-30T14:12:47.567327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Crc9i13YwMNkhFeSRl"]} -{"Format": "IDEA0", "ID": "1fa0d1b5-fb59-4501-8788-bfd16ce021a1", "DetectTime": "2023-10-30T14:12:47.592747+02:00", "EventTime": "2023-10-30T14:12:47.592767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLEOb522n0Kfi4uNhh"]} -{"Format": "IDEA0", "ID": "dc394e8c-38cb-451e-8f37-b3e23f23eb8a", "DetectTime": "2023-10-30T14:12:47.617931+02:00", "EventTime": "2023-10-30T14:12:47.617947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C61lgg4Ckn9fJwgOnc"]} -{"Format": "IDEA0", "ID": "a5743351-103f-4289-8bee-18683b76b88c", "DetectTime": "2023-10-30T14:12:47.643440+02:00", "EventTime": "2023-10-30T14:12:47.643463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C8Ud5y5YyCbZOvRb"]} -{"Format": "IDEA0", "ID": "94885b44-12b8-4967-8c38-e1ad1f3bbdf1", "DetectTime": "2023-10-30T14:12:47.667849+02:00", "EventTime": "2023-10-30T14:12:47.667864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CZMIW832ZIyLFoft9"]} -{"Format": "IDEA0", "ID": "d61471ec-c08c-4fb3-b17a-24744d50caa6", "DetectTime": "2023-10-30T14:12:47.691669+02:00", "EventTime": "2023-10-30T14:12:47.691689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CpleVUfGiuYELQUNe"]} -{"Format": "IDEA0", "ID": "fe37be1e-0576-4010-a617-cb9df92b0661", "DetectTime": "2023-10-30T14:12:47.717491+02:00", "EventTime": "2023-10-30T14:12:47.717509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CGTzuGSNDh8qgIU68"]} -{"Format": "IDEA0", "ID": "aa28932c-db04-4748-a61b-4546cc62554a", "DetectTime": "2023-10-30T14:12:47.746539+02:00", "EventTime": "2023-10-30T14:12:47.746554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["COeSl12JvhrfHJ6MTa"]} -{"Format": "IDEA0", "ID": "74fe5502-5f03-4544-8238-7edb28ca8157", "DetectTime": "2023-10-30T14:12:47.773162+02:00", "EventTime": "2023-10-30T14:12:47.773179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CpwZgf2ChyLRpy2yXb"]} -{"Format": "IDEA0", "ID": "bd17fda9-931b-49ad-bffc-547705329bfe", "DetectTime": "2023-10-30T14:12:47.799624+02:00", "EventTime": "2023-10-30T14:12:47.799641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["C9Dbh52wsQvEmuE3H6"]} -{"Format": "IDEA0", "ID": "a3d0def9-f0e6-4b71-87af-5935c24c5901", "DetectTime": "2023-10-30T14:12:47.820800+02:00", "EventTime": "2023-10-30T14:12:47.820816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CqxPRAHsctURTcX4l"]} -{"Format": "IDEA0", "ID": "0b65e7d4-1f17-45df-b7a0-c8661cfdb32b", "DetectTime": "2023-10-30T14:12:47.849455+02:00", "EventTime": "2023-10-30T14:12:47.849471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRDF294W8iLDBvpq5f"]} -{"Format": "IDEA0", "ID": "7cb0b872-f75e-4cde-8e4d-4a76fe29151d", "DetectTime": "2023-10-30T14:12:47.877445+02:00", "EventTime": "2023-10-30T14:12:47.877460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CM98Uv4KdPGPv28bA2"]} -{"Format": "IDEA0", "ID": "97e50c25-78a0-44e6-bdd2-10d4d5486c21", "DetectTime": "2023-10-30T14:12:47.902221+02:00", "EventTime": "2023-10-30T14:12:47.902235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCRcUP2qzThmfvIxJ8"]} -{"Format": "IDEA0", "ID": "d7e7adde-a305-401c-80fd-ed565a6b79eb", "DetectTime": "2023-10-30T14:12:47.931179+02:00", "EventTime": "2023-10-30T14:12:47.931196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CwA9Ow3YuscUmjMst7"]} -{"Format": "IDEA0", "ID": "2f343f5b-fe06-4bd1-9661-5de2aadef704", "DetectTime": "2023-10-30T14:12:47.951937+02:00", "EventTime": "2023-10-30T14:12:47.951951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["ClNRrI2Uh2XLtaH8Rh"]} -{"Format": "IDEA0", "ID": "ac062d43-30fc-4e01-a6c7-f808f8ed5f55", "DetectTime": "2023-10-30T14:12:47.975733+02:00", "EventTime": "2023-10-30T14:12:47.975753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CszVLb1kFGaznUxc11"]} -{"Format": "IDEA0", "ID": "09637b12-f8ce-48f3-be3f-d494b2590239", "DetectTime": "2023-10-30T14:12:48.001963+02:00", "EventTime": "2023-10-30T14:12:48.001978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["COY5lP3OK1yh4Vq0r"]} -{"Format": "IDEA0", "ID": "7c553ce2-0310-47a8-bb9d-d26eb59eb21a", "DetectTime": "2023-10-30T14:12:48.020473+02:00", "EventTime": "2023-10-30T14:12:48.020484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CiJyHT3pF2T1AlG90j"]} -{"Format": "IDEA0", "ID": "58346f81-243a-4717-aa90-fa262beff90c", "DetectTime": "2023-10-30T14:12:48.038624+02:00", "EventTime": "2023-10-30T14:12:48.038634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CR8OeTMy6eIrkw7lj"]} -{"Format": "IDEA0", "ID": "d86b2c5b-e586-46b1-b711-853baebd9c49", "DetectTime": "2023-10-30T14:12:48.058772+02:00", "EventTime": "2023-10-30T14:12:48.058802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CmPiJX1UedJDe0BHCf"]} -{"Format": "IDEA0", "ID": "0a6c2e56-6b77-446a-9fd1-1ec1db49eb71", "DetectTime": "2023-10-30T14:12:48.086891+02:00", "EventTime": "2023-10-30T14:12:48.086911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CoeBCm1cy43k9lte3l"]} -{"Format": "IDEA0", "ID": "cc238ba4-51d4-4908-8be9-8dafaa513efd", "DetectTime": "2023-10-30T14:12:48.110366+02:00", "EventTime": "2023-10-30T14:12:48.110379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRISHgnHgigZQI1ya"]} -{"Format": "IDEA0", "ID": "5b8d730b-f1b0-4e71-a4a9-5bb034fe5243", "DetectTime": "2023-10-30T14:12:48.133134+02:00", "EventTime": "2023-10-30T14:12:48.133154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CvihiY28cVeqK876Hb"]} -{"Format": "IDEA0", "ID": "42966af3-c247-4c1b-bf62-e4fb7f7bb432", "DetectTime": "2023-10-30T14:12:48.153228+02:00", "EventTime": "2023-10-30T14:12:48.153243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CApgaTemXWRcPVNB7"]} -{"Format": "IDEA0", "ID": "f49eaf42-a4e7-46d6-88be-953588692760", "DetectTime": "2023-10-30T14:12:48.174599+02:00", "EventTime": "2023-10-30T14:12:48.174614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CvPET44YyACYhF7srl"]} -{"Format": "Json", "ID": "f49eaf42-a4e7-46d6-88be-953588692760", "DetectTime": "2023-10-30T14:12:48.174599+02:00", "EventTime": "2023-10-30T14:12:48.174614+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T23:30:43.856044+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 190. (real time 2023/10/30 14:12:48.255685)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e216a6cd-d3bc-4594-b5e7-c4a47758dd2a", "DetectTime": "2023-10-30T14:12:48.261264+02:00", "EventTime": "2023-10-30T14:12:48.261280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CJGULa4SfbOy48PLM5"]} -{"Format": "IDEA0", "ID": "ef702541-9862-403a-b361-3be92e0c9606", "DetectTime": "2023-10-30T14:12:48.282252+02:00", "EventTime": "2023-10-30T14:12:48.282265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CmLa0l46xOo8CQZSPf"]} -{"Format": "IDEA0", "ID": "d3b7345a-4217-4a50-be31-1592ff37e495", "DetectTime": "2023-10-30T14:12:48.304120+02:00", "EventTime": "2023-10-30T14:12:48.304138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CICESY2PoDw3sWU26k"]} -{"Format": "IDEA0", "ID": "8362f0aa-c6e2-4c6c-91e7-0cbfb7e1c79a", "DetectTime": "2023-10-30T14:12:48.324467+02:00", "EventTime": "2023-10-30T14:12:48.324479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cb0nBx13i1qKVj0km9"]} -{"Format": "IDEA0", "ID": "4b2b1c96-15b3-4866-ba0e-e2f0ad8f7c11", "DetectTime": "2023-10-30T14:12:48.343146+02:00", "EventTime": "2023-10-30T14:12:48.343165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CbAyqN6SQIOWhl6gc"]} -{"Format": "IDEA0", "ID": "f7c08859-ae33-4d6d-bf3f-2df588d23707", "DetectTime": "2023-10-30T14:12:48.362579+02:00", "EventTime": "2023-10-30T14:12:48.362590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CqPYzQp0aC3hCu951"]} -{"Format": "IDEA0", "ID": "ee5f9d17-69f0-4d4b-a186-eb085902130d", "DetectTime": "2023-10-30T14:12:48.381787+02:00", "EventTime": "2023-10-30T14:12:48.381797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C2LvPqR4aqijBX9K9"]} -{"Format": "IDEA0", "ID": "2ee62306-a349-47f4-a2d4-3ba642b7c9b9", "DetectTime": "2023-10-30T14:12:48.399421+02:00", "EventTime": "2023-10-30T14:12:48.399437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CtIWOd3PATlTK3a1ti"]} -{"Format": "IDEA0", "ID": "8af10896-938a-4fae-8a29-a7844b8d12a1", "DetectTime": "2023-10-30T14:12:48.418225+02:00", "EventTime": "2023-10-30T14:12:48.418237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CaqRZc399hWrtvdgof"]} -{"Format": "IDEA0", "ID": "9af2aaea-4338-4c9a-924d-58b7d7696d6e", "DetectTime": "2023-10-30T14:12:48.439626+02:00", "EventTime": "2023-10-30T14:12:48.439643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CtCLyJXPAkP0uN9ff"]} -{"Format": "IDEA0", "ID": "c0229bd5-3043-442a-b7fc-4b6e7ae4bc78", "DetectTime": "2023-10-30T14:12:48.463150+02:00", "EventTime": "2023-10-30T14:12:48.463166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CfdUWM2nEVCK2DPxs9"]} -{"Format": "IDEA0", "ID": "c862276f-e133-4636-84b7-866dcdf25460", "DetectTime": "2023-10-30T14:12:48.481463+02:00", "EventTime": "2023-10-30T14:12:48.481478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cfi5Po3TgzpIeNsdci"]} -{"Format": "IDEA0", "ID": "447391e6-90d9-4223-a090-fffea379a788", "DetectTime": "2023-10-30T14:12:48.499211+02:00", "EventTime": "2023-10-30T14:12:48.499222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CF01iF4WmB9Shi84cc"]} -{"Format": "IDEA0", "ID": "fb6d9af0-1015-461d-b9e6-0cbe117337a5", "DetectTime": "2023-10-30T14:12:48.520730+02:00", "EventTime": "2023-10-30T14:12:48.520742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CE3XMC3rZK2pp2jS9j"]} -{"Format": "IDEA0", "ID": "a60d8190-cde2-46c7-942b-136894c45a90", "DetectTime": "2023-10-30T14:12:48.544307+02:00", "EventTime": "2023-10-30T14:12:48.544318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CxWTGF1WDoaMfhmXMf"]} -{"Format": "IDEA0", "ID": "3c348bdf-3607-4197-a175-965f30715ff1", "DetectTime": "2023-10-30T14:12:48.567626+02:00", "EventTime": "2023-10-30T14:12:48.567643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C15Elg4FP8ZT09huI4"]} -{"Format": "IDEA0", "ID": "d04316ee-0755-4472-b41b-061ca5c08b11", "DetectTime": "2023-10-30T14:12:48.586800+02:00", "EventTime": "2023-10-30T14:12:48.586812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CTUuuL1lmH9FA4aEt5"]} -{"Format": "IDEA0", "ID": "b4e47f45-6525-4d34-86a1-ac73b39cbb33", "DetectTime": "2023-10-30T14:12:48.608878+02:00", "EventTime": "2023-10-30T14:12:48.608894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CBUcgR1XLCclMkrlVh"]} -{"Format": "IDEA0", "ID": "332bb32b-f2f9-4cc9-b536-770c4a955a12", "DetectTime": "2023-10-30T14:12:48.631074+02:00", "EventTime": "2023-10-30T14:12:48.631090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cz9SI51zlSZVZLyApl"]} -{"Format": "IDEA0", "ID": "caf842df-342e-48bc-adf3-f188c4f38448", "DetectTime": "2023-10-30T14:12:48.653544+02:00", "EventTime": "2023-10-30T14:12:48.653561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CvzZ8H26ESQTrRZ0V4"]} -{"Format": "IDEA0", "ID": "b96c7aee-30a3-4b72-9a87-a7f149778dd4", "DetectTime": "2023-10-30T14:12:48.675599+02:00", "EventTime": "2023-10-30T14:12:48.675612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CoRIGr2UgRxylx98ll"]} -{"Format": "IDEA0", "ID": "7c50ce6f-a038-4220-a62d-d75f088acd16", "DetectTime": "2023-10-30T14:12:48.691229+02:00", "EventTime": "2023-10-30T14:12:48.691241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CIvhTv218GlZXum2xd"]} -{"Format": "IDEA0", "ID": "46fe2b70-053a-4533-9541-e1fdbb905bdf", "DetectTime": "2023-10-30T14:12:48.716182+02:00", "EventTime": "2023-10-30T14:12:48.716195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLtIaq1GcFlevXw8jf"]} -{"Format": "IDEA0", "ID": "6ef44373-cfe2-44ed-be99-9e2d51e90410", "DetectTime": "2023-10-30T14:12:48.741711+02:00", "EventTime": "2023-10-30T14:12:48.741731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CfopGM11AmVm8vfDp6"]} -{"Format": "IDEA0", "ID": "48823c78-80bb-456c-9ab9-1f9cef945f43", "DetectTime": "2023-10-30T14:12:48.763963+02:00", "EventTime": "2023-10-30T14:12:48.763979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CF46BTbCGzd3vl2si"]} -{"Format": "IDEA0", "ID": "94119f40-15ae-4605-9c45-97a99a64875b", "DetectTime": "2023-10-30T14:12:48.783180+02:00", "EventTime": "2023-10-30T14:12:48.783195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CnHvkB1Ee3TMRMjGn"]} -{"Format": "IDEA0", "ID": "143a3809-8488-416d-9cf0-f8e57d5820e9", "DetectTime": "2023-10-30T14:12:48.802122+02:00", "EventTime": "2023-10-30T14:12:48.802137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CcT2Jk2x1YbsfQT8Rk"]} -{"Format": "IDEA0", "ID": "4e868e22-4972-4ffc-a6a8-233d26e42990", "DetectTime": "2023-10-30T14:12:48.825204+02:00", "EventTime": "2023-10-30T14:12:48.825220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CYhNDbctEBA43HCG3"]} -{"Format": "IDEA0", "ID": "757ee9ea-a4e5-423c-9c80-bde41cc88e3c", "DetectTime": "2023-10-30T14:12:48.851954+02:00", "EventTime": "2023-10-30T14:12:48.851969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDZb0I1HnTJcvZees7"]} -{"Format": "IDEA0", "ID": "862db0ea-1a55-4287-ad3f-0abb8d751164", "DetectTime": "2023-10-30T14:12:48.873409+02:00", "EventTime": "2023-10-30T14:12:48.873425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CrGr8w3AA6xDa8ITAj"]} -{"Format": "IDEA0", "ID": "01e2876f-96b2-406c-9c76-eeeeac829264", "DetectTime": "2023-10-30T14:12:48.899559+02:00", "EventTime": "2023-10-30T14:12:48.899576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CeaBvL3AXK4FpPuTc1"]} -{"Format": "IDEA0", "ID": "3ac4c7e6-df4f-4ab9-ac79-c2195f74cd4d", "DetectTime": "2023-10-30T14:12:48.922092+02:00", "EventTime": "2023-10-30T14:12:48.922104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CAUNoN2nyfmeSoHrhf"]} -{"Format": "IDEA0", "ID": "59203194-8c1c-456a-8bb0-3ad2c69887a2", "DetectTime": "2023-10-30T14:12:48.944347+02:00", "EventTime": "2023-10-30T14:12:48.944360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CDrRYJbUErkMh6C3l"]} -{"Format": "IDEA0", "ID": "e1b0cfa8-99f8-41d5-8a26-ebe526f8d9b7", "DetectTime": "2023-10-30T14:12:48.964471+02:00", "EventTime": "2023-10-30T14:12:48.964498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CRuiYq1DbShSfYjCbh"]} -{"Format": "IDEA0", "ID": "82d03987-6559-4cfe-b265-f03735421040", "DetectTime": "2023-10-30T14:12:48.988151+02:00", "EventTime": "2023-10-30T14:12:48.988171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CSnA2x4wULHG0hw8Pd"]} -{"Format": "IDEA0", "ID": "a7a80a88-68bc-44a2-9d7c-ebc66005c826", "DetectTime": "2023-10-30T14:12:49.006126+02:00", "EventTime": "2023-10-30T14:12:49.006137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CAdJKw2yoYGsNKQOtc"]} -{"Format": "IDEA0", "ID": "aaae8c1f-dd1a-4ef1-bc06-548e87803a1f", "DetectTime": "2023-10-30T14:12:49.029014+02:00", "EventTime": "2023-10-30T14:12:49.029037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cx0irY1H4HaWk0AFQb"]} -{"Format": "IDEA0", "ID": "9635b59a-93e4-4099-93f0-ad5cf12be354", "DetectTime": "2023-10-30T14:12:49.049755+02:00", "EventTime": "2023-10-30T14:12:49.049766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CilzGP1dHwwf3g0Ca1"]} -{"Format": "IDEA0", "ID": "ed0be570-7798-4cb6-ad31-f5a89234fcef", "DetectTime": "2023-10-30T14:12:49.067940+02:00", "EventTime": "2023-10-30T14:12:49.067957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C9hWLG5do4yomFRff"]} -{"Format": "IDEA0", "ID": "68b9f93f-a829-4cc3-96e1-821345a165cb", "DetectTime": "2023-10-30T14:12:49.094317+02:00", "EventTime": "2023-10-30T14:12:49.094338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CU7pjU1cScHId2qHC3"]} -{"Format": "IDEA0", "ID": "7090780c-cb7b-473f-a233-9ff5178984b9", "DetectTime": "2023-10-30T14:12:49.117674+02:00", "EventTime": "2023-10-30T14:12:49.117690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CMp8OgYpXzHqCQ3mk"]} -{"Format": "IDEA0", "ID": "4b7023db-d59a-47a8-9362-90f3e35a321d", "DetectTime": "2023-10-30T14:12:49.144113+02:00", "EventTime": "2023-10-30T14:12:49.144130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CGqHWn242SjBi4tIy7"]} -{"Format": "IDEA0", "ID": "d1816fc4-9cf4-44a6-aae3-8612ba48a250", "DetectTime": "2023-10-30T14:12:49.165849+02:00", "EventTime": "2023-10-30T14:12:49.165872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CU64Fy1YlyMOpo3YLd"]} -{"Format": "IDEA0", "ID": "3f406f54-5daa-4ca2-9b98-615347fc9ad9", "DetectTime": "2023-10-30T14:12:49.185900+02:00", "EventTime": "2023-10-30T14:12:49.185916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CcszwC12qK1CG1KgR8"]} -{"Format": "IDEA0", "ID": "ae037c39-2b6e-4798-b604-23c363c94ffb", "DetectTime": "2023-10-30T14:12:49.203369+02:00", "EventTime": "2023-10-30T14:12:49.203381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CoqOte2fhhOPGYtqKg"]} -{"Format": "IDEA0", "ID": "7b618286-0382-4550-9b0b-ace7816b02cc", "DetectTime": "2023-10-30T14:12:49.219795+02:00", "EventTime": "2023-10-30T14:12:49.219807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CKi2Cx4KzV5ODyjZug"]} -{"Format": "IDEA0", "ID": "8494eb55-3e71-42af-b88f-5fefa63362a3", "DetectTime": "2023-10-30T14:12:49.238809+02:00", "EventTime": "2023-10-30T14:12:49.238820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CbreDLvwrnuypM7yh"]} -{"Format": "IDEA0", "ID": "2654fb28-571a-4185-8f6e-5f2cf36a86bb", "DetectTime": "2023-10-30T14:12:49.260034+02:00", "EventTime": "2023-10-30T14:12:49.260047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CGu7NW3mXZTA4GXOUe"]} -{"Format": "IDEA0", "ID": "838d8524-00ff-4abb-8112-6cb74ac318bf", "DetectTime": "2023-10-30T14:12:49.276655+02:00", "EventTime": "2023-10-30T14:12:49.276667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C4lASf1Fdu3owptMIf"]} -{"Format": "IDEA0", "ID": "3dfa1380-f28b-4ade-a377-718c0f5993a0", "DetectTime": "2023-10-30T14:12:49.363146+02:00", "EventTime": "2023-10-30T14:12:49.363158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ChrYSkieaJZoBHnb"]} -{"Format": "IDEA0", "ID": "c4fb3a2a-acbb-4c12-9f76-fa4584441aaa", "DetectTime": "2023-10-30T14:12:49.387315+02:00", "EventTime": "2023-10-30T14:12:49.387331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CHD3a54rUCm3izttD5"]} -{"Format": "IDEA0", "ID": "0e1ffb75-3aa8-49b0-82cd-3036c307f219", "DetectTime": "2023-10-30T14:12:49.409720+02:00", "EventTime": "2023-10-30T14:12:49.409731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CDJpBh1ZvIi5RkgInl"]} -{"Format": "IDEA0", "ID": "069d982a-079d-44a2-af3e-6f83a117fa31", "DetectTime": "2023-10-30T14:12:49.428052+02:00", "EventTime": "2023-10-30T14:12:49.428069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVkeob1GUtKwSelbk2"]} -{"Format": "IDEA0", "ID": "66b74560-7983-4dd7-9553-c42934f6d222", "DetectTime": "2023-10-30T14:12:49.447427+02:00", "EventTime": "2023-10-30T14:12:49.447444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CYWNNkT0xHmvaoB79"]} -{"Format": "IDEA0", "ID": "1e13efc2-efcc-491b-89e9-96f008ca7944", "DetectTime": "2023-10-30T14:12:49.468282+02:00", "EventTime": "2023-10-30T14:12:49.468300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CDVZiB1TmPQa9bhbG3"]} -{"Format": "Json", "ID": "1e13efc2-efcc-491b-89e9-96f008ca7944", "DetectTime": "2023-10-30T14:12:49.468282+02:00", "EventTime": "2023-10-30T14:12:49.468300+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-08T23:30:45.996077+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 190. (real time 2023/10/30 14:12:49.527229)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd22d056-c56b-49ad-8efe-047e63e78ee1", "DetectTime": "2023-10-30T14:12:49.532718+02:00", "EventTime": "2023-10-30T14:12:49.532736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cy1LNH141auAWTFLK2"]} -{"Format": "IDEA0", "ID": "c12125a2-7111-400a-8596-a394542f1049", "DetectTime": "2023-10-30T14:12:49.555398+02:00", "EventTime": "2023-10-30T14:12:49.555414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cddjvb61dyY9CqmNh"]} -{"Format": "IDEA0", "ID": "0e524a38-e4a0-49c0-bd4f-70ffa3df75b5", "DetectTime": "2023-10-30T14:12:49.572873+02:00", "EventTime": "2023-10-30T14:12:49.572884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CmzEtk4fF09ypQ0Qkj"]} -{"Format": "IDEA0", "ID": "0d8c61f9-4fe5-4cdc-bde5-ba011d930fcc", "DetectTime": "2023-10-30T14:12:49.594739+02:00", "EventTime": "2023-10-30T14:12:49.594755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CV3wHj1ADtZevrmnOj"]} -{"Format": "IDEA0", "ID": "64a7a4b9-2715-4438-8bf9-0a0948cc0942", "DetectTime": "2023-10-30T14:12:49.615055+02:00", "EventTime": "2023-10-30T14:12:49.615072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CFR9hl1GNq9rGNepj9"]} -{"Format": "IDEA0", "ID": "e951849c-ed20-4989-9482-3b66b9608f4f", "DetectTime": "2023-10-30T14:12:49.636418+02:00", "EventTime": "2023-10-30T14:12:49.636434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CLNQHB4dYyRiSAc449"]} -{"Format": "IDEA0", "ID": "949b93be-6c9e-438e-918c-421a4d75f888", "DetectTime": "2023-10-30T14:12:49.656791+02:00", "EventTime": "2023-10-30T14:12:49.656814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLS1yE1upnIAraZIPc"]} -{"Format": "IDEA0", "ID": "e05a5ad2-1804-4398-94c8-f722af899f9d", "DetectTime": "2023-10-30T14:12:49.672511+02:00", "EventTime": "2023-10-30T14:12:49.672522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C390EP21D0UV5ebn8"]} -{"Format": "IDEA0", "ID": "dbadd540-bcaa-4c1f-8d3d-d0c7e610bddf", "DetectTime": "2023-10-30T14:12:49.690654+02:00", "EventTime": "2023-10-30T14:12:49.690664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CF100f2fRI9a4Nt1Xd"]} -{"Format": "IDEA0", "ID": "af9e7b47-c0ae-4b1c-b1e8-5e97a4ec8656", "DetectTime": "2023-10-30T14:12:49.711205+02:00", "EventTime": "2023-10-30T14:12:49.711220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["ChfjOT2N9jX9NeRnh3"]} -{"Format": "IDEA0", "ID": "b5501bb4-3595-4399-ad72-69fc9033634a", "DetectTime": "2023-10-30T14:12:49.732369+02:00", "EventTime": "2023-10-30T14:12:49.732379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUsNcG1KR3LbzrNQvh"]} -{"Format": "IDEA0", "ID": "324858f0-d936-4432-86ad-536a3d540ff2", "DetectTime": "2023-10-30T14:12:49.753585+02:00", "EventTime": "2023-10-30T14:12:49.753602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CQNNl62SvcVg3uFIV3"]} -{"Format": "IDEA0", "ID": "e01a0960-dc38-4d9e-8bb5-1442dd6d5368", "DetectTime": "2023-10-30T14:12:49.774928+02:00", "EventTime": "2023-10-30T14:12:49.774946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CB2VZ93h638y5ESWtb"]} -{"Format": "IDEA0", "ID": "c003eca1-896f-4b66-8e4b-4e3ed2905927", "DetectTime": "2023-10-30T14:12:49.796351+02:00", "EventTime": "2023-10-30T14:12:49.796368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C3PymuQMwCb8Rb08l"]} -{"Format": "IDEA0", "ID": "458b6086-4334-4d44-9e32-98b03830577c", "DetectTime": "2023-10-30T14:12:49.816443+02:00", "EventTime": "2023-10-30T14:12:49.816458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CSlKx420hKMyVqYS9i"]} -{"Format": "IDEA0", "ID": "fc800bf2-418f-4bd4-8e6d-50e760fbd1e3", "DetectTime": "2023-10-30T14:12:49.835333+02:00", "EventTime": "2023-10-30T14:12:49.835345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C9hRjk31FPvK7w1e9"]} -{"Format": "IDEA0", "ID": "2410eef4-b454-4b0e-9968-b314a473a888", "DetectTime": "2023-10-30T14:12:49.851958+02:00", "EventTime": "2023-10-30T14:12:49.851969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVvcWo3aXGJrmnSdle"]} -{"Format": "IDEA0", "ID": "427a9fdc-aecc-4634-a3c9-9b5d7931f495", "DetectTime": "2023-10-30T14:12:49.869967+02:00", "EventTime": "2023-10-30T14:12:49.869991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CjYLSz31gtWrnwu5wb"]} -{"Format": "IDEA0", "ID": "3b6b3300-9ed8-4ed1-9790-5b1890ca3464", "DetectTime": "2023-10-30T14:12:49.891955+02:00", "EventTime": "2023-10-30T14:12:49.891978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CY1ljj2mb8toAP07I9"]} -{"Format": "IDEA0", "ID": "ab1be99b-990c-48f1-809a-6da5e42376b6", "DetectTime": "2023-10-30T14:12:49.910483+02:00", "EventTime": "2023-10-30T14:12:49.910501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CxExK94oOgwxxYTJD7"]} -{"Format": "IDEA0", "ID": "cfcecb5a-40b6-4127-ac75-6c9fcaa3cde7", "DetectTime": "2023-10-30T14:12:49.930640+02:00", "EventTime": "2023-10-30T14:12:49.930655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxLHbZ17whK3usREr3"]} -{"Format": "IDEA0", "ID": "07b809da-e938-44e2-951f-9333cc3cfe3c", "DetectTime": "2023-10-30T14:12:49.968639+02:00", "EventTime": "2023-10-30T14:12:49.968653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cq444Mfb6o9Rr2MR"]} -{"Format": "IDEA0", "ID": "2b2c380a-f4d8-4a35-b494-09f21c2da093", "DetectTime": "2023-10-30T14:12:49.985240+02:00", "EventTime": "2023-10-30T14:12:49.985252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CD1QYs47QoWfH0jxzc"]} -{"Format": "IDEA0", "ID": "e7217755-5716-453f-8eab-d552d0fc75c0", "DetectTime": "2023-10-30T14:12:50.006162+02:00", "EventTime": "2023-10-30T14:12:50.006177+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CU5DCm2AQDSXwQ1ecf"]} -{"Format": "IDEA0", "ID": "d674177b-c67c-4076-b94c-14ff63c64193", "DetectTime": "2023-10-30T14:12:50.031405+02:00", "EventTime": "2023-10-30T14:12:50.031424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CFlGjhiyRFTPJUMxb"]} -{"Format": "IDEA0", "ID": "7654fd88-e761-4419-bca9-9e37bb26abb5", "DetectTime": "2023-10-30T14:12:50.050375+02:00", "EventTime": "2023-10-30T14:12:50.050397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CkTKwLfbeL3ebUEb1"]} -{"Format": "IDEA0", "ID": "2bb6259b-1f0a-4c57-a613-0a9ffff035be", "DetectTime": "2023-10-30T14:12:50.068672+02:00", "EventTime": "2023-10-30T14:12:50.068684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C0Vg6d2plMGQFhvE4b"]} -{"Format": "IDEA0", "ID": "035c0225-b124-4e7d-8dc6-641ff367db6c", "DetectTime": "2023-10-30T14:12:50.102514+02:00", "EventTime": "2023-10-30T14:12:50.102524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CLO7aS2KT4HXp2lla1"]} -{"Format": "IDEA0", "ID": "370e9c93-07da-4b57-8dfe-b98f41e015ad", "DetectTime": "2023-10-30T14:12:50.121424+02:00", "EventTime": "2023-10-30T14:12:50.121442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cl9DmJ30gmMJD27vpk"]} -{"Format": "IDEA0", "ID": "5a27b4ec-a5e3-476b-a290-067acf442ba3", "DetectTime": "2023-10-30T14:12:50.141606+02:00", "EventTime": "2023-10-30T14:12:50.141622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CQ7AhYQkYUfBd8Ike"]} -{"Format": "IDEA0", "ID": "dacdfadc-3c61-4de6-a03d-a2009b53fbba", "DetectTime": "2023-10-30T14:12:50.163128+02:00", "EventTime": "2023-10-30T14:12:50.163143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CZuRTW13B4fXlapUs4"]} -{"Format": "IDEA0", "ID": "e6ef50d5-24fd-4e75-b70e-777815f7b67d", "DetectTime": "2023-10-30T14:12:50.184428+02:00", "EventTime": "2023-10-30T14:12:50.184444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C1dkphtSkt76clM7"]} -{"Format": "IDEA0", "ID": "b50c53b2-47f8-4d08-b9b9-76cac31fd6e9", "DetectTime": "2023-10-30T14:12:50.205979+02:00", "EventTime": "2023-10-30T14:12:50.205994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CxaDRnhA9L5oxsf42"]} -{"Format": "IDEA0", "ID": "a0825851-e5d8-4e3c-9ace-ba7c59228798", "DetectTime": "2023-10-30T14:12:50.226962+02:00", "EventTime": "2023-10-30T14:12:50.226980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CQikvH2kjwGk4pjHtg"]} -{"Format": "IDEA0", "ID": "61d1715b-b43b-4538-939c-bdcb7e5ee870", "DetectTime": "2023-10-30T14:12:50.271063+02:00", "EventTime": "2023-10-30T14:12:50.271079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C4N05b4hOTBE2OMdob"]} -{"Format": "IDEA0", "ID": "45c7d4ce-a36a-4cc4-8ed5-ef7848321b03", "DetectTime": "2023-10-30T14:12:50.289577+02:00", "EventTime": "2023-10-30T14:12:50.289591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CnAxYl148O0sEEjbyb"]} -{"Format": "IDEA0", "ID": "6e8c3f66-f69f-4e1e-9eb0-cbddc45858d4", "DetectTime": "2023-10-30T14:12:50.306834+02:00", "EventTime": "2023-10-30T14:12:50.306846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CtZLAn21PeSNbF7qT9"]} -{"Format": "IDEA0", "ID": "abb854e8-edeb-4dae-aae8-6a0a21596afc", "DetectTime": "2023-10-30T14:12:50.324185+02:00", "EventTime": "2023-10-30T14:12:50.324198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CCcJDg2Dn96rRiTkak"]} -{"Format": "IDEA0", "ID": "1d4e19da-e19e-43dd-b407-3fdda64999ed", "DetectTime": "2023-10-30T14:12:50.342851+02:00", "EventTime": "2023-10-30T14:12:50.342867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C8MlD72iYtVvNEZlwl"]} -{"Format": "IDEA0", "ID": "93456545-0144-41ab-8314-8d8dc1d4505b", "DetectTime": "2023-10-30T14:12:50.360767+02:00", "EventTime": "2023-10-30T14:12:50.360778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CZc4qi4ksBZcUGa2y6"]} -{"Format": "IDEA0", "ID": "131c2e32-dc60-47ea-a088-1b5b988089a2", "DetectTime": "2023-10-30T14:12:50.378819+02:00", "EventTime": "2023-10-30T14:12:50.378831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CNkt3m4JoIroR11Rp5"]} -{"Format": "IDEA0", "ID": "c0658440-6b42-448a-a201-331d481579bd", "DetectTime": "2023-10-30T14:12:50.416389+02:00", "EventTime": "2023-10-30T14:12:50.416406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CzacVU2y5fJne9wWu3"]} -{"Format": "IDEA0", "ID": "e4dfe154-ba40-42f7-841e-cec4f04b65fe", "DetectTime": "2023-10-30T14:12:50.437600+02:00", "EventTime": "2023-10-30T14:12:50.437619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CoVG3v1UEAqQe8IiDe"]} -{"Format": "IDEA0", "ID": "1a9816e4-5273-4573-addd-e6ce8c8d75ec", "DetectTime": "2023-10-30T14:12:50.457214+02:00", "EventTime": "2023-10-30T14:12:50.457230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CIYV211W13aPDQFpy1"]} -{"Format": "IDEA0", "ID": "a71f0010-ebe0-424d-b6cd-2003a2664a5a", "DetectTime": "2023-10-30T14:12:50.473952+02:00", "EventTime": "2023-10-30T14:12:50.473964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CKQ53o4618uNkxPaA5"]} -{"Format": "IDEA0", "ID": "2bd95a7a-6cda-42ea-b5a2-5a7137c0da2c", "DetectTime": "2023-10-30T14:12:50.494056+02:00", "EventTime": "2023-10-30T14:12:50.494067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CK2xVe3LHvQpYRJ2Hd"]} -{"Format": "IDEA0", "ID": "80d35bd7-55c7-404a-bbdd-180683558dea", "DetectTime": "2023-10-30T14:12:50.513596+02:00", "EventTime": "2023-10-30T14:12:50.513607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CtJ7qSgWxZTDXkgCg"]} -{"Format": "IDEA0", "ID": "549f21cf-257f-4c7b-ab2e-e5fcbfb2f19a", "DetectTime": "2023-10-30T14:12:50.551487+02:00", "EventTime": "2023-10-30T14:12:50.551501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CEqlnj1EJH7bwVvfS4"]} -{"Format": "IDEA0", "ID": "cd0e0aca-c0d6-4010-862b-8c0f538788fd", "DetectTime": "2023-10-30T14:12:50.571332+02:00", "EventTime": "2023-10-30T14:12:50.571351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cci3wq3AvNx3kakPp9"]} -{"Format": "IDEA0", "ID": "c119c4f6-0d92-4aa2-80b2-5d34b8ddad23", "DetectTime": "2023-10-30T14:12:50.595966+02:00", "EventTime": "2023-10-30T14:12:50.595981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CVRCpqUDRIYOuntl6"]} -{"Format": "IDEA0", "ID": "d299ca02-a1c5-4eec-8563-d975875ead74", "DetectTime": "2023-10-30T14:12:50.617444+02:00", "EventTime": "2023-10-30T14:12:50.617459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C0hqcl3taaW57ZOfB"]} -{"Format": "IDEA0", "ID": "24cc2be3-c1d7-407c-a129-7de562d0bc2b", "DetectTime": "2023-10-30T14:12:50.632629+02:00", "EventTime": "2023-10-30T14:12:50.632640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CiQMRL1b6xsR4FcHAl"]} -{"Format": "IDEA0", "ID": "4359f8b5-eadc-4065-ab51-11f259c02dc2", "DetectTime": "2023-10-30T14:12:50.668868+02:00", "EventTime": "2023-10-30T14:12:50.668880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CPlWZt3vToKTFYkKs2"]} -{"Format": "IDEA0", "ID": "763e0782-2bc6-46c0-be7b-56880ad9c7b7", "DetectTime": "2023-10-30T14:12:50.685792+02:00", "EventTime": "2023-10-30T14:12:50.685813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cwc4154KHYzYXU0Rtl"]} -{"Format": "IDEA0", "ID": "61c4a1b0-02eb-4381-9b97-b07445b1a2e0", "DetectTime": "2023-10-30T14:12:50.701010+02:00", "EventTime": "2023-10-30T14:12:50.701021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CBd40b4jsSuwKtB31c"]} -{"Format": "IDEA0", "ID": "ab9c3ad6-f7ff-4168-b064-806767d14403", "DetectTime": "2023-10-30T14:12:50.717290+02:00", "EventTime": "2023-10-30T14:12:50.717307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFrnBp3G1pvzcW1m0f"]} -{"Format": "IDEA0", "ID": "b8f28a3e-4e01-4069-9a39-6e7a071f0330", "DetectTime": "2023-10-30T14:12:50.732586+02:00", "EventTime": "2023-10-30T14:12:50.732597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CotX9hhDg8r2cRa9l"]} -{"Format": "IDEA0", "ID": "72bf564b-bfdc-42c4-ab38-abc3021cf19b", "DetectTime": "2023-10-30T14:12:50.750600+02:00", "EventTime": "2023-10-30T14:12:50.750615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4EwSM2vyN0XoTxZwc"]} -{"Format": "IDEA0", "ID": "2fdb3405-5153-42c2-adc7-36c8bfa5cbd1", "DetectTime": "2023-10-30T14:12:50.793555+02:00", "EventTime": "2023-10-30T14:12:50.793581+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CpLAKQ2pZUkVSVIOu"]} -{"Format": "IDEA0", "ID": "10b664bf-a7d1-4a1a-8c4f-f467b1d37285", "DetectTime": "2023-10-30T14:12:50.816615+02:00", "EventTime": "2023-10-30T14:12:50.816632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CgZCk636yrzlWLaAgk"]} -{"Format": "IDEA0", "ID": "3a099c67-6882-4a64-ad46-e4aea3a0a6c6", "DetectTime": "2023-10-30T14:12:50.837799+02:00", "EventTime": "2023-10-30T14:12:50.837816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cr1yjBn7RfQWNTcld"]} -{"Format": "IDEA0", "ID": "103ff9fe-a7a0-4f5d-a859-f285b097f140", "DetectTime": "2023-10-30T14:12:50.854609+02:00", "EventTime": "2023-10-30T14:12:50.854620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CfAG0q1qeIvgK9TyAg"]} -{"Format": "IDEA0", "ID": "b647d1af-b03c-4b0e-9899-70efd0cccab3", "DetectTime": "2023-10-30T14:12:50.875295+02:00", "EventTime": "2023-10-30T14:12:50.875311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cv2wJb2qimhjMeLETa"]} -{"Format": "IDEA0", "ID": "20e70e84-25a8-451b-aafe-4ba2c2afbf83", "DetectTime": "2023-10-30T14:12:50.895028+02:00", "EventTime": "2023-10-30T14:12:50.895045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CGytjkzvyqnBVMnne"]} -{"Format": "IDEA0", "ID": "b7de54ca-9bdc-40e3-90fd-73e6c75749fc", "DetectTime": "2023-10-30T14:12:50.910559+02:00", "EventTime": "2023-10-30T14:12:50.910570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Co0K6KJQ8RQMdJiUg"]} -{"Format": "IDEA0", "ID": "e824d509-1f6c-4761-bb9d-e4130332d099", "DetectTime": "2023-10-30T14:12:50.924231+02:00", "EventTime": "2023-10-30T14:12:50.924241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CctcSXVvqVgH6Er56"]} -{"Format": "Json", "ID": "e824d509-1f6c-4761-bb9d-e4130332d099", "DetectTime": "2023-10-30T14:12:50.924231+02:00", "EventTime": "2023-10-30T14:12:50.924241+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:01:09.053431+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:12:50.995674)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ebb5992e-78a1-44d4-bf97-b9e5b42b8b4f", "DetectTime": "2023-10-30T14:12:50.999499+02:00", "EventTime": "2023-10-30T14:12:50.999514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CsQzsD2QmQ7MLPeAke"]} -{"Format": "IDEA0", "ID": "c4c2be09-28dd-4486-ad76-41f5f0ff67ac", "DetectTime": "2023-10-30T14:12:51.016931+02:00", "EventTime": "2023-10-30T14:12:51.016946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C8c6jA3q1lGVjxhT4b"]} -{"Format": "IDEA0", "ID": "f7d80c7d-cf91-46d5-8549-f5e06716df1c", "DetectTime": "2023-10-30T14:12:51.033457+02:00", "EventTime": "2023-10-30T14:12:51.033472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cw05uO3mPfosZVEw7e"]} -{"Format": "IDEA0", "ID": "0e534624-c84b-4999-9caa-0db8bb477623", "DetectTime": "2023-10-30T14:12:51.052486+02:00", "EventTime": "2023-10-30T14:12:51.052503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CYqama2KOC9aQ8bYLk"]} -{"Format": "IDEA0", "ID": "fa41fdfa-6415-4493-9b52-8659705bab8e", "DetectTime": "2023-10-30T14:12:51.069250+02:00", "EventTime": "2023-10-30T14:12:51.069263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHbL6Y1ZRUQkt7E5fl"]} -{"Format": "IDEA0", "ID": "80752656-58c4-4e24-acea-56570c3ffd64", "DetectTime": "2023-10-30T14:12:51.086065+02:00", "EventTime": "2023-10-30T14:12:51.086076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C5MYemjEgTKdr4Z9k"]} -{"Format": "IDEA0", "ID": "ce025c52-3b4c-417c-b481-a547f7a281c8", "DetectTime": "2023-10-30T14:12:51.105523+02:00", "EventTime": "2023-10-30T14:12:51.105534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CAVZHGmkZu5CqNSHf"]} -{"Format": "IDEA0", "ID": "fa5123b4-1247-4a28-bfd2-b74453cd01c9", "DetectTime": "2023-10-30T14:12:51.137054+02:00", "EventTime": "2023-10-30T14:12:51.137066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CRji8k1jwGqtWdQdbh"]} -{"Format": "IDEA0", "ID": "44bdb9da-b1ed-4d6a-982c-43212ecb8cc0", "DetectTime": "2023-10-30T14:12:51.156318+02:00", "EventTime": "2023-10-30T14:12:51.156329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ClrZXR27OyssSA8kz"]} -{"Format": "IDEA0", "ID": "d2903b6d-39f9-49a2-8eb0-f60bf37be9d0", "DetectTime": "2023-10-30T14:12:51.176437+02:00", "EventTime": "2023-10-30T14:12:51.176452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CDItiSXVUzg97CMBf"]} -{"Format": "IDEA0", "ID": "a9182995-bcdf-456d-8061-9a72d539276a", "DetectTime": "2023-10-30T14:12:51.197779+02:00", "EventTime": "2023-10-30T14:12:51.197794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C4aff0338DDvZ8Lr0d"]} -{"Format": "IDEA0", "ID": "f0c40b90-943c-4ee5-8cc6-d461d17554a7", "DetectTime": "2023-10-30T14:12:51.215895+02:00", "EventTime": "2023-10-30T14:12:51.215910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C85KyC3xgYxUBzWZtl"]} -{"Format": "IDEA0", "ID": "40a56781-1ced-4dad-ab02-b292960e35d3", "DetectTime": "2023-10-30T14:12:51.235381+02:00", "EventTime": "2023-10-30T14:12:51.235393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CIne5I3iVGpT9uyvQ1"]} -{"Format": "IDEA0", "ID": "11f6919a-0011-4f1c-aeb1-71ce2de54fec", "DetectTime": "2023-10-30T14:12:51.253950+02:00", "EventTime": "2023-10-30T14:12:51.253965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CtRPxo47zl5eYJVong"]} -{"Format": "IDEA0", "ID": "fd9590c4-c176-49b2-90f8-431a5dac0953", "DetectTime": "2023-10-30T14:12:51.272383+02:00", "EventTime": "2023-10-30T14:12:51.272394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CCf9fC46PnzhSVAn7"]} -{"Format": "IDEA0", "ID": "15715801-19f3-4cee-a1d2-bf0f8e389a39", "DetectTime": "2023-10-30T14:12:51.307406+02:00", "EventTime": "2023-10-30T14:12:51.307418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CueClc4mQXLK6GyQHk"]} -{"Format": "IDEA0", "ID": "547b1efb-c655-4ca0-8514-1d079caa5c3a", "DetectTime": "2023-10-30T14:12:51.324829+02:00", "EventTime": "2023-10-30T14:12:51.324847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CD2cud4RAmyne3krl4"]} -{"Format": "IDEA0", "ID": "b4876d5d-0c3e-4ea6-9ba3-18ecf5586b06", "DetectTime": "2023-10-30T14:12:51.338944+02:00", "EventTime": "2023-10-30T14:12:51.338954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CmsNtpwAYEGHf6lD1"]} -{"Format": "IDEA0", "ID": "b7938f43-0704-455d-855c-d3b5385a009c", "DetectTime": "2023-10-30T14:12:51.354788+02:00", "EventTime": "2023-10-30T14:12:51.354801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CLu8fQ1RRG9PaXQHwa"]} -{"Format": "IDEA0", "ID": "24377264-5ea4-45b5-bff1-e409e4094526", "DetectTime": "2023-10-30T14:12:51.373104+02:00", "EventTime": "2023-10-30T14:12:51.373115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cg9N7E16xO6DC4amd2"]} -{"Format": "IDEA0", "ID": "3c751fac-514c-458f-8930-4de54fdddfe3", "DetectTime": "2023-10-30T14:12:51.391692+02:00", "EventTime": "2023-10-30T14:12:51.391703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CHKrLv1xlaPz81IkYg"]} -{"Format": "IDEA0", "ID": "02bf7a91-1ab8-4490-bcaf-ae023a9e2a68", "DetectTime": "2023-10-30T14:12:51.430311+02:00", "EventTime": "2023-10-30T14:12:51.430327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CjevegBDsSIApTdOi"]} -{"Format": "IDEA0", "ID": "ca031012-c124-4f1c-a057-8fb82c54591f", "DetectTime": "2023-10-30T14:12:51.446811+02:00", "EventTime": "2023-10-30T14:12:51.446823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CDh7X93NTuX8Jyrfr3"]} -{"Format": "IDEA0", "ID": "f3226142-a2d2-4239-9522-2f352927a624", "DetectTime": "2023-10-30T14:12:51.463805+02:00", "EventTime": "2023-10-30T14:12:51.463819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CnWLXR1GP6f6qedGl4"]} -{"Format": "IDEA0", "ID": "07b9a610-49e0-42f9-b414-b139b42f15b6", "DetectTime": "2023-10-30T14:12:51.478123+02:00", "EventTime": "2023-10-30T14:12:51.478143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CvM2WG1ZlL6eHHM3gg"]} -{"Format": "IDEA0", "ID": "ef3e58ff-50ef-4bd9-9d20-7ce863499ed9", "DetectTime": "2023-10-30T14:12:51.493333+02:00", "EventTime": "2023-10-30T14:12:51.493344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVHEJB3nBvgGgnSSV6"]} -{"Format": "IDEA0", "ID": "ebe8eef3-a3f9-4f8c-a23b-cbfe7c33f3c3", "DetectTime": "2023-10-30T14:12:51.527202+02:00", "EventTime": "2023-10-30T14:12:51.527218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CMxvmn459YX5Ftmm83"]} -{"Format": "IDEA0", "ID": "5f4e851f-8efd-4596-8513-0a5870524e7a", "DetectTime": "2023-10-30T14:12:51.544116+02:00", "EventTime": "2023-10-30T14:12:51.544128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBT01d40BtNXx4uE3d"]} -{"Format": "IDEA0", "ID": "573fe3a5-f6a7-4baf-be6b-a6b5d2a76f8e", "DetectTime": "2023-10-30T14:12:51.560568+02:00", "EventTime": "2023-10-30T14:12:51.560580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CIFCYO2ODMroEnIkul"]} -{"Format": "IDEA0", "ID": "fe1518bb-516e-453f-83df-5fc85c9ee510", "DetectTime": "2023-10-30T14:12:51.576270+02:00", "EventTime": "2023-10-30T14:12:51.576283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cj8hxG11c9q8QKnnFf"]} -{"Format": "IDEA0", "ID": "0b8e0ac3-6a62-49eb-8317-3c5ff1f1eb48", "DetectTime": "2023-10-30T14:12:51.591542+02:00", "EventTime": "2023-10-30T14:12:51.591555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CnVe7g1ZLSpZTQutQf"]} -{"Format": "IDEA0", "ID": "a60d8d38-1bf5-4976-b55f-08835c31958e", "DetectTime": "2023-10-30T14:12:51.610706+02:00", "EventTime": "2023-10-30T14:12:51.610723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C5FMyJ35RYAaL1yEXd"]} -{"Format": "IDEA0", "ID": "e271f4ea-b72f-450a-a2cb-d1a714cd002e", "DetectTime": "2023-10-30T14:12:51.625625+02:00", "EventTime": "2023-10-30T14:12:51.625650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CGXwrQThRJawpcrme"]} -{"Format": "IDEA0", "ID": "cf4a4331-49d8-43b4-9f42-0729779b0e7d", "DetectTime": "2023-10-30T14:12:51.642985+02:00", "EventTime": "2023-10-30T14:12:51.643005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CdOjPlZj6GcOpxdJ3"]} -{"Format": "IDEA0", "ID": "80a14947-b7b4-4f2f-82ce-2e248af836c7", "DetectTime": "2023-10-30T14:12:51.663794+02:00", "EventTime": "2023-10-30T14:12:51.663809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CxsE9i3eXcZfvyWFtf"]} -{"Format": "IDEA0", "ID": "0ab923a1-567a-4e67-8a45-750e5a3e6b68", "DetectTime": "2023-10-30T14:12:51.695647+02:00", "EventTime": "2023-10-30T14:12:51.695658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CsNg3w3qjuFqqpubc8"]} -{"Format": "IDEA0", "ID": "d702e466-e4c5-4aac-b730-4644523db887", "DetectTime": "2023-10-30T14:12:51.713084+02:00", "EventTime": "2023-10-30T14:12:51.713096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0eEVb3U0mUn8JqCJi"]} -{"Format": "IDEA0", "ID": "0857f54e-4847-43f3-b9ab-e737a4f9f0c4", "DetectTime": "2023-10-30T14:12:51.727846+02:00", "EventTime": "2023-10-30T14:12:51.727857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CBROzH1lUq99p4ah3c"]} -{"Format": "IDEA0", "ID": "130c7f14-0f81-4b93-856c-d15b6651666e", "DetectTime": "2023-10-30T14:12:51.745525+02:00", "EventTime": "2023-10-30T14:12:51.745540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CcLnuLXEjIyKaSiJ2"]} -{"Format": "IDEA0", "ID": "de5645ef-6ec8-455c-830b-37054bb79925", "DetectTime": "2023-10-30T14:12:51.761255+02:00", "EventTime": "2023-10-30T14:12:51.761265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CV8EUjzLP2NC8URkb"]} -{"Format": "IDEA0", "ID": "1ecd6f53-6f10-47c9-b7aa-75076751a9f1", "DetectTime": "2023-10-30T14:12:51.777055+02:00", "EventTime": "2023-10-30T14:12:51.777069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C0n19B2N9sRy5xAIPi"]} -{"Format": "IDEA0", "ID": "01455556-c2bb-4acb-b49a-89715b122120", "DetectTime": "2023-10-30T14:12:51.792803+02:00", "EventTime": "2023-10-30T14:12:51.792814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C2aiBl2fH9dwjcj2se"]} -{"Format": "IDEA0", "ID": "4e6ab320-1cdf-4ea1-8a85-c8f7b60a4fc2", "DetectTime": "2023-10-30T14:12:51.809631+02:00", "EventTime": "2023-10-30T14:12:51.809644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CsJM971f1XyDWO67pa"]} -{"Format": "IDEA0", "ID": "f96f8e3a-e402-479c-9bdb-dfdfb04f1b3e", "DetectTime": "2023-10-30T14:12:51.828087+02:00", "EventTime": "2023-10-30T14:12:51.828103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cg8xN927buMLbbMZyg"]} -{"Format": "IDEA0", "ID": "4b1bf9e3-acd6-452e-9b74-14650512012a", "DetectTime": "2023-10-30T14:12:51.844187+02:00", "EventTime": "2023-10-30T14:12:51.844204+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Ck7T6w4sR4ISMjt313"]} -{"Format": "IDEA0", "ID": "6e92453f-1e97-4d11-bc70-9ef22b91f821", "DetectTime": "2023-10-30T14:12:51.865742+02:00", "EventTime": "2023-10-30T14:12:51.865753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C2oaUe1hbY2I0fyYB8"]} -{"Format": "IDEA0", "ID": "25e161ea-64e4-4dfb-ac62-2899aeed23b9", "DetectTime": "2023-10-30T14:12:51.881373+02:00", "EventTime": "2023-10-30T14:12:51.881383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ClA87W2By0oeI1LyGi"]} -{"Format": "IDEA0", "ID": "b0e0cb25-ef7b-4a98-b3d9-a288f870d098", "DetectTime": "2023-10-30T14:12:51.896724+02:00", "EventTime": "2023-10-30T14:12:51.896739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cm2YNt2MBit24oHUwk"]} -{"Format": "IDEA0", "ID": "a3005e9b-77ca-4292-9cc7-c728f56e8532", "DetectTime": "2023-10-30T14:12:51.914233+02:00", "EventTime": "2023-10-30T14:12:51.914248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ClDtqmLbeHDMQZykl"]} -{"Format": "IDEA0", "ID": "8afe78fc-3168-4170-bcce-5e4a4dcba39f", "DetectTime": "2023-10-30T14:12:51.943646+02:00", "EventTime": "2023-10-30T14:12:51.943658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CAHG9f17rMDN7WDeS3"]} -{"Format": "IDEA0", "ID": "6f1f88e8-6db1-417f-8910-28cfab6aab42", "DetectTime": "2023-10-30T14:12:51.957243+02:00", "EventTime": "2023-10-30T14:12:51.957254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CjBaqxvhpp4Cw9IFg"]} -{"Format": "IDEA0", "ID": "41d81899-1623-482d-83ae-5cf83ad7d313", "DetectTime": "2023-10-30T14:12:51.976582+02:00", "EventTime": "2023-10-30T14:12:51.976597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CAJWJA3eXM8Zbm3Ax4"]} -{"Format": "IDEA0", "ID": "f6b7a72c-1e0c-4051-9867-1e71dd6df5d8", "DetectTime": "2023-10-30T14:12:51.996608+02:00", "EventTime": "2023-10-30T14:12:51.996628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CjHemy3hI1jqokNV5f"]} -{"Format": "IDEA0", "ID": "d8f9b305-7e2e-4a84-9279-429aaba7383f", "DetectTime": "2023-10-30T14:12:52.014715+02:00", "EventTime": "2023-10-30T14:12:52.014734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CBTs0MuczCk8pSPTj"]} -{"Format": "IDEA0", "ID": "1b3889f8-02c6-4c4e-a7a7-45a0b84559ff", "DetectTime": "2023-10-30T14:12:52.032978+02:00", "EventTime": "2023-10-30T14:12:52.032988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cp2gmAzGyvmHgfIGk"]} -{"Format": "IDEA0", "ID": "c48f5db6-01c6-4f44-9881-d958807388e2", "DetectTime": "2023-10-30T14:12:52.047527+02:00", "EventTime": "2023-10-30T14:12:52.047539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5hDKi4m4n5TOjgPwc"]} -{"Format": "IDEA0", "ID": "d9b77852-385e-4fb7-9ca6-1bc5506f8018", "DetectTime": "2023-10-30T14:12:52.062166+02:00", "EventTime": "2023-10-30T14:12:52.062176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["COLpPl1aWerV53XDe5"]} -{"Format": "IDEA0", "ID": "95e9c38e-5ee2-4d4b-a75b-49d10419f4b5", "DetectTime": "2023-10-30T14:12:52.077481+02:00", "EventTime": "2023-10-30T14:12:52.077495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C2kwV11uw6qeclfEdj"]} -{"Format": "IDEA0", "ID": "b6137cb3-71b1-417b-b0b5-082f531e4679", "DetectTime": "2023-10-30T14:12:52.096353+02:00", "EventTime": "2023-10-30T14:12:52.096369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C781zY3knNejpzt3B6"]} -{"Format": "IDEA0", "ID": "255f6cdc-b001-48f6-8df5-ee76c30bb41b", "DetectTime": "2023-10-30T14:12:52.127429+02:00", "EventTime": "2023-10-30T14:12:52.127440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C2h6U23xV2zlgJGI1f"]} -{"Format": "IDEA0", "ID": "3a4a6fa1-6a60-4cc1-97bf-e60761f037da", "DetectTime": "2023-10-30T14:12:52.143089+02:00", "EventTime": "2023-10-30T14:12:52.143106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3fFpN3DB3WdQOCAx6"]} -{"Format": "IDEA0", "ID": "d684947b-8b9b-4259-8e5e-38487bfb545c", "DetectTime": "2023-10-30T14:12:52.160245+02:00", "EventTime": "2023-10-30T14:12:52.160260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["CWtFtWQyT0ioi3KXi"]} -{"Format": "IDEA0", "ID": "cdaa563a-37bf-4912-ab72-40026bd07bf7", "DetectTime": "2023-10-30T14:12:52.176448+02:00", "EventTime": "2023-10-30T14:12:52.176459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C4Ayxj2iZwJqBjABNd"]} -{"Format": "IDEA0", "ID": "0d88c2c3-e2e4-49cd-91ab-9c5dbe7949a2", "DetectTime": "2023-10-30T14:12:52.191901+02:00", "EventTime": "2023-10-30T14:12:52.191916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CdmYdM3U39c6wlyUMc"]} -{"Format": "IDEA0", "ID": "182c962e-22ae-4769-bfe0-9d19f7cda2b0", "DetectTime": "2023-10-30T14:12:52.207178+02:00", "EventTime": "2023-10-30T14:12:52.207192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMdgvI1bvmGOafuDud"]} -{"Format": "IDEA0", "ID": "eb4e72c9-6886-4434-a494-b23db656c7b6", "DetectTime": "2023-10-30T14:12:52.223727+02:00", "EventTime": "2023-10-30T14:12:52.223745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CmoiNF1JtVAWg48O26"]} -{"Format": "IDEA0", "ID": "8eb61183-5a5d-4ade-9c33-6692ccb7e6d4", "DetectTime": "2023-10-30T14:12:52.239829+02:00", "EventTime": "2023-10-30T14:12:52.239840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C0wmyR35Muwiad8rPj"]} -{"Format": "Json", "ID": "8eb61183-5a5d-4ade-9c33-6692ccb7e6d4", "DetectTime": "2023-10-30T14:12:52.239829+02:00", "EventTime": "2023-10-30T14:12:52.239840+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:01:10.815087+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:12:52.309270)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2ac77351-6059-4479-9ae2-b9b686d9c14a", "DetectTime": "2023-10-30T14:12:52.314520+02:00", "EventTime": "2023-10-30T14:12:52.314537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CucoLI1XE1NFy9FAe"]} -{"Format": "IDEA0", "ID": "5e5566ac-375c-4967-9b00-9b2f5d50d09d", "DetectTime": "2023-10-30T14:12:52.334869+02:00", "EventTime": "2023-10-30T14:12:52.334887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CqLxqT3JQByOTF7mW"]} -{"Format": "IDEA0", "ID": "a8e756bb-16cc-4b35-95f4-653e8eaff8eb", "DetectTime": "2023-10-30T14:12:52.348549+02:00", "EventTime": "2023-10-30T14:12:52.348560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CZECmP262px6PjmFEl"]} -{"Format": "IDEA0", "ID": "022b90d0-7326-4a21-ab7f-9d654a557243", "DetectTime": "2023-10-30T14:12:52.365413+02:00", "EventTime": "2023-10-30T14:12:52.365424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CHHcsX19mUkG66nhR8"]} -{"Format": "IDEA0", "ID": "b7fec7ca-9dda-4776-be1b-ecf1e3f1d629", "DetectTime": "2023-10-30T14:12:52.379426+02:00", "EventTime": "2023-10-30T14:12:52.379437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CEHieqFeMTqNWt0Ie"]} -{"Format": "IDEA0", "ID": "123925fb-22d3-4cf4-aaeb-85d6e8940023", "DetectTime": "2023-10-30T14:12:52.396227+02:00", "EventTime": "2023-10-30T14:12:52.396238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIw4yT2EQtuBUkM005"]} -{"Format": "IDEA0", "ID": "7eb3be8a-8e92-48df-9456-1dbe12517952", "DetectTime": "2023-10-30T14:12:52.411863+02:00", "EventTime": "2023-10-30T14:12:52.411874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cpbrzh4PkrM1TSg3q8"]} -{"Format": "IDEA0", "ID": "675c0b64-4cf9-4550-b7db-80bd92b4af37", "DetectTime": "2023-10-30T14:12:52.427741+02:00", "EventTime": "2023-10-30T14:12:52.427751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CRDWsF4YgensHqDoFj"]} -{"Format": "IDEA0", "ID": "2d36f185-24a7-4907-beaf-4b1250a5708d", "DetectTime": "2023-10-30T14:12:52.443918+02:00", "EventTime": "2023-10-30T14:12:52.443937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJVeqt2hd0AhOvlBc1"]} -{"Format": "IDEA0", "ID": "7d352654-d9f4-4098-8a50-b0146fc31430", "DetectTime": "2023-10-30T14:12:52.460611+02:00", "EventTime": "2023-10-30T14:12:52.460622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CizeC13KO3lT5ODyF7"]} -{"Format": "IDEA0", "ID": "aa0c9f80-5aa9-4aa1-8d74-bed5feaee6c8", "DetectTime": "2023-10-30T14:12:52.474451+02:00", "EventTime": "2023-10-30T14:12:52.474464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CCBBx016rT1QjMMVfd"]} -{"Format": "IDEA0", "ID": "a95618be-85e1-487c-9eb8-594b12119659", "DetectTime": "2023-10-30T14:12:52.510253+02:00", "EventTime": "2023-10-30T14:12:52.510269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CQtq382iazHoSTGATe"]} -{"Format": "IDEA0", "ID": "06401043-d713-47a7-b5ee-496cab2893dc", "DetectTime": "2023-10-30T14:12:52.529937+02:00", "EventTime": "2023-10-30T14:12:52.529950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["ChQPPl3OMXmcXTRzHd"]} -{"Format": "IDEA0", "ID": "81cd0535-b070-4051-8505-516247fef1c3", "DetectTime": "2023-10-30T14:12:52.546265+02:00", "EventTime": "2023-10-30T14:12:52.546281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CyhbYm26mhGjydNYXl"]} -{"Format": "IDEA0", "ID": "9505beda-719a-40c1-adab-dc515bf2c4dc", "DetectTime": "2023-10-30T14:12:52.564722+02:00", "EventTime": "2023-10-30T14:12:52.564734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CcsGOz1lx4WwsuKip9"]} -{"Format": "IDEA0", "ID": "55a8936e-0bbe-4b4c-83b7-49329c5089ed", "DetectTime": "2023-10-30T14:12:52.581720+02:00", "EventTime": "2023-10-30T14:12:52.581734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CMtcSp4H3AACy7whNc"]} -{"Format": "IDEA0", "ID": "1982518b-2257-4752-b934-3bdc32e1b154", "DetectTime": "2023-10-30T14:12:52.600133+02:00", "EventTime": "2023-10-30T14:12:52.600144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CLmVqL20AHTnyxlPcb"]} -{"Format": "IDEA0", "ID": "566ee28a-a712-4c03-a95b-9f721d4bdd2b", "DetectTime": "2023-10-30T14:12:52.617275+02:00", "EventTime": "2023-10-30T14:12:52.617285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CSFizF1e6ZY0YO0OZ4"]} -{"Format": "IDEA0", "ID": "b790b86e-ac60-4bad-995d-501ac158946d", "DetectTime": "2023-10-30T14:12:52.633903+02:00", "EventTime": "2023-10-30T14:12:52.633913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYkO1T3mdk01V3rGqj"]} -{"Format": "IDEA0", "ID": "38b63717-e13a-4b2f-9e28-b4bfaa300477", "DetectTime": "2023-10-30T14:12:52.663195+02:00", "EventTime": "2023-10-30T14:12:52.663211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CViVAJ1FVCgX7UjXBh"]} -{"Format": "IDEA0", "ID": "9f8b6439-68ed-4002-98e6-068894364910", "DetectTime": "2023-10-30T14:12:52.678546+02:00", "EventTime": "2023-10-30T14:12:52.678559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CkFRZO2dFDdVlvq9fl"]} -{"Format": "IDEA0", "ID": "7c86edee-b6b5-4e66-8dcc-67289e70ab05", "DetectTime": "2023-10-30T14:12:52.693876+02:00", "EventTime": "2023-10-30T14:12:52.693887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CtsjoN39IOsm6IsZDb"]} -{"Format": "IDEA0", "ID": "defbc472-21a7-458c-87dd-907bff2c185e", "DetectTime": "2023-10-30T14:12:52.709965+02:00", "EventTime": "2023-10-30T14:12:52.709977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJgCHK8G5b57ANLq3"]} -{"Format": "IDEA0", "ID": "36d74e7a-7978-44ee-932c-12fac7b15226", "DetectTime": "2023-10-30T14:12:52.727710+02:00", "EventTime": "2023-10-30T14:12:52.727722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CcHIW5bDRRbmeYcsl"]} -{"Format": "IDEA0", "ID": "c88b8572-e217-4db0-810d-d1d71469a07d", "DetectTime": "2023-10-30T14:12:52.744238+02:00", "EventTime": "2023-10-30T14:12:52.744254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CagL5C155owFAoZsZ2"]} -{"Format": "IDEA0", "ID": "38d3a552-6b52-4416-870b-27d5ac283ebb", "DetectTime": "2023-10-30T14:12:52.759827+02:00", "EventTime": "2023-10-30T14:12:52.759839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CISc1r3NO2Dy3Be1vf"]} -{"Format": "IDEA0", "ID": "c044bd65-07bf-4110-b468-002fa91a17a6", "DetectTime": "2023-10-30T14:12:52.775533+02:00", "EventTime": "2023-10-30T14:12:52.775545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cprwdkghoo3WGXlaf"]} -{"Format": "IDEA0", "ID": "46871662-b4b3-43b6-a1ee-f4d6d9a629ba", "DetectTime": "2023-10-30T14:12:52.800846+02:00", "EventTime": "2023-10-30T14:12:52.800857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CXgXyV1MiPwmM0F2Ce"]} -{"Format": "IDEA0", "ID": "fb95e06f-636c-4bf8-9411-ac1a996044d9", "DetectTime": "2023-10-30T14:12:52.814727+02:00", "EventTime": "2023-10-30T14:12:52.814738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYJZ3p11hLqFhzCVW8"]} -{"Format": "IDEA0", "ID": "025c4c14-d408-4fef-9d03-6b6a7f464497", "DetectTime": "2023-10-30T14:12:52.831984+02:00", "EventTime": "2023-10-30T14:12:52.831999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CN8YmW1tBkzGP3fkP4"]} -{"Format": "IDEA0", "ID": "85aa3045-ec9f-42f6-ab70-082b9cfef650", "DetectTime": "2023-10-30T14:12:52.848446+02:00", "EventTime": "2023-10-30T14:12:52.848458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.139.155 ", "ContentType": "text/plain"}], "uids": ["Cp6rb61OKDnT1zjw44"]} -{"Format": "IDEA0", "ID": "38ac697f-7e3e-40e9-a380-0d68c212cefe", "DetectTime": "2023-10-30T14:12:52.866101+02:00", "EventTime": "2023-10-30T14:12:52.866117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CXFgXB1ku3Jfjnrnfi"]} -{"Format": "IDEA0", "ID": "3d69aaac-2bbe-4344-af87-9b6bb7aa2972", "DetectTime": "2023-10-30T14:12:52.883958+02:00", "EventTime": "2023-10-30T14:12:52.883972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C31auo3kLM4E8uZH09"]} -{"Format": "IDEA0", "ID": "9f078b3b-c88e-4ea9-8a24-341bbbd762a0", "DetectTime": "2023-10-30T14:12:52.900652+02:00", "EventTime": "2023-10-30T14:12:52.900666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cr2Zru4Glb6PtJbjE3"]} -{"Format": "IDEA0", "ID": "6fdaf1b3-983b-44a1-8558-c409f659b224", "DetectTime": "2023-10-30T14:12:52.917323+02:00", "EventTime": "2023-10-30T14:12:52.917341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C7poy71VQITB9qwknh"]} -{"Format": "IDEA0", "ID": "033dac88-fc2b-468a-a3fb-d8c73f6e5a8c", "DetectTime": "2023-10-30T14:12:52.933815+02:00", "EventTime": "2023-10-30T14:12:52.933832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CMF75xBmMoyhlozwi"]} -{"Format": "IDEA0", "ID": "06d1c590-04cc-431d-802e-76428fbbfef0", "DetectTime": "2023-10-30T14:12:52.966958+02:00", "EventTime": "2023-10-30T14:12:52.966974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CZw3BU28qCvvZDArt"]} -{"Format": "IDEA0", "ID": "7823e5be-4b2a-4ae2-b3d2-135ba342404f", "DetectTime": "2023-10-30T14:12:52.984165+02:00", "EventTime": "2023-10-30T14:12:52.984182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CPLuawbCIDlfs9bNd"]} -{"Format": "IDEA0", "ID": "6f6b3500-cb12-43b3-ba6b-df2b2ae4cefc", "DetectTime": "2023-10-30T14:12:52.999994+02:00", "EventTime": "2023-10-30T14:12:53.000005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ccijj62JHbDWgFqMVg"]} -{"Format": "IDEA0", "ID": "433b69d9-5af5-4b8e-8bc8-71f8e85c2c24", "DetectTime": "2023-10-30T14:12:53.017803+02:00", "EventTime": "2023-10-30T14:12:53.017819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CoW5UD4NcXgnmCt3H3"]} -{"Format": "IDEA0", "ID": "9f3beb27-6f8c-4f9d-b2aa-c56d153f59e3", "DetectTime": "2023-10-30T14:12:53.036906+02:00", "EventTime": "2023-10-30T14:12:53.036923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNUuxh1LX4fxvkgAOj"]} -{"Format": "IDEA0", "ID": "76cbe244-1bbf-4430-b641-8bf73c0221ad", "DetectTime": "2023-10-30T14:12:53.056413+02:00", "EventTime": "2023-10-30T14:12:53.056428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqutHg4EaaEHlkJkse"]} -{"Format": "IDEA0", "ID": "23b0ab89-a389-47c9-9a30-2236f67dfa42", "DetectTime": "2023-10-30T14:12:53.074495+02:00", "EventTime": "2023-10-30T14:12:53.074511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cn6zpQeSnUtDzNL17"]} -{"Format": "IDEA0", "ID": "ebb2474f-40e1-41ec-8e53-3acf6dfb10cb", "DetectTime": "2023-10-30T14:12:53.094511+02:00", "EventTime": "2023-10-30T14:12:53.094530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CsLkOZ2popWHhQdN7a"]} -{"Format": "IDEA0", "ID": "647d3129-749a-4119-8e5c-79265384e8be", "DetectTime": "2023-10-30T14:12:53.124164+02:00", "EventTime": "2023-10-30T14:12:53.124180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CkUVyk2nU8MSFKlMU5"]} -{"Format": "IDEA0", "ID": "34e2c0ec-9748-49a9-a987-02d9bd60fab8", "DetectTime": "2023-10-30T14:12:53.215132+02:00", "EventTime": "2023-10-30T14:12:53.215143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cihkhd3sb95UIbV1qa"]} -{"Format": "IDEA0", "ID": "11eab414-536c-418f-9287-db6afc8e49c6", "DetectTime": "2023-10-30T14:12:53.232661+02:00", "EventTime": "2023-10-30T14:12:53.232673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CG8UUqqeu2hwN5W1g"]} -{"Format": "IDEA0", "ID": "09b55fbb-790a-442e-8918-904b37afdc1c", "DetectTime": "2023-10-30T14:12:53.249228+02:00", "EventTime": "2023-10-30T14:12:53.249245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CCNXZQ22ETnclTH71c"]} -{"Format": "IDEA0", "ID": "022169b1-1590-482a-828a-f7b7c3a3e242", "DetectTime": "2023-10-30T14:12:53.264929+02:00", "EventTime": "2023-10-30T14:12:53.264950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVhcn820xgertwx5na"]} -{"Format": "IDEA0", "ID": "7c699b5a-346e-49f7-95bf-d2d8efa5b1e1", "DetectTime": "2023-10-30T14:12:53.279982+02:00", "EventTime": "2023-10-30T14:12:53.280000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C19Azo4sAVvJ7d6z0i"]} -{"Format": "IDEA0", "ID": "682c7c77-6cb7-4d5b-bf9d-378fa55f2536", "DetectTime": "2023-10-30T14:12:53.296207+02:00", "EventTime": "2023-10-30T14:12:53.296218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cafxq73wYUvXYjXw6d"]} -{"Format": "IDEA0", "ID": "9768aad8-29fa-44fb-ac39-ee5ef613ebb2", "DetectTime": "2023-10-30T14:12:53.312390+02:00", "EventTime": "2023-10-30T14:12:53.312401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C7DzmI1g5Iz5l69aZa"]} -{"Format": "IDEA0", "ID": "5eba27b7-d6be-43b3-b113-35c956cdae6e", "DetectTime": "2023-10-30T14:12:53.327974+02:00", "EventTime": "2023-10-30T14:12:53.327992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CTaAJK2XO6ZyoucyAa"]} -{"Format": "IDEA0", "ID": "61d45385-4d0a-438a-93e3-f0503a95fe4a", "DetectTime": "2023-10-30T14:12:53.341984+02:00", "EventTime": "2023-10-30T14:12:53.341999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CEOrJk1Dd3aMtBPRLb"]} -{"Format": "IDEA0", "ID": "0ef651fa-3831-4aca-8007-405014a5ed40", "DetectTime": "2023-10-30T14:12:53.356366+02:00", "EventTime": "2023-10-30T14:12:53.356378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CnQ6BptrfCe7lyOxl"]} -{"Format": "IDEA0", "ID": "8c53ac9e-5502-4cec-8fc8-d5c82ab36247", "DetectTime": "2023-10-30T14:12:53.388932+02:00", "EventTime": "2023-10-30T14:12:53.388946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CjolNp2D8FTWnrvcW"]} -{"Format": "IDEA0", "ID": "03d74122-ab83-42fe-9e0e-d78df8298abe", "DetectTime": "2023-10-30T14:12:53.403810+02:00", "EventTime": "2023-10-30T14:12:53.403822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C8VaIu1LFS5YgRfJI3"]} -{"Format": "IDEA0", "ID": "84788cef-53b4-4b6d-ae13-bed7763c33c6", "DetectTime": "2023-10-30T14:12:53.418315+02:00", "EventTime": "2023-10-30T14:12:53.418331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CCFyqa0jLFkEjQGwj"]} -{"Format": "IDEA0", "ID": "dc0bf005-2bae-492f-bb39-496a5b2e0504", "DetectTime": "2023-10-30T14:12:53.437115+02:00", "EventTime": "2023-10-30T14:12:53.437126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CwE5u44Yk3pMoL1iK3"]} -{"Format": "IDEA0", "ID": "2648ade4-6c73-4980-8e8f-0fc4e1f8f4ce", "DetectTime": "2023-10-30T14:12:53.453652+02:00", "EventTime": "2023-10-30T14:12:53.453664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CWfFe94aeLvmyAn9U9"]} -{"Format": "IDEA0", "ID": "a993eed8-8669-412c-a462-abdd10bf95f3", "DetectTime": "2023-10-30T14:12:53.471667+02:00", "EventTime": "2023-10-30T14:12:53.471683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C9BlBF1RAqkqK09lFi"]} -{"Format": "IDEA0", "ID": "b27a57c0-e4c5-4fd2-a478-23ee3cafdb78", "DetectTime": "2023-10-30T14:12:53.490991+02:00", "EventTime": "2023-10-30T14:12:53.491007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cnuf1b1NqmY6fFr9pb"]} -{"Format": "IDEA0", "ID": "da20aabb-c01e-45fd-9b31-5e79ee150909", "DetectTime": "2023-10-30T14:12:53.511209+02:00", "EventTime": "2023-10-30T14:12:53.511225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CV9mpJ1ktGsM9TvbA8"]} -{"Format": "IDEA0", "ID": "c3283862-0890-42a0-8edc-e6c5594ae3f7", "DetectTime": "2023-10-30T14:12:53.531969+02:00", "EventTime": "2023-10-30T14:12:53.531984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CNfPuh4MJobn1QKixh"]} -{"Format": "IDEA0", "ID": "b10ccaed-5a37-4b10-aa8d-9673479c1055", "DetectTime": "2023-10-30T14:12:53.551859+02:00", "EventTime": "2023-10-30T14:12:53.551875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ChMTPO2X4BTqVTTkdl"]} -{"Format": "IDEA0", "ID": "d4326adb-1778-43c5-938e-8fb7d8f5c93f", "DetectTime": "2023-10-30T14:12:53.591324+02:00", "EventTime": "2023-10-30T14:12:53.591348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CksVK74TSMCe5Hh3Nl"]} -{"Format": "IDEA0", "ID": "d36388aa-a8c7-4827-b79b-6228b2c0c1d9", "DetectTime": "2023-10-30T14:12:53.611568+02:00", "EventTime": "2023-10-30T14:12:53.611584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C5tKotioLm4ggCcS3"]} -{"Format": "IDEA0", "ID": "324bc5c2-f89c-4c82-b8c0-d6263bf7fe04", "DetectTime": "2023-10-30T14:12:53.630485+02:00", "EventTime": "2023-10-30T14:12:53.630501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CPeXIxp2BZY7L9"]} -{"Format": "IDEA0", "ID": "b303dd9b-859d-4e76-ba30-3cba965b3d34", "DetectTime": "2023-10-30T14:12:53.651167+02:00", "EventTime": "2023-10-30T14:12:53.651183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CuVNvI32MdZ4rldd1j"]} -{"Format": "IDEA0", "ID": "b61d5b92-8715-483d-b96f-3053b0e6cadd", "DetectTime": "2023-10-30T14:12:53.670839+02:00", "EventTime": "2023-10-30T14:12:53.670851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CURDvnkbQIKwRc1K1"]} -{"Format": "IDEA0", "ID": "6954e1a0-c0be-4944-880c-23b719f181e6", "DetectTime": "2023-10-30T14:12:53.686741+02:00", "EventTime": "2023-10-30T14:12:53.686759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4UmFs4YNEEDaahxFb"]} -{"Format": "IDEA0", "ID": "0e2a3c7e-c4c4-468f-b17c-b06ddd2fb28a", "DetectTime": "2023-10-30T14:12:53.706911+02:00", "EventTime": "2023-10-30T14:12:53.706927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cwz9kf2kDW1BH3oqT4"]} -{"Format": "IDEA0", "ID": "f9ada40c-fc48-4062-a3d7-2814a3ddd79d", "DetectTime": "2023-10-30T14:12:53.725379+02:00", "EventTime": "2023-10-30T14:12:53.725391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Cq2vE44iuF00MVCR3"]} -{"Format": "IDEA0", "ID": "4539e7b7-1bbd-49b0-a374-debca5c2231f", "DetectTime": "2023-10-30T14:12:53.741590+02:00", "EventTime": "2023-10-30T14:12:53.741607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ck6MqD8ESYRePfMJa"]} -{"Format": "IDEA0", "ID": "24994149-fbdb-40db-96a3-071cc28d0c93", "DetectTime": "2023-10-30T14:12:53.760656+02:00", "EventTime": "2023-10-30T14:12:53.760667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CDzOb79Kte0M9zlT4"]} -{"Format": "IDEA0", "ID": "c24ee012-5c0a-4366-a365-2046042300a3", "DetectTime": "2023-10-30T14:12:53.780802+02:00", "EventTime": "2023-10-30T14:12:53.780817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CaZDH03RF4mr2OTzRk"]} -{"Format": "Json", "ID": "c24ee012-5c0a-4366-a365-2046042300a3", "DetectTime": "2023-10-30T14:12:53.780802+02:00", "EventTime": "2023-10-30T14:12:53.780817+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:01:13.012623+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:12:53.852656)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6ad59b02-7fee-482c-b9f6-575ae7f6c49d", "DetectTime": "2023-10-30T14:12:53.858153+02:00", "EventTime": "2023-10-30T14:12:53.858171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C8rSfZV98rPfsCzm7"]} -{"Format": "IDEA0", "ID": "bcfa0146-90a9-453a-9459-ba7162db44e0", "DetectTime": "2023-10-30T14:12:53.875795+02:00", "EventTime": "2023-10-30T14:12:53.875807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CzDbno1VhPks2RduAj"]} -{"Format": "IDEA0", "ID": "987d9a24-b551-4c9f-b12b-7a09bd09ba86", "DetectTime": "2023-10-30T14:12:53.894222+02:00", "EventTime": "2023-10-30T14:12:53.894233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C7GOv03iigMFGIcep9"]} -{"Format": "IDEA0", "ID": "a89e8e61-f6d4-432d-acdb-37d9329306d7", "DetectTime": "2023-10-30T14:12:53.912939+02:00", "EventTime": "2023-10-30T14:12:53.912952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CslYy91rDGKjKK4LH5"]} -{"Format": "IDEA0", "ID": "de5e12f4-e145-4ba7-b44e-d66487002008", "DetectTime": "2023-10-30T14:12:53.930082+02:00", "EventTime": "2023-10-30T14:12:53.930094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cwyf3a1RhoOWISI1m5"]} -{"Format": "IDEA0", "ID": "23aa8f56-d57a-42c0-b7c5-20314cf8129a", "DetectTime": "2023-10-30T14:12:53.947267+02:00", "EventTime": "2023-10-30T14:12:53.947278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CTSxNc2m5heTmd96v7"]} -{"Format": "IDEA0", "ID": "d47ce0b6-3421-48cb-b768-85b2afe4aac9", "DetectTime": "2023-10-30T14:12:53.961844+02:00", "EventTime": "2023-10-30T14:12:53.961854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cdfj4Q1UehyjD9ynS2"]} -{"Format": "IDEA0", "ID": "0775d006-8259-45d6-8e00-a0a3e87036f9", "DetectTime": "2023-10-30T14:12:53.994245+02:00", "EventTime": "2023-10-30T14:12:53.994258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CmCNea42EPaRaqcWG"]} -{"Format": "IDEA0", "ID": "7a2ae1d2-d0cf-44ac-b1ef-c99e642273fb", "DetectTime": "2023-10-30T14:12:54.012003+02:00", "EventTime": "2023-10-30T14:12:54.012020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CuFdKP3kmHXhK8Lsbb"]} -{"Format": "IDEA0", "ID": "7162519e-cdd6-458d-9ed8-1343d41af7ff", "DetectTime": "2023-10-30T14:12:54.031859+02:00", "EventTime": "2023-10-30T14:12:54.031875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CjlD82OVm0X5S8Vh6"]} -{"Format": "IDEA0", "ID": "bc7e4d58-904c-4059-be24-ea57dfc5d474", "DetectTime": "2023-10-30T14:12:54.051037+02:00", "EventTime": "2023-10-30T14:12:54.051056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CAXhHa3vhTJUTusLif"]} -{"Format": "IDEA0", "ID": "a88ef286-17fc-461c-83e3-de8d96ee4fb6", "DetectTime": "2023-10-30T14:12:54.069110+02:00", "EventTime": "2023-10-30T14:12:54.069127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C7HcG5qPdzIxgdWxl"]} -{"Format": "IDEA0", "ID": "ebf63003-3a68-4917-be48-f9fa28dba023", "DetectTime": "2023-10-30T14:12:54.085507+02:00", "EventTime": "2023-10-30T14:12:54.085526+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CR96sm2qGKBPgWS2Ei"]} -{"Format": "IDEA0", "ID": "55ba4200-f360-492e-ab24-974ddebfb7ac", "DetectTime": "2023-10-30T14:12:54.110440+02:00", "EventTime": "2023-10-30T14:12:54.110453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CPSIcl1GB51lzcumyg"]} -{"Format": "IDEA0", "ID": "1bfe2dab-807b-46b6-80c0-d63155a9e1de", "DetectTime": "2023-10-30T14:12:54.142686+02:00", "EventTime": "2023-10-30T14:12:54.142704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C51zWd22xznHbVBGQ"]} -{"Format": "IDEA0", "ID": "7e88ad22-1e78-4113-87c9-a01f20ad9777", "DetectTime": "2023-10-30T14:12:54.162195+02:00", "EventTime": "2023-10-30T14:12:54.162211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Ce3LDB48tH8wN6MTKc"]} -{"Format": "IDEA0", "ID": "113cffc5-158c-4bde-a3f0-8c017f06ab3c", "DetectTime": "2023-10-30T14:12:54.182134+02:00", "EventTime": "2023-10-30T14:12:54.182149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C44sg8312AsDe83iFa"]} -{"Format": "IDEA0", "ID": "245970b8-0caf-49da-b149-d65debab9d3f", "DetectTime": "2023-10-30T14:12:54.202450+02:00", "EventTime": "2023-10-30T14:12:54.202465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CBAdJ8ggK5JjleAy9"]} -{"Format": "IDEA0", "ID": "42319edc-1763-4ea3-bce1-580ff43d00c9", "DetectTime": "2023-10-30T14:12:54.223021+02:00", "EventTime": "2023-10-30T14:12:54.223046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CESVJ3254pfiVeHm36"]} -{"Format": "IDEA0", "ID": "9f951142-6619-480b-85e7-7e520d9d583d", "DetectTime": "2023-10-30T14:12:54.237658+02:00", "EventTime": "2023-10-30T14:12:54.237669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CwpT0F1eYaZ3fa5ENi"]} -{"Format": "IDEA0", "ID": "de498feb-2101-44be-a460-65e23a22db06", "DetectTime": "2023-10-30T14:12:54.257279+02:00", "EventTime": "2023-10-30T14:12:54.257295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CgS2T44FxVMs5YFdi3"]} -{"Format": "IDEA0", "ID": "e71420ed-2bdf-4af9-b11e-faf5c765ba46", "DetectTime": "2023-10-30T14:12:54.292837+02:00", "EventTime": "2023-10-30T14:12:54.292861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C9WNR5M1EXdfNYui9"]} -{"Format": "IDEA0", "ID": "b5d8ae2c-d219-49f9-b0b3-ae87ab2c2585", "DetectTime": "2023-10-30T14:12:54.311641+02:00", "EventTime": "2023-10-30T14:12:54.311657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CwgIp52t8hmEwqerBl"]} -{"Format": "IDEA0", "ID": "c51fc342-40bd-46c0-8b96-f302a40cd102", "DetectTime": "2023-10-30T14:12:54.330616+02:00", "EventTime": "2023-10-30T14:12:54.330632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C456yR2Ol8cUya9NIg"]} -{"Format": "IDEA0", "ID": "4736bde3-3ca9-4be6-96c9-e18870f277b5", "DetectTime": "2023-10-30T14:12:54.352920+02:00", "EventTime": "2023-10-30T14:12:54.352935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDyB2BUilkDHQNs2j"]} -{"Format": "IDEA0", "ID": "c14aabcf-99b3-44c6-be99-21ab7ae0cb9a", "DetectTime": "2023-10-30T14:12:54.369658+02:00", "EventTime": "2023-10-30T14:12:54.369669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CAUOEw4pnaeG6n6Aw4"]} -{"Format": "IDEA0", "ID": "f5410af3-dfd5-4e87-b83b-f3f40e203e9b", "DetectTime": "2023-10-30T14:12:54.388113+02:00", "EventTime": "2023-10-30T14:12:54.388128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CXpDW133TCQJ02eNL3"]} -{"Format": "IDEA0", "ID": "10782bfb-43eb-4ea5-9f32-576f1ec811c4", "DetectTime": "2023-10-30T14:12:54.405041+02:00", "EventTime": "2023-10-30T14:12:54.405055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CQ6yMj1l5gUj3GI7Xd"]} -{"Format": "IDEA0", "ID": "e05924a7-e567-47a3-a8fc-8aa5c4c9d756", "DetectTime": "2023-10-30T14:12:54.438440+02:00", "EventTime": "2023-10-30T14:12:54.438457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CFeLkudcQMfDMVqe1"]} -{"Format": "IDEA0", "ID": "cb1b9490-b71a-4939-a920-723df2ac9268", "DetectTime": "2023-10-30T14:12:54.455079+02:00", "EventTime": "2023-10-30T14:12:54.455090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKGLqC37459ChHGrec"]} -{"Format": "IDEA0", "ID": "d331c460-d152-4d25-808e-15762c104bda", "DetectTime": "2023-10-30T14:12:54.473211+02:00", "EventTime": "2023-10-30T14:12:54.473227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CrrAPs2AxQNhgNa9h9"]} -{"Format": "IDEA0", "ID": "cdce9d24-967f-4e08-9c62-58231c1c09b8", "DetectTime": "2023-10-30T14:12:54.491182+02:00", "EventTime": "2023-10-30T14:12:54.491201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CJPtBAP0o5i5FGtjc"]} -{"Format": "IDEA0", "ID": "2657cae8-4eea-40ea-87d6-ee9ef012ffc8", "DetectTime": "2023-10-30T14:12:54.511683+02:00", "EventTime": "2023-10-30T14:12:54.511696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["ChOdoN3AD5tYNiCzRg"]} -{"Format": "IDEA0", "ID": "3a01e267-9644-4a64-8a54-273cf340243e", "DetectTime": "2023-10-30T14:12:54.530246+02:00", "EventTime": "2023-10-30T14:12:54.530263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CktbFY2MHXSrgRPWgd"]} -{"Format": "IDEA0", "ID": "d441cdeb-640e-43b8-9fff-951252c88725", "DetectTime": "2023-10-30T14:12:54.550855+02:00", "EventTime": "2023-10-30T14:12:54.550872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CeKz8T3kq50gypG1Te"]} -{"Format": "IDEA0", "ID": "68f581f2-de96-4eab-8552-ee64315c76bd", "DetectTime": "2023-10-30T14:12:54.569545+02:00", "EventTime": "2023-10-30T14:12:54.569561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CJpEk31nf3rlH7yeh"]} -{"Format": "IDEA0", "ID": "00f7c615-57b2-4e7e-a3b0-351e7a1be8df", "DetectTime": "2023-10-30T14:12:54.588240+02:00", "EventTime": "2023-10-30T14:12:54.588256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cwp2EA2nGkv5wwXvLj"]} -{"Format": "IDEA0", "ID": "40211b36-ce7a-4237-95c5-2a352c9ce950", "DetectTime": "2023-10-30T14:12:54.605590+02:00", "EventTime": "2023-10-30T14:12:54.605606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CqtEzzQBQsbmjJUl2"]} -{"Format": "IDEA0", "ID": "61bf47ba-2d49-4cd4-80b5-fc8a67092f72", "DetectTime": "2023-10-30T14:12:54.625532+02:00", "EventTime": "2023-10-30T14:12:54.625548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLoPpu4hDxdWVgeoJb"]} -{"Format": "IDEA0", "ID": "ae811d0f-dbe8-43b9-94e6-3720e269cdc4", "DetectTime": "2023-10-30T14:12:54.645931+02:00", "EventTime": "2023-10-30T14:12:54.645951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CtAA6iREZU9DAAuq2"]} -{"Format": "IDEA0", "ID": "cf82ad75-896c-4a0b-a167-a3f8d888506d", "DetectTime": "2023-10-30T14:12:54.658613+02:00", "EventTime": "2023-10-30T14:12:54.658624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVDFz34RBjH4UF2df"]} -{"Format": "IDEA0", "ID": "1c3bb0cd-255c-4368-ad8b-d780a230333e", "DetectTime": "2023-10-30T14:12:54.674853+02:00", "EventTime": "2023-10-30T14:12:54.674871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C8ISSD2455INiqvhfd"]} -{"Format": "IDEA0", "ID": "3e80346c-ded1-4072-ad9a-856fd4bad200", "DetectTime": "2023-10-30T14:12:54.688524+02:00", "EventTime": "2023-10-30T14:12:54.688534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CYPPGQ25VJWrquKtWe"]} -{"Format": "IDEA0", "ID": "5410ea4e-d9b5-4d26-8388-886ea6f16866", "DetectTime": "2023-10-30T14:12:54.703588+02:00", "EventTime": "2023-10-30T14:12:54.703599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSM412bjMB85n5hj"]} -{"Format": "IDEA0", "ID": "d4e66b41-bb07-4add-832b-bd0f64b416c0", "DetectTime": "2023-10-30T14:12:54.720196+02:00", "EventTime": "2023-10-30T14:12:54.720208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C04VORftOPqZbXVpi"]} -{"Format": "IDEA0", "ID": "2446f6fb-5955-4e3a-9e1a-32c3fcddc663", "DetectTime": "2023-10-30T14:12:54.738434+02:00", "EventTime": "2023-10-30T14:12:54.738449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["ClzVVaOqfNs0A5Tn"]} -{"Format": "IDEA0", "ID": "cd1506b0-a0a3-43ef-9370-c1bd201381a5", "DetectTime": "2023-10-30T14:12:54.754954+02:00", "EventTime": "2023-10-30T14:12:54.754966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C8o829cvOMwPny0Uk"]} -{"Format": "IDEA0", "ID": "eee6b03e-e6b0-47a1-af9b-71fbd1b0379a", "DetectTime": "2023-10-30T14:12:54.771771+02:00", "EventTime": "2023-10-30T14:12:54.771786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["Cjs7Iq1qqg2qgcIBK2"]} -{"Format": "IDEA0", "ID": "ff44e81c-68a7-46b8-802c-0e15498f8b55", "DetectTime": "2023-10-30T14:12:54.785151+02:00", "EventTime": "2023-10-30T14:12:54.785163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CFYdkl24jCCa6Ja21h"]} -{"Format": "IDEA0", "ID": "9925754a-f9bf-4465-9272-65802f5e4bc2", "DetectTime": "2023-10-30T14:12:54.799607+02:00", "EventTime": "2023-10-30T14:12:54.799624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CqWS4JoPSlVnQBg91"]} -{"Format": "IDEA0", "ID": "8fa46a73-b7f4-41d2-847f-31c4e662aae8", "DetectTime": "2023-10-30T14:12:54.815271+02:00", "EventTime": "2023-10-30T14:12:54.815281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNcGIR2OzNaSpdHYb8"]} -{"Format": "IDEA0", "ID": "60c4e1f2-c91f-4373-9408-0bb0c0d623d1", "DetectTime": "2023-10-30T14:12:54.839953+02:00", "EventTime": "2023-10-30T14:12:54.839965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CCpt1kSb47IpGZTej"]} -{"Format": "IDEA0", "ID": "17032bb6-b9d4-481b-acef-593573da3ac4", "DetectTime": "2023-10-30T14:12:54.856788+02:00", "EventTime": "2023-10-30T14:12:54.856800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CRi6Pr3J1ZNFl3I385"]} -{"Format": "IDEA0", "ID": "3b1c9057-9c69-4e7e-b1b0-952c4164d961", "DetectTime": "2023-10-30T14:12:54.871765+02:00", "EventTime": "2023-10-30T14:12:54.871777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMdmye4VJmd4935Evl"]} -{"Format": "IDEA0", "ID": "58652cb5-4322-467e-8d2d-4fc088165980", "DetectTime": "2023-10-30T14:12:54.887077+02:00", "EventTime": "2023-10-30T14:12:54.887096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CPmT5lnS55NRSvXL8"]} -{"Format": "IDEA0", "ID": "d71e6cd6-c4b3-4348-ab06-a0e532619622", "DetectTime": "2023-10-30T14:12:54.906205+02:00", "EventTime": "2023-10-30T14:12:54.906222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C4o92vaRidoptxBEk"]} -{"Format": "IDEA0", "ID": "359c6505-1fee-4fc7-9617-ccbfb184260b", "DetectTime": "2023-10-30T14:12:54.924822+02:00", "EventTime": "2023-10-30T14:12:54.924838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CA5DJzaOBBT2HXKN4"]} -{"Format": "IDEA0", "ID": "b5b5f12e-ca20-40bc-8b38-adeb2fa18acd", "DetectTime": "2023-10-30T14:12:54.944418+02:00", "EventTime": "2023-10-30T14:12:54.944434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CrmgNt10yKVnBsuq3j"]} -{"Format": "IDEA0", "ID": "d9c1970c-c32a-4ce5-bc94-18b7d493f60f", "DetectTime": "2023-10-30T14:12:54.961372+02:00", "EventTime": "2023-10-30T14:12:54.961383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C0ybON2w0QhfHZGn47"]} -{"Format": "IDEA0", "ID": "7ef6a235-b191-49c4-8d13-6fef05e2f468", "DetectTime": "2023-10-30T14:12:54.977618+02:00", "EventTime": "2023-10-30T14:12:54.977633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBhd6ztRTPj2zLCnc"]} -{"Format": "IDEA0", "ID": "d746d315-9a36-4428-8644-c1408aee58f9", "DetectTime": "2023-10-30T14:12:54.993884+02:00", "EventTime": "2023-10-30T14:12:54.993899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C4YIrlmyiejYbJwxe"]} -{"Format": "IDEA0", "ID": "206f6d39-1d90-4b5f-bcea-85ee0561e91d", "DetectTime": "2023-10-30T14:12:55.011483+02:00", "EventTime": "2023-10-30T14:12:55.011495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CUfu0w2Z2CXyvf6ZX7"]} -{"Format": "IDEA0", "ID": "5083b4fa-7ba2-4157-97ed-b5fb08c94dd1", "DetectTime": "2023-10-30T14:12:55.025478+02:00", "EventTime": "2023-10-30T14:12:55.025495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CNV5bf3tPUNhwgmdpa"]} -{"Format": "IDEA0", "ID": "ee329169-64a7-4d35-acbd-a77141398041", "DetectTime": "2023-10-30T14:12:55.041005+02:00", "EventTime": "2023-10-30T14:12:55.041016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CmXevd2TRF7vBuelCk"]} -{"Format": "IDEA0", "ID": "095769d1-606a-4406-ad48-e2956e1c7dfc", "DetectTime": "2023-10-30T14:12:55.054730+02:00", "EventTime": "2023-10-30T14:12:55.054740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cjtw7E18MrVl52Uhwd"]} -{"Format": "IDEA0", "ID": "0cd7bbb4-66ac-4220-ba97-ece051524adb", "DetectTime": "2023-10-30T14:12:55.068183+02:00", "EventTime": "2023-10-30T14:12:55.068194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CaqjjxTjGdAPfMEdj"]} -{"Format": "IDEA0", "ID": "09c67589-9ead-4fe1-905d-1e68fbfa6985", "DetectTime": "2023-10-30T14:12:55.170518+02:00", "EventTime": "2023-10-30T14:12:55.170531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CRDyYu3436lXBfDah4"]} -{"Format": "IDEA0", "ID": "ad9bf30a-a7ee-43a1-94e7-e7420a2b97aa", "DetectTime": "2023-10-30T14:12:55.190292+02:00", "EventTime": "2023-10-30T14:12:55.190310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C06CHp2yDpUE4zILFc"]} -{"Format": "IDEA0", "ID": "f34c821a-14a0-4dd1-9bcc-556e153b6fb8", "DetectTime": "2023-10-30T14:12:55.206438+02:00", "EventTime": "2023-10-30T14:12:55.206450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJJK2H1UW1Xbm0QPni"]} -{"Format": "IDEA0", "ID": "3a1e065c-3e76-466f-8119-27a69081508c", "DetectTime": "2023-10-30T14:12:55.223873+02:00", "EventTime": "2023-10-30T14:12:55.223890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CT5aXu3OkAhFQK3eUe"]} -{"Format": "IDEA0", "ID": "2d7a3f50-3736-480c-9eb7-cc954e9e28b5", "DetectTime": "2023-10-30T14:12:55.243903+02:00", "EventTime": "2023-10-30T14:12:55.243915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CDfnBr1pyjEo1LX9P"]} -{"Format": "IDEA0", "ID": "5d91e93f-2fd1-438c-a4d3-d682485d0b79", "DetectTime": "2023-10-30T14:12:55.262489+02:00", "EventTime": "2023-10-30T14:12:55.262505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cztz6l4VBO30sqLmN3"]} -{"Format": "IDEA0", "ID": "5a5fa787-25c5-41c4-a696-af22b89a6d63", "DetectTime": "2023-10-30T14:12:55.281857+02:00", "EventTime": "2023-10-30T14:12:55.281874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C4NFotUJ1393v8Axa"]} -{"Format": "IDEA0", "ID": "e0e01515-d872-498c-badb-725d783a92fa", "DetectTime": "2023-10-30T14:12:55.301912+02:00", "EventTime": "2023-10-30T14:12:55.301928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CX34fX3ngcTMZDl79k"]} -{"Format": "IDEA0", "ID": "f1b6b7e8-d0c7-47e8-9a7f-dc6278ea9dee", "DetectTime": "2023-10-30T14:12:55.337454+02:00", "EventTime": "2023-10-30T14:12:55.337470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cem5W53mZ8o8uTEjMj"]} -{"Format": "IDEA0", "ID": "0c7e450e-450b-4102-b8f6-2df865c8513e", "DetectTime": "2023-10-30T14:12:55.357113+02:00", "EventTime": "2023-10-30T14:12:55.357131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cgg7nl3g1XunRclWg3"]} -{"Format": "IDEA0", "ID": "8ab43ff0-d9f3-46e7-93a8-fd579ea672de", "DetectTime": "2023-10-30T14:12:55.374682+02:00", "EventTime": "2023-10-30T14:12:55.374692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Ce9d0v4GFybwkLlVSc"]} -{"Format": "IDEA0", "ID": "4a9071a4-3f74-48e0-8e06-fa8a1663a37f", "DetectTime": "2023-10-30T14:12:55.391903+02:00", "EventTime": "2023-10-30T14:12:55.391914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cy0pvv30DXGYLXHt1g"]} -{"Format": "IDEA0", "ID": "f5af93e6-65dc-4186-a586-c82ecf5c503d", "DetectTime": "2023-10-30T14:12:55.409637+02:00", "EventTime": "2023-10-30T14:12:55.409656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CQ6dWwmiAThzYOyVf"]} -{"Format": "IDEA0", "ID": "d9b79c89-5edb-4365-9f92-926006f5c179", "DetectTime": "2023-10-30T14:12:55.429134+02:00", "EventTime": "2023-10-30T14:12:55.429149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CBigTi1czdeS1UDaAk"]} -{"Format": "IDEA0", "ID": "a803e372-b6e1-41dc-9de8-c03067774949", "DetectTime": "2023-10-30T14:12:55.449563+02:00", "EventTime": "2023-10-30T14:12:55.449578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CcldzE3grksn60ktjc"]} -{"Format": "IDEA0", "ID": "ccd5673c-cea1-448b-b68b-4d0868d723c0", "DetectTime": "2023-10-30T14:12:55.467481+02:00", "EventTime": "2023-10-30T14:12:55.467493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CuT6cC13aJLsRnolI2"]} -{"Format": "Json", "ID": "ccd5673c-cea1-448b-b68b-4d0868d723c0", "DetectTime": "2023-10-30T14:12:55.467481+02:00", "EventTime": "2023-10-30T14:12:55.467493+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:31:39.843932+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:12:55.544171)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1f1c88b7-f02f-4b46-a8b7-8c22c6d486ea", "DetectTime": "2023-10-30T14:12:55.549191+02:00", "EventTime": "2023-10-30T14:12:55.549207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C7DNmafyIblZgKwOa"]} -{"Format": "IDEA0", "ID": "16c89378-6b87-4d46-9ac8-784e4dcc7b7f", "DetectTime": "2023-10-30T14:12:55.569761+02:00", "EventTime": "2023-10-30T14:12:55.569776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cyypcf3aqSVYT1h7xe"]} -{"Format": "IDEA0", "ID": "04d831dc-c388-4096-976a-36f767aa3239", "DetectTime": "2023-10-30T14:12:55.586583+02:00", "EventTime": "2023-10-30T14:12:55.586595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ClWMJi2ND7560bjIa6"]} -{"Format": "IDEA0", "ID": "c6ae8be7-ffe0-4325-9e4f-a309bb94b110", "DetectTime": "2023-10-30T14:12:55.602841+02:00", "EventTime": "2023-10-30T14:12:55.602854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C8sCVe4duBw96L1PVk"]} -{"Format": "IDEA0", "ID": "be6f008e-a654-4636-ae1d-ad09951ff170", "DetectTime": "2023-10-30T14:12:55.618293+02:00", "EventTime": "2023-10-30T14:12:55.618303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CDCZYn4OrXfKwGlVnf"]} -{"Format": "IDEA0", "ID": "9ba08ea8-689e-4f39-8418-2783950e9ea2", "DetectTime": "2023-10-30T14:12:55.632017+02:00", "EventTime": "2023-10-30T14:12:55.632028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CWVi024VYhQ7O5OFI4"]} -{"Format": "IDEA0", "ID": "0bf55e84-f4b0-40a1-931b-4ca7cd621183", "DetectTime": "2023-10-30T14:12:55.649572+02:00", "EventTime": "2023-10-30T14:12:55.649588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CGvf983qPpbF2GkA39"]} -{"Format": "IDEA0", "ID": "6b453cc7-83ca-4f77-99dc-37718aa1072f", "DetectTime": "2023-10-30T14:12:55.668551+02:00", "EventTime": "2023-10-30T14:12:55.668566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CtrUFA1SM5a5YYWaEk"]} -{"Format": "IDEA0", "ID": "42ccbf60-83b6-459b-bdde-d0eb470bb56b", "DetectTime": "2023-10-30T14:12:55.686585+02:00", "EventTime": "2023-10-30T14:12:55.686603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CGAzoRqVvjwttEJRi"]} -{"Format": "IDEA0", "ID": "acfabe51-c668-4f7e-bca3-9c743d052311", "DetectTime": "2023-10-30T14:12:55.719947+02:00", "EventTime": "2023-10-30T14:12:55.719963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CLg48a2y7iglMp8xj2"]} -{"Format": "IDEA0", "ID": "e6d0ce83-9e32-4268-8731-33d2c6b5f169", "DetectTime": "2023-10-30T14:12:55.738732+02:00", "EventTime": "2023-10-30T14:12:55.738747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CJncMcPJ09SIwYpYj"]} -{"Format": "IDEA0", "ID": "63d00e3b-e75d-4765-bffe-0ef4ba77bc08", "DetectTime": "2023-10-30T14:12:55.756520+02:00", "EventTime": "2023-10-30T14:12:55.756536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cwu7882weHHLDnKnb5"]} -{"Format": "IDEA0", "ID": "0865110e-5289-4a72-9883-eaee5be6d4f2", "DetectTime": "2023-10-30T14:12:55.775435+02:00", "EventTime": "2023-10-30T14:12:55.775451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CnkxW13hcnrb3CL3K4"]} -{"Format": "IDEA0", "ID": "c56c552b-f875-4c40-abff-f2f878fbddae", "DetectTime": "2023-10-30T14:12:55.790333+02:00", "EventTime": "2023-10-30T14:12:55.790343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CsfO4R1PgaBm1Wn1Ad"]} -{"Format": "IDEA0", "ID": "0227e428-d642-4487-a891-1e4c975f274c", "DetectTime": "2023-10-30T14:12:55.808011+02:00", "EventTime": "2023-10-30T14:12:55.808026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CEE98B2QMCZnpVakb7"]} -{"Format": "IDEA0", "ID": "0da6a58e-6d41-4eda-bcba-4a4544348c7e", "DetectTime": "2023-10-30T14:12:55.821590+02:00", "EventTime": "2023-10-30T14:12:55.821609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CERmwO134HrnYYOXXh"]} -{"Format": "IDEA0", "ID": "6e75295a-d320-4884-979f-0dff3be35c33", "DetectTime": "2023-10-30T14:12:55.839709+02:00", "EventTime": "2023-10-30T14:12:55.839726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYA1wO1go53JPLtcWb"]} -{"Format": "IDEA0", "ID": "5ba546cc-f65a-48db-9e13-bbc4d5b6b62d", "DetectTime": "2023-10-30T14:12:55.856520+02:00", "EventTime": "2023-10-30T14:12:55.856532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CGqszm3udLYFDZ9Eyi"]} -{"Format": "IDEA0", "ID": "63799cbf-60ca-40f0-bdf2-09781f074ed0", "DetectTime": "2023-10-30T14:12:55.875481+02:00", "EventTime": "2023-10-30T14:12:55.875497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CZ9Q5N16pDUwMIfDn4"]} -{"Format": "IDEA0", "ID": "031a6ea6-6a21-4ef9-a855-7bf8c72a8ee2", "DetectTime": "2023-10-30T14:12:55.894488+02:00", "EventTime": "2023-10-30T14:12:55.894504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CCokDH1KvziOaE30s5"]} -{"Format": "IDEA0", "ID": "6d1c2c3f-23ee-4197-9fdd-690d9f63cda6", "DetectTime": "2023-10-30T14:12:55.914603+02:00", "EventTime": "2023-10-30T14:12:55.914619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C1jAF53dbLVmBb38ud"]} -{"Format": "IDEA0", "ID": "0ce23d38-a97a-453f-9c19-e20b2edaa627", "DetectTime": "2023-10-30T14:12:55.933114+02:00", "EventTime": "2023-10-30T14:12:55.933129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CNNEAg3OhF7psYvG19"]} -{"Format": "IDEA0", "ID": "a00b6942-c21b-48ff-b4e1-2039cede9bb8", "DetectTime": "2023-10-30T14:12:55.950346+02:00", "EventTime": "2023-10-30T14:12:55.950358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cie1xi3BYDCiRH4Dc"]} -{"Format": "IDEA0", "ID": "5be2cf89-52a2-4a9f-ab57-ff1e0fd901a6", "DetectTime": "2023-10-30T14:12:55.966199+02:00", "EventTime": "2023-10-30T14:12:55.966215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C25OjZVdNfJtTcUN2"]} -{"Format": "IDEA0", "ID": "3fbf69f5-4c66-4344-85b5-5ac2ada473a7", "DetectTime": "2023-10-30T14:12:55.986143+02:00", "EventTime": "2023-10-30T14:12:55.986159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CN9vM94f8TYoMJRy5i"]} -{"Format": "IDEA0", "ID": "07cc9d2c-ffbc-4d23-8c5d-e62b6eb2e4fa", "DetectTime": "2023-10-30T14:12:56.003382+02:00", "EventTime": "2023-10-30T14:12:56.003399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CT64dc1QzmqYOwW7kd"]} -{"Format": "IDEA0", "ID": "a65ceda7-35a3-4139-871e-0e9f398a99ad", "DetectTime": "2023-10-30T14:12:56.033711+02:00", "EventTime": "2023-10-30T14:12:56.033726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CbWL5A4HBpL4cr1Oe8"]} -{"Format": "IDEA0", "ID": "770b3127-f243-4ba2-8927-355ebe5ebb87", "DetectTime": "2023-10-30T14:12:56.052708+02:00", "EventTime": "2023-10-30T14:12:56.052724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CuKgng3DeVITPj7kel"]} -{"Format": "IDEA0", "ID": "5a72de3e-8264-4028-b7f4-4c5b95d0c320", "DetectTime": "2023-10-30T14:12:56.071185+02:00", "EventTime": "2023-10-30T14:12:56.071200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CWUDRH3pU9XTZs94Lg"]} -{"Format": "IDEA0", "ID": "bbb83321-a610-4fbd-9cbe-203246e61371", "DetectTime": "2023-10-30T14:12:56.090030+02:00", "EventTime": "2023-10-30T14:12:56.090051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CtI6V211sdBNCjp09j"]} -{"Format": "IDEA0", "ID": "63a0fa62-1b98-4787-9a5f-cc66cd28e3bf", "DetectTime": "2023-10-30T14:12:56.107730+02:00", "EventTime": "2023-10-30T14:12:56.107746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFwGvG27Q6sxiU5FCc"]} -{"Format": "IDEA0", "ID": "4a6562e4-f879-492e-9ae5-a13ec0581bed", "DetectTime": "2023-10-30T14:12:56.126372+02:00", "EventTime": "2023-10-30T14:12:56.126388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cat33t4WdTPctwuXn3"]} -{"Format": "IDEA0", "ID": "8c4ebc6e-3768-46a8-8776-08a926178ecf", "DetectTime": "2023-10-30T14:12:56.141686+02:00", "EventTime": "2023-10-30T14:12:56.141700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRDEMu4iArQv3n9evh"]} -{"Format": "IDEA0", "ID": "fb27fe8e-b5e4-4a1a-9cdc-cfc6a634c93f", "DetectTime": "2023-10-30T14:12:56.155860+02:00", "EventTime": "2023-10-30T14:12:56.155875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["ChX2p92rkemCprBZGk"]} -{"Format": "IDEA0", "ID": "51ff428a-f984-42ff-ae3e-c61819fb2d2a", "DetectTime": "2023-10-30T14:12:56.174100+02:00", "EventTime": "2023-10-30T14:12:56.174117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CBT1pYJVTtJZkrYrg"]} -{"Format": "IDEA0", "ID": "1d4f6e71-eb46-4181-9e7a-82bd31cae0ad", "DetectTime": "2023-10-30T14:12:56.191123+02:00", "EventTime": "2023-10-30T14:12:56.191141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4aHZx42EjgfmSrgJ3"]} -{"Format": "IDEA0", "ID": "22041085-56e4-441d-9f0a-c6b6ef76612a", "DetectTime": "2023-10-30T14:12:56.206461+02:00", "EventTime": "2023-10-30T14:12:56.206476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CduQXs1veFwe1zDjB6"]} -{"Format": "IDEA0", "ID": "31e826d0-bc88-42ea-b8bb-8706cdb3b342", "DetectTime": "2023-10-30T14:12:56.221039+02:00", "EventTime": "2023-10-30T14:12:56.221049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CpAGb62yeetbgz8Cjj"]} -{"Format": "IDEA0", "ID": "3c9ef0d4-4198-413c-abbe-1332433f49e6", "DetectTime": "2023-10-30T14:12:56.251703+02:00", "EventTime": "2023-10-30T14:12:56.251720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CCv4An1cR1HXSZlgY1"]} -{"Format": "IDEA0", "ID": "9f34973e-261e-4912-b118-c2839894d3b8", "DetectTime": "2023-10-30T14:12:56.267824+02:00", "EventTime": "2023-10-30T14:12:56.267835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CHj6CQ15qP5fNRgJ83"]} -{"Format": "IDEA0", "ID": "22b26537-e6d5-47ba-ab3f-9ae7905a0ca1", "DetectTime": "2023-10-30T14:12:56.286713+02:00", "EventTime": "2023-10-30T14:12:56.286730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CEhhzGilrwS2CS5mg"]} -{"Format": "IDEA0", "ID": "f0539ddb-0bc8-435d-b291-9c1502fd4f8e", "DetectTime": "2023-10-30T14:12:56.307349+02:00", "EventTime": "2023-10-30T14:12:56.307365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CG7FGK5eL5UutrrXh"]} -{"Format": "IDEA0", "ID": "57c0acda-5f26-4dca-9375-1fd2f179ca83", "DetectTime": "2023-10-30T14:12:56.326954+02:00", "EventTime": "2023-10-30T14:12:56.326971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CyBtwW24eXJ9drHBsd"]} -{"Format": "IDEA0", "ID": "c8f7cc18-417f-47cc-bcce-86e85bb16ca2", "DetectTime": "2023-10-30T14:12:56.346212+02:00", "EventTime": "2023-10-30T14:12:56.346228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CIBNBV4iB9hlAf0Jd"]} -{"Format": "IDEA0", "ID": "68273312-759b-422a-9a18-16dbb1b8471d", "DetectTime": "2023-10-30T14:12:56.367031+02:00", "EventTime": "2023-10-30T14:12:56.367049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CAG0jA3736l0RwCZg4"]} -{"Format": "IDEA0", "ID": "7563ca4d-4f47-462e-ad2d-d4a26b66ebdc", "DetectTime": "2023-10-30T14:12:56.387199+02:00", "EventTime": "2023-10-30T14:12:56.387225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CzV3JH3uUyPDS8OsNa"]} -{"Format": "IDEA0", "ID": "0b52e229-3864-445d-87af-e28cebc87cf9", "DetectTime": "2023-10-30T14:12:56.407155+02:00", "EventTime": "2023-10-30T14:12:56.407171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cl4eUR3FJ6xx3rmkr3"]} -{"Format": "IDEA0", "ID": "52bac654-037d-4b71-bdf9-d25889325cc0", "DetectTime": "2023-10-30T14:12:56.426527+02:00", "EventTime": "2023-10-30T14:12:56.426544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXCSZq2aihk49KiQ35"]} -{"Format": "IDEA0", "ID": "e8e55c86-806d-4c4c-9ef7-278fd856a8a5", "DetectTime": "2023-10-30T14:12:56.444449+02:00", "EventTime": "2023-10-30T14:12:56.444465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRjHE33VziPTI7goTc"]} -{"Format": "IDEA0", "ID": "0e991e5c-75f7-443a-96bc-ac643c7e24cd", "DetectTime": "2023-10-30T14:12:56.464656+02:00", "EventTime": "2023-10-30T14:12:56.464672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CUAer349xku0XVeVxc"]} -{"Format": "IDEA0", "ID": "bf70bda4-8d2a-4873-b192-37b2322277a9", "DetectTime": "2023-10-30T14:12:56.484140+02:00", "EventTime": "2023-10-30T14:12:56.484155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CxffY51rGCHcoUqCcg"]} -{"Format": "IDEA0", "ID": "b64f257c-4f38-4d52-80a6-59e98f768a46", "DetectTime": "2023-10-30T14:12:56.503148+02:00", "EventTime": "2023-10-30T14:12:56.503163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Ca2mf1C8ixJrKAj4f"]} -{"Format": "IDEA0", "ID": "9df5914b-0ca8-4574-95dc-6ba9b6fc5bf0", "DetectTime": "2023-10-30T14:12:56.521940+02:00", "EventTime": "2023-10-30T14:12:56.521965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CN69251HEuNJe6oR3l"]} -{"Format": "IDEA0", "ID": "e8969d0d-9c1d-477b-9c57-64efc8edffaa", "DetectTime": "2023-10-30T14:12:56.541141+02:00", "EventTime": "2023-10-30T14:12:56.541158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cmm5ki3idLIqz0pbHg"]} -{"Format": "IDEA0", "ID": "544aa850-53e2-44dc-a874-a6f4aac5f4b2", "DetectTime": "2023-10-30T14:12:56.556875+02:00", "EventTime": "2023-10-30T14:12:56.556887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CBEvFI3mdVz9hXd7z8"]} -{"Format": "IDEA0", "ID": "a5b07beb-aac6-4328-bd43-0f0713f525e3", "DetectTime": "2023-10-30T14:12:56.574529+02:00", "EventTime": "2023-10-30T14:12:56.574540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CD8EIB2RP2iaB6nIhc"]} -{"Format": "IDEA0", "ID": "ab2623d4-bd57-46e2-b917-4d3199c2b355", "DetectTime": "2023-10-30T14:12:56.604724+02:00", "EventTime": "2023-10-30T14:12:56.604739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C7Y3Eg2WAuInhyFUJ3"]} -{"Format": "IDEA0", "ID": "56e31350-f1e6-41d7-8965-f0af3752df37", "DetectTime": "2023-10-30T14:12:56.622967+02:00", "EventTime": "2023-10-30T14:12:56.622991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CSlcCv2jnhkbAddk8k"]} -{"Format": "IDEA0", "ID": "179ae3d8-86ec-4ba2-832a-8542a04ebcc1", "DetectTime": "2023-10-30T14:12:56.641120+02:00", "EventTime": "2023-10-30T14:12:56.641135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CIFEwA2CrGAHHUG3tf"]} -{"Format": "IDEA0", "ID": "21d84e4f-b7ab-4a67-81fc-da449993026f", "DetectTime": "2023-10-30T14:12:56.659408+02:00", "EventTime": "2023-10-30T14:12:56.659423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cntgfp2RSJedSHyTpj"]} -{"Format": "IDEA0", "ID": "bb78c421-23a1-48ea-becb-e40fb9eac278", "DetectTime": "2023-10-30T14:12:56.674986+02:00", "EventTime": "2023-10-30T14:12:56.675000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cjhww23f4d4TgGH6tc"]} -{"Format": "IDEA0", "ID": "5b17093f-8fc5-4d10-8e2f-c21a78a1e6f7", "DetectTime": "2023-10-30T14:12:56.688345+02:00", "EventTime": "2023-10-30T14:12:56.688356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CPFwG016zlCV2dI537"]} -{"Format": "IDEA0", "ID": "0a2a14d4-4717-4eb6-8b9f-ee6f36bb875d", "DetectTime": "2023-10-30T14:12:56.703187+02:00", "EventTime": "2023-10-30T14:12:56.703200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["COqiSA336PqRfVsGH7"]} -{"Format": "IDEA0", "ID": "19a910eb-2b7d-4e22-82e3-7dc9de35ce5b", "DetectTime": "2023-10-30T14:12:56.717862+02:00", "EventTime": "2023-10-30T14:12:56.717875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CKumnU3QkPLFjf3Mb9"]} -{"Format": "IDEA0", "ID": "892e6e81-528b-4fbe-8d66-682012a4c3c1", "DetectTime": "2023-10-30T14:12:56.732801+02:00", "EventTime": "2023-10-30T14:12:56.732812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C9a4yb1qebRD1Kqtke"]} -{"Format": "IDEA0", "ID": "2e801780-be63-4fd8-8739-00ee7c68a3c6", "DetectTime": "2023-10-30T14:12:56.745179+02:00", "EventTime": "2023-10-30T14:12:56.745190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CAsnHI1SiGRzpI8GWe"]} -{"Format": "IDEA0", "ID": "1a537007-3864-4bdb-8ca8-5b0ffed5ef76", "DetectTime": "2023-10-30T14:12:56.760771+02:00", "EventTime": "2023-10-30T14:12:56.760786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CwBqYX22vlVSvtILwk"]} -{"Format": "IDEA0", "ID": "e5f6adf4-e255-48c6-853c-ff679e30fceb", "DetectTime": "2023-10-30T14:12:56.777369+02:00", "EventTime": "2023-10-30T14:12:56.777385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CdUEJqWA6dIA6EE1"]} -{"Format": "IDEA0", "ID": "4eb45da0-e9a7-4293-80b4-474916ca21ad", "DetectTime": "2023-10-30T14:12:56.801878+02:00", "EventTime": "2023-10-30T14:12:56.801888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CpC5kt4hXZ9H3zhLyk"]} -{"Format": "IDEA0", "ID": "98eefba9-4832-4e67-a120-e1abfad3856f", "DetectTime": "2023-10-30T14:12:56.814704+02:00", "EventTime": "2023-10-30T14:12:56.814720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cjmr2J38pBhqutKPk4"]} -{"Format": "IDEA0", "ID": "ab2aa749-6376-4c6f-808d-86a05da3d74e", "DetectTime": "2023-10-30T14:12:56.831024+02:00", "EventTime": "2023-10-30T14:12:56.831040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTC5RI2EaxHSGhTZM7"]} -{"Format": "IDEA0", "ID": "c5ae9612-a8a2-40cb-922e-72412e89c466", "DetectTime": "2023-10-30T14:12:56.847119+02:00", "EventTime": "2023-10-30T14:12:56.847129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CdebnA3gAA9MVAe6Nf"]} -{"Format": "IDEA0", "ID": "0bfa1413-c901-40c1-aad0-926210472fb2", "DetectTime": "2023-10-30T14:12:56.860988+02:00", "EventTime": "2023-10-30T14:12:56.861000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CFkPRoziERFmNR7Rf"]} -{"Format": "IDEA0", "ID": "f824d5af-354e-4f5a-8359-a7a9370ae8fb", "DetectTime": "2023-10-30T14:12:56.875196+02:00", "EventTime": "2023-10-30T14:12:56.875214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cd9vJT2S7w5bTo2RDh"]} -{"Format": "IDEA0", "ID": "bb33a6c6-edb3-4020-9427-c7eb9f22b130", "DetectTime": "2023-10-30T14:12:56.890712+02:00", "EventTime": "2023-10-30T14:12:56.890723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CpYHOd1wG2tZZ62Jb9"]} -{"Format": "IDEA0", "ID": "395d800d-8113-4056-8cb1-d2266125f968", "DetectTime": "2023-10-30T14:12:56.905689+02:00", "EventTime": "2023-10-30T14:12:56.905700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["COyyhY1bBgplQPKS1f"]} -{"Format": "IDEA0", "ID": "fe099042-3bb5-4c9d-a7bd-4a11d834684b", "DetectTime": "2023-10-30T14:12:56.918842+02:00", "EventTime": "2023-10-30T14:12:56.918859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CPq0edBJaLYWcZyy"]} -{"Format": "IDEA0", "ID": "aa117b78-b6c3-415d-bfcc-745a25a03990", "DetectTime": "2023-10-30T14:12:56.934206+02:00", "EventTime": "2023-10-30T14:12:56.934218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CC8bX23mEjXny5eOOk"]} -{"Format": "IDEA0", "ID": "a3653190-dc90-4f55-8bb3-5f8d701c77f4", "DetectTime": "2023-10-30T14:12:56.961217+02:00", "EventTime": "2023-10-30T14:12:56.961230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CV0mEr43VIgnqEubU9"]} -{"Format": "IDEA0", "ID": "37a57e5c-e43a-4f1c-b482-331ce0d64ee7", "DetectTime": "2023-10-30T14:12:56.978370+02:00", "EventTime": "2023-10-30T14:12:56.978380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["COvejY3GbPxhqns27g"]} -{"Format": "IDEA0", "ID": "cbe9cdcc-f745-4109-9376-61a98ed5a667", "DetectTime": "2023-10-30T14:12:56.998042+02:00", "EventTime": "2023-10-30T14:12:56.998058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CPHdUFn7coqVU42i"]} -{"Format": "IDEA0", "ID": "a6f63ffc-816a-4c0d-b0e2-abfc3531a51c", "DetectTime": "2023-10-30T14:12:57.017664+02:00", "EventTime": "2023-10-30T14:12:57.017680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CzXEMb2fcgVO2orSf7"]} -{"Format": "IDEA0", "ID": "6febe27a-62f7-404f-a7ba-96be310005e6", "DetectTime": "2023-10-30T14:12:57.036605+02:00", "EventTime": "2023-10-30T14:12:57.036621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CjwZFk3b9Th4INmFL4"]} -{"Format": "IDEA0", "ID": "3009cf73-2667-4bcf-8b2e-7492444138ee", "DetectTime": "2023-10-30T14:12:57.055626+02:00", "EventTime": "2023-10-30T14:12:57.055642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CWXIfe1Pdut5Lvsk39"]} -{"Format": "IDEA0", "ID": "2c001013-02cf-4294-af9a-30f5eab7cf96", "DetectTime": "2023-10-30T14:12:57.073814+02:00", "EventTime": "2023-10-30T14:12:57.073828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CqGi8C1epgd50bCQN2"]} -{"Format": "IDEA0", "ID": "8dea38fd-341e-4626-8aab-b7ee1a5f187d", "DetectTime": "2023-10-30T14:12:57.089732+02:00", "EventTime": "2023-10-30T14:12:57.089748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["ClzqMb4PEbFB5cklNe"]} -{"Format": "IDEA0", "ID": "2f740e80-d0d4-4663-acfe-2db9ac68bc22", "DetectTime": "2023-10-30T14:12:57.102952+02:00", "EventTime": "2023-10-30T14:12:57.102964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cj5cpB2hKXjnPedzH4"]} -{"Format": "IDEA0", "ID": "516c313f-ab90-4e84-92e3-eb1255f728b5", "DetectTime": "2023-10-30T14:12:57.117879+02:00", "EventTime": "2023-10-30T14:12:57.117890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cr66A43m2ppIL92vGj"]} -{"Format": "IDEA0", "ID": "8a1f976f-4a7a-496a-8df4-925eff7e8118", "DetectTime": "2023-10-30T14:12:57.133285+02:00", "EventTime": "2023-10-30T14:12:57.133298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CZe7cV2D9todYhTyia"]} -{"Format": "IDEA0", "ID": "03723b0e-8c4f-4291-83eb-ec0e970caf9b", "DetectTime": "2023-10-30T14:12:57.154926+02:00", "EventTime": "2023-10-30T14:12:57.154938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSLnL4BjJXPs4t50a"]} -{"Format": "IDEA0", "ID": "278fb931-032a-4155-97ca-1df6e8050a0b", "DetectTime": "2023-10-30T14:12:57.168732+02:00", "EventTime": "2023-10-30T14:12:57.168744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbMo2R2isUdvBp4S0h"]} -{"Format": "IDEA0", "ID": "ee2e7d9f-7306-4767-af12-d59ac94ff633", "DetectTime": "2023-10-30T14:12:57.182504+02:00", "EventTime": "2023-10-30T14:12:57.182516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C5hmv81i1KbNveRDh"]} -{"Format": "IDEA0", "ID": "c80abe6f-7d70-4653-8794-16969054d23e", "DetectTime": "2023-10-30T14:12:57.198000+02:00", "EventTime": "2023-10-30T14:12:57.198012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CiCnfG1MZXL3z2q992"]} -{"Format": "IDEA0", "ID": "03001937-415b-4569-b0dc-1366b797eb58", "DetectTime": "2023-10-30T14:12:57.215030+02:00", "EventTime": "2023-10-30T14:12:57.215047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CmK0gS2Ej1aILRVWU4"]} -{"Format": "IDEA0", "ID": "248fea50-e54f-4837-b9a9-01213fb6de85", "DetectTime": "2023-10-30T14:12:57.230473+02:00", "EventTime": "2023-10-30T14:12:57.230485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CsEAqHIs2udhkRl09"]} -{"Format": "IDEA0", "ID": "353a8a62-114e-4b5d-9ae2-195a091557d5", "DetectTime": "2023-10-30T14:12:57.246086+02:00", "EventTime": "2023-10-30T14:12:57.246096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CiYuX12Fd1N6DVhwxk"]} -{"Format": "IDEA0", "ID": "cb51fb08-958c-47f5-a51a-373b2e1fbd82", "DetectTime": "2023-10-30T14:12:57.262212+02:00", "EventTime": "2023-10-30T14:12:57.262225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cnh7uJ28qwGzqOKb3f"]} -{"Format": "IDEA0", "ID": "bdb39c7c-e659-4842-84bf-a3c958968120", "DetectTime": "2023-10-30T14:12:57.278530+02:00", "EventTime": "2023-10-30T14:12:57.278546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CFXnodVvYLy4KiDo"]} -{"Format": "IDEA0", "ID": "a050de56-10c7-4310-9198-681a02cbc6f4", "DetectTime": "2023-10-30T14:12:57.307634+02:00", "EventTime": "2023-10-30T14:12:57.307651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CC8SLZ30HJbNxF3Bc"]} -{"Format": "IDEA0", "ID": "0603ca4c-3028-4573-ba92-3d374908e553", "DetectTime": "2023-10-30T14:12:57.325973+02:00", "EventTime": "2023-10-30T14:12:57.325986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CLxjzclJt8qeSqJOa"]} -{"Format": "IDEA0", "ID": "9c2b6cda-60c5-4968-9ca2-1501a166c0bb", "DetectTime": "2023-10-30T14:12:57.343203+02:00", "EventTime": "2023-10-30T14:12:57.343214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CrDyWn3IffVQrRPTub"]} -{"Format": "IDEA0", "ID": "d00e873f-62d5-4f79-80ff-c5650c305182", "DetectTime": "2023-10-30T14:12:57.361199+02:00", "EventTime": "2023-10-30T14:12:57.361214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CiiDET3zDWmAK2Dh0k"]} -{"Format": "IDEA0", "ID": "0645c79c-46db-4f79-914f-aefe4fcf4a5b", "DetectTime": "2023-10-30T14:12:57.380217+02:00", "EventTime": "2023-10-30T14:12:57.380232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CL6YfN2COb55KQUDr4"]} -{"Format": "IDEA0", "ID": "3c1b1932-8c75-4833-80eb-694483b2fbcf", "DetectTime": "2023-10-30T14:12:57.399211+02:00", "EventTime": "2023-10-30T14:12:57.399226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CspCUM3lp6anqsyt5a"]} -{"Format": "IDEA0", "ID": "49eff8d5-d072-49df-ace4-7028a79bc662", "DetectTime": "2023-10-30T14:12:57.416531+02:00", "EventTime": "2023-10-30T14:12:57.416542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CB8AXU3rNxKu8bhES"]} -{"Format": "IDEA0", "ID": "153a048a-d0d5-49c4-9ab7-5a800522eb71", "DetectTime": "2023-10-30T14:12:57.435017+02:00", "EventTime": "2023-10-30T14:12:57.435032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CQ9wFw4cWLn5dSSye2"]} -{"Format": "IDEA0", "ID": "bf1419ca-8fba-440f-9a1a-caae863768e2", "DetectTime": "2023-10-30T14:12:57.451467+02:00", "EventTime": "2023-10-30T14:12:57.451478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Ct89hD3lJTN7d3MhJc"]} -{"Format": "IDEA0", "ID": "2f43de94-57e2-4f84-bd50-bf6dc66eafd9", "DetectTime": "2023-10-30T14:12:57.469105+02:00", "EventTime": "2023-10-30T14:12:57.469115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Ck4s8R3aWReoEugJZe"]} -{"Format": "IDEA0", "ID": "41687cc8-02a4-49bb-9cbe-352ea2d2d758", "DetectTime": "2023-10-30T14:12:57.485229+02:00", "EventTime": "2023-10-30T14:12:57.485244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cb0Xdu1XzQlT5YIeX2"]} -{"Format": "IDEA0", "ID": "9d3bd40d-dda0-450d-a43c-4093a82dbe1f", "DetectTime": "2023-10-30T14:12:57.501274+02:00", "EventTime": "2023-10-30T14:12:57.501292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C5gXTW3Cslh6oMlt0l"]} -{"Format": "IDEA0", "ID": "200eee9b-3a8a-4df4-ade7-04185e1a4808", "DetectTime": "2023-10-30T14:12:57.518151+02:00", "EventTime": "2023-10-30T14:12:57.518167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CGTegt2oWyRR6nC2Xh"]} -{"Format": "IDEA0", "ID": "a0af3da2-ac6f-4c47-8f96-b2d6e0ac8833", "DetectTime": "2023-10-30T14:12:57.535775+02:00", "EventTime": "2023-10-30T14:12:57.535790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CnqthFmkJN9UDtsp4"]} -{"Format": "IDEA0", "ID": "42813513-2896-4510-99d4-84ea4161b141", "DetectTime": "2023-10-30T14:12:57.554750+02:00", "EventTime": "2023-10-30T14:12:57.554771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CMTvjH33hItJqKpcXc"]} -{"Format": "IDEA0", "ID": "2f9a7225-4cc3-4fd7-9be1-fb355dc95539", "DetectTime": "2023-10-30T14:12:57.572949+02:00", "EventTime": "2023-10-30T14:12:57.572959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CUmRC31fTxzpMFcZXf"]} -{"Format": "Json", "ID": "2f9a7225-4cc3-4fd7-9be1-fb355dc95539", "DetectTime": "2023-10-30T14:12:57.572949+02:00", "EventTime": "2023-10-30T14:12:57.572959+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:31:41.491248+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:12:57.632081)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6a93e21b-7e04-41e3-a578-de6b265152cc", "DetectTime": "2023-10-30T14:12:57.636083+02:00", "EventTime": "2023-10-30T14:12:57.636093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cxp4lb3E7MjYhRqB8d"]} -{"Format": "IDEA0", "ID": "75ef2c82-bd2c-4436-ac0e-32df60932849", "DetectTime": "2023-10-30T14:12:57.653841+02:00", "EventTime": "2023-10-30T14:12:57.653852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CUN1i5GpveTsuu0o8"]} -{"Format": "IDEA0", "ID": "c58e890a-8e9b-44da-b560-b5edbd015f90", "DetectTime": "2023-10-30T14:12:57.670257+02:00", "EventTime": "2023-10-30T14:12:57.670271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Ckp6et13OPlJ1tw34"]} -{"Format": "IDEA0", "ID": "e13a5e1e-dbed-400b-ab1d-38393be2a91c", "DetectTime": "2023-10-30T14:12:57.688499+02:00", "EventTime": "2023-10-30T14:12:57.688516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CRD4gr2F9jUmGmjCSc"]} -{"Format": "IDEA0", "ID": "316e2032-454c-4382-95c6-8c7ec466d15a", "DetectTime": "2023-10-30T14:12:57.704416+02:00", "EventTime": "2023-10-30T14:12:57.704428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CNYwlxOsutqxSg3w1"]} -{"Format": "IDEA0", "ID": "a04a77da-1100-4198-8f61-d854355ffe37", "DetectTime": "2023-10-30T14:12:57.723370+02:00", "EventTime": "2023-10-30T14:12:57.723386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CFHVFzA1tFxsSojO1"]} -{"Format": "IDEA0", "ID": "c9dd433e-ef0a-4af8-950c-fcbcb9f39537", "DetectTime": "2023-10-30T14:12:57.738969+02:00", "EventTime": "2023-10-30T14:12:57.738989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C195Oh3gknvuoBgxGh"]} -{"Format": "IDEA0", "ID": "4297b74d-2795-4349-9aa0-81d124d13f96", "DetectTime": "2023-10-30T14:12:57.756750+02:00", "EventTime": "2023-10-30T14:12:57.756763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C8sKL519ljnKHIheg1"]} -{"Format": "IDEA0", "ID": "12cfeec7-8b3a-45aa-9d87-cddbd1ce72bf", "DetectTime": "2023-10-30T14:12:57.775704+02:00", "EventTime": "2023-10-30T14:12:57.775720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cxdq3o2I5IdvcUSQVl"]} -{"Format": "IDEA0", "ID": "7dc72ccf-532c-4343-ab2b-3d0fd04b22f8", "DetectTime": "2023-10-30T14:12:57.793904+02:00", "EventTime": "2023-10-30T14:12:57.793916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CuqEBXtv2OxSUuS1k"]} -{"Format": "IDEA0", "ID": "fc89a5af-b6d5-4974-b00b-ce8bf0c5ad48", "DetectTime": "2023-10-30T14:12:57.811182+02:00", "EventTime": "2023-10-30T14:12:57.811195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CguFac28i2F14qj50d"]} -{"Format": "IDEA0", "ID": "87010a42-0433-4d2a-ad55-886be367ecf8", "DetectTime": "2023-10-30T14:12:57.827796+02:00", "EventTime": "2023-10-30T14:12:57.827813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C4UmNL1GQGDxaCqsg9"]} -{"Format": "IDEA0", "ID": "643a2556-6654-426b-91fb-f336697f0a1b", "DetectTime": "2023-10-30T14:12:57.844635+02:00", "EventTime": "2023-10-30T14:12:57.844646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CPb5ep45tmuwQvjy45"]} -{"Format": "IDEA0", "ID": "248f32b6-77cb-4237-a81c-38cf7e11af5d", "DetectTime": "2023-10-30T14:12:57.871171+02:00", "EventTime": "2023-10-30T14:12:57.871182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cr4gY52d5DkEAUoIre"]} -{"Format": "IDEA0", "ID": "b03c1251-2d8a-481f-954e-7dd71c9a0ac9", "DetectTime": "2023-10-30T14:12:57.888611+02:00", "EventTime": "2023-10-30T14:12:57.888623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cz5XGK1UidwcjMVBZj"]} -{"Format": "IDEA0", "ID": "5d1392c3-9a5f-416a-9a37-f60f0e990854", "DetectTime": "2023-10-30T14:12:57.905743+02:00", "EventTime": "2023-10-30T14:12:57.905757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CWjj9GqXlsAR52JQ1"]} -{"Format": "IDEA0", "ID": "7e502cf2-8460-4b7b-951f-beebaa4e6a99", "DetectTime": "2023-10-30T14:12:57.922212+02:00", "EventTime": "2023-10-30T14:12:57.922229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cp2Ibt3ndDPngggVjf"]} -{"Format": "IDEA0", "ID": "1dc1c02f-78a6-4587-9867-734021337562", "DetectTime": "2023-10-30T14:12:57.940530+02:00", "EventTime": "2023-10-30T14:12:57.940543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cgkp8r2TaLw4VY92tf"]} -{"Format": "IDEA0", "ID": "2d9bd944-50a0-416d-bcf6-94896bdb16f9", "DetectTime": "2023-10-30T14:12:57.959381+02:00", "EventTime": "2023-10-30T14:12:57.959404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CTNTwT23M4EBL6XnSl"]} -{"Format": "IDEA0", "ID": "aef390b9-93ad-40f5-a8ea-a18bda46085d", "DetectTime": "2023-10-30T14:12:57.976060+02:00", "EventTime": "2023-10-30T14:12:57.976071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgdNHg4ebO2Rvkyuo4"]} -{"Format": "IDEA0", "ID": "0df39087-a377-4085-95d8-09419410a6a2", "DetectTime": "2023-10-30T14:12:57.993076+02:00", "EventTime": "2023-10-30T14:12:57.993087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CIujXVHztszteyVwj"]} -{"Format": "IDEA0", "ID": "2987cea3-8892-4e45-a2c5-d4133a1f6e30", "DetectTime": "2023-10-30T14:12:58.010668+02:00", "EventTime": "2023-10-30T14:12:58.010686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CQTOhq4CGjRTHquGrj"]} -{"Format": "IDEA0", "ID": "e5e55a3f-d9a1-48ea-baaa-b386d62d8494", "DetectTime": "2023-10-30T14:12:58.039385+02:00", "EventTime": "2023-10-30T14:12:58.039401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CooYb72WIA1JRuHPxa"]} -{"Format": "IDEA0", "ID": "6b785e31-70e7-49b0-a572-fdf0032e6c31", "DetectTime": "2023-10-30T14:12:58.057746+02:00", "EventTime": "2023-10-30T14:12:58.057757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cq67He1nQ5pXLIvG4"]} -{"Format": "IDEA0", "ID": "ee8c6b6a-bcdb-47ee-b8e4-c4487e4be631", "DetectTime": "2023-10-30T14:12:58.075356+02:00", "EventTime": "2023-10-30T14:12:58.075376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXngRq1s2iV2UphGXl"]} -{"Format": "IDEA0", "ID": "92b9922a-809c-4b81-8e99-bc4b917d7cdc", "DetectTime": "2023-10-30T14:12:58.094322+02:00", "EventTime": "2023-10-30T14:12:58.094335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3Wbsb23USq7yYSdFc"]} -{"Format": "IDEA0", "ID": "44ac900b-e1e3-4a7f-805d-f5a94bc9c731", "DetectTime": "2023-10-30T14:12:58.111690+02:00", "EventTime": "2023-10-30T14:12:58.111705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CSYIBG2VVxbTpUlAOe"]} -{"Format": "IDEA0", "ID": "cb2d2f21-1677-4faa-bdf2-2815db0d0a84", "DetectTime": "2023-10-30T14:12:58.127652+02:00", "EventTime": "2023-10-30T14:12:58.127668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CZgBYh4wMDrE7UmQl9"]} -{"Format": "IDEA0", "ID": "295ad41c-cba1-4aa2-b495-0bad390c7c08", "DetectTime": "2023-10-30T14:12:58.142639+02:00", "EventTime": "2023-10-30T14:12:58.142655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cq4ARpr0XXOEHNYX"]} -{"Format": "IDEA0", "ID": "6411ae8f-b896-452a-8e7b-9c4b2003bf46", "DetectTime": "2023-10-30T14:12:58.165913+02:00", "EventTime": "2023-10-30T14:12:58.165928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Ces0iE24Z4WKoUoaF9"]} -{"Format": "IDEA0", "ID": "ee39f5c6-3439-43aa-94e0-dea8b2e9dba8", "DetectTime": "2023-10-30T14:12:58.184294+02:00", "EventTime": "2023-10-30T14:12:58.184304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CD0dhH3BzayIabkNse"]} -{"Format": "IDEA0", "ID": "6b58d2d7-2c0d-433e-bfe4-f32bab8527e3", "DetectTime": "2023-10-30T14:12:58.216302+02:00", "EventTime": "2023-10-30T14:12:58.216317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CQAtGM1byDKSNEU1vj"]} -{"Format": "IDEA0", "ID": "b7e18667-039f-4f73-a8b8-223991d836c6", "DetectTime": "2023-10-30T14:12:58.235282+02:00", "EventTime": "2023-10-30T14:12:58.235297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C0PWcLWc065b5uRkc"]} -{"Format": "IDEA0", "ID": "17ad5e3e-683b-47a5-8914-5cbebc42a1be", "DetectTime": "2023-10-30T14:12:58.253288+02:00", "EventTime": "2023-10-30T14:12:58.253298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CsNWSj337FcmHCGEjd"]} -{"Format": "IDEA0", "ID": "d8f7931f-7691-4667-bd10-176234c13db1", "DetectTime": "2023-10-30T14:12:58.271439+02:00", "EventTime": "2023-10-30T14:12:58.271454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Ck7jkF1IKhbMwxTnF9"]} -{"Format": "IDEA0", "ID": "a8159c24-fabd-4986-8ed3-b288bc5b5678", "DetectTime": "2023-10-30T14:12:58.290338+02:00", "EventTime": "2023-10-30T14:12:58.290353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cr7qar2IiVQISR84Jg"]} -{"Format": "IDEA0", "ID": "c8e94c36-e569-40a1-9d36-7dcdd375edf0", "DetectTime": "2023-10-30T14:12:58.306001+02:00", "EventTime": "2023-10-30T14:12:58.306014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CAe4rh2PI0GpK6ghof"]} -{"Format": "IDEA0", "ID": "d724949f-1695-43da-8293-19a17db78021", "DetectTime": "2023-10-30T14:12:58.323523+02:00", "EventTime": "2023-10-30T14:12:58.323541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cx5xGn4oXTKeFFYq2"]} -{"Format": "IDEA0", "ID": "7970df44-127f-4d8f-a0f7-b050fac090da", "DetectTime": "2023-10-30T14:12:58.342573+02:00", "EventTime": "2023-10-30T14:12:58.342589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CR9zlT3y3ShEjbkwv6"]} -{"Format": "IDEA0", "ID": "70bad9aa-3824-41b4-a0fc-9c4a443a0c1f", "DetectTime": "2023-10-30T14:12:58.361090+02:00", "EventTime": "2023-10-30T14:12:58.361107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CIaOi91tC8P9vyuxJ4"]} -{"Format": "IDEA0", "ID": "0c8e3355-c1a8-4421-abe4-ee6fa1859f6d", "DetectTime": "2023-10-30T14:12:58.378827+02:00", "EventTime": "2023-10-30T14:12:58.378858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CWXWd016cFOlquApm3"]} -{"Format": "IDEA0", "ID": "2ae8f146-a255-4877-a9c5-b23efc0b3d52", "DetectTime": "2023-10-30T14:12:58.409580+02:00", "EventTime": "2023-10-30T14:12:58.409596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CgvdWq1EH12YEFwBjh"]} -{"Format": "IDEA0", "ID": "1c6954e5-34d2-4815-8081-26ff7f4e80d3", "DetectTime": "2023-10-30T14:12:58.429176+02:00", "EventTime": "2023-10-30T14:12:58.429194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJElrL2OHSBP0V2nXe"]} -{"Format": "IDEA0", "ID": "cba1d04f-fca5-4bae-afc6-2ebd3ffb0092", "DetectTime": "2023-10-30T14:12:58.448475+02:00", "EventTime": "2023-10-30T14:12:58.448490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CSIfr612rTXIbuJ4Lh"]} -{"Format": "IDEA0", "ID": "b3044008-3543-4e26-b21b-3a458ebbf9a2", "DetectTime": "2023-10-30T14:12:58.465537+02:00", "EventTime": "2023-10-30T14:12:58.465555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C1UsEC1PYNGEJaWjQi"]} -{"Format": "IDEA0", "ID": "61e5a79d-2cd3-40ad-839d-9a23e8b25193", "DetectTime": "2023-10-30T14:12:58.483667+02:00", "EventTime": "2023-10-30T14:12:58.483679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXnjSNlvoz3wa9Al2"]} -{"Format": "IDEA0", "ID": "096e0120-9d1e-4992-aab5-3040a0b5515c", "DetectTime": "2023-10-30T14:12:58.501130+02:00", "EventTime": "2023-10-30T14:12:58.501151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CHy42p46v2zDaNJN3h"]} -{"Format": "IDEA0", "ID": "53d5947b-7b52-4ff1-ad33-135b562706af", "DetectTime": "2023-10-30T14:12:58.520550+02:00", "EventTime": "2023-10-30T14:12:58.520565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CCz9rn1AutZ9cWeobk"]} -{"Format": "IDEA0", "ID": "3e2a3293-955a-430a-8b9b-105e99c1871b", "DetectTime": "2023-10-30T14:12:58.538638+02:00", "EventTime": "2023-10-30T14:12:58.538657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CT1TVd42O1QjLRZe4l"]} -{"Format": "IDEA0", "ID": "8650caa3-3c97-41d6-af50-43290a13196d", "DetectTime": "2023-10-30T14:12:58.557037+02:00", "EventTime": "2023-10-30T14:12:58.557052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CbvY4QjmTo4tHHmgh"]} -{"Format": "IDEA0", "ID": "6f57e435-9314-4183-b6dd-198f8f019038", "DetectTime": "2023-10-30T14:12:58.573572+02:00", "EventTime": "2023-10-30T14:12:58.573587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CgMW8W3AjlwkD3FcSg"]} -{"Format": "IDEA0", "ID": "97b8dcc1-879b-47f5-a0db-a3fb09fb295e", "DetectTime": "2023-10-30T14:12:58.590448+02:00", "EventTime": "2023-10-30T14:12:58.590468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CSWJ6j1yfsEhXqIUKe"]} -{"Format": "IDEA0", "ID": "a598edb4-a951-4cb6-a501-f127d121de9e", "DetectTime": "2023-10-30T14:12:58.609545+02:00", "EventTime": "2023-10-30T14:12:58.609557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CAj55l3kOXdfil1Pj1"]} -{"Format": "IDEA0", "ID": "135fd051-0bcd-49c0-906f-520da5beda72", "DetectTime": "2023-10-30T14:12:58.636889+02:00", "EventTime": "2023-10-30T14:12:58.636901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CUdvoj4KC4C0HMUg7b"]} -{"Format": "IDEA0", "ID": "00630dcb-5813-4d28-9274-273dd58af585", "DetectTime": "2023-10-30T14:12:58.653277+02:00", "EventTime": "2023-10-30T14:12:58.653292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.191.140.101 ", "ContentType": "text/plain"}], "uids": ["CRSWc823tkBuA7aqF2"]} -{"Format": "IDEA0", "ID": "caad03a4-0c5b-4a8f-baea-74f9f3b120fb", "DetectTime": "2023-10-30T14:12:58.670758+02:00", "EventTime": "2023-10-30T14:12:58.670771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CMjAEA2l1eIWMZ1dzf"]} -{"Format": "IDEA0", "ID": "bc4903e4-674a-4999-a5af-4d23b6b74e42", "DetectTime": "2023-10-30T14:12:58.686689+02:00", "EventTime": "2023-10-30T14:12:58.686702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CQ91ur4CphMVwnMzq6"]} -{"Format": "IDEA0", "ID": "0bb15455-30ea-479b-ac9f-b4422b1457a6", "DetectTime": "2023-10-30T14:12:58.704230+02:00", "EventTime": "2023-10-30T14:12:58.704241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CNmzOfdi2unWPTaT9"]} -{"Format": "IDEA0", "ID": "bbf8d817-718c-4c4d-a9c7-6dea0d1144f1", "DetectTime": "2023-10-30T14:12:58.719144+02:00", "EventTime": "2023-10-30T14:12:58.719162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CYig2D2CZuTLzS5nL8"]} -{"Format": "IDEA0", "ID": "8629a322-d774-4ffa-a032-04243e5b4b07", "DetectTime": "2023-10-30T14:12:58.736952+02:00", "EventTime": "2023-10-30T14:12:58.736968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CBEjqm1hyeyi0BizBf"]} -{"Format": "IDEA0", "ID": "860fb64a-f2c2-4ec7-8510-2a800f6bcaf0", "DetectTime": "2023-10-30T14:12:58.752509+02:00", "EventTime": "2023-10-30T14:12:58.752525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["COaKOf40JeSe8K0Gnb"]} -{"Format": "IDEA0", "ID": "44e78b56-b4ea-42ea-9e0a-491bb2ceef7a", "DetectTime": "2023-10-30T14:12:58.767817+02:00", "EventTime": "2023-10-30T14:12:58.767828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C4GxX52ocjhlOP25wb"]} -{"Format": "IDEA0", "ID": "cd97ba39-bea8-4e23-b9dd-56fff1167e37", "DetectTime": "2023-10-30T14:12:58.783508+02:00", "EventTime": "2023-10-30T14:12:58.783524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbBX6CBbHnHFeVhK4"]} -{"Format": "IDEA0", "ID": "2329e7c0-e768-42ea-9b3a-f5825a4a5317", "DetectTime": "2023-10-30T14:12:58.809752+02:00", "EventTime": "2023-10-30T14:12:58.809768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Ct9R4r2lrm3Kbrc6Ih"]} -{"Format": "IDEA0", "ID": "d3b171b2-078b-4388-aaf0-51a374543da9", "DetectTime": "2023-10-30T14:12:58.826377+02:00", "EventTime": "2023-10-30T14:12:58.826390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cy033l35YHSaPexeH8"]} -{"Format": "IDEA0", "ID": "baba20c2-8049-4419-a4e0-90e33a213917", "DetectTime": "2023-10-30T14:12:58.844117+02:00", "EventTime": "2023-10-30T14:12:58.844135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cw5v2720AMnxh0YQD9"]} -{"Format": "IDEA0", "ID": "6f82ed2e-7c45-406a-9e6b-21a0421c7fa2", "DetectTime": "2023-10-30T14:12:58.860512+02:00", "EventTime": "2023-10-30T14:12:58.860530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cg60HO1E6yXVt8aQcd"]} -{"Format": "IDEA0", "ID": "8ddcb725-5432-4b66-acd1-4f244dd8d3b5", "DetectTime": "2023-10-30T14:12:58.877857+02:00", "EventTime": "2023-10-30T14:12:58.877884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CfE7ne30QsMGcEDN03"]} -{"Format": "IDEA0", "ID": "8c2846d5-f9f2-4dde-b43a-ac2d13fd339d", "DetectTime": "2023-10-30T14:12:58.897032+02:00", "EventTime": "2023-10-30T14:12:58.897043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CxMTFs4Psm3MOIoCDf"]} -{"Format": "IDEA0", "ID": "658f4d86-3866-4a58-a870-3e5673399d9d", "DetectTime": "2023-10-30T14:12:58.913954+02:00", "EventTime": "2023-10-30T14:12:58.913965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CBTZ3M1h8r3a9m6gy7"]} -{"Format": "IDEA0", "ID": "514eb547-e28a-4c93-b946-9fca31b88c28", "DetectTime": "2023-10-30T14:12:58.931317+02:00", "EventTime": "2023-10-30T14:12:58.931329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CbdBVt3H42d4hG0sR3"]} -{"Format": "IDEA0", "ID": "ab68b62c-efca-402a-9513-933879cc86f9", "DetectTime": "2023-10-30T14:12:58.946666+02:00", "EventTime": "2023-10-30T14:12:58.946683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CmyGvf42GImIYxGfQl"]} -{"Format": "IDEA0", "ID": "77a22579-d4b9-4f66-b3c5-5e758dd1a63d", "DetectTime": "2023-10-30T14:12:58.966127+02:00", "EventTime": "2023-10-30T14:12:58.966142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CczHMU2ru81g7wmnDk"]} -{"Format": "IDEA0", "ID": "6cb1d969-5358-44fd-82f8-42a69c234f33", "DetectTime": "2023-10-30T14:12:58.993391+02:00", "EventTime": "2023-10-30T14:12:58.993403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CMFSc021lZWcd36mz5"]} -{"Format": "IDEA0", "ID": "1203ae78-890f-4c3e-a380-a79b297279a6", "DetectTime": "2023-10-30T14:12:59.009745+02:00", "EventTime": "2023-10-30T14:12:59.009757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCV2jo3pCfNYKSONwk"]} -{"Format": "IDEA0", "ID": "d6f0fb81-6cde-41e6-96a4-b208d39eb448", "DetectTime": "2023-10-30T14:12:59.026546+02:00", "EventTime": "2023-10-30T14:12:59.026564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CsFKja1t0PNJcL8G11"]} -{"Format": "IDEA0", "ID": "669d5ffa-f13e-475b-a914-a34267e03c4f", "DetectTime": "2023-10-30T14:12:59.044230+02:00", "EventTime": "2023-10-30T14:12:59.044246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CPoDlH3nkBE7PWngw3"]} -{"Format": "IDEA0", "ID": "36b26488-3fc4-4b57-96ee-ee977b24c0a1", "DetectTime": "2023-10-30T14:12:59.061925+02:00", "EventTime": "2023-10-30T14:12:59.061937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CA9UUB1uei70SQYfLj"]} -{"Format": "IDEA0", "ID": "8943ebc3-6241-4a47-87f7-5e72f737d092", "DetectTime": "2023-10-30T14:12:59.080450+02:00", "EventTime": "2023-10-30T14:12:59.080466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CpDU3a4WE39AsysUw"]} -{"Format": "IDEA0", "ID": "443a64d7-68d8-4a01-9d94-a39f2a0b1272", "DetectTime": "2023-10-30T14:12:59.098385+02:00", "EventTime": "2023-10-30T14:12:59.098396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CokZ5j3HLYZtw4ezn8"]} -{"Format": "IDEA0", "ID": "87e41d29-7d9f-4f39-b2ce-8f040b017be6", "DetectTime": "2023-10-30T14:12:59.115355+02:00", "EventTime": "2023-10-30T14:12:59.115369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ch6dq03wvUUstVvUXd"]} -{"Format": "IDEA0", "ID": "7d6766a8-15c3-4547-83e8-19cee6ec2992", "DetectTime": "2023-10-30T14:12:59.131706+02:00", "EventTime": "2023-10-30T14:12:59.131719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["ChjF6m2NhAnrCx75l6"]} -{"Format": "IDEA0", "ID": "9313509a-4967-47c1-aed2-21463c08b68c", "DetectTime": "2023-10-30T14:12:59.151132+02:00", "EventTime": "2023-10-30T14:12:59.151151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CvBnOE1foxR0nrGzkl"]} -{"Format": "Json", "ID": "9313509a-4967-47c1-aed2-21463c08b68c", "DetectTime": "2023-10-30T14:12:59.151132+02:00", "EventTime": "2023-10-30T14:12:59.151151+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:31:43.402327+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:12:59.220508)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "62834f88-91b0-455a-8f17-706afd876c1a", "DetectTime": "2023-10-30T14:12:59.225903+02:00", "EventTime": "2023-10-30T14:12:59.225918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CLin1r4RhFH7SjWnA8"]} -{"Format": "IDEA0", "ID": "5923cff6-0a1b-4881-b18f-c821ce143026", "DetectTime": "2023-10-30T14:12:59.244805+02:00", "EventTime": "2023-10-30T14:12:59.244824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C7Cfef4t9WMGNeJGI4"]} -{"Format": "IDEA0", "ID": "22d46a1d-d1f4-4091-858d-0de21d034ae7", "DetectTime": "2023-10-30T14:12:59.264182+02:00", "EventTime": "2023-10-30T14:12:59.264199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CZVIQ42xWDodwS2kZd"]} -{"Format": "IDEA0", "ID": "348ec9d1-aed7-4451-843e-5c4d2bd27ce2", "DetectTime": "2023-10-30T14:12:59.282113+02:00", "EventTime": "2023-10-30T14:12:59.282139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CDdwGy2WRxmNFwr8C3"]} -{"Format": "IDEA0", "ID": "1a80f546-ce2f-4b56-a72c-1a1fed0e5728", "DetectTime": "2023-10-30T14:12:59.303017+02:00", "EventTime": "2023-10-30T14:12:59.303042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CKFCrJ1BizTYdskFU3"]} -{"Format": "IDEA0", "ID": "7a6407fb-bef7-46be-844c-7bf46f07e05f", "DetectTime": "2023-10-30T14:12:59.322161+02:00", "EventTime": "2023-10-30T14:12:59.322178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CvqjyxoaFVH6OZCLf"]} -{"Format": "IDEA0", "ID": "a2cbc213-fea7-4775-a5c2-e4c1e88a002f", "DetectTime": "2023-10-30T14:12:59.344025+02:00", "EventTime": "2023-10-30T14:12:59.344052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CJtPYOUpljRoGoYd2"]} -{"Format": "IDEA0", "ID": "73e3878c-4fd7-4335-bb12-230b010da540", "DetectTime": "2023-10-30T14:12:59.366059+02:00", "EventTime": "2023-10-30T14:12:59.366071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CI5x9A3eELrD0R0Nzg"]} -{"Format": "IDEA0", "ID": "7e8b7d94-6dba-470f-b6f3-a47063a00e82", "DetectTime": "2023-10-30T14:12:59.389673+02:00", "EventTime": "2023-10-30T14:12:59.389685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CW2lqb3Qycvh6i98El"]} -{"Format": "IDEA0", "ID": "3665c5e4-9e4e-46cc-bf50-8dfa5f5ba74c", "DetectTime": "2023-10-30T14:12:59.408111+02:00", "EventTime": "2023-10-30T14:12:59.408126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CpgaLl1akqzyuR06s1"]} -{"Format": "IDEA0", "ID": "f7a5662d-d176-440b-be48-8a91d9e53da4", "DetectTime": "2023-10-30T14:12:59.424915+02:00", "EventTime": "2023-10-30T14:12:59.424934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CqDd3m3YtsSCqqOFN4"]} -{"Format": "IDEA0", "ID": "d537df12-5e8c-423c-97d0-7cea71b0381c", "DetectTime": "2023-10-30T14:12:59.442946+02:00", "EventTime": "2023-10-30T14:12:59.442964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C90kzO2McKALQ2GfY9"]} -{"Format": "IDEA0", "ID": "826d359f-3188-4144-b318-47e9d8abe6cb", "DetectTime": "2023-10-30T14:12:59.459267+02:00", "EventTime": "2023-10-30T14:12:59.459280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CtCqZE2GftHcj00ZAf"]} -{"Format": "IDEA0", "ID": "71312a38-7480-43ea-bd0f-784faa099edd", "DetectTime": "2023-10-30T14:12:59.477202+02:00", "EventTime": "2023-10-30T14:12:59.477219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CLO3bn4xmcMBQ1bRj3"]} -{"Format": "IDEA0", "ID": "0f484d64-4f17-4d0f-ad2d-e22964a37815", "DetectTime": "2023-10-30T14:12:59.496196+02:00", "EventTime": "2023-10-30T14:12:59.496209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CZmLhC3DClDz08vlZ2"]} -{"Format": "IDEA0", "ID": "a77ff7ba-5dc1-4354-8af9-beaf0541ab96", "DetectTime": "2023-10-30T14:12:59.514435+02:00", "EventTime": "2023-10-30T14:12:59.514447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CpWwb12LHNDUl5Klr2"]} -{"Format": "IDEA0", "ID": "b6a7fa5f-ab81-4396-81c3-ba3fa6d10052", "DetectTime": "2023-10-30T14:12:59.535729+02:00", "EventTime": "2023-10-30T14:12:59.535744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CugFQZ1IcFGfTnSngi"]} -{"Format": "IDEA0", "ID": "e7a66fd9-733f-4ed4-99a7-697d6510521d", "DetectTime": "2023-10-30T14:12:59.554392+02:00", "EventTime": "2023-10-30T14:12:59.554418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cv6mex1gvio6sNm67e"]} -{"Format": "IDEA0", "ID": "7f813a90-9b3d-4eba-84b4-80d81dc08407", "DetectTime": "2023-10-30T14:12:59.574255+02:00", "EventTime": "2023-10-30T14:12:59.574269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["ClwFRN3MFwJ8u2xA51"]} -{"Format": "IDEA0", "ID": "5e66fe55-846d-4dc1-8cec-35d5593b67df", "DetectTime": "2023-10-30T14:12:59.595025+02:00", "EventTime": "2023-10-30T14:12:59.595050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUdQcJ1BdIj5ZiuiH5"]} -{"Format": "IDEA0", "ID": "8316e106-78f9-4742-b30b-dad309e6aa59", "DetectTime": "2023-10-30T14:12:59.624417+02:00", "EventTime": "2023-10-30T14:12:59.624428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CcnN6M3rWmcNgin285"]} -{"Format": "IDEA0", "ID": "45c48a7f-0bf3-4492-9285-10948cc17a91", "DetectTime": "2023-10-30T14:12:59.645627+02:00", "EventTime": "2023-10-30T14:12:59.645641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CAP9Pj4U890laydQu4"]} -{"Format": "IDEA0", "ID": "8e63f165-a30b-4cbd-8114-a7f281e36b2a", "DetectTime": "2023-10-30T14:12:59.667135+02:00", "EventTime": "2023-10-30T14:12:59.667151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CLNXuB1Z0lkLCYt0L6"]} -{"Format": "IDEA0", "ID": "9d5caa9e-dd6e-43df-8657-ecc713ab1c48", "DetectTime": "2023-10-30T14:12:59.686759+02:00", "EventTime": "2023-10-30T14:12:59.686772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CaIesr387C9oQGu9G4"]} -{"Format": "IDEA0", "ID": "7218a441-b182-49b8-857a-1bbbae75bc9a", "DetectTime": "2023-10-30T14:12:59.705908+02:00", "EventTime": "2023-10-30T14:12:59.705929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CDwbdl4rRDaWIGr14c"]} -{"Format": "IDEA0", "ID": "e8fe9230-4378-48d7-b326-c9a832b32f09", "DetectTime": "2023-10-30T14:12:59.726477+02:00", "EventTime": "2023-10-30T14:12:59.726495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7LZZh4m3wRPjcflnl"]} -{"Format": "IDEA0", "ID": "528655f7-7f07-4c81-9495-f3d575d5b52b", "DetectTime": "2023-10-30T14:12:59.747365+02:00", "EventTime": "2023-10-30T14:12:59.747384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C3RJbJij9pJd37SK5"]} -{"Format": "IDEA0", "ID": "e26d09c0-a294-4c78-837e-d61eacd08785", "DetectTime": "2023-10-30T14:12:59.768934+02:00", "EventTime": "2023-10-30T14:12:59.768947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CJ96Kj2w8ES95tA47c"]} -{"Format": "IDEA0", "ID": "808d9290-91ef-4854-a15e-392985beccff", "DetectTime": "2023-10-30T14:12:59.785960+02:00", "EventTime": "2023-10-30T14:12:59.785979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CElefC36X7DqwN7rJ7"]} -{"Format": "IDEA0", "ID": "9b9f13c9-f36b-4047-bdc7-b7df903ccf2a", "DetectTime": "2023-10-30T14:12:59.805061+02:00", "EventTime": "2023-10-30T14:12:59.805073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cnf4ZVipVcK2Fq1u4"]} -{"Format": "IDEA0", "ID": "6abd17e9-223b-47f8-b7e2-600f66a80a82", "DetectTime": "2023-10-30T14:12:59.833322+02:00", "EventTime": "2023-10-30T14:12:59.833338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["ClzPt22yjfqSbV0x6g"]} -{"Format": "IDEA0", "ID": "485e9123-b904-4af2-9005-f644ab6c94a0", "DetectTime": "2023-10-30T14:12:59.854061+02:00", "EventTime": "2023-10-30T14:12:59.854078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CPLji72i8DKRBrxFI7"]} -{"Format": "IDEA0", "ID": "0db0dcc4-df7f-413a-a588-c0b13d7cb879", "DetectTime": "2023-10-30T14:12:59.873592+02:00", "EventTime": "2023-10-30T14:12:59.873609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Clrcfs3SLb3d01lP2j"]} -{"Format": "IDEA0", "ID": "b871a9ed-851f-4274-90eb-6ac1418adac9", "DetectTime": "2023-10-30T14:12:59.892413+02:00", "EventTime": "2023-10-30T14:12:59.892431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C4QInN30covXaxGvD2"]} -{"Format": "IDEA0", "ID": "621a5b51-7a27-4189-a71c-3097929353f9", "DetectTime": "2023-10-30T14:12:59.911413+02:00", "EventTime": "2023-10-30T14:12:59.911425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CmxuQi1dA9BNsas4J8"]} -{"Format": "IDEA0", "ID": "25ff1787-4374-4756-b649-d635e14cd74d", "DetectTime": "2023-10-30T14:12:59.931572+02:00", "EventTime": "2023-10-30T14:12:59.931588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLjeEj31hmgSG94fG4"]} -{"Format": "IDEA0", "ID": "052cd8ea-c007-4401-99e4-e7d86102b1a6", "DetectTime": "2023-10-30T14:12:59.952600+02:00", "EventTime": "2023-10-30T14:12:59.952615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CWZVEm4hpp9xZl0Ixd"]} -{"Format": "IDEA0", "ID": "09b551c3-3410-4f99-ab31-244a9031d6eb", "DetectTime": "2023-10-30T14:12:59.982528+02:00", "EventTime": "2023-10-30T14:12:59.982544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CBc9yy1N37dsCv6Bi"]} -{"Format": "IDEA0", "ID": "ea84776c-eca0-4a35-8be1-511d150d79a4", "DetectTime": "2023-10-30T14:13:00.004809+02:00", "EventTime": "2023-10-30T14:13:00.004828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsJslv3MAkvfX4rNu6"]} -{"Format": "IDEA0", "ID": "a3a8990d-cfba-496a-8e2c-df20d3793027", "DetectTime": "2023-10-30T14:13:00.023770+02:00", "EventTime": "2023-10-30T14:13:00.023787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CcNuRa2stbzvBRw2F2"]} -{"Format": "IDEA0", "ID": "39eae80b-af2d-4d3e-866b-6771200d19a2", "DetectTime": "2023-10-30T14:13:00.043212+02:00", "EventTime": "2023-10-30T14:13:00.043230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CAxIsq23FJOffhU5nj"]} -{"Format": "IDEA0", "ID": "210444ca-c643-4dc7-b242-c1d4bd0783cb", "DetectTime": "2023-10-30T14:13:00.062313+02:00", "EventTime": "2023-10-30T14:13:00.062329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6ugBb4YmVO64zkBp3"]} -{"Format": "IDEA0", "ID": "7e7bcd5a-012e-4a23-ab23-74044d4667db", "DetectTime": "2023-10-30T14:13:00.081293+02:00", "EventTime": "2023-10-30T14:13:00.081311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cb4z261eOCGJChYIs7"]} -{"Format": "IDEA0", "ID": "eeb00188-59b9-40f3-b578-7903faa9f46f", "DetectTime": "2023-10-30T14:13:00.100295+02:00", "EventTime": "2023-10-30T14:13:00.100306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CYF7MM3UpZyozPQOs4"]} -{"Format": "IDEA0", "ID": "a16e7438-dee0-46df-b07c-2501e6f0b9c7", "DetectTime": "2023-10-30T14:13:00.129311+02:00", "EventTime": "2023-10-30T14:13:00.129327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CUdKIt2pwypdxh1PR9"]} -{"Format": "IDEA0", "ID": "43c48926-088b-46ce-87a9-a89ea34052b0", "DetectTime": "2023-10-30T14:13:00.150632+02:00", "EventTime": "2023-10-30T14:13:00.150647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CHKbrU9GLMy3maPU7"]} -{"Format": "IDEA0", "ID": "bacd01ee-400c-43ed-bc77-0943cf4615ae", "DetectTime": "2023-10-30T14:13:00.173870+02:00", "EventTime": "2023-10-30T14:13:00.173884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CzSysC4cM9wWqMiqTh"]} -{"Format": "IDEA0", "ID": "8a90bf21-5b09-4db0-b0d7-e958bbca9be0", "DetectTime": "2023-10-30T14:13:00.193692+02:00", "EventTime": "2023-10-30T14:13:00.193702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ciu8IF3UBrKEQHEiji"]} -{"Format": "IDEA0", "ID": "a91bbc01-a0a2-420b-b647-b65b43982c85", "DetectTime": "2023-10-30T14:13:00.212216+02:00", "EventTime": "2023-10-30T14:13:00.212232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVLrkY15n8GnnBeWvc"]} -{"Format": "IDEA0", "ID": "16e2c635-b2c0-498c-8a1a-50692b05ad34", "DetectTime": "2023-10-30T14:13:00.231668+02:00", "EventTime": "2023-10-30T14:13:00.231680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJVIkI3n2TmJdXvmb5"]} -{"Format": "IDEA0", "ID": "dc1983a0-dc6b-4540-a761-22b38d2ded77", "DetectTime": "2023-10-30T14:13:00.259795+02:00", "EventTime": "2023-10-30T14:13:00.259812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ckr8fT2PsJmyYamAe7"]} -{"Format": "IDEA0", "ID": "44aad825-37f4-48d6-a21c-e805159179ec", "DetectTime": "2023-10-30T14:13:00.279135+02:00", "EventTime": "2023-10-30T14:13:00.279148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cv4P8IzlYjfj4N34"]} -{"Format": "IDEA0", "ID": "4813081b-7a2f-4683-a626-c7986330efb1", "DetectTime": "2023-10-30T14:13:00.297831+02:00", "EventTime": "2023-10-30T14:13:00.297849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C9OU3X3pZxx1HZ6Ppe"]} -{"Format": "IDEA0", "ID": "d70a3057-f6ce-495e-a2db-365980b5a4ed", "DetectTime": "2023-10-30T14:13:00.317866+02:00", "EventTime": "2023-10-30T14:13:00.317878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CK7wVoz3SlN96IdA4"]} -{"Format": "IDEA0", "ID": "291b58e5-566b-4d8d-8292-5c8555bc9d2b", "DetectTime": "2023-10-30T14:13:00.336520+02:00", "EventTime": "2023-10-30T14:13:00.336534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CYezLH2TF0DoNZfw8d"]} -{"Format": "IDEA0", "ID": "a385dd5a-1438-4c93-a6f0-3f323002740e", "DetectTime": "2023-10-30T14:13:00.353238+02:00", "EventTime": "2023-10-30T14:13:00.353251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXdyIM24XDn2acizib"]} -{"Format": "IDEA0", "ID": "280659ef-cb35-40af-b78d-dfeebf223c48", "DetectTime": "2023-10-30T14:13:00.375676+02:00", "EventTime": "2023-10-30T14:13:00.375704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CKA8a210CJW0s1agn1"]} -{"Format": "IDEA0", "ID": "7ed85efa-444a-44eb-bcdc-ad5058365896", "DetectTime": "2023-10-30T14:13:00.393809+02:00", "EventTime": "2023-10-30T14:13:00.393826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C8bBOR1PeLmuuDvwK6"]} -{"Format": "IDEA0", "ID": "c1e8d176-55ca-4b24-8c71-1890098f638a", "DetectTime": "2023-10-30T14:13:00.420235+02:00", "EventTime": "2023-10-30T14:13:00.420248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cz0onI2etQqu77CAzk"]} -{"Format": "IDEA0", "ID": "467072ca-06e2-4a8c-abd8-00e276cc39ba", "DetectTime": "2023-10-30T14:13:00.444108+02:00", "EventTime": "2023-10-30T14:13:00.444122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CHgFTo3Stn48g6xVA2"]} -{"Format": "IDEA0", "ID": "486f5fb4-7615-459c-a609-315580455d16", "DetectTime": "2023-10-30T14:13:00.463166+02:00", "EventTime": "2023-10-30T14:13:00.463178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C9F9wK2VhQNypBSglc"]} -{"Format": "IDEA0", "ID": "0e27f5ad-95ba-4d64-a1aa-b491ca0db3ec", "DetectTime": "2023-10-30T14:13:00.484275+02:00", "EventTime": "2023-10-30T14:13:00.484292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CmJ2pZ12U7lSRBXtd3"]} -{"Format": "Json", "ID": "0e27f5ad-95ba-4d64-a1aa-b491ca0db3ec", "DetectTime": "2023-10-30T14:13:00.484275+02:00", "EventTime": "2023-10-30T14:13:00.484292+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T00:31:45.107470+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2023/10/30 14:13:00.553130)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "275a51a2-d217-4ed6-afc1-0c9fe228edc4", "DetectTime": "2023-10-30T14:13:00.558541+02:00", "EventTime": "2023-10-30T14:13:00.558569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C99bGS3cWfGqiPxd1h"]} -{"Format": "IDEA0", "ID": "80aeb445-b509-47c1-b82a-bd2688c1fa6f", "DetectTime": "2023-10-30T14:13:00.582631+02:00", "EventTime": "2023-10-30T14:13:00.582644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CicyCB1Fx9WDkobkw1"]} -{"Format": "IDEA0", "ID": "f332b9ef-c05a-4bb6-ad5e-3809bad061d4", "DetectTime": "2023-10-30T14:13:00.603762+02:00", "EventTime": "2023-10-30T14:13:00.603779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUemub1kCXbnpXVaqk"]} -{"Format": "IDEA0", "ID": "c9f84232-f9a1-4803-a44b-87110ad2ae40", "DetectTime": "2023-10-30T14:13:00.622018+02:00", "EventTime": "2023-10-30T14:13:00.622055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgE5BDOU67RDSres3"]} -{"Format": "IDEA0", "ID": "72d4dd80-c225-421a-80f5-4150ce3bc4a0", "DetectTime": "2023-10-30T14:13:00.653643+02:00", "EventTime": "2023-10-30T14:13:00.653654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C68Z2D1DCSbO2fytW4"]} -{"Format": "IDEA0", "ID": "5639a199-90cc-44de-943f-ef876e765348", "DetectTime": "2023-10-30T14:13:00.673338+02:00", "EventTime": "2023-10-30T14:13:00.673360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C2uy3PRGjLI60MOgf"]} -{"Format": "IDEA0", "ID": "5a7a59ee-38c4-47c4-92e2-ed04330cd702", "DetectTime": "2023-10-30T14:13:00.705804+02:00", "EventTime": "2023-10-30T14:13:00.705820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["COLSEZ353kZqKdadi4"]} -{"Format": "IDEA0", "ID": "f148c783-e98e-4526-976a-2f6730d61d3e", "DetectTime": "2023-10-30T14:13:00.725349+02:00", "EventTime": "2023-10-30T14:13:00.725368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CcAZp42wIb9y9qhZr8"]} -{"Format": "IDEA0", "ID": "3129b7a8-dd6a-43e8-962b-eff2a658ad77", "DetectTime": "2023-10-30T14:13:00.746682+02:00", "EventTime": "2023-10-30T14:13:00.746694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C5dr2F3BrZB7jDWpf4"]} -{"Format": "IDEA0", "ID": "fac0baa0-22c9-406b-ac07-100feec32e00", "DetectTime": "2023-10-30T14:13:00.776813+02:00", "EventTime": "2023-10-30T14:13:00.776826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CHofBX3d5nLbikKO77"]} -{"Format": "IDEA0", "ID": "59d49b97-e3a8-4dda-bb96-da46b4b4b980", "DetectTime": "2023-10-30T14:13:00.793145+02:00", "EventTime": "2023-10-30T14:13:00.793158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C6IBfKrlQi0FhJsei"]} -{"Format": "IDEA0", "ID": "c49f031e-ea9a-4516-be41-99b1ffd804e3", "DetectTime": "2023-10-30T14:13:00.811832+02:00", "EventTime": "2023-10-30T14:13:00.811850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CNn61lYGtOC0wEDMa"]} -{"Format": "IDEA0", "ID": "177134d4-e403-48e9-8856-47527fb53e1f", "DetectTime": "2023-10-30T14:13:00.843558+02:00", "EventTime": "2023-10-30T14:13:00.843574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ClT3Uy34PMWjaO46M8"]} -{"Format": "IDEA0", "ID": "d246ef27-c5eb-4540-975b-666e5a55d9e3", "DetectTime": "2023-10-30T14:13:00.879792+02:00", "EventTime": "2023-10-30T14:13:00.879808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CtjTWI1x72WhOzOKyc"]} -{"Format": "IDEA0", "ID": "2bb6dd8b-a5ed-4662-80a2-d4f9f7faaefc", "DetectTime": "2023-10-30T14:13:00.910039+02:00", "EventTime": "2023-10-30T14:13:00.910052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgyPYQ3YOWRVo1zQa9"]} -{"Format": "IDEA0", "ID": "f15324e1-7054-42a9-81f7-a7702ef197d7", "DetectTime": "2023-10-30T14:13:00.926872+02:00", "EventTime": "2023-10-30T14:13:00.926894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CWp2JD2HA5dXmpu7fi"]} -{"Format": "IDEA0", "ID": "50340db0-3be7-4452-aa3d-bcb190feabf9", "DetectTime": "2023-10-30T14:13:00.958893+02:00", "EventTime": "2023-10-30T14:13:00.958905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C6UW2Z3lXLECUoXVk1"]} -{"Format": "IDEA0", "ID": "7dd9b018-baf6-47bb-9593-5e06e9f1e8be", "DetectTime": "2023-10-30T14:13:00.977011+02:00", "EventTime": "2023-10-30T14:13:00.977024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CXlfNn21IDmbbQD4E9"]} -{"Format": "Json", "ID": "7dd9b018-baf6-47bb-9593-5e06e9f1e8be", "DetectTime": "2023-10-30T14:13:00.977011+02:00", "EventTime": "2023-10-30T14:13:00.977024+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T01:02:12.360268+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2023/10/30 14:13:01.046559)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2b3709f9-16b7-49ce-aab5-250413881933", "DetectTime": "2023-10-30T14:13:01.051350+02:00", "EventTime": "2023-10-30T14:13:01.051362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKXpQ522FVIEQKTkb"]} -{"Format": "IDEA0", "ID": "d3be893a-0699-46e4-b90a-263451efbcb2", "DetectTime": "2023-10-30T14:13:01.086076+02:00", "EventTime": "2023-10-30T14:13:01.086088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cqjhzz148d9dfJmCs8"]} -{"Format": "IDEA0", "ID": "4f575de6-578f-4987-b566-780cc4b1b427", "DetectTime": "2023-10-30T14:13:01.105331+02:00", "EventTime": "2023-10-30T14:13:01.105348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CJMJI73JK6JDb2lxu5"]} -{"Format": "IDEA0", "ID": "555ebc7e-bccd-4f6f-a102-5ee26093f51c", "DetectTime": "2023-10-30T14:13:01.137454+02:00", "EventTime": "2023-10-30T14:13:01.137468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CxpeFh3DRcXIXMYpy"]} -{"Format": "IDEA0", "ID": "47c46563-13d2-4160-b756-17d3aca62920", "DetectTime": "2023-10-30T14:13:01.168904+02:00", "EventTime": "2023-10-30T14:13:01.168921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cw4Fga0zqyE1Xy5ac"]} -{"Format": "IDEA0", "ID": "295c16a2-0b29-43dd-8fee-bc316a85977f", "DetectTime": "2023-10-30T14:13:01.194545+02:00", "EventTime": "2023-10-30T14:13:01.194564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CobvEU1ju1aRy8Lqa1"]} -{"Format": "IDEA0", "ID": "8fe28a03-98a5-4e5b-8b79-e51926b56b52", "DetectTime": "2023-10-30T14:13:01.222758+02:00", "EventTime": "2023-10-30T14:13:01.222792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJRnQuBMcnFajqG14"]} -{"Format": "IDEA0", "ID": "4c7cae42-b976-40a1-83c8-9cfea03b560b", "DetectTime": "2023-10-30T14:13:01.250276+02:00", "EventTime": "2023-10-30T14:13:01.250292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C6OgKkxmk32QqUim3"]} -{"Format": "IDEA0", "ID": "0bc32598-626f-4b94-91ea-828af07c8e8d", "DetectTime": "2023-10-30T14:13:01.283817+02:00", "EventTime": "2023-10-30T14:13:01.283836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C93XCQ3dHVVJsZP5K5"]} -{"Format": "IDEA0", "ID": "d98c92d7-3937-439a-a4d4-38b821d0a125", "DetectTime": "2023-10-30T14:13:01.313517+02:00", "EventTime": "2023-10-30T14:13:01.313530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CRxk1OYQA5jAGsOci"]} -{"Format": "IDEA0", "ID": "b807969e-366d-4f1c-94dd-c9d61dd17297", "DetectTime": "2023-10-30T14:13:01.329999+02:00", "EventTime": "2023-10-30T14:13:01.330010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXRFzA2C2EcjmZVjo2"]} -{"Format": "Json", "ID": "b807969e-366d-4f1c-94dd-c9d61dd17297", "DetectTime": "2023-10-30T14:13:01.329999+02:00", "EventTime": "2023-10-30T14:13:01.330010+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T01:02:29.718453+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2023/10/30 14:13:01.400332)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8a1c9767-a818-464b-9719-900ce3614a70", "DetectTime": "2023-10-30T14:13:01.404712+02:00", "EventTime": "2023-10-30T14:13:01.404729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cl3WNH2ZLAkRTR4xmb"]} -{"Format": "IDEA0", "ID": "5e059a82-69d4-4075-8ba9-173e8c4e5f78", "DetectTime": "2023-10-30T14:13:01.430485+02:00", "EventTime": "2023-10-30T14:13:01.430495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CfctMc32gXLo0vhcci"]} -{"Format": "IDEA0", "ID": "4e008ff4-8ccb-4667-b054-5092436ea251", "DetectTime": "2023-10-30T14:13:01.457233+02:00", "EventTime": "2023-10-30T14:13:01.457249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CqDHJC1rx6NVH0KlQ"]} -{"Format": "IDEA0", "ID": "c99bfd4c-d7de-417e-9a6a-21f64192f4d5", "DetectTime": "2023-10-30T14:13:01.488577+02:00", "EventTime": "2023-10-30T14:13:01.488596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CIMw4C20q3e7rYEzE9"]} -{"Format": "IDEA0", "ID": "6bebf9fa-4486-44a9-9c09-cdae2337596a", "DetectTime": "2023-10-30T14:13:01.517283+02:00", "EventTime": "2023-10-30T14:13:01.517294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CiCdka2EY0dj8952z8"]} -{"Format": "IDEA0", "ID": "00f0345d-28e2-4c9c-945f-7a57b1f078c9", "DetectTime": "2023-10-30T14:13:01.536268+02:00", "EventTime": "2023-10-30T14:13:01.536293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ctr5mp1h4zx5YHw4M5"]} -{"Format": "IDEA0", "ID": "2780fd22-72fa-4619-93a4-c2c497a47175", "DetectTime": "2023-10-30T14:13:01.564684+02:00", "EventTime": "2023-10-30T14:13:01.564698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CdbGNC2L8LdMfPwHQ"]} -{"Format": "IDEA0", "ID": "31ea5f7f-ce1a-456f-a2e7-1673be7c37eb", "DetectTime": "2023-10-30T14:13:01.588848+02:00", "EventTime": "2023-10-30T14:13:01.588859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C3nVis1dPMhM037t1b"]} -{"Format": "IDEA0", "ID": "51ba6983-a58f-46c3-b786-ffd4a1e57668", "DetectTime": "2023-10-30T14:13:01.613931+02:00", "EventTime": "2023-10-30T14:13:01.613943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C0MMGB2Odecrqpjpn2"]} -{"Format": "Json", "ID": "51ba6983-a58f-46c3-b786-ffd4a1e57668", "DetectTime": "2023-10-30T14:13:01.613931+02:00", "EventTime": "2023-10-30T14:13:01.613943+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T01:02:31.720485+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2023/10/30 14:13:01.683058)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb5e2270-d5e0-4216-9865-9449888bf00b", "DetectTime": "2023-10-30T14:13:01.687710+02:00", "EventTime": "2023-10-30T14:13:01.687725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CDH5Pu16uWi085G2I9"]} -{"Format": "IDEA0", "ID": "83fe318b-07f5-4408-8c77-c4b55bbc71d5", "DetectTime": "2023-10-30T14:13:01.707282+02:00", "EventTime": "2023-10-30T14:13:01.707298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C6BraE31B4YS6NZRc7"]} -{"Format": "IDEA0", "ID": "5c09c96f-03fb-4ea0-a677-4a94d08d29e8", "DetectTime": "2023-10-30T14:13:01.733543+02:00", "EventTime": "2023-10-30T14:13:01.733565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CxwgOg3txHMVLdUhO8"]} -{"Format": "IDEA0", "ID": "c164da7f-ff62-4c82-bf76-3f0d74fe7926", "DetectTime": "2023-10-30T14:13:01.759001+02:00", "EventTime": "2023-10-30T14:13:01.759020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CguuOC1zHGHgNuSZSj"]} -{"Format": "IDEA0", "ID": "66b803e6-d178-4327-ae49-f7802bf59b51", "DetectTime": "2023-10-30T14:13:01.785377+02:00", "EventTime": "2023-10-30T14:13:01.785395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXfRKa29C7oLaG7Zpk"]} -{"Format": "IDEA0", "ID": "56585d0f-a3cd-444b-a51b-aa179ff7d8ba", "DetectTime": "2023-10-30T14:13:01.804012+02:00", "EventTime": "2023-10-30T14:13:01.804023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvKwmH1u4632HWexFh"]} -{"Format": "IDEA0", "ID": "41daac33-fd1c-40fc-886c-a44e68ab595d", "DetectTime": "2023-10-30T14:13:01.828328+02:00", "EventTime": "2023-10-30T14:13:01.828341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ClONdd3YrWOo3T6yye"]} -{"Format": "IDEA0", "ID": "0a3f3bf1-1e81-4368-a789-95d510f40ccd", "DetectTime": "2023-10-30T14:13:01.854498+02:00", "EventTime": "2023-10-30T14:13:01.854509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CdTDGR2cf7D3dutN6l"]} -{"Format": "IDEA0", "ID": "22ef9671-bd41-476e-92fc-e97db34a97b0", "DetectTime": "2023-10-30T14:13:01.880268+02:00", "EventTime": "2023-10-30T14:13:01.880279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CkC13E1rAgQUqabXul"]} -{"Format": "IDEA0", "ID": "5b408f60-3fe3-4139-a0d8-8c0d7a5a31df", "DetectTime": "2023-10-30T14:13:01.904650+02:00", "EventTime": "2023-10-30T14:13:01.904661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C8Ud5y5YyCbZOvRb"]} -{"Format": "IDEA0", "ID": "b462cebe-870f-47b0-83d2-7b8a93a3cdf4", "DetectTime": "2023-10-30T14:13:01.923076+02:00", "EventTime": "2023-10-30T14:13:01.923090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CedW5Z3NNfOeBXgLC9"]} -{"Format": "Json", "ID": "b462cebe-870f-47b0-83d2-7b8a93a3cdf4", "DetectTime": "2023-10-30T14:13:01.923076+02:00", "EventTime": "2023-10-30T14:13:01.923090+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T01:32:40.942656+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2023/10/30 14:13:01.987588)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "05988dbe-c52a-4dd5-91e2-1d9658093e3e", "DetectTime": "2023-10-30T14:13:01.992476+02:00", "EventTime": "2023-10-30T14:13:01.992494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C1I12T149mFoJV3nLc"]} -{"Format": "IDEA0", "ID": "25590f51-506f-4c6e-af3f-0ed501b9f47d", "DetectTime": "2023-10-30T14:13:02.016803+02:00", "EventTime": "2023-10-30T14:13:02.016816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CDa2FV9yiXbfgS9u1"]} -{"Format": "IDEA0", "ID": "e72f2baa-914d-4e70-b8f0-a41a4716282e", "DetectTime": "2023-10-30T14:13:02.040324+02:00", "EventTime": "2023-10-30T14:13:02.040344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["C9Dbh52wsQvEmuE3H6"]} -{"Format": "IDEA0", "ID": "7407d30d-bde9-4522-87fd-6dadaf16dd3d", "DetectTime": "2023-10-30T14:13:02.060171+02:00", "EventTime": "2023-10-30T14:13:02.060190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CSzvYvkCZtQs5lHf4"]} -{"Format": "IDEA0", "ID": "1958277e-9da6-442a-8aef-17403718e64b", "DetectTime": "2023-10-30T14:13:02.082600+02:00", "EventTime": "2023-10-30T14:13:02.082611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CVfKVd3WTQGPB6NUdj"]} -{"Format": "IDEA0", "ID": "0ffaa6bf-b003-4ba5-b9c7-35c3697c0357", "DetectTime": "2023-10-30T14:13:02.105681+02:00", "EventTime": "2023-10-30T14:13:02.105692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CNAQva4A7rcRmLRUKg"]} -{"Format": "IDEA0", "ID": "fb6d952d-4b3f-4d72-93cc-d1c4419aa6ca", "DetectTime": "2023-10-30T14:13:02.131458+02:00", "EventTime": "2023-10-30T14:13:02.131477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CUHoz3R2mVHtXH16f"]} -{"Format": "IDEA0", "ID": "dcb497ca-fdcc-4be4-b997-842df724946c", "DetectTime": "2023-10-30T14:13:02.158338+02:00", "EventTime": "2023-10-30T14:13:02.158354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4D29R2RjoJH1ugwkl"]} -{"Format": "IDEA0", "ID": "501c4da2-2c01-45d6-b002-bfd3eff9abc4", "DetectTime": "2023-10-30T14:13:02.184138+02:00", "EventTime": "2023-10-30T14:13:02.184157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CzV7YS3ImZs1UBmW3f"]} -{"Format": "Json", "ID": "501c4da2-2c01-45d6-b002-bfd3eff9abc4", "DetectTime": "2023-10-30T14:13:02.184138+02:00", "EventTime": "2023-10-30T14:13:02.184157+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T01:32:42.418967+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2023/10/30 14:13:02.254857)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "32ed924d-f168-44de-9a3a-67d563e471ed", "DetectTime": "2023-10-30T14:13:02.260288+02:00", "EventTime": "2023-10-30T14:13:02.260306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CxBZX24ZTRO8sh0rh1"]} -{"Format": "IDEA0", "ID": "9306ad3f-92b7-4d0d-b7a9-abe6281622a5", "DetectTime": "2023-10-30T14:13:02.282561+02:00", "EventTime": "2023-10-30T14:13:02.282575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CwA9Ow3YuscUmjMst7"]} -{"Format": "IDEA0", "ID": "21be693a-385c-4267-b713-4f726d08c104", "DetectTime": "2023-10-30T14:13:02.300709+02:00", "EventTime": "2023-10-30T14:13:02.300720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CnvLwoTgXRsnA1I66"]} -{"Format": "IDEA0", "ID": "6e2a16d4-93e3-4dab-939e-69afc6ee2425", "DetectTime": "2023-10-30T14:13:02.323671+02:00", "EventTime": "2023-10-30T14:13:02.323695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CCnR0c3yH28oXMVlK5"]} -{"Format": "IDEA0", "ID": "b20d9f43-c7c0-4d89-ab48-c8ac1401c180", "DetectTime": "2023-10-30T14:13:02.345817+02:00", "EventTime": "2023-10-30T14:13:02.345834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CW22R126TSgKWcyLs3"]} -{"Format": "IDEA0", "ID": "fcf8c643-c04b-41b6-baa7-ebc6c64b0422", "DetectTime": "2023-10-30T14:13:02.369220+02:00", "EventTime": "2023-10-30T14:13:02.369235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CwKsEM1CXOhYAmMo4c"]} -{"Format": "IDEA0", "ID": "3b3e5fd3-b61a-40b4-b1c3-7579a972c65e", "DetectTime": "2023-10-30T14:13:02.390404+02:00", "EventTime": "2023-10-30T14:13:02.390422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["ClNRrI2Uh2XLtaH8Rh"]} -{"Format": "IDEA0", "ID": "abdc2ff0-5ec6-4d5a-b7aa-81be26190ceb", "DetectTime": "2023-10-30T14:13:02.408782+02:00", "EventTime": "2023-10-30T14:13:02.408796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CstM1M3uCpuVHX2OEl"]} -{"Format": "IDEA0", "ID": "e760666c-a8f7-4bca-b352-a2de5c59cca7", "DetectTime": "2023-10-30T14:13:02.429799+02:00", "EventTime": "2023-10-30T14:13:02.429825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZnN3M3s4Zc9VOPx7d"]} -{"Format": "IDEA0", "ID": "630e4cf3-7a0a-4ef7-875c-1f2f7d709aae", "DetectTime": "2023-10-30T14:13:02.452924+02:00", "EventTime": "2023-10-30T14:13:02.452943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C9l91lBi8IRGwuEGc"]} -{"Format": "Json", "ID": "630e4cf3-7a0a-4ef7-875c-1f2f7d709aae", "DetectTime": "2023-10-30T14:13:02.452924+02:00", "EventTime": "2023-10-30T14:13:02.452943+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T01:32:44.385089+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2023/10/30 14:13:02.519867)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "37e660af-5db3-4da9-b7e7-c6b089738985", "DetectTime": "2023-10-30T14:13:02.525289+02:00", "EventTime": "2023-10-30T14:13:02.525305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CxGtw71PyU7IrvG5Ze"]} -{"Format": "IDEA0", "ID": "99a001ce-42e5-4d76-8d5e-7baaefc2c174", "DetectTime": "2023-10-30T14:13:02.545990+02:00", "EventTime": "2023-10-30T14:13:02.546009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C6gm9L2veTVPW7Wld3"]} -{"Format": "IDEA0", "ID": "cb14b72b-1162-4c0b-8ce6-85d2fe471b22", "DetectTime": "2023-10-30T14:13:02.564113+02:00", "EventTime": "2023-10-30T14:13:02.564124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C41xQm1bpVvwj77zK8"]} -{"Format": "IDEA0", "ID": "6925117d-c6e7-40b7-8ac5-b4d39ee8fdc7", "DetectTime": "2023-10-30T14:13:02.581976+02:00", "EventTime": "2023-10-30T14:13:02.581990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CxTuqh1J0EleTZJNK7"]} -{"Format": "IDEA0", "ID": "889e90fa-2581-45a2-883f-55cfdf1f061b", "DetectTime": "2023-10-30T14:13:02.601171+02:00", "EventTime": "2023-10-30T14:13:02.601181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CvPET44YyACYhF7srl"]} -{"Format": "IDEA0", "ID": "23a5daec-b131-473e-ac75-6b3cb2e66ce2", "DetectTime": "2023-10-30T14:13:02.618289+02:00", "EventTime": "2023-10-30T14:13:02.618301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CTjxV34pnEoOyRP2V3"]} -{"Format": "IDEA0", "ID": "8cfa7277-1d8c-4643-ba7b-277d4d75abcf", "DetectTime": "2023-10-30T14:13:02.636512+02:00", "EventTime": "2023-10-30T14:13:02.636531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CZy0JN2u4Ax1kValUj"]} -{"Format": "IDEA0", "ID": "d32360ba-ff84-4ce1-93d3-1498e776baa7", "DetectTime": "2023-10-30T14:13:02.655722+02:00", "EventTime": "2023-10-30T14:13:02.655735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CrUon71oJjNNP1oju9"]} -{"Format": "IDEA0", "ID": "2142adcf-3410-4319-8f98-77cafa6c9372", "DetectTime": "2023-10-30T14:13:02.675604+02:00", "EventTime": "2023-10-30T14:13:02.675615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CU1zQ94hYHAG2Uw3v4"]} -{"Format": "IDEA0", "ID": "c32360f3-62ad-456b-8ac5-dfefc26c31be", "DetectTime": "2023-10-30T14:13:02.704801+02:00", "EventTime": "2023-10-30T14:13:02.704815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CIqprX1OvPxNxGPn8f"]} -{"Format": "IDEA0", "ID": "d3670aa7-6d19-42df-b2ab-1d56e0c34bdb", "DetectTime": "2023-10-30T14:13:02.735152+02:00", "EventTime": "2023-10-30T14:13:02.735167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Ctsups2951yMvYYUrd"]} -{"Format": "IDEA0", "ID": "ec5aa77b-81b4-45a2-872e-0bccf80117f5", "DetectTime": "2023-10-30T14:13:02.766473+02:00", "EventTime": "2023-10-30T14:13:02.766489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Ct82j03haSulXxRND2"]} -{"Format": "IDEA0", "ID": "6b889b6b-f7c0-4432-9d0d-1d060f93ea2f", "DetectTime": "2023-10-30T14:13:02.802207+02:00", "EventTime": "2023-10-30T14:13:02.802219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CtIWOd3PATlTK3a1ti"]} -{"Format": "IDEA0", "ID": "e5b8f1fd-6a20-4f30-a2a9-4717c6456468", "DetectTime": "2023-10-30T14:13:02.821293+02:00", "EventTime": "2023-10-30T14:13:02.821304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cj7rHd2WV0b6JGQfu8"]} -{"Format": "IDEA0", "ID": "ecdcf43c-7663-46e5-a6e4-37c7a271b3f9", "DetectTime": "2023-10-30T14:13:02.854467+02:00", "EventTime": "2023-10-30T14:13:02.854484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CZzgXo4Hu48ASQcpxj"]} -{"Format": "IDEA0", "ID": "d0575dad-506b-454e-9eb8-a516057a1c1c", "DetectTime": "2023-10-30T14:13:02.890216+02:00", "EventTime": "2023-10-30T14:13:02.890228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. ", "ContentType": "text/plain"}], "uids": ["CbzJl71Yj3qN1l7xvb"]} -{"Format": "Json", "ID": "d0575dad-506b-454e-9eb8-a516057a1c1c", "DetectTime": "2023-10-30T14:13:02.890216+02:00", "EventTime": "2023-10-30T14:13:02.890228+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:03:03.738839+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:02.978103)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1d863b9e-1b7f-4a05-ba48-e0d5cb8f0bdc", "DetectTime": "2023-10-30T14:13:02.982626+02:00", "EventTime": "2023-10-30T14:13:02.982637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIutw44GPiwZrZafhg"]} -{"Format": "IDEA0", "ID": "ec1358f2-d03a-47d6-a7d1-f399fd66eebd", "DetectTime": "2023-10-30T14:13:03.006856+02:00", "EventTime": "2023-10-30T14:13:03.006868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CgX8WlWeofP3IJLc4"]} -{"Format": "IDEA0", "ID": "3c294247-6c3e-4783-b350-8c27d6068987", "DetectTime": "2023-10-30T14:13:03.032867+02:00", "EventTime": "2023-10-30T14:13:03.032887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CmwyYXBXQ7E4Q3md1"]} -{"Format": "IDEA0", "ID": "7c78d8a6-e2db-41e7-b42f-9b172678a65a", "DetectTime": "2023-10-30T14:13:03.062530+02:00", "EventTime": "2023-10-30T14:13:03.062553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["ChyX8i1ysn5qQ6dQQi"]} -{"Format": "IDEA0", "ID": "7f4895d1-65c8-4e57-ba0c-b54b32156ef5", "DetectTime": "2023-10-30T14:13:03.089299+02:00", "EventTime": "2023-10-30T14:13:03.089314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJxrm63hqk7yfNkD1"]} -{"Format": "IDEA0", "ID": "5277a2fa-8a8c-43df-b495-07fa436b3f72", "DetectTime": "2023-10-30T14:13:03.119124+02:00", "EventTime": "2023-10-30T14:13:03.119135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CxWTGF1WDoaMfhmXMf"]} -{"Format": "IDEA0", "ID": "3c9af813-08ba-4994-bdc4-65822b926cb6", "DetectTime": "2023-10-30T14:13:03.139105+02:00", "EventTime": "2023-10-30T14:13:03.139125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CR4bH53h4s0hjWat"]} -{"Format": "IDEA0", "ID": "5df9055b-e58a-4eb2-b6bc-f3420d0f5da6", "DetectTime": "2023-10-30T14:13:03.165925+02:00", "EventTime": "2023-10-30T14:13:03.165942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CqHBFr2l5jM5O6Uog6"]} -{"Format": "IDEA0", "ID": "ae82839a-872a-451e-833f-f9e1861c7127", "DetectTime": "2023-10-30T14:13:03.200527+02:00", "EventTime": "2023-10-30T14:13:03.200543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cf5moY2MVq9yNPlkx6"]} -{"Format": "Json", "ID": "ae82839a-872a-451e-833f-f9e1861c7127", "DetectTime": "2023-10-30T14:13:03.200527+02:00", "EventTime": "2023-10-30T14:13:03.200543+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:03:05.146243+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:03.269614)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "20118ad6-f4ff-4ed5-b59d-3c3321ee8426", "DetectTime": "2023-10-30T14:13:03.274586+02:00", "EventTime": "2023-10-30T14:13:03.274614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CqnNLA2U2ZtTkgaPWe"]} -{"Format": "IDEA0", "ID": "d84a71e7-d995-4eda-8e0a-9402b1baf4a4", "DetectTime": "2023-10-30T14:13:03.302433+02:00", "EventTime": "2023-10-30T14:13:03.302449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CxOorG2jAnw29sR5ab"]} -{"Format": "IDEA0", "ID": "8ca07279-07b0-4991-ae9f-81d9c41b31ff", "DetectTime": "2023-10-30T14:13:03.329603+02:00", "EventTime": "2023-10-30T14:13:03.329618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Coss6A2lCsnT4UeZg1"]} -{"Format": "IDEA0", "ID": "d2520a92-851a-42d9-81a3-9067d9dda074", "DetectTime": "2023-10-30T14:13:03.354957+02:00", "EventTime": "2023-10-30T14:13:03.354973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cc3or335hwPiBhRZFj"]} -{"Format": "IDEA0", "ID": "247f4d01-07c9-49a8-bf8a-2e5741d2d5f8", "DetectTime": "2023-10-30T14:13:03.380862+02:00", "EventTime": "2023-10-30T14:13:03.380878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CBpAhb4J6PDbXO8Zsf"]} -{"Format": "IDEA0", "ID": "d7f49471-0224-4b63-9733-3a29fd1bf81a", "DetectTime": "2023-10-30T14:13:03.405643+02:00", "EventTime": "2023-10-30T14:13:03.405654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CF46BTbCGzd3vl2si"]} -{"Format": "IDEA0", "ID": "47f638cb-a3f7-47df-9393-afe3f0b5a0a7", "DetectTime": "2023-10-30T14:13:03.425344+02:00", "EventTime": "2023-10-30T14:13:03.425356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CP6HzHKOoNFa083wd"]} -{"Format": "IDEA0", "ID": "5ee492cc-ac81-42e1-a8cf-7f85975a11ad", "DetectTime": "2023-10-30T14:13:03.451409+02:00", "EventTime": "2023-10-30T14:13:03.451422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C3ei2z4DX57EHAtgK4"]} -{"Format": "IDEA0", "ID": "694ceeec-6ff5-4fbc-9bc0-28a3d29df357", "DetectTime": "2023-10-30T14:13:03.480664+02:00", "EventTime": "2023-10-30T14:13:03.480680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CIdb6Z3BBm4txTQ2i5"]} -{"Format": "Json", "ID": "694ceeec-6ff5-4fbc-9bc0-28a3d29df357", "DetectTime": "2023-10-30T14:13:03.480664+02:00", "EventTime": "2023-10-30T14:13:03.480680+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:03:07.502787+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:03.551055)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "465d65ea-6b98-4411-a1d1-3d101b4b396a", "DetectTime": "2023-10-30T14:13:03.556105+02:00", "EventTime": "2023-10-30T14:13:03.556122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CvCaku4o826LEqyxy3"]} -{"Format": "IDEA0", "ID": "adf66d0e-cbc3-4618-9ccf-efe70bef1702", "DetectTime": "2023-10-30T14:13:03.580168+02:00", "EventTime": "2023-10-30T14:13:03.580180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CdKIJd2dfOVmPUFdHg"]} -{"Format": "IDEA0", "ID": "4b6db885-c6a5-4762-9d0d-be2ea646ffa3", "DetectTime": "2023-10-30T14:13:03.605606+02:00", "EventTime": "2023-10-30T14:13:03.605627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CFhEhLkjX8qqNlTp5"]} -{"Format": "IDEA0", "ID": "826e9716-217c-4d02-b68a-508df7508810", "DetectTime": "2023-10-30T14:13:03.630643+02:00", "EventTime": "2023-10-30T14:13:03.630659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CwuRyCu9Tvh3zMLq9"]} -{"Format": "IDEA0", "ID": "a118d266-4caa-43b2-b92d-ac2495d57fc5", "DetectTime": "2023-10-30T14:13:03.654489+02:00", "EventTime": "2023-10-30T14:13:03.654501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CeaBvL3AXK4FpPuTc1"]} -{"Format": "IDEA0", "ID": "6e93e168-3079-4476-9b34-348b00c73a9b", "DetectTime": "2023-10-30T14:13:03.672318+02:00", "EventTime": "2023-10-30T14:13:03.672335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cz6k4e3BnZGcQdzJx2"]} -{"Format": "IDEA0", "ID": "7cf7ffd9-cc41-4cf3-ac35-bc3104e95383", "DetectTime": "2023-10-30T14:13:03.698470+02:00", "EventTime": "2023-10-30T14:13:03.698486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ctbftd2K5Kc8WLzyDg"]} -{"Format": "IDEA0", "ID": "2a72c703-5da0-4ac7-9aa7-8a2f966c59ba", "DetectTime": "2023-10-30T14:13:03.720651+02:00", "EventTime": "2023-10-30T14:13:03.720662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CKQ9cu2VHssoyJIh"]} -{"Format": "IDEA0", "ID": "13e3ab14-8e13-4ae7-b8ef-2f30bed09754", "DetectTime": "2023-10-30T14:13:03.744366+02:00", "EventTime": "2023-10-30T14:13:03.744383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C9hWLG5do4yomFRff"]} -{"Format": "IDEA0", "ID": "ffb35dfb-442c-484c-9d60-4ee4fc5c3aba", "DetectTime": "2023-10-30T14:13:03.764663+02:00", "EventTime": "2023-10-30T14:13:03.764687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CylHJ53VBXKRUCMtua"]} -{"Format": "Json", "ID": "ffb35dfb-442c-484c-9d60-4ee4fc5c3aba", "DetectTime": "2023-10-30T14:13:03.764663+02:00", "EventTime": "2023-10-30T14:13:03.764687+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:33:19.480126+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:03.831412)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ce1702b4-3f3a-4117-bf10-f7d362c9f7f9", "DetectTime": "2023-10-30T14:13:03.836753+02:00", "EventTime": "2023-10-30T14:13:03.836769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CJoD0L2NJq3WhRLbQ3"]} -{"Format": "IDEA0", "ID": "27b478c1-1f0b-4d8f-84d9-e97b713e031c", "DetectTime": "2023-10-30T14:13:03.861458+02:00", "EventTime": "2023-10-30T14:13:03.861471+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CXqm4o9ygOXRIiQ2j"]} -{"Format": "IDEA0", "ID": "75d32c80-5817-431e-9895-6ba74f6bedb2", "DetectTime": "2023-10-30T14:13:03.885613+02:00", "EventTime": "2023-10-30T14:13:03.885630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["COMjGd8ul1qEzn7s5"]} -{"Format": "IDEA0", "ID": "fc2c212e-e9a3-4ee3-b668-e1ea680e6b2f", "DetectTime": "2023-10-30T14:13:03.908055+02:00", "EventTime": "2023-10-30T14:13:03.908082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C7Xd2Y11QOUbxNqpm4"]} -{"Format": "IDEA0", "ID": "b9685b31-ce78-4610-bbdb-ba2689ee5402", "DetectTime": "2023-10-30T14:13:03.928528+02:00", "EventTime": "2023-10-30T14:13:03.928545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CKi2Cx4KzV5ODyjZug"]} -{"Format": "IDEA0", "ID": "c1ac10c0-cffb-4839-b412-8ae145c1a7e4", "DetectTime": "2023-10-30T14:13:03.946055+02:00", "EventTime": "2023-10-30T14:13:03.946066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CGk75r2s7ZEs69GaW"]} -{"Format": "IDEA0", "ID": "b8789f54-ce7e-42a4-abf5-f91afa7baa71", "DetectTime": "2023-10-30T14:13:03.968550+02:00", "EventTime": "2023-10-30T14:13:03.968566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cc2VAs3dD8tSlbuL21"]} -{"Format": "IDEA0", "ID": "dfc3c8e2-bda7-4ac2-b3df-3138826a41d9", "DetectTime": "2023-10-30T14:13:03.990622+02:00", "EventTime": "2023-10-30T14:13:03.990638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CDJpBh1ZvIi5RkgInl"]} -{"Format": "IDEA0", "ID": "f1b2163b-0d0f-48f6-8e6b-5f42a9229a9e", "DetectTime": "2023-10-30T14:13:04.008039+02:00", "EventTime": "2023-10-30T14:13:04.008057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Ce1fbn1Orq7gJqkeD2"]} -{"Format": "IDEA0", "ID": "39473af5-bcae-4bd4-bd79-3205af84fd6b", "DetectTime": "2023-10-30T14:13:04.029991+02:00", "EventTime": "2023-10-30T14:13:04.030010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CDVZiB1TmPQa9bhbG3"]} -{"Format": "IDEA0", "ID": "c4883eaf-ed4b-461c-b694-4b3106cfc55a", "DetectTime": "2023-10-30T14:13:04.047099+02:00", "EventTime": "2023-10-30T14:13:04.047112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cf275k3NHY23lGtV13"]} -{"Format": "Json", "ID": "c4883eaf-ed4b-461c-b694-4b3106cfc55a", "DetectTime": "2023-10-30T14:13:04.047099+02:00", "EventTime": "2023-10-30T14:13:04.047112+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:33:48.440490+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:04.108881)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b8a41cd-fb90-47ea-89dd-b9ab0f96d73a", "DetectTime": "2023-10-30T14:13:04.112703+02:00", "EventTime": "2023-10-30T14:13:04.112713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cddjvb61dyY9CqmNh"]} -{"Format": "IDEA0", "ID": "190189c2-19b0-49f1-84ca-0a2c67a46888", "DetectTime": "2023-10-30T14:13:04.131675+02:00", "EventTime": "2023-10-30T14:13:04.131689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Ctj53ZvTMIaETKQel"]} -{"Format": "IDEA0", "ID": "ccaa6da8-eebd-41ae-b73e-832ae9e28c9f", "DetectTime": "2023-10-30T14:13:04.150211+02:00", "EventTime": "2023-10-30T14:13:04.150226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CV3wHj1ADtZevrmnOj"]} -{"Format": "IDEA0", "ID": "1089a932-f2be-43c6-b3b2-6eeb51c739ca", "DetectTime": "2023-10-30T14:13:04.168882+02:00", "EventTime": "2023-10-30T14:13:04.168900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cr17Q12xYMLU6G7eQc"]} -{"Format": "IDEA0", "ID": "ead742f8-7baa-466a-88ad-8b55d2ea89bb", "DetectTime": "2023-10-30T14:13:04.187576+02:00", "EventTime": "2023-10-30T14:13:04.187592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CLNQHB4dYyRiSAc449"]} -{"Format": "IDEA0", "ID": "ae8eeda3-94bd-4274-b484-1f609e5b56b8", "DetectTime": "2023-10-30T14:13:04.205743+02:00", "EventTime": "2023-10-30T14:13:04.205755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C390EP21D0UV5ebn8"]} -{"Format": "IDEA0", "ID": "83ae3264-4230-424f-98b6-0568cc6cc21c", "DetectTime": "2023-10-30T14:13:04.225907+02:00", "EventTime": "2023-10-30T14:13:04.225921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CC3T8u4hgl29rmOWM8"]} -{"Format": "IDEA0", "ID": "6432ff1b-5172-46b3-9d8b-8ded5ad90328", "DetectTime": "2023-10-30T14:13:04.245657+02:00", "EventTime": "2023-10-30T14:13:04.245673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["COxzBP3IpnzsiaZPSj"]} -{"Format": "IDEA0", "ID": "ff445481-19a7-4815-96f1-94178ebf42b6", "DetectTime": "2023-10-30T14:13:04.267656+02:00", "EventTime": "2023-10-30T14:13:04.267677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["ChfjOT2N9jX9NeRnh3"]} -{"Format": "IDEA0", "ID": "00c462a5-15d2-479c-ae30-6639fbab3bcd", "DetectTime": "2023-10-30T14:13:04.284290+02:00", "EventTime": "2023-10-30T14:13:04.284302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CB2VZ93h638y5ESWtb"]} -{"Format": "IDEA0", "ID": "792cb3e6-5b4e-45d4-a09a-010ed422d031", "DetectTime": "2023-10-30T14:13:04.303192+02:00", "EventTime": "2023-10-30T14:13:04.303205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPvjAg2mZkBIb554k7"]} -{"Format": "IDEA0", "ID": "39dd1211-9083-4d6d-b062-868c95c76a6e", "DetectTime": "2023-10-30T14:13:04.321991+02:00", "EventTime": "2023-10-30T14:13:04.322004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CAoum92IQ2tOCd3DY3"]} -{"Format": "IDEA0", "ID": "e846b83e-2924-42bd-b655-109df84f28e1", "DetectTime": "2023-10-30T14:13:04.344700+02:00", "EventTime": "2023-10-30T14:13:04.344727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CQphYu3jezxPRLqyW6"]} -{"Format": "IDEA0", "ID": "26a70e6f-c6c3-4452-a212-f5884e3369dd", "DetectTime": "2023-10-30T14:13:04.366143+02:00", "EventTime": "2023-10-30T14:13:04.366156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CuSjPOILz2UnP0qy8"]} -{"Format": "Json", "ID": "26a70e6f-c6c3-4452-a212-f5884e3369dd", "DetectTime": "2023-10-30T14:13:04.366143+02:00", "EventTime": "2023-10-30T14:13:04.366156+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:33:58.062578+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:04.430380)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "347c106e-2023-460e-bbfe-123fb7af0e79", "DetectTime": "2023-10-30T14:13:04.435275+02:00", "EventTime": "2023-10-30T14:13:04.435291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CSEKdE25KFgFVmqcn9"]} -{"Format": "IDEA0", "ID": "84eaec2b-2345-4ec4-ad36-52205580a991", "DetectTime": "2023-10-30T14:13:04.453940+02:00", "EventTime": "2023-10-30T14:13:04.453956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CVX6922CVQIOPq6TL7"]} -{"Format": "IDEA0", "ID": "2f5a9d75-42e6-4f13-acd3-6df2af7bf35e", "DetectTime": "2023-10-30T14:13:04.471152+02:00", "EventTime": "2023-10-30T14:13:04.471164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C3PymuQMwCb8Rb08l"]} -{"Format": "IDEA0", "ID": "dad72d65-63fb-4c75-82fe-ad779cbff1c7", "DetectTime": "2023-10-30T14:13:04.489071+02:00", "EventTime": "2023-10-30T14:13:04.489084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CntazNgVvwm98VhQ9"]} -{"Format": "IDEA0", "ID": "83b03868-e0df-41a5-809f-edc0ab885513", "DetectTime": "2023-10-30T14:13:04.506880+02:00", "EventTime": "2023-10-30T14:13:04.506894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CkmPWNnei0vvxnCzd"]} -{"Format": "IDEA0", "ID": "721a1f10-7e0a-4248-a803-7e7dd7f66b75", "DetectTime": "2023-10-30T14:13:04.521803+02:00", "EventTime": "2023-10-30T14:13:04.521825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CRf1j13s2LCXXhdebd"]} -{"Format": "IDEA0", "ID": "51086c71-4dfa-4622-9836-b1676df235ce", "DetectTime": "2023-10-30T14:13:04.538151+02:00", "EventTime": "2023-10-30T14:13:04.538168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CULHno17h3Cmw5hjzb"]} -{"Format": "IDEA0", "ID": "44c73dfb-5989-4b12-8966-d408fc791a3e", "DetectTime": "2023-10-30T14:13:04.553689+02:00", "EventTime": "2023-10-30T14:13:04.553701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CuWScr1ZAZBiLNHh2k"]} -{"Format": "IDEA0", "ID": "67bdb280-f1fa-4879-b6fa-56ccafa2bba0", "DetectTime": "2023-10-30T14:13:04.569598+02:00", "EventTime": "2023-10-30T14:13:04.569609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CDTPk44SowbpQbtYpb"]} -{"Format": "Json", "ID": "67bdb280-f1fa-4879-b6fa-56ccafa2bba0", "DetectTime": "2023-10-30T14:13:04.569598+02:00", "EventTime": "2023-10-30T14:13:04.569609+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T02:34:09.239891+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2023/10/30 14:13:04.627262)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eda1069f-b628-4a03-bb86-4f72ea1b36ce", "DetectTime": "2023-10-30T14:13:04.631676+02:00", "EventTime": "2023-10-30T14:13:04.631686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkB92Z2Ff1lucjrSe"]} -{"Format": "IDEA0", "ID": "5dcf02e3-2505-4ec5-be5c-323356cb0429", "DetectTime": "2023-10-30T14:13:04.661090+02:00", "EventTime": "2023-10-30T14:13:04.661113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxLHbZ17whK3usREr3"]} -{"Format": "IDEA0", "ID": "d31c1847-930b-4045-a263-2ea161fc34c0", "DetectTime": "2023-10-30T14:13:04.684419+02:00", "EventTime": "2023-10-30T14:13:04.684430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CW8lz4tclgLJwPDFg"]} -{"Format": "IDEA0", "ID": "b89ef311-7daf-41fc-950d-bf5d85140008", "DetectTime": "2023-10-30T14:13:04.712898+02:00", "EventTime": "2023-10-30T14:13:04.712910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CZIe4AwYJHidPsif2"]} -{"Format": "IDEA0", "ID": "ed4a02f3-dc40-40a6-b6ac-7d3f432f3074", "DetectTime": "2023-10-30T14:13:04.739340+02:00", "EventTime": "2023-10-30T14:13:04.739352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CKZxms4Vn8X0JZtkud"]} -{"Format": "IDEA0", "ID": "0ae891e8-f0ab-458c-b3a7-2244acd5be90", "DetectTime": "2023-10-30T14:13:04.768226+02:00", "EventTime": "2023-10-30T14:13:04.768243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C0Vg6d2plMGQFhvE4b"]} -{"Format": "IDEA0", "ID": "d0e13740-b379-454b-a7a1-4aabe8a3e234", "DetectTime": "2023-10-30T14:13:04.793342+02:00", "EventTime": "2023-10-30T14:13:04.793358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C0IQJJ13dBl1ubULVc"]} -{"Format": "IDEA0", "ID": "6e7bfeac-cb37-4a4b-a565-210d51d183b3", "DetectTime": "2023-10-30T14:13:04.824275+02:00", "EventTime": "2023-10-30T14:13:04.824288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CUGhp01XaMaBUw5Ttb"]} -{"Format": "IDEA0", "ID": "6cb1206b-6d03-41c3-927a-df434af1dbf2", "DetectTime": "2023-10-30T14:13:04.854612+02:00", "EventTime": "2023-10-30T14:13:04.854629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CGzi1U1dB3ZszmEApg"]} -{"Format": "IDEA0", "ID": "e098a8bb-55ab-4337-b524-9e27aeecf618", "DetectTime": "2023-10-30T14:13:04.887242+02:00", "EventTime": "2023-10-30T14:13:04.887265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CY8laJYpwpw7ysf9f"]} -{"Format": "Json", "ID": "e098a8bb-55ab-4337-b524-9e27aeecf618", "DetectTime": "2023-10-30T14:13:04.887242+02:00", "EventTime": "2023-10-30T14:13:04.887265+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T03:04:50.307002+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2023/10/30 14:13:04.964386)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9548d49d-5073-42f8-bcdc-67f81e813d47", "DetectTime": "2023-10-30T14:13:04.969070+02:00", "EventTime": "2023-10-30T14:13:04.969083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C37yrc2vvOsdCHoIB7"]} -{"Format": "IDEA0", "ID": "4e914dc1-6ae3-459a-852b-b253e74f8fc3", "DetectTime": "2023-10-30T14:13:04.998355+02:00", "EventTime": "2023-10-30T14:13:04.998376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cr3c2tVR6dBde0jl"]} -{"Format": "IDEA0", "ID": "2a22c012-d4b5-48b3-8240-d297876d1f6c", "DetectTime": "2023-10-30T14:13:05.028179+02:00", "EventTime": "2023-10-30T14:13:05.028190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CQikvH2kjwGk4pjHtg"]} -{"Format": "IDEA0", "ID": "028e198e-c699-44ce-8fb8-32fe0c26ab03", "DetectTime": "2023-10-30T14:13:05.051723+02:00", "EventTime": "2023-10-30T14:13:05.051739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cmpfeq3QQx0YUdqHxg"]} -{"Format": "IDEA0", "ID": "307f5865-ae7d-4c92-9ca7-f58c862d70bf", "DetectTime": "2023-10-30T14:13:05.077478+02:00", "EventTime": "2023-10-30T14:13:05.077490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CoL4Pp3XxkpZcIISn8"]} -{"Format": "IDEA0", "ID": "817d683a-79b7-4609-838e-f1c3453ac8a0", "DetectTime": "2023-10-30T14:13:05.106525+02:00", "EventTime": "2023-10-30T14:13:05.106540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CvKXep39P6kcm1sSF"]} -{"Format": "IDEA0", "ID": "2c3e9ca6-f9bb-44ae-9772-f1366d44c0c8", "DetectTime": "2023-10-30T14:13:05.134708+02:00", "EventTime": "2023-10-30T14:13:05.134731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ciqrln1LVxwofRarfg"]} -{"Format": "IDEA0", "ID": "e978b0e8-b3f2-47a6-86a3-a5ca0b7475fa", "DetectTime": "2023-10-30T14:13:05.161705+02:00", "EventTime": "2023-10-30T14:13:05.161716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CruLie37E9hdujhds8"]} -{"Format": "IDEA0", "ID": "c99a054e-6bee-4124-a98f-7f85127261fa", "DetectTime": "2023-10-30T14:13:05.191103+02:00", "EventTime": "2023-10-30T14:13:05.191115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CwZbVE3hXx5ZKtk4B6"]} -{"Format": "Json", "ID": "c99a054e-6bee-4124-a98f-7f85127261fa", "DetectTime": "2023-10-30T14:13:05.191103+02:00", "EventTime": "2023-10-30T14:13:05.191115+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T03:04:57.773741+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2023/10/30 14:13:05.263678)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "904fcfc3-4297-4ce7-9fd6-1646c032cb12", "DetectTime": "2023-10-30T14:13:05.268219+02:00", "EventTime": "2023-10-30T14:13:05.268230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CmkQBH3ilxUeik8oPc"]} -{"Format": "IDEA0", "ID": "15a772d3-1287-455c-a859-aca2655235a6", "DetectTime": "2023-10-30T14:13:05.298058+02:00", "EventTime": "2023-10-30T14:13:05.298074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CTfnIb3grUZieadm2g"]} -{"Format": "IDEA0", "ID": "e99fa736-c2c7-4178-89d6-3e1b1c1f3894", "DetectTime": "2023-10-30T14:13:05.325443+02:00", "EventTime": "2023-10-30T14:13:05.325461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CNkt3m4JoIroR11Rp5"]} -{"Format": "IDEA0", "ID": "c5ff6f1d-2903-41f9-9ffe-f8d249958414", "DetectTime": "2023-10-30T14:13:05.348941+02:00", "EventTime": "2023-10-30T14:13:05.348953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C9c8bnOY1LFUc4n7k"]} -{"Format": "IDEA0", "ID": "99509be5-ceae-40fb-be6f-7158a2253ce5", "DetectTime": "2023-10-30T14:13:05.373270+02:00", "EventTime": "2023-10-30T14:13:05.373283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C6rZTf289Cxw1eIkF2"]} -{"Format": "IDEA0", "ID": "9190fded-5a4f-45bd-9180-948a5af94cdb", "DetectTime": "2023-10-30T14:13:05.397840+02:00", "EventTime": "2023-10-30T14:13:05.397856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CYyDmF3i4Ywo83gKE3"]} -{"Format": "IDEA0", "ID": "18c0b721-a188-40f1-afbf-c7a6e9cd7b71", "DetectTime": "2023-10-30T14:13:05.422680+02:00", "EventTime": "2023-10-30T14:13:05.422694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CsSDnr2wj5xmwns9Me"]} -{"Format": "IDEA0", "ID": "45b4de43-bf6a-48eb-b801-bd99cafe3d57", "DetectTime": "2023-10-30T14:13:05.446485+02:00", "EventTime": "2023-10-30T14:13:05.446498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CwVyEaIw8Khi3IRLd"]} -{"Format": "IDEA0", "ID": "0e8e8a99-7c46-43cf-905a-7ec9c53d09bd", "DetectTime": "2023-10-30T14:13:05.474903+02:00", "EventTime": "2023-10-30T14:13:05.474924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CtJ7qSgWxZTDXkgCg"]} -{"Format": "IDEA0", "ID": "140bbce9-d194-4d52-8cf0-5d898e669231", "DetectTime": "2023-10-30T14:13:05.498515+02:00", "EventTime": "2023-10-30T14:13:05.498534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CxpVWcIZirvER2Id4"]} -{"Format": "Json", "ID": "140bbce9-d194-4d52-8cf0-5d898e669231", "DetectTime": "2023-10-30T14:13:05.498515+02:00", "EventTime": "2023-10-30T14:13:05.498534+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T03:05:26.878860+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2023/10/30 14:13:05.563158)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1108ffd1-e7c5-43fb-a11c-ec2e9faf671a", "DetectTime": "2023-10-30T14:13:05.567783+02:00", "EventTime": "2023-10-30T14:13:05.567795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ChyQQw3ohtLwuiA6N5"]} -{"Format": "IDEA0", "ID": "2768cdd5-70fc-4c46-b651-9a8712b3d4a5", "DetectTime": "2023-10-30T14:13:05.592861+02:00", "EventTime": "2023-10-30T14:13:05.592885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Ctpos542JTwdCUx7l8"]} -{"Format": "IDEA0", "ID": "184e0d16-3559-4327-9950-7fd06c05c8fe", "DetectTime": "2023-10-30T14:13:05.617020+02:00", "EventTime": "2023-10-30T14:13:05.617036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CiQMRL1b6xsR4FcHAl"]} -{"Format": "IDEA0", "ID": "39f97726-fe5c-4183-a30f-008ccee43783", "DetectTime": "2023-10-30T14:13:05.646416+02:00", "EventTime": "2023-10-30T14:13:05.646428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CAfoLS2xOgQm3xQCwb"]} -{"Format": "IDEA0", "ID": "d2ac59e4-eb67-45d0-be4c-72b9672e0d30", "DetectTime": "2023-10-30T14:13:05.669238+02:00", "EventTime": "2023-10-30T14:13:05.669257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CAoHEq1B3kYa11dQpc"]} -{"Format": "IDEA0", "ID": "62d50199-e9dc-4362-974e-7d3acf49b70f", "DetectTime": "2023-10-30T14:13:05.694215+02:00", "EventTime": "2023-10-30T14:13:05.694227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CPAzVD3L5gQZkuhxEg"]} -{"Format": "IDEA0", "ID": "acebd643-921d-4b66-8e78-96fd1c38aabc", "DetectTime": "2023-10-30T14:13:05.717871+02:00", "EventTime": "2023-10-30T14:13:05.717882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Ck8Yxf3kjmApkqLoF2"]} -{"Format": "IDEA0", "ID": "bb6259da-8372-4493-a03d-5e437625f7ff", "DetectTime": "2023-10-30T14:13:05.741395+02:00", "EventTime": "2023-10-30T14:13:05.741421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4EwSM2vyN0XoTxZwc"]} -{"Format": "IDEA0", "ID": "e1649785-9434-4415-8b51-2e2927187251", "DetectTime": "2023-10-30T14:13:05.764069+02:00", "EventTime": "2023-10-30T14:13:05.764080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CMj51a4PgkBVk6lF13"]} -{"Format": "IDEA0", "ID": "030d7e82-f5fe-45c2-bc45-c3b6e398579c", "DetectTime": "2023-10-30T14:13:05.787486+02:00", "EventTime": "2023-10-30T14:13:05.787502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CnygQB2Uy0ZOk212d"]} -{"Format": "Json", "ID": "030d7e82-f5fe-45c2-bc45-c3b6e398579c", "DetectTime": "2023-10-30T14:13:05.787486+02:00", "EventTime": "2023-10-30T14:13:05.787502+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T03:35:44.355976+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2023/10/30 14:13:05.852209)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f2d7be5a-6602-4a15-ab42-5efabc76d359", "DetectTime": "2023-10-30T14:13:05.857339+02:00", "EventTime": "2023-10-30T14:13:05.857358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CshIGz2gZd7XkGaVe8"]} -{"Format": "IDEA0", "ID": "5f89052f-3dce-4180-8e19-daaf86adcad9", "DetectTime": "2023-10-30T14:13:05.879900+02:00", "EventTime": "2023-10-30T14:13:05.879917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CWjoZjDqOV2zqo1E7"]} -{"Format": "IDEA0", "ID": "733bb63e-b91b-49fb-a861-dc9ab8d085e9", "DetectTime": "2023-10-30T14:13:05.903126+02:00", "EventTime": "2023-10-30T14:13:05.903143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cjb1ZF3yCYfvh30As9"]} -{"Format": "IDEA0", "ID": "fa2f85c2-215a-462a-86a2-549f4ef65458", "DetectTime": "2023-10-30T14:13:05.925975+02:00", "EventTime": "2023-10-30T14:13:05.925991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CctcSXVvqVgH6Er56"]} -{"Format": "IDEA0", "ID": "93902df9-f99f-44b2-aad1-42227380a865", "DetectTime": "2023-10-30T14:13:05.947119+02:00", "EventTime": "2023-10-30T14:13:05.947138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CttICi3uHdcRXhKhz"]} -{"Format": "IDEA0", "ID": "07d08dee-8658-494c-bd09-1652415e42dd", "DetectTime": "2023-10-30T14:13:05.969602+02:00", "EventTime": "2023-10-30T14:13:05.969612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C3GKP223nmYXvo5Eu1"]} -{"Format": "IDEA0", "ID": "0609e05d-edf7-4f5a-94c3-bb10b04d4df7", "DetectTime": "2023-10-30T14:13:05.991743+02:00", "EventTime": "2023-10-30T14:13:05.991762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C3EcIxiYTUsS8JT21"]} -{"Format": "IDEA0", "ID": "acc02a12-8da3-477c-a5ad-0040df698653", "DetectTime": "2023-10-30T14:13:06.008725+02:00", "EventTime": "2023-10-30T14:13:06.008736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CErfAZtxcOJ4WV2Wc"]} -{"Format": "IDEA0", "ID": "8fbcec6f-a59b-42fa-bdc0-2b72812ec27a", "DetectTime": "2023-10-30T14:13:06.024405+02:00", "EventTime": "2023-10-30T14:13:06.024421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["COWqhm1wpI0EkQB3Aa"]} -{"Format": "Json", "ID": "8fbcec6f-a59b-42fa-bdc0-2b72812ec27a", "DetectTime": "2023-10-30T14:13:06.024405+02:00", "EventTime": "2023-10-30T14:13:06.024421+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T03:35:53.833333+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2023/10/30 14:13:06.084691)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3a22b464-2473-4fca-b512-e1353fe5a2e7", "DetectTime": "2023-10-30T14:13:06.089645+02:00", "EventTime": "2023-10-30T14:13:06.089662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C2VD1d1fudxTPqNawc"]} -{"Format": "IDEA0", "ID": "c2eca7e5-364f-4492-b69a-bcdfff0da60a", "DetectTime": "2023-10-30T14:13:06.107967+02:00", "EventTime": "2023-10-30T14:13:06.107984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CAVZHGmkZu5CqNSHf"]} -{"Format": "IDEA0", "ID": "68b03eea-9b79-4774-8bec-90da034e98c3", "DetectTime": "2023-10-30T14:13:06.132272+02:00", "EventTime": "2023-10-30T14:13:06.132288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZEpO617mV41UWnywk"]} -{"Format": "IDEA0", "ID": "687a991f-d1e4-4906-b5df-90687683d46a", "DetectTime": "2023-10-30T14:13:06.153726+02:00", "EventTime": "2023-10-30T14:13:06.153745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbF2QdvRuLUYU8LOi"]} -{"Format": "IDEA0", "ID": "8192f634-69ae-4e5c-8676-abc69ab7f83b", "DetectTime": "2023-10-30T14:13:06.172276+02:00", "EventTime": "2023-10-30T14:13:06.172292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CEdZvv2SYbQOdABwZ7"]} -{"Format": "IDEA0", "ID": "0bf56213-89b2-4509-a1f1-2f37751dbe80", "DetectTime": "2023-10-30T14:13:06.191715+02:00", "EventTime": "2023-10-30T14:13:06.191735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCWebq25guBOhgeK1"]} -{"Format": "IDEA0", "ID": "fa875516-259d-42d0-9b28-e14944ed8400", "DetectTime": "2023-10-30T14:13:06.212915+02:00", "EventTime": "2023-10-30T14:13:06.212933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C9UhKW2ulqYIwj0DX8"]} -{"Format": "IDEA0", "ID": "d0e6d803-00cc-49b4-925e-031b8539f3ec", "DetectTime": "2023-10-30T14:13:06.236089+02:00", "EventTime": "2023-10-30T14:13:06.236099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ch7ukH14ZrqQ4Te138"]} -{"Format": "IDEA0", "ID": "713107a3-7c17-4485-b472-716dd7fecd8e", "DetectTime": "2023-10-30T14:13:06.257127+02:00", "EventTime": "2023-10-30T14:13:06.257150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CCf9fC46PnzhSVAn7"]} -{"Format": "IDEA0", "ID": "a8deb2fd-d2d5-42f6-a2d5-66fdfc1e92a4", "DetectTime": "2023-10-30T14:13:06.283243+02:00", "EventTime": "2023-10-30T14:13:06.283260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C1fuYy4U45iFCDsxWe"]} -{"Format": "Json", "ID": "a8deb2fd-d2d5-42f6-a2d5-66fdfc1e92a4", "DetectTime": "2023-10-30T14:13:06.283243+02:00", "EventTime": "2023-10-30T14:13:06.283260+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T03:36:01.605781+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2023/10/30 14:13:06.346419)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "057224c9-c9fb-4fae-b732-a63410abef1c", "DetectTime": "2023-10-30T14:13:06.350665+02:00", "EventTime": "2023-10-30T14:13:06.350676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CBSqUa3rrDpp2Zyfue"]} -{"Format": "IDEA0", "ID": "3ad1429c-49e5-49e1-879d-f404174a5396", "DetectTime": "2023-10-30T14:13:06.369251+02:00", "EventTime": "2023-10-30T14:13:06.369267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cnagvp4ajJ70ysfhA3"]} -{"Format": "IDEA0", "ID": "f1ff96ca-6a11-46f6-a4a2-7c329f301913", "DetectTime": "2023-10-30T14:13:06.385703+02:00", "EventTime": "2023-10-30T14:13:06.385720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CcxdXr4ZkV2fbesxhd"]} -{"Format": "IDEA0", "ID": "d7a284fc-2d04-45cb-8fd1-3f942ade2303", "DetectTime": "2023-10-30T14:13:06.404255+02:00", "EventTime": "2023-10-30T14:13:06.404281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C7pnrU38pyagdl62E6"]} -{"Format": "IDEA0", "ID": "91d08252-a6ef-4f60-a4e4-85bf5784f420", "DetectTime": "2023-10-30T14:13:06.422690+02:00", "EventTime": "2023-10-30T14:13:06.422705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CwtAq64K1YHIKV2396"]} -{"Format": "IDEA0", "ID": "10aac49f-ff31-47d4-8ef5-2f5903ce29ed", "DetectTime": "2023-10-30T14:13:06.438629+02:00", "EventTime": "2023-10-30T14:13:06.438640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CHKrLv1xlaPz81IkYg"]} -{"Format": "IDEA0", "ID": "bcef5d70-bd8a-4811-8b78-f46c00fa6270", "DetectTime": "2023-10-30T14:13:06.461688+02:00", "EventTime": "2023-10-30T14:13:06.461704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjbOKAYaMwAUZtwi1"]} -{"Format": "IDEA0", "ID": "28b21309-604c-4a53-b117-fd56420212fa", "DetectTime": "2023-10-30T14:13:06.492980+02:00", "EventTime": "2023-10-30T14:13:06.492997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["COq35uJNEJdZwdgV4"]} -{"Format": "IDEA0", "ID": "c7d60c53-cc62-430e-b395-4f0154df530a", "DetectTime": "2023-10-30T14:13:06.522563+02:00", "EventTime": "2023-10-30T14:13:06.522580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CiNwoG4VJqTHMSPOhg"]} -{"Format": "IDEA0", "ID": "73350e5e-8524-4ccb-9b7b-59557520112b", "DetectTime": "2023-10-30T14:13:06.555838+02:00", "EventTime": "2023-10-30T14:13:06.555857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CFEmb34O9RZIkPNjy4"]} -{"Format": "IDEA0", "ID": "88321801-e4fb-4221-a455-cd620e215958", "DetectTime": "2023-10-30T14:13:06.585420+02:00", "EventTime": "2023-10-30T14:13:06.585436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CSY3foXfolAh5I695"]} -{"Format": "IDEA0", "ID": "6976fb00-bab3-487c-b90d-f5722a0b5c3f", "DetectTime": "2023-10-30T14:13:06.615087+02:00", "EventTime": "2023-10-30T14:13:06.615107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CtQimk4Q4jwnNdFLcc"]} -{"Format": "IDEA0", "ID": "4b15051c-8da2-471f-aba5-7a394980026a", "DetectTime": "2023-10-30T14:13:06.646246+02:00", "EventTime": "2023-10-30T14:13:06.646259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C7gyh715CUo79qIUZ4"]} -{"Format": "IDEA0", "ID": "11521956-4964-49cd-bc71-926ced192cf3", "DetectTime": "2023-10-30T14:13:06.676699+02:00", "EventTime": "2023-10-30T14:13:06.676718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVHEJB3nBvgGgnSSV6"]} -{"Format": "IDEA0", "ID": "677d470d-66fd-452f-b761-dcd5de94d928", "DetectTime": "2023-10-30T14:13:06.699993+02:00", "EventTime": "2023-10-30T14:13:06.700005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cr5GEP1k5QSRltJRR8"]} -{"Format": "Json", "ID": "677d470d-66fd-452f-b761-dcd5de94d928", "DetectTime": "2023-10-30T14:13:06.699993+02:00", "EventTime": "2023-10-30T14:13:06.700005+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T04:06:49.389481+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2023/10/30 14:13:06.768435)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "27b016ca-00a3-4d24-b220-bd987d30eda0", "DetectTime": "2023-10-30T14:13:06.773821+02:00", "EventTime": "2023-10-30T14:13:06.773836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1E6PpTqBWTr7hDCe"]} -{"Format": "IDEA0", "ID": "5e27ae7c-186b-4bcd-8a12-7f68ab8f6175", "DetectTime": "2023-10-30T14:13:06.798490+02:00", "EventTime": "2023-10-30T14:13:06.798501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CQ1kTg1cbdaIZtMS6e"]} -{"Format": "IDEA0", "ID": "545a6dbb-d252-49b1-86e1-73e9133a3eaf", "DetectTime": "2023-10-30T14:13:06.821355+02:00", "EventTime": "2023-10-30T14:13:06.821373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CCWI9F1ieAWRBHNR03"]} -{"Format": "IDEA0", "ID": "b73ae3ca-dd2e-4454-80b3-3bc699ae8131", "DetectTime": "2023-10-30T14:13:06.850944+02:00", "EventTime": "2023-10-30T14:13:06.850961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9BCzk40dd608tQE1"]} -{"Format": "IDEA0", "ID": "7d2e87f5-eafb-4445-95e4-4894145c2d53", "DetectTime": "2023-10-30T14:13:06.874737+02:00", "EventTime": "2023-10-30T14:13:06.874748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cpmou21phhlA7ZE748"]} -{"Format": "IDEA0", "ID": "7c1faee5-278d-490a-94f8-5c89db05d15d", "DetectTime": "2023-10-30T14:13:06.903226+02:00", "EventTime": "2023-10-30T14:13:06.903242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cx89wh2ulMVF5uUi09"]} -{"Format": "IDEA0", "ID": "02d7d302-451d-428d-a438-cac53d33923f", "DetectTime": "2023-10-30T14:13:06.929741+02:00", "EventTime": "2023-10-30T14:13:06.929753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CJLrzC4szqXKti1t7i"]} -{"Format": "IDEA0", "ID": "1037f7e8-20be-4320-bace-21ca2819a2c2", "DetectTime": "2023-10-30T14:13:06.957558+02:00", "EventTime": "2023-10-30T14:13:06.957572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CEMtP32sE4tZu6uMIj"]} -{"Format": "Json", "ID": "1037f7e8-20be-4320-bace-21ca2819a2c2", "DetectTime": "2023-10-30T14:13:06.957558+02:00", "EventTime": "2023-10-30T14:13:06.957572+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T04:06:55.953587+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2023/10/30 14:13:07.020560)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c08df108-b894-4d5f-a3d3-c95d000618c5", "DetectTime": "2023-10-30T14:13:07.026910+02:00", "EventTime": "2023-10-30T14:13:07.026932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CY5WK22lvkcKSbOM52"]} -{"Format": "IDEA0", "ID": "bc8e07a5-906b-45d4-8f21-34a985f73cdb", "DetectTime": "2023-10-30T14:13:07.053422+02:00", "EventTime": "2023-10-30T14:13:07.053439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C07fFF4VEBFmMKz96h"]} -{"Format": "IDEA0", "ID": "846b6c87-764c-497e-9636-b7c26fd2c61b", "DetectTime": "2023-10-30T14:13:07.081817+02:00", "EventTime": "2023-10-30T14:13:07.081834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZ0wiM3oxEM4DMbGre"]} -{"Format": "IDEA0", "ID": "83767116-1482-4774-9aac-2f3507d67539", "DetectTime": "2023-10-30T14:13:07.109420+02:00", "EventTime": "2023-10-30T14:13:07.109436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CFfL5IcjrRxyrsLe1"]} -{"Format": "IDEA0", "ID": "f2020928-e648-4b86-b19f-022c5e04d61f", "DetectTime": "2023-10-30T14:13:07.136959+02:00", "EventTime": "2023-10-30T14:13:07.136974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CZBNwt4vItKuYqsD96"]} -{"Format": "IDEA0", "ID": "aa9e35be-f8d1-45f0-8062-015c2b251f21", "DetectTime": "2023-10-30T14:13:07.163611+02:00", "EventTime": "2023-10-30T14:13:07.163622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CxsE9i3eXcZfvyWFtf"]} -{"Format": "IDEA0", "ID": "613e493f-8e5e-4383-b86f-7a87ab7be21b", "DetectTime": "2023-10-30T14:13:07.183077+02:00", "EventTime": "2023-10-30T14:13:07.183090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ClmfHi3P2nd8OHo3b3"]} -{"Format": "IDEA0", "ID": "6d0225ef-7048-40aa-845c-e69ee60de600", "DetectTime": "2023-10-30T14:13:07.205668+02:00", "EventTime": "2023-10-30T14:13:07.205688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CrrdDm19gim0muUP97"]} -{"Format": "IDEA0", "ID": "36e687fa-0e35-4b94-81ad-0f16b4b5d3f3", "DetectTime": "2023-10-30T14:13:07.234442+02:00", "EventTime": "2023-10-30T14:13:07.234455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C7B8uO3GzxJRTFiPod"]} -{"Format": "Json", "ID": "36e687fa-0e35-4b94-81ad-0f16b4b5d3f3", "DetectTime": "2023-10-30T14:13:07.234442+02:00", "EventTime": "2023-10-30T14:13:07.234455+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T04:07:04.360868+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2023/10/30 14:13:07.300844)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c1b838c2-2ae3-4436-8b2c-a65c23f08d82", "DetectTime": "2023-10-30T14:13:07.305389+02:00", "EventTime": "2023-10-30T14:13:07.305406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CdvsWn1eqmaGLmVzT2"]} -{"Format": "IDEA0", "ID": "6771e93d-cf1c-4953-bd2f-fce5800d6f65", "DetectTime": "2023-10-30T14:13:07.331467+02:00", "EventTime": "2023-10-30T14:13:07.331483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CGfYz145PjTjjNWeJc"]} -{"Format": "IDEA0", "ID": "0035997c-f8a9-400e-900e-5f5ac7447729", "DetectTime": "2023-10-30T14:13:07.354586+02:00", "EventTime": "2023-10-30T14:13:07.354598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CBfau31yoUoLymvRX7"]} -{"Format": "IDEA0", "ID": "d804d516-f84d-4d09-9d7a-56442d4f43fd", "DetectTime": "2023-10-30T14:13:07.379353+02:00", "EventTime": "2023-10-30T14:13:07.379370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3Uxld3qpsadkitKL9"]} -{"Format": "IDEA0", "ID": "da712426-5919-4388-8d46-f96bbc9cb193", "DetectTime": "2023-10-30T14:13:07.400887+02:00", "EventTime": "2023-10-30T14:13:07.400916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["ChKz491Pz5T12yQbxh"]} -{"Format": "IDEA0", "ID": "2f2fc5fc-169c-45e8-85dd-89012d8218e5", "DetectTime": "2023-10-30T14:13:07.423736+02:00", "EventTime": "2023-10-30T14:13:07.423750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C7xqNt2CVre2Q9nJ9"]} -{"Format": "IDEA0", "ID": "2d51da90-da02-4010-8432-7e7d666f2e98", "DetectTime": "2023-10-30T14:13:07.448786+02:00", "EventTime": "2023-10-30T14:13:07.448797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CgxlZQ28fW2a86GEV4"]} -{"Format": "IDEA0", "ID": "2f3ec595-fd95-4357-9a71-dc5ca7ff20c6", "DetectTime": "2023-10-30T14:13:07.469949+02:00", "EventTime": "2023-10-30T14:13:07.469960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ClDtqmLbeHDMQZykl"]} -{"Format": "IDEA0", "ID": "fe8c42e3-3930-40e6-945a-99e6201e6312", "DetectTime": "2023-10-30T14:13:07.494193+02:00", "EventTime": "2023-10-30T14:13:07.494209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CU0lUkBdIAostEcp1"]} -{"Format": "Json", "ID": "fe8c42e3-3930-40e6-945a-99e6201e6312", "DetectTime": "2023-10-30T14:13:07.494193+02:00", "EventTime": "2023-10-30T14:13:07.494209+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T04:37:35.005727+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2023/10/30 14:13:07.563433)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "12d906c9-c948-46d9-9987-7316c06c71c1", "DetectTime": "2023-10-30T14:13:07.567894+02:00", "EventTime": "2023-10-30T14:13:07.567909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CQrvUb1szdjrVN9kI1"]} -{"Format": "IDEA0", "ID": "dd790bbe-f2dc-4691-a6c4-bc898a996a56", "DetectTime": "2023-10-30T14:13:07.587476+02:00", "EventTime": "2023-10-30T14:13:07.587493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Ckrcks6bsGpteN7Rf"]} -{"Format": "IDEA0", "ID": "06999cb8-8654-4b17-9aef-494727b815f5", "DetectTime": "2023-10-30T14:13:07.609637+02:00", "EventTime": "2023-10-30T14:13:07.609655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CFhkwh1VdMogNoR4hf"]} -{"Format": "IDEA0", "ID": "2fc2428f-81b2-40a5-8b3b-86579d1087d9", "DetectTime": "2023-10-30T14:13:07.628376+02:00", "EventTime": "2023-10-30T14:13:07.628388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C4BMQL3d9117leCFEg"]} -{"Format": "IDEA0", "ID": "18e8556a-3571-4b29-90bc-ea56432cad95", "DetectTime": "2023-10-30T14:13:07.648633+02:00", "EventTime": "2023-10-30T14:13:07.648648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXDqw9242wLh4Zde69"]} -{"Format": "IDEA0", "ID": "21c106e5-7294-4bbb-826c-214012c25bd2", "DetectTime": "2023-10-30T14:13:07.669173+02:00", "EventTime": "2023-10-30T14:13:07.669184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CqZMGT1ENFbr08gkdd"]} -{"Format": "IDEA0", "ID": "153d7917-198c-46b4-9f1a-b59c1e87d8fd", "DetectTime": "2023-10-30T14:13:07.689356+02:00", "EventTime": "2023-10-30T14:13:07.689372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C781zY3knNejpzt3B6"]} -{"Format": "IDEA0", "ID": "f9022e7b-b2aa-4187-85d1-3839293224a7", "DetectTime": "2023-10-30T14:13:07.784072+02:00", "EventTime": "2023-10-30T14:13:07.784090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CvdNfDWwP7rIDcF1b"]} -{"Format": "IDEA0", "ID": "d5eec0d2-595b-4dd3-a543-c5b7d6e0bb49", "DetectTime": "2023-10-30T14:13:07.806849+02:00", "EventTime": "2023-10-30T14:13:07.806871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Ci1mMI1sjglSlpyHpa"]} -{"Format": "Json", "ID": "d5eec0d2-595b-4dd3-a543-c5b7d6e0bb49", "DetectTime": "2023-10-30T14:13:07.806849+02:00", "EventTime": "2023-10-30T14:13:07.806871+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T04:37:43.035388+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2023/10/30 14:13:07.871604)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "890dde07-89b2-4e60-9f7b-1525a261a26e", "DetectTime": "2023-10-30T14:13:07.877427+02:00", "EventTime": "2023-10-30T14:13:07.877444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CnDF7V2wd63ixAnSda"]} -{"Format": "IDEA0", "ID": "1a9e47b9-10ed-441d-897d-c2215e27bfcc", "DetectTime": "2023-10-30T14:13:07.901092+02:00", "EventTime": "2023-10-30T14:13:07.901109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CsiOet1V1ENgDwourc"]} -{"Format": "IDEA0", "ID": "1f2c1a02-fb39-4fea-9ebd-fb70b3bdc63b", "DetectTime": "2023-10-30T14:13:07.921636+02:00", "EventTime": "2023-10-30T14:13:07.921650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C0psi71ofODzvW8Yq"]} -{"Format": "IDEA0", "ID": "910ff772-8a23-4201-9134-8f16c1346130", "DetectTime": "2023-10-30T14:13:07.941228+02:00", "EventTime": "2023-10-30T14:13:07.941244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Ch5ZfG1unOreWh7qK8"]} -{"Format": "IDEA0", "ID": "79c393a1-1333-4227-a7ed-1f49eb7a56e4", "DetectTime": "2023-10-30T14:13:07.963469+02:00", "EventTime": "2023-10-30T14:13:07.963487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C0wmyR35Muwiad8rPj"]} -{"Format": "IDEA0", "ID": "0b2fdad7-dd45-4c05-bf27-c3c5074d3635", "DetectTime": "2023-10-30T14:13:07.990880+02:00", "EventTime": "2023-10-30T14:13:07.990893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C2oV4l1cAki84knzA2"]} -{"Format": "IDEA0", "ID": "b6aedcc8-b881-4908-bc09-c6b5859fd93b", "DetectTime": "2023-10-30T14:13:08.009271+02:00", "EventTime": "2023-10-30T14:13:08.009292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCPhLI2vaHaOtWhsYb"]} -{"Format": "IDEA0", "ID": "ecd066a7-134c-4f68-90d6-0aec6b48f509", "DetectTime": "2023-10-30T14:13:08.029570+02:00", "EventTime": "2023-10-30T14:13:08.029588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CHh8UD1w4Kqan5Xp4h"]} -{"Format": "IDEA0", "ID": "4808dfdd-a3ff-457f-a694-d41a1da780c3", "DetectTime": "2023-10-30T14:13:08.051714+02:00", "EventTime": "2023-10-30T14:13:08.051730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CReNmN1t7tDsXQkiIi"]} -{"Format": "Json", "ID": "4808dfdd-a3ff-457f-a694-d41a1da780c3", "DetectTime": "2023-10-30T14:13:08.051714+02:00", "EventTime": "2023-10-30T14:13:08.051730+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T04:37:49.281555+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2023/10/30 14:13:08.115155)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d29c8731-a5ec-4c9a-af63-90d9b85ea5a5", "DetectTime": "2023-10-30T14:13:08.119133+02:00", "EventTime": "2023-10-30T14:13:08.119149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C2GAYX3bloMB6hTg5g"]} -{"Format": "IDEA0", "ID": "4b058d2b-c168-499a-bc82-2d9880cb8ff8", "DetectTime": "2023-10-30T14:13:08.137771+02:00", "EventTime": "2023-10-30T14:13:08.137791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CBXjI01fPtM3QwJ9Tl"]} -{"Format": "IDEA0", "ID": "7bb4cc9b-be77-4b6d-8911-fe0f549ef465", "DetectTime": "2023-10-30T14:13:08.154179+02:00", "EventTime": "2023-10-30T14:13:08.154195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CCBBx016rT1QjMMVfd"]} -{"Format": "IDEA0", "ID": "6a605349-f644-43d8-824c-3a1de4b99a95", "DetectTime": "2023-10-30T14:13:08.182315+02:00", "EventTime": "2023-10-30T14:13:08.182333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CSALt1e9k04UJHsx2"]} -{"Format": "IDEA0", "ID": "dd56e63b-8cd5-43de-84ef-2b4b1416c6c1", "DetectTime": "2023-10-30T14:13:08.199860+02:00", "EventTime": "2023-10-30T14:13:08.199878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CXRjvuRyWmBrjGAY8"]} -{"Format": "IDEA0", "ID": "32e272e9-8f05-48dc-8b1b-3f4da9f85e72", "DetectTime": "2023-10-30T14:13:08.218368+02:00", "EventTime": "2023-10-30T14:13:08.218382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CbUxrC1infFtxWGMOh"]} -{"Format": "IDEA0", "ID": "477eb65f-5422-4ea3-b04d-244e5e5b7f9d", "DetectTime": "2023-10-30T14:13:08.237536+02:00", "EventTime": "2023-10-30T14:13:08.237552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCqZw24tlMoVzvE53a"]} -{"Format": "IDEA0", "ID": "53466d46-8b34-491a-9138-59c71123af7c", "DetectTime": "2023-10-30T14:13:08.256744+02:00", "EventTime": "2023-10-30T14:13:08.256758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMtHolLRfsenc4Fti"]} -{"Format": "IDEA0", "ID": "3667db9e-0007-45cb-9667-54bcc0bdbe08", "DetectTime": "2023-10-30T14:13:08.289793+02:00", "EventTime": "2023-10-30T14:13:08.289814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYkO1T3mdk01V3rGqj"]} -{"Format": "IDEA0", "ID": "e0d78177-8910-44f0-a6d4-97662f6f2664", "DetectTime": "2023-10-30T14:13:08.318103+02:00", "EventTime": "2023-10-30T14:13:08.318120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CaMKNx32nHZKY8nw33"]} -{"Format": "IDEA0", "ID": "ac25ff8a-4215-44cd-8a8e-7f5b767d357f", "DetectTime": "2023-10-30T14:13:08.351807+02:00", "EventTime": "2023-10-30T14:13:08.351834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CpqBlY28XYLw5VxFtd"]} -{"Format": "IDEA0", "ID": "63329694-2e8f-4af1-9b8d-e4209513e73b", "DetectTime": "2023-10-30T14:13:08.383858+02:00", "EventTime": "2023-10-30T14:13:08.383874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CBwGHOl0rYyXHTHr6"]} -{"Format": "IDEA0", "ID": "d43a2028-5e50-4340-ac7f-c70fc5a941dc", "DetectTime": "2023-10-30T14:13:08.415584+02:00", "EventTime": "2023-10-30T14:13:08.415600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["COpRZ40uTvcpUhV99"]} -{"Format": "IDEA0", "ID": "967e6b31-2ef4-40e0-aa0b-8e7fe238406b", "DetectTime": "2023-10-30T14:13:08.442283+02:00", "EventTime": "2023-10-30T14:13:08.442302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["COUmwy3xL8maCStSg5"]} -{"Format": "IDEA0", "ID": "53f8d2eb-6832-44da-b55d-cea4ebdab9a0", "DetectTime": "2023-10-30T14:13:08.476461+02:00", "EventTime": "2023-10-30T14:13:08.476476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CYfbQ63PrpcRbtlK3"]} -{"Format": "Json", "ID": "53f8d2eb-6832-44da-b55d-cea4ebdab9a0", "DetectTime": "2023-10-30T14:13:08.476461+02:00", "EventTime": "2023-10-30T14:13:08.476476+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T05:08:16.976301+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2023/10/30 14:13:08.570697)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "34a73814-16af-4877-840a-72501cae3eef", "DetectTime": "2023-10-30T14:13:08.576193+02:00", "EventTime": "2023-10-30T14:13:08.576215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CKX0LE3prgPTTQdCZ"]} -{"Format": "IDEA0", "ID": "c0e10f67-74a5-4e09-8678-ad0684b2c37d", "DetectTime": "2023-10-30T14:13:08.609887+02:00", "EventTime": "2023-10-30T14:13:08.609902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C7U7gV3PivbRuoofv6"]} -{"Format": "IDEA0", "ID": "387c0e9c-d418-4bf6-b37a-0aa1da9084d2", "DetectTime": "2023-10-30T14:13:08.644899+02:00", "EventTime": "2023-10-30T14:13:08.644913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cprwdkghoo3WGXlaf"]} -{"Format": "IDEA0", "ID": "fe2ed11e-2ce9-40ee-89d0-503b67c7fd78", "DetectTime": "2023-10-30T14:13:08.670898+02:00", "EventTime": "2023-10-30T14:13:08.670915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C24xlt1JqfhVjZkkc"]} -{"Format": "IDEA0", "ID": "707dedcb-f599-4184-957f-a1406a9d965d", "DetectTime": "2023-10-30T14:13:08.711025+02:00", "EventTime": "2023-10-30T14:13:08.711054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Csv77kTsyCTwwpQXk"]} -{"Format": "IDEA0", "ID": "dd27015a-edb9-401c-b016-d16ae741f90d", "DetectTime": "2023-10-30T14:13:08.745820+02:00", "EventTime": "2023-10-30T14:13:08.745835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CaTBHq4UZaY278GlB7"]} -{"Format": "IDEA0", "ID": "3565a8f4-fdc9-43ad-a10c-cc7d71fdd3e4", "DetectTime": "2023-10-30T14:13:08.780261+02:00", "EventTime": "2023-10-30T14:13:08.780277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CKBpnS1ejUoCzRuZw7"]} -{"Format": "IDEA0", "ID": "ad380e7b-3422-48c9-aa57-ff0d0246fbe1", "DetectTime": "2023-10-30T14:13:08.813255+02:00", "EventTime": "2023-10-30T14:13:08.813267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CkyJzq4Q8HCupBqfHb"]} -{"Format": "IDEA0", "ID": "5c9401f0-0a34-4ce3-8d5f-0a5456f4369c", "DetectTime": "2023-10-30T14:13:08.845512+02:00", "EventTime": "2023-10-30T14:13:08.845525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXpOVN1Ay4xKcgrHKc"]} -{"Format": "Json", "ID": "5c9401f0-0a34-4ce3-8d5f-0a5456f4369c", "DetectTime": "2023-10-30T14:13:08.845512+02:00", "EventTime": "2023-10-30T14:13:08.845525+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T05:08:18.405546+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2023/10/30 14:13:08.923668)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b1cc48f1-78c8-498e-bb32-6c5ece8a19f0", "DetectTime": "2023-10-30T14:13:08.929027+02:00", "EventTime": "2023-10-30T14:13:08.929043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYboOc3hZ2O8obxj82"]} -{"Format": "IDEA0", "ID": "ab5c51ff-27c5-4f6d-84ff-e55a3276d6fc", "DetectTime": "2023-10-30T14:13:08.959190+02:00", "EventTime": "2023-10-30T14:13:08.959206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["ChrjHK2Z9kH6Qlphu1"]} -{"Format": "IDEA0", "ID": "ea9f3b7e-c362-400b-9c5f-be03882d250b", "DetectTime": "2023-10-30T14:13:08.989560+02:00", "EventTime": "2023-10-30T14:13:08.989577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CJyLur2LLHt3CES7V"]} -{"Format": "IDEA0", "ID": "52bce4ac-3da2-4de7-966e-9fe731936504", "DetectTime": "2023-10-30T14:13:09.020363+02:00", "EventTime": "2023-10-30T14:13:09.020381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CMF75xBmMoyhlozwi"]} -{"Format": "IDEA0", "ID": "37ff3771-b76a-4cfd-be88-20bb74f2e615", "DetectTime": "2023-10-30T14:13:09.046705+02:00", "EventTime": "2023-10-30T14:13:09.046725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CMJUcq13jKkxIN5WOl"]} -{"Format": "IDEA0", "ID": "6b4aba92-4860-4749-950a-a6fac54354ac", "DetectTime": "2023-10-30T14:13:09.073214+02:00", "EventTime": "2023-10-30T14:13:09.073237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CaxY5s4ioj5I4sOqQb"]} -{"Format": "IDEA0", "ID": "dca167c0-a54f-4b23-9b3d-3b3777f308cc", "DetectTime": "2023-10-30T14:13:09.100341+02:00", "EventTime": "2023-10-30T14:13:09.100359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CTJb9kmZk2Jw2YOod"]} -{"Format": "IDEA0", "ID": "3b7b75a4-6e58-463e-8dc5-8fb3e6df9b61", "DetectTime": "2023-10-30T14:13:09.127869+02:00", "EventTime": "2023-10-30T14:13:09.127885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C3FEKp3kW6jQdtG7sh"]} -{"Format": "IDEA0", "ID": "db9c1795-799f-48b2-b234-113f4488f8dc", "DetectTime": "2023-10-30T14:13:09.158096+02:00", "EventTime": "2023-10-30T14:13:09.158112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CwuLBE1PfxypAO9mqd"]} -{"Format": "Json", "ID": "db9c1795-799f-48b2-b234-113f4488f8dc", "DetectTime": "2023-10-30T14:13:09.158096+02:00", "EventTime": "2023-10-30T14:13:09.158112+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T05:08:21.739262+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2023/10/30 14:13:09.227858)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d3fd2691-a2eb-4b32-888c-d1fab6c25c1c", "DetectTime": "2023-10-30T14:13:09.233087+02:00", "EventTime": "2023-10-30T14:13:09.233104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CC52BN2fAJllvNdKzj"]} -{"Format": "IDEA0", "ID": "3e0e57d1-c3bd-470c-917a-fe5c9a4342d3", "DetectTime": "2023-10-30T14:13:09.268922+02:00", "EventTime": "2023-10-30T14:13:09.268936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CUAhCyzCTu3qTRvFc"]} -{"Format": "IDEA0", "ID": "6318e9dd-1741-4fae-9085-40b2edc504c4", "DetectTime": "2023-10-30T14:13:09.294734+02:00", "EventTime": "2023-10-30T14:13:09.294757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CGLY0kzYQ2KcnCjY"]} -{"Format": "IDEA0", "ID": "017b244a-c890-491f-abd5-3a3feddb6842", "DetectTime": "2023-10-30T14:13:09.320351+02:00", "EventTime": "2023-10-30T14:13:09.320363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CsLkOZ2popWHhQdN7a"]} -{"Format": "IDEA0", "ID": "d490e947-ef59-4383-bb8a-2f639d224110", "DetectTime": "2023-10-30T14:13:09.343098+02:00", "EventTime": "2023-10-30T14:13:09.343125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CuK93GWFoVXqR0ZO6"]} -{"Format": "IDEA0", "ID": "f1869a9e-7622-4239-a62d-39027a5aa478", "DetectTime": "2023-10-30T14:13:09.367038+02:00", "EventTime": "2023-10-30T14:13:09.367051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqyMtF2BU9qcoGTJnk"]} -{"Format": "IDEA0", "ID": "f57a4386-4a02-4891-9916-4cdacf80fcb3", "DetectTime": "2023-10-30T14:13:09.389676+02:00", "EventTime": "2023-10-30T14:13:09.389689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CAce6f9bzs6RuEuej"]} -{"Format": "IDEA0", "ID": "1f1aeecf-54c2-4c1e-b7a6-746012a07c74", "DetectTime": "2023-10-30T14:13:09.412437+02:00", "EventTime": "2023-10-30T14:13:09.412448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C8Cphx3ZbqDtIr6vpf"]} -{"Format": "IDEA0", "ID": "1450eb8a-9ea2-4631-bdac-b10de233c0fc", "DetectTime": "2023-10-30T14:13:09.435130+02:00", "EventTime": "2023-10-30T14:13:09.435141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CjPoCz3467zx8uHQF8"]} -{"Format": "Json", "ID": "1450eb8a-9ea2-4631-bdac-b10de233c0fc", "DetectTime": "2023-10-30T14:13:09.435130+02:00", "EventTime": "2023-10-30T14:13:09.435141+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T05:39:21.953897+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2023/10/30 14:13:09.499582)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2745566e-bb57-48de-a005-71338d4aefbc", "DetectTime": "2023-10-30T14:13:09.504779+02:00", "EventTime": "2023-10-30T14:13:09.504796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Ccdpd82aIgm0GvFI51"]} -{"Format": "IDEA0", "ID": "61152faf-3161-4940-8076-7b252019d99c", "DetectTime": "2023-10-30T14:13:09.529949+02:00", "EventTime": "2023-10-30T14:13:09.529963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CtNLLu4QFoQNk0Idlc"]} -{"Format": "IDEA0", "ID": "720beef3-d800-4fbe-9325-db7ea13169db", "DetectTime": "2023-10-30T14:13:09.550522+02:00", "EventTime": "2023-10-30T14:13:09.550540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CnQ6BptrfCe7lyOxl"]} -{"Format": "IDEA0", "ID": "2a05d675-616f-4af5-b26c-f4e0d4788434", "DetectTime": "2023-10-30T14:13:09.572517+02:00", "EventTime": "2023-10-30T14:13:09.572533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CzaOnLOXoS47nG5w"]} -{"Format": "IDEA0", "ID": "d4a6e3e4-0ed4-445a-ad15-b59f5f1addd7", "DetectTime": "2023-10-30T14:13:09.595040+02:00", "EventTime": "2023-10-30T14:13:09.595067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["COEV8e1X5lqJa8PUed"]} -{"Format": "IDEA0", "ID": "8a13d2c8-833d-4460-85ba-d948fb6f2227", "DetectTime": "2023-10-30T14:13:09.616414+02:00", "EventTime": "2023-10-30T14:13:09.616426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C7Jm710TiMV8u1ryk"]} -{"Format": "IDEA0", "ID": "945a3c74-0682-46e0-8786-5d04ce4dbde2", "DetectTime": "2023-10-30T14:13:09.638835+02:00", "EventTime": "2023-10-30T14:13:09.638849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CagiSF3DS6gjGk7mf1"]} -{"Format": "IDEA0", "ID": "1c2b7706-e8c8-4366-80a5-3acddae73290", "DetectTime": "2023-10-30T14:13:09.657670+02:00", "EventTime": "2023-10-30T14:13:09.657686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["COpiO825SInKBNcrg"]} -{"Format": "IDEA0", "ID": "eeec6060-2197-49ad-981d-818d881fa7dc", "DetectTime": "2023-10-30T14:13:09.677417+02:00", "EventTime": "2023-10-30T14:13:09.677431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CqV3BLoqsdboE7OKa"]} -{"Format": "Json", "ID": "eeec6060-2197-49ad-981d-818d881fa7dc", "DetectTime": "2023-10-30T14:13:09.677417+02:00", "EventTime": "2023-10-30T14:13:09.677431+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T05:39:23.436246+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2023/10/30 14:13:09.816708)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0eeb7775-f210-4d12-bdb1-c7a30b30b942", "DetectTime": "2023-10-30T14:13:09.821609+02:00", "EventTime": "2023-10-30T14:13:09.821624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ChMTPO2X4BTqVTTkdl"]} -{"Format": "IDEA0", "ID": "fb75b491-3482-4812-91c8-d6f5e6c53c37", "DetectTime": "2023-10-30T14:13:09.852453+02:00", "EventTime": "2023-10-30T14:13:09.852469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Co684b2aCtXaf1eyz4"]} -{"Format": "IDEA0", "ID": "078a0e27-7068-4f59-822b-54b75a7eeb5c", "DetectTime": "2023-10-30T14:13:09.874254+02:00", "EventTime": "2023-10-30T14:13:09.874270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CGMnO23A5DRMkZCpjj"]} -{"Format": "IDEA0", "ID": "43450026-9f34-47ad-ace5-5f99101944be", "DetectTime": "2023-10-30T14:13:09.896719+02:00", "EventTime": "2023-10-30T14:13:09.896736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7anJP5y6g8y9u2si"]} -{"Format": "IDEA0", "ID": "262ef20f-3565-47f6-a516-01d1d5c86b69", "DetectTime": "2023-10-30T14:13:09.916257+02:00", "EventTime": "2023-10-30T14:13:09.916272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CQNLOD19aqzB7IjFLg"]} -{"Format": "IDEA0", "ID": "6c1c5682-7375-481b-a1a7-d9e87401570b", "DetectTime": "2023-10-30T14:13:09.939345+02:00", "EventTime": "2023-10-30T14:13:09.939373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CfPSJc2WJschn0QBYc"]} -{"Format": "IDEA0", "ID": "eb7e6b56-649a-4fe8-9366-fc0a10f2accc", "DetectTime": "2023-10-30T14:13:09.962826+02:00", "EventTime": "2023-10-30T14:13:09.962846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CGfTWC21htJ9DjlqBi"]} -{"Format": "IDEA0", "ID": "d44fb061-a7ee-475a-a54e-7cdc3338dee2", "DetectTime": "2023-10-30T14:13:09.982346+02:00", "EventTime": "2023-10-30T14:13:09.982361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CaZDH03RF4mr2OTzRk"]} -{"Format": "IDEA0", "ID": "63ea7fed-6aaa-400a-b9d2-a288d881427e", "DetectTime": "2023-10-30T14:13:10.008022+02:00", "EventTime": "2023-10-30T14:13:10.008049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CiqLrm2yBXeWudcqS9"]} -{"Format": "IDEA0", "ID": "723e7b69-b547-41dd-966b-2b86f011884e", "DetectTime": "2023-10-30T14:13:10.030940+02:00", "EventTime": "2023-10-30T14:13:10.030954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C5TdBquw9epr5TY2a"]} -{"Format": "Json", "ID": "723e7b69-b547-41dd-966b-2b86f011884e", "DetectTime": "2023-10-30T14:13:10.030940+02:00", "EventTime": "2023-10-30T14:13:10.030954+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T05:39:25.302933+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2023/10/30 14:13:10.092668)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "01cdda5c-5dd9-4c3c-8424-455c84f9991d", "DetectTime": "2023-10-30T14:13:10.098155+02:00", "EventTime": "2023-10-30T14:13:10.098171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CylePm1gJXR40Zsld3"]} -{"Format": "IDEA0", "ID": "c667d36d-f564-4641-aeae-3985e9311823", "DetectTime": "2023-10-30T14:13:10.119487+02:00", "EventTime": "2023-10-30T14:13:10.119499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CjuejK2rP8hOjKkBJl"]} -{"Format": "IDEA0", "ID": "379822e5-ba98-4a64-ae86-c96d7c35a4fc", "DetectTime": "2023-10-30T14:13:10.139670+02:00", "EventTime": "2023-10-30T14:13:10.139685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cdfj4Q1UehyjD9ynS2"]} -{"Format": "IDEA0", "ID": "49aa42ff-2158-4b35-ab1a-5a6ab249b8df", "DetectTime": "2023-10-30T14:13:10.165247+02:00", "EventTime": "2023-10-30T14:13:10.165280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cc4FDR34dljozqja13"]} -{"Format": "IDEA0", "ID": "d0531e67-86e2-4d10-9810-69abe8cca9b7", "DetectTime": "2023-10-30T14:13:10.185402+02:00", "EventTime": "2023-10-30T14:13:10.185421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cm3FyCLF06z4Xxh1j"]} -{"Format": "IDEA0", "ID": "0b3e3acb-31cd-43d1-95ac-bdba86e3d64a", "DetectTime": "2023-10-30T14:13:10.211609+02:00", "EventTime": "2023-10-30T14:13:10.211627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CfqSIy11hN4DvsEPg1"]} -{"Format": "IDEA0", "ID": "6b4a3f83-b1ab-4019-8e14-a52ebad50128", "DetectTime": "2023-10-30T14:13:10.234425+02:00", "EventTime": "2023-10-30T14:13:10.234451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRVUKj4VjenqtyxUFe"]} -{"Format": "IDEA0", "ID": "48b8f4cd-3a95-4ad8-9718-a9280b37d5ec", "DetectTime": "2023-10-30T14:13:10.276556+02:00", "EventTime": "2023-10-30T14:13:10.276575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CPSIcl1GB51lzcumyg"]} -{"Format": "IDEA0", "ID": "97221301-a2a0-4c65-8b7f-255001be4df8", "DetectTime": "2023-10-30T14:13:10.305502+02:00", "EventTime": "2023-10-30T14:13:10.305518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CyvJ152NqO7JnsSHjf"]} -{"Format": "IDEA0", "ID": "7bf6d1a3-d055-4531-83fb-faf6695d51b9", "DetectTime": "2023-10-30T14:13:10.340108+02:00", "EventTime": "2023-10-30T14:13:10.340126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CCeGpDfhbB5vqjY24"]} -{"Format": "IDEA0", "ID": "4981142e-9fec-44f8-90b1-5aee88b3d2b8", "DetectTime": "2023-10-30T14:13:10.371365+02:00", "EventTime": "2023-10-30T14:13:10.371375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Ctbgij1tDm0b2iDIhk"]} -{"Format": "IDEA0", "ID": "329e5770-647e-4827-9d43-7ff7dd6040c0", "DetectTime": "2023-10-30T14:13:10.402753+02:00", "EventTime": "2023-10-30T14:13:10.402770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CFnbSG3179kXUjHE23"]} -{"Format": "IDEA0", "ID": "83706054-0795-410d-a93c-2d363e72431f", "DetectTime": "2023-10-30T14:13:10.432312+02:00", "EventTime": "2023-10-30T14:13:10.432326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZJLcaanBxJfLKbxe"]} -{"Format": "IDEA0", "ID": "2c76a52b-962a-43c1-b0e0-0b631153ea1f", "DetectTime": "2023-10-30T14:13:10.462027+02:00", "EventTime": "2023-10-30T14:13:10.462054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CjPVTLqc56nm6S2Y7"]} -{"Format": "IDEA0", "ID": "d9c77526-10fb-4c83-99c6-6f0eb162118f", "DetectTime": "2023-10-30T14:13:10.492165+02:00", "EventTime": "2023-10-30T14:13:10.492186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C76wym27AInJq71QBg"]} -{"Format": "Json", "ID": "d9c77526-10fb-4c83-99c6-6f0eb162118f", "DetectTime": "2023-10-30T14:13:10.492165+02:00", "EventTime": "2023-10-30T14:13:10.492186+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T06:09:52.099307+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2023/10/30 14:13:10.565741)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e661d2f9-6d42-49a7-a95b-b6e83c18efdb", "DetectTime": "2023-10-30T14:13:10.570657+02:00", "EventTime": "2023-10-30T14:13:10.570674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CaLbuO3EIs23xepp3b"]} -{"Format": "IDEA0", "ID": "0863e570-250f-4cd4-b629-4665a4f5ad70", "DetectTime": "2023-10-30T14:13:10.612336+02:00", "EventTime": "2023-10-30T14:13:10.612353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVZpbf2U9TZJXDWeIh"]} -{"Format": "IDEA0", "ID": "c20e7c16-13e4-4b6a-9893-939ad2264a6d", "DetectTime": "2023-10-30T14:13:10.644641+02:00", "EventTime": "2023-10-30T14:13:10.644654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CgS2T44FxVMs5YFdi3"]} -{"Format": "IDEA0", "ID": "34818c26-b6d0-41b2-9207-df547989990d", "DetectTime": "2023-10-30T14:13:10.671368+02:00", "EventTime": "2023-10-30T14:13:10.671380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cc59OVyw0bYAS84f2"]} -{"Format": "IDEA0", "ID": "585302c8-0784-4be0-a544-1e212c13bb28", "DetectTime": "2023-10-30T14:13:10.702163+02:00", "EventTime": "2023-10-30T14:13:10.702185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C4ZBfA15434k9caSWg"]} -{"Format": "IDEA0", "ID": "71650e8a-8003-4fe8-890f-36e478e0d379", "DetectTime": "2023-10-30T14:13:10.737692+02:00", "EventTime": "2023-10-30T14:13:10.737709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9tu3P11zrhx9kegRj"]} -{"Format": "IDEA0", "ID": "2aa7eb34-2c70-4e90-a186-9ed7a4259720", "DetectTime": "2023-10-30T14:13:10.770636+02:00", "EventTime": "2023-10-30T14:13:10.770653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C3AlD61KlDio8jLbLf"]} -{"Format": "IDEA0", "ID": "085bc28a-be2c-4cbb-8f6c-85f2a5e7de58", "DetectTime": "2023-10-30T14:13:10.799738+02:00", "EventTime": "2023-10-30T14:13:10.799749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C2WXxy3bU3GahC5Wf"]} -{"Format": "IDEA0", "ID": "36bcb6f6-ad67-4aa4-80d7-b4a95db3818a", "DetectTime": "2023-10-30T14:13:10.827545+02:00", "EventTime": "2023-10-30T14:13:10.827562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CqzZ8X1PTkBCtWb4I1"]} -{"Format": "Json", "ID": "36bcb6f6-ad67-4aa4-80d7-b4a95db3818a", "DetectTime": "2023-10-30T14:13:10.827545+02:00", "EventTime": "2023-10-30T14:13:10.827562+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T06:09:54.122283+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2023/10/30 14:13:10.897463)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6737703e-1ca0-4251-b18e-b39b7f1ab1d5", "DetectTime": "2023-10-30T14:13:10.903035+02:00", "EventTime": "2023-10-30T14:13:10.903052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cpem7g3Gy9uqKin3sd"]} -{"Format": "IDEA0", "ID": "13d30b17-ac1d-419e-a69b-5451e2101e07", "DetectTime": "2023-10-30T14:13:10.933888+02:00", "EventTime": "2023-10-30T14:13:10.933901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CXT7gm4b1ID4aAsXo6"]} -{"Format": "IDEA0", "ID": "d9ff8766-c0ec-4c0a-bb0a-c0e9af8bc215", "DetectTime": "2023-10-30T14:13:10.958580+02:00", "EventTime": "2023-10-30T14:13:10.958593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CxslqX1ed9Dh7J1gdc"]} -{"Format": "IDEA0", "ID": "969adecc-5c9b-4939-bc3c-bf7fa65dab59", "DetectTime": "2023-10-30T14:13:10.984116+02:00", "EventTime": "2023-10-30T14:13:10.984132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cb2imh7Lozqn26u2f"]} -{"Format": "IDEA0", "ID": "d9c18c78-ee27-47ea-bfcb-104a1ef224e7", "DetectTime": "2023-10-30T14:13:11.012464+02:00", "EventTime": "2023-10-30T14:13:11.012482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CQ6yMj1l5gUj3GI7Xd"]} -{"Format": "IDEA0", "ID": "d5f29505-e7aa-426f-b0ba-6763246a4e68", "DetectTime": "2023-10-30T14:13:11.037877+02:00", "EventTime": "2023-10-30T14:13:11.037890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CAKdTB3HDgsMMxQKNh"]} -{"Format": "IDEA0", "ID": "b414db47-d2d2-4425-b3a1-c0c372e8ccbf", "DetectTime": "2023-10-30T14:13:11.069525+02:00", "EventTime": "2023-10-30T14:13:11.069554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CcUZCE4kVKhWAjFcMc"]} -{"Format": "IDEA0", "ID": "a9a7ebc3-d5ea-4fbb-a66a-6563d087c1b4", "DetectTime": "2023-10-30T14:13:11.096397+02:00", "EventTime": "2023-10-30T14:13:11.096409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CsuGve4vMsPFCK8Z3e"]} -{"Format": "IDEA0", "ID": "8918ceb8-2428-4826-8dc1-b504392ba1fe", "DetectTime": "2023-10-30T14:13:11.120638+02:00", "EventTime": "2023-10-30T14:13:11.120656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CfeQkw4Le3AUBPuwJa"]} -{"Format": "Json", "ID": "8918ceb8-2428-4826-8dc1-b504392ba1fe", "DetectTime": "2023-10-30T14:13:11.120638+02:00", "EventTime": "2023-10-30T14:13:11.120656+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T06:09:55.976923+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2023/10/30 14:13:11.186367)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f7b89f83-b3f6-48a7-96e0-81275eae10d4", "DetectTime": "2023-10-30T14:13:11.191804+02:00", "EventTime": "2023-10-30T14:13:11.191823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CeEs0d2LusZ2YyWc7"]} -{"Format": "IDEA0", "ID": "dee9aa5f-cbdf-414a-ab23-7afb89168753", "DetectTime": "2023-10-30T14:13:11.219097+02:00", "EventTime": "2023-10-30T14:13:11.219114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CYa2v01qNJULOQcK88"]} -{"Format": "IDEA0", "ID": "64be83a5-b69e-4c71-bb1e-2b60ffebac85", "DetectTime": "2023-10-30T14:13:11.243542+02:00", "EventTime": "2023-10-30T14:13:11.243571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcJGhk1PSD9AHtV0Tk"]} -{"Format": "IDEA0", "ID": "432b445a-a21b-4a98-b0f4-92be4947eb9c", "DetectTime": "2023-10-30T14:13:11.275011+02:00", "EventTime": "2023-10-30T14:13:11.275037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C65Qjy1Dw3gFIYY4kf"]} -{"Format": "IDEA0", "ID": "32f2bd30-f3e1-46e2-9c78-d521fe099a06", "DetectTime": "2023-10-30T14:13:11.299650+02:00", "EventTime": "2023-10-30T14:13:11.299668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CkupMz1NhCMNPfG61f"]} -{"Format": "IDEA0", "ID": "82118c27-fb64-4c73-b02e-e37d6fd70ca3", "DetectTime": "2023-10-30T14:13:11.329109+02:00", "EventTime": "2023-10-30T14:13:11.329124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXFOtp3IbvKw3JdGu5"]} -{"Format": "IDEA0", "ID": "583bcd4d-fcb5-47f6-b729-4577a8e1848e", "DetectTime": "2023-10-30T14:13:11.353412+02:00", "EventTime": "2023-10-30T14:13:11.353428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CPzyKg3Cea36UZjyLf"]} -{"Format": "IDEA0", "ID": "e9824b47-8270-4af2-8e14-c1a68d9ce411", "DetectTime": "2023-10-30T14:13:11.377925+02:00", "EventTime": "2023-10-30T14:13:11.377941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C11jWF4uxzQbbYgAK6"]} -{"Format": "Json", "ID": "e9824b47-8270-4af2-8e14-c1a68d9ce411", "DetectTime": "2023-10-30T14:13:11.377925+02:00", "EventTime": "2023-10-30T14:13:11.377941+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T06:40:12.528190+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2023/10/30 14:13:11.443356)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "938a189c-3ded-4820-877b-8add6deead70", "DetectTime": "2023-10-30T14:13:11.448904+02:00", "EventTime": "2023-10-30T14:13:11.448921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CHnMcz4efTVvAF3I7"]} -{"Format": "IDEA0", "ID": "0e598631-d45f-4fdc-866e-1c0292b91a14", "DetectTime": "2023-10-30T14:13:11.470534+02:00", "EventTime": "2023-10-30T14:13:11.470552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cszmwj46rZLvrn2GA6"]} -{"Format": "IDEA0", "ID": "c6a64384-8f02-4093-96e1-ce810ce072e6", "DetectTime": "2023-10-30T14:13:11.493116+02:00", "EventTime": "2023-10-30T14:13:11.493140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CZvjcy2yBoyc0toy9"]} -{"Format": "IDEA0", "ID": "a0f58e7b-13a2-43ea-860e-53dca1d18290", "DetectTime": "2023-10-30T14:13:11.515140+02:00", "EventTime": "2023-10-30T14:13:11.515155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CCX0mJTjKyynoRlak"]} -{"Format": "IDEA0", "ID": "b5bae72a-1a7e-4637-85af-d80166496de6", "DetectTime": "2023-10-30T14:13:11.536138+02:00", "EventTime": "2023-10-30T14:13:11.536152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVgq8H3sJ9L1bu17ra"]} -{"Format": "IDEA0", "ID": "9e4b8042-54f7-443f-b30c-6b887f4563fe", "DetectTime": "2023-10-30T14:13:11.556330+02:00", "EventTime": "2023-10-30T14:13:11.556350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Ck0mtWzlRtMwwm9X7"]} -{"Format": "IDEA0", "ID": "cc3cffe2-1e04-4738-8f66-01d7fc71184f", "DetectTime": "2023-10-30T14:13:11.577013+02:00", "EventTime": "2023-10-30T14:13:11.577024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CZDo5e4pGkuw7JpDWe"]} -{"Format": "IDEA0", "ID": "e213a014-c900-4a03-b2c6-dfa0a239bd13", "DetectTime": "2023-10-30T14:13:11.596844+02:00", "EventTime": "2023-10-30T14:13:11.596855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CF1C213HfukEmcuKrf"]} -{"Format": "Json", "ID": "e213a014-c900-4a03-b2c6-dfa0a239bd13", "DetectTime": "2023-10-30T14:13:11.596844+02:00", "EventTime": "2023-10-30T14:13:11.596855+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T06:40:14.010266+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2023/10/30 14:13:11.666486)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "48771de4-802b-4980-b146-6f637a097d57", "DetectTime": "2023-10-30T14:13:11.670802+02:00", "EventTime": "2023-10-30T14:13:11.670819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNcGIR2OzNaSpdHYb8"]} -{"Format": "IDEA0", "ID": "1521e2db-305b-49ca-ac3b-eec798629722", "DetectTime": "2023-10-30T14:13:11.700605+02:00", "EventTime": "2023-10-30T14:13:11.700621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CUXthx3XARAe3oTn6g"]} -{"Format": "IDEA0", "ID": "82b08922-3d49-4890-875d-b1ecbd18e54d", "DetectTime": "2023-10-30T14:13:11.719672+02:00", "EventTime": "2023-10-30T14:13:11.719686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CjzBv52WQed6SMHJc9"]} -{"Format": "IDEA0", "ID": "1d7a4c58-e1bc-40c0-b0da-d890b4928541", "DetectTime": "2023-10-30T14:13:11.738755+02:00", "EventTime": "2023-10-30T14:13:11.738769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CFyWmL2NXMldweLxfc"]} -{"Format": "IDEA0", "ID": "ab967822-3d7d-46b6-a737-b5967484bb59", "DetectTime": "2023-10-30T14:13:11.756526+02:00", "EventTime": "2023-10-30T14:13:11.756542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C6IqGJ3LmZCX9VGP7i"]} -{"Format": "IDEA0", "ID": "a25ee3d5-3b4b-4e6c-97f1-8ced94e11a79", "DetectTime": "2023-10-30T14:13:11.776738+02:00", "EventTime": "2023-10-30T14:13:11.776754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CL2Qq33Q3kDkN71o3"]} -{"Format": "IDEA0", "ID": "9874d5f7-8fec-4d41-9eff-a220e3b95712", "DetectTime": "2023-10-30T14:13:11.796788+02:00", "EventTime": "2023-10-30T14:13:11.796807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CVhCei2HFsl1ivTiZ1"]} -{"Format": "IDEA0", "ID": "8b4481d9-f642-46cb-bbe4-0173c28b4cbd", "DetectTime": "2023-10-30T14:13:11.817301+02:00", "EventTime": "2023-10-30T14:13:11.817318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C3OHMA2qjpfc11k8Vl"]} -{"Format": "IDEA0", "ID": "adcab154-9778-4b48-b13a-2a55d0a72139", "DetectTime": "2023-10-30T14:13:11.833675+02:00", "EventTime": "2023-10-30T14:13:11.833685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CVT9Kg4Z0SAlZdjane"]} -{"Format": "Json", "ID": "adcab154-9778-4b48-b13a-2a55d0a72139", "DetectTime": "2023-10-30T14:13:11.833675+02:00", "EventTime": "2023-10-30T14:13:11.833685+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T06:40:15.970421+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2023/10/30 14:13:11.891366)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7984ae39-208f-49dd-b5ff-93f969eb2aac", "DetectTime": "2023-10-30T14:13:11.896229+02:00", "EventTime": "2023-10-30T14:13:11.896240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cqv8Ud4ZozghzxU3Yk"]} -{"Format": "IDEA0", "ID": "84611fd1-52eb-4c55-8e6b-23b1ef000e94", "DetectTime": "2023-10-30T14:13:11.913196+02:00", "EventTime": "2023-10-30T14:13:11.913211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CaqjjxTjGdAPfMEdj"]} -{"Format": "IDEA0", "ID": "8cb897eb-4825-4c60-9f88-2b818a1cc0ba", "DetectTime": "2023-10-30T14:13:11.937391+02:00", "EventTime": "2023-10-30T14:13:11.937407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNaO0S3doTGQRPmoIf"]} -{"Format": "IDEA0", "ID": "8ae7534e-8099-47a3-b9f0-f0ad317c874a", "DetectTime": "2023-10-30T14:13:11.953847+02:00", "EventTime": "2023-10-30T14:13:11.953864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CLzbxa4GekpBx3Uvo4"]} -{"Format": "IDEA0", "ID": "6bc60df0-b9f1-4f8d-8d24-b534dcfc8ce4", "DetectTime": "2023-10-30T14:13:11.970845+02:00", "EventTime": "2023-10-30T14:13:11.970860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C5MeVt4Bz5KjY5TPy1"]} -{"Format": "IDEA0", "ID": "7da6cb41-79f9-4bc5-9cfa-cb0b1097d1be", "DetectTime": "2023-10-30T14:13:11.987179+02:00", "EventTime": "2023-10-30T14:13:11.987191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cjeelq4PIAyiLOtpLd"]} -{"Format": "IDEA0", "ID": "b45705f2-5a07-49df-81b5-46d2319d0266", "DetectTime": "2023-10-30T14:13:12.005227+02:00", "EventTime": "2023-10-30T14:13:12.005252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CX34fX3ngcTMZDl79k"]} -{"Format": "IDEA0", "ID": "b7494c7d-7219-4a77-9629-bfb7636fc434", "DetectTime": "2023-10-30T14:13:12.030147+02:00", "EventTime": "2023-10-30T14:13:12.030160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CeNTRF4NxrvURT8gW"]} -{"Format": "IDEA0", "ID": "a477f553-7746-41f4-825b-cd9953f65ab5", "DetectTime": "2023-10-30T14:13:12.061101+02:00", "EventTime": "2023-10-30T14:13:12.061116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CLVdLy4GqVayRkhdM3"]} -{"Format": "IDEA0", "ID": "245d00ce-c71e-4a32-a092-765fe9f7c9d6", "DetectTime": "2023-10-30T14:13:12.090012+02:00", "EventTime": "2023-10-30T14:13:12.090028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cte00UJ12iZoQBemf"]} -{"Format": "IDEA0", "ID": "9b9f5c10-ffb5-451c-bdd7-7a0c3d1074b9", "DetectTime": "2023-10-30T14:13:12.122333+02:00", "EventTime": "2023-10-30T14:13:12.122355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CT7gVG3277mLpCEko2"]} -{"Format": "IDEA0", "ID": "24f737a1-48d0-4619-91d5-7315f57dd7a5", "DetectTime": "2023-10-30T14:13:12.154851+02:00", "EventTime": "2023-10-30T14:13:12.154871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLAwO1Fs0dxDa3HC3"]} -{"Format": "IDEA0", "ID": "771664e0-79a4-4c49-a91f-4656adeba7fc", "DetectTime": "2023-10-30T14:13:12.184768+02:00", "EventTime": "2023-10-30T14:13:12.184780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CtSG3c4rsIKQcc5LT7"]} -{"Format": "IDEA0", "ID": "0f562557-9674-41e9-814e-4e41966d4f20", "DetectTime": "2023-10-30T14:13:12.216241+02:00", "EventTime": "2023-10-30T14:13:12.216257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CqKwWB4rdzuYd9Qarl"]} -{"Format": "IDEA0", "ID": "3a2e905d-04ff-48aa-aba1-e5d2429757d8", "DetectTime": "2023-10-30T14:13:12.246850+02:00", "EventTime": "2023-10-30T14:13:12.246868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cdlymp22OkKoBPdQOa"]} -{"Format": "Json", "ID": "3a2e905d-04ff-48aa-aba1-e5d2429757d8", "DetectTime": "2023-10-30T14:13:12.246850+02:00", "EventTime": "2023-10-30T14:13:12.246868+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T07:10:31.223222+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2023/10/30 14:13:12.321596)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d02598bd-8708-4e2c-a0c4-be02e0738ad7", "DetectTime": "2023-10-30T14:13:12.327483+02:00", "EventTime": "2023-10-30T14:13:12.327499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CuT6cC13aJLsRnolI2"]} -{"Format": "IDEA0", "ID": "6d79dc30-2b97-4c23-a8ae-785e738a455a", "DetectTime": "2023-10-30T14:13:12.353510+02:00", "EventTime": "2023-10-30T14:13:12.353525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CKpx5j4azr0YS1tmv3"]} -{"Format": "IDEA0", "ID": "9496a342-e604-4159-bd5e-5f459b42fc92", "DetectTime": "2023-10-30T14:13:12.379082+02:00", "EventTime": "2023-10-30T14:13:12.379098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C6kYNH2taVzcElAEL2"]} -{"Format": "IDEA0", "ID": "0c44838f-ee6c-4533-a82b-f852398b36ee", "DetectTime": "2023-10-30T14:13:12.409626+02:00", "EventTime": "2023-10-30T14:13:12.409647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CzvxTA4IPdYumiCaC9"]} -{"Format": "IDEA0", "ID": "7370a9ef-269f-4dab-8d8a-b229454fcdb9", "DetectTime": "2023-10-30T14:13:12.438671+02:00", "EventTime": "2023-10-30T14:13:12.438684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CJpaNN2wJyoLJnhbGj"]} -{"Format": "IDEA0", "ID": "ee7bc783-df47-419d-958d-dacbde811b49", "DetectTime": "2023-10-30T14:13:12.460995+02:00", "EventTime": "2023-10-30T14:13:12.461007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cz1Y5T1AdNHSBLvKn3"]} -{"Format": "IDEA0", "ID": "afce4d1c-eac6-4046-b9b5-d5f05c9d8612", "DetectTime": "2023-10-30T14:13:12.485623+02:00", "EventTime": "2023-10-30T14:13:12.485634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C77saD1w0wNoKTPei4"]} -{"Format": "IDEA0", "ID": "c66bf915-5830-4f55-83df-0590c59aedfe", "DetectTime": "2023-10-30T14:13:12.506812+02:00", "EventTime": "2023-10-30T14:13:12.506824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFaAhl2BTzXptNXxDe"]} -{"Format": "IDEA0", "ID": "4ff793db-f71b-4097-9c5e-9036dbf6e532", "DetectTime": "2023-10-30T14:13:12.529609+02:00", "EventTime": "2023-10-30T14:13:12.529625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZMKE81sAr906p0Ozj"]} -{"Format": "Json", "ID": "4ff793db-f71b-4097-9c5e-9036dbf6e532", "DetectTime": "2023-10-30T14:13:12.529609+02:00", "EventTime": "2023-10-30T14:13:12.529625+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T07:10:50.051547+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2023/10/30 14:13:12.583918)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "37ab8dd2-d926-463a-b9ac-17294ab0a4ca", "DetectTime": "2023-10-30T14:13:12.588625+02:00", "EventTime": "2023-10-30T14:13:12.588641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CzgGt04jwd9BsOVAg6"]} -{"Format": "IDEA0", "ID": "e71989c1-485b-4072-89d5-d8cbb4fbcc18", "DetectTime": "2023-10-30T14:13:12.617466+02:00", "EventTime": "2023-10-30T14:13:12.617478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CgU4zg17RFr5whqTSg"]} -{"Format": "IDEA0", "ID": "0ae6c34e-1d82-4c9b-816c-76617ff5cca9", "DetectTime": "2023-10-30T14:13:12.641739+02:00", "EventTime": "2023-10-30T14:13:12.641751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["ChLIM03uOA1Bs24Izj"]} -{"Format": "IDEA0", "ID": "ba55230b-1e1a-434c-a875-f502abf46ff3", "DetectTime": "2023-10-30T14:13:12.668180+02:00", "EventTime": "2023-10-30T14:13:12.668196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CrPW0o1eGUUK1pTBIa"]} -{"Format": "IDEA0", "ID": "4f326824-b705-4d6e-a0bd-6f85ba68edb5", "DetectTime": "2023-10-30T14:13:12.693416+02:00", "EventTime": "2023-10-30T14:13:12.693445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C5H8F83mDYzbFrlPx"]} -{"Format": "IDEA0", "ID": "6b117f65-f16e-4d8f-a267-49bea26a5450", "DetectTime": "2023-10-30T14:13:12.721230+02:00", "EventTime": "2023-10-30T14:13:12.721246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CGAzoRqVvjwttEJRi"]} -{"Format": "IDEA0", "ID": "7a6d62fc-52c0-4073-9c5a-6e819b436380", "DetectTime": "2023-10-30T14:13:12.833701+02:00", "EventTime": "2023-10-30T14:13:12.833715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CFAcVY2YimhN4z59k"]} -{"Format": "IDEA0", "ID": "e72236be-48c1-4ae4-8e93-3a739724064e", "DetectTime": "2023-10-30T14:13:12.863143+02:00", "EventTime": "2023-10-30T14:13:12.863156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CbTSGU2Tec8WjQnXSj"]} -{"Format": "IDEA0", "ID": "fda70354-edc3-4e06-8a05-4fc852919ada", "DetectTime": "2023-10-30T14:13:12.889213+02:00", "EventTime": "2023-10-30T14:13:12.889228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cm1T11bXX8lsFjvFa"]} -{"Format": "Json", "ID": "fda70354-edc3-4e06-8a05-4fc852919ada", "DetectTime": "2023-10-30T14:13:12.889213+02:00", "EventTime": "2023-10-30T14:13:12.889228+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T07:10:51.996051+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2023/10/30 14:13:12.963175)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f9f7cf9-9310-4cf5-a817-ef9d2e25b630", "DetectTime": "2023-10-30T14:13:12.968404+02:00", "EventTime": "2023-10-30T14:13:12.968419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CWrKuX39MKPjfrsFA7"]} -{"Format": "IDEA0", "ID": "87231159-370e-44b9-a179-78f39045e38f", "DetectTime": "2023-10-30T14:13:12.994086+02:00", "EventTime": "2023-10-30T14:13:12.994106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CGRGjxDuZh48NEJ8a"]} -{"Format": "IDEA0", "ID": "bdbd451e-6dcf-491f-8a24-156283f5a7e2", "DetectTime": "2023-10-30T14:13:13.018879+02:00", "EventTime": "2023-10-30T14:13:13.018891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9CSje2WQi15xphUyh"]} -{"Format": "IDEA0", "ID": "4f906021-7b23-4b73-8650-57b730743295", "DetectTime": "2023-10-30T14:13:13.040532+02:00", "EventTime": "2023-10-30T14:13:13.040546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CwwVez43MossVGgy92"]} -{"Format": "IDEA0", "ID": "354323c4-10e2-42da-97b4-1e8dd27bc6d0", "DetectTime": "2023-10-30T14:13:13.061273+02:00", "EventTime": "2023-10-30T14:13:13.061290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Ck7jXB34GFGnBEKFpb"]} -{"Format": "IDEA0", "ID": "2a959fd0-698f-439e-86b0-61995f15e4a9", "DetectTime": "2023-10-30T14:13:13.085338+02:00", "EventTime": "2023-10-30T14:13:13.085358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CRjYii1jxt8fdcuk0g"]} -{"Format": "IDEA0", "ID": "5cd6bf44-22fa-4ccf-b845-3ea36314d1d9", "DetectTime": "2023-10-30T14:13:13.107854+02:00", "EventTime": "2023-10-30T14:13:13.107865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CPc0BV2ZD5VVI7JdBl"]} -{"Format": "IDEA0", "ID": "900c9475-6e2f-4c5e-86e0-003e21f6f610", "DetectTime": "2023-10-30T14:13:13.131217+02:00", "EventTime": "2023-10-30T14:13:13.131228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CtRGmt4s3tI8Nlw1Ef"]} -{"Format": "Json", "ID": "900c9475-6e2f-4c5e-86e0-003e21f6f610", "DetectTime": "2023-10-30T14:13:13.131217+02:00", "EventTime": "2023-10-30T14:13:13.131228+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T07:41:34.430696+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2023/10/30 14:13:13.193490)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3f5b9d49-4b47-4981-b706-6245a020b623", "DetectTime": "2023-10-30T14:13:13.198884+02:00", "EventTime": "2023-10-30T14:13:13.198909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CuktAi1SX9wCssak8d"]} -{"Format": "IDEA0", "ID": "14016ffb-cf06-46df-a512-a1ec609a84b9", "DetectTime": "2023-10-30T14:13:13.220553+02:00", "EventTime": "2023-10-30T14:13:13.220568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C38pF2deP6700Qbm5"]} -{"Format": "IDEA0", "ID": "8933b402-518a-4e14-8733-b2a253122471", "DetectTime": "2023-10-30T14:13:13.241926+02:00", "EventTime": "2023-10-30T14:13:13.241939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVcMvWS2sxQuceoA7"]} -{"Format": "IDEA0", "ID": "a9dd18b4-ec46-457c-9509-7a99acbcce54", "DetectTime": "2023-10-30T14:13:13.257936+02:00", "EventTime": "2023-10-30T14:13:13.257950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CT64dc1QzmqYOwW7kd"]} -{"Format": "IDEA0", "ID": "1cb6335f-0368-421b-903b-b148ad92e8ae", "DetectTime": "2023-10-30T14:13:13.279856+02:00", "EventTime": "2023-10-30T14:13:13.279874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CkRbAL2E6XyOzbXRtb"]} -{"Format": "IDEA0", "ID": "09b3e163-cb19-4c34-ab7f-3181e0355163", "DetectTime": "2023-10-30T14:13:13.302040+02:00", "EventTime": "2023-10-30T14:13:13.302055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4aolJgobvHRgK3Wb"]} -{"Format": "IDEA0", "ID": "1ac0c005-1eb1-4989-8d05-2072af272a05", "DetectTime": "2023-10-30T14:13:13.322342+02:00", "EventTime": "2023-10-30T14:13:13.322353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CMCMpb3zzLtKaGQTqa"]} -{"Format": "IDEA0", "ID": "e51ac841-dd2c-4b91-bcab-b1d6524d4cb6", "DetectTime": "2023-10-30T14:13:13.341999+02:00", "EventTime": "2023-10-30T14:13:13.342015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CjkWZ64LDRZwSjHmjg"]} -{"Format": "IDEA0", "ID": "55e0bbf4-b6ba-4884-9055-e61725214b3c", "DetectTime": "2023-10-30T14:13:13.361080+02:00", "EventTime": "2023-10-30T14:13:13.361092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CPzL0i2SJYJNYCcI3b"]} -{"Format": "Json", "ID": "55e0bbf4-b6ba-4884-9055-e61725214b3c", "DetectTime": "2023-10-30T14:13:13.361080+02:00", "EventTime": "2023-10-30T14:13:13.361092+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T07:41:36.631768+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2023/10/30 14:13:13.416833)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e6889d64-e784-4de1-8bd6-eeca937624f9", "DetectTime": "2023-10-30T14:13:13.420697+02:00", "EventTime": "2023-10-30T14:13:13.420707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMfmDM3uhOWlcJm971"]} -{"Format": "IDEA0", "ID": "afdde291-bf6d-4c44-9429-849601c110da", "DetectTime": "2023-10-30T14:13:13.440736+02:00", "EventTime": "2023-10-30T14:13:13.440753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CG9DKA4fghSEaAZET"]} -{"Format": "IDEA0", "ID": "6a45a83d-1665-44fe-bb43-4aa4141f66a3", "DetectTime": "2023-10-30T14:13:13.457366+02:00", "EventTime": "2023-10-30T14:13:13.457384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C5FFLyVFahYMltwp8"]} -{"Format": "IDEA0", "ID": "15c51d81-da8c-4746-8f89-82391ee21931", "DetectTime": "2023-10-30T14:13:13.472362+02:00", "EventTime": "2023-10-30T14:13:13.472372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CXuMWi1lchTX3NUXmi"]} -{"Format": "IDEA0", "ID": "afd2b520-336e-4265-833f-69a8a688919b", "DetectTime": "2023-10-30T14:13:13.486454+02:00", "EventTime": "2023-10-30T14:13:13.486466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CX9NYZ2eJwyOZiG8fc"]} -{"Format": "IDEA0", "ID": "8440778e-9371-47cd-a474-20c29bd7479d", "DetectTime": "2023-10-30T14:13:13.509999+02:00", "EventTime": "2023-10-30T14:13:13.510018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CJewlq3B7lLhhdM7Bb"]} -{"Format": "IDEA0", "ID": "efb22471-1922-4de6-a2c7-47a0616b502d", "DetectTime": "2023-10-30T14:13:13.529473+02:00", "EventTime": "2023-10-30T14:13:13.529485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CpAGb62yeetbgz8Cjj"]} -{"Format": "IDEA0", "ID": "22e733b5-9eb2-46b3-9ef8-665f7abd76d1", "DetectTime": "2023-10-30T14:13:13.551281+02:00", "EventTime": "2023-10-30T14:13:13.551297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CgIqXI3XqNPJU40CQk"]} -{"Format": "IDEA0", "ID": "d2e3968b-719a-44f4-9e0e-982f3038a6df", "DetectTime": "2023-10-30T14:13:13.572893+02:00", "EventTime": "2023-10-30T14:13:13.572912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CeLSmJ1mUsT6JU5i1a"]} -{"Format": "Json", "ID": "d2e3968b-719a-44f4-9e0e-982f3038a6df", "DetectTime": "2023-10-30T14:13:13.572893+02:00", "EventTime": "2023-10-30T14:13:13.572912+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T07:41:38.169042+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2023/10/30 14:13:13.618675)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "19d39368-2bda-4c93-8a34-4cdc1f850319", "DetectTime": "2023-10-30T14:13:13.622629+02:00", "EventTime": "2023-10-30T14:13:13.622640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CogApE3myCia3KI2ok"]} -{"Format": "IDEA0", "ID": "7eeb4086-8be0-4579-b742-1e058dbefd99", "DetectTime": "2023-10-30T14:13:13.636318+02:00", "EventTime": "2023-10-30T14:13:13.636330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CWTUG13FvlIyKNyUM1"]} -{"Format": "IDEA0", "ID": "070ee335-f0c9-4308-b388-092a0dfeb969", "DetectTime": "2023-10-30T14:13:13.654879+02:00", "EventTime": "2023-10-30T14:13:13.654895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0wOx71Hjg1y0Axa6f"]} -{"Format": "IDEA0", "ID": "fccf61f1-450a-4659-b9cd-696488cb6b03", "DetectTime": "2023-10-30T14:13:13.673454+02:00", "EventTime": "2023-10-30T14:13:13.673469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CBNZZTZGhUyLlJx0a"]} -{"Format": "IDEA0", "ID": "52c1ae0b-cb2a-4a33-9b3d-7839d132e59a", "DetectTime": "2023-10-30T14:13:13.690384+02:00", "EventTime": "2023-10-30T14:13:13.690395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CjLAMa3xCp1vvMsHWe"]} -{"Format": "IDEA0", "ID": "89fb1a8a-4af6-4cf6-b3f8-df4767c72b2a", "DetectTime": "2023-10-30T14:13:13.705914+02:00", "EventTime": "2023-10-30T14:13:13.705929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvqjR44ks1avBYQZgd"]} -{"Format": "IDEA0", "ID": "3094ff08-dfa3-4041-b2c5-0443bf185df0", "DetectTime": "2023-10-30T14:13:13.736770+02:00", "EventTime": "2023-10-30T14:13:13.736787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CD8EIB2RP2iaB6nIhc"]} -{"Format": "IDEA0", "ID": "db364763-33c9-4205-b33d-6f22cee0e0e3", "DetectTime": "2023-10-30T14:13:13.761222+02:00", "EventTime": "2023-10-30T14:13:13.761240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CTvdmcomFtZ4RMGyf"]} -{"Format": "IDEA0", "ID": "7ea4e0cb-0acb-4c1a-bd64-d5afd388d8ae", "DetectTime": "2023-10-30T14:13:13.790246+02:00", "EventTime": "2023-10-30T14:13:13.790262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CJCfBHqRtOeRQQve4"]} -{"Format": "IDEA0", "ID": "c7846d55-cc90-41bf-9bbf-f57c35296d61", "DetectTime": "2023-10-30T14:13:13.822076+02:00", "EventTime": "2023-10-30T14:13:13.822091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CADB1qkh8tZjUhE95"]} -{"Format": "IDEA0", "ID": "483f596e-bece-4630-9d9b-1fcecf81f476", "DetectTime": "2023-10-30T14:13:13.853865+02:00", "EventTime": "2023-10-30T14:13:13.853884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C5tQKs1CyyBcmETdTg"]} -{"Format": "IDEA0", "ID": "e6b7ab77-234f-43ef-9586-b8f3637d36d0", "DetectTime": "2023-10-30T14:13:13.882388+02:00", "EventTime": "2023-10-30T14:13:13.882405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cap0I42SfmS4U9NLak"]} -{"Format": "IDEA0", "ID": "40fe67fe-5046-4098-8c6c-9f339b41c610", "DetectTime": "2023-10-30T14:13:13.914409+02:00", "EventTime": "2023-10-30T14:13:13.914422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cpq8aoK878J7pGjNa"]} -{"Format": "IDEA0", "ID": "580d5c2d-d396-4279-ba20-21a1833b4584", "DetectTime": "2023-10-30T14:13:13.937723+02:00", "EventTime": "2023-10-30T14:13:13.937735+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CdvKMt2x9N9rTNOBDd"]} -{"Format": "Json", "ID": "580d5c2d-d396-4279-ba20-21a1833b4584", "DetectTime": "2023-10-30T14:13:13.937723+02:00", "EventTime": "2023-10-30T14:13:13.937735+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T08:11:57.249016+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2023/10/30 14:13:14.005040)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6ef5776-3b1a-499d-bc35-e85f21149d7c", "DetectTime": "2023-10-30T14:13:14.010527+02:00", "EventTime": "2023-10-30T14:13:14.010543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CyfPNh1db03Sr9u9Xl"]} -{"Format": "IDEA0", "ID": "5b420a4f-0017-4e38-974e-0d3ac9aba829", "DetectTime": "2023-10-30T14:13:14.041169+02:00", "EventTime": "2023-10-30T14:13:14.041188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CM9It51gjV0PmCBicb"]} -{"Format": "IDEA0", "ID": "9782a8db-e0dc-489c-86b4-25e18972c812", "DetectTime": "2023-10-30T14:13:14.070361+02:00", "EventTime": "2023-10-30T14:13:14.070378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CLpmHp3wNDanVuIs0i"]} -{"Format": "IDEA0", "ID": "94c36410-e672-41fd-8cd9-849fde836d22", "DetectTime": "2023-10-30T14:13:14.094403+02:00", "EventTime": "2023-10-30T14:13:14.094415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C9XBnPPiL6kQvAn0e"]} -{"Format": "IDEA0", "ID": "24853316-e0ec-40ce-9375-bb46850acea1", "DetectTime": "2023-10-30T14:13:14.120826+02:00", "EventTime": "2023-10-30T14:13:14.120836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CRNdWt4jqnZzCo4lQi"]} -{"Format": "IDEA0", "ID": "8348efd6-f704-45f2-9b26-1634011a1550", "DetectTime": "2023-10-30T14:13:14.144446+02:00", "EventTime": "2023-10-30T14:13:14.144457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CLphxM1nePHv3cXKJ3"]} -{"Format": "IDEA0", "ID": "2d2d1ff3-fa8c-4db2-bb9a-f00e6e86db64", "DetectTime": "2023-10-30T14:13:14.168001+02:00", "EventTime": "2023-10-30T14:13:14.168017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Ct7tr53Ph1bLEW4zk7"]} -{"Format": "IDEA0", "ID": "c8510de0-661d-4446-8b31-70ee9fb31a2d", "DetectTime": "2023-10-30T14:13:14.197409+02:00", "EventTime": "2023-10-30T14:13:14.197427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CNwsri4aJU1tSRSuue"]} -{"Format": "Json", "ID": "c8510de0-661d-4446-8b31-70ee9fb31a2d", "DetectTime": "2023-10-30T14:13:14.197409+02:00", "EventTime": "2023-10-30T14:13:14.197427+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T08:11:58.887482+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2023/10/30 14:13:14.273462)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b4db83f5-f9b2-485c-a3e2-efdddf6aa151", "DetectTime": "2023-10-30T14:13:14.281217+02:00", "EventTime": "2023-10-30T14:13:14.281229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CtoI3K3zxE0y1yztwb"]} -{"Format": "IDEA0", "ID": "2579b2c1-5e80-4886-8be9-4ace27d435aa", "DetectTime": "2023-10-30T14:13:14.307625+02:00", "EventTime": "2023-10-30T14:13:14.307637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CdUEJqWA6dIA6EE1"]} -{"Format": "IDEA0", "ID": "00ef7aac-ea7c-4ba2-96db-69e2b118fa7e", "DetectTime": "2023-10-30T14:13:14.327858+02:00", "EventTime": "2023-10-30T14:13:14.327869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CzTjBzLZHu4MCqNrd"]} -{"Format": "IDEA0", "ID": "91d64012-635e-47ec-9f03-1b47f7035408", "DetectTime": "2023-10-30T14:13:14.350982+02:00", "EventTime": "2023-10-30T14:13:14.350995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C5wSgp7Pp2BVEwBNb"]} -{"Format": "IDEA0", "ID": "c9277065-1e36-495a-8763-7d8d769afaff", "DetectTime": "2023-10-30T14:13:14.377181+02:00", "EventTime": "2023-10-30T14:13:14.377196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CYofLW3VJSC5X4rjte"]} -{"Format": "IDEA0", "ID": "25915553-56bf-4e36-bae4-3095fa85a60e", "DetectTime": "2023-10-30T14:13:14.402212+02:00", "EventTime": "2023-10-30T14:13:14.402222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGYP9Q2G9GA7m6LnXl"]} -{"Format": "IDEA0", "ID": "267d21b9-16f3-4d00-8651-aca16f757aad", "DetectTime": "2023-10-30T14:13:14.420797+02:00", "EventTime": "2023-10-30T14:13:14.420807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CbYORf3xrrkp67wxmg"]} -{"Format": "IDEA0", "ID": "2951c5b6-8932-4841-9c7e-8ee2201ac709", "DetectTime": "2023-10-30T14:13:14.513856+02:00", "EventTime": "2023-10-30T14:13:14.513884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CpT7a82vDWValM0aQl"]} -{"Format": "IDEA0", "ID": "d552c0a2-93f8-4be3-b86f-40b0ed1cafdc", "DetectTime": "2023-10-30T14:13:14.540292+02:00", "EventTime": "2023-10-30T14:13:14.540304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CUNQHbVAhR9GbOu7l"]} -{"Format": "Json", "ID": "d552c0a2-93f8-4be3-b86f-40b0ed1cafdc", "DetectTime": "2023-10-30T14:13:14.540292+02:00", "EventTime": "2023-10-30T14:13:14.540304+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T08:12:00.412587+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2023/10/30 14:13:14.608917)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6578632c-da52-4fc0-b2c6-f34479b2791c", "DetectTime": "2023-10-30T14:13:14.614661+02:00", "EventTime": "2023-10-30T14:13:14.614680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cjpgj61895n1AONDY7"]} -{"Format": "IDEA0", "ID": "cff9bfd1-f8ee-4cbe-aa44-dffe7abe9094", "DetectTime": "2023-10-30T14:13:14.644111+02:00", "EventTime": "2023-10-30T14:13:14.644129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CvBGsb3JL8WVL9qmFh"]} -{"Format": "IDEA0", "ID": "a9396e27-2f63-416d-b131-588753079b90", "DetectTime": "2023-10-30T14:13:14.664955+02:00", "EventTime": "2023-10-30T14:13:14.664966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C4SUxo3c1xRn9pzo04"]} -{"Format": "IDEA0", "ID": "5eb9dae1-8657-4d21-8752-ece99dec9df5", "DetectTime": "2023-10-30T14:13:14.682948+02:00", "EventTime": "2023-10-30T14:13:14.682962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CC8bX23mEjXny5eOOk"]} -{"Format": "IDEA0", "ID": "c05c78eb-f084-4ad4-9f97-155ff582d51d", "DetectTime": "2023-10-30T14:13:14.708779+02:00", "EventTime": "2023-10-30T14:13:14.708797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZQFP84uCj8ASpAU7h"]} -{"Format": "IDEA0", "ID": "b8920f4e-1581-4847-829a-62b92981141a", "DetectTime": "2023-10-30T14:13:14.733667+02:00", "EventTime": "2023-10-30T14:13:14.733692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CRWsGV1oxgjJv6VYX9"]} -{"Format": "IDEA0", "ID": "59236a16-74f1-47f8-be2f-f355fb6f1f5f", "DetectTime": "2023-10-30T14:13:14.757146+02:00", "EventTime": "2023-10-30T14:13:14.757162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C4fAC8estT2cd5ao4"]} -{"Format": "IDEA0", "ID": "62773e54-ba41-46ee-96f8-e77001055682", "DetectTime": "2023-10-30T14:13:14.777727+02:00", "EventTime": "2023-10-30T14:13:14.777743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C9rYCsqGVRk2B1Mog"]} -{"Format": "IDEA0", "ID": "33409191-ba2c-4ffa-a671-66159184f475", "DetectTime": "2023-10-30T14:13:14.804161+02:00", "EventTime": "2023-10-30T14:13:14.804176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CXkb2M2JuuL21dcxE2"]} -{"Format": "Json", "ID": "33409191-ba2c-4ffa-a671-66159184f475", "DetectTime": "2023-10-30T14:13:14.804161+02:00", "EventTime": "2023-10-30T14:13:14.804176+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T08:42:17.217462+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2023/10/30 14:13:14.868915)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9941ce2a-0a51-41da-a07f-58438b2acb59", "DetectTime": "2023-10-30T14:13:14.873267+02:00", "EventTime": "2023-10-30T14:13:14.873278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CRHi3D3n7uWZZS7ce7"]} -{"Format": "IDEA0", "ID": "26a8a06e-32a6-47fa-a22e-253c46ad0ff9", "DetectTime": "2023-10-30T14:13:14.893072+02:00", "EventTime": "2023-10-30T14:13:14.893085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJmrTN2o1xouDNHTe3"]} -{"Format": "IDEA0", "ID": "a25ed373-78cc-4917-974c-182586ed36ef", "DetectTime": "2023-10-30T14:13:14.915505+02:00", "EventTime": "2023-10-30T14:13:14.915522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CM2YMx4R5QzARRqN4i"]} -{"Format": "IDEA0", "ID": "b97f3c23-9485-41de-a263-b8a3559b254e", "DetectTime": "2023-10-30T14:13:14.934966+02:00", "EventTime": "2023-10-30T14:13:14.934982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C5i85x2zzL4gOZgaSl"]} -{"Format": "IDEA0", "ID": "678d15b5-369e-480a-a4ab-e9c728f4606e", "DetectTime": "2023-10-30T14:13:14.951649+02:00", "EventTime": "2023-10-30T14:13:14.951662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CsmDuDmBGBPFMytsh"]} -{"Format": "IDEA0", "ID": "c357b4bf-d7c4-4b61-9e6d-6f5e99f75005", "DetectTime": "2023-10-30T14:13:14.969343+02:00", "EventTime": "2023-10-30T14:13:14.969354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CMuz9I17ZurQ0mXOs9"]} -{"Format": "IDEA0", "ID": "9abcb38b-a080-4bea-b0c6-6ab7145680bb", "DetectTime": "2023-10-30T14:13:14.989265+02:00", "EventTime": "2023-10-30T14:13:14.989282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CDPxmy4lZry0R47vul"]} -{"Format": "IDEA0", "ID": "fecb92c2-5c2e-4627-a902-1335a9aadfdd", "DetectTime": "2023-10-30T14:13:15.008056+02:00", "EventTime": "2023-10-30T14:13:15.008068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CKp2pxJPDQJTC6jW"]} -{"Format": "Json", "ID": "fecb92c2-5c2e-4627-a902-1335a9aadfdd", "DetectTime": "2023-10-30T14:13:15.008056+02:00", "EventTime": "2023-10-30T14:13:15.008068+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T08:42:18.816215+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2023/10/30 14:13:15.065192)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7d4f6665-ab51-4dca-904f-18b8f78cd8ec", "DetectTime": "2023-10-30T14:13:15.069741+02:00", "EventTime": "2023-10-30T14:13:15.069752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CFlTxceYaPVicY454"]} -{"Format": "IDEA0", "ID": "fc5b1a50-6ae3-452a-be02-04615ddc0131", "DetectTime": "2023-10-30T14:13:15.090415+02:00", "EventTime": "2023-10-30T14:13:15.090430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3G2eq3aagta3Xxtd7"]} -{"Format": "IDEA0", "ID": "388d55f2-401a-4c1b-a748-452e08f9dbac", "DetectTime": "2023-10-30T14:13:15.106713+02:00", "EventTime": "2023-10-30T14:13:15.106734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C5B0rprF3xefZ2PQl"]} -{"Format": "IDEA0", "ID": "98e1fb26-ab5a-4a2c-a1b5-40a2c815d1ff", "DetectTime": "2023-10-30T14:13:15.124081+02:00", "EventTime": "2023-10-30T14:13:15.124101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CumOOv4bS3SRuaoxvh"]} -{"Format": "IDEA0", "ID": "35ae165d-05b4-4472-961f-3dc73349edb2", "DetectTime": "2023-10-30T14:13:15.143327+02:00", "EventTime": "2023-10-30T14:13:15.143345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CFXnodVvYLy4KiDo"]} -{"Format": "IDEA0", "ID": "8224382f-90eb-4742-ac1e-eb9176159c23", "DetectTime": "2023-10-30T14:13:15.164598+02:00", "EventTime": "2023-10-30T14:13:15.164609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CShzMv4EiJDOt79GR8"]} -{"Format": "IDEA0", "ID": "2e3494bd-0c3f-442f-a612-fcb4c79ecfcf", "DetectTime": "2023-10-30T14:13:15.180231+02:00", "EventTime": "2023-10-30T14:13:15.180246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C3XMt87R7IVdwbsE"]} -{"Format": "IDEA0", "ID": "e7a50fd9-2a60-404e-b396-5a1364d66506", "DetectTime": "2023-10-30T14:13:15.198245+02:00", "EventTime": "2023-10-30T14:13:15.198257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CqAfRBMqeaa35l7Xf"]} -{"Format": "IDEA0", "ID": "043a91ab-e95c-42df-a763-7be0a3d9081d", "DetectTime": "2023-10-30T14:13:15.215455+02:00", "EventTime": "2023-10-30T14:13:15.215466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CCNGuC16ddHudZk7lc"]} -{"Format": "Json", "ID": "043a91ab-e95c-42df-a763-7be0a3d9081d", "DetectTime": "2023-10-30T14:13:15.215455+02:00", "EventTime": "2023-10-30T14:13:15.215466+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T08:42:20.880010+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2023/10/30 14:13:15.272386)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "51a00c08-7913-4302-bdc7-b75e90dd6b93", "DetectTime": "2023-10-30T14:13:15.276390+02:00", "EventTime": "2023-10-30T14:13:15.276408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CxXKH52aTFairmpvma"]} -{"Format": "IDEA0", "ID": "b93fbf6d-65f5-49c2-be18-b98f69913a5d", "DetectTime": "2023-10-30T14:13:15.297542+02:00", "EventTime": "2023-10-30T14:13:15.297554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CUQhoFHHcggfAxEuk"]} -{"Format": "IDEA0", "ID": "2ebff1dd-08c8-47d1-85f7-aac841dcbca6", "DetectTime": "2023-10-30T14:13:15.312008+02:00", "EventTime": "2023-10-30T14:13:15.312019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CaZ5hg4ibZc6fmjj2k"]} -{"Format": "IDEA0", "ID": "47be6a2b-4e76-4f3f-800f-d702bf0e815b", "DetectTime": "2023-10-30T14:13:15.328435+02:00", "EventTime": "2023-10-30T14:13:15.328446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cl9Ll73bxfuz499Okd"]} -{"Format": "IDEA0", "ID": "4d3ca38e-6edd-4359-9b5d-1a8ce4c8f281", "DetectTime": "2023-10-30T14:13:15.343255+02:00", "EventTime": "2023-10-30T14:13:15.343266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CYPE6l3IifsZxCPJdl"]} -{"Format": "IDEA0", "ID": "2742082a-1e8a-4307-8c97-730d8ba1ec54", "DetectTime": "2023-10-30T14:13:15.359794+02:00", "EventTime": "2023-10-30T14:13:15.359812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CXZ4Ya1iGb9ittmaG1"]} -{"Format": "IDEA0", "ID": "4220bc38-0069-42f9-82a1-6425c2116360", "DetectTime": "2023-10-30T14:13:15.377650+02:00", "EventTime": "2023-10-30T14:13:15.377666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CUmRC31fTxzpMFcZXf"]} -{"Format": "IDEA0", "ID": "1f82cbca-a026-44a9-a1dd-97154cb6744a", "DetectTime": "2023-10-30T14:13:15.404808+02:00", "EventTime": "2023-10-30T14:13:15.404826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBJ9Gl4jnlCsv2nIIi"]} -{"Format": "IDEA0", "ID": "9cd14dfb-fef4-4809-9cf9-a9207500d098", "DetectTime": "2023-10-30T14:13:15.438641+02:00", "EventTime": "2023-10-30T14:13:15.438656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Ct9KWu1PK99uul02Ea"]} -{"Format": "IDEA0", "ID": "57b9df23-b6dd-457d-9994-615f5f15150e", "DetectTime": "2023-10-30T14:13:15.470081+02:00", "EventTime": "2023-10-30T14:13:15.470092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CkeSj51G1yq1mL8QQb"]} -{"Format": "IDEA0", "ID": "decfc317-80bd-4732-89e5-b9171d0feec5", "DetectTime": "2023-10-30T14:13:15.503800+02:00", "EventTime": "2023-10-30T14:13:15.503815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CcuuP43sqaX8LqAXY5"]} -{"Format": "IDEA0", "ID": "a11d8b30-0887-4eb1-ae96-87df2c6e0483", "DetectTime": "2023-10-30T14:13:15.528641+02:00", "EventTime": "2023-10-30T14:13:15.528654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CNKLRz4hbOTgb1fpcj"]} -{"Format": "IDEA0", "ID": "e308a378-0470-4692-a2de-85d0e0926ff0", "DetectTime": "2023-10-30T14:13:15.559833+02:00", "EventTime": "2023-10-30T14:13:15.559848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C8HARQ3LWxu0T5fcy8"]} -{"Format": "IDEA0", "ID": "12f91a6b-5524-49ea-8c7c-c473ec889cc1", "DetectTime": "2023-10-30T14:13:15.588295+02:00", "EventTime": "2023-10-30T14:13:15.588306+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cf6LO6HTME2EHQmTj"]} -{"Format": "IDEA0", "ID": "c02d43ce-bbb5-4835-904e-9fcb9f73b4ea", "DetectTime": "2023-10-30T14:13:15.617683+02:00", "EventTime": "2023-10-30T14:13:15.617694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Co8aUu1TpNyT7ES9U6"]} -{"Format": "Json", "ID": "c02d43ce-bbb5-4835-904e-9fcb9f73b4ea", "DetectTime": "2023-10-30T14:13:15.617683+02:00", "EventTime": "2023-10-30T14:13:15.617694+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T09:12:43.444117+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2023/10/30 14:13:15.688935)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "745610ca-3eb8-49dc-b47d-2daa7014a7f3", "DetectTime": "2023-10-30T14:13:15.693517+02:00", "EventTime": "2023-10-30T14:13:15.693527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C9jUMTOVKGlf7lWQl"]} -{"Format": "IDEA0", "ID": "53f779cf-2772-449a-8016-bc322e272b0d", "DetectTime": "2023-10-30T14:13:15.725095+02:00", "EventTime": "2023-10-30T14:13:15.725108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C14KMC16XXLSkDTToa"]} -{"Format": "IDEA0", "ID": "0aa9107a-efbe-4a6d-9b58-2a37bf62aa9d", "DetectTime": "2023-10-30T14:13:15.750276+02:00", "EventTime": "2023-10-30T14:13:15.750290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CowSI11KGU56pLyuj"]} -{"Format": "IDEA0", "ID": "a03adf9e-fdbf-45d0-aee7-aff17c82c723", "DetectTime": "2023-10-30T14:13:15.777041+02:00", "EventTime": "2023-10-30T14:13:15.777061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CZ6W5vWRN2GotDSja"]} -{"Format": "IDEA0", "ID": "f7b13915-1169-481b-9e01-156e8673181f", "DetectTime": "2023-10-30T14:13:15.810355+02:00", "EventTime": "2023-10-30T14:13:15.810368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CPb5ep45tmuwQvjy45"]} -{"Format": "IDEA0", "ID": "876603fe-fa10-4bb5-8022-24adfc875248", "DetectTime": "2023-10-30T14:13:15.832354+02:00", "EventTime": "2023-10-30T14:13:15.832365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CenUnl1XGD06v5SLy7"]} -{"Format": "IDEA0", "ID": "ee724b36-d2f9-4eec-9d09-536399a18017", "DetectTime": "2023-10-30T14:13:15.856692+02:00", "EventTime": "2023-10-30T14:13:15.856707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Ct1DPLYia1GTi2vKf"]} -{"Format": "IDEA0", "ID": "8951a230-66ab-4f88-a0ea-bf8648781724", "DetectTime": "2023-10-30T14:13:15.882207+02:00", "EventTime": "2023-10-30T14:13:15.882218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CyiAQ33cG2k6vX1OGd"]} -{"Format": "IDEA0", "ID": "2cb9be93-debe-40d4-92fd-21292d98cbd5", "DetectTime": "2023-10-30T14:13:15.904312+02:00", "EventTime": "2023-10-30T14:13:15.904330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CmAj2o4N8LyK902Npb"]} -{"Format": "Json", "ID": "2cb9be93-debe-40d4-92fd-21292d98cbd5", "DetectTime": "2023-10-30T14:13:15.904312+02:00", "EventTime": "2023-10-30T14:13:15.904330+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T09:12:44.907755+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2023/10/30 14:13:15.979339)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eb71a3b0-3494-457d-ad55-4c7886830568", "DetectTime": "2023-10-30T14:13:15.984939+02:00", "EventTime": "2023-10-30T14:13:15.984955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CE1ErC1Qvlad5qc8bh"]} -{"Format": "IDEA0", "ID": "4f9fe472-2c55-48d7-ac81-2772de200623", "DetectTime": "2023-10-30T14:13:16.014686+02:00", "EventTime": "2023-10-30T14:13:16.014704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C0kMFi4wcn2A1qb1zh"]} -{"Format": "IDEA0", "ID": "2eb1f23e-db26-4bec-9f67-e9cdd94fdc61", "DetectTime": "2023-10-30T14:13:16.038071+02:00", "EventTime": "2023-10-30T14:13:16.038082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CZQTDM3rmxN6JsaE3b"]} -{"Format": "IDEA0", "ID": "ee1cac34-d272-4620-be7a-d7715175cf3a", "DetectTime": "2023-10-30T14:13:16.064628+02:00", "EventTime": "2023-10-30T14:13:16.064639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CX2Std2qoPKuXfV8n9"]} -{"Format": "IDEA0", "ID": "74459397-e4c6-4d63-a1c5-97a5dd959c4b", "DetectTime": "2023-10-30T14:13:16.092123+02:00", "EventTime": "2023-10-30T14:13:16.092139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CQTOhq4CGjRTHquGrj"]} -{"Format": "IDEA0", "ID": "c918a23b-e896-4540-ba19-ce059715f4bf", "DetectTime": "2023-10-30T14:13:16.116669+02:00", "EventTime": "2023-10-30T14:13:16.116688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CAL8Dt1MtUHOTF5bmf"]} -{"Format": "IDEA0", "ID": "59f5165c-9585-4ba5-b488-eae403ac037d", "DetectTime": "2023-10-30T14:13:16.138662+02:00", "EventTime": "2023-10-30T14:13:16.138674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CHpGnI1kIZnS4WSDhb"]} -{"Format": "IDEA0", "ID": "f1bf2194-1f4c-4752-8e29-643b7842cda9", "DetectTime": "2023-10-30T14:13:16.160074+02:00", "EventTime": "2023-10-30T14:13:16.160084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C1cCV03zlbRlLIur51"]} -{"Format": "IDEA0", "ID": "d2fd5849-e92a-409f-9ef6-a44f94711565", "DetectTime": "2023-10-30T14:13:16.184180+02:00", "EventTime": "2023-10-30T14:13:16.184191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CmxrWB342tTqqytt9l"]} -{"Format": "Json", "ID": "d2fd5849-e92a-409f-9ef6-a44f94711565", "DetectTime": "2023-10-30T14:13:16.184180+02:00", "EventTime": "2023-10-30T14:13:16.184191+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T09:12:46.545378+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2023/10/30 14:13:16.243831)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5aaa726c-c011-4ab5-982c-4a7d40b74abb", "DetectTime": "2023-10-30T14:13:16.247831+02:00", "EventTime": "2023-10-30T14:13:16.247842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CtwRis3RdXXERzEDJ8"]} -{"Format": "IDEA0", "ID": "9fbdba44-b686-4e8c-8b92-a6d8e42b39b9", "DetectTime": "2023-10-30T14:13:16.265848+02:00", "EventTime": "2023-10-30T14:13:16.265860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cl2ARK2PqFoeVFhKnh"]} -{"Format": "IDEA0", "ID": "a8ba9c8b-216f-4108-b820-6f749a9fc694", "DetectTime": "2023-10-30T14:13:16.285061+02:00", "EventTime": "2023-10-30T14:13:16.285072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CUAS1k4DIS1TmYhMYd"]} -{"Format": "IDEA0", "ID": "d964c7ca-703a-423a-880a-d9692dae0790", "DetectTime": "2023-10-30T14:13:16.309410+02:00", "EventTime": "2023-10-30T14:13:16.309425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CD0dhH3BzayIabkNse"]} -{"Format": "IDEA0", "ID": "59ee3725-0615-427c-8a71-6f584e1409b3", "DetectTime": "2023-10-30T14:13:16.332155+02:00", "EventTime": "2023-10-30T14:13:16.332165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7MOBT3J2ngQCOCxdb"]} -{"Format": "IDEA0", "ID": "78a6be6a-c73d-42ba-a09f-caeb7b186be5", "DetectTime": "2023-10-30T14:13:16.349149+02:00", "EventTime": "2023-10-30T14:13:16.349160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CY2mqj4ElKh9Q2jnf8"]} -{"Format": "IDEA0", "ID": "a2172994-9c59-4125-8097-ea68a7d2a01c", "DetectTime": "2023-10-30T14:13:16.368325+02:00", "EventTime": "2023-10-30T14:13:16.368342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CItbmt2lnfun6Ji3oc"]} -{"Format": "IDEA0", "ID": "ccdbb216-094b-4343-bb12-58bc6d754701", "DetectTime": "2023-10-30T14:13:16.391705+02:00", "EventTime": "2023-10-30T14:13:16.391715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C2dwbmK8tzUOsvLPg"]} -{"Format": "IDEA0", "ID": "334e30fb-2022-4f45-b2cc-5a3322a8ecf6", "DetectTime": "2023-10-30T14:13:16.412684+02:00", "EventTime": "2023-10-30T14:13:16.412696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CT9669HFgAx1aNnU"]} -{"Format": "Json", "ID": "334e30fb-2022-4f45-b2cc-5a3322a8ecf6", "DetectTime": "2023-10-30T14:13:16.412684+02:00", "EventTime": "2023-10-30T14:13:16.412696+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T09:42:55.530228+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2023/10/30 14:13:16.466602)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3f57d991-ce33-4817-90a6-24b3467352da", "DetectTime": "2023-10-30T14:13:16.470995+02:00", "EventTime": "2023-10-30T14:13:16.471010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C70hTe4ypjHspPbjKf"]} -{"Format": "IDEA0", "ID": "7a27a1ba-018c-4001-ae38-bf38627a6b30", "DetectTime": "2023-10-30T14:13:16.493508+02:00", "EventTime": "2023-10-30T14:13:16.493524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CqxSsb2WRpd6pYO3rk"]} -{"Format": "IDEA0", "ID": "a5c6616f-6bf5-43fe-89f3-976932fc32df", "DetectTime": "2023-10-30T14:13:16.510827+02:00", "EventTime": "2023-10-30T14:13:16.510839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C5r65o4z0omfXvFRNh"]} -{"Format": "IDEA0", "ID": "9a786b37-7f10-4ab5-adb2-47caab473160", "DetectTime": "2023-10-30T14:13:16.530114+02:00", "EventTime": "2023-10-30T14:13:16.530131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CiFsiD2RvCsIhQRQEc"]} -{"Format": "IDEA0", "ID": "972556f7-2376-44ff-91e3-ad9e5f544c0b", "DetectTime": "2023-10-30T14:13:16.551154+02:00", "EventTime": "2023-10-30T14:13:16.551170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CWXWd016cFOlquApm3"]} -{"Format": "IDEA0", "ID": "ba6377ee-1d08-4906-92fe-4f4e70dc3efd", "DetectTime": "2023-10-30T14:13:16.573348+02:00", "EventTime": "2023-10-30T14:13:16.573360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C2MiSq38hnmJdHfopk"]} -{"Format": "IDEA0", "ID": "549d1570-5ec6-4615-8bb2-4386057c8262", "DetectTime": "2023-10-30T14:13:16.591239+02:00", "EventTime": "2023-10-30T14:13:16.591256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CwYVA44sMM43sWYhW6"]} -{"Format": "IDEA0", "ID": "858e1c05-e66f-40dc-8d70-4d43c4ad0606", "DetectTime": "2023-10-30T14:13:16.614414+02:00", "EventTime": "2023-10-30T14:13:16.614430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C7RmBe2cZdXmvoJQUh"]} -{"Format": "IDEA0", "ID": "ba291289-a276-466c-a6c9-66a0504e9544", "DetectTime": "2023-10-30T14:13:16.637312+02:00", "EventTime": "2023-10-30T14:13:16.637327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CcZTx1d0dlJzdY4qi"]} -{"Format": "Json", "ID": "ba291289-a276-466c-a6c9-66a0504e9544", "DetectTime": "2023-10-30T14:13:16.637312+02:00", "EventTime": "2023-10-30T14:13:16.637327+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T09:42:57.356149+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2023/10/30 14:13:16.691720)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a533518d-30b3-4b36-a18b-31c326205de3", "DetectTime": "2023-10-30T14:13:16.697590+02:00", "EventTime": "2023-10-30T14:13:16.697608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CanZWr12vQN1YB4iH5"]} -{"Format": "IDEA0", "ID": "930844aa-aeba-4745-97b7-21171265a481", "DetectTime": "2023-10-30T14:13:16.720293+02:00", "EventTime": "2023-10-30T14:13:16.720310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cge8ou2JYBukpO62n3"]} -{"Format": "IDEA0", "ID": "a87075fe-40bb-4267-a134-e9a780a9e51d", "DetectTime": "2023-10-30T14:13:16.742134+02:00", "EventTime": "2023-10-30T14:13:16.742149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVHSuP1REYwYfdagS8"]} -{"Format": "IDEA0", "ID": "c5c33a38-d709-4866-9ef2-1e911240b2ec", "DetectTime": "2023-10-30T14:13:16.762202+02:00", "EventTime": "2023-10-30T14:13:16.762213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CmjAAz2vnUfW9uqVY1"]} -{"Format": "IDEA0", "ID": "86bd4846-b203-44d3-b1e0-88a223745f09", "DetectTime": "2023-10-30T14:13:16.778394+02:00", "EventTime": "2023-10-30T14:13:16.778410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CvnxkR2Oq1E15jo0A"]} -{"Format": "IDEA0", "ID": "46ac9251-600e-4f8b-b0ab-666cddc02181", "DetectTime": "2023-10-30T14:13:16.797071+02:00", "EventTime": "2023-10-30T14:13:16.797082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C2iBJi2rzZeov8JDgi"]} -{"Format": "IDEA0", "ID": "a97d7d17-e3a8-4729-a780-25cd95039aa5", "DetectTime": "2023-10-30T14:13:16.812697+02:00", "EventTime": "2023-10-30T14:13:16.812707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CAj55l3kOXdfil1Pj1"]} -{"Format": "IDEA0", "ID": "f83053d7-0c2d-45cc-bd41-d38cc57a9165", "DetectTime": "2023-10-30T14:13:16.832293+02:00", "EventTime": "2023-10-30T14:13:16.832305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CNpFcz3NKbRC7dxshd"]} -{"Format": "IDEA0", "ID": "a0461f6a-e420-4603-ba71-d016036177f1", "DetectTime": "2023-10-30T14:13:16.850209+02:00", "EventTime": "2023-10-30T14:13:16.850220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C6fAQe1i0FFd6hXdae"]} -{"Format": "Json", "ID": "a0461f6a-e420-4603-ba71-d016036177f1", "DetectTime": "2023-10-30T14:13:16.850209+02:00", "EventTime": "2023-10-30T14:13:16.850220+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T09:42:58.925138+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2023/10/30 14:13:16.913608)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e2055051-cf0d-491d-ab14-eb6bafcb22e8", "DetectTime": "2023-10-30T14:13:16.917301+02:00", "EventTime": "2023-10-30T14:13:16.917311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CvuuJy2CQdA47TjHm6"]} -{"Format": "IDEA0", "ID": "85819c4c-868d-42a2-b8ff-78c9a7feac6a", "DetectTime": "2023-10-30T14:13:16.933886+02:00", "EventTime": "2023-10-30T14:13:16.933902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C0HC4Z3QD2RK4daC02"]} -{"Format": "IDEA0", "ID": "8dfc8327-f954-4e7e-8762-ee8834bdd04d", "DetectTime": "2023-10-30T14:13:16.951523+02:00", "EventTime": "2023-10-30T14:13:16.951538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQqOGR2DIbMxRzbeUe"]} -{"Format": "IDEA0", "ID": "5fae8e11-5194-403a-8b3a-af5730ece0ab", "DetectTime": "2023-10-30T14:13:16.967606+02:00", "EventTime": "2023-10-30T14:13:16.967617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C2Zjh44pSH0m5jtdG4"]} -{"Format": "IDEA0", "ID": "ebeedca0-96b1-4664-ab4c-6c48ee267031", "DetectTime": "2023-10-30T14:13:16.984022+02:00", "EventTime": "2023-10-30T14:13:16.984038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFlY1N25LBQ2SXwN9g"]} -{"Format": "IDEA0", "ID": "a3f48479-a953-4921-a2aa-e6c1df8662ec", "DetectTime": "2023-10-30T14:13:17.001445+02:00", "EventTime": "2023-10-30T14:13:17.001462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CFk4p04zwYobpTaJe"]} -{"Format": "IDEA0", "ID": "ed69c725-856d-48a6-a572-ada604575c9a", "DetectTime": "2023-10-30T14:13:17.018331+02:00", "EventTime": "2023-10-30T14:13:17.018342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp0svF2UO8O5qvUkS7"]} -{"Format": "IDEA0", "ID": "35cd50e1-0141-4dd7-b9de-22ad2bc602fc", "DetectTime": "2023-10-30T14:13:17.048281+02:00", "EventTime": "2023-10-30T14:13:17.048297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbBX6CBbHnHFeVhK4"]} -{"Format": "IDEA0", "ID": "12de5cf9-65e9-4ceb-8f3e-4556724eb65b", "DetectTime": "2023-10-30T14:13:17.074544+02:00", "EventTime": "2023-10-30T14:13:17.074560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CJohil2VlpovenzmYi"]} -{"Format": "IDEA0", "ID": "3c903d26-50bb-45c4-823e-33c99398fe99", "DetectTime": "2023-10-30T14:13:17.104987+02:00", "EventTime": "2023-10-30T14:13:17.105004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CTID7q4pFPtX5XutAi"]} -{"Format": "IDEA0", "ID": "8322a8e7-5590-4765-ade3-0bdb3d7ccf8e", "DetectTime": "2023-10-30T14:13:17.128511+02:00", "EventTime": "2023-10-30T14:13:17.128521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CTGV7s3JyR2twjuIn8"]} -{"Format": "IDEA0", "ID": "e4d9439f-649e-4a71-8424-a9e981b9ce5c", "DetectTime": "2023-10-30T14:13:17.158903+02:00", "EventTime": "2023-10-30T14:13:17.158920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CpVYHkWBtfyq4iI61"]} -{"Format": "IDEA0", "ID": "115678c5-8900-479b-a510-083bcaba1685", "DetectTime": "2023-10-30T14:13:17.185093+02:00", "EventTime": "2023-10-30T14:13:17.185105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CWlQA93NLP0P2wINVc"]} -{"Format": "IDEA0", "ID": "f9660592-9f14-4c21-a60b-42d771f2b6b0", "DetectTime": "2023-10-30T14:13:17.216781+02:00", "EventTime": "2023-10-30T14:13:17.216798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CTndYz2kCcGviQHfna"]} -{"Format": "IDEA0", "ID": "6432b62e-edf4-45c2-b698-035bf887a6a6", "DetectTime": "2023-10-30T14:13:17.243536+02:00", "EventTime": "2023-10-30T14:13:17.243548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C4XLXzCgGSgaaJ6c6"]} -{"Format": "Json", "ID": "6432b62e-edf4-45c2-b698-035bf887a6a6", "DetectTime": "2023-10-30T14:13:17.243536+02:00", "EventTime": "2023-10-30T14:13:17.243548+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T10:13:27.377535+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2023/10/30 14:13:17.308765)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "532df398-1468-4f94-8ef4-d74aee28c7a1", "DetectTime": "2023-10-30T14:13:17.314093+02:00", "EventTime": "2023-10-30T14:13:17.314108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CwQrYD2Fru6qMa0Exc"]} -{"Format": "IDEA0", "ID": "c84b95c9-8462-46bb-ae17-6fc355fd9452", "DetectTime": "2023-10-30T14:13:17.341044+02:00", "EventTime": "2023-10-30T14:13:17.341059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cz1FPQ1tpiKItUFA3"]} -{"Format": "IDEA0", "ID": "39ecd939-78e6-400a-a4d6-045c6caf569e", "DetectTime": "2023-10-30T14:13:17.370956+02:00", "EventTime": "2023-10-30T14:13:17.370969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CS0XRQ4o5zx85giMk"]} -{"Format": "IDEA0", "ID": "2779503b-3d4b-447b-b314-100480fbb434", "DetectTime": "2023-10-30T14:13:17.396667+02:00", "EventTime": "2023-10-30T14:13:17.396683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CczHMU2ru81g7wmnDk"]} -{"Format": "IDEA0", "ID": "ecde4a6b-7cdc-430a-8c3b-cab13d67e375", "DetectTime": "2023-10-30T14:13:17.416727+02:00", "EventTime": "2023-10-30T14:13:17.416738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CuYD5H223ni6zN1B27"]} -{"Format": "IDEA0", "ID": "996ddbdb-d83f-47c2-b500-09fe17d37531", "DetectTime": "2023-10-30T14:13:17.442962+02:00", "EventTime": "2023-10-30T14:13:17.442979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cuv7i71wVFJVqNqH6e"]} -{"Format": "IDEA0", "ID": "9db59168-0f5e-42a9-9842-f6a6702ee977", "DetectTime": "2023-10-30T14:13:17.472945+02:00", "EventTime": "2023-10-30T14:13:17.472961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CIQ5JO1plDvS1KrEEb"]} -{"Format": "IDEA0", "ID": "3124a59f-9c12-491e-b77c-c8f081e00ba5", "DetectTime": "2023-10-30T14:13:17.502874+02:00", "EventTime": "2023-10-30T14:13:17.502889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CxRS3K3mvnd9mN8YY4"]} -{"Format": "IDEA0", "ID": "2e60b2bc-d1e0-47c1-be51-04f42a402f8e", "DetectTime": "2023-10-30T14:13:17.524840+02:00", "EventTime": "2023-10-30T14:13:17.524855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CGWs9eonGmmuPHujl"]} -{"Format": "Json", "ID": "2e60b2bc-d1e0-47c1-be51-04f42a402f8e", "DetectTime": "2023-10-30T14:13:17.524840+02:00", "EventTime": "2023-10-30T14:13:17.524855+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T10:13:29.989094+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2023/10/30 14:13:17.581780)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "78ea0b19-3283-45ee-8129-1cf54dcd7ca9", "DetectTime": "2023-10-30T14:13:17.586088+02:00", "EventTime": "2023-10-30T14:13:17.586099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CH5qgx4bLdypby7pZi"]} -{"Format": "IDEA0", "ID": "cde79927-c6e2-422c-83d2-ef4ba1341709", "DetectTime": "2023-10-30T14:13:17.614049+02:00", "EventTime": "2023-10-30T14:13:17.614065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["ChYF7f2wmZkVga3bu9"]} -{"Format": "IDEA0", "ID": "2e2cb4b2-410c-4f2e-809d-2363841ba9d5", "DetectTime": "2023-10-30T14:13:17.635166+02:00", "EventTime": "2023-10-30T14:13:17.635182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C4bAee1KAjXrlD0yg"]} -{"Format": "IDEA0", "ID": "24dfa863-c941-49f4-9f06-3eb7a3a07aa6", "DetectTime": "2023-10-30T14:13:17.659683+02:00", "EventTime": "2023-10-30T14:13:17.659698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CkKXCr3z0pLN3FyJuk"]} -{"Format": "IDEA0", "ID": "0ed47aa3-062c-4dc7-b4cc-52bc1786df19", "DetectTime": "2023-10-30T14:13:17.685053+02:00", "EventTime": "2023-10-30T14:13:17.685069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cc2hzS3X805U4RVvbc"]} -{"Format": "IDEA0", "ID": "46d8d206-42cb-444a-b2a4-b21921b54a3d", "DetectTime": "2023-10-30T14:13:17.706414+02:00", "EventTime": "2023-10-30T14:13:17.706425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CvBnOE1foxR0nrGzkl"]} -{"Format": "IDEA0", "ID": "beaf7a82-8eaf-4a7b-959d-1ea064e50724", "DetectTime": "2023-10-30T14:13:17.729192+02:00", "EventTime": "2023-10-30T14:13:17.729208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CJ0bMns9aKtdArVff"]} -{"Format": "IDEA0", "ID": "512751e5-0260-4fe7-b766-effdd0921af9", "DetectTime": "2023-10-30T14:13:17.751241+02:00", "EventTime": "2023-10-30T14:13:17.751252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C585ef4CUJi4lworn2"]} -{"Format": "IDEA0", "ID": "907d7fac-8097-475a-afdc-ebf2d656c25f", "DetectTime": "2023-10-30T14:13:17.777599+02:00", "EventTime": "2023-10-30T14:13:17.777610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEmXrL37bKFrAY3bX2"]} -{"Format": "Json", "ID": "907d7fac-8097-475a-afdc-ebf2d656c25f", "DetectTime": "2023-10-30T14:13:17.777599+02:00", "EventTime": "2023-10-30T14:13:17.777610+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T10:13:31.629474+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2023/10/30 14:13:17.833012)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5b7a78bf-8642-4333-afef-1d35a452c3c1", "DetectTime": "2023-10-30T14:13:17.838237+02:00", "EventTime": "2023-10-30T14:13:17.838252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ccnvqn6oaueECOl25"]} -{"Format": "IDEA0", "ID": "161bea02-cb9e-48f6-af4d-00a382b9bfda", "DetectTime": "2023-10-30T14:13:17.859987+02:00", "EventTime": "2023-10-30T14:13:17.859999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cc2a6g8X2bbO3V828"]} -{"Format": "IDEA0", "ID": "44b7c0dd-a0db-4896-bc84-d197ac1ffd0d", "DetectTime": "2023-10-30T14:13:17.879999+02:00", "EventTime": "2023-10-30T14:13:17.880010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cc0heb31b17VjlFdIj"]} -{"Format": "IDEA0", "ID": "d4a4cb62-63fd-492d-bcf0-1393df022b49", "DetectTime": "2023-10-30T14:13:17.901282+02:00", "EventTime": "2023-10-30T14:13:17.901292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVKc1Q28UIRajlj9Ik"]} -{"Format": "IDEA0", "ID": "cdf06f9d-7bc2-4c92-ba1d-815b9db5540a", "DetectTime": "2023-10-30T14:13:17.926809+02:00", "EventTime": "2023-10-30T14:13:17.926825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CI5x9A3eELrD0R0Nzg"]} -{"Format": "IDEA0", "ID": "36886722-171d-4a80-a520-ad43eeab493a", "DetectTime": "2023-10-30T14:13:17.952454+02:00", "EventTime": "2023-10-30T14:13:17.952470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CKD0iV1bldOMZx526b"]} -{"Format": "IDEA0", "ID": "67c90ae1-96e6-456d-ac28-e390805fab88", "DetectTime": "2023-10-30T14:13:17.977653+02:00", "EventTime": "2023-10-30T14:13:17.977666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CJ87hd32j3IdXXr2zi"]} -{"Format": "IDEA0", "ID": "de721772-a632-4811-bbd0-b57a7e45b721", "DetectTime": "2023-10-30T14:13:17.998879+02:00", "EventTime": "2023-10-30T14:13:17.998891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CX9dPRdsf4mEewZAj"]} -{"Format": "IDEA0", "ID": "85cb1b35-8a1c-48d9-a0af-ff1d3441fc58", "DetectTime": "2023-10-30T14:13:18.019980+02:00", "EventTime": "2023-10-30T14:13:18.019997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CKcW5b1ed5bcqc43If"]} -{"Format": "Json", "ID": "85cb1b35-8a1c-48d9-a0af-ff1d3441fc58", "DetectTime": "2023-10-30T14:13:18.019980+02:00", "EventTime": "2023-10-30T14:13:18.019997+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T10:43:44.259055+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2023/10/30 14:13:18.080892)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "393ddcf5-ac88-4de9-94a5-a6f91b713439", "DetectTime": "2023-10-30T14:13:18.085591+02:00", "EventTime": "2023-10-30T14:13:18.085607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C5FDxVNS2eXesIJb3"]} -{"Format": "IDEA0", "ID": "21057c7f-5106-4e44-9521-cc3078997bd3", "DetectTime": "2023-10-30T14:13:18.107738+02:00", "EventTime": "2023-10-30T14:13:18.107754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CODPGN1KEQ3iO0pHOf"]} -{"Format": "IDEA0", "ID": "027d259e-88e3-44f2-aef9-1f7500980edb", "DetectTime": "2023-10-30T14:13:18.125546+02:00", "EventTime": "2023-10-30T14:13:18.125557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C3VDPP3FHHq5I2CfI7"]} -{"Format": "IDEA0", "ID": "102b2e12-ece1-4b56-a016-c91f37efe942", "DetectTime": "2023-10-30T14:13:18.142903+02:00", "EventTime": "2023-10-30T14:13:18.142915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CtyBVQ1WivlPbw5rS7"]} -{"Format": "IDEA0", "ID": "c1291682-7a61-4cf3-b6f1-4bbc233d70c5", "DetectTime": "2023-10-30T14:13:18.162030+02:00", "EventTime": "2023-10-30T14:13:18.162042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUdQcJ1BdIj5ZiuiH5"]} -{"Format": "IDEA0", "ID": "a1c1d8e2-5b8e-4c52-925f-42cfdff06d6a", "DetectTime": "2023-10-30T14:13:18.185389+02:00", "EventTime": "2023-10-30T14:13:18.185404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C8Oxq92zrcDECRFTf9"]} -{"Format": "IDEA0", "ID": "b30857fe-de3a-4807-91f9-869e6885117a", "DetectTime": "2023-10-30T14:13:18.207045+02:00", "EventTime": "2023-10-30T14:13:18.207064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CDx6gU1Z01A20udEHi"]} -{"Format": "IDEA0", "ID": "44f2a2d0-5c8b-4651-b50e-2025f68ead25", "DetectTime": "2023-10-30T14:13:18.228699+02:00", "EventTime": "2023-10-30T14:13:18.228710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CsnTxIIWHkc0FdkK8"]} -{"Format": "IDEA0", "ID": "72d2dd11-844e-4890-bd28-597d6d0ed9b9", "DetectTime": "2023-10-30T14:13:18.246468+02:00", "EventTime": "2023-10-30T14:13:18.246482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CJkAc9cHRDUozR5Kl"]} -{"Format": "Json", "ID": "72d2dd11-844e-4890-bd28-597d6d0ed9b9", "DetectTime": "2023-10-30T14:13:18.246468+02:00", "EventTime": "2023-10-30T14:13:18.246482+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T10:43:45.985324+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2023/10/30 14:13:18.303958)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c64fad15-3eec-4167-8a70-9082328912e0", "DetectTime": "2023-10-30T14:13:18.308865+02:00", "EventTime": "2023-10-30T14:13:18.308877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C67tlY1oA60vh1uX0d"]} -{"Format": "IDEA0", "ID": "b8d85308-4498-4797-84c5-b0020fab671b", "DetectTime": "2023-10-30T14:13:18.332635+02:00", "EventTime": "2023-10-30T14:13:18.332645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CjpZQN3723jUwYnRw3"]} -{"Format": "IDEA0", "ID": "ca767e2a-18e1-45f5-b27e-c2bd5c7ade7d", "DetectTime": "2023-10-30T14:13:18.349975+02:00", "EventTime": "2023-10-30T14:13:18.349991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cwh3Zc4a4Dz6FMNOSk"]} -{"Format": "IDEA0", "ID": "0960c3fd-2911-41c0-a2d4-b70a4def3983", "DetectTime": "2023-10-30T14:13:18.367451+02:00", "EventTime": "2023-10-30T14:13:18.367468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CZmho944TqwbXRR2o7"]} -{"Format": "IDEA0", "ID": "532a3af9-ee5f-48f2-bf1c-5a3a8398b3df", "DetectTime": "2023-10-30T14:13:18.384039+02:00", "EventTime": "2023-10-30T14:13:18.384051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CIhB8ZBMfSMqyhQna"]} -{"Format": "IDEA0", "ID": "6e7be650-7ee2-4fd2-8b3e-d01b4ac82c8f", "DetectTime": "2023-10-30T14:13:18.404685+02:00", "EventTime": "2023-10-30T14:13:18.404704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CzQKCT21wlqxSQ5zB9"]} -{"Format": "IDEA0", "ID": "6e58ac18-1a13-4e06-a25c-1d4bfb298131", "DetectTime": "2023-10-30T14:13:18.422471+02:00", "EventTime": "2023-10-30T14:13:18.422484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cnf4ZVipVcK2Fq1u4"]} -{"Format": "IDEA0", "ID": "eba27367-5127-43ec-9c3d-ef16716c6a05", "DetectTime": "2023-10-30T14:13:18.441478+02:00", "EventTime": "2023-10-30T14:13:18.441494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CwQu4r27qLkt7XzZm5"]} -{"Format": "IDEA0", "ID": "72a8e47e-bab3-445f-b8dc-323b4208abc9", "DetectTime": "2023-10-30T14:13:18.459721+02:00", "EventTime": "2023-10-30T14:13:18.459734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C2RMsV1W6GDrL2A8vf"]} -{"Format": "Json", "ID": "72a8e47e-bab3-445f-b8dc-323b4208abc9", "DetectTime": "2023-10-30T14:13:18.459721+02:00", "EventTime": "2023-10-30T14:13:18.459734+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T10:43:47.564189+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2023/10/30 14:13:18.522587)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86559ce2-7c35-43c3-85bc-564f33455ac2", "DetectTime": "2023-10-30T14:13:18.527538+02:00", "EventTime": "2023-10-30T14:13:18.527553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CcvsKcksTtpCz65H9"]} -{"Format": "IDEA0", "ID": "90990ac6-3e3c-4bf9-aee2-8a673d1e3ebd", "DetectTime": "2023-10-30T14:13:18.542601+02:00", "EventTime": "2023-10-30T14:13:18.542614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CuYISU1b9uo0J8rio5"]} -{"Format": "IDEA0", "ID": "1edd1a53-5fd6-460d-aa87-40bb34c8137a", "DetectTime": "2023-10-30T14:13:18.560810+02:00", "EventTime": "2023-10-30T14:13:18.560824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNpm6M2iSag8NAlILh"]} -{"Format": "IDEA0", "ID": "3d2fce00-4818-4ce2-9c4d-ff851633af20", "DetectTime": "2023-10-30T14:13:18.576959+02:00", "EventTime": "2023-10-30T14:13:18.576970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CPog5S3PDk6FwIVb3b"]} -{"Format": "IDEA0", "ID": "9bb2e998-e579-48e7-bcfe-6d2336391476", "DetectTime": "2023-10-30T14:13:18.592246+02:00", "EventTime": "2023-10-30T14:13:18.592265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CM4evB26sEENWT6Hpd"]} -{"Format": "IDEA0", "ID": "b24baeee-ef80-44fd-9b0e-41e075960c67", "DetectTime": "2023-10-30T14:13:18.606643+02:00", "EventTime": "2023-10-30T14:13:18.606657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C4jzmc1ozgwtylhMWg"]} -{"Format": "IDEA0", "ID": "1426c54b-0042-4f3c-ac99-f449c12b1878", "DetectTime": "2023-10-30T14:13:18.622835+02:00", "EventTime": "2023-10-30T14:13:18.622848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CWZVEm4hpp9xZl0Ixd"]} -{"Format": "IDEA0", "ID": "96806a03-547d-4b0f-9223-918cbd1c656a", "DetectTime": "2023-10-30T14:13:18.643942+02:00", "EventTime": "2023-10-30T14:13:18.643959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFpGLk20WyDERnEb23"]} -{"Format": "IDEA0", "ID": "1a3e8b82-830b-49c1-9e8c-d1faa07ddd41", "DetectTime": "2023-10-30T14:13:18.678855+02:00", "EventTime": "2023-10-30T14:13:18.678871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C9l31h11QRmLNArH4g"]} -{"Format": "IDEA0", "ID": "2ef66b6f-5503-4f2d-b4fb-0818e3615316", "DetectTime": "2023-10-30T14:13:18.713231+02:00", "EventTime": "2023-10-30T14:13:18.713254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CoRNCP18I8Tt1El4Bh"]} -{"Format": "IDEA0", "ID": "a3dbac55-a6dd-4c5d-a188-299dca8c7c1f", "DetectTime": "2023-10-30T14:13:18.748577+02:00", "EventTime": "2023-10-30T14:13:18.748590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CYF7MM3UpZyozPQOs4"]} -{"Format": "IDEA0", "ID": "2d9e92fd-5f02-4ce9-aab0-f41cda2b5a20", "DetectTime": "2023-10-30T14:13:18.771462+02:00", "EventTime": "2023-10-30T14:13:18.771478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C5XpcL1HUS9lUxANg"]} -{"Format": "IDEA0", "ID": "b3e114b1-0f2f-453b-a0c3-9dd03a7d48e8", "DetectTime": "2023-10-30T14:13:18.810552+02:00", "EventTime": "2023-10-30T14:13:18.810569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CksHDq2JCdBWn1QK1k"]} -{"Format": "IDEA0", "ID": "0160fbd3-3f9d-4b1f-89f2-85dd9fe54dee", "DetectTime": "2023-10-30T14:13:18.840639+02:00", "EventTime": "2023-10-30T14:13:18.840649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C4BPy13obBPERcuwX1"]} -{"Format": "IDEA0", "ID": "1a42546e-c415-40e5-b7e5-18a75f0df164", "DetectTime": "2023-10-30T14:13:18.873231+02:00", "EventTime": "2023-10-30T14:13:18.873253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["COomJjzbUdOZcWdcg"]} -{"Format": "IDEA0", "ID": "d669e108-c00f-4f8d-adca-a2f2d41f24da", "DetectTime": "2023-10-30T14:13:18.904320+02:00", "EventTime": "2023-10-30T14:13:18.904339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CDYqAw2oW3TAP8Rx7c"]} -{"Format": "Json", "ID": "d669e108-c00f-4f8d-adca-a2f2d41f24da", "DetectTime": "2023-10-30T14:13:18.904320+02:00", "EventTime": "2023-10-30T14:13:18.904339+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T11:14:04.149648+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2023/10/30 14:13:18.972245)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6c9200eb-a5e3-4817-80c1-628039bf6afc", "DetectTime": "2023-10-30T14:13:18.978090+02:00", "EventTime": "2023-10-30T14:13:18.978110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C7Rxjm1QWTai9zgNej"]} -{"Format": "IDEA0", "ID": "563611bc-53d6-4de3-99c8-5e594d90e843", "DetectTime": "2023-10-30T14:13:19.017506+02:00", "EventTime": "2023-10-30T14:13:19.017523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cg4EHX2c2k4eUfZTu8"]} -{"Format": "IDEA0", "ID": "122bdfc2-7546-4290-b687-e0fa1737c682", "DetectTime": "2023-10-30T14:13:19.053800+02:00", "EventTime": "2023-10-30T14:13:19.053817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJVIkI3n2TmJdXvmb5"]} -{"Format": "IDEA0", "ID": "3425313a-986c-4f91-b5d0-a46e129304e7", "DetectTime": "2023-10-30T14:13:19.083547+02:00", "EventTime": "2023-10-30T14:13:19.083562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CL8bB1yzH05fQQ69"]} -{"Format": "IDEA0", "ID": "e6179a70-e4c8-49cd-b2b3-549f1f0f7550", "DetectTime": "2023-10-30T14:13:19.126013+02:00", "EventTime": "2023-10-30T14:13:19.126032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CXizjIOgvFQs3M0Md"]} -{"Format": "IDEA0", "ID": "8163e5ea-a027-487a-b9e8-099daec1351a", "DetectTime": "2023-10-30T14:13:19.166926+02:00", "EventTime": "2023-10-30T14:13:19.166942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["COTwga3FtxshR6cZcj"]} -{"Format": "IDEA0", "ID": "ca152093-44f0-4de1-91c4-e8bbd9d3c107", "DetectTime": "2023-10-30T14:13:19.194982+02:00", "EventTime": "2023-10-30T14:13:19.194994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C6K1bc23yyNNPgAO3f"]} -{"Format": "IDEA0", "ID": "67bb19f0-ca6f-4752-948f-cf5b37ab079a", "DetectTime": "2023-10-30T14:13:19.224507+02:00", "EventTime": "2023-10-30T14:13:19.224531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CCmX7C2TpMjgGuCAxj"]} -{"Format": "IDEA0", "ID": "281bed6b-f765-4337-9ffb-4fb6ed033667", "DetectTime": "2023-10-30T14:13:19.258752+02:00", "EventTime": "2023-10-30T14:13:19.258767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CFTpOZcP5FZCS4EBj"]} -{"Format": "Json", "ID": "281bed6b-f765-4337-9ffb-4fb6ed033667", "DetectTime": "2023-10-30T14:13:19.258752+02:00", "EventTime": "2023-10-30T14:13:19.258767+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T11:14:06.238502+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2023/10/30 14:13:19.327823)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "75b84a3c-4552-44fd-adb4-4a20a335a4b7", "DetectTime": "2023-10-30T14:13:19.332670+02:00", "EventTime": "2023-10-30T14:13:19.332688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C8bBOR1PeLmuuDvwK6"]} -{"Format": "IDEA0", "ID": "53965fc1-d820-4878-a1fc-c5fa8bbb083c", "DetectTime": "2023-10-30T14:13:19.360800+02:00", "EventTime": "2023-10-30T14:13:19.360811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CIcuWJ2Byv3oEO0q1c"]} -{"Format": "IDEA0", "ID": "36015aa4-f5fc-451b-aa3c-b7643fa16570", "DetectTime": "2023-10-30T14:13:19.390145+02:00", "EventTime": "2023-10-30T14:13:19.390161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CmJ2pZ12U7lSRBXtd3"]} -{"Format": "IDEA0", "ID": "96f379ef-ae86-4f0f-9bf7-60d4ba0487de", "DetectTime": "2023-10-30T14:13:19.410121+02:00", "EventTime": "2023-10-30T14:13:19.410141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C5V6vq4jY9ljxwPtp8"]} -{"Format": "IDEA0", "ID": "f4088ee9-738c-4691-bc44-193e2d695a12", "DetectTime": "2023-10-30T14:13:19.432549+02:00", "EventTime": "2023-10-30T14:13:19.432559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CECbfP3KMhxGahT3pa"]} -{"Format": "IDEA0", "ID": "67f0450d-9a20-4574-a9c5-5bd7a232ca1e", "DetectTime": "2023-10-30T14:13:19.461243+02:00", "EventTime": "2023-10-30T14:13:19.461260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CcjT8n1clpdYafzdyl"]} -{"Format": "IDEA0", "ID": "2ae62346-dba9-45b5-a96d-7d32c4061ae2", "DetectTime": "2023-10-30T14:13:19.493540+02:00", "EventTime": "2023-10-30T14:13:19.493556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ClwnCI1ZM4SH8mgBsk"]} -{"Format": "IDEA0", "ID": "7a58428a-6681-4845-bd83-2190e6d79191", "DetectTime": "2023-10-30T14:13:19.520580+02:00", "EventTime": "2023-10-30T14:13:19.520600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgE5BDOU67RDSres3"]} -{"Format": "IDEA0", "ID": "cd706391-25e1-4ab8-aff7-f7b78da9eeee", "DetectTime": "2023-10-30T14:13:19.538096+02:00", "EventTime": "2023-10-30T14:13:19.538110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CJa4Iv2Ja3gYY4pEqg"]} -{"Format": "IDEA0", "ID": "4b121a75-1165-4260-bf62-a05689bf6527", "DetectTime": "2023-10-30T14:13:19.570166+02:00", "EventTime": "2023-10-30T14:13:19.570176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C2uy3PRGjLI60MOgf"]} -{"Format": "IDEA0", "ID": "bf83b557-358c-46a9-a671-ddf724d6de8c", "DetectTime": "2023-10-30T14:13:19.591595+02:00", "EventTime": "2023-10-30T14:13:19.591611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cq6jOl3iDm2f7T0Rif"]} -{"Format": "IDEA0", "ID": "239a4dd0-d31c-4112-a3c4-b9b881e474c1", "DetectTime": "2023-10-30T14:13:19.624211+02:00", "EventTime": "2023-10-30T14:13:19.624226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C5dr2F3BrZB7jDWpf4"]} -{"Format": "IDEA0", "ID": "ef5957f3-f63c-4833-b19d-a983a437af1c", "DetectTime": "2023-10-30T14:13:19.641118+02:00", "EventTime": "2023-10-30T14:13:19.641129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CNn61lYGtOC0wEDMa"]} -{"Format": "IDEA0", "ID": "c0eab706-f256-4666-af3d-9073e0120447", "DetectTime": "2023-10-30T14:13:19.658977+02:00", "EventTime": "2023-10-30T14:13:19.658993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRoyD823kPIwWciZQk"]} -{"Format": "Json", "ID": "c0eab706-f256-4666-af3d-9073e0120447", "DetectTime": "2023-10-30T14:13:19.658977+02:00", "EventTime": "2023-10-30T14:13:19.658993+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T11:14:07.872325+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2023/10/30 14:13:19.724811)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e68d8eb7-ca78-43b2-9880-54bb5abe3914", "DetectTime": "2023-10-30T14:13:19.728771+02:00", "EventTime": "2023-10-30T14:13:19.728784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ClT3Uy34PMWjaO46M8"]} -{"Format": "IDEA0", "ID": "de786fde-db5d-4953-af13-9461ea5f534a", "DetectTime": "2023-10-30T14:13:19.749515+02:00", "EventTime": "2023-10-30T14:13:19.749530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Co20yW1upTxkSSl7sl"]} -{"Format": "IDEA0", "ID": "e340b751-cd14-469a-a02e-dff9967d7383", "DetectTime": "2023-10-30T14:13:19.779679+02:00", "EventTime": "2023-10-30T14:13:19.779694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ClnvhDNntI4rcvdH4"]} -{"Format": "IDEA0", "ID": "7b1b3117-fc57-4488-8834-34ec9d369277", "DetectTime": "2023-10-30T14:13:19.806161+02:00", "EventTime": "2023-10-30T14:13:19.806174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CtjTWI1x72WhOzOKyc"]} -{"Format": "IDEA0", "ID": "1b252f17-d9ba-4194-911a-cb2424aef853", "DetectTime": "2023-10-30T14:13:19.824329+02:00", "EventTime": "2023-10-30T14:13:19.824344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CR87G82KEwWtEa3QK6"]} -{"Format": "IDEA0", "ID": "55b2510b-6006-45bf-9ab9-059df2c40baa", "DetectTime": "2023-10-30T14:13:19.852069+02:00", "EventTime": "2023-10-30T14:13:19.852080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CWp2JD2HA5dXmpu7fi"]} -{"Format": "IDEA0", "ID": "1e20705b-8b61-4c84-8f81-a11f333431fd", "DetectTime": "2023-10-30T14:13:19.872944+02:00", "EventTime": "2023-10-30T14:13:19.872960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CXlfNn21IDmbbQD4E9"]} -{"Format": "IDEA0", "ID": "dc6d3d1a-5d85-4443-84c2-317a78712963", "DetectTime": "2023-10-30T14:13:19.892535+02:00", "EventTime": "2023-10-30T14:13:19.892549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxLna94uoXPfLo17y7"]} -{"Format": "IDEA0", "ID": "94020ce4-f79b-4c5a-8b1e-30544f453845", "DetectTime": "2023-10-30T14:13:19.916504+02:00", "EventTime": "2023-10-30T14:13:19.916520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKXpQ522FVIEQKTkb"]} -{"Format": "IDEA0", "ID": "ca93da4e-48d8-4018-9345-f5e1bb73bce8", "DetectTime": "2023-10-30T14:13:19.931343+02:00", "EventTime": "2023-10-30T14:13:19.931355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CJMJI73JK6JDb2lxu5"]} -{"Format": "IDEA0", "ID": "209d5b70-9a90-45c3-a85c-4c08f9e4f437", "DetectTime": "2023-10-30T14:13:19.951262+02:00", "EventTime": "2023-10-30T14:13:19.951288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cm5Kz9ZuIWYTOFTg"]} -{"Format": "IDEA0", "ID": "9fc05694-418c-43d5-8f24-ec8591a2b793", "DetectTime": "2023-10-30T14:13:19.969228+02:00", "EventTime": "2023-10-30T14:13:19.969238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CxpeFh3DRcXIXMYpy"]} -{"Format": "IDEA0", "ID": "934b7185-2758-4a7a-97f4-f7ad982cd54a", "DetectTime": "2023-10-30T14:13:19.984774+02:00", "EventTime": "2023-10-30T14:13:19.984784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CobvEU1ju1aRy8Lqa1"]} -{"Format": "IDEA0", "ID": "b8261c54-8971-475e-a63b-04decdef5235", "DetectTime": "2023-10-30T14:13:20.002754+02:00", "EventTime": "2023-10-30T14:13:20.002768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJRnQuBMcnFajqG14"]} -{"Format": "IDEA0", "ID": "074c9399-6e86-4385-8fd2-c005c717b92a", "DetectTime": "2023-10-30T14:13:20.020634+02:00", "EventTime": "2023-10-30T14:13:20.020650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cfs8SeWTalFkt0Pe1"]} -{"Format": "IDEA0", "ID": "32114602-fb2e-4a33-a93e-18471877025d", "DetectTime": "2023-10-30T14:13:20.048744+02:00", "EventTime": "2023-10-30T14:13:20.048760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C6OgKkxmk32QqUim3"]} -{"Format": "IDEA0", "ID": "46eccaa4-3225-48bc-9f70-35b4d0eec2d3", "DetectTime": "2023-10-30T14:13:20.069552+02:00", "EventTime": "2023-10-30T14:13:20.069568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C93XCQ3dHVVJsZP5K5"]} -{"Format": "IDEA0", "ID": "d9a3c8d3-d627-4556-8c04-fef64532ecb4", "DetectTime": "2023-10-30T14:13:20.087008+02:00", "EventTime": "2023-10-30T14:13:20.087020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXRFzA2C2EcjmZVjo2"]} -{"Format": "IDEA0", "ID": "7cbb755d-c34f-4ae5-b6be-813979fc7de0", "DetectTime": "2023-10-30T14:13:20.103684+02:00", "EventTime": "2023-10-30T14:13:20.103699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cl3WNH2ZLAkRTR4xmb"]} -{"Format": "IDEA0", "ID": "c976250e-94db-464e-a509-6472543fcdbb", "DetectTime": "2023-10-30T14:13:20.119085+02:00", "EventTime": "2023-10-30T14:13:20.119096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CfctMc32gXLo0vhcci"]} -{"Format": "IDEA0", "ID": "1767fec2-fba7-4721-9816-4f388ae47bf7", "DetectTime": "2023-10-30T14:13:20.136730+02:00", "EventTime": "2023-10-30T14:13:20.136746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CB6BRq1XOl2b8Wj8Lj"]} -{"Format": "IDEA0", "ID": "a9d2fdcf-e516-44d6-82a6-f8693180554a", "DetectTime": "2023-10-30T14:13:20.162677+02:00", "EventTime": "2023-10-30T14:13:20.162688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CqDHJC1rx6NVH0KlQ"]} -{"Format": "IDEA0", "ID": "52397c38-cefe-44e2-9ee5-614fe675e94a", "DetectTime": "2023-10-30T14:13:20.180272+02:00", "EventTime": "2023-10-30T14:13:20.180282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CIMw4C20q3e7rYEzE9"]} -{"Format": "IDEA0", "ID": "eb91ed89-32a7-48d7-a0bf-40c5b776ee7b", "DetectTime": "2023-10-30T14:13:20.199249+02:00", "EventTime": "2023-10-30T14:13:20.199262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ctr5mp1h4zx5YHw4M5"]} -{"Format": "IDEA0", "ID": "87a731db-8694-4eb5-8f5e-70927d68b7cf", "DetectTime": "2023-10-30T14:13:20.219595+02:00", "EventTime": "2023-10-30T14:13:20.219608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CdbGNC2L8LdMfPwHQ"]} -{"Format": "IDEA0", "ID": "acd0ff33-9935-4c1a-8be1-e5172a2df86c", "DetectTime": "2023-10-30T14:13:20.236896+02:00", "EventTime": "2023-10-30T14:13:20.236906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C3nVis1dPMhM037t1b"]} -{"Format": "IDEA0", "ID": "142ba011-0973-44dc-a388-93597a4c03a8", "DetectTime": "2023-10-30T14:13:20.253211+02:00", "EventTime": "2023-10-30T14:13:20.253226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CZ10ng3qyS0XaUpB4d"]} -{"Format": "IDEA0", "ID": "e4ffc8c4-a127-48cd-b902-cb9a8f547874", "DetectTime": "2023-10-30T14:13:20.284125+02:00", "EventTime": "2023-10-30T14:13:20.284136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C0MMGB2Odecrqpjpn2"]} -{"Format": "IDEA0", "ID": "876aee54-4158-41dd-973c-064c2ff1ec01", "DetectTime": "2023-10-30T14:13:20.306115+02:00", "EventTime": "2023-10-30T14:13:20.306126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C6BraE31B4YS6NZRc7"]} -{"Format": "IDEA0", "ID": "9cb38e9e-86be-4274-a20c-febda1b0a32c", "DetectTime": "2023-10-30T14:13:20.325102+02:00", "EventTime": "2023-10-30T14:13:20.325118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CxwgOg3txHMVLdUhO8"]} -{"Format": "IDEA0", "ID": "10d7ca1d-1897-48a3-bf10-010e44ae4b78", "DetectTime": "2023-10-30T14:13:20.341978+02:00", "EventTime": "2023-10-30T14:13:20.341993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CguuOC1zHGHgNuSZSj"]} -{"Format": "IDEA0", "ID": "df1febca-def6-4538-b2a9-3d194a095c8b", "DetectTime": "2023-10-30T14:13:20.357904+02:00", "EventTime": "2023-10-30T14:13:20.357915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CDEt1j3W2x4qzFomce"]} -{"Format": "Json", "ID": "df1febca-def6-4538-b2a9-3d194a095c8b", "DetectTime": "2023-10-30T14:13:20.357904+02:00", "EventTime": "2023-10-30T14:13:20.357915+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T11:44:15.920453+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2023/10/30 14:13:20.422681)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "23bb6f42-c325-4987-8c06-8ebe7895d4d3", "DetectTime": "2023-10-30T14:13:20.427543+02:00", "EventTime": "2023-10-30T14:13:20.427556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ClONdd3YrWOo3T6yye"]} -{"Format": "IDEA0", "ID": "81465fec-e707-45c2-b35e-87e77959eb95", "DetectTime": "2023-10-30T14:13:20.445752+02:00", "EventTime": "2023-10-30T14:13:20.445768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvKwmH1u4632HWexFh"]} -{"Format": "IDEA0", "ID": "edf51377-9fdd-4031-9efa-94ce438ad63e", "DetectTime": "2023-10-30T14:13:20.464942+02:00", "EventTime": "2023-10-30T14:13:20.464955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CkC13E1rAgQUqabXul"]} -{"Format": "IDEA0", "ID": "f37906ef-a884-4a77-a306-b913d751e2e0", "DetectTime": "2023-10-30T14:13:20.485806+02:00", "EventTime": "2023-10-30T14:13:20.485823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CdTDGR2cf7D3dutN6l"]} -{"Format": "IDEA0", "ID": "d4842581-637f-4271-a392-a4f1d1c877a9", "DetectTime": "2023-10-30T14:13:20.502326+02:00", "EventTime": "2023-10-30T14:13:20.502337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CedW5Z3NNfOeBXgLC9"]} -{"Format": "IDEA0", "ID": "a34fcbbd-d047-41f9-aa87-77b09d08afca", "DetectTime": "2023-10-30T14:13:20.519671+02:00", "EventTime": "2023-10-30T14:13:20.519685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CSzvYvkCZtQs5lHf4"]} -{"Format": "IDEA0", "ID": "d8c51605-1a92-47a2-aaf7-516c5d2a3840", "DetectTime": "2023-10-30T14:13:20.537507+02:00", "EventTime": "2023-10-30T14:13:20.537524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C1I12T149mFoJV3nLc"]} -{"Format": "IDEA0", "ID": "abe8e1bb-0a6b-4670-89e8-aa451a620395", "DetectTime": "2023-10-30T14:13:20.552733+02:00", "EventTime": "2023-10-30T14:13:20.552743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CDa2FV9yiXbfgS9u1"]} -{"Format": "IDEA0", "ID": "e134a79d-9ef3-4671-becd-a3128a0d9122", "DetectTime": "2023-10-30T14:13:20.569478+02:00", "EventTime": "2023-10-30T14:13:20.569489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CVfKVd3WTQGPB6NUdj"]} -{"Format": "IDEA0", "ID": "7ad848fb-a5e2-4ecd-a84e-c5080ed37ac0", "DetectTime": "2023-10-30T14:13:20.587076+02:00", "EventTime": "2023-10-30T14:13:20.587089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4D29R2RjoJH1ugwkl"]} -{"Format": "IDEA0", "ID": "f4ad4bc6-585d-4586-922e-2d86f80335ba", "DetectTime": "2023-10-30T14:13:20.610045+02:00", "EventTime": "2023-10-30T14:13:20.610060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CBG5BVichQKeb5Pmc"]} -{"Format": "IDEA0", "ID": "ad69506e-63a4-462c-aec7-48bb7c40cdbb", "DetectTime": "2023-10-30T14:13:20.637595+02:00", "EventTime": "2023-10-30T14:13:20.637609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CNAQva4A7rcRmLRUKg"]} -{"Format": "IDEA0", "ID": "3565c7a5-06be-4c99-bbd7-710fcd8b65d4", "DetectTime": "2023-10-30T14:13:20.659269+02:00", "EventTime": "2023-10-30T14:13:20.659282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CUHoz3R2mVHtXH16f"]} -{"Format": "IDEA0", "ID": "35d3d526-9e15-44f6-8b14-b1e0c7756a5f", "DetectTime": "2023-10-30T14:13:20.675330+02:00", "EventTime": "2023-10-30T14:13:20.675341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CzV7YS3ImZs1UBmW3f"]} -{"Format": "IDEA0", "ID": "34a4c36f-25bf-4add-b227-5ddc558230f9", "DetectTime": "2023-10-30T14:13:20.693239+02:00", "EventTime": "2023-10-30T14:13:20.693255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CnvLwoTgXRsnA1I66"]} -{"Format": "IDEA0", "ID": "8de717f3-70c2-4e84-bd96-42fde5701ff8", "DetectTime": "2023-10-30T14:13:20.708920+02:00", "EventTime": "2023-10-30T14:13:20.708934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CW22R126TSgKWcyLs3"]} -{"Format": "IDEA0", "ID": "c46094a5-14ad-47e6-934a-d181130fc96f", "DetectTime": "2023-10-30T14:13:20.724461+02:00", "EventTime": "2023-10-30T14:13:20.724473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CxBZX24ZTRO8sh0rh1"]} -{"Format": "IDEA0", "ID": "5f1cb0f4-92a7-4bae-ab74-0f0b11bcc380", "DetectTime": "2023-10-30T14:13:20.739199+02:00", "EventTime": "2023-10-30T14:13:20.739213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CCnR0c3yH28oXMVlK5"]} -{"Format": "IDEA0", "ID": "f950b9be-341a-42cb-afc2-e2e314f3a093", "DetectTime": "2023-10-30T14:13:20.754177+02:00", "EventTime": "2023-10-30T14:13:20.754187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CwKsEM1CXOhYAmMo4c"]} -{"Format": "IDEA0", "ID": "1bfcf678-9c2e-4f7a-9f07-caa8b5cd76e2", "DetectTime": "2023-10-30T14:13:20.774575+02:00", "EventTime": "2023-10-30T14:13:20.774591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CstM1M3uCpuVHX2OEl"]} -{"Format": "IDEA0", "ID": "8eecae3c-de1d-4a9c-9f70-9a2fbb39a416", "DetectTime": "2023-10-30T14:13:20.795544+02:00", "EventTime": "2023-10-30T14:13:20.795570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZnN3M3s4Zc9VOPx7d"]} -{"Format": "IDEA0", "ID": "1c7788a0-45bc-4dbf-bc7a-e88828c237eb", "DetectTime": "2023-10-30T14:13:20.817182+02:00", "EventTime": "2023-10-30T14:13:20.817197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C6gm9L2veTVPW7Wld3"]} -{"Format": "IDEA0", "ID": "2f078cde-e92a-46a1-a769-570c2949ded1", "DetectTime": "2023-10-30T14:13:20.837585+02:00", "EventTime": "2023-10-30T14:13:20.837596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CS5h1A2m2il8lP27v6"]} -{"Format": "IDEA0", "ID": "0377f8fa-21f7-438a-8eb3-d9e92e9005c3", "DetectTime": "2023-10-30T14:13:20.857717+02:00", "EventTime": "2023-10-30T14:13:20.857727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C9l91lBi8IRGwuEGc"]} -{"Format": "IDEA0", "ID": "17c0db4d-23cb-43c5-9c23-8501c5783c14", "DetectTime": "2023-10-30T14:13:20.871303+02:00", "EventTime": "2023-10-30T14:13:20.871319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CxGtw71PyU7IrvG5Ze"]} -{"Format": "IDEA0", "ID": "f4dbc402-45b2-4400-9c5a-7e26363be370", "DetectTime": "2023-10-30T14:13:20.886890+02:00", "EventTime": "2023-10-30T14:13:20.886909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C41xQm1bpVvwj77zK8"]} -{"Format": "IDEA0", "ID": "1ddc49cc-36ba-4242-92bb-d21b3fd8c995", "DetectTime": "2023-10-30T14:13:20.902304+02:00", "EventTime": "2023-10-30T14:13:20.902322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CZy0JN2u4Ax1kValUj"]} -{"Format": "IDEA0", "ID": "78790c71-0f8d-4685-bbe8-c735dbad5711", "DetectTime": "2023-10-30T14:13:20.916471+02:00", "EventTime": "2023-10-30T14:13:20.916486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CrUon71oJjNNP1oju9"]} -{"Format": "IDEA0", "ID": "af03ab5b-eb8a-4be5-958d-c29a54ab2a51", "DetectTime": "2023-10-30T14:13:20.935916+02:00", "EventTime": "2023-10-30T14:13:20.935926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CxTuqh1J0EleTZJNK7"]} -{"Format": "IDEA0", "ID": "5fee4618-8cc3-4a5e-806f-26ab80ccdd0e", "DetectTime": "2023-10-30T14:13:20.950064+02:00", "EventTime": "2023-10-30T14:13:20.950083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CTjxV34pnEoOyRP2V3"]} -{"Format": "IDEA0", "ID": "d45bbf1b-16c1-4722-8eac-53ec87d83fa9", "DetectTime": "2023-10-30T14:13:20.966719+02:00", "EventTime": "2023-10-30T14:13:20.966730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Ctsups2951yMvYYUrd"]} -{"Format": "IDEA0", "ID": "db5ecaa4-1d0f-4402-a474-637ff2c26b24", "DetectTime": "2023-10-30T14:13:20.980514+02:00", "EventTime": "2023-10-30T14:13:20.980527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Ct82j03haSulXxRND2"]} -{"Format": "IDEA0", "ID": "b64b9a6a-578b-4f2f-be0e-561191dd38af", "DetectTime": "2023-10-30T14:13:20.993796+02:00", "EventTime": "2023-10-30T14:13:20.993814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CgX8WlWeofP3IJLc4"]} -{"Format": "IDEA0", "ID": "f8f0c615-452b-4831-8f13-58a1f4e7eb6f", "DetectTime": "2023-10-30T14:13:21.009688+02:00", "EventTime": "2023-10-30T14:13:21.009699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIutw44GPiwZrZafhg"]} -{"Format": "IDEA0", "ID": "34683a85-b672-456c-8a2e-0ea8dee8b599", "DetectTime": "2023-10-30T14:13:21.023211+02:00", "EventTime": "2023-10-30T14:13:21.023224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CIqprX1OvPxNxGPn8f"]} -{"Format": "IDEA0", "ID": "9651cbcb-9945-4d0c-b6a9-ece6bcaa24f8", "DetectTime": "2023-10-30T14:13:21.038933+02:00", "EventTime": "2023-10-30T14:13:21.038945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cj7rHd2WV0b6JGQfu8"]} -{"Format": "IDEA0", "ID": "f84c2c55-da35-463e-b1c5-d9026d52622b", "DetectTime": "2023-10-30T14:13:21.051342+02:00", "EventTime": "2023-10-30T14:13:21.051355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CZzgXo4Hu48ASQcpxj"]} -{"Format": "IDEA0", "ID": "f8f8787b-4276-4bff-a668-bf0aa27fd8ed", "DetectTime": "2023-10-30T14:13:21.067703+02:00", "EventTime": "2023-10-30T14:13:21.067720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CmwyYXBXQ7E4Q3md1"]} -{"Format": "IDEA0", "ID": "52ccee82-db9c-4831-8113-d5d43d74a711", "DetectTime": "2023-10-30T14:13:21.084593+02:00", "EventTime": "2023-10-30T14:13:21.084608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CbzJl71Yj3qN1l7xvb"]} -{"Format": "IDEA0", "ID": "1be0743e-2b46-4e0a-ae70-fc88a3d852c4", "DetectTime": "2023-10-30T14:13:21.100898+02:00", "EventTime": "2023-10-30T14:13:21.100914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CqHBFr2l5jM5O6Uog6"]} -{"Format": "IDEA0", "ID": "8cc0d101-750d-48e1-a775-ddffeae16676", "DetectTime": "2023-10-30T14:13:21.117150+02:00", "EventTime": "2023-10-30T14:13:21.117165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["ChyX8i1ysn5qQ6dQQi"]} -{"Format": "IDEA0", "ID": "bfcf2d69-2d8e-475c-b81b-79839d2efc1e", "DetectTime": "2023-10-30T14:13:21.132442+02:00", "EventTime": "2023-10-30T14:13:21.132452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CU1zQ94hYHAG2Uw3v4"]} -{"Format": "IDEA0", "ID": "2bc8b473-d519-45b7-a578-9a8d907e3e31", "DetectTime": "2023-10-30T14:13:21.143802+02:00", "EventTime": "2023-10-30T14:13:21.143812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJxrm63hqk7yfNkD1"]} -{"Format": "IDEA0", "ID": "cce7506b-ed29-4e23-958e-6f21a4997851", "DetectTime": "2023-10-30T14:13:21.156752+02:00", "EventTime": "2023-10-30T14:13:21.156766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CjOsAJ3l8upaIXHzB9"]} -{"Format": "IDEA0", "ID": "e731f694-4316-4e79-aa4a-647799c050b0", "DetectTime": "2023-10-30T14:13:21.178722+02:00", "EventTime": "2023-10-30T14:13:21.178733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CR4bH53h4s0hjWat"]} -{"Format": "IDEA0", "ID": "04efd1e1-64d6-4a65-ad2e-99cbe268b2fc", "DetectTime": "2023-10-30T14:13:21.192957+02:00", "EventTime": "2023-10-30T14:13:21.192972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CxOorG2jAnw29sR5ab"]} -{"Format": "IDEA0", "ID": "5647f532-6e73-4f05-852c-168ace63fb63", "DetectTime": "2023-10-30T14:13:21.207484+02:00", "EventTime": "2023-10-30T14:13:21.207495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C3ei2z4DX57EHAtgK4"]} -{"Format": "IDEA0", "ID": "52a266a4-b925-453b-93e2-84c3d6bb701c", "DetectTime": "2023-10-30T14:13:21.222600+02:00", "EventTime": "2023-10-30T14:13:21.222611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CqnNLA2U2ZtTkgaPWe"]} -{"Format": "IDEA0", "ID": "c0bb8a7f-70d0-4238-803e-42aef888def4", "DetectTime": "2023-10-30T14:13:21.236497+02:00", "EventTime": "2023-10-30T14:13:21.236514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Coss6A2lCsnT4UeZg1"]} -{"Format": "IDEA0", "ID": "3b011731-13dc-474e-abc8-65c4d22c7713", "DetectTime": "2023-10-30T14:13:21.249201+02:00", "EventTime": "2023-10-30T14:13:21.249211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cf5moY2MVq9yNPlkx6"]} -{"Format": "IDEA0", "ID": "90039d99-1a94-4e9c-b54a-7373b4ad75a3", "DetectTime": "2023-10-30T14:13:21.260245+02:00", "EventTime": "2023-10-30T14:13:21.260255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CvCaku4o826LEqyxy3"]} -{"Format": "IDEA0", "ID": "542dabd4-613d-438f-abee-846c3a770b13", "DetectTime": "2023-10-30T14:13:21.273502+02:00", "EventTime": "2023-10-30T14:13:21.273515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CP6HzHKOoNFa083wd"]} -{"Format": "IDEA0", "ID": "05575057-e01c-466d-9aca-e8e61d715b9f", "DetectTime": "2023-10-30T14:13:21.287086+02:00", "EventTime": "2023-10-30T14:13:21.287097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CdKIJd2dfOVmPUFdHg"]} -{"Format": "IDEA0", "ID": "8c9c9920-b22e-434b-9a2a-443c815a5e1b", "DetectTime": "2023-10-30T14:13:21.303480+02:00", "EventTime": "2023-10-30T14:13:21.303491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CFhEhLkjX8qqNlTp5"]} -{"Format": "IDEA0", "ID": "a9c95390-2e08-4261-9b10-4ababa69195f", "DetectTime": "2023-10-30T14:13:21.316718+02:00", "EventTime": "2023-10-30T14:13:21.316728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cz6k4e3BnZGcQdzJx2"]} -{"Format": "IDEA0", "ID": "4f144a70-fa95-4a32-9428-a9e9b56fc799", "DetectTime": "2023-10-30T14:13:21.328943+02:00", "EventTime": "2023-10-30T14:13:21.328964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cc3or335hwPiBhRZFj"]} -{"Format": "IDEA0", "ID": "2ba3af17-ad01-4a2b-a127-ca5ab0e76a87", "DetectTime": "2023-10-30T14:13:21.341977+02:00", "EventTime": "2023-10-30T14:13:21.341988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CIdb6Z3BBm4txTQ2i5"]} -{"Format": "IDEA0", "ID": "68f53621-b311-49f0-a443-261a68c0d93e", "DetectTime": "2023-10-30T14:13:21.353433+02:00", "EventTime": "2023-10-30T14:13:21.353444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CBpAhb4J6PDbXO8Zsf"]} -{"Format": "IDEA0", "ID": "9964a37a-737e-478f-8cfc-3e6a2a049cce", "DetectTime": "2023-10-30T14:13:21.365830+02:00", "EventTime": "2023-10-30T14:13:21.365841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CwuRyCu9Tvh3zMLq9"]} -{"Format": "IDEA0", "ID": "fa302dce-30a6-4103-a5b7-3839000cbeed", "DetectTime": "2023-10-30T14:13:21.379737+02:00", "EventTime": "2023-10-30T14:13:21.379750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CKQ9cu2VHssoyJIh"]} -{"Format": "IDEA0", "ID": "3f20120e-3ef1-494f-843a-8dbf3b5bd436", "DetectTime": "2023-10-30T14:13:21.394137+02:00", "EventTime": "2023-10-30T14:13:21.394152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ctbftd2K5Kc8WLzyDg"]} -{"Format": "IDEA0", "ID": "a407d1f9-74fb-48c2-97c6-767c7b1b9b16", "DetectTime": "2023-10-30T14:13:21.412653+02:00", "EventTime": "2023-10-30T14:13:21.412670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CfALXl1ZYsuIwn0vu5"]} -{"Format": "IDEA0", "ID": "9a88d787-9107-42a1-9610-1b25e10567a1", "DetectTime": "2023-10-30T14:13:21.439917+02:00", "EventTime": "2023-10-30T14:13:21.439928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["CrNR1oLpGEKtCryJ4"]} -{"Format": "IDEA0", "ID": "e58a7608-8dee-4900-8611-6212bf2fc3b9", "DetectTime": "2023-10-30T14:13:21.452634+02:00", "EventTime": "2023-10-30T14:13:21.452648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CylHJ53VBXKRUCMtua"]} -{"Format": "IDEA0", "ID": "c94c0f5a-e531-4c0c-8009-c6320f49648b", "DetectTime": "2023-10-30T14:13:21.465974+02:00", "EventTime": "2023-10-30T14:13:21.465985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CXqm4o9ygOXRIiQ2j"]} -{"Format": "IDEA0", "ID": "f405b245-43e1-4c0b-984e-b0997d472b05", "DetectTime": "2023-10-30T14:13:21.481135+02:00", "EventTime": "2023-10-30T14:13:21.481146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CJoD0L2NJq3WhRLbQ3"]} -{"Format": "IDEA0", "ID": "237e00ed-1142-4ca2-8d4a-f2a5ae2880ae", "DetectTime": "2023-10-30T14:13:21.493575+02:00", "EventTime": "2023-10-30T14:13:21.493591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C7Xd2Y11QOUbxNqpm4"]} -{"Format": "IDEA0", "ID": "ffd7520d-0daa-49f5-b92a-a74b7f36457b", "DetectTime": "2023-10-30T14:13:21.505852+02:00", "EventTime": "2023-10-30T14:13:21.505863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cf275k3NHY23lGtV13"]} -{"Format": "IDEA0", "ID": "7ed7a6d7-9b8f-484a-b30f-fd59f262285c", "DetectTime": "2023-10-30T14:13:21.521514+02:00", "EventTime": "2023-10-30T14:13:21.521525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cc2VAs3dD8tSlbuL21"]} -{"Format": "IDEA0", "ID": "fc2bb270-f86e-47fe-9b2e-b55843a4f350", "DetectTime": "2023-10-30T14:13:21.534672+02:00", "EventTime": "2023-10-30T14:13:21.534683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CGk75r2s7ZEs69GaW"]} -{"Format": "IDEA0", "ID": "12bfa4ae-c056-41f5-bbc9-d8ecd1d4aef7", "DetectTime": "2023-10-30T14:13:21.546901+02:00", "EventTime": "2023-10-30T14:13:21.546912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Ce1fbn1Orq7gJqkeD2"]} -{"Format": "IDEA0", "ID": "f013cf2c-509f-48b1-a9a2-b055aaa3f8cc", "DetectTime": "2023-10-30T14:13:21.558113+02:00", "EventTime": "2023-10-30T14:13:21.558124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["COMjGd8ul1qEzn7s5"]} -{"Format": "IDEA0", "ID": "09197734-71ba-4693-a505-fa9b70606cc3", "DetectTime": "2023-10-30T14:13:21.574988+02:00", "EventTime": "2023-10-30T14:13:21.575006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cr17Q12xYMLU6G7eQc"]} -{"Format": "IDEA0", "ID": "933c7c75-9de3-4b11-a610-0631d3d59151", "DetectTime": "2023-10-30T14:13:21.590938+02:00", "EventTime": "2023-10-30T14:13:21.590956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Ctj53ZvTMIaETKQel"]} -{"Format": "IDEA0", "ID": "d21e36ee-ae1d-446f-966a-de3df076ef55", "DetectTime": "2023-10-30T14:13:21.604467+02:00", "EventTime": "2023-10-30T14:13:21.604486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CC3T8u4hgl29rmOWM8"]} -{"Format": "IDEA0", "ID": "c37d57e5-7342-49cf-972e-2bbb301247e1", "DetectTime": "2023-10-30T14:13:21.617226+02:00", "EventTime": "2023-10-30T14:13:21.617244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["COxzBP3IpnzsiaZPSj"]} -{"Format": "IDEA0", "ID": "1494aa82-f15f-40f6-b5c6-29c936477f1a", "DetectTime": "2023-10-30T14:13:21.633850+02:00", "EventTime": "2023-10-30T14:13:21.633861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CAoum92IQ2tOCd3DY3"]} -{"Format": "IDEA0", "ID": "b6203709-599a-41e1-90fc-cd7521f171c7", "DetectTime": "2023-10-30T14:13:21.646917+02:00", "EventTime": "2023-10-30T14:13:21.646932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPvjAg2mZkBIb554k7"]} -{"Format": "IDEA0", "ID": "9d2f7532-8892-455c-b402-2da79ff4b76f", "DetectTime": "2023-10-30T14:13:21.662639+02:00", "EventTime": "2023-10-30T14:13:21.662650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQphYu3jezxPRLqyW6"]} -{"Format": "IDEA0", "ID": "fa639a67-42e5-41e5-9832-aacce6abd852", "DetectTime": "2023-10-30T14:13:21.675379+02:00", "EventTime": "2023-10-30T14:13:21.675399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CSEKdE25KFgFVmqcn9"]} -{"Format": "IDEA0", "ID": "c5f79f36-4790-4a31-8b2c-08a4a3dfc8c9", "DetectTime": "2023-10-30T14:13:21.691725+02:00", "EventTime": "2023-10-30T14:13:21.691752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C4lFiQ167VLED5LHPi"]} -{"Format": "IDEA0", "ID": "c1388c01-2696-45dc-896b-a051af52fa9a", "DetectTime": "2023-10-30T14:13:21.715378+02:00", "EventTime": "2023-10-30T14:13:21.715390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CuSjPOILz2UnP0qy8"]} -{"Format": "IDEA0", "ID": "7a201640-b6f7-493b-96d3-626ac50b106b", "DetectTime": "2023-10-30T14:13:21.730879+02:00", "EventTime": "2023-10-30T14:13:21.730898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CVX6922CVQIOPq6TL7"]} -{"Format": "IDEA0", "ID": "4472aa4b-f870-404e-b69f-4554011b2807", "DetectTime": "2023-10-30T14:13:21.745571+02:00", "EventTime": "2023-10-30T14:13:21.745587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CRf1j13s2LCXXhdebd"]} -{"Format": "IDEA0", "ID": "637d51e5-a797-47e3-bb12-fa46ca65338c", "DetectTime": "2023-10-30T14:13:21.760918+02:00", "EventTime": "2023-10-30T14:13:21.760929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CntazNgVvwm98VhQ9"]} -{"Format": "IDEA0", "ID": "69111aa1-f9d0-498e-88e0-540346ec7b9f", "DetectTime": "2023-10-30T14:13:21.776668+02:00", "EventTime": "2023-10-30T14:13:21.776682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CkmPWNnei0vvxnCzd"]} -{"Format": "IDEA0", "ID": "21386583-51e2-4b67-a258-95e007c716a0", "DetectTime": "2023-10-30T14:13:21.790412+02:00", "EventTime": "2023-10-30T14:13:21.790426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CULHno17h3Cmw5hjzb"]} -{"Format": "IDEA0", "ID": "f0e94f3d-4f5e-4a85-abcc-518b46e5f0b1", "DetectTime": "2023-10-30T14:13:21.802405+02:00", "EventTime": "2023-10-30T14:13:21.802416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CDTPk44SowbpQbtYpb"]} -{"Format": "IDEA0", "ID": "207ce065-49ce-4b57-add8-e150ef932e5c", "DetectTime": "2023-10-30T14:13:21.816267+02:00", "EventTime": "2023-10-30T14:13:21.816278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CuWScr1ZAZBiLNHh2k"]} -{"Format": "IDEA0", "ID": "f07dc88a-bbd1-4ce4-9eb4-cb132c13e5f0", "DetectTime": "2023-10-30T14:13:21.828803+02:00", "EventTime": "2023-10-30T14:13:21.828814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cvr7fZGrS7VWa0157"]} -{"Format": "IDEA0", "ID": "5b4bed7c-9b28-4836-b2b8-2e02cc46f453", "DetectTime": "2023-10-30T14:13:21.850960+02:00", "EventTime": "2023-10-30T14:13:21.850971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CkB92Z2Ff1lucjrSe"]} -{"Format": "IDEA0", "ID": "f5577c27-ea8d-459b-aa18-fc5c923e2c99", "DetectTime": "2023-10-30T14:13:21.865999+02:00", "EventTime": "2023-10-30T14:13:21.866009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.68.87 ", "ContentType": "text/plain"}], "uids": ["Ci0bMB4Gf25WO82nK5"]} -{"Format": "IDEA0", "ID": "f14ab4e8-c59b-4a72-a8e1-1c806694db11", "DetectTime": "2023-10-30T14:13:21.882322+02:00", "EventTime": "2023-10-30T14:13:21.882333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CW8lz4tclgLJwPDFg"]} -{"Format": "IDEA0", "ID": "b1757b75-d512-4b76-9490-8aeff3facc15", "DetectTime": "2023-10-30T14:13:21.896474+02:00", "EventTime": "2023-10-30T14:13:21.896484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CZIe4AwYJHidPsif2"]} -{"Format": "IDEA0", "ID": "a961f767-c0b7-4012-b47b-82c669e317d8", "DetectTime": "2023-10-30T14:13:21.910562+02:00", "EventTime": "2023-10-30T14:13:21.910577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CKZxms4Vn8X0JZtkud"]} -{"Format": "IDEA0", "ID": "1be08956-929c-4d54-a93b-8ebb75914ea8", "DetectTime": "2023-10-30T14:13:21.930473+02:00", "EventTime": "2023-10-30T14:13:21.930487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRImEr4ikQlgOKsDtd"]} -{"Format": "IDEA0", "ID": "f0d75c05-d8ce-4873-a55c-6d76e2bd0f1e", "DetectTime": "2023-10-30T14:13:21.956663+02:00", "EventTime": "2023-10-30T14:13:21.956680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CUGhp01XaMaBUw5Ttb"]} -{"Format": "IDEA0", "ID": "ad4f4cbe-163b-4619-ae74-4fe3465f461b", "DetectTime": "2023-10-30T14:13:21.973791+02:00", "EventTime": "2023-10-30T14:13:21.973802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C0IQJJ13dBl1ubULVc"]} -{"Format": "IDEA0", "ID": "2a7c5661-8655-44ba-8007-0aa1e144f362", "DetectTime": "2023-10-30T14:13:21.987636+02:00", "EventTime": "2023-10-30T14:13:21.987654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CY8laJYpwpw7ysf9f"]} -{"Format": "IDEA0", "ID": "c9d04d25-1238-4148-b4c2-2e860f610fb5", "DetectTime": "2023-10-30T14:13:22.003731+02:00", "EventTime": "2023-10-30T14:13:22.003742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cmpfeq3QQx0YUdqHxg"]} -{"Format": "IDEA0", "ID": "2a326b39-12f8-44e8-8eb6-6993f224ec5d", "DetectTime": "2023-10-30T14:13:22.021857+02:00", "EventTime": "2023-10-30T14:13:22.021873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C37yrc2vvOsdCHoIB7"]} -{"Format": "IDEA0", "ID": "9e7a6a15-aee3-4c0f-ac2c-48971edd9db1", "DetectTime": "2023-10-30T14:13:22.040257+02:00", "EventTime": "2023-10-30T14:13:22.040273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CGzi1U1dB3ZszmEApg"]} -{"Format": "IDEA0", "ID": "6736771a-41b5-4dd7-82b4-ee733f5e1c66", "DetectTime": "2023-10-30T14:13:22.056623+02:00", "EventTime": "2023-10-30T14:13:22.056634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cr3c2tVR6dBde0jl"]} -{"Format": "IDEA0", "ID": "7266f504-0337-4c7c-a265-1aa3400fe867", "DetectTime": "2023-10-30T14:13:22.073816+02:00", "EventTime": "2023-10-30T14:13:22.073832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CruLie37E9hdujhds8"]} -{"Format": "IDEA0", "ID": "8902bf9e-e61c-4c34-a09c-6fd7a805c72a", "DetectTime": "2023-10-30T14:13:22.092697+02:00", "EventTime": "2023-10-30T14:13:22.092713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CoL4Pp3XxkpZcIISn8"]} -{"Format": "IDEA0", "ID": "4b9e395f-e90f-4cd0-a3af-0826a4bd7863", "DetectTime": "2023-10-30T14:13:22.110738+02:00", "EventTime": "2023-10-30T14:13:22.110751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CwZbVE3hXx5ZKtk4B6"]} -{"Format": "IDEA0", "ID": "4c4acdc2-3b78-400a-b493-20ee9134e866", "DetectTime": "2023-10-30T14:13:22.128413+02:00", "EventTime": "2023-10-30T14:13:22.128429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ciqrln1LVxwofRarfg"]} -{"Format": "IDEA0", "ID": "a6d89cdc-5033-4384-89d2-fada5fd7fd05", "DetectTime": "2023-10-30T14:13:22.147094+02:00", "EventTime": "2023-10-30T14:13:22.147108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CvKXep39P6kcm1sSF"]} -{"Format": "IDEA0", "ID": "dc362f56-ce78-4b87-b479-727d49866acb", "DetectTime": "2023-10-30T14:13:22.164561+02:00", "EventTime": "2023-10-30T14:13:22.164577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CTfnIb3grUZieadm2g"]} -{"Format": "IDEA0", "ID": "98aefe5a-3d8d-4234-9495-7dfdb21e4d31", "DetectTime": "2023-10-30T14:13:22.183830+02:00", "EventTime": "2023-10-30T14:13:22.183843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CmkQBH3ilxUeik8oPc"]} -{"Format": "IDEA0", "ID": "a2ab48ed-94b4-4f5b-afd4-30b9db12120d", "DetectTime": "2023-10-30T14:13:22.200318+02:00", "EventTime": "2023-10-30T14:13:22.200340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C6lgkzAvSVcCvi1Pf"]} -{"Format": "IDEA0", "ID": "25efc6d0-de9e-4d8b-af28-97bd36b1fab6", "DetectTime": "2023-10-30T14:13:22.217413+02:00", "EventTime": "2023-10-30T14:13:22.217433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C9c8bnOY1LFUc4n7k"]} -{"Format": "IDEA0", "ID": "a01b4a2b-477c-44d8-842d-79bcfefc5dff", "DetectTime": "2023-10-30T14:13:22.235538+02:00", "EventTime": "2023-10-30T14:13:22.235554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C7Apopq3v5rKo2Zq5"]} -{"Format": "Json", "ID": "a01b4a2b-477c-44d8-842d-79bcfefc5dff", "DetectTime": "2023-10-30T14:13:22.235538+02:00", "EventTime": "2023-10-30T14:13:22.235554+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T11:44:17.635885+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2023/10/30 14:13:22.305056)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0743bb10-3574-46dc-aebd-5e8e72948273", "DetectTime": "2023-10-30T14:13:22.309554+02:00", "EventTime": "2023-10-30T14:13:22.309564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CsSDnr2wj5xmwns9Me"]} -{"Format": "IDEA0", "ID": "427c4da1-a2f2-4397-82ee-c1f92a63524a", "DetectTime": "2023-10-30T14:13:22.326727+02:00", "EventTime": "2023-10-30T14:13:22.326740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CYyDmF3i4Ywo83gKE3"]} -{"Format": "IDEA0", "ID": "842c42bf-da67-45a0-80ff-399fe733edca", "DetectTime": "2023-10-30T14:13:22.349093+02:00", "EventTime": "2023-10-30T14:13:22.349103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C6rZTf289Cxw1eIkF2"]} -{"Format": "IDEA0", "ID": "b3f73c90-7fb4-460f-a232-e91f840c6091", "DetectTime": "2023-10-30T14:13:22.364876+02:00", "EventTime": "2023-10-30T14:13:22.364892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ChyQQw3ohtLwuiA6N5"]} -{"Format": "IDEA0", "ID": "d18a33d5-fa03-4f24-a573-1aacd51f13e1", "DetectTime": "2023-10-30T14:13:22.382041+02:00", "EventTime": "2023-10-30T14:13:22.382054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CxpVWcIZirvER2Id4"]} -{"Format": "IDEA0", "ID": "1bb00902-ace8-4cc6-a5d5-84c46aa3ad1c", "DetectTime": "2023-10-30T14:13:22.397674+02:00", "EventTime": "2023-10-30T14:13:22.397685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CwVyEaIw8Khi3IRLd"]} -{"Format": "IDEA0", "ID": "17984bdc-0c3c-4cbd-bc6d-ad4f66d9fea6", "DetectTime": "2023-10-30T14:13:22.416190+02:00", "EventTime": "2023-10-30T14:13:22.416205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Ctpos542JTwdCUx7l8"]} -{"Format": "IDEA0", "ID": "a27d09e9-a891-4087-b859-3c7ae5856b5e", "DetectTime": "2023-10-30T14:13:22.434633+02:00", "EventTime": "2023-10-30T14:13:22.434644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CAoHEq1B3kYa11dQpc"]} -{"Format": "IDEA0", "ID": "92e7bb85-dc5b-4801-a8ed-63f5ca75a9dd", "DetectTime": "2023-10-30T14:13:22.451022+02:00", "EventTime": "2023-10-30T14:13:22.451034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CPAzVD3L5gQZkuhxEg"]} -{"Format": "IDEA0", "ID": "31db7ffe-a54c-4e47-9934-42b37482b556", "DetectTime": "2023-10-30T14:13:22.466009+02:00", "EventTime": "2023-10-30T14:13:22.466021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CnygQB2Uy0ZOk212d"]} -{"Format": "IDEA0", "ID": "454697f9-7ef8-4bca-99a6-a75da156c9ea", "DetectTime": "2023-10-30T14:13:22.479880+02:00", "EventTime": "2023-10-30T14:13:22.479890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Ck8Yxf3kjmApkqLoF2"]} -{"Format": "IDEA0", "ID": "a923c7fb-328a-4fd3-80e5-486e1424ae6e", "DetectTime": "2023-10-30T14:13:22.493330+02:00", "EventTime": "2023-10-30T14:13:22.493347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cwnbht4GESLE2oBwx8"]} -{"Format": "IDEA0", "ID": "bab951bc-46d6-428d-b80a-88d277dd6a08", "DetectTime": "2023-10-30T14:13:22.516412+02:00", "EventTime": "2023-10-30T14:13:22.516424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CAfoLS2xOgQm3xQCwb"]} -{"Format": "IDEA0", "ID": "03e13b72-9e93-487c-b1e3-e7db6a374404", "DetectTime": "2023-10-30T14:13:22.529604+02:00", "EventTime": "2023-10-30T14:13:22.529621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CMj51a4PgkBVk6lF13"]} -{"Format": "IDEA0", "ID": "f46124fc-55ed-4f66-9a91-5ea2dc0d8459", "DetectTime": "2023-10-30T14:13:22.546949+02:00", "EventTime": "2023-10-30T14:13:22.546961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cjb1ZF3yCYfvh30As9"]} -{"Format": "IDEA0", "ID": "183ea41e-1f77-453c-bc4f-afe48716f21f", "DetectTime": "2023-10-30T14:13:22.563553+02:00", "EventTime": "2023-10-30T14:13:22.563563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CshIGz2gZd7XkGaVe8"]} -{"Format": "IDEA0", "ID": "b6ba83a7-1a81-4883-b69e-839e9f8cb448", "DetectTime": "2023-10-30T14:13:22.582858+02:00", "EventTime": "2023-10-30T14:13:22.582875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C3GKP223nmYXvo5Eu1"]} -{"Format": "IDEA0", "ID": "1345757b-b4b2-412c-8c54-85c73bec1cc2", "DetectTime": "2023-10-30T14:13:22.598161+02:00", "EventTime": "2023-10-30T14:13:22.598174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["COWqhm1wpI0EkQB3Aa"]} -{"Format": "IDEA0", "ID": "39204d5c-3722-4222-8c99-b82eb8f68141", "DetectTime": "2023-10-30T14:13:22.616786+02:00", "EventTime": "2023-10-30T14:13:22.616802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CWjoZjDqOV2zqo1E7"]} -{"Format": "IDEA0", "ID": "537f79bd-3c21-4909-a701-ad33f97f47e1", "DetectTime": "2023-10-30T14:13:22.633212+02:00", "EventTime": "2023-10-30T14:13:22.633223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CttICi3uHdcRXhKhz"]} -{"Format": "IDEA0", "ID": "6f7d1b40-7825-4f1c-be90-585ef52bdc91", "DetectTime": "2023-10-30T14:13:22.647954+02:00", "EventTime": "2023-10-30T14:13:22.647982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C3EcIxiYTUsS8JT21"]} -{"Format": "IDEA0", "ID": "f19270a9-34ca-429b-9cf9-0d9d3832914d", "DetectTime": "2023-10-30T14:13:22.661922+02:00", "EventTime": "2023-10-30T14:13:22.661939+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CErfAZtxcOJ4WV2Wc"]} -{"Format": "IDEA0", "ID": "83766491-6615-41f4-88f5-49b975915784", "DetectTime": "2023-10-30T14:13:22.674357+02:00", "EventTime": "2023-10-30T14:13:22.674367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C2VD1d1fudxTPqNawc"]} -{"Format": "IDEA0", "ID": "ac4f322b-3e99-45c6-9def-3bcfc109d57e", "DetectTime": "2023-10-30T14:13:22.689778+02:00", "EventTime": "2023-10-30T14:13:22.689791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZEpO617mV41UWnywk"]} -{"Format": "IDEA0", "ID": "727ec22a-52cd-4dac-98f5-cb625d8c1269", "DetectTime": "2023-10-30T14:13:22.707427+02:00", "EventTime": "2023-10-30T14:13:22.707440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbF2QdvRuLUYU8LOi"]} -{"Format": "IDEA0", "ID": "32cca0d3-5046-4fc7-8db4-2f5e9d29d8a4", "DetectTime": "2023-10-30T14:13:22.723827+02:00", "EventTime": "2023-10-30T14:13:22.723838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CEdZvv2SYbQOdABwZ7"]} -{"Format": "IDEA0", "ID": "b820f135-af8b-4075-ad11-970ca30aa892", "DetectTime": "2023-10-30T14:13:22.736658+02:00", "EventTime": "2023-10-30T14:13:22.736668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CQefEL1qcDbfcqAQia"]} -{"Format": "IDEA0", "ID": "46e55053-74bf-442f-b307-c6b7b895218d", "DetectTime": "2023-10-30T14:13:22.756723+02:00", "EventTime": "2023-10-30T14:13:22.756743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C9UhKW2ulqYIwj0DX8"]} -{"Format": "IDEA0", "ID": "7d298919-ff2d-4b16-9508-91d972fb2984", "DetectTime": "2023-10-30T14:13:22.770394+02:00", "EventTime": "2023-10-30T14:13:22.770405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCWebq25guBOhgeK1"]} -{"Format": "IDEA0", "ID": "c5640126-8e35-4ef9-acc7-0869eed80087", "DetectTime": "2023-10-30T14:13:22.785305+02:00", "EventTime": "2023-10-30T14:13:22.785320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ch7ukH14ZrqQ4Te138"]} -{"Format": "IDEA0", "ID": "85392cbf-8891-410e-803d-16358121d4b8", "DetectTime": "2023-10-30T14:13:22.805024+02:00", "EventTime": "2023-10-30T14:13:22.805039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C1fuYy4U45iFCDsxWe"]} -{"Format": "IDEA0", "ID": "edef757d-3e5f-4e18-b77b-c6103f981e27", "DetectTime": "2023-10-30T14:13:22.824270+02:00", "EventTime": "2023-10-30T14:13:22.824286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CBSqUa3rrDpp2Zyfue"]} -{"Format": "IDEA0", "ID": "6c51e48a-9d57-4725-b4d8-0c50dc21b98e", "DetectTime": "2023-10-30T14:13:22.840677+02:00", "EventTime": "2023-10-30T14:13:22.840689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cnagvp4ajJ70ysfhA3"]} -{"Format": "IDEA0", "ID": "10667f49-de5e-40b0-99cc-8b678d20f03c", "DetectTime": "2023-10-30T14:13:22.855550+02:00", "EventTime": "2023-10-30T14:13:22.855562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CcxdXr4ZkV2fbesxhd"]} -{"Format": "IDEA0", "ID": "cfca2a48-2e2d-4255-9e53-761a3485f56e", "DetectTime": "2023-10-30T14:13:22.868789+02:00", "EventTime": "2023-10-30T14:13:22.868799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C7pnrU38pyagdl62E6"]} -{"Format": "IDEA0", "ID": "8d5adf1b-489b-4b21-8889-18661cbb7b71", "DetectTime": "2023-10-30T14:13:22.881805+02:00", "EventTime": "2023-10-30T14:13:22.881816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CwtAq64K1YHIKV2396"]} -{"Format": "IDEA0", "ID": "4d055788-5057-49a9-be7e-0eb9f1ef96e0", "DetectTime": "2023-10-30T14:13:22.895740+02:00", "EventTime": "2023-10-30T14:13:22.895750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjbOKAYaMwAUZtwi1"]} -{"Format": "IDEA0", "ID": "f713fa7e-8bb0-450c-af17-cd87e08622bf", "DetectTime": "2023-10-30T14:13:22.909789+02:00", "EventTime": "2023-10-30T14:13:22.909801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CiNwoG4VJqTHMSPOhg"]} -{"Format": "IDEA0", "ID": "c4ecb18c-db0e-4a3b-ac4e-70c5e3911a7e", "DetectTime": "2023-10-30T14:13:22.922032+02:00", "EventTime": "2023-10-30T14:13:22.922042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["COq35uJNEJdZwdgV4"]} -{"Format": "IDEA0", "ID": "8631d01d-0ae0-4e26-9ed9-3240a916645e", "DetectTime": "2023-10-30T14:13:22.935792+02:00", "EventTime": "2023-10-30T14:13:22.935802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CSY3foXfolAh5I695"]} -{"Format": "IDEA0", "ID": "d4a7738d-fd42-47da-ba3d-088c346b6d68", "DetectTime": "2023-10-30T14:13:22.948658+02:00", "EventTime": "2023-10-30T14:13:22.948669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CtQimk4Q4jwnNdFLcc"]} -{"Format": "IDEA0", "ID": "0d1f4fdf-2fde-4914-8765-a46b8bd3ea77", "DetectTime": "2023-10-30T14:13:22.964479+02:00", "EventTime": "2023-10-30T14:13:22.964491+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C7t0ik2XERTMBoFYL9"]} -{"Format": "IDEA0", "ID": "16b5f124-a3b1-4fc0-9d27-0ecd48d709a5", "DetectTime": "2023-10-30T14:13:22.984942+02:00", "EventTime": "2023-10-30T14:13:22.984953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CFEmb34O9RZIkPNjy4"]} -{"Format": "IDEA0", "ID": "1f0b7a37-2173-4ad8-b143-6cc3d14fe8b9", "DetectTime": "2023-10-30T14:13:22.999249+02:00", "EventTime": "2023-10-30T14:13:22.999259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cr5GEP1k5QSRltJRR8"]} -{"Format": "IDEA0", "ID": "000daba2-ae0a-4031-a2bd-64c870de0aec", "DetectTime": "2023-10-30T14:13:23.016682+02:00", "EventTime": "2023-10-30T14:13:23.016698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C7gyh715CUo79qIUZ4"]} -{"Format": "IDEA0", "ID": "70c4d297-efd6-4d57-95a0-b37c9cbcd9d3", "DetectTime": "2023-10-30T14:13:23.033391+02:00", "EventTime": "2023-10-30T14:13:23.033404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1E6PpTqBWTr7hDCe"]} -{"Format": "IDEA0", "ID": "1aa1efde-62fb-4700-807c-cfb2dd6188f7", "DetectTime": "2023-10-30T14:13:23.051076+02:00", "EventTime": "2023-10-30T14:13:23.051094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9BCzk40dd608tQE1"]} -{"Format": "IDEA0", "ID": "b4265cef-f05f-485a-8263-d9ec64ad2cd6", "DetectTime": "2023-10-30T14:13:23.068473+02:00", "EventTime": "2023-10-30T14:13:23.068489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CQ1kTg1cbdaIZtMS6e"]} -{"Format": "IDEA0", "ID": "8a15d00a-8cf4-44cf-82be-0642e7620a9f", "DetectTime": "2023-10-30T14:13:23.085595+02:00", "EventTime": "2023-10-30T14:13:23.085612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CJLrzC4szqXKti1t7i"]} -{"Format": "IDEA0", "ID": "b1c6103a-5ec9-4e01-8bb8-041df33487ce", "DetectTime": "2023-10-30T14:13:23.099672+02:00", "EventTime": "2023-10-30T14:13:23.099690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CCWI9F1ieAWRBHNR03"]} -{"Format": "IDEA0", "ID": "7623e1b9-a2dc-4c0e-9c60-f8914fbce0d0", "DetectTime": "2023-10-30T14:13:23.117998+02:00", "EventTime": "2023-10-30T14:13:23.118014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CEMtP32sE4tZu6uMIj"]} -{"Format": "IDEA0", "ID": "c964fff5-22f5-4a80-b471-9351d83ff283", "DetectTime": "2023-10-30T14:13:23.136241+02:00", "EventTime": "2023-10-30T14:13:23.136255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZ0wiM3oxEM4DMbGre"]} -{"Format": "IDEA0", "ID": "0bdbcf24-47de-4ec9-8f12-e06e232b67eb", "DetectTime": "2023-10-30T14:13:23.155753+02:00", "EventTime": "2023-10-30T14:13:23.155768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CFfL5IcjrRxyrsLe1"]} -{"Format": "IDEA0", "ID": "9fb70753-9c36-4c0e-949f-4d7ed9a39683", "DetectTime": "2023-10-30T14:13:23.173885+02:00", "EventTime": "2023-10-30T14:13:23.173901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CY5WK22lvkcKSbOM52"]} -{"Format": "IDEA0", "ID": "ef50da59-23ef-48d6-a54e-f39351c8ca12", "DetectTime": "2023-10-30T14:13:23.189942+02:00", "EventTime": "2023-10-30T14:13:23.189959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cpmou21phhlA7ZE748"]} -{"Format": "IDEA0", "ID": "304cfd74-3a78-4a45-9b23-f28db610796d", "DetectTime": "2023-10-30T14:13:23.204688+02:00", "EventTime": "2023-10-30T14:13:23.204700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cx89wh2ulMVF5uUi09"]} -{"Format": "IDEA0", "ID": "db1caed6-3aac-4cbe-8a95-4992176e1c64", "DetectTime": "2023-10-30T14:13:23.222433+02:00", "EventTime": "2023-10-30T14:13:23.222449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C07fFF4VEBFmMKz96h"]} -{"Format": "IDEA0", "ID": "b6599fb4-b2a2-45c0-b612-17c88abd1ee3", "DetectTime": "2023-10-30T14:13:23.241113+02:00", "EventTime": "2023-10-30T14:13:23.241127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CZBNwt4vItKuYqsD96"]} -{"Format": "IDEA0", "ID": "cac3061d-7b34-47e4-8ff0-82a2571a2d83", "DetectTime": "2023-10-30T14:13:23.256193+02:00", "EventTime": "2023-10-30T14:13:23.256210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ClmfHi3P2nd8OHo3b3"]} -{"Format": "IDEA0", "ID": "d5e1fe2f-f602-494f-9e4f-7a20d4f71433", "DetectTime": "2023-10-30T14:13:23.272554+02:00", "EventTime": "2023-10-30T14:13:23.272565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CrrdDm19gim0muUP97"]} -{"Format": "IDEA0", "ID": "039c411b-12ff-431e-b8f9-c576bf1f429c", "DetectTime": "2023-10-30T14:13:23.289545+02:00", "EventTime": "2023-10-30T14:13:23.289560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CdvsWn1eqmaGLmVzT2"]} -{"Format": "IDEA0", "ID": "30acbe93-0a94-4c2c-84c7-e7b935450a14", "DetectTime": "2023-10-30T14:13:23.304175+02:00", "EventTime": "2023-10-30T14:13:23.304186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C7B8uO3GzxJRTFiPod"]} -{"Format": "IDEA0", "ID": "3d9c6f77-f997-4c42-9c20-255f92e20541", "DetectTime": "2023-10-30T14:13:23.317855+02:00", "EventTime": "2023-10-30T14:13:23.317867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CGfYz145PjTjjNWeJc"]} -{"Format": "IDEA0", "ID": "5b7186af-4d89-4233-af8c-cfef08af4d54", "DetectTime": "2023-10-30T14:13:23.331841+02:00", "EventTime": "2023-10-30T14:13:23.331856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["ChKz491Pz5T12yQbxh"]} -{"Format": "IDEA0", "ID": "7b602e6c-b659-4b45-a94e-480918b0bdd0", "DetectTime": "2023-10-30T14:13:23.348825+02:00", "EventTime": "2023-10-30T14:13:23.348841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CBfau31yoUoLymvRX7"]} -{"Format": "IDEA0", "ID": "5b6855cb-ebdf-4c96-a5bb-2825f4e1581b", "DetectTime": "2023-10-30T14:13:23.365148+02:00", "EventTime": "2023-10-30T14:13:23.365158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C7xqNt2CVre2Q9nJ9"]} -{"Format": "IDEA0", "ID": "8a24582d-9aa7-4783-8218-1d32ac242e01", "DetectTime": "2023-10-30T14:13:23.379329+02:00", "EventTime": "2023-10-30T14:13:23.379344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CQrvUb1szdjrVN9kI1"]} -{"Format": "IDEA0", "ID": "77ca192d-a343-4cf5-9fae-0af764774a7f", "DetectTime": "2023-10-30T14:13:23.393907+02:00", "EventTime": "2023-10-30T14:13:23.393921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CgxlZQ28fW2a86GEV4"]} -{"Format": "IDEA0", "ID": "09276343-3927-4bcc-a668-281a5bc869cb", "DetectTime": "2023-10-30T14:13:23.409509+02:00", "EventTime": "2023-10-30T14:13:23.409520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C4BMQL3d9117leCFEg"]} -{"Format": "IDEA0", "ID": "357deefc-c165-4c50-a3f9-6180d701f4df", "DetectTime": "2023-10-30T14:13:23.425085+02:00", "EventTime": "2023-10-30T14:13:23.425095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Ckrcks6bsGpteN7Rf"]} -{"Format": "IDEA0", "ID": "e78ecbea-d097-4bb4-9aa5-697c38781e27", "DetectTime": "2023-10-30T14:13:23.440204+02:00", "EventTime": "2023-10-30T14:13:23.440216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CU0lUkBdIAostEcp1"]} -{"Format": "IDEA0", "ID": "f0e11ca0-13a3-4f6b-9cd0-a8b46d3dcdf9", "DetectTime": "2023-10-30T14:13:23.452488+02:00", "EventTime": "2023-10-30T14:13:23.452499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Ci1mMI1sjglSlpyHpa"]} -{"Format": "IDEA0", "ID": "364df0c9-aba6-424b-91c0-7caba973968f", "DetectTime": "2023-10-30T14:13:23.467796+02:00", "EventTime": "2023-10-30T14:13:23.467807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CFhkwh1VdMogNoR4hf"]} -{"Format": "IDEA0", "ID": "6e0075d0-8390-4960-b20c-390beb028c85", "DetectTime": "2023-10-30T14:13:23.483176+02:00", "EventTime": "2023-10-30T14:13:23.483188+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C3Uxld3qpsadkitKL9"]} -{"Format": "IDEA0", "ID": "548e8f71-00ff-4db2-8e4a-b88fc374f7c5", "DetectTime": "2023-10-30T14:13:23.498566+02:00", "EventTime": "2023-10-30T14:13:23.498578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXDqw9242wLh4Zde69"]} -{"Format": "IDEA0", "ID": "168ca520-2dc5-4956-ac40-23bce3a306ce", "DetectTime": "2023-10-30T14:13:23.512658+02:00", "EventTime": "2023-10-30T14:13:23.512668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CqZMGT1ENFbr08gkdd"]} -{"Format": "IDEA0", "ID": "ecd52a1b-5383-402a-94b9-4ab6a0aa503c", "DetectTime": "2023-10-30T14:13:23.526327+02:00", "EventTime": "2023-10-30T14:13:23.526346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CvdNfDWwP7rIDcF1b"]} -{"Format": "IDEA0", "ID": "b29fe233-80d8-4e43-aff9-d33c7a1fb040", "DetectTime": "2023-10-30T14:13:23.539915+02:00", "EventTime": "2023-10-30T14:13:23.539932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C7qjvu1AiOYouOGiDd"]} -{"Format": "IDEA0", "ID": "42bba19b-4e77-4c78-b2e8-b713fe48c64c", "DetectTime": "2023-10-30T14:13:23.565816+02:00", "EventTime": "2023-10-30T14:13:23.565831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CnDF7V2wd63ixAnSda"]} -{"Format": "IDEA0", "ID": "c30cf427-a9c6-4917-a16b-a0a540acdee2", "DetectTime": "2023-10-30T14:13:23.584591+02:00", "EventTime": "2023-10-30T14:13:23.584609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CsiOet1V1ENgDwourc"]} -{"Format": "IDEA0", "ID": "31efba84-eb49-4153-9a5c-0e4614c824f1", "DetectTime": "2023-10-30T14:13:23.602262+02:00", "EventTime": "2023-10-30T14:13:23.602272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C0psi71ofODzvW8Yq"]} -{"Format": "IDEA0", "ID": "cb1ff660-5ee8-45a0-87ac-2d8aa44f5c69", "DetectTime": "2023-10-30T14:13:23.618618+02:00", "EventTime": "2023-10-30T14:13:23.618636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Ch5ZfG1unOreWh7qK8"]} -{"Format": "IDEA0", "ID": "a8047c8d-caa3-4d6a-a387-ef1d6566bfed", "DetectTime": "2023-10-30T14:13:23.636510+02:00", "EventTime": "2023-10-30T14:13:23.636520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C2oV4l1cAki84knzA2"]} -{"Format": "IDEA0", "ID": "b5d5c02b-f658-49fa-b64e-1f2fadb21391", "DetectTime": "2023-10-30T14:13:23.651068+02:00", "EventTime": "2023-10-30T14:13:23.651078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CHh8UD1w4Kqan5Xp4h"]} -{"Format": "IDEA0", "ID": "ebab52c4-6a2b-47d6-923c-4c7b064af7b4", "DetectTime": "2023-10-30T14:13:23.664832+02:00", "EventTime": "2023-10-30T14:13:23.664845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCPhLI2vaHaOtWhsYb"]} -{"Format": "IDEA0", "ID": "700154c0-f680-439f-91cc-551216dd4a23", "DetectTime": "2023-10-30T14:13:23.680077+02:00", "EventTime": "2023-10-30T14:13:23.680089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C2GAYX3bloMB6hTg5g"]} -{"Format": "IDEA0", "ID": "174d717e-7304-4931-b574-1f15930d1653", "DetectTime": "2023-10-30T14:13:23.693536+02:00", "EventTime": "2023-10-30T14:13:23.693546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CReNmN1t7tDsXQkiIi"]} -{"Format": "IDEA0", "ID": "97a10104-23f9-4349-9320-36928a6f8a0b", "DetectTime": "2023-10-30T14:13:23.706148+02:00", "EventTime": "2023-10-30T14:13:23.706160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CBXjI01fPtM3QwJ9Tl"]} -{"Format": "IDEA0", "ID": "5cccd33e-6e00-4af8-80f5-2c0e7828d7ab", "DetectTime": "2023-10-30T14:13:23.721567+02:00", "EventTime": "2023-10-30T14:13:23.721583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CSALt1e9k04UJHsx2"]} -{"Format": "IDEA0", "ID": "72004935-b405-45b2-b377-61c7ccf90d59", "DetectTime": "2023-10-30T14:13:23.734892+02:00", "EventTime": "2023-10-30T14:13:23.734904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CXyB1n1838Se7k17Kl"]} -{"Format": "IDEA0", "ID": "ed9b31c5-c268-4610-a0c1-6f8369987f0d", "DetectTime": "2023-10-30T14:13:23.754170+02:00", "EventTime": "2023-10-30T14:13:23.754191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CbUxrC1infFtxWGMOh"]} -{"Format": "IDEA0", "ID": "0910e4ab-dd86-4d55-972c-2cbc84b0bbf4", "DetectTime": "2023-10-30T14:13:23.769213+02:00", "EventTime": "2023-10-30T14:13:23.769224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CXRjvuRyWmBrjGAY8"]} -{"Format": "IDEA0", "ID": "ddd0cd1f-45a6-4524-adfa-b47ad269c515", "DetectTime": "2023-10-30T14:13:23.787279+02:00", "EventTime": "2023-10-30T14:13:23.787295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCqZw24tlMoVzvE53a"]} -{"Format": "IDEA0", "ID": "fb4c70df-3d4d-4afc-95f6-020c275cb0b3", "DetectTime": "2023-10-30T14:13:23.805631+02:00", "EventTime": "2023-10-30T14:13:23.805646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMtHolLRfsenc4Fti"]} -{"Format": "IDEA0", "ID": "f27ebc05-b9bc-47d6-945b-887e67885363", "DetectTime": "2023-10-30T14:13:23.824254+02:00", "EventTime": "2023-10-30T14:13:23.824269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["COTSl644epEFaryEF1"]} -{"Format": "IDEA0", "ID": "b0b12e5e-714c-4a25-994d-be98c67c5628", "DetectTime": "2023-10-30T14:13:23.847342+02:00", "EventTime": "2023-10-30T14:13:23.847353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CpqBlY28XYLw5VxFtd"]} -{"Format": "IDEA0", "ID": "d7e967d9-4502-4033-8d6d-e5e99795491e", "DetectTime": "2023-10-30T14:13:23.865311+02:00", "EventTime": "2023-10-30T14:13:23.865327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CBwGHOl0rYyXHTHr6"]} -{"Format": "IDEA0", "ID": "df58d762-87b4-4ebf-aadb-6593621e81f7", "DetectTime": "2023-10-30T14:13:23.880416+02:00", "EventTime": "2023-10-30T14:13:23.880426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CaMKNx32nHZKY8nw33"]} -{"Format": "IDEA0", "ID": "c29aca46-e5ea-402a-929d-fb8d9350da69", "DetectTime": "2023-10-30T14:13:23.894861+02:00", "EventTime": "2023-10-30T14:13:23.894880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["COUmwy3xL8maCStSg5"]} -{"Format": "IDEA0", "ID": "bc1520d6-ff79-415f-85e0-78d5edf47db2", "DetectTime": "2023-10-30T14:13:23.911584+02:00", "EventTime": "2023-10-30T14:13:23.911594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CKX0LE3prgPTTQdCZ"]} -{"Format": "IDEA0", "ID": "54bbe8de-76d1-45b8-b2a1-25dbff7d81ef", "DetectTime": "2023-10-30T14:13:23.926916+02:00", "EventTime": "2023-10-30T14:13:23.926932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CYfbQ63PrpcRbtlK3"]} -{"Format": "IDEA0", "ID": "c7c83837-8d73-4dc9-b3a5-882d7d684ba6", "DetectTime": "2023-10-30T14:13:23.942745+02:00", "EventTime": "2023-10-30T14:13:23.942756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C7U7gV3PivbRuoofv6"]} -{"Format": "IDEA0", "ID": "6909836c-b804-49ef-b7de-63352764caae", "DetectTime": "2023-10-30T14:13:23.959114+02:00", "EventTime": "2023-10-30T14:13:23.959125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["COpRZ40uTvcpUhV99"]} -{"Format": "IDEA0", "ID": "1170b7bf-38a4-4961-b405-7b787b4ea74b", "DetectTime": "2023-10-30T14:13:23.978235+02:00", "EventTime": "2023-10-30T14:13:23.978251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C24xlt1JqfhVjZkkc"]} -{"Format": "IDEA0", "ID": "a0f38c73-8fd7-4c97-bae6-ba4951e2ec79", "DetectTime": "2023-10-30T14:13:23.995946+02:00", "EventTime": "2023-10-30T14:13:23.995962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Csv77kTsyCTwwpQXk"]} -{"Format": "IDEA0", "ID": "7c43bc4d-3256-4b15-a10b-1008ee638a07", "DetectTime": "2023-10-30T14:13:24.013354+02:00", "EventTime": "2023-10-30T14:13:24.013366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CKBpnS1ejUoCzRuZw7"]} -{"Format": "IDEA0", "ID": "c234a1ec-5cba-44d0-a7fc-ef9b65856343", "DetectTime": "2023-10-30T14:13:24.029927+02:00", "EventTime": "2023-10-30T14:13:24.029945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C5tEju3ApK9SkKHZha"]} -{"Format": "IDEA0", "ID": "102360bb-7ed5-4eea-ad64-4c302087584e", "DetectTime": "2023-10-30T14:13:24.050621+02:00", "EventTime": "2023-10-30T14:13:24.050638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CaTBHq4UZaY278GlB7"]} -{"Format": "IDEA0", "ID": "a9aaa494-353c-458d-9ed8-6615388b5697", "DetectTime": "2023-10-30T14:13:24.069077+02:00", "EventTime": "2023-10-30T14:13:24.069089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXpOVN1Ay4xKcgrHKc"]} -{"Format": "IDEA0", "ID": "61cf3bc2-5542-4d6c-84ba-3349facbca8f", "DetectTime": "2023-10-30T14:13:24.085278+02:00", "EventTime": "2023-10-30T14:13:24.085290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYboOc3hZ2O8obxj82"]} -{"Format": "IDEA0", "ID": "03b0b953-fcaf-4424-b5ea-334a183c4bd1", "DetectTime": "2023-10-30T14:13:24.098237+02:00", "EventTime": "2023-10-30T14:13:24.098249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CkyJzq4Q8HCupBqfHb"]} -{"Format": "IDEA0", "ID": "260c3b04-750c-41be-a922-06bd4bc5b815", "DetectTime": "2023-10-30T14:13:24.111498+02:00", "EventTime": "2023-10-30T14:13:24.111509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CJyLur2LLHt3CES7V"]} -{"Format": "IDEA0", "ID": "d2602d12-42e9-4a2e-991b-f9a9896170de", "DetectTime": "2023-10-30T14:13:24.127016+02:00", "EventTime": "2023-10-30T14:13:24.127032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["ChrjHK2Z9kH6Qlphu1"]} -{"Format": "IDEA0", "ID": "e4e6233e-ff3a-49e6-96dc-c05768c594a1", "DetectTime": "2023-10-30T14:13:24.144464+02:00", "EventTime": "2023-10-30T14:13:24.144475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CMJUcq13jKkxIN5WOl"]} -{"Format": "IDEA0", "ID": "ea5a5022-5657-41ca-bbbf-65874b1f5354", "DetectTime": "2023-10-30T14:13:24.161542+02:00", "EventTime": "2023-10-30T14:13:24.161553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CTJb9kmZk2Jw2YOod"]} -{"Format": "IDEA0", "ID": "bb0634b2-283d-423d-bfd1-bfa8c8aed1c3", "DetectTime": "2023-10-30T14:13:24.176665+02:00", "EventTime": "2023-10-30T14:13:24.176676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CaxY5s4ioj5I4sOqQb"]} -{"Format": "IDEA0", "ID": "5e71f741-2b3e-41fb-832a-e08e6a2bd807", "DetectTime": "2023-10-30T14:13:24.192843+02:00", "EventTime": "2023-10-30T14:13:24.192855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C3FEKp3kW6jQdtG7sh"]} -{"Format": "IDEA0", "ID": "fb4fc192-041b-467c-90be-8415804df0d1", "DetectTime": "2023-10-30T14:13:24.207619+02:00", "EventTime": "2023-10-30T14:13:24.207634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CwuLBE1PfxypAO9mqd"]} -{"Format": "IDEA0", "ID": "64bc3424-3b9d-4556-9f22-29ed711d5c37", "DetectTime": "2023-10-30T14:13:24.225079+02:00", "EventTime": "2023-10-30T14:13:24.225094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CC52BN2fAJllvNdKzj"]} -{"Format": "IDEA0", "ID": "7856678f-c970-4ded-8f76-4e4d78b1b4c8", "DetectTime": "2023-10-30T14:13:24.243372+02:00", "EventTime": "2023-10-30T14:13:24.243387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CUAhCyzCTu3qTRvFc"]} -{"Format": "IDEA0", "ID": "9068e95f-4038-4f69-8024-df3267efcaa7", "DetectTime": "2023-10-30T14:13:24.261225+02:00", "EventTime": "2023-10-30T14:13:24.261246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CLMk7x1ZIVkXQfdMij"]} -{"Format": "Json", "ID": "9068e95f-4038-4f69-8024-df3267efcaa7", "DetectTime": "2023-10-30T14:13:24.261225+02:00", "EventTime": "2023-10-30T14:13:24.261246+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T11:44:39.669856+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2023/10/30 14:13:24.326987)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bf15afd0-f810-4a21-83af-6f844d902c23", "DetectTime": "2023-10-30T14:13:24.330969+02:00", "EventTime": "2023-10-30T14:13:24.330981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CGLY0kzYQ2KcnCjY"]} -{"Format": "IDEA0", "ID": "434dfa98-ffeb-423a-99bd-35102c6abc6e", "DetectTime": "2023-10-30T14:13:24.350935+02:00", "EventTime": "2023-10-30T14:13:24.350952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CuK93GWFoVXqR0ZO6"]} -{"Format": "IDEA0", "ID": "22710b31-9457-402d-8394-bac88d31c927", "DetectTime": "2023-10-30T14:13:24.375327+02:00", "EventTime": "2023-10-30T14:13:24.375338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CqyMtF2BU9qcoGTJnk"]} -{"Format": "IDEA0", "ID": "cdadbbec-8c83-46e7-bf40-00514bf6ce57", "DetectTime": "2023-10-30T14:13:24.393554+02:00", "EventTime": "2023-10-30T14:13:24.393567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CAce6f9bzs6RuEuej"]} -{"Format": "IDEA0", "ID": "ea7acb7e-9fd2-46e1-a38d-88bc7c0fb622", "DetectTime": "2023-10-30T14:13:24.408615+02:00", "EventTime": "2023-10-30T14:13:24.408626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CWdhKE18XkjHYMWNdb"]} -{"Format": "IDEA0", "ID": "de485488-6abd-4356-b35a-2760eb837707", "DetectTime": "2023-10-30T14:13:24.422829+02:00", "EventTime": "2023-10-30T14:13:24.422846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C8Cphx3ZbqDtIr6vpf"]} -{"Format": "IDEA0", "ID": "73362bdc-90df-490f-aeda-3c038fb56744", "DetectTime": "2023-10-30T14:13:24.439558+02:00", "EventTime": "2023-10-30T14:13:24.439574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CSMYAkSMmqiBe7Ydh"]} -{"Format": "IDEA0", "ID": "eaf6bd18-ad06-4fcf-815d-97a4b91d0f5b", "DetectTime": "2023-10-30T14:13:24.458686+02:00", "EventTime": "2023-10-30T14:13:24.458698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CcYhr4AQ9KjgeFASl"]} -{"Format": "IDEA0", "ID": "9306cef6-9ddd-4fed-b8a1-04a0b514191b", "DetectTime": "2023-10-30T14:13:24.472195+02:00", "EventTime": "2023-10-30T14:13:24.472208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CjPoCz3467zx8uHQF8"]} -{"Format": "IDEA0", "ID": "12e4ea5e-e37d-4e58-a5c6-24706d38a40e", "DetectTime": "2023-10-30T14:13:24.487867+02:00", "EventTime": "2023-10-30T14:13:24.487883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Ccdpd82aIgm0GvFI51"]} -{"Format": "IDEA0", "ID": "d7622373-c666-4bb9-bd46-3fafc9ce0ae7", "DetectTime": "2023-10-30T14:13:24.505830+02:00", "EventTime": "2023-10-30T14:13:24.505847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CtNLLu4QFoQNk0Idlc"]} -{"Format": "IDEA0", "ID": "458aea3b-7a65-4ee6-af58-9d47192ca718", "DetectTime": "2023-10-30T14:13:24.519321+02:00", "EventTime": "2023-10-30T14:13:24.519331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CzaOnLOXoS47nG5w"]} -{"Format": "IDEA0", "ID": "f960bac2-c676-47af-809d-a9434dcfe247", "DetectTime": "2023-10-30T14:13:24.533952+02:00", "EventTime": "2023-10-30T14:13:24.533964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C7Jm710TiMV8u1ryk"]} -{"Format": "IDEA0", "ID": "2ea0642e-c16f-4d41-bf7d-c5e81d3ddd7e", "DetectTime": "2023-10-30T14:13:24.549295+02:00", "EventTime": "2023-10-30T14:13:24.549307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["COEV8e1X5lqJa8PUed"]} -{"Format": "IDEA0", "ID": "20b329dd-12f5-460c-aec9-4cfcc92986e1", "DetectTime": "2023-10-30T14:13:24.567692+02:00", "EventTime": "2023-10-30T14:13:24.567705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CagiSF3DS6gjGk7mf1"]} -{"Format": "IDEA0", "ID": "39fbac2c-e1fc-416d-a2ca-74f95da65cb7", "DetectTime": "2023-10-30T14:13:24.583839+02:00", "EventTime": "2023-10-30T14:13:24.583855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["COpiO825SInKBNcrg"]} -{"Format": "IDEA0", "ID": "476804f4-b44a-4969-acd5-80e9326d2ce6", "DetectTime": "2023-10-30T14:13:24.602208+02:00", "EventTime": "2023-10-30T14:13:24.602219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CqV3BLoqsdboE7OKa"]} -{"Format": "IDEA0", "ID": "0a524ee5-36a7-4a1d-99c4-97ced16459ae", "DetectTime": "2023-10-30T14:13:24.616627+02:00", "EventTime": "2023-10-30T14:13:24.616639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CM96Fs1V9CZuBsl5sb"]} -{"Format": "IDEA0", "ID": "c61dabab-ace5-4e59-a505-d4ee2ca41426", "DetectTime": "2023-10-30T14:13:24.634565+02:00", "EventTime": "2023-10-30T14:13:24.634577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CGMnO23A5DRMkZCpjj"]} -{"Format": "IDEA0", "ID": "f08053f6-e32d-4316-a1ba-9f79f14aeece", "DetectTime": "2023-10-30T14:13:24.652891+02:00", "EventTime": "2023-10-30T14:13:24.652907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQNLOD19aqzB7IjFLg"]} -{"Format": "IDEA0", "ID": "ae13604f-0edd-452c-9468-d8e561cb89a1", "DetectTime": "2023-10-30T14:13:24.668999+02:00", "EventTime": "2023-10-30T14:13:24.669009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Co684b2aCtXaf1eyz4"]} -{"Format": "IDEA0", "ID": "60d5176e-43e2-4e2d-83a6-6c78fa2b13eb", "DetectTime": "2023-10-30T14:13:24.685334+02:00", "EventTime": "2023-10-30T14:13:24.685348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7anJP5y6g8y9u2si"]} -{"Format": "IDEA0", "ID": "396529fb-4f1e-4dd6-9941-1abeaf05f52e", "DetectTime": "2023-10-30T14:13:24.701949+02:00", "EventTime": "2023-10-30T14:13:24.701961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CfPSJc2WJschn0QBYc"]} -{"Format": "IDEA0", "ID": "815bff9e-b6f2-4f4c-a191-ee27950effa9", "DetectTime": "2023-10-30T14:13:24.717370+02:00", "EventTime": "2023-10-30T14:13:24.717387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CGfTWC21htJ9DjlqBi"]} -{"Format": "IDEA0", "ID": "f6208c4f-81e6-4fd2-94da-6ebbcecd2ae1", "DetectTime": "2023-10-30T14:13:24.733245+02:00", "EventTime": "2023-10-30T14:13:24.733262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CiqLrm2yBXeWudcqS9"]} -{"Format": "IDEA0", "ID": "b92aba15-b611-466c-b3f6-676b6580b5c4", "DetectTime": "2023-10-30T14:13:24.751238+02:00", "EventTime": "2023-10-30T14:13:24.751249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C5TdBquw9epr5TY2a"]} -{"Format": "IDEA0", "ID": "c54c23b3-e0c3-433c-a2e9-1df53d264db0", "DetectTime": "2023-10-30T14:13:24.767233+02:00", "EventTime": "2023-10-30T14:13:24.767248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CylePm1gJXR40Zsld3"]} -{"Format": "IDEA0", "ID": "f031e1f0-8f8b-400a-bad9-83e781d51df3", "DetectTime": "2023-10-30T14:13:24.785365+02:00", "EventTime": "2023-10-30T14:13:24.785378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CdLL8W1rYxrRo9kUyc"]} -{"Format": "IDEA0", "ID": "ad1fbdf8-1053-4c47-ae67-275004ec5cf4", "DetectTime": "2023-10-30T14:13:24.809111+02:00", "EventTime": "2023-10-30T14:13:24.809122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CjuejK2rP8hOjKkBJl"]} -{"Format": "IDEA0", "ID": "d0ccc578-eb84-4e9e-b616-a0058a6c7978", "DetectTime": "2023-10-30T14:13:24.828229+02:00", "EventTime": "2023-10-30T14:13:24.828245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cc4FDR34dljozqja13"]} -{"Format": "IDEA0", "ID": "94f6bc68-6f06-48eb-a68a-05982eba821d", "DetectTime": "2023-10-30T14:13:24.847858+02:00", "EventTime": "2023-10-30T14:13:24.847875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cm3FyCLF06z4Xxh1j"]} -{"Format": "IDEA0", "ID": "5cf332f3-0380-43fe-9499-4a16b7887488", "DetectTime": "2023-10-30T14:13:24.863654+02:00", "EventTime": "2023-10-30T14:13:24.863665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CfqSIy11hN4DvsEPg1"]} -{"Format": "IDEA0", "ID": "fc640057-83a7-41c1-8f08-33691b72f065", "DetectTime": "2023-10-30T14:13:24.877615+02:00", "EventTime": "2023-10-30T14:13:24.877632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CjItOE4o1Ilst1Jz86"]} -{"Format": "IDEA0", "ID": "0155a68b-9e46-420e-b9e9-78db85fe8580", "DetectTime": "2023-10-30T14:13:24.895185+02:00", "EventTime": "2023-10-30T14:13:24.895200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CCeGpDfhbB5vqjY24"]} -{"Format": "IDEA0", "ID": "95d232e7-1f72-478a-bdb2-593ab4148fd6", "DetectTime": "2023-10-30T14:13:24.913149+02:00", "EventTime": "2023-10-30T14:13:24.913160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CyvJ152NqO7JnsSHjf"]} -{"Format": "IDEA0", "ID": "983e628a-d24a-4513-b98d-efac1b212fd1", "DetectTime": "2023-10-30T14:13:24.926649+02:00", "EventTime": "2023-10-30T14:13:24.926660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CjaASi233JSd7F1Hvf"]} -{"Format": "IDEA0", "ID": "8e59790c-1404-43d5-b59f-fced4c112912", "DetectTime": "2023-10-30T14:13:24.944758+02:00", "EventTime": "2023-10-30T14:13:24.944769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CRVUKj4VjenqtyxUFe"]} -{"Format": "IDEA0", "ID": "30ef995a-698f-4408-9f04-2c98aae2d828", "DetectTime": "2023-10-30T14:13:24.959836+02:00", "EventTime": "2023-10-30T14:13:24.959846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Ctbgij1tDm0b2iDIhk"]} -{"Format": "IDEA0", "ID": "72eaf46f-9686-42ba-bd9e-f636911fedd0", "DetectTime": "2023-10-30T14:13:24.975275+02:00", "EventTime": "2023-10-30T14:13:24.975288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CFnbSG3179kXUjHE23"]} -{"Format": "IDEA0", "ID": "c786337f-433b-4106-95db-09d29b0db0f3", "DetectTime": "2023-10-30T14:13:24.990820+02:00", "EventTime": "2023-10-30T14:13:24.990837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C76wym27AInJq71QBg"]} -{"Format": "IDEA0", "ID": "6fae39bd-3761-43a2-ba36-d72713e1a9ab", "DetectTime": "2023-10-30T14:13:25.010397+02:00", "EventTime": "2023-10-30T14:13:25.010416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZJLcaanBxJfLKbxe"]} -{"Format": "IDEA0", "ID": "92f9b883-db8c-4c4b-b06b-5ef1ad62e20a", "DetectTime": "2023-10-30T14:13:25.028790+02:00", "EventTime": "2023-10-30T14:13:25.028806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CjPVTLqc56nm6S2Y7"]} -{"Format": "IDEA0", "ID": "a39db50d-b0d6-4034-b0af-bd6db8966f76", "DetectTime": "2023-10-30T14:13:25.047037+02:00", "EventTime": "2023-10-30T14:13:25.047049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CaLbuO3EIs23xepp3b"]} -{"Format": "IDEA0", "ID": "14e3ae65-380e-446b-ad22-60c1d8ad279c", "DetectTime": "2023-10-30T14:13:25.064968+02:00", "EventTime": "2023-10-30T14:13:25.064982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVZpbf2U9TZJXDWeIh"]} -{"Format": "IDEA0", "ID": "f09c6748-b95f-44ec-8b52-da8d6a294c68", "DetectTime": "2023-10-30T14:13:25.081530+02:00", "EventTime": "2023-10-30T14:13:25.081542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C4ZBfA15434k9caSWg"]} -{"Format": "IDEA0", "ID": "572ddcaa-c0f5-4396-9518-b64446df6a30", "DetectTime": "2023-10-30T14:13:25.098688+02:00", "EventTime": "2023-10-30T14:13:25.098699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cc59OVyw0bYAS84f2"]} -{"Format": "IDEA0", "ID": "cce17580-697b-4371-aa67-c53e139e6e5d", "DetectTime": "2023-10-30T14:13:25.113798+02:00", "EventTime": "2023-10-30T14:13:25.113824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C2WXxy3bU3GahC5Wf"]} -{"Format": "IDEA0", "ID": "47e13dd6-dd39-4c05-a6cf-b262f1ad3aac", "DetectTime": "2023-10-30T14:13:25.127571+02:00", "EventTime": "2023-10-30T14:13:25.127583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9tu3P11zrhx9kegRj"]} -{"Format": "IDEA0", "ID": "37bbb73f-f06e-473d-b438-8a31b6f829a6", "DetectTime": "2023-10-30T14:13:25.146123+02:00", "EventTime": "2023-10-30T14:13:25.146140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C3AlD61KlDio8jLbLf"]} -{"Format": "IDEA0", "ID": "8958727e-17c2-4702-9a0b-a7148e40c90e", "DetectTime": "2023-10-30T14:13:25.162962+02:00", "EventTime": "2023-10-30T14:13:25.162975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CqzZ8X1PTkBCtWb4I1"]} -{"Format": "IDEA0", "ID": "678b72a4-597b-4d73-b754-e4405f36308c", "DetectTime": "2023-10-30T14:13:25.179702+02:00", "EventTime": "2023-10-30T14:13:25.179713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CXT7gm4b1ID4aAsXo6"]} -{"Format": "IDEA0", "ID": "8dbc77e7-48c7-4fa2-aa2b-ff5d1c3a61ec", "DetectTime": "2023-10-30T14:13:25.192994+02:00", "EventTime": "2023-10-30T14:13:25.193005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CxslqX1ed9Dh7J1gdc"]} -{"Format": "IDEA0", "ID": "fa3f878b-68cb-4de0-8492-3ed5dde00375", "DetectTime": "2023-10-30T14:13:25.209377+02:00", "EventTime": "2023-10-30T14:13:25.209388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbOyK11vamEtJgZMT4"]} -{"Format": "IDEA0", "ID": "65297e26-5e41-46b6-9037-f4b2450d919e", "DetectTime": "2023-10-30T14:13:25.228846+02:00", "EventTime": "2023-10-30T14:13:25.228857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CAKdTB3HDgsMMxQKNh"]} -{"Format": "IDEA0", "ID": "8367a824-e50c-414a-853b-0c74a5fea9cb", "DetectTime": "2023-10-30T14:13:25.243131+02:00", "EventTime": "2023-10-30T14:13:25.243143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cpem7g3Gy9uqKin3sd"]} -{"Format": "IDEA0", "ID": "a5bee909-1218-4943-915f-867c462523fd", "DetectTime": "2023-10-30T14:13:25.256511+02:00", "EventTime": "2023-10-30T14:13:25.256522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cb2imh7Lozqn26u2f"]} -{"Format": "IDEA0", "ID": "79823c48-7087-475d-ba26-86dc21f3bf08", "DetectTime": "2023-10-30T14:13:25.270804+02:00", "EventTime": "2023-10-30T14:13:25.270816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CcUZCE4kVKhWAjFcMc"]} -{"Format": "IDEA0", "ID": "595ed5b9-02d6-4bd6-a1d8-e3fb8a181529", "DetectTime": "2023-10-30T14:13:25.287578+02:00", "EventTime": "2023-10-30T14:13:25.287592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CfeQkw4Le3AUBPuwJa"]} -{"Format": "IDEA0", "ID": "c5ab2e1e-36a6-408b-810c-4e8256cc10c5", "DetectTime": "2023-10-30T14:13:25.303532+02:00", "EventTime": "2023-10-30T14:13:25.303548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CsuGve4vMsPFCK8Z3e"]} -{"Format": "IDEA0", "ID": "490c6f07-8520-43ef-8e45-da5aad4fa8ae", "DetectTime": "2023-10-30T14:13:25.320367+02:00", "EventTime": "2023-10-30T14:13:25.320377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CYa2v01qNJULOQcK88"]} -{"Format": "IDEA0", "ID": "b1dd5b23-7fce-4fb1-83d5-d4e45fa1d851", "DetectTime": "2023-10-30T14:13:25.334016+02:00", "EventTime": "2023-10-30T14:13:25.334026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CeEs0d2LusZ2YyWc7"]} -{"Format": "IDEA0", "ID": "7b803c23-beb9-43c9-991c-dcfa3741fd8e", "DetectTime": "2023-10-30T14:13:25.349304+02:00", "EventTime": "2023-10-30T14:13:25.349320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C65Qjy1Dw3gFIYY4kf"]} -{"Format": "IDEA0", "ID": "39d6f473-05ba-499d-a3b3-38d42bf30811", "DetectTime": "2023-10-30T14:13:25.367867+02:00", "EventTime": "2023-10-30T14:13:25.367880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEtZK90gUK53ktjYh"]} -{"Format": "IDEA0", "ID": "29ca8584-758d-44c5-b461-5b3b4dd1c7d6", "DetectTime": "2023-10-30T14:13:25.406014+02:00", "EventTime": "2023-10-30T14:13:25.406029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CPzyKg3Cea36UZjyLf"]} -{"Format": "IDEA0", "ID": "b1ff0edc-9b31-46cb-bef0-09ffb194da97", "DetectTime": "2023-10-30T14:13:25.423345+02:00", "EventTime": "2023-10-30T14:13:25.423358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkupMz1NhCMNPfG61f"]} -{"Format": "IDEA0", "ID": "a9d63397-6b37-497f-a346-5c8e715baf3a", "DetectTime": "2023-10-30T14:13:25.517545+02:00", "EventTime": "2023-10-30T14:13:25.517563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXFOtp3IbvKw3JdGu5"]} -{"Format": "IDEA0", "ID": "36c3aef5-195f-45dd-84e6-7895fd95b792", "DetectTime": "2023-10-30T14:13:25.538096+02:00", "EventTime": "2023-10-30T14:13:25.538112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcJGhk1PSD9AHtV0Tk"]} -{"Format": "IDEA0", "ID": "e00a8b3f-6161-4f8d-9649-a8caeb7e8b6c", "DetectTime": "2023-10-30T14:13:25.558854+02:00", "EventTime": "2023-10-30T14:13:25.558882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C11jWF4uxzQbbYgAK6"]} -{"Format": "IDEA0", "ID": "90cfd428-2af7-4233-ab51-40197ba32765", "DetectTime": "2023-10-30T14:13:25.573603+02:00", "EventTime": "2023-10-30T14:13:25.573615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cszmwj46rZLvrn2GA6"]} -{"Format": "IDEA0", "ID": "38ffe1eb-f6f7-4d7f-8ff0-b49d35413e75", "DetectTime": "2023-10-30T14:13:25.590085+02:00", "EventTime": "2023-10-30T14:13:25.590099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Ck0mtWzlRtMwwm9X7"]} -{"Format": "IDEA0", "ID": "df0d3d0f-1d9e-4a74-9fb4-764b88953065", "DetectTime": "2023-10-30T14:13:25.609711+02:00", "EventTime": "2023-10-30T14:13:25.609729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CCX0mJTjKyynoRlak"]} -{"Format": "IDEA0", "ID": "a5dd8edd-7117-4fa4-9d90-7b81f5bb3f9c", "DetectTime": "2023-10-30T14:13:25.628890+02:00", "EventTime": "2023-10-30T14:13:25.628904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CHnMcz4efTVvAF3I7"]} -{"Format": "IDEA0", "ID": "103dbf24-0022-45a4-a01c-87c99a4e8967", "DetectTime": "2023-10-30T14:13:25.649570+02:00", "EventTime": "2023-10-30T14:13:25.649586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CZvjcy2yBoyc0toy9"]} -{"Format": "IDEA0", "ID": "9cb28525-bfe3-4e6b-af18-24f5f013e4f0", "DetectTime": "2023-10-30T14:13:25.669154+02:00", "EventTime": "2023-10-30T14:13:25.669170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVgq8H3sJ9L1bu17ra"]} -{"Format": "IDEA0", "ID": "6017d707-8b4f-46d5-a7f6-8d065cbf43eb", "DetectTime": "2023-10-30T14:13:25.688599+02:00", "EventTime": "2023-10-30T14:13:25.688616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CZDo5e4pGkuw7JpDWe"]} -{"Format": "IDEA0", "ID": "cbd31ebf-1be0-4302-8908-b89073266c94", "DetectTime": "2023-10-30T14:13:25.707652+02:00", "EventTime": "2023-10-30T14:13:25.707669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CF1C213HfukEmcuKrf"]} -{"Format": "IDEA0", "ID": "44b7725f-6649-42d6-8323-062199135d1c", "DetectTime": "2023-10-30T14:13:25.725206+02:00", "EventTime": "2023-10-30T14:13:25.725225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CRsuKr4UiDEJUE5j0a"]} -{"Format": "IDEA0", "ID": "2b4513e3-6ff1-432c-a80a-d118aa9ef9de", "DetectTime": "2023-10-30T14:13:25.756624+02:00", "EventTime": "2023-10-30T14:13:25.756649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CUXthx3XARAe3oTn6g"]} -{"Format": "IDEA0", "ID": "361f43d5-d02e-44e1-a877-daebaa330b07", "DetectTime": "2023-10-30T14:13:25.772470+02:00", "EventTime": "2023-10-30T14:13:25.772487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C6IqGJ3LmZCX9VGP7i"]} -{"Format": "IDEA0", "ID": "f8ff3259-0d22-4ac3-9165-45781e5ef8d2", "DetectTime": "2023-10-30T14:13:25.790278+02:00", "EventTime": "2023-10-30T14:13:25.790294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CjzBv52WQed6SMHJc9"]} -{"Format": "IDEA0", "ID": "f485f82a-9c2a-41a3-b50d-e30097329876", "DetectTime": "2023-10-30T14:13:25.807581+02:00", "EventTime": "2023-10-30T14:13:25.807597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CFyWmL2NXMldweLxfc"]} -{"Format": "IDEA0", "ID": "4639e4b3-80aa-40d8-ab6d-20bba86839ec", "DetectTime": "2023-10-30T14:13:25.827368+02:00", "EventTime": "2023-10-30T14:13:25.827384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CL2Qq33Q3kDkN71o3"]} -{"Format": "IDEA0", "ID": "422317bc-b25f-4e82-b32a-ef8081ca5321", "DetectTime": "2023-10-30T14:13:25.846579+02:00", "EventTime": "2023-10-30T14:13:25.846594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CVhCei2HFsl1ivTiZ1"]} -{"Format": "IDEA0", "ID": "c36ef590-c272-47a1-bdb7-87020fbaed65", "DetectTime": "2023-10-30T14:13:25.866074+02:00", "EventTime": "2023-10-30T14:13:25.866090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CcWhIA1wJkLXwZ2Us8"]} -{"Format": "IDEA0", "ID": "f5fb0b84-b69a-43fd-ba2c-73a7ef6085e9", "DetectTime": "2023-10-30T14:13:25.899238+02:00", "EventTime": "2023-10-30T14:13:25.899252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C3OHMA2qjpfc11k8Vl"]} -{"Format": "IDEA0", "ID": "1e753865-3788-4780-bd6e-b91d3539e1a1", "DetectTime": "2023-10-30T14:13:25.917161+02:00", "EventTime": "2023-10-30T14:13:25.917178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CVT9Kg4Z0SAlZdjane"]} -{"Format": "IDEA0", "ID": "c15fb14b-09e8-4872-b71d-f04bec2ead56", "DetectTime": "2023-10-30T14:13:25.936591+02:00", "EventTime": "2023-10-30T14:13:25.936606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C3kuh14TulIYwpRqnl"]} -{"Format": "IDEA0", "ID": "afa91716-c269-4c67-80ce-212d5dfc30c3", "DetectTime": "2023-10-30T14:13:25.972678+02:00", "EventTime": "2023-10-30T14:13:25.972695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cqv8Ud4ZozghzxU3Yk"]} -{"Format": "IDEA0", "ID": "19545229-c8ba-460b-b5dc-f345457b549f", "DetectTime": "2023-10-30T14:13:25.989371+02:00", "EventTime": "2023-10-30T14:13:25.989385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNaO0S3doTGQRPmoIf"]} -{"Format": "IDEA0", "ID": "5984b4b6-5ca1-40b7-978c-b2d9c6e76eab", "DetectTime": "2023-10-30T14:13:26.006814+02:00", "EventTime": "2023-10-30T14:13:26.006826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CLzbxa4GekpBx3Uvo4"]} -{"Format": "IDEA0", "ID": "e2582cf9-d0a0-45c7-81d2-8c6c84385ec1", "DetectTime": "2023-10-30T14:13:26.025229+02:00", "EventTime": "2023-10-30T14:13:26.025240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C5MeVt4Bz5KjY5TPy1"]} -{"Format": "IDEA0", "ID": "6f6bdb09-f5b9-4db3-89e0-a573128ab833", "DetectTime": "2023-10-30T14:13:26.042941+02:00", "EventTime": "2023-10-30T14:13:26.042958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cjeelq4PIAyiLOtpLd"]} -{"Format": "IDEA0", "ID": "79c3b28e-efb7-4f37-98c8-ebd51a819c4b", "DetectTime": "2023-10-30T14:13:26.058960+02:00", "EventTime": "2023-10-30T14:13:26.058980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CKd08y454bizIKJPY7"]} -{"Format": "IDEA0", "ID": "c678a53d-a49d-449d-99b4-66609cb7d228", "DetectTime": "2023-10-30T14:13:26.093120+02:00", "EventTime": "2023-10-30T14:13:26.093144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CLVdLy4GqVayRkhdM3"]} -{"Format": "IDEA0", "ID": "06646401-cef5-48fa-a6df-a2580ffea078", "DetectTime": "2023-10-30T14:13:26.111597+02:00", "EventTime": "2023-10-30T14:13:26.111613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CeNTRF4NxrvURT8gW"]} -{"Format": "IDEA0", "ID": "6fc062d9-bda0-49d4-836a-a83d32c832af", "DetectTime": "2023-10-30T14:13:26.130915+02:00", "EventTime": "2023-10-30T14:13:26.130931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CtSG3c4rsIKQcc5LT7"]} -{"Format": "IDEA0", "ID": "16210a55-2a0f-4992-ac83-ebe7c8a75940", "DetectTime": "2023-10-30T14:13:26.150451+02:00", "EventTime": "2023-10-30T14:13:26.150466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cte00UJ12iZoQBemf"]} -{"Format": "IDEA0", "ID": "b5b76875-a800-4acb-8aa0-6e209ca73549", "DetectTime": "2023-10-30T14:13:26.169040+02:00", "EventTime": "2023-10-30T14:13:26.169052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLAwO1Fs0dxDa3HC3"]} -{"Format": "IDEA0", "ID": "389780ad-408b-426f-8089-a76196c39147", "DetectTime": "2023-10-30T14:13:26.186845+02:00", "EventTime": "2023-10-30T14:13:26.186869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CT7gVG3277mLpCEko2"]} -{"Format": "IDEA0", "ID": "88757751-96ff-492f-b072-9fdcc95d6634", "DetectTime": "2023-10-30T14:13:26.204979+02:00", "EventTime": "2023-10-30T14:13:26.204994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CcCKjj4Gobb8dKHX77"]} -{"Format": "IDEA0", "ID": "ccce82fb-4b29-42eb-ae22-2c650eed33d7", "DetectTime": "2023-10-30T14:13:26.237153+02:00", "EventTime": "2023-10-30T14:13:26.237169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CqKwWB4rdzuYd9Qarl"]} -{"Format": "IDEA0", "ID": "7bc688f1-3220-4753-9ce8-6024598f1e85", "DetectTime": "2023-10-30T14:13:26.252651+02:00", "EventTime": "2023-10-30T14:13:26.252662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CNaYd21SaufTEh3622"]} -{"Format": "IDEA0", "ID": "bca7b7b3-f1ad-4d06-909a-0a82649cbb56", "DetectTime": "2023-10-30T14:13:26.285447+02:00", "EventTime": "2023-10-30T14:13:26.285462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cdlymp22OkKoBPdQOa"]} -{"Format": "IDEA0", "ID": "33ea20da-9e84-42ea-942e-5bf2ce646cb6", "DetectTime": "2023-10-30T14:13:26.303622+02:00", "EventTime": "2023-10-30T14:13:26.303638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CJpaNN2wJyoLJnhbGj"]} -{"Format": "IDEA0", "ID": "3ef541ee-c1a6-4ad6-848e-a0e59cd48163", "DetectTime": "2023-10-30T14:13:26.322542+02:00", "EventTime": "2023-10-30T14:13:26.322557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CrDL0Q25F2tW5vWWx"]} -{"Format": "IDEA0", "ID": "28afb0af-acc2-491d-afd4-87a7c3c4e2f3", "DetectTime": "2023-10-30T14:13:26.341031+02:00", "EventTime": "2023-10-30T14:13:26.341118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CKpx5j4azr0YS1tmv3"]} -{"Format": "IDEA0", "ID": "72afd1e4-c679-4c72-a814-bfd1d70cb3f8", "DetectTime": "2023-10-30T14:13:26.360792+02:00", "EventTime": "2023-10-30T14:13:26.360808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C6kYNH2taVzcElAEL2"]} -{"Format": "IDEA0", "ID": "d94b1378-d335-4ba7-8275-1d6acfa3fac2", "DetectTime": "2023-10-30T14:13:26.385232+02:00", "EventTime": "2023-10-30T14:13:26.385248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C77saD1w0wNoKTPei4"]} -{"Format": "IDEA0", "ID": "8b53c37a-4e4a-48c3-9372-c6a9fda64350", "DetectTime": "2023-10-30T14:13:26.404235+02:00", "EventTime": "2023-10-30T14:13:26.404252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CzvxTA4IPdYumiCaC9"]} -{"Format": "IDEA0", "ID": "fbb3e2ec-8ae4-49d0-b8c1-343aa3a8e991", "DetectTime": "2023-10-30T14:13:26.422034+02:00", "EventTime": "2023-10-30T14:13:26.422048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CzgGt04jwd9BsOVAg6"]} -{"Format": "IDEA0", "ID": "ce6cd277-c71f-4291-9f4e-dad12220dc96", "DetectTime": "2023-10-30T14:13:26.441384+02:00", "EventTime": "2023-10-30T14:13:26.441400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZMKE81sAr906p0Ozj"]} -{"Format": "IDEA0", "ID": "de35a24b-4187-441f-8955-4a21306c66ae", "DetectTime": "2023-10-30T14:13:26.458021+02:00", "EventTime": "2023-10-30T14:13:26.458038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["ChLIM03uOA1Bs24Izj"]} -{"Format": "IDEA0", "ID": "421d3ba9-331d-4737-a5ab-e37bcb27f631", "DetectTime": "2023-10-30T14:13:26.476289+02:00", "EventTime": "2023-10-30T14:13:26.476305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFaAhl2BTzXptNXxDe"]} -{"Format": "IDEA0", "ID": "a5675cbe-d0e3-4399-ad70-b3cbdde70131", "DetectTime": "2023-10-30T14:13:26.491281+02:00", "EventTime": "2023-10-30T14:13:26.491297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CgU4zg17RFr5whqTSg"]} -{"Format": "IDEA0", "ID": "362fa17d-3e71-4c9a-baa7-3cbcf82ba9f2", "DetectTime": "2023-10-30T14:13:26.508737+02:00", "EventTime": "2023-10-30T14:13:26.508752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cz1Y5T1AdNHSBLvKn3"]} -{"Format": "IDEA0", "ID": "15347589-0e9b-4a97-a635-277f1f4e1eab", "DetectTime": "2023-10-30T14:13:26.524270+02:00", "EventTime": "2023-10-30T14:13:26.524287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CLXcUzkwnIWPRyhYe"]} -{"Format": "Json", "ID": "15347589-0e9b-4a97-a635-277f1f4e1eab", "DetectTime": "2023-10-30T14:13:26.524270+02:00", "EventTime": "2023-10-30T14:13:26.524287+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T12:14:47.462919+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2023/10/30 14:13:26.613460)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7710c236-0a3b-48cc-bf89-ed6a3002dcbc", "DetectTime": "2023-10-30T14:13:26.619155+02:00", "EventTime": "2023-10-30T14:13:26.619171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C5H8F83mDYzbFrlPx"]} -{"Format": "IDEA0", "ID": "58f91cb3-046b-42ba-93e3-0d8b03541524", "DetectTime": "2023-10-30T14:13:26.642413+02:00", "EventTime": "2023-10-30T14:13:26.642428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CrPW0o1eGUUK1pTBIa"]} -{"Format": "IDEA0", "ID": "c4f4085c-5b13-4bd9-af4f-c8780bd8b1c9", "DetectTime": "2023-10-30T14:13:26.661715+02:00", "EventTime": "2023-10-30T14:13:26.661730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CFAcVY2YimhN4z59k"]} -{"Format": "IDEA0", "ID": "0e925a87-bd02-47ea-8636-0da053b16993", "DetectTime": "2023-10-30T14:13:26.680643+02:00", "EventTime": "2023-10-30T14:13:26.680659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CWrKuX39MKPjfrsFA7"]} -{"Format": "IDEA0", "ID": "d42edfaf-68a7-4c73-b0cf-3798cb377636", "DetectTime": "2023-10-30T14:13:26.699259+02:00", "EventTime": "2023-10-30T14:13:26.699276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CbTSGU2Tec8WjQnXSj"]} -{"Format": "IDEA0", "ID": "c3e9464e-23ed-4ed5-8058-cd1135924091", "DetectTime": "2023-10-30T14:13:26.715515+02:00", "EventTime": "2023-10-30T14:13:26.715535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CGRGjxDuZh48NEJ8a"]} -{"Format": "IDEA0", "ID": "09b46839-2f61-42cc-b332-3915be0ba5b2", "DetectTime": "2023-10-30T14:13:26.733610+02:00", "EventTime": "2023-10-30T14:13:26.733621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cm1T11bXX8lsFjvFa"]} -{"Format": "IDEA0", "ID": "698ef781-e9d0-437b-ba78-ee169322e099", "DetectTime": "2023-10-30T14:13:26.752720+02:00", "EventTime": "2023-10-30T14:13:26.752731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CRBUP72Ad2LDBLnfUj"]} -{"Format": "IDEA0", "ID": "e7ba943d-3c0c-4953-8936-159f074f9c64", "DetectTime": "2023-10-30T14:13:26.789653+02:00", "EventTime": "2023-10-30T14:13:26.789670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CwwVez43MossVGgy92"]} -{"Format": "IDEA0", "ID": "37cc1799-adef-418b-abe8-31b3befc222a", "DetectTime": "2023-10-30T14:13:26.805791+02:00", "EventTime": "2023-10-30T14:13:26.805806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CuktAi1SX9wCssak8d"]} -{"Format": "IDEA0", "ID": "08763e0f-2067-4e1b-96ff-96f46e42d8a7", "DetectTime": "2023-10-30T14:13:26.822675+02:00", "EventTime": "2023-10-30T14:13:26.822687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Ck7jXB34GFGnBEKFpb"]} -{"Format": "IDEA0", "ID": "8a936fb7-794b-46a9-a4a5-17b302626418", "DetectTime": "2023-10-30T14:13:26.839098+02:00", "EventTime": "2023-10-30T14:13:26.839110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CRjYii1jxt8fdcuk0g"]} -{"Format": "IDEA0", "ID": "f27106fd-968d-43e0-8573-fcc185fc025c", "DetectTime": "2023-10-30T14:13:26.857712+02:00", "EventTime": "2023-10-30T14:13:26.857733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CtRGmt4s3tI8Nlw1Ef"]} -{"Format": "IDEA0", "ID": "40b8e8e1-d7c7-43b3-9d76-22777a5d9648", "DetectTime": "2023-10-30T14:13:26.873100+02:00", "EventTime": "2023-10-30T14:13:26.873115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CPc0BV2ZD5VVI7JdBl"]} -{"Format": "IDEA0", "ID": "1645bf1d-4dae-4b4d-9613-5ae3906020ea", "DetectTime": "2023-10-30T14:13:26.892827+02:00", "EventTime": "2023-10-30T14:13:26.892842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C9CSje2WQi15xphUyh"]} -{"Format": "IDEA0", "ID": "27a86bed-470d-4ef4-99a5-23c0ff1b028e", "DetectTime": "2023-10-30T14:13:26.906641+02:00", "EventTime": "2023-10-30T14:13:26.906651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C38pF2deP6700Qbm5"]} -{"Format": "IDEA0", "ID": "22a263d3-b2e6-4164-a563-0b7575207515", "DetectTime": "2023-10-30T14:13:26.919807+02:00", "EventTime": "2023-10-30T14:13:26.919818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4aolJgobvHRgK3Wb"]} -{"Format": "IDEA0", "ID": "0ace2306-56cd-435d-ac03-5a5c5612a2d7", "DetectTime": "2023-10-30T14:13:26.933886+02:00", "EventTime": "2023-10-30T14:13:26.933896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CPrteP2mGbY35LJZK7"]} -{"Format": "IDEA0", "ID": "023b1ccb-ea00-4d74-8c88-f8d68bc6b357", "DetectTime": "2023-10-30T14:13:26.961946+02:00", "EventTime": "2023-10-30T14:13:26.961959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CMCMpb3zzLtKaGQTqa"]} -{"Format": "IDEA0", "ID": "e738d470-bb94-43ad-99a4-2cc3a78e4ab9", "DetectTime": "2023-10-30T14:13:26.976679+02:00", "EventTime": "2023-10-30T14:13:26.976691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVcMvWS2sxQuceoA7"]} -{"Format": "IDEA0", "ID": "9454394c-3f53-4c25-b8e9-f16ca2a5aac6", "DetectTime": "2023-10-30T14:13:26.989728+02:00", "EventTime": "2023-10-30T14:13:26.989739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CkRbAL2E6XyOzbXRtb"]} -{"Format": "IDEA0", "ID": "ef8888bb-9411-4a90-a751-7a21439ce070", "DetectTime": "2023-10-30T14:13:27.007099+02:00", "EventTime": "2023-10-30T14:13:27.007114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CjkWZ64LDRZwSjHmjg"]} -{"Format": "IDEA0", "ID": "acd42bfa-1a57-48c4-8ec1-45031748592c", "DetectTime": "2023-10-30T14:13:27.022014+02:00", "EventTime": "2023-10-30T14:13:27.022027+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMfmDM3uhOWlcJm971"]} -{"Format": "IDEA0", "ID": "b33cf3bc-1127-469c-a12a-7181ebb6b90d", "DetectTime": "2023-10-30T14:13:27.037168+02:00", "EventTime": "2023-10-30T14:13:27.037186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CPzL0i2SJYJNYCcI3b"]} -{"Format": "IDEA0", "ID": "fbd0a7f0-29cf-48e0-86a0-a95e3d10b8c3", "DetectTime": "2023-10-30T14:13:27.050930+02:00", "EventTime": "2023-10-30T14:13:27.050946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CG9DKA4fghSEaAZET"]} -{"Format": "IDEA0", "ID": "57bf92a1-1f6a-4b7a-9011-d6b31fbe1d99", "DetectTime": "2023-10-30T14:13:27.065835+02:00", "EventTime": "2023-10-30T14:13:27.065848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVpdq24CkNwl1Bt7d9"]} -{"Format": "IDEA0", "ID": "32dcf66a-ea46-4f07-b5a7-e73bf38eb5be", "DetectTime": "2023-10-30T14:13:27.101991+02:00", "EventTime": "2023-10-30T14:13:27.102007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C5FFLyVFahYMltwp8"]} -{"Format": "IDEA0", "ID": "8caa07b3-2a5c-4e9d-8124-6aa018020f5d", "DetectTime": "2023-10-30T14:13:27.119501+02:00", "EventTime": "2023-10-30T14:13:27.119517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CJewlq3B7lLhhdM7Bb"]} -{"Format": "IDEA0", "ID": "565f62a8-973e-4d7b-bf2c-b4f1cb7fa47b", "DetectTime": "2023-10-30T14:13:27.137065+02:00", "EventTime": "2023-10-30T14:13:27.137082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CX9NYZ2eJwyOZiG8fc"]} -{"Format": "IDEA0", "ID": "1b1c41b2-ad59-41a0-b477-8f2db27b5ca6", "DetectTime": "2023-10-30T14:13:27.154002+02:00", "EventTime": "2023-10-30T14:13:27.154018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CXuMWi1lchTX3NUXmi"]} -{"Format": "IDEA0", "ID": "004a8369-ac11-4281-a493-aa1f1df1a453", "DetectTime": "2023-10-30T14:13:27.170314+02:00", "EventTime": "2023-10-30T14:13:27.170346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CgIqXI3XqNPJU40CQk"]} -{"Format": "IDEA0", "ID": "20a350f7-e82c-44d3-8a02-4c7e8ffa2570", "DetectTime": "2023-10-30T14:13:27.184530+02:00", "EventTime": "2023-10-30T14:13:27.184541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CeLSmJ1mUsT6JU5i1a"]} -{"Format": "IDEA0", "ID": "e67d57f2-74ef-41b0-843a-8f29c3d6e282", "DetectTime": "2023-10-30T14:13:27.197835+02:00", "EventTime": "2023-10-30T14:13:27.197846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0wOx71Hjg1y0Axa6f"]} -{"Format": "IDEA0", "ID": "9553dfde-13c5-4f32-a5cc-4fdbde29ee27", "DetectTime": "2023-10-30T14:13:27.211791+02:00", "EventTime": "2023-10-30T14:13:27.211803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CogApE3myCia3KI2ok"]} -{"Format": "IDEA0", "ID": "11fffe23-0c40-4268-8f1d-032c78501bb9", "DetectTime": "2023-10-30T14:13:27.227148+02:00", "EventTime": "2023-10-30T14:13:27.227162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CWTUG13FvlIyKNyUM1"]} -{"Format": "IDEA0", "ID": "dd38fede-69e1-41f8-a8f1-0dafdfdceafb", "DetectTime": "2023-10-30T14:13:27.242340+02:00", "EventTime": "2023-10-30T14:13:27.242352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CBNZZTZGhUyLlJx0a"]} -{"Format": "IDEA0", "ID": "fbb6da7a-279e-450a-9f71-f86cd4b04797", "DetectTime": "2023-10-30T14:13:27.256373+02:00", "EventTime": "2023-10-30T14:13:27.256385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CjLAMa3xCp1vvMsHWe"]} -{"Format": "IDEA0", "ID": "97e84567-538e-4385-aa50-cb05802003aa", "DetectTime": "2023-10-30T14:13:27.271689+02:00", "EventTime": "2023-10-30T14:13:27.271700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CogYcH2semQOP2rp57"]} -{"Format": "IDEA0", "ID": "b0e432b9-bfb3-4553-8745-adc7ef2d70da", "DetectTime": "2023-10-30T14:13:27.298753+02:00", "EventTime": "2023-10-30T14:13:27.298764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CJCfBHqRtOeRQQve4"]} -{"Format": "IDEA0", "ID": "8f82b69a-595b-418c-94ae-be407210f602", "DetectTime": "2023-10-30T14:13:27.313421+02:00", "EventTime": "2023-10-30T14:13:27.313434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CvqjR44ks1avBYQZgd"]} -{"Format": "IDEA0", "ID": "c750ef51-c35d-475c-84fb-aa8ddd9ff7e9", "DetectTime": "2023-10-30T14:13:27.327416+02:00", "EventTime": "2023-10-30T14:13:27.327432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CTvdmcomFtZ4RMGyf"]} -{"Format": "IDEA0", "ID": "c0290a7e-056e-4f58-b955-fd6d61b0d869", "DetectTime": "2023-10-30T14:13:27.342176+02:00", "EventTime": "2023-10-30T14:13:27.342192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CADB1qkh8tZjUhE95"]} -{"Format": "IDEA0", "ID": "87bdc728-43d7-4055-b429-0785ae4a4e03", "DetectTime": "2023-10-30T14:13:27.358307+02:00", "EventTime": "2023-10-30T14:13:27.358318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cpq8aoK878J7pGjNa"]} -{"Format": "IDEA0", "ID": "86e30199-ff7b-4bb4-b524-77f4b701041c", "DetectTime": "2023-10-30T14:13:27.373301+02:00", "EventTime": "2023-10-30T14:13:27.373316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CM9It51gjV0PmCBicb"]} -{"Format": "IDEA0", "ID": "5212f965-a737-448a-b627-88b336a40e28", "DetectTime": "2023-10-30T14:13:27.395573+02:00", "EventTime": "2023-10-30T14:13:27.395589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CyfPNh1db03Sr9u9Xl"]} -{"Format": "IDEA0", "ID": "95b61aba-f0fd-4e70-8d92-d98fb4c6c896", "DetectTime": "2023-10-30T14:13:27.412631+02:00", "EventTime": "2023-10-30T14:13:27.412646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CdvKMt2x9N9rTNOBDd"]} -{"Format": "IDEA0", "ID": "5766f9bb-ed41-4be6-9e98-b8738b574d40", "DetectTime": "2023-10-30T14:13:27.428681+02:00", "EventTime": "2023-10-30T14:13:27.428700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cap0I42SfmS4U9NLak"]} -{"Format": "IDEA0", "ID": "f84e3d6a-7c66-4940-92ca-6087cfe6d0f4", "DetectTime": "2023-10-30T14:13:27.446039+02:00", "EventTime": "2023-10-30T14:13:27.446051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C5tQKs1CyyBcmETdTg"]} -{"Format": "IDEA0", "ID": "122226f3-cba7-4b38-b230-3436313702a4", "DetectTime": "2023-10-30T14:13:27.462683+02:00", "EventTime": "2023-10-30T14:13:27.462695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C9XBnPPiL6kQvAn0e"]} -{"Format": "IDEA0", "ID": "ceb864f9-5b61-4806-9ee1-aa0e923276c5", "DetectTime": "2023-10-30T14:13:27.479801+02:00", "EventTime": "2023-10-30T14:13:27.479813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CLpmHp3wNDanVuIs0i"]} -{"Format": "IDEA0", "ID": "ef3b2957-a2a9-427f-a5dd-756cffb08c61", "DetectTime": "2023-10-30T14:13:27.497005+02:00", "EventTime": "2023-10-30T14:13:27.497021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cb1cX73kC2ljzknvi8"]} -{"Format": "IDEA0", "ID": "468b52f1-b664-4267-acf5-0f87d67acba5", "DetectTime": "2023-10-30T14:13:27.527586+02:00", "EventTime": "2023-10-30T14:13:27.527597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CRNdWt4jqnZzCo4lQi"]} -{"Format": "IDEA0", "ID": "bc86ce7d-526e-4ae9-9618-7f24fe206c6a", "DetectTime": "2023-10-30T14:13:27.542177+02:00", "EventTime": "2023-10-30T14:13:27.542193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Ct7tr53Ph1bLEW4zk7"]} -{"Format": "IDEA0", "ID": "6a5e7acb-b4f3-4dd6-b354-32dd694a80c2", "DetectTime": "2023-10-30T14:13:27.559012+02:00", "EventTime": "2023-10-30T14:13:27.559024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CNwsri4aJU1tSRSuue"]} -{"Format": "IDEA0", "ID": "d7a026a7-315c-4516-a416-cc6b36142803", "DetectTime": "2023-10-30T14:13:27.575609+02:00", "EventTime": "2023-10-30T14:13:27.575621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CzTjBzLZHu4MCqNrd"]} -{"Format": "IDEA0", "ID": "5b7dc5e7-99eb-4b5f-9190-a55c84d70a0c", "DetectTime": "2023-10-30T14:13:27.588826+02:00", "EventTime": "2023-10-30T14:13:27.588842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CLphxM1nePHv3cXKJ3"]} -{"Format": "IDEA0", "ID": "1f66c391-c6fd-4a71-8e86-86c6ec228aa5", "DetectTime": "2023-10-30T14:13:27.603967+02:00", "EventTime": "2023-10-30T14:13:27.603978+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGYP9Q2G9GA7m6LnXl"]} -{"Format": "IDEA0", "ID": "fef19fb6-9ea0-4fc6-9f8f-0a3c35151b60", "DetectTime": "2023-10-30T14:13:27.619707+02:00", "EventTime": "2023-10-30T14:13:27.619721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CtoI3K3zxE0y1yztwb"]} -{"Format": "IDEA0", "ID": "0dbf3fbe-9bf3-4bd6-b12f-c86cd2f5fda5", "DetectTime": "2023-10-30T14:13:27.706000+02:00", "EventTime": "2023-10-30T14:13:27.706012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CYofLW3VJSC5X4rjte"]} -{"Format": "IDEA0", "ID": "1f4ca465-6618-4131-86a7-0c9238857cbb", "DetectTime": "2023-10-30T14:13:27.728463+02:00", "EventTime": "2023-10-30T14:13:27.728480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C5wSgp7Pp2BVEwBNb"]} -{"Format": "IDEA0", "ID": "076d3e71-30d0-47bb-8493-7718c304d19f", "DetectTime": "2023-10-30T14:13:27.747457+02:00", "EventTime": "2023-10-30T14:13:27.747472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CbYORf3xrrkp67wxmg"]} -{"Format": "IDEA0", "ID": "4969e7bf-14c9-4239-967a-c1cf4bf5e881", "DetectTime": "2023-10-30T14:13:27.764664+02:00", "EventTime": "2023-10-30T14:13:27.764675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CpT7a82vDWValM0aQl"]} -{"Format": "IDEA0", "ID": "3ea8dbef-f77d-46ff-a042-eb9fc2ea5289", "DetectTime": "2023-10-30T14:13:27.776371+02:00", "EventTime": "2023-10-30T14:13:27.776382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CUNQHbVAhR9GbOu7l"]} -{"Format": "IDEA0", "ID": "db5f0e96-e846-48ab-93dc-89b2e2cce7a1", "DetectTime": "2023-10-30T14:13:27.792585+02:00", "EventTime": "2023-10-30T14:13:27.792595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CnGZk91CUGLAJpKdTd"]} -{"Format": "IDEA0", "ID": "bb07dd17-05fc-4471-9dfa-3c430d86714b", "DetectTime": "2023-10-30T14:13:27.830556+02:00", "EventTime": "2023-10-30T14:13:27.830576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cjpgj61895n1AONDY7"]} -{"Format": "IDEA0", "ID": "17d68114-1dfd-4416-8de7-bcc2f574f95a", "DetectTime": "2023-10-30T14:13:27.850139+02:00", "EventTime": "2023-10-30T14:13:27.850157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C4SUxo3c1xRn9pzo04"]} -{"Format": "IDEA0", "ID": "9483d33f-e3d5-431a-96bd-68948e0a5cc5", "DetectTime": "2023-10-30T14:13:27.867761+02:00", "EventTime": "2023-10-30T14:13:27.867774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CvBGsb3JL8WVL9qmFh"]} -{"Format": "IDEA0", "ID": "fa986784-841d-45a7-bd75-e4f0dc761bf6", "DetectTime": "2023-10-30T14:13:27.888083+02:00", "EventTime": "2023-10-30T14:13:27.888099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CRWsGV1oxgjJv6VYX9"]} -{"Format": "IDEA0", "ID": "430d28e5-b0e5-4be5-b379-4ae7295ecf75", "DetectTime": "2023-10-30T14:13:27.907298+02:00", "EventTime": "2023-10-30T14:13:27.907314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C36uwM1nyl4d6Y8Dt1"]} -{"Format": "IDEA0", "ID": "086a819b-67b3-473d-bbe8-94663cebf5f2", "DetectTime": "2023-10-30T14:13:27.944419+02:00", "EventTime": "2023-10-30T14:13:27.944430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C4fAC8estT2cd5ao4"]} -{"Format": "IDEA0", "ID": "c387645f-c48d-49da-ac90-8c649eea6368", "DetectTime": "2023-10-30T14:13:27.958776+02:00", "EventTime": "2023-10-30T14:13:27.958800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C9rYCsqGVRk2B1Mog"]} -{"Format": "IDEA0", "ID": "16eff0b6-d81c-4bf9-8c96-8f8255939a61", "DetectTime": "2023-10-30T14:13:27.977760+02:00", "EventTime": "2023-10-30T14:13:27.977775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CRHi3D3n7uWZZS7ce7"]} -{"Format": "IDEA0", "ID": "846e06b7-a941-4d04-90b1-eb688aa08c39", "DetectTime": "2023-10-30T14:13:27.994991+02:00", "EventTime": "2023-10-30T14:13:27.995009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CZQFP84uCj8ASpAU7h"]} -{"Format": "IDEA0", "ID": "dfde58e7-c5be-406e-8da6-d4c9f42c091b", "DetectTime": "2023-10-30T14:13:28.011394+02:00", "EventTime": "2023-10-30T14:13:28.011421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CXkb2M2JuuL21dcxE2"]} -{"Format": "IDEA0", "ID": "62d4f9c8-e003-4fb8-b46f-0b0b06433858", "DetectTime": "2023-10-30T14:13:28.029954+02:00", "EventTime": "2023-10-30T14:13:28.029966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJmrTN2o1xouDNHTe3"]} -{"Format": "IDEA0", "ID": "16cdbb26-94c7-4cc8-8649-4a5120c21c04", "DetectTime": "2023-10-30T14:13:28.048119+02:00", "EventTime": "2023-10-30T14:13:28.048135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CsmDuDmBGBPFMytsh"]} -{"Format": "IDEA0", "ID": "83772a93-ed35-4d80-ab71-18f75e63738a", "DetectTime": "2023-10-30T14:13:28.067413+02:00", "EventTime": "2023-10-30T14:13:28.067425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CM2YMx4R5QzARRqN4i"]} -{"Format": "IDEA0", "ID": "1d8f012b-3fcf-4a49-84d5-fa0894194ffe", "DetectTime": "2023-10-30T14:13:28.084343+02:00", "EventTime": "2023-10-30T14:13:28.084355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CMuz9I17ZurQ0mXOs9"]} -{"Format": "IDEA0", "ID": "d42262a9-d986-4c53-8ea3-d56429e72d79", "DetectTime": "2023-10-30T14:13:28.104784+02:00", "EventTime": "2023-10-30T14:13:28.104799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C5i85x2zzL4gOZgaSl"]} -{"Format": "IDEA0", "ID": "f8b27258-50fa-4924-acaf-03fd6146344d", "DetectTime": "2023-10-30T14:13:28.123255+02:00", "EventTime": "2023-10-30T14:13:28.123266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNQzU02q2RaGYZJA7f"]} -{"Format": "Json", "ID": "f8b27258-50fa-4924-acaf-03fd6146344d", "DetectTime": "2023-10-30T14:13:28.123255+02:00", "EventTime": "2023-10-30T14:13:28.123266+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T12:14:49.047921+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2023/10/30 14:13:28.205925)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a3f48e07-8c6c-4bb6-9e51-8c351e03b3b7", "DetectTime": "2023-10-30T14:13:28.211505+02:00", "EventTime": "2023-10-30T14:13:28.211523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CDPxmy4lZry0R47vul"]} -{"Format": "IDEA0", "ID": "8db51425-1b32-4673-b985-4e8bb49e563f", "DetectTime": "2023-10-30T14:13:28.233438+02:00", "EventTime": "2023-10-30T14:13:28.233450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CFlTxceYaPVicY454"]} -{"Format": "IDEA0", "ID": "717cc62b-48bb-47a7-a428-4d7b84d219ab", "DetectTime": "2023-10-30T14:13:28.254621+02:00", "EventTime": "2023-10-30T14:13:28.254632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CKp2pxJPDQJTC6jW"]} -{"Format": "IDEA0", "ID": "58b26194-0cf4-48c0-9767-15cea4b1467e", "DetectTime": "2023-10-30T14:13:28.274938+02:00", "EventTime": "2023-10-30T14:13:28.274954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3G2eq3aagta3Xxtd7"]} -{"Format": "IDEA0", "ID": "637b43b2-9fbd-4fdf-8e06-b1c28294c969", "DetectTime": "2023-10-30T14:13:28.292189+02:00", "EventTime": "2023-10-30T14:13:28.292202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C5B0rprF3xefZ2PQl"]} -{"Format": "IDEA0", "ID": "68ddd1c3-9c46-4c49-9263-59f8e264f289", "DetectTime": "2023-10-30T14:13:28.312477+02:00", "EventTime": "2023-10-30T14:13:28.312500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CumOOv4bS3SRuaoxvh"]} -{"Format": "IDEA0", "ID": "9f6badb4-2bd4-47eb-a57b-502a152a6e1b", "DetectTime": "2023-10-30T14:13:28.331775+02:00", "EventTime": "2023-10-30T14:13:28.331790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CShzMv4EiJDOt79GR8"]} -{"Format": "IDEA0", "ID": "97cd5f16-2c48-4644-9bea-419324146cee", "DetectTime": "2023-10-30T14:13:28.353891+02:00", "EventTime": "2023-10-30T14:13:28.353906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C236zjHbmvgkrXqq4"]} -{"Format": "IDEA0", "ID": "231a6d56-a1e1-4fc8-b966-d788b1385e5a", "DetectTime": "2023-10-30T14:13:28.391255+02:00", "EventTime": "2023-10-30T14:13:28.391280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CqAfRBMqeaa35l7Xf"]} -{"Format": "IDEA0", "ID": "a1a0d5d9-793b-48c4-8c9b-27bd796b4358", "DetectTime": "2023-10-30T14:13:28.410341+02:00", "EventTime": "2023-10-30T14:13:28.410354+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CxXKH52aTFairmpvma"]} -{"Format": "IDEA0", "ID": "f7a66de8-12f6-4277-99ae-7b39dd0672ec", "DetectTime": "2023-10-30T14:13:28.427034+02:00", "EventTime": "2023-10-30T14:13:28.427050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C3XMt87R7IVdwbsE"]} -{"Format": "IDEA0", "ID": "e1262e3f-3c21-460e-b27c-fd7e4fef6b09", "DetectTime": "2023-10-30T14:13:28.447136+02:00", "EventTime": "2023-10-30T14:13:28.447154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CCNGuC16ddHudZk7lc"]} -{"Format": "IDEA0", "ID": "418cdf66-dcb3-4c0e-b48c-cda41372f02f", "DetectTime": "2023-10-30T14:13:28.467962+02:00", "EventTime": "2023-10-30T14:13:28.467976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cl9Ll73bxfuz499Okd"]} -{"Format": "IDEA0", "ID": "f24d3a96-5057-4cf9-abf1-c98753684439", "DetectTime": "2023-10-30T14:13:28.491560+02:00", "EventTime": "2023-10-30T14:13:28.491576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CUQhoFHHcggfAxEuk"]} -{"Format": "IDEA0", "ID": "73f68631-ac06-4dc7-ac21-44120cdd856f", "DetectTime": "2023-10-30T14:13:28.511275+02:00", "EventTime": "2023-10-30T14:13:28.511302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CYPE6l3IifsZxCPJdl"]} -{"Format": "IDEA0", "ID": "b715a217-51e0-4c7a-b0a1-a7b1615bcb31", "DetectTime": "2023-10-30T14:13:28.532265+02:00", "EventTime": "2023-10-30T14:13:28.532281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CaZ5hg4ibZc6fmjj2k"]} -{"Format": "IDEA0", "ID": "c4c2b3f5-1007-4929-8706-bdb45ac7fda8", "DetectTime": "2023-10-30T14:13:28.555143+02:00", "EventTime": "2023-10-30T14:13:28.555159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CXZ4Ya1iGb9ittmaG1"]} -{"Format": "IDEA0", "ID": "e98004cd-07e3-4fe9-911b-f4cea609baff", "DetectTime": "2023-10-30T14:13:28.575655+02:00", "EventTime": "2023-10-30T14:13:28.575666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CglSzL3EBPVRqLeL8b"]} -{"Format": "IDEA0", "ID": "7339b279-c62e-4ad0-b8c3-42897c29ed58", "DetectTime": "2023-10-30T14:13:28.614027+02:00", "EventTime": "2023-10-30T14:13:28.614052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Ct9KWu1PK99uul02Ea"]} -{"Format": "IDEA0", "ID": "909a86e2-fe1f-480a-879d-729872f5ac5f", "DetectTime": "2023-10-30T14:13:28.635018+02:00", "EventTime": "2023-10-30T14:13:28.635035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBJ9Gl4jnlCsv2nIIi"]} -{"Format": "IDEA0", "ID": "f55393ac-a26c-4897-b669-5b98f7759f16", "DetectTime": "2023-10-30T14:13:28.658898+02:00", "EventTime": "2023-10-30T14:13:28.658916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CkeSj51G1yq1mL8QQb"]} -{"Format": "IDEA0", "ID": "822b442e-9bfd-4f5a-b527-69ab06184a4b", "DetectTime": "2023-10-30T14:13:28.678344+02:00", "EventTime": "2023-10-30T14:13:28.678357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CcuuP43sqaX8LqAXY5"]} -{"Format": "IDEA0", "ID": "5db902ac-54c9-4a43-974b-4b21a35cedca", "DetectTime": "2023-10-30T14:13:28.698833+02:00", "EventTime": "2023-10-30T14:13:28.698855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C8HARQ3LWxu0T5fcy8"]} -{"Format": "IDEA0", "ID": "dfa910e4-00eb-4d4e-a575-9087309253f1", "DetectTime": "2023-10-30T14:13:28.719033+02:00", "EventTime": "2023-10-30T14:13:28.719049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CNKLRz4hbOTgb1fpcj"]} -{"Format": "IDEA0", "ID": "b0fa9b61-9807-4ab5-b8dd-5e105b633157", "DetectTime": "2023-10-30T14:13:28.738431+02:00", "EventTime": "2023-10-30T14:13:28.738444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C9jUMTOVKGlf7lWQl"]} -{"Format": "IDEA0", "ID": "9b5fd0b9-aa81-4ef6-a062-f303b97bd8f8", "DetectTime": "2023-10-30T14:13:28.757379+02:00", "EventTime": "2023-10-30T14:13:28.757395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cf6LO6HTME2EHQmTj"]} -{"Format": "IDEA0", "ID": "2553b67f-b3b8-464f-8860-1438e5d59f19", "DetectTime": "2023-10-30T14:13:28.777429+02:00", "EventTime": "2023-10-30T14:13:28.777444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Co8aUu1TpNyT7ES9U6"]} -{"Format": "IDEA0", "ID": "886b8f3b-177b-4baa-828a-0c66b12a3567", "DetectTime": "2023-10-30T14:13:28.796637+02:00", "EventTime": "2023-10-30T14:13:28.796653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQuRov1u6tqqnUQjCl"]} -{"Format": "IDEA0", "ID": "a246cb0e-72a6-4d79-87e2-73f716943f7c", "DetectTime": "2023-10-30T14:13:28.830563+02:00", "EventTime": "2023-10-30T14:13:28.830578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C14KMC16XXLSkDTToa"]} -{"Format": "IDEA0", "ID": "fa7e128a-c1bd-4da8-adfe-aa1ff620f8fa", "DetectTime": "2023-10-30T14:13:28.848893+02:00", "EventTime": "2023-10-30T14:13:28.848910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CowSI11KGU56pLyuj"]} -{"Format": "IDEA0", "ID": "d2a10feb-0209-4847-a33b-0aaf04251ad9", "DetectTime": "2023-10-30T14:13:28.868911+02:00", "EventTime": "2023-10-30T14:13:28.868921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CZ6W5vWRN2GotDSja"]} -{"Format": "IDEA0", "ID": "31882db1-1bf8-4af3-8f60-ef8b462ea84c", "DetectTime": "2023-10-30T14:13:28.888962+02:00", "EventTime": "2023-10-30T14:13:28.888984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Ct1DPLYia1GTi2vKf"]} -{"Format": "IDEA0", "ID": "4bc8cfb6-9557-4259-bb03-4555298dfaf9", "DetectTime": "2023-10-30T14:13:28.907780+02:00", "EventTime": "2023-10-30T14:13:28.907798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CenUnl1XGD06v5SLy7"]} -{"Format": "IDEA0", "ID": "540c434e-1565-47ee-a891-fb9dda8198be", "DetectTime": "2023-10-30T14:13:28.926743+02:00", "EventTime": "2023-10-30T14:13:28.926760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CyiAQ33cG2k6vX1OGd"]} -{"Format": "IDEA0", "ID": "b96c48b1-0de0-4253-8ed0-55a91544b94c", "DetectTime": "2023-10-30T14:13:28.943187+02:00", "EventTime": "2023-10-30T14:13:28.943205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C0kMFi4wcn2A1qb1zh"]} -{"Format": "IDEA0", "ID": "e5805577-cd44-4130-9210-fd1e8377da71", "DetectTime": "2023-10-30T14:13:28.962134+02:00", "EventTime": "2023-10-30T14:13:28.962149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6pbM11Yr3OFaOn2l"]} -{"Format": "IDEA0", "ID": "c0af2f93-3504-4ea2-9089-899583bd6313", "DetectTime": "2023-10-30T14:13:28.998409+02:00", "EventTime": "2023-10-30T14:13:28.998423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CmAj2o4N8LyK902Npb"]} -{"Format": "IDEA0", "ID": "02563ece-8205-451a-b048-ac4f95758e79", "DetectTime": "2023-10-30T14:13:29.017423+02:00", "EventTime": "2023-10-30T14:13:29.017439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CE1ErC1Qvlad5qc8bh"]} -{"Format": "IDEA0", "ID": "cd97e763-cde1-499f-802a-b56ebbba912a", "DetectTime": "2023-10-30T14:13:29.035487+02:00", "EventTime": "2023-10-30T14:13:29.035498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CZQTDM3rmxN6JsaE3b"]} -{"Format": "IDEA0", "ID": "eca105d9-74d6-4962-bc87-0d6c00c4c361", "DetectTime": "2023-10-30T14:13:29.054602+02:00", "EventTime": "2023-10-30T14:13:29.054618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CHpGnI1kIZnS4WSDhb"]} -{"Format": "IDEA0", "ID": "f02fde71-d212-47b0-ab82-8ff2414a1e79", "DetectTime": "2023-10-30T14:13:29.076458+02:00", "EventTime": "2023-10-30T14:13:29.076469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CX2Std2qoPKuXfV8n9"]} -{"Format": "IDEA0", "ID": "c3da413a-f101-4849-8a64-9e3cd068b5e5", "DetectTime": "2023-10-30T14:13:29.094147+02:00", "EventTime": "2023-10-30T14:13:29.094166+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CAL8Dt1MtUHOTF5bmf"]} -{"Format": "IDEA0", "ID": "166df5a4-0e50-496e-ae44-2ecbb8c12f3c", "DetectTime": "2023-10-30T14:13:29.115195+02:00", "EventTime": "2023-10-30T14:13:29.115214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C1cCV03zlbRlLIur51"]} -{"Format": "IDEA0", "ID": "f36e19f3-8d7f-42a3-9974-68e011c86692", "DetectTime": "2023-10-30T14:13:29.134153+02:00", "EventTime": "2023-10-30T14:13:29.134170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CmxrWB342tTqqytt9l"]} -{"Format": "IDEA0", "ID": "c3268b0c-0721-4ac0-a290-18dc15339cba", "DetectTime": "2023-10-30T14:13:29.154062+02:00", "EventTime": "2023-10-30T14:13:29.154085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CtwRis3RdXXERzEDJ8"]} -{"Format": "IDEA0", "ID": "7873c926-6dbb-43dc-88ef-24860087ff82", "DetectTime": "2023-10-30T14:13:29.174854+02:00", "EventTime": "2023-10-30T14:13:29.174870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cl2ARK2PqFoeVFhKnh"]} -{"Format": "IDEA0", "ID": "62deb6f8-28f3-4952-aa81-9ba590a61561", "DetectTime": "2023-10-30T14:13:29.193748+02:00", "EventTime": "2023-10-30T14:13:29.193758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CJEFEd3318nw7HfVfb"]} -{"Format": "IDEA0", "ID": "bd5ccac6-3079-49be-ba0c-ffa27ffcc601", "DetectTime": "2023-10-30T14:13:29.230156+02:00", "EventTime": "2023-10-30T14:13:29.230172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CUAS1k4DIS1TmYhMYd"]} -{"Format": "IDEA0", "ID": "f897726d-04ea-4d4b-b2a9-a75ba0361bdc", "DetectTime": "2023-10-30T14:13:29.250715+02:00", "EventTime": "2023-10-30T14:13:29.250726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7MOBT3J2ngQCOCxdb"]} -{"Format": "IDEA0", "ID": "0c1af01e-2210-40ae-8fd5-26c102138601", "DetectTime": "2023-10-30T14:13:29.271058+02:00", "EventTime": "2023-10-30T14:13:29.271084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CItbmt2lnfun6Ji3oc"]} -{"Format": "IDEA0", "ID": "644d9ccb-dfdd-4668-9c14-ab99b8f27494", "DetectTime": "2023-10-30T14:13:29.287585+02:00", "EventTime": "2023-10-30T14:13:29.287601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C2dwbmK8tzUOsvLPg"]} -{"Format": "IDEA0", "ID": "b65695b8-0206-4195-bee5-de57bb1effb7", "DetectTime": "2023-10-30T14:13:29.306434+02:00", "EventTime": "2023-10-30T14:13:29.306455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CY2mqj4ElKh9Q2jnf8"]} -{"Format": "IDEA0", "ID": "2bbdd59d-8457-4f99-8096-a86799b54a1c", "DetectTime": "2023-10-30T14:13:29.323639+02:00", "EventTime": "2023-10-30T14:13:29.323649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C70hTe4ypjHspPbjKf"]} -{"Format": "IDEA0", "ID": "83a72ac8-7b7d-4d3f-9d24-1cb3635495f7", "DetectTime": "2023-10-30T14:13:29.340246+02:00", "EventTime": "2023-10-30T14:13:29.340257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CUFexC23qpjbv7bid"]} -{"Format": "IDEA0", "ID": "28978e38-2110-4a06-945f-88374467351c", "DetectTime": "2023-10-30T14:13:29.371519+02:00", "EventTime": "2023-10-30T14:13:29.371538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CT9669HFgAx1aNnU"]} -{"Format": "IDEA0", "ID": "3726d80a-7a4f-4cac-9730-852229069c3a", "DetectTime": "2023-10-30T14:13:29.390061+02:00", "EventTime": "2023-10-30T14:13:29.390082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C5r65o4z0omfXvFRNh"]} -{"Format": "IDEA0", "ID": "7374ffa0-8b89-48b1-9e4b-48c4004a11ce", "DetectTime": "2023-10-30T14:13:29.409341+02:00", "EventTime": "2023-10-30T14:13:29.409353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CqxSsb2WRpd6pYO3rk"]} -{"Format": "IDEA0", "ID": "4c2eccaf-6f23-476f-b4e5-db9d5a62cda7", "DetectTime": "2023-10-30T14:13:29.427071+02:00", "EventTime": "2023-10-30T14:13:29.427089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CiFsiD2RvCsIhQRQEc"]} -{"Format": "IDEA0", "ID": "6f05f256-1610-4c2b-9419-3c9576d95175", "DetectTime": "2023-10-30T14:13:29.446031+02:00", "EventTime": "2023-10-30T14:13:29.446041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C2MiSq38hnmJdHfopk"]} -{"Format": "IDEA0", "ID": "47155ff2-cf42-40ca-a68e-fcbca2cfb000", "DetectTime": "2023-10-30T14:13:29.462439+02:00", "EventTime": "2023-10-30T14:13:29.462452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CwYVA44sMM43sWYhW6"]} -{"Format": "IDEA0", "ID": "a061fcd0-fbbe-4a67-b6a9-b045177d3901", "DetectTime": "2023-10-30T14:13:29.480882+02:00", "EventTime": "2023-10-30T14:13:29.480898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CcZTx1d0dlJzdY4qi"]} -{"Format": "IDEA0", "ID": "560db82b-3bf7-4d1d-8415-69abad835c23", "DetectTime": "2023-10-30T14:13:29.499617+02:00", "EventTime": "2023-10-30T14:13:29.499629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C7RmBe2cZdXmvoJQUh"]} -{"Format": "IDEA0", "ID": "69495beb-d634-4539-b927-d1e55b54b5e0", "DetectTime": "2023-10-30T14:13:29.517261+02:00", "EventTime": "2023-10-30T14:13:29.517273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CoBYPWhWxesIvwIji"]} -{"Format": "IDEA0", "ID": "80c65f8a-e7bc-4bdb-a78a-c39c8e4aacb9", "DetectTime": "2023-10-30T14:13:29.549329+02:00", "EventTime": "2023-10-30T14:13:29.549347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cge8ou2JYBukpO62n3"]} -{"Format": "IDEA0", "ID": "b8ae720c-4c12-4878-8b61-f1755196c6eb", "DetectTime": "2023-10-30T14:13:29.566470+02:00", "EventTime": "2023-10-30T14:13:29.566484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CanZWr12vQN1YB4iH5"]} -{"Format": "IDEA0", "ID": "a63ab3e4-0850-4874-9815-a1997a24be60", "DetectTime": "2023-10-30T14:13:29.585631+02:00", "EventTime": "2023-10-30T14:13:29.585646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVHSuP1REYwYfdagS8"]} -{"Format": "IDEA0", "ID": "72854f75-2993-4a50-bc7d-61b2dd632141", "DetectTime": "2023-10-30T14:13:29.604632+02:00", "EventTime": "2023-10-30T14:13:29.604644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CmjAAz2vnUfW9uqVY1"]} -{"Format": "IDEA0", "ID": "11261190-aea9-45e5-aee6-7bb09489f810", "DetectTime": "2023-10-30T14:13:29.622662+02:00", "EventTime": "2023-10-30T14:13:29.622679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CvnxkR2Oq1E15jo0A"]} -{"Format": "IDEA0", "ID": "f2b4d1af-330c-4f06-932d-648468b69b27", "DetectTime": "2023-10-30T14:13:29.640695+02:00", "EventTime": "2023-10-30T14:13:29.640711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CHKOcj3PcEsYKniHXc"]} -{"Format": "Json", "ID": "f2b4d1af-330c-4f06-932d-648468b69b27", "DetectTime": "2023-10-30T14:13:29.640695+02:00", "EventTime": "2023-10-30T14:13:29.640711+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T12:14:52.419622+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2023/10/30 14:13:29.720245)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "483370dd-31a6-4078-b6f7-6055a650ea92", "DetectTime": "2023-10-30T14:13:29.725624+02:00", "EventTime": "2023-10-30T14:13:29.725636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CNpFcz3NKbRC7dxshd"]} -{"Format": "IDEA0", "ID": "c3e6adc8-1a0a-48df-9b24-7815a0b03f2e", "DetectTime": "2023-10-30T14:13:29.745134+02:00", "EventTime": "2023-10-30T14:13:29.745150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C2iBJi2rzZeov8JDgi"]} -{"Format": "IDEA0", "ID": "d3d82580-622c-4150-aaa3-580184f13b7c", "DetectTime": "2023-10-30T14:13:29.763585+02:00", "EventTime": "2023-10-30T14:13:29.763601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C6fAQe1i0FFd6hXdae"]} -{"Format": "IDEA0", "ID": "16db1943-20bf-4122-8f9a-a348d33c1e3f", "DetectTime": "2023-10-30T14:13:29.782707+02:00", "EventTime": "2023-10-30T14:13:29.782722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CvuuJy2CQdA47TjHm6"]} -{"Format": "IDEA0", "ID": "8f6e4a84-cabf-4252-af50-490120b480ba", "DetectTime": "2023-10-30T14:13:29.800586+02:00", "EventTime": "2023-10-30T14:13:29.800606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C0HC4Z3QD2RK4daC02"]} -{"Format": "IDEA0", "ID": "248bd6f1-ecdb-43d1-8aa1-58e578d17c1f", "DetectTime": "2023-10-30T14:13:29.817828+02:00", "EventTime": "2023-10-30T14:13:29.817841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQqOGR2DIbMxRzbeUe"]} -{"Format": "IDEA0", "ID": "8101ce70-e541-424b-b1e3-d05137fbc1d2", "DetectTime": "2023-10-30T14:13:29.835289+02:00", "EventTime": "2023-10-30T14:13:29.835301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C2Zjh44pSH0m5jtdG4"]} -{"Format": "IDEA0", "ID": "5c2be699-48e2-4371-93dd-4ae58fea5665", "DetectTime": "2023-10-30T14:13:29.851476+02:00", "EventTime": "2023-10-30T14:13:29.851487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFlY1N25LBQ2SXwN9g"]} -{"Format": "IDEA0", "ID": "6e6765f2-ab33-48e1-a550-c04c236c2ee0", "DetectTime": "2023-10-30T14:13:29.869774+02:00", "EventTime": "2023-10-30T14:13:29.869786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C0UWYt44rWvmgMujw8"]} -{"Format": "IDEA0", "ID": "421085d7-5e32-4327-ab0f-a1aa90fbd4c0", "DetectTime": "2023-10-30T14:13:29.899787+02:00", "EventTime": "2023-10-30T14:13:29.899799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CFk4p04zwYobpTaJe"]} -{"Format": "IDEA0", "ID": "4c6867db-f87d-4c2f-9631-4e7efce56a42", "DetectTime": "2023-10-30T14:13:29.918706+02:00", "EventTime": "2023-10-30T14:13:29.918717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CJohil2VlpovenzmYi"]} -{"Format": "IDEA0", "ID": "ae255087-e9ed-47d8-a58b-f88b12ac514a", "DetectTime": "2023-10-30T14:13:29.935084+02:00", "EventTime": "2023-10-30T14:13:29.935108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CiqVPLcuIXcNRobZ8"]} -{"Format": "IDEA0", "ID": "e39fc16d-4e73-441a-b48c-73e1597f9626", "DetectTime": "2023-10-30T14:13:29.963482+02:00", "EventTime": "2023-10-30T14:13:29.963494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CTID7q4pFPtX5XutAi"]} -{"Format": "IDEA0", "ID": "8654679f-bcd5-4fa3-bc6e-4e02cd6be193", "DetectTime": "2023-10-30T14:13:29.979979+02:00", "EventTime": "2023-10-30T14:13:29.979995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cp0svF2UO8O5qvUkS7"]} -{"Format": "IDEA0", "ID": "2406fcc1-88b9-4710-87f2-c83b507ecef4", "DetectTime": "2023-10-30T14:13:29.997513+02:00", "EventTime": "2023-10-30T14:13:29.997538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CTGV7s3JyR2twjuIn8"]} -{"Format": "IDEA0", "ID": "b8d6abf6-d457-43af-a903-c92089c5a53b", "DetectTime": "2023-10-30T14:13:30.014151+02:00", "EventTime": "2023-10-30T14:13:30.014179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CTndYz2kCcGviQHfna"]} -{"Format": "IDEA0", "ID": "2b3f1cf8-51b4-48c5-9950-d69a7d9e6b59", "DetectTime": "2023-10-30T14:13:30.031168+02:00", "EventTime": "2023-10-30T14:13:30.031179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CWlQA93NLP0P2wINVc"]} -{"Format": "IDEA0", "ID": "c337206d-4ef5-4563-b82f-96b3cd339297", "DetectTime": "2023-10-30T14:13:30.046725+02:00", "EventTime": "2023-10-30T14:13:30.046747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C4XLXzCgGSgaaJ6c6"]} -{"Format": "IDEA0", "ID": "e5b80880-1b4d-4545-85f0-b0f534b3cf25", "DetectTime": "2023-10-30T14:13:30.065599+02:00", "EventTime": "2023-10-30T14:13:30.065616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CpVYHkWBtfyq4iI61"]} -{"Format": "IDEA0", "ID": "064c83ad-f30d-4fb2-adee-0b53ac79d36b", "DetectTime": "2023-10-30T14:13:30.083809+02:00", "EventTime": "2023-10-30T14:13:30.083820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CwQrYD2Fru6qMa0Exc"]} -{"Format": "IDEA0", "ID": "ed08bfd8-3175-4dc8-986e-aea6420e2a0d", "DetectTime": "2023-10-30T14:13:30.104697+02:00", "EventTime": "2023-10-30T14:13:30.104717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cz1FPQ1tpiKItUFA3"]} -{"Format": "IDEA0", "ID": "9aed9c3b-dfb5-42fb-b6c4-06e96bdcc160", "DetectTime": "2023-10-30T14:13:30.122101+02:00", "EventTime": "2023-10-30T14:13:30.122121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CS0XRQ4o5zx85giMk"]} -{"Format": "IDEA0", "ID": "a0cd3d15-bd69-4593-87dc-ccda2994e1ca", "DetectTime": "2023-10-30T14:13:30.139244+02:00", "EventTime": "2023-10-30T14:13:30.139261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CuYD5H223ni6zN1B27"]} -{"Format": "IDEA0", "ID": "3bff82f7-4788-4990-848f-428ab189b1f9", "DetectTime": "2023-10-30T14:13:30.154672+02:00", "EventTime": "2023-10-30T14:13:30.154684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cuv7i71wVFJVqNqH6e"]} -{"Format": "IDEA0", "ID": "d673d4ec-54ca-416c-812c-e47572f3f37b", "DetectTime": "2023-10-30T14:13:30.172082+02:00", "EventTime": "2023-10-30T14:13:30.172098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CF78sT1onaPizKLEl1"]} -{"Format": "IDEA0", "ID": "3faf9f92-211a-45f9-8c30-8cd052da1c16", "DetectTime": "2023-10-30T14:13:30.206077+02:00", "EventTime": "2023-10-30T14:13:30.206093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CIQ5JO1plDvS1KrEEb"]} -{"Format": "IDEA0", "ID": "b32f84a5-1462-4b0a-a0ff-ea7f7039341d", "DetectTime": "2023-10-30T14:13:30.223106+02:00", "EventTime": "2023-10-30T14:13:30.223124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CxRS3K3mvnd9mN8YY4"]} -{"Format": "IDEA0", "ID": "08cc1076-9c8e-42ba-aab6-214c2d8d3aa3", "DetectTime": "2023-10-30T14:13:30.241641+02:00", "EventTime": "2023-10-30T14:13:30.241655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CH5qgx4bLdypby7pZi"]} -{"Format": "IDEA0", "ID": "35da058c-93ee-453e-b6f2-1ef83ee188d4", "DetectTime": "2023-10-30T14:13:30.258469+02:00", "EventTime": "2023-10-30T14:13:30.258481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CGWs9eonGmmuPHujl"]} -{"Format": "IDEA0", "ID": "c718f4c4-7222-4db1-a505-0d9c2d654b3d", "DetectTime": "2023-10-30T14:13:30.275472+02:00", "EventTime": "2023-10-30T14:13:30.275487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C4bAee1KAjXrlD0yg"]} -{"Format": "IDEA0", "ID": "067458b1-c3a9-4eb6-bcc7-db8903071a98", "DetectTime": "2023-10-30T14:13:30.292718+02:00", "EventTime": "2023-10-30T14:13:30.292730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cc2hzS3X805U4RVvbc"]} -{"Format": "IDEA0", "ID": "5fe884a8-967b-482f-988a-1b82acf03c48", "DetectTime": "2023-10-30T14:13:30.310892+02:00", "EventTime": "2023-10-30T14:13:30.310908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["ChYF7f2wmZkVga3bu9"]} -{"Format": "IDEA0", "ID": "ebffdac0-395a-4ce9-a402-4ab60914faff", "DetectTime": "2023-10-30T14:13:30.327626+02:00", "EventTime": "2023-10-30T14:13:30.327645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CkKXCr3z0pLN3FyJuk"]} -{"Format": "IDEA0", "ID": "c928c7be-d75c-40d1-93ed-363000799472", "DetectTime": "2023-10-30T14:13:30.348565+02:00", "EventTime": "2023-10-30T14:13:30.348585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CJ0bMns9aKtdArVff"]} -{"Format": "IDEA0", "ID": "8ff15d9d-b71e-48a0-a28d-b8a8b488df97", "DetectTime": "2023-10-30T14:13:30.366808+02:00", "EventTime": "2023-10-30T14:13:30.366829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ccnvqn6oaueECOl25"]} -{"Format": "IDEA0", "ID": "85965f11-3337-4424-97e9-d88215e62ca8", "DetectTime": "2023-10-30T14:13:30.384601+02:00", "EventTime": "2023-10-30T14:13:30.384624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C585ef4CUJi4lworn2"]} -{"Format": "IDEA0", "ID": "d243a5ec-c774-4382-bcaa-f09280a629c8", "DetectTime": "2023-10-30T14:13:30.402388+02:00", "EventTime": "2023-10-30T14:13:30.402404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEmXrL37bKFrAY3bX2"]} -{"Format": "IDEA0", "ID": "7ecfff64-6781-4d58-a791-3241d278c9bb", "DetectTime": "2023-10-30T14:13:30.422448+02:00", "EventTime": "2023-10-30T14:13:30.422463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cc2a6g8X2bbO3V828"]} -{"Format": "IDEA0", "ID": "be7737f4-8de1-43f1-8b9b-668ed4d51ff5", "DetectTime": "2023-10-30T14:13:30.440038+02:00", "EventTime": "2023-10-30T14:13:30.440056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cc0heb31b17VjlFdIj"]} -{"Format": "IDEA0", "ID": "2939f363-4db9-4120-9cc6-858d64335aec", "DetectTime": "2023-10-30T14:13:30.458029+02:00", "EventTime": "2023-10-30T14:13:30.458043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjnM0r3diBhx0wVX59"]} -{"Format": "IDEA0", "ID": "c9e5f5d1-c518-4b49-b051-00e3065da759", "DetectTime": "2023-10-30T14:13:30.486942+02:00", "EventTime": "2023-10-30T14:13:30.486954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CJ87hd32j3IdXXr2zi"]} -{"Format": "IDEA0", "ID": "84ba399b-2f77-4f0d-ac36-e669b5d6059f", "DetectTime": "2023-10-30T14:13:30.504285+02:00", "EventTime": "2023-10-30T14:13:30.504305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CKD0iV1bldOMZx526b"]} -{"Format": "IDEA0", "ID": "075ccdd8-d47f-4846-8486-84205de0409c", "DetectTime": "2023-10-30T14:13:30.524734+02:00", "EventTime": "2023-10-30T14:13:30.524745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVKc1Q28UIRajlj9Ik"]} -{"Format": "IDEA0", "ID": "9992e54a-1d20-4671-910c-cf7cd56559c0", "DetectTime": "2023-10-30T14:13:30.542611+02:00", "EventTime": "2023-10-30T14:13:30.542626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CX9dPRdsf4mEewZAj"]} -{"Format": "IDEA0", "ID": "97db9341-c536-47d8-a5a8-e53db159fbc2", "DetectTime": "2023-10-30T14:13:30.561402+02:00", "EventTime": "2023-10-30T14:13:30.561416+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CZs7Vp1oFOZ6ZKDTgf"]} -{"Format": "IDEA0", "ID": "6b37daf3-da4c-40cc-b0bf-ca978c6adc3f", "DetectTime": "2023-10-30T14:13:30.583149+02:00", "EventTime": "2023-10-30T14:13:30.583165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CODPGN1KEQ3iO0pHOf"]} -{"Format": "IDEA0", "ID": "06263472-a5ce-4fd4-aa0c-90ee3bf74465", "DetectTime": "2023-10-30T14:13:30.604638+02:00", "EventTime": "2023-10-30T14:13:30.604653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CKcW5b1ed5bcqc43If"]} -{"Format": "IDEA0", "ID": "b62adc5a-c75e-42cd-abf3-e0af5fa3cde1", "DetectTime": "2023-10-30T14:13:30.625123+02:00", "EventTime": "2023-10-30T14:13:30.625137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C5FDxVNS2eXesIJb3"]} -{"Format": "IDEA0", "ID": "3f404584-a5ff-401c-915c-adcd9fc3aa78", "DetectTime": "2023-10-30T14:13:30.644043+02:00", "EventTime": "2023-10-30T14:13:30.644059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CtyBVQ1WivlPbw5rS7"]} -{"Format": "IDEA0", "ID": "ac1c4f73-81bd-4c27-963f-3954213586b8", "DetectTime": "2023-10-30T14:13:30.661002+02:00", "EventTime": "2023-10-30T14:13:30.661013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C3VDPP3FHHq5I2CfI7"]} -{"Format": "IDEA0", "ID": "a926e4a5-7bb8-494c-9d17-e96ead9ed461", "DetectTime": "2023-10-30T14:13:30.678179+02:00", "EventTime": "2023-10-30T14:13:30.678203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C8Oxq92zrcDECRFTf9"]} -{"Format": "IDEA0", "ID": "2a981199-bbfc-4ea0-98ab-6a6187f3886c", "DetectTime": "2023-10-30T14:13:30.694295+02:00", "EventTime": "2023-10-30T14:13:30.694312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CDx6gU1Z01A20udEHi"]} -{"Format": "IDEA0", "ID": "1d2d59c3-9861-434c-9a85-f9654189c979", "DetectTime": "2023-10-30T14:13:30.709987+02:00", "EventTime": "2023-10-30T14:13:30.710003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CJkAc9cHRDUozR5Kl"]} -{"Format": "IDEA0", "ID": "a59f8d80-a471-4083-a918-7983ad139906", "DetectTime": "2023-10-30T14:13:30.731079+02:00", "EventTime": "2023-10-30T14:13:30.731099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CsnTxIIWHkc0FdkK8"]} -{"Format": "IDEA0", "ID": "679cd28c-238d-4713-807a-2f1db2b46a43", "DetectTime": "2023-10-30T14:13:30.751018+02:00", "EventTime": "2023-10-30T14:13:30.751034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C67tlY1oA60vh1uX0d"]} -{"Format": "IDEA0", "ID": "57e88c75-2898-416c-98ee-598a7d558045", "DetectTime": "2023-10-30T14:13:30.772092+02:00", "EventTime": "2023-10-30T14:13:30.772108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cwh3Zc4a4Dz6FMNOSk"]} -{"Format": "IDEA0", "ID": "fc786cb9-d1e2-4a37-9669-8074406f983e", "DetectTime": "2023-10-30T14:13:30.791748+02:00", "EventTime": "2023-10-30T14:13:30.791768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CZmho944TqwbXRR2o7"]} -{"Format": "IDEA0", "ID": "498a8883-acad-43fd-8fe9-abfa71c8778b", "DetectTime": "2023-10-30T14:13:30.807284+02:00", "EventTime": "2023-10-30T14:13:30.807303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CxmBlI2TOGjML7zAQl"]} -{"Format": "IDEA0", "ID": "88ebe440-7818-40b4-bcea-42eefe69473c", "DetectTime": "2023-10-30T14:13:30.836662+02:00", "EventTime": "2023-10-30T14:13:30.836685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CjpZQN3723jUwYnRw3"]} -{"Format": "IDEA0", "ID": "16a8752c-e53e-4533-b388-8ce554e11993", "DetectTime": "2023-10-30T14:13:30.854351+02:00", "EventTime": "2023-10-30T14:13:30.854370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CIhB8ZBMfSMqyhQna"]} -{"Format": "IDEA0", "ID": "252e6c94-f0ee-4db5-820b-a15991adaea8", "DetectTime": "2023-10-30T14:13:30.870692+02:00", "EventTime": "2023-10-30T14:13:30.870703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CzQKCT21wlqxSQ5zB9"]} -{"Format": "IDEA0", "ID": "800efcf5-c198-4eff-a325-c235ef9cf342", "DetectTime": "2023-10-30T14:13:30.890236+02:00", "EventTime": "2023-10-30T14:13:30.890249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CwQu4r27qLkt7XzZm5"]} -{"Format": "IDEA0", "ID": "b20fd31c-4be7-45b7-bf19-6e05e15a52e8", "DetectTime": "2023-10-30T14:13:30.906859+02:00", "EventTime": "2023-10-30T14:13:30.906876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C2RMsV1W6GDrL2A8vf"]} -{"Format": "IDEA0", "ID": "db2bb927-7b14-41ed-ba63-b68e439943ff", "DetectTime": "2023-10-30T14:13:30.925937+02:00", "EventTime": "2023-10-30T14:13:30.925950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CcvsKcksTtpCz65H9"]} -{"Format": "IDEA0", "ID": "371f5554-2a4f-47f2-b27b-b304dfc5a8b0", "DetectTime": "2023-10-30T14:13:30.943361+02:00", "EventTime": "2023-10-30T14:13:30.943377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CaTT4N1839Ml8Qq8wi"]} -{"Format": "IDEA0", "ID": "3918532b-6dc2-4668-85a3-2d2300cd136a", "DetectTime": "2023-10-30T14:13:30.977348+02:00", "EventTime": "2023-10-30T14:13:30.977364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CuYISU1b9uo0J8rio5"]} -{"Format": "IDEA0", "ID": "f4c6b3cc-f055-464b-a030-34737db59282", "DetectTime": "2023-10-30T14:13:30.995876+02:00", "EventTime": "2023-10-30T14:13:30.995893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CPog5S3PDk6FwIVb3b"]} -{"Format": "IDEA0", "ID": "192da9b7-7c6e-426b-bd07-0c3bcf22206c", "DetectTime": "2023-10-30T14:13:31.016606+02:00", "EventTime": "2023-10-30T14:13:31.016618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNpm6M2iSag8NAlILh"]} -{"Format": "IDEA0", "ID": "f573a3db-ec68-478b-962f-9c2956ae64b7", "DetectTime": "2023-10-30T14:13:31.035526+02:00", "EventTime": "2023-10-30T14:13:31.035544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CM4evB26sEENWT6Hpd"]} -{"Format": "IDEA0", "ID": "31b6866c-5533-4830-982b-1f3a92319bd6", "DetectTime": "2023-10-30T14:13:31.056784+02:00", "EventTime": "2023-10-30T14:13:31.056811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C4jzmc1ozgwtylhMWg"]} -{"Format": "IDEA0", "ID": "affee77a-d509-43e6-bc6b-63a53d6c419f", "DetectTime": "2023-10-30T14:13:31.077284+02:00", "EventTime": "2023-10-30T14:13:31.077296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CfaP9f1uN9nvm8esd3"]} -{"Format": "IDEA0", "ID": "a2e42662-55df-4a71-9636-73c26ae28048", "DetectTime": "2023-10-30T14:13:31.114007+02:00", "EventTime": "2023-10-30T14:13:31.114030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFpGLk20WyDERnEb23"]} -{"Format": "IDEA0", "ID": "240adf74-d7e0-412a-a3fb-a9190148f03b", "DetectTime": "2023-10-30T14:13:31.137651+02:00", "EventTime": "2023-10-30T14:13:31.137667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C9l31h11QRmLNArH4g"]} -{"Format": "IDEA0", "ID": "da311ec0-f8f2-483e-a58f-251f0c63d4a4", "DetectTime": "2023-10-30T14:13:31.162023+02:00", "EventTime": "2023-10-30T14:13:31.162036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CoRNCP18I8Tt1El4Bh"]} -{"Format": "IDEA0", "ID": "8bf843b4-cea7-44fd-8fcd-73e8ef8810fa", "DetectTime": "2023-10-30T14:13:31.185173+02:00", "EventTime": "2023-10-30T14:13:31.185189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C5XpcL1HUS9lUxANg"]} -{"Format": "IDEA0", "ID": "f2f011be-f6bf-413a-a974-7e87f3742487", "DetectTime": "2023-10-30T14:13:31.208541+02:00", "EventTime": "2023-10-30T14:13:31.208558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CksHDq2JCdBWn1QK1k"]} -{"Format": "IDEA0", "ID": "95844dc4-3416-470a-ba82-97c8c17d2f81", "DetectTime": "2023-10-30T14:13:31.232880+02:00", "EventTime": "2023-10-30T14:13:31.232899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["COomJjzbUdOZcWdcg"]} -{"Format": "IDEA0", "ID": "022ee471-4d6b-4231-95b0-bf8c1972359b", "DetectTime": "2023-10-30T14:13:31.256406+02:00", "EventTime": "2023-10-30T14:13:31.256425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C4BPy13obBPERcuwX1"]} -{"Format": "IDEA0", "ID": "9c19b166-08b2-464f-9381-46bdd90b7aa4", "DetectTime": "2023-10-30T14:13:31.280656+02:00", "EventTime": "2023-10-30T14:13:31.280674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C7Rxjm1QWTai9zgNej"]} -{"Format": "IDEA0", "ID": "c01d5472-b63d-48c5-88fd-914e8ee7fcd6", "DetectTime": "2023-10-30T14:13:31.304366+02:00", "EventTime": "2023-10-30T14:13:31.304382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CDYqAw2oW3TAP8Rx7c"]} -{"Format": "IDEA0", "ID": "a8567585-0df6-4db0-8fd1-18955151bb0c", "DetectTime": "2023-10-30T14:13:31.328284+02:00", "EventTime": "2023-10-30T14:13:31.328296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CerN3z26nsDRad48ne"]} -{"Format": "Json", "ID": "a8567585-0df6-4db0-8fd1-18955151bb0c", "DetectTime": "2023-10-30T14:13:31.328284+02:00", "EventTime": "2023-10-30T14:13:31.328296+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T12:45:03.830200+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2023/10/30 14:13:31.407077)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "548b54d8-e447-4ff0-9034-9ed0033b1249", "DetectTime": "2023-10-30T14:13:31.412793+02:00", "EventTime": "2023-10-30T14:13:31.412806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cg4EHX2c2k4eUfZTu8"]} -{"Format": "IDEA0", "ID": "b32c3b7d-4280-42ee-9572-8c69a2b6e82b", "DetectTime": "2023-10-30T14:13:31.435935+02:00", "EventTime": "2023-10-30T14:13:31.435949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CL8bB1yzH05fQQ69"]} -{"Format": "IDEA0", "ID": "824ed1ee-d1e0-46b1-bf7b-4c060bd74bc9", "DetectTime": "2023-10-30T14:13:31.464359+02:00", "EventTime": "2023-10-30T14:13:31.464379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXizjIOgvFQs3M0Md"]} -{"Format": "IDEA0", "ID": "447b525d-ac95-4acf-b841-d748f1bc8955", "DetectTime": "2023-10-30T14:13:31.487470+02:00", "EventTime": "2023-10-30T14:13:31.487488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C6K1bc23yyNNPgAO3f"]} -{"Format": "IDEA0", "ID": "1203a15c-e553-4977-b136-5deaf76d1df5", "DetectTime": "2023-10-30T14:13:31.509478+02:00", "EventTime": "2023-10-30T14:13:31.509496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["COTwga3FtxshR6cZcj"]} -{"Format": "IDEA0", "ID": "c96a48b2-7dc2-41b5-ae5d-24d6d1b6110c", "DetectTime": "2023-10-30T14:13:31.531571+02:00", "EventTime": "2023-10-30T14:13:31.531582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CCmX7C2TpMjgGuCAxj"]} -{"Format": "IDEA0", "ID": "74e9558e-dedc-4f33-8c8d-64333ac75625", "DetectTime": "2023-10-30T14:13:31.553161+02:00", "EventTime": "2023-10-30T14:13:31.553174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C0HxTF3yp3DLqEGJme"]} -{"Format": "IDEA0", "ID": "ff39a235-f305-45f1-a51c-129a3bfc0984", "DetectTime": "2023-10-30T14:13:31.579355+02:00", "EventTime": "2023-10-30T14:13:31.579367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CFTpOZcP5FZCS4EBj"]} -{"Format": "IDEA0", "ID": "e2978dba-ff73-45d1-ba82-76e4648702f8", "DetectTime": "2023-10-30T14:13:31.600721+02:00", "EventTime": "2023-10-30T14:13:31.600736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CIcuWJ2Byv3oEO0q1c"]} -{"Format": "IDEA0", "ID": "6804b9d3-a97b-4751-b070-a2e6dd8b0cb4", "DetectTime": "2023-10-30T14:13:31.623576+02:00", "EventTime": "2023-10-30T14:13:31.623600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CECbfP3KMhxGahT3pa"]} -{"Format": "IDEA0", "ID": "f8d73b33-0d6e-413b-8915-d0944765db3d", "DetectTime": "2023-10-30T14:13:31.646934+02:00", "EventTime": "2023-10-30T14:13:31.646949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C5V6vq4jY9ljxwPtp8"]} -{"Format": "IDEA0", "ID": "3e63cc69-f252-4b3d-ba2f-a930cc18b2d5", "DetectTime": "2023-10-30T14:13:31.671857+02:00", "EventTime": "2023-10-30T14:13:31.671875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CcjT8n1clpdYafzdyl"]} -{"Format": "IDEA0", "ID": "16ae3461-3653-4314-bd6b-101843ef5287", "DetectTime": "2023-10-30T14:13:31.693604+02:00", "EventTime": "2023-10-30T14:13:31.693621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYDjy33nYdRapLz96a"]} -{"Format": "IDEA0", "ID": "10886611-0749-4061-92fe-a7d7f5fe8ded", "DetectTime": "2023-10-30T14:13:31.725726+02:00", "EventTime": "2023-10-30T14:13:31.725740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ClwnCI1ZM4SH8mgBsk"]} -{"Format": "IDEA0", "ID": "402678de-7e7d-4108-82bb-3448202309a6", "DetectTime": "2023-10-30T14:13:31.750657+02:00", "EventTime": "2023-10-30T14:13:31.750686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cog9xC1VqBVepoW7Zd"]} -{"Format": "IDEA0", "ID": "86273365-1392-4ffe-8ee0-f26ddeee798d", "DetectTime": "2023-10-30T14:13:31.783168+02:00", "EventTime": "2023-10-30T14:13:31.783195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CJa4Iv2Ja3gYY4pEqg"]} -{"Format": "IDEA0", "ID": "c84ccdbd-cd42-40ff-9752-bf928cd5272c", "DetectTime": "2023-10-30T14:13:31.805867+02:00", "EventTime": "2023-10-30T14:13:31.805884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cq6jOl3iDm2f7T0Rif"]} -{"Format": "IDEA0", "ID": "becb12d3-c1a7-4dc0-b506-85fbbe59e7d4", "DetectTime": "2023-10-30T14:13:31.825910+02:00", "EventTime": "2023-10-30T14:13:31.825921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CWhrTa3DO05bTdcVn6"]} -{"Format": "IDEA0", "ID": "3dbc4b39-1ec3-4db1-a60b-8a5b29796c1b", "DetectTime": "2023-10-30T14:13:31.853115+02:00", "EventTime": "2023-10-30T14:13:31.853126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C1pgx331CfsC208Mwl"]} -{"Format": "IDEA0", "ID": "4421c229-1a31-4a75-8cf3-bc984a33cd4d", "DetectTime": "2023-10-30T14:13:31.884134+02:00", "EventTime": "2023-10-30T14:13:31.884151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRoyD823kPIwWciZQk"]} -{"Format": "IDEA0", "ID": "ff2efa57-5492-4295-9afa-5a5515de38d8", "DetectTime": "2023-10-30T14:13:31.904502+02:00", "EventTime": "2023-10-30T14:13:31.904519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYN2NV1yk37kfLVLxg"]} -{"Format": "IDEA0", "ID": "6e7678e4-917b-4dfa-bc1a-cba0f46268e5", "DetectTime": "2023-10-30T14:13:31.931585+02:00", "EventTime": "2023-10-30T14:13:31.931595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Co20yW1upTxkSSl7sl"]} -{"Format": "IDEA0", "ID": "4217c078-f82b-417c-8e05-134338954869", "DetectTime": "2023-10-30T14:13:31.951140+02:00", "EventTime": "2023-10-30T14:13:31.951156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ClnvhDNntI4rcvdH4"]} -{"Format": "IDEA0", "ID": "4f12ac94-2883-4414-96e5-f8652801eb50", "DetectTime": "2023-10-30T14:13:31.973672+02:00", "EventTime": "2023-10-30T14:13:31.973688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CAbWQ4zjSj77bSDpj"]} -{"Format": "IDEA0", "ID": "b932d560-8038-43f9-bc21-1ea32ad2f87f", "DetectTime": "2023-10-30T14:13:32.001895+02:00", "EventTime": "2023-10-30T14:13:32.001911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CR87G82KEwWtEa3QK6"]} -{"Format": "IDEA0", "ID": "6adbd8a6-f6fa-4680-b204-95a6f2c8619e", "DetectTime": "2023-10-30T14:13:32.024354+02:00", "EventTime": "2023-10-30T14:13:32.024370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cs4VgM1dXddhgDgFXe"]} -{"Format": "Json", "ID": "6adbd8a6-f6fa-4680-b204-95a6f2c8619e", "DetectTime": "2023-10-30T14:13:32.024354+02:00", "EventTime": "2023-10-30T14:13:32.024370+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T12:45:05.968885+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2023/10/30 14:13:32.092614)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ac5df553-baff-4d13-801b-5918ff7c244e", "DetectTime": "2023-10-30T14:13:32.097858+02:00", "EventTime": "2023-10-30T14:13:32.097878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3oY0w3j5RzvbJ2Ifc"]} -{"Format": "IDEA0", "ID": "a6be8df8-8db9-4629-bcf5-8723b7ed518f", "DetectTime": "2023-10-30T14:13:32.125067+02:00", "EventTime": "2023-10-30T14:13:32.125083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxLna94uoXPfLo17y7"]} -{"Format": "IDEA0", "ID": "e3d082b6-9d88-4303-9a29-08cc1b469160", "DetectTime": "2023-10-30T14:13:32.148531+02:00", "EventTime": "2023-10-30T14:13:32.148542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CJb7082jtXuqmGNtw2"]} -{"Format": "IDEA0", "ID": "5ef9eb33-62d3-421e-a3ec-99ae343d721b", "DetectTime": "2023-10-30T14:13:32.172695+02:00", "EventTime": "2023-10-30T14:13:32.172707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CQBH4y4xSnQvlQJtye"]} -{"Format": "IDEA0", "ID": "97a63878-c95b-49b2-958b-a7493036717e", "DetectTime": "2023-10-30T14:13:32.198321+02:00", "EventTime": "2023-10-30T14:13:32.198349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CevhnY2SzDjiGjym3i"]} -{"Format": "IDEA0", "ID": "967d403d-d156-42e2-bd40-32922182fcf7", "DetectTime": "2023-10-30T14:13:32.227099+02:00", "EventTime": "2023-10-30T14:13:32.227117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CIBciKiIsBQTURGb9"]} -{"Format": "IDEA0", "ID": "9b5401f3-8aca-474f-9323-e0a384807ec7", "DetectTime": "2023-10-30T14:13:32.250635+02:00", "EventTime": "2023-10-30T14:13:32.250650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CAXnFD3CsK60bmzd14"]} -{"Format": "IDEA0", "ID": "8ebcf295-66b0-4d7e-b20c-0c0252861777", "DetectTime": "2023-10-30T14:13:32.274639+02:00", "EventTime": "2023-10-30T14:13:32.274657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cxxd1W2okAsi6GVJXa"]} -{"Format": "IDEA0", "ID": "a0319fb9-3f2f-4b65-9f66-38397c477b78", "DetectTime": "2023-10-30T14:13:32.300134+02:00", "EventTime": "2023-10-30T14:13:32.300146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cfs8SeWTalFkt0Pe1"]} -{"Format": "IDEA0", "ID": "965b4dad-8918-426e-a8d3-1a93dc9bf45b", "DetectTime": "2023-10-30T14:13:32.323443+02:00", "EventTime": "2023-10-30T14:13:32.323455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CWdpleCWSyA0HOG6k"]} -{"Format": "Json", "ID": "965b4dad-8918-426e-a8d3-1a93dc9bf45b", "DetectTime": "2023-10-30T14:13:32.323443+02:00", "EventTime": "2023-10-30T14:13:32.323455+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T12:45:08.053829+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2023/10/30 14:13:32.382861)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f83f08f7-a23b-4cf7-9512-634e914b96ac", "DetectTime": "2023-10-30T14:13:32.386981+02:00", "EventTime": "2023-10-30T14:13:32.386993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CMqH1XwnbRI7Cj8Zk"]} -{"Format": "IDEA0", "ID": "38168504-322e-4ddf-b734-fb5fe91ff105", "DetectTime": "2023-10-30T14:13:32.411363+02:00", "EventTime": "2023-10-30T14:13:32.411374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cx74Wc2f55Zt9RGXJ4"]} -{"Format": "IDEA0", "ID": "d3f71df8-7ea7-494e-84ec-597057aabcbe", "DetectTime": "2023-10-30T14:13:32.435780+02:00", "EventTime": "2023-10-30T14:13:32.435791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CdJ4K54NiNl4oVNy53"]} -{"Format": "IDEA0", "ID": "7e204c6e-8f8d-497e-b04d-927fc973838b", "DetectTime": "2023-10-30T14:13:32.459099+02:00", "EventTime": "2023-10-30T14:13:32.459115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CB6BRq1XOl2b8Wj8Lj"]} -{"Format": "IDEA0", "ID": "dc5f243a-7c6f-4069-bce2-b78f0d46f307", "DetectTime": "2023-10-30T14:13:32.481931+02:00", "EventTime": "2023-10-30T14:13:32.481943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cd27tb4kNX563pSTDd"]} -{"Format": "IDEA0", "ID": "53cc9759-3b90-4fe7-9ca1-e783e5d699ee", "DetectTime": "2023-10-30T14:13:32.506762+02:00", "EventTime": "2023-10-30T14:13:32.506774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7x05g3jaaolKmZrd1"]} -{"Format": "IDEA0", "ID": "fb7756b6-e2f5-4fa2-a23b-66e6fb594206", "DetectTime": "2023-10-30T14:13:32.530509+02:00", "EventTime": "2023-10-30T14:13:32.530525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C3R5eo2Mcv97w1idld"]} -{"Format": "IDEA0", "ID": "7f0dd913-54ff-437e-87cb-55e69b9ccb89", "DetectTime": "2023-10-30T14:13:32.553308+02:00", "EventTime": "2023-10-30T14:13:32.553323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CekHDP2mMtZJNrn7r5"]} -{"Format": "IDEA0", "ID": "88e6fd84-3e8e-4719-8a67-8d7fe2947154", "DetectTime": "2023-10-30T14:13:32.583356+02:00", "EventTime": "2023-10-30T14:13:32.583373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CxAvBv2yLq42aGIOrg"]} -{"Format": "IDEA0", "ID": "d7cecfcc-6d39-4887-9cd9-d39f02b587ad", "DetectTime": "2023-10-30T14:13:32.614176+02:00", "EventTime": "2023-10-30T14:13:32.614194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Colaqx2BZ8by93emjf"]} -{"Format": "IDEA0", "ID": "53ce5339-b15d-43ee-9359-9217ab3c96bc", "DetectTime": "2023-10-30T14:13:32.646561+02:00", "EventTime": "2023-10-30T14:13:32.646579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CGhKsE4S8MuQkkxJE6"]} -{"Format": "IDEA0", "ID": "2b692d28-2410-4082-9296-2e8c02dae7be", "DetectTime": "2023-10-30T14:13:32.677769+02:00", "EventTime": "2023-10-30T14:13:32.677787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C6bOwzG8mISFbVRsf"]} -{"Format": "IDEA0", "ID": "6321637c-05ea-4418-8c5d-d50b4134db60", "DetectTime": "2023-10-30T14:13:32.709125+02:00", "EventTime": "2023-10-30T14:13:32.709143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CZ10ng3qyS0XaUpB4d"]} -{"Format": "IDEA0", "ID": "40ed54e5-360b-464a-9d83-028e594c7a09", "DetectTime": "2023-10-30T14:13:32.731337+02:00", "EventTime": "2023-10-30T14:13:32.731355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CS5Fub2R2gWpLO30P4"]} -{"Format": "IDEA0", "ID": "e669bf1d-8f87-418f-b608-40bc4cfb8bc9", "DetectTime": "2023-10-30T14:13:32.761889+02:00", "EventTime": "2023-10-30T14:13:32.761901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CVjGTp2u3ktKGvyOc8"]} -{"Format": "IDEA0", "ID": "631fbbb0-58d4-4245-92ce-a8cebbb2dba1", "DetectTime": "2023-10-30T14:13:32.793475+02:00", "EventTime": "2023-10-30T14:13:32.793490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CpfZY72Pk8BV3wBC9"]} -{"Format": "Json", "ID": "631fbbb0-58d4-4245-92ce-a8cebbb2dba1", "DetectTime": "2023-10-30T14:13:32.793475+02:00", "EventTime": "2023-10-30T14:13:32.793490+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T13:15:33.234225+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2023/10/30 14:13:32.874158)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "02cc9031-18e6-4c24-9ffa-5c46361bea5d", "DetectTime": "2023-10-30T14:13:32.878608+02:00", "EventTime": "2023-10-30T14:13:32.878619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CZAFdx2LHGuYPlV6S4"]} -{"Format": "IDEA0", "ID": "ae48e681-3991-4860-9957-5e55c0be1598", "DetectTime": "2023-10-30T14:13:32.908374+02:00", "EventTime": "2023-10-30T14:13:32.908391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CH1mjZ1Eu1MdKIfoJc"]} -{"Format": "IDEA0", "ID": "fb56a23e-6db9-4e04-bbd3-2f06aa720c48", "DetectTime": "2023-10-30T14:13:32.934875+02:00", "EventTime": "2023-10-30T14:13:32.934887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CoeuNH6ROoHjRFA5f"]} -{"Format": "IDEA0", "ID": "a892aa2b-5898-4cfb-8103-ad1656472736", "DetectTime": "2023-10-30T14:13:32.962963+02:00", "EventTime": "2023-10-30T14:13:32.962980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ChDWwi1QVCwJW6lI5j"]} -{"Format": "IDEA0", "ID": "577f1dbd-a796-4602-adac-f5c79efeb312", "DetectTime": "2023-10-30T14:13:32.992888+02:00", "EventTime": "2023-10-30T14:13:32.992905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cp3WB41xr2VLwvt6g"]} -{"Format": "IDEA0", "ID": "1584bbe4-e79e-4697-9b48-c11cd2916887", "DetectTime": "2023-10-30T14:13:33.020024+02:00", "EventTime": "2023-10-30T14:13:33.020041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C3QUTo1OCwhmrGVcvg"]} -{"Format": "IDEA0", "ID": "fcafc538-b129-4240-a00c-04a7a842550c", "DetectTime": "2023-10-30T14:13:33.046215+02:00", "EventTime": "2023-10-30T14:13:33.046231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C8FREx3orUB5GdrBBf"]} -{"Format": "IDEA0", "ID": "7f11aa30-6381-447d-8534-d0f3bae8edf4", "DetectTime": "2023-10-30T14:13:33.074986+02:00", "EventTime": "2023-10-30T14:13:33.075004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CUtUgaZ0MTHIouUc"]} -{"Format": "Json", "ID": "7f11aa30-6381-447d-8534-d0f3bae8edf4", "DetectTime": "2023-10-30T14:13:33.074986+02:00", "EventTime": "2023-10-30T14:13:33.075004+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T13:15:34.807497+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2023/10/30 14:13:33.141838)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8e0e5d76-3342-4cdc-89d2-ad53eac10ad0", "DetectTime": "2023-10-30T14:13:33.146522+02:00", "EventTime": "2023-10-30T14:13:33.146539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CRQL6K39StUo04Ius"]} -{"Format": "IDEA0", "ID": "63afa15a-64ad-4165-acb1-b625f88e4e4c", "DetectTime": "2023-10-30T14:13:33.171591+02:00", "EventTime": "2023-10-30T14:13:33.171609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Clo4Ur2Xas1iEghR9g"]} -{"Format": "IDEA0", "ID": "8bf95cd6-79f0-4cf3-95a2-a503582fef2a", "DetectTime": "2023-10-30T14:13:33.198882+02:00", "EventTime": "2023-10-30T14:13:33.198894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CDEt1j3W2x4qzFomce"]} -{"Format": "IDEA0", "ID": "2bf190c0-fdc1-45e1-9010-96d2f092313b", "DetectTime": "2023-10-30T14:13:33.220513+02:00", "EventTime": "2023-10-30T14:13:33.220525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CaFn333y7zEto7Mr81"]} -{"Format": "IDEA0", "ID": "e96334d4-5d2a-4e69-8287-d800a3005d31", "DetectTime": "2023-10-30T14:13:33.245695+02:00", "EventTime": "2023-10-30T14:13:33.245706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CtbVSLy3DzwiHh569"]} -{"Format": "IDEA0", "ID": "63351511-70cc-4955-b695-c854c43c739b", "DetectTime": "2023-10-30T14:13:33.270880+02:00", "EventTime": "2023-10-30T14:13:33.270893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CsHk2a14eLpVONdfHj"]} -{"Format": "IDEA0", "ID": "cdce5be1-89c9-4826-bc99-07496fd7d088", "DetectTime": "2023-10-30T14:13:33.294275+02:00", "EventTime": "2023-10-30T14:13:33.294294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C8OjlW1jPq2M3ZUyQ8"]} -{"Format": "IDEA0", "ID": "5e3c0efe-38ac-44c8-8517-fcf074c52ac5", "DetectTime": "2023-10-30T14:13:33.319882+02:00", "EventTime": "2023-10-30T14:13:33.319896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CslMmt2edxx0eOzth1"]} -{"Format": "IDEA0", "ID": "dcd5f157-1a2b-4047-96a1-59706025c092", "DetectTime": "2023-10-30T14:13:33.347277+02:00", "EventTime": "2023-10-30T14:13:33.347289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CyrSpC4ePlOI7tE9hj"]} -{"Format": "Json", "ID": "dcd5f157-1a2b-4047-96a1-59706025c092", "DetectTime": "2023-10-30T14:13:33.347277+02:00", "EventTime": "2023-10-30T14:13:33.347289+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T13:15:37.432572+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2023/10/30 14:13:33.415404)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "206c900b-b7c1-4255-b870-e61a5887eeb8", "DetectTime": "2023-10-30T14:13:33.421163+02:00", "EventTime": "2023-10-30T14:13:33.421180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C84Gwa3QU8RV7Mx055"]} -{"Format": "IDEA0", "ID": "10c0827a-26c4-42eb-a9f5-487200055606", "DetectTime": "2023-10-30T14:13:33.453751+02:00", "EventTime": "2023-10-30T14:13:33.453767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cv7ix447hCvh5bgWq"]} -{"Format": "IDEA0", "ID": "0a75b247-28f5-4712-98da-f28d42ec115c", "DetectTime": "2023-10-30T14:13:33.480728+02:00", "EventTime": "2023-10-30T14:13:33.480746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CUrOrE3VMSAsn8lvF7"]} -{"Format": "IDEA0", "ID": "2d0c9248-e792-4967-afd7-eeac44feeff5", "DetectTime": "2023-10-30T14:13:33.504949+02:00", "EventTime": "2023-10-30T14:13:33.504969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQViC94TCwSEj45nW3"]} -{"Format": "IDEA0", "ID": "35d15a68-4f26-4a6c-ad67-db1c9c77d50b", "DetectTime": "2023-10-30T14:13:33.529120+02:00", "EventTime": "2023-10-30T14:13:33.529137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CYRIrH32Ry7eVvnCb3"]} -{"Format": "IDEA0", "ID": "6aca1a05-df7c-452f-9c1a-d58a78cd96db", "DetectTime": "2023-10-30T14:13:33.551367+02:00", "EventTime": "2023-10-30T14:13:33.551383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CC68Db4kbYKSj0ejz1"]} -{"Format": "IDEA0", "ID": "7f26613c-79be-45b8-9dab-9b75ed2b98b3", "DetectTime": "2023-10-30T14:13:33.576060+02:00", "EventTime": "2023-10-30T14:13:33.576072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CH24epJW5kELsdjP3"]} -{"Format": "IDEA0", "ID": "6ab4a284-0601-44db-9ae1-79bdb7e70ee5", "DetectTime": "2023-10-30T14:13:33.602615+02:00", "EventTime": "2023-10-30T14:13:33.602631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CUuN4LZFl13SmHRb"]} -{"Format": "Json", "ID": "6ab4a284-0601-44db-9ae1-79bdb7e70ee5", "DetectTime": "2023-10-30T14:13:33.602615+02:00", "EventTime": "2023-10-30T14:13:33.602631+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T13:45:42.967476+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2023/10/30 14:13:33.667252)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "20765ed8-4e96-4568-a187-94ddbe88ab69", "DetectTime": "2023-10-30T14:13:33.672369+02:00", "EventTime": "2023-10-30T14:13:33.672387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CBG5BVichQKeb5Pmc"]} -{"Format": "IDEA0", "ID": "0cf5ada3-7eb5-420e-851a-e6457cec6069", "DetectTime": "2023-10-30T14:13:33.697494+02:00", "EventTime": "2023-10-30T14:13:33.697509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C3zM9A2ZF6KC89Xbda"]} -{"Format": "IDEA0", "ID": "542140a0-afb1-4ac2-a5ed-430d9281b4d9", "DetectTime": "2023-10-30T14:13:33.721972+02:00", "EventTime": "2023-10-30T14:13:33.721988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CsPzdK1FcRcSUJDeEh"]} -{"Format": "IDEA0", "ID": "9c52ae33-4066-4237-aa19-9c0a602c0ef8", "DetectTime": "2023-10-30T14:13:33.745133+02:00", "EventTime": "2023-10-30T14:13:33.745146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CkPQXf10tgY26Mt0i6"]} -{"Format": "IDEA0", "ID": "54f14a2d-64d4-4df7-8811-48d00dab7065", "DetectTime": "2023-10-30T14:13:33.767638+02:00", "EventTime": "2023-10-30T14:13:33.767654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CoSxhF1REduVNKloSk"]} -{"Format": "IDEA0", "ID": "a9ec384c-cbd9-4030-aacd-702c50738bd9", "DetectTime": "2023-10-30T14:13:33.789283+02:00", "EventTime": "2023-10-30T14:13:33.789309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CAOatj1rIaITZqXbUj"]} -{"Format": "IDEA0", "ID": "20e3edd7-7dc1-485f-a684-50daa191ea33", "DetectTime": "2023-10-30T14:13:33.812227+02:00", "EventTime": "2023-10-30T14:13:33.812244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CMxlmr0esvjS3ePP7"]} -{"Format": "IDEA0", "ID": "cd5df0da-c445-4eb2-b851-fe4cff6219b1", "DetectTime": "2023-10-30T14:13:33.836413+02:00", "EventTime": "2023-10-30T14:13:33.836430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CKCsnJ1SEqTgK8zlx6"]} -{"Format": "IDEA0", "ID": "210609a0-f458-48fc-bb7b-d1f07a8799c3", "DetectTime": "2023-10-30T14:13:33.856986+02:00", "EventTime": "2023-10-30T14:13:33.856999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CPRF0B2FmPaFy1gYtl"]} -{"Format": "Json", "ID": "210609a0-f458-48fc-bb7b-d1f07a8799c3", "DetectTime": "2023-10-30T14:13:33.856986+02:00", "EventTime": "2023-10-30T14:13:33.856999+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T13:45:44.849103+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2023/10/30 14:13:33.921911)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fbdb5b9f-aed1-46e1-a5c2-0602b89d61c6", "DetectTime": "2023-10-30T14:13:33.927603+02:00", "EventTime": "2023-10-30T14:13:33.927618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CAtZMm1c4ildHokWZc"]} -{"Format": "IDEA0", "ID": "6c0a9969-b801-49f8-8ff7-154938314c32", "DetectTime": "2023-10-30T14:13:33.950619+02:00", "EventTime": "2023-10-30T14:13:33.950631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CVSjrJ2GA7GLw5XHLg"]} -{"Format": "IDEA0", "ID": "ea9ec642-0dac-4e7e-88f7-1d817a017e56", "DetectTime": "2023-10-30T14:13:33.971783+02:00", "EventTime": "2023-10-30T14:13:33.971801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CxzMsk2ew8f4WW7izk"]} -{"Format": "IDEA0", "ID": "17d5a57f-f075-4aef-9b58-621825909e3b", "DetectTime": "2023-10-30T14:13:33.991086+02:00", "EventTime": "2023-10-30T14:13:33.991104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CQFKX0492YXaEcSS14"]} -{"Format": "IDEA0", "ID": "b93c6571-6ad2-4285-a939-3c4eafe89979", "DetectTime": "2023-10-30T14:13:34.009821+02:00", "EventTime": "2023-10-30T14:13:34.009833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CHc2Qgr2REH7q7KLj"]} -{"Format": "IDEA0", "ID": "f437ec8f-fb11-45be-90cb-782988491e5a", "DetectTime": "2023-10-30T14:13:34.028576+02:00", "EventTime": "2023-10-30T14:13:34.028594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQHvtq1dypqXkXxcak"]} -{"Format": "IDEA0", "ID": "c05679ad-a106-4d2a-b528-7f3b2751359e", "DetectTime": "2023-10-30T14:13:34.048009+02:00", "EventTime": "2023-10-30T14:13:34.048020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CF6JuG1IvomiaEsM4"]} -{"Format": "IDEA0", "ID": "86b5d26c-fe83-4200-9a2e-97e23a39ac93", "DetectTime": "2023-10-30T14:13:34.068477+02:00", "EventTime": "2023-10-30T14:13:34.068493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CQY03I3ZHw2fq3hsGl"]} -{"Format": "Json", "ID": "86b5d26c-fe83-4200-9a2e-97e23a39ac93", "DetectTime": "2023-10-30T14:13:34.068477+02:00", "EventTime": "2023-10-30T14:13:34.068493+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T13:45:46.755898+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2023/10/30 14:13:34.129253)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3ee6fc7c-7d27-46f0-ba65-a2f8eaab2f5d", "DetectTime": "2023-10-30T14:13:34.134359+02:00", "EventTime": "2023-10-30T14:13:34.134378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CChlvG35xjDvJl5HJ4"]} -{"Format": "IDEA0", "ID": "fece07c0-7539-45ba-9a6c-c6c729678de8", "DetectTime": "2023-10-30T14:13:34.153581+02:00", "EventTime": "2023-10-30T14:13:34.153600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ck6Jvl3dH5oVwfLBt6"]} -{"Format": "IDEA0", "ID": "63434ece-87ab-470e-904d-3754f74c7d90", "DetectTime": "2023-10-30T14:13:34.170427+02:00", "EventTime": "2023-10-30T14:13:34.170439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Ckfp861xbUYd2LTwok"]} -{"Format": "IDEA0", "ID": "4815e9f4-946e-47de-b68a-116972a5774f", "DetectTime": "2023-10-30T14:13:34.189771+02:00", "EventTime": "2023-10-30T14:13:34.189787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CS5h1A2m2il8lP27v6"]} -{"Format": "IDEA0", "ID": "c977197b-6d9d-46e5-a4bd-56a4b93afe09", "DetectTime": "2023-10-30T14:13:34.214381+02:00", "EventTime": "2023-10-30T14:13:34.214396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBI8KjSVeHw6DC4wk"]} -{"Format": "IDEA0", "ID": "9053c444-75ef-41d8-8e6d-ae25af2c79cf", "DetectTime": "2023-10-30T14:13:34.231429+02:00", "EventTime": "2023-10-30T14:13:34.231441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CwdEQ325xGxaeToH6f"]} -{"Format": "IDEA0", "ID": "616bd274-0f46-49c4-931d-d63635534a9b", "DetectTime": "2023-10-30T14:13:34.248260+02:00", "EventTime": "2023-10-30T14:13:34.248272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CDHUIM29P8TIoNoPjg"]} -{"Format": "IDEA0", "ID": "16edee82-897f-42b1-ae16-e225d2804620", "DetectTime": "2023-10-30T14:13:34.348245+02:00", "EventTime": "2023-10-30T14:13:34.348262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcGbaa4PcCjVE66Xv8"]} -{"Format": "IDEA0", "ID": "b550d8d5-a126-422d-99b6-4156a07973fd", "DetectTime": "2023-10-30T14:13:34.386136+02:00", "EventTime": "2023-10-30T14:13:34.386157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CIlUkA3DWyJWzFsxg8"]} -{"Format": "IDEA0", "ID": "70cf1df9-f92c-47d8-8754-412d1e92f0ad", "DetectTime": "2023-10-30T14:13:34.420791+02:00", "EventTime": "2023-10-30T14:13:34.420808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CHP4pn2Cf2acWtBSKa"]} -{"Format": "IDEA0", "ID": "9811fc5e-639b-46f0-9e5b-b1e388a755b7", "DetectTime": "2023-10-30T14:13:34.457421+02:00", "EventTime": "2023-10-30T14:13:34.457447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CV572n4UnYUMNzr8yk"]} -{"Format": "IDEA0", "ID": "a22fc693-9a58-4d3e-b53d-e4a5189995fc", "DetectTime": "2023-10-30T14:13:34.493155+02:00", "EventTime": "2023-10-30T14:13:34.493172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CdUY8CbDyNi1Gywe5"]} -{"Format": "IDEA0", "ID": "860e5fb1-e05e-4f53-9e9b-79c9fff81467", "DetectTime": "2023-10-30T14:13:34.526771+02:00", "EventTime": "2023-10-30T14:13:34.526802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CVoM0h497mVhqNTOp6"]} -{"Format": "IDEA0", "ID": "df264591-adbd-4336-853a-223438c142c1", "DetectTime": "2023-10-30T14:13:34.560441+02:00", "EventTime": "2023-10-30T14:13:34.560452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C4i5At4kOqnAHzRI12"]} -{"Format": "Json", "ID": "df264591-adbd-4336-853a-223438c142c1", "DetectTime": "2023-10-30T14:13:34.560441+02:00", "EventTime": "2023-10-30T14:13:34.560452+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T14:16:01.528340+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2023/10/30 14:13:34.656345)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "58be54cb-fefd-4ff8-acc0-a1507a9cc94e", "DetectTime": "2023-10-30T14:13:34.661376+02:00", "EventTime": "2023-10-30T14:13:34.661392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cjf94n1bGA0foPPZCi"]} -{"Format": "IDEA0", "ID": "037ed4ff-8b47-42f6-80ff-05568872cc6f", "DetectTime": "2023-10-30T14:13:34.695008+02:00", "EventTime": "2023-10-30T14:13:34.695021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CfWsj02RjyHMSf4M14"]} -{"Format": "IDEA0", "ID": "3ea12fc3-e31a-4351-9561-ed79d93f899a", "DetectTime": "2023-10-30T14:13:34.724537+02:00", "EventTime": "2023-10-30T14:13:34.724565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["ChYGUl4sKM8Q0K4NCd"]} -{"Format": "IDEA0", "ID": "1271a0e1-35d0-4ed0-b80c-dbc312e2b284", "DetectTime": "2023-10-30T14:13:34.752139+02:00", "EventTime": "2023-10-30T14:13:34.752163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CeruBf3qvwmr39rWCe"]} -{"Format": "IDEA0", "ID": "66f8d325-80c3-48be-ac3c-e908f9320240", "DetectTime": "2023-10-30T14:13:34.781885+02:00", "EventTime": "2023-10-30T14:13:34.781899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["ClNjBj1UclCwMGT4b4"]} -{"Format": "IDEA0", "ID": "f6ef5cdd-692b-431e-9700-d7f99712171e", "DetectTime": "2023-10-30T14:13:34.813084+02:00", "EventTime": "2023-10-30T14:13:34.813100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CTTlGlGAGf0Lz7hc"]} -{"Format": "IDEA0", "ID": "f472a5d2-8efc-4563-a148-d09b6f4d9af7", "DetectTime": "2023-10-30T14:13:34.845055+02:00", "EventTime": "2023-10-30T14:13:34.845072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CmOv3N3G0gECo10tNg"]} -{"Format": "IDEA0", "ID": "2733398e-b00b-4ebe-8cd4-c5d134b62d05", "DetectTime": "2023-10-30T14:13:34.877411+02:00", "EventTime": "2023-10-30T14:13:34.877439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C943511idFVhhkFJYa"]} -{"Format": "Json", "ID": "2733398e-b00b-4ebe-8cd4-c5d134b62d05", "DetectTime": "2023-10-30T14:13:34.877411+02:00", "EventTime": "2023-10-30T14:13:34.877439+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T14:16:03.166926+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2023/10/30 14:13:34.946738)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2f24c3c0-81fa-4037-bc27-7505a6a3af64", "DetectTime": "2023-10-30T14:13:34.951887+02:00", "EventTime": "2023-10-30T14:13:34.951913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CirJPT1Q6My2VmL9hd"]} -{"Format": "IDEA0", "ID": "ba302036-79fd-4221-b425-22505a4600a3", "DetectTime": "2023-10-30T14:13:34.983467+02:00", "EventTime": "2023-10-30T14:13:34.983497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C1ERM31I06oZYdebU"]} -{"Format": "IDEA0", "ID": "120f8548-e03e-42af-b856-edd580328f0c", "DetectTime": "2023-10-30T14:13:35.013296+02:00", "EventTime": "2023-10-30T14:13:35.013312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CnAl7s1c6YYRrLUimi"]} -{"Format": "IDEA0", "ID": "cecdd8a9-f700-49ff-9055-a70d504fbe4c", "DetectTime": "2023-10-30T14:13:35.047375+02:00", "EventTime": "2023-10-30T14:13:35.047392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CQM5cT1t9bntHX3Cye"]} -{"Format": "IDEA0", "ID": "2ca4dd08-1391-4e3b-91c0-3cf62a29a38d", "DetectTime": "2023-10-30T14:13:35.079537+02:00", "EventTime": "2023-10-30T14:13:35.079552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CIX1gg2StqNBi5BQTg"]} -{"Format": "IDEA0", "ID": "4e6b9c05-b63c-4d43-9104-6e97546abd75", "DetectTime": "2023-10-30T14:13:35.110001+02:00", "EventTime": "2023-10-30T14:13:35.110017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CAOLiC2ydbiyYFyQbd"]} -{"Format": "IDEA0", "ID": "768166cb-da98-49cf-9220-e4af95c31025", "DetectTime": "2023-10-30T14:13:35.139921+02:00", "EventTime": "2023-10-30T14:13:35.139948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CjOsAJ3l8upaIXHzB9"]} -{"Format": "IDEA0", "ID": "7f7f85a0-1734-43fb-8133-415f7aacd2f5", "DetectTime": "2023-10-30T14:13:35.162125+02:00", "EventTime": "2023-10-30T14:13:35.162140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CPTNfCN7bDfetrK21"]} -{"Format": "IDEA0", "ID": "eeb282a9-0ad5-4f59-8a89-975aba6e6a0c", "DetectTime": "2023-10-30T14:13:35.188440+02:00", "EventTime": "2023-10-30T14:13:35.188457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CgKtRF2V03IsOYLL24"]} -{"Format": "Json", "ID": "eeb282a9-0ad5-4f59-8a89-975aba6e6a0c", "DetectTime": "2023-10-30T14:13:35.188440+02:00", "EventTime": "2023-10-30T14:13:35.188457+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T14:16:05.768505+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2023/10/30 14:13:35.259166)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e746d564-004b-4a6c-af4a-0da30b6d5e23", "DetectTime": "2023-10-30T14:13:35.264451+02:00", "EventTime": "2023-10-30T14:13:35.264467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C7bs3m3w85tlzTByj3"]} -{"Format": "IDEA0", "ID": "52ae229b-a010-4654-8d33-3491d8ab4942", "DetectTime": "2023-10-30T14:13:35.291187+02:00", "EventTime": "2023-10-30T14:13:35.291199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C98EZC4EuEP0Gp9osk"]} -{"Format": "IDEA0", "ID": "d98e2403-4c56-42b6-9996-1d3a007d91ff", "DetectTime": "2023-10-30T14:13:35.316803+02:00", "EventTime": "2023-10-30T14:13:35.316821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CYNpFd31KaPAOwahj5"]} -{"Format": "IDEA0", "ID": "ee77a47d-7bba-4a73-991a-b9380cc65add", "DetectTime": "2023-10-30T14:13:35.348017+02:00", "EventTime": "2023-10-30T14:13:35.348033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CDpEfj2V1MwSmRBVpl"]} -{"Format": "IDEA0", "ID": "0cc33f54-5e0e-41cb-8f43-1bff0165b4bc", "DetectTime": "2023-10-30T14:13:35.376282+02:00", "EventTime": "2023-10-30T14:13:35.376294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMNDZq3oLT2TyLl6f6"]} -{"Format": "IDEA0", "ID": "31cd360f-6293-4709-a8d7-c88693f9f006", "DetectTime": "2023-10-30T14:13:35.403930+02:00", "EventTime": "2023-10-30T14:13:35.403949+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2camo4IGIWpY1ikRf"]} -{"Format": "IDEA0", "ID": "dc23c8b6-d6af-4a6a-b7f7-cc65adc63da7", "DetectTime": "2023-10-30T14:13:35.427666+02:00", "EventTime": "2023-10-30T14:13:35.427684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CzmOxQ1g0mZRV0xHQd"]} -{"Format": "IDEA0", "ID": "ad6c17f0-ce85-4527-a385-137c2cce7872", "DetectTime": "2023-10-30T14:13:35.459251+02:00", "EventTime": "2023-10-30T14:13:35.459267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CbAEIf21E0LXOtiVSj"]} -{"Format": "IDEA0", "ID": "cc5b0f64-e7aa-4851-8325-e5b0e7f2ad9b", "DetectTime": "2023-10-30T14:13:35.485986+02:00", "EventTime": "2023-10-30T14:13:35.486005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CGN13eDfqoGmmBI0h"]} -{"Format": "Json", "ID": "cc5b0f64-e7aa-4851-8325-e5b0e7f2ad9b", "DetectTime": "2023-10-30T14:13:35.485986+02:00", "EventTime": "2023-10-30T14:13:35.486005+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T14:46:56.423522+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2023/10/30 14:13:35.569235)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c7a62e3b-aaca-44b3-9ae5-b548f18577b9", "DetectTime": "2023-10-30T14:13:35.574533+02:00", "EventTime": "2023-10-30T14:13:35.574545+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CfALXl1ZYsuIwn0vu5"]} -{"Format": "IDEA0", "ID": "5ae1bac1-111e-43e6-bbf5-dc462de2fdd1", "DetectTime": "2023-10-30T14:13:35.607447+02:00", "EventTime": "2023-10-30T14:13:35.607475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["ClrxMN39N66enpS2aa"]} -{"Format": "IDEA0", "ID": "cb4cdcf5-ba69-4de8-a8d9-f64d35129bc1", "DetectTime": "2023-10-30T14:13:35.631620+02:00", "EventTime": "2023-10-30T14:13:35.631632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["COjDe68crM5n7HxQ3"]} -{"Format": "IDEA0", "ID": "5eb82b87-3a6a-4c6d-b00c-d1a923a13ecd", "DetectTime": "2023-10-30T14:13:35.654166+02:00", "EventTime": "2023-10-30T14:13:35.654186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CRlHdq3XvYhuXTq3Fj"]} -{"Format": "IDEA0", "ID": "9f7bf6d3-070d-47fc-a555-e9ad33df7ffb", "DetectTime": "2023-10-30T14:13:35.677543+02:00", "EventTime": "2023-10-30T14:13:35.677563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CgjuBf2YLpexUU9MGj"]} -{"Format": "IDEA0", "ID": "28d67e4f-e4e0-44f6-b4de-cf7c58233709", "DetectTime": "2023-10-30T14:13:35.698158+02:00", "EventTime": "2023-10-30T14:13:35.698173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CXNfbm1silUHslXeWa"]} -{"Format": "IDEA0", "ID": "49258d15-9691-474c-99ae-ffcc08d51ce8", "DetectTime": "2023-10-30T14:13:35.721520+02:00", "EventTime": "2023-10-30T14:13:35.721536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CUJGJU2VIVEIyiZ9e3"]} -{"Format": "IDEA0", "ID": "54dbbe14-ae12-43b1-a298-3b4a030eea19", "DetectTime": "2023-10-30T14:13:35.742434+02:00", "EventTime": "2023-10-30T14:13:35.742447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CpZrWKCcgMx0a9E26"]} -{"Format": "IDEA0", "ID": "bcfbb7ea-b069-4b09-9032-fa031bd9e4b6", "DetectTime": "2023-10-30T14:13:35.765885+02:00", "EventTime": "2023-10-30T14:13:35.765902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CDRl1U1mvPd9AlSrve"]} -{"Format": "Json", "ID": "bcfbb7ea-b069-4b09-9032-fa031bd9e4b6", "DetectTime": "2023-10-30T14:13:35.765885+02:00", "EventTime": "2023-10-30T14:13:35.765902+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T14:46:57.903737+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2023/10/30 14:13:35.831003)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c58935bd-2fb0-4e8d-9869-c724ddac5a90", "DetectTime": "2023-10-30T14:13:35.835795+02:00", "EventTime": "2023-10-30T14:13:35.835812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ClsFqJ1qLznqR6HHGl"]} -{"Format": "IDEA0", "ID": "05ef4977-bc66-4fcd-a428-fdd8c3b8e75b", "DetectTime": "2023-10-30T14:13:35.858884+02:00", "EventTime": "2023-10-30T14:13:35.858898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CmvuEh1FSABDFZmwK8"]} -{"Format": "IDEA0", "ID": "ccc03048-9cd6-4c6a-bc2e-145ff04596b2", "DetectTime": "2023-10-30T14:13:35.879712+02:00", "EventTime": "2023-10-30T14:13:35.879733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C4lFiQ167VLED5LHPi"]} -{"Format": "IDEA0", "ID": "1ef68b5c-6b75-49e1-8c12-97d79885e76a", "DetectTime": "2023-10-30T14:13:35.900220+02:00", "EventTime": "2023-10-30T14:13:35.900237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CWll782brWnhIAQq38"]} -{"Format": "IDEA0", "ID": "f23ab52d-519c-4e4f-9ba6-e0e21664553a", "DetectTime": "2023-10-30T14:13:35.922424+02:00", "EventTime": "2023-10-30T14:13:35.922439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIbabs3IiNz14QxX14"]} -{"Format": "IDEA0", "ID": "c0c7e6df-e970-43e1-8235-4d528785dba0", "DetectTime": "2023-10-30T14:13:35.947001+02:00", "EventTime": "2023-10-30T14:13:35.947019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CbgZoC4R9eGAHeaZwd"]} -{"Format": "IDEA0", "ID": "79a7532c-7800-48f7-8641-d5f7fe4de10b", "DetectTime": "2023-10-30T14:13:35.969677+02:00", "EventTime": "2023-10-30T14:13:35.969700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CA63vVIuQ31BLBX5k"]} -{"Format": "IDEA0", "ID": "bafe0371-7ba5-4356-bf9a-d9ec162df032", "DetectTime": "2023-10-30T14:13:35.989246+02:00", "EventTime": "2023-10-30T14:13:35.989262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CrlMiJ27ZecqdAK3Wc"]} -{"Format": "IDEA0", "ID": "aef8d263-fb11-4f7f-a837-56a6bfd12e15", "DetectTime": "2023-10-30T14:13:36.010300+02:00", "EventTime": "2023-10-30T14:13:36.010310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cvr7fZGrS7VWa0157"]} -{"Format": "IDEA0", "ID": "887e92c9-5029-402f-b077-3fa37384d63a", "DetectTime": "2023-10-30T14:13:36.032362+02:00", "EventTime": "2023-10-30T14:13:36.032379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVGFpE1Vs5akKtFJTf"]} -{"Format": "Json", "ID": "887e92c9-5029-402f-b077-3fa37384d63a", "DetectTime": "2023-10-30T14:13:36.032362+02:00", "EventTime": "2023-10-30T14:13:36.032379+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T14:47:01.367468+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2023/10/30 14:13:36.093852)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fbbb0d91-e55b-4031-9709-de53a6232191", "DetectTime": "2023-10-30T14:13:36.098605+02:00", "EventTime": "2023-10-30T14:13:36.098618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CqSGGL3dH6BuA7r2ua"]} -{"Format": "IDEA0", "ID": "0a6e6069-0499-4178-88a4-fa37e8376c7e", "DetectTime": "2023-10-30T14:13:36.117302+02:00", "EventTime": "2023-10-30T14:13:36.117317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["ChK7xkuoST96A8hXf"]} -{"Format": "IDEA0", "ID": "2b9d30e0-a6dd-4011-82c4-f982668021d7", "DetectTime": "2023-10-30T14:13:36.133202+02:00", "EventTime": "2023-10-30T14:13:36.133219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJ4Sqv12HEbLeu10yf"]} -{"Format": "IDEA0", "ID": "975df3fe-5971-495b-b602-f901eedcdeac", "DetectTime": "2023-10-30T14:13:36.151995+02:00", "EventTime": "2023-10-30T14:13:36.152007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CCX6Bf3CQKOLixYFwi"]} -{"Format": "IDEA0", "ID": "ecfa7f5a-0e03-4295-8f3c-ba5690ed8975", "DetectTime": "2023-10-30T14:13:36.169183+02:00", "EventTime": "2023-10-30T14:13:36.169199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CLOeKq4jzhIreZjr2g"]} -{"Format": "IDEA0", "ID": "b58ff836-d4f9-4ee2-b8e4-46088ddf1990", "DetectTime": "2023-10-30T14:13:36.187598+02:00", "EventTime": "2023-10-30T14:13:36.187614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C6Q9LHpswzmY6mFab"]} -{"Format": "IDEA0", "ID": "4e81a5df-be7a-49d0-a4b1-08e2be73bbc8", "DetectTime": "2023-10-30T14:13:36.206207+02:00", "EventTime": "2023-10-30T14:13:36.206232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7PwNZ7950Um7OF59"]} -{"Format": "IDEA0", "ID": "59db04d5-40d6-4f64-b9e1-1f8e8660d5ca", "DetectTime": "2023-10-30T14:13:36.232399+02:00", "EventTime": "2023-10-30T14:13:36.232417+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CNQmY54xBc3tnVSAdh"]} -{"Format": "IDEA0", "ID": "65fbb23b-aa5c-464a-b6a4-4fed147a5dd5", "DetectTime": "2023-10-30T14:13:36.253241+02:00", "EventTime": "2023-10-30T14:13:36.253253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C8Wd0e4qFrzYGxoB9b"]} -{"Format": "IDEA0", "ID": "c57b9b22-a372-4d51-8a9a-dcf999a020fd", "DetectTime": "2023-10-30T14:13:36.282915+02:00", "EventTime": "2023-10-30T14:13:36.282942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CIu2CFPZGsgp3HHpl"]} -{"Format": "IDEA0", "ID": "a572f171-fad4-4f8d-9ab5-932930d834e7", "DetectTime": "2023-10-30T14:13:36.316210+02:00", "EventTime": "2023-10-30T14:13:36.316222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CRNDCS1TrjLxvLuRcj"]} -{"Format": "IDEA0", "ID": "b0834f9a-04bd-4040-87f2-1a741c9f986d", "DetectTime": "2023-10-30T14:13:36.423522+02:00", "EventTime": "2023-10-30T14:13:36.423537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CPsNoR1flkTv1UWGQh"]} -{"Format": "IDEA0", "ID": "f810b53f-94f9-4c98-a6f6-ceba3b54d227", "DetectTime": "2023-10-30T14:13:36.469075+02:00", "EventTime": "2023-10-30T14:13:36.469092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C7rXOX3345uTdIDqP3"]} -{"Format": "IDEA0", "ID": "5063a0b4-0164-4ec3-9731-4568501a2ce7", "DetectTime": "2023-10-30T14:13:36.505268+02:00", "EventTime": "2023-10-30T14:13:36.505287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRImEr4ikQlgOKsDtd"]} -{"Format": "IDEA0", "ID": "a0c4a48b-94a0-45f9-829e-9e9ab72aa8e9", "DetectTime": "2023-10-30T14:13:36.530745+02:00", "EventTime": "2023-10-30T14:13:36.530762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CpHf8a11aG6IOGJSTl"]} -{"Format": "IDEA0", "ID": "59ee0142-4f7e-471b-9db4-10ebeb611573", "DetectTime": "2023-10-30T14:13:36.567185+02:00", "EventTime": "2023-10-30T14:13:36.567201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ce0LM61JPCJw9AnoJj"]} -{"Format": "Json", "ID": "59ee0142-4f7e-471b-9db4-10ebeb611573", "DetectTime": "2023-10-30T14:13:36.567185+02:00", "EventTime": "2023-10-30T14:13:36.567201+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T15:17:17.866322+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2023/10/30 14:13:36.645754)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "35d065e1-a42a-4e5e-80d7-30d2c7b2cc3d", "DetectTime": "2023-10-30T14:13:36.651532+02:00", "EventTime": "2023-10-30T14:13:36.651547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CkHCAbeqlYLHirNyg"]} -{"Format": "IDEA0", "ID": "a63cd305-76dd-4483-9f5d-b12d986949c9", "DetectTime": "2023-10-30T14:13:36.684946+02:00", "EventTime": "2023-10-30T14:13:36.684960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CrYqVM1GZ7ObiyFuYf"]} -{"Format": "IDEA0", "ID": "7d83a09a-9196-4612-963a-b600d8eedc4f", "DetectTime": "2023-10-30T14:13:36.719519+02:00", "EventTime": "2023-10-30T14:13:36.719535+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CYyVmp20DCMq6Df0n2"]} -{"Format": "IDEA0", "ID": "cf9593ed-191e-43f4-a527-d5bc0345017f", "DetectTime": "2023-10-30T14:13:36.752412+02:00", "EventTime": "2023-10-30T14:13:36.752428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CHCH5y4uHY4fOufvLc"]} -{"Format": "IDEA0", "ID": "1fefb9e4-234a-4fb3-9157-b7530aeebc01", "DetectTime": "2023-10-30T14:13:36.781488+02:00", "EventTime": "2023-10-30T14:13:36.781517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CNNcO62i2lAnbiH5Q4"]} -{"Format": "IDEA0", "ID": "bcd6d8a3-1a75-42e5-880a-140f9bdd6c26", "DetectTime": "2023-10-30T14:13:36.814095+02:00", "EventTime": "2023-10-30T14:13:36.814112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["ChOmyO31c5hdeJ3kH1"]} -{"Format": "IDEA0", "ID": "c8d06501-cf34-46d8-957d-00154fc9aee6", "DetectTime": "2023-10-30T14:13:36.844874+02:00", "EventTime": "2023-10-30T14:13:36.844891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CyeVB6nLzC1MtQfj"]} -{"Format": "IDEA0", "ID": "62ac0839-a918-47fd-a047-75b00a7cf533", "DetectTime": "2023-10-30T14:13:36.876745+02:00", "EventTime": "2023-10-30T14:13:36.876761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cemoao2KT6PbighGN8"]} -{"Format": "Json", "ID": "62ac0839-a918-47fd-a047-75b00a7cf533", "DetectTime": "2023-10-30T14:13:36.876745+02:00", "EventTime": "2023-10-30T14:13:36.876761+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T15:17:19.589932+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2023/10/30 14:13:36.952425)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "036a7bfb-fb0d-42b1-8ef4-c158baef8c95", "DetectTime": "2023-10-30T14:13:36.957873+02:00", "EventTime": "2023-10-30T14:13:36.957889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CKiawm1r7TuIUfc4gf"]} -{"Format": "IDEA0", "ID": "e18ba28b-6e8a-434f-bfb8-8532101ef7a1", "DetectTime": "2023-10-30T14:13:36.986244+02:00", "EventTime": "2023-10-30T14:13:36.986262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cz1JIv506qSrlpqf6"]} -{"Format": "IDEA0", "ID": "e1f6a398-934e-4d55-8607-4f14423f3d4c", "DetectTime": "2023-10-30T14:13:37.012788+02:00", "EventTime": "2023-10-30T14:13:37.012802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CpU4uC3RnNgNWlnG15"]} -{"Format": "IDEA0", "ID": "c48934de-faea-41e6-a85a-e756f7ba766b", "DetectTime": "2023-10-30T14:13:37.040756+02:00", "EventTime": "2023-10-30T14:13:37.040770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CJdbeX1rm52VUcenOe"]} -{"Format": "IDEA0", "ID": "d5c2e411-b828-4454-adf0-c8c75ac02f0c", "DetectTime": "2023-10-30T14:13:37.068115+02:00", "EventTime": "2023-10-30T14:13:37.068134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cm8ijv0JG8jQltuj2"]} -{"Format": "IDEA0", "ID": "0e8c9975-8294-4185-9751-87cdd59492fe", "DetectTime": "2023-10-30T14:13:37.098445+02:00", "EventTime": "2023-10-30T14:13:37.098457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CIp4wR1RKS7di9Tdfb"]} -{"Format": "IDEA0", "ID": "3854e84d-08d4-4a9b-8689-ec6001e671ed", "DetectTime": "2023-10-30T14:13:37.125882+02:00", "EventTime": "2023-10-30T14:13:37.125902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cf35iepNTdPgkJFpi"]} -{"Format": "IDEA0", "ID": "9db430fc-d6fb-4874-b441-dddf54429dd3", "DetectTime": "2023-10-30T14:13:37.154019+02:00", "EventTime": "2023-10-30T14:13:37.154042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ClV4t21nHZQ5XV04Ck"]} -{"Format": "Json", "ID": "9db430fc-d6fb-4874-b441-dddf54429dd3", "DetectTime": "2023-10-30T14:13:37.154019+02:00", "EventTime": "2023-10-30T14:13:37.154042+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T15:17:22.894692+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2023/10/30 14:13:37.234631)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31cab856-5140-4a2c-85a6-6adcf4839854", "DetectTime": "2023-10-30T14:13:37.240170+02:00", "EventTime": "2023-10-30T14:13:37.240184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["COpkQi5OBP6x7NT5f"]} -{"Format": "IDEA0", "ID": "decbc8db-8546-4632-981b-f555bd0f13fb", "DetectTime": "2023-10-30T14:13:37.271084+02:00", "EventTime": "2023-10-30T14:13:37.271107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CyKrlb3txuy3a8ns3i"]} -{"Format": "IDEA0", "ID": "3a887b0e-bedc-47c9-99ec-377968f0b2e1", "DetectTime": "2023-10-30T14:13:37.297434+02:00", "EventTime": "2023-10-30T14:13:37.297450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C7Apopq3v5rKo2Zq5"]} -{"Format": "IDEA0", "ID": "9e41a5da-af76-4d84-abf0-1d7183c49a8c", "DetectTime": "2023-10-30T14:13:37.322729+02:00", "EventTime": "2023-10-30T14:13:37.322750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C1f2V11vjXueOnLnRh"]} -{"Format": "IDEA0", "ID": "7b40b200-6de0-4a0c-8f95-be6ebdaaadad", "DetectTime": "2023-10-30T14:13:37.350453+02:00", "EventTime": "2023-10-30T14:13:37.350468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNvKd7mKVikq5SNQ8"]} -{"Format": "IDEA0", "ID": "5d079118-30a8-49a6-b256-a960d4002510", "DetectTime": "2023-10-30T14:13:37.378910+02:00", "EventTime": "2023-10-30T14:13:37.378926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CiFCns26YyA42mye99"]} -{"Format": "IDEA0", "ID": "10673fd9-747d-4b62-b18f-08af50502df5", "DetectTime": "2023-10-30T14:13:37.406163+02:00", "EventTime": "2023-10-30T14:13:37.406181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C3N8rWM42FbbliYsg"]} -{"Format": "IDEA0", "ID": "ce5210b0-2739-47da-a782-6eaae4d64372", "DetectTime": "2023-10-30T14:13:37.431040+02:00", "EventTime": "2023-10-30T14:13:37.431067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CT8zGS17fpSaWodPM1"]} -{"Format": "IDEA0", "ID": "ddfb3d0c-c367-46ec-bd11-49f17930ec83", "DetectTime": "2023-10-30T14:13:37.457706+02:00", "EventTime": "2023-10-30T14:13:37.457725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CQyK7K1WHRcJXbKu3b"]} -{"Format": "Json", "ID": "ddfb3d0c-c367-46ec-bd11-49f17930ec83", "DetectTime": "2023-10-30T14:13:37.457706+02:00", "EventTime": "2023-10-30T14:13:37.457725+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T15:47:51.592156+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2023/10/30 14:13:37.532927)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "769ef3c6-7965-449d-8111-dad7962339aa", "DetectTime": "2023-10-30T14:13:37.538468+02:00", "EventTime": "2023-10-30T14:13:37.538493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CyQdh5YAMZKMsVhX1"]} -{"Format": "IDEA0", "ID": "284fbe4c-4337-435d-8aec-8cac70696168", "DetectTime": "2023-10-30T14:13:37.567038+02:00", "EventTime": "2023-10-30T14:13:37.567055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["COcCkn2lybEMfNSre9"]} -{"Format": "IDEA0", "ID": "22ab3d11-30f6-49d9-87ac-096f5ec6c9e0", "DetectTime": "2023-10-30T14:13:37.593192+02:00", "EventTime": "2023-10-30T14:13:37.593205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CDRwpO1UjIycDsNqF4"]} -{"Format": "IDEA0", "ID": "6117977b-e7f8-43e0-a12c-4ed721657aee", "DetectTime": "2023-10-30T14:13:37.616349+02:00", "EventTime": "2023-10-30T14:13:37.616361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CfbN8c2mUwwjxOo4o4"]} -{"Format": "IDEA0", "ID": "d46c5edd-2029-471a-a9d8-37bc0e3b9dca", "DetectTime": "2023-10-30T14:13:37.639471+02:00", "EventTime": "2023-10-30T14:13:37.639493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Car6VZIjN3yUJrPj2"]} -{"Format": "IDEA0", "ID": "18a4620f-7262-4fa2-bddf-dc841a5d01be", "DetectTime": "2023-10-30T14:13:37.661697+02:00", "EventTime": "2023-10-30T14:13:37.661711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cwnbht4GESLE2oBwx8"]} -{"Format": "IDEA0", "ID": "07fe1dfb-6eed-4223-b368-a8baac10f410", "DetectTime": "2023-10-30T14:13:37.686305+02:00", "EventTime": "2023-10-30T14:13:37.686335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CBx3Mn2sbJiPEAyv22"]} -{"Format": "IDEA0", "ID": "e75b7be3-cf4a-471d-8f00-f6acbd2b0416", "DetectTime": "2023-10-30T14:13:37.711144+02:00", "EventTime": "2023-10-30T14:13:37.711156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["COO50H3zDXzF7yjYm8"]} -{"Format": "IDEA0", "ID": "59359b41-43d9-4205-b32a-e52c0ba63572", "DetectTime": "2023-10-30T14:13:37.731844+02:00", "EventTime": "2023-10-30T14:13:37.731856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CBX1WM2mvsKp0bPly8"]} -{"Format": "Json", "ID": "59359b41-43d9-4205-b32a-e52c0ba63572", "DetectTime": "2023-10-30T14:13:37.731844+02:00", "EventTime": "2023-10-30T14:13:37.731856+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T15:47:54.885340+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2023/10/30 14:13:37.799591)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ed89d18d-76a0-46b5-b788-784ece56dbcc", "DetectTime": "2023-10-30T14:13:37.804403+02:00", "EventTime": "2023-10-30T14:13:37.804420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C67gJd8O00IuEuD6i"]} -{"Format": "IDEA0", "ID": "ed55aa15-e6f2-479d-b714-e9b1fab949bd", "DetectTime": "2023-10-30T14:13:37.828131+02:00", "EventTime": "2023-10-30T14:13:37.828144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CALI7Z1UiYXFeJF7d8"]} -{"Format": "IDEA0", "ID": "17e1e352-36f9-45fe-9abb-aebd6182e422", "DetectTime": "2023-10-30T14:13:37.849675+02:00", "EventTime": "2023-10-30T14:13:37.849689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C1d5W23YXUSoGUXW16"]} -{"Format": "IDEA0", "ID": "3177e4a8-ba5d-4c55-ada6-2d4470dd75a8", "DetectTime": "2023-10-30T14:13:37.869160+02:00", "EventTime": "2023-10-30T14:13:37.869176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cjnv3u3un1KnKTYi09"]} -{"Format": "IDEA0", "ID": "babc4dec-a84a-4c6c-8ebf-c376a9657bac", "DetectTime": "2023-10-30T14:13:37.888105+02:00", "EventTime": "2023-10-30T14:13:37.888117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CMS638MYmktgAF4Te"]} -{"Format": "IDEA0", "ID": "fa190137-8a19-40c9-b4a8-bb485ff8a904", "DetectTime": "2023-10-30T14:13:37.908538+02:00", "EventTime": "2023-10-30T14:13:37.908561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CEWJF53mYNx8xFfy3j"]} -{"Format": "IDEA0", "ID": "2f752021-6dd5-4700-88c2-a4991a604b60", "DetectTime": "2023-10-30T14:13:37.932101+02:00", "EventTime": "2023-10-30T14:13:37.932129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CcL3fS3zobVJtZKor2"]} -{"Format": "IDEA0", "ID": "826eb316-d1c5-4c61-8990-3e5d001f86ae", "DetectTime": "2023-10-30T14:13:37.951612+02:00", "EventTime": "2023-10-30T14:13:37.951631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["COUAui4Fs5gxW0i9w4"]} -{"Format": "Json", "ID": "826eb316-d1c5-4c61-8990-3e5d001f86ae", "DetectTime": "2023-10-30T14:13:37.951612+02:00", "EventTime": "2023-10-30T14:13:37.951631+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T15:47:59.095893+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2023/10/30 14:13:38.014883)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7b41650f-a255-45b6-b61e-ab9bb46007df", "DetectTime": "2023-10-30T14:13:38.020121+02:00", "EventTime": "2023-10-30T14:13:38.020140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C7CAgR3qc6wr1zUB45"]} -{"Format": "IDEA0", "ID": "e1876ccf-688d-41dd-98ee-af37d4b994cd", "DetectTime": "2023-10-30T14:13:38.040060+02:00", "EventTime": "2023-10-30T14:13:38.040080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CvcGGW11IHB1OWwy4l"]} -{"Format": "IDEA0", "ID": "df90c423-0f4c-4a22-9eff-e164dd9e8e70", "DetectTime": "2023-10-30T14:13:38.057439+02:00", "EventTime": "2023-10-30T14:13:38.057457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CrMlY9TNbpwu6VAhc"]} -{"Format": "IDEA0", "ID": "026f0b5e-4440-4585-82e0-3182db4c82e5", "DetectTime": "2023-10-30T14:13:38.077636+02:00", "EventTime": "2023-10-30T14:13:38.077652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C2cHYjqHnZcvUNFz"]} -{"Format": "IDEA0", "ID": "6038816c-7a81-4713-843b-f2214abb54fe", "DetectTime": "2023-10-30T14:13:38.096466+02:00", "EventTime": "2023-10-30T14:13:38.096482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CQefEL1qcDbfcqAQia"]} -{"Format": "IDEA0", "ID": "3e1c3e3a-f58b-4a1e-b426-4106144209df", "DetectTime": "2023-10-30T14:13:38.117690+02:00", "EventTime": "2023-10-30T14:13:38.117705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C1zAxm2PvtIVDEa7q5"]} -{"Format": "IDEA0", "ID": "b6651727-ad7a-43f4-af13-d7155ced600c", "DetectTime": "2023-10-30T14:13:38.135043+02:00", "EventTime": "2023-10-30T14:13:38.135056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cb0mkF4B0pOANk9pB9"]} -{"Format": "IDEA0", "ID": "e06bb288-4813-4f15-8ca8-20cfbbdf53d9", "DetectTime": "2023-10-30T14:13:38.151779+02:00", "EventTime": "2023-10-30T14:13:38.151795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwIO5L3ylxItZ5aDIe"]} -{"Format": "IDEA0", "ID": "6490a2ab-243a-4759-ac76-891f922f79c7", "DetectTime": "2023-10-30T14:13:38.182332+02:00", "EventTime": "2023-10-30T14:13:38.182342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7316], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 7316/TCP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CKkUQf1kus2tYTajof"]} -{"Format": "IDEA0", "ID": "a09f4794-faeb-45b4-a027-599afdd0a781", "DetectTime": "2023-10-30T14:13:38.216195+02:00", "EventTime": "2023-10-30T14:13:38.216210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CGnNPI3bausrQBTOu8"]} -{"Format": "IDEA0", "ID": "31efaa44-d312-44ad-b43b-c7458f6ac340", "DetectTime": "2023-10-30T14:13:38.250723+02:00", "EventTime": "2023-10-30T14:13:38.250739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CBP7gK3z0loe0nFEL4"]} -{"Format": "IDEA0", "ID": "de1675f2-7ff5-4dd5-9770-bf2c429f45fd", "DetectTime": "2023-10-30T14:13:38.283536+02:00", "EventTime": "2023-10-30T14:13:38.283549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CRx2lZ1IzESgQmRro9"]} -{"Format": "IDEA0", "ID": "cabfb831-c372-4c3b-9edd-036640943f1a", "DetectTime": "2023-10-30T14:13:38.315467+02:00", "EventTime": "2023-10-30T14:13:38.315484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CvFmNlKVzPf1iZxpk"]} -{"Format": "IDEA0", "ID": "ce62660a-6e90-49f3-8588-cee557b88675", "DetectTime": "2023-10-30T14:13:38.349608+02:00", "EventTime": "2023-10-30T14:13:38.349619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CMISp61FenrXEPXSQj"]} -{"Format": "IDEA0", "ID": "b536c7b2-2343-4014-8899-bc7ba1724e0c", "DetectTime": "2023-10-30T14:13:38.381867+02:00", "EventTime": "2023-10-30T14:13:38.381879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CAbzGd2tM1773ad5Y5"]} -{"Format": "Json", "ID": "b536c7b2-2343-4014-8899-bc7ba1724e0c", "DetectTime": "2023-10-30T14:13:38.381867+02:00", "EventTime": "2023-10-30T14:13:38.381879+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T16:18:36.631403+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2023/10/30 14:13:38.456525)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ade26333-b103-4b64-be52-8d6b78bb4568", "DetectTime": "2023-10-30T14:13:38.461857+02:00", "EventTime": "2023-10-30T14:13:38.461868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CcvDA01e72txUVQVBj"]} -{"Format": "IDEA0", "ID": "40fd5351-a19e-47b6-a4a1-ce8132b77f17", "DetectTime": "2023-10-30T14:13:38.494180+02:00", "EventTime": "2023-10-30T14:13:38.494196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CTrwTY3iIwJslHLDVh"]} -{"Format": "IDEA0", "ID": "7e9a0aa7-0ef4-420c-b132-f946a721c05a", "DetectTime": "2023-10-30T14:13:38.525556+02:00", "EventTime": "2023-10-30T14:13:38.525572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CQowbY1RUa9chfVV7"]} -{"Format": "IDEA0", "ID": "9b9be5bc-cff5-4cf4-949d-473b804c6db2", "DetectTime": "2023-10-30T14:13:38.554850+02:00", "EventTime": "2023-10-30T14:13:38.554867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CHMKQL25wO5zavmDwi"]} -{"Format": "IDEA0", "ID": "6ca671b1-1d35-437b-b45f-ba87e20c780a", "DetectTime": "2023-10-30T14:13:38.583328+02:00", "EventTime": "2023-10-30T14:13:38.583338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Clje2V251Ws22y1mCl"]} -{"Format": "IDEA0", "ID": "4e81367e-54db-43f8-bc44-2ff7de233b08", "DetectTime": "2023-10-30T14:13:38.611391+02:00", "EventTime": "2023-10-30T14:13:38.611407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C7t0ik2XERTMBoFYL9"]} -{"Format": "IDEA0", "ID": "458475a0-979e-4c65-8cf8-f961edbb14c7", "DetectTime": "2023-10-30T14:13:38.634396+02:00", "EventTime": "2023-10-30T14:13:38.634411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CDCHjF3P4jemcLwu17"]} -{"Format": "IDEA0", "ID": "ebc8f5b2-a53e-4e04-8b5d-81772632b36f", "DetectTime": "2023-10-30T14:13:38.666046+02:00", "EventTime": "2023-10-30T14:13:38.666063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CgIhPN4r3U16z39Di"]} -{"Format": "IDEA0", "ID": "de1be9f4-1e42-4d03-988a-f55458129781", "DetectTime": "2023-10-30T14:13:38.696480+02:00", "EventTime": "2023-10-30T14:13:38.696494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CoXc0H3YLdyk7b9o5"]} -{"Format": "Json", "ID": "de1be9f4-1e42-4d03-988a-f55458129781", "DetectTime": "2023-10-30T14:13:38.696480+02:00", "EventTime": "2023-10-30T14:13:38.696494+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T16:18:38.220547+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2023/10/30 14:13:38.767129)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7ae2a4da-c474-4327-bdb1-a65a813b7c3a", "DetectTime": "2023-10-30T14:13:38.772381+02:00", "EventTime": "2023-10-30T14:13:38.772396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CRLiOv3ZeM2au4Tse3"]} -{"Format": "IDEA0", "ID": "00389a46-1cbc-4bdf-a007-383612374c02", "DetectTime": "2023-10-30T14:13:38.802642+02:00", "EventTime": "2023-10-30T14:13:38.802661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CWr9924D98hSDCnjVl"]} -{"Format": "IDEA0", "ID": "d8c92e3e-196c-4d1a-8f74-1d7d4949a15d", "DetectTime": "2023-10-30T14:13:38.832513+02:00", "EventTime": "2023-10-30T14:13:38.832530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cni7DG2rbESj7yKqte"]} -{"Format": "IDEA0", "ID": "367af199-c10f-4eb2-846d-83b329e2bf92", "DetectTime": "2023-10-30T14:13:38.861403+02:00", "EventTime": "2023-10-30T14:13:38.861419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CRowJJ3SS9WySSuRI6"]} -{"Format": "IDEA0", "ID": "b8da7379-274b-43d6-a32f-21020ae444f7", "DetectTime": "2023-10-30T14:13:38.889855+02:00", "EventTime": "2023-10-30T14:13:38.889871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CdQq5zAK4auXCkVi"]} -{"Format": "IDEA0", "ID": "eaad6c58-91ec-4d26-81a3-03454cfd5e8c", "DetectTime": "2023-10-30T14:13:38.921059+02:00", "EventTime": "2023-10-30T14:13:38.921081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CAnrJS2v75rMFFi5vf"]} -{"Format": "IDEA0", "ID": "6612e625-efd7-416e-8b34-753a850a0a14", "DetectTime": "2023-10-30T14:13:38.946874+02:00", "EventTime": "2023-10-30T14:13:38.946895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CwCub9xvbqAoTXhHi"]} -{"Format": "IDEA0", "ID": "e5e796ac-f470-4731-80f7-4d2a8cce2d8b", "DetectTime": "2023-10-30T14:13:38.976485+02:00", "EventTime": "2023-10-30T14:13:38.976496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CeY1FR2nePtP7nKpf5"]} -{"Format": "IDEA0", "ID": "634fe958-0e78-48ca-a8ac-f7d457001f4e", "DetectTime": "2023-10-30T14:13:39.005415+02:00", "EventTime": "2023-10-30T14:13:39.005431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C3qw5Hf0SmTctAp2"]} -{"Format": "Json", "ID": "634fe958-0e78-48ca-a8ac-f7d457001f4e", "DetectTime": "2023-10-30T14:13:39.005415+02:00", "EventTime": "2023-10-30T14:13:39.005431+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T16:18:40.138985+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2023/10/30 14:13:39.084202)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0e10ec00-5224-49ce-9ba5-ff3252e1c22c", "DetectTime": "2023-10-30T14:13:39.088722+02:00", "EventTime": "2023-10-30T14:13:39.088749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CO34C520ytg3UV0zi2"]} -{"Format": "IDEA0", "ID": "6361ebde-77eb-4d1b-86ec-f54476906998", "DetectTime": "2023-10-30T14:13:39.115505+02:00", "EventTime": "2023-10-30T14:13:39.115517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C59hrc16bSYPsXvoad"]} -{"Format": "IDEA0", "ID": "be251f8a-7e2d-47c8-b5e7-e9a6d70404c7", "DetectTime": "2023-10-30T14:13:39.142549+02:00", "EventTime": "2023-10-30T14:13:39.142565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CtdM9g4P3rFthCn22e"]} -{"Format": "IDEA0", "ID": "dfd419ae-ef18-4ecd-8920-401726565ece", "DetectTime": "2023-10-30T14:13:39.169384+02:00", "EventTime": "2023-10-30T14:13:39.169403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcAaDI3kvPiMDaxqMe"]} -{"Format": "IDEA0", "ID": "a710d1dd-3b86-47c8-ab45-31a5b5eb585d", "DetectTime": "2023-10-30T14:13:39.196343+02:00", "EventTime": "2023-10-30T14:13:39.196358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CMXgRJ24yRBp4B4Voj"]} -{"Format": "IDEA0", "ID": "86336e73-e369-46ce-adb6-f8c82b145566", "DetectTime": "2023-10-30T14:13:39.223891+02:00", "EventTime": "2023-10-30T14:13:39.223917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CpvdEs1DKyNnj20VSd"]} -{"Format": "IDEA0", "ID": "512d8d0f-f8a3-4f23-ad7e-61109819b590", "DetectTime": "2023-10-30T14:13:39.248214+02:00", "EventTime": "2023-10-30T14:13:39.248224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CJN3Pn2LnaIGEG1rY9"]} -{"Format": "IDEA0", "ID": "ceb15ad3-b322-4a41-8c44-499c8d3c16b7", "DetectTime": "2023-10-30T14:13:39.276264+02:00", "EventTime": "2023-10-30T14:13:39.276290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CvdD1w34ObKZFypa7f"]} -{"Format": "Json", "ID": "ceb15ad3-b322-4a41-8c44-499c8d3c16b7", "DetectTime": "2023-10-30T14:13:39.276264+02:00", "EventTime": "2023-10-30T14:13:39.276290+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T16:49:29.518945+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2023/10/30 14:13:39.345708)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e651815f-346d-4228-bf0b-6bd80500dde7", "DetectTime": "2023-10-30T14:13:39.351166+02:00", "EventTime": "2023-10-30T14:13:39.351185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C7qjvu1AiOYouOGiDd"]} -{"Format": "IDEA0", "ID": "4199e71a-8827-4135-8dbe-ac39d8665294", "DetectTime": "2023-10-30T14:13:39.376695+02:00", "EventTime": "2023-10-30T14:13:39.376711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CmxOCL8CVuJrLJtca"]} -{"Format": "IDEA0", "ID": "e9965b4d-9e92-4d77-8d70-ad895cef807f", "DetectTime": "2023-10-30T14:13:39.402730+02:00", "EventTime": "2023-10-30T14:13:39.402740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C0dhrl11pO2Gt8dms5"]} -{"Format": "IDEA0", "ID": "dfa42c1b-3181-4cf8-bb12-2d8e1961db35", "DetectTime": "2023-10-30T14:13:39.428606+02:00", "EventTime": "2023-10-30T14:13:39.428622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cx4ckm2kMSWyMcFDB"]} -{"Format": "IDEA0", "ID": "e6627983-2839-4245-8e7f-8f51cda266ec", "DetectTime": "2023-10-30T14:13:39.452578+02:00", "EventTime": "2023-10-30T14:13:39.452596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CtUhiGgnAT6NgGJu5"]} -{"Format": "IDEA0", "ID": "9c24650b-a6db-4113-8e50-a524f490705a", "DetectTime": "2023-10-30T14:13:39.474904+02:00", "EventTime": "2023-10-30T14:13:39.474916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C8Ou4G2CmtdNK6cs4a"]} -{"Format": "IDEA0", "ID": "92817641-444a-488c-a6d8-19157c1306db", "DetectTime": "2023-10-30T14:13:39.501969+02:00", "EventTime": "2023-10-30T14:13:39.501984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CySy5t2bX3x3XcTsI3"]} -{"Format": "IDEA0", "ID": "ae0874d9-93cc-45ec-b2cd-6d363556bad8", "DetectTime": "2023-10-30T14:13:39.528664+02:00", "EventTime": "2023-10-30T14:13:39.528674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CXyB1n1838Se7k17Kl"]} -{"Format": "IDEA0", "ID": "bd840126-c50f-4d34-be65-789f3fe90ca2", "DetectTime": "2023-10-30T14:13:39.549636+02:00", "EventTime": "2023-10-30T14:13:39.549649+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CLyBsQraDjqYVcnjk"]} -{"Format": "IDEA0", "ID": "8a362418-10ee-4330-9eda-f494be046242", "DetectTime": "2023-10-30T14:13:39.573238+02:00", "EventTime": "2023-10-30T14:13:39.573249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CIoLm3LJmWrbdp557"]} -{"Format": "Json", "ID": "8a362418-10ee-4330-9eda-f494be046242", "DetectTime": "2023-10-30T14:13:39.573238+02:00", "EventTime": "2023-10-30T14:13:39.573249+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T16:49:31.248869+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2023/10/30 14:13:39.639624)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0abd447e-004e-4787-b2bd-2c247a29b0c2", "DetectTime": "2023-10-30T14:13:39.645282+02:00", "EventTime": "2023-10-30T14:13:39.645300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CtlYgD2i07e25pxH04"]} -{"Format": "IDEA0", "ID": "ec117719-c58a-4e00-9e8b-09192e36813c", "DetectTime": "2023-10-30T14:13:39.668180+02:00", "EventTime": "2023-10-30T14:13:39.668195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CGzlIN34kM6UosDlIc"]} -{"Format": "IDEA0", "ID": "113e7962-d3e4-404a-befe-90544b24d078", "DetectTime": "2023-10-30T14:13:39.688976+02:00", "EventTime": "2023-10-30T14:13:39.688991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C0gJ4m4WllyrQRgBQl"]} -{"Format": "IDEA0", "ID": "e8ff6826-603d-4df0-af9b-fdc7b27a8c55", "DetectTime": "2023-10-30T14:13:39.709565+02:00", "EventTime": "2023-10-30T14:13:39.709581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CWr5f74eHnoYafuUY5"]} -{"Format": "IDEA0", "ID": "214dba31-8712-4102-82d4-d9acdcd98ee7", "DetectTime": "2023-10-30T14:13:39.732748+02:00", "EventTime": "2023-10-30T14:13:39.732764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CZCyZ43PFvIt0qGUfi"]} -{"Format": "IDEA0", "ID": "9dad249c-11ab-4692-bdea-6463b3a71be0", "DetectTime": "2023-10-30T14:13:39.752385+02:00", "EventTime": "2023-10-30T14:13:39.752396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CBVITCTckY4KaRrK6"]} -{"Format": "IDEA0", "ID": "4521e134-7e45-48fe-a6b9-e0931d6726d4", "DetectTime": "2023-10-30T14:13:39.771489+02:00", "EventTime": "2023-10-30T14:13:39.771506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CwyrdL2Z1uLiADaMWd"]} -{"Format": "IDEA0", "ID": "f7b3871c-e6c6-420d-a8a3-c8ff3d765459", "DetectTime": "2023-10-30T14:13:39.792660+02:00", "EventTime": "2023-10-30T14:13:39.792684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CzZG9A3QIaDpY5he37"]} -{"Format": "Json", "ID": "f7b3871c-e6c6-420d-a8a3-c8ff3d765459", "DetectTime": "2023-10-30T14:13:39.792660+02:00", "EventTime": "2023-10-30T14:13:39.792684+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T16:49:33.149930+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2023/10/30 14:13:39.856622)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aea7c719-ecb4-4dfe-b974-6d413f9c105e", "DetectTime": "2023-10-30T14:13:39.861363+02:00", "EventTime": "2023-10-30T14:13:39.861379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["COTSl644epEFaryEF1"]} -{"Format": "IDEA0", "ID": "57b72481-a651-49cb-9f2e-db9ba88c6514", "DetectTime": "2023-10-30T14:13:39.883765+02:00", "EventTime": "2023-10-30T14:13:39.883776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CZkEkh37txVE7jZoT1"]} -{"Format": "IDEA0", "ID": "6c9c0ab0-8a11-4dc1-8dbd-77946b38e0f4", "DetectTime": "2023-10-30T14:13:39.905702+02:00", "EventTime": "2023-10-30T14:13:39.905718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C3MKaz1bIVKbqoyQtk"]} -{"Format": "IDEA0", "ID": "8d558d64-0912-4252-9400-098e8663432f", "DetectTime": "2023-10-30T14:13:39.924648+02:00", "EventTime": "2023-10-30T14:13:39.924666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKl45N1ZV3XxWQp8b3"]} -{"Format": "IDEA0", "ID": "8df68243-5e9b-4a9e-b82f-3b95f5faa9e4", "DetectTime": "2023-10-30T14:13:39.943211+02:00", "EventTime": "2023-10-30T14:13:39.943222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cvttdi442vFXv2btvg"]} -{"Format": "IDEA0", "ID": "007af901-cc0a-4d63-bb31-c66bb6e7e553", "DetectTime": "2023-10-30T14:13:39.959643+02:00", "EventTime": "2023-10-30T14:13:39.959654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CsrPlbzyMCJZNeF08"]} -{"Format": "IDEA0", "ID": "e3d57c77-481a-4f5f-9a49-856a323100e1", "DetectTime": "2023-10-30T14:13:39.978688+02:00", "EventTime": "2023-10-30T14:13:39.978700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CacTst2pebQQRKjQo8"]} -{"Format": "IDEA0", "ID": "219423e9-a552-40cf-8a61-9bd3bece0435", "DetectTime": "2023-10-30T14:13:39.997675+02:00", "EventTime": "2023-10-30T14:13:39.997701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFme9f4Sj4l5IcGVtb"]} -{"Format": "IDEA0", "ID": "494d2a51-46df-471f-9e02-ccd0d6882a3e", "DetectTime": "2023-10-30T14:13:40.033376+02:00", "EventTime": "2023-10-30T14:13:40.033390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C5tEju3ApK9SkKHZha"]} -{"Format": "IDEA0", "ID": "4488105c-a98f-4286-bc8e-5324a9935b92", "DetectTime": "2023-10-30T14:13:40.055155+02:00", "EventTime": "2023-10-30T14:13:40.055173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CW68rk4OvTt78JLlQf"]} -{"Format": "IDEA0", "ID": "cc648199-ddde-456e-bd32-5a4a8de379a8", "DetectTime": "2023-10-30T14:13:40.084778+02:00", "EventTime": "2023-10-30T14:13:40.084790+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C1I2os3fOvlcgjWZpk"]} -{"Format": "IDEA0", "ID": "cc664a5d-9a2e-4d18-a757-d22cf427228a", "DetectTime": "2023-10-30T14:13:40.116595+02:00", "EventTime": "2023-10-30T14:13:40.116610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CeyOEK1t75CQKOWBwg"]} -{"Format": "IDEA0", "ID": "f551ba66-3147-455d-82a6-1d75dbc3a20c", "DetectTime": "2023-10-30T14:13:40.149439+02:00", "EventTime": "2023-10-30T14:13:40.149454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cr4mrL1VOsC8JKxSS8"]} -{"Format": "IDEA0", "ID": "1bf53553-212b-4949-a8e6-67d0e29f05c5", "DetectTime": "2023-10-30T14:13:40.183778+02:00", "EventTime": "2023-10-30T14:13:40.183792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CWZr9vLGzRpLSuiJe"]} -{"Format": "IDEA0", "ID": "f44b58ab-cd33-4b73-a9d8-04f10856225a", "DetectTime": "2023-10-30T14:13:40.215431+02:00", "EventTime": "2023-10-30T14:13:40.215449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CnJqPh24NLMhTgHt8"]} -{"Format": "IDEA0", "ID": "9c7a7864-4230-42f6-b916-41f39f2b5db0", "DetectTime": "2023-10-30T14:13:40.246985+02:00", "EventTime": "2023-10-30T14:13:40.247004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CzBZe41h9TdUqI8wh6"]} -{"Format": "Json", "ID": "9c7a7864-4230-42f6-b916-41f39f2b5db0", "DetectTime": "2023-10-30T14:13:40.246985+02:00", "EventTime": "2023-10-30T14:13:40.247004+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T17:19:37.968514+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 208. (real time 2023/10/30 14:13:40.392980)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e8b771db-d6bc-4767-a366-c927423a8aaf", "DetectTime": "2023-10-30T14:13:40.398792+02:00", "EventTime": "2023-10-30T14:13:40.398812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CgeuYYbarxtma4Y4"]} -{"Format": "IDEA0", "ID": "5c87295a-47e6-453a-bb6a-e65c6485dcc0", "DetectTime": "2023-10-30T14:13:40.440492+02:00", "EventTime": "2023-10-30T14:13:40.440504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CC8lep1YKysiJj2JW3"]} -{"Format": "IDEA0", "ID": "11a33c82-0a11-4323-89b5-da33822c0a93", "DetectTime": "2023-10-30T14:13:40.474865+02:00", "EventTime": "2023-10-30T14:13:40.474883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CLMk7x1ZIVkXQfdMij"]} -{"Format": "IDEA0", "ID": "3a33f194-cc7b-49a8-8e4f-3a5d56675fae", "DetectTime": "2023-10-30T14:13:40.501428+02:00", "EventTime": "2023-10-30T14:13:40.501444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CrOkgc4ZySWZG2XmDi"]} -{"Format": "IDEA0", "ID": "5b222faa-4389-45eb-966a-566a9155a7ed", "DetectTime": "2023-10-30T14:13:40.535079+02:00", "EventTime": "2023-10-30T14:13:40.535099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CAmYpK2MnJpQD1NVTi"]} -{"Format": "IDEA0", "ID": "c3258e88-d3a6-452d-8614-ceee6a0eff73", "DetectTime": "2023-10-30T14:13:40.569296+02:00", "EventTime": "2023-10-30T14:13:40.569315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CgFNQ14IffjXWE9CQi"]} -{"Format": "IDEA0", "ID": "f73a0079-da80-45d5-b801-464136dd147f", "DetectTime": "2023-10-30T14:13:40.606268+02:00", "EventTime": "2023-10-30T14:13:40.606288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CGvb5u4KgMAgeee2Tk"]} -{"Format": "IDEA0", "ID": "b7b191c8-2a05-4546-8e1e-fe0d92772058", "DetectTime": "2023-10-30T14:13:40.639956+02:00", "EventTime": "2023-10-30T14:13:40.639968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cr6Vvi2H3ptTsDQt83"]} -{"Format": "IDEA0", "ID": "779be3b8-1843-494f-8b8e-170c229bf4c2", "DetectTime": "2023-10-30T14:13:40.675476+02:00", "EventTime": "2023-10-30T14:13:40.675493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CjxAkp4VunjT10dLsf"]} -{"Format": "Json", "ID": "779be3b8-1843-494f-8b8e-170c229bf4c2", "DetectTime": "2023-10-30T14:13:40.675476+02:00", "EventTime": "2023-10-30T14:13:40.675493+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T17:19:39.769927+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 208. (real time 2023/10/30 14:13:40.756152)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fc397a8a-f55f-46e7-80f2-4f2605cea60f", "DetectTime": "2023-10-30T14:13:40.761653+02:00", "EventTime": "2023-10-30T14:13:40.761668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CkM0a61PD4ICFif2L7"]} -{"Format": "IDEA0", "ID": "0f232d6a-7213-4767-93c1-276ea1ba35c6", "DetectTime": "2023-10-30T14:13:40.794049+02:00", "EventTime": "2023-10-30T14:13:40.794066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CHg1bV17PbyJ9lkFw5"]} -{"Format": "IDEA0", "ID": "6dd3b76d-fe17-4077-974f-7ff29642a2bd", "DetectTime": "2023-10-30T14:13:40.825448+02:00", "EventTime": "2023-10-30T14:13:40.825459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CIXIxA3VFwE2KCRup3"]} -{"Format": "IDEA0", "ID": "fc4316f9-a392-43f1-a460-e28f15d19bef", "DetectTime": "2023-10-30T14:13:40.855290+02:00", "EventTime": "2023-10-30T14:13:40.855307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CenD4K2vXZCmxXbQYh"]} -{"Format": "IDEA0", "ID": "911b7cac-5557-47f4-a469-c1eab5687a17", "DetectTime": "2023-10-30T14:13:40.887483+02:00", "EventTime": "2023-10-30T14:13:40.887502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CM4Vmj4gSCpkHSJhXe"]} -{"Format": "IDEA0", "ID": "6b96fd77-d367-431a-bc18-20b613f9d64b", "DetectTime": "2023-10-30T14:13:40.920101+02:00", "EventTime": "2023-10-30T14:13:40.920128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CDsZux2MjZIZVvMBtg"]} -{"Format": "IDEA0", "ID": "0a307cd7-aa05-41b9-b7a0-f39ea1476955", "DetectTime": "2023-10-30T14:13:40.953825+02:00", "EventTime": "2023-10-30T14:13:40.953847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CSMYAkSMmqiBe7Ydh"]} -{"Format": "IDEA0", "ID": "227a8d2c-520b-499c-b6e2-3eaed55726fc", "DetectTime": "2023-10-30T14:13:40.977320+02:00", "EventTime": "2023-10-30T14:13:40.977333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cy4okB2dCiBCy0OsGa"]} -{"Format": "IDEA0", "ID": "e08f18bb-3961-41af-b3b4-7017befaa369", "DetectTime": "2023-10-30T14:13:41.009367+02:00", "EventTime": "2023-10-30T14:13:41.009381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CEFwef3x0QiE0Xzy94"]} -{"Format": "Json", "ID": "e08f18bb-3961-41af-b3b4-7017befaa369", "DetectTime": "2023-10-30T14:13:41.009367+02:00", "EventTime": "2023-10-30T14:13:41.009381+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T17:19:57.014755+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 208. (real time 2023/10/30 14:13:41.083287)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6049e422-c37a-443a-bc59-9def23e60fbb", "DetectTime": "2023-10-30T14:13:41.089521+02:00", "EventTime": "2023-10-30T14:13:41.089542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CfvWL81700bHYZr4C1"]} -{"Format": "IDEA0", "ID": "f154b05d-daa2-422d-a145-78e8210244ae", "DetectTime": "2023-10-30T14:13:41.120173+02:00", "EventTime": "2023-10-30T14:13:41.120190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CS6UJV2HNYq0YNlSxa"]} -{"Format": "IDEA0", "ID": "37be56cb-ea1a-4b14-8a43-f7442c7036cb", "DetectTime": "2023-10-30T14:13:41.149683+02:00", "EventTime": "2023-10-30T14:13:41.149694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoG7QJ3TS8UdxoYrT4"]} -{"Format": "IDEA0", "ID": "959ee8ff-146a-40e1-9733-dd3982f35d51", "DetectTime": "2023-10-30T14:13:41.181077+02:00", "EventTime": "2023-10-30T14:13:41.181092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CM96Fs1V9CZuBsl5sb"]} -{"Format": "IDEA0", "ID": "b6a100e7-ad73-4d34-acbf-70b523db4141", "DetectTime": "2023-10-30T14:13:41.202099+02:00", "EventTime": "2023-10-30T14:13:41.202109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CBKxMtgqtij6nZrml"]} -{"Format": "IDEA0", "ID": "7ceb39f0-8e61-45e0-b268-26db0497ecc2", "DetectTime": "2023-10-30T14:13:41.229548+02:00", "EventTime": "2023-10-30T14:13:41.229562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CUOCm4ltPCyPjdrAj"]} -{"Format": "IDEA0", "ID": "63934310-9698-4782-bb7b-5f3c6944738e", "DetectTime": "2023-10-30T14:13:41.258928+02:00", "EventTime": "2023-10-30T14:13:41.258947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CAWLYQ2wfBYmgYNMKa"]} -{"Format": "IDEA0", "ID": "2ca81836-4a4b-4459-a882-e586c0fd03ca", "DetectTime": "2023-10-30T14:13:41.288178+02:00", "EventTime": "2023-10-30T14:13:41.288194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CGfNuG4FdJPIBB5ank"]} -{"Format": "IDEA0", "ID": "186ab08f-bb95-471b-8193-affc6e15d58a", "DetectTime": "2023-10-30T14:13:41.314016+02:00", "EventTime": "2023-10-30T14:13:41.314028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CgY6k74qsTzeeTcSv2"]} -{"Format": "Json", "ID": "186ab08f-bb95-471b-8193-affc6e15d58a", "DetectTime": "2023-10-30T14:13:41.314016+02:00", "EventTime": "2023-10-30T14:13:41.314028+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T17:49:57.801071+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 208. (real time 2023/10/30 14:13:41.384681)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f2628fbc-6313-4a3d-a748-3a3eebc54587", "DetectTime": "2023-10-30T14:13:41.390023+02:00", "EventTime": "2023-10-30T14:13:41.390043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Chds473JfK64rTDski"]} -{"Format": "IDEA0", "ID": "1ae51410-f701-45b7-a792-99c2a40bad11", "DetectTime": "2023-10-30T14:13:41.415574+02:00", "EventTime": "2023-10-30T14:13:41.415592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["ChgLv01uywf2tnUlWf"]} -{"Format": "IDEA0", "ID": "3a38ea8a-636e-4cda-aa96-304429b1a1b9", "DetectTime": "2023-10-30T14:13:41.441840+02:00", "EventTime": "2023-10-30T14:13:41.441862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CdLL8W1rYxrRo9kUyc"]} -{"Format": "IDEA0", "ID": "18874f81-a4bb-4769-97d3-fabc80f285e3", "DetectTime": "2023-10-30T14:13:41.468133+02:00", "EventTime": "2023-10-30T14:13:41.468158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CNeAul4qDU29Hdid7h"]} -{"Format": "IDEA0", "ID": "74a3a12c-8538-433a-816a-7cc7e1359fc3", "DetectTime": "2023-10-30T14:13:41.496814+02:00", "EventTime": "2023-10-30T14:13:41.496831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CgP3OT2qjVxxUZJQx7"]} -{"Format": "IDEA0", "ID": "865421e3-308b-4592-804e-b9c51384f9e4", "DetectTime": "2023-10-30T14:13:41.519597+02:00", "EventTime": "2023-10-30T14:13:41.519611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C9JNvbfXn18x9xWrk"]} -{"Format": "IDEA0", "ID": "18b465ad-354d-4891-8ce3-0cb7fd90aac9", "DetectTime": "2023-10-30T14:13:41.546676+02:00", "EventTime": "2023-10-30T14:13:41.546702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CBPivz1qHz4EVNUwfa"]} -{"Format": "IDEA0", "ID": "961472a6-14b1-43bf-9fb3-db6a81b64c1b", "DetectTime": "2023-10-30T14:13:41.573581+02:00", "EventTime": "2023-10-30T14:13:41.573601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CdedpS2K8z0rVXZOQ"]} -{"Format": "IDEA0", "ID": "484c9fca-a37d-4f3e-88e5-f95fdc01364e", "DetectTime": "2023-10-30T14:13:41.602229+02:00", "EventTime": "2023-10-30T14:13:41.602245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CaRnF417358Qc8d3pb"]} -{"Format": "Json", "ID": "484c9fca-a37d-4f3e-88e5-f95fdc01364e", "DetectTime": "2023-10-30T14:13:41.602229+02:00", "EventTime": "2023-10-30T14:13:41.602245+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T17:49:59.530339+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 208. (real time 2023/10/30 14:13:41.671870)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c5efea82-6431-4495-b2c3-08f00aa6187f", "DetectTime": "2023-10-30T14:13:41.676994+02:00", "EventTime": "2023-10-30T14:13:41.677011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cg3o8C2s6WffjcZ1Jj"]} -{"Format": "IDEA0", "ID": "f97021f2-c528-4a06-af14-4ab191b1181d", "DetectTime": "2023-10-30T14:13:41.702379+02:00", "EventTime": "2023-10-30T14:13:41.702391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C9K9cG4hCWlPLpHkE3"]} -{"Format": "IDEA0", "ID": "4da6247e-83a7-4cb0-b797-ad72dc12926b", "DetectTime": "2023-10-30T14:13:41.726321+02:00", "EventTime": "2023-10-30T14:13:41.726334+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CCrcLM27BAGTrt95zd"]} -{"Format": "IDEA0", "ID": "73d113ec-93db-4e36-9ac9-87aee54662d7", "DetectTime": "2023-10-30T14:13:41.749878+02:00", "EventTime": "2023-10-30T14:13:41.749898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CBv1cw4HxErGrEYEBi"]} -{"Format": "IDEA0", "ID": "3abec601-03e0-4192-991c-f19db2d38a8c", "DetectTime": "2023-10-30T14:13:41.773992+02:00", "EventTime": "2023-10-30T14:13:41.774012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cephl43uvZ3iXJxB76"]} -{"Format": "IDEA0", "ID": "fa6f7b20-4341-47d3-9ecb-7de1abb58c32", "DetectTime": "2023-10-30T14:13:41.798355+02:00", "EventTime": "2023-10-30T14:13:41.798370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C9vEScMvrpyCBunY1"]} -{"Format": "IDEA0", "ID": "c08d15a7-4c9a-4476-839f-716930054e3c", "DetectTime": "2023-10-30T14:13:41.823991+02:00", "EventTime": "2023-10-30T14:13:41.824006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CTWYIH18rKOr705uG"]} -{"Format": "IDEA0", "ID": "0f1a227a-485e-43bf-98a5-b29e17c023e8", "DetectTime": "2023-10-30T14:13:41.848923+02:00", "EventTime": "2023-10-30T14:13:41.848940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CTMcxXGx6FH0USFZc"]} -{"Format": "Json", "ID": "0f1a227a-485e-43bf-98a5-b29e17c023e8", "DetectTime": "2023-10-30T14:13:41.848923+02:00", "EventTime": "2023-10-30T14:13:41.848940+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T17:50:07.460638+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 208. (real time 2023/10/30 14:13:41.919157)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "2080d407-3d01-4737-8682-1e77941e3b63", "DetectTime": "2023-10-30T14:13:41.924565+02:00", "EventTime": "2023-10-30T14:13:41.924575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cb2p5w35nSv6Wk3fBa"]} -{"Format": "IDEA0", "ID": "4816aa57-cb87-4e97-a0cb-7421d1db2550", "DetectTime": "2023-10-30T14:13:41.945534+02:00", "EventTime": "2023-10-30T14:13:41.945550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CjaASi233JSd7F1Hvf"]} -{"Format": "IDEA0", "ID": "dda101d5-4126-4d3f-b68b-b95afc767f28", "DetectTime": "2023-10-30T14:13:41.968276+02:00", "EventTime": "2023-10-30T14:13:41.968287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cx82pn2elE3RX9oMKa"]} -{"Format": "IDEA0", "ID": "02b5e40d-a92a-4698-8a7b-fdc536255f89", "DetectTime": "2023-10-30T14:13:41.988254+02:00", "EventTime": "2023-10-30T14:13:41.988280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CP0JMc2KlXa0DPIv8b"]} -{"Format": "IDEA0", "ID": "2204a2d0-2dc2-4215-9662-a44444cf0fa3", "DetectTime": "2023-10-30T14:13:42.006504+02:00", "EventTime": "2023-10-30T14:13:42.006516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CAADqAQHJbvVs1K43"]} -{"Format": "IDEA0", "ID": "b4e80a5e-1001-4c58-9263-80a424a587cc", "DetectTime": "2023-10-30T14:13:42.025265+02:00", "EventTime": "2023-10-30T14:13:42.025281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C1GP4t4N3N7iIe8Ew1"]} -{"Format": "IDEA0", "ID": "84a7462d-c7c4-4579-9a9a-426ba9520fbb", "DetectTime": "2023-10-30T14:13:42.045331+02:00", "EventTime": "2023-10-30T14:13:42.045343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVKKBU37bIcr8ChFG4"]} -{"Format": "IDEA0", "ID": "1bce74f4-1a5d-4a1a-b6ae-955f12fd623d", "DetectTime": "2023-10-30T14:13:42.074488+02:00", "EventTime": "2023-10-30T14:13:42.074504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CE9VKX3safJnGHZZ4"]} -{"Format": "IDEA0", "ID": "986c12ae-f188-4b3f-8533-aec4fca46764", "DetectTime": "2023-10-30T14:13:42.108741+02:00", "EventTime": "2023-10-30T14:13:42.108764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CLjDOB3cQnnofL3Flk"]} -{"Format": "IDEA0", "ID": "7cf25635-dd9d-4d18-8bbc-9e87807d5839", "DetectTime": "2023-10-30T14:13:42.140304+02:00", "EventTime": "2023-10-30T14:13:42.140316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C8E6YV2kXqEKvUD7a9"]} -{"Format": "IDEA0", "ID": "bce26e5d-36a6-4058-861d-a1752792eaf6", "DetectTime": "2023-10-30T14:13:42.168916+02:00", "EventTime": "2023-10-30T14:13:42.168926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cp3X0XnXKed7ycmYe"]} -{"Format": "IDEA0", "ID": "673318f4-ca18-4c6c-b5f6-769f7f2716d4", "DetectTime": "2023-10-30T14:13:42.201501+02:00", "EventTime": "2023-10-30T14:13:42.201512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cxqxvv1T92doaUQN87"]} -{"Format": "IDEA0", "ID": "fe437e9e-4af4-48a2-a9b8-4085fa2f8b77", "DetectTime": "2023-10-30T14:13:42.232415+02:00", "EventTime": "2023-10-30T14:13:42.232427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cy7CTl3e4FpPz8FJUb"]} -{"Format": "IDEA0", "ID": "6d1d1409-a87a-455c-94c4-d1c70fd5f086", "DetectTime": "2023-10-30T14:13:42.259942+02:00", "EventTime": "2023-10-30T14:13:42.259955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CaWQxl2bA9JE8HIt3d"]} -{"Format": "Json", "ID": "6d1d1409-a87a-455c-94c4-d1c70fd5f086", "DetectTime": "2023-10-30T14:13:42.259942+02:00", "EventTime": "2023-10-30T14:13:42.259955+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T18:20:20.522725+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 209. (real time 2023/10/30 14:13:42.329293)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e4ce6ae-49a6-4650-b011-c09cd01f6d5d", "DetectTime": "2023-10-30T14:13:42.333438+02:00", "EventTime": "2023-10-30T14:13:42.333449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CdusW01vQijbHRaiVi"]} -{"Format": "IDEA0", "ID": "eaf24968-394d-478d-aa43-2f8783356cab", "DetectTime": "2023-10-30T14:13:42.440379+02:00", "EventTime": "2023-10-30T14:13:42.440408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCzTPW10sgJUGpQ0q8"]} -{"Format": "IDEA0", "ID": "ac028a03-629b-43d7-804c-9564ba01bfc0", "DetectTime": "2023-10-30T14:13:42.476754+02:00", "EventTime": "2023-10-30T14:13:42.476771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CdKUBy16CScHL40B8j"]} -{"Format": "IDEA0", "ID": "5e94f371-72c5-49e6-91fa-25d8e48cfb07", "DetectTime": "2023-10-30T14:13:42.511482+02:00", "EventTime": "2023-10-30T14:13:42.511506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CbqhSo3vlTg9U0inNk"]} -{"Format": "IDEA0", "ID": "b7a9c5a0-af60-4074-a6ec-66fc7e1238c1", "DetectTime": "2023-10-30T14:13:42.542877+02:00", "EventTime": "2023-10-30T14:13:42.542893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CuyHfpJevbqpSZf9"]} -{"Format": "IDEA0", "ID": "cde683f2-c59e-4b58-9913-feafa6925956", "DetectTime": "2023-10-30T14:13:42.573351+02:00", "EventTime": "2023-10-30T14:13:42.573366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CtruqHfJPZD1Logd1"]} -{"Format": "IDEA0", "ID": "eba88233-b2ef-499b-9362-d0f29e4ca63b", "DetectTime": "2023-10-30T14:13:42.605214+02:00", "EventTime": "2023-10-30T14:13:42.605226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CuBaN22qhImuFfxWn2"]} -{"Format": "IDEA0", "ID": "90f35749-d907-4b73-9bda-ac319288cdbc", "DetectTime": "2023-10-30T14:13:42.638993+02:00", "EventTime": "2023-10-30T14:13:42.639011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbOyK11vamEtJgZMT4"]} -{"Format": "IDEA0", "ID": "d875f27f-e3f3-4b3f-9f92-345c45a1953c", "DetectTime": "2023-10-30T14:13:42.665633+02:00", "EventTime": "2023-10-30T14:13:42.665650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CIXhmX2kG5DTpcSUcg"]} -{"Format": "Json", "ID": "d875f27f-e3f3-4b3f-9f92-345c45a1953c", "DetectTime": "2023-10-30T14:13:42.665633+02:00", "EventTime": "2023-10-30T14:13:42.665650+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T18:20:22.116675+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 209. (real time 2023/10/30 14:13:42.741780)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "84fd6280-4e71-48d6-9421-ad94e422e749", "DetectTime": "2023-10-30T14:13:42.747692+02:00", "EventTime": "2023-10-30T14:13:42.747708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CWeFuw4rcssRzAHJRk"]} -{"Format": "IDEA0", "ID": "2826e343-eb99-495b-92b2-70a264f71cb2", "DetectTime": "2023-10-30T14:13:42.779725+02:00", "EventTime": "2023-10-30T14:13:42.779742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["ClVYec4qJh7v3Iqppb"]} -{"Format": "IDEA0", "ID": "0084e2c9-ef0c-448d-a030-38050bc43adc", "DetectTime": "2023-10-30T14:13:42.809364+02:00", "EventTime": "2023-10-30T14:13:42.809484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CGTVI611rY9vFsNrzg"]} -{"Format": "IDEA0", "ID": "e3d6c64b-6565-408c-923d-3767581a6d1d", "DetectTime": "2023-10-30T14:13:42.842034+02:00", "EventTime": "2023-10-30T14:13:42.842106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CYD8nL39JbeCQVN4xf"]} -{"Format": "IDEA0", "ID": "0b79a5dc-633b-4917-9d25-c4dd9fb104e2", "DetectTime": "2023-10-30T14:13:42.868999+02:00", "EventTime": "2023-10-30T14:13:42.869023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CCIBOg40eNI7jihVG4"]} -{"Format": "IDEA0", "ID": "0d320a1a-9003-460a-90ba-d72ccdee1325", "DetectTime": "2023-10-30T14:13:42.897702+02:00", "EventTime": "2023-10-30T14:13:42.897718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cyi2G93G2AwTFbx0Je"]} -{"Format": "IDEA0", "ID": "5410e9dc-d14b-45c4-a067-7ff71f5c4d71", "DetectTime": "2023-10-30T14:13:42.927344+02:00", "EventTime": "2023-10-30T14:13:42.927360+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwKNQq23jGeTQYpyMl"]} -{"Format": "IDEA0", "ID": "fb38334b-3a62-4745-9caf-639574551238", "DetectTime": "2023-10-30T14:13:42.957270+02:00", "EventTime": "2023-10-30T14:13:42.957298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CoI3Fh4antxoJZgOJ1"]} -{"Format": "Json", "ID": "fb38334b-3a62-4745-9caf-639574551238", "DetectTime": "2023-10-30T14:13:42.957270+02:00", "EventTime": "2023-10-30T14:13:42.957298+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T18:20:24.457181+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 209. (real time 2023/10/30 14:13:43.035901)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9ae51f63-8851-4ceb-9c24-2899e30d2c88", "DetectTime": "2023-10-30T14:13:43.041952+02:00", "EventTime": "2023-10-30T14:13:43.041973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CP3bLo2TppEdbcesj5"]} -{"Format": "IDEA0", "ID": "617a85f4-146d-4ebd-995a-c38f5eb8341e", "DetectTime": "2023-10-30T14:13:43.072379+02:00", "EventTime": "2023-10-30T14:13:43.072396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["ChX2iFDDVAcvVZSH2"]} -{"Format": "IDEA0", "ID": "5896aba2-5ffb-4436-91f0-41224c060c38", "DetectTime": "2023-10-30T14:13:43.098141+02:00", "EventTime": "2023-10-30T14:13:43.098158+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEtZK90gUK53ktjYh"]} -{"Format": "IDEA0", "ID": "bac85815-48e8-438c-8b33-bd9a8095225a", "DetectTime": "2023-10-30T14:13:43.120795+02:00", "EventTime": "2023-10-30T14:13:43.120807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Carz1s4TfCMCT76GQb"]} -{"Format": "IDEA0", "ID": "896f8e3b-541e-4c70-bdf7-86c3d1908038", "DetectTime": "2023-10-30T14:13:43.144394+02:00", "EventTime": "2023-10-30T14:13:43.144405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7ZbdO1YkgIRMR7pKb"]} -{"Format": "IDEA0", "ID": "c3625176-a7a0-4005-8c6c-ae85fe0336a3", "DetectTime": "2023-10-30T14:13:43.164368+02:00", "EventTime": "2023-10-30T14:13:43.164379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cf0b7A4VbzylaCEkSl"]} -{"Format": "IDEA0", "ID": "83e040cf-c4ed-4c63-a515-fa7ad6458e63", "DetectTime": "2023-10-30T14:13:43.188303+02:00", "EventTime": "2023-10-30T14:13:43.188321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CRsuKr4UiDEJUE5j0a"]} -{"Format": "IDEA0", "ID": "5983a89f-fd68-4da1-96a5-249355c42abd", "DetectTime": "2023-10-30T14:13:43.209484+02:00", "EventTime": "2023-10-30T14:13:43.209500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CiCIwN17ABam1ZSvE5"]} -{"Format": "IDEA0", "ID": "50b9cb58-8489-44cf-8c9d-0c686cf8cce3", "DetectTime": "2023-10-30T14:13:43.229780+02:00", "EventTime": "2023-10-30T14:13:43.229796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CxFPpY1FPfpPkUGyY8"]} -{"Format": "IDEA0", "ID": "b547d21d-131d-450d-8a08-fff7cbb9e691", "DetectTime": "2023-10-30T14:13:43.252766+02:00", "EventTime": "2023-10-30T14:13:43.252784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C2m1yL3yxfeIF4zbjb"]} -{"Format": "Json", "ID": "b547d21d-131d-450d-8a08-fff7cbb9e691", "DetectTime": "2023-10-30T14:13:43.252766+02:00", "EventTime": "2023-10-30T14:13:43.252784+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T18:50:32.067615+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 209. (real time 2023/10/30 14:13:43.309483)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "672d3e87-f31a-4da6-b9dc-f58f4478c3c7", "DetectTime": "2023-10-30T14:13:43.314727+02:00", "EventTime": "2023-10-30T14:13:43.314739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CUPeGiFGwMG43xdqf"]} -{"Format": "IDEA0", "ID": "d58e22af-8852-4dc8-a35f-c37161d1a64e", "DetectTime": "2023-10-30T14:13:43.335943+02:00", "EventTime": "2023-10-30T14:13:43.335958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CcWhIA1wJkLXwZ2Us8"]} -{"Format": "IDEA0", "ID": "815ebae2-0d16-4485-9580-9a74f665f902", "DetectTime": "2023-10-30T14:13:43.354572+02:00", "EventTime": "2023-10-30T14:13:43.354586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ClQ6WE1c7drPha6pYj"]} -{"Format": "IDEA0", "ID": "6a6adb24-82f5-4f67-b68f-ef76a20a252e", "DetectTime": "2023-10-30T14:13:43.377495+02:00", "EventTime": "2023-10-30T14:13:43.377510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CtuK5Y13qJKeurDB79"]} -{"Format": "IDEA0", "ID": "2508fa15-24c8-4784-be4e-085edfb650e6", "DetectTime": "2023-10-30T14:13:43.400718+02:00", "EventTime": "2023-10-30T14:13:43.400729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C2xQOr3aDzjBMDTOwk"]} -{"Format": "IDEA0", "ID": "6eb561c9-ff07-416c-a5c6-e64eac8338ab", "DetectTime": "2023-10-30T14:13:43.422067+02:00", "EventTime": "2023-10-30T14:13:43.422094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CJ6VdWzZPNa9gwbi1"]} -{"Format": "IDEA0", "ID": "d63b2038-d381-4d07-a238-23940b116568", "DetectTime": "2023-10-30T14:13:43.446143+02:00", "EventTime": "2023-10-30T14:13:43.446157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CzUsbhnkdZ51SY2o2"]} -{"Format": "IDEA0", "ID": "fd874e43-1798-4f2b-8471-19350310d267", "DetectTime": "2023-10-30T14:13:43.466656+02:00", "EventTime": "2023-10-30T14:13:43.466672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CZ9PbF4Nbrc2byR95k"]} -{"Format": "IDEA0", "ID": "95ad681d-5ffd-4a38-bc88-ef835149e783", "DetectTime": "2023-10-30T14:13:43.493211+02:00", "EventTime": "2023-10-30T14:13:43.493227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cn0IWb1GWjdwhhx73"]} -{"Format": "Json", "ID": "95ad681d-5ffd-4a38-bc88-ef835149e783", "DetectTime": "2023-10-30T14:13:43.493211+02:00", "EventTime": "2023-10-30T14:13:43.493227+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T18:50:33.761473+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 209. (real time 2023/10/30 14:13:43.557270)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "556c970c-0979-454b-ba1f-6db680ab879c", "DetectTime": "2023-10-30T14:13:43.562817+02:00", "EventTime": "2023-10-30T14:13:43.562833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C3kuh14TulIYwpRqnl"]} -{"Format": "IDEA0", "ID": "f475608d-1bed-47aa-85e3-b16278a4708f", "DetectTime": "2023-10-30T14:13:43.591072+02:00", "EventTime": "2023-10-30T14:13:43.591089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cg7nAl1zxhlkXjkU6g"]} -{"Format": "IDEA0", "ID": "b045fd09-d11a-4b09-8e28-aaf4e62cfbc5", "DetectTime": "2023-10-30T14:13:43.614509+02:00", "EventTime": "2023-10-30T14:13:43.614527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CRrsZr4iQkt07qxRk"]} -{"Format": "IDEA0", "ID": "8a5094f4-ca76-47e4-884b-b5af1db80dc2", "DetectTime": "2023-10-30T14:13:43.634369+02:00", "EventTime": "2023-10-30T14:13:43.634380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CKd08y454bizIKJPY7"]} -{"Format": "IDEA0", "ID": "3e47832c-5c13-4d4f-a7b1-9e1e50f06fa3", "DetectTime": "2023-10-30T14:13:43.658361+02:00", "EventTime": "2023-10-30T14:13:43.658386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CTwQLk2qhgeWNbO5ph"]} -{"Format": "IDEA0", "ID": "340a3c24-1d6b-449f-8be6-082e8f233dcc", "DetectTime": "2023-10-30T14:13:43.679979+02:00", "EventTime": "2023-10-30T14:13:43.679992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C0InLR1weR5lwwGg17"]} -{"Format": "IDEA0", "ID": "cf4f5210-71b5-4acd-bd0d-83925db0f771", "DetectTime": "2023-10-30T14:13:43.698192+02:00", "EventTime": "2023-10-30T14:13:43.698207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CMFaAO2FpZarLPSSL3"]} -{"Format": "IDEA0", "ID": "a4a68979-87ba-4220-ae58-7c10ef392da7", "DetectTime": "2023-10-30T14:13:43.715109+02:00", "EventTime": "2023-10-30T14:13:43.715120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C39MQO2d2p8XD0zLwj"]} -{"Format": "IDEA0", "ID": "5668dae0-491c-4c41-a46c-3f6057bd324f", "DetectTime": "2023-10-30T14:13:43.732654+02:00", "EventTime": "2023-10-30T14:13:43.732665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6NxNF2NRvd7EP6zH2"]} -{"Format": "IDEA0", "ID": "fd0af2dd-10e5-4b3c-8429-4f485ed763b1", "DetectTime": "2023-10-30T14:13:43.750797+02:00", "EventTime": "2023-10-30T14:13:43.750814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cxap0g2OtBuhWAVakj"]} -{"Format": "Json", "ID": "fd0af2dd-10e5-4b3c-8429-4f485ed763b1", "DetectTime": "2023-10-30T14:13:43.750797+02:00", "EventTime": "2023-10-30T14:13:43.750814+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T18:50:54.819163+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 209. (real time 2023/10/30 14:13:43.810543)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1be37a09-5b14-468c-8b65-0c0faf9fe151", "DetectTime": "2023-10-30T14:13:43.815832+02:00", "EventTime": "2023-10-30T14:13:43.815848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CdM77e2XCJQRvTaRU9"]} -{"Format": "IDEA0", "ID": "795286b2-ecf7-4c6b-b32c-a645fdf3e965", "DetectTime": "2023-10-30T14:13:43.834815+02:00", "EventTime": "2023-10-30T14:13:43.834833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CTgyGCTUdwNBa9Kg4"]} -{"Format": "IDEA0", "ID": "ee98f2d9-14c2-4d6d-b4b0-547e6c7ad58e", "DetectTime": "2023-10-30T14:13:43.850271+02:00", "EventTime": "2023-10-30T14:13:43.850282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CCBcAN2VpuUyBZf60k"]} -{"Format": "IDEA0", "ID": "164e9917-93eb-4ae8-8499-30a0bfd1a6b9", "DetectTime": "2023-10-30T14:13:43.865717+02:00", "EventTime": "2023-10-30T14:13:43.865745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CCF38a2U3cMHBGGPe"]} -{"Format": "IDEA0", "ID": "56f3a186-1ae8-448e-bd9e-14024683ca8e", "DetectTime": "2023-10-30T14:13:43.884584+02:00", "EventTime": "2023-10-30T14:13:43.884597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CAVFQY2O3OeDCAuV98"]} -{"Format": "IDEA0", "ID": "354ceebe-0812-412a-bc53-6819a6c0a248", "DetectTime": "2023-10-30T14:13:43.900809+02:00", "EventTime": "2023-10-30T14:13:43.900820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CcCKjj4Gobb8dKHX77"]} -{"Format": "IDEA0", "ID": "b1319161-9fd9-4c63-8335-71c022c10b90", "DetectTime": "2023-10-30T14:13:43.925000+02:00", "EventTime": "2023-10-30T14:13:43.925019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrgPq217IsGE93fGrh"]} -{"Format": "IDEA0", "ID": "5cd77016-bd08-4521-bb41-43a66caa623a", "DetectTime": "2023-10-30T14:13:43.954509+02:00", "EventTime": "2023-10-30T14:13:43.954521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CNaYd21SaufTEh3622"]} -{"Format": "IDEA0", "ID": "32e1dfd0-0917-4097-afab-62f9075421e3", "DetectTime": "2023-10-30T14:13:43.974807+02:00", "EventTime": "2023-10-30T14:13:43.974819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CXjHrl2fyiwCTgRUF1"]} -{"Format": "IDEA0", "ID": "6b651f79-746e-44f5-a734-cd5933b9d834", "DetectTime": "2023-10-30T14:13:44.007317+02:00", "EventTime": "2023-10-30T14:13:44.007333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C2LjPp3KuBQE7nxqJb"]} -{"Format": "IDEA0", "ID": "64f92ab7-c539-44aa-a7fd-b6bab67d4a0f", "DetectTime": "2023-10-30T14:13:44.041368+02:00", "EventTime": "2023-10-30T14:13:44.041388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CgyJxR3mbv87kC1Csf"]} -{"Format": "IDEA0", "ID": "0026c2c5-6a2e-40c5-84e7-1f2de76ff314", "DetectTime": "2023-10-30T14:13:44.074220+02:00", "EventTime": "2023-10-30T14:13:44.074237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CVOV4A4BS3Rjedfs8i"]} -{"Format": "IDEA0", "ID": "7c30772c-298e-49a9-8950-3c602b7fca88", "DetectTime": "2023-10-30T14:13:44.101399+02:00", "EventTime": "2023-10-30T14:13:44.101410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CArqrp3LqADalzt6Vk"]} -{"Format": "IDEA0", "ID": "f310cd9a-f9fd-4c11-ae77-af56c2ec0508", "DetectTime": "2023-10-30T14:13:44.128529+02:00", "EventTime": "2023-10-30T14:13:44.128541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CDtvI31uqYbwZsF9Xb"]} -{"Format": "Json", "ID": "f310cd9a-f9fd-4c11-ae77-af56c2ec0508", "DetectTime": "2023-10-30T14:13:44.128529+02:00", "EventTime": "2023-10-30T14:13:44.128541+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T19:21:12.773953+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 210. (real time 2023/10/30 14:13:44.207743)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4e7f8c97-1469-43a5-a884-53ac0ba9be9e", "DetectTime": "2023-10-30T14:13:44.212427+02:00", "EventTime": "2023-10-30T14:13:44.212443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CT5Iur2poVtBlTqGb2"]} -{"Format": "IDEA0", "ID": "8290d282-3673-4b79-b804-807e0a991308", "DetectTime": "2023-10-30T14:13:44.240910+02:00", "EventTime": "2023-10-30T14:13:44.240920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C0ROqd3SQMk3FVIRjd"]} -{"Format": "IDEA0", "ID": "14393127-c5d2-4a92-8f25-a01ba8081c90", "DetectTime": "2023-10-30T14:13:44.264054+02:00", "EventTime": "2023-10-30T14:13:44.264064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CJIBKHPrJRWuyEr35"]} -{"Format": "IDEA0", "ID": "e5b76636-ebb5-451e-adfb-9358448e9d37", "DetectTime": "2023-10-30T14:13:44.291593+02:00", "EventTime": "2023-10-30T14:13:44.291612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CzklRJOH85OMK0G49"]} -{"Format": "IDEA0", "ID": "78953da3-15c8-408d-a14c-bc8951b0f173", "DetectTime": "2023-10-30T14:13:44.314218+02:00", "EventTime": "2023-10-30T14:13:44.314229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CEgC676XUTBNyHZdg"]} -{"Format": "IDEA0", "ID": "2208ec05-a36f-4c7d-b6b7-a78a536ddc3b", "DetectTime": "2023-10-30T14:13:44.337259+02:00", "EventTime": "2023-10-30T14:13:44.337271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CLXcUzkwnIWPRyhYe"]} -{"Format": "IDEA0", "ID": "3ff78698-5bfc-479b-b120-df13558bcc14", "DetectTime": "2023-10-30T14:13:44.362294+02:00", "EventTime": "2023-10-30T14:13:44.362309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CzDfWr3eLa5aqEMrWh"]} -{"Format": "IDEA0", "ID": "b39db708-a9b4-4c92-b75c-bd7862559e48", "DetectTime": "2023-10-30T14:13:44.393763+02:00", "EventTime": "2023-10-30T14:13:44.393780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C6YKBF2Rq5QWipIkJd"]} -{"Format": "IDEA0", "ID": "f409222b-486f-4714-86f9-6eb80c83cb7a", "DetectTime": "2023-10-30T14:13:44.420637+02:00", "EventTime": "2023-10-30T14:13:44.420652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C8YQYNoMIUt7ceS8d"]} -{"Format": "Json", "ID": "f409222b-486f-4714-86f9-6eb80c83cb7a", "DetectTime": "2023-10-30T14:13:44.420637+02:00", "EventTime": "2023-10-30T14:13:44.420652+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T19:21:32.730143+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 210. (real time 2023/10/30 14:13:44.482996)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a048fb21-473b-48d5-b537-8d2eec2171ba", "DetectTime": "2023-10-30T14:13:44.486890+02:00", "EventTime": "2023-10-30T14:13:44.486901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C7usIF22LubrOjPaS7"]} -{"Format": "IDEA0", "ID": "cea64af9-4cd5-47a9-b09d-1094c7019cc3", "DetectTime": "2023-10-30T14:13:44.511105+02:00", "EventTime": "2023-10-30T14:13:44.511124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C1tGw03XqOcVmfAKTk"]} -{"Format": "IDEA0", "ID": "42dc6bd1-8500-4b28-af4b-833b788475cd", "DetectTime": "2023-10-30T14:13:44.539422+02:00", "EventTime": "2023-10-30T14:13:44.539438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CHZGgk21TwXdC2bU5"]} -{"Format": "IDEA0", "ID": "8a084ac2-d423-4c7a-a731-b66df8480269", "DetectTime": "2023-10-30T14:13:44.565314+02:00", "EventTime": "2023-10-30T14:13:44.565326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CRBUP72Ad2LDBLnfUj"]} -{"Format": "IDEA0", "ID": "f2f752c9-7831-434a-a652-c750a914f784", "DetectTime": "2023-10-30T14:13:44.590421+02:00", "EventTime": "2023-10-30T14:13:44.590437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CgwX7y4V0y6mNSciCa"]} -{"Format": "IDEA0", "ID": "e6e63fec-04d5-4433-95c5-eaa9828c7b12", "DetectTime": "2023-10-30T14:13:44.618311+02:00", "EventTime": "2023-10-30T14:13:44.618328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ccstwq4KuXjn6Iwik1"]} -{"Format": "IDEA0", "ID": "752d124e-f8a5-4c06-a88f-7dcecff80572", "DetectTime": "2023-10-30T14:13:44.643555+02:00", "EventTime": "2023-10-30T14:13:44.643568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C83ZIx32VROE3b9X7g"]} -{"Format": "IDEA0", "ID": "93f43238-56d5-444f-b30f-ab259f9c0bdb", "DetectTime": "2023-10-30T14:13:44.668017+02:00", "EventTime": "2023-10-30T14:13:44.668032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CUE7MD17GD97H6PZD8"]} -{"Format": "IDEA0", "ID": "80fef1ec-c6bf-47ee-8d53-a7fd72f904c5", "DetectTime": "2023-10-30T14:13:44.697670+02:00", "EventTime": "2023-10-30T14:13:44.697685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cws8sE1r8OlmSmlska"]} -{"Format": "Json", "ID": "80fef1ec-c6bf-47ee-8d53-a7fd72f904c5", "DetectTime": "2023-10-30T14:13:44.697670+02:00", "EventTime": "2023-10-30T14:13:44.697685+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T19:22:10.632869+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 210. (real time 2023/10/30 14:13:44.768621)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "70e9a2ee-da5a-46b3-b5c8-ce9eed8ae287", "DetectTime": "2023-10-30T14:13:44.774273+02:00", "EventTime": "2023-10-30T14:13:44.774289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CZcmxz3R8HQr8pl6G2"]} -{"Format": "IDEA0", "ID": "d3a348a7-7eb0-49b5-aad9-cb1fa584d2db", "DetectTime": "2023-10-30T14:13:44.801105+02:00", "EventTime": "2023-10-30T14:13:44.801120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsIElC4U9sbEYr1Ho2"]} -{"Format": "IDEA0", "ID": "814d776c-2d5e-4572-93e1-acd4087c9256", "DetectTime": "2023-10-30T14:13:44.828112+02:00", "EventTime": "2023-10-30T14:13:44.828123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CPrteP2mGbY35LJZK7"]} -{"Format": "IDEA0", "ID": "94a33873-702a-4eae-b28e-37fe8193e562", "DetectTime": "2023-10-30T14:13:44.847889+02:00", "EventTime": "2023-10-30T14:13:44.847904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cx7iru3kSc00ZeD68c"]} -{"Format": "IDEA0", "ID": "f0bf04b2-b830-48e7-99f7-09fa17e51114", "DetectTime": "2023-10-30T14:13:44.871570+02:00", "EventTime": "2023-10-30T14:13:44.871580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CjHnwP3YQZpp80vWm5"]} -{"Format": "IDEA0", "ID": "e3e49eb9-49b9-4318-8448-da1b81d01fd4", "DetectTime": "2023-10-30T14:13:44.890738+02:00", "EventTime": "2023-10-30T14:13:44.890749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CbFlcC3BrNxeRU6sce"]} -{"Format": "IDEA0", "ID": "483d1a1a-f59d-40e0-95ef-770839d866b8", "DetectTime": "2023-10-30T14:13:44.908243+02:00", "EventTime": "2023-10-30T14:13:44.908253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CR7JcS3UY8PUeoRcG"]} -{"Format": "IDEA0", "ID": "4c037322-87f1-46b6-b3ff-c81ec84d2ded", "DetectTime": "2023-10-30T14:13:44.932781+02:00", "EventTime": "2023-10-30T14:13:44.932792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6EZis2Bysd6Vd8eOe"]} -{"Format": "IDEA0", "ID": "0a1f0ee3-5c7b-405b-8fa0-b83ea2c52fb1", "DetectTime": "2023-10-30T14:13:44.953246+02:00", "EventTime": "2023-10-30T14:13:44.953258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9DkAA4nXH75zjAjAj"]} -{"Format": "Json", "ID": "0a1f0ee3-5c7b-405b-8fa0-b83ea2c52fb1", "DetectTime": "2023-10-30T14:13:44.953246+02:00", "EventTime": "2023-10-30T14:13:44.953258+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T19:52:55.016039+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 210. (real time 2023/10/30 14:13:45.021213)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "506c7e9f-9237-4ae6-a359-b04b274f55b5", "DetectTime": "2023-10-30T14:13:45.026546+02:00", "EventTime": "2023-10-30T14:13:45.026562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CY3LMU2OAfCvN7dUSh"]} -{"Format": "IDEA0", "ID": "9805b4db-a6de-468d-8143-964316c89e20", "DetectTime": "2023-10-30T14:13:45.048575+02:00", "EventTime": "2023-10-30T14:13:45.048591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVpdq24CkNwl1Bt7d9"]} -{"Format": "IDEA0", "ID": "a4e3b127-585d-4a72-a4b0-27648d7e1ea1", "DetectTime": "2023-10-30T14:13:45.070983+02:00", "EventTime": "2023-10-30T14:13:45.070999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CWXIq94XjZtnSi53zl"]} -{"Format": "IDEA0", "ID": "dbb0f745-eaef-402e-a5cb-42e988e18e0a", "DetectTime": "2023-10-30T14:13:45.095154+02:00", "EventTime": "2023-10-30T14:13:45.095169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CiLVU92hcmkNvqtb0f"]} -{"Format": "IDEA0", "ID": "0038797e-d882-49c7-831b-70cc391cde5f", "DetectTime": "2023-10-30T14:13:45.116846+02:00", "EventTime": "2023-10-30T14:13:45.116857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cyb2gp2NUj9UXehlHh"]} -{"Format": "IDEA0", "ID": "5345fecd-4b9d-4bee-8166-f6f05d2d314d", "DetectTime": "2023-10-30T14:13:45.137512+02:00", "EventTime": "2023-10-30T14:13:45.137530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0chti2h6QYW50sL6c"]} -{"Format": "IDEA0", "ID": "38ec6ae2-ee72-4dc6-a461-10844cc8176b", "DetectTime": "2023-10-30T14:13:45.158407+02:00", "EventTime": "2023-10-30T14:13:45.158423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CKw5ML1PWvkPwW7X6c"]} -{"Format": "IDEA0", "ID": "0381788f-76f2-4296-81bb-24ce86645a9c", "DetectTime": "2023-10-30T14:13:45.181279+02:00", "EventTime": "2023-10-30T14:13:45.181294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Czncci1ottqpZsR7l4"]} -{"Format": "IDEA0", "ID": "7e8b56ff-1378-42c9-b050-714fc773deac", "DetectTime": "2023-10-30T14:13:45.205583+02:00", "EventTime": "2023-10-30T14:13:45.205598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CSiUmg3msX7WuAyIG6"]} -{"Format": "Json", "ID": "7e8b56ff-1378-42c9-b050-714fc773deac", "DetectTime": "2023-10-30T14:13:45.205583+02:00", "EventTime": "2023-10-30T14:13:45.205598+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T19:52:56.736068+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 210. (real time 2023/10/30 14:13:45.264935)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae17e1bd-5b0e-4b0b-a7a7-adfcebc4de1b", "DetectTime": "2023-10-30T14:13:45.268810+02:00", "EventTime": "2023-10-30T14:13:45.268820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CWlpiqTmbVXi64YVg"]} -{"Format": "IDEA0", "ID": "6ed47cd8-51c9-48ce-b6cf-1a9d060969a9", "DetectTime": "2023-10-30T14:13:45.285689+02:00", "EventTime": "2023-10-30T14:13:45.285699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C4Nv0igSBYYmDyFMc"]} -{"Format": "IDEA0", "ID": "839d3d5a-9196-4471-8d8a-a969ffb8e1ff", "DetectTime": "2023-10-30T14:13:45.303269+02:00", "EventTime": "2023-10-30T14:13:45.303284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CPeaZG3TiY0eImkJbf"]} -{"Format": "IDEA0", "ID": "2931731f-d146-4ccf-b9f1-f2b2f14acef8", "DetectTime": "2023-10-30T14:13:45.319058+02:00", "EventTime": "2023-10-30T14:13:45.319069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CaMaUD353jIU9viIb"]} -{"Format": "IDEA0", "ID": "dad59b0b-a45c-4e44-a8b1-27c78f5a9931", "DetectTime": "2023-10-30T14:13:45.341814+02:00", "EventTime": "2023-10-30T14:13:45.341829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CdFObo4qGTyOYLnb6"]} -{"Format": "IDEA0", "ID": "bf65d53f-9170-4b6d-9236-b50ea5bc23a9", "DetectTime": "2023-10-30T14:13:45.438373+02:00", "EventTime": "2023-10-30T14:13:45.438389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C6wfen4nlJTHdmqJPd"]} -{"Format": "IDEA0", "ID": "7f887509-6d38-4576-a139-3ce9c9402101", "DetectTime": "2023-10-30T14:13:45.463479+02:00", "EventTime": "2023-10-30T14:13:45.463495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CogYcH2semQOP2rp57"]} -{"Format": "IDEA0", "ID": "c875fefb-a3b1-488e-9b32-2508c7280a41", "DetectTime": "2023-10-30T14:13:45.491016+02:00", "EventTime": "2023-10-30T14:13:45.491032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cl3cTLchDZiQwhE3e"]} -{"Format": "IDEA0", "ID": "53f4aa67-2389-48bb-b551-d62aec10a185", "DetectTime": "2023-10-30T14:13:45.513998+02:00", "EventTime": "2023-10-30T14:13:45.514013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ck8L4f2dqykDPnZ3xb"]} -{"Format": "Json", "ID": "53f4aa67-2389-48bb-b551-d62aec10a185", "DetectTime": "2023-10-30T14:13:45.513998+02:00", "EventTime": "2023-10-30T14:13:45.514013+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T19:52:58.346280+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 210. (real time 2023/10/30 14:13:45.580419)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "61e59119-bc6f-46dd-8e04-8367ebb51c79", "DetectTime": "2023-10-30T14:13:45.585604+02:00", "EventTime": "2023-10-30T14:13:45.585620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cmciyz16FoGc2m44hd"]} -{"Format": "IDEA0", "ID": "178bcef9-4bd4-4060-8712-66f8169d19c2", "DetectTime": "2023-10-30T14:13:45.607484+02:00", "EventTime": "2023-10-30T14:13:45.607500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CZf31V10rikw4qFxja"]} -{"Format": "IDEA0", "ID": "50b9ffcb-eca4-499d-9339-6a6cc199f66e", "DetectTime": "2023-10-30T14:13:45.623495+02:00", "EventTime": "2023-10-30T14:13:45.623507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CkWvKC2NHCEKk3uQd"]} -{"Format": "IDEA0", "ID": "7be1efe0-a718-4a8d-85a0-68c2abfc684f", "DetectTime": "2023-10-30T14:13:45.642687+02:00", "EventTime": "2023-10-30T14:13:45.642704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cb1cX73kC2ljzknvi8"]} -{"Format": "IDEA0", "ID": "18199f95-100f-44d2-bef8-92e8530dfe02", "DetectTime": "2023-10-30T14:13:45.666267+02:00", "EventTime": "2023-10-30T14:13:45.666281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CURWRYS76OpANv8Ta"]} -{"Format": "IDEA0", "ID": "fd4dfff0-88c9-4e63-9570-04abf9c68048", "DetectTime": "2023-10-30T14:13:45.692154+02:00", "EventTime": "2023-10-30T14:13:45.692170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CxahNE2NbAnh987rpi"]} -{"Format": "IDEA0", "ID": "0c553df7-a87b-43cb-ad14-a35fc0f556cc", "DetectTime": "2023-10-30T14:13:45.724098+02:00", "EventTime": "2023-10-30T14:13:45.724113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXsi6822bOyILrytB2"]} -{"Format": "IDEA0", "ID": "5d94c111-81b5-4f1a-b96f-a0540b163487", "DetectTime": "2023-10-30T14:13:45.754737+02:00", "EventTime": "2023-10-30T14:13:45.754763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CKygwG2GFmpxDg5LU7"]} -{"Format": "IDEA0", "ID": "e4b3d9b4-f9f6-4654-9b60-2bbb1219a0d0", "DetectTime": "2023-10-30T14:13:45.785447+02:00", "EventTime": "2023-10-30T14:13:45.785464+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CnQCZa15oOoPW2uqOh"]} -{"Format": "IDEA0", "ID": "3a415103-bf4c-4c19-b537-d9222f795aee", "DetectTime": "2023-10-30T14:13:45.815703+02:00", "EventTime": "2023-10-30T14:13:45.815719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVvs642Zo8uDWIWcd7"]} -{"Format": "IDEA0", "ID": "ae3b99ef-fccf-4ea1-a604-b01c5100eb08", "DetectTime": "2023-10-30T14:13:45.849014+02:00", "EventTime": "2023-10-30T14:13:45.849029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CwZHGE0h88dV7XoNg"]} -{"Format": "IDEA0", "ID": "07e49341-28bd-4e59-be35-6542b1ef4158", "DetectTime": "2023-10-30T14:13:45.878499+02:00", "EventTime": "2023-10-30T14:13:45.878515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CL6MxF2TXeEDKmUGWh"]} -{"Format": "Json", "ID": "07e49341-28bd-4e59-be35-6542b1ef4158", "DetectTime": "2023-10-30T14:13:45.878499+02:00", "EventTime": "2023-10-30T14:13:45.878515+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T20:23:19.765612+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 211. (real time 2023/10/30 14:13:45.960520)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3a727045-fdc7-438d-abcb-3392021873af", "DetectTime": "2023-10-30T14:13:45.965992+02:00", "EventTime": "2023-10-30T14:13:45.966007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CbrZTb3JktOy0jXjJ1"]} -{"Format": "IDEA0", "ID": "6e04add6-6514-4684-bdf9-a6967b2f3674", "DetectTime": "2023-10-30T14:13:45.996978+02:00", "EventTime": "2023-10-30T14:13:45.996994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CSAabAxffo0aN6Ux"]} -{"Format": "IDEA0", "ID": "0b08c403-689d-4c8c-ab90-d312f5e6df62", "DetectTime": "2023-10-30T14:13:46.027491+02:00", "EventTime": "2023-10-30T14:13:46.027508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CRB1jr3MF1WjwKG36"]} -{"Format": "IDEA0", "ID": "fb33b2a7-7093-4f35-83fa-a6ae7c938c56", "DetectTime": "2023-10-30T14:13:46.052565+02:00", "EventTime": "2023-10-30T14:13:46.052584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cpd7i34MIKLIwlyLoe"]} -{"Format": "IDEA0", "ID": "2bf8f8bf-cb9e-405b-84c9-4aab44a52c47", "DetectTime": "2023-10-30T14:13:46.073864+02:00", "EventTime": "2023-10-30T14:13:46.073875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CnGZk91CUGLAJpKdTd"]} -{"Format": "IDEA0", "ID": "cf9c7b86-cb65-4308-8716-90dcefd3f8d0", "DetectTime": "2023-10-30T14:13:46.095426+02:00", "EventTime": "2023-10-30T14:13:46.095438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CelrOBYJPMHb7Wx51"]} -{"Format": "IDEA0", "ID": "dfcef9fa-e359-4794-9032-12309f3a07d2", "DetectTime": "2023-10-30T14:13:46.120489+02:00", "EventTime": "2023-10-30T14:13:46.120505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cj1x4v48Z4G1lSyx2k"]} -{"Format": "IDEA0", "ID": "7c8d7ec3-7abc-47de-a749-ed65cafb719d", "DetectTime": "2023-10-30T14:13:46.149362+02:00", "EventTime": "2023-10-30T14:13:46.149377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CqvLC24u1bF0UBgqE1"]} -{"Format": "IDEA0", "ID": "9caa2acf-3c9b-442f-8760-eacecf29cc66", "DetectTime": "2023-10-30T14:13:46.177815+02:00", "EventTime": "2023-10-30T14:13:46.177831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CS377m3seniQlIN8B9"]} -{"Format": "Json", "ID": "9caa2acf-3c9b-442f-8760-eacecf29cc66", "DetectTime": "2023-10-30T14:13:46.177815+02:00", "EventTime": "2023-10-30T14:13:46.177831+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T20:23:21.585523+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 211. (real time 2023/10/30 14:13:46.244991)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "84a46211-2509-44aa-8869-1f6048c6229c", "DetectTime": "2023-10-30T14:13:46.248915+02:00", "EventTime": "2023-10-30T14:13:46.248925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CTJLo9453C8rSHIk64"]} -{"Format": "IDEA0", "ID": "25f52867-5194-4937-b9ea-8c9b98bcfb0e", "DetectTime": "2023-10-30T14:13:46.275387+02:00", "EventTime": "2023-10-30T14:13:46.275404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CYl7JxI26Lx0cTHs9"]} -{"Format": "IDEA0", "ID": "0064a3a3-c2ef-479f-a3e3-20b23d293db2", "DetectTime": "2023-10-30T14:13:46.302236+02:00", "EventTime": "2023-10-30T14:13:46.302248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["ClQV6l4aimoxtFboqg"]} -{"Format": "IDEA0", "ID": "351728ad-6203-41bb-9ea4-a540cbf5470f", "DetectTime": "2023-10-30T14:13:46.328855+02:00", "EventTime": "2023-10-30T14:13:46.328874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C36uwM1nyl4d6Y8Dt1"]} -{"Format": "IDEA0", "ID": "076eb8e9-3f61-4a0f-9fc3-2d05a335e9dd", "DetectTime": "2023-10-30T14:13:46.352056+02:00", "EventTime": "2023-10-30T14:13:46.352072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Ct4ZQ61zBCuXh6r5D8"]} -{"Format": "IDEA0", "ID": "6f6996b9-c2b3-412d-aafa-7fd01d200f04", "DetectTime": "2023-10-30T14:13:46.375213+02:00", "EventTime": "2023-10-30T14:13:46.375224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Ci3XNd3ZwiE3qR45m"]} -{"Format": "IDEA0", "ID": "6923d58c-f6f1-47d7-bafe-1f026db1653d", "DetectTime": "2023-10-30T14:13:46.396584+02:00", "EventTime": "2023-10-30T14:13:46.396599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CxpIJE4tzTzjZZnI36"]} -{"Format": "IDEA0", "ID": "4f153f5f-0eb8-4377-8b7e-5c3ef8e050f4", "DetectTime": "2023-10-30T14:13:46.419848+02:00", "EventTime": "2023-10-30T14:13:46.419867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C3ZPF91XSJHql3LN47"]} -{"Format": "IDEA0", "ID": "786238f2-f673-4f60-96c5-bc3bc1de9287", "DetectTime": "2023-10-30T14:13:46.440238+02:00", "EventTime": "2023-10-30T14:13:46.440249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CT7HhG4lHCgXWtqqK5"]} -{"Format": "Json", "ID": "786238f2-f673-4f60-96c5-bc3bc1de9287", "DetectTime": "2023-10-30T14:13:46.440238+02:00", "EventTime": "2023-10-30T14:13:46.440249+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T20:23:24.076514+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 211. (real time 2023/10/30 14:13:46.501016)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b405e7f0-e184-40aa-9d0e-34fbde8c588c", "DetectTime": "2023-10-30T14:13:46.505324+02:00", "EventTime": "2023-10-30T14:13:46.505338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPBjnH7p95FE8gEli"]} -{"Format": "IDEA0", "ID": "fc254f88-8dba-49b4-9102-572658daf65b", "DetectTime": "2023-10-30T14:13:46.529817+02:00", "EventTime": "2023-10-30T14:13:46.529833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CIvD4g3QvXcYZQWNA1"]} -{"Format": "IDEA0", "ID": "482713a8-3ee4-4324-b533-6bd27e0f5979", "DetectTime": "2023-10-30T14:13:46.558903+02:00", "EventTime": "2023-10-30T14:13:46.558915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNQzU02q2RaGYZJA7f"]} -{"Format": "IDEA0", "ID": "b8a85415-817a-4dac-af9d-9042df64f48d", "DetectTime": "2023-10-30T14:13:46.583957+02:00", "EventTime": "2023-10-30T14:13:46.583973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtvzVn32mAk65PXom2"]} -{"Format": "IDEA0", "ID": "8f15fe2f-b063-4159-8bc6-76ee62f843f7", "DetectTime": "2023-10-30T14:13:46.604660+02:00", "EventTime": "2023-10-30T14:13:46.604678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CITCEF3ddVuUIb7wt6"]} -{"Format": "IDEA0", "ID": "e0696da0-1864-4038-aeed-bf4f74983f8a", "DetectTime": "2023-10-30T14:13:46.626909+02:00", "EventTime": "2023-10-30T14:13:46.626921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Ctr6xlg0dq239Tpkk"]} -{"Format": "IDEA0", "ID": "9b098a57-4479-41e2-9f2a-9e0e5122795e", "DetectTime": "2023-10-30T14:13:46.646933+02:00", "EventTime": "2023-10-30T14:13:46.646945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CVqXiK1LEsB9aK6P82"]} -{"Format": "IDEA0", "ID": "0b828379-bb13-4023-ac3d-44e5e9a5f345", "DetectTime": "2023-10-30T14:13:46.668093+02:00", "EventTime": "2023-10-30T14:13:46.668109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CCKMWo3G4P3G3NQ771"]} -{"Format": "IDEA0", "ID": "9bb02dec-57db-4b1a-8818-9b43b0f0b5ec", "DetectTime": "2023-10-30T14:13:46.687556+02:00", "EventTime": "2023-10-30T14:13:46.687573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CcXMoC3dcAtPjA9mng"]} -{"Format": "Json", "ID": "9bb02dec-57db-4b1a-8818-9b43b0f0b5ec", "DetectTime": "2023-10-30T14:13:46.687556+02:00", "EventTime": "2023-10-30T14:13:46.687573+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T20:53:33.853338+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 211. (real time 2023/10/30 14:13:46.755807)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "947fdf5d-8940-44f5-af1c-19a0b6da0f39", "DetectTime": "2023-10-30T14:13:46.759810+02:00", "EventTime": "2023-10-30T14:13:46.759822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C236zjHbmvgkrXqq4"]} -{"Format": "IDEA0", "ID": "4a5f94d4-81ca-420d-a552-d273c0541308", "DetectTime": "2023-10-30T14:13:46.783573+02:00", "EventTime": "2023-10-30T14:13:46.783590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CF1PhC4FOf9SgnE7b9"]} -{"Format": "IDEA0", "ID": "3011937a-edfa-4370-9bc9-704057d77ce3", "DetectTime": "2023-10-30T14:13:46.806190+02:00", "EventTime": "2023-10-30T14:13:46.806202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C6qs3615w2ys8Ys7n8"]} -{"Format": "IDEA0", "ID": "f103f779-aae2-431e-8504-54ff8ccceb25", "DetectTime": "2023-10-30T14:13:46.824173+02:00", "EventTime": "2023-10-30T14:13:46.824183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CSTVpp49xxdwWzdoeb"]} -{"Format": "IDEA0", "ID": "ed94530d-a590-4255-9b93-c8c3b616331d", "DetectTime": "2023-10-30T14:13:46.841228+02:00", "EventTime": "2023-10-30T14:13:46.841240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C4yDCh39tjsvxgXH04"]} -{"Format": "IDEA0", "ID": "80f9e03c-3451-420a-be1d-7daabc7cbf61", "DetectTime": "2023-10-30T14:13:46.858303+02:00", "EventTime": "2023-10-30T14:13:46.858313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CBz2Bk1kgz0teK87cj"]} -{"Format": "IDEA0", "ID": "b82d61e7-3d1a-42a7-918f-6d1de0336cdc", "DetectTime": "2023-10-30T14:13:46.876555+02:00", "EventTime": "2023-10-30T14:13:46.876571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CCUweUTOkiLxsRNRb"]} -{"Format": "IDEA0", "ID": "1fe9a937-513e-40f1-9725-cb7d22c6a3a8", "DetectTime": "2023-10-30T14:13:46.894524+02:00", "EventTime": "2023-10-30T14:13:46.894534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cm7mzbIVCp3Qsowc7"]} -{"Format": "IDEA0", "ID": "6dffcaa7-092e-451e-96e3-5f97ee79f87d", "DetectTime": "2023-10-30T14:13:46.912141+02:00", "EventTime": "2023-10-30T14:13:46.912151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CS09Ae4qVyF0VLTfY2"]} -{"Format": "Json", "ID": "6dffcaa7-092e-451e-96e3-5f97ee79f87d", "DetectTime": "2023-10-30T14:13:46.912141+02:00", "EventTime": "2023-10-30T14:13:46.912151+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T20:53:36.028420+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 211. (real time 2023/10/30 14:13:46.966853)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8fbae722-d751-4aaf-86f0-b2658c01542f", "DetectTime": "2023-10-30T14:13:46.970618+02:00", "EventTime": "2023-10-30T14:13:46.970629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CWcTnu10ZQrTYPOAJd"]} -{"Format": "IDEA0", "ID": "eb4c71fc-acd3-4aa6-8ad1-2273e9cd4f0f", "DetectTime": "2023-10-30T14:13:46.986522+02:00", "EventTime": "2023-10-30T14:13:46.986534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CxOt3W3scwIwb2HuLh"]} -{"Format": "IDEA0", "ID": "169ce512-f7a5-4f88-8339-21336a6de250", "DetectTime": "2023-10-30T14:13:47.004319+02:00", "EventTime": "2023-10-30T14:13:47.004335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CglSzL3EBPVRqLeL8b"]} -{"Format": "IDEA0", "ID": "c88d4390-cc89-4de1-b34d-e105407bdaf0", "DetectTime": "2023-10-30T14:13:47.029065+02:00", "EventTime": "2023-10-30T14:13:47.029081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CzgBFE33QsHP68RbJk"]} -{"Format": "IDEA0", "ID": "bfc4ea69-0034-40d8-b96d-6a668e10f452", "DetectTime": "2023-10-30T14:13:47.048304+02:00", "EventTime": "2023-10-30T14:13:47.048318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C33hVE9dN1KVJb3te"]} -{"Format": "IDEA0", "ID": "2a448c23-cc50-448d-a182-51f1509bc57b", "DetectTime": "2023-10-30T14:13:47.065632+02:00", "EventTime": "2023-10-30T14:13:47.065643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CZwFqq44nlATs3ugc"]} -{"Format": "IDEA0", "ID": "8abc8bfb-78d6-472f-bb0b-7e83c45b1a74", "DetectTime": "2023-10-30T14:13:47.082622+02:00", "EventTime": "2023-10-30T14:13:47.082635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CEXgU8TRm9aAxizAl"]} -{"Format": "IDEA0", "ID": "dbf4ab8e-ab81-4412-9adb-7c9d6e4056d2", "DetectTime": "2023-10-30T14:13:47.099038+02:00", "EventTime": "2023-10-30T14:13:47.099049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CrXmSJwv1vGHFFPij"]} -{"Format": "IDEA0", "ID": "756bb781-3080-4168-9faf-1ad66505e564", "DetectTime": "2023-10-30T14:13:47.117898+02:00", "EventTime": "2023-10-30T14:13:47.117913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cqiq6s2br5fEJIjEu9"]} -{"Format": "Json", "ID": "756bb781-3080-4168-9faf-1ad66505e564", "DetectTime": "2023-10-30T14:13:47.117898+02:00", "EventTime": "2023-10-30T14:13:47.117913+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T20:53:38.326164+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 211. (real time 2023/10/30 14:13:47.182537)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c458ac20-d8f2-4492-aa73-37403ba78e1c", "DetectTime": "2023-10-30T14:13:47.186766+02:00", "EventTime": "2023-10-30T14:13:47.186794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CHC02K3CEg6oAEi0zb"]} -{"Format": "IDEA0", "ID": "b3a0534d-8d88-4cd6-81b7-8797f25ff1d3", "DetectTime": "2023-10-30T14:13:47.275909+02:00", "EventTime": "2023-10-30T14:13:47.275921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQuRov1u6tqqnUQjCl"]} -{"Format": "IDEA0", "ID": "3f8bf3f3-a930-4675-b851-7420b84f1e96", "DetectTime": "2023-10-30T14:13:47.297285+02:00", "EventTime": "2023-10-30T14:13:47.297299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNvjZv31xHcjCdMbph"]} -{"Format": "IDEA0", "ID": "e44ff39b-23c4-4546-b090-3cfeb142adff", "DetectTime": "2023-10-30T14:13:47.310690+02:00", "EventTime": "2023-10-30T14:13:47.310701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CEGPQw4olC0JuD407f"]} -{"Format": "IDEA0", "ID": "fe9607e6-20af-426d-b352-2a490cb0c988", "DetectTime": "2023-10-30T14:13:47.325604+02:00", "EventTime": "2023-10-30T14:13:47.325619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CMeyvj1UJSNN4IDnU5"]} -{"Format": "IDEA0", "ID": "5d441357-fecf-46b3-8e7d-e0673928b290", "DetectTime": "2023-10-30T14:13:47.341908+02:00", "EventTime": "2023-10-30T14:13:47.341919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsfmW61Od7sFOvAS26"]} -{"Format": "IDEA0", "ID": "b17e656b-54c3-4eae-9b6c-6982640a58da", "DetectTime": "2023-10-30T14:13:47.367474+02:00", "EventTime": "2023-10-30T14:13:47.367485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6pbM11Yr3OFaOn2l"]} -{"Format": "IDEA0", "ID": "390abffb-1dc2-4432-a74c-40f191549bfc", "DetectTime": "2023-10-30T14:13:47.388645+02:00", "EventTime": "2023-10-30T14:13:47.388657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1YAlr3j1e6kktfk4h"]} -{"Format": "IDEA0", "ID": "e088aa64-c32b-455a-b39f-38715687ca7b", "DetectTime": "2023-10-30T14:13:47.415343+02:00", "EventTime": "2023-10-30T14:13:47.415359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CzJBvk4sLCVc9LpdFj"]} -{"Format": "IDEA0", "ID": "c358c153-bf4d-46fb-a4eb-9cc07ef29a1c", "DetectTime": "2023-10-30T14:13:47.448064+02:00", "EventTime": "2023-10-30T14:13:47.448079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CyQirc2UZ6L4gommcb"]} -{"Format": "IDEA0", "ID": "59b78b1a-6e40-424a-9ca7-88be16edb2da", "DetectTime": "2023-10-30T14:13:47.478216+02:00", "EventTime": "2023-10-30T14:13:47.478236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CVeUOc3H19a9luuvLi"]} -{"Format": "IDEA0", "ID": "150400ed-6038-44e4-9723-415484130a1c", "DetectTime": "2023-10-30T14:13:47.503241+02:00", "EventTime": "2023-10-30T14:13:47.503257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CCegR52WY9m8Irj1f8"]} -{"Format": "IDEA0", "ID": "988980f2-97f0-4dc0-95a3-997db179c38c", "DetectTime": "2023-10-30T14:13:47.528046+02:00", "EventTime": "2023-10-30T14:13:47.528057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C1UK7p2JxXf2qadpy3"]} -{"Format": "IDEA0", "ID": "4d5ce01b-db03-4f66-88d9-901c391c316c", "DetectTime": "2023-10-30T14:13:47.556838+02:00", "EventTime": "2023-10-30T14:13:47.556855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cn1Jrm3eTGdJMz6js4"]} -{"Format": "Json", "ID": "4d5ce01b-db03-4f66-88d9-901c391c316c", "DetectTime": "2023-10-30T14:13:47.556838+02:00", "EventTime": "2023-10-30T14:13:47.556855+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T21:23:58.434161+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 212. (real time 2023/10/30 14:13:47.628720)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "18d3fb44-cde7-4c96-8e8e-862b212ff0ed", "DetectTime": "2023-10-30T14:13:47.634115+02:00", "EventTime": "2023-10-30T14:13:47.634130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CZ7hdEHKiILngKgle"]} -{"Format": "IDEA0", "ID": "66d0d72b-2397-4ddc-892f-ea4038a41224", "DetectTime": "2023-10-30T14:13:47.664017+02:00", "EventTime": "2023-10-30T14:13:47.664028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C2pbst2kMLbZBKI4Vd"]} -{"Format": "IDEA0", "ID": "8e6b4778-e3ff-4beb-8c16-d97dda385fb9", "DetectTime": "2023-10-30T14:13:47.688550+02:00", "EventTime": "2023-10-30T14:13:47.688563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CiylOh3CeD9zLGsAU5"]} -{"Format": "IDEA0", "ID": "967d99c1-e922-4bb7-9f10-33d7c15cdf42", "DetectTime": "2023-10-30T14:13:47.711961+02:00", "EventTime": "2023-10-30T14:13:47.711972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CYNUj12UJTb6kHTMvf"]} -{"Format": "IDEA0", "ID": "150dce8c-ab4c-4ae6-8883-a95daefaa6f9", "DetectTime": "2023-10-30T14:13:47.733714+02:00", "EventTime": "2023-10-30T14:13:47.733728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CeDjVP3la6EU2D2Tte"]} -{"Format": "IDEA0", "ID": "b35d0477-6285-42f7-af28-c2eafc929737", "DetectTime": "2023-10-30T14:13:47.762620+02:00", "EventTime": "2023-10-30T14:13:47.762636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CJEFEd3318nw7HfVfb"]} -{"Format": "IDEA0", "ID": "1ce37299-96de-409d-85e3-bbd459ed1fb4", "DetectTime": "2023-10-30T14:13:47.783295+02:00", "EventTime": "2023-10-30T14:13:47.783310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C1pkom4vkoVOvnLR41"]} -{"Format": "IDEA0", "ID": "67d6a43d-3c7a-4640-9a09-8645c360b3c9", "DetectTime": "2023-10-30T14:13:47.810615+02:00", "EventTime": "2023-10-30T14:13:47.810631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C7uSCw3D8VfjV9DB9j"]} -{"Format": "IDEA0", "ID": "2088deac-4e5e-4581-b62b-7bdeb3410dfd", "DetectTime": "2023-10-30T14:13:47.837894+02:00", "EventTime": "2023-10-30T14:13:47.837912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CIwN8ABm3orm0Masj"]} -{"Format": "Json", "ID": "2088deac-4e5e-4581-b62b-7bdeb3410dfd", "DetectTime": "2023-10-30T14:13:47.837894+02:00", "EventTime": "2023-10-30T14:13:47.837912+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T21:24:01.596205+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 212. (real time 2023/10/30 14:13:47.913237)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd9e3654-6ac4-43dc-af83-6bb000853d02", "DetectTime": "2023-10-30T14:13:47.917600+02:00", "EventTime": "2023-10-30T14:13:47.917611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CK2Wf74CJS0xaAmVH2"]} -{"Format": "IDEA0", "ID": "ccea70ec-7b10-48c6-81f2-4a2776471b05", "DetectTime": "2023-10-30T14:13:47.940517+02:00", "EventTime": "2023-10-30T14:13:47.940531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C6n0IR2HlIsfTrQEe8"]} -{"Format": "IDEA0", "ID": "037dc814-3efd-4459-b484-de85560b6caf", "DetectTime": "2023-10-30T14:13:47.963894+02:00", "EventTime": "2023-10-30T14:13:47.963905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CJnbvP1nBt6ul0sSb1"]} -{"Format": "IDEA0", "ID": "b8993763-308b-4aca-95d8-902a7dd0d781", "DetectTime": "2023-10-30T14:13:47.988626+02:00", "EventTime": "2023-10-30T14:13:47.988641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CIBHoT3u46YjT4ZCV6"]} -{"Format": "IDEA0", "ID": "6bca4390-d68f-426d-8a44-b45f81cdb837", "DetectTime": "2023-10-30T14:13:48.012714+02:00", "EventTime": "2023-10-30T14:13:48.012725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CZYpqc4ssn6QRFNoV9"]} -{"Format": "IDEA0", "ID": "6383460a-f478-4d59-9392-d5c6fcdbb73b", "DetectTime": "2023-10-30T14:13:48.035390+02:00", "EventTime": "2023-10-30T14:13:48.035410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CHKDH21KUqIpWvMqP5"]} -{"Format": "IDEA0", "ID": "8e9062ca-b15e-41c0-a07c-7fcad5586fbc", "DetectTime": "2023-10-30T14:13:48.061949+02:00", "EventTime": "2023-10-30T14:13:48.061965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CDTg8vhksTmK4cgWc"]} -{"Format": "IDEA0", "ID": "d4c0bcbf-6227-44fb-9048-229ebf3b48fc", "DetectTime": "2023-10-30T14:13:48.089796+02:00", "EventTime": "2023-10-30T14:13:48.089812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CUFexC23qpjbv7bid"]} -{"Format": "IDEA0", "ID": "b9b8e5fe-6c1d-439c-bac7-6ab53e791b92", "DetectTime": "2023-10-30T14:13:48.114397+02:00", "EventTime": "2023-10-30T14:13:48.114413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C6rFKn1Em89WW8S3Bf"]} -{"Format": "Json", "ID": "b9b8e5fe-6c1d-439c-bac7-6ab53e791b92", "DetectTime": "2023-10-30T14:13:48.114397+02:00", "EventTime": "2023-10-30T14:13:48.114413+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T21:24:03.271133+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 212. (real time 2023/10/30 14:13:48.188599)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1eb30cb4-08be-42f6-bf79-a9bd61aba325", "DetectTime": "2023-10-30T14:13:48.194038+02:00", "EventTime": "2023-10-30T14:13:48.194054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CGzqq92hV6983jmBsk"]} -{"Format": "IDEA0", "ID": "8dc74caf-ad53-43d2-91a8-7156c4cb3768", "DetectTime": "2023-10-30T14:13:48.219699+02:00", "EventTime": "2023-10-30T14:13:48.219709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CoBYPWhWxesIvwIji"]} -{"Format": "IDEA0", "ID": "0caf6a7e-d416-4d6f-9d20-3df4d7b4a5d8", "DetectTime": "2023-10-30T14:13:48.241251+02:00", "EventTime": "2023-10-30T14:13:48.241263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CMsndz2kLfQu1VuK75"]} -{"Format": "IDEA0", "ID": "b3fb3a6a-c880-407d-85e9-66bb11033523", "DetectTime": "2023-10-30T14:13:48.261169+02:00", "EventTime": "2023-10-30T14:13:48.261182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcJCAA1X8G2MCaoqae"]} -{"Format": "IDEA0", "ID": "a1489ea9-6faa-46de-8972-3d762076488a", "DetectTime": "2023-10-30T14:13:48.278634+02:00", "EventTime": "2023-10-30T14:13:48.278651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CDHxOm3nkqKwWjraei"]} -{"Format": "IDEA0", "ID": "7ac3f92f-ba14-47df-a71e-a7f674bc1c8f", "DetectTime": "2023-10-30T14:13:48.301284+02:00", "EventTime": "2023-10-30T14:13:48.301300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CHKOcj3PcEsYKniHXc"]} -{"Format": "IDEA0", "ID": "a8740a92-a3b4-40b5-860a-bb8c41ac66bf", "DetectTime": "2023-10-30T14:13:48.327285+02:00", "EventTime": "2023-10-30T14:13:48.327301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CMYHBl3SMEFSm2JL2e"]} -{"Format": "IDEA0", "ID": "aadc9960-de92-4be9-ac80-59b4cf17943b", "DetectTime": "2023-10-30T14:13:48.351044+02:00", "EventTime": "2023-10-30T14:13:48.351060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CzezCO1WSl640ilC68"]} -{"Format": "IDEA0", "ID": "94e6dc4e-956d-42a4-b24e-8ae93d033118", "DetectTime": "2023-10-30T14:13:48.371901+02:00", "EventTime": "2023-10-30T14:13:48.371913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C2VxQj9jCWBTNfvdb"]} -{"Format": "IDEA0", "ID": "bfc1893b-ce97-4a8c-894c-f71cb275d563", "DetectTime": "2023-10-30T14:13:48.391972+02:00", "EventTime": "2023-10-30T14:13:48.391983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CnWS6R2Tt8TC6RSp5"]} -{"Format": "Json", "ID": "bfc1893b-ce97-4a8c-894c-f71cb275d563", "DetectTime": "2023-10-30T14:13:48.391972+02:00", "EventTime": "2023-10-30T14:13:48.391983+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T21:54:30.001738+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 212. (real time 2023/10/30 14:13:48.446415)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8ce8da07-77f3-41d8-8222-1b39910b1b39", "DetectTime": "2023-10-30T14:13:48.451791+02:00", "EventTime": "2023-10-30T14:13:48.451809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CZCvzS3jaCPUxvUpNk"]} -{"Format": "IDEA0", "ID": "6afd15a3-4b3b-47f4-a162-6b2cff1bec7b", "DetectTime": "2023-10-30T14:13:48.474553+02:00", "EventTime": "2023-10-30T14:13:48.474569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CV3K632HYUf1rg0Bqe"]} -{"Format": "IDEA0", "ID": "18aa8a50-f28a-41e1-9c3f-4715971a60d2", "DetectTime": "2023-10-30T14:13:48.493684+02:00", "EventTime": "2023-10-30T14:13:48.493695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C44QEDBMOXV2mfip4"]} -{"Format": "IDEA0", "ID": "cc339ca5-b012-466d-8a5e-3be3418b2bc5", "DetectTime": "2023-10-30T14:13:48.510957+02:00", "EventTime": "2023-10-30T14:13:48.510968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CyoLZlMBJfElEcxPk"]} -{"Format": "IDEA0", "ID": "2beac400-c540-471d-92c7-e6de45fdb48f", "DetectTime": "2023-10-30T14:13:48.531492+02:00", "EventTime": "2023-10-30T14:13:48.531503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C0UWYt44rWvmgMujw8"]} -{"Format": "IDEA0", "ID": "43a013a8-56af-4b13-9b61-b1d46c148de6", "DetectTime": "2023-10-30T14:13:48.554243+02:00", "EventTime": "2023-10-30T14:13:48.554260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CGCftJ6QGulfrULNa"]} -{"Format": "IDEA0", "ID": "5d90ab71-1013-4222-8fa7-1e86c31046e1", "DetectTime": "2023-10-30T14:13:48.577295+02:00", "EventTime": "2023-10-30T14:13:48.577311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CwPwNZ1dLXmGmD6BDh"]} -{"Format": "IDEA0", "ID": "caeb09db-d949-453c-824e-c23659a1230d", "DetectTime": "2023-10-30T14:13:48.594244+02:00", "EventTime": "2023-10-30T14:13:48.594254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C9WWGzd0wAz5QKdo9"]} -{"Format": "IDEA0", "ID": "795ae4a5-6c2a-42ea-857d-513c53df2c52", "DetectTime": "2023-10-30T14:13:48.613626+02:00", "EventTime": "2023-10-30T14:13:48.613644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cw5XqKd9RDRxDsOkj"]} -{"Format": "Json", "ID": "795ae4a5-6c2a-42ea-857d-513c53df2c52", "DetectTime": "2023-10-30T14:13:48.613626+02:00", "EventTime": "2023-10-30T14:13:48.613644+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T21:54:31.810499+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 212. (real time 2023/10/30 14:13:48.669354)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3b61a025-8b8b-43dd-880b-77fd9cb1a571", "DetectTime": "2023-10-30T14:13:48.675044+02:00", "EventTime": "2023-10-30T14:13:48.675062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cj8She1KtUjb9pPiTd"]} -{"Format": "IDEA0", "ID": "f4d30333-223d-466b-8859-c60ad7db2749", "DetectTime": "2023-10-30T14:13:48.690402+02:00", "EventTime": "2023-10-30T14:13:48.690413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cz4TH61SNAEv3Livs5"]} -{"Format": "IDEA0", "ID": "52cc6a1c-6e5f-4c65-ae27-3cffc3d3d035", "DetectTime": "2023-10-30T14:13:48.709945+02:00", "EventTime": "2023-10-30T14:13:48.709961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cg4PAi3RDriBiidM5f"]} -{"Format": "IDEA0", "ID": "9e85b3a9-7f50-41c1-9f8c-abe3bd16f899", "DetectTime": "2023-10-30T14:13:48.728827+02:00", "EventTime": "2023-10-30T14:13:48.728844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CiqVPLcuIXcNRobZ8"]} -{"Format": "IDEA0", "ID": "148c121d-ef6b-468d-9e4a-825f98870827", "DetectTime": "2023-10-30T14:13:48.748393+02:00", "EventTime": "2023-10-30T14:13:48.748403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C5TN2i2JmVfroyq3o2"]} -{"Format": "IDEA0", "ID": "0ea1264d-fc18-40d0-84f1-8bd636a1999f", "DetectTime": "2023-10-30T14:13:48.768078+02:00", "EventTime": "2023-10-30T14:13:48.768094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CgxKDvEzp1fbKCpG4"]} -{"Format": "IDEA0", "ID": "71d7d622-fe6f-4831-a3b9-2cfffd52a4e4", "DetectTime": "2023-10-30T14:13:48.786099+02:00", "EventTime": "2023-10-30T14:13:48.786115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CAp59x2auQxHPJjyuk"]} -{"Format": "IDEA0", "ID": "3f72b076-6604-4911-a319-529cc5280b5d", "DetectTime": "2023-10-30T14:13:48.798581+02:00", "EventTime": "2023-10-30T14:13:48.798595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CMn1TQ3oc74v7LEgh9"]} -{"Format": "IDEA0", "ID": "664561ec-2fa3-4b51-b18d-776ca3828673", "DetectTime": "2023-10-30T14:13:48.813592+02:00", "EventTime": "2023-10-30T14:13:48.813603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CSRGUm3ISRInOTB0Bg"]} -{"Format": "Json", "ID": "664561ec-2fa3-4b51-b18d-776ca3828673", "DetectTime": "2023-10-30T14:13:48.813592+02:00", "EventTime": "2023-10-30T14:13:48.813603+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T21:54:34.272383+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 212. (real time 2023/10/30 14:13:48.872689)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8abaf568-8d9e-4d67-9198-12043a49c1a4", "DetectTime": "2023-10-30T14:13:48.878216+02:00", "EventTime": "2023-10-30T14:13:48.878232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CNDUn04MNVO8jABRUf"]} -{"Format": "IDEA0", "ID": "e47c7ee8-5fbe-4621-9afa-27e100352607", "DetectTime": "2023-10-30T14:13:48.898129+02:00", "EventTime": "2023-10-30T14:13:48.898148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CsiU9x2ai1eWuSpZK6"]} -{"Format": "IDEA0", "ID": "ba9f282b-a906-4d04-83f0-b306bdcde9df", "DetectTime": "2023-10-30T14:13:48.912944+02:00", "EventTime": "2023-10-30T14:13:48.912955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CzmFBT34k2SyzKdrY8"]} -{"Format": "IDEA0", "ID": "07d10a46-a37f-496a-b4fd-f066916ca53a", "DetectTime": "2023-10-30T14:13:48.929166+02:00", "EventTime": "2023-10-30T14:13:48.929178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CsBAwu4VD3FIgFbsU7"]} -{"Format": "IDEA0", "ID": "cb423d32-b729-49cf-9f47-325f12376da0", "DetectTime": "2023-10-30T14:13:48.945410+02:00", "EventTime": "2023-10-30T14:13:48.945426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CF78sT1onaPizKLEl1"]} -{"Format": "IDEA0", "ID": "36e137ce-6c4d-4cd1-9ddc-9e02b3f310fa", "DetectTime": "2023-10-30T14:13:48.970765+02:00", "EventTime": "2023-10-30T14:13:48.970793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cg8XUq12D2ThEYkWOh"]} -{"Format": "IDEA0", "ID": "a2795d76-abe6-4086-a86a-d73fb1de336f", "DetectTime": "2023-10-30T14:13:49.003840+02:00", "EventTime": "2023-10-30T14:13:49.003851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cd4oiu12MHAcECwrFd"]} -{"Format": "IDEA0", "ID": "c85cbbef-956a-445f-bcbb-5a02a73f252a", "DetectTime": "2023-10-30T14:13:49.036870+02:00", "EventTime": "2023-10-30T14:13:49.036885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CEuHILVbN8HxNq2bg"]} -{"Format": "IDEA0", "ID": "0e53fa6f-ad6a-4ef6-be4b-d1e1f86cc19c", "DetectTime": "2023-10-30T14:13:49.069815+02:00", "EventTime": "2023-10-30T14:13:49.069831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CvuAl7JUheQUs3sf"]} -{"Format": "IDEA0", "ID": "8b5be8f6-afb6-4508-9971-b5d64c9fcd0e", "DetectTime": "2023-10-30T14:13:49.125232+02:00", "EventTime": "2023-10-30T14:13:49.125255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVc27d3eJAxB2blOTj"]} -{"Format": "IDEA0", "ID": "0034cdcd-f8bb-4a57-859b-5f64253ec0d9", "DetectTime": "2023-10-30T14:13:49.165074+02:00", "EventTime": "2023-10-30T14:13:49.165089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CFULGf4AwxRALQ3Au5"]} -{"Format": "IDEA0", "ID": "8623465e-a77d-4d95-86c6-b1e90cfd2167", "DetectTime": "2023-10-30T14:13:49.202093+02:00", "EventTime": "2023-10-30T14:13:49.202109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cd4ABL1XC9kYYQbkd"]} -{"Format": "IDEA0", "ID": "333326ab-c3fc-40e2-8b72-570c67c0e258", "DetectTime": "2023-10-30T14:13:49.234462+02:00", "EventTime": "2023-10-30T14:13:49.234474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CuLzZr3sKlZxfWscn3"]} -{"Format": "Json", "ID": "333326ab-c3fc-40e2-8b72-570c67c0e258", "DetectTime": "2023-10-30T14:13:49.234462+02:00", "EventTime": "2023-10-30T14:13:49.234474+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T22:24:55.752854+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 213. (real time 2023/10/30 14:13:49.309667)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "10a2b547-83b5-4ed3-9a8f-8b1f1e1d46ba", "DetectTime": "2023-10-30T14:13:49.314018+02:00", "EventTime": "2023-10-30T14:13:49.314028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C0Te1v1zqutXaha2L7"]} -{"Format": "IDEA0", "ID": "f0ad24b7-fc24-412b-864d-1b45431d197f", "DetectTime": "2023-10-30T14:13:49.343380+02:00", "EventTime": "2023-10-30T14:13:49.343395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CSH8eY39suLXoED278"]} -{"Format": "IDEA0", "ID": "23a49988-2bce-4072-91a5-7f890649a4bb", "DetectTime": "2023-10-30T14:13:49.372227+02:00", "EventTime": "2023-10-30T14:13:49.372240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CeBkTy1JjRiC56TYrh"]} -{"Format": "IDEA0", "ID": "14d3ab6e-f74b-430d-88aa-22e8b17b2aca", "DetectTime": "2023-10-30T14:13:49.399457+02:00", "EventTime": "2023-10-30T14:13:49.399469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CM2TtMc6KwL4iW6Fd"]} -{"Format": "IDEA0", "ID": "b72b29e1-0535-4bb5-82bd-6f73113e011c", "DetectTime": "2023-10-30T14:13:49.429664+02:00", "EventTime": "2023-10-30T14:13:49.429680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9YZEI2xW1Xo5Wps1d"]} -{"Format": "IDEA0", "ID": "dde3b60f-acc3-4ef0-9b6a-5136f2dd33f8", "DetectTime": "2023-10-30T14:13:49.459713+02:00", "EventTime": "2023-10-30T14:13:49.459730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C7A41E1OgcmxueUAxc"]} -{"Format": "IDEA0", "ID": "c32a761c-dabc-446c-824d-117836a58ab4", "DetectTime": "2023-10-30T14:13:49.490274+02:00", "EventTime": "2023-10-30T14:13:49.490289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["C1okZu4w7RZfWJsVNd"]} -{"Format": "IDEA0", "ID": "c96c5df4-a5d1-4948-9923-fb79e55f1679", "DetectTime": "2023-10-30T14:13:49.518940+02:00", "EventTime": "2023-10-30T14:13:49.518961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cxwlms2SrxIxjeMp21"]} -{"Format": "Json", "ID": "c96c5df4-a5d1-4948-9923-fb79e55f1679", "DetectTime": "2023-10-30T14:13:49.518940+02:00", "EventTime": "2023-10-30T14:13:49.518961+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T22:24:57.478278+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 213. (real time 2023/10/30 14:13:49.599609)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f3c75ebf-11ab-4121-8b03-e04526959623", "DetectTime": "2023-10-30T14:13:49.605071+02:00", "EventTime": "2023-10-30T14:13:49.605088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjnM0r3diBhx0wVX59"]} -{"Format": "IDEA0", "ID": "82b4dc33-a936-4f18-909b-e6045afa11aa", "DetectTime": "2023-10-30T14:13:49.629678+02:00", "EventTime": "2023-10-30T14:13:49.629699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CV6x5R3KxT2Tz0ewgg"]} -{"Format": "IDEA0", "ID": "94ecd147-bc1f-4720-9994-08c2e9a1c9ac", "DetectTime": "2023-10-30T14:13:49.657914+02:00", "EventTime": "2023-10-30T14:13:49.657929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CtsEEX1f9aCN7KpJ7d"]} -{"Format": "IDEA0", "ID": "5895b938-dc58-4706-bf40-8d8fc0d69ae6", "DetectTime": "2023-10-30T14:13:49.682603+02:00", "EventTime": "2023-10-30T14:13:49.682615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cs0hnQ3kkMbJNWXBng"]} -{"Format": "IDEA0", "ID": "b3d5a69c-55ef-4110-add7-b7b5c1ad7106", "DetectTime": "2023-10-30T14:13:49.705782+02:00", "EventTime": "2023-10-30T14:13:49.705799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CXJ2be1Uq19HOgXU18"]} -{"Format": "IDEA0", "ID": "25143abe-1091-4d9e-94b7-c9eea020353c", "DetectTime": "2023-10-30T14:13:49.733208+02:00", "EventTime": "2023-10-30T14:13:49.733220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CTKrsb44PeOlyVSxuh"]} -{"Format": "IDEA0", "ID": "60f6f2f2-799f-4f28-a97b-631f30806f24", "DetectTime": "2023-10-30T14:13:49.758154+02:00", "EventTime": "2023-10-30T14:13:49.758168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C9fGvd2XXloiBtyle"]} -{"Format": "IDEA0", "ID": "5f28d593-f488-4e20-8b61-baf0c2a51e8a", "DetectTime": "2023-10-30T14:13:49.781582+02:00", "EventTime": "2023-10-30T14:13:49.781594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CUl9mtMsUiupB2lSa"]} -{"Format": "IDEA0", "ID": "36e8206c-3982-42b0-bd3a-e28ad951789f", "DetectTime": "2023-10-30T14:13:49.806808+02:00", "EventTime": "2023-10-30T14:13:49.806831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CsJguw3JQnLtDBfhTk"]} -{"Format": "Json", "ID": "36e8206c-3982-42b0-bd3a-e28ad951789f", "DetectTime": "2023-10-30T14:13:49.806808+02:00", "EventTime": "2023-10-30T14:13:49.806831+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T22:24:59.363370+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 213. (real time 2023/10/30 14:13:49.879567)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d089f2f2-51b6-46fa-a7de-a2bf261b5bc8", "DetectTime": "2023-10-30T14:13:49.884954+02:00", "EventTime": "2023-10-30T14:13:49.884969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CEqnIc2c0p0ZF85Ip8"]} -{"Format": "IDEA0", "ID": "d758444e-18c5-45d1-ac7e-6375d6621a18", "DetectTime": "2023-10-30T14:13:49.905901+02:00", "EventTime": "2023-10-30T14:13:49.905925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CxmBlI2TOGjML7zAQl"]} -{"Format": "IDEA0", "ID": "aedee081-f942-4b7e-908d-d232ac555d51", "DetectTime": "2023-10-30T14:13:49.927693+02:00", "EventTime": "2023-10-30T14:13:49.927706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C4vmkA2oTJuTftOzwj"]} -{"Format": "IDEA0", "ID": "7369696c-4b46-4c7c-8805-9f6e7d74cba2", "DetectTime": "2023-10-30T14:13:49.949321+02:00", "EventTime": "2023-10-30T14:13:49.949333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNjz2jIwIGIveDmYd"]} -{"Format": "IDEA0", "ID": "7f2efb72-1b29-42b6-9e6a-2e1f7e7cd7e5", "DetectTime": "2023-10-30T14:13:49.970345+02:00", "EventTime": "2023-10-30T14:13:49.970371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cp5yJC2hhX8l7WFN4d"]} -{"Format": "IDEA0", "ID": "32371143-365f-4020-8b4c-b864089fb7bc", "DetectTime": "2023-10-30T14:13:49.993479+02:00", "EventTime": "2023-10-30T14:13:49.993494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CaTT4N1839Ml8Qq8wi"]} -{"Format": "IDEA0", "ID": "09ab5391-b8c6-4b9f-81aa-dbcdb430101a", "DetectTime": "2023-10-30T14:13:50.013871+02:00", "EventTime": "2023-10-30T14:13:50.013882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CANWJE1xUSzhwWls"]} -{"Format": "IDEA0", "ID": "f26a22eb-ee42-4e0d-be36-af0d9aa8ae4b", "DetectTime": "2023-10-30T14:13:50.034708+02:00", "EventTime": "2023-10-30T14:13:50.034724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CDget115plClFPQSI4"]} -{"Format": "IDEA0", "ID": "65cb01e7-bf23-479a-8c2b-28e444be0a57", "DetectTime": "2023-10-30T14:13:50.059766+02:00", "EventTime": "2023-10-30T14:13:50.059785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CPSN4c1ztA8lbc7G14"]} -{"Format": "IDEA0", "ID": "553328ef-f1a0-49fa-bb1a-b7e8506b98c4", "DetectTime": "2023-10-30T14:13:50.162724+02:00", "EventTime": "2023-10-30T14:13:50.162736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Cp2W8a3xtkCLAyuile"]} -{"Format": "Json", "ID": "553328ef-f1a0-49fa-bb1a-b7e8506b98c4", "DetectTime": "2023-10-30T14:13:50.162724+02:00", "EventTime": "2023-10-30T14:13:50.162736+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T22:55:11.366906+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 213. (real time 2023/10/30 14:13:50.232279)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86721771-5a7d-433f-9931-f19a40cb8bab", "DetectTime": "2023-10-30T14:13:50.236822+02:00", "EventTime": "2023-10-30T14:13:50.236832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cvxgg41x1KFRiYZpDb"]} -{"Format": "IDEA0", "ID": "e9afafaa-ca04-4e86-9abb-0e70e1156c4c", "DetectTime": "2023-10-30T14:13:50.264233+02:00", "EventTime": "2023-10-30T14:13:50.264250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["COXMlC2PG84vlIWjt3"]} -{"Format": "IDEA0", "ID": "0b1f1980-5e51-4bc4-afa5-098eeb3cf2ac", "DetectTime": "2023-10-30T14:13:50.288920+02:00", "EventTime": "2023-10-30T14:13:50.288936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CFoWSB4iOg1TouTVQb"]} -{"Format": "IDEA0", "ID": "86169df1-9417-49ef-9b27-f863ab1bca82", "DetectTime": "2023-10-30T14:13:50.313539+02:00", "EventTime": "2023-10-30T14:13:50.313557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C6z4JomiOELmzXzw8"]} -{"Format": "IDEA0", "ID": "7a2a159d-0f65-4ae0-a7e1-57ccdd44dc46", "DetectTime": "2023-10-30T14:13:50.338980+02:00", "EventTime": "2023-10-30T14:13:50.338996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CfaP9f1uN9nvm8esd3"]} -{"Format": "IDEA0", "ID": "f24f2023-aa94-4752-b8f1-d5ed2ac2297c", "DetectTime": "2023-10-30T14:13:50.366466+02:00", "EventTime": "2023-10-30T14:13:50.366483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CazD5Y3qs4B0Pmhyaa"]} -{"Format": "IDEA0", "ID": "31383ed6-0512-4474-a62b-9ad6a7ce599b", "DetectTime": "2023-10-30T14:13:50.393555+02:00", "EventTime": "2023-10-30T14:13:50.393571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["ClkFRK2OamqJMQZMKc"]} -{"Format": "IDEA0", "ID": "f4dd29cf-0769-4b12-8323-c16e99099ff9", "DetectTime": "2023-10-30T14:13:50.417497+02:00", "EventTime": "2023-10-30T14:13:50.417512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CE4tfE3hN14slnZpI8"]} -{"Format": "IDEA0", "ID": "649e13f3-f3a7-4e29-b26a-f53e8be68ee8", "DetectTime": "2023-10-30T14:13:50.452700+02:00", "EventTime": "2023-10-30T14:13:50.452722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CFth4W2dCd9jtNz6rf"]} -{"Format": "Json", "ID": "649e13f3-f3a7-4e29-b26a-f53e8be68ee8", "DetectTime": "2023-10-30T14:13:50.452700+02:00", "EventTime": "2023-10-30T14:13:50.452722+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T22:55:13.170400+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 213. (real time 2023/10/30 14:13:50.525325)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b264bfed-f232-4e1c-8636-fa06cd9dc582", "DetectTime": "2023-10-30T14:13:50.530497+02:00", "EventTime": "2023-10-30T14:13:50.530513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CH1wMm3BmWotTE4RY"]} -{"Format": "IDEA0", "ID": "aea58307-9d20-4a12-add8-fbf9587570da", "DetectTime": "2023-10-30T14:13:50.553119+02:00", "EventTime": "2023-10-30T14:13:50.553134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CL7juc2GxjaTv14l6l"]} -{"Format": "IDEA0", "ID": "f569fd95-d37d-4d1a-985d-7aa31f5feed0", "DetectTime": "2023-10-30T14:13:50.574861+02:00", "EventTime": "2023-10-30T14:13:50.574880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CuNOj72rghWae5bzi6"]} -{"Format": "IDEA0", "ID": "090d3f72-938f-4612-a51c-15b1a92b8b74", "DetectTime": "2023-10-30T14:13:50.602664+02:00", "EventTime": "2023-10-30T14:13:50.602681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CerN3z26nsDRad48ne"]} -{"Format": "IDEA0", "ID": "e270edb6-20e8-442e-a4e0-f91673e6226e", "DetectTime": "2023-10-30T14:13:50.632780+02:00", "EventTime": "2023-10-30T14:13:50.632797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyHbvsqeVwzM0gi4k"]} -{"Format": "IDEA0", "ID": "30016d3e-ea43-4257-9c0d-8fd9468f372d", "DetectTime": "2023-10-30T14:13:50.654896+02:00", "EventTime": "2023-10-30T14:13:50.654919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CX3o5A4CdgLSL1t7L9"]} -{"Format": "IDEA0", "ID": "7354ab22-ef22-4ba5-a4f6-1ed66022185b", "DetectTime": "2023-10-30T14:13:50.677175+02:00", "EventTime": "2023-10-30T14:13:50.677191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["C07E2A3aZs8y0t3gLc"]} -{"Format": "IDEA0", "ID": "40403eda-f698-4b70-8a8a-335aa44841ef", "DetectTime": "2023-10-30T14:13:50.699998+02:00", "EventTime": "2023-10-30T14:13:50.700016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CRlQZu4D1JE4GP4FF"]} -{"Format": "IDEA0", "ID": "e259217a-884f-47ea-b666-3ee346a50863", "DetectTime": "2023-10-30T14:13:50.719995+02:00", "EventTime": "2023-10-30T14:13:50.720010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CqItyfO7yBP8kwtpl"]} -{"Format": "Json", "ID": "e259217a-884f-47ea-b666-3ee346a50863", "DetectTime": "2023-10-30T14:13:50.719995+02:00", "EventTime": "2023-10-30T14:13:50.720010+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T22:55:14.762530+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 213. (real time 2023/10/30 14:13:50.784986)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c27bfa48-e414-4f34-9d0b-abc91db17a6c", "DetectTime": "2023-10-30T14:13:50.789997+02:00", "EventTime": "2023-10-30T14:13:50.790011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C0HxTF3yp3DLqEGJme"]} -{"Format": "IDEA0", "ID": "cde56dbe-dbff-4d96-bf81-69b12e309d68", "DetectTime": "2023-10-30T14:13:50.815136+02:00", "EventTime": "2023-10-30T14:13:50.815151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CNUrKy4HiDDNEqtdna"]} -{"Format": "IDEA0", "ID": "1403d590-4eb8-4b83-bf1e-f029705290ae", "DetectTime": "2023-10-30T14:13:50.834370+02:00", "EventTime": "2023-10-30T14:13:50.834387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXooZ5E13hBq3ajSc"]} -{"Format": "IDEA0", "ID": "e5d5ce77-c7ba-46de-bfe2-39b94dc2b61b", "DetectTime": "2023-10-30T14:13:50.851885+02:00", "EventTime": "2023-10-30T14:13:50.851901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYDjy33nYdRapLz96a"]} -{"Format": "IDEA0", "ID": "b891a39e-3b11-47e8-b1c3-677016297960", "DetectTime": "2023-10-30T14:13:50.878168+02:00", "EventTime": "2023-10-30T14:13:50.878184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Czaq1K3YCojzRYDVgl"]} -{"Format": "IDEA0", "ID": "69d9cff5-07cc-4806-8d37-b96bbca014e3", "DetectTime": "2023-10-30T14:13:50.899424+02:00", "EventTime": "2023-10-30T14:13:50.899440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cog9xC1VqBVepoW7Zd"]} -{"Format": "IDEA0", "ID": "e316a9f4-82e2-4241-b7a4-8bea054085ab", "DetectTime": "2023-10-30T14:13:50.925657+02:00", "EventTime": "2023-10-30T14:13:50.925672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CWhrTa3DO05bTdcVn6"]} -{"Format": "IDEA0", "ID": "de138e22-7b02-4242-8bb8-de27b40557ad", "DetectTime": "2023-10-30T14:13:50.950964+02:00", "EventTime": "2023-10-30T14:13:50.950980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C6qVfF48o0il81ZD8l"]} -{"Format": "IDEA0", "ID": "01f0dd10-98a4-4599-ac20-8621a9528ec0", "DetectTime": "2023-10-30T14:13:50.969469+02:00", "EventTime": "2023-10-30T14:13:50.969484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C1pgx331CfsC208Mwl"]} -{"Format": "IDEA0", "ID": "8bc0a149-b98a-4e04-9d99-ff8d25ec2c54", "DetectTime": "2023-10-30T14:13:50.995178+02:00", "EventTime": "2023-10-30T14:13:50.995193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLO9eCMY02vCsDyr4"]} -{"Format": "IDEA0", "ID": "b967f1a0-6691-43f4-9452-806e62b36f44", "DetectTime": "2023-10-30T14:13:51.035216+02:00", "EventTime": "2023-10-30T14:13:51.035232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYN2NV1yk37kfLVLxg"]} -{"Format": "IDEA0", "ID": "2a139bf5-71ca-4948-83a4-f64868c51077", "DetectTime": "2023-10-30T14:13:51.062897+02:00", "EventTime": "2023-10-30T14:13:51.062914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cgzdx44t3zCR9nQGKh"]} -{"Format": "IDEA0", "ID": "fc23f76f-40c3-4eca-a4a6-9733b8d9f84f", "DetectTime": "2023-10-30T14:13:51.098282+02:00", "EventTime": "2023-10-30T14:13:51.098294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CVzmp83Q11UySIkaMc"]} -{"Format": "IDEA0", "ID": "2d08e165-8454-4d15-8a00-d3df2aefe0af", "DetectTime": "2023-10-30T14:13:51.136091+02:00", "EventTime": "2023-10-30T14:13:51.136182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CAbWQ4zjSj77bSDpj"]} -{"Format": "IDEA0", "ID": "8182d53c-db39-45e1-a069-c7c4f118cae4", "DetectTime": "2023-10-30T14:13:51.162525+02:00", "EventTime": "2023-10-30T14:13:51.162541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cs4VgM1dXddhgDgFXe"]} -{"Format": "IDEA0", "ID": "80776256-425e-4eca-a515-66ee56020e1f", "DetectTime": "2023-10-30T14:13:51.187060+02:00", "EventTime": "2023-10-30T14:13:51.187076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CaUegg4sFRhBk7xuvf"]} -{"Format": "IDEA0", "ID": "ceae523d-078d-4ddb-be64-a7ad56d78dbf", "DetectTime": "2023-10-30T14:13:51.223840+02:00", "EventTime": "2023-10-30T14:13:51.223857+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CiPJxb2FOMVFni8m6"]} -{"Format": "IDEA0", "ID": "72a05939-032a-489d-882a-9020ef89c2ce", "DetectTime": "2023-10-30T14:13:51.265692+02:00", "EventTime": "2023-10-30T14:13:51.265703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CQXo6P30YgObTNjIS9"]} -{"Format": "IDEA0", "ID": "1a7fdac8-1752-40cd-8818-d2efe8a529cf", "DetectTime": "2023-10-30T14:13:51.299363+02:00", "EventTime": "2023-10-30T14:13:51.299375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CRIU9p1B0wi7HvBzy5"]} -{"Format": "IDEA0", "ID": "2fc10727-4848-4abd-aa37-e9c0cc58750d", "DetectTime": "2023-10-30T14:13:51.331061+02:00", "EventTime": "2023-10-30T14:13:51.331076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CvCmYU1F8m6L4wYPF4"]} -{"Format": "Json", "ID": "2fc10727-4848-4abd-aa37-e9c0cc58750d", "DetectTime": "2023-10-30T14:13:51.331061+02:00", "EventTime": "2023-10-30T14:13:51.331076+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T23:25:30.831932+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 214. (real time 2023/10/30 14:13:51.416094)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "038dca43-31f1-485c-94e9-0a2542328080", "DetectTime": "2023-10-30T14:13:51.420537+02:00", "EventTime": "2023-10-30T14:13:51.420550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3oY0w3j5RzvbJ2Ifc"]} -{"Format": "IDEA0", "ID": "f4e96d7d-970b-49b7-96e5-58dafbdf21cb", "DetectTime": "2023-10-30T14:13:51.440649+02:00", "EventTime": "2023-10-30T14:13:51.440660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Czy91N3fziR2IiNxCk"]} -{"Format": "IDEA0", "ID": "578b52e0-dc5e-4f93-b806-0e840d5fe9f1", "DetectTime": "2023-10-30T14:13:51.475486+02:00", "EventTime": "2023-10-30T14:13:51.475501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CJb7082jtXuqmGNtw2"]} -{"Format": "IDEA0", "ID": "144340ad-a9d2-44a2-8399-59ba7669eab7", "DetectTime": "2023-10-30T14:13:51.498758+02:00", "EventTime": "2023-10-30T14:13:51.498770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CsMCEVbWNrVN3hgI9"]} -{"Format": "IDEA0", "ID": "2f3cf330-f80b-432e-a52f-34473c383da8", "DetectTime": "2023-10-30T14:13:51.529117+02:00", "EventTime": "2023-10-30T14:13:51.529132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CQBH4y4xSnQvlQJtye"]} -{"Format": "IDEA0", "ID": "b921e3b9-825a-4781-8bae-fcd2b224ce15", "DetectTime": "2023-10-30T14:13:51.554496+02:00", "EventTime": "2023-10-30T14:13:51.554511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ChLhNI3yIPSiX2FX65"]} -{"Format": "IDEA0", "ID": "57042d8c-59e4-49b7-83a2-c3a08cad17be", "DetectTime": "2023-10-30T14:13:51.588949+02:00", "EventTime": "2023-10-30T14:13:51.588965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CevhnY2SzDjiGjym3i"]} -{"Format": "IDEA0", "ID": "9bee7dc0-5033-421a-92b4-ed618782963d", "DetectTime": "2023-10-30T14:13:51.612690+02:00", "EventTime": "2023-10-30T14:13:51.612707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CIBciKiIsBQTURGb9"]} -{"Format": "IDEA0", "ID": "759d07ca-a71e-4afe-82a6-47f6e69f128a", "DetectTime": "2023-10-30T14:13:51.631301+02:00", "EventTime": "2023-10-30T14:13:51.631316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CuW0gO166V8w9IKEFh"]} -{"Format": "IDEA0", "ID": "4d249746-b898-4392-aac8-2d0c30494603", "DetectTime": "2023-10-30T14:13:51.664247+02:00", "EventTime": "2023-10-30T14:13:51.664262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CAXnFD3CsK60bmzd14"]} -{"Format": "IDEA0", "ID": "db6cba12-6f12-4170-9c76-c67692989bfc", "DetectTime": "2023-10-30T14:13:51.689102+02:00", "EventTime": "2023-10-30T14:13:51.689117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cxxd1W2okAsi6GVJXa"]} -{"Format": "IDEA0", "ID": "fdeb1987-0546-4ceb-bdcd-8d67e644b3da", "DetectTime": "2023-10-30T14:13:51.709566+02:00", "EventTime": "2023-10-30T14:13:51.709582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CqObDC4iccpzMJwnb9"]} -{"Format": "IDEA0", "ID": "86868134-2a01-40d8-9ae5-0bb112d4124b", "DetectTime": "2023-10-30T14:13:51.740256+02:00", "EventTime": "2023-10-30T14:13:51.740272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CWdpleCWSyA0HOG6k"]} -{"Format": "IDEA0", "ID": "66f3446c-bb1e-4eef-bb05-ca7cafaa4daa", "DetectTime": "2023-10-30T14:13:51.764602+02:00", "EventTime": "2023-10-30T14:13:51.764617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CMqH1XwnbRI7Cj8Zk"]} -{"Format": "IDEA0", "ID": "89ca9db4-6ed5-45c0-8e26-ba689259b617", "DetectTime": "2023-10-30T14:13:51.788316+02:00", "EventTime": "2023-10-30T14:13:51.788331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CrnnZZRDewjFUAeQk"]} -{"Format": "IDEA0", "ID": "2a1b24d2-e5fe-413d-87ae-25148e9c8dcf", "DetectTime": "2023-10-30T14:13:51.818706+02:00", "EventTime": "2023-10-30T14:13:51.818717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cx74Wc2f55Zt9RGXJ4"]} -{"Format": "IDEA0", "ID": "4ef953fd-bc13-4545-93d2-462aa202a5ea", "DetectTime": "2023-10-30T14:13:51.836330+02:00", "EventTime": "2023-10-30T14:13:51.836346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CdJ4K54NiNl4oVNy53"]} -{"Format": "IDEA0", "ID": "01e6a411-d4b1-467a-a6ba-45e36da0cec1", "DetectTime": "2023-10-30T14:13:51.857310+02:00", "EventTime": "2023-10-30T14:13:51.857327+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CS80Vp27D8kzi41WJa"]} -{"Format": "IDEA0", "ID": "95899773-2efb-4449-b703-f36c50639361", "DetectTime": "2023-10-30T14:13:51.876417+02:00", "EventTime": "2023-10-30T14:13:51.876433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cd27tb4kNX563pSTDd"]} -{"Format": "IDEA0", "ID": "5d5b4f80-f61b-4cd2-9a6e-09676c1fd400", "DetectTime": "2023-10-30T14:13:51.895760+02:00", "EventTime": "2023-10-30T14:13:51.895777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CsGDE441FoH7UuskYb"]} -{"Format": "IDEA0", "ID": "bab4bca2-2f37-4909-8a5c-28c5a0a8de5f", "DetectTime": "2023-10-30T14:13:51.923879+02:00", "EventTime": "2023-10-30T14:13:51.923890+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7x05g3jaaolKmZrd1"]} -{"Format": "IDEA0", "ID": "6f83465e-708c-4ceb-bcf9-e143802c5d04", "DetectTime": "2023-10-30T14:13:51.948786+02:00", "EventTime": "2023-10-30T14:13:51.948801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C3R5eo2Mcv97w1idld"]} -{"Format": "IDEA0", "ID": "d1ac7f0a-9b3c-46f5-8370-4f6fd2c5fdf0", "DetectTime": "2023-10-30T14:13:51.972560+02:00", "EventTime": "2023-10-30T14:13:51.972571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Colaqx2BZ8by93emjf"]} -{"Format": "IDEA0", "ID": "6d6c9628-7b1c-4e65-b8be-58fc7ebefea5", "DetectTime": "2023-10-30T14:13:51.987751+02:00", "EventTime": "2023-10-30T14:13:51.987762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CxAvBv2yLq42aGIOrg"]} -{"Format": "IDEA0", "ID": "c228d736-2419-4cfa-8cef-aab5da88155c", "DetectTime": "2023-10-30T14:13:52.001316+02:00", "EventTime": "2023-10-30T14:13:52.001332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CGhKsE4S8MuQkkxJE6"]} -{"Format": "IDEA0", "ID": "bbc53a66-7f96-4eae-a443-198b66c8c1ac", "DetectTime": "2023-10-30T14:13:52.015881+02:00", "EventTime": "2023-10-30T14:13:52.015893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CekHDP2mMtZJNrn7r5"]} -{"Format": "IDEA0", "ID": "d60a6cca-234a-4cfc-9759-d02e28d0fd59", "DetectTime": "2023-10-30T14:13:52.030730+02:00", "EventTime": "2023-10-30T14:13:52.030741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CVjGTp2u3ktKGvyOc8"]} -{"Format": "IDEA0", "ID": "bc550d32-1b4b-4df7-9434-2ae50aa90493", "DetectTime": "2023-10-30T14:13:52.044703+02:00", "EventTime": "2023-10-30T14:13:52.044718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CUI4to3saht1R0sr9f"]} -{"Format": "Json", "ID": "bc550d32-1b4b-4df7-9434-2ae50aa90493", "DetectTime": "2023-10-30T14:13:52.044703+02:00", "EventTime": "2023-10-30T14:13:52.044718+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T23:25:32.832389+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 214. (real time 2023/10/30 14:13:52.105725)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fbd8c2af-2c2e-4016-9c6c-43e95c900c02", "DetectTime": "2023-10-30T14:13:52.110952+02:00", "EventTime": "2023-10-30T14:13:52.110967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CS5Fub2R2gWpLO30P4"]} -{"Format": "IDEA0", "ID": "8befdf21-b03c-4e4f-b3a0-1c1df4015b2b", "DetectTime": "2023-10-30T14:13:52.194962+02:00", "EventTime": "2023-10-30T14:13:52.194974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C6bOwzG8mISFbVRsf"]} -{"Format": "IDEA0", "ID": "953b9b95-e9b1-4576-aa26-2f2b94997d44", "DetectTime": "2023-10-30T14:13:52.209856+02:00", "EventTime": "2023-10-30T14:13:52.209866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CpfZY72Pk8BV3wBC9"]} -{"Format": "IDEA0", "ID": "fe15cb24-7d7f-4a1d-88c5-fee569dfd350", "DetectTime": "2023-10-30T14:13:52.224260+02:00", "EventTime": "2023-10-30T14:13:52.224270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CZAFdx2LHGuYPlV6S4"]} -{"Format": "IDEA0", "ID": "022cbdfb-a3e8-46e4-ab01-4b465c745e74", "DetectTime": "2023-10-30T14:13:52.239939+02:00", "EventTime": "2023-10-30T14:13:52.239951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CH1mjZ1Eu1MdKIfoJc"]} -{"Format": "IDEA0", "ID": "7c0895b5-9415-461c-9177-29293992072b", "DetectTime": "2023-10-30T14:13:52.254328+02:00", "EventTime": "2023-10-30T14:13:52.254343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CoeuNH6ROoHjRFA5f"]} -{"Format": "IDEA0", "ID": "22dcc317-38d4-41fe-a2a5-4888a14761c7", "DetectTime": "2023-10-30T14:13:52.268713+02:00", "EventTime": "2023-10-30T14:13:52.268723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cp3WB41xr2VLwvt6g"]} -{"Format": "IDEA0", "ID": "0c473cf4-4875-4c9b-8e47-9bb6ade7b7b4", "DetectTime": "2023-10-30T14:13:52.283543+02:00", "EventTime": "2023-10-30T14:13:52.283553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C8FREx3orUB5GdrBBf"]} -{"Format": "IDEA0", "ID": "a722387a-355b-45c2-9b86-1d30f9d98308", "DetectTime": "2023-10-30T14:13:52.297776+02:00", "EventTime": "2023-10-30T14:13:52.297791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C3QUTo1OCwhmrGVcvg"]} -{"Format": "IDEA0", "ID": "b39abe22-8bc0-405f-ad81-6d8038393981", "DetectTime": "2023-10-30T14:13:52.312702+02:00", "EventTime": "2023-10-30T14:13:52.312712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ChDWwi1QVCwJW6lI5j"]} -{"Format": "IDEA0", "ID": "609cf3dc-f4c7-4480-8272-ddda4cab49e7", "DetectTime": "2023-10-30T14:13:52.324637+02:00", "EventTime": "2023-10-30T14:13:52.324647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CRQL6K39StUo04Ius"]} -{"Format": "IDEA0", "ID": "84679ca5-c56a-4597-922d-a6d74101cc95", "DetectTime": "2023-10-30T14:13:52.337944+02:00", "EventTime": "2023-10-30T14:13:52.337955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CUtUgaZ0MTHIouUc"]} -{"Format": "IDEA0", "ID": "d59f284d-ffe0-4ae7-a0f0-30b886972d48", "DetectTime": "2023-10-30T14:13:52.353058+02:00", "EventTime": "2023-10-30T14:13:52.353072+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSch2z1uEMRV3RVPM"]} -{"Format": "IDEA0", "ID": "8a25ee53-be50-4eb8-a86a-74413881da6f", "DetectTime": "2023-10-30T14:13:52.385221+02:00", "EventTime": "2023-10-30T14:13:52.385235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Clo4Ur2Xas1iEghR9g"]} -{"Format": "IDEA0", "ID": "4ef91ef8-fb25-42d6-b794-0a3a1a2982e8", "DetectTime": "2023-10-30T14:13:52.402839+02:00", "EventTime": "2023-10-30T14:13:52.402854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CaFn333y7zEto7Mr81"]} -{"Format": "IDEA0", "ID": "ad6e7fbd-2842-48a1-b7aa-0b6faaae853a", "DetectTime": "2023-10-30T14:13:52.420623+02:00", "EventTime": "2023-10-30T14:13:52.420637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CtbVSLy3DzwiHh569"]} -{"Format": "IDEA0", "ID": "eaee50d9-ff65-4f8a-a640-821fb66d1c97", "DetectTime": "2023-10-30T14:13:52.436579+02:00", "EventTime": "2023-10-30T14:13:52.436590+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CsHk2a14eLpVONdfHj"]} -{"Format": "IDEA0", "ID": "5fa36fe5-352d-4858-b190-552f62a1652a", "DetectTime": "2023-10-30T14:13:52.453366+02:00", "EventTime": "2023-10-30T14:13:52.453380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CslMmt2edxx0eOzth1"]} -{"Format": "IDEA0", "ID": "ac71178f-cdd9-4627-af2d-3a62daac6b9e", "DetectTime": "2023-10-30T14:13:52.470607+02:00", "EventTime": "2023-10-30T14:13:52.470621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CyrSpC4ePlOI7tE9hj"]} -{"Format": "IDEA0", "ID": "e708dd68-f065-4626-a1e1-cc75318f3897", "DetectTime": "2023-10-30T14:13:52.488535+02:00", "EventTime": "2023-10-30T14:13:52.488550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C8OjlW1jPq2M3ZUyQ8"]} -{"Format": "IDEA0", "ID": "c7c22510-1c3b-4727-816e-52fd67af8dcb", "DetectTime": "2023-10-30T14:13:52.505644+02:00", "EventTime": "2023-10-30T14:13:52.505659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C84Gwa3QU8RV7Mx055"]} -{"Format": "IDEA0", "ID": "973b6c76-bfc8-47a0-87bc-a257287260b6", "DetectTime": "2023-10-30T14:13:52.522280+02:00", "EventTime": "2023-10-30T14:13:52.522294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cv7ix447hCvh5bgWq"]} -{"Format": "IDEA0", "ID": "a5e058a8-087b-4529-9684-69ec359aab9a", "DetectTime": "2023-10-30T14:13:52.538737+02:00", "EventTime": "2023-10-30T14:13:52.538751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CMdzNM1yF44KpUTwTf"]} -{"Format": "IDEA0", "ID": "33875554-8b49-4492-8514-4825623e2f06", "DetectTime": "2023-10-30T14:13:52.568610+02:00", "EventTime": "2023-10-30T14:13:52.568624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CUrOrE3VMSAsn8lvF7"]} -{"Format": "IDEA0", "ID": "f9a40ef6-08bb-4c8d-8eed-5bd80dff3c6a", "DetectTime": "2023-10-30T14:13:52.585981+02:00", "EventTime": "2023-10-30T14:13:52.585996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CC68Db4kbYKSj0ejz1"]} -{"Format": "IDEA0", "ID": "522e4505-0a0e-4a8e-8d7c-0f50769d85b0", "DetectTime": "2023-10-30T14:13:52.604425+02:00", "EventTime": "2023-10-30T14:13:52.604441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CYRIrH32Ry7eVvnCb3"]} -{"Format": "IDEA0", "ID": "888cca95-fb71-4b48-a408-239e58271bdb", "DetectTime": "2023-10-30T14:13:52.623552+02:00", "EventTime": "2023-10-30T14:13:52.623568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CH24epJW5kELsdjP3"]} -{"Format": "IDEA0", "ID": "8ccd608d-8c67-4ecc-8a60-044e80d49c0b", "DetectTime": "2023-10-30T14:13:52.642947+02:00", "EventTime": "2023-10-30T14:13:52.642973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C3zM9A2ZF6KC89Xbda"]} -{"Format": "IDEA0", "ID": "77ab82b8-6a28-4cc1-a524-997401e03654", "DetectTime": "2023-10-30T14:13:52.658687+02:00", "EventTime": "2023-10-30T14:13:52.658704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CUuN4LZFl13SmHRb"]} -{"Format": "IDEA0", "ID": "3527a07a-ed5f-44b1-9160-52cd09d20643", "DetectTime": "2023-10-30T14:13:52.674289+02:00", "EventTime": "2023-10-30T14:13:52.674299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CQViC94TCwSEj45nW3"]} -{"Format": "IDEA0", "ID": "ae0e2b95-9b2e-4fb0-a33e-f74614c25dea", "DetectTime": "2023-10-30T14:13:52.689301+02:00", "EventTime": "2023-10-30T14:13:52.689311+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CsPzdK1FcRcSUJDeEh"]} -{"Format": "IDEA0", "ID": "583e7b27-15b1-4b62-a34c-0309b6417ef5", "DetectTime": "2023-10-30T14:13:52.702461+02:00", "EventTime": "2023-10-30T14:13:52.702472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CAOatj1rIaITZqXbUj"]} -{"Format": "IDEA0", "ID": "43010140-d2fb-4c19-9738-17fccb85df00", "DetectTime": "2023-10-30T14:13:52.715395+02:00", "EventTime": "2023-10-30T14:13:52.715405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C4CpQtaX3mIz475W3"]} -{"Format": "IDEA0", "ID": "ec42c69b-a4ba-4dd4-9569-d9936a2d89b3", "DetectTime": "2023-10-30T14:13:52.740737+02:00", "EventTime": "2023-10-30T14:13:52.740747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CMxlmr0esvjS3ePP7"]} -{"Format": "IDEA0", "ID": "b93d68b1-8220-4a4e-9752-4ce6323df191", "DetectTime": "2023-10-30T14:13:52.756694+02:00", "EventTime": "2023-10-30T14:13:52.756705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CKCsnJ1SEqTgK8zlx6"]} -{"Format": "IDEA0", "ID": "7e5be3c7-6a13-423a-b8d2-2537fd742e6d", "DetectTime": "2023-10-30T14:13:52.770214+02:00", "EventTime": "2023-10-30T14:13:52.770229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CkPQXf10tgY26Mt0i6"]} -{"Format": "IDEA0", "ID": "fa8f0f83-906c-463a-97e3-da2c323cc8b9", "DetectTime": "2023-10-30T14:13:52.784897+02:00", "EventTime": "2023-10-30T14:13:52.784908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CPRF0B2FmPaFy1gYtl"]} -{"Format": "IDEA0", "ID": "9dd0c8dd-b3c2-4a51-9d2b-aba461596683", "DetectTime": "2023-10-30T14:13:52.801051+02:00", "EventTime": "2023-10-30T14:13:52.801062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CoSxhF1REduVNKloSk"]} -{"Format": "IDEA0", "ID": "c442fc2e-8869-4c62-9ef0-5b50c6fad6cc", "DetectTime": "2023-10-30T14:13:52.814162+02:00", "EventTime": "2023-10-30T14:13:52.814172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CAtZMm1c4ildHokWZc"]} -{"Format": "IDEA0", "ID": "633b24c8-4561-4ef5-ae1a-67a83490914b", "DetectTime": "2023-10-30T14:13:52.826106+02:00", "EventTime": "2023-10-30T14:13:52.826116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CVSjrJ2GA7GLw5XHLg"]} -{"Format": "IDEA0", "ID": "21890091-721d-47b0-a2fe-f2d615afc340", "DetectTime": "2023-10-30T14:13:52.837713+02:00", "EventTime": "2023-10-30T14:13:52.837722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CQFKX0492YXaEcSS14"]} -{"Format": "IDEA0", "ID": "908f1afb-7abc-46aa-ac89-a7be19583da7", "DetectTime": "2023-10-30T14:13:52.851469+02:00", "EventTime": "2023-10-30T14:13:52.851479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CxzMsk2ew8f4WW7izk"]} -{"Format": "IDEA0", "ID": "6729b9f1-4f98-4f99-acb3-42ea42e3ff0f", "DetectTime": "2023-10-30T14:13:52.863974+02:00", "EventTime": "2023-10-30T14:13:52.863985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CHc2Qgr2REH7q7KLj"]} -{"Format": "IDEA0", "ID": "22e5aedd-3fe5-4199-a165-f6b7189e5139", "DetectTime": "2023-10-30T14:13:52.875940+02:00", "EventTime": "2023-10-30T14:13:52.875950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQHvtq1dypqXkXxcak"]} -{"Format": "IDEA0", "ID": "97c3c6e4-2c9f-4f77-aca9-b02ceff9c406", "DetectTime": "2023-10-30T14:13:52.891200+02:00", "EventTime": "2023-10-30T14:13:52.891210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CaHU5S18UV8sTc7yI4"]} -{"Format": "IDEA0", "ID": "20217f18-ba72-47cb-9514-baf42aafc4ca", "DetectTime": "2023-10-30T14:13:52.913937+02:00", "EventTime": "2023-10-30T14:13:52.913948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CF6JuG1IvomiaEsM4"]} -{"Format": "IDEA0", "ID": "7d8f075e-409e-4eab-8689-d74b1a5f1320", "DetectTime": "2023-10-30T14:13:52.926971+02:00", "EventTime": "2023-10-30T14:13:52.926984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ck6Jvl3dH5oVwfLBt6"]} -{"Format": "IDEA0", "ID": "2ce6b15e-0bc1-43e7-9e47-db1017b43ffc", "DetectTime": "2023-10-30T14:13:52.939922+02:00", "EventTime": "2023-10-30T14:13:52.939933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CQY03I3ZHw2fq3hsGl"]} -{"Format": "IDEA0", "ID": "aadde13c-9aa8-4c43-ab27-f782b2994e66", "DetectTime": "2023-10-30T14:13:52.954947+02:00", "EventTime": "2023-10-30T14:13:52.954963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CChlvG35xjDvJl5HJ4"]} -{"Format": "IDEA0", "ID": "512bb938-29e1-4f90-8103-fe5a4721cbaa", "DetectTime": "2023-10-30T14:13:52.971463+02:00", "EventTime": "2023-10-30T14:13:52.971478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CfA8Sc4HWaaRd5pkng"]} -{"Format": "IDEA0", "ID": "d7971126-855e-465b-be1e-a52d17c88265", "DetectTime": "2023-10-30T14:13:52.997446+02:00", "EventTime": "2023-10-30T14:13:52.997456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Ckfp861xbUYd2LTwok"]} -{"Format": "IDEA0", "ID": "dee23b6a-c858-4141-93ae-df915ad6224b", "DetectTime": "2023-10-30T14:13:53.012688+02:00", "EventTime": "2023-10-30T14:13:53.012704+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBI8KjSVeHw6DC4wk"]} -{"Format": "IDEA0", "ID": "548e2148-78bb-40e2-9ee5-4b8b24b6b654", "DetectTime": "2023-10-30T14:13:53.029678+02:00", "EventTime": "2023-10-30T14:13:53.029689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CwdEQ325xGxaeToH6f"]} -{"Format": "IDEA0", "ID": "2f430339-35fc-41ef-81c9-9899c3e58285", "DetectTime": "2023-10-30T14:13:53.046058+02:00", "EventTime": "2023-10-30T14:13:53.046074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CDHUIM29P8TIoNoPjg"]} -{"Format": "IDEA0", "ID": "4b629e42-b711-4634-ad50-646459efca8d", "DetectTime": "2023-10-30T14:13:53.062613+02:00", "EventTime": "2023-10-30T14:13:53.062628+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CdUY8CbDyNi1Gywe5"]} -{"Format": "IDEA0", "ID": "865ac15a-5391-45af-b2f4-5043390c299f", "DetectTime": "2023-10-30T14:13:53.078976+02:00", "EventTime": "2023-10-30T14:13:53.078992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CV572n4UnYUMNzr8yk"]} -{"Format": "IDEA0", "ID": "aabdd474-eb02-4604-8e64-af40d07d99ed", "DetectTime": "2023-10-30T14:13:53.094882+02:00", "EventTime": "2023-10-30T14:13:53.094898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CLRHJK17q2tExPOO4a"]} -{"Format": "IDEA0", "ID": "0ecd9a1c-da12-4e27-9ec4-4a6c225b9179", "DetectTime": "2023-10-30T14:13:53.125690+02:00", "EventTime": "2023-10-30T14:13:53.125705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcGbaa4PcCjVE66Xv8"]} -{"Format": "IDEA0", "ID": "9fe04b18-214a-46f9-a7e8-ed55025c700a", "DetectTime": "2023-10-30T14:13:53.142220+02:00", "EventTime": "2023-10-30T14:13:53.142235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CIlUkA3DWyJWzFsxg8"]} -{"Format": "IDEA0", "ID": "300eaa74-1800-4c35-aa4a-b8d89301643f", "DetectTime": "2023-10-30T14:13:53.157431+02:00", "EventTime": "2023-10-30T14:13:53.157442+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CVoM0h497mVhqNTOp6"]} -{"Format": "IDEA0", "ID": "78a213ed-cff3-4bfe-8a08-809aa51d1ae4", "DetectTime": "2023-10-30T14:13:53.171267+02:00", "EventTime": "2023-10-30T14:13:53.171277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CHP4pn2Cf2acWtBSKa"]} -{"Format": "IDEA0", "ID": "1730207f-2f34-46f4-8b33-179866624f9a", "DetectTime": "2023-10-30T14:13:53.185120+02:00", "EventTime": "2023-10-30T14:13:53.185135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CnuyzO23NeJ64h8658"]} -{"Format": "IDEA0", "ID": "4dbfff2c-5d58-4d56-bbd7-289ca624bbea", "DetectTime": "2023-10-30T14:13:53.201255+02:00", "EventTime": "2023-10-30T14:13:53.201270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CfWsj02RjyHMSf4M14"]} -{"Format": "IDEA0", "ID": "e87f4575-97d8-4302-b479-9f2381f6cacc", "DetectTime": "2023-10-30T14:13:53.216247+02:00", "EventTime": "2023-10-30T14:13:53.216263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C4i5At4kOqnAHzRI12"]} -{"Format": "IDEA0", "ID": "bcc6f532-7603-410b-8ea3-598899cfa62d", "DetectTime": "2023-10-30T14:13:53.231786+02:00", "EventTime": "2023-10-30T14:13:53.231796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cjf94n1bGA0foPPZCi"]} -{"Format": "IDEA0", "ID": "cf9487ee-569e-477d-9e22-54f34cd68d8c", "DetectTime": "2023-10-30T14:13:53.248179+02:00", "EventTime": "2023-10-30T14:13:53.248189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CeruBf3qvwmr39rWCe"]} -{"Format": "IDEA0", "ID": "5bd48938-a869-47ea-bf19-de52204884be", "DetectTime": "2023-10-30T14:13:53.265236+02:00", "EventTime": "2023-10-30T14:13:53.265252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["ChYGUl4sKM8Q0K4NCd"]} -{"Format": "IDEA0", "ID": "acb074cf-1c49-4ee8-a4aa-2fe70cb91e88", "DetectTime": "2023-10-30T14:13:53.279694+02:00", "EventTime": "2023-10-30T14:13:53.279703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["ClNjBj1UclCwMGT4b4"]} -{"Format": "IDEA0", "ID": "97f4addb-5120-4697-a610-f05f744ac569", "DetectTime": "2023-10-30T14:13:53.293841+02:00", "EventTime": "2023-10-30T14:13:53.293856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CirJPT1Q6My2VmL9hd"]} -{"Format": "IDEA0", "ID": "7a77fdd4-4ea5-4a50-8176-7823c5a8e499", "DetectTime": "2023-10-30T14:13:53.311934+02:00", "EventTime": "2023-10-30T14:13:53.311948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CTTlGlGAGf0Lz7hc"]} -{"Format": "IDEA0", "ID": "03f1a1c7-9e09-4b7f-b8ca-9b2a72747f22", "DetectTime": "2023-10-30T14:13:53.326436+02:00", "EventTime": "2023-10-30T14:13:53.326451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C1ERM31I06oZYdebU"]} -{"Format": "IDEA0", "ID": "cd46c5ce-489e-4ad7-a50f-3654cf349866", "DetectTime": "2023-10-30T14:13:53.340424+02:00", "EventTime": "2023-10-30T14:13:53.340438+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CmOv3N3G0gECo10tNg"]} -{"Format": "IDEA0", "ID": "ee23bd2f-1ad5-404e-9e1a-4bf42a6fdf29", "DetectTime": "2023-10-30T14:13:53.354665+02:00", "EventTime": "2023-10-30T14:13:53.354675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cr8pZJ3RAc0CkXAC28"]} -{"Format": "IDEA0", "ID": "26944d9b-6841-4afd-855b-41afeac1b479", "DetectTime": "2023-10-30T14:13:53.375265+02:00", "EventTime": "2023-10-30T14:13:53.375278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C943511idFVhhkFJYa"]} -{"Format": "IDEA0", "ID": "77e1f475-53c5-483c-b54e-829eae51eb0d", "DetectTime": "2023-10-30T14:13:53.389945+02:00", "EventTime": "2023-10-30T14:13:53.389956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CQM5cT1t9bntHX3Cye"]} -{"Format": "IDEA0", "ID": "c2846507-0b02-4903-ad83-d40eb92f3b66", "DetectTime": "2023-10-30T14:13:53.407709+02:00", "EventTime": "2023-10-30T14:13:53.407725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CnAl7s1c6YYRrLUimi"]} -{"Format": "IDEA0", "ID": "59a63dd0-cbac-43e8-a6e9-d3940eca13f4", "DetectTime": "2023-10-30T14:13:53.426498+02:00", "EventTime": "2023-10-30T14:13:53.426513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CAOLiC2ydbiyYFyQbd"]} -{"Format": "IDEA0", "ID": "8fa555ea-86cc-4ef7-8df8-0fa218686b91", "DetectTime": "2023-10-30T14:13:53.450496+02:00", "EventTime": "2023-10-30T14:13:53.450516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CIX1gg2StqNBi5BQTg"]} -{"Format": "IDEA0", "ID": "74a530ad-5688-49cf-83c0-0f762e79b5f4", "DetectTime": "2023-10-30T14:13:53.472074+02:00", "EventTime": "2023-10-30T14:13:53.472090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CPTNfCN7bDfetrK21"]} -{"Format": "IDEA0", "ID": "cc4637d2-03d0-4c15-ba79-563f7e6482fa", "DetectTime": "2023-10-30T14:13:53.492683+02:00", "EventTime": "2023-10-30T14:13:53.492700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CgKtRF2V03IsOYLL24"]} -{"Format": "IDEA0", "ID": "53a62dce-b79a-4510-bc12-987b266ac1b5", "DetectTime": "2023-10-30T14:13:53.512569+02:00", "EventTime": "2023-10-30T14:13:53.512584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C7bs3m3w85tlzTByj3"]} -{"Format": "IDEA0", "ID": "87c454a7-ea06-4f22-aad2-26142fab3316", "DetectTime": "2023-10-30T14:13:53.532097+02:00", "EventTime": "2023-10-30T14:13:53.532112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CDpEfj2V1MwSmRBVpl"]} -{"Format": "IDEA0", "ID": "309fe4bd-461e-48ab-be30-9a0a82c0490d", "DetectTime": "2023-10-30T14:13:53.551789+02:00", "EventTime": "2023-10-30T14:13:53.551804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CYNpFd31KaPAOwahj5"]} -{"Format": "IDEA0", "ID": "ba8d0b1a-54fb-461c-afce-17321686922a", "DetectTime": "2023-10-30T14:13:53.570043+02:00", "EventTime": "2023-10-30T14:13:53.570059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C98EZC4EuEP0Gp9osk"]} -{"Format": "IDEA0", "ID": "8ac1d1cb-7bca-4a65-bc49-4d5f9f1ab4a6", "DetectTime": "2023-10-30T14:13:53.587707+02:00", "EventTime": "2023-10-30T14:13:53.587721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXHq8K4gIVsTXiROl"]} -{"Format": "Json", "ID": "8ac1d1cb-7bca-4a65-bc49-4d5f9f1ab4a6", "DetectTime": "2023-10-30T14:13:53.587707+02:00", "EventTime": "2023-10-30T14:13:53.587721+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T23:25:34.497166+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 214. (real time 2023/10/30 14:13:53.662601)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "038f1060-7649-4343-891a-dc9695eefb0e", "DetectTime": "2023-10-30T14:13:53.667708+02:00", "EventTime": "2023-10-30T14:13:53.667723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CMNDZq3oLT2TyLl6f6"]} -{"Format": "IDEA0", "ID": "b92f0c76-074a-4e1d-8f7e-ee944b77b657", "DetectTime": "2023-10-30T14:13:53.686419+02:00", "EventTime": "2023-10-30T14:13:53.686432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CSCg8s9uOzDt2iRy6"]} -{"Format": "IDEA0", "ID": "1def8c50-b1b1-4594-a6dd-8a370024a428", "DetectTime": "2023-10-30T14:13:53.700049+02:00", "EventTime": "2023-10-30T14:13:53.700060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CzmOxQ1g0mZRV0xHQd"]} -{"Format": "IDEA0", "ID": "a0a240e4-0d1b-42a6-ae2a-f4e317cb4159", "DetectTime": "2023-10-30T14:13:53.714521+02:00", "EventTime": "2023-10-30T14:13:53.714534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["ClrxMN39N66enpS2aa"]} -{"Format": "IDEA0", "ID": "1d71734e-7d2a-41ef-b534-db3904466b2d", "DetectTime": "2023-10-30T14:13:53.727332+02:00", "EventTime": "2023-10-30T14:13:53.727342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["ChPd8tndlkLbEfMmh"]} -{"Format": "IDEA0", "ID": "fe421dd4-a689-4664-97ab-4697c1b4e4dc", "DetectTime": "2023-10-30T14:13:53.740834+02:00", "EventTime": "2023-10-30T14:13:53.740844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CbAEIf21E0LXOtiVSj"]} -{"Format": "IDEA0", "ID": "5b183d96-8b5c-48d6-bebc-49acc6e6ff5b", "DetectTime": "2023-10-30T14:13:53.754849+02:00", "EventTime": "2023-10-30T14:13:53.754862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["COjDe68crM5n7HxQ3"]} -{"Format": "IDEA0", "ID": "629fc34f-748f-4ae3-898b-2d1ead672f2f", "DetectTime": "2023-10-30T14:13:53.767590+02:00", "EventTime": "2023-10-30T14:13:53.767601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CGN13eDfqoGmmBI0h"]} -{"Format": "IDEA0", "ID": "78b61a66-fc5d-4761-9aa3-a22619fd5beb", "DetectTime": "2023-10-30T14:13:53.780629+02:00", "EventTime": "2023-10-30T14:13:53.780640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CRlHdq3XvYhuXTq3Fj"]} -{"Format": "IDEA0", "ID": "edfc4e34-3e7d-4371-9044-28e244f2b945", "DetectTime": "2023-10-30T14:13:53.798411+02:00", "EventTime": "2023-10-30T14:13:53.798429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CUJGJU2VIVEIyiZ9e3"]} -{"Format": "IDEA0", "ID": "a421f5c7-4778-4437-823f-912b09cd3ea8", "DetectTime": "2023-10-30T14:13:53.816812+02:00", "EventTime": "2023-10-30T14:13:53.816829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CgjuBf2YLpexUU9MGj"]} -{"Format": "IDEA0", "ID": "ab5436a5-91c5-4fd0-a7dc-6ab430cf32af", "DetectTime": "2023-10-30T14:13:53.831547+02:00", "EventTime": "2023-10-30T14:13:53.831558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CYzQ0h34sxWAXfqgya"]} -{"Format": "IDEA0", "ID": "be09d7f1-d705-4854-9820-ed5e5bb24ce4", "DetectTime": "2023-10-30T14:13:53.852027+02:00", "EventTime": "2023-10-30T14:13:53.852037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CXNfbm1silUHslXeWa"]} -{"Format": "IDEA0", "ID": "2bb851eb-4c02-4620-a190-a317cf00b796", "DetectTime": "2023-10-30T14:13:53.869041+02:00", "EventTime": "2023-10-30T14:13:53.869052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CDRl1U1mvPd9AlSrve"]} -{"Format": "IDEA0", "ID": "efbc38be-d722-498b-9bdc-c4832de05518", "DetectTime": "2023-10-30T14:13:53.885800+02:00", "EventTime": "2023-10-30T14:13:53.885817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CpZrWKCcgMx0a9E26"]} -{"Format": "IDEA0", "ID": "9f55bbf9-11df-444f-8e76-1cf940b5db9e", "DetectTime": "2023-10-30T14:13:53.902191+02:00", "EventTime": "2023-10-30T14:13:53.902205+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CLnQ493RIdhMHaYxn"]} -{"Format": "IDEA0", "ID": "35e22efe-f73a-4dfc-b1a2-e4b32cc8f721", "DetectTime": "2023-10-30T14:13:53.921249+02:00", "EventTime": "2023-10-30T14:13:53.921263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ClsFqJ1qLznqR6HHGl"]} -{"Format": "IDEA0", "ID": "3106b261-bf27-4c58-9a72-ad08bfc307bd", "DetectTime": "2023-10-30T14:13:53.937162+02:00", "EventTime": "2023-10-30T14:13:53.937175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CmvuEh1FSABDFZmwK8"]} -{"Format": "IDEA0", "ID": "c587fd0e-16b3-4250-a97c-805754caad45", "DetectTime": "2023-10-30T14:13:53.953481+02:00", "EventTime": "2023-10-30T14:13:53.953497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CWll782brWnhIAQq38"]} -{"Format": "IDEA0", "ID": "6c0f9032-8e3e-4f96-aa01-80795e4c899f", "DetectTime": "2023-10-30T14:13:53.970143+02:00", "EventTime": "2023-10-30T14:13:53.970153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIbabs3IiNz14QxX14"]} -{"Format": "IDEA0", "ID": "f2035b65-6c29-4a57-bad9-6ebaae48fe88", "DetectTime": "2023-10-30T14:13:53.982984+02:00", "EventTime": "2023-10-30T14:13:53.982995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CvnesS1Zctk3dfO8C8"]} -{"Format": "IDEA0", "ID": "c7246143-5ae6-478f-bd6d-4a8eaf3df6c4", "DetectTime": "2023-10-30T14:13:54.005258+02:00", "EventTime": "2023-10-30T14:13:54.005274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CbgZoC4R9eGAHeaZwd"]} -{"Format": "IDEA0", "ID": "813a80ee-793e-4d51-88be-ccabf5c56e99", "DetectTime": "2023-10-30T14:13:54.022791+02:00", "EventTime": "2023-10-30T14:13:54.022807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CA63vVIuQ31BLBX5k"]} -{"Format": "IDEA0", "ID": "b5b127d4-8c0e-458f-b3c0-62a16b996191", "DetectTime": "2023-10-30T14:13:54.040653+02:00", "EventTime": "2023-10-30T14:13:54.040667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CrlMiJ27ZecqdAK3Wc"]} -{"Format": "IDEA0", "ID": "4615d957-ad0e-4d89-84d0-d96960d32e24", "DetectTime": "2023-10-30T14:13:54.055592+02:00", "EventTime": "2023-10-30T14:13:54.055604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVGFpE1Vs5akKtFJTf"]} -{"Format": "IDEA0", "ID": "57d89627-6182-4619-b778-7f837031eb96", "DetectTime": "2023-10-30T14:13:54.069675+02:00", "EventTime": "2023-10-30T14:13:54.069686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CqSGGL3dH6BuA7r2ua"]} -{"Format": "IDEA0", "ID": "1c47c2ac-4ca0-4b03-a6d4-5c715f6e4251", "DetectTime": "2023-10-30T14:13:54.081561+02:00", "EventTime": "2023-10-30T14:13:54.081571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJ4Sqv12HEbLeu10yf"]} -{"Format": "IDEA0", "ID": "2fb0d715-5832-43e0-a9bf-b682f6d0c769", "DetectTime": "2023-10-30T14:13:54.093470+02:00", "EventTime": "2023-10-30T14:13:54.093480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["ChK7xkuoST96A8hXf"]} -{"Format": "IDEA0", "ID": "8cd16187-592c-4354-b5d9-e3e422d01464", "DetectTime": "2023-10-30T14:13:54.106386+02:00", "EventTime": "2023-10-30T14:13:54.106396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CCX6Bf3CQKOLixYFwi"]} -{"Format": "IDEA0", "ID": "ba712d4a-88e3-401f-8272-3b5104239342", "DetectTime": "2023-10-30T14:13:54.120224+02:00", "EventTime": "2023-10-30T14:13:54.120239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cynbn532zfz6cTi1d3"]} -{"Format": "IDEA0", "ID": "da67d89c-8bae-400c-afd0-277a1d566209", "DetectTime": "2023-10-30T14:13:54.144800+02:00", "EventTime": "2023-10-30T14:13:54.144815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C6Q9LHpswzmY6mFab"]} -{"Format": "IDEA0", "ID": "6e4bf83c-fce8-46af-b01e-1aa5f4525858", "DetectTime": "2023-10-30T14:13:54.159739+02:00", "EventTime": "2023-10-30T14:13:54.159755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CLOeKq4jzhIreZjr2g"]} -{"Format": "IDEA0", "ID": "c0ef53bc-634f-4e9c-9e15-b7d749e80804", "DetectTime": "2023-10-30T14:13:54.174065+02:00", "EventTime": "2023-10-30T14:13:54.174077+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C8Wd0e4qFrzYGxoB9b"]} -{"Format": "IDEA0", "ID": "bb325793-146a-4611-baec-35d9b6f3e2c7", "DetectTime": "2023-10-30T14:13:54.186894+02:00", "EventTime": "2023-10-30T14:13:54.186907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CIu2CFPZGsgp3HHpl"]} -{"Format": "IDEA0", "ID": "19f7e642-1f51-499d-b8d0-b0ce0771ce3e", "DetectTime": "2023-10-30T14:13:54.199729+02:00", "EventTime": "2023-10-30T14:13:54.199741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7PwNZ7950Um7OF59"]} -{"Format": "IDEA0", "ID": "194dcf64-227b-4f37-a392-47b038017bff", "DetectTime": "2023-10-30T14:13:54.215933+02:00", "EventTime": "2023-10-30T14:13:54.215943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CRNDCS1TrjLxvLuRcj"]} -{"Format": "IDEA0", "ID": "9df2cdd1-6d30-4896-91ba-fb38ce534b3b", "DetectTime": "2023-10-30T14:13:54.231182+02:00", "EventTime": "2023-10-30T14:13:54.231196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CPsNoR1flkTv1UWGQh"]} -{"Format": "IDEA0", "ID": "f6d2c0e2-e91e-4acc-9a48-accf1b699bb9", "DetectTime": "2023-10-30T14:13:54.246018+02:00", "EventTime": "2023-10-30T14:13:54.246030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cpp7tVTT0TzXKPiqj"]} -{"Format": "IDEA0", "ID": "271fd120-f4a8-4465-97db-ade30aeba818", "DetectTime": "2023-10-30T14:13:54.261315+02:00", "EventTime": "2023-10-30T14:13:54.261325+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChSWWH3NdiTLfHoU8l"]} -{"Format": "IDEA0", "ID": "957bc1f4-208a-4c58-8b46-f129a8ee5cef", "DetectTime": "2023-10-30T14:13:54.277911+02:00", "EventTime": "2023-10-30T14:13:54.277922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C7rXOX3345uTdIDqP3"]} -{"Format": "IDEA0", "ID": "b76f663f-8940-4b61-8ec9-602e1e41fc1a", "DetectTime": "2023-10-30T14:13:54.290584+02:00", "EventTime": "2023-10-30T14:13:54.290595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CpHf8a11aG6IOGJSTl"]} -{"Format": "IDEA0", "ID": "3fb05eb6-c357-46e3-81d9-da3fc3fa3d70", "DetectTime": "2023-10-30T14:13:54.303441+02:00", "EventTime": "2023-10-30T14:13:54.303450+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ce0LM61JPCJw9AnoJj"]} -{"Format": "IDEA0", "ID": "f2d2c4b9-85ba-47f4-a587-e4e3816980dc", "DetectTime": "2023-10-30T14:13:54.316511+02:00", "EventTime": "2023-10-30T14:13:54.316522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CrYqVM1GZ7ObiyFuYf"]} -{"Format": "IDEA0", "ID": "16b01b60-be10-4d3c-b684-ff810e68055f", "DetectTime": "2023-10-30T14:13:54.329310+02:00", "EventTime": "2023-10-30T14:13:54.329320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CkHCAbeqlYLHirNyg"]} -{"Format": "IDEA0", "ID": "8b3b16ad-092d-4ad6-979a-68a628761940", "DetectTime": "2023-10-30T14:13:54.343277+02:00", "EventTime": "2023-10-30T14:13:54.343294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CYyVmp20DCMq6Df0n2"]} -{"Format": "IDEA0", "ID": "d6ebb20e-bed2-49dd-afc0-373af3330767", "DetectTime": "2023-10-30T14:13:54.360306+02:00", "EventTime": "2023-10-30T14:13:54.360316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CHCH5y4uHY4fOufvLc"]} -{"Format": "IDEA0", "ID": "f63c6014-f786-447f-8a2c-a56fbdeef012", "DetectTime": "2023-10-30T14:13:54.374425+02:00", "EventTime": "2023-10-30T14:13:54.374439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CtTuyw1yqiypu2GXjb"]} -{"Format": "IDEA0", "ID": "faf7747e-6080-482f-a312-81f3a3b9e8ec", "DetectTime": "2023-10-30T14:13:54.398853+02:00", "EventTime": "2023-10-30T14:13:54.398869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CNNcO62i2lAnbiH5Q4"]} -{"Format": "IDEA0", "ID": "5310c50b-a6f8-429d-a3a1-74f43c87f5c2", "DetectTime": "2023-10-30T14:13:54.413902+02:00", "EventTime": "2023-10-30T14:13:54.413912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cemoao2KT6PbighGN8"]} -{"Format": "IDEA0", "ID": "98c0e076-333d-4435-95a7-79df727dc679", "DetectTime": "2023-10-30T14:13:54.427165+02:00", "EventTime": "2023-10-30T14:13:54.427175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CyeVB6nLzC1MtQfj"]} -{"Format": "IDEA0", "ID": "c3c5cf28-a048-4370-9762-e7c27c82692a", "DetectTime": "2023-10-30T14:13:54.444359+02:00", "EventTime": "2023-10-30T14:13:54.444374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["ChOmyO31c5hdeJ3kH1"]} -{"Format": "IDEA0", "ID": "b29a31cc-d6ed-4a3d-ada4-7f4be067c6f3", "DetectTime": "2023-10-30T14:13:54.460887+02:00", "EventTime": "2023-10-30T14:13:54.460902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CKiawm1r7TuIUfc4gf"]} -{"Format": "IDEA0", "ID": "c2b3088f-9a8e-4361-b30c-f4d25be8f8d1", "DetectTime": "2023-10-30T14:13:54.478281+02:00", "EventTime": "2023-10-30T14:13:54.478297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cz1JIv506qSrlpqf6"]} -{"Format": "IDEA0", "ID": "95aa36cb-734e-4538-bd6d-60405f510782", "DetectTime": "2023-10-30T14:13:54.492562+02:00", "EventTime": "2023-10-30T14:13:54.492576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CJdbeX1rm52VUcenOe"]} -{"Format": "IDEA0", "ID": "ebe89d8c-7f3a-4ee1-bf8e-09f567144b55", "DetectTime": "2023-10-30T14:13:54.509602+02:00", "EventTime": "2023-10-30T14:13:54.509612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CpU4uC3RnNgNWlnG15"]} -{"Format": "IDEA0", "ID": "b8cb43a6-a0de-47b2-ba0b-14d2cb3a5092", "DetectTime": "2023-10-30T14:13:54.522657+02:00", "EventTime": "2023-10-30T14:13:54.522669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cm8ijv0JG8jQltuj2"]} -{"Format": "IDEA0", "ID": "b85d9133-4bed-4831-95a4-246923b94c87", "DetectTime": "2023-10-30T14:13:54.535553+02:00", "EventTime": "2023-10-30T14:13:54.535563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CIp4wR1RKS7di9Tdfb"]} -{"Format": "IDEA0", "ID": "fe499e59-a14e-47ef-9548-bb71ec48e918", "DetectTime": "2023-10-30T14:13:54.548699+02:00", "EventTime": "2023-10-30T14:13:54.548708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CRG5yI3QQuyhgVuaXk"]} -{"Format": "IDEA0", "ID": "c2e40ad0-1872-4302-ae9a-15448d531cc4", "DetectTime": "2023-10-30T14:13:54.571821+02:00", "EventTime": "2023-10-30T14:13:54.571836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ClV4t21nHZQ5XV04Ck"]} -{"Format": "IDEA0", "ID": "6e8ce033-78a2-4256-b026-a095a4c6c401", "DetectTime": "2023-10-30T14:13:54.587422+02:00", "EventTime": "2023-10-30T14:13:54.587439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["COpkQi5OBP6x7NT5f"]} -{"Format": "IDEA0", "ID": "2a3176eb-79f6-4feb-a71a-48f31c3faadc", "DetectTime": "2023-10-30T14:13:54.603788+02:00", "EventTime": "2023-10-30T14:13:54.603798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cf35iepNTdPgkJFpi"]} -{"Format": "IDEA0", "ID": "ba6333a2-9e6b-4915-93a0-2f48024b6541", "DetectTime": "2023-10-30T14:13:54.615975+02:00", "EventTime": "2023-10-30T14:13:54.615985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CyKrlb3txuy3a8ns3i"]} -{"Format": "IDEA0", "ID": "e437145d-cb2e-47e3-b8e5-00dde519d038", "DetectTime": "2023-10-30T14:13:54.629196+02:00", "EventTime": "2023-10-30T14:13:54.629206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C1f2V11vjXueOnLnRh"]} -{"Format": "IDEA0", "ID": "99431ca3-dacb-4846-9789-228272bde95f", "DetectTime": "2023-10-30T14:13:54.642448+02:00", "EventTime": "2023-10-30T14:13:54.642459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CiFCns26YyA42mye99"]} -{"Format": "IDEA0", "ID": "0c2bde6c-879f-4f22-9e9d-bdd5ee04d380", "DetectTime": "2023-10-30T14:13:54.659315+02:00", "EventTime": "2023-10-30T14:13:54.659333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNvKd7mKVikq5SNQ8"]} -{"Format": "IDEA0", "ID": "69d51614-03e9-4616-a213-eca3aac74cd2", "DetectTime": "2023-10-30T14:13:54.671729+02:00", "EventTime": "2023-10-30T14:13:54.671739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CT8zGS17fpSaWodPM1"]} -{"Format": "IDEA0", "ID": "c898a4cd-2d39-49b1-a6b5-de4a153fb4da", "DetectTime": "2023-10-30T14:13:54.684049+02:00", "EventTime": "2023-10-30T14:13:54.684059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C3N8rWM42FbbliYsg"]} -{"Format": "IDEA0", "ID": "66e1afcd-02a3-4708-a196-1018d403252a", "DetectTime": "2023-10-30T14:13:54.696806+02:00", "EventTime": "2023-10-30T14:13:54.696817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CQyK7K1WHRcJXbKu3b"]} -{"Format": "IDEA0", "ID": "01d7717b-33ee-4c5d-9c03-cf01eeebad9f", "DetectTime": "2023-10-30T14:13:54.713068+02:00", "EventTime": "2023-10-30T14:13:54.713086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C4Tl263LCAFxVanhil"]} -{"Format": "IDEA0", "ID": "fa6f2d3c-b152-4f1d-896a-2b9081294992", "DetectTime": "2023-10-30T14:13:54.739781+02:00", "EventTime": "2023-10-30T14:13:54.739796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CyQdh5YAMZKMsVhX1"]} -{"Format": "IDEA0", "ID": "e23b2fa3-e65f-4484-9239-ed0847f0740d", "DetectTime": "2023-10-30T14:13:54.755152+02:00", "EventTime": "2023-10-30T14:13:54.755163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CDRwpO1UjIycDsNqF4"]} -{"Format": "IDEA0", "ID": "f02c9fc7-a2bc-4435-a49a-6e96697c5bde", "DetectTime": "2023-10-30T14:13:54.768278+02:00", "EventTime": "2023-10-30T14:13:54.768288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["COcCkn2lybEMfNSre9"]} -{"Format": "IDEA0", "ID": "c6c6009b-63d7-42a6-b0dc-b22841c0b11b", "DetectTime": "2023-10-30T14:13:54.781396+02:00", "EventTime": "2023-10-30T14:13:54.781407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C51FmM14klsyimPrv"]} -{"Format": "IDEA0", "ID": "f69663b0-0c4d-495c-9dd1-d2869c034baa", "DetectTime": "2023-10-30T14:13:54.796289+02:00", "EventTime": "2023-10-30T14:13:54.796299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CfbN8c2mUwwjxOo4o4"]} -{"Format": "IDEA0", "ID": "0b3d33c9-cfa5-4480-8915-48ca19e6d210", "DetectTime": "2023-10-30T14:13:54.807951+02:00", "EventTime": "2023-10-30T14:13:54.807962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Car6VZIjN3yUJrPj2"]} -{"Format": "IDEA0", "ID": "4f84ae6b-64a7-484a-a594-fcd805a18666", "DetectTime": "2023-10-30T14:13:54.819902+02:00", "EventTime": "2023-10-30T14:13:54.819912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBx3Mn2sbJiPEAyv22"]} -{"Format": "IDEA0", "ID": "72d0b09d-47de-458b-a6b4-b3785dfe0c3d", "DetectTime": "2023-10-30T14:13:54.832777+02:00", "EventTime": "2023-10-30T14:13:54.832787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CtMGJM3g9j78nDjHR6"]} -{"Format": "IDEA0", "ID": "9882caa5-d18d-4f51-91f1-6d811f0fcf07", "DetectTime": "2023-10-30T14:13:54.853972+02:00", "EventTime": "2023-10-30T14:13:54.853981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CBX1WM2mvsKp0bPly8"]} -{"Format": "IDEA0", "ID": "a171112d-2918-4ce1-940f-46f02fabb5aa", "DetectTime": "2023-10-30T14:13:54.866849+02:00", "EventTime": "2023-10-30T14:13:54.866867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["COO50H3zDXzF7yjYm8"]} -{"Format": "IDEA0", "ID": "cab4c0e8-63f5-441f-8833-d76c12e511c8", "DetectTime": "2023-10-30T14:13:54.882690+02:00", "EventTime": "2023-10-30T14:13:54.882701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C67gJd8O00IuEuD6i"]} -{"Format": "IDEA0", "ID": "7e4e0a57-21a2-46da-908b-c169e9358ae8", "DetectTime": "2023-10-30T14:13:54.894634+02:00", "EventTime": "2023-10-30T14:13:54.894644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C1d5W23YXUSoGUXW16"]} -{"Format": "IDEA0", "ID": "2fd0c834-ef10-4c3e-b438-3f703c97bc13", "DetectTime": "2023-10-30T14:13:54.907556+02:00", "EventTime": "2023-10-30T14:13:54.907567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CMS638MYmktgAF4Te"]} -{"Format": "IDEA0", "ID": "c826eeac-01e3-49f8-81c5-28a7a4101df0", "DetectTime": "2023-10-30T14:13:54.922382+02:00", "EventTime": "2023-10-30T14:13:54.922393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CALI7Z1UiYXFeJF7d8"]} -{"Format": "IDEA0", "ID": "7d195e0f-bb47-47e2-a2ff-3e94c2947530", "DetectTime": "2023-10-30T14:13:54.936950+02:00", "EventTime": "2023-10-30T14:13:54.936964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cjnv3u3un1KnKTYi09"]} -{"Format": "IDEA0", "ID": "cc139fa3-cb77-4e3a-9925-a47d87904f53", "DetectTime": "2023-10-30T14:13:54.951189+02:00", "EventTime": "2023-10-30T14:13:54.951202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CEWJF53mYNx8xFfy3j"]} -{"Format": "IDEA0", "ID": "422c08e2-5374-4054-ae38-472e3fe88fdc", "DetectTime": "2023-10-30T14:13:54.962936+02:00", "EventTime": "2023-10-30T14:13:54.962948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CB8yrC1n2O4OtAM7v5"]} -{"Format": "Json", "ID": "422c08e2-5374-4054-ae38-472e3fe88fdc", "DetectTime": "2023-10-30T14:13:54.962936+02:00", "EventTime": "2023-10-30T14:13:54.962948+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T23:55:45.811011+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 214. (real time 2023/10/30 14:13:55.021770)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1a93cd53-3c89-450d-bced-5fcbae480da4", "DetectTime": "2023-10-30T14:13:55.025619+02:00", "EventTime": "2023-10-30T14:13:55.025631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["COUAui4Fs5gxW0i9w4"]} -{"Format": "IDEA0", "ID": "4160ba40-365d-4061-8199-c88dd331031e", "DetectTime": "2023-10-30T14:13:55.038775+02:00", "EventTime": "2023-10-30T14:13:55.038804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CcL3fS3zobVJtZKor2"]} -{"Format": "IDEA0", "ID": "e98c7ccc-77b9-4287-88e7-041bd8cb38be", "DetectTime": "2023-10-30T14:13:55.051305+02:00", "EventTime": "2023-10-30T14:13:55.051321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C7CAgR3qc6wr1zUB45"]} -{"Format": "IDEA0", "ID": "07b091f6-03fa-4d3e-8039-407c99c3d502", "DetectTime": "2023-10-30T14:13:55.064992+02:00", "EventTime": "2023-10-30T14:13:55.065007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CvcGGW11IHB1OWwy4l"]} -{"Format": "IDEA0", "ID": "107134d9-e748-48d0-a965-9e95d1fcede4", "DetectTime": "2023-10-30T14:13:55.077953+02:00", "EventTime": "2023-10-30T14:13:55.077964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CrMlY9TNbpwu6VAhc"]} -{"Format": "IDEA0", "ID": "5c2a4d64-7d7d-47d0-afd9-653134146168", "DetectTime": "2023-10-30T14:13:55.092044+02:00", "EventTime": "2023-10-30T14:13:55.092059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C2cHYjqHnZcvUNFz"]} -{"Format": "IDEA0", "ID": "8fceda39-d465-4dc1-a56b-7e87b29ea206", "DetectTime": "2023-10-30T14:13:55.107379+02:00", "EventTime": "2023-10-30T14:13:55.107389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C1zAxm2PvtIVDEa7q5"]} -{"Format": "IDEA0", "ID": "23c59678-46f8-4be0-8a8f-8232f30b8a6a", "DetectTime": "2023-10-30T14:13:55.120352+02:00", "EventTime": "2023-10-30T14:13:55.120365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CMNlt047hFWpOpSwTg"]} -{"Format": "IDEA0", "ID": "0318fad5-180d-4678-97c6-47028a499b74", "DetectTime": "2023-10-30T14:13:55.140500+02:00", "EventTime": "2023-10-30T14:13:55.140510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cb0mkF4B0pOANk9pB9"]} -{"Format": "IDEA0", "ID": "80430c12-bb90-40af-8283-7fee593d96a0", "DetectTime": "2023-10-30T14:13:55.152973+02:00", "EventTime": "2023-10-30T14:13:55.152984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CwIO5L3ylxItZ5aDIe"]} -{"Format": "IDEA0", "ID": "1799ca1f-52b1-430d-b741-abee36a33822", "DetectTime": "2023-10-30T14:13:55.166712+02:00", "EventTime": "2023-10-30T14:13:55.166722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CKkUQf1kus2tYTajof"]} -{"Format": "IDEA0", "ID": "13a4ac58-4029-46a6-a579-86e8195f39d4", "DetectTime": "2023-10-30T14:13:55.181642+02:00", "EventTime": "2023-10-30T14:13:55.181656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CGnNPI3bausrQBTOu8"]} -{"Format": "IDEA0", "ID": "6bafcdfd-82b2-4aee-b63d-1d2f63f73292", "DetectTime": "2023-10-30T14:13:55.195975+02:00", "EventTime": "2023-10-30T14:13:55.195985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CmVktv2rR7bHCPn9af"]} -{"Format": "IDEA0", "ID": "36856a6a-9199-43a0-aedb-581d11ab2e7b", "DetectTime": "2023-10-30T14:13:55.213286+02:00", "EventTime": "2023-10-30T14:13:55.213303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CBP7gK3z0loe0nFEL4"]} -{"Format": "IDEA0", "ID": "118edff6-52e8-4e20-bacd-a231faee4a5c", "DetectTime": "2023-10-30T14:13:55.225760+02:00", "EventTime": "2023-10-30T14:13:55.225771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CasZu84m13TW3wrHhf"]} -{"Format": "IDEA0", "ID": "82692b8b-b83c-42cb-8c69-d325e4713ac2", "DetectTime": "2023-10-30T14:13:55.238869+02:00", "EventTime": "2023-10-30T14:13:55.238880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CRx2lZ1IzESgQmRro9"]} -{"Format": "IDEA0", "ID": "025a897f-3ffb-446e-98fd-fd457289eb77", "DetectTime": "2023-10-30T14:13:55.252677+02:00", "EventTime": "2023-10-30T14:13:55.252688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CMISp61FenrXEPXSQj"]} -{"Format": "IDEA0", "ID": "1d5230c4-8629-45d8-b75e-753cc8089c93", "DetectTime": "2023-10-30T14:13:55.266625+02:00", "EventTime": "2023-10-30T14:13:55.266638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C9fKMn4qcToVM1LIwa"]} -{"Format": "IDEA0", "ID": "3d80b49a-f9a7-458b-8177-9a3cce23a511", "DetectTime": "2023-10-30T14:13:55.283952+02:00", "EventTime": "2023-10-30T14:13:55.283966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CvFmNlKVzPf1iZxpk"]} -{"Format": "IDEA0", "ID": "e103ba1c-bc4a-4425-bafe-2479e4da3b29", "DetectTime": "2023-10-30T14:13:55.367465+02:00", "EventTime": "2023-10-30T14:13:55.367485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CAbzGd2tM1773ad5Y5"]} -{"Format": "IDEA0", "ID": "e235825b-5086-4f9b-b4e7-766f83eed559", "DetectTime": "2023-10-30T14:13:55.386689+02:00", "EventTime": "2023-10-30T14:13:55.386703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CcvDA01e72txUVQVBj"]} -{"Format": "IDEA0", "ID": "a1cf830e-60a4-4f28-a13f-421b319459e0", "DetectTime": "2023-10-30T14:13:55.404039+02:00", "EventTime": "2023-10-30T14:13:55.404051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CH2UJe3W1r96uolu31"]} -{"Format": "IDEA0", "ID": "d6a59da8-c78c-4487-9114-f3026840c0e4", "DetectTime": "2023-10-30T14:13:55.425794+02:00", "EventTime": "2023-10-30T14:13:55.425808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CTrwTY3iIwJslHLDVh"]} -{"Format": "IDEA0", "ID": "958ecdc3-40fa-49d2-a929-1c05f6e1941f", "DetectTime": "2023-10-30T14:13:55.440930+02:00", "EventTime": "2023-10-30T14:13:55.440944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CQowbY1RUa9chfVV7"]} -{"Format": "IDEA0", "ID": "b520a40d-d8fc-438a-a3c6-f9269e7387c7", "DetectTime": "2023-10-30T14:13:55.457085+02:00", "EventTime": "2023-10-30T14:13:55.457100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CHMKQL25wO5zavmDwi"]} -{"Format": "IDEA0", "ID": "2089cba9-d5b8-445b-a44d-83f3f587c96e", "DetectTime": "2023-10-30T14:13:55.476476+02:00", "EventTime": "2023-10-30T14:13:55.476487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cm6mi81DIqm2WeE5Hc"]} -{"Format": "IDEA0", "ID": "173f395a-5b3a-4e4e-b25f-4b3b1f384083", "DetectTime": "2023-10-30T14:13:55.499129+02:00", "EventTime": "2023-10-30T14:13:55.499143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Clje2V251Ws22y1mCl"]} -{"Format": "IDEA0", "ID": "6c02631e-51ed-48a5-93fe-f923dd809237", "DetectTime": "2023-10-30T14:13:55.514672+02:00", "EventTime": "2023-10-30T14:13:55.514682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CDCHjF3P4jemcLwu17"]} -{"Format": "IDEA0", "ID": "0d19e348-3425-4b74-b40e-653a668388bb", "DetectTime": "2023-10-30T14:13:55.531018+02:00", "EventTime": "2023-10-30T14:13:55.531030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CgIhPN4r3U16z39Di"]} -{"Format": "IDEA0", "ID": "a477d7d5-a49d-4f64-9e12-00a8067783d2", "DetectTime": "2023-10-30T14:13:55.545023+02:00", "EventTime": "2023-10-30T14:13:55.545033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CGE06t2Dcoi9eEJo3a"]} -{"Format": "IDEA0", "ID": "4bdbbf00-65a7-4b38-b541-639d8eba4df9", "DetectTime": "2023-10-30T14:13:55.571511+02:00", "EventTime": "2023-10-30T14:13:55.571527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CoXc0H3YLdyk7b9o5"]} -{"Format": "IDEA0", "ID": "9bd21150-71a5-4f3a-9c70-5d015893d497", "DetectTime": "2023-10-30T14:13:55.590939+02:00", "EventTime": "2023-10-30T14:13:55.590951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CRLiOv3ZeM2au4Tse3"]} -{"Format": "IDEA0", "ID": "ea03986a-e4e8-4ce1-84cd-129930056c98", "DetectTime": "2023-10-30T14:13:55.609659+02:00", "EventTime": "2023-10-30T14:13:55.609674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CWr9924D98hSDCnjVl"]} -{"Format": "IDEA0", "ID": "f5d027be-b3b3-43ef-8550-27e2b7ba6320", "DetectTime": "2023-10-30T14:13:55.628691+02:00", "EventTime": "2023-10-30T14:13:55.628707+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cni7DG2rbESj7yKqte"]} -{"Format": "IDEA0", "ID": "1894c092-f690-48f1-8220-e33beb9c499c", "DetectTime": "2023-10-30T14:13:55.645032+02:00", "EventTime": "2023-10-30T14:13:55.645042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CRowJJ3SS9WySSuRI6"]} -{"Format": "IDEA0", "ID": "850380d6-a8c9-48a0-9dc9-7d4f83e368ac", "DetectTime": "2023-10-30T14:13:55.660751+02:00", "EventTime": "2023-10-30T14:13:55.660763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CYvScy46jaPpRzH7sc"]} -{"Format": "IDEA0", "ID": "a717d99f-7fdd-4ee9-a3d0-4fe2968be87b", "DetectTime": "2023-10-30T14:13:55.682398+02:00", "EventTime": "2023-10-30T14:13:55.682409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CdQq5zAK4auXCkVi"]} -{"Format": "IDEA0", "ID": "44bf4b0e-ece7-464d-9bb5-57629da1addb", "DetectTime": "2023-10-30T14:13:55.697599+02:00", "EventTime": "2023-10-30T14:13:55.697613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CwCub9xvbqAoTXhHi"]} -{"Format": "IDEA0", "ID": "e53117ac-423d-4684-9bac-145d36b6902b", "DetectTime": "2023-10-30T14:13:55.719021+02:00", "EventTime": "2023-10-30T14:13:55.719037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CeY1FR2nePtP7nKpf5"]} -{"Format": "IDEA0", "ID": "4956f509-3eeb-4216-b6e6-73fceb4209f1", "DetectTime": "2023-10-30T14:13:55.740109+02:00", "EventTime": "2023-10-30T14:13:55.740123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C3qw5Hf0SmTctAp2"]} -{"Format": "IDEA0", "ID": "f4b23e50-09d5-480b-9ef5-8d0247c5161c", "DetectTime": "2023-10-30T14:13:55.756896+02:00", "EventTime": "2023-10-30T14:13:55.756907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CsDRg82NukKU7N0C6"]} -{"Format": "IDEA0", "ID": "ecc695ac-88df-464a-9fa6-c79db5b9affe", "DetectTime": "2023-10-30T14:13:55.778591+02:00", "EventTime": "2023-10-30T14:13:55.778602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CO34C520ytg3UV0zi2"]} -{"Format": "IDEA0", "ID": "3bfc73b8-1180-4a59-ba93-1b85f6da4390", "DetectTime": "2023-10-30T14:13:55.793311+02:00", "EventTime": "2023-10-30T14:13:55.793327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C59hrc16bSYPsXvoad"]} -{"Format": "IDEA0", "ID": "d6be8262-108a-437e-b246-917752246c72", "DetectTime": "2023-10-30T14:13:55.808214+02:00", "EventTime": "2023-10-30T14:13:55.808228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CtdM9g4P3rFthCn22e"]} -{"Format": "IDEA0", "ID": "64b9a781-8a86-4ac3-be6b-70cd2a3ee1ca", "DetectTime": "2023-10-30T14:13:55.821623+02:00", "EventTime": "2023-10-30T14:13:55.821633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcAaDI3kvPiMDaxqMe"]} -{"Format": "IDEA0", "ID": "f9eaf89d-1375-4688-a81d-46abddb02bbf", "DetectTime": "2023-10-30T14:13:55.835724+02:00", "EventTime": "2023-10-30T14:13:55.835734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CjBHCd2SaeYH24Gfki"]} -{"Format": "Json", "ID": "f9eaf89d-1375-4688-a81d-46abddb02bbf", "DetectTime": "2023-10-30T14:13:55.835724+02:00", "EventTime": "2023-10-30T14:13:55.835734+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T23:55:47.535275+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 214. (real time 2023/10/30 14:13:55.890427)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "000d3704-22cd-4573-9682-62fed7a7b297", "DetectTime": "2023-10-30T14:13:55.894191+02:00", "EventTime": "2023-10-30T14:13:55.894201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CMXgRJ24yRBp4B4Voj"]} -{"Format": "IDEA0", "ID": "058ac2c0-fefc-4425-bad5-c404ae592c16", "DetectTime": "2023-10-30T14:13:55.908955+02:00", "EventTime": "2023-10-30T14:13:55.908966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CpvdEs1DKyNnj20VSd"]} -{"Format": "IDEA0", "ID": "0b0f5078-482d-497b-a29d-c3df82447dcc", "DetectTime": "2023-10-30T14:13:55.922919+02:00", "EventTime": "2023-10-30T14:13:55.922931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CJN3Pn2LnaIGEG1rY9"]} -{"Format": "IDEA0", "ID": "bc5a1180-9e97-449f-b2fd-ef78ae5fa56b", "DetectTime": "2023-10-30T14:13:55.937552+02:00", "EventTime": "2023-10-30T14:13:55.937562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CvdD1w34ObKZFypa7f"]} -{"Format": "IDEA0", "ID": "91e1a250-d343-452f-8260-d1e17eb27ae6", "DetectTime": "2023-10-30T14:13:55.954099+02:00", "EventTime": "2023-10-30T14:13:55.954114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C0dhrl11pO2Gt8dms5"]} -{"Format": "IDEA0", "ID": "21593f93-7501-45f4-9fc2-682150c10bab", "DetectTime": "2023-10-30T14:13:55.970815+02:00", "EventTime": "2023-10-30T14:13:55.970830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CmxOCL8CVuJrLJtca"]} -{"Format": "IDEA0", "ID": "ce056b7d-437d-465d-9b79-b2da67925fc2", "DetectTime": "2023-10-30T14:13:55.985155+02:00", "EventTime": "2023-10-30T14:13:55.985170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CpKR2L2Bun7AGSKrb"]} -{"Format": "IDEA0", "ID": "f4890d01-d2e5-488f-8adf-071a422f1bdc", "DetectTime": "2023-10-30T14:13:56.005503+02:00", "EventTime": "2023-10-30T14:13:56.005514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CtUhiGgnAT6NgGJu5"]} -{"Format": "IDEA0", "ID": "2de9d3c1-f996-4172-b557-55b8c0631ac9", "DetectTime": "2023-10-30T14:13:56.022041+02:00", "EventTime": "2023-10-30T14:13:56.022050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cx4ckm2kMSWyMcFDB"]} -{"Format": "IDEA0", "ID": "b452b917-d9d7-47f1-99c4-f145df024d57", "DetectTime": "2023-10-30T14:13:56.035558+02:00", "EventTime": "2023-10-30T14:13:56.035572+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C8Ou4G2CmtdNK6cs4a"]} -{"Format": "IDEA0", "ID": "9f3e0d87-9cd3-4aac-a9b3-88719b6ba9b6", "DetectTime": "2023-10-30T14:13:56.051290+02:00", "EventTime": "2023-10-30T14:13:56.051300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CySy5t2bX3x3XcTsI3"]} -{"Format": "IDEA0", "ID": "fe34c280-2226-4ec5-a0ed-e641dd812a1e", "DetectTime": "2023-10-30T14:13:56.068905+02:00", "EventTime": "2023-10-30T14:13:56.068920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["CW9JNm2ksxzABCjR68"]} -{"Format": "IDEA0", "ID": "6c29826f-5f09-4ef9-9d97-05c19dee7620", "DetectTime": "2023-10-30T14:13:56.092313+02:00", "EventTime": "2023-10-30T14:13:56.092330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CLyBsQraDjqYVcnjk"]} -{"Format": "IDEA0", "ID": "21621120-ff1e-4da0-afc2-3c0f0fc5eddb", "DetectTime": "2023-10-30T14:13:56.107543+02:00", "EventTime": "2023-10-30T14:13:56.107556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CIoLm3LJmWrbdp557"]} -{"Format": "IDEA0", "ID": "0974009e-af68-4ca8-8e3a-a5425161c48d", "DetectTime": "2023-10-30T14:13:56.126562+02:00", "EventTime": "2023-10-30T14:13:56.126578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CtlYgD2i07e25pxH04"]} -{"Format": "IDEA0", "ID": "d95f0335-cebb-4df4-9297-90b925ee59b4", "DetectTime": "2023-10-30T14:13:56.144911+02:00", "EventTime": "2023-10-30T14:13:56.144924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CGzlIN34kM6UosDlIc"]} -{"Format": "IDEA0", "ID": "5d3fbec9-bd9a-4644-9ad1-f65aa7236953", "DetectTime": "2023-10-30T14:13:56.161793+02:00", "EventTime": "2023-10-30T14:13:56.161807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CdT3br3e4lKplfGKXd"]} -{"Format": "IDEA0", "ID": "ac9b790b-9c58-4cfd-a481-356b7d66a287", "DetectTime": "2023-10-30T14:13:56.185044+02:00", "EventTime": "2023-10-30T14:13:56.185058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C0gJ4m4WllyrQRgBQl"]} -{"Format": "IDEA0", "ID": "d00d1bd7-b82f-4b40-8b78-65edea9fd5d1", "DetectTime": "2023-10-30T14:13:56.202341+02:00", "EventTime": "2023-10-30T14:13:56.202356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CWr5f74eHnoYafuUY5"]} -{"Format": "IDEA0", "ID": "a2c05723-f27c-422c-b7fb-6ec739b6ecb5", "DetectTime": "2023-10-30T14:13:56.221821+02:00", "EventTime": "2023-10-30T14:13:56.221836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CZCyZ43PFvIt0qGUfi"]} -{"Format": "IDEA0", "ID": "5864ebf1-bb08-4e76-9e53-c8934b837b29", "DetectTime": "2023-10-30T14:13:56.241172+02:00", "EventTime": "2023-10-30T14:13:56.241187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CmD2y02YJdRdH2uPAl"]} -{"Format": "IDEA0", "ID": "cf982a9d-23a1-45ab-a9c8-1984d56ea98b", "DetectTime": "2023-10-30T14:13:56.266798+02:00", "EventTime": "2023-10-30T14:13:56.266813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CBVITCTckY4KaRrK6"]} -{"Format": "IDEA0", "ID": "30edddc7-ff25-447b-9837-da8b879fb861", "DetectTime": "2023-10-30T14:13:56.286452+02:00", "EventTime": "2023-10-30T14:13:56.286468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CwyrdL2Z1uLiADaMWd"]} -{"Format": "IDEA0", "ID": "a10fcd6b-64ec-4dfe-b48b-65e919a747ed", "DetectTime": "2023-10-30T14:13:56.304688+02:00", "EventTime": "2023-10-30T14:13:56.304701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CzZG9A3QIaDpY5he37"]} -{"Format": "IDEA0", "ID": "fbbed0bf-39c9-4a83-847b-565cadb4b76e", "DetectTime": "2023-10-30T14:13:56.320741+02:00", "EventTime": "2023-10-30T14:13:56.320753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C6RvLu3JpK8rdwmVE3"]} -{"Format": "IDEA0", "ID": "7fcf684e-609c-46c2-b2ac-e2a73899494e", "DetectTime": "2023-10-30T14:13:56.340358+02:00", "EventTime": "2023-10-30T14:13:56.340370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CZkEkh37txVE7jZoT1"]} -{"Format": "IDEA0", "ID": "6d06c7fa-270c-4499-b2dc-e378288fef21", "DetectTime": "2023-10-30T14:13:56.357304+02:00", "EventTime": "2023-10-30T14:13:56.357315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C3MKaz1bIVKbqoyQtk"]} -{"Format": "IDEA0", "ID": "c95b93e9-7c03-41df-a8af-84661dc95158", "DetectTime": "2023-10-30T14:13:56.375041+02:00", "EventTime": "2023-10-30T14:13:56.375051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CL1Fxi2IF0I7IrGOS8"]} -{"Format": "IDEA0", "ID": "1899fdd3-3587-49e4-9262-fc2e6df4ab2c", "DetectTime": "2023-10-30T14:13:56.396727+02:00", "EventTime": "2023-10-30T14:13:56.396741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKl45N1ZV3XxWQp8b3"]} -{"Format": "IDEA0", "ID": "5a9a47db-3b1a-430a-af67-d512b939b28e", "DetectTime": "2023-10-30T14:13:56.411959+02:00", "EventTime": "2023-10-30T14:13:56.411968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cvttdi442vFXv2btvg"]} -{"Format": "IDEA0", "ID": "38a75847-acb3-41c0-bcb5-3ae26f862412", "DetectTime": "2023-10-30T14:13:56.429919+02:00", "EventTime": "2023-10-30T14:13:56.429929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CsrPlbzyMCJZNeF08"]} -{"Format": "IDEA0", "ID": "21e4c2ca-f585-4ee7-9d91-662e551809d6", "DetectTime": "2023-10-30T14:13:56.448882+02:00", "EventTime": "2023-10-30T14:13:56.448897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CacTst2pebQQRKjQo8"]} -{"Format": "IDEA0", "ID": "a7ba4c9b-44b0-47fa-8d97-a4b4ceeaee36", "DetectTime": "2023-10-30T14:13:56.468515+02:00", "EventTime": "2023-10-30T14:13:56.468529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CiH9PesTyJbk9ygBe"]} -{"Format": "IDEA0", "ID": "63fd39c3-a49a-45d8-a95b-28c17662d5d2", "DetectTime": "2023-10-30T14:13:56.489025+02:00", "EventTime": "2023-10-30T14:13:56.489035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CFme9f4Sj4l5IcGVtb"]} -{"Format": "IDEA0", "ID": "51c220d2-946a-4e56-858d-0fc10e170480", "DetectTime": "2023-10-30T14:13:56.505150+02:00", "EventTime": "2023-10-30T14:13:56.505164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["Cfmays3az5jygIsbyd"]} -{"Format": "Json", "ID": "51c220d2-946a-4e56-858d-0fc10e170480", "DetectTime": "2023-10-30T14:13:56.505150+02:00", "EventTime": "2023-10-30T14:13:56.505164+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-09T23:55:49.322370+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 214. (real time 2023/10/30 14:13:56.562006)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a6948145-fe07-4694-bc60-ff1c2558e465", "DetectTime": "2023-10-30T14:13:56.565673+02:00", "EventTime": "2023-10-30T14:13:56.565683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CW68rk4OvTt78JLlQf"]} -{"Format": "IDEA0", "ID": "a3eca474-acf6-485c-b35d-5e2170bdd073", "DetectTime": "2023-10-30T14:13:56.585498+02:00", "EventTime": "2023-10-30T14:13:56.585517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C1I2os3fOvlcgjWZpk"]} -{"Format": "IDEA0", "ID": "c6d0af57-48c2-4e37-83d6-546fa44a8c3e", "DetectTime": "2023-10-30T14:13:56.600989+02:00", "EventTime": "2023-10-30T14:13:56.600999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CeyOEK1t75CQKOWBwg"]} -{"Format": "IDEA0", "ID": "19a03e55-e1f1-433c-a5d2-04f1e90863b9", "DetectTime": "2023-10-30T14:13:56.616705+02:00", "EventTime": "2023-10-30T14:13:56.616715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CLYLLo3WEUFyW2Vjge"]} -{"Format": "IDEA0", "ID": "3b8ae73f-0b5e-4e36-b643-609149c5efda", "DetectTime": "2023-10-30T14:13:56.632782+02:00", "EventTime": "2023-10-30T14:13:56.632792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cr4mrL1VOsC8JKxSS8"]} -{"Format": "IDEA0", "ID": "41e545fd-388f-44c7-9490-25a53fdd15f4", "DetectTime": "2023-10-30T14:13:56.646619+02:00", "EventTime": "2023-10-30T14:13:56.646630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CWZr9vLGzRpLSuiJe"]} -{"Format": "IDEA0", "ID": "1b175c9f-77b3-47c8-b86b-491f5d36f78d", "DetectTime": "2023-10-30T14:13:56.660358+02:00", "EventTime": "2023-10-30T14:13:56.660369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CnJqPh24NLMhTgHt8"]} -{"Format": "IDEA0", "ID": "a43cd8cb-2c66-4d17-9412-417552feb1ce", "DetectTime": "2023-10-30T14:13:56.676093+02:00", "EventTime": "2023-10-30T14:13:56.676104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CzBZe41h9TdUqI8wh6"]} -{"Format": "IDEA0", "ID": "6b80774a-b188-4b2d-8156-bc4a8d620899", "DetectTime": "2023-10-30T14:13:56.692046+02:00", "EventTime": "2023-10-30T14:13:56.692056+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CitBIu1rXMlf4Q1OD6"]} -{"Format": "IDEA0", "ID": "dc0c733d-d533-42e0-a99f-36f229d71e5b", "DetectTime": "2023-10-30T14:13:56.709777+02:00", "EventTime": "2023-10-30T14:13:56.709787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CgeuYYbarxtma4Y4"]} -{"Format": "IDEA0", "ID": "51cc29d6-3850-45da-9305-a72e1adc44f0", "DetectTime": "2023-10-30T14:13:56.723491+02:00", "EventTime": "2023-10-30T14:13:56.723501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CC8lep1YKysiJj2JW3"]} -{"Format": "IDEA0", "ID": "e1dd5016-bd2f-493f-8edc-57254b3e0b4a", "DetectTime": "2023-10-30T14:13:56.738407+02:00", "EventTime": "2023-10-30T14:13:56.738423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CrOkgc4ZySWZG2XmDi"]} -{"Format": "IDEA0", "ID": "0cd76c17-a974-4d27-81a6-8dc21188cafc", "DetectTime": "2023-10-30T14:13:56.759139+02:00", "EventTime": "2023-10-30T14:13:56.759154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CAmYpK2MnJpQD1NVTi"]} -{"Format": "IDEA0", "ID": "91512748-4ddb-4bb7-b907-7ecb5c400c10", "DetectTime": "2023-10-30T14:13:56.777885+02:00", "EventTime": "2023-10-30T14:13:56.777900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C40dwN2GPJTjlzUpUj"]} -{"Format": "IDEA0", "ID": "07d72e08-60dd-4cab-9e2a-b12e58a4e271", "DetectTime": "2023-10-30T14:13:56.801002+02:00", "EventTime": "2023-10-30T14:13:56.801015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CgFNQ14IffjXWE9CQi"]} -{"Format": "IDEA0", "ID": "b7fa5e4a-9237-43f1-bfd7-46d92bfd5f4c", "DetectTime": "2023-10-30T14:13:56.817313+02:00", "EventTime": "2023-10-30T14:13:56.817326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CGvb5u4KgMAgeee2Tk"]} -{"Format": "IDEA0", "ID": "01dbbd05-0cc5-4d49-acb3-51d7fb34f139", "DetectTime": "2023-10-30T14:13:56.837203+02:00", "EventTime": "2023-10-30T14:13:56.837214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cr6Vvi2H3ptTsDQt83"]} -{"Format": "IDEA0", "ID": "695d147a-d8f0-40de-94f9-1feefbdeb4bc", "DetectTime": "2023-10-30T14:13:56.853996+02:00", "EventTime": "2023-10-30T14:13:56.854006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CjxAkp4VunjT10dLsf"]} -{"Format": "IDEA0", "ID": "36571089-b0d8-48f5-8bd4-90fcf3356c15", "DetectTime": "2023-10-30T14:13:56.870427+02:00", "EventTime": "2023-10-30T14:13:56.870443+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["COmCBGKaa7sRcsU8j"]} -{"Format": "IDEA0", "ID": "15d28fad-e899-477a-b6cd-545d231758f4", "DetectTime": "2023-10-30T14:13:56.893201+02:00", "EventTime": "2023-10-30T14:13:56.893210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CkM0a61PD4ICFif2L7"]} -{"Format": "IDEA0", "ID": "4a7ee32b-4963-48ef-a095-ddce95f4506d", "DetectTime": "2023-10-30T14:13:56.907458+02:00", "EventTime": "2023-10-30T14:13:56.907470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CHiTqw1OWIcpZJQbF5"]} -{"Format": "IDEA0", "ID": "770fe229-cdf5-49b9-917c-9a39e47b2de1", "DetectTime": "2023-10-30T14:13:56.921151+02:00", "EventTime": "2023-10-30T14:13:56.921162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CHg1bV17PbyJ9lkFw5"]} -{"Format": "IDEA0", "ID": "7b473d7a-42b0-4ba2-b732-aa3ddb5bab95", "DetectTime": "2023-10-30T14:13:56.934682+02:00", "EventTime": "2023-10-30T14:13:56.934693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CenD4K2vXZCmxXbQYh"]} -{"Format": "IDEA0", "ID": "9d2f3cfd-9453-4f89-a89c-1a6e095fe4a3", "DetectTime": "2023-10-30T14:13:56.948712+02:00", "EventTime": "2023-10-30T14:13:56.948722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CIXIxA3VFwE2KCRup3"]} -{"Format": "IDEA0", "ID": "667a0a2b-5cb7-4f21-b2b6-2534e394752a", "DetectTime": "2023-10-30T14:13:56.961499+02:00", "EventTime": "2023-10-30T14:13:56.961508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CM4Vmj4gSCpkHSJhXe"]} -{"Format": "IDEA0", "ID": "7dfc358a-7719-4e04-9b24-2b1014c8e155", "DetectTime": "2023-10-30T14:13:56.976943+02:00", "EventTime": "2023-10-30T14:13:56.976953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTkQeU24hRNr6QufX1"]} -{"Format": "IDEA0", "ID": "2595299e-b9ca-4f89-bd2a-e520f69e11df", "DetectTime": "2023-10-30T14:13:57.005526+02:00", "EventTime": "2023-10-30T14:13:57.005538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CDsZux2MjZIZVvMBtg"]} -{"Format": "IDEA0", "ID": "c0e61df7-e7cb-464e-8a27-731005cf3208", "DetectTime": "2023-10-30T14:13:57.021083+02:00", "EventTime": "2023-10-30T14:13:57.021094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cy4okB2dCiBCy0OsGa"]} -{"Format": "IDEA0", "ID": "44d711c3-ea58-4f71-813e-73a434e7d098", "DetectTime": "2023-10-30T14:13:57.036590+02:00", "EventTime": "2023-10-30T14:13:57.036601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CEFwef3x0QiE0Xzy94"]} -{"Format": "IDEA0", "ID": "59462599-5664-427f-93ee-284a14b99658", "DetectTime": "2023-10-30T14:13:57.128974+02:00", "EventTime": "2023-10-30T14:13:57.129007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CfvWL81700bHYZr4C1"]} -{"Format": "IDEA0", "ID": "110768f1-3d9a-480c-8153-29602082ef4b", "DetectTime": "2023-10-30T14:13:57.148067+02:00", "EventTime": "2023-10-30T14:13:57.148081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CS6UJV2HNYq0YNlSxa"]} -{"Format": "IDEA0", "ID": "c0669400-0ff9-4349-9acb-b9bef47dfa0f", "DetectTime": "2023-10-30T14:13:57.164368+02:00", "EventTime": "2023-10-30T14:13:57.164380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CDxdWU3bnVlrRISjhg"]} -{"Format": "IDEA0", "ID": "bdf08b0b-73b3-40aa-b1dc-ca24fb607cd9", "DetectTime": "2023-10-30T14:13:57.196739+02:00", "EventTime": "2023-10-30T14:13:57.196754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C3Lp1WkczkDkDRZsc"]} -{"Format": "IDEA0", "ID": "92587575-03eb-4d2d-a692-7d4743b7311b", "DetectTime": "2023-10-30T14:13:57.233899+02:00", "EventTime": "2023-10-30T14:13:57.233910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CNRTG12fBip8VXxEV7"]} -{"Format": "IDEA0", "ID": "995f78f9-cb28-47dd-b099-a6e469df1a7e", "DetectTime": "2023-10-30T14:13:57.264631+02:00", "EventTime": "2023-10-30T14:13:57.264641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C0S7i261YqrmBCw7b"]} -{"Format": "IDEA0", "ID": "6882b7ab-e75d-483a-b9e9-0b1dbefb7fbe", "DetectTime": "2023-10-30T14:13:57.297954+02:00", "EventTime": "2023-10-30T14:13:57.297968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CoG7QJ3TS8UdxoYrT4"]} -{"Format": "IDEA0", "ID": "257592e5-38c9-478a-b223-30a34901b9a4", "DetectTime": "2023-10-30T14:13:57.318452+02:00", "EventTime": "2023-10-30T14:13:57.318467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CUOCm4ltPCyPjdrAj"]} -{"Format": "IDEA0", "ID": "d5bbf5d8-0eb7-4aee-bdbe-62a5bb88bb09", "DetectTime": "2023-10-30T14:13:57.338076+02:00", "EventTime": "2023-10-30T14:13:57.338090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CBKxMtgqtij6nZrml"]} -{"Format": "IDEA0", "ID": "eda8278a-0bcc-4567-8277-370414b573b8", "DetectTime": "2023-10-30T14:13:57.358540+02:00", "EventTime": "2023-10-30T14:13:57.358555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CAWLYQ2wfBYmgYNMKa"]} -{"Format": "IDEA0", "ID": "f36f49c4-22d8-4e37-809c-08088cffbc94", "DetectTime": "2023-10-30T14:13:57.377998+02:00", "EventTime": "2023-10-30T14:13:57.378014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CpFga81XbicvcUMqz4"]} -{"Format": "IDEA0", "ID": "f084b1d2-2fec-4c30-ad30-97f0ab3e6c26", "DetectTime": "2023-10-30T14:13:57.413514+02:00", "EventTime": "2023-10-30T14:13:57.413530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CGfNuG4FdJPIBB5ank"]} -{"Format": "IDEA0", "ID": "d91f0dcb-e8c8-4496-8056-c1a2e3a861e4", "DetectTime": "2023-10-30T14:13:57.433905+02:00", "EventTime": "2023-10-30T14:13:57.433921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CgY6k74qsTzeeTcSv2"]} -{"Format": "IDEA0", "ID": "81cb1c45-c606-4cf0-b4c7-b3e8bf6c98dd", "DetectTime": "2023-10-30T14:13:57.452970+02:00", "EventTime": "2023-10-30T14:13:57.452980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CnSujH1qBAb2HSDODc"]} -{"Format": "Json", "ID": "81cb1c45-c606-4cf0-b4c7-b3e8bf6c98dd", "DetectTime": "2023-10-30T14:13:57.452970+02:00", "EventTime": "2023-10-30T14:13:57.452980+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T00:26:29.718001+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 215. (real time 2023/10/30 14:13:57.527455)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5cabd18f-68be-4b45-8401-b8e58b9788a2", "DetectTime": "2023-10-30T14:13:57.532625+02:00", "EventTime": "2023-10-30T14:13:57.532641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Chds473JfK64rTDski"]} -{"Format": "IDEA0", "ID": "756bc390-5bdf-410c-956c-d23c3e08089a", "DetectTime": "2023-10-30T14:13:57.547681+02:00", "EventTime": "2023-10-30T14:13:57.547697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["ChgLv01uywf2tnUlWf"]} -{"Format": "IDEA0", "ID": "363b7acb-1f37-4e9a-8032-7ca6f6f0c69d", "DetectTime": "2023-10-30T14:13:57.561940+02:00", "EventTime": "2023-10-30T14:13:57.561951+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C4Nd6S1CAzu4fd55Fg"]} -{"Format": "IDEA0", "ID": "dce3bc46-848d-480a-9c0f-41dc6d5c481a", "DetectTime": "2023-10-30T14:13:57.575570+02:00", "EventTime": "2023-10-30T14:13:57.575580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CNeAul4qDU29Hdid7h"]} -{"Format": "IDEA0", "ID": "0d91703a-9cd6-429c-bd2c-89abae17b993", "DetectTime": "2023-10-30T14:13:57.589187+02:00", "EventTime": "2023-10-30T14:13:57.589198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CKAGTBeuajL3LKFbi"]} -{"Format": "IDEA0", "ID": "984245d8-77de-454f-8de8-bf9cf7acce19", "DetectTime": "2023-10-30T14:13:57.615551+02:00", "EventTime": "2023-10-30T14:13:57.615561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CgP3OT2qjVxxUZJQx7"]} -{"Format": "IDEA0", "ID": "147677da-df7a-439a-8f04-a6ae1067b355", "DetectTime": "2023-10-30T14:13:57.631205+02:00", "EventTime": "2023-10-30T14:13:57.631216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C9JNvbfXn18x9xWrk"]} -{"Format": "IDEA0", "ID": "9d0829d0-f483-4981-9c64-d132b6359f84", "DetectTime": "2023-10-30T14:13:57.645372+02:00", "EventTime": "2023-10-30T14:13:57.645383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CBPivz1qHz4EVNUwfa"]} -{"Format": "IDEA0", "ID": "61a9d10f-cdd9-443c-9966-98186ec0fd05", "DetectTime": "2023-10-30T14:13:57.660281+02:00", "EventTime": "2023-10-30T14:13:57.660292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CdedpS2K8z0rVXZOQ"]} -{"Format": "IDEA0", "ID": "7c6c9e3e-14ec-4d5e-924d-2b53ae212494", "DetectTime": "2023-10-30T14:13:57.676087+02:00", "EventTime": "2023-10-30T14:13:57.676097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cux4KU36NXMyElZZda"]} -{"Format": "IDEA0", "ID": "f0a4e988-76ff-4b12-b348-876ddcdb8ada", "DetectTime": "2023-10-30T14:13:57.709636+02:00", "EventTime": "2023-10-30T14:13:57.709652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CaRnF417358Qc8d3pb"]} -{"Format": "IDEA0", "ID": "a13483c8-c50f-4a04-8cf8-24502bcfad79", "DetectTime": "2023-10-30T14:13:57.728531+02:00", "EventTime": "2023-10-30T14:13:57.728541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cg3o8C2s6WffjcZ1Jj"]} -{"Format": "IDEA0", "ID": "064b2fc1-a24e-4b38-b581-de9cc1401492", "DetectTime": "2023-10-30T14:13:57.744078+02:00", "EventTime": "2023-10-30T14:13:57.744098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CEv1ul3JW7lTpAElvh"]} -{"Format": "IDEA0", "ID": "15d5795b-2a46-4039-b8d5-7e9516e2eece", "DetectTime": "2023-10-30T14:13:57.772362+02:00", "EventTime": "2023-10-30T14:13:57.772374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C9K9cG4hCWlPLpHkE3"]} -{"Format": "IDEA0", "ID": "ff6ab12a-e263-4a38-a84a-e008a09097df", "DetectTime": "2023-10-30T14:13:57.788053+02:00", "EventTime": "2023-10-30T14:13:57.788064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CCrcLM27BAGTrt95zd"]} -{"Format": "IDEA0", "ID": "6bfa37c4-f34f-40d9-ae18-d6d03d2bc6b3", "DetectTime": "2023-10-30T14:13:57.802645+02:00", "EventTime": "2023-10-30T14:13:57.802656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CBv1cw4HxErGrEYEBi"]} -{"Format": "IDEA0", "ID": "cbe66f87-dc10-46f6-abda-24bb3abdd78b", "DetectTime": "2023-10-30T14:13:57.818377+02:00", "EventTime": "2023-10-30T14:13:57.818388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cephl43uvZ3iXJxB76"]} -{"Format": "IDEA0", "ID": "4ec5bb71-899c-476c-be05-b262846ac37f", "DetectTime": "2023-10-30T14:13:57.833388+02:00", "EventTime": "2023-10-30T14:13:57.833399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C9vEScMvrpyCBunY1"]} -{"Format": "IDEA0", "ID": "a579118f-5a62-46b1-a80b-f7168d728a84", "DetectTime": "2023-10-30T14:13:57.849098+02:00", "EventTime": "2023-10-30T14:13:57.849111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CBSowtHYP2lL64lxj"]} -{"Format": "IDEA0", "ID": "8a24474a-1da2-40ff-bebf-f5a9e25ea1fc", "DetectTime": "2023-10-30T14:13:57.875821+02:00", "EventTime": "2023-10-30T14:13:57.875831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CTWYIH18rKOr705uG"]} -{"Format": "IDEA0", "ID": "7642cee8-8363-4695-9560-882be89dff4f", "DetectTime": "2023-10-30T14:13:57.891481+02:00", "EventTime": "2023-10-30T14:13:57.891493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CTMcxXGx6FH0USFZc"]} -{"Format": "IDEA0", "ID": "80764fad-69ff-4d3a-adb3-9c1b5a7d16fc", "DetectTime": "2023-10-30T14:13:57.906139+02:00", "EventTime": "2023-10-30T14:13:57.906149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cb2p5w35nSv6Wk3fBa"]} -{"Format": "IDEA0", "ID": "0372f1a2-3e29-4af2-bf90-993dc5671f1a", "DetectTime": "2023-10-30T14:13:57.923226+02:00", "EventTime": "2023-10-30T14:13:57.923235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CaVrLoPNguJCwBkr4"]} -{"Format": "IDEA0", "ID": "11e8dbf3-6eb8-4287-bbab-229e1237e91e", "DetectTime": "2023-10-30T14:13:57.952371+02:00", "EventTime": "2023-10-30T14:13:57.952381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cx82pn2elE3RX9oMKa"]} -{"Format": "IDEA0", "ID": "47cd662f-9738-49a3-814b-9fccd875e2ce", "DetectTime": "2023-10-30T14:13:57.967375+02:00", "EventTime": "2023-10-30T14:13:57.967385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CP0JMc2KlXa0DPIv8b"]} -{"Format": "IDEA0", "ID": "696d5e8b-5c61-4cfb-b600-980736ab9d6f", "DetectTime": "2023-10-30T14:13:57.986398+02:00", "EventTime": "2023-10-30T14:13:57.986416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CAADqAQHJbvVs1K43"]} -{"Format": "IDEA0", "ID": "d4e12854-0dba-4392-bd9e-f393d94a7c3e", "DetectTime": "2023-10-30T14:13:58.002260+02:00", "EventTime": "2023-10-30T14:13:58.002270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C94wwg15IJFKhF9S5i"]} -{"Format": "IDEA0", "ID": "ba517fef-8cb0-4d81-b4a0-5f2d6dd21d6c", "DetectTime": "2023-10-30T14:13:58.028993+02:00", "EventTime": "2023-10-30T14:13:58.029006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C1GP4t4N3N7iIe8Ew1"]} -{"Format": "IDEA0", "ID": "00c0dd5e-aafb-4195-bcf5-9cc265af757f", "DetectTime": "2023-10-30T14:13:58.047059+02:00", "EventTime": "2023-10-30T14:13:58.047076+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C1mwdA4BdJ5xpOfg8b"]} -{"Format": "IDEA0", "ID": "8a07e195-3e9f-4ddc-9a4e-2d9a13283742", "DetectTime": "2023-10-30T14:13:58.062179+02:00", "EventTime": "2023-10-30T14:13:58.062189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CE9VKX3safJnGHZZ4"]} -{"Format": "IDEA0", "ID": "48859773-4550-4bd5-9c8a-fa52146152f5", "DetectTime": "2023-10-30T14:13:58.075911+02:00", "EventTime": "2023-10-30T14:13:58.075922+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CLjDOB3cQnnofL3Flk"]} -{"Format": "IDEA0", "ID": "9abdd3d9-d8ab-4cae-9041-ead60fd911e3", "DetectTime": "2023-10-30T14:13:58.090423+02:00", "EventTime": "2023-10-30T14:13:58.090434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVKKBU37bIcr8ChFG4"]} -{"Format": "IDEA0", "ID": "89c80438-0323-4070-a662-d882bf71db86", "DetectTime": "2023-10-30T14:13:58.106667+02:00", "EventTime": "2023-10-30T14:13:58.106678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C8E6YV2kXqEKvUD7a9"]} -{"Format": "IDEA0", "ID": "e6fc80d8-d7ac-4bc6-8fa8-f42547f7d182", "DetectTime": "2023-10-30T14:13:58.120179+02:00", "EventTime": "2023-10-30T14:13:58.120194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CUnLSJ2FcFU6knK8t2"]} -{"Format": "IDEA0", "ID": "6ce34aec-67bd-4131-a47d-c66e1bec4cf9", "DetectTime": "2023-10-30T14:13:58.152493+02:00", "EventTime": "2023-10-30T14:13:58.152505+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cp3X0XnXKed7ycmYe"]} -{"Format": "IDEA0", "ID": "7b25072e-78d6-4724-8f37-ed44e54375e8", "DetectTime": "2023-10-30T14:13:58.168669+02:00", "EventTime": "2023-10-30T14:13:58.168687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CaWQxl2bA9JE8HIt3d"]} -{"Format": "IDEA0", "ID": "455130aa-3d02-462f-9bee-c385276420df", "DetectTime": "2023-10-30T14:13:58.188371+02:00", "EventTime": "2023-10-30T14:13:58.188386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cxqxvv1T92doaUQN87"]} -{"Format": "IDEA0", "ID": "21e034e6-69da-4eea-bc12-476756200c01", "DetectTime": "2023-10-30T14:13:58.207596+02:00", "EventTime": "2023-10-30T14:13:58.207610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cy7CTl3e4FpPz8FJUb"]} -{"Format": "IDEA0", "ID": "143f01e9-4d7b-4213-96e2-f7ea6bd95692", "DetectTime": "2023-10-30T14:13:58.227297+02:00", "EventTime": "2023-10-30T14:13:58.227313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CdusW01vQijbHRaiVi"]} -{"Format": "IDEA0", "ID": "65933c80-d3cd-4efc-a417-53a09e19a66a", "DetectTime": "2023-10-30T14:13:58.244237+02:00", "EventTime": "2023-10-30T14:13:58.244247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCzTPW10sgJUGpQ0q8"]} -{"Format": "IDEA0", "ID": "e0e0cb26-f235-4464-9e5d-b1ba92fa2df2", "DetectTime": "2023-10-30T14:13:58.260995+02:00", "EventTime": "2023-10-30T14:13:58.261007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CIK3Od1pLuJiRPV6c"]} -{"Format": "Json", "ID": "e0e0cb26-f235-4464-9e5d-b1ba92fa2df2", "DetectTime": "2023-10-30T14:13:58.260995+02:00", "EventTime": "2023-10-30T14:13:58.261007+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T00:26:31.820940+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 215. (real time 2023/10/30 14:13:58.342797)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5d824b16-70f9-4fca-b2b7-b7725cbfaa08", "DetectTime": "2023-10-30T14:13:58.348254+02:00", "EventTime": "2023-10-30T14:13:58.348273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CdKUBy16CScHL40B8j"]} -{"Format": "IDEA0", "ID": "48cde5df-5a9e-4d14-a9e8-e4bf2d5813d8", "DetectTime": "2023-10-30T14:13:58.366251+02:00", "EventTime": "2023-10-30T14:13:58.366263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CbqhSo3vlTg9U0inNk"]} -{"Format": "IDEA0", "ID": "9ba48f2d-41c8-41eb-bce3-7ec1ae8e07e8", "DetectTime": "2023-10-30T14:13:58.382735+02:00", "EventTime": "2023-10-30T14:13:58.382759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CuyHfpJevbqpSZf9"]} -{"Format": "IDEA0", "ID": "02fadff2-9140-426d-b681-07c5c7f88754", "DetectTime": "2023-10-30T14:13:58.399115+02:00", "EventTime": "2023-10-30T14:13:58.399129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CtruqHfJPZD1Logd1"]} -{"Format": "IDEA0", "ID": "422a39e5-f92d-4d97-9f49-79efaeab811c", "DetectTime": "2023-10-30T14:13:58.418302+02:00", "EventTime": "2023-10-30T14:13:58.418324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CuBaN22qhImuFfxWn2"]} -{"Format": "IDEA0", "ID": "98dc454c-7a16-4765-b322-257d761d08a4", "DetectTime": "2023-10-30T14:13:58.435109+02:00", "EventTime": "2023-10-30T14:13:58.435124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["ClVYec4qJh7v3Iqppb"]} -{"Format": "IDEA0", "ID": "a53e4123-1b7f-417d-9a73-d90a470af3d2", "DetectTime": "2023-10-30T14:13:58.452108+02:00", "EventTime": "2023-10-30T14:13:58.452122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CIXhmX2kG5DTpcSUcg"]} -{"Format": "IDEA0", "ID": "d7ef1b5e-1ec4-41ab-bcbc-1f2cc623af73", "DetectTime": "2023-10-30T14:13:58.469416+02:00", "EventTime": "2023-10-30T14:13:58.469428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CWeFuw4rcssRzAHJRk"]} -{"Format": "IDEA0", "ID": "60edcaf8-8b9d-4e34-aad6-e84981ddb96a", "DetectTime": "2023-10-30T14:13:58.487737+02:00", "EventTime": "2023-10-30T14:13:58.487748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["CHbvwD4sggdGhQCt55"]} -{"Format": "IDEA0", "ID": "19470d08-1f29-41a6-a90a-f0288017ab83", "DetectTime": "2023-10-30T14:13:58.521628+02:00", "EventTime": "2023-10-30T14:13:58.521640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CGTVI611rY9vFsNrzg"]} -{"Format": "IDEA0", "ID": "626d6f1c-493f-4abd-9699-826b4bf7a3f1", "DetectTime": "2023-10-30T14:13:58.538574+02:00", "EventTime": "2023-10-30T14:13:58.538585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CYD8nL39JbeCQVN4xf"]} -{"Format": "IDEA0", "ID": "025a40e9-6e3c-46a1-b2ae-d7560e8ed334", "DetectTime": "2023-10-30T14:13:58.555076+02:00", "EventTime": "2023-10-30T14:13:58.555087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CCIBOg40eNI7jihVG4"]} -{"Format": "IDEA0", "ID": "86c791d4-4f48-4211-b675-7e4c082e331b", "DetectTime": "2023-10-30T14:13:58.572952+02:00", "EventTime": "2023-10-30T14:13:58.572970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwKNQq23jGeTQYpyMl"]} -{"Format": "IDEA0", "ID": "41b27800-7eb3-43d9-96c7-e7752ae9d484", "DetectTime": "2023-10-30T14:13:58.590366+02:00", "EventTime": "2023-10-30T14:13:58.590376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cyi2G93G2AwTFbx0Je"]} -{"Format": "IDEA0", "ID": "837b49d1-0965-4db9-9a74-42b525698689", "DetectTime": "2023-10-30T14:13:58.608926+02:00", "EventTime": "2023-10-30T14:13:58.608944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CoI3Fh4antxoJZgOJ1"]} -{"Format": "IDEA0", "ID": "83e8a904-7e7c-46d7-ad21-5e4ffc0ef73d", "DetectTime": "2023-10-30T14:13:58.624664+02:00", "EventTime": "2023-10-30T14:13:58.624674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CP3bLo2TppEdbcesj5"]} -{"Format": "IDEA0", "ID": "4bf48509-186e-4b11-b8e2-e731c2387490", "DetectTime": "2023-10-30T14:13:58.641770+02:00", "EventTime": "2023-10-30T14:13:58.641780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9001], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. ", "ContentType": "text/plain"}], "uids": ["Cr8GrRrM7iXSZK5H2"]} -{"Format": "IDEA0", "ID": "fba82d17-6563-41bf-9af2-d10e56de1976", "DetectTime": "2023-10-30T14:13:58.668716+02:00", "EventTime": "2023-10-30T14:13:58.668728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["ChX2iFDDVAcvVZSH2"]} -{"Format": "IDEA0", "ID": "570dbbee-47dd-4dd6-bea7-4e518c253345", "DetectTime": "2023-10-30T14:13:58.685498+02:00", "EventTime": "2023-10-30T14:13:58.685513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Carz1s4TfCMCT76GQb"]} -{"Format": "IDEA0", "ID": "1f818b41-f457-43ac-a25a-f0b8a2fe7df2", "DetectTime": "2023-10-30T14:13:58.702368+02:00", "EventTime": "2023-10-30T14:13:58.702385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ChPmSUdDxc5y96pq3"]} -{"Format": "IDEA0", "ID": "bb37681b-418b-44bc-a9f0-955e54ed7ca1", "DetectTime": "2023-10-30T14:13:58.736088+02:00", "EventTime": "2023-10-30T14:13:58.736103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7ZbdO1YkgIRMR7pKb"]} -{"Format": "IDEA0", "ID": "9d2a42a4-46cf-47a9-88d5-8602f08da7eb", "DetectTime": "2023-10-30T14:13:58.751265+02:00", "EventTime": "2023-10-30T14:13:58.751275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cf0b7A4VbzylaCEkSl"]} -{"Format": "IDEA0", "ID": "b3748d26-7e7f-449d-be86-e1bd40f0b98d", "DetectTime": "2023-10-30T14:13:58.768304+02:00", "EventTime": "2023-10-30T14:13:58.768320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CEpzIz2vJONxlCj1W6"]} -{"Format": "IDEA0", "ID": "973e2dd4-7e0d-4d65-8c5c-2e052c83205a", "DetectTime": "2023-10-30T14:13:58.795806+02:00", "EventTime": "2023-10-30T14:13:58.795831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CiCIwN17ABam1ZSvE5"]} -{"Format": "IDEA0", "ID": "f5b40ec5-42d3-4935-862d-bdc5075d73dc", "DetectTime": "2023-10-30T14:13:58.811202+02:00", "EventTime": "2023-10-30T14:13:58.811213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CxFPpY1FPfpPkUGyY8"]} -{"Format": "IDEA0", "ID": "ad884145-3f97-427e-8b17-7afa3a04cbfa", "DetectTime": "2023-10-30T14:13:58.825498+02:00", "EventTime": "2023-10-30T14:13:58.825509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C2m1yL3yxfeIF4zbjb"]} -{"Format": "IDEA0", "ID": "534eda7d-ffe4-4cc1-8788-bb490d6439c6", "DetectTime": "2023-10-30T14:13:58.840586+02:00", "EventTime": "2023-10-30T14:13:58.840598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEqMha4Qk6nyL0MSWf"]} -{"Format": "IDEA0", "ID": "8812fac4-3dfd-4f28-914d-fce68c7d5196", "DetectTime": "2023-10-30T14:13:58.868605+02:00", "EventTime": "2023-10-30T14:13:58.868615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CUPeGiFGwMG43xdqf"]} -{"Format": "IDEA0", "ID": "e3f0f247-3471-4519-8b96-37759d9d142f", "DetectTime": "2023-10-30T14:13:58.881816+02:00", "EventTime": "2023-10-30T14:13:58.881832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ClQ6WE1c7drPha6pYj"]} -{"Format": "IDEA0", "ID": "2caac8fe-c9c0-4e44-9eb6-bc286546aa3c", "DetectTime": "2023-10-30T14:13:58.897491+02:00", "EventTime": "2023-10-30T14:13:58.897504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CtuK5Y13qJKeurDB79"]} -{"Format": "IDEA0", "ID": "46e9000c-8dff-435f-aee9-bac7eb7eeeda", "DetectTime": "2023-10-30T14:13:58.915667+02:00", "EventTime": "2023-10-30T14:13:58.915678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C2xQOr3aDzjBMDTOwk"]} -{"Format": "IDEA0", "ID": "8ade19db-e640-4567-840e-4ef009e98cd1", "DetectTime": "2023-10-30T14:13:58.931882+02:00", "EventTime": "2023-10-30T14:13:58.931896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["C9Sg0J4Npl0f3EHPj"]} -{"Format": "IDEA0", "ID": "a0803a2b-07ee-4b85-9ee7-819329ebb4a3", "DetectTime": "2023-10-30T14:13:58.963054+02:00", "EventTime": "2023-10-30T14:13:58.963067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CJ6VdWzZPNa9gwbi1"]} -{"Format": "IDEA0", "ID": "1545f550-c92d-447f-9ad3-71c4d6360318", "DetectTime": "2023-10-30T14:13:58.979222+02:00", "EventTime": "2023-10-30T14:13:58.979233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CzUsbhnkdZ51SY2o2"]} -{"Format": "IDEA0", "ID": "bf2bd5aa-217a-49c8-978b-7e77f0fdf5e1", "DetectTime": "2023-10-30T14:13:58.994360+02:00", "EventTime": "2023-10-30T14:13:58.994372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CZ9PbF4Nbrc2byR95k"]} -{"Format": "IDEA0", "ID": "56f5dd4b-fa82-4243-92fa-0f0aa5524673", "DetectTime": "2023-10-30T14:13:59.011235+02:00", "EventTime": "2023-10-30T14:13:59.011246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cn0IWb1GWjdwhhx73"]} -{"Format": "IDEA0", "ID": "c258da65-e2d9-4b2b-9e94-933dc7377ef4", "DetectTime": "2023-10-30T14:13:59.026751+02:00", "EventTime": "2023-10-30T14:13:59.026769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CMLktr4ASTRfdSECM6"]} -{"Format": "IDEA0", "ID": "30fe8d9c-de73-468d-b790-092a922e436b", "DetectTime": "2023-10-30T14:13:59.058380+02:00", "EventTime": "2023-10-30T14:13:59.058400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cg7nAl1zxhlkXjkU6g"]} -{"Format": "IDEA0", "ID": "41a933f2-4705-4318-83ae-17f3f9fbc7b4", "DetectTime": "2023-10-30T14:13:59.073614+02:00", "EventTime": "2023-10-30T14:13:59.073632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CRrsZr4iQkt07qxRk"]} -{"Format": "IDEA0", "ID": "e364e8f3-8a91-491b-b229-6b8b96337d76", "DetectTime": "2023-10-30T14:13:59.090367+02:00", "EventTime": "2023-10-30T14:13:59.090378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CTwQLk2qhgeWNbO5ph"]} -{"Format": "IDEA0", "ID": "3e580695-3b01-403b-af44-0793d887dc1a", "DetectTime": "2023-10-30T14:13:59.107371+02:00", "EventTime": "2023-10-30T14:13:59.107386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C1YkNB4bqyEd5FrpUh"]} -{"Format": "Json", "ID": "3e580695-3b01-403b-af44-0793d887dc1a", "DetectTime": "2023-10-30T14:13:59.107371+02:00", "EventTime": "2023-10-30T14:13:59.107386+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T00:26:34.153302+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 215. (real time 2023/10/30 14:13:59.177913)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "af135f09-8657-4648-a383-4d5355a2e827", "DetectTime": "2023-10-30T14:13:59.182040+02:00", "EventTime": "2023-10-30T14:13:59.182051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C0InLR1weR5lwwGg17"]} -{"Format": "IDEA0", "ID": "a0ae07c6-6a7c-4d5f-9b7a-79bfb121edab", "DetectTime": "2023-10-30T14:13:59.197752+02:00", "EventTime": "2023-10-30T14:13:59.197762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CMFaAO2FpZarLPSSL3"]} -{"Format": "IDEA0", "ID": "5a5df921-b311-40f3-921a-b60541f2d2e4", "DetectTime": "2023-10-30T14:13:59.213709+02:00", "EventTime": "2023-10-30T14:13:59.213725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C39MQO2d2p8XD0zLwj"]} -{"Format": "IDEA0", "ID": "39b80878-db06-4e22-a322-ae378553d181", "DetectTime": "2023-10-30T14:13:59.230504+02:00", "EventTime": "2023-10-30T14:13:59.230515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6NxNF2NRvd7EP6zH2"]} -{"Format": "IDEA0", "ID": "218133a5-cea6-4bbc-92fc-fc21020ac33d", "DetectTime": "2023-10-30T14:13:59.248455+02:00", "EventTime": "2023-10-30T14:13:59.248469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CMcImU9d5lQL2sNki"]} -{"Format": "IDEA0", "ID": "27a9ff37-4856-4e39-bb96-d4fc5c378d0f", "DetectTime": "2023-10-30T14:13:59.277527+02:00", "EventTime": "2023-10-30T14:13:59.277541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cxap0g2OtBuhWAVakj"]} -{"Format": "IDEA0", "ID": "d53ddd30-add1-429e-916f-b036756014e4", "DetectTime": "2023-10-30T14:13:59.295119+02:00", "EventTime": "2023-10-30T14:13:59.295130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6uSCs1ZhG279fmza"]} -{"Format": "IDEA0", "ID": "0b0d384e-5a32-4c67-839f-0f0eec622297", "DetectTime": "2023-10-30T14:13:59.312809+02:00", "EventTime": "2023-10-30T14:13:59.312827+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CdM77e2XCJQRvTaRU9"]} -{"Format": "IDEA0", "ID": "0cfe05d3-3e4c-47d9-82ab-014c599fff00", "DetectTime": "2023-10-30T14:13:59.329911+02:00", "EventTime": "2023-10-30T14:13:59.329928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CTgyGCTUdwNBa9Kg4"]} -{"Format": "IDEA0", "ID": "0e677785-4a96-44eb-8d27-9bdb1d1793ea", "DetectTime": "2023-10-30T14:13:59.348579+02:00", "EventTime": "2023-10-30T14:13:59.348595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CfdLPU1TXcUC4iNAWj"]} -{"Format": "IDEA0", "ID": "22b3d0fe-6a98-4f18-ad7a-0a3a7d59c71d", "DetectTime": "2023-10-30T14:13:59.381774+02:00", "EventTime": "2023-10-30T14:13:59.381789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CCBcAN2VpuUyBZf60k"]} -{"Format": "IDEA0", "ID": "c3c7dd3d-7cfb-4870-945f-f1e280c771a0", "DetectTime": "2023-10-30T14:13:59.401563+02:00", "EventTime": "2023-10-30T14:13:59.401578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CCF38a2U3cMHBGGPe"]} -{"Format": "IDEA0", "ID": "7e7c918f-84b6-4b29-9891-f17878b0565f", "DetectTime": "2023-10-30T14:13:59.421066+02:00", "EventTime": "2023-10-30T14:13:59.421076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CAVFQY2O3OeDCAuV98"]} -{"Format": "IDEA0", "ID": "e47a2560-56cd-4910-bdcc-1741674e9e9b", "DetectTime": "2023-10-30T14:13:59.436174+02:00", "EventTime": "2023-10-30T14:13:59.436184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CrgPq217IsGE93fGrh"]} -{"Format": "IDEA0", "ID": "51056b52-0852-4c32-9b85-00237da442b4", "DetectTime": "2023-10-30T14:13:59.452855+02:00", "EventTime": "2023-10-30T14:13:59.452870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CR9dq7dwyPT0JElf8"]} -{"Format": "IDEA0", "ID": "7e46ced6-9b9d-492b-96a1-726ce5c7207c", "DetectTime": "2023-10-30T14:13:59.479232+02:00", "EventTime": "2023-10-30T14:13:59.479248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CXjHrl2fyiwCTgRUF1"]} -{"Format": "IDEA0", "ID": "17eb6d2e-eecb-4f71-9fe8-65126605fc8e", "DetectTime": "2023-10-30T14:13:59.498047+02:00", "EventTime": "2023-10-30T14:13:59.498059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C2LjPp3KuBQE7nxqJb"]} -{"Format": "IDEA0", "ID": "40b92d45-aea7-4294-9c18-60468bbe4243", "DetectTime": "2023-10-30T14:13:59.515413+02:00", "EventTime": "2023-10-30T14:13:59.515430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CgyJxR3mbv87kC1Csf"]} -{"Format": "IDEA0", "ID": "9fd8edf4-b2f1-4310-bb58-87d54ffa40b6", "DetectTime": "2023-10-30T14:13:59.532072+02:00", "EventTime": "2023-10-30T14:13:59.532086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CVOV4A4BS3Rjedfs8i"]} -{"Format": "IDEA0", "ID": "c8a5646e-5c7a-462c-8a6e-7a6197204538", "DetectTime": "2023-10-30T14:13:59.550543+02:00", "EventTime": "2023-10-30T14:13:59.550553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CArqrp3LqADalzt6Vk"]} -{"Format": "IDEA0", "ID": "24635146-23e0-4d12-9994-bf5b3d080651", "DetectTime": "2023-10-30T14:13:59.567808+02:00", "EventTime": "2023-10-30T14:13:59.567818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CDtvI31uqYbwZsF9Xb"]} -{"Format": "IDEA0", "ID": "7f666dae-081f-4684-8a9f-0d296c3d5328", "DetectTime": "2023-10-30T14:13:59.584529+02:00", "EventTime": "2023-10-30T14:13:59.584540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CT5Iur2poVtBlTqGb2"]} -{"Format": "IDEA0", "ID": "04cb6714-68aa-4e9e-a7e2-371c021b9380", "DetectTime": "2023-10-30T14:13:59.599682+02:00", "EventTime": "2023-10-30T14:13:59.599691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C0ROqd3SQMk3FVIRjd"]} -{"Format": "IDEA0", "ID": "8a990eb5-06c5-4da8-bea8-e6c4c4146934", "DetectTime": "2023-10-30T14:13:59.617495+02:00", "EventTime": "2023-10-30T14:13:59.617509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CJIBKHPrJRWuyEr35"]} -{"Format": "IDEA0", "ID": "23c6e9b4-4353-4837-99e8-e3efd8995384", "DetectTime": "2023-10-30T14:13:59.636437+02:00", "EventTime": "2023-10-30T14:13:59.636451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CKb0W448s1QFiYmekb"]} -{"Format": "IDEA0", "ID": "9bf11227-ceec-40d0-b7d7-b6a8955af855", "DetectTime": "2023-10-30T14:13:59.664973+02:00", "EventTime": "2023-10-30T14:13:59.664987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CzklRJOH85OMK0G49"]} -{"Format": "IDEA0", "ID": "e4c14e8d-3738-457f-8585-1d3f59732d4c", "DetectTime": "2023-10-30T14:13:59.684191+02:00", "EventTime": "2023-10-30T14:13:59.684206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CPGGdw4h79JzBOUdZ9"]} -{"Format": "IDEA0", "ID": "69e72e1e-8cec-4e0f-a017-d9a19e7a50da", "DetectTime": "2023-10-30T14:13:59.715092+02:00", "EventTime": "2023-10-30T14:13:59.715109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CbsSr11I5XE3NamUSc"]} -{"Format": "IDEA0", "ID": "4ef4e23e-e9e8-41cd-86b4-508f16467bb8", "DetectTime": "2023-10-30T14:13:59.744021+02:00", "EventTime": "2023-10-30T14:13:59.744034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CEgC676XUTBNyHZdg"]} -{"Format": "IDEA0", "ID": "e7b4d4e6-9627-4667-ba5d-25e49a1f0207", "DetectTime": "2023-10-30T14:13:59.762241+02:00", "EventTime": "2023-10-30T14:13:59.762253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C0NDZd1YfTUU32xJ7h"]} -{"Format": "IDEA0", "ID": "a689d3f7-f348-49e7-a18e-870cf7c30fa6", "DetectTime": "2023-10-30T14:13:59.781181+02:00", "EventTime": "2023-10-30T14:13:59.781197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CfjWOL3gtC0KA29hUf"]} -{"Format": "IDEA0", "ID": "76d90323-18ea-425b-87e4-1c32f5c8c3b6", "DetectTime": "2023-10-30T14:13:59.812363+02:00", "EventTime": "2023-10-30T14:13:59.812373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C2whuj2nczMk6Xj9S9"]} -{"Format": "Json", "ID": "76d90323-18ea-425b-87e4-1c32f5c8c3b6", "DetectTime": "2023-10-30T14:13:59.812363+02:00", "EventTime": "2023-10-30T14:13:59.812373+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T00:56:45.160603+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 215. (real time 2023/10/30 14:13:59.880003)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e07d776d-8977-4739-9738-1dfa091a30c1", "DetectTime": "2023-10-30T14:13:59.884234+02:00", "EventTime": "2023-10-30T14:13:59.884250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CzDfWr3eLa5aqEMrWh"]} -{"Format": "IDEA0", "ID": "d345b094-ac2f-4ed9-be7d-2a17677a1ad0", "DetectTime": "2023-10-30T14:13:59.901266+02:00", "EventTime": "2023-10-30T14:13:59.901276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C6YKBF2Rq5QWipIkJd"]} -{"Format": "IDEA0", "ID": "93cec713-8425-4431-a965-a20fc5d43070", "DetectTime": "2023-10-30T14:13:59.917379+02:00", "EventTime": "2023-10-30T14:13:59.917390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CTfDX32hOndqEaghP7"]} -{"Format": "IDEA0", "ID": "0e950a05-ac02-4313-97ec-623dc96df930", "DetectTime": "2023-10-30T14:13:59.948182+02:00", "EventTime": "2023-10-30T14:13:59.948198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C8YQYNoMIUt7ceS8d"]} -{"Format": "IDEA0", "ID": "9c0ef17e-a835-46e9-90b8-664480e13692", "DetectTime": "2023-10-30T14:13:59.966111+02:00", "EventTime": "2023-10-30T14:13:59.966121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C7usIF22LubrOjPaS7"]} -{"Format": "IDEA0", "ID": "cd6f7f57-250c-4d53-b833-69133ff4c9d2", "DetectTime": "2023-10-30T14:13:59.982435+02:00", "EventTime": "2023-10-30T14:13:59.982446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C66Ls53M1ftx0I5iyf"]} -{"Format": "IDEA0", "ID": "f6e371c0-3c08-4fc8-9578-1784b3971ab5", "DetectTime": "2023-10-30T14:13:59.999945+02:00", "EventTime": "2023-10-30T14:13:59.999955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C0al5D1eVTUhn9M2Ha"]} -{"Format": "IDEA0", "ID": "6ebb85c6-c74c-48d7-8f5e-d1dbaaf31e46", "DetectTime": "2023-10-30T14:14:00.017234+02:00", "EventTime": "2023-10-30T14:14:00.017249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C3xhXO1zHsIDl6OA69"]} -{"Format": "IDEA0", "ID": "efdb56a8-ef2e-4604-bd83-7879833b6041", "DetectTime": "2023-10-30T14:14:00.043099+02:00", "EventTime": "2023-10-30T14:14:00.043116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C1tGw03XqOcVmfAKTk"]} -{"Format": "IDEA0", "ID": "964f922c-ec6e-4e83-bc35-02cf46c970f8", "DetectTime": "2023-10-30T14:14:00.061153+02:00", "EventTime": "2023-10-30T14:14:00.061164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CHZGgk21TwXdC2bU5"]} -{"Format": "IDEA0", "ID": "2f41a62d-8189-406c-a330-e13d98d712e3", "DetectTime": "2023-10-30T14:14:00.077390+02:00", "EventTime": "2023-10-30T14:14:00.077400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CgwX7y4V0y6mNSciCa"]} -{"Format": "IDEA0", "ID": "e4b64e4e-bcf9-4d84-9f7b-dc2908f139b3", "DetectTime": "2023-10-30T14:14:00.094726+02:00", "EventTime": "2023-10-30T14:14:00.094740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ccstwq4KuXjn6Iwik1"]} -{"Format": "IDEA0", "ID": "0e582c39-3642-496c-a5d4-d1028e214026", "DetectTime": "2023-10-30T14:14:00.110809+02:00", "EventTime": "2023-10-30T14:14:00.110826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cbb5pE2Nu5cjAJmva1"]} -{"Format": "IDEA0", "ID": "95a21f63-a289-4e2b-ab7c-619821698dc0", "DetectTime": "2023-10-30T14:14:00.140931+02:00", "EventTime": "2023-10-30T14:14:00.140946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CUE7MD17GD97H6PZD8"]} -{"Format": "IDEA0", "ID": "14c733d8-0ae9-4aec-9d15-5a9d59d2a450", "DetectTime": "2023-10-30T14:14:00.160045+02:00", "EventTime": "2023-10-30T14:14:00.160059+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C83ZIx32VROE3b9X7g"]} -{"Format": "IDEA0", "ID": "e7c4a822-0e09-45cd-9384-0cad7118651c", "DetectTime": "2023-10-30T14:14:00.177331+02:00", "EventTime": "2023-10-30T14:14:00.177348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cws8sE1r8OlmSmlska"]} -{"Format": "IDEA0", "ID": "f07984e8-94de-4d83-bfe8-f8063268aa3c", "DetectTime": "2023-10-30T14:14:00.196790+02:00", "EventTime": "2023-10-30T14:14:00.196813+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CZcmxz3R8HQr8pl6G2"]} -{"Format": "IDEA0", "ID": "d268dfc1-daff-429b-bda3-b9ce3a8fc645", "DetectTime": "2023-10-30T14:14:00.215499+02:00", "EventTime": "2023-10-30T14:14:00.215511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CPbcghwO2KdTlrfV7"]} -{"Format": "IDEA0", "ID": "0dd1d8fb-1838-474c-ab87-cb28153d4f97", "DetectTime": "2023-10-30T14:14:00.242868+02:00", "EventTime": "2023-10-30T14:14:00.242882+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsIElC4U9sbEYr1Ho2"]} -{"Format": "IDEA0", "ID": "de784d59-5a8b-4641-a612-bac9b96d9ebf", "DetectTime": "2023-10-30T14:14:00.259441+02:00", "EventTime": "2023-10-30T14:14:00.259457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C6nye31gv4YtM6K7Yh"]} -{"Format": "IDEA0", "ID": "c12c3501-839d-4fa6-98d1-c6ee6a81b1f8", "DetectTime": "2023-10-30T14:14:00.275692+02:00", "EventTime": "2023-10-30T14:14:00.275708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cx7iru3kSc00ZeD68c"]} -{"Format": "IDEA0", "ID": "c12b4615-2830-44b8-adf2-19a9c33d5b12", "DetectTime": "2023-10-30T14:14:00.292325+02:00", "EventTime": "2023-10-30T14:14:00.292337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CjHnwP3YQZpp80vWm5"]} -{"Format": "IDEA0", "ID": "7b72f1e7-fa6c-4a40-a525-98bc037ade37", "DetectTime": "2023-10-30T14:14:00.308902+02:00", "EventTime": "2023-10-30T14:14:00.308918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CbFlcC3BrNxeRU6sce"]} -{"Format": "IDEA0", "ID": "29b5115d-ddf0-4236-9487-cd52cff19cce", "DetectTime": "2023-10-30T14:14:00.325487+02:00", "EventTime": "2023-10-30T14:14:00.325511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CR7JcS3UY8PUeoRcG"]} -{"Format": "IDEA0", "ID": "8234bbe3-0d17-4e00-a87d-8ee1cecad184", "DetectTime": "2023-10-30T14:14:00.341958+02:00", "EventTime": "2023-10-30T14:14:00.341977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CUpfWf2jqIEHaTP0l2"]} -{"Format": "IDEA0", "ID": "d2ec409b-1426-4601-930f-0a4dc75fe53e", "DetectTime": "2023-10-30T14:14:00.369437+02:00", "EventTime": "2023-10-30T14:14:00.369454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CWXIq94XjZtnSi53zl"]} -{"Format": "IDEA0", "ID": "cce5101e-091b-4ee4-ab8a-16bf7af900ba", "DetectTime": "2023-10-30T14:14:00.386098+02:00", "EventTime": "2023-10-30T14:14:00.386109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6EZis2Bysd6Vd8eOe"]} -{"Format": "IDEA0", "ID": "e5db5719-a141-47cb-bd61-58c5bb941640", "DetectTime": "2023-10-30T14:14:00.403580+02:00", "EventTime": "2023-10-30T14:14:00.403593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CY3LMU2OAfCvN7dUSh"]} -{"Format": "IDEA0", "ID": "da7700af-af59-4258-920f-0774e43ccf5b", "DetectTime": "2023-10-30T14:14:00.423336+02:00", "EventTime": "2023-10-30T14:14:00.423352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9DkAA4nXH75zjAjAj"]} -{"Format": "IDEA0", "ID": "48b19fef-a56d-4868-a9af-c4d12b9a0da0", "DetectTime": "2023-10-30T14:14:00.440004+02:00", "EventTime": "2023-10-30T14:14:00.440019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CiLVU92hcmkNvqtb0f"]} -{"Format": "IDEA0", "ID": "950e5090-2c35-4002-a013-a6d8683f2a0c", "DetectTime": "2023-10-30T14:14:00.457666+02:00", "EventTime": "2023-10-30T14:14:00.457677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cyb2gp2NUj9UXehlHh"]} -{"Format": "IDEA0", "ID": "74be5a1f-58ae-42c0-8621-a30f00c893b1", "DetectTime": "2023-10-30T14:14:00.474180+02:00", "EventTime": "2023-10-30T14:14:00.474193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0chti2h6QYW50sL6c"]} -{"Format": "IDEA0", "ID": "cb97ce81-3afa-4f24-b70d-a6a6046ac5f9", "DetectTime": "2023-10-30T14:14:00.489476+02:00", "EventTime": "2023-10-30T14:14:00.489486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Czncci1ottqpZsR7l4"]} -{"Format": "IDEA0", "ID": "7594067b-b011-44ac-a176-21e30d025fd3", "DetectTime": "2023-10-30T14:14:00.503709+02:00", "EventTime": "2023-10-30T14:14:00.503721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CKw5ML1PWvkPwW7X6c"]} -{"Format": "IDEA0", "ID": "597d4e5e-3d8a-4ae3-9f1d-c87f72c73343", "DetectTime": "2023-10-30T14:14:00.524604+02:00", "EventTime": "2023-10-30T14:14:00.524622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CSiUmg3msX7WuAyIG6"]} -{"Format": "IDEA0", "ID": "291c2766-bedd-4b4d-b8fe-d84094701da4", "DetectTime": "2023-10-30T14:14:00.541666+02:00", "EventTime": "2023-10-30T14:14:00.541680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CDCwtV2dGu4sjFLFC3"]} -{"Format": "IDEA0", "ID": "3424262d-f533-4501-9c03-9c766ce0c966", "DetectTime": "2023-10-30T14:14:00.568456+02:00", "EventTime": "2023-10-30T14:14:00.568472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C4Nv0igSBYYmDyFMc"]} -{"Format": "IDEA0", "ID": "a9faf85f-dad6-45fb-82ac-b50e9297df5c", "DetectTime": "2023-10-30T14:14:00.586366+02:00", "EventTime": "2023-10-30T14:14:00.586395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CWlpiqTmbVXi64YVg"]} -{"Format": "IDEA0", "ID": "b0193b05-c9ef-471f-b900-8212911f0186", "DetectTime": "2023-10-30T14:14:00.606307+02:00", "EventTime": "2023-10-30T14:14:00.606324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CPeaZG3TiY0eImkJbf"]} -{"Format": "IDEA0", "ID": "1c4cae66-a34e-4b93-8307-99a43dfae92d", "DetectTime": "2023-10-30T14:14:00.625731+02:00", "EventTime": "2023-10-30T14:14:00.625746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CaMaUD353jIU9viIb"]} -{"Format": "IDEA0", "ID": "44a7d387-9f80-4391-ba8c-4914f02a62df", "DetectTime": "2023-10-30T14:14:00.643701+02:00", "EventTime": "2023-10-30T14:14:00.643718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CdFObo4qGTyOYLnb6"]} -{"Format": "IDEA0", "ID": "c2165754-0533-4adc-bb7b-9088a6ea0b39", "DetectTime": "2023-10-30T14:14:00.661631+02:00", "EventTime": "2023-10-30T14:14:00.661642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C6wfen4nlJTHdmqJPd"]} -{"Format": "IDEA0", "ID": "8b1326c1-3696-446c-9b2f-a3889052ec77", "DetectTime": "2023-10-30T14:14:00.678446+02:00", "EventTime": "2023-10-30T14:14:00.678459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cl3cTLchDZiQwhE3e"]} -{"Format": "IDEA0", "ID": "c73622f3-e738-48a2-ba98-5a7e3ec10fa5", "DetectTime": "2023-10-30T14:14:00.697190+02:00", "EventTime": "2023-10-30T14:14:00.697206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ck8L4f2dqykDPnZ3xb"]} -{"Format": "IDEA0", "ID": "830e3c02-a5bd-4f12-b826-5bb6fcb984b8", "DetectTime": "2023-10-30T14:14:00.714294+02:00", "EventTime": "2023-10-30T14:14:00.714308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C1TVPAfrebsqbWESd"]} -{"Format": "IDEA0", "ID": "e5794bc5-edf7-42d2-8a6b-e0816b841a59", "DetectTime": "2023-10-30T14:14:00.743760+02:00", "EventTime": "2023-10-30T14:14:00.743776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cmciyz16FoGc2m44hd"]} -{"Format": "IDEA0", "ID": "afa450ad-dfe9-497f-a5fe-8d42ded9e72f", "DetectTime": "2023-10-30T14:14:00.761765+02:00", "EventTime": "2023-10-30T14:14:00.761781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CZf31V10rikw4qFxja"]} -{"Format": "IDEA0", "ID": "5a1b4a02-18db-48f6-9589-6058baa1b345", "DetectTime": "2023-10-30T14:14:00.782199+02:00", "EventTime": "2023-10-30T14:14:00.782215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CkWvKC2NHCEKk3uQd"]} -{"Format": "IDEA0", "ID": "79d253fc-0739-444c-8bda-931f8cb57570", "DetectTime": "2023-10-30T14:14:00.799535+02:00", "EventTime": "2023-10-30T14:14:00.799548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CxahNE2NbAnh987rpi"]} -{"Format": "IDEA0", "ID": "4991f97b-9530-41f3-8de4-4976a131ceec", "DetectTime": "2023-10-30T14:14:00.815039+02:00", "EventTime": "2023-10-30T14:14:00.815063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CURWRYS76OpANv8Ta"]} -{"Format": "IDEA0", "ID": "d664d82a-5e66-46d0-bdb4-dc956b45a4c3", "DetectTime": "2023-10-30T14:14:00.830139+02:00", "EventTime": "2023-10-30T14:14:00.830149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXsi6822bOyILrytB2"]} -{"Format": "IDEA0", "ID": "66cd3678-2a8f-4f92-bf7c-d3af91a0e874", "DetectTime": "2023-10-30T14:14:00.846298+02:00", "EventTime": "2023-10-30T14:14:00.846313+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CnQCZa15oOoPW2uqOh"]} -{"Format": "IDEA0", "ID": "8dbf3533-6014-4eb6-aa86-d6a4a2c09201", "DetectTime": "2023-10-30T14:14:00.863250+02:00", "EventTime": "2023-10-30T14:14:00.863265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKygwG2GFmpxDg5LU7"]} -{"Format": "IDEA0", "ID": "bbe232cb-f41b-4e79-b0d8-7836511c18f9", "DetectTime": "2023-10-30T14:14:00.878337+02:00", "EventTime": "2023-10-30T14:14:00.878362+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVvs642Zo8uDWIWcd7"]} -{"Format": "IDEA0", "ID": "75baf643-b535-45c7-b7f4-0f91c68f7446", "DetectTime": "2023-10-30T14:14:00.892847+02:00", "EventTime": "2023-10-30T14:14:00.892858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CwZHGE0h88dV7XoNg"]} -{"Format": "IDEA0", "ID": "0750310e-ebb6-48a1-a95c-323fa12e15cf", "DetectTime": "2023-10-30T14:14:00.907861+02:00", "EventTime": "2023-10-30T14:14:00.907872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CL6MxF2TXeEDKmUGWh"]} -{"Format": "IDEA0", "ID": "6a0faa00-14b1-4158-94f7-a2e47ea09042", "DetectTime": "2023-10-30T14:14:00.922638+02:00", "EventTime": "2023-10-30T14:14:00.922664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cq0trr3I3wpm1Zjldg"]} -{"Format": "Json", "ID": "6a0faa00-14b1-4158-94f7-a2e47ea09042", "DetectTime": "2023-10-30T14:14:00.922638+02:00", "EventTime": "2023-10-30T14:14:00.922664+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T00:56:46.897948+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 215. (real time 2023/10/30 14:14:00.982047)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "06e52d8d-bc30-4e02-875d-549f98adfa68", "DetectTime": "2023-10-30T14:14:00.986988+02:00", "EventTime": "2023-10-30T14:14:00.987015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CSAabAxffo0aN6Ux"]} -{"Format": "IDEA0", "ID": "3ae5bf0a-a4a8-4514-a7bb-1375c39ee44c", "DetectTime": "2023-10-30T14:14:01.003835+02:00", "EventTime": "2023-10-30T14:14:01.003851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CRB1jr3MF1WjwKG36"]} -{"Format": "IDEA0", "ID": "ad5bb940-ea34-4ac0-9821-e5c5b52fd4ec", "DetectTime": "2023-10-30T14:14:01.018517+02:00", "EventTime": "2023-10-30T14:14:01.018529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CbrZTb3JktOy0jXjJ1"]} -{"Format": "IDEA0", "ID": "9915f8f3-c741-4d25-8105-0321f2b28288", "DetectTime": "2023-10-30T14:14:01.034591+02:00", "EventTime": "2023-10-30T14:14:01.034603+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cpd7i34MIKLIwlyLoe"]} -{"Format": "IDEA0", "ID": "2849a46c-e7c1-48a3-9f54-cfceea2e6f80", "DetectTime": "2023-10-30T14:14:01.048880+02:00", "EventTime": "2023-10-30T14:14:01.048892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CelrOBYJPMHb7Wx51"]} -{"Format": "IDEA0", "ID": "edbfec75-d553-47fa-bb67-94d6d9cc5681", "DetectTime": "2023-10-30T14:14:01.063973+02:00", "EventTime": "2023-10-30T14:14:01.063983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cj1x4v48Z4G1lSyx2k"]} -{"Format": "IDEA0", "ID": "625fa152-c5d6-4479-a8a9-b8e2045d3de2", "DetectTime": "2023-10-30T14:14:01.080070+02:00", "EventTime": "2023-10-30T14:14:01.080086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CqvLC24u1bF0UBgqE1"]} -{"Format": "IDEA0", "ID": "0cf015cc-5332-4aaf-8101-c65a36e29b63", "DetectTime": "2023-10-30T14:14:01.097053+02:00", "EventTime": "2023-10-30T14:14:01.097068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Ct4ZQ61zBCuXh6r5D8"]} -{"Format": "IDEA0", "ID": "1801ded3-1c8b-4d38-9c26-f3ceae9fcca6", "DetectTime": "2023-10-30T14:14:01.114461+02:00", "EventTime": "2023-10-30T14:14:01.114476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CTJLo9453C8rSHIk64"]} -{"Format": "IDEA0", "ID": "3420aaa6-4bff-4600-9734-d7ac5a3e9d41", "DetectTime": "2023-10-30T14:14:01.129569+02:00", "EventTime": "2023-10-30T14:14:01.129581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CYl7JxI26Lx0cTHs9"]} -{"Format": "IDEA0", "ID": "c99abdff-b20d-44c2-8e4b-ecebbf063c90", "DetectTime": "2023-10-30T14:14:01.144530+02:00", "EventTime": "2023-10-30T14:14:01.144546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CS377m3seniQlIN8B9"]} -{"Format": "IDEA0", "ID": "1b8588d7-f4a7-4429-8163-d19223afce05", "DetectTime": "2023-10-30T14:14:01.158977+02:00", "EventTime": "2023-10-30T14:14:01.158992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["ClQV6l4aimoxtFboqg"]} -{"Format": "IDEA0", "ID": "e2b2f96d-e173-4a03-8f3c-24c5c1d584a6", "DetectTime": "2023-10-30T14:14:01.176017+02:00", "EventTime": "2023-10-30T14:14:01.176033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Ci3XNd3ZwiE3qR45m"]} -{"Format": "IDEA0", "ID": "575eb42b-8d32-48b1-a44d-f1c1c75ed77d", "DetectTime": "2023-10-30T14:14:01.192964+02:00", "EventTime": "2023-10-30T14:14:01.192976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8863], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. ", "ContentType": "text/plain"}], "uids": ["Cb07md4n8qzs3FObO3"]} -{"Format": "IDEA0", "ID": "0dd6f234-05c9-4039-8308-bd131161e414", "DetectTime": "2023-10-30T14:14:01.216231+02:00", "EventTime": "2023-10-30T14:14:01.216244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C3ZPF91XSJHql3LN47"]} -{"Format": "IDEA0", "ID": "35a9a7c1-37e1-4637-9264-cfd7b2a55a6a", "DetectTime": "2023-10-30T14:14:01.231621+02:00", "EventTime": "2023-10-30T14:14:01.231632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CT7HhG4lHCgXWtqqK5"]} -{"Format": "IDEA0", "ID": "ef5e57ab-4227-48ca-9091-2f754bcdff74", "DetectTime": "2023-10-30T14:14:01.249122+02:00", "EventTime": "2023-10-30T14:14:01.249138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPBjnH7p95FE8gEli"]} -{"Format": "IDEA0", "ID": "4a11580b-1f37-4ad6-8a11-1ea8b199b4bf", "DetectTime": "2023-10-30T14:14:01.263611+02:00", "EventTime": "2023-10-30T14:14:01.263622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CxpIJE4tzTzjZZnI36"]} -{"Format": "IDEA0", "ID": "f732908e-3e3c-44bb-b301-23c801c5edfe", "DetectTime": "2023-10-30T14:14:01.281134+02:00", "EventTime": "2023-10-30T14:14:01.281150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CIvD4g3QvXcYZQWNA1"]} -{"Format": "IDEA0", "ID": "326fea90-ff3e-4a8d-b49e-ea81b0aa310e", "DetectTime": "2023-10-30T14:14:01.298500+02:00", "EventTime": "2023-10-30T14:14:01.298517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CVqXiK1LEsB9aK6P82"]} -{"Format": "IDEA0", "ID": "0f07d49a-f714-4cc0-97fb-cd50249772cc", "DetectTime": "2023-10-30T14:14:01.312622+02:00", "EventTime": "2023-10-30T14:14:01.312636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CITCEF3ddVuUIb7wt6"]} -{"Format": "IDEA0", "ID": "666397ea-9485-4843-ad15-aff1f264cd2d", "DetectTime": "2023-10-30T14:14:01.327993+02:00", "EventTime": "2023-10-30T14:14:01.328010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CCKMWo3G4P3G3NQ771"]} -{"Format": "IDEA0", "ID": "514d5dc2-e788-45b9-93c4-c91da1445c60", "DetectTime": "2023-10-30T14:14:01.342971+02:00", "EventTime": "2023-10-30T14:14:01.342983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Ctr6xlg0dq239Tpkk"]} -{"Format": "IDEA0", "ID": "a5655331-dda7-489a-a855-3ce606dc27cf", "DetectTime": "2023-10-30T14:14:01.356395+02:00", "EventTime": "2023-10-30T14:14:01.356406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtvzVn32mAk65PXom2"]} -{"Format": "IDEA0", "ID": "ed7c4cf0-df06-44a5-9afd-ebcbced1e9ad", "DetectTime": "2023-10-30T14:14:01.371386+02:00", "EventTime": "2023-10-30T14:14:01.371405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CF1PhC4FOf9SgnE7b9"]} -{"Format": "IDEA0", "ID": "58de7e42-fc17-4ea0-8251-93f2c0632f6a", "DetectTime": "2023-10-30T14:14:01.387365+02:00", "EventTime": "2023-10-30T14:14:01.387380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CcXMoC3dcAtPjA9mng"]} -{"Format": "IDEA0", "ID": "22a008ce-1d55-44f0-a2fd-57b9438c0f13", "DetectTime": "2023-10-30T14:14:01.403272+02:00", "EventTime": "2023-10-30T14:14:01.403282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CSTVpp49xxdwWzdoeb"]} -{"Format": "IDEA0", "ID": "a27dfbba-477a-4250-b552-50346fcc9c72", "DetectTime": "2023-10-30T14:14:01.418122+02:00", "EventTime": "2023-10-30T14:14:01.418139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C4yDCh39tjsvxgXH04"]} -{"Format": "IDEA0", "ID": "927af298-e5fd-4313-a6fa-1aba4c3f437b", "DetectTime": "2023-10-30T14:14:01.432329+02:00", "EventTime": "2023-10-30T14:14:01.432353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C6qs3615w2ys8Ys7n8"]} -{"Format": "IDEA0", "ID": "2828f4bc-dd9e-4d3e-a534-71d110a1f6a2", "DetectTime": "2023-10-30T14:14:01.449545+02:00", "EventTime": "2023-10-30T14:14:01.449556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C9emKs4XhMa5YLznK7"]} -{"Format": "IDEA0", "ID": "8b46d8b6-00ce-4b9b-8882-134327fc1dde", "DetectTime": "2023-10-30T14:14:01.473213+02:00", "EventTime": "2023-10-30T14:14:01.473229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBz2Bk1kgz0teK87cj"]} -{"Format": "IDEA0", "ID": "e89ed54c-099e-48d4-9493-113af6f7f099", "DetectTime": "2023-10-30T14:14:01.486032+02:00", "EventTime": "2023-10-30T14:14:01.486043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cm7mzbIVCp3Qsowc7"]} -{"Format": "IDEA0", "ID": "d8bd94d4-182e-47ce-94a5-98a747e5d8e4", "DetectTime": "2023-10-30T14:14:01.500002+02:00", "EventTime": "2023-10-30T14:14:01.500013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CCUweUTOkiLxsRNRb"]} -{"Format": "IDEA0", "ID": "66a03075-55e1-4707-bd16-b39fa391f1e5", "DetectTime": "2023-10-30T14:14:01.512356+02:00", "EventTime": "2023-10-30T14:14:01.512366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CWcTnu10ZQrTYPOAJd"]} -{"Format": "IDEA0", "ID": "613c600f-b0e0-4e53-b90c-ffeed7026f6f", "DetectTime": "2023-10-30T14:14:01.524969+02:00", "EventTime": "2023-10-30T14:14:01.524980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CS09Ae4qVyF0VLTfY2"]} -{"Format": "IDEA0", "ID": "db7c9812-8fbd-45b1-988d-fd20fb50c7f1", "DetectTime": "2023-10-30T14:14:01.538496+02:00", "EventTime": "2023-10-30T14:14:01.538508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CxOt3W3scwIwb2HuLh"]} -{"Format": "IDEA0", "ID": "a4aaf47a-0533-43f1-9827-7518d75a35b9", "DetectTime": "2023-10-30T14:14:01.552188+02:00", "EventTime": "2023-10-30T14:14:01.552199+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CzgBFE33QsHP68RbJk"]} -{"Format": "IDEA0", "ID": "4680362a-c073-4383-8bdd-33174f1f33a0", "DetectTime": "2023-10-30T14:14:01.566561+02:00", "EventTime": "2023-10-30T14:14:01.566573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C33hVE9dN1KVJb3te"]} -{"Format": "IDEA0", "ID": "57a1f5b4-aaf4-45eb-890a-0a6d27882c32", "DetectTime": "2023-10-30T14:14:01.580644+02:00", "EventTime": "2023-10-30T14:14:01.580655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CZwFqq44nlATs3ugc"]} -{"Format": "IDEA0", "ID": "5a5a70a4-d579-4f29-9671-7e6187528b84", "DetectTime": "2023-10-30T14:14:01.594602+02:00", "EventTime": "2023-10-30T14:14:01.594613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CEXgU8TRm9aAxizAl"]} -{"Format": "IDEA0", "ID": "615328fb-527a-4c6e-ae9c-a664ab655185", "DetectTime": "2023-10-30T14:14:01.611327+02:00", "EventTime": "2023-10-30T14:14:01.611353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CrXmSJwv1vGHFFPij"]} -{"Format": "IDEA0", "ID": "2e7046ff-5f98-44b7-98a8-4901732c3b5d", "DetectTime": "2023-10-30T14:14:01.626700+02:00", "EventTime": "2023-10-30T14:14:01.626717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C8NGJ3ghTynlxeGu"]} -{"Format": "IDEA0", "ID": "c17c15c9-eca2-4a08-9c5d-914141a1b097", "DetectTime": "2023-10-30T14:14:01.648871+02:00", "EventTime": "2023-10-30T14:14:01.648888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cqiq6s2br5fEJIjEu9"]} -{"Format": "IDEA0", "ID": "a1d8a230-ea05-4567-867c-cae6a536fcd2", "DetectTime": "2023-10-30T14:14:01.662891+02:00", "EventTime": "2023-10-30T14:14:01.662901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CHC02K3CEg6oAEi0zb"]} -{"Format": "IDEA0", "ID": "932ae099-2efb-4e97-bfd0-b59046120fa2", "DetectTime": "2023-10-30T14:14:01.677166+02:00", "EventTime": "2023-10-30T14:14:01.677180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNvjZv31xHcjCdMbph"]} -{"Format": "IDEA0", "ID": "b1ed2b81-45fb-4937-a07d-ed48b49cf624", "DetectTime": "2023-10-30T14:14:01.691304+02:00", "EventTime": "2023-10-30T14:14:01.691315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CEGPQw4olC0JuD407f"]} -{"Format": "IDEA0", "ID": "515d9f97-2e51-4271-97c9-ff701fd4c06e", "DetectTime": "2023-10-30T14:14:01.706101+02:00", "EventTime": "2023-10-30T14:14:01.706114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CMeyvj1UJSNN4IDnU5"]} -{"Format": "IDEA0", "ID": "3e2eff42-2daf-4fea-a98e-d3e8ea55e7dd", "DetectTime": "2023-10-30T14:14:01.721910+02:00", "EventTime": "2023-10-30T14:14:01.721926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsfmW61Od7sFOvAS26"]} -{"Format": "IDEA0", "ID": "6de0b3ef-efb5-45dd-a3da-8aa8e833a25c", "DetectTime": "2023-10-30T14:14:01.737113+02:00", "EventTime": "2023-10-30T14:14:01.737126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1YAlr3j1e6kktfk4h"]} -{"Format": "IDEA0", "ID": "c32bd827-211e-4253-9607-f0d439361ed6", "DetectTime": "2023-10-30T14:14:01.752290+02:00", "EventTime": "2023-10-30T14:14:01.752301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["COWcqX2QTExVkrGr2i"]} -{"Format": "IDEA0", "ID": "6c1b353f-13f3-48a5-9b55-9699489b1806", "DetectTime": "2023-10-30T14:14:01.775760+02:00", "EventTime": "2023-10-30T14:14:01.775771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CVeUOc3H19a9luuvLi"]} -{"Format": "IDEA0", "ID": "a5151e45-399b-461c-a45e-4f5a718f030e", "DetectTime": "2023-10-30T14:14:01.790274+02:00", "EventTime": "2023-10-30T14:14:01.790287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CzJBvk4sLCVc9LpdFj"]} -{"Format": "IDEA0", "ID": "d7a2b7c1-511c-4950-9fe2-00aedbf71626", "DetectTime": "2023-10-30T14:14:01.804848+02:00", "EventTime": "2023-10-30T14:14:01.804864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C1UK7p2JxXf2qadpy3"]} -{"Format": "IDEA0", "ID": "3dccf9d6-33fb-49db-8fe6-de5dcfbe74fa", "DetectTime": "2023-10-30T14:14:01.818598+02:00", "EventTime": "2023-10-30T14:14:01.818612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cn1Jrm3eTGdJMz6js4"]} -{"Format": "IDEA0", "ID": "a3da1239-9325-4d4d-82fb-2b493fe98dfc", "DetectTime": "2023-10-30T14:14:01.832659+02:00", "EventTime": "2023-10-30T14:14:01.832669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CCegR52WY9m8Irj1f8"]} -{"Format": "IDEA0", "ID": "69522109-e5dd-432c-b4ca-c72013adf904", "DetectTime": "2023-10-30T14:14:01.848258+02:00", "EventTime": "2023-10-30T14:14:01.848269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C2pbst2kMLbZBKI4Vd"]} -{"Format": "IDEA0", "ID": "46a5291b-b652-4876-af6e-519a4e130b8c", "DetectTime": "2023-10-30T14:14:01.863140+02:00", "EventTime": "2023-10-30T14:14:01.863156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CyQirc2UZ6L4gommcb"]} -{"Format": "IDEA0", "ID": "70786b45-4ae9-48bf-8397-36fc499fe934", "DetectTime": "2023-10-30T14:14:01.878366+02:00", "EventTime": "2023-10-30T14:14:01.878381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CZ7hdEHKiILngKgle"]} -{"Format": "IDEA0", "ID": "74e64459-935b-48ad-9a86-dfcea7a3fd02", "DetectTime": "2023-10-30T14:14:01.892781+02:00", "EventTime": "2023-10-30T14:14:01.892797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CYNUj12UJTb6kHTMvf"]} -{"Format": "IDEA0", "ID": "b692aedf-845f-48dc-958a-48cbe4e4adcd", "DetectTime": "2023-10-30T14:14:01.907489+02:00", "EventTime": "2023-10-30T14:14:01.907500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CiylOh3CeD9zLGsAU5"]} -{"Format": "IDEA0", "ID": "77d08f99-3475-4dee-8be6-051c4e399f4b", "DetectTime": "2023-10-30T14:14:01.922613+02:00", "EventTime": "2023-10-30T14:14:01.922629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CeDjVP3la6EU2D2Tte"]} -{"Format": "IDEA0", "ID": "f136669c-5531-4cef-9311-3bb473dee6e6", "DetectTime": "2023-10-30T14:14:01.937410+02:00", "EventTime": "2023-10-30T14:14:01.937421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C1pkom4vkoVOvnLR41"]} -{"Format": "IDEA0", "ID": "3fc7c6c6-ec5a-43fa-a610-ab43252a04cb", "DetectTime": "2023-10-30T14:14:01.951640+02:00", "EventTime": "2023-10-30T14:14:01.951652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CK2Wf74CJS0xaAmVH2"]} -{"Format": "IDEA0", "ID": "69df6062-b4b9-42db-ad28-30605595ea06", "DetectTime": "2023-10-30T14:14:01.965197+02:00", "EventTime": "2023-10-30T14:14:01.965208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C7uSCw3D8VfjV9DB9j"]} -{"Format": "IDEA0", "ID": "5bb15b84-c6bc-4380-a7bc-ca1e30bfe837", "DetectTime": "2023-10-30T14:14:01.979252+02:00", "EventTime": "2023-10-30T14:14:01.979265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CIwN8ABm3orm0Masj"]} -{"Format": "IDEA0", "ID": "9b2eeec2-4b9a-480d-b2b4-7cf562be076e", "DetectTime": "2023-10-30T14:14:01.994095+02:00", "EventTime": "2023-10-30T14:14:01.994107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C6n0IR2HlIsfTrQEe8"]} -{"Format": "IDEA0", "ID": "91169976-0f29-487a-b452-49fc2e710bb1", "DetectTime": "2023-10-30T14:14:02.009852+02:00", "EventTime": "2023-10-30T14:14:02.009863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CIBHoT3u46YjT4ZCV6"]} -{"Format": "IDEA0", "ID": "5ae6d999-59aa-4791-9c2c-52a2a3555ad1", "DetectTime": "2023-10-30T14:14:02.024569+02:00", "EventTime": "2023-10-30T14:14:02.024581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CJnbvP1nBt6ul0sSb1"]} -{"Format": "IDEA0", "ID": "ee7bf098-ac61-40d8-8741-ba19c3519871", "DetectTime": "2023-10-30T14:14:02.041096+02:00", "EventTime": "2023-10-30T14:14:02.041112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CZYpqc4ssn6QRFNoV9"]} -{"Format": "IDEA0", "ID": "02467b9b-a613-478f-9860-ced0a04d3de3", "DetectTime": "2023-10-30T14:14:02.057830+02:00", "EventTime": "2023-10-30T14:14:02.057844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CHKDH21KUqIpWvMqP5"]} -{"Format": "IDEA0", "ID": "9b9ddef0-a98e-45fc-be83-bea1688c4213", "DetectTime": "2023-10-30T14:14:02.075149+02:00", "EventTime": "2023-10-30T14:14:02.075165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Ca07zA2Ou3qOGnVdDi"]} -{"Format": "IDEA0", "ID": "5d32f124-d562-4405-af74-79ffa5e4222b", "DetectTime": "2023-10-30T14:14:02.101449+02:00", "EventTime": "2023-10-30T14:14:02.101460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CGzqq92hV6983jmBsk"]} -{"Format": "IDEA0", "ID": "008caa54-e90d-45db-8d2d-8dc1371b6d77", "DetectTime": "2023-10-30T14:14:02.116341+02:00", "EventTime": "2023-10-30T14:14:02.116356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C6rFKn1Em89WW8S3Bf"]} -{"Format": "IDEA0", "ID": "d0029e60-81b4-4494-a258-104aace040c6", "DetectTime": "2023-10-30T14:14:02.131299+02:00", "EventTime": "2023-10-30T14:14:02.131315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CDTg8vhksTmK4cgWc"]} -{"Format": "IDEA0", "ID": "f805f5e3-9f40-41ff-9183-c5d13e4aa7cc", "DetectTime": "2023-10-30T14:14:02.146142+02:00", "EventTime": "2023-10-30T14:14:02.146152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CMsndz2kLfQu1VuK75"]} -{"Format": "IDEA0", "ID": "69bcc3cf-a600-495b-9b4d-1ef92250d483", "DetectTime": "2023-10-30T14:14:02.161358+02:00", "EventTime": "2023-10-30T14:14:02.161374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CzezCO1WSl640ilC68"]} -{"Format": "IDEA0", "ID": "eeb644b8-c5b3-418b-ae41-2d06af73477e", "DetectTime": "2023-10-30T14:14:02.177360+02:00", "EventTime": "2023-10-30T14:14:02.177372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CMYHBl3SMEFSm2JL2e"]} -{"Format": "IDEA0", "ID": "cef6cd23-0fbb-43ee-89c4-f4bef30716e7", "DetectTime": "2023-10-30T14:14:02.190962+02:00", "EventTime": "2023-10-30T14:14:02.190974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CDHxOm3nkqKwWjraei"]} -{"Format": "IDEA0", "ID": "a67b06b0-2669-479b-b51a-411130252d2a", "DetectTime": "2023-10-30T14:14:02.206997+02:00", "EventTime": "2023-10-30T14:14:02.207022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcJCAA1X8G2MCaoqae"]} -{"Format": "IDEA0", "ID": "a86d1574-dba0-4d6b-9ce0-f6b608fe147d", "DetectTime": "2023-10-30T14:14:02.222792+02:00", "EventTime": "2023-10-30T14:14:02.222806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CnWS6R2Tt8TC6RSp5"]} -{"Format": "IDEA0", "ID": "8e5253c6-da96-4007-88d0-44f7861a07a9", "DetectTime": "2023-10-30T14:14:02.238794+02:00", "EventTime": "2023-10-30T14:14:02.238810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CZCvzS3jaCPUxvUpNk"]} -{"Format": "IDEA0", "ID": "d0c19d53-4bf2-4bcd-a6e5-83d01871e16f", "DetectTime": "2023-10-30T14:14:02.253544+02:00", "EventTime": "2023-10-30T14:14:02.253555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CV3K632HYUf1rg0Bqe"]} -{"Format": "IDEA0", "ID": "9c76f6b6-f804-485f-93c1-b2e5bfd32973", "DetectTime": "2023-10-30T14:14:02.269391+02:00", "EventTime": "2023-10-30T14:14:02.269406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C2VxQj9jCWBTNfvdb"]} -{"Format": "IDEA0", "ID": "f263965b-756d-46e0-b08b-b802dd88e166", "DetectTime": "2023-10-30T14:14:02.285043+02:00", "EventTime": "2023-10-30T14:14:02.285053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CykeJx1roh5wGbC1D1"]} -{"Format": "IDEA0", "ID": "908e54a2-f842-4d73-81c1-dd7429525bc2", "DetectTime": "2023-10-30T14:14:02.310511+02:00", "EventTime": "2023-10-30T14:14:02.310527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C44QEDBMOXV2mfip4"]} -{"Format": "IDEA0", "ID": "8bcfdb07-2fff-45fc-af1d-8237e7c26fd1", "DetectTime": "2023-10-30T14:14:02.325603+02:00", "EventTime": "2023-10-30T14:14:02.325618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CGCftJ6QGulfrULNa"]} -{"Format": "IDEA0", "ID": "92cca653-5091-435f-9089-c9bd157c19a6", "DetectTime": "2023-10-30T14:14:02.338719+02:00", "EventTime": "2023-10-30T14:14:02.338731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CyoLZlMBJfElEcxPk"]} -{"Format": "IDEA0", "ID": "25238f36-8b0d-43b4-90bd-07cf5bbfb827", "DetectTime": "2023-10-30T14:14:02.349438+02:00", "EventTime": "2023-10-30T14:14:02.349448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C9WWGzd0wAz5QKdo9"]} -{"Format": "IDEA0", "ID": "5bb3bfb2-53c5-487e-ac45-33e32aae9bc6", "DetectTime": "2023-10-30T14:14:02.360355+02:00", "EventTime": "2023-10-30T14:14:02.360365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CwPwNZ1dLXmGmD6BDh"]} -{"Format": "IDEA0", "ID": "cb6ac046-3de8-45fa-bb19-a7786e26a6d0", "DetectTime": "2023-10-30T14:14:02.372259+02:00", "EventTime": "2023-10-30T14:14:02.372274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cw5XqKd9RDRxDsOkj"]} -{"Format": "IDEA0", "ID": "497d736b-545a-415e-a149-581ffd541acf", "DetectTime": "2023-10-30T14:14:02.388433+02:00", "EventTime": "2023-10-30T14:14:02.388448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cz4TH61SNAEv3Livs5"]} -{"Format": "IDEA0", "ID": "c4dd96fd-65e4-47e0-9742-b88ce2353694", "DetectTime": "2023-10-30T14:14:02.403733+02:00", "EventTime": "2023-10-30T14:14:02.403745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cj8She1KtUjb9pPiTd"]} -{"Format": "IDEA0", "ID": "f04903e0-1028-4a94-aeb9-26877af92041", "DetectTime": "2023-10-30T14:14:02.488768+02:00", "EventTime": "2023-10-30T14:14:02.488785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cg4PAi3RDriBiidM5f"]} -{"Format": "IDEA0", "ID": "7e0baa3c-ecef-4a27-b861-d9f7b32501c7", "DetectTime": "2023-10-30T14:14:02.505909+02:00", "EventTime": "2023-10-30T14:14:02.505928+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C5TN2i2JmVfroyq3o2"]} -{"Format": "IDEA0", "ID": "95a8bfdd-a0fc-4c6d-b452-6c728821dd48", "DetectTime": "2023-10-30T14:14:02.524119+02:00", "EventTime": "2023-10-30T14:14:02.524135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CgxKDvEzp1fbKCpG4"]} -{"Format": "IDEA0", "ID": "85700fbc-57d6-4aec-b358-680ca2917057", "DetectTime": "2023-10-30T14:14:02.542029+02:00", "EventTime": "2023-10-30T14:14:02.542045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cw8WGx1aehdyLQvM5h"]} -{"Format": "IDEA0", "ID": "93f6c064-d23e-4edf-aec1-f7250beabd44", "DetectTime": "2023-10-30T14:14:02.572002+02:00", "EventTime": "2023-10-30T14:14:02.572016+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CAp59x2auQxHPJjyuk"]} -{"Format": "IDEA0", "ID": "0835e1a1-55dd-4318-a363-313d9bf4a481", "DetectTime": "2023-10-30T14:14:02.587558+02:00", "EventTime": "2023-10-30T14:14:02.587569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CMn1TQ3oc74v7LEgh9"]} -{"Format": "IDEA0", "ID": "e4199656-f93a-49aa-9180-68b842868077", "DetectTime": "2023-10-30T14:14:02.604792+02:00", "EventTime": "2023-10-30T14:14:02.604807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CSRGUm3ISRInOTB0Bg"]} -{"Format": "IDEA0", "ID": "9d677bc2-7a57-4871-b0c6-a27c7b61365f", "DetectTime": "2023-10-30T14:14:02.621052+02:00", "EventTime": "2023-10-30T14:14:02.621064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CzmFBT34k2SyzKdrY8"]} -{"Format": "IDEA0", "ID": "ca7eff70-6248-4efd-a844-6379c6203faa", "DetectTime": "2023-10-30T14:14:02.639264+02:00", "EventTime": "2023-10-30T14:14:02.639287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CNDUn04MNVO8jABRUf"]} -{"Format": "IDEA0", "ID": "488d095c-488a-4d5e-9ac8-093083d66558", "DetectTime": "2023-10-30T14:14:02.655006+02:00", "EventTime": "2023-10-30T14:14:02.655020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CsiU9x2ai1eWuSpZK6"]} -{"Format": "IDEA0", "ID": "753041b6-3316-4a9e-a9d7-011035b562f0", "DetectTime": "2023-10-30T14:14:02.670212+02:00", "EventTime": "2023-10-30T14:14:02.670236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CsBAwu4VD3FIgFbsU7"]} -{"Format": "IDEA0", "ID": "b4a00da2-0e76-48c7-b881-6bcafe252950", "DetectTime": "2023-10-30T14:14:02.686738+02:00", "EventTime": "2023-10-30T14:14:02.686754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CjPuMeL7blBWwrchd"]} -{"Format": "Json", "ID": "b4a00da2-0e76-48c7-b881-6bcafe252950", "DetectTime": "2023-10-30T14:14:02.686738+02:00", "EventTime": "2023-10-30T14:14:02.686754+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T00:57:04.534346+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 215. (real time 2023/10/30 14:14:02.755148)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "97b263ad-315e-4aeb-a9b1-d5c072121401", "DetectTime": "2023-10-30T14:14:02.760174+02:00", "EventTime": "2023-10-30T14:14:02.760201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cd4oiu12MHAcECwrFd"]} -{"Format": "IDEA0", "ID": "b5a71a44-5374-4604-815e-85b99f6a021b", "DetectTime": "2023-10-30T14:14:02.778761+02:00", "EventTime": "2023-10-30T14:14:02.778773+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CEuHILVbN8HxNq2bg"]} -{"Format": "IDEA0", "ID": "da77343d-748c-4b1c-944c-6dec33b0bf90", "DetectTime": "2023-10-30T14:14:02.797004+02:00", "EventTime": "2023-10-30T14:14:02.797019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cg8XUq12D2ThEYkWOh"]} -{"Format": "IDEA0", "ID": "92f10f72-b571-452c-9661-fcbd44c1bc38", "DetectTime": "2023-10-30T14:14:02.814809+02:00", "EventTime": "2023-10-30T14:14:02.814825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVc27d3eJAxB2blOTj"]} -{"Format": "IDEA0", "ID": "6c5a71b1-3bd5-4c03-b49a-059857375834", "DetectTime": "2023-10-30T14:14:02.832836+02:00", "EventTime": "2023-10-30T14:14:02.832850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CFULGf4AwxRALQ3Au5"]} -{"Format": "IDEA0", "ID": "cd4ab323-0c0e-4336-93fc-ce7afab6df4a", "DetectTime": "2023-10-30T14:14:02.849903+02:00", "EventTime": "2023-10-30T14:14:02.849914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CvuAl7JUheQUs3sf"]} -{"Format": "IDEA0", "ID": "47f07bbd-088a-4308-b709-e4f364aae855", "DetectTime": "2023-10-30T14:14:02.867104+02:00", "EventTime": "2023-10-30T14:14:02.867122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CSH8eY39suLXoED278"]} -{"Format": "IDEA0", "ID": "b2ddd1f4-7f2b-4d8d-958b-e1351a1d3b55", "DetectTime": "2023-10-30T14:14:02.884382+02:00", "EventTime": "2023-10-30T14:14:02.884393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cd4ABL1XC9kYYQbkd"]} -{"Format": "IDEA0", "ID": "e9a66fd8-5245-4724-99a0-a14c545b7e6c", "DetectTime": "2023-10-30T14:14:02.899467+02:00", "EventTime": "2023-10-30T14:14:02.899483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CuLzZr3sKlZxfWscn3"]} -{"Format": "IDEA0", "ID": "f7d106b9-b618-4916-8ca4-b9f688bdef8a", "DetectTime": "2023-10-30T14:14:02.915781+02:00", "EventTime": "2023-10-30T14:14:02.915795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C0Te1v1zqutXaha2L7"]} -{"Format": "IDEA0", "ID": "8de4f9d6-920d-42ad-9afc-fb243532cfe4", "DetectTime": "2023-10-30T14:14:02.932210+02:00", "EventTime": "2023-10-30T14:14:02.932221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CM2TtMc6KwL4iW6Fd"]} -{"Format": "IDEA0", "ID": "9743bb43-f586-4b9f-a40a-6cd1f028defa", "DetectTime": "2023-10-30T14:14:02.950010+02:00", "EventTime": "2023-10-30T14:14:02.950026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C7A41E1OgcmxueUAxc"]} -{"Format": "IDEA0", "ID": "556c291d-d341-4928-9f4b-ffa61cccdab4", "DetectTime": "2023-10-30T14:14:02.967954+02:00", "EventTime": "2023-10-30T14:14:02.967964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9YZEI2xW1Xo5Wps1d"]} -{"Format": "IDEA0", "ID": "df57b5aa-830c-48e0-8497-fce76623aeda", "DetectTime": "2023-10-30T14:14:02.984678+02:00", "EventTime": "2023-10-30T14:14:02.984692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CeBkTy1JjRiC56TYrh"]} -{"Format": "IDEA0", "ID": "d0b1f07e-56fd-45b7-bf90-b83294cfe993", "DetectTime": "2023-10-30T14:14:03.003778+02:00", "EventTime": "2023-10-30T14:14:03.003793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["C1okZu4w7RZfWJsVNd"]} -{"Format": "IDEA0", "ID": "51c7366e-6957-4c8f-a614-48b08a57b082", "DetectTime": "2023-10-30T14:14:03.022734+02:00", "EventTime": "2023-10-30T14:14:03.022752+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CAFBSB4eCVerLf48Ta"]} -{"Format": "IDEA0", "ID": "585baecd-16a2-40f2-a70c-4cb81c3b052f", "DetectTime": "2023-10-30T14:14:03.048627+02:00", "EventTime": "2023-10-30T14:14:03.048642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cxwlms2SrxIxjeMp21"]} -{"Format": "IDEA0", "ID": "713a260d-f8dd-4e3a-a734-8a31978eecb5", "DetectTime": "2023-10-30T14:14:03.067345+02:00", "EventTime": "2023-10-30T14:14:03.067361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CtsEEX1f9aCN7KpJ7d"]} -{"Format": "IDEA0", "ID": "73669d42-b0b6-48e3-9702-ed0cd66a4056", "DetectTime": "2023-10-30T14:14:03.084961+02:00", "EventTime": "2023-10-30T14:14:03.084972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CV6x5R3KxT2Tz0ewgg"]} -{"Format": "IDEA0", "ID": "afe6f7e2-a035-42af-a65d-b7263114fa39", "DetectTime": "2023-10-30T14:14:03.103673+02:00", "EventTime": "2023-10-30T14:14:03.103689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cs0hnQ3kkMbJNWXBng"]} -{"Format": "IDEA0", "ID": "3efd158d-5feb-482d-ba6b-e1a16be7aec1", "DetectTime": "2023-10-30T14:14:03.121973+02:00", "EventTime": "2023-10-30T14:14:03.121988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CXJ2be1Uq19HOgXU18"]} -{"Format": "IDEA0", "ID": "2090e854-65be-4191-a0dc-364dd333377d", "DetectTime": "2023-10-30T14:14:03.140511+02:00", "EventTime": "2023-10-30T14:14:03.140522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C9fGvd2XXloiBtyle"]} -{"Format": "IDEA0", "ID": "36c19f7f-9859-4c67-9742-64a45c89434f", "DetectTime": "2023-10-30T14:14:03.157117+02:00", "EventTime": "2023-10-30T14:14:03.157134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CTKrsb44PeOlyVSxuh"]} -{"Format": "IDEA0", "ID": "c34b70ca-971e-4ee1-a374-2c2986c91615", "DetectTime": "2023-10-30T14:14:03.173538+02:00", "EventTime": "2023-10-30T14:14:03.173554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CUl9mtMsUiupB2lSa"]} -{"Format": "IDEA0", "ID": "dcc24c75-3d60-4bf9-b4bc-82ce442c4e1c", "DetectTime": "2023-10-30T14:14:03.190001+02:00", "EventTime": "2023-10-30T14:14:03.190012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C2Bqau3LEwB1O6LXEj"]} -{"Format": "IDEA0", "ID": "777a765f-c40d-4883-a25c-d9374528cb3a", "DetectTime": "2023-10-30T14:14:03.213827+02:00", "EventTime": "2023-10-30T14:14:03.213839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CsJguw3JQnLtDBfhTk"]} -{"Format": "IDEA0", "ID": "ba2e77d7-a39b-4f8e-92ed-add21986ab99", "DetectTime": "2023-10-30T14:14:03.231593+02:00", "EventTime": "2023-10-30T14:14:03.231607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CEqnIc2c0p0ZF85Ip8"]} -{"Format": "IDEA0", "ID": "80c5702a-f75a-411d-a32c-2d1f4ea6569c", "DetectTime": "2023-10-30T14:14:03.248677+02:00", "EventTime": "2023-10-30T14:14:03.248688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C4vmkA2oTJuTftOzwj"]} -{"Format": "IDEA0", "ID": "1a52d1aa-0a96-43b0-9064-311f6f6bb90c", "DetectTime": "2023-10-30T14:14:03.266853+02:00", "EventTime": "2023-10-30T14:14:03.266874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cp5yJC2hhX8l7WFN4d"]} -{"Format": "IDEA0", "ID": "c44a4999-fcdf-4847-9c2a-b1137f62fbd4", "DetectTime": "2023-10-30T14:14:03.286988+02:00", "EventTime": "2023-10-30T14:14:03.287005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CNjz2jIwIGIveDmYd"]} -{"Format": "IDEA0", "ID": "cc815e74-259d-4fcc-ba8f-5e09495397cf", "DetectTime": "2023-10-30T14:14:03.304384+02:00", "EventTime": "2023-10-30T14:14:03.304401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CDget115plClFPQSI4"]} -{"Format": "IDEA0", "ID": "e8db2cfe-c530-44b6-b4ca-b9e0f6f54ca1", "DetectTime": "2023-10-30T14:14:03.322886+02:00", "EventTime": "2023-10-30T14:14:03.322904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CGszJS6GvEYB0ZdV1"]} -{"Format": "IDEA0", "ID": "18c5112a-1f94-4e2b-84d2-a62546363dc0", "DetectTime": "2023-10-30T14:14:03.347298+02:00", "EventTime": "2023-10-30T14:14:03.347310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CANWJE1xUSzhwWls"]} -{"Format": "IDEA0", "ID": "77c80f59-7420-496d-97fe-6e5db59f9708", "DetectTime": "2023-10-30T14:14:03.364159+02:00", "EventTime": "2023-10-30T14:14:03.364179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CPSN4c1ztA8lbc7G14"]} -{"Format": "IDEA0", "ID": "85c80e71-c45d-4909-a054-19ad92a44466", "DetectTime": "2023-10-30T14:14:03.383660+02:00", "EventTime": "2023-10-30T14:14:03.383676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Cp2W8a3xtkCLAyuile"]} -{"Format": "IDEA0", "ID": "400e91b9-81c4-447b-8293-563b119042e2", "DetectTime": "2023-10-30T14:14:03.402233+02:00", "EventTime": "2023-10-30T14:14:03.402246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cvxgg41x1KFRiYZpDb"]} -{"Format": "IDEA0", "ID": "d8664de4-543a-48d7-b73d-31248a0500de", "DetectTime": "2023-10-30T14:14:03.419586+02:00", "EventTime": "2023-10-30T14:14:03.419600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["COXMlC2PG84vlIWjt3"]} -{"Format": "IDEA0", "ID": "b35fe8b4-18cc-4e8c-8b3f-097224416633", "DetectTime": "2023-10-30T14:14:03.436756+02:00", "EventTime": "2023-10-30T14:14:03.436768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CFoWSB4iOg1TouTVQb"]} -{"Format": "IDEA0", "ID": "d294efb3-01bb-40e1-b34e-a26ed202d37f", "DetectTime": "2023-10-30T14:14:03.454321+02:00", "EventTime": "2023-10-30T14:14:03.454332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsJiPf2HeTdbiLF5G2"]} -{"Format": "IDEA0", "ID": "9b1b1030-541d-4814-b9c0-2111f933497b", "DetectTime": "2023-10-30T14:14:03.480780+02:00", "EventTime": "2023-10-30T14:14:03.480795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C6z4JomiOELmzXzw8"]} -{"Format": "IDEA0", "ID": "76d7a6e7-662b-41f2-998b-501faedcdcfd", "DetectTime": "2023-10-30T14:14:03.497493+02:00", "EventTime": "2023-10-30T14:14:03.497508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CazD5Y3qs4B0Pmhyaa"]} -{"Format": "IDEA0", "ID": "7c1aea03-7b04-4dbb-8f42-1f7101c14ad5", "DetectTime": "2023-10-30T14:14:03.514881+02:00", "EventTime": "2023-10-30T14:14:03.514894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["ClkFRK2OamqJMQZMKc"]} -{"Format": "IDEA0", "ID": "81c513bd-034e-48c4-b1ad-c4efd1be06d3", "DetectTime": "2023-10-30T14:14:03.531518+02:00", "EventTime": "2023-10-30T14:14:03.531537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CE4tfE3hN14slnZpI8"]} -{"Format": "IDEA0", "ID": "c50aa050-c1e8-4f07-a2f5-305181385849", "DetectTime": "2023-10-30T14:14:03.550263+02:00", "EventTime": "2023-10-30T14:14:03.550278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CFth4W2dCd9jtNz6rf"]} -{"Format": "IDEA0", "ID": "c286d1b2-6942-45be-baa5-38bd29c6f92b", "DetectTime": "2023-10-30T14:14:03.569624+02:00", "EventTime": "2023-10-30T14:14:03.569640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CH1wMm3BmWotTE4RY"]} -{"Format": "IDEA0", "ID": "8376ed73-de98-465b-8ece-2969329eb1bd", "DetectTime": "2023-10-30T14:14:03.588564+02:00", "EventTime": "2023-10-30T14:14:03.588580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CL7juc2GxjaTv14l6l"]} -{"Format": "IDEA0", "ID": "159b9878-8576-4157-b046-6b0256c88642", "DetectTime": "2023-10-30T14:14:03.608833+02:00", "EventTime": "2023-10-30T14:14:03.608849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyHbvsqeVwzM0gi4k"]} -{"Format": "IDEA0", "ID": "cd5622b6-7379-4bcd-9d75-ce97cdc459a9", "DetectTime": "2023-10-30T14:14:03.629408+02:00", "EventTime": "2023-10-30T14:14:03.629424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CuNOj72rghWae5bzi6"]} -{"Format": "IDEA0", "ID": "929a42b6-8c10-4671-b94d-c10d08359115", "DetectTime": "2023-10-30T14:14:03.654196+02:00", "EventTime": "2023-10-30T14:14:03.654212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CX3o5A4CdgLSL1t7L9"]} -{"Format": "IDEA0", "ID": "2bc98708-c432-453c-b337-a3b93d388d03", "DetectTime": "2023-10-30T14:14:03.674961+02:00", "EventTime": "2023-10-30T14:14:03.674977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["C07E2A3aZs8y0t3gLc"]} -{"Format": "IDEA0", "ID": "556e1f3c-ce10-4366-961c-2fdd3285cfe6", "DetectTime": "2023-10-30T14:14:03.694231+02:00", "EventTime": "2023-10-30T14:14:03.694251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CRlQZu4D1JE4GP4FF"]} -{"Format": "IDEA0", "ID": "089daa67-4a28-43be-a19d-8a6bc0b9868b", "DetectTime": "2023-10-30T14:14:03.712354+02:00", "EventTime": "2023-10-30T14:14:03.712371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CqItyfO7yBP8kwtpl"]} -{"Format": "IDEA0", "ID": "9d5146cd-5cdb-4e3d-8be6-3a53b380c66e", "DetectTime": "2023-10-30T14:14:03.731948+02:00", "EventTime": "2023-10-30T14:14:03.731965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CNUrKy4HiDDNEqtdna"]} -{"Format": "IDEA0", "ID": "95484667-a8d9-4b55-9eb7-09d114b58635", "DetectTime": "2023-10-30T14:14:03.752375+02:00", "EventTime": "2023-10-30T14:14:03.752391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXooZ5E13hBq3ajSc"]} -{"Format": "IDEA0", "ID": "1fb665b9-87e7-49cf-b9cc-d0b4e305b94f", "DetectTime": "2023-10-30T14:14:03.769976+02:00", "EventTime": "2023-10-30T14:14:03.769988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CzZFs82DLXxi0K1rCi"]} -{"Format": "IDEA0", "ID": "da541669-0288-4095-9e66-ca68375fa36f", "DetectTime": "2023-10-30T14:14:03.798807+02:00", "EventTime": "2023-10-30T14:14:03.798819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZPj4j45ORmxqQr5Bi"]} -{"Format": "IDEA0", "ID": "4e26f480-d740-4190-b8df-b552b8694a85", "DetectTime": "2023-10-30T14:14:03.826194+02:00", "EventTime": "2023-10-30T14:14:03.826211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Czaq1K3YCojzRYDVgl"]} -{"Format": "IDEA0", "ID": "701e29e3-f980-4337-9bbe-41af6ead8e27", "DetectTime": "2023-10-30T14:14:03.843556+02:00", "EventTime": "2023-10-30T14:14:03.843566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CqsIMc47lBVAg1hbb2"]} -{"Format": "IDEA0", "ID": "74204943-4a1d-404c-a503-c209499b0e7b", "DetectTime": "2023-10-30T14:14:03.871437+02:00", "EventTime": "2023-10-30T14:14:03.871455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["ChsgnKFM0Ti4UwRbk"]} -{"Format": "IDEA0", "ID": "2f681f86-ba62-4ccc-b789-8682b7571e29", "DetectTime": "2023-10-30T14:14:03.902492+02:00", "EventTime": "2023-10-30T14:14:03.902509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C6qVfF48o0il81ZD8l"]} -{"Format": "IDEA0", "ID": "51eabc91-3cd9-4990-91aa-ce3400880b7d", "DetectTime": "2023-10-30T14:14:03.919867+02:00", "EventTime": "2023-10-30T14:14:03.919892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cl4snC4zz4pwN9idd"]} -{"Format": "IDEA0", "ID": "6ed93aea-0beb-479f-bad5-58aed4e4d4ca", "DetectTime": "2023-10-30T14:14:03.946378+02:00", "EventTime": "2023-10-30T14:14:03.946396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CwW4Iy4OeBajTI8TDh"]} -{"Format": "IDEA0", "ID": "d4a320c5-f225-4c8f-a69e-0c6770c28be3", "DetectTime": "2023-10-30T14:14:03.975043+02:00", "EventTime": "2023-10-30T14:14:03.975060+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cgzdx44t3zCR9nQGKh"]} -{"Format": "IDEA0", "ID": "ace9a130-acb7-4bad-afe8-60d58ac9b8f9", "DetectTime": "2023-10-30T14:14:03.998686+02:00", "EventTime": "2023-10-30T14:14:03.998703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CLO9eCMY02vCsDyr4"]} -{"Format": "IDEA0", "ID": "56edc0df-a9d0-4506-bb11-8486a9ba8aac", "DetectTime": "2023-10-30T14:14:04.019565+02:00", "EventTime": "2023-10-30T14:14:04.019576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVsQ1i236xB1TXsLZ6"]} -{"Format": "Json", "ID": "56edc0df-a9d0-4506-bb11-8486a9ba8aac", "DetectTime": "2023-10-30T14:14:04.019565+02:00", "EventTime": "2023-10-30T14:14:04.019576+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T01:27:49.015839+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 216. (real time 2023/10/30 14:14:04.088238)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "66085b81-a1d4-427f-8bdc-71bf00407e56", "DetectTime": "2023-10-30T14:14:04.092691+02:00", "EventTime": "2023-10-30T14:14:04.092716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CVzmp83Q11UySIkaMc"]} -{"Format": "IDEA0", "ID": "ebce26e7-c213-4924-af15-f81feaf199a6", "DetectTime": "2023-10-30T14:14:04.115993+02:00", "EventTime": "2023-10-30T14:14:04.116011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CaUegg4sFRhBk7xuvf"]} -{"Format": "IDEA0", "ID": "6c6b9a09-0b4d-48dc-b0c0-6ac2bef99818", "DetectTime": "2023-10-30T14:14:04.134725+02:00", "EventTime": "2023-10-30T14:14:04.134736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CiPJxb2FOMVFni8m6"]} -{"Format": "IDEA0", "ID": "1202d9ab-6636-4a05-b793-05b485847230", "DetectTime": "2023-10-30T14:14:04.156511+02:00", "EventTime": "2023-10-30T14:14:04.156521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CQXo6P30YgObTNjIS9"]} -{"Format": "IDEA0", "ID": "335c8706-dcd9-4c2c-a0be-cead75b4a1f0", "DetectTime": "2023-10-30T14:14:04.175219+02:00", "EventTime": "2023-10-30T14:14:04.175231+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CCfTLx2biQTtmXCzZ7"]} -{"Format": "IDEA0", "ID": "93212e5b-1e29-4469-9504-875ff78490c2", "DetectTime": "2023-10-30T14:14:04.199259+02:00", "EventTime": "2023-10-30T14:14:04.199275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CRIU9p1B0wi7HvBzy5"]} -{"Format": "IDEA0", "ID": "92549f65-e44f-4643-a379-e02f0231dd66", "DetectTime": "2023-10-30T14:14:04.221221+02:00", "EventTime": "2023-10-30T14:14:04.221232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CvCmYU1F8m6L4wYPF4"]} -{"Format": "IDEA0", "ID": "eec4a6c1-01e2-4405-a838-6010511e0f38", "DetectTime": "2023-10-30T14:14:04.319318+02:00", "EventTime": "2023-10-30T14:14:04.319333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C8c8wD3LmXHQg73it1"]} -{"Format": "IDEA0", "ID": "decb0c99-e241-44f2-941d-7ed493f2babf", "DetectTime": "2023-10-30T14:14:04.348791+02:00", "EventTime": "2023-10-30T14:14:04.348818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Czy91N3fziR2IiNxCk"]} -{"Format": "IDEA0", "ID": "36fc9e54-3a19-42f6-8598-e0f7c5745a76", "DetectTime": "2023-10-30T14:14:04.369572+02:00", "EventTime": "2023-10-30T14:14:04.369589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CsMCEVbWNrVN3hgI9"]} -{"Format": "IDEA0", "ID": "4753672b-34a9-460b-a837-6bacf358601c", "DetectTime": "2023-10-30T14:14:04.394168+02:00", "EventTime": "2023-10-30T14:14:04.394185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ChLhNI3yIPSiX2FX65"]} -{"Format": "IDEA0", "ID": "0eec1e2f-1a98-4969-877d-f5a4f74eb6fb", "DetectTime": "2023-10-30T14:14:04.417329+02:00", "EventTime": "2023-10-30T14:14:04.417344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Cq3C3e2e46FGD7tdOd"]} -{"Format": "IDEA0", "ID": "a36c45ff-89e5-44bb-9970-acf836c2c6d0", "DetectTime": "2023-10-30T14:14:04.443662+02:00", "EventTime": "2023-10-30T14:14:04.443678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CETsUmhZNiNTN0Y92"]} -{"Format": "IDEA0", "ID": "647815b9-363f-4f53-9e50-da739ce5d47f", "DetectTime": "2023-10-30T14:14:04.471445+02:00", "EventTime": "2023-10-30T14:14:04.471461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CuW0gO166V8w9IKEFh"]} -{"Format": "IDEA0", "ID": "5ccbcd46-0f35-4e43-b59e-749e8f795311", "DetectTime": "2023-10-30T14:14:04.494302+02:00", "EventTime": "2023-10-30T14:14:04.494320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9p5S23kSSxXCp7Iv4"]} -{"Format": "IDEA0", "ID": "44b5103e-5069-4139-b4e6-75cb77424a0d", "DetectTime": "2023-10-30T14:14:04.521625+02:00", "EventTime": "2023-10-30T14:14:04.521652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CxKQpe17Ne9Y2BaJh2"]} -{"Format": "IDEA0", "ID": "b1a38454-280f-421f-b7b3-f5d997b85b87", "DetectTime": "2023-10-30T14:14:04.549834+02:00", "EventTime": "2023-10-30T14:14:04.549849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXIc454u25Rmd2eTq6"]} -{"Format": "IDEA0", "ID": "d34c98bf-ab36-4668-bae6-96adf2353d9a", "DetectTime": "2023-10-30T14:14:04.573117+02:00", "EventTime": "2023-10-30T14:14:04.573128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CqObDC4iccpzMJwnb9"]} -{"Format": "IDEA0", "ID": "c40267df-5d72-4dc5-b78e-23da0d1abfc6", "DetectTime": "2023-10-30T14:14:04.595469+02:00", "EventTime": "2023-10-30T14:14:04.595492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C9RGouzQ3xRsChp7g"]} -{"Format": "Json", "ID": "c40267df-5d72-4dc5-b78e-23da0d1abfc6", "DetectTime": "2023-10-30T14:14:04.595469+02:00", "EventTime": "2023-10-30T14:14:04.595492+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T01:28:09.905654+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 216. (real time 2023/10/30 14:14:04.661742)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "da1990a0-0e9a-4f89-b990-48c27741d405", "DetectTime": "2023-10-30T14:14:04.666767+02:00", "EventTime": "2023-10-30T14:14:04.666794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C1vCDt1U10CbOunTQ4"]} -{"Format": "IDEA0", "ID": "3ffacb36-e6d0-4e34-8e1c-59ae088f3eee", "DetectTime": "2023-10-30T14:14:04.690411+02:00", "EventTime": "2023-10-30T14:14:04.690428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CQIRNfVo0KI4awZSk"]} -{"Format": "IDEA0", "ID": "9fad7966-1e73-4d65-b84e-99b96037c417", "DetectTime": "2023-10-30T14:14:04.713049+02:00", "EventTime": "2023-10-30T14:14:04.713065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CWPAln2RczXuyFW3Xd"]} -{"Format": "IDEA0", "ID": "aa823d3f-7127-4e1d-a5e6-31cc48a57788", "DetectTime": "2023-10-30T14:14:04.738049+02:00", "EventTime": "2023-10-30T14:14:04.738066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CfCqi53IcueXMza1O4"]} -{"Format": "IDEA0", "ID": "2a144426-ff3c-44df-b30b-d570d9b920cc", "DetectTime": "2023-10-30T14:14:04.762686+02:00", "EventTime": "2023-10-30T14:14:04.762697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CrnnZZRDewjFUAeQk"]} -{"Format": "IDEA0", "ID": "76eb2387-d4f2-4d80-9a8b-edcf9502b715", "DetectTime": "2023-10-30T14:14:04.785275+02:00", "EventTime": "2023-10-30T14:14:04.785291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CH5tdZ2A3f5xRL5eZ3"]} -{"Format": "IDEA0", "ID": "a3b8f33c-66c5-4fda-9317-0073c61a4423", "DetectTime": "2023-10-30T14:14:04.811786+02:00", "EventTime": "2023-10-30T14:14:04.811802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["COK2064QDgtvh2huh2"]} -{"Format": "IDEA0", "ID": "aca8e92e-2a4d-4a31-9800-bf98841792a0", "DetectTime": "2023-10-30T14:14:04.834068+02:00", "EventTime": "2023-10-30T14:14:04.834083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CS5WMb3wPDJquHolZ6"]} -{"Format": "IDEA0", "ID": "9eb6432c-1b05-4328-9236-1c331094f8b6", "DetectTime": "2023-10-30T14:14:04.861070+02:00", "EventTime": "2023-10-30T14:14:04.861085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C01Cqq1UEGkGUn9MF1"]} -{"Format": "Json", "ID": "9eb6432c-1b05-4328-9236-1c331094f8b6", "DetectTime": "2023-10-30T14:14:04.861070+02:00", "EventTime": "2023-10-30T14:14:04.861085+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T01:28:11.333396+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 216. (real time 2023/10/30 14:14:04.933333)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dc80e699-931d-4de2-99f5-cd0e1150296f", "DetectTime": "2023-10-30T14:14:04.938662+02:00", "EventTime": "2023-10-30T14:14:04.938681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CFcNR227Z6Eq2HXeW1"]} -{"Format": "IDEA0", "ID": "492424c3-1407-4cb3-9d74-acb9bfd9adfe", "DetectTime": "2023-10-30T14:14:04.962661+02:00", "EventTime": "2023-10-30T14:14:04.962677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CsGDE441FoH7UuskYb"]} -{"Format": "IDEA0", "ID": "50e4bb65-18fc-4b73-8886-492a3666d1a0", "DetectTime": "2023-10-30T14:14:04.984673+02:00", "EventTime": "2023-10-30T14:14:04.984689+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C36cRZ2IyJ6LRVruGd"]} -{"Format": "IDEA0", "ID": "20d9a3c7-c536-41e3-9ac7-a558e3b971df", "DetectTime": "2023-10-30T14:14:05.007777+02:00", "EventTime": "2023-10-30T14:14:05.007788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CUI4to3saht1R0sr9f"]} -{"Format": "IDEA0", "ID": "e94cbf8e-a0da-46d1-a7a9-0ecd431b821b", "DetectTime": "2023-10-30T14:14:05.029840+02:00", "EventTime": "2023-10-30T14:14:05.029859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5973/UDP destination IP 184.71.161.90. ", "ContentType": "text/plain"}], "uids": ["CESih93Q0vmyNpk4s3"]} -{"Format": "IDEA0", "ID": "4ce9e85b-aacd-43b9-b622-bbba160395ca", "DetectTime": "2023-10-30T14:14:05.052629+02:00", "EventTime": "2023-10-30T14:14:05.052655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CvlkOZ16Yb4fKWNeWk"]} -{"Format": "IDEA0", "ID": "6a37a887-a63b-4c3e-8068-11a886a62e2c", "DetectTime": "2023-10-30T14:14:05.074560+02:00", "EventTime": "2023-10-30T14:14:05.074576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CdSFBr3EavD5TNoIa2"]} -{"Format": "IDEA0", "ID": "dbfad493-62ea-46f4-b4f6-8bde426e21a4", "DetectTime": "2023-10-30T14:14:05.099357+02:00", "EventTime": "2023-10-30T14:14:05.099373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["Coei2d1LQz6CNJbXz4"]} -{"Format": "IDEA0", "ID": "a2b50d1b-011e-4db5-81b4-24a0d11b02d8", "DetectTime": "2023-10-30T14:14:05.122210+02:00", "EventTime": "2023-10-30T14:14:05.122221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSch2z1uEMRV3RVPM"]} -{"Format": "IDEA0", "ID": "63f17cda-5531-4646-8dbf-1b3d66e497ef", "DetectTime": "2023-10-30T14:14:05.145644+02:00", "EventTime": "2023-10-30T14:14:05.145668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CGz5wy4AKJ4wlwlOW"]} -{"Format": "IDEA0", "ID": "9a0c76c8-78b0-43ec-937f-8ff3202e1c74", "DetectTime": "2023-10-30T14:14:05.169814+02:00", "EventTime": "2023-10-30T14:14:05.169842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CMpZrY3KPhc01OUlch"]} -{"Format": "Json", "ID": "9a0c76c8-78b0-43ec-937f-8ff3202e1c74", "DetectTime": "2023-10-30T14:14:05.169814+02:00", "EventTime": "2023-10-30T14:14:05.169842+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T01:31:18.955655+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 216. (real time 2023/10/30 14:14:05.234816)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "568f81a1-d076-4ae5-88c4-0a582839d9e1", "DetectTime": "2023-10-30T14:14:05.239560+02:00", "EventTime": "2023-10-30T14:14:05.239573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C7fBvC2dG3uZne87C9"]} -{"Format": "IDEA0", "ID": "0214be66-b133-4aea-9374-fb50eb2c2784", "DetectTime": "2023-10-30T14:14:05.258903+02:00", "EventTime": "2023-10-30T14:14:05.258917+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CMdzNM1yF44KpUTwTf"]} -{"Format": "IDEA0", "ID": "bb3b7e77-ab34-4993-9703-307f2a366b5e", "DetectTime": "2023-10-30T14:14:05.281210+02:00", "EventTime": "2023-10-30T14:14:05.281222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CrRQZb1uY46Ke7Dk4f"]} -{"Format": "IDEA0", "ID": "843fd3f7-b886-40d3-a1c2-f2c1590b3261", "DetectTime": "2023-10-30T14:14:05.303015+02:00", "EventTime": "2023-10-30T14:14:05.303028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C4CpQtaX3mIz475W3"]} -{"Format": "IDEA0", "ID": "4892f78e-1440-4c70-8842-8a306732d94d", "DetectTime": "2023-10-30T14:14:05.324292+02:00", "EventTime": "2023-10-30T14:14:05.324303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CjxCJe3cXRywUNp6W8"]} -{"Format": "IDEA0", "ID": "320f7f32-d391-4250-b75b-9b5d6cae5cda", "DetectTime": "2023-10-30T14:14:05.341113+02:00", "EventTime": "2023-10-30T14:14:05.341131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.77.90. ", "ContentType": "text/plain"}], "uids": ["COkBy01NLNKR7QUWz6"]} -{"Format": "IDEA0", "ID": "707ae8a0-8b7d-480c-982b-d8d96ae0805b", "DetectTime": "2023-10-30T14:14:05.361031+02:00", "EventTime": "2023-10-30T14:14:05.361042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CaHU5S18UV8sTc7yI4"]} -{"Format": "IDEA0", "ID": "29cf9ab0-e212-4511-a7ed-33861e0ee407", "DetectTime": "2023-10-30T14:14:05.384760+02:00", "EventTime": "2023-10-30T14:14:05.384777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CV0nwd3QPx53z23Le"]} -{"Format": "IDEA0", "ID": "85722c91-a664-453d-88bf-6981b0e716b8", "DetectTime": "2023-10-30T14:14:05.402940+02:00", "EventTime": "2023-10-30T14:14:05.402957+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CHvCb439OKF7zeCGgg"]} -{"Format": "IDEA0", "ID": "e738ed7d-6eb3-4a67-9101-0c4332bedeb8", "DetectTime": "2023-10-30T14:14:05.423372+02:00", "EventTime": "2023-10-30T14:14:05.423388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CfA8Sc4HWaaRd5pkng"]} -{"Format": "IDEA0", "ID": "0999a3dd-38f3-4921-8bc2-cb5223b11e23", "DetectTime": "2023-10-30T14:14:05.449730+02:00", "EventTime": "2023-10-30T14:14:05.449753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CULnqZhrhny0czHE5"]} -{"Format": "IDEA0", "ID": "d599e3e4-0e3f-43ca-93fc-0af1ec6e2061", "DetectTime": "2023-10-30T14:14:05.472411+02:00", "EventTime": "2023-10-30T14:14:05.472427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["ClnXfDSnr3bdwOTY5"]} -{"Format": "Json", "ID": "d599e3e4-0e3f-43ca-93fc-0af1ec6e2061", "DetectTime": "2023-10-30T14:14:05.472411+02:00", "EventTime": "2023-10-30T14:14:05.472427+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T01:37:14.379257+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 216. (real time 2023/10/30 14:14:05.527459)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "46d87c28-c516-4db2-a620-b8757a2861af", "DetectTime": "2023-10-30T14:14:05.532420+02:00", "EventTime": "2023-10-30T14:14:05.532444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CLRHJK17q2tExPOO4a"]} -{"Format": "IDEA0", "ID": "3fd583f6-f468-4415-8927-95909fe0dd50", "DetectTime": "2023-10-30T14:14:05.554149+02:00", "EventTime": "2023-10-30T14:14:05.554160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C9pJezpamnjUi3lPb"]} -{"Format": "IDEA0", "ID": "af07ebe8-847e-460a-b88d-fd70147fea38", "DetectTime": "2023-10-30T14:14:05.571888+02:00", "EventTime": "2023-10-30T14:14:05.571899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CG0hSX1Yd81wNSzmeg"]} -{"Format": "IDEA0", "ID": "972ca19e-461d-4346-accc-43825d412c62", "DetectTime": "2023-10-30T14:14:05.586973+02:00", "EventTime": "2023-10-30T14:14:05.586987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cr8pZJ3RAc0CkXAC28"]} -{"Format": "IDEA0", "ID": "e6280685-a1e2-41bd-8c7a-db0704f2f322", "DetectTime": "2023-10-30T14:14:05.609394+02:00", "EventTime": "2023-10-30T14:14:05.609410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuxRwp1RdLeGYxoHAa"]} -{"Format": "IDEA0", "ID": "943607a2-19c1-491d-92e2-cfb3c560ac2e", "DetectTime": "2023-10-30T14:14:05.651299+02:00", "EventTime": "2023-10-30T14:14:05.651316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C9mGmv1O8fkShKyT9"]} -{"Format": "IDEA0", "ID": "3048fd11-acfc-46ca-a07d-0bbf88416bde", "DetectTime": "2023-10-30T14:14:05.694936+02:00", "EventTime": "2023-10-30T14:14:05.694955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C8Z41eAdicXYTbTPd"]} -{"Format": "IDEA0", "ID": "879889de-5a7e-4ad8-a47c-35b448df10f5", "DetectTime": "2023-10-30T14:14:05.744057+02:00", "EventTime": "2023-10-30T14:14:05.744083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CUJozf3ntAY2CIJNRk"]} -{"Format": "IDEA0", "ID": "1446c917-25d2-47b9-93b3-8eb3a344ff66", "DetectTime": "2023-10-30T14:14:05.794551+02:00", "EventTime": "2023-10-30T14:14:05.794567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CNndcf3YCkWGkvU35"]} -{"Format": "IDEA0", "ID": "e4b2127b-1074-4e07-a6a1-37ce97b1db61", "DetectTime": "2023-10-30T14:14:05.840088+02:00", "EventTime": "2023-10-30T14:14:05.840105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CGjAIg1oHTUCaeXl7i"]} -{"Format": "IDEA0", "ID": "1e58d1d5-1da3-4a8d-9678-3cbc512a7df6", "DetectTime": "2023-10-30T14:14:05.890186+02:00", "EventTime": "2023-10-30T14:14:05.890203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXHq8K4gIVsTXiROl"]} -{"Format": "IDEA0", "ID": "d7edbe27-4992-44fe-a80e-597cfa3453e3", "DetectTime": "2023-10-30T14:14:05.910710+02:00", "EventTime": "2023-10-30T14:14:05.910721+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CynLb14Zc6fmi6aGGb"]} -{"Format": "Json", "ID": "d7edbe27-4992-44fe-a80e-597cfa3453e3", "DetectTime": "2023-10-30T14:14:05.910710+02:00", "EventTime": "2023-10-30T14:14:05.910721+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:09:56.266761+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:06.004088)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "460782df-0273-484d-be2c-561f822d7aff", "DetectTime": "2023-10-30T14:14:06.008760+02:00", "EventTime": "2023-10-30T14:14:06.008774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CeNzW03qF9Abz8zgU9"]} -{"Format": "IDEA0", "ID": "d3ede775-1fa9-4e46-a4b2-7819b5f2663d", "DetectTime": "2023-10-30T14:14:06.044667+02:00", "EventTime": "2023-10-30T14:14:06.044684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CO5AnG4q72psqO8oDg"]} -{"Format": "IDEA0", "ID": "1a4b48d5-ec45-4433-a550-1702158ab7e5", "DetectTime": "2023-10-30T14:14:06.084589+02:00", "EventTime": "2023-10-30T14:14:06.084602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CLw3hCS4jGXXgHDe2"]} -{"Format": "IDEA0", "ID": "0ef26baf-1fa2-4760-be5d-31ebf283ab30", "DetectTime": "2023-10-30T14:14:06.124884+02:00", "EventTime": "2023-10-30T14:14:06.124900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CW0PhY2KuXxgvtOa"]} -{"Format": "IDEA0", "ID": "653158a0-8ad7-4226-a7f1-1727d79acc60", "DetectTime": "2023-10-30T14:14:06.161968+02:00", "EventTime": "2023-10-30T14:14:06.161984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CxmAYK3OIyArGYIpak"]} -{"Format": "IDEA0", "ID": "1fa58a1a-f044-450a-b7f4-1ff665a96123", "DetectTime": "2023-10-30T14:14:06.201372+02:00", "EventTime": "2023-10-30T14:14:06.201384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CPaQbK2wfHyaCQcKS2"]} -{"Format": "IDEA0", "ID": "3a81a6f5-cebd-4cac-9da7-f64c98cb1466", "DetectTime": "2023-10-30T14:14:06.235971+02:00", "EventTime": "2023-10-30T14:14:06.235984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CbIrvo2KeGjtJHPks7"]} -{"Format": "IDEA0", "ID": "c6453436-3f9c-4748-b9cf-73078a1e7904", "DetectTime": "2023-10-30T14:14:06.276245+02:00", "EventTime": "2023-10-30T14:14:06.276257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CYzQ0h34sxWAXfqgya"]} -{"Format": "IDEA0", "ID": "2a100b10-1b6a-406e-a8ae-70f48d1cbfc2", "DetectTime": "2023-10-30T14:14:06.295773+02:00", "EventTime": "2023-10-30T14:14:06.295783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cd5vO91XHyyF0XpGPf"]} -{"Format": "Json", "ID": "2a100b10-1b6a-406e-a8ae-70f48d1cbfc2", "DetectTime": "2023-10-30T14:14:06.295773+02:00", "EventTime": "2023-10-30T14:14:06.295783+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:09:58.209129+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:06.372420)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a587601c-a410-4734-9ef7-019de10b617f", "DetectTime": "2023-10-30T14:14:06.376959+02:00", "EventTime": "2023-10-30T14:14:06.376974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CpR0eV1t6ALK1TOEql"]} -{"Format": "IDEA0", "ID": "4be805c4-6e1d-4396-a77e-6b05195e0ac8", "DetectTime": "2023-10-30T14:14:06.409528+02:00", "EventTime": "2023-10-30T14:14:06.409542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CXOucCDwBMNjJZt4d"]} -{"Format": "IDEA0", "ID": "a7cd0a01-6510-4632-83f3-3693139241d6", "DetectTime": "2023-10-30T14:14:06.444577+02:00", "EventTime": "2023-10-30T14:14:06.444589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cc6ScG2bjk4mnaDtGl"]} -{"Format": "IDEA0", "ID": "7f789585-6a44-4e5f-a900-3ee5983968dd", "DetectTime": "2023-10-30T14:14:06.478822+02:00", "EventTime": "2023-10-30T14:14:06.478837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CYJJfi2JdNG0Frug0k"]} -{"Format": "IDEA0", "ID": "c64fefba-1292-4a5b-b9a0-2183178e667c", "DetectTime": "2023-10-30T14:14:06.512387+02:00", "EventTime": "2023-10-30T14:14:06.512399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CE9J543C1rU77tELo2"]} -{"Format": "IDEA0", "ID": "a3ad03de-a102-4e3c-956c-f474de8313d7", "DetectTime": "2023-10-30T14:14:06.544334+02:00", "EventTime": "2023-10-30T14:14:06.544350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CvnesS1Zctk3dfO8C8"]} -{"Format": "IDEA0", "ID": "b34c81e0-7bf2-4e19-9160-d8dcaa12efec", "DetectTime": "2023-10-30T14:14:06.562875+02:00", "EventTime": "2023-10-30T14:14:06.562891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cik7tY3yco2GJjnz6j"]} -{"Format": "IDEA0", "ID": "d4246083-9cf2-46d9-be46-97846e69a41a", "DetectTime": "2023-10-30T14:14:06.601487+02:00", "EventTime": "2023-10-30T14:14:06.601498+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ch0tQg4yu06OJ0Z45"]} -{"Format": "IDEA0", "ID": "adae3872-0722-4d7d-9deb-107628ee2fc5", "DetectTime": "2023-10-30T14:14:06.636598+02:00", "EventTime": "2023-10-30T14:14:06.636609+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CnqmFx2woGweeLidFk"]} -{"Format": "Json", "ID": "adae3872-0722-4d7d-9deb-107628ee2fc5", "DetectTime": "2023-10-30T14:14:06.636598+02:00", "EventTime": "2023-10-30T14:14:06.636609+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:09:59.901978+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:06.719378)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c8a87886-0b5c-4c72-8508-e2b768612cba", "DetectTime": "2023-10-30T14:14:06.725028+02:00", "EventTime": "2023-10-30T14:14:06.725053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CJwYuN1PvDECH3dQc3"]} -{"Format": "IDEA0", "ID": "6751c45f-b599-4fc4-a764-70f3a5d14113", "DetectTime": "2023-10-30T14:14:06.761241+02:00", "EventTime": "2023-10-30T14:14:06.761253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CThyYy27BJozqSsRca"]} -{"Format": "IDEA0", "ID": "f6889e44-95f2-47e3-b119-a7f10d839cc0", "DetectTime": "2023-10-30T14:14:06.790736+02:00", "EventTime": "2023-10-30T14:14:06.790753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CSsdeo27VHIewIMlSe"]} -{"Format": "IDEA0", "ID": "f3bb9717-c7b3-4017-8e9d-218d1dd93a61", "DetectTime": "2023-10-30T14:14:06.825940+02:00", "EventTime": "2023-10-30T14:14:06.825954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5973], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5973/UDP destination IP 184.71.161.90. ", "ContentType": "text/plain"}], "uids": ["CAMf7e4YfocX8ZaAIe"]} -{"Format": "IDEA0", "ID": "497c42a6-50cb-494d-a2d4-5ccde3ab09f9", "DetectTime": "2023-10-30T14:14:06.863336+02:00", "EventTime": "2023-10-30T14:14:06.863352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C6x9FayGQ381Ye6fe"]} -{"Format": "IDEA0", "ID": "2c4af628-71e6-47ee-a5ae-953c27a1b54f", "DetectTime": "2023-10-30T14:14:06.899724+02:00", "EventTime": "2023-10-30T14:14:06.899740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CSajlW2CuBqq6MFfP8"]} -{"Format": "IDEA0", "ID": "163ee338-c93b-4fc0-9fbc-b4c8d15a3908", "DetectTime": "2023-10-30T14:14:06.934235+02:00", "EventTime": "2023-10-30T14:14:06.934250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["C4FHFAUy6jzG2bRyd"]} -{"Format": "IDEA0", "ID": "4738cf9f-d829-4f93-9f8f-ce1939f64f41", "DetectTime": "2023-10-30T14:14:06.972671+02:00", "EventTime": "2023-10-30T14:14:06.972687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cynbn532zfz6cTi1d3"]} -{"Format": "IDEA0", "ID": "94218117-03d4-4567-b9f9-3fcd668558da", "DetectTime": "2023-10-30T14:14:06.994493+02:00", "EventTime": "2023-10-30T14:14:06.994504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CskSuq2mWiAwVfP7Ri"]} -{"Format": "Json", "ID": "94218117-03d4-4567-b9f9-3fcd668558da", "DetectTime": "2023-10-30T14:14:06.994493+02:00", "EventTime": "2023-10-30T14:14:06.994504+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:10:01.896579+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:07.129700)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ef943f7d-c259-4b84-995e-db3e0d033907", "DetectTime": "2023-10-30T14:14:07.134834+02:00", "EventTime": "2023-10-30T14:14:07.134851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CJXZJymEVb96Cc8M6"]} -{"Format": "IDEA0", "ID": "ffe6c715-b2aa-4986-849c-ed607f1e3f3f", "DetectTime": "2023-10-30T14:14:07.166560+02:00", "EventTime": "2023-10-30T14:14:07.166571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CCcjuHJppjobqkZIf"]} -{"Format": "IDEA0", "ID": "5cddb234-49f5-488d-b1d3-7d21b89d45de", "DetectTime": "2023-10-30T14:14:07.198126+02:00", "EventTime": "2023-10-30T14:14:07.198136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C11ZDl2m2OLOFOyGe6"]} -{"Format": "IDEA0", "ID": "5ac67f25-eba0-496c-88b1-c963abc7a3dc", "DetectTime": "2023-10-30T14:14:07.228696+02:00", "EventTime": "2023-10-30T14:14:07.228706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CFRFGOs7Bjxzj4Iqk"]} -{"Format": "IDEA0", "ID": "4a6e1ad3-a4fc-4f7c-a85a-e8bc234649be", "DetectTime": "2023-10-30T14:14:07.262332+02:00", "EventTime": "2023-10-30T14:14:07.262347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.77.90. ", "ContentType": "text/plain"}], "uids": ["CtBEFo1EQ8H2j0z59d"]} -{"Format": "IDEA0", "ID": "02814647-694e-41a7-9120-a77d5bc94e2a", "DetectTime": "2023-10-30T14:14:07.297349+02:00", "EventTime": "2023-10-30T14:14:07.297365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CamM1NyBACYdXPm47"]} -{"Format": "IDEA0", "ID": "c22c86b6-78cb-4d36-b5c1-3abc3910f7f3", "DetectTime": "2023-10-30T14:14:07.333394+02:00", "EventTime": "2023-10-30T14:14:07.333410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["Cm2rAe1H4vPoxkWppk"]} -{"Format": "IDEA0", "ID": "aace209a-695d-4527-a702-9e42a2664bd3", "DetectTime": "2023-10-30T14:14:07.359197+02:00", "EventTime": "2023-10-30T14:14:07.359208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CnfWj92B60GPGliHoi"]} -{"Format": "Json", "ID": "aace209a-695d-4527-a702-9e42a2664bd3", "DetectTime": "2023-10-30T14:14:07.359197+02:00", "EventTime": "2023-10-30T14:14:07.359208+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:10:03.806134+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:07.424761)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "80e39152-3cd6-4f55-a9f0-e73034643b88", "DetectTime": "2023-10-30T14:14:07.429952+02:00", "EventTime": "2023-10-30T14:14:07.429968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CmoC4q1oYzrEE9G7p6"]} -{"Format": "IDEA0", "ID": "67470f0c-213f-4d10-b267-e06ee09695c4", "DetectTime": "2023-10-30T14:14:07.463661+02:00", "EventTime": "2023-10-30T14:14:07.463686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CcUYPE4exFNVyYx3O6"]} -{"Format": "IDEA0", "ID": "4418fef9-3458-49b2-baa5-6c92158096be", "DetectTime": "2023-10-30T14:14:07.492818+02:00", "EventTime": "2023-10-30T14:14:07.492835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CtTuyw1yqiypu2GXjb"]} -{"Format": "IDEA0", "ID": "5af6ac1d-7dd8-4ad6-a04c-d3c07d7b5e88", "DetectTime": "2023-10-30T14:14:07.515683+02:00", "EventTime": "2023-10-30T14:14:07.515694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIxFlf2gOGFfs33z79"]} -{"Format": "IDEA0", "ID": "ee18c30a-78b9-4259-9b24-96efeddcd3fb", "DetectTime": "2023-10-30T14:14:07.543589+02:00", "EventTime": "2023-10-30T14:14:07.543605+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cv2Nn22XGpPwKh0Lzj"]} -{"Format": "IDEA0", "ID": "a203452c-6b83-4626-bdb8-c756bdcdef9c", "DetectTime": "2023-10-30T14:14:07.575380+02:00", "EventTime": "2023-10-30T14:14:07.575408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CXpYUt2Eh2BkrDcuI1"]} -{"Format": "IDEA0", "ID": "9c0ab008-7d93-4fcb-ba45-543df87c1836", "DetectTime": "2023-10-30T14:14:07.606252+02:00", "EventTime": "2023-10-30T14:14:07.606268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C2muyN26W2DOSWYAv6"]} -{"Format": "IDEA0", "ID": "ce6fb443-b2dc-4ecd-84d1-bd4a4ad84a2b", "DetectTime": "2023-10-30T14:14:07.631661+02:00", "EventTime": "2023-10-30T14:14:07.631671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C3theQM4KvR7HPXTd"]} -{"Format": "IDEA0", "ID": "f4eeeb1b-9ac4-4266-ae64-27f272ff190a", "DetectTime": "2023-10-30T14:14:07.660094+02:00", "EventTime": "2023-10-30T14:14:07.660110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CHDI5B1H2wgGicxqXk"]} -{"Format": "Json", "ID": "f4eeeb1b-9ac4-4266-ae64-27f272ff190a", "DetectTime": "2023-10-30T14:14:07.660094+02:00", "EventTime": "2023-10-30T14:14:07.660110+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:40:22.196187+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:07.738439)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "dac75264-355d-4ca4-b7c0-f534c5de3e57", "DetectTime": "2023-10-30T14:14:07.742668+02:00", "EventTime": "2023-10-30T14:14:07.742678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cz8gft3HZilwixRgqi"]} -{"Format": "IDEA0", "ID": "559d3b89-7c3a-497c-8af9-e84c35052f7b", "DetectTime": "2023-10-30T14:14:07.768339+02:00", "EventTime": "2023-10-30T14:14:07.768350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cq9dU91h6yJDSQvecc"]} -{"Format": "IDEA0", "ID": "359e60d8-bd8a-47cf-a2fc-1fbfe349becb", "DetectTime": "2023-10-30T14:14:07.796175+02:00", "EventTime": "2023-10-30T14:14:07.796187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CirVq64U9eZtba8Cvc"]} -{"Format": "IDEA0", "ID": "a3e0c43e-d3fe-42e1-babf-b94374a6efeb", "DetectTime": "2023-10-30T14:14:07.827124+02:00", "EventTime": "2023-10-30T14:14:07.827141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CRG5yI3QQuyhgVuaXk"]} -{"Format": "IDEA0", "ID": "55158480-9f1f-404f-8559-e5e90b25d90f", "DetectTime": "2023-10-30T14:14:07.848377+02:00", "EventTime": "2023-10-30T14:14:07.848406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CNF5Dv994LlNAxDH1"]} -{"Format": "IDEA0", "ID": "7d24e1f3-d73f-4597-aeb5-0d70fdee76a7", "DetectTime": "2023-10-30T14:14:07.879034+02:00", "EventTime": "2023-10-30T14:14:07.879045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CLe81f1IOZcS46eFwl"]} -{"Format": "IDEA0", "ID": "af167a5f-b58d-411a-9b70-4e9839cda6f7", "DetectTime": "2023-10-30T14:14:07.907785+02:00", "EventTime": "2023-10-30T14:14:07.907795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CQiBeL2DPcnaEMtTHc"]} -{"Format": "IDEA0", "ID": "f668ebf1-c230-4cd1-b3e5-ba0ef0eeb59c", "DetectTime": "2023-10-30T14:14:07.935360+02:00", "EventTime": "2023-10-30T14:14:07.935373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CWujoc1FWOqFtbH9a3"]} -{"Format": "IDEA0", "ID": "aa2ab34a-c394-441c-8fa3-4d635e465c30", "DetectTime": "2023-10-30T14:14:07.962018+02:00", "EventTime": "2023-10-30T14:14:07.962034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CWuOJDbRZPSlcqIXd"]} -{"Format": "Json", "ID": "aa2ab34a-c394-441c-8fa3-4d635e465c30", "DetectTime": "2023-10-30T14:14:07.962018+02:00", "EventTime": "2023-10-30T14:14:07.962034+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:40:23.789004+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:08.030862)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e426e3a0-eebf-4249-bd75-e7fac1d21543", "DetectTime": "2023-10-30T14:14:08.036210+02:00", "EventTime": "2023-10-30T14:14:08.036226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cr0IDB3mXtLsAc9D0c"]} -{"Format": "IDEA0", "ID": "e2d5fd53-7b20-4d51-af6a-9eb380e8b19b", "DetectTime": "2023-10-30T14:14:08.062555+02:00", "EventTime": "2023-10-30T14:14:08.062565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C4Tl263LCAFxVanhil"]} -{"Format": "IDEA0", "ID": "e33d6dc2-45d8-471a-8fac-069209c4ed63", "DetectTime": "2023-10-30T14:14:08.083511+02:00", "EventTime": "2023-10-30T14:14:08.083522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CPmEICB7dhBMgzgU9"]} -{"Format": "IDEA0", "ID": "6f14957b-207f-42b6-a08e-456756572f64", "DetectTime": "2023-10-30T14:14:08.111215+02:00", "EventTime": "2023-10-30T14:14:08.111230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CpKOhr2fd0ddr61Iba"]} -{"Format": "IDEA0", "ID": "7e58333e-e839-42f4-8d4c-8f1c8a7b29e0", "DetectTime": "2023-10-30T14:14:08.140959+02:00", "EventTime": "2023-10-30T14:14:08.140975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CE1B2A4TjhJwBCI7xi"]} -{"Format": "IDEA0", "ID": "36ff3b82-7eeb-4984-b28b-54e791e7662a", "DetectTime": "2023-10-30T14:14:08.167641+02:00", "EventTime": "2023-10-30T14:14:08.167655+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CWRRjVcjLrmy22mvi"]} -{"Format": "IDEA0", "ID": "f8f05660-6133-49fa-9eb4-f5db0c434249", "DetectTime": "2023-10-30T14:14:08.196587+02:00", "EventTime": "2023-10-30T14:14:08.196602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CCL7VK3Qv5S8EEqyZc"]} -{"Format": "IDEA0", "ID": "8d9cab77-fd68-460e-a085-89f41621168c", "DetectTime": "2023-10-30T14:14:08.221216+02:00", "EventTime": "2023-10-30T14:14:08.221228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CaMPPumDjVPnwwENh"]} -{"Format": "IDEA0", "ID": "09623597-841a-4346-b89a-7eca1dee2764", "DetectTime": "2023-10-30T14:14:08.247806+02:00", "EventTime": "2023-10-30T14:14:08.247822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CtMGJM3g9j78nDjHR6"]} -{"Format": "IDEA0", "ID": "416a69cc-3398-4bb5-9aa2-7cfb10a8c3b7", "DetectTime": "2023-10-30T14:14:08.268934+02:00", "EventTime": "2023-10-30T14:14:08.268951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C5teLT2cf28yQ3I0r7"]} -{"Format": "Json", "ID": "416a69cc-3398-4bb5-9aa2-7cfb10a8c3b7", "DetectTime": "2023-10-30T14:14:08.268934+02:00", "EventTime": "2023-10-30T14:14:08.268951+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:40:24.861932+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:08.330242)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bf2f9424-05eb-4f92-b3f3-b4ad5260e558", "DetectTime": "2023-10-30T14:14:08.335374+02:00", "EventTime": "2023-10-30T14:14:08.335386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Ck4aB73Rvto0bC4EUg"]} -{"Format": "IDEA0", "ID": "b2f86d2a-a055-4ddf-8252-6c39e959d428", "DetectTime": "2023-10-30T14:14:08.358720+02:00", "EventTime": "2023-10-30T14:14:08.358732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C7yrtSxHWo9cNyGob"]} -{"Format": "IDEA0", "ID": "c114e0e4-ceae-4c89-9622-3746c363787a", "DetectTime": "2023-10-30T14:14:08.381625+02:00", "EventTime": "2023-10-30T14:14:08.381638+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CB8yrC1n2O4OtAM7v5"]} -{"Format": "IDEA0", "ID": "9cc1cc36-3172-48d8-889f-23f20b1b0c3e", "DetectTime": "2023-10-30T14:14:08.402503+02:00", "EventTime": "2023-10-30T14:14:08.402516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CMFeh02NeQyt0oK3yl"]} -{"Format": "IDEA0", "ID": "70b0c86f-655b-4c71-a64a-c301b2779f78", "DetectTime": "2023-10-30T14:14:08.425591+02:00", "EventTime": "2023-10-30T14:14:08.425607+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C1FExK1z6Wk7vqNXRl"]} -{"Format": "IDEA0", "ID": "6c05020e-d807-4512-8b0a-7619ca1a1e3b", "DetectTime": "2023-10-30T14:14:08.448287+02:00", "EventTime": "2023-10-30T14:14:08.448299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CnLsXt1qP5KhXX1Wc8"]} -{"Format": "IDEA0", "ID": "38493caf-6de9-4685-a0cf-50ec27739a9b", "DetectTime": "2023-10-30T14:14:08.466330+02:00", "EventTime": "2023-10-30T14:14:08.466342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CYr8KF4caoeKQCYXN7"]} -{"Format": "IDEA0", "ID": "d7b262a2-612f-45d0-8d97-57be4c02eba6", "DetectTime": "2023-10-30T14:14:08.489250+02:00", "EventTime": "2023-10-30T14:14:08.489262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CxzNty2iszNRrdezG7"]} -{"Format": "IDEA0", "ID": "bcf38e48-9ea0-4860-a9df-fb0c51a2a16c", "DetectTime": "2023-10-30T14:14:08.507961+02:00", "EventTime": "2023-10-30T14:14:08.507979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CKNAvY2sWzwZZGAkb1"]} -{"Format": "Json", "ID": "bcf38e48-9ea0-4860-a9df-fb0c51a2a16c", "DetectTime": "2023-10-30T14:14:08.507961+02:00", "EventTime": "2023-10-30T14:14:08.507979+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:40:43.158522+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:08.571220)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "eadc2c30-e56e-4dee-a2d0-184ef444a536", "DetectTime": "2023-10-30T14:14:08.576314+02:00", "EventTime": "2023-10-30T14:14:08.576329+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CMNlt047hFWpOpSwTg"]} -{"Format": "IDEA0", "ID": "fabd87e0-2cb8-46b3-9ca4-f72caf54f3ab", "DetectTime": "2023-10-30T14:14:08.599387+02:00", "EventTime": "2023-10-30T14:14:08.599404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["C4IUtWl9UWCJ7qUzd"]} -{"Format": "IDEA0", "ID": "b9b60453-45c3-4b04-b3d9-58cac6acc64a", "DetectTime": "2023-10-30T14:14:08.622895+02:00", "EventTime": "2023-10-30T14:14:08.622909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C1j6ul1tMO8gzyg7Ed"]} -{"Format": "IDEA0", "ID": "5ceca532-25f8-494a-868e-f8d0b2c9cccf", "DetectTime": "2023-10-30T14:14:08.642716+02:00", "EventTime": "2023-10-30T14:14:08.642729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CezIj19qyfkf4Kpyc"]} -{"Format": "IDEA0", "ID": "da73521b-bde8-4556-861a-490a8ef4e157", "DetectTime": "2023-10-30T14:14:08.664728+02:00", "EventTime": "2023-10-30T14:14:08.664740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CJJ33G4NdbMMWVM0Ic"]} -{"Format": "IDEA0", "ID": "9a7f64e8-aa35-4940-8a00-8a84f083fd0a", "DetectTime": "2023-10-30T14:14:08.683788+02:00", "EventTime": "2023-10-30T14:14:08.683803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CmVktv2rR7bHCPn9af"]} -{"Format": "IDEA0", "ID": "2255bc2d-4a35-4b10-a555-5fe3e9f564fd", "DetectTime": "2023-10-30T14:14:08.705289+02:00", "EventTime": "2023-10-30T14:14:08.705307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.77.90. ", "ContentType": "text/plain"}], "uids": ["CgR0144WgThx0NDUp3"]} -{"Format": "IDEA0", "ID": "ba08d098-4565-4af9-ac78-05d3ab08a0f5", "DetectTime": "2023-10-30T14:14:08.726593+02:00", "EventTime": "2023-10-30T14:14:08.726608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["Chazw41WtrRDY3ibff"]} -{"Format": "IDEA0", "ID": "ba3c4de6-d6d7-476e-b4f1-b5142aa9ed32", "DetectTime": "2023-10-30T14:14:08.751209+02:00", "EventTime": "2023-10-30T14:14:08.751224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CoRUfd18zsO1sgULPi"]} -{"Format": "IDEA0", "ID": "8eac2508-c54e-4361-80e9-f71b4c562577", "DetectTime": "2023-10-30T14:14:08.775606+02:00", "EventTime": "2023-10-30T14:14:08.775622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CH2UJe3W1r96uolu31"]} -{"Format": "IDEA0", "ID": "7468128e-5a30-4c5a-b478-8fc3dd81bdbc", "DetectTime": "2023-10-30T14:14:08.800287+02:00", "EventTime": "2023-10-30T14:14:08.800303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CSzMZc2FSZQ9HFcy1b"]} -{"Format": "Json", "ID": "7468128e-5a30-4c5a-b478-8fc3dd81bdbc", "DetectTime": "2023-10-30T14:14:08.800287+02:00", "EventTime": "2023-10-30T14:14:08.800303+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T02:40:54.343113+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 217. (real time 2023/10/30 14:14:08.863206)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6c83a80c-c681-496c-9eb9-f8ba8e51b90c", "DetectTime": "2023-10-30T14:14:08.866738+02:00", "EventTime": "2023-10-30T14:14:08.866754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CR1GWO1Za1NAfYYs09"]} -{"Format": "IDEA0", "ID": "e8cb4cee-9829-4ee0-bd40-8ef86211bed6", "DetectTime": "2023-10-30T14:14:08.884513+02:00", "EventTime": "2023-10-30T14:14:08.884525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CoQAkB3zcDFZ5IcvO9"]} -{"Format": "IDEA0", "ID": "b0e5cb2f-62f4-48d5-accd-1caf089f984f", "DetectTime": "2023-10-30T14:14:08.903928+02:00", "EventTime": "2023-10-30T14:14:08.903941+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cm6mi81DIqm2WeE5Hc"]} -{"Format": "IDEA0", "ID": "f56be2e1-5d0d-4635-bbde-9c7f8388af57", "DetectTime": "2023-10-30T14:14:08.926071+02:00", "EventTime": "2023-10-30T14:14:08.926092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcrlJD3BuhlsSQrxl3"]} -{"Format": "IDEA0", "ID": "82e576cb-5b0c-4ed8-bfc1-985eeca5c00d", "DetectTime": "2023-10-30T14:14:08.962807+02:00", "EventTime": "2023-10-30T14:14:08.962824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CGE06t2Dcoi9eEJo3a"]} -{"Format": "IDEA0", "ID": "3c177a12-2a7d-462e-8e52-8aa0cb1107f5", "DetectTime": "2023-10-30T14:14:08.983441+02:00", "EventTime": "2023-10-30T14:14:08.983455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CTYqeVrafRkElkFRa"]} -{"Format": "IDEA0", "ID": "b8027023-7c62-4147-a552-96832a45107f", "DetectTime": "2023-10-30T14:14:09.087538+02:00", "EventTime": "2023-10-30T14:14:09.087557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZZ7db2aHqZB2v9Kf8"]} -{"Format": "IDEA0", "ID": "6e77fff7-18da-4ca0-ba29-d282693c7f73", "DetectTime": "2023-10-30T14:14:09.129519+02:00", "EventTime": "2023-10-30T14:14:09.129534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CC0Pe9YMZbbxFlIE4"]} -{"Format": "IDEA0", "ID": "b1a61bca-af26-4f60-b7d0-c2acc368620b", "DetectTime": "2023-10-30T14:14:09.170238+02:00", "EventTime": "2023-10-30T14:14:09.170248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CV2Afy2qUMtQ5Dguq3"]} -{"Format": "IDEA0", "ID": "75aa7ab6-221f-4fc8-96a3-049fabd24cfe", "DetectTime": "2023-10-30T14:14:09.210235+02:00", "EventTime": "2023-10-30T14:14:09.210247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CYvScy46jaPpRzH7sc"]} -{"Format": "IDEA0", "ID": "43489f19-d085-4f4b-a596-9716f70a7469", "DetectTime": "2023-10-30T14:14:09.231497+02:00", "EventTime": "2023-10-30T14:14:09.231511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CqmlXy44ABSSsCiEbl"]} -{"Format": "IDEA0", "ID": "b3cb2717-71f4-4275-95aa-361c492d0fa7", "DetectTime": "2023-10-30T14:14:09.273525+02:00", "EventTime": "2023-10-30T14:14:09.273541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C0W9Mk3SRueHjdhJTl"]} -{"Format": "IDEA0", "ID": "595f9304-49c6-4ccb-b00a-14ef56415a32", "DetectTime": "2023-10-30T14:14:09.316037+02:00", "EventTime": "2023-10-30T14:14:09.316054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Ca5h8M1MSLGkv9AH39"]} -{"Format": "Json", "ID": "595f9304-49c6-4ccb-b00a-14ef56415a32", "DetectTime": "2023-10-30T14:14:09.316037+02:00", "EventTime": "2023-10-30T14:14:09.316054+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:11:34.611425+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:09.414984)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cf1ad48c-f2e3-4676-9bdd-47f5e8f95ca0", "DetectTime": "2023-10-30T14:14:09.420418+02:00", "EventTime": "2023-10-30T14:14:09.420434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CrT0Nz1D4AiV0yRix4"]} -{"Format": "IDEA0", "ID": "7c04ba57-2c77-4bbf-bc26-a0fad5ae7562", "DetectTime": "2023-10-30T14:14:09.457727+02:00", "EventTime": "2023-10-30T14:14:09.457746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CNtV9G43VjpzHW9p1c"]} -{"Format": "IDEA0", "ID": "4a3953f7-d134-4cfe-b136-101cdc192441", "DetectTime": "2023-10-30T14:14:09.495927+02:00", "EventTime": "2023-10-30T14:14:09.495951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C5UCDg4m4e9GN1b7ff"]} -{"Format": "IDEA0", "ID": "8853b1cc-f64e-437d-81b0-790e2a17d451", "DetectTime": "2023-10-30T14:14:09.536953+02:00", "EventTime": "2023-10-30T14:14:09.536970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C3zBMn34FB8T44IHP3"]} -{"Format": "IDEA0", "ID": "91b44e97-2242-4520-abb2-ae3b33d59437", "DetectTime": "2023-10-30T14:14:09.575108+02:00", "EventTime": "2023-10-30T14:14:09.575127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CcGPqf25wylDK6Qqk7"]} -{"Format": "IDEA0", "ID": "26d97c33-84b2-4aae-9b48-b3efe4efd342", "DetectTime": "2023-10-30T14:14:09.614412+02:00", "EventTime": "2023-10-30T14:14:09.614434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CsDRg82NukKU7N0C6"]} -{"Format": "IDEA0", "ID": "330c8019-af11-47c9-af77-673b6453b98d", "DetectTime": "2023-10-30T14:14:09.639564+02:00", "EventTime": "2023-10-30T14:14:09.639581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CG7hKp1g14MPMTmVSg"]} -{"Format": "IDEA0", "ID": "4064cd2f-8a40-495d-b5d0-33f2053fb26a", "DetectTime": "2023-10-30T14:14:09.684266+02:00", "EventTime": "2023-10-30T14:14:09.684294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cq39dlrvf3p9iAgWi"]} -{"Format": "IDEA0", "ID": "a62509ba-a571-4e81-b550-ed6f307d8e62", "DetectTime": "2023-10-30T14:14:09.722283+02:00", "EventTime": "2023-10-30T14:14:09.722301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CUFTdI1QxiNqXt3MGd"]} -{"Format": "Json", "ID": "a62509ba-a571-4e81-b550-ed6f307d8e62", "DetectTime": "2023-10-30T14:14:09.722283+02:00", "EventTime": "2023-10-30T14:14:09.722301+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:11:35.738156+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:09.813978)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6345094c-dbb7-436c-bf5c-f45ef7f7c198", "DetectTime": "2023-10-30T14:14:09.818892+02:00", "EventTime": "2023-10-30T14:14:09.818909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C4QXjI3441HghxE2Rg"]} -{"Format": "IDEA0", "ID": "0fc954da-7018-4d56-9e45-f5e74fc2031a", "DetectTime": "2023-10-30T14:14:09.858720+02:00", "EventTime": "2023-10-30T14:14:09.858744+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cy0gno3nPwdP8nBE53"]} -{"Format": "IDEA0", "ID": "a1a3ea1f-acd9-49f4-b6d8-dac710306e5f", "DetectTime": "2023-10-30T14:14:09.896246+02:00", "EventTime": "2023-10-30T14:14:09.896262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CjBHCd2SaeYH24Gfki"]} -{"Format": "IDEA0", "ID": "6146a8ef-5ae5-45a2-807d-bdda92d00d35", "DetectTime": "2023-10-30T14:14:09.920271+02:00", "EventTime": "2023-10-30T14:14:09.920282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CICYEW3eSYN7a4Yq33"]} -{"Format": "IDEA0", "ID": "fb279074-2102-4093-9a37-e81ffb734b27", "DetectTime": "2023-10-30T14:14:09.957465+02:00", "EventTime": "2023-10-30T14:14:09.957477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CS7rLpulkO7qp08Yh"]} -{"Format": "IDEA0", "ID": "a7a14449-9598-44ce-a8ba-14ccd032be3e", "DetectTime": "2023-10-30T14:14:09.995328+02:00", "EventTime": "2023-10-30T14:14:09.995339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CVGrZn4oxNuRh9rmvj"]} -{"Format": "IDEA0", "ID": "06999282-5f92-4507-87a0-a61be84429bd", "DetectTime": "2023-10-30T14:14:10.033176+02:00", "EventTime": "2023-10-30T14:14:10.033193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CNBc8o3aKaUFJJig81"]} -{"Format": "IDEA0", "ID": "d0ec8bbf-e62b-42a8-aa67-33b5f5345671", "DetectTime": "2023-10-30T14:14:10.069706+02:00", "EventTime": "2023-10-30T14:14:10.069722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CwxvWY2tHzwjVTPtBj"]} -{"Format": "IDEA0", "ID": "1ff8aded-e70a-467e-8f11-8cf76f3d6cdd", "DetectTime": "2023-10-30T14:14:10.106791+02:00", "EventTime": "2023-10-30T14:14:10.106807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CpKR2L2Bun7AGSKrb"]} -{"Format": "IDEA0", "ID": "75555564-7aba-46e8-af22-814d91fe239b", "DetectTime": "2023-10-30T14:14:10.131537+02:00", "EventTime": "2023-10-30T14:14:10.131554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CjYeEu4sOUDbMwfgr5"]} -{"Format": "Json", "ID": "75555564-7aba-46e8-af22-814d91fe239b", "DetectTime": "2023-10-30T14:14:10.131537+02:00", "EventTime": "2023-10-30T14:14:10.131554+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:11:37.372143+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:10.217416)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e4e645fa-a3dc-4c1d-be06-5dea9a34469a", "DetectTime": "2023-10-30T14:14:10.222963+02:00", "EventTime": "2023-10-30T14:14:10.222981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CAxaup2X7hSd9vcDrf"]} -{"Format": "IDEA0", "ID": "c3537ad2-c595-405b-bc86-aa6b5d0d39cd", "DetectTime": "2023-10-30T14:14:10.271990+02:00", "EventTime": "2023-10-30T14:14:10.272011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CO2vlM2YNdLxWekYLb"]} -{"Format": "IDEA0", "ID": "42e1b224-6110-43f4-89f9-0a522e41a270", "DetectTime": "2023-10-30T14:14:10.312181+02:00", "EventTime": "2023-10-30T14:14:10.312197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CW9JNm2ksxzABCjR68"]} -{"Format": "IDEA0", "ID": "d77eaacd-0502-47e3-8275-50dd2de5b187", "DetectTime": "2023-10-30T14:14:10.338402+02:00", "EventTime": "2023-10-30T14:14:10.338421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CC7YyzuGYSae8Zowf"]} -{"Format": "IDEA0", "ID": "1ac2a893-f948-486d-8d98-beee81deeee2", "DetectTime": "2023-10-30T14:14:10.372479+02:00", "EventTime": "2023-10-30T14:14:10.372489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["COwsr84U2EkFgKmow5"]} -{"Format": "IDEA0", "ID": "35ac945f-bb8b-418f-965c-54f4949cfbd9", "DetectTime": "2023-10-30T14:14:10.405452+02:00", "EventTime": "2023-10-30T14:14:10.405467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CanGVf3WVXxz0Wbp46"]} -{"Format": "IDEA0", "ID": "7be55356-2ffa-4829-90cf-3c8c93c0f882", "DetectTime": "2023-10-30T14:14:10.440089+02:00", "EventTime": "2023-10-30T14:14:10.440104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CTZpVi2uyLf1jxW2Wc"]} -{"Format": "IDEA0", "ID": "f7f391d9-cb27-483b-a44c-ee84a82e0875", "DetectTime": "2023-10-30T14:14:10.476611+02:00", "EventTime": "2023-10-30T14:14:10.476636+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CdT3br3e4lKplfGKXd"]} -{"Format": "IDEA0", "ID": "0724864d-9977-462c-8481-871bd53b4228", "DetectTime": "2023-10-30T14:14:10.499866+02:00", "EventTime": "2023-10-30T14:14:10.499883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C43VUv3WoMKVib7dle"]} -{"Format": "IDEA0", "ID": "d9432a14-123c-423c-977c-f9eebb043b1b", "DetectTime": "2023-10-30T14:14:10.537655+02:00", "EventTime": "2023-10-30T14:14:10.537670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CpQeSL2qow47PqxfWh"]} -{"Format": "Json", "ID": "d9432a14-123c-423c-977c-f9eebb043b1b", "DetectTime": "2023-10-30T14:14:10.537655+02:00", "EventTime": "2023-10-30T14:14:10.537670+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:11:53.906901+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:10.614299)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7677382e-761b-4020-91ca-7d1f5ec429b5", "DetectTime": "2023-10-30T14:14:10.619052+02:00", "EventTime": "2023-10-30T14:14:10.619064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CmD2y02YJdRdH2uPAl"]} -{"Format": "IDEA0", "ID": "988f6f9a-71f3-4712-8cf8-5f3cb8ffe613", "DetectTime": "2023-10-30T14:14:10.640848+02:00", "EventTime": "2023-10-30T14:14:10.640860+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CHkdrc40ocB25irhK8"]} -{"Format": "IDEA0", "ID": "e76545a7-2fba-4c0d-8a1e-aa48926c3d8a", "DetectTime": "2023-10-30T14:14:10.668559+02:00", "EventTime": "2023-10-30T14:14:10.668576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7399], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.77.90. ", "ContentType": "text/plain"}], "uids": ["Cmqusd29UOWrHhjbnj"]} -{"Format": "IDEA0", "ID": "70d50159-fd9f-4bfa-b6d2-93b47f65affa", "DetectTime": "2023-10-30T14:14:10.702320+02:00", "EventTime": "2023-10-30T14:14:10.702330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CdpGio4CTlXxCUvc9h"]} -{"Format": "IDEA0", "ID": "07aa50da-4002-4a28-a0a1-3dfd6e6832dd", "DetectTime": "2023-10-30T14:14:10.732828+02:00", "EventTime": "2023-10-30T14:14:10.732841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C6RvLu3JpK8rdwmVE3"]} -{"Format": "IDEA0", "ID": "a1dd8246-e61d-4be8-b1de-7e2b7335e036", "DetectTime": "2023-10-30T14:14:10.754173+02:00", "EventTime": "2023-10-30T14:14:10.754198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["C0Al5q24rMn64KK3Sg"]} -{"Format": "IDEA0", "ID": "61f4a564-a7f4-4ad1-9c80-1589cba7290d", "DetectTime": "2023-10-30T14:14:10.786745+02:00", "EventTime": "2023-10-30T14:14:10.786762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CDi6Gg1JOSVdPBI2gf"]} -{"Format": "IDEA0", "ID": "9170bf2d-1acb-478a-9224-4b1ec2ef724d", "DetectTime": "2023-10-30T14:14:10.816345+02:00", "EventTime": "2023-10-30T14:14:10.816372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CgA23r2foZZU9O4Lmg"]} -{"Format": "IDEA0", "ID": "bde28ebe-1931-4cc0-95a7-6714f0c01352", "DetectTime": "2023-10-30T14:14:10.845717+02:00", "EventTime": "2023-10-30T14:14:10.845728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CL1Fxi2IF0I7IrGOS8"]} -{"Format": "IDEA0", "ID": "58235e8f-4417-4845-b27c-6f3c465cfc42", "DetectTime": "2023-10-30T14:14:10.864848+02:00", "EventTime": "2023-10-30T14:14:10.864865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CFQQ9D2xGR4KRBfP9f"]} -{"Format": "IDEA0", "ID": "0d4febe3-e4be-415f-b3da-5f1354b9f693", "DetectTime": "2023-10-30T14:14:10.893494+02:00", "EventTime": "2023-10-30T14:14:10.893504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cnzocz3Rz7Zcp8Qc3"]} -{"Format": "Json", "ID": "0d4febe3-e4be-415f-b3da-5f1354b9f693", "DetectTime": "2023-10-30T14:14:10.893494+02:00", "EventTime": "2023-10-30T14:14:10.893504+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-10T03:35:56.071439+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:10.953533)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "58ea0ff2-a3c1-4b1e-bf45-b381ad9cfd00", "DetectTime": "2023-10-30T14:14:10.958490+02:00", "EventTime": "2023-10-30T14:14:10.958507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CiH9PesTyJbk9ygBe"]} -{"Format": "IDEA0", "ID": "535cac0b-3b79-4a09-9bc6-1a88dcec89ff", "DetectTime": "2023-10-30T14:14:10.982506+02:00", "EventTime": "2023-10-30T14:14:10.982518+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CUyxjh1yILdhc4FjXh"]} -{"Format": "IDEA0", "ID": "07d68731-3079-4f06-8b01-2b2d3c78afea", "DetectTime": "2023-10-30T14:14:11.000761+02:00", "EventTime": "2023-10-30T14:14:11.000778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CKjqdo3ytltw15zmTd"]} -{"Format": "IDEA0", "ID": "b2f8c524-34a8-4d83-b4b2-d05fb02b793b", "DetectTime": "2023-10-30T14:14:11.027116+02:00", "EventTime": "2023-10-30T14:14:11.027127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cfmays3az5jygIsbyd"]} -{"Format": "IDEA0", "ID": "6f0a6ed7-d22e-425f-b2f4-e9f536b74301", "DetectTime": "2023-10-30T14:14:11.046657+02:00", "EventTime": "2023-10-30T14:14:11.046668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CbE7Lf3DWQ2wV7reW2"]} -{"Format": "IDEA0", "ID": "e0e1f157-1501-4286-9807-2d6c8b90459c", "DetectTime": "2023-10-30T14:14:11.073368+02:00", "EventTime": "2023-10-30T14:14:11.073378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CQ7nwq4fwlwdr0hLsj"]} -{"Format": "IDEA0", "ID": "c3e1d4e4-05cb-4a7e-ab6a-6a84e8a4e5ea", "DetectTime": "2023-10-30T14:14:11.103257+02:00", "EventTime": "2023-10-30T14:14:11.103272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CXi2pl2R2APLmeP77k"]} -{"Format": "IDEA0", "ID": "527e32a7-1f3a-4a41-9735-c4c16e644478", "DetectTime": "2023-10-30T14:14:11.132838+02:00", "EventTime": "2023-10-30T14:14:11.132853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CLYLLo3WEUFyW2Vjge"]} -{"Format": "IDEA0", "ID": "3dce63eb-aa0f-47a4-b21a-ca633e53d958", "DetectTime": "2023-10-30T14:14:11.157115+02:00", "EventTime": "2023-10-30T14:14:11.157130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CpBlBp2dtPDD2hUO4b"]} -{"Format": "IDEA0", "ID": "88d47e2c-b04a-4e17-a8e7-24410aca5c76", "DetectTime": "2023-10-30T14:14:11.188929+02:00", "EventTime": "2023-10-30T14:14:11.188940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C1TiVF2bmyWsqRep89"]} -{"Format": "IDEA0", "ID": "e163bea8-3248-4d92-8832-47fdf6ae1c0e", "DetectTime": "2023-10-30T14:14:11.214382+02:00", "EventTime": "2023-10-30T14:14:11.214398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CkTRS51SnS5jM98Dj7"]} -{"Format": "IDEA0", "ID": "f72e8be9-2fd3-4e40-abc5-d7c130dbe628", "DetectTime": "2023-10-30T14:14:11.243477+02:00", "EventTime": "2023-10-30T14:14:11.243489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CitBIu1rXMlf4Q1OD6"]} -{"Format": "IDEA0", "ID": "fde1b267-5155-4610-8111-4757a1150bf1", "DetectTime": "2023-10-30T14:14:11.264241+02:00", "EventTime": "2023-10-30T14:14:11.264266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CdP59813vhMrqG3ove"]} -{"Format": "Json", "ID": "fde1b267-5155-4610-8111-4757a1150bf1", "DetectTime": "2023-10-30T14:14:11.264241+02:00", "EventTime": "2023-10-30T14:14:11.264266+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:42:02.654192+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:11.341928)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fdb8eaa7-f51b-4995-9eca-47385801663a", "DetectTime": "2023-10-30T14:14:11.346694+02:00", "EventTime": "2023-10-30T14:14:11.346709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CYBk6b1re3gkqCEtB3"]} -{"Format": "IDEA0", "ID": "2f66662b-3eba-4085-b2c8-161d91debca1", "DetectTime": "2023-10-30T14:14:11.371681+02:00", "EventTime": "2023-10-30T14:14:11.371698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CUvA2h1lgZHpcy4Am4"]} -{"Format": "IDEA0", "ID": "8e51a392-bf59-4249-99a7-6022b599221e", "DetectTime": "2023-10-30T14:14:11.401674+02:00", "EventTime": "2023-10-30T14:14:11.401690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C40dwN2GPJTjlzUpUj"]} -{"Format": "IDEA0", "ID": "0ae96df5-888d-4f9f-b8b2-eff1b7a5b6b6", "DetectTime": "2023-10-30T14:14:11.422158+02:00", "EventTime": "2023-10-30T14:14:11.422170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CWrhgV1DWh1OSUkd4"]} -{"Format": "IDEA0", "ID": "4227fc39-c5b8-485d-b4c9-6847f5b3e0e1", "DetectTime": "2023-10-30T14:14:11.448538+02:00", "EventTime": "2023-10-30T14:14:11.448553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Cl1YJr2MzaQnhyKuY"]} -{"Format": "IDEA0", "ID": "38671c2e-cdac-4609-8abc-c4096f22db0c", "DetectTime": "2023-10-30T14:14:11.476375+02:00", "EventTime": "2023-10-30T14:14:11.476387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CthbQi3TKUSxRc2LT7"]} -{"Format": "IDEA0", "ID": "bacd136c-840f-4876-9ca1-ecf9ec01eff8", "DetectTime": "2023-10-30T14:14:11.503473+02:00", "EventTime": "2023-10-30T14:14:11.503484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CUeujO26Q5hvEkLOX3"]} -{"Format": "IDEA0", "ID": "217d4b28-e252-4581-8262-c706c4725530", "DetectTime": "2023-10-30T14:14:11.526918+02:00", "EventTime": "2023-10-30T14:14:11.526931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["COmCBGKaa7sRcsU8j"]} -{"Format": "IDEA0", "ID": "0bf961fb-d9b2-417d-a4de-c00a8f060f02", "DetectTime": "2023-10-30T14:14:11.546870+02:00", "EventTime": "2023-10-30T14:14:11.546883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cth99w2OHM9LXrll9h"]} -{"Format": "IDEA0", "ID": "3035c353-a7fc-4d2a-8fc7-326911db930b", "DetectTime": "2023-10-30T14:14:11.569924+02:00", "EventTime": "2023-10-30T14:14:11.569935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CUyEGu43ghN1NmXfAh"]} -{"Format": "Json", "ID": "3035c353-a7fc-4d2a-8fc7-326911db930b", "DetectTime": "2023-10-30T14:14:11.569924+02:00", "EventTime": "2023-10-30T14:14:11.569935+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:42:04.229085+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:11.636787)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ea1e90ab-da36-42a8-bd84-5a6df65788b3", "DetectTime": "2023-10-30T14:14:11.640709+02:00", "EventTime": "2023-10-30T14:14:11.640722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTkQeU24hRNr6QufX1"]} -{"Format": "IDEA0", "ID": "2c39194e-6644-4966-a20c-26b008b96e78", "DetectTime": "2023-10-30T14:14:11.660895+02:00", "EventTime": "2023-10-30T14:14:11.660904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CDxdWU3bnVlrRISjhg"]} -{"Format": "IDEA0", "ID": "bf5025c7-05c9-4d59-bc67-593137d33122", "DetectTime": "2023-10-30T14:14:11.687137+02:00", "EventTime": "2023-10-30T14:14:11.687152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CNa2Hu1ffXh5iliVP3"]} -{"Format": "IDEA0", "ID": "5a408f3d-cf37-46f4-9a9a-edd78ee98a19", "DetectTime": "2023-10-30T14:14:11.710270+02:00", "EventTime": "2023-10-30T14:14:11.710288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C3Lp1WkczkDkDRZsc"]} -{"Format": "IDEA0", "ID": "0968786c-7c42-4b70-a5cd-447272010600", "DetectTime": "2023-10-30T14:14:11.733652+02:00", "EventTime": "2023-10-30T14:14:11.733676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CGVedb2Y8EK6Fk5z71"]} -{"Format": "IDEA0", "ID": "ab18bc8c-d6e4-4e8d-9f57-2306f5601432", "DetectTime": "2023-10-30T14:14:11.756051+02:00", "EventTime": "2023-10-30T14:14:11.756070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CNcie52bEtyaMRNEy1"]} -{"Format": "IDEA0", "ID": "2d9ab64a-d608-4419-a79f-5c1e2a62220b", "DetectTime": "2023-10-30T14:14:11.780000+02:00", "EventTime": "2023-10-30T14:14:11.780014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CRhC9t3jeGVtrbwV4d"]} -{"Format": "IDEA0", "ID": "d38980a0-bead-4317-a541-8dffe62fee30", "DetectTime": "2023-10-30T14:14:11.804399+02:00", "EventTime": "2023-10-30T14:14:11.804409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CNRTG12fBip8VXxEV7"]} -{"Format": "IDEA0", "ID": "8ccc48fe-3112-4087-8554-353dfdc30ad3", "DetectTime": "2023-10-30T14:14:11.830079+02:00", "EventTime": "2023-10-30T14:14:11.830095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CjDEVb1cPMqQnc9iZd"]} -{"Format": "IDEA0", "ID": "fcc632aa-5527-4b7f-9ce0-0294be68d777", "DetectTime": "2023-10-30T14:14:11.857315+02:00", "EventTime": "2023-10-30T14:14:11.857330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CSpPhK3lsvTkiarCRc"]} -{"Format": "IDEA0", "ID": "4c1d3a4b-52ed-49cd-851a-5d29f3d558d9", "DetectTime": "2023-10-30T14:14:11.881756+02:00", "EventTime": "2023-10-30T14:14:11.881766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C0S7i261YqrmBCw7b"]} -{"Format": "IDEA0", "ID": "4417e337-bf4b-4063-ab57-5a6d974b1b65", "DetectTime": "2023-10-30T14:14:11.906171+02:00", "EventTime": "2023-10-30T14:14:11.906182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CTo8nm3VPaHjUL0YF9"]} -{"Format": "IDEA0", "ID": "f76427a7-ac48-4dce-8f7d-b92e2e59ae5a", "DetectTime": "2023-10-30T14:14:11.928911+02:00", "EventTime": "2023-10-30T14:14:11.928925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CCTSpp3fNhSqzG5T68"]} -{"Format": "IDEA0", "ID": "0509a4be-bc92-4adf-b643-ada61136bbe6", "DetectTime": "2023-10-30T14:14:11.952819+02:00", "EventTime": "2023-10-30T14:14:11.952829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cmu8jP3Io3weEbjo33"]} -{"Format": "Json", "ID": "0509a4be-bc92-4adf-b643-ada61136bbe6", "DetectTime": "2023-10-30T14:14:11.952819+02:00", "EventTime": "2023-10-30T14:14:11.952829+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:42:05.448305+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:12.020244)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "55d9a9b0-f088-4e33-8ada-cfb401b65692", "DetectTime": "2023-10-30T14:14:12.024945+02:00", "EventTime": "2023-10-30T14:14:12.024969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CpFga81XbicvcUMqz4"]} -{"Format": "IDEA0", "ID": "df4a430c-e1c3-4572-ac76-e2480eadc24f", "DetectTime": "2023-10-30T14:14:12.048944+02:00", "EventTime": "2023-10-30T14:14:12.048959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CXOGb6TwEDpP3j9s5"]} -{"Format": "IDEA0", "ID": "1f6e17bc-10aa-4792-a1e5-b86a30b50e30", "DetectTime": "2023-10-30T14:14:12.071352+02:00", "EventTime": "2023-10-30T14:14:12.071368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CuHLQY2WwbteLTEwl"]} -{"Format": "IDEA0", "ID": "3f68713c-5011-4c5b-bf53-c5f0e437db83", "DetectTime": "2023-10-30T14:14:12.094590+02:00", "EventTime": "2023-10-30T14:14:12.094610+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CnSujH1qBAb2HSDODc"]} -{"Format": "IDEA0", "ID": "ef17d8f3-4d32-458a-b9a8-82bbca2671ca", "DetectTime": "2023-10-30T14:14:12.116443+02:00", "EventTime": "2023-10-30T14:14:12.116454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CQa3heVYy8WqD2SWg"]} -{"Format": "IDEA0", "ID": "bd5b2b56-2d0c-4d0e-8e62-816645f5a7c9", "DetectTime": "2023-10-30T14:14:12.138986+02:00", "EventTime": "2023-10-30T14:14:12.139003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["C3iE8D1zukxTzTn0z7"]} -{"Format": "IDEA0", "ID": "d783908c-6e5d-4f1d-b5a3-c2398093c523", "DetectTime": "2023-10-30T14:14:12.161099+02:00", "EventTime": "2023-10-30T14:14:12.161115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CKAGTBeuajL3LKFbi"]} -{"Format": "IDEA0", "ID": "f9774a6e-0e72-47fa-bffb-7a5160b11dd2", "DetectTime": "2023-10-30T14:14:12.184321+02:00", "EventTime": "2023-10-30T14:14:12.184333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CjbIOn2tABLQBB8wU7"]} -{"Format": "IDEA0", "ID": "fc9b7d70-b7bb-4cdb-a538-e5568a3d6875", "DetectTime": "2023-10-30T14:14:12.208521+02:00", "EventTime": "2023-10-30T14:14:12.208539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CBUYM23WUeSWUhr2jk"]} -{"Format": "IDEA0", "ID": "30c52d02-0457-447d-9c75-36de084cbef7", "DetectTime": "2023-10-30T14:14:12.233251+02:00", "EventTime": "2023-10-30T14:14:12.233262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CX7aK0HbAgpLhlp"]} -{"Format": "IDEA0", "ID": "a16d61d6-7e94-4b3c-8edc-a5832d278d46", "DetectTime": "2023-10-30T14:14:12.255954+02:00", "EventTime": "2023-10-30T14:14:12.255964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cux4KU36NXMyElZZda"]} -{"Format": "IDEA0", "ID": "947b6182-f92e-485a-82f4-3f5f6a38b0f2", "DetectTime": "2023-10-30T14:14:12.279442+02:00", "EventTime": "2023-10-30T14:14:12.279455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CWFLti2wHykDoDVHge"]} -{"Format": "Json", "ID": "947b6182-f92e-485a-82f4-3f5f6a38b0f2", "DetectTime": "2023-10-30T14:14:12.279442+02:00", "EventTime": "2023-10-30T14:14:12.279455+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T03:42:06.621956+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 218. (real time 2023/10/30 14:14:12.342209)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "11b184ab-dc87-411d-acdd-7151091de3c7", "DetectTime": "2023-10-30T14:14:12.347401+02:00", "EventTime": "2023-10-30T14:14:12.347416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CTRonPQuZGW1Fswdg"]} -{"Format": "IDEA0", "ID": "12c42fa2-623f-42c9-a488-54d639e0409d", "DetectTime": "2023-10-30T14:14:12.370331+02:00", "EventTime": "2023-10-30T14:14:12.370347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9919], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. ", "ContentType": "text/plain"}], "uids": ["CjD4DB1bd6LbuKTBng"]} -{"Format": "IDEA0", "ID": "34f1ffc1-9cf0-454d-a6d6-2d015227f298", "DetectTime": "2023-10-30T14:14:12.391128+02:00", "EventTime": "2023-10-30T14:14:12.391138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CEv1ul3JW7lTpAElvh"]} -{"Format": "IDEA0", "ID": "a8437d25-a40f-4444-8b4a-905f2f48b4a4", "DetectTime": "2023-10-30T14:14:12.411180+02:00", "EventTime": "2023-10-30T14:14:12.411195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CKf8xIvK1O1iLfYa4"]} -{"Format": "IDEA0", "ID": "bd99604e-79ad-46bf-ab72-126e7cb9af7e", "DetectTime": "2023-10-30T14:14:12.434524+02:00", "EventTime": "2023-10-30T14:14:12.434540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBSowtHYP2lL64lxj"]} -{"Format": "IDEA0", "ID": "6c9c97bf-4bf8-4c29-9802-538e2cd94dc7", "DetectTime": "2023-10-30T14:14:12.458281+02:00", "EventTime": "2023-10-30T14:14:12.458296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CEmnhq3vrUYHtm1jqh"]} -{"Format": "IDEA0", "ID": "002f5c0a-da02-4944-bf0e-d123932264f8", "DetectTime": "2023-10-30T14:14:12.477202+02:00", "EventTime": "2023-10-30T14:14:12.477217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CJbQGo3UVOC96DdXY3"]} -{"Format": "IDEA0", "ID": "34175871-7d5d-48a2-810b-9a3c5f40ebad", "DetectTime": "2023-10-30T14:14:12.495991+02:00", "EventTime": "2023-10-30T14:14:12.496005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CIzF2g4S8LLiZXzXZ"]} -{"Format": "IDEA0", "ID": "7f8f45b8-9e58-408e-a299-45fdec8f877c", "DetectTime": "2023-10-30T14:14:12.515691+02:00", "EventTime": "2023-10-30T14:14:12.515702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CaVrLoPNguJCwBkr4"]} -{"Format": "IDEA0", "ID": "0da64674-a31f-4aae-8958-74cb6d8468d7", "DetectTime": "2023-10-30T14:14:12.537582+02:00", "EventTime": "2023-10-30T14:14:12.537592+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjrOek3gKJHC222J"]} -{"Format": "IDEA0", "ID": "458e1742-0bfc-412c-8672-f5b7e5d9f5c6", "DetectTime": "2023-10-30T14:14:12.575534+02:00", "EventTime": "2023-10-30T14:14:12.575549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C94wwg15IJFKhF9S5i"]} -{"Format": "IDEA0", "ID": "1b9c5394-8be3-4d62-b795-7c99a5584944", "DetectTime": "2023-10-30T14:14:12.598562+02:00", "EventTime": "2023-10-30T14:14:12.598576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cpi3Jr1Nul5U8QZ4jf"]} -{"Format": "IDEA0", "ID": "e6461ab6-141c-4943-a612-ecfbca90ddc7", "DetectTime": "2023-10-30T14:14:12.634994+02:00", "EventTime": "2023-10-30T14:14:12.635006+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CIglVo2n9yDNkWlmej"]} -{"Format": "IDEA0", "ID": "834f4b37-7af7-4172-8003-3b0da30132d7", "DetectTime": "2023-10-30T14:14:12.671898+02:00", "EventTime": "2023-10-30T14:14:12.671908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CCjoiz3CRELs92BjV9"]} -{"Format": "IDEA0", "ID": "776c62fb-bfdb-46ae-b01b-b28e9f32edc7", "DetectTime": "2023-10-30T14:14:12.715731+02:00", "EventTime": "2023-10-30T14:14:12.715747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C6Out22YhaJ5dNH7b2"]} -{"Format": "IDEA0", "ID": "135f174a-72b6-4ebf-b4fd-06fe3d1f7257", "DetectTime": "2023-10-30T14:14:12.754981+02:00", "EventTime": "2023-10-30T14:14:12.754997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CnTS4f4fd1mOHQ1xN7"]} -{"Format": "IDEA0", "ID": "e638d5e6-70c5-4b62-9749-6b64af55f83d", "DetectTime": "2023-10-30T14:14:12.793674+02:00", "EventTime": "2023-10-30T14:14:12.793687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CpIZ141DtD3aRKSy02"]} -{"Format": "Json", "ID": "e638d5e6-70c5-4b62-9749-6b64af55f83d", "DetectTime": "2023-10-30T14:14:12.793674+02:00", "EventTime": "2023-10-30T14:14:12.793687+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:13:00.649106+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:12.885277)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e9867a21-25db-4df2-a271-856d9ff05fb9", "DetectTime": "2023-10-30T14:14:12.889940+02:00", "EventTime": "2023-10-30T14:14:12.889955+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CE7U7N2WAhx7Nm02Oc"]} -{"Format": "IDEA0", "ID": "a21db830-ba61-4c0a-a0f8-b5968dfc47ba", "DetectTime": "2023-10-30T14:14:12.910322+02:00", "EventTime": "2023-10-30T14:14:12.910332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CXWgSH3F5vndhKdzqf"]} -{"Format": "IDEA0", "ID": "5c501a03-cd03-4dac-a283-4286ebc5f732", "DetectTime": "2023-10-30T14:14:12.944572+02:00", "EventTime": "2023-10-30T14:14:12.944583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCrbMl1snd7vT33sf7"]} -{"Format": "IDEA0", "ID": "8258b48e-a436-4581-ab3f-05a96d80d0bd", "DetectTime": "2023-10-30T14:14:12.977932+02:00", "EventTime": "2023-10-30T14:14:12.977943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CUnLSJ2FcFU6knK8t2"]} -{"Format": "IDEA0", "ID": "4e797e9e-face-4d85-8beb-d943229ae775", "DetectTime": "2023-10-30T14:14:12.998320+02:00", "EventTime": "2023-10-30T14:14:12.998333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CX0MyD27uFandZDjqj"]} -{"Format": "IDEA0", "ID": "b7973433-51de-495d-a351-8f2bc1ff2100", "DetectTime": "2023-10-30T14:14:13.034801+02:00", "EventTime": "2023-10-30T14:14:13.034816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CVmdqLywB3k5hQPI4"]} -{"Format": "IDEA0", "ID": "e42130e1-bd24-4a65-b978-b0e9a2d709ad", "DetectTime": "2023-10-30T14:14:13.069946+02:00", "EventTime": "2023-10-30T14:14:13.069961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CJ6X082LtcC0YwXxza"]} -{"Format": "IDEA0", "ID": "bf92a895-b61b-4b51-825b-839e5317b841", "DetectTime": "2023-10-30T14:14:13.108103+02:00", "EventTime": "2023-10-30T14:14:13.108119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CxX4Fg1YasDJDMCEo2"]} -{"Format": "IDEA0", "ID": "c14289a6-c7e6-4723-8398-7f9275b13d9f", "DetectTime": "2023-10-30T14:14:13.144430+02:00", "EventTime": "2023-10-30T14:14:13.144439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CuMOPA3AsMXp0AvLq9"]} -{"Format": "IDEA0", "ID": "c8e50ce9-035c-4c2b-86dd-0f5e0227c58f", "DetectTime": "2023-10-30T14:14:13.181782+02:00", "EventTime": "2023-10-30T14:14:13.181796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CjddeO2wcIdlz8TQk6"]} -{"Format": "Json", "ID": "c8e50ce9-035c-4c2b-86dd-0f5e0227c58f", "DetectTime": "2023-10-30T14:14:13.181782+02:00", "EventTime": "2023-10-30T14:14:13.181796+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:13:02.177400+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:13.256644)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8e5eb103-be56-4c92-ae6b-bbfccef93fca", "DetectTime": "2023-10-30T14:14:13.260867+02:00", "EventTime": "2023-10-30T14:14:13.260879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CXoXOS3kD4KnIBrm8l"]} -{"Format": "IDEA0", "ID": "ae9601aa-2597-44ad-86d7-59230020478a", "DetectTime": "2023-10-30T14:14:13.293071+02:00", "EventTime": "2023-10-30T14:14:13.293082+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CIK3Od1pLuJiRPV6c"]} -{"Format": "IDEA0", "ID": "119403cf-48e4-4b83-90df-2ea501912806", "DetectTime": "2023-10-30T14:14:13.317563+02:00", "EventTime": "2023-10-30T14:14:13.317579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7EoRY3g72EjnDxSh7"]} -{"Format": "IDEA0", "ID": "1d245770-db38-4eb3-8858-68d6328ba90d", "DetectTime": "2023-10-30T14:14:13.353922+02:00", "EventTime": "2023-10-30T14:14:13.353935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cqq6VL1rt3Mq1SbDoh"]} -{"Format": "IDEA0", "ID": "8380bd40-721a-474b-af5b-5f5ffe3c7085", "DetectTime": "2023-10-30T14:14:13.388020+02:00", "EventTime": "2023-10-30T14:14:13.388031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0Ab2D3WlYdLgsTBgf"]} -{"Format": "IDEA0", "ID": "411d1963-6d32-4c68-b9e7-fd9cc1538e1a", "DetectTime": "2023-10-30T14:14:13.416178+02:00", "EventTime": "2023-10-30T14:14:13.416194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Co7tPq2nY3RPJqlCw1"]} -{"Format": "IDEA0", "ID": "b1bfb2f4-90aa-4e06-a0d2-b5f4edde3757", "DetectTime": "2023-10-30T14:14:13.449411+02:00", "EventTime": "2023-10-30T14:14:13.449427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5604], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. ", "ContentType": "text/plain"}], "uids": ["CQnAsj162GSZyRvRSe"]} -{"Format": "IDEA0", "ID": "5edce186-27d9-49b6-bc1e-4572fc6d561b", "DetectTime": "2023-10-30T14:14:13.495821+02:00", "EventTime": "2023-10-30T14:14:13.495834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CA6OEV5d4681m7Xa9"]} -{"Format": "IDEA0", "ID": "7418a16d-8532-4727-bad1-cd0f4a7bbf1b", "DetectTime": "2023-10-30T14:14:13.527231+02:00", "EventTime": "2023-10-30T14:14:13.527247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CHbvwD4sggdGhQCt55"]} -{"Format": "IDEA0", "ID": "f847648a-6d46-4a83-b392-f450646870d6", "DetectTime": "2023-10-30T14:14:13.548791+02:00", "EventTime": "2023-10-30T14:14:13.548802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CuuatH3ahNZ7qiUkqf"]} -{"Format": "Json", "ID": "f847648a-6d46-4a83-b392-f450646870d6", "DetectTime": "2023-10-30T14:14:13.548791+02:00", "EventTime": "2023-10-30T14:14:13.548802+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:13:04.154046+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:13.612275)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "89648cd3-1361-43ea-9a4d-2edb9691952e", "DetectTime": "2023-10-30T14:14:13.616077+02:00", "EventTime": "2023-10-30T14:14:13.616088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CwMEuS1gMO3nSjIObj"]} -{"Format": "IDEA0", "ID": "cfa5e94c-5703-4272-b7fd-0e795ba79fba", "DetectTime": "2023-10-30T14:14:13.652304+02:00", "EventTime": "2023-10-30T14:14:13.652316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["Cr8GrRrM7iXSZK5H2"]} -{"Format": "IDEA0", "ID": "37242dec-9a4a-499e-a2ea-5f0621dc1e0a", "DetectTime": "2023-10-30T14:14:13.674406+02:00", "EventTime": "2023-10-30T14:14:13.674423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CFuQCV12Nmy4vw8j7i"]} -{"Format": "IDEA0", "ID": "3031dbe3-6e55-4ddc-82fe-6101e8115d68", "DetectTime": "2023-10-30T14:14:13.701514+02:00", "EventTime": "2023-10-30T14:14:13.701528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CVXV6I1F5YmZuWvcXi"]} -{"Format": "IDEA0", "ID": "2a6cf8af-2077-4985-8ee3-e8395728c6d2", "DetectTime": "2023-10-30T14:14:13.727346+02:00", "EventTime": "2023-10-30T14:14:13.727355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["Cwbxm228ju6YmUVWF5"]} -{"Format": "IDEA0", "ID": "3fa53c62-d7dd-441e-8a3b-19cc8a6a238a", "DetectTime": "2023-10-30T14:14:13.755999+02:00", "EventTime": "2023-10-30T14:14:13.756014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C7Z10U3QXTn6YOmeWf"]} -{"Format": "IDEA0", "ID": "e67dcef7-54bd-4d30-9a19-333d0943c693", "DetectTime": "2023-10-30T14:14:13.785381+02:00", "EventTime": "2023-10-30T14:14:13.785394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C6y00c1gYXOVI8Z2P8"]} -{"Format": "IDEA0", "ID": "454f6957-0414-49fc-a868-7889f9dd49b1", "DetectTime": "2023-10-30T14:14:13.811276+02:00", "EventTime": "2023-10-30T14:14:13.811286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ChPmSUdDxc5y96pq3"]} -{"Format": "IDEA0", "ID": "ebdfd37e-ab30-4045-ab25-17dc218ea69e", "DetectTime": "2023-10-30T14:14:13.829824+02:00", "EventTime": "2023-10-30T14:14:13.829835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cr8YtftZxPWTbm2k"]} -{"Format": "IDEA0", "ID": "e5289526-0aed-49b4-ad2f-d51ceab154c5", "DetectTime": "2023-10-30T14:14:13.860076+02:00", "EventTime": "2023-10-30T14:14:13.860086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["C9R0notIbGGLlf5C5"]} -{"Format": "Json", "ID": "e5289526-0aed-49b4-ad2f-d51ceab154c5", "DetectTime": "2023-10-30T14:14:13.860076+02:00", "EventTime": "2023-10-30T14:14:13.860086+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:13:05.597988+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:13.924729)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f74faf6c-c191-413d-bc09-fba29cfae97a", "DetectTime": "2023-10-30T14:14:13.929283+02:00", "EventTime": "2023-10-30T14:14:13.929301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CoB9qv35lWRPi74ALi"]} -{"Format": "IDEA0", "ID": "78fbd0b6-f8e8-45ba-b380-95db93dab321", "DetectTime": "2023-10-30T14:14:13.964152+02:00", "EventTime": "2023-10-30T14:14:13.964167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CEpzIz2vJONxlCj1W6"]} -{"Format": "IDEA0", "ID": "627b0ab2-578a-4d31-924d-35fffcfbe857", "DetectTime": "2023-10-30T14:14:13.989214+02:00", "EventTime": "2023-10-30T14:14:13.989228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CEa8j33M9uGIlWMOP4"]} -{"Format": "IDEA0", "ID": "15e43fb8-1f83-4b40-9bd1-f921220050c1", "DetectTime": "2023-10-30T14:14:14.012068+02:00", "EventTime": "2023-10-30T14:14:14.012079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["ClwgBV1bVkzni3nIec"]} -{"Format": "IDEA0", "ID": "bf1176f5-ef09-4161-8e06-51b2f57e0e57", "DetectTime": "2023-10-30T14:14:14.034689+02:00", "EventTime": "2023-10-30T14:14:14.034699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CzYSsb2KXioGyvCyS6"]} -{"Format": "IDEA0", "ID": "c4d72ea7-1d8d-44f9-b04d-0eb65e82177d", "DetectTime": "2023-10-30T14:14:14.058513+02:00", "EventTime": "2023-10-30T14:14:14.058525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEqMha4Qk6nyL0MSWf"]} -{"Format": "IDEA0", "ID": "b99357a0-8ac7-4e75-be6a-f7653e21df4e", "DetectTime": "2023-10-30T14:14:14.075661+02:00", "EventTime": "2023-10-30T14:14:14.075671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["C3EjYD1HFm1N8tKWY6"]} -{"Format": "IDEA0", "ID": "5ce01d80-e4ce-40b0-bb71-04ac011efa15", "DetectTime": "2023-10-30T14:14:14.098865+02:00", "EventTime": "2023-10-30T14:14:14.098877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CiRav41uvMqFYJyal"]} -{"Format": "IDEA0", "ID": "c44cbaf0-35ce-453d-afde-d99c4ffdf005", "DetectTime": "2023-10-30T14:14:14.124467+02:00", "EventTime": "2023-10-30T14:14:14.124477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CzBYaH3RRW8UrEhoVh"]} -{"Format": "IDEA0", "ID": "d597a6ff-b984-4bec-9e8c-d5dfd182be88", "DetectTime": "2023-10-30T14:14:14.156519+02:00", "EventTime": "2023-10-30T14:14:14.156536+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CauWjEcEZxR9o2ZVh"]} -{"Format": "IDEA0", "ID": "cfb4e649-2f43-491f-a988-c3af49c7985c", "DetectTime": "2023-10-30T14:14:14.177754+02:00", "EventTime": "2023-10-30T14:14:14.177771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["C9Sg0J4Npl0f3EHPj"]} -{"Format": "IDEA0", "ID": "fc9bf6d6-5bc1-4372-a154-8a47edea9db4", "DetectTime": "2023-10-30T14:14:14.198374+02:00", "EventTime": "2023-10-30T14:14:14.198387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CbpcAk3eNT62kfaRc6"]} -{"Format": "Json", "ID": "fc9bf6d6-5bc1-4372-a154-8a47edea9db4", "DetectTime": "2023-10-30T14:14:14.198374+02:00", "EventTime": "2023-10-30T14:14:14.198387+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-10T04:36:00.744267+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:14.260360)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "11dfb494-877c-4ff6-acab-07e2c2ae3279", "DetectTime": "2023-10-30T14:14:14.265683+02:00", "EventTime": "2023-10-30T14:14:14.265699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CMLktr4ASTRfdSECM6"]} -{"Format": "IDEA0", "ID": "2a2c61b6-db23-4ff5-a17b-2bb4a68aa205", "DetectTime": "2023-10-30T14:14:14.288982+02:00", "EventTime": "2023-10-30T14:14:14.288993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C7jJ1A2o8v1b5gPl1k"]} -{"Format": "IDEA0", "ID": "5f032624-2cc0-4f8a-9ea5-6685c48311c1", "DetectTime": "2023-10-30T14:14:14.316366+02:00", "EventTime": "2023-10-30T14:14:14.316380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C1YkNB4bqyEd5FrpUh"]} -{"Format": "IDEA0", "ID": "98646527-9875-44a1-b649-bbfdf0501a1d", "DetectTime": "2023-10-30T14:14:14.339348+02:00", "EventTime": "2023-10-30T14:14:14.339363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CD213p3M2KI2kD04l5"]} -{"Format": "IDEA0", "ID": "197e13af-7762-440f-8e1b-142c636ed70e", "DetectTime": "2023-10-30T14:14:14.367474+02:00", "EventTime": "2023-10-30T14:14:14.367486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CpxjxU3106fwIdWE1l"]} -{"Format": "IDEA0", "ID": "c9a9d1d2-f05c-4949-8bf2-93a6f874ee5b", "DetectTime": "2023-10-30T14:14:14.390760+02:00", "EventTime": "2023-10-30T14:14:14.390774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CvggpE2pUjufXudVN9"]} -{"Format": "IDEA0", "ID": "28eb89d9-cdeb-41c2-bb1c-725b437e1229", "DetectTime": "2023-10-30T14:14:14.419183+02:00", "EventTime": "2023-10-30T14:14:14.419198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CZcD9IXyIthI24SQi"]} -{"Format": "IDEA0", "ID": "16f77a1d-687c-4ab8-9d15-3c622e63ffb7", "DetectTime": "2023-10-30T14:14:14.449613+02:00", "EventTime": "2023-10-30T14:14:14.449627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CMcImU9d5lQL2sNki"]} -{"Format": "IDEA0", "ID": "13ef5303-b787-49b9-83cb-881fc69f936f", "DetectTime": "2023-10-30T14:14:14.473549+02:00", "EventTime": "2023-10-30T14:14:14.473563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C1Y4Oa1dASdOd7JpOa"]} -{"Format": "IDEA0", "ID": "b6c84d36-c01e-4dc3-9cc0-a8ac4010fdc1", "DetectTime": "2023-10-30T14:14:14.500408+02:00", "EventTime": "2023-10-30T14:14:14.500418+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CNfCh4n4nzjsdnoOe"]} -{"Format": "IDEA0", "ID": "1a1b4a26-6dac-4a40-b86a-5ddb932c4e78", "DetectTime": "2023-10-30T14:14:14.523767+02:00", "EventTime": "2023-10-30T14:14:14.523778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cz7XNi3SIsXYQFyhJa"]} -{"Format": "Json", "ID": "1a1b4a26-6dac-4a40-b86a-5ddb932c4e78", "DetectTime": "2023-10-30T14:14:14.523767+02:00", "EventTime": "2023-10-30T14:14:14.523778+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:44:13.095424+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:14.576709)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "532035b0-0eee-4fd1-98c2-dcf6d33d4f17", "DetectTime": "2023-10-30T14:14:14.580752+02:00", "EventTime": "2023-10-30T14:14:14.580767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CfdLPU1TXcUC4iNAWj"]} -{"Format": "IDEA0", "ID": "c50d67fd-f66a-4fed-87c5-82e7d0a1b914", "DetectTime": "2023-10-30T14:14:14.599164+02:00", "EventTime": "2023-10-30T14:14:14.599175+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CrOQ583EyjWScBWpJ1"]} -{"Format": "IDEA0", "ID": "e7544a90-24ee-4d92-a163-5363082ddd48", "DetectTime": "2023-10-30T14:14:14.621882+02:00", "EventTime": "2023-10-30T14:14:14.621896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CtbZDE455X4gvXrTg"]} -{"Format": "IDEA0", "ID": "99252c2b-03b3-4f26-8720-cb3a498ae9f9", "DetectTime": "2023-10-30T14:14:14.642634+02:00", "EventTime": "2023-10-30T14:14:14.642644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cc38LP6uRubfVZLM2"]} -{"Format": "IDEA0", "ID": "9cf2648b-a1cc-40c8-871f-3a64ee5eb126", "DetectTime": "2023-10-30T14:14:14.664617+02:00", "EventTime": "2023-10-30T14:14:14.664627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CiNxjR1k6p4ANFkrIf"]} -{"Format": "IDEA0", "ID": "6340d01d-80ee-496d-892c-dbf15710c594", "DetectTime": "2023-10-30T14:14:14.686181+02:00", "EventTime": "2023-10-30T14:14:14.686195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CR9dq7dwyPT0JElf8"]} -{"Format": "IDEA0", "ID": "158c130a-6129-4210-ba39-23a3d5762ad2", "DetectTime": "2023-10-30T14:14:14.708470+02:00", "EventTime": "2023-10-30T14:14:14.708485+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cn3JHAwexUg5nzMre"]} -{"Format": "IDEA0", "ID": "0bbfd1be-6dec-4fe5-a9dc-910dc51b064c", "DetectTime": "2023-10-30T14:14:14.736166+02:00", "EventTime": "2023-10-30T14:14:14.736180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CFnkIWuFb9TX4Fyw9"]} -{"Format": "IDEA0", "ID": "bbc7b53d-11d8-4f5f-ba2b-8340300b9471", "DetectTime": "2023-10-30T14:14:14.765070+02:00", "EventTime": "2023-10-30T14:14:14.765087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CApfmx3ezZxTj93a5c"]} -{"Format": "IDEA0", "ID": "2e205948-8f80-49f6-87b6-fced00f19f1d", "DetectTime": "2023-10-30T14:14:14.787080+02:00", "EventTime": "2023-10-30T14:14:14.787095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CogZXX3usEQT5860J4"]} -{"Format": "Json", "ID": "2e205948-8f80-49f6-87b6-fced00f19f1d", "DetectTime": "2023-10-30T14:14:14.787080+02:00", "EventTime": "2023-10-30T14:14:14.787095+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:44:14.730686+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:14.846458)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "881a973f-60cb-4212-9db4-6c8b01a1f3ad", "DetectTime": "2023-10-30T14:14:14.851589+02:00", "EventTime": "2023-10-30T14:14:14.851604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CKb0W448s1QFiYmekb"]} -{"Format": "IDEA0", "ID": "1842d8e6-f943-4845-a843-6ada304a125f", "DetectTime": "2023-10-30T14:14:14.874424+02:00", "EventTime": "2023-10-30T14:14:14.874440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C32OB61uw32fIaPn76"]} -{"Format": "IDEA0", "ID": "8254e6e5-3242-444a-bc30-ec2bc61ea43d", "DetectTime": "2023-10-30T14:14:14.898033+02:00", "EventTime": "2023-10-30T14:14:14.898049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CPGGdw4h79JzBOUdZ9"]} -{"Format": "IDEA0", "ID": "0e3fac05-5f01-4d39-a286-34ef29f0fefc", "DetectTime": "2023-10-30T14:14:14.919696+02:00", "EventTime": "2023-10-30T14:14:14.919710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CbsSr11I5XE3NamUSc"]} -{"Format": "IDEA0", "ID": "5618bc42-d367-4c44-a806-52473b93d16f", "DetectTime": "2023-10-30T14:14:14.942329+02:00", "EventTime": "2023-10-30T14:14:14.942338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CfjWOL3gtC0KA29hUf"]} -{"Format": "IDEA0", "ID": "a29bc294-5aaa-4eff-8996-5d3dd0361006", "DetectTime": "2023-10-30T14:14:14.963126+02:00", "EventTime": "2023-10-30T14:14:14.963142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C0sIs01trFcYKDO0t"]} -{"Format": "IDEA0", "ID": "e609285a-68bf-48ab-842f-57de35c12a87", "DetectTime": "2023-10-30T14:14:14.984391+02:00", "EventTime": "2023-10-30T14:14:14.984401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C2whuj2nczMk6Xj9S9"]} -{"Format": "IDEA0", "ID": "4811141c-c3ba-4829-bb92-9a0612f886f8", "DetectTime": "2023-10-30T14:14:15.000404+02:00", "EventTime": "2023-10-30T14:14:15.000415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CvObXC2UO8rkQOwkQ1"]} -{"Format": "IDEA0", "ID": "953532c5-6632-408f-8861-81be7c9b20b5", "DetectTime": "2023-10-30T14:14:15.017684+02:00", "EventTime": "2023-10-30T14:14:15.017697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["COKHoqviiyW8KuEK5"]} -{"Format": "IDEA0", "ID": "34c6799a-b5ea-4664-9442-cc77f4d11c2e", "DetectTime": "2023-10-30T14:14:15.034553+02:00", "EventTime": "2023-10-30T14:14:15.034563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CPDwud3obbUn9ORrZi"]} -{"Format": "IDEA0", "ID": "bf4ad8fe-c5fc-48a6-a622-1723c7603fde", "DetectTime": "2023-10-30T14:14:15.056244+02:00", "EventTime": "2023-10-30T14:14:15.056268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CTfDX32hOndqEaghP7"]} -{"Format": "IDEA0", "ID": "b1451b53-ce06-43e6-a7cf-b23bcc0053ff", "DetectTime": "2023-10-30T14:14:15.080571+02:00", "EventTime": "2023-10-30T14:14:15.080586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Crbwzc4GU5p2U7Nvc5"]} -{"Format": "IDEA0", "ID": "748a68bd-0bfa-4a98-b559-4cd6055126dc", "DetectTime": "2023-10-30T14:14:15.102265+02:00", "EventTime": "2023-10-30T14:14:15.102280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C30SGx1phJ91480yec"]} -{"Format": "IDEA0", "ID": "500345a8-36c6-440a-90dd-752785b0bcaa", "DetectTime": "2023-10-30T14:14:15.122053+02:00", "EventTime": "2023-10-30T14:14:15.122064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C9TklS2LSLB33Lfyie"]} -{"Format": "Json", "ID": "500345a8-36c6-440a-90dd-752785b0bcaa", "DetectTime": "2023-10-30T14:14:15.122053+02:00", "EventTime": "2023-10-30T14:14:15.122064+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:44:34.397591+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:15.188954)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "00247465-56a7-49a9-89da-40fbacec714e", "DetectTime": "2023-10-30T14:14:15.192768+02:00", "EventTime": "2023-10-30T14:14:15.192782+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C3xhXO1zHsIDl6OA69"]} -{"Format": "IDEA0", "ID": "5b7782fe-0c95-4ff1-bd9d-5f052f1c0cfc", "DetectTime": "2023-10-30T14:14:15.215201+02:00", "EventTime": "2023-10-30T14:14:15.215215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cg5ENR2zrKFjTic64i"]} -{"Format": "IDEA0", "ID": "fbff4b78-44d1-4d8d-af1e-f8d5442ebe01", "DetectTime": "2023-10-30T14:14:15.238992+02:00", "EventTime": "2023-10-30T14:14:15.239007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CuyMhC2uU9XfqsKPK3"]} -{"Format": "IDEA0", "ID": "0c3f15a6-a679-4525-acbb-58887b0cee23", "DetectTime": "2023-10-30T14:14:15.256201+02:00", "EventTime": "2023-10-30T14:14:15.256219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CTgZzn23Ag7WDi6LX9"]} -{"Format": "IDEA0", "ID": "e32c7453-1bea-4a83-8570-1d714cb2e3e3", "DetectTime": "2023-10-30T14:14:15.275106+02:00", "EventTime": "2023-10-30T14:14:15.275121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["ClkT7e3uCT25m1OYrb"]} -{"Format": "IDEA0", "ID": "8e4cbf2c-14aa-4e6b-b5d4-0fe0b7d7da5d", "DetectTime": "2023-10-30T14:14:15.294019+02:00", "EventTime": "2023-10-30T14:14:15.294032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["C77z1s1riQ96784H0h"]} -{"Format": "IDEA0", "ID": "a26b6882-6f07-4a89-9755-926127d0472c", "DetectTime": "2023-10-30T14:14:15.314029+02:00", "EventTime": "2023-10-30T14:14:15.314041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cbb5pE2Nu5cjAJmva1"]} -{"Format": "IDEA0", "ID": "fbdd3036-27ea-40f9-8373-3f6e6b15096f", "DetectTime": "2023-10-30T14:14:15.332919+02:00", "EventTime": "2023-10-30T14:14:15.332929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cha9y12HXfvEZrLmd"]} -{"Format": "IDEA0", "ID": "0964613c-5ce8-43a9-93f9-878e0ca099c8", "DetectTime": "2023-10-30T14:14:15.351677+02:00", "EventTime": "2023-10-30T14:14:15.351690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CPvqcQtKL51hb4Pkg"]} -{"Format": "IDEA0", "ID": "b6e410d7-b039-4ebc-8e6a-3e68e648ef78", "DetectTime": "2023-10-30T14:14:15.367988+02:00", "EventTime": "2023-10-30T14:14:15.367998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CHSrrP172SK1Iz5Bp8"]} -{"Format": "Json", "ID": "b6e410d7-b039-4ebc-8e6a-3e68e648ef78", "DetectTime": "2023-10-30T14:14:15.367988+02:00", "EventTime": "2023-10-30T14:14:15.367998+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T04:44:35.651512+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 219. (real time 2023/10/30 14:14:15.424819)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "47e9ba73-983d-479e-b41d-ee1823cbb73a", "DetectTime": "2023-10-30T14:14:15.429200+02:00", "EventTime": "2023-10-30T14:14:15.429210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CVXdLn3yvXbdznugtf"]} -{"Format": "IDEA0", "ID": "bd737585-f2d3-47c3-a1bb-f1ac1da46a30", "DetectTime": "2023-10-30T14:14:15.444131+02:00", "EventTime": "2023-10-30T14:14:15.444146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CZrkDX1pbQBfQaqMgk"]} -{"Format": "IDEA0", "ID": "1c6b0224-0b0f-4c39-b010-2784eed67853", "DetectTime": "2023-10-30T14:14:15.463240+02:00", "EventTime": "2023-10-30T14:14:15.463254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CHS1j9RyspDz4Dvd2"]} -{"Format": "IDEA0", "ID": "b5a3f73c-4f58-4448-86f4-aab67abf79ec", "DetectTime": "2023-10-30T14:14:15.480061+02:00", "EventTime": "2023-10-30T14:14:15.480070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["C2zRFVzI26KVVqbQi"]} -{"Format": "IDEA0", "ID": "3e9329de-e293-44dd-b720-1f5873253ae7", "DetectTime": "2023-10-30T14:14:15.495392+02:00", "EventTime": "2023-10-30T14:14:15.495405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CPbcghwO2KdTlrfV7"]} -{"Format": "IDEA0", "ID": "5121b5d1-6e75-4ee2-ad75-49916b87e464", "DetectTime": "2023-10-30T14:14:15.513853+02:00", "EventTime": "2023-10-30T14:14:15.513863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5XVpt2RVU7UQpUHqk"]} -{"Format": "IDEA0", "ID": "833827d9-51f3-40e0-bef4-51aa68b0880c", "DetectTime": "2023-10-30T14:14:15.544281+02:00", "EventTime": "2023-10-30T14:14:15.544297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CgLC0sz0KZ29de8ug"]} -{"Format": "IDEA0", "ID": "3b6e4a26-7997-45e2-9d7c-23556334ca9d", "DetectTime": "2023-10-30T14:14:15.582321+02:00", "EventTime": "2023-10-30T14:14:15.582335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CkMYYc3wrqTWHAYKT3"]} -{"Format": "IDEA0", "ID": "4d7a6b51-e4ed-44e4-aafb-755df6bc265a", "DetectTime": "2023-10-30T14:14:15.617723+02:00", "EventTime": "2023-10-30T14:14:15.617734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CsCMO12VNmaSGjogn6"]} -{"Format": "IDEA0", "ID": "31f29936-c9cd-4939-ac01-0aac44dee5d3", "DetectTime": "2023-10-30T14:14:15.649351+02:00", "EventTime": "2023-10-30T14:14:15.649366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["ChIQbB3swGZjkfKjFj"]} -{"Format": "IDEA0", "ID": "82cfb15e-19ae-43ef-9054-4e5260644f4f", "DetectTime": "2023-10-30T14:14:15.687266+02:00", "EventTime": "2023-10-30T14:14:15.687276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CZcxP93z7fD5NidNU"]} -{"Format": "IDEA0", "ID": "9a7aefe2-2d83-4606-b318-07ccf9c847c5", "DetectTime": "2023-10-30T14:14:15.717771+02:00", "EventTime": "2023-10-30T14:14:15.717786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CJ6BkG2zR0pQyKoahi"]} -{"Format": "Json", "ID": "9a7aefe2-2d83-4606-b318-07ccf9c847c5", "DetectTime": "2023-10-30T14:14:15.717771+02:00", "EventTime": "2023-10-30T14:14:15.717786+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:15:10.063915+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:15.795488)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fe574de4-9e02-4bb5-9b38-1a1a1627e4ff", "DetectTime": "2023-10-30T14:14:15.799866+02:00", "EventTime": "2023-10-30T14:14:15.799876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C1pUfoEsTIf1sG4ya"]} -{"Format": "IDEA0", "ID": "3f563f76-3398-43e5-8f3b-9c2cdf013fbf", "DetectTime": "2023-10-30T14:14:15.827700+02:00", "EventTime": "2023-10-30T14:14:15.827709+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CTtW3R1SNHT7QPPLj7"]} -{"Format": "IDEA0", "ID": "71a6508a-9dbe-4160-a20d-24f7866ec9c9", "DetectTime": "2023-10-30T14:14:15.853119+02:00", "EventTime": "2023-10-30T14:14:15.853130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CUpfWf2jqIEHaTP0l2"]} -{"Format": "IDEA0", "ID": "d5fe1b7a-5029-4771-87dd-e68d90700ee1", "DetectTime": "2023-10-30T14:14:15.873624+02:00", "EventTime": "2023-10-30T14:14:15.873635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C1fBxT2xIKL8HUA10i"]} -{"Format": "IDEA0", "ID": "4c78fdc3-ec4b-46c0-b7b5-b269a876bc88", "DetectTime": "2023-10-30T14:14:15.902670+02:00", "EventTime": "2023-10-30T14:14:15.902687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CtfQot2vwBEMfYrLBk"]} -{"Format": "IDEA0", "ID": "f2722cad-c0dc-4204-93ba-cea7b1756c8d", "DetectTime": "2023-10-30T14:14:15.933149+02:00", "EventTime": "2023-10-30T14:14:15.933160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CDPqWnOWYanCoZ782"]} -{"Format": "IDEA0", "ID": "f3867222-1906-428e-882b-8f63d6748512", "DetectTime": "2023-10-30T14:14:15.961354+02:00", "EventTime": "2023-10-30T14:14:15.961369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C2wMVe4p3vRtRDbc6h"]} -{"Format": "IDEA0", "ID": "b820a438-0291-4125-9671-66a15858736a", "DetectTime": "2023-10-30T14:14:15.992168+02:00", "EventTime": "2023-10-30T14:14:15.992178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CKrZoHnGsDBSSvjve"]} -{"Format": "IDEA0", "ID": "13dd9a64-8d45-4059-9ecb-3a43ad84775e", "DetectTime": "2023-10-30T14:14:16.019709+02:00", "EventTime": "2023-10-30T14:14:16.019719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C04aFux4NqploPtl"]} -{"Format": "Json", "ID": "13dd9a64-8d45-4059-9ecb-3a43ad84775e", "DetectTime": "2023-10-30T14:14:16.019709+02:00", "EventTime": "2023-10-30T14:14:16.019719+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:15:11.429562+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:16.084557)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8709b34-69dc-42da-9b06-b9d4229649b9", "DetectTime": "2023-10-30T14:14:16.088314+02:00", "EventTime": "2023-10-30T14:14:16.088325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CcYZSo3n2cMJxkoJL"]} -{"Format": "IDEA0", "ID": "3723f740-bb91-4915-9b9f-6853793430bd", "DetectTime": "2023-10-30T14:14:16.114986+02:00", "EventTime": "2023-10-30T14:14:16.115008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CbozQw14xicU6DgC26"]} -{"Format": "IDEA0", "ID": "952aec86-0640-4d0a-90dc-32c9b9e9a8cb", "DetectTime": "2023-10-30T14:14:16.142017+02:00", "EventTime": "2023-10-30T14:14:16.142028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CyEhGC38AkByFXJa3i"]} -{"Format": "IDEA0", "ID": "9b8a6001-f11e-4483-b81e-48e45f95947f", "DetectTime": "2023-10-30T14:14:16.170160+02:00", "EventTime": "2023-10-30T14:14:16.170173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CYj05C41BO9SdcD6F3"]} -{"Format": "IDEA0", "ID": "e0407ee3-a16c-4e3f-9d73-eb3588ac19f6", "DetectTime": "2023-10-30T14:14:16.197400+02:00", "EventTime": "2023-10-30T14:14:16.197410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CDCwtV2dGu4sjFLFC3"]} -{"Format": "IDEA0", "ID": "b56ae1a7-3632-4b53-bc80-3c23c2521003", "DetectTime": "2023-10-30T14:14:16.214885+02:00", "EventTime": "2023-10-30T14:14:16.214897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cys5jZ3Et5aiRBlc0e"]} -{"Format": "IDEA0", "ID": "c063f506-c537-4ed1-aedb-aa259ff924d4", "DetectTime": "2023-10-30T14:14:16.247527+02:00", "EventTime": "2023-10-30T14:14:16.247544+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C9I5Hj3LStvDe3JZsk"]} -{"Format": "IDEA0", "ID": "8cee0118-9fd4-497d-80ff-47efb754170c", "DetectTime": "2023-10-30T14:14:16.276090+02:00", "EventTime": "2023-10-30T14:14:16.276100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CMOaBK3JGLeYcg1t2h"]} -{"Format": "IDEA0", "ID": "974f27f3-4632-4541-a1f2-36c0793ed440", "DetectTime": "2023-10-30T14:14:16.303614+02:00", "EventTime": "2023-10-30T14:14:16.303631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CQTFB5l9RhIQVyqd7"]} -{"Format": "Json", "ID": "974f27f3-4632-4541-a1f2-36c0793ed440", "DetectTime": "2023-10-30T14:14:16.303614+02:00", "EventTime": "2023-10-30T14:14:16.303631+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:15:12.581462+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:16.418711)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "71cfc911-3a9e-43a2-a55e-98b3bdcbeb15", "DetectTime": "2023-10-30T14:14:16.424177+02:00", "EventTime": "2023-10-30T14:14:16.424196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CMhLAu3T957e5Pffyi"]} -{"Format": "IDEA0", "ID": "25797613-8afd-40dd-bbc5-074feabe7b3c", "DetectTime": "2023-10-30T14:14:16.449836+02:00", "EventTime": "2023-10-30T14:14:16.449847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CGEHEj1e6o38WPGnDl"]} -{"Format": "IDEA0", "ID": "bdc7e5b8-39c4-46b7-a042-eef61357b143", "DetectTime": "2023-10-30T14:14:16.473777+02:00", "EventTime": "2023-10-30T14:14:16.473789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CYw7k7usQfukhQIc"]} -{"Format": "IDEA0", "ID": "4c12ae7d-99be-4718-aaeb-e507ab3b3d59", "DetectTime": "2023-10-30T14:14:16.499250+02:00", "EventTime": "2023-10-30T14:14:16.499265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CBhCEBb3kUkyCWIqg"]} -{"Format": "IDEA0", "ID": "a97970e9-ee49-4d3b-9525-63abc2f3c259", "DetectTime": "2023-10-30T14:14:16.525142+02:00", "EventTime": "2023-10-30T14:14:16.525156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CT4gHM18dBRhePiLci"]} -{"Format": "IDEA0", "ID": "826918e8-4122-4135-8cea-01127d1c27a8", "DetectTime": "2023-10-30T14:14:16.550631+02:00", "EventTime": "2023-10-30T14:14:16.550643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CLr6wk1Z2B75mAvrjb"]} -{"Format": "IDEA0", "ID": "198802a6-14f8-404d-807f-df59c0ae7a9a", "DetectTime": "2023-10-30T14:14:16.572094+02:00", "EventTime": "2023-10-30T14:14:16.572104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CnLTSpVUcSqztZWRf"]} -{"Format": "IDEA0", "ID": "51034238-7f5d-4902-8dd8-3e8fdb34e5ac", "DetectTime": "2023-10-30T14:14:16.599599+02:00", "EventTime": "2023-10-30T14:14:16.599613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C1TVPAfrebsqbWESd"]} -{"Format": "IDEA0", "ID": "2abf2604-b7c9-43b4-bc66-08d48db546c1", "DetectTime": "2023-10-30T14:14:16.620542+02:00", "EventTime": "2023-10-30T14:14:16.620556+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CVM97g4aNBSbkoN0B5"]} -{"Format": "Json", "ID": "2abf2604-b7c9-43b4-bc66-08d48db546c1", "DetectTime": "2023-10-30T14:14:16.620542+02:00", "EventTime": "2023-10-30T14:14:16.620556+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:15:31.515199+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:16.682488)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa0965bb-969f-4ed3-b70f-de479fd69fc5", "DetectTime": "2023-10-30T14:14:16.686711+02:00", "EventTime": "2023-10-30T14:14:16.686727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CPI7lD3tmEzI6hMc2d"]} -{"Format": "IDEA0", "ID": "bdc29032-5ec9-4ca9-a818-cd502f3df116", "DetectTime": "2023-10-30T14:14:16.708784+02:00", "EventTime": "2023-10-30T14:14:16.708796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CWw2eG4k6QZd4QFjVe"]} -{"Format": "IDEA0", "ID": "420b90e4-3fdc-492e-a209-f9697d8b3e72", "DetectTime": "2023-10-30T14:14:16.731566+02:00", "EventTime": "2023-10-30T14:14:16.731576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CSf4KX1ANXr4SDCMq4"]} -{"Format": "IDEA0", "ID": "991ae2f8-6bf1-484d-8255-a521cf0413b0", "DetectTime": "2023-10-30T14:14:16.755527+02:00", "EventTime": "2023-10-30T14:14:16.755538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CIgDEE1YkQGsA6co41"]} -{"Format": "IDEA0", "ID": "1b0e782f-b79b-4dfb-8f6f-5c6aebe08ae0", "DetectTime": "2023-10-30T14:14:16.779304+02:00", "EventTime": "2023-10-30T14:14:16.779314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CPy3hrtgnqrejnbHf"]} -{"Format": "IDEA0", "ID": "67a43f4f-96bc-40f7-bb7f-5a5bf95ebc76", "DetectTime": "2023-10-30T14:14:16.807541+02:00", "EventTime": "2023-10-30T14:14:16.807550+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXpYhVtSSWSZY24ga"]} -{"Format": "IDEA0", "ID": "a22caad6-a07a-4d67-98ff-8ba82b3d595b", "DetectTime": "2023-10-30T14:14:16.829591+02:00", "EventTime": "2023-10-30T14:14:16.829602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CIVyMJ3NDSeMJFLkFj"]} -{"Format": "IDEA0", "ID": "bf5d4dca-90cf-4625-899d-2c7b16d46890", "DetectTime": "2023-10-30T14:14:16.851496+02:00", "EventTime": "2023-10-30T14:14:16.851507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CYeE071L4UI6iDBdk6"]} -{"Format": "Json", "ID": "bf5d4dca-90cf-4625-899d-2c7b16d46890", "DetectTime": "2023-10-30T14:14:16.851496+02:00", "EventTime": "2023-10-30T14:14:16.851507+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:45:46.036202+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:16.905302)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "54905847-d2a4-4b33-b98a-18c7add9385c", "DetectTime": "2023-10-30T14:14:16.910527+02:00", "EventTime": "2023-10-30T14:14:16.910542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cq0trr3I3wpm1Zjldg"]} -{"Format": "IDEA0", "ID": "28a34704-56ac-4410-bdf2-79254a29cc80", "DetectTime": "2023-10-30T14:14:16.932632+02:00", "EventTime": "2023-10-30T14:14:16.932641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C0eqET223Yxqmr3Vj4"]} -{"Format": "IDEA0", "ID": "083256ef-1957-412d-a822-09fe65bc2bac", "DetectTime": "2023-10-30T14:14:16.953283+02:00", "EventTime": "2023-10-30T14:14:16.953297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CnWSoK3Bx1yq30XLG9"]} -{"Format": "IDEA0", "ID": "fa335d1b-2c54-48be-9dbb-0d061ce3d85f", "DetectTime": "2023-10-30T14:14:16.980013+02:00", "EventTime": "2023-10-30T14:14:16.980028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cghxbw3quFfsZYGJV1"]} -{"Format": "IDEA0", "ID": "958e60e1-e7ca-47d6-8468-b36d158bb312", "DetectTime": "2023-10-30T14:14:17.009034+02:00", "EventTime": "2023-10-30T14:14:17.009050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cfqgc51KKGCknYqCy2"]} -{"Format": "IDEA0", "ID": "d16aa824-8056-48ca-9933-c92e7955a693", "DetectTime": "2023-10-30T14:14:17.036498+02:00", "EventTime": "2023-10-30T14:14:17.036513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CXlOAw17KDq92vkURl"]} -{"Format": "IDEA0", "ID": "ba9a6f25-9cd5-4d53-ab50-1ac861d62ded", "DetectTime": "2023-10-30T14:14:17.063602+02:00", "EventTime": "2023-10-30T14:14:17.063616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CeVa0N1d9fQ5vKAY6a"]} -{"Format": "IDEA0", "ID": "cb1b1103-3ffd-4313-84cf-f17f856dabe7", "DetectTime": "2023-10-30T14:14:17.092114+02:00", "EventTime": "2023-10-30T14:14:17.092127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CY6OFx16ZQDAEcTCT1"]} -{"Format": "IDEA0", "ID": "43258f82-4c62-423c-bf90-447c10a1717a", "DetectTime": "2023-10-30T14:14:17.119965+02:00", "EventTime": "2023-10-30T14:14:17.119979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CKkAtI29N1ykqrXW05"]} -{"Format": "Json", "ID": "43258f82-4c62-423c-bf90-447c10a1717a", "DetectTime": "2023-10-30T14:14:17.119965+02:00", "EventTime": "2023-10-30T14:14:17.119979+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:45:47.023223+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:17.191007)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b1fd50fc-100e-46ef-9ef5-b2d0fc501de5", "DetectTime": "2023-10-30T14:14:17.195932+02:00", "EventTime": "2023-10-30T14:14:17.195942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C32SXI3RXYMnCOeg6c"]} -{"Format": "IDEA0", "ID": "d8c784e5-54cc-456a-86f0-23bc6f5158a1", "DetectTime": "2023-10-30T14:14:17.220846+02:00", "EventTime": "2023-10-30T14:14:17.220858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CdQT9z3PyUW2Mhnl55"]} -{"Format": "IDEA0", "ID": "47d3f463-c00c-4549-8fa7-1fe2f5acca27", "DetectTime": "2023-10-30T14:14:17.244278+02:00", "EventTime": "2023-10-30T14:14:17.244294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["Cst1HE4zu77EzJgGUd"]} -{"Format": "IDEA0", "ID": "57c236ea-d342-446b-8104-abb19e4fb1d8", "DetectTime": "2023-10-30T14:14:17.268858+02:00", "EventTime": "2023-10-30T14:14:17.268872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CptTvT2bhJ0SFBzHw4"]} -{"Format": "IDEA0", "ID": "f1803518-ba04-4873-8afa-a6346d1327ce", "DetectTime": "2023-10-30T14:14:17.293642+02:00", "EventTime": "2023-10-30T14:14:17.293653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CleNGueqIGXkbkET4"]} -{"Format": "IDEA0", "ID": "befa2e15-0675-4468-9500-3d803e70888e", "DetectTime": "2023-10-30T14:14:17.317064+02:00", "EventTime": "2023-10-30T14:14:17.317080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["Cb07md4n8qzs3FObO3"]} -{"Format": "IDEA0", "ID": "5bb3f95a-51e3-41d9-8f2d-065964d1583f", "DetectTime": "2023-10-30T14:14:17.337670+02:00", "EventTime": "2023-10-30T14:14:17.337680+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CPgigRgA4fOJH5YEk"]} -{"Format": "IDEA0", "ID": "bde18490-780e-4c7f-9112-1f27399e74f6", "DetectTime": "2023-10-30T14:14:17.361468+02:00", "EventTime": "2023-10-30T14:14:17.361481+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CCCUOk2izmAbdlAP4c"]} -{"Format": "IDEA0", "ID": "1d98c672-16bb-4afc-bec0-7ca5034b4d88", "DetectTime": "2023-10-30T14:14:17.385317+02:00", "EventTime": "2023-10-30T14:14:17.385328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CigBFWOCtyTaHgPkf"]} -{"Format": "IDEA0", "ID": "98f4a774-9e2e-4a0a-96ea-b040c4d5972c", "DetectTime": "2023-10-30T14:14:17.408865+02:00", "EventTime": "2023-10-30T14:14:17.408881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CLVgTFMAJG0geJg63"]} -{"Format": "Json", "ID": "98f4a774-9e2e-4a0a-96ea-b040c4d5972c", "DetectTime": "2023-10-30T14:14:17.408865+02:00", "EventTime": "2023-10-30T14:14:17.408881+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:45:49.021011+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:17.470390)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8394a9c-2771-43f3-857e-fd36d28e3fba", "DetectTime": "2023-10-30T14:14:17.474396+02:00", "EventTime": "2023-10-30T14:14:17.474406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["COfAuE4jT2VXkJtcp5"]} -{"Format": "IDEA0", "ID": "f05b36b1-31ad-459b-9ee0-c2664c427bde", "DetectTime": "2023-10-30T14:14:17.495177+02:00", "EventTime": "2023-10-30T14:14:17.495193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CPkdMzJoNJpj1h6nd"]} -{"Format": "IDEA0", "ID": "5e15cb08-f706-4e08-a82b-68dc338610a7", "DetectTime": "2023-10-30T14:14:17.515086+02:00", "EventTime": "2023-10-30T14:14:17.515101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CHiub04KiWLoObdUC8"]} -{"Format": "IDEA0", "ID": "45caf7e4-a4ba-4cd0-8152-64e1659d17b3", "DetectTime": "2023-10-30T14:14:17.537052+02:00", "EventTime": "2023-10-30T14:14:17.537070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CiokM56v9lSVMoHTf"]} -{"Format": "IDEA0", "ID": "d142b574-7bee-46fa-9dba-466f6e0734c0", "DetectTime": "2023-10-30T14:14:17.561115+02:00", "EventTime": "2023-10-30T14:14:17.561128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CThaVg2U9yG07BcXLg"]} -{"Format": "IDEA0", "ID": "e90c0dee-3b7a-4edd-b968-1ab6dc068420", "DetectTime": "2023-10-30T14:14:17.581839+02:00", "EventTime": "2023-10-30T14:14:17.581856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CGBZB2wmHVlIpQzWh"]} -{"Format": "IDEA0", "ID": "97fb1dfa-5b8c-4e95-8b92-8ce2bab8554e", "DetectTime": "2023-10-30T14:14:17.600231+02:00", "EventTime": "2023-10-30T14:14:17.600246+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CjP9Wo1aKeO6ZezZL7"]} -{"Format": "IDEA0", "ID": "32bb04a1-d599-4219-9edc-5ba787da060a", "DetectTime": "2023-10-30T14:14:17.618506+02:00", "EventTime": "2023-10-30T14:14:17.618516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CSl2042YrLCgeH81jl"]} -{"Format": "IDEA0", "ID": "1b07130c-c9d5-4ff8-9edc-d8d42fe88207", "DetectTime": "2023-10-30T14:14:17.636234+02:00", "EventTime": "2023-10-30T14:14:17.636249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CVQHsO38dHZwClKki8"]} -{"Format": "Json", "ID": "1b07130c-c9d5-4ff8-9edc-d8d42fe88207", "DetectTime": "2023-10-30T14:14:17.636234+02:00", "EventTime": "2023-10-30T14:14:17.636249+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:46:09.205589+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:17.693432)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "093156dd-1ec2-4278-9c5d-81872724297c", "DetectTime": "2023-10-30T14:14:17.697185+02:00", "EventTime": "2023-10-30T14:14:17.697195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C9emKs4XhMa5YLznK7"]} -{"Format": "IDEA0", "ID": "6b551cc5-552a-4c3b-b5ae-da0463b85f63", "DetectTime": "2023-10-30T14:14:17.715546+02:00", "EventTime": "2023-10-30T14:14:17.715555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["C4eDo94qypHNfOn3Aj"]} -{"Format": "IDEA0", "ID": "aa098124-9458-4256-9e65-4a029b607527", "DetectTime": "2023-10-30T14:14:17.732897+02:00", "EventTime": "2023-10-30T14:14:17.732907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C2lpQc2uEFOdhVuNI1"]} -{"Format": "IDEA0", "ID": "30485fa9-d5b8-40e8-9d99-1380c8dbcb57", "DetectTime": "2023-10-30T14:14:17.752059+02:00", "EventTime": "2023-10-30T14:14:17.752071+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["Cxg7g8cZi9XFnmTH9"]} -{"Format": "IDEA0", "ID": "a2056a3b-33d0-48d8-ac98-562fbcfb9761", "DetectTime": "2023-10-30T14:14:17.772222+02:00", "EventTime": "2023-10-30T14:14:17.772237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CacRQL1c5ISITyfEEh"]} -{"Format": "IDEA0", "ID": "df3bcae2-32fe-4756-a0be-77787e6f12b0", "DetectTime": "2023-10-30T14:14:17.793054+02:00", "EventTime": "2023-10-30T14:14:17.793068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CqDxAQ3rmJWYmN6cHg"]} -{"Format": "IDEA0", "ID": "e204d174-1b7d-43c0-89cc-437024b75586", "DetectTime": "2023-10-30T14:14:17.809230+02:00", "EventTime": "2023-10-30T14:14:17.809245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CcyYCtUWOCBV9HfK6"]} -{"Format": "IDEA0", "ID": "a9eb095b-b1af-4d70-81e4-52b6734d682c", "DetectTime": "2023-10-30T14:14:17.826757+02:00", "EventTime": "2023-10-30T14:14:17.826767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["Cf3Fzb3L7q7deqEag"]} -{"Format": "IDEA0", "ID": "710cf5c0-f87d-418f-a586-993b491397ab", "DetectTime": "2023-10-30T14:14:17.843695+02:00", "EventTime": "2023-10-30T14:14:17.843706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CCUaWN3yme2OWBhs1g"]} -{"Format": "Json", "ID": "710cf5c0-f87d-418f-a586-993b491397ab", "DetectTime": "2023-10-30T14:14:17.843695+02:00", "EventTime": "2023-10-30T14:14:17.843706+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T05:46:20.056584+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 220. (real time 2023/10/30 14:14:17.893741)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5534be88-4913-48c2-8cf4-660d7fe2207e", "DetectTime": "2023-10-30T14:14:17.897866+02:00", "EventTime": "2023-10-30T14:14:17.897877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C8NGJ3ghTynlxeGu"]} -{"Format": "IDEA0", "ID": "1bb6fd1e-54f4-4f76-b7dd-be4b1200cfc6", "DetectTime": "2023-10-30T14:14:17.921645+02:00", "EventTime": "2023-10-30T14:14:17.921659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CP9W074MptwJeZuyg"]} -{"Format": "IDEA0", "ID": "14c7bd3d-574c-4d07-8293-791bdb07314c", "DetectTime": "2023-10-30T14:14:17.941592+02:00", "EventTime": "2023-10-30T14:14:17.941606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdMenc1K4coxcKnmQk"]} -{"Format": "IDEA0", "ID": "b1595927-0ce4-438f-893a-949ec835ed4b", "DetectTime": "2023-10-30T14:14:17.967961+02:00", "EventTime": "2023-10-30T14:14:17.967971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C8CLrhIZmOasMrl1f"]} -{"Format": "IDEA0", "ID": "a751b3c2-ae18-4500-99d8-63b434bee868", "DetectTime": "2023-10-30T14:14:18.000933+02:00", "EventTime": "2023-10-30T14:14:18.000942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CfXv5q2lypQJFVPQo8"]} -{"Format": "IDEA0", "ID": "17b8e383-e65a-487b-ae24-0cb4bdb23698", "DetectTime": "2023-10-30T14:14:18.030179+02:00", "EventTime": "2023-10-30T14:14:18.030189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CToxuge0JmFkrx9y2"]} -{"Format": "IDEA0", "ID": "8568f580-9659-43ea-88c1-851ea1380fd4", "DetectTime": "2023-10-30T14:14:18.059746+02:00", "EventTime": "2023-10-30T14:14:18.059756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CQjiUZ3XQH7p8cpcwh"]} -{"Format": "IDEA0", "ID": "fa52792d-beff-4b45-ae75-a71322c50862", "DetectTime": "2023-10-30T14:14:18.088027+02:00", "EventTime": "2023-10-30T14:14:18.088040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CvnbXl1nFtjtiIcqub"]} -{"Format": "IDEA0", "ID": "f70e9afe-dcb7-4642-8eb1-827dba843a3c", "DetectTime": "2023-10-30T14:14:18.118184+02:00", "EventTime": "2023-10-30T14:14:18.118195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CtK4Ib15grO5Etsje1"]} -{"Format": "IDEA0", "ID": "298b872e-893b-4b3a-8cf0-fe3c74640287", "DetectTime": "2023-10-30T14:14:18.148030+02:00", "EventTime": "2023-10-30T14:14:18.148041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CKRnLaCdKXb75VwXf"]} -{"Format": "Json", "ID": "298b872e-893b-4b3a-8cf0-fe3c74640287", "DetectTime": "2023-10-30T14:14:18.148030+02:00", "EventTime": "2023-10-30T14:14:18.148041+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:16:31.957838+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:18.210806)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b0ed44a9-d387-4bf7-a722-a2ca9855a75d", "DetectTime": "2023-10-30T14:14:18.215842+02:00", "EventTime": "2023-10-30T14:14:18.215861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C1nQom4oJjhuD1N0oe"]} -{"Format": "IDEA0", "ID": "311c302b-4d3c-4c32-b275-cf5dbf31a0ba", "DetectTime": "2023-10-30T14:14:18.243437+02:00", "EventTime": "2023-10-30T14:14:18.243447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CAfvBe37mHRRY6F707"]} -{"Format": "IDEA0", "ID": "53e82d55-9104-4667-80c1-805d967829f6", "DetectTime": "2023-10-30T14:14:18.271397+02:00", "EventTime": "2023-10-30T14:14:18.271409+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CNEYPx6ef4IH2iFs4"]} -{"Format": "IDEA0", "ID": "af31c0f3-dd2a-402f-ab2b-4233b6b63fa9", "DetectTime": "2023-10-30T14:14:18.296696+02:00", "EventTime": "2023-10-30T14:14:18.296710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cm9M8A148KhgTvLaEe"]} -{"Format": "IDEA0", "ID": "7a12505e-ed42-405f-8551-03fa8c45578b", "DetectTime": "2023-10-30T14:14:18.328108+02:00", "EventTime": "2023-10-30T14:14:18.328118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6eOkp11FhDajoRGck"]} -{"Format": "IDEA0", "ID": "9dd48dc3-36eb-4d37-a6f2-f4120376902d", "DetectTime": "2023-10-30T14:14:18.362683+02:00", "EventTime": "2023-10-30T14:14:18.362697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["Czhi2B4LIoh0bZ7dY7"]} -{"Format": "IDEA0", "ID": "1036ac2f-e5fa-4f01-9a3d-435fbe1ec67f", "DetectTime": "2023-10-30T14:14:18.399190+02:00", "EventTime": "2023-10-30T14:14:18.399205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CQj9Cu2HfEtw2hWOkk"]} -{"Format": "IDEA0", "ID": "e461f6f8-f4c2-4447-827a-30d9f7d4d5cf", "DetectTime": "2023-10-30T14:14:18.427976+02:00", "EventTime": "2023-10-30T14:14:18.427987+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CHTADe3Th2Ucfhrt2f"]} -{"Format": "IDEA0", "ID": "7994acf2-7193-43ec-aea9-575c91c7fb50", "DetectTime": "2023-10-30T14:14:18.443936+02:00", "EventTime": "2023-10-30T14:14:18.443948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CYchaYoLigxxs2XH6"]} -{"Format": "Json", "ID": "7994acf2-7193-43ec-aea9-575c91c7fb50", "DetectTime": "2023-10-30T14:14:18.443936+02:00", "EventTime": "2023-10-30T14:14:18.443948+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:16:33.327660+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:18.523316)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "07b0b5fc-e5e9-4c7d-a4c5-ea647a93980b", "DetectTime": "2023-10-30T14:14:18.528520+02:00", "EventTime": "2023-10-30T14:14:18.528536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CajpceMZg6gk7zYe"]} -{"Format": "IDEA0", "ID": "5fab8a6b-86f4-4300-a039-c199c7f4c9fb", "DetectTime": "2023-10-30T14:14:18.558963+02:00", "EventTime": "2023-10-30T14:14:18.558974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["COWcqX2QTExVkrGr2i"]} -{"Format": "IDEA0", "ID": "167b6118-0352-4579-912d-ef445970f8f6", "DetectTime": "2023-10-30T14:14:18.582483+02:00", "EventTime": "2023-10-30T14:14:18.582496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPXtsO37xSn5ymRTu7"]} -{"Format": "IDEA0", "ID": "c85bcc36-a44d-414c-85a9-f974f3241b3a", "DetectTime": "2023-10-30T14:14:18.611325+02:00", "EventTime": "2023-10-30T14:14:18.611335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CQb1lM3QDIpzVSgYG2"]} -{"Format": "IDEA0", "ID": "ad86e215-6d9a-4ab3-9877-02604f656be1", "DetectTime": "2023-10-30T14:14:18.635228+02:00", "EventTime": "2023-10-30T14:14:18.635237+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CfIvSp4mTl4SGfXG65"]} -{"Format": "IDEA0", "ID": "0034cb1a-bc29-4f2c-9278-cb0be149eb62", "DetectTime": "2023-10-30T14:14:18.661799+02:00", "EventTime": "2023-10-30T14:14:18.661808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CusjlA3OOHJn9Smpoe"]} -{"Format": "IDEA0", "ID": "90085cf1-1158-418f-a2eb-ea670d55e151", "DetectTime": "2023-10-30T14:14:18.689064+02:00", "EventTime": "2023-10-30T14:14:18.689080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CxWcbs4crVNOiiswh6"]} -{"Format": "IDEA0", "ID": "276255fa-f147-44fa-ae81-054cb88db380", "DetectTime": "2023-10-30T14:14:18.717286+02:00", "EventTime": "2023-10-30T14:14:18.717298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CzAtsf2jL111sqxe7e"]} -{"Format": "IDEA0", "ID": "c9b43395-1a27-4334-88b0-a194f494d0fb", "DetectTime": "2023-10-30T14:14:18.753516+02:00", "EventTime": "2023-10-30T14:14:18.753534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4oI3K3JqYKGMLd4Si"]} -{"Format": "Json", "ID": "c9b43395-1a27-4334-88b0-a194f494d0fb", "DetectTime": "2023-10-30T14:14:18.753516+02:00", "EventTime": "2023-10-30T14:14:18.753534+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:16:34.585486+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:18.819435)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ad9440ea-34d4-4123-83ef-fef3490c3951", "DetectTime": "2023-10-30T14:14:18.823468+02:00", "EventTime": "2023-10-30T14:14:18.823478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cf9NZF3bQIy7SP6Tyj"]} -{"Format": "IDEA0", "ID": "20d8bea5-6a38-48ad-9071-399d9cfcc3df", "DetectTime": "2023-10-30T14:14:18.847898+02:00", "EventTime": "2023-10-30T14:14:18.847909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CKKtOE2BU2N8BaPiql"]} -{"Format": "IDEA0", "ID": "d8a8a050-20ec-4b3d-8d0b-7a7b5c6120aa", "DetectTime": "2023-10-30T14:14:18.868943+02:00", "EventTime": "2023-10-30T14:14:18.868952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CMYrAa4nH4Kt7KjkVb"]} -{"Format": "IDEA0", "ID": "d538026a-5ff0-4ffe-9b99-725ca242737f", "DetectTime": "2023-10-30T14:14:18.893178+02:00", "EventTime": "2023-10-30T14:14:18.893195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C2Xpj84G3R1jS6Tzwb"]} -{"Format": "IDEA0", "ID": "7320df8c-d877-4166-b08b-1c37e25bc411", "DetectTime": "2023-10-30T14:14:18.917436+02:00", "EventTime": "2023-10-30T14:14:18.917447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["Cn4lEJ3Hba2LYb8vqg"]} -{"Format": "IDEA0", "ID": "e81f0e20-ba83-402f-83ba-1995bfde4e24", "DetectTime": "2023-10-30T14:14:18.949238+02:00", "EventTime": "2023-10-30T14:14:18.949257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CMJoxb3cahBGpzPftl"]} -{"Format": "IDEA0", "ID": "33440ca1-bc23-49ab-8bba-90c0d4619869", "DetectTime": "2023-10-30T14:14:18.979671+02:00", "EventTime": "2023-10-30T14:14:18.979688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Ca07zA2Ou3qOGnVdDi"]} -{"Format": "IDEA0", "ID": "9e018f3a-9a4d-477d-bff5-b5b414c54bee", "DetectTime": "2023-10-30T14:14:19.001129+02:00", "EventTime": "2023-10-30T14:14:19.001139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CTnYV9KwTndSo3Ob"]} -{"Format": "IDEA0", "ID": "bc7d34c9-a1b8-4679-a7be-51afb9380db6", "DetectTime": "2023-10-30T14:14:19.028336+02:00", "EventTime": "2023-10-30T14:14:19.028351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CVhW4W2gvNSTr192I5"]} -{"Format": "Json", "ID": "bc7d34c9-a1b8-4679-a7be-51afb9380db6", "DetectTime": "2023-10-30T14:14:19.028336+02:00", "EventTime": "2023-10-30T14:14:19.028351+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:16:35.811874+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:19.110322)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c377057c-fc09-433f-85de-4d969d26b5bc", "DetectTime": "2023-10-30T14:14:19.115932+02:00", "EventTime": "2023-10-30T14:14:19.115947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CPtAyM2FW5oktPulBh"]} -{"Format": "IDEA0", "ID": "e7a6880f-0ff4-478c-8695-272280c48424", "DetectTime": "2023-10-30T14:14:19.142864+02:00", "EventTime": "2023-10-30T14:14:19.142885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CS6eXV3Eu8NJb7piJ5"]} -{"Format": "IDEA0", "ID": "32f0ceff-a178-4ddf-91ab-47d6910bec75", "DetectTime": "2023-10-30T14:14:19.166401+02:00", "EventTime": "2023-10-30T14:14:19.166412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CaW3nF2X39Uf8doEP8"]} -{"Format": "IDEA0", "ID": "2988deee-66a9-45f8-a253-b08feea98d5e", "DetectTime": "2023-10-30T14:14:19.190497+02:00", "EventTime": "2023-10-30T14:14:19.190511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CSpJfKwgMVBFH5uGj"]} -{"Format": "IDEA0", "ID": "e1903ab8-55c0-4985-a24f-e4befcfdb20f", "DetectTime": "2023-10-30T14:14:19.213056+02:00", "EventTime": "2023-10-30T14:14:19.213066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["CQXEcY2vTwxWdrhF42"]} -{"Format": "IDEA0", "ID": "faf8f3bb-afa8-422a-b27e-b9801c2aa271", "DetectTime": "2023-10-30T14:14:19.235190+02:00", "EventTime": "2023-10-30T14:14:19.235201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdOkmQ3vMon6M1uQZ2"]} -{"Format": "IDEA0", "ID": "b4071801-8141-4ee3-976f-fff72be7c458", "DetectTime": "2023-10-30T14:14:19.260759+02:00", "EventTime": "2023-10-30T14:14:19.260777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["ClHopM2XfQbjdFiItb"]} -{"Format": "IDEA0", "ID": "4ac83e6e-f00c-4faf-bb7a-6444f52e323d", "DetectTime": "2023-10-30T14:14:19.282982+02:00", "EventTime": "2023-10-30T14:14:19.282996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CykeJx1roh5wGbC1D1"]} -{"Format": "IDEA0", "ID": "2ad4d416-0cb6-4f56-834d-7a21cb6b7020", "DetectTime": "2023-10-30T14:14:19.303260+02:00", "EventTime": "2023-10-30T14:14:19.303272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CrOWpfBFlo24edOs8"]} -{"Format": "Json", "ID": "2ad4d416-0cb6-4f56-834d-7a21cb6b7020", "DetectTime": "2023-10-30T14:14:19.303260+02:00", "EventTime": "2023-10-30T14:14:19.303272+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:46:56.696082+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:19.364035)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cb8ac4f3-4960-4805-972d-d67bc596064f", "DetectTime": "2023-10-30T14:14:19.367777+02:00", "EventTime": "2023-10-30T14:14:19.367788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CNuax63F7DICsLTyWj"]} -{"Format": "IDEA0", "ID": "0330b249-a008-48f3-8f38-f3501883a1dd", "DetectTime": "2023-10-30T14:14:19.388543+02:00", "EventTime": "2023-10-30T14:14:19.388554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C3MGdg1ZYXbiVcu1J6"]} -{"Format": "IDEA0", "ID": "be3316eb-d88f-45fb-a17e-f0ddd9c757fe", "DetectTime": "2023-10-30T14:14:19.411399+02:00", "EventTime": "2023-10-30T14:14:19.411411+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGpW5J30q1IxXYKUYk"]} -{"Format": "IDEA0", "ID": "a5a8f00c-a7df-42b4-88ba-9feeddef4e21", "DetectTime": "2023-10-30T14:14:19.438020+02:00", "EventTime": "2023-10-30T14:14:19.438035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CHavCg2NYLySKQhid8"]} -{"Format": "IDEA0", "ID": "a567ce05-93b5-4bec-96a9-4f0047da81e3", "DetectTime": "2023-10-30T14:14:19.465959+02:00", "EventTime": "2023-10-30T14:14:19.465974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CIY6s31dAu95c8cuFd"]} -{"Format": "IDEA0", "ID": "d4396bd7-1f1e-48a2-bc7b-6e5965501871", "DetectTime": "2023-10-30T14:14:19.486589+02:00", "EventTime": "2023-10-30T14:14:19.486598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C0O7hE4SzqnWJrbllk"]} -{"Format": "IDEA0", "ID": "86f5a975-7e93-47cb-841b-6c5cca326bf6", "DetectTime": "2023-10-30T14:14:19.507910+02:00", "EventTime": "2023-10-30T14:14:19.507926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cw8WGx1aehdyLQvM5h"]} -{"Format": "IDEA0", "ID": "585e5c86-910b-4523-aa23-0c338de9dd1c", "DetectTime": "2023-10-30T14:14:19.526626+02:00", "EventTime": "2023-10-30T14:14:19.526637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CXbVFO22H5P0tdZNOd"]} -{"Format": "IDEA0", "ID": "64d64cf4-8aef-44d9-b614-37d13d134660", "DetectTime": "2023-10-30T14:14:19.547780+02:00", "EventTime": "2023-10-30T14:14:19.547794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CxAJVQ2fpzaN0aPEU"]} -{"Format": "Json", "ID": "64d64cf4-8aef-44d9-b614-37d13d134660", "DetectTime": "2023-10-30T14:14:19.547780+02:00", "EventTime": "2023-10-30T14:14:19.547794+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:46:57.642554+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:19.608587)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4f7b5994-03a3-46ed-ad16-1f7f5ef97cff", "DetectTime": "2023-10-30T14:14:19.613471+02:00", "EventTime": "2023-10-30T14:14:19.613487+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CiBv4N2s0uubTSWNG8"]} -{"Format": "IDEA0", "ID": "d7cd5f72-1baa-4035-847c-182d106aeeec", "DetectTime": "2023-10-30T14:14:19.635757+02:00", "EventTime": "2023-10-30T14:14:19.635770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CIaac61XwyVYTVLBn"]} -{"Format": "IDEA0", "ID": "cbcf991b-91a8-4279-9a93-b9e4fac70547", "DetectTime": "2023-10-30T14:14:19.657808+02:00", "EventTime": "2023-10-30T14:14:19.657818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CfJGtU3bucSeJvvMV6"]} -{"Format": "IDEA0", "ID": "42e6668d-3542-4082-a263-7d329d2e0dfc", "DetectTime": "2023-10-30T14:14:19.676505+02:00", "EventTime": "2023-10-30T14:14:19.676515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CUp5HO2ompxL8LzBR"]} -{"Format": "IDEA0", "ID": "fea37df9-cc63-4dd7-8857-6ff2937145b0", "DetectTime": "2023-10-30T14:14:19.693920+02:00", "EventTime": "2023-10-30T14:14:19.693930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CBze9Q38nHZyN9s959"]} -{"Format": "IDEA0", "ID": "6e5dfa7e-6258-46c3-82a6-cdc01fe8ddcb", "DetectTime": "2023-10-30T14:14:19.714966+02:00", "EventTime": "2023-10-30T14:14:19.714982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CUSQEo1TdgB8kNJhL4"]} -{"Format": "IDEA0", "ID": "fc592a38-33b5-4527-9202-011fd3199a29", "DetectTime": "2023-10-30T14:14:19.741062+02:00", "EventTime": "2023-10-30T14:14:19.741078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CXQlCN2gQRmtomlHx8"]} -{"Format": "IDEA0", "ID": "93d70a9c-a44c-4ec3-8b49-10f8ca90e23e", "DetectTime": "2023-10-30T14:14:19.764124+02:00", "EventTime": "2023-10-30T14:14:19.764136+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cil39fqBnNJb5NjQ4"]} -{"Format": "Json", "ID": "93d70a9c-a44c-4ec3-8b49-10f8ca90e23e", "DetectTime": "2023-10-30T14:14:19.764124+02:00", "EventTime": "2023-10-30T14:14:19.764136+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:46:59.115270+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:19.820686)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d37ed0ad-3125-4c6b-8c32-0e5d89958e55", "DetectTime": "2023-10-30T14:14:19.825734+02:00", "EventTime": "2023-10-30T14:14:19.825748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CO9ltQQqWiceDrSC5"]} -{"Format": "IDEA0", "ID": "21909ea7-124b-4693-b1af-6362f3ffd4c0", "DetectTime": "2023-10-30T14:14:19.845122+02:00", "EventTime": "2023-10-30T14:14:19.845131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CRrLwS2ExDLybVOMWa"]} -{"Format": "IDEA0", "ID": "d7efb4ad-f218-4e71-9a4c-7685b602eccb", "DetectTime": "2023-10-30T14:14:19.859757+02:00", "EventTime": "2023-10-30T14:14:19.859766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Ck4PvTfNfZvFd7ywf"]} -{"Format": "IDEA0", "ID": "6d586856-8a35-453e-bb1a-4ba43b885dcb", "DetectTime": "2023-10-30T14:14:19.877458+02:00", "EventTime": "2023-10-30T14:14:19.877470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CjPuMeL7blBWwrchd"]} -{"Format": "IDEA0", "ID": "edc481ad-4e8b-494c-8117-5d3b45e8a347", "DetectTime": "2023-10-30T14:14:19.895782+02:00", "EventTime": "2023-10-30T14:14:19.895794+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CGhX2M1xcRBntxnE98"]} -{"Format": "IDEA0", "ID": "20033561-7864-446c-b20c-0a05946411e8", "DetectTime": "2023-10-30T14:14:19.913446+02:00", "EventTime": "2023-10-30T14:14:19.913457+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cp3fxp2cYPOA6klceg"]} -{"Format": "IDEA0", "ID": "be2fe512-39b0-449e-bf2b-08ae24829ef1", "DetectTime": "2023-10-30T14:14:19.931009+02:00", "EventTime": "2023-10-30T14:14:19.931023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C14g9Ghm3PUfmYaYd"]} -{"Format": "IDEA0", "ID": "49d347a1-e0ca-4c91-8b0f-fed900e24b1d", "DetectTime": "2023-10-30T14:14:19.948278+02:00", "EventTime": "2023-10-30T14:14:19.948288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CuX9Qj1TrnPOR0Msmk"]} -{"Format": "IDEA0", "ID": "547d94ba-0d3f-41c1-8462-997b93dca7d2", "DetectTime": "2023-10-30T14:14:19.965847+02:00", "EventTime": "2023-10-30T14:14:19.965859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CDe6V92CfgoQjv90Lg"]} -{"Format": "Json", "ID": "547d94ba-0d3f-41c1-8462-997b93dca7d2", "DetectTime": "2023-10-30T14:14:19.965847+02:00", "EventTime": "2023-10-30T14:14:19.965859+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:47:00.595674+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:20.018004)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "79bf19ac-9b1d-415e-a21e-83bb4dd7e540", "DetectTime": "2023-10-30T14:14:20.021939+02:00", "EventTime": "2023-10-30T14:14:20.021950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CblroF2dH7hYOUEh7d"]} -{"Format": "IDEA0", "ID": "01b83e3a-aa74-4f8f-a32d-5fb10b23c164", "DetectTime": "2023-10-30T14:14:20.037520+02:00", "EventTime": "2023-10-30T14:14:20.037530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CNqGfs2NZll4TKUqAd"]} -{"Format": "IDEA0", "ID": "17faa17b-5a9a-4227-a10d-a36e4c3e2f46", "DetectTime": "2023-10-30T14:14:20.052032+02:00", "EventTime": "2023-10-30T14:14:20.052043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CAFBSB4eCVerLf48Ta"]} -{"Format": "IDEA0", "ID": "b29294df-29e7-4c0b-a893-62f7b2260ed7", "DetectTime": "2023-10-30T14:14:20.070093+02:00", "EventTime": "2023-10-30T14:14:20.070104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["C8sRa7Vpq2VazFJMc"]} -{"Format": "IDEA0", "ID": "a778ef29-c6fb-4fe4-8e77-d5ceb66ab5c6", "DetectTime": "2023-10-30T14:14:20.088506+02:00", "EventTime": "2023-10-30T14:14:20.088517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["C6r83o1gZp83g8XkNf"]} -{"Format": "IDEA0", "ID": "8abcb339-5a4f-45b7-95da-f9236e96dfb1", "DetectTime": "2023-10-30T14:14:20.104641+02:00", "EventTime": "2023-10-30T14:14:20.104651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CvPeQw6woLHd5flr2"]} -{"Format": "IDEA0", "ID": "c70ffc85-428c-471e-83bc-dbab12f5cb7a", "DetectTime": "2023-10-30T14:14:20.120661+02:00", "EventTime": "2023-10-30T14:14:20.120672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CS5ZTy4FkK6bVgFbtb"]} -{"Format": "IDEA0", "ID": "a9a8c0c7-1bff-47d1-91ba-fc865b7c84c0", "DetectTime": "2023-10-30T14:14:20.136914+02:00", "EventTime": "2023-10-30T14:14:20.136924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["COyUElSqozhf4EZCl"]} -{"Format": "IDEA0", "ID": "0885562f-177e-4d42-b832-771c4aec6920", "DetectTime": "2023-10-30T14:14:20.152132+02:00", "EventTime": "2023-10-30T14:14:20.152141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. ", "ContentType": "text/plain"}], "uids": ["Cp87rL1JfYhkAoAtF1"]} -{"Format": "Json", "ID": "0885562f-177e-4d42-b832-771c4aec6920", "DetectTime": "2023-10-30T14:14:20.152132+02:00", "EventTime": "2023-10-30T14:14:20.152141+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4759], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T06:47:04.073426+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 221. (real time 2023/10/30 14:14:20.196966)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4a400e4d-83a7-4e28-af7f-df239a73830b", "DetectTime": "2023-10-30T14:14:20.200875+02:00", "EventTime": "2023-10-30T14:14:20.200886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C2Bqau3LEwB1O6LXEj"]} -{"Format": "IDEA0", "ID": "dd134c83-bca7-44d8-9ec8-b49fd2a75e4f", "DetectTime": "2023-10-30T14:14:20.221970+02:00", "EventTime": "2023-10-30T14:14:20.221980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cs6YqjB4ws7kPcvZi"]} -{"Format": "IDEA0", "ID": "af062b41-de0a-4372-bcae-d44378f2fdba", "DetectTime": "2023-10-30T14:14:20.236431+02:00", "EventTime": "2023-10-30T14:14:20.236441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CYWbKN2DxtY9YLUH32"]} -{"Format": "IDEA0", "ID": "f877ff77-3887-4d91-891b-654d98fdcb9b", "DetectTime": "2023-10-30T14:14:20.250658+02:00", "EventTime": "2023-10-30T14:14:20.250669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgwuWf236asgcEPD7l"]} -{"Format": "IDEA0", "ID": "f9700e74-6fcc-4bdb-872d-12f646b317f0", "DetectTime": "2023-10-30T14:14:20.280741+02:00", "EventTime": "2023-10-30T14:14:20.280754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CGszJS6GvEYB0ZdV1"]} -{"Format": "IDEA0", "ID": "4921b4d8-b0c6-4bbc-9fed-911fa3d4dad1", "DetectTime": "2023-10-30T14:14:20.297486+02:00", "EventTime": "2023-10-30T14:14:20.297496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CIOGNB1ONfV5iA86Oi"]} -{"Format": "IDEA0", "ID": "3b3565bb-ed91-4601-b217-d3f21213214a", "DetectTime": "2023-10-30T14:14:20.330333+02:00", "EventTime": "2023-10-30T14:14:20.330349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCxCmb2Gjh6eN9PhTe"]} -{"Format": "IDEA0", "ID": "99bcb258-f3e8-4527-9f7a-5d0c803d2e60", "DetectTime": "2023-10-30T14:14:20.363800+02:00", "EventTime": "2023-10-30T14:14:20.363810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CfduTL2sogkcYRRiFi"]} -{"Format": "IDEA0", "ID": "c29b480b-64dd-4b12-bc98-b9fc9031ff76", "DetectTime": "2023-10-30T14:14:20.391036+02:00", "EventTime": "2023-10-30T14:14:20.391045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["C2GXWw1B54xpYPNv34"]} -{"Format": "IDEA0", "ID": "d476427e-a447-4b25-8fb7-f1a56eb0883c", "DetectTime": "2023-10-30T14:14:20.419394+02:00", "EventTime": "2023-10-30T14:14:20.419403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cieby2mGxwTggcGl7"]} -{"Format": "IDEA0", "ID": "b9b448bf-a276-44c6-9ddc-a3219c8784cd", "DetectTime": "2023-10-30T14:14:20.453806+02:00", "EventTime": "2023-10-30T14:14:20.453820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CsJiPf2HeTdbiLF5G2"]} -{"Format": "IDEA0", "ID": "7d11bdfd-5f49-4ab2-a6c9-cbbb318daade", "DetectTime": "2023-10-30T14:14:20.470921+02:00", "EventTime": "2023-10-30T14:14:20.470936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["ClUOf91TgBmTV8Fspe"]} -{"Format": "Json", "ID": "7d11bdfd-5f49-4ab2-a6c9-cbbb318daade", "DetectTime": "2023-10-30T14:14:20.470921+02:00", "EventTime": "2023-10-30T14:14:20.470936+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:17:38.935060+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:20.558966)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "852d9e54-a4bf-4af5-9de8-aa870dc1f25c", "DetectTime": "2023-10-30T14:14:20.564037+02:00", "EventTime": "2023-10-30T14:14:20.564051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CqCPxZ1TBtNsC4lhCj"]} -{"Format": "IDEA0", "ID": "887500f0-0fc2-45df-92b7-374243392571", "DetectTime": "2023-10-30T14:14:20.607089+02:00", "EventTime": "2023-10-30T14:14:20.607105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CgwZdV3iSnZh5v7Ab7"]} -{"Format": "IDEA0", "ID": "92e83601-9627-4406-aebc-c5516772be02", "DetectTime": "2023-10-30T14:14:20.639160+02:00", "EventTime": "2023-10-30T14:14:20.639176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C0iKfXAVgsn60Gdke"]} -{"Format": "IDEA0", "ID": "fa6e2a76-0717-4445-a59e-afd82b710314", "DetectTime": "2023-10-30T14:14:20.667022+02:00", "EventTime": "2023-10-30T14:14:20.667032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CKixL92y1jDbIe1C5b"]} -{"Format": "IDEA0", "ID": "62d8efd6-d0b7-4998-95de-46a32e6d1956", "DetectTime": "2023-10-30T14:14:20.700150+02:00", "EventTime": "2023-10-30T14:14:20.700161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CE5pkY3VYCcoajAPNj"]} -{"Format": "IDEA0", "ID": "b1b5d4cc-be2e-4b82-a39f-c1815be41e6c", "DetectTime": "2023-10-30T14:14:20.733107+02:00", "EventTime": "2023-10-30T14:14:20.733117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["C0fIi21KGrMWvrvGW9"]} -{"Format": "IDEA0", "ID": "289538aa-93d3-4c7d-9b56-5090b8b59136", "DetectTime": "2023-10-30T14:14:20.763303+02:00", "EventTime": "2023-10-30T14:14:20.763318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CcEDSb1YBiAF6TcEL2"]} -{"Format": "IDEA0", "ID": "59040353-ed7a-47aa-bfa9-a1247adba65f", "DetectTime": "2023-10-30T14:14:20.797221+02:00", "EventTime": "2023-10-30T14:14:20.797232+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CYwtmIOMxIjOcARd4"]} -{"Format": "Json", "ID": "59040353-ed7a-47aa-bfa9-a1247adba65f", "DetectTime": "2023-10-30T14:14:20.797221+02:00", "EventTime": "2023-10-30T14:14:20.797232+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:17:40.171550+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:20.854204)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "7153baec-1baa-4b17-8a5e-4e002331f2d9", "DetectTime": "2023-10-30T14:14:20.857845+02:00", "EventTime": "2023-10-30T14:14:20.857855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.139.43.88 ", "ContentType": "text/plain"}], "uids": ["CkzTqNF7Ios5NETHg"]} -{"Format": "IDEA0", "ID": "eb7dd62e-349b-42cb-9c0e-bfb4a4d148ec", "DetectTime": "2023-10-30T14:14:20.871034+02:00", "EventTime": "2023-10-30T14:14:20.871046+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C8ODYoUGQCkUlr60a"]} -{"Format": "IDEA0", "ID": "eb08be37-9a7e-47fd-9d24-e91ea936d07f", "DetectTime": "2023-10-30T14:14:20.901571+02:00", "EventTime": "2023-10-30T14:14:20.901586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 12.175.148.194 ", "ContentType": "text/plain"}], "uids": ["CP7Tzn20dSkqZWzyDg"]} -{"Format": "IDEA0", "ID": "bb0d0978-0edd-47df-a8bf-20fdfba20320", "DetectTime": "2023-10-30T14:14:20.917283+02:00", "EventTime": "2023-10-30T14:14:20.917294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CaPtUj1wmrGEVj5TLe"]} -{"Format": "IDEA0", "ID": "009697da-56ce-479f-8e86-2d290272815a", "DetectTime": "2023-10-30T14:14:20.942452+02:00", "EventTime": "2023-10-30T14:14:20.942463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CzZFs82DLXxi0K1rCi"]} -{"Format": "IDEA0", "ID": "0d03a025-6e3e-4efe-9253-383d7d98971e", "DetectTime": "2023-10-30T14:14:20.953745+02:00", "EventTime": "2023-10-30T14:14:20.953754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CIbjn21X04V9ncPtA1"]} -{"Format": "IDEA0", "ID": "8409ecf6-5580-4344-a45c-117efbbe398a", "DetectTime": "2023-10-30T14:14:20.987670+02:00", "EventTime": "2023-10-30T14:14:20.987685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZPj4j45ORmxqQr5Bi"]} -{"Format": "IDEA0", "ID": "e08c7793-f186-4283-8fdc-512c5bae6f38", "DetectTime": "2023-10-30T14:14:21.003305+02:00", "EventTime": "2023-10-30T14:14:21.003319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CqsIMc47lBVAg1hbb2"]} -{"Format": "IDEA0", "ID": "a6e7368b-bcd5-404a-bb7c-183fdb3f5f87", "DetectTime": "2023-10-30T14:14:21.016962+02:00", "EventTime": "2023-10-30T14:14:21.016972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C3LvAg2OhvUC5GaI1h"]} -{"Format": "IDEA0", "ID": "9d12f395-c16c-4fe1-a2f1-3cdafa6c702a", "DetectTime": "2023-10-30T14:14:21.045504+02:00", "EventTime": "2023-10-30T14:14:21.045520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["ChsgnKFM0Ti4UwRbk"]} -{"Format": "IDEA0", "ID": "849565e8-3584-489b-b39b-6003740b8adc", "DetectTime": "2023-10-30T14:14:21.059517+02:00", "EventTime": "2023-10-30T14:14:21.059528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cl4snC4zz4pwN9idd"]} -{"Format": "IDEA0", "ID": "e0e38674-16a0-4c61-ac70-0425128710ff", "DetectTime": "2023-10-30T14:14:21.074623+02:00", "EventTime": "2023-10-30T14:14:21.074634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CpMt7A4S1l4Fk6kXG8"]} -{"Format": "IDEA0", "ID": "d6e3a70d-4def-4838-9dc1-9a56fea50234", "DetectTime": "2023-10-30T14:14:21.101019+02:00", "EventTime": "2023-10-30T14:14:21.101032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["ChaDNzkTcnPGluE5b"]} -{"Format": "IDEA0", "ID": "40004136-713c-46e6-a9dd-00c66ad25cb9", "DetectTime": "2023-10-30T14:14:21.127562+02:00", "EventTime": "2023-10-30T14:14:21.127577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CoL3NvoJ1vT09N5k6"]} -{"Format": "IDEA0", "ID": "fbe4b1ad-9224-4f54-b361-e5c4c4f27b60", "DetectTime": "2023-10-30T14:14:21.158957+02:00", "EventTime": "2023-10-30T14:14:21.158972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CSj5N92MzMMEoBIG0e"]} -{"Format": "Json", "ID": "fbe4b1ad-9224-4f54-b361-e5c4c4f27b60", "DetectTime": "2023-10-30T14:14:21.158957+02:00", "EventTime": "2023-10-30T14:14:21.158972+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:17:41.598355+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:21.227647)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b6e88880-7637-4d90-8a1c-9eba10e29851", "DetectTime": "2023-10-30T14:14:21.231680+02:00", "EventTime": "2023-10-30T14:14:21.231691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CPvItL11nS17ealSo9"]} -{"Format": "IDEA0", "ID": "35d2a05d-daac-42b9-a21e-c3634291b505", "DetectTime": "2023-10-30T14:14:21.258770+02:00", "EventTime": "2023-10-30T14:14:21.258798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CwW4Iy4OeBajTI8TDh"]} -{"Format": "IDEA0", "ID": "6908a4f8-9e6f-4a15-bfca-f8718ff0c298", "DetectTime": "2023-10-30T14:14:21.271070+02:00", "EventTime": "2023-10-30T14:14:21.271080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cwu8Q82Q16Ucnm9tkj"]} -{"Format": "IDEA0", "ID": "1f99e70c-e384-44f9-a5a0-20e4af9aa5d2", "DetectTime": "2023-10-30T14:14:21.295501+02:00", "EventTime": "2023-10-30T14:14:21.295519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVsQ1i236xB1TXsLZ6"]} -{"Format": "IDEA0", "ID": "4eb90fff-ae93-4459-bea5-b2342aebeefb", "DetectTime": "2023-10-30T14:14:21.311205+02:00", "EventTime": "2023-10-30T14:14:21.311219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CFHWFjUe2rypcmEIi"]} -{"Format": "IDEA0", "ID": "9b57f275-da9d-46e2-a4a6-53aa21a19b7f", "DetectTime": "2023-10-30T14:14:21.342702+02:00", "EventTime": "2023-10-30T14:14:21.342712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CCfTLx2biQTtmXCzZ7"]} -{"Format": "IDEA0", "ID": "5025ee6a-767b-4dae-a9ee-ed37ff461530", "DetectTime": "2023-10-30T14:14:21.358051+02:00", "EventTime": "2023-10-30T14:14:21.358065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["Cfcvyv2b2BG5jXhol"]} -{"Format": "IDEA0", "ID": "1de59ec3-7edb-4d16-9450-1e08a5a61c05", "DetectTime": "2023-10-30T14:14:21.387419+02:00", "EventTime": "2023-10-30T14:14:21.387429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CwCbMb4PcGe1E2tGHi"]} -{"Format": "IDEA0", "ID": "f3a4141b-196c-4d4e-98ab-d2a49302b850", "DetectTime": "2023-10-30T14:14:21.410274+02:00", "EventTime": "2023-10-30T14:14:21.410285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C8c8wD3LmXHQg73it1"]} -{"Format": "IDEA0", "ID": "350da225-6631-407b-bce9-34cc92ac0ae8", "DetectTime": "2023-10-30T14:14:21.422091+02:00", "EventTime": "2023-10-30T14:14:21.422102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["Cu4ugW1PcvAkzluHL8"]} -{"Format": "IDEA0", "ID": "0bf1142d-6c6e-4852-a70e-e6d789785a3e", "DetectTime": "2023-10-30T14:14:21.449854+02:00", "EventTime": "2023-10-30T14:14:21.449864+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Cq3C3e2e46FGD7tdOd"]} -{"Format": "IDEA0", "ID": "ce91d726-3efb-4b71-9858-aba626bc4114", "DetectTime": "2023-10-30T14:14:21.463962+02:00", "EventTime": "2023-10-30T14:14:21.463980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["C7rwpw3bwv67FhDZvb"]} -{"Format": "IDEA0", "ID": "f46790b3-fd74-4783-9cc9-98ed1649759e", "DetectTime": "2023-10-30T14:14:21.491940+02:00", "EventTime": "2023-10-30T14:14:21.491950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CETsUmhZNiNTN0Y92"]} -{"Format": "IDEA0", "ID": "abe1c6b8-9c8a-4673-a7bf-1bc5ee98d434", "DetectTime": "2023-10-30T14:14:21.506932+02:00", "EventTime": "2023-10-30T14:14:21.506942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CCkxPo3mxMbpe5Svi4"]} -{"Format": "Json", "ID": "abe1c6b8-9c8a-4673-a7bf-1bc5ee98d434", "DetectTime": "2023-10-30T14:14:21.506932+02:00", "EventTime": "2023-10-30T14:14:21.506942+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:17:43.622000+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:21.565283)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "717c7944-77e8-484a-a020-12a11a21d579", "DetectTime": "2023-10-30T14:14:21.569037+02:00", "EventTime": "2023-10-30T14:14:21.569047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9p5S23kSSxXCp7Iv4"]} -{"Format": "IDEA0", "ID": "9c937ff0-bcb2-4b97-8c43-921fdbdd326c", "DetectTime": "2023-10-30T14:14:21.583336+02:00", "EventTime": "2023-10-30T14:14:21.583347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CxKQpe17Ne9Y2BaJh2"]} -{"Format": "IDEA0", "ID": "9ce02216-a885-4f8b-93fd-e6fcbacb0929", "DetectTime": "2023-10-30T14:14:21.598734+02:00", "EventTime": "2023-10-30T14:14:21.598748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXIc454u25Rmd2eTq6"]} -{"Format": "IDEA0", "ID": "843ba06a-9f8c-4f94-91c6-d04adaf31bf0", "DetectTime": "2023-10-30T14:14:21.613177+02:00", "EventTime": "2023-10-30T14:14:21.613187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CEjAmS2O9xWfu16SY6"]} -{"Format": "IDEA0", "ID": "fac4a55c-b1b8-4ed2-9fe8-6c51e5068b1b", "DetectTime": "2023-10-30T14:14:21.636407+02:00", "EventTime": "2023-10-30T14:14:21.636417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C9RGouzQ3xRsChp7g"]} -{"Format": "IDEA0", "ID": "e88597ad-715c-40e4-99a5-809e5181d17f", "DetectTime": "2023-10-30T14:14:21.648630+02:00", "EventTime": "2023-10-30T14:14:21.648641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C1vCDt1U10CbOunTQ4"]} -{"Format": "IDEA0", "ID": "9505e7ff-a140-4eff-adc4-427752fa50c8", "DetectTime": "2023-10-30T14:14:21.661184+02:00", "EventTime": "2023-10-30T14:14:21.661194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CKcHr24BkTWL4sEa2k"]} -{"Format": "IDEA0", "ID": "74a37d1a-3b68-4a16-a15e-0226c885764e", "DetectTime": "2023-10-30T14:14:21.686626+02:00", "EventTime": "2023-10-30T14:14:21.686635+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CQIRNfVo0KI4awZSk"]} -{"Format": "IDEA0", "ID": "ac39b7ed-0521-48f8-8e98-e20bc28112ae", "DetectTime": "2023-10-30T14:14:21.700730+02:00", "EventTime": "2023-10-30T14:14:21.700740+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CWPAln2RczXuyFW3Xd"]} -{"Format": "IDEA0", "ID": "3d516e94-15dd-443b-be3f-9b9ecab23094", "DetectTime": "2023-10-30T14:14:21.713999+02:00", "EventTime": "2023-10-30T14:14:21.714010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CfCqi53IcueXMza1O4"]} -{"Format": "IDEA0", "ID": "576dcd4d-eaf2-4d7b-8bef-16ebbffe3ca0", "DetectTime": "2023-10-30T14:14:21.726123+02:00", "EventTime": "2023-10-30T14:14:21.726133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CGAmT44vWlUolMzOFb"]} -{"Format": "IDEA0", "ID": "4268e88c-4641-4a7a-9098-22375abaa4ab", "DetectTime": "2023-10-30T14:14:21.753431+02:00", "EventTime": "2023-10-30T14:14:21.753446+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CH5tdZ2A3f5xRL5eZ3"]} -{"Format": "IDEA0", "ID": "efb13ecc-88cd-42b3-a772-54f2a7704fb3", "DetectTime": "2023-10-30T14:14:21.768530+02:00", "EventTime": "2023-10-30T14:14:21.768546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["COK2064QDgtvh2huh2"]} -{"Format": "IDEA0", "ID": "7e542612-113a-4946-885b-902bf87af464", "DetectTime": "2023-10-30T14:14:21.786652+02:00", "EventTime": "2023-10-30T14:14:21.786667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CS5WMb3wPDJquHolZ6"]} -{"Format": "IDEA0", "ID": "3f936747-4e68-4b83-a9b7-efa86ffd99b5", "DetectTime": "2023-10-30T14:14:21.804839+02:00", "EventTime": "2023-10-30T14:14:21.804855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.15.203.157"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 210.15.203.157 ", "ContentType": "text/plain"}], "uids": ["CleGG2A752jFZaiJ5"]} -{"Format": "IDEA0", "ID": "69861d9a-6942-4549-9e72-db1caed0546b", "DetectTime": "2023-10-30T14:14:21.823643+02:00", "EventTime": "2023-10-30T14:14:21.823657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C01Cqq1UEGkGUn9MF1"]} -{"Format": "IDEA0", "ID": "ee49ccc4-2591-45b4-89b5-c022d94cab5a", "DetectTime": "2023-10-30T14:14:21.841181+02:00", "EventTime": "2023-10-30T14:14:21.841195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.143.211.178"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.143.211.178 ", "ContentType": "text/plain"}], "uids": ["CI3vnE3OjX1ThztgYd"]} -{"Format": "IDEA0", "ID": "4de1d4e5-d506-42bc-bd22-9a41c41c3248", "DetectTime": "2023-10-30T14:14:21.855771+02:00", "EventTime": "2023-10-30T14:14:21.855781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.234.251.167"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 64.234.251.167 ", "ContentType": "text/plain"}], "uids": ["Ct0YWoEKuPtiSG584"]} -{"Format": "IDEA0", "ID": "3da544e7-c640-4d65-932e-a205de3043c9", "DetectTime": "2023-10-30T14:14:21.869160+02:00", "EventTime": "2023-10-30T14:14:21.869169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CFcNR227Z6Eq2HXeW1"]} -{"Format": "IDEA0", "ID": "d4ff7b6c-13bc-45a4-a3ce-0a88d7034c12", "DetectTime": "2023-10-30T14:14:21.882380+02:00", "EventTime": "2023-10-30T14:14:21.882390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CRSsRB4CdC8YtDYIg6"]} -{"Format": "IDEA0", "ID": "4d45f7fe-fe56-4e4c-8d0d-b7f4783d4162", "DetectTime": "2023-10-30T14:14:21.907157+02:00", "EventTime": "2023-10-30T14:14:21.907169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.62.192.115"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.62.192.115 ", "ContentType": "text/plain"}], "uids": ["C3NdsQ2UOEgPPYlOQh"]} -{"Format": "IDEA0", "ID": "b2e04e21-79d0-4c2e-88d1-809fc48cde62", "DetectTime": "2023-10-30T14:14:21.920532+02:00", "EventTime": "2023-10-30T14:14:21.920542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.65.130.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.65.130.226 ", "ContentType": "text/plain"}], "uids": ["Cksrkp1MYt8Q55zBF6"]} -{"Format": "IDEA0", "ID": "4682c3fc-c022-4adc-81d2-eef5ad14e9f9", "DetectTime": "2023-10-30T14:14:21.933733+02:00", "EventTime": "2023-10-30T14:14:21.933743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.88.11.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.88.11.18 ", "ContentType": "text/plain"}], "uids": ["Cw90Ut2aEz3gZSuuaf"]} -{"Format": "IDEA0", "ID": "f27050ea-e7a5-4add-86e4-294a754e7f97", "DetectTime": "2023-10-30T14:14:21.945091+02:00", "EventTime": "2023-10-30T14:14:21.945102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.177.182.222"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.177.182.222 ", "ContentType": "text/plain"}], "uids": ["C4D1GL3twUq0oACzv9"]} -{"Format": "IDEA0", "ID": "98c19fd1-0705-4e3b-b983-5f3179200ad7", "DetectTime": "2023-10-30T14:14:21.956713+02:00", "EventTime": "2023-10-30T14:14:21.956728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.60.158.190"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.60.158.190 ", "ContentType": "text/plain"}], "uids": ["Co3rkG3qmNl99eh8b2"]} -{"Format": "IDEA0", "ID": "b73f151b-dd59-48e6-aa5d-e250c1c7df5b", "DetectTime": "2023-10-30T14:14:21.969147+02:00", "EventTime": "2023-10-30T14:14:21.969157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.20.182.29"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.20.182.29 ", "ContentType": "text/plain"}], "uids": ["Cwzt3m2HFOIPeDhNHl"]} -{"Format": "IDEA0", "ID": "66a7a603-5e80-42ed-a0c0-35998dbc613a", "DetectTime": "2023-10-30T14:14:21.983071+02:00", "EventTime": "2023-10-30T14:14:21.983086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.45.163.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.45.163.46 ", "ContentType": "text/plain"}], "uids": ["CW05Uz4yDJOxY47GFk"]} -{"Format": "IDEA0", "ID": "d6c1b593-3571-4d63-af0c-3490a4212c53", "DetectTime": "2023-10-30T14:14:21.996847+02:00", "EventTime": "2023-10-30T14:14:21.996862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.115.54.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 186.115.54.24 ", "ContentType": "text/plain"}], "uids": ["CnCQl7uSieyoKc7x8"]} -{"Format": "IDEA0", "ID": "cba0af2a-aa24-4f0b-bd5f-cf270291ce6a", "DetectTime": "2023-10-30T14:14:22.010154+02:00", "EventTime": "2023-10-30T14:14:22.010164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.0.232.228"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.0.232.228 ", "ContentType": "text/plain"}], "uids": ["CZrjjX2DSjTCab7m48"]} -{"Format": "IDEA0", "ID": "3d7d6355-2f0a-4402-a364-5396b20783f8", "DetectTime": "2023-10-30T14:14:22.022496+02:00", "EventTime": "2023-10-30T14:14:22.022506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C36cRZ2IyJ6LRVruGd"]} -{"Format": "IDEA0", "ID": "c01b3662-060d-4289-ac22-866a4fb0a823", "DetectTime": "2023-10-30T14:14:22.035811+02:00", "EventTime": "2023-10-30T14:14:22.035822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.208.121.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.208.121.249 ", "ContentType": "text/plain"}], "uids": ["Cwjswa25lEt4DFAMue"]} -{"Format": "IDEA0", "ID": "70a64f60-aefe-4e19-aeaa-19c47a41ad29", "DetectTime": "2023-10-30T14:14:22.048752+02:00", "EventTime": "2023-10-30T14:14:22.048762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.199.128.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.199.128.93 ", "ContentType": "text/plain"}], "uids": ["CIReDf1RGG6XO2frI2"]} -{"Format": "IDEA0", "ID": "a34af663-e772-4be0-a648-61867989ea94", "DetectTime": "2023-10-30T14:14:22.062150+02:00", "EventTime": "2023-10-30T14:14:22.062160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.109.233"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.223.109.233 ", "ContentType": "text/plain"}], "uids": ["Cv34mg1cH5iA2Afkki"]} -{"Format": "IDEA0", "ID": "173a4b35-afef-48d7-894d-44bc1d22ea1d", "DetectTime": "2023-10-30T14:14:22.074397+02:00", "EventTime": "2023-10-30T14:14:22.074408+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.219.238.163"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 62.219.238.163 ", "ContentType": "text/plain"}], "uids": ["C7vPiB3YBAS6OMUyVi"]} -{"Format": "IDEA0", "ID": "8bfc962f-4be4-4208-bcd8-526778b81521", "DetectTime": "2023-10-30T14:14:22.089488+02:00", "EventTime": "2023-10-30T14:14:22.089501+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.71.161.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.71.161.90 ", "ContentType": "text/plain"}], "uids": ["CESih93Q0vmyNpk4s3"]} -{"Format": "IDEA0", "ID": "a59d7023-1551-400c-a7dc-38a07430d4ac", "DetectTime": "2023-10-30T14:14:22.104258+02:00", "EventTime": "2023-10-30T14:14:22.104268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.10.236.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.10.236.46 ", "ContentType": "text/plain"}], "uids": ["CskTpo4t2GCQEuyDk"]} -{"Format": "IDEA0", "ID": "29335324-857a-46c2-8547-ccaba64d187c", "DetectTime": "2023-10-30T14:14:22.116043+02:00", "EventTime": "2023-10-30T14:14:22.116054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CvlkOZ16Yb4fKWNeWk"]} -{"Format": "IDEA0", "ID": "8691f75b-8181-4d24-93f9-121b3fdc1f71", "DetectTime": "2023-10-30T14:14:22.130506+02:00", "EventTime": "2023-10-30T14:14:22.130519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CdSFBr3EavD5TNoIa2"]} -{"Format": "IDEA0", "ID": "30a58506-5673-49de-b26a-e93e50c8e46a", "DetectTime": "2023-10-30T14:14:22.143806+02:00", "EventTime": "2023-10-30T14:14:22.143816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CsNrAe2jVxQCZ18CBi"]} -{"Format": "IDEA0", "ID": "a70b58e5-631b-468e-97a9-70a59a678528", "DetectTime": "2023-10-30T14:14:22.168150+02:00", "EventTime": "2023-10-30T14:14:22.168160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.201.0.183"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 190.201.0.183 ", "ContentType": "text/plain"}], "uids": ["CpSJYY29znBRZvFmy8"]} -{"Format": "IDEA0", "ID": "ed16c708-576e-42e0-a9c0-2c2ededf65b4", "DetectTime": "2023-10-30T14:14:22.180707+02:00", "EventTime": "2023-10-30T14:14:22.180718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["Coei2d1LQz6CNJbXz4"]} -{"Format": "IDEA0", "ID": "f698c744-6d56-49c7-abd2-8c7ea6bb1ce2", "DetectTime": "2023-10-30T14:14:22.192949+02:00", "EventTime": "2023-10-30T14:14:22.192958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.28.24.185"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.28.24.185 ", "ContentType": "text/plain"}], "uids": ["CTDFRK3taBvRCKZXc1"]} -{"Format": "IDEA0", "ID": "c6074b01-d49a-494a-baff-4dfbc21b629e", "DetectTime": "2023-10-30T14:14:22.205674+02:00", "EventTime": "2023-10-30T14:14:22.205684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["91.99.105.168"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 91.99.105.168 ", "ContentType": "text/plain"}], "uids": ["CF5NhY3E6u7zvwj8m8"]} -{"Format": "IDEA0", "ID": "cfe9036d-115c-4477-9ff6-72f481117b16", "DetectTime": "2023-10-30T14:14:22.221562+02:00", "EventTime": "2023-10-30T14:14:22.221577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.59.252.18"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.59.252.18 ", "ContentType": "text/plain"}], "uids": ["CodR3o48Rk6t0t52mf"]} -{"Format": "IDEA0", "ID": "6e59e8b9-d6ad-40b9-9afa-9758afd6c583", "DetectTime": "2023-10-30T14:14:22.236546+02:00", "EventTime": "2023-10-30T14:14:22.236555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.174.119.158"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 187.174.119.158 ", "ContentType": "text/plain"}], "uids": ["CdEqih4jIKbk9aOn9b"]} -{"Format": "IDEA0", "ID": "924b3969-6e40-4c13-a847-00cbbdab0f79", "DetectTime": "2023-10-30T14:14:22.248832+02:00", "EventTime": "2023-10-30T14:14:22.248842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["106.240.77.220"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 106.240.77.220 ", "ContentType": "text/plain"}], "uids": ["CIli4R2Siz6Juq7iu9"]} -{"Format": "IDEA0", "ID": "acd2966d-3054-4bd4-8595-de287b6146d2", "DetectTime": "2023-10-30T14:14:22.261279+02:00", "EventTime": "2023-10-30T14:14:22.261289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CMpZrY3KPhc01OUlch"]} -{"Format": "IDEA0", "ID": "9d34e929-b7ae-4599-a2b6-fcd44173cb91", "DetectTime": "2023-10-30T14:14:22.273418+02:00", "EventTime": "2023-10-30T14:14:22.273427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.195.196.119 ", "ContentType": "text/plain"}], "uids": ["CwMNG6FbRc1iPV99e"]} -{"Format": "IDEA0", "ID": "7ab812e2-f14f-43bc-9cc5-e89b5d76e37d", "DetectTime": "2023-10-30T14:14:22.286752+02:00", "EventTime": "2023-10-30T14:14:22.286761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.244.46.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.244.46.205 ", "ContentType": "text/plain"}], "uids": ["CS57281rxH4bC0WFlg"]} -{"Format": "IDEA0", "ID": "187fb0ac-e621-482e-8e8e-fedd8b4501f7", "DetectTime": "2023-10-30T14:14:22.298688+02:00", "EventTime": "2023-10-30T14:14:22.298700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CGz5wy4AKJ4wlwlOW"]} -{"Format": "IDEA0", "ID": "24eb59a9-4e7f-40c5-a58c-57f41f1e258f", "DetectTime": "2023-10-30T14:14:22.310771+02:00", "EventTime": "2023-10-30T14:14:22.310800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.43.156.102"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.43.156.102 ", "ContentType": "text/plain"}], "uids": ["ChI7L64P1mdjJ4pn65"]} -{"Format": "IDEA0", "ID": "b75aa7cc-036b-4064-b1ae-617ce6795b48", "DetectTime": "2023-10-30T14:14:22.323939+02:00", "EventTime": "2023-10-30T14:14:22.323948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.95.5.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.95.5.205 ", "ContentType": "text/plain"}], "uids": ["CLoPUt32qUBBezfumi"]} -{"Format": "IDEA0", "ID": "d9dd6659-d47f-4608-a105-5c4979c30671", "DetectTime": "2023-10-30T14:14:22.335759+02:00", "EventTime": "2023-10-30T14:14:22.335769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.36.234.42"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 80.36.234.42 ", "ContentType": "text/plain"}], "uids": ["CKcTzfzNyY7Czckkd"]} -{"Format": "IDEA0", "ID": "69226e33-8809-48b5-aac2-c4d6f3020281", "DetectTime": "2023-10-30T14:14:22.347542+02:00", "EventTime": "2023-10-30T14:14:22.347552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.29.136.213"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.29.136.213 ", "ContentType": "text/plain"}], "uids": ["CYCark4mSoEykUvA5h"]} -{"Format": "IDEA0", "ID": "04ade901-ce15-4352-8735-49d0dc9d178c", "DetectTime": "2023-10-30T14:14:22.361066+02:00", "EventTime": "2023-10-30T14:14:22.361079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.158.51.209"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 177.158.51.209 ", "ContentType": "text/plain"}], "uids": ["CF1i1bXXAxk55miOb"]} -{"Format": "IDEA0", "ID": "d6b0bc8c-adb8-4815-b720-bab5fd251df5", "DetectTime": "2023-10-30T14:14:22.376981+02:00", "EventTime": "2023-10-30T14:14:22.376991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.193.16.198"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.193.16.198 ", "ContentType": "text/plain"}], "uids": ["Cl1V5z4cTcBJd5WvLh"]} -{"Format": "IDEA0", "ID": "0264f3a1-9554-4d12-8832-3e63172ae134", "DetectTime": "2023-10-30T14:14:22.388118+02:00", "EventTime": "2023-10-30T14:14:22.388127+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.126.181.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.126.181.133 ", "ContentType": "text/plain"}], "uids": ["CRT2yZ3pmro8jtOPCk"]} -{"Format": "IDEA0", "ID": "073cfd0a-fb99-4637-a8ae-4435c822e895", "DetectTime": "2023-10-30T14:14:22.400009+02:00", "EventTime": "2023-10-30T14:14:22.400020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.250.36.89"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.250.36.89 ", "ContentType": "text/plain"}], "uids": ["CNwBeo2StxjaVaB7qb"]} -{"Format": "IDEA0", "ID": "6c544d5f-ff95-4895-9533-07d37ca7941f", "DetectTime": "2023-10-30T14:14:22.411651+02:00", "EventTime": "2023-10-30T14:14:22.411660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.9.167.49"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 74.9.167.49 ", "ContentType": "text/plain"}], "uids": ["CkXbzV9jCEvQ8DqK5"]} -{"Format": "IDEA0", "ID": "9ac4c6e4-19cb-4f34-944c-0f54862f5a02", "DetectTime": "2023-10-30T14:14:22.422868+02:00", "EventTime": "2023-10-30T14:14:22.422879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.0.96.129"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.0.96.129 ", "ContentType": "text/plain"}], "uids": ["CCKICt2sA56uNtNS04"]} -{"Format": "IDEA0", "ID": "15a99288-1624-43f3-9899-67c99ab661ea", "DetectTime": "2023-10-30T14:14:22.439515+02:00", "EventTime": "2023-10-30T14:14:22.439528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CrRQZb1uY46Ke7Dk4f"]} -{"Format": "IDEA0", "ID": "febe69a1-cd32-47cc-9ae6-229d913c6fad", "DetectTime": "2023-10-30T14:14:22.454971+02:00", "EventTime": "2023-10-30T14:14:22.454986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.73.167.82"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.73.167.82 ", "ContentType": "text/plain"}], "uids": ["CjWti611JPlPuuxEy5"]} -{"Format": "IDEA0", "ID": "99dcb30d-b310-441f-8fca-4fd3005d2802", "DetectTime": "2023-10-30T14:14:22.473461+02:00", "EventTime": "2023-10-30T14:14:22.473477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C7fBvC2dG3uZne87C9"]} -{"Format": "IDEA0", "ID": "10e189d7-4b01-432b-a2eb-3ef0e068f953", "DetectTime": "2023-10-30T14:14:22.491649+02:00", "EventTime": "2023-10-30T14:14:22.491664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.212.125.20"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.212.125.20 ", "ContentType": "text/plain"}], "uids": ["CUkAuqCrsxN5xZ0Db"]} -{"Format": "IDEA0", "ID": "092245d6-f064-411f-b484-d45763d75a3a", "DetectTime": "2023-10-30T14:14:22.508482+02:00", "EventTime": "2023-10-30T14:14:22.508497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["148.244.220.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 148.244.220.234 ", "ContentType": "text/plain"}], "uids": ["C8fGsfawTBAiVZHde"]} -{"Format": "IDEA0", "ID": "67e1925d-3f82-4028-bbea-3c12b7173a16", "DetectTime": "2023-10-30T14:14:22.521715+02:00", "EventTime": "2023-10-30T14:14:22.521725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.171.87.44"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 110.171.87.44 ", "ContentType": "text/plain"}], "uids": ["CpoU4BnvenzVDSXD6"]} -{"Format": "IDEA0", "ID": "6ed915bc-c64e-43bc-b799-e7bd0bc71ecc", "DetectTime": "2023-10-30T14:14:22.535870+02:00", "EventTime": "2023-10-30T14:14:22.535880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.165.170.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 109.165.170.202 ", "ContentType": "text/plain"}], "uids": ["CMripG3ZVyTxy58wCb"]} -{"Format": "IDEA0", "ID": "27a28dd7-4d9b-47b7-9769-8508b942f4c9", "DetectTime": "2023-10-30T14:14:22.554514+02:00", "EventTime": "2023-10-30T14:14:22.554529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.112.141"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.72.112.141 ", "ContentType": "text/plain"}], "uids": ["CgFar9iEcOsqyBoa5"]} -{"Format": "IDEA0", "ID": "4d18aade-3e23-42a3-b68b-bc3ce6738f9d", "DetectTime": "2023-10-30T14:14:22.573363+02:00", "EventTime": "2023-10-30T14:14:22.573379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.77.27"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 112.205.77.27 ", "ContentType": "text/plain"}], "uids": ["CPkqb44fzTHGg4r1Zd"]} -{"Format": "IDEA0", "ID": "b84e2b9e-b987-40e5-8439-e5019e769641", "DetectTime": "2023-10-30T14:14:22.588667+02:00", "EventTime": "2023-10-30T14:14:22.588676+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.56.10.160"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 95.56.10.160 ", "ContentType": "text/plain"}], "uids": ["C6kqHx2sBPwOrPqFcb"]} -{"Format": "IDEA0", "ID": "9241f468-d5ff-4201-bf78-a13f2c28df28", "DetectTime": "2023-10-30T14:14:22.601273+02:00", "EventTime": "2023-10-30T14:14:22.601283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.178.57.91"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 182.178.57.91 ", "ContentType": "text/plain"}], "uids": ["CoENdF1jzbLjHpwFo"]} -{"Format": "IDEA0", "ID": "4594a09f-02d0-4cb4-9b2a-84203689acfa", "DetectTime": "2023-10-30T14:14:22.613486+02:00", "EventTime": "2023-10-30T14:14:22.613495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CjxCJe3cXRywUNp6W8"]} -{"Format": "IDEA0", "ID": "8a00bc52-14fe-492e-9962-628b4e0612f4", "DetectTime": "2023-10-30T14:14:22.625202+02:00", "EventTime": "2023-10-30T14:14:22.625211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.110.175.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 123.110.175.202 ", "ContentType": "text/plain"}], "uids": ["CXgxv83cSi6f0wKXK7"]} -{"Format": "IDEA0", "ID": "8d127721-52a1-474c-96b7-fd67e6ed00f9", "DetectTime": "2023-10-30T14:14:22.637105+02:00", "EventTime": "2023-10-30T14:14:22.637114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.112.157.83"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.112.157.83 ", "ContentType": "text/plain"}], "uids": ["CVttgA2AOeueg2Z0x6"]} -{"Format": "IDEA0", "ID": "dd485af7-b866-41d5-a7b8-c84224d2888d", "DetectTime": "2023-10-30T14:14:22.649090+02:00", "EventTime": "2023-10-30T14:14:22.649101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.224.177.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.224.177.58 ", "ContentType": "text/plain"}], "uids": ["C9r4rf4TVMdqJ4XWPe"]} -{"Format": "IDEA0", "ID": "b4a7dc92-91bc-4e11-ade8-4baff202ac54", "DetectTime": "2023-10-30T14:14:22.662656+02:00", "EventTime": "2023-10-30T14:14:22.662667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.249.120.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 180.249.120.151 ", "ContentType": "text/plain"}], "uids": ["Ccq1l43x9JQWlCuyg4"]} -{"Format": "IDEA0", "ID": "47de2985-eb00-444d-a0f8-e2f101c4e42e", "DetectTime": "2023-10-30T14:14:22.675956+02:00", "EventTime": "2023-10-30T14:14:22.675966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.77.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.77.90 ", "ContentType": "text/plain"}], "uids": ["COkBy01NLNKR7QUWz6"]} -{"Format": "IDEA0", "ID": "6c6cdd36-eeb8-4a20-bfd6-92a457a279cc", "DetectTime": "2023-10-30T14:14:22.690550+02:00", "EventTime": "2023-10-30T14:14:22.690565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.124.198.201"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 85.124.198.201 ", "ContentType": "text/plain"}], "uids": ["CSBMhK38dH010ymyfi"]} -{"Format": "IDEA0", "ID": "04b2246b-315a-472e-b5e3-f1b8e9ee17ea", "DetectTime": "2023-10-30T14:14:22.707118+02:00", "EventTime": "2023-10-30T14:14:22.707128+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CV0nwd3QPx53z23Le"]} -{"Format": "IDEA0", "ID": "b4b6d646-579d-4a76-a1bd-5c13849fcfaf", "DetectTime": "2023-10-30T14:14:22.718010+02:00", "EventTime": "2023-10-30T14:14:22.718020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.98.93.111"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.98.93.111 ", "ContentType": "text/plain"}], "uids": ["CrCrPLzngDhfSu8O1"]} -{"Format": "IDEA0", "ID": "0402ce3e-dd85-4a12-a8c8-97e9c9a624b4", "DetectTime": "2023-10-30T14:14:22.730275+02:00", "EventTime": "2023-10-30T14:14:22.730285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["168.187.134.74"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 168.187.134.74 ", "ContentType": "text/plain"}], "uids": ["CHnHyQ2HNsVdnAq8hj"]} -{"Format": "IDEA0", "ID": "a6fdd6ce-395f-45f7-a77d-8d70fa7ee33e", "DetectTime": "2023-10-30T14:14:22.747490+02:00", "EventTime": "2023-10-30T14:14:22.747500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.74.166.5"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.74.166.5 ", "ContentType": "text/plain"}], "uids": ["C0zkIe2ZSlZt3wuMjg"]} -{"Format": "IDEA0", "ID": "fdc971cf-7723-4859-9bb9-f5c5d5b2b404", "DetectTime": "2023-10-30T14:14:22.765626+02:00", "EventTime": "2023-10-30T14:14:22.765641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.120.249"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 181.165.120.249 ", "ContentType": "text/plain"}], "uids": ["CLKBTB2bZJD9HjFXt2"]} -{"Format": "IDEA0", "ID": "e3330aab-c3bd-40be-99b3-955da90f876f", "DetectTime": "2023-10-30T14:14:22.783500+02:00", "EventTime": "2023-10-30T14:14:22.783514+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CHvCb439OKF7zeCGgg"]} -{"Format": "IDEA0", "ID": "4b05f606-60b2-4a03-b610-6360142ddab3", "DetectTime": "2023-10-30T14:14:22.802404+02:00", "EventTime": "2023-10-30T14:14:22.802419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.103.201.241"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.103.201.241 ", "ContentType": "text/plain"}], "uids": ["CGNJcK5kVCVFflELg"]} -{"Format": "IDEA0", "ID": "3ce8b802-c894-4a63-a61f-18f1ad7bf164", "DetectTime": "2023-10-30T14:14:22.820247+02:00", "EventTime": "2023-10-30T14:14:22.820261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cs2uZz1rmu0gQsGND6"]} -{"Format": "IDEA0", "ID": "58d4ae5c-1d32-4249-bfab-15e7922a9878", "DetectTime": "2023-10-30T14:14:22.854271+02:00", "EventTime": "2023-10-30T14:14:22.854286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.231.42.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.231.42.234 ", "ContentType": "text/plain"}], "uids": ["CBMj7h26b2lXoGs0gl"]} -{"Format": "IDEA0", "ID": "525e0867-e9bd-4097-9fa3-2cd3d3e97877", "DetectTime": "2023-10-30T14:14:22.871788+02:00", "EventTime": "2023-10-30T14:14:22.871801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["130.193.165.46"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 130.193.165.46 ", "ContentType": "text/plain"}], "uids": ["CHNyPV3vv2GfWnKXzc"]} -{"Format": "IDEA0", "ID": "ed34eeb1-b320-480b-8b0e-a847ad2c22e3", "DetectTime": "2023-10-30T14:14:22.889808+02:00", "EventTime": "2023-10-30T14:14:22.889822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.57.136.226"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 213.57.136.226 ", "ContentType": "text/plain"}], "uids": ["CRP0uq2QPekKDD5iC3"]} -{"Format": "IDEA0", "ID": "589be1ac-ab72-46bc-afc5-c3828e33b862", "DetectTime": "2023-10-30T14:14:22.907115+02:00", "EventTime": "2023-10-30T14:14:22.907129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.93.67.162"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.93.67.162 ", "ContentType": "text/plain"}], "uids": ["CCem47RoFONVLTc53"]} -{"Format": "IDEA0", "ID": "1dfaf193-f878-4cb7-99b5-dcd1f682822f", "DetectTime": "2023-10-30T14:14:22.923874+02:00", "EventTime": "2023-10-30T14:14:22.923888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.17.253.164"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.17.253.164 ", "ContentType": "text/plain"}], "uids": ["COI9Gd4KAxlV4nkDWi"]} -{"Format": "IDEA0", "ID": "ec2ddc8f-8da1-44e7-95b4-efe45af23f22", "DetectTime": "2023-10-30T14:14:22.941001+02:00", "EventTime": "2023-10-30T14:14:22.941015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.4.69.34"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.4.69.34 ", "ContentType": "text/plain"}], "uids": ["CYrHBD4YjxmRvS3j67"]} -{"Format": "IDEA0", "ID": "faec0ffd-ad14-458a-b0ef-900b6de72871", "DetectTime": "2023-10-30T14:14:22.958484+02:00", "EventTime": "2023-10-30T14:14:22.958497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.67.86.85"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.67.86.85 ", "ContentType": "text/plain"}], "uids": ["CGRO7gVdi7wQp0UEi"]} -{"Format": "IDEA0", "ID": "be063760-2428-497e-9231-ac5889f907b5", "DetectTime": "2023-10-30T14:14:22.975521+02:00", "EventTime": "2023-10-30T14:14:22.975531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.41.90.50"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.41.90.50 ", "ContentType": "text/plain"}], "uids": ["CkipbcFFn6CxeQDUf"]} -{"Format": "IDEA0", "ID": "ff9cecce-37b3-4c7d-949c-316e44ebe487", "DetectTime": "2023-10-30T14:14:22.987845+02:00", "EventTime": "2023-10-30T14:14:22.987854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.168.126.30"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.168.126.30 ", "ContentType": "text/plain"}], "uids": ["C3mcmN3RHzMbe8oQnk"]} -{"Format": "IDEA0", "ID": "f35020c6-1391-4608-9468-82c0039074d9", "DetectTime": "2023-10-30T14:14:22.999691+02:00", "EventTime": "2023-10-30T14:14:22.999701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.123.69.22"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.123.69.22 ", "ContentType": "text/plain"}], "uids": ["C38OtFGhO1qIMz6g7"]} -{"Format": "IDEA0", "ID": "df348e30-0d27-4366-a4ee-dc554cddbd3a", "DetectTime": "2023-10-30T14:14:23.011995+02:00", "EventTime": "2023-10-30T14:14:23.012005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.168.113.171"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.168.113.171 ", "ContentType": "text/plain"}], "uids": ["CNzS7p3ebLVujyRnag"]} -{"Format": "IDEA0", "ID": "cdf56ad3-f884-48ec-9caa-f47b434766d0", "DetectTime": "2023-10-30T14:14:23.024819+02:00", "EventTime": "2023-10-30T14:14:23.024831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.20.123.17"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 87.20.123.17 ", "ContentType": "text/plain"}], "uids": ["CxpiD53vgSBl8Cmxn"]} -{"Format": "IDEA0", "ID": "8726a96f-bbb7-4c77-a399-25db362a4fcf", "DetectTime": "2023-10-30T14:14:23.041121+02:00", "EventTime": "2023-10-30T14:14:23.041135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["ClnXfDSnr3bdwOTY5"]} -{"Format": "IDEA0", "ID": "eb9f9a0d-ba02-4e09-a437-f45b6ada270b", "DetectTime": "2023-10-30T14:14:23.058531+02:00", "EventTime": "2023-10-30T14:14:23.058546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.145.8.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.145.8.253 ", "ContentType": "text/plain"}], "uids": ["CuQ2wt7vaCYVa3h3"]} -{"Format": "IDEA0", "ID": "155e41dd-b620-429a-a4b6-6efc3bc1cba9", "DetectTime": "2023-10-30T14:14:23.076195+02:00", "EventTime": "2023-10-30T14:14:23.076208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.148.16.174"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.148.16.174 ", "ContentType": "text/plain"}], "uids": ["CcTnS93yzLdVIhuYg9"]} -{"Format": "IDEA0", "ID": "425871f6-2f8e-403d-8028-47fd2a2e141f", "DetectTime": "2023-10-30T14:14:23.093314+02:00", "EventTime": "2023-10-30T14:14:23.093328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.227.250.93"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.227.250.93 ", "ContentType": "text/plain"}], "uids": ["Cjl1Tz3caFmQGyjdA8"]} -{"Format": "IDEA0", "ID": "a9ecd473-4959-4659-9721-5ce790e0c55f", "DetectTime": "2023-10-30T14:14:23.110485+02:00", "EventTime": "2023-10-30T14:14:23.110499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.188.175.227"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.188.175.227 ", "ContentType": "text/plain"}], "uids": ["C15BuD4RJqPJ3bRbM2"]} -{"Format": "IDEA0", "ID": "10dffdf6-16d2-47c2-bb86-d5bf19a1122f", "DetectTime": "2023-10-30T14:14:23.127653+02:00", "EventTime": "2023-10-30T14:14:23.127668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CULnqZhrhny0czHE5"]} -{"Format": "IDEA0", "ID": "261bdf5e-188e-4538-88bd-6262fff84a2a", "DetectTime": "2023-10-30T14:14:23.143250+02:00", "EventTime": "2023-10-30T14:14:23.143262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.242.226.237"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 89.242.226.237 ", "ContentType": "text/plain"}], "uids": ["C5rOmZ2PS8sa6UNFHf"]} -{"Format": "IDEA0", "ID": "be495a8a-db1f-47f5-ad64-c86e37255570", "DetectTime": "2023-10-30T14:14:23.156224+02:00", "EventTime": "2023-10-30T14:14:23.156234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.177.101.124 ", "ContentType": "text/plain"}], "uids": ["C2wnc22GkS9QWEzV4f"]} -{"Format": "IDEA0", "ID": "c22aa4c7-e39a-4d25-b30c-05c5624bebcf", "DetectTime": "2023-10-30T14:14:23.168358+02:00", "EventTime": "2023-10-30T14:14:23.168367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.74.21.58"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.74.21.58 ", "ContentType": "text/plain"}], "uids": ["CBDXxl3Mp8PdiCPS65"]} -{"Format": "IDEA0", "ID": "589d918e-4279-4427-8971-018d489559b7", "DetectTime": "2023-10-30T14:14:23.180366+02:00", "EventTime": "2023-10-30T14:14:23.180376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.110.138.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.110.138.125 ", "ContentType": "text/plain"}], "uids": ["CUFstX3aw3BR7X8eda"]} -{"Format": "IDEA0", "ID": "dc9b5950-c380-4183-9b2e-31bd3593eb65", "DetectTime": "2023-10-30T14:14:23.192744+02:00", "EventTime": "2023-10-30T14:14:23.192753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.174.40.56"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.174.40.56 ", "ContentType": "text/plain"}], "uids": ["C4tM8hTZzoPFq6C49"]} -{"Format": "IDEA0", "ID": "26fc2696-28a7-4cec-a5ef-492e6118d73d", "DetectTime": "2023-10-30T14:14:23.204531+02:00", "EventTime": "2023-10-30T14:14:23.204542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.203.207.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.203.207.159 ", "ContentType": "text/plain"}], "uids": ["ChGrPU1Utqf2iKXwJ8"]} -{"Format": "IDEA0", "ID": "acec3d9e-7307-4640-b741-15d7c4250882", "DetectTime": "2023-10-30T14:14:23.216777+02:00", "EventTime": "2023-10-30T14:14:23.216787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.51.253 ", "ContentType": "text/plain"}], "uids": ["C5RBTm1jHiFOQxD0Pd"]} -{"Format": "IDEA0", "ID": "e45c029e-9648-4529-8b9a-bf4cdf4f3c4b", "DetectTime": "2023-10-30T14:14:23.228764+02:00", "EventTime": "2023-10-30T14:14:23.228774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.10.244.24"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 96.10.244.24 ", "ContentType": "text/plain"}], "uids": ["CYHNtQ3IfarRj73qJj"]} -{"Format": "IDEA0", "ID": "9a96df7f-a4c9-4f51-9ce7-222d31da5a7f", "DetectTime": "2023-10-30T14:14:23.242480+02:00", "EventTime": "2023-10-30T14:14:23.242497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.7.220.125 ", "ContentType": "text/plain"}], "uids": ["CQGQYSBjaEO4H9d7c"]} -{"Format": "IDEA0", "ID": "01c04b5a-dd20-417f-9912-0ef175e9003a", "DetectTime": "2023-10-30T14:14:23.259428+02:00", "EventTime": "2023-10-30T14:14:23.259445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.35.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 94.64.35.72 ", "ContentType": "text/plain"}], "uids": ["C5IZe61te0QYY4DtU5"]} -{"Format": "IDEA0", "ID": "bd1e6316-d821-4397-a66f-4d80707f9698", "DetectTime": "2023-10-30T14:14:23.275140+02:00", "EventTime": "2023-10-30T14:14:23.275149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.72"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 31.192.30.72 ", "ContentType": "text/plain"}], "uids": ["CAJtym1QVKbOudkRMa"]} -{"Format": "IDEA0", "ID": "51736e78-5fdb-4ddb-95dd-085935d395f8", "DetectTime": "2023-10-30T14:14:23.289839+02:00", "EventTime": "2023-10-30T14:14:23.289850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.248.237.202"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 172.248.237.202 ", "ContentType": "text/plain"}], "uids": ["C3ESOF4tMGliWJZYwh"]} -{"Format": "IDEA0", "ID": "4542d16d-a797-4a6a-8019-307b04d5a189", "DetectTime": "2023-10-30T14:14:23.304838+02:00", "EventTime": "2023-10-30T14:14:23.304852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.159.134.66"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 41.159.134.66 ", "ContentType": "text/plain"}], "uids": ["C0NxOm4FDecxo7jbs5"]} -{"Format": "IDEA0", "ID": "57de6747-8e03-4e3e-b7bf-5741e5d2ccd9", "DetectTime": "2023-10-30T14:14:23.321263+02:00", "EventTime": "2023-10-30T14:14:23.321278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C9pJezpamnjUi3lPb"]} -{"Format": "IDEA0", "ID": "21f8ef00-0b8f-49f3-ae9d-5a1f0086416c", "DetectTime": "2023-10-30T14:14:23.336170+02:00", "EventTime": "2023-10-30T14:14:23.336185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.153.212.248"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 188.153.212.248 ", "ContentType": "text/plain"}], "uids": ["Cacymy2htOYzGntxx3"]} -{"Format": "IDEA0", "ID": "86af0984-ce16-4612-b11b-529f2a9d7569", "DetectTime": "2023-10-30T14:14:23.349669+02:00", "EventTime": "2023-10-30T14:14:23.349682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CG0hSX1Yd81wNSzmeg"]} -{"Format": "IDEA0", "ID": "090cbd6d-1a52-456e-8702-3f5a4fd04d30", "DetectTime": "2023-10-30T14:14:23.361753+02:00", "EventTime": "2023-10-30T14:14:23.361763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.55.17.243"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.55.17.243 ", "ContentType": "text/plain"}], "uids": ["CeZH88I9KTDHThoP7"]} -{"Format": "IDEA0", "ID": "618316ee-beda-42d5-9e4c-47fd979fd99e", "DetectTime": "2023-10-30T14:14:23.373859+02:00", "EventTime": "2023-10-30T14:14:23.373868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.157.159"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.118.157.159 ", "ContentType": "text/plain"}], "uids": ["CCo1al1A3DQaNtalKc"]} -{"Format": "IDEA0", "ID": "4e7fca8c-ee8f-42ad-bd29-d259212cf581", "DetectTime": "2023-10-30T14:14:23.386424+02:00", "EventTime": "2023-10-30T14:14:23.386435+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.42.54.217"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 151.42.54.217 ", "ContentType": "text/plain"}], "uids": ["CERRd23PUqfHRiOg4"]} -{"Format": "IDEA0", "ID": "7b1d9715-10d0-47cc-87f8-88febab218d8", "DetectTime": "2023-10-30T14:14:23.399057+02:00", "EventTime": "2023-10-30T14:14:23.399068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.160.92.152"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 76.160.92.152 ", "ContentType": "text/plain"}], "uids": ["CJdK262KcnHu53wFu1"]} -{"Format": "IDEA0", "ID": "523a1dce-1c92-4322-85e5-5a3f1ed2474a", "DetectTime": "2023-10-30T14:14:23.414604+02:00", "EventTime": "2023-10-30T14:14:23.414618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.166.230.151"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.166.230.151 ", "ContentType": "text/plain"}], "uids": ["C5QGvmJu7wu41MrHe"]} -{"Format": "IDEA0", "ID": "3998da1e-5c59-433b-904c-8c3f769b65b5", "DetectTime": "2023-10-30T14:14:23.433129+02:00", "EventTime": "2023-10-30T14:14:23.433144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.146.245.219"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 24.146.245.219 ", "ContentType": "text/plain"}], "uids": ["CFeBAa384r1iEmJIph"]} -{"Format": "IDEA0", "ID": "74a01361-25fa-40d7-99a1-41ca1ec1967d", "DetectTime": "2023-10-30T14:14:23.451678+02:00", "EventTime": "2023-10-30T14:14:23.451692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.201.242.84"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 37.201.242.84 ", "ContentType": "text/plain"}], "uids": ["CbDv5N1IHmY5B5Itd7"]} -{"Format": "IDEA0", "ID": "9be8f45b-1b7c-4f7f-a2eb-2aea51bf8aa3", "DetectTime": "2023-10-30T14:14:23.469444+02:00", "EventTime": "2023-10-30T14:14:23.469460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CeNzW03qF9Abz8zgU9"]} -{"Format": "IDEA0", "ID": "7f43056e-66a4-4bca-bffd-b1a716f13349", "DetectTime": "2023-10-30T14:14:23.486114+02:00", "EventTime": "2023-10-30T14:14:23.486124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CGjAIg1oHTUCaeXl7i"]} -{"Format": "IDEA0", "ID": "da8b4be4-7f7e-4c41-82f6-d192c56d8671", "DetectTime": "2023-10-30T14:14:23.501252+02:00", "EventTime": "2023-10-30T14:14:23.501263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CUJozf3ntAY2CIJNRk"]} -{"Format": "IDEA0", "ID": "4971dec0-eb75-4f93-a24e-bd7f20ead96c", "DetectTime": "2023-10-30T14:14:23.516004+02:00", "EventTime": "2023-10-30T14:14:23.516013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CynLb14Zc6fmi6aGGb"]} -{"Format": "IDEA0", "ID": "d789bbb2-a47a-45ee-b947-d5b632e4b440", "DetectTime": "2023-10-30T14:14:23.532586+02:00", "EventTime": "2023-10-30T14:14:23.532597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CO5AnG4q72psqO8oDg"]} -{"Format": "IDEA0", "ID": "529b2af1-5b1d-4aa2-9160-babe16d7730c", "DetectTime": "2023-10-30T14:14:23.548691+02:00", "EventTime": "2023-10-30T14:14:23.548701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CLw3hCS4jGXXgHDe2"]} -{"Format": "IDEA0", "ID": "90c2b91f-ca6e-4df7-bbc9-caa2126897b0", "DetectTime": "2023-10-30T14:14:23.565245+02:00", "EventTime": "2023-10-30T14:14:23.565260+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C8Z41eAdicXYTbTPd"]} -{"Format": "IDEA0", "ID": "1a1b11cc-fded-46d1-9012-238465d1b0bd", "DetectTime": "2023-10-30T14:14:23.585686+02:00", "EventTime": "2023-10-30T14:14:23.585696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CW0PhY2KuXxgvtOa"]} -{"Format": "IDEA0", "ID": "bd858222-d9fe-44a2-907b-c2e13bdba708", "DetectTime": "2023-10-30T14:14:23.599649+02:00", "EventTime": "2023-10-30T14:14:23.599658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cik7tY3yco2GJjnz6j"]} -{"Format": "IDEA0", "ID": "2f892bdb-d2a6-496f-af8b-3dd9c000205d", "DetectTime": "2023-10-30T14:14:23.613158+02:00", "EventTime": "2023-10-30T14:14:23.613170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CJwYuN1PvDECH3dQc3"]} -{"Format": "IDEA0", "ID": "68d81e04-cc44-4ba8-bb64-0b3258442e26", "DetectTime": "2023-10-30T14:14:23.627552+02:00", "EventTime": "2023-10-30T14:14:23.627562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cd5vO91XHyyF0XpGPf"]} -{"Format": "IDEA0", "ID": "33d22654-0026-4b5b-8b35-6ab5f36479b9", "DetectTime": "2023-10-30T14:14:23.641335+02:00", "EventTime": "2023-10-30T14:14:23.641345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CNndcf3YCkWGkvU35"]} -{"Format": "IDEA0", "ID": "9b5ff62f-7c6b-4648-921f-5aa7299e2806", "DetectTime": "2023-10-30T14:14:23.657325+02:00", "EventTime": "2023-10-30T14:14:23.657336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CXOucCDwBMNjJZt4d"]} -{"Format": "IDEA0", "ID": "97e5eea0-8c08-4e3e-ab0e-41cc4282c39c", "DetectTime": "2023-10-30T14:14:23.672709+02:00", "EventTime": "2023-10-30T14:14:23.672718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CxmAYK3OIyArGYIpak"]} -{"Format": "IDEA0", "ID": "3958ab59-cfe8-493a-93ec-bc8e87260b77", "DetectTime": "2023-10-30T14:14:23.687013+02:00", "EventTime": "2023-10-30T14:14:23.687023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CbIrvo2KeGjtJHPks7"]} -{"Format": "IDEA0", "ID": "71a1aa27-7df6-4829-aead-dca4b7dee3ef", "DetectTime": "2023-10-30T14:14:23.701853+02:00", "EventTime": "2023-10-30T14:14:23.701868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CuxRwp1RdLeGYxoHAa"]} -{"Format": "IDEA0", "ID": "1480e370-2f27-466a-9bae-f6efd93d7d4d", "DetectTime": "2023-10-30T14:14:23.720518+02:00", "EventTime": "2023-10-30T14:14:23.720531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CPaQbK2wfHyaCQcKS2"]} -{"Format": "IDEA0", "ID": "f3cc8488-2664-4dab-83da-3f8afcce9fae", "DetectTime": "2023-10-30T14:14:23.737819+02:00", "EventTime": "2023-10-30T14:14:23.737829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C9mGmv1O8fkShKyT9"]} -{"Format": "IDEA0", "ID": "45c2bbf8-7f36-4fee-a8bf-11263dfd4797", "DetectTime": "2023-10-30T14:14:23.761183+02:00", "EventTime": "2023-10-30T14:14:23.761193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CpR0eV1t6ALK1TOEql"]} -{"Format": "IDEA0", "ID": "32244003-191f-4ac3-8de8-160e1b2c4322", "DetectTime": "2023-10-30T14:14:23.775923+02:00", "EventTime": "2023-10-30T14:14:23.775933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ch0tQg4yu06OJ0Z45"]} -{"Format": "IDEA0", "ID": "3d48b7a1-4512-4bba-aee9-9b3523720ebe", "DetectTime": "2023-10-30T14:14:23.790422+02:00", "EventTime": "2023-10-30T14:14:23.790431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CThyYy27BJozqSsRca"]} -{"Format": "IDEA0", "ID": "a35324a8-2421-4237-886c-bbd1d5e83de4", "DetectTime": "2023-10-30T14:14:23.804558+02:00", "EventTime": "2023-10-30T14:14:23.804567+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cc6ScG2bjk4mnaDtGl"]} -{"Format": "IDEA0", "ID": "d5390d76-bcce-4dd1-b625-129d9c7fd68a", "DetectTime": "2023-10-30T14:14:23.818988+02:00", "EventTime": "2023-10-30T14:14:23.818997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.71.161.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.71.161.90 ", "ContentType": "text/plain"}], "uids": ["CAMf7e4YfocX8ZaAIe"]} -{"Format": "IDEA0", "ID": "59e0523f-dfc8-4f07-8c51-45682216200a", "DetectTime": "2023-10-30T14:14:23.833133+02:00", "EventTime": "2023-10-30T14:14:23.833142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CnqmFx2woGweeLidFk"]} -{"Format": "IDEA0", "ID": "769911e1-37ee-4a07-8700-8c13c2fbabcf", "DetectTime": "2023-10-30T14:14:23.847348+02:00", "EventTime": "2023-10-30T14:14:23.847357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C6x9FayGQ381Ye6fe"]} -{"Format": "IDEA0", "ID": "446249a3-a975-42a4-a319-fea6916e69c7", "DetectTime": "2023-10-30T14:14:23.861933+02:00", "EventTime": "2023-10-30T14:14:23.861942+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CYJJfi2JdNG0Frug0k"]} -{"Format": "IDEA0", "ID": "93dc1914-4a26-4d0b-b2cf-b13c5006c4df", "DetectTime": "2023-10-30T14:14:23.880540+02:00", "EventTime": "2023-10-30T14:14:23.880554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CskSuq2mWiAwVfP7Ri"]} -{"Format": "IDEA0", "ID": "9184398a-540e-4854-a521-1b1f48fce461", "DetectTime": "2023-10-30T14:14:23.899992+02:00", "EventTime": "2023-10-30T14:14:23.900002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CCcjuHJppjobqkZIf"]} -{"Format": "IDEA0", "ID": "90f1c42c-a6a2-42eb-9c7c-ea21ce63e2ce", "DetectTime": "2023-10-30T14:14:23.913970+02:00", "EventTime": "2023-10-30T14:14:23.913979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CSsdeo27VHIewIMlSe"]} -{"Format": "IDEA0", "ID": "4154b291-633c-4801-a249-0d61b8262ee0", "DetectTime": "2023-10-30T14:14:23.927327+02:00", "EventTime": "2023-10-30T14:14:23.927337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CSajlW2CuBqq6MFfP8"]} -{"Format": "IDEA0", "ID": "c6a672e6-36b7-4020-9c12-a1b07b903d70", "DetectTime": "2023-10-30T14:14:23.941334+02:00", "EventTime": "2023-10-30T14:14:23.941344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CE9J543C1rU77tELo2"]} -{"Format": "IDEA0", "ID": "f3e90f52-d7a4-4acb-8ba9-5abdb9d530ca", "DetectTime": "2023-10-30T14:14:23.954942+02:00", "EventTime": "2023-10-30T14:14:23.954953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.77.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.77.90 ", "ContentType": "text/plain"}], "uids": ["CtBEFo1EQ8H2j0z59d"]} -{"Format": "IDEA0", "ID": "503d6a25-a764-4a3c-99c1-783871db87f1", "DetectTime": "2023-10-30T14:14:23.969274+02:00", "EventTime": "2023-10-30T14:14:23.969284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CnfWj92B60GPGliHoi"]} -{"Format": "IDEA0", "ID": "bc2b3a7b-7d8b-400f-916b-2328653e6695", "DetectTime": "2023-10-30T14:14:23.983394+02:00", "EventTime": "2023-10-30T14:14:23.983404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CamM1NyBACYdXPm47"]} -{"Format": "IDEA0", "ID": "60d1129e-93e1-4a53-b034-bcbd24b729e8", "DetectTime": "2023-10-30T14:14:23.997752+02:00", "EventTime": "2023-10-30T14:14:23.997767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CJXZJymEVb96Cc8M6"]} -{"Format": "IDEA0", "ID": "edbc5c2d-a111-4afe-83ae-5ccc78438f1f", "DetectTime": "2023-10-30T14:14:24.012105+02:00", "EventTime": "2023-10-30T14:14:24.012115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C11ZDl2m2OLOFOyGe6"]} -{"Format": "IDEA0", "ID": "69030a52-61c7-4ec6-99f7-a0be48573e23", "DetectTime": "2023-10-30T14:14:24.026299+02:00", "EventTime": "2023-10-30T14:14:24.026309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CcUYPE4exFNVyYx3O6"]} -{"Format": "IDEA0", "ID": "766dacbf-81d1-4905-ad55-2477f542b070", "DetectTime": "2023-10-30T14:14:24.041240+02:00", "EventTime": "2023-10-30T14:14:24.041251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["Cm2rAe1H4vPoxkWppk"]} -{"Format": "IDEA0", "ID": "ad51e4bf-3f1b-408d-a5ce-1a0cfa366360", "DetectTime": "2023-10-30T14:14:24.055521+02:00", "EventTime": "2023-10-30T14:14:24.055531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CmoC4q1oYzrEE9G7p6"]} -{"Format": "IDEA0", "ID": "3f721d14-9172-45d3-8677-73a82392ba7f", "DetectTime": "2023-10-30T14:14:24.070139+02:00", "EventTime": "2023-10-30T14:14:24.070148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["C4FHFAUy6jzG2bRyd"]} -{"Format": "IDEA0", "ID": "9e2759b6-1fcc-40b9-b6f0-f58bb095a035", "DetectTime": "2023-10-30T14:14:24.084813+02:00", "EventTime": "2023-10-30T14:14:24.084824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cv2Nn22XGpPwKh0Lzj"]} -{"Format": "IDEA0", "ID": "06bafa2f-ea13-46b2-833a-512e23441103", "DetectTime": "2023-10-30T14:14:24.098434+02:00", "EventTime": "2023-10-30T14:14:24.098445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C3theQM4KvR7HPXTd"]} -{"Format": "IDEA0", "ID": "19df8621-ab8c-48a1-ba57-6ab3370cb849", "DetectTime": "2023-10-30T14:14:24.112270+02:00", "EventTime": "2023-10-30T14:14:24.112281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CFRFGOs7Bjxzj4Iqk"]} -{"Format": "IDEA0", "ID": "6f5c4f31-c853-4a64-b000-8c45479ca7ba", "DetectTime": "2023-10-30T14:14:24.126187+02:00", "EventTime": "2023-10-30T14:14:24.126196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CXpYUt2Eh2BkrDcuI1"]} -{"Format": "IDEA0", "ID": "ce3fa848-982f-4596-848a-b403739cee74", "DetectTime": "2023-10-30T14:14:24.139278+02:00", "EventTime": "2023-10-30T14:14:24.139288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CqALAd3Zrb0wQu10fj"]} -{"Format": "IDEA0", "ID": "1b7f37da-4378-4122-8c8b-e89227051d1a", "DetectTime": "2023-10-30T14:14:24.162565+02:00", "EventTime": "2023-10-30T14:14:24.162576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C2muyN26W2DOSWYAv6"]} -{"Format": "IDEA0", "ID": "a492ad7b-c3c8-420f-afef-bb8252293b64", "DetectTime": "2023-10-30T14:14:24.178762+02:00", "EventTime": "2023-10-30T14:14:24.178774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CHDI5B1H2wgGicxqXk"]} -{"Format": "IDEA0", "ID": "e13cf4fb-93e5-437d-97e8-d679336116e6", "DetectTime": "2023-10-30T14:14:24.192342+02:00", "EventTime": "2023-10-30T14:14:24.192353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cq9dU91h6yJDSQvecc"]} -{"Format": "IDEA0", "ID": "77677bef-db93-4464-b54c-97b011b88f13", "DetectTime": "2023-10-30T14:14:24.208490+02:00", "EventTime": "2023-10-30T14:14:24.208500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CirVq64U9eZtba8Cvc"]} -{"Format": "IDEA0", "ID": "9a6a36ca-cecb-4621-a060-dedfd402d515", "DetectTime": "2023-10-30T14:14:24.226815+02:00", "EventTime": "2023-10-30T14:14:24.226830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CLe81f1IOZcS46eFwl"]} -{"Format": "IDEA0", "ID": "7a3e3e60-e5e8-49c9-b5ea-b2a41da27945", "DetectTime": "2023-10-30T14:14:24.243316+02:00", "EventTime": "2023-10-30T14:14:24.243327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CIxFlf2gOGFfs33z79"]} -{"Format": "IDEA0", "ID": "ffd33674-6ca7-4171-b169-6378d760f3a5", "DetectTime": "2023-10-30T14:14:24.259133+02:00", "EventTime": "2023-10-30T14:14:24.259143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cz8gft3HZilwixRgqi"]} -{"Format": "IDEA0", "ID": "b1c70526-d185-489b-b250-6c3011f4d41d", "DetectTime": "2023-10-30T14:14:24.277259+02:00", "EventTime": "2023-10-30T14:14:24.277269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cr0IDB3mXtLsAc9D0c"]} -{"Format": "IDEA0", "ID": "e927fc30-4570-4e21-8c0e-43d520e27e5b", "DetectTime": "2023-10-30T14:14:24.295058+02:00", "EventTime": "2023-10-30T14:14:24.295068+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CWuOJDbRZPSlcqIXd"]} -{"Format": "IDEA0", "ID": "0555505e-2393-4da8-93f0-74b300b40625", "DetectTime": "2023-10-30T14:14:24.308861+02:00", "EventTime": "2023-10-30T14:14:24.308871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CPmEICB7dhBMgzgU9"]} -{"Format": "IDEA0", "ID": "095b486b-baf9-4471-bcaa-d8faecb2d5b5", "DetectTime": "2023-10-30T14:14:24.322899+02:00", "EventTime": "2023-10-30T14:14:24.322911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CWRRjVcjLrmy22mvi"]} -{"Format": "IDEA0", "ID": "ce568f87-6a70-4b80-901c-209c30514e68", "DetectTime": "2023-10-30T14:14:24.337304+02:00", "EventTime": "2023-10-30T14:14:24.337315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQiBeL2DPcnaEMtTHc"]} -{"Format": "IDEA0", "ID": "030dbe40-73a5-4969-9c92-ed44b8a89520", "DetectTime": "2023-10-30T14:14:24.356274+02:00", "EventTime": "2023-10-30T14:14:24.356288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CNF5Dv994LlNAxDH1"]} -{"Format": "IDEA0", "ID": "62d94947-4c35-4b83-a9b9-69505349e022", "DetectTime": "2023-10-30T14:14:24.373402+02:00", "EventTime": "2023-10-30T14:14:24.373412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CWujoc1FWOqFtbH9a3"]} -{"Format": "IDEA0", "ID": "5e27f2e8-d415-4245-a575-afe3293fd3c9", "DetectTime": "2023-10-30T14:14:24.391096+02:00", "EventTime": "2023-10-30T14:14:24.391107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C5teLT2cf28yQ3I0r7"]} -{"Format": "IDEA0", "ID": "411e25c4-1a43-49ea-bbe9-5c42b3b18e5d", "DetectTime": "2023-10-30T14:14:24.406760+02:00", "EventTime": "2023-10-30T14:14:24.406772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CE1B2A4TjhJwBCI7xi"]} -{"Format": "IDEA0", "ID": "87dfffbb-0722-4110-8945-51a47a9d47e1", "DetectTime": "2023-10-30T14:14:24.419877+02:00", "EventTime": "2023-10-30T14:14:24.419887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CCL7VK3Qv5S8EEqyZc"]} -{"Format": "IDEA0", "ID": "e51d317b-a04b-4139-94f1-143d6d8076f3", "DetectTime": "2023-10-30T14:14:24.435702+02:00", "EventTime": "2023-10-30T14:14:24.435712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CYr8KF4caoeKQCYXN7"]} -{"Format": "IDEA0", "ID": "4dc6809d-dc74-494d-a214-7a195ffb74d5", "DetectTime": "2023-10-30T14:14:24.448909+02:00", "EventTime": "2023-10-30T14:14:24.448919+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CaMPPumDjVPnwwENh"]} -{"Format": "IDEA0", "ID": "652e2f43-cd3b-46b5-bf18-7366fc46ea64", "DetectTime": "2023-10-30T14:14:24.462237+02:00", "EventTime": "2023-10-30T14:14:24.462248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C7yrtSxHWo9cNyGob"]} -{"Format": "IDEA0", "ID": "75510bea-c4e9-4774-834f-f5c93f400b67", "DetectTime": "2023-10-30T14:14:24.476180+02:00", "EventTime": "2023-10-30T14:14:24.476190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C1FExK1z6Wk7vqNXRl"]} -{"Format": "IDEA0", "ID": "3b236895-5fe7-4913-be9e-9b520f1a4bc5", "DetectTime": "2023-10-30T14:14:24.494051+02:00", "EventTime": "2023-10-30T14:14:24.494067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.71.161.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.71.161.90 ", "ContentType": "text/plain"}], "uids": ["CfaclQ23W0a6b81Ep9"]} -{"Format": "IDEA0", "ID": "b3332231-2fdf-42b1-a396-b6d46366ce22", "DetectTime": "2023-10-30T14:14:24.511212+02:00", "EventTime": "2023-10-30T14:14:24.511229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["C4IUtWl9UWCJ7qUzd"]} -{"Format": "IDEA0", "ID": "b6fbb9eb-ab72-494a-9c3e-90cf8df55db2", "DetectTime": "2023-10-30T14:14:24.531107+02:00", "EventTime": "2023-10-30T14:14:24.531123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CKNAvY2sWzwZZGAkb1"]} -{"Format": "IDEA0", "ID": "71bcfde5-c827-4e7f-b73a-11da3d840108", "DetectTime": "2023-10-30T14:14:24.551077+02:00", "EventTime": "2023-10-30T14:14:24.551092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C1j6ul1tMO8gzyg7Ed"]} -{"Format": "IDEA0", "ID": "b81ebd07-8d92-4f97-954b-7c4dfcfb15d5", "DetectTime": "2023-10-30T14:14:24.570913+02:00", "EventTime": "2023-10-30T14:14:24.570931+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CpKOhr2fd0ddr61Iba"]} -{"Format": "IDEA0", "ID": "a091a644-65cf-4991-9e17-3c8ffe0a56df", "DetectTime": "2023-10-30T14:14:24.589538+02:00", "EventTime": "2023-10-30T14:14:24.589548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Ck4aB73Rvto0bC4EUg"]} -{"Format": "IDEA0", "ID": "bdc4e001-6501-45a4-981b-ca48576ab5b7", "DetectTime": "2023-10-30T14:14:24.602304+02:00", "EventTime": "2023-10-30T14:14:24.602315+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CxzNty2iszNRrdezG7"]} -{"Format": "IDEA0", "ID": "6322c785-22a3-440f-8681-3696a2451176", "DetectTime": "2023-10-30T14:14:24.621149+02:00", "EventTime": "2023-10-30T14:14:24.621163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CMFeh02NeQyt0oK3yl"]} -{"Format": "IDEA0", "ID": "033a6346-5403-4a40-8cd0-57a7a6da0b2b", "DetectTime": "2023-10-30T14:14:24.641213+02:00", "EventTime": "2023-10-30T14:14:24.641227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CnLsXt1qP5KhXX1Wc8"]} -{"Format": "IDEA0", "ID": "1dbeb817-b9c7-46b3-a318-66887c6079cd", "DetectTime": "2023-10-30T14:14:24.659116+02:00", "EventTime": "2023-10-30T14:14:24.659126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.77.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.77.90 ", "ContentType": "text/plain"}], "uids": ["CgR0144WgThx0NDUp3"]} -{"Format": "IDEA0", "ID": "76c0f81c-5b1a-4db1-a6d4-60af86e88a7a", "DetectTime": "2023-10-30T14:14:24.672364+02:00", "EventTime": "2023-10-30T14:14:24.672373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CJJ33G4NdbMMWVM0Ic"]} -{"Format": "IDEA0", "ID": "29f1d12a-d894-46e7-abfd-178e1e6676f8", "DetectTime": "2023-10-30T14:14:24.686839+02:00", "EventTime": "2023-10-30T14:14:24.686850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CoRUfd18zsO1sgULPi"]} -{"Format": "IDEA0", "ID": "296ea7d2-c2e6-419e-a48e-9ae84935d98b", "DetectTime": "2023-10-30T14:14:24.702029+02:00", "EventTime": "2023-10-30T14:14:24.702039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CfRrZK1mMbAG66Hiza"]} -{"Format": "Json", "ID": "296ea7d2-c2e6-419e-a48e-9ae84935d98b", "DetectTime": "2023-10-30T14:14:24.702029+02:00", "EventTime": "2023-10-30T14:14:24.702039+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:48:40.365501+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:24.765408)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b1c868bc-24fa-4da7-982e-c5d02e7f963e", "DetectTime": "2023-10-30T14:14:24.769251+02:00", "EventTime": "2023-10-30T14:14:24.769263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CoQAkB3zcDFZ5IcvO9"]} -{"Format": "IDEA0", "ID": "b525c799-6600-47db-84ba-49a1b0e70fae", "DetectTime": "2023-10-30T14:14:24.790692+02:00", "EventTime": "2023-10-30T14:14:24.790706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CezIj19qyfkf4Kpyc"]} -{"Format": "IDEA0", "ID": "27187910-f22c-454f-a6f0-645276a01d59", "DetectTime": "2023-10-30T14:14:24.811901+02:00", "EventTime": "2023-10-30T14:14:24.811916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CR1GWO1Za1NAfYYs09"]} -{"Format": "IDEA0", "ID": "06167709-29fd-4252-a3d9-f891334f2b96", "DetectTime": "2023-10-30T14:14:24.832349+02:00", "EventTime": "2023-10-30T14:14:24.832363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CSzMZc2FSZQ9HFcy1b"]} -{"Format": "IDEA0", "ID": "31f5f6a0-3ece-4c0e-9fd5-a22d6459c02d", "DetectTime": "2023-10-30T14:14:24.851657+02:00", "EventTime": "2023-10-30T14:14:24.851666+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["Chazw41WtrRDY3ibff"]} -{"Format": "IDEA0", "ID": "262b61be-dfa6-432a-975a-084632c9fc2c", "DetectTime": "2023-10-30T14:14:24.865585+02:00", "EventTime": "2023-10-30T14:14:24.865595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZZ7db2aHqZB2v9Kf8"]} -{"Format": "IDEA0", "ID": "a1dcb7cc-b8c2-45a9-af81-a6382a32b5db", "DetectTime": "2023-10-30T14:14:24.879478+02:00", "EventTime": "2023-10-30T14:14:24.879490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CTYqeVrafRkElkFRa"]} -{"Format": "IDEA0", "ID": "38592e54-71dd-45b7-9a5b-f0b24eb1580a", "DetectTime": "2023-10-30T14:14:24.893895+02:00", "EventTime": "2023-10-30T14:14:24.893905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C0W9Mk3SRueHjdhJTl"]} -{"Format": "IDEA0", "ID": "113a3641-eb4b-40c3-987e-a4afc60c37c9", "DetectTime": "2023-10-30T14:14:24.909971+02:00", "EventTime": "2023-10-30T14:14:24.909982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CC0Pe9YMZbbxFlIE4"]} -{"Format": "IDEA0", "ID": "c47a349a-dfee-4e78-9c07-dc15bb1c517d", "DetectTime": "2023-10-30T14:14:24.926435+02:00", "EventTime": "2023-10-30T14:14:24.926447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Ca5h8M1MSLGkv9AH39"]} -{"Format": "IDEA0", "ID": "ef4b83ec-d29f-4fbc-a28c-624f99c9a774", "DetectTime": "2023-10-30T14:14:24.941686+02:00", "EventTime": "2023-10-30T14:14:24.941695+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CqmlXy44ABSSsCiEbl"]} -{"Format": "IDEA0", "ID": "b94df6e1-9ff1-4bbd-a050-7a6091e3e9d4", "DetectTime": "2023-10-30T14:14:24.958193+02:00", "EventTime": "2023-10-30T14:14:24.958209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.71.161.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 184.71.161.90 ", "ContentType": "text/plain"}], "uids": ["C7IwBfViLTB85zHSj"]} -{"Format": "IDEA0", "ID": "d5497e80-f21e-47a6-9af3-cd0fa2319a8d", "DetectTime": "2023-10-30T14:14:24.974265+02:00", "EventTime": "2023-10-30T14:14:24.974275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cq39dlrvf3p9iAgWi"]} -{"Format": "IDEA0", "ID": "67312416-db70-46a2-8def-05bf3574ec2a", "DetectTime": "2023-10-30T14:14:24.990421+02:00", "EventTime": "2023-10-30T14:14:24.990431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CrT0Nz1D4AiV0yRix4"]} -{"Format": "IDEA0", "ID": "8fca48b2-d580-4f63-a961-f52927915369", "DetectTime": "2023-10-30T14:14:25.010562+02:00", "EventTime": "2023-10-30T14:14:25.010576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CV2Afy2qUMtQ5Dguq3"]} -{"Format": "IDEA0", "ID": "a1400194-0475-4cdc-8b35-f08c15060540", "DetectTime": "2023-10-30T14:14:25.028609+02:00", "EventTime": "2023-10-30T14:14:25.028622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CUFTdI1QxiNqXt3MGd"]} -{"Format": "IDEA0", "ID": "2aff13a6-dec2-42f6-bd1f-0cffa074b3a1", "DetectTime": "2023-10-30T14:14:25.046515+02:00", "EventTime": "2023-10-30T14:14:25.046526+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CcrlJD3BuhlsSQrxl3"]} -{"Format": "IDEA0", "ID": "c2faea03-c9e7-4098-99ae-8b9cf9175905", "DetectTime": "2023-10-30T14:14:25.061256+02:00", "EventTime": "2023-10-30T14:14:25.061271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cy0gno3nPwdP8nBE53"]} -{"Format": "IDEA0", "ID": "e0c9cca6-7f38-4586-bfea-a67e232b8e28", "DetectTime": "2023-10-30T14:14:25.076394+02:00", "EventTime": "2023-10-30T14:14:25.076403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C5UCDg4m4e9GN1b7ff"]} -{"Format": "IDEA0", "ID": "94efb54d-7afb-44dd-b16b-156a4607c91b", "DetectTime": "2023-10-30T14:14:25.091202+02:00", "EventTime": "2023-10-30T14:14:25.091212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C3zBMn34FB8T44IHP3"]} -{"Format": "IDEA0", "ID": "cec8255d-0838-49bc-ace7-96434406b13a", "DetectTime": "2023-10-30T14:14:25.105839+02:00", "EventTime": "2023-10-30T14:14:25.105850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CICYEW3eSYN7a4Yq33"]} -{"Format": "IDEA0", "ID": "58389edc-55c2-4590-ada9-0110430981de", "DetectTime": "2023-10-30T14:14:25.120316+02:00", "EventTime": "2023-10-30T14:14:25.120327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CO2vlM2YNdLxWekYLb"]} -{"Format": "IDEA0", "ID": "6adf2bb0-87d7-4149-853d-f340fe858a02", "DetectTime": "2023-10-30T14:14:25.134894+02:00", "EventTime": "2023-10-30T14:14:25.134904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C4QXjI3441HghxE2Rg"]} -{"Format": "IDEA0", "ID": "3516a59f-34d1-4b1e-a9ac-703351936034", "DetectTime": "2023-10-30T14:14:25.149493+02:00", "EventTime": "2023-10-30T14:14:25.149506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CNtV9G43VjpzHW9p1c"]} -{"Format": "IDEA0", "ID": "9267c6e3-64a4-47f7-bee8-0a71745cfc41", "DetectTime": "2023-10-30T14:14:25.165186+02:00", "EventTime": "2023-10-30T14:14:25.165196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CcGPqf25wylDK6Qqk7"]} -{"Format": "IDEA0", "ID": "35e328bb-5862-49d7-9a7d-6bbcc292e8d9", "DetectTime": "2023-10-30T14:14:25.181228+02:00", "EventTime": "2023-10-30T14:14:25.181238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CVGrZn4oxNuRh9rmvj"]} -{"Format": "IDEA0", "ID": "a99ae594-7830-4ef4-8c66-2aee9f4a83b5", "DetectTime": "2023-10-30T14:14:25.197258+02:00", "EventTime": "2023-10-30T14:14:25.197268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CwxvWY2tHzwjVTPtBj"]} -{"Format": "IDEA0", "ID": "469cdfce-8e48-4b67-95a4-06520a436785", "DetectTime": "2023-10-30T14:14:25.211488+02:00", "EventTime": "2023-10-30T14:14:25.211499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C4B1JzBLC5USgwR77"]} -{"Format": "IDEA0", "ID": "c84f3027-ab2b-4aed-9d5f-373a807588b6", "DetectTime": "2023-10-30T14:14:25.225554+02:00", "EventTime": "2023-10-30T14:14:25.225565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CS7rLpulkO7qp08Yh"]} -{"Format": "IDEA0", "ID": "df1ddc75-e03f-4d67-bbbb-3d155b4e919b", "DetectTime": "2023-10-30T14:14:25.240564+02:00", "EventTime": "2023-10-30T14:14:25.240573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CNBc8o3aKaUFJJig81"]} -{"Format": "IDEA0", "ID": "0322b3eb-c527-44f8-8d44-1294cd260a61", "DetectTime": "2023-10-30T14:14:25.254963+02:00", "EventTime": "2023-10-30T14:14:25.254973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CjYeEu4sOUDbMwfgr5"]} -{"Format": "IDEA0", "ID": "2fe1924d-2a4c-448b-9fc0-643ec3d99785", "DetectTime": "2023-10-30T14:14:25.269235+02:00", "EventTime": "2023-10-30T14:14:25.269244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CC7YyzuGYSae8Zowf"]} -{"Format": "IDEA0", "ID": "91f845a2-f482-423e-9132-b48348ba9c83", "DetectTime": "2023-10-30T14:14:25.283306+02:00", "EventTime": "2023-10-30T14:14:25.283316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CG7hKp1g14MPMTmVSg"]} -{"Format": "IDEA0", "ID": "b068fd2f-ba03-4f98-b373-e2ad385ca2b6", "DetectTime": "2023-10-30T14:14:25.298631+02:00", "EventTime": "2023-10-30T14:14:25.298641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CAxaup2X7hSd9vcDrf"]} -{"Format": "IDEA0", "ID": "263f3918-91b5-4fe9-8b7e-43f420e02984", "DetectTime": "2023-10-30T14:14:25.313168+02:00", "EventTime": "2023-10-30T14:14:25.313178+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CDc17b4yoJQXEvoEFf"]} -{"Format": "IDEA0", "ID": "26bb7276-7cc6-4806-9f0c-751dd0e804ba", "DetectTime": "2023-10-30T14:14:25.334357+02:00", "EventTime": "2023-10-30T14:14:25.334367+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CanGVf3WVXxz0Wbp46"]} -{"Format": "IDEA0", "ID": "1b75a96d-b45a-4b11-9616-c142e6f35104", "DetectTime": "2023-10-30T14:14:25.348347+02:00", "EventTime": "2023-10-30T14:14:25.348356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CTZpVi2uyLf1jxW2Wc"]} -{"Format": "IDEA0", "ID": "933aea70-2e27-4da0-9415-3f0b7c34ad4e", "DetectTime": "2023-10-30T14:14:25.363230+02:00", "EventTime": "2023-10-30T14:14:25.363241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["COwsr84U2EkFgKmow5"]} -{"Format": "IDEA0", "ID": "cd959e82-0d45-46a7-83b9-2d720b67147a", "DetectTime": "2023-10-30T14:14:25.378811+02:00", "EventTime": "2023-10-30T14:14:25.378824+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CHkdrc40ocB25irhK8"]} -{"Format": "IDEA0", "ID": "61368a92-1153-4702-99e8-3d37619695d7", "DetectTime": "2023-10-30T14:14:25.394118+02:00", "EventTime": "2023-10-30T14:14:25.394130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.77.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.77.90 ", "ContentType": "text/plain"}], "uids": ["Cmqusd29UOWrHhjbnj"]} -{"Format": "IDEA0", "ID": "f17d0552-b46a-4dbe-9455-a25ec5421e77", "DetectTime": "2023-10-30T14:14:25.409473+02:00", "EventTime": "2023-10-30T14:14:25.409489+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CpQeSL2qow47PqxfWh"]} -{"Format": "IDEA0", "ID": "d7b1a2cc-d266-468e-8c5c-aaeb15983cf3", "DetectTime": "2023-10-30T14:14:25.425268+02:00", "EventTime": "2023-10-30T14:14:25.425279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C43VUv3WoMKVib7dle"]} -{"Format": "IDEA0", "ID": "48fc7832-f803-4486-b768-dd990920c217", "DetectTime": "2023-10-30T14:14:25.444559+02:00", "EventTime": "2023-10-30T14:14:25.444578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CDi6Gg1JOSVdPBI2gf"]} -{"Format": "IDEA0", "ID": "0a80ef90-65eb-4be0-8d87-8ebe2d09a576", "DetectTime": "2023-10-30T14:14:25.466933+02:00", "EventTime": "2023-10-30T14:14:25.466947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CgA23r2foZZU9O4Lmg"]} -{"Format": "IDEA0", "ID": "243172d3-0edf-417b-9b70-1ead763230d6", "DetectTime": "2023-10-30T14:14:25.483625+02:00", "EventTime": "2023-10-30T14:14:25.483637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["C0Al5q24rMn64KK3Sg"]} -{"Format": "IDEA0", "ID": "96b34d54-c2e2-48cc-8f1a-ed8ee52da974", "DetectTime": "2023-10-30T14:14:25.498630+02:00", "EventTime": "2023-10-30T14:14:25.498644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CdpGio4CTlXxCUvc9h"]} -{"Format": "IDEA0", "ID": "8d0afdd5-fb6d-453a-8f63-6d04e2421908", "DetectTime": "2023-10-30T14:14:25.513628+02:00", "EventTime": "2023-10-30T14:14:25.513639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CQ7nwq4fwlwdr0hLsj"]} -{"Format": "IDEA0", "ID": "362c89da-0cd2-4beb-b0fc-d9d182a11840", "DetectTime": "2023-10-30T14:14:25.527972+02:00", "EventTime": "2023-10-30T14:14:25.527982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CXi2pl2R2APLmeP77k"]} -{"Format": "IDEA0", "ID": "9bdebfba-e1d4-44d1-84b9-05cf45ed79e9", "DetectTime": "2023-10-30T14:14:25.541593+02:00", "EventTime": "2023-10-30T14:14:25.541602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CFQQ9D2xGR4KRBfP9f"]} -{"Format": "IDEA0", "ID": "9978ef9f-a9fd-4338-8ada-da5b014c9a57", "DetectTime": "2023-10-30T14:14:25.555621+02:00", "EventTime": "2023-10-30T14:14:25.555632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CbE7Lf3DWQ2wV7reW2"]} -{"Format": "IDEA0", "ID": "84cbcedf-55df-4593-9e8a-5ce7e1ff6a45", "DetectTime": "2023-10-30T14:14:25.570578+02:00", "EventTime": "2023-10-30T14:14:25.570588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CKjqdo3ytltw15zmTd"]} -{"Format": "IDEA0", "ID": "5137b56c-20a5-43f3-9e22-ccd87400932d", "DetectTime": "2023-10-30T14:14:25.585665+02:00", "EventTime": "2023-10-30T14:14:25.585679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CkTRS51SnS5jM98Dj7"]} -{"Format": "IDEA0", "ID": "82895450-2b4a-43c4-888b-f5733d867f52", "DetectTime": "2023-10-30T14:14:25.600788+02:00", "EventTime": "2023-10-30T14:14:25.600798+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cnzocz3Rz7Zcp8Qc3"]} -{"Format": "IDEA0", "ID": "7b4cc619-7a03-4411-b88a-07e7db77ebdc", "DetectTime": "2023-10-30T14:14:25.616294+02:00", "EventTime": "2023-10-30T14:14:25.616303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CpBlBp2dtPDD2hUO4b"]} -{"Format": "IDEA0", "ID": "ced63761-f6f2-4406-80f5-00399cf346e6", "DetectTime": "2023-10-30T14:14:25.630885+02:00", "EventTime": "2023-10-30T14:14:25.630896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CthbQi3TKUSxRc2LT7"]} -{"Format": "IDEA0", "ID": "b8a81a46-21f2-4986-8195-07f83cdff2a2", "DetectTime": "2023-10-30T14:14:25.646382+02:00", "EventTime": "2023-10-30T14:14:25.646393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C1TiVF2bmyWsqRep89"]} -{"Format": "IDEA0", "ID": "ea439c43-294d-42b6-ba79-2f3b416d4f0f", "DetectTime": "2023-10-30T14:14:25.661547+02:00", "EventTime": "2023-10-30T14:14:25.661557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CYBk6b1re3gkqCEtB3"]} -{"Format": "IDEA0", "ID": "a208b590-7d4b-4820-9fce-07844c025642", "DetectTime": "2023-10-30T14:14:25.676953+02:00", "EventTime": "2023-10-30T14:14:25.676963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CWrhgV1DWh1OSUkd4"]} -{"Format": "IDEA0", "ID": "abf1c1a6-dc8b-4985-bfdc-f8a60987da17", "DetectTime": "2023-10-30T14:14:25.691808+02:00", "EventTime": "2023-10-30T14:14:25.691817+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CHMypd4L9N6r6klmDf"]} -{"Format": "IDEA0", "ID": "d7c0df98-aa5f-4202-8af7-3750ac21e450", "DetectTime": "2023-10-30T14:14:25.716226+02:00", "EventTime": "2023-10-30T14:14:25.716236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CdP59813vhMrqG3ove"]} -{"Format": "IDEA0", "ID": "5efa5b5d-382d-463e-90ad-58dfd2b2cb85", "DetectTime": "2023-10-30T14:14:25.732059+02:00", "EventTime": "2023-10-30T14:14:25.732069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CUeujO26Q5hvEkLOX3"]} -{"Format": "IDEA0", "ID": "b9b0bf17-1b0e-45d3-81fc-aae7d4a0feb4", "DetectTime": "2023-10-30T14:14:25.747283+02:00", "EventTime": "2023-10-30T14:14:25.747293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CUvA2h1lgZHpcy4Am4"]} -{"Format": "IDEA0", "ID": "34e1ded3-0c16-43b5-b898-ae7b7837f3a1", "DetectTime": "2023-10-30T14:14:25.770199+02:00", "EventTime": "2023-10-30T14:14:25.770214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cl1YJr2MzaQnhyKuY"]} -{"Format": "IDEA0", "ID": "8bbfcc7a-c650-4e7f-9474-b0f826091046", "DetectTime": "2023-10-30T14:14:25.791171+02:00", "EventTime": "2023-10-30T14:14:25.791195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cth99w2OHM9LXrll9h"]} -{"Format": "IDEA0", "ID": "472b7916-5abd-411d-9c9e-6a10aade89e4", "DetectTime": "2023-10-30T14:14:25.812984+02:00", "EventTime": "2023-10-30T14:14:25.813005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CNa2Hu1ffXh5iliVP3"]} -{"Format": "IDEA0", "ID": "d23a9b01-9e04-4edf-a777-be692761808b", "DetectTime": "2023-10-30T14:14:25.828350+02:00", "EventTime": "2023-10-30T14:14:25.828361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CUyEGu43ghN1NmXfAh"]} -{"Format": "IDEA0", "ID": "9586432c-35e5-4b07-a547-0810a9cd2456", "DetectTime": "2023-10-30T14:14:25.844750+02:00", "EventTime": "2023-10-30T14:14:25.844763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CNcie52bEtyaMRNEy1"]} -{"Format": "IDEA0", "ID": "13eaa642-9e00-4534-842f-f85e3a0cb51d", "DetectTime": "2023-10-30T14:14:25.862023+02:00", "EventTime": "2023-10-30T14:14:25.862035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CSpPhK3lsvTkiarCRc"]} -{"Format": "IDEA0", "ID": "4163c4b1-c5fe-4cd0-9f7a-fce2dcc29940", "DetectTime": "2023-10-30T14:14:25.879000+02:00", "EventTime": "2023-10-30T14:14:25.879011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CjDEVb1cPMqQnc9iZd"]} -{"Format": "IDEA0", "ID": "c85ba790-59f8-4d9b-a591-8f437b37e41d", "DetectTime": "2023-10-30T14:14:25.895531+02:00", "EventTime": "2023-10-30T14:14:25.895541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CTo8nm3VPaHjUL0YF9"]} -{"Format": "IDEA0", "ID": "7c4ca971-ebdb-4d29-9643-fdf771d15630", "DetectTime": "2023-10-30T14:14:25.915004+02:00", "EventTime": "2023-10-30T14:14:25.915020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CCTSpp3fNhSqzG5T68"]} -{"Format": "IDEA0", "ID": "c215cf1b-92e4-4885-8157-6c143b17d0a0", "DetectTime": "2023-10-30T14:14:25.935955+02:00", "EventTime": "2023-10-30T14:14:25.935968+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CuHLQY2WwbteLTEwl"]} -{"Format": "IDEA0", "ID": "3b5f837c-798c-4904-affa-0eafe64c958d", "DetectTime": "2023-10-30T14:14:25.957334+02:00", "EventTime": "2023-10-30T14:14:25.957349+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CRhC9t3jeGVtrbwV4d"]} -{"Format": "IDEA0", "ID": "9c65df05-6d70-4cfd-b3b2-671653a6df4b", "DetectTime": "2023-10-30T14:14:25.977072+02:00", "EventTime": "2023-10-30T14:14:25.977083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cmu8jP3Io3weEbjo33"]} -{"Format": "IDEA0", "ID": "2270b0c9-fb23-43b7-84a9-b3baad169393", "DetectTime": "2023-10-30T14:14:25.993180+02:00", "EventTime": "2023-10-30T14:14:25.993191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CXOGb6TwEDpP3j9s5"]} -{"Format": "IDEA0", "ID": "d6892cac-b9c1-47bc-98a1-d72069a7e4cf", "DetectTime": "2023-10-30T14:14:26.008892+02:00", "EventTime": "2023-10-30T14:14:26.008901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CQa3heVYy8WqD2SWg"]} -{"Format": "IDEA0", "ID": "e60fdf9e-77ee-48aa-b150-ab9e5fea4281", "DetectTime": "2023-10-30T14:14:26.024097+02:00", "EventTime": "2023-10-30T14:14:26.024107+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CjbIOn2tABLQBB8wU7"]} -{"Format": "IDEA0", "ID": "bec230fd-a3e6-471a-857e-3385f570b5c3", "DetectTime": "2023-10-30T14:14:26.039310+02:00", "EventTime": "2023-10-30T14:14:26.039326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cp61BL3Gu3UapOR8ph"]} -{"Format": "IDEA0", "ID": "7d6599b6-0e05-4859-bb4f-ce370efcdfec", "DetectTime": "2023-10-30T14:14:26.060402+02:00", "EventTime": "2023-10-30T14:14:26.060412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CTRonPQuZGW1Fswdg"]} -{"Format": "IDEA0", "ID": "2742ae33-1976-4c96-8251-4be3ee048ef4", "DetectTime": "2023-10-30T14:14:26.075347+02:00", "EventTime": "2023-10-30T14:14:26.075357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CX7aK0HbAgpLhlp"]} -{"Format": "IDEA0", "ID": "0efc0313-7bb5-44d6-a6c6-b9b0e4c95c5c", "DetectTime": "2023-10-30T14:14:26.095625+02:00", "EventTime": "2023-10-30T14:14:26.095641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CWFLti2wHykDoDVHge"]} -{"Format": "IDEA0", "ID": "646b32a5-825e-45af-959d-9cba67124e0a", "DetectTime": "2023-10-30T14:14:26.112648+02:00", "EventTime": "2023-10-30T14:14:26.112658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["C3iE8D1zukxTzTn0z7"]} -{"Format": "IDEA0", "ID": "fb8aae6b-9271-43ed-874e-2e00682c6b13", "DetectTime": "2023-10-30T14:14:26.126976+02:00", "EventTime": "2023-10-30T14:14:26.126987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CBUYM23WUeSWUhr2jk"]} -{"Format": "IDEA0", "ID": "7533b6c2-706d-45a4-94b1-1b133e560ea4", "DetectTime": "2023-10-30T14:14:26.141825+02:00", "EventTime": "2023-10-30T14:14:26.141835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.77.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.77.90 ", "ContentType": "text/plain"}], "uids": ["C7ZLnw2sdpml7sU1Wf"]} -{"Format": "IDEA0", "ID": "6ab33a65-bacc-4744-827e-29d3a3e4660c", "DetectTime": "2023-10-30T14:14:26.157157+02:00", "EventTime": "2023-10-30T14:14:26.157167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CKf8xIvK1O1iLfYa4"]} -{"Format": "IDEA0", "ID": "81fbe546-821d-4df1-922a-497f956fdf89", "DetectTime": "2023-10-30T14:14:26.171979+02:00", "EventTime": "2023-10-30T14:14:26.171989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CIzF2g4S8LLiZXzXZ"]} -{"Format": "IDEA0", "ID": "9ad7ea7a-006a-4902-a162-3426cf474d9b", "DetectTime": "2023-10-30T14:14:26.187613+02:00", "EventTime": "2023-10-30T14:14:26.187627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CEmnhq3vrUYHtm1jqh"]} -{"Format": "IDEA0", "ID": "a630c45a-1273-4bc2-b59e-64c9e113afeb", "DetectTime": "2023-10-30T14:14:26.204048+02:00", "EventTime": "2023-10-30T14:14:26.204058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CjD4DB1bd6LbuKTBng"]} -{"Format": "IDEA0", "ID": "f8244f02-feaa-4f3b-b4f5-f75cd17ff6c6", "DetectTime": "2023-10-30T14:14:26.220253+02:00", "EventTime": "2023-10-30T14:14:26.220263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CJbQGo3UVOC96DdXY3"]} -{"Format": "IDEA0", "ID": "c68733cf-a289-4de8-9381-c07fcd75dc0b", "DetectTime": "2023-10-30T14:14:26.236562+02:00", "EventTime": "2023-10-30T14:14:26.236573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjrOek3gKJHC222J"]} -{"Format": "IDEA0", "ID": "bd9a325e-7819-4566-b7c2-fc740a2940d2", "DetectTime": "2023-10-30T14:14:26.254205+02:00", "EventTime": "2023-10-30T14:14:26.254218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C6Out22YhaJ5dNH7b2"]} -{"Format": "IDEA0", "ID": "40a8219d-4beb-481f-88d2-8b53ba076587", "DetectTime": "2023-10-30T14:14:26.270201+02:00", "EventTime": "2023-10-30T14:14:26.270211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cpi3Jr1Nul5U8QZ4jf"]} -{"Format": "IDEA0", "ID": "ccb669e3-dd57-47e1-bfe2-d8e12992530b", "DetectTime": "2023-10-30T14:14:26.285548+02:00", "EventTime": "2023-10-30T14:14:26.285559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.77.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.232.77.90 ", "ContentType": "text/plain"}], "uids": ["Csm1xi1fdU93578Aqb"]} -{"Format": "IDEA0", "ID": "bc0e5b8d-7b41-48d8-a533-6eb330635cd3", "DetectTime": "2023-10-30T14:14:26.302497+02:00", "EventTime": "2023-10-30T14:14:26.302507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CuMOPA3AsMXp0AvLq9"]} -{"Format": "IDEA0", "ID": "8afdd5d6-6784-4cec-97b3-15fc0c52a21d", "DetectTime": "2023-10-30T14:14:26.317285+02:00", "EventTime": "2023-10-30T14:14:26.317295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CVmdqLywB3k5hQPI4"]} -{"Format": "IDEA0", "ID": "70019dcb-dbdd-4550-b95b-edad89663bba", "DetectTime": "2023-10-30T14:14:26.331713+02:00", "EventTime": "2023-10-30T14:14:26.331723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CpIZ141DtD3aRKSy02"]} -{"Format": "IDEA0", "ID": "22265c62-4659-4386-82d5-be09850169b8", "DetectTime": "2023-10-30T14:14:26.345882+02:00", "EventTime": "2023-10-30T14:14:26.345891+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCrbMl1snd7vT33sf7"]} -{"Format": "IDEA0", "ID": "33da12cd-a714-4408-b830-da0062b03da2", "DetectTime": "2023-10-30T14:14:26.362119+02:00", "EventTime": "2023-10-30T14:14:26.362133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CIglVo2n9yDNkWlmej"]} -{"Format": "IDEA0", "ID": "bcbc6e67-724e-445f-912c-25cbb6dfed0c", "DetectTime": "2023-10-30T14:14:26.379674+02:00", "EventTime": "2023-10-30T14:14:26.379684+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CX0MyD27uFandZDjqj"]} -{"Format": "IDEA0", "ID": "4ed20932-6bfd-4b6e-ada1-5acf23adea51", "DetectTime": "2023-10-30T14:14:26.394741+02:00", "EventTime": "2023-10-30T14:14:26.394753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CCjoiz3CRELs92BjV9"]} -{"Format": "IDEA0", "ID": "b3821a7c-1c15-4a8c-bbaf-31d7c8995425", "DetectTime": "2023-10-30T14:14:26.408943+02:00", "EventTime": "2023-10-30T14:14:26.408958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CVQ1znVdWjjIae3Y4"]} -{"Format": "IDEA0", "ID": "63866a2c-9f4b-4cc3-99c0-296d3c19a0c5", "DetectTime": "2023-10-30T14:14:26.431018+02:00", "EventTime": "2023-10-30T14:14:26.431031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CnTS4f4fd1mOHQ1xN7"]} -{"Format": "IDEA0", "ID": "80b50b48-48dd-420a-ac7c-114b719ee20c", "DetectTime": "2023-10-30T14:14:26.445967+02:00", "EventTime": "2023-10-30T14:14:26.445983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CxX4Fg1YasDJDMCEo2"]} -{"Format": "IDEA0", "ID": "b3e60db4-2608-4a2f-b6c1-6fbd25d4bb8f", "DetectTime": "2023-10-30T14:14:26.462741+02:00", "EventTime": "2023-10-30T14:14:26.462755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CJ6X082LtcC0YwXxza"]} -{"Format": "IDEA0", "ID": "25aba2f1-4c18-4487-be4e-fee723a6bfe0", "DetectTime": "2023-10-30T14:14:26.478934+02:00", "EventTime": "2023-10-30T14:14:26.478945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CXWgSH3F5vndhKdzqf"]} -{"Format": "IDEA0", "ID": "c21b7a94-d21a-4f44-a851-0ed948dff1bf", "DetectTime": "2023-10-30T14:14:26.495040+02:00", "EventTime": "2023-10-30T14:14:26.495057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cqq6VL1rt3Mq1SbDoh"]} -{"Format": "IDEA0", "ID": "7cc8534a-29d5-45ec-a5ed-bf98d714bd1e", "DetectTime": "2023-10-30T14:14:26.509682+02:00", "EventTime": "2023-10-30T14:14:26.509693+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CXoXOS3kD4KnIBrm8l"]} -{"Format": "IDEA0", "ID": "484cad95-238f-4585-83f4-ea58133bf9bf", "DetectTime": "2023-10-30T14:14:26.525673+02:00", "EventTime": "2023-10-30T14:14:26.525683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CjddeO2wcIdlz8TQk6"]} -{"Format": "IDEA0", "ID": "9c3c6d3e-2872-4a2a-b3dc-c5d97745dea9", "DetectTime": "2023-10-30T14:14:26.541732+02:00", "EventTime": "2023-10-30T14:14:26.541747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7EoRY3g72EjnDxSh7"]} -{"Format": "IDEA0", "ID": "54af7ca6-cf64-4f77-a54c-a017e4256afa", "DetectTime": "2023-10-30T14:14:26.557147+02:00", "EventTime": "2023-10-30T14:14:26.557156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CwMEuS1gMO3nSjIObj"]} -{"Format": "IDEA0", "ID": "0091b7b3-7b4f-4a40-a5e5-08f6f2e22f99", "DetectTime": "2023-10-30T14:14:26.572088+02:00", "EventTime": "2023-10-30T14:14:26.572098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CQnAsj162GSZyRvRSe"]} -{"Format": "IDEA0", "ID": "903c7f17-d619-4634-94fe-72114dda5307", "DetectTime": "2023-10-30T14:14:26.587079+02:00", "EventTime": "2023-10-30T14:14:26.587089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Co7tPq2nY3RPJqlCw1"]} -{"Format": "IDEA0", "ID": "d3d783b3-2b30-4a8f-8ae1-a18b143b924d", "DetectTime": "2023-10-30T14:14:26.601101+02:00", "EventTime": "2023-10-30T14:14:26.601115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CA6OEV5d4681m7Xa9"]} -{"Format": "IDEA0", "ID": "be863529-a428-4491-8148-db1f3f0d9d23", "DetectTime": "2023-10-30T14:14:26.619094+02:00", "EventTime": "2023-10-30T14:14:26.619105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0Ab2D3WlYdLgsTBgf"]} -{"Format": "IDEA0", "ID": "f08ffb41-43c2-4f61-87ee-ae68e1227c26", "DetectTime": "2023-10-30T14:14:26.635639+02:00", "EventTime": "2023-10-30T14:14:26.635650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["C9R0notIbGGLlf5C5"]} -{"Format": "IDEA0", "ID": "7402f5f9-940c-4861-accc-5314b6a89b9f", "DetectTime": "2023-10-30T14:14:26.652068+02:00", "EventTime": "2023-10-30T14:14:26.652083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["Cwbxm228ju6YmUVWF5"]} -{"Format": "IDEA0", "ID": "3efb1c42-0aa4-46c3-8a56-b4e32f0565bd", "DetectTime": "2023-10-30T14:14:26.668937+02:00", "EventTime": "2023-10-30T14:14:26.668951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C6y00c1gYXOVI8Z2P8"]} -{"Format": "IDEA0", "ID": "18306f60-f411-4680-8807-58ed1c36059f", "DetectTime": "2023-10-30T14:14:26.685389+02:00", "EventTime": "2023-10-30T14:14:26.685400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C7Z10U3QXTn6YOmeWf"]} -{"Format": "IDEA0", "ID": "3add1c23-fac7-49aa-ac5c-b182bd7c3fc7", "DetectTime": "2023-10-30T14:14:26.701622+02:00", "EventTime": "2023-10-30T14:14:26.701637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CVXV6I1F5YmZuWvcXi"]} -{"Format": "IDEA0", "ID": "866baeb9-b68d-45d9-abba-942cce8437ff", "DetectTime": "2023-10-30T14:14:26.717767+02:00", "EventTime": "2023-10-30T14:14:26.717785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CFuQCV12Nmy4vw8j7i"]} -{"Format": "IDEA0", "ID": "ad4eef6f-f2c5-4a1a-b30e-de93652e7f2f", "DetectTime": "2023-10-30T14:14:26.734009+02:00", "EventTime": "2023-10-30T14:14:26.734021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CuuatH3ahNZ7qiUkqf"]} -{"Format": "IDEA0", "ID": "ff9deabf-81b5-4840-b761-82533461d20d", "DetectTime": "2023-10-30T14:14:26.749800+02:00", "EventTime": "2023-10-30T14:14:26.749809+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CEa8j33M9uGIlWMOP4"]} -{"Format": "IDEA0", "ID": "2b2e2e21-3318-4705-8e09-c3e55debea44", "DetectTime": "2023-10-30T14:14:26.767632+02:00", "EventTime": "2023-10-30T14:14:26.767645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["CvFFKz2B4ew9oaJhX5"]} -{"Format": "IDEA0", "ID": "3e30c2a4-dbb8-4b86-8a85-dbba4b585fe7", "DetectTime": "2023-10-30T14:14:26.782541+02:00", "EventTime": "2023-10-30T14:14:26.782551+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cr8YtftZxPWTbm2k"]} -{"Format": "IDEA0", "ID": "4970dce8-ece5-4edf-9e0c-dd709f5b2184", "DetectTime": "2023-10-30T14:14:26.797871+02:00", "EventTime": "2023-10-30T14:14:26.797883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["ClwgBV1bVkzni3nIec"]} -{"Format": "IDEA0", "ID": "a9001e24-d435-457e-b765-5413157b39c5", "DetectTime": "2023-10-30T14:14:26.814647+02:00", "EventTime": "2023-10-30T14:14:26.814658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CzYSsb2KXioGyvCyS6"]} -{"Format": "IDEA0", "ID": "57b90d17-fa65-4ce7-abd7-04c9f52a6f32", "DetectTime": "2023-10-30T14:14:26.830766+02:00", "EventTime": "2023-10-30T14:14:26.830789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CoB9qv35lWRPi74ALi"]} -{"Format": "IDEA0", "ID": "404d17ed-9473-434b-b8ff-c6a83b7c9cb4", "DetectTime": "2023-10-30T14:14:26.847071+02:00", "EventTime": "2023-10-30T14:14:26.847084+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["C3EjYD1HFm1N8tKWY6"]} -{"Format": "IDEA0", "ID": "20b2472b-e487-4405-8358-cc16b75644ac", "DetectTime": "2023-10-30T14:14:26.863732+02:00", "EventTime": "2023-10-30T14:14:26.863747+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CD213p3M2KI2kD04l5"]} -{"Format": "IDEA0", "ID": "36990d99-7e62-4c09-810c-db854c9e9962", "DetectTime": "2023-10-30T14:14:26.879760+02:00", "EventTime": "2023-10-30T14:14:26.879769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CiRav41uvMqFYJyal"]} -{"Format": "IDEA0", "ID": "26b9735a-b2eb-4bf6-9265-01c6dc62a827", "DetectTime": "2023-10-30T14:14:26.895417+02:00", "EventTime": "2023-10-30T14:14:26.895427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CPmFT73Oq6P9aFLws4"]} -{"Format": "IDEA0", "ID": "4810109b-c9af-4be5-adf8-5928eb6a126c", "DetectTime": "2023-10-30T14:14:26.917090+02:00", "EventTime": "2023-10-30T14:14:26.917099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C7jJ1A2o8v1b5gPl1k"]} -{"Format": "IDEA0", "ID": "25dd87c2-ee24-470d-981d-d959e9458d38", "DetectTime": "2023-10-30T14:14:26.931956+02:00", "EventTime": "2023-10-30T14:14:26.931966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CzBYaH3RRW8UrEhoVh"]} -{"Format": "IDEA0", "ID": "9e915cc8-0982-4958-a4d7-8d42b1f129fb", "DetectTime": "2023-10-30T14:14:26.947086+02:00", "EventTime": "2023-10-30T14:14:26.947096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.199.165.214 ", "ContentType": "text/plain"}], "uids": ["Cocnat3vaefyuStoK9"]} -{"Format": "IDEA0", "ID": "0f252e2e-5782-4bad-81ed-362042e7cafa", "DetectTime": "2023-10-30T14:14:26.961613+02:00", "EventTime": "2023-10-30T14:14:26.961623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CpxjxU3106fwIdWE1l"]} -{"Format": "IDEA0", "ID": "facb63a8-48f4-442d-a30c-dbed08e97daf", "DetectTime": "2023-10-30T14:14:26.976077+02:00", "EventTime": "2023-10-30T14:14:26.976087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C1Y4Oa1dASdOd7JpOa"]} -{"Format": "IDEA0", "ID": "0e2d190b-3e4a-4eab-8851-8730f9591f82", "DetectTime": "2023-10-30T14:14:26.992124+02:00", "EventTime": "2023-10-30T14:14:26.992135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CvggpE2pUjufXudVN9"]} -{"Format": "IDEA0", "ID": "892b6469-d006-4bac-a7ac-af292b359b5c", "DetectTime": "2023-10-30T14:14:27.006656+02:00", "EventTime": "2023-10-30T14:14:27.006668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CtbZDE455X4gvXrTg"]} -{"Format": "IDEA0", "ID": "a9dd9c24-0024-41e8-9e9e-83728dae1137", "DetectTime": "2023-10-30T14:14:27.022909+02:00", "EventTime": "2023-10-30T14:14:27.022926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CbpcAk3eNT62kfaRc6"]} -{"Format": "IDEA0", "ID": "41e0d302-0bca-4746-9259-ec7cd29f5014", "DetectTime": "2023-10-30T14:14:27.042377+02:00", "EventTime": "2023-10-30T14:14:27.042392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CZcD9IXyIthI24SQi"]} -{"Format": "IDEA0", "ID": "77c357c0-208c-4e39-8532-1df08de8778e", "DetectTime": "2023-10-30T14:14:27.059885+02:00", "EventTime": "2023-10-30T14:14:27.059894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cz7XNi3SIsXYQFyhJa"]} -{"Format": "IDEA0", "ID": "8dde33fc-aa0c-4e94-94b0-72f40febf308", "DetectTime": "2023-10-30T14:14:27.078934+02:00", "EventTime": "2023-10-30T14:14:27.078950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CogZXX3usEQT5860J4"]} -{"Format": "IDEA0", "ID": "df7009ae-aade-45a2-b7e6-d61155efcce3", "DetectTime": "2023-10-30T14:14:27.097567+02:00", "EventTime": "2023-10-30T14:14:27.097578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CNfCh4n4nzjsdnoOe"]} -{"Format": "IDEA0", "ID": "5e12b70e-b458-4ede-8a67-032cde9a9757", "DetectTime": "2023-10-30T14:14:27.113997+02:00", "EventTime": "2023-10-30T14:14:27.114010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CrOQ583EyjWScBWpJ1"]} -{"Format": "IDEA0", "ID": "87eb7d47-8213-4234-a152-89cf4fa519c4", "DetectTime": "2023-10-30T14:14:27.130082+02:00", "EventTime": "2023-10-30T14:14:27.130093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cc38LP6uRubfVZLM2"]} -{"Format": "IDEA0", "ID": "a7d70e41-e360-49c3-95c8-53985a41b962", "DetectTime": "2023-10-30T14:14:27.146709+02:00", "EventTime": "2023-10-30T14:14:27.146720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CiNxjR1k6p4ANFkrIf"]} -{"Format": "IDEA0", "ID": "9c5b4810-5dfb-4fdb-8638-6e26244613c4", "DetectTime": "2023-10-30T14:14:27.162122+02:00", "EventTime": "2023-10-30T14:14:27.162132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CFnkIWuFb9TX4Fyw9"]} -{"Format": "IDEA0", "ID": "cf99ffe8-34eb-48d3-92fa-a596a0aed2e8", "DetectTime": "2023-10-30T14:14:27.178081+02:00", "EventTime": "2023-10-30T14:14:27.178090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cn3JHAwexUg5nzMre"]} -{"Format": "IDEA0", "ID": "33014803-0423-4ffa-8e9e-0eda6138b423", "DetectTime": "2023-10-30T14:14:27.193183+02:00", "EventTime": "2023-10-30T14:14:27.193193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C32OB61uw32fIaPn76"]} -{"Format": "IDEA0", "ID": "57c4817f-7772-458f-8efd-c39c40d0e6c7", "DetectTime": "2023-10-30T14:14:27.207903+02:00", "EventTime": "2023-10-30T14:14:27.207913+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["Cp8N6N1oMTyYFRp2T1"]} -{"Format": "IDEA0", "ID": "f8d3313e-3f4b-4761-8b99-fa5b3db94782", "DetectTime": "2023-10-30T14:14:27.222605+02:00", "EventTime": "2023-10-30T14:14:27.222614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CApfmx3ezZxTj93a5c"]} -{"Format": "IDEA0", "ID": "3bd0b145-523c-4dba-bd20-b71ffea1f870", "DetectTime": "2023-10-30T14:14:27.238248+02:00", "EventTime": "2023-10-30T14:14:27.238257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CvObXC2UO8rkQOwkQ1"]} -{"Format": "IDEA0", "ID": "e5005ed3-1c8e-4f25-b0d1-8849546208f4", "DetectTime": "2023-10-30T14:14:27.252653+02:00", "EventTime": "2023-10-30T14:14:27.252664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C0sIs01trFcYKDO0t"]} -{"Format": "IDEA0", "ID": "6cc55123-736e-436c-85e5-4de656036831", "DetectTime": "2023-10-30T14:14:27.268440+02:00", "EventTime": "2023-10-30T14:14:27.268452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Crbwzc4GU5p2U7Nvc5"]} -{"Format": "IDEA0", "ID": "e98eb515-5781-4f55-8449-b98675552a80", "DetectTime": "2023-10-30T14:14:27.285042+02:00", "EventTime": "2023-10-30T14:14:27.285053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C30SGx1phJ91480yec"]} -{"Format": "IDEA0", "ID": "23f38c0c-3456-42d6-9a0c-9b3eb1d7e044", "DetectTime": "2023-10-30T14:14:27.301524+02:00", "EventTime": "2023-10-30T14:14:27.301539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Cu3K7R1eJKTs8Ro9Yj"]} -{"Format": "IDEA0", "ID": "288e53c1-0adb-4ffb-8554-043aa3148942", "DetectTime": "2023-10-30T14:14:27.325377+02:00", "EventTime": "2023-10-30T14:14:27.325388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cg5ENR2zrKFjTic64i"]} -{"Format": "IDEA0", "ID": "9caf7d43-2401-48da-818f-d4691c36760f", "DetectTime": "2023-10-30T14:14:27.340850+02:00", "EventTime": "2023-10-30T14:14:27.340865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CPDwud3obbUn9ORrZi"]} -{"Format": "IDEA0", "ID": "f586c518-d830-4ca1-97e3-7eb4549d8123", "DetectTime": "2023-10-30T14:14:27.357358+02:00", "EventTime": "2023-10-30T14:14:27.357368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C9TklS2LSLB33Lfyie"]} -{"Format": "IDEA0", "ID": "702b29ea-f843-4ce7-b7f1-c95cf7327d33", "DetectTime": "2023-10-30T14:14:27.372832+02:00", "EventTime": "2023-10-30T14:14:27.372842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["COKHoqviiyW8KuEK5"]} -{"Format": "IDEA0", "ID": "4a09ea3a-1dba-4d84-b2da-2bdb8c0ab08f", "DetectTime": "2023-10-30T14:14:27.388378+02:00", "EventTime": "2023-10-30T14:14:27.388388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["ClkT7e3uCT25m1OYrb"]} -{"Format": "IDEA0", "ID": "f02d9e4f-121a-4d17-8ed1-9d55354519bc", "DetectTime": "2023-10-30T14:14:27.401996+02:00", "EventTime": "2023-10-30T14:14:27.402005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["C77z1s1riQ96784H0h"]} -{"Format": "IDEA0", "ID": "0e739d9a-81ba-48ff-b6ee-567f872538f0", "DetectTime": "2023-10-30T14:14:27.419048+02:00", "EventTime": "2023-10-30T14:14:27.419063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CuyMhC2uU9XfqsKPK3"]} -{"Format": "IDEA0", "ID": "7f09c1cc-223c-4c48-b60f-75eec6b2ab8a", "DetectTime": "2023-10-30T14:14:27.435890+02:00", "EventTime": "2023-10-30T14:14:27.435901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CTgZzn23Ag7WDi6LX9"]} -{"Format": "IDEA0", "ID": "66d07c1b-ed76-4e0d-9ff0-1ecacd270a92", "DetectTime": "2023-10-30T14:14:27.449939+02:00", "EventTime": "2023-10-30T14:14:27.449950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CHSrrP172SK1Iz5Bp8"]} -{"Format": "IDEA0", "ID": "1a98b214-1448-4689-9bad-5851c8558961", "DetectTime": "2023-10-30T14:14:27.464225+02:00", "EventTime": "2023-10-30T14:14:27.464238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cha9y12HXfvEZrLmd"]} -{"Format": "IDEA0", "ID": "b90c6924-c378-4b16-94ac-8d234f999acf", "DetectTime": "2023-10-30T14:14:27.480497+02:00", "EventTime": "2023-10-30T14:14:27.480508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CZrkDX1pbQBfQaqMgk"]} -{"Format": "IDEA0", "ID": "095d7f07-d708-4ad8-ad49-b6270a317906", "DetectTime": "2023-10-30T14:14:27.495275+02:00", "EventTime": "2023-10-30T14:14:27.495285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CHS1j9RyspDz4Dvd2"]} -{"Format": "IDEA0", "ID": "fb008f43-bd93-4c5d-9d69-866bedd0404a", "DetectTime": "2023-10-30T14:14:27.511447+02:00", "EventTime": "2023-10-30T14:14:27.511458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CPvqcQtKL51hb4Pkg"]} -{"Format": "IDEA0", "ID": "2013fb28-b7a3-45ea-8147-8749e92d8099", "DetectTime": "2023-10-30T14:14:27.527859+02:00", "EventTime": "2023-10-30T14:14:27.527869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CVXdLn3yvXbdznugtf"]} -{"Format": "IDEA0", "ID": "3b48ac00-d272-497d-8741-e3c3cc8b6b89", "DetectTime": "2023-10-30T14:14:27.547351+02:00", "EventTime": "2023-10-30T14:14:27.547366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["C2zRFVzI26KVVqbQi"]} -{"Format": "IDEA0", "ID": "3d414e8f-b614-45d8-853f-c456c296871a", "DetectTime": "2023-10-30T14:14:27.567215+02:00", "EventTime": "2023-10-30T14:14:27.567225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.233.136.124 ", "ContentType": "text/plain"}], "uids": ["CGKH3gGbvfHOSNvmg"]} -{"Format": "IDEA0", "ID": "3e86bcea-9329-4f05-9491-da6215d3134c", "DetectTime": "2023-10-30T14:14:27.579366+02:00", "EventTime": "2023-10-30T14:14:27.579377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CkMYYc3wrqTWHAYKT3"]} -{"Format": "IDEA0", "ID": "f8337811-c3ec-4e4a-ba7a-6db29819fafa", "DetectTime": "2023-10-30T14:14:27.591437+02:00", "EventTime": "2023-10-30T14:14:27.591447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C5XVpt2RVU7UQpUHqk"]} -{"Format": "IDEA0", "ID": "3e23d368-4906-4e65-9b42-d961492ce16c", "DetectTime": "2023-10-30T14:14:27.603871+02:00", "EventTime": "2023-10-30T14:14:27.603880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C1pUfoEsTIf1sG4ya"]} -{"Format": "IDEA0", "ID": "ce9086e3-13e8-485a-8f19-f4ad61f643b5", "DetectTime": "2023-10-30T14:14:27.616262+02:00", "EventTime": "2023-10-30T14:14:27.616271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CgLC0sz0KZ29de8ug"]} -{"Format": "IDEA0", "ID": "8a73a23a-0424-441b-ac41-f1ef694e2d1d", "DetectTime": "2023-10-30T14:14:27.629589+02:00", "EventTime": "2023-10-30T14:14:27.629599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CZcxP93z7fD5NidNU"]} -{"Format": "IDEA0", "ID": "503254ac-5517-4f70-b5bf-2a6f320a9f26", "DetectTime": "2023-10-30T14:14:27.646120+02:00", "EventTime": "2023-10-30T14:14:27.646130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["ChIQbB3swGZjkfKjFj"]} -{"Format": "IDEA0", "ID": "b3cdf7ae-5663-4ae9-a293-e94ed34ed68a", "DetectTime": "2023-10-30T14:14:27.660001+02:00", "EventTime": "2023-10-30T14:14:27.660011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CJ6BkG2zR0pQyKoahi"]} -{"Format": "IDEA0", "ID": "53864315-e8b8-42ae-b75f-840b89afaa5c", "DetectTime": "2023-10-30T14:14:27.674901+02:00", "EventTime": "2023-10-30T14:14:27.674912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CsCMO12VNmaSGjogn6"]} -{"Format": "IDEA0", "ID": "2e47c204-8b86-47fd-9cae-553dcb96ce2c", "DetectTime": "2023-10-30T14:14:27.690013+02:00", "EventTime": "2023-10-30T14:14:27.690023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C04aFux4NqploPtl"]} -{"Format": "IDEA0", "ID": "b0eef7b5-c198-496c-99eb-c86bba4bc2af", "DetectTime": "2023-10-30T14:14:27.702169+02:00", "EventTime": "2023-10-30T14:14:27.702179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CtfQot2vwBEMfYrLBk"]} -{"Format": "IDEA0", "ID": "8aed4cfb-f813-417a-9ddb-cd732f335df5", "DetectTime": "2023-10-30T14:14:27.718844+02:00", "EventTime": "2023-10-30T14:14:27.718859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C2wMVe4p3vRtRDbc6h"]} -{"Format": "IDEA0", "ID": "8e812d96-cd51-410a-8954-07f024355763", "DetectTime": "2023-10-30T14:14:27.734274+02:00", "EventTime": "2023-10-30T14:14:27.734284+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ccw3HM1Zo3W00Xm0lj"]} -{"Format": "IDEA0", "ID": "91095cbf-18cd-4746-8ac8-1ce584f2cbc2", "DetectTime": "2023-10-30T14:14:27.756870+02:00", "EventTime": "2023-10-30T14:14:27.756881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CcYZSo3n2cMJxkoJL"]} -{"Format": "IDEA0", "ID": "19f0de0b-e0ae-48e0-b188-f3a157ac667c", "DetectTime": "2023-10-30T14:14:27.778005+02:00", "EventTime": "2023-10-30T14:14:27.778015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C1fBxT2xIKL8HUA10i"]} -{"Format": "IDEA0", "ID": "8580cada-bf54-4b6d-a031-9f2e444fb6d5", "DetectTime": "2023-10-30T14:14:27.795448+02:00", "EventTime": "2023-10-30T14:14:27.795463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CTtW3R1SNHT7QPPLj7"]} -{"Format": "IDEA0", "ID": "366820db-6d6b-46c4-8901-494c1680af2b", "DetectTime": "2023-10-30T14:14:27.815034+02:00", "EventTime": "2023-10-30T14:14:27.815051+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CDPqWnOWYanCoZ782"]} -{"Format": "IDEA0", "ID": "b2db362b-8e90-470f-8c4f-447e2278df8f", "DetectTime": "2023-10-30T14:14:27.832169+02:00", "EventTime": "2023-10-30T14:14:27.832179+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CbozQw14xicU6DgC26"]} -{"Format": "IDEA0", "ID": "463bf61f-95b2-485f-becb-7babb3ec69e4", "DetectTime": "2023-10-30T14:14:27.850161+02:00", "EventTime": "2023-10-30T14:14:27.850172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CKrZoHnGsDBSSvjve"]} -{"Format": "IDEA0", "ID": "e6e11141-41ea-4a03-9344-a99d76c5f8d7", "DetectTime": "2023-10-30T14:14:27.864816+02:00", "EventTime": "2023-10-30T14:14:27.864828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CYj05C41BO9SdcD6F3"]} -{"Format": "IDEA0", "ID": "bdca4693-e876-4d5d-9894-a2e13a855356", "DetectTime": "2023-10-30T14:14:27.880210+02:00", "EventTime": "2023-10-30T14:14:27.880222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CMOaBK3JGLeYcg1t2h"]} -{"Format": "IDEA0", "ID": "85b51462-3ffb-4a3a-a9d3-e457bac4442d", "DetectTime": "2023-10-30T14:14:27.894024+02:00", "EventTime": "2023-10-30T14:14:27.894034+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CyEhGC38AkByFXJa3i"]} -{"Format": "IDEA0", "ID": "d84e9d58-19dd-4a1c-8a9b-44cb32eea690", "DetectTime": "2023-10-30T14:14:27.906946+02:00", "EventTime": "2023-10-30T14:14:27.906962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C9I5Hj3LStvDe3JZsk"]} -{"Format": "IDEA0", "ID": "7b7c8eba-4af3-4630-9b68-536c8e7805a0", "DetectTime": "2023-10-30T14:14:27.919676+02:00", "EventTime": "2023-10-30T14:14:27.919686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cys5jZ3Et5aiRBlc0e"]} -{"Format": "IDEA0", "ID": "f1a70de9-7b0d-4e77-a3ce-f5277291b1cf", "DetectTime": "2023-10-30T14:14:27.934889+02:00", "EventTime": "2023-10-30T14:14:27.934906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CBhCEBb3kUkyCWIqg"]} -{"Format": "IDEA0", "ID": "50d3b306-c0b7-4dc5-96b2-71fac8075d9f", "DetectTime": "2023-10-30T14:14:27.951568+02:00", "EventTime": "2023-10-30T14:14:27.951578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CQTFB5l9RhIQVyqd7"]} -{"Format": "IDEA0", "ID": "59642abc-7425-4d3f-9214-a93ce85b1270", "DetectTime": "2023-10-30T14:14:27.964718+02:00", "EventTime": "2023-10-30T14:14:27.964729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CYw7k7usQfukhQIc"]} -{"Format": "IDEA0", "ID": "3fdc83fa-ad55-428e-ad71-5f45cd1ea5ee", "DetectTime": "2023-10-30T14:14:27.977687+02:00", "EventTime": "2023-10-30T14:14:27.977698+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CGEHEj1e6o38WPGnDl"]} -{"Format": "IDEA0", "ID": "8141ef54-e159-4503-a1a5-22b5e2bac570", "DetectTime": "2023-10-30T14:14:27.990001+02:00", "EventTime": "2023-10-30T14:14:27.990011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CLr6wk1Z2B75mAvrjb"]} -{"Format": "IDEA0", "ID": "4c122e79-c355-48b5-b822-26dc92dc5c16", "DetectTime": "2023-10-30T14:14:28.002753+02:00", "EventTime": "2023-10-30T14:14:28.002762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CT4gHM18dBRhePiLci"]} -{"Format": "IDEA0", "ID": "04701aa1-789a-4118-9e57-1c4ce59fe3fd", "DetectTime": "2023-10-30T14:14:28.015480+02:00", "EventTime": "2023-10-30T14:14:28.015495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CnLTSpVUcSqztZWRf"]} -{"Format": "IDEA0", "ID": "ef017c3c-f256-4b94-86b0-a3b4486765eb", "DetectTime": "2023-10-30T14:14:28.028188+02:00", "EventTime": "2023-10-30T14:14:28.028198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CVM97g4aNBSbkoN0B5"]} -{"Format": "IDEA0", "ID": "359f9034-1661-4804-a992-7190f2a3b01c", "DetectTime": "2023-10-30T14:14:28.040967+02:00", "EventTime": "2023-10-30T14:14:28.040977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CMhLAu3T957e5Pffyi"]} -{"Format": "IDEA0", "ID": "3ed6ec46-3b77-48fe-adc1-040f668ae003", "DetectTime": "2023-10-30T14:14:28.054646+02:00", "EventTime": "2023-10-30T14:14:28.054657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CPI7lD3tmEzI6hMc2d"]} -{"Format": "IDEA0", "ID": "69d7d36b-e10d-4c45-af89-a6eff274af95", "DetectTime": "2023-10-30T14:14:28.068656+02:00", "EventTime": "2023-10-30T14:14:28.068667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CPy3hrtgnqrejnbHf"]} -{"Format": "IDEA0", "ID": "a7b6f781-5c6e-4cc3-9264-1cf0e22ed1fd", "DetectTime": "2023-10-30T14:14:28.082194+02:00", "EventTime": "2023-10-30T14:14:28.082210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CWw2eG4k6QZd4QFjVe"]} -{"Format": "IDEA0", "ID": "bb9bfcd8-4dea-4b0a-8b96-e7ad9efd528f", "DetectTime": "2023-10-30T14:14:28.096619+02:00", "EventTime": "2023-10-30T14:14:28.096630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CIgDEE1YkQGsA6co41"]} -{"Format": "IDEA0", "ID": "97d0246c-1c9b-40d2-ab14-b58b1c008142", "DetectTime": "2023-10-30T14:14:28.109441+02:00", "EventTime": "2023-10-30T14:14:28.109451+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CLH7er2CvEowXNHdc4"]} -{"Format": "Json", "ID": "97d0246c-1c9b-40d2-ab14-b58b1c008142", "DetectTime": "2023-10-30T14:14:28.109441+02:00", "EventTime": "2023-10-30T14:14:28.109451+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:48:41.327659+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:28.164414)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "367c6471-9752-4b60-be1d-784d25c315a3", "DetectTime": "2023-10-30T14:14:28.168307+02:00", "EventTime": "2023-10-30T14:14:28.168317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CSf4KX1ANXr4SDCMq4"]} -{"Format": "IDEA0", "ID": "6f3f47b1-673a-4f11-a7f4-b79820c3a946", "DetectTime": "2023-10-30T14:14:28.183056+02:00", "EventTime": "2023-10-30T14:14:28.183070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CPlJ9h1Bn8k5UnfFM3"]} -{"Format": "IDEA0", "ID": "1eaefbec-9fa6-4af9-9b34-1236efe401ea", "DetectTime": "2023-10-30T14:14:28.198365+02:00", "EventTime": "2023-10-30T14:14:28.198374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CnWSoK3Bx1yq30XLG9"]} -{"Format": "IDEA0", "ID": "e3f1c450-23a8-462b-9e6e-cd18a93d76a0", "DetectTime": "2023-10-30T14:14:28.213968+02:00", "EventTime": "2023-10-30T14:14:28.213979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CYeE071L4UI6iDBdk6"]} -{"Format": "IDEA0", "ID": "d39e69df-abdb-4429-a701-cd93a3ae193a", "DetectTime": "2023-10-30T14:14:28.231483+02:00", "EventTime": "2023-10-30T14:14:28.231496+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C0eqET223Yxqmr3Vj4"]} -{"Format": "IDEA0", "ID": "4f4a910a-7242-4586-b226-2ae427007b2c", "DetectTime": "2023-10-30T14:14:28.250057+02:00", "EventTime": "2023-10-30T14:14:28.250073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cfqgc51KKGCknYqCy2"]} -{"Format": "IDEA0", "ID": "a168e6c4-7734-42a0-9f69-03a6edc69601", "DetectTime": "2023-10-30T14:14:28.266163+02:00", "EventTime": "2023-10-30T14:14:28.266180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CIVyMJ3NDSeMJFLkFj"]} -{"Format": "IDEA0", "ID": "4e7467af-a169-4d08-86be-44de634d7ae3", "DetectTime": "2023-10-30T14:14:28.284102+02:00", "EventTime": "2023-10-30T14:14:28.284112+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CXlOAw17KDq92vkURl"]} -{"Format": "IDEA0", "ID": "a97329da-0b44-40a2-b1ef-c8b518471cc7", "DetectTime": "2023-10-30T14:14:28.300005+02:00", "EventTime": "2023-10-30T14:14:28.300015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cghxbw3quFfsZYGJV1"]} -{"Format": "IDEA0", "ID": "b2c79031-8cf4-46ef-b98f-db22a3d074f6", "DetectTime": "2023-10-30T14:14:28.314824+02:00", "EventTime": "2023-10-30T14:14:28.314836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CeVa0N1d9fQ5vKAY6a"]} -{"Format": "IDEA0", "ID": "c1f371e5-a59f-466d-9ee9-063c1080135a", "DetectTime": "2023-10-30T14:14:28.332984+02:00", "EventTime": "2023-10-30T14:14:28.333004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CXpYhVtSSWSZY24ga"]} -{"Format": "IDEA0", "ID": "1aae8f2f-50b6-4dcd-a2c5-8911c6da2366", "DetectTime": "2023-10-30T14:14:28.379390+02:00", "EventTime": "2023-10-30T14:14:28.379412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CdQT9z3PyUW2Mhnl55"]} -{"Format": "IDEA0", "ID": "39607045-eede-4958-be4d-0bb0a12c332f", "DetectTime": "2023-10-30T14:14:28.429373+02:00", "EventTime": "2023-10-30T14:14:28.429391+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C32SXI3RXYMnCOeg6c"]} -{"Format": "IDEA0", "ID": "560c0bdc-41bb-406f-ae15-ee23a21ed61a", "DetectTime": "2023-10-30T14:14:28.462396+02:00", "EventTime": "2023-10-30T14:14:28.462414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CY6OFx16ZQDAEcTCT1"]} -{"Format": "IDEA0", "ID": "256cf02f-6b57-44e4-aa16-175590823458", "DetectTime": "2023-10-30T14:14:28.485009+02:00", "EventTime": "2023-10-30T14:14:28.485025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CKkAtI29N1ykqrXW05"]} -{"Format": "IDEA0", "ID": "30576e35-0134-44d6-8767-707d32f40a6e", "DetectTime": "2023-10-30T14:14:28.505492+02:00", "EventTime": "2023-10-30T14:14:28.505506+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["Cst1HE4zu77EzJgGUd"]} -{"Format": "IDEA0", "ID": "4ab6f36d-9d62-45f0-89da-d2e8bd61297f", "DetectTime": "2023-10-30T14:14:28.522674+02:00", "EventTime": "2023-10-30T14:14:28.522687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CleNGueqIGXkbkET4"]} -{"Format": "IDEA0", "ID": "bd332589-c6a4-45eb-87a9-eb77ade1807d", "DetectTime": "2023-10-30T14:14:28.541509+02:00", "EventTime": "2023-10-30T14:14:28.541520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CLVgTFMAJG0geJg63"]} -{"Format": "IDEA0", "ID": "0ff8cbd7-2e74-41f5-aceb-e46274a95c2b", "DetectTime": "2023-10-30T14:14:28.556955+02:00", "EventTime": "2023-10-30T14:14:28.556965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CPgigRgA4fOJH5YEk"]} -{"Format": "IDEA0", "ID": "e54d5442-e2db-4364-8e41-f8aab7c63808", "DetectTime": "2023-10-30T14:14:28.571463+02:00", "EventTime": "2023-10-30T14:14:28.571473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CptTvT2bhJ0SFBzHw4"]} -{"Format": "IDEA0", "ID": "e82bfaa7-c2f4-4799-86fd-406656bc7f44", "DetectTime": "2023-10-30T14:14:28.588294+02:00", "EventTime": "2023-10-30T14:14:28.588310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["COfAuE4jT2VXkJtcp5"]} -{"Format": "IDEA0", "ID": "a8a6be88-cdf4-4517-b2b8-6dfec11f9ff4", "DetectTime": "2023-10-30T14:14:28.604426+02:00", "EventTime": "2023-10-30T14:14:28.604437+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CiokM56v9lSVMoHTf"]} -{"Format": "IDEA0", "ID": "63c52341-d495-4ff9-83ea-4426b561a75c", "DetectTime": "2023-10-30T14:14:28.622152+02:00", "EventTime": "2023-10-30T14:14:28.622167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CHiub04KiWLoObdUC8"]} -{"Format": "IDEA0", "ID": "5c8b862b-e2bb-4903-af6d-4bbada646c4a", "DetectTime": "2023-10-30T14:14:28.639237+02:00", "EventTime": "2023-10-30T14:14:28.639251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CCCUOk2izmAbdlAP4c"]} -{"Format": "IDEA0", "ID": "5916d079-b137-4908-9cf1-d6fa7559d4eb", "DetectTime": "2023-10-30T14:14:28.658313+02:00", "EventTime": "2023-10-30T14:14:28.658328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CPkdMzJoNJpj1h6nd"]} -{"Format": "IDEA0", "ID": "51f309d0-c71d-4724-b6da-04f5bb40e73d", "DetectTime": "2023-10-30T14:14:28.677321+02:00", "EventTime": "2023-10-30T14:14:28.677335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CSZb1T1reQwHfflGG4"]} -{"Format": "IDEA0", "ID": "2094a918-c54e-40c4-8825-50a252c5703d", "DetectTime": "2023-10-30T14:14:28.703241+02:00", "EventTime": "2023-10-30T14:14:28.703251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVOCuUjdIiDLLe7ch"]} -{"Format": "IDEA0", "ID": "db8c7d52-8ece-4a39-9aca-d084a50e140e", "DetectTime": "2023-10-30T14:14:28.721741+02:00", "EventTime": "2023-10-30T14:14:28.721753+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CThaVg2U9yG07BcXLg"]} -{"Format": "IDEA0", "ID": "3a97622b-9ebb-4a2e-a01b-581e8f3e8fa1", "DetectTime": "2023-10-30T14:14:28.739616+02:00", "EventTime": "2023-10-30T14:14:28.739629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CGBZB2wmHVlIpQzWh"]} -{"Format": "IDEA0", "ID": "23a963a0-c50e-40bc-86a6-525f8a1c4741", "DetectTime": "2023-10-30T14:14:28.758069+02:00", "EventTime": "2023-10-30T14:14:28.758083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CSl2042YrLCgeH81jl"]} -{"Format": "IDEA0", "ID": "919bc204-99b3-4282-b720-dfbb10b7a7fd", "DetectTime": "2023-10-30T14:14:28.782653+02:00", "EventTime": "2023-10-30T14:14:28.782664+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CVQHsO38dHZwClKki8"]} -{"Format": "IDEA0", "ID": "811c5567-0410-4de9-bcad-0604b56243f9", "DetectTime": "2023-10-30T14:14:28.800867+02:00", "EventTime": "2023-10-30T14:14:28.800877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CacRQL1c5ISITyfEEh"]} -{"Format": "IDEA0", "ID": "e1513687-8337-426f-b918-28a390ab33ce", "DetectTime": "2023-10-30T14:14:28.820361+02:00", "EventTime": "2023-10-30T14:14:28.820375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C2lpQc2uEFOdhVuNI1"]} -{"Format": "IDEA0", "ID": "5d8fa59d-4574-4f27-86c1-070da2ebafe2", "DetectTime": "2023-10-30T14:14:28.841253+02:00", "EventTime": "2023-10-30T14:14:28.841269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["C4eDo94qypHNfOn3Aj"]} -{"Format": "IDEA0", "ID": "13247524-e975-40bb-859c-818a3421ceaa", "DetectTime": "2023-10-30T14:14:28.861286+02:00", "EventTime": "2023-10-30T14:14:28.861297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["Cf3Fzb3L7q7deqEag"]} -{"Format": "IDEA0", "ID": "c43ea80b-f3ff-48dd-8b88-adc7cf30ff0d", "DetectTime": "2023-10-30T14:14:28.876554+02:00", "EventTime": "2023-10-30T14:14:28.876565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CCUaWN3yme2OWBhs1g"]} -{"Format": "IDEA0", "ID": "2d8b19e7-3388-4f72-8af5-e63c595e9431", "DetectTime": "2023-10-30T14:14:28.892724+02:00", "EventTime": "2023-10-30T14:14:28.892739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["Cxg7g8cZi9XFnmTH9"]} -{"Format": "IDEA0", "ID": "6e342962-a0f1-4fb6-9873-33bbe66c6da6", "DetectTime": "2023-10-30T14:14:28.909675+02:00", "EventTime": "2023-10-30T14:14:28.909686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CqDxAQ3rmJWYmN6cHg"]} -{"Format": "IDEA0", "ID": "c7c3ec24-ba37-4799-8f41-7d65e63eac1d", "DetectTime": "2023-10-30T14:14:28.925884+02:00", "EventTime": "2023-10-30T14:14:28.925894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CcyYCtUWOCBV9HfK6"]} -{"Format": "IDEA0", "ID": "51e23b01-e2fa-4c2d-8090-ee2957ea7062", "DetectTime": "2023-10-30T14:14:28.942663+02:00", "EventTime": "2023-10-30T14:14:28.942673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CfXv5q2lypQJFVPQo8"]} -{"Format": "IDEA0", "ID": "41f3e0a4-8013-4488-85d3-afa09f2c5e3e", "DetectTime": "2023-10-30T14:14:28.958961+02:00", "EventTime": "2023-10-30T14:14:28.958972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CP9W074MptwJeZuyg"]} -{"Format": "IDEA0", "ID": "2658a55e-287b-4cb8-9c81-8744829c5aa7", "DetectTime": "2023-10-30T14:14:28.976584+02:00", "EventTime": "2023-10-30T14:14:28.976594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CToxuge0JmFkrx9y2"]} -{"Format": "IDEA0", "ID": "fd3914ad-5b4d-47cd-adf4-e5235fc63a29", "DetectTime": "2023-10-30T14:14:28.994962+02:00", "EventTime": "2023-10-30T14:14:28.994988+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CvnbXl1nFtjtiIcqub"]} -{"Format": "IDEA0", "ID": "a1a30b29-0746-4393-9993-cff0ccd95801", "DetectTime": "2023-10-30T14:14:29.014479+02:00", "EventTime": "2023-10-30T14:14:29.014493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C8CLrhIZmOasMrl1f"]} -{"Format": "IDEA0", "ID": "df8fad14-41f2-417a-a64c-cce140f74058", "DetectTime": "2023-10-30T14:14:29.031589+02:00", "EventTime": "2023-10-30T14:14:29.031600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdMenc1K4coxcKnmQk"]} -{"Format": "IDEA0", "ID": "3668e9e1-0852-400b-a4f4-db0d02f753c9", "DetectTime": "2023-10-30T14:14:29.048005+02:00", "EventTime": "2023-10-30T14:14:29.048021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CQjiUZ3XQH7p8cpcwh"]} -{"Format": "IDEA0", "ID": "5c00e7b2-3197-4993-a17c-7590db90a63d", "DetectTime": "2023-10-30T14:14:29.065386+02:00", "EventTime": "2023-10-30T14:14:29.065397+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CtK4Ib15grO5Etsje1"]} -{"Format": "IDEA0", "ID": "320c5901-d5ac-4fc4-bacd-678c6a7c3f27", "DetectTime": "2023-10-30T14:14:29.080135+02:00", "EventTime": "2023-10-30T14:14:29.080149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CNEYPx6ef4IH2iFs4"]} -{"Format": "IDEA0", "ID": "ba81614b-507f-44e0-b773-c9cca393a9e6", "DetectTime": "2023-10-30T14:14:29.097231+02:00", "EventTime": "2023-10-30T14:14:29.097243+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Czhi2B4LIoh0bZ7dY7"]} -{"Format": "IDEA0", "ID": "634203e2-34c2-4cb3-ba53-b272cf487658", "DetectTime": "2023-10-30T14:14:29.111299+02:00", "EventTime": "2023-10-30T14:14:29.111314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CKRnLaCdKXb75VwXf"]} -{"Format": "IDEA0", "ID": "ab4c869f-664c-435a-9cee-dd19bdd74522", "DetectTime": "2023-10-30T14:14:29.125176+02:00", "EventTime": "2023-10-30T14:14:29.125187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CQj9Cu2HfEtw2hWOkk"]} -{"Format": "IDEA0", "ID": "ebc797ce-4c9b-40d5-9bb3-38fc1b2d815a", "DetectTime": "2023-10-30T14:14:29.139610+02:00", "EventTime": "2023-10-30T14:14:29.139624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CYchaYoLigxxs2XH6"]} -{"Format": "IDEA0", "ID": "6aae02cf-c928-480d-9e0b-4276f0cdd163", "DetectTime": "2023-10-30T14:14:29.154101+02:00", "EventTime": "2023-10-30T14:14:29.154110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C1nQom4oJjhuD1N0oe"]} -{"Format": "IDEA0", "ID": "bb454599-0b3f-4496-9f94-34e34edd1b8d", "DetectTime": "2023-10-30T14:14:29.167414+02:00", "EventTime": "2023-10-30T14:14:29.167425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6eOkp11FhDajoRGck"]} -{"Format": "IDEA0", "ID": "2debc5bc-fb5d-47f4-9114-e8ea56107c6e", "DetectTime": "2023-10-30T14:14:29.181742+02:00", "EventTime": "2023-10-30T14:14:29.181756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cm9M8A148KhgTvLaEe"]} -{"Format": "IDEA0", "ID": "764852d4-cb66-4345-bcef-f56eddceb559", "DetectTime": "2023-10-30T14:14:29.199933+02:00", "EventTime": "2023-10-30T14:14:29.199943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CAfvBe37mHRRY6F707"]} -{"Format": "IDEA0", "ID": "ae9fa9a2-d8be-4dab-9c16-872481a2e4cd", "DetectTime": "2023-10-30T14:14:29.214116+02:00", "EventTime": "2023-10-30T14:14:29.214126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CKKtOE2BU2N8BaPiql"]} -{"Format": "IDEA0", "ID": "63c604fd-a1a0-41f1-a40d-2ebea381a57d", "DetectTime": "2023-10-30T14:14:29.229829+02:00", "EventTime": "2023-10-30T14:14:29.229839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4oI3K3JqYKGMLd4Si"]} -{"Format": "IDEA0", "ID": "b997c4d3-dfdd-4ecf-92b1-5d014d535863", "DetectTime": "2023-10-30T14:14:29.244150+02:00", "EventTime": "2023-10-30T14:14:29.244164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CxWcbs4crVNOiiswh6"]} -{"Format": "IDEA0", "ID": "17655e51-4d6b-4b76-8763-4b9eae4f8b29", "DetectTime": "2023-10-30T14:14:29.260539+02:00", "EventTime": "2023-10-30T14:14:29.260554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPXtsO37xSn5ymRTu7"]} -{"Format": "IDEA0", "ID": "f85b5292-bb63-4ff6-96fa-1b14729e2a79", "DetectTime": "2023-10-30T14:14:29.277955+02:00", "EventTime": "2023-10-30T14:14:29.277967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CQb1lM3QDIpzVSgYG2"]} -{"Format": "IDEA0", "ID": "829ee7f7-8f07-4e0c-840f-e7569c97aabe", "DetectTime": "2023-10-30T14:14:29.296918+02:00", "EventTime": "2023-10-30T14:14:29.296933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cf9NZF3bQIy7SP6Tyj"]} -{"Format": "IDEA0", "ID": "88f66638-bbc8-41ef-8e0d-7bfd23fcb767", "DetectTime": "2023-10-30T14:14:29.314731+02:00", "EventTime": "2023-10-30T14:14:29.314741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CajpceMZg6gk7zYe"]} -{"Format": "IDEA0", "ID": "9229ce4b-886f-4dff-a1d6-9d029800d9d4", "DetectTime": "2023-10-30T14:14:29.330795+02:00", "EventTime": "2023-10-30T14:14:29.330812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CusjlA3OOHJn9Smpoe"]} -{"Format": "IDEA0", "ID": "4ab70fd9-a0e5-4f16-b85c-0644056af16f", "DetectTime": "2023-10-30T14:14:29.347251+02:00", "EventTime": "2023-10-30T14:14:29.347271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CGDGfvrBdHCVBxTHf"]} -{"Format": "IDEA0", "ID": "a2b042b4-a3f9-4f21-beaf-15c732876c4e", "DetectTime": "2023-10-30T14:14:29.375236+02:00", "EventTime": "2023-10-30T14:14:29.375248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CMJoxb3cahBGpzPftl"]} -{"Format": "IDEA0", "ID": "80246765-22a7-4ec5-a6ae-fc1e2777605a", "DetectTime": "2023-10-30T14:14:29.392196+02:00", "EventTime": "2023-10-30T14:14:29.392207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CMYrAa4nH4Kt7KjkVb"]} -{"Format": "IDEA0", "ID": "2f7c4e0d-c768-48e4-b2af-6020c8195ed3", "DetectTime": "2023-10-30T14:14:29.407097+02:00", "EventTime": "2023-10-30T14:14:29.407114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CzAtsf2jL111sqxe7e"]} -{"Format": "IDEA0", "ID": "c43f3872-c1ed-4b78-94d8-e5ad696d01cf", "DetectTime": "2023-10-30T14:14:29.423583+02:00", "EventTime": "2023-10-30T14:14:29.423593+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CfIvSp4mTl4SGfXG65"]} -{"Format": "IDEA0", "ID": "ef815f94-3a57-40e8-9ea0-bb26bf8665a6", "DetectTime": "2023-10-30T14:14:29.439777+02:00", "EventTime": "2023-10-30T14:14:29.439799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CTnYV9KwTndSo3Ob"]} -{"Format": "IDEA0", "ID": "d40717bf-da17-4395-a621-ea4546a348a8", "DetectTime": "2023-10-30T14:14:29.456719+02:00", "EventTime": "2023-10-30T14:14:29.456730+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CS6eXV3Eu8NJb7piJ5"]} -{"Format": "IDEA0", "ID": "7f490270-08ff-488a-8b5e-db91f5aac227", "DetectTime": "2023-10-30T14:14:29.473707+02:00", "EventTime": "2023-10-30T14:14:29.473718+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CVhW4W2gvNSTr192I5"]} -{"Format": "IDEA0", "ID": "a664fecc-f37d-45b3-88ae-523e29276f92", "DetectTime": "2023-10-30T14:14:29.489187+02:00", "EventTime": "2023-10-30T14:14:29.489197+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C2Xpj84G3R1jS6Tzwb"]} -{"Format": "IDEA0", "ID": "0113a7e0-d75b-4e6f-b403-ce34dbac7b11", "DetectTime": "2023-10-30T14:14:29.506174+02:00", "EventTime": "2023-10-30T14:14:29.506185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CaW3nF2X39Uf8doEP8"]} -{"Format": "IDEA0", "ID": "574ae8b1-e0aa-4971-b337-0cd8a88a892e", "DetectTime": "2023-10-30T14:14:29.521686+02:00", "EventTime": "2023-10-30T14:14:29.521696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["Cn4lEJ3Hba2LYb8vqg"]} -{"Format": "IDEA0", "ID": "14c6f6dc-57df-41ef-b4a8-0372402f75c8", "DetectTime": "2023-10-30T14:14:29.538074+02:00", "EventTime": "2023-10-30T14:14:29.538087+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CPtAyM2FW5oktPulBh"]} -{"Format": "IDEA0", "ID": "ee24216f-ef4c-4e82-88c5-771ce947ad08", "DetectTime": "2023-10-30T14:14:29.553839+02:00", "EventTime": "2023-10-30T14:14:29.553855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CSpJfKwgMVBFH5uGj"]} -{"Format": "IDEA0", "ID": "8951e2fc-0e2a-448a-8648-abe43b1f6b84", "DetectTime": "2023-10-30T14:14:29.570420+02:00", "EventTime": "2023-10-30T14:14:29.570433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CQXEcY2vTwxWdrhF42"]} -{"Format": "IDEA0", "ID": "cebf8d6d-c16b-4f0d-9b34-e7295a69d63b", "DetectTime": "2023-10-30T14:14:29.588069+02:00", "EventTime": "2023-10-30T14:14:29.588080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["ClHopM2XfQbjdFiItb"]} -{"Format": "IDEA0", "ID": "728d0e51-2f9d-4775-8cb5-04d73565d448", "DetectTime": "2023-10-30T14:14:29.607158+02:00", "EventTime": "2023-10-30T14:14:29.607169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CHavCg2NYLySKQhid8"]} -{"Format": "IDEA0", "ID": "8e8f2099-9cae-405c-814e-2422a51c8460", "DetectTime": "2023-10-30T14:14:29.623762+02:00", "EventTime": "2023-10-30T14:14:29.623774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CxAJVQ2fpzaN0aPEU"]} -{"Format": "IDEA0", "ID": "685f993b-f338-4b07-88c2-a2b83d3e2685", "DetectTime": "2023-10-30T14:14:29.642855+02:00", "EventTime": "2023-10-30T14:14:29.642866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CNuax63F7DICsLTyWj"]} -{"Format": "IDEA0", "ID": "0a0fee4f-82d0-429f-9cba-2989fc1a3881", "DetectTime": "2023-10-30T14:14:29.659891+02:00", "EventTime": "2023-10-30T14:14:29.659903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CIY6s31dAu95c8cuFd"]} -{"Format": "IDEA0", "ID": "30f6f6ea-2636-4b4c-b647-1cd9076c92d1", "DetectTime": "2023-10-30T14:14:29.676761+02:00", "EventTime": "2023-10-30T14:14:29.676776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CdOkmQ3vMon6M1uQZ2"]} -{"Format": "IDEA0", "ID": "837d52a6-cb8f-427d-9cf6-3cb800abb9bb", "DetectTime": "2023-10-30T14:14:29.696032+02:00", "EventTime": "2023-10-30T14:14:29.696049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CiBv4N2s0uubTSWNG8"]} -{"Format": "IDEA0", "ID": "c370a346-97f1-4d79-9703-bc9a801c42c3", "DetectTime": "2023-10-30T14:14:29.712135+02:00", "EventTime": "2023-10-30T14:14:29.712150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CUSQEo1TdgB8kNJhL4"]} -{"Format": "IDEA0", "ID": "d43c6cf8-bc33-4dde-b409-bf3f5e89065f", "DetectTime": "2023-10-30T14:14:29.729958+02:00", "EventTime": "2023-10-30T14:14:29.729971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cil39fqBnNJb5NjQ4"]} -{"Format": "IDEA0", "ID": "071f8b32-b507-4d9c-95af-a568add5dfcd", "DetectTime": "2023-10-30T14:14:29.745694+02:00", "EventTime": "2023-10-30T14:14:29.745710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C3MGdg1ZYXbiVcu1J6"]} -{"Format": "IDEA0", "ID": "5489a015-7f23-47fd-98ab-6484ee527093", "DetectTime": "2023-10-30T14:14:29.762526+02:00", "EventTime": "2023-10-30T14:14:29.762539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGpW5J30q1IxXYKUYk"]} -{"Format": "IDEA0", "ID": "e44c79fe-eccb-44a8-b16a-579ca9d70366", "DetectTime": "2023-10-30T14:14:29.782708+02:00", "EventTime": "2023-10-30T14:14:29.782724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CUp5HO2ompxL8LzBR"]} -{"Format": "IDEA0", "ID": "5b613d66-39cc-44dc-af15-7f24c04e3279", "DetectTime": "2023-10-30T14:14:29.801921+02:00", "EventTime": "2023-10-30T14:14:29.801936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CfJGtU3bucSeJvvMV6"]} -{"Format": "IDEA0", "ID": "72a706af-8824-46b5-8fd6-54d529e92435", "DetectTime": "2023-10-30T14:14:29.819310+02:00", "EventTime": "2023-10-30T14:14:29.819320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C0O7hE4SzqnWJrbllk"]} -{"Format": "IDEA0", "ID": "ff0b78dd-248c-4e7b-944c-92b32fef6386", "DetectTime": "2023-10-30T14:14:29.833803+02:00", "EventTime": "2023-10-30T14:14:29.833814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CXbVFO22H5P0tdZNOd"]} -{"Format": "IDEA0", "ID": "92af0daf-9429-47c1-9ae3-1bb3043f8f8a", "DetectTime": "2023-10-30T14:14:29.846938+02:00", "EventTime": "2023-10-30T14:14:29.846948+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CNtT1V2UrnFYn4jVoa"]} -{"Format": "IDEA0", "ID": "77579878-dbc5-4451-a03e-b9c45ebcdf81", "DetectTime": "2023-10-30T14:14:29.873203+02:00", "EventTime": "2023-10-30T14:14:29.873216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CIaac61XwyVYTVLBn"]} -{"Format": "IDEA0", "ID": "dee94f89-eb0f-4114-ba82-c95bad56b5fe", "DetectTime": "2023-10-30T14:14:29.888878+02:00", "EventTime": "2023-10-30T14:14:29.888889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CrOWpfBFlo24edOs8"]} -{"Format": "IDEA0", "ID": "d914cc9e-b671-43fc-8a31-22c4808481be", "DetectTime": "2023-10-30T14:14:29.904697+02:00", "EventTime": "2023-10-30T14:14:29.904713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CXQlCN2gQRmtomlHx8"]} -{"Format": "IDEA0", "ID": "090815aa-0851-47b3-a7bf-57d83c2aeb2f", "DetectTime": "2023-10-30T14:14:29.923352+02:00", "EventTime": "2023-10-30T14:14:29.923366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CO9ltQQqWiceDrSC5"]} -{"Format": "IDEA0", "ID": "5a10a640-69a3-4f7f-902e-cd8cfbcf8b0b", "DetectTime": "2023-10-30T14:14:29.942460+02:00", "EventTime": "2023-10-30T14:14:29.942473+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Ck4PvTfNfZvFd7ywf"]} -{"Format": "IDEA0", "ID": "9f3937e1-564f-41a5-80e1-85c4b2dddcee", "DetectTime": "2023-10-30T14:14:29.960036+02:00", "EventTime": "2023-10-30T14:14:29.960045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CRrLwS2ExDLybVOMWa"]} -{"Format": "IDEA0", "ID": "9d485443-7703-4292-9537-f9ba0370643e", "DetectTime": "2023-10-30T14:14:29.973037+02:00", "EventTime": "2023-10-30T14:14:29.973047+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CGhX2M1xcRBntxnE98"]} -{"Format": "IDEA0", "ID": "632555ca-0ba8-41c3-a57b-1ef9dfdbf731", "DetectTime": "2023-10-30T14:14:29.987350+02:00", "EventTime": "2023-10-30T14:14:29.987366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBze9Q38nHZyN9s959"]} -{"Format": "IDEA0", "ID": "895a4901-0e31-4f2f-8730-8e1efb93ba86", "DetectTime": "2023-10-30T14:14:30.004252+02:00", "EventTime": "2023-10-30T14:14:30.004266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C14g9Ghm3PUfmYaYd"]} -{"Format": "IDEA0", "ID": "7fca2bca-219a-483f-b7fb-3aecfcecb3e3", "DetectTime": "2023-10-30T14:14:30.019944+02:00", "EventTime": "2023-10-30T14:14:30.019960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cp3fxp2cYPOA6klceg"]} -{"Format": "IDEA0", "ID": "0f595fc9-8e96-4d1e-bbf4-53c53da53786", "DetectTime": "2023-10-30T14:14:30.038475+02:00", "EventTime": "2023-10-30T14:14:30.038490+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CDe6V92CfgoQjv90Lg"]} -{"Format": "IDEA0", "ID": "380e6383-9efc-45c2-b687-3301d3f1b0e9", "DetectTime": "2023-10-30T14:14:30.058352+02:00", "EventTime": "2023-10-30T14:14:30.058368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CblroF2dH7hYOUEh7d"]} -{"Format": "IDEA0", "ID": "f28a56c1-483e-44a1-977b-04da1cb0d1fe", "DetectTime": "2023-10-30T14:14:30.077404+02:00", "EventTime": "2023-10-30T14:14:30.077419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CuX9Qj1TrnPOR0Msmk"]} -{"Format": "IDEA0", "ID": "8699f3ca-f3ed-4eea-91c6-6988d54d8593", "DetectTime": "2023-10-30T14:14:30.093506+02:00", "EventTime": "2023-10-30T14:14:30.093517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CNqGfs2NZll4TKUqAd"]} -{"Format": "IDEA0", "ID": "39f2339d-c3c9-4253-9aaf-61bb4a55c8eb", "DetectTime": "2023-10-30T14:14:30.112606+02:00", "EventTime": "2023-10-30T14:14:30.112620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["C8sRa7Vpq2VazFJMc"]} -{"Format": "IDEA0", "ID": "ab5bf36c-a20b-4499-8704-c70f1bb28849", "DetectTime": "2023-10-30T14:14:30.129524+02:00", "EventTime": "2023-10-30T14:14:30.129538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["C6r83o1gZp83g8XkNf"]} -{"Format": "IDEA0", "ID": "baa96040-dc59-415d-ab82-10db53dd8708", "DetectTime": "2023-10-30T14:14:30.146328+02:00", "EventTime": "2023-10-30T14:14:30.146338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["COyUElSqozhf4EZCl"]} -{"Format": "IDEA0", "ID": "1e4b9bdb-4ddc-4860-b3cb-5e63871bf11b", "DetectTime": "2023-10-30T14:14:30.159443+02:00", "EventTime": "2023-10-30T14:14:30.159458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CvPeQw6woLHd5flr2"]} -{"Format": "IDEA0", "ID": "a354b11f-5da6-4ca2-889e-9c641ae373a0", "DetectTime": "2023-10-30T14:14:30.177969+02:00", "EventTime": "2023-10-30T14:14:30.177987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["Cp87rL1JfYhkAoAtF1"]} -{"Format": "IDEA0", "ID": "34300e9f-f89a-48c9-8319-f9382dcbf2d5", "DetectTime": "2023-10-30T14:14:30.194709+02:00", "EventTime": "2023-10-30T14:14:30.194725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CS5ZTy4FkK6bVgFbtb"]} -{"Format": "IDEA0", "ID": "fb5cac34-0e3b-48ce-872f-16af31f041ad", "DetectTime": "2023-10-30T14:14:30.212020+02:00", "EventTime": "2023-10-30T14:14:30.212036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cs6YqjB4ws7kPcvZi"]} -{"Format": "IDEA0", "ID": "588ef9e3-8d97-4095-93a2-ddcf2828ecdb", "DetectTime": "2023-10-30T14:14:30.230238+02:00", "EventTime": "2023-10-30T14:14:30.230253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CfduTL2sogkcYRRiFi"]} -{"Format": "IDEA0", "ID": "b461edc4-2665-41bc-8c62-8f1cef15e040", "DetectTime": "2023-10-30T14:14:30.260028+02:00", "EventTime": "2023-10-30T14:14:30.260043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCxCmb2Gjh6eN9PhTe"]} -{"Format": "IDEA0", "ID": "521a40d2-0c26-4d77-b091-8a6c56b2cd62", "DetectTime": "2023-10-30T14:14:30.288910+02:00", "EventTime": "2023-10-30T14:14:30.288921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["C2GXWw1B54xpYPNv34"]} -{"Format": "IDEA0", "ID": "5211c9c1-67a6-4911-ae3c-73c1c2a2a88a", "DetectTime": "2023-10-30T14:14:30.313536+02:00", "EventTime": "2023-10-30T14:14:30.313546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CIOGNB1ONfV5iA86Oi"]} -{"Format": "IDEA0", "ID": "8e3ec19b-8c6e-44bc-b1fd-9d5629f8392b", "DetectTime": "2023-10-30T14:14:30.335956+02:00", "EventTime": "2023-10-30T14:14:30.335971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CYWbKN2DxtY9YLUH32"]} -{"Format": "IDEA0", "ID": "b9547b78-458f-41b0-b7b9-61f103e8608f", "DetectTime": "2023-10-30T14:14:30.351671+02:00", "EventTime": "2023-10-30T14:14:30.351681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["ClUOf91TgBmTV8Fspe"]} -{"Format": "IDEA0", "ID": "8191d7e0-a621-426d-b323-c47967bc9708", "DetectTime": "2023-10-30T14:14:30.372036+02:00", "EventTime": "2023-10-30T14:14:30.372045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cieby2mGxwTggcGl7"]} -{"Format": "IDEA0", "ID": "7dbd3371-f085-401f-b023-c43285f66ca6", "DetectTime": "2023-10-30T14:14:30.397751+02:00", "EventTime": "2023-10-30T14:14:30.397767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CCI9lM3Dajqx9U0e8g"]} -{"Format": "IDEA0", "ID": "8a423d91-1149-4942-bd7b-ec8bcac25a62", "DetectTime": "2023-10-30T14:14:30.420402+02:00", "EventTime": "2023-10-30T14:14:30.420413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C0iKfXAVgsn60Gdke"]} -{"Format": "IDEA0", "ID": "febf24e5-ec04-4ad4-9d93-15c78ac91860", "DetectTime": "2023-10-30T14:14:30.446596+02:00", "EventTime": "2023-10-30T14:14:30.446612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CqCPxZ1TBtNsC4lhCj"]} -{"Format": "IDEA0", "ID": "474679c7-6200-4832-a5b8-b4adec0c814e", "DetectTime": "2023-10-30T14:14:30.472274+02:00", "EventTime": "2023-10-30T14:14:30.472289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CgwZdV3iSnZh5v7Ab7"]} -{"Format": "IDEA0", "ID": "1a3c7fd3-e127-42d6-ba77-3992c1ae9d02", "DetectTime": "2023-10-30T14:14:30.493776+02:00", "EventTime": "2023-10-30T14:14:30.493786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgwuWf236asgcEPD7l"]} -{"Format": "IDEA0", "ID": "5ac56da1-955e-4247-a63c-f9ab00a7bf2d", "DetectTime": "2023-10-30T14:14:30.520285+02:00", "EventTime": "2023-10-30T14:14:30.520296+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CKixL92y1jDbIe1C5b"]} -{"Format": "IDEA0", "ID": "12b0c8c8-e2c4-4333-8cbe-7332f4a095ce", "DetectTime": "2023-10-30T14:14:30.545989+02:00", "EventTime": "2023-10-30T14:14:30.546004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C8ODYoUGQCkUlr60a"]} -{"Format": "IDEA0", "ID": "388ea6fa-debb-41fd-959e-23472d8012ad", "DetectTime": "2023-10-30T14:14:30.576162+02:00", "EventTime": "2023-10-30T14:14:30.576177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CcEDSb1YBiAF6TcEL2"]} -{"Format": "IDEA0", "ID": "3912a03d-3d48-41b1-a52d-73f69af0afcc", "DetectTime": "2023-10-30T14:14:30.602609+02:00", "EventTime": "2023-10-30T14:14:30.602621+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["C0fIi21KGrMWvrvGW9"]} -{"Format": "IDEA0", "ID": "1e5312b5-4ba8-4962-bc17-a29023f8026c", "DetectTime": "2023-10-30T14:14:30.624896+02:00", "EventTime": "2023-10-30T14:14:30.624907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CE5pkY3VYCcoajAPNj"]} -{"Format": "IDEA0", "ID": "b4015715-17ed-435c-a5e0-a00022206200", "DetectTime": "2023-10-30T14:14:30.655285+02:00", "EventTime": "2023-10-30T14:14:30.655300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CaPtUj1wmrGEVj5TLe"]} -{"Format": "IDEA0", "ID": "5e3cb6d2-a7d0-4297-b6d2-56044c415593", "DetectTime": "2023-10-30T14:14:30.685810+02:00", "EventTime": "2023-10-30T14:14:30.685826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CYwtmIOMxIjOcARd4"]} -{"Format": "IDEA0", "ID": "71d6c37a-b1e2-4316-aa48-3114456fc699", "DetectTime": "2023-10-30T14:14:30.716080+02:00", "EventTime": "2023-10-30T14:14:30.716094+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CpMt7A4S1l4Fk6kXG8"]} -{"Format": "IDEA0", "ID": "791fa155-6425-4121-8503-6b7335167c91", "DetectTime": "2023-10-30T14:14:30.743013+02:00", "EventTime": "2023-10-30T14:14:30.743025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CSj5N92MzMMEoBIG0e"]} -{"Format": "IDEA0", "ID": "38040352-831d-47e3-bdcf-32230b55c83a", "DetectTime": "2023-10-30T14:14:30.833180+02:00", "EventTime": "2023-10-30T14:14:30.833206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C3LvAg2OhvUC5GaI1h"]} -{"Format": "IDEA0", "ID": "a79249a6-ac8a-4ea5-889c-abc9739d6020", "DetectTime": "2023-10-30T14:14:30.864579+02:00", "EventTime": "2023-10-30T14:14:30.864589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CoL3NvoJ1vT09N5k6"]} -{"Format": "IDEA0", "ID": "d4d4ba12-9756-4ac4-ba37-62a9a1e59248", "DetectTime": "2023-10-30T14:14:30.895292+02:00", "EventTime": "2023-10-30T14:14:30.895305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["ChaDNzkTcnPGluE5b"]} -{"Format": "IDEA0", "ID": "dbc571dd-0539-4a0d-94d4-bbe38bf6341e", "DetectTime": "2023-10-30T14:14:30.925442+02:00", "EventTime": "2023-10-30T14:14:30.925458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CIbjn21X04V9ncPtA1"]} -{"Format": "IDEA0", "ID": "650d9fac-d933-4949-9997-89ed39bf6ee7", "DetectTime": "2023-10-30T14:14:30.955729+02:00", "EventTime": "2023-10-30T14:14:30.955739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CPvItL11nS17ealSo9"]} -{"Format": "IDEA0", "ID": "61caf28d-0367-469a-9642-e38226cc0d29", "DetectTime": "2023-10-30T14:14:30.983108+02:00", "EventTime": "2023-10-30T14:14:30.983122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cwu8Q82Q16Ucnm9tkj"]} -{"Format": "IDEA0", "ID": "b2972aad-b226-402c-9944-7f2c4396a576", "DetectTime": "2023-10-30T14:14:31.014774+02:00", "EventTime": "2023-10-30T14:14:31.014799+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CFHWFjUe2rypcmEIi"]} -{"Format": "IDEA0", "ID": "84a3b93e-2989-4375-a128-bf95cb550443", "DetectTime": "2023-10-30T14:14:31.044574+02:00", "EventTime": "2023-10-30T14:14:31.044589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["Cfcvyv2b2BG5jXhol"]} -{"Format": "IDEA0", "ID": "af1a9eb1-8aee-40a6-9e41-08fe62e1a2ba", "DetectTime": "2023-10-30T14:14:31.073976+02:00", "EventTime": "2023-10-30T14:14:31.073992+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CwHFcgzCpBaSWNIkk"]} -{"Format": "IDEA0", "ID": "1eac8e69-2aab-43f2-b50c-dcafedf31136", "DetectTime": "2023-10-30T14:14:31.101561+02:00", "EventTime": "2023-10-30T14:14:31.101575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CwCbMb4PcGe1E2tGHi"]} -{"Format": "IDEA0", "ID": "9dcea464-fd72-4e9f-86b2-efb5c8b53778", "DetectTime": "2023-10-30T14:14:31.131732+02:00", "EventTime": "2023-10-30T14:14:31.131742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["Cu4ugW1PcvAkzluHL8"]} -{"Format": "IDEA0", "ID": "65fe98eb-7bcb-47fd-bc3c-e1c598785a23", "DetectTime": "2023-10-30T14:14:31.162407+02:00", "EventTime": "2023-10-30T14:14:31.162423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["C7rwpw3bwv67FhDZvb"]} -{"Format": "IDEA0", "ID": "4afd0da4-18a2-4b7c-8cc0-cc27303fbe60", "DetectTime": "2023-10-30T14:14:31.191128+02:00", "EventTime": "2023-10-30T14:14:31.191142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CCkxPo3mxMbpe5Svi4"]} -{"Format": "IDEA0", "ID": "7234539c-6675-409e-9128-b92e6a97a87c", "DetectTime": "2023-10-30T14:14:31.220349+02:00", "EventTime": "2023-10-30T14:14:31.220359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CMgcQF1TXFjb8VSmq5"]} -{"Format": "IDEA0", "ID": "3243af9c-8d8e-4db8-a4ff-399ecf0eac99", "DetectTime": "2023-10-30T14:14:31.246953+02:00", "EventTime": "2023-10-30T14:14:31.246970+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CEjAmS2O9xWfu16SY6"]} -{"Format": "IDEA0", "ID": "851d63d5-fbbb-4d23-9cb5-4fefa0491b46", "DetectTime": "2023-10-30T14:14:31.276482+02:00", "EventTime": "2023-10-30T14:14:31.276497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cc91im2IbFnzhfw9el"]} -{"Format": "IDEA0", "ID": "922f891e-9d07-4977-9bc1-1d935a9a2be6", "DetectTime": "2023-10-30T14:14:31.306610+02:00", "EventTime": "2023-10-30T14:14:31.306625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CEsQbGHeEivJ2BV9"]} -{"Format": "IDEA0", "ID": "8e4c992c-47b7-49e8-b6a2-58a49380efc0", "DetectTime": "2023-10-30T14:14:31.331232+02:00", "EventTime": "2023-10-30T14:14:31.331242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CKcHr24BkTWL4sEa2k"]} -{"Format": "IDEA0", "ID": "03ed9002-9001-4165-b287-2bd45f5e9f10", "DetectTime": "2023-10-30T14:14:31.354437+02:00", "EventTime": "2023-10-30T14:14:31.354456+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CghsCverHPhVmkIAe"]} -{"Format": "IDEA0", "ID": "5cccae4d-da5f-4cee-ae07-e2dd9ae3381b", "DetectTime": "2023-10-30T14:14:31.386614+02:00", "EventTime": "2023-10-30T14:14:31.386630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CjZP1v3SkK9WYVJQBa"]} -{"Format": "Json", "ID": "5cccae4d-da5f-4cee-ae07-e2dd9ae3381b", "DetectTime": "2023-10-30T14:14:31.386614+02:00", "EventTime": "2023-10-30T14:14:31.386630+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:48:43.121883+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:31.463961)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9680129f-400e-4501-9f50-0bbbdfb03fbb", "DetectTime": "2023-10-30T14:14:31.468252+02:00", "EventTime": "2023-10-30T14:14:31.468264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CROoZm4vS7ZXZKmnUi"]} -{"Format": "IDEA0", "ID": "42d0e2e4-874d-44c8-828f-8c93fb13830f", "DetectTime": "2023-10-30T14:14:31.494352+02:00", "EventTime": "2023-10-30T14:14:31.494366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CrDdqe1rklzoWr0Bc2"]} -{"Format": "IDEA0", "ID": "4d40f8bf-33a4-4bf2-8612-a3ed2499f450", "DetectTime": "2023-10-30T14:14:31.519568+02:00", "EventTime": "2023-10-30T14:14:31.519584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CcBRMF3Nob0hIJdTP1"]} -{"Format": "IDEA0", "ID": "c198f76c-f674-45f5-ae76-cd15e6ed7401", "DetectTime": "2023-10-30T14:14:31.542003+02:00", "EventTime": "2023-10-30T14:14:31.542014+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CEPDH34OCgcUowPxYi"]} -{"Format": "IDEA0", "ID": "6fe2251a-6c4d-4e29-894b-dd3438c184e9", "DetectTime": "2023-10-30T14:14:31.563633+02:00", "EventTime": "2023-10-30T14:14:31.563643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CuOIO54a6BeLbtvjU6"]} -{"Format": "IDEA0", "ID": "011e93db-94fb-4326-a032-a0d43e6c66b0", "DetectTime": "2023-10-30T14:14:31.583082+02:00", "EventTime": "2023-10-30T14:14:31.583093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CGAmT44vWlUolMzOFb"]} -{"Format": "IDEA0", "ID": "9547b05d-bc5a-422c-bce0-347ff458d3bc", "DetectTime": "2023-10-30T14:14:31.602752+02:00", "EventTime": "2023-10-30T14:14:31.602763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CnA8BD1WtBByEOD658"]} -{"Format": "IDEA0", "ID": "0d24bc54-efb7-496c-89ce-a2ac16940350", "DetectTime": "2023-10-30T14:14:31.624941+02:00", "EventTime": "2023-10-30T14:14:31.624950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CCabKcRPy0pFeyAzl"]} -{"Format": "IDEA0", "ID": "3aaa35bf-3bee-4011-9144-c548c0bc6efc", "DetectTime": "2023-10-30T14:14:31.649287+02:00", "EventTime": "2023-10-30T14:14:31.649297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CDXbGT3iSAYItY9Xu5"]} -{"Format": "Json", "ID": "3aaa35bf-3bee-4011-9144-c548c0bc6efc", "DetectTime": "2023-10-30T14:14:31.649287+02:00", "EventTime": "2023-10-30T14:14:31.649297+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T07:48:44.839757+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 222. (real time 2023/10/30 14:14:31.712486)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f4c0c522-9f31-48ac-ad6f-9fa93492fc33", "DetectTime": "2023-10-30T14:14:31.716879+02:00", "EventTime": "2023-10-30T14:14:31.716895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CO10G11Hdv3Y70WGw2"]} -{"Format": "IDEA0", "ID": "b8ff2469-3e74-431d-ae24-9115ddf2452f", "DetectTime": "2023-10-30T14:14:31.740522+02:00", "EventTime": "2023-10-30T14:14:31.740536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CHoR4s1nqRpKfoHMs2"]} -{"Format": "IDEA0", "ID": "e38f2655-d570-4968-9a22-aefe5fd80a8c", "DetectTime": "2023-10-30T14:14:31.762836+02:00", "EventTime": "2023-10-30T14:14:31.762852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["C23TAO2jMaVdHg6Usd"]} -{"Format": "IDEA0", "ID": "72152a71-3d64-41dc-ba3c-38a7f87b145a", "DetectTime": "2023-10-30T14:14:31.795558+02:00", "EventTime": "2023-10-30T14:14:31.795574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CsqJAS3ITadmL7BMK5"]} -{"Format": "IDEA0", "ID": "a4c9a1d4-1c76-41f5-95af-eec5f1788b2b", "DetectTime": "2023-10-30T14:14:31.821257+02:00", "EventTime": "2023-10-30T14:14:31.821272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["C52zFW3AzzaQ7Rpq5"]} -{"Format": "IDEA0", "ID": "0ad184dc-6cb4-46c9-84a2-d48be23784db", "DetectTime": "2023-10-30T14:14:31.843867+02:00", "EventTime": "2023-10-30T14:14:31.843878+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C4lrsN122EwJOv9Vt"]} -{"Format": "IDEA0", "ID": "03d25c58-1a74-4835-958c-52f52f1def26", "DetectTime": "2023-10-30T14:14:31.865972+02:00", "EventTime": "2023-10-30T14:14:31.865987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CTP5mT1Q8brD2HJ9M6"]} -{"Format": "IDEA0", "ID": "128f1d60-3958-4626-a784-f0c762a8e5ab", "DetectTime": "2023-10-30T14:14:31.890402+02:00", "EventTime": "2023-10-30T14:14:31.890413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiV0iD4V3CFDO9TBWe"]} -{"Format": "IDEA0", "ID": "f483d5c5-60eb-4484-a203-b8ba13d4342f", "DetectTime": "2023-10-30T14:14:31.927745+02:00", "EventTime": "2023-10-30T14:14:31.927758+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CvFQQu4tW3taH0Droj"]} -{"Format": "IDEA0", "ID": "40636c35-7e6d-49cc-b01d-a73be5723230", "DetectTime": "2023-10-30T14:14:31.962192+02:00", "EventTime": "2023-10-30T14:14:31.962203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CTxlkIixZmIis9az9"]} -{"Format": "IDEA0", "ID": "0f3d4b54-3d41-4fe3-a52c-a4382f2538cd", "DetectTime": "2023-10-30T14:14:31.998266+02:00", "EventTime": "2023-10-30T14:14:31.998282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CRSsRB4CdC8YtDYIg6"]} -{"Format": "IDEA0", "ID": "cbc615ea-8193-493d-9576-bd514bb97562", "DetectTime": "2023-10-30T14:14:32.024188+02:00", "EventTime": "2023-10-30T14:14:32.024203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CmrQWh3LzXaKQPota7"]} -{"Format": "IDEA0", "ID": "292b51f9-bb7e-4554-9ace-96c9d287baf3", "DetectTime": "2023-10-30T14:14:32.063478+02:00", "EventTime": "2023-10-30T14:14:32.063494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CZnCNY1hUSJiqcwzA9"]} -{"Format": "IDEA0", "ID": "5ff54b07-36d3-405b-8268-e5d5eff95850", "DetectTime": "2023-10-30T14:14:32.102540+02:00", "EventTime": "2023-10-30T14:14:32.102555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C7Mvge9ob8votTspf"]} -{"Format": "IDEA0", "ID": "eb3187fd-d6bd-4014-b03a-c6c6512e588d", "DetectTime": "2023-10-30T14:14:32.139948+02:00", "EventTime": "2023-10-30T14:14:32.139958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CBtgqV4dHuQX1Zwa4"]} -{"Format": "IDEA0", "ID": "e443e46a-b995-4ef9-8d9a-d4ab7d03e153", "DetectTime": "2023-10-30T14:14:32.179269+02:00", "EventTime": "2023-10-30T14:14:32.179293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C7Oz5wZhgFGIJRjh1"]} -{"Format": "Json", "ID": "e443e46a-b995-4ef9-8d9a-d4ab7d03e153", "DetectTime": "2023-10-30T14:14:32.179269+02:00", "EventTime": "2023-10-30T14:14:32.179293+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:19:07.486328+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:32.261145)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0fd7708a-0d97-4f55-9b15-24c8d1991fb5", "DetectTime": "2023-10-30T14:14:32.266538+02:00", "EventTime": "2023-10-30T14:14:32.266564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CR40Xg35qI5soJO25l"]} -{"Format": "IDEA0", "ID": "06c5f7a9-6ea6-4e67-85dd-93bfb79ebeb2", "DetectTime": "2023-10-30T14:14:32.298148+02:00", "EventTime": "2023-10-30T14:14:32.298163+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C5ECNF1qeSfJvjlYF5"]} -{"Format": "IDEA0", "ID": "b12b6d30-a0cc-4b12-a2f5-3aac50354b22", "DetectTime": "2023-10-30T14:14:32.325841+02:00", "EventTime": "2023-10-30T14:14:32.325850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CHC3BA1vkMdvQQDMid"]} -{"Format": "IDEA0", "ID": "740cb32a-7afd-4518-936f-60ca088c9728", "DetectTime": "2023-10-30T14:14:32.356585+02:00", "EventTime": "2023-10-30T14:14:32.356596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CGDpBm4mLbMSUxbFM8"]} -{"Format": "IDEA0", "ID": "1b9a59ed-c2ff-4855-969c-8c82f2c86332", "DetectTime": "2023-10-30T14:14:32.379464+02:00", "EventTime": "2023-10-30T14:14:32.379475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Ct2fyI3STKrkZ5suRj"]} -{"Format": "IDEA0", "ID": "688226e7-cbcc-4351-9a96-8c0e68130a64", "DetectTime": "2023-10-30T14:14:32.409629+02:00", "EventTime": "2023-10-30T14:14:32.409642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CtjATK2knwdRMnQVN1"]} -{"Format": "IDEA0", "ID": "3c45887f-a24e-459c-a280-5c45918c3f57", "DetectTime": "2023-10-30T14:14:32.438675+02:00", "EventTime": "2023-10-30T14:14:32.438685+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C2TeF834Scfk3oEQS3"]} -{"Format": "IDEA0", "ID": "152f6b76-5e39-400d-b355-a4893d92916a", "DetectTime": "2023-10-30T14:14:32.473687+02:00", "EventTime": "2023-10-30T14:14:32.473697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CahIXt1g9jsE4wEXw5"]} -{"Format": "Json", "ID": "152f6b76-5e39-400d-b355-a4893d92916a", "DetectTime": "2023-10-30T14:14:32.473687+02:00", "EventTime": "2023-10-30T14:14:32.473697+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:19:08.950282+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:32.548851)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cad681e6-a021-4254-a6b3-9ed91f8aa406", "DetectTime": "2023-10-30T14:14:32.552998+02:00", "EventTime": "2023-10-30T14:14:32.553008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C4lw3e3e6z2FjVGpci"]} -{"Format": "IDEA0", "ID": "519a5ac2-393b-4463-aaad-ef29588204f5", "DetectTime": "2023-10-30T14:14:32.661521+02:00", "EventTime": "2023-10-30T14:14:32.661532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CgAs64im7vV6baxGi"]} -{"Format": "IDEA0", "ID": "5785da5b-e33a-4b70-8013-21d5e02235c2", "DetectTime": "2023-10-30T14:14:32.689139+02:00", "EventTime": "2023-10-30T14:14:32.689156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CdNcoZ3nX9NuPcqKA2"]} -{"Format": "IDEA0", "ID": "f1e119ce-16d0-4435-928e-3ee909b37357", "DetectTime": "2023-10-30T14:14:32.717277+02:00", "EventTime": "2023-10-30T14:14:32.717293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CYhwdNRRqyzAUtmf"]} -{"Format": "IDEA0", "ID": "a4a259f4-2a13-4bb0-8636-1dca00691f13", "DetectTime": "2023-10-30T14:14:32.747807+02:00", "EventTime": "2023-10-30T14:14:32.747822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Ctr0No2C3On1IOE0B6"]} -{"Format": "IDEA0", "ID": "fed1b951-26ff-4d27-8150-87c4d02dfd31", "DetectTime": "2023-10-30T14:14:32.782956+02:00", "EventTime": "2023-10-30T14:14:32.782972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CZ7dsA1GPgJMRUKiZ4"]} -{"Format": "IDEA0", "ID": "1bda2fb3-bb45-4dcc-baff-aafecbaf8370", "DetectTime": "2023-10-30T14:14:32.819611+02:00", "EventTime": "2023-10-30T14:14:32.819623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CNfQlh2P6ddUmLGt74"]} -{"Format": "IDEA0", "ID": "c739f229-bae2-4d0d-a9d5-3feab162f586", "DetectTime": "2023-10-30T14:14:32.855068+02:00", "EventTime": "2023-10-30T14:14:32.855085+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CBElvBS0ZiXHcoO32"]} -{"Format": "Json", "ID": "c739f229-bae2-4d0d-a9d5-3feab162f586", "DetectTime": "2023-10-30T14:14:32.855068+02:00", "EventTime": "2023-10-30T14:14:32.855085+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:19:10.331045+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:32.931204)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cbbddee0-4957-4bc7-a231-5dc41ab35664", "DetectTime": "2023-10-30T14:14:32.935649+02:00", "EventTime": "2023-10-30T14:14:32.935661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CD5Tkv8y7K9OiRfA5"]} -{"Format": "IDEA0", "ID": "f4252691-4395-4640-8e23-111d4be1e60c", "DetectTime": "2023-10-30T14:14:32.968810+02:00", "EventTime": "2023-10-30T14:14:32.968820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["C8qh4GKxq33WIUGli"]} -{"Format": "IDEA0", "ID": "9fc81839-1328-4b1c-90c6-918b9997ab33", "DetectTime": "2023-10-30T14:14:32.995914+02:00", "EventTime": "2023-10-30T14:14:32.995936+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CiSllG3y2YkfC1fGM6"]} -{"Format": "IDEA0", "ID": "3a8fda7e-6dd3-4c3d-b5cb-4abf991ae069", "DetectTime": "2023-10-30T14:14:33.025329+02:00", "EventTime": "2023-10-30T14:14:33.025346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CJyJ9R2Z4UoaBxo0Ih"]} -{"Format": "IDEA0", "ID": "44d2aa2c-7c36-4cf2-847f-cbdbd63a417a", "DetectTime": "2023-10-30T14:14:33.057308+02:00", "EventTime": "2023-10-30T14:14:33.057324+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CCjVMX1i6JAIa7MDFk"]} -{"Format": "IDEA0", "ID": "0cf2621f-a6f7-499a-a9e7-a49361ecad74", "DetectTime": "2023-10-30T14:14:33.090616+02:00", "EventTime": "2023-10-30T14:14:33.090630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C4fbHWbWVZKviqrLi"]} -{"Format": "IDEA0", "ID": "7099284e-0883-4478-a6f6-dcf28b9f0153", "DetectTime": "2023-10-30T14:14:33.120355+02:00", "EventTime": "2023-10-30T14:14:33.120369+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CQqTH131m2sGN7d269"]} -{"Format": "IDEA0", "ID": "7a4a9f24-8949-4cd4-8089-4156e886ed85", "DetectTime": "2023-10-30T14:14:33.151658+02:00", "EventTime": "2023-10-30T14:14:33.151670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CsYazL1FiZWZt8jYL9"]} -{"Format": "Json", "ID": "7a4a9f24-8949-4cd4-8089-4156e886ed85", "DetectTime": "2023-10-30T14:14:33.151658+02:00", "EventTime": "2023-10-30T14:14:33.151670+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:19:11.628735+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:33.222156)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "98ae8200-6d79-4e4c-81fd-2fba1c7c4c73", "DetectTime": "2023-10-30T14:14:33.226608+02:00", "EventTime": "2023-10-30T14:14:33.226620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CJGhFC4BhgXZOmTJMl"]} -{"Format": "IDEA0", "ID": "d84b314b-9822-4a6d-81ed-acad6670b784", "DetectTime": "2023-10-30T14:14:33.254970+02:00", "EventTime": "2023-10-30T14:14:33.254981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CsNrAe2jVxQCZ18CBi"]} -{"Format": "IDEA0", "ID": "9a0052de-54dc-410d-be7f-bd0ac25fd297", "DetectTime": "2023-10-30T14:14:33.280357+02:00", "EventTime": "2023-10-30T14:14:33.280373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CUgL8C1MUydhJPsOt9"]} -{"Format": "IDEA0", "ID": "1bc6ec26-1873-46a2-9c4a-90a73d6cde18", "DetectTime": "2023-10-30T14:14:33.305626+02:00", "EventTime": "2023-10-30T14:14:33.305637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CquwRdfdfjNel16Qh"]} -{"Format": "IDEA0", "ID": "6e50ec79-1a33-4079-93fc-586162a21e15", "DetectTime": "2023-10-30T14:14:33.333262+02:00", "EventTime": "2023-10-30T14:14:33.333274+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CbKDS620ueX0HB9281"]} -{"Format": "IDEA0", "ID": "098d76a9-a060-4bd8-b6ae-af2805927766", "DetectTime": "2023-10-30T14:14:33.361262+02:00", "EventTime": "2023-10-30T14:14:33.361275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4otfw2N0E05jELwdd"]} -{"Format": "IDEA0", "ID": "8ab8a51d-ef9a-42b6-a91a-55c66fe75d92", "DetectTime": "2023-10-30T14:14:33.387004+02:00", "EventTime": "2023-10-30T14:14:33.387015+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C26yIktGRMqzBXPSf"]} -{"Format": "IDEA0", "ID": "7929dcce-cb25-4a98-989f-cbb1aa462f98", "DetectTime": "2023-10-30T14:14:33.412444+02:00", "EventTime": "2023-10-30T14:14:33.412455+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CxiYIB494xZwj5cwVa"]} -{"Format": "IDEA0", "ID": "f2bd389d-f7d0-44ce-bed1-0987b9a1492f", "DetectTime": "2023-10-30T14:14:33.442876+02:00", "EventTime": "2023-10-30T14:14:33.442893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CCw6dnYge67jGJmS4"]} -{"Format": "Json", "ID": "f2bd389d-f7d0-44ce-bed1-0987b9a1492f", "DetectTime": "2023-10-30T14:14:33.442876+02:00", "EventTime": "2023-10-30T14:14:33.442893+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:49:24.563465+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:33.514255)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0af57e78-c30c-43de-8aef-316cbad10468", "DetectTime": "2023-10-30T14:14:33.519425+02:00", "EventTime": "2023-10-30T14:14:33.519440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CZaihf4BpJtlVTO288"]} -{"Format": "IDEA0", "ID": "ec32d6a9-4cc3-4dee-a31a-ae4ff459fa20", "DetectTime": "2023-10-30T14:14:33.547829+02:00", "EventTime": "2023-10-30T14:14:33.547851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CmZEwD3FzkHtkBmzR"]} -{"Format": "IDEA0", "ID": "1f28a458-35bc-42bc-9cb8-b8662797b8fb", "DetectTime": "2023-10-30T14:14:33.573666+02:00", "EventTime": "2023-10-30T14:14:33.573686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CsP9Fq1OIwoeFdaNgk"]} -{"Format": "IDEA0", "ID": "45bdd9b2-6c15-4d84-b50d-ee1f9eb3fbc0", "DetectTime": "2023-10-30T14:14:33.602961+02:00", "EventTime": "2023-10-30T14:14:33.602974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["ChTQgE1sTgDR3UBi17"]} -{"Format": "IDEA0", "ID": "63e87df2-b3ba-4bf8-90b6-88e5fc3a67c6", "DetectTime": "2023-10-30T14:14:33.630012+02:00", "EventTime": "2023-10-30T14:14:33.630028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cg6FYK38mApBpEIBMl"]} -{"Format": "IDEA0", "ID": "b2eddce7-d58a-4784-8405-0ebb988822f5", "DetectTime": "2023-10-30T14:14:33.658747+02:00", "EventTime": "2023-10-30T14:14:33.658762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C2TrGN152gK2CGyZm3"]} -{"Format": "IDEA0", "ID": "fe12f6ff-df4c-435f-9982-950b663cabd0", "DetectTime": "2023-10-30T14:14:33.684644+02:00", "EventTime": "2023-10-30T14:14:33.684657+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CH06al1Aej7fwoebOa"]} -{"Format": "IDEA0", "ID": "6b6acb2d-dc97-44e9-8d42-88c63c28390c", "DetectTime": "2023-10-30T14:14:33.711331+02:00", "EventTime": "2023-10-30T14:14:33.711347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C0p8zJ30FConbmHnda"]} -{"Format": "IDEA0", "ID": "fa22b6ac-05a2-43ef-b56f-300fc4e78445", "DetectTime": "2023-10-30T14:14:33.739157+02:00", "EventTime": "2023-10-30T14:14:33.739171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CC4gmj1d37tECVhf93"]} -{"Format": "Json", "ID": "fa22b6ac-05a2-43ef-b56f-300fc4e78445", "DetectTime": "2023-10-30T14:14:33.739157+02:00", "EventTime": "2023-10-30T14:14:33.739171+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:49:25.534912+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:33.811276)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "240ba272-e0ab-43b0-a8b8-729b57ad3f82", "DetectTime": "2023-10-30T14:14:33.816363+02:00", "EventTime": "2023-10-30T14:14:33.816374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CXYnO729ASXy3TMeNf"]} -{"Format": "IDEA0", "ID": "3d8d1557-6fc1-46b3-b65c-16a5bc0a136e", "DetectTime": "2023-10-30T14:14:33.840700+02:00", "EventTime": "2023-10-30T14:14:33.840710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CUwMkV1O98rmbLTRya"]} -{"Format": "IDEA0", "ID": "be737adb-28d5-434f-806b-dc6498d551dd", "DetectTime": "2023-10-30T14:14:33.863025+02:00", "EventTime": "2023-10-30T14:14:33.863041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CVB4aI1yJl45w62ek"]} -{"Format": "IDEA0", "ID": "a2937393-3ef2-462a-b3e9-d3f4c139460d", "DetectTime": "2023-10-30T14:14:33.888877+02:00", "EventTime": "2023-10-30T14:14:33.888887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C9gL9wBxW3Ri23lS5"]} -{"Format": "IDEA0", "ID": "6453a6e3-b02a-4e6d-8d60-4da8730f7d59", "DetectTime": "2023-10-30T14:14:33.909634+02:00", "EventTime": "2023-10-30T14:14:33.909645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CLH6Bk3hbBtQtxm5ce"]} -{"Format": "IDEA0", "ID": "2358fa66-13f5-4561-ba94-04f784285116", "DetectTime": "2023-10-30T14:14:33.932231+02:00", "EventTime": "2023-10-30T14:14:33.932245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CEGuG12qQT4lDUgio1"]} -{"Format": "IDEA0", "ID": "653deccd-9fa8-4eaa-8465-e0dacf1bceb5", "DetectTime": "2023-10-30T14:14:33.958268+02:00", "EventTime": "2023-10-30T14:14:33.958283+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CO6Mr14ig8KobvkLt"]} -{"Format": "IDEA0", "ID": "c1defd00-1547-4440-9a96-b13a981bfe0d", "DetectTime": "2023-10-30T14:14:33.980544+02:00", "EventTime": "2023-10-30T14:14:33.980557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C77MHY3YvTFrEtNTJa"]} -{"Format": "Json", "ID": "c1defd00-1547-4440-9a96-b13a981bfe0d", "DetectTime": "2023-10-30T14:14:33.980544+02:00", "EventTime": "2023-10-30T14:14:33.980557+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:49:27.095655+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:34.044282)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "156c35da-ce71-4643-9d31-a0e505f3104a", "DetectTime": "2023-10-30T14:14:34.049344+02:00", "EventTime": "2023-10-30T14:14:34.049355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CWRxPk2LJXpZQUU356"]} -{"Format": "IDEA0", "ID": "8754d968-265b-48b8-98b2-2b16f5c85a4a", "DetectTime": "2023-10-30T14:14:34.072738+02:00", "EventTime": "2023-10-30T14:14:34.072749+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C3tQoe3oXuBp2jRhsi"]} -{"Format": "IDEA0", "ID": "eadaa05c-4034-4ee3-bffc-1ebd726f72df", "DetectTime": "2023-10-30T14:14:34.095311+02:00", "EventTime": "2023-10-30T14:14:34.095327+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CkSJd26aU70nnech6"]} -{"Format": "IDEA0", "ID": "b88b7745-5c98-48b6-adb1-4cfb42d4bb13", "DetectTime": "2023-10-30T14:14:34.118404+02:00", "EventTime": "2023-10-30T14:14:34.118420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CM85zt3n15m81Y3ZYb"]} -{"Format": "IDEA0", "ID": "ad019a3e-19c5-42ea-839d-4ec8e151466e", "DetectTime": "2023-10-30T14:14:34.140387+02:00", "EventTime": "2023-10-30T14:14:34.140412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CRcMMk4h3POS4wiDKl"]} -{"Format": "IDEA0", "ID": "0aa05208-286b-4707-9ee1-f977c5b894f6", "DetectTime": "2023-10-30T14:14:34.164137+02:00", "EventTime": "2023-10-30T14:14:34.164151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CiOWPb3kXRvFrmZ7E8"]} -{"Format": "IDEA0", "ID": "393f2000-dfd2-4e88-9915-ce2bb29f4241", "DetectTime": "2023-10-30T14:14:34.184884+02:00", "EventTime": "2023-10-30T14:14:34.184908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CyBv6q30rou1hjxao2"]} -{"Format": "IDEA0", "ID": "0742c8a3-fd57-4b3c-a993-c476c95b94d8", "DetectTime": "2023-10-30T14:14:34.205645+02:00", "EventTime": "2023-10-30T14:14:34.205660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CBOqfh3skeEcYePuE6"]} -{"Format": "Json", "ID": "0742c8a3-fd57-4b3c-a993-c476c95b94d8", "DetectTime": "2023-10-30T14:14:34.205645+02:00", "EventTime": "2023-10-30T14:14:34.205660+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:49:28.504829+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:34.262202)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1427ac98-c03f-4ab0-8a77-301162e0baf5", "DetectTime": "2023-10-30T14:14:34.266239+02:00", "EventTime": "2023-10-30T14:14:34.266252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CMAui74A7ipMVf0MCc"]} -{"Format": "IDEA0", "ID": "b867a6c6-db8f-4393-b96e-912061673c37", "DetectTime": "2023-10-30T14:14:34.283834+02:00", "EventTime": "2023-10-30T14:14:34.283846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CSu0KO3m51t2k0Zwh9"]} -{"Format": "IDEA0", "ID": "c4d3bec3-490a-4545-8007-11121c872005", "DetectTime": "2023-10-30T14:14:34.299643+02:00", "EventTime": "2023-10-30T14:14:34.299654+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CAfUAS9Vop7GmvOO9"]} -{"Format": "IDEA0", "ID": "45ef1b76-292c-4842-a256-8e02317cfaa9", "DetectTime": "2023-10-30T14:14:34.314653+02:00", "EventTime": "2023-10-30T14:14:34.314665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CZQLD611kYjG2E0sJj"]} -{"Format": "IDEA0", "ID": "2211e099-703d-4da6-b19b-76981df6ae45", "DetectTime": "2023-10-30T14:14:34.329828+02:00", "EventTime": "2023-10-30T14:14:34.329838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CwQYtc35CBRHQH1rIj"]} -{"Format": "IDEA0", "ID": "d003869e-a316-43ee-9a4c-363fc30ec974", "DetectTime": "2023-10-30T14:14:34.347066+02:00", "EventTime": "2023-10-30T14:14:34.347083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CeeFBa26OkOOAyG2wg"]} -{"Format": "IDEA0", "ID": "f6fa1feb-dd8f-48e0-ad7a-b0888bdd2a4f", "DetectTime": "2023-10-30T14:14:34.367593+02:00", "EventTime": "2023-10-30T14:14:34.367604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CY0P402E8jeYdknrs2"]} -{"Format": "IDEA0", "ID": "8242c1b7-4141-4790-b6c4-158efb4a29bc", "DetectTime": "2023-10-30T14:14:34.382466+02:00", "EventTime": "2023-10-30T14:14:34.382475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CiH9Wx2ZP0DuBKTqx4"]} -{"Format": "Json", "ID": "8242c1b7-4141-4790-b6c4-158efb4a29bc", "DetectTime": "2023-10-30T14:14:34.382466+02:00", "EventTime": "2023-10-30T14:14:34.382475+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T08:49:29.866435+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 223. (real time 2023/10/30 14:14:34.434884)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1031246e-c475-4cb8-ab83-fdd710db8f66", "DetectTime": "2023-10-30T14:14:34.439264+02:00", "EventTime": "2023-10-30T14:14:34.439277+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgeUiw13cq2KfEQak9"]} -{"Format": "IDEA0", "ID": "d9b8e64b-93f3-4319-9921-f5707e6b67ba", "DetectTime": "2023-10-30T14:14:34.473930+02:00", "EventTime": "2023-10-30T14:14:34.473945+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CtMHww4I2APJZThgd6"]} -{"Format": "IDEA0", "ID": "53d7639e-604b-4be7-8c56-495b2edbcd3a", "DetectTime": "2023-10-30T14:14:34.499988+02:00", "EventTime": "2023-10-30T14:14:34.499997+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["Cd5Tm5267WcF0bPob6"]} -{"Format": "IDEA0", "ID": "de53c565-4e58-4d38-8b85-70ed5a7bae06", "DetectTime": "2023-10-30T14:14:34.534535+02:00", "EventTime": "2023-10-30T14:14:34.534546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CuLsme11Tt6itvOlM6"]} -{"Format": "IDEA0", "ID": "9663b0ce-4db5-4b01-8fd1-35b4b7df9948", "DetectTime": "2023-10-30T14:14:34.573797+02:00", "EventTime": "2023-10-30T14:14:34.573812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CJuRxz4uAepN6Z0Sl1"]} -{"Format": "IDEA0", "ID": "306006ca-9004-41c2-bbb6-db328e0d5429", "DetectTime": "2023-10-30T14:14:34.615356+02:00", "EventTime": "2023-10-30T14:14:34.615370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CzF7Q833EuiEIkRii3"]} -{"Format": "IDEA0", "ID": "537449e9-ab11-40ab-a112-159f908a493c", "DetectTime": "2023-10-30T14:14:34.646375+02:00", "EventTime": "2023-10-30T14:14:34.646386+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CNgRoGKcNh5rd0kef"]} -{"Format": "IDEA0", "ID": "67ca2320-cbc2-4b08-81c3-ade88129cfe2", "DetectTime": "2023-10-30T14:14:34.671474+02:00", "EventTime": "2023-10-30T14:14:34.671488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CPzFK41OT5voJ4nv47"]} -{"Format": "Json", "ID": "67ca2320-cbc2-4b08-81c3-ade88129cfe2", "DetectTime": "2023-10-30T14:14:34.671474+02:00", "EventTime": "2023-10-30T14:14:34.671488+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:19:35.547498+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:34.736193)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d58c55f0-d758-4c34-831f-88c5adf66b15", "DetectTime": "2023-10-30T14:14:34.739950+02:00", "EventTime": "2023-10-30T14:14:34.739961+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C00kO71XMRURFXvUFi"]} -{"Format": "IDEA0", "ID": "fe8d821d-d1c4-4321-b7ba-56b0b8171f98", "DetectTime": "2023-10-30T14:14:34.764125+02:00", "EventTime": "2023-10-30T14:14:34.764134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cihd4Dsl32O6Mm5lg"]} -{"Format": "IDEA0", "ID": "f1bc8d0d-0635-4c8c-8e0c-691d6ef0632d", "DetectTime": "2023-10-30T14:14:34.792709+02:00", "EventTime": "2023-10-30T14:14:34.792719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CgYuip2DKuO9fRP8Jj"]} -{"Format": "IDEA0", "ID": "a66b6e83-1c2c-4c76-ae65-ecff33ad3ed2", "DetectTime": "2023-10-30T14:14:34.817761+02:00", "EventTime": "2023-10-30T14:14:34.817771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CzWEG63BzA84H7nthe"]} -{"Format": "IDEA0", "ID": "25b8cb07-27f7-4df5-b926-fdade6c248cf", "DetectTime": "2023-10-30T14:14:34.846296+02:00", "EventTime": "2023-10-30T14:14:34.846307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CdMzsl4Icospsp9ks3"]} -{"Format": "IDEA0", "ID": "6aaf65af-ab84-4bfd-9759-862bef880fed", "DetectTime": "2023-10-30T14:14:34.874434+02:00", "EventTime": "2023-10-30T14:14:34.874445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CTHklA5lM4arfmLn8"]} -{"Format": "IDEA0", "ID": "52dce37f-4244-49d0-8ef0-458387047ee1", "DetectTime": "2023-10-30T14:14:34.897842+02:00", "EventTime": "2023-10-30T14:14:34.897852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CZQJYM2o8ImlRCsqAl"]} -{"Format": "IDEA0", "ID": "1af7bab1-6cdb-4cbc-89bc-d6b26c51afeb", "DetectTime": "2023-10-30T14:14:34.924957+02:00", "EventTime": "2023-10-30T14:14:34.924967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C3o3js2HLhPjcNTg06"]} -{"Format": "Json", "ID": "1af7bab1-6cdb-4cbc-89bc-d6b26c51afeb", "DetectTime": "2023-10-30T14:14:34.924957+02:00", "EventTime": "2023-10-30T14:14:34.924967+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:19:37.005978+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:34.985677)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8d94f6bf-19d3-448a-9a73-e4cceb8af882", "DetectTime": "2023-10-30T14:14:34.989247+02:00", "EventTime": "2023-10-30T14:14:34.989257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C83rUA4hrwntUXPS4"]} -{"Format": "IDEA0", "ID": "0d462d22-52ad-49ca-b289-9e4bf2718bc4", "DetectTime": "2023-10-30T14:14:35.017282+02:00", "EventTime": "2023-10-30T14:14:35.017293+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CN09Tao1MFnSQEFha"]} -{"Format": "IDEA0", "ID": "a0ea661e-ee0b-4169-a36b-0d4ffcba0544", "DetectTime": "2023-10-30T14:14:35.044484+02:00", "EventTime": "2023-10-30T14:14:35.044495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cqim6WcklScwsTNJ2"]} -{"Format": "IDEA0", "ID": "337fa33c-eefa-4cf7-975c-2580fbb9b69d", "DetectTime": "2023-10-30T14:14:35.069942+02:00", "EventTime": "2023-10-30T14:14:35.069953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CU2aVA32gMwrsPqrHh"]} -{"Format": "IDEA0", "ID": "fb6f2480-9fc3-4556-bff6-87faf97e1f30", "DetectTime": "2023-10-30T14:14:35.096622+02:00", "EventTime": "2023-10-30T14:14:35.096633+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cs2uZz1rmu0gQsGND6"]} -{"Format": "IDEA0", "ID": "c11310d7-bff1-41f0-8fba-d81b7f5ec0a6", "DetectTime": "2023-10-30T14:14:35.114863+02:00", "EventTime": "2023-10-30T14:14:35.114874+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CZgiym1WkB6TQxRYL6"]} -{"Format": "IDEA0", "ID": "3f6f8535-e0a7-4ff4-a828-2ee8a191e761", "DetectTime": "2023-10-30T14:14:35.143204+02:00", "EventTime": "2023-10-30T14:14:35.143223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CeWAYx1GgzFiW9Uhca"]} -{"Format": "IDEA0", "ID": "0098f1d7-a32a-468b-921c-ecc5c7ed286d", "DetectTime": "2023-10-30T14:14:35.172967+02:00", "EventTime": "2023-10-30T14:14:35.172979+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CR3K4klSsfdEQvepa"]} -{"Format": "IDEA0", "ID": "8633b54a-007d-4594-b229-709b6be056a5", "DetectTime": "2023-10-30T14:14:35.204026+02:00", "EventTime": "2023-10-30T14:14:35.204040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["C6VY1NCmqK75pbGTj"]} -{"Format": "Json", "ID": "8633b54a-007d-4594-b229-709b6be056a5", "DetectTime": "2023-10-30T14:14:35.204026+02:00", "EventTime": "2023-10-30T14:14:35.204040+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:19:38.144325+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:35.268868)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e49b9403-2f12-48a8-be5c-ee3b103b5612", "DetectTime": "2023-10-30T14:14:35.273466+02:00", "EventTime": "2023-10-30T14:14:35.273476+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CcnOAc3sr4QAPPFZ29"]} -{"Format": "IDEA0", "ID": "7906ee4e-d504-4a3c-9cff-e857f6ffd776", "DetectTime": "2023-10-30T14:14:35.297716+02:00", "EventTime": "2023-10-30T14:14:35.297725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Cy6LjgUXk4bAvTtq4"]} -{"Format": "IDEA0", "ID": "981f81b3-aae0-4781-ba37-2be1167085ae", "DetectTime": "2023-10-30T14:14:35.321673+02:00", "EventTime": "2023-10-30T14:14:35.321688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CmykDvJ1Bf803B1Bj"]} -{"Format": "IDEA0", "ID": "245bd09c-1392-46f3-8dbd-5fda0b77d34d", "DetectTime": "2023-10-30T14:14:35.353183+02:00", "EventTime": "2023-10-30T14:14:35.353198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["C0r4Rz1KtiEVvzWnfe"]} -{"Format": "IDEA0", "ID": "9c050ac7-74e5-4fef-9b9e-d10900971d96", "DetectTime": "2023-10-30T14:14:35.379302+02:00", "EventTime": "2023-10-30T14:14:35.379314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CEf2punOy4m4oMFm2"]} -{"Format": "IDEA0", "ID": "718c4f49-2c6d-4b22-ad2b-7a4a70c53e12", "DetectTime": "2023-10-30T14:14:35.403892+02:00", "EventTime": "2023-10-30T14:14:35.403906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CUMpRy38vg2vupTqq5"]} -{"Format": "IDEA0", "ID": "b4076f36-07cd-4072-8ee9-d9c2df737166", "DetectTime": "2023-10-30T14:14:35.426732+02:00", "EventTime": "2023-10-30T14:14:35.426745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CSx7sv1rRc4uK2zuX9"]} -{"Format": "IDEA0", "ID": "56d5283c-4e68-4573-b17e-60f193131932", "DetectTime": "2023-10-30T14:14:35.448333+02:00", "EventTime": "2023-10-30T14:14:35.448342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CgHZdt19XKT7hF58jf"]} -{"Format": "Json", "ID": "56d5283c-4e68-4573-b17e-60f193131932", "DetectTime": "2023-10-30T14:14:35.448333+02:00", "EventTime": "2023-10-30T14:14:35.448342+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:19:39.578647+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:35.506515)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "627385aa-755c-4353-a99c-6d9900e94bf6", "DetectTime": "2023-10-30T14:14:35.510818+02:00", "EventTime": "2023-10-30T14:14:35.510831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C7WAgg3lc5ID2sreik"]} -{"Format": "IDEA0", "ID": "f1eeaaf1-b0a6-4767-a627-0da4619ca476", "DetectTime": "2023-10-30T14:14:35.533393+02:00", "EventTime": "2023-10-30T14:14:35.533404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["Cjanl24CZfuDRcZD9"]} -{"Format": "IDEA0", "ID": "05aacf41-2340-4a6e-8213-fb7f6133c581", "DetectTime": "2023-10-30T14:14:35.558270+02:00", "EventTime": "2023-10-30T14:14:35.558286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["C5OIRX1EtgjJ5vsRlc"]} -{"Format": "IDEA0", "ID": "111d89e9-f50a-4d29-9418-060a0f17172f", "DetectTime": "2023-10-30T14:14:35.588516+02:00", "EventTime": "2023-10-30T14:14:35.588530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CLLeci3W0xXvwFt6W4"]} -{"Format": "IDEA0", "ID": "ce90a0fd-be5c-4df7-bbf6-c5f08afa75b2", "DetectTime": "2023-10-30T14:14:35.619146+02:00", "EventTime": "2023-10-30T14:14:35.619160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cnk3nn1eLcLuIAjLw5"]} -{"Format": "IDEA0", "ID": "c9ae3a78-05b9-4f1e-a0f0-6c1951f49983", "DetectTime": "2023-10-30T14:14:35.645118+02:00", "EventTime": "2023-10-30T14:14:35.645129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["C1oUxs2IWzq9vkKC3"]} -{"Format": "IDEA0", "ID": "7f40f2cb-136e-4ebb-b173-0f36b62210d7", "DetectTime": "2023-10-30T14:14:35.665258+02:00", "EventTime": "2023-10-30T14:14:35.665268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CDNrcV2ye2fHfvN9Ja"]} -{"Format": "IDEA0", "ID": "0e452d37-5919-4703-a91d-30ef8b2bb8f1", "DetectTime": "2023-10-30T14:14:35.686562+02:00", "EventTime": "2023-10-30T14:14:35.686576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CKDh9hq5efDlXafL6"]} -{"Format": "Json", "ID": "0e452d37-5919-4703-a91d-30ef8b2bb8f1", "DetectTime": "2023-10-30T14:14:35.686562+02:00", "EventTime": "2023-10-30T14:14:35.686576+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:50:12.249974+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:35.744428)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d4d10f92-2974-4dc7-bfe4-b4c28092e312", "DetectTime": "2023-10-30T14:14:35.748121+02:00", "EventTime": "2023-10-30T14:14:35.748131+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C3g99q3lV7aEo2YHQ8"]} -{"Format": "IDEA0", "ID": "61c0068c-8e9c-413e-8e57-e13735132cd7", "DetectTime": "2023-10-30T14:14:35.770497+02:00", "EventTime": "2023-10-30T14:14:35.770509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJ5PYk4zAvjwtUUcIe"]} -{"Format": "IDEA0", "ID": "a0eb5969-c837-44f1-9f8c-a48acccd86ae", "DetectTime": "2023-10-30T14:14:35.797087+02:00", "EventTime": "2023-10-30T14:14:35.797099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C1IIez1J10T5Lvu6l1"]} -{"Format": "IDEA0", "ID": "92c64d10-36ef-42f9-8b85-0d3356c2ace9", "DetectTime": "2023-10-30T14:14:35.821890+02:00", "EventTime": "2023-10-30T14:14:35.821902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C8DjpV1KAUXaGg0BK6"]} -{"Format": "IDEA0", "ID": "2f162f7a-872e-4300-8a49-c5f261ddd707", "DetectTime": "2023-10-30T14:14:35.844662+02:00", "EventTime": "2023-10-30T14:14:35.844672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C5mLfW3E8DP8r9gE7g"]} -{"Format": "IDEA0", "ID": "d8eced03-be78-4a84-bb7b-56d7067591f1", "DetectTime": "2023-10-30T14:14:35.866641+02:00", "EventTime": "2023-10-30T14:14:35.866652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CSqQag3PII9d5Klw38"]} -{"Format": "IDEA0", "ID": "0add1ed6-46fd-46d5-b65a-0e753ed9e7bf", "DetectTime": "2023-10-30T14:14:35.885925+02:00", "EventTime": "2023-10-30T14:14:35.885935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CjZmtdgVamiKeUpGb"]} -{"Format": "IDEA0", "ID": "50bcbe65-c422-4ae0-86ef-e0249571dffe", "DetectTime": "2023-10-30T14:14:35.905081+02:00", "EventTime": "2023-10-30T14:14:35.905091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cn1Q274wymuUbtOcG8"]} -{"Format": "Json", "ID": "50bcbe65-c422-4ae0-86ef-e0249571dffe", "DetectTime": "2023-10-30T14:14:35.905081+02:00", "EventTime": "2023-10-30T14:14:35.905091+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:50:13.334630+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:35.960215)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e72ee861-52fe-4dc1-b1af-6132aaeb5ec7", "DetectTime": "2023-10-30T14:14:35.963791+02:00", "EventTime": "2023-10-30T14:14:35.963802+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CsRyFY2FOI9q4Pyk43"]} -{"Format": "IDEA0", "ID": "fd739cd0-093a-46d1-a7e2-39875bb4267a", "DetectTime": "2023-10-30T14:14:35.982585+02:00", "EventTime": "2023-10-30T14:14:35.982598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CoTjQGjzv9xhRCNWe"]} -{"Format": "IDEA0", "ID": "23b9493e-dbbd-4c16-8603-03bb66bc7e88", "DetectTime": "2023-10-30T14:14:36.004307+02:00", "EventTime": "2023-10-30T14:14:36.004318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CRDHbr2XXzd0mtVm35"]} -{"Format": "IDEA0", "ID": "177149c7-65a5-4d94-8d44-0f5dd33e27ae", "DetectTime": "2023-10-30T14:14:36.026199+02:00", "EventTime": "2023-10-30T14:14:36.026208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CHvUuSFIDcuA2lvue"]} -{"Format": "IDEA0", "ID": "29076905-766b-4cec-b4c3-472c0e8a2c2a", "DetectTime": "2023-10-30T14:14:36.046690+02:00", "EventTime": "2023-10-30T14:14:36.046706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CMx2xk2aIjenkb0Qwg"]} -{"Format": "IDEA0", "ID": "6027715f-20a1-4004-b5e9-eac718edb5c9", "DetectTime": "2023-10-30T14:14:36.065841+02:00", "EventTime": "2023-10-30T14:14:36.065852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["ChDSEj40MW8oKWz3Kg"]} -{"Format": "IDEA0", "ID": "7435ff1c-457b-4aa6-a081-2846e8dfe41b", "DetectTime": "2023-10-30T14:14:36.085892+02:00", "EventTime": "2023-10-30T14:14:36.085903+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C5Dw9a1Wl4joZWw0P6"]} -{"Format": "IDEA0", "ID": "a9e9cf6b-a4fa-4cc8-a388-a11f6ba76fa1", "DetectTime": "2023-10-30T14:14:36.105530+02:00", "EventTime": "2023-10-30T14:14:36.105543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CFwPJxVZqb3Ycgy6l"]} -{"Format": "Json", "ID": "a9e9cf6b-a4fa-4cc8-a388-a11f6ba76fa1", "DetectTime": "2023-10-30T14:14:36.105530+02:00", "EventTime": "2023-10-30T14:14:36.105543+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:50:14.907589+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:36.165537)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "105b5b01-367b-45cd-89c1-927f0756b89b", "DetectTime": "2023-10-30T14:14:36.169609+02:00", "EventTime": "2023-10-30T14:14:36.169620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CHDp7QJRhVWX2OnTa"]} -{"Format": "IDEA0", "ID": "91d7ff51-9f1e-44c6-b81c-ae76965240a4", "DetectTime": "2023-10-30T14:14:36.186535+02:00", "EventTime": "2023-10-30T14:14:36.186546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CnhNNS2IhVA5wxUSf6"]} -{"Format": "IDEA0", "ID": "a9df173e-7f7c-46ff-b268-ef306a4c7812", "DetectTime": "2023-10-30T14:14:36.204755+02:00", "EventTime": "2023-10-30T14:14:36.204766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C6B2Qt2qJueeGZz7O1"]} -{"Format": "IDEA0", "ID": "c8218d13-c835-4d5c-bc27-550007ddd298", "DetectTime": "2023-10-30T14:14:36.220857+02:00", "EventTime": "2023-10-30T14:14:36.220866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["Com1U33IQh7PX9IEag"]} -{"Format": "IDEA0", "ID": "87d3c335-3b1f-4c80-92bb-1b97abea99f8", "DetectTime": "2023-10-30T14:14:36.236653+02:00", "EventTime": "2023-10-30T14:14:36.236662+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CznFQA4W6lvREykmVg"]} -{"Format": "IDEA0", "ID": "6ca2960f-78d8-40cd-a58b-4d91276bc9a8", "DetectTime": "2023-10-30T14:14:36.253000+02:00", "EventTime": "2023-10-30T14:14:36.253011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CNCOup1URnJfzmNpV"]} -{"Format": "IDEA0", "ID": "127fced2-4f24-498d-af92-fd8402ec3d21", "DetectTime": "2023-10-30T14:14:36.269472+02:00", "EventTime": "2023-10-30T14:14:36.269484+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CK2E1jJX4Vc4npih"]} -{"Format": "IDEA0", "ID": "1b7b32d5-e8c4-4fa1-b56c-4da990901e00", "DetectTime": "2023-10-30T14:14:36.285242+02:00", "EventTime": "2023-10-30T14:14:36.285253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 176.73.161.181 ", "ContentType": "text/plain"}], "uids": ["CU3PAr3YAaswIgbG68"]} -{"Format": "IDEA0", "ID": "e094a6be-7dba-42b6-8904-3087b7bc7883", "DetectTime": "2023-10-30T14:14:36.303000+02:00", "EventTime": "2023-10-30T14:14:36.303011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CNovqO18hNDvHZtiN4"]} -{"Format": "Json", "ID": "e094a6be-7dba-42b6-8904-3087b7bc7883", "DetectTime": "2023-10-30T14:14:36.303000+02:00", "EventTime": "2023-10-30T14:14:36.303011+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:50:16.250333+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:36.347162)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aede57c1-4e83-4ac0-a25e-aefaf48e523a", "DetectTime": "2023-10-30T14:14:36.351028+02:00", "EventTime": "2023-10-30T14:14:36.351038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CTA8eFkOlEQgji9R3"]} -{"Format": "IDEA0", "ID": "a7bf83f6-ccba-46e9-854b-732ab4ec32b1", "DetectTime": "2023-10-30T14:14:36.366833+02:00", "EventTime": "2023-10-30T14:14:36.366849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C8LzT74V9goyMGomF2"]} -{"Format": "IDEA0", "ID": "d9074a00-a784-4d96-ba6b-4db909fe020f", "DetectTime": "2023-10-30T14:14:36.381617+02:00", "EventTime": "2023-10-30T14:14:36.381627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["C4h7qP1IUKRQGDvaxh"]} -{"Format": "IDEA0", "ID": "ae3186ce-1e1e-43ce-87d2-c3d7514c7859", "DetectTime": "2023-10-30T14:14:36.397201+02:00", "EventTime": "2023-10-30T14:14:36.397212+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CjpvMG3rt5qQJFjbzh"]} -{"Format": "IDEA0", "ID": "a55c1d5a-8c3c-4306-944a-135b0d3102a3", "DetectTime": "2023-10-30T14:14:36.412770+02:00", "EventTime": "2023-10-30T14:14:36.412779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CwJCTF4HD5lffONiWa"]} -{"Format": "IDEA0", "ID": "0063fcde-d9ae-4be6-a613-4652efd0d63c", "DetectTime": "2023-10-30T14:14:36.427110+02:00", "EventTime": "2023-10-30T14:14:36.427120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CgeBow3dMscSwB7fDl"]} -{"Format": "IDEA0", "ID": "07b81a90-9b72-478d-8ef7-1cbaecfff42a", "DetectTime": "2023-10-30T14:14:36.441831+02:00", "EventTime": "2023-10-30T14:14:36.441841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C4yl011CUB7rCo1sil"]} -{"Format": "IDEA0", "ID": "84aceeb8-8b5f-4560-a884-5423e8612994", "DetectTime": "2023-10-30T14:14:36.457792+02:00", "EventTime": "2023-10-30T14:14:36.457805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["COaDMcFiOR9wL2HFe"]} -{"Format": "Json", "ID": "84aceeb8-8b5f-4560-a884-5423e8612994", "DetectTime": "2023-10-30T14:14:36.457792+02:00", "EventTime": "2023-10-30T14:14:36.457805+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T09:50:17.493421+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 224. (real time 2023/10/30 14:14:36.503124)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fd12debb-74c1-41ca-8395-9c91c36bbc4a", "DetectTime": "2023-10-30T14:14:36.507059+02:00", "EventTime": "2023-10-30T14:14:36.507069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBZXvQ2jvQ0jMBVefl"]} -{"Format": "IDEA0", "ID": "bd25e115-7da8-4c42-bf1e-5e983bb2f69f", "DetectTime": "2023-10-30T14:14:36.535361+02:00", "EventTime": "2023-10-30T14:14:36.535371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CaFgtw3FAxf2oCDqUi"]} -{"Format": "IDEA0", "ID": "8a391416-e287-4305-ac20-f1c08643baf0", "DetectTime": "2023-10-30T14:14:36.562572+02:00", "EventTime": "2023-10-30T14:14:36.562581+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CWaHIq3GtTnvDVmWg1"]} -{"Format": "IDEA0", "ID": "6fb507d2-f4df-4fd0-b32d-612c3ecbcbe3", "DetectTime": "2023-10-30T14:14:36.586515+02:00", "EventTime": "2023-10-30T14:14:36.586524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cgqw2030QqOtCBT7E8"]} -{"Format": "IDEA0", "ID": "5188877f-6514-42bc-ac09-da9e183e4840", "DetectTime": "2023-10-30T14:14:36.612521+02:00", "EventTime": "2023-10-30T14:14:36.612531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CVPEABoH2CKkV9e3i"]} -{"Format": "IDEA0", "ID": "23c23660-eec6-47f6-99f6-06aec4441ac5", "DetectTime": "2023-10-30T14:14:36.640627+02:00", "EventTime": "2023-10-30T14:14:36.640644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CEkZa12kapClKe79Hc"]} -{"Format": "IDEA0", "ID": "8616feb6-8250-468b-bcba-2ec2aed375ab", "DetectTime": "2023-10-30T14:14:36.669513+02:00", "EventTime": "2023-10-30T14:14:36.669523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CAluwz3tFZ5jYtoDB8"]} -{"Format": "IDEA0", "ID": "8eb58bd7-8b61-448a-b9cd-da5db6bd1581", "DetectTime": "2023-10-30T14:14:36.698146+02:00", "EventTime": "2023-10-30T14:14:36.698156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cl80j43RwFmUgIVH5g"]} -{"Format": "Json", "ID": "8eb58bd7-8b61-448a-b9cd-da5db6bd1581", "DetectTime": "2023-10-30T14:14:36.698146+02:00", "EventTime": "2023-10-30T14:14:36.698156+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:20:45.198976+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:36.756734)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d37d4f18-34e1-4848-98c1-5c03e2dd89fa", "DetectTime": "2023-10-30T14:14:36.760391+02:00", "EventTime": "2023-10-30T14:14:36.760401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CmetvB2nTxUDzx8n0f"]} -{"Format": "IDEA0", "ID": "87bfc121-e486-4eea-b43b-87e95a0d46dd", "DetectTime": "2023-10-30T14:14:36.787353+02:00", "EventTime": "2023-10-30T14:14:36.787365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqASTT37vIdhPc4IK8"]} -{"Format": "IDEA0", "ID": "0ebd5b27-e617-4acf-8def-3c627db33166", "DetectTime": "2023-10-30T14:14:36.811537+02:00", "EventTime": "2023-10-30T14:14:36.811547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CzY3ri2PvVol1g8RWl"]} -{"Format": "IDEA0", "ID": "8dc77e76-a2f2-490b-93d4-1e91eebf205a", "DetectTime": "2023-10-30T14:14:36.834509+02:00", "EventTime": "2023-10-30T14:14:36.834520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CnSRFC21A05GIQ1Y85"]} -{"Format": "IDEA0", "ID": "e80ec2a6-3052-4ff3-afe8-6fed447d0aa5", "DetectTime": "2023-10-30T14:14:36.857952+02:00", "EventTime": "2023-10-30T14:14:36.857962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["ChZOdN3FXnQvkwJ4I3"]} -{"Format": "IDEA0", "ID": "1b35f1e2-dadd-442b-be23-dbe62b3ded71", "DetectTime": "2023-10-30T14:14:36.884696+02:00", "EventTime": "2023-10-30T14:14:36.884705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CzvmZe4GTTqgAU1GYa"]} -{"Format": "IDEA0", "ID": "f9ea84a9-ab04-4102-861f-d4adb5a0cf3f", "DetectTime": "2023-10-30T14:14:36.909886+02:00", "EventTime": "2023-10-30T14:14:36.909897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Ch88as1pPmyxfhTXB5"]} -{"Format": "IDEA0", "ID": "60644b82-a560-4c96-936c-b197f5f165e7", "DetectTime": "2023-10-30T14:14:36.934277+02:00", "EventTime": "2023-10-30T14:14:36.934286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CNWjfP1T7r5BpBmdSd"]} -{"Format": "Json", "ID": "60644b82-a560-4c96-936c-b197f5f165e7", "DetectTime": "2023-10-30T14:14:36.934277+02:00", "EventTime": "2023-10-30T14:14:36.934286+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:20:46.766987+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:36.996123)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c3449873-db5b-4dc9-800e-5149c6f12749", "DetectTime": "2023-10-30T14:14:36.999758+02:00", "EventTime": "2023-10-30T14:14:36.999769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CKLGBZ3wkpGNxA15N7"]} -{"Format": "IDEA0", "ID": "c0362197-995d-49b7-b8d7-a08da7c5d1c5", "DetectTime": "2023-10-30T14:14:37.024048+02:00", "EventTime": "2023-10-30T14:14:37.024064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CwwPm23VdfGTa8Fz0e"]} -{"Format": "IDEA0", "ID": "4cbd09c0-1700-4eca-86cc-75b05c1f3b18", "DetectTime": "2023-10-30T14:14:37.046634+02:00", "EventTime": "2023-10-30T14:14:37.046646+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["CNGKhd2hUFlGnwPhbi"]} -{"Format": "IDEA0", "ID": "260661c2-1503-4db1-8eed-e3a6293cc722", "DetectTime": "2023-10-30T14:14:37.068223+02:00", "EventTime": "2023-10-30T14:14:37.068234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CKjKTI21we0XZ5Jf82"]} -{"Format": "IDEA0", "ID": "6df3bd62-9be3-4d41-adb2-9d556c3f7300", "DetectTime": "2023-10-30T14:14:37.090169+02:00", "EventTime": "2023-10-30T14:14:37.090180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CjHWhVC3IQB6Om1Ah"]} -{"Format": "IDEA0", "ID": "37661a06-2923-4148-9a2f-77c957b9a1bb", "DetectTime": "2023-10-30T14:14:37.112289+02:00", "EventTime": "2023-10-30T14:14:37.112299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CXf2vYcZuL1LWmtLd"]} -{"Format": "IDEA0", "ID": "46f1a3a0-0aea-45e4-9cac-49ac3c9ee4bd", "DetectTime": "2023-10-30T14:14:37.134862+02:00", "EventTime": "2023-10-30T14:14:37.134872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CFeLMd4lTZqQOHifI2"]} -{"Format": "IDEA0", "ID": "92229ff9-166f-4982-b14a-44d99491b6fc", "DetectTime": "2023-10-30T14:14:37.159721+02:00", "EventTime": "2023-10-30T14:14:37.159731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CXeVW420jFMpEKpGkl"]} -{"Format": "Json", "ID": "92229ff9-166f-4982-b14a-44d99491b6fc", "DetectTime": "2023-10-30T14:14:37.159721+02:00", "EventTime": "2023-10-30T14:14:37.159731+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:20:48.021909+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:37.219276)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "95357e34-68a9-46cb-85c5-b3962330a4cc", "DetectTime": "2023-10-30T14:14:37.223066+02:00", "EventTime": "2023-10-30T14:14:37.223076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CLvXwYAtvhMzYdXVf"]} -{"Format": "IDEA0", "ID": "d57e1f24-0de2-4c15-945d-eec99ebc163f", "DetectTime": "2023-10-30T14:14:37.244512+02:00", "EventTime": "2023-10-30T14:14:37.244522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyEChYlmjSUVrBih9"]} -{"Format": "IDEA0", "ID": "52eb88a4-c446-4a95-96a3-9a64e6819c49", "DetectTime": "2023-10-30T14:14:37.266006+02:00", "EventTime": "2023-10-30T14:14:37.266017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["ChFkqlOlAi2OAqgEc"]} -{"Format": "IDEA0", "ID": "07ab4db0-5fe5-475b-a8a2-2c4e8ccd37ca", "DetectTime": "2023-10-30T14:14:37.288016+02:00", "EventTime": "2023-10-30T14:14:37.288026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CqALAd3Zrb0wQu10fj"]} -{"Format": "IDEA0", "ID": "1ee8bc6f-57e0-42a4-8267-4c216b0d4608", "DetectTime": "2023-10-30T14:14:37.305465+02:00", "EventTime": "2023-10-30T14:14:37.305475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["ChQOoO2XxyRWr4wl67"]} -{"Format": "IDEA0", "ID": "d184da67-5b43-4c4a-9545-b9352e2a0c7a", "DetectTime": "2023-10-30T14:14:37.329194+02:00", "EventTime": "2023-10-30T14:14:37.329205+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CzBJTN1XLj558ICOW8"]} -{"Format": "IDEA0", "ID": "124aee67-6549-4cfb-9897-25b148b2ed2f", "DetectTime": "2023-10-30T14:14:37.349816+02:00", "EventTime": "2023-10-30T14:14:37.349826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CcF8bj27ctmVLhnwv1"]} -{"Format": "IDEA0", "ID": "2e4b819a-47bf-472d-92d5-f444cae361fe", "DetectTime": "2023-10-30T14:14:37.369965+02:00", "EventTime": "2023-10-30T14:14:37.369974+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CbK02C1uTPe0cPMpRe"]} -{"Format": "IDEA0", "ID": "c85f6c94-5b80-4946-b9a4-32e8c76e385d", "DetectTime": "2023-10-30T14:14:37.390366+02:00", "EventTime": "2023-10-30T14:14:37.390376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CrH34X3X3xt3Grfq4k"]} -{"Format": "Json", "ID": "c85f6c94-5b80-4946-b9a4-32e8c76e385d", "DetectTime": "2023-10-30T14:14:37.390366+02:00", "EventTime": "2023-10-30T14:14:37.390376+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:20:49.356474+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:37.438246)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "73503ebe-f06e-4bcb-8ad2-8b7c8d09de27", "DetectTime": "2023-10-30T14:14:37.442236+02:00", "EventTime": "2023-10-30T14:14:37.442247+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CwVgrV2lx6P28RVFze"]} -{"Format": "IDEA0", "ID": "f4b9bbe2-57e8-4517-807b-cd3d367a0d42", "DetectTime": "2023-10-30T14:14:37.462811+02:00", "EventTime": "2023-10-30T14:14:37.462822+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CNxCpt4fSkm66d6UQ6"]} -{"Format": "IDEA0", "ID": "20104695-922b-401c-afe3-628a1852d55b", "DetectTime": "2023-10-30T14:14:37.484804+02:00", "EventTime": "2023-10-30T14:14:37.484815+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CC1Qwg1Yc3KCnyL40i"]} -{"Format": "IDEA0", "ID": "643d9327-9c71-4d4e-87bc-e172b1b5391f", "DetectTime": "2023-10-30T14:14:37.505000+02:00", "EventTime": "2023-10-30T14:14:37.505009+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CnMLEF3IsLJQFRIVVf"]} -{"Format": "IDEA0", "ID": "1c190aa5-6e97-4e2b-a62a-aeca85a198a0", "DetectTime": "2023-10-30T14:14:37.525972+02:00", "EventTime": "2023-10-30T14:14:37.525982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CCUaqb19Pds9gCyfbk"]} -{"Format": "IDEA0", "ID": "8ad556d1-909f-4d96-8d86-b7703eb7cff0", "DetectTime": "2023-10-30T14:14:37.545895+02:00", "EventTime": "2023-10-30T14:14:37.545908+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Cub4Lf3zwtASrQdSoj"]} -{"Format": "IDEA0", "ID": "a144f6ae-b5e8-4baf-a9ca-3bb702d26519", "DetectTime": "2023-10-30T14:14:37.566680+02:00", "EventTime": "2023-10-30T14:14:37.566691+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CtVb9C3IgFq89frT79"]} -{"Format": "IDEA0", "ID": "c2e89536-1756-46fc-ae52-3dab1836fab4", "DetectTime": "2023-10-30T14:14:37.586065+02:00", "EventTime": "2023-10-30T14:14:37.586076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CEZDva4E35Q3tAoDm9"]} -{"Format": "Json", "ID": "c2e89536-1756-46fc-ae52-3dab1836fab4", "DetectTime": "2023-10-30T14:14:37.586065+02:00", "EventTime": "2023-10-30T14:14:37.586076+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:51:15.947781+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:37.637074)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "78e7a844-0a40-4e13-b109-e3487bd8e79b", "DetectTime": "2023-10-30T14:14:37.642265+02:00", "EventTime": "2023-10-30T14:14:37.642279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["Cv8iIw3nMjM77iNqLh"]} -{"Format": "IDEA0", "ID": "0f6e9f74-872c-4331-889a-f754e9fb01d9", "DetectTime": "2023-10-30T14:14:37.661647+02:00", "EventTime": "2023-10-30T14:14:37.661659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6663], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. ", "ContentType": "text/plain"}], "uids": ["CO9x9oT3LD8fBXnp4"]} -{"Format": "IDEA0", "ID": "3330d7d4-2170-4b0e-9580-295d51fda7cb", "DetectTime": "2023-10-30T14:14:37.684384+02:00", "EventTime": "2023-10-30T14:14:37.684398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["ClxRwG2RaLzA7Srbnk"]} -{"Format": "IDEA0", "ID": "c20c4bef-9c9a-41f3-a13d-8226dfe66430", "DetectTime": "2023-10-30T14:14:37.709199+02:00", "EventTime": "2023-10-30T14:14:37.709214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CNwUN62pTE3aRU0xOc"]} -{"Format": "IDEA0", "ID": "82cd05bb-b44b-452f-841c-408eac0643cf", "DetectTime": "2023-10-30T14:14:37.731158+02:00", "EventTime": "2023-10-30T14:14:37.731168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CpdMIP21qkIjNbvcIg"]} -{"Format": "IDEA0", "ID": "15e25fd9-560a-47b9-bb13-7a107c391b8e", "DetectTime": "2023-10-30T14:14:37.755203+02:00", "EventTime": "2023-10-30T14:14:37.755217+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CjPMv633656ffaXlJi"]} -{"Format": "IDEA0", "ID": "badbd3cf-ce30-4711-9586-e7ce8e722f37", "DetectTime": "2023-10-30T14:14:37.783273+02:00", "EventTime": "2023-10-30T14:14:37.783288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CGhxAj1lAAX0uJt8tc"]} -{"Format": "IDEA0", "ID": "f8c6f2cc-3036-4604-9282-f94a9998e10a", "DetectTime": "2023-10-30T14:14:37.811659+02:00", "EventTime": "2023-10-30T14:14:37.811669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CwtFcK3CgkHcJFwu7"]} -{"Format": "Json", "ID": "f8c6f2cc-3036-4604-9282-f94a9998e10a", "DetectTime": "2023-10-30T14:14:37.811659+02:00", "EventTime": "2023-10-30T14:14:37.811669+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:51:16.978796+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:37.864295)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5e9598b1-516e-4365-9078-b9530329d698", "DetectTime": "2023-10-30T14:14:37.868064+02:00", "EventTime": "2023-10-30T14:14:37.868074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CyZqbhK0v4EbPu678"]} -{"Format": "IDEA0", "ID": "9349c48f-c9a4-4aa6-950e-54ce4487b310", "DetectTime": "2023-10-30T14:14:37.885991+02:00", "EventTime": "2023-10-30T14:14:37.886002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CiISHA3UFQxcek8nB1"]} -{"Format": "IDEA0", "ID": "cf878dfc-7c01-49fb-a85f-3453a05051d3", "DetectTime": "2023-10-30T14:14:37.903142+02:00", "EventTime": "2023-10-30T14:14:37.903152+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0I0mG1AAroCGI3lag"]} -{"Format": "IDEA0", "ID": "183dce2e-8133-44d1-9388-2a24529f8dab", "DetectTime": "2023-10-30T14:14:37.921293+02:00", "EventTime": "2023-10-30T14:14:37.921303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CikNwn4tp8HnL75ybd"]} -{"Format": "IDEA0", "ID": "e6add4d7-a5ef-4ff1-bbfe-5436215bc8d3", "DetectTime": "2023-10-30T14:14:37.937830+02:00", "EventTime": "2023-10-30T14:14:37.937840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CqjI003r4MvozEE0Od"]} -{"Format": "IDEA0", "ID": "fc1bdf1b-2fae-4c62-80a7-4f0be155c32b", "DetectTime": "2023-10-30T14:14:37.955367+02:00", "EventTime": "2023-10-30T14:14:37.955382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CnmZza3SMIRMS6Nyng"]} -{"Format": "IDEA0", "ID": "07c788d3-935b-4d61-8173-fd78e7170e05", "DetectTime": "2023-10-30T14:14:37.975588+02:00", "EventTime": "2023-10-30T14:14:37.975598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["C57mks3l6g38ZP2um4"]} -{"Format": "IDEA0", "ID": "4c8f17ff-87d6-4e80-9c6e-f83b78afc29a", "DetectTime": "2023-10-30T14:14:37.991938+02:00", "EventTime": "2023-10-30T14:14:37.991950+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CfRrZK1mMbAG66Hiza"]} -{"Format": "IDEA0", "ID": "8a9e55f3-a245-4ed8-8aea-86d7021cdef5", "DetectTime": "2023-10-30T14:14:38.008306+02:00", "EventTime": "2023-10-30T14:14:38.008318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Covryr2dHrxFj6i8Ya"]} -{"Format": "Json", "ID": "8a9e55f3-a245-4ed8-8aea-86d7021cdef5", "DetectTime": "2023-10-30T14:14:38.008306+02:00", "EventTime": "2023-10-30T14:14:38.008318+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:51:18.426410+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:38.056296)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d7dd3286-fc4f-404b-a4f4-d6f8e14e5cc9", "DetectTime": "2023-10-30T14:14:38.060109+02:00", "EventTime": "2023-10-30T14:14:38.060119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CDZqyb3jeao22WNShh"]} -{"Format": "IDEA0", "ID": "894343d9-a528-489c-965e-75425a4a27e8", "DetectTime": "2023-10-30T14:14:38.076954+02:00", "EventTime": "2023-10-30T14:14:38.076965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CyiYrb42v3BZZc4rs3"]} -{"Format": "IDEA0", "ID": "c5ef075c-cea0-40c1-80c1-5ebe46228837", "DetectTime": "2023-10-30T14:14:38.094963+02:00", "EventTime": "2023-10-30T14:14:38.094977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CKDwxpEptcfzgP1nk"]} -{"Format": "IDEA0", "ID": "aaa4308b-9467-44c8-b409-9cf7ed957849", "DetectTime": "2023-10-30T14:14:38.109605+02:00", "EventTime": "2023-10-30T14:14:38.109614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CwR1Za2o2WSzvqkQXd"]} -{"Format": "IDEA0", "ID": "97df6dc8-6b08-4bdd-8d94-535925aefd94", "DetectTime": "2023-10-30T14:14:38.126090+02:00", "EventTime": "2023-10-30T14:14:38.126101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CbzvKS1y8gSuG5VSX9"]} -{"Format": "IDEA0", "ID": "55987fd7-dd96-43f1-b202-9e20f2836654", "DetectTime": "2023-10-30T14:14:38.140160+02:00", "EventTime": "2023-10-30T14:14:38.140170+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CBbtGRs69zu18I4Rc"]} -{"Format": "IDEA0", "ID": "4ba7cbe5-c63d-4785-95c7-46bc04d593b0", "DetectTime": "2023-10-30T14:14:38.154190+02:00", "EventTime": "2023-10-30T14:14:38.154200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C4FSkb20m4gXrQK1yj"]} -{"Format": "IDEA0", "ID": "b00a8789-4bca-4139-89c4-9d7c31a0e3bc", "DetectTime": "2023-10-30T14:14:38.171770+02:00", "EventTime": "2023-10-30T14:14:38.171786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CYhAnF12zpPXmCmuM"]} -{"Format": "Json", "ID": "b00a8789-4bca-4139-89c4-9d7c31a0e3bc", "DetectTime": "2023-10-30T14:14:38.171770+02:00", "EventTime": "2023-10-30T14:14:38.171786+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T10:51:20.856841+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 225. (real time 2023/10/30 14:14:38.216404)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "022dcf23-e4e9-4d7d-b306-1561fd67832a", "DetectTime": "2023-10-30T14:14:38.220159+02:00", "EventTime": "2023-10-30T14:14:38.220169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C54MNH23fLVGTlfCj3"]} -{"Format": "IDEA0", "ID": "c22599e5-b474-4807-81cd-359f3f211955", "DetectTime": "2023-10-30T14:14:38.235605+02:00", "EventTime": "2023-10-30T14:14:38.235615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CrxoiC3Sj3Vpuu3UJe"]} -{"Format": "IDEA0", "ID": "9e180c0c-5880-4592-b4c7-014480f1b4d9", "DetectTime": "2023-10-30T14:14:38.250937+02:00", "EventTime": "2023-10-30T14:14:38.250947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CVDAOA1rzQs8eDdCf"]} -{"Format": "IDEA0", "ID": "c9ce105f-4f92-495b-b925-d6683bc521bb", "DetectTime": "2023-10-30T14:14:38.265190+02:00", "EventTime": "2023-10-30T14:14:38.265200+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CQvnVofjShVYvqOZd"]} -{"Format": "IDEA0", "ID": "5772c739-f90f-4bb0-908f-a78c93e41c6e", "DetectTime": "2023-10-30T14:14:38.278790+02:00", "EventTime": "2023-10-30T14:14:38.278800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CKOu654uFSjCdmm0ta"]} -{"Format": "IDEA0", "ID": "07b80dbe-c596-4abf-bee1-d2a2b1a60ef8", "DetectTime": "2023-10-30T14:14:38.297460+02:00", "EventTime": "2023-10-30T14:14:38.297474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CrotlS1lX9YNH7Ynbf"]} -{"Format": "IDEA0", "ID": "1f083e26-1b14-4038-b989-3e952774be01", "DetectTime": "2023-10-30T14:14:38.314366+02:00", "EventTime": "2023-10-30T14:14:38.314375+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CK0Agk23b0626LAF5j"]} -{"Format": "IDEA0", "ID": "ff6c4d8a-45c8-4bd7-b289-ede9e7b14e7e", "DetectTime": "2023-10-30T14:14:38.330707+02:00", "EventTime": "2023-10-30T14:14:38.330717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CU1yFy2x1zKLQ3KcF6"]} -{"Format": "IDEA0", "ID": "fb41ed12-0b3a-4250-b5e4-0a8921b757dc", "DetectTime": "2023-10-30T14:14:38.356069+02:00", "EventTime": "2023-10-30T14:14:38.356080+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CE39vl3K7vU2Ga0yG4"]} -{"Format": "IDEA0", "ID": "8231dbb8-8ede-4914-b15f-0fd02f8f0ba8", "DetectTime": "2023-10-30T14:14:38.381571+02:00", "EventTime": "2023-10-30T14:14:38.381580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C2EVe534zBLsaezRBb"]} -{"Format": "IDEA0", "ID": "4c5691eb-e507-4586-8398-540de8a8d1b8", "DetectTime": "2023-10-30T14:14:38.407665+02:00", "EventTime": "2023-10-30T14:14:38.407674+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CXtlmZ1Nrug6jLPd9a"]} -{"Format": "IDEA0", "ID": "7d4432b9-2353-41fb-b475-70d09936b9d3", "DetectTime": "2023-10-30T14:14:38.433336+02:00", "EventTime": "2023-10-30T14:14:38.433346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CnS2MS2RgAe58pMa6e"]} -{"Format": "IDEA0", "ID": "0e14c34c-dcf5-4401-a559-e791ab008faf", "DetectTime": "2023-10-30T14:14:38.459224+02:00", "EventTime": "2023-10-30T14:14:38.459233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CLPyJf4SYrUmlTjdA1"]} -{"Format": "IDEA0", "ID": "0c81d169-6a1b-45dc-871f-469e274e4eca", "DetectTime": "2023-10-30T14:14:38.485013+02:00", "EventTime": "2023-10-30T14:14:38.485024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C2acqY1DEZnanYnHpk"]} -{"Format": "IDEA0", "ID": "dbf799a4-6157-49bf-be21-ef57062d6d5c", "DetectTime": "2023-10-30T14:14:38.510914+02:00", "EventTime": "2023-10-30T14:14:38.510924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CYY1nV3Fp4jxFgJi2b"]} -{"Format": "Json", "ID": "dbf799a4-6157-49bf-be21-ef57062d6d5c", "DetectTime": "2023-10-30T14:14:38.510914+02:00", "EventTime": "2023-10-30T14:14:38.510924+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:21:57.483716+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:38.566947)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d7d0f145-087a-48b8-880f-f96f2875bca5", "DetectTime": "2023-10-30T14:14:38.571893+02:00", "EventTime": "2023-10-30T14:14:38.571907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CXeZK82LkuuRajBl5l"]} -{"Format": "IDEA0", "ID": "6b0c0123-70b4-43c5-acfe-5fb3aece476a", "DetectTime": "2023-10-30T14:14:38.607644+02:00", "EventTime": "2023-10-30T14:14:38.607659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CncKAr3apMjJqpb7f"]} -{"Format": "IDEA0", "ID": "8ca56a9a-6324-43b7-85ae-d0b15e562276", "DetectTime": "2023-10-30T14:14:38.640907+02:00", "EventTime": "2023-10-30T14:14:38.640918+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CtFiP43uQtQvLGCWa4"]} -{"Format": "IDEA0", "ID": "8c294b00-5cff-429a-9caf-bb04a32f23d3", "DetectTime": "2023-10-30T14:14:38.668648+02:00", "EventTime": "2023-10-30T14:14:38.668658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CLPiNG2d1TRnBDhOqa"]} -{"Format": "IDEA0", "ID": "46c0a7b0-5ff5-4ad8-8290-5099851a7a82", "DetectTime": "2023-10-30T14:14:38.693736+02:00", "EventTime": "2023-10-30T14:14:38.693746+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CEa5K83yLPtk5M8J23"]} -{"Format": "IDEA0", "ID": "4550dba6-122a-44b6-b21d-ce04e2f8860f", "DetectTime": "2023-10-30T14:14:38.721870+02:00", "EventTime": "2023-10-30T14:14:38.721884+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CDc17b4yoJQXEvoEFf"]} -{"Format": "IDEA0", "ID": "10761d16-29b1-4943-aac5-909a98a701b4", "DetectTime": "2023-10-30T14:14:38.744873+02:00", "EventTime": "2023-10-30T14:14:38.744888+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["Cna6GUfCL2RWRvzw7"]} -{"Format": "IDEA0", "ID": "70fa0ec8-7438-47fa-8aa9-7ede434334cb", "DetectTime": "2023-10-30T14:14:38.776617+02:00", "EventTime": "2023-10-30T14:14:38.776631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C5hff57SCl14oX9Ei"]} -{"Format": "IDEA0", "ID": "05a6bb07-16f1-4978-9a59-43481c9c5409", "DetectTime": "2023-10-30T14:14:38.803591+02:00", "EventTime": "2023-10-30T14:14:38.803602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CAHMG52KlxU1OTor78"]} -{"Format": "Json", "ID": "05a6bb07-16f1-4978-9a59-43481c9c5409", "DetectTime": "2023-10-30T14:14:38.803591+02:00", "EventTime": "2023-10-30T14:14:38.803602+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:21:59.034275+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:38.867409)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "86e56ffd-8179-4d5c-8373-5c2c6d7a8a2e", "DetectTime": "2023-10-30T14:14:38.871179+02:00", "EventTime": "2023-10-30T14:14:38.871189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CD9w143TOvp4ZEh8X"]} -{"Format": "IDEA0", "ID": "55cd10d8-913d-4ccd-9fa6-d0cf2b017e93", "DetectTime": "2023-10-30T14:14:38.896384+02:00", "EventTime": "2023-10-30T14:14:38.896396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C569EV2C8y8n5vhYI6"]} -{"Format": "IDEA0", "ID": "c4138aec-2a7f-4488-9754-b92604201374", "DetectTime": "2023-10-30T14:14:38.920809+02:00", "EventTime": "2023-10-30T14:14:38.920819+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Cop0h41OMafnqVqVdh"]} -{"Format": "IDEA0", "ID": "d1ae3e17-55e9-4f39-a7bd-98959542aaec", "DetectTime": "2023-10-30T14:14:38.944409+02:00", "EventTime": "2023-10-30T14:14:38.944420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CpoyHb2ZcbyNqtzGK5"]} -{"Format": "IDEA0", "ID": "88df4421-794b-4cc3-b081-8ceb362aa98b", "DetectTime": "2023-10-30T14:14:38.973638+02:00", "EventTime": "2023-10-30T14:14:38.973648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["C5DMJD3FuOPiQXRgEl"]} -{"Format": "IDEA0", "ID": "adf9d85c-5a6e-480b-b1c2-8f404625fe67", "DetectTime": "2023-10-30T14:14:38.996406+02:00", "EventTime": "2023-10-30T14:14:38.996415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJvfBg45eVwDzWWJih"]} -{"Format": "IDEA0", "ID": "71ce6733-c1e3-48b8-ad4e-c3b1470a1f79", "DetectTime": "2023-10-30T14:14:39.018795+02:00", "EventTime": "2023-10-30T14:14:39.018807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CgdXex2FZHoWwLSsR9"]} -{"Format": "IDEA0", "ID": "0464a895-07c8-44bb-80e7-cef056835070", "DetectTime": "2023-10-30T14:14:39.040812+02:00", "EventTime": "2023-10-30T14:14:39.040821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cq6lQu1FEA5Hn7fGxc"]} -{"Format": "Json", "ID": "0464a895-07c8-44bb-80e7-cef056835070", "DetectTime": "2023-10-30T14:14:39.040812+02:00", "EventTime": "2023-10-30T14:14:39.040821+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:22:00.803383+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:39.101123)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "31057a2f-2e9f-4e3b-bbcd-91e53bd641bc", "DetectTime": "2023-10-30T14:14:39.105000+02:00", "EventTime": "2023-10-30T14:14:39.105010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CPPPAc1kIPqM35Rtq1"]} -{"Format": "IDEA0", "ID": "0fd8cdbe-ebea-4334-8302-7824c9887ad1", "DetectTime": "2023-10-30T14:14:39.126548+02:00", "EventTime": "2023-10-30T14:14:39.126558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CPw4aIvAHkg2LUIe8"]} -{"Format": "IDEA0", "ID": "cd17847a-1766-4646-8a6f-cdd822df444e", "DetectTime": "2023-10-30T14:14:39.147098+02:00", "EventTime": "2023-10-30T14:14:39.147108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CeSt6d4T1v3ABjakl7"]} -{"Format": "IDEA0", "ID": "160aac7e-46eb-4d7c-8d05-e981241bce60", "DetectTime": "2023-10-30T14:14:39.167206+02:00", "EventTime": "2023-10-30T14:14:39.167219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CneD1C2PkTT918zKkk"]} -{"Format": "IDEA0", "ID": "b59ba824-63df-44e5-9c3a-5a6a8b7d8a59", "DetectTime": "2023-10-30T14:14:39.189829+02:00", "EventTime": "2023-10-30T14:14:39.189840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CxwDfL24sGa6cCaJo1"]} -{"Format": "IDEA0", "ID": "2a729c8b-4bc2-45ff-8d8d-b6aaad9fe0ed", "DetectTime": "2023-10-30T14:14:39.212153+02:00", "EventTime": "2023-10-30T14:14:39.212162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CpHUDS3htOUloEt2Bi"]} -{"Format": "IDEA0", "ID": "492f0b26-9ea5-481f-beb4-4efcc9b53b3c", "DetectTime": "2023-10-30T14:14:39.235417+02:00", "EventTime": "2023-10-30T14:14:39.235431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["C27RYj3iuWjG2LxPTc"]} -{"Format": "IDEA0", "ID": "9fc27c6f-7be1-484e-9e14-4623cd773bd6", "DetectTime": "2023-10-30T14:14:39.262322+02:00", "EventTime": "2023-10-30T14:14:39.262331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CnIwiM3DQpVsIuBmok"]} -{"Format": "Json", "ID": "9fc27c6f-7be1-484e-9e14-4623cd773bd6", "DetectTime": "2023-10-30T14:14:39.262322+02:00", "EventTime": "2023-10-30T14:14:39.262331+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:22:02.174721+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:39.327746)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "af848d77-fff3-4193-8019-79138141fe3c", "DetectTime": "2023-10-30T14:14:39.332012+02:00", "EventTime": "2023-10-30T14:14:39.332023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CFfeHd10jjKTLIk944"]} -{"Format": "IDEA0", "ID": "f615e1ca-13af-4b86-86e6-740869b2c04d", "DetectTime": "2023-10-30T14:14:39.359033+02:00", "EventTime": "2023-10-30T14:14:39.359050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CcfUqoCph6IBGxiY5"]} -{"Format": "IDEA0", "ID": "f0c29f6a-df64-4221-b87a-292887f70d03", "DetectTime": "2023-10-30T14:14:39.389008+02:00", "EventTime": "2023-10-30T14:14:39.389023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CGttFe3k0qlWqp2lJ3"]} -{"Format": "IDEA0", "ID": "6abbf648-a78b-461e-be60-49ceb3983ba7", "DetectTime": "2023-10-30T14:14:39.412519+02:00", "EventTime": "2023-10-30T14:14:39.412529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CHMypd4L9N6r6klmDf"]} -{"Format": "IDEA0", "ID": "f13be711-7cbb-455d-8d8d-1b2936c68130", "DetectTime": "2023-10-30T14:14:39.434906+02:00", "EventTime": "2023-10-30T14:14:39.434920+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7ureE1p6lrYt6lxAf"]} -{"Format": "IDEA0", "ID": "b5040911-256f-4dc3-a656-66fc29a9b659", "DetectTime": "2023-10-30T14:14:39.455382+02:00", "EventTime": "2023-10-30T14:14:39.455398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["ChJuXYqlKLap0xjTd"]} -{"Format": "IDEA0", "ID": "8fbfe2a5-0875-413b-9d57-7904dbcba664", "DetectTime": "2023-10-30T14:14:39.477896+02:00", "EventTime": "2023-10-30T14:14:39.477905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CNK9G71elAjxYfzsB6"]} -{"Format": "IDEA0", "ID": "a2ba4518-72a1-463f-bfe6-cd59bc01949e", "DetectTime": "2023-10-30T14:14:39.499870+02:00", "EventTime": "2023-10-30T14:14:39.499881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["Cr3Qt91PfyvDpat0Pa"]} -{"Format": "IDEA0", "ID": "4e79ad50-dcc3-45b1-97ed-edbe6951c84f", "DetectTime": "2023-10-30T14:14:39.521395+02:00", "EventTime": "2023-10-30T14:14:39.521405+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CB5TZz2DTaCjLMkmI2"]} -{"Format": "Json", "ID": "4e79ad50-dcc3-45b1-97ed-edbe6951c84f", "DetectTime": "2023-10-30T14:14:39.521395+02:00", "EventTime": "2023-10-30T14:14:39.521405+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:52:31.827962+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:39.572390)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b4dceed5-3f11-425f-badd-b3e943843947", "DetectTime": "2023-10-30T14:14:39.576470+02:00", "EventTime": "2023-10-30T14:14:39.576480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CBDbf11xWEKrRDrEqe"]} -{"Format": "IDEA0", "ID": "a509d83f-a1b2-4adc-bf4b-68f7ea2702ac", "DetectTime": "2023-10-30T14:14:39.594530+02:00", "EventTime": "2023-10-30T14:14:39.594541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CSt0U94OkzgXH3U77"]} -{"Format": "IDEA0", "ID": "2080f517-fe5d-47d3-bf29-4c82608ec5e6", "DetectTime": "2023-10-30T14:14:39.613747+02:00", "EventTime": "2023-10-30T14:14:39.613757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C1gIka4FSFlv0ZslAi"]} -{"Format": "IDEA0", "ID": "b06e1561-3b2a-4d57-ab9b-f9bc4d4073ae", "DetectTime": "2023-10-30T14:14:39.632838+02:00", "EventTime": "2023-10-30T14:14:39.632849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CoXILn4TOhH7NRHtjf"]} -{"Format": "IDEA0", "ID": "8490421f-0677-4677-86cb-99838108cd82", "DetectTime": "2023-10-30T14:14:39.655521+02:00", "EventTime": "2023-10-30T14:14:39.655534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CWDVm4GIPNp4C9RZc"]} -{"Format": "IDEA0", "ID": "9de244dc-5b84-4ff9-8e48-d42234b7e75c", "DetectTime": "2023-10-30T14:14:39.678991+02:00", "EventTime": "2023-10-30T14:14:39.679005+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CB27i022Nv1SS0wVwj"]} -{"Format": "IDEA0", "ID": "d8dbac1c-ef15-4745-a54e-6162b52e297b", "DetectTime": "2023-10-30T14:14:39.704022+02:00", "EventTime": "2023-10-30T14:14:39.704035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C4MRyp4Bd6g5ZlF7h2"]} -{"Format": "IDEA0", "ID": "b6ceecab-3a83-4d53-a8cc-b4d270995398", "DetectTime": "2023-10-30T14:14:39.728390+02:00", "EventTime": "2023-10-30T14:14:39.728401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CkLf9h2qBviz3cJrZf"]} -{"Format": "Json", "ID": "b6ceecab-3a83-4d53-a8cc-b4d270995398", "DetectTime": "2023-10-30T14:14:39.728390+02:00", "EventTime": "2023-10-30T14:14:39.728401+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:52:33.006610+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:39.777477)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "5cb3afd7-3335-49a4-9277-44448f508963", "DetectTime": "2023-10-30T14:14:39.781346+02:00", "EventTime": "2023-10-30T14:14:39.781357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CSuQL11KBjMYXKYc5d"]} -{"Format": "IDEA0", "ID": "7c6d46f8-dcbb-4785-bb93-091220cca0b4", "DetectTime": "2023-10-30T14:14:39.806762+02:00", "EventTime": "2023-10-30T14:14:39.806792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Ctj9FhpVieuzcsir2"]} -{"Format": "IDEA0", "ID": "d9276ce1-26f9-441d-aca8-0dc1cbd994ee", "DetectTime": "2023-10-30T14:14:39.827550+02:00", "EventTime": "2023-10-30T14:14:39.827561+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CZ3LQ7ivlgbuRYXTf"]} -{"Format": "IDEA0", "ID": "5b7a39b3-ac21-4555-8daf-bcc3b0676997", "DetectTime": "2023-10-30T14:14:39.850504+02:00", "EventTime": "2023-10-30T14:14:39.850519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CtP22O2FvZNMXjMpEg"]} -{"Format": "IDEA0", "ID": "f898ee0c-67e9-4489-8462-46ae3054b60b", "DetectTime": "2023-10-30T14:14:39.871855+02:00", "EventTime": "2023-10-30T14:14:39.871865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CGaY7w3qDuxR2cCNf9"]} -{"Format": "IDEA0", "ID": "f6bc72d9-5484-455e-a6df-2ff7a32ad322", "DetectTime": "2023-10-30T14:14:39.888890+02:00", "EventTime": "2023-10-30T14:14:39.888905+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Clb1we31xFl6OYEBgh"]} -{"Format": "IDEA0", "ID": "e323f0d7-6a10-49c1-8db4-d7b8765d28b9", "DetectTime": "2023-10-30T14:14:39.906627+02:00", "EventTime": "2023-10-30T14:14:39.906640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CMOq7z1cL5Kg4ZoF2f"]} -{"Format": "IDEA0", "ID": "96d8e3d3-e10d-4d86-bc52-ffaaabf84081", "DetectTime": "2023-10-30T14:14:39.924112+02:00", "EventTime": "2023-10-30T14:14:39.924125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CoFSqL21m31qMwJvs1"]} -{"Format": "Json", "ID": "96d8e3d3-e10d-4d86-bc52-ffaaabf84081", "DetectTime": "2023-10-30T14:14:39.924112+02:00", "EventTime": "2023-10-30T14:14:39.924125+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:52:34.369780+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:39.973112)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1fb78e0f-bc73-4044-891f-35dd7ddc4560", "DetectTime": "2023-10-30T14:14:39.977213+02:00", "EventTime": "2023-10-30T14:14:39.977224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cp61BL3Gu3UapOR8ph"]} -{"Format": "IDEA0", "ID": "41025b15-3e35-4493-8302-f01fec8f6127", "DetectTime": "2023-10-30T14:14:39.995027+02:00", "EventTime": "2023-10-30T14:14:39.995038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["Cbx7TWyLExOuIhF9g"]} -{"Format": "IDEA0", "ID": "14210b05-ec11-48a1-88e9-450562f5854e", "DetectTime": "2023-10-30T14:14:40.016276+02:00", "EventTime": "2023-10-30T14:14:40.016290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CvJnbL1IoNt6vMoNkl"]} -{"Format": "IDEA0", "ID": "de112af8-6568-4955-80da-5451349633b7", "DetectTime": "2023-10-30T14:14:40.037564+02:00", "EventTime": "2023-10-30T14:14:40.037579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C1j7oJ2SIqzdKluSak"]} -{"Format": "IDEA0", "ID": "11c32f81-7504-44a2-9806-26aef2b71aac", "DetectTime": "2023-10-30T14:14:40.058327+02:00", "EventTime": "2023-10-30T14:14:40.058343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CsvhbM2qp4CwqcKpy7"]} -{"Format": "IDEA0", "ID": "96a8c48a-8969-43a0-8983-51c83cce0372", "DetectTime": "2023-10-30T14:14:40.078700+02:00", "EventTime": "2023-10-30T14:14:40.078710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CHCyVY2f2kGSAIYwJb"]} -{"Format": "IDEA0", "ID": "4dc8d217-84ee-45b0-bd4e-f192b19ff2e2", "DetectTime": "2023-10-30T14:14:40.099578+02:00", "EventTime": "2023-10-30T14:14:40.099589+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cm6Qc83CUhXbv4CiR2"]} -{"Format": "IDEA0", "ID": "80db17ef-7d0e-44c4-8a14-b4b01ef60e91", "DetectTime": "2023-10-30T14:14:40.119736+02:00", "EventTime": "2023-10-30T14:14:40.119750+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CFy8xvXDwWSxVKNz8"]} -{"Format": "IDEA0", "ID": "762d71bb-1179-4454-ab69-7d5d569154b4", "DetectTime": "2023-10-30T14:14:40.140713+02:00", "EventTime": "2023-10-30T14:14:40.140724+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CXB7xg3EZDwLvjMyY"]} -{"Format": "Json", "ID": "762d71bb-1179-4454-ab69-7d5d569154b4", "DetectTime": "2023-10-30T14:14:40.140713+02:00", "EventTime": "2023-10-30T14:14:40.140724+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T11:52:35.683970+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 226. (real time 2023/10/30 14:14:40.188923)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8fe2bb4e-89fe-4ad9-a9f9-6bc6c5cda821", "DetectTime": "2023-10-30T14:14:40.193106+02:00", "EventTime": "2023-10-30T14:14:40.193115+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CpiGJ71o48ESD71ktd"]} -{"Format": "IDEA0", "ID": "aad6c0f8-e59c-4288-9f77-9186f8fe00d0", "DetectTime": "2023-10-30T14:14:40.208581+02:00", "EventTime": "2023-10-30T14:14:40.208596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CdXRsX3D1P4L4VgISc"]} -{"Format": "IDEA0", "ID": "ec8a20eb-76fa-420e-abf4-3e5ba573a9bd", "DetectTime": "2023-10-30T14:14:40.234360+02:00", "EventTime": "2023-10-30T14:14:40.234378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CEahlM33xHXY6t3QXi"]} -{"Format": "IDEA0", "ID": "267b63fe-063f-486a-a75d-07d226ef3d11", "DetectTime": "2023-10-30T14:14:40.257194+02:00", "EventTime": "2023-10-30T14:14:40.257210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["ClrsHm4TabkQN8JM1e"]} -{"Format": "IDEA0", "ID": "0fe1ab5d-ff63-4bcb-91d8-256a1f25e038", "DetectTime": "2023-10-30T14:14:40.281143+02:00", "EventTime": "2023-10-30T14:14:40.281161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CZOGEB3opBLJri6vwa"]} -{"Format": "IDEA0", "ID": "239cd1a1-9c85-4e5f-a625-6bf61f32502f", "DetectTime": "2023-10-30T14:14:40.302645+02:00", "EventTime": "2023-10-30T14:14:40.302659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["Clp78l26KuWcpPq7A5"]} -{"Format": "IDEA0", "ID": "8fd4ff46-f49f-40f6-b9dc-661eeb4d4e24", "DetectTime": "2023-10-30T14:14:40.326332+02:00", "EventTime": "2023-10-30T14:14:40.326345+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxhissnPw3Y1LWi58"]} -{"Format": "IDEA0", "ID": "97aba661-ca59-4d5a-a62a-e7611b5f1b63", "DetectTime": "2023-10-30T14:14:40.353256+02:00", "EventTime": "2023-10-30T14:14:40.353268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVF6Sm3YTli5CRVEb7"]} -{"Format": "IDEA0", "ID": "43e0ece6-941f-4ae8-b509-ef789f44d5da", "DetectTime": "2023-10-30T14:14:40.374326+02:00", "EventTime": "2023-10-30T14:14:40.374338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CqBYeQqVeon9XM4nl"]} -{"Format": "IDEA0", "ID": "862d64d8-38de-4fff-bb67-d8d1779da7d0", "DetectTime": "2023-10-30T14:14:40.391038+02:00", "EventTime": "2023-10-30T14:14:40.391048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8641], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. ", "ContentType": "text/plain"}], "uids": ["CvH9994fnwxtALjVYa"]} -{"Format": "IDEA0", "ID": "6b029a64-8c57-4812-aaf9-34a1c516a9bf", "DetectTime": "2023-10-30T14:14:40.412323+02:00", "EventTime": "2023-10-30T14:14:40.412343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cdfu8v2Sx6dvHEj756"]} -{"Format": "IDEA0", "ID": "f9adfb36-81b9-4c6d-b86e-508b8d8fa2ed", "DetectTime": "2023-10-30T14:14:40.437374+02:00", "EventTime": "2023-10-30T14:14:40.437390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CSD1Jm2TG4XViEzqqa"]} -{"Format": "IDEA0", "ID": "d0de9f09-b4be-4fa3-a659-a451862f4492", "DetectTime": "2023-10-30T14:14:40.461257+02:00", "EventTime": "2023-10-30T14:14:40.461268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CGWmS84mkh6CRoAgc"]} -{"Format": "IDEA0", "ID": "1ae8360b-8a68-4876-ab2e-6134a6013d01", "DetectTime": "2023-10-30T14:14:40.477694+02:00", "EventTime": "2023-10-30T14:14:40.477705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CGtcua4t8gNi1VdF69"]} -{"Format": "Json", "ID": "1ae8360b-8a68-4876-ab2e-6134a6013d01", "DetectTime": "2023-10-30T14:14:40.477694+02:00", "EventTime": "2023-10-30T14:14:40.477705+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T12:23:05.026978+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 227. (real time 2023/10/30 14:14:40.528358)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "03e121a1-cf77-49a6-a366-dbc16c3deb44", "DetectTime": "2023-10-30T14:14:40.532191+02:00", "EventTime": "2023-10-30T14:14:40.532202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CajEx98qqZQLjUKv4"]} -{"Format": "IDEA0", "ID": "08ed6b32-b3b7-4326-be38-37c4af7f9439", "DetectTime": "2023-10-30T14:14:40.548317+02:00", "EventTime": "2023-10-30T14:14:40.548330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CA3j2e1C636Adpxedk"]} -{"Format": "IDEA0", "ID": "8d0c1d7b-c654-4364-9b2c-b31f294ab01a", "DetectTime": "2023-10-30T14:14:40.563124+02:00", "EventTime": "2023-10-30T14:14:40.563135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CuuIFf2LGoN5V44FF2"]} -{"Format": "IDEA0", "ID": "e9379f8c-a177-428f-a5b4-f2810b15dd7b", "DetectTime": "2023-10-30T14:14:40.581270+02:00", "EventTime": "2023-10-30T14:14:40.581286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CACVnNUV8ijriyE0a"]} -{"Format": "IDEA0", "ID": "da9cab0a-5e1b-48b5-ab04-a10af43d853f", "DetectTime": "2023-10-30T14:14:40.602044+02:00", "EventTime": "2023-10-30T14:14:40.602061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CnhLA12W306BFumJvi"]} -{"Format": "IDEA0", "ID": "e2d4facb-e138-43c9-b4b2-2b0357017681", "DetectTime": "2023-10-30T14:14:40.624255+02:00", "EventTime": "2023-10-30T14:14:40.624271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CKm8W73bkQ5LdybzNg"]} -{"Format": "IDEA0", "ID": "08cbc5d7-bb62-4e9c-9cf3-6cccbf16312a", "DetectTime": "2023-10-30T14:14:40.646379+02:00", "EventTime": "2023-10-30T14:14:40.646398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2179], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. ", "ContentType": "text/plain"}], "uids": ["CyZgVDIF3fI8VmH7d"]} -{"Format": "IDEA0", "ID": "6b86857c-9e82-48a2-9393-62a672c9eef3", "DetectTime": "2023-10-30T14:14:40.667373+02:00", "EventTime": "2023-10-30T14:14:40.667384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CFSfIW1TlnhYbffEg1"]} -{"Format": "Json", "ID": "6b86857c-9e82-48a2-9393-62a672c9eef3", "DetectTime": "2023-10-30T14:14:40.667373+02:00", "EventTime": "2023-10-30T14:14:40.667384+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T12:23:06.317670+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 227. (real time 2023/10/30 14:14:40.714913)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e2746490-9cb6-416f-bcce-5a29f00e8755", "DetectTime": "2023-10-30T14:14:40.718876+02:00", "EventTime": "2023-10-30T14:14:40.718889+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CMDGtSAWqr9woYZe3"]} -{"Format": "IDEA0", "ID": "94c6a83c-80a0-4bd4-8a35-7de37d822d20", "DetectTime": "2023-10-30T14:14:40.737507+02:00", "EventTime": "2023-10-30T14:14:40.737523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CwcbD43bRGjVwrdHb4"]} -{"Format": "IDEA0", "ID": "1e983acb-ef8a-4a5b-b1f7-89a20f021cc2", "DetectTime": "2023-10-30T14:14:40.754750+02:00", "EventTime": "2023-10-30T14:14:40.754766+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6448], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. ", "ContentType": "text/plain"}], "uids": ["Cw6s5M6dCoOxnjyc5"]} -{"Format": "IDEA0", "ID": "c940de3b-3509-4048-8213-3ed4583ca400", "DetectTime": "2023-10-30T14:14:40.770606+02:00", "EventTime": "2023-10-30T14:14:40.770626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CtFbAS2KWq20LASJA2"]} -{"Format": "IDEA0", "ID": "ea1236d2-ca75-44b3-9137-5a208608e91f", "DetectTime": "2023-10-30T14:14:40.787831+02:00", "EventTime": "2023-10-30T14:14:40.787841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CHGqsv3MZwGLxIGiHj"]} -{"Format": "IDEA0", "ID": "b38130a4-cb4a-41be-ae11-72e9965e0400", "DetectTime": "2023-10-30T14:14:40.802928+02:00", "EventTime": "2023-10-30T14:14:40.802944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CVQ1znVdWjjIae3Y4"]} -{"Format": "IDEA0", "ID": "682833b4-f3d0-4088-84c2-148c92e19876", "DetectTime": "2023-10-30T14:14:40.824629+02:00", "EventTime": "2023-10-30T14:14:40.824639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CFch6ekakhzrobGej"]} -{"Format": "IDEA0", "ID": "93b94cf6-9395-4483-8821-5e8beb7d6fab", "DetectTime": "2023-10-30T14:14:40.844229+02:00", "EventTime": "2023-10-30T14:14:40.844239+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C7ni266h4ROgIRaKb"]} -{"Format": "IDEA0", "ID": "c82e495d-856f-4790-b52b-fcca600eef79", "DetectTime": "2023-10-30T14:14:40.858622+02:00", "EventTime": "2023-10-30T14:14:40.858632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CReDr4Pox3WeONkze"]} -{"Format": "Json", "ID": "c82e495d-856f-4790-b52b-fcca600eef79", "DetectTime": "2023-10-30T14:14:40.858622+02:00", "EventTime": "2023-10-30T14:14:40.858632+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T12:23:07.717613+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 227. (real time 2023/10/30 14:14:40.902707)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "23887814-8387-43c4-b28b-18ac6b67dc18", "DetectTime": "2023-10-30T14:14:40.906350+02:00", "EventTime": "2023-10-30T14:14:40.906361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CVbXfC4MqRpIKVlLT6"]} -{"Format": "IDEA0", "ID": "f9b81fa6-1879-4749-ad51-600e745a1ecd", "DetectTime": "2023-10-30T14:14:40.918701+02:00", "EventTime": "2023-10-30T14:14:40.918711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CxOntL2cqHQ73Wkaij"]} -{"Format": "IDEA0", "ID": "ec8ba03a-88a5-4335-84df-8a139e1ee0ed", "DetectTime": "2023-10-30T14:14:40.930973+02:00", "EventTime": "2023-10-30T14:14:40.930983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CeWunb3LkGzTweY3kg"]} -{"Format": "IDEA0", "ID": "dd3cfa4f-e748-4497-9a13-d3431660eed6", "DetectTime": "2023-10-30T14:14:40.943664+02:00", "EventTime": "2023-10-30T14:14:40.943679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CCG8jJ2HNqBk7wjv9"]} -{"Format": "IDEA0", "ID": "3fef0ed1-a183-4b6c-a302-afcb545f2ed4", "DetectTime": "2023-10-30T14:14:40.956446+02:00", "EventTime": "2023-10-30T14:14:40.956461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Ci2bna1rQnraxGt6l6"]} -{"Format": "IDEA0", "ID": "ad29856c-42a8-4368-9fa0-a0fed6ccc486", "DetectTime": "2023-10-30T14:14:40.972849+02:00", "EventTime": "2023-10-30T14:14:40.972859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CpbOEE412PzNwkr1g2"]} -{"Format": "IDEA0", "ID": "1edcb9b3-0e15-4fb2-9424-bbb9e03cd9aa", "DetectTime": "2023-10-30T14:14:40.987836+02:00", "EventTime": "2023-10-30T14:14:40.987846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CauveQ3zySVIaP5oNl"]} -{"Format": "IDEA0", "ID": "ac2ebe77-1ac6-45ba-891f-ab669053f6d5", "DetectTime": "2023-10-30T14:14:41.000764+02:00", "EventTime": "2023-10-30T14:14:41.000774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9658/UDP destination IP 108.207.14.96. ", "ContentType": "text/plain"}], "uids": ["CXxhUdQ1ovOFn6m53"]} -{"Format": "Json", "ID": "ac2ebe77-1ac6-45ba-891f-ab669053f6d5", "DetectTime": "2023-10-30T14:14:41.000764+02:00", "EventTime": "2023-10-30T14:14:41.000774+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9658], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T12:23:09.060247+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 227. (real time 2023/10/30 14:14:41.041411)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b2fcaf5f-9441-4d0e-8460-a5e74d75fa7a", "DetectTime": "2023-10-30T14:14:41.045270+02:00", "EventTime": "2023-10-30T14:14:41.045280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CJpAaF1mcQvkgsagNe"]} -{"Format": "IDEA0", "ID": "3db36bf1-6df3-4345-aa23-a2ef3ded898a", "DetectTime": "2023-10-30T14:14:41.056619+02:00", "EventTime": "2023-10-30T14:14:41.056630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C0zU7J30cMzXgeKFsg"]} -{"Format": "IDEA0", "ID": "298d49cc-d942-4b72-94a7-90686e8747d3", "DetectTime": "2023-10-30T14:14:41.067154+02:00", "EventTime": "2023-10-30T14:14:41.067165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CQY6XZ1v5UIklmqpu2"]} -{"Format": "IDEA0", "ID": "cf389dc5-b19b-4f3b-9c44-23e4fcfab0b0", "DetectTime": "2023-10-30T14:14:41.078405+02:00", "EventTime": "2023-10-30T14:14:41.078416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYhoZq2qAYtK5RPUJ2"]} -{"Format": "IDEA0", "ID": "c0d8a5d0-ffa9-4525-9622-ca4d072378bd", "DetectTime": "2023-10-30T14:14:41.096569+02:00", "EventTime": "2023-10-30T14:14:41.096579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C1tuLB43a5bVjNtqv2"]} -{"Format": "IDEA0", "ID": "c774e115-5178-4fb4-9ac3-56050a82910e", "DetectTime": "2023-10-30T14:14:41.113148+02:00", "EventTime": "2023-10-30T14:14:41.113157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CKmsrwuZF69AsoVF3"]} -{"Format": "IDEA0", "ID": "4a9e3359-bdc3-411c-bedc-d4403fb43e3b", "DetectTime": "2023-10-30T14:14:41.129769+02:00", "EventTime": "2023-10-30T14:14:41.129780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C9bJ194uH5qmhw2o6f"]} -{"Format": "IDEA0", "ID": "682e37f7-c09d-4164-9733-ba2db50cbd87", "DetectTime": "2023-10-30T14:14:41.149885+02:00", "EventTime": "2023-10-30T14:14:41.149894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CnZiDB10uvorieQHcl"]} -{"Format": "IDEA0", "ID": "15aaf9e7-039c-485a-9b3f-1c9d061582ad", "DetectTime": "2023-10-30T14:14:41.169393+02:00", "EventTime": "2023-10-30T14:14:41.169403+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIrFx84LWDspLirOlc"]} -{"Format": "IDEA0", "ID": "ffef3e5d-b2d5-41b3-99f6-832011cac29a", "DetectTime": "2023-10-30T14:14:41.187915+02:00", "EventTime": "2023-10-30T14:14:41.187924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CLbQJ8Xri5KEwMRL9"]} -{"Format": "Json", "ID": "ffef3e5d-b2d5-41b3-99f6-832011cac29a", "DetectTime": "2023-10-30T14:14:41.187915+02:00", "EventTime": "2023-10-30T14:14:41.187924+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T19:41:19.744632+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 234. (real time 2023/10/30 14:14:41.242608)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9b5e5a6d-da98-4315-a98e-46b544f32ded", "DetectTime": "2023-10-30T14:14:41.246497+02:00", "EventTime": "2023-10-30T14:14:41.246508+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CJdaGl36yoCEJjgLme"]} -{"Format": "IDEA0", "ID": "a7cc5177-46d2-4b49-95d5-f7b6c3e03c77", "DetectTime": "2023-10-30T14:14:41.261490+02:00", "EventTime": "2023-10-30T14:14:41.261499+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CoUAaw27JTfHrU3s09"]} -{"Format": "IDEA0", "ID": "d3b88fd9-615e-456b-b2be-4fc2eb35ee37", "DetectTime": "2023-10-30T14:14:41.275455+02:00", "EventTime": "2023-10-30T14:14:41.275465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CHYPNS2oaCCXxUEcxi"]} -{"Format": "IDEA0", "ID": "acda7d2d-a1c2-4006-8452-6d1bc8161459", "DetectTime": "2023-10-30T14:14:41.290296+02:00", "EventTime": "2023-10-30T14:14:41.290305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CPmFT73Oq6P9aFLws4"]} -{"Format": "IDEA0", "ID": "7e914866-646a-4fde-8903-86e58884960e", "DetectTime": "2023-10-30T14:14:41.307797+02:00", "EventTime": "2023-10-30T14:14:41.307812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPe5j1egEna3sMm4f"]} -{"Format": "IDEA0", "ID": "44fc65cc-d15a-467a-9bed-c1aa955a9ad0", "DetectTime": "2023-10-30T14:14:41.322085+02:00", "EventTime": "2023-10-30T14:14:41.322100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CtY1A31R7EN6cBeE9k"]} -{"Format": "IDEA0", "ID": "82f3950c-cb9a-467f-9902-9ca950c21eff", "DetectTime": "2023-10-30T14:14:41.336876+02:00", "EventTime": "2023-10-30T14:14:41.336885+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CPomQS3XJSdWQ04zq1"]} -{"Format": "IDEA0", "ID": "259606aa-41a1-423c-8a53-05ca34eca5d6", "DetectTime": "2023-10-30T14:14:41.352583+02:00", "EventTime": "2023-10-30T14:14:41.352596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Ci74yF1h4hyYDstOli"]} -{"Format": "IDEA0", "ID": "e3dbc4d5-9ca8-43f8-84af-9f0b3a119f8f", "DetectTime": "2023-10-30T14:14:41.368053+02:00", "EventTime": "2023-10-30T14:14:41.368062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CiTkxv38EB03PLwTpj"]} -{"Format": "Json", "ID": "e3dbc4d5-9ca8-43f8-84af-9f0b3a119f8f", "DetectTime": "2023-10-30T14:14:41.368053+02:00", "EventTime": "2023-10-30T14:14:41.368062+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T19:41:37.383215+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 234. (real time 2023/10/30 14:14:41.415483)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c4518a12-62e1-41ec-9707-953719f27441", "DetectTime": "2023-10-30T14:14:41.419113+02:00", "EventTime": "2023-10-30T14:14:41.419122+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CJvP9s1LuttJKVLt61"]} -{"Format": "IDEA0", "ID": "7baf38e9-3627-4249-b8e8-5c9361a89431", "DetectTime": "2023-10-30T14:14:41.433127+02:00", "EventTime": "2023-10-30T14:14:41.433141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C65Vh13SfucRHqxj7f"]} -{"Format": "IDEA0", "ID": "2c2b16b2-08a3-47f1-a911-d433357db6ce", "DetectTime": "2023-10-30T14:14:41.447795+02:00", "EventTime": "2023-10-30T14:14:41.447807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CDrNWR10SPnNeLo3Ca"]} -{"Format": "IDEA0", "ID": "68803432-b1ec-41bd-b4c2-55168377fcc9", "DetectTime": "2023-10-30T14:14:41.461883+02:00", "EventTime": "2023-10-30T14:14:41.461895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyFO4M2Y6XTBMOQT74"]} -{"Format": "IDEA0", "ID": "3e08377d-8a86-49eb-83c9-f618faabeb5b", "DetectTime": "2023-10-30T14:14:41.475935+02:00", "EventTime": "2023-10-30T14:14:41.475944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CrHKUy3yHtDKIc5HWd"]} -{"Format": "IDEA0", "ID": "3e253c50-9de4-4d38-9a40-8c73d83e8905", "DetectTime": "2023-10-30T14:14:41.489452+02:00", "EventTime": "2023-10-30T14:14:41.489462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CElXJg1C7H03XEA999"]} -{"Format": "IDEA0", "ID": "e9778771-c2ee-45c5-abde-c23b0f1db503", "DetectTime": "2023-10-30T14:14:41.503936+02:00", "EventTime": "2023-10-30T14:14:41.503946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CWwoUg4LxqCvBCQ8d9"]} -{"Format": "IDEA0", "ID": "3d0fe0fa-899e-47c2-b0fa-8a09922f2ccf", "DetectTime": "2023-10-30T14:14:41.518099+02:00", "EventTime": "2023-10-30T14:14:41.518111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CrLgTq1mnagRqQivFe"]} -{"Format": "Json", "ID": "3d0fe0fa-899e-47c2-b0fa-8a09922f2ccf", "DetectTime": "2023-10-30T14:14:41.518099+02:00", "EventTime": "2023-10-30T14:14:41.518111+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T19:41:57.074742+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 234. (real time 2023/10/30 14:14:41.565678)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6a8cc06-3ec0-4193-aa96-28863bd5e19c", "DetectTime": "2023-10-30T14:14:41.569797+02:00", "EventTime": "2023-10-30T14:14:41.569810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CUoEmd2ZE5KKgF42u9"]} -{"Format": "IDEA0", "ID": "607ef444-83d8-4278-acb0-b2f13d305895", "DetectTime": "2023-10-30T14:14:41.582397+02:00", "EventTime": "2023-10-30T14:14:41.582407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CDodATk6u9zEZIigb"]} -{"Format": "IDEA0", "ID": "d3a00aa9-f6ff-46d9-8a73-d65c74e4907f", "DetectTime": "2023-10-30T14:14:41.595511+02:00", "EventTime": "2023-10-30T14:14:41.595525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CARFRH3ej5MORvZMv6"]} -{"Format": "IDEA0", "ID": "7c4a440e-4aae-4408-93e6-64d3fab24ef2", "DetectTime": "2023-10-30T14:14:41.608818+02:00", "EventTime": "2023-10-30T14:14:41.608829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CdHuwO3CQj3VdhLqsh"]} -{"Format": "IDEA0", "ID": "02854ed0-c36c-488a-b38c-a8e79485e6c7", "DetectTime": "2023-10-30T14:14:41.622104+02:00", "EventTime": "2023-10-30T14:14:41.622113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CdwjHV2rHI28bPEgSc"]} -{"Format": "IDEA0", "ID": "24e448da-acd8-4b8f-a2dc-a25ea61f0443", "DetectTime": "2023-10-30T14:14:41.636456+02:00", "EventTime": "2023-10-30T14:14:41.636467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CBEyIS1GvVpqutbMUd"]} -{"Format": "IDEA0", "ID": "40c18f1f-65d5-47b7-960c-711c2b0f0676", "DetectTime": "2023-10-30T14:14:41.650162+02:00", "EventTime": "2023-10-30T14:14:41.650173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CtpvzI3vcU4EiTr8oa"]} -{"Format": "IDEA0", "ID": "7a825fcf-adba-4b09-ab3b-01455c5fde6d", "DetectTime": "2023-10-30T14:14:41.662417+02:00", "EventTime": "2023-10-30T14:14:41.662428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CnDdni1JTU5SVqMxUb"]} -{"Format": "Json", "ID": "7a825fcf-adba-4b09-ab3b-01455c5fde6d", "DetectTime": "2023-10-30T14:14:41.662417+02:00", "EventTime": "2023-10-30T14:14:41.662428+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T19:42:18.429331+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 234. (real time 2023/10/30 14:14:41.703176)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fc2e5e0a-a67e-45fc-ad81-8daa08e649c4", "DetectTime": "2023-10-30T14:14:41.707357+02:00", "EventTime": "2023-10-30T14:14:41.707372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cm2LqE4pDfYSaNMuEe"]} -{"Format": "IDEA0", "ID": "f15b31ce-ff10-44d6-bb61-fe55545129ed", "DetectTime": "2023-10-30T14:14:41.720528+02:00", "EventTime": "2023-10-30T14:14:41.720543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Cu3K7R1eJKTs8Ro9Yj"]} -{"Format": "IDEA0", "ID": "04965394-b4ca-4be1-8162-8b260cd4af84", "DetectTime": "2023-10-30T14:14:41.740516+02:00", "EventTime": "2023-10-30T14:14:41.740528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CQxG4r3T2R44TTusR3"]} -{"Format": "IDEA0", "ID": "874c86dd-6844-46c0-91da-37e24395e792", "DetectTime": "2023-10-30T14:14:41.767536+02:00", "EventTime": "2023-10-30T14:14:41.767547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CuQ9all6ESUOx95y7"]} -{"Format": "IDEA0", "ID": "0606fa38-753f-4ca6-a4b5-9f1ab7255218", "DetectTime": "2023-10-30T14:14:41.796414+02:00", "EventTime": "2023-10-30T14:14:41.796426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["ClgJHq11E4uE1VEVc7"]} -{"Format": "IDEA0", "ID": "ba573236-a4d8-4e8c-9995-dfdff037f6f3", "DetectTime": "2023-10-30T14:14:41.828091+02:00", "EventTime": "2023-10-30T14:14:41.828100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CplAWJ3mUqdAnoLtLi"]} -{"Format": "IDEA0", "ID": "180929a2-e5e7-4b6f-aff2-b37a4649758f", "DetectTime": "2023-10-30T14:14:41.851505+02:00", "EventTime": "2023-10-30T14:14:41.851516+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C8xA8K1GuDMY51P688"]} -{"Format": "IDEA0", "ID": "b4b969a4-d1ce-44bd-a980-7003a2063fcf", "DetectTime": "2023-10-30T14:14:41.875664+02:00", "EventTime": "2023-10-30T14:14:41.875679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cjfu0H1Kdb1zz8XDMe"]} -{"Format": "IDEA0", "ID": "c09e7d6d-42cc-4ce6-bea4-ce9f76713529", "DetectTime": "2023-10-30T14:14:41.901019+02:00", "EventTime": "2023-10-30T14:14:41.901031+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cf5BypEdHwfp4IlLl"]} -{"Format": "Json", "ID": "c09e7d6d-42cc-4ce6-bea4-ce9f76713529", "DetectTime": "2023-10-30T14:14:41.901019+02:00", "EventTime": "2023-10-30T14:14:41.901031+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T20:13:38.854825+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:42.042948)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4f6bfac5-daba-41ec-9f7e-72721feb3dfb", "DetectTime": "2023-10-30T14:14:42.048231+02:00", "EventTime": "2023-10-30T14:14:42.048246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CvI41l098SiDs5MF5"]} -{"Format": "IDEA0", "ID": "381b68b0-c90b-4c34-a743-9553fd74d121", "DetectTime": "2023-10-30T14:14:42.083182+02:00", "EventTime": "2023-10-30T14:14:42.083198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CSFHbZ2Wp8irZdsfi5"]} -{"Format": "IDEA0", "ID": "b34a82e0-a2cc-45fc-a3ec-7c4a86a4cb29", "DetectTime": "2023-10-30T14:14:42.117132+02:00", "EventTime": "2023-10-30T14:14:42.117146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CJKF5YdJ4BWfGoT8k"]} -{"Format": "IDEA0", "ID": "c3573bf0-1bff-436e-b4b1-06c925f62992", "DetectTime": "2023-10-30T14:14:42.143902+02:00", "EventTime": "2023-10-30T14:14:42.143915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CBKlRk1MswZZN9Cgcj"]} -{"Format": "IDEA0", "ID": "6fc58640-b9ad-4041-8252-bda3eb620889", "DetectTime": "2023-10-30T14:14:42.166752+02:00", "EventTime": "2023-10-30T14:14:42.166762+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C3jwp924fh68iHpJkf"]} -{"Format": "IDEA0", "ID": "2febe41a-7fde-48c6-946f-52a50e41bbbf", "DetectTime": "2023-10-30T14:14:42.189430+02:00", "EventTime": "2023-10-30T14:14:42.189445+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C6Iecd3YAfwRP604g8"]} -{"Format": "IDEA0", "ID": "01160aaf-aed6-4b07-b5f8-dd3f2f813fc4", "DetectTime": "2023-10-30T14:14:42.213289+02:00", "EventTime": "2023-10-30T14:14:42.213302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ClmYQQ3Er461dM7KB6"]} -{"Format": "IDEA0", "ID": "b2ea44f1-aa18-4efb-8d37-48a673462d74", "DetectTime": "2023-10-30T14:14:42.238326+02:00", "EventTime": "2023-10-30T14:14:42.238340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Ca0MMt3a5U50wDhCvj"]} -{"Format": "Json", "ID": "b2ea44f1-aa18-4efb-8d37-48a673462d74", "DetectTime": "2023-10-30T14:14:42.238326+02:00", "EventTime": "2023-10-30T14:14:42.238340+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T20:13:41.018074+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:42.291996)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b8c6975d-9fd2-49ed-b459-c290696ce919", "DetectTime": "2023-10-30T14:14:42.295766+02:00", "EventTime": "2023-10-30T14:14:42.295778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["Cz6wjl2qiZDDm0xmh9"]} -{"Format": "IDEA0", "ID": "6d35033f-bcee-4dc5-ad33-58ec83047a6c", "DetectTime": "2023-10-30T14:14:42.316871+02:00", "EventTime": "2023-10-30T14:14:42.316880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CXgQtqijOKjknquYl"]} -{"Format": "IDEA0", "ID": "c5edc43a-2071-4157-adaa-4ebfe62e8140", "DetectTime": "2023-10-30T14:14:42.348047+02:00", "EventTime": "2023-10-30T14:14:42.348061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvITtV2HWBglg5cyJe"]} -{"Format": "IDEA0", "ID": "fc52dfb7-6f11-4f92-8566-a1c6097b7b71", "DetectTime": "2023-10-30T14:14:42.379495+02:00", "EventTime": "2023-10-30T14:14:42.379509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["Cw3wK52S2DUvKXeYE6"]} -{"Format": "IDEA0", "ID": "3ef05d63-ff74-49e0-b8c9-3c6f0bc1e79b", "DetectTime": "2023-10-30T14:14:42.411617+02:00", "EventTime": "2023-10-30T14:14:42.411631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CIFO1p2hEVxXaOCqXi"]} -{"Format": "IDEA0", "ID": "8d6b1441-50e5-4bbe-aa97-aa958e7dc1d6", "DetectTime": "2023-10-30T14:14:42.442645+02:00", "EventTime": "2023-10-30T14:14:42.442661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CVqvEM1BBDL96kWywk"]} -{"Format": "IDEA0", "ID": "78de884d-b821-4e93-bb2b-427aa01a4c85", "DetectTime": "2023-10-30T14:14:42.465334+02:00", "EventTime": "2023-10-30T14:14:42.465343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXKvBW11CTAYEBPFci"]} -{"Format": "IDEA0", "ID": "714b4e6f-ee68-4860-96a8-91630d92c219", "DetectTime": "2023-10-30T14:14:42.490708+02:00", "EventTime": "2023-10-30T14:14:42.490723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CCHGe0444Q62VPtj1d"]} -{"Format": "Json", "ID": "714b4e6f-ee68-4860-96a8-91630d92c219", "DetectTime": "2023-10-30T14:14:42.490708+02:00", "EventTime": "2023-10-30T14:14:42.490723+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T20:13:42.766579+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:42.559110)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "fde25f2c-0fe0-4988-b89d-0e06bb373034", "DetectTime": "2023-10-30T14:14:42.562896+02:00", "EventTime": "2023-10-30T14:14:42.562907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["C4IrI43b0IIAXBh6Wa"]} -{"Format": "IDEA0", "ID": "a60bac04-2c7b-4e0d-8072-47e1b7d9837d", "DetectTime": "2023-10-30T14:14:42.580923+02:00", "EventTime": "2023-10-30T14:14:42.580932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CDG2NToKPB0kFUJF1"]} -{"Format": "IDEA0", "ID": "f89765a3-4eb1-4e65-ba25-7886308fc731", "DetectTime": "2023-10-30T14:14:42.598896+02:00", "EventTime": "2023-10-30T14:14:42.598906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CkDwwf0WsvFawRlOc"]} -{"Format": "IDEA0", "ID": "a59d7648-12fa-41a5-be0d-53116a677c64", "DetectTime": "2023-10-30T14:14:42.618109+02:00", "EventTime": "2023-10-30T14:14:42.618120+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C99UITjYVQxnF42R1"]} -{"Format": "IDEA0", "ID": "9a49a0ac-aede-4c80-896e-4a61ef944609", "DetectTime": "2023-10-30T14:14:42.637886+02:00", "EventTime": "2023-10-30T14:14:42.637895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CeQurp4RzqA9GMRnP4"]} -{"Format": "IDEA0", "ID": "b20c85df-47bc-451e-afbd-9660398977ac", "DetectTime": "2023-10-30T14:14:42.659762+02:00", "EventTime": "2023-10-30T14:14:42.659771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["Cf3QWy1FXLDoLE3TKi"]} -{"Format": "IDEA0", "ID": "3b59de60-400b-4f55-8e77-62deecad13ce", "DetectTime": "2023-10-30T14:14:42.680959+02:00", "EventTime": "2023-10-30T14:14:42.680969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C9CPTp1lJb0vxNZ1V3"]} -{"Format": "IDEA0", "ID": "6b33cf5f-4376-4564-bd5f-f8c660e51fe3", "DetectTime": "2023-10-30T14:14:42.703234+02:00", "EventTime": "2023-10-30T14:14:42.703245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ce1vPt4ZT4ewTKe3xd"]} -{"Format": "Json", "ID": "6b33cf5f-4376-4564-bd5f-f8c660e51fe3", "DetectTime": "2023-10-30T14:14:42.703234+02:00", "EventTime": "2023-10-30T14:14:42.703245+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "1970-01-10T20:24:31.293524+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:42.750655)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "76bfda94-ef68-4444-b780-f0094e5efcda", "DetectTime": "2023-10-30T14:14:42.754912+02:00", "EventTime": "2023-10-30T14:14:42.754929+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ccw3HM1Zo3W00Xm0lj"]} -{"Format": "IDEA0", "ID": "03c4ef91-c326-4213-a63b-76322f4eaa32", "DetectTime": "2023-10-30T14:14:42.772315+02:00", "EventTime": "2023-10-30T14:14:42.772326+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ck6Aah2sCd6byiCTJ3"]} -{"Format": "IDEA0", "ID": "2fea455b-d690-4cc4-ad26-02f21c85c24a", "DetectTime": "2023-10-30T14:14:42.790814+02:00", "EventTime": "2023-10-30T14:14:42.790825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CVp2GK24JN3wxMk4tk"]} -{"Format": "IDEA0", "ID": "987b4379-f839-4e11-bd3f-bc07bf55e714", "DetectTime": "2023-10-30T14:14:42.810723+02:00", "EventTime": "2023-10-30T14:14:42.810736+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Csropb2QBR0PkxeIh2"]} -{"Format": "IDEA0", "ID": "d135ff5f-20f4-421e-b5d5-8fdf1c44c05d", "DetectTime": "2023-10-30T14:14:42.829837+02:00", "EventTime": "2023-10-30T14:14:42.829847+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C8wOFh2EZdtxrOMf93"]} -{"Format": "IDEA0", "ID": "99f93124-fa1d-4b4e-92b6-009c95dd2090", "DetectTime": "2023-10-30T14:14:42.849086+02:00", "EventTime": "2023-10-30T14:14:42.849096+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CiIv0H2UgsHAUfuwi"]} -{"Format": "IDEA0", "ID": "afa249d6-e062-417b-81f7-087692226597", "DetectTime": "2023-10-30T14:14:42.868388+02:00", "EventTime": "2023-10-30T14:14:42.868398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CGHXe21u4jCP9H2Dti"]} -{"Format": "IDEA0", "ID": "b3064632-cef6-485a-bfa3-70ae014acaa6", "DetectTime": "2023-10-30T14:14:42.889608+02:00", "EventTime": "2023-10-30T14:14:42.889619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CkwBr32EIf5lplDXTh"]} -{"Format": "IDEA0", "ID": "65563e52-fe9d-44de-948e-bfd51e321678", "DetectTime": "2023-10-30T14:14:42.909531+02:00", "EventTime": "2023-10-30T14:14:42.909542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CX10Dh2areKg8VFhtg"]} -{"Format": "Json", "ID": "65563e52-fe9d-44de-948e-bfd51e321678", "DetectTime": "2023-10-30T14:14:42.909531+02:00", "EventTime": "2023-10-30T14:14:42.909542+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T20:43:57.956376+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:42.959799)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b90a9515-bbca-4886-a18c-76ad381b5cc4", "DetectTime": "2023-10-30T14:14:42.964676+02:00", "EventTime": "2023-10-30T14:14:42.964694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CTBnyVTsP5AfoGXhl"]} -{"Format": "IDEA0", "ID": "aab12e72-5fa1-4043-b17a-95242294f89d", "DetectTime": "2023-10-30T14:14:42.983555+02:00", "EventTime": "2023-10-30T14:14:42.983566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C3Bhbe1LrL8QjlmYN5"]} -{"Format": "IDEA0", "ID": "b89d7836-cead-4041-8313-48f4cc744ce7", "DetectTime": "2023-10-30T14:14:43.002703+02:00", "EventTime": "2023-10-30T14:14:43.002713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CM6Ywg4gfa2L4JXwDi"]} -{"Format": "IDEA0", "ID": "849a4cd5-2292-4c43-adb1-5b1a04d07cff", "DetectTime": "2023-10-30T14:14:43.021839+02:00", "EventTime": "2023-10-30T14:14:43.021851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CASW301Al6AVIKiyQl"]} -{"Format": "IDEA0", "ID": "5eb1284b-1353-45b5-ba1e-534991ac9fe0", "DetectTime": "2023-10-30T14:14:43.046278+02:00", "EventTime": "2023-10-30T14:14:43.046292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CombX71duKZQ6rZjD8"]} -{"Format": "IDEA0", "ID": "a7e083d6-236d-4365-9432-78a3bf34705c", "DetectTime": "2023-10-30T14:14:43.071976+02:00", "EventTime": "2023-10-30T14:14:43.071990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CmBCWnnz6zb2dm7Ba"]} -{"Format": "IDEA0", "ID": "eae688ae-ff2c-4815-994d-0279228d0eb4", "DetectTime": "2023-10-30T14:14:43.097817+02:00", "EventTime": "2023-10-30T14:14:43.097832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C9PNVPN4bFCCAIZ94"]} -{"Format": "IDEA0", "ID": "1098d85e-d2c3-486d-92b3-ed4d48ae4671", "DetectTime": "2023-10-30T14:14:43.124633+02:00", "EventTime": "2023-10-30T14:14:43.124647+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CbYL6T1q7CTCX3h8na"]} -{"Format": "Json", "ID": "1098d85e-d2c3-486d-92b3-ed4d48ae4671", "DetectTime": "2023-10-30T14:14:43.124633+02:00", "EventTime": "2023-10-30T14:14:43.124647+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T20:44:00.002036+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:43.187704)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "384bc9d7-224c-45ac-83cf-565deeab28c0", "DetectTime": "2023-10-30T14:14:43.192638+02:00", "EventTime": "2023-10-30T14:14:43.192653+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CCOqWtCRLuZRuEdad"]} -{"Format": "IDEA0", "ID": "300ddbca-b7cd-4c6c-8d30-850d626b8936", "DetectTime": "2023-10-30T14:14:43.214371+02:00", "EventTime": "2023-10-30T14:14:43.214382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CjFKjH1tsXQNeB1lig"]} -{"Format": "IDEA0", "ID": "77680434-4240-4cf5-ac9a-8a029f213f70", "DetectTime": "2023-10-30T14:14:43.232286+02:00", "EventTime": "2023-10-30T14:14:43.232300+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CoiTgd10uqPWv8XCAi"]} -{"Format": "IDEA0", "ID": "a7327850-785b-4a3d-9d99-122048be932f", "DetectTime": "2023-10-30T14:14:43.255701+02:00", "EventTime": "2023-10-30T14:14:43.255711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CLH7er2CvEowXNHdc4"]} -{"Format": "IDEA0", "ID": "c9e1c46c-a2e4-47d6-9d08-36c8482925ab", "DetectTime": "2023-10-30T14:14:43.275979+02:00", "EventTime": "2023-10-30T14:14:43.275990+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CSXuyt2a9Hwb5wm5uf"]} -{"Format": "IDEA0", "ID": "0e52482d-ea9f-424e-a278-e8667be53c20", "DetectTime": "2023-10-30T14:14:43.293078+02:00", "EventTime": "2023-10-30T14:14:43.293090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CvCND44hWhQDMwFhjj"]} -{"Format": "IDEA0", "ID": "4e9809e3-a7a6-49e5-ac02-f92b9971a401", "DetectTime": "2023-10-30T14:14:43.311068+02:00", "EventTime": "2023-10-30T14:14:43.311079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CqUY8S3fWwvqTPP3q3"]} -{"Format": "IDEA0", "ID": "0665e844-c44b-4f85-93dd-545baad69fef", "DetectTime": "2023-10-30T14:14:43.327134+02:00", "EventTime": "2023-10-30T14:14:43.327144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["C4F2yd42hNhQ2xGaFj"]} -{"Format": "IDEA0", "ID": "4592f89f-7b46-4d34-9541-fbc840f512bd", "DetectTime": "2023-10-30T14:14:43.343087+02:00", "EventTime": "2023-10-30T14:14:43.343097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CCMlFs4Q782p3dtxG4"]} -{"Format": "Json", "ID": "4592f89f-7b46-4d34-9541-fbc840f512bd", "DetectTime": "2023-10-30T14:14:43.343087+02:00", "EventTime": "2023-10-30T14:14:43.343097+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T20:44:35.563497+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 235. (real time 2023/10/30 14:14:43.389786)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "76f9f1e9-07d3-482c-90d6-fc235264bf87", "DetectTime": "2023-10-30T14:14:43.395034+02:00", "EventTime": "2023-10-30T14:14:43.395050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CNT209cQqDpRmh1K"]} -{"Format": "IDEA0", "ID": "a7ea5b81-f9c7-4d72-9ae4-46b408c856d5", "DetectTime": "2023-10-30T14:14:43.416676+02:00", "EventTime": "2023-10-30T14:14:43.416690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["ClCCEM1i9ECcNlu1Hl"]} -{"Format": "IDEA0", "ID": "79780304-bb1d-4829-9654-c93d044a4ee8", "DetectTime": "2023-10-30T14:14:43.437952+02:00", "EventTime": "2023-10-30T14:14:43.437963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CgcDer3CbQqt41AmSh"]} -{"Format": "IDEA0", "ID": "a2a62b48-7663-478b-adee-ea4bc2e93f4f", "DetectTime": "2023-10-30T14:14:43.454890+02:00", "EventTime": "2023-10-30T14:14:43.454902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CImlYQ30ks4jhHL1Ec"]} -{"Format": "IDEA0", "ID": "a66a59ea-2c0d-4969-a210-55802b3e88df", "DetectTime": "2023-10-30T14:14:43.470237+02:00", "EventTime": "2023-10-30T14:14:43.470248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN9Dr24yL6n34M4RC2"]} -{"Format": "IDEA0", "ID": "2cc09a6e-f82a-46d1-89a5-cc52ab324ea8", "DetectTime": "2023-10-30T14:14:43.486113+02:00", "EventTime": "2023-10-30T14:14:43.486125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C7xMSF3lE2pVk5gDQl"]} -{"Format": "IDEA0", "ID": "8085ebc0-17dd-4bac-a015-15ecfe668241", "DetectTime": "2023-10-30T14:14:43.508153+02:00", "EventTime": "2023-10-30T14:14:43.508168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["ChSK6Y3sWoOJAauTfa"]} -{"Format": "IDEA0", "ID": "decc0713-80f5-4521-8dc1-75d292767e52", "DetectTime": "2023-10-30T14:14:43.533352+02:00", "EventTime": "2023-10-30T14:14:43.533364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CLtRNC3QvCSgPvucD1"]} -{"Format": "IDEA0", "ID": "8c308715-fbdf-4d32-be32-e3db204fe3cd", "DetectTime": "2023-10-30T14:14:43.558334+02:00", "EventTime": "2023-10-30T14:14:43.558348+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CR2XUr3dro4RA8tbvg"]} -{"Format": "IDEA0", "ID": "157718e5-73b2-41bd-8a46-4345e72a9eda", "DetectTime": "2023-10-30T14:14:43.582662+02:00", "EventTime": "2023-10-30T14:14:43.582673+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CCsMnz413kBqKQSfrj"]} -{"Format": "IDEA0", "ID": "fd09bd86-c53d-4b21-a4fe-fa5172fe647e", "DetectTime": "2023-10-30T14:14:43.615169+02:00", "EventTime": "2023-10-30T14:14:43.615183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CGGM7tKfBhWyvL4fg"]} -{"Format": "IDEA0", "ID": "8bf1ce3e-2c9f-428b-aa4d-dff26d40bba6", "DetectTime": "2023-10-30T14:14:43.646185+02:00", "EventTime": "2023-10-30T14:14:43.646194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C5vPyZ1PdGqjUhrGlk"]} -{"Format": "IDEA0", "ID": "efdb545e-dee1-41b1-a716-5dc6f2eb99ca", "DetectTime": "2023-10-30T14:14:43.666324+02:00", "EventTime": "2023-10-30T14:14:43.666333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CiSisi2EwRVdGeVX6c"]} -{"Format": "Json", "ID": "efdb545e-dee1-41b1-a716-5dc6f2eb99ca", "DetectTime": "2023-10-30T14:14:43.666324+02:00", "EventTime": "2023-10-30T14:14:43.666333+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:15:00.842430+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:43.795097)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "87c6aa51-dd3c-465c-88d6-6ef8a4a6576c", "DetectTime": "2023-10-30T14:14:43.799188+02:00", "EventTime": "2023-10-30T14:14:43.799198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CWoaN73AhVPKVYrX6j"]} -{"Format": "IDEA0", "ID": "ddf2c950-a133-4f4c-8772-e5c8fdf6543a", "DetectTime": "2023-10-30T14:14:43.823479+02:00", "EventTime": "2023-10-30T14:14:43.823494+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CxaB8RZoXlmLOKMx9"]} -{"Format": "IDEA0", "ID": "1ec83a34-9e2f-45ab-a2c8-1079c3bbc0ee", "DetectTime": "2023-10-30T14:14:43.852984+02:00", "EventTime": "2023-10-30T14:14:43.852998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CHPgue3RFGHoF0IFf8"]} -{"Format": "IDEA0", "ID": "cc4c9456-72f8-4f85-8b80-ecc5502d1bfa", "DetectTime": "2023-10-30T14:14:43.879141+02:00", "EventTime": "2023-10-30T14:14:43.879155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CvHEe63y3K1Xlwmsil"]} -{"Format": "IDEA0", "ID": "0507b942-fe2b-4afa-8550-f63d9f2e2795", "DetectTime": "2023-10-30T14:14:43.909615+02:00", "EventTime": "2023-10-30T14:14:43.909629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CQ7gWq2ecaEoOvAWI1"]} -{"Format": "IDEA0", "ID": "7450e02a-ab97-4c72-9590-da630dc33530", "DetectTime": "2023-10-30T14:14:43.940817+02:00", "EventTime": "2023-10-30T14:14:43.940831+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C30guE2ac3lDL85Lb7"]} -{"Format": "IDEA0", "ID": "4909f52a-d188-4046-afd2-35f0e610897f", "DetectTime": "2023-10-30T14:14:43.970824+02:00", "EventTime": "2023-10-30T14:14:43.970838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C5CSHrPzVyBcnyeRa"]} -{"Format": "IDEA0", "ID": "40342c34-4843-4a97-9381-2e59bfc2503b", "DetectTime": "2023-10-30T14:14:44.001249+02:00", "EventTime": "2023-10-30T14:14:44.001259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CgVWdoYlV6p32hMXg"]} -{"Format": "Json", "ID": "40342c34-4843-4a97-9381-2e59bfc2503b", "DetectTime": "2023-10-30T14:14:44.001249+02:00", "EventTime": "2023-10-30T14:14:44.001259+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:15:03.036705+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:44.058911)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "69f67c34-ddda-4063-bd09-01863a5ea62a", "DetectTime": "2023-10-30T14:14:44.063107+02:00", "EventTime": "2023-10-30T14:14:44.063117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CZZ7js1YXAqoDrkOP8"]} -{"Format": "IDEA0", "ID": "1449e03d-957c-4e6b-881d-c64429799d94", "DetectTime": "2023-10-30T14:14:44.090267+02:00", "EventTime": "2023-10-30T14:14:44.090282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CgN21m2DDzMo0gDhH8"]} -{"Format": "IDEA0", "ID": "e17002af-3d46-4b19-954d-8d5f87a51974", "DetectTime": "2023-10-30T14:14:44.110939+02:00", "EventTime": "2023-10-30T14:14:44.110951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CNSaOr5Si9jBKpXBh"]} -{"Format": "IDEA0", "ID": "903e9a52-8ff6-4fb4-b46b-dba7ccbe680d", "DetectTime": "2023-10-30T14:14:44.138416+02:00", "EventTime": "2023-10-30T14:14:44.138431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CqfByp4atSMVPhRm98"]} -{"Format": "IDEA0", "ID": "0326fae6-94dc-41fc-a999-f700990fff8a", "DetectTime": "2023-10-30T14:14:44.168234+02:00", "EventTime": "2023-10-30T14:14:44.168251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CSZb1T1reQwHfflGG4"]} -{"Format": "IDEA0", "ID": "70f570e4-7aed-440e-8438-fc7d6406bdb5", "DetectTime": "2023-10-30T14:14:44.193947+02:00", "EventTime": "2023-10-30T14:14:44.193962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CtvKAc4xBBLxEiGKq"]} -{"Format": "IDEA0", "ID": "5856c488-010b-48e1-8d2b-240f0e6fb4f7", "DetectTime": "2023-10-30T14:14:44.223173+02:00", "EventTime": "2023-10-30T14:14:44.223187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C81uVE3uBHoCIsH07k"]} -{"Format": "IDEA0", "ID": "68ad7844-4f1f-4938-9470-0356c7179bb0", "DetectTime": "2023-10-30T14:14:44.243842+02:00", "EventTime": "2023-10-30T14:14:44.243851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CMdrvq1wvEqn0LLIG1"]} -{"Format": "IDEA0", "ID": "96c605a4-2a50-4deb-9ab9-a25741012209", "DetectTime": "2023-10-30T14:14:44.268605+02:00", "EventTime": "2023-10-30T14:14:44.268620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CTS1pC4c1e9YD1mvTk"]} -{"Format": "Json", "ID": "96c605a4-2a50-4deb-9ab9-a25741012209", "DetectTime": "2023-10-30T14:14:44.268605+02:00", "EventTime": "2023-10-30T14:14:44.268620+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:15:05.549095+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:44.321422)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "721f6322-e917-4c66-82e1-61ff8e1546f8", "DetectTime": "2023-10-30T14:14:44.325465+02:00", "EventTime": "2023-10-30T14:14:44.325475+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CGGXwY11tJNDn7lWp2"]} -{"Format": "IDEA0", "ID": "8bda32f8-34f0-4009-82ab-ef4f6b3b1488", "DetectTime": "2023-10-30T14:14:44.349740+02:00", "EventTime": "2023-10-30T14:14:44.349760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CQdLh33QEEgYOtS6c1"]} -{"Format": "IDEA0", "ID": "1d90f830-c88f-4385-8d98-a63a9ce9d82d", "DetectTime": "2023-10-30T14:14:44.371364+02:00", "EventTime": "2023-10-30T14:14:44.371374+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["C3Za0W3NmGYAwkIQvc"]} -{"Format": "IDEA0", "ID": "c7742a8b-bfc7-4e52-a52e-8efd9e0f6a97", "DetectTime": "2023-10-30T14:14:44.392353+02:00", "EventTime": "2023-10-30T14:14:44.392366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cv54Lu32Dzi3YRJZv3"]} -{"Format": "IDEA0", "ID": "f5d24154-423a-4b3b-8b7f-f651f07e43c0", "DetectTime": "2023-10-30T14:14:44.412716+02:00", "EventTime": "2023-10-30T14:14:44.412726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C6GHgH28qQ1gMI0gM"]} -{"Format": "IDEA0", "ID": "4045d684-4eea-448d-aa45-7a73018855a7", "DetectTime": "2023-10-30T14:14:44.434612+02:00", "EventTime": "2023-10-30T14:14:44.434626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["COaJBd2TgBGr5QFws4"]} -{"Format": "IDEA0", "ID": "083c406a-0c8e-446d-bae9-4f900eb7a925", "DetectTime": "2023-10-30T14:14:44.461267+02:00", "EventTime": "2023-10-30T14:14:44.461282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEtEboaLVA8nDWmGc"]} -{"Format": "IDEA0", "ID": "1324ed99-651b-4b05-b631-5e717dd09710", "DetectTime": "2023-10-30T14:14:44.487039+02:00", "EventTime": "2023-10-30T14:14:44.487053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CPjWLQ2Go19DA4j7fe"]} -{"Format": "Json", "ID": "1324ed99-651b-4b05-b631-5e717dd09710", "DetectTime": "2023-10-30T14:14:44.487039+02:00", "EventTime": "2023-10-30T14:14:44.487053+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:45:22.598772+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:44.547831)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "680fe6ed-3c67-4873-ba29-36935370107f", "DetectTime": "2023-10-30T14:14:44.552823+02:00", "EventTime": "2023-10-30T14:14:44.552837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CLydLd4vpSQB7RT971"]} -{"Format": "IDEA0", "ID": "4afd77bb-bf96-4c8f-87be-fc4aaff35190", "DetectTime": "2023-10-30T14:14:44.577144+02:00", "EventTime": "2023-10-30T14:14:44.577159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CJCgBP2S8pygUACVAl"]} -{"Format": "IDEA0", "ID": "2db34fe5-17fe-4d05-b9da-e22d7467ff26", "DetectTime": "2023-10-30T14:14:44.600467+02:00", "EventTime": "2023-10-30T14:14:44.600477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cu8f3o3aeU9qwXEtxd"]} -{"Format": "IDEA0", "ID": "2bbeb4b1-4ed6-40eb-87dd-4cd0a4d6cc8f", "DetectTime": "2023-10-30T14:14:44.618039+02:00", "EventTime": "2023-10-30T14:14:44.618050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["Cjm1ynuQW0j2biSA"]} -{"Format": "IDEA0", "ID": "ccc7950b-b586-40ad-ab17-ae21dc30c9b6", "DetectTime": "2023-10-30T14:14:44.635915+02:00", "EventTime": "2023-10-30T14:14:44.635926+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CU56pS198ZK84XQ2El"]} -{"Format": "IDEA0", "ID": "bbdc46b9-bb12-4d66-bd2e-d9befb64a1b2", "DetectTime": "2023-10-30T14:14:44.652143+02:00", "EventTime": "2023-10-30T14:14:44.652153+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJ9B5a1FWidIS2oLWi"]} -{"Format": "IDEA0", "ID": "99f0ecb5-52e2-4595-82c1-fb20f423542b", "DetectTime": "2023-10-30T14:14:44.667886+02:00", "EventTime": "2023-10-30T14:14:44.667896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["COIYmB3iebdSxgvK4a"]} -{"Format": "IDEA0", "ID": "a0aee1eb-4a08-4b68-b4cb-cfe3990c66bb", "DetectTime": "2023-10-30T14:14:44.684793+02:00", "EventTime": "2023-10-30T14:14:44.684803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C0Od672iLSEFoEKvX"]} -{"Format": "Json", "ID": "a0aee1eb-4a08-4b68-b4cb-cfe3990c66bb", "DetectTime": "2023-10-30T14:14:44.684793+02:00", "EventTime": "2023-10-30T14:14:44.684803+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:45:24.462966+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:44.738875)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d66d2c6d-4b0f-48c7-b344-dea5957f2d0d", "DetectTime": "2023-10-30T14:14:44.742568+02:00", "EventTime": "2023-10-30T14:14:44.742579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Cot6x21c5bJXeZM0r5"]} -{"Format": "IDEA0", "ID": "a907ed2a-bb82-46f2-9aaa-55893fe25a45", "DetectTime": "2023-10-30T14:14:44.763999+02:00", "EventTime": "2023-10-30T14:14:44.764013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["ClJAOl4J4dKub1bDbf"]} -{"Format": "IDEA0", "ID": "f9036dcd-bb3f-4b45-aeee-28696471d1d9", "DetectTime": "2023-10-30T14:14:44.787073+02:00", "EventTime": "2023-10-30T14:14:44.787088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CZe4631lqDvlA2r91i"]} -{"Format": "IDEA0", "ID": "893ca722-3d23-45c5-a517-0c1bf1b6776b", "DetectTime": "2023-10-30T14:14:44.807154+02:00", "EventTime": "2023-10-30T14:14:44.807165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CKeKbP1szeK0F3o19h"]} -{"Format": "IDEA0", "ID": "1059beda-fe88-40aa-9c7d-cc3063a32947", "DetectTime": "2023-10-30T14:14:44.824061+02:00", "EventTime": "2023-10-30T14:14:44.824070+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CC3ILkfUrwrx2Gild"]} -{"Format": "IDEA0", "ID": "1c4a59f2-1d26-4b8e-bada-0cc7a5130285", "DetectTime": "2023-10-30T14:14:44.840409+02:00", "EventTime": "2023-10-30T14:14:44.840419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C7tMH4gQ9Uls6R6x1"]} -{"Format": "IDEA0", "ID": "b4b4be62-88e7-4609-8128-51292fa50885", "DetectTime": "2023-10-30T14:14:44.857605+02:00", "EventTime": "2023-10-30T14:14:44.857620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CNZT4q3HNNRhymVr02"]} -{"Format": "IDEA0", "ID": "b04ba7ee-c7dc-494c-b679-ea5dcf54974f", "DetectTime": "2023-10-30T14:14:44.874227+02:00", "EventTime": "2023-10-30T14:14:44.874240+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CdmK1r1aj4ZfIrDGs7"]} -{"Format": "Json", "ID": "b04ba7ee-c7dc-494c-b679-ea5dcf54974f", "DetectTime": "2023-10-30T14:14:44.874227+02:00", "EventTime": "2023-10-30T14:14:44.874240+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:45:26.579328+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:44.918524)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a64e71dc-c3d9-49b9-95aa-90df52d2d1c0", "DetectTime": "2023-10-30T14:14:44.922242+02:00", "EventTime": "2023-10-30T14:14:44.922253+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CVYFjQ2UUL0S3jkUK4"]} -{"Format": "IDEA0", "ID": "3b1a9555-c08b-49c0-8d1b-07a4fa8d3820", "DetectTime": "2023-10-30T14:14:44.939718+02:00", "EventTime": "2023-10-30T14:14:44.939729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CHykbR1oS0gOINMc8g"]} -{"Format": "IDEA0", "ID": "528e870b-6112-4936-88c6-e5213eae5caf", "DetectTime": "2023-10-30T14:14:44.954566+02:00", "EventTime": "2023-10-30T14:14:44.954577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CpDoFa2KB5OcJB1nvk"]} -{"Format": "IDEA0", "ID": "0bfdac14-ff7d-47c2-b674-8a6a6333f8d9", "DetectTime": "2023-10-30T14:14:44.968965+02:00", "EventTime": "2023-10-30T14:14:44.968975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CFfqeb2znJojiXsJbi"]} -{"Format": "IDEA0", "ID": "79650f1c-4d14-41e7-ab07-df6198920bb7", "DetectTime": "2023-10-30T14:14:44.983238+02:00", "EventTime": "2023-10-30T14:14:44.983248+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["ClekeVWKcGPic9qdh"]} -{"Format": "IDEA0", "ID": "82563243-d783-468f-83a9-d37825b306b9", "DetectTime": "2023-10-30T14:14:44.998800+02:00", "EventTime": "2023-10-30T14:14:44.998812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CnfnKWxhSnCZ9QYWi"]} -{"Format": "IDEA0", "ID": "4f796bb1-a135-4774-91c0-2da599a94824", "DetectTime": "2023-10-30T14:14:45.015000+02:00", "EventTime": "2023-10-30T14:14:45.015012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CTjE9m1D3JFMZiUJQl"]} -{"Format": "IDEA0", "ID": "e5486278-f8d5-4167-b1b3-a49b27dcc636", "DetectTime": "2023-10-30T14:14:45.031227+02:00", "EventTime": "2023-10-30T14:14:45.031241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CVjdxC4b3weOOHljr2"]} -{"Format": "Json", "ID": "e5486278-f8d5-4167-b1b3-a49b27dcc636", "DetectTime": "2023-10-30T14:14:45.031227+02:00", "EventTime": "2023-10-30T14:14:45.031241+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T21:45:28.543991+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 236. (real time 2023/10/30 14:14:45.078752)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "16b54442-4c78-47fc-ba69-bccb085d54f3", "DetectTime": "2023-10-30T14:14:45.083909+02:00", "EventTime": "2023-10-30T14:14:45.083925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CBZioc42JxTchWSSg9"]} -{"Format": "IDEA0", "ID": "de8497f7-a736-4b10-820c-6e1b5431b7ff", "DetectTime": "2023-10-30T14:14:45.101511+02:00", "EventTime": "2023-10-30T14:14:45.101527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["C4tfFD2sSGub1r28oh"]} -{"Format": "IDEA0", "ID": "54826f85-c1ef-4c2d-8891-99904d5c017e", "DetectTime": "2023-10-30T14:14:45.119736+02:00", "EventTime": "2023-10-30T14:14:45.119751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CmyEWe2fq84BtHkd8k"]} -{"Format": "IDEA0", "ID": "a0509cac-edf9-42e4-89b9-28e246660fc7", "DetectTime": "2023-10-30T14:14:45.137802+02:00", "EventTime": "2023-10-30T14:14:45.137816+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["Ch5DbD1zdAmkIONTza"]} -{"Format": "IDEA0", "ID": "b45ed9b2-6fd1-4821-b311-05376b98914f", "DetectTime": "2023-10-30T14:14:45.155508+02:00", "EventTime": "2023-10-30T14:14:45.155522+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CKyDXw44q9BXpySTbf"]} -{"Format": "IDEA0", "ID": "27f3164d-5d29-4a35-811f-c6db284bc01f", "DetectTime": "2023-10-30T14:14:45.172685+02:00", "EventTime": "2023-10-30T14:14:45.172699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cfi7G76knuRnxLyTj"]} -{"Format": "IDEA0", "ID": "acff7c78-5e41-4289-8d6c-314d61e6e202", "DetectTime": "2023-10-30T14:14:45.189937+02:00", "EventTime": "2023-10-30T14:14:45.189951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CGDGfvrBdHCVBxTHf"]} -{"Format": "IDEA0", "ID": "4f20e171-7caf-468f-a9f7-e9c95b5b5c87", "DetectTime": "2023-10-30T14:14:45.211922+02:00", "EventTime": "2023-10-30T14:14:45.211933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CYv0uudGFDIhMTrqf"]} -{"Format": "IDEA0", "ID": "ff7eb153-a78b-424b-b158-445138961c2b", "DetectTime": "2023-10-30T14:14:45.240571+02:00", "EventTime": "2023-10-30T14:14:45.240582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJ1j0n1jMqzZ1ZMBGl"]} -{"Format": "IDEA0", "ID": "2145e15c-239e-4a61-b1a4-6050253c2b86", "DetectTime": "2023-10-30T14:14:45.269307+02:00", "EventTime": "2023-10-30T14:14:45.269317+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CS9e7V2OL45Ua7MZSb"]} -{"Format": "IDEA0", "ID": "9529ba70-2d5e-4dad-9e03-89eb5dd4fc1e", "DetectTime": "2023-10-30T14:14:45.291767+02:00", "EventTime": "2023-10-30T14:14:45.291777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Crl3p83vsnmspzWnd5"]} -{"Format": "IDEA0", "ID": "b0936703-1923-4428-8c2e-bba636be3138", "DetectTime": "2023-10-30T14:14:45.313207+02:00", "EventTime": "2023-10-30T14:14:45.313221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CrrWfl4kzP4pXG9pWb"]} -{"Format": "IDEA0", "ID": "2f77d605-cc58-4800-9c97-955b13b58e5d", "DetectTime": "2023-10-30T14:14:45.337589+02:00", "EventTime": "2023-10-30T14:14:45.337599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CIQX8F45nCaoGJs5nf"]} -{"Format": "IDEA0", "ID": "51cf7731-bd52-4beb-a261-992072b0eef3", "DetectTime": "2023-10-30T14:14:45.359090+02:00", "EventTime": "2023-10-30T14:14:45.359101+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CfH2QHbYNeDDc7Id8"]} -{"Format": "IDEA0", "ID": "3d551c35-3d9f-4ca9-b793-63ffb162e856", "DetectTime": "2023-10-30T14:14:45.381115+02:00", "EventTime": "2023-10-30T14:14:45.381124+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CIPGYR1UceT15qs948"]} -{"Format": "Json", "ID": "3d551c35-3d9f-4ca9-b793-63ffb162e856", "DetectTime": "2023-10-30T14:14:45.381115+02:00", "EventTime": "2023-10-30T14:14:45.381124+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:15:43.792427+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:45.434712)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ff2318c3-6d51-425b-869c-9561eb267c75", "DetectTime": "2023-10-30T14:14:45.439645+02:00", "EventTime": "2023-10-30T14:14:45.439659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CQX9oN3ZO3vBYtBq8a"]} -{"Format": "IDEA0", "ID": "b7799c3a-01dc-4b9a-bdad-2733cfe64dc2", "DetectTime": "2023-10-30T14:14:45.472298+02:00", "EventTime": "2023-10-30T14:14:45.472312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CRwhhp1k2cvaIpHlaj"]} -{"Format": "IDEA0", "ID": "bda4f56f-1627-493b-9256-862a0e9ce65b", "DetectTime": "2023-10-30T14:14:45.503555+02:00", "EventTime": "2023-10-30T14:14:45.503569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C6rWoc1dmG5JexMAvk"]} -{"Format": "IDEA0", "ID": "6f63f4e1-da61-431f-8976-db24903ad1a9", "DetectTime": "2023-10-30T14:14:45.534099+02:00", "EventTime": "2023-10-30T14:14:45.534113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CLDUZI3LqQVHGp3SEh"]} -{"Format": "IDEA0", "ID": "39e00988-e9eb-4084-af39-0c4f0ae3f618", "DetectTime": "2023-10-30T14:14:45.557171+02:00", "EventTime": "2023-10-30T14:14:45.557181+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CX8hFV1WzvE21ie6fg"]} -{"Format": "IDEA0", "ID": "3b73f3bb-af08-4b4e-82e6-b08f32dbc907", "DetectTime": "2023-10-30T14:14:45.581873+02:00", "EventTime": "2023-10-30T14:14:45.581887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CIrljs13U6hALFf1c3"]} -{"Format": "IDEA0", "ID": "70df7f46-4039-4448-9075-6c284c9daf88", "DetectTime": "2023-10-30T14:14:45.611642+02:00", "EventTime": "2023-10-30T14:14:45.611656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Ces8XY1htqmf7t6exi"]} -{"Format": "IDEA0", "ID": "146fcb98-4f54-4dcc-a1d9-50e00338b89f", "DetectTime": "2023-10-30T14:14:45.641878+02:00", "EventTime": "2023-10-30T14:14:45.641894+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["Cemaiu15j0RGdKaMmf"]} -{"Format": "Json", "ID": "146fcb98-4f54-4dcc-a1d9-50e00338b89f", "DetectTime": "2023-10-30T14:14:45.641878+02:00", "EventTime": "2023-10-30T14:14:45.641894+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:15:45.902300+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:45.709636)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f798cc0c-a0e1-45e9-990a-cfcc826c9187", "DetectTime": "2023-10-30T14:14:45.715125+02:00", "EventTime": "2023-10-30T14:14:45.715140+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CO8NtT1DKwi1LaD4y6"]} -{"Format": "IDEA0", "ID": "0e5c4212-105b-4e26-a536-d00e3b26f2ae", "DetectTime": "2023-10-30T14:14:45.744708+02:00", "EventTime": "2023-10-30T14:14:45.744722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CJu0rz2cwVB9r0W8Uk"]} -{"Format": "IDEA0", "ID": "102d1958-7bf2-4924-9956-80fac1cc3983", "DetectTime": "2023-10-30T14:14:45.772094+02:00", "EventTime": "2023-10-30T14:14:45.772104+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CAHXYx147XDWfd5vY2"]} -{"Format": "IDEA0", "ID": "c0563d49-0aa0-411a-9c4d-55f6ec0e42ad", "DetectTime": "2023-10-30T14:14:45.795739+02:00", "EventTime": "2023-10-30T14:14:45.795756+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CfYomGwfC2xH90kG1"]} -{"Format": "IDEA0", "ID": "ec6e36de-7988-4005-a3bb-d3dc9cdebbe2", "DetectTime": "2023-10-30T14:14:45.818290+02:00", "EventTime": "2023-10-30T14:14:45.818308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["Ca3ECe4UY9Rj6u2oP8"]} -{"Format": "IDEA0", "ID": "b1fa5292-e7ec-4abc-8195-aca7b26b0849", "DetectTime": "2023-10-30T14:14:45.844493+02:00", "EventTime": "2023-10-30T14:14:45.844507+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cfsc9B2lcHLxx7WZSe"]} -{"Format": "IDEA0", "ID": "ac466821-a02b-4400-bf68-78b48867cf0b", "DetectTime": "2023-10-30T14:14:45.879581+02:00", "EventTime": "2023-10-30T14:14:45.879596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CBJFOO2RuewONbzpsl"]} -{"Format": "IDEA0", "ID": "ebefe135-36bc-41dc-a1f2-865ac88dd718", "DetectTime": "2023-10-30T14:14:45.902024+02:00", "EventTime": "2023-10-30T14:14:45.902033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["Cy9K0b2KKkAzESt3J7"]} -{"Format": "Json", "ID": "ebefe135-36bc-41dc-a1f2-865ac88dd718", "DetectTime": "2023-10-30T14:14:45.902024+02:00", "EventTime": "2023-10-30T14:14:45.902033+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:16:06.804336+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:45.953700)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a4e690b5-f8a5-495a-9aa0-c38e4babcbd4", "DetectTime": "2023-10-30T14:14:45.958914+02:00", "EventTime": "2023-10-30T14:14:45.958930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Cti9ik30JR7pfb1qXf"]} -{"Format": "IDEA0", "ID": "f457a328-2839-4f0b-87e1-c8117a0821ca", "DetectTime": "2023-10-30T14:14:45.985513+02:00", "EventTime": "2023-10-30T14:14:45.985527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CqkQzb3JhXIhVcx915"]} -{"Format": "IDEA0", "ID": "e2516c9e-fa74-464c-a0eb-39f0b2641120", "DetectTime": "2023-10-30T14:14:46.007914+02:00", "EventTime": "2023-10-30T14:14:46.007930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["C4Rj4I1iEtnvbvuxTl"]} -{"Format": "IDEA0", "ID": "e33eb5cc-b64f-4525-a0e0-c9a8ad768b00", "DetectTime": "2023-10-30T14:14:46.031816+02:00", "EventTime": "2023-10-30T14:14:46.031838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["C9zQdDIfKA08sMFWc"]} -{"Format": "IDEA0", "ID": "ca6f7c1f-890f-4f17-8010-cb3cc7663212", "DetectTime": "2023-10-30T14:14:46.056440+02:00", "EventTime": "2023-10-30T14:14:46.056454+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CNtT1V2UrnFYn4jVoa"]} -{"Format": "IDEA0", "ID": "406dc68c-ed9b-4808-81a8-a616d0ceba12", "DetectTime": "2023-10-30T14:14:46.073694+02:00", "EventTime": "2023-10-30T14:14:46.073712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CHTH2P23DJbuCV8Cr5"]} -{"Format": "IDEA0", "ID": "c20c1c75-d498-41ea-adb5-7f52fcd6e853", "DetectTime": "2023-10-30T14:14:46.093375+02:00", "EventTime": "2023-10-30T14:14:46.093388+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CX3x9r3enyYzFG6Hnb"]} -{"Format": "IDEA0", "ID": "a80fdaf1-83ea-4a88-9e6f-6b934523a049", "DetectTime": "2023-10-30T14:14:46.118529+02:00", "EventTime": "2023-10-30T14:14:46.118538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Ce6WaZQ7YAf1EK2of"]} -{"Format": "IDEA0", "ID": "726e47e2-38cb-4c33-9f8c-fd1d9aff1bcc", "DetectTime": "2023-10-30T14:14:46.142241+02:00", "EventTime": "2023-10-30T14:14:46.142251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CjYecYeOBZskW3bLa"]} -{"Format": "Json", "ID": "726e47e2-38cb-4c33-9f8c-fd1d9aff1bcc", "DetectTime": "2023-10-30T14:14:46.142241+02:00", "EventTime": "2023-10-30T14:14:46.142251+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:46:10.132350+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:46.197023)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c633df19-1327-4327-b5b5-dda6c3df6d1c", "DetectTime": "2023-10-30T14:14:46.202086+02:00", "EventTime": "2023-10-30T14:14:46.202102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CbvRCY30dqjinOQVWj"]} -{"Format": "IDEA0", "ID": "153504d1-3eba-4922-8d2e-43601337c69e", "DetectTime": "2023-10-30T14:14:46.225913+02:00", "EventTime": "2023-10-30T14:14:46.225927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CZOAlT2bIXQIB2Kfr5"]} -{"Format": "IDEA0", "ID": "b9984400-c3e8-483d-8339-e2973d6cd161", "DetectTime": "2023-10-30T14:14:46.248766+02:00", "EventTime": "2023-10-30T14:14:46.248781+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CaLr0r2vizHhjD3H29"]} -{"Format": "IDEA0", "ID": "29180733-c32e-4b17-bada-8cf9280d9c39", "DetectTime": "2023-10-30T14:14:46.273192+02:00", "EventTime": "2023-10-30T14:14:46.273207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CWqk372HoxZI6cK1j4"]} -{"Format": "IDEA0", "ID": "d33d12af-65b6-4e3b-ba6d-d87ade9a9dde", "DetectTime": "2023-10-30T14:14:46.293111+02:00", "EventTime": "2023-10-30T14:14:46.293123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CIFb2z3kTnCe9La0L9"]} -{"Format": "IDEA0", "ID": "e9465c06-fa4a-4464-8fce-8dc6363f7e9f", "DetectTime": "2023-10-30T14:14:46.311863+02:00", "EventTime": "2023-10-30T14:14:46.311877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C9sn473pLv5TS6QpF5"]} -{"Format": "IDEA0", "ID": "c1b443de-9ff3-4ef4-a6a6-f65ee85df540", "DetectTime": "2023-10-30T14:14:46.335898+02:00", "EventTime": "2023-10-30T14:14:46.335912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CY2QlP3CRoprsM0L5h"]} -{"Format": "IDEA0", "ID": "3cdd01d1-c801-4a7f-ae2f-6e1156a25640", "DetectTime": "2023-10-30T14:14:46.358855+02:00", "EventTime": "2023-10-30T14:14:46.358865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Ckk0IXyZBd5PXEPxl"]} -{"Format": "Json", "ID": "3cdd01d1-c801-4a7f-ae2f-6e1156a25640", "DetectTime": "2023-10-30T14:14:46.358855+02:00", "EventTime": "2023-10-30T14:14:46.358865+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:46:12.140815+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:46.410863)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cf0a95ce-0211-4f7e-abea-9e61a945922c", "DetectTime": "2023-10-30T14:14:46.414761+02:00", "EventTime": "2023-10-30T14:14:46.414774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CR4TDK1U8pnRt0bE51"]} -{"Format": "IDEA0", "ID": "bdca4502-3f4f-4e1c-b632-92bddd049f60", "DetectTime": "2023-10-30T14:14:46.431175+02:00", "EventTime": "2023-10-30T14:14:46.431185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C6GOTQ1bIwnmp70oBa"]} -{"Format": "IDEA0", "ID": "76910f62-ff95-40e9-a86d-7dd9061585ea", "DetectTime": "2023-10-30T14:14:46.447585+02:00", "EventTime": "2023-10-30T14:14:46.447596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C8p9vi2YlGg4Erw4D9"]} -{"Format": "IDEA0", "ID": "163e7c8c-aae6-4eb1-9a1f-57e5c077ed81", "DetectTime": "2023-10-30T14:14:46.462994+02:00", "EventTime": "2023-10-30T14:14:46.463004+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CuSF0fgNqvJBKHM9g"]} -{"Format": "IDEA0", "ID": "088f44ef-b9ec-4238-bcac-31df070fd0c9", "DetectTime": "2023-10-30T14:14:46.481155+02:00", "EventTime": "2023-10-30T14:14:46.481167+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CPn9aE1swZfANee105"]} -{"Format": "IDEA0", "ID": "679eec8f-627c-4a4d-b34f-cbcd1cef24a2", "DetectTime": "2023-10-30T14:14:46.498431+02:00", "EventTime": "2023-10-30T14:14:46.498440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CEWlKK1dAF91rTRiOb"]} -{"Format": "IDEA0", "ID": "cd50693d-887f-43dc-8ec3-5f43dbeca9bb", "DetectTime": "2023-10-30T14:14:46.515158+02:00", "EventTime": "2023-10-30T14:14:46.515168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C4CXIB4tVKDEeZ5gQa"]} -{"Format": "IDEA0", "ID": "d0003b71-8375-425a-806d-8f4a947e1535", "DetectTime": "2023-10-30T14:14:46.532099+02:00", "EventTime": "2023-10-30T14:14:46.532109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CKmUzteeUiMWG9qo9"]} -{"Format": "Json", "ID": "d0003b71-8375-425a-806d-8f4a947e1535", "DetectTime": "2023-10-30T14:14:46.532099+02:00", "EventTime": "2023-10-30T14:14:46.532109+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:46:14.240768+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:46.585690)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f37faf56-a971-4ef3-b90e-878c602eeb90", "DetectTime": "2023-10-30T14:14:46.589556+02:00", "EventTime": "2023-10-30T14:14:46.589566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CT5IJ32Int6dJ2vpxj"]} -{"Format": "IDEA0", "ID": "0a49f376-06cf-496f-b0b2-229a27542f81", "DetectTime": "2023-10-30T14:14:46.605346+02:00", "EventTime": "2023-10-30T14:14:46.605356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C4jCNu1onHHCBn5pWj"]} -{"Format": "IDEA0", "ID": "e164b19a-c88d-47c4-9ae2-a2da00c039f9", "DetectTime": "2023-10-30T14:14:46.622552+02:00", "EventTime": "2023-10-30T14:14:46.622566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CTy6AG2VCMtIPibEh9"]} -{"Format": "IDEA0", "ID": "1b11be50-dd35-49bf-b0d7-5ecd0aeceb0d", "DetectTime": "2023-10-30T14:14:46.637854+02:00", "EventTime": "2023-10-30T14:14:46.637863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CbYP8hcoozhMIcPj"]} -{"Format": "IDEA0", "ID": "fbaf6067-900c-4620-be49-98ef72bd9415", "DetectTime": "2023-10-30T14:14:46.652849+02:00", "EventTime": "2023-10-30T14:14:46.652858+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CH6WB41nOrltNjjBn7"]} -{"Format": "IDEA0", "ID": "4b9bdda8-9c67-40db-a99c-184393d74fbc", "DetectTime": "2023-10-30T14:14:46.667330+02:00", "EventTime": "2023-10-30T14:14:46.667340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CLiKNlWb3kOwrmSnc"]} -{"Format": "IDEA0", "ID": "42d69772-ad46-4919-b43f-f135b8afb80a", "DetectTime": "2023-10-30T14:14:46.683080+02:00", "EventTime": "2023-10-30T14:14:46.683092+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CnUIfl2F42QBumrwjg"]} -{"Format": "IDEA0", "ID": "0468c095-b117-4975-a56e-35f19c3c8c25", "DetectTime": "2023-10-30T14:14:46.697150+02:00", "EventTime": "2023-10-30T14:14:46.697159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CCI9lM3Dajqx9U0e8g"]} -{"Format": "IDEA0", "ID": "cb26c231-2e50-40b2-943b-9e8e86844a84", "DetectTime": "2023-10-30T14:14:46.714040+02:00", "EventTime": "2023-10-30T14:14:46.714050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CcgIhUw7e8ohcQNv5"]} -{"Format": "Json", "ID": "cb26c231-2e50-40b2-943b-9e8e86844a84", "DetectTime": "2023-10-30T14:14:46.714040+02:00", "EventTime": "2023-10-30T14:14:46.714050+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T22:46:16.116541+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 237. (real time 2023/10/30 14:14:46.757377)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "e0cbee6a-0306-44f6-a7b8-c1e84e9cc856", "DetectTime": "2023-10-30T14:14:46.760993+02:00", "EventTime": "2023-10-30T14:14:46.761003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CIVRHp11Fg0MELsC4d"]} -{"Format": "IDEA0", "ID": "9d75e988-e5b0-4d58-a64f-61b6d57541d2", "DetectTime": "2023-10-30T14:14:46.773554+02:00", "EventTime": "2023-10-30T14:14:46.773564+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CyEEzP3ehEUlPsRMD5"]} -{"Format": "IDEA0", "ID": "465d8bae-d366-4940-8ad3-788ed602ed1e", "DetectTime": "2023-10-30T14:14:46.786619+02:00", "EventTime": "2023-10-30T14:14:46.786629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CmB3ve2Bo3doVl6RNl"]} -{"Format": "IDEA0", "ID": "f1b89e52-8b2b-497a-a1cd-fd4a61dd869d", "DetectTime": "2023-10-30T14:14:46.805291+02:00", "EventTime": "2023-10-30T14:14:46.805307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CgKkmt2TwlBCzmHu8"]} -{"Format": "IDEA0", "ID": "84b58e9a-9a78-47cb-9581-0636249cd6a0", "DetectTime": "2023-10-30T14:14:46.824792+02:00", "EventTime": "2023-10-30T14:14:46.824806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CwHFcgzCpBaSWNIkk"]} -{"Format": "IDEA0", "ID": "c1e74fa3-4b60-4337-934f-3640064795bd", "DetectTime": "2023-10-30T14:14:46.849901+02:00", "EventTime": "2023-10-30T14:14:46.849915+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTaOFP195C9hd7quEc"]} -{"Format": "IDEA0", "ID": "be2d406f-7d99-47d6-9533-115c5c17e5a7", "DetectTime": "2023-10-30T14:14:46.868489+02:00", "EventTime": "2023-10-30T14:14:46.868502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CMgcQF1TXFjb8VSmq5"]} -{"Format": "IDEA0", "ID": "661e3890-b13e-4d2c-888c-522acd249c01", "DetectTime": "2023-10-30T14:14:46.891037+02:00", "EventTime": "2023-10-30T14:14:46.891048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CBn1yynbp7OUOKrwg"]} -{"Format": "IDEA0", "ID": "43218f99-6642-48d0-aa39-e7c2238cabe3", "DetectTime": "2023-10-30T14:14:46.921512+02:00", "EventTime": "2023-10-30T14:14:46.921521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cc91im2IbFnzhfw9el"]} -{"Format": "IDEA0", "ID": "c3def8b2-d193-40df-92f3-a226e665ad9c", "DetectTime": "2023-10-30T14:14:46.938957+02:00", "EventTime": "2023-10-30T14:14:46.938967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CJoDWf2bLm6xSOpuuf"]} -{"Format": "IDEA0", "ID": "77df6366-46dc-4a44-b78a-3243ec2d7e0d", "DetectTime": "2023-10-30T14:14:46.968418+02:00", "EventTime": "2023-10-30T14:14:46.968430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CEsQbGHeEivJ2BV9"]} -{"Format": "IDEA0", "ID": "c8e4599f-4129-4e15-9d29-8d35671d65ca", "DetectTime": "2023-10-30T14:14:46.987315+02:00", "EventTime": "2023-10-30T14:14:46.987325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CdR4If4rRAl6KCpUyh"]} -{"Format": "IDEA0", "ID": "02e94857-7240-4b5d-9b6b-e38e4656d03a", "DetectTime": "2023-10-30T14:14:47.024827+02:00", "EventTime": "2023-10-30T14:14:47.024841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CLU7Hd1d98VMIXIcua"]} -{"Format": "IDEA0", "ID": "90f33a93-1ada-4db7-b8e8-8da17b934d76", "DetectTime": "2023-10-30T14:14:47.066271+02:00", "EventTime": "2023-10-30T14:14:47.066287+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CghsCverHPhVmkIAe"]} -{"Format": "IDEA0", "ID": "10488f94-929b-469f-93cd-a4c183781ce2", "DetectTime": "2023-10-30T14:14:47.084543+02:00", "EventTime": "2023-10-30T14:14:47.084553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C5WRfM2PG1vQGcKUvh"]} -{"Format": "IDEA0", "ID": "88219f23-918d-4dc8-a5c2-50a8fbfec944", "DetectTime": "2023-10-30T14:14:47.112107+02:00", "EventTime": "2023-10-30T14:14:47.112119+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CjZP1v3SkK9WYVJQBa"]} -{"Format": "IDEA0", "ID": "a126a972-cdc2-4dd6-b926-91c2d9f9f08b", "DetectTime": "2023-10-30T14:14:47.129572+02:00", "EventTime": "2023-10-30T14:14:47.129587+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CROoZm4vS7ZXZKmnUi"]} -{"Format": "IDEA0", "ID": "50fa9206-28ef-4023-b52c-ba14f69bda5a", "DetectTime": "2023-10-30T14:14:47.147889+02:00", "EventTime": "2023-10-30T14:14:47.147898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCE0DE3VJbab4FlYye"]} -{"Format": "IDEA0", "ID": "659bbbca-4096-4e63-849b-56d50c0f7288", "DetectTime": "2023-10-30T14:14:47.177973+02:00", "EventTime": "2023-10-30T14:14:47.177983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CrDdqe1rklzoWr0Bc2"]} -{"Format": "IDEA0", "ID": "a22f48e6-f9e7-44a1-97ba-17bd0014222c", "DetectTime": "2023-10-30T14:14:47.195565+02:00", "EventTime": "2023-10-30T14:14:47.195574+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C0BFfXfZl9eor69Ti"]} -{"Format": "IDEA0", "ID": "44db3cc9-b3d2-43d3-9d99-9deb0abaa3cf", "DetectTime": "2023-10-30T14:14:47.234565+02:00", "EventTime": "2023-10-30T14:14:47.234579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CcBRMF3Nob0hIJdTP1"]} -{"Format": "IDEA0", "ID": "bf79981a-7f98-46e7-9007-0d5d9cb720f8", "DetectTime": "2023-10-30T14:14:47.259200+02:00", "EventTime": "2023-10-30T14:14:47.259214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C2qdNvhXlGmxe9oyg"]} -{"Format": "Json", "ID": "bf79981a-7f98-46e7-9007-0d5d9cb720f8", "DetectTime": "2023-10-30T14:14:47.259200+02:00", "EventTime": "2023-10-30T14:14:47.259214+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:16:43.124879+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:47.333321)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a6b236a9-5712-46b7-8324-c6fd3c432855", "DetectTime": "2023-10-30T14:14:47.336993+02:00", "EventTime": "2023-10-30T14:14:47.337002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CEPDH34OCgcUowPxYi"]} -{"Format": "IDEA0", "ID": "b7c55ac2-2ffe-4333-87c8-19a46df185f0", "DetectTime": "2023-10-30T14:14:47.356079+02:00", "EventTime": "2023-10-30T14:14:47.356090+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CgW0pa2vSqlUyZbMK9"]} -{"Format": "IDEA0", "ID": "680319fd-3d40-47d8-be95-12f88c1937fd", "DetectTime": "2023-10-30T14:14:47.382973+02:00", "EventTime": "2023-10-30T14:14:47.382983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CuOIO54a6BeLbtvjU6"]} -{"Format": "IDEA0", "ID": "0f253882-ce55-4795-8ced-83ed9e0cf65e", "DetectTime": "2023-10-30T14:14:47.400073+02:00", "EventTime": "2023-10-30T14:14:47.400083+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CnA8BD1WtBByEOD658"]} -{"Format": "IDEA0", "ID": "fcd58050-737b-462f-9eee-4f7e7f222e35", "DetectTime": "2023-10-30T14:14:47.418469+02:00", "EventTime": "2023-10-30T14:14:47.418479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CRib7Z34KcGAQGupsc"]} -{"Format": "IDEA0", "ID": "294c0359-8e15-4d79-afbd-5e2205dad58c", "DetectTime": "2023-10-30T14:14:47.445416+02:00", "EventTime": "2023-10-30T14:14:47.445426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CCabKcRPy0pFeyAzl"]} -{"Format": "IDEA0", "ID": "4ebdfd1c-3c63-4578-8313-7b43424135a0", "DetectTime": "2023-10-30T14:14:47.463043+02:00", "EventTime": "2023-10-30T14:14:47.463053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CDXbGT3iSAYItY9Xu5"]} -{"Format": "IDEA0", "ID": "d6f231a3-2419-4e5d-8091-fa5111e8bda0", "DetectTime": "2023-10-30T14:14:47.480852+02:00", "EventTime": "2023-10-30T14:14:47.480862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CrRktB46i6mBMrvTV4"]} -{"Format": "IDEA0", "ID": "aac925e8-f446-4576-867e-513fbe8d9e80", "DetectTime": "2023-10-30T14:14:47.506910+02:00", "EventTime": "2023-10-30T14:14:47.506921+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CHoR4s1nqRpKfoHMs2"]} -{"Format": "IDEA0", "ID": "6bf0a99b-e355-4561-8532-f697d24a6cfc", "DetectTime": "2023-10-30T14:14:47.524884+02:00", "EventTime": "2023-10-30T14:14:47.524893+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CO10G11Hdv3Y70WGw2"]} -{"Format": "IDEA0", "ID": "34ed6856-be66-4f4e-aa84-4350901075d8", "DetectTime": "2023-10-30T14:14:47.543323+02:00", "EventTime": "2023-10-30T14:14:47.543333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CAOQGJ2jdeHlpKFlMa"]} -{"Format": "IDEA0", "ID": "022fc906-39cc-461b-8790-9fff77ce3149", "DetectTime": "2023-10-30T14:14:47.572988+02:00", "EventTime": "2023-10-30T14:14:47.573003+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["C23TAO2jMaVdHg6Usd"]} -{"Format": "IDEA0", "ID": "9a432ac4-731a-43ef-8806-114b8a20ad5f", "DetectTime": "2023-10-30T14:14:47.596198+02:00", "EventTime": "2023-10-30T14:14:47.596207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CspaFaUEuhidWtPzc"]} -{"Format": "IDEA0", "ID": "0aea5f57-a7db-409f-aaae-9eafa0f0cdce", "DetectTime": "2023-10-30T14:14:47.625014+02:00", "EventTime": "2023-10-30T14:14:47.625024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CsqJAS3ITadmL7BMK5"]} -{"Format": "IDEA0", "ID": "d88e8e34-827d-41d3-bc28-640d4e7783f6", "DetectTime": "2023-10-30T14:14:47.642152+02:00", "EventTime": "2023-10-30T14:14:47.642162+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["C52zFW3AzzaQ7Rpq5"]} -{"Format": "IDEA0", "ID": "c9c2fb56-c1ae-48da-809d-b73602b9dec7", "DetectTime": "2023-10-30T14:14:47.659544+02:00", "EventTime": "2023-10-30T14:14:47.659553+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Cqqqfr1uXhr5uLROaj"]} -{"Format": "IDEA0", "ID": "0979c47c-e30e-4765-afe3-a8b732997dc5", "DetectTime": "2023-10-30T14:14:47.687783+02:00", "EventTime": "2023-10-30T14:14:47.687793+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C4lrsN122EwJOv9Vt"]} -{"Format": "IDEA0", "ID": "b58e1682-043c-4989-af3e-e57cb7a9979a", "DetectTime": "2023-10-30T14:14:47.706254+02:00", "EventTime": "2023-10-30T14:14:47.706265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CTP5mT1Q8brD2HJ9M6"]} -{"Format": "IDEA0", "ID": "703d6ef1-34a6-4e9c-80d6-0f7104f4a18e", "DetectTime": "2023-10-30T14:14:47.724084+02:00", "EventTime": "2023-10-30T14:14:47.724093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CSYt163SyH24jgX9p3"]} -{"Format": "IDEA0", "ID": "29e813f2-cc76-4419-91d9-8e6625c4e1ad", "DetectTime": "2023-10-30T14:14:47.751598+02:00", "EventTime": "2023-10-30T14:14:47.751608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CvFQQu4tW3taH0Droj"]} -{"Format": "IDEA0", "ID": "835b8e0c-c5d1-471c-a9a2-d3c8adde9362", "DetectTime": "2023-10-30T14:14:47.763787+02:00", "EventTime": "2023-10-30T14:14:47.763797+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CTxlkIixZmIis9az9"]} -{"Format": "IDEA0", "ID": "095f54ae-16eb-4a05-ac59-11704fc1eba1", "DetectTime": "2023-10-30T14:14:47.775736+02:00", "EventTime": "2023-10-30T14:14:47.775745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CmrQWh3LzXaKQPota7"]} -{"Format": "IDEA0", "ID": "84eb49ac-28d3-444f-85da-dd5fc799b65b", "DetectTime": "2023-10-30T14:14:47.788088+02:00", "EventTime": "2023-10-30T14:14:47.788098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiV0iD4V3CFDO9TBWe"]} -{"Format": "IDEA0", "ID": "8f960feb-c4f2-42a0-8609-b73034192e60", "DetectTime": "2023-10-30T14:14:47.804586+02:00", "EventTime": "2023-10-30T14:14:47.804600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CBtgqV4dHuQX1Zwa4"]} -{"Format": "IDEA0", "ID": "4b7093fd-cb20-4e58-8979-7be02e612b3e", "DetectTime": "2023-10-30T14:14:47.822937+02:00", "EventTime": "2023-10-30T14:14:47.822952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C7Mvge9ob8votTspf"]} -{"Format": "IDEA0", "ID": "78e28f9b-037b-4939-94c7-931baa21ac0d", "DetectTime": "2023-10-30T14:14:47.840978+02:00", "EventTime": "2023-10-30T14:14:47.840989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CZnCNY1hUSJiqcwzA9"]} -{"Format": "IDEA0", "ID": "162a924d-f1be-47ff-8485-9c89ab196c70", "DetectTime": "2023-10-30T14:14:47.858314+02:00", "EventTime": "2023-10-30T14:14:47.858325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C7Oz5wZhgFGIJRjh1"]} -{"Format": "IDEA0", "ID": "3c2ec78c-1024-46cf-843e-c1763eef4bdc", "DetectTime": "2023-10-30T14:14:47.872397+02:00", "EventTime": "2023-10-30T14:14:47.872407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C5ECNF1qeSfJvjlYF5"]} -{"Format": "IDEA0", "ID": "67f7c4b1-ea66-4e6f-b987-95329e2e0272", "DetectTime": "2023-10-30T14:14:47.885824+02:00", "EventTime": "2023-10-30T14:14:47.885834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CYxTSH1HJCAUBYaNCk"]} -{"Format": "Json", "ID": "67f7c4b1-ea66-4e6f-b987-95329e2e0272", "DetectTime": "2023-10-30T14:14:47.885824+02:00", "EventTime": "2023-10-30T14:14:47.885834+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:16:45.174679+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:47.951948)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa5d7232-f706-4916-ae29-d98d9d65f356", "DetectTime": "2023-10-30T14:14:47.955861+02:00", "EventTime": "2023-10-30T14:14:47.955871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CR40Xg35qI5soJO25l"]} -{"Format": "IDEA0", "ID": "9ceea969-910c-4051-8074-bb6b810a32a4", "DetectTime": "2023-10-30T14:14:47.968326+02:00", "EventTime": "2023-10-30T14:14:47.968337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CHC3BA1vkMdvQQDMid"]} -{"Format": "IDEA0", "ID": "49293493-e285-4fc4-8d79-b5cc67e7c604", "DetectTime": "2023-10-30T14:14:47.980810+02:00", "EventTime": "2023-10-30T14:14:47.980820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Ct2fyI3STKrkZ5suRj"]} -{"Format": "IDEA0", "ID": "500e990c-7c7a-4ecb-ae89-73dbe7f8248a", "DetectTime": "2023-10-30T14:14:47.993411+02:00", "EventTime": "2023-10-30T14:14:47.993420+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CGDpBm4mLbMSUxbFM8"]} -{"Format": "IDEA0", "ID": "bfbf7393-40b1-49d2-86b0-d53844ae4979", "DetectTime": "2023-10-30T14:14:48.007098+02:00", "EventTime": "2023-10-30T14:14:48.007110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CtjATK2knwdRMnQVN1"]} -{"Format": "IDEA0", "ID": "68444302-3b6b-429d-9bc3-b6425e7909c0", "DetectTime": "2023-10-30T14:14:48.021123+02:00", "EventTime": "2023-10-30T14:14:48.021132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C2TeF834Scfk3oEQS3"]} -{"Format": "IDEA0", "ID": "50de1e5e-a0a7-43b1-af45-4744cb2a5786", "DetectTime": "2023-10-30T14:14:48.034319+02:00", "EventTime": "2023-10-30T14:14:48.034328+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CakIik2Ude90auPufh"]} -{"Format": "IDEA0", "ID": "ebc9a474-2a47-4b60-9443-adc95b732a5a", "DetectTime": "2023-10-30T14:14:48.067816+02:00", "EventTime": "2023-10-30T14:14:48.067830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CahIXt1g9jsE4wEXw5"]} -{"Format": "IDEA0", "ID": "3bef73b1-d416-4883-bf45-8439d20fe8b7", "DetectTime": "2023-10-30T14:14:48.085086+02:00", "EventTime": "2023-10-30T14:14:48.085102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CgAs64im7vV6baxGi"]} -{"Format": "IDEA0", "ID": "6464924d-c11f-4b34-9fe8-333c8ad53bec", "DetectTime": "2023-10-30T14:14:48.100992+02:00", "EventTime": "2023-10-30T14:14:48.101002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C4lw3e3e6z2FjVGpci"]} -{"Format": "IDEA0", "ID": "b36fbfa3-f606-4335-af9b-d44ef4f2662a", "DetectTime": "2023-10-30T14:14:48.113215+02:00", "EventTime": "2023-10-30T14:14:48.113225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CdNcoZ3nX9NuPcqKA2"]} -{"Format": "IDEA0", "ID": "b3419010-688d-45d5-b8ea-e167963acfeb", "DetectTime": "2023-10-30T14:14:48.127241+02:00", "EventTime": "2023-10-30T14:14:48.127250+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Ctr0No2C3On1IOE0B6"]} -{"Format": "IDEA0", "ID": "0224d043-8826-4001-aba1-64b0159dfc42", "DetectTime": "2023-10-30T14:14:48.140605+02:00", "EventTime": "2023-10-30T14:14:48.140615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CYhwdNRRqyzAUtmf"]} -{"Format": "IDEA0", "ID": "bfb1a455-0a82-49fc-ac61-f0346764b5a0", "DetectTime": "2023-10-30T14:14:48.153709+02:00", "EventTime": "2023-10-30T14:14:48.153719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CNfQlh2P6ddUmLGt74"]} -{"Format": "IDEA0", "ID": "96e3c181-1763-4a2e-a394-63af4420e745", "DetectTime": "2023-10-30T14:14:48.170200+02:00", "EventTime": "2023-10-30T14:14:48.170215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CZ7dsA1GPgJMRUKiZ4"]} -{"Format": "IDEA0", "ID": "d6630120-7862-4761-a423-91238941c053", "DetectTime": "2023-10-30T14:14:48.188896+02:00", "EventTime": "2023-10-30T14:14:48.188910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CBElvBS0ZiXHcoO32"]} -{"Format": "IDEA0", "ID": "8548f8a4-ea7c-4754-a63e-0067a1f26acf", "DetectTime": "2023-10-30T14:14:48.207483+02:00", "EventTime": "2023-10-30T14:14:48.207497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CD5Tkv8y7K9OiRfA5"]} -{"Format": "IDEA0", "ID": "080b6d63-1342-49d2-9f94-f078be668f9b", "DetectTime": "2023-10-30T14:14:48.226129+02:00", "EventTime": "2023-10-30T14:14:48.226143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CulKU61LzkXQh47JWg"]} -{"Format": "IDEA0", "ID": "b1da25d0-9be9-449b-b181-813cffd1cc4c", "DetectTime": "2023-10-30T14:14:48.263708+02:00", "EventTime": "2023-10-30T14:14:48.263717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CiSllG3y2YkfC1fGM6"]} -{"Format": "IDEA0", "ID": "78ccea12-aba8-4691-ae4a-f485887973c7", "DetectTime": "2023-10-30T14:14:48.276986+02:00", "EventTime": "2023-10-30T14:14:48.276996+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["C8qh4GKxq33WIUGli"]} -{"Format": "IDEA0", "ID": "4ec82bc7-05bb-4294-89e2-d7692a27172f", "DetectTime": "2023-10-30T14:14:48.291140+02:00", "EventTime": "2023-10-30T14:14:48.291151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CJyJ9R2Z4UoaBxo0Ih"]} -{"Format": "IDEA0", "ID": "ff20c976-a276-44b3-b136-012248d60b29", "DetectTime": "2023-10-30T14:14:48.304557+02:00", "EventTime": "2023-10-30T14:14:48.304568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CCjVMX1i6JAIa7MDFk"]} -{"Format": "IDEA0", "ID": "e3cb4f84-83ed-4516-88f2-405f3e56e455", "DetectTime": "2023-10-30T14:14:48.317695+02:00", "EventTime": "2023-10-30T14:14:48.317705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CQqTH131m2sGN7d269"]} -{"Format": "IDEA0", "ID": "404303e8-38ab-4b13-8e8d-dae993f86d34", "DetectTime": "2023-10-30T14:14:48.329549+02:00", "EventTime": "2023-10-30T14:14:48.329559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C4fbHWbWVZKviqrLi"]} -{"Format": "IDEA0", "ID": "16a721a3-4808-4fb3-ba01-1291019aa551", "DetectTime": "2023-10-30T14:14:48.345854+02:00", "EventTime": "2023-10-30T14:14:48.345868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CsYazL1FiZWZt8jYL9"]} -{"Format": "IDEA0", "ID": "81f544a7-655d-4cec-ab6e-6496bad39a7a", "DetectTime": "2023-10-30T14:14:48.363003+02:00", "EventTime": "2023-10-30T14:14:48.363018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CUgL8C1MUydhJPsOt9"]} -{"Format": "IDEA0", "ID": "21b4ebdb-94e2-4a26-ab81-9ea21abae332", "DetectTime": "2023-10-30T14:14:48.379932+02:00", "EventTime": "2023-10-30T14:14:48.379946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CJGhFC4BhgXZOmTJMl"]} -{"Format": "IDEA0", "ID": "280f90c9-ea37-42c7-a31d-eae33829aa87", "DetectTime": "2023-10-30T14:14:48.397240+02:00", "EventTime": "2023-10-30T14:14:48.397255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CquwRdfdfjNel16Qh"]} -{"Format": "IDEA0", "ID": "df838133-33a6-4668-b7fb-2cd056fef415", "DetectTime": "2023-10-30T14:14:48.415154+02:00", "EventTime": "2023-10-30T14:14:48.415168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CbKDS620ueX0HB9281"]} -{"Format": "IDEA0", "ID": "8cce728f-fecb-4ffa-82b0-cd5ec52494f3", "DetectTime": "2023-10-30T14:14:48.432114+02:00", "EventTime": "2023-10-30T14:14:48.432126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CZWUgDNEcqnLykqqg"]} -{"Format": "IDEA0", "ID": "5cedae29-163a-47fc-a1d3-1b232ea29622", "DetectTime": "2023-10-30T14:14:48.462509+02:00", "EventTime": "2023-10-30T14:14:48.462520+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CxiYIB494xZwj5cwVa"]} -{"Format": "IDEA0", "ID": "c1a9c7dd-0481-4c68-82bf-e7c1facd0de0", "DetectTime": "2023-10-30T14:14:48.476441+02:00", "EventTime": "2023-10-30T14:14:48.476452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4otfw2N0E05jELwdd"]} -{"Format": "IDEA0", "ID": "1eb88737-637d-48bf-9e1e-15d19174f1b0", "DetectTime": "2023-10-30T14:14:48.491032+02:00", "EventTime": "2023-10-30T14:14:48.491042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CCw6dnYge67jGJmS4"]} -{"Format": "IDEA0", "ID": "227335a7-47f3-41a3-bb87-8a39ca20370b", "DetectTime": "2023-10-30T14:14:48.503437+02:00", "EventTime": "2023-10-30T14:14:48.503447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CsP9Fq1OIwoeFdaNgk"]} -{"Format": "IDEA0", "ID": "f623d097-5ba4-409d-bf4a-09dcbdebd7cb", "DetectTime": "2023-10-30T14:14:48.520013+02:00", "EventTime": "2023-10-30T14:14:48.520029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["ChTQgE1sTgDR3UBi17"]} -{"Format": "IDEA0", "ID": "232f1663-1afe-452e-bc77-db496d4bbcb7", "DetectTime": "2023-10-30T14:14:48.537280+02:00", "EventTime": "2023-10-30T14:14:48.537290+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C26yIktGRMqzBXPSf"]} -{"Format": "IDEA0", "ID": "7cc59845-4528-49f8-abeb-5b77a3e4de8c", "DetectTime": "2023-10-30T14:14:48.552744+02:00", "EventTime": "2023-10-30T14:14:48.552754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CJ2ErF4aksueP3zrv6"]} -{"Format": "IDEA0", "ID": "6977d0d7-4429-4a3b-86c5-cb063ec79ec9", "DetectTime": "2023-10-30T14:14:48.579468+02:00", "EventTime": "2023-10-30T14:14:48.579477+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C2TrGN152gK2CGyZm3"]} -{"Format": "IDEA0", "ID": "981707b1-4cf0-4d05-b44c-9dcff3ebf926", "DetectTime": "2023-10-30T14:14:48.592567+02:00", "EventTime": "2023-10-30T14:14:48.592577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CmZEwD3FzkHtkBmzR"]} -{"Format": "IDEA0", "ID": "241781c9-4796-4ac0-8157-007161df1da7", "DetectTime": "2023-10-30T14:14:48.604979+02:00", "EventTime": "2023-10-30T14:14:48.604989+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cg6FYK38mApBpEIBMl"]} -{"Format": "IDEA0", "ID": "23ead180-06c9-4108-ac60-5d986acf995a", "DetectTime": "2023-10-30T14:14:48.618672+02:00", "EventTime": "2023-10-30T14:14:48.618683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C0p8zJ30FConbmHnda"]} -{"Format": "IDEA0", "ID": "61524322-e4c3-4b61-8738-4510a6c0f88d", "DetectTime": "2023-10-30T14:14:48.631956+02:00", "EventTime": "2023-10-30T14:14:48.631966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CH06al1Aej7fwoebOa"]} -{"Format": "IDEA0", "ID": "c8af5a7f-0d28-436b-a745-a5b845f683f7", "DetectTime": "2023-10-30T14:14:48.645213+02:00", "EventTime": "2023-10-30T14:14:48.645223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CXYnO729ASXy3TMeNf"]} -{"Format": "IDEA0", "ID": "3c6d4b3a-6b64-4b60-99a9-19222b0e302a", "DetectTime": "2023-10-30T14:14:48.658026+02:00", "EventTime": "2023-10-30T14:14:48.658036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CC4gmj1d37tECVhf93"]} -{"Format": "IDEA0", "ID": "7defb565-bccc-4cfb-bb13-e3f84bd8ac7a", "DetectTime": "2023-10-30T14:14:48.671311+02:00", "EventTime": "2023-10-30T14:14:48.671320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CVB4aI1yJl45w62ek"]} -{"Format": "IDEA0", "ID": "1c6e5169-0809-4245-9c60-6f5b7ef3d30a", "DetectTime": "2023-10-30T14:14:48.685179+02:00", "EventTime": "2023-10-30T14:14:48.685190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CUwMkV1O98rmbLTRya"]} -{"Format": "IDEA0", "ID": "19c9193d-1b1c-4df7-9ab9-306dc57d5254", "DetectTime": "2023-10-30T14:14:48.697587+02:00", "EventTime": "2023-10-30T14:14:48.697597+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CTUYjA3Bj8LkapCRj7"]} -{"Format": "IDEA0", "ID": "40eaf87b-06f8-43d3-8dac-88ce067f468b", "DetectTime": "2023-10-30T14:14:48.729387+02:00", "EventTime": "2023-10-30T14:14:48.729401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C9gL9wBxW3Ri23lS5"]} -{"Format": "IDEA0", "ID": "22844b68-8964-4377-9528-ad142f114f68", "DetectTime": "2023-10-30T14:14:48.742297+02:00", "EventTime": "2023-10-30T14:14:48.742308+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CLH6Bk3hbBtQtxm5ce"]} -{"Format": "IDEA0", "ID": "4d475067-3bad-440f-8534-7b289b835af0", "DetectTime": "2023-10-30T14:14:48.755495+02:00", "EventTime": "2023-10-30T14:14:48.755504+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CEGuG12qQT4lDUgio1"]} -{"Format": "IDEA0", "ID": "5168f37a-9c87-43ec-8923-3f7068fb630c", "DetectTime": "2023-10-30T14:14:48.769774+02:00", "EventTime": "2023-10-30T14:14:48.769785+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CO6Mr14ig8KobvkLt"]} -{"Format": "IDEA0", "ID": "bda3fd58-cfd6-4f62-9857-226a5742f2fc", "DetectTime": "2023-10-30T14:14:48.781589+02:00", "EventTime": "2023-10-30T14:14:48.781598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CWRxPk2LJXpZQUU356"]} -{"Format": "IDEA0", "ID": "cee285f0-c0d0-42ea-a400-026833800ef3", "DetectTime": "2023-10-30T14:14:48.793383+02:00", "EventTime": "2023-10-30T14:14:48.793394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C3tQoe3oXuBp2jRhsi"]} -{"Format": "IDEA0", "ID": "2d4ed9d0-31f1-4105-b66b-ba894618d333", "DetectTime": "2023-10-30T14:14:48.807710+02:00", "EventTime": "2023-10-30T14:14:48.807729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CkSJd26aU70nnech6"]} -{"Format": "IDEA0", "ID": "f8a552e1-f35e-4362-8cca-c039f36de36f", "DetectTime": "2023-10-30T14:14:48.827008+02:00", "EventTime": "2023-10-30T14:14:48.827022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C77MHY3YvTFrEtNTJa"]} -{"Format": "IDEA0", "ID": "67e0e6a3-3f6b-4c90-b78a-faf472806a69", "DetectTime": "2023-10-30T14:14:48.840840+02:00", "EventTime": "2023-10-30T14:14:48.840851+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CM85zt3n15m81Y3ZYb"]} -{"Format": "IDEA0", "ID": "450bdde0-e300-472b-a60a-bcef2f938c5b", "DetectTime": "2023-10-30T14:14:48.854948+02:00", "EventTime": "2023-10-30T14:14:48.854959+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CBArLa1mOYiEkL6d55"]} -{"Format": "IDEA0", "ID": "6a054b95-3663-4cdb-8c12-769944a22532", "DetectTime": "2023-10-30T14:14:48.891142+02:00", "EventTime": "2023-10-30T14:14:48.891157+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CRcMMk4h3POS4wiDKl"]} -{"Format": "IDEA0", "ID": "7de5a034-8ce9-42b9-93dd-7388b5b51bd1", "DetectTime": "2023-10-30T14:14:48.909497+02:00", "EventTime": "2023-10-30T14:14:48.909512+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CiOWPb3kXRvFrmZ7E8"]} -{"Format": "IDEA0", "ID": "bcd0d33d-7c4c-4e3b-9e60-4090cd045306", "DetectTime": "2023-10-30T14:14:48.927629+02:00", "EventTime": "2023-10-30T14:14:48.927643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CyBv6q30rou1hjxao2"]} -{"Format": "IDEA0", "ID": "644fbe6e-20cb-4f4d-81c5-434672abf6b4", "DetectTime": "2023-10-30T14:14:48.945954+02:00", "EventTime": "2023-10-30T14:14:48.945969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CMAui74A7ipMVf0MCc"]} -{"Format": "IDEA0", "ID": "15743e06-ee03-447b-8ae2-8fecec2819e4", "DetectTime": "2023-10-30T14:14:48.958985+02:00", "EventTime": "2023-10-30T14:14:48.959000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CBOqfh3skeEcYePuE6"]} -{"Format": "IDEA0", "ID": "dc4c1e68-9179-4c1c-8f7d-413cee454248", "DetectTime": "2023-10-30T14:14:48.977235+02:00", "EventTime": "2023-10-30T14:14:48.977251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CSu0KO3m51t2k0Zwh9"]} -{"Format": "IDEA0", "ID": "579c38eb-e59b-4cef-89a2-4ac329207a56", "DetectTime": "2023-10-30T14:14:48.996325+02:00", "EventTime": "2023-10-30T14:14:48.996339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CrrkMl2Dw300qvdEwj"]} -{"Format": "IDEA0", "ID": "55bffcf2-6cfd-43eb-916b-4f506eea87b6", "DetectTime": "2023-10-30T14:14:49.029032+02:00", "EventTime": "2023-10-30T14:14:49.029043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CZQLD611kYjG2E0sJj"]} -{"Format": "IDEA0", "ID": "6d9bf328-c215-4311-b7fe-6dfda300ab64", "DetectTime": "2023-10-30T14:14:49.042053+02:00", "EventTime": "2023-10-30T14:14:49.042063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CAfUAS9Vop7GmvOO9"]} -{"Format": "IDEA0", "ID": "8415405b-cd65-445e-bafc-3db5188ef39d", "DetectTime": "2023-10-30T14:14:49.057400+02:00", "EventTime": "2023-10-30T14:14:49.057425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CwQYtc35CBRHQH1rIj"]} -{"Format": "IDEA0", "ID": "515bf40e-ce5e-4b66-9143-6735adf1b8ff", "DetectTime": "2023-10-30T14:14:49.076355+02:00", "EventTime": "2023-10-30T14:14:49.076366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CeeFBa26OkOOAyG2wg"]} -{"Format": "IDEA0", "ID": "07d2f68c-6f94-429e-9199-b30e5866b002", "DetectTime": "2023-10-30T14:14:49.091027+02:00", "EventTime": "2023-10-30T14:14:49.091039+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C6VDHj4qN5DlVqpRe1"]} -{"Format": "Json", "ID": "07d2f68c-6f94-429e-9199-b30e5866b002", "DetectTime": "2023-10-30T14:14:49.091027+02:00", "EventTime": "2023-10-30T14:14:49.091039+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:16:47.204506+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:49.171750)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "93254e07-79e5-4ac6-957c-f6e1cf4f39a5", "DetectTime": "2023-10-30T14:14:49.175471+02:00", "EventTime": "2023-10-30T14:14:49.175482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CY0P402E8jeYdknrs2"]} -{"Format": "IDEA0", "ID": "afbdfc89-25fe-4ccc-9f68-d208a0db398c", "DetectTime": "2023-10-30T14:14:49.188414+02:00", "EventTime": "2023-10-30T14:14:49.188425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CiH9Wx2ZP0DuBKTqx4"]} -{"Format": "IDEA0", "ID": "83fb338c-f8d6-4747-8174-14fbdf79a3c5", "DetectTime": "2023-10-30T14:14:49.200373+02:00", "EventTime": "2023-10-30T14:14:49.200384+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CKevKc59yIYWIZgOh"]} -{"Format": "IDEA0", "ID": "8728f8e9-9116-418a-b9fe-88e96cc1c457", "DetectTime": "2023-10-30T14:14:49.225716+02:00", "EventTime": "2023-10-30T14:14:49.225725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CgeUiw13cq2KfEQak9"]} -{"Format": "IDEA0", "ID": "ee48100e-8c6e-4248-b4d4-1c5f56447ef7", "DetectTime": "2023-10-30T14:14:49.239595+02:00", "EventTime": "2023-10-30T14:14:49.239604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CfOu8y1KHQD87hUDtc"]} -{"Format": "IDEA0", "ID": "d8d45ad9-7358-499b-a029-a2ac6cfaf3cc", "DetectTime": "2023-10-30T14:14:49.266048+02:00", "EventTime": "2023-10-30T14:14:49.266058+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CuLsme11Tt6itvOlM6"]} -{"Format": "IDEA0", "ID": "d27eaa3c-e221-4a80-9b59-712150ac76c1", "DetectTime": "2023-10-30T14:14:49.280270+02:00", "EventTime": "2023-10-30T14:14:49.280280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["Cd5Tm5267WcF0bPob6"]} -{"Format": "IDEA0", "ID": "3428686f-8321-403b-8255-6faf7e6deb53", "DetectTime": "2023-10-30T14:14:49.295518+02:00", "EventTime": "2023-10-30T14:14:49.295528+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CtMHww4I2APJZThgd6"]} -{"Format": "IDEA0", "ID": "bbe2f56b-1a0f-4819-aee8-51579ebe3bbe", "DetectTime": "2023-10-30T14:14:49.311369+02:00", "EventTime": "2023-10-30T14:14:49.311380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CJuRxz4uAepN6Z0Sl1"]} -{"Format": "IDEA0", "ID": "0661093e-9a64-41eb-9d27-7c3603510eba", "DetectTime": "2023-10-30T14:14:49.330361+02:00", "EventTime": "2023-10-30T14:14:49.330378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CzF7Q833EuiEIkRii3"]} -{"Format": "IDEA0", "ID": "c79fcffd-c59f-41c8-a3bf-98382e3c3d37", "DetectTime": "2023-10-30T14:14:49.350536+02:00", "EventTime": "2023-10-30T14:14:49.350547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CNgRoGKcNh5rd0kef"]} -{"Format": "IDEA0", "ID": "96842963-44de-415d-86b5-9727f153778b", "DetectTime": "2023-10-30T14:14:49.364544+02:00", "EventTime": "2023-10-30T14:14:49.364555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CPzFK41OT5voJ4nv47"]} -{"Format": "IDEA0", "ID": "cece9525-c968-4c1e-85fb-7b4ac50fa45a", "DetectTime": "2023-10-30T14:14:49.378210+02:00", "EventTime": "2023-10-30T14:14:49.378220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C5FpJM1AJPR96AYwm9"]} -{"Format": "IDEA0", "ID": "caab8d0e-7864-4141-b10a-5bd90fde04a3", "DetectTime": "2023-10-30T14:14:49.402413+02:00", "EventTime": "2023-10-30T14:14:49.402422+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C00kO71XMRURFXvUFi"]} -{"Format": "IDEA0", "ID": "473a2505-f0f4-493f-8b77-c2ed3309ca3c", "DetectTime": "2023-10-30T14:14:49.415764+02:00", "EventTime": "2023-10-30T14:14:49.415774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cihd4Dsl32O6Mm5lg"]} -{"Format": "IDEA0", "ID": "c026a3d0-11a0-4e6e-8a80-568bbb46c39c", "DetectTime": "2023-10-30T14:14:49.430605+02:00", "EventTime": "2023-10-30T14:14:49.430614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CgYuip2DKuO9fRP8Jj"]} -{"Format": "IDEA0", "ID": "b333f70c-5957-46bc-97cd-f289f51d9813", "DetectTime": "2023-10-30T14:14:49.443416+02:00", "EventTime": "2023-10-30T14:14:49.443425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CdMzsl4Icospsp9ks3"]} -{"Format": "IDEA0", "ID": "9247ef6c-8125-436f-ac78-a326519e4788", "DetectTime": "2023-10-30T14:14:49.456197+02:00", "EventTime": "2023-10-30T14:14:49.456207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CzWEG63BzA84H7nthe"]} -{"Format": "IDEA0", "ID": "c2f9f153-25a0-4675-b716-4962358df29d", "DetectTime": "2023-10-30T14:14:49.471678+02:00", "EventTime": "2023-10-30T14:14:49.471697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CTHklA5lM4arfmLn8"]} -{"Format": "IDEA0", "ID": "187de498-a9ea-40b6-8dbe-eb33f89d9a56", "DetectTime": "2023-10-30T14:14:49.487361+02:00", "EventTime": "2023-10-30T14:14:49.487372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CZQJYM2o8ImlRCsqAl"]} -{"Format": "IDEA0", "ID": "1f9e8441-c34b-45e9-83f6-05031221be01", "DetectTime": "2023-10-30T14:14:49.502149+02:00", "EventTime": "2023-10-30T14:14:49.502160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C3o3js2HLhPjcNTg06"]} -{"Format": "IDEA0", "ID": "51b903b6-f83c-47ce-a94b-8b79576b2cca", "DetectTime": "2023-10-30T14:14:49.516458+02:00", "EventTime": "2023-10-30T14:14:49.516469+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C83rUA4hrwntUXPS4"]} -{"Format": "IDEA0", "ID": "201a4b33-2be8-43dc-b2a8-23656b4449d4", "DetectTime": "2023-10-30T14:14:49.534246+02:00", "EventTime": "2023-10-30T14:14:49.534261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CxmRuj1yjgwq2jrRQ1"]} -{"Format": "IDEA0", "ID": "28cb76fb-5095-4444-aa8b-d8483841c6ea", "DetectTime": "2023-10-30T14:14:49.571410+02:00", "EventTime": "2023-10-30T14:14:49.571421+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CN09Tao1MFnSQEFha"]} -{"Format": "IDEA0", "ID": "ba8ab677-07ab-4bf0-ada4-d90cbd285b42", "DetectTime": "2023-10-30T14:14:49.592146+02:00", "EventTime": "2023-10-30T14:14:49.592160+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cqim6WcklScwsTNJ2"]} -{"Format": "IDEA0", "ID": "57c7aa58-28d4-4fb0-a33e-ee42ee83c683", "DetectTime": "2023-10-30T14:14:49.611646+02:00", "EventTime": "2023-10-30T14:14:49.611659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CU2aVA32gMwrsPqrHh"]} -{"Format": "IDEA0", "ID": "9a6573ff-4969-48f5-916b-a875c3b3bda2", "DetectTime": "2023-10-30T14:14:49.630420+02:00", "EventTime": "2023-10-30T14:14:49.630436+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CZgiym1WkB6TQxRYL6"]} -{"Format": "IDEA0", "ID": "3a212458-b253-4e20-8352-51d4378066f6", "DetectTime": "2023-10-30T14:14:49.648663+02:00", "EventTime": "2023-10-30T14:14:49.648677+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CV6LXw4HaWIPl1qTr"]} -{"Format": "IDEA0", "ID": "b886d4e4-acbf-493f-942a-1a275391027a", "DetectTime": "2023-10-30T14:14:49.681266+02:00", "EventTime": "2023-10-30T14:14:49.681282+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.53.52.122 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C62UeQ3nk7u9D1EDW2"]} -{"Format": "IDEA0", "ID": "614626c2-1116-467f-bba9-c5a40a786a10", "DetectTime": "2023-10-30T14:14:49.705625+02:00", "EventTime": "2023-10-30T14:14:49.705640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CeWAYx1GgzFiW9Uhca"]} -{"Format": "IDEA0", "ID": "aec476c9-a5d3-47f0-8072-84541fbd984e", "DetectTime": "2023-10-30T14:14:49.726133+02:00", "EventTime": "2023-10-30T14:14:49.726148+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CR3K4klSsfdEQvepa"]} -{"Format": "IDEA0", "ID": "3a521ef3-82ef-4bff-bdbd-990c6b800a6f", "DetectTime": "2023-10-30T14:14:49.747315+02:00", "EventTime": "2023-10-30T14:14:49.747330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["C6VY1NCmqK75pbGTj"]} -{"Format": "IDEA0", "ID": "4a49d6c3-9cf0-4d16-bbf8-1a2b6e5999f5", "DetectTime": "2023-10-30T14:14:49.765574+02:00", "EventTime": "2023-10-30T14:14:49.765585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CcnOAc3sr4QAPPFZ29"]} -{"Format": "IDEA0", "ID": "4a1da26f-33ac-47cf-8831-92be01d1190c", "DetectTime": "2023-10-30T14:14:49.782842+02:00", "EventTime": "2023-10-30T14:14:49.782859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Cy6LjgUXk4bAvTtq4"]} -{"Format": "IDEA0", "ID": "1aca5afe-8558-4149-a21e-f7427fbd136f", "DetectTime": "2023-10-30T14:14:49.802216+02:00", "EventTime": "2023-10-30T14:14:49.802226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CGVIkt4GHiG5SufoX2"]} -{"Format": "IDEA0", "ID": "1a92b086-a1ac-4878-b529-c7a09b93e20c", "DetectTime": "2023-10-30T14:14:49.834251+02:00", "EventTime": "2023-10-30T14:14:49.834261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CmykDvJ1Bf803B1Bj"]} -{"Format": "IDEA0", "ID": "7f0f74b3-d95f-41d8-aa51-aacb5947c4fc", "DetectTime": "2023-10-30T14:14:49.848039+02:00", "EventTime": "2023-10-30T14:14:49.848049+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CUMpRy38vg2vupTqq5"]} -{"Format": "IDEA0", "ID": "c03c91e0-cef7-4837-8022-5ebe09dc3958", "DetectTime": "2023-10-30T14:14:49.861213+02:00", "EventTime": "2023-10-30T14:14:49.861224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CEf2punOy4m4oMFm2"]} -{"Format": "IDEA0", "ID": "93883f2d-29e0-4f83-9f6e-003d5def344f", "DetectTime": "2023-10-30T14:14:49.874285+02:00", "EventTime": "2023-10-30T14:14:49.874294+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["C0r4Rz1KtiEVvzWnfe"]} -{"Format": "IDEA0", "ID": "cd51c347-7638-4f84-b869-e1a61aa6adc5", "DetectTime": "2023-10-30T14:14:49.887036+02:00", "EventTime": "2023-10-30T14:14:49.887045+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CSx7sv1rRc4uK2zuX9"]} -{"Format": "IDEA0", "ID": "d1f3d0ad-bd3c-497a-b533-074e07171749", "DetectTime": "2023-10-30T14:14:49.900893+02:00", "EventTime": "2023-10-30T14:14:49.900904+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C7WAgg3lc5ID2sreik"]} -{"Format": "IDEA0", "ID": "a12bd859-5230-431f-8fae-ece83bd22e63", "DetectTime": "2023-10-30T14:14:49.913456+02:00", "EventTime": "2023-10-30T14:14:49.913467+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CgHZdt19XKT7hF58jf"]} -{"Format": "IDEA0", "ID": "da7f5213-b6cc-4736-83a5-443745f4c704", "DetectTime": "2023-10-30T14:14:49.926098+02:00", "EventTime": "2023-10-30T14:14:49.926108+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["Cjanl24CZfuDRcZD9"]} -{"Format": "IDEA0", "ID": "d2dd32a7-b579-40c6-b988-770774cb9114", "DetectTime": "2023-10-30T14:14:49.938761+02:00", "EventTime": "2023-10-30T14:14:49.938770+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["C5OIRX1EtgjJ5vsRlc"]} -{"Format": "IDEA0", "ID": "509adeab-6712-4489-b82e-51fb1401e27c", "DetectTime": "2023-10-30T14:14:49.952234+02:00", "EventTime": "2023-10-30T14:14:49.952246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CA8YK81jGvmeaJmPm3"]} -{"Format": "IDEA0", "ID": "3d60d075-8886-4bda-affc-83fd3da49f19", "DetectTime": "2023-10-30T14:14:49.977133+02:00", "EventTime": "2023-10-30T14:14:49.977144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CLLeci3W0xXvwFt6W4"]} -{"Format": "IDEA0", "ID": "0ba8e2ca-ebeb-4407-9f84-28c486b6aa22", "DetectTime": "2023-10-30T14:14:49.991257+02:00", "EventTime": "2023-10-30T14:14:49.991267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C1oUxs2IWzq9vkKC3"]} -{"Format": "IDEA0", "ID": "d1f8ea24-f8eb-4ee1-8a50-9d40c0bae2b9", "DetectTime": "2023-10-30T14:14:50.009290+02:00", "EventTime": "2023-10-30T14:14:50.009307+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CDNrcV2ye2fHfvN9Ja"]} -{"Format": "IDEA0", "ID": "f203ef18-fbae-4678-85ca-f8051f413e3e", "DetectTime": "2023-10-30T14:14:50.026391+02:00", "EventTime": "2023-10-30T14:14:50.026400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cnk3nn1eLcLuIAjLw5"]} -{"Format": "IDEA0", "ID": "5dd1b988-59ac-4751-9ff4-b671385d3e59", "DetectTime": "2023-10-30T14:14:50.038720+02:00", "EventTime": "2023-10-30T14:14:50.038731+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CKDh9hq5efDlXafL6"]} -{"Format": "IDEA0", "ID": "53531ce1-7622-4306-9c21-9ed6c423a778", "DetectTime": "2023-10-30T14:14:50.053282+02:00", "EventTime": "2023-10-30T14:14:50.053292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C3g99q3lV7aEo2YHQ8"]} -{"Format": "IDEA0", "ID": "75fa7560-afcd-4e4f-b6cd-4dc3be4cba43", "DetectTime": "2023-10-30T14:14:50.071248+02:00", "EventTime": "2023-10-30T14:14:50.071263+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C1IIez1J10T5Lvu6l1"]} -{"Format": "IDEA0", "ID": "b8dad6be-3ca9-4d38-9ad2-773d543e1887", "DetectTime": "2023-10-30T14:14:50.090503+02:00", "EventTime": "2023-10-30T14:14:50.090517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJ5PYk4zAvjwtUUcIe"]} -{"Format": "IDEA0", "ID": "ac73cbca-35ab-45ad-8806-49863995807f", "DetectTime": "2023-10-30T14:14:50.109825+02:00", "EventTime": "2023-10-30T14:14:50.109839+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C8DjpV1KAUXaGg0BK6"]} -{"Format": "IDEA0", "ID": "bed771de-d658-421c-8bd3-175abe3b7a55", "DetectTime": "2023-10-30T14:14:50.128886+02:00", "EventTime": "2023-10-30T14:14:50.128898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cfcfbzipn0SiXSuLc"]} -{"Format": "Json", "ID": "bed771de-d658-421c-8bd3-175abe3b7a55", "DetectTime": "2023-10-30T14:14:50.128886+02:00", "EventTime": "2023-10-30T14:14:50.128898+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:47:19.182796+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:50.203469)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "375943c7-4079-4c13-8d9c-cb66f807a575", "DetectTime": "2023-10-30T14:14:50.208688+02:00", "EventTime": "2023-10-30T14:14:50.208703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C5mLfW3E8DP8r9gE7g"]} -{"Format": "IDEA0", "ID": "4889622e-5554-4f91-8ad6-3e81a1cd51db", "DetectTime": "2023-10-30T14:14:50.227086+02:00", "EventTime": "2023-10-30T14:14:50.227102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CjZmtdgVamiKeUpGb"]} -{"Format": "IDEA0", "ID": "daca2c96-c859-4d1e-b5a7-86bf5ced9b3b", "DetectTime": "2023-10-30T14:14:50.247656+02:00", "EventTime": "2023-10-30T14:14:50.247672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CSqQag3PII9d5Klw38"]} -{"Format": "IDEA0", "ID": "6df49fed-de2b-4d46-ad08-dd7202dfe71b", "DetectTime": "2023-10-30T14:14:50.268467+02:00", "EventTime": "2023-10-30T14:14:50.268482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CsRyFY2FOI9q4Pyk43"]} -{"Format": "IDEA0", "ID": "72ceafe7-d7cf-409b-92e5-274a82ca5b96", "DetectTime": "2023-10-30T14:14:50.288363+02:00", "EventTime": "2023-10-30T14:14:50.288377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cn1Q274wymuUbtOcG8"]} -{"Format": "IDEA0", "ID": "a1cbbbc7-1b08-46ca-b395-e344da5b4d84", "DetectTime": "2023-10-30T14:14:50.304026+02:00", "EventTime": "2023-10-30T14:14:50.304038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CjVXIv4nb3n1KjtUkf"]} -{"Format": "IDEA0", "ID": "98f14342-1af7-4b81-98c0-b746247aad9d", "DetectTime": "2023-10-30T14:14:50.331794+02:00", "EventTime": "2023-10-30T14:14:50.331808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CoTjQGjzv9xhRCNWe"]} -{"Format": "IDEA0", "ID": "742099f1-1236-488c-8f2c-2b116cd3e4e6", "DetectTime": "2023-10-30T14:14:50.352210+02:00", "EventTime": "2023-10-30T14:14:50.352224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CRDHbr2XXzd0mtVm35"]} -{"Format": "IDEA0", "ID": "3fe0d5c8-d989-4442-8c68-bfba3d75b29b", "DetectTime": "2023-10-30T14:14:50.368718+02:00", "EventTime": "2023-10-30T14:14:50.368728+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CHvUuSFIDcuA2lvue"]} -{"Format": "IDEA0", "ID": "3e906eef-ee8a-4c48-9c8b-827a2ad57945", "DetectTime": "2023-10-30T14:14:50.381317+02:00", "EventTime": "2023-10-30T14:14:50.381326+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 41.103.153.125 from 10.0.2.19. blacklisted IP AS: ALGTEL-AS, DZ AS3694 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cz6T7O1ycqntQxrEAa"]} -{"Format": "IDEA0", "ID": "e0d18ced-c795-4057-a844-af6ae16a6b71", "DetectTime": "2023-10-30T14:14:50.397174+02:00", "EventTime": "2023-10-30T14:14:50.397184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CMx2xk2aIjenkb0Qwg"]} -{"Format": "IDEA0", "ID": "7aa10fbe-5ae9-4815-875c-e3eaf87457e7", "DetectTime": "2023-10-30T14:14:50.410534+02:00", "EventTime": "2023-10-30T14:14:50.410546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["ChDSEj40MW8oKWz3Kg"]} -{"Format": "IDEA0", "ID": "324cd3fb-b0db-4771-bb70-6721ccb5c61b", "DetectTime": "2023-10-30T14:14:50.424884+02:00", "EventTime": "2023-10-30T14:14:50.424895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CcS1oj3ZG4WVrkCona"]} -{"Format": "IDEA0", "ID": "0de4dd05-b57a-4434-b1b4-e71fbfe80c84", "DetectTime": "2023-10-30T14:14:50.458659+02:00", "EventTime": "2023-10-30T14:14:50.458670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C5Dw9a1Wl4joZWw0P6"]} -{"Format": "IDEA0", "ID": "bd7a2717-263f-4c02-843e-2969a2141d9b", "DetectTime": "2023-10-30T14:14:50.473707+02:00", "EventTime": "2023-10-30T14:14:50.473720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CFwPJxVZqb3Ycgy6l"]} -{"Format": "IDEA0", "ID": "27d50e78-b67c-4831-bdce-4cedd1cba054", "DetectTime": "2023-10-30T14:14:50.493499+02:00", "EventTime": "2023-10-30T14:14:50.493511+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CnhNNS2IhVA5wxUSf6"]} -{"Format": "IDEA0", "ID": "ab08ba62-9406-496e-9061-fa36acfe6dea", "DetectTime": "2023-10-30T14:14:50.507602+02:00", "EventTime": "2023-10-30T14:14:50.507612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CHDp7QJRhVWX2OnTa"]} -{"Format": "IDEA0", "ID": "52593b2d-39f8-43ca-a0bc-02d1b47ae1ad", "DetectTime": "2023-10-30T14:14:50.528073+02:00", "EventTime": "2023-10-30T14:14:50.528088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C6B2Qt2qJueeGZz7O1"]} -{"Format": "IDEA0", "ID": "176062e1-23a9-478d-be6e-5b4d545015e7", "DetectTime": "2023-10-30T14:14:50.545765+02:00", "EventTime": "2023-10-30T14:14:50.545776+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C3lb7B3UwXT6Eu5EG1"]} -{"Format": "IDEA0", "ID": "212f0175-1e6a-4b34-9391-185ddb8cab68", "DetectTime": "2023-10-30T14:14:50.572906+02:00", "EventTime": "2023-10-30T14:14:50.572923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["Com1U33IQh7PX9IEag"]} -{"Format": "IDEA0", "ID": "1224f565-951d-43bc-84ac-5ca0f09f4235", "DetectTime": "2023-10-30T14:14:50.593319+02:00", "EventTime": "2023-10-30T14:14:50.593338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CNCOup1URnJfzmNpV"]} -{"Format": "IDEA0", "ID": "189a6df3-34d5-4c06-8ee6-95c7a42573cb", "DetectTime": "2023-10-30T14:14:50.610089+02:00", "EventTime": "2023-10-30T14:14:50.610100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CznFQA4W6lvREykmVg"]} -{"Format": "IDEA0", "ID": "4fc236bf-e909-410b-b8df-e508c3cfbac5", "DetectTime": "2023-10-30T14:14:50.624791+02:00", "EventTime": "2023-10-30T14:14:50.624803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CK2E1jJX4Vc4npih"]} -{"Format": "IDEA0", "ID": "14cd8748-1bb0-497a-ac7b-93a9a1546da6", "DetectTime": "2023-10-30T14:14:50.642628+02:00", "EventTime": "2023-10-30T14:14:50.642643+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Cd1hNQ32DPWfMkn9sa"]} -{"Format": "IDEA0", "ID": "5f8651c8-46e6-443d-8445-d9881529d95b", "DetectTime": "2023-10-30T14:14:50.677798+02:00", "EventTime": "2023-10-30T14:14:50.677810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CoPmSJ1H1j7cgRu4uh"]} -{"Format": "IDEA0", "ID": "ae118a50-9445-4f06-9aff-ab81fd9cc007", "DetectTime": "2023-10-30T14:14:50.711228+02:00", "EventTime": "2023-10-30T14:14:50.711242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CNovqO18hNDvHZtiN4"]} -{"Format": "IDEA0", "ID": "49529a6e-e8a2-416c-9b5b-39debfd81109", "DetectTime": "2023-10-30T14:14:50.729899+02:00", "EventTime": "2023-10-30T14:14:50.729912+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CEajur4wy034iPgjm8"]} -{"Format": "IDEA0", "ID": "4a4f9a10-4c28-443a-8694-8bd048ee6e78", "DetectTime": "2023-10-30T14:14:50.760138+02:00", "EventTime": "2023-10-30T14:14:50.760149+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CTA8eFkOlEQgji9R3"]} -{"Format": "IDEA0", "ID": "4ae451ca-9bb2-43ab-b432-68d8708b6064", "DetectTime": "2023-10-30T14:14:50.775423+02:00", "EventTime": "2023-10-30T14:14:50.775434+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["C8NfA3pNtpJ8BfW01"]} -{"Format": "IDEA0", "ID": "9ab3bdac-3176-4689-9392-aa5337dc32f7", "DetectTime": "2023-10-30T14:14:50.798117+02:00", "EventTime": "2023-10-30T14:14:50.798129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C8LzT74V9goyMGomF2"]} -{"Format": "IDEA0", "ID": "cfce0979-bab0-4422-be31-b24f68106adb", "DetectTime": "2023-10-30T14:14:50.815290+02:00", "EventTime": "2023-10-30T14:14:50.815302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["C4h7qP1IUKRQGDvaxh"]} -{"Format": "IDEA0", "ID": "9f2e4ad6-e2cf-4525-8de8-a4b02a358561", "DetectTime": "2023-10-30T14:14:50.830026+02:00", "EventTime": "2023-10-30T14:14:50.830037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CIPEbE13wXTahKlHPd"]} -{"Format": "Json", "ID": "9f2e4ad6-e2cf-4525-8de8-a4b02a358561", "DetectTime": "2023-10-30T14:14:50.830026+02:00", "EventTime": "2023-10-30T14:14:50.830037+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:47:20.840925+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:50.889779)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3d2912e2-446a-4852-8714-c586a39087ec", "DetectTime": "2023-10-30T14:14:50.893843+02:00", "EventTime": "2023-10-30T14:14:50.893855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CjpvMG3rt5qQJFjbzh"]} -{"Format": "IDEA0", "ID": "32c895f9-270d-4bc8-afaa-1619f02c689e", "DetectTime": "2023-10-30T14:14:50.910009+02:00", "EventTime": "2023-10-30T14:14:50.910021+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CgeBow3dMscSwB7fDl"]} -{"Format": "IDEA0", "ID": "1760cd03-9a5a-471d-9bff-907ab52e1bc7", "DetectTime": "2023-10-30T14:14:50.925026+02:00", "EventTime": "2023-10-30T14:14:50.925038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C4yl011CUB7rCo1sil"]} -{"Format": "IDEA0", "ID": "bf7592c5-4969-4e12-bad4-c5bb4bdcac0b", "DetectTime": "2023-10-30T14:14:50.939140+02:00", "EventTime": "2023-10-30T14:14:50.939150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CwJCTF4HD5lffONiWa"]} -{"Format": "IDEA0", "ID": "d93595b4-c7ed-423c-bb6c-96f3cea5d9bc", "DetectTime": "2023-10-30T14:14:50.952358+02:00", "EventTime": "2023-10-30T14:14:50.952368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C6dWlA2sonnfXR6Zzi"]} -{"Format": "IDEA0", "ID": "6e6e9572-5381-4b37-b051-2918d224b9ce", "DetectTime": "2023-10-30T14:14:50.974290+02:00", "EventTime": "2023-10-30T14:14:50.974299+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["COaDMcFiOR9wL2HFe"]} -{"Format": "IDEA0", "ID": "dcbeb5f8-c0f4-4a40-b765-48a929354907", "DetectTime": "2023-10-30T14:14:50.987841+02:00", "EventTime": "2023-10-30T14:14:50.987850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CWaHIq3GtTnvDVmWg1"]} -{"Format": "IDEA0", "ID": "df137a7e-eaeb-40b8-8495-5445d05a9be0", "DetectTime": "2023-10-30T14:14:51.002090+02:00", "EventTime": "2023-10-30T14:14:51.002100+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CBZXvQ2jvQ0jMBVefl"]} -{"Format": "IDEA0", "ID": "f0d5b239-a3ac-43b7-bbce-c0cf93ef206f", "DetectTime": "2023-10-30T14:14:51.016509+02:00", "EventTime": "2023-10-30T14:14:51.016518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CaFgtw3FAxf2oCDqUi"]} -{"Format": "IDEA0", "ID": "1a5fc8f4-0732-4ce8-8acd-c839f6ae9c49", "DetectTime": "2023-10-30T14:14:51.030553+02:00", "EventTime": "2023-10-30T14:14:51.030563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CJQNOV1J1BeUJR41ih"]} -{"Format": "IDEA0", "ID": "6eb30090-3c6f-496a-b58f-4dcb3286e88d", "DetectTime": "2023-10-30T14:14:51.048122+02:00", "EventTime": "2023-10-30T14:14:51.048133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cgqw2030QqOtCBT7E8"]} -{"Format": "IDEA0", "ID": "9a36e7f7-ef96-479e-b8bb-fd5d25ace45f", "DetectTime": "2023-10-30T14:14:51.063382+02:00", "EventTime": "2023-10-30T14:14:51.063398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CVPEABoH2CKkV9e3i"]} -{"Format": "IDEA0", "ID": "ac1d5981-306e-4999-9b17-6396f3a2a11d", "DetectTime": "2023-10-30T14:14:51.079927+02:00", "EventTime": "2023-10-30T14:14:51.079937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CEkZa12kapClKe79Hc"]} -{"Format": "IDEA0", "ID": "9f8fa306-15cc-4e72-bd05-9ab179aab697", "DetectTime": "2023-10-30T14:14:51.097932+02:00", "EventTime": "2023-10-30T14:14:51.097944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0k84e4yYuspPUjyh4"]} -{"Format": "IDEA0", "ID": "1060cc6d-a651-4dfc-aeff-7326c3af343d", "DetectTime": "2023-10-30T14:14:51.122881+02:00", "EventTime": "2023-10-30T14:14:51.122892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CAluwz3tFZ5jYtoDB8"]} -{"Format": "IDEA0", "ID": "001b0ebc-b943-482c-bfe8-1edd5389eb28", "DetectTime": "2023-10-30T14:14:51.139659+02:00", "EventTime": "2023-10-30T14:14:51.139670+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqASTT37vIdhPc4IK8"]} -{"Format": "IDEA0", "ID": "fa2dcee2-9756-41fe-bef9-401fc7e852af", "DetectTime": "2023-10-30T14:14:51.154714+02:00", "EventTime": "2023-10-30T14:14:51.154723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CmetvB2nTxUDzx8n0f"]} -{"Format": "IDEA0", "ID": "a0b251a9-2573-4120-b8bc-520161ebefb0", "DetectTime": "2023-10-30T14:14:51.169766+02:00", "EventTime": "2023-10-30T14:14:51.169777+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CnSRFC21A05GIQ1Y85"]} -{"Format": "IDEA0", "ID": "55bf4b66-a4a1-494b-b30c-747addc89482", "DetectTime": "2023-10-30T14:14:51.184541+02:00", "EventTime": "2023-10-30T14:14:51.184552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CzY3ri2PvVol1g8RWl"]} -{"Format": "IDEA0", "ID": "b72a5678-ad7d-4e3d-80df-6c0646e2afb3", "DetectTime": "2023-10-30T14:14:51.200331+02:00", "EventTime": "2023-10-30T14:14:51.200341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cl80j43RwFmUgIVH5g"]} -{"Format": "IDEA0", "ID": "4df911bf-db12-47b5-880e-48571751f019", "DetectTime": "2023-10-30T14:14:51.215244+02:00", "EventTime": "2023-10-30T14:14:51.215262+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CzvmZe4GTTqgAU1GYa"]} -{"Format": "IDEA0", "ID": "4776257b-0906-439b-9390-529bb3dbe61a", "DetectTime": "2023-10-30T14:14:51.230089+02:00", "EventTime": "2023-10-30T14:14:51.230099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["ChZOdN3FXnQvkwJ4I3"]} -{"Format": "IDEA0", "ID": "95853d82-0745-4435-899c-d6866cef7df2", "DetectTime": "2023-10-30T14:14:51.249344+02:00", "EventTime": "2023-10-30T14:14:51.249353+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CNWjfP1T7r5BpBmdSd"]} -{"Format": "IDEA0", "ID": "caae93f1-1e1c-4f6d-84f4-e1d68eae0ecb", "DetectTime": "2023-10-30T14:14:51.263619+02:00", "EventTime": "2023-10-30T14:14:51.263629+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["Ceg8PI38kNjCv6Tcq8"]} -{"Format": "IDEA0", "ID": "1c12e48b-e6dc-453b-88f7-e0aa43e5c042", "DetectTime": "2023-10-30T14:14:51.284794+02:00", "EventTime": "2023-10-30T14:14:51.284804+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Ch88as1pPmyxfhTXB5"]} -{"Format": "IDEA0", "ID": "85a90ccf-da61-414e-af45-04e1b3b0d1b1", "DetectTime": "2023-10-30T14:14:51.300752+02:00", "EventTime": "2023-10-30T14:14:51.300767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CwwPm23VdfGTa8Fz0e"]} -{"Format": "IDEA0", "ID": "b564841c-9d61-4340-820d-6a3acde05942", "DetectTime": "2023-10-30T14:14:51.319702+02:00", "EventTime": "2023-10-30T14:14:51.319716+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CNGKhd2hUFlGnwPhbi"]} -{"Format": "IDEA0", "ID": "45bc7698-78ad-418d-94cf-0dc2ee6483c7", "DetectTime": "2023-10-30T14:14:51.340341+02:00", "EventTime": "2023-10-30T14:14:51.340355+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CKLGBZ3wkpGNxA15N7"]} -{"Format": "IDEA0", "ID": "adaf0ad7-1310-4f17-b9c6-297c56cb5756", "DetectTime": "2023-10-30T14:14:51.359998+02:00", "EventTime": "2023-10-30T14:14:51.360012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CKjKTI21we0XZ5Jf82"]} -{"Format": "IDEA0", "ID": "27bcde91-a11f-41d7-8612-3e76aa3721fb", "DetectTime": "2023-10-30T14:14:51.376250+02:00", "EventTime": "2023-10-30T14:14:51.376264+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CjHWhVC3IQB6Om1Ah"]} -{"Format": "IDEA0", "ID": "2577dde7-212f-47f9-9d42-029e8185f1c5", "DetectTime": "2023-10-30T14:14:51.395839+02:00", "EventTime": "2023-10-30T14:14:51.395856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CXf2vYcZuL1LWmtLd"]} -{"Format": "IDEA0", "ID": "2426aa68-b6df-4876-b1aa-b94e6d502347", "DetectTime": "2023-10-30T14:14:51.413613+02:00", "EventTime": "2023-10-30T14:14:51.413624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CXeVW420jFMpEKpGkl"]} -{"Format": "IDEA0", "ID": "df1052eb-66ff-4d87-80b3-bb3a0d52820c", "DetectTime": "2023-10-30T14:14:51.429075+02:00", "EventTime": "2023-10-30T14:14:51.429086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyEChYlmjSUVrBih9"]} -{"Format": "IDEA0", "ID": "2a9db009-d17a-4f59-9174-d19d058e5e0f", "DetectTime": "2023-10-30T14:14:51.449133+02:00", "EventTime": "2023-10-30T14:14:51.449143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CFeLMd4lTZqQOHifI2"]} -{"Format": "IDEA0", "ID": "c5627306-6fea-4f40-8096-1bc048ad381f", "DetectTime": "2023-10-30T14:14:51.464702+02:00", "EventTime": "2023-10-30T14:14:51.464713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CLvXwYAtvhMzYdXVf"]} -{"Format": "IDEA0", "ID": "d975e5bf-90c1-433f-8f05-ea0bf869fdc0", "DetectTime": "2023-10-30T14:14:51.479673+02:00", "EventTime": "2023-10-30T14:14:51.479683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["ChFkqlOlAi2OAqgEc"]} -{"Format": "IDEA0", "ID": "6428aaae-da46-41e8-baee-13591287bca7", "DetectTime": "2023-10-30T14:14:51.496839+02:00", "EventTime": "2023-10-30T14:14:51.496854+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CVa6dq1uwIFFlPbsm8"]} -{"Format": "IDEA0", "ID": "1d29cc8b-4c6d-4502-bde2-4707e7ab5e39", "DetectTime": "2023-10-30T14:14:51.527019+02:00", "EventTime": "2023-10-30T14:14:51.527032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["ChQOoO2XxyRWr4wl67"]} -{"Format": "IDEA0", "ID": "69b25fb5-b741-448c-a0f6-cbabf992dadb", "DetectTime": "2023-10-30T14:14:51.547215+02:00", "EventTime": "2023-10-30T14:14:51.547230+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CzBJTN1XLj558ICOW8"]} -{"Format": "IDEA0", "ID": "20a9b226-5962-493f-95ae-f560a02194e2", "DetectTime": "2023-10-30T14:14:51.561460+02:00", "EventTime": "2023-10-30T14:14:51.561470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CcF8bj27ctmVLhnwv1"]} -{"Format": "IDEA0", "ID": "8c004f21-7afe-4b17-a51c-c9fdcb9d5fe8", "DetectTime": "2023-10-30T14:14:51.577569+02:00", "EventTime": "2023-10-30T14:14:51.577579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CrH34X3X3xt3Grfq4k"]} -{"Format": "IDEA0", "ID": "db0e4aad-a0d0-41b2-9c2f-601ba6e03ee8", "DetectTime": "2023-10-30T14:14:51.591779+02:00", "EventTime": "2023-10-30T14:14:51.591789+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CbK02C1uTPe0cPMpRe"]} -{"Format": "IDEA0", "ID": "844f4873-69e0-4700-955b-e567b3b5a7a7", "DetectTime": "2023-10-30T14:14:51.605986+02:00", "EventTime": "2023-10-30T14:14:51.605998+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CwVgrV2lx6P28RVFze"]} -{"Format": "IDEA0", "ID": "8c337937-789b-4467-ac53-9ce7836a64d1", "DetectTime": "2023-10-30T14:14:51.620952+02:00", "EventTime": "2023-10-30T14:14:51.620962+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CNxCpt4fSkm66d6UQ6"]} -{"Format": "IDEA0", "ID": "9a421435-cc1e-4cb2-a267-52bcb934fafd", "DetectTime": "2023-10-30T14:14:51.635975+02:00", "EventTime": "2023-10-30T14:14:51.635986+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CC1Qwg1Yc3KCnyL40i"]} -{"Format": "IDEA0", "ID": "f5879204-3feb-45fe-b37c-54075ecbc0a4", "DetectTime": "2023-10-30T14:14:51.650628+02:00", "EventTime": "2023-10-30T14:14:51.650639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Cub4Lf3zwtASrQdSoj"]} -{"Format": "IDEA0", "ID": "f6de6b27-1e91-4878-8b76-573bfb48a1eb", "DetectTime": "2023-10-30T14:14:51.665217+02:00", "EventTime": "2023-10-30T14:14:51.665227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CnMLEF3IsLJQFRIVVf"]} -{"Format": "IDEA0", "ID": "22ab8ef8-d47e-4b80-bfcd-399d051b038c", "DetectTime": "2023-10-30T14:14:51.678414+02:00", "EventTime": "2023-10-30T14:14:51.678424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CEZDva4E35Q3tAoDm9"]} -{"Format": "IDEA0", "ID": "170e8465-02ec-4a2f-b2a8-94e9dcad978b", "DetectTime": "2023-10-30T14:14:51.692737+02:00", "EventTime": "2023-10-30T14:14:51.692748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["Cv8iIw3nMjM77iNqLh"]} -{"Format": "IDEA0", "ID": "ba38bbc2-e442-4f2e-8eb2-5b26d298a564", "DetectTime": "2023-10-30T14:14:51.708080+02:00", "EventTime": "2023-10-30T14:14:51.708091+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CDQAx93XDPXkajoIJ4"]} -{"Format": "IDEA0", "ID": "d3172002-e6d0-4c19-947c-ca8e46e72cd7", "DetectTime": "2023-10-30T14:14:51.729469+02:00", "EventTime": "2023-10-30T14:14:51.729483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CtVb9C3IgFq89frT79"]} -{"Format": "IDEA0", "ID": "59350457-fb49-486c-85e9-8494b0e06dc4", "DetectTime": "2023-10-30T14:14:51.743609+02:00", "EventTime": "2023-10-30T14:14:51.743619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CNwUN62pTE3aRU0xOc"]} -{"Format": "IDEA0", "ID": "226c63fe-80bc-48a1-9408-58fce431d507", "DetectTime": "2023-10-30T14:14:51.757661+02:00", "EventTime": "2023-10-30T14:14:51.757672+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["ClxRwG2RaLzA7Srbnk"]} -{"Format": "IDEA0", "ID": "2fe96e53-d538-43b0-b767-7cdcd8d8424e", "DetectTime": "2023-10-30T14:14:51.771159+02:00", "EventTime": "2023-10-30T14:14:51.771169+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CCUaqb19Pds9gCyfbk"]} -{"Format": "IDEA0", "ID": "3d840b04-59c3-4010-b2c2-b5ccf0411e94", "DetectTime": "2023-10-30T14:14:51.785063+02:00", "EventTime": "2023-10-30T14:14:51.785073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CO9x9oT3LD8fBXnp4"]} -{"Format": "IDEA0", "ID": "029063bf-38d3-4bbd-86db-d339977eda8c", "DetectTime": "2023-10-30T14:14:51.800010+02:00", "EventTime": "2023-10-30T14:14:51.800020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CGhxAj1lAAX0uJt8tc"]} -{"Format": "IDEA0", "ID": "d5f504db-d221-42d1-8e73-9359f6d0237f", "DetectTime": "2023-10-30T14:14:51.815361+02:00", "EventTime": "2023-10-30T14:14:51.815379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CjPMv633656ffaXlJi"]} -{"Format": "IDEA0", "ID": "facaf6c9-5df4-4d1a-b353-f44957f18689", "DetectTime": "2023-10-30T14:14:51.837960+02:00", "EventTime": "2023-10-30T14:14:51.837975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CpdMIP21qkIjNbvcIg"]} -{"Format": "IDEA0", "ID": "efefcddb-2134-4a1d-b639-bd255b427d3c", "DetectTime": "2023-10-30T14:14:51.859464+02:00", "EventTime": "2023-10-30T14:14:51.859479+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CwtFcK3CgkHcJFwu7"]} -{"Format": "IDEA0", "ID": "65afd331-7315-454f-8b8d-096a80605625", "DetectTime": "2023-10-30T14:14:51.883917+02:00", "EventTime": "2023-10-30T14:14:51.883932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0I0mG1AAroCGI3lag"]} -{"Format": "IDEA0", "ID": "65523b40-7dae-46cf-b956-9e56c62a3d00", "DetectTime": "2023-10-30T14:14:51.902751+02:00", "EventTime": "2023-10-30T14:14:51.902765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CyZqbhK0v4EbPu678"]} -{"Format": "IDEA0", "ID": "734661b7-bc82-4921-bedc-6bdabb9787cb", "DetectTime": "2023-10-30T14:14:51.924465+02:00", "EventTime": "2023-10-30T14:14:51.924478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CiISHA3UFQxcek8nB1"]} -{"Format": "IDEA0", "ID": "32f2a5d2-854b-4e48-9bdb-47fb999670fc", "DetectTime": "2023-10-30T14:14:51.944803+02:00", "EventTime": "2023-10-30T14:14:51.944814+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CqjI003r4MvozEE0Od"]} -{"Format": "IDEA0", "ID": "afe006a3-952d-4569-8e28-7fd8c917e394", "DetectTime": "2023-10-30T14:14:51.959886+02:00", "EventTime": "2023-10-30T14:14:51.959895+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CikNwn4tp8HnL75ybd"]} -{"Format": "IDEA0", "ID": "3cc2fe39-a1f0-4157-828f-c3f0eeeacf1e", "DetectTime": "2023-10-30T14:14:51.975998+02:00", "EventTime": "2023-10-30T14:14:51.976008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CnmZza3SMIRMS6Nyng"]} -{"Format": "IDEA0", "ID": "14c8564b-a377-439b-8afe-d260ea62c7d3", "DetectTime": "2023-10-30T14:14:51.990547+02:00", "EventTime": "2023-10-30T14:14:51.990557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["C57mks3l6g38ZP2um4"]} -{"Format": "IDEA0", "ID": "fffb61b9-76b2-4fe5-91bd-3ec1b3c38912", "DetectTime": "2023-10-30T14:14:52.005893+02:00", "EventTime": "2023-10-30T14:14:52.005907+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["Crmj1S2DYUKWTdoFa"]} -{"Format": "IDEA0", "ID": "cd59871f-8bf4-413e-b57d-4ce243ee0a55", "DetectTime": "2023-10-30T14:14:52.028985+02:00", "EventTime": "2023-10-30T14:14:52.028995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Covryr2dHrxFj6i8Ya"]} -{"Format": "IDEA0", "ID": "1e5f9c96-74fa-4be0-a804-e342c524fa80", "DetectTime": "2023-10-30T14:14:52.044213+02:00", "EventTime": "2023-10-30T14:14:52.044223+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CyiYrb42v3BZZc4rs3"]} -{"Format": "IDEA0", "ID": "cc70d644-d797-4115-8503-3adcacf9a8e2", "DetectTime": "2023-10-30T14:14:52.060364+02:00", "EventTime": "2023-10-30T14:14:52.060378+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CDZqyb3jeao22WNShh"]} -{"Format": "IDEA0", "ID": "cd3f6b69-a9a7-4329-b508-d9a5ba555e72", "DetectTime": "2023-10-30T14:14:52.080555+02:00", "EventTime": "2023-10-30T14:14:52.080569+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CKDwxpEptcfzgP1nk"]} -{"Format": "IDEA0", "ID": "40f93160-916b-4c45-9246-007da25cd950", "DetectTime": "2023-10-30T14:14:52.098831+02:00", "EventTime": "2023-10-30T14:14:52.098845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CwR1Za2o2WSzvqkQXd"]} -{"Format": "IDEA0", "ID": "3fd75ddf-0a46-489f-83b5-61512ffff05a", "DetectTime": "2023-10-30T14:14:52.114430+02:00", "EventTime": "2023-10-30T14:14:52.114440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CbzvKS1y8gSuG5VSX9"]} -{"Format": "IDEA0", "ID": "9370aa10-db03-46c1-a7b1-53d84bae9c04", "DetectTime": "2023-10-30T14:14:52.129570+02:00", "EventTime": "2023-10-30T14:14:52.129579+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CBbtGRs69zu18I4Rc"]} -{"Format": "IDEA0", "ID": "6b92f7f7-38b9-4546-b1ab-ede192751020", "DetectTime": "2023-10-30T14:14:52.145032+02:00", "EventTime": "2023-10-30T14:14:52.145048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C4FSkb20m4gXrQK1yj"]} -{"Format": "IDEA0", "ID": "d8227b48-ed59-4b62-bf9e-8fa52ac583a7", "DetectTime": "2023-10-30T14:14:52.160232+02:00", "EventTime": "2023-10-30T14:14:52.160246+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CrxoiC3Sj3Vpuu3UJe"]} -{"Format": "IDEA0", "ID": "2a242df6-ed79-4df2-9ef4-6d69d1ba2c90", "DetectTime": "2023-10-30T14:14:52.175750+02:00", "EventTime": "2023-10-30T14:14:52.175759+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CXYo303P3TPmk2a1Di"]} -{"Format": "IDEA0", "ID": "ee5f53e1-2713-4432-856c-47d26ab83acb", "DetectTime": "2023-10-30T14:14:52.196563+02:00", "EventTime": "2023-10-30T14:14:52.196573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C54MNH23fLVGTlfCj3"]} -{"Format": "IDEA0", "ID": "05660679-471e-4b8f-a4bc-2aa40521c711", "DetectTime": "2023-10-30T14:14:52.210941+02:00", "EventTime": "2023-10-30T14:14:52.210951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CYhAnF12zpPXmCmuM"]} -{"Format": "IDEA0", "ID": "36adf4e6-dcea-4965-843b-98b5ed865136", "DetectTime": "2023-10-30T14:14:52.225538+02:00", "EventTime": "2023-10-30T14:14:52.225549+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CQvnVofjShVYvqOZd"]} -{"Format": "IDEA0", "ID": "0d901039-ef14-424e-88aa-69f5a485ff4a", "DetectTime": "2023-10-30T14:14:52.240192+02:00", "EventTime": "2023-10-30T14:14:52.240203+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CVDAOA1rzQs8eDdCf"]} -{"Format": "IDEA0", "ID": "c779432f-958f-4596-a68e-fa075cfa2c35", "DetectTime": "2023-10-30T14:14:52.255040+02:00", "EventTime": "2023-10-30T14:14:52.255052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CKOu654uFSjCdmm0ta"]} -{"Format": "IDEA0", "ID": "3b7a5597-ae62-4ca9-b632-ab678381c4c2", "DetectTime": "2023-10-30T14:14:52.270266+02:00", "EventTime": "2023-10-30T14:14:52.270278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CrotlS1lX9YNH7Ynbf"]} -{"Format": "IDEA0", "ID": "ab82d6be-e1b5-47a9-980d-0852b94a5125", "DetectTime": "2023-10-30T14:14:52.290317+02:00", "EventTime": "2023-10-30T14:14:52.290332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CK0Agk23b0626LAF5j"]} -{"Format": "IDEA0", "ID": "5068800d-637a-46fc-bffc-56ce30a5a856", "DetectTime": "2023-10-30T14:14:52.307129+02:00", "EventTime": "2023-10-30T14:14:52.307139+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C2EVe534zBLsaezRBb"]} -{"Format": "IDEA0", "ID": "3efad994-274e-47cc-8a7e-542d938418b9", "DetectTime": "2023-10-30T14:14:52.322036+02:00", "EventTime": "2023-10-30T14:14:52.322048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CsFHgg14DpFk9Nec79"]} -{"Format": "Json", "ID": "3efad994-274e-47cc-8a7e-542d938418b9", "DetectTime": "2023-10-30T14:14:52.322036+02:00", "EventTime": "2023-10-30T14:14:52.322048+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:47:22.993238+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:52.395184)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "0558908a-430a-4923-a96f-59edf0bac7f9", "DetectTime": "2023-10-30T14:14:52.400319+02:00", "EventTime": "2023-10-30T14:14:52.400335+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CU1yFy2x1zKLQ3KcF6"]} -{"Format": "IDEA0", "ID": "91d5cd77-fee8-4197-9743-1915dff0b303", "DetectTime": "2023-10-30T14:14:52.420609+02:00", "EventTime": "2023-10-30T14:14:52.420622+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CXtlmZ1Nrug6jLPd9a"]} -{"Format": "IDEA0", "ID": "4afd3af7-3dcb-41aa-a845-a41b9d1407c2", "DetectTime": "2023-10-30T14:14:52.440451+02:00", "EventTime": "2023-10-30T14:14:52.440462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CE39vl3K7vU2Ga0yG4"]} -{"Format": "IDEA0", "ID": "03d50aec-df2e-4426-87af-02a9d90dc3ec", "DetectTime": "2023-10-30T14:14:52.456041+02:00", "EventTime": "2023-10-30T14:14:52.456053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CnS2MS2RgAe58pMa6e"]} -{"Format": "IDEA0", "ID": "b4e6a977-de1e-4111-b70b-28e3bf1259b3", "DetectTime": "2023-10-30T14:14:52.471595+02:00", "EventTime": "2023-10-30T14:14:52.471608+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CSxueH1MmpF80NKPZ1"]} -{"Format": "IDEA0", "ID": "e559becb-ab40-4a3d-9ae3-e768cfdac4ec", "DetectTime": "2023-10-30T14:14:52.488416+02:00", "EventTime": "2023-10-30T14:14:52.488426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CYY1nV3Fp4jxFgJi2b"]} -{"Format": "IDEA0", "ID": "5947012c-6317-4dbf-a3b4-e96b7ead21a2", "DetectTime": "2023-10-30T14:14:52.502608+02:00", "EventTime": "2023-10-30T14:14:52.502619+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CLPyJf4SYrUmlTjdA1"]} -{"Format": "IDEA0", "ID": "a5cac1bf-ce45-47ee-9b71-631ceb53a21a", "DetectTime": "2023-10-30T14:14:52.516687+02:00", "EventTime": "2023-10-30T14:14:52.516701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C2acqY1DEZnanYnHpk"]} -{"Format": "IDEA0", "ID": "a7fc85ef-1e9b-4d0e-ba9f-e64d892bc70f", "DetectTime": "2023-10-30T14:14:52.535932+02:00", "EventTime": "2023-10-30T14:14:52.535946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CtFiP43uQtQvLGCWa4"]} -{"Format": "IDEA0", "ID": "7640a7ed-b8a2-4cd3-bc13-26cb314e0ba1", "DetectTime": "2023-10-30T14:14:52.555985+02:00", "EventTime": "2023-10-30T14:14:52.555995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CEa5K83yLPtk5M8J23"]} -{"Format": "IDEA0", "ID": "3ce1d028-427a-4e73-a30a-4c7b510184bc", "DetectTime": "2023-10-30T14:14:52.576794+02:00", "EventTime": "2023-10-30T14:14:52.576805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CncKAr3apMjJqpb7f"]} -{"Format": "IDEA0", "ID": "dc7242c9-49be-4c98-861c-392eb7022bcf", "DetectTime": "2023-10-30T14:14:52.594790+02:00", "EventTime": "2023-10-30T14:14:52.594805+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CLPiNG2d1TRnBDhOqa"]} -{"Format": "IDEA0", "ID": "a025c075-066f-48d9-ae5a-b73ad3919c69", "DetectTime": "2023-10-30T14:14:52.611627+02:00", "EventTime": "2023-10-30T14:14:52.611637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CXeZK82LkuuRajBl5l"]} -{"Format": "IDEA0", "ID": "263f3b23-57e2-4c1d-b483-e62977d7e4b3", "DetectTime": "2023-10-30T14:14:52.627355+02:00", "EventTime": "2023-10-30T14:14:52.627365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CD9w143TOvp4ZEh8X"]} -{"Format": "IDEA0", "ID": "6870d4ae-355e-403c-bdc3-0f0fa0115f99", "DetectTime": "2023-10-30T14:14:52.640605+02:00", "EventTime": "2023-10-30T14:14:52.640614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["Cna6GUfCL2RWRvzw7"]} -{"Format": "IDEA0", "ID": "9e94d820-f109-4935-881b-f30ae43f9d46", "DetectTime": "2023-10-30T14:14:52.654882+02:00", "EventTime": "2023-10-30T14:14:52.654892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C5hff57SCl14oX9Ei"]} -{"Format": "IDEA0", "ID": "9ebd22b8-2038-4f97-a948-d60d96bb1d68", "DetectTime": "2023-10-30T14:14:52.669990+02:00", "EventTime": "2023-10-30T14:14:52.670000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CkWdiWCh9dghhRema"]} -{"Format": "IDEA0", "ID": "38a6afd2-415d-4dec-94b3-be7e4cebacc3", "DetectTime": "2023-10-30T14:14:52.689351+02:00", "EventTime": "2023-10-30T14:14:52.689361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CpoyHb2ZcbyNqtzGK5"]} -{"Format": "IDEA0", "ID": "79c8f175-09a0-4eae-93f8-b5be8a8e30cd", "DetectTime": "2023-10-30T14:14:52.704151+02:00", "EventTime": "2023-10-30T14:14:52.704161+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cop0h41OMafnqVqVdh"]} -{"Format": "IDEA0", "ID": "ccff4fc0-8fd6-4887-bc5f-dc3c6b7e2714", "DetectTime": "2023-10-30T14:14:52.719375+02:00", "EventTime": "2023-10-30T14:14:52.719385+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CAHMG52KlxU1OTor78"]} -{"Format": "IDEA0", "ID": "0c4fe174-a80a-44dc-be9f-0e47d87ec198", "DetectTime": "2023-10-30T14:14:52.735038+02:00", "EventTime": "2023-10-30T14:14:52.735050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C569EV2C8y8n5vhYI6"]} -{"Format": "IDEA0", "ID": "0c1de530-0405-499a-be91-9e633d243b65", "DetectTime": "2023-10-30T14:14:52.751124+02:00", "EventTime": "2023-10-30T14:14:52.751134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJvfBg45eVwDzWWJih"]} -{"Format": "IDEA0", "ID": "a9c7af8d-0692-4357-bb8a-7348d2af63f4", "DetectTime": "2023-10-30T14:14:52.766175+02:00", "EventTime": "2023-10-30T14:14:52.766185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["C5DMJD3FuOPiQXRgEl"]} -{"Format": "IDEA0", "ID": "5c8a1771-014e-45e4-908e-ef5e904761a9", "DetectTime": "2023-10-30T14:14:52.781001+02:00", "EventTime": "2023-10-30T14:14:52.781010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CgdXex2FZHoWwLSsR9"]} -{"Format": "IDEA0", "ID": "1b2133cb-2dca-4d9d-9ece-12e9e7492aaf", "DetectTime": "2023-10-30T14:14:52.794414+02:00", "EventTime": "2023-10-30T14:14:52.794424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CPPPAc1kIPqM35Rtq1"]} -{"Format": "IDEA0", "ID": "ef476ab9-90c7-48dd-88d5-c09b3604d606", "DetectTime": "2023-10-30T14:14:52.807839+02:00", "EventTime": "2023-10-30T14:14:52.807849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cq6lQu1FEA5Hn7fGxc"]} -{"Format": "IDEA0", "ID": "a00429c8-8a65-451c-9683-7a83a54490ef", "DetectTime": "2023-10-30T14:14:52.822537+02:00", "EventTime": "2023-10-30T14:14:52.822547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CPw4aIvAHkg2LUIe8"]} -{"Format": "IDEA0", "ID": "a04c1fd7-181a-4eef-9791-307daef1792b", "DetectTime": "2023-10-30T14:14:52.843605+02:00", "EventTime": "2023-10-30T14:14:52.843623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CHDFba3hdkS7PGBs7c"]} -{"Format": "IDEA0", "ID": "0d3ff349-4667-4b6e-bcba-dfc4d00bfed4", "DetectTime": "2023-10-30T14:14:52.875297+02:00", "EventTime": "2023-10-30T14:14:52.875318+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CneD1C2PkTT918zKkk"]} -{"Format": "IDEA0", "ID": "e061d98a-a08e-4ebd-9191-ba7eafea6965", "DetectTime": "2023-10-30T14:14:52.901814+02:00", "EventTime": "2023-10-30T14:14:52.901829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CpHUDS3htOUloEt2Bi"]} -{"Format": "IDEA0", "ID": "261a3114-abcf-4bfc-a758-093b757bec13", "DetectTime": "2023-10-30T14:14:52.922983+02:00", "EventTime": "2023-10-30T14:14:52.923000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CeSt6d4T1v3ABjakl7"]} -{"Format": "IDEA0", "ID": "11758414-d242-4032-9173-2314dc89cd24", "DetectTime": "2023-10-30T14:14:52.943636+02:00", "EventTime": "2023-10-30T14:14:52.943658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CxwDfL24sGa6cCaJo1"]} -{"Format": "IDEA0", "ID": "9de257bb-c361-4179-8983-8d530cd2e587", "DetectTime": "2023-10-30T14:14:52.964645+02:00", "EventTime": "2023-10-30T14:14:52.964661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["C27RYj3iuWjG2LxPTc"]} -{"Format": "IDEA0", "ID": "bd736477-fcc3-4c00-92c7-956ac9a50aa4", "DetectTime": "2023-10-30T14:14:52.979617+02:00", "EventTime": "2023-10-30T14:14:52.979631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CnIwiM3DQpVsIuBmok"]} -{"Format": "IDEA0", "ID": "730f2746-07e5-47b9-9c16-7771e04ff57c", "DetectTime": "2023-10-30T14:14:52.999323+02:00", "EventTime": "2023-10-30T14:14:52.999338+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CFfeHd10jjKTLIk944"]} -{"Format": "IDEA0", "ID": "9650c482-2b41-4cdf-bd40-44f622a6eebf", "DetectTime": "2023-10-30T14:14:53.016279+02:00", "EventTime": "2023-10-30T14:14:53.016289+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CGttFe3k0qlWqp2lJ3"]} -{"Format": "IDEA0", "ID": "0511da80-0f0a-457d-85a4-160111cf5f1a", "DetectTime": "2023-10-30T14:14:53.029819+02:00", "EventTime": "2023-10-30T14:14:53.029829+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CcfUqoCph6IBGxiY5"]} -{"Format": "IDEA0", "ID": "80bdf1fc-4845-462a-b512-2cd8b91e680a", "DetectTime": "2023-10-30T14:14:53.053242+02:00", "EventTime": "2023-10-30T14:14:53.053255+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CLqpNk3Oo9GEMFaETe"]} -{"Format": "IDEA0", "ID": "722545b6-9b58-45e7-ad4b-7d2a44d9c1dc", "DetectTime": "2023-10-30T14:14:53.079173+02:00", "EventTime": "2023-10-30T14:14:53.079183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 81.149.254.99 ", "ContentType": "text/plain"}], "uids": ["CEENtsD6lmJYyott8"]} -{"Format": "IDEA0", "ID": "08690c4e-c259-4b99-946e-06b3dce29b52", "DetectTime": "2023-10-30T14:14:53.095006+02:00", "EventTime": "2023-10-30T14:14:53.095018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["Cr3Qt91PfyvDpat0Pa"]} -{"Format": "IDEA0", "ID": "89e56619-4059-4e53-9fda-6fb7fa841284", "DetectTime": "2023-10-30T14:14:53.116329+02:00", "EventTime": "2023-10-30T14:14:53.116344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CNK9G71elAjxYfzsB6"]} -{"Format": "IDEA0", "ID": "77a28ec4-2d47-44ff-907e-e17e9a6e6a3d", "DetectTime": "2023-10-30T14:14:53.139384+02:00", "EventTime": "2023-10-30T14:14:53.139401+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["ChJuXYqlKLap0xjTd"]} -{"Format": "IDEA0", "ID": "8b3d4652-3225-4603-9866-0d5fa08b8e6a", "DetectTime": "2023-10-30T14:14:53.159677+02:00", "EventTime": "2023-10-30T14:14:53.159687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C7ureE1p6lrYt6lxAf"]} -{"Format": "IDEA0", "ID": "78260ed4-468b-415b-bf37-8ff7d9e30eee", "DetectTime": "2023-10-30T14:14:53.175203+02:00", "EventTime": "2023-10-30T14:14:53.175213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CB5TZz2DTaCjLMkmI2"]} -{"Format": "IDEA0", "ID": "849c6177-d792-4f88-9201-bf36aa8fabbd", "DetectTime": "2023-10-30T14:14:53.190438+02:00", "EventTime": "2023-10-30T14:14:53.190448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CSt0U94OkzgXH3U77"]} -{"Format": "IDEA0", "ID": "a2523f6c-e426-4609-9ba9-31239f6e889a", "DetectTime": "2023-10-30T14:14:53.206704+02:00", "EventTime": "2023-10-30T14:14:53.206719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CBDbf11xWEKrRDrEqe"]} -{"Format": "IDEA0", "ID": "0ada733b-bcfa-48d6-ab17-eb1ae4a5bb54", "DetectTime": "2023-10-30T14:14:53.223017+02:00", "EventTime": "2023-10-30T14:14:53.223029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C1gIka4FSFlv0ZslAi"]} -{"Format": "IDEA0", "ID": "eace5781-7fdd-4f75-8644-88b39bee07ec", "DetectTime": "2023-10-30T14:14:53.238203+02:00", "EventTime": "2023-10-30T14:14:53.238216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CoXILn4TOhH7NRHtjf"]} -{"Format": "IDEA0", "ID": "4c6a5719-b166-47dd-9916-7380880807ed", "DetectTime": "2023-10-30T14:14:53.256070+02:00", "EventTime": "2023-10-30T14:14:53.256081+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CZ6WZkQAx7ENOK1j"]} -{"Format": "IDEA0", "ID": "fcfd2d7f-1a66-4c64-adcf-fd850aa0ec5d", "DetectTime": "2023-10-30T14:14:53.277706+02:00", "EventTime": "2023-10-30T14:14:53.277719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CWDVm4GIPNp4C9RZc"]} -{"Format": "IDEA0", "ID": "d54eeeeb-4a78-438b-8afd-ae4f11e4a7f1", "DetectTime": "2023-10-30T14:14:53.293220+02:00", "EventTime": "2023-10-30T14:14:53.293235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C4MRyp4Bd6g5ZlF7h2"]} -{"Format": "IDEA0", "ID": "285b9d1f-488e-4edb-ab16-2a4aa8c64187", "DetectTime": "2023-10-30T14:14:53.315179+02:00", "EventTime": "2023-10-30T14:14:53.315195+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CB27i022Nv1SS0wVwj"]} -{"Format": "IDEA0", "ID": "c86f1edd-82e2-4b95-9b7c-d641cbd5f0a2", "DetectTime": "2023-10-30T14:14:53.337211+02:00", "EventTime": "2023-10-30T14:14:53.337227+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CkLf9h2qBviz3cJrZf"]} -{"Format": "IDEA0", "ID": "4fe83f6e-5436-43d1-9966-29f182c4df8e", "DetectTime": "2023-10-30T14:14:53.359173+02:00", "EventTime": "2023-10-30T14:14:53.359189+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CSuQL11KBjMYXKYc5d"]} -{"Format": "IDEA0", "ID": "ee69cf7d-9910-4455-a933-0cd3b26c97c2", "DetectTime": "2023-10-30T14:14:53.379851+02:00", "EventTime": "2023-10-30T14:14:53.379862+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Ctj9FhpVieuzcsir2"]} -{"Format": "IDEA0", "ID": "134c16ce-b6a3-41d8-94b4-5954a6023869", "DetectTime": "2023-10-30T14:14:53.399611+02:00", "EventTime": "2023-10-30T14:14:53.399627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CtP22O2FvZNMXjMpEg"]} -{"Format": "IDEA0", "ID": "83f8fb4d-3905-4492-93eb-0d8d80eda1d1", "DetectTime": "2023-10-30T14:14:53.421882+02:00", "EventTime": "2023-10-30T14:14:53.421896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CZ3LQ7ivlgbuRYXTf"]} -{"Format": "IDEA0", "ID": "77b7657b-261c-461a-86b5-12dee7becb70", "DetectTime": "2023-10-30T14:14:53.443543+02:00", "EventTime": "2023-10-30T14:14:53.443558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CGaY7w3qDuxR2cCNf9"]} -{"Format": "IDEA0", "ID": "7b1e16e5-5b14-44ca-a717-98eee4208b55", "DetectTime": "2023-10-30T14:14:53.466119+02:00", "EventTime": "2023-10-30T14:14:53.466133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Clb1we31xFl6OYEBgh"]} -{"Format": "IDEA0", "ID": "82ff42dc-290d-4a10-9fc8-048f12aeeb13", "DetectTime": "2023-10-30T14:14:53.485208+02:00", "EventTime": "2023-10-30T14:14:53.485228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CMOq7z1cL5Kg4ZoF2f"]} -{"Format": "IDEA0", "ID": "bc9a2b30-328e-41c0-8b37-74681580a8d1", "DetectTime": "2023-10-30T14:14:53.506576+02:00", "EventTime": "2023-10-30T14:14:53.506591+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CcGTSf1iRuvPAimuCa"]} -{"Format": "IDEA0", "ID": "c3b095a3-3188-4135-9ad0-f2db104baaee", "DetectTime": "2023-10-30T14:14:53.537264+02:00", "EventTime": "2023-10-30T14:14:53.537281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["Cbx7TWyLExOuIhF9g"]} -{"Format": "IDEA0", "ID": "71630b46-f494-46dd-9cba-87f8730ecf2b", "DetectTime": "2023-10-30T14:14:53.558938+02:00", "EventTime": "2023-10-30T14:14:53.558953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CoFSqL21m31qMwJvs1"]} -{"Format": "IDEA0", "ID": "c6cb3660-6955-4655-b0cd-b863a4219b69", "DetectTime": "2023-10-30T14:14:53.580457+02:00", "EventTime": "2023-10-30T14:14:53.580472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CvJnbL1IoNt6vMoNkl"]} -{"Format": "IDEA0", "ID": "962a19c0-8508-49c9-a0d4-e0cb6de55364", "DetectTime": "2023-10-30T14:14:53.604491+02:00", "EventTime": "2023-10-30T14:14:53.604515+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C1j7oJ2SIqzdKluSak"]} -{"Format": "IDEA0", "ID": "79d515fd-9915-4d16-92ac-84a3e94dafed", "DetectTime": "2023-10-30T14:14:53.629210+02:00", "EventTime": "2023-10-30T14:14:53.629225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CsvhbM2qp4CwqcKpy7"]} -{"Format": "IDEA0", "ID": "3d27cb21-e12f-4bbd-b1cc-de6ab734ed4f", "DetectTime": "2023-10-30T14:14:53.651655+02:00", "EventTime": "2023-10-30T14:14:53.651671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CHCyVY2f2kGSAIYwJb"]} -{"Format": "IDEA0", "ID": "7d97a039-a716-42c0-8138-0249d82df9b2", "DetectTime": "2023-10-30T14:14:53.671003+02:00", "EventTime": "2023-10-30T14:14:53.671020+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cm6Qc83CUhXbv4CiR2"]} -{"Format": "IDEA0", "ID": "101eaab4-3379-424a-933e-ffc76320a4df", "DetectTime": "2023-10-30T14:14:53.691869+02:00", "EventTime": "2023-10-30T14:14:53.691881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CFy8xvXDwWSxVKNz8"]} -{"Format": "IDEA0", "ID": "5c8cd413-d179-4fb9-a2a0-9eda4aff8592", "DetectTime": "2023-10-30T14:14:53.709614+02:00", "EventTime": "2023-10-30T14:14:53.709624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CydWbafnGIKXXXgc6"]} -{"Format": "IDEA0", "ID": "07b8a135-75f7-4c13-ae6c-bd623bc7bf2d", "DetectTime": "2023-10-30T14:14:53.738804+02:00", "EventTime": "2023-10-30T14:14:53.738821+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CXB7xg3EZDwLvjMyY"]} -{"Format": "IDEA0", "ID": "31719fa6-a436-4a01-b156-d3dfe07813c2", "DetectTime": "2023-10-30T14:14:53.760921+02:00", "EventTime": "2023-10-30T14:14:53.760935+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CpiGJ71o48ESD71ktd"]} -{"Format": "IDEA0", "ID": "4d1d46c4-99a1-4043-8bcb-9836f2b2c48f", "DetectTime": "2023-10-30T14:14:53.776862+02:00", "EventTime": "2023-10-30T14:14:53.776876+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CdXRsX3D1P4L4VgISc"]} -{"Format": "IDEA0", "ID": "c40db559-cac8-47fb-9669-2ad388beef73", "DetectTime": "2023-10-30T14:14:53.793360+02:00", "EventTime": "2023-10-30T14:14:53.793370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CEahlM33xHXY6t3QXi"]} -{"Format": "IDEA0", "ID": "8b6ea0b6-2915-4444-b874-860508bd4147", "DetectTime": "2023-10-30T14:14:53.809063+02:00", "EventTime": "2023-10-30T14:14:53.809075+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["ClrsHm4TabkQN8JM1e"]} -{"Format": "IDEA0", "ID": "69d5989e-c10a-4ba3-bd36-c6f52f28c88c", "DetectTime": "2023-10-30T14:14:53.832862+02:00", "EventTime": "2023-10-30T14:14:53.832880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CZOGEB3opBLJri6vwa"]} -{"Format": "IDEA0", "ID": "709492c2-683d-4031-a7f9-71e1c94d56be", "DetectTime": "2023-10-30T14:14:53.861735+02:00", "EventTime": "2023-10-30T14:14:53.861754+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CxhissnPw3Y1LWi58"]} -{"Format": "IDEA0", "ID": "2123ad82-66fb-4bda-9fab-d172cacd0ec3", "DetectTime": "2023-10-30T14:14:53.878512+02:00", "EventTime": "2023-10-30T14:14:53.878530+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CYxbIEagWCBf8wH55"]} -{"Format": "IDEA0", "ID": "f22480f4-1cbf-4826-a6b9-e23b7698b6dd", "DetectTime": "2023-10-30T14:14:53.909582+02:00", "EventTime": "2023-10-30T14:14:53.909599+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVF6Sm3YTli5CRVEb7"]} -{"Format": "IDEA0", "ID": "7b24cbb4-71f3-49bd-851d-9be6ba3993d2", "DetectTime": "2023-10-30T14:14:53.921782+02:00", "EventTime": "2023-10-30T14:14:53.921792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cdfu8v2Sx6dvHEj756"]} -{"Format": "IDEA0", "ID": "a9de2696-0301-48de-b98e-d146244b6966", "DetectTime": "2023-10-30T14:14:53.933333+02:00", "EventTime": "2023-10-30T14:14:53.933344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["Clp78l26KuWcpPq7A5"]} -{"Format": "IDEA0", "ID": "1d5f31a5-3820-486c-a22d-25e32810cd8e", "DetectTime": "2023-10-30T14:14:53.952772+02:00", "EventTime": "2023-10-30T14:14:53.952783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CqBYeQqVeon9XM4nl"]} -{"Format": "IDEA0", "ID": "c94420fb-9fa1-4612-b753-cf9135f3480c", "DetectTime": "2023-10-30T14:14:53.964398+02:00", "EventTime": "2023-10-30T14:14:53.964414+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CvH9994fnwxtALjVYa"]} -{"Format": "IDEA0", "ID": "184eaa46-6fd5-4ce8-a248-b077eb492ddd", "DetectTime": "2023-10-30T14:14:53.977223+02:00", "EventTime": "2023-10-30T14:14:53.977233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CSD1Jm2TG4XViEzqqa"]} -{"Format": "IDEA0", "ID": "9018638c-d766-47b8-8df9-dad2fa06510e", "DetectTime": "2023-10-30T14:14:53.988358+02:00", "EventTime": "2023-10-30T14:14:53.988373+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CGWmS84mkh6CRoAgc"]} -{"Format": "IDEA0", "ID": "af3ffca9-5f63-49a8-86e2-2082702d2953", "DetectTime": "2023-10-30T14:14:53.999780+02:00", "EventTime": "2023-10-30T14:14:53.999791+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CGtcua4t8gNi1VdF69"]} -{"Format": "IDEA0", "ID": "00581b13-38c6-4ba7-82f1-bd0ab4c19df2", "DetectTime": "2023-10-30T14:14:54.011713+02:00", "EventTime": "2023-10-30T14:14:54.011725+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CA3j2e1C636Adpxedk"]} -{"Format": "IDEA0", "ID": "087fc7aa-ae23-447f-9d7f-eaea27133d91", "DetectTime": "2023-10-30T14:14:54.023287+02:00", "EventTime": "2023-10-30T14:14:54.023298+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CajEx98qqZQLjUKv4"]} -{"Format": "IDEA0", "ID": "7828e210-3b91-4d2f-a9aa-e1bbec7f0d11", "DetectTime": "2023-10-30T14:14:54.034350+02:00", "EventTime": "2023-10-30T14:14:54.034368+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CnhLA12W306BFumJvi"]} -{"Format": "IDEA0", "ID": "378e34fa-cd5b-4857-8f1a-24056ad87fea", "DetectTime": "2023-10-30T14:14:54.047949+02:00", "EventTime": "2023-10-30T14:14:54.047965+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CuuIFf2LGoN5V44FF2"]} -{"Format": "IDEA0", "ID": "941e16b2-b579-4be3-ae58-2eb4413631d9", "DetectTime": "2023-10-30T14:14:54.064154+02:00", "EventTime": "2023-10-30T14:14:54.064171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CyZgVDIF3fI8VmH7d"]} -{"Format": "IDEA0", "ID": "a991619a-412c-48ff-a43b-4a1e0227c6e3", "DetectTime": "2023-10-30T14:14:54.079289+02:00", "EventTime": "2023-10-30T14:14:54.079304+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CACVnNUV8ijriyE0a"]} -{"Format": "IDEA0", "ID": "0acd317b-289d-40a0-aeac-23ec867e0587", "DetectTime": "2023-10-30T14:14:54.094927+02:00", "EventTime": "2023-10-30T14:14:54.094947+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CKm8W73bkQ5LdybzNg"]} -{"Format": "IDEA0", "ID": "e9f18023-a4a6-475f-903a-5be97d2293f9", "DetectTime": "2023-10-30T14:14:54.110597+02:00", "EventTime": "2023-10-30T14:14:54.110614+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CFSfIW1TlnhYbffEg1"]} -{"Format": "IDEA0", "ID": "2b3bbf1b-8b75-429e-adf6-50744c7d983f", "DetectTime": "2023-10-30T14:14:54.126091+02:00", "EventTime": "2023-10-30T14:14:54.126102+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CqHBLKjlAgCg476Vh"]} -{"Format": "Json", "ID": "2b3bbf1b-8b75-429e-adf6-50744c7d983f", "DetectTime": "2023-10-30T14:14:54.126091+02:00", "EventTime": "2023-10-30T14:14:54.126102+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-10T23:47:28.398067+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 238. (real time 2023/10/30 14:14:54.197880)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "8c7bee3f-7fbe-4d56-a076-efd62e6e1673", "DetectTime": "2023-10-30T14:14:54.203061+02:00", "EventTime": "2023-10-30T14:14:54.203076+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CMDGtSAWqr9woYZe3"]} -{"Format": "IDEA0", "ID": "19c56366-bca5-4a09-ab0a-520815812212", "DetectTime": "2023-10-30T14:14:54.218018+02:00", "EventTime": "2023-10-30T14:14:54.218033+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CwcbD43bRGjVwrdHb4"]} -{"Format": "IDEA0", "ID": "5026e27f-930f-4cc6-b729-5c03e261a4d1", "DetectTime": "2023-10-30T14:14:54.230922+02:00", "EventTime": "2023-10-30T14:14:54.230938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["Cw6s5M6dCoOxnjyc5"]} -{"Format": "IDEA0", "ID": "f1ebcdf5-710d-4965-aae7-db151faf71a4", "DetectTime": "2023-10-30T14:14:54.242866+02:00", "EventTime": "2023-10-30T14:14:54.242880+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CtFbAS2KWq20LASJA2"]} -{"Format": "IDEA0", "ID": "ee7fbe9e-8e3e-4684-9012-fdc336d51f83", "DetectTime": "2023-10-30T14:14:54.257978+02:00", "EventTime": "2023-10-30T14:14:54.257993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CHGqsv3MZwGLxIGiHj"]} -{"Format": "IDEA0", "ID": "6d9898ef-552d-4b97-93f3-78c36b064789", "DetectTime": "2023-10-30T14:14:54.273676+02:00", "EventTime": "2023-10-30T14:14:54.273692+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CFch6ekakhzrobGej"]} -{"Format": "IDEA0", "ID": "d89afa88-0249-441b-a22a-2afc761a27d0", "DetectTime": "2023-10-30T14:14:54.288555+02:00", "EventTime": "2023-10-30T14:14:54.288571+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CEklnA2IHyV7Rl7gP6"]} -{"Format": "IDEA0", "ID": "aad0a30a-89b4-45ff-b2fc-d021f2bbf030", "DetectTime": "2023-10-30T14:14:54.313161+02:00", "EventTime": "2023-10-30T14:14:54.313173+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C7ni266h4ROgIRaKb"]} -{"Format": "IDEA0", "ID": "68e0948f-e554-4dc3-b63b-bcb7668da02a", "DetectTime": "2023-10-30T14:14:54.325584+02:00", "EventTime": "2023-10-30T14:14:54.325594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CReDr4Pox3WeONkze"]} -{"Format": "IDEA0", "ID": "43f68572-e123-4166-8df0-deda04d802b9", "DetectTime": "2023-10-30T14:14:54.338014+02:00", "EventTime": "2023-10-30T14:14:54.338026+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CVbXfC4MqRpIKVlLT6"]} -{"Format": "IDEA0", "ID": "38c7e23d-80c1-433d-9abf-38ecae4315b9", "DetectTime": "2023-10-30T14:14:54.351540+02:00", "EventTime": "2023-10-30T14:14:54.351565+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CxOntL2cqHQ73Wkaij"]} -{"Format": "IDEA0", "ID": "9c58c62e-dd30-441f-b20a-4e70a8186898", "DetectTime": "2023-10-30T14:14:54.366659+02:00", "EventTime": "2023-10-30T14:14:54.366675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CgAlSD1VN7NwypGnm4"]} -{"Format": "IDEA0", "ID": "8e61ce44-1838-439e-b7bc-6a80270dda91", "DetectTime": "2023-10-30T14:14:54.395771+02:00", "EventTime": "2023-10-30T14:14:54.395787+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Ci2bna1rQnraxGt6l6"]} -{"Format": "IDEA0", "ID": "7aa68617-37ad-48ce-8669-1b5f5a940fc5", "DetectTime": "2023-10-30T14:14:54.411943+02:00", "EventTime": "2023-10-30T14:14:54.411958+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CeWunb3LkGzTweY3kg"]} -{"Format": "IDEA0", "ID": "fc5311f4-2ea1-49b9-b08b-2590be4a2dbb", "DetectTime": "2023-10-30T14:14:54.427864+02:00", "EventTime": "2023-10-30T14:14:54.427879+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CCG8jJ2HNqBk7wjv9"]} -{"Format": "IDEA0", "ID": "d284e5e2-675a-4454-b06f-ccca82461391", "DetectTime": "2023-10-30T14:14:54.445528+02:00", "EventTime": "2023-10-30T14:14:54.445543+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CpbOEE412PzNwkr1g2"]} -{"Format": "IDEA0", "ID": "f510c9fa-e3e0-4db9-8fcb-9da8e2420550", "DetectTime": "2023-10-30T14:14:54.458667+02:00", "EventTime": "2023-10-30T14:14:54.458678+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CauveQ3zySVIaP5oNl"]} -{"Format": "IDEA0", "ID": "04101223-441d-470b-a17a-1dc938d86b5c", "DetectTime": "2023-10-30T14:14:54.470246+02:00", "EventTime": "2023-10-30T14:14:54.470258+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C3uKqi2ekFAsIC6Tu4"]} -{"Format": "IDEA0", "ID": "49372e74-98cd-49a3-8b1e-644b7e1f73cd", "DetectTime": "2023-10-30T14:14:54.498419+02:00", "EventTime": "2023-10-30T14:14:54.498433+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CXxhUdQ1ovOFn6m53"]} -{"Format": "IDEA0", "ID": "cd64b8af-b0c3-4455-b023-f46999d48ea1", "DetectTime": "2023-10-30T14:14:54.511866+02:00", "EventTime": "2023-10-30T14:14:54.511877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CJpAaF1mcQvkgsagNe"]} -{"Format": "IDEA0", "ID": "af576907-1b3f-4a79-84f0-49736d7060c1", "DetectTime": "2023-10-30T14:14:54.526008+02:00", "EventTime": "2023-10-30T14:14:54.526019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C0zU7J30cMzXgeKFsg"]} -{"Format": "IDEA0", "ID": "7955ee65-651b-4dd9-99f6-f175791400be", "DetectTime": "2023-10-30T14:14:54.541438+02:00", "EventTime": "2023-10-30T14:14:54.541453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CMguYd3fNr9uVide58"]} -{"Format": "IDEA0", "ID": "ce2af224-b6f6-4fc5-9604-eedefb6968f9", "DetectTime": "2023-10-30T14:14:54.566454+02:00", "EventTime": "2023-10-30T14:14:54.566466+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CQY6XZ1v5UIklmqpu2"]} -{"Format": "IDEA0", "ID": "df0ddf96-4cb9-4e2b-bd28-1f58d3cb2853", "DetectTime": "2023-10-30T14:14:54.579623+02:00", "EventTime": "2023-10-30T14:14:54.579641+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CEozbH2UPzTBYA8ah"]} -{"Format": "IDEA0", "ID": "06b6a866-bdbd-4ef1-8cd7-f006442ce894", "DetectTime": "2023-10-30T14:14:54.608699+02:00", "EventTime": "2023-10-30T14:14:54.608710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["C8nl2H1ZKFLaLoEySk"]} -{"Format": "IDEA0", "ID": "fbd8b8f4-c005-455f-9d95-873f3f7c2636", "DetectTime": "2023-10-30T14:14:54.622149+02:00", "EventTime": "2023-10-30T14:14:54.622159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CYhoZq2qAYtK5RPUJ2"]} -{"Format": "IDEA0", "ID": "6bd5d767-156d-403a-a034-8fd3a8dc6cf0", "DetectTime": "2023-10-30T14:14:54.635741+02:00", "EventTime": "2023-10-30T14:14:54.635757+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C1tuLB43a5bVjNtqv2"]} -{"Format": "IDEA0", "ID": "7e509fa3-0e1d-4a92-88c4-fa54bc50a307", "DetectTime": "2023-10-30T14:14:54.648717+02:00", "EventTime": "2023-10-30T14:14:54.648727+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTCRvQ2t9sVmvISIRc"]} -{"Format": "IDEA0", "ID": "e2058651-7ce1-469c-81c0-810c2cf5246c", "DetectTime": "2023-10-30T14:14:54.676547+02:00", "EventTime": "2023-10-30T14:14:54.676562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CKmsrwuZF69AsoVF3"]} -{"Format": "IDEA0", "ID": "824ad089-3fcb-4a83-ba5d-8e290e702668", "DetectTime": "2023-10-30T14:14:54.691769+02:00", "EventTime": "2023-10-30T14:14:54.691784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C9bJ194uH5qmhw2o6f"]} -{"Format": "IDEA0", "ID": "912fab24-27e0-4469-b667-12e5c69a8a20", "DetectTime": "2023-10-30T14:14:54.709671+02:00", "EventTime": "2023-10-30T14:14:54.709686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CnZiDB10uvorieQHcl"]} -{"Format": "IDEA0", "ID": "ca1f217d-440d-41c1-8469-816417cc5f07", "DetectTime": "2023-10-30T14:14:54.724753+02:00", "EventTime": "2023-10-30T14:14:54.724765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIrFx84LWDspLirOlc"]} -{"Format": "IDEA0", "ID": "85899730-0db9-4aae-a456-9e65254cfb97", "DetectTime": "2023-10-30T14:14:54.740629+02:00", "EventTime": "2023-10-30T14:14:54.740644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CLbQJ8Xri5KEwMRL9"]} -{"Format": "IDEA0", "ID": "da8b0d28-6c79-45a6-8d94-1ec9ca8fc6bf", "DetectTime": "2023-10-30T14:14:54.757425+02:00", "EventTime": "2023-10-30T14:14:54.757440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CJdaGl36yoCEJjgLme"]} -{"Format": "IDEA0", "ID": "28b9d859-fc59-4afa-bf11-ea57c9eb5461", "DetectTime": "2023-10-30T14:14:54.775521+02:00", "EventTime": "2023-10-30T14:14:54.775536+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CoUAaw27JTfHrU3s09"]} -{"Format": "IDEA0", "ID": "601f3020-2794-4c98-bd0f-105a72480894", "DetectTime": "2023-10-30T14:14:54.791761+02:00", "EventTime": "2023-10-30T14:14:54.791778+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cs0O2N1pmoX3P1itpi"]} -{"Format": "IDEA0", "ID": "3966b1eb-209c-4577-ac75-354b261b1368", "DetectTime": "2023-10-30T14:14:54.835592+02:00", "EventTime": "2023-10-30T14:14:54.835606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CHYPNS2oaCCXxUEcxi"]} -{"Format": "IDEA0", "ID": "13ccd2be-78c0-4cd9-99e2-d54f38058df9", "DetectTime": "2023-10-30T14:14:54.852269+02:00", "EventTime": "2023-10-30T14:14:54.852282+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CE0O1936DvfofyeWig"]} -{"Format": "IDEA0", "ID": "b3df17c0-9095-47ee-b25a-7c8ceb8eda92", "DetectTime": "2023-10-30T14:14:54.898724+02:00", "EventTime": "2023-10-30T14:14:54.898742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPe5j1egEna3sMm4f"]} -{"Format": "IDEA0", "ID": "b1225e5f-4ebe-4cbc-8559-3cc42a45e8c2", "DetectTime": "2023-10-30T14:14:54.917848+02:00", "EventTime": "2023-10-30T14:14:54.917863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["Cr363T1SKnKv0vd5Oj"]} -{"Format": "IDEA0", "ID": "d201f9d8-af66-47d7-86cc-2436316c6d1f", "DetectTime": "2023-10-30T14:14:54.935465+02:00", "EventTime": "2023-10-30T14:14:54.935480+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C5cwTx1ZQjBm04jFpa"]} -{"Format": "IDEA0", "ID": "f3ee5e43-8606-40e7-9a2e-78cf62683da3", "DetectTime": "2023-10-30T14:14:54.977307+02:00", "EventTime": "2023-10-30T14:14:54.977323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CtY1A31R7EN6cBeE9k"]} -{"Format": "IDEA0", "ID": "03e466a1-0f7b-44df-97f7-9dcac978d0bc", "DetectTime": "2023-10-30T14:14:54.993045+02:00", "EventTime": "2023-10-30T14:14:54.993061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CFe6wiwkGavW8rlUg"]} -{"Format": "IDEA0", "ID": "b27309ba-4cf6-44e6-afb2-d74b26f2a587", "DetectTime": "2023-10-30T14:14:55.036292+02:00", "EventTime": "2023-10-30T14:14:55.036309+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CPomQS3XJSdWQ04zq1"]} -{"Format": "IDEA0", "ID": "ef0ab74e-a865-4ddf-b839-308203614183", "DetectTime": "2023-10-30T14:14:55.053411+02:00", "EventTime": "2023-10-30T14:14:55.053427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CLTKM347Yhu5ZgCtKj"]} -{"Format": "IDEA0", "ID": "2336163d-c89f-424e-b1e8-dc9d5767cb84", "DetectTime": "2023-10-30T14:14:55.086411+02:00", "EventTime": "2023-10-30T14:14:55.086428+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Ci74yF1h4hyYDstOli"]} -{"Format": "IDEA0", "ID": "e3dd9174-adc5-406b-827f-8e16f1080106", "DetectTime": "2023-10-30T14:14:55.100791+02:00", "EventTime": "2023-10-30T14:14:55.100807+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CiTkxv38EB03PLwTpj"]} -{"Format": "IDEA0", "ID": "284ca905-43c9-4784-b269-e02a02319654", "DetectTime": "2023-10-30T14:14:55.114087+02:00", "EventTime": "2023-10-30T14:14:55.114099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CJvP9s1LuttJKVLt61"]} -{"Format": "IDEA0", "ID": "e40f9ac8-c298-4d1e-841d-5651aec076d1", "DetectTime": "2023-10-30T14:14:55.127584+02:00", "EventTime": "2023-10-30T14:14:55.127598+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CMTo4M2v1NcZDYfuxf"]} -{"Format": "IDEA0", "ID": "69e9c495-18c3-415b-bb38-71658b5ceb9e", "DetectTime": "2023-10-30T14:14:55.140651+02:00", "EventTime": "2023-10-30T14:14:55.140668+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C65Vh13SfucRHqxj7f"]} -{"Format": "IDEA0", "ID": "03c17c69-3089-47c6-a902-d7eb11d8c440", "DetectTime": "2023-10-30T14:14:55.152672+02:00", "EventTime": "2023-10-30T14:14:55.152683+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CXEiYv37YMnyEMc8f3"]} -{"Format": "IDEA0", "ID": "292398d5-3a12-40e9-8234-c784a9ccbda5", "DetectTime": "2023-10-30T14:14:55.189544+02:00", "EventTime": "2023-10-30T14:14:55.189557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CDrNWR10SPnNeLo3Ca"]} -{"Format": "IDEA0", "ID": "17e2b109-9fc6-400d-a408-6ddd6f9510a9", "DetectTime": "2023-10-30T14:14:55.203998+02:00", "EventTime": "2023-10-30T14:14:55.204010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyFO4M2Y6XTBMOQT74"]} -{"Format": "IDEA0", "ID": "f2b434f0-0772-42ef-86cf-f864a1ad2951", "DetectTime": "2023-10-30T14:14:55.215631+02:00", "EventTime": "2023-10-30T14:14:55.215642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CZX5l332nJGSBmYxZ"]} -{"Format": "Json", "ID": "f2b434f0-0772-42ef-86cf-f864a1ad2951", "DetectTime": "2023-10-30T14:14:55.215631+02:00", "EventTime": "2023-10-30T14:14:55.215642+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:18:14.823871+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:14:55.313083)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a0f11563-ca01-46c8-a0e8-7ad7e97eeb9d", "DetectTime": "2023-10-30T14:14:55.317003+02:00", "EventTime": "2023-10-30T14:14:55.317013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CrHKUy3yHtDKIc5HWd"]} -{"Format": "IDEA0", "ID": "b8d51c81-0ba0-4104-93a2-1da642107bd6", "DetectTime": "2023-10-30T14:14:55.329248+02:00", "EventTime": "2023-10-30T14:14:55.329259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CElXJg1C7H03XEA999"]} -{"Format": "IDEA0", "ID": "9cb84fc7-9cd6-4dde-833d-b26d9b04efc0", "DetectTime": "2023-10-30T14:14:55.345220+02:00", "EventTime": "2023-10-30T14:14:55.345235+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CWwoUg4LxqCvBCQ8d9"]} -{"Format": "IDEA0", "ID": "3d3712a7-1e4c-4484-96ce-95319770708f", "DetectTime": "2023-10-30T14:14:55.361857+02:00", "EventTime": "2023-10-30T14:14:55.361872+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CrLgTq1mnagRqQivFe"]} -{"Format": "IDEA0", "ID": "bb1b17bf-0d00-48c6-8e42-83fa6ed5190d", "DetectTime": "2023-10-30T14:14:55.375562+02:00", "EventTime": "2023-10-30T14:14:55.375573+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C9X8Ww3KMK0gQDzyM9"]} -{"Format": "IDEA0", "ID": "020cb2fb-09ff-4a94-b235-88b41ebf2f47", "DetectTime": "2023-10-30T14:14:55.415134+02:00", "EventTime": "2023-10-30T14:14:55.415150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CDodATk6u9zEZIigb"]} -{"Format": "IDEA0", "ID": "2918a03e-bf08-4ddc-8c39-01faee372104", "DetectTime": "2023-10-30T14:14:55.428600+02:00", "EventTime": "2023-10-30T14:14:55.428611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CARFRH3ej5MORvZMv6"]} -{"Format": "IDEA0", "ID": "fbeb7b58-ab65-41fa-b834-5b2b30cf03ff", "DetectTime": "2023-10-30T14:14:55.445392+02:00", "EventTime": "2023-10-30T14:14:55.445407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CUoEmd2ZE5KKgF42u9"]} -{"Format": "IDEA0", "ID": "19ea48c5-8f17-494e-9bb3-ad188a11a15a", "DetectTime": "2023-10-30T14:14:55.461877+02:00", "EventTime": "2023-10-30T14:14:55.461897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CupXLvKt3Ou4AhGZ3"]} -{"Format": "IDEA0", "ID": "6a18444c-7735-45c4-866a-a9d3ebf99726", "DetectTime": "2023-10-30T14:14:55.501411+02:00", "EventTime": "2023-10-30T14:14:55.501427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CdHuwO3CQj3VdhLqsh"]} -{"Format": "IDEA0", "ID": "b849675d-1d65-4a01-a69e-1a7930acc7c5", "DetectTime": "2023-10-30T14:14:55.517990+02:00", "EventTime": "2023-10-30T14:14:55.518000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CdwjHV2rHI28bPEgSc"]} -{"Format": "IDEA0", "ID": "4675fdfd-1cd4-4547-b466-53ddcb5a1677", "DetectTime": "2023-10-30T14:14:55.531067+02:00", "EventTime": "2023-10-30T14:14:55.531086+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CMDZSp19GmFgRQgkGg"]} -{"Format": "IDEA0", "ID": "ace86480-a99b-49b2-a93a-893d79b1cb74", "DetectTime": "2023-10-30T14:14:55.543122+02:00", "EventTime": "2023-10-30T14:14:55.543132+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CtpvzI3vcU4EiTr8oa"]} -{"Format": "IDEA0", "ID": "00247109-f99f-4ea8-84ca-669b2fc9bbd1", "DetectTime": "2023-10-30T14:14:55.556108+02:00", "EventTime": "2023-10-30T14:14:55.556118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CBEyIS1GvVpqutbMUd"]} -{"Format": "IDEA0", "ID": "2ad82a41-5986-40de-8767-f18e77043e43", "DetectTime": "2023-10-30T14:14:55.571049+02:00", "EventTime": "2023-10-30T14:14:55.571065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CnDdni1JTU5SVqMxUb"]} -{"Format": "IDEA0", "ID": "fac6955c-029d-4e62-ad05-8c421c876cfc", "DetectTime": "2023-10-30T14:14:55.586508+02:00", "EventTime": "2023-10-30T14:14:55.586518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CF6YQ02ZjJLYAdTtkb"]} -{"Format": "IDEA0", "ID": "052f7261-0101-4748-ac32-ec88178b555a", "DetectTime": "2023-10-30T14:14:55.614670+02:00", "EventTime": "2023-10-30T14:14:55.614682+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cm2LqE4pDfYSaNMuEe"]} -{"Format": "IDEA0", "ID": "a2eba10d-bf56-45c2-a5d8-1bcabb206c41", "DetectTime": "2023-10-30T14:14:55.627929+02:00", "EventTime": "2023-10-30T14:14:55.627938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CAauh9SwKM7NxkFZ7"]} -{"Format": "IDEA0", "ID": "19ac5221-1740-4be2-a73c-cf1489e13391", "DetectTime": "2023-10-30T14:14:55.661359+02:00", "EventTime": "2023-10-30T14:14:55.661370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.41.32.90 ", "ContentType": "text/plain"}], "uids": ["CwbRNCD2535fK8XU2"]} -{"Format": "IDEA0", "ID": "14e36340-95bf-4fa7-b7a3-13314767bd43", "DetectTime": "2023-10-30T14:14:55.679908+02:00", "EventTime": "2023-10-30T14:14:55.679924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 2.85.52.234 ", "ContentType": "text/plain"}], "uids": ["CePgPq3UPvO6s7l9d"]} -{"Format": "IDEA0", "ID": "8f6e7171-f273-496b-981b-b1397e8bbf6c", "DetectTime": "2023-10-30T14:14:55.696209+02:00", "EventTime": "2023-10-30T14:14:55.696220+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CudaIE1tlTDZR1kcQl"]} -{"Format": "IDEA0", "ID": "e19876f6-d136-4075-a7fa-1e775c2bfc3f", "DetectTime": "2023-10-30T14:14:55.726306+02:00", "EventTime": "2023-10-30T14:14:55.726319+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 107.214.174.97 ", "ContentType": "text/plain"}], "uids": ["CDb8Zy3zKoTCUXk5Ul"]} -{"Format": "IDEA0", "ID": "1951bac0-5485-4113-8e32-b5ff50a2ed8b", "DetectTime": "2023-10-30T14:14:55.746283+02:00", "EventTime": "2023-10-30T14:14:55.746302+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.207.14.96"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.207.14.96 ", "ContentType": "text/plain"}], "uids": ["CXzpUI1yhceK9vU8R8"]} -{"Format": "IDEA0", "ID": "fae7df3f-b2f5-476b-ad57-b546b3435d94", "DetectTime": "2023-10-30T14:14:55.768127+02:00", "EventTime": "2023-10-30T14:14:55.768137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CG0F8r0uHL692bpi8"]} -{"Format": "IDEA0", "ID": "9935370b-1c30-4326-9331-20e328c85093", "DetectTime": "2023-10-30T14:14:55.797568+02:00", "EventTime": "2023-10-30T14:14:55.797584+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CdLDif2Ra0OHYCqLej"]} -{"Format": "IDEA0", "ID": "7a273f10-20b5-41ae-9eb4-bcb1f4f296e6", "DetectTime": "2023-10-30T14:14:55.834140+02:00", "EventTime": "2023-10-30T14:14:55.834154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CQxG4r3T2R44TTusR3"]} -{"Format": "IDEA0", "ID": "0052603e-7ce3-439d-9cd4-8b6daf7abcc4", "DetectTime": "2023-10-30T14:14:55.851241+02:00", "EventTime": "2023-10-30T14:14:55.851252+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["C6z9FqSDQqpBd33Zj"]} -{"Format": "Json", "ID": "0052603e-7ce3-439d-9cd4-8b6daf7abcc4", "DetectTime": "2023-10-30T14:14:55.851241+02:00", "EventTime": "2023-10-30T14:14:55.851252+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:18:16.912625+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:14:55.919104)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3c999b26-0795-49ab-9533-727c45aa748a", "DetectTime": "2023-10-30T14:14:55.922903+02:00", "EventTime": "2023-10-30T14:14:55.922914+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CuQ9all6ESUOx95y7"]} -{"Format": "IDEA0", "ID": "e8284dd7-ee7d-44e1-9841-3fe1414d079f", "DetectTime": "2023-10-30T14:14:55.938365+02:00", "EventTime": "2023-10-30T14:14:55.938376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["C5pETQ1k1FkvQqJwG2"]} -{"Format": "IDEA0", "ID": "e7d0c873-b927-4ee9-9310-1279f8ac1c41", "DetectTime": "2023-10-30T14:14:55.965038+02:00", "EventTime": "2023-10-30T14:14:55.965052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["ClgJHq11E4uE1VEVc7"]} -{"Format": "IDEA0", "ID": "00952409-f769-4f34-b1d8-31fa8cc9e90c", "DetectTime": "2023-10-30T14:14:55.981157+02:00", "EventTime": "2023-10-30T14:14:55.981168+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["ClTbYo1nzKgMz0GtFg"]} -{"Format": "IDEA0", "ID": "4d882eef-08c6-4b94-bbbe-4257fda6fd1e", "DetectTime": "2023-10-30T14:14:56.013816+02:00", "EventTime": "2023-10-30T14:14:56.013832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CplAWJ3mUqdAnoLtLi"]} -{"Format": "IDEA0", "ID": "b2fbdb5f-404b-4489-851f-9dbf2fb01450", "DetectTime": "2023-10-30T14:14:56.033033+02:00", "EventTime": "2023-10-30T14:14:56.033048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C8xA8K1GuDMY51P688"]} -{"Format": "IDEA0", "ID": "54071bd6-670a-4aa0-b62e-194c7ebac383", "DetectTime": "2023-10-30T14:14:56.054126+02:00", "EventTime": "2023-10-30T14:14:56.054143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CUom5i4G5NgDiWUTzb"]} -{"Format": "IDEA0", "ID": "9fe8b1b4-1e70-4e53-bfaf-c1f67cfdaab7", "DetectTime": "2023-10-30T14:14:56.084767+02:00", "EventTime": "2023-10-30T14:14:56.084779+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cjfu0H1Kdb1zz8XDMe"]} -{"Format": "IDEA0", "ID": "00e7e7e1-b2d5-4527-aefc-af7dc3371e12", "DetectTime": "2023-10-30T14:14:56.104473+02:00", "EventTime": "2023-10-30T14:14:56.104488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cf5BypEdHwfp4IlLl"]} -{"Format": "IDEA0", "ID": "c380daee-f173-478e-9f50-1a5d44b30b00", "DetectTime": "2023-10-30T14:14:56.124434+02:00", "EventTime": "2023-10-30T14:14:56.124449+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CvI41l098SiDs5MF5"]} -{"Format": "IDEA0", "ID": "aff891ad-de83-4273-b9f6-2c5b251ed4cf", "DetectTime": "2023-10-30T14:14:56.144265+02:00", "EventTime": "2023-10-30T14:14:56.144280+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CSFHbZ2Wp8irZdsfi5"]} -{"Format": "IDEA0", "ID": "82c0eb43-d5af-4dfc-abf7-220c8186f4cc", "DetectTime": "2023-10-30T14:14:56.164971+02:00", "EventTime": "2023-10-30T14:14:56.164985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CJKF5YdJ4BWfGoT8k"]} -{"Format": "IDEA0", "ID": "b996ba1d-297d-44cb-8fc3-0fbe241afca0", "DetectTime": "2023-10-30T14:14:56.186039+02:00", "EventTime": "2023-10-30T14:14:56.186054+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["C5ubef2CVr8FI4cw5"]} -{"Format": "IDEA0", "ID": "be5600fc-ee2a-4e9d-893f-e3db4620ec54", "DetectTime": "2023-10-30T14:14:56.219184+02:00", "EventTime": "2023-10-30T14:14:56.219198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CBKlRk1MswZZN9Cgcj"]} -{"Format": "IDEA0", "ID": "67913b66-f182-402b-b04e-c476e415094e", "DetectTime": "2023-10-30T14:14:56.240556+02:00", "EventTime": "2023-10-30T14:14:56.240570+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C3jwp924fh68iHpJkf"]} -{"Format": "IDEA0", "ID": "4c539288-00ef-4386-ae4f-f05925d2e7ab", "DetectTime": "2023-10-30T14:14:56.261729+02:00", "EventTime": "2023-10-30T14:14:56.261743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C6Iecd3YAfwRP604g8"]} -{"Format": "IDEA0", "ID": "17a31968-7eb1-4558-8d75-45df5fa57554", "DetectTime": "2023-10-30T14:14:56.283346+02:00", "EventTime": "2023-10-30T14:14:56.283361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ClmYQQ3Er461dM7KB6"]} -{"Format": "IDEA0", "ID": "7a775244-a35e-46b7-93fc-d3744a275019", "DetectTime": "2023-10-30T14:14:56.305059+02:00", "EventTime": "2023-10-30T14:14:56.305074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Ca0MMt3a5U50wDhCvj"]} -{"Format": "IDEA0", "ID": "79d58a75-8279-4895-a3ad-e3fc1f5f150e", "DetectTime": "2023-10-30T14:14:56.323729+02:00", "EventTime": "2023-10-30T14:14:56.323743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CudaT3Bis6ib4Pms8"]} -{"Format": "IDEA0", "ID": "56b7a723-37ed-4c70-bc96-689bfdd8cedb", "DetectTime": "2023-10-30T14:14:56.353530+02:00", "EventTime": "2023-10-30T14:14:56.353546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["Cz6wjl2qiZDDm0xmh9"]} -{"Format": "IDEA0", "ID": "96fd835c-1476-4bd4-9f02-39a151960d12", "DetectTime": "2023-10-30T14:14:56.374915+02:00", "EventTime": "2023-10-30T14:14:56.374927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvITtV2HWBglg5cyJe"]} -{"Format": "IDEA0", "ID": "8ac8021d-83d3-4c3b-b1d6-42ea66bcf37b", "DetectTime": "2023-10-30T14:14:56.389224+02:00", "EventTime": "2023-10-30T14:14:56.389233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CXgQtqijOKjknquYl"]} -{"Format": "IDEA0", "ID": "ccf2447b-7963-4797-bb02-e00dab10b02f", "DetectTime": "2023-10-30T14:14:56.403058+02:00", "EventTime": "2023-10-30T14:14:56.403067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CNl5oU2zuY9dgd5yG"]} -{"Format": "IDEA0", "ID": "e3962a4f-c2de-476b-9326-ee2dc8b44c8a", "DetectTime": "2023-10-30T14:14:56.432912+02:00", "EventTime": "2023-10-30T14:14:56.432923+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["Cw3wK52S2DUvKXeYE6"]} -{"Format": "IDEA0", "ID": "f506d5fd-c614-47df-9353-0ff78724c81f", "DetectTime": "2023-10-30T14:14:56.452641+02:00", "EventTime": "2023-10-30T14:14:56.452652+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CIFO1p2hEVxXaOCqXi"]} -{"Format": "IDEA0", "ID": "9678a14e-5adf-46cf-8327-be7037a8c07f", "DetectTime": "2023-10-30T14:14:56.467224+02:00", "EventTime": "2023-10-30T14:14:56.467234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CVqvEM1BBDL96kWywk"]} -{"Format": "IDEA0", "ID": "638fd8f0-eeaa-4a9a-953c-8f94d680c8ce", "DetectTime": "2023-10-30T14:14:56.483727+02:00", "EventTime": "2023-10-30T14:14:56.483738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CCHGe0444Q62VPtj1d"]} -{"Format": "IDEA0", "ID": "25eeba2c-98dc-4377-bebb-e1329db92d96", "DetectTime": "2023-10-30T14:14:56.501258+02:00", "EventTime": "2023-10-30T14:14:56.501268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXKvBW11CTAYEBPFci"]} -{"Format": "IDEA0", "ID": "a87c3790-d2f8-460d-9238-724b11a47482", "DetectTime": "2023-10-30T14:14:56.518162+02:00", "EventTime": "2023-10-30T14:14:56.518177+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CcWN324Eh3D2CIXKFd"]} -{"Format": "IDEA0", "ID": "3b79da33-f816-40f1-8a12-47fd82a4a01b", "DetectTime": "2023-10-30T14:14:56.550478+02:00", "EventTime": "2023-10-30T14:14:56.550503+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["C4IrI43b0IIAXBh6Wa"]} -{"Format": "IDEA0", "ID": "997bcdbc-e386-4972-9c89-30841bd72664", "DetectTime": "2023-10-30T14:14:56.572818+02:00", "EventTime": "2023-10-30T14:14:56.572833+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CDG2NToKPB0kFUJF1"]} -{"Format": "IDEA0", "ID": "19f53c00-7220-4b26-a7d9-f28bbef3b33e", "DetectTime": "2023-10-30T14:14:56.594798+02:00", "EventTime": "2023-10-30T14:14:56.594812+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CkDwwf0WsvFawRlOc"]} -{"Format": "IDEA0", "ID": "99d6d9ba-a668-4edb-b7cd-50730cd6d06b", "DetectTime": "2023-10-30T14:14:56.615543+02:00", "EventTime": "2023-10-30T14:14:56.615560+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C9CPTp1lJb0vxNZ1V3"]} -{"Format": "IDEA0", "ID": "57cafc11-37ab-4323-9f8f-6b2247deee8f", "DetectTime": "2023-10-30T14:14:56.632652+02:00", "EventTime": "2023-10-30T14:14:56.632661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CeQurp4RzqA9GMRnP4"]} -{"Format": "IDEA0", "ID": "b308c678-575f-40c6-af83-174ad9d12f1b", "DetectTime": "2023-10-30T14:14:56.652954+02:00", "EventTime": "2023-10-30T14:14:56.652969+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["Cf3QWy1FXLDoLE3TKi"]} -{"Format": "IDEA0", "ID": "b5fa2ec9-2daf-4ce1-9a90-d4ff7c5e1ee8", "DetectTime": "2023-10-30T14:14:56.674176+02:00", "EventTime": "2023-10-30T14:14:56.674192+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C99UITjYVQxnF42R1"]} -{"Format": "IDEA0", "ID": "1fdee8be-23a2-4ea6-94ce-c761ef7dbd76", "DetectTime": "2023-10-30T14:14:56.694984+02:00", "EventTime": "2023-10-30T14:14:56.694999+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Ce1vPt4ZT4ewTKe3xd"]} -{"Format": "IDEA0", "ID": "6971fba6-4936-498a-b06e-611a70b44182", "DetectTime": "2023-10-30T14:14:56.716192+02:00", "EventTime": "2023-10-30T14:14:56.716209+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CVp2GK24JN3wxMk4tk"]} -{"Format": "IDEA0", "ID": "1d236ee1-4a76-4323-aeec-ab452296af66", "DetectTime": "2023-10-30T14:14:56.738219+02:00", "EventTime": "2023-10-30T14:14:56.738234+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ck6Aah2sCd6byiCTJ3"]} -{"Format": "IDEA0", "ID": "afcf0143-432c-49f8-b2d6-9059e4cb4d0f", "DetectTime": "2023-10-30T14:14:56.760508+02:00", "EventTime": "2023-10-30T14:14:56.760523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CEtQU13XN6LXd5OSie"]} -{"Format": "Json", "ID": "afcf0143-432c-49f8-b2d6-9059e4cb4d0f", "DetectTime": "2023-10-30T14:14:56.760508+02:00", "EventTime": "2023-10-30T14:14:56.760523+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:18:18.745988+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:14:56.830486)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "6f63415f-84f9-4397-9db1-ddc8618e65a7", "DetectTime": "2023-10-30T14:14:56.834664+02:00", "EventTime": "2023-10-30T14:14:56.834675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C8wOFh2EZdtxrOMf93"]} -{"Format": "IDEA0", "ID": "2c8834ec-325a-47f6-a64a-e0134597ee5f", "DetectTime": "2023-10-30T14:14:56.853656+02:00", "EventTime": "2023-10-30T14:14:56.853671+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Csropb2QBR0PkxeIh2"]} -{"Format": "IDEA0", "ID": "161a50a9-a330-4fb8-b513-02f498037d72", "DetectTime": "2023-10-30T14:14:56.869858+02:00", "EventTime": "2023-10-30T14:14:56.869873+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CiIv0H2UgsHAUfuwi"]} -{"Format": "IDEA0", "ID": "5c752ac3-6fcb-44d0-a658-c474b8370e17", "DetectTime": "2023-10-30T14:14:56.886474+02:00", "EventTime": "2023-10-30T14:14:56.886486+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CGHXe21u4jCP9H2Dti"]} -{"Format": "IDEA0", "ID": "18e7d2fa-19b6-4764-a1a4-8d855d495c11", "DetectTime": "2023-10-30T14:14:56.907821+02:00", "EventTime": "2023-10-30T14:14:56.907830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CkwBr32EIf5lplDXTh"]} -{"Format": "IDEA0", "ID": "208e5e1c-80cb-4612-8da1-30b5f7441b45", "DetectTime": "2023-10-30T14:14:56.930297+02:00", "EventTime": "2023-10-30T14:14:56.930312+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CASW301Al6AVIKiyQl"]} -{"Format": "IDEA0", "ID": "cd9d0271-d5b8-499c-aa64-2ff724ee089b", "DetectTime": "2023-10-30T14:14:56.951599+02:00", "EventTime": "2023-10-30T14:14:56.951612+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C3Bhbe1LrL8QjlmYN5"]} -{"Format": "IDEA0", "ID": "4b5fb815-2a84-44ea-812c-882e6469a189", "DetectTime": "2023-10-30T14:14:56.972410+02:00", "EventTime": "2023-10-30T14:14:56.972425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CTBnyVTsP5AfoGXhl"]} -{"Format": "IDEA0", "ID": "b20577f7-63cc-4196-90b4-c48a0c3ad744", "DetectTime": "2023-10-30T14:14:56.992390+02:00", "EventTime": "2023-10-30T14:14:56.992400+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CX10Dh2areKg8VFhtg"]} -{"Format": "IDEA0", "ID": "ae7832a1-2632-4580-a2d2-f95c706be586", "DetectTime": "2023-10-30T14:14:57.007462+02:00", "EventTime": "2023-10-30T14:14:57.007472+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CM6Ywg4gfa2L4JXwDi"]} -{"Format": "IDEA0", "ID": "db7b1a99-83f2-447c-8f2f-093944b9c52e", "DetectTime": "2023-10-30T14:14:57.022093+02:00", "EventTime": "2023-10-30T14:14:57.022103+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CmBCWnnz6zb2dm7Ba"]} -{"Format": "IDEA0", "ID": "a41c30ab-69d2-46a7-b69e-ad8d72340388", "DetectTime": "2023-10-30T14:14:57.036313+02:00", "EventTime": "2023-10-30T14:14:57.036323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C9PNVPN4bFCCAIZ94"]} -{"Format": "IDEA0", "ID": "51da19c4-05ce-46ba-ad09-3b038df18df8", "DetectTime": "2023-10-30T14:14:57.052355+02:00", "EventTime": "2023-10-30T14:14:57.052366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CombX71duKZQ6rZjD8"]} -{"Format": "IDEA0", "ID": "673e78a5-0f4c-44eb-b592-7273f1a8ed3a", "DetectTime": "2023-10-30T14:14:57.069199+02:00", "EventTime": "2023-10-30T14:14:57.069211+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["COEALE1g9NCRT8fVrb"]} -{"Format": "IDEA0", "ID": "3bdede34-e970-461f-8970-25373863d4ed", "DetectTime": "2023-10-30T14:14:57.094542+02:00", "EventTime": "2023-10-30T14:14:57.094555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CCOqWtCRLuZRuEdad"]} -{"Format": "IDEA0", "ID": "0cc9a57e-934c-4b8d-b999-53fe5742eb1f", "DetectTime": "2023-10-30T14:14:57.109119+02:00", "EventTime": "2023-10-30T14:14:57.109129+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CbYL6T1q7CTCX3h8na"]} -{"Format": "IDEA0", "ID": "dede40eb-2af0-4611-9605-3d0338710bea", "DetectTime": "2023-10-30T14:14:57.123690+02:00", "EventTime": "2023-10-30T14:14:57.123699+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CjFKjH1tsXQNeB1lig"]} -{"Format": "IDEA0", "ID": "af557489-f485-4c08-b8e9-f7051cd4b653", "DetectTime": "2023-10-30T14:14:57.138334+02:00", "EventTime": "2023-10-30T14:14:57.138350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CoiTgd10uqPWv8XCAi"]} -{"Format": "IDEA0", "ID": "b1e6439d-005e-4b4f-843b-189c98957a98", "DetectTime": "2023-10-30T14:14:57.157439+02:00", "EventTime": "2023-10-30T14:14:57.157453+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CvCND44hWhQDMwFhjj"]} -{"Format": "IDEA0", "ID": "0c00d82c-4b0d-491d-b44c-616d22451b08", "DetectTime": "2023-10-30T14:14:57.178446+02:00", "EventTime": "2023-10-30T14:14:57.178460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CSXuyt2a9Hwb5wm5uf"]} -{"Format": "IDEA0", "ID": "7a70f859-14fd-4de6-a5a1-6749e88af0b2", "DetectTime": "2023-10-30T14:14:57.198918+02:00", "EventTime": "2023-10-30T14:14:57.198933+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CkTmUj4G594IXDLcY6"]} -{"Format": "IDEA0", "ID": "fb10f3ce-5de6-4e00-8b34-57d688d0a9d2", "DetectTime": "2023-10-30T14:14:57.227956+02:00", "EventTime": "2023-10-30T14:14:57.227966+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CcyBNg32PO15bCGnEg"]} -{"Format": "IDEA0", "ID": "35b40eff-c11d-43cf-94c3-40bd7a5e240b", "DetectTime": "2023-10-30T14:14:57.242950+02:00", "EventTime": "2023-10-30T14:14:57.242960+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CeIfu83LHaRO720jEc"]} -{"Format": "IDEA0", "ID": "21bcb743-70c7-407d-bfea-f0265ab97631", "DetectTime": "2023-10-30T14:14:57.256597+02:00", "EventTime": "2023-10-30T14:14:57.256606+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CNT209cQqDpRmh1K"]} -{"Format": "IDEA0", "ID": "479da455-56c3-4294-b491-abc6beb6b82b", "DetectTime": "2023-10-30T14:14:57.271114+02:00", "EventTime": "2023-10-30T14:14:57.271126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CCMlFs4Q782p3dtxG4"]} -{"Format": "IDEA0", "ID": "9fd07587-64a4-4ff3-accd-791904dc3f75", "DetectTime": "2023-10-30T14:14:57.285402+02:00", "EventTime": "2023-10-30T14:14:57.285412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CqUY8S3fWwvqTPP3q3"]} -{"Format": "IDEA0", "ID": "7e4af276-68cf-41aa-bed2-5657d0154df8", "DetectTime": "2023-10-30T14:14:57.299858+02:00", "EventTime": "2023-10-30T14:14:57.299867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["C4F2yd42hNhQ2xGaFj"]} -{"Format": "IDEA0", "ID": "a815a6fa-9069-4f7a-8ab7-5d8606a20ed8", "DetectTime": "2023-10-30T14:14:57.313847+02:00", "EventTime": "2023-10-30T14:14:57.313859+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["ClCCEM1i9ECcNlu1Hl"]} -{"Format": "IDEA0", "ID": "7cfa76bf-2db9-47f6-a058-2ca3214a3178", "DetectTime": "2023-10-30T14:14:57.330052+02:00", "EventTime": "2023-10-30T14:14:57.330063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CgcDer3CbQqt41AmSh"]} -{"Format": "IDEA0", "ID": "561af4d4-7dae-4ac7-a199-f75e0010a959", "DetectTime": "2023-10-30T14:14:57.345471+02:00", "EventTime": "2023-10-30T14:14:57.345482+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CImlYQ30ks4jhHL1Ec"]} -{"Format": "IDEA0", "ID": "a7dc9827-9057-4e26-b29c-09a953e18ef1", "DetectTime": "2023-10-30T14:14:57.361155+02:00", "EventTime": "2023-10-30T14:14:57.361164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C7xMSF3lE2pVk5gDQl"]} -{"Format": "IDEA0", "ID": "a5ff011f-39a5-4e7e-8f31-ad325b740721", "DetectTime": "2023-10-30T14:14:57.375025+02:00", "EventTime": "2023-10-30T14:14:57.375035+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["ChSK6Y3sWoOJAauTfa"]} -{"Format": "IDEA0", "ID": "e4685b3b-6cdd-4604-8640-8a67b3b50001", "DetectTime": "2023-10-30T14:14:57.392063+02:00", "EventTime": "2023-10-30T14:14:57.392078+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CLtRNC3QvCSgPvucD1"]} -{"Format": "IDEA0", "ID": "f14c90d5-e8dc-451f-99c7-19b6d1aa21ef", "DetectTime": "2023-10-30T14:14:57.405239+02:00", "EventTime": "2023-10-30T14:14:57.405249+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CGIuHP18RlUCiLScJc"]} -{"Format": "IDEA0", "ID": "bfb4f50c-ddde-40b9-ab9c-d7f8f8730072", "DetectTime": "2023-10-30T14:14:57.429589+02:00", "EventTime": "2023-10-30T14:14:57.429600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CR2XUr3dro4RA8tbvg"]} -{"Format": "IDEA0", "ID": "5258b5d0-59a1-4211-b0d1-a3b1f523fab9", "DetectTime": "2023-10-30T14:14:57.443526+02:00", "EventTime": "2023-10-30T14:14:57.443538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CGGM7tKfBhWyvL4fg"]} -{"Format": "IDEA0", "ID": "ea3e925d-1de8-49e2-9532-4e1a1ace1dd5", "DetectTime": "2023-10-30T14:14:57.456259+02:00", "EventTime": "2023-10-30T14:14:57.456269+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CCsMnz413kBqKQSfrj"]} -{"Format": "IDEA0", "ID": "6d505cf8-1541-4d03-bc22-67e55f8d5437", "DetectTime": "2023-10-30T14:14:57.470294+02:00", "EventTime": "2023-10-30T14:14:57.470303+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CWoaN73AhVPKVYrX6j"]} -{"Format": "IDEA0", "ID": "6576c4b9-5250-43db-83c5-17ac1e526b90", "DetectTime": "2023-10-30T14:14:57.483850+02:00", "EventTime": "2023-10-30T14:14:57.483861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CvHEe63y3K1Xlwmsil"]} -{"Format": "IDEA0", "ID": "af90efed-c0ff-40fd-969d-4287d01bed1e", "DetectTime": "2023-10-30T14:14:57.495577+02:00", "EventTime": "2023-10-30T14:14:57.495586+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C5vPyZ1PdGqjUhrGlk"]} -{"Format": "IDEA0", "ID": "026dbeb4-8b27-4cf6-9c1b-eb4f7df849d4", "DetectTime": "2023-10-30T14:14:57.508682+02:00", "EventTime": "2023-10-30T14:14:57.508697+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CxaB8RZoXlmLOKMx9"]} -{"Format": "IDEA0", "ID": "6d6309df-37b7-48dd-9e23-896f7d63ef52", "DetectTime": "2023-10-30T14:14:57.524705+02:00", "EventTime": "2023-10-30T14:14:57.524722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CHPgue3RFGHoF0IFf8"]} -{"Format": "IDEA0", "ID": "ba73ea48-97f7-487e-bc1a-c1809160637c", "DetectTime": "2023-10-30T14:14:57.537839+02:00", "EventTime": "2023-10-30T14:14:57.537849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CiSisi2EwRVdGeVX6c"]} -{"Format": "IDEA0", "ID": "5eb1033d-262d-4671-be56-910c6f1762b9", "DetectTime": "2023-10-30T14:14:57.551271+02:00", "EventTime": "2023-10-30T14:14:57.551281+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CgVWdoYlV6p32hMXg"]} -{"Format": "IDEA0", "ID": "0d6c7dd4-9084-45fe-a2f0-d95f41f4da89", "DetectTime": "2023-10-30T14:14:57.564116+02:00", "EventTime": "2023-10-30T14:14:57.564126+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN9Dr24yL6n34M4RC2"]} -{"Format": "IDEA0", "ID": "b957ffd6-502b-4d8e-ad3e-37eefc0ede41", "DetectTime": "2023-10-30T14:14:57.585202+02:00", "EventTime": "2023-10-30T14:14:57.585218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C30guE2ac3lDL85Lb7"]} -{"Format": "IDEA0", "ID": "0cedb5b3-4191-4e87-83d0-ccbb016b930c", "DetectTime": "2023-10-30T14:14:57.604032+02:00", "EventTime": "2023-10-30T14:14:57.604048+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CZZ7js1YXAqoDrkOP8"]} -{"Format": "IDEA0", "ID": "19bc448c-9d61-4c13-8315-27e731dee071", "DetectTime": "2023-10-30T14:14:57.619898+02:00", "EventTime": "2023-10-30T14:14:57.619910+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C5CSHrPzVyBcnyeRa"]} -{"Format": "IDEA0", "ID": "8a8971a4-d3f4-46ce-86b7-b6ac99785f73", "DetectTime": "2023-10-30T14:14:57.638104+02:00", "EventTime": "2023-10-30T14:14:57.638118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CQ7gWq2ecaEoOvAWI1"]} -{"Format": "IDEA0", "ID": "eebf4950-6d21-4fd4-a0b6-ec67a0c7f59f", "DetectTime": "2023-10-30T14:14:57.653807+02:00", "EventTime": "2023-10-30T14:14:57.653820+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CNSaOr5Si9jBKpXBh"]} -{"Format": "IDEA0", "ID": "03b06bf9-f477-48d0-80c1-a87aaa00efd4", "DetectTime": "2023-10-30T14:14:57.670236+02:00", "EventTime": "2023-10-30T14:14:57.670245+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CgN21m2DDzMo0gDhH8"]} -{"Format": "IDEA0", "ID": "d7950220-9c5d-4bf0-a2ef-3abb24ad5f2b", "DetectTime": "2023-10-30T14:14:57.683520+02:00", "EventTime": "2023-10-30T14:14:57.683529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CqfByp4atSMVPhRm98"]} -{"Format": "IDEA0", "ID": "1099ceff-d2a4-49c0-a92e-4df805f386e5", "DetectTime": "2023-10-30T14:14:57.696002+02:00", "EventTime": "2023-10-30T14:14:57.696012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CGGXwY11tJNDn7lWp2"]} -{"Format": "IDEA0", "ID": "657eb633-2d61-4a58-a04c-34baa8ac7f8b", "DetectTime": "2023-10-30T14:14:57.709020+02:00", "EventTime": "2023-10-30T14:14:57.709030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C81uVE3uBHoCIsH07k"]} -{"Format": "IDEA0", "ID": "3458d944-6e49-4d59-a605-23e819a23df9", "DetectTime": "2023-10-30T14:14:57.724100+02:00", "EventTime": "2023-10-30T14:14:57.724113+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CtvKAc4xBBLxEiGKq"]} -{"Format": "IDEA0", "ID": "1912d026-6106-4f7b-8e68-aa9df215be41", "DetectTime": "2023-10-30T14:14:57.739246+02:00", "EventTime": "2023-10-30T14:14:57.739257+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CqUIT7nyO0kMkgmsa"]} -{"Format": "IDEA0", "ID": "5d56e318-16bc-4118-8b8c-ebf3f4e19025", "DetectTime": "2023-10-30T14:14:57.766380+02:00", "EventTime": "2023-10-30T14:14:57.766389+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CMdrvq1wvEqn0LLIG1"]} -{"Format": "IDEA0", "ID": "0d440376-7004-4c83-8edc-bd9363a25c14", "DetectTime": "2023-10-30T14:14:57.779407+02:00", "EventTime": "2023-10-30T14:14:57.779417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["C3Za0W3NmGYAwkIQvc"]} -{"Format": "IDEA0", "ID": "6ac05758-5565-4120-9112-5006777a62c8", "DetectTime": "2023-10-30T14:14:57.791826+02:00", "EventTime": "2023-10-30T14:14:57.791837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CTS1pC4c1e9YD1mvTk"]} -{"Format": "IDEA0", "ID": "f06dd373-46f5-4a0c-abd8-4e8e8ed3fae8", "DetectTime": "2023-10-30T14:14:57.805013+02:00", "EventTime": "2023-10-30T14:14:57.805023+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cv54Lu32Dzi3YRJZv3"]} -{"Format": "IDEA0", "ID": "2638b8d1-971f-4cbe-9c8f-c59468ba0c51", "DetectTime": "2023-10-30T14:14:57.817820+02:00", "EventTime": "2023-10-30T14:14:57.817830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C6GHgH28qQ1gMI0gM"]} -{"Format": "IDEA0", "ID": "f120afa7-f512-48f8-af65-bcd2404a5817", "DetectTime": "2023-10-30T14:14:57.833312+02:00", "EventTime": "2023-10-30T14:14:57.833323+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["COaJBd2TgBGr5QFws4"]} -{"Format": "IDEA0", "ID": "84bfb037-7635-4eb5-a63b-f884459796a3", "DetectTime": "2023-10-30T14:14:57.847405+02:00", "EventTime": "2023-10-30T14:14:57.847416+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CQdLh33QEEgYOtS6c1"]} -{"Format": "IDEA0", "ID": "32473f6d-5cd6-4059-9881-518aeb5557ba", "DetectTime": "2023-10-30T14:14:57.860936+02:00", "EventTime": "2023-10-30T14:14:57.860951+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CPjWLQ2Go19DA4j7fe"]} -{"Format": "IDEA0", "ID": "af67c385-2b53-4e66-880e-ed1acbd6f31f", "DetectTime": "2023-10-30T14:14:57.880191+02:00", "EventTime": "2023-10-30T14:14:57.880201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CLydLd4vpSQB7RT971"]} -{"Format": "IDEA0", "ID": "aa768031-de9f-440d-a7c1-5ab3561b5611", "DetectTime": "2023-10-30T14:14:57.898520+02:00", "EventTime": "2023-10-30T14:14:57.898534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cu8f3o3aeU9qwXEtxd"]} -{"Format": "IDEA0", "ID": "3caee3e8-a62c-4079-897b-7881007e8e91", "DetectTime": "2023-10-30T14:14:57.912706+02:00", "EventTime": "2023-10-30T14:14:57.912717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CJCgBP2S8pygUACVAl"]} -{"Format": "IDEA0", "ID": "50f8f4c1-64bf-4368-95f0-cc01f5d55bc6", "DetectTime": "2023-10-30T14:14:57.925770+02:00", "EventTime": "2023-10-30T14:14:57.925780+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CEtEboaLVA8nDWmGc"]} -{"Format": "IDEA0", "ID": "84373581-d4b9-4228-99fb-ea77068f1ddf", "DetectTime": "2023-10-30T14:14:57.939198+02:00", "EventTime": "2023-10-30T14:14:57.939208+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["COIYmB3iebdSxgvK4a"]} -{"Format": "IDEA0", "ID": "f0553e1f-597e-4491-9672-dd6f0be892a1", "DetectTime": "2023-10-30T14:14:57.955240+02:00", "EventTime": "2023-10-30T14:14:57.955251+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["Cjm1ynuQW0j2biSA"]} -{"Format": "IDEA0", "ID": "84ed8bf4-ed3d-4030-a78b-e9e92b72c794", "DetectTime": "2023-10-30T14:14:57.967782+02:00", "EventTime": "2023-10-30T14:14:57.967792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CU56pS198ZK84XQ2El"]} -{"Format": "IDEA0", "ID": "63b9fb3c-f81a-4b7d-9c9f-fe2b4b6a8e36", "DetectTime": "2023-10-30T14:14:57.985680+02:00", "EventTime": "2023-10-30T14:14:57.985694+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["ClJAOl4J4dKub1bDbf"]} -{"Format": "IDEA0", "ID": "08085e8a-b173-41ce-b616-949da3598c74", "DetectTime": "2023-10-30T14:14:58.004429+02:00", "EventTime": "2023-10-30T14:14:58.004440+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C0Od672iLSEFoEKvX"]} -{"Format": "IDEA0", "ID": "2a71c19c-11f6-4c7b-ac49-9265a298e209", "DetectTime": "2023-10-30T14:14:58.022548+02:00", "EventTime": "2023-10-30T14:14:58.022563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Cot6x21c5bJXeZM0r5"]} -{"Format": "IDEA0", "ID": "df65588a-b08a-4ada-b9b0-815b751abdc7", "DetectTime": "2023-10-30T14:14:58.037417+02:00", "EventTime": "2023-10-30T14:14:58.037427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CC3ILkfUrwrx2Gild"]} -{"Format": "IDEA0", "ID": "9d7b973d-3e83-4055-b55b-4f50561c8069", "DetectTime": "2023-10-30T14:14:58.051196+02:00", "EventTime": "2023-10-30T14:14:58.051207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJ9B5a1FWidIS2oLWi"]} -{"Format": "IDEA0", "ID": "6a4b4fbc-9c5a-4763-8b09-81754ff7bac8", "DetectTime": "2023-10-30T14:14:58.068136+02:00", "EventTime": "2023-10-30T14:14:58.068150+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CZe4631lqDvlA2r91i"]} -{"Format": "IDEA0", "ID": "d02a7eaa-893c-4df5-b7f9-86121ee3b569", "DetectTime": "2023-10-30T14:14:58.084280+02:00", "EventTime": "2023-10-30T14:14:58.084295+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C7tMH4gQ9Uls6R6x1"]} -{"Format": "IDEA0", "ID": "089b18d2-6087-4cbd-86bd-a6b82a4e35f2", "DetectTime": "2023-10-30T14:14:58.097607+02:00", "EventTime": "2023-10-30T14:14:58.097618+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CKeKbP1szeK0F3o19h"]} -{"Format": "IDEA0", "ID": "e87a61bc-62ef-40ec-bbac-002e26b2bcaa", "DetectTime": "2023-10-30T14:14:58.110346+02:00", "EventTime": "2023-10-30T14:14:58.110356+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["Ct3tcR39MFi07GCQyg"]} -{"Format": "IDEA0", "ID": "f3cf4f67-8815-499c-9ea8-4baae7cfc358", "DetectTime": "2023-10-30T14:14:58.133402+02:00", "EventTime": "2023-10-30T14:14:58.133412+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CNZT4q3HNNRhymVr02"]} -{"Format": "IDEA0", "ID": "23dcfed7-17a0-4cd1-8398-14edccf5d35a", "DetectTime": "2023-10-30T14:14:58.145646+02:00", "EventTime": "2023-10-30T14:14:58.145659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CdmK1r1aj4ZfIrDGs7"]} -{"Format": "IDEA0", "ID": "b8142491-8dd8-4b7d-8959-5c157c7d3a17", "DetectTime": "2023-10-30T14:14:58.159657+02:00", "EventTime": "2023-10-30T14:14:58.159669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CVYFjQ2UUL0S3jkUK4"]} -{"Format": "IDEA0", "ID": "df87089d-09b9-4236-8ebd-67607f1e9dae", "DetectTime": "2023-10-30T14:14:58.174056+02:00", "EventTime": "2023-10-30T14:14:58.174066+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CHykbR1oS0gOINMc8g"]} -{"Format": "IDEA0", "ID": "4e6fbf3f-4c19-4255-aa8a-0aec58b07ffb", "DetectTime": "2023-10-30T14:14:58.187944+02:00", "EventTime": "2023-10-30T14:14:58.187953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CFfqeb2znJojiXsJbi"]} -{"Format": "IDEA0", "ID": "b5c206da-8470-41a2-a9cc-62e8ed311159", "DetectTime": "2023-10-30T14:14:58.200641+02:00", "EventTime": "2023-10-30T14:14:58.200651+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["ClekeVWKcGPic9qdh"]} -{"Format": "IDEA0", "ID": "7f263c71-3548-4cd9-9792-a4ad65f406d3", "DetectTime": "2023-10-30T14:14:58.214419+02:00", "EventTime": "2023-10-30T14:14:58.214432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CpDoFa2KB5OcJB1nvk"]} -{"Format": "IDEA0", "ID": "a381e0ff-e10a-4006-b1d7-82ca1f28ca35", "DetectTime": "2023-10-30T14:14:58.228603+02:00", "EventTime": "2023-10-30T14:14:58.228613+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CVjdxC4b3weOOHljr2"]} -{"Format": "IDEA0", "ID": "f308b09b-ecb6-4ec3-a85d-f0de796c6ac0", "DetectTime": "2023-10-30T14:14:58.241487+02:00", "EventTime": "2023-10-30T14:14:58.241500+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CnfnKWxhSnCZ9QYWi"]} -{"Format": "IDEA0", "ID": "c1f63bfd-2843-40c4-9387-4079451c197a", "DetectTime": "2023-10-30T14:14:58.255126+02:00", "EventTime": "2023-10-30T14:14:58.255135+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CTjE9m1D3JFMZiUJQl"]} -{"Format": "IDEA0", "ID": "246db4f7-a5b5-4d81-aee6-84b626fe45d9", "DetectTime": "2023-10-30T14:14:58.268827+02:00", "EventTime": "2023-10-30T14:14:58.268837+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CBZioc42JxTchWSSg9"]} -{"Format": "IDEA0", "ID": "7a0592bc-f8a9-4bb2-a6d4-db1f2cec6376", "DetectTime": "2023-10-30T14:14:58.281745+02:00", "EventTime": "2023-10-30T14:14:58.281755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CKyDXw44q9BXpySTbf"]} -{"Format": "IDEA0", "ID": "48dacc58-1a36-4cea-8acb-b68d1653bb02", "DetectTime": "2023-10-30T14:14:58.298633+02:00", "EventTime": "2023-10-30T14:14:58.298644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CelI9Lm2ORr3CUYU2"]} -{"Format": "IDEA0", "ID": "0f211e77-8650-4d5b-ba43-0fff5abd1701", "DetectTime": "2023-10-30T14:14:58.329793+02:00", "EventTime": "2023-10-30T14:14:58.329803+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["C4tfFD2sSGub1r28oh"]} -{"Format": "IDEA0", "ID": "469a34e9-50b9-47b6-b744-589a46f7ab75", "DetectTime": "2023-10-30T14:14:58.341809+02:00", "EventTime": "2023-10-30T14:14:58.341818+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["Ch5DbD1zdAmkIONTza"]} -{"Format": "IDEA0", "ID": "bbf86ad7-3002-4fd6-8634-f35a4354915c", "DetectTime": "2023-10-30T14:14:58.355542+02:00", "EventTime": "2023-10-30T14:14:58.355552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CmyEWe2fq84BtHkd8k"]} -{"Format": "IDEA0", "ID": "df37bd51-3643-439c-b2fc-be04ea18a13e", "DetectTime": "2023-10-30T14:14:58.367233+02:00", "EventTime": "2023-10-30T14:14:58.367242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["Cfi7G76knuRnxLyTj"]} -{"Format": "IDEA0", "ID": "f7b05ebf-0e61-4649-ab25-e109f8d20ddd", "DetectTime": "2023-10-30T14:14:58.379618+02:00", "EventTime": "2023-10-30T14:14:58.379630+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"], "Hostname": ["host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.11.116.7 from 10.0.2.19. blacklisted IP AS: Coop. Popular de Elec., Obras y Servicios Pub. de Santa Rosa LTDA, AR AS27927 rDNS: host7-116.cpenet.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CAPWLe39htha1Cm2V7"]} -{"Format": "IDEA0", "ID": "f298fb32-d6cf-4223-88ab-a762edc96c58", "DetectTime": "2023-10-30T14:14:58.395449+02:00", "EventTime": "2023-10-30T14:14:58.395460+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CYv0uudGFDIhMTrqf"]} -{"Format": "IDEA0", "ID": "824f1a46-0425-4163-b009-5b7827c432a0", "DetectTime": "2023-10-30T14:14:58.408177+02:00", "EventTime": "2023-10-30T14:14:58.408187+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CrrWfl4kzP4pXG9pWb"]} -{"Format": "IDEA0", "ID": "ba3e2b2f-f275-4722-a28a-31b66939c8f2", "DetectTime": "2023-10-30T14:14:58.421879+02:00", "EventTime": "2023-10-30T14:14:58.421892+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CIPGYR1UceT15qs948"]} -{"Format": "IDEA0", "ID": "8f369ebc-8e15-4961-aa22-fa8df74febec", "DetectTime": "2023-10-30T14:14:58.435159+02:00", "EventTime": "2023-10-30T14:14:58.435172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Crl3p83vsnmspzWnd5"]} -{"Format": "IDEA0", "ID": "d0d246e5-d1cc-4877-a00b-3db203333d8c", "DetectTime": "2023-10-30T14:14:58.448246+02:00", "EventTime": "2023-10-30T14:14:58.448256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CS9e7V2OL45Ua7MZSb"]} -{"Format": "IDEA0", "ID": "00b0705e-e951-4ab2-bbcd-fe726e5516f3", "DetectTime": "2023-10-30T14:14:58.463443+02:00", "EventTime": "2023-10-30T14:14:58.463461+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJ1j0n1jMqzZ1ZMBGl"]} -{"Format": "IDEA0", "ID": "71836dde-1a5c-489b-a04b-d09095fe4d8a", "DetectTime": "2023-10-30T14:14:58.480274+02:00", "EventTime": "2023-10-30T14:14:58.480291+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CfH2QHbYNeDDc7Id8"]} -{"Format": "IDEA0", "ID": "553d903d-e106-4af4-b9a6-0df48acaa48b", "DetectTime": "2023-10-30T14:14:58.495225+02:00", "EventTime": "2023-10-30T14:14:58.495236+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CIQX8F45nCaoGJs5nf"]} -{"Format": "IDEA0", "ID": "1f737a2c-1e0a-433f-90e9-70b12a2ccb6b", "DetectTime": "2023-10-30T14:14:58.507966+02:00", "EventTime": "2023-10-30T14:14:58.507976+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CLDUZI3LqQVHGp3SEh"]} -{"Format": "IDEA0", "ID": "a688252b-f279-47cd-ae2d-e1eb2cf57771", "DetectTime": "2023-10-30T14:14:58.523433+02:00", "EventTime": "2023-10-30T14:14:58.523448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CRwhhp1k2cvaIpHlaj"]} -{"Format": "IDEA0", "ID": "c572c215-e2c8-484d-842c-985fbc6c4e84", "DetectTime": "2023-10-30T14:14:58.538101+02:00", "EventTime": "2023-10-30T14:14:58.538110+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CQX9oN3ZO3vBYtBq8a"]} -{"Format": "IDEA0", "ID": "3fd2990f-8318-47db-9f0b-c913ae9fc179", "DetectTime": "2023-10-30T14:14:58.550136+02:00", "EventTime": "2023-10-30T14:14:58.550146+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C6rWoc1dmG5JexMAvk"]} -{"Format": "IDEA0", "ID": "443cab63-5def-4043-9600-bc88bc52258b", "DetectTime": "2023-10-30T14:14:58.562529+02:00", "EventTime": "2023-10-30T14:14:58.562539+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CX8hFV1WzvE21ie6fg"]} -{"Format": "IDEA0", "ID": "d42a3d95-3dba-46c2-a53e-94b6f90f0f74", "DetectTime": "2023-10-30T14:14:58.576171+02:00", "EventTime": "2023-10-30T14:14:58.576182+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["Cemaiu15j0RGdKaMmf"]} -{"Format": "IDEA0", "ID": "ad90f28d-2d97-4fef-8528-e48e53413c41", "DetectTime": "2023-10-30T14:14:58.592327+02:00", "EventTime": "2023-10-30T14:14:58.592343+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4GAA8Rhey21f5b9k"]} -{"Format": "IDEA0", "ID": "7576f297-4d14-4c2b-a57a-101332c2a62a", "DetectTime": "2023-10-30T14:14:58.616664+02:00", "EventTime": "2023-10-30T14:14:58.616675+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Ces8XY1htqmf7t6exi"]} -{"Format": "IDEA0", "ID": "1a32f7b0-5017-4e2e-aab1-6c3dc55e7e15", "DetectTime": "2023-10-30T14:14:58.629767+02:00", "EventTime": "2023-10-30T14:14:58.629784+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CIrljs13U6hALFf1c3"]} -{"Format": "IDEA0", "ID": "fa8eaef3-fc78-47a0-9c8b-546cba163560", "DetectTime": "2023-10-30T14:14:58.643822+02:00", "EventTime": "2023-10-30T14:14:58.643832+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CJu0rz2cwVB9r0W8Uk"]} -{"Format": "IDEA0", "ID": "107adf4f-b599-4bde-b607-8907329c8a21", "DetectTime": "2023-10-30T14:14:58.658009+02:00", "EventTime": "2023-10-30T14:14:58.658019+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CO8NtT1DKwi1LaD4y6"]} -{"Format": "IDEA0", "ID": "1dfafe75-4c01-41b5-a299-4db6eccb9c6e", "DetectTime": "2023-10-30T14:14:58.675264+02:00", "EventTime": "2023-10-30T14:14:58.675278+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CfYomGwfC2xH90kG1"]} -{"Format": "IDEA0", "ID": "c9fe6f62-596f-44ab-8b11-c416f8dfc59c", "DetectTime": "2023-10-30T14:14:58.691993+02:00", "EventTime": "2023-10-30T14:14:58.692007+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CQWmJc4FoQNgVaZb1"]} -{"Format": "IDEA0", "ID": "458dd055-e3a6-4d45-8c44-6024a8ef909b", "DetectTime": "2023-10-30T14:14:58.707134+02:00", "EventTime": "2023-10-30T14:14:58.707143+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CAHXYx147XDWfd5vY2"]} -{"Format": "IDEA0", "ID": "fd876689-ab54-4df9-8df8-c52bda8fab80", "DetectTime": "2023-10-30T14:14:58.719898+02:00", "EventTime": "2023-10-30T14:14:58.719909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["Ca3ECe4UY9Rj6u2oP8"]} -{"Format": "IDEA0", "ID": "eea84a38-3adb-4102-aa88-9f7c516f0ab9", "DetectTime": "2023-10-30T14:14:58.732800+02:00", "EventTime": "2023-10-30T14:14:58.732810+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cfsc9B2lcHLxx7WZSe"]} -{"Format": "IDEA0", "ID": "57292caf-e380-4e48-8ba1-072b8ee4f423", "DetectTime": "2023-10-30T14:14:58.746218+02:00", "EventTime": "2023-10-30T14:14:58.746229+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["Cy9K0b2KKkAzESt3J7"]} -{"Format": "IDEA0", "ID": "0bc819b9-0b92-4532-bfb4-5f74548532c8", "DetectTime": "2023-10-30T14:14:58.759742+02:00", "EventTime": "2023-10-30T14:14:58.759751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CBJFOO2RuewONbzpsl"]} -{"Format": "IDEA0", "ID": "af00d890-c392-47c0-8521-4887172ad9b9", "DetectTime": "2023-10-30T14:14:58.772204+02:00", "EventTime": "2023-10-30T14:14:58.772215+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CqkQzb3JhXIhVcx915"]} -{"Format": "IDEA0", "ID": "272add35-74bd-4d4c-82f8-39b2b147bcd5", "DetectTime": "2023-10-30T14:14:58.789827+02:00", "EventTime": "2023-10-30T14:14:58.789842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Cti9ik30JR7pfb1qXf"]} -{"Format": "IDEA0", "ID": "1a9f5a99-4e53-4135-b013-4df5548bbdd8", "DetectTime": "2023-10-30T14:14:58.807256+02:00", "EventTime": "2023-10-30T14:14:58.807267+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["C4Rj4I1iEtnvbvuxTl"]} -{"Format": "IDEA0", "ID": "73c3e120-577b-43f4-b7e6-31ef61a4aba3", "DetectTime": "2023-10-30T14:14:58.819815+02:00", "EventTime": "2023-10-30T14:14:58.819825+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["C9zQdDIfKA08sMFWc"]} -{"Format": "IDEA0", "ID": "f59654d9-986f-407a-a07f-a04e23d99981", "DetectTime": "2023-10-30T14:14:58.837094+02:00", "EventTime": "2023-10-30T14:14:58.837109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CHTH2P23DJbuCV8Cr5"]} -{"Format": "IDEA0", "ID": "a3268168-1502-42f8-a57b-fc3caf4a9565", "DetectTime": "2023-10-30T14:14:58.855148+02:00", "EventTime": "2023-10-30T14:14:58.855159+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CjYecYeOBZskW3bLa"]} -{"Format": "IDEA0", "ID": "35669b0a-b9cf-4e2c-8972-ba894aea693e", "DetectTime": "2023-10-30T14:14:58.869460+02:00", "EventTime": "2023-10-30T14:14:58.869470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Ce6WaZQ7YAf1EK2of"]} -{"Format": "IDEA0", "ID": "81a1e9a8-0aac-46cc-8f56-9d78f7db7d3b", "DetectTime": "2023-10-30T14:14:58.882449+02:00", "EventTime": "2023-10-30T14:14:58.882459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CZOAlT2bIXQIB2Kfr5"]} -{"Format": "IDEA0", "ID": "c601f98b-63b8-418a-9732-0c4ef005bb95", "DetectTime": "2023-10-30T14:14:58.896722+02:00", "EventTime": "2023-10-30T14:14:58.896734+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CX3x9r3enyYzFG6Hnb"]} -{"Format": "IDEA0", "ID": "8cb40527-14de-40b6-8f92-de56dbb4ac10", "DetectTime": "2023-10-30T14:14:58.911453+02:00", "EventTime": "2023-10-30T14:14:58.911463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CaLr0r2vizHhjD3H29"]} -{"Format": "IDEA0", "ID": "7ba46995-b203-483e-9782-abb19cca3eb8", "DetectTime": "2023-10-30T14:14:58.925212+02:00", "EventTime": "2023-10-30T14:14:58.925222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CbvRCY30dqjinOQVWj"]} -{"Format": "IDEA0", "ID": "067af2b2-9ac6-4cd9-9ca3-308a31ddcea0", "DetectTime": "2023-10-30T14:14:58.938447+02:00", "EventTime": "2023-10-30T14:14:58.938458+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CWqk372HoxZI6cK1j4"]} -{"Format": "IDEA0", "ID": "588e5261-541b-4044-b578-26adc5832a42", "DetectTime": "2023-10-30T14:14:58.952300+02:00", "EventTime": "2023-10-30T14:14:58.952310+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CIFb2z3kTnCe9La0L9"]} -{"Format": "IDEA0", "ID": "238e9f41-5316-49e9-8c9d-eaa269efef43", "DetectTime": "2023-10-30T14:14:58.964942+02:00", "EventTime": "2023-10-30T14:14:58.964953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CihEwO3uEBXWks2tOe"]} -{"Format": "Json", "ID": "238e9f41-5316-49e9-8c9d-eaa269efef43", "DetectTime": "2023-10-30T14:14:58.964942+02:00", "EventTime": "2023-10-30T14:14:58.964953+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:48:50.865955+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:14:59.028331)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "cc14bf18-bf7e-47ab-a281-7931fa8246c2", "DetectTime": "2023-10-30T14:14:59.031937+02:00", "EventTime": "2023-10-30T14:14:59.031946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C9sn473pLv5TS6QpF5"]} -{"Format": "IDEA0", "ID": "2cbc2598-36fd-47af-84b0-bebae8e81bad", "DetectTime": "2023-10-30T14:14:59.045140+02:00", "EventTime": "2023-10-30T14:14:59.045151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Ckk0IXyZBd5PXEPxl"]} -{"Format": "IDEA0", "ID": "90b9799d-6283-49b7-aa35-b7f97e4a1bf9", "DetectTime": "2023-10-30T14:14:59.057829+02:00", "EventTime": "2023-10-30T14:14:59.057840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CY2QlP3CRoprsM0L5h"]} -{"Format": "IDEA0", "ID": "5e4d775a-8b93-4912-a312-0fcfd862477d", "DetectTime": "2023-10-30T14:14:59.070709+02:00", "EventTime": "2023-10-30T14:14:59.070722+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CR4TDK1U8pnRt0bE51"]} -{"Format": "IDEA0", "ID": "7431cc2e-7605-4ffa-abe7-dc0481ae9672", "DetectTime": "2023-10-30T14:14:59.083019+02:00", "EventTime": "2023-10-30T14:14:59.083032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C6GOTQ1bIwnmp70oBa"]} -{"Format": "IDEA0", "ID": "de0390f1-cc66-4b93-b9f6-52ceb7f1537d", "DetectTime": "2023-10-30T14:14:59.097231+02:00", "EventTime": "2023-10-30T14:14:59.097242+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C8p9vi2YlGg4Erw4D9"]} -{"Format": "IDEA0", "ID": "ba921f52-91c9-4008-a881-54c30a9599fb", "DetectTime": "2023-10-30T14:14:59.110760+02:00", "EventTime": "2023-10-30T14:14:59.110772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CPn9aE1swZfANee105"]} -{"Format": "IDEA0", "ID": "4dc06724-c706-494b-b0c0-d3cf493e3832", "DetectTime": "2023-10-30T14:14:59.125015+02:00", "EventTime": "2023-10-30T14:14:59.125029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CuSF0fgNqvJBKHM9g"]} -{"Format": "IDEA0", "ID": "710132dc-3489-4838-9253-b3a310d408ca", "DetectTime": "2023-10-30T14:14:59.139375+02:00", "EventTime": "2023-10-30T14:14:59.139387+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C6asEz3pqycRijHxq5"]} -{"Format": "IDEA0", "ID": "36814f5c-5299-4d2b-80ab-d392a88b0c1a", "DetectTime": "2023-10-30T14:14:59.161488+02:00", "EventTime": "2023-10-30T14:14:59.161497+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CKmUzteeUiMWG9qo9"]} -{"Format": "IDEA0", "ID": "59cb258b-f4b3-465e-a7a1-b4e555119e97", "DetectTime": "2023-10-30T14:14:59.174128+02:00", "EventTime": "2023-10-30T14:14:59.174137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CEWlKK1dAF91rTRiOb"]} -{"Format": "IDEA0", "ID": "6ee06062-6735-4032-9ea5-fcf05a79e361", "DetectTime": "2023-10-30T14:14:59.187217+02:00", "EventTime": "2023-10-30T14:14:59.187226+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CT5IJ32Int6dJ2vpxj"]} -{"Format": "IDEA0", "ID": "1c18c037-6026-497d-9709-d95793457299", "DetectTime": "2023-10-30T14:14:59.199631+02:00", "EventTime": "2023-10-30T14:14:59.199640+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C4CXIB4tVKDEeZ5gQa"]} -{"Format": "IDEA0", "ID": "5083d10d-1733-4076-b734-3a26a715bd0c", "DetectTime": "2023-10-30T14:14:59.213183+02:00", "EventTime": "2023-10-30T14:14:59.213194+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C4jCNu1onHHCBn5pWj"]} -{"Format": "IDEA0", "ID": "e8597769-20ab-4a0f-b9c6-972c3b65ea44", "DetectTime": "2023-10-30T14:14:59.226791+02:00", "EventTime": "2023-10-30T14:14:59.226806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CTy6AG2VCMtIPibEh9"]} -{"Format": "IDEA0", "ID": "349184d9-a061-438c-8556-3da7dac0f084", "DetectTime": "2023-10-30T14:14:59.240223+02:00", "EventTime": "2023-10-30T14:14:59.240233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CbYP8hcoozhMIcPj"]} -{"Format": "IDEA0", "ID": "7a0cb07e-34e4-4cee-b723-7a74504a9165", "DetectTime": "2023-10-30T14:14:59.254100+02:00", "EventTime": "2023-10-30T14:14:59.254111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CH6WB41nOrltNjjBn7"]} -{"Format": "IDEA0", "ID": "60d8534a-27c8-4fd5-8e12-086f3adf96cb", "DetectTime": "2023-10-30T14:14:59.268646+02:00", "EventTime": "2023-10-30T14:14:59.268660+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CYhEasiNqXdazZRYd"]} -{"Format": "IDEA0", "ID": "e26e5b64-a477-4ddb-bf14-2cce4c4378d5", "DetectTime": "2023-10-30T14:14:59.300831+02:00", "EventTime": "2023-10-30T14:14:59.300846+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CLiKNlWb3kOwrmSnc"]} -{"Format": "IDEA0", "ID": "2add45a9-67dc-4fd8-bfa5-8e39d6fa18be", "DetectTime": "2023-10-30T14:14:59.319833+02:00", "EventTime": "2023-10-30T14:14:59.319848+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CnUIfl2F42QBumrwjg"]} -{"Format": "IDEA0", "ID": "9d2e29f4-1ffc-4667-b19e-728c08d26588", "DetectTime": "2023-10-30T14:14:59.338894+02:00", "EventTime": "2023-10-30T14:14:59.338906+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CcgIhUw7e8ohcQNv5"]} -{"Format": "IDEA0", "ID": "d045e64e-742a-4e1f-909d-0c3755ed9fb3", "DetectTime": "2023-10-30T14:14:59.356002+02:00", "EventTime": "2023-10-30T14:14:59.356013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CyEEzP3ehEUlPsRMD5"]} -{"Format": "IDEA0", "ID": "fe995581-00d7-4d5b-bf51-a521e536868e", "DetectTime": "2023-10-30T14:14:59.368971+02:00", "EventTime": "2023-10-30T14:14:59.368982+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CIVRHp11Fg0MELsC4d"]} -{"Format": "IDEA0", "ID": "cb4ee9fb-fed5-4311-82af-2022bf531ce3", "DetectTime": "2023-10-30T14:14:59.381963+02:00", "EventTime": "2023-10-30T14:14:59.381973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CyG7xr3XCLvwH1UHNk"]} -{"Format": "IDEA0", "ID": "c274a722-8c8e-462f-adb7-ae0e21b409de", "DetectTime": "2023-10-30T14:14:59.407248+02:00", "EventTime": "2023-10-30T14:14:59.407259+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CmB3ve2Bo3doVl6RNl"]} -{"Format": "IDEA0", "ID": "04971da9-b260-4b4b-a487-866d26f75580", "DetectTime": "2023-10-30T14:14:59.422453+02:00", "EventTime": "2023-10-30T14:14:59.422463+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CgKkmt2TwlBCzmHu8"]} -{"Format": "IDEA0", "ID": "074b754d-02fd-499b-bfee-63423604f3c1", "DetectTime": "2023-10-30T14:14:59.436857+02:00", "EventTime": "2023-10-30T14:14:59.436867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTaOFP195C9hd7quEc"]} -{"Format": "IDEA0", "ID": "c9bd8401-74ed-473a-a16d-f1f7dccde1cf", "DetectTime": "2023-10-30T14:14:59.450355+02:00", "EventTime": "2023-10-30T14:14:59.450364+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CBn1yynbp7OUOKrwg"]} -{"Format": "IDEA0", "ID": "662c3d52-5622-4ef1-a03e-fad2393770b4", "DetectTime": "2023-10-30T14:14:59.471160+02:00", "EventTime": "2023-10-30T14:14:59.471171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CWONdU3bcLhCqOxUak"]} -{"Format": "IDEA0", "ID": "c062c207-d63e-4f03-98fa-d41c86ad0858", "DetectTime": "2023-10-30T14:14:59.494503+02:00", "EventTime": "2023-10-30T14:14:59.494513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CJoDWf2bLm6xSOpuuf"]} -{"Format": "IDEA0", "ID": "f6b69dbe-82cc-450d-b667-15270e78f974", "DetectTime": "2023-10-30T14:14:59.513437+02:00", "EventTime": "2023-10-30T14:14:59.513447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CdR4If4rRAl6KCpUyh"]} -{"Format": "IDEA0", "ID": "f9bb1f30-6f47-4d22-b431-d451c8ac8322", "DetectTime": "2023-10-30T14:14:59.530993+02:00", "EventTime": "2023-10-30T14:14:59.531002+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CXyDBS3UC07CdjoHOe"]} -{"Format": "IDEA0", "ID": "58ad7a3b-bff3-4742-bc01-0cc325575e9c", "DetectTime": "2023-10-30T14:14:59.553601+02:00", "EventTime": "2023-10-30T14:14:59.553611+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CLU7Hd1d98VMIXIcua"]} -{"Format": "IDEA0", "ID": "abda12c6-6659-49d0-8392-d5353becc4a9", "DetectTime": "2023-10-30T14:14:59.573634+02:00", "EventTime": "2023-10-30T14:14:59.573644+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C5WRfM2PG1vQGcKUvh"]} -{"Format": "IDEA0", "ID": "d9916632-68f8-4414-9c13-a3ff6018b237", "DetectTime": "2023-10-30T14:14:59.594543+02:00", "EventTime": "2023-10-30T14:14:59.594558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["C9ZS9d1BXphKF6Prb"]} -{"Format": "IDEA0", "ID": "99664d6d-e322-45fc-983e-305b245bb190", "DetectTime": "2023-10-30T14:14:59.623594+02:00", "EventTime": "2023-10-30T14:14:59.623604+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CJmM9x2xImsorf1Isk"]} -{"Format": "IDEA0", "ID": "4566d611-a076-4f98-847b-1ed49d411be4", "DetectTime": "2023-10-30T14:14:59.653774+02:00", "EventTime": "2023-10-30T14:14:59.653783+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCE0DE3VJbab4FlYye"]} -{"Format": "IDEA0", "ID": "f1366c35-dcf1-4754-85e7-4f81fe5aa914", "DetectTime": "2023-10-30T14:14:59.677758+02:00", "EventTime": "2023-10-30T14:14:59.677771+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CsIBgf4UTFxrHAyrL7"]} -{"Format": "Json", "ID": "f1366c35-dcf1-4754-85e7-4f81fe5aa914", "DetectTime": "2023-10-30T14:14:59.677758+02:00", "EventTime": "2023-10-30T14:14:59.677771+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:49:03.500534+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:14:59.748104)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f7cfaa8c-484a-4f83-bedc-722b1c51d32c", "DetectTime": "2023-10-30T14:14:59.752835+02:00", "EventTime": "2023-10-30T14:14:59.752849+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CUqEd215Uda9rUM004"]} -{"Format": "IDEA0", "ID": "dbe178d5-5677-4d4b-a355-7022683c4797", "DetectTime": "2023-10-30T14:14:59.779848+02:00", "EventTime": "2023-10-30T14:14:59.779861+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C0BFfXfZl9eor69Ti"]} -{"Format": "IDEA0", "ID": "6fd4a0a7-2b29-4257-bc80-ec52d9cc4696", "DetectTime": "2023-10-30T14:14:59.806454+02:00", "EventTime": "2023-10-30T14:14:59.806470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["C0mUia293uena8JTW7"]} -{"Format": "IDEA0", "ID": "765a7da2-e986-4421-b108-fc8a4c569dbe", "DetectTime": "2023-10-30T14:14:59.835309+02:00", "EventTime": "2023-10-30T14:14:59.835325+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C2qdNvhXlGmxe9oyg"]} -{"Format": "IDEA0", "ID": "4242f419-8d6c-4f73-8218-6ffa2dffd9eb", "DetectTime": "2023-10-30T14:14:59.856506+02:00", "EventTime": "2023-10-30T14:14:59.856518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CD75ae2cs2xEpKXjxb"]} -{"Format": "IDEA0", "ID": "4c77e109-998e-45ed-b96e-c81e193ead82", "DetectTime": "2023-10-30T14:14:59.878680+02:00", "EventTime": "2023-10-30T14:14:59.878690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CY56Qw1VeKitXZwHBk"]} -{"Format": "IDEA0", "ID": "215bca84-c3e4-4c88-82f3-167ae47a9788", "DetectTime": "2023-10-30T14:14:59.900553+02:00", "EventTime": "2023-10-30T14:14:59.900563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CgW0pa2vSqlUyZbMK9"]} -{"Format": "IDEA0", "ID": "c540ef29-63f6-483e-ac92-e2e648f2bf52", "DetectTime": "2023-10-30T14:14:59.920188+02:00", "EventTime": "2023-10-30T14:14:59.920198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CnrD583p1SMM6llKba"]} -{"Format": "IDEA0", "ID": "909bc8ef-98c2-4002-a399-0a2f39bc6535", "DetectTime": "2023-10-30T14:14:59.941569+02:00", "EventTime": "2023-10-30T14:14:59.941580+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CRib7Z34KcGAQGupsc"]} -{"Format": "IDEA0", "ID": "cb894cec-0794-4ea5-976e-afe57c8dc00f", "DetectTime": "2023-10-30T14:14:59.961825+02:00", "EventTime": "2023-10-30T14:14:59.961835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CYIx5L3gHf41pf5L6e"]} -{"Format": "IDEA0", "ID": "acc89dbb-3661-4fdf-a84e-82fafcc590b2", "DetectTime": "2023-10-30T14:14:59.983087+02:00", "EventTime": "2023-10-30T14:14:59.983097+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CLZqjMo0QRf7ca6og"]} -{"Format": "IDEA0", "ID": "bb278ec2-90d7-40b2-9d02-944b5cf4b72f", "DetectTime": "2023-10-30T14:15:00.002935+02:00", "EventTime": "2023-10-30T14:15:00.002955+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CmipFk3EW3KMQkfXt8"]} -{"Format": "Json", "ID": "bb278ec2-90d7-40b2-9d02-944b5cf4b72f", "DetectTime": "2023-10-30T14:15:00.002935+02:00", "EventTime": "2023-10-30T14:15:00.002955+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:49:21.305456+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:15:00.073147)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "913b32a4-65e6-4d71-a83d-ee8a4c4919cf", "DetectTime": "2023-10-30T14:15:00.076962+02:00", "EventTime": "2023-10-30T14:15:00.076973+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CrRktB46i6mBMrvTV4"]} -{"Format": "IDEA0", "ID": "179d66a0-92dc-451c-b31b-c25ff1365518", "DetectTime": "2023-10-30T14:15:00.098129+02:00", "EventTime": "2023-10-30T14:15:00.098141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CUT1gw3hdcnb4DF9Wd"]} -{"Format": "IDEA0", "ID": "2af12d70-4c92-4422-b042-a882c9317a6e", "DetectTime": "2023-10-30T14:15:00.117989+02:00", "EventTime": "2023-10-30T14:15:00.118000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C63Q2KaxHl6Ltxtfd"]} -{"Format": "IDEA0", "ID": "d5fcd7e0-2b74-495e-a58e-50aacc509495", "DetectTime": "2023-10-30T14:15:00.140994+02:00", "EventTime": "2023-10-30T14:15:00.141008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CAOQGJ2jdeHlpKFlMa"]} -{"Format": "IDEA0", "ID": "f404aa18-7682-4a3e-bf44-08636ff1c365", "DetectTime": "2023-10-30T14:15:00.165690+02:00", "EventTime": "2023-10-30T14:15:00.165701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CbmAxlnCEbPpRMcgj"]} -{"Format": "IDEA0", "ID": "f2125b9b-61b7-4330-8c42-af403f7939a7", "DetectTime": "2023-10-30T14:15:00.187824+02:00", "EventTime": "2023-10-30T14:15:00.187834+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CxDhdz5f9gcoMp1U"]} -{"Format": "IDEA0", "ID": "5519b17f-b424-4c82-bdb4-c3e282987cc9", "DetectTime": "2023-10-30T14:15:00.208024+02:00", "EventTime": "2023-10-30T14:15:00.208036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CspaFaUEuhidWtPzc"]} -{"Format": "IDEA0", "ID": "03eac65f-4699-4eee-b26f-9109117b4a9b", "DetectTime": "2023-10-30T14:15:00.307012+02:00", "EventTime": "2023-10-30T14:15:00.307030+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CuKJPx2eCpeIgl03Hk"]} -{"Format": "IDEA0", "ID": "eb87bc4d-e393-428b-89c4-05164fe9abbc", "DetectTime": "2023-10-30T14:15:00.336563+02:00", "EventTime": "2023-10-30T14:15:00.336577+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CAR7tE10C67Xbsd0Gh"]} -{"Format": "IDEA0", "ID": "65569fae-7fbb-4798-9b93-2df3e6d2b7ad", "DetectTime": "2023-10-30T14:15:00.365462+02:00", "EventTime": "2023-10-30T14:15:00.365478+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CpQmu04gyNCcR2Tbx5"]} -{"Format": "IDEA0", "ID": "52f97f0c-42b6-4fb8-a4f8-2b25b0057189", "DetectTime": "2023-10-30T14:15:00.393744+02:00", "EventTime": "2023-10-30T14:15:00.393760+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["Cz6kLwexBPp9fJjVj"]} -{"Format": "Json", "ID": "52f97f0c-42b6-4fb8-a4f8-2b25b0057189", "DetectTime": "2023-10-30T14:15:00.393744+02:00", "EventTime": "2023-10-30T14:15:00.393760+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T00:49:23.523847+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 239. (real time 2023/10/30 14:15:00.467235)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a748263f-00e2-4898-8724-069327c73734", "DetectTime": "2023-10-30T14:15:00.471383+02:00", "EventTime": "2023-10-30T14:15:00.471395+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5683], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5683/UDP destination IP 75.57.132.229. ", "ContentType": "text/plain"}], "uids": ["CmVeLd3n4SrBc6lsxj"]} -{"Format": "IDEA0", "ID": "33d259f8-5add-470a-8774-fd53b32c9fe5", "DetectTime": "2023-10-30T14:15:00.496045+02:00", "EventTime": "2023-10-30T14:15:00.496062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CBt2Oh2A4PwvdmAIt"]} -{"Format": "IDEA0", "ID": "be144c9b-3893-41a7-9a8b-9bc22bfc1db7", "DetectTime": "2023-10-30T14:15:00.523752+02:00", "EventTime": "2023-10-30T14:15:00.523768+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C09hit1KHX0trHOrKl"]} -{"Format": "IDEA0", "ID": "64edde5b-2bf3-4312-95b1-181a142d70bb", "DetectTime": "2023-10-30T14:15:00.551796+02:00", "EventTime": "2023-10-30T14:15:00.551811+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Cqqqfr1uXhr5uLROaj"]} -{"Format": "IDEA0", "ID": "67297f8f-5795-455d-805c-f4c2f5893b9d", "DetectTime": "2023-10-30T14:15:00.580102+02:00", "EventTime": "2023-10-30T14:15:00.580118+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CVYnjv3gMJ4axHNWRi"]} -{"Format": "IDEA0", "ID": "1a5ebc5a-131f-44c9-92c4-f2e6bcc65b1b", "DetectTime": "2023-10-30T14:15:00.606094+02:00", "EventTime": "2023-10-30T14:15:00.606105+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3558], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 3558/TCP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CCyC8O2ezvrxqgSHP1"]} -{"Format": "IDEA0", "ID": "c9b7aeee-4834-477d-b3b6-1e2086e63a63", "DetectTime": "2023-10-30T14:15:00.625530+02:00", "EventTime": "2023-10-30T14:15:00.625541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CprJvD2LKuX66gOYY3"]} -{"Format": "IDEA0", "ID": "11e35dc4-58c4-4fca-a21a-7e28b4a47d1a", "DetectTime": "2023-10-30T14:15:00.644413+02:00", "EventTime": "2023-10-30T14:15:00.644426+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CSYt163SyH24jgX9p3"]} -{"Format": "IDEA0", "ID": "998f0aa7-d5a1-4e4e-9a11-210cf7050fa8", "DetectTime": "2023-10-30T14:15:00.663832+02:00", "EventTime": "2023-10-30T14:15:00.663843+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CsNd6S1LARx5iLaAQd"]} -{"Format": "IDEA0", "ID": "99609381-a5b0-48d0-b4bb-9fec355496fb", "DetectTime": "2023-10-30T14:15:00.690514+02:00", "EventTime": "2023-10-30T14:15:00.690524+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CvnFqAIc49wLZIVxc"]} -{"Format": "IDEA0", "ID": "d21ebc14-bd85-4518-8c2d-ac534aeaa110", "DetectTime": "2023-10-30T14:15:00.718528+02:00", "EventTime": "2023-10-30T14:15:00.718540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["C9ch7E4Y9CAj3bzIQh"]} -{"Format": "IDEA0", "ID": "5900d34e-c327-4730-8e35-396334d82fe9", "DetectTime": "2023-10-30T14:15:00.746697+02:00", "EventTime": "2023-10-30T14:15:00.746708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CJTJLn1c187v1KdFR"]} -{"Format": "IDEA0", "ID": "ee7adb66-1ef6-4274-8a0a-6ee7f929ecbf", "DetectTime": "2023-10-30T14:15:00.775675+02:00", "EventTime": "2023-10-30T14:15:00.775686+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CbtIaa3hum4Zx4K1V7"]} -{"Format": "IDEA0", "ID": "2a186b60-30f2-4ef2-9682-bbbcada2fbbd", "DetectTime": "2023-10-30T14:15:00.803698+02:00", "EventTime": "2023-10-30T14:15:00.803714+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ch2oso1iFLsWLO7oy8"]} -{"Format": "IDEA0", "ID": "d8c42615-f79b-4f10-be90-4c1878c3e732", "DetectTime": "2023-10-30T14:15:00.839355+02:00", "EventTime": "2023-10-30T14:15:00.839370+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CYxTSH1HJCAUBYaNCk"]} -{"Format": "IDEA0", "ID": "f2634306-7523-4ba4-b3d9-f8f9188ff60d", "DetectTime": "2023-10-30T14:15:00.868012+02:00", "EventTime": "2023-10-30T14:15:00.868028+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CVpPvF3UvyoWjHgZ9f"]} -{"Format": "IDEA0", "ID": "92720d4d-1cd1-44ba-8d94-3360adec087b", "DetectTime": "2023-10-30T14:15:00.908405+02:00", "EventTime": "2023-10-30T14:15:00.908419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CviUwY3CS1Mqloqfh"]} -{"Format": "Json", "ID": "92720d4d-1cd1-44ba-8d94-3360adec087b", "DetectTime": "2023-10-30T14:15:00.908405+02:00", "EventTime": "2023-10-30T14:15:00.908419+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:20:01.217810+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:00.996856)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a4ebc744-655b-4cb5-859d-8b07c01e99dc", "DetectTime": "2023-10-30T14:15:01.002323+02:00", "EventTime": "2023-10-30T14:15:01.002340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CE16Jj1VZfLo2QnvF9"]} -{"Format": "IDEA0", "ID": "64da6bbc-51a8-43b3-ae97-8ccb11ab3109", "DetectTime": "2023-10-30T14:15:01.033965+02:00", "EventTime": "2023-10-30T14:15:01.033981+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CuRfETq9dkVzdhgy3"]} -{"Format": "IDEA0", "ID": "3e3ef84b-a4ba-4230-b268-21c4aca22982", "DetectTime": "2023-10-30T14:15:01.068728+02:00", "EventTime": "2023-10-30T14:15:01.068743+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CJnD5CadhWSoDBCdb"]} -{"Format": "IDEA0", "ID": "263df625-eb2e-4b65-b33d-f6471172a96c", "DetectTime": "2023-10-30T14:15:01.106510+02:00", "EventTime": "2023-10-30T14:15:01.106525+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CHxdUI3JD6RVZ87XFd"]} -{"Format": "IDEA0", "ID": "f4444dfa-7375-41a3-8c88-30cbf2fcb406", "DetectTime": "2023-10-30T14:15:01.133419+02:00", "EventTime": "2023-10-30T14:15:01.133431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CTQQ103192CGfdJC0j"]} -{"Format": "IDEA0", "ID": "1d988a14-6230-49b1-9151-ef71be661958", "DetectTime": "2023-10-30T14:15:01.159278+02:00", "EventTime": "2023-10-30T14:15:01.159292+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CApSjT2KFyUyxsliM8"]} -{"Format": "IDEA0", "ID": "e8cb9099-9a59-41f7-b096-77c6404dd41c", "DetectTime": "2023-10-30T14:15:01.184816+02:00", "EventTime": "2023-10-30T14:15:01.184826+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CDQqSx4FuQSUBcPQ5h"]} -{"Format": "IDEA0", "ID": "7ccd7d96-697f-4fff-b7a3-dc074a580dad", "DetectTime": "2023-10-30T14:15:01.215136+02:00", "EventTime": "2023-10-30T14:15:01.215151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C3dV7D49RCjqSw0Rfk"]} -{"Format": "Json", "ID": "7ccd7d96-697f-4fff-b7a3-dc074a580dad", "DetectTime": "2023-10-30T14:15:01.215136+02:00", "EventTime": "2023-10-30T14:15:01.215151+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:20:03.312360+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:01.298446)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "aa387e05-403e-457c-b84a-b2ae0385eac0", "DetectTime": "2023-10-30T14:15:01.302346+02:00", "EventTime": "2023-10-30T14:15:01.302357+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CNVf0J3TBmVTk2o07l"]} -{"Format": "IDEA0", "ID": "30ac2c5d-5797-45c3-a90c-0952845f0475", "DetectTime": "2023-10-30T14:15:01.337026+02:00", "EventTime": "2023-10-30T14:15:01.337043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CakIik2Ude90auPufh"]} -{"Format": "IDEA0", "ID": "99ee7eb9-70dc-4f94-a9a9-f638bad52261", "DetectTime": "2023-10-30T14:15:01.361333+02:00", "EventTime": "2023-10-30T14:15:01.361344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CizJOs2gwXy53ym7b3"]} -{"Format": "IDEA0", "ID": "ddec468c-356b-44bd-b354-fd226ee57345", "DetectTime": "2023-10-30T14:15:01.385486+02:00", "EventTime": "2023-10-30T14:15:01.385502+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CobdSB4maZwSUJSgxa"]} -{"Format": "IDEA0", "ID": "d18bc469-f71a-4ea3-9385-2e5e3f8b2b40", "DetectTime": "2023-10-30T14:15:01.411617+02:00", "EventTime": "2023-10-30T14:15:01.411627+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CIsR7x1pJm0Mrrf3Gk"]} -{"Format": "IDEA0", "ID": "e8b2ca3d-ec03-4a15-ae28-2b70285abfa4", "DetectTime": "2023-10-30T14:15:01.440606+02:00", "EventTime": "2023-10-30T14:15:01.440617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C32nMJ2XWUnnCiYx75"]} -{"Format": "IDEA0", "ID": "46a40eeb-596a-49ed-9f55-8501163922d2", "DetectTime": "2023-10-30T14:15:01.465952+02:00", "EventTime": "2023-10-30T14:15:01.465964+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C2Wyq73ff2G4nsif0f"]} -{"Format": "IDEA0", "ID": "5da85c9a-f987-4835-aefb-62466fb817cc", "DetectTime": "2023-10-30T14:15:01.490368+02:00", "EventTime": "2023-10-30T14:15:01.490379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Cwt05E2NwhziCaYuec"]} -{"Format": "IDEA0", "ID": "1e74fd4f-0358-4a84-9e78-63a8ddf3816e", "DetectTime": "2023-10-30T14:15:01.520191+02:00", "EventTime": "2023-10-30T14:15:01.520202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["Cozh4k42pQQYVfOUPa"]} -{"Format": "Json", "ID": "1e74fd4f-0358-4a84-9e78-63a8ddf3816e", "DetectTime": "2023-10-30T14:15:01.520191+02:00", "EventTime": "2023-10-30T14:15:01.520202+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:20:05.393406+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:01.582931)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9a661d07-c2ac-40c7-bc9c-b76cb979e1fe", "DetectTime": "2023-10-30T14:15:01.587162+02:00", "EventTime": "2023-10-30T14:15:01.587174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["Ca6SGZyDpvwdq9ibe"]} -{"Format": "IDEA0", "ID": "7926c479-3fc3-4124-9eb1-125a05338eb4", "DetectTime": "2023-10-30T14:15:01.612995+02:00", "EventTime": "2023-10-30T14:15:01.613012+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CbDHXe8ymz4vO0dvc"]} -{"Format": "IDEA0", "ID": "4f579ec8-2e20-4dfe-a907-b8dfecff5abe", "DetectTime": "2023-10-30T14:15:01.645969+02:00", "EventTime": "2023-10-30T14:15:01.645984+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["C1lktB1Egy4pbAugg5"]} -{"Format": "IDEA0", "ID": "585a25ff-90a1-45c0-8b6f-005f353c204b", "DetectTime": "2023-10-30T14:15:01.678776+02:00", "EventTime": "2023-10-30T14:15:01.678801+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C2X97C1nGbWCculPE5"]} -{"Format": "IDEA0", "ID": "af09f132-f42f-4648-b0b6-768ee3b8dea6", "DetectTime": "2023-10-30T14:15:01.709428+02:00", "EventTime": "2023-10-30T14:15:01.709443+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CEcTf71NgQT0FER0c6"]} -{"Format": "IDEA0", "ID": "f3ce74cd-6374-4085-a67d-8588410112e5", "DetectTime": "2023-10-30T14:15:01.732059+02:00", "EventTime": "2023-10-30T14:15:01.732073+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CulKU61LzkXQh47JWg"]} -{"Format": "IDEA0", "ID": "16d2a362-7ad0-44cb-9b45-15e146ebe0f2", "DetectTime": "2023-10-30T14:15:01.759033+02:00", "EventTime": "2023-10-30T14:15:01.759050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CB25yv3ucjcOHEmtOh"]} -{"Format": "IDEA0", "ID": "663ecaa1-67c7-46fe-a727-02d9f349def1", "DetectTime": "2023-10-30T14:15:01.861557+02:00", "EventTime": "2023-10-30T14:15:01.861575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3558], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 3558/TCP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["C6WUDD3bnbNcsiRaFf"]} -{"Format": "IDEA0", "ID": "c765a5fd-2ad9-4943-a847-97ac89e19182", "DetectTime": "2023-10-30T14:15:01.894604+02:00", "EventTime": "2023-10-30T14:15:01.894617+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["C7kWol44ayjG8uRqL6"]} -{"Format": "IDEA0", "ID": "c072da65-74e7-450f-81c3-debc0575d795", "DetectTime": "2023-10-30T14:15:01.920172+02:00", "EventTime": "2023-10-30T14:15:01.920183+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CNOQE01c3Z3290MlBh"]} -{"Format": "Json", "ID": "c072da65-74e7-450f-81c3-debc0575d795", "DetectTime": "2023-10-30T14:15:01.920172+02:00", "EventTime": "2023-10-30T14:15:01.920183+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:51:03.641984+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:01.983051)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "00f8a127-b0a1-4d2c-994a-ea4ae72c94ca", "DetectTime": "2023-10-30T14:15:01.987391+02:00", "EventTime": "2023-10-30T14:15:01.987404+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CZWUgDNEcqnLykqqg"]} -{"Format": "IDEA0", "ID": "fac25134-f11b-4d16-966e-620807f7ceba", "DetectTime": "2023-10-30T14:15:02.007569+02:00", "EventTime": "2023-10-30T14:15:02.007582+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CkcRPP7pIjWxjjSl3"]} -{"Format": "IDEA0", "ID": "217e6908-a898-4a7b-b25d-173df3317ef4", "DetectTime": "2023-10-30T14:15:02.031538+02:00", "EventTime": "2023-10-30T14:15:02.031555+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CYjkpl4tIXmNfhjL97"]} -{"Format": "IDEA0", "ID": "b084ba79-728d-4328-b550-c59345f431d1", "DetectTime": "2023-10-30T14:15:02.057243+02:00", "EventTime": "2023-10-30T14:15:02.057256+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["COgUWC46l18zq9GyM4"]} -{"Format": "IDEA0", "ID": "877e87c9-4879-4e4a-ab3a-6cac277b1207", "DetectTime": "2023-10-30T14:15:02.079502+02:00", "EventTime": "2023-10-30T14:15:02.079513+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["C7Opdd2NC5Ecux4oLa"]} -{"Format": "IDEA0", "ID": "439b42cd-36c5-4f3a-93a0-cddda37217a2", "DetectTime": "2023-10-30T14:15:02.102627+02:00", "EventTime": "2023-10-30T14:15:02.102637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CxGLRygMos7mFMmYd"]} -{"Format": "IDEA0", "ID": "4a3b29f1-2a8f-4521-b7c8-6561ee038b06", "DetectTime": "2023-10-30T14:15:02.126080+02:00", "EventTime": "2023-10-30T14:15:02.126093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C5mIpUDjHFDVRZ09i"]} -{"Format": "IDEA0", "ID": "58fc1cbc-0c1f-40e1-bca3-80f9e9de9461", "DetectTime": "2023-10-30T14:15:02.145371+02:00", "EventTime": "2023-10-30T14:15:02.145383+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Ct463P34roKTKJ09k7"]} -{"Format": "IDEA0", "ID": "5d8f06e7-4010-4a65-8291-15ecdea81e5e", "DetectTime": "2023-10-30T14:15:02.168032+02:00", "EventTime": "2023-10-30T14:15:02.168042+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CVpdVVS4a4WHUh656"]} -{"Format": "Json", "ID": "5d8f06e7-4010-4a65-8291-15ecdea81e5e", "DetectTime": "2023-10-30T14:15:02.168032+02:00", "EventTime": "2023-10-30T14:15:02.168042+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:51:08.275609+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:02.229338)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "81e01a71-2e1f-498c-932c-ce6f66b5a572", "DetectTime": "2023-10-30T14:15:02.233527+02:00", "EventTime": "2023-10-30T14:15:02.233541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CJ2ErF4aksueP3zrv6"]} -{"Format": "IDEA0", "ID": "ea879bb9-abbc-449c-9051-cdca025bf0ef", "DetectTime": "2023-10-30T14:15:02.258685+02:00", "EventTime": "2023-10-30T14:15:02.258703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CaRV2CLASThxTy8m1"]} -{"Format": "IDEA0", "ID": "71c635cd-0374-4743-a903-d375a4b27fe6", "DetectTime": "2023-10-30T14:15:02.284207+02:00", "EventTime": "2023-10-30T14:15:02.284216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["Cx3Qd32UkvQlr805v1"]} -{"Format": "IDEA0", "ID": "2a586b25-df8d-4776-901f-23c2dcf145ab", "DetectTime": "2023-10-30T14:15:02.304979+02:00", "EventTime": "2023-10-30T14:15:02.304991+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CMbCHx1P6bonNqcS75"]} -{"Format": "IDEA0", "ID": "6e513d1c-ecea-47de-a993-142be8d8850e", "DetectTime": "2023-10-30T14:15:02.324983+02:00", "EventTime": "2023-10-30T14:15:02.324994+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CuOqLz3cJDCfJRHl5e"]} -{"Format": "IDEA0", "ID": "cb79009c-0154-4427-bbf6-959eae76512b", "DetectTime": "2023-10-30T14:15:02.344536+02:00", "EventTime": "2023-10-30T14:15:02.344547+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cm69hQ1KSW833pSVoj"]} -{"Format": "IDEA0", "ID": "dfdc36be-68a9-468d-bced-5888c8a54736", "DetectTime": "2023-10-30T14:15:02.368592+02:00", "EventTime": "2023-10-30T14:15:02.368602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C2SpCUtk4cZUyxe9h"]} -{"Format": "IDEA0", "ID": "873b4d87-cabc-4fd7-a03f-c4cc3bb3f47f", "DetectTime": "2023-10-30T14:15:02.389963+02:00", "EventTime": "2023-10-30T14:15:02.389977+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CTUYjA3Bj8LkapCRj7"]} -{"Format": "IDEA0", "ID": "b074b082-a0ab-4519-8797-c6a7e56be8f3", "DetectTime": "2023-10-30T14:15:02.410734+02:00", "EventTime": "2023-10-30T14:15:02.410745+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C2GZU2CG5DzERa8s7"]} -{"Format": "IDEA0", "ID": "84c36299-fa76-4ff4-93ab-71fdf68e2396", "DetectTime": "2023-10-30T14:15:02.429671+02:00", "EventTime": "2023-10-30T14:15:02.429681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C2tqgr1yOz290EfsP4"]} -{"Format": "Json", "ID": "84c36299-fa76-4ff4-93ab-71fdf68e2396", "DetectTime": "2023-10-30T14:15:02.429671+02:00", "EventTime": "2023-10-30T14:15:02.429681+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:51:10.369962+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:02.496887)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "d41869a7-53e6-4e5c-81fc-cd8cabc9bf5d", "DetectTime": "2023-10-30T14:15:02.502110+02:00", "EventTime": "2023-10-30T14:15:02.502125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CZL1yU1q0gBwAlhc92"]} -{"Format": "IDEA0", "ID": "2b432ba6-9df0-4a6a-b365-a61188205997", "DetectTime": "2023-10-30T14:15:02.528615+02:00", "EventTime": "2023-10-30T14:15:02.528626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4968], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4968/UDP destination IP 108.80.13.137. ", "ContentType": "text/plain"}], "uids": ["CT84sh1U92Ufl1qH16"]} -{"Format": "IDEA0", "ID": "ed1ae4e1-c19c-46cb-96a0-3f2045f95c0b", "DetectTime": "2023-10-30T14:15:02.548983+02:00", "EventTime": "2023-10-30T14:15:02.548995+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CxGfaEyBo9MSNWaL4"]} -{"Format": "IDEA0", "ID": "e15859f1-bb40-4b61-b5df-ea48db83a35c", "DetectTime": "2023-10-30T14:15:02.569028+02:00", "EventTime": "2023-10-30T14:15:02.569038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CUGOdfP7d0kX0Cbad"]} -{"Format": "IDEA0", "ID": "9ce690b1-a27a-4445-b1d5-173e73a2ad60", "DetectTime": "2023-10-30T14:15:02.589084+02:00", "EventTime": "2023-10-30T14:15:02.589095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CBArLa1mOYiEkL6d55"]} -{"Format": "IDEA0", "ID": "da5c16e1-6e13-4243-b91d-229a2775068e", "DetectTime": "2023-10-30T14:15:02.610927+02:00", "EventTime": "2023-10-30T14:15:02.610938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CGrTz53KHndt0P2TCh"]} -{"Format": "IDEA0", "ID": "da1099e2-4ebd-40eb-9f25-3356e253f45b", "DetectTime": "2023-10-30T14:15:02.630861+02:00", "EventTime": "2023-10-30T14:15:02.630875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["Czq5Ns1vccr1tQdxB4"]} -{"Format": "IDEA0", "ID": "c9d39f7e-8def-420c-8d20-a351b127909b", "DetectTime": "2023-10-30T14:15:02.650694+02:00", "EventTime": "2023-10-30T14:15:02.650711+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CrrkMl2Dw300qvdEwj"]} -{"Format": "IDEA0", "ID": "8e6f700b-0425-478a-95f0-24df3f7fad04", "DetectTime": "2023-10-30T14:15:02.671161+02:00", "EventTime": "2023-10-30T14:15:02.671176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["C4vgKa3ma9uacb2p2i"]} -{"Format": "IDEA0", "ID": "a741b3e3-1b1a-4d1b-bd15-80af054cb06f", "DetectTime": "2023-10-30T14:15:02.690547+02:00", "EventTime": "2023-10-30T14:15:02.690557+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CNiwIp3QzcfctLFu1i"]} -{"Format": "Json", "ID": "a741b3e3-1b1a-4d1b-bd15-80af054cb06f", "DetectTime": "2023-10-30T14:15:02.690547+02:00", "EventTime": "2023-10-30T14:15:02.690557+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T01:51:12.293723+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 240. (real time 2023/10/30 14:15:02.749650)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ebe9854e-f6d0-42d7-9fc2-27fff7cb7ffd", "DetectTime": "2023-10-30T14:15:02.755188+02:00", "EventTime": "2023-10-30T14:15:02.755204+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CLahAIGw6JVrlOUO2"]} -{"Format": "IDEA0", "ID": "6afa3d2d-3690-4f44-a4b4-79fcb50e7742", "DetectTime": "2023-10-30T14:15:02.775184+02:00", "EventTime": "2023-10-30T14:15:02.775196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C6VDHj4qN5DlVqpRe1"]} -{"Format": "IDEA0", "ID": "c4e2982e-c628-468f-ad35-e0da03863e93", "DetectTime": "2023-10-30T14:15:02.796719+02:00", "EventTime": "2023-10-30T14:15:02.796733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CEzJko3GfKsnM397G4"]} -{"Format": "IDEA0", "ID": "c2661ab4-8894-44e0-9bb3-884ef6290a4f", "DetectTime": "2023-10-30T14:15:02.812651+02:00", "EventTime": "2023-10-30T14:15:02.812661+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C80ykD368GKYFwTPfg"]} -{"Format": "IDEA0", "ID": "3ad0cb2c-9dc6-462b-a218-de726020c6ed", "DetectTime": "2023-10-30T14:15:02.827855+02:00", "EventTime": "2023-10-30T14:15:02.827866+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtKeK53oUlbU8pZ0y9"]} -{"Format": "IDEA0", "ID": "cd7bec66-17a9-466a-9fcf-f8c46ff545e3", "DetectTime": "2023-10-30T14:15:02.846105+02:00", "EventTime": "2023-10-30T14:15:02.846121+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CKevKc59yIYWIZgOh"]} -{"Format": "IDEA0", "ID": "e72eb6d3-b8d7-4f35-8165-7a1c492c05a2", "DetectTime": "2023-10-30T14:15:02.867383+02:00", "EventTime": "2023-10-30T14:15:02.867394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7316], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 7316/TCP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CJTfpS8ZoRmsf0Kwe"]} -{"Format": "IDEA0", "ID": "2eaa868c-753b-4686-9735-a60b22db1de4", "DetectTime": "2023-10-30T14:15:02.902267+02:00", "EventTime": "2023-10-30T14:15:02.902279+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["Ci7Lof1ekxaE942mif"]} -{"Format": "IDEA0", "ID": "859c69cb-6f65-4842-824d-9ccc4bb510ef", "DetectTime": "2023-10-30T14:15:02.930827+02:00", "EventTime": "2023-10-30T14:15:02.930838+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["Cl7dg8R3eobAGVjg1"]} -{"Format": "IDEA0", "ID": "1f115435-9acd-46ee-bd11-af180b2dc244", "DetectTime": "2023-10-30T14:15:02.961188+02:00", "EventTime": "2023-10-30T14:15:02.961202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CP7UkS2PjwxMfEjcD9"]} -{"Format": "IDEA0", "ID": "f2161fbb-f174-4533-8625-1d1bb8c7023c", "DetectTime": "2023-10-30T14:15:02.993497+02:00", "EventTime": "2023-10-30T14:15:02.993509+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CfOu8y1KHQD87hUDtc"]} -{"Format": "IDEA0", "ID": "1154ca20-ad7b-4655-829d-64002cdf12b7", "DetectTime": "2023-10-30T14:15:03.013530+02:00", "EventTime": "2023-10-30T14:15:03.013541+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CWIGr63h0QyOippgrh"]} -{"Format": "IDEA0", "ID": "95f8216d-1722-494a-88c0-d9c4789366c9", "DetectTime": "2023-10-30T14:15:03.040011+02:00", "EventTime": "2023-10-30T14:15:03.040022+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CYakvz1EY8EnFivAKk"]} -{"Format": "IDEA0", "ID": "82089b68-1fe9-4347-bbe8-713957ee9b51", "DetectTime": "2023-10-30T14:15:03.067324+02:00", "EventTime": "2023-10-30T14:15:03.067339+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Ce5GP519diuTHg2Sv5"]} -{"Format": "Json", "ID": "82089b68-1fe9-4347-bbe8-713957ee9b51", "DetectTime": "2023-10-30T14:15:03.067324+02:00", "EventTime": "2023-10-30T14:15:03.067339+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:16:21.877145+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:03.152727)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "13fe7bd9-a6ca-470b-ba04-e62f1d6aed88", "DetectTime": "2023-10-30T14:15:03.156640+02:00", "EventTime": "2023-10-30T14:15:03.156650+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CfRo7n2zwAObUL0Gqc"]} -{"Format": "IDEA0", "ID": "ba00614e-4c16-4c22-ae7e-9c4d1b0b879d", "DetectTime": "2023-10-30T14:15:03.183854+02:00", "EventTime": "2023-10-30T14:15:03.183865+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["Cu3rsn4Gi2nxh3rol2"]} -{"Format": "IDEA0", "ID": "a47dee22-074b-43dc-85d7-8db93f857c3e", "DetectTime": "2023-10-30T14:15:03.212420+02:00", "EventTime": "2023-10-30T14:15:03.212444+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CTgEmn12W5ttAZaC82"]} -{"Format": "IDEA0", "ID": "37225d71-900f-4bfc-a678-5fc13f823328", "DetectTime": "2023-10-30T14:15:03.236683+02:00", "EventTime": "2023-10-30T14:15:03.236700+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["C5k4PA1oekh9QWiCI8"]} -{"Format": "IDEA0", "ID": "3cfefd1b-f6f8-416e-98d8-75cf635a0633", "DetectTime": "2023-10-30T14:15:03.261690+02:00", "EventTime": "2023-10-30T14:15:03.261702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C5FpJM1AJPR96AYwm9"]} -{"Format": "IDEA0", "ID": "80576dc7-1932-496c-a853-a35e6972e5a9", "DetectTime": "2023-10-30T14:15:03.280383+02:00", "EventTime": "2023-10-30T14:15:03.280394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CUa4Bk4KytMJAZRpN6"]} -{"Format": "IDEA0", "ID": "dca6b2af-122f-490f-b35a-e119b73c3a91", "DetectTime": "2023-10-30T14:15:03.303482+02:00", "EventTime": "2023-10-30T14:15:03.303492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CZATss3bop7dPqH5sg"]} -{"Format": "IDEA0", "ID": "75e8996e-e490-4651-b209-bc18c9d50ef0", "DetectTime": "2023-10-30T14:15:03.326391+02:00", "EventTime": "2023-10-30T14:15:03.326402+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["COovsH3xbHNhkIM6Ff"]} -{"Format": "IDEA0", "ID": "d048b339-211f-49f6-a27f-eac5d4218600", "DetectTime": "2023-10-30T14:15:03.350026+02:00", "EventTime": "2023-10-30T14:15:03.350038+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Cz3mdkugZKj2zTask"]} -{"Format": "Json", "ID": "d048b339-211f-49f6-a27f-eac5d4218600", "DetectTime": "2023-10-30T14:15:03.350026+02:00", "EventTime": "2023-10-30T14:15:03.350038+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:16:23.786946+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:03.408528)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "9728ba81-cc21-4297-8e36-5c53bafea723", "DetectTime": "2023-10-30T14:15:03.412446+02:00", "EventTime": "2023-10-30T14:15:03.412459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["C0ktNLRTuv7i0hDRd"]} -{"Format": "IDEA0", "ID": "d23b0841-4e57-494c-bd1b-28a6f76fd456", "DetectTime": "2023-10-30T14:15:03.436026+02:00", "EventTime": "2023-10-30T14:15:03.436037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CX7YW31nnaGwNlq8Q5"]} -{"Format": "IDEA0", "ID": "8a216436-13fb-4f40-8975-c4a9b91c3a28", "DetectTime": "2023-10-30T14:15:03.460452+02:00", "EventTime": "2023-10-30T14:15:03.460462+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CxmRuj1yjgwq2jrRQ1"]} -{"Format": "IDEA0", "ID": "dbdc7871-2ce8-4e8f-a979-10a691275a69", "DetectTime": "2023-10-30T14:15:03.479228+02:00", "EventTime": "2023-10-30T14:15:03.479238+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CGk5tp1HZpCLwlP6Fb"]} -{"Format": "IDEA0", "ID": "7ea7ff05-c7d5-4843-822d-11dbadce5c77", "DetectTime": "2023-10-30T14:15:03.504327+02:00", "EventTime": "2023-10-30T14:15:03.504337+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CcLTS42MbpltLDCjg9"]} -{"Format": "IDEA0", "ID": "3de77f7d-9cf2-44da-9cc7-1ff436c8ac6a", "DetectTime": "2023-10-30T14:15:03.526760+02:00", "EventTime": "2023-10-30T14:15:03.526772+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["ClEtJP1fWIzdUR64lc"]} -{"Format": "IDEA0", "ID": "45e1b1e6-06d3-4b84-9803-912d692ee95b", "DetectTime": "2023-10-30T14:15:03.552275+02:00", "EventTime": "2023-10-30T14:15:03.552285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CV6LXw4HaWIPl1qTr"]} -{"Format": "IDEA0", "ID": "616a3fc5-eba0-4185-bbf3-1a7092abb549", "DetectTime": "2023-10-30T14:15:03.573619+02:00", "EventTime": "2023-10-30T14:15:03.573630+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CYAjO11GYGKXpYb49"]} -{"Format": "IDEA0", "ID": "e173173f-ebbd-4c3e-a67d-c7323ce0a996", "DetectTime": "2023-10-30T14:15:03.600813+02:00", "EventTime": "2023-10-30T14:15:03.600828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["Cr2tGW1CSy2s3b0npk"]} -{"Format": "IDEA0", "ID": "c95064e7-a95c-44f3-bcde-b89c46f1beeb", "DetectTime": "2023-10-30T14:15:03.633099+02:00", "EventTime": "2023-10-30T14:15:03.633114+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C2UOtS176I6oUtSbc8"]} -{"Format": "Json", "ID": "c95064e7-a95c-44f3-bcde-b89c46f1beeb", "DetectTime": "2023-10-30T14:15:03.633099+02:00", "EventTime": "2023-10-30T14:15:03.633114+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:16:41.133251+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:03.697005)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "44e03e7f-752a-4fe4-adf4-95e3119946b0", "DetectTime": "2023-10-30T14:15:03.700825+02:00", "EventTime": "2023-10-30T14:15:03.700835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CMvAYl3IUMfYByAny"]} -{"Format": "IDEA0", "ID": "a0022cc7-2889-4bd8-99e4-23f2f1e802c2", "DetectTime": "2023-10-30T14:15:03.725511+02:00", "EventTime": "2023-10-30T14:15:03.725521+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CzMfxstopqbGUErDh"]} -{"Format": "IDEA0", "ID": "9c7d6cf6-17fd-4c27-b986-2fe8e8bd3e69", "DetectTime": "2023-10-30T14:15:03.749691+02:00", "EventTime": "2023-10-30T14:15:03.749703+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CGVIkt4GHiG5SufoX2"]} -{"Format": "IDEA0", "ID": "06fa5e2c-daac-4a4a-bf4d-ba22c7578064", "DetectTime": "2023-10-30T14:15:03.774427+02:00", "EventTime": "2023-10-30T14:15:03.774439+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["CprEnN2mVgIl43qRxh"]} -{"Format": "IDEA0", "ID": "80a099e7-e92c-498c-9cd2-c1b6850a2ccb", "DetectTime": "2023-10-30T14:15:03.798018+02:00", "EventTime": "2023-10-30T14:15:03.798032+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C8BMYzy787Gzi9the"]} -{"Format": "IDEA0", "ID": "89bb5386-df65-408c-8918-1abdcfbcf85b", "DetectTime": "2023-10-30T14:15:03.820915+02:00", "EventTime": "2023-10-30T14:15:03.820930+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["Ci2RAS1Pj5IqZ8ED32"]} -{"Format": "IDEA0", "ID": "0b7f7b0b-4c9d-4e32-ba8a-c29bc37cda3b", "DetectTime": "2023-10-30T14:15:03.843732+02:00", "EventTime": "2023-10-30T14:15:03.843744+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C7wThD39d2otnnUKm9"]} -{"Format": "IDEA0", "ID": "7f212208-9f5f-477c-a7a9-574c7595645d", "DetectTime": "2023-10-30T14:15:03.860089+02:00", "EventTime": "2023-10-30T14:15:03.860099+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVLXPB4Q49KP5huLpi"]} -{"Format": "IDEA0", "ID": "c5a7cabf-1ed7-45d4-8032-4f6b43cf319f", "DetectTime": "2023-10-30T14:15:03.880455+02:00", "EventTime": "2023-10-30T14:15:03.880474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C635W93ZhgxWLPeLJj"]} -{"Format": "IDEA0", "ID": "b189aef0-13fc-4c53-8629-b0567777d0a1", "DetectTime": "2023-10-30T14:15:03.899926+02:00", "EventTime": "2023-10-30T14:15:03.899937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CA8YK81jGvmeaJmPm3"]} -{"Format": "IDEA0", "ID": "fbfc7520-ad62-47e7-a665-aa4552f12c20", "DetectTime": "2023-10-30T14:15:03.919336+02:00", "EventTime": "2023-10-30T14:15:03.919346+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["C7u8gs2OafNp0pIKb7"]} -{"Format": "Json", "ID": "fbfc7520-ad62-47e7-a665-aa4552f12c20", "DetectTime": "2023-10-30T14:15:03.919336+02:00", "EventTime": "2023-10-30T14:15:03.919346+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:47:10.848719+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:03.992683)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "3e4b4a1f-416a-47a3-8651-e55d8726af11", "DetectTime": "2023-10-30T14:15:03.996682+02:00", "EventTime": "2023-10-30T14:15:03.996712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CuySGf1ZEXKmnFjUJc"]} -{"Format": "IDEA0", "ID": "607e8cd5-7f45-4129-ba38-180e19e5db25", "DetectTime": "2023-10-30T14:15:04.026713+02:00", "EventTime": "2023-10-30T14:15:04.026729+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["Clyo523WbsOcd9xYqg"]} -{"Format": "IDEA0", "ID": "beec369a-4094-497a-9c46-48567aeab849", "DetectTime": "2023-10-30T14:15:04.057978+02:00", "EventTime": "2023-10-30T14:15:04.057993+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CEFzHh1SVUPclLXrvc"]} -{"Format": "IDEA0", "ID": "7bad8e7f-7a92-4142-ba89-85c4d8bfdb07", "DetectTime": "2023-10-30T14:15:04.086252+02:00", "EventTime": "2023-10-30T14:15:04.086266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["COim4p3JskATDEizl5"]} -{"Format": "IDEA0", "ID": "5ea9d2fe-609a-4a88-a872-3b550075417f", "DetectTime": "2023-10-30T14:15:04.111304+02:00", "EventTime": "2023-10-30T14:15:04.111314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CqQYaU1UWNG3Oll0ih"]} -{"Format": "IDEA0", "ID": "8c68fbe3-26b4-4fca-ad67-629fef95609a", "DetectTime": "2023-10-30T14:15:04.130379+02:00", "EventTime": "2023-10-30T14:15:04.130390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cx8Gyn1tOkFUrvt5U5"]} -{"Format": "IDEA0", "ID": "eb7b0bd9-c213-4ecf-90e2-fdd932424397", "DetectTime": "2023-10-30T14:15:04.150903+02:00", "EventTime": "2023-10-30T14:15:04.150916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CAPh9e1JHAjYdmdBr"]} -{"Format": "IDEA0", "ID": "4e111cb7-f521-4602-a1df-3a000d3ab9d4", "DetectTime": "2023-10-30T14:15:04.173263+02:00", "EventTime": "2023-10-30T14:15:04.173275+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cfcfbzipn0SiXSuLc"]} -{"Format": "IDEA0", "ID": "a850cb24-c864-4189-926c-4be49cf9414b", "DetectTime": "2023-10-30T14:15:04.192877+02:00", "EventTime": "2023-10-30T14:15:04.192886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["C9AE1F44dc3RDRwvW3"]} -{"Format": "Json", "ID": "a850cb24-c864-4189-926c-4be49cf9414b", "DetectTime": "2023-10-30T14:15:04.192877+02:00", "EventTime": "2023-10-30T14:15:04.192886+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:47:13.449371+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:04.249721)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "a097116e-b6ed-4fb8-9553-fe10de18ebfd", "DetectTime": "2023-10-30T14:15:04.253430+02:00", "EventTime": "2023-10-30T14:15:04.253441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["C75I4s3SpkHECDBmr6"]} -{"Format": "IDEA0", "ID": "68675b17-1db7-4967-980a-0ace5f375dd6", "DetectTime": "2023-10-30T14:15:04.274299+02:00", "EventTime": "2023-10-30T14:15:04.274314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CYDjUx1T4u77WMzA5c"]} -{"Format": "IDEA0", "ID": "d5907c18-469c-4bfa-a863-0071737aea0a", "DetectTime": "2023-10-30T14:15:04.295050+02:00", "EventTime": "2023-10-30T14:15:04.295061+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CS2sP61Ofj558Fw8j9"]} -{"Format": "IDEA0", "ID": "a9a90cb0-9877-4d60-853a-37cd6948e567", "DetectTime": "2023-10-30T14:15:04.316028+02:00", "EventTime": "2023-10-30T14:15:04.316037+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CR19776CQ74b1uJjg"]} -{"Format": "IDEA0", "ID": "87a0cf92-83e5-4f90-8c2b-77f3740e5f11", "DetectTime": "2023-10-30T14:15:04.333645+02:00", "EventTime": "2023-10-30T14:15:04.333656+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CjVXIv4nb3n1KjtUkf"]} -{"Format": "IDEA0", "ID": "476d6c84-db46-4d7f-9393-155d600fafd6", "DetectTime": "2023-10-30T14:15:04.356285+02:00", "EventTime": "2023-10-30T14:15:04.356297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CFErCk4t8wDY6NGa9k"]} -{"Format": "IDEA0", "ID": "150ea77b-376c-4f0d-8f70-5bc57491772f", "DetectTime": "2023-10-30T14:15:04.375563+02:00", "EventTime": "2023-10-30T14:15:04.375575+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CFreNy1nwnFhxhEGRj"]} -{"Format": "IDEA0", "ID": "ac1b8bc2-1af7-43b9-bd6c-8fb23123c57c", "DetectTime": "2023-10-30T14:15:04.395522+02:00", "EventTime": "2023-10-30T14:15:04.395537+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["Ca8KHe2StUxP6Q2R8k"]} -{"Format": "IDEA0", "ID": "cfce994f-66ae-498e-8276-d1b3d15e30d2", "DetectTime": "2023-10-30T14:15:04.420959+02:00", "EventTime": "2023-10-30T14:15:04.420975+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["C4DMAv4tPK0j3XAuAd"]} -{"Format": "Json", "ID": "cfce994f-66ae-498e-8276-d1b3d15e30d2", "DetectTime": "2023-10-30T14:15:04.420959+02:00", "EventTime": "2023-10-30T14:15:04.420975+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:47:15.475402+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:04.475099)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "c6007c10-7eea-4304-89cc-a5c4d3d7a72f", "DetectTime": "2023-10-30T14:15:04.478811+02:00", "EventTime": "2023-10-30T14:15:04.478823+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXo6wo2yoYGm3YK6Be"]} -{"Format": "IDEA0", "ID": "eb406ff8-7402-4706-bddd-81b11fe225a1", "DetectTime": "2023-10-30T14:15:04.497369+02:00", "EventTime": "2023-10-30T14:15:04.497379+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CcS1oj3ZG4WVrkCona"]} -{"Format": "IDEA0", "ID": "05a1ab1b-aa60-46d0-b077-338cd63b2445", "DetectTime": "2023-10-30T14:15:04.516831+02:00", "EventTime": "2023-10-30T14:15:04.516842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["ConrQw3wGBA2NIsnR6"]} -{"Format": "IDEA0", "ID": "b299f058-7795-4c2f-8eb5-73e03e902443", "DetectTime": "2023-10-30T14:15:04.533741+02:00", "EventTime": "2023-10-30T14:15:04.533755+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C7NdOn1JLEVGNXCca9"]} -{"Format": "IDEA0", "ID": "a19d47c8-5eca-4d61-94e1-bf3bd1ce6495", "DetectTime": "2023-10-30T14:15:04.551135+02:00", "EventTime": "2023-10-30T14:15:04.551144+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CDrlZm3rJYxVQzvZr3"]} -{"Format": "IDEA0", "ID": "810454c6-2d60-417e-9736-4b10a8e02957", "DetectTime": "2023-10-30T14:15:04.572579+02:00", "EventTime": "2023-10-30T14:15:04.572594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C3lb7B3UwXT6Eu5EG1"]} -{"Format": "IDEA0", "ID": "e45393ef-ae3c-473e-8a8c-d7b4d255be4b", "DetectTime": "2023-10-30T14:15:04.594350+02:00", "EventTime": "2023-10-30T14:15:04.594361+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CZeJ7722MAKzIiRuH4"]} -{"Format": "IDEA0", "ID": "176c0419-b019-4c43-8624-2769773feff3", "DetectTime": "2023-10-30T14:15:04.613048+02:00", "EventTime": "2023-10-30T14:15:04.613064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Cd1hNQ32DPWfMkn9sa"]} -{"Format": "IDEA0", "ID": "0bdfdec7-0278-4072-9eca-8f26e7588e1b", "DetectTime": "2023-10-30T14:15:04.639826+02:00", "EventTime": "2023-10-30T14:15:04.639836+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CoPmSJ1H1j7cgRu4uh"]} -{"Format": "IDEA0", "ID": "3e787ccd-bdf3-41ca-8d34-dcd13be2c58a", "DetectTime": "2023-10-30T14:15:04.661523+02:00", "EventTime": "2023-10-30T14:15:04.661538+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CJ6ECR364PgnubFiok"]} -{"Format": "IDEA0", "ID": "7f9ef2e9-a22d-4ba2-904f-4fac69e63eb5", "DetectTime": "2023-10-30T14:15:04.679311+02:00", "EventTime": "2023-10-30T14:15:04.679322+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CEajur4wy034iPgjm8"]} -{"Format": "IDEA0", "ID": "c04ccbf5-3cec-4988-b04f-12785988849e", "DetectTime": "2023-10-30T14:15:04.697664+02:00", "EventTime": "2023-10-30T14:15:04.697674+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cn78Tz2O9hpr19OXv2"]} -{"Format": "IDEA0", "ID": "25d501b6-75c2-4b67-86d0-37cc654784ac", "DetectTime": "2023-10-30T14:15:04.713873+02:00", "EventTime": "2023-10-30T14:15:04.713886+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["Cr0NPS2tp5oORYvBBb"]} -{"Format": "IDEA0", "ID": "4c17be96-d6ce-4392-a644-7a91016ff471", "DetectTime": "2023-10-30T14:15:04.735703+02:00", "EventTime": "2023-10-30T14:15:04.735715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["C8NfA3pNtpJ8BfW01"]} -{"Format": "IDEA0", "ID": "35b62e63-a614-4ed0-aa65-b196f180639a", "DetectTime": "2023-10-30T14:15:04.753180+02:00", "EventTime": "2023-10-30T14:15:04.753191+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CElztG2h8MHhBRE1Cd"]} -{"Format": "Json", "ID": "35b62e63-a614-4ed0-aa65-b196f180639a", "DetectTime": "2023-10-30T14:15:04.753180+02:00", "EventTime": "2023-10-30T14:15:04.753191+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T11:47:17.583993+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 250. (real time 2023/10/30 14:15:04.809335)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "489775e3-848d-4ed0-b00e-ad01e8c5d744", "DetectTime": "2023-10-30T14:15:04.813312+02:00", "EventTime": "2023-10-30T14:15:04.813330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CPA3jtUHCJslYhFm"]} -{"Format": "IDEA0", "ID": "23f0357f-b0f8-41a2-9e29-1d1aa855d3b2", "DetectTime": "2023-10-30T14:15:04.833270+02:00", "EventTime": "2023-10-30T14:15:04.833285+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CrfENH1dEXRcKHjWw6"]} -{"Format": "IDEA0", "ID": "4f4ba23e-7c88-4db6-bcab-7f94b60ec6c2", "DetectTime": "2023-10-30T14:15:04.853002+02:00", "EventTime": "2023-10-30T14:15:04.853013+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiyTNu32ImVycvIcpb"]} -{"Format": "IDEA0", "ID": "617b783c-910c-43f9-8193-6b589cd5087a", "DetectTime": "2023-10-30T14:15:04.868244+02:00", "EventTime": "2023-10-30T14:15:04.868254+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CIPEbE13wXTahKlHPd"]} -{"Format": "IDEA0", "ID": "afa213a0-2435-4ee7-8db3-ece5a2d4ed7b", "DetectTime": "2023-10-30T14:15:04.887738+02:00", "EventTime": "2023-10-30T14:15:04.887748+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CvJBPb2DPMHJZyjYC3"]} -{"Format": "IDEA0", "ID": "9791661e-2809-4736-95bc-d8f8af7d75b6", "DetectTime": "2023-10-30T14:15:04.908371+02:00", "EventTime": "2023-10-30T14:15:04.908382+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CBNwDe1kxD7Q6Keg6j"]} -{"Format": "IDEA0", "ID": "e7cf6253-34f5-460b-b322-52ca71cc1b77", "DetectTime": "2023-10-30T14:15:04.929998+02:00", "EventTime": "2023-10-30T14:15:04.930010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CScl0B2bZuVK4jZMHc"]} -{"Format": "IDEA0", "ID": "292c9594-5882-4292-9453-49fd47292e8e", "DetectTime": "2023-10-30T14:15:04.953692+02:00", "EventTime": "2023-10-30T14:15:04.953702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CG0Y0s1RJT4BS84MK2"]} -{"Format": "IDEA0", "ID": "e23670c4-170b-4678-8843-bd5357b7bb16", "DetectTime": "2023-10-30T14:15:04.977973+02:00", "EventTime": "2023-10-30T14:15:04.977985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C95lU42F3ywhLMH8Fe"]} -{"Format": "IDEA0", "ID": "9d46c36f-ef45-4eae-a18b-9d23429ad1ae", "DetectTime": "2023-10-30T14:15:05.003275+02:00", "EventTime": "2023-10-30T14:15:05.003288+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CIa1Yx23q9qbSg30Le"]} -{"Format": "IDEA0", "ID": "3f6e2923-c8ee-4d49-8981-6a0e6dbe38a2", "DetectTime": "2023-10-30T14:15:05.026918+02:00", "EventTime": "2023-10-30T14:15:05.026934+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["ChXzRr214OUJ4Zygb8"]} -{"Format": "IDEA0", "ID": "9f771bda-bce0-43f4-806e-ad718583b15c", "DetectTime": "2023-10-30T14:15:05.055047+02:00", "EventTime": "2023-10-30T14:15:05.055062+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["Cj9e881HZu5U5avTC1"]} -{"Format": "Json", "ID": "9f771bda-bce0-43f4-806e-ad718583b15c", "DetectTime": "2023-10-30T14:15:05.055047+02:00", "EventTime": "2023-10-30T14:15:05.055062+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:17:45.005718+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:05.117542)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "ae81b5f3-2f99-46c3-9990-320ab977c109", "DetectTime": "2023-10-30T14:15:05.121682+02:00", "EventTime": "2023-10-30T14:15:05.121696+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CCA2OZ3u5qsjKzwAV5"]} -{"Format": "IDEA0", "ID": "ba14ced8-ef54-462a-8b16-6f21879cf8b0", "DetectTime": "2023-10-30T14:15:05.145818+02:00", "EventTime": "2023-10-30T14:15:05.145835+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["Co676X29pOqqsK9ylh"]} -{"Format": "IDEA0", "ID": "3a635efa-cef6-4d8f-bf87-b1ecdf301d41", "DetectTime": "2023-10-30T14:15:05.172380+02:00", "EventTime": "2023-10-30T14:15:05.172396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["Co83Ns2BpDcdIjWJN4"]} -{"Format": "IDEA0", "ID": "8e839c7a-3574-4033-9a44-5595de196fa9", "DetectTime": "2023-10-30T14:15:05.192971+02:00", "EventTime": "2023-10-30T14:15:05.192980+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C6dWlA2sonnfXR6Zzi"]} -{"Format": "IDEA0", "ID": "f3d05e96-0593-479c-8be2-f9cdb9b739ee", "DetectTime": "2023-10-30T14:15:05.212070+02:00", "EventTime": "2023-10-30T14:15:05.212079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CklUGQ3mB4C3xxDzn5"]} -{"Format": "IDEA0", "ID": "93d445f0-54e3-412c-9e8e-96fb7c8d2ad8", "DetectTime": "2023-10-30T14:15:05.231733+02:00", "EventTime": "2023-10-30T14:15:05.231742+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["Ctjfjt4OFqcgTCFuzb"]} -{"Format": "IDEA0", "ID": "5c5c1aac-9bb7-4db9-8058-6b413363dabd", "DetectTime": "2023-10-30T14:15:05.254673+02:00", "EventTime": "2023-10-30T14:15:05.254688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CBYN0U3leL6VKUhn88"]} -{"Format": "IDEA0", "ID": "081cfa0b-29ec-4059-9c9d-94792729576d", "DetectTime": "2023-10-30T14:15:05.277145+02:00", "EventTime": "2023-10-30T14:15:05.277155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CPVGJt2klog7XNrRBd"]} -{"Format": "IDEA0", "ID": "69457b0b-7774-4add-b388-14d7b96d2184", "DetectTime": "2023-10-30T14:15:05.299122+02:00", "EventTime": "2023-10-30T14:15:05.299133+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CuUFpcnGyksEYpyhd"]} -{"Format": "IDEA0", "ID": "db6ecf5d-052b-463a-abd1-dd126378bb63", "DetectTime": "2023-10-30T14:15:05.322330+02:00", "EventTime": "2023-10-30T14:15:05.322340+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["ChAqB5NJiYeAAgu6"]} -{"Format": "Json", "ID": "db6ecf5d-052b-463a-abd1-dd126378bb63", "DetectTime": "2023-10-30T14:15:05.322330+02:00", "EventTime": "2023-10-30T14:15:05.322340+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:17:46.925504+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:05.373359)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "19d24367-3dc8-409d-b417-5480a032cfa3", "DetectTime": "2023-10-30T14:15:05.377163+02:00", "EventTime": "2023-10-30T14:15:05.377174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CPpqH82rcghsDrGsD5"]} -{"Format": "IDEA0", "ID": "7828cdd6-4b3a-40c3-957c-b6733efcf04f", "DetectTime": "2023-10-30T14:15:05.401696+02:00", "EventTime": "2023-10-30T14:15:05.401706+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["Cbw5I5PMDPFI5eWN3"]} -{"Format": "IDEA0", "ID": "31ee7e90-f09f-4766-be2e-a8af50bad9cd", "DetectTime": "2023-10-30T14:15:05.427390+02:00", "EventTime": "2023-10-30T14:15:05.427406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CRGHnU3X4ZioUfEoSh"]} -{"Format": "IDEA0", "ID": "efe31321-f86d-4ba7-9bf4-1b74453c0447", "DetectTime": "2023-10-30T14:15:05.453391+02:00", "EventTime": "2023-10-30T14:15:05.453407+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CLBnbz4ECpyYX9H9jl"]} -{"Format": "IDEA0", "ID": "91cc81ec-1988-412f-b1bb-9ed421fdd6e5", "DetectTime": "2023-10-30T14:15:05.476055+02:00", "EventTime": "2023-10-30T14:15:05.476065+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CyJquM1VaxE3sxOrMg"]} -{"Format": "IDEA0", "ID": "7fb48b79-b114-403f-adcc-1815214888aa", "DetectTime": "2023-10-30T14:15:05.493707+02:00", "EventTime": "2023-10-30T14:15:05.493717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CdRx4a3PhcVkKKxdBd"]} -{"Format": "IDEA0", "ID": "3a5cb32d-ce10-49a9-96a3-5ffef00c8e4f", "DetectTime": "2023-10-30T14:15:05.512146+02:00", "EventTime": "2023-10-30T14:15:05.512156+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["COLujX3uYX4wng5u8h"]} -{"Format": "IDEA0", "ID": "e9b3f69e-7457-4e29-8320-60572f6942a2", "DetectTime": "2023-10-30T14:15:05.532440+02:00", "EventTime": "2023-10-30T14:15:05.532452+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CIHz8a2RuUQCj8ZXBk"]} -{"Format": "Json", "ID": "e9b3f69e-7457-4e29-8320-60572f6942a2", "DetectTime": "2023-10-30T14:15:05.532440+02:00", "EventTime": "2023-10-30T14:15:05.532452+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:17:48.710363+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:05.590103)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "1ca90ea9-2ba1-4992-bac7-52a0166e196d", "DetectTime": "2023-10-30T14:15:05.593961+02:00", "EventTime": "2023-10-30T14:15:05.593972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["ClpxS23VVJ01zE38Z7"]} -{"Format": "IDEA0", "ID": "606d5e41-9f57-45f3-bbf4-87dd6c805834", "DetectTime": "2023-10-30T14:15:05.613139+02:00", "EventTime": "2023-10-30T14:15:05.613151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CvWtGl1RkyhIcjPp6e"]} -{"Format": "IDEA0", "ID": "d240acec-1ac6-4ae2-901d-1a32331c0385", "DetectTime": "2023-10-30T14:15:05.632895+02:00", "EventTime": "2023-10-30T14:15:05.632909+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0k84e4yYuspPUjyh4"]} -{"Format": "IDEA0", "ID": "273904ac-80ac-4101-b974-b11c0cef6cdf", "DetectTime": "2023-10-30T14:15:05.654383+02:00", "EventTime": "2023-10-30T14:15:05.654394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CFt50f10JQay602fF5"]} -{"Format": "IDEA0", "ID": "35345d08-156d-4d13-b886-657215c5891c", "DetectTime": "2023-10-30T14:15:05.674710+02:00", "EventTime": "2023-10-30T14:15:05.674726+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["COyFKL23KGax8p6wkl"]} -{"Format": "IDEA0", "ID": "c7fdfff5-adff-4a9f-8f7b-e35598561ce0", "DetectTime": "2023-10-30T14:15:05.692008+02:00", "EventTime": "2023-10-30T14:15:05.692018+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjpELwkZmdQvLISYh"]} -{"Format": "IDEA0", "ID": "ce1b7174-f55d-46db-9628-a1548e6c253d", "DetectTime": "2023-10-30T14:15:05.708432+02:00", "EventTime": "2023-10-30T14:15:05.708441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CJPqho3uW5Go3sF0Ec"]} -{"Format": "IDEA0", "ID": "873e00c5-8bb4-4988-a592-cb4f81cc9155", "DetectTime": "2023-10-30T14:15:05.725891+02:00", "EventTime": "2023-10-30T14:15:05.725901+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CLZeHt2oh67Oly2fqg"]} -{"Format": "IDEA0", "ID": "dfdbc073-1e0e-4248-8385-85460312b88d", "DetectTime": "2023-10-30T14:15:05.744191+02:00", "EventTime": "2023-10-30T14:15:05.744202+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["C2oaV53EFkvNUdwind"]} -{"Format": "Json", "ID": "dfdbc073-1e0e-4248-8385-85460312b88d", "DetectTime": "2023-10-30T14:15:05.744191+02:00", "EventTime": "2023-10-30T14:15:05.744202+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:48:09.087988+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:05.799055)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "bd66aa56-bd83-4ad7-a670-0c06418fc172", "DetectTime": "2023-10-30T14:15:05.802915+02:00", "EventTime": "2023-10-30T14:15:05.802927+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["C8Bopz4yCMUeGa8aNc"]} -{"Format": "IDEA0", "ID": "331f9f65-a1b8-4b93-a845-8efbb4b049f4", "DetectTime": "2023-10-30T14:15:05.819648+02:00", "EventTime": "2023-10-30T14:15:05.819658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["CNNxpi1Jeltgjr3ZTg"]} -{"Format": "IDEA0", "ID": "5698539c-f2f2-45a9-8654-5d61da345dd1", "DetectTime": "2023-10-30T14:15:05.835946+02:00", "EventTime": "2023-10-30T14:15:05.835956+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CKPxJX3kEIHxcmYt33"]} -{"Format": "IDEA0", "ID": "9e2796a6-bc69-4038-a3e6-50c5bfa49e4c", "DetectTime": "2023-10-30T14:15:05.853796+02:00", "EventTime": "2023-10-30T14:15:05.853806+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["Cg9cFHaqX2nywBHW6"]} -{"Format": "IDEA0", "ID": "7fb05542-926f-486f-ae79-affe4e6cb314", "DetectTime": "2023-10-30T14:15:05.870252+02:00", "EventTime": "2023-10-30T14:15:05.870268+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["Ceg8PI38kNjCv6Tcq8"]} -{"Format": "IDEA0", "ID": "2df55018-9032-4836-aa65-73704807bbbd", "DetectTime": "2023-10-30T14:15:05.893101+02:00", "EventTime": "2023-10-30T14:15:05.893117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CNoV8z4EQhu9dK5mP2"]} -{"Format": "IDEA0", "ID": "529351fe-cd4d-4433-aa17-77fd932fff83", "DetectTime": "2023-10-30T14:15:05.916573+02:00", "EventTime": "2023-10-30T14:15:05.916588+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["CDj8cECl7POH4GYu9"]} -{"Format": "IDEA0", "ID": "978fd899-9ce0-4845-b3dc-88b054309a00", "DetectTime": "2023-10-30T14:15:05.937470+02:00", "EventTime": "2023-10-30T14:15:05.937483+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CrFBuGgjf7KtcSX34"]} -{"Format": "IDEA0", "ID": "e80bc926-3a13-45da-bca4-4f1aa9576578", "DetectTime": "2023-10-30T14:15:05.956948+02:00", "EventTime": "2023-10-30T14:15:05.956963+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CPiTDl2iB99GVbAKK4"]} -{"Format": "Json", "ID": "e80bc926-3a13-45da-bca4-4f1aa9576578", "DetectTime": "2023-10-30T14:15:05.956948+02:00", "EventTime": "2023-10-30T14:15:05.956963+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:48:11.038636+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:06.022381)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f788d327-21c2-4d18-ac77-c9718b79c07a", "DetectTime": "2023-10-30T14:15:06.026393+02:00", "EventTime": "2023-10-30T14:15:06.026406+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CBtC8O2X3QON5OuNfi"]} -{"Format": "IDEA0", "ID": "fee8308d-dbc9-48bc-8730-8bcccca1192a", "DetectTime": "2023-10-30T14:15:06.046063+02:00", "EventTime": "2023-10-30T14:15:06.046079+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CKAtYfeRe6kGqOjhh"]} -{"Format": "IDEA0", "ID": "870bd07c-6e05-4152-ae08-eb91dae1624f", "DetectTime": "2023-10-30T14:15:06.064222+02:00", "EventTime": "2023-10-30T14:15:06.064233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["CXiEh14PI1q4s95h33"]} -{"Format": "IDEA0", "ID": "23d9faf6-2208-415b-bc1a-04a15ffedddc", "DetectTime": "2023-10-30T14:15:06.080677+02:00", "EventTime": "2023-10-30T14:15:06.080688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["CuyP0hLuDkaNMP623"]} -{"Format": "IDEA0", "ID": "4ebdc02a-baff-4b99-8cf6-b0c82b7ee7e0", "DetectTime": "2023-10-30T14:15:06.095510+02:00", "EventTime": "2023-10-30T14:15:06.095519+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["CRauK52Y3cWFGYLyee"]} -{"Format": "IDEA0", "ID": "c2d69f05-448c-4cb8-8399-fe7a77be8726", "DetectTime": "2023-10-30T14:15:06.109629+02:00", "EventTime": "2023-10-30T14:15:06.109639+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["C77HSL3OiQFZIhzhK4"]} -{"Format": "IDEA0", "ID": "df7cccb2-05fb-4685-abf0-8016a7b4af45", "DetectTime": "2023-10-30T14:15:06.123963+02:00", "EventTime": "2023-10-30T14:15:06.123972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CPEGyc4MMugA5nmmm"]} -{"Format": "IDEA0", "ID": "f9f6a4d4-763b-44ed-9373-2603445c0f4f", "DetectTime": "2023-10-30T14:15:06.138817+02:00", "EventTime": "2023-10-30T14:15:06.138828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["CFClcJ3QTbx8Y95K04"]} -{"Format": "Json", "ID": "f9f6a4d4-763b-44ed-9373-2603445c0f4f", "DetectTime": "2023-10-30T14:15:06.138817+02:00", "EventTime": "2023-10-30T14:15:06.138828+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:48:13.411694+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:06.190676)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "f8fc018d-9f75-4a4a-8669-963eac3bc0dc", "DetectTime": "2023-10-30T14:15:06.194762+02:00", "EventTime": "2023-10-30T14:15:06.194774+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["CaQUpV3VrqWZpymqVb"]} -{"Format": "IDEA0", "ID": "8a629182-e351-4210-a168-5b23d7f6f065", "DetectTime": "2023-10-30T14:15:06.208831+02:00", "EventTime": "2023-10-30T14:15:06.208841+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CzRunSWoC9UnlG8fh"]} -{"Format": "IDEA0", "ID": "c160aef3-5cc7-44f4-b9f9-a97b8ceda5c7", "DetectTime": "2023-10-30T14:15:06.223421+02:00", "EventTime": "2023-10-30T14:15:06.223431+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CXtgkU13qeLLflbJad"]} -{"Format": "IDEA0", "ID": "25d4628b-908c-4c2d-83d3-2cd84f52750c", "DetectTime": "2023-10-30T14:15:06.236222+02:00", "EventTime": "2023-10-30T14:15:06.236233+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["ClRmwF2ZaVisogxYxj"]} -{"Format": "IDEA0", "ID": "5c0f56d2-d766-4eb0-b76b-923267b552d2", "DetectTime": "2023-10-30T14:15:06.248878+02:00", "EventTime": "2023-10-30T14:15:06.248887+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["C4QfHa4lK0cXtzTVL2"]} -{"Format": "IDEA0", "ID": "96d45aac-e9a9-48ad-87e9-4ed3d9d0e2db", "DetectTime": "2023-10-30T14:15:06.261890+02:00", "EventTime": "2023-10-30T14:15:06.261900+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CVa6dq1uwIFFlPbsm8"]} -{"Format": "IDEA0", "ID": "ede0d3a1-6437-4a05-abf8-81aef7ae7ad5", "DetectTime": "2023-10-30T14:15:06.281533+02:00", "EventTime": "2023-10-30T14:15:06.281546+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C8bDxk4HEO4zaWHOIi"]} -{"Format": "IDEA0", "ID": "eda19559-d807-4172-bf45-e3b2d2e0f657", "DetectTime": "2023-10-30T14:15:06.294274+02:00", "EventTime": "2023-10-30T14:15:06.294286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CAWK1kE6uxqgnJJQ7"]} -{"Format": "IDEA0", "ID": "3f40db35-0e65-414e-bb3b-292a7f47ab9e", "DetectTime": "2023-10-30T14:15:06.307322+02:00", "EventTime": "2023-10-30T14:15:06.307333+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["C1cgZF1jiOBjnmfJEa"]} -{"Format": "Json", "ID": "3f40db35-0e65-414e-bb3b-292a7f47ab9e", "DetectTime": "2023-10-30T14:15:06.307322+02:00", "EventTime": "2023-10-30T14:15:06.307333+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T12:48:16.466985+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 251. (real time 2023/10/30 14:15:06.360428)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b8645b40-e871-40eb-b276-3fb2f5c7bb10", "DetectTime": "2023-10-30T14:15:06.365408+02:00", "EventTime": "2023-10-30T14:15:06.365423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CFMDCh4nNYhgS0o13l"]} -{"Format": "IDEA0", "ID": "d22d0327-d52b-49f6-9c09-9622759700f9", "DetectTime": "2023-10-30T14:15:06.379438+02:00", "EventTime": "2023-10-30T14:15:06.379448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKisfJyRgOmdtOSNe"]} -{"Format": "IDEA0", "ID": "6c8b807b-d9ec-480c-9b54-6d0c52cec872", "DetectTime": "2023-10-30T14:15:06.395672+02:00", "EventTime": "2023-10-30T14:15:06.395688+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7710], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. ", "ContentType": "text/plain"}], "uids": ["CgaZU23qP7jaMHq3Tc"]} -{"Format": "IDEA0", "ID": "046e2d2a-255c-4856-ba4a-bae27bfec018", "DetectTime": "2023-10-30T14:15:06.413521+02:00", "EventTime": "2023-10-30T14:15:06.413531+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7485], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. ", "ContentType": "text/plain"}], "uids": ["CXm6Xy1YawovrAnZKc"]} -{"Format": "IDEA0", "ID": "8911ab88-eeec-4812-9cf2-6e515431eecd", "DetectTime": "2023-10-30T14:15:06.431149+02:00", "EventTime": "2023-10-30T14:15:06.431165+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3725], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3725/UDP destination IP 174.89.157.21. ", "ContentType": "text/plain"}], "uids": ["Cp6bRF1wYxyo4SWKa"]} -{"Format": "IDEA0", "ID": "7f3a1944-794e-41e5-8938-389cb7b9608e", "DetectTime": "2023-10-30T14:15:06.448618+02:00", "EventTime": "2023-10-30T14:15:06.448632+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3026], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. ", "ContentType": "text/plain"}], "uids": ["CHnTko3nDDXbnpQtUj"]} -{"Format": "IDEA0", "ID": "ada37070-ea5c-4e9a-b999-a0b7bc259b9f", "DetectTime": "2023-10-30T14:15:06.463515+02:00", "EventTime": "2023-10-30T14:15:06.463527+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2928], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. ", "ContentType": "text/plain"}], "uids": ["CPdny821nAjLIufjEb"]} -{"Format": "IDEA0", "ID": "4c5e5647-b3cd-4286-ac5e-ec8357e13411", "DetectTime": "2023-10-30T14:15:06.480727+02:00", "EventTime": "2023-10-30T14:15:06.480741+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4310], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. ", "ContentType": "text/plain"}], "uids": ["CmUuCm1Dv6uPTzRRGa"]} -{"Format": "IDEA0", "ID": "c8d40db5-1ff0-4974-9a33-4541ef8f918e", "DetectTime": "2023-10-30T14:15:06.501072+02:00", "EventTime": "2023-10-30T14:15:06.501089+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2913], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. ", "ContentType": "text/plain"}], "uids": ["CCgA7QQ1YIOJyyiRc"]} -{"Format": "IDEA0", "ID": "a862a061-e38b-481f-8b7a-26ab38d429d5", "DetectTime": "2023-10-30T14:15:06.520586+02:00", "EventTime": "2023-10-30T14:15:06.520596+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. ", "ContentType": "text/plain"}], "uids": ["CyphW9nNLnISwBr0h"]} -{"Format": "Json", "ID": "a862a061-e38b-481f-8b7a-26ab38d429d5", "DetectTime": "2023-10-30T14:15:06.520586+02:00", "EventTime": "2023-10-30T14:15:06.520596+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3192], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T13:18:48.578263+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 252. (real time 2023/10/30 14:15:06.576995)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "4e4b4c28-f676-4287-b6bc-19e83ff7d7c4", "DetectTime": "2023-10-30T14:15:06.581627+02:00", "EventTime": "2023-10-30T14:15:06.581637+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9432], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. ", "ContentType": "text/plain"}], "uids": ["C3rypi4LJzmVVF8Uij"]} -{"Format": "IDEA0", "ID": "b7bb657f-b468-46a8-8d16-b47d8d98b472", "DetectTime": "2023-10-30T14:15:06.596842+02:00", "EventTime": "2023-10-30T14:15:06.596852+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CDQAx93XDPXkajoIJ4"]} -{"Format": "IDEA0", "ID": "a6110dff-e643-4c7a-94d6-1143d522b19d", "DetectTime": "2023-10-30T14:15:06.619820+02:00", "EventTime": "2023-10-30T14:15:06.619830+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3631], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. ", "ContentType": "text/plain"}], "uids": ["CediaV1DH9iCFQiJwb"]} -{"Format": "IDEA0", "ID": "6687ef6b-6529-40d4-9576-c6b7eae0a56f", "DetectTime": "2023-10-30T14:15:06.637863+02:00", "EventTime": "2023-10-30T14:15:06.637877+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9067], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. ", "ContentType": "text/plain"}], "uids": ["CCEIA62gNVyFcIum0e"]} -{"Format": "IDEA0", "ID": "9176032c-3578-45ae-a7b7-8e951cd8ebe6", "DetectTime": "2023-10-30T14:15:06.656411+02:00", "EventTime": "2023-10-30T14:15:06.656425+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6061], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. ", "ContentType": "text/plain"}], "uids": ["CdhXW51LKfikjut3Mg"]} -{"Format": "IDEA0", "ID": "14eb4ad0-a670-4973-9d0d-0bdc65b18747", "DetectTime": "2023-10-30T14:15:06.673408+02:00", "EventTime": "2023-10-30T14:15:06.673417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4307], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. ", "ContentType": "text/plain"}], "uids": ["CrOMa2TCUKCQ5a4P8"]} -{"Format": "IDEA0", "ID": "f576a02d-3443-47be-975a-1ec66e670496", "DetectTime": "2023-10-30T14:15:06.689573+02:00", "EventTime": "2023-10-30T14:15:06.689583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7151], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. ", "ContentType": "text/plain"}], "uids": ["ChTj8N3doHuSzAPSdg"]} -{"Format": "IDEA0", "ID": "29706e1b-8810-4e3b-a20e-d941e89d983a", "DetectTime": "2023-10-30T14:15:06.704860+02:00", "EventTime": "2023-10-30T14:15:06.704875+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7090], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. ", "ContentType": "text/plain"}], "uids": ["C4KHde3C0NDIQ9n7bh"]} -{"Format": "IDEA0", "ID": "992346f3-6dfc-498b-8331-d8057570d3ba", "DetectTime": "2023-10-30T14:15:06.722208+02:00", "EventTime": "2023-10-30T14:15:06.722219+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. ", "ContentType": "text/plain"}], "uids": ["ChCgxNWPKE2aPeOC1"]} -{"Format": "Json", "ID": "992346f3-6dfc-498b-8331-d8057570d3ba", "DetectTime": "2023-10-30T14:15:06.722208+02:00", "EventTime": "2023-10-30T14:15:06.722219+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [3630], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T13:18:52.630506+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 252. (real time 2023/10/30 14:15:06.765961)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "76b73556-83dc-46e3-91e1-3491be6a2b0a", "DetectTime": "2023-10-30T14:15:06.770583+02:00", "EventTime": "2023-10-30T14:15:06.770594+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6063], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. ", "ContentType": "text/plain"}], "uids": ["C71AxxPhDQD8Iajo7"]} -{"Format": "IDEA0", "ID": "4163eae2-3d27-4ee4-826b-4b4c19610afc", "DetectTime": "2023-10-30T14:15:06.787537+02:00", "EventTime": "2023-10-30T14:15:06.787552+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [6860], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. ", "ContentType": "text/plain"}], "uids": ["C2gYph3svGX9ywMeX2"]} -{"Format": "IDEA0", "ID": "02b36a46-4892-4ce0-bd09-5a32db6ce0e2", "DetectTime": "2023-10-30T14:15:06.802482+02:00", "EventTime": "2023-10-30T14:15:06.802493+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2573], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. ", "ContentType": "text/plain"}], "uids": ["CpfwZf2eEl1uunMSo"]} -{"Format": "IDEA0", "ID": "f374d845-f8c4-4ddc-8ca6-b11c36de4588", "DetectTime": "2023-10-30T14:15:06.814614+02:00", "EventTime": "2023-10-30T14:15:06.814624+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2218], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. ", "ContentType": "text/plain"}], "uids": ["CmpESe4Mu97qBtRshi"]} -{"Format": "IDEA0", "ID": "a0e383de-d533-43d3-8e04-023924e68104", "DetectTime": "2023-10-30T14:15:06.826196+02:00", "EventTime": "2023-10-30T14:15:06.826206+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4555], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 69.228.38.216. ", "ContentType": "text/plain"}], "uids": ["CXBrHz3X3su9cf8rZ4"]} -{"Format": "IDEA0", "ID": "ddd77907-34e4-489e-ae24-2b69fa26fe56", "DetectTime": "2023-10-30T14:15:06.837700+02:00", "EventTime": "2023-10-30T14:15:06.837710+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5820], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. ", "ContentType": "text/plain"}], "uids": ["CNNzPr4P4LhMP8dkZ7"]} -{"Format": "IDEA0", "ID": "bb36bf36-f7a8-4e4f-a836-68721207f479", "DetectTime": "2023-10-30T14:15:06.853140+02:00", "EventTime": "2023-10-30T14:15:06.853155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [9966], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 9966/UDP destination IP 72.46.250.35. ", "ContentType": "text/plain"}], "uids": ["CkO1NKckk9f32eHh2"]} -{"Format": "IDEA0", "ID": "aa69c901-dd68-403b-9fbd-c9a0b98fced1", "DetectTime": "2023-10-30T14:15:06.865702+02:00", "EventTime": "2023-10-30T14:15:06.865713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["Crmj1S2DYUKWTdoFa"]} -{"Format": "IDEA0", "ID": "5969c081-7943-4000-bc4c-2aa79742f10f", "DetectTime": "2023-10-30T14:15:06.886593+02:00", "EventTime": "2023-10-30T14:15:06.886602+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4891/UDP destination IP 86.156.53.81. ", "ContentType": "text/plain"}], "uids": ["CNbtT01j2MQ4slP1Ni"]} -{"Format": "Json", "ID": "5969c081-7943-4000-bc4c-2aa79742f10f", "DetectTime": "2023-10-30T14:15:06.886593+02:00", "EventTime": "2023-10-30T14:15:06.886602+02:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4891], "Proto": ["udp"]}], "Attach": [{"Content": "1970-01-11T13:18:55.950939+02:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 252. (real time 2023/10/30 14:15:06.929597)", "ContentType": "text/plain"}], "uids": []} -{"Format": "IDEA0", "ID": "b73d1f0c-71ab-4bed-9fc3-bebba3e3e013", "DetectTime": "2023-10-30T14:15:06.933255+02:00", "EventTime": "2023-10-30T14:15:06.933265+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [4609], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 4609/UDP destination IP 68.22.158.150. ", "ContentType": "text/plain"}], "uids": ["C22gzV1ARGBVdwIJIj"]} -{"Format": "IDEA0", "ID": "c947852c-07cc-4a63-8d57-76d8deab129f", "DetectTime": "2023-10-30T14:15:06.944408+02:00", "EventTime": "2023-10-30T14:15:06.944419+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [2733], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. ", "ContentType": "text/plain"}], "uids": ["CMDe0bTp3IyY1Zo8a"]} -{"Format": "IDEA0", "ID": "23b4268a-eba3-4b46-bb76-c7cebd89865a", "DetectTime": "2023-10-30T14:15:06.960557+02:00", "EventTime": "2023-10-30T14:15:06.960568+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [8575], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. ", "ContentType": "text/plain"}], "uids": ["CczJvs1N0VJ8XlTy44"]} -{"Format": "IDEA0", "ID": "cefc4df7-9db5-4027-9de3-fb7fb67beef9", "DetectTime": "2023-10-30T14:15:06.970340+02:00", "EventTime": "2023-10-30T14:15:06.970350+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [7745], "Proto": ["udp"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. ", "ContentType": "text/plain"}], "uids": ["CwaVOl4cKBoNhrotR7"]} -{"Format": "IDEA0", "ID": "1bbfa65a-2e55-4b49-93df-0590267f03df", "DetectTime": "2023-10-30T14:15:06.982399+02:00", "EventTime": "2023-10-30T14:15:06.982410+02:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Port": [5237], "Proto": ["tcp"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN4p9g3dToUWJtuH6"]} -{"Format": "IDEA0", "ID": "12856b9e-1ffa-4578-9aab-1963af8f1886", "DetectTime": "2023-10-30T14:15:06.993698+02:00", "EventTime": "2023-10-30T14:15:06.993713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CXYo303P3TPmk2a1Di"]} -{"Format": "IDEA0", "ID": "f6b6a0cf-77c2-4068-8a51-5cea2a33505f", "DetectTime": "2023-10-30T14:15:07.012377+02:00", "EventTime": "2023-10-30T14:15:07.012387+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CRDg0DPseBv625eh9"]} -{"Format": "IDEA0", "ID": "4c1194b8-8d6e-4480-9caf-855a6c5ab366", "DetectTime": "2023-10-30T14:15:07.027456+02:00", "EventTime": "2023-10-30T14:15:07.027468+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CsFHgg14DpFk9Nec79"]} -{"Format": "IDEA0", "ID": "dbfd2e78-742b-4531-b777-eb5ab0869545", "DetectTime": "2023-10-30T14:15:07.046326+02:00", "EventTime": "2023-10-30T14:15:07.046339+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CfQUSA3PTj1nLVNwt7"]} -{"Format": "IDEA0", "ID": "cf76b53a-e62f-4494-be99-de34b8bf0d29", "DetectTime": "2023-10-30T14:15:07.066850+02:00", "EventTime": "2023-10-30T14:15:07.066863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CkWdiWCh9dghhRema"]} -{"Format": "IDEA0", "ID": "82548a26-d53d-453b-a2b7-a5e0b82fc937", "DetectTime": "2023-10-30T14:15:07.089027+02:00", "EventTime": "2023-10-30T14:15:07.089040+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CHDFba3hdkS7PGBs7c"]} -{"Format": "IDEA0", "ID": "0ce05164-c47a-40e6-a949-5cf95fd8c447", "DetectTime": "2023-10-30T14:15:07.108099+02:00", "EventTime": "2023-10-30T14:15:07.108109+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CLqpNk3Oo9GEMFaETe"]} -{"Format": "IDEA0", "ID": "7df26eb5-48e8-4a31-bacd-9772be1d9620", "DetectTime": "2023-10-30T14:15:07.130476+02:00", "EventTime": "2023-10-30T14:15:07.130488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CZ6WZkQAx7ENOK1j"]} -{"Format": "IDEA0", "ID": "643526be-aa8d-4087-9e53-271d7e5179b7", "DetectTime": "2023-10-30T14:15:07.155262+02:00", "EventTime": "2023-10-30T14:15:07.155272+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CcGTSf1iRuvPAimuCa"]} -{"Format": "IDEA0", "ID": "1267725d-8d65-429d-b86e-2af1e53154bc", "DetectTime": "2023-10-30T14:15:07.181084+02:00", "EventTime": "2023-10-30T14:15:07.181098+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CydWbafnGIKXXXgc6"]} -{"Format": "IDEA0", "ID": "57d40418-4931-4103-8724-6db172fec8d7", "DetectTime": "2023-10-30T14:15:07.206499+02:00", "EventTime": "2023-10-30T14:15:07.206517+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CYxbIEagWCBf8wH55"]} -{"Format": "IDEA0", "ID": "acf418ee-deb2-4fb4-b3cb-14bfbef37810", "DetectTime": "2023-10-30T14:15:07.232149+02:00", "EventTime": "2023-10-30T14:15:07.232164+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CqHBLKjlAgCg476Vh"]} -{"Format": "IDEA0", "ID": "87911451-a544-4862-b4b1-d5cb0353919e", "DetectTime": "2023-10-30T14:15:07.258042+02:00", "EventTime": "2023-10-30T14:15:07.258057+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CEklnA2IHyV7Rl7gP6"]} -{"Format": "IDEA0", "ID": "67255d0c-11f6-433c-95f4-6a260a8d4521", "DetectTime": "2023-10-30T14:15:07.283325+02:00", "EventTime": "2023-10-30T14:15:07.283336+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CgAlSD1VN7NwypGnm4"]} -{"Format": "IDEA0", "ID": "85ba87b0-d7a1-44dd-aec5-72246d909276", "DetectTime": "2023-10-30T14:15:07.304536+02:00", "EventTime": "2023-10-30T14:15:07.304548+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C3uKqi2ekFAsIC6Tu4"]} -{"Format": "IDEA0", "ID": "ec7e83b2-9786-45e3-957a-e826db60180a", "DetectTime": "2023-10-30T14:15:07.322260+02:00", "EventTime": "2023-10-30T14:15:07.322271+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CMguYd3fNr9uVide58"]} -{"Format": "IDEA0", "ID": "02bfea75-ee9f-46a6-8d38-315f5d998ef1", "DetectTime": "2023-10-30T14:15:07.340016+02:00", "EventTime": "2023-10-30T14:15:07.340025+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CEozbH2UPzTBYA8ah"]} -{"Format": "IDEA0", "ID": "d66941b4-906d-4729-afaf-4f729a608232", "DetectTime": "2023-10-30T14:15:07.359690+02:00", "EventTime": "2023-10-30T14:15:07.359701+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CTCRvQ2t9sVmvISIRc"]} -{"Format": "IDEA0", "ID": "0ee6a17a-9af4-4069-99a8-306a74f649be", "DetectTime": "2023-10-30T14:15:07.380303+02:00", "EventTime": "2023-10-30T14:15:07.380314+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cs0O2N1pmoX3P1itpi"]} -{"Format": "IDEA0", "ID": "dfc3c9e8-2158-446c-9381-59c778d66e7a", "DetectTime": "2023-10-30T14:15:07.399861+02:00", "EventTime": "2023-10-30T14:15:07.399871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CE0O1936DvfofyeWig"]} -{"Format": "IDEA0", "ID": "f1616c45-f7de-4686-a5df-a3b376bc3b79", "DetectTime": "2023-10-30T14:15:07.418548+02:00", "EventTime": "2023-10-30T14:15:07.418558+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C5cwTx1ZQjBm04jFpa"]} -{"Format": "IDEA0", "ID": "89109ed7-0b7d-44f1-95cc-77a2f93740a3", "DetectTime": "2023-10-30T14:15:07.435486+02:00", "EventTime": "2023-10-30T14:15:07.435495+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CFe6wiwkGavW8rlUg"]} -{"Format": "IDEA0", "ID": "0d337848-30c1-4c03-ab9d-003982f2798c", "DetectTime": "2023-10-30T14:15:07.452312+02:00", "EventTime": "2023-10-30T14:15:07.452321+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CLTKM347Yhu5ZgCtKj"]} -{"Format": "IDEA0", "ID": "8f0695b7-36db-4a12-bb64-ec607855d542", "DetectTime": "2023-10-30T14:15:07.469043+02:00", "EventTime": "2023-10-30T14:15:07.469053+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CFtypG3D72DoGITKn5"]} -{"Format": "IDEA0", "ID": "d70a4d59-bfed-46ad-964c-f417dec2804d", "DetectTime": "2023-10-30T14:15:07.487692+02:00", "EventTime": "2023-10-30T14:15:07.487705+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C1UMJeA40pH2PsaC"]} -{"Format": "IDEA0", "ID": "5721600b-bad2-4347-bb92-7f318776f7b6", "DetectTime": "2023-10-30T14:15:07.506589+02:00", "EventTime": "2023-10-30T14:15:07.506600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CXEiYv37YMnyEMc8f3"]} -{"Format": "IDEA0", "ID": "516dfdaa-8746-4777-87e5-b84625e53780", "DetectTime": "2023-10-30T14:15:07.524115+02:00", "EventTime": "2023-10-30T14:15:07.524125+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CZX5l332nJGSBmYxZ"]} -{"Format": "IDEA0", "ID": "69cc7096-81d6-469e-838c-f98fb3b4a0d4", "DetectTime": "2023-10-30T14:15:07.541030+02:00", "EventTime": "2023-10-30T14:15:07.541041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C9X8Ww3KMK0gQDzyM9"]} -{"Format": "IDEA0", "ID": "ad8d6976-63ec-4dbd-b3a1-507ff7ec3224", "DetectTime": "2023-10-30T14:15:07.558194+02:00", "EventTime": "2023-10-30T14:15:07.558205+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CorZoh18mC5EBCSYqh"]} -{"Format": "IDEA0", "ID": "28d8bffd-8572-4963-943d-f6becf703256", "DetectTime": "2023-10-30T14:15:07.574306+02:00", "EventTime": "2023-10-30T14:15:07.574316+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CupXLvKt3Ou4AhGZ3"]} -{"Format": "IDEA0", "ID": "3efdae68-d2d7-43ce-9bd4-36997527eed8", "DetectTime": "2023-10-30T14:15:07.592132+02:00", "EventTime": "2023-10-30T14:15:07.592142+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CF6YQ02ZjJLYAdTtkb"]} -{"Format": "IDEA0", "ID": "b3436f9d-13b7-47ef-8584-b0757e270dc7", "DetectTime": "2023-10-30T14:15:07.610186+02:00", "EventTime": "2023-10-30T14:15:07.610196+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CAauh9SwKM7NxkFZ7"]} -{"Format": "IDEA0", "ID": "fc38b5eb-3155-415c-bb22-67ef32324e4f", "DetectTime": "2023-10-30T14:15:07.628208+02:00", "EventTime": "2023-10-30T14:15:07.628224+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CudaIE1tlTDZR1kcQl"]} -{"Format": "IDEA0", "ID": "be6b0ac6-282d-4577-9c6c-a23216b61cd9", "DetectTime": "2023-10-30T14:15:07.651972+02:00", "EventTime": "2023-10-30T14:15:07.651987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CG0F8r0uHL692bpi8"]} -{"Format": "IDEA0", "ID": "e3f3e4ec-2145-47f2-8f53-254920d0115a", "DetectTime": "2023-10-30T14:15:07.673291+02:00", "EventTime": "2023-10-30T14:15:07.673305+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CdLDif2Ra0OHYCqLej"]} -{"Format": "IDEA0", "ID": "f91cc3fb-1987-44c9-8489-a366b8c2db98", "DetectTime": "2023-10-30T14:15:07.691930+02:00", "EventTime": "2023-10-30T14:15:07.691940+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["C6z9FqSDQqpBd33Zj"]} -{"Format": "IDEA0", "ID": "9eec4dec-1474-457e-9c00-3f0e6546186d", "DetectTime": "2023-10-30T14:15:07.709406+02:00", "EventTime": "2023-10-30T14:15:07.709417+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["C5pETQ1k1FkvQqJwG2"]} -{"Format": "IDEA0", "ID": "04b88365-bcec-415d-964f-cd51ad170be1", "DetectTime": "2023-10-30T14:15:07.727270+02:00", "EventTime": "2023-10-30T14:15:07.727286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["ClTbYo1nzKgMz0GtFg"]} -{"Format": "IDEA0", "ID": "6fc89017-fc26-42f2-b0a3-7f6a6c7b0960", "DetectTime": "2023-10-30T14:15:07.746041+02:00", "EventTime": "2023-10-30T14:15:07.746050+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CUom5i4G5NgDiWUTzb"]} -{"Format": "IDEA0", "ID": "b8c3fc13-c36c-4297-9081-f3dfdf3894f3", "DetectTime": "2023-10-30T14:15:07.763381+02:00", "EventTime": "2023-10-30T14:15:07.763390+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["C5ubef2CVr8FI4cw5"]} -{"Format": "IDEA0", "ID": "d786f1b8-9ce8-4259-8b6a-71bb2e73f2d9", "DetectTime": "2023-10-30T14:15:07.780765+02:00", "EventTime": "2023-10-30T14:15:07.780775+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CudaT3Bis6ib4Pms8"]} -{"Format": "IDEA0", "ID": "cfe75045-5499-45c6-ba2a-1d3f884507e0", "DetectTime": "2023-10-30T14:15:07.798678+02:00", "EventTime": "2023-10-30T14:15:07.798690+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CNl5oU2zuY9dgd5yG"]} -{"Format": "IDEA0", "ID": "f91701d7-d26a-4530-867b-37dc6336d3cc", "DetectTime": "2023-10-30T14:15:07.821848+02:00", "EventTime": "2023-10-30T14:15:07.821863+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CcWN324Eh3D2CIXKFd"]} -{"Format": "IDEA0", "ID": "b7fde2f4-e54b-4d6e-bcf5-870e6ce06ecb", "DetectTime": "2023-10-30T14:15:07.848696+02:00", "EventTime": "2023-10-30T14:15:07.848712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CEtQU13XN6LXd5OSie"]} -{"Format": "IDEA0", "ID": "ef6abe30-e097-4b82-96de-e19102f8b66e", "DetectTime": "2023-10-30T14:15:07.875100+02:00", "EventTime": "2023-10-30T14:15:07.875116+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["COEALE1g9NCRT8fVrb"]} -{"Format": "IDEA0", "ID": "28081b53-89ec-4cca-b30f-eddb9202be4f", "DetectTime": "2023-10-30T14:15:07.901724+02:00", "EventTime": "2023-10-30T14:15:07.901738+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CkTmUj4G594IXDLcY6"]} -{"Format": "IDEA0", "ID": "3bc3106d-ba69-4781-be85-5f85bac813db", "DetectTime": "2023-10-30T14:15:07.928137+02:00", "EventTime": "2023-10-30T14:15:07.928151+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CGIuHP18RlUCiLScJc"]} -{"Format": "IDEA0", "ID": "e58f07a0-6fcf-4913-95fd-c76b2dee06b0", "DetectTime": "2023-10-30T14:15:07.949626+02:00", "EventTime": "2023-10-30T14:15:07.949638+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cic3E93lwZczGgjKeh"]} -{"Format": "IDEA0", "ID": "6cb909df-1277-4dd0-b294-bf1c1cab2354", "DetectTime": "2023-10-30T14:15:07.965949+02:00", "EventTime": "2023-10-30T14:15:07.965967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CqUIT7nyO0kMkgmsa"]} -{"Format": "IDEA0", "ID": "55a23448-8da1-4dcd-9c2c-875005860dc8", "DetectTime": "2023-10-30T14:15:07.984096+02:00", "EventTime": "2023-10-30T14:15:07.984106+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["Ct3tcR39MFi07GCQyg"]} -{"Format": "IDEA0", "ID": "936e49ba-8268-45ef-b98c-404c48a12181", "DetectTime": "2023-10-30T14:15:08.001009+02:00", "EventTime": "2023-10-30T14:15:08.001024+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CelI9Lm2ORr3CUYU2"]} -{"Format": "IDEA0", "ID": "f98fa4d3-8fce-4a80-93e2-2ece0304cac2", "DetectTime": "2023-10-30T14:15:08.019720+02:00", "EventTime": "2023-10-30T14:15:08.019732+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["C4GAA8Rhey21f5b9k"]} -{"Format": "IDEA0", "ID": "41b46ec0-2482-4240-bf9d-16a16e6ed69a", "DetectTime": "2023-10-30T14:15:08.039858+02:00", "EventTime": "2023-10-30T14:15:08.039869+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CihEwO3uEBXWks2tOe"]} -{"Format": "IDEA0", "ID": "7fb5ebce-9dfb-414e-a6c4-4cac0a756cd9", "DetectTime": "2023-10-30T14:15:08.059801+02:00", "EventTime": "2023-10-30T14:15:08.059810+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CqhnUoNUnhrO1Wmo4"]} -{"Format": "IDEA0", "ID": "4360eed7-2b23-404b-8eee-43e5ecf9e8fa", "DetectTime": "2023-10-30T14:15:08.076906+02:00", "EventTime": "2023-10-30T14:15:08.076916+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C6asEz3pqycRijHxq5"]} -{"Format": "IDEA0", "ID": "9ad69dea-1363-47e8-ab3a-dce43ff49006", "DetectTime": "2023-10-30T14:15:08.094202+02:00", "EventTime": "2023-10-30T14:15:08.094214+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CYhEasiNqXdazZRYd"]} -{"Format": "IDEA0", "ID": "32eed805-0630-4697-8c25-5723bfb2f19c", "DetectTime": "2023-10-30T14:15:08.113696+02:00", "EventTime": "2023-10-30T14:15:08.113708+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CyG7xr3XCLvwH1UHNk"]} -{"Format": "IDEA0", "ID": "1c58c922-3842-4739-bab7-e9bd4264a19f", "DetectTime": "2023-10-30T14:15:08.132649+02:00", "EventTime": "2023-10-30T14:15:08.132658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CWONdU3bcLhCqOxUak"]} -{"Format": "IDEA0", "ID": "d1656c50-ea38-4e3b-9ac7-ae79083e97f0", "DetectTime": "2023-10-30T14:15:08.150635+02:00", "EventTime": "2023-10-30T14:15:08.150645+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CXyDBS3UC07CdjoHOe"]} -{"Format": "IDEA0", "ID": "682e7324-cf6d-4423-88d8-95373b87efc8", "DetectTime": "2023-10-30T14:15:08.167970+02:00", "EventTime": "2023-10-30T14:15:08.167983+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["C9ZS9d1BXphKF6Prb"]} -{"Format": "IDEA0", "ID": "001ebe5d-a309-4f5c-bec1-49e02749a7ea", "DetectTime": "2023-10-30T14:15:08.187524+02:00", "EventTime": "2023-10-30T14:15:08.187533+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CJmM9x2xImsorf1Isk"]} -{"Format": "IDEA0", "ID": "68c764eb-66ba-448f-bb84-812cc330a0c7", "DetectTime": "2023-10-30T14:15:08.206378+02:00", "EventTime": "2023-10-30T14:15:08.206394+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CsIBgf4UTFxrHAyrL7"]} -{"Format": "IDEA0", "ID": "69dca738-55f6-445b-bf66-0bae9bc26e67", "DetectTime": "2023-10-30T14:15:08.225612+02:00", "EventTime": "2023-10-30T14:15:08.225623+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CUqEd215Uda9rUM004"]} -{"Format": "IDEA0", "ID": "0020f708-ff1e-428a-8c16-43fd4756e9b3", "DetectTime": "2023-10-30T14:15:08.244713+02:00", "EventTime": "2023-10-30T14:15:08.244723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["C0mUia293uena8JTW7"]} -{"Format": "IDEA0", "ID": "d0ccb72c-a840-47d0-a613-666a9cf26b95", "DetectTime": "2023-10-30T14:15:08.263553+02:00", "EventTime": "2023-10-30T14:15:08.263563+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CD75ae2cs2xEpKXjxb"]} -{"Format": "IDEA0", "ID": "4dfc0f6a-1db0-4c0c-bf13-bd5ba74776e9", "DetectTime": "2023-10-30T14:15:08.282521+02:00", "EventTime": "2023-10-30T14:15:08.282532+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CY56Qw1VeKitXZwHBk"]} -{"Format": "IDEA0", "ID": "af3d5471-2ef5-4031-aa1c-bef55434d3bd", "DetectTime": "2023-10-30T14:15:08.301455+02:00", "EventTime": "2023-10-30T14:15:08.301465+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CnrD583p1SMM6llKba"]} -{"Format": "IDEA0", "ID": "10aa8f30-c43b-400e-98c5-fd365a80eb09", "DetectTime": "2023-10-30T14:15:08.325327+02:00", "EventTime": "2023-10-30T14:15:08.325341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXHWld3mq3xsKLmvej"]} -{"Format": "IDEA0", "ID": "15b81ef0-06df-4a9a-929f-2e2c95948241", "DetectTime": "2023-10-30T14:15:08.346769+02:00", "EventTime": "2023-10-30T14:15:08.346792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CYIx5L3gHf41pf5L6e"]} -{"Format": "IDEA0", "ID": "7c9e7664-6ff2-48e4-bdfe-d9bd381b2d41", "DetectTime": "2023-10-30T14:15:08.364589+02:00", "EventTime": "2023-10-30T14:15:08.364600+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CLZqjMo0QRf7ca6og"]} -{"Format": "IDEA0", "ID": "433319e2-4eb7-437e-9e91-6fdb89f08158", "DetectTime": "2023-10-30T14:15:08.383779+02:00", "EventTime": "2023-10-30T14:15:08.383788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CmipFk3EW3KMQkfXt8"]} -{"Format": "IDEA0", "ID": "6161de7c-35be-4444-91fa-6291034cc56a", "DetectTime": "2023-10-30T14:15:08.402741+02:00", "EventTime": "2023-10-30T14:15:08.402751+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CUT1gw3hdcnb4DF9Wd"]} -{"Format": "IDEA0", "ID": "37cd5432-8a99-4e45-bbd5-b603959c9c9d", "DetectTime": "2023-10-30T14:15:08.426316+02:00", "EventTime": "2023-10-30T14:15:08.426332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C63Q2KaxHl6Ltxtfd"]} -{"Format": "IDEA0", "ID": "502106f7-52ee-4878-a3f0-b7c1080116d3", "DetectTime": "2023-10-30T14:15:08.446255+02:00", "EventTime": "2023-10-30T14:15:08.446266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CbmAxlnCEbPpRMcgj"]} -{"Format": "IDEA0", "ID": "b3a3da75-ec3b-4911-8b92-b75b593cd88f", "DetectTime": "2023-10-30T14:15:08.467276+02:00", "EventTime": "2023-10-30T14:15:08.467286+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CxDhdz5f9gcoMp1U"]} -{"Format": "IDEA0", "ID": "dfa2aea3-a3a8-4401-971a-5be5a36b474b", "DetectTime": "2023-10-30T14:15:08.485609+02:00", "EventTime": "2023-10-30T14:15:08.485625+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CuKJPx2eCpeIgl03Hk"]} -{"Format": "IDEA0", "ID": "3ac503c7-a56a-4f32-9549-235b9dafc8cc", "DetectTime": "2023-10-30T14:15:08.505193+02:00", "EventTime": "2023-10-30T14:15:08.505207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CAR7tE10C67Xbsd0Gh"]} -{"Format": "IDEA0", "ID": "f3522a62-a152-4c07-b945-7749d233ba74", "DetectTime": "2023-10-30T14:15:08.523520+02:00", "EventTime": "2023-10-30T14:15:08.523529+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CpQmu04gyNCcR2Tbx5"]} -{"Format": "IDEA0", "ID": "6e79afc6-17cb-47df-a739-10de26942c04", "DetectTime": "2023-10-30T14:15:08.540832+02:00", "EventTime": "2023-10-30T14:15:08.540842+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["Cz6kLwexBPp9fJjVj"]} -{"Format": "IDEA0", "ID": "89319563-c33b-4862-99c3-eefb9714794b", "DetectTime": "2023-10-30T14:15:08.560922+02:00", "EventTime": "2023-10-30T14:15:08.560932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CmVeLd3n4SrBc6lsxj"]} -{"Format": "IDEA0", "ID": "4bc3c2bd-ce4a-4666-a235-24eb18d4eb09", "DetectTime": "2023-10-30T14:15:08.579777+02:00", "EventTime": "2023-10-30T14:15:08.579788+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CBt2Oh2A4PwvdmAIt"]} -{"Format": "IDEA0", "ID": "32c26b7e-2a5c-4015-827d-52aa79a0d6e9", "DetectTime": "2023-10-30T14:15:08.602344+02:00", "EventTime": "2023-10-30T14:15:08.602359+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C09hit1KHX0trHOrKl"]} -{"Format": "IDEA0", "ID": "02eaf1a4-668d-4981-a2ba-fc5912220056", "DetectTime": "2023-10-30T14:15:08.620702+02:00", "EventTime": "2023-10-30T14:15:08.620713+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CVYnjv3gMJ4axHNWRi"]} -{"Format": "IDEA0", "ID": "8d655cb4-e1f6-4bf8-aad9-37b59d40b322", "DetectTime": "2023-10-30T14:15:08.639101+02:00", "EventTime": "2023-10-30T14:15:08.639111+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CCyC8O2ezvrxqgSHP1"]} -{"Format": "IDEA0", "ID": "4ab5d7df-fc13-4f38-849c-0cdf3d888fe6", "DetectTime": "2023-10-30T14:15:08.658545+02:00", "EventTime": "2023-10-30T14:15:08.658559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CprJvD2LKuX66gOYY3"]} -{"Format": "IDEA0", "ID": "bb4d0833-2584-475d-96df-d7884908b5e9", "DetectTime": "2023-10-30T14:15:08.678366+02:00", "EventTime": "2023-10-30T14:15:08.678376+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CsNd6S1LARx5iLaAQd"]} -{"Format": "IDEA0", "ID": "8418d143-9050-4282-81fa-1d31c1c6281f", "DetectTime": "2023-10-30T14:15:08.696590+02:00", "EventTime": "2023-10-30T14:15:08.696601+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CvnFqAIc49wLZIVxc"]} -{"Format": "IDEA0", "ID": "b74636eb-68b2-4138-bb5f-db20fd826ed7", "DetectTime": "2023-10-30T14:15:08.717938+02:00", "EventTime": "2023-10-30T14:15:08.717953+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["C9ch7E4Y9CAj3bzIQh"]} -{"Format": "IDEA0", "ID": "ba52e0c0-428a-4585-860c-976641eddf42", "DetectTime": "2023-10-30T14:15:08.740953+02:00", "EventTime": "2023-10-30T14:15:08.740967+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CJTJLn1c187v1KdFR"]} -{"Format": "IDEA0", "ID": "d7aa071f-bf8a-498a-aa83-425dd8b3b597", "DetectTime": "2023-10-30T14:15:08.764213+02:00", "EventTime": "2023-10-30T14:15:08.764225+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CbtIaa3hum4Zx4K1V7"]} -{"Format": "IDEA0", "ID": "8c51f07d-50fd-4176-921e-94e1d04623ae", "DetectTime": "2023-10-30T14:15:08.781173+02:00", "EventTime": "2023-10-30T14:15:08.781186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CJDNyX2HWGhIzQK8T8"]} -{"Format": "IDEA0", "ID": "576988c4-f7f6-4d73-adc4-bd60df9555c8", "DetectTime": "2023-10-30T14:15:08.797815+02:00", "EventTime": "2023-10-30T14:15:08.797828+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ch2oso1iFLsWLO7oy8"]} -{"Format": "IDEA0", "ID": "bbb14e6f-3d82-4aba-ab3d-c607bd72da94", "DetectTime": "2023-10-30T14:15:08.816446+02:00", "EventTime": "2023-10-30T14:15:08.816459+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CVpPvF3UvyoWjHgZ9f"]} -{"Format": "IDEA0", "ID": "7e27d377-5cc6-47a0-a6ae-046f05ebe6fb", "DetectTime": "2023-10-30T14:15:08.838358+02:00", "EventTime": "2023-10-30T14:15:08.838371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CviUwY3CS1Mqloqfh"]} -{"Format": "IDEA0", "ID": "61107e43-6abb-486c-a56c-e638be06584e", "DetectTime": "2023-10-30T14:15:08.860835+02:00", "EventTime": "2023-10-30T14:15:08.860850+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CE16Jj1VZfLo2QnvF9"]} -{"Format": "IDEA0", "ID": "44f33f0e-1c07-4a5e-921b-ab425082bcd8", "DetectTime": "2023-10-30T14:15:08.884336+02:00", "EventTime": "2023-10-30T14:15:08.884351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CJnD5CadhWSoDBCdb"]} -{"Format": "IDEA0", "ID": "cda7f5b7-7143-40d7-ab9d-2f120400423e", "DetectTime": "2023-10-30T14:15:08.900388+02:00", "EventTime": "2023-10-30T14:15:08.900398+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CuRfETq9dkVzdhgy3"]} -{"Format": "IDEA0", "ID": "1216a3d6-2a43-490a-b54b-5bb53ec50d25", "DetectTime": "2023-10-30T14:15:08.914860+02:00", "EventTime": "2023-10-30T14:15:08.914871+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CHxdUI3JD6RVZ87XFd"]} -{"Format": "IDEA0", "ID": "48de4419-0a4d-4384-b7e7-a9e1105770ec", "DetectTime": "2023-10-30T14:15:08.929842+02:00", "EventTime": "2023-10-30T14:15:08.929853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CTQQ103192CGfdJC0j"]} -{"Format": "IDEA0", "ID": "40cd66c7-6076-40d1-8589-80eb8c68e9f2", "DetectTime": "2023-10-30T14:15:08.947205+02:00", "EventTime": "2023-10-30T14:15:08.947216+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CApSjT2KFyUyxsliM8"]} -{"Format": "IDEA0", "ID": "0788b29c-f3d2-4c83-bf6d-2f0d826eaa82", "DetectTime": "2023-10-30T14:15:08.972562+02:00", "EventTime": "2023-10-30T14:15:08.972576+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CDQqSx4FuQSUBcPQ5h"]} -{"Format": "IDEA0", "ID": "1ac39704-5824-4bdb-8ea6-c3eb426007f5", "DetectTime": "2023-10-30T14:15:08.993887+02:00", "EventTime": "2023-10-30T14:15:08.993899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C3dV7D49RCjqSw0Rfk"]} -{"Format": "IDEA0", "ID": "e5999bdb-3d91-4736-a724-946532cea477", "DetectTime": "2023-10-30T14:15:09.014759+02:00", "EventTime": "2023-10-30T14:15:09.014769+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CNVf0J3TBmVTk2o07l"]} -{"Format": "IDEA0", "ID": "9ab57a0e-ef1c-44ca-b67f-773eaa63c97e", "DetectTime": "2023-10-30T14:15:09.032775+02:00", "EventTime": "2023-10-30T14:15:09.032786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CizJOs2gwXy53ym7b3"]} -{"Format": "IDEA0", "ID": "3112d564-ff18-44c9-b5f6-b59c04ec5df1", "DetectTime": "2023-10-30T14:15:09.052619+02:00", "EventTime": "2023-10-30T14:15:09.052634+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CobdSB4maZwSUJSgxa"]} -{"Format": "IDEA0", "ID": "92ce178d-dbad-497a-8ee3-7af044eebf63", "DetectTime": "2023-10-30T14:15:09.070336+02:00", "EventTime": "2023-10-30T14:15:09.070347+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CIsR7x1pJm0Mrrf3Gk"]} -{"Format": "IDEA0", "ID": "f9e95e1a-4dd9-48e6-93fb-a760ae67916f", "DetectTime": "2023-10-30T14:15:09.086574+02:00", "EventTime": "2023-10-30T14:15:09.086585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C32nMJ2XWUnnCiYx75"]} -{"Format": "IDEA0", "ID": "dbe22d1c-9832-4829-b75d-4c06bdb856d0", "DetectTime": "2023-10-30T14:15:09.102412+02:00", "EventTime": "2023-10-30T14:15:09.102424+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C2Wyq73ff2G4nsif0f"]} -{"Format": "IDEA0", "ID": "b40f95e6-6366-44fb-93b5-570f04a23f4b", "DetectTime": "2023-10-30T14:15:09.118038+02:00", "EventTime": "2023-10-30T14:15:09.118052+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Cwt05E2NwhziCaYuec"]} -{"Format": "IDEA0", "ID": "fe0f5f67-d2e8-4936-9f18-5a78ecdbcd30", "DetectTime": "2023-10-30T14:15:09.134260+02:00", "EventTime": "2023-10-30T14:15:09.134270+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["Cozh4k42pQQYVfOUPa"]} -{"Format": "IDEA0", "ID": "6b53771f-a352-4922-a00a-804da566ac1c", "DetectTime": "2023-10-30T14:15:09.151311+02:00", "EventTime": "2023-10-30T14:15:09.151320+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["Ca6SGZyDpvwdq9ibe"]} -{"Format": "IDEA0", "ID": "30cac1bb-82ab-4ad9-8013-5446c0484b78", "DetectTime": "2023-10-30T14:15:09.169188+02:00", "EventTime": "2023-10-30T14:15:09.169198+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["C1lktB1Egy4pbAugg5"]} -{"Format": "IDEA0", "ID": "c63f6344-581c-4b7f-8cbd-3b8d0d77fc00", "DetectTime": "2023-10-30T14:15:09.184893+02:00", "EventTime": "2023-10-30T14:15:09.184902+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CbDHXe8ymz4vO0dvc"]} -{"Format": "IDEA0", "ID": "da2de800-4843-406b-81d5-02f34ae9a40b", "DetectTime": "2023-10-30T14:15:09.201199+02:00", "EventTime": "2023-10-30T14:15:09.201210+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["CIp4iv4m2jBaTE5HN9"]} -{"Format": "IDEA0", "ID": "85014dc5-7f9f-42ab-9e58-bdd1a9388b51", "DetectTime": "2023-10-30T14:15:09.218375+02:00", "EventTime": "2023-10-30T14:15:09.218392+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C2X97C1nGbWCculPE5"]} -{"Format": "IDEA0", "ID": "32912e4a-64a3-4caf-b015-750235e5014b", "DetectTime": "2023-10-30T14:15:09.240185+02:00", "EventTime": "2023-10-30T14:15:09.240201+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["C6WUDD3bnbNcsiRaFf"]} -{"Format": "IDEA0", "ID": "3444c057-76b7-4ad3-9eac-1e213a1354d2", "DetectTime": "2023-10-30T14:15:09.259322+02:00", "EventTime": "2023-10-30T14:15:09.259332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CB25yv3ucjcOHEmtOh"]} -{"Format": "IDEA0", "ID": "0e1a7452-4193-4474-924c-7ddfd0a827bc", "DetectTime": "2023-10-30T14:15:09.277044+02:00", "EventTime": "2023-10-30T14:15:09.277055+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["C7kWol44ayjG8uRqL6"]} -{"Format": "IDEA0", "ID": "946c0c35-4b78-4cdc-a2f8-317a5d00ef10", "DetectTime": "2023-10-30T14:15:09.295418+02:00", "EventTime": "2023-10-30T14:15:09.295429+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.57.132.229"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.57.132.229 ", "ContentType": "text/plain"}], "uids": ["Cr8xPF14KamA24fM0b"]} -{"Format": "IDEA0", "ID": "82a6edfa-f3d6-4a4a-ae96-d4c13d8a662a", "DetectTime": "2023-10-30T14:15:09.313106+02:00", "EventTime": "2023-10-30T14:15:09.313117+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CNOQE01c3Z3290MlBh"]} -{"Format": "IDEA0", "ID": "652da5ee-3c1a-49ef-90f9-b4c8708154be", "DetectTime": "2023-10-30T14:15:09.329941+02:00", "EventTime": "2023-10-30T14:15:09.329952+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CkcRPP7pIjWxjjSl3"]} -{"Format": "IDEA0", "ID": "7d2564bb-e288-49cd-b4f0-6706856f7826", "DetectTime": "2023-10-30T14:15:09.346871+02:00", "EventTime": "2023-10-30T14:15:09.346883+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CYjkpl4tIXmNfhjL97"]} -{"Format": "IDEA0", "ID": "35cb8000-cc8b-4463-8f33-080b706b072b", "DetectTime": "2023-10-30T14:15:09.363920+02:00", "EventTime": "2023-10-30T14:15:09.363932+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["COgUWC46l18zq9GyM4"]} -{"Format": "IDEA0", "ID": "f4b31404-5773-49af-a792-4d25fa14ba0c", "DetectTime": "2023-10-30T14:15:09.379963+02:00", "EventTime": "2023-10-30T14:15:09.379972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["C7Opdd2NC5Ecux4oLa"]} -{"Format": "IDEA0", "ID": "576cf944-f870-4d76-8685-7028d9d2f5b6", "DetectTime": "2023-10-30T14:15:09.396128+02:00", "EventTime": "2023-10-30T14:15:09.396141+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CxGLRygMos7mFMmYd"]} -{"Format": "IDEA0", "ID": "4473e7ad-70ba-4fd1-922f-d2ca615c3301", "DetectTime": "2023-10-30T14:15:09.411001+02:00", "EventTime": "2023-10-30T14:15:09.411010+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C5mIpUDjHFDVRZ09i"]} -{"Format": "IDEA0", "ID": "04c9e8bf-c38a-464a-a729-8789fa094626", "DetectTime": "2023-10-30T14:15:09.427256+02:00", "EventTime": "2023-10-30T14:15:09.427266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Ct463P34roKTKJ09k7"]} -{"Format": "IDEA0", "ID": "88f4c43a-8e72-47c1-b9d0-83864a08fe9d", "DetectTime": "2023-10-30T14:15:09.443708+02:00", "EventTime": "2023-10-30T14:15:09.443719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CTFzGhPeuqvP57Dja"]} -{"Format": "IDEA0", "ID": "7e7ad198-bfc4-42b6-92fd-3e3c71f65976", "DetectTime": "2023-10-30T14:15:09.460234+02:00", "EventTime": "2023-10-30T14:15:09.460244+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CVpdVVS4a4WHUh656"]} -{"Format": "IDEA0", "ID": "68190bf2-da6a-4824-bc92-bd23b709a4ab", "DetectTime": "2023-10-30T14:15:09.481171+02:00", "EventTime": "2023-10-30T14:15:09.481185+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CaRV2CLASThxTy8m1"]} -{"Format": "IDEA0", "ID": "f0653e99-0475-414a-8aa3-2eee9335ceb7", "DetectTime": "2023-10-30T14:15:09.498402+02:00", "EventTime": "2023-10-30T14:15:09.498413+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["Cx3Qd32UkvQlr805v1"]} -{"Format": "IDEA0", "ID": "bcb9f650-8430-4ef3-9ff5-17e0271e1e94", "DetectTime": "2023-10-30T14:15:09.514386+02:00", "EventTime": "2023-10-30T14:15:09.514399+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CMbCHx1P6bonNqcS75"]} -{"Format": "IDEA0", "ID": "22b59a1d-f90f-4440-8969-bce24e5a7656", "DetectTime": "2023-10-30T14:15:09.531197+02:00", "EventTime": "2023-10-30T14:15:09.531207+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CuOqLz3cJDCfJRHl5e"]} -{"Format": "IDEA0", "ID": "f2f3b047-64c0-4c1a-b949-6eef1f501916", "DetectTime": "2023-10-30T14:15:09.553206+02:00", "EventTime": "2023-10-30T14:15:09.553221+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cm69hQ1KSW833pSVoj"]} -{"Format": "IDEA0", "ID": "161ccddb-0590-4dcc-abde-371e0c156358", "DetectTime": "2023-10-30T14:15:09.575871+02:00", "EventTime": "2023-10-30T14:15:09.575881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C2SpCUtk4cZUyxe9h"]} -{"Format": "IDEA0", "ID": "aeb4f012-df31-4823-a007-e7f641e8248e", "DetectTime": "2023-10-30T14:15:09.593173+02:00", "EventTime": "2023-10-30T14:15:09.593184+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C2GZU2CG5DzERa8s7"]} -{"Format": "IDEA0", "ID": "0f6aea8b-0066-4533-85a1-835791af4003", "DetectTime": "2023-10-30T14:15:09.609756+02:00", "EventTime": "2023-10-30T14:15:09.609765+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C2tqgr1yOz290EfsP4"]} -{"Format": "IDEA0", "ID": "8a4bede3-c39c-49e4-aed5-2a5b6dfc74ac", "DetectTime": "2023-10-30T14:15:09.627052+02:00", "EventTime": "2023-10-30T14:15:09.627063+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CZL1yU1q0gBwAlhc92"]} -{"Format": "IDEA0", "ID": "20c3cc9d-ff3a-42e0-965a-6ec8bb411f69", "DetectTime": "2023-10-30T14:15:09.643910+02:00", "EventTime": "2023-10-30T14:15:09.643924+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CT84sh1U92Ufl1qH16"]} -{"Format": "IDEA0", "ID": "6164c5f5-9292-43ed-b3f8-3b6588f605df", "DetectTime": "2023-10-30T14:15:09.661207+02:00", "EventTime": "2023-10-30T14:15:09.661218+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CxGfaEyBo9MSNWaL4"]} -{"Format": "IDEA0", "ID": "7792e337-f8e2-4d91-9e6d-4431e55f7f4f", "DetectTime": "2023-10-30T14:15:09.678119+02:00", "EventTime": "2023-10-30T14:15:09.678130+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CUGOdfP7d0kX0Cbad"]} -{"Format": "IDEA0", "ID": "706d630c-f916-4899-b538-dd81d09fc838", "DetectTime": "2023-10-30T14:15:09.693858+02:00", "EventTime": "2023-10-30T14:15:09.693868+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CGrTz53KHndt0P2TCh"]} -{"Format": "IDEA0", "ID": "3c74e162-e157-4dd6-b844-a3a216c8e371", "DetectTime": "2023-10-30T14:15:09.714357+02:00", "EventTime": "2023-10-30T14:15:09.714372+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["Czq5Ns1vccr1tQdxB4"]} -{"Format": "IDEA0", "ID": "2975a573-5656-4983-86c0-de8d9aab7a81", "DetectTime": "2023-10-30T14:15:09.737218+02:00", "EventTime": "2023-10-30T14:15:09.737228+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["C4vgKa3ma9uacb2p2i"]} -{"Format": "IDEA0", "ID": "76f877ba-08b6-4dda-b0ff-a6190bcb380a", "DetectTime": "2023-10-30T14:15:09.753567+02:00", "EventTime": "2023-10-30T14:15:09.753578+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CNiwIp3QzcfctLFu1i"]} -{"Format": "IDEA0", "ID": "5fac2661-ae64-4e00-a307-d3cd56af1f1e", "DetectTime": "2023-10-30T14:15:09.773477+02:00", "EventTime": "2023-10-30T14:15:09.773492+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CLahAIGw6JVrlOUO2"]} -{"Format": "IDEA0", "ID": "b506660b-3561-4e26-b0c6-5812a8e985bc", "DetectTime": "2023-10-30T14:15:09.792709+02:00", "EventTime": "2023-10-30T14:15:09.792723+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CEzJko3GfKsnM397G4"]} -{"Format": "IDEA0", "ID": "39716e96-cb79-4911-bd95-8c41a4cc055e", "DetectTime": "2023-10-30T14:15:09.815330+02:00", "EventTime": "2023-10-30T14:15:09.815344+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C80ykD368GKYFwTPfg"]} -{"Format": "IDEA0", "ID": "67e5c2f2-8267-4b37-8ee3-fd5ed6b6c7d2", "DetectTime": "2023-10-30T14:15:09.839208+02:00", "EventTime": "2023-10-30T14:15:09.839222+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CtKeK53oUlbU8pZ0y9"]} -{"Format": "IDEA0", "ID": "7d2a6da2-785f-4a5d-9720-4b2576f80c0c", "DetectTime": "2023-10-30T14:15:09.862704+02:00", "EventTime": "2023-10-30T14:15:09.862715+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CJTfpS8ZoRmsf0Kwe"]} -{"Format": "IDEA0", "ID": "52b94730-49b6-4778-86ac-9f521bc0e4b1", "DetectTime": "2023-10-30T14:15:09.878638+02:00", "EventTime": "2023-10-30T14:15:09.878648+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["Ci7Lof1ekxaE942mif"]} -{"Format": "IDEA0", "ID": "58c0ad2b-9b13-465b-848e-fad90fb288c6", "DetectTime": "2023-10-30T14:15:09.896031+02:00", "EventTime": "2023-10-30T14:15:09.896041+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["Cl7dg8R3eobAGVjg1"]} -{"Format": "IDEA0", "ID": "6fe0e399-3c32-4887-abd1-90f4af579933", "DetectTime": "2023-10-30T14:15:09.910857+02:00", "EventTime": "2023-10-30T14:15:09.910867+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CHDppN19FDsh5ZUXWb"]} -{"Format": "IDEA0", "ID": "736d7621-09da-4584-a2d9-9651ba1deaea", "DetectTime": "2023-10-30T14:15:09.925336+02:00", "EventTime": "2023-10-30T14:15:09.925351+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CP7UkS2PjwxMfEjcD9"]} -{"Format": "IDEA0", "ID": "8dfb42d4-77e8-4909-9263-1ff7863ddfbe", "DetectTime": "2023-10-30T14:15:09.944828+02:00", "EventTime": "2023-10-30T14:15:09.944844+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CWIGr63h0QyOippgrh"]} -{"Format": "IDEA0", "ID": "0b3e3548-e623-4fc2-98e4-33c0f7f932a7", "DetectTime": "2023-10-30T14:15:09.960125+02:00", "EventTime": "2023-10-30T14:15:09.960134+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CYakvz1EY8EnFivAKk"]} -{"Format": "IDEA0", "ID": "f2e272ac-6cfd-4654-9e99-f0ffdc0b4f56", "DetectTime": "2023-10-30T14:15:09.976621+02:00", "EventTime": "2023-10-30T14:15:09.976631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Ce5GP519diuTHg2Sv5"]} -{"Format": "IDEA0", "ID": "88a7b548-f53b-4000-9f4a-e836cbff0822", "DetectTime": "2023-10-30T14:15:09.991019+02:00", "EventTime": "2023-10-30T14:15:09.991029+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CfRo7n2zwAObUL0Gqc"]} -{"Format": "IDEA0", "ID": "7c8bffe4-4797-4dec-a838-82d895358c8d", "DetectTime": "2023-10-30T14:15:10.005436+02:00", "EventTime": "2023-10-30T14:15:10.005447+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CTgEmn12W5ttAZaC82"]} -{"Format": "IDEA0", "ID": "616c2253-a1ae-4ee1-b9ca-717cef557760", "DetectTime": "2023-10-30T14:15:10.019533+02:00", "EventTime": "2023-10-30T14:15:10.019542+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["Cu3rsn4Gi2nxh3rol2"]} -{"Format": "IDEA0", "ID": "0c420fc2-8650-462a-88e7-73f78c4e0295", "DetectTime": "2023-10-30T14:15:10.033889+02:00", "EventTime": "2023-10-30T14:15:10.033898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["C5k4PA1oekh9QWiCI8"]} -{"Format": "IDEA0", "ID": "cbf777f1-4268-45f0-80f8-117ce1b53b78", "DetectTime": "2023-10-30T14:15:10.050265+02:00", "EventTime": "2023-10-30T14:15:10.050276+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CUa4Bk4KytMJAZRpN6"]} -{"Format": "IDEA0", "ID": "bf3c6101-6610-4bb5-a695-b03a20cc48fa", "DetectTime": "2023-10-30T14:15:10.066976+02:00", "EventTime": "2023-10-30T14:15:10.066987+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CZATss3bop7dPqH5sg"]} -{"Format": "IDEA0", "ID": "9ffa4eb1-7b26-43c2-a06d-9895f855aac5", "DetectTime": "2023-10-30T14:15:10.086542+02:00", "EventTime": "2023-10-30T14:15:10.086559+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Cz3mdkugZKj2zTask"]} -{"Format": "IDEA0", "ID": "72fc3ab7-4a9c-4175-b5b5-d527350d208b", "DetectTime": "2023-10-30T14:15:10.106382+02:00", "EventTime": "2023-10-30T14:15:10.106396+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["COovsH3xbHNhkIM6Ff"]} -{"Format": "IDEA0", "ID": "15261bd5-1862-4d2b-bf3b-b5653400454d", "DetectTime": "2023-10-30T14:15:10.128328+02:00", "EventTime": "2023-10-30T14:15:10.128342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["C0ktNLRTuv7i0hDRd"]} -{"Format": "IDEA0", "ID": "61ab4e32-6468-4cc2-9e7b-27e1c088da43", "DetectTime": "2023-10-30T14:15:10.149746+02:00", "EventTime": "2023-10-30T14:15:10.149763+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CX7YW31nnaGwNlq8Q5"]} -{"Format": "IDEA0", "ID": "d4370f24-adce-49f6-a424-a8d5cca2e34d", "DetectTime": "2023-10-30T14:15:10.171155+02:00", "EventTime": "2023-10-30T14:15:10.171171+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CGk5tp1HZpCLwlP6Fb"]} -{"Format": "IDEA0", "ID": "3254ae55-4d5b-4db1-a52a-31d339092b44", "DetectTime": "2023-10-30T14:15:10.191940+02:00", "EventTime": "2023-10-30T14:15:10.191954+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CcLTS42MbpltLDCjg9"]} -{"Format": "IDEA0", "ID": "dc30fefc-bdff-4e99-810a-3fb48c48d3ec", "DetectTime": "2023-10-30T14:15:10.210556+02:00", "EventTime": "2023-10-30T14:15:10.210566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["ClEtJP1fWIzdUR64lc"]} -{"Format": "IDEA0", "ID": "4ade0429-6305-4e6d-8461-9deafffbd774", "DetectTime": "2023-10-30T14:15:10.230959+02:00", "EventTime": "2023-10-30T14:15:10.230971+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CYAjO11GYGKXpYb49"]} -{"Format": "IDEA0", "ID": "47b5601c-25d4-42a9-949a-fe859a34bd92", "DetectTime": "2023-10-30T14:15:10.248173+02:00", "EventTime": "2023-10-30T14:15:10.248186+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CKTTCX3XkRnSZmqWM5"]} -{"Format": "IDEA0", "ID": "2a806671-aace-478c-9ebb-0324ff21d782", "DetectTime": "2023-10-30T14:15:10.266643+02:00", "EventTime": "2023-10-30T14:15:10.266658+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["Cr2tGW1CSy2s3b0npk"]} -{"Format": "IDEA0", "ID": "5dc15a1a-babd-440d-a2e7-8e6e5d55da40", "DetectTime": "2023-10-30T14:15:10.288370+02:00", "EventTime": "2023-10-30T14:15:10.288393+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C2UOtS176I6oUtSbc8"]} -{"Format": "IDEA0", "ID": "3c71e9af-dd27-45f7-90a4-416bfde5f874", "DetectTime": "2023-10-30T14:15:10.307084+02:00", "EventTime": "2023-10-30T14:15:10.307095+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CMvAYl3IUMfYByAny"]} -{"Format": "IDEA0", "ID": "ea7b7925-e632-4ff4-acf2-184487dc6c37", "DetectTime": "2023-10-30T14:15:10.324657+02:00", "EventTime": "2023-10-30T14:15:10.324669+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CzMfxstopqbGUErDh"]} -{"Format": "IDEA0", "ID": "d7efd7b0-4412-4783-8b62-75b7eaad65e6", "DetectTime": "2023-10-30T14:15:10.340650+02:00", "EventTime": "2023-10-30T14:15:10.340665+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["CprEnN2mVgIl43qRxh"]} -{"Format": "IDEA0", "ID": "7f1d8980-bc3a-44cb-8e10-8ca1294f60a3", "DetectTime": "2023-10-30T14:15:10.355791+02:00", "EventTime": "2023-10-30T14:15:10.355800+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C8BMYzy787Gzi9the"]} -{"Format": "IDEA0", "ID": "1d8d30fa-420d-434c-b5d1-6737b110a378", "DetectTime": "2023-10-30T14:15:10.372699+02:00", "EventTime": "2023-10-30T14:15:10.372712+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["Ci2RAS1Pj5IqZ8ED32"]} -{"Format": "IDEA0", "ID": "289711f7-d540-4528-8b37-97dfc28ddd5d", "DetectTime": "2023-10-30T14:15:10.388460+02:00", "EventTime": "2023-10-30T14:15:10.388470+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CVLXPB4Q49KP5huLpi"]} -{"Format": "IDEA0", "ID": "43f1b949-a4c8-40a2-bd68-f429f1182818", "DetectTime": "2023-10-30T14:15:10.403846+02:00", "EventTime": "2023-10-30T14:15:10.403856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C635W93ZhgxWLPeLJj"]} -{"Format": "IDEA0", "ID": "935697fb-82ce-4177-a0fb-9f703e6a886f", "DetectTime": "2023-10-30T14:15:10.419288+02:00", "EventTime": "2023-10-30T14:15:10.419297+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.80.13.137"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.80.13.137 ", "ContentType": "text/plain"}], "uids": ["CvlmaB2Mr3AqjdOBYc"]} -{"Format": "IDEA0", "ID": "5234b0b7-7ac8-4010-9147-db573ab6fdb0", "DetectTime": "2023-10-30T14:15:10.435990+02:00", "EventTime": "2023-10-30T14:15:10.436000+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["C7u8gs2OafNp0pIKb7"]} -{"Format": "IDEA0", "ID": "dbab3cd0-99db-43e9-82dd-6fbee63087d2", "DetectTime": "2023-10-30T14:15:10.451026+02:00", "EventTime": "2023-10-30T14:15:10.451036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CuySGf1ZEXKmnFjUJc"]} -{"Format": "IDEA0", "ID": "448c52ff-03e2-4058-b5d2-aef11b853082", "DetectTime": "2023-10-30T14:15:10.467414+02:00", "EventTime": "2023-10-30T14:15:10.467423+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["Clyo523WbsOcd9xYqg"]} -{"Format": "IDEA0", "ID": "ecbb37a6-dc24-43a9-9e19-245009bb337e", "DetectTime": "2023-10-30T14:15:10.483321+02:00", "EventTime": "2023-10-30T14:15:10.483331+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CEFzHh1SVUPclLXrvc"]} -{"Format": "IDEA0", "ID": "845aec51-9365-43b8-ba4c-9b6d529dc2bf", "DetectTime": "2023-10-30T14:15:10.497606+02:00", "EventTime": "2023-10-30T14:15:10.497616+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["COim4p3JskATDEizl5"]} -{"Format": "IDEA0", "ID": "418985a8-8194-4dea-824e-16ae2c065999", "DetectTime": "2023-10-30T14:15:10.518128+02:00", "EventTime": "2023-10-30T14:15:10.518145+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CqQYaU1UWNG3Oll0ih"]} -{"Format": "IDEA0", "ID": "10ca97fe-737e-4f04-9c88-33ad6619669a", "DetectTime": "2023-10-30T14:15:10.540355+02:00", "EventTime": "2023-10-30T14:15:10.540371+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cx8Gyn1tOkFUrvt5U5"]} -{"Format": "IDEA0", "ID": "53d69024-d059-470f-a3b3-a7b715a17c13", "DetectTime": "2023-10-30T14:15:10.560835+02:00", "EventTime": "2023-10-30T14:15:10.560845+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CAPh9e1JHAjYdmdBr"]} -{"Format": "IDEA0", "ID": "159acd04-f539-43f7-9ba8-1a4d0095c078", "DetectTime": "2023-10-30T14:15:10.575708+02:00", "EventTime": "2023-10-30T14:15:10.575717+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["C9AE1F44dc3RDRwvW3"]} -{"Format": "IDEA0", "ID": "b13d390e-d8ee-4501-88b9-cb0a2b489f13", "DetectTime": "2023-10-30T14:15:10.595923+02:00", "EventTime": "2023-10-30T14:15:10.595949+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["C75I4s3SpkHECDBmr6"]} -{"Format": "IDEA0", "ID": "56c2ae17-1401-4f53-ad50-45bee4ce6c3d", "DetectTime": "2023-10-30T14:15:10.616844+02:00", "EventTime": "2023-10-30T14:15:10.616855+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CYDjUx1T4u77WMzA5c"]} -{"Format": "IDEA0", "ID": "ef74bf5a-1841-4925-9770-671a429b771f", "DetectTime": "2023-10-30T14:15:10.637771+02:00", "EventTime": "2023-10-30T14:15:10.637786+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CS2sP61Ofj558Fw8j9"]} -{"Format": "IDEA0", "ID": "27c9afac-77a1-4b84-be20-ecb1c7f30dff", "DetectTime": "2023-10-30T14:15:10.652552+02:00", "EventTime": "2023-10-30T14:15:10.652562+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CR19776CQ74b1uJjg"]} -{"Format": "IDEA0", "ID": "b20ae8ce-a982-413d-99e6-9688e75136be", "DetectTime": "2023-10-30T14:15:10.668573+02:00", "EventTime": "2023-10-30T14:15:10.668583+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CFErCk4t8wDY6NGa9k"]} -{"Format": "IDEA0", "ID": "c6ea456a-78ca-461c-a90b-fbbadbd97ff2", "DetectTime": "2023-10-30T14:15:10.684065+02:00", "EventTime": "2023-10-30T14:15:10.684074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CFreNy1nwnFhxhEGRj"]} -{"Format": "IDEA0", "ID": "f7e42cbe-d433-4028-bb2f-f68ae730bed8", "DetectTime": "2023-10-30T14:15:10.699465+02:00", "EventTime": "2023-10-30T14:15:10.699474+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["Ca8KHe2StUxP6Q2R8k"]} -{"Format": "IDEA0", "ID": "5f37b575-eb78-4da0-aeb3-11af380459dd", "DetectTime": "2023-10-30T14:15:10.714723+02:00", "EventTime": "2023-10-30T14:15:10.714733+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["C4DMAv4tPK0j3XAuAd"]} -{"Format": "IDEA0", "ID": "a0b9cc5e-daac-4a62-8c39-3b9ec8b45e80", "DetectTime": "2023-10-30T14:15:10.730032+02:00", "EventTime": "2023-10-30T14:15:10.730043+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXo6wo2yoYGm3YK6Be"]} -{"Format": "IDEA0", "ID": "71cf0157-a2cc-465d-bf0a-ef503241b519", "DetectTime": "2023-10-30T14:15:10.744669+02:00", "EventTime": "2023-10-30T14:15:10.744679+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["ConrQw3wGBA2NIsnR6"]} -{"Format": "IDEA0", "ID": "6ad424a0-6913-4866-ac38-7034456daba3", "DetectTime": "2023-10-30T14:15:10.759621+02:00", "EventTime": "2023-10-30T14:15:10.759631+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C7NdOn1JLEVGNXCca9"]} -{"Format": "IDEA0", "ID": "2c57e051-8257-48b3-87cc-c2ab0dad0662", "DetectTime": "2023-10-30T14:15:10.775127+02:00", "EventTime": "2023-10-30T14:15:10.775137+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CDrlZm3rJYxVQzvZr3"]} -{"Format": "IDEA0", "ID": "429970c9-c433-4037-99d3-df84297bfd3f", "DetectTime": "2023-10-30T14:15:10.790159+02:00", "EventTime": "2023-10-30T14:15:10.790172+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CZeJ7722MAKzIiRuH4"]} -{"Format": "IDEA0", "ID": "98e1086b-b466-4c10-b666-73e74a43f016", "DetectTime": "2023-10-30T14:15:10.806706+02:00", "EventTime": "2023-10-30T14:15:10.806720+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CJ6ECR364PgnubFiok"]} -{"Format": "IDEA0", "ID": "066c01c2-3571-408f-8eaf-5c514883ea60", "DetectTime": "2023-10-30T14:15:10.823370+02:00", "EventTime": "2023-10-30T14:15:10.823380+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["Cr0NPS2tp5oORYvBBb"]} -{"Format": "IDEA0", "ID": "78073fc5-162c-4ffd-849e-1b69974e02d2", "DetectTime": "2023-10-30T14:15:10.840007+02:00", "EventTime": "2023-10-30T14:15:10.840017+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CElztG2h8MHhBRE1Cd"]} -{"Format": "IDEA0", "ID": "1c0b8dcc-30d7-4895-89e2-51af35b7645f", "DetectTime": "2023-10-30T14:15:10.858649+02:00", "EventTime": "2023-10-30T14:15:10.858659+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CPA3jtUHCJslYhFm"]} -{"Format": "IDEA0", "ID": "31babe9e-0d30-4c3c-a326-16bf7c344906", "DetectTime": "2023-10-30T14:15:10.876797+02:00", "EventTime": "2023-10-30T14:15:10.876808+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CrfENH1dEXRcKHjWw6"]} -{"Format": "IDEA0", "ID": "50a38fdc-cca4-4bce-8595-8493b277fe28", "DetectTime": "2023-10-30T14:15:10.896928+02:00", "EventTime": "2023-10-30T14:15:10.896943+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CvJBPb2DPMHJZyjYC3"]} -{"Format": "IDEA0", "ID": "5868f3a7-5dc9-4564-acb5-17fee31cdf14", "DetectTime": "2023-10-30T14:15:10.911975+02:00", "EventTime": "2023-10-30T14:15:10.911985+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C95lU42F3ywhLMH8Fe"]} -{"Format": "IDEA0", "ID": "8f835d95-9735-44ba-9e8d-0df7e502737a", "DetectTime": "2023-10-30T14:15:10.925928+02:00", "EventTime": "2023-10-30T14:15:10.925944+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CBNwDe1kxD7Q6Keg6j"]} -{"Format": "IDEA0", "ID": "fd2c3fc3-93e4-4bec-b592-34359c9548a9", "DetectTime": "2023-10-30T14:15:10.941353+02:00", "EventTime": "2023-10-30T14:15:10.941363+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CScl0B2bZuVK4jZMHc"]} -{"Format": "IDEA0", "ID": "ee91705a-f555-4c79-be5d-551f2941644a", "DetectTime": "2023-10-30T14:15:10.952963+02:00", "EventTime": "2023-10-30T14:15:10.952972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CG0Y0s1RJT4BS84MK2"]} -{"Format": "IDEA0", "ID": "eec6e70f-4dfd-434d-8d4e-4bbc5dc27eb8", "DetectTime": "2023-10-30T14:15:10.964514+02:00", "EventTime": "2023-10-30T14:15:10.964523+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["ChXzRr214OUJ4Zygb8"]} -{"Format": "IDEA0", "ID": "7ddd321c-9974-42a6-b512-afd55a3e936d", "DetectTime": "2023-10-30T14:15:10.976167+02:00", "EventTime": "2023-10-30T14:15:10.976176+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["Cj9e881HZu5U5avTC1"]} -{"Format": "IDEA0", "ID": "2071df23-b85b-4b59-938f-901c4d1109fe", "DetectTime": "2023-10-30T14:15:10.987885+02:00", "EventTime": "2023-10-30T14:15:10.987899+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CCA2OZ3u5qsjKzwAV5"]} -{"Format": "IDEA0", "ID": "515b409b-4f68-45e2-bc40-edcee1c384fe", "DetectTime": "2023-10-30T14:15:11.000169+02:00", "EventTime": "2023-10-30T14:15:11.000180+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CIa1Yx23q9qbSg30Le"]} -{"Format": "IDEA0", "ID": "2a9241db-04ea-45ee-939a-b00a59c5ded5", "DetectTime": "2023-10-30T14:15:11.011292+02:00", "EventTime": "2023-10-30T14:15:11.011301+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CiyTNu32ImVycvIcpb"]} -{"Format": "IDEA0", "ID": "6b8750b8-bf91-4bb9-b30d-f1b1a91675c2", "DetectTime": "2023-10-30T14:15:11.030425+02:00", "EventTime": "2023-10-30T14:15:11.030441+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["Co676X29pOqqsK9ylh"]} -{"Format": "IDEA0", "ID": "a827f177-891f-481f-aebe-74641a1896f8", "DetectTime": "2023-10-30T14:15:11.043367+02:00", "EventTime": "2023-10-30T14:15:11.043381+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["Ctjfjt4OFqcgTCFuzb"]} -{"Format": "IDEA0", "ID": "9048e2c5-c6d1-4af9-bd96-120c72247b0e", "DetectTime": "2023-10-30T14:15:11.058998+02:00", "EventTime": "2023-10-30T14:15:11.059008+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["Co83Ns2BpDcdIjWJN4"]} -{"Format": "IDEA0", "ID": "b2503c45-d3cd-456a-8d8e-fe12f4bc9366", "DetectTime": "2023-10-30T14:15:11.073540+02:00", "EventTime": "2023-10-30T14:15:11.073554+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CklUGQ3mB4C3xxDzn5"]} -{"Format": "IDEA0", "ID": "84838171-ea30-4a36-a970-81aaa1d1aaeb", "DetectTime": "2023-10-30T14:15:11.088601+02:00", "EventTime": "2023-10-30T14:15:11.088615+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["ChAqB5NJiYeAAgu6"]} -{"Format": "IDEA0", "ID": "c4067910-7a21-4e0b-ac17-53777acd2b24", "DetectTime": "2023-10-30T14:15:11.105262+02:00", "EventTime": "2023-10-30T14:15:11.105273+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CPVGJt2klog7XNrRBd"]} -{"Format": "IDEA0", "ID": "eb24402c-63f7-4b0c-8898-99b95d3a9f84", "DetectTime": "2023-10-30T14:15:11.122768+02:00", "EventTime": "2023-10-30T14:15:11.122796+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CuUFpcnGyksEYpyhd"]} -{"Format": "IDEA0", "ID": "3f972c1a-86c5-4efb-ad0a-923407319c8c", "DetectTime": "2023-10-30T14:15:11.138160+02:00", "EventTime": "2023-10-30T14:15:11.138174+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CPpqH82rcghsDrGsD5"]} -{"Format": "IDEA0", "ID": "02b1ea1e-0e45-4708-8050-ac0924ebf9a3", "DetectTime": "2023-10-30T14:15:11.151671+02:00", "EventTime": "2023-10-30T14:15:11.151681+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["Cbw5I5PMDPFI5eWN3"]} -{"Format": "IDEA0", "ID": "115f54fc-ab4e-4165-a4ff-ffc355b59d98", "DetectTime": "2023-10-30T14:15:11.164127+02:00", "EventTime": "2023-10-30T14:15:11.164138+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CLBnbz4ECpyYX9H9jl"]} -{"Format": "IDEA0", "ID": "30e88899-1812-4606-bb62-307ae615b681", "DetectTime": "2023-10-30T14:15:11.176084+02:00", "EventTime": "2023-10-30T14:15:11.176093+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CRGHnU3X4ZioUfEoSh"]} -{"Format": "IDEA0", "ID": "e59470aa-1f78-4a04-8545-e8a03501c819", "DetectTime": "2023-10-30T14:15:11.188530+02:00", "EventTime": "2023-10-30T14:15:11.188540+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CdRx4a3PhcVkKKxdBd"]} -{"Format": "IDEA0", "ID": "a19caa28-4605-4333-aafb-5a575ce14fd6", "DetectTime": "2023-10-30T14:15:11.201055+02:00", "EventTime": "2023-10-30T14:15:11.201064+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CyJquM1VaxE3sxOrMg"]} -{"Format": "IDEA0", "ID": "bca3339a-1ac6-4674-85d1-ae167c80bbb7", "DetectTime": "2023-10-30T14:15:11.212349+02:00", "EventTime": "2023-10-30T14:15:11.212358+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["COLujX3uYX4wng5u8h"]} -{"Format": "IDEA0", "ID": "5fb9baf0-113a-482c-92e4-eb2896150d2e", "DetectTime": "2023-10-30T14:15:11.223922+02:00", "EventTime": "2023-10-30T14:15:11.223937+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CIHz8a2RuUQCj8ZXBk"]} -{"Format": "IDEA0", "ID": "d743619e-c235-4797-b2cb-2547bdf9cf57", "DetectTime": "2023-10-30T14:15:11.236145+02:00", "EventTime": "2023-10-30T14:15:11.236154+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CvWtGl1RkyhIcjPp6e"]} -{"Format": "IDEA0", "ID": "cea3046a-5d86-4f52-b3fb-f2e4f0881211", "DetectTime": "2023-10-30T14:15:11.246830+02:00", "EventTime": "2023-10-30T14:15:11.246840+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CFt50f10JQay602fF5"]} -{"Format": "IDEA0", "ID": "16323781-253a-4500-ae20-14e6efa700aa", "DetectTime": "2023-10-30T14:15:11.257501+02:00", "EventTime": "2023-10-30T14:15:11.257510+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["ClpxS23VVJ01zE38Z7"]} -{"Format": "IDEA0", "ID": "89e93bce-62e6-4d58-b7ad-0b671b3b0dc9", "DetectTime": "2023-10-30T14:15:11.269331+02:00", "EventTime": "2023-10-30T14:15:11.269342+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["COyFKL23KGax8p6wkl"]} -{"Format": "IDEA0", "ID": "26d497ed-07aa-4186-9be7-2f123c94b6d9", "DetectTime": "2023-10-30T14:15:11.281331+02:00", "EventTime": "2023-10-30T14:15:11.281341+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CjpELwkZmdQvLISYh"]} -{"Format": "IDEA0", "ID": "42bb0f11-fc08-4746-a234-82856d8c7934", "DetectTime": "2023-10-30T14:15:11.294056+02:00", "EventTime": "2023-10-30T14:15:11.294067+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CJPqho3uW5Go3sF0Ec"]} -{"Format": "IDEA0", "ID": "2cc6fe2a-20bc-41b8-8eec-acf7c04de079", "DetectTime": "2023-10-30T14:15:11.307180+02:00", "EventTime": "2023-10-30T14:15:11.307190+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["C2oaV53EFkvNUdwind"]} -{"Format": "IDEA0", "ID": "64005b0b-a2e9-4e24-872d-af7fc70430b0", "DetectTime": "2023-10-30T14:15:11.320113+02:00", "EventTime": "2023-10-30T14:15:11.320123+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CLZeHt2oh67Oly2fqg"]} -{"Format": "IDEA0", "ID": "a8aac2bd-1995-4ccc-b7b3-3bd7f3bdfd99", "DetectTime": "2023-10-30T14:15:11.332658+02:00", "EventTime": "2023-10-30T14:15:11.332667+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["C8Bopz4yCMUeGa8aNc"]} -{"Format": "IDEA0", "ID": "bcfe33df-9193-4f85-b200-0188ae8ec4b1", "DetectTime": "2023-10-30T14:15:11.343729+02:00", "EventTime": "2023-10-30T14:15:11.343739+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CKPxJX3kEIHxcmYt33"]} -{"Format": "IDEA0", "ID": "9e2d6fd6-a80d-4275-81f1-6621ec25adbc", "DetectTime": "2023-10-30T14:15:11.355507+02:00", "EventTime": "2023-10-30T14:15:11.355518+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["Cg9cFHaqX2nywBHW6"]} -{"Format": "IDEA0", "ID": "824a1c4d-2a41-4f01-862c-c5bd9cb104a2", "DetectTime": "2023-10-30T14:15:11.368782+02:00", "EventTime": "2023-10-30T14:15:11.368792+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["CNNxpi1Jeltgjr3ZTg"]} -{"Format": "IDEA0", "ID": "c4d716ed-3f5e-414f-a709-3053e677dc92", "DetectTime": "2023-10-30T14:15:11.380523+02:00", "EventTime": "2023-10-30T14:15:11.380534+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CNoV8z4EQhu9dK5mP2"]} -{"Format": "IDEA0", "ID": "1571aee0-e3a4-4019-9027-660e735465d5", "DetectTime": "2023-10-30T14:15:11.391586+02:00", "EventTime": "2023-10-30T14:15:11.391595+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CPiTDl2iB99GVbAKK4"]} -{"Format": "IDEA0", "ID": "22de757c-6f2d-47b1-adef-3a5778399e12", "DetectTime": "2023-10-30T14:15:11.402842+02:00", "EventTime": "2023-10-30T14:15:11.402853+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CrFBuGgjf7KtcSX34"]} -{"Format": "IDEA0", "ID": "626308b5-01cd-47ba-aade-99afca97e546", "DetectTime": "2023-10-30T14:15:11.414320+02:00", "EventTime": "2023-10-30T14:15:11.414330+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["CDj8cECl7POH4GYu9"]} -{"Format": "IDEA0", "ID": "5d3429eb-882d-4f14-98cc-c688988babee", "DetectTime": "2023-10-30T14:15:11.425617+02:00", "EventTime": "2023-10-30T14:15:11.425626+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["CXiEh14PI1q4s95h33"]} -{"Format": "IDEA0", "ID": "9275e7e0-f319-4e5e-9b63-816b110bd14e", "DetectTime": "2023-10-30T14:15:11.437341+02:00", "EventTime": "2023-10-30T14:15:11.437352+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CBtC8O2X3QON5OuNfi"]} -{"Format": "IDEA0", "ID": "12340c86-9e6a-4bc7-8c75-b3d458385722", "DetectTime": "2023-10-30T14:15:11.449756+02:00", "EventTime": "2023-10-30T14:15:11.449767+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CKAtYfeRe6kGqOjhh"]} -{"Format": "IDEA0", "ID": "320b57db-2546-4631-a685-e8c1a03d9b19", "DetectTime": "2023-10-30T14:15:11.460871+02:00", "EventTime": "2023-10-30T14:15:11.460881+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["CuyP0hLuDkaNMP623"]} -{"Format": "IDEA0", "ID": "7a97c8f3-8331-4146-a725-3962d284e162", "DetectTime": "2023-10-30T14:15:11.473785+02:00", "EventTime": "2023-10-30T14:15:11.473795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["CRauK52Y3cWFGYLyee"]} -{"Format": "IDEA0", "ID": "43158bdf-1736-4b9d-ba79-9e0d34b49f22", "DetectTime": "2023-10-30T14:15:11.489883+02:00", "EventTime": "2023-10-30T14:15:11.489897+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CPEGyc4MMugA5nmmm"]} -{"Format": "IDEA0", "ID": "0283d758-3154-49ea-922e-83f790688ba4", "DetectTime": "2023-10-30T14:15:11.506855+02:00", "EventTime": "2023-10-30T14:15:11.506870+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["C77HSL3OiQFZIhzhK4"]} -{"Format": "IDEA0", "ID": "d40c00ee-f326-4949-90da-40cd40b7685e", "DetectTime": "2023-10-30T14:15:11.524179+02:00", "EventTime": "2023-10-30T14:15:11.524193+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["CaQUpV3VrqWZpymqVb"]} -{"Format": "IDEA0", "ID": "ae54ff67-1e9b-4c33-a9ec-80efed677f76", "DetectTime": "2023-10-30T14:15:11.540027+02:00", "EventTime": "2023-10-30T14:15:11.540036+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CzRunSWoC9UnlG8fh"]} -{"Format": "IDEA0", "ID": "83969209-4b99-4bd6-b915-6512685b70ef", "DetectTime": "2023-10-30T14:15:11.551406+02:00", "EventTime": "2023-10-30T14:15:11.551415+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["CFClcJ3QTbx8Y95K04"]} -{"Format": "IDEA0", "ID": "b582fe37-12e7-4cce-aa39-ffe87ddc55ee", "DetectTime": "2023-10-30T14:15:11.563001+02:00", "EventTime": "2023-10-30T14:15:11.563011+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CXtgkU13qeLLflbJad"]} -{"Format": "IDEA0", "ID": "f547a1e3-5a52-4602-a389-e01dd536c8fb", "DetectTime": "2023-10-30T14:15:11.574145+02:00", "EventTime": "2023-10-30T14:15:11.574155+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["ClRmwF2ZaVisogxYxj"]} -{"Format": "IDEA0", "ID": "0fb1b76e-662d-4854-960a-fdce88403669", "DetectTime": "2023-10-30T14:15:11.585693+02:00", "EventTime": "2023-10-30T14:15:11.585702+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C8bDxk4HEO4zaWHOIi"]} -{"Format": "IDEA0", "ID": "16b0037f-7105-4f7e-b75c-cbdc01cd32af", "DetectTime": "2023-10-30T14:15:11.596752+02:00", "EventTime": "2023-10-30T14:15:11.596761+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["C4QfHa4lK0cXtzTVL2"]} -{"Format": "IDEA0", "ID": "028bc440-557d-4ccc-bf92-4405e3638c7d", "DetectTime": "2023-10-30T14:15:11.608251+02:00", "EventTime": "2023-10-30T14:15:11.608261+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["C1cgZF1jiOBjnmfJEa"]} -{"Format": "IDEA0", "ID": "7767aff9-489f-4b1f-9e31-0ff617d3ceba", "DetectTime": "2023-10-30T14:15:11.623882+02:00", "EventTime": "2023-10-30T14:15:11.623896+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CAWK1kE6uxqgnJJQ7"]} -{"Format": "IDEA0", "ID": "556e2e5d-0b59-4e1d-a2d2-9aaa657b8adf", "DetectTime": "2023-10-30T14:15:11.639318+02:00", "EventTime": "2023-10-30T14:15:11.639332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 88.225.233.16 ", "ContentType": "text/plain"}], "uids": ["CgaZU23qP7jaMHq3Tc"]} -{"Format": "IDEA0", "ID": "d1ce81f6-3ff7-4d2b-a2f0-ddf11cc3d674", "DetectTime": "2023-10-30T14:15:11.654570+02:00", "EventTime": "2023-10-30T14:15:11.654585+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CFMDCh4nNYhgS0o13l"]} -{"Format": "IDEA0", "ID": "4bf750de-3522-4f51-babe-849095db9bac", "DetectTime": "2023-10-30T14:15:11.671415+02:00", "EventTime": "2023-10-30T14:15:11.671430+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 142.161.36.205 ", "ContentType": "text/plain"}], "uids": ["CXm6Xy1YawovrAnZKc"]} -{"Format": "IDEA0", "ID": "f240491d-16fa-45dc-bfa3-bd4c99dccccf", "DetectTime": "2023-10-30T14:15:11.686419+02:00", "EventTime": "2023-10-30T14:15:11.686432+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 147.163.75.36 ", "ContentType": "text/plain"}], "uids": ["CHnTko3nDDXbnpQtUj"]} -{"Format": "IDEA0", "ID": "e89423b5-3d67-4a6a-a5cb-2e5c26f65d75", "DetectTime": "2023-10-30T14:15:11.701605+02:00", "EventTime": "2023-10-30T14:15:11.701620+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.89.157.21"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 174.89.157.21 ", "ContentType": "text/plain"}], "uids": ["Cp6bRF1wYxyo4SWKa"]} -{"Format": "IDEA0", "ID": "188b18c2-5d5a-4299-b03f-d2c414e4e204", "DetectTime": "2023-10-30T14:15:11.716884+02:00", "EventTime": "2023-10-30T14:15:11.716898+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CKisfJyRgOmdtOSNe"]} -{"Format": "IDEA0", "ID": "fd6517ec-d5dc-4834-b201-259f966fbfc3", "DetectTime": "2023-10-30T14:15:11.733897+02:00", "EventTime": "2023-10-30T14:15:11.733911+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 78.6.164.6 ", "ContentType": "text/plain"}], "uids": ["CPdny821nAjLIufjEb"]} -{"Format": "IDEA0", "ID": "34ff9505-fb08-4f47-a8e2-1807c5d70876", "DetectTime": "2023-10-30T14:15:11.748924+02:00", "EventTime": "2023-10-30T14:15:11.748938+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 66.226.34.247 ", "ContentType": "text/plain"}], "uids": ["CmUuCm1Dv6uPTzRRGa"]} -{"Format": "IDEA0", "ID": "d2d48840-35df-48c6-b060-1c648bd35c44", "DetectTime": "2023-10-30T14:15:11.764351+02:00", "EventTime": "2023-10-30T14:15:11.764365+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.2.203.86 ", "ContentType": "text/plain"}], "uids": ["CCgA7QQ1YIOJyyiRc"]} -{"Format": "IDEA0", "ID": "ff3cedf9-6d28-4d50-8c3a-ee7b6213e0c6", "DetectTime": "2023-10-30T14:15:11.779477+02:00", "EventTime": "2023-10-30T14:15:11.779488+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 173.174.73.98 ", "ContentType": "text/plain"}], "uids": ["CyphW9nNLnISwBr0h"]} -{"Format": "IDEA0", "ID": "eb9c8209-1c6a-4e40-be27-3f5d0bfc095c", "DetectTime": "2023-10-30T14:15:11.791229+02:00", "EventTime": "2023-10-30T14:15:11.791241+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 75.1.149.150 ", "ContentType": "text/plain"}], "uids": ["C3rypi4LJzmVVF8Uij"]} -{"Format": "IDEA0", "ID": "6578703e-0f5f-4b9b-897d-996e42c4ab4b", "DetectTime": "2023-10-30T14:15:11.803251+02:00", "EventTime": "2023-10-30T14:15:11.803266+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 93.109.245.154 ", "ContentType": "text/plain"}], "uids": ["CCEIA62gNVyFcIum0e"]} -{"Format": "IDEA0", "ID": "9abf00f6-6ca5-4c2f-b401-4366e0607f2a", "DetectTime": "2023-10-30T14:15:11.818059+02:00", "EventTime": "2023-10-30T14:15:11.818069+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.91.116.41 ", "ContentType": "text/plain"}], "uids": ["CediaV1DH9iCFQiJwb"]} -{"Format": "IDEA0", "ID": "f98dbbd4-3e98-4a0d-b1b3-8337e63c62b1", "DetectTime": "2023-10-30T14:15:11.832434+02:00", "EventTime": "2023-10-30T14:15:11.832448+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 71.205.65.116 ", "ContentType": "text/plain"}], "uids": ["CdhXW51LKfikjut3Mg"]} -{"Format": "IDEA0", "ID": "87050f6a-e97d-4191-95e2-6e1ad2e8beee", "DetectTime": "2023-10-30T14:15:11.846363+02:00", "EventTime": "2023-10-30T14:15:11.846377+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 70.96.145.133 ", "ContentType": "text/plain"}], "uids": ["CrOMa2TCUKCQ5a4P8"]} -{"Format": "IDEA0", "ID": "ae076eb3-988d-4cd9-8d33-dfa3ac76b9bb", "DetectTime": "2023-10-30T14:15:11.859356+02:00", "EventTime": "2023-10-30T14:15:11.859366+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 175.195.224.10 ", "ContentType": "text/plain"}], "uids": ["ChTj8N3doHuSzAPSdg"]} -{"Format": "IDEA0", "ID": "38a8ca55-e91f-48d6-b7f5-686cb54d42b3", "DetectTime": "2023-10-30T14:15:11.871751+02:00", "EventTime": "2023-10-30T14:15:11.871764+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.42.113.147 ", "ContentType": "text/plain"}], "uids": ["C4KHde3C0NDIQ9n7bh"]} -{"Format": "IDEA0", "ID": "4e10177b-c208-4342-a417-dfa3cf84711b", "DetectTime": "2023-10-30T14:15:11.885626+02:00", "EventTime": "2023-10-30T14:15:11.885642+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 189.165.60.251 ", "ContentType": "text/plain"}], "uids": ["ChCgxNWPKE2aPeOC1"]} -{"Format": "IDEA0", "ID": "d71abaf5-7268-46d4-be9a-fc81761857a3", "DetectTime": "2023-10-30T14:15:11.898198+02:00", "EventTime": "2023-10-30T14:15:11.898213+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 217.220.223.98 ", "ContentType": "text/plain"}], "uids": ["C71AxxPhDQD8Iajo7"]} -{"Format": "IDEA0", "ID": "4cd9005d-0d75-4f74-8c9f-340926f248fc", "DetectTime": "2023-10-30T14:15:11.912781+02:00", "EventTime": "2023-10-30T14:15:11.912795+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 50.42.61.212 ", "ContentType": "text/plain"}], "uids": ["C2gYph3svGX9ywMeX2"]} -{"Format": "IDEA0", "ID": "de70fba8-be29-493a-a4a7-9322560feb3b", "DetectTime": "2023-10-30T14:15:11.924678+02:00", "EventTime": "2023-10-30T14:15:11.924687+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 108.86.251.63 ", "ContentType": "text/plain"}], "uids": ["CpfwZf2eEl1uunMSo"]} -{"Format": "IDEA0", "ID": "3b8c22af-fb64-4bea-937a-9ae23884b9a9", "DetectTime": "2023-10-30T14:15:11.935418+02:00", "EventTime": "2023-10-30T14:15:11.935427+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.95.196.161 ", "ContentType": "text/plain"}], "uids": ["CmpESe4Mu97qBtRshi"]} -{"Format": "IDEA0", "ID": "83b92219-ccde-422d-8c1d-4de2f0b9d197", "DetectTime": "2023-10-30T14:15:11.945710+02:00", "EventTime": "2023-10-30T14:15:11.945719+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.228.38.216"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.228.38.216 ", "ContentType": "text/plain"}], "uids": ["CXBrHz3X3su9cf8rZ4"]} -{"Format": "IDEA0", "ID": "9b0f44fb-0701-4b7e-8f38-2d54d6b09953", "DetectTime": "2023-10-30T14:15:11.956079+02:00", "EventTime": "2023-10-30T14:15:11.956088+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 69.154.77.2 ", "ContentType": "text/plain"}], "uids": ["CNNzPr4P4LhMP8dkZ7"]} -{"Format": "IDEA0", "ID": "758e4ad7-5731-4c12-a5c0-578ea5661fd8", "DetectTime": "2023-10-30T14:15:11.966845+02:00", "EventTime": "2023-10-30T14:15:11.966856+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.46.250.35"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 72.46.250.35 ", "ContentType": "text/plain"}], "uids": ["CkO1NKckk9f32eHh2"]} -{"Format": "IDEA0", "ID": "fa0597a9-4498-4644-b817-59082622f69a", "DetectTime": "2023-10-30T14:15:11.977316+02:00", "EventTime": "2023-10-30T14:15:11.977332+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.53.81"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 86.156.53.81 ", "ContentType": "text/plain"}], "uids": ["CNbtT01j2MQ4slP1Ni"]} -{"Format": "IDEA0", "ID": "17b2ac0b-90f8-4807-8e13-99af9173412a", "DetectTime": "2023-10-30T14:15:11.988915+02:00", "EventTime": "2023-10-30T14:15:11.988925+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.22.158.150"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 68.22.158.150 ", "ContentType": "text/plain"}], "uids": ["C22gzV1ARGBVdwIJIj"]} -{"Format": "IDEA0", "ID": "97c4f86a-f6a2-4527-a100-8ce910edfe24", "DetectTime": "2023-10-30T14:15:12.000064+02:00", "EventTime": "2023-10-30T14:15:12.000074+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 99.34.137.78 ", "ContentType": "text/plain"}], "uids": ["CMDe0bTp3IyY1Zo8a"]} -{"Format": "IDEA0", "ID": "fdf3dd34-eb65-45ad-ab47-82eec355d7dc", "DetectTime": "2023-10-30T14:15:12.012556+02:00", "EventTime": "2023-10-30T14:15:12.012566+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 223.17.69.28 ", "ContentType": "text/plain"}], "uids": ["CczJvs1N0VJ8XlTy44"]} -{"Format": "IDEA0", "ID": "6388cb14-987d-4575-a69b-4a92de129ece", "DetectTime": "2023-10-30T14:15:12.026957+02:00", "EventTime": "2023-10-30T14:15:12.026972+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 97.64.221.67 ", "ContentType": "text/plain"}], "uids": ["CwaVOl4cKBoNhrotR7"]} -{"Format": "IDEA0", "ID": "fb8a301e-1819-4372-aaee-1350add2f409", "DetectTime": "2023-10-30T14:15:12.042931+02:00", "EventTime": "2023-10-30T14:15:12.042946+02:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"], "Hostname": ["90-156-118-144.internetia.net.pl"], "Type": ["Malware"]}], "Attach": [{"Content": "a connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl", "ContentType": "text/plain"}], "uids": ["CN4p9g3dToUWJtuH6"]} -{"Format": "IDEA0", "ID": "e4e3aec4-13be-4eef-a535-818a0b673df1", "DetectTime": "2023-10-30T14:15:12.055711+02:00", "EventTime": "2023-10-30T14:15:12.055721+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CN3Bi72VZJFCNdTIWk"]} -{"Format": "IDEA0", "ID": "038dfb9e-2df2-4ab9-9ca2-cad095555f62", "DetectTime": "2023-10-30T14:15:12.070993+02:00", "EventTime": "2023-10-30T14:15:12.071004+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CULYoG2EKBZJvs1xQ1"]} -{"Format": "IDEA0", "ID": "ce83a939-d725-4899-a0d0-09d678888e80", "DetectTime": "2023-10-30T14:15:12.085970+02:00", "EventTime": "2023-10-30T14:15:12.085980+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["Cvzqey3rGtJwitixpk"]} -{"Format": "IDEA0", "ID": "45a3c97d-ea15-421c-a857-7d0c91e9e2bf", "DetectTime": "2023-10-30T14:15:12.099089+02:00", "EventTime": "2023-10-30T14:15:12.099099+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CsYwRz3BoyA2JmSdVl"]} -{"Format": "IDEA0", "ID": "cc3f5e43-d173-4bff-ab8a-1b5d20dae2d5", "DetectTime": "2023-10-30T14:15:12.112637+02:00", "EventTime": "2023-10-30T14:15:12.112647+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COiWwP35YgwGtmTmDk"]} -{"Format": "IDEA0", "ID": "e5682c8e-47f0-4c7e-900d-d3ba9f7d5ca3", "DetectTime": "2023-10-30T14:15:12.125909+02:00", "EventTime": "2023-10-30T14:15:12.125919+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CnL8jO2HHrMLA0XrO2"]} -{"Format": "IDEA0", "ID": "a1215622-4e9c-4c24-a7c1-ff8f92617966", "DetectTime": "2023-10-30T14:15:12.141757+02:00", "EventTime": "2023-10-30T14:15:12.141770+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C2MsPl4uXIpRedy6Ac"]} -{"Format": "IDEA0", "ID": "9c35e706-1b72-4d7b-bce5-1ab4006a851a", "DetectTime": "2023-10-30T14:15:12.156105+02:00", "EventTime": "2023-10-30T14:15:12.156115+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C1bsGZ29hZ4Rf8Hyv7"]} -{"Format": "IDEA0", "ID": "fcaa7f5f-6074-4310-8f41-d2a016acd80a", "DetectTime": "2023-10-30T14:15:12.170545+02:00", "EventTime": "2023-10-30T14:15:12.170556+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CVmzz54ZJNTLlHTPml"]} -{"Format": "IDEA0", "ID": "03a62694-c376-416f-b397-0c77c03e96ad", "DetectTime": "2023-10-30T14:15:12.185370+02:00", "EventTime": "2023-10-30T14:15:12.185384+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CQhMS33hI19bIxrF1f"]} -{"Format": "IDEA0", "ID": "2a917186-d5ae-4224-baa2-43ff398b9a76", "DetectTime": "2023-10-30T14:15:12.199588+02:00", "EventTime": "2023-10-30T14:15:12.199602+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ClOzMw1GgpZ8cvFBm2"]} -{"Format": "IDEA0", "ID": "ccc0c339-9138-4156-9697-3c155b979d58", "DetectTime": "2023-10-30T14:15:12.214924+02:00", "EventTime": "2023-10-30T14:15:12.214940+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CsnpHv4ZWK1S3wQea8"]} -{"Format": "IDEA0", "ID": "5d3243ac-bf8b-4c5e-87ad-96093a13a6fe", "DetectTime": "2023-10-30T14:15:33.956388+02:00", "EventTime": "2023-10-30T14:15:33.956400+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"], "Hostname": ["dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 189.242.78.118 from 10.0.2.19. blacklisted IP AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CiJLtD4wIHSgQUcVxb"]} -{"Format": "IDEA0", "ID": "d1dc1c2d-daca-41d1-8093-a051826fbd47", "DetectTime": "2023-10-30T14:15:39.840048+02:00", "EventTime": "2023-10-30T14:15:39.840063+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"], "Hostname": ["dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 84.59.131.0 from 10.0.2.19. blacklisted IP AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CBJSAd12wgPYB1Mj57"]} -{"Format": "IDEA0", "ID": "cacd8434-ac2e-4b43-b8be-92401e46839d", "DetectTime": "2023-10-30T14:15:41.593539+02:00", "EventTime": "2023-10-30T14:15:41.593556+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"], "Hostname": ["adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 76.226.114.217 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COiakUEmMmrK599Ng"]} -{"Format": "IDEA0", "ID": "29064ee0-f683-4b09-8dc1-81d602f8034a", "DetectTime": "2023-10-30T14:15:43.730007+02:00", "EventTime": "2023-10-30T14:15:43.730018+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 66.63.204.26 from 10.0.2.19. blacklisted IP AS: BIRCH-TELECOM AS1652 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CxsnYg33wucSudLdv5"]} -{"Format": "IDEA0", "ID": "cbb2fd7e-9bf8-45a2-80ba-a15fe5f341ea", "DetectTime": "2023-10-30T14:15:44.789794+02:00", "EventTime": "2023-10-30T14:15:44.789809+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"], "Hostname": ["1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 1.168.10.20 from 10.0.2.19. blacklisted IP AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CAaymk2nwWWnS1jeAd"]} -{"Format": "IDEA0", "ID": "ea8155ac-766d-4fad-9f75-5a05962168b3", "DetectTime": "2023-10-30T14:15:51.406983+02:00", "EventTime": "2023-10-30T14:15:51.407010+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 217.132.237.117 from 10.0.2.19. blacklisted IP AS: NV-ASN CELLCOM ltd., IL AS168 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CyCxaL4j1TVMUFXLf"]} -{"Format": "IDEA0", "ID": "f0fb3227-1c11-4673-9981-d432c2fb6cb3", "DetectTime": "2023-10-30T14:15:52.244693+02:00", "EventTime": "2023-10-30T14:15:52.244711+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"], "Hostname": ["host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 79.35.154.174 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CV49Uh1Lmyux16Vp01"]} -{"Format": "IDEA0", "ID": "d0c7b35b-df87-4f9d-a286-5c5c04d5913e", "DetectTime": "2023-10-30T14:16:00.145797+02:00", "EventTime": "2023-10-30T14:16:00.145809+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"], "Hostname": ["ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 70.252.131.148 from 10.0.2.19. blacklisted IP AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CenBO41qFRoFkOTb1k"]} -{"Format": "IDEA0", "ID": "1a52b07d-c73a-405e-b90d-4c0c1b404792", "DetectTime": "2023-10-30T14:16:03.266917+02:00", "EventTime": "2023-10-30T14:16:03.266933+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"], "Hostname": ["78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 78.182.138.111 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CRBsjN2vfhWtkRzdC7"]} -{"Format": "IDEA0", "ID": "8c0ab322-a492-436c-b6b0-3e82e09403a2", "DetectTime": "2023-10-30T14:16:06.071151+02:00", "EventTime": "2023-10-30T14:16:06.071161+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"], "Hostname": ["190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.204.37.238 from 10.0.2.19. blacklisted IP AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CvXmVMvbIUwLnE4Ja"]} -{"Format": "IDEA0", "ID": "982b935d-22fb-4a2b-a462-b295e1d5b3e7", "DetectTime": "2023-10-30T14:16:08.850696+02:00", "EventTime": "2023-10-30T14:16:08.850712+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.217.10.192"], "Hostname": ["p5dd90ac0.dip0.t-ipconnect.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 93.217.10.192 from 10.0.2.19. blacklisted IP AS: DTAG Internet service provider operations, DE AS3320 rDNS: p5dd90ac0.dip0.t-ipconnect.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CHn8ev1GspspOzgsIg"]} -{"Format": "IDEA0", "ID": "fe665a99-9d0a-449f-b8de-2773216abf86", "DetectTime": "2023-10-30T14:16:09.824786+02:00", "EventTime": "2023-10-30T14:16:09.824801+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.57.162.209"], "Hostname": ["187-57-162-209.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 187.57.162.209 from 10.0.2.19. blacklisted IP AS: TELEFONICA BRASIL S.A, BR AS27699 rDNS: 187-57-162-209.dsl.telesp.net.br Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChJ4lu2tNFDACUCkN2"]} -{"Format": "IDEA0", "ID": "ad554e01-9067-4cfc-aa9d-dac37079f530", "DetectTime": "2023-10-30T14:16:12.863835+02:00", "EventTime": "2023-10-30T14:16:12.863850+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.130.55.165"], "Hostname": ["cpe-74-130-55-165.kya.res.rr.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 74.130.55.165 from 10.0.2.19. blacklisted IP AS: TWC-10796-MIDWEST, US AS10796 rDNS: cpe-74-130-55-165.kya.res.rr.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C6Ta19ovRtn8lexQg"]} -{"Format": "IDEA0", "ID": "8c1517ae-6722-43de-bfe5-fde771208261", "DetectTime": "2023-10-30T14:16:13.855949+02:00", "EventTime": "2023-10-30T14:16:13.855961+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.216.94"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.239.216.94 from 10.0.2.19. blacklisted IP AS: Telefonica del Peru S.A.A., PE AS614 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["ChbNa73k2U8IAA3yW3"]} -{"Format": "IDEA0", "ID": "41e3e606-5f23-4d20-91ca-1f2dcef0e14f", "DetectTime": "2023-10-30T14:16:35.252560+02:00", "EventTime": "2023-10-30T14:16:35.252571+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.253.45"], "Hostname": ["45.253.56.190.static.intelnet.net.gt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 190.56.253.45 from 10.0.2.19. blacklisted IP AS: Telgua, GT AS14754 rDNS: 45.253.56.190.static.intelnet.net.gt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CP0DAA3f4NOV6AghEa"]} -{"Format": "IDEA0", "ID": "27104ddc-7390-40d1-9516-94bb471dd192", "DetectTime": "2023-10-30T14:16:37.146920+02:00", "EventTime": "2023-10-30T14:16:37.146933+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.250.117.232"], "Hostname": ["c-98-250-117-232.hsd1.mi.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 98.250.117.232 from 10.0.2.19. blacklisted IP AS: COMCAST-7922, US AS7922 rDNS: c-98-250-117-232.hsd1.mi.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CncpjT2zLjamj7aHC"]} -{"Format": "IDEA0", "ID": "3fc7ea8f-8b88-4274-a776-ae91da4fd715", "DetectTime": "2023-10-30T14:16:40.474556+02:00", "EventTime": "2023-10-30T14:16:40.474567+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"], "Hostname": ["85.107.67.138.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 85.107.67.138 from 10.0.2.19. blacklisted IP AS: TTNET, TR AS9121 rDNS: 85.107.67.138.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CiLztw2EHSCIHmbhN6"]} -{"Format": "IDEA0", "ID": "100e69ec-2ba6-4fd2-92fc-8a5bdae67ade", "DetectTime": "2023-10-30T14:16:45.375495+02:00", "EventTime": "2023-10-30T14:16:45.375511+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"], "Hostname": ["host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 82.49.114.244 from 10.0.2.19. blacklisted IP AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["COOBvL356v4F7mkCu9"]} -{"Format": "IDEA0", "ID": "eba29a44-7de4-401a-84b7-443af0056bd2", "DetectTime": "2023-10-30T14:17:02.308451+02:00", "EventTime": "2023-10-30T14:17:02.308473+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"], "Hostname": ["h216.73.21.98.dynamic.ip.windstream.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 98.21.73.216 from 10.0.2.19. blacklisted IP AS: WINDSTREAM, US AS7029 rDNS: h216.73.21.98.dynamic.ip.windstream.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CkA16o2mzDDlWFql5j"]} -{"Format": "IDEA0", "ID": "7c6eb4dc-3fe8-4e12-8c44-f0c1dc146fbe", "DetectTime": "2023-10-30T14:17:05.440536+02:00", "EventTime": "2023-10-30T14:17:05.440548+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.186.228.111"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 58.186.228.111 from 10.0.2.19. blacklisted IP AS: FPT-AS-AP FPT Telecom Company, VN AS1840 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CZeOY527yEbtsnRZqa"]} -{"Format": "IDEA0", "ID": "27bce1af-5c93-409d-8bd0-78d7b729c0c0", "DetectTime": "2023-10-30T14:17:06.408784+02:00", "EventTime": "2023-10-30T14:17:06.408797+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.37.169"], "Hostname": ["mx-ll-110.164.37-169.static.3bb.co.th Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 110.164.37.169 from 10.0.2.19. blacklisted IP AS: JasTel Network International Gateway AS45629 rDNS: mx-ll-110.164.37-169.static.3bb.co.th Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CC4VdC1iNAwyV9GfOl"]} -{"Format": "IDEA0", "ID": "411d1df8-855c-4420-994c-8a360e1424c6", "DetectTime": "2023-10-30T14:17:09.551242+02:00", "EventTime": "2023-10-30T14:17:09.551253+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.90.81.197"], "Hostname": ["178.90.81.197.megaline.telecom.kz Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 178.90.81.197 from 10.0.2.19. blacklisted IP AS: KAZTELECOM-AS, KZ AS9198 rDNS: 178.90.81.197.megaline.telecom.kz Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CXO8hk3Mmkt9qrDJ7f"]} -{"Format": "IDEA0", "ID": "57cbdb5e-212f-4baa-abae-a1f9bc3c9d53", "DetectTime": "2023-10-30T14:17:11.338840+02:00", "EventTime": "2023-10-30T14:17:11.338856+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.107.44"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 180.244.107.44 from 10.0.2.19. blacklisted IP AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS771 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CDaRt74Cib7cnHViI3"]} -{"Format": "IDEA0", "ID": "ea61d84a-4b2d-41ab-94ab-828a517f77d3", "DetectTime": "2023-10-30T14:17:12.423285+02:00", "EventTime": "2023-10-30T14:17:12.423308+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"], "Hostname": ["node-1267.pool-118-173.dynamic.totinternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus."], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 118.173.193.63 from 10.0.2.19. blacklisted IP AS: TOT-NET TOT Public Company Limited, TH AS23969 rDNS: node-1267.pool-118-173.dynamic.totinternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["C9Z5rc150ubmbuxu73"]} -{"Format": "IDEA0", "ID": "0a129a35-ff36-4692-8aa5-7f69474cd423", "DetectTime": "2023-10-30T14:17:14.737497+02:00", "EventTime": "2023-10-30T14:17:14.737513+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 200.119.190.39 from 10.0.2.19. blacklisted IP AS: Telefonica de Costa Rica TC, SA, CR AS26220 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CbcSX52yM34VLdNi1g"]} -{"Format": "IDEA0", "ID": "8f437d59-9016-49a3-80ad-90bd3fd4fae9", "DetectTime": "2023-10-30T14:17:17.416314+02:00", "EventTime": "2023-10-30T14:17:17.416324+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 36.82.20.14 from 10.0.2.19. blacklisted IP AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS771 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CCPyIp4WkVmGI5o1Zi"]} -{"Format": "IDEA0", "ID": "b25638b9-51ec-4d81-b7d9-ffc83b434c64", "DetectTime": "2023-10-30T14:17:19.688538+02:00", "EventTime": "2023-10-30T14:17:19.688550+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.1.28.117"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 103.1.28.117 from 10.0.2.19. blacklisted IP AS: UNITEL-LA PO box T511 Phonexay road - Xaysettha district, LA AS13126 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CY9Qyvw6r5tlOvPl"]} -{"Format": "IDEA0", "ID": "497a8bd4-fdce-4a22-9acf-274a24202f32", "DetectTime": "2023-10-30T14:17:21.538822+02:00", "EventTime": "2023-10-30T14:17:21.538840+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.183.230.102"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 2.183.230.102 from 10.0.2.19. blacklisted IP AS: TCI, IR AS5822 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CJc9wg2e4ZXdRJTfF6"]} -{"Format": "IDEA0", "ID": "836561f9-0131-4c76-88cc-9b0167d2ab34", "DetectTime": "2023-10-30T14:17:23.685407+02:00", "EventTime": "2023-10-30T14:17:23.685423+02:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"], "Type": ["Spam"]}], "Attach": [{"Content": "connection to blacklisted IP 59.96.161.63 from 10.0.2.19. blacklisted IP AS: BSNL-NIB National Internet Backbone, IN AS982 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus.", "ContentType": "text/plain"}], "uids": ["CGu9cY20ierkI2SeN3"]} +{"Format": "IDEA0", "ID": "9e646c65-31ec-422d-8565-2de25b0ea26b", "DetectTime": "2024-05-21T12:24:02.751103+00:00", "EventTime": "2024-05-21T12:24:02.751130+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhb7D4TwlmDVoUft"], "accumulated_threat_level": 0.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "c2e2a96b-70ba-485e-962b-fc459312c0d1", "DetectTime": "2024-05-21T12:24:02.820521+00:00", "EventTime": "2024-05-21T12:24:02.820544+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRfxAS2MGWGmVsCEfl"], "accumulated_threat_level": 0.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "dbafd65e-131c-4f9f-a5d3-0dbd1bcd3074", "DetectTime": "2024-05-21T12:24:03.001061+00:00", "EventTime": "2024-05-21T12:24:03.001080+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcLqA1DX080oRfIvd"], "accumulated_threat_level": 0.6000000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "56b606fa-0f8e-4f5e-a268-b11b0d961905", "DetectTime": "2024-05-21T12:24:03.159646+00:00", "EventTime": "2024-05-21T12:24:03.159663+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CccB7M3VzOqBhganJ8"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "ec2728c0-2bb0-4fbd-a578-611b08417587", "DetectTime": "2024-05-21T12:24:03.345006+00:00", "EventTime": "2024-05-21T12:24:03.345026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7sY7W3FKEMCSojg93"], "accumulated_threat_level": 1.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "e479523a-4b59-43ce-909c-c8559d639186", "DetectTime": "2024-05-21T12:24:03.525461+00:00", "EventTime": "2024-05-21T12:24:03.525482+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUTtit32YDT3VSQCn9"], "accumulated_threat_level": 1.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "064088ff-f316-484e-8c8b-17e7e875b13c", "DetectTime": "2024-05-21T12:24:03.702822+00:00", "EventTime": "2024-05-21T12:24:03.702845+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbC5hN1Iwez6Ba0Neh"], "accumulated_threat_level": 1.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "5c6a8e12-5482-4b3e-83de-12e2f5b65583", "DetectTime": "2024-05-21T12:24:03.878565+00:00", "EventTime": "2024-05-21T12:24:03.878587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXbrVAK2nWr4I7j8e"], "accumulated_threat_level": 1.5999999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "c73fc19d-014d-4656-a5fa-c29bea50d951", "DetectTime": "2024-05-21T12:24:04.048825+00:00", "EventTime": "2024-05-21T12:24:04.048844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hsYp6EZ5M4Muwdd"], "accumulated_threat_level": 1.7999999999999998, "timewindow": 1} +{"Format": "IDEA0", "ID": "4fffd8ec-04f1-4470-b46f-a911adbad1ee", "DetectTime": "2024-05-21T12:24:04.222384+00:00", "EventTime": "2024-05-21T12:24:04.222401+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmwj3S2IBKVA27cf3g"], "accumulated_threat_level": 1.9999999999999998, "timewindow": 1} +{"Format": "IDEA0", "ID": "5c900720-0f34-4872-9c0b-7b45cbb2415c", "DetectTime": "2024-05-21T12:24:04.370921+00:00", "EventTime": "2024-05-21T12:24:04.370943+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["69.65.34.100"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 69.65.34.100. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMgiy4S5IZqLuWcrf"], "accumulated_threat_level": 2.1999999999999997, "timewindow": 1} +{"Format": "IDEA0", "ID": "57554566-81c8-4e8e-87fd-f4c89136ff12", "DetectTime": "2024-05-21T12:24:04.520661+00:00", "EventTime": "2024-05-21T12:24:04.520680+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["64.94.100.116"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 64.94.100.116. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQNFq41lwoqGMp6qd"], "accumulated_threat_level": 2.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "c9405697-4d73-4bfb-aaae-ce9967e1aeab", "DetectTime": "2024-05-21T12:24:04.710819+00:00", "EventTime": "2024-05-21T12:24:04.710841+00:00", "Category": ["Anomaly.File"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["ExecutableMIMEType"]}], "Attach": [{"Content": "Download of an executable with MIME type: ['application/x-dosexec'] by 10.0.2.19 from 81.169.145.69 . threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRERH2TQb9D43GP7j"], "accumulated_threat_level": 2.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "be0b0380-2690-43b7-b052-9d957a7e5b83", "DetectTime": "2024-05-21T12:24:04.721538+00:00", "EventTime": "2024-05-21T12:24:04.721556+00:00", "Category": ["Anomaly.File"], "Confidence": 1, "Source": [{"IP4": ["81.169.145.69"], "Type": ["ExecutableMIMEType"]}], "Attach": [{"Content": "Download of an executable with MIME type: ['application/x-dosexec'] by 10.0.2.19 from 81.169.145.69 . threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRERH2TQb9D43GP7j"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "28737dc6-0ebe-4030-aacc-c98ffc757de9", "DetectTime": "2024-05-21T12:24:04.731958+00:00", "EventTime": "2024-05-21T12:24:04.731975+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["81.169.145.69"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 81.169.145.69. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRERH2TQb9D43GP7j"], "accumulated_threat_level": 2.8000000000000003, "timewindow": 1} +{"Format": "IDEA0", "ID": "19eb1039-c766-4830-bae8-09d9649f5648", "DetectTime": "2024-05-21T12:24:04.886020+00:00", "EventTime": "2024-05-21T12:24:04.886041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["194.8.30.40"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 194.8.30.40. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jeKs4E33ScbybKo6"], "accumulated_threat_level": 3.0000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "9817dc2a-ac29-4f14-843e-77719822680c", "DetectTime": "2024-05-21T12:24:05.046689+00:00", "EventTime": "2024-05-21T12:24:05.046712+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["46.4.94.138"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 46.4.94.138. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpYc01MJmMEIro8ac"], "accumulated_threat_level": 3.2000000000000006, "timewindow": 1} +{"Format": "IDEA0", "ID": "30774029-8af5-4e26-9b30-0c56a01f1352", "DetectTime": "2024-05-21T12:24:05.209130+00:00", "EventTime": "2024-05-21T12:24:05.209150+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["176.9.66.5"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 176.9.66.5. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnz5ms25H1qvSON1a6"], "accumulated_threat_level": 3.400000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "4c09d31a-b4db-47d1-bab6-a5814d1fa97d", "DetectTime": "2024-05-21T12:24:05.495223+00:00", "EventTime": "2024-05-21T12:24:05.495240+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["109.234.161.32"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 109.234.161.32. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJpmM4Edx9B8TfRd"], "accumulated_threat_level": 3.600000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "2b13e972-6078-44cd-974d-d871cb279d84", "DetectTime": "2024-05-21T12:24:05.938938+00:00", "EventTime": "2024-05-21T12:24:05.938956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyrx9ZrU3mZqI1Q86"], "accumulated_threat_level": 4.400000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "31196a42-47cf-412d-943f-8affeffa2737", "DetectTime": "2024-05-21T12:24:05.967572+00:00", "EventTime": "2024-05-21T12:24:05.967590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CannfVTrtiieAXw7"], "accumulated_threat_level": 5.200000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "c8c54007-6c9b-4056-a71f-1cc1548c86a5", "DetectTime": "2024-05-21T12:24:06.104133+00:00", "EventTime": "2024-05-21T12:24:06.104152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMWmfI1NWQ4FK8Ekaj"], "accumulated_threat_level": 6.000000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "ebf53cd4-ed26-4db4-b007-767bf9490190", "DetectTime": "2024-05-21T12:24:06.132136+00:00", "EventTime": "2024-05-21T12:24:06.132156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOtJU2xODoSojvUCh"], "accumulated_threat_level": 6.800000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "15e80374-eb2e-4782-b458-e1ebde5defcd", "DetectTime": "2024-05-21T12:24:06.161104+00:00", "EventTime": "2024-05-21T12:24:06.161125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4Hq43cGsUWL9oIDl"], "accumulated_threat_level": 7.6000000000000005, "timewindow": 1} +{"Format": "IDEA0", "ID": "02d86575-51ca-4aa9-894e-4387c3753d8c", "DetectTime": "2024-05-21T12:24:06.171575+00:00", "EventTime": "2024-05-21T12:24:06.171596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbkWTS23V6uxrIA1Ug"], "accumulated_threat_level": 8.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "bdc75a98-df3b-4edd-9797-d2d5b2749e29", "DetectTime": "2024-05-21T12:24:06.217673+00:00", "EventTime": "2024-05-21T12:24:06.217693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TI2aALRIhLSexqi"], "accumulated_threat_level": 9.200000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "a902eb4c-360d-4b03-9b4e-490e6419725d", "DetectTime": "2024-05-21T12:24:06.239324+00:00", "EventTime": "2024-05-21T12:24:06.239345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGnAbL30jEosqlgSma"], "accumulated_threat_level": 10.000000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "18e30ac7-d7db-4e38-9a6d-9206c064a928", "DetectTime": "2024-05-21T12:24:06.275310+00:00", "EventTime": "2024-05-21T12:24:06.275329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMdWH3XYiO6ABKJt3"], "accumulated_threat_level": 10.800000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "665d85e9-52bb-484c-b252-728ba3f06a92", "DetectTime": "2024-05-21T12:24:06.307852+00:00", "EventTime": "2024-05-21T12:24:06.307873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKg4L040JJa6NAZnN2"], "accumulated_threat_level": 11.600000000000003, "timewindow": 1} +{"Format": "IDEA0", "ID": "faa92704-a4ba-452f-8bbc-49082ef508ae", "DetectTime": "2024-05-21T12:24:06.338772+00:00", "EventTime": "2024-05-21T12:24:06.338793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7Y0g3GlKZXCICGyi"], "accumulated_threat_level": 12.400000000000004, "timewindow": 1} +{"Format": "Json", "ID": "faa92704-a4ba-452f-8bbc-49082ef508ae", "DetectTime": "2024-05-21T12:24:06.338772+00:00", "EventTime": "2024-05-21T12:24:06.338793+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "1970-01-01T00:03:59.951969+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:06.692423)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000004, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000004} +{"Format": "IDEA0", "ID": "03e81b57-78e0-4dff-a5b6-7607d6ddaa04", "DetectTime": "2024-05-21T12:24:06.705839+00:00", "EventTime": "2024-05-21T12:24:06.705859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyVjE3aV3szZ12MDj"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "9b4c03a4-2284-406f-af8a-45afcc6f7b50", "DetectTime": "2024-05-21T12:24:06.731103+00:00", "EventTime": "2024-05-21T12:24:06.731124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"]}], "Attach": [{"Content": "Connection to unknown destination port 20246/UDP destination IP 178.223.239.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C284oK3DfhD58nYBoj"], "accumulated_threat_level": 1.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "3c79e8ed-dbf9-49b9-b826-d22efbfc9bb0", "DetectTime": "2024-05-21T12:24:06.762255+00:00", "EventTime": "2024-05-21T12:24:06.762274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHE3S2HO3kuu94p6i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "93a85ccc-01e8-409b-83a5-eb1a5815db36", "DetectTime": "2024-05-21T12:24:06.779810+00:00", "EventTime": "2024-05-21T12:24:06.779829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcSZ04G06GztbW54"], "accumulated_threat_level": 3.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "5597320d-cafe-4334-bc4a-a72ee07c88b5", "DetectTime": "2024-05-21T12:24:06.807916+00:00", "EventTime": "2024-05-21T12:24:06.807936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHaGdr4D9fF5Ckqd6h"], "accumulated_threat_level": 4.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b7ff37e2-bb25-4ebf-a9fe-28f71c984afd", "DetectTime": "2024-05-21T12:24:06.834438+00:00", "EventTime": "2024-05-21T12:24:06.834457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGflcY18S9DeEdU6d5"], "accumulated_threat_level": 4.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "99b5a329-6f2f-41e2-8b52-847d19430012", "DetectTime": "2024-05-21T12:24:07.078627+00:00", "EventTime": "2024-05-21T12:24:07.078646+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["10.0.2.255"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.255 on destination port: 137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWyf3O2gOmQqfvm9Ok"], "accumulated_threat_level": 4.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "d86ff5b5-aa40-41a9-aecb-13660428cc15", "DetectTime": "2024-05-21T12:24:07.198253+00:00", "EventTime": "2024-05-21T12:24:07.198279+00:00", "Category": ["Malware"], "Confidence": 0.5, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Type": ["Malware"], "Hash": ["md5:10.0.2.19"]}], "ConnCount": 1, "Size": 549, "uids": ["YzUyNWJmZTU2Y2VhNDQ1NTNj"], "accumulated_threat_level": 5.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "3b533624-fa64-4e77-bab7-40657c97f240", "DetectTime": "2024-05-21T12:24:07.210671+00:00", "EventTime": "2024-05-21T12:24:07.210692+00:00", "Category": ["Malware"], "Confidence": 0.5, "Source": [{"IP4": ["176.9.66.5"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Type": ["Malware"], "Hash": ["md5:176.9.66.5"]}], "ConnCount": 1, "Size": 549, "uids": ["YzUyNWJmZTU2Y2VhNDQ1NTNj"], "accumulated_threat_level": 5.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "e4471304-5956-4ecf-b180-4751181fec9e", "DetectTime": "2024-05-21T12:24:07.299038+00:00", "EventTime": "2024-05-21T12:24:07.299059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcVqd4k82789S4iYd"], "accumulated_threat_level": 6.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "dc9c9587-3259-468f-8fe4-290fd28f94b0", "DetectTime": "2024-05-21T12:24:07.501216+00:00", "EventTime": "2024-05-21T12:24:07.501237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBlQC1WSbivNpPjmc"], "accumulated_threat_level": 6.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "56e7a46b-8fd0-426a-a107-4c3d3b12a11b", "DetectTime": "2024-05-21T12:24:07.605396+00:00", "EventTime": "2024-05-21T12:24:07.605428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "Connection to unknown destination port 11925/UDP destination IP 79.154.42.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbWIZbfzBXbsFxgk"], "accumulated_threat_level": 7.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "7f8f3b49-4e5e-4f58-a1bc-2e8c6d363cc6", "DetectTime": "2024-05-21T12:24:07.643768+00:00", "EventTime": "2024-05-21T12:24:07.643788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzFY4gghuADcYCg1"], "accumulated_threat_level": 8.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "fcfbb2d4-e889-4a87-b6a7-1699cc7011e2", "DetectTime": "2024-05-21T12:24:07.671952+00:00", "EventTime": "2024-05-21T12:24:07.671972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sBXeWchkNk40ZQj"], "accumulated_threat_level": 9.200000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "bb2ea4eb-23b4-4636-a1c3-961878f0bbe5", "DetectTime": "2024-05-21T12:24:07.732366+00:00", "EventTime": "2024-05-21T12:24:07.732390+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 protocol: ICMP threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJqPWBk60zsYq3X2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1e7b6387-93a3-42ea-b125-2f522f037b14", "DetectTime": "2024-05-21T12:24:07.836695+00:00", "EventTime": "2024-05-21T12:24:07.836716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgTEYP1Rv4ln9gcxhl"], "accumulated_threat_level": 10.000000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "85b802fd-b6fc-495c-993d-0403506dee33", "DetectTime": "2024-05-21T12:24:07.880416+00:00", "EventTime": "2024-05-21T12:24:07.880434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"]}], "Attach": [{"Content": "Connection to unknown destination port 20807/UDP destination IP 41.96.126.57. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4yMx2piZau7zJMwc"], "accumulated_threat_level": 10.800000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "250772ef-1e74-446e-8a68-99b02a715158", "DetectTime": "2024-05-21T12:24:07.959270+00:00", "EventTime": "2024-05-21T12:24:07.959288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"]}], "Attach": [{"Content": "Connection to unknown destination port 13639/UDP destination IP 188.169.52.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGSqQsPwV31Bkrqcc"], "accumulated_threat_level": 11.600000000000003, "timewindow": 1} +{"Format": "IDEA0", "ID": "411decae-a30f-4de3-8ff9-4fb87469c370", "DetectTime": "2024-05-21T12:24:08.117465+00:00", "EventTime": "2024-05-21T12:24:08.117486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 9545/TCP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanDrc497fSdpg55i8"], "accumulated_threat_level": 12.400000000000004, "timewindow": 1} +{"Format": "Json", "ID": "411decae-a30f-4de3-8ff9-4fb87469c370", "DetectTime": "2024-05-21T12:24:08.117465+00:00", "EventTime": "2024-05-21T12:24:08.117486+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "1970-01-01T00:06:18.829521+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:08.291292)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000004, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000004} +{"Format": "IDEA0", "ID": "668fa8ab-00f4-47df-8309-a05f84131210", "DetectTime": "2024-05-21T12:24:08.352958+00:00", "EventTime": "2024-05-21T12:24:08.352978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7227/TCP destination IP 217.132.237.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbhpF4OfSXJeGah3d"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "eb63e4d3-d4cc-44c3-a7ba-345958d30fa9", "DetectTime": "2024-05-21T12:24:08.391616+00:00", "EventTime": "2024-05-21T12:24:08.391634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COaIF1482eMUuV379f"], "accumulated_threat_level": 1.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "013a0db5-bdc5-45cb-ba17-bd84416a186c", "DetectTime": "2024-05-21T12:24:08.466874+00:00", "EventTime": "2024-05-21T12:24:08.466893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvpi0i46uoRunt0lD8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "0ecdf0fa-03ef-4a8e-a466-1793ee68d1a1", "DetectTime": "2024-05-21T12:24:08.602805+00:00", "EventTime": "2024-05-21T12:24:08.602825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7Ok82b0mIzRjDDj7"], "accumulated_threat_level": 3.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "8dd58d58-e1ce-48d7-95f4-7adc8698edef", "DetectTime": "2024-05-21T12:24:08.657579+00:00", "EventTime": "2024-05-21T12:24:08.657598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCT7uf2XhQMWalDGZj"], "accumulated_threat_level": 4.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "d015e3dd-cda1-4403-9771-5f9a988881d8", "DetectTime": "2024-05-21T12:24:08.687241+00:00", "EventTime": "2024-05-21T12:24:08.687262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfxjWp6XramD0QZdd"], "accumulated_threat_level": 4.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "50c5b6c0-8f69-4fd0-8b88-fa7148982820", "DetectTime": "2024-05-21T12:24:08.704673+00:00", "EventTime": "2024-05-21T12:24:08.704693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQx1h4YFxaTpJfcA2"], "accumulated_threat_level": 5.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "00698064-0fb6-4732-96d1-a946acbab6b9", "DetectTime": "2024-05-21T12:24:08.732589+00:00", "EventTime": "2024-05-21T12:24:08.732644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctk2Z133nertT6Ewck"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "94d19f72-40e3-4f9d-8fd0-1cec10481150", "DetectTime": "2024-05-21T12:24:09.185690+00:00", "EventTime": "2024-05-21T12:24:09.185709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.57.220"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.220 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pE343OhPM5AuE2S"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "39e26a02-d77a-4281-b898-a0379cfe0c21", "DetectTime": "2024-05-21T12:24:09.198732+00:00", "EventTime": "2024-05-21T12:24:09.198754+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.57.220"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.220 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pE343OhPM5AuE2S"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "2a08bd10-8bb6-4698-8163-ad0d779ac937", "DetectTime": "2024-05-21T12:24:09.248353+00:00", "EventTime": "2024-05-21T12:24:09.248375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybpXJgQUkJPIqcKe"], "accumulated_threat_level": 7.699999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "57d96a70-07e3-4290-b142-7ecbc130a331", "DetectTime": "2024-05-21T12:24:09.268178+00:00", "EventTime": "2024-05-21T12:24:09.268201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYITxuXxGBqYBD7k"], "accumulated_threat_level": 8.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d7763b0a-ed70-41b0-ab96-0f5cc29631b8", "DetectTime": "2024-05-21T12:24:09.307396+00:00", "EventTime": "2024-05-21T12:24:09.307416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQ4acLZbU3vmPgb4"], "accumulated_threat_level": 9.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "4b4ea24a-6ef4-49b8-9ec6-83ac6217ea2a", "DetectTime": "2024-05-21T12:24:09.450135+00:00", "EventTime": "2024-05-21T12:24:09.450157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWODCT3oE8BAqqXLuf"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b53cc963-a604-465b-86c4-5fa78227648b", "DetectTime": "2024-05-21T12:24:09.462022+00:00", "EventTime": "2024-05-21T12:24:09.462041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWODCT3oE8BAqqXLuf"], "accumulated_threat_level": 9.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "3c970749-7ced-49ca-ac96-a8a4a63b9be9", "DetectTime": "2024-05-21T12:24:09.473789+00:00", "EventTime": "2024-05-21T12:24:09.473807+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyrx9ZrU3mZqI1Q86"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "30c11502-ef98-4c0d-9e7c-d9ee14d2c62b", "DetectTime": "2024-05-21T12:24:09.486072+00:00", "EventTime": "2024-05-21T12:24:09.486090+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyrx9ZrU3mZqI1Q86"], "accumulated_threat_level": 10.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "ea53c7d2-eb90-46d9-b014-96accb92c4f9", "DetectTime": "2024-05-21T12:24:09.542334+00:00", "EventTime": "2024-05-21T12:24:09.542353+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMWmfI1NWQ4FK8Ekaj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "8e4f7ece-50be-4075-bf40-c8da020716e0", "DetectTime": "2024-05-21T12:24:09.558142+00:00", "EventTime": "2024-05-21T12:24:09.558160+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMWmfI1NWQ4FK8Ekaj"], "accumulated_threat_level": 10.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "a6d5fcd5-92ef-43d4-8702-54b95be84dce", "DetectTime": "2024-05-21T12:24:09.613460+00:00", "EventTime": "2024-05-21T12:24:09.613478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQZGh45VTrQ1detXi"], "accumulated_threat_level": 11.600000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "1af9fe2a-68a6-420a-94a1-303634bafe95", "DetectTime": "2024-05-21T12:24:09.637428+00:00", "EventTime": "2024-05-21T12:24:09.637447+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbkWTS23V6uxrIA1Ug"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1e8e5b18-7dcd-49d7-8cac-d8ba65081c35", "DetectTime": "2024-05-21T12:24:09.649292+00:00", "EventTime": "2024-05-21T12:24:09.649312+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbkWTS23V6uxrIA1Ug"], "accumulated_threat_level": 12.100000000000001, "timewindow": 1} +{"Format": "Json", "ID": "1e8e5b18-7dcd-49d7-8cac-d8ba65081c35", "DetectTime": "2024-05-21T12:24:09.649292+00:00", "EventTime": "2024-05-21T12:24:09.649312+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "1970-01-01T00:03:54.443832+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:09.846344)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "4b9a0e35-8e08-4567-9b38-669ef0463fc1", "DetectTime": "2024-05-21T12:24:09.857459+00:00", "EventTime": "2024-05-21T12:24:09.857477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TI2aALRIhLSexqi"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "eb97bf5a-47f5-4215-8068-913930295681", "DetectTime": "2024-05-21T12:24:09.870345+00:00", "EventTime": "2024-05-21T12:24:09.870363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TI2aALRIhLSexqi"], "accumulated_threat_level": 0.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ad37fde7-2797-4717-ad00-5cc215ff8c19", "DetectTime": "2024-05-21T12:24:09.882059+00:00", "EventTime": "2024-05-21T12:24:09.882079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeo263iBzIuaySJOd"], "accumulated_threat_level": 1.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "7fec35ff-ca02-40a8-b54c-5f3d1b701310", "DetectTime": "2024-05-21T12:24:09.893289+00:00", "EventTime": "2024-05-21T12:24:09.893307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMdWH3XYiO6ABKJt3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "cf974142-8e22-469d-ac09-45357b41dc7e", "DetectTime": "2024-05-21T12:24:09.906552+00:00", "EventTime": "2024-05-21T12:24:09.906575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMdWH3XYiO6ABKJt3"], "accumulated_threat_level": 1.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "abff37c1-efc6-458f-8bb6-8e508ed69241", "DetectTime": "2024-05-21T12:24:09.919199+00:00", "EventTime": "2024-05-21T12:24:09.919219+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.194.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7Y0g3GlKZXCICGyi"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "59e0f653-8148-44e1-b8db-f0925a48e948", "DetectTime": "2024-05-21T12:24:09.932323+00:00", "EventTime": "2024-05-21T12:24:09.932342+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7Y0g3GlKZXCICGyi"], "accumulated_threat_level": 2.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "f74aa5e6-1bdd-4cd0-b773-00a706ec849f", "DetectTime": "2024-05-21T12:24:09.949577+00:00", "EventTime": "2024-05-21T12:24:09.949595+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.223.239.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C284oK3DfhD58nYBoj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1bfcb502-f835-404c-b436-24aedebec617", "DetectTime": "2024-05-21T12:24:09.962186+00:00", "EventTime": "2024-05-21T12:24:09.962203+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.223.239.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C284oK3DfhD58nYBoj"], "accumulated_threat_level": 2.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "185aca8c-8224-4a47-ad8a-3f454b2fb709", "DetectTime": "2024-05-21T12:24:09.974157+00:00", "EventTime": "2024-05-21T12:24:09.974177+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcSZ04G06GztbW54"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1472904f-5b9d-45d8-98b8-c18cc0cd96ea", "DetectTime": "2024-05-21T12:24:09.992476+00:00", "EventTime": "2024-05-21T12:24:09.992495+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcSZ04G06GztbW54"], "accumulated_threat_level": 3.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "a378025f-ffa9-4433-9f51-67f57dfc30e4", "DetectTime": "2024-05-21T12:24:10.005444+00:00", "EventTime": "2024-05-21T12:24:10.005464+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHaGdr4D9fF5Ckqd6h"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "8e00bf18-8e8c-4799-9c92-80641baee635", "DetectTime": "2024-05-21T12:24:10.018239+00:00", "EventTime": "2024-05-21T12:24:10.018259+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHaGdr4D9fF5Ckqd6h"], "accumulated_threat_level": 3.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "90cc7276-5241-4246-b960-9c4b28767dbb", "DetectTime": "2024-05-21T12:24:10.032433+00:00", "EventTime": "2024-05-21T12:24:10.032453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWOTtSxFPO7Suf3B3"], "accumulated_threat_level": 4.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "61e98829-93ce-4cbb-b1a6-c480e2cf6316", "DetectTime": "2024-05-21T12:24:10.073385+00:00", "EventTime": "2024-05-21T12:24:10.073404+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGflcY18S9DeEdU6d5"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "7c886dbb-d5af-4f6a-8d70-9cc8d4f42cf1", "DetectTime": "2024-05-21T12:24:10.083910+00:00", "EventTime": "2024-05-21T12:24:10.083928+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGflcY18S9DeEdU6d5"], "accumulated_threat_level": 5.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "0eac8628-6101-428a-b4fe-9c45f1e1e54e", "DetectTime": "2024-05-21T12:24:10.214180+00:00", "EventTime": "2024-05-21T12:24:10.214201+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.122.62.185"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.122.62.185 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSI4m4De7S3DiSqM"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "6c273066-9460-4f24-98f0-d3f13c3bac8c", "DetectTime": "2024-05-21T12:24:10.225669+00:00", "EventTime": "2024-05-21T12:24:10.225689+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.122.62.185"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.122.62.185 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSI4m4De7S3DiSqM"], "accumulated_threat_level": 5.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "f1c30021-2733-484c-a431-113ea0244532", "DetectTime": "2024-05-21T12:24:10.238341+00:00", "EventTime": "2024-05-21T12:24:10.238362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDg8v4k3upJFOAob5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "5ead8b91-3eaf-4bc5-b85c-d3e7b8a287ba", "DetectTime": "2024-05-21T12:24:10.279215+00:00", "EventTime": "2024-05-21T12:24:10.279233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.9.200"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.9.200 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhxn34LtzF6qZr3H8"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c3ef79bc-5923-4fe6-a976-017909dc85c4", "DetectTime": "2024-05-21T12:24:10.290543+00:00", "EventTime": "2024-05-21T12:24:10.290571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKc1g2ENFXInYVifb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "8f9860d0-232e-4913-815d-032844adefc6", "DetectTime": "2024-05-21T12:24:10.303268+00:00", "EventTime": "2024-05-21T12:24:10.303298+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.9.200"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.9.200 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhxn34LtzF6qZr3H8"], "accumulated_threat_level": 7.699999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "67c3ccb5-d5bc-4b35-a545-c7b4883ea588", "DetectTime": "2024-05-21T12:24:10.316018+00:00", "EventTime": "2024-05-21T12:24:10.316035+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.154.42.157"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbWIZbfzBXbsFxgk"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9f5ac882-1d0a-4d4f-b901-5691d1ebd08f", "DetectTime": "2024-05-21T12:24:10.328031+00:00", "EventTime": "2024-05-21T12:24:10.328050+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbWIZbfzBXbsFxgk"], "accumulated_threat_level": 8.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "2633e42f-b96d-424f-944e-d0cd88eae075", "DetectTime": "2024-05-21T12:24:10.339074+00:00", "EventTime": "2024-05-21T12:24:10.339093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.154.42.157"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHo0m3eyf9npmn7vg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "abd2a0bd-4d98-44c7-9a24-1c2f29267487", "DetectTime": "2024-05-21T12:24:10.351515+00:00", "EventTime": "2024-05-21T12:24:10.351533+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHo0m3eyf9npmn7vg"], "accumulated_threat_level": 8.7, "timewindow": 1} +{"Format": "IDEA0", "ID": "d88465e5-064e-4d29-b999-e77e690fc295", "DetectTime": "2024-05-21T12:24:10.369856+00:00", "EventTime": "2024-05-21T12:24:10.369873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"]}], "Attach": [{"Content": "Connection to unknown destination port 10008/UDP destination IP 62.98.95.219. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CzSlrkchPSxf0V"], "accumulated_threat_level": 9.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "bb1714f5-7d2f-4ee0-88d8-f1b833280a65", "DetectTime": "2024-05-21T12:24:10.379916+00:00", "EventTime": "2024-05-21T12:24:10.379934+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sBXeWchkNk40ZQj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "d74efcc6-c519-4fb6-8aab-9746b056c691", "DetectTime": "2024-05-21T12:24:10.392290+00:00", "EventTime": "2024-05-21T12:24:10.392308+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sBXeWchkNk40ZQj"], "accumulated_threat_level": 10.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ba8ee7a7-6cff-4d15-8f1a-a0e7036a5fc9", "DetectTime": "2024-05-21T12:24:10.437758+00:00", "EventTime": "2024-05-21T12:24:10.437780+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.94.67.10"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.94.67.10 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLptD1oH4bsPJQkxl"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "88cdee2c-c048-44a0-aa5a-e9102d2bf68c", "DetectTime": "2024-05-21T12:24:10.450290+00:00", "EventTime": "2024-05-21T12:24:10.450309+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.94.67.10"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.94.67.10 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLptD1oH4bsPJQkxl"], "accumulated_threat_level": 10.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "32be4552-7487-4492-94e5-1a4d4fc18d34", "DetectTime": "2024-05-21T12:24:10.485240+00:00", "EventTime": "2024-05-21T12:24:10.485258+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.165.6.146"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.165.6.146 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj97Lq4cu0hFIBeh0l"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "a5c5446a-8a4d-4855-8835-e8f3162bbe85", "DetectTime": "2024-05-21T12:24:10.495734+00:00", "EventTime": "2024-05-21T12:24:10.495752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.165.6.146"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.165.6.146 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj97Lq4cu0hFIBeh0l"], "accumulated_threat_level": 11.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b064a6ac-32f0-44f6-a899-4b1a3a9b21f2", "DetectTime": "2024-05-21T12:24:10.522182+00:00", "EventTime": "2024-05-21T12:24:10.522202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgTEYP1Rv4ln9gcxhl"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "f9dc0dc8-f294-4154-8983-60d4855f3176", "DetectTime": "2024-05-21T12:24:10.534177+00:00", "EventTime": "2024-05-21T12:24:10.534195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgTEYP1Rv4ln9gcxhl"], "accumulated_threat_level": 11.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c8e7dc6f-6ef2-4634-9df6-8eff0f3147ed", "DetectTime": "2024-05-21T12:24:10.545392+00:00", "EventTime": "2024-05-21T12:24:10.545410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavQlT2oKK1dVMfZRg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ac4bf475-cd1f-4005-b6fd-78c7b95d9273", "DetectTime": "2024-05-21T12:24:10.557766+00:00", "EventTime": "2024-05-21T12:24:10.557787+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavQlT2oKK1dVMfZRg"], "accumulated_threat_level": 12.0, "timewindow": 1} +{"Format": "Json", "ID": "ac4bf475-cd1f-4005-b6fd-78c7b95d9273", "DetectTime": "2024-05-21T12:24:10.557766+00:00", "EventTime": "2024-05-21T12:24:10.557787+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "1970-01-01T00:04:59.530300+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:10.766356)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "409ab571-f003-4fcf-a119-ed11bf491a18", "DetectTime": "2024-05-21T12:24:10.776581+00:00", "EventTime": "2024-05-21T12:24:10.776599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.96.126.57"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4yMx2piZau7zJMwc"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "389e8634-73c8-4851-a7e2-e14911b0fcd1", "DetectTime": "2024-05-21T12:24:10.787501+00:00", "EventTime": "2024-05-21T12:24:10.787519+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.96.126.57"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4yMx2piZau7zJMwc"], "accumulated_threat_level": 0.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "187dfb2d-58a0-4523-99ee-a714919d87b4", "DetectTime": "2024-05-21T12:24:10.797918+00:00", "EventTime": "2024-05-21T12:24:10.797935+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.106.248.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.106.248.231 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS98QO2Fw6u5v12bXg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4fe0fc7c-9e9a-4dd0-8c66-ff0de39e36d4", "DetectTime": "2024-05-21T12:24:10.814263+00:00", "EventTime": "2024-05-21T12:24:10.814294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"]}], "Attach": [{"Content": "Connection to unknown destination port 11230/UDP destination IP 181.65.3.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjfhFU2pDfDLoa9Iy4"], "accumulated_threat_level": 1.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "a74b210d-e417-4fe2-982a-2f7e84e2be13", "DetectTime": "2024-05-21T12:24:10.829815+00:00", "EventTime": "2024-05-21T12:24:10.829835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.106.248.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.106.248.231 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS98QO2Fw6u5v12bXg"], "accumulated_threat_level": 1.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "6037901a-cdc0-48e8-8ddc-f3bb10d26088", "DetectTime": "2024-05-21T12:24:10.841903+00:00", "EventTime": "2024-05-21T12:24:10.841924+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.52.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGSqQsPwV31Bkrqcc"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "6f56207e-dba8-4fe8-9170-3e533808bfa8", "DetectTime": "2024-05-21T12:24:10.853321+00:00", "EventTime": "2024-05-21T12:24:10.853343+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.52.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGSqQsPwV31Bkrqcc"], "accumulated_threat_level": 2.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "399a95b6-aa2d-4a11-8e36-ef5295190cee", "DetectTime": "2024-05-21T12:24:10.865319+00:00", "EventTime": "2024-05-21T12:24:10.865339+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.232.130"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUJ0X1pGrnDirPOSc"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "7f788a02-2d83-4c61-bcbe-351aaedd87da", "DetectTime": "2024-05-21T12:24:10.879653+00:00", "EventTime": "2024-05-21T12:24:10.879675+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.232.130"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUJ0X1pGrnDirPOSc"], "accumulated_threat_level": 2.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "38542346-737c-4221-8c77-c8c39fab9c25", "DetectTime": "2024-05-21T12:24:10.899051+00:00", "EventTime": "2024-05-21T12:24:10.899072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.233.22.243"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.233.22.243 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgIM92tNeW10jf8m2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "bc178239-3ac9-4c07-a91a-5617b82e0a1e", "DetectTime": "2024-05-21T12:24:10.911633+00:00", "EventTime": "2024-05-21T12:24:10.911653+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.233.22.243"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.233.22.243 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgIM92tNeW10jf8m2"], "accumulated_threat_level": 3.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "038cfe67-e2d7-4551-b13e-056c9970d83a", "DetectTime": "2024-05-21T12:24:10.924792+00:00", "EventTime": "2024-05-21T12:24:10.924811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.42.211.201"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.42.211.201 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a7hb30XweWMhJ8wf"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "3b184005-86cb-43ee-afc6-2d3392ed2dbe", "DetectTime": "2024-05-21T12:24:10.936768+00:00", "EventTime": "2024-05-21T12:24:10.936785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.42.211.201"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.42.211.201 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a7hb30XweWMhJ8wf"], "accumulated_threat_level": 3.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "28f6b1e0-0a98-4bb6-874a-0710f45fe36c", "DetectTime": "2024-05-21T12:24:10.952627+00:00", "EventTime": "2024-05-21T12:24:10.952646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.92.1.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9532/UDP destination IP 108.92.1.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWU4sl2wwZ5P1uNUYg"], "accumulated_threat_level": 4.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "f769efca-060d-4525-80a4-f03406a94bfa", "DetectTime": "2024-05-21T12:24:10.965438+00:00", "EventTime": "2024-05-21T12:24:10.965456+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbhpF4OfSXJeGah3d"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ae094f68-2a2c-4e87-8bae-1112d8b00115", "DetectTime": "2024-05-21T12:24:10.976969+00:00", "EventTime": "2024-05-21T12:24:10.976988+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbhpF4OfSXJeGah3d"], "accumulated_threat_level": 5.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "18d7ed51-91ff-4859-b61f-4a4d28d08bd0", "DetectTime": "2024-05-21T12:24:10.987381+00:00", "EventTime": "2024-05-21T12:24:10.987400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBKhB49PFT8I5Fpyj"], "accumulated_threat_level": 5.8999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "5784ab9d-42d0-4a28-b2ab-d517add230f8", "DetectTime": "2024-05-21T12:24:10.999454+00:00", "EventTime": "2024-05-21T12:24:10.999473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkE04O3Bdqll2Ws8Fb"], "accumulated_threat_level": 6.699999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "18589ee1-334a-4d60-a82a-e5a6086cc61d", "DetectTime": "2024-05-21T12:24:11.011337+00:00", "EventTime": "2024-05-21T12:24:11.011357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXR9P2me5MzNf9DXa"], "accumulated_threat_level": 7.499999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "3b81b62e-b153-473c-9a20-f67ded859313", "DetectTime": "2024-05-21T12:24:11.021796+00:00", "EventTime": "2024-05-21T12:24:11.021812+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.19.92.194"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.19.92.194 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COybwt37XdiVNeMnZ7"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4e1285cf-159d-4182-8142-c699958c1cf2", "DetectTime": "2024-05-21T12:24:11.033717+00:00", "EventTime": "2024-05-21T12:24:11.033739+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.19.92.194"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.19.92.194 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COybwt37XdiVNeMnZ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "a2d8ded6-3b13-4fa3-ba1a-5ec5d2ce7c22", "DetectTime": "2024-05-21T12:24:11.044058+00:00", "EventTime": "2024-05-21T12:24:11.044076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP8GpE3U3IBtTOLxva"], "accumulated_threat_level": 8.799999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "6aa91d54-c83f-4ae3-8a04-eb2c3656499e", "DetectTime": "2024-05-21T12:24:11.071023+00:00", "EventTime": "2024-05-21T12:24:11.071045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.151.170.232"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.151.170.232 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qsYk4WViSFZMsys4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "5fe86703-3c22-4731-bbe7-ec6545f44985", "DetectTime": "2024-05-21T12:24:11.081101+00:00", "EventTime": "2024-05-21T12:24:11.081124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFCKi4R4JEPpOhA0i"], "accumulated_threat_level": 9.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "ff590b1b-7f02-4fec-96db-daf11e9e36cf", "DetectTime": "2024-05-21T12:24:11.093601+00:00", "EventTime": "2024-05-21T12:24:11.093620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.151.170.232"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.151.170.232 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qsYk4WViSFZMsys4"], "accumulated_threat_level": 10.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "8be52f10-8716-4df6-922d-d8bd01cc998d", "DetectTime": "2024-05-21T12:24:11.107991+00:00", "EventTime": "2024-05-21T12:24:11.108008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COw9Cz3ztvG4JdqH0f"], "accumulated_threat_level": 10.9, "timewindow": 1} +{"Format": "IDEA0", "ID": "2d45a031-a4b2-4adb-b60e-5fc90c364297", "DetectTime": "2024-05-21T12:24:11.117843+00:00", "EventTime": "2024-05-21T12:24:11.117861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COj9me3EACRMA5jnMh"], "accumulated_threat_level": 11.700000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "a5bc4e58-3895-4d3f-a82e-c5142c0d615a", "DetectTime": "2024-05-21T12:24:11.141930+00:00", "EventTime": "2024-05-21T12:24:11.141948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl4jtS3JqjVdVsoWCg"], "accumulated_threat_level": 12.500000000000002, "timewindow": 1} +{"Format": "Json", "ID": "a5bc4e58-3895-4d3f-a82e-c5142c0d615a", "DetectTime": "2024-05-21T12:24:11.141930+00:00", "EventTime": "2024-05-21T12:24:11.141948+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "1970-01-01T00:11:41.853839+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:11.372385)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "c54621e3-cdbf-40c3-a233-46ce62accf7c", "DetectTime": "2024-05-21T12:24:11.382525+00:00", "EventTime": "2024-05-21T12:24:11.382544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuv2z83Jui2qflaPi5"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "d21a2b9a-2a0d-41b9-b09a-50fa9af8da46", "DetectTime": "2024-05-21T12:24:11.393454+00:00", "EventTime": "2024-05-21T12:24:11.393474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxzR6m4DjfCvHZ5TG5"], "accumulated_threat_level": 1.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "d49c7473-f3ad-4fbc-b20c-27df9c56681f", "DetectTime": "2024-05-21T12:24:11.406128+00:00", "EventTime": "2024-05-21T12:24:11.406149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBd4sUeDcvdUf7Xf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "9cb17570-4a54-40b9-95ec-a087376e7ab4", "DetectTime": "2024-05-21T12:24:11.419073+00:00", "EventTime": "2024-05-21T12:24:11.419093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.250.117.232"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.250.117.232 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNhP82aWWNZBsyOX8"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "fb3c7220-dcde-4db0-b56c-9608be38684c", "DetectTime": "2024-05-21T12:24:11.431969+00:00", "EventTime": "2024-05-21T12:24:11.431991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.250.117.232"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.250.117.232 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNhP82aWWNZBsyOX8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "1a06e913-d49f-42a3-ba4d-5a1f0dbb99f5", "DetectTime": "2024-05-21T12:24:11.443569+00:00", "EventTime": "2024-05-21T12:24:11.443588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.223.239.27"]}], "Attach": [{"Content": "Connection to unknown destination port 20246/UDP destination IP 178.223.239.27. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhjmYSU5kyAnyPT2"], "accumulated_threat_level": 3.7, "timewindow": 1} +{"Format": "IDEA0", "ID": "3c22ca05-cda0-4ae8-bdc2-fe017f4577e5", "DetectTime": "2024-05-21T12:24:11.456269+00:00", "EventTime": "2024-05-21T12:24:11.456289+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCT7uf2XhQMWalDGZj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ef72b10c-74f5-4c4a-a9bd-e03a3c02d6ff", "DetectTime": "2024-05-21T12:24:11.468522+00:00", "EventTime": "2024-05-21T12:24:11.468545+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCT7uf2XhQMWalDGZj"], "accumulated_threat_level": 4.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "ce36ce0d-2ef0-4efd-bf36-df27faa151b5", "DetectTime": "2024-05-21T12:24:11.483914+00:00", "EventTime": "2024-05-21T12:24:11.483934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJT4hhk3dXMEy1CM6"], "accumulated_threat_level": 5.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "34f1dc39-5de2-4af7-b781-1f70062f7614", "DetectTime": "2024-05-21T12:24:11.494938+00:00", "EventTime": "2024-05-21T12:24:11.494956+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQx1h4YFxaTpJfcA2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9932deed-ea72-44e7-9450-107ed7860a67", "DetectTime": "2024-05-21T12:24:11.505390+00:00", "EventTime": "2024-05-21T12:24:11.505408+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQx1h4YFxaTpJfcA2"], "accumulated_threat_level": 5.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "b8543505-6c0e-4df0-923a-9a92217dfac4", "DetectTime": "2024-05-21T12:24:11.515842+00:00", "EventTime": "2024-05-21T12:24:11.515860+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctk2Z133nertT6Ewck"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "599a7eab-9b86-4829-815c-74a40c23ad33", "DetectTime": "2024-05-21T12:24:11.527708+00:00", "EventTime": "2024-05-21T12:24:11.527725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctk2Z133nertT6Ewck"], "accumulated_threat_level": 6.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "215b298d-1605-4050-b50e-1bbf49c55c01", "DetectTime": "2024-05-21T12:24:11.540482+00:00", "EventTime": "2024-05-21T12:24:11.540502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwTuhIBAdus8drIc"], "accumulated_threat_level": 6.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "7a923580-1d6f-43cc-8c55-b0cb09d5aba1", "DetectTime": "2024-05-21T12:24:11.551246+00:00", "EventTime": "2024-05-21T12:24:11.551263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.232.61.59"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.232.61.59 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1AAz2FXCFjZ6WbGf"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "7c4499e6-91d8-4c54-8723-cd373786ef9f", "DetectTime": "2024-05-21T12:24:11.562137+00:00", "EventTime": "2024-05-21T12:24:11.562155+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.232.61.59"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.232.61.59 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1AAz2FXCFjZ6WbGf"], "accumulated_threat_level": 7.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "03e3f94d-b678-4059-8e37-94bb5afc853d", "DetectTime": "2024-05-21T12:24:11.574056+00:00", "EventTime": "2024-05-21T12:24:11.574073+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.125.106.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.125.106.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvpy1CWKVsif94s2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "cf148f18-3c1c-48ec-9321-65651977262d", "DetectTime": "2024-05-21T12:24:11.585060+00:00", "EventTime": "2024-05-21T12:24:11.585078+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.125.106.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.125.106.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvpy1CWKVsif94s2"], "accumulated_threat_level": 7.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "2f7e848d-4154-4769-a890-5778024eaedd", "DetectTime": "2024-05-21T12:24:11.602753+00:00", "EventTime": "2024-05-21T12:24:11.602770+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["75.82.113.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 75.82.113.18 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoSMx46fncnAQe8ch"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "08f1dc7e-b802-4c9b-b091-9b81a8d82204", "DetectTime": "2024-05-21T12:24:11.613510+00:00", "EventTime": "2024-05-21T12:24:11.613528+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["75.82.113.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 75.82.113.18 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoSMx46fncnAQe8ch"], "accumulated_threat_level": 8.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "587d38dd-e709-4687-9753-8cd445cea1f9", "DetectTime": "2024-05-21T12:24:11.623814+00:00", "EventTime": "2024-05-21T12:24:11.623832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpDv33RL8aLptZjph"], "accumulated_threat_level": 9.100000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "ed796a63-0909-4352-b2f0-9b1bb6fef1cb", "DetectTime": "2024-05-21T12:24:11.633987+00:00", "EventTime": "2024-05-21T12:24:11.634006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPoNLzPEhnX8nJ7d"], "accumulated_threat_level": 9.900000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "2832222b-46c8-4d4e-b9ad-2462c92c87e0", "DetectTime": "2024-05-21T12:24:11.649314+00:00", "EventTime": "2024-05-21T12:24:11.649333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbOhV1Wz1fnzk1KJ"], "accumulated_threat_level": 10.700000000000003, "timewindow": 1} +{"Format": "IDEA0", "ID": "6d760d50-c2a5-4fe1-9ea8-5a2e995d6aad", "DetectTime": "2024-05-21T12:24:11.661114+00:00", "EventTime": "2024-05-21T12:24:11.661137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "Connection to unknown destination port 11925/UDP destination IP 79.154.42.157. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJWle4UgAVbmXNKm4"], "accumulated_threat_level": 11.500000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "63810604-18a6-4182-a3cb-ca40faf03c8f", "DetectTime": "2024-05-21T12:24:11.671645+00:00", "EventTime": "2024-05-21T12:24:11.671664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUo55qWrbeHriGF8"], "accumulated_threat_level": 12.300000000000004, "timewindow": 1} +{"Format": "Json", "ID": "63810604-18a6-4182-a3cb-ca40faf03c8f", "DetectTime": "2024-05-21T12:24:11.671645+00:00", "EventTime": "2024-05-21T12:24:11.671664+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-01T00:12:00.216109+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:11.965252)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000004, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000004} +{"Format": "IDEA0", "ID": "3745c3ce-0e23-47ab-bd3f-f5cd16046eae", "DetectTime": "2024-05-21T12:24:11.974798+00:00", "EventTime": "2024-05-21T12:24:11.974817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKNi92VUrJMrx76hh"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "fa95f8a1-1a07-46cd-a7eb-bed862b751c6", "DetectTime": "2024-05-21T12:24:11.985915+00:00", "EventTime": "2024-05-21T12:24:11.985933+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.3.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.3.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihKGF3ubpkPhlK7ib"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "88e28267-6d18-4fb1-876a-883331dfc82e", "DetectTime": "2024-05-21T12:24:11.997104+00:00", "EventTime": "2024-05-21T12:24:11.997123+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.3.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.3.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihKGF3ubpkPhlK7ib"], "accumulated_threat_level": 1.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "916304dc-ef79-4680-bb9f-192cfc097b03", "DetectTime": "2024-05-21T12:24:12.008516+00:00", "EventTime": "2024-05-21T12:24:12.008534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGYum66sOI4hnoVg"], "accumulated_threat_level": 2.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "e2b84680-7544-4e44-bd41-335a15613106", "DetectTime": "2024-05-21T12:24:12.019801+00:00", "EventTime": "2024-05-21T12:24:12.019822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.56.253.45"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.253.45 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSHQi3eqUgJZgQHT6"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "58ac7791-6020-49fa-ba70-bf6016ea40fd", "DetectTime": "2024-05-21T12:24:12.031892+00:00", "EventTime": "2024-05-21T12:24:12.031913+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.56.253.45"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.253.45 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSHQi3eqUgJZgQHT6"], "accumulated_threat_level": 2.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "91c6205a-4a33-4800-a36e-012a5b4b1219", "DetectTime": "2024-05-21T12:24:12.042456+00:00", "EventTime": "2024-05-21T12:24:12.042474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.126.57"]}], "Attach": [{"Content": "Connection to unknown destination port 20807/UDP destination IP 41.96.126.57. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sezz2kohCSCZLQEj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "262a7b8e-6761-4289-8c8d-9ba6c635b4f4", "DetectTime": "2024-05-21T12:24:12.052658+00:00", "EventTime": "2024-05-21T12:24:12.052677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.52.202"]}], "Attach": [{"Content": "Connection to unknown destination port 13639/UDP destination IP 188.169.52.202. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Glu3tpOZDHt0CH8"], "accumulated_threat_level": 4.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "26cee781-0261-4c95-a354-03e92f789df3", "DetectTime": "2024-05-21T12:24:12.067115+00:00", "EventTime": "2024-05-21T12:24:12.067134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WHlA41I92BTUpVnl"], "accumulated_threat_level": 5.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "dceed59c-d452-436f-b281-a223bedbc2a6", "DetectTime": "2024-05-21T12:24:12.078597+00:00", "EventTime": "2024-05-21T12:24:12.078614+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.40.213.191"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.40.213.191 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTu1nhVjHOIX6G5m2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1b18f196-eef8-409c-931d-670e49692f02", "DetectTime": "2024-05-21T12:24:12.089169+00:00", "EventTime": "2024-05-21T12:24:12.089187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.40.213.191"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.40.213.191 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTu1nhVjHOIX6G5m2"], "accumulated_threat_level": 5.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "32a3e957-82d1-4e5d-b001-1966963355f1", "DetectTime": "2024-05-21T12:24:12.099284+00:00", "EventTime": "2024-05-21T12:24:12.099302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFqUitUOkIIojJjb"], "accumulated_threat_level": 6.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "6ddc5039-b650-4149-aa73-5c6057f18543", "DetectTime": "2024-05-21T12:24:12.109657+00:00", "EventTime": "2024-05-21T12:24:12.109676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chwse83laYWxocW9Ug"], "accumulated_threat_level": 7.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "7b498db7-4a19-4668-bf58-c0967d256c67", "DetectTime": "2024-05-21T12:24:12.122980+00:00", "EventTime": "2024-05-21T12:24:12.122997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["72.184.109.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 72.184.109.119 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Pwds2sfHYzmVa9Hl"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "f11d54f9-1c77-4fc9-bd44-6f2f5c913efa", "DetectTime": "2024-05-21T12:24:12.135774+00:00", "EventTime": "2024-05-21T12:24:12.135793+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["72.184.109.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 72.184.109.119 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Pwds2sfHYzmVa9Hl"], "accumulated_threat_level": 7.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "ccc7eab3-df1e-4de1-8374-bcaedb395e24", "DetectTime": "2024-05-21T12:24:12.148579+00:00", "EventTime": "2024-05-21T12:24:12.148600+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.96.185"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.96.185 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnTa5F4h5xwB4eUh8f"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "d4b069ee-8742-4536-8b7c-4d056217878e", "DetectTime": "2024-05-21T12:24:12.161172+00:00", "EventTime": "2024-05-21T12:24:12.161191+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.96.185"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.96.185 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnTa5F4h5xwB4eUh8f"], "accumulated_threat_level": 8.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "ec2c314a-6ebe-4001-9c2d-65b505b0990d", "DetectTime": "2024-05-21T12:24:12.171241+00:00", "EventTime": "2024-05-21T12:24:12.171259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7FhsiJVFVrjfA86"], "accumulated_threat_level": 8.9, "timewindow": 1} +{"Format": "IDEA0", "ID": "859782c2-66f7-432c-80b5-29cf4353610e", "DetectTime": "2024-05-21T12:24:12.183901+00:00", "EventTime": "2024-05-21T12:24:12.183920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.38.41.24"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.38.41.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SXJ61MEBnzaXCSOe"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "cbf439ba-ab9c-420f-be01-1383b85b8426", "DetectTime": "2024-05-21T12:24:12.195168+00:00", "EventTime": "2024-05-21T12:24:12.195186+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.38.41.24"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.38.41.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SXJ61MEBnzaXCSOe"], "accumulated_threat_level": 9.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "7b195d1b-459c-4a8d-b99c-b23e3b2cf4f4", "DetectTime": "2024-05-21T12:24:12.206814+00:00", "EventTime": "2024-05-21T12:24:12.206833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBmuxQ26v7IazB9aS2"], "accumulated_threat_level": 10.200000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "41469b9d-a564-4836-9397-22f00e7b728d", "DetectTime": "2024-05-21T12:24:12.217437+00:00", "EventTime": "2024-05-21T12:24:12.217456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UbWt46pPkQ4POyOg"], "accumulated_threat_level": 11.000000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "58dc201b-3929-4498-9abd-7cfa9b4fd9cb", "DetectTime": "2024-05-21T12:24:12.228219+00:00", "EventTime": "2024-05-21T12:24:12.228238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBF5XH2r6CqcurUv55"], "accumulated_threat_level": 11.800000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "e1db3715-aa14-4f20-8fcc-c5cece38f651", "DetectTime": "2024-05-21T12:24:12.238961+00:00", "EventTime": "2024-05-21T12:24:12.238979+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.238.8.184"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.238.8.184 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuS9X1WNrf6mc4hS4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "6585f0f2-5b73-49b5-a4fb-f1eb0665ea04", "DetectTime": "2024-05-21T12:24:12.250094+00:00", "EventTime": "2024-05-21T12:24:12.250112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.238.8.184"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.238.8.184 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuS9X1WNrf6mc4hS4"], "accumulated_threat_level": 12.300000000000002, "timewindow": 1} +{"Format": "Json", "ID": "6585f0f2-5b73-49b5-a4fb-f1eb0665ea04", "DetectTime": "2024-05-21T12:24:12.250094+00:00", "EventTime": "2024-05-21T12:24:12.250112+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.238.8.184"]}], "Attach": [{"Content": "1970-01-01T00:07:52.221673+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:12.585060)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "d13a528a-7e11-4c01-9466-68756dfaaa80", "DetectTime": "2024-05-21T12:24:12.599386+00:00", "EventTime": "2024-05-21T12:24:12.599407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3MMhj2GnBXwVBsFmb"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "f1859d0e-177e-4c23-a5a7-234c337d6a01", "DetectTime": "2024-05-21T12:24:12.610372+00:00", "EventTime": "2024-05-21T12:24:12.610392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrI2BL2QxGfqHMWo1"], "accumulated_threat_level": 1.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "71e9d9cf-e87e-4b0b-8f1e-b2bc11c8fe2e", "DetectTime": "2024-05-21T12:24:12.621906+00:00", "EventTime": "2024-05-21T12:24:12.621925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["96.250.168.28"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 96.250.168.28 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBJv53wiKvKDYQ0U1"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c7bd0ebe-6c57-4aac-95bd-adaa809aba14", "DetectTime": "2024-05-21T12:24:12.633762+00:00", "EventTime": "2024-05-21T12:24:12.633781+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["96.250.168.28"]}], "Attach": [{"Content": "connection to blacklisted IP: 96.250.168.28 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBJv53wiKvKDYQ0U1"], "accumulated_threat_level": 2.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "6ee3031d-4e9a-4a9b-9465-b475a0dd9614", "DetectTime": "2024-05-21T12:24:12.645293+00:00", "EventTime": "2024-05-21T12:24:12.645310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7HIM3QykDanb23E7"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "f3a4fb0b-ef3f-4fb2-9810-850ca9354296", "DetectTime": "2024-05-21T12:24:12.656348+00:00", "EventTime": "2024-05-21T12:24:12.656366+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.139.178.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybpXJgQUkJPIqcKe"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "492fbb64-98bb-4759-b0c0-93d4cd33238a", "DetectTime": "2024-05-21T12:24:12.667369+00:00", "EventTime": "2024-05-21T12:24:12.667387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybpXJgQUkJPIqcKe"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "58a41d59-7310-4042-8e28-784e41c0c239", "DetectTime": "2024-05-21T12:24:12.678634+00:00", "EventTime": "2024-05-21T12:24:12.678655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2L8U1gzDqfEHABi7"], "accumulated_threat_level": 4.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "4951ddfe-7253-4ba0-b196-2bc34ec09a60", "DetectTime": "2024-05-21T12:24:12.689562+00:00", "EventTime": "2024-05-21T12:24:12.689580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9jdu1ti3b4bVj2b3"], "accumulated_threat_level": 5.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "2c790625-247b-488a-8188-5dd8f4c379a6", "DetectTime": "2024-05-21T12:24:12.701542+00:00", "EventTime": "2024-05-21T12:24:12.701563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wdrT1nrEYtBhTPp1"], "accumulated_threat_level": 5.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "d7675d5e-5538-4ac2-a0c0-a40cfceee3bd", "DetectTime": "2024-05-21T12:24:12.711571+00:00", "EventTime": "2024-05-21T12:24:12.711589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcUJJJWZTYCmp6y1"], "accumulated_threat_level": 6.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "6a87a034-36be-48d4-8577-04345dca4224", "DetectTime": "2024-05-21T12:24:12.722151+00:00", "EventTime": "2024-05-21T12:24:12.722168+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.178.163.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.178.163.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQHK01ZcNCcFFQP2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ff3d3531-ea36-4d39-967b-ddaa5e1debea", "DetectTime": "2024-05-21T12:24:12.733099+00:00", "EventTime": "2024-05-21T12:24:12.733117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.178.163.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.178.163.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQHK01ZcNCcFFQP2"], "accumulated_threat_level": 7.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "fd585c84-a4ed-4430-888d-e719aeae822c", "DetectTime": "2024-05-21T12:24:12.744380+00:00", "EventTime": "2024-05-21T12:24:12.744398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXJzE4j1DIGqPgC29"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "e889d529-498d-4972-8360-d07d633f8b53", "DetectTime": "2024-05-21T12:24:12.756171+00:00", "EventTime": "2024-05-21T12:24:12.756189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.98.95.219"]}], "Attach": [{"Content": "Connection to unknown destination port 10008/UDP destination IP 62.98.95.219. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zn9x4bwLTfEyttud"], "accumulated_threat_level": 8.7, "timewindow": 1} +{"Format": "IDEA0", "ID": "0465e1d8-2f62-4096-930b-8dbb5c4615f0", "DetectTime": "2024-05-21T12:24:12.767599+00:00", "EventTime": "2024-05-21T12:24:12.767617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["115.132.36.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 115.132.36.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJBkj4KP3on7M5fL3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "401c0dff-905f-4dba-b0a0-d7a5674ca4ab", "DetectTime": "2024-05-21T12:24:12.783681+00:00", "EventTime": "2024-05-21T12:24:12.783700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.3.210"]}], "Attach": [{"Content": "Connection to unknown destination port 11230/UDP destination IP 181.65.3.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgcS1A22Z180xRv5ve"], "accumulated_threat_level": 9.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "02619e85-819e-4ec0-be28-f044ec71a041", "DetectTime": "2024-05-21T12:24:12.794962+00:00", "EventTime": "2024-05-21T12:24:12.794980+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["115.132.36.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 115.132.36.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJBkj4KP3on7M5fL3"], "accumulated_threat_level": 10.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "dae24724-23dd-4494-979c-27b182f79b22", "DetectTime": "2024-05-21T12:24:12.805626+00:00", "EventTime": "2024-05-21T12:24:12.805644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.240.76.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.240.76.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Dq9z2aA7QQwknBV"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "07e59663-a33c-4ff6-80a1-793bb178085f", "DetectTime": "2024-05-21T12:24:12.816584+00:00", "EventTime": "2024-05-21T12:24:12.816602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.240.76.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.240.76.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Dq9z2aA7QQwknBV"], "accumulated_threat_level": 10.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7b98842c-8ee2-412f-9c4b-02c86c120cfc", "DetectTime": "2024-05-21T12:24:12.827074+00:00", "EventTime": "2024-05-21T12:24:12.827092+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.236.84.133"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.236.84.133 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwDfR1sfJBRqCivUi"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "87b4b313-8c47-4cd7-942e-1d2d84cadce9", "DetectTime": "2024-05-21T12:24:12.838683+00:00", "EventTime": "2024-05-21T12:24:12.838703+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.236.84.133"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.236.84.133 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwDfR1sfJBRqCivUi"], "accumulated_threat_level": 11.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "e00e8f4b-f20a-4dfe-9af6-0f44f079402a", "DetectTime": "2024-05-21T12:24:12.849382+00:00", "EventTime": "2024-05-21T12:24:12.849400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0iIY1UNzUiwjE4N8"], "accumulated_threat_level": 11.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "02bd4438-fb8d-40fc-aa48-015e0956a05c", "DetectTime": "2024-05-21T12:24:12.859905+00:00", "EventTime": "2024-05-21T12:24:12.859922+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.97.194"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.97.194 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMK9xw3UkzY8fcf9ed"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "f60475a1-8ce1-4f02-9c8b-895186b97ced", "DetectTime": "2024-05-21T12:24:12.871135+00:00", "EventTime": "2024-05-21T12:24:12.871154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.97.194"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.97.194 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMK9xw3UkzY8fcf9ed"], "accumulated_threat_level": 12.3, "timewindow": 1} +{"Format": "Json", "ID": "f60475a1-8ce1-4f02-9c8b-895186b97ced", "DetectTime": "2024-05-21T12:24:12.871135+00:00", "EventTime": "2024-05-21T12:24:12.871154+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.97.194"]}], "Attach": [{"Content": "1970-01-01T00:08:42.443935+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:13.189602)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.3, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.3} +{"Format": "IDEA0", "ID": "839efc78-5936-42f8-a2d5-7b03ad182b42", "DetectTime": "2024-05-21T12:24:13.207500+00:00", "EventTime": "2024-05-21T12:24:13.207520+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["74.110.135.243"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.110.135.243 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck02xhz3qJaxHskdg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "2d8f91d9-994c-4e4c-a548-1d3c70fbd8da", "DetectTime": "2024-05-21T12:24:13.224357+00:00", "EventTime": "2024-05-21T12:24:13.224374+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["74.110.135.243"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.110.135.243 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck02xhz3qJaxHskdg"], "accumulated_threat_level": 0.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "4c1b77bb-5dcf-4ef0-89bf-eb5e773ff913", "DetectTime": "2024-05-21T12:24:13.234870+00:00", "EventTime": "2024-05-21T12:24:13.234887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQZGh45VTrQ1detXi"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9bcfad2f-bb25-4cdb-926d-1c00870e7e7c", "DetectTime": "2024-05-21T12:24:13.246940+00:00", "EventTime": "2024-05-21T12:24:13.246959+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQZGh45VTrQ1detXi"], "accumulated_threat_level": 1.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "8a64a49d-8771-452f-a33f-ace38d6b4985", "DetectTime": "2024-05-21T12:24:13.251660+00:00", "EventTime": "2024-05-21T12:24:13.251678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxcSw4rkL70f5ALUi", "CZ1QENNu7oI5djMn4", "CzvxfR12xpwdivWn0k", "CD6kBm1K4chWbA6bfj"], "accumulated_threat_level": 1.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c196f2e3-45d4-433d-aabe-3cc155191fb3", "DetectTime": "2024-05-21T12:24:13.269940+00:00", "EventTime": "2024-05-21T12:24:13.269957+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.65.16.140"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.16.140 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN24aa9WPsHQ6cza"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b8d1a092-9675-4722-a721-de849de120f3", "DetectTime": "2024-05-21T12:24:13.281806+00:00", "EventTime": "2024-05-21T12:24:13.281824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.65.16.140"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.16.140 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN24aa9WPsHQ6cza"], "accumulated_threat_level": 2.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "38024b81-2bbb-4d3b-9596-0cb2c5cd67ba", "DetectTime": "2024-05-21T12:24:13.323028+00:00", "EventTime": "2024-05-21T12:24:13.323046+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeo263iBzIuaySJOd"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9dfdde48-ea29-48eb-a8a5-8a4aab99ef2f", "DetectTime": "2024-05-21T12:24:13.333792+00:00", "EventTime": "2024-05-21T12:24:13.333810+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeo263iBzIuaySJOd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6cb6d54d-3050-40b9-810a-a76f38abb1e4", "DetectTime": "2024-05-21T12:24:13.350113+00:00", "EventTime": "2024-05-21T12:24:13.350131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwVwXT33T3SZe2qnj7"], "accumulated_threat_level": 3.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "1cca2802-3ecb-42e9-af43-74a3e1cfc35c", "DetectTime": "2024-05-21T12:24:13.360147+00:00", "EventTime": "2024-05-21T12:24:13.360165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9OUG2FfA4oqkIc17"], "accumulated_threat_level": 4.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "d96c2640-dea0-4b19-b675-d9db8899cb3e", "DetectTime": "2024-05-21T12:24:13.370682+00:00", "EventTime": "2024-05-21T12:24:13.370700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9rPG113QKlY4mRN4"], "accumulated_threat_level": 4.8999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "cf9ec239-7a5c-4765-bf75-103cc418dc78", "DetectTime": "2024-05-21T12:24:13.381301+00:00", "EventTime": "2024-05-21T12:24:13.381320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWRhs4qyq907KyVPg"], "accumulated_threat_level": 5.699999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "30a9d251-7dd8-4d5f-8091-f6a1813e9268", "DetectTime": "2024-05-21T12:24:13.393362+00:00", "EventTime": "2024-05-21T12:24:13.393379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqduHm62br85u1Aa"], "accumulated_threat_level": 6.499999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "018a5f7a-4f31-469a-8f29-2dc74c62c1e3", "DetectTime": "2024-05-21T12:24:13.408578+00:00", "EventTime": "2024-05-21T12:24:13.408595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5n2PQuComEU1ha1"], "accumulated_threat_level": 7.299999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "346ca511-e755-45f4-81f8-1d10478dccf5", "DetectTime": "2024-05-21T12:24:13.419729+00:00", "EventTime": "2024-05-21T12:24:13.419749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.121.81.124"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.121.81.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SSHl3qoMXYOg29c9"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "3b776d8d-8181-4b79-beb9-7b62d1d2203b", "DetectTime": "2024-05-21T12:24:13.430505+00:00", "EventTime": "2024-05-21T12:24:13.430523+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.121.81.124"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.121.81.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SSHl3qoMXYOg29c9"], "accumulated_threat_level": 7.799999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "8cbe1829-d0ad-4cb0-a6f5-3ef5d6dc0b41", "DetectTime": "2024-05-21T12:24:13.443724+00:00", "EventTime": "2024-05-21T12:24:13.443743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpcisg1bNHIoOwKyfk"], "accumulated_threat_level": 8.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "5e8ff812-820c-42dc-b345-47ce582381de", "DetectTime": "2024-05-21T12:24:13.454721+00:00", "EventTime": "2024-05-21T12:24:13.454740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXxokoKuNm4Soj6g"], "accumulated_threat_level": 9.4, "timewindow": 1} +{"Format": "IDEA0", "ID": "c50ba88f-915e-4caa-9c64-4c1755ed7749", "DetectTime": "2024-05-21T12:24:13.465750+00:00", "EventTime": "2024-05-21T12:24:13.465770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO66dslw6YGIRyQ8"], "accumulated_threat_level": 10.200000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "5c7de31a-651a-4b5c-8b57-077380c0c122", "DetectTime": "2024-05-21T12:24:13.543917+00:00", "EventTime": "2024-05-21T12:24:13.543939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNvlV2bAJGkSdvM3g", "CusswE4bYql6tmD8Ta", "CypBaA1sA7yXRnfsT5", "CEOVnwTQnVVgXt5Dk"], "accumulated_threat_level": 10.700000000000001, "timewindow": 1} +{"Format": "IDEA0", "ID": "6e1d24ca-ef6f-4e72-8e39-e21bb083ae71", "DetectTime": "2024-05-21T12:24:13.632618+00:00", "EventTime": "2024-05-21T12:24:13.632638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2NTmW3qQv3vExUfJb"], "accumulated_threat_level": 11.500000000000002, "timewindow": 1} +{"Format": "IDEA0", "ID": "b1d5d2cd-54e0-45f3-94d2-c7ea1d97457e", "DetectTime": "2024-05-21T12:24:13.662512+00:00", "EventTime": "2024-05-21T12:24:13.662532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDRaU3UOIuVXSznO7"], "accumulated_threat_level": 12.300000000000002, "timewindow": 1} +{"Format": "Json", "ID": "b1d5d2cd-54e0-45f3-94d2-c7ea1d97457e", "DetectTime": "2024-05-21T12:24:13.662512+00:00", "EventTime": "2024-05-21T12:24:13.662532+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "1970-01-01T00:42:52.604936+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:14.071801)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "37427608-f211-4ddd-940d-ac95476585a6", "DetectTime": "2024-05-21T12:24:14.083686+00:00", "EventTime": "2024-05-21T12:24:14.083704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.19.221.140"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.19.221.140 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIx4pl2DUmY5qWl9Z3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "be15daad-27c9-49d0-8290-210cab289e6b", "DetectTime": "2024-05-21T12:24:14.098345+00:00", "EventTime": "2024-05-21T12:24:14.098365+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.19.221.140"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.19.221.140 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIx4pl2DUmY5qWl9Z3"], "accumulated_threat_level": 0.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6e25da1e-6a5c-4b41-a530-ce3b97742b31", "DetectTime": "2024-05-21T12:24:14.109404+00:00", "EventTime": "2024-05-21T12:24:14.109422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRan813QW3tazOmxW5"], "accumulated_threat_level": 1.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "ab0d16ee-2870-4e5e-9471-6249ed941396", "DetectTime": "2024-05-21T12:24:14.124854+00:00", "EventTime": "2024-05-21T12:24:14.124870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.73.107"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.73.107 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKpJWjw5DDhVuNkl"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "88005f2d-31d4-40ce-89e0-1955bc7e0ed7", "DetectTime": "2024-05-21T12:24:14.137154+00:00", "EventTime": "2024-05-21T12:24:14.137173+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.73.107"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.73.107 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKpJWjw5DDhVuNkl"], "accumulated_threat_level": 1.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "01839c8a-b021-4c72-bca0-8d25a51959b5", "DetectTime": "2024-05-21T12:24:14.148208+00:00", "EventTime": "2024-05-21T12:24:14.148226+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDg8v4k3upJFOAob5"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "31cf2840-7d93-46d2-8e42-c190142de2ca", "DetectTime": "2024-05-21T12:24:14.159494+00:00", "EventTime": "2024-05-21T12:24:14.159512+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDg8v4k3upJFOAob5"], "accumulated_threat_level": 2.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "6cd25a0c-578e-4931-b350-b62a1a60327f", "DetectTime": "2024-05-21T12:24:14.170158+00:00", "EventTime": "2024-05-21T12:24:14.170176+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKc1g2ENFXInYVifb"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "cd11240c-41e0-4c2c-8e26-37927b0a8bf0", "DetectTime": "2024-05-21T12:24:14.184265+00:00", "EventTime": "2024-05-21T12:24:14.184284+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKc1g2ENFXInYVifb"], "accumulated_threat_level": 2.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "1f16adfd-a1ce-4282-88d7-7bac6af19cd8", "DetectTime": "2024-05-21T12:24:14.195051+00:00", "EventTime": "2024-05-21T12:24:14.195069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.88.105.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.88.105.164 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkI5Sn4Du6DuEEfHK3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "98c15617-1f86-45ee-b44c-16adc28f7331", "DetectTime": "2024-05-21T12:24:14.206712+00:00", "EventTime": "2024-05-21T12:24:14.206729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.88.105.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.88.105.164 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkI5Sn4Du6DuEEfHK3"], "accumulated_threat_level": 3.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "5c6e6ef5-bd6d-4f41-8a9b-9fe5bda157fc", "DetectTime": "2024-05-21T12:24:14.222822+00:00", "EventTime": "2024-05-21T12:24:14.222841+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.98.95.219"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CzSlrkchPSxf0V"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "a0e5786a-fc80-4c15-99d9-9e127d972597", "DetectTime": "2024-05-21T12:24:14.239060+00:00", "EventTime": "2024-05-21T12:24:14.239083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.98.95.219"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CzSlrkchPSxf0V"], "accumulated_threat_level": 3.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "740ece43-0856-4f70-96ac-413c542fe877", "DetectTime": "2024-05-21T12:24:14.274999+00:00", "EventTime": "2024-05-21T12:24:14.275021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLBHy3bFxbNqGwlfi"], "accumulated_threat_level": 4.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "d3f810c5-3536-449b-ba72-b3e6f59f25b0", "DetectTime": "2024-05-21T12:24:14.286524+00:00", "EventTime": "2024-05-21T12:24:14.286542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZJfK3kv0JVli3gPd"], "accumulated_threat_level": 5.3999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "412aac78-64fb-4c62-95ec-ace30c3991fe", "DetectTime": "2024-05-21T12:24:14.297638+00:00", "EventTime": "2024-05-21T12:24:14.297658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7PMNP3y2N9SJ59Wtd"], "accumulated_threat_level": 6.199999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "591b6884-343a-4891-a75f-547224d3c5ec", "DetectTime": "2024-05-21T12:24:14.313378+00:00", "EventTime": "2024-05-21T12:24:14.313400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhVNqta9e5SaIma5"], "accumulated_threat_level": 6.999999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "ef826acc-3620-433d-89b7-02a834ab3980", "DetectTime": "2024-05-21T12:24:14.324661+00:00", "EventTime": "2024-05-21T12:24:14.324678+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.212.122.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.212.122.27 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDUZL1jg34zpKYwxk"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "d3d06735-f35c-4cbc-b488-ee8e8e4974ea", "DetectTime": "2024-05-21T12:24:14.335669+00:00", "EventTime": "2024-05-21T12:24:14.335688+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.212.122.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.212.122.27 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDUZL1jg34zpKYwxk"], "accumulated_threat_level": 7.499999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "d1408d41-8d23-4142-bd6a-3072d2e726f1", "DetectTime": "2024-05-21T12:24:14.346261+00:00", "EventTime": "2024-05-21T12:24:14.346278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbiKv22LqBjLUN8g2"], "accumulated_threat_level": 8.299999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "28e8c0de-2fb4-4df9-ba8d-2112af79ad55", "DetectTime": "2024-05-21T12:24:14.362376+00:00", "EventTime": "2024-05-21T12:24:14.362395+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.160.177.247"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.160.177.247 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKNZJ1FJCB7PUNh7f"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4e912fba-163d-42fd-a935-45b9c7710dda", "DetectTime": "2024-05-21T12:24:14.375580+00:00", "EventTime": "2024-05-21T12:24:14.375598+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.160.177.247"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.160.177.247 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKNZJ1FJCB7PUNh7f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 1} +{"Format": "IDEA0", "ID": "e099e002-75b3-46a3-8ecd-4266ea1fe113", "DetectTime": "2024-05-21T12:24:14.387366+00:00", "EventTime": "2024-05-21T12:24:14.387384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqbRUJKnO809H0Eg"], "accumulated_threat_level": 9.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "200fc9c0-ef4e-458a-a398-b1c0fce3bd40", "DetectTime": "2024-05-21T12:24:14.442076+00:00", "EventTime": "2024-05-21T12:24:14.442096+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.228.142.109"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.228.142.109 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGB8ntpEpslItvo6"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "63035b24-30f6-43f0-b327-fcf5006bba66", "DetectTime": "2024-05-21T12:24:14.453549+00:00", "EventTime": "2024-05-21T12:24:14.453567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.228.142.109"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.228.142.109 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGB8ntpEpslItvo6"], "accumulated_threat_level": 10.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "c3484f0a-a427-42fe-9437-3ef29e967974", "DetectTime": "2024-05-21T12:24:14.656369+00:00", "EventTime": "2024-05-21T12:24:14.656388+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.129.48.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.129.48.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdKLZ1rElrhxb1Cl9"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b57262c1-5c4e-4a26-a672-8ccb026901fc", "DetectTime": "2024-05-21T12:24:14.667831+00:00", "EventTime": "2024-05-21T12:24:14.667851+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.129.48.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.129.48.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdKLZ1rElrhxb1Cl9"], "accumulated_threat_level": 10.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "b06fcdc0-09f0-4582-83d4-fa8162beaece", "DetectTime": "2024-05-21T12:24:14.804205+00:00", "EventTime": "2024-05-21T12:24:14.804226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyPPJ2HpejDBpI2j7", "CgprDF2N2gDopEA6R9", "CNQa7G4kGViTGpSGXc", "CVwi3J2W7XApgGUGxj"], "accumulated_threat_level": 11.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "bae89fec-139f-4adb-83e5-471c32233ce8", "DetectTime": "2024-05-21T12:24:14.825440+00:00", "EventTime": "2024-05-21T12:24:14.825458+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["115.87.241.241"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 115.87.241.241 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59uP12A4tzyK6yTXj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "852c5ec5-b725-42cc-95e6-a49c13d3868b", "DetectTime": "2024-05-21T12:24:14.837574+00:00", "EventTime": "2024-05-21T12:24:14.837595+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["115.87.241.241"]}], "Attach": [{"Content": "connection to blacklisted IP: 115.87.241.241 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59uP12A4tzyK6yTXj"], "accumulated_threat_level": 11.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "a3892797-a7d2-481d-8eaa-f85f0ae842cc", "DetectTime": "2024-05-21T12:24:14.887447+00:00", "EventTime": "2024-05-21T12:24:14.887465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBshMFsfwu9PfeFvi"], "accumulated_threat_level": 12.4, "timewindow": 1} +{"Format": "Json", "ID": "a3892797-a7d2-481d-8eaa-f85f0ae842cc", "DetectTime": "2024-05-21T12:24:14.887447+00:00", "EventTime": "2024-05-21T12:24:14.887465+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "1970-01-01T00:44:00.905471+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:15.375948)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.4, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.4} +{"Format": "IDEA0", "ID": "afc6fe93-1f40-4172-9435-44579ee91f9b", "DetectTime": "2024-05-21T12:24:15.387322+00:00", "EventTime": "2024-05-21T12:24:15.387342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNGlO3VWSNgNN5tQl"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "482fcf45-f925-4f77-958e-2c65c62895f3", "DetectTime": "2024-05-21T12:24:15.401560+00:00", "EventTime": "2024-05-21T12:24:15.401580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAMYc4cGqc7kibxbg"], "accumulated_threat_level": 1.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "bc5cea43-6af3-49c8-b9ad-21d6e6a78be8", "DetectTime": "2024-05-21T12:24:15.412636+00:00", "EventTime": "2024-05-21T12:24:15.412654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpv7H3t1N2YmaFwlc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 1} +{"Format": "IDEA0", "ID": "547c67d0-a798-4e36-8e0d-f1f61146ce17", "DetectTime": "2024-05-21T12:24:15.424022+00:00", "EventTime": "2024-05-21T12:24:15.424041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Jf8E1bknDsdrFuZ9"], "accumulated_threat_level": 3.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "a656cba6-0b27-4fe1-94e0-43da20f675e4", "DetectTime": "2024-05-21T12:24:15.434908+00:00", "EventTime": "2024-05-21T12:24:15.434929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwk6oP1imwHfq69xV1"], "accumulated_threat_level": 4.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c99aa659-e7f5-4a76-9b36-bbe31defec01", "DetectTime": "2024-05-21T12:24:15.446155+00:00", "EventTime": "2024-05-21T12:24:15.446173+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.65.3.210"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjfhFU2pDfDLoa9Iy4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "cbcc1339-234b-474e-82d9-c7264c13f27c", "DetectTime": "2024-05-21T12:24:15.457548+00:00", "EventTime": "2024-05-21T12:24:15.457566+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.65.3.210"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjfhFU2pDfDLoa9Iy4"], "accumulated_threat_level": 4.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f2c0165b-f9df-45e2-99ee-79cfdd6e5dbc", "DetectTime": "2024-05-21T12:24:15.468033+00:00", "EventTime": "2024-05-21T12:24:15.468057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUnrv13OqLe7IKzFOi"], "accumulated_threat_level": 5.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "4ff1f40c-1312-4c24-918c-97fc71cc0348", "DetectTime": "2024-05-21T12:24:15.480085+00:00", "EventTime": "2024-05-21T12:24:15.480104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOBpt1bEHyLtb7bE1"], "accumulated_threat_level": 6.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "73b38b69-ba8a-4c0b-9821-2360ebe6d357", "DetectTime": "2024-05-21T12:24:15.491789+00:00", "EventTime": "2024-05-21T12:24:15.491811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.229.84.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.229.84.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7vFn4tOymfcVNsn3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "44c91138-782f-44c6-9f8e-506c789f9844", "DetectTime": "2024-05-21T12:24:15.503742+00:00", "EventTime": "2024-05-21T12:24:15.503761+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.229.84.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.229.84.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7vFn4tOymfcVNsn3"], "accumulated_threat_level": 6.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "bbfe3583-dab3-4716-964b-d9567dc6627c", "DetectTime": "2024-05-21T12:24:15.514335+00:00", "EventTime": "2024-05-21T12:24:15.514356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTzHvo4Qmp83aKC7"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 1} +{"Format": "IDEA0", "ID": "8b484aad-f3d7-482d-bd5b-56dd7021a38a", "DetectTime": "2024-05-21T12:24:15.527730+00:00", "EventTime": "2024-05-21T12:24:15.527748+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.54.47.53"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.54.47.53 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IbdOLCYfS0DJyoa"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1eeb9ec2-6c34-492b-bd4f-b9d42ede5abc", "DetectTime": "2024-05-21T12:24:15.538747+00:00", "EventTime": "2024-05-21T12:24:15.538764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJlqxq2yAtWaIeCsyd"], "accumulated_threat_level": 8.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "b9740bf9-c3ee-422a-90c6-7530ac660618", "DetectTime": "2024-05-21T12:24:15.549975+00:00", "EventTime": "2024-05-21T12:24:15.549994+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.54.47.53"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.54.47.53 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IbdOLCYfS0DJyoa"], "accumulated_threat_level": 8.7, "timewindow": 1} +{"Format": "IDEA0", "ID": "606f35c3-5ccc-4fbd-9634-d701c94e27ba", "DetectTime": "2024-05-21T12:24:15.561662+00:00", "EventTime": "2024-05-21T12:24:15.561681+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.15.162.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.15.162.66 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrIg22xEu3j2ySAab"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "5980ec47-ad14-41f9-8a1b-6a7b4eef0437", "DetectTime": "2024-05-21T12:24:15.572841+00:00", "EventTime": "2024-05-21T12:24:15.572859+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.15.162.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.15.162.66 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrIg22xEu3j2ySAab"], "accumulated_threat_level": 9.2, "timewindow": 1} +{"Format": "IDEA0", "ID": "30dfcb3c-6452-4ec2-b844-6b7e39e4638d", "DetectTime": "2024-05-21T12:24:15.583688+00:00", "EventTime": "2024-05-21T12:24:15.583706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6nRc149mnmaj0aG2"], "accumulated_threat_level": 10.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "40a05e6c-6612-410a-80ca-2288d9ff848c", "DetectTime": "2024-05-21T12:24:15.594175+00:00", "EventTime": "2024-05-21T12:24:15.594193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hPE93T1ahmtEeyYi"], "accumulated_threat_level": 10.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "c98876e7-7755-4958-8c31-a0cf2f01bc89", "DetectTime": "2024-05-21T12:24:15.605158+00:00", "EventTime": "2024-05-21T12:24:15.605181+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.146.148.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.146.148.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMBHX38ArCLT99zp5"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "7cf52678-f7d5-4f75-af7a-14357198816f", "DetectTime": "2024-05-21T12:24:15.618505+00:00", "EventTime": "2024-05-21T12:24:15.618534+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.146.148.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.146.148.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMBHX38ArCLT99zp5"], "accumulated_threat_level": 11.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "78a2a2a1-648f-4762-924c-082d2fbec763", "DetectTime": "2024-05-21T12:24:15.629176+00:00", "EventTime": "2024-05-21T12:24:15.629194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKgW7R1F3ZtLmkdZCd"], "accumulated_threat_level": 12.100000000000001, "timewindow": 1} +{"Format": "Json", "ID": "78a2a2a1-648f-4762-924c-082d2fbec763", "DetectTime": "2024-05-21T12:24:15.629176+00:00", "EventTime": "2024-05-21T12:24:15.629194+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "1970-01-01T00:44:03.942938+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:16.076553)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "abb82956-345c-43e7-88fc-e56f642bc7b4", "DetectTime": "2024-05-21T12:24:16.088297+00:00", "EventTime": "2024-05-21T12:24:16.088316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLCSy2oEc1XXK6DJ4"], "accumulated_threat_level": 0.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "2e967366-be73-4e17-8f5c-c5d04659b479", "DetectTime": "2024-05-21T12:24:16.101618+00:00", "EventTime": "2024-05-21T12:24:16.101636+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBKhB49PFT8I5Fpyj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "8731c5c5-5385-402a-a119-c9510e9db3d9", "DetectTime": "2024-05-21T12:24:16.114057+00:00", "EventTime": "2024-05-21T12:24:16.114075+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBKhB49PFT8I5Fpyj"], "accumulated_threat_level": 1.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "61159451-82ea-4509-be93-fd8ffe053496", "DetectTime": "2024-05-21T12:24:16.125977+00:00", "EventTime": "2024-05-21T12:24:16.125995+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXR9P2me5MzNf9DXa"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "6e7ed350-adef-4764-bb99-069b128fe588", "DetectTime": "2024-05-21T12:24:16.138006+00:00", "EventTime": "2024-05-21T12:24:16.138023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXR9P2me5MzNf9DXa"], "accumulated_threat_level": 1.8, "timewindow": 1} +{"Format": "IDEA0", "ID": "dc4e564d-73b9-4fbb-ac80-9bd494b5f32a", "DetectTime": "2024-05-21T12:24:16.148553+00:00", "EventTime": "2024-05-21T12:24:16.148571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFCKi4R4JEPpOhA0i"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "12accdbd-abda-4537-84ff-aa4e522c0d3d", "DetectTime": "2024-05-21T12:24:16.160257+00:00", "EventTime": "2024-05-21T12:24:16.160274+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFCKi4R4JEPpOhA0i"], "accumulated_threat_level": 2.3, "timewindow": 1} +{"Format": "IDEA0", "ID": "50bd417c-a249-46af-a4c0-91a4602a6a60", "DetectTime": "2024-05-21T12:24:16.170934+00:00", "EventTime": "2024-05-21T12:24:16.170952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cww3vLOabQLlsRIi4"], "accumulated_threat_level": 3.0999999999999996, "timewindow": 1} +{"Format": "IDEA0", "ID": "20dd0390-7f1f-4f64-a889-e9cba044df74", "DetectTime": "2024-05-21T12:24:16.182160+00:00", "EventTime": "2024-05-21T12:24:16.182179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COj9me3EACRMA5jnMh"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c2a30cd1-737c-4834-becd-220edf574ebe", "DetectTime": "2024-05-21T12:24:16.194909+00:00", "EventTime": "2024-05-21T12:24:16.194927+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COj9me3EACRMA5jnMh"], "accumulated_threat_level": 3.5999999999999996, "timewindow": 1} +{"Format": "IDEA0", "ID": "2a204c30-372a-4f22-be27-46969904d782", "DetectTime": "2024-05-21T12:24:16.211377+00:00", "EventTime": "2024-05-21T12:24:16.211395+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuv2z83Jui2qflaPi5"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "5c1edc6c-421f-41e5-97f0-94c9ccdd512a", "DetectTime": "2024-05-21T12:24:16.222441+00:00", "EventTime": "2024-05-21T12:24:16.222459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuv2z83Jui2qflaPi5"], "accumulated_threat_level": 4.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "46a4522b-8dcf-427d-9ab5-c121b4c172c5", "DetectTime": "2024-05-21T12:24:16.232454+00:00", "EventTime": "2024-05-21T12:24:16.232471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAVB9a2RNLLU5iAa"], "accumulated_threat_level": 0.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "339cec96-7f67-42fd-a752-d5b10740beeb", "DetectTime": "2024-05-21T12:24:16.245340+00:00", "EventTime": "2024-05-21T12:24:16.245358+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.194.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBd4sUeDcvdUf7Xf"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c33a7ab7-ce9e-43ad-89ac-e846f1aeea87", "DetectTime": "2024-05-21T12:24:16.257637+00:00", "EventTime": "2024-05-21T12:24:16.257656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBd4sUeDcvdUf7Xf"], "accumulated_threat_level": 4.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "010f6e47-c359-49ae-bbc9-267729b1ddbf", "DetectTime": "2024-05-21T12:24:16.269508+00:00", "EventTime": "2024-05-21T12:24:16.269530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.223.239.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhjmYSU5kyAnyPT2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "f5984480-8600-4fd7-8b3e-31d8f47314d6", "DetectTime": "2024-05-21T12:24:16.282679+00:00", "EventTime": "2024-05-21T12:24:16.282699+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.223.239.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhjmYSU5kyAnyPT2"], "accumulated_threat_level": 5.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "65bf2e5c-de8f-4f22-b599-eefca3e79700", "DetectTime": "2024-05-21T12:24:16.293630+00:00", "EventTime": "2024-05-21T12:24:16.293648+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuM7Xe4KJVD39dTlC8"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4f0574b2-0f80-41f3-ab17-97420f42f07d", "DetectTime": "2024-05-21T12:24:16.305333+00:00", "EventTime": "2024-05-21T12:24:16.305352+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuM7Xe4KJVD39dTlC8"], "accumulated_threat_level": 5.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "cf7fce9b-f397-4618-bb52-43b949eea028", "DetectTime": "2024-05-21T12:24:16.316850+00:00", "EventTime": "2024-05-21T12:24:16.316871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpDv33RL8aLptZjph"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "fb82899c-a2b8-456b-a0a5-6f720215d498", "DetectTime": "2024-05-21T12:24:16.328718+00:00", "EventTime": "2024-05-21T12:24:16.328736+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpDv33RL8aLptZjph"], "accumulated_threat_level": 6.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "7ebf323c-b60c-4b42-a42d-f1e9c0fe636e", "DetectTime": "2024-05-21T12:24:16.339525+00:00", "EventTime": "2024-05-21T12:24:16.339542+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPoNLzPEhnX8nJ7d"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4c9543e0-83b8-46d1-8f35-4d19a9ca4fc2", "DetectTime": "2024-05-21T12:24:16.355482+00:00", "EventTime": "2024-05-21T12:24:16.355499+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPoNLzPEhnX8nJ7d"], "accumulated_threat_level": 6.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "26fefbf7-a7da-413e-9bfc-989be079fd3e", "DetectTime": "2024-05-21T12:24:16.371947+00:00", "EventTime": "2024-05-21T12:24:16.371964+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.154.42.157"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJWle4UgAVbmXNKm4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "5cb3fe40-d99d-4c03-a030-c0866bbfdd0c", "DetectTime": "2024-05-21T12:24:16.383477+00:00", "EventTime": "2024-05-21T12:24:16.383496+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJWle4UgAVbmXNKm4"], "accumulated_threat_level": 7.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "a190c65a-29e5-4df7-8ebd-13093d040fd5", "DetectTime": "2024-05-21T12:24:16.400605+00:00", "EventTime": "2024-05-21T12:24:16.400622+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKNi92VUrJMrx76hh"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "7ac0468d-dfe6-4483-8d12-86248aa3de54", "DetectTime": "2024-05-21T12:24:16.413920+00:00", "EventTime": "2024-05-21T12:24:16.413940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKNi92VUrJMrx76hh"], "accumulated_threat_level": 7.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "af1aa8dd-b091-4d70-9b52-405522c36a48", "DetectTime": "2024-05-21T12:24:16.425651+00:00", "EventTime": "2024-05-21T12:24:16.425667+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGYum66sOI4hnoVg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4f76b4e2-c7cb-4723-aa2c-fd57617449d2", "DetectTime": "2024-05-21T12:24:16.438549+00:00", "EventTime": "2024-05-21T12:24:16.438569+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGYum66sOI4hnoVg"], "accumulated_threat_level": 8.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "c2fe9f15-33d0-4939-8be0-fba873b3844a", "DetectTime": "2024-05-21T12:24:16.458577+00:00", "EventTime": "2024-05-21T12:24:16.458596+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.96.126.57"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sezz2kohCSCZLQEj"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4f2b05ef-a18c-445e-8fa0-a2f0407b44b9", "DetectTime": "2024-05-21T12:24:16.469768+00:00", "EventTime": "2024-05-21T12:24:16.469785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.96.126.57"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sezz2kohCSCZLQEj"], "accumulated_threat_level": 8.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "bb332349-ea1c-4c07-ac0e-43ae98fc5b7c", "DetectTime": "2024-05-21T12:24:16.480083+00:00", "EventTime": "2024-05-21T12:24:16.480100+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.52.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Glu3tpOZDHt0CH8"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b62a66e5-0dd1-4db6-ba9b-2455d0f5d44a", "DetectTime": "2024-05-21T12:24:16.491377+00:00", "EventTime": "2024-05-21T12:24:16.491397+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.52.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Glu3tpOZDHt0CH8"], "accumulated_threat_level": 9.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "d42e0ca5-98ae-43b2-95d4-de9fe53bb830", "DetectTime": "2024-05-21T12:24:16.502170+00:00", "EventTime": "2024-05-21T12:24:16.502187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7FhsiJVFVrjfA86"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "2f5cd94d-34b3-4628-a2cb-770b90801b90", "DetectTime": "2024-05-21T12:24:16.516288+00:00", "EventTime": "2024-05-21T12:24:16.516307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7FhsiJVFVrjfA86"], "accumulated_threat_level": 9.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "834f004f-4294-4332-aa04-dd078d605ffd", "DetectTime": "2024-05-21T12:24:16.527924+00:00", "EventTime": "2024-05-21T12:24:16.527944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UbWt46pPkQ4POyOg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ecf21458-bf25-49ea-b1e2-e35c291f504a", "DetectTime": "2024-05-21T12:24:16.539494+00:00", "EventTime": "2024-05-21T12:24:16.539512+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UbWt46pPkQ4POyOg"], "accumulated_threat_level": 10.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "f5cf5d53-b7e5-4dcb-b541-18d093783a7a", "DetectTime": "2024-05-21T12:24:16.550110+00:00", "EventTime": "2024-05-21T12:24:16.550127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBF5XH2r6CqcurUv55"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "23da199b-8a7c-48c4-96d4-459bcce68ef4", "DetectTime": "2024-05-21T12:24:16.561161+00:00", "EventTime": "2024-05-21T12:24:16.561179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBF5XH2r6CqcurUv55"], "accumulated_threat_level": 10.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "c1bba02f-4dd5-4129-bfd2-594a597c50aa", "DetectTime": "2024-05-21T12:24:16.578752+00:00", "EventTime": "2024-05-21T12:24:16.578773+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.139.178.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3MMhj2GnBXwVBsFmb"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "3c027cfa-be73-4635-9df8-feabfaf2c0d4", "DetectTime": "2024-05-21T12:24:16.590125+00:00", "EventTime": "2024-05-21T12:24:16.590142+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3MMhj2GnBXwVBsFmb"], "accumulated_threat_level": 11.1, "timewindow": 1} +{"Format": "IDEA0", "ID": "974f7294-9750-49ba-b7fd-f2bca7928f7f", "DetectTime": "2024-05-21T12:24:16.600304+00:00", "EventTime": "2024-05-21T12:24:16.600322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRzWM1B55lGhO88Oa"], "accumulated_threat_level": 1.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "a42880f8-d54f-43b7-9ceb-9de66db26eb7", "DetectTime": "2024-05-21T12:24:16.611710+00:00", "EventTime": "2024-05-21T12:24:16.611728+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2L8U1gzDqfEHABi7"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4198ffc0-5b5b-4422-9ba1-94ff9a7f921f", "DetectTime": "2024-05-21T12:24:16.623789+00:00", "EventTime": "2024-05-21T12:24:16.623821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2L8U1gzDqfEHABi7"], "accumulated_threat_level": 11.6, "timewindow": 1} +{"Format": "IDEA0", "ID": "80204b28-6bcb-4ebf-838d-f0b7d6dda56e", "DetectTime": "2024-05-21T12:24:16.636572+00:00", "EventTime": "2024-05-21T12:24:16.636592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9jdu1ti3b4bVj2b3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "40af464d-27c5-41f3-a8dd-53582525b74c", "DetectTime": "2024-05-21T12:24:16.649007+00:00", "EventTime": "2024-05-21T12:24:16.649027+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9jdu1ti3b4bVj2b3"], "accumulated_threat_level": 12.1, "timewindow": 1} +{"Format": "Json", "ID": "40af464d-27c5-41f3-a8dd-53582525b74c", "DetectTime": "2024-05-21T12:24:16.649007+00:00", "EventTime": "2024-05-21T12:24:16.649027+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "1970-01-01T00:12:04.116424+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:17.054677)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "508f0935-5167-4e52-9196-efa19d35e91c", "DetectTime": "2024-05-21T12:24:17.070071+00:00", "EventTime": "2024-05-21T12:24:17.070088+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcUJJJWZTYCmp6y1"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "57c8f664-db96-4436-9272-4b5f2794075a", "DetectTime": "2024-05-21T12:24:17.081873+00:00", "EventTime": "2024-05-21T12:24:17.081892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcUJJJWZTYCmp6y1"], "accumulated_threat_level": 0.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "2fa9fe24-fbab-411b-a4ff-136e51a31289", "DetectTime": "2024-05-21T12:24:17.092290+00:00", "EventTime": "2024-05-21T12:24:17.092307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXJzE4j1DIGqPgC29"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "abeced69-c06f-482b-b1ae-bd9e4937401c", "DetectTime": "2024-05-21T12:24:17.103176+00:00", "EventTime": "2024-05-21T12:24:17.103196+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXJzE4j1DIGqPgC29"], "accumulated_threat_level": 1.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "dfd3d54e-c9d6-4321-950c-5a0dab3d527b", "DetectTime": "2024-05-21T12:24:17.115336+00:00", "EventTime": "2024-05-21T12:24:17.115391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.98.95.219"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zn9x4bwLTfEyttud"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c06ee0f3-7bff-46d9-850a-7223fc1219d1", "DetectTime": "2024-05-21T12:24:17.132122+00:00", "EventTime": "2024-05-21T12:24:17.132141+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.98.95.219"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zn9x4bwLTfEyttud"], "accumulated_threat_level": 1.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "dcaad261-3c81-49e7-8bd1-b9b259ccd105", "DetectTime": "2024-05-21T12:24:17.136557+00:00", "EventTime": "2024-05-21T12:24:17.136575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHFXDy4ztM0bxQMq2g", "Cc8Jqx2hDWjcgSFECi", "CT6UGy4P9BcvAQa607", "CK4dRi3AoXFIZbUONe"], "accumulated_threat_level": 2.1, "timewindow": 2} +{"Format": "IDEA0", "ID": "cb97b1ae-64f3-477b-b1dd-a442964fd63a", "DetectTime": "2024-05-21T12:24:17.146805+00:00", "EventTime": "2024-05-21T12:24:17.146822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.65.3.210"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgcS1A22Z180xRv5ve"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "79f53b9b-d0ee-4556-bc93-4184c5d7a28e", "DetectTime": "2024-05-21T12:24:17.157708+00:00", "EventTime": "2024-05-21T12:24:17.157727+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.65.3.210"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgcS1A22Z180xRv5ve"], "accumulated_threat_level": 2.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "944dee09-9b83-42df-aaeb-caf80b38b865", "DetectTime": "2024-05-21T12:24:17.204868+00:00", "EventTime": "2024-05-21T12:24:17.204885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5uT52kNYbaR2kgS1", "CYLHI82MOn95OoJ5Gc", "C1LiI11iPr1kZQZuD8", "CyoKYu1COxxkfFdKol"], "accumulated_threat_level": 2.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "d25847fd-9875-40a8-bf6e-4df376324c59", "DetectTime": "2024-05-21T12:24:17.230048+00:00", "EventTime": "2024-05-21T12:24:17.230065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClZWqo3tMyJlofCFUe"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "987fc8ae-e33d-4343-9bd7-be89bf19568f", "DetectTime": "2024-05-21T12:24:17.252996+00:00", "EventTime": "2024-05-21T12:24:17.253018+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClZWqo3tMyJlofCFUe"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "3d3ae097-9b42-4d47-bbba-f9b8dc221469", "DetectTime": "2024-05-21T12:24:17.263414+00:00", "EventTime": "2024-05-21T12:24:17.263432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ54xb4bFkaT4ELGhe"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "cc992336-3dcd-406a-8cce-02908e4bac2d", "DetectTime": "2024-05-21T12:24:17.276286+00:00", "EventTime": "2024-05-21T12:24:17.276308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMrOQ2rB4V0j8zbsi"], "accumulated_threat_level": 4.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "541c4740-98b2-4faa-8d65-c1acb60835a4", "DetectTime": "2024-05-21T12:24:17.288906+00:00", "EventTime": "2024-05-21T12:24:17.288927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ8Nb1IxWcU8QFLu5"], "accumulated_threat_level": 5.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "8341878e-8955-4a6a-9b79-fb23a2839417", "DetectTime": "2024-05-21T12:24:17.303519+00:00", "EventTime": "2024-05-21T12:24:17.303536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyJMkl3EMAyNAsh9Xa"], "accumulated_threat_level": 5.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "a0a4a372-4c52-4567-b2ff-0acce44a927b", "DetectTime": "2024-05-21T12:24:17.328476+00:00", "EventTime": "2024-05-21T12:24:17.328494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN0VbzFQ1buXsu8i4"], "accumulated_threat_level": 6.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "6876986d-5c1f-4d53-9a46-e2798a5bf806", "DetectTime": "2024-05-21T12:24:17.346130+00:00", "EventTime": "2024-05-21T12:24:17.346149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wHHM1vzGXmmPpzZj"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 2} +{"Format": "IDEA0", "ID": "dec4ecf7-5d9b-4823-a58d-bb15e2fa6da7", "DetectTime": "2024-05-21T12:24:17.361975+00:00", "EventTime": "2024-05-21T12:24:17.361993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vtF13kBjMfd7bM9c"], "accumulated_threat_level": 8.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "f0ca6d62-f1ac-46e0-8e3a-93f1bc1c6b7a", "DetectTime": "2024-05-21T12:24:17.391400+00:00", "EventTime": "2024-05-21T12:24:17.391418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLifBt3c5682tK02j9"], "accumulated_threat_level": 9.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "8d403e90-5bf1-44e0-ba97-04e16d039668", "DetectTime": "2024-05-21T12:24:17.409079+00:00", "EventTime": "2024-05-21T12:24:17.409096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTkDOR1r970YookV2"], "accumulated_threat_level": 9.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "ef6f2648-0ccd-4311-a20c-6ae00d9ad569", "DetectTime": "2024-05-21T12:24:17.437676+00:00", "EventTime": "2024-05-21T12:24:17.437695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CraRU94dWZAZfl5KO1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 2} +{"Format": "IDEA0", "ID": "52162e0e-5302-4611-af06-133efbc2c735", "DetectTime": "2024-05-21T12:24:17.455531+00:00", "EventTime": "2024-05-21T12:24:17.455549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDFs5nKwiGjA4g3jg"], "accumulated_threat_level": 11.400000000000002, "timewindow": 2} +{"Format": "IDEA0", "ID": "debdbc80-1c51-44c2-80cf-d4e15972e666", "DetectTime": "2024-05-21T12:24:17.493937+00:00", "EventTime": "2024-05-21T12:24:17.493956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRTzZ14nes6kMVVq3"], "accumulated_threat_level": 12.200000000000003, "timewindow": 2} +{"Format": "Json", "ID": "debdbc80-1c51-44c2-80cf-d4e15972e666", "DetectTime": "2024-05-21T12:24:17.493937+00:00", "EventTime": "2024-05-21T12:24:17.493956+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "1970-01-01T01:17:26.669883+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2024/05/21 12:24:17.713226)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 2, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "a52f1ab7-e90b-45a2-9096-65887f829468", "DetectTime": "2024-05-21T12:24:17.722960+00:00", "EventTime": "2024-05-21T12:24:17.722979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zxA72jfpxNPEYiyl"], "accumulated_threat_level": 0.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "dfc6685b-947c-4f06-9420-00ea882f99ad", "DetectTime": "2024-05-21T12:24:17.738185+00:00", "EventTime": "2024-05-21T12:24:17.738203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoXwX14R0yvuGtRPc"], "accumulated_threat_level": 1.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "cad17286-131d-48e4-9fc1-f3a4246ab14c", "DetectTime": "2024-05-21T12:24:17.750003+00:00", "EventTime": "2024-05-21T12:24:17.750022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwVwXT33T3SZe2qnj7"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "dbd39376-5fa2-436e-b4c1-47a4780575aa", "DetectTime": "2024-05-21T12:24:17.761807+00:00", "EventTime": "2024-05-21T12:24:17.761824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwVwXT33T3SZe2qnj7"], "accumulated_threat_level": 3.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "d11d7833-54cb-43dd-bed0-f0ca8bca727f", "DetectTime": "2024-05-21T12:24:17.772289+00:00", "EventTime": "2024-05-21T12:24:17.772307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9rPG113QKlY4mRN4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4afe25de-f76b-451b-892a-1f945cb5f870", "DetectTime": "2024-05-21T12:24:17.783854+00:00", "EventTime": "2024-05-21T12:24:17.783874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9rPG113QKlY4mRN4"], "accumulated_threat_level": 3.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "de44790e-9fb4-4985-9efd-9e411584c3f7", "DetectTime": "2024-05-21T12:24:17.796642+00:00", "EventTime": "2024-05-21T12:24:17.796658+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqduHm62br85u1Aa"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "2f76c1f6-2002-4923-ac7d-cc3d663d6439", "DetectTime": "2024-05-21T12:24:17.810131+00:00", "EventTime": "2024-05-21T12:24:17.810149+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqduHm62br85u1Aa"], "accumulated_threat_level": 4.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1216e06d-55f3-4a7d-95fe-a069587cd58f", "DetectTime": "2024-05-21T12:24:17.820707+00:00", "EventTime": "2024-05-21T12:24:17.820725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpcisg1bNHIoOwKyfk"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "f35c98f2-eb01-4a38-9d86-25e240503fce", "DetectTime": "2024-05-21T12:24:17.832023+00:00", "EventTime": "2024-05-21T12:24:17.832042+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpcisg1bNHIoOwKyfk"], "accumulated_threat_level": 4.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "be7cc5cb-c0b8-426e-a9ac-56ed1104d39c", "DetectTime": "2024-05-21T12:24:17.842923+00:00", "EventTime": "2024-05-21T12:24:17.842941+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO66dslw6YGIRyQ8"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4bfac76c-fe3a-45dd-bf8b-34485e57747b", "DetectTime": "2024-05-21T12:24:17.854338+00:00", "EventTime": "2024-05-21T12:24:17.854357+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO66dslw6YGIRyQ8"], "accumulated_threat_level": 5.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "472e8ed7-30af-4ccc-9597-8539be32cd87", "DetectTime": "2024-05-21T12:24:17.865202+00:00", "EventTime": "2024-05-21T12:24:17.865220+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.223.239.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Hnd01URzROGblku2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "fd3dd800-9d0f-408f-9c7f-7388fb14248f", "DetectTime": "2024-05-21T12:24:17.875971+00:00", "EventTime": "2024-05-21T12:24:17.875990+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.223.239.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Hnd01URzROGblku2"], "accumulated_threat_level": 5.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e28146b6-0485-4922-b7f3-fc12aeac6e0d", "DetectTime": "2024-05-21T12:24:17.888047+00:00", "EventTime": "2024-05-21T12:24:17.888065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.194.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRan813QW3tazOmxW5"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "661797ec-bf9e-475a-ae35-c5981ffb55e6", "DetectTime": "2024-05-21T12:24:17.898958+00:00", "EventTime": "2024-05-21T12:24:17.898976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRan813QW3tazOmxW5"], "accumulated_threat_level": 6.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "1f641fad-f72a-498b-8ada-1aaa91b3ec3e", "DetectTime": "2024-05-21T12:24:17.909045+00:00", "EventTime": "2024-05-21T12:24:17.909063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26co54AV2OsE7vP5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "5bedca27-baea-4a40-81fd-d272a47ea34e", "DetectTime": "2024-05-21T12:24:17.919577+00:00", "EventTime": "2024-05-21T12:24:17.919595+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLBHy3bFxbNqGwlfi"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "02cfbd18-aa2c-4fe3-ad5c-34f25cbb1238", "DetectTime": "2024-05-21T12:24:17.931316+00:00", "EventTime": "2024-05-21T12:24:17.931335+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLBHy3bFxbNqGwlfi"], "accumulated_threat_level": 6.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7d223a7f-5dc3-42a1-a8ce-915a270801bb", "DetectTime": "2024-05-21T12:24:17.941701+00:00", "EventTime": "2024-05-21T12:24:17.941717+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.154.42.157"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mgts3axX0xenoiQ1"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "de321423-87ef-45e0-9c4b-e8df429a5209", "DetectTime": "2024-05-21T12:24:17.953704+00:00", "EventTime": "2024-05-21T12:24:17.953725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mgts3axX0xenoiQ1"], "accumulated_threat_level": 7.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "e1977720-2832-4a5f-9b53-a69b14dbfae0", "DetectTime": "2024-05-21T12:24:17.963670+00:00", "EventTime": "2024-05-21T12:24:17.963688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaTch3jvgnlEE8ghg"], "accumulated_threat_level": 3.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "6c413fc2-dd61-4a16-be85-a42973154c11", "DetectTime": "2024-05-21T12:24:17.974016+00:00", "EventTime": "2024-05-21T12:24:17.974034+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7PMNP3y2N9SJ59Wtd"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4070070c-cac8-400c-99cd-99ce9feea868", "DetectTime": "2024-05-21T12:24:17.986147+00:00", "EventTime": "2024-05-21T12:24:17.986167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7PMNP3y2N9SJ59Wtd"], "accumulated_threat_level": 7.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "438f8005-c9e8-4f64-8434-d71df76e9524", "DetectTime": "2024-05-21T12:24:17.997165+00:00", "EventTime": "2024-05-21T12:24:17.997183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09S631eYUYCWp4c5j"], "accumulated_threat_level": 4.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "0c97fde3-e3c3-4949-b1be-98bbc28bbdff", "DetectTime": "2024-05-21T12:24:18.009263+00:00", "EventTime": "2024-05-21T12:24:18.009281+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbiKv22LqBjLUN8g2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "10efc474-cd41-4be4-9464-275325bbdda7", "DetectTime": "2024-05-21T12:24:18.022311+00:00", "EventTime": "2024-05-21T12:24:18.022336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbiKv22LqBjLUN8g2"], "accumulated_threat_level": 8.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "eff739e8-508f-4f30-9bde-0c35ef9b3363", "DetectTime": "2024-05-21T12:24:18.037767+00:00", "EventTime": "2024-05-21T12:24:18.037784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJu0HwcWY9meGGCg1"], "accumulated_threat_level": 4.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "21860c9a-63a5-4d7f-85ca-e64631fd584c", "DetectTime": "2024-05-21T12:24:18.049171+00:00", "EventTime": "2024-05-21T12:24:18.049189+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqbRUJKnO809H0Eg"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "78904039-dbd6-4092-89f8-78362ce14b19", "DetectTime": "2024-05-21T12:24:18.061113+00:00", "EventTime": "2024-05-21T12:24:18.061131+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqbRUJKnO809H0Eg"], "accumulated_threat_level": 8.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e5218358-bb6f-4fdf-ad96-20385446c15c", "DetectTime": "2024-05-21T12:24:18.072890+00:00", "EventTime": "2024-05-21T12:24:18.072909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXcV3z9fMpV6oupj"], "accumulated_threat_level": 5.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "5798cba1-3609-4e10-8bfd-9537b914b268", "DetectTime": "2024-05-21T12:24:18.083882+00:00", "EventTime": "2024-05-21T12:24:18.083900+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.96.126.57"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cid2qf2YZnpan7HSa3"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "c70a03fe-8dd1-49cc-a455-9b75d4e96b0e", "DetectTime": "2024-05-21T12:24:18.096614+00:00", "EventTime": "2024-05-21T12:24:18.096632+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.96.126.57"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cid2qf2YZnpan7HSa3"], "accumulated_threat_level": 9.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9a9210b2-de51-488a-8aa9-181db97a1254", "DetectTime": "2024-05-21T12:24:18.106369+00:00", "EventTime": "2024-05-21T12:24:18.106386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgK7dX2J3Zixaev8T1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 2} +{"Format": "IDEA0", "ID": "8c52732b-faae-47de-be48-a950847dfbcc", "DetectTime": "2024-05-21T12:24:18.116934+00:00", "EventTime": "2024-05-21T12:24:18.116952+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.52.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Mg3wBOFZChUJ95f"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "0b22f4b2-b467-44cc-9693-ffe25a3a812f", "DetectTime": "2024-05-21T12:24:18.127792+00:00", "EventTime": "2024-05-21T12:24:18.127810+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.52.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Mg3wBOFZChUJ95f"], "accumulated_threat_level": 9.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9529fbb9-421c-43a9-a3cd-0ae2e4efdd4a", "DetectTime": "2024-05-21T12:24:18.137698+00:00", "EventTime": "2024-05-21T12:24:18.137716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLtVp3wzbCCKwnri"], "accumulated_threat_level": 7.199999999999999, "timewindow": 2} +{"Format": "IDEA0", "ID": "7178f50c-31b7-43ba-97f0-3c3708eac441", "DetectTime": "2024-05-21T12:24:18.148347+00:00", "EventTime": "2024-05-21T12:24:18.148365+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNGlO3VWSNgNN5tQl"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "74fa5f53-0d41-46e8-9ad7-12e2a7aaad0b", "DetectTime": "2024-05-21T12:24:18.158704+00:00", "EventTime": "2024-05-21T12:24:18.158722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefuHROx4nTaQo0Z7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 2} +{"Format": "IDEA0", "ID": "4ecfb735-d928-4f19-8ad1-05d8a8ae7972", "DetectTime": "2024-05-21T12:24:18.169680+00:00", "EventTime": "2024-05-21T12:24:18.169698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNGlO3VWSNgNN5tQl"], "accumulated_threat_level": 10.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "4d0170c3-8e2c-43a1-986d-8e5d131998e8", "DetectTime": "2024-05-21T12:24:18.180069+00:00", "EventTime": "2024-05-21T12:24:18.180086+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.139.178.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwk6oP1imwHfq69xV1"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "b6b10509-b47e-414f-937d-5c17c76af142", "DetectTime": "2024-05-21T12:24:18.191112+00:00", "EventTime": "2024-05-21T12:24:18.191129+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwk6oP1imwHfq69xV1"], "accumulated_threat_level": 10.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f96fdf48-1814-452f-9a5a-21ee20f0652a", "DetectTime": "2024-05-21T12:24:18.201576+00:00", "EventTime": "2024-05-21T12:24:18.201595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "Connection to unknown destination port 6717/UDP destination IP 24.139.178.44. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNdDk3cYp7S3dh5a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 2} +{"Format": "IDEA0", "ID": "2c568af4-6b76-4ac5-bdeb-731a49928757", "DetectTime": "2024-05-21T12:24:18.211832+00:00", "EventTime": "2024-05-21T12:24:18.211850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOBpt1bEHyLtb7bE1"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "6ba930e5-43e4-4f51-9ad5-830155ff472f", "DetectTime": "2024-05-21T12:24:18.223094+00:00", "EventTime": "2024-05-21T12:24:18.223112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOBpt1bEHyLtb7bE1"], "accumulated_threat_level": 11.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "bc6da983-5f55-40be-82e5-1e21d0d34ff2", "DetectTime": "2024-05-21T12:24:18.242741+00:00", "EventTime": "2024-05-21T12:24:18.242762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZUZE12CiMmnVWtc"], "accumulated_threat_level": 9.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "32ce4c87-9b2e-4184-8be3-925819a6e1f0", "DetectTime": "2024-05-21T12:24:18.255462+00:00", "EventTime": "2024-05-21T12:24:18.255482+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTzHvo4Qmp83aKC7"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9d862ea3-35be-49b3-a639-a5119ed3cdba", "DetectTime": "2024-05-21T12:24:18.266856+00:00", "EventTime": "2024-05-21T12:24:18.266874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTzHvo4Qmp83aKC7"], "accumulated_threat_level": 11.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9e4ff5e6-69aa-4893-8efb-4ff43abe466c", "DetectTime": "2024-05-21T12:24:18.277222+00:00", "EventTime": "2024-05-21T12:24:18.277239+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6nRc149mnmaj0aG2"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "ff22b281-94c4-4ee4-9ee4-99609c7bd2fc", "DetectTime": "2024-05-21T12:24:18.288637+00:00", "EventTime": "2024-05-21T12:24:18.288656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6nRc149mnmaj0aG2"], "accumulated_threat_level": 12.0, "timewindow": 1} +{"Format": "Json", "ID": "ff22b281-94c4-4ee4-9ee4-99609c7bd2fc", "DetectTime": "2024-05-21T12:24:18.288637+00:00", "EventTime": "2024-05-21T12:24:18.288656+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "1970-01-01T00:44:03.345303+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 1. (real time 2024/05/21 12:24:18.775054)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 1, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "50c4c3b2-6dc0-42c2-875f-36f1a0793b9b", "DetectTime": "2024-05-21T12:24:18.786703+00:00", "EventTime": "2024-05-21T12:24:18.786721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuGps3HihPboDdoJj"], "accumulated_threat_level": 10.4, "timewindow": 2} +{"Format": "IDEA0", "ID": "448073af-fc19-476e-a017-d3aa61ca86b6", "DetectTime": "2024-05-21T12:24:18.797238+00:00", "EventTime": "2024-05-21T12:24:18.797256+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hPE93T1ahmtEeyYi"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "361cf9fe-65f0-4785-8221-66f8d6c35ec6", "DetectTime": "2024-05-21T12:24:18.808913+00:00", "EventTime": "2024-05-21T12:24:18.808931+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hPE93T1ahmtEeyYi"], "accumulated_threat_level": 0.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "3569a8b5-ac9a-416b-9254-e1eefbd3ec5d", "DetectTime": "2024-05-21T12:24:18.819429+00:00", "EventTime": "2024-05-21T12:24:18.819446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLCSy2oEc1XXK6DJ4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "9effa026-d95b-49b1-94a6-9aa56945eb70", "DetectTime": "2024-05-21T12:24:18.830831+00:00", "EventTime": "2024-05-21T12:24:18.830850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLCSy2oEc1XXK6DJ4"], "accumulated_threat_level": 1.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "de122ffd-7b35-42fd-ac30-52dd2fe78c6e", "DetectTime": "2024-05-21T12:24:18.841024+00:00", "EventTime": "2024-05-21T12:24:18.841042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6K6551xuHesiQiRhj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 2} +{"Format": "IDEA0", "ID": "8a981156-419a-442a-85c0-ada6a52566f6", "DetectTime": "2024-05-21T12:24:18.851531+00:00", "EventTime": "2024-05-21T12:24:18.851548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.65.3.210"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14ybo1VWZJSqi4nql"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "5b6b3dd8-2dbd-4dd3-a363-d7b5f3263f4d", "DetectTime": "2024-05-21T12:24:18.862538+00:00", "EventTime": "2024-05-21T12:24:18.862557+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.65.3.210"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14ybo1VWZJSqi4nql"], "accumulated_threat_level": 1.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a708ed23-7d97-4451-bf60-a0c514cc4652", "DetectTime": "2024-05-21T12:24:18.873013+00:00", "EventTime": "2024-05-21T12:24:18.873030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cww3vLOabQLlsRIi4"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "8a7d1eef-3de4-41ca-9088-4bf963318c7e", "DetectTime": "2024-05-21T12:24:18.884796+00:00", "EventTime": "2024-05-21T12:24:18.884814+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cww3vLOabQLlsRIi4"], "accumulated_threat_level": 2.0, "timewindow": 1} +{"Format": "IDEA0", "ID": "0725f05b-35b7-4909-ab66-05c81bdeb22f", "DetectTime": "2024-05-21T12:24:18.894727+00:00", "EventTime": "2024-05-21T12:24:18.894744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUzSRJDHxnlDcyvh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 2} +{"Format": "Json", "ID": "0725f05b-35b7-4909-ab66-05c81bdeb22f", "DetectTime": "2024-05-21T12:24:18.894727+00:00", "EventTime": "2024-05-21T12:24:18.894744+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "1970-01-01T01:17:29.990708+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2024/05/21 12:24:19.036345)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 2, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "15b1023f-a4f4-4fa1-8e47-116f78100d83", "DetectTime": "2024-05-21T12:24:19.047625+00:00", "EventTime": "2024-05-21T12:24:19.047644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.98.95.219"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMMfg3HPrYDdkf2O9"], "accumulated_threat_level": 0, "timewindow": 1} +{"Format": "IDEA0", "ID": "0b5d6dc5-0442-48dc-92ee-f22bc6586c65", "DetectTime": "2024-05-21T12:24:19.059529+00:00", "EventTime": "2024-05-21T12:24:19.059548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.98.95.219"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMMfg3HPrYDdkf2O9"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0be115a9-a495-417f-9859-89d8368922de", "DetectTime": "2024-05-21T12:24:19.070605+00:00", "EventTime": "2024-05-21T12:24:19.070625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKI5WMvgu7IPw0F7l"], "accumulated_threat_level": 0.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "9947f537-9985-4bcc-b21e-8d2735d35e07", "DetectTime": "2024-05-21T12:24:19.080695+00:00", "EventTime": "2024-05-21T12:24:19.080714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RHStCiuVnyKioej"], "accumulated_threat_level": 1.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "127b6188-03e8-49cf-a37e-17085fecefc1", "DetectTime": "2024-05-21T12:24:19.091857+00:00", "EventTime": "2024-05-21T12:24:19.091876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWonx2ByGEqx0x4Zd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "55d2beaa-0c63-439d-988f-f65fde925a4d", "DetectTime": "2024-05-21T12:24:19.101997+00:00", "EventTime": "2024-05-21T12:24:19.102014+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.223.239.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMm3k3FXWffsLOKdj"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "3347896c-f65f-43a5-9d42-e49291742023", "DetectTime": "2024-05-21T12:24:19.112811+00:00", "EventTime": "2024-05-21T12:24:19.112829+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.223.239.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.223.239.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMm3k3FXWffsLOKdj"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "ece1b4a0-0788-4bc5-aa15-b7ba4ffe4026", "DetectTime": "2024-05-21T12:24:19.123099+00:00", "EventTime": "2024-05-21T12:24:19.123116+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.154.42.157"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYi6i3yBeNSgoafBf"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "3537350b-b1c7-4f25-b98f-de37cea570a3", "DetectTime": "2024-05-21T12:24:19.134947+00:00", "EventTime": "2024-05-21T12:24:19.134969+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.154.42.157"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.154.42.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYi6i3yBeNSgoafBf"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "869478ad-c7fc-439d-89e4-e5c5c804f79c", "DetectTime": "2024-05-21T12:24:19.151037+00:00", "EventTime": "2024-05-21T12:24:19.151056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzoTkf473Q3khMNWR1"], "accumulated_threat_level": 4.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "88ccfd80-f42c-42ea-99a9-d12cc75edfed", "DetectTime": "2024-05-21T12:24:19.161774+00:00", "EventTime": "2024-05-21T12:24:19.161791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.52.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFcoE277eCIoQSdbf"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "5744e268-a343-42a6-b200-0ab336f4cfe8", "DetectTime": "2024-05-21T12:24:19.172261+00:00", "EventTime": "2024-05-21T12:24:19.172279+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.52.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.52.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFcoE277eCIoQSdbf"], "accumulated_threat_level": 4.7, "timewindow": 2} +{"Format": "IDEA0", "ID": "17d685a5-e89f-49d3-a685-3e6f8aa7e33c", "DetectTime": "2024-05-21T12:24:19.182528+00:00", "EventTime": "2024-05-21T12:24:19.182545+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.96.126.57"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C68Nlv1K7D3TXaalf9"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "aff58a34-fc8a-412a-bc06-5f965ac32065", "DetectTime": "2024-05-21T12:24:19.193923+00:00", "EventTime": "2024-05-21T12:24:19.193940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.96.126.57"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.96.126.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C68Nlv1K7D3TXaalf9"], "accumulated_threat_level": 5.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "054087c4-38d5-4288-ab17-4ae170564b43", "DetectTime": "2024-05-21T12:24:19.210876+00:00", "EventTime": "2024-05-21T12:24:19.210899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.98.95.219"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMy8Yaev4cEKvVr6i"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e9928047-f77e-4067-80e6-54a402ae8c47", "DetectTime": "2024-05-21T12:24:19.222941+00:00", "EventTime": "2024-05-21T12:24:19.222960+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.98.95.219"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.98.95.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMy8Yaev4cEKvVr6i"], "accumulated_threat_level": 5.7, "timewindow": 2} +{"Format": "IDEA0", "ID": "5c50ecd5-52ce-4726-a303-e376589e2a46", "DetectTime": "2024-05-21T12:24:19.234709+00:00", "EventTime": "2024-05-21T12:24:19.234728+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.65.3.210"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEYPJxi2v3uidspH6"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "6d104156-9f85-4a1e-ad5d-0e8bed4ef9e2", "DetectTime": "2024-05-21T12:24:19.245605+00:00", "EventTime": "2024-05-21T12:24:19.245623+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.65.3.210"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.65.3.210 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEYPJxi2v3uidspH6"], "accumulated_threat_level": 6.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "4da4b34a-08a9-4098-9695-2f557ad42af7", "DetectTime": "2024-05-21T12:24:19.257294+00:00", "EventTime": "2024-05-21T12:24:19.257312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBoRMUeullDtxzbVj"], "accumulated_threat_level": 7.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e4b921ac-76fb-4fb2-8a16-b4e6e7485a64", "DetectTime": "2024-05-21T12:24:19.279553+00:00", "EventTime": "2024-05-21T12:24:19.279572+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMrOQ2rB4V0j8zbsi"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "57d8b379-15c5-43c9-82cf-556392cc5e87", "DetectTime": "2024-05-21T12:24:19.291749+00:00", "EventTime": "2024-05-21T12:24:19.291770+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMrOQ2rB4V0j8zbsi"], "accumulated_threat_level": 7.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "0cd28729-3ed7-44f6-93ab-73786314016a", "DetectTime": "2024-05-21T12:24:19.305107+00:00", "EventTime": "2024-05-21T12:24:19.305127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ8Nb1IxWcU8QFLu5"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "5544b75d-5b7f-4f47-a0fc-f94d4624863c", "DetectTime": "2024-05-21T12:24:19.316732+00:00", "EventTime": "2024-05-21T12:24:19.316749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ8Nb1IxWcU8QFLu5"], "accumulated_threat_level": 8.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "6763473b-23f9-444e-9c98-c3598fe84784", "DetectTime": "2024-05-21T12:24:19.328223+00:00", "EventTime": "2024-05-21T12:24:19.328241+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN0VbzFQ1buXsu8i4"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "92ac9439-ee8c-4c8f-b221-38f889337a10", "DetectTime": "2024-05-21T12:24:19.340414+00:00", "EventTime": "2024-05-21T12:24:19.340431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN0VbzFQ1buXsu8i4"], "accumulated_threat_level": 8.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "9ae374b8-03a3-4f9e-98a3-0b9222348cd2", "DetectTime": "2024-05-21T12:24:19.350645+00:00", "EventTime": "2024-05-21T12:24:19.350664+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vtF13kBjMfd7bM9c"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "3e71fd05-f85e-47a3-bd50-40636b406d11", "DetectTime": "2024-05-21T12:24:19.362544+00:00", "EventTime": "2024-05-21T12:24:19.362561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vtF13kBjMfd7bM9c"], "accumulated_threat_level": 9.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e8db5613-211c-424e-9c8d-29384d6cce50", "DetectTime": "2024-05-21T12:24:19.372629+00:00", "EventTime": "2024-05-21T12:24:19.372646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLifBt3c5682tK02j9"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "54e2402a-862c-490c-a329-725b12a20fe6", "DetectTime": "2024-05-21T12:24:19.382759+00:00", "EventTime": "2024-05-21T12:24:19.382777+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLifBt3c5682tK02j9"], "accumulated_threat_level": 9.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "ff66f009-a257-434c-b11c-b11fcf13c158", "DetectTime": "2024-05-21T12:24:19.393429+00:00", "EventTime": "2024-05-21T12:24:19.393448+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.194.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTHSU2yR33rt0miYh"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "cbf3a763-cc97-4488-a6a5-b13ede59b439", "DetectTime": "2024-05-21T12:24:19.405231+00:00", "EventTime": "2024-05-21T12:24:19.405250+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTHSU2yR33rt0miYh"], "accumulated_threat_level": 10.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "659c566c-0ee6-436b-a229-df4954cc919d", "DetectTime": "2024-05-21T12:24:19.420626+00:00", "EventTime": "2024-05-21T12:24:19.420643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRTzZ14nes6kMVVq3"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "3d6b69ab-b73c-4fe1-a88c-3e1893db6f10", "DetectTime": "2024-05-21T12:24:19.431288+00:00", "EventTime": "2024-05-21T12:24:19.431307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRTzZ14nes6kMVVq3"], "accumulated_threat_level": 10.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "5bc2d70a-a8b6-42d1-83e6-ef7ef928f1a3", "DetectTime": "2024-05-21T12:24:19.441459+00:00", "EventTime": "2024-05-21T12:24:19.441477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zxA72jfpxNPEYiyl"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "ed51e00a-53f0-4558-a9c0-67c20fb4440e", "DetectTime": "2024-05-21T12:24:19.451607+00:00", "EventTime": "2024-05-21T12:24:19.451625+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zxA72jfpxNPEYiyl"], "accumulated_threat_level": 11.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "9a3bb479-6808-469d-b57f-d5331de5d0e1", "DetectTime": "2024-05-21T12:24:19.462091+00:00", "EventTime": "2024-05-21T12:24:19.462109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26co54AV2OsE7vP5"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "65bfae6e-8659-476f-b1d5-ab1f0ec57b0e", "DetectTime": "2024-05-21T12:24:19.473438+00:00", "EventTime": "2024-05-21T12:24:19.473456+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26co54AV2OsE7vP5"], "accumulated_threat_level": 11.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "d41c54fa-ab18-4c51-81b3-e8d762098d9b", "DetectTime": "2024-05-21T12:24:19.484845+00:00", "EventTime": "2024-05-21T12:24:19.484862+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09S631eYUYCWp4c5j"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "81fc532c-945a-49c8-aad8-a13369b34001", "DetectTime": "2024-05-21T12:24:19.496405+00:00", "EventTime": "2024-05-21T12:24:19.496423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09S631eYUYCWp4c5j"], "accumulated_threat_level": 12.0, "timewindow": 2} +{"Format": "Json", "ID": "81fc532c-945a-49c8-aad8-a13369b34001", "DetectTime": "2024-05-21T12:24:19.496405+00:00", "EventTime": "2024-05-21T12:24:19.496423+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "1970-01-01T01:17:27.710603+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2024/05/21 12:24:19.678394)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 2, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "984978a4-061c-42ec-8f1a-46b8ea024211", "DetectTime": "2024-05-21T12:24:19.694461+00:00", "EventTime": "2024-05-21T12:24:19.694479+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgK7dX2J3Zixaev8T1"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "3044d08a-a76d-4ba1-a171-cccf93c38b9f", "DetectTime": "2024-05-21T12:24:19.705999+00:00", "EventTime": "2024-05-21T12:24:19.706018+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgK7dX2J3Zixaev8T1"], "accumulated_threat_level": 0.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "0ee75628-9371-413b-a06e-e828e0e3f776", "DetectTime": "2024-05-21T12:24:19.717110+00:00", "EventTime": "2024-05-21T12:24:19.717128+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLtVp3wzbCCKwnri"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "c6213b3e-1b33-4e3a-bcc8-dd3bb9920a3f", "DetectTime": "2024-05-21T12:24:19.728261+00:00", "EventTime": "2024-05-21T12:24:19.728280+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLtVp3wzbCCKwnri"], "accumulated_threat_level": 1.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e7dc1d80-134b-484b-ba31-a94db1381328", "DetectTime": "2024-05-21T12:24:19.745195+00:00", "EventTime": "2024-05-21T12:24:19.745213+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.139.178.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNdDk3cYp7S3dh5a"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "ef0b2c49-d434-4e85-a30e-824ad766ebce", "DetectTime": "2024-05-21T12:24:19.756482+00:00", "EventTime": "2024-05-21T12:24:19.756501+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNdDk3cYp7S3dh5a"], "accumulated_threat_level": 1.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "8f41eb29-60f7-4b3d-a14c-eed3d4a70f59", "DetectTime": "2024-05-21T12:24:19.766769+00:00", "EventTime": "2024-05-21T12:24:19.766786+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUzSRJDHxnlDcyvh"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "4c6f8403-e231-43a9-80f8-e14c6c8b9e0c", "DetectTime": "2024-05-21T12:24:19.777742+00:00", "EventTime": "2024-05-21T12:24:19.777760+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUzSRJDHxnlDcyvh"], "accumulated_threat_level": 2.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "dbe1c083-232b-4ef4-8b7d-1d12b1497c62", "DetectTime": "2024-05-21T12:24:19.788902+00:00", "EventTime": "2024-05-21T12:24:19.788920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKI5WMvgu7IPw0F7l"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "fe68a608-5130-4faa-8f9b-d80ba36166c8", "DetectTime": "2024-05-21T12:24:19.802062+00:00", "EventTime": "2024-05-21T12:24:19.802080+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKI5WMvgu7IPw0F7l"], "accumulated_threat_level": 2.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "1815e7ee-df77-4066-b7e0-922b09405a58", "DetectTime": "2024-05-21T12:24:19.812252+00:00", "EventTime": "2024-05-21T12:24:19.812270+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWonx2ByGEqx0x4Zd"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "478d0f4e-3899-42de-aa42-bf4b4e6e83e7", "DetectTime": "2024-05-21T12:24:19.824462+00:00", "EventTime": "2024-05-21T12:24:19.824481+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWonx2ByGEqx0x4Zd"], "accumulated_threat_level": 3.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "56127b00-a547-45b8-9b53-4a7c41d74ccb", "DetectTime": "2024-05-21T12:24:19.834845+00:00", "EventTime": "2024-05-21T12:24:19.834863+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAE0Va4doXjRgdwbW4"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "91863584-3631-4566-b951-06c6faabda71", "DetectTime": "2024-05-21T12:24:19.845299+00:00", "EventTime": "2024-05-21T12:24:19.845319+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAE0Va4doXjRgdwbW4"], "accumulated_threat_level": 3.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "8b325662-f1ef-4c19-8d0f-eb06e3a963af", "DetectTime": "2024-05-21T12:24:19.856083+00:00", "EventTime": "2024-05-21T12:24:19.856100+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzoTkf473Q3khMNWR1"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "4f722b46-5d59-49c4-87ed-6bc7e52e2c0f", "DetectTime": "2024-05-21T12:24:19.866774+00:00", "EventTime": "2024-05-21T12:24:19.866793+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzoTkf473Q3khMNWR1"], "accumulated_threat_level": 4.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "36c4add6-3ea3-482e-a627-a7d1da74f59c", "DetectTime": "2024-05-21T12:24:19.876823+00:00", "EventTime": "2024-05-21T12:24:19.876841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8Xtr43PcmacIgxek", "CGywo23oOx6JWzzB88", "CWiSQC3KN2QpRxsHIl", "ChXPQx2rGRSKtJL9U8"], "accumulated_threat_level": 4.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "619ce38e-2cff-4384-8b1e-2d4cbcef234c", "DetectTime": "2024-05-21T12:24:19.891051+00:00", "EventTime": "2024-05-21T12:24:19.891069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpkCrQ17d5oppI1dh9"], "accumulated_threat_level": 5.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "b4227a6f-9c25-42cb-bd4e-457ec4618e47", "DetectTime": "2024-05-21T12:24:19.901548+00:00", "EventTime": "2024-05-21T12:24:19.901566+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.194.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56bTL1pBAo5GfIVM5"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "bd55f234-c49f-4135-9a8d-6639a52f3294", "DetectTime": "2024-05-21T12:24:19.912008+00:00", "EventTime": "2024-05-21T12:24:19.912026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56bTL1pBAo5GfIVM5"], "accumulated_threat_level": 5.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "e42d00cd-0e8f-451f-8168-fd53184861c2", "DetectTime": "2024-05-21T12:24:19.923624+00:00", "EventTime": "2024-05-21T12:24:19.923641+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDwwg2szZXjQs22U6"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "ad08b28e-e697-48f8-a394-b76ac0d1f7fd", "DetectTime": "2024-05-21T12:24:19.934206+00:00", "EventTime": "2024-05-21T12:24:19.934224+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDwwg2szZXjQs22U6"], "accumulated_threat_level": 6.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "f9399b7f-7ce9-4f54-96a3-e9f60031ad06", "DetectTime": "2024-05-21T12:24:19.944520+00:00", "EventTime": "2024-05-21T12:24:19.944538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnV5oxc0tzKQ6d7b"], "accumulated_threat_level": 7.1, "timewindow": 2} +{"Format": "IDEA0", "ID": "a468acb9-46fc-438a-8655-03b7a5455665", "DetectTime": "2024-05-21T12:24:19.955962+00:00", "EventTime": "2024-05-21T12:24:19.955979+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRKy74jARUFAKHV8b"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "b92ed123-954d-473d-ae56-cd8bece3ce82", "DetectTime": "2024-05-21T12:24:19.967576+00:00", "EventTime": "2024-05-21T12:24:19.967593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRKy74jARUFAKHV8b"], "accumulated_threat_level": 7.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "cb069963-c75f-4a34-bb6e-b3ba84aeabbd", "DetectTime": "2024-05-21T12:24:19.978608+00:00", "EventTime": "2024-05-21T12:24:19.978625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRKy74jARUFAKHV8b"], "accumulated_threat_level": 8.4, "timewindow": 2} +{"Format": "IDEA0", "ID": "a98cc1fb-c2f8-4082-9552-50063f43cebc", "DetectTime": "2024-05-21T12:24:19.992861+00:00", "EventTime": "2024-05-21T12:24:19.992879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZOAy2PSGUuIrRCXi"], "accumulated_threat_level": 9.200000000000001, "timewindow": 2} +{"Format": "IDEA0", "ID": "24ee1157-3022-4c8d-9620-595dd2b466dd", "DetectTime": "2024-05-21T12:24:20.002823+00:00", "EventTime": "2024-05-21T12:24:20.002844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsDoCEHdI0V10Y95"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "81f612a7-3596-476d-b630-cb7c34fb9179", "DetectTime": "2024-05-21T12:24:20.013591+00:00", "EventTime": "2024-05-21T12:24:20.013610+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsDoCEHdI0V10Y95"], "accumulated_threat_level": 9.700000000000001, "timewindow": 2} +{"Format": "IDEA0", "ID": "a0720e1e-269c-4ad5-8ab8-060b88cbecd9", "DetectTime": "2024-05-21T12:24:20.023417+00:00", "EventTime": "2024-05-21T12:24:20.023435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "Connection to unknown destination port 7908/UDP destination IP 109.231.62.73. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsDoCEHdI0V10Y95"], "accumulated_threat_level": 10.500000000000002, "timewindow": 2} +{"Format": "IDEA0", "ID": "c7cdf01a-a82f-4305-a8c3-d822e51e3a83", "DetectTime": "2024-05-21T12:24:20.035403+00:00", "EventTime": "2024-05-21T12:24:20.035420+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSSBp18BsiwLaQIvb"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e450cda7-7966-4303-a12b-84d891fd9371", "DetectTime": "2024-05-21T12:24:20.047047+00:00", "EventTime": "2024-05-21T12:24:20.047066+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSSBp18BsiwLaQIvb"], "accumulated_threat_level": 11.000000000000002, "timewindow": 2} +{"Format": "IDEA0", "ID": "c73209be-9126-45ac-8eaa-14638929f606", "DetectTime": "2024-05-21T12:24:20.058162+00:00", "EventTime": "2024-05-21T12:24:20.058180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSSBp18BsiwLaQIvb"], "accumulated_threat_level": 11.800000000000002, "timewindow": 2} +{"Format": "IDEA0", "ID": "0f81bf9b-dbdf-4212-9a65-54cf7cdbed6f", "DetectTime": "2024-05-21T12:24:20.069244+00:00", "EventTime": "2024-05-21T12:24:20.069263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yPOGG3gcwyeuBA8"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e4eaa36c-869c-4832-a461-2b9ebe0e7fdc", "DetectTime": "2024-05-21T12:24:20.079427+00:00", "EventTime": "2024-05-21T12:24:20.079446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yPOGG3gcwyeuBA8"], "accumulated_threat_level": 12.300000000000002, "timewindow": 2} +{"Format": "Json", "ID": "e4eaa36c-869c-4832-a461-2b9ebe0e7fdc", "DetectTime": "2024-05-21T12:24:20.079427+00:00", "EventTime": "2024-05-21T12:24:20.079446+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "1970-01-01T01:48:39.078987+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2024/05/21 12:24:20.345219)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 2, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "097078c4-b08c-4b68-b381-eb4f24b0b345", "DetectTime": "2024-05-21T12:24:20.355349+00:00", "EventTime": "2024-05-21T12:24:20.355367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yPOGG3gcwyeuBA8"], "accumulated_threat_level": 0.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "ddcad1fe-194f-4d46-acb2-9c7e82f613f3", "DetectTime": "2024-05-21T12:24:20.366073+00:00", "EventTime": "2024-05-21T12:24:20.366090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjg1w3ntfWQfXXKv2"], "accumulated_threat_level": 1.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "cea6d2ab-10f1-49ed-b1bf-98e2fd720784", "DetectTime": "2024-05-21T12:24:20.376026+00:00", "EventTime": "2024-05-21T12:24:20.376044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHnasJ3jX8QmqESsMd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "0f4354ab-eea5-4c3c-8adf-4cb59aa1dd54", "DetectTime": "2024-05-21T12:24:20.386334+00:00", "EventTime": "2024-05-21T12:24:20.386351+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFN5uqNcC6w98sXB9"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "08f0b22e-d270-4fd9-a850-8ebe5b5120c9", "DetectTime": "2024-05-21T12:24:20.397073+00:00", "EventTime": "2024-05-21T12:24:20.397091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFN5uqNcC6w98sXB9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "44b809a1-d21d-4954-8169-f2f49de465cd", "DetectTime": "2024-05-21T12:24:20.407889+00:00", "EventTime": "2024-05-21T12:24:20.407908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFN5uqNcC6w98sXB9"], "accumulated_threat_level": 3.7, "timewindow": 2} +{"Format": "IDEA0", "ID": "ae7e450d-0d55-4bd0-8ca6-6be16a625193", "DetectTime": "2024-05-21T12:24:20.420409+00:00", "EventTime": "2024-05-21T12:24:20.420427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6Vjp41luE7QZQUH7"], "accumulated_threat_level": 4.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "cc9c8d18-59b6-455c-b885-f8ae5640d0fa", "DetectTime": "2024-05-21T12:24:20.432784+00:00", "EventTime": "2024-05-21T12:24:20.432802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CePUp52cIFmWYS6m65"], "accumulated_threat_level": 5.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "13dcc593-d0eb-4a1d-88dd-c9dfd5d3ce50", "DetectTime": "2024-05-21T12:24:20.443686+00:00", "EventTime": "2024-05-21T12:24:20.443705+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkAJ811tyHpm8wOU8"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e26881d9-2d46-4cd1-ae15-e60dfd8529f5", "DetectTime": "2024-05-21T12:24:20.454989+00:00", "EventTime": "2024-05-21T12:24:20.455007+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkAJ811tyHpm8wOU8"], "accumulated_threat_level": 5.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "80552895-b36f-4a21-b6f9-9acaff712010", "DetectTime": "2024-05-21T12:24:20.468594+00:00", "EventTime": "2024-05-21T12:24:20.468613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkAJ811tyHpm8wOU8"], "accumulated_threat_level": 6.6, "timewindow": 2} +{"Format": "IDEA0", "ID": "bae0978b-dab4-4d51-8d70-a38af8d50b0a", "DetectTime": "2024-05-21T12:24:20.478582+00:00", "EventTime": "2024-05-21T12:24:20.478599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5GrGI3OeE0aqCy7vi"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "fb0556e7-2333-49cf-9553-ea57434a37a8", "DetectTime": "2024-05-21T12:24:20.488938+00:00", "EventTime": "2024-05-21T12:24:20.488955+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5GrGI3OeE0aqCy7vi"], "accumulated_threat_level": 7.1, "timewindow": 2} +{"Format": "IDEA0", "ID": "f9eb83fa-216d-4c28-9b44-0010e8368d8a", "DetectTime": "2024-05-21T12:24:20.498998+00:00", "EventTime": "2024-05-21T12:24:20.499016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5GrGI3OeE0aqCy7vi"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 2} +{"Format": "IDEA0", "ID": "6cd71337-e5d0-4ee5-83b3-734e23a06e55", "DetectTime": "2024-05-21T12:24:20.509984+00:00", "EventTime": "2024-05-21T12:24:20.510004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6eJlb1QOZzriSN034"], "accumulated_threat_level": 8.7, "timewindow": 2} +{"Format": "IDEA0", "ID": "1d733504-37d5-4181-a08c-53d8668b8937", "DetectTime": "2024-05-21T12:24:20.524169+00:00", "EventTime": "2024-05-21T12:24:20.524186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4w7gC4IROGuUw8tJe"], "accumulated_threat_level": 9.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "a4e8ea63-2e6e-4042-92c8-cc729b37c428", "DetectTime": "2024-05-21T12:24:20.535243+00:00", "EventTime": "2024-05-21T12:24:20.535261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegEfq1JGAR8oKsLn9"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "31f1c0bc-87b7-4225-89e3-2378e987dcc9", "DetectTime": "2024-05-21T12:24:20.546153+00:00", "EventTime": "2024-05-21T12:24:20.546171+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegEfq1JGAR8oKsLn9"], "accumulated_threat_level": 10.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "a6e65a23-0acb-4a82-bfb4-980386534193", "DetectTime": "2024-05-21T12:24:20.556205+00:00", "EventTime": "2024-05-21T12:24:20.556222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegEfq1JGAR8oKsLn9"], "accumulated_threat_level": 10.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "8838d0eb-68f6-4ca5-9cf0-00b750dccf42", "DetectTime": "2024-05-21T12:24:20.571139+00:00", "EventTime": "2024-05-21T12:24:20.571158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClnHnG4DtgEkPSZldh"], "accumulated_threat_level": 11.600000000000001, "timewindow": 2} +{"Format": "IDEA0", "ID": "d4180fa5-a8cb-4250-a590-fed7a2d7ebef", "DetectTime": "2024-05-21T12:24:20.582292+00:00", "EventTime": "2024-05-21T12:24:20.582310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFnI44hQBLKGOcbm6"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "b52f8ebd-e44b-4f87-968e-8fed6ba9516c", "DetectTime": "2024-05-21T12:24:20.593512+00:00", "EventTime": "2024-05-21T12:24:20.593529+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFnI44hQBLKGOcbm6"], "accumulated_threat_level": 12.100000000000001, "timewindow": 2} +{"Format": "Json", "ID": "b52f8ebd-e44b-4f87-968e-8fed6ba9516c", "DetectTime": "2024-05-21T12:24:20.593512+00:00", "EventTime": "2024-05-21T12:24:20.593529+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "1970-01-01T01:48:43.102331+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2024/05/21 12:24:20.797146)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 2, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "8eba0768-b83a-4aa0-a59b-ac9cc7032877", "DetectTime": "2024-05-21T12:24:20.807918+00:00", "EventTime": "2024-05-21T12:24:20.807940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFnI44hQBLKGOcbm6"], "accumulated_threat_level": 0.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "50158182-f97b-415e-9282-8cdd103ad1a4", "DetectTime": "2024-05-21T12:24:20.820108+00:00", "EventTime": "2024-05-21T12:24:20.820126+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NYwd1t5HLSwoOdf7"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e5591855-5e76-4094-a92d-f42853cf4b99", "DetectTime": "2024-05-21T12:24:20.832911+00:00", "EventTime": "2024-05-21T12:24:20.832931+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NYwd1t5HLSwoOdf7"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "1816a282-56c9-44eb-9143-30ecaffafc04", "DetectTime": "2024-05-21T12:24:20.844076+00:00", "EventTime": "2024-05-21T12:24:20.844093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NYwd1t5HLSwoOdf7"], "accumulated_threat_level": 2.1, "timewindow": 2} +{"Format": "IDEA0", "ID": "2b144dd1-9d7b-49dd-85b6-f5237e9fed63", "DetectTime": "2024-05-21T12:24:20.858499+00:00", "EventTime": "2024-05-21T12:24:20.858518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExpq33xJ4Y4JS1owc"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "b0c4f30a-8d89-4e2b-b1af-680440b2e1c5", "DetectTime": "2024-05-21T12:24:20.869470+00:00", "EventTime": "2024-05-21T12:24:20.869488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.139.178.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzXySJ3Kc6jt1rsdEe"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "1ccaf31d-6f7e-427e-ac28-3ec85ac7a2cd", "DetectTime": "2024-05-21T12:24:20.882401+00:00", "EventTime": "2024-05-21T12:24:20.882434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzXySJ3Kc6jt1rsdEe"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 2} +{"Format": "IDEA0", "ID": "f207f452-d602-4952-9f62-8e14ab972327", "DetectTime": "2024-05-21T12:24:20.897558+00:00", "EventTime": "2024-05-21T12:24:20.897576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COEM2l49Er4Ry2UyL5"], "accumulated_threat_level": 4.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "fc0784cd-98bf-4d3f-9f89-024feb62ab61", "DetectTime": "2024-05-21T12:24:20.907111+00:00", "EventTime": "2024-05-21T12:24:20.907129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv47Qk4gEDkmqPbiG6"], "accumulated_threat_level": 5.0, "timewindow": 2} +{"Format": "IDEA0", "ID": "c0dee4c2-1739-4538-9e96-61e182f5ca8d", "DetectTime": "2024-05-21T12:24:20.917214+00:00", "EventTime": "2024-05-21T12:24:20.917232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5rur3WSMtGVN2Pf1"], "accumulated_threat_level": 5.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "00456215-b21c-4e77-9a1f-3033d97ab0b3", "DetectTime": "2024-05-21T12:24:20.928136+00:00", "EventTime": "2024-05-21T12:24:20.928154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVY23r3npB2S9kTwcb"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "f586a507-2847-487b-80a0-a32d123921e3", "DetectTime": "2024-05-21T12:24:20.939011+00:00", "EventTime": "2024-05-21T12:24:20.939029+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVY23r3npB2S9kTwcb"], "accumulated_threat_level": 6.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "7f1f31ac-644c-48a0-a6a3-e08c8f9a2849", "DetectTime": "2024-05-21T12:24:20.949888+00:00", "EventTime": "2024-05-21T12:24:20.949911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVY23r3npB2S9kTwcb"], "accumulated_threat_level": 7.1, "timewindow": 2} +{"Format": "IDEA0", "ID": "bc19353e-6371-4dd6-93d6-fabb3b50553d", "DetectTime": "2024-05-21T12:24:20.960017+00:00", "EventTime": "2024-05-21T12:24:20.960036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COr6tC3zrVPn1xBwV1"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 2} +{"Format": "IDEA0", "ID": "4a4c7267-c162-45fc-aa6e-962c7f886955", "DetectTime": "2024-05-21T12:24:20.971352+00:00", "EventTime": "2024-05-21T12:24:20.971370+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCNW11W6ytbUP6Kq1"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "eecd8049-4782-4c8f-aa11-bc9c0a796d0e", "DetectTime": "2024-05-21T12:24:20.982400+00:00", "EventTime": "2024-05-21T12:24:20.982434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCNW11W6ytbUP6Kq1"], "accumulated_threat_level": 8.399999999999999, "timewindow": 2} +{"Format": "IDEA0", "ID": "dd675045-7b51-4211-bc4c-d86ef731ac83", "DetectTime": "2024-05-21T12:24:20.992814+00:00", "EventTime": "2024-05-21T12:24:20.992833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCNW11W6ytbUP6Kq1"], "accumulated_threat_level": 9.2, "timewindow": 2} +{"Format": "IDEA0", "ID": "48c21cec-69a2-4a40-8acb-370e5199459f", "DetectTime": "2024-05-21T12:24:21.003005+00:00", "EventTime": "2024-05-21T12:24:21.003023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSQR7t1UttmQ5nnWTg"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "575b798d-2af8-405f-bd62-b7c355e15052", "DetectTime": "2024-05-21T12:24:21.013638+00:00", "EventTime": "2024-05-21T12:24:21.013656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSQR7t1UttmQ5nnWTg"], "accumulated_threat_level": 9.7, "timewindow": 2} +{"Format": "IDEA0", "ID": "1183744e-40b8-4cab-b24a-b1002ec4002b", "DetectTime": "2024-05-21T12:24:21.024656+00:00", "EventTime": "2024-05-21T12:24:21.024673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSQR7t1UttmQ5nnWTg"], "accumulated_threat_level": 10.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "a82edd1a-3500-43ec-8609-59b9f017c641", "DetectTime": "2024-05-21T12:24:21.034966+00:00", "EventTime": "2024-05-21T12:24:21.034983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2a7a02g5tzngcZHme"], "accumulated_threat_level": 11.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "f24ca1d5-256c-4c08-ae25-52110c69d424", "DetectTime": "2024-05-21T12:24:21.047245+00:00", "EventTime": "2024-05-21T12:24:21.047263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYEu03I6Wc7iDb8i7"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "5cc72250-4b3d-4dde-bda7-dd466c6cb9a8", "DetectTime": "2024-05-21T12:24:21.057904+00:00", "EventTime": "2024-05-21T12:24:21.057922+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYEu03I6Wc7iDb8i7"], "accumulated_threat_level": 11.8, "timewindow": 2} +{"Format": "IDEA0", "ID": "04907312-0830-4704-90ff-daabb5dd777e", "DetectTime": "2024-05-21T12:24:21.069394+00:00", "EventTime": "2024-05-21T12:24:21.069412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYEu03I6Wc7iDb8i7"], "accumulated_threat_level": 12.600000000000001, "timewindow": 2} +{"Format": "Json", "ID": "04907312-0830-4704-90ff-daabb5dd777e", "DetectTime": "2024-05-21T12:24:21.069394+00:00", "EventTime": "2024-05-21T12:24:21.069412+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "1970-01-01T01:49:04.737347+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 2. (real time 2024/05/21 12:24:21.368401)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000001, "timewindow": 2, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000001} +{"Format": "IDEA0", "ID": "e08f3be3-95a4-4a41-b78f-561796cd281f", "DetectTime": "2024-05-21T12:24:21.378302+00:00", "EventTime": "2024-05-21T12:24:21.378319+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhjzu2NxGVP2zrRn9"], "accumulated_threat_level": 0, "timewindow": 2} +{"Format": "IDEA0", "ID": "e6634bb2-4dea-41f5-adea-8d3c9837285e", "DetectTime": "2024-05-21T12:24:21.388558+00:00", "EventTime": "2024-05-21T12:24:21.388576+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhjzu2NxGVP2zrRn9"], "accumulated_threat_level": 0.5, "timewindow": 2} +{"Format": "IDEA0", "ID": "912a2473-fa7c-4edf-bb26-f97e380ddd9a", "DetectTime": "2024-05-21T12:24:21.398337+00:00", "EventTime": "2024-05-21T12:24:21.398355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhjzu2NxGVP2zrRn9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "17ffbc9b-e24f-44e4-b9b7-3ff32881c0e2", "DetectTime": "2024-05-21T12:24:21.409372+00:00", "EventTime": "2024-05-21T12:24:21.409390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXgTU3I129N0YZeo7"], "accumulated_threat_level": 0.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "a74a5c2f-6bcc-4793-9251-f110f101f278", "DetectTime": "2024-05-21T12:24:21.438823+00:00", "EventTime": "2024-05-21T12:24:21.438840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bYV84D20eJsIC04c"], "accumulated_threat_level": 1.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "72eed270-db3c-4072-ae6e-40eafabf505f", "DetectTime": "2024-05-21T12:24:21.449444+00:00", "EventTime": "2024-05-21T12:24:21.449468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.91.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 200.91.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRRPi32tu2CG77El2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "c9ce0008-e85c-4d49-9540-e5b862997b23", "DetectTime": "2024-05-21T12:24:21.461032+00:00", "EventTime": "2024-05-21T12:24:21.461051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf6DYiSDbNUrudYkh"], "accumulated_threat_level": 3.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "fbf0c057-250e-4f72-9c65-7a122f933291", "DetectTime": "2024-05-21T12:24:21.471424+00:00", "EventTime": "2024-05-21T12:24:21.471442+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.139.178.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzE6m2qzumyiVznr"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "43b34491-9f2f-4c90-9ef8-48f07b1e3615", "DetectTime": "2024-05-21T12:24:21.481958+00:00", "EventTime": "2024-05-21T12:24:21.481976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.139.178.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.139.178.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzE6m2qzumyiVznr"], "accumulated_threat_level": 3.7, "timewindow": 3} +{"Format": "IDEA0", "ID": "545784d0-874c-4f4c-b678-31bd04f2f6d5", "DetectTime": "2024-05-21T12:24:21.495985+00:00", "EventTime": "2024-05-21T12:24:21.496003+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bYV84D20eJsIC04c"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "c1e1a882-8ff2-4e9b-8aae-78f4f6116baa", "DetectTime": "2024-05-21T12:24:21.510266+00:00", "EventTime": "2024-05-21T12:24:21.510287+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bYV84D20eJsIC04c"], "accumulated_threat_level": 4.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "d5508e6e-d45a-41dd-83dd-677306e93521", "DetectTime": "2024-05-21T12:24:21.520723+00:00", "EventTime": "2024-05-21T12:24:21.520741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXgax3C7ThmBSAoH2"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "ceeac834-ba62-4cc4-8007-01bf5a6bf5ae", "DetectTime": "2024-05-21T12:24:21.531325+00:00", "EventTime": "2024-05-21T12:24:21.531342+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXgax3C7ThmBSAoH2"], "accumulated_threat_level": 4.7, "timewindow": 3} +{"Format": "IDEA0", "ID": "28c80757-abd3-4be0-a22b-03fbb881feb7", "DetectTime": "2024-05-21T12:24:21.541123+00:00", "EventTime": "2024-05-21T12:24:21.541144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.57.220 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-220-57.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pE343OhPM5AuE2S"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e8f996a1-059d-4deb-b4b9-16e6c65938c5", "DetectTime": "2024-05-21T12:24:21.551757+00:00", "EventTime": "2024-05-21T12:24:21.551775+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DDV342ReW50jYEf5"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "058955ac-a098-40b3-bcc4-5cfb666c7387", "DetectTime": "2024-05-21T12:24:21.562695+00:00", "EventTime": "2024-05-21T12:24:21.562713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DDV342ReW50jYEf5"], "accumulated_threat_level": 5.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "35bcc180-18bf-4c58-836c-fe06e6fa7425", "DetectTime": "2024-05-21T12:24:21.577030+00:00", "EventTime": "2024-05-21T12:24:21.577048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp0NRs1LIitsa6fxO2"], "accumulated_threat_level": 6.0, "timewindow": 3} +{"Format": "IDEA0", "ID": "71c97b30-0f3d-413a-b2b3-59a49733b51f", "DetectTime": "2024-05-21T12:24:21.588296+00:00", "EventTime": "2024-05-21T12:24:21.588313+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Witg352rYZjm2hti"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "9de3300d-7674-4512-90fd-793e0f6b7d96", "DetectTime": "2024-05-21T12:24:21.601618+00:00", "EventTime": "2024-05-21T12:24:21.601637+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Witg352rYZjm2hti"], "accumulated_threat_level": 6.5, "timewindow": 3} +{"Format": "IDEA0", "ID": "e56ac65e-2b64-41be-b657-fcbd63e78f4c", "DetectTime": "2024-05-21T12:24:21.613607+00:00", "EventTime": "2024-05-21T12:24:21.613626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGDmc3MTadVtYUxac"], "accumulated_threat_level": 7.3, "timewindow": 3} +{"Format": "IDEA0", "ID": "6bb6e8ff-c859-49c3-b847-0e5249de0979", "DetectTime": "2024-05-21T12:24:21.624316+00:00", "EventTime": "2024-05-21T12:24:21.624335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DDV342ReW50jYEf5"], "accumulated_threat_level": 8.1, "timewindow": 3} +{"Format": "IDEA0", "ID": "cec3ada1-388d-48c8-adf7-e554079359c7", "DetectTime": "2024-05-21T12:24:21.636402+00:00", "EventTime": "2024-05-21T12:24:21.636423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Witg352rYZjm2hti"], "accumulated_threat_level": 8.9, "timewindow": 3} +{"Format": "IDEA0", "ID": "cf7b5c25-3603-4079-a59e-e2e68eab7e8c", "DetectTime": "2024-05-21T12:24:21.649182+00:00", "EventTime": "2024-05-21T12:24:21.649203+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNazac4YKR8R9Y4Ie"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "e408c054-b37d-41d0-8c99-20260c64ce83", "DetectTime": "2024-05-21T12:24:21.660141+00:00", "EventTime": "2024-05-21T12:24:21.660161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNazac4YKR8R9Y4Ie"], "accumulated_threat_level": 9.4, "timewindow": 3} +{"Format": "IDEA0", "ID": "26864c30-affe-4c71-9129-bd3b7b93eb8f", "DetectTime": "2024-05-21T12:24:21.671888+00:00", "EventTime": "2024-05-21T12:24:21.671908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNazac4YKR8R9Y4Ie"], "accumulated_threat_level": 10.200000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "69158c6e-8b27-4714-95d7-a38035b63e3b", "DetectTime": "2024-05-21T12:24:21.682656+00:00", "EventTime": "2024-05-21T12:24:21.682675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nmVr1xccL5MiCXx7"], "accumulated_threat_level": 11.000000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "ab864229-b744-4696-adfe-c5e99f88e4ee", "DetectTime": "2024-05-21T12:24:21.694177+00:00", "EventTime": "2024-05-21T12:24:21.694194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEsBw2R24tnZdIcoc"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "4cf51862-4d2e-4781-b27f-ae9265d0b5cf", "DetectTime": "2024-05-21T12:24:21.705438+00:00", "EventTime": "2024-05-21T12:24:21.705456+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEsBw2R24tnZdIcoc"], "accumulated_threat_level": 11.500000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "26b57bb1-fe20-457d-a5df-a2b8693dc76a", "DetectTime": "2024-05-21T12:24:21.715323+00:00", "EventTime": "2024-05-21T12:24:21.715341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEsBw2R24tnZdIcoc"], "accumulated_threat_level": 12.300000000000002, "timewindow": 3} +{"Format": "Json", "ID": "26b57bb1-fe20-457d-a5df-a2b8693dc76a", "DetectTime": "2024-05-21T12:24:21.715323+00:00", "EventTime": "2024-05-21T12:24:21.715341+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "1970-01-01T02:19:45.439949+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2024/05/21 12:24:21.860364)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 3, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "cb100c06-970a-4108-8316-a285793d1617", "DetectTime": "2024-05-21T12:24:21.869541+00:00", "EventTime": "2024-05-21T12:24:21.869560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6r7Az2ayx7krmJ96c"], "accumulated_threat_level": 0.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "5c2d4476-f8bb-45b5-8f71-27b230d4145a", "DetectTime": "2024-05-21T12:24:21.882320+00:00", "EventTime": "2024-05-21T12:24:21.882342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CisWItQ0Fdi8Tpqt3"], "accumulated_threat_level": 1.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "0d5556bf-6383-45e9-883e-c14b59e60848", "DetectTime": "2024-05-21T12:24:21.895965+00:00", "EventTime": "2024-05-21T12:24:21.895984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBBii32bQjcfg1tD8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "1d9ad109-77f1-4fbb-b50e-2621d7223708", "DetectTime": "2024-05-21T12:24:21.906679+00:00", "EventTime": "2024-05-21T12:24:21.906697+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUEycRyx5IlDzJdY3"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "23e82a1b-032a-4643-8321-7a654a4f20dd", "DetectTime": "2024-05-21T12:24:21.917351+00:00", "EventTime": "2024-05-21T12:24:21.917370+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUEycRyx5IlDzJdY3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "37683b59-7d61-4246-8320-97fd0ad5f712", "DetectTime": "2024-05-21T12:24:21.927753+00:00", "EventTime": "2024-05-21T12:24:21.927770+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmKhC4U1oyzjU806"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "529022ee-53a3-43b3-a910-4d061529bca4", "DetectTime": "2024-05-21T12:24:21.938207+00:00", "EventTime": "2024-05-21T12:24:21.938225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmKhC4U1oyzjU806"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "06e15187-7ae4-45af-800c-b94fe01d85f0", "DetectTime": "2024-05-21T12:24:21.948333+00:00", "EventTime": "2024-05-21T12:24:21.948351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUEycRyx5IlDzJdY3"], "accumulated_threat_level": 4.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "62cf8c29-ac97-4f0b-9e13-5e5beac76498", "DetectTime": "2024-05-21T12:24:21.953613+00:00", "EventTime": "2024-05-21T12:24:21.953631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWODCT3oE8BAqqXLuf"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e067e8c8-c482-488a-ac70-a490b321568b", "DetectTime": "2024-05-21T12:24:21.964379+00:00", "EventTime": "2024-05-21T12:24:21.964396+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XXtt2zVzj6zGV99"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "9c1b6782-2629-4989-b547-75be431a761b", "DetectTime": "2024-05-21T12:24:21.976322+00:00", "EventTime": "2024-05-21T12:24:21.976341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XXtt2zVzj6zGV99"], "accumulated_threat_level": 4.7, "timewindow": 3} +{"Format": "IDEA0", "ID": "580cd047-5dc6-4eb6-9167-5deab6813e2a", "DetectTime": "2024-05-21T12:24:21.988869+00:00", "EventTime": "2024-05-21T12:24:21.988886+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbL9uB4YOzWdCKbcQl"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "5a9cccf9-2d3f-46b3-b2fc-977004d88286", "DetectTime": "2024-05-21T12:24:21.999963+00:00", "EventTime": "2024-05-21T12:24:21.999981+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbL9uB4YOzWdCKbcQl"], "accumulated_threat_level": 5.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "1536b64b-d12a-446a-8ff4-b8588bb2e24f", "DetectTime": "2024-05-21T12:24:22.005129+00:00", "EventTime": "2024-05-21T12:24:22.005147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyrx9ZrU3mZqI1Q86"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "54d34dfc-bd1e-417b-bcf1-8ba177f659cf", "DetectTime": "2024-05-21T12:24:22.010624+00:00", "EventTime": "2024-05-21T12:24:22.010643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CannfVTrtiieAXw7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "56d92b12-a7ea-4ae9-b095-c55d3b249f82", "DetectTime": "2024-05-21T12:24:22.021489+00:00", "EventTime": "2024-05-21T12:24:22.021509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmKhC4U1oyzjU806"], "accumulated_threat_level": 6.0, "timewindow": 3} +{"Format": "IDEA0", "ID": "2b19c489-61d5-4ab9-a8e4-99cc876a923a", "DetectTime": "2024-05-21T12:24:22.035122+00:00", "EventTime": "2024-05-21T12:24:22.035140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7d8p49gvvbL9JLKl"], "accumulated_threat_level": 6.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "3e5adfeb-6e65-4dee-aa75-4ac2c50e7768", "DetectTime": "2024-05-21T12:24:22.039906+00:00", "EventTime": "2024-05-21T12:24:22.039924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMWmfI1NWQ4FK8Ekaj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "67c3103b-7ebc-45f9-88a2-b4c5ac8257d3", "DetectTime": "2024-05-21T12:24:22.054222+00:00", "EventTime": "2024-05-21T12:24:22.054241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQscuM3VlqGs7YcuHe"], "accumulated_threat_level": 7.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "b4041281-8ae7-4fdb-94ae-544defeeb051", "DetectTime": "2024-05-21T12:24:22.059309+00:00", "EventTime": "2024-05-21T12:24:22.059327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOtJU2xODoSojvUCh"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "60ebaff8-81c4-49e8-a858-eca213422a19", "DetectTime": "2024-05-21T12:24:22.070764+00:00", "EventTime": "2024-05-21T12:24:22.070782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDuoa9SjGhhLdfEf6"], "accumulated_threat_level": 8.4, "timewindow": 3} +{"Format": "IDEA0", "ID": "a1b69bcc-abee-4e67-8c63-82420cac0c79", "DetectTime": "2024-05-21T12:24:22.081253+00:00", "EventTime": "2024-05-21T12:24:22.081271+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAniB2JvLJoubFmd1"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "7d08dd7e-9fac-4fef-b891-b3fad7a6965c", "DetectTime": "2024-05-21T12:24:22.093102+00:00", "EventTime": "2024-05-21T12:24:22.093120+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAniB2JvLJoubFmd1"], "accumulated_threat_level": 8.9, "timewindow": 3} +{"Format": "IDEA0", "ID": "cba2f36e-9df8-40b5-941d-d0c40af3a23d", "DetectTime": "2024-05-21T12:24:22.097921+00:00", "EventTime": "2024-05-21T12:24:22.097939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4Hq43cGsUWL9oIDl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a7f0d3cf-8f28-4480-9b02-3fff6054be78", "DetectTime": "2024-05-21T12:24:22.108353+00:00", "EventTime": "2024-05-21T12:24:22.108372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XXtt2zVzj6zGV99"], "accumulated_threat_level": 9.700000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "cac13757-10ec-4642-8a14-62bbf6e04ed7", "DetectTime": "2024-05-21T12:24:22.113578+00:00", "EventTime": "2024-05-21T12:24:22.113596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbkWTS23V6uxrIA1Ug"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "69f921f0-1b59-4e98-8c40-1fe2ead35390", "DetectTime": "2024-05-21T12:24:22.125640+00:00", "EventTime": "2024-05-21T12:24:22.125658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbL9uB4YOzWdCKbcQl"], "accumulated_threat_level": 10.500000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "33cf1181-dee0-4e01-9c1d-b31eb11e7f23", "DetectTime": "2024-05-21T12:24:22.137024+00:00", "EventTime": "2024-05-21T12:24:22.137045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUbI3q9F6NV0VVVue"], "accumulated_threat_level": 11.300000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "5fa6d7e5-b5d9-4e03-aaa6-1a76fa13d75a", "DetectTime": "2024-05-21T12:24:22.141943+00:00", "EventTime": "2024-05-21T12:24:22.141961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TI2aALRIhLSexqi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7f3d5cdd-6782-4814-aefb-aa63fe2199ee", "DetectTime": "2024-05-21T12:24:22.146972+00:00", "EventTime": "2024-05-21T12:24:22.146991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGnAbL30jEosqlgSma"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "52bffe17-db25-43d0-9e7f-403ad6e110d3", "DetectTime": "2024-05-21T12:24:22.158654+00:00", "EventTime": "2024-05-21T12:24:22.158674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3WqN3YxtCpv9Pd44"], "accumulated_threat_level": 12.100000000000003, "timewindow": 3} +{"Format": "Json", "ID": "52bffe17-db25-43d0-9e7f-403ad6e110d3", "DetectTime": "2024-05-21T12:24:22.158654+00:00", "EventTime": "2024-05-21T12:24:22.158674+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "1970-01-01T02:19:48.585804+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2024/05/21 12:24:22.301999)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000003, "timewindow": 3, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000003} +{"Format": "IDEA0", "ID": "a0684016-b4ab-4ddd-950f-522c730cc056", "DetectTime": "2024-05-21T12:24:22.313304+00:00", "EventTime": "2024-05-21T12:24:22.313323+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HsqQK4m01hyGj5k"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "d9cbc7ef-c624-4997-a376-1f13ef41fb75", "DetectTime": "2024-05-21T12:24:22.324192+00:00", "EventTime": "2024-05-21T12:24:22.324210+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HsqQK4m01hyGj5k"], "accumulated_threat_level": 0.5, "timewindow": 3} +{"Format": "IDEA0", "ID": "a77a57b7-9b62-4000-bd7c-8809028a00cc", "DetectTime": "2024-05-21T12:24:22.329189+00:00", "EventTime": "2024-05-21T12:24:22.329207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMdWH3XYiO6ABKJt3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "8dc23689-c911-4152-a9ef-500ef54ef17e", "DetectTime": "2024-05-21T12:24:22.339907+00:00", "EventTime": "2024-05-21T12:24:22.339925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpWW4Q1n6BluH5l3C1"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "2d0bbe0e-45da-4240-a648-d5908e46dd58", "DetectTime": "2024-05-21T12:24:22.350096+00:00", "EventTime": "2024-05-21T12:24:22.350113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF5zMe3gAjqGo0ww9l"], "accumulated_threat_level": 1.3, "timewindow": 3} +{"Format": "IDEA0", "ID": "761501f9-8b96-475e-bfad-36679053e861", "DetectTime": "2024-05-21T12:24:22.360635+00:00", "EventTime": "2024-05-21T12:24:22.360653+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpWW4Q1n6BluH5l3C1"], "accumulated_threat_level": 1.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "156ad60c-4c5b-4c03-b332-7536d4739cae", "DetectTime": "2024-05-21T12:24:22.370597+00:00", "EventTime": "2024-05-21T12:24:22.370615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAniB2JvLJoubFmd1"], "accumulated_threat_level": 2.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "1d4c7f66-c0fa-4c66-849a-4f8cb710dbc8", "DetectTime": "2024-05-21T12:24:22.381081+00:00", "EventTime": "2024-05-21T12:24:22.381101+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7267M3lu2Xw4LEX6"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "6dd1309a-7e46-47c1-9487-ec794ddd1a11", "DetectTime": "2024-05-21T12:24:22.392620+00:00", "EventTime": "2024-05-21T12:24:22.392640+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7267M3lu2Xw4LEX6"], "accumulated_threat_level": 3.1, "timewindow": 3} +{"Format": "IDEA0", "ID": "4552d2e8-d94e-41b9-966c-68d00d67168f", "DetectTime": "2024-05-21T12:24:22.397514+00:00", "EventTime": "2024-05-21T12:24:22.397532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKg4L040JJa6NAZnN2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f6ac1314-695f-43ec-b395-53c020a8d3be", "DetectTime": "2024-05-21T12:24:22.408337+00:00", "EventTime": "2024-05-21T12:24:22.408357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdbKa4fkBrsErXz6b"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "f2ec3ae9-3793-4a12-abb9-ae640a6876bb", "DetectTime": "2024-05-21T12:24:22.418751+00:00", "EventTime": "2024-05-21T12:24:22.418769+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkUGM2wyHm4gSfpb"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "77c6d82f-932a-427c-b297-4f0f07009b30", "DetectTime": "2024-05-21T12:24:22.430216+00:00", "EventTime": "2024-05-21T12:24:22.430234+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkUGM2wyHm4gSfpb"], "accumulated_threat_level": 4.4, "timewindow": 3} +{"Format": "IDEA0", "ID": "20a78edd-e379-4822-8b75-c6eea2199f8b", "DetectTime": "2024-05-21T12:24:22.440011+00:00", "EventTime": "2024-05-21T12:24:22.440029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvutz63jUTsPbZpNpl"], "accumulated_threat_level": 5.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "11881a12-17f8-4c04-860f-70a1102f2b04", "DetectTime": "2024-05-21T12:24:22.444752+00:00", "EventTime": "2024-05-21T12:24:22.444770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.194.29 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7Y0g3GlKZXCICGyi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e0f650bb-41b2-4cf2-98e5-237d2c7853f3", "DetectTime": "2024-05-21T12:24:22.454924+00:00", "EventTime": "2024-05-21T12:24:22.454942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HsqQK4m01hyGj5k"], "accumulated_threat_level": 6.0, "timewindow": 3} +{"Format": "IDEA0", "ID": "cee798dc-8d04-41ec-b096-f298083ecceb", "DetectTime": "2024-05-21T12:24:22.459787+00:00", "EventTime": "2024-05-21T12:24:22.459804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyVjE3aV3szZ12MDj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "83091a43-d71f-4144-ae38-c809e03ec0d8", "DetectTime": "2024-05-21T12:24:22.469554+00:00", "EventTime": "2024-05-21T12:24:22.469574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpWW4Q1n6BluH5l3C1"], "accumulated_threat_level": 6.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "55008785-02f0-4770-a766-16f518d85cf4", "DetectTime": "2024-05-21T12:24:22.481133+00:00", "EventTime": "2024-05-21T12:24:22.481152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7267M3lu2Xw4LEX6"], "accumulated_threat_level": 7.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "34fae090-d552-4ebc-93fb-ef36017581b1", "DetectTime": "2024-05-21T12:24:22.491659+00:00", "EventTime": "2024-05-21T12:24:22.491677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkUGM2wyHm4gSfpb"], "accumulated_threat_level": 8.4, "timewindow": 3} +{"Format": "IDEA0", "ID": "a928b6cb-4383-42bb-a094-cdb9930c08eb", "DetectTime": "2024-05-21T12:24:22.502021+00:00", "EventTime": "2024-05-21T12:24:22.502040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2wUYG1WIOnY9SclN7"], "accumulated_threat_level": 9.200000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "39f0091b-9879-4100-a471-191e7e64a532", "DetectTime": "2024-05-21T12:24:22.517847+00:00", "EventTime": "2024-05-21T12:24:22.517865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXeZE1ZlYe0EeUJa9", "Cn5FIQ2bc1FpvwuCPc", "C8VAf31aWd2XO4YKvb", "CoThhixRhoVpU56T7"], "accumulated_threat_level": 9.700000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "18d3c303-b27f-4490-9418-11afaf9140ec", "DetectTime": "2024-05-21T12:24:22.522904+00:00", "EventTime": "2024-05-21T12:24:22.522921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.223.239.27 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C284oK3DfhD58nYBoj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "00bdb36e-a2e8-4fb6-84d1-132483a7573d", "DetectTime": "2024-05-21T12:24:22.533470+00:00", "EventTime": "2024-05-21T12:24:22.533488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHE3S2HO3kuu94p6i"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "b5551c17-848b-4555-b3cf-bd8deed0debf", "DetectTime": "2024-05-21T12:24:22.538245+00:00", "EventTime": "2024-05-21T12:24:22.538266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcSZ04G06GztbW54"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "18e881c5-4454-477e-808c-1156a306a819", "DetectTime": "2024-05-21T12:24:22.543425+00:00", "EventTime": "2024-05-21T12:24:22.543445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHaGdr4D9fF5Ckqd6h"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c6316193-0827-4c6a-879a-dd763f49c251", "DetectTime": "2024-05-21T12:24:22.548383+00:00", "EventTime": "2024-05-21T12:24:22.548403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGflcY18S9DeEdU6d5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d17d5f56-f93f-4052-a78a-1315365510f8", "DetectTime": "2024-05-21T12:24:22.559630+00:00", "EventTime": "2024-05-21T12:24:22.559649+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.231.62.73"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWpka3F6AcHL2PAJg"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "dd69c5ae-124c-42a0-a32b-e00d8e217497", "DetectTime": "2024-05-21T12:24:22.571702+00:00", "EventTime": "2024-05-21T12:24:22.571723+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.231.62.73"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.231.62.73 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWpka3F6AcHL2PAJg"], "accumulated_threat_level": 10.200000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "e5511b7a-9d5b-4ff6-b959-8fdf5b98ff7b", "DetectTime": "2024-05-21T12:24:22.585802+00:00", "EventTime": "2024-05-21T12:24:22.585820+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxuo85gjdZMLWIlwg"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "107a0fea-5ed4-4101-af39-f67af8b2ffa5", "DetectTime": "2024-05-21T12:24:22.599917+00:00", "EventTime": "2024-05-21T12:24:22.599937+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxuo85gjdZMLWIlwg"], "accumulated_threat_level": 10.700000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "169e01ad-514f-407d-b583-09d42c5283a2", "DetectTime": "2024-05-21T12:24:22.613602+00:00", "EventTime": "2024-05-21T12:24:22.613619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxuo85gjdZMLWIlwg"], "accumulated_threat_level": 11.500000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "883ec52b-13ec-4759-8dfc-0e6a700d067f", "DetectTime": "2024-05-21T12:24:22.630539+00:00", "EventTime": "2024-05-21T12:24:22.630558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUiT6jkVCd6Cpodvc"], "accumulated_threat_level": 12.300000000000002, "timewindow": 3} +{"Format": "Json", "ID": "883ec52b-13ec-4759-8dfc-0e6a700d067f", "DetectTime": "2024-05-21T12:24:22.630539+00:00", "EventTime": "2024-05-21T12:24:22.630558+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "1970-01-01T02:50:35.414200+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2024/05/21 12:24:22.825918)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 3, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "4eceb235-dcbc-487d-b94b-fdcbee5d940b", "DetectTime": "2024-05-21T12:24:22.839160+00:00", "EventTime": "2024-05-21T12:24:22.839179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7dyqh2ZhZyP0G7qBk"], "accumulated_threat_level": 0.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "58c379cd-4805-47e5-8b73-7072415a547a", "DetectTime": "2024-05-21T12:24:22.849802+00:00", "EventTime": "2024-05-21T12:24:22.849820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mwIXeHk5BFm7x9f"], "accumulated_threat_level": 1.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "776a9021-84fa-4e1f-818e-74946475b73c", "DetectTime": "2024-05-21T12:24:22.859829+00:00", "EventTime": "2024-05-21T12:24:22.859847+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6py7N3HOxfYRQ1yr6"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "5b7e784a-ff20-4716-9a48-cef043fb2732", "DetectTime": "2024-05-21T12:24:22.871853+00:00", "EventTime": "2024-05-21T12:24:22.871872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6py7N3HOxfYRQ1yr6"], "accumulated_threat_level": 2.1, "timewindow": 3} +{"Format": "IDEA0", "ID": "31bd2ecd-c2dd-430a-8f10-aec2952c57b0", "DetectTime": "2024-05-21T12:24:22.881876+00:00", "EventTime": "2024-05-21T12:24:22.881893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6py7N3HOxfYRQ1yr6"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "39b0e254-74b3-46b0-94bd-1d94516e7bd1", "DetectTime": "2024-05-21T12:24:22.892971+00:00", "EventTime": "2024-05-21T12:24:22.892990+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgy651YftAfz9oLd7"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "1b2bbe67-bf68-41fa-a1a7-e0157d65d102", "DetectTime": "2024-05-21T12:24:22.905394+00:00", "EventTime": "2024-05-21T12:24:22.905412+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgy651YftAfz9oLd7"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "df46b401-8bd1-4973-9b8e-b5b34722e785", "DetectTime": "2024-05-21T12:24:22.916175+00:00", "EventTime": "2024-05-21T12:24:22.916193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgy651YftAfz9oLd7"], "accumulated_threat_level": 4.2, "timewindow": 3} +{"Format": "IDEA0", "ID": "19257b02-32e6-4dd5-8adb-851666005221", "DetectTime": "2024-05-21T12:24:22.927310+00:00", "EventTime": "2024-05-21T12:24:22.927328+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdaEhSwBRvVOG4z3"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "4a0e4521-0f75-4992-9b62-16790f141def", "DetectTime": "2024-05-21T12:24:22.937851+00:00", "EventTime": "2024-05-21T12:24:22.937871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdaEhSwBRvVOG4z3"], "accumulated_threat_level": 4.7, "timewindow": 3} +{"Format": "IDEA0", "ID": "4e8fa1b1-d14d-4479-b8a6-263a65b32df2", "DetectTime": "2024-05-21T12:24:22.947928+00:00", "EventTime": "2024-05-21T12:24:22.947946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "Connection to unknown destination port 4311/UDP destination IP 177.68.90.31. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdaEhSwBRvVOG4z3"], "accumulated_threat_level": 5.5, "timewindow": 3} +{"Format": "IDEA0", "ID": "96bfe434-b85f-4934-8be4-395fd4c87fc4", "DetectTime": "2024-05-21T12:24:22.961190+00:00", "EventTime": "2024-05-21T12:24:22.961212+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZHCb12kWkqre37Zj"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "d5ebc6a0-7d7a-47e9-9efb-527b7fbcece0", "DetectTime": "2024-05-21T12:24:22.973798+00:00", "EventTime": "2024-05-21T12:24:22.973818+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZHCb12kWkqre37Zj"], "accumulated_threat_level": 6.0, "timewindow": 3} +{"Format": "IDEA0", "ID": "b02238d3-84a1-4e36-9314-3c929dd811e7", "DetectTime": "2024-05-21T12:24:22.983480+00:00", "EventTime": "2024-05-21T12:24:22.983498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZHCb12kWkqre37Zj"], "accumulated_threat_level": 6.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "f6f00afd-ee35-4a0d-9b06-065868cf5e12", "DetectTime": "2024-05-21T12:24:22.988318+00:00", "EventTime": "2024-05-21T12:24:22.988336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcVqd4k82789S4iYd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "92ffa77c-d1a2-4633-9206-f39c97e92601", "DetectTime": "2024-05-21T12:24:22.997909+00:00", "EventTime": "2024-05-21T12:24:22.997927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFrraH2wuhBoqkvTGc"], "accumulated_threat_level": 7.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "947c6ff1-416d-4f1d-9f9a-a278b352010f", "DetectTime": "2024-05-21T12:24:23.009766+00:00", "EventTime": "2024-05-21T12:24:23.009783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFUBN1Op14ICC1r26"], "accumulated_threat_level": 8.4, "timewindow": 3} +{"Format": "IDEA0", "ID": "88b6ceb7-bdab-4b0c-917a-95b8a80e4dff", "DetectTime": "2024-05-21T12:24:23.020362+00:00", "EventTime": "2024-05-21T12:24:23.020383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUZwk3loTnAkOlyqd"], "accumulated_threat_level": 9.200000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "017a023c-466b-4917-8153-ef3af287d583", "DetectTime": "2024-05-21T12:24:23.033228+00:00", "EventTime": "2024-05-21T12:24:23.033246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFublw3iEHrmvPL458"], "accumulated_threat_level": 10.000000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "d9ddba52-b304-4a4a-b676-800a809af8ec", "DetectTime": "2024-05-21T12:24:23.044858+00:00", "EventTime": "2024-05-21T12:24:23.044877+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56b011uHBRd5YavBl"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "92a84c07-e583-41af-b541-bd14356f9790", "DetectTime": "2024-05-21T12:24:23.056193+00:00", "EventTime": "2024-05-21T12:24:23.056211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56b011uHBRd5YavBl"], "accumulated_threat_level": 10.500000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "d132afba-761a-4393-8018-a276fbc9739b", "DetectTime": "2024-05-21T12:24:23.067625+00:00", "EventTime": "2024-05-21T12:24:23.067649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56b011uHBRd5YavBl"], "accumulated_threat_level": 11.300000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "da43f013-1172-4dfa-846c-25e39bd70297", "DetectTime": "2024-05-21T12:24:23.080003+00:00", "EventTime": "2024-05-21T12:24:23.080022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMfoc2M2ooCQxBKw8"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "b3afc4d3-36f0-4874-87cb-599e2cecc8fd", "DetectTime": "2024-05-21T12:24:23.085044+00:00", "EventTime": "2024-05-21T12:24:23.085063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.22.228.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPAgVu3a2xadnc26Gg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "decbc13e-b519-44bc-8d4d-8dfcf7e64bf3", "DetectTime": "2024-05-21T12:24:23.097011+00:00", "EventTime": "2024-05-21T12:24:23.097032+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMfoc2M2ooCQxBKw8"], "accumulated_threat_level": 11.800000000000002, "timewindow": 3} +{"Format": "IDEA0", "ID": "064a9efa-50f9-458e-8296-9f94b73362f6", "DetectTime": "2024-05-21T12:24:23.107121+00:00", "EventTime": "2024-05-21T12:24:23.107142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMfoc2M2ooCQxBKw8"], "accumulated_threat_level": 12.600000000000003, "timewindow": 3} +{"Format": "Json", "ID": "064a9efa-50f9-458e-8296-9f94b73362f6", "DetectTime": "2024-05-21T12:24:23.107121+00:00", "EventTime": "2024-05-21T12:24:23.107142+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "1970-01-01T02:50:39.065071+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2024/05/21 12:24:23.296584)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 3, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "9fe50c08-63a4-49a4-842b-83a3e0bffcb4", "DetectTime": "2024-05-21T12:24:23.309933+00:00", "EventTime": "2024-05-21T12:24:23.309950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDWoT2BykWzxemmqd"], "accumulated_threat_level": 0.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "8b8487f8-bf0b-43ac-8fb2-3912c1fce0ef", "DetectTime": "2024-05-21T12:24:23.323936+00:00", "EventTime": "2024-05-21T12:24:23.323954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpcy13i5DgP359rd5"], "accumulated_threat_level": 1.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "91150de7-7d85-4d52-9619-782ae1464aee", "DetectTime": "2024-05-21T12:24:23.335338+00:00", "EventTime": "2024-05-21T12:24:23.335354+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2pBZwt9IqaglMX4"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "d328bfbc-4353-4995-9d4c-931daf16ed3e", "DetectTime": "2024-05-21T12:24:23.346857+00:00", "EventTime": "2024-05-21T12:24:23.346876+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2pBZwt9IqaglMX4"], "accumulated_threat_level": 2.1, "timewindow": 3} +{"Format": "IDEA0", "ID": "a1674049-0e55-4015-ac9a-5f5725bcb6f3", "DetectTime": "2024-05-21T12:24:23.357836+00:00", "EventTime": "2024-05-21T12:24:23.357853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2pBZwt9IqaglMX4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "ead30598-4a07-4340-aadf-cc37ef22ea12", "DetectTime": "2024-05-21T12:24:23.362680+00:00", "EventTime": "2024-05-21T12:24:23.362698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBlQC1WSbivNpPjmc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "272e059d-70d9-4938-91ed-5931285b921c", "DetectTime": "2024-05-21T12:24:23.367475+00:00", "EventTime": "2024-05-21T12:24:23.367494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.122.62.185 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSI4m4De7S3DiSqM"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "506fe409-2ad0-4c1e-b34c-4b37ab184f8a", "DetectTime": "2024-05-21T12:24:23.377305+00:00", "EventTime": "2024-05-21T12:24:23.377323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2dIc1481rgRby7SOd"], "accumulated_threat_level": 3.7, "timewindow": 3} +{"Format": "IDEA0", "ID": "077f5b35-3515-4325-9d1e-9cfcc2311849", "DetectTime": "2024-05-21T12:24:23.387339+00:00", "EventTime": "2024-05-21T12:24:23.387356+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDKza1bmEprN5ALg"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "99e212e8-e782-40dd-83e3-a27160df97fd", "DetectTime": "2024-05-21T12:24:23.398648+00:00", "EventTime": "2024-05-21T12:24:23.398666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6in31DX1TlIVQsRj"], "accumulated_threat_level": 4.5, "timewindow": 3} +{"Format": "IDEA0", "ID": "f385b477-23a3-40e9-ad0a-e75e29e9fb47", "DetectTime": "2024-05-21T12:24:23.403443+00:00", "EventTime": "2024-05-21T12:24:23.403461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnUcnk1eRai5ywo5q6"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "28621215-9eb2-4fc6-bff4-33de0ebf8b19", "DetectTime": "2024-05-21T12:24:23.414341+00:00", "EventTime": "2024-05-21T12:24:23.414357+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDKza1bmEprN5ALg"], "accumulated_threat_level": 5.0, "timewindow": 3} +{"Format": "IDEA0", "ID": "b00098cc-f4ed-41b3-9fa6-fa4c3efd1de3", "DetectTime": "2024-05-21T12:24:23.421707+00:00", "EventTime": "2024-05-21T12:24:23.421726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.9.200 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhxn34LtzF6qZr3H8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ec71bf85-51da-43cf-bdae-0d28aa5b9051", "DetectTime": "2024-05-21T12:24:23.431686+00:00", "EventTime": "2024-05-21T12:24:23.431703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDKza1bmEprN5ALg"], "accumulated_threat_level": 5.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "5a8d151e-1f57-44f3-9348-e15bdfe81738", "DetectTime": "2024-05-21T12:24:23.436569+00:00", "EventTime": "2024-05-21T12:24:23.436587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.154.42.157 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbWIZbfzBXbsFxgk"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f5f8c4db-b5ab-48be-8425-1d26625ae5bb", "DetectTime": "2024-05-21T12:24:23.446888+00:00", "EventTime": "2024-05-21T12:24:23.446908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJ5lf4RPo808q324h"], "accumulated_threat_level": 6.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "e6cb69ba-a988-41bb-b374-f9b334f397ac", "DetectTime": "2024-05-21T12:24:23.457465+00:00", "EventTime": "2024-05-21T12:24:23.457483+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrkN91MCtV8boQXyb"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "738cad8d-b7f4-4dd2-bc5e-39742c0607fd", "DetectTime": "2024-05-21T12:24:23.462202+00:00", "EventTime": "2024-05-21T12:24:23.462220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.154.42.157 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHo0m3eyf9npmn7vg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0ac607c3-b048-401f-93bc-67d5e0e062aa", "DetectTime": "2024-05-21T12:24:23.473193+00:00", "EventTime": "2024-05-21T12:24:23.473211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrkN91MCtV8boQXyb"], "accumulated_threat_level": 7.1, "timewindow": 3} +{"Format": "IDEA0", "ID": "0018b3c9-8d79-4e43-8b8b-19b4f852712a", "DetectTime": "2024-05-21T12:24:23.484893+00:00", "EventTime": "2024-05-21T12:24:23.484912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6pCM71Bv6zC1gwV21"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 3} +{"Format": "IDEA0", "ID": "929e29c1-74d1-40a8-a474-dc7dacff1072", "DetectTime": "2024-05-21T12:24:23.491315+00:00", "EventTime": "2024-05-21T12:24:23.491334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzFY4gghuADcYCg1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "3f49f61f-0119-4e83-9eea-1221b6f995b5", "DetectTime": "2024-05-21T12:24:23.503687+00:00", "EventTime": "2024-05-21T12:24:23.503706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrkN91MCtV8boQXyb"], "accumulated_threat_level": 8.7, "timewindow": 3} +{"Format": "IDEA0", "ID": "f61e1621-878e-48ef-9434-a3dd8db00f18", "DetectTime": "2024-05-21T12:24:23.508632+00:00", "EventTime": "2024-05-21T12:24:23.508649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sBXeWchkNk40ZQj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1aa49524-ee00-49a9-a19e-3418b9f12b12", "DetectTime": "2024-05-21T12:24:23.518495+00:00", "EventTime": "2024-05-21T12:24:23.518513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzS9WY2jOOdFpgc0Yl"], "accumulated_threat_level": 9.5, "timewindow": 3} +{"Format": "IDEA0", "ID": "c5522256-de5d-4fae-8646-72f97688817c", "DetectTime": "2024-05-21T12:24:23.523657+00:00", "EventTime": "2024-05-21T12:24:23.523675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.55.197.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm2w7k3WeueZaD015b"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "380b87d1-c2eb-491d-ad33-8266c6420b31", "DetectTime": "2024-05-21T12:24:23.528395+00:00", "EventTime": "2024-05-21T12:24:23.528413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.94.67.10 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLptD1oH4bsPJQkxl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e7f3a0d9-313d-4175-863d-d129e986c268", "DetectTime": "2024-05-21T12:24:23.533295+00:00", "EventTime": "2024-05-21T12:24:23.533313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0YTm4ogeigSucUd1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "cc2e5cf4-7064-4cb7-bd68-5286746e4871", "DetectTime": "2024-05-21T12:24:23.538069+00:00", "EventTime": "2024-05-21T12:24:23.538087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.165.6.146 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj97Lq4cu0hFIBeh0l"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "71517ff7-3b0f-478d-9929-b79757924e8b", "DetectTime": "2024-05-21T12:24:23.542977+00:00", "EventTime": "2024-05-21T12:24:23.542996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgTEYP1Rv4ln9gcxhl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7be44b2c-692b-499c-8b23-e6c0fa5605b8", "DetectTime": "2024-05-21T12:24:23.552534+00:00", "EventTime": "2024-05-21T12:24:23.552553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavQlT2oKK1dVMfZRg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "cd6351d6-1aac-44a0-971c-bceb36474fd7", "DetectTime": "2024-05-21T12:24:23.563791+00:00", "EventTime": "2024-05-21T12:24:23.563809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqi9lH2A2J2n5rM7Tc"], "accumulated_threat_level": 10.3, "timewindow": 3} +{"Format": "IDEA0", "ID": "cb457cc2-6b85-4166-a7d8-dfa5820fda0a", "DetectTime": "2024-05-21T12:24:23.574489+00:00", "EventTime": "2024-05-21T12:24:23.574507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZNFwu2BcE81fXVAb4"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "ce26b046-72b8-48ed-bcfe-7e384589a483", "DetectTime": "2024-05-21T12:24:23.585334+00:00", "EventTime": "2024-05-21T12:24:23.585352+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZNFwu2BcE81fXVAb4"], "accumulated_threat_level": 10.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "bf4ba8fb-51b4-4035-951f-f62546a9efb0", "DetectTime": "2024-05-21T12:24:23.590145+00:00", "EventTime": "2024-05-21T12:24:23.590163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.126.57 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4yMx2piZau7zJMwc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "84b68894-688c-4b24-8391-c14f71c00dd9", "DetectTime": "2024-05-21T12:24:23.601824+00:00", "EventTime": "2024-05-21T12:24:23.601842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OPRx4lO9rp0fP8ce"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "3abbeb71-a5c1-494e-b59d-76d2e4e61038", "DetectTime": "2024-05-21T12:24:23.611883+00:00", "EventTime": "2024-05-21T12:24:23.611902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZNFwu2BcE81fXVAb4"], "accumulated_threat_level": 11.600000000000001, "timewindow": 3} +{"Format": "IDEA0", "ID": "02c65271-77d2-4a79-9eaf-609c16a0ffe6", "DetectTime": "2024-05-21T12:24:23.624321+00:00", "EventTime": "2024-05-21T12:24:23.624341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OPRx4lO9rp0fP8ce"], "accumulated_threat_level": 12.100000000000001, "timewindow": 3} +{"Format": "Json", "ID": "02c65271-77d2-4a79-9eaf-609c16a0ffe6", "DetectTime": "2024-05-21T12:24:23.624321+00:00", "EventTime": "2024-05-21T12:24:23.624341+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "1970-01-01T02:50:42.084923+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 3. (real time 2024/05/21 12:24:23.831331)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 3, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "059f4e11-e4d9-4689-87fb-50929221185f", "DetectTime": "2024-05-21T12:24:23.836106+00:00", "EventTime": "2024-05-21T12:24:23.836127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CGXmdmckhfHmga"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "dc522040-0d23-47c0-99a4-c230ffa2140c", "DetectTime": "2024-05-21T12:24:23.846830+00:00", "EventTime": "2024-05-21T12:24:23.846848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2DdE3RiP2QA6MySj"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "2b6fd0da-36df-4740-92da-047cc053f2e2", "DetectTime": "2024-05-21T12:24:23.857715+00:00", "EventTime": "2024-05-21T12:24:23.857733+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2DdE3RiP2QA6MySj"], "accumulated_threat_level": 0.5, "timewindow": 3} +{"Format": "IDEA0", "ID": "03ef01cd-19a1-404a-a0fc-85342ebdbc41", "DetectTime": "2024-05-21T12:24:23.869832+00:00", "EventTime": "2024-05-21T12:24:23.869849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OPRx4lO9rp0fP8ce"], "accumulated_threat_level": 1.3, "timewindow": 3} +{"Format": "IDEA0", "ID": "161138e3-6308-4d22-b0a2-d610da27601f", "DetectTime": "2024-05-21T12:24:23.874454+00:00", "EventTime": "2024-05-21T12:24:23.874472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.106.248.231 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS98QO2Fw6u5v12bXg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6d778f74-55ae-497b-a759-4daf821922e9", "DetectTime": "2024-05-21T12:24:23.885066+00:00", "EventTime": "2024-05-21T12:24:23.885083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtuBdE1BqssmpE3vQ9"], "accumulated_threat_level": 0, "timewindow": 3} +{"Format": "IDEA0", "ID": "10a6ba2a-35e5-4efc-b2d6-50644dc35a4e", "DetectTime": "2024-05-21T12:24:23.896252+00:00", "EventTime": "2024-05-21T12:24:23.896273+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtuBdE1BqssmpE3vQ9"], "accumulated_threat_level": 1.8, "timewindow": 3} +{"Format": "IDEA0", "ID": "800edbe5-ded3-4c77-9214-9ab90e6ab9f1", "DetectTime": "2024-05-21T12:24:23.906830+00:00", "EventTime": "2024-05-21T12:24:23.906848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2DdE3RiP2QA6MySj"], "accumulated_threat_level": 2.6, "timewindow": 3} +{"Format": "IDEA0", "ID": "ef2e9b9e-1e16-44c6-97df-da6748377d15", "DetectTime": "2024-05-21T12:24:23.912841+00:00", "EventTime": "2024-05-21T12:24:23.912862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.52.202 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGSqQsPwV31Bkrqcc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "832a42c4-07f4-406c-9bac-77a4f11f24c6", "DetectTime": "2024-05-21T12:24:23.917861+00:00", "EventTime": "2024-05-21T12:24:23.917880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.232.130 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUJ0X1pGrnDirPOSc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "97d70883-fe75-4cc1-83f2-c728a6345854", "DetectTime": "2024-05-21T12:24:23.927654+00:00", "EventTime": "2024-05-21T12:24:23.927672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtuBdE1BqssmpE3vQ9"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "266f7111-a6ea-49a9-80d1-05b802db0196", "DetectTime": "2024-05-21T12:24:23.932459+00:00", "EventTime": "2024-05-21T12:24:23.932477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.233.22.243 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgIM92tNeW10jf8m2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "43ed7e05-4581-4f18-9404-fbe87199848a", "DetectTime": "2024-05-21T12:24:23.937094+00:00", "EventTime": "2024-05-21T12:24:23.937111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.42.211.201 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a7hb30XweWMhJ8wf"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "019f0ad3-327b-4a26-8894-8c752fb75d58", "DetectTime": "2024-05-21T12:24:23.946617+00:00", "EventTime": "2024-05-21T12:24:23.946634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7XLKJa2wbompdqu2"], "accumulated_threat_level": 0.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "ff123bd9-7d1a-46a3-adb6-a7c29b8e3602", "DetectTime": "2024-05-21T12:24:23.951623+00:00", "EventTime": "2024-05-21T12:24:23.951641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanDrc497fSdpg55i8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "02cfb21b-b578-42d9-a1ff-eac9d60de7dc", "DetectTime": "2024-05-21T12:24:23.956868+00:00", "EventTime": "2024-05-21T12:24:23.956899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 209.12.192.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5m1ol3MgXRMxbSyfc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c9b26295-a2ab-44c2-9947-a2327aeffb1a", "DetectTime": "2024-05-21T12:24:23.967497+00:00", "EventTime": "2024-05-21T12:24:23.967516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbhpF4OfSXJeGah3d"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7ed150fd-1cc3-4dc7-a29c-460c9e119814", "DetectTime": "2024-05-21T12:24:23.972521+00:00", "EventTime": "2024-05-21T12:24:23.972539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COaIF1482eMUuV379f"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "03c98310-85f6-424d-a34a-a21cf716eb39", "DetectTime": "2024-05-21T12:24:23.977237+00:00", "EventTime": "2024-05-21T12:24:23.977256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUJB94mE9M0TEVtC2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "79b82ed0-edff-4b32-b37b-b938b83468d3", "DetectTime": "2024-05-21T12:24:23.987037+00:00", "EventTime": "2024-05-21T12:24:23.987056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.19.92.194 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COybwt37XdiVNeMnZ7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0a65d76d-bfb5-401e-bef3-606368042f64", "DetectTime": "2024-05-21T12:24:23.992271+00:00", "EventTime": "2024-05-21T12:24:23.992288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvpi0i46uoRunt0lD8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "41f17d63-228e-4edf-bc08-d90e2b57ab31", "DetectTime": "2024-05-21T12:24:23.996736+00:00", "EventTime": "2024-05-21T12:24:23.996752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.151.170.232 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qsYk4WViSFZMsys4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "3e27bf27-6523-4c14-a785-ff330fbd77c1", "DetectTime": "2024-05-21T12:24:24.006167+00:00", "EventTime": "2024-05-21T12:24:24.006185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.15.249.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHDTqj4ICJgDGcu4A3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "86a148c7-e262-4ba2-ae00-c70d65e164b7", "DetectTime": "2024-05-21T12:24:24.011090+00:00", "EventTime": "2024-05-21T12:24:24.011109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.241.115.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbvig4NBF7ThtJO86"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0cb9cf75-571b-4835-a075-a03b6d6987f5", "DetectTime": "2024-05-21T12:24:24.016652+00:00", "EventTime": "2024-05-21T12:24:24.016672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSE5L1VhuaAX8pgu6"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9409b4bb-b225-4b83-9dfe-008d28d1bf69", "DetectTime": "2024-05-21T12:24:24.028919+00:00", "EventTime": "2024-05-21T12:24:24.028940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwzUD1TLIM3kHm9s1"], "accumulated_threat_level": 1.6, "timewindow": 4} +{"Format": "IDEA0", "ID": "e422660f-c78e-46c6-a208-fea27df916dc", "DetectTime": "2024-05-21T12:24:24.034267+00:00", "EventTime": "2024-05-21T12:24:24.034286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7Ok82b0mIzRjDDj7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d3d99f3a-07c4-4393-9b46-6939a42794c4", "DetectTime": "2024-05-21T12:24:24.039297+00:00", "EventTime": "2024-05-21T12:24:24.039316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.250.117.232 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNhP82aWWNZBsyOX8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "bb45d71d-bb62-42f0-9aca-dfd1b6dddd10", "DetectTime": "2024-05-21T12:24:24.049969+00:00", "EventTime": "2024-05-21T12:24:24.049987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53S0U22zJh531rSZc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 4} +{"Format": "IDEA0", "ID": "38dfce9a-09cc-4425-b003-9036e42a7687", "DetectTime": "2024-05-21T12:24:24.056309+00:00", "EventTime": "2024-05-21T12:24:24.056327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCT7uf2XhQMWalDGZj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "10db4918-b124-4b25-92b2-bcec77f4ed9e", "DetectTime": "2024-05-21T12:24:24.067020+00:00", "EventTime": "2024-05-21T12:24:24.067039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGr4NEXt4LhLkYFSh"], "accumulated_threat_level": 3.2, "timewindow": 4} +{"Format": "IDEA0", "ID": "4863f91b-f17b-487a-a233-61dfc2e93a8a", "DetectTime": "2024-05-21T12:24:24.081819+00:00", "EventTime": "2024-05-21T12:24:24.081837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQhhSW3rektsRMgMv1"], "accumulated_threat_level": 4.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "1129ffc9-0617-4bde-a64b-572e061b984d", "DetectTime": "2024-05-21T12:24:24.087359+00:00", "EventTime": "2024-05-21T12:24:24.087377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfxjWp6XramD0QZdd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6377a828-8872-4286-baf9-50e045be253f", "DetectTime": "2024-05-21T12:24:24.092981+00:00", "EventTime": "2024-05-21T12:24:24.093002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQx1h4YFxaTpJfcA2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "cf3facce-62bc-464a-8b43-f4882b4312e7", "DetectTime": "2024-05-21T12:24:24.098440+00:00", "EventTime": "2024-05-21T12:24:24.098460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctk2Z133nertT6Ewck"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9bfb11c4-30d3-4a13-90b2-17738e708efd", "DetectTime": "2024-05-21T12:24:24.103278+00:00", "EventTime": "2024-05-21T12:24:24.103296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.232.61.59 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1AAz2FXCFjZ6WbGf"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "40c782ab-53cc-42ae-b78d-1f11e14aea0e", "DetectTime": "2024-05-21T12:24:24.117812+00:00", "EventTime": "2024-05-21T12:24:24.117832+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwzUD1TLIM3kHm9s1"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "461283a9-30a9-44c3-960f-98e252995838", "DetectTime": "2024-05-21T12:24:24.130715+00:00", "EventTime": "2024-05-21T12:24:24.130732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwzUD1TLIM3kHm9s1"], "accumulated_threat_level": 4.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "4a7d9769-d458-43de-9609-cb5aafc5f379", "DetectTime": "2024-05-21T12:24:24.142046+00:00", "EventTime": "2024-05-21T12:24:24.142064+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGr4NEXt4LhLkYFSh"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "ae819036-ac50-4e82-b89c-431ed976edd2", "DetectTime": "2024-05-21T12:24:24.146933+00:00", "EventTime": "2024-05-21T12:24:24.146951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.125.106.103 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvpy1CWKVsif94s2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "342ab056-3744-4e95-8fd0-b70ca5c10c91", "DetectTime": "2024-05-21T12:24:24.157844+00:00", "EventTime": "2024-05-21T12:24:24.157864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGr4NEXt4LhLkYFSh"], "accumulated_threat_level": 5.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "72c78bcf-7e52-4dab-bad1-0c89137ca28a", "DetectTime": "2024-05-21T12:24:24.164659+00:00", "EventTime": "2024-05-21T12:24:24.164678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.82.113.18 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoSMx46fncnAQe8ch"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "523df8be-0cba-4c75-ba5a-640ec2f55d62", "DetectTime": "2024-05-21T12:24:24.175918+00:00", "EventTime": "2024-05-21T12:24:24.175937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDoazj3setCxiSEUn7"], "accumulated_threat_level": 5.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "0758ad68-2b65-4d84-b10a-ad21438e188d", "DetectTime": "2024-05-21T12:24:24.188325+00:00", "EventTime": "2024-05-21T12:24:24.188348+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIJAQ3os0JXnwX8te"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "b932510a-eb59-4bee-a4a6-d7fe272d8bda", "DetectTime": "2024-05-21T12:24:24.202617+00:00", "EventTime": "2024-05-21T12:24:24.202639+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIJAQ3os0JXnwX8te"], "accumulated_threat_level": 6.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "6237e4ae-5a15-46a3-a961-84fcc6529c75", "DetectTime": "2024-05-21T12:24:24.208233+00:00", "EventTime": "2024-05-21T12:24:24.208251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.3.27 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihKGF3ubpkPhlK7ib"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "35580025-af60-479e-b18c-a837c292cec1", "DetectTime": "2024-05-21T12:24:24.220754+00:00", "EventTime": "2024-05-21T12:24:24.220772+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgctnGBgz6pc0W0d"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "a6d89c91-5496-4a84-8e7f-f5c1b1008123", "DetectTime": "2024-05-21T12:24:24.231631+00:00", "EventTime": "2024-05-21T12:24:24.231649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIJAQ3os0JXnwX8te"], "accumulated_threat_level": 7.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "97be3dd4-ffae-4b3a-8b0d-b1ae7cea1ad5", "DetectTime": "2024-05-21T12:24:24.248256+00:00", "EventTime": "2024-05-21T12:24:24.248276+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgctnGBgz6pc0W0d"], "accumulated_threat_level": 7.6, "timewindow": 4} +{"Format": "IDEA0", "ID": "27a2f12b-c034-4a43-bdec-1872f2f9f49e", "DetectTime": "2024-05-21T12:24:24.253591+00:00", "EventTime": "2024-05-21T12:24:24.253610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.253.45 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSHQi3eqUgJZgQHT6"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "bca571bb-24b5-4164-b71b-d10b983e384d", "DetectTime": "2024-05-21T12:24:24.264864+00:00", "EventTime": "2024-05-21T12:24:24.264884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 162.197.203.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQW0Q1kdVg57tGrRi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c1b459a3-c12c-4bfd-937a-20df7f412c92", "DetectTime": "2024-05-21T12:24:24.279438+00:00", "EventTime": "2024-05-21T12:24:24.279456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kcmr2jBuladXqwp8"], "accumulated_threat_level": 8.4, "timewindow": 4} +{"Format": "IDEA0", "ID": "eeec23c0-0ee0-41bf-b2f3-8aa0d7de2a2b", "DetectTime": "2024-05-21T12:24:24.291072+00:00", "EventTime": "2024-05-21T12:24:24.291093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQnWVZqRfBSfgS9h"], "accumulated_threat_level": 9.200000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "665c067b-3cc3-4228-a47f-43c9a5602054", "DetectTime": "2024-05-21T12:24:24.296750+00:00", "EventTime": "2024-05-21T12:24:24.296771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.40.213.191 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTu1nhVjHOIX6G5m2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "cb7852b5-b03e-4261-84a4-3aa402d2408f", "DetectTime": "2024-05-21T12:24:24.310859+00:00", "EventTime": "2024-05-21T12:24:24.310878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqiCUw2NSQns5IcEr8"], "accumulated_threat_level": 10.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "df1d5988-b0f0-477c-9909-1e0971f4cdf5", "DetectTime": "2024-05-21T12:24:24.316338+00:00", "EventTime": "2024-05-21T12:24:24.316358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.184.109.119 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Pwds2sfHYzmVa9Hl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d5cf7d6a-4d40-421b-954b-8b8276b72282", "DetectTime": "2024-05-21T12:24:24.329068+00:00", "EventTime": "2024-05-21T12:24:24.329089+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kcmr2jBuladXqwp8"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "b4fcc502-f66a-45b9-acda-e5383bd23c3e", "DetectTime": "2024-05-21T12:24:24.340473+00:00", "EventTime": "2024-05-21T12:24:24.340491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kcmr2jBuladXqwp8"], "accumulated_threat_level": 10.500000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "32d2d2b8-532e-4814-a550-c00fbc992af0", "DetectTime": "2024-05-21T12:24:24.345213+00:00", "EventTime": "2024-05-21T12:24:24.345231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 209.149.141.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6T4G031NrIA3D0dfl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1bfee3b8-5165-4eb4-9111-41b1c6144527", "DetectTime": "2024-05-21T12:24:24.355059+00:00", "EventTime": "2024-05-21T12:24:24.355077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkImeB1YxVo9TWIHG1"], "accumulated_threat_level": 11.300000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "144d73b9-6341-4ae8-9b62-71e0d88db5a6", "DetectTime": "2024-05-21T12:24:24.359885+00:00", "EventTime": "2024-05-21T12:24:24.359902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.96.185 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnTa5F4h5xwB4eUh8f"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "fc7838b0-307a-407a-b754-5626cd8baa8a", "DetectTime": "2024-05-21T12:24:24.370022+00:00", "EventTime": "2024-05-21T12:24:24.370040+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPulv3gjZCQvr6lwg"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "b3459134-bfac-4dad-8822-e3e4d8f686e2", "DetectTime": "2024-05-21T12:24:24.381347+00:00", "EventTime": "2024-05-21T12:24:24.381365+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPulv3gjZCQvr6lwg"], "accumulated_threat_level": 11.800000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "3f032abb-f5f4-49ba-b79e-192309266ac3", "DetectTime": "2024-05-21T12:24:24.393272+00:00", "EventTime": "2024-05-21T12:24:24.393291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44q5t1eSEJ609vsJj"], "accumulated_threat_level": 12.600000000000003, "timewindow": 4} +{"Format": "Json", "ID": "3f032abb-f5f4-49ba-b79e-192309266ac3", "DetectTime": "2024-05-21T12:24:24.393272+00:00", "EventTime": "2024-05-21T12:24:24.393291+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "1970-01-01T03:21:33.131963+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2024/05/21 12:24:24.553202)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 4, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "5b3c13ac-71a6-41ad-bbf8-f0430eb09e2f", "DetectTime": "2024-05-21T12:24:24.562844+00:00", "EventTime": "2024-05-21T12:24:24.562861+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZbh33ENZEhqqucj1"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "63f6284e-9dd8-4f77-80b4-78c3dda92cec", "DetectTime": "2024-05-21T12:24:24.573970+00:00", "EventTime": "2024-05-21T12:24:24.573988+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZbh33ENZEhqqucj1"], "accumulated_threat_level": 0.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "524326a5-5255-4b7b-9ff9-652b903f15d1", "DetectTime": "2024-05-21T12:24:24.578958+00:00", "EventTime": "2024-05-21T12:24:24.578978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.38.41.24 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SXJ61MEBnzaXCSOe"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "8a2541b5-b513-450f-b9d7-0361db365aef", "DetectTime": "2024-05-21T12:24:24.589305+00:00", "EventTime": "2024-05-21T12:24:24.589325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPulv3gjZCQvr6lwg"], "accumulated_threat_level": 1.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "cfc42b8a-3f20-4bf2-9f59-9cc56d2957c6", "DetectTime": "2024-05-21T12:24:24.596835+00:00", "EventTime": "2024-05-21T12:24:24.596858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.254.227.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAvC82u1XQtkGLoo5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d9e216e5-e065-482e-842e-3026768c6ffc", "DetectTime": "2024-05-21T12:24:24.607726+00:00", "EventTime": "2024-05-21T12:24:24.607745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZbh33ENZEhqqucj1"], "accumulated_threat_level": 2.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "80c06e4d-5bd2-44f0-953c-e2527c7895ec", "DetectTime": "2024-05-21T12:24:24.625169+00:00", "EventTime": "2024-05-21T12:24:24.625186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1syYb4XTcFJIrnRYf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 4} +{"Format": "IDEA0", "ID": "f58a7923-b278-42e7-8893-3fdf4a9acfc3", "DetectTime": "2024-05-21T12:24:24.641534+00:00", "EventTime": "2024-05-21T12:24:24.641555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuOtJ23KWihJfWGui"], "accumulated_threat_level": 3.7, "timewindow": 4} +{"Format": "IDEA0", "ID": "06eb254f-8423-4ccc-a1a8-c832f5f8594e", "DetectTime": "2024-05-21T12:24:24.646917+00:00", "EventTime": "2024-05-21T12:24:24.646938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.238.8.184 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuS9X1WNrf6mc4hS4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "84ae0462-dc04-471b-8c13-8624a35b0d92", "DetectTime": "2024-05-21T12:24:24.657484+00:00", "EventTime": "2024-05-21T12:24:24.657502+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4HkR337jWCLXw3eij"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "b6d0c876-be87-46e5-b6db-fa160f3b68ef", "DetectTime": "2024-05-21T12:24:24.672047+00:00", "EventTime": "2024-05-21T12:24:24.672067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8bN63kLSSs4jBjk9"], "accumulated_threat_level": 4.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "b2e5164b-3e08-4e78-92dc-4b5432295218", "DetectTime": "2024-05-21T12:24:24.683716+00:00", "EventTime": "2024-05-21T12:24:24.683734+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4HkR337jWCLXw3eij"], "accumulated_threat_level": 5.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "05f7a0ad-40d8-48e8-897d-a31f4486b38a", "DetectTime": "2024-05-21T12:24:24.696538+00:00", "EventTime": "2024-05-21T12:24:24.696561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgG0LF4huUdpyh8lN1"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "3d544484-1527-4635-a7e5-81491436b467", "DetectTime": "2024-05-21T12:24:24.709308+00:00", "EventTime": "2024-05-21T12:24:24.709326+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgG0LF4huUdpyh8lN1"], "accumulated_threat_level": 5.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "0aa95e1c-77dd-47ad-8a80-19049274d2f6", "DetectTime": "2024-05-21T12:24:24.722599+00:00", "EventTime": "2024-05-21T12:24:24.722618+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVRCI1wzPdhKMZbE"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "63945abe-49dd-4f68-94d6-8a9576a3035c", "DetectTime": "2024-05-21T12:24:24.736828+00:00", "EventTime": "2024-05-21T12:24:24.736847+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVRCI1wzPdhKMZbE"], "accumulated_threat_level": 6.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "b1c7626f-dcb4-4275-a460-4078f74fc958", "DetectTime": "2024-05-21T12:24:24.751112+00:00", "EventTime": "2024-05-21T12:24:24.751130+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLjEl2oU4ZX4M2lkg"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "ac9b247b-18fd-42e4-82eb-08f5b4c08fd4", "DetectTime": "2024-05-21T12:24:24.764084+00:00", "EventTime": "2024-05-21T12:24:24.764102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLjEl2oU4ZX4M2lkg"], "accumulated_threat_level": 6.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "693e47f6-0b19-45aa-b9f2-9ddc1234db3b", "DetectTime": "2024-05-21T12:24:24.774398+00:00", "EventTime": "2024-05-21T12:24:24.774429+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2m1002tolntEILQAk"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "c75a9205-0b16-4085-b061-03d3a9e1e4e8", "DetectTime": "2024-05-21T12:24:24.787322+00:00", "EventTime": "2024-05-21T12:24:24.787342+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2m1002tolntEILQAk"], "accumulated_threat_level": 7.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "cdb7d747-5787-438e-8028-205e2b302a5b", "DetectTime": "2024-05-21T12:24:24.798308+00:00", "EventTime": "2024-05-21T12:24:24.798326+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGERh4B62vJCvU6oe"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "dd4fb3a3-86ab-4b44-923d-30e643801e47", "DetectTime": "2024-05-21T12:24:24.811334+00:00", "EventTime": "2024-05-21T12:24:24.811357+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGERh4B62vJCvU6oe"], "accumulated_threat_level": 7.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "9a9d3a79-0c89-4a7b-bfa5-9c104698d4ff", "DetectTime": "2024-05-21T12:24:24.822737+00:00", "EventTime": "2024-05-21T12:24:24.822755+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIZrdsj2hgLa2eEz8"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "6506faf8-62b6-46c0-9df1-532f41d8aeb0", "DetectTime": "2024-05-21T12:24:24.833139+00:00", "EventTime": "2024-05-21T12:24:24.833157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIZrdsj2hgLa2eEz8"], "accumulated_threat_level": 8.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "2232efd3-65b0-40d4-b65e-19bef659c956", "DetectTime": "2024-05-21T12:24:24.837988+00:00", "EventTime": "2024-05-21T12:24:24.838006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.216.250.89 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csn8TT2pzq8Is8vkX2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d08d3d15-086f-4e6d-8901-d3894e6b5bd1", "DetectTime": "2024-05-21T12:24:24.842689+00:00", "EventTime": "2024-05-21T12:24:24.842707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQ4acLZbU3vmPgb4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "689ee6b3-f5da-412b-bb8e-faddafc31d97", "DetectTime": "2024-05-21T12:24:24.847308+00:00", "EventTime": "2024-05-21T12:24:24.847326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.178.163.118 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQHK01ZcNCcFFQP2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c27dbd3a-2374-4363-b7f2-ea050aed78ff", "DetectTime": "2024-05-21T12:24:24.852033+00:00", "EventTime": "2024-05-21T12:24:24.852051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYITxuXxGBqYBD7k"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "71939c43-18ef-408c-9369-136c18515dce", "DetectTime": "2024-05-21T12:24:24.856657+00:00", "EventTime": "2024-05-21T12:24:24.856675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.250.168.28 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBJv53wiKvKDYQ0U1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c70412f9-d217-416d-9504-0507c30e9f19", "DetectTime": "2024-05-21T12:24:24.861426+00:00", "EventTime": "2024-05-21T12:24:24.861444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.236.84.133 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwDfR1sfJBRqCivUi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5a2420b6-8ed6-4aad-b482-96ebf45875a4", "DetectTime": "2024-05-21T12:24:24.866508+00:00", "EventTime": "2024-05-21T12:24:24.866532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.139.178.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybpXJgQUkJPIqcKe"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "915a6aa8-ef70-4032-99b4-91fd982e6891", "DetectTime": "2024-05-21T12:24:24.871798+00:00", "EventTime": "2024-05-21T12:24:24.871819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.132.36.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJBkj4KP3on7M5fL3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5194a888-babf-4d7e-a4c9-e93387b5476c", "DetectTime": "2024-05-21T12:24:24.883908+00:00", "EventTime": "2024-05-21T12:24:24.883927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4HkR337jWCLXw3eij"], "accumulated_threat_level": 8.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "cc6cf82c-2190-4658-a206-0a51abc18d51", "DetectTime": "2024-05-21T12:24:24.888965+00:00", "EventTime": "2024-05-21T12:24:24.888984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.240.76.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Dq9z2aA7QQwknBV"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "31eacff1-83c6-4e1e-b98b-e5a036825d08", "DetectTime": "2024-05-21T12:24:24.893713+00:00", "EventTime": "2024-05-21T12:24:24.893731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.97.194 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMK9xw3UkzY8fcf9ed"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "b97e5712-e89e-4d33-b342-e278e5e5206e", "DetectTime": "2024-05-21T12:24:24.898403+00:00", "EventTime": "2024-05-21T12:24:24.898432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.241.238.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUkhP638gQGUshFdof"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5ec90a3b-67c6-4d6f-a704-1f23a3be2f09", "DetectTime": "2024-05-21T12:24:24.903192+00:00", "EventTime": "2024-05-21T12:24:24.903210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.110.135.243 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck02xhz3qJaxHskdg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "d916bd9f-447c-4417-9497-90a40b17ff52", "DetectTime": "2024-05-21T12:24:24.908410+00:00", "EventTime": "2024-05-21T12:24:24.908429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.16.140 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN24aa9WPsHQ6cza"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c1fa8ae9-1b06-49b7-9825-e5885b8e0687", "DetectTime": "2024-05-21T12:24:24.913560+00:00", "EventTime": "2024-05-21T12:24:24.913579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQZGh45VTrQ1detXi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7ec5c476-55cb-4a95-bf7c-97424d12646f", "DetectTime": "2024-05-21T12:24:24.925501+00:00", "EventTime": "2024-05-21T12:24:24.925519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgG0LF4huUdpyh8lN1"], "accumulated_threat_level": 9.600000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "7c2fb1a0-cffc-4383-9d6a-582e37054591", "DetectTime": "2024-05-21T12:24:24.930443+00:00", "EventTime": "2024-05-21T12:24:24.930461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeo263iBzIuaySJOd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f673b9e6-2034-4a67-9fdb-1aaeb810b813", "DetectTime": "2024-05-21T12:24:24.941077+00:00", "EventTime": "2024-05-21T12:24:24.941095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxfHcD4y7xN0Gf8DP2"], "accumulated_threat_level": 10.400000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "86ef8033-c592-4de5-8c00-36ab9cecacc6", "DetectTime": "2024-05-21T12:24:24.945784+00:00", "EventTime": "2024-05-21T12:24:24.945802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.121.81.124 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SSHl3qoMXYOg29c9"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "90736b35-ef02-4a16-8537-0a9d8d9661ae", "DetectTime": "2024-05-21T12:24:24.956015+00:00", "EventTime": "2024-05-21T12:24:24.956036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSzMnx1SRb398AhyZ"], "accumulated_threat_level": 11.200000000000003, "timewindow": 4} +{"Format": "IDEA0", "ID": "0c8d0e70-3521-4a30-a146-1b942e779452", "DetectTime": "2024-05-21T12:24:24.967090+00:00", "EventTime": "2024-05-21T12:24:24.967109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TNVs1MRKFDSgYK8b"], "accumulated_threat_level": 12.000000000000004, "timewindow": 4} +{"Format": "Json", "ID": "0c8d0e70-3521-4a30-a146-1b942e779452", "DetectTime": "2024-05-21T12:24:24.967090+00:00", "EventTime": "2024-05-21T12:24:24.967109+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "1970-01-01T03:21:35.449506+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2024/05/21 12:24:25.106520)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000004, "timewindow": 4, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000004} +{"Format": "IDEA0", "ID": "e4c61f80-a303-4da3-a8f3-d59552cb497f", "DetectTime": "2024-05-21T12:24:25.116932+00:00", "EventTime": "2024-05-21T12:24:25.116951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVRCI1wzPdhKMZbE"], "accumulated_threat_level": 0.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "e4ddc2bc-d310-48ae-baa8-cd528eb16053", "DetectTime": "2024-05-21T12:24:25.132902+00:00", "EventTime": "2024-05-21T12:24:25.132921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3RuV2jhfSsr4L0gi"], "accumulated_threat_level": 1.6, "timewindow": 4} +{"Format": "IDEA0", "ID": "a2c66390-9f8e-4434-888c-59b7edb35e67", "DetectTime": "2024-05-21T12:24:25.143085+00:00", "EventTime": "2024-05-21T12:24:25.143104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLjEl2oU4ZX4M2lkg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 4} +{"Format": "IDEA0", "ID": "1ae95d44-f941-4458-b60d-c73a2f9c5c91", "DetectTime": "2024-05-21T12:24:25.154156+00:00", "EventTime": "2024-05-21T12:24:25.154175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2m1002tolntEILQAk"], "accumulated_threat_level": 3.2, "timewindow": 4} +{"Format": "IDEA0", "ID": "d963b9e6-f729-4e89-877c-fa482121fa5e", "DetectTime": "2024-05-21T12:24:25.159177+00:00", "EventTime": "2024-05-21T12:24:25.159196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.165.197.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQp6t2JY6I7bKFPc2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "4e8b1a99-9c2b-4383-979a-b40a972f495f", "DetectTime": "2024-05-21T12:24:25.168929+00:00", "EventTime": "2024-05-21T12:24:25.168947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jfdJ1vPXO7aFtyX3"], "accumulated_threat_level": 4.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "e2261282-f4c2-4c76-861c-cfcefb461da2", "DetectTime": "2024-05-21T12:24:25.178370+00:00", "EventTime": "2024-05-21T12:24:25.178388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGERh4B62vJCvU6oe"], "accumulated_threat_level": 4.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "5ff67426-2626-4dbf-ab26-42600c3db4ea", "DetectTime": "2024-05-21T12:24:25.189280+00:00", "EventTime": "2024-05-21T12:24:25.189298+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.68.90.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a5Ql4JsQGEoxZNb9"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "5b0bab46-a3dd-4159-a90b-a2ae453fed14", "DetectTime": "2024-05-21T12:24:25.200086+00:00", "EventTime": "2024-05-21T12:24:25.200103+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.68.90.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.68.90.31 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a5Ql4JsQGEoxZNb9"], "accumulated_threat_level": 5.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "e750f1e8-5178-4f37-bfb8-950a633143b8", "DetectTime": "2024-05-21T12:24:25.211804+00:00", "EventTime": "2024-05-21T12:24:25.211823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIZrdsj2hgLa2eEz8"], "accumulated_threat_level": 6.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "3f25a9bc-fb9d-4ce3-8767-3e63ba88b2d1", "DetectTime": "2024-05-21T12:24:25.222982+00:00", "EventTime": "2024-05-21T12:24:25.223002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.19.221.140 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIx4pl2DUmY5qWl9Z3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "361231a7-8f26-4017-855b-5caa3a99e3cc", "DetectTime": "2024-05-21T12:24:25.241574+00:00", "EventTime": "2024-05-21T12:24:25.241597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2Qeg1ecarRExE9dl"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 4} +{"Format": "IDEA0", "ID": "dac3b477-0211-495d-a00f-0781c7402b61", "DetectTime": "2024-05-21T12:24:25.248489+00:00", "EventTime": "2024-05-21T12:24:25.248508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.112.228.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiDuF2brVWFUF0REd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "feaa72f7-8fde-4720-824d-86359d3f8fdd", "DetectTime": "2024-05-21T12:24:25.263484+00:00", "EventTime": "2024-05-21T12:24:25.263501+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLF5u3k2z69sXkGlj"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "3711e347-b5a5-4b2a-99ef-f897c0124857", "DetectTime": "2024-05-21T12:24:25.277297+00:00", "EventTime": "2024-05-21T12:24:25.277318+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLF5u3k2z69sXkGlj"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 4} +{"Format": "IDEA0", "ID": "7ea23c7c-aece-40ae-ace7-f123b9af269e", "DetectTime": "2024-05-21T12:24:25.282491+00:00", "EventTime": "2024-05-21T12:24:25.282510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWOTtSxFPO7Suf3B3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a641aa9b-7897-4799-a0f6-59171eefe91a", "DetectTime": "2024-05-21T12:24:25.295519+00:00", "EventTime": "2024-05-21T12:24:25.295538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLF5u3k2z69sXkGlj"], "accumulated_threat_level": 8.2, "timewindow": 4} +{"Format": "IDEA0", "ID": "2982bcd1-ea2d-4eac-8006-c6e4f6760088", "DetectTime": "2024-05-21T12:24:25.300443+00:00", "EventTime": "2024-05-21T12:24:25.300461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.73.107 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKpJWjw5DDhVuNkl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "71b1ff11-4948-49b0-811e-94d7b1f15405", "DetectTime": "2024-05-21T12:24:25.312219+00:00", "EventTime": "2024-05-21T12:24:25.312238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEjL3okE9KKKiEnj"], "accumulated_threat_level": 9.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "cdb92ae1-e2c4-4ced-9ba8-e0926da1e7b3", "DetectTime": "2024-05-21T12:24:25.324660+00:00", "EventTime": "2024-05-21T12:24:25.324678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKDcPS4b4JR6aJeg"], "accumulated_threat_level": 9.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "d2535e71-e1a0-4945-a191-ce20c7ef047b", "DetectTime": "2024-05-21T12:24:25.341181+00:00", "EventTime": "2024-05-21T12:24:25.341199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYV0Q6KIYnjKtNm9"], "accumulated_threat_level": 10.600000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "3bf3f058-4865-441f-8bb5-65cb05f5652a", "DetectTime": "2024-05-21T12:24:25.351064+00:00", "EventTime": "2024-05-21T12:24:25.351081+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYkvd2CQCbsNMhzF5"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "7835c50d-fc5e-4a8a-aef4-3585788598ad", "DetectTime": "2024-05-21T12:24:25.363249+00:00", "EventTime": "2024-05-21T12:24:25.363267+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYkvd2CQCbsNMhzF5"], "accumulated_threat_level": 11.100000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "8c15389a-8a56-4fcf-a3f2-659907da1c93", "DetectTime": "2024-05-21T12:24:25.372838+00:00", "EventTime": "2024-05-21T12:24:25.372856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYkvd2CQCbsNMhzF5"], "accumulated_threat_level": 11.900000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "12ff77ec-b0cb-423c-b1e7-b1dce28b4776", "DetectTime": "2024-05-21T12:24:25.384197+00:00", "EventTime": "2024-05-21T12:24:25.384214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLgJo1Jnx1uVL9Pj"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "f162c923-ae26-40b6-8b68-b5d8d139386a", "DetectTime": "2024-05-21T12:24:25.398152+00:00", "EventTime": "2024-05-21T12:24:25.398172+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLgJo1Jnx1uVL9Pj"], "accumulated_threat_level": 12.400000000000002, "timewindow": 4} +{"Format": "Json", "ID": "f162c923-ae26-40b6-8b68-b5d8d139386a", "DetectTime": "2024-05-21T12:24:25.398152+00:00", "EventTime": "2024-05-21T12:24:25.398172+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "1970-01-01T03:51:58.244540+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2024/05/21 12:24:25.540622)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000002, "timewindow": 4, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000002} +{"Format": "IDEA0", "ID": "c20d0af7-fd3f-4bc1-a6ce-3469a0a9558c", "DetectTime": "2024-05-21T12:24:25.553425+00:00", "EventTime": "2024-05-21T12:24:25.553446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLgJo1Jnx1uVL9Pj"], "accumulated_threat_level": 0.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "c0daf1cb-e7e0-4b6d-9555-a73028bbee67", "DetectTime": "2024-05-21T12:24:25.564089+00:00", "EventTime": "2024-05-21T12:24:25.564107+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfL3JS1lG79QCtmN0k"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "7bb171fa-1423-4474-9d5d-b018ce28eaea", "DetectTime": "2024-05-21T12:24:25.574534+00:00", "EventTime": "2024-05-21T12:24:25.574556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfL3JS1lG79QCtmN0k"], "accumulated_threat_level": 1.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "5c83f845-8369-4ed2-bbb2-84b1c36025ce", "DetectTime": "2024-05-21T12:24:25.580049+00:00", "EventTime": "2024-05-21T12:24:25.580069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDg8v4k3upJFOAob5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "eb0d6646-c77e-47ab-9ca4-83858b39bd6e", "DetectTime": "2024-05-21T12:24:25.590236+00:00", "EventTime": "2024-05-21T12:24:25.590254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfL3JS1lG79QCtmN0k"], "accumulated_threat_level": 2.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "c10fc152-73fe-4624-82f7-a716d6161c61", "DetectTime": "2024-05-21T12:24:25.601197+00:00", "EventTime": "2024-05-21T12:24:25.601215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTACcG3WDHf4tQcfr6"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 4} +{"Format": "IDEA0", "ID": "155a5b38-022e-4047-abba-353ffef63734", "DetectTime": "2024-05-21T12:24:25.606296+00:00", "EventTime": "2024-05-21T12:24:25.606315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKc1g2ENFXInYVifb"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "686b000d-269d-4cf5-ac99-cca4073bd24c", "DetectTime": "2024-05-21T12:24:25.611030+00:00", "EventTime": "2024-05-21T12:24:25.611049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.142.76.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZtcR2L6FevU9wwug"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5a2ba414-4902-4905-b97b-77bf11e95941", "DetectTime": "2024-05-21T12:24:25.623585+00:00", "EventTime": "2024-05-21T12:24:25.623605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGF2AC3CHDV9n9KkY"], "accumulated_threat_level": 3.7, "timewindow": 4} +{"Format": "IDEA0", "ID": "71f863fd-75fa-4e52-9d66-23d06a9307b0", "DetectTime": "2024-05-21T12:24:25.628654+00:00", "EventTime": "2024-05-21T12:24:25.628674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.88.105.164 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkI5Sn4Du6DuEEfHK3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0ed10d60-2b77-438e-b631-c3fba73ad854", "DetectTime": "2024-05-21T12:24:25.639216+00:00", "EventTime": "2024-05-21T12:24:25.639234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UTSd4Z3ZAaJvvaw"], "accumulated_threat_level": 4.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "1a5e9f8f-3cb7-4f28-9bc4-8291136b59c5", "DetectTime": "2024-05-21T12:24:25.644445+00:00", "EventTime": "2024-05-21T12:24:25.644466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.131.60.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UJXE2m65r2sqxVZc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5fec317a-87e7-44f6-8ebc-cd6ac68be47f", "DetectTime": "2024-05-21T12:24:25.657702+00:00", "EventTime": "2024-05-21T12:24:25.657722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiWSF1sSZVbrW9bOl"], "accumulated_threat_level": 5.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "4adfb69c-35c4-466b-bc9b-238083bed086", "DetectTime": "2024-05-21T12:24:25.668597+00:00", "EventTime": "2024-05-21T12:24:25.668615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGPxKoFUzYgaRnOj"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "00272103-6fe8-4d54-a720-b26a1ed6e964", "DetectTime": "2024-05-21T12:24:25.679683+00:00", "EventTime": "2024-05-21T12:24:25.679704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGPxKoFUzYgaRnOj"], "accumulated_threat_level": 5.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "5ecaf790-175b-4803-90cc-c7e6ae574131", "DetectTime": "2024-05-21T12:24:25.685477+00:00", "EventTime": "2024-05-21T12:24:25.685496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.98.95.219 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CzSlrkchPSxf0V"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "b9f80f62-58d4-490c-ad38-970c8451d3e8", "DetectTime": "2024-05-21T12:24:25.696298+00:00", "EventTime": "2024-05-21T12:24:25.696317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGPxKoFUzYgaRnOj"], "accumulated_threat_level": 6.6, "timewindow": 4} +{"Format": "IDEA0", "ID": "cf703b79-5bd0-40be-b1b1-1e46c229ce2c", "DetectTime": "2024-05-21T12:24:25.707531+00:00", "EventTime": "2024-05-21T12:24:25.707548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTrg1D52phylaABh"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "5c96aa91-59be-4c0a-8970-4a30dc3bf5cd", "DetectTime": "2024-05-21T12:24:25.717926+00:00", "EventTime": "2024-05-21T12:24:25.717944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTrg1D52phylaABh"], "accumulated_threat_level": 7.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "d709d938-6812-4022-bd6b-10c2881b5345", "DetectTime": "2024-05-21T12:24:25.722760+00:00", "EventTime": "2024-05-21T12:24:25.722778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.10.65.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcMDUk1ElgIfRPH3Ji"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ba00b97c-2b67-4874-a0fe-8a15f562ce60", "DetectTime": "2024-05-21T12:24:25.733330+00:00", "EventTime": "2024-05-21T12:24:25.733349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTrg1D52phylaABh"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 4} +{"Format": "IDEA0", "ID": "8adc27c0-968c-4b11-b7fd-37e88417a79f", "DetectTime": "2024-05-21T12:24:25.748761+00:00", "EventTime": "2024-05-21T12:24:25.748778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0RUMq3WPutycA4LZg"], "accumulated_threat_level": 8.7, "timewindow": 4} +{"Format": "IDEA0", "ID": "6f9c7380-a246-46e9-8c74-45f625e9e728", "DetectTime": "2024-05-21T12:24:25.753599+00:00", "EventTime": "2024-05-21T12:24:25.753616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.162.252.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CTEq27hceBVBec6e"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5173aa27-46ba-47ab-ba72-972c368e4166", "DetectTime": "2024-05-21T12:24:25.758465+00:00", "EventTime": "2024-05-21T12:24:25.758483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.212.122.27 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDUZL1jg34zpKYwxk"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "05c1e539-818a-423f-8a97-59f19d77ad25", "DetectTime": "2024-05-21T12:24:25.766140+00:00", "EventTime": "2024-05-21T12:24:25.766161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.160.177.247 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKNZJ1FJCB7PUNh7f"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "86ad2ee1-e0c7-4c9a-beff-d59edb2d83b0", "DetectTime": "2024-05-21T12:24:25.771267+00:00", "EventTime": "2024-05-21T12:24:25.771285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.142.109 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGB8ntpEpslItvo6"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "45f72770-90eb-45f0-a030-89b7b7b1b155", "DetectTime": "2024-05-21T12:24:25.785951+00:00", "EventTime": "2024-05-21T12:24:25.785969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaoFaa4mdQb9meitfk"], "accumulated_threat_level": 9.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "495cb856-994b-41e9-b24a-276c8e3b28bb", "DetectTime": "2024-05-21T12:24:25.796861+00:00", "EventTime": "2024-05-21T12:24:25.796879+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQRA71Vk8BoJif3d1"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "8907ce58-f0e9-4851-8772-24524e269e9d", "DetectTime": "2024-05-21T12:24:25.810462+00:00", "EventTime": "2024-05-21T12:24:25.810480+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQRA71Vk8BoJif3d1"], "accumulated_threat_level": 10.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "4337ada9-7e6c-4767-b11d-515d3d2ae2bb", "DetectTime": "2024-05-21T12:24:25.815259+00:00", "EventTime": "2024-05-21T12:24:25.815277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.48.165 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdKLZ1rElrhxb1Cl9"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7248e5a6-7a35-4eee-9a6c-22ec715263a6", "DetectTime": "2024-05-21T12:24:25.826271+00:00", "EventTime": "2024-05-21T12:24:25.826288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQRA71Vk8BoJif3d1"], "accumulated_threat_level": 10.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "024daff2-4c40-48c9-b6cd-a2e4853eaf8b", "DetectTime": "2024-05-21T12:24:25.836414+00:00", "EventTime": "2024-05-21T12:24:25.836433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19iPj1AYanYPVlrNe"], "accumulated_threat_level": 11.600000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "bc7516f9-9a70-4203-b966-2fbfbd5b178e", "DetectTime": "2024-05-21T12:24:25.842024+00:00", "EventTime": "2024-05-21T12:24:25.842043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.87.241.241 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59uP12A4tzyK6yTXj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "99447c65-4008-4136-bd54-caf72fad9868", "DetectTime": "2024-05-21T12:24:25.853540+00:00", "EventTime": "2024-05-21T12:24:25.853558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXYxEC3EOVxElUdBm1"], "accumulated_threat_level": 12.400000000000002, "timewindow": 4} +{"Format": "Json", "ID": "99447c65-4008-4136-bd54-caf72fad9868", "DetectTime": "2024-05-21T12:24:25.853540+00:00", "EventTime": "2024-05-21T12:24:25.853558+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "1970-01-01T03:52:01.015064+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 4. (real time 2024/05/21 12:24:26.085656)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000002, "timewindow": 4, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000002} +{"Format": "IDEA0", "ID": "2ed733e0-f5bd-49db-8be4-7ca968cf9a50", "DetectTime": "2024-05-21T12:24:26.095842+00:00", "EventTime": "2024-05-21T12:24:26.095860+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9wiE1qMSIXsG50Rc"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "95f05528-eeb4-424b-bb09-43f5ba046fbe", "DetectTime": "2024-05-21T12:24:26.107577+00:00", "EventTime": "2024-05-21T12:24:26.107594+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9wiE1qMSIXsG50Rc"], "accumulated_threat_level": 0.5, "timewindow": 4} +{"Format": "IDEA0", "ID": "7ddbe6df-4374-4186-b06e-695ed20cfa74", "DetectTime": "2024-05-21T12:24:26.112410+00:00", "EventTime": "2024-05-21T12:24:26.112430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.3.210 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjfhFU2pDfDLoa9Iy4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "75f24a91-c617-4c3a-bf30-1c23c38a11c9", "DetectTime": "2024-05-21T12:24:26.122832+00:00", "EventTime": "2024-05-21T12:24:26.122850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9wiE1qMSIXsG50Rc"], "accumulated_threat_level": 1.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "1868d3bd-7e90-4156-99e9-8093b8c3eb25", "DetectTime": "2024-05-21T12:24:26.132531+00:00", "EventTime": "2024-05-21T12:24:26.132549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwXUl39AwwkGDhvs8"], "accumulated_threat_level": 2.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "ddaad71a-d443-4539-a18b-ef7f6bb9f43a", "DetectTime": "2024-05-21T12:24:26.142805+00:00", "EventTime": "2024-05-21T12:24:26.142824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tFFP3pyu8rmZaDJi"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 4} +{"Format": "IDEA0", "ID": "b5771fbb-d693-4803-bdeb-b26f24aa89e8", "DetectTime": "2024-05-21T12:24:26.153263+00:00", "EventTime": "2024-05-21T12:24:26.153281+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CplkAI2uMxtvB40RN8"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "bc05d3e8-fe1a-456c-80f9-0f3df20ced4b", "DetectTime": "2024-05-21T12:24:26.166706+00:00", "EventTime": "2024-05-21T12:24:26.166728+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CplkAI2uMxtvB40RN8"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 4} +{"Format": "IDEA0", "ID": "69ed8f2c-b09b-4e57-a8e7-86475afdb741", "DetectTime": "2024-05-21T12:24:26.178046+00:00", "EventTime": "2024-05-21T12:24:26.178065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CplkAI2uMxtvB40RN8"], "accumulated_threat_level": 4.2, "timewindow": 4} +{"Format": "IDEA0", "ID": "9cbce796-7a4b-4702-8fc4-b9c7b14c12b3", "DetectTime": "2024-05-21T12:24:26.189137+00:00", "EventTime": "2024-05-21T12:24:26.189158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CklF431utmUbMkOlYb"], "accumulated_threat_level": 5.0, "timewindow": 4} +{"Format": "IDEA0", "ID": "3d60deec-3e88-46ae-9306-d9055dd8fc6c", "DetectTime": "2024-05-21T12:24:26.199492+00:00", "EventTime": "2024-05-21T12:24:26.199514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusLMn5Mnoi715KO8"], "accumulated_threat_level": 5.8, "timewindow": 4} +{"Format": "IDEA0", "ID": "4e455646-6983-4982-ba75-8fbc5e04ae7d", "DetectTime": "2024-05-21T12:24:26.211999+00:00", "EventTime": "2024-05-21T12:24:26.212020+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CglXBG2uX5geu79ai8"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "828a98eb-ed1b-41af-8172-3d7ff7a31b55", "DetectTime": "2024-05-21T12:24:26.223416+00:00", "EventTime": "2024-05-21T12:24:26.223434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CglXBG2uX5geu79ai8"], "accumulated_threat_level": 6.3, "timewindow": 4} +{"Format": "IDEA0", "ID": "9b855482-a0cb-4e26-afe6-f27441e69955", "DetectTime": "2024-05-21T12:24:26.228813+00:00", "EventTime": "2024-05-21T12:24:26.228834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.229.84.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7vFn4tOymfcVNsn3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6fadea61-2442-4615-b422-560efb5db064", "DetectTime": "2024-05-21T12:24:26.239797+00:00", "EventTime": "2024-05-21T12:24:26.239817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CglXBG2uX5geu79ai8"], "accumulated_threat_level": 7.1, "timewindow": 4} +{"Format": "IDEA0", "ID": "7ff31cf6-c876-4293-81da-0d3d7ae1953c", "DetectTime": "2024-05-21T12:24:26.255067+00:00", "EventTime": "2024-05-21T12:24:26.255089+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeQmJ2u7Y6Ma8086i"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "9bf0e339-9c0f-42a2-9f70-7f3a68947028", "DetectTime": "2024-05-21T12:24:26.266280+00:00", "EventTime": "2024-05-21T12:24:26.266297+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeQmJ2u7Y6Ma8086i"], "accumulated_threat_level": 7.6, "timewindow": 4} +{"Format": "IDEA0", "ID": "5d54b9b6-0b2b-4932-beef-20810f72abe5", "DetectTime": "2024-05-21T12:24:26.271542+00:00", "EventTime": "2024-05-21T12:24:26.271563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.54.47.53 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IbdOLCYfS0DJyoa"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "163fdfce-f0bf-48e3-8dc2-71b6a80873b0", "DetectTime": "2024-05-21T12:24:26.282605+00:00", "EventTime": "2024-05-21T12:24:26.282623+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTgOz2XEfBaPTQbj7"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "acffcf7c-9fd3-4e9e-b755-bcaa46cf13da", "DetectTime": "2024-05-21T12:24:26.292701+00:00", "EventTime": "2024-05-21T12:24:26.292719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "Connection to unknown destination port 13354/UDP destination IP 41.103.153.125. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeQmJ2u7Y6Ma8086i"], "accumulated_threat_level": 8.4, "timewindow": 4} +{"Format": "IDEA0", "ID": "f08534d2-1e95-4d20-af40-ab6a268b5ce3", "DetectTime": "2024-05-21T12:24:26.303821+00:00", "EventTime": "2024-05-21T12:24:26.303840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTgOz2XEfBaPTQbj7"], "accumulated_threat_level": 8.9, "timewindow": 4} +{"Format": "IDEA0", "ID": "87d6bb49-66c7-406e-a662-d211c36a1940", "DetectTime": "2024-05-21T12:24:26.309637+00:00", "EventTime": "2024-05-21T12:24:26.309658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.15.162.66 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrIg22xEu3j2ySAab"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f60cbabc-e7bf-4c08-9007-2a89ef27c32f", "DetectTime": "2024-05-21T12:24:26.320834+00:00", "EventTime": "2024-05-21T12:24:26.320854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "Connection to unknown destination port 10326/UDP destination IP 1.53.52.122. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTgOz2XEfBaPTQbj7"], "accumulated_threat_level": 9.700000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "273880fa-78c2-4ed1-8ccc-a5944d486292", "DetectTime": "2024-05-21T12:24:26.331320+00:00", "EventTime": "2024-05-21T12:24:26.331337+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqEQ84LdOTtrMZE87"], "accumulated_threat_level": 0, "timewindow": 4} +{"Format": "IDEA0", "ID": "0233fc64-a509-4db5-b2f5-7b34b12f100f", "DetectTime": "2024-05-21T12:24:26.341746+00:00", "EventTime": "2024-05-21T12:24:26.341764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqEQ84LdOTtrMZE87"], "accumulated_threat_level": 10.200000000000001, "timewindow": 4} +{"Format": "IDEA0", "ID": "dcecaffd-f691-4cb3-9d3f-8e8f7835ac9b", "DetectTime": "2024-05-21T12:24:26.346552+00:00", "EventTime": "2024-05-21T12:24:26.346569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.92.1.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWU4sl2wwZ5P1uNUYg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "bf8d4cd2-2892-4216-85e2-881b94645127", "DetectTime": "2024-05-21T12:24:26.351387+00:00", "EventTime": "2024-05-21T12:24:26.351405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.146.148.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMBHX38ArCLT99zp5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ff6905a0-1e9b-4a44-b8b5-0b056d42cea3", "DetectTime": "2024-05-21T12:24:26.361359+00:00", "EventTime": "2024-05-21T12:24:26.361377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "Connection to unknown destination port 6442/UDP destination IP 190.11.116.7. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqEQ84LdOTtrMZE87"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "5d84f29e-3d10-4e52-bbe7-532f34f341dc", "DetectTime": "2024-05-21T12:24:26.366038+00:00", "EventTime": "2024-05-21T12:24:26.366056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.119.39.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFyymnHwXqz63sPsg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e0addbba-cf96-469e-9423-352896de3f2b", "DetectTime": "2024-05-21T12:24:26.371006+00:00", "EventTime": "2024-05-21T12:24:26.371027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBKhB49PFT8I5Fpyj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "03a3b86e-90fc-4a55-b1e6-c795f110bb76", "DetectTime": "2024-05-21T12:24:26.376131+00:00", "EventTime": "2024-05-21T12:24:26.376151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkE04O3Bdqll2Ws8Fb"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "03637c31-2d52-466b-b71d-ae30a4fdc4f8", "DetectTime": "2024-05-21T12:24:26.381222+00:00", "EventTime": "2024-05-21T12:24:26.381241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXR9P2me5MzNf9DXa"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1a116447-1788-4075-9daa-3aebec8eee76", "DetectTime": "2024-05-21T12:24:26.387783+00:00", "EventTime": "2024-05-21T12:24:26.387801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP8GpE3U3IBtTOLxva"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "2be721ce-6d68-4bc7-aa64-981177ac6512", "DetectTime": "2024-05-21T12:24:26.392420+00:00", "EventTime": "2024-05-21T12:24:26.392438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFCKi4R4JEPpOhA0i"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9f93d896-e5d9-4517-ad0f-932650e4f5e3", "DetectTime": "2024-05-21T12:24:26.403078+00:00", "EventTime": "2024-05-21T12:24:26.403098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NuQq3Mb0MLekfASd"], "accumulated_threat_level": 0.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "6eb6656f-4bd0-4d9e-9670-b3be0a64da2e", "DetectTime": "2024-05-21T12:24:26.408072+00:00", "EventTime": "2024-05-21T12:24:26.408091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COw9Cz3ztvG4JdqH0f"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c4763529-3aff-4cb4-bca6-8f17326903e4", "DetectTime": "2024-05-21T12:24:26.412780+00:00", "EventTime": "2024-05-21T12:24:26.412798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COj9me3EACRMA5jnMh"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "62ed1ec5-b476-44b0-8bac-c638421815b4", "DetectTime": "2024-05-21T12:24:26.417442+00:00", "EventTime": "2024-05-21T12:24:26.417460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl4jtS3JqjVdVsoWCg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f8a9ddfb-e26a-4993-9035-e8a8610d2775", "DetectTime": "2024-05-21T12:24:26.422165+00:00", "EventTime": "2024-05-21T12:24:26.422183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuv2z83Jui2qflaPi5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1c836eea-62a7-403c-91a0-ae74fdf46fdd", "DetectTime": "2024-05-21T12:24:26.427515+00:00", "EventTime": "2024-05-21T12:24:26.427536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxzR6m4DjfCvHZ5TG5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "b1ef2b68-4e1f-4b20-8cf1-0ee7869ca12e", "DetectTime": "2024-05-21T12:24:26.431934+00:00", "EventTime": "2024-05-21T12:24:26.431952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck30ov4Fjhw3EWszUe", "C8NBNr2u9d1cLGh7a3", "CiZ51w43n1tJPx7pTk", "CFnkBk3Y91Bb15WkH2"], "accumulated_threat_level": 1.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "448578e4-afa0-4f63-9ec9-1a6111d851d4", "DetectTime": "2024-05-21T12:24:26.436847+00:00", "EventTime": "2024-05-21T12:24:26.436864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.194.29 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBd4sUeDcvdUf7Xf"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9d5481e0-b8ef-45fe-8f92-8e181aa496b6", "DetectTime": "2024-05-21T12:24:26.446748+00:00", "EventTime": "2024-05-21T12:24:26.446766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.223.239.27 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhjmYSU5kyAnyPT2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "da7aa38b-95d2-4572-aa1b-c612c57e9d84", "DetectTime": "2024-05-21T12:24:26.451458+00:00", "EventTime": "2024-05-21T12:24:26.451476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJT4hhk3dXMEy1CM6"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a56e5318-4e99-44c0-a47f-cf17cb6fc17f", "DetectTime": "2024-05-21T12:24:26.461005+00:00", "EventTime": "2024-05-21T12:24:26.461023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwTuhIBAdus8drIc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "10da4296-4eb0-4aa1-ba60-4fdc16c279d3", "DetectTime": "2024-05-21T12:24:26.473870+00:00", "EventTime": "2024-05-21T12:24:26.473889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuM7Xe4KJVD39dTlC8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "936bccc1-de5f-4204-a7f7-a7e9243bd8d4", "DetectTime": "2024-05-21T12:24:26.485910+00:00", "EventTime": "2024-05-21T12:24:26.485928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyLyk11NXHGV6QY46"], "accumulated_threat_level": 2.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "5463abdf-5faa-49d6-8008-0afa60383583", "DetectTime": "2024-05-21T12:24:26.493824+00:00", "EventTime": "2024-05-21T12:24:26.493844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpDv33RL8aLptZjph"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6d2d9e02-a567-4345-82ed-d920c98bfa8a", "DetectTime": "2024-05-21T12:24:26.509021+00:00", "EventTime": "2024-05-21T12:24:26.509037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcWVx1A0nfVmgg1ja"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "a1965d5a-e7fa-4a24-8117-ab78311a27e0", "DetectTime": "2024-05-21T12:24:26.527841+00:00", "EventTime": "2024-05-21T12:24:26.527858+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcWVx1A0nfVmgg1ja"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "3eee4746-27a6-47dc-9793-babf85771370", "DetectTime": "2024-05-21T12:24:26.533062+00:00", "EventTime": "2024-05-21T12:24:26.533081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPoNLzPEhnX8nJ7d"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "23f5d14e-00e8-4b0d-b47d-857f01cb2c8f", "DetectTime": "2024-05-21T12:24:26.546039+00:00", "EventTime": "2024-05-21T12:24:26.546067+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcWVx1A0nfVmgg1ja"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "86eb84c0-7eed-44f2-a30d-823bb07bbc24", "DetectTime": "2024-05-21T12:24:26.555558+00:00", "EventTime": "2024-05-21T12:24:26.555576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiD7043E5BRRaXmk7g"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "a5309848-4c8b-41bb-a1e1-ef901b4ef85a", "DetectTime": "2024-05-21T12:24:26.560556+00:00", "EventTime": "2024-05-21T12:24:26.560574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbOhV1Wz1fnzk1KJ"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e8a4df97-7653-405b-8e2b-4992cc7d59de", "DetectTime": "2024-05-21T12:24:26.565809+00:00", "EventTime": "2024-05-21T12:24:26.565828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.154.42.157 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJWle4UgAVbmXNKm4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "71d520a7-c6af-4080-8130-4ff2ec31d605", "DetectTime": "2024-05-21T12:24:26.576497+00:00", "EventTime": "2024-05-21T12:24:26.576515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4X0ti2ou6I1Nh3dyg"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "78a6e87c-e6fe-4f91-963e-d26abec9da5e", "DetectTime": "2024-05-21T12:24:26.587803+00:00", "EventTime": "2024-05-21T12:24:26.587822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4X0ti2ou6I1Nh3dyg"], "accumulated_threat_level": 4.7, "timewindow": 5} +{"Format": "IDEA0", "ID": "f6237113-7383-40dc-88b8-4bd713e721a8", "DetectTime": "2024-05-21T12:24:26.602583+00:00", "EventTime": "2024-05-21T12:24:26.602602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXuCVt353HjWOT1a34"], "accumulated_threat_level": 5.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "62b6d84f-1a3e-4964-a02c-fd485cf9a0dc", "DetectTime": "2024-05-21T12:24:26.607755+00:00", "EventTime": "2024-05-21T12:24:26.607773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUo55qWrbeHriGF8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a98d0d96-8993-4044-8df5-41daba4d48cd", "DetectTime": "2024-05-21T12:24:26.621031+00:00", "EventTime": "2024-05-21T12:24:26.621050+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpoInqjKSqMtBaLeb"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "4e5e798c-af66-4537-a459-019e60cd7603", "DetectTime": "2024-05-21T12:24:26.632072+00:00", "EventTime": "2024-05-21T12:24:26.632092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4X0ti2ou6I1Nh3dyg"], "accumulated_threat_level": 6.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "00713032-7a1b-40a7-9e8c-2ebeefdfb15f", "DetectTime": "2024-05-21T12:24:26.645326+00:00", "EventTime": "2024-05-21T12:24:26.645344+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpoInqjKSqMtBaLeb"], "accumulated_threat_level": 6.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "8b57ced9-3913-4da1-9f11-39f8ea5913b6", "DetectTime": "2024-05-21T12:24:26.650138+00:00", "EventTime": "2024-05-21T12:24:26.650156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKNi92VUrJMrx76hh"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6394a5a9-3266-449e-8a85-6672184e1190", "DetectTime": "2024-05-21T12:24:26.665205+00:00", "EventTime": "2024-05-21T12:24:26.665223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpoInqjKSqMtBaLeb"], "accumulated_threat_level": 7.6, "timewindow": 5} +{"Format": "IDEA0", "ID": "cc1d2c56-42ca-4a1c-959e-68e48235bcd9", "DetectTime": "2024-05-21T12:24:26.670561+00:00", "EventTime": "2024-05-21T12:24:26.670582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGYum66sOI4hnoVg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ebfbff68-814b-4a9f-88f3-d007e46f0174", "DetectTime": "2024-05-21T12:24:26.683679+00:00", "EventTime": "2024-05-21T12:24:26.683697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Ghpu1Hm6jljrf1Wi"], "accumulated_threat_level": 8.4, "timewindow": 5} +{"Format": "IDEA0", "ID": "b13568a0-dcbe-476e-a4ab-0efee6bf6fa9", "DetectTime": "2024-05-21T12:24:26.688524+00:00", "EventTime": "2024-05-21T12:24:26.688542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.126.57 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sezz2kohCSCZLQEj"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "66376da7-6d3d-48f2-8d3a-474cf24fedce", "DetectTime": "2024-05-21T12:24:26.698857+00:00", "EventTime": "2024-05-21T12:24:26.698877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.52.202 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Glu3tpOZDHt0CH8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9278aa0f-a3d2-4864-a06f-d22b929fa453", "DetectTime": "2024-05-21T12:24:26.706424+00:00", "EventTime": "2024-05-21T12:24:26.706445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WHlA41I92BTUpVnl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6ecf3ccf-b2d5-4acb-b60a-4d15d410774c", "DetectTime": "2024-05-21T12:24:26.730667+00:00", "EventTime": "2024-05-21T12:24:26.730688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFqUitUOkIIojJjb"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6c0fc712-c17b-4217-b648-6748ad752403", "DetectTime": "2024-05-21T12:24:26.747910+00:00", "EventTime": "2024-05-21T12:24:26.747931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chwse83laYWxocW9Ug"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0f7df8d8-566d-4d43-9ad1-8606737ac39f", "DetectTime": "2024-05-21T12:24:26.759613+00:00", "EventTime": "2024-05-21T12:24:26.759632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJ4hg30YAK4v9Tgv"], "accumulated_threat_level": 9.200000000000001, "timewindow": 5} +{"Format": "IDEA0", "ID": "bd7e1096-9409-47f3-b55f-428e0a1c9162", "DetectTime": "2024-05-21T12:24:26.834091+00:00", "EventTime": "2024-05-21T12:24:26.834112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7FhsiJVFVrjfA86"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0d44b926-79cd-43f4-833a-407f1c371aec", "DetectTime": "2024-05-21T12:24:26.861049+00:00", "EventTime": "2024-05-21T12:24:26.861066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBmuxQ26v7IazB9aS2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5b48a2d4-8576-48c7-bede-78d671a31cab", "DetectTime": "2024-05-21T12:24:26.872065+00:00", "EventTime": "2024-05-21T12:24:26.872083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefjMCa9QVs6LIFA9"], "accumulated_threat_level": 10.000000000000002, "timewindow": 5} +{"Format": "IDEA0", "ID": "73fe321a-ed2c-447a-9abe-024583047f26", "DetectTime": "2024-05-21T12:24:26.880781+00:00", "EventTime": "2024-05-21T12:24:26.880800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UbWt46pPkQ4POyOg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "4c873668-2f07-43a7-8a0e-16e692f51f25", "DetectTime": "2024-05-21T12:24:26.892617+00:00", "EventTime": "2024-05-21T12:24:26.892635+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefjMCa9QVs6LIFA9"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "12e79559-b09e-4c5e-acde-a496b0c3dc67", "DetectTime": "2024-05-21T12:24:26.905143+00:00", "EventTime": "2024-05-21T12:24:26.905162+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefjMCa9QVs6LIFA9"], "accumulated_threat_level": 10.500000000000002, "timewindow": 5} +{"Format": "IDEA0", "ID": "62419400-7578-4b5d-a393-5c984ef4df98", "DetectTime": "2024-05-21T12:24:26.916154+00:00", "EventTime": "2024-05-21T12:24:26.916172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHWwc2mFFUDofj1sc"], "accumulated_threat_level": 11.300000000000002, "timewindow": 5} +{"Format": "IDEA0", "ID": "1c051acd-0a2d-457e-81eb-03edd4144c6e", "DetectTime": "2024-05-21T12:24:26.921328+00:00", "EventTime": "2024-05-21T12:24:26.921348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBF5XH2r6CqcurUv55"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "4de40c09-5951-4fc6-bd32-f49f6ce37a28", "DetectTime": "2024-05-21T12:24:26.933178+00:00", "EventTime": "2024-05-21T12:24:26.933198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQt3UdXohjnye0ia"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "192bfeca-9ff9-466a-b10e-f16e5015011f", "DetectTime": "2024-05-21T12:24:26.946165+00:00", "EventTime": "2024-05-21T12:24:26.946185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQt3UdXohjnye0ia"], "accumulated_threat_level": 11.800000000000002, "timewindow": 5} +{"Format": "IDEA0", "ID": "d160e916-4aca-40a0-9db6-ea6dd25e1468", "DetectTime": "2024-05-21T12:24:26.958581+00:00", "EventTime": "2024-05-21T12:24:26.958599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuEh4kKCjAxcTTxc"], "accumulated_threat_level": 12.600000000000003, "timewindow": 5} +{"Format": "Json", "ID": "d160e916-4aca-40a0-9db6-ea6dd25e1468", "DetectTime": "2024-05-21T12:24:26.958581+00:00", "EventTime": "2024-05-21T12:24:26.958599+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "1970-01-01T04:22:11.263674+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2024/05/21 12:24:27.127490)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 5, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "c233d390-fb4d-442c-ad0f-20df7fef1709", "DetectTime": "2024-05-21T12:24:27.131865+00:00", "EventTime": "2024-05-21T12:24:27.131884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.139.178.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3MMhj2GnBXwVBsFmb"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "77b93b22-c4a2-4445-bb21-66b734c3ed3c", "DetectTime": "2024-05-21T12:24:27.144312+00:00", "EventTime": "2024-05-21T12:24:27.144330+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXzjk4pqVTdoDmYvc"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "f5783e2e-c36a-4920-b9b8-1ac92112a95a", "DetectTime": "2024-05-21T12:24:27.155742+00:00", "EventTime": "2024-05-21T12:24:27.155762+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXzjk4pqVTdoDmYvc"], "accumulated_threat_level": 0.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "c465824f-5908-41b5-b54a-b5e3772c7432", "DetectTime": "2024-05-21T12:24:27.166136+00:00", "EventTime": "2024-05-21T12:24:27.166154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQt3UdXohjnye0ia"], "accumulated_threat_level": 1.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "2ce37d78-2106-492d-b828-45c7e11dadac", "DetectTime": "2024-05-21T12:24:27.171345+00:00", "EventTime": "2024-05-21T12:24:27.171363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrI2BL2QxGfqHMWo1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "9d517b5f-179b-44ef-8777-4b1cf65575d1", "DetectTime": "2024-05-21T12:24:27.181079+00:00", "EventTime": "2024-05-21T12:24:27.181097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXzjk4pqVTdoDmYvc"], "accumulated_threat_level": 2.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "1b272cc3-f97e-4b28-841d-7f0f9b88d79e", "DetectTime": "2024-05-21T12:24:27.185768+00:00", "EventTime": "2024-05-21T12:24:27.185786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7HIM3QykDanb23E7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1c0a58c7-2ade-43d8-b014-5875af31f5ba", "DetectTime": "2024-05-21T12:24:27.190452+00:00", "EventTime": "2024-05-21T12:24:27.190470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2L8U1gzDqfEHABi7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a7c0f3ec-9ad5-4ec5-b2d1-44ef57df61e7", "DetectTime": "2024-05-21T12:24:27.204682+00:00", "EventTime": "2024-05-21T12:24:27.204699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7wbl4dfAqP0YDH2i"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "0e20b4d3-566e-4c6c-8274-b8cc7d16845e", "DetectTime": "2024-05-21T12:24:27.209210+00:00", "EventTime": "2024-05-21T12:24:27.209227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9jdu1ti3b4bVj2b3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e8b8f696-1e00-471e-9696-da7f159d1977", "DetectTime": "2024-05-21T12:24:27.213929+00:00", "EventTime": "2024-05-21T12:24:27.213948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wdrT1nrEYtBhTPp1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f7cb1e05-1a50-49ac-84e2-e8b2e89109ee", "DetectTime": "2024-05-21T12:24:27.218858+00:00", "EventTime": "2024-05-21T12:24:27.218876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcUJJJWZTYCmp6y1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7c72efd5-3b42-47f1-9cd9-624d74de4b25", "DetectTime": "2024-05-21T12:24:27.223527+00:00", "EventTime": "2024-05-21T12:24:27.223545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXJzE4j1DIGqPgC29"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e0040f99-5b06-4a9c-8889-bfcc285bcef2", "DetectTime": "2024-05-21T12:24:27.228230+00:00", "EventTime": "2024-05-21T12:24:27.228248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.98.95.219 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zn9x4bwLTfEyttud"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ea27ed54-a67c-406c-b86b-133ae1c50c5e", "DetectTime": "2024-05-21T12:24:27.249234+00:00", "EventTime": "2024-05-21T12:24:27.249254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktfNi3bIrZMsjXvBf"], "accumulated_threat_level": 3.7, "timewindow": 5} +{"Format": "IDEA0", "ID": "4b46869e-941b-4d87-9940-3ef67a959e3f", "DetectTime": "2024-05-21T12:24:27.254458+00:00", "EventTime": "2024-05-21T12:24:27.254477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.3.210 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgcS1A22Z180xRv5ve"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "29536cc4-d6c5-483b-9909-8d73146184a4", "DetectTime": "2024-05-21T12:24:27.265655+00:00", "EventTime": "2024-05-21T12:24:27.265672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9csp3RGtcA1gMe52"], "accumulated_threat_level": 4.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "39558b90-db70-4cd7-b413-66af3b782deb", "DetectTime": "2024-05-21T12:24:27.276240+00:00", "EventTime": "2024-05-21T12:24:27.276258+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIdC33MK2Zt3W2a36"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "832b1131-942c-4e9b-9383-833c0330c83c", "DetectTime": "2024-05-21T12:24:27.287898+00:00", "EventTime": "2024-05-21T12:24:27.287919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIdC33MK2Zt3W2a36"], "accumulated_threat_level": 5.0, "timewindow": 5} +{"Format": "IDEA0", "ID": "3fcd8b33-696a-4cee-88d6-16c611d08a86", "DetectTime": "2024-05-21T12:24:27.299616+00:00", "EventTime": "2024-05-21T12:24:27.299639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIdC33MK2Zt3W2a36"], "accumulated_threat_level": 5.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "3d972639-d7d7-44ad-ac3e-4867a44b2fe1", "DetectTime": "2024-05-21T12:24:27.311230+00:00", "EventTime": "2024-05-21T12:24:27.311247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HQlo390viI968yB9"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "8adddd0b-3161-40de-bd85-ad9488e31a40", "DetectTime": "2024-05-21T12:24:27.323033+00:00", "EventTime": "2024-05-21T12:24:27.323051+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HQlo390viI968yB9"], "accumulated_threat_level": 6.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "744510be-7c6a-495a-96fc-83aafd05e890", "DetectTime": "2024-05-21T12:24:27.333902+00:00", "EventTime": "2024-05-21T12:24:27.333920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HQlo390viI968yB9"], "accumulated_threat_level": 7.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "828b4217-3aa4-4b50-9f34-3eadad45d26d", "DetectTime": "2024-05-21T12:24:27.343539+00:00", "EventTime": "2024-05-21T12:24:27.343557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7Ged2oa9Ja8g56ad"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 5} +{"Format": "IDEA0", "ID": "fe6417b3-66c2-43e2-b9ff-c38f01f5dd8e", "DetectTime": "2024-05-21T12:24:27.348593+00:00", "EventTime": "2024-05-21T12:24:27.348611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0iIY1UNzUiwjE4N8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "91023f92-17a9-4496-88f3-211122a9662f", "DetectTime": "2024-05-21T12:24:27.471343+00:00", "EventTime": "2024-05-21T12:24:27.471361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C28Nds2rkF3OjmtrRj"], "accumulated_threat_level": 8.7, "timewindow": 5} +{"Format": "IDEA0", "ID": "3b0d3d80-fcf4-4507-99cd-965427ee3fbd", "DetectTime": "2024-05-21T12:24:27.481794+00:00", "EventTime": "2024-05-21T12:24:27.481812+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nR3b41JNCLlCjWhb"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "0fbf1898-5460-4bf8-bd85-d13b669162d3", "DetectTime": "2024-05-21T12:24:27.492469+00:00", "EventTime": "2024-05-21T12:24:27.492487+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nR3b41JNCLlCjWhb"], "accumulated_threat_level": 9.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "d0d81a88-4891-41e2-a5a4-1ea2740bbb0b", "DetectTime": "2024-05-21T12:24:27.502747+00:00", "EventTime": "2024-05-21T12:24:27.502765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nR3b41JNCLlCjWhb"], "accumulated_threat_level": 10.0, "timewindow": 5} +{"Format": "IDEA0", "ID": "7a81b619-3f9d-4071-aaa9-f2adccf4c55f", "DetectTime": "2024-05-21T12:24:27.530783+00:00", "EventTime": "2024-05-21T12:24:27.530805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0999F2ubUa6cGTANh"], "accumulated_threat_level": 10.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "d3902226-78a5-497b-ab2f-275bc97a72de", "DetectTime": "2024-05-21T12:24:27.541791+00:00", "EventTime": "2024-05-21T12:24:27.541816+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhT4h2jesZXEPN2O3"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "7a77da47-41a6-440c-aa92-606cd9ee25b7", "DetectTime": "2024-05-21T12:24:27.554348+00:00", "EventTime": "2024-05-21T12:24:27.554369+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhT4h2jesZXEPN2O3"], "accumulated_threat_level": 11.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "12e12f6d-42da-4d26-aa09-cb037fd85003", "DetectTime": "2024-05-21T12:24:27.566111+00:00", "EventTime": "2024-05-21T12:24:27.566129+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYsev1B4Qp2S7w4Gd"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "d137379d-670e-45a0-8035-6b28b4422bb7", "DetectTime": "2024-05-21T12:24:27.576597+00:00", "EventTime": "2024-05-21T12:24:27.576614+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYsev1B4Qp2S7w4Gd"], "accumulated_threat_level": 11.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "fa3f7fbd-101b-4f6d-9507-59d1e3f502e8", "DetectTime": "2024-05-21T12:24:27.599410+00:00", "EventTime": "2024-05-21T12:24:27.599431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU3u71G3UQK1ikFQk"], "accumulated_threat_level": 12.600000000000001, "timewindow": 5} +{"Format": "Json", "ID": "fa3f7fbd-101b-4f6d-9507-59d1e3f502e8", "DetectTime": "2024-05-21T12:24:27.599410+00:00", "EventTime": "2024-05-21T12:24:27.599431+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "1970-01-01T04:23:05.389653+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2024/05/21 12:24:27.736455)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000001, "timewindow": 5, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000001} +{"Format": "IDEA0", "ID": "54861c48-fb00-467d-9042-91c19d5840e1", "DetectTime": "2024-05-21T12:24:27.747409+00:00", "EventTime": "2024-05-21T12:24:27.747427+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cptp551lMpQ1AQfrQ2"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "6ce32bb4-2c6a-4676-a1d1-13a78bffbce2", "DetectTime": "2024-05-21T12:24:27.762118+00:00", "EventTime": "2024-05-21T12:24:27.762138+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cptp551lMpQ1AQfrQ2"], "accumulated_threat_level": 0.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "28e78a35-7d19-48c9-995c-3ae779281aa1", "DetectTime": "2024-05-21T12:24:27.772335+00:00", "EventTime": "2024-05-21T12:24:27.772352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cptp551lMpQ1AQfrQ2"], "accumulated_threat_level": 1.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "a9901715-6f09-42d6-9807-d1f24e5b44d3", "DetectTime": "2024-05-21T12:24:27.782399+00:00", "EventTime": "2024-05-21T12:24:27.782431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc8f63yRwuEQXmNX9"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "bce40a32-9683-4bb7-b64a-092c4d84159d", "DetectTime": "2024-05-21T12:24:27.793366+00:00", "EventTime": "2024-05-21T12:24:27.793384+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc8f63yRwuEQXmNX9"], "accumulated_threat_level": 1.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "3dc18f7e-8480-4341-9b7e-c5e9ada66342", "DetectTime": "2024-05-21T12:24:27.868187+00:00", "EventTime": "2024-05-21T12:24:27.868205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuYUU94criTAaBhs0b"], "accumulated_threat_level": 2.6, "timewindow": 5} +{"Format": "IDEA0", "ID": "fc520d25-3ab3-4bb4-8931-c359ec183928", "DetectTime": "2024-05-21T12:24:27.911174+00:00", "EventTime": "2024-05-21T12:24:27.911194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClZWqo3tMyJlofCFUe"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "72d51a25-7358-4631-aa45-0070240eee88", "DetectTime": "2024-05-21T12:24:27.989871+00:00", "EventTime": "2024-05-21T12:24:27.989892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeztRl37wAHFKIGCT9", "CBWQG9POF8FgAppm8", "CnMs8V3xQPcK4myeSi", "COj1kVxtemdXttPGi"], "accumulated_threat_level": 3.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "1209d4b5-8f7e-478c-a19e-c6e7e842eeef", "DetectTime": "2024-05-21T12:24:28.297492+00:00", "EventTime": "2024-05-21T12:24:28.297516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwVwXT33T3SZe2qnj7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a8178faa-304c-475b-8742-b15f0d2eeca1", "DetectTime": "2024-05-21T12:24:28.311869+00:00", "EventTime": "2024-05-21T12:24:28.311889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9rPG113QKlY4mRN4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6979d268-7649-4238-b3de-ee12c74065f2", "DetectTime": "2024-05-21T12:24:28.317358+00:00", "EventTime": "2024-05-21T12:24:28.317378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9OUG2FfA4oqkIc17"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "32cdb341-0bdc-4de8-a9eb-9ad3a0878467", "DetectTime": "2024-05-21T12:24:28.325240+00:00", "EventTime": "2024-05-21T12:24:28.325259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWRhs4qyq907KyVPg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1ee0e56d-8efd-4ec0-90a9-f504c8b4d698", "DetectTime": "2024-05-21T12:24:28.339922+00:00", "EventTime": "2024-05-21T12:24:28.339941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqduHm62br85u1Aa"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e9c5ac6a-0625-4627-bc63-650c9969d2f4", "DetectTime": "2024-05-21T12:24:28.358371+00:00", "EventTime": "2024-05-21T12:24:28.358390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5n2PQuComEU1ha1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c75dd270-2c76-4daf-8693-f02105a60fd2", "DetectTime": "2024-05-21T12:24:28.377903+00:00", "EventTime": "2024-05-21T12:24:28.377923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpcisg1bNHIoOwKyfk"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "4cd86cc1-31e1-4d12-b5d0-badd1ec92091", "DetectTime": "2024-05-21T12:24:28.408187+00:00", "EventTime": "2024-05-21T12:24:28.408210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXxokoKuNm4Soj6g"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "b262c328-8fda-4399-8f7b-9c82d6eace24", "DetectTime": "2024-05-21T12:24:28.420368+00:00", "EventTime": "2024-05-21T12:24:28.420388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzkSlI2bkOt7Kk6NSk"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "cbe72d99-e554-46cf-8e28-68195a6551f2", "DetectTime": "2024-05-21T12:24:28.427980+00:00", "EventTime": "2024-05-21T12:24:28.428000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO66dslw6YGIRyQ8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "53a472cb-ecec-4bd3-802b-1ac696f153c5", "DetectTime": "2024-05-21T12:24:28.448200+00:00", "EventTime": "2024-05-21T12:24:28.448223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.223.239.27 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Hnd01URzROGblku2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "24f4d4cc-a374-47b4-8f0c-d27057296770", "DetectTime": "2024-05-21T12:24:28.488105+00:00", "EventTime": "2024-05-21T12:24:28.488123+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.53.52.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzRke3cOS9sKL6Lch"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "1927c2f7-2fec-4a6e-bda7-9f84e4f7f412", "DetectTime": "2024-05-21T12:24:28.500300+00:00", "EventTime": "2024-05-21T12:24:28.500320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.53.52.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.53.52.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzRke3cOS9sKL6Lch"], "accumulated_threat_level": 4.4, "timewindow": 5} +{"Format": "IDEA0", "ID": "1c35948f-8dc7-4ab5-a92f-36e871059e5f", "DetectTime": "2024-05-21T12:24:28.516048+00:00", "EventTime": "2024-05-21T12:24:28.516065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.153.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCo1J2AO6b16hqHDh"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "80a12c57-6ca7-4cb7-af8a-c36a1af5c045", "DetectTime": "2024-05-21T12:24:28.526546+00:00", "EventTime": "2024-05-21T12:24:28.526568+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.153.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.153.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCo1J2AO6b16hqHDh"], "accumulated_threat_level": 4.9, "timewindow": 5} +{"Format": "IDEA0", "ID": "d012542c-7054-4670-a0b3-45b9ee1dc8d9", "DetectTime": "2024-05-21T12:24:28.641562+00:00", "EventTime": "2024-05-21T12:24:28.641583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2NTmW3qQv3vExUfJb"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "892ff1c0-9f64-467a-95d2-a18d8af597ee", "DetectTime": "2024-05-21T12:24:28.667249+00:00", "EventTime": "2024-05-21T12:24:28.667269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDRaU3UOIuVXSznO7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "c6c3c599-0a81-4c5a-bedd-d3f92b4ec3c2", "DetectTime": "2024-05-21T12:24:28.682033+00:00", "EventTime": "2024-05-21T12:24:28.682050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoA0LA2tm4UUB8fc13"], "accumulated_threat_level": 5.7, "timewindow": 5} +{"Format": "IDEA0", "ID": "bbefa440-147f-4700-a762-5317f78f1af8", "DetectTime": "2024-05-21T12:24:28.690319+00:00", "EventTime": "2024-05-21T12:24:28.690339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.194.29 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRan813QW3tazOmxW5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "16d43cfb-43c7-4aa8-be8d-dedb7e3e7c83", "DetectTime": "2024-05-21T12:24:28.710704+00:00", "EventTime": "2024-05-21T12:24:28.710727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdP9VR2HSJDwWihTqi"], "accumulated_threat_level": 6.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "8bb27bf0-6e18-4786-9856-b898eb6c9472", "DetectTime": "2024-05-21T12:24:28.718475+00:00", "EventTime": "2024-05-21T12:24:28.718498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClqI6SsADqLAqduck"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "0fe40f0e-36d7-4b4a-959e-baef326646f6", "DetectTime": "2024-05-21T12:24:28.736495+00:00", "EventTime": "2024-05-21T12:24:28.736512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1AtoCx6zTT3Ndenf"], "accumulated_threat_level": 7.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "6d9223c8-f215-4066-8282-8e8c09c8c86c", "DetectTime": "2024-05-21T12:24:28.747960+00:00", "EventTime": "2024-05-21T12:24:28.747978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.11.116.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK5Xwj1FsZNsJ00sfe"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "e8b55304-9938-4efa-b414-965823eb76b9", "DetectTime": "2024-05-21T12:24:28.759608+00:00", "EventTime": "2024-05-21T12:24:28.759627+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.11.116.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.11.116.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK5Xwj1FsZNsJ00sfe"], "accumulated_threat_level": 7.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "9a1ea9b0-1e8b-4e03-83b1-67e090da9f38", "DetectTime": "2024-05-21T12:24:28.772643+00:00", "EventTime": "2024-05-21T12:24:28.772663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mC6y2YO1KWxJ25ee"], "accumulated_threat_level": 8.6, "timewindow": 5} +{"Format": "IDEA0", "ID": "83a07577-e97d-4201-b54c-ce292ea32e02", "DetectTime": "2024-05-21T12:24:28.787873+00:00", "EventTime": "2024-05-21T12:24:28.787892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1AtoCx6zTT3Ndenf"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "716fda1b-a453-4726-b25d-bbfb938b9581", "DetectTime": "2024-05-21T12:24:28.802249+00:00", "EventTime": "2024-05-21T12:24:28.802270+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1AtoCx6zTT3Ndenf"], "accumulated_threat_level": 9.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "fbd36a3b-ad13-476f-aa36-d0b1fb66b9e0", "DetectTime": "2024-05-21T12:24:28.815415+00:00", "EventTime": "2024-05-21T12:24:28.815432+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVM8F2oifbLY0mYMa"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "9fb0adca-a817-4052-9488-6b0fd2666abb", "DetectTime": "2024-05-21T12:24:28.826151+00:00", "EventTime": "2024-05-21T12:24:28.826169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVM8F2oifbLY0mYMa"], "accumulated_threat_level": 9.9, "timewindow": 5} +{"Format": "IDEA0", "ID": "a0d34bb6-0362-41d0-91fd-37926551ef48", "DetectTime": "2024-05-21T12:24:28.838257+00:00", "EventTime": "2024-05-21T12:24:28.838275+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVM8F2oifbLY0mYMa"], "accumulated_threat_level": 10.4, "timewindow": 5} +{"Format": "IDEA0", "ID": "7c32411d-9e96-4ce6-bae5-a6fff3f22b35", "DetectTime": "2024-05-21T12:24:28.849529+00:00", "EventTime": "2024-05-21T12:24:28.849550+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGon4BIhyvmna9cld"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "94385ef9-6944-44c3-a4f3-0f41d1500df1", "DetectTime": "2024-05-21T12:24:28.861282+00:00", "EventTime": "2024-05-21T12:24:28.861302+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGon4BIhyvmna9cld"], "accumulated_threat_level": 10.9, "timewindow": 5} +{"Format": "IDEA0", "ID": "3844e243-91c2-4a01-aed4-3603a593d6eb", "DetectTime": "2024-05-21T12:24:28.871898+00:00", "EventTime": "2024-05-21T12:24:28.871916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGon4BIhyvmna9cld"], "accumulated_threat_level": 11.700000000000001, "timewindow": 5} +{"Format": "IDEA0", "ID": "ffb3583c-1e7e-4f7b-b6e2-bd20bbd52a79", "DetectTime": "2024-05-21T12:24:28.883812+00:00", "EventTime": "2024-05-21T12:24:28.883830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJEub2a4gqsfITIr"], "accumulated_threat_level": 12.500000000000002, "timewindow": 5} +{"Format": "Json", "ID": "ffb3583c-1e7e-4f7b-b6e2-bd20bbd52a79", "DetectTime": "2024-05-21T12:24:28.883812+00:00", "EventTime": "2024-05-21T12:24:28.883830+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "1970-01-01T04:54:31.110407+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2024/05/21 12:24:29.095560)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 5, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "5eaf1dbd-1a26-4ab8-881c-569861d55ec1", "DetectTime": "2024-05-21T12:24:29.106133+00:00", "EventTime": "2024-05-21T12:24:29.106153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBk0334MRo2xNrlYJl"], "accumulated_threat_level": 0.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "70d8b136-dbfd-42d8-a311-76c280fb506f", "DetectTime": "2024-05-21T12:24:29.126286+00:00", "EventTime": "2024-05-21T12:24:29.126305+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaWW83IHOw2QXGvO3"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "2a05722f-73c8-486a-a292-01e46829d34e", "DetectTime": "2024-05-21T12:24:29.137250+00:00", "EventTime": "2024-05-21T12:24:29.137268+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaWW83IHOw2QXGvO3"], "accumulated_threat_level": 1.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "32b4c2d3-0ca4-4e1c-bff1-0cb7edeee49c", "DetectTime": "2024-05-21T12:24:29.147356+00:00", "EventTime": "2024-05-21T12:24:29.147375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaWW83IHOw2QXGvO3"], "accumulated_threat_level": 2.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "948d983b-7e0b-413b-9a7a-cac744a1c994", "DetectTime": "2024-05-21T12:24:29.158672+00:00", "EventTime": "2024-05-21T12:24:29.158690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvgAkR1UQHUAUacGU1"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "11d8ab20-8c62-4875-a06b-66500514f0f6", "DetectTime": "2024-05-21T12:24:29.169950+00:00", "EventTime": "2024-05-21T12:24:29.169969+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvgAkR1UQHUAUacGU1"], "accumulated_threat_level": 2.6, "timewindow": 5} +{"Format": "IDEA0", "ID": "ccf19da2-14a7-40cb-8ad5-56934a7dc45b", "DetectTime": "2024-05-21T12:24:29.180284+00:00", "EventTime": "2024-05-21T12:24:29.180303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvgAkR1UQHUAUacGU1"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "6cfb2b53-04e8-42cf-9e0c-8fb35c4aa4a2", "DetectTime": "2024-05-21T12:24:29.192172+00:00", "EventTime": "2024-05-21T12:24:29.192190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlVJl4SXokhlqtM2f"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "6c4d1848-b722-4df7-a7a0-f1d41f30f24f", "DetectTime": "2024-05-21T12:24:29.203368+00:00", "EventTime": "2024-05-21T12:24:29.203386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eOIn2uMo1NWD9yxa"], "accumulated_threat_level": 5.0, "timewindow": 5} +{"Format": "IDEA0", "ID": "25480b8f-b106-4f6a-82af-4620cdd9821d", "DetectTime": "2024-05-21T12:24:29.213856+00:00", "EventTime": "2024-05-21T12:24:29.213874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOBGe1hV2RVe6c2M1"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "3be63e9b-5b57-4379-8555-7d70c4f3e4f0", "DetectTime": "2024-05-21T12:24:29.225519+00:00", "EventTime": "2024-05-21T12:24:29.225537+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOBGe1hV2RVe6c2M1"], "accumulated_threat_level": 5.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "82f48251-2cd8-40f3-8a4e-9b05af872d31", "DetectTime": "2024-05-21T12:24:29.237029+00:00", "EventTime": "2024-05-21T12:24:29.237047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOBGe1hV2RVe6c2M1"], "accumulated_threat_level": 6.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "f6399944-d144-480c-87ba-caf08051d1c0", "DetectTime": "2024-05-21T12:24:29.242150+00:00", "EventTime": "2024-05-21T12:24:29.242169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLBHy3bFxbNqGwlfi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7faf236a-3c3c-4edf-9619-e7f62db7d1dd", "DetectTime": "2024-05-21T12:24:29.256378+00:00", "EventTime": "2024-05-21T12:24:29.256395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CubUDV3VppL2KJuKsh"], "accumulated_threat_level": 7.1, "timewindow": 5} +{"Format": "IDEA0", "ID": "f854e9c1-b181-4a5f-a1ea-bf62f6364988", "DetectTime": "2024-05-21T12:24:29.262094+00:00", "EventTime": "2024-05-21T12:24:29.262113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.154.42.157 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mgts3axX0xenoiQ1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "2da228cf-db0a-4a0e-86e1-998fc161d947", "DetectTime": "2024-05-21T12:24:29.277080+00:00", "EventTime": "2024-05-21T12:24:29.277097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.201.120.6"]}], "Attach": [{"Content": "Connection to unknown destination port 1089/UDP destination IP 108.201.120.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vO3S3gZltXEoil6h"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 5} +{"Format": "IDEA0", "ID": "8ee0636c-30f2-453b-94d9-14706eb143d2", "DetectTime": "2024-05-21T12:24:29.289053+00:00", "EventTime": "2024-05-21T12:24:29.289071+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbzRT345YjjSq3IuBb"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "76352488-7572-42e9-b342-56a23c547b0e", "DetectTime": "2024-05-21T12:24:29.301555+00:00", "EventTime": "2024-05-21T12:24:29.301574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbzRT345YjjSq3IuBb"], "accumulated_threat_level": 8.399999999999999, "timewindow": 5} +{"Format": "IDEA0", "ID": "d7e3baef-0fea-465b-9f2e-fbeeb4a0019d", "DetectTime": "2024-05-21T12:24:29.314173+00:00", "EventTime": "2024-05-21T12:24:29.314191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbzRT345YjjSq3IuBb"], "accumulated_threat_level": 9.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "06b7a44e-6d00-4334-a77b-bd47aaab873f", "DetectTime": "2024-05-21T12:24:29.318920+00:00", "EventTime": "2024-05-21T12:24:29.318937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZJfK3kv0JVli3gPd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "36bb90e6-df72-49e4-92e6-cf869b7e45eb", "DetectTime": "2024-05-21T12:24:29.330426+00:00", "EventTime": "2024-05-21T12:24:29.330447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiKx961VBAWAGSDp12"], "accumulated_threat_level": 10.0, "timewindow": 5} +{"Format": "IDEA0", "ID": "c0309929-ef35-40a7-b5c1-bcee2dce3cff", "DetectTime": "2024-05-21T12:24:29.341914+00:00", "EventTime": "2024-05-21T12:24:29.341935+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaaoX41brfzmvTM7S9"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "f90562c3-5357-4e5c-8df9-102a0b0b2de5", "DetectTime": "2024-05-21T12:24:29.347032+00:00", "EventTime": "2024-05-21T12:24:29.347050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7PMNP3y2N9SJ59Wtd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "ad543e4c-4432-4e35-acf3-4393f67ffbe9", "DetectTime": "2024-05-21T12:24:29.359092+00:00", "EventTime": "2024-05-21T12:24:29.359110+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaaoX41brfzmvTM7S9"], "accumulated_threat_level": 10.5, "timewindow": 5} +{"Format": "IDEA0", "ID": "d374c4bf-2751-4121-bb3b-6c3068f76195", "DetectTime": "2024-05-21T12:24:29.364184+00:00", "EventTime": "2024-05-21T12:24:29.364202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhVNqta9e5SaIma5"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "a515541a-a186-4f1c-93f3-1db526b48337", "DetectTime": "2024-05-21T12:24:29.374574+00:00", "EventTime": "2024-05-21T12:24:29.374594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaaoX41brfzmvTM7S9"], "accumulated_threat_level": 11.3, "timewindow": 5} +{"Format": "IDEA0", "ID": "23db4e61-36ac-443c-9264-429a1c968ace", "DetectTime": "2024-05-21T12:24:29.385384+00:00", "EventTime": "2024-05-21T12:24:29.385405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTm8U1ZOHmaGtYxQa"], "accumulated_threat_level": 12.100000000000001, "timewindow": 5} +{"Format": "Json", "ID": "23db4e61-36ac-443c-9264-429a1c968ace", "DetectTime": "2024-05-21T12:24:29.385384+00:00", "EventTime": "2024-05-21T12:24:29.385405+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "1970-01-01T04:54:34.387727+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 5. (real time 2024/05/21 12:24:29.609053)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 5, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "4d82813f-1d93-4d5c-bc45-279a455bde82", "DetectTime": "2024-05-21T12:24:29.613528+00:00", "EventTime": "2024-05-21T12:24:29.613548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbiKv22LqBjLUN8g2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "41f21cdd-2f37-48b2-af1d-e1601e4beacd", "DetectTime": "2024-05-21T12:24:29.624084+00:00", "EventTime": "2024-05-21T12:24:29.624102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigC3orWuMllaWj3i"], "accumulated_threat_level": 0.8, "timewindow": 5} +{"Format": "IDEA0", "ID": "3fe48c80-44f8-46a8-af0b-5abcb64de98f", "DetectTime": "2024-05-21T12:24:29.633265+00:00", "EventTime": "2024-05-21T12:24:29.633281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqbRUJKnO809H0Eg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "e8c702da-83bd-4231-8730-d075d6382052", "DetectTime": "2024-05-21T12:24:29.643644+00:00", "EventTime": "2024-05-21T12:24:29.643664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1mNi4XAjCxmLZNai"], "accumulated_threat_level": 1.6, "timewindow": 5} +{"Format": "IDEA0", "ID": "59cf804b-5e65-4bed-9ff9-c438e5e11ec1", "DetectTime": "2024-05-21T12:24:29.654837+00:00", "EventTime": "2024-05-21T12:24:29.654856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphkXGzk2Be8wwx6e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "71ea9329-b7b4-4c39-86cd-033f164607b9", "DetectTime": "2024-05-21T12:24:29.665595+00:00", "EventTime": "2024-05-21T12:24:29.665613+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1mNi4XAjCxmLZNai"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "41077473-0700-4597-8f2a-565679e7efcd", "DetectTime": "2024-05-21T12:24:29.676545+00:00", "EventTime": "2024-05-21T12:24:29.676565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1mNi4XAjCxmLZNai"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "5f4bbee5-529f-41f5-b8d5-52bcb30a7e59", "DetectTime": "2024-05-21T12:24:29.681918+00:00", "EventTime": "2024-05-21T12:24:29.681936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.126.57 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cid2qf2YZnpan7HSa3"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "8bbc6c21-f03a-459f-83c6-a9b05e21b881", "DetectTime": "2024-05-21T12:24:29.693369+00:00", "EventTime": "2024-05-21T12:24:29.693387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLd4C34uYgKWOI4FSf"], "accumulated_threat_level": 0, "timewindow": 5} +{"Format": "IDEA0", "ID": "b9d15b2d-9eb8-4320-b25d-594287b0323c", "DetectTime": "2024-05-21T12:24:29.706592+00:00", "EventTime": "2024-05-21T12:24:29.706612+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLd4C34uYgKWOI4FSf"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 5} +{"Format": "IDEA0", "ID": "972a322d-0cd6-4b86-a00e-f0b85843a99e", "DetectTime": "2024-05-21T12:24:29.717433+00:00", "EventTime": "2024-05-21T12:24:29.717452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLd4C34uYgKWOI4FSf"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "63adcdd0-24fb-4201-9143-83ea1e325e8a", "DetectTime": "2024-05-21T12:24:29.728367+00:00", "EventTime": "2024-05-21T12:24:29.728386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4Mnx12bntog8iUEa"], "accumulated_threat_level": 0.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "68be9733-bd41-4264-88f6-d6f31e009546", "DetectTime": "2024-05-21T12:24:29.733191+00:00", "EventTime": "2024-05-21T12:24:29.733210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.52.202 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Mg3wBOFZChUJ95f"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "47272308-ba34-4cbf-a595-e06654204672", "DetectTime": "2024-05-21T12:24:29.795416+00:00", "EventTime": "2024-05-21T12:24:29.795434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJHm8qbgyovrMpG4c", "C385PB1RauuV8oPTwb", "CgfTWQ3CuGyp9DEIrf", "ChnpHXNXED9jF9vra"], "accumulated_threat_level": 1.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "fa0e8bc7-13e6-4dbb-b622-5473d487f91c", "DetectTime": "2024-05-21T12:24:29.881422+00:00", "EventTime": "2024-05-21T12:24:29.881441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcR5ZI1BtQYPO1ep61"], "accumulated_threat_level": 2.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "674fa285-3d84-4102-a448-d57ff31313fa", "DetectTime": "2024-05-21T12:24:29.895655+00:00", "EventTime": "2024-05-21T12:24:29.895679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBshMFsfwu9PfeFvi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "428631b4-1321-4d11-83ea-337b20bcc8e0", "DetectTime": "2024-05-21T12:24:29.911687+00:00", "EventTime": "2024-05-21T12:24:29.911703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TkK33xy7hlPsmr13"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "9467b419-6cac-4243-a952-1e3110b0f86f", "DetectTime": "2024-05-21T12:24:29.916948+00:00", "EventTime": "2024-05-21T12:24:29.916966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNGlO3VWSNgNN5tQl"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "35e99755-cae7-4df0-a3dd-f0abf4ad66f3", "DetectTime": "2024-05-21T12:24:29.948872+00:00", "EventTime": "2024-05-21T12:24:29.948891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ILG51RkqYst1NHQa"], "accumulated_threat_level": 3.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "75bcf1ad-2ac1-4fc6-abff-aacc3af321dd", "DetectTime": "2024-05-21T12:24:29.954110+00:00", "EventTime": "2024-05-21T12:24:29.954129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAMYc4cGqc7kibxbg"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "5541ebec-decb-4018-9ea3-9114348ccb00", "DetectTime": "2024-05-21T12:24:29.968432+00:00", "EventTime": "2024-05-21T12:24:29.968451+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFrCb4PKE4TMzUL"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "d2f67c33-628e-4d42-934b-a71dc80ac310", "DetectTime": "2024-05-21T12:24:29.983005+00:00", "EventTime": "2024-05-21T12:24:29.983023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFrCb4PKE4TMzUL"], "accumulated_threat_level": 4.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "58fc5277-e30a-4f9d-be9f-0283d89409f7", "DetectTime": "2024-05-21T12:24:29.987725+00:00", "EventTime": "2024-05-21T12:24:29.987743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpv7H3t1N2YmaFwlc"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "4f964a90-22b6-42d6-88e0-ae2308c51f91", "DetectTime": "2024-05-21T12:24:29.998331+00:00", "EventTime": "2024-05-21T12:24:29.998349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQJKx2Vj0VKuwoCla"], "accumulated_threat_level": 5.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "2ed1508a-7256-4d5e-b619-ee0f24b27905", "DetectTime": "2024-05-21T12:24:30.012557+00:00", "EventTime": "2024-05-21T12:24:30.012575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UwvS06cGQhCkXI3"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "8029cca3-8f62-4f3a-bacb-750ff209d514", "DetectTime": "2024-05-21T12:24:30.026144+00:00", "EventTime": "2024-05-21T12:24:30.026162+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UwvS06cGQhCkXI3"], "accumulated_threat_level": 5.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "a72f45a5-99b4-445a-9190-62d4c5217226", "DetectTime": "2024-05-21T12:24:30.031233+00:00", "EventTime": "2024-05-21T12:24:30.031251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Jf8E1bknDsdrFuZ9"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "53116020-fc42-47ba-967c-e562f02b1a3a", "DetectTime": "2024-05-21T12:24:30.045297+00:00", "EventTime": "2024-05-21T12:24:30.045315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFrCb4PKE4TMzUL"], "accumulated_threat_level": 6.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "7845ce10-4add-4973-ba39-3813a0fc7114", "DetectTime": "2024-05-21T12:24:30.050267+00:00", "EventTime": "2024-05-21T12:24:30.050285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.139.178.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwk6oP1imwHfq69xV1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "649bc0c8-da92-41a8-a274-0ff356c78f1f", "DetectTime": "2024-05-21T12:24:30.062745+00:00", "EventTime": "2024-05-21T12:24:30.062766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UwvS06cGQhCkXI3"], "accumulated_threat_level": 7.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "07f7107c-c499-424c-bc5b-925ba8e4a333", "DetectTime": "2024-05-21T12:24:30.067901+00:00", "EventTime": "2024-05-21T12:24:30.067921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUnrv13OqLe7IKzFOi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "1f74bbe3-4334-480f-8bae-179380339736", "DetectTime": "2024-05-21T12:24:30.078712+00:00", "EventTime": "2024-05-21T12:24:30.078729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNOJB40D5csBTsQfk"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "e4a0eeb8-ebb3-4ef9-8d76-089b39a3f7f4", "DetectTime": "2024-05-21T12:24:30.091692+00:00", "EventTime": "2024-05-21T12:24:30.091710+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNOJB40D5csBTsQfk"], "accumulated_threat_level": 7.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "2ab5171c-d928-46a9-998f-10c250b28955", "DetectTime": "2024-05-21T12:24:30.105308+00:00", "EventTime": "2024-05-21T12:24:30.105328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUcfp2dEv8IPPe7Ya"], "accumulated_threat_level": 8.4, "timewindow": 6} +{"Format": "IDEA0", "ID": "4f45c9b3-9d1f-464b-8001-90e05930323e", "DetectTime": "2024-05-21T12:24:30.110938+00:00", "EventTime": "2024-05-21T12:24:30.110956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOBpt1bEHyLtb7bE1"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "f3c8e1dc-6f98-4ea7-a296-7ecd329a6a44", "DetectTime": "2024-05-21T12:24:30.123130+00:00", "EventTime": "2024-05-21T12:24:30.123149+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHB3e4Jqb5cWq216"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "26bcb9d4-2fea-4fd3-9d69-3faa3df62567", "DetectTime": "2024-05-21T12:24:30.135332+00:00", "EventTime": "2024-05-21T12:24:30.135353+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHB3e4Jqb5cWq216"], "accumulated_threat_level": 8.9, "timewindow": 6} +{"Format": "IDEA0", "ID": "0335aba7-4362-4a05-a9f2-10c82b3c6880", "DetectTime": "2024-05-21T12:24:30.140750+00:00", "EventTime": "2024-05-21T12:24:30.140769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTzHvo4Qmp83aKC7"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "acc67bb4-b6fb-4491-9f6b-ba81f8fd60f4", "DetectTime": "2024-05-21T12:24:30.151748+00:00", "EventTime": "2024-05-21T12:24:30.151768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HRUWWQhr51xf2Yc"], "accumulated_threat_level": 9.700000000000001, "timewindow": 6} +{"Format": "IDEA0", "ID": "453ab591-50c8-4f49-97c7-f3d4884d1680", "DetectTime": "2024-05-21T12:24:30.162674+00:00", "EventTime": "2024-05-21T12:24:30.162693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNOJB40D5csBTsQfk"], "accumulated_threat_level": 10.500000000000002, "timewindow": 6} +{"Format": "IDEA0", "ID": "7fea2b21-5c89-4152-af52-be65e5b55b7a", "DetectTime": "2024-05-21T12:24:30.168997+00:00", "EventTime": "2024-05-21T12:24:30.169017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJlqxq2yAtWaIeCsyd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "edc6854b-a93b-47a2-afae-81f4fae3aed7", "DetectTime": "2024-05-21T12:24:30.180698+00:00", "EventTime": "2024-05-21T12:24:30.180716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0IHp2O5pSOIOe9V6"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "2604adab-5ce6-4f48-8c08-8fad2f321ce0", "DetectTime": "2024-05-21T12:24:30.191824+00:00", "EventTime": "2024-05-21T12:24:30.191842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0IHp2O5pSOIOe9V6"], "accumulated_threat_level": 11.000000000000002, "timewindow": 6} +{"Format": "IDEA0", "ID": "0098275e-d5a6-4bd0-aa8a-4ca775761ce1", "DetectTime": "2024-05-21T12:24:30.203882+00:00", "EventTime": "2024-05-21T12:24:30.203901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHB3e4Jqb5cWq216"], "accumulated_threat_level": 11.800000000000002, "timewindow": 6} +{"Format": "IDEA0", "ID": "721bde99-3b97-4030-b97a-5a1245b69a8e", "DetectTime": "2024-05-21T12:24:30.215846+00:00", "EventTime": "2024-05-21T12:24:30.215864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9THC4hrczi7Ukgab"], "accumulated_threat_level": 12.600000000000003, "timewindow": 6} +{"Format": "Json", "ID": "721bde99-3b97-4030-b97a-5a1245b69a8e", "DetectTime": "2024-05-21T12:24:30.215846+00:00", "EventTime": "2024-05-21T12:24:30.215864+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "1970-01-01T05:25:12.718328+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:30.401377)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "757c9072-f963-4c01-afc2-ef63f2dea0e7", "DetectTime": "2024-05-21T12:24:30.411366+00:00", "EventTime": "2024-05-21T12:24:30.411385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0IHp2O5pSOIOe9V6"], "accumulated_threat_level": 0.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "7508394c-6563-44b7-89ad-a090abea87d3", "DetectTime": "2024-05-21T12:24:30.421943+00:00", "EventTime": "2024-05-21T12:24:30.421961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYv2L3q7cUbYE4GJ"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "f7e27ef3-0d9e-411d-a8f0-93642e7c9fe8", "DetectTime": "2024-05-21T12:24:30.432544+00:00", "EventTime": "2024-05-21T12:24:30.432562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutMaL32LbdRTSURDa"], "accumulated_threat_level": 1.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "12473b9e-188c-484a-94ba-18a8c38add9d", "DetectTime": "2024-05-21T12:24:30.438203+00:00", "EventTime": "2024-05-21T12:24:30.438222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6nRc149mnmaj0aG2"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "70213960-ab00-4348-8fa7-977263f92fa5", "DetectTime": "2024-05-21T12:24:30.449045+00:00", "EventTime": "2024-05-21T12:24:30.449063+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYv2L3q7cUbYE4GJ"], "accumulated_threat_level": 2.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "3bacded1-2949-49b1-b69e-6d061fa90e5b", "DetectTime": "2024-05-21T12:24:30.454568+00:00", "EventTime": "2024-05-21T12:24:30.454590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hPE93T1ahmtEeyYi"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "382be653-2f2a-4743-b493-17033758f2f4", "DetectTime": "2024-05-21T12:24:30.466695+00:00", "EventTime": "2024-05-21T12:24:30.466713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEy5Bh1GTmDsEY9up6"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "7dae0fbc-95a6-4da3-8160-56919404375d", "DetectTime": "2024-05-21T12:24:30.477160+00:00", "EventTime": "2024-05-21T12:24:30.477178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYv2L3q7cUbYE4GJ"], "accumulated_threat_level": 3.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "645e912d-2809-429d-8d87-54186b41e9c2", "DetectTime": "2024-05-21T12:24:30.482051+00:00", "EventTime": "2024-05-21T12:24:30.482069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKgW7R1F3ZtLmkdZCd"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "50ea3c05-d54a-4b8c-ac18-3f93b69c69c6", "DetectTime": "2024-05-21T12:24:30.486782+00:00", "EventTime": "2024-05-21T12:24:30.486800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLCSy2oEc1XXK6DJ4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "63623503-b8a3-4ca4-9731-7bf2b4c60bc3", "DetectTime": "2024-05-21T12:24:30.502292+00:00", "EventTime": "2024-05-21T12:24:30.502314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYthp3EeI7RaFFNSg"], "accumulated_threat_level": 4.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "8a0c7fd8-5973-4a6b-ba29-0846688d7693", "DetectTime": "2024-05-21T12:24:30.507856+00:00", "EventTime": "2024-05-21T12:24:30.507875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.3.210 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14ybo1VWZJSqi4nql"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "7fa4cf62-b648-4c9f-a1fb-faff81b222db", "DetectTime": "2024-05-21T12:24:30.517275+00:00", "EventTime": "2024-05-21T12:24:30.517292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.92.1.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPxxq4u280MZLIiZ8"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "6908525c-d18a-41c6-9458-4f6ced735a96", "DetectTime": "2024-05-21T12:24:30.521805+00:00", "EventTime": "2024-05-21T12:24:30.521822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cww3vLOabQLlsRIi4"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "777e5aa7-c495-4726-93d1-c68af383cfa8", "DetectTime": "2024-05-21T12:24:30.526962+00:00", "EventTime": "2024-05-21T12:24:30.526980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.98.95.219 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMMfg3HPrYDdkf2O9"], "accumulated_threat_level": 2.5, "timewindow": 1} +{"Format": "IDEA0", "ID": "74e607d3-9cc9-47f8-be09-c842d49eb5d4", "DetectTime": "2024-05-21T12:24:30.539044+00:00", "EventTime": "2024-05-21T12:24:30.539062+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT74Id3dSjWWNuNLb2"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "e5f35ad0-d86a-4d03-b0d1-9e4df4eb4ed1", "DetectTime": "2024-05-21T12:24:30.552375+00:00", "EventTime": "2024-05-21T12:24:30.552392+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT74Id3dSjWWNuNLb2"], "accumulated_threat_level": 5.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "a7871a7a-e4af-4824-a89c-6a4ae162f756", "DetectTime": "2024-05-21T12:24:30.563391+00:00", "EventTime": "2024-05-21T12:24:30.563410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT74Id3dSjWWNuNLb2"], "accumulated_threat_level": 5.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "7e892c7e-048e-439e-80cd-0ca50058beb0", "DetectTime": "2024-05-21T12:24:30.574527+00:00", "EventTime": "2024-05-21T12:24:30.574547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKj4l4vH1XEjYtJTi"], "accumulated_threat_level": 6.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "baf66783-6845-4e95-8d91-668a4a3b6979", "DetectTime": "2024-05-21T12:24:30.584987+00:00", "EventTime": "2024-05-21T12:24:30.585005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zqpw4kldiqdltcSi"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 6} +{"Format": "IDEA0", "ID": "3ce110c8-99b9-467c-8c11-052f0c660326", "DetectTime": "2024-05-21T12:24:30.595985+00:00", "EventTime": "2024-05-21T12:24:30.596002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgv14b1dw0xJBAqZ9d"], "accumulated_threat_level": 8.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "3b4211e1-ed91-4676-996a-0bf6197155b9", "DetectTime": "2024-05-21T12:24:30.609691+00:00", "EventTime": "2024-05-21T12:24:30.609710+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClxQ7qq6M1MVGz0q8"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "0302bdd0-b675-49e0-ad71-cbb6e4426284", "DetectTime": "2024-05-21T12:24:30.621463+00:00", "EventTime": "2024-05-21T12:24:30.621481+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClxQ7qq6M1MVGz0q8"], "accumulated_threat_level": 8.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "032fc4fe-f434-4c90-9665-bde34f7166d4", "DetectTime": "2024-05-21T12:24:30.632474+00:00", "EventTime": "2024-05-21T12:24:30.632492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClxQ7qq6M1MVGz0q8"], "accumulated_threat_level": 9.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "11f1386d-262a-4a77-81f2-8b54b5f77655", "DetectTime": "2024-05-21T12:24:30.643708+00:00", "EventTime": "2024-05-21T12:24:30.643725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBorY1tratIKNi8Zh"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "6722fb9e-5108-4676-a1de-2313e6e13194", "DetectTime": "2024-05-21T12:24:30.655845+00:00", "EventTime": "2024-05-21T12:24:30.655864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBorY1tratIKNi8Zh"], "accumulated_threat_level": 10.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "56e2192e-445a-4429-990c-42e29b60c7a9", "DetectTime": "2024-05-21T12:24:30.660982+00:00", "EventTime": "2024-05-21T12:24:30.661000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAVB9a2RNLLU5iAa"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2503da69-1ff0-4905-9bbe-b4bce5ad0fbe", "DetectTime": "2024-05-21T12:24:30.671394+00:00", "EventTime": "2024-05-21T12:24:30.671414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBorY1tratIKNi8Zh"], "accumulated_threat_level": 10.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "3e341bde-d9ec-4e43-8d0e-e55cb7d63de1", "DetectTime": "2024-05-21T12:24:30.682400+00:00", "EventTime": "2024-05-21T12:24:30.682433+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVclp42kdhtfMAGTa"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "0834eadf-c1cd-4a26-85b6-e39b15a24a66", "DetectTime": "2024-05-21T12:24:30.693552+00:00", "EventTime": "2024-05-21T12:24:30.693570+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVclp42kdhtfMAGTa"], "accumulated_threat_level": 11.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "005ee749-1199-4bca-80f5-87e55db22ada", "DetectTime": "2024-05-21T12:24:30.706057+00:00", "EventTime": "2024-05-21T12:24:30.706079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVclp42kdhtfMAGTa"], "accumulated_threat_level": 12.100000000000001, "timewindow": 6} +{"Format": "Json", "ID": "005ee749-1199-4bca-80f5-87e55db22ada", "DetectTime": "2024-05-21T12:24:30.706057+00:00", "EventTime": "2024-05-21T12:24:30.706079+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "1970-01-01T05:25:35.770225+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:30.809799)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "67c14e8e-bd20-4a1e-b959-26fef295af49", "DetectTime": "2024-05-21T12:24:30.820481+00:00", "EventTime": "2024-05-21T12:24:30.820501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTXr04XTtJvLvmre6"], "accumulated_threat_level": 0.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "ae0860e4-53b5-4253-bf97-0c4bb3e33470", "DetectTime": "2024-05-21T12:24:30.830938+00:00", "EventTime": "2024-05-21T12:24:30.830956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLasWwj50mIEYcUo1"], "accumulated_threat_level": 1.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "b2b18571-b406-4dc4-b04f-e81c004b5692", "DetectTime": "2024-05-21T12:24:31.077452+00:00", "EventTime": "2024-05-21T12:24:31.077473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBAYD3XWyO7AoW5cf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "f4ea1481-d6de-4094-851a-539647af873b", "DetectTime": "2024-05-21T12:24:31.087405+00:00", "EventTime": "2024-05-21T12:24:31.087424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRzWM1B55lGhO88Oa"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "ae1a6f4d-8c79-4a9e-9c82-66949b524c61", "DetectTime": "2024-05-21T12:24:31.111399+00:00", "EventTime": "2024-05-21T12:24:31.111418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRzn92bhjumHmwg98"], "accumulated_threat_level": 3.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "fadcdbda-e4d2-48ea-bff7-da0ccfadd170", "DetectTime": "2024-05-21T12:24:31.115957+00:00", "EventTime": "2024-05-21T12:24:31.115977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.223.239.27 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMm3k3FXWffsLOKdj"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "a312caa8-5acb-4676-b5a4-500f6a608ae9", "DetectTime": "2024-05-21T12:24:31.130061+00:00", "EventTime": "2024-05-21T12:24:31.130079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuQ8j1zjX9ioqTx71"], "accumulated_threat_level": 4.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "a52689ea-2aa6-41b3-a8d3-16cb1791455f", "DetectTime": "2024-05-21T12:24:31.142894+00:00", "EventTime": "2024-05-21T12:24:31.142914+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSN1Kj1zVZ2VU9Oau1"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "f3a04840-5870-4c10-a703-871b4e000245", "DetectTime": "2024-05-21T12:24:31.155618+00:00", "EventTime": "2024-05-21T12:24:31.155638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSN1Kj1zVZ2VU9Oau1"], "accumulated_threat_level": 4.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f007bec6-523e-41b6-983e-3fa374769c3f", "DetectTime": "2024-05-21T12:24:31.168717+00:00", "EventTime": "2024-05-21T12:24:31.168739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSN1Kj1zVZ2VU9Oau1"], "accumulated_threat_level": 5.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "9b1608ff-b1d7-49d0-a2b9-a3d2edbd98d7", "DetectTime": "2024-05-21T12:24:31.279549+00:00", "EventTime": "2024-05-21T12:24:31.279587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.154.42.157 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYi6i3yBeNSgoafBf"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "34eab7c3-654f-4844-a732-dfce3989e3fd", "DetectTime": "2024-05-21T12:24:31.476094+00:00", "EventTime": "2024-05-21T12:24:31.476112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSAdB3UUvxpgQ7ce7"], "accumulated_threat_level": 6.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "ea0f95ee-d886-48b7-b15c-a24be7a7427c", "DetectTime": "2024-05-21T12:24:31.501003+00:00", "EventTime": "2024-05-21T12:24:31.501026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.52.202 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFcoE277eCIoQSdbf"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "e8ad3616-91d6-40e1-8df4-e25658c69079", "DetectTime": "2024-05-21T12:24:31.513990+00:00", "EventTime": "2024-05-21T12:24:31.514007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFA1pzzPonO1Bxb8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 6} +{"Format": "IDEA0", "ID": "50bc38e7-342b-48b3-9e17-83f542dd172b", "DetectTime": "2024-05-21T12:24:31.526206+00:00", "EventTime": "2024-05-21T12:24:31.526225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLwmm2fSSZEa68aFa"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "0b845ac0-47cf-492d-b91d-3055fdb7771a", "DetectTime": "2024-05-21T12:24:31.538914+00:00", "EventTime": "2024-05-21T12:24:31.538935+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLwmm2fSSZEa68aFa"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 6} +{"Format": "IDEA0", "ID": "291f0caa-2cad-4f74-8a93-09da4f717cc9", "DetectTime": "2024-05-21T12:24:31.549459+00:00", "EventTime": "2024-05-21T12:24:31.549478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLwmm2fSSZEa68aFa"], "accumulated_threat_level": 8.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "4f1995af-1b73-4efc-af89-bcfe4c40f84a", "DetectTime": "2024-05-21T12:24:31.559293+00:00", "EventTime": "2024-05-21T12:24:31.559312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0BINgIz6VjekxB85"], "accumulated_threat_level": 9.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "5270b52d-6f13-4657-b5ac-64ed3ab93343", "DetectTime": "2024-05-21T12:24:31.571135+00:00", "EventTime": "2024-05-21T12:24:31.571152+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYboKm2PjaPpM5T4Ka"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "70aabeb1-4cf0-4415-9e7b-aa2d669ff12e", "DetectTime": "2024-05-21T12:24:31.581666+00:00", "EventTime": "2024-05-21T12:24:31.581685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYboKm2PjaPpM5T4Ka"], "accumulated_threat_level": 9.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "62698336-772b-4de3-ba95-2ce2688a8630", "DetectTime": "2024-05-21T12:24:31.592494+00:00", "EventTime": "2024-05-21T12:24:31.592517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYboKm2PjaPpM5T4Ka"], "accumulated_threat_level": 10.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "03556b64-fa06-4384-8e61-a08fa86d8f3b", "DetectTime": "2024-05-21T12:24:31.604716+00:00", "EventTime": "2024-05-21T12:24:31.604734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CljMPMotx4HlQb06g"], "accumulated_threat_level": 11.100000000000001, "timewindow": 6} +{"Format": "IDEA0", "ID": "390b0180-70f8-4fc0-af79-9aebff52e886", "DetectTime": "2024-05-21T12:24:31.617498+00:00", "EventTime": "2024-05-21T12:24:31.617515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiW19d3pNXEnxgC3d"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "666fe6ff-094e-40d1-b300-0aba9cd0225b", "DetectTime": "2024-05-21T12:24:31.632670+00:00", "EventTime": "2024-05-21T12:24:31.632687+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiW19d3pNXEnxgC3d"], "accumulated_threat_level": 11.600000000000001, "timewindow": 6} +{"Format": "IDEA0", "ID": "de332fa2-19d6-4866-b1bb-7b406d565da0", "DetectTime": "2024-05-21T12:24:31.646113+00:00", "EventTime": "2024-05-21T12:24:31.646130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiW19d3pNXEnxgC3d"], "accumulated_threat_level": 12.400000000000002, "timewindow": 6} +{"Format": "Json", "ID": "de332fa2-19d6-4866-b1bb-7b406d565da0", "DetectTime": "2024-05-21T12:24:31.646113+00:00", "EventTime": "2024-05-21T12:24:31.646130+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "1970-01-01T05:55:59.799279+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:31.810844)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000002, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000002} +{"Format": "IDEA0", "ID": "1ee48dad-cbc8-4b5e-bf4e-a739c8b7c7cc", "DetectTime": "2024-05-21T12:24:31.823703+00:00", "EventTime": "2024-05-21T12:24:31.823723+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImWBApKAlkCoXiIb"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "9eaae775-cfa3-493f-9156-68f309af9cd0", "DetectTime": "2024-05-21T12:24:31.834169+00:00", "EventTime": "2024-05-21T12:24:31.834187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImWBApKAlkCoXiIb"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f4615899-95c5-4315-8a93-f107e13aaba8", "DetectTime": "2024-05-21T12:24:31.845146+00:00", "EventTime": "2024-05-21T12:24:31.845167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImWBApKAlkCoXiIb"], "accumulated_threat_level": 1.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "2a17768c-ef58-469c-b587-91096119bb66", "DetectTime": "2024-05-21T12:24:31.858577+00:00", "EventTime": "2024-05-21T12:24:31.858597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkscMp1XqPQQy2tA4i"], "accumulated_threat_level": 2.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "b2c3ab28-aaf4-4929-9485-d5fe7dfb6fc5", "DetectTime": "2024-05-21T12:24:31.862934+00:00", "EventTime": "2024-05-21T12:24:31.862952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.126.57 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C68Nlv1K7D3TXaalf9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "e1da85f0-54e7-4226-a76c-d3f00abb27b0", "DetectTime": "2024-05-21T12:24:31.875422+00:00", "EventTime": "2024-05-21T12:24:31.875442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bdB041FAAaGPxGAc"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "6440e089-e18e-493c-a51d-58db26bd04a5", "DetectTime": "2024-05-21T12:24:31.890336+00:00", "EventTime": "2024-05-21T12:24:31.890357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Uy6o4VMpCKY4YdBh"], "accumulated_threat_level": 3.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "0d8c3148-8b92-449d-b7f5-6cc0f26812af", "DetectTime": "2024-05-21T12:24:31.901698+00:00", "EventTime": "2024-05-21T12:24:31.901717+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cp354GIO5CAPFAh3"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "47ac5d6a-bc29-421a-b06b-9bfff99c9553", "DetectTime": "2024-05-21T12:24:31.912597+00:00", "EventTime": "2024-05-21T12:24:31.912618+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cp354GIO5CAPFAh3"], "accumulated_threat_level": 4.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "d7aae1b8-9c27-480e-873c-a3a93c138979", "DetectTime": "2024-05-21T12:24:31.923530+00:00", "EventTime": "2024-05-21T12:24:31.923548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cp354GIO5CAPFAh3"], "accumulated_threat_level": 5.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "3060b823-174b-4e3c-b4eb-9c877327630e", "DetectTime": "2024-05-21T12:24:31.934260+00:00", "EventTime": "2024-05-21T12:24:31.934278+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm74zE487ucCSqqyf4"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "37a37f6a-fc13-4c02-b3ec-ffab0c41245f", "DetectTime": "2024-05-21T12:24:31.945756+00:00", "EventTime": "2024-05-21T12:24:31.945777+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm74zE487ucCSqqyf4"], "accumulated_threat_level": 5.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "abcf387a-f140-447b-bee4-dda1daf4e1e6", "DetectTime": "2024-05-21T12:24:31.950706+00:00", "EventTime": "2024-05-21T12:24:31.950725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.98.95.219 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMy8Yaev4cEKvVr6i"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "d6f264aa-1a15-4132-ae9a-2ea79c17b7f3", "DetectTime": "2024-05-21T12:24:31.961006+00:00", "EventTime": "2024-05-21T12:24:31.961027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm74zE487ucCSqqyf4"], "accumulated_threat_level": 6.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "8cbf6258-4c6d-4c40-aa23-a1b27f6d4175", "DetectTime": "2024-05-21T12:24:31.970627+00:00", "EventTime": "2024-05-21T12:24:31.970645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CczI4N1v6Qw3KXliKl"], "accumulated_threat_level": 7.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "3bc16d44-c72e-4672-8e0d-8a228362b5a9", "DetectTime": "2024-05-21T12:24:31.980393+00:00", "EventTime": "2024-05-21T12:24:31.980415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBg1gt2mQRfgCgIuL2"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 6} +{"Format": "IDEA0", "ID": "76d570ef-d804-4a7a-a520-2a8e5927b4d2", "DetectTime": "2024-05-21T12:24:31.992509+00:00", "EventTime": "2024-05-21T12:24:31.992526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmM3Rg1orelbjhXkSj"], "accumulated_threat_level": 8.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "335b3648-9ed2-42da-806a-108a40a00b81", "DetectTime": "2024-05-21T12:24:32.004961+00:00", "EventTime": "2024-05-21T12:24:32.004980+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuJjIC1n1wwoTaNwnf"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "df904f89-d521-4ed8-88f9-b407bc19e12e", "DetectTime": "2024-05-21T12:24:32.016876+00:00", "EventTime": "2024-05-21T12:24:32.016894+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuJjIC1n1wwoTaNwnf"], "accumulated_threat_level": 9.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "4eeb7957-01dc-470a-860c-6cb38c50bc24", "DetectTime": "2024-05-21T12:24:32.027928+00:00", "EventTime": "2024-05-21T12:24:32.027946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuJjIC1n1wwoTaNwnf"], "accumulated_threat_level": 10.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "58532017-6f98-4626-9662-90d5cbe7781a", "DetectTime": "2024-05-21T12:24:32.038705+00:00", "EventTime": "2024-05-21T12:24:32.038723+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9KL711JkxwFMuT12"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "904d6940-17ba-4291-906d-46d5ba37f85f", "DetectTime": "2024-05-21T12:24:32.050543+00:00", "EventTime": "2024-05-21T12:24:32.050563+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9KL711JkxwFMuT12"], "accumulated_threat_level": 10.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3ba689bf-488c-4ef9-9b19-90c3bb3e4860", "DetectTime": "2024-05-21T12:24:32.060802+00:00", "EventTime": "2024-05-21T12:24:32.060820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9KL711JkxwFMuT12"], "accumulated_threat_level": 11.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "961ba9ca-9f12-4eda-971b-8b2173af6af5", "DetectTime": "2024-05-21T12:24:32.070520+00:00", "EventTime": "2024-05-21T12:24:32.070538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2aqHE2tydkpj9RZsl"], "accumulated_threat_level": 12.100000000000001, "timewindow": 6} +{"Format": "Json", "ID": "961ba9ca-9f12-4eda-971b-8b2173af6af5", "DetectTime": "2024-05-21T12:24:32.070520+00:00", "EventTime": "2024-05-21T12:24:32.070538+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "1970-01-01T05:56:04.172616+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:32.270629)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "7443e264-9905-4824-af0e-6494284614d2", "DetectTime": "2024-05-21T12:24:32.281611+00:00", "EventTime": "2024-05-21T12:24:32.281630+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbw6Wwczq0A6sqwlg"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "d6bbdacb-b94a-4c3e-b9fd-5f35490fe785", "DetectTime": "2024-05-21T12:24:32.292575+00:00", "EventTime": "2024-05-21T12:24:32.292593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbw6Wwczq0A6sqwlg"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2009510d-d7ba-4ae7-8f2d-0816d9d7f06c", "DetectTime": "2024-05-21T12:24:32.297344+00:00", "EventTime": "2024-05-21T12:24:32.297362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.3.210 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEYPJxi2v3uidspH6"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "59a83382-d125-4eda-9cab-ecb050c1da4b", "DetectTime": "2024-05-21T12:24:32.308583+00:00", "EventTime": "2024-05-21T12:24:32.308600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbw6Wwczq0A6sqwlg"], "accumulated_threat_level": 1.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "1b90ac69-729d-4e04-99e8-cda782a451fa", "DetectTime": "2024-05-21T12:24:32.313336+00:00", "EventTime": "2024-05-21T12:24:32.313354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.92.1.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbY6c3sHwviSDTLc"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "7ba08445-0e1c-43b0-a5bb-cff1cea663ad", "DetectTime": "2024-05-21T12:24:32.317740+00:00", "EventTime": "2024-05-21T12:24:32.317758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ54xb4bFkaT4ELGhe"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "3277fa1e-932c-4996-b85f-6ce89138c452", "DetectTime": "2024-05-21T12:24:32.322134+00:00", "EventTime": "2024-05-21T12:24:32.322152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMrOQ2rB4V0j8zbsi"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "33c5dc48-4cab-42d6-8d62-7e9c21b4094b", "DetectTime": "2024-05-21T12:24:32.333121+00:00", "EventTime": "2024-05-21T12:24:32.333140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.217.10.192"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.217.10.192 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9IKY3jV2wS7zH0vb"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "9bb41689-7124-4c63-8ef8-bee2989df41c", "DetectTime": "2024-05-21T12:24:32.346065+00:00", "EventTime": "2024-05-21T12:24:32.346083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.217.10.192"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.217.10.192 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9IKY3jV2wS7zH0vb"], "accumulated_threat_level": 1.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "118d8051-8bcc-45ae-a3bb-3be7209e879c", "DetectTime": "2024-05-21T12:24:32.356116+00:00", "EventTime": "2024-05-21T12:24:32.356134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzgigp6CjCDbia4i"], "accumulated_threat_level": 2.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "e0e80795-1d05-49c9-bc3e-2847fbf71c5a", "DetectTime": "2024-05-21T12:24:32.385507+00:00", "EventTime": "2024-05-21T12:24:32.385527+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.57.162.209"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.57.162.209 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLONeltDtmWhgYy34"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "4c1f2d1b-3d70-441f-950d-e238a707e023", "DetectTime": "2024-05-21T12:24:32.396534+00:00", "EventTime": "2024-05-21T12:24:32.396551+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.57.162.209"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.57.162.209 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLONeltDtmWhgYy34"], "accumulated_threat_level": 3.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "f4572e5f-3c8c-49cd-9a41-a6211f43d80b", "DetectTime": "2024-05-21T12:24:32.401321+00:00", "EventTime": "2024-05-21T12:24:32.401341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ8Nb1IxWcU8QFLu5"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "6312cde0-99ce-4ebb-ba07-1aec010bde30", "DetectTime": "2024-05-21T12:24:32.406029+00:00", "EventTime": "2024-05-21T12:24:32.406047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyJMkl3EMAyNAsh9Xa"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "488000f2-0566-41f9-a9eb-ee1956c1b426", "DetectTime": "2024-05-21T12:24:32.423986+00:00", "EventTime": "2024-05-21T12:24:32.424003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wHHM1vzGXmmPpzZj"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "75c931b0-06ac-4dd1-9c4a-23d9cb62b9e3", "DetectTime": "2024-05-21T12:24:32.428405+00:00", "EventTime": "2024-05-21T12:24:32.428424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN0VbzFQ1buXsu8i4"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "a2541fa5-095d-4f2d-b1ff-96fa2c1f74aa", "DetectTime": "2024-05-21T12:24:32.440118+00:00", "EventTime": "2024-05-21T12:24:32.440139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vtF13kBjMfd7bM9c"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "8b40ca5f-cdf4-4c1a-8dda-bf9cc2ab8a02", "DetectTime": "2024-05-21T12:24:32.444916+00:00", "EventTime": "2024-05-21T12:24:32.444933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLifBt3c5682tK02j9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "4e1fcac1-0816-49b4-9cbc-8146898173c8", "DetectTime": "2024-05-21T12:24:32.467901+00:00", "EventTime": "2024-05-21T12:24:32.467921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTkDOR1r970YookV2"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "3290d355-6d03-498e-b9cd-5eeea17ed275", "DetectTime": "2024-05-21T12:24:32.484258+00:00", "EventTime": "2024-05-21T12:24:32.484278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CraRU94dWZAZfl5KO1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "fc7ecaf2-3f03-465a-ac70-65122bdf953b", "DetectTime": "2024-05-21T12:24:32.500579+00:00", "EventTime": "2024-05-21T12:24:32.500600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDFs5nKwiGjA4g3jg"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "a74b447d-f4b1-4f44-a6e9-269338c71f54", "DetectTime": "2024-05-21T12:24:32.512705+00:00", "EventTime": "2024-05-21T12:24:32.512724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.194.29 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTHSU2yR33rt0miYh"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "09ea2fbf-057e-4221-9480-924eb84a2dbd", "DetectTime": "2024-05-21T12:24:32.517362+00:00", "EventTime": "2024-05-21T12:24:32.517381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRTzZ14nes6kMVVq3"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "74ae8dc4-2d8f-4409-8aa4-bbacc4158393", "DetectTime": "2024-05-21T12:24:32.533381+00:00", "EventTime": "2024-05-21T12:24:32.533409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.253.82.119"]}], "Attach": [{"Content": "Connection to unknown destination port 20209/UDP destination IP 180.253.82.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs622v3CARN1IQLW1j"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "f9106c11-576c-46e6-a5d0-9b83af424037", "DetectTime": "2024-05-21T12:24:32.537958+00:00", "EventTime": "2024-05-21T12:24:32.537975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zxA72jfpxNPEYiyl"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "3d353414-dd90-4a23-95bb-e696bcbf4325", "DetectTime": "2024-05-21T12:24:32.554610+00:00", "EventTime": "2024-05-21T12:24:32.554631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoXwX14R0yvuGtRPc"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "7a7c340d-19c0-4846-8164-ccf332c12602", "DetectTime": "2024-05-21T12:24:32.579480+00:00", "EventTime": "2024-05-21T12:24:32.579498+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["74.130.55.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.130.55.165 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQ0Yez6FbQnPtAN1"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "3270773c-b699-4b7f-a449-af024fab6655", "DetectTime": "2024-05-21T12:24:32.595539+00:00", "EventTime": "2024-05-21T12:24:32.595556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["74.130.55.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.130.55.165 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQ0Yez6FbQnPtAN1"], "accumulated_threat_level": 4.4, "timewindow": 6} +{"Format": "IDEA0", "ID": "76cbc203-890c-42ce-a418-6e763d3756ff", "DetectTime": "2024-05-21T12:24:32.673276+00:00", "EventTime": "2024-05-21T12:24:32.673296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.239.216.94"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.239.216.94 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAo851x4PwZSeg7Oc"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "c2fdbcfb-14a7-4363-8db0-bf9408225c35", "DetectTime": "2024-05-21T12:24:32.684588+00:00", "EventTime": "2024-05-21T12:24:32.684606+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.239.216.94"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.239.216.94 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAo851x4PwZSeg7Oc"], "accumulated_threat_level": 4.9, "timewindow": 6} +{"Format": "IDEA0", "ID": "5b6f3d47-f899-472b-aa53-0dc2935b8c73", "DetectTime": "2024-05-21T12:24:32.728460+00:00", "EventTime": "2024-05-21T12:24:32.728480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5021/UDP destination IP 218.90.187.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb6uj31VBTBjtTCoxb"], "accumulated_threat_level": 5.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "07887815-2861-42e9-ae3b-b34cfb53c8c3", "DetectTime": "2024-05-21T12:24:32.748267+00:00", "EventTime": "2024-05-21T12:24:32.748287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26co54AV2OsE7vP5"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "b4d6ca19-1ec9-4d09-acdc-295b933723b3", "DetectTime": "2024-05-21T12:24:32.778621+00:00", "EventTime": "2024-05-21T12:24:32.778641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaTch3jvgnlEE8ghg"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "da9fce58-15a3-4824-97c1-feb3ebefe5d3", "DetectTime": "2024-05-21T12:24:32.794553+00:00", "EventTime": "2024-05-21T12:24:32.794574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09S631eYUYCWp4c5j"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2fe954fb-c6ab-427c-a896-245f01aaf95f", "DetectTime": "2024-05-21T12:24:32.827296+00:00", "EventTime": "2024-05-21T12:24:32.827316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJu0HwcWY9meGGCg1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2bbf1b22-3e5c-4a1b-8581-42c190948987", "DetectTime": "2024-05-21T12:24:32.844764+00:00", "EventTime": "2024-05-21T12:24:32.844782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXcV3z9fMpV6oupj"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "b1844886-c02c-4038-9c33-37ccd5bad8bb", "DetectTime": "2024-05-21T12:24:32.861316+00:00", "EventTime": "2024-05-21T12:24:32.861335+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.253.82.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.253.82.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs622v3CARN1IQLW1j"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "efb281dc-e51f-4fca-a121-87326430794a", "DetectTime": "2024-05-21T12:24:32.873098+00:00", "EventTime": "2024-05-21T12:24:32.873117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.253.82.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.253.82.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs622v3CARN1IQLW1j"], "accumulated_threat_level": 6.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "e0c9c187-bd9d-4b4d-ae99-975d1bb6635f", "DetectTime": "2024-05-21T12:24:32.878031+00:00", "EventTime": "2024-05-21T12:24:32.878051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgK7dX2J3Zixaev8T1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "5c9a0b91-4541-4970-95c3-b6356d6380e7", "DetectTime": "2024-05-21T12:24:32.888564+00:00", "EventTime": "2024-05-21T12:24:32.888582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBoBc1bNEstfa6az4"], "accumulated_threat_level": 7.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "a804b560-5865-48c5-8037-91db0f1cf7c9", "DetectTime": "2024-05-21T12:24:32.895529+00:00", "EventTime": "2024-05-21T12:24:32.895547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLtVp3wzbCCKwnri"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "6b04aa37-f2bc-4f68-9974-6aa650a8f029", "DetectTime": "2024-05-21T12:24:32.908044+00:00", "EventTime": "2024-05-21T12:24:32.908062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWKi23KFx50EszvKe"], "accumulated_threat_level": 7.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "21025e05-9686-432f-aa36-e6f4c86c458c", "DetectTime": "2024-05-21T12:24:32.916109+00:00", "EventTime": "2024-05-21T12:24:32.916128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefuHROx4nTaQo0Z7"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "b41e4460-aaee-4f8c-a9a3-83751ff44168", "DetectTime": "2024-05-21T12:24:32.933226+00:00", "EventTime": "2024-05-21T12:24:32.933245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyX1l3ke6P0F7RTL7"], "accumulated_threat_level": 8.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "edd0379e-b98b-4404-9b76-7a77232facf6", "DetectTime": "2024-05-21T12:24:32.943267+00:00", "EventTime": "2024-05-21T12:24:32.943287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.139.178.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNdDk3cYp7S3dh5a"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "53cb55d4-2b6d-4c7c-9d23-14d21136cd8e", "DetectTime": "2024-05-21T12:24:32.957960+00:00", "EventTime": "2024-05-21T12:24:32.957978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nR3c3kFF8dHbswg"], "accumulated_threat_level": 9.4, "timewindow": 6} +{"Format": "IDEA0", "ID": "f5872be6-c16d-4a00-befc-9d8cdd4f9291", "DetectTime": "2024-05-21T12:24:32.967808+00:00", "EventTime": "2024-05-21T12:24:32.967826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZUZE12CiMmnVWtc"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "9f3610df-a411-4325-b2aa-9a7e7a22b05b", "DetectTime": "2024-05-21T12:24:32.990095+00:00", "EventTime": "2024-05-21T12:24:32.990113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhxqDldSEaPtY1Xh"], "accumulated_threat_level": 10.200000000000001, "timewindow": 6} +{"Format": "IDEA0", "ID": "c8f2227c-0fa1-4918-8926-82e2da5a7d3d", "DetectTime": "2024-05-21T12:24:32.997363+00:00", "EventTime": "2024-05-21T12:24:32.997382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuGps3HihPboDdoJj"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "650539e0-57b4-4c64-8cd7-d9a60af25320", "DetectTime": "2024-05-21T12:24:33.015496+00:00", "EventTime": "2024-05-21T12:24:33.015517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6K6551xuHesiQiRhj"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "92ec781a-8754-45de-be5f-80096fd628e9", "DetectTime": "2024-05-21T12:24:33.026262+00:00", "EventTime": "2024-05-21T12:24:33.026280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuOfY35o9D4kkno81"], "accumulated_threat_level": 11.000000000000002, "timewindow": 6} +{"Format": "IDEA0", "ID": "2da3076d-22cb-4a80-a142-8d436410cda3", "DetectTime": "2024-05-21T12:24:33.043009+00:00", "EventTime": "2024-05-21T12:24:33.043030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUzSRJDHxnlDcyvh"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "7834ff2a-7a36-4b75-ba5e-cf9e95d11fdc", "DetectTime": "2024-05-21T12:24:33.054615+00:00", "EventTime": "2024-05-21T12:24:33.054633+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.71.26.129"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.71.26.129 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6yc71lrCjKcatTL8"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "eead0f85-3e85-46ab-986e-0a3d7c9501b2", "DetectTime": "2024-05-21T12:24:33.065451+00:00", "EventTime": "2024-05-21T12:24:33.065469+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.71.26.129"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.71.26.129 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6yc71lrCjKcatTL8"], "accumulated_threat_level": 11.500000000000002, "timewindow": 6} +{"Format": "IDEA0", "ID": "fc014fff-ad8a-4a23-a39e-b32db62eca95", "DetectTime": "2024-05-21T12:24:33.070119+00:00", "EventTime": "2024-05-21T12:24:33.070139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKI5WMvgu7IPw0F7l"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "f03dd273-cd73-446f-8703-06a731674bcf", "DetectTime": "2024-05-21T12:24:33.080780+00:00", "EventTime": "2024-05-21T12:24:33.080799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdfIU1kVM5gYEM4Ea"], "accumulated_threat_level": 12.300000000000002, "timewindow": 6} +{"Format": "Json", "ID": "f03dd273-cd73-446f-8703-06a731674bcf", "DetectTime": "2024-05-21T12:24:33.080780+00:00", "EventTime": "2024-05-21T12:24:33.080799+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "1970-01-01T05:58:53.472891+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:33.334048)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "be650694-475b-4b36-8ebd-8d12aeeed56a", "DetectTime": "2024-05-21T12:24:33.338281+00:00", "EventTime": "2024-05-21T12:24:33.338299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RHStCiuVnyKioej"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "10fedeca-63b1-4247-9c73-766be34aa529", "DetectTime": "2024-05-21T12:24:33.348328+00:00", "EventTime": "2024-05-21T12:24:33.348346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2Qpm3BLSqngd2bj2"], "accumulated_threat_level": 0.8, "timewindow": 6} +{"Format": "IDEA0", "ID": "e0218386-9336-4fc1-be59-b6a2933d3e8f", "DetectTime": "2024-05-21T12:24:33.354137+00:00", "EventTime": "2024-05-21T12:24:33.354155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWonx2ByGEqx0x4Zd"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "290e791b-95f3-43d6-8658-2e16023d3446", "DetectTime": "2024-05-21T12:24:33.364044+00:00", "EventTime": "2024-05-21T12:24:33.364062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.27.151"]}], "Attach": [{"Content": "Connection to unknown destination port 22233/UDP destination IP 190.235.27.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcIiv2EWu5zpebZUb"], "accumulated_threat_level": 1.6, "timewindow": 6} +{"Format": "IDEA0", "ID": "36cf7e1a-254b-4631-869b-7efcb827bb60", "DetectTime": "2024-05-21T12:24:33.368438+00:00", "EventTime": "2024-05-21T12:24:33.368456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAE0Va4doXjRgdwbW4"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "456e065a-9675-4835-8bfa-abc90ec70b4d", "DetectTime": "2024-05-21T12:24:33.380239+00:00", "EventTime": "2024-05-21T12:24:33.380259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYR674uwtO2GCO9Fe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "6cd9f9d1-f3de-432f-ad50-ad49c8474431", "DetectTime": "2024-05-21T12:24:33.391953+00:00", "EventTime": "2024-05-21T12:24:33.391971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.167.37.219"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.167.37.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJXnm2aBdtYdDzT18"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "8cc9431c-8df3-4a0d-bc3c-28c3a237607f", "DetectTime": "2024-05-21T12:24:33.403276+00:00", "EventTime": "2024-05-21T12:24:33.403295+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.167.37.219"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.167.37.219 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJXnm2aBdtYdDzT18"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 6} +{"Format": "IDEA0", "ID": "6f27d213-8f7f-40df-8935-bf3a37e2222a", "DetectTime": "2024-05-21T12:24:33.413597+00:00", "EventTime": "2024-05-21T12:24:33.413615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.129.61"]}], "Attach": [{"Content": "Connection to unknown destination port 15547/UDP destination IP 1.4.129.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cee7oyjsLP86L2AW6"], "accumulated_threat_level": 3.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "47d24e2c-80bf-4734-97c5-dab8189ded72", "DetectTime": "2024-05-21T12:24:33.418014+00:00", "EventTime": "2024-05-21T12:24:33.418032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzoTkf473Q3khMNWR1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "75b2329b-59df-4b96-9978-2cbbbfd7881f", "DetectTime": "2024-05-21T12:24:33.430158+00:00", "EventTime": "2024-05-21T12:24:33.430175+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.172.166.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.172.166.115 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcbLm3pTAHlIA3wDi"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "1673d812-b483-43de-b811-3ad3625e7a6e", "DetectTime": "2024-05-21T12:24:33.440438+00:00", "EventTime": "2024-05-21T12:24:33.440457+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.172.166.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.172.166.115 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcbLm3pTAHlIA3wDi"], "accumulated_threat_level": 4.2, "timewindow": 6} +{"Format": "IDEA0", "ID": "f6365e9d-0d6d-4cec-8f60-d743670b6336", "DetectTime": "2024-05-21T12:24:33.450638+00:00", "EventTime": "2024-05-21T12:24:33.450656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.94.67.10"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.94.67.10 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4huu2hK1HlkChmQ8"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "2bc8a52a-2fa3-4f09-bf76-3bfea89b2178", "DetectTime": "2024-05-21T12:24:33.462278+00:00", "EventTime": "2024-05-21T12:24:33.462296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.94.67.10"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.94.67.10 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4huu2hK1HlkChmQ8"], "accumulated_threat_level": 4.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "2976872e-5791-4ed9-be64-c3be674d8b5f", "DetectTime": "2024-05-21T12:24:33.472544+00:00", "EventTime": "2024-05-21T12:24:33.472562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 29634/UDP destination IP 113.165.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8lhKS6NyT8T4Qlk"], "accumulated_threat_level": 5.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "617cdf93-4b95-4014-a949-0601170a0436", "DetectTime": "2024-05-21T12:24:33.477018+00:00", "EventTime": "2024-05-21T12:24:33.477036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBoRMUeullDtxzbVj"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "964c0ced-f410-46ff-8610-bcc3cdec6eba", "DetectTime": "2024-05-21T12:24:33.488034+00:00", "EventTime": "2024-05-21T12:24:33.488052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.251.185.113"]}], "Attach": [{"Content": "Connection to unknown destination port 25875/UDP destination IP 41.251.185.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfn9Jy4yx1u1DTtLld"], "accumulated_threat_level": 6.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "a5182494-445f-4fe7-a7d5-736cda334a70", "DetectTime": "2024-05-21T12:24:33.498087+00:00", "EventTime": "2024-05-21T12:24:33.498105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYUFq260trEhWnIKj"], "accumulated_threat_level": 7.1, "timewindow": 6} +{"Format": "IDEA0", "ID": "646d706b-c9b6-47eb-bcff-264caaeec02d", "DetectTime": "2024-05-21T12:24:33.568296+00:00", "EventTime": "2024-05-21T12:24:33.568316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckh9sZ3G8zloW6kHDc"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 6} +{"Format": "IDEA0", "ID": "7d0aef25-2aa2-4ad8-861b-88ad3948e70f", "DetectTime": "2024-05-21T12:24:33.597080+00:00", "EventTime": "2024-05-21T12:24:33.597097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSGr533cwlpec5sz7"], "accumulated_threat_level": 8.7, "timewindow": 6} +{"Format": "IDEA0", "ID": "ee4c15b8-3d6d-4824-b93c-86741b40004c", "DetectTime": "2024-05-21T12:24:33.676296+00:00", "EventTime": "2024-05-21T12:24:33.676315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbHco3XaKdf4D7UBl"], "accumulated_threat_level": 9.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "6d28ab6b-0d5c-4ca7-9b6a-d577d8b3c46f", "DetectTime": "2024-05-21T12:24:33.697575+00:00", "EventTime": "2024-05-21T12:24:33.697597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhNeyuoisIhuYx9d"], "accumulated_threat_level": 10.3, "timewindow": 6} +{"Format": "IDEA0", "ID": "f1237a57-7527-4ef4-a586-bdde6b5a9dbf", "DetectTime": "2024-05-21T12:24:33.713722+00:00", "EventTime": "2024-05-21T12:24:33.713745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.194.29 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56bTL1pBAo5GfIVM5"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "521c3a4f-2033-4be0-82b3-18d1156cc573", "DetectTime": "2024-05-21T12:24:33.731881+00:00", "EventTime": "2024-05-21T12:24:33.731900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKaGw4PzqCW25IGn2"], "accumulated_threat_level": 11.100000000000001, "timewindow": 6} +{"Format": "IDEA0", "ID": "173777cb-b30e-46a6-bca2-182a25c3086a", "DetectTime": "2024-05-21T12:24:33.791366+00:00", "EventTime": "2024-05-21T12:24:33.791384+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["202.143.178.97"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 202.143.178.97 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UuMQ3lN4TZcxdck5"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "087cf0ab-b305-43be-b70e-64c50694c7de", "DetectTime": "2024-05-21T12:24:33.802668+00:00", "EventTime": "2024-05-21T12:24:33.802686+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["202.143.178.97"]}], "Attach": [{"Content": "connection to blacklisted IP: 202.143.178.97 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UuMQ3lN4TZcxdck5"], "accumulated_threat_level": 11.600000000000001, "timewindow": 6} +{"Format": "IDEA0", "ID": "8e98473e-7314-4890-aec2-3fe707f589dc", "DetectTime": "2024-05-21T12:24:33.812858+00:00", "EventTime": "2024-05-21T12:24:33.812875+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.56.253.45"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.253.45 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE5EN2U58SBfSCjOj"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "0ee13324-abcf-4ec1-962d-9e08069aef63", "DetectTime": "2024-05-21T12:24:33.823610+00:00", "EventTime": "2024-05-21T12:24:33.823628+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.56.253.45"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.253.45 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE5EN2U58SBfSCjOj"], "accumulated_threat_level": 12.100000000000001, "timewindow": 6} +{"Format": "Json", "ID": "0ee13324-abcf-4ec1-962d-9e08069aef63", "DetectTime": "2024-05-21T12:24:33.823610+00:00", "EventTime": "2024-05-21T12:24:33.823628+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.56.253.45"]}], "Attach": [{"Content": "1970-01-01T05:58:24.825720+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:34.117693)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "13e797a6-3aae-48d0-a20b-e379f6e42383", "DetectTime": "2024-05-21T12:24:34.126663+00:00", "EventTime": "2024-05-21T12:24:34.126680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9YPO3S2fWM8OIudi"], "accumulated_threat_level": 0.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "f7835479-9364-411f-b830-1b6f77ac8455", "DetectTime": "2024-05-21T12:24:34.136538+00:00", "EventTime": "2024-05-21T12:24:34.136556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.250.117.232"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.250.117.232 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyKzu4uRcYUMxPpX6"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "c753dcf1-2756-4300-8ef3-b488b7bac469", "DetectTime": "2024-05-21T12:24:34.147065+00:00", "EventTime": "2024-05-21T12:24:34.147082+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.250.117.232"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.250.117.232 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyKzu4uRcYUMxPpX6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f7a85b12-cf71-4ce7-81c4-11c915c6bf40", "DetectTime": "2024-05-21T12:24:34.151661+00:00", "EventTime": "2024-05-21T12:24:34.151681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDwwg2szZXjQs22U6"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "58eb46a8-71cb-4aa2-871a-e51725291bc1", "DetectTime": "2024-05-21T12:24:34.156182+00:00", "EventTime": "2024-05-21T12:24:34.156199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpkCrQ17d5oppI1dh9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "92b7c9fc-df70-4eb5-aefa-479e82f7d7a0", "DetectTime": "2024-05-21T12:24:34.165780+00:00", "EventTime": "2024-05-21T12:24:34.165798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.107.44"]}], "Attach": [{"Content": "Connection to unknown destination port 18028/UDP destination IP 180.244.107.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhfsX6mdebMWXXlg"], "accumulated_threat_level": 1.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "bd462067-911e-4a01-9032-c91a59aab611", "DetectTime": "2024-05-21T12:24:34.175264+00:00", "EventTime": "2024-05-21T12:24:34.175281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjEwZ91iaGuJjTtYEe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 7} +{"Format": "IDEA0", "ID": "3b0cbad7-7fda-4702-89a8-f458f4cb98ef", "DetectTime": "2024-05-21T12:24:34.185474+00:00", "EventTime": "2024-05-21T12:24:34.185492+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBoBc1bNEstfa6az4"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "23ef5644-e6c0-4b69-9986-3901723eb4de", "DetectTime": "2024-05-21T12:24:34.198693+00:00", "EventTime": "2024-05-21T12:24:34.198715+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBoBc1bNEstfa6az4"], "accumulated_threat_level": 1.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "bb42c866-55a2-4670-b8f9-2be1c0e793bc", "DetectTime": "2024-05-21T12:24:34.211417+00:00", "EventTime": "2024-05-21T12:24:34.211439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCW8a01V1J9aRA4Su2"], "accumulated_threat_level": 3.2, "timewindow": 7} +{"Format": "IDEA0", "ID": "209215a5-8bf6-4b59-bf87-2708f221123e", "DetectTime": "2024-05-21T12:24:34.216525+00:00", "EventTime": "2024-05-21T12:24:34.216546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnV5oxc0tzKQ6d7b"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "6b5851f3-5264-49fa-8db0-91ffe2f7ca54", "DetectTime": "2024-05-21T12:24:34.228425+00:00", "EventTime": "2024-05-21T12:24:34.228442+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWKi23KFx50EszvKe"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "ccb311a1-d299-4fc7-9528-b77d2fd3dc32", "DetectTime": "2024-05-21T12:24:34.240572+00:00", "EventTime": "2024-05-21T12:24:34.240593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWKi23KFx50EszvKe"], "accumulated_threat_level": 1.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "536daceb-2787-4b00-ac12-b47458c74464", "DetectTime": "2024-05-21T12:24:34.245100+00:00", "EventTime": "2024-05-21T12:24:34.245118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRKy74jARUFAKHV8b"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "5ab4a884-c4e8-4ab9-a570-cb96b3db731e", "DetectTime": "2024-05-21T12:24:34.259870+00:00", "EventTime": "2024-05-21T12:24:34.259889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "Connection to unknown destination port 7773/UDP destination IP 200.119.190.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPv71a0qqt4RnTcQ6"], "accumulated_threat_level": 4.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "a341abe8-5156-48e7-bdcc-cc2ce9f6cb54", "DetectTime": "2024-05-21T12:24:34.264604+00:00", "EventTime": "2024-05-21T12:24:34.264622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZOAy2PSGUuIrRCXi"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "4b11ff57-416a-4cad-b6c3-868ad35de248", "DetectTime": "2024-05-21T12:24:34.269063+00:00", "EventTime": "2024-05-21T12:24:34.269081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsDoCEHdI0V10Y95"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2dbe8ead-ff35-4745-ad1e-cc249ec3a7cf", "DetectTime": "2024-05-21T12:24:34.279713+00:00", "EventTime": "2024-05-21T12:24:34.279731+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyX1l3ke6P0F7RTL7"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "55a744b2-33de-4f58-bfac-4b85b064b741", "DetectTime": "2024-05-21T12:24:34.290362+00:00", "EventTime": "2024-05-21T12:24:34.290380+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyX1l3ke6P0F7RTL7"], "accumulated_threat_level": 2.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "41928456-007b-47be-befc-bcf30d0173d0", "DetectTime": "2024-05-21T12:24:34.301772+00:00", "EventTime": "2024-05-21T12:24:34.301790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8nO32eUkCMDhdg13"], "accumulated_threat_level": 4.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "3b3c6e93-dfdd-4804-bbfa-6d57866c746e", "DetectTime": "2024-05-21T12:24:34.306936+00:00", "EventTime": "2024-05-21T12:24:34.306954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSSBp18BsiwLaQIvb"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "ed7155a8-1fc2-41ff-a5b7-3398c23288c4", "DetectTime": "2024-05-21T12:24:34.312544+00:00", "EventTime": "2024-05-21T12:24:34.312562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yPOGG3gcwyeuBA8"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "94cf00a7-ae35-41b6-9b76-2b21b2cab950", "DetectTime": "2024-05-21T12:24:34.317641+00:00", "EventTime": "2024-05-21T12:24:34.317659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHnasJ3jX8QmqESsMd"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "9e95aa72-2ba5-4d6c-95aa-c68ec1b974ce", "DetectTime": "2024-05-21T12:24:34.322003+00:00", "EventTime": "2024-05-21T12:24:34.322021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFN5uqNcC6w98sXB9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "d1b7c148-4aab-44c2-b625-ec089d276ada", "DetectTime": "2024-05-21T12:24:34.326276+00:00", "EventTime": "2024-05-21T12:24:34.326294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjg1w3ntfWQfXXKv2"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "ded6f7bb-3b11-41ba-8dac-0fb8b8d9ce37", "DetectTime": "2024-05-21T12:24:34.336586+00:00", "EventTime": "2024-05-21T12:24:34.336603+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nR3c3kFF8dHbswg"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "4e84b4d1-d9b3-4304-b60b-0841b75e17dc", "DetectTime": "2024-05-21T12:24:34.346897+00:00", "EventTime": "2024-05-21T12:24:34.346915+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nR3c3kFF8dHbswg"], "accumulated_threat_level": 2.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "36901381-b0c0-4711-9c98-96120192f6ea", "DetectTime": "2024-05-21T12:24:34.352028+00:00", "EventTime": "2024-05-21T12:24:34.352050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6Vjp41luE7QZQUH7"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2b3d8f7c-f696-4a6b-a5b2-1efbc51c8524", "DetectTime": "2024-05-21T12:24:34.357169+00:00", "EventTime": "2024-05-21T12:24:34.357188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CePUp52cIFmWYS6m65"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "f56b307e-6d65-4b13-972b-c6f94833871e", "DetectTime": "2024-05-21T12:24:34.361463+00:00", "EventTime": "2024-05-21T12:24:34.361481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkAJ811tyHpm8wOU8"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "236928f6-7ed1-4bdc-9ef8-a07839d543de", "DetectTime": "2024-05-21T12:24:34.378670+00:00", "EventTime": "2024-05-21T12:24:34.378690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.1.28.117"]}], "Attach": [{"Content": "Connection to unknown destination port 28933/UDP destination IP 103.1.28.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9otl2WrfzNOuUEVc"], "accumulated_threat_level": 5.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "03999df4-9580-457b-9435-0154517d472b", "DetectTime": "2024-05-21T12:24:34.383656+00:00", "EventTime": "2024-05-21T12:24:34.383677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5GrGI3OeE0aqCy7vi"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "651d6d8f-c757-4c7e-9e8c-84cfb4bfa2fe", "DetectTime": "2024-05-21T12:24:34.395243+00:00", "EventTime": "2024-05-21T12:24:34.395261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6eJlb1QOZzriSN034"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "24720410-caaf-4d20-8e42-ec325572b193", "DetectTime": "2024-05-21T12:24:34.408725+00:00", "EventTime": "2024-05-21T12:24:34.408746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZRxRL1lz5Qke3quYg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 7} +{"Format": "IDEA0", "ID": "f6d5a12b-8a7b-4680-a553-579489eb1f63", "DetectTime": "2024-05-21T12:24:34.419813+00:00", "EventTime": "2024-05-21T12:24:34.419830+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhxqDldSEaPtY1Xh"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "e8d95bda-327c-4f79-82de-7c8ea5ac256c", "DetectTime": "2024-05-21T12:24:34.433888+00:00", "EventTime": "2024-05-21T12:24:34.433905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhxqDldSEaPtY1Xh"], "accumulated_threat_level": 3.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "edd48971-39f3-4cc1-a0af-80a14a83c6c2", "DetectTime": "2024-05-21T12:24:34.438302+00:00", "EventTime": "2024-05-21T12:24:34.438319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4w7gC4IROGuUw8tJe"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "036644b4-01e2-4667-b33f-e74b879a3a32", "DetectTime": "2024-05-21T12:24:34.442719+00:00", "EventTime": "2024-05-21T12:24:34.442737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegEfq1JGAR8oKsLn9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "3b4b0c6a-57f4-47f8-a600-fa793ac32186", "DetectTime": "2024-05-21T12:24:34.472220+00:00", "EventTime": "2024-05-21T12:24:34.472240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjjaAX3vOhV4LtOzjl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "3e23195a-07b2-47ed-8498-529627ed6a1a", "DetectTime": "2024-05-21T12:24:34.476651+00:00", "EventTime": "2024-05-21T12:24:34.476668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClnHnG4DtgEkPSZldh"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "1a4f3301-8642-4732-83e0-0eb8e138d4f8", "DetectTime": "2024-05-21T12:24:34.488346+00:00", "EventTime": "2024-05-21T12:24:34.488366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFnI44hQBLKGOcbm6"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "d39a5c2b-677c-49d1-9cbf-2ee465f58419", "DetectTime": "2024-05-21T12:24:34.517262+00:00", "EventTime": "2024-05-21T12:24:34.517284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cddxgz3CQajKewsIJ2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "cd2ada92-1f2c-4cca-89f3-5e802ad7324c", "DetectTime": "2024-05-21T12:24:34.529192+00:00", "EventTime": "2024-05-21T12:24:34.529211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuOfY35o9D4kkno81"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "4f38f29e-f24a-44e2-8d4a-e6f247cc89b0", "DetectTime": "2024-05-21T12:24:34.539957+00:00", "EventTime": "2024-05-21T12:24:34.539975+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuOfY35o9D4kkno81"], "accumulated_threat_level": 3.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "a636d25f-dbab-42a1-a65b-4813577b54bd", "DetectTime": "2024-05-21T12:24:34.544769+00:00", "EventTime": "2024-05-21T12:24:34.544789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NYwd1t5HLSwoOdf7"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "004fd0ad-ee33-4180-8539-2fcb94b3f953", "DetectTime": "2024-05-21T12:24:34.549310+00:00", "EventTime": "2024-05-21T12:24:34.549328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExpq33xJ4Y4JS1owc"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2f0d0edd-a921-4443-9c7a-7909f9d0675c", "DetectTime": "2024-05-21T12:24:34.556205+00:00", "EventTime": "2024-05-21T12:24:34.556224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.139.178.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzXySJ3Kc6jt1rsdEe"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "686d2999-8a42-40c3-8884-f09f7b07b5e4", "DetectTime": "2024-05-21T12:24:34.622775+00:00", "EventTime": "2024-05-21T12:24:34.622794+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.188.52.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.188.52.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRBsYQyFFUnDeJk13"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "83d9340e-ec16-45ac-ba44-0acafdb6f8ca", "DetectTime": "2024-05-21T12:24:34.633468+00:00", "EventTime": "2024-05-21T12:24:34.633486+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.188.52.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.188.52.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRBsYQyFFUnDeJk13"], "accumulated_threat_level": 4.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "6c9cf119-344c-4309-b365-ec52ea56bf70", "DetectTime": "2024-05-21T12:24:34.644080+00:00", "EventTime": "2024-05-21T12:24:34.644097+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdfIU1kVM5gYEM4Ea"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "242c1cec-35ab-4744-8d2b-3474663ee226", "DetectTime": "2024-05-21T12:24:34.654528+00:00", "EventTime": "2024-05-21T12:24:34.654551+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdfIU1kVM5gYEM4Ea"], "accumulated_threat_level": 4.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "99b31187-3fb4-4b4d-a2c0-46f5391fdecc", "DetectTime": "2024-05-21T12:24:34.714101+00:00", "EventTime": "2024-05-21T12:24:34.714119+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2Qpm3BLSqngd2bj2"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "784fb1d1-b2ac-47a0-8217-06fa4db6de66", "DetectTime": "2024-05-21T12:24:34.725055+00:00", "EventTime": "2024-05-21T12:24:34.725072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2Qpm3BLSqngd2bj2"], "accumulated_threat_level": 5.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "2d148e35-f5ed-40a1-b1a5-2c2e0c412998", "DetectTime": "2024-05-21T12:24:34.729337+00:00", "EventTime": "2024-05-21T12:24:34.729354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COEM2l49Er4Ry2UyL5"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "9daa6afe-4843-45f8-8c88-41ba432da2fe", "DetectTime": "2024-05-21T12:24:34.733998+00:00", "EventTime": "2024-05-21T12:24:34.734017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv47Qk4gEDkmqPbiG6"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "3d5a39bd-6a75-4344-ab4a-b822c6efdc00", "DetectTime": "2024-05-21T12:24:34.758033+00:00", "EventTime": "2024-05-21T12:24:34.758057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5rur3WSMtGVN2Pf1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "27728515-7644-4a7b-a936-a565b854c91b", "DetectTime": "2024-05-21T12:24:34.775415+00:00", "EventTime": "2024-05-21T12:24:34.775436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVY23r3npB2S9kTwcb"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "8472f950-a5e5-43b7-bc26-41f1eb02fc5a", "DetectTime": "2024-05-21T12:24:34.805157+00:00", "EventTime": "2024-05-21T12:24:34.805177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COr6tC3zrVPn1xBwV1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "2169aa2c-5fb9-4726-80a8-198d12cc67b9", "DetectTime": "2024-05-21T12:24:34.824868+00:00", "EventTime": "2024-05-21T12:24:34.824887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCNW11W6ytbUP6Kq1"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "b4f5818e-2627-42d5-880c-2b2a5d71988a", "DetectTime": "2024-05-21T12:24:34.850589+00:00", "EventTime": "2024-05-21T12:24:34.850607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSQR7t1UttmQ5nnWTg"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "6b99f0d6-7b0e-44a2-92ca-3fba77fe020e", "DetectTime": "2024-05-21T12:24:34.867877+00:00", "EventTime": "2024-05-21T12:24:34.867897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2a7a02g5tzngcZHme"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "39082989-8b81-436a-942a-20f636e2ab01", "DetectTime": "2024-05-21T12:24:34.887795+00:00", "EventTime": "2024-05-21T12:24:34.887813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYEu03I6Wc7iDb8i7"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "5b6bdba0-770d-436b-98b2-400705fd7efb", "DetectTime": "2024-05-21T12:24:34.904949+00:00", "EventTime": "2024-05-21T12:24:34.904968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMKqo1RjbYCI3llnc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "6b60fda4-a7cc-4472-ae28-85a859865892", "DetectTime": "2024-05-21T12:24:34.915392+00:00", "EventTime": "2024-05-21T12:24:34.915412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhjzu2NxGVP2zrRn9"], "accumulated_threat_level": 1.3, "timewindow": 2} +{"Format": "IDEA0", "ID": "0749a6c5-771a-442f-ac71-4f345b70cbb4", "DetectTime": "2024-05-21T12:24:34.939933+00:00", "EventTime": "2024-05-21T12:24:34.939950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35iMf3fuxoRnlgKg3"], "accumulated_threat_level": 9.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "ddd3f419-fb08-405e-8708-315dd831cacb", "DetectTime": "2024-05-21T12:24:34.960907+00:00", "EventTime": "2024-05-21T12:24:34.960924+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.235.27.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcIiv2EWu5zpebZUb"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "491d1201-a41e-46d0-a4ce-cb35d5e8a6f8", "DetectTime": "2024-05-21T12:24:34.972610+00:00", "EventTime": "2024-05-21T12:24:34.972629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH4hk63m7RMiqtEDGk"], "accumulated_threat_level": 10.4, "timewindow": 7} +{"Format": "IDEA0", "ID": "a8b98584-4ba8-43f9-ad70-61112a52bdee", "DetectTime": "2024-05-21T12:24:34.984507+00:00", "EventTime": "2024-05-21T12:24:34.984524+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.235.27.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcIiv2EWu5zpebZUb"], "accumulated_threat_level": 5.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "af1822fd-8f77-4f13-936c-34191896247c", "DetectTime": "2024-05-21T12:24:34.993827+00:00", "EventTime": "2024-05-21T12:24:34.993844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62HzN3oEtRK2GFPW5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 7} +{"Format": "IDEA0", "ID": "b88c8096-b5e6-432a-9382-a7064dd009b5", "DetectTime": "2024-05-21T12:24:35.014162+00:00", "EventTime": "2024-05-21T12:24:35.014181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYIf2c4xr8uxMF7ji4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 7} +{"Format": "Json", "ID": "b88c8096-b5e6-432a-9382-a7064dd009b5", "DetectTime": "2024-05-21T12:24:35.014162+00:00", "EventTime": "2024-05-21T12:24:35.014181+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "1970-01-01T06:31:42.761565+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2024/05/21 12:24:35.136651)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 7, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d52c8801-8354-440b-a455-e09928d8d140", "DetectTime": "2024-05-21T12:24:35.140750+00:00", "EventTime": "2024-05-21T12:24:35.140769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXgTU3I129N0YZeo7"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "ff52106e-65ab-44c9-bbbb-98ba3982891c", "DetectTime": "2024-05-21T12:24:35.154499+00:00", "EventTime": "2024-05-21T12:24:35.154518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfkqc1dMkUCkKxnH3"], "accumulated_threat_level": 0.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "b64ac1ef-87c3-4075-871f-302f05e79687", "DetectTime": "2024-05-21T12:24:35.164974+00:00", "EventTime": "2024-05-21T12:24:35.164992+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.83.114.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYR674uwtO2GCO9Fe"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "d664f9cc-e42a-4e43-9858-aa8fefc0be63", "DetectTime": "2024-05-21T12:24:35.176195+00:00", "EventTime": "2024-05-21T12:24:35.176214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYR674uwtO2GCO9Fe"], "accumulated_threat_level": 6.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "e5c41922-f21b-4dac-9dcb-1bfc592623ff", "DetectTime": "2024-05-21T12:24:35.186367+00:00", "EventTime": "2024-05-21T12:24:35.186385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70NBU2paDd6mSjerh"], "accumulated_threat_level": 1.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "cc425783-85a3-4a89-87bb-55f82942676b", "DetectTime": "2024-05-21T12:24:35.196437+00:00", "EventTime": "2024-05-21T12:24:35.196459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJrqS18k7z9A01Uch"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 7} +{"Format": "IDEA0", "ID": "f8435863-5426-4fa1-9b8e-d4cdd90bae6d", "DetectTime": "2024-05-21T12:24:35.208606+00:00", "EventTime": "2024-05-21T12:24:35.208628+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.129.61"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cee7oyjsLP86L2AW6"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "ba2f03d2-8d7c-4358-9b34-81ca6373e62b", "DetectTime": "2024-05-21T12:24:35.221429+00:00", "EventTime": "2024-05-21T12:24:35.221449+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.129.61"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cee7oyjsLP86L2AW6"], "accumulated_threat_level": 6.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "ebcef5d4-4408-4c81-b281-625691f0e830", "DetectTime": "2024-05-21T12:24:35.234910+00:00", "EventTime": "2024-05-21T12:24:35.234928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIjYyCrpcQabNPVEk"], "accumulated_threat_level": 3.2, "timewindow": 7} +{"Format": "IDEA0", "ID": "91375dbf-601b-41f9-b905-b98968d46cd7", "DetectTime": "2024-05-21T12:24:35.249202+00:00", "EventTime": "2024-05-21T12:24:35.249219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmvAsjdnGBocSUdMh"], "accumulated_threat_level": 4.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "1f2cfa9f-01ed-4ec5-84d4-9cae99517cc5", "DetectTime": "2024-05-21T12:24:35.265322+00:00", "EventTime": "2024-05-21T12:24:35.265340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwbApqrZv0vKi7Q3"], "accumulated_threat_level": 4.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "5b26c35a-c6ca-4a8b-b5da-00d3ced7d092", "DetectTime": "2024-05-21T12:24:35.287974+00:00", "EventTime": "2024-05-21T12:24:35.287993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHJw728PUEtZE8ZEh"], "accumulated_threat_level": 5.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "5e9331da-33c7-4d48-b656-ab8141b98b05", "DetectTime": "2024-05-21T12:24:35.298370+00:00", "EventTime": "2024-05-21T12:24:35.298388+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.160.170.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.160.170.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHDcPA3ZuFWPozmG46"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "6b57ec44-e676-4530-b88e-363490aaf4cd", "DetectTime": "2024-05-21T12:24:35.309318+00:00", "EventTime": "2024-05-21T12:24:35.309336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.160.170.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.160.170.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHDcPA3ZuFWPozmG46"], "accumulated_threat_level": 7.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "e419c69f-3cfe-485e-b4be-beafc069e53c", "DetectTime": "2024-05-21T12:24:35.319290+00:00", "EventTime": "2024-05-21T12:24:35.319307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDdCK6OCwOzXuu143"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 7} +{"Format": "IDEA0", "ID": "3f22e7b0-6925-4742-949e-f7c412266f4f", "DetectTime": "2024-05-21T12:24:35.335881+00:00", "EventTime": "2024-05-21T12:24:35.335900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZMk61xIXrcC1lmml"], "accumulated_threat_level": 7.199999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "a135be4f-2d06-4843-9b8e-5c8af7c8a49d", "DetectTime": "2024-05-21T12:24:35.366634+00:00", "EventTime": "2024-05-21T12:24:35.366654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7dWc15MekQ6ybim"], "accumulated_threat_level": 7.999999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "48212a4f-7422-4b09-be51-172988018dc3", "DetectTime": "2024-05-21T12:24:35.386397+00:00", "EventTime": "2024-05-21T12:24:35.386432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqolbH2xduWaMK6jP1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "a75544b7-4c59-47d2-8035-ba2909aec525", "DetectTime": "2024-05-21T12:24:35.399440+00:00", "EventTime": "2024-05-21T12:24:35.399459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.165.116.48"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8lhKS6NyT8T4Qlk"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "840630db-2414-4035-9be5-b02c90ec9b7e", "DetectTime": "2024-05-21T12:24:35.411067+00:00", "EventTime": "2024-05-21T12:24:35.411091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8lhKS6NyT8T4Qlk"], "accumulated_threat_level": 7.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "eef6801d-7c4e-48b8-8731-63c624b6ed80", "DetectTime": "2024-05-21T12:24:35.423148+00:00", "EventTime": "2024-05-21T12:24:35.423169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crmkdx3nLBPyTDOj92"], "accumulated_threat_level": 9.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "90b4e33a-7a36-40f4-af64-c557cd677d12", "DetectTime": "2024-05-21T12:24:35.438111+00:00", "EventTime": "2024-05-21T12:24:35.438130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIgF0T1B7hcd5hy20e"], "accumulated_threat_level": 10.4, "timewindow": 7} +{"Format": "IDEA0", "ID": "4d93d47d-95b9-4eb2-b695-27a4969ac0aa", "DetectTime": "2024-05-21T12:24:35.449399+00:00", "EventTime": "2024-05-21T12:24:35.449416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.139.178.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzE6m2qzumyiVznr"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "74634da2-6d2f-4aa7-9814-6d59264ec943", "DetectTime": "2024-05-21T12:24:35.464418+00:00", "EventTime": "2024-05-21T12:24:35.464438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd64629OeBe9y44Qh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 7} +{"Format": "IDEA0", "ID": "2c0219fb-9457-4906-a43a-64928900e64d", "DetectTime": "2024-05-21T12:24:35.491586+00:00", "EventTime": "2024-05-21T12:24:35.491606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3avFe3hB045bKiXH"], "accumulated_threat_level": 12.000000000000002, "timewindow": 7} +{"Format": "Json", "ID": "2c0219fb-9457-4906-a43a-64928900e64d", "DetectTime": "2024-05-21T12:24:35.491586+00:00", "EventTime": "2024-05-21T12:24:35.491606+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "1970-01-01T06:31:46.665268+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2024/05/21 12:24:35.622282)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 7, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ab6b8b9f-bea1-4c66-8d21-f4f5ce7c6983", "DetectTime": "2024-05-21T12:24:35.626097+00:00", "EventTime": "2024-05-21T12:24:35.626115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bYV84D20eJsIC04c"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "2730a130-7b15-4269-8577-9bea8bdaee86", "DetectTime": "2024-05-21T12:24:35.638306+00:00", "EventTime": "2024-05-21T12:24:35.638324+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.93.244.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.93.244.19 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTVnuF3gloK0T4Artd"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "a0863c61-3191-41c3-a4ce-4653f50d89f3", "DetectTime": "2024-05-21T12:24:35.649274+00:00", "EventTime": "2024-05-21T12:24:35.649292+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.93.244.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.93.244.19 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTVnuF3gloK0T4Artd"], "accumulated_threat_level": 8.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "f8081148-93f4-421e-8398-1aa07fad9e95", "DetectTime": "2024-05-21T12:24:35.653674+00:00", "EventTime": "2024-05-21T12:24:35.653692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRRPi32tu2CG77El2"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "7d8e3c30-4373-440f-ad86-596ba070d3d6", "DetectTime": "2024-05-21T12:24:35.664095+00:00", "EventTime": "2024-05-21T12:24:35.664117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8Bto28EXkAYkjitb"], "accumulated_threat_level": 0.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "03f3196d-f8ce-4433-b849-cef230f2c3b2", "DetectTime": "2024-05-21T12:24:35.669324+00:00", "EventTime": "2024-05-21T12:24:35.669347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf6DYiSDbNUrudYkh"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "8c3f9fe2-e6c4-4ecf-ab0f-2db11cfc3298", "DetectTime": "2024-05-21T12:24:35.674327+00:00", "EventTime": "2024-05-21T12:24:35.674348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXgax3C7ThmBSAoH2"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "87bdd20e-9817-495f-99df-ba08a83de035", "DetectTime": "2024-05-21T12:24:35.690402+00:00", "EventTime": "2024-05-21T12:24:35.690434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.251.185.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.251.185.113 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfn9Jy4yx1u1DTtLld"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "9437485a-9a65-4a0d-9d28-8c3333395186", "DetectTime": "2024-05-21T12:24:35.702404+00:00", "EventTime": "2024-05-21T12:24:35.702445+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.251.185.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.251.185.113 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfn9Jy4yx1u1DTtLld"], "accumulated_threat_level": 8.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "db6cd22a-230e-471c-804d-65ebea85c634", "DetectTime": "2024-05-21T12:24:35.707297+00:00", "EventTime": "2024-05-21T12:24:35.707315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp0NRs1LIitsa6fxO2"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "64ba4e8d-12f2-4aeb-9052-b94a21004cc9", "DetectTime": "2024-05-21T12:24:35.711716+00:00", "EventTime": "2024-05-21T12:24:35.711733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGDmc3MTadVtYUxac"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "2fbc1dae-a679-428d-b341-fa2d3d1bef28", "DetectTime": "2024-05-21T12:24:35.716086+00:00", "EventTime": "2024-05-21T12:24:35.716103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyPnz1iEhaSmZ3kq8", "CCjEj24upRHf8txJwa", "C4iD3H2cglAmAixDW4", "CWylp83m0MhDBI5Ms6"], "accumulated_threat_level": 1.3, "timewindow": 7} +{"Format": "IDEA0", "ID": "4191ef75-90dd-47ba-8439-c65b967657ec", "DetectTime": "2024-05-21T12:24:35.721524+00:00", "EventTime": "2024-05-21T12:24:35.721544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DDV342ReW50jYEf5"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "cac9c958-8c37-498f-a6d8-1619fc51cc3a", "DetectTime": "2024-05-21T12:24:35.788749+00:00", "EventTime": "2024-05-21T12:24:35.788769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["218.90.187.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5021/UDP destination IP 218.90.187.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXN5tX33cVnekL5Kn5"], "accumulated_threat_level": 2.1, "timewindow": 7} +{"Format": "IDEA0", "ID": "8b0d4a58-cba0-4a5d-a192-6e61f107390a", "DetectTime": "2024-05-21T12:24:35.871459+00:00", "EventTime": "2024-05-21T12:24:35.871477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBoIF3apXmkTwSfJ6"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 7} +{"Format": "IDEA0", "ID": "b07405e7-5dc1-4ee5-9e51-483aa9a2a138", "DetectTime": "2024-05-21T12:24:35.890715+00:00", "EventTime": "2024-05-21T12:24:35.890734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNazac4YKR8R9Y4Ie"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "4f1cd79a-842b-4ce0-8c03-84c296742702", "DetectTime": "2024-05-21T12:24:35.895344+00:00", "EventTime": "2024-05-21T12:24:35.895362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Witg352rYZjm2hti"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "faefefca-b3d7-45a2-8772-3c6b224e143d", "DetectTime": "2024-05-21T12:24:35.911808+00:00", "EventTime": "2024-05-21T12:24:35.911828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nmVr1xccL5MiCXx7"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "207c8619-9eff-4da7-add3-b1f58d982139", "DetectTime": "2024-05-21T12:24:35.928331+00:00", "EventTime": "2024-05-21T12:24:35.928352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEsBw2R24tnZdIcoc"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "85991585-6636-42cd-9004-a78eebe5c8fc", "DetectTime": "2024-05-21T12:24:35.942241+00:00", "EventTime": "2024-05-21T12:24:35.942263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6r7Az2ayx7krmJ96c"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "b3550893-4f23-49c9-8949-13c3b7638dce", "DetectTime": "2024-05-21T12:24:35.956040+00:00", "EventTime": "2024-05-21T12:24:35.956071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CisWItQ0Fdi8Tpqt3"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "e4c0e431-2d58-4701-bb00-0148630c1da8", "DetectTime": "2024-05-21T12:24:35.961060+00:00", "EventTime": "2024-05-21T12:24:35.961079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBBii32bQjcfg1tD8"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "df6c7b0f-597d-4908-9107-57c3e9ab22f6", "DetectTime": "2024-05-21T12:24:35.973040+00:00", "EventTime": "2024-05-21T12:24:35.973061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYYR02PHyIDTkpDb"], "accumulated_threat_level": 3.7, "timewindow": 7} +{"Format": "IDEA0", "ID": "2eae4438-1469-4d5c-8cd0-2946a1c8a9bd", "DetectTime": "2024-05-21T12:24:35.988186+00:00", "EventTime": "2024-05-21T12:24:35.988206+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.49.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYUFq260trEhWnIKj"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "5bb039eb-b610-49ce-9090-59bee3a63195", "DetectTime": "2024-05-21T12:24:35.999327+00:00", "EventTime": "2024-05-21T12:24:35.999346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYUFq260trEhWnIKj"], "accumulated_threat_level": 9.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "ad1984b1-7c7e-4578-97c9-8f5644ab3691", "DetectTime": "2024-05-21T12:24:36.010505+00:00", "EventTime": "2024-05-21T12:24:36.010525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxLuh3JkUsMo7Iak1"], "accumulated_threat_level": 4.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "57b6d4a2-2c8f-4670-a478-b451d46f1d93", "DetectTime": "2024-05-21T12:24:36.021042+00:00", "EventTime": "2024-05-21T12:24:36.021060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5LmSkPvDM7VoLSd"], "accumulated_threat_level": 5.3, "timewindow": 7} +{"Format": "IDEA0", "ID": "688a881b-9c91-43ea-9905-6660820ea8d9", "DetectTime": "2024-05-21T12:24:36.031432+00:00", "EventTime": "2024-05-21T12:24:36.031449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qEeKTFA1ekwa4fj"], "accumulated_threat_level": 6.1, "timewindow": 7} +{"Format": "IDEA0", "ID": "f1223aa2-7bd4-4c73-8c9d-f3b55ca7d7e2", "DetectTime": "2024-05-21T12:24:36.049816+00:00", "EventTime": "2024-05-21T12:24:36.049834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC04x11wQAYqJTYBWa"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 7} +{"Format": "IDEA0", "ID": "b03c7b6b-3d86-4868-950e-38a084773b67", "DetectTime": "2024-05-21T12:24:36.068994+00:00", "EventTime": "2024-05-21T12:24:36.069014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxspx72uBro4tNley1"], "accumulated_threat_level": 7.699999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "bc277e26-901c-4c3f-8512-dfe3abd3380e", "DetectTime": "2024-05-21T12:24:36.081405+00:00", "EventTime": "2024-05-21T12:24:36.081422+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.160.203.71"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.160.203.71 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKuoqm4JmqF0fFfxZb"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "d4a9b4aa-d3de-4f4a-8362-6197f915cf8c", "DetectTime": "2024-05-21T12:24:36.092830+00:00", "EventTime": "2024-05-21T12:24:36.092848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.160.203.71"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.160.203.71 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKuoqm4JmqF0fFfxZb"], "accumulated_threat_level": 9.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "48736f66-a72b-472f-96ca-800afcc775d3", "DetectTime": "2024-05-21T12:24:36.097181+00:00", "EventTime": "2024-05-21T12:24:36.097198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUEycRyx5IlDzJdY3"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "0aae7e7f-07c1-45af-92aa-6c088ca82aaf", "DetectTime": "2024-05-21T12:24:36.107166+00:00", "EventTime": "2024-05-21T12:24:36.107183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xNpk2zwgTEIry9q1"], "accumulated_threat_level": 8.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "6a5d7634-6043-40f0-802b-ce0b550b1b34", "DetectTime": "2024-05-21T12:24:36.111728+00:00", "EventTime": "2024-05-21T12:24:36.111747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmKhC4U1oyzjU806"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "29662684-1ff5-4194-9c93-2f9b47a54cad", "DetectTime": "2024-05-21T12:24:36.122534+00:00", "EventTime": "2024-05-21T12:24:36.122552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.235.27.151"]}], "Attach": [{"Content": "Connection to unknown destination port 22233/UDP destination IP 190.235.27.151. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct34Rp1Rja4wwruNM5"], "accumulated_threat_level": 9.3, "timewindow": 7} +{"Format": "IDEA0", "ID": "8384da39-80a3-47eb-86c4-c31971a3b990", "DetectTime": "2024-05-21T12:24:36.150029+00:00", "EventTime": "2024-05-21T12:24:36.150049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7d8p49gvvbL9JLKl"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "9b172eca-f00f-4549-a41c-c04dd3ed3ede", "DetectTime": "2024-05-21T12:24:36.167079+00:00", "EventTime": "2024-05-21T12:24:36.167100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQscuM3VlqGs7YcuHe"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "0e803c40-ef42-4e25-879c-1e4f19a1be40", "DetectTime": "2024-05-21T12:24:36.179584+00:00", "EventTime": "2024-05-21T12:24:36.179602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.129.61"]}], "Attach": [{"Content": "Connection to unknown destination port 15547/UDP destination IP 1.4.129.61. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbeJyE47X1oFC6H4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 7} +{"Format": "IDEA0", "ID": "c39641e6-d866-463c-946b-fefa5fb1b846", "DetectTime": "2024-05-21T12:24:36.183940+00:00", "EventTime": "2024-05-21T12:24:36.183958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDuoa9SjGhhLdfEf6"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "b971bd68-b321-41c5-b2f3-d6091ef18c8c", "DetectTime": "2024-05-21T12:24:36.200303+00:00", "EventTime": "2024-05-21T12:24:36.200322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XXtt2zVzj6zGV99"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "11a55bda-fdc4-4ab4-8780-4c8663ad4e56", "DetectTime": "2024-05-21T12:24:36.212733+00:00", "EventTime": "2024-05-21T12:24:36.212752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwOBB1ptsvgdkgfEl"], "accumulated_threat_level": 10.900000000000002, "timewindow": 7} +{"Format": "IDEA0", "ID": "f6bc22e3-7c63-4477-a20f-c6d000679649", "DetectTime": "2024-05-21T12:24:36.224447+00:00", "EventTime": "2024-05-21T12:24:36.224465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbL9uB4YOzWdCKbcQl"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "cacd9695-8420-4f9e-83b8-156bf55c342b", "DetectTime": "2024-05-21T12:24:36.243062+00:00", "EventTime": "2024-05-21T12:24:36.243082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 29634/UDP destination IP 113.165.116.48. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtFiodylDZx7cttb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 7} +{"Format": "IDEA0", "ID": "182243d0-7764-4974-967b-f267a2c27949", "DetectTime": "2024-05-21T12:24:36.250630+00:00", "EventTime": "2024-05-21T12:24:36.250648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUbI3q9F6NV0VVVue"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "04801557-095e-4e01-b230-4adbb7f1e725", "DetectTime": "2024-05-21T12:24:36.274250+00:00", "EventTime": "2024-05-21T12:24:36.274268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJ0Je33tHJ6pQaGz"], "accumulated_threat_level": 12.500000000000004, "timewindow": 7} +{"Format": "Json", "ID": "04801557-095e-4e01-b230-4adbb7f1e725", "DetectTime": "2024-05-21T12:24:36.274250+00:00", "EventTime": "2024-05-21T12:24:36.274268+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "1970-01-01T06:32:09.714524+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2024/05/21 12:24:36.480823)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 7, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "9eb96c47-8f57-4381-88bf-29dcb22f24b5", "DetectTime": "2024-05-21T12:24:36.491958+00:00", "EventTime": "2024-05-21T12:24:36.491976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckh9sZ3G8zloW6kHDc"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "c6f260a4-fea4-404f-bd8a-11caa79f62c7", "DetectTime": "2024-05-21T12:24:36.502767+00:00", "EventTime": "2024-05-21T12:24:36.502786+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckh9sZ3G8zloW6kHDc"], "accumulated_threat_level": 10.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "a8dfd622-24d3-4382-afe1-775385704f07", "DetectTime": "2024-05-21T12:24:36.510091+00:00", "EventTime": "2024-05-21T12:24:36.510110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3WqN3YxtCpv9Pd44"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "7b082ef7-c2b6-49df-8041-894095211db3", "DetectTime": "2024-05-21T12:24:36.514497+00:00", "EventTime": "2024-05-21T12:24:36.514515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF5zMe3gAjqGo0ww9l"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "6b13095d-a5d6-4136-a6c4-2d96f0573625", "DetectTime": "2024-05-21T12:24:36.525012+00:00", "EventTime": "2024-05-21T12:24:36.525030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUN8v456AeCK4hYcd"], "accumulated_threat_level": 0.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "4c8e33ce-c2c4-4ba8-a9e3-a23305842b7f", "DetectTime": "2024-05-21T12:24:36.529615+00:00", "EventTime": "2024-05-21T12:24:36.529633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAniB2JvLJoubFmd1"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "1f796ce2-5c84-4a68-978c-a5e0ff9e722b", "DetectTime": "2024-05-21T12:24:36.539873+00:00", "EventTime": "2024-05-21T12:24:36.539892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUJBw17ITkH4E77Wd"], "accumulated_threat_level": 1.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "a74b11ba-a602-4aba-8604-171654c921cc", "DetectTime": "2024-05-21T12:24:36.544168+00:00", "EventTime": "2024-05-21T12:24:36.544185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdbKa4fkBrsErXz6b"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "5c16c0ac-fa73-4c9f-9890-7889679ae41d", "DetectTime": "2024-05-21T12:24:36.548941+00:00", "EventTime": "2024-05-21T12:24:36.548958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvutz63jUTsPbZpNpl"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "6a2c63ce-b9cf-4a52-9bed-581f1ff52e37", "DetectTime": "2024-05-21T12:24:36.558659+00:00", "EventTime": "2024-05-21T12:24:36.558676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3SRxB2QR7JdAQ4vNh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 7} +{"Format": "IDEA0", "ID": "d0b3becc-d6f4-40a3-9559-db1170fd54ce", "DetectTime": "2024-05-21T12:24:36.569382+00:00", "EventTime": "2024-05-21T12:24:36.569401+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSGr533cwlpec5sz7"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "09625ffc-35db-46ca-977f-dcc5442d1e7c", "DetectTime": "2024-05-21T12:24:36.573846+00:00", "EventTime": "2024-05-21T12:24:36.573863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HsqQK4m01hyGj5k"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "1b741e0a-41fb-4504-a175-70d808784c1c", "DetectTime": "2024-05-21T12:24:36.586943+00:00", "EventTime": "2024-05-21T12:24:36.586962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSGr533cwlpec5sz7"], "accumulated_threat_level": 10.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "614f32e3-acb2-4b7e-a36a-46227705e21d", "DetectTime": "2024-05-21T12:24:36.596813+00:00", "EventTime": "2024-05-21T12:24:36.596831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCiWz4ePvgYOEVymf"], "accumulated_threat_level": 3.2, "timewindow": 7} +{"Format": "IDEA0", "ID": "d862bb7d-bbd6-433f-a2c0-dd2b247f147d", "DetectTime": "2024-05-21T12:24:36.601263+00:00", "EventTime": "2024-05-21T12:24:36.601280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpWW4Q1n6BluH5l3C1"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "3c053c8d-04fc-47bd-9a25-d966410f4ea9", "DetectTime": "2024-05-21T12:24:36.610959+00:00", "EventTime": "2024-05-21T12:24:36.610977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChhecLUgmXqUcrRza"], "accumulated_threat_level": 4.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "24043d8b-01a6-40f3-a429-43d37aa75db5", "DetectTime": "2024-05-21T12:24:36.615517+00:00", "EventTime": "2024-05-21T12:24:36.615535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7267M3lu2Xw4LEX6"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "83a2e6a9-675e-49ac-8de5-2c55effb0f95", "DetectTime": "2024-05-21T12:24:36.620112+00:00", "EventTime": "2024-05-21T12:24:36.620130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkUGM2wyHm4gSfpb"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "2dd3a1ad-6475-4acb-9e8e-dd9954f8cb8e", "DetectTime": "2024-05-21T12:24:36.631694+00:00", "EventTime": "2024-05-21T12:24:36.631714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfq073kx7Y522ffL4"], "accumulated_threat_level": 4.8, "timewindow": 7} +{"Format": "IDEA0", "ID": "2e81faa8-8e9c-4fe6-b6d7-b03816eeca66", "DetectTime": "2024-05-21T12:24:36.636596+00:00", "EventTime": "2024-05-21T12:24:36.636615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2wUYG1WIOnY9SclN7"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "634a0300-ab76-4924-b054-61f0b0cc44be", "DetectTime": "2024-05-21T12:24:36.647332+00:00", "EventTime": "2024-05-21T12:24:36.647349+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.235.129.64"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.129.64 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccuz3O1D6ecywQe2th"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "c130874e-dff4-455f-90d6-8067647415dd", "DetectTime": "2024-05-21T12:24:36.658252+00:00", "EventTime": "2024-05-21T12:24:36.658270+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.235.129.64"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.129.64 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccuz3O1D6ecywQe2th"], "accumulated_threat_level": 11.0, "timewindow": 6} +{"Format": "IDEA0", "ID": "f39df468-0fad-49c3-9af1-0bb373408f50", "DetectTime": "2024-05-21T12:24:36.670218+00:00", "EventTime": "2024-05-21T12:24:36.670240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4mRL32ihNr1AUCti"], "accumulated_threat_level": 5.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "50b838bd-5da6-4fb8-ae0d-4e4b5b0854d1", "DetectTime": "2024-05-21T12:24:36.680226+00:00", "EventTime": "2024-05-21T12:24:36.680244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZsGF2b6w9BEyEAee"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 7} +{"Format": "IDEA0", "ID": "d214134b-6121-496e-a13e-2590e560bd11", "DetectTime": "2024-05-21T12:24:36.690192+00:00", "EventTime": "2024-05-21T12:24:36.690211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "Connection to unknown destination port 7773/UDP destination IP 200.119.190.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcWYERxT0eetUUYe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "d7d7afaf-aa4b-4fff-9c96-8a9e0fd2f6ae", "DetectTime": "2024-05-21T12:24:36.701773+00:00", "EventTime": "2024-05-21T12:24:36.701795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwocS3PruftwIIKzl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "e368afe0-b525-4281-b6c4-a1c73d922dbc", "DetectTime": "2024-05-21T12:24:36.713975+00:00", "EventTime": "2024-05-21T12:24:36.713997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbHco3XaKdf4D7UBl"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "ddf9e81f-1a08-4b2c-8a77-d30e794ba4ed", "DetectTime": "2024-05-21T12:24:36.726633+00:00", "EventTime": "2024-05-21T12:24:36.726655+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbHco3XaKdf4D7UBl"], "accumulated_threat_level": 11.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "0cc29fff-b481-4e05-a905-6271867b4aba", "DetectTime": "2024-05-21T12:24:36.742659+00:00", "EventTime": "2024-05-21T12:24:36.742677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1NR2cwXqVYF4t17"], "accumulated_threat_level": 8.799999999999999, "timewindow": 7} +{"Format": "IDEA0", "ID": "18c373cb-cc64-468b-8094-5e62ebdff333", "DetectTime": "2024-05-21T12:24:36.752459+00:00", "EventTime": "2024-05-21T12:24:36.752477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmAN93sR8oBJAtMDc"], "accumulated_threat_level": 9.6, "timewindow": 7} +{"Format": "IDEA0", "ID": "4618f560-1bd1-4793-a13f-cbe05f32c681", "DetectTime": "2024-05-21T12:24:36.762200+00:00", "EventTime": "2024-05-21T12:24:36.762218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbi5vz7wvc4kcM7g"], "accumulated_threat_level": 10.4, "timewindow": 7} +{"Format": "IDEA0", "ID": "1b53c52b-e1d6-49ae-90b6-bd93e66d35fd", "DetectTime": "2024-05-21T12:24:36.918746+00:00", "EventTime": "2024-05-21T12:24:36.918767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.231.62.73 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWpka3F6AcHL2PAJg"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "dc61e6cb-6230-4e47-9a0d-a6e3fc4e91f5", "DetectTime": "2024-05-21T12:24:36.942678+00:00", "EventTime": "2024-05-21T12:24:36.942697+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["58.186.228.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 58.186.228.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CntLzm2nuZKODaJAYf"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "6cb08bf9-64a0-4a31-b0bb-836697a93d79", "DetectTime": "2024-05-21T12:24:36.953691+00:00", "EventTime": "2024-05-21T12:24:36.953709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["58.186.228.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 58.186.228.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CntLzm2nuZKODaJAYf"], "accumulated_threat_level": 12.0, "timewindow": 6} +{"Format": "Json", "ID": "6cb08bf9-64a0-4a31-b0bb-836697a93d79", "DetectTime": "2024-05-21T12:24:36.953691+00:00", "EventTime": "2024-05-21T12:24:36.953709+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["58.186.228.111"]}], "Attach": [{"Content": "1970-01-01T05:59:55.846466+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 6. (real time 2024/05/21 12:24:37.173133)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 6, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "c0352b53-a0bc-4543-a0c5-b8646bc0de1d", "DetectTime": "2024-05-21T12:24:37.177253+00:00", "EventTime": "2024-05-21T12:24:37.177270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxuo85gjdZMLWIlwg"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "19520e19-97ea-4cd0-8c5c-aa3e258503b9", "DetectTime": "2024-05-21T12:24:37.181610+00:00", "EventTime": "2024-05-21T12:24:37.181629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Wb0l3BVaE2Pzmkak"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "6adc7e29-c4e5-457a-a19a-286f560873ed", "DetectTime": "2024-05-21T12:24:37.191421+00:00", "EventTime": "2024-05-21T12:24:37.191440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUiT6jkVCd6Cpodvc"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "1f24ad63-e47e-41ac-83e8-fe4606f584b5", "DetectTime": "2024-05-21T12:24:37.203057+00:00", "EventTime": "2024-05-21T12:24:37.203080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7dyqh2ZhZyP0G7qBk"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "a524d18d-bc3b-465d-9e93-ff3cfed852bc", "DetectTime": "2024-05-21T12:24:37.207897+00:00", "EventTime": "2024-05-21T12:24:37.207917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mwIXeHk5BFm7x9f"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "24b252b6-b889-4eee-a562-e53f241c656f", "DetectTime": "2024-05-21T12:24:37.212483+00:00", "EventTime": "2024-05-21T12:24:37.212502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6py7N3HOxfYRQ1yr6"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "2402be2b-38ed-4098-923d-d88071c1c5e6", "DetectTime": "2024-05-21T12:24:37.223109+00:00", "EventTime": "2024-05-21T12:24:37.223127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.37.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.37.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjTdj4v8Jc8546Vy9"], "accumulated_threat_level": 0, "timewindow": 6} +{"Format": "IDEA0", "ID": "7f8fb96e-98cf-49d8-82a2-cdf11b51dd4c", "DetectTime": "2024-05-21T12:24:37.236439+00:00", "EventTime": "2024-05-21T12:24:37.236457+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.37.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.37.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjTdj4v8Jc8546Vy9"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "57632b13-a7c9-431a-aa2a-1d2ae2fb083c", "DetectTime": "2024-05-21T12:24:37.266908+00:00", "EventTime": "2024-05-21T12:24:37.266929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgy651YftAfz9oLd7"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "ca2009a4-6038-4eca-a51d-101b2a7a0164", "DetectTime": "2024-05-21T12:24:37.274899+00:00", "EventTime": "2024-05-21T12:24:37.274917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdaEhSwBRvVOG4z3"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "6c196f0b-926f-4762-a677-e40f451d6758", "DetectTime": "2024-05-21T12:24:37.282233+00:00", "EventTime": "2024-05-21T12:24:37.282253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZHCb12kWkqre37Zj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "65e9e841-8336-4985-9d16-cedbd62f4684", "DetectTime": "2024-05-21T12:24:37.324372+00:00", "EventTime": "2024-05-21T12:24:37.324396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFrraH2wuhBoqkvTGc"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "a84b6104-1c8d-4d07-bdb1-3f801c5935d0", "DetectTime": "2024-05-21T12:24:37.356017+00:00", "EventTime": "2024-05-21T12:24:37.356038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFUBN1Op14ICC1r26"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "fabca3ef-2da1-4a6f-b161-e46abe448e74", "DetectTime": "2024-05-21T12:24:37.370707+00:00", "EventTime": "2024-05-21T12:24:37.370729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUZwk3loTnAkOlyqd"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "f1ed9d36-00cb-4000-b561-7a9abe87eeb2", "DetectTime": "2024-05-21T12:24:37.402115+00:00", "EventTime": "2024-05-21T12:24:37.402137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFublw3iEHrmvPL458"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "2825e4cf-6ea8-4c91-a807-c70c42a5c655", "DetectTime": "2024-05-21T12:24:37.419321+00:00", "EventTime": "2024-05-21T12:24:37.419342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56b011uHBRd5YavBl"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "823516b3-d6e8-4eed-a5e7-b40cf8f64167", "DetectTime": "2024-05-21T12:24:37.441172+00:00", "EventTime": "2024-05-21T12:24:37.441194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMfoc2M2ooCQxBKw8"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "7431c5c8-3f77-4be2-9f93-a0ad5777ef7d", "DetectTime": "2024-05-21T12:24:37.475340+00:00", "EventTime": "2024-05-21T12:24:37.475362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDWoT2BykWzxemmqd"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "4f5650f1-64f7-4ff0-b626-a14751b423a6", "DetectTime": "2024-05-21T12:24:37.494448+00:00", "EventTime": "2024-05-21T12:24:37.494470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpcy13i5DgP359rd5"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "a918810e-12eb-4037-9921-716776b801dc", "DetectTime": "2024-05-21T12:24:37.529985+00:00", "EventTime": "2024-05-21T12:24:37.530007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2pBZwt9IqaglMX4"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "541be70a-0986-4b55-bbd0-27c0525e3ff9", "DetectTime": "2024-05-21T12:24:37.535588+00:00", "EventTime": "2024-05-21T12:24:37.535607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5AlgN2qsGFkRb2kr4", "Crr91Y1rxAAt9ojRAb", "CMJNWw2bb9m95n4aB9", "CsPpSZ2fmMHjldKsZd"], "accumulated_threat_level": 0.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "61059ecd-2f6f-4b8a-bef4-2b40c21fcb61", "DetectTime": "2024-05-21T12:24:37.551707+00:00", "EventTime": "2024-05-21T12:24:37.551725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2dIc1481rgRby7SOd"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "8e24f958-2da0-4733-8b5c-c94eb46dca62", "DetectTime": "2024-05-21T12:24:37.577607+00:00", "EventTime": "2024-05-21T12:24:37.577626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6in31DX1TlIVQsRj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "37934dc4-83cc-42bc-be79-24598b6a0fce", "DetectTime": "2024-05-21T12:24:37.603429+00:00", "EventTime": "2024-05-21T12:24:37.603451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDKza1bmEprN5ALg"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "13e9ad20-3159-418b-bad9-05f50915eb13", "DetectTime": "2024-05-21T12:24:37.631976+00:00", "EventTime": "2024-05-21T12:24:37.631998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJ5lf4RPo808q324h"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "1d477346-b994-47f6-9b03-e8c1e10c25dd", "DetectTime": "2024-05-21T12:24:37.653369+00:00", "EventTime": "2024-05-21T12:24:37.653391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6pCM71Bv6zC1gwV21"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "68459cde-cd06-4a28-8c21-f8a6167ed1e6", "DetectTime": "2024-05-21T12:24:37.675379+00:00", "EventTime": "2024-05-21T12:24:37.675399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrkN91MCtV8boQXyb"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "39de3679-a11a-49e0-b07f-b6e8ca8fe92d", "DetectTime": "2024-05-21T12:24:37.711220+00:00", "EventTime": "2024-05-21T12:24:37.711238+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.90.81.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.90.81.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1qto30Hyn0UMomki"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "eff69f8a-c7b9-4d37-b132-33070af9c59d", "DetectTime": "2024-05-21T12:24:37.715814+00:00", "EventTime": "2024-05-21T12:24:37.715832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzS9WY2jOOdFpgc0Yl"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "82a3db55-99e7-4592-a863-968a7c6f8b2e", "DetectTime": "2024-05-21T12:24:37.727279+00:00", "EventTime": "2024-05-21T12:24:37.727298+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.90.81.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.90.81.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1qto30Hyn0UMomki"], "accumulated_threat_level": 10.9, "timewindow": 7} +{"Format": "IDEA0", "ID": "e5625747-ce71-4b4f-a5f0-51c00cce47c2", "DetectTime": "2024-05-21T12:24:37.821337+00:00", "EventTime": "2024-05-21T12:24:37.821356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YDq42bf15eHqH278"], "accumulated_threat_level": 1.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "47303c29-7f04-43f5-b0d3-dd028aaad0f4", "DetectTime": "2024-05-21T12:24:37.851366+00:00", "EventTime": "2024-05-21T12:24:37.851386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZGie1Im62nHni064"], "accumulated_threat_level": 2.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "88a20cdc-53ca-40d0-b8b3-6762350aa806", "DetectTime": "2024-05-21T12:24:37.871828+00:00", "EventTime": "2024-05-21T12:24:37.871846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbUyA4Wygf8gfj8q7"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 8} +{"Format": "IDEA0", "ID": "99f7b411-15b9-48f9-8d4b-aa8728619b4f", "DetectTime": "2024-05-21T12:24:37.886330+00:00", "EventTime": "2024-05-21T12:24:37.886350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqi9lH2A2J2n5rM7Tc"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "6ab1f2c0-5233-4847-9f6f-aacc0698edd4", "DetectTime": "2024-05-21T12:24:37.909141+00:00", "EventTime": "2024-05-21T12:24:37.909159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chbo9i1nA4CyDqwvue"], "accumulated_threat_level": 3.7, "timewindow": 8} +{"Format": "IDEA0", "ID": "43e68c8a-da0c-4686-adb0-8c716636ede0", "DetectTime": "2024-05-21T12:24:37.927668+00:00", "EventTime": "2024-05-21T12:24:37.927687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZNFwu2BcE81fXVAb4"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "0931a8b1-85ed-4a2c-bd8f-2dfc813f3a28", "DetectTime": "2024-05-21T12:24:37.941553+00:00", "EventTime": "2024-05-21T12:24:37.941571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPn17k4YH9HO6k94Kf"], "accumulated_threat_level": 4.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "7600f91c-5e92-44bd-bd20-fc60b61c9e09", "DetectTime": "2024-05-21T12:24:37.957750+00:00", "EventTime": "2024-05-21T12:24:37.957770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OPRx4lO9rp0fP8ce"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "4af196b0-6f36-48b1-b085-c9fc7e705667", "DetectTime": "2024-05-21T12:24:37.971436+00:00", "EventTime": "2024-05-21T12:24:37.971455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvFkP1ZE4gxDpaVdc"], "accumulated_threat_level": 5.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "c74944d7-5cd0-4929-896b-ddf17b362f42", "DetectTime": "2024-05-21T12:24:37.997435+00:00", "EventTime": "2024-05-21T12:24:37.997454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6bhn1FnBlzUzeEad"], "accumulated_threat_level": 6.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "c46c61a7-567c-4a7a-981f-3e492c7516c5", "DetectTime": "2024-05-21T12:24:38.008547+00:00", "EventTime": "2024-05-21T12:24:38.008567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.244.107.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.244.107.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhfsX6mdebMWXXlg"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "f7adccdd-a5f8-4010-9107-9be21a7b99a6", "DetectTime": "2024-05-21T12:24:38.020594+00:00", "EventTime": "2024-05-21T12:24:38.020615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.244.107.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.244.107.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhfsX6mdebMWXXlg"], "accumulated_threat_level": 11.4, "timewindow": 7} +{"Format": "IDEA0", "ID": "4617bb5b-c3c3-496a-a888-d6640c4811a8", "DetectTime": "2024-05-21T12:24:38.025552+00:00", "EventTime": "2024-05-21T12:24:38.025570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2DdE3RiP2QA6MySj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "d352ad15-3535-4a0d-88c5-60fd809ca04e", "DetectTime": "2024-05-21T12:24:38.029965+00:00", "EventTime": "2024-05-21T12:24:38.029982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtuBdE1BqssmpE3vQ9"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 3} +{"Format": "IDEA0", "ID": "38f528e0-be68-48a6-8639-ac4f7edd180a", "DetectTime": "2024-05-21T12:24:38.039954+00:00", "EventTime": "2024-05-21T12:24:38.039972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDaxc3oTrSp7wLFV3"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 8} +{"Format": "IDEA0", "ID": "65c25e7d-5616-4a95-be11-772afbd5fb7e", "DetectTime": "2024-05-21T12:24:38.052045+00:00", "EventTime": "2024-05-21T12:24:38.052064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeN53H8X5BwqJOxSj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "02020e0f-ca8e-4536-a47a-e5267ef52b99", "DetectTime": "2024-05-21T12:24:38.071042+00:00", "EventTime": "2024-05-21T12:24:38.071059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4OjjTyengA2hKHb"], "accumulated_threat_level": 8.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "3c6febdd-6683-4592-a460-20d632f99d17", "DetectTime": "2024-05-21T12:24:38.082642+00:00", "EventTime": "2024-05-21T12:24:38.082660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7XLKJa2wbompdqu2"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "0913d64a-b215-434e-9d8b-f37ee0fd07fb", "DetectTime": "2024-05-21T12:24:38.099607+00:00", "EventTime": "2024-05-21T12:24:38.099627+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjEwZ91iaGuJjTtYEe"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "f21ae4b3-d6ba-40ec-972f-35865299d51e", "DetectTime": "2024-05-21T12:24:38.109583+00:00", "EventTime": "2024-05-21T12:24:38.109601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwIMEJ311U4iATJdwb"], "accumulated_threat_level": 9.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "02b1b9a4-90b7-4d96-a777-c28e5288f4a7", "DetectTime": "2024-05-21T12:24:38.119883+00:00", "EventTime": "2024-05-21T12:24:38.119901+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjEwZ91iaGuJjTtYEe"], "accumulated_threat_level": 11.9, "timewindow": 7} +{"Format": "IDEA0", "ID": "841d77f8-9910-43be-b82b-f851cac69c2d", "DetectTime": "2024-05-21T12:24:38.130809+00:00", "EventTime": "2024-05-21T12:24:38.130827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmqX8y13JHtlYYM45c"], "accumulated_threat_level": 10.100000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "48202893-78f6-4243-abb1-ec9d2b2fd142", "DetectTime": "2024-05-21T12:24:38.142309+00:00", "EventTime": "2024-05-21T12:24:38.142326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBxvn9m2a8bfn0ce"], "accumulated_threat_level": 10.900000000000002, "timewindow": 8} +{"Format": "IDEA0", "ID": "bef6df64-a7c1-4d94-90d5-b6efddb65fc1", "DetectTime": "2024-05-21T12:24:38.174067+00:00", "EventTime": "2024-05-21T12:24:38.174085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ75Pi3PbKlfsYQC6b"], "accumulated_threat_level": 11.700000000000003, "timewindow": 8} +{"Format": "IDEA0", "ID": "01800d67-a925-4681-9751-6b03f7314fbb", "DetectTime": "2024-05-21T12:24:38.197237+00:00", "EventTime": "2024-05-21T12:24:38.197259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7XtW81rUbjHMLP5x5"], "accumulated_threat_level": 12.500000000000004, "timewindow": 8} +{"Format": "Json", "ID": "01800d67-a925-4681-9751-6b03f7314fbb", "DetectTime": "2024-05-21T12:24:38.197237+00:00", "EventTime": "2024-05-21T12:24:38.197259+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "1970-01-01T07:04:15.073535+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:38.378537)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "8a3667db-33a5-41dd-a31b-b315e94e3198", "DetectTime": "2024-05-21T12:24:38.388555+00:00", "EventTime": "2024-05-21T12:24:38.388574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAxZi5KHTx0Cen52"], "accumulated_threat_level": 0.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "5330483c-e1c0-4b86-a792-90a04253df3b", "DetectTime": "2024-05-21T12:24:38.399974+00:00", "EventTime": "2024-05-21T12:24:38.399993+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.119.190.39"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPv71a0qqt4RnTcQ6"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "7ba89b83-5143-4e8f-b805-63764a29858b", "DetectTime": "2024-05-21T12:24:38.412019+00:00", "EventTime": "2024-05-21T12:24:38.412041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPv71a0qqt4RnTcQ6"], "accumulated_threat_level": 12.4, "timewindow": 7} +{"Format": "Json", "ID": "7ba89b83-5143-4e8f-b805-63764a29858b", "DetectTime": "2024-05-21T12:24:38.412019+00:00", "EventTime": "2024-05-21T12:24:38.412041+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "1970-01-01T06:00:36.348245+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2024/05/21 12:24:38.616745)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.4, "timewindow": 7, "profileid": "profile_10.0.2.19", "threat_level": 12.4} +{"Format": "IDEA0", "ID": "77624bad-10e1-4a62-874f-292008171674", "DetectTime": "2024-05-21T12:24:38.628907+00:00", "EventTime": "2024-05-21T12:24:38.628929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Mu4t4gr2X4M9wb6"], "accumulated_threat_level": 1.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "b951efaa-dc9a-40b1-9112-cc6047854f8d", "DetectTime": "2024-05-21T12:24:38.639185+00:00", "EventTime": "2024-05-21T12:24:38.639204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOWl81hOM4MyKXmK7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 8} +{"Format": "IDEA0", "ID": "a6fbe3f5-4add-4dc0-b08d-69d09569dbec", "DetectTime": "2024-05-21T12:24:38.649201+00:00", "EventTime": "2024-05-21T12:24:38.649220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqQIUKO3bgDE2ov5"], "accumulated_threat_level": 3.2, "timewindow": 8} +{"Format": "IDEA0", "ID": "331bde65-81c4-4445-acb4-fa0ad7e7ff99", "DetectTime": "2024-05-21T12:24:38.659539+00:00", "EventTime": "2024-05-21T12:24:38.659557+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8nO32eUkCMDhdg13"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "d6e46be5-5c5d-404c-ba79-56a21c9d8035", "DetectTime": "2024-05-21T12:24:38.671198+00:00", "EventTime": "2024-05-21T12:24:38.671216+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8nO32eUkCMDhdg13"], "accumulated_threat_level": 0.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "7f67ea9b-cbba-4ae0-9d4b-296a10c01e51", "DetectTime": "2024-05-21T12:24:38.680929+00:00", "EventTime": "2024-05-21T12:24:38.680947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuItAj1fKMa3LOE2Q4"], "accumulated_threat_level": 4.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "f887676c-91ab-459e-8f7f-7d659219e0b9", "DetectTime": "2024-05-21T12:24:38.686055+00:00", "EventTime": "2024-05-21T12:24:38.686074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.91.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTALHQ3z2MKXBi4vSd"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "fb1d147e-f202-4b82-bee6-3da569db7143", "DetectTime": "2024-05-21T12:24:38.696306+00:00", "EventTime": "2024-05-21T12:24:38.696328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBtEM1oEFHggPjYqb"], "accumulated_threat_level": 4.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "3daab452-073c-4e69-90f8-960a8a5f06a3", "DetectTime": "2024-05-21T12:24:38.701467+00:00", "EventTime": "2024-05-21T12:24:38.701489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwzUD1TLIM3kHm9s1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "d95e3160-5f9a-437d-98a4-d05cd545cf73", "DetectTime": "2024-05-21T12:24:38.706610+00:00", "EventTime": "2024-05-21T12:24:38.706632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53S0U22zJh531rSZc"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "f0c441d6-5e65-48f7-bb39-88d87bfa09f9", "DetectTime": "2024-05-21T12:24:38.717688+00:00", "EventTime": "2024-05-21T12:24:38.717709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGr4NEXt4LhLkYFSh"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "7fcd09bc-8508-4100-b942-e3d3ecaae716", "DetectTime": "2024-05-21T12:24:38.722606+00:00", "EventTime": "2024-05-21T12:24:38.722624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQhhSW3rektsRMgMv1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "c09e2391-33ec-4a15-b829-5747c662d89f", "DetectTime": "2024-05-21T12:24:38.848215+00:00", "EventTime": "2024-05-21T12:24:38.848238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDoazj3setCxiSEUn7"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "be53defc-f378-4925-af45-4ea84c47157b", "DetectTime": "2024-05-21T12:24:38.949474+00:00", "EventTime": "2024-05-21T12:24:38.949494+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["103.1.28.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 103.1.28.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9otl2WrfzNOuUEVc"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "1cf54130-1a57-445a-bc6f-875c1b941e5f", "DetectTime": "2024-05-21T12:24:38.961824+00:00", "EventTime": "2024-05-21T12:24:38.961841+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["103.1.28.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 103.1.28.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9otl2WrfzNOuUEVc"], "accumulated_threat_level": 1.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "96edcf46-ead7-45b8-912c-f7a26203df3d", "DetectTime": "2024-05-21T12:24:38.966132+00:00", "EventTime": "2024-05-21T12:24:38.966148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIJAQ3os0JXnwX8te"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "c334fb78-6a22-4ce6-9d7c-cef4af02f735", "DetectTime": "2024-05-21T12:24:38.970576+00:00", "EventTime": "2024-05-21T12:24:38.970598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgctnGBgz6pc0W0d"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "d3948596-e571-41a2-b502-6fecf8d3443d", "DetectTime": "2024-05-21T12:24:38.981039+00:00", "EventTime": "2024-05-21T12:24:38.981057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPacR24K2HNk9jy149"], "accumulated_threat_level": 5.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "016ef340-503c-4ffa-8d95-bd6f1e2a6d5a", "DetectTime": "2024-05-21T12:24:38.985486+00:00", "EventTime": "2024-05-21T12:24:38.985504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kcmr2jBuladXqwp8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "4c2076d8-eacf-41d5-926b-3f572906fba3", "DetectTime": "2024-05-21T12:24:39.003737+00:00", "EventTime": "2024-05-21T12:24:39.003754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21A4e3jDnQjDrbSQd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 8} +{"Format": "IDEA0", "ID": "7f5e7a5d-88e8-4108-a319-92c2610dad9a", "DetectTime": "2024-05-21T12:24:39.013037+00:00", "EventTime": "2024-05-21T12:24:39.013057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQnWVZqRfBSfgS9h"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "1b1db8d7-52c3-4907-92c7-b27ce3e66b62", "DetectTime": "2024-05-21T12:24:39.026223+00:00", "EventTime": "2024-05-21T12:24:39.026242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1AV73Mrt6rcuTrk5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "d42ec7ee-cd2c-4f11-ab8f-10b67376b484", "DetectTime": "2024-05-21T12:24:39.050526+00:00", "EventTime": "2024-05-21T12:24:39.050546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RUhN2Z73iZJz1H15"], "accumulated_threat_level": 7.999999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "c1af8a5b-71da-42b1-a538-d32457c86090", "DetectTime": "2024-05-21T12:24:39.055048+00:00", "EventTime": "2024-05-21T12:24:39.055067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqiCUw2NSQns5IcEr8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "beaa486e-dbf1-4c27-a61e-930a15255abf", "DetectTime": "2024-05-21T12:24:39.073059+00:00", "EventTime": "2024-05-21T12:24:39.073079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkImeB1YxVo9TWIHG1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "0f6a3c7e-3fe2-429f-9eb5-8b5e66d8800f", "DetectTime": "2024-05-21T12:24:39.084791+00:00", "EventTime": "2024-05-21T12:24:39.084814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdsdpu1oohfaY2aeV6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "b1a89e7f-a942-4e2a-9cd3-d193aa1208f8", "DetectTime": "2024-05-21T12:24:39.096783+00:00", "EventTime": "2024-05-21T12:24:39.096803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44q5t1eSEJ609vsJj"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "19240158-e66f-4447-a0e8-2ef671c82f27", "DetectTime": "2024-05-21T12:24:39.110700+00:00", "EventTime": "2024-05-21T12:24:39.110723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbVuz4gdzs0UQkSa4"], "accumulated_threat_level": 9.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "c4218f61-d4dd-4deb-9605-236792c0c6db", "DetectTime": "2024-05-21T12:24:39.120486+00:00", "EventTime": "2024-05-21T12:24:39.120506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPulv3gjZCQvr6lwg"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "497b7530-3981-4a14-9614-63365d9acc8e", "DetectTime": "2024-05-21T12:24:39.136626+00:00", "EventTime": "2024-05-21T12:24:39.136647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJWYb1qXXMpbWTVc7"], "accumulated_threat_level": 10.4, "timewindow": 8} +{"Format": "IDEA0", "ID": "5af03043-be8b-4ba3-8a0d-43e6b8b25156", "DetectTime": "2024-05-21T12:24:39.144906+00:00", "EventTime": "2024-05-21T12:24:39.144927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZbh33ENZEhqqucj1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "1f17e2a2-45eb-48e6-a677-fcb48ee7c490", "DetectTime": "2024-05-21T12:24:39.172132+00:00", "EventTime": "2024-05-21T12:24:39.172151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGwYj4UVZQ1LHSMp7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "e58fa53b-c977-4eb2-9dc5-33531d0c0103", "DetectTime": "2024-05-21T12:24:39.176834+00:00", "EventTime": "2024-05-21T12:24:39.176851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1syYb4XTcFJIrnRYf"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "431e4be1-dfd1-4e6a-a42c-9c4c9de15401", "DetectTime": "2024-05-21T12:24:39.187246+00:00", "EventTime": "2024-05-21T12:24:39.187264+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.183.230.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.183.230.102 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZbI92GoElH8qmG9e"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "cb9fb25f-ddbd-4d63-b68d-651621044b5e", "DetectTime": "2024-05-21T12:24:39.199421+00:00", "EventTime": "2024-05-21T12:24:39.199450+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.183.230.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.183.230.102 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZbI92GoElH8qmG9e"], "accumulated_threat_level": 1.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "9aec6c07-2e5f-419b-9cc6-ef2db5380d20", "DetectTime": "2024-05-21T12:24:39.205031+00:00", "EventTime": "2024-05-21T12:24:39.205049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuOtJ23KWihJfWGui"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "9d3e4748-7b8e-430c-99de-493f93d45e87", "DetectTime": "2024-05-21T12:24:39.220602+00:00", "EventTime": "2024-05-21T12:24:39.220623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjoyYk4g92sqk4PT7b"], "accumulated_threat_level": 12.000000000000002, "timewindow": 8} +{"Format": "Json", "ID": "9d3e4748-7b8e-430c-99de-493f93d45e87", "DetectTime": "2024-05-21T12:24:39.220602+00:00", "EventTime": "2024-05-21T12:24:39.220623+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "1970-01-01T07:04:39.376119+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:39.390315)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bca053bc-fe1d-4422-ac57-da78d253bedb", "DetectTime": "2024-05-21T12:24:39.415549+00:00", "EventTime": "2024-05-21T12:24:39.415567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjjaAX3vOhV4LtOzjl"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "a733a6b4-3782-41b9-8673-a95ffd3171f1", "DetectTime": "2024-05-21T12:24:39.426960+00:00", "EventTime": "2024-05-21T12:24:39.426978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjjaAX3vOhV4LtOzjl"], "accumulated_threat_level": 2.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "fa3281a5-fb08-45ba-a58d-4718d62af4de", "DetectTime": "2024-05-21T12:24:39.436719+00:00", "EventTime": "2024-05-21T12:24:39.436737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOrbd4bmntJKG70li"], "accumulated_threat_level": 0.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "7adaa185-aa58-42d7-b89e-c7a87e122b01", "DetectTime": "2024-05-21T12:24:39.465420+00:00", "EventTime": "2024-05-21T12:24:39.465440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 29634/UDP destination IP 113.165.116.48. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBE0VCoTsEWfZ5kQd"], "accumulated_threat_level": 1.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "a3dd0c33-1146-49d2-af2a-1be613ff11d7", "DetectTime": "2024-05-21T12:24:39.482564+00:00", "EventTime": "2024-05-21T12:24:39.482583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHHP1I1xthxefch1a2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 8} +{"Format": "IDEA0", "ID": "33b8a432-f763-455e-bb61-b36a30db567e", "DetectTime": "2024-05-21T12:24:39.515153+00:00", "EventTime": "2024-05-21T12:24:39.515171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJmeo1SjrjcZ8XGr7"], "accumulated_threat_level": 3.2, "timewindow": 8} +{"Format": "IDEA0", "ID": "491734fa-67cd-4a54-aa17-d2041b30ba62", "DetectTime": "2024-05-21T12:24:39.539837+00:00", "EventTime": "2024-05-21T12:24:39.539860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfD7n2nKtVfYiTsxf"], "accumulated_threat_level": 4.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b862dbb5-fb02-49db-b521-b723f73eacfd", "DetectTime": "2024-05-21T12:24:39.544479+00:00", "EventTime": "2024-05-21T12:24:39.544496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8bN63kLSSs4jBjk9"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "301337e1-e1da-4faf-a4fb-03376d9903af", "DetectTime": "2024-05-21T12:24:39.567006+00:00", "EventTime": "2024-05-21T12:24:39.567024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cad8qt2Cnmi2DXNkf2"], "accumulated_threat_level": 4.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "4dac6d55-9346-4c66-abec-47ee615aab27", "DetectTime": "2024-05-21T12:24:39.585772+00:00", "EventTime": "2024-05-21T12:24:39.585794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOH0Eo5mvV86Cbsk"], "accumulated_threat_level": 5.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "cba2b077-33e1-46ad-8aca-4555832c95d5", "DetectTime": "2024-05-21T12:24:39.616693+00:00", "EventTime": "2024-05-21T12:24:39.616711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87vGq20rDxVJaWkJh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 8} +{"Format": "IDEA0", "ID": "151d64bf-c166-4ec4-81a6-fd8af847586e", "DetectTime": "2024-05-21T12:24:39.649882+00:00", "EventTime": "2024-05-21T12:24:39.649901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwQ39d4cIAP58W2uke"], "accumulated_threat_level": 7.199999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "bcd50f4b-26e8-41c6-98eb-77fdd79bcafa", "DetectTime": "2024-05-21T12:24:39.671303+00:00", "EventTime": "2024-05-21T12:24:39.671323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGYkD34IUsZQ1aIe2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "e897ec93-02bb-439f-99f4-e543df6e50db", "DetectTime": "2024-05-21T12:24:39.680737+00:00", "EventTime": "2024-05-21T12:24:39.680755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4HkR337jWCLXw3eij"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "0ea93ca2-bf7c-45cb-8c30-12440bb89589", "DetectTime": "2024-05-21T12:24:39.697857+00:00", "EventTime": "2024-05-21T12:24:39.697879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNNh702EnCtZo5rKCl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "61761bde-9ca3-475c-a9b6-1d1f336245ca", "DetectTime": "2024-05-21T12:24:39.719123+00:00", "EventTime": "2024-05-21T12:24:39.719144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgG0LF4huUdpyh8lN1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "667e17b1-50ab-4394-b7fd-e6b330f583dd", "DetectTime": "2024-05-21T12:24:39.740070+00:00", "EventTime": "2024-05-21T12:24:39.740090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxfHcD4y7xN0Gf8DP2"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "2633abf9-3695-4759-aa19-23dd41d86c14", "DetectTime": "2024-05-21T12:24:39.768282+00:00", "EventTime": "2024-05-21T12:24:39.768302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSzMnx1SRb398AhyZ"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "c1c8a3c7-f3d7-4387-ace9-67199e527105", "DetectTime": "2024-05-21T12:24:39.784769+00:00", "EventTime": "2024-05-21T12:24:39.784788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TNVs1MRKFDSgYK8b"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "94bb5acb-4597-4a75-93c7-0e6355f3af95", "DetectTime": "2024-05-21T12:24:39.803052+00:00", "EventTime": "2024-05-21T12:24:39.803070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVRCI1wzPdhKMZbE"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "d1209840-a353-480e-8d61-807c4032787f", "DetectTime": "2024-05-21T12:24:39.825836+00:00", "EventTime": "2024-05-21T12:24:39.825855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvEZ715gqnDIFuigg"], "accumulated_threat_level": 9.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "befcce22-43dc-41a6-a67d-18c904abfd4c", "DetectTime": "2024-05-21T12:24:39.830911+00:00", "EventTime": "2024-05-21T12:24:39.830929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3RuV2jhfSsr4L0gi"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "7cec5d08-d156-4bd6-977f-6faba23aa9d6", "DetectTime": "2024-05-21T12:24:39.842686+00:00", "EventTime": "2024-05-21T12:24:39.842704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLjEl2oU4ZX4M2lkg"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "b5366709-3ab7-48ad-a63a-dd1dc57c4c1b", "DetectTime": "2024-05-21T12:24:39.858658+00:00", "EventTime": "2024-05-21T12:24:39.858679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIrI630wFOUxYzTR1"], "accumulated_threat_level": 10.4, "timewindow": 8} +{"Format": "IDEA0", "ID": "d552f279-df4f-476f-b524-a97d0a659c3a", "DetectTime": "2024-05-21T12:24:39.873638+00:00", "EventTime": "2024-05-21T12:24:39.873660+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35iMf3fuxoRnlgKg3"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "7a54ff4e-0d95-4f01-8a88-f6b42ae858ba", "DetectTime": "2024-05-21T12:24:39.885612+00:00", "EventTime": "2024-05-21T12:24:39.885632+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35iMf3fuxoRnlgKg3"], "accumulated_threat_level": 2.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "6f4f5b91-a3ae-423b-b50e-71743bf17975", "DetectTime": "2024-05-21T12:24:39.890333+00:00", "EventTime": "2024-05-21T12:24:39.890352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2m1002tolntEILQAk"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "603d36c7-0cba-4783-944f-1921cb5c7ed2", "DetectTime": "2024-05-21T12:24:39.894989+00:00", "EventTime": "2024-05-21T12:24:39.895007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jfdJ1vPXO7aFtyX3"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "8fcf6b70-1307-4841-a886-1055a667d3ef", "DetectTime": "2024-05-21T12:24:39.904760+00:00", "EventTime": "2024-05-21T12:24:39.904779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGERh4B62vJCvU6oe"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "ee9f51f8-4d90-4884-9ae1-9e0a030a71b8", "DetectTime": "2024-05-21T12:24:39.923566+00:00", "EventTime": "2024-05-21T12:24:39.923589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLTeP1StWB733ZRt3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "39310ca9-6cd5-4b2b-a318-d79153bec669", "DetectTime": "2024-05-21T12:24:40.071822+00:00", "EventTime": "2024-05-21T12:24:40.071840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfkqc1dMkUCkKxnH3"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "7afdda94-263f-43de-bfd8-7131dce77170", "DetectTime": "2024-05-21T12:24:40.085284+00:00", "EventTime": "2024-05-21T12:24:40.085302+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfkqc1dMkUCkKxnH3"], "accumulated_threat_level": 3.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "be3fe60c-613d-40b9-a52f-daa9080f5e6a", "DetectTime": "2024-05-21T12:24:40.097819+00:00", "EventTime": "2024-05-21T12:24:40.097837+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70NBU2paDd6mSjerh"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "a499489e-a7f4-4b43-86f2-acdd6b241a27", "DetectTime": "2024-05-21T12:24:40.108603+00:00", "EventTime": "2024-05-21T12:24:40.108621+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70NBU2paDd6mSjerh"], "accumulated_threat_level": 3.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "26289c10-fcf8-4b05-aa8c-db58cd7200e2", "DetectTime": "2024-05-21T12:24:40.155752+00:00", "EventTime": "2024-05-21T12:24:40.155769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqM6nRh50Jmq1CNUd", "C64t0QeRtKlI1OGN7", "CqZU9q1U7gBkqumLl", "CSo2TK3GzLdwo6teh2"], "accumulated_threat_level": 11.700000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "d0f9e216-c55d-4a1a-9c66-d57bd64e8192", "DetectTime": "2024-05-21T12:24:40.170774+00:00", "EventTime": "2024-05-21T12:24:40.170793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIZrdsj2hgLa2eEz8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "eb3ad1b0-2bfa-4d08-b1d4-bd051cd96865", "DetectTime": "2024-05-21T12:24:40.197053+00:00", "EventTime": "2024-05-21T12:24:40.197076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.68.90.31 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a5Ql4JsQGEoxZNb9"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "eb2d62cb-8385-4b13-8573-19fbbd45d92b", "DetectTime": "2024-05-21T12:24:40.202347+00:00", "EventTime": "2024-05-21T12:24:40.202369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEjL3okE9KKKiEnj"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "09269167-8c26-4364-ad9f-73f603ddefc4", "DetectTime": "2024-05-21T12:24:40.207048+00:00", "EventTime": "2024-05-21T12:24:40.207066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2Qeg1ecarRExE9dl"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "5d08be12-40e1-44ea-b120-adfc7169eb66", "DetectTime": "2024-05-21T12:24:40.224151+00:00", "EventTime": "2024-05-21T12:24:40.224173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLF5u3k2z69sXkGlj"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "7b448460-0e42-46ce-b9d6-821d46157dc7", "DetectTime": "2024-05-21T12:24:40.235610+00:00", "EventTime": "2024-05-21T12:24:40.235630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKDcPS4b4JR6aJeg"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "5a538ccf-fed7-44ad-b772-af68239bd77b", "DetectTime": "2024-05-21T12:24:40.263894+00:00", "EventTime": "2024-05-21T12:24:40.263913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYV0Q6KIYnjKtNm9"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "1c451558-422b-4bde-a517-964d4361d5a4", "DetectTime": "2024-05-21T12:24:40.288954+00:00", "EventTime": "2024-05-21T12:24:40.288973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYkvd2CQCbsNMhzF5"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "2eb04915-d9b4-44c9-86cd-be064100f18a", "DetectTime": "2024-05-21T12:24:40.327263+00:00", "EventTime": "2024-05-21T12:24:40.327283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfL3JS1lG79QCtmN0k"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "9203b5b2-823f-47e5-b7d8-6f9fd83a7f5e", "DetectTime": "2024-05-21T12:24:40.400260+00:00", "EventTime": "2024-05-21T12:24:40.400281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGF2AC3CHDV9n9KkY"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "05e3959b-6af7-4320-ad6b-329e40aca811", "DetectTime": "2024-05-21T12:24:40.405840+00:00", "EventTime": "2024-05-21T12:24:40.405859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTACcG3WDHf4tQcfr6"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "0635300e-9e73-499a-a374-ebf53c3c052f", "DetectTime": "2024-05-21T12:24:40.418018+00:00", "EventTime": "2024-05-21T12:24:40.418036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLgJo1Jnx1uVL9Pj"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "acfad757-f9bf-4cdc-912b-20ef2cbfbf34", "DetectTime": "2024-05-21T12:24:40.432606+00:00", "EventTime": "2024-05-21T12:24:40.432624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UTSd4Z3ZAaJvvaw"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "34615600-dd37-41c7-989d-a14bdd0b8541", "DetectTime": "2024-05-21T12:24:40.443284+00:00", "EventTime": "2024-05-21T12:24:40.443304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE2XKH1lFuvkjPKwfd"], "accumulated_threat_level": 12.500000000000002, "timewindow": 8} +{"Format": "Json", "ID": "34615600-dd37-41c7-989d-a14bdd0b8541", "DetectTime": "2024-05-21T12:24:40.443284+00:00", "EventTime": "2024-05-21T12:24:40.443304+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-01T07:35:30.488586+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:40.620711)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "15588963-62a5-4cdd-8ea5-d10b9756edb8", "DetectTime": "2024-05-21T12:24:40.625245+00:00", "EventTime": "2024-05-21T12:24:40.625263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiWSF1sSZVbrW9bOl"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "3b3eee57-0524-4f65-bd7d-5afadf3d7540", "DetectTime": "2024-05-21T12:24:40.629731+00:00", "EventTime": "2024-05-21T12:24:40.629750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGPxKoFUzYgaRnOj"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "d7a74633-90cb-4d0a-9019-afc1698791cc", "DetectTime": "2024-05-21T12:24:40.634777+00:00", "EventTime": "2024-05-21T12:24:40.634796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTrg1D52phylaABh"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "4ea887af-b176-41c2-82bd-e2da5d41f1d7", "DetectTime": "2024-05-21T12:24:40.639318+00:00", "EventTime": "2024-05-21T12:24:40.639337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0RUMq3WPutycA4LZg"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "58d06837-fe98-4ea3-ac95-015bd71607a9", "DetectTime": "2024-05-21T12:24:40.649422+00:00", "EventTime": "2024-05-21T12:24:40.649441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaoFaa4mdQb9meitfk"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "554ad704-07ee-4c2e-9037-9d8cac9ae303", "DetectTime": "2024-05-21T12:24:40.653812+00:00", "EventTime": "2024-05-21T12:24:40.653830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQRA71Vk8BoJif3d1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "076edde6-cd18-462b-b7c5-27f4738d3c3b", "DetectTime": "2024-05-21T12:24:40.658191+00:00", "EventTime": "2024-05-21T12:24:40.658210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19iPj1AYanYPVlrNe"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "e8bbddb4-4cb1-4171-9889-6d6652869cf8", "DetectTime": "2024-05-21T12:24:40.669167+00:00", "EventTime": "2024-05-21T12:24:40.669184+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwbApqrZv0vKi7Q3"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "b6bc8c14-0ca1-4f9e-ab14-fadf27af4560", "DetectTime": "2024-05-21T12:24:40.679887+00:00", "EventTime": "2024-05-21T12:24:40.679905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwbApqrZv0vKi7Q3"], "accumulated_threat_level": 4.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "2e7434c0-95c5-4a95-a153-b467fcdf9668", "DetectTime": "2024-05-21T12:24:40.684295+00:00", "EventTime": "2024-05-21T12:24:40.684311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXYxEC3EOVxElUdBm1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "f8fd3de8-8d2d-4b79-808d-945499e52a45", "DetectTime": "2024-05-21T12:24:40.688485+00:00", "EventTime": "2024-05-21T12:24:40.688502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9wiE1qMSIXsG50Rc"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "667b5525-cb61-4481-9d13-a789487a8d1b", "DetectTime": "2024-05-21T12:24:40.692848+00:00", "EventTime": "2024-05-21T12:24:40.692866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwXUl39AwwkGDhvs8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "9d06e8c8-8350-417d-af4e-a4c88f85c7c3", "DetectTime": "2024-05-21T12:24:40.716465+00:00", "EventTime": "2024-05-21T12:24:40.716482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tFFP3pyu8rmZaDJi"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "8dfd9151-cd3f-464b-981b-ea2bf8b98f5e", "DetectTime": "2024-05-21T12:24:40.746985+00:00", "EventTime": "2024-05-21T12:24:40.747006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CplkAI2uMxtvB40RN8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "86a4507b-f012-4e61-8f19-2f687e2886ce", "DetectTime": "2024-05-21T12:24:40.765022+00:00", "EventTime": "2024-05-21T12:24:40.765041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CklF431utmUbMkOlYb"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "a32df7bb-c6a2-4fc6-b2e8-631a8fc905d2", "DetectTime": "2024-05-21T12:24:40.806334+00:00", "EventTime": "2024-05-21T12:24:40.806353+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDdCK6OCwOzXuu143"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "2a3ada7e-7894-4f7a-8ad6-4b593f9dfc75", "DetectTime": "2024-05-21T12:24:40.817756+00:00", "EventTime": "2024-05-21T12:24:40.817775+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDdCK6OCwOzXuu143"], "accumulated_threat_level": 4.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "321d8db6-1612-49fb-b30e-50ff4f09ff90", "DetectTime": "2024-05-21T12:24:40.822314+00:00", "EventTime": "2024-05-21T12:24:40.822333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusLMn5Mnoi715KO8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "ddd3b556-5e18-423a-b3fb-b4475e9dab6d", "DetectTime": "2024-05-21T12:24:40.832486+00:00", "EventTime": "2024-05-21T12:24:40.832504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CglXBG2uX5geu79ai8"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "812d28de-4eb7-41af-96a9-6c4d794232d2", "DetectTime": "2024-05-21T12:24:40.859569+00:00", "EventTime": "2024-05-21T12:24:40.859590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeQmJ2u7Y6Ma8086i"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "17215312-1161-4e76-a3cc-0444da6902a1", "DetectTime": "2024-05-21T12:24:40.893819+00:00", "EventTime": "2024-05-21T12:24:40.893843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTgOz2XEfBaPTQbj7"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "0bdada45-024b-449e-9909-0dd79e281554", "DetectTime": "2024-05-21T12:24:40.921537+00:00", "EventTime": "2024-05-21T12:24:40.921556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqEQ84LdOTtrMZE87"], "accumulated_threat_level": 11.000000000000002, "timewindow": 4} +{"Format": "IDEA0", "ID": "5447ead7-79ab-446a-b43f-26a8df560c9c", "DetectTime": "2024-05-21T12:24:41.065191+00:00", "EventTime": "2024-05-21T12:24:41.065210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcjCBQdKb7h7QXlD7", "CNUitL3poPRHIgRO3h", "Co5Qzw161WofLIwZta", "CmEZTq3Hpr0TLwtTBa"], "accumulated_threat_level": 0.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "884b098c-90d9-44f1-946f-bd22d63b521f", "DetectTime": "2024-05-21T12:24:41.102131+00:00", "EventTime": "2024-05-21T12:24:41.102155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NuQq3Mb0MLekfASd"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "5c1f8416-58da-446b-bbed-9ce2e0bd5da1", "DetectTime": "2024-05-21T12:24:41.351482+00:00", "EventTime": "2024-05-21T12:24:41.351502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CisPKx6SnZe93DUo2"], "accumulated_threat_level": 1.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "ff7d09e3-3848-45a8-87b5-a43dc4b4150f", "DetectTime": "2024-05-21T12:24:41.394964+00:00", "EventTime": "2024-05-21T12:24:41.394984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggIF1xvMQ86NYqz1"], "accumulated_threat_level": 2.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "873be06c-24b4-41b3-9e0b-66c351d8bf37", "DetectTime": "2024-05-21T12:24:41.409100+00:00", "EventTime": "2024-05-21T12:24:41.409118+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crmkdx3nLBPyTDOj92"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "6367eb09-e004-47ae-8da5-82726e312b0d", "DetectTime": "2024-05-21T12:24:41.422229+00:00", "EventTime": "2024-05-21T12:24:41.422248+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crmkdx3nLBPyTDOj92"], "accumulated_threat_level": 5.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "e4481c90-1a8c-400a-a726-0079ca01c53e", "DetectTime": "2024-05-21T12:24:41.433558+00:00", "EventTime": "2024-05-21T12:24:41.433574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIgF0T1B7hcd5hy20e"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "efdc0f91-0efd-46fd-bee9-0a6a965f39f5", "DetectTime": "2024-05-21T12:24:41.445136+00:00", "EventTime": "2024-05-21T12:24:41.445156+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIgF0T1B7hcd5hy20e"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "e2b8fd26-a2a1-4c66-a952-1c483bf39fea", "DetectTime": "2024-05-21T12:24:41.456062+00:00", "EventTime": "2024-05-21T12:24:41.456080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsnXAm4MjZWIAHycCj"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 8} +{"Format": "IDEA0", "ID": "8f00a563-54bd-4215-8dd5-2d86d5b3e380", "DetectTime": "2024-05-21T12:24:41.466320+00:00", "EventTime": "2024-05-21T12:24:41.466337+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd64629OeBe9y44Qh"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "467e79b9-3c96-4755-a955-da7df62300c1", "DetectTime": "2024-05-21T12:24:41.476926+00:00", "EventTime": "2024-05-21T12:24:41.476944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd64629OeBe9y44Qh"], "accumulated_threat_level": 6.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "e0e1d6d2-6b1e-4320-9458-0742bbea59ff", "DetectTime": "2024-05-21T12:24:41.486607+00:00", "EventTime": "2024-05-21T12:24:41.486625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmlBPrm6JWH9kW3O1"], "accumulated_threat_level": 3.7, "timewindow": 8} +{"Format": "IDEA0", "ID": "844877cc-c609-4476-aa8e-89b06b6da9c9", "DetectTime": "2024-05-21T12:24:41.496571+00:00", "EventTime": "2024-05-21T12:24:41.496589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcFtArYEjlEzo93Pk"], "accumulated_threat_level": 4.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "43adf1bb-4c2a-4e34-9679-d59e5701784e", "DetectTime": "2024-05-21T12:24:41.500898+00:00", "EventTime": "2024-05-21T12:24:41.500915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyLyk11NXHGV6QY46"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "2eee2fa9-8511-41ce-8ab4-bcb4c7e5f0ad", "DetectTime": "2024-05-21T12:24:41.513030+00:00", "EventTime": "2024-05-21T12:24:41.513047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusFAA4ldsiFEUHWEi"], "accumulated_threat_level": 5.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "f50ef04a-86d0-4c83-b59d-f26b6a0bb1ce", "DetectTime": "2024-05-21T12:24:41.534890+00:00", "EventTime": "2024-05-21T12:24:41.534908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqXOA3SQqvgd5Nepk"], "accumulated_threat_level": 6.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "62f69908-183d-4ee9-903d-7e477428ea97", "DetectTime": "2024-05-21T12:24:41.539513+00:00", "EventTime": "2024-05-21T12:24:41.539531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcWVx1A0nfVmgg1ja"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "54e23b73-d633-41f7-9283-d38182f0bb84", "DetectTime": "2024-05-21T12:24:41.565300+00:00", "EventTime": "2024-05-21T12:24:41.565321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2HAU3wsyqjMQvELb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 8} +{"Format": "IDEA0", "ID": "7860ef8b-1b8a-4b4f-8ca7-0003dc358d10", "DetectTime": "2024-05-21T12:24:41.571173+00:00", "EventTime": "2024-05-21T12:24:41.571198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiD7043E5BRRaXmk7g"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "b23f3c04-6f85-420c-a141-694abe9d56e5", "DetectTime": "2024-05-21T12:24:41.590166+00:00", "EventTime": "2024-05-21T12:24:41.590187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXuCVt353HjWOT1a34"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "53479234-21cf-4be6-ba25-9acbed96d206", "DetectTime": "2024-05-21T12:24:41.605556+00:00", "EventTime": "2024-05-21T12:24:41.605575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CebfPUvLwUL0ryTVl"], "accumulated_threat_level": 7.699999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "9bfd4fa4-c408-424d-98d9-cb925acfbdfc", "DetectTime": "2024-05-21T12:24:41.612640+00:00", "EventTime": "2024-05-21T12:24:41.612658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4X0ti2ou6I1Nh3dyg"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "3133209b-b3fb-4152-bee3-ce2fdf7bb7c5", "DetectTime": "2024-05-21T12:24:41.630566+00:00", "EventTime": "2024-05-21T12:24:41.630585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.253.82.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.253.82.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHjM92Y7YkH7YjwMg"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "fa6f7e44-5479-4f2a-b1cd-a15bad68b099", "DetectTime": "2024-05-21T12:24:41.641327+00:00", "EventTime": "2024-05-21T12:24:41.641345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAi8D4HZBGUrBpkth"], "accumulated_threat_level": 8.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "94bd4be7-302f-4304-b60b-00092345377d", "DetectTime": "2024-05-21T12:24:41.652546+00:00", "EventTime": "2024-05-21T12:24:41.652566+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.253.82.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.253.82.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHjM92Y7YkH7YjwMg"], "accumulated_threat_level": 6.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "a9d1fe1c-9dde-4216-ba4a-fdde14da3b87", "DetectTime": "2024-05-21T12:24:41.720841+00:00", "EventTime": "2024-05-21T12:24:41.720859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4JtJq25AKU1y2M8P3"], "accumulated_threat_level": 9.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "9731ecdb-77d6-4c29-8bdc-5d1279e78f94", "DetectTime": "2024-05-21T12:24:41.725378+00:00", "EventTime": "2024-05-21T12:24:41.725395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpoInqjKSqMtBaLeb"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "6570f2b9-5b24-4a12-81c3-62914c895984", "DetectTime": "2024-05-21T12:24:41.729633+00:00", "EventTime": "2024-05-21T12:24:41.729650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Ghpu1Hm6jljrf1Wi"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "f77ba699-c1ee-4fbe-b0ca-014206f23e5a", "DetectTime": "2024-05-21T12:24:41.748249+00:00", "EventTime": "2024-05-21T12:24:41.748270+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBoIF3apXmkTwSfJ6"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "f55ff5cc-8b15-4168-8aed-916d28ff8513", "DetectTime": "2024-05-21T12:24:41.759364+00:00", "EventTime": "2024-05-21T12:24:41.759382+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBoIF3apXmkTwSfJ6"], "accumulated_threat_level": 7.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "796c9b37-4a6a-4f68-b901-1adc08235bc4", "DetectTime": "2024-05-21T12:24:41.769883+00:00", "EventTime": "2024-05-21T12:24:41.769903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUmw41xrbuft4wmAl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "9c7daab1-d36e-447b-bc3b-18ac18ae1cd3", "DetectTime": "2024-05-21T12:24:41.780747+00:00", "EventTime": "2024-05-21T12:24:41.780766+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYYR02PHyIDTkpDb"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "26e0f84e-ccbd-4d15-9c10-522abfc6a036", "DetectTime": "2024-05-21T12:24:41.791512+00:00", "EventTime": "2024-05-21T12:24:41.791530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYYR02PHyIDTkpDb"], "accumulated_threat_level": 7.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "7af95079-d8a4-4360-947b-96cc2c9ced4b", "DetectTime": "2024-05-21T12:24:41.803946+00:00", "EventTime": "2024-05-21T12:24:41.803963+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxLuh3JkUsMo7Iak1"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "39b627a2-d986-48b0-bca2-f1e4a4b81734", "DetectTime": "2024-05-21T12:24:41.816609+00:00", "EventTime": "2024-05-21T12:24:41.816627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsxOac3PBhwy4QNkce"], "accumulated_threat_level": 10.900000000000002, "timewindow": 8} +{"Format": "IDEA0", "ID": "59e136db-6f0f-493e-95ab-5ce5fcaa455e", "DetectTime": "2024-05-21T12:24:41.827821+00:00", "EventTime": "2024-05-21T12:24:41.827840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxLuh3JkUsMo7Iak1"], "accumulated_threat_level": 8.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "7a4366eb-5c65-495a-9688-06166a6a3f6a", "DetectTime": "2024-05-21T12:24:41.832740+00:00", "EventTime": "2024-05-21T12:24:41.832762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJ4hg30YAK4v9Tgv"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "55280bcd-f4a1-495e-a477-34d2b7640be0", "DetectTime": "2024-05-21T12:24:41.844265+00:00", "EventTime": "2024-05-21T12:24:41.844289+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5LmSkPvDM7VoLSd"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "e48fa8ef-5cce-442c-abdc-7ac894e4ec3b", "DetectTime": "2024-05-21T12:24:41.856782+00:00", "EventTime": "2024-05-21T12:24:41.856801+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5LmSkPvDM7VoLSd"], "accumulated_threat_level": 8.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "cc754d81-7018-4576-beaa-f07cd0a4be3e", "DetectTime": "2024-05-21T12:24:41.870067+00:00", "EventTime": "2024-05-21T12:24:41.870086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL00nl1lc5yiv5cbKi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 8} +{"Format": "IDEA0", "ID": "2af87f8a-7777-4b33-a844-5bc7e268b9ef", "DetectTime": "2024-05-21T12:24:41.881826+00:00", "EventTime": "2024-05-21T12:24:41.881845+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qEeKTFA1ekwa4fj"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "d140c144-051c-42fd-9a23-379cc9fdc1fa", "DetectTime": "2024-05-21T12:24:41.895093+00:00", "EventTime": "2024-05-21T12:24:41.895112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qEeKTFA1ekwa4fj"], "accumulated_threat_level": 9.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "ae706cc7-6b3d-4e7f-b38b-c301611550a9", "DetectTime": "2024-05-21T12:24:41.905554+00:00", "EventTime": "2024-05-21T12:24:41.905575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC04x11wQAYqJTYBWa"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "5608b38b-9dba-488b-b865-1ac50bfb1ffd", "DetectTime": "2024-05-21T12:24:41.916683+00:00", "EventTime": "2024-05-21T12:24:41.916702+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC04x11wQAYqJTYBWa"], "accumulated_threat_level": 9.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "058c7ca0-93c0-499e-af67-0d7afc0c48ae", "DetectTime": "2024-05-21T12:24:41.927953+00:00", "EventTime": "2024-05-21T12:24:41.927972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLY07O1DPyI6mVEpy"], "accumulated_threat_level": 12.500000000000004, "timewindow": 8} +{"Format": "Json", "ID": "058c7ca0-93c0-499e-af67-0d7afc0c48ae", "DetectTime": "2024-05-21T12:24:41.927953+00:00", "EventTime": "2024-05-21T12:24:41.927972+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "1970-01-01T07:36:52.190804+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:42.161854)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "417169bf-cb28-4926-8b2b-a33d7e5b1f0b", "DetectTime": "2024-05-21T12:24:42.171515+00:00", "EventTime": "2024-05-21T12:24:42.171539+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxspx72uBro4tNley1"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "b12181fb-6bec-4091-b262-3dfd3fe7b2c7", "DetectTime": "2024-05-21T12:24:42.183464+00:00", "EventTime": "2024-05-21T12:24:42.183484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxspx72uBro4tNley1"], "accumulated_threat_level": 10.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "c7c62ca0-56df-49d8-ac9c-a7319ccc7529", "DetectTime": "2024-05-21T12:24:42.194201+00:00", "EventTime": "2024-05-21T12:24:42.194218+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xNpk2zwgTEIry9q1"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "b8d6a124-de18-49f4-9b3d-3bee7fb634c9", "DetectTime": "2024-05-21T12:24:42.205581+00:00", "EventTime": "2024-05-21T12:24:42.205599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhYfO21p50XBiRJ42"], "accumulated_threat_level": 0.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "04fc4f33-d1f2-475b-949c-fe93015e6033", "DetectTime": "2024-05-21T12:24:42.217535+00:00", "EventTime": "2024-05-21T12:24:42.217554+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xNpk2zwgTEIry9q1"], "accumulated_threat_level": 10.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "2265bb8a-f8af-4daf-831e-7f74e9fc0a1f", "DetectTime": "2024-05-21T12:24:42.228271+00:00", "EventTime": "2024-05-21T12:24:42.228288+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.235.27.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct34Rp1Rja4wwruNM5"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "47b4e637-168b-4261-8b0e-5d820bf168f2", "DetectTime": "2024-05-21T12:24:42.239171+00:00", "EventTime": "2024-05-21T12:24:42.239188+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.235.27.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct34Rp1Rja4wwruNM5"], "accumulated_threat_level": 11.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "acd69e9b-c889-4302-996f-4cac2fe483f6", "DetectTime": "2024-05-21T12:24:42.252494+00:00", "EventTime": "2024-05-21T12:24:42.252513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrTSf1EvgK8lld4K5"], "accumulated_threat_level": 1.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "c1f640cf-6355-48b1-86da-b9dbc64084a9", "DetectTime": "2024-05-21T12:24:42.263467+00:00", "EventTime": "2024-05-21T12:24:42.263488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.129.61"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbeJyE47X1oFC6H4"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "9b7e95f1-e83c-4b26-aab1-b3bba8815ec3", "DetectTime": "2024-05-21T12:24:42.278367+00:00", "EventTime": "2024-05-21T12:24:42.278386+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.129.61"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbeJyE47X1oFC6H4"], "accumulated_threat_level": 11.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "6184fdc4-7401-4d22-b115-591920b51ef6", "DetectTime": "2024-05-21T12:24:42.289465+00:00", "EventTime": "2024-05-21T12:24:42.289484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.83.114.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwOBB1ptsvgdkgfEl"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "cb3ac5e7-5862-4870-855f-8bcdc9e58a05", "DetectTime": "2024-05-21T12:24:42.300532+00:00", "EventTime": "2024-05-21T12:24:42.300551+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwOBB1ptsvgdkgfEl"], "accumulated_threat_level": 12.0, "timewindow": 7} +{"Format": "Json", "ID": "cb3ac5e7-5862-4870-855f-8bcdc9e58a05", "DetectTime": "2024-05-21T12:24:42.300532+00:00", "EventTime": "2024-05-21T12:24:42.300551+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "1970-01-01T06:32:08.649591+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 7. (real time 2024/05/21 12:24:42.500617)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 7, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "d27ab90f-8ef8-4ac3-8f3e-7eece499f488", "DetectTime": "2024-05-21T12:24:42.513854+00:00", "EventTime": "2024-05-21T12:24:42.513874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoJ5P1prkwrwDRRKd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 8} +{"Format": "IDEA0", "ID": "a49bd605-352c-4b58-a85e-ca6c2d02ebe1", "DetectTime": "2024-05-21T12:24:42.518790+00:00", "EventTime": "2024-05-21T12:24:42.518809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefjMCa9QVs6LIFA9"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "497872c3-ee1e-432d-9426-57f0c1dc47ca", "DetectTime": "2024-05-21T12:24:42.530868+00:00", "EventTime": "2024-05-21T12:24:42.530889+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.165.116.48"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtFiodylDZx7cttb"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "b1b75a72-ac4e-488d-8167-03b2027f3378", "DetectTime": "2024-05-21T12:24:42.543225+00:00", "EventTime": "2024-05-21T12:24:42.543246+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtFiodylDZx7cttb"], "accumulated_threat_level": 0.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "68e5619d-2a38-4105-8420-41af37bcc6a9", "DetectTime": "2024-05-21T12:24:42.556615+00:00", "EventTime": "2024-05-21T12:24:42.556635+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.49.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJ0Je33tHJ6pQaGz"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "d1249bb8-a259-4026-b8f8-fb9f4b4d1c4a", "DetectTime": "2024-05-21T12:24:42.568208+00:00", "EventTime": "2024-05-21T12:24:42.568230+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJ0Je33tHJ6pQaGz"], "accumulated_threat_level": 1.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "b8173794-386e-4fdd-a67f-621022ed4a9b", "DetectTime": "2024-05-21T12:24:42.580000+00:00", "EventTime": "2024-05-21T12:24:42.580018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVgoj42FxjwL5KqJ6"], "accumulated_threat_level": 3.2, "timewindow": 8} +{"Format": "IDEA0", "ID": "532b2733-e44c-495b-9d90-e9611eeef36c", "DetectTime": "2024-05-21T12:24:42.592419+00:00", "EventTime": "2024-05-21T12:24:42.592437+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUN8v456AeCK4hYcd"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "b161db37-baa5-4e90-8002-ce5bf20157b0", "DetectTime": "2024-05-21T12:24:42.597118+00:00", "EventTime": "2024-05-21T12:24:42.597136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHWwc2mFFUDofj1sc"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "dabf1b1a-9c93-4b09-85b1-c25af5cf8cc7", "DetectTime": "2024-05-21T12:24:42.610057+00:00", "EventTime": "2024-05-21T12:24:42.610075+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUN8v456AeCK4hYcd"], "accumulated_threat_level": 1.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "3859ddee-7b5a-4935-8a96-0d10b4bbb3d8", "DetectTime": "2024-05-21T12:24:42.620922+00:00", "EventTime": "2024-05-21T12:24:42.620940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUJBw17ITkH4E77Wd"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "c573dfdb-5bcd-414b-a72d-b5de332cf59a", "DetectTime": "2024-05-21T12:24:42.631834+00:00", "EventTime": "2024-05-21T12:24:42.631852+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUJBw17ITkH4E77Wd"], "accumulated_threat_level": 2.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "49750593-d099-42c1-85ae-074858c3e2e0", "DetectTime": "2024-05-21T12:24:42.642045+00:00", "EventTime": "2024-05-21T12:24:42.642063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qQh54d8q2PVX4cCl"], "accumulated_threat_level": 4.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "fd027314-d361-4898-9baa-be38d9efa9a9", "DetectTime": "2024-05-21T12:24:42.652653+00:00", "EventTime": "2024-05-21T12:24:42.652671+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCiWz4ePvgYOEVymf"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "075b7ed6-05e1-49ca-9a75-e45e62a5e738", "DetectTime": "2024-05-21T12:24:42.663674+00:00", "EventTime": "2024-05-21T12:24:42.663692+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCiWz4ePvgYOEVymf"], "accumulated_threat_level": 2.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "7de0bcfb-e665-4c82-b204-35f73d27ba6a", "DetectTime": "2024-05-21T12:24:42.669047+00:00", "EventTime": "2024-05-21T12:24:42.669067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuEh4kKCjAxcTTxc"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "d726a819-4c2a-4fa4-8b89-4925e93c56aa", "DetectTime": "2024-05-21T12:24:42.683495+00:00", "EventTime": "2024-05-21T12:24:42.683515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.244.107.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.244.107.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBorFE4pGbreUW9txi"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "f35af6ec-24fc-4eb7-b7a0-671388cd3538", "DetectTime": "2024-05-21T12:24:42.696254+00:00", "EventTime": "2024-05-21T12:24:42.696273+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.244.107.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.244.107.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBorFE4pGbreUW9txi"], "accumulated_threat_level": 3.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "8acc47ad-4fd0-4f59-8959-670888fcdcd6", "DetectTime": "2024-05-21T12:24:42.710001+00:00", "EventTime": "2024-05-21T12:24:42.710022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgLZU54R5K8jew1Wqa"], "accumulated_threat_level": 4.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "f51ec9c1-5af5-49ba-83d8-6d81bad8f1cc", "DetectTime": "2024-05-21T12:24:42.715103+00:00", "EventTime": "2024-05-21T12:24:42.715122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQt3UdXohjnye0ia"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "d4392ba0-6a01-492a-af82-cadc5a44453f", "DetectTime": "2024-05-21T12:24:42.726044+00:00", "EventTime": "2024-05-21T12:24:42.726063+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4mRL32ihNr1AUCti"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "810c2dc0-7733-4b2c-a114-43c318aedf28", "DetectTime": "2024-05-21T12:24:42.737097+00:00", "EventTime": "2024-05-21T12:24:42.737114+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4mRL32ihNr1AUCti"], "accumulated_threat_level": 3.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "f9e94307-5ff5-4bd1-ae19-650a5192a256", "DetectTime": "2024-05-21T12:24:42.741314+00:00", "EventTime": "2024-05-21T12:24:42.741331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXzjk4pqVTdoDmYvc"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "6a4dcfbe-4574-4da5-87f8-aa8cd04d7c8f", "DetectTime": "2024-05-21T12:24:42.751704+00:00", "EventTime": "2024-05-21T12:24:42.751722+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.119.190.39"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcWYERxT0eetUUYe"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "680013cf-74dd-41c0-9599-71d23ff9d7a5", "DetectTime": "2024-05-21T12:24:42.762321+00:00", "EventTime": "2024-05-21T12:24:42.762340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcWYERxT0eetUUYe"], "accumulated_threat_level": 4.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "8123f5ad-ed05-4d6a-b4f1-f7f1deac4e9e", "DetectTime": "2024-05-21T12:24:42.774557+00:00", "EventTime": "2024-05-21T12:24:42.774576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJgdXl2c2P0WEfpTJa"], "accumulated_threat_level": 5.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "54c97257-2433-4207-8f35-ded5fb3d9f3d", "DetectTime": "2024-05-21T12:24:42.785674+00:00", "EventTime": "2024-05-21T12:24:42.785692+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwocS3PruftwIIKzl"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "3aee40e0-29f8-4a71-98f6-4c59b02093e7", "DetectTime": "2024-05-21T12:24:42.796475+00:00", "EventTime": "2024-05-21T12:24:42.796492+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwocS3PruftwIIKzl"], "accumulated_threat_level": 4.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "19bb4eae-af36-4107-b9bc-5ab23f9d6bf7", "DetectTime": "2024-05-21T12:24:42.800833+00:00", "EventTime": "2024-05-21T12:24:42.800850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7wbl4dfAqP0YDH2i"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "c4104e84-bf18-4eba-b7ec-02deb9072895", "DetectTime": "2024-05-21T12:24:42.811519+00:00", "EventTime": "2024-05-21T12:24:42.811536+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["103.1.28.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 103.1.28.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjZR11Z8UyypuMZuj"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "856d5a5b-4851-43af-be39-6b7512d7634d", "DetectTime": "2024-05-21T12:24:42.822620+00:00", "EventTime": "2024-05-21T12:24:42.822638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["103.1.28.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 103.1.28.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjZR11Z8UyypuMZuj"], "accumulated_threat_level": 5.0, "timewindow": 7} +{"Format": "IDEA0", "ID": "12453364-c9e7-4315-a992-8a8d6a1acc33", "DetectTime": "2024-05-21T12:24:42.831991+00:00", "EventTime": "2024-05-21T12:24:42.832008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfndwV1dbvryP2AP0k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 8} +{"Format": "IDEA0", "ID": "cc7c7d53-b2ac-4ab5-b56e-2080108d17f5", "DetectTime": "2024-05-21T12:24:42.842336+00:00", "EventTime": "2024-05-21T12:24:42.842353+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmAN93sR8oBJAtMDc"], "accumulated_threat_level": 0, "timewindow": 7} +{"Format": "IDEA0", "ID": "ff888abb-263d-4542-ac34-1afbec5ef3fc", "DetectTime": "2024-05-21T12:24:42.852955+00:00", "EventTime": "2024-05-21T12:24:42.852973+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmAN93sR8oBJAtMDc"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "baeab048-7931-42da-8549-220ad42fc964", "DetectTime": "2024-05-21T12:24:42.863292+00:00", "EventTime": "2024-05-21T12:24:42.863312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkLML3V5yhlLbaxcf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "5d1eb7e2-38da-4a96-b5c3-51c341162cb9", "DetectTime": "2024-05-21T12:24:42.873817+00:00", "EventTime": "2024-05-21T12:24:42.873835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.253.82.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.253.82.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Poqc1EmwoqD09uof"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "6fd9abc5-bfa1-4f38-86a6-22f8fb038e9f", "DetectTime": "2024-05-21T12:24:42.884471+00:00", "EventTime": "2024-05-21T12:24:42.884489+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.253.82.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.253.82.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Poqc1EmwoqD09uof"], "accumulated_threat_level": 7.699999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "89bc14cd-efca-4c2c-962c-ac7248367c8f", "DetectTime": "2024-05-21T12:24:42.894673+00:00", "EventTime": "2024-05-21T12:24:42.894691+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.244.107.44"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.244.107.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSAtL1j5kg5m28ruf"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7393125b-0d72-4897-bca8-cf176bdf4859", "DetectTime": "2024-05-21T12:24:42.905274+00:00", "EventTime": "2024-05-21T12:24:42.905291+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.244.107.44"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.244.107.44 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSAtL1j5kg5m28ruf"], "accumulated_threat_level": 8.2, "timewindow": 8} +{"Format": "IDEA0", "ID": "889b3765-2a69-493f-80e8-108bf11b3c67", "DetectTime": "2024-05-21T12:24:42.909493+00:00", "EventTime": "2024-05-21T12:24:42.909510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktfNi3bIrZMsjXvBf"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "cfae0a27-87df-4ec9-9249-9ad4cf2848d3", "DetectTime": "2024-05-21T12:24:42.924104+00:00", "EventTime": "2024-05-21T12:24:42.924123+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["103.1.28.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 103.1.28.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pfXj2P3tTx4YNHt4"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "33ef926e-f547-408e-a222-ecb253142a73", "DetectTime": "2024-05-21T12:24:42.929391+00:00", "EventTime": "2024-05-21T12:24:42.929409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9csp3RGtcA1gMe52"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "590c1b41-f831-40ed-9052-dec86f2c0f31", "DetectTime": "2024-05-21T12:24:42.941484+00:00", "EventTime": "2024-05-21T12:24:42.941503+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["103.1.28.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 103.1.28.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pfXj2P3tTx4YNHt4"], "accumulated_threat_level": 8.7, "timewindow": 8} +{"Format": "IDEA0", "ID": "3777dd89-b6a2-4639-bd27-9232a69c0306", "DetectTime": "2024-05-21T12:24:42.952151+00:00", "EventTime": "2024-05-21T12:24:42.952169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjOEuJVf3P7ONG5qi"], "accumulated_threat_level": 9.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "d4e91aec-d9b1-4b19-b5c9-80dfc2bb5ffd", "DetectTime": "2024-05-21T12:24:42.963872+00:00", "EventTime": "2024-05-21T12:24:42.963891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHP9GH3efAOZ4RdEi"], "accumulated_threat_level": 10.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "f8be4206-841b-4870-a59b-c7aa046a5a3a", "DetectTime": "2024-05-21T12:24:42.968411+00:00", "EventTime": "2024-05-21T12:24:42.968429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIdC33MK2Zt3W2a36"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "c642d2cd-a6cb-42e3-9fc9-9cb815ec4a08", "DetectTime": "2024-05-21T12:24:42.979174+00:00", "EventTime": "2024-05-21T12:24:42.979194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZGie1Im62nHni064"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "2b36bc5b-1663-4fe8-ad67-e728a65c95a0", "DetectTime": "2024-05-21T12:24:42.990104+00:00", "EventTime": "2024-05-21T12:24:42.990122+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZGie1Im62nHni064"], "accumulated_threat_level": 10.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "26f4cdab-a56c-496b-acf8-c871129f2231", "DetectTime": "2024-05-21T12:24:42.994391+00:00", "EventTime": "2024-05-21T12:24:42.994423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HQlo390viI968yB9"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "edf39f60-b7d2-49d5-80e6-86878c4e2a19", "DetectTime": "2024-05-21T12:24:43.008704+00:00", "EventTime": "2024-05-21T12:24:43.008722+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPn17k4YH9HO6k94Kf"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1f9be1f4-8977-4d10-a261-53f3fee0d20c", "DetectTime": "2024-05-21T12:24:43.019532+00:00", "EventTime": "2024-05-21T12:24:43.019550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cffbct2nqHbs4le2We"], "accumulated_threat_level": 11.600000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "65d31743-4804-4e05-beb9-9568f55340e9", "DetectTime": "2024-05-21T12:24:43.032535+00:00", "EventTime": "2024-05-21T12:24:43.032553+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPn17k4YH9HO6k94Kf"], "accumulated_threat_level": 12.100000000000001, "timewindow": 8} +{"Format": "Json", "ID": "65d31743-4804-4e05-beb9-9568f55340e9", "DetectTime": "2024-05-21T12:24:43.032535+00:00", "EventTime": "2024-05-21T12:24:43.032553+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "1970-01-01T07:04:11.726836+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:43.255235)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "2d075a79-cba5-4f75-a4b7-719476614433", "DetectTime": "2024-05-21T12:24:43.260126+00:00", "EventTime": "2024-05-21T12:24:43.260144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7Ged2oa9Ja8g56ad"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "82e58ee5-a6de-4be0-9267-5c161eb32f05", "DetectTime": "2024-05-21T12:24:43.272379+00:00", "EventTime": "2024-05-21T12:24:43.272396+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6bhn1FnBlzUzeEad"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "93846e08-1489-4c80-b305-665217cf44d0", "DetectTime": "2024-05-21T12:24:43.282265+00:00", "EventTime": "2024-05-21T12:24:43.282282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46oAE2NVEnRs7Cqhf"], "accumulated_threat_level": 0.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "7428ba98-4669-4f40-8fdd-cba7f8ec5eac", "DetectTime": "2024-05-21T12:24:43.292865+00:00", "EventTime": "2024-05-21T12:24:43.292883+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6bhn1FnBlzUzeEad"], "accumulated_threat_level": 1.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "2e338d87-b01b-4833-9507-425c4fb24054", "DetectTime": "2024-05-21T12:24:43.297331+00:00", "EventTime": "2024-05-21T12:24:43.297349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRK68D31WZDNJ8csga"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "9c98637d-fd02-47c1-9272-e921e11305fa", "DetectTime": "2024-05-21T12:24:43.307433+00:00", "EventTime": "2024-05-21T12:24:43.307451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvvLt3DrgNgc7EVyd"], "accumulated_threat_level": 2.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "7e938ffe-e07c-443d-9156-0853d7c9448a", "DetectTime": "2024-05-21T12:24:43.318380+00:00", "EventTime": "2024-05-21T12:24:43.318402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "Connection to unknown destination port 26966/UDP destination IP 36.83.114.37. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CriKou3iIJmn1lq7Fb"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 8} +{"Format": "IDEA0", "ID": "9cf9bfc6-cb38-41ec-bd93-3f1bb7c176bd", "DetectTime": "2024-05-21T12:24:43.329051+00:00", "EventTime": "2024-05-21T12:24:43.329071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca3AxE21eRi1DwNkLg"], "accumulated_threat_level": 3.7, "timewindow": 8} +{"Format": "IDEA0", "ID": "9ce8a714-d83e-443a-82fd-e8112b1e9512", "DetectTime": "2024-05-21T12:24:43.340197+00:00", "EventTime": "2024-05-21T12:24:43.340215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq8keK3E84gJafphHl"], "accumulated_threat_level": 4.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "561ee84c-aa47-4a12-a9bf-472dc77f8a62", "DetectTime": "2024-05-21T12:24:43.351573+00:00", "EventTime": "2024-05-21T12:24:43.351592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "Connection to unknown destination port 25066/UDP destination IP 118.174.49.121. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8CT44xPR7EaUsVX8"], "accumulated_threat_level": 5.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "47f9bd0f-82a8-4e56-a72c-b238eb9bc919", "DetectTime": "2024-05-21T12:24:43.361764+00:00", "EventTime": "2024-05-21T12:24:43.361782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY0y9f4ea4eePdewvj"], "accumulated_threat_level": 6.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "daad3de5-7f80-4f50-aa51-1ec3e6ceb5ba", "DetectTime": "2024-05-21T12:24:43.366441+00:00", "EventTime": "2024-05-21T12:24:43.366457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C28Nds2rkF3OjmtrRj"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "8d45be74-4f9a-4f7e-8239-fae8485d627c", "DetectTime": "2024-05-21T12:24:43.371529+00:00", "EventTime": "2024-05-21T12:24:43.371549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nR3b41JNCLlCjWhb"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "991d42f9-5de4-4857-b495-1b820929e4d2", "DetectTime": "2024-05-21T12:24:43.387921+00:00", "EventTime": "2024-05-21T12:24:43.387940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMX1Ober3ft8wYOb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 8} +{"Format": "IDEA0", "ID": "a4fa071c-6385-43d5-b130-a78f83ebf0ba", "DetectTime": "2024-05-21T12:24:43.392599+00:00", "EventTime": "2024-05-21T12:24:43.392620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0999F2ubUa6cGTANh"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "a4d5c61f-cc75-4d51-a89a-829523266291", "DetectTime": "2024-05-21T12:24:43.397881+00:00", "EventTime": "2024-05-21T12:24:43.397901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhT4h2jesZXEPN2O3"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "16cdecce-b682-4772-b69d-afbdcd4f5bc0", "DetectTime": "2024-05-21T12:24:43.407786+00:00", "EventTime": "2024-05-21T12:24:43.407804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWXJv33UwAdS5JQUB5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 8} +{"Format": "IDEA0", "ID": "b8287e66-0d37-411a-8e06-55af18ea0ee3", "DetectTime": "2024-05-21T12:24:43.419801+00:00", "EventTime": "2024-05-21T12:24:43.419819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDaxc3oTrSp7wLFV3"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9239f6fc-fce5-4e6a-b64b-6e79cceab734", "DetectTime": "2024-05-21T12:24:43.432111+00:00", "EventTime": "2024-05-21T12:24:43.432128+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDaxc3oTrSp7wLFV3"], "accumulated_threat_level": 8.2, "timewindow": 8} +{"Format": "IDEA0", "ID": "9dfb67ba-f661-45ef-84d6-aac7f1777a07", "DetectTime": "2024-05-21T12:24:43.436877+00:00", "EventTime": "2024-05-21T12:24:43.436896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYsev1B4Qp2S7w4Gd"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "f4b6dfd3-a2c5-4497-a24f-0ad83f34765b", "DetectTime": "2024-05-21T12:24:43.449135+00:00", "EventTime": "2024-05-21T12:24:43.449156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl13QP1QZ4XgLiwjj1"], "accumulated_threat_level": 9.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "051c7d66-82c1-4511-950d-29a3306c8b3d", "DetectTime": "2024-05-21T12:24:43.462359+00:00", "EventTime": "2024-05-21T12:24:43.462377+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBxvn9m2a8bfn0ce"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "bf43c891-a715-4f7f-8f19-7ec1f9b8993f", "DetectTime": "2024-05-21T12:24:43.467033+00:00", "EventTime": "2024-05-21T12:24:43.467051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU3u71G3UQK1ikFQk"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "98c66f1f-f56d-4041-9ca6-15e38e4ec8b9", "DetectTime": "2024-05-21T12:24:43.479360+00:00", "EventTime": "2024-05-21T12:24:43.479381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBxvn9m2a8bfn0ce"], "accumulated_threat_level": 9.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "4aac9ee6-bcaf-4866-9318-80fae9b810ed", "DetectTime": "2024-05-21T12:24:43.490111+00:00", "EventTime": "2024-05-21T12:24:43.490129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsCmb4XpFa1fz1102"], "accumulated_threat_level": 10.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "7fb9588a-0746-417e-9e21-f0a93d19b5f5", "DetectTime": "2024-05-21T12:24:43.500420+00:00", "EventTime": "2024-05-21T12:24:43.500438+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAxZi5KHTx0Cen52"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "35e0f2b1-f5e1-42ae-9c93-a4a70415f1fc", "DetectTime": "2024-05-21T12:24:43.504865+00:00", "EventTime": "2024-05-21T12:24:43.504883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cptp551lMpQ1AQfrQ2"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "d02c30f5-183e-4f4d-9b2b-06ada5e8c640", "DetectTime": "2024-05-21T12:24:43.515872+00:00", "EventTime": "2024-05-21T12:24:43.515890+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAxZi5KHTx0Cen52"], "accumulated_threat_level": 10.8, "timewindow": 8} +{"Format": "IDEA0", "ID": "45b560ec-83f5-4b3e-94f4-d52cbbdf27c7", "DetectTime": "2024-05-21T12:24:43.526240+00:00", "EventTime": "2024-05-21T12:24:43.526260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxpECZkBhc9yfLSi"], "accumulated_threat_level": 11.600000000000001, "timewindow": 8} +{"Format": "IDEA0", "ID": "7ef8fe78-6d81-45c4-babb-c14781ba87a9", "DetectTime": "2024-05-21T12:24:43.537602+00:00", "EventTime": "2024-05-21T12:24:43.537620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqQIUKO3bgDE2ov5"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9e4fd88d-afa5-407b-af74-c7ce0b3f66ef", "DetectTime": "2024-05-21T12:24:43.548314+00:00", "EventTime": "2024-05-21T12:24:43.548332+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqQIUKO3bgDE2ov5"], "accumulated_threat_level": 12.100000000000001, "timewindow": 8} +{"Format": "Json", "ID": "9e4fd88d-afa5-407b-af74-c7ce0b3f66ef", "DetectTime": "2024-05-21T12:24:43.548314+00:00", "EventTime": "2024-05-21T12:24:43.548332+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "1970-01-01T07:04:15.948465+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:43.778311)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "6144240b-4578-4a56-81b5-e69fe6c55734", "DetectTime": "2024-05-21T12:24:43.789793+00:00", "EventTime": "2024-05-21T12:24:43.789811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuItAj1fKMa3LOE2Q4"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "28e9af11-8dba-43ee-8368-84f18e32e874", "DetectTime": "2024-05-21T12:24:43.801557+00:00", "EventTime": "2024-05-21T12:24:43.801575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuItAj1fKMa3LOE2Q4"], "accumulated_threat_level": 0.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "4f2af1e0-14d0-444f-ab18-30112cfe0e94", "DetectTime": "2024-05-21T12:24:43.811454+00:00", "EventTime": "2024-05-21T12:24:43.811472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDZnI1dHvGk8jPXIc"], "accumulated_threat_level": 1.3, "timewindow": 8} +{"Format": "IDEA0", "ID": "fc9544a2-465d-4190-b34b-6f70373eed9a", "DetectTime": "2024-05-21T12:24:43.821778+00:00", "EventTime": "2024-05-21T12:24:43.821797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj2YX61Adk4CQEK8m3"], "accumulated_threat_level": 2.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "bad1e9c7-fd06-48b0-9549-7d0afd82cdfd", "DetectTime": "2024-05-21T12:24:43.826243+00:00", "EventTime": "2024-05-21T12:24:43.826259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc8f63yRwuEQXmNX9"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "d826ce59-6a80-4c91-9c6b-fbf35d1aff18", "DetectTime": "2024-05-21T12:24:43.836240+00:00", "EventTime": "2024-05-21T12:24:43.836257+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21A4e3jDnQjDrbSQd"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "2812af25-d0d0-40ed-958b-da1d3a1e386c", "DetectTime": "2024-05-21T12:24:43.846863+00:00", "EventTime": "2024-05-21T12:24:43.846881+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21A4e3jDnQjDrbSQd"], "accumulated_threat_level": 2.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "9fdb4d6e-d3c2-4fc9-9855-b19dafc14e48", "DetectTime": "2024-05-21T12:24:43.857205+00:00", "EventTime": "2024-05-21T12:24:43.857223+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1AV73Mrt6rcuTrk5"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "02c25f11-8d56-4d13-835f-3eeb4845da49", "DetectTime": "2024-05-21T12:24:43.869532+00:00", "EventTime": "2024-05-21T12:24:43.869551+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1AV73Mrt6rcuTrk5"], "accumulated_threat_level": 3.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "19d221d5-5156-4b34-8848-f123e1244df1", "DetectTime": "2024-05-21T12:24:43.881495+00:00", "EventTime": "2024-05-21T12:24:43.881515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RUhN2Z73iZJz1H15"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "34eb6609-cb54-4599-ac98-7cb92ddc3a50", "DetectTime": "2024-05-21T12:24:43.893277+00:00", "EventTime": "2024-05-21T12:24:43.893297+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RUhN2Z73iZJz1H15"], "accumulated_threat_level": 3.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "297aac45-cfd7-4782-a8a8-c49e414806ca", "DetectTime": "2024-05-21T12:24:43.909260+00:00", "EventTime": "2024-05-21T12:24:43.909279+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdsdpu1oohfaY2aeV6"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "61bb3b74-4791-4878-bfc4-0905633ced8f", "DetectTime": "2024-05-21T12:24:43.919990+00:00", "EventTime": "2024-05-21T12:24:43.920007+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdsdpu1oohfaY2aeV6"], "accumulated_threat_level": 4.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "9bc6f421-393e-48e0-9c1a-d770bcc12b42", "DetectTime": "2024-05-21T12:24:43.933196+00:00", "EventTime": "2024-05-21T12:24:43.933215+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbVuz4gdzs0UQkSa4"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "549181ce-4ac6-4c87-ab7e-c3fb98e472d2", "DetectTime": "2024-05-21T12:24:43.944704+00:00", "EventTime": "2024-05-21T12:24:43.944722+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbVuz4gdzs0UQkSa4"], "accumulated_threat_level": 4.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "c136ae50-9f05-4bc8-8328-6a9a22c65f3b", "DetectTime": "2024-05-21T12:24:43.949134+00:00", "EventTime": "2024-05-21T12:24:43.949152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuYUU94criTAaBhs0b"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "f3e0d917-9325-4f23-8452-fa610fa928a0", "DetectTime": "2024-05-21T12:24:43.958955+00:00", "EventTime": "2024-05-21T12:24:43.958972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMW6HxewO6UeWBnb"], "accumulated_threat_level": 0.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "d97c006a-fc16-4b94-a170-11ac0a8ed9db", "DetectTime": "2024-05-21T12:24:43.970187+00:00", "EventTime": "2024-05-21T12:24:43.970205+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJWYb1qXXMpbWTVc7"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1e859226-e722-4389-a3d3-d831779c7f5d", "DetectTime": "2024-05-21T12:24:43.982004+00:00", "EventTime": "2024-05-21T12:24:43.982022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJWYb1qXXMpbWTVc7"], "accumulated_threat_level": 5.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "212fad9d-969e-435f-8205-55d16079cb03", "DetectTime": "2024-05-21T12:24:43.993112+00:00", "EventTime": "2024-05-21T12:24:43.993132+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGwYj4UVZQ1LHSMp7"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9ec3ca9a-a3db-462c-8540-21ebd13732ee", "DetectTime": "2024-05-21T12:24:44.004044+00:00", "EventTime": "2024-05-21T12:24:44.004062+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGwYj4UVZQ1LHSMp7"], "accumulated_threat_level": 5.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "82b9a291-1304-4107-8ec4-bf3912a6c151", "DetectTime": "2024-05-21T12:24:44.014009+00:00", "EventTime": "2024-05-21T12:24:44.014027+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjoyYk4g92sqk4PT7b"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d5bc7d92-ba3f-430d-a7e8-deaf9fdca255", "DetectTime": "2024-05-21T12:24:44.026059+00:00", "EventTime": "2024-05-21T12:24:44.026076+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjoyYk4g92sqk4PT7b"], "accumulated_threat_level": 6.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "4f55835d-7683-42dc-ab01-1660cbbb7982", "DetectTime": "2024-05-21T12:24:44.036245+00:00", "EventTime": "2024-05-21T12:24:44.036262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.129.61"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctnfjp29VWMb3B6Dnf"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "0fa4697f-dc4f-46de-ab13-0660fe6130f1", "DetectTime": "2024-05-21T12:24:44.047891+00:00", "EventTime": "2024-05-21T12:24:44.047912+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.129.61"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctnfjp29VWMb3B6Dnf"], "accumulated_threat_level": 6.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "378e8686-0369-42dd-b381-4d86cfc4f912", "DetectTime": "2024-05-21T12:24:44.060264+00:00", "EventTime": "2024-05-21T12:24:44.060285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.235.27.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0B9Gp4Ik7xtl36GU1"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "90d7be0c-7ac8-47b6-9fb2-c3a4fa986cfc", "DetectTime": "2024-05-21T12:24:44.072097+00:00", "EventTime": "2024-05-21T12:24:44.072117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.235.27.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0B9Gp4Ik7xtl36GU1"], "accumulated_threat_level": 7.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "686d6da7-232d-466d-b962-e016af402152", "DetectTime": "2024-05-21T12:24:44.083244+00:00", "EventTime": "2024-05-21T12:24:44.083263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.83.114.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOrbd4bmntJKG70li"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ef8ffe47-4552-40f7-aeaf-831d33b085ba", "DetectTime": "2024-05-21T12:24:44.094576+00:00", "EventTime": "2024-05-21T12:24:44.094595+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOrbd4bmntJKG70li"], "accumulated_threat_level": 7.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "938b86bf-1fc8-4c40-8cf0-d6f8ec58d75f", "DetectTime": "2024-05-21T12:24:44.105700+00:00", "EventTime": "2024-05-21T12:24:44.105718+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.165.116.48"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBE0VCoTsEWfZ5kQd"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "56bd2f34-7f7b-40b8-bf21-c16f89b3c037", "DetectTime": "2024-05-21T12:24:44.117906+00:00", "EventTime": "2024-05-21T12:24:44.117925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBE0VCoTsEWfZ5kQd"], "accumulated_threat_level": 8.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "33ed0de9-0ed7-4356-b81e-0004c858f7d6", "DetectTime": "2024-05-21T12:24:44.137364+00:00", "EventTime": "2024-05-21T12:24:44.137381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHHP1I1xthxefch1a2"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "8a2ff232-46c3-4c81-8ad1-20d604642cc5", "DetectTime": "2024-05-21T12:24:44.148644+00:00", "EventTime": "2024-05-21T12:24:44.148662+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHHP1I1xthxefch1a2"], "accumulated_threat_level": 8.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "51ec18d4-ee40-42d2-857c-adda51c064d5", "DetectTime": "2024-05-21T12:24:44.158960+00:00", "EventTime": "2024-05-21T12:24:44.158978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.49.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJmeo1SjrjcZ8XGr7"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d0082b37-2ced-48d1-814e-f294ec06a405", "DetectTime": "2024-05-21T12:24:44.169745+00:00", "EventTime": "2024-05-21T12:24:44.169763+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJmeo1SjrjcZ8XGr7"], "accumulated_threat_level": 9.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "f17ef76b-7fd6-4138-8cf7-e15ed97bfe69", "DetectTime": "2024-05-21T12:24:44.184280+00:00", "EventTime": "2024-05-21T12:24:44.184300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzkSlI2bkOt7Kk6NSk"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "4c346d4a-af65-48be-8636-947e06c042c0", "DetectTime": "2024-05-21T12:24:44.189046+00:00", "EventTime": "2024-05-21T12:24:44.189066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.53.52.122 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzRke3cOS9sKL6Lch"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "b36d87db-10d8-4523-9fb7-0e863b3676a8", "DetectTime": "2024-05-21T12:24:44.199638+00:00", "EventTime": "2024-05-21T12:24:44.199660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.153.125 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCo1J2AO6b16hqHDh"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "4832fdc2-80fa-4aa1-bf56-0ce2c9c319a5", "DetectTime": "2024-05-21T12:24:44.204651+00:00", "EventTime": "2024-05-21T12:24:44.204672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nSan2vRzn4u2tPy2", "CDk6mLCFGYB7Kc1Ij", "CCRV2O1Zc1PU1YPISj", "CtqxVy381p1f5W93c1"], "accumulated_threat_level": 1.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "c11c7167-319a-4eb7-953e-3718625b6904", "DetectTime": "2024-05-21T12:24:44.220654+00:00", "EventTime": "2024-05-21T12:24:44.220670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cst6kf1bXgc4tXErZ3"], "accumulated_threat_level": 2.1, "timewindow": 9} +{"Format": "IDEA0", "ID": "a16c1b4f-6531-4e74-a1a2-109f59860f8a", "DetectTime": "2024-05-21T12:24:44.225025+00:00", "EventTime": "2024-05-21T12:24:44.225042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.11.116.7 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK5Xwj1FsZNsJ00sfe"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "35d9cfde-1066-4206-bd16-2fe174c75fe0", "DetectTime": "2024-05-21T12:24:44.242996+00:00", "EventTime": "2024-05-21T12:24:44.243018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9Yad4G9YbxNEgvk4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "8c906de1-52f9-4652-8963-7ecde1f8ae96", "DetectTime": "2024-05-21T12:24:44.248154+00:00", "EventTime": "2024-05-21T12:24:44.248173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoA0LA2tm4UUB8fc13"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "9252c9c1-e9f5-4ff8-8f32-8b1ad6d2da5f", "DetectTime": "2024-05-21T12:24:44.255274+00:00", "EventTime": "2024-05-21T12:24:44.255295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdP9VR2HSJDwWihTqi"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "a70ba703-cbf1-4d3d-aa2d-e556412c29a7", "DetectTime": "2024-05-21T12:24:44.260039+00:00", "EventTime": "2024-05-21T12:24:44.260058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1AtoCx6zTT3Ndenf"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "c236cd9e-a142-4248-b8f1-e86cf9e87ab4", "DetectTime": "2024-05-21T12:24:44.264640+00:00", "EventTime": "2024-05-21T12:24:44.264659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mC6y2YO1KWxJ25ee"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "0e95c917-e968-42e5-b63d-46f031b731cb", "DetectTime": "2024-05-21T12:24:44.276452+00:00", "EventTime": "2024-05-21T12:24:44.276470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTI823Fgd0ahKBMwd"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "fa99260f-a42d-4938-b1ce-cc5c729621de", "DetectTime": "2024-05-21T12:24:44.287011+00:00", "EventTime": "2024-05-21T12:24:44.287030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C232jl263sEVssRJp6"], "accumulated_threat_level": 4.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "baeb6f8a-ad3b-4488-a723-e5c531dcab2e", "DetectTime": "2024-05-21T12:24:44.292308+00:00", "EventTime": "2024-05-21T12:24:44.292332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGon4BIhyvmna9cld"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "f26e19b4-07a6-42e6-ae69-7ba3bf5145f5", "DetectTime": "2024-05-21T12:24:44.297618+00:00", "EventTime": "2024-05-21T12:24:44.297641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVM8F2oifbLY0mYMa"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "e41a1575-0830-4c8e-b87c-f7015106d918", "DetectTime": "2024-05-21T12:24:44.302342+00:00", "EventTime": "2024-05-21T12:24:44.302360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJEub2a4gqsfITIr"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "32e068b5-670a-48ee-a6f0-de8893ff9bb0", "DetectTime": "2024-05-21T12:24:44.309105+00:00", "EventTime": "2024-05-21T12:24:44.309125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBk0334MRo2xNrlYJl"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "46510c34-38c6-464d-a0b6-54696a404cf0", "DetectTime": "2024-05-21T12:24:44.320006+00:00", "EventTime": "2024-05-21T12:24:44.320024+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cad8qt2Cnmi2DXNkf2"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1e6836b8-bf67-46ce-991f-d784913ca866", "DetectTime": "2024-05-21T12:24:44.330943+00:00", "EventTime": "2024-05-21T12:24:44.330962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cad8qt2Cnmi2DXNkf2"], "accumulated_threat_level": 9.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "13dba0ff-2dd9-40b8-bfeb-3d8066d92dbc", "DetectTime": "2024-05-21T12:24:44.341704+00:00", "EventTime": "2024-05-21T12:24:44.341726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQ7wI3Gbm951zTeTg"], "accumulated_threat_level": 5.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "ec8c3e3a-8caa-46b4-9d19-f1de3bf6df4e", "DetectTime": "2024-05-21T12:24:44.346729+00:00", "EventTime": "2024-05-21T12:24:44.346748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvgAkR1UQHUAUacGU1"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "ddccf103-3480-4495-8041-645682e6bb31", "DetectTime": "2024-05-21T12:24:44.351424+00:00", "EventTime": "2024-05-21T12:24:44.351443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaWW83IHOw2QXGvO3"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "ce634000-de71-440b-a377-ebdb2afc1c0c", "DetectTime": "2024-05-21T12:24:44.355880+00:00", "EventTime": "2024-05-21T12:24:44.355898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlVJl4SXokhlqtM2f"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "eeeab211-aeb8-4185-9579-6cf13ce3a783", "DetectTime": "2024-05-21T12:24:44.361149+00:00", "EventTime": "2024-05-21T12:24:44.361169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eOIn2uMo1NWD9yxa"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "be5fa9bd-cee0-4696-820d-ad8e6e431758", "DetectTime": "2024-05-21T12:24:44.373885+00:00", "EventTime": "2024-05-21T12:24:44.373903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyPpX1gOfWnsEP8Lk"], "accumulated_threat_level": 6.1, "timewindow": 9} +{"Format": "IDEA0", "ID": "780e542a-4027-452b-974a-d5a64824bd9d", "DetectTime": "2024-05-21T12:24:44.383938+00:00", "EventTime": "2024-05-21T12:24:44.383955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx48Fk2vcXJ8TXCGtd"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 9} +{"Format": "IDEA0", "ID": "295f7575-5254-403e-8471-b0348104d2f2", "DetectTime": "2024-05-21T12:24:44.393714+00:00", "EventTime": "2024-05-21T12:24:44.393731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfM7AK1eIglQLuEnj7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 9} +{"Format": "IDEA0", "ID": "34ab4414-a564-46ec-9f59-3dd75abb5aff", "DetectTime": "2024-05-21T12:24:44.403678+00:00", "EventTime": "2024-05-21T12:24:44.403695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc23kZ1j0n0L5YP28j"], "accumulated_threat_level": 8.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "51148654-beb7-48aa-9dbb-150df5be5ad7", "DetectTime": "2024-05-21T12:24:44.415967+00:00", "EventTime": "2024-05-21T12:24:44.415987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mPVjTeoE2Q254Fj"], "accumulated_threat_level": 9.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "814f9974-bacf-44fb-a39d-5764f31a477d", "DetectTime": "2024-05-21T12:24:44.430848+00:00", "EventTime": "2024-05-21T12:24:44.430869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEBk34x0yst8YhGP"], "accumulated_threat_level": 10.100000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "5720fb79-edf4-4f22-a42e-0cfeb1982ebf", "DetectTime": "2024-05-21T12:24:44.442267+00:00", "EventTime": "2024-05-21T12:24:44.442286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtlx74BZJzsrgGLP2"], "accumulated_threat_level": 10.900000000000002, "timewindow": 9} +{"Format": "IDEA0", "ID": "b2e3ecee-2a56-460f-b5a4-69ffcb074fb6", "DetectTime": "2024-05-21T12:24:44.452347+00:00", "EventTime": "2024-05-21T12:24:44.452364+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOH0Eo5mvV86Cbsk"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "99a13cfb-c7cd-4511-8ee2-bc985d40a114", "DetectTime": "2024-05-21T12:24:44.463163+00:00", "EventTime": "2024-05-21T12:24:44.463180+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOH0Eo5mvV86Cbsk"], "accumulated_threat_level": 10.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "b2276779-f82a-488f-9446-2b2ed535a366", "DetectTime": "2024-05-21T12:24:44.473043+00:00", "EventTime": "2024-05-21T12:24:44.473062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCTCbE4ktJPMFQlkw2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 9} +{"Format": "IDEA0", "ID": "99860bbf-4fa3-41e5-84e4-e740df34c457", "DetectTime": "2024-05-21T12:24:44.477543+00:00", "EventTime": "2024-05-21T12:24:44.477560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOBGe1hV2RVe6c2M1"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "6a070d75-ae9d-4b7a-8ac5-3b68d61d4766", "DetectTime": "2024-05-21T12:24:44.491250+00:00", "EventTime": "2024-05-21T12:24:44.491269+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGYkD34IUsZQ1aIe2"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "da517f10-de01-454f-b128-823dd45c0bb6", "DetectTime": "2024-05-21T12:24:44.503515+00:00", "EventTime": "2024-05-21T12:24:44.503533+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGYkD34IUsZQ1aIe2"], "accumulated_threat_level": 10.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "f7f0e78b-704d-4515-92c4-d8a3824b9fa8", "DetectTime": "2024-05-21T12:24:44.514355+00:00", "EventTime": "2024-05-21T12:24:44.514373+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.119.190.39"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3I6OPovPwt77lr2c"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1ecdb29f-42a0-4580-bc91-fdc58da9f36a", "DetectTime": "2024-05-21T12:24:44.525759+00:00", "EventTime": "2024-05-21T12:24:44.525778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3I6OPovPwt77lr2c"], "accumulated_threat_level": 11.1, "timewindow": 8} +{"Format": "IDEA0", "ID": "5d67e76e-670d-4644-8c68-6c01936f1af7", "DetectTime": "2024-05-21T12:24:44.535855+00:00", "EventTime": "2024-05-21T12:24:44.535873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCgsLLo5oofsC1sb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 9} +{"Format": "Json", "ID": "5d67e76e-670d-4644-8c68-6c01936f1af7", "DetectTime": "2024-05-21T12:24:44.535855+00:00", "EventTime": "2024-05-21T12:24:44.535873+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "1970-01-01T08:08:27.697200+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:44.715057)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "3d1caab7-1873-4088-91f2-27f1b95b8fa6", "DetectTime": "2024-05-21T12:24:44.719297+00:00", "EventTime": "2024-05-21T12:24:44.719316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CubUDV3VppL2KJuKsh"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "e157ed5f-2104-4e6b-878d-5c65b27e163f", "DetectTime": "2024-05-21T12:24:44.744625+00:00", "EventTime": "2024-05-21T12:24:44.744643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvEZ715gqnDIFuigg"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b3a65bd7-42c5-41a3-b894-ce859342b45e", "DetectTime": "2024-05-21T12:24:44.765237+00:00", "EventTime": "2024-05-21T12:24:44.765257+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvEZ715gqnDIFuigg"], "accumulated_threat_level": 11.6, "timewindow": 8} +{"Format": "IDEA0", "ID": "a94da0a2-73fe-4f33-ac5b-a934a7b6e835", "DetectTime": "2024-05-21T12:24:44.770371+00:00", "EventTime": "2024-05-21T12:24:44.770390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vO3S3gZltXEoil6h"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "9411daa2-9c30-42a2-97ad-50959986997c", "DetectTime": "2024-05-21T12:24:44.781275+00:00", "EventTime": "2024-05-21T12:24:44.781292+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLTeP1StWB733ZRt3"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "610c197e-41c6-4ae3-b2d1-60682318a5c4", "DetectTime": "2024-05-21T12:24:44.792676+00:00", "EventTime": "2024-05-21T12:24:44.792695+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLTeP1StWB733ZRt3"], "accumulated_threat_level": 12.1, "timewindow": 8} +{"Format": "Json", "ID": "610c197e-41c6-4ae3-b2d1-60682318a5c4", "DetectTime": "2024-05-21T12:24:44.792676+00:00", "EventTime": "2024-05-21T12:24:44.792695+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "1970-01-01T07:05:36.749549+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:45.013587)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "a4f91d62-4a60-4294-bfda-c7aa203c997c", "DetectTime": "2024-05-21T12:24:45.026239+00:00", "EventTime": "2024-05-21T12:24:45.026260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpjAo4DTCQVMC3BEi"], "accumulated_threat_level": 0.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "df3b6c8d-8ca8-48a0-b531-1ff4a9052e37", "DetectTime": "2024-05-21T12:24:45.031456+00:00", "EventTime": "2024-05-21T12:24:45.031477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbzRT345YjjSq3IuBb"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "367325f6-4e36-4a9b-b7c5-a3816da6c59a", "DetectTime": "2024-05-21T12:24:45.036220+00:00", "EventTime": "2024-05-21T12:24:45.036240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiKx961VBAWAGSDp12"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "805acac3-40c2-4737-8446-dcd4dbe9303e", "DetectTime": "2024-05-21T12:24:45.047154+00:00", "EventTime": "2024-05-21T12:24:45.047173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLlGG1UssnkkEBEr6"], "accumulated_threat_level": 1.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "af1c61f3-8041-4081-b41c-dc89cf7d4d31", "DetectTime": "2024-05-21T12:24:45.059714+00:00", "EventTime": "2024-05-21T12:24:45.059732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzGfJu35NywhvhiYu9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "238d19a1-6e6e-4ec5-a1bc-3d6ed3c9f87d", "DetectTime": "2024-05-21T12:24:45.064400+00:00", "EventTime": "2024-05-21T12:24:45.064418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaaoX41brfzmvTM7S9"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "9931b45b-88f7-4bf7-b633-b4029b7fba50", "DetectTime": "2024-05-21T12:24:45.068979+00:00", "EventTime": "2024-05-21T12:24:45.068997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTm8U1ZOHmaGtYxQa"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "e3fff06f-a4c4-4e36-a9f6-47a53c947467", "DetectTime": "2024-05-21T12:24:45.081092+00:00", "EventTime": "2024-05-21T12:24:45.081115+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.129.61"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPwHoT1gLKLWPXD6Eb"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "92319045-c519-4ddf-b42b-1cd4cf21ba39", "DetectTime": "2024-05-21T12:24:45.092743+00:00", "EventTime": "2024-05-21T12:24:45.092759+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.129.61"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.129.61 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPwHoT1gLKLWPXD6Eb"], "accumulated_threat_level": 0.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "0104092f-5f3c-4761-9671-abf508db7b23", "DetectTime": "2024-05-21T12:24:45.104421+00:00", "EventTime": "2024-05-21T12:24:45.104442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MTUB3ZabrK4pPG52"], "accumulated_threat_level": 3.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "6a97da0f-669f-4d2b-95b6-17c767c2e12c", "DetectTime": "2024-05-21T12:24:45.115815+00:00", "EventTime": "2024-05-21T12:24:45.115833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.235.27.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXoXR8l2NIRYK1o0d"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "e798fef4-2654-46a9-8811-fdcb22581ba2", "DetectTime": "2024-05-21T12:24:45.128127+00:00", "EventTime": "2024-05-21T12:24:45.128145+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.235.27.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.235.27.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXoXR8l2NIRYK1o0d"], "accumulated_threat_level": 1.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "dda5ec10-82bb-4061-94c3-baee8918ec57", "DetectTime": "2024-05-21T12:24:45.133745+00:00", "EventTime": "2024-05-21T12:24:45.133763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigC3orWuMllaWj3i"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "d5be0221-958c-4844-85ec-82e4530674b3", "DetectTime": "2024-05-21T12:24:45.138761+00:00", "EventTime": "2024-05-21T12:24:45.138784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVrljJ39ViBAewzwr7"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "c5cb6122-f99f-4d28-a7ba-05985aa1e0f3", "DetectTime": "2024-05-21T12:24:45.149599+00:00", "EventTime": "2024-05-21T12:24:45.149617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGBZwU1ngaOJGUqzg"], "accumulated_threat_level": 4.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "a4aa9919-ea03-476c-8008-046b3db1ef1d", "DetectTime": "2024-05-21T12:24:45.160863+00:00", "EventTime": "2024-05-21T12:24:45.160883+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.119.190.39"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1egwx47jGJC89CZ93"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ebaf2428-3bc3-4e82-8557-038f1fe47619", "DetectTime": "2024-05-21T12:24:45.174247+00:00", "EventTime": "2024-05-21T12:24:45.174268+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.119.190.39"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.119.190.39 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1egwx47jGJC89CZ93"], "accumulated_threat_level": 1.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "256ad6b0-5c57-4b85-9d64-a8de3eee19e9", "DetectTime": "2024-05-21T12:24:45.185049+00:00", "EventTime": "2024-05-21T12:24:45.185067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcxGCP2fh6Oti3Z8qi"], "accumulated_threat_level": 4.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "f6f125f6-44d0-4fa9-b881-2ed8b465fe07", "DetectTime": "2024-05-21T12:24:45.195795+00:00", "EventTime": "2024-05-21T12:24:45.196225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggIF1xvMQ86NYqz1"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "8bf4d6df-d019-4a2c-aa95-eca8e1e9db90", "DetectTime": "2024-05-21T12:24:45.207640+00:00", "EventTime": "2024-05-21T12:24:45.207660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7uE032i5TF6bLd92"], "accumulated_threat_level": 5.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "2ad74622-b98e-4117-8060-2f26cecebe07", "DetectTime": "2024-05-21T12:24:45.218887+00:00", "EventTime": "2024-05-21T12:24:45.218906+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggIF1xvMQ86NYqz1"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "dca984c4-43a4-4d19-b4eb-adef84c4f97e", "DetectTime": "2024-05-21T12:24:45.229570+00:00", "EventTime": "2024-05-21T12:24:45.229587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "Connection to unknown destination port 23510/UDP destination IP 85.107.67.138. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVKE3KSAuE91pyzi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 9} +{"Format": "IDEA0", "ID": "72f9bfc8-646c-44a8-b8b6-b98de0e08ca6", "DetectTime": "2024-05-21T12:24:45.246509+00:00", "EventTime": "2024-05-21T12:24:45.246528+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusFAA4ldsiFEUHWEi"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d0a66e5e-1a26-4b35-b7df-12df8bf7b371", "DetectTime": "2024-05-21T12:24:45.275439+00:00", "EventTime": "2024-05-21T12:24:45.275460+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusFAA4ldsiFEUHWEi"], "accumulated_threat_level": 2.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "783b2660-2aaf-4e64-8439-5766b0ce3756", "DetectTime": "2024-05-21T12:24:45.280597+00:00", "EventTime": "2024-05-21T12:24:45.280616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1mNi4XAjCxmLZNai"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "e7f95027-3460-41df-8971-66772e11d9ff", "DetectTime": "2024-05-21T12:24:45.291257+00:00", "EventTime": "2024-05-21T12:24:45.291275+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqXOA3SQqvgd5Nepk"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "90337580-72e1-4d94-817a-d31686148107", "DetectTime": "2024-05-21T12:24:45.303277+00:00", "EventTime": "2024-05-21T12:24:45.303296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqXOA3SQqvgd5Nepk"], "accumulated_threat_level": 3.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7eaadfac-ca31-41c4-aa61-f61954a5fffb", "DetectTime": "2024-05-21T12:24:45.314221+00:00", "EventTime": "2024-05-21T12:24:45.314240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTs0A33If2qyjAbJ31"], "accumulated_threat_level": 7.199999999999999, "timewindow": 9} +{"Format": "IDEA0", "ID": "bbd7c713-e3e1-486c-b549-3e9d5a45f508", "DetectTime": "2024-05-21T12:24:45.325386+00:00", "EventTime": "2024-05-21T12:24:45.325404+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CebfPUvLwUL0ryTVl"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "f44a071c-9491-4c8e-9cc9-ee42a0f28a8c", "DetectTime": "2024-05-21T12:24:45.336284+00:00", "EventTime": "2024-05-21T12:24:45.336301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CebfPUvLwUL0ryTVl"], "accumulated_threat_level": 3.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "6ae88e90-af32-4418-9096-c01a8de264b3", "DetectTime": "2024-05-21T12:24:45.340622+00:00", "EventTime": "2024-05-21T12:24:45.340638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphkXGzk2Be8wwx6e"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "3c9567ac-58c3-4879-8279-b8ddf3e9fb1e", "DetectTime": "2024-05-21T12:24:45.351318+00:00", "EventTime": "2024-05-21T12:24:45.351338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHAXADp4RTdcsb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 9} +{"Format": "IDEA0", "ID": "f34ae792-7074-4b0c-a57e-717651bea23b", "DetectTime": "2024-05-21T12:24:45.362255+00:00", "EventTime": "2024-05-21T12:24:45.362272+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLY07O1DPyI6mVEpy"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7cd2a2ea-dfda-4e49-bbcc-e163bf32572d", "DetectTime": "2024-05-21T12:24:45.373406+00:00", "EventTime": "2024-05-21T12:24:45.373423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLY07O1DPyI6mVEpy"], "accumulated_threat_level": 4.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b56eb0f7-5ebd-41c4-a2ac-4d909254475a", "DetectTime": "2024-05-21T12:24:45.383158+00:00", "EventTime": "2024-05-21T12:24:45.383175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCStMvYgJBcMPCJe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 9} +{"Format": "IDEA0", "ID": "3bdcf1e0-136e-4fed-a93b-302ddcd91d5e", "DetectTime": "2024-05-21T12:24:45.394553+00:00", "EventTime": "2024-05-21T12:24:45.394571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrTSf1EvgK8lld4K5"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b5b47558-62a0-47f5-9345-2d73f733ec65", "DetectTime": "2024-05-21T12:24:45.406566+00:00", "EventTime": "2024-05-21T12:24:45.406584+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrTSf1EvgK8lld4K5"], "accumulated_threat_level": 4.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "09ea28d5-6316-4b79-8d40-9a3017585fc8", "DetectTime": "2024-05-21T12:24:45.416665+00:00", "EventTime": "2024-05-21T12:24:45.416683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "Connection to unknown destination port 8825/UDP destination IP 200.120.218.207. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9V4eQ1GGJK0mJHU09"], "accumulated_threat_level": 9.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "49a10d6a-81bf-4ef7-b069-017b53f4aa1a", "DetectTime": "2024-05-21T12:24:45.427052+00:00", "EventTime": "2024-05-21T12:24:45.427069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoJ5P1prkwrwDRRKd"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "5ddc819a-fbcb-425c-b474-f980db281458", "DetectTime": "2024-05-21T12:24:45.439838+00:00", "EventTime": "2024-05-21T12:24:45.439859+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoJ5P1prkwrwDRRKd"], "accumulated_threat_level": 5.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "faa54f57-c2b2-41f5-93f6-2913b71f4866", "DetectTime": "2024-05-21T12:24:45.450164+00:00", "EventTime": "2024-05-21T12:24:45.450182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc0fg5bU7CfsHiz2"], "accumulated_threat_level": 10.4, "timewindow": 9} +{"Format": "IDEA0", "ID": "0a47ffc0-7bcb-401b-aec6-7cc819b6ec7e", "DetectTime": "2024-05-21T12:24:45.460091+00:00", "EventTime": "2024-05-21T12:24:45.460109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qQh54d8q2PVX4cCl"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9b6c262d-2d36-4c22-b475-85e666bcf5c4", "DetectTime": "2024-05-21T12:24:45.470917+00:00", "EventTime": "2024-05-21T12:24:45.470935+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qQh54d8q2PVX4cCl"], "accumulated_threat_level": 5.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "f0aadea6-73bc-42fd-9cf2-1cc01ea6678c", "DetectTime": "2024-05-21T12:24:45.475451+00:00", "EventTime": "2024-05-21T12:24:45.475469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLd4C34uYgKWOI4FSf"], "accumulated_threat_level": 4.2, "timewindow": 5} +{"Format": "IDEA0", "ID": "e49e2aed-814e-4b64-b612-1b76ddb5b8c1", "DetectTime": "2024-05-21T12:24:45.487555+00:00", "EventTime": "2024-05-21T12:24:45.487574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJgdXl2c2P0WEfpTJa"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9e185a9d-c625-461a-b77c-7c8a3df453e1", "DetectTime": "2024-05-21T12:24:45.499386+00:00", "EventTime": "2024-05-21T12:24:45.499406+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJgdXl2c2P0WEfpTJa"], "accumulated_threat_level": 6.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3a23090b-d37a-4e11-bf30-1f0991b01906", "DetectTime": "2024-05-21T12:24:45.509208+00:00", "EventTime": "2024-05-21T12:24:45.509225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyiCXY3JliL158Xci6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "71453ffc-5bf0-46f5-bd67-8f49e89c3e87", "DetectTime": "2024-05-21T12:24:45.520668+00:00", "EventTime": "2024-05-21T12:24:45.520689+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfndwV1dbvryP2AP0k"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "61d93e1f-ddfc-49a8-8582-7b039f6b13fe", "DetectTime": "2024-05-21T12:24:45.531757+00:00", "EventTime": "2024-05-21T12:24:45.531776+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfndwV1dbvryP2AP0k"], "accumulated_threat_level": 6.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "5c5eb5f8-c0e4-4348-b640-ec24a2b5c51e", "DetectTime": "2024-05-21T12:24:45.541851+00:00", "EventTime": "2024-05-21T12:24:45.541869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czsc8w2PUy0pqYcKU7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 9} +{"Format": "Json", "ID": "5c5eb5f8-c0e4-4348-b640-ec24a2b5c51e", "DetectTime": "2024-05-21T12:24:45.541851+00:00", "EventTime": "2024-05-21T12:24:45.541869+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "1970-01-01T08:08:32.081985+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:45.703861)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1282e445-5099-4cdc-9bfc-8673349f9dc7", "DetectTime": "2024-05-21T12:24:45.715679+00:00", "EventTime": "2024-05-21T12:24:45.715701+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkLML3V5yhlLbaxcf"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d6ae17e4-8ddf-40b7-b6ce-6ea94dda58fa", "DetectTime": "2024-05-21T12:24:45.727715+00:00", "EventTime": "2024-05-21T12:24:45.727733+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkLML3V5yhlLbaxcf"], "accumulated_threat_level": 7.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "424dad28-e60d-4433-8d47-e68331a6f24d", "DetectTime": "2024-05-21T12:24:45.739182+00:00", "EventTime": "2024-05-21T12:24:45.739198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjOEuJVf3P7ONG5qi"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3f7a79c5-3fe3-4798-a997-0e48172cbb47", "DetectTime": "2024-05-21T12:24:45.749579+00:00", "EventTime": "2024-05-21T12:24:45.749597+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjOEuJVf3P7ONG5qi"], "accumulated_threat_level": 7.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "972964b4-9cce-43ee-9783-be446a62e2a2", "DetectTime": "2024-05-21T12:24:45.759835+00:00", "EventTime": "2024-05-21T12:24:45.759853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZMp64X94mkzzYX53"], "accumulated_threat_level": 0.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "0d544e42-f0c8-4793-935d-5ca535340bb2", "DetectTime": "2024-05-21T12:24:45.770058+00:00", "EventTime": "2024-05-21T12:24:45.770075+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHP9GH3efAOZ4RdEi"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "89c23cd0-8be4-495e-8a65-a1f65c62bb51", "DetectTime": "2024-05-21T12:24:45.780836+00:00", "EventTime": "2024-05-21T12:24:45.780853+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHP9GH3efAOZ4RdEi"], "accumulated_threat_level": 8.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "af2eea8a-ed65-434c-b630-b1034e683124", "DetectTime": "2024-05-21T12:24:45.792121+00:00", "EventTime": "2024-05-21T12:24:45.792143+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cffbct2nqHbs4le2We"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1fe35db9-3b6a-4383-b03f-a1e13048f007", "DetectTime": "2024-05-21T12:24:45.803243+00:00", "EventTime": "2024-05-21T12:24:45.803261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cffbct2nqHbs4le2We"], "accumulated_threat_level": 8.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "10e13d8c-79ed-4872-9c23-cb391c6132a5", "DetectTime": "2024-05-21T12:24:45.813528+00:00", "EventTime": "2024-05-21T12:24:45.813545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RShkQe1I38ZER1e"], "accumulated_threat_level": 1.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "43ca75bf-acef-486a-97c0-d3224046aa74", "DetectTime": "2024-05-21T12:24:45.825055+00:00", "EventTime": "2024-05-21T12:24:45.825074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46oAE2NVEnRs7Cqhf"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "0dcded7e-b4fe-4741-a067-6ffdc11f9688", "DetectTime": "2024-05-21T12:24:45.835991+00:00", "EventTime": "2024-05-21T12:24:45.836013+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46oAE2NVEnRs7Cqhf"], "accumulated_threat_level": 9.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "20f0ac65-b13d-4729-92a5-3739d1849c43", "DetectTime": "2024-05-21T12:24:45.847687+00:00", "EventTime": "2024-05-21T12:24:45.847709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvvLt3DrgNgc7EVyd"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "61d9b4f7-6269-4ac8-8f0a-70e97b76bd7e", "DetectTime": "2024-05-21T12:24:45.861278+00:00", "EventTime": "2024-05-21T12:24:45.861300+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvvLt3DrgNgc7EVyd"], "accumulated_threat_level": 9.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "f35f863b-def7-4ceb-a34d-8d4c7887a0e3", "DetectTime": "2024-05-21T12:24:45.871581+00:00", "EventTime": "2024-05-21T12:24:45.871607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RZoAVeTpYM51KFf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "9c178e1d-3452-4a56-a955-ea7a30c6c90b", "DetectTime": "2024-05-21T12:24:45.883507+00:00", "EventTime": "2024-05-21T12:24:45.883527+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.83.114.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CriKou3iIJmn1lq7Fb"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "31229fea-52de-4a37-aca2-01233ae0c83d", "DetectTime": "2024-05-21T12:24:45.894602+00:00", "EventTime": "2024-05-21T12:24:45.894620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CriKou3iIJmn1lq7Fb"], "accumulated_threat_level": 10.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "a50ff826-fe33-431f-8710-039198133d3b", "DetectTime": "2024-05-21T12:24:45.899526+00:00", "EventTime": "2024-05-21T12:24:45.899544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4Mnx12bntog8iUEa"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "26187a02-6d71-4266-9a74-85bd8ef2a0e8", "DetectTime": "2024-05-21T12:24:45.912352+00:00", "EventTime": "2024-05-21T12:24:45.912369+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.165.116.48"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUrvt1U2BFL30ROb4"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "0833f192-6fba-49cb-840b-53b073c861ce", "DetectTime": "2024-05-21T12:24:45.924165+00:00", "EventTime": "2024-05-21T12:24:45.924185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUrvt1U2BFL30ROb4"], "accumulated_threat_level": 10.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "98f78d08-ae00-453e-a6f4-777c1182cade", "DetectTime": "2024-05-21T12:24:45.951223+00:00", "EventTime": "2024-05-21T12:24:45.951243+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca3AxE21eRi1DwNkLg"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "40523fef-187d-495b-b9dd-ea4dffa21269", "DetectTime": "2024-05-21T12:24:45.963206+00:00", "EventTime": "2024-05-21T12:24:45.963224+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca3AxE21eRi1DwNkLg"], "accumulated_threat_level": 11.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "03ff53a7-4346-4939-b741-46c231a10df3", "DetectTime": "2024-05-21T12:24:45.975025+00:00", "EventTime": "2024-05-21T12:24:45.975046+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq8keK3E84gJafphHl"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "34cddd81-81ea-4b5f-a94c-ca969d2c85d3", "DetectTime": "2024-05-21T12:24:45.987012+00:00", "EventTime": "2024-05-21T12:24:45.987034+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq8keK3E84gJafphHl"], "accumulated_threat_level": 11.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "2ffc4465-ab84-490f-bb12-6720393134ac", "DetectTime": "2024-05-21T12:24:46.002281+00:00", "EventTime": "2024-05-21T12:24:46.002302+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.49.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8CT44xPR7EaUsVX8"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9d8c90a8-2011-4399-b0ce-dc9c257e42e3", "DetectTime": "2024-05-21T12:24:46.014972+00:00", "EventTime": "2024-05-21T12:24:46.014991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8CT44xPR7EaUsVX8"], "accumulated_threat_level": 12.0, "timewindow": 8} +{"Format": "Json", "ID": "9d8c90a8-2011-4399-b0ce-dc9c257e42e3", "DetectTime": "2024-05-21T12:24:46.014972+00:00", "EventTime": "2024-05-21T12:24:46.014991+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "1970-01-01T07:37:18.756096+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 8. (real time 2024/05/21 12:24:46.292807)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 8, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "3c508e45-c446-49a0-9202-6cf5e96b20db", "DetectTime": "2024-05-21T12:24:46.304852+00:00", "EventTime": "2024-05-21T12:24:46.304870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMX1Ober3ft8wYOb"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "573248cf-120e-42b8-8139-467ab2a280e6", "DetectTime": "2024-05-21T12:24:46.321789+00:00", "EventTime": "2024-05-21T12:24:46.321808+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMX1Ober3ft8wYOb"], "accumulated_threat_level": 0.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "65b27936-fdb3-4585-bb0a-2c6ebf9d7e20", "DetectTime": "2024-05-21T12:24:46.332953+00:00", "EventTime": "2024-05-21T12:24:46.332970+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl13QP1QZ4XgLiwjj1"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "710d177c-93bd-477c-ad83-fc94e93a1552", "DetectTime": "2024-05-21T12:24:46.344599+00:00", "EventTime": "2024-05-21T12:24:46.344617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl13QP1QZ4XgLiwjj1"], "accumulated_threat_level": 1.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3ebea6e5-1948-43df-83a3-3433528566cf", "DetectTime": "2024-05-21T12:24:46.349166+00:00", "EventTime": "2024-05-21T12:24:46.349184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcR5ZI1BtQYPO1ep61"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "168317e5-f184-483a-a41d-1c434aae1b9f", "DetectTime": "2024-05-21T12:24:46.353729+00:00", "EventTime": "2024-05-21T12:24:46.353747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TkK33xy7hlPsmr13"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "aaad700f-79f9-4ca6-850f-a5039fceab4b", "DetectTime": "2024-05-21T12:24:46.364116+00:00", "EventTime": "2024-05-21T12:24:46.364134+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDZnI1dHvGk8jPXIc"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7abe3bbf-c56f-487e-8e70-71bef4e74591", "DetectTime": "2024-05-21T12:24:46.375217+00:00", "EventTime": "2024-05-21T12:24:46.375235+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDZnI1dHvGk8jPXIc"], "accumulated_threat_level": 1.5, "timewindow": 8} +{"Format": "IDEA0", "ID": "49fc9e87-7bbf-47e8-85c8-b19d5ca480d5", "DetectTime": "2024-05-21T12:24:46.386421+00:00", "EventTime": "2024-05-21T12:24:46.386440+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ORdy4EFMNelOeQCk"], "accumulated_threat_level": 0, "timewindow": 8} +{"Format": "IDEA0", "ID": "e9d2abbc-d794-4072-9ce1-e94a2549a67b", "DetectTime": "2024-05-21T12:24:46.397559+00:00", "EventTime": "2024-05-21T12:24:46.397577+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ORdy4EFMNelOeQCk"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "a8292df6-f713-40bd-9933-bad44f9c2a96", "DetectTime": "2024-05-21T12:24:46.401902+00:00", "EventTime": "2024-05-21T12:24:46.401919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ILG51RkqYst1NHQa"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "170ad45f-1a5e-4048-b2a2-91783c8077de", "DetectTime": "2024-05-21T12:24:46.406739+00:00", "EventTime": "2024-05-21T12:24:46.406759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQJKx2Vj0VKuwoCla"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2f0b7864-1981-44af-a107-6d27725151d1", "DetectTime": "2024-05-21T12:24:46.411897+00:00", "EventTime": "2024-05-21T12:24:46.411921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFrCb4PKE4TMzUL"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "5019a943-a4cf-4f08-b9bd-57fa5f4cfc7b", "DetectTime": "2024-05-21T12:24:46.424104+00:00", "EventTime": "2024-05-21T12:24:46.424123+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.165.116.48"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cklfcy1XRmfo6FDMt9"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "71d1b85a-f0d3-4faa-8875-365e2a333550", "DetectTime": "2024-05-21T12:24:46.435166+00:00", "EventTime": "2024-05-21T12:24:46.435184+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.165.116.48"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.116.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cklfcy1XRmfo6FDMt9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "2d35c831-ecb7-42a2-a262-508e83340052", "DetectTime": "2024-05-21T12:24:46.445502+00:00", "EventTime": "2024-05-21T12:24:46.445520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYy2L8r3ikS0VP7"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "27073d62-dc8b-42e7-a161-d270f6b5f6e5", "DetectTime": "2024-05-21T12:24:46.455623+00:00", "EventTime": "2024-05-21T12:24:46.455640+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cst6kf1bXgc4tXErZ3"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "ae1d1449-2bb7-4346-850c-74c8d17d4b85", "DetectTime": "2024-05-21T12:24:46.466526+00:00", "EventTime": "2024-05-21T12:24:46.466544+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cst6kf1bXgc4tXErZ3"], "accumulated_threat_level": 4.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "c9891c7a-d0ee-4146-b2f1-2fe436207424", "DetectTime": "2024-05-21T12:24:46.478511+00:00", "EventTime": "2024-05-21T12:24:46.478530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTI823Fgd0ahKBMwd"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "aff304e1-ed93-4d5a-9c10-28ba5e6ea647", "DetectTime": "2024-05-21T12:24:46.490247+00:00", "EventTime": "2024-05-21T12:24:46.490264+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTI823Fgd0ahKBMwd"], "accumulated_threat_level": 4.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9063b35d-6b23-4b0f-8873-1b45e59c93d1", "DetectTime": "2024-05-21T12:24:46.502382+00:00", "EventTime": "2024-05-21T12:24:46.502399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyPpX1gOfWnsEP8Lk"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "e460fc15-e623-40d4-a9e7-f8ee5103ee4a", "DetectTime": "2024-05-21T12:24:46.515570+00:00", "EventTime": "2024-05-21T12:24:46.515587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyPpX1gOfWnsEP8Lk"], "accumulated_threat_level": 5.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "c3d7cf80-0d3c-4de3-81da-8f1e1716f67b", "DetectTime": "2024-05-21T12:24:46.526290+00:00", "EventTime": "2024-05-21T12:24:46.526309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGPJt3x603idYbQ07"], "accumulated_threat_level": 6.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "28af5d75-ee2c-452f-b6bd-dca49c8a118a", "DetectTime": "2024-05-21T12:24:46.536812+00:00", "EventTime": "2024-05-21T12:24:46.536829+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfM7AK1eIglQLuEnj7"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "688fb6c5-5d10-4b18-ae8b-793549685913", "DetectTime": "2024-05-21T12:24:46.548535+00:00", "EventTime": "2024-05-21T12:24:46.548555+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfM7AK1eIglQLuEnj7"], "accumulated_threat_level": 6.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "fc6b53a0-9b57-491a-9b87-8bcee546dbc8", "DetectTime": "2024-05-21T12:24:46.559899+00:00", "EventTime": "2024-05-21T12:24:46.559918+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc23kZ1j0n0L5YP28j"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "e99b4aab-a106-4939-b5cc-201622ed2cc3", "DetectTime": "2024-05-21T12:24:46.570990+00:00", "EventTime": "2024-05-21T12:24:46.571013+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc23kZ1j0n0L5YP28j"], "accumulated_threat_level": 7.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "9f0e3dba-64eb-4fcf-ab33-cd1c6cfad9d4", "DetectTime": "2024-05-21T12:24:46.576126+00:00", "EventTime": "2024-05-21T12:24:46.576146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UwvS06cGQhCkXI3"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "ccdaad61-bc7b-43f4-8b59-43e58e8ceb73", "DetectTime": "2024-05-21T12:24:46.581244+00:00", "EventTime": "2024-05-21T12:24:46.581264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUcfp2dEv8IPPe7Ya"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "08b08912-3ceb-480f-a54a-9e01f1b7a1f3", "DetectTime": "2024-05-21T12:24:46.594695+00:00", "EventTime": "2024-05-21T12:24:46.594713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpjAo4DTCQVMC3BEi"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "5848345d-2324-4a17-bac1-1f6d2f0d0b11", "DetectTime": "2024-05-21T12:24:46.599326+00:00", "EventTime": "2024-05-21T12:24:46.599344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNOJB40D5csBTsQfk"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "462c6870-bf23-4aa8-8937-be1f37070d8f", "DetectTime": "2024-05-21T12:24:46.612387+00:00", "EventTime": "2024-05-21T12:24:46.612405+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpjAo4DTCQVMC3BEi"], "accumulated_threat_level": 7.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "310ea267-b2c2-4e72-9f18-65283de6b644", "DetectTime": "2024-05-21T12:24:46.617168+00:00", "EventTime": "2024-05-21T12:24:46.617186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HRUWWQhr51xf2Yc"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "fe114b31-3fb9-4b33-ac04-910a027fdd0d", "DetectTime": "2024-05-21T12:24:46.628778+00:00", "EventTime": "2024-05-21T12:24:46.628797+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLlGG1UssnkkEBEr6"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "4ea3eb48-9944-481c-b130-b171f8cc1f4c", "DetectTime": "2024-05-21T12:24:46.640465+00:00", "EventTime": "2024-05-21T12:24:46.640484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLlGG1UssnkkEBEr6"], "accumulated_threat_level": 8.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "99b9c0c3-462c-4bb3-be2d-4ad30226ec73", "DetectTime": "2024-05-21T12:24:46.650810+00:00", "EventTime": "2024-05-21T12:24:46.650828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqoU0l2w6iowhPO03f"], "accumulated_threat_level": 8.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "73effd43-a7df-4957-bfd2-2868c87d39a5", "DetectTime": "2024-05-21T12:24:46.661717+00:00", "EventTime": "2024-05-21T12:24:46.661734+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGBZwU1ngaOJGUqzg"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "de8d040c-b331-4f50-9ac5-8236644b2f37", "DetectTime": "2024-05-21T12:24:46.674652+00:00", "EventTime": "2024-05-21T12:24:46.674671+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGBZwU1ngaOJGUqzg"], "accumulated_threat_level": 9.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "2941152c-7577-430a-a7c8-b124fb911339", "DetectTime": "2024-05-21T12:24:46.679534+00:00", "EventTime": "2024-05-21T12:24:46.679552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHB3e4Jqb5cWq216"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b9820b11-8d17-4566-90c3-571531a3e2f2", "DetectTime": "2024-05-21T12:24:46.683979+00:00", "EventTime": "2024-05-21T12:24:46.683997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9THC4hrczi7Ukgab"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "da28aca9-251c-45aa-a553-a89a3ac9b9f8", "DetectTime": "2024-05-21T12:24:46.696629+00:00", "EventTime": "2024-05-21T12:24:46.696651+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7uE032i5TF6bLd92"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "07f20334-11e0-493e-97f4-0aedaf73a6da", "DetectTime": "2024-05-21T12:24:46.710265+00:00", "EventTime": "2024-05-21T12:24:46.710284+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7uE032i5TF6bLd92"], "accumulated_threat_level": 9.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "e8718948-7338-4b78-89c7-d078be8d1268", "DetectTime": "2024-05-21T12:24:46.722990+00:00", "EventTime": "2024-05-21T12:24:46.723011+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVKE3KSAuE91pyzi"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "02ea98d6-0e34-494a-a7ef-4c12ea211633", "DetectTime": "2024-05-21T12:24:46.734295+00:00", "EventTime": "2024-05-21T12:24:46.734312+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVKE3KSAuE91pyzi"], "accumulated_threat_level": 10.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "04d2f562-037e-4e9d-8d3d-5c5b1fbc7323", "DetectTime": "2024-05-21T12:24:46.739548+00:00", "EventTime": "2024-05-21T12:24:46.739566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0IHp2O5pSOIOe9V6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "374b70d2-256f-48da-9bcf-15d9c654d5b6", "DetectTime": "2024-05-21T12:24:46.750598+00:00", "EventTime": "2024-05-21T12:24:46.750618+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHAXADp4RTdcsb"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "82a3e46c-dc3e-4d6d-869e-eb083abed07e", "DetectTime": "2024-05-21T12:24:46.763616+00:00", "EventTime": "2024-05-21T12:24:46.763637+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHAXADp4RTdcsb"], "accumulated_threat_level": 10.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "1c6b2b08-5699-4e2b-899e-b03e93ab4f46", "DetectTime": "2024-05-21T12:24:46.768972+00:00", "EventTime": "2024-05-21T12:24:46.768996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutMaL32LbdRTSURDa"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2c19f6c8-350c-4167-9c15-b2ad7785c8ae", "DetectTime": "2024-05-21T12:24:46.780107+00:00", "EventTime": "2024-05-21T12:24:46.780124+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCStMvYgJBcMPCJe"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "58d66f19-0c4b-4869-858a-20ce1c2fef4f", "DetectTime": "2024-05-21T12:24:46.790707+00:00", "EventTime": "2024-05-21T12:24:46.790725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCStMvYgJBcMPCJe"], "accumulated_threat_level": 11.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "5a313a15-0e3a-4d4e-b2da-cd46894a1612", "DetectTime": "2024-05-21T12:24:46.800180+00:00", "EventTime": "2024-05-21T12:24:46.800197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDxgj1WQEoSbPYDf"], "accumulated_threat_level": 12.100000000000001, "timewindow": 9} +{"Format": "Json", "ID": "5a313a15-0e3a-4d4e-b2da-cd46894a1612", "DetectTime": "2024-05-21T12:24:46.800180+00:00", "EventTime": "2024-05-21T12:24:46.800197+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "1970-01-01T08:09:10.705731+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:47.223406)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "8312ff3b-d0a2-4a17-965b-424690a2ad37", "DetectTime": "2024-05-21T12:24:47.227324+00:00", "EventTime": "2024-05-21T12:24:47.227342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEy5Bh1GTmDsEY9up6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "9d84af53-f1e2-4f39-a901-fb92c3825871", "DetectTime": "2024-05-21T12:24:47.242948+00:00", "EventTime": "2024-05-21T12:24:47.242968+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9V4eQ1GGJK0mJHU09"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "52ce01fa-a78a-46fe-bb23-d2ddbe9a09fe", "DetectTime": "2024-05-21T12:24:47.253773+00:00", "EventTime": "2024-05-21T12:24:47.253791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9V4eQ1GGJK0mJHU09"], "accumulated_threat_level": 0.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "692d4dc9-5e0c-4eee-8662-925c2e919796", "DetectTime": "2024-05-21T12:24:47.258259+00:00", "EventTime": "2024-05-21T12:24:47.258276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYv2L3q7cUbYE4GJ"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "c063dc46-deab-4793-9f7a-94d0e5fc9227", "DetectTime": "2024-05-21T12:24:47.268940+00:00", "EventTime": "2024-05-21T12:24:47.268957+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc0fg5bU7CfsHiz2"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "cf55c4c1-c2c0-49ec-9879-ab06a7a53740", "DetectTime": "2024-05-21T12:24:47.280983+00:00", "EventTime": "2024-05-21T12:24:47.281001+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc0fg5bU7CfsHiz2"], "accumulated_threat_level": 1.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "a424b274-b1d2-4b15-bd97-55ea9328ac35", "DetectTime": "2024-05-21T12:24:47.291418+00:00", "EventTime": "2024-05-21T12:24:47.291436+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyiCXY3JliL158Xci6"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "d559477a-5be7-4306-ba17-e5762884908b", "DetectTime": "2024-05-21T12:24:47.302600+00:00", "EventTime": "2024-05-21T12:24:47.302619+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyiCXY3JliL158Xci6"], "accumulated_threat_level": 1.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "36c8aa6f-2fc6-4c95-8551-7b3fffcb432f", "DetectTime": "2024-05-21T12:24:47.306990+00:00", "EventTime": "2024-05-21T12:24:47.307008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYthp3EeI7RaFFNSg"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3694a0bc-0e76-4dd9-8d8f-8c7e764a3284", "DetectTime": "2024-05-21T12:24:47.317130+00:00", "EventTime": "2024-05-21T12:24:47.317148+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czsc8w2PUy0pqYcKU7"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "e404c1cd-ff2f-4b9b-8c70-eaa949173727", "DetectTime": "2024-05-21T12:24:47.328553+00:00", "EventTime": "2024-05-21T12:24:47.328573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czsc8w2PUy0pqYcKU7"], "accumulated_threat_level": 2.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "e7325c6b-6ee4-4d74-9a25-39831a741984", "DetectTime": "2024-05-21T12:24:47.333093+00:00", "EventTime": "2024-05-21T12:24:47.333111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7q5m2gZvW8iQrn85"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "adc91563-622d-4f80-a54f-0aad802a49a8", "DetectTime": "2024-05-21T12:24:47.343670+00:00", "EventTime": "2024-05-21T12:24:47.343688+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZMp64X94mkzzYX53"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "396242a4-96e0-4046-83d4-8dc8875c2641", "DetectTime": "2024-05-21T12:24:47.359786+00:00", "EventTime": "2024-05-21T12:24:47.359822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZMp64X94mkzzYX53"], "accumulated_threat_level": 2.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "43518751-61e0-4cc8-8b46-fb7eb00d0cf8", "DetectTime": "2024-05-21T12:24:47.372777+00:00", "EventTime": "2024-05-21T12:24:47.372797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17Nea1ZQY7XVQTUx9"], "accumulated_threat_level": 3.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "cc5d3b15-258b-4131-a378-ec9e586791bf", "DetectTime": "2024-05-21T12:24:47.383351+00:00", "EventTime": "2024-05-21T12:24:47.383368+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.83.114.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTh3y1SPMnkNoloig"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "91b76e37-ded9-4ba6-9429-b7a39896313d", "DetectTime": "2024-05-21T12:24:47.394472+00:00", "EventTime": "2024-05-21T12:24:47.394490+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTh3y1SPMnkNoloig"], "accumulated_threat_level": 3.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "0abc96a2-9125-4722-b852-d506ae16d846", "DetectTime": "2024-05-21T12:24:47.405025+00:00", "EventTime": "2024-05-21T12:24:47.405042+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RShkQe1I38ZER1e"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "fb943cca-4496-4ee4-9b42-e1e20308a767", "DetectTime": "2024-05-21T12:24:47.415893+00:00", "EventTime": "2024-05-21T12:24:47.415912+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RShkQe1I38ZER1e"], "accumulated_threat_level": 4.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "6df8e2d4-2fb7-4af5-a8ae-cff70912840e", "DetectTime": "2024-05-21T12:24:47.425427+00:00", "EventTime": "2024-05-21T12:24:47.425444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQYreHyYeaGv3vF9"], "accumulated_threat_level": 5.1, "timewindow": 9} +{"Format": "IDEA0", "ID": "13f20b9a-c92a-453d-82db-6416fddd0fb5", "DetectTime": "2024-05-21T12:24:47.436482+00:00", "EventTime": "2024-05-21T12:24:47.436500+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RZoAVeTpYM51KFf"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "aac591a8-1f95-4950-bff1-47c2dbfcd6de", "DetectTime": "2024-05-21T12:24:47.447681+00:00", "EventTime": "2024-05-21T12:24:47.447698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RZoAVeTpYM51KFf"], "accumulated_threat_level": 5.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "b2b6b1a0-02b2-48b6-98e7-87969826c646", "DetectTime": "2024-05-21T12:24:47.457176+00:00", "EventTime": "2024-05-21T12:24:47.457194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQQMz3XIFd1Oee1w"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 9} +{"Format": "IDEA0", "ID": "a3244c01-090d-4500-be1d-d6720552e4b4", "DetectTime": "2024-05-21T12:24:47.468042+00:00", "EventTime": "2024-05-21T12:24:47.468061+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.49.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU69MVukdHbs6krWc"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "0d442b51-0efd-4927-89ae-20a9aab3c1a9", "DetectTime": "2024-05-21T12:24:47.479033+00:00", "EventTime": "2024-05-21T12:24:47.479051+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU69MVukdHbs6krWc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 9} +{"Format": "IDEA0", "ID": "0d496de4-a195-4598-815f-4bf3b086ce8c", "DetectTime": "2024-05-21T12:24:47.489181+00:00", "EventTime": "2024-05-21T12:24:47.489199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKu6O51EPFMbv6u7D9"], "accumulated_threat_level": 7.699999999999999, "timewindow": 9} +{"Format": "IDEA0", "ID": "10fd0f8b-d54a-4169-beec-d8f95638ee3c", "DetectTime": "2024-05-21T12:24:47.500785+00:00", "EventTime": "2024-05-21T12:24:47.500804+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYy2L8r3ikS0VP7"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "f0ff3d2f-7154-4cd9-87e6-ed94d9c0bf6d", "DetectTime": "2024-05-21T12:24:47.513441+00:00", "EventTime": "2024-05-21T12:24:47.513464+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYy2L8r3ikS0VP7"], "accumulated_threat_level": 8.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "ac102a35-21ca-45ea-b8b8-bd712fb8ddc0", "DetectTime": "2024-05-21T12:24:47.526151+00:00", "EventTime": "2024-05-21T12:24:47.526170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqoU0l2w6iowhPO03f"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "9415c504-d760-4e12-a43a-2a6dbc97dc7d", "DetectTime": "2024-05-21T12:24:47.537141+00:00", "EventTime": "2024-05-21T12:24:47.537160+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqoU0l2w6iowhPO03f"], "accumulated_threat_level": 8.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "145935b1-ec8d-4295-a832-16f003c5e3ae", "DetectTime": "2024-05-21T12:24:47.541607+00:00", "EventTime": "2024-05-21T12:24:47.541625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT74Id3dSjWWNuNLb2"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f939881a-d08f-4c0f-b968-398051c01b16", "DetectTime": "2024-05-21T12:24:47.552733+00:00", "EventTime": "2024-05-21T12:24:47.552750+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQQMz3XIFd1Oee1w"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "4d2406aa-5e1f-4a87-b0d5-a5724f1385bd", "DetectTime": "2024-05-21T12:24:47.563486+00:00", "EventTime": "2024-05-21T12:24:47.563506+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQQMz3XIFd1Oee1w"], "accumulated_threat_level": 9.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "236dbc37-d21b-4eed-b6c8-84083e27bc77", "DetectTime": "2024-05-21T12:24:47.568019+00:00", "EventTime": "2024-05-21T12:24:47.568036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKj4l4vH1XEjYtJTi"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "df2d6273-ec37-431f-a381-74a17602ba70", "DetectTime": "2024-05-21T12:24:47.572484+00:00", "EventTime": "2024-05-21T12:24:47.572502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zqpw4kldiqdltcSi"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2a5eeda7-0090-475b-8777-fc75ed58fd7f", "DetectTime": "2024-05-21T12:24:47.577070+00:00", "EventTime": "2024-05-21T12:24:47.577094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgv14b1dw0xJBAqZ9d"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "685c165f-2e0f-459c-9cbd-9511bb45d1a2", "DetectTime": "2024-05-21T12:24:47.582154+00:00", "EventTime": "2024-05-21T12:24:47.582173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClxQ7qq6M1MVGz0q8"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3fff300f-f7f2-4da5-9b31-d5fe40347f5e", "DetectTime": "2024-05-21T12:24:47.593849+00:00", "EventTime": "2024-05-21T12:24:47.593868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJl72461UfXg0tyT9"], "accumulated_threat_level": 10.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "9093e36d-76e0-4699-87dd-65cd15b8cf54", "DetectTime": "2024-05-21T12:24:47.598614+00:00", "EventTime": "2024-05-21T12:24:47.598634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBorY1tratIKNi8Zh"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "e62a4143-1fe7-4414-9691-e1bf1c64351a", "DetectTime": "2024-05-21T12:24:47.603244+00:00", "EventTime": "2024-05-21T12:24:47.603262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVclp42kdhtfMAGTa"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b5bbf18d-5a41-49a6-879d-b309db80ea80", "DetectTime": "2024-05-21T12:24:47.607925+00:00", "EventTime": "2024-05-21T12:24:47.607943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTXr04XTtJvLvmre6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "cdb6d8f7-b732-4a6f-bc64-75a9ea7df6bc", "DetectTime": "2024-05-21T12:24:47.618988+00:00", "EventTime": "2024-05-21T12:24:47.619010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLasWwj50mIEYcUo1"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b5f7befa-15a3-4264-94d4-fb87b39f9957", "DetectTime": "2024-05-21T12:24:47.635265+00:00", "EventTime": "2024-05-21T12:24:47.635285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.201.120.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtUnb91lepHuyZnpxe"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "afa6edd7-0551-441e-9528-91fa9ff55ba4", "DetectTime": "2024-05-21T12:24:47.646060+00:00", "EventTime": "2024-05-21T12:24:47.646081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBAYD3XWyO7AoW5cf"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "206b019f-1ce2-434a-a318-204ab9e77c50", "DetectTime": "2024-05-21T12:24:47.656543+00:00", "EventTime": "2024-05-21T12:24:47.656564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRzn92bhjumHmwg98"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "74219aa1-8b5d-4731-a0a1-61772d5b80d4", "DetectTime": "2024-05-21T12:24:47.661568+00:00", "EventTime": "2024-05-21T12:24:47.661588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuQ8j1zjX9ioqTx71"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "fedd1d79-179d-4c8e-afae-bf5ba70f535b", "DetectTime": "2024-05-21T12:24:47.667545+00:00", "EventTime": "2024-05-21T12:24:47.667565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSN1Kj1zVZ2VU9Oau1"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2e0942da-29bb-4d40-a0a8-30d498239dc2", "DetectTime": "2024-05-21T12:24:47.677235+00:00", "EventTime": "2024-05-21T12:24:47.677253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZZQh1sAP2bq5gaDl", "CxllY141Bom7wU4hx6", "CJRgvs33jN6O9YEMb8", "C9cmUw4fUSZZc6svUa"], "accumulated_threat_level": 10.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "255c3a1c-2985-4b9e-834b-f8520b598b0f", "DetectTime": "2024-05-21T12:24:47.692233+00:00", "EventTime": "2024-05-21T12:24:47.692249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "Connection to unknown destination port 16748/UDP destination IP 59.96.161.63. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CieoV92CbgBZnNldzf"], "accumulated_threat_level": 11.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "09bcee2f-9da3-4ae3-86b1-ed3c0d46af8a", "DetectTime": "2024-05-21T12:24:47.704022+00:00", "EventTime": "2024-05-21T12:24:47.704041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPxSm3OSPrD9j8dsl"], "accumulated_threat_level": 12.100000000000001, "timewindow": 9} +{"Format": "Json", "ID": "09bcee2f-9da3-4ae3-86b1-ed3c0d46af8a", "DetectTime": "2024-05-21T12:24:47.704022+00:00", "EventTime": "2024-05-21T12:24:47.704041+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "1970-01-01T08:39:55.884878+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:47.975028)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "52f7f6c5-8fa2-47d8-9f22-401c87d73064", "DetectTime": "2024-05-21T12:24:47.985838+00:00", "EventTime": "2024-05-21T12:24:47.985860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Lrrd3LMvygfP5Bv3"], "accumulated_threat_level": 0.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "068c2f6f-dd32-4db0-972c-2abfdc462620", "DetectTime": "2024-05-21T12:24:47.990747+00:00", "EventTime": "2024-05-21T12:24:47.990766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSAdB3UUvxpgQ7ce7"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2d9dc72c-c12c-482a-810a-9a65cfa9114d", "DetectTime": "2024-05-21T12:24:48.001812+00:00", "EventTime": "2024-05-21T12:24:48.001832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTqor1ZnVKZyHrNfa"], "accumulated_threat_level": 1.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "b6524406-9892-4804-8840-73b17e0628ad", "DetectTime": "2024-05-21T12:24:48.013220+00:00", "EventTime": "2024-05-21T12:24:48.013241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySRDG2IsWYoOC5JM7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "727e8413-119f-4021-a276-7c5e2abe5705", "DetectTime": "2024-05-21T12:24:48.018350+00:00", "EventTime": "2024-05-21T12:24:48.018368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFA1pzzPonO1Bxb8"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "4764635e-8c35-42e3-b044-0035f5d27787", "DetectTime": "2024-05-21T12:24:48.023050+00:00", "EventTime": "2024-05-21T12:24:48.023070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLwmm2fSSZEa68aFa"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b1795e79-df97-4298-b2ef-41f8efda697d", "DetectTime": "2024-05-21T12:24:48.037998+00:00", "EventTime": "2024-05-21T12:24:48.038016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhcT54avASWJoIzD2"], "accumulated_threat_level": 3.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "f1ad92ff-6c8a-4655-aabb-f1d1981da934", "DetectTime": "2024-05-21T12:24:48.042944+00:00", "EventTime": "2024-05-21T12:24:48.042966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0BINgIz6VjekxB85"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "71684107-fa78-4ba0-80de-07838b2a7576", "DetectTime": "2024-05-21T12:24:48.053818+00:00", "EventTime": "2024-05-21T12:24:48.053839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbPSD2XlCfj20ujJk"], "accumulated_threat_level": 4.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "0544f336-ce6c-47be-ad43-dcffbcc11e05", "DetectTime": "2024-05-21T12:24:48.058712+00:00", "EventTime": "2024-05-21T12:24:48.058732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYboKm2PjaPpM5T4Ka"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "79613ae0-cda0-4f57-9ab5-f03340dc0573", "DetectTime": "2024-05-21T12:24:48.069170+00:00", "EventTime": "2024-05-21T12:24:48.069188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMJu03wq1C3OWRmOh"], "accumulated_threat_level": 4.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "990cef44-55d0-4149-81fc-fcd15a198896", "DetectTime": "2024-05-21T12:24:48.073614+00:00", "EventTime": "2024-05-21T12:24:48.073632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CljMPMotx4HlQb06g"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "30960430-3bcb-4c1c-8a85-ba8d390b184a", "DetectTime": "2024-05-21T12:24:48.084247+00:00", "EventTime": "2024-05-21T12:24:48.084268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBOwP2lBPOGgBLOtc"], "accumulated_threat_level": 5.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "9ba9ddfa-0594-4cb1-bacb-b7f57918059b", "DetectTime": "2024-05-21T12:24:48.089335+00:00", "EventTime": "2024-05-21T12:24:48.089356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiW19d3pNXEnxgC3d"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "5408a2b6-af98-4e56-bc94-04e72d5d20bc", "DetectTime": "2024-05-21T12:24:48.100778+00:00", "EventTime": "2024-05-21T12:24:48.100796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxaiKR1IJdd3kOOYk9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 9} +{"Format": "IDEA0", "ID": "314e9096-c759-4dff-a2eb-fdda602aca7c", "DetectTime": "2024-05-21T12:24:48.108258+00:00", "EventTime": "2024-05-21T12:24:48.108275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImWBApKAlkCoXiIb"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "ef9e9539-3dc3-43ce-9e08-f61c3fe9da8f", "DetectTime": "2024-05-21T12:24:48.119585+00:00", "EventTime": "2024-05-21T12:24:48.119604+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.83.114.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfELK3ECJEBzJpV2c"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "250c1980-3c6c-465e-8ea2-e53974ebc19a", "DetectTime": "2024-05-21T12:24:48.131902+00:00", "EventTime": "2024-05-21T12:24:48.131920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.83.114.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.83.114.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfELK3ECJEBzJpV2c"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 9} +{"Format": "IDEA0", "ID": "0824cc04-7e54-4fbe-8ef3-5c455e5cf693", "DetectTime": "2024-05-21T12:24:48.136911+00:00", "EventTime": "2024-05-21T12:24:48.136932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkscMp1XqPQQy2tA4i"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "6d13417a-6fef-4fbe-b0ab-ccb17f067da2", "DetectTime": "2024-05-21T12:24:48.146842+00:00", "EventTime": "2024-05-21T12:24:48.146861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgq6Q1j4jFdcbitj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 9} +{"Format": "IDEA0", "ID": "588e2978-065c-4c66-996f-a48dd4f97c25", "DetectTime": "2024-05-21T12:24:48.152681+00:00", "EventTime": "2024-05-21T12:24:48.152700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bdB041FAAaGPxGAc"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "ccfb11e7-fb38-4bea-b995-838850590488", "DetectTime": "2024-05-21T12:24:48.165631+00:00", "EventTime": "2024-05-21T12:24:48.165650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5lC5q4oc7s4EWay5l"], "accumulated_threat_level": 8.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "8d8bdbdf-2a82-4b23-8ed2-33d2ffdb3d17", "DetectTime": "2024-05-21T12:24:48.179969+00:00", "EventTime": "2024-05-21T12:24:48.179988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJAlV1yDkxJAE4uk6"], "accumulated_threat_level": 9.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "d4a621fb-5ef1-4e00-9e72-a64569285400", "DetectTime": "2024-05-21T12:24:48.191141+00:00", "EventTime": "2024-05-21T12:24:48.191160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZYy14yegshzNH5vh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "5667a101-2e52-43bb-85d3-a7d5de5220d2", "DetectTime": "2024-05-21T12:24:48.203353+00:00", "EventTime": "2024-05-21T12:24:48.203371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.174.49.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPloS1r2Sxv6sRM8e"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "f53cab37-447c-4ded-9892-5b68e3afadd3", "DetectTime": "2024-05-21T12:24:48.215214+00:00", "EventTime": "2024-05-21T12:24:48.215234+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.174.49.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.174.49.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPloS1r2Sxv6sRM8e"], "accumulated_threat_level": 10.600000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "3541bfd6-7ef0-49e5-88c5-93bd935cc59c", "DetectTime": "2024-05-21T12:24:48.229207+00:00", "EventTime": "2024-05-21T12:24:48.229228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7DOw3626psWVdIb4"], "accumulated_threat_level": 11.400000000000002, "timewindow": 9} +{"Format": "IDEA0", "ID": "a9df8b31-28fc-47cd-9106-72b09ec09402", "DetectTime": "2024-05-21T12:24:48.234154+00:00", "EventTime": "2024-05-21T12:24:48.234175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Uy6o4VMpCKY4YdBh"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3e894e16-e02d-4122-b6d6-23f40be5be42", "DetectTime": "2024-05-21T12:24:48.246368+00:00", "EventTime": "2024-05-21T12:24:48.246386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUvxv3my3FrHuJwfi"], "accumulated_threat_level": 12.200000000000003, "timewindow": 9} +{"Format": "Json", "ID": "3e894e16-e02d-4122-b6d6-23f40be5be42", "DetectTime": "2024-05-21T12:24:48.246368+00:00", "EventTime": "2024-05-21T12:24:48.246386+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "1970-01-01T08:40:01.021267+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:48.496244)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "907f24c3-9be0-42e8-8cf3-fd5e0e7963cc", "DetectTime": "2024-05-21T12:24:48.500083+00:00", "EventTime": "2024-05-21T12:24:48.500101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cp354GIO5CAPFAh3"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "24ef8be8-116b-4b47-83a0-b3a20a03c3f7", "DetectTime": "2024-05-21T12:24:48.511347+00:00", "EventTime": "2024-05-21T12:24:48.511365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTmHxh1OTSbynE1G3"], "accumulated_threat_level": 0.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "a0982c0b-e0da-4050-9924-afade6a0f1a7", "DetectTime": "2024-05-21T12:24:48.523233+00:00", "EventTime": "2024-05-21T12:24:48.523251+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CieoV92CbgBZnNldzf"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "63773547-aee4-4294-be29-33eb7c7c54bf", "DetectTime": "2024-05-21T12:24:48.534311+00:00", "EventTime": "2024-05-21T12:24:48.534332+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CieoV92CbgBZnNldzf"], "accumulated_threat_level": 1.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "60fbaeb1-dca9-4e4b-b291-61bc1b69a244", "DetectTime": "2024-05-21T12:24:48.539004+00:00", "EventTime": "2024-05-21T12:24:48.539024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm74zE487ucCSqqyf4"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "a08dded6-061e-4654-a07c-fd0d30b814fd", "DetectTime": "2024-05-21T12:24:48.550873+00:00", "EventTime": "2024-05-21T12:24:48.550892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1NIsG1BmLDZIu2j"], "accumulated_threat_level": 2.1, "timewindow": 9} +{"Format": "IDEA0", "ID": "92bf5b8b-3e87-4cd4-a524-62671f28368c", "DetectTime": "2024-05-21T12:24:48.561335+00:00", "EventTime": "2024-05-21T12:24:48.561352+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Lrrd3LMvygfP5Bv3"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "fd02589c-e7af-4f7e-ac0d-dcd49eef4992", "DetectTime": "2024-05-21T12:24:48.572177+00:00", "EventTime": "2024-05-21T12:24:48.572195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Lrrd3LMvygfP5Bv3"], "accumulated_threat_level": 2.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "1e44c683-7b00-4fc7-a2d0-a034ae1932fa", "DetectTime": "2024-05-21T12:24:48.576755+00:00", "EventTime": "2024-05-21T12:24:48.576772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CczI4N1v6Qw3KXliKl"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "517163db-9e8b-4c86-90b9-ed532b042062", "DetectTime": "2024-05-21T12:24:48.589368+00:00", "EventTime": "2024-05-21T12:24:48.589385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhcT54avASWJoIzD2"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "8ef1fa65-22c7-4f7e-acd9-77c728d3aade", "DetectTime": "2024-05-21T12:24:48.603448+00:00", "EventTime": "2024-05-21T12:24:48.603469+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhcT54avASWJoIzD2"], "accumulated_threat_level": 3.1, "timewindow": 9} +{"Format": "IDEA0", "ID": "0d47e327-ce6b-4df1-a7ab-5ddf08aba577", "DetectTime": "2024-05-21T12:24:48.613676+00:00", "EventTime": "2024-05-21T12:24:48.613695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5BmQjw7Bz2fGa7Xe"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "b9048842-9178-43b9-862e-0ac49da8d231", "DetectTime": "2024-05-21T12:24:48.625071+00:00", "EventTime": "2024-05-21T12:24:48.625090+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbPSD2XlCfj20ujJk"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "49c2cb70-d176-41f4-bfa9-ef0e8dc349e7", "DetectTime": "2024-05-21T12:24:48.636141+00:00", "EventTime": "2024-05-21T12:24:48.636158+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbPSD2XlCfj20ujJk"], "accumulated_threat_level": 4.4, "timewindow": 9} +{"Format": "IDEA0", "ID": "0a5cba30-2ca6-4d4c-9011-a5057139558e", "DetectTime": "2024-05-21T12:24:48.640814+00:00", "EventTime": "2024-05-21T12:24:48.640831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBg1gt2mQRfgCgIuL2"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "53862008-0a3c-45f2-a21b-59bf281e97a0", "DetectTime": "2024-05-21T12:24:48.651296+00:00", "EventTime": "2024-05-21T12:24:48.651314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBOwP2lBPOGgBLOtc"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "001df7db-7c93-4d5d-a1db-1375ab8776eb", "DetectTime": "2024-05-21T12:24:48.661952+00:00", "EventTime": "2024-05-21T12:24:48.661970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiiIn2U2WyJwnI5J"], "accumulated_threat_level": 5.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "9074ce83-081e-4730-8db2-9d7ce9c516a6", "DetectTime": "2024-05-21T12:24:48.672608+00:00", "EventTime": "2024-05-21T12:24:48.672626+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBOwP2lBPOGgBLOtc"], "accumulated_threat_level": 5.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "8165f546-d9d9-4ac8-b261-ad657e4170d1", "DetectTime": "2024-05-21T12:24:48.676912+00:00", "EventTime": "2024-05-21T12:24:48.676929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmM3Rg1orelbjhXkSj"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b52da862-39e2-4fe5-9ac3-c3655784de64", "DetectTime": "2024-05-21T12:24:48.686971+00:00", "EventTime": "2024-05-21T12:24:48.686989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTROwc3DsstA3EEzb8"], "accumulated_threat_level": 6.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "a0b2d4b9-f4c0-4d6d-9679-53f3744384ac", "DetectTime": "2024-05-21T12:24:48.691538+00:00", "EventTime": "2024-05-21T12:24:48.691557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuJjIC1n1wwoTaNwnf"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "0fa3e399-7f87-4ae5-a855-b996bfaed6bf", "DetectTime": "2024-05-21T12:24:48.704804+00:00", "EventTime": "2024-05-21T12:24:48.704825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUvxv3my3FrHuJwfi"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "ef1e70a3-445f-4728-bd88-a9ba2741e98d", "DetectTime": "2024-05-21T12:24:48.717881+00:00", "EventTime": "2024-05-21T12:24:48.717898+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUvxv3my3FrHuJwfi"], "accumulated_threat_level": 7.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "db1535a4-79e5-4b31-8caa-e3e470047dab", "DetectTime": "2024-05-21T12:24:48.728110+00:00", "EventTime": "2024-05-21T12:24:48.728127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTmHxh1OTSbynE1G3"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "53b09acb-3d8a-4a45-a935-a98794307a12", "DetectTime": "2024-05-21T12:24:48.739562+00:00", "EventTime": "2024-05-21T12:24:48.739581+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTmHxh1OTSbynE1G3"], "accumulated_threat_level": 7.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "d4f6251e-a5ad-49c6-925f-810461bd17be", "DetectTime": "2024-05-21T12:24:48.750196+00:00", "EventTime": "2024-05-21T12:24:48.750214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgqVS2b2eg7BQP0Pi"], "accumulated_threat_level": 8.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "6955f8e7-3333-4216-9474-fc2987fb2fec", "DetectTime": "2024-05-21T12:24:48.754631+00:00", "EventTime": "2024-05-21T12:24:48.754649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9KL711JkxwFMuT12"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b503f61a-eb0d-4d31-995f-89573db82e45", "DetectTime": "2024-05-21T12:24:48.765189+00:00", "EventTime": "2024-05-21T12:24:48.765206+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiiIn2U2WyJwnI5J"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "2a47c189-97ca-4ccd-91d2-879cc8c08162", "DetectTime": "2024-05-21T12:24:48.775935+00:00", "EventTime": "2024-05-21T12:24:48.775953+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiiIn2U2WyJwnI5J"], "accumulated_threat_level": 8.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "32f3116a-9f07-4c93-b280-3ea503b9025c", "DetectTime": "2024-05-21T12:24:48.781949+00:00", "EventTime": "2024-05-21T12:24:48.781969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2aqHE2tydkpj9RZsl"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "79b2cda0-b56b-4958-b019-faf448433bb9", "DetectTime": "2024-05-21T12:24:48.792570+00:00", "EventTime": "2024-05-21T12:24:48.792588+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTROwc3DsstA3EEzb8"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "65f56823-185d-422a-ba0b-dfc3acf18dd0", "DetectTime": "2024-05-21T12:24:48.803204+00:00", "EventTime": "2024-05-21T12:24:48.803221+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTROwc3DsstA3EEzb8"], "accumulated_threat_level": 9.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "095d157e-3137-47cd-b1cb-14f655f0b7e5", "DetectTime": "2024-05-21T12:24:48.813328+00:00", "EventTime": "2024-05-21T12:24:48.813345+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgqVS2b2eg7BQP0Pi"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "8ab2ac47-ec68-40f3-bbac-9cfff51fb2ef", "DetectTime": "2024-05-21T12:24:48.823494+00:00", "EventTime": "2024-05-21T12:24:48.823514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6sbCc1SuG8jm0WzFh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "796cb09d-9629-4000-91a2-b47fbf744b64", "DetectTime": "2024-05-21T12:24:48.834878+00:00", "EventTime": "2024-05-21T12:24:48.834896+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgqVS2b2eg7BQP0Pi"], "accumulated_threat_level": 10.600000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "d426efca-a6ce-4a59-acbd-ac97e6c83810", "DetectTime": "2024-05-21T12:24:48.845373+00:00", "EventTime": "2024-05-21T12:24:48.845391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEUws19cGYb8R3gC6"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "74547ff9-ffac-4b99-a925-787849f36d00", "DetectTime": "2024-05-21T12:24:48.852259+00:00", "EventTime": "2024-05-21T12:24:48.852280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbw6Wwczq0A6sqwlg"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "07622c30-35da-421d-a965-aa1a029b1a27", "DetectTime": "2024-05-21T12:24:48.864061+00:00", "EventTime": "2024-05-21T12:24:48.864081+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEUws19cGYb8R3gC6"], "accumulated_threat_level": 11.100000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "0156460f-a720-402d-92a4-ea5c0aa67261", "DetectTime": "2024-05-21T12:24:48.869303+00:00", "EventTime": "2024-05-21T12:24:48.869325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.22.228.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70y6a1TZp2aeM3XFj"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3edfb418-177e-48a5-976a-19991cc5906d", "DetectTime": "2024-05-21T12:24:48.879947+00:00", "EventTime": "2024-05-21T12:24:48.879964+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOLe33Hqm6oxIxE8l"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "1eb72bc0-d206-4d82-8b70-1110d8f8013b", "DetectTime": "2024-05-21T12:24:48.891431+00:00", "EventTime": "2024-05-21T12:24:48.891453+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOLe33Hqm6oxIxE8l"], "accumulated_threat_level": 11.600000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "af81688d-9b1e-4b65-9fec-e58ddfba450a", "DetectTime": "2024-05-21T12:24:48.902419+00:00", "EventTime": "2024-05-21T12:24:48.902437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOLe33Hqm6oxIxE8l"], "accumulated_threat_level": 12.400000000000002, "timewindow": 9} +{"Format": "Json", "ID": "af81688d-9b1e-4b65-9fec-e58ddfba450a", "DetectTime": "2024-05-21T12:24:48.902419+00:00", "EventTime": "2024-05-21T12:24:48.902437+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "1970-01-01T08:40:19.266699+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:49.160156)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000002, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000002} +{"Format": "IDEA0", "ID": "afa66d94-1972-4b13-a693-71a73b295e0c", "DetectTime": "2024-05-21T12:24:49.171168+00:00", "EventTime": "2024-05-21T12:24:49.171186+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZEQWE1dNSloZ3KCG8"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "3e44ec6c-5d2e-4469-8dbb-c4e8188de54f", "DetectTime": "2024-05-21T12:24:49.182269+00:00", "EventTime": "2024-05-21T12:24:49.182287+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZEQWE1dNSloZ3KCG8"], "accumulated_threat_level": 0.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "d56bca4e-d7e7-4cc4-a141-0084ad231641", "DetectTime": "2024-05-21T12:24:49.186840+00:00", "EventTime": "2024-05-21T12:24:49.186857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.126.185.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqPICm4fPPSccAzI1g"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "48c1e795-8be7-41bc-838a-5b39e4c39cc2", "DetectTime": "2024-05-21T12:24:49.197099+00:00", "EventTime": "2024-05-21T12:24:49.197121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.217.10.192 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9IKY3jV2wS7zH0vb"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f52be695-1de5-4b3a-be98-4e7d1c695cad", "DetectTime": "2024-05-21T12:24:49.208992+00:00", "EventTime": "2024-05-21T12:24:49.209014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qyg93sSfnJnHYE7c"], "accumulated_threat_level": 1.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "4875098d-9f54-4dcb-84c9-956ae710e94e", "DetectTime": "2024-05-21T12:24:49.220899+00:00", "EventTime": "2024-05-21T12:24:49.220916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmkgG1g1GzpCxdj2j"], "accumulated_threat_level": 2.1, "timewindow": 9} +{"Format": "IDEA0", "ID": "7271bd0a-2b15-4e8d-b6ec-1c2602ae1a35", "DetectTime": "2024-05-21T12:24:49.225171+00:00", "EventTime": "2024-05-21T12:24:49.225188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.57.162.209 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLONeltDtmWhgYy34"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "7350e272-09a6-476b-bb0d-0f884a524bcc", "DetectTime": "2024-05-21T12:24:49.236144+00:00", "EventTime": "2024-05-21T12:24:49.236161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 180.247.233.74. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XrZz1cN51VyrYb3g"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "fac1da3c-4622-4bda-b0d5-d1fa4ac8cc50", "DetectTime": "2024-05-21T12:24:49.248005+00:00", "EventTime": "2024-05-21T12:24:49.248024+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qyg93sSfnJnHYE7c"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "ab387c95-4aee-4dd6-a8ea-7b6cf85e72e2", "DetectTime": "2024-05-21T12:24:49.262310+00:00", "EventTime": "2024-05-21T12:24:49.262328+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qyg93sSfnJnHYE7c"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "6c459a95-f371-46a4-a262-c50f3022abc0", "DetectTime": "2024-05-21T12:24:49.273406+00:00", "EventTime": "2024-05-21T12:24:49.273424+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmkgG1g1GzpCxdj2j"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "c66970ca-649f-4453-9595-b2236acbc45f", "DetectTime": "2024-05-21T12:24:49.285384+00:00", "EventTime": "2024-05-21T12:24:49.285403+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmkgG1g1GzpCxdj2j"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "6a77d022-6b1d-478f-ba3c-5fc7d8970802", "DetectTime": "2024-05-21T12:24:49.296127+00:00", "EventTime": "2024-05-21T12:24:49.296147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo2Ia3wihs0Siy1fc"], "accumulated_threat_level": 4.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "10d0e53d-b632-4b01-b2b9-6bd9d0b1e19f", "DetectTime": "2024-05-21T12:24:49.307436+00:00", "EventTime": "2024-05-21T12:24:49.307454+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XrZz1cN51VyrYb3g"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "412102dd-8372-47fa-b543-c3149420b3d4", "DetectTime": "2024-05-21T12:24:49.318667+00:00", "EventTime": "2024-05-21T12:24:49.318685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XrZz1cN51VyrYb3g"], "accumulated_threat_level": 5.2, "timewindow": 9} +{"Format": "IDEA0", "ID": "b14b30a4-5f70-4802-93b6-14a474a2edf1", "DetectTime": "2024-05-21T12:24:49.329871+00:00", "EventTime": "2024-05-21T12:24:49.329888+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo2Ia3wihs0Siy1fc"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "b7a84fe2-c4e2-421b-809d-e377e4aab27b", "DetectTime": "2024-05-21T12:24:49.340975+00:00", "EventTime": "2024-05-21T12:24:49.340993+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo2Ia3wihs0Siy1fc"], "accumulated_threat_level": 5.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "54061417-e1be-4b1d-a35d-657cea3af882", "DetectTime": "2024-05-21T12:24:49.351360+00:00", "EventTime": "2024-05-21T12:24:49.351378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "Connection to unknown destination port 2114/UDP destination IP 68.7.103.29. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmyXb3LQpVrbAP3Tl"], "accumulated_threat_level": 6.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "dbd9543a-2923-4de8-bb3e-e0cdd74f1a44", "DetectTime": "2024-05-21T12:24:49.361864+00:00", "EventTime": "2024-05-21T12:24:49.361881+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmyXb3LQpVrbAP3Tl"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "2ea01f7d-d586-4b40-be9b-135d97db46c2", "DetectTime": "2024-05-21T12:24:49.373751+00:00", "EventTime": "2024-05-21T12:24:49.373771+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmyXb3LQpVrbAP3Tl"], "accumulated_threat_level": 7.0, "timewindow": 9} +{"Format": "IDEA0", "ID": "fc752604-e2b1-4f70-81d7-d123b1c6920d", "DetectTime": "2024-05-21T12:24:49.384583+00:00", "EventTime": "2024-05-21T12:24:49.384600+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cehl59ymn2FS0eLWd"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "4e7396cf-ce6c-44c9-8ced-00c46b371a76", "DetectTime": "2024-05-21T12:24:49.397526+00:00", "EventTime": "2024-05-21T12:24:49.397548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cehl59ymn2FS0eLWd"], "accumulated_threat_level": 7.5, "timewindow": 9} +{"Format": "IDEA0", "ID": "88a290e5-fd82-4dc5-94dc-e33a5204e983", "DetectTime": "2024-05-21T12:24:49.402635+00:00", "EventTime": "2024-05-21T12:24:49.402659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzgigp6CjCDbia4i"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f8734dff-0feb-45e8-97a9-ed11e4b9fb3c", "DetectTime": "2024-05-21T12:24:49.414709+00:00", "EventTime": "2024-05-21T12:24:49.414730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cehl59ymn2FS0eLWd"], "accumulated_threat_level": 8.3, "timewindow": 9} +{"Format": "IDEA0", "ID": "a5f2e97f-382b-4201-bbe3-1c88421362bb", "DetectTime": "2024-05-21T12:24:49.427259+00:00", "EventTime": "2024-05-21T12:24:49.427282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co7CE74b3zveuZZhVi"], "accumulated_threat_level": 9.100000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "a6e9afae-349f-4c98-963f-752155082561", "DetectTime": "2024-05-21T12:24:49.437806+00:00", "EventTime": "2024-05-21T12:24:49.437824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHxf93rjZ4rw83ed"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "608b99da-2e49-40f5-bf44-9a10655ad58b", "DetectTime": "2024-05-21T12:24:49.450294+00:00", "EventTime": "2024-05-21T12:24:49.450315+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHxf93rjZ4rw83ed"], "accumulated_threat_level": 9.600000000000001, "timewindow": 9} +{"Format": "IDEA0", "ID": "aeb389cf-b192-475a-b924-6bea706916cd", "DetectTime": "2024-05-21T12:24:49.455762+00:00", "EventTime": "2024-05-21T12:24:49.455781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.130.55.165 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQ0Yez6FbQnPtAN1"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "48f5e805-1bbd-450c-a8c6-57f7913c6cce", "DetectTime": "2024-05-21T12:24:49.467354+00:00", "EventTime": "2024-05-21T12:24:49.467373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHxf93rjZ4rw83ed"], "accumulated_threat_level": 10.400000000000002, "timewindow": 9} +{"Format": "IDEA0", "ID": "310ca5c8-f522-4172-b4c6-d4bfb5a8dd18", "DetectTime": "2024-05-21T12:24:49.479152+00:00", "EventTime": "2024-05-21T12:24:49.479170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvuue4ZElGaALC8ci"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "a85bfb36-a5a2-4211-8207-a24310794377", "DetectTime": "2024-05-21T12:24:49.490843+00:00", "EventTime": "2024-05-21T12:24:49.490861+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvuue4ZElGaALC8ci"], "accumulated_threat_level": 10.900000000000002, "timewindow": 9} +{"Format": "IDEA0", "ID": "b0f841bf-c9d1-43de-8df2-a0522b037d94", "DetectTime": "2024-05-21T12:24:49.501625+00:00", "EventTime": "2024-05-21T12:24:49.501645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvuue4ZElGaALC8ci"], "accumulated_threat_level": 11.700000000000003, "timewindow": 9} +{"Format": "IDEA0", "ID": "1e2463aa-4dbf-43bc-844a-680b9445a2ad", "DetectTime": "2024-05-21T12:24:49.506228+00:00", "EventTime": "2024-05-21T12:24:49.506247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.216.94 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAo851x4PwZSeg7Oc"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "55797401-dc4f-4cc8-9f7d-eae542ac76ef", "DetectTime": "2024-05-21T12:24:49.517344+00:00", "EventTime": "2024-05-21T12:24:49.517362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcGlypHY6j4QhBmdg"], "accumulated_threat_level": 12.500000000000004, "timewindow": 9} +{"Format": "Json", "ID": "55797401-dc4f-4cc8-9f7d-eae542ac76ef", "DetectTime": "2024-05-21T12:24:49.517344+00:00", "EventTime": "2024-05-21T12:24:49.517362+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "1970-01-01T08:40:42.724385+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 9. (real time 2024/05/21 12:24:49.823617)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 9, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "c8dba8a2-ab31-4c08-8f5f-dea2b8d11da4", "DetectTime": "2024-05-21T12:24:49.827422+00:00", "EventTime": "2024-05-21T12:24:49.827439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.219.208.219 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmIH0F3N9l694h6A6f"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "31390e07-a7e1-4caf-a02b-d9d4b20ecc22", "DetectTime": "2024-05-21T12:24:49.838761+00:00", "EventTime": "2024-05-21T12:24:49.838782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChEuSL2at84c7T1zEk"], "accumulated_threat_level": 0.8, "timewindow": 9} +{"Format": "IDEA0", "ID": "b7b95987-fb06-45df-87c0-2c6a74d4b571", "DetectTime": "2024-05-21T12:24:49.843410+00:00", "EventTime": "2024-05-21T12:24:49.843428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.253.82.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs622v3CARN1IQLW1j"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "aa2a619d-f30f-45c7-bf0b-80dec900d446", "DetectTime": "2024-05-21T12:24:49.854015+00:00", "EventTime": "2024-05-21T12:24:49.854034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LJwUe7SVCV55tul"], "accumulated_threat_level": 1.6, "timewindow": 9} +{"Format": "IDEA0", "ID": "8ed6defe-07eb-44d2-8d7f-4641ba6e58de", "DetectTime": "2024-05-21T12:24:49.859020+00:00", "EventTime": "2024-05-21T12:24:49.859040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.55.197.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwcgb7m82H7SpZqch"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "a4ee19d2-2ef3-46d1-9359-cbee97da12f3", "DetectTime": "2024-05-21T12:24:49.869308+00:00", "EventTime": "2024-05-21T12:24:49.869326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUsZg2MRNhLOMJeCc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "a6ec79b6-6261-455e-9c01-9a403b12eae3", "DetectTime": "2024-05-21T12:24:49.879971+00:00", "EventTime": "2024-05-21T12:24:49.879989+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNCgWgO5nuUUZcBAe"], "accumulated_threat_level": 0, "timewindow": 9} +{"Format": "IDEA0", "ID": "1447f5f6-fe69-42ae-990c-63e7c992dd80", "DetectTime": "2024-05-21T12:24:49.891361+00:00", "EventTime": "2024-05-21T12:24:49.891380+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNCgWgO5nuUUZcBAe"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 9} +{"Format": "IDEA0", "ID": "07cb0d40-1c51-4f1e-ad2f-98639321ef75", "DetectTime": "2024-05-21T12:24:49.896398+00:00", "EventTime": "2024-05-21T12:24:49.896419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.71.26.129 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6yc71lrCjKcatTL8"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "4b69ff32-6e9b-4581-b3a8-8f0bcb587ee7", "DetectTime": "2024-05-21T12:24:49.908450+00:00", "EventTime": "2024-05-21T12:24:49.908470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNCgWgO5nuUUZcBAe"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "69e7188c-3a23-4976-ae21-2540df23ce56", "DetectTime": "2024-05-21T12:24:49.913506+00:00", "EventTime": "2024-05-21T12:24:49.913524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.167.37.219 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJXnm2aBdtYdDzT18"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "d4714e1b-ff98-44e1-9dbe-3b986b79eab4", "DetectTime": "2024-05-21T12:24:49.918746+00:00", "EventTime": "2024-05-21T12:24:49.918766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.172.166.115 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcbLm3pTAHlIA3wDi"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "d08e4ed0-c864-4684-a6d9-e95210713e84", "DetectTime": "2024-05-21T12:24:49.923623+00:00", "EventTime": "2024-05-21T12:24:49.923641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.94.67.10 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4huu2hK1HlkChmQ8"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "d05d984f-9dfd-46da-a76a-69d1733dfde6", "DetectTime": "2024-05-21T12:24:49.928771+00:00", "EventTime": "2024-05-21T12:24:49.928791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.152.27.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKBu6a1K4TXt8FnWRg"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "7ca5f274-895b-4bee-9aa7-e9db0bef4063", "DetectTime": "2024-05-21T12:24:49.933207+00:00", "EventTime": "2024-05-21T12:24:49.933225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 209.12.192.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORKiJ3T7KWGEwVUp"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "8dc4685e-65bc-4a49-9e25-67c81a7fe825", "DetectTime": "2024-05-21T12:24:49.937537+00:00", "EventTime": "2024-05-21T12:24:49.937555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.250.198.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiKA44tv7pKZAMCQk"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "234b3e32-bb6b-4629-aefe-4188487c1109", "DetectTime": "2024-05-21T12:24:49.941924+00:00", "EventTime": "2024-05-21T12:24:49.941942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.241.115.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0NV91491qIUeqVBi"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3e4fc93d-8d39-4f47-9ed9-3c1db2cd07cd", "DetectTime": "2024-05-21T12:24:49.946356+00:00", "EventTime": "2024-05-21T12:24:49.946373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.90.187.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb6uj31VBTBjtTCoxb"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "baeb7033-22f4-4618-a800-f1503a8d15fe", "DetectTime": "2024-05-21T12:24:49.956974+00:00", "EventTime": "2024-05-21T12:24:49.956992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm5DPS3j4DX92vvoua"], "accumulated_threat_level": 0.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "8d9480c7-c3f4-4c01-8d09-e27b2cc7902b", "DetectTime": "2024-05-21T12:24:49.961955+00:00", "EventTime": "2024-05-21T12:24:49.961973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.143.178.97 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UuMQ3lN4TZcxdck5"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "e2f46a4a-04c7-44f1-a6d4-b1010bf3eebd", "DetectTime": "2024-05-21T12:24:49.966720+00:00", "EventTime": "2024-05-21T12:24:49.966738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.253.45 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE5EN2U58SBfSCjOj"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "cae5a60a-3968-4966-9213-d5b970389629", "DetectTime": "2024-05-21T12:24:49.971120+00:00", "EventTime": "2024-05-21T12:24:49.971138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.199.143.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpPcc4H8M08T4MW5i"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "24ed06df-92f4-4075-989f-9b70e96b8b8b", "DetectTime": "2024-05-21T12:24:49.981869+00:00", "EventTime": "2024-05-21T12:24:49.981892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.250.117.232 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyKzu4uRcYUMxPpX6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b2128cd6-3f51-411f-b639-a03ea8e55990", "DetectTime": "2024-05-21T12:24:49.986827+00:00", "EventTime": "2024-05-21T12:24:49.986847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBoBc1bNEstfa6az4"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "6b6b952a-7334-4040-a1c0-8c39229d59e0", "DetectTime": "2024-05-21T12:24:49.991550+00:00", "EventTime": "2024-05-21T12:24:49.991570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWKi23KFx50EszvKe"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "18c5e303-90ea-43d9-b90a-cb75a83108a3", "DetectTime": "2024-05-21T12:24:49.996149+00:00", "EventTime": "2024-05-21T12:24:49.996168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyX1l3ke6P0F7RTL7"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f6f97356-7fd2-471c-87f0-cc446da88d15", "DetectTime": "2024-05-21T12:24:50.001057+00:00", "EventTime": "2024-05-21T12:24:50.001077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nR3c3kFF8dHbswg"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3981c6d9-903f-4c40-b2fa-ee0106a11c32", "DetectTime": "2024-05-21T12:24:50.005766+00:00", "EventTime": "2024-05-21T12:24:50.005785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhxqDldSEaPtY1Xh"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "546dd073-c3eb-46a4-b7d4-0e8057d21669", "DetectTime": "2024-05-21T12:24:50.016069+00:00", "EventTime": "2024-05-21T12:24:50.016088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuOfY35o9D4kkno81"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b90bdbe9-a30d-46a3-9815-7c78c2d54c00", "DetectTime": "2024-05-21T12:24:50.021766+00:00", "EventTime": "2024-05-21T12:24:50.021788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.188.52.167 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRBsYQyFFUnDeJk13"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "0c397a85-d03f-48ee-8f56-9147af4e0800", "DetectTime": "2024-05-21T12:24:50.027471+00:00", "EventTime": "2024-05-21T12:24:50.027490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdfIU1kVM5gYEM4Ea"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "b29d5c63-4472-440c-9290-f316678c1736", "DetectTime": "2024-05-21T12:24:50.038096+00:00", "EventTime": "2024-05-21T12:24:50.038118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2Qpm3BLSqngd2bj2"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "4a6822e7-d367-4841-9011-fcae53874bd2", "DetectTime": "2024-05-21T12:24:50.043106+00:00", "EventTime": "2024-05-21T12:24:50.043127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.27.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcIiv2EWu5zpebZUb"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "4cfc2faa-0f6a-4655-9de8-62a1e86ccc98", "DetectTime": "2024-05-21T12:24:50.047873+00:00", "EventTime": "2024-05-21T12:24:50.047893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.114.37 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYR674uwtO2GCO9Fe"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "95a13a95-6bfd-4d87-8393-ab81086622e7", "DetectTime": "2024-05-21T12:24:50.052623+00:00", "EventTime": "2024-05-21T12:24:50.052640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.129.61 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cee7oyjsLP86L2AW6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "5172d73c-8249-4ef9-a8b5-b07267e53863", "DetectTime": "2024-05-21T12:24:50.063161+00:00", "EventTime": "2024-05-21T12:24:50.063183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.160.170.26 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHDcPA3ZuFWPozmG46"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "418547f2-edb8-488d-8354-596fe0b30627", "DetectTime": "2024-05-21T12:24:50.072939+00:00", "EventTime": "2024-05-21T12:24:50.072957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.165.116.48 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8lhKS6NyT8T4Qlk"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "5a153860-eb27-4064-a2d2-13fe868bdf0d", "DetectTime": "2024-05-21T12:24:50.077539+00:00", "EventTime": "2024-05-21T12:24:50.077557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.93.244.19 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTVnuF3gloK0T4Artd"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "7fe63867-00a9-4986-9375-b90f64fed221", "DetectTime": "2024-05-21T12:24:50.081868+00:00", "EventTime": "2024-05-21T12:24:50.081885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.251.185.113 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfn9Jy4yx1u1DTtLld"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "616472d8-474c-46c1-9408-8a0cfbff248d", "DetectTime": "2024-05-21T12:24:50.086425+00:00", "EventTime": "2024-05-21T12:24:50.086443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.108.94.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiDwOP1ZJCD52dEcv1"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2ef77226-b047-4f5d-88d4-7e5fd4e673a0", "DetectTime": "2024-05-21T12:24:50.091069+00:00", "EventTime": "2024-05-21T12:24:50.091092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 209.87.253.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAuKF3tf3RNzRJqq7"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "ee3e24e5-cdc5-484e-a6e9-74aa5e8f04d1", "DetectTime": "2024-05-21T12:24:50.095972+00:00", "EventTime": "2024-05-21T12:24:50.095991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.49.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYUFq260trEhWnIKj"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "cddf253e-7138-4fb9-b70b-add669de3a33", "DetectTime": "2024-05-21T12:24:50.101190+00:00", "EventTime": "2024-05-21T12:24:50.101210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.160.203.71 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKuoqm4JmqF0fFfxZb"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "3cc5f3ee-e449-4fba-af4b-5d51b5bca1fa", "DetectTime": "2024-05-21T12:24:50.105722+00:00", "EventTime": "2024-05-21T12:24:50.105741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.35.33.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CekBtooFqVQyRuFV6"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "4069e472-a219-4c09-ada4-5be5e4ddf237", "DetectTime": "2024-05-21T12:24:50.115436+00:00", "EventTime": "2024-05-21T12:24:50.115454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckh9sZ3G8zloW6kHDc"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f0979a28-1d6a-4b5e-bcc9-7c36a87a4f96", "DetectTime": "2024-05-21T12:24:50.119980+00:00", "EventTime": "2024-05-21T12:24:50.119998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSGr533cwlpec5sz7"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "8ac14ab4-c8d6-4ec3-ad09-0a0b92937af7", "DetectTime": "2024-05-21T12:24:50.124644+00:00", "EventTime": "2024-05-21T12:24:50.124663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXN1oUBloLSsMfis3", "CrHwkk0okYyzUnZMl", "CXsyJzqjscj9ZEe61", "CPMeTw2yJE2slngCa3"], "accumulated_threat_level": 1.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "347f1a17-6c57-4f18-9004-aee34ad9efc4", "DetectTime": "2024-05-21T12:24:50.129452+00:00", "EventTime": "2024-05-21T12:24:50.129471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.129.64 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccuz3O1D6ecywQe2th"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "e8074569-155a-4de3-ba3a-01993b4b1308", "DetectTime": "2024-05-21T12:24:50.140496+00:00", "EventTime": "2024-05-21T12:24:50.140518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbHco3XaKdf4D7UBl"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "2bcd699c-ab1a-4289-b370-2375f611fc58", "DetectTime": "2024-05-21T12:24:50.145288+00:00", "EventTime": "2024-05-21T12:24:50.145306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhNeyuoisIhuYx9d"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "6674251a-b726-4080-9237-96d209999b7d", "DetectTime": "2024-05-21T12:24:50.149581+00:00", "EventTime": "2024-05-21T12:24:50.149599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKaGw4PzqCW25IGn2"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "7a9de94b-5c82-4a03-9a9f-2bd472b6bc1b", "DetectTime": "2024-05-21T12:24:50.154055+00:00", "EventTime": "2024-05-21T12:24:50.154073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.186.228.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CntLzm2nuZKODaJAYf"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "f2d4f37c-652a-4f1f-8b62-94f350659d4e", "DetectTime": "2024-05-21T12:24:50.163775+00:00", "EventTime": "2024-05-21T12:24:50.163792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.37.169 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjTdj4v8Jc8546Vy9"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "75e71eb0-a0bc-40fd-b0d7-82121d3f4f9a", "DetectTime": "2024-05-21T12:24:50.168529+00:00", "EventTime": "2024-05-21T12:24:50.168551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.200.208.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMRJ940xgHQAhOdfh"], "accumulated_threat_level": 0.5, "timewindow": 6} +{"Format": "IDEA0", "ID": "ce65650e-717c-4830-8c9a-7d30a50f861f", "DetectTime": "2024-05-21T12:24:50.179447+00:00", "EventTime": "2024-05-21T12:24:50.179465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9YPO3S2fWM8OIudi"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "07dce6e3-a896-483a-9d9b-0a8f375b2a4e", "DetectTime": "2024-05-21T12:24:50.184871+00:00", "EventTime": "2024-05-21T12:24:50.184889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.90.81.197 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1qto30Hyn0UMomki"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "cd39e02a-fec7-4fb5-889f-cb7324c70397", "DetectTime": "2024-05-21T12:24:50.194354+00:00", "EventTime": "2024-05-21T12:24:50.194395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 61.19.224.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHU6fOSiU7NbSX9Ma"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "fa20fcfd-dba4-4269-ad9a-28db4a3a39b6", "DetectTime": "2024-05-21T12:24:50.207887+00:00", "EventTime": "2024-05-21T12:24:50.207908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7DnI25JoI3sN8LJi"], "accumulated_threat_level": 2.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "863b67bc-e18d-4141-b8c7-cf986ef8c745", "DetectTime": "2024-05-21T12:24:50.219331+00:00", "EventTime": "2024-05-21T12:24:50.219349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvi184kUcnsPpSZa"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "8cbd83d6-d3a9-4fd9-91b5-c632534c48a1", "DetectTime": "2024-05-21T12:24:50.224123+00:00", "EventTime": "2024-05-21T12:24:50.224143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.107.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhfsX6mdebMWXXlg"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "febb81c2-4adb-47cf-8356-651755a08154", "DetectTime": "2024-05-21T12:24:50.253636+00:00", "EventTime": "2024-05-21T12:24:50.253656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE0lOL2aR5UpHltTcd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "2e348478-8c29-4cc0-b928-809101793738", "DetectTime": "2024-05-21T12:24:50.258790+00:00", "EventTime": "2024-05-21T12:24:50.258810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjEwZ91iaGuJjTtYEe"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "ed57401e-2d4e-478f-bd7c-054b41676ba9", "DetectTime": "2024-05-21T12:24:50.269545+00:00", "EventTime": "2024-05-21T12:24:50.269563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cclp0E1VRzqV9OyR8d"], "accumulated_threat_level": 4.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "489132d6-b633-4d63-8d7b-b015605e0c0d", "DetectTime": "2024-05-21T12:24:50.292068+00:00", "EventTime": "2024-05-21T12:24:50.292092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPuws26vtMhMPmRa8"], "accumulated_threat_level": 5.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "6fedf3c5-678c-4c66-ac91-8bab77d67f50", "DetectTime": "2024-05-21T12:24:50.303508+00:00", "EventTime": "2024-05-21T12:24:50.303526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmZ6o1Naix700FLee"], "accumulated_threat_level": 6.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "eb00e057-6912-43f6-aadf-0e23a12fda35", "DetectTime": "2024-05-21T12:24:50.314443+00:00", "EventTime": "2024-05-21T12:24:50.314461+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.107.67.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUZvl3gL8enu91lXj"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "74ec2734-26cd-4a08-8aaa-bc3e08730774", "DetectTime": "2024-05-21T12:24:50.325328+00:00", "EventTime": "2024-05-21T12:24:50.325346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.107.67.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.107.67.138 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUZvl3gL8enu91lXj"], "accumulated_threat_level": 6.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "5452d320-5f10-4701-aed9-1a4151cbc9b3", "DetectTime": "2024-05-21T12:24:50.329944+00:00", "EventTime": "2024-05-21T12:24:50.329962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCW8a01V1J9aRA4Su2"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "b2e195a0-f1c3-43b6-b219-87adf4793be9", "DetectTime": "2024-05-21T12:24:50.334812+00:00", "EventTime": "2024-05-21T12:24:50.334831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.119.190.39 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPv71a0qqt4RnTcQ6"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "044bd02c-11da-4718-9011-de9083822686", "DetectTime": "2024-05-21T12:24:50.339347+00:00", "EventTime": "2024-05-21T12:24:50.339366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.19.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsD6NC4XXcoj0IhQU"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "c4b19f83-8564-4396-89a7-de60582eb653", "DetectTime": "2024-05-21T12:24:50.350228+00:00", "EventTime": "2024-05-21T12:24:50.350246+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.120.218.207"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOiHo1kuQ0jq47qg8"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "15adf200-87b3-43a7-8b44-29d5b769d896", "DetectTime": "2024-05-21T12:24:50.362221+00:00", "EventTime": "2024-05-21T12:24:50.362238+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.120.218.207"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.120.218.207 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOiHo1kuQ0jq47qg8"], "accumulated_threat_level": 7.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "ad5382e5-e5dc-4d03-8cd6-0503dbf228d7", "DetectTime": "2024-05-21T12:24:50.374760+00:00", "EventTime": "2024-05-21T12:24:50.374778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpPpC1h49Ljz65eR"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "fac735d2-e860-4fc8-b48f-0b1e1dc43d31", "DetectTime": "2024-05-21T12:24:50.379515+00:00", "EventTime": "2024-05-21T12:24:50.379533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 205.210.7.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNiAu72moEaKPVUNz"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "35964158-0282-4254-b47b-52802f96ac89", "DetectTime": "2024-05-21T12:24:50.391543+00:00", "EventTime": "2024-05-21T12:24:50.391562+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpPpC1h49Ljz65eR"], "accumulated_threat_level": 7.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "0505a984-c2f8-4ddd-ba66-a029ae43b457", "DetectTime": "2024-05-21T12:24:50.408162+00:00", "EventTime": "2024-05-21T12:24:50.408182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8nO32eUkCMDhdg13"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "111422c5-3cd3-48bf-8bc9-3de07eb6ccb2", "DetectTime": "2024-05-21T12:24:50.412961+00:00", "EventTime": "2024-05-21T12:24:50.412980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.247.221.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COh7qE3NfAfNcg8hvk"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "0912be51-3327-4449-a072-376581ada24e", "DetectTime": "2024-05-21T12:24:50.417468+00:00", "EventTime": "2024-05-21T12:24:50.417485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.92.1.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C764FT1mpcIqfkgMB8"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "89acb9fd-afd5-4942-ad69-4e196872cadf", "DetectTime": "2024-05-21T12:24:50.427860+00:00", "EventTime": "2024-05-21T12:24:50.427878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBOYiu4mQXDUrrRHO1"], "accumulated_threat_level": 8.4, "timewindow": 10} +{"Format": "IDEA0", "ID": "22a854c9-20a6-4953-bdcb-cffa32301005", "DetectTime": "2024-05-21T12:24:50.432582+00:00", "EventTime": "2024-05-21T12:24:50.432601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.1.28.117 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9otl2WrfzNOuUEVc"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "9232edcd-3576-4a68-85d7-14ac536c4cf7", "DetectTime": "2024-05-21T12:24:50.444728+00:00", "EventTime": "2024-05-21T12:24:50.444746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyHyF2qHtv4kTepQc"], "accumulated_threat_level": 9.200000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "6bd4c0cd-089e-4e85-b47e-3124204be97b", "DetectTime": "2024-05-21T12:24:50.449544+00:00", "EventTime": "2024-05-21T12:24:50.449562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZRxRL1lz5Qke3quYg"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "8f21f350-e9e3-4c8f-8a9e-fd73d8b68ea1", "DetectTime": "2024-05-21T12:24:50.459745+00:00", "EventTime": "2024-05-21T12:24:50.459767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1Gg92dz5e1Lx9tI9"], "accumulated_threat_level": 10.000000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "c98acd05-32b8-41e2-a2a4-04bfb3f71780", "DetectTime": "2024-05-21T12:24:50.464994+00:00", "EventTime": "2024-05-21T12:24:50.465015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.183.230.102 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZbI92GoElH8qmG9e"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "81ca5d2f-a62f-4752-a44c-dffc951249b7", "DetectTime": "2024-05-21T12:24:50.476542+00:00", "EventTime": "2024-05-21T12:24:50.476560+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvi184kUcnsPpSZa"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "2bca016a-77e4-4fe4-b432-0f294dee33f2", "DetectTime": "2024-05-21T12:24:50.487696+00:00", "EventTime": "2024-05-21T12:24:50.487714+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvi184kUcnsPpSZa"], "accumulated_threat_level": 10.500000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "ec936b35-81f1-4ada-aa51-d4b0c957593e", "DetectTime": "2024-05-21T12:24:50.497359+00:00", "EventTime": "2024-05-21T12:24:50.497377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRTaJ3WaYRw1TzbK6"], "accumulated_threat_level": 11.300000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "57652cc1-d08f-4b70-92df-094fe8cd67a5", "DetectTime": "2024-05-21T12:24:50.501746+00:00", "EventTime": "2024-05-21T12:24:50.501763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 204.155.62.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNMtd40gUxS2tifZ7"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "d885f1c9-6d10-428b-9194-8914914603cb", "DetectTime": "2024-05-21T12:24:50.514440+00:00", "EventTime": "2024-05-21T12:24:50.514457+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPuws26vtMhMPmRa8"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "104f1896-b0d4-4370-80b6-bf8967089b9e", "DetectTime": "2024-05-21T12:24:50.528529+00:00", "EventTime": "2024-05-21T12:24:50.528546+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPuws26vtMhMPmRa8"], "accumulated_threat_level": 11.800000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "bca2f5bd-1238-4993-acdb-e42ed211c012", "DetectTime": "2024-05-21T12:24:50.533327+00:00", "EventTime": "2024-05-21T12:24:50.533350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjjaAX3vOhV4LtOzjl"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "1f8c5e10-353a-4ebc-8f71-04870bcc558c", "DetectTime": "2024-05-21T12:24:50.544894+00:00", "EventTime": "2024-05-21T12:24:50.544915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVHaU3eY1vwTZLxE5"], "accumulated_threat_level": 12.600000000000003, "timewindow": 10} +{"Format": "Json", "ID": "1f8c5e10-353a-4ebc-8f71-04870bcc558c", "DetectTime": "2024-05-21T12:24:50.544894+00:00", "EventTime": "2024-05-21T12:24:50.544915+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "1970-01-01T09:12:23.348921+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2024/05/21 12:24:50.748343)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 10, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "261b3666-2462-409b-b6c9-bfa2c4dd08af", "DetectTime": "2024-05-21T12:24:50.759974+00:00", "EventTime": "2024-05-21T12:24:50.759994+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmZ6o1Naix700FLee"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "7afb6914-0398-4850-a99d-f430ecfa4dd7", "DetectTime": "2024-05-21T12:24:50.771470+00:00", "EventTime": "2024-05-21T12:24:50.771487+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmZ6o1Naix700FLee"], "accumulated_threat_level": 0.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "ce77ef87-e7be-42bb-97bc-85ca4dc456d7", "DetectTime": "2024-05-21T12:24:50.785911+00:00", "EventTime": "2024-05-21T12:24:50.785930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsPAPj2K46MLS6491f"], "accumulated_threat_level": 1.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "af012eb1-4fe6-462f-8a27-d6b3a647c1be", "DetectTime": "2024-05-21T12:24:50.790562+00:00", "EventTime": "2024-05-21T12:24:50.790580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cddxgz3CQajKewsIJ2"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "b5484dc6-3a43-41f4-bd32-8df69386cfa5", "DetectTime": "2024-05-21T12:24:50.802444+00:00", "EventTime": "2024-05-21T12:24:50.802462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEVk7e981uGdtFLa"], "accumulated_threat_level": 2.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "64f7618e-89eb-4f2c-b555-1e256756df55", "DetectTime": "2024-05-21T12:24:50.813045+00:00", "EventTime": "2024-05-21T12:24:50.813063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWCOnQOl8yjNOS96"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "40a5c8d6-1bed-4e00-9d67-31e8e8202997", "DetectTime": "2024-05-21T12:24:50.823861+00:00", "EventTime": "2024-05-21T12:24:50.823878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ia2f4EOZSEC3LME2"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e1646332-eccd-4b81-bc8a-51db20c446b4", "DetectTime": "2024-05-21T12:24:50.835391+00:00", "EventTime": "2024-05-21T12:24:50.835408+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBOYiu4mQXDUrrRHO1"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "c475f5db-0c2c-473b-9498-f89028eb993c", "DetectTime": "2024-05-21T12:24:50.848073+00:00", "EventTime": "2024-05-21T12:24:50.848091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBOYiu4mQXDUrrRHO1"], "accumulated_threat_level": 4.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "ae463053-2b44-48dd-a53c-d6e8eb031433", "DetectTime": "2024-05-21T12:24:50.859092+00:00", "EventTime": "2024-05-21T12:24:50.859114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56ZbaNVeD9gj23sd"], "accumulated_threat_level": 5.0, "timewindow": 10} +{"Format": "IDEA0", "ID": "f446079a-1f54-4971-923e-2e183ef47a8c", "DetectTime": "2024-05-21T12:24:50.870911+00:00", "EventTime": "2024-05-21T12:24:50.870928+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ia2f4EOZSEC3LME2"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "b44f2792-5bee-4215-b76e-c3519664172b", "DetectTime": "2024-05-21T12:24:50.882586+00:00", "EventTime": "2024-05-21T12:24:50.882607+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ia2f4EOZSEC3LME2"], "accumulated_threat_level": 5.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "8de6ac13-a52d-43a9-b6bf-dd82fa542254", "DetectTime": "2024-05-21T12:24:50.893379+00:00", "EventTime": "2024-05-21T12:24:50.893397+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56ZbaNVeD9gj23sd"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "5dc5de42-c19a-423d-8b21-52f26fa248cb", "DetectTime": "2024-05-21T12:24:50.905375+00:00", "EventTime": "2024-05-21T12:24:50.905393+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56ZbaNVeD9gj23sd"], "accumulated_threat_level": 6.0, "timewindow": 10} +{"Format": "IDEA0", "ID": "74204dd6-f668-499d-8ff3-7bd3f426dce7", "DetectTime": "2024-05-21T12:24:50.916847+00:00", "EventTime": "2024-05-21T12:24:50.916864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3gcZ3Jif1N4gT3hi"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "b171f88d-ad64-41c2-8267-ebc1ffd200a6", "DetectTime": "2024-05-21T12:24:50.928933+00:00", "EventTime": "2024-05-21T12:24:50.928952+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3gcZ3Jif1N4gT3hi"], "accumulated_threat_level": 6.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "71ef1309-402e-4f57-9306-2132414601e3", "DetectTime": "2024-05-21T12:24:50.939248+00:00", "EventTime": "2024-05-21T12:24:50.939270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3gcZ3Jif1N4gT3hi"], "accumulated_threat_level": 7.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "21a85e73-c943-4f0a-ba99-a1904d4b603e", "DetectTime": "2024-05-21T12:24:50.952067+00:00", "EventTime": "2024-05-21T12:24:50.952086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLnp8ItzNYrKUUSDe"], "accumulated_threat_level": 8.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "af7455b3-9863-425d-a1a9-18eedef35719", "DetectTime": "2024-05-21T12:24:50.963187+00:00", "EventTime": "2024-05-21T12:24:50.963206+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK2g5OUmtyjprnyY"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "ef302c74-1a32-418e-b589-16aa383417f3", "DetectTime": "2024-05-21T12:24:50.974566+00:00", "EventTime": "2024-05-21T12:24:50.974584+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK2g5OUmtyjprnyY"], "accumulated_threat_level": 8.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "2403be5a-fa73-4e20-9356-210224352cbf", "DetectTime": "2024-05-21T12:24:50.985212+00:00", "EventTime": "2024-05-21T12:24:50.985231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK2g5OUmtyjprnyY"], "accumulated_threat_level": 9.4, "timewindow": 10} +{"Format": "IDEA0", "ID": "65e563e4-8e71-4b54-b05c-9795fd0e147a", "DetectTime": "2024-05-21T12:24:50.996078+00:00", "EventTime": "2024-05-21T12:24:50.996095+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkj8z3W9jI26H0Z8f"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "d465f29d-8c6b-4e99-8c4a-e8fe21e20a6f", "DetectTime": "2024-05-21T12:24:51.006800+00:00", "EventTime": "2024-05-21T12:24:51.006818+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkj8z3W9jI26H0Z8f"], "accumulated_threat_level": 9.9, "timewindow": 10} +{"Format": "IDEA0", "ID": "f062b5a4-dfee-4b03-ab51-59806c6139bc", "DetectTime": "2024-05-21T12:24:51.016988+00:00", "EventTime": "2024-05-21T12:24:51.017007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkj8z3W9jI26H0Z8f"], "accumulated_threat_level": 10.700000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "1cb2d005-05a5-424e-84b1-db87468d37f3", "DetectTime": "2024-05-21T12:24:51.027996+00:00", "EventTime": "2024-05-21T12:24:51.028016+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1x0ravkFxqscJIf"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "f10c9fa9-2cad-4ab3-9313-1aa4ba54d40a", "DetectTime": "2024-05-21T12:24:51.039699+00:00", "EventTime": "2024-05-21T12:24:51.039716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1x0ravkFxqscJIf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "8092e934-dd06-4c5d-9ba4-1b1a82358787", "DetectTime": "2024-05-21T12:24:51.049220+00:00", "EventTime": "2024-05-21T12:24:51.049237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1x0ravkFxqscJIf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 10} +{"Format": "Json", "ID": "8092e934-dd06-4c5d-9ba4-1b1a82358787", "DetectTime": "2024-05-21T12:24:51.049220+00:00", "EventTime": "2024-05-21T12:24:51.049237+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "1970-01-01T09:12:25.919864+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2024/05/21 12:24:51.175801)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 10, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b1df6a03-6a46-4d59-b984-4f4dcf77d37a", "DetectTime": "2024-05-21T12:24:51.188223+00:00", "EventTime": "2024-05-21T12:24:51.188243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugwkwyulsOnG3JGk"], "accumulated_threat_level": 0.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "f2ce9a9a-4121-4039-ac7c-24127acac708", "DetectTime": "2024-05-21T12:24:51.202352+00:00", "EventTime": "2024-05-21T12:24:51.202374+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1bCS1Dpie5QYkYNa"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "b2b923e0-c302-468b-b285-d394424e5566", "DetectTime": "2024-05-21T12:24:51.216288+00:00", "EventTime": "2024-05-21T12:24:51.216310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1bCS1Dpie5QYkYNa"], "accumulated_threat_level": 1.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "4f1b8198-d107-450a-bf41-92466bdd9600", "DetectTime": "2024-05-21T12:24:51.228916+00:00", "EventTime": "2024-05-21T12:24:51.228935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1bCS1Dpie5QYkYNa"], "accumulated_threat_level": 2.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "e21349d4-978f-47d6-adfb-e75bf0ee8411", "DetectTime": "2024-05-21T12:24:51.247613+00:00", "EventTime": "2024-05-21T12:24:51.247631+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeK1to3m3NVhZoEnc2"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "8fca89ce-ca97-474c-8ab2-9f47b3ef66fc", "DetectTime": "2024-05-21T12:24:51.277036+00:00", "EventTime": "2024-05-21T12:24:51.277054+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeK1to3m3NVhZoEnc2"], "accumulated_threat_level": 2.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "84f29e76-2742-4b68-9a95-3bbcc5ae389d", "DetectTime": "2024-05-21T12:24:51.289737+00:00", "EventTime": "2024-05-21T12:24:51.289759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeK1to3m3NVhZoEnc2"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "60b3348d-877d-4a96-a27b-c2f523f2a455", "DetectTime": "2024-05-21T12:24:51.301326+00:00", "EventTime": "2024-05-21T12:24:51.301343+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Eoup4Mz3XgGwEILe"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "65ccb900-1060-4f42-b2da-0c3b3b0a9571", "DetectTime": "2024-05-21T12:24:51.312255+00:00", "EventTime": "2024-05-21T12:24:51.312273+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Eoup4Mz3XgGwEILe"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "6e0214b9-40bf-411b-a54d-377071ba84c7", "DetectTime": "2024-05-21T12:24:51.322957+00:00", "EventTime": "2024-05-21T12:24:51.322975+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChRSNuByuaZlDDG9"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "2f46f6dd-5793-41a4-9f75-b5ae4a1d618f", "DetectTime": "2024-05-21T12:24:51.333808+00:00", "EventTime": "2024-05-21T12:24:51.333825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChRSNuByuaZlDDG9"], "accumulated_threat_level": 4.4, "timewindow": 10} +{"Format": "IDEA0", "ID": "05c53c24-851e-4cc6-a295-fdffa821ccae", "DetectTime": "2024-05-21T12:24:51.338149+00:00", "EventTime": "2024-05-21T12:24:51.338165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMKqo1RjbYCI3llnc"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "b6f01c1b-c564-416f-bf4e-806c0bcd7223", "DetectTime": "2024-05-21T12:24:51.347846+00:00", "EventTime": "2024-05-21T12:24:51.347864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChRSNuByuaZlDDG9"], "accumulated_threat_level": 5.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "a95e0f60-235a-4b3e-99d0-af71925d4f1c", "DetectTime": "2024-05-21T12:24:51.359032+00:00", "EventTime": "2024-05-21T12:24:51.359052+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBuVi3sAwuecyOnw6"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "2268a18c-8751-4cc4-89df-cf09abc35996", "DetectTime": "2024-05-21T12:24:51.374139+00:00", "EventTime": "2024-05-21T12:24:51.374161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBuVi3sAwuecyOnw6"], "accumulated_threat_level": 5.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "11573adb-bbd4-492f-845d-47d22e0d7dfb", "DetectTime": "2024-05-21T12:24:51.385860+00:00", "EventTime": "2024-05-21T12:24:51.385881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBuVi3sAwuecyOnw6"], "accumulated_threat_level": 6.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "67795e46-ce25-46e1-af83-d7fc6440ac1a", "DetectTime": "2024-05-21T12:24:51.390577+00:00", "EventTime": "2024-05-21T12:24:51.390594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35iMf3fuxoRnlgKg3"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "24d1fd13-5512-49a3-8bf1-de4cc4eddc4d", "DetectTime": "2024-05-21T12:24:51.401177+00:00", "EventTime": "2024-05-21T12:24:51.401195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWcCC2G0UHNVXfJo1"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "c26d8021-b724-495f-bc6d-ba5d8cebc5b9", "DetectTime": "2024-05-21T12:24:51.413162+00:00", "EventTime": "2024-05-21T12:24:51.413180+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWcCC2G0UHNVXfJo1"], "accumulated_threat_level": 7.0, "timewindow": 10} +{"Format": "IDEA0", "ID": "b339ad6d-e7ae-4590-bad3-66b4099e066f", "DetectTime": "2024-05-21T12:24:51.417972+00:00", "EventTime": "2024-05-21T12:24:51.417990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH4hk63m7RMiqtEDGk"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "225bf60a-4412-4390-a250-b6a605eb374f", "DetectTime": "2024-05-21T12:24:51.422583+00:00", "EventTime": "2024-05-21T12:24:51.422601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62HzN3oEtRK2GFPW5"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "9224f9e8-d98e-4ece-ad11-ae4d07bea402", "DetectTime": "2024-05-21T12:24:51.433065+00:00", "EventTime": "2024-05-21T12:24:51.433085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYIf2c4xr8uxMF7ji4"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "2c294d33-7225-42b8-9f6e-347af2771c78", "DetectTime": "2024-05-21T12:24:51.437809+00:00", "EventTime": "2024-05-21T12:24:51.437827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfkqc1dMkUCkKxnH3"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "98d27551-d52b-46e5-a7a9-a43138042aaf", "DetectTime": "2024-05-21T12:24:51.448839+00:00", "EventTime": "2024-05-21T12:24:51.448858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrLppSQPxEf8RlN1"], "accumulated_threat_level": 7.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "0733c958-cf68-4869-abb0-d1df643d8ea0", "DetectTime": "2024-05-21T12:24:51.459954+00:00", "EventTime": "2024-05-21T12:24:51.459972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvT3gw4WsZ12NaeOUj"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "7ac4a504-9177-4f4d-9047-64f78a559350", "DetectTime": "2024-05-21T12:24:51.470870+00:00", "EventTime": "2024-05-21T12:24:51.470888+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvT3gw4WsZ12NaeOUj"], "accumulated_threat_level": 8.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "101b38be-97df-4ee3-b12d-b5d50df57dad", "DetectTime": "2024-05-21T12:24:51.480733+00:00", "EventTime": "2024-05-21T12:24:51.480751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvT3gw4WsZ12NaeOUj"], "accumulated_threat_level": 9.100000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "e50ad624-7dea-4127-ae37-1889d70b8bd4", "DetectTime": "2024-05-21T12:24:51.490997+00:00", "EventTime": "2024-05-21T12:24:51.491015+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8SsQ280y9hqpGcE9"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "00afa88a-ea76-428a-b254-77f38dbdfdf7", "DetectTime": "2024-05-21T12:24:51.503154+00:00", "EventTime": "2024-05-21T12:24:51.503174+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8SsQ280y9hqpGcE9"], "accumulated_threat_level": 9.600000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "94aaa93d-bb58-4718-9b43-4bce60441ed2", "DetectTime": "2024-05-21T12:24:51.515772+00:00", "EventTime": "2024-05-21T12:24:51.515790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8SsQ280y9hqpGcE9"], "accumulated_threat_level": 10.400000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "a9af8fea-ad00-413e-82ad-7accd4d5067f", "DetectTime": "2024-05-21T12:24:51.528291+00:00", "EventTime": "2024-05-21T12:24:51.528311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiMBQK1Jzwxb6wXSVb"], "accumulated_threat_level": 11.200000000000003, "timewindow": 10} +{"Format": "IDEA0", "ID": "50a8bee3-f6b0-41a0-81ca-24bdefc3ef88", "DetectTime": "2024-05-21T12:24:51.543815+00:00", "EventTime": "2024-05-21T12:24:51.543833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4jb4hTRjRQOlgp5"], "accumulated_threat_level": 12.000000000000004, "timewindow": 10} +{"Format": "Json", "ID": "50a8bee3-f6b0-41a0-81ca-24bdefc3ef88", "DetectTime": "2024-05-21T12:24:51.543815+00:00", "EventTime": "2024-05-21T12:24:51.543833+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "1970-01-01T09:13:06.083977+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2024/05/21 12:24:51.709330)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000004, "timewindow": 10, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000004} +{"Format": "IDEA0", "ID": "22f7d152-93d0-4aed-95d7-939ca1ffe3c3", "DetectTime": "2024-05-21T12:24:51.713927+00:00", "EventTime": "2024-05-21T12:24:51.713948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70NBU2paDd6mSjerh"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "e5767574-32a0-4512-bbd9-3ba1c713d659", "DetectTime": "2024-05-21T12:24:51.725082+00:00", "EventTime": "2024-05-21T12:24:51.725099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CagIkLxCZvjmEjhYh"], "accumulated_threat_level": 0.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "c37254f7-f3d1-4a9a-90f3-1239cf010537", "DetectTime": "2024-05-21T12:24:51.729535+00:00", "EventTime": "2024-05-21T12:24:51.729554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJrqS18k7z9A01Uch"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "eb63cedf-75a8-427f-b739-e69337b95408", "DetectTime": "2024-05-21T12:24:51.734104+00:00", "EventTime": "2024-05-21T12:24:51.734122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIjYyCrpcQabNPVEk"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "be71cd17-ee93-40b3-afd8-cf0e62aaff89", "DetectTime": "2024-05-21T12:24:51.744606+00:00", "EventTime": "2024-05-21T12:24:51.744624+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAAdW2EJeRQJLbhE"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "988ac577-e0c6-4526-8383-da4a5b204831", "DetectTime": "2024-05-21T12:24:51.755545+00:00", "EventTime": "2024-05-21T12:24:51.755563+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAAdW2EJeRQJLbhE"], "accumulated_threat_level": 1.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "cbb83699-681e-4d93-883a-7a30efef141c", "DetectTime": "2024-05-21T12:24:51.766658+00:00", "EventTime": "2024-05-21T12:24:51.766676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUazX33DxXbr40t4Ab"], "accumulated_threat_level": 2.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "7d7e623f-22e5-46fc-a232-05bcc4317ce5", "DetectTime": "2024-05-21T12:24:51.771493+00:00", "EventTime": "2024-05-21T12:24:51.771511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmvAsjdnGBocSUdMh"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "af3c683e-b88f-430c-a63f-ff6ef3c4f6ee", "DetectTime": "2024-05-21T12:24:51.776240+00:00", "EventTime": "2024-05-21T12:24:51.776257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwbApqrZv0vKi7Q3"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "b2e0fd25-d892-4fc1-93bd-b95f65739546", "DetectTime": "2024-05-21T12:24:51.780942+00:00", "EventTime": "2024-05-21T12:24:51.780960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHJw728PUEtZE8ZEh"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "d0fa0b31-4669-4cc8-b4c7-9530558864e0", "DetectTime": "2024-05-21T12:24:51.790796+00:00", "EventTime": "2024-05-21T12:24:51.790813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAAdW2EJeRQJLbhE"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "b673d328-de39-4071-87c3-db68d1573a96", "DetectTime": "2024-05-21T12:24:51.795340+00:00", "EventTime": "2024-05-21T12:24:51.795358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDdCK6OCwOzXuu143"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "683f3246-4fec-44bc-a319-5aba7031e803", "DetectTime": "2024-05-21T12:24:51.799785+00:00", "EventTime": "2024-05-21T12:24:51.799803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZMk61xIXrcC1lmml"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "ba2cce19-c5fe-4b35-b59c-fcf8329bf99d", "DetectTime": "2024-05-21T12:24:51.804377+00:00", "EventTime": "2024-05-21T12:24:51.804394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7dWc15MekQ6ybim"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "a448e91a-0a91-4fe7-9ec4-3a85097c6d48", "DetectTime": "2024-05-21T12:24:51.808898+00:00", "EventTime": "2024-05-21T12:24:51.808916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqolbH2xduWaMK6jP1"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "c8e36819-d564-4f1a-a3bf-447db40010cc", "DetectTime": "2024-05-21T12:24:51.820350+00:00", "EventTime": "2024-05-21T12:24:51.820370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGg9gW2QWGZs0yAJr2"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "7ad9da72-4eba-4c08-a30c-5459a0724df2", "DetectTime": "2024-05-21T12:24:51.825073+00:00", "EventTime": "2024-05-21T12:24:51.825092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crmkdx3nLBPyTDOj92"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "2286a080-b4e6-4629-9508-25ae5eab29c0", "DetectTime": "2024-05-21T12:24:51.829635+00:00", "EventTime": "2024-05-21T12:24:51.829653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIgF0T1B7hcd5hy20e"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "f15870b7-816c-4d63-bec8-e2bfc286ba5e", "DetectTime": "2024-05-21T12:24:51.834005+00:00", "EventTime": "2024-05-21T12:24:51.834023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd64629OeBe9y44Qh"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "ec7d8873-6675-47f1-a9fe-b89d05d209d8", "DetectTime": "2024-05-21T12:24:51.838462+00:00", "EventTime": "2024-05-21T12:24:51.838480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3avFe3hB045bKiXH"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "f59365b5-411c-45ec-b4aa-5b0205497e86", "DetectTime": "2024-05-21T12:24:51.849295+00:00", "EventTime": "2024-05-21T12:24:51.849314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8Bto28EXkAYkjitb"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "2dcfb86e-0256-4822-b771-41a456f6477f", "DetectTime": "2024-05-21T12:24:51.854471+00:00", "EventTime": "2024-05-21T12:24:51.854492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.253.82.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHjM92Y7YkH7YjwMg"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "a705e172-f389-4233-a641-b8b78d7b7fbe", "DetectTime": "2024-05-21T12:24:51.864112+00:00", "EventTime": "2024-05-21T12:24:51.864130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.90.187.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXN5tX33cVnekL5Kn5"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "1f9951bc-6aa1-47c9-b379-cff696d50c5e", "DetectTime": "2024-05-21T12:24:51.868555+00:00", "EventTime": "2024-05-21T12:24:51.868573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm2DC31MLoL3QDU0d6", "CNAZ3G2US9HRNwlEp5", "CxlHrJ1WNBi5AVCymb", "CyxAAU1PVoHibX9r5c"], "accumulated_threat_level": 4.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "b29960b4-df5c-4731-a9e4-2cba7c6abfe8", "DetectTime": "2024-05-21T12:24:51.884676+00:00", "EventTime": "2024-05-21T12:24:51.884694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.96.161.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrA5uz1pwarWlSNpma"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "19e2ff66-5fe8-4c91-90b5-a44498c940b0", "DetectTime": "2024-05-21T12:24:51.895512+00:00", "EventTime": "2024-05-21T12:24:51.895531+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.96.161.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.96.161.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrA5uz1pwarWlSNpma"], "accumulated_threat_level": 4.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "5e4d5f88-cd3f-4361-bced-bd1848a71595", "DetectTime": "2024-05-21T12:24:51.900091+00:00", "EventTime": "2024-05-21T12:24:51.900109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBoIF3apXmkTwSfJ6"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "85e33c76-2a5f-466d-914d-8e80a4d5062c", "DetectTime": "2024-05-21T12:24:51.910045+00:00", "EventTime": "2024-05-21T12:24:51.910064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYYR02PHyIDTkpDb"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "220b43f1-0ce7-42a4-abf3-daafbabb3933", "DetectTime": "2024-05-21T12:24:51.915167+00:00", "EventTime": "2024-05-21T12:24:51.915188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxLuh3JkUsMo7Iak1"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "76f571d1-4096-4c64-a3e8-73c6cccf4cb0", "DetectTime": "2024-05-21T12:24:51.919806+00:00", "EventTime": "2024-05-21T12:24:51.919824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5LmSkPvDM7VoLSd"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "f26257a8-11d1-4ade-a8c0-2057d270ca0f", "DetectTime": "2024-05-21T12:24:51.929599+00:00", "EventTime": "2024-05-21T12:24:51.929619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qEeKTFA1ekwa4fj"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "932e78cc-b965-48da-a14f-e782258f0d10", "DetectTime": "2024-05-21T12:24:51.934198+00:00", "EventTime": "2024-05-21T12:24:51.934216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC04x11wQAYqJTYBWa"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "be18fa51-5c26-4758-861c-65bcc054181a", "DetectTime": "2024-05-21T12:24:51.938833+00:00", "EventTime": "2024-05-21T12:24:51.938853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxspx72uBro4tNley1"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "fed5d467-b175-4dd9-abf2-c5e082d412d1", "DetectTime": "2024-05-21T12:24:51.943573+00:00", "EventTime": "2024-05-21T12:24:51.943593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xNpk2zwgTEIry9q1"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "71370b5d-67e5-4324-80bc-e4dd3c4904ef", "DetectTime": "2024-05-21T12:24:51.948505+00:00", "EventTime": "2024-05-21T12:24:51.948526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.27.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct34Rp1Rja4wwruNM5"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "de1ea2f5-e552-45fc-9d3e-777a55595d85", "DetectTime": "2024-05-21T12:24:51.970919+00:00", "EventTime": "2024-05-21T12:24:51.970936+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.247.233.74"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyJtv1uOjBOXMwQPd"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "f2bc4fe4-4efe-4248-85c3-bf06daaa9f93", "DetectTime": "2024-05-21T12:24:51.981897+00:00", "EventTime": "2024-05-21T12:24:51.981925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.247.233.74"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.247.233.74 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyJtv1uOjBOXMwQPd"], "accumulated_threat_level": 5.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "b8c21342-7a21-49e6-9dd8-2864026a4c8a", "DetectTime": "2024-05-21T12:24:51.991900+00:00", "EventTime": "2024-05-21T12:24:51.991918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.114.37 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwOBB1ptsvgdkgfEl"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "1e0e012f-b169-462d-bb7a-7576a0b7177c", "DetectTime": "2024-05-21T12:24:51.996326+00:00", "EventTime": "2024-05-21T12:24:51.996343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.165.116.48 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtFiodylDZx7cttb"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "89146c7d-30d3-4288-91eb-08405725a38f", "DetectTime": "2024-05-21T12:24:52.000729+00:00", "EventTime": "2024-05-21T12:24:52.000747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.49.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJ0Je33tHJ6pQaGz"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "d356a8d1-f744-4e20-8fa9-cd8d4944259b", "DetectTime": "2024-05-21T12:24:52.005173+00:00", "EventTime": "2024-05-21T12:24:52.005191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUN8v456AeCK4hYcd"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "8c0e9f62-44b7-4cf6-97b8-0c2c61e4ca7c", "DetectTime": "2024-05-21T12:24:52.009559+00:00", "EventTime": "2024-05-21T12:24:52.009577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUJBw17ITkH4E77Wd"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "7376c892-d1ed-402a-a5ae-96e4aafd6c97", "DetectTime": "2024-05-21T12:24:52.014054+00:00", "EventTime": "2024-05-21T12:24:52.014072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3SRxB2QR7JdAQ4vNh"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "e2e8e63d-abbe-417e-865c-222b5dcafbf3", "DetectTime": "2024-05-21T12:24:52.018470+00:00", "EventTime": "2024-05-21T12:24:52.018488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.129.61 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbeJyE47X1oFC6H4"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "fa2b8a05-8a49-489e-ab50-0d4bc3cf848f", "DetectTime": "2024-05-21T12:24:52.022942+00:00", "EventTime": "2024-05-21T12:24:52.022960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCiWz4ePvgYOEVymf"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "bfc123fa-71a9-4996-87be-64207e9c4b98", "DetectTime": "2024-05-21T12:24:52.033850+00:00", "EventTime": "2024-05-21T12:24:52.033872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChhecLUgmXqUcrRza"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "e336075e-1af7-45ca-ae8d-27f064082e4b", "DetectTime": "2024-05-21T12:24:52.038277+00:00", "EventTime": "2024-05-21T12:24:52.038295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfq073kx7Y522ffL4"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "1e88f276-45c3-428e-8fbd-44024b83987d", "DetectTime": "2024-05-21T12:24:52.042771+00:00", "EventTime": "2024-05-21T12:24:52.042789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.107.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBorFE4pGbreUW9txi"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "3f1eff0a-486a-46d8-a0b8-929590c6be2b", "DetectTime": "2024-05-21T12:24:52.047159+00:00", "EventTime": "2024-05-21T12:24:52.047177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZsGF2b6w9BEyEAee"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "97693102-2fb8-4098-96d7-c900b0c743d4", "DetectTime": "2024-05-21T12:24:52.051502+00:00", "EventTime": "2024-05-21T12:24:52.051520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4mRL32ihNr1AUCti"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "b2fbecd3-65d2-4296-a223-0d09b84335e5", "DetectTime": "2024-05-21T12:24:52.055888+00:00", "EventTime": "2024-05-21T12:24:52.055906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.119.190.39 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcWYERxT0eetUUYe"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "24fecd31-6f11-4b4f-9692-ee5a2c62b3ea", "DetectTime": "2024-05-21T12:24:52.067367+00:00", "EventTime": "2024-05-21T12:24:52.067389+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwzBCj4lGBUEczGYvd"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "99095670-9e91-4ba4-bcd6-838c28a44c76", "DetectTime": "2024-05-21T12:24:52.079138+00:00", "EventTime": "2024-05-21T12:24:52.079158+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwzBCj4lGBUEczGYvd"], "accumulated_threat_level": 5.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "8efa9b0a-598a-4d7b-825e-6ecf58f0f108", "DetectTime": "2024-05-21T12:24:52.083790+00:00", "EventTime": "2024-05-21T12:24:52.083809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwocS3PruftwIIKzl"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "70a9b9b6-a6b4-4e75-81b1-d0015de49c31", "DetectTime": "2024-05-21T12:24:52.088782+00:00", "EventTime": "2024-05-21T12:24:52.088800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.1.28.117 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjZR11Z8UyypuMZuj"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "6a0e8125-5dd7-4209-83e1-f42a6bd0f026", "DetectTime": "2024-05-21T12:24:52.099249+00:00", "EventTime": "2024-05-21T12:24:52.099267+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjbn23anWfC514Imd"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "9cf6d670-bf31-4be0-84c6-e4f432d2fb87", "DetectTime": "2024-05-21T12:24:52.110053+00:00", "EventTime": "2024-05-21T12:24:52.110071+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjbn23anWfC514Imd"], "accumulated_threat_level": 6.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "37d3ea1e-d2a4-4b11-a33a-5279b369b042", "DetectTime": "2024-05-21T12:24:52.120528+00:00", "EventTime": "2024-05-21T12:24:52.120549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2qMP2ENhBjpb19N5"], "accumulated_threat_level": 7.0, "timewindow": 10} +{"Format": "IDEA0", "ID": "7f2cc09d-ed2f-4eae-8bd7-f7d914e19cc1", "DetectTime": "2024-05-21T12:24:52.125407+00:00", "EventTime": "2024-05-21T12:24:52.125427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1NR2cwXqVYF4t17"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "57a5418a-52bc-423f-a583-69dd85f39e2c", "DetectTime": "2024-05-21T12:24:52.130233+00:00", "EventTime": "2024-05-21T12:24:52.130251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmAN93sR8oBJAtMDc"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "5704f179-bbea-465f-bdd3-f2098d50603f", "DetectTime": "2024-05-21T12:24:52.140178+00:00", "EventTime": "2024-05-21T12:24:52.140196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjbn23anWfC514Imd"], "accumulated_threat_level": 7.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "ce682f94-262b-4c1a-84e4-90a69082dad9", "DetectTime": "2024-05-21T12:24:52.150797+00:00", "EventTime": "2024-05-21T12:24:52.150815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNZQ13C76lYo9KJsg"], "accumulated_threat_level": 8.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "fbc709df-d345-4ae7-9e52-203c58d3bb40", "DetectTime": "2024-05-21T12:24:52.161344+00:00", "EventTime": "2024-05-21T12:24:52.161360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CspAZq1Fr658LtCo3l"], "accumulated_threat_level": 9.4, "timewindow": 10} +{"Format": "IDEA0", "ID": "1bfde6ef-c39a-468b-a643-04405ad2dc9f", "DetectTime": "2024-05-21T12:24:52.165612+00:00", "EventTime": "2024-05-21T12:24:52.165629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbi5vz7wvc4kcM7g"], "accumulated_threat_level": 5.5, "timewindow": 7} +{"Format": "IDEA0", "ID": "61f30f5f-859d-4e7c-9879-ba32295c3e20", "DetectTime": "2024-05-21T12:24:52.178934+00:00", "EventTime": "2024-05-21T12:24:52.178955+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAyDzL1k65bhOJVh9a"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "3d7ffcea-3c2d-4a66-afee-38f1e1e644ab", "DetectTime": "2024-05-21T12:24:52.192355+00:00", "EventTime": "2024-05-21T12:24:52.192373+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAyDzL1k65bhOJVh9a"], "accumulated_threat_level": 9.9, "timewindow": 10} +{"Format": "IDEA0", "ID": "09941f32-9d49-4bce-8cf7-c28084e3a8b3", "DetectTime": "2024-05-21T12:24:52.206232+00:00", "EventTime": "2024-05-21T12:24:52.206249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAyDzL1k65bhOJVh9a"], "accumulated_threat_level": 10.700000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "63c64a7f-09b0-45fe-a30c-a860033db91d", "DetectTime": "2024-05-21T12:24:52.216555+00:00", "EventTime": "2024-05-21T12:24:52.216573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70x5PbtwgMCMR4C5"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "ba50433e-7916-4a0e-852f-8b081750dcec", "DetectTime": "2024-05-21T12:24:52.227745+00:00", "EventTime": "2024-05-21T12:24:52.227763+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70x5PbtwgMCMR4C5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "82da0069-efa8-449d-8d7e-d8da63c1fcbe", "DetectTime": "2024-05-21T12:24:52.248273+00:00", "EventTime": "2024-05-21T12:24:52.248293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70x5PbtwgMCMR4C5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 10} +{"Format": "Json", "ID": "82da0069-efa8-449d-8d7e-d8da63c1fcbe", "DetectTime": "2024-05-21T12:24:52.248273+00:00", "EventTime": "2024-05-21T12:24:52.248293+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "1970-01-01T09:44:35.224464+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2024/05/21 12:24:52.526807)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 10, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c2b61c71-aa66-47c8-b410-73542365a573", "DetectTime": "2024-05-21T12:24:52.538398+00:00", "EventTime": "2024-05-21T12:24:52.538431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfRW3DQurucKhokf"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "61cc2b23-38c7-40a3-82d7-324efdf155cd", "DetectTime": "2024-05-21T12:24:52.549751+00:00", "EventTime": "2024-05-21T12:24:52.549768+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfRW3DQurucKhokf"], "accumulated_threat_level": 0.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "4d42f844-90ca-461c-89c7-f2fa1fdf4c03", "DetectTime": "2024-05-21T12:24:52.559577+00:00", "EventTime": "2024-05-21T12:24:52.559599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfRW3DQurucKhokf"], "accumulated_threat_level": 1.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "19a09af3-d25a-4dd9-b38e-f1975d143af0", "DetectTime": "2024-05-21T12:24:52.569327+00:00", "EventTime": "2024-05-21T12:24:52.569345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ8oMAtBvNCiWEq95", "COPYyL38RHtBfME0x6", "C50WoH2wwOQpApRKL", "CRCkDGgV2GNBLJkma"], "accumulated_threat_level": 1.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "c9144b04-b08a-4a96-beb8-dc58c53b98e2", "DetectTime": "2024-05-21T12:24:52.586793+00:00", "EventTime": "2024-05-21T12:24:52.586811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSynny3Z9W2o3Fe86g"], "accumulated_threat_level": 2.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "1f35b9d0-8de6-4c6a-890f-f729689c13a0", "DetectTime": "2024-05-21T12:24:52.596576+00:00", "EventTime": "2024-05-21T12:24:52.596595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDUqY2wYhPhjxJM24"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "0b8df6a4-7e44-48c2-bf40-281e558510b4", "DetectTime": "2024-05-21T12:24:52.606544+00:00", "EventTime": "2024-05-21T12:24:52.606562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7vWeT3h2O9MJfnAc9"], "accumulated_threat_level": 4.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "237a911d-e3eb-460b-978e-3ebb3b516a12", "DetectTime": "2024-05-21T12:24:52.616491+00:00", "EventTime": "2024-05-21T12:24:52.616509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZUhc1Ezd8Nli6Uwd"], "accumulated_threat_level": 5.0, "timewindow": 10} +{"Format": "IDEA0", "ID": "f801ef6d-53d9-4fd2-a156-e3c593857e0f", "DetectTime": "2024-05-21T12:24:52.627357+00:00", "EventTime": "2024-05-21T12:24:52.627375+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHiy3SeSx4ZvuTB4"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "d785ead9-a099-44b6-a492-6daa3e379c01", "DetectTime": "2024-05-21T12:24:52.638377+00:00", "EventTime": "2024-05-21T12:24:52.638394+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHiy3SeSx4ZvuTB4"], "accumulated_threat_level": 5.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "bac9372e-0193-46d4-9f75-5a22fb88b04b", "DetectTime": "2024-05-21T12:24:52.648408+00:00", "EventTime": "2024-05-21T12:24:52.648427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHiy3SeSx4ZvuTB4"], "accumulated_threat_level": 6.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "0ef58add-60e7-4ae2-ae4d-6743651119d9", "DetectTime": "2024-05-21T12:24:52.659118+00:00", "EventTime": "2024-05-21T12:24:52.659136+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cubqb71WBAVbRJWFg3"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "602f728a-1318-45b5-afac-1d0ec6bc4a7d", "DetectTime": "2024-05-21T12:24:52.670177+00:00", "EventTime": "2024-05-21T12:24:52.670196+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cubqb71WBAVbRJWFg3"], "accumulated_threat_level": 6.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "d2f95c57-63d0-4352-b660-1ae871f35e7e", "DetectTime": "2024-05-21T12:24:52.680138+00:00", "EventTime": "2024-05-21T12:24:52.680156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cubqb71WBAVbRJWFg3"], "accumulated_threat_level": 7.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "570a3044-c0ec-4db7-9378-403601a86373", "DetectTime": "2024-05-21T12:24:52.691277+00:00", "EventTime": "2024-05-21T12:24:52.691295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrwXk2O6VruETN2Bg"], "accumulated_threat_level": 8.4, "timewindow": 10} +{"Format": "IDEA0", "ID": "5cb14979-75da-4ede-86ef-167f05a82563", "DetectTime": "2024-05-21T12:24:52.704687+00:00", "EventTime": "2024-05-21T12:24:52.704709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrwXk2O6VruETN2Bg"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "794dee71-a7c6-4d93-9e54-0b91ea32a6c0", "DetectTime": "2024-05-21T12:24:52.716481+00:00", "EventTime": "2024-05-21T12:24:52.716500+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrwXk2O6VruETN2Bg"], "accumulated_threat_level": 8.9, "timewindow": 10} +{"Format": "IDEA0", "ID": "5047b6d3-20ef-486f-a20b-0238553fb80e", "DetectTime": "2024-05-21T12:24:52.731967+00:00", "EventTime": "2024-05-21T12:24:52.731985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccm6elxbWIUP6LQD6"], "accumulated_threat_level": 9.700000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "1dfbb508-be84-495f-ad03-d96a763eedee", "DetectTime": "2024-05-21T12:24:52.743420+00:00", "EventTime": "2024-05-21T12:24:52.743438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2756toBWzKAEGgP9"], "accumulated_threat_level": 10.500000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "34334f2e-73f4-435c-825f-93019ffa75c7", "DetectTime": "2024-05-21T12:24:52.753249+00:00", "EventTime": "2024-05-21T12:24:52.753267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbuw52K1WnMc6kqR7"], "accumulated_threat_level": 11.300000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "a715df36-7555-4718-87b8-982d99899750", "DetectTime": "2024-05-21T12:24:52.763736+00:00", "EventTime": "2024-05-21T12:24:52.763754+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDF8630yOeYNARNsk"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "531299b1-3a7f-4b36-98aa-2f0d2344c443", "DetectTime": "2024-05-21T12:24:52.774950+00:00", "EventTime": "2024-05-21T12:24:52.774972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDF8630yOeYNARNsk"], "accumulated_threat_level": 11.800000000000002, "timewindow": 10} +{"Format": "IDEA0", "ID": "c97ca328-8aef-4821-ada8-14517d57dec0", "DetectTime": "2024-05-21T12:24:52.780058+00:00", "EventTime": "2024-05-21T12:24:52.780078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.253.82.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Poqc1EmwoqD09uof"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9e302001-a57f-45a4-bfa9-6d42aef69a0b", "DetectTime": "2024-05-21T12:24:52.786962+00:00", "EventTime": "2024-05-21T12:24:52.786980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.107.44 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSAtL1j5kg5m28ruf"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "c97a9b9c-d4bb-44c2-b4db-f37ad0dbf980", "DetectTime": "2024-05-21T12:24:52.797189+00:00", "EventTime": "2024-05-21T12:24:52.797207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDF8630yOeYNARNsk"], "accumulated_threat_level": 12.600000000000003, "timewindow": 10} +{"Format": "Json", "ID": "c97a9b9c-d4bb-44c2-b4db-f37ad0dbf980", "DetectTime": "2024-05-21T12:24:52.797189+00:00", "EventTime": "2024-05-21T12:24:52.797207+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "1970-01-01T09:45:11.143050+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2024/05/21 12:24:53.037356)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 10, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "47d9d947-17cf-4671-897f-fdaa23512428", "DetectTime": "2024-05-21T12:24:53.047291+00:00", "EventTime": "2024-05-21T12:24:53.047309+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzcN231z9QoB7Dfw7"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "03f2b611-27ae-4f7a-8fa8-8d641231f312", "DetectTime": "2024-05-21T12:24:53.058259+00:00", "EventTime": "2024-05-21T12:24:53.058276+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzcN231z9QoB7Dfw7"], "accumulated_threat_level": 0.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "b688fe73-5815-4d8d-8375-2dc33d165e79", "DetectTime": "2024-05-21T12:24:53.069969+00:00", "EventTime": "2024-05-21T12:24:53.069990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzcN231z9QoB7Dfw7"], "accumulated_threat_level": 1.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "5c048fff-0ec2-4546-aba0-a7c7a9f5e195", "DetectTime": "2024-05-21T12:24:53.080779+00:00", "EventTime": "2024-05-21T12:24:53.080796+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjeST2Rgq0R4k9yT4"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "408f4c01-9f9e-4a4a-9f3e-79076f02375b", "DetectTime": "2024-05-21T12:24:53.092834+00:00", "EventTime": "2024-05-21T12:24:53.092852+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjeST2Rgq0R4k9yT4"], "accumulated_threat_level": 1.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "744ea4bb-63af-4fcd-a6d1-34c3c35f0394", "DetectTime": "2024-05-21T12:24:53.102969+00:00", "EventTime": "2024-05-21T12:24:53.102988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10559/UDP destination IP 36.72.103.199. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjeST2Rgq0R4k9yT4"], "accumulated_threat_level": 2.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "ffbfafe6-2b78-4313-a727-7ca3ac8a9a1d", "DetectTime": "2024-05-21T12:24:53.112842+00:00", "EventTime": "2024-05-21T12:24:53.112860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8lpdE1RMjIMi8hIjd"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "e8afa489-2682-4575-aed8-e3a674cf08d1", "DetectTime": "2024-05-21T12:24:53.124887+00:00", "EventTime": "2024-05-21T12:24:53.124905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdoG1w11X4CUbpJ6Ba"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "7eedc668-6b15-424c-9d0f-0c88aa439309", "DetectTime": "2024-05-21T12:24:53.136079+00:00", "EventTime": "2024-05-21T12:24:53.136097+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdoG1w11X4CUbpJ6Ba"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "ef9b8c57-9249-4ab6-917b-84628649113d", "DetectTime": "2024-05-21T12:24:53.146504+00:00", "EventTime": "2024-05-21T12:24:53.146522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdoG1w11X4CUbpJ6Ba"], "accumulated_threat_level": 4.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "ce353e48-e43d-4a6f-a395-10121a3d9511", "DetectTime": "2024-05-21T12:24:53.156865+00:00", "EventTime": "2024-05-21T12:24:53.156883+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHn0k3c0XcZHo6Hw5"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "0370a66b-d201-4440-b968-221a689040a1", "DetectTime": "2024-05-21T12:24:53.167438+00:00", "EventTime": "2024-05-21T12:24:53.167456+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHn0k3c0XcZHo6Hw5"], "accumulated_threat_level": 5.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "afb334e0-9602-4bd9-9de6-a267def01a2d", "DetectTime": "2024-05-21T12:24:53.177739+00:00", "EventTime": "2024-05-21T12:24:53.177756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHn0k3c0XcZHo6Hw5"], "accumulated_threat_level": 6.0, "timewindow": 10} +{"Format": "IDEA0", "ID": "5b0e8cce-7675-4dd2-a2c0-594e4c9a3680", "DetectTime": "2024-05-21T12:24:53.188922+00:00", "EventTime": "2024-05-21T12:24:53.188939+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjWxF37digTCXdLg9"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "4dd7b9bd-5cb9-42ef-8183-b43f62414702", "DetectTime": "2024-05-21T12:24:53.201462+00:00", "EventTime": "2024-05-21T12:24:53.201484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjWxF37digTCXdLg9"], "accumulated_threat_level": 6.5, "timewindow": 10} +{"Format": "IDEA0", "ID": "6673eb4c-3ab9-439b-9077-842b105d7fa0", "DetectTime": "2024-05-21T12:24:53.206739+00:00", "EventTime": "2024-05-21T12:24:53.206758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.1.28.117 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pfXj2P3tTx4YNHt4"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "50f0f01e-e072-4e6d-8d21-20774630a882", "DetectTime": "2024-05-21T12:24:53.216823+00:00", "EventTime": "2024-05-21T12:24:53.216841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "Connection to unknown destination port 29980/UDP destination IP 125.24.79.246. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjWxF37digTCXdLg9"], "accumulated_threat_level": 7.3, "timewindow": 10} +{"Format": "IDEA0", "ID": "b2ec42b2-8e7c-47fa-abc2-6100428035ae", "DetectTime": "2024-05-21T12:24:53.227299+00:00", "EventTime": "2024-05-21T12:24:53.227317+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwwln01pAJtRjf6Pq4"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "f8d530d1-26ee-44a8-8b6c-950c6ddb0c26", "DetectTime": "2024-05-21T12:24:53.244877+00:00", "EventTime": "2024-05-21T12:24:53.244895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwwln01pAJtRjf6Pq4"], "accumulated_threat_level": 7.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "8c28d727-4778-4d09-91e3-4d26679c4b50", "DetectTime": "2024-05-21T12:24:53.255622+00:00", "EventTime": "2024-05-21T12:24:53.255641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "Connection to unknown destination port 26145/UDP destination IP 180.242.248.65. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwwln01pAJtRjf6Pq4"], "accumulated_threat_level": 8.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "8296a59f-4168-41df-a0d0-353634a55dbe", "DetectTime": "2024-05-21T12:24:53.265869+00:00", "EventTime": "2024-05-21T12:24:53.265887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6A90f2eAEs2HzpyE7"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "66798797-c26f-4362-8f10-ad1a935e78c7", "DetectTime": "2024-05-21T12:24:53.277454+00:00", "EventTime": "2024-05-21T12:24:53.277473+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6A90f2eAEs2HzpyE7"], "accumulated_threat_level": 9.1, "timewindow": 10} +{"Format": "IDEA0", "ID": "6a379e8e-e59e-4686-884c-7c04ac4cde59", "DetectTime": "2024-05-21T12:24:53.287748+00:00", "EventTime": "2024-05-21T12:24:53.287766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6A90f2eAEs2HzpyE7"], "accumulated_threat_level": 9.9, "timewindow": 10} +{"Format": "IDEA0", "ID": "65255856-9fb9-4a15-be9e-42f9ad2d2f28", "DetectTime": "2024-05-21T12:24:53.300942+00:00", "EventTime": "2024-05-21T12:24:53.300959+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqfRC13CKsVDWwkrN3"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "74f99b45-a434-48a9-b953-ae4b5238bd6e", "DetectTime": "2024-05-21T12:24:53.311632+00:00", "EventTime": "2024-05-21T12:24:53.311650+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqfRC13CKsVDWwkrN3"], "accumulated_threat_level": 10.4, "timewindow": 10} +{"Format": "IDEA0", "ID": "f9b72e08-ed82-4851-867f-d3afa626647a", "DetectTime": "2024-05-21T12:24:53.321998+00:00", "EventTime": "2024-05-21T12:24:53.322017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqfRC13CKsVDWwkrN3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 10} +{"Format": "IDEA0", "ID": "c503e910-ad4e-47e5-8f9e-e377780331dd", "DetectTime": "2024-05-21T12:24:53.333072+00:00", "EventTime": "2024-05-21T12:24:53.333096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlw0k3aJENy46i12b"], "accumulated_threat_level": 12.000000000000002, "timewindow": 10} +{"Format": "Json", "ID": "c503e910-ad4e-47e5-8f9e-e377780331dd", "DetectTime": "2024-05-21T12:24:53.333072+00:00", "EventTime": "2024-05-21T12:24:53.333096+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "1970-01-01T09:45:15.222566+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 10. (real time 2024/05/21 12:24:53.575257)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 10, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "126c2674-d208-4d99-93e5-5f702ee21b6b", "DetectTime": "2024-05-21T12:24:53.586982+00:00", "EventTime": "2024-05-21T12:24:53.587001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pbuR10srZbcz8Rh6"], "accumulated_threat_level": 0.8, "timewindow": 10} +{"Format": "IDEA0", "ID": "3295e51a-c5cc-40b5-a80d-b62ab6361d0a", "DetectTime": "2024-05-21T12:24:53.598314+00:00", "EventTime": "2024-05-21T12:24:53.598334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["222.124.64.87"]}], "Attach": [{"Content": "Connection to unknown destination port 28047/UDP destination IP 222.124.64.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaYyLLdhxaXKihEj"], "accumulated_threat_level": 1.6, "timewindow": 10} +{"Format": "IDEA0", "ID": "9101ad6f-5c63-4e06-8951-aac09800626e", "DetectTime": "2024-05-21T12:24:53.602927+00:00", "EventTime": "2024-05-21T12:24:53.602944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YDq42bf15eHqH278"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "e70fa64e-e595-4f6e-aac4-36be9359a7c1", "DetectTime": "2024-05-21T12:24:53.607981+00:00", "EventTime": "2024-05-21T12:24:53.608002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZGie1Im62nHni064"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d595f0ac-6985-430e-9784-01c37544bced", "DetectTime": "2024-05-21T12:24:53.617847+00:00", "EventTime": "2024-05-21T12:24:53.617865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbUyA4Wygf8gfj8q7"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1247c0ff-3b94-4f81-9a02-32b4373525c6", "DetectTime": "2024-05-21T12:24:53.622517+00:00", "EventTime": "2024-05-21T12:24:53.622535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chbo9i1nA4CyDqwvue"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3d89e4eb-7c1c-4962-946b-864fb4f0c003", "DetectTime": "2024-05-21T12:24:53.627651+00:00", "EventTime": "2024-05-21T12:24:53.627669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPn17k4YH9HO6k94Kf"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "776a261f-a4a9-456d-a55c-9f5f66c42a98", "DetectTime": "2024-05-21T12:24:53.632866+00:00", "EventTime": "2024-05-21T12:24:53.632888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvFkP1ZE4gxDpaVdc"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "cc294d16-d36d-4ad2-9f67-6e02df275d13", "DetectTime": "2024-05-21T12:24:53.637964+00:00", "EventTime": "2024-05-21T12:24:53.637982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6bhn1FnBlzUzeEad"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "febd7310-cd94-478f-b20c-a10391dad6f7", "DetectTime": "2024-05-21T12:24:53.642608+00:00", "EventTime": "2024-05-21T12:24:53.642627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDaxc3oTrSp7wLFV3"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "5aca9cd3-8986-4741-8579-a548e3b6cc0c", "DetectTime": "2024-05-21T12:24:53.647979+00:00", "EventTime": "2024-05-21T12:24:53.647998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeN53H8X5BwqJOxSj"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b6485b86-d59a-489c-bc93-69a6456b6f4f", "DetectTime": "2024-05-21T12:24:53.652567+00:00", "EventTime": "2024-05-21T12:24:53.652585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4OjjTyengA2hKHb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "aed12903-5d2c-43d1-a111-ba4b13fa1407", "DetectTime": "2024-05-21T12:24:53.664516+00:00", "EventTime": "2024-05-21T12:24:53.664535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChUGY43T15ZsKdjDv8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 10} +{"Format": "IDEA0", "ID": "599c5211-0b32-4783-b952-5be82f01c516", "DetectTime": "2024-05-21T12:24:53.671270+00:00", "EventTime": "2024-05-21T12:24:53.671290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwIMEJ311U4iATJdwb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "e4e9a627-4dcb-4503-b8e1-1eb42da827af", "DetectTime": "2024-05-21T12:24:53.683777+00:00", "EventTime": "2024-05-21T12:24:53.683798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zQUI1cjtwqrHQJHb"], "accumulated_threat_level": 3.2, "timewindow": 10} +{"Format": "IDEA0", "ID": "2a36b16f-f619-4a44-8e6d-2b6568a0be64", "DetectTime": "2024-05-21T12:24:53.689208+00:00", "EventTime": "2024-05-21T12:24:53.689229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmqX8y13JHtlYYM45c"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7dded281-721d-451d-92b0-2320068dabab", "DetectTime": "2024-05-21T12:24:53.694134+00:00", "EventTime": "2024-05-21T12:24:53.694152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBxvn9m2a8bfn0ce"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "6ddb3c71-37c2-4e7f-9b76-5281e0cdb596", "DetectTime": "2024-05-21T12:24:53.705837+00:00", "EventTime": "2024-05-21T12:24:53.705856+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zQUI1cjtwqrHQJHb"], "accumulated_threat_level": 0, "timewindow": 10} +{"Format": "IDEA0", "ID": "de2bf010-c6ad-45a4-8348-d65360484e6a", "DetectTime": "2024-05-21T12:24:53.716972+00:00", "EventTime": "2024-05-21T12:24:53.716991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zQUI1cjtwqrHQJHb"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "9551041e-8052-4d38-8d83-312e854e55e5", "DetectTime": "2024-05-21T12:24:53.721650+00:00", "EventTime": "2024-05-21T12:24:53.721668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ75Pi3PbKlfsYQC6b"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "fd5d69b2-e80c-41e8-ba59-1098bbaae0f8", "DetectTime": "2024-05-21T12:24:53.726323+00:00", "EventTime": "2024-05-21T12:24:53.726341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7XtW81rUbjHMLP5x5"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "06884727-1a72-47de-8630-84b30cf7326e", "DetectTime": "2024-05-21T12:24:53.736378+00:00", "EventTime": "2024-05-21T12:24:53.736396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu44MZVWSqpU55l5l"], "accumulated_threat_level": 0.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "e0fceb89-c090-40ac-9f56-19f5c6694cd7", "DetectTime": "2024-05-21T12:24:53.741053+00:00", "EventTime": "2024-05-21T12:24:53.741074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAxZi5KHTx0Cen52"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "4422f1d1-b417-4b47-818f-782197e86c09", "DetectTime": "2024-05-21T12:24:53.751362+00:00", "EventTime": "2024-05-21T12:24:53.751381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Mu4t4gr2X4M9wb6"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "93f599c6-f2f4-42e6-9fea-f629f71acc23", "DetectTime": "2024-05-21T12:24:53.761208+00:00", "EventTime": "2024-05-21T12:24:53.761226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOWl81hOM4MyKXmK7"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3b8362ba-8411-4166-908c-9a6bf7c85b9d", "DetectTime": "2024-05-21T12:24:53.765791+00:00", "EventTime": "2024-05-21T12:24:53.765809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqQIUKO3bgDE2ov5"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "f4826eff-7369-4ff8-9c3c-f753f6699b62", "DetectTime": "2024-05-21T12:24:53.775421+00:00", "EventTime": "2024-05-21T12:24:53.775439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuItAj1fKMa3LOE2Q4"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "4a3c06c3-71b2-4c9a-a5ab-421b9fad7cca", "DetectTime": "2024-05-21T12:24:53.789953+00:00", "EventTime": "2024-05-21T12:24:53.789971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjP3BF4VxVfGMgifN"], "accumulated_threat_level": 1.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "4382f00f-023c-4b7b-be0a-d818045fe06c", "DetectTime": "2024-05-21T12:24:53.794777+00:00", "EventTime": "2024-05-21T12:24:53.794795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBtEM1oEFHggPjYqb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "6aad658d-066c-4ca3-aba2-eaed73ff58f9", "DetectTime": "2024-05-21T12:24:53.799323+00:00", "EventTime": "2024-05-21T12:24:53.799341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.90.187.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0tDR3V1adjwMkrgh"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "a348b6cf-64ea-4c33-ac16-6e78f9a6d278", "DetectTime": "2024-05-21T12:24:53.809489+00:00", "EventTime": "2024-05-21T12:24:53.809507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.65.129"]}], "Attach": [{"Content": "Connection to unknown destination port 2527/UDP destination IP 101.63.65.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWCDtS1paSlfsBheOi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 11} +{"Format": "IDEA0", "ID": "02385214-e6d6-4b21-a9d6-b26172985ccb", "DetectTime": "2024-05-21T12:24:53.821027+00:00", "EventTime": "2024-05-21T12:24:53.821046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8IcD3E5v1JmcMZH3"], "accumulated_threat_level": 3.2, "timewindow": 11} +{"Format": "IDEA0", "ID": "a72bfb35-a19b-4207-9a46-a43a7e90c7c1", "DetectTime": "2024-05-21T12:24:53.831654+00:00", "EventTime": "2024-05-21T12:24:53.831671+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXY4x4OKaka0oGk8h"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "39f8153f-c9d0-48eb-a89b-109334bd6139", "DetectTime": "2024-05-21T12:24:53.841281+00:00", "EventTime": "2024-05-21T12:24:53.841298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXY4x4OKaka0oGk8h"], "accumulated_threat_level": 4.0, "timewindow": 11} +{"Format": "IDEA0", "ID": "3c775be2-8ac0-4cfc-8259-c7a80c8996ce", "DetectTime": "2024-05-21T12:24:53.851861+00:00", "EventTime": "2024-05-21T12:24:53.851877+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXY4x4OKaka0oGk8h"], "accumulated_threat_level": 4.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "16001149-c63f-4db2-b62e-7f957be68452", "DetectTime": "2024-05-21T12:24:53.863055+00:00", "EventTime": "2024-05-21T12:24:53.863075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtVuST0ij4Odq1z"], "accumulated_threat_level": 5.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "c41a69e1-3a58-41f4-8ac9-0288ee21101f", "DetectTime": "2024-05-21T12:24:53.876415+00:00", "EventTime": "2024-05-21T12:24:53.876434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSeob3Imkm2XSOXDi"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "30405494-cc8f-4bd7-9640-3e0d58c62ed6", "DetectTime": "2024-05-21T12:24:53.889540+00:00", "EventTime": "2024-05-21T12:24:53.889558+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSeob3Imkm2XSOXDi"], "accumulated_threat_level": 5.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "40e4fa6d-6645-424e-b9a1-c7666ff65f87", "DetectTime": "2024-05-21T12:24:53.902733+00:00", "EventTime": "2024-05-21T12:24:53.902752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSeob3Imkm2XSOXDi"], "accumulated_threat_level": 6.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "42a39dd5-3b12-4e96-8c79-24003c0f7907", "DetectTime": "2024-05-21T12:24:53.914119+00:00", "EventTime": "2024-05-21T12:24:53.914140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8osAI2mXUflv86A13"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "62e3543e-67b6-433a-894b-32c5dab85a56", "DetectTime": "2024-05-21T12:24:53.925191+00:00", "EventTime": "2024-05-21T12:24:53.925209+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8osAI2mXUflv86A13"], "accumulated_threat_level": 7.1, "timewindow": 11} +{"Format": "IDEA0", "ID": "4b0654b8-f757-401f-b3c1-31903b59eee2", "DetectTime": "2024-05-21T12:24:53.935078+00:00", "EventTime": "2024-05-21T12:24:53.935096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8osAI2mXUflv86A13"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "e1629d69-f467-43cc-bf66-fe905e3218b3", "DetectTime": "2024-05-21T12:24:53.944846+00:00", "EventTime": "2024-05-21T12:24:53.944864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxBfJPDRyJJSxTOf"], "accumulated_threat_level": 8.7, "timewindow": 11} +{"Format": "IDEA0", "ID": "1cd1f4f2-3db3-4074-a6ae-ab4547312762", "DetectTime": "2024-05-21T12:24:53.955832+00:00", "EventTime": "2024-05-21T12:24:53.955851+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9doDW2GbE1S6X9rz9"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "a7e7422b-bc87-4697-8668-bbdefb7373bf", "DetectTime": "2024-05-21T12:24:53.966513+00:00", "EventTime": "2024-05-21T12:24:53.966531+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9doDW2GbE1S6X9rz9"], "accumulated_threat_level": 9.2, "timewindow": 11} +{"Format": "IDEA0", "ID": "c46f9ce5-e184-4a2b-9d59-f01cd3b887be", "DetectTime": "2024-05-21T12:24:53.977297+00:00", "EventTime": "2024-05-21T12:24:53.977316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9doDW2GbE1S6X9rz9"], "accumulated_threat_level": 10.0, "timewindow": 11} +{"Format": "IDEA0", "ID": "d437ad70-4b23-4957-b9b3-80d9256a1600", "DetectTime": "2024-05-21T12:24:53.989417+00:00", "EventTime": "2024-05-21T12:24:53.989435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQibC17pxpiOEQQ27"], "accumulated_threat_level": 10.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "3d8a116c-3ae8-4fc1-9130-64c50adcb73f", "DetectTime": "2024-05-21T12:24:53.999698+00:00", "EventTime": "2024-05-21T12:24:53.999716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsGJya3Ko0qrRuiS8"], "accumulated_threat_level": 11.600000000000001, "timewindow": 11} +{"Format": "IDEA0", "ID": "35b21075-fa62-405c-9931-65fabfd371be", "DetectTime": "2024-05-21T12:24:54.009634+00:00", "EventTime": "2024-05-21T12:24:54.009658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS3QMd4WK9zRpWepQ7"], "accumulated_threat_level": 12.400000000000002, "timewindow": 11} +{"Format": "Json", "ID": "35b21075-fa62-405c-9931-65fabfd371be", "DetectTime": "2024-05-21T12:24:54.009634+00:00", "EventTime": "2024-05-21T12:24:54.009658+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "1970-01-01T10:15:55.231702+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2024/05/21 12:24:54.134330)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000002, "timewindow": 11, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000002} +{"Format": "IDEA0", "ID": "6a4d6328-797d-4f23-8f7a-b3974cba53cb", "DetectTime": "2024-05-21T12:24:54.145244+00:00", "EventTime": "2024-05-21T12:24:54.145264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJYa4UqVQWY6LP49"], "accumulated_threat_level": 0.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "13cd0a22-c94a-44c6-bfd2-04692c697a04", "DetectTime": "2024-05-21T12:24:54.157809+00:00", "EventTime": "2024-05-21T12:24:54.157830+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qprc2sAeWW5U7fg3"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "b2213e77-be9e-4a6b-936c-271be9163ea5", "DetectTime": "2024-05-21T12:24:54.169345+00:00", "EventTime": "2024-05-21T12:24:54.169363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qprc2sAeWW5U7fg3"], "accumulated_threat_level": 1.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "6db263ee-8b25-416c-977f-e68fa7ab2abb", "DetectTime": "2024-05-21T12:24:54.173881+00:00", "EventTime": "2024-05-21T12:24:54.173899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPacR24K2HNk9jy149"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1aa790d9-1e9a-476f-9ccc-517ee151b622", "DetectTime": "2024-05-21T12:24:54.185226+00:00", "EventTime": "2024-05-21T12:24:54.185247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qprc2sAeWW5U7fg3"], "accumulated_threat_level": 2.1, "timewindow": 11} +{"Format": "IDEA0", "ID": "943c1d4d-7f08-471b-a351-fdd3e598058f", "DetectTime": "2024-05-21T12:24:54.195654+00:00", "EventTime": "2024-05-21T12:24:54.195672+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU44XVOURbMMgxA1"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "bfc6e534-4900-4813-890e-fa00a4166f61", "DetectTime": "2024-05-21T12:24:54.208505+00:00", "EventTime": "2024-05-21T12:24:54.208524+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU44XVOURbMMgxA1"], "accumulated_threat_level": 2.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "a20387f6-6bc2-4a49-8c72-2d5a6f13a607", "DetectTime": "2024-05-21T12:24:54.213331+00:00", "EventTime": "2024-05-21T12:24:54.213349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21A4e3jDnQjDrbSQd"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "8bdcdd8e-a09e-4424-93de-6fc57935346c", "DetectTime": "2024-05-21T12:24:54.225676+00:00", "EventTime": "2024-05-21T12:24:54.225694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdTGp3TVHBXLRxbC"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "b22b9854-439f-4145-ab41-4b5b4a8708a0", "DetectTime": "2024-05-21T12:24:54.247879+00:00", "EventTime": "2024-05-21T12:24:54.247902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdTGp3TVHBXLRxbC"], "accumulated_threat_level": 3.1, "timewindow": 11} +{"Format": "IDEA0", "ID": "57992e65-0ffb-4f56-acef-87c736e68f7c", "DetectTime": "2024-05-21T12:24:54.253954+00:00", "EventTime": "2024-05-21T12:24:54.253976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1AV73Mrt6rcuTrk5"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7b7c91f6-9b91-4f45-92a6-561d5ed9cf8c", "DetectTime": "2024-05-21T12:24:54.264826+00:00", "EventTime": "2024-05-21T12:24:54.264844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU44XVOURbMMgxA1"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 11} +{"Format": "IDEA0", "ID": "e5008d4a-af2e-451f-b176-b7fb12adc571", "DetectTime": "2024-05-21T12:24:54.273072+00:00", "EventTime": "2024-05-21T12:24:54.273090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RUhN2Z73iZJz1H15"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "67743742-6eff-4caf-8fe1-d11783a23d9c", "DetectTime": "2024-05-21T12:24:54.277791+00:00", "EventTime": "2024-05-21T12:24:54.277810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdsdpu1oohfaY2aeV6"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "e11d41d2-93c2-4ed5-b050-09d984107193", "DetectTime": "2024-05-21T12:24:54.282319+00:00", "EventTime": "2024-05-21T12:24:54.282338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbVuz4gdzs0UQkSa4"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "c5397796-bcd9-4eb7-94c7-cdadb33b6296", "DetectTime": "2024-05-21T12:24:54.287091+00:00", "EventTime": "2024-05-21T12:24:54.287109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJWYb1qXXMpbWTVc7"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "0b61fbf0-c8fe-400c-aba4-ba4a2186b388", "DetectTime": "2024-05-21T12:24:54.299733+00:00", "EventTime": "2024-05-21T12:24:54.299752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdTGp3TVHBXLRxbC"], "accumulated_threat_level": 4.7, "timewindow": 11} +{"Format": "IDEA0", "ID": "2a5be157-15f5-450d-99e7-96a9c18c380d", "DetectTime": "2024-05-21T12:24:54.312724+00:00", "EventTime": "2024-05-21T12:24:54.312746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLEHv1icEqNy28tZi"], "accumulated_threat_level": 5.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "35815977-78fc-4248-8469-ed97bdfa6f26", "DetectTime": "2024-05-21T12:24:54.318016+00:00", "EventTime": "2024-05-21T12:24:54.318035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGwYj4UVZQ1LHSMp7"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7f48670f-b94c-4b02-b23a-355094cbae5a", "DetectTime": "2024-05-21T12:24:54.329547+00:00", "EventTime": "2024-05-21T12:24:54.329565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLha2z3xHnKc7pWfif"], "accumulated_threat_level": 6.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "83ebef17-4c50-4065-a002-4faad884ffd2", "DetectTime": "2024-05-21T12:24:54.339978+00:00", "EventTime": "2024-05-21T12:24:54.339996+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcmWti3jjUAU85Fy12"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "90284ae3-2c7e-4e2b-a34a-9a6c9d252c6d", "DetectTime": "2024-05-21T12:24:54.351090+00:00", "EventTime": "2024-05-21T12:24:54.351111+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcmWti3jjUAU85Fy12"], "accumulated_threat_level": 6.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "33cf3ba6-0446-4314-8f36-828cf6568948", "DetectTime": "2024-05-21T12:24:54.356134+00:00", "EventTime": "2024-05-21T12:24:54.356152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjoyYk4g92sqk4PT7b"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3c221a0d-78e3-4640-a92b-7f459ae2fac6", "DetectTime": "2024-05-21T12:24:54.366296+00:00", "EventTime": "2024-05-21T12:24:54.366314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcmWti3jjUAU85Fy12"], "accumulated_threat_level": 7.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "c4c80d54-39b5-407a-977a-7a376dd043ae", "DetectTime": "2024-05-21T12:24:54.370969+00:00", "EventTime": "2024-05-21T12:24:54.370987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.129.61 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctnfjp29VWMb3B6Dnf"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "aa1a9e82-f043-4e94-ac82-2762aae835a8", "DetectTime": "2024-05-21T12:24:54.381829+00:00", "EventTime": "2024-05-21T12:24:54.381847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIGp4S1CNKwNEbcLt"], "accumulated_threat_level": 8.4, "timewindow": 11} +{"Format": "IDEA0", "ID": "a43b375c-486d-4f18-9916-4b29bc96c9c4", "DetectTime": "2024-05-21T12:24:54.393369+00:00", "EventTime": "2024-05-21T12:24:54.393391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviVA03PJr9R9uwjs"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "a980cf87-a8e7-4d7c-9ff8-a1eca7958158", "DetectTime": "2024-05-21T12:24:54.405199+00:00", "EventTime": "2024-05-21T12:24:54.405218+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviVA03PJr9R9uwjs"], "accumulated_threat_level": 8.9, "timewindow": 11} +{"Format": "IDEA0", "ID": "1f171d1a-3f15-49c6-9a98-c19bbf7080ec", "DetectTime": "2024-05-21T12:24:54.416156+00:00", "EventTime": "2024-05-21T12:24:54.416177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviVA03PJr9R9uwjs"], "accumulated_threat_level": 9.700000000000001, "timewindow": 11} +{"Format": "IDEA0", "ID": "1d0f9275-460d-4055-9178-06411938b6b0", "DetectTime": "2024-05-21T12:24:54.427478+00:00", "EventTime": "2024-05-21T12:24:54.427495+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZjXA3jDqDnzBe7u5"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "c48f084a-192f-44bf-b54e-4d0d4bd7025e", "DetectTime": "2024-05-21T12:24:54.439075+00:00", "EventTime": "2024-05-21T12:24:54.439096+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZjXA3jDqDnzBe7u5"], "accumulated_threat_level": 10.200000000000001, "timewindow": 11} +{"Format": "IDEA0", "ID": "c00c52b2-3f1c-444a-93ac-3eed1e8abc07", "DetectTime": "2024-05-21T12:24:54.450009+00:00", "EventTime": "2024-05-21T12:24:54.450028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZjXA3jDqDnzBe7u5"], "accumulated_threat_level": 11.000000000000002, "timewindow": 11} +{"Format": "IDEA0", "ID": "8fbb87b3-d20a-40d7-ad03-20583de510ea", "DetectTime": "2024-05-21T12:24:54.459831+00:00", "EventTime": "2024-05-21T12:24:54.459849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.27.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0B9Gp4Ik7xtl36GU1"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3720a659-8d9e-4b23-a95d-231b1bfd8edc", "DetectTime": "2024-05-21T12:24:54.464578+00:00", "EventTime": "2024-05-21T12:24:54.464596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.114.37 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOrbd4bmntJKG70li"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3d0e6722-5246-4474-a920-4d855903268b", "DetectTime": "2024-05-21T12:24:54.473826+00:00", "EventTime": "2024-05-21T12:24:54.473848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.165.116.48 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBE0VCoTsEWfZ5kQd"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "f95e0893-fdfe-409f-9a6b-391f100c6de4", "DetectTime": "2024-05-21T12:24:54.493907+00:00", "EventTime": "2024-05-21T12:24:54.493928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHHP1I1xthxefch1a2"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3c77ded4-61e2-4ba8-b7f3-e36f3a2ab4b8", "DetectTime": "2024-05-21T12:24:54.526813+00:00", "EventTime": "2024-05-21T12:24:54.526833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.49.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJmeo1SjrjcZ8XGr7"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "56c25c50-018c-4216-a31e-dea6803cd1f3", "DetectTime": "2024-05-21T12:24:54.554793+00:00", "EventTime": "2024-05-21T12:24:54.554812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfD7n2nKtVfYiTsxf"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "73bcafc2-2442-4a95-9c82-316ae94caafb", "DetectTime": "2024-05-21T12:24:54.576307+00:00", "EventTime": "2024-05-21T12:24:54.576325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtMIAor2fYj8uvGi"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "3a755f66-e40c-4930-b9b8-4437e2e38e1e", "DetectTime": "2024-05-21T12:24:54.587559+00:00", "EventTime": "2024-05-21T12:24:54.587579+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtMIAor2fYj8uvGi"], "accumulated_threat_level": 11.500000000000002, "timewindow": 11} +{"Format": "IDEA0", "ID": "6dae3126-895c-44c2-a009-610a942e839d", "DetectTime": "2024-05-21T12:24:54.592470+00:00", "EventTime": "2024-05-21T12:24:54.592488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cad8qt2Cnmi2DXNkf2"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "c7ec37f8-9297-416c-b529-bdd256c7c402", "DetectTime": "2024-05-21T12:24:54.603024+00:00", "EventTime": "2024-05-21T12:24:54.603045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3av3d2jTrP7W2jWZf"], "accumulated_threat_level": 12.300000000000002, "timewindow": 11} +{"Format": "Json", "ID": "c7ec37f8-9297-416c-b529-bdd256c7c402", "DetectTime": "2024-05-21T12:24:54.603024+00:00", "EventTime": "2024-05-21T12:24:54.603045+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "1970-01-01T10:16:17.653903+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2024/05/21 12:24:54.733448)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.300000000000002, "timewindow": 11, "profileid": "profile_10.0.2.19", "threat_level": 12.300000000000002} +{"Format": "IDEA0", "ID": "1158a5ec-b54f-48f5-aece-37d1f9b376e8", "DetectTime": "2024-05-21T12:24:54.738057+00:00", "EventTime": "2024-05-21T12:24:54.738083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOH0Eo5mvV86Cbsk"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "fb8c6209-6b67-4526-b1ea-0dc2fd903c53", "DetectTime": "2024-05-21T12:24:54.749506+00:00", "EventTime": "2024-05-21T12:24:54.749524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87vGq20rDxVJaWkJh"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "a38eab53-8156-48fa-8cdd-a8793659cabe", "DetectTime": "2024-05-21T12:24:54.754471+00:00", "EventTime": "2024-05-21T12:24:54.754491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwQ39d4cIAP58W2uke"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "91af4e2d-3f4f-478d-a8bc-25a2a858dca4", "DetectTime": "2024-05-21T12:24:54.759416+00:00", "EventTime": "2024-05-21T12:24:54.759436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGYkD34IUsZQ1aIe2"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "e7297bca-1e92-422d-bb1d-1cdba526eb92", "DetectTime": "2024-05-21T12:24:54.764240+00:00", "EventTime": "2024-05-21T12:24:54.764258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNNh702EnCtZo5rKCl"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "0ed1b926-b007-4f6c-969d-a996fa324b7c", "DetectTime": "2024-05-21T12:24:54.769220+00:00", "EventTime": "2024-05-21T12:24:54.769242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.119.190.39 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3I6OPovPwt77lr2c"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "713aa0d3-8a32-4df8-9c5b-83ac140de76f", "DetectTime": "2024-05-21T12:24:54.782207+00:00", "EventTime": "2024-05-21T12:24:54.782224+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHc7T2Qe3QrlHjFYd"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "1eba1294-e688-449f-9819-e4349370c2b9", "DetectTime": "2024-05-21T12:24:54.793177+00:00", "EventTime": "2024-05-21T12:24:54.793195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHc7T2Qe3QrlHjFYd"], "accumulated_threat_level": 0.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "df021d7d-1ac5-4dd7-bd38-8076839698b9", "DetectTime": "2024-05-21T12:24:54.803312+00:00", "EventTime": "2024-05-21T12:24:54.803330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHc7T2Qe3QrlHjFYd"], "accumulated_threat_level": 1.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "3be66196-8954-4b6f-b711-e6a49d41dd20", "DetectTime": "2024-05-21T12:24:54.808807+00:00", "EventTime": "2024-05-21T12:24:54.808826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn8VvfHeyZTkqycFi", "CQO4a22nh1qUgSNOZj", "CaAaKb2tItZKff2Sh6", "ChmkWX2Vbpy1a189Sl"], "accumulated_threat_level": 1.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "33a382cc-d411-4462-8398-e3c9d7770eda", "DetectTime": "2024-05-21T12:24:54.840571+00:00", "EventTime": "2024-05-21T12:24:54.840592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvEZ715gqnDIFuigg"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "9a462479-4183-463f-a78e-17d417193458", "DetectTime": "2024-05-21T12:24:54.875552+00:00", "EventTime": "2024-05-21T12:24:54.875574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIrI630wFOUxYzTR1"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "692720e3-34af-4da3-b4e6-5f23ccf2c127", "DetectTime": "2024-05-21T12:24:54.907791+00:00", "EventTime": "2024-05-21T12:24:54.907809+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIQW1indzSTuVUCe"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "185b45f0-5922-417d-b7e9-78aec1eabde0", "DetectTime": "2024-05-21T12:24:54.919274+00:00", "EventTime": "2024-05-21T12:24:54.919292+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIQW1indzSTuVUCe"], "accumulated_threat_level": 2.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "fa146c70-60ba-4d2e-81be-c9ab55fcc85d", "DetectTime": "2024-05-21T12:24:54.930880+00:00", "EventTime": "2024-05-21T12:24:54.930898+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YvaU2tM5CkCjrhJ3"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "bb7dbc48-6923-4d1e-b9fb-b411e1eee525", "DetectTime": "2024-05-21T12:24:54.941919+00:00", "EventTime": "2024-05-21T12:24:54.941942+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YvaU2tM5CkCjrhJ3"], "accumulated_threat_level": 2.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "6c0bfd8d-d2f8-4985-a247-dc3a1d69c15b", "DetectTime": "2024-05-21T12:24:54.952581+00:00", "EventTime": "2024-05-21T12:24:54.952599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziMFh34WlJP0YpS3i"], "accumulated_threat_level": 3.5999999999999996, "timewindow": 11} +{"Format": "IDEA0", "ID": "2fb43b6b-a708-46c4-ad85-832992137fda", "DetectTime": "2024-05-21T12:24:54.964183+00:00", "EventTime": "2024-05-21T12:24:54.964202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjW5Vf4rPITcXb7Qqf"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "5bd0640f-8741-49b5-9dc7-4382d5684314", "DetectTime": "2024-05-21T12:24:54.975959+00:00", "EventTime": "2024-05-21T12:24:54.975977+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjW5Vf4rPITcXb7Qqf"], "accumulated_threat_level": 4.1, "timewindow": 11} +{"Format": "IDEA0", "ID": "bbd23b38-c141-473f-81dd-b827ad2136cd", "DetectTime": "2024-05-21T12:24:54.986271+00:00", "EventTime": "2024-05-21T12:24:54.986289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjW5Vf4rPITcXb7Qqf"], "accumulated_threat_level": 4.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "80a638b9-bf8f-41c9-9751-d9e41eb74441", "DetectTime": "2024-05-21T12:24:54.997718+00:00", "EventTime": "2024-05-21T12:24:54.997737+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEvXe46cJ9yubP0Sh"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "4621c84d-6b91-44cd-b260-4effe37c7d51", "DetectTime": "2024-05-21T12:24:55.011164+00:00", "EventTime": "2024-05-21T12:24:55.011183+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEvXe46cJ9yubP0Sh"], "accumulated_threat_level": 5.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "3f7ce218-46d2-49bd-9660-7a693fce3250", "DetectTime": "2024-05-21T12:24:55.023451+00:00", "EventTime": "2024-05-21T12:24:55.023471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEvXe46cJ9yubP0Sh"], "accumulated_threat_level": 6.199999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "520d4a3c-d052-429a-9528-303ce8f3e330", "DetectTime": "2024-05-21T12:24:55.036417+00:00", "EventTime": "2024-05-21T12:24:55.036437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnx4nH3K1p5Su80qod"], "accumulated_threat_level": 6.999999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "892b82d9-0cde-4b0f-aed7-a1407128a960", "DetectTime": "2024-05-21T12:24:55.173112+00:00", "EventTime": "2024-05-21T12:24:55.173131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLTeP1StWB733ZRt3"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "fc68a65d-acda-4862-ba4a-6b7ea97bfde6", "DetectTime": "2024-05-21T12:24:55.228737+00:00", "EventTime": "2024-05-21T12:24:55.228756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PPJL16UQwplFE28d"], "accumulated_threat_level": 7.799999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "c919d1b3-9a87-4e0a-b405-95d733eecf09", "DetectTime": "2024-05-21T12:24:55.252293+00:00", "EventTime": "2024-05-21T12:24:55.252312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 14337/UDP destination IP 36.82.20.14. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOmwQ3ZIyjy0pdEuf"], "accumulated_threat_level": 8.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "38591630-bb48-456e-a9b1-577e367fcb67", "DetectTime": "2024-05-21T12:24:55.380965+00:00", "EventTime": "2024-05-21T12:24:55.380985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2KdO2PktEyqbJaA3"], "accumulated_threat_level": 9.4, "timewindow": 11} +{"Format": "IDEA0", "ID": "0b5d0a73-a65b-4e70-a471-301ea3e532c9", "DetectTime": "2024-05-21T12:24:55.509995+00:00", "EventTime": "2024-05-21T12:24:55.510013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE2XKH1lFuvkjPKwfd"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b38ef280-e3fc-4af0-9c6d-9d8f27fe70b8", "DetectTime": "2024-05-21T12:24:55.705243+00:00", "EventTime": "2024-05-21T12:24:55.705264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.90.187.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjzQ69Y5HZAEWe4g"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "fe391c79-1bd7-4560-8c90-7a4644fdb580", "DetectTime": "2024-05-21T12:24:55.944188+00:00", "EventTime": "2024-05-21T12:24:55.944208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.129.61 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPwHoT1gLKLWPXD6Eb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "fe8ed88f-7190-4dc5-8d37-6cf1ae715414", "DetectTime": "2024-05-21T12:24:55.959143+00:00", "EventTime": "2024-05-21T12:24:55.959162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.27.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXoXR8l2NIRYK1o0d"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "170a19da-98f4-49f4-9ad6-c61ac914ddc0", "DetectTime": "2024-05-21T12:24:56.117530+00:00", "EventTime": "2024-05-21T12:24:56.117550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4fRZ3pkbiamzv9N9", "CAk5Jq3s39658PT7Uf", "C6xLIF3BRKoJz5bKw5", "CFhnWo2560YnwqBOYi"], "accumulated_threat_level": 9.9, "timewindow": 11} +{"Format": "IDEA0", "ID": "63123ee2-18cd-4df8-ba1d-666578fb1a3f", "DetectTime": "2024-05-21T12:24:56.152961+00:00", "EventTime": "2024-05-21T12:24:56.152983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.119.190.39 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1egwx47jGJC89CZ93"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ff494023-8968-42c0-ad96-614a8afd9a29", "DetectTime": "2024-05-21T12:24:56.363167+00:00", "EventTime": "2024-05-21T12:24:56.363188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CisPKx6SnZe93DUo2"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3d172dce-e11d-4126-98d5-0c44b95951e4", "DetectTime": "2024-05-21T12:24:56.405971+00:00", "EventTime": "2024-05-21T12:24:56.405994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggIF1xvMQ86NYqz1"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "52711f00-7555-4c94-a172-6a75e6484c53", "DetectTime": "2024-05-21T12:24:56.442014+00:00", "EventTime": "2024-05-21T12:24:56.442035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsnXAm4MjZWIAHycCj"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "aea59f04-b688-4350-b997-9f7bf4004fde", "DetectTime": "2024-05-21T12:24:56.458911+00:00", "EventTime": "2024-05-21T12:24:56.458930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmlBPrm6JWH9kW3O1"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3eb52c37-b427-4bf2-a9cb-9ba63fb6bd27", "DetectTime": "2024-05-21T12:24:56.499005+00:00", "EventTime": "2024-05-21T12:24:56.499024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcFtArYEjlEzo93Pk"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "539aa16f-7656-412d-9a57-478b922cf216", "DetectTime": "2024-05-21T12:24:56.525221+00:00", "EventTime": "2024-05-21T12:24:56.525245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusFAA4ldsiFEUHWEi"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ee8707af-379c-4568-b448-1071b6f05f42", "DetectTime": "2024-05-21T12:24:56.544192+00:00", "EventTime": "2024-05-21T12:24:56.544212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzWto47Rcb0jBdbhd"], "accumulated_threat_level": 10.700000000000001, "timewindow": 11} +{"Format": "IDEA0", "ID": "aa3f5b0f-161a-4789-9f9b-fc49eec4ead3", "DetectTime": "2024-05-21T12:24:56.551081+00:00", "EventTime": "2024-05-21T12:24:56.551099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqXOA3SQqvgd5Nepk"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d1ffb03b-9e52-435a-8ec9-e078d9d20c24", "DetectTime": "2024-05-21T12:24:56.578836+00:00", "EventTime": "2024-05-21T12:24:56.578856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2HAU3wsyqjMQvELb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "8711a9dc-7b5e-4d08-8b75-bfcb440563cb", "DetectTime": "2024-05-21T12:24:56.618506+00:00", "EventTime": "2024-05-21T12:24:56.618529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CebfPUvLwUL0ryTVl"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "11d45669-e6db-4ce1-a660-3a9ca2bbdc64", "DetectTime": "2024-05-21T12:24:56.641759+00:00", "EventTime": "2024-05-21T12:24:56.641780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAi8D4HZBGUrBpkth"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3a3f4a28-66c3-474e-9c55-c4db860a025b", "DetectTime": "2024-05-21T12:24:56.666040+00:00", "EventTime": "2024-05-21T12:24:56.666059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1L6i1E5e3Eg4Bfsh"], "accumulated_threat_level": 11.500000000000002, "timewindow": 11} +{"Format": "IDEA0", "ID": "5bc03209-3c94-46ad-a328-c940e90fa929", "DetectTime": "2024-05-21T12:24:56.677321+00:00", "EventTime": "2024-05-21T12:24:56.677341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOmwQ3ZIyjy0pdEuf"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "c71d161d-838e-4e39-83d3-a12655b5d97d", "DetectTime": "2024-05-21T12:24:56.688957+00:00", "EventTime": "2024-05-21T12:24:56.688975+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOmwQ3ZIyjy0pdEuf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 11} +{"Format": "Json", "ID": "c71d161d-838e-4e39-83d3-a12655b5d97d", "DetectTime": "2024-05-21T12:24:56.688957+00:00", "EventTime": "2024-05-21T12:24:56.688975+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "1970-01-01T10:17:13.275845+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2024/05/21 12:24:56.928332)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 11, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0d9fa0ec-ce15-4191-9011-4564397dfe10", "DetectTime": "2024-05-21T12:24:56.938791+00:00", "EventTime": "2024-05-21T12:24:56.938810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Sm0L2X5p3Ajeamtb"], "accumulated_threat_level": 0.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "bb39eb29-7cac-4ad2-8315-ba2868c73a2c", "DetectTime": "2024-05-21T12:24:56.944142+00:00", "EventTime": "2024-05-21T12:24:56.944163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4JtJq25AKU1y2M8P3"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "8d6314e2-d4c2-4b50-9275-2a826ca2fe01", "DetectTime": "2024-05-21T12:24:56.949185+00:00", "EventTime": "2024-05-21T12:24:56.949205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUmw41xrbuft4wmAl"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "93d1b37b-b074-4f99-b8fd-37c4fa25714d", "DetectTime": "2024-05-21T12:24:56.953997+00:00", "EventTime": "2024-05-21T12:24:56.954017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsxOac3PBhwy4QNkce"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "55b6aa92-6dd8-46eb-8e4c-ef43dfcc3094", "DetectTime": "2024-05-21T12:24:56.958780+00:00", "EventTime": "2024-05-21T12:24:56.958798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL00nl1lc5yiv5cbKi"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "62681f3b-912b-42d6-b3f1-16efeaa3ed45", "DetectTime": "2024-05-21T12:24:56.963431+00:00", "EventTime": "2024-05-21T12:24:56.963449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLY07O1DPyI6mVEpy"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "189b51f3-a282-4c6d-abfa-1f4594dc14b2", "DetectTime": "2024-05-21T12:24:56.967871+00:00", "EventTime": "2024-05-21T12:24:56.967890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhYfO21p50XBiRJ42"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "c9966883-3b70-4df0-a599-dc9d768abcdd", "DetectTime": "2024-05-21T12:24:56.972960+00:00", "EventTime": "2024-05-21T12:24:56.972981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrTSf1EvgK8lld4K5"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1036bdbb-9f54-44e4-88f3-07f5bac9218e", "DetectTime": "2024-05-21T12:24:56.977752+00:00", "EventTime": "2024-05-21T12:24:56.977772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoJ5P1prkwrwDRRKd"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "91f07e2a-3cab-4ee1-b847-186300ee553b", "DetectTime": "2024-05-21T12:24:56.982493+00:00", "EventTime": "2024-05-21T12:24:56.982511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVgoj42FxjwL5KqJ6"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "cfa97c9e-9f1e-4e71-9203-254c9da06d50", "DetectTime": "2024-05-21T12:24:56.987029+00:00", "EventTime": "2024-05-21T12:24:56.987047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qQh54d8q2PVX4cCl"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "d2ab5f5f-c641-4651-86b4-2fca0070d03a", "DetectTime": "2024-05-21T12:24:57.006628+00:00", "EventTime": "2024-05-21T12:24:57.006651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgLZU54R5K8jew1Wqa"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3214e56e-4076-4e93-8d52-a5ecd834b7ca", "DetectTime": "2024-05-21T12:24:57.032093+00:00", "EventTime": "2024-05-21T12:24:57.032114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJgdXl2c2P0WEfpTJa"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "2aea2e81-cbdd-40f3-8f78-94d486289c83", "DetectTime": "2024-05-21T12:24:57.060242+00:00", "EventTime": "2024-05-21T12:24:57.060262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfndwV1dbvryP2AP0k"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "7e6797e0-00d9-4ac9-a536-23f30d6e8e64", "DetectTime": "2024-05-21T12:24:57.079173+00:00", "EventTime": "2024-05-21T12:24:57.079194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkLML3V5yhlLbaxcf"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ee3fd984-c986-4458-9699-1c4fe050af9e", "DetectTime": "2024-05-21T12:24:57.105541+00:00", "EventTime": "2024-05-21T12:24:57.105562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTzdMAqAjCj4vfb"], "accumulated_threat_level": 1.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "077e08de-90b5-4a28-89f8-dbce61007b87", "DetectTime": "2024-05-21T12:24:57.205510+00:00", "EventTime": "2024-05-21T12:24:57.205530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjOEuJVf3P7ONG5qi"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "34a60e7e-a4d7-4bd9-9f8e-27ae6730e4aa", "DetectTime": "2024-05-21T12:24:57.330179+00:00", "EventTime": "2024-05-21T12:24:57.330207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV70iw2BOLLlPhJ1Sg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 11} +{"Format": "IDEA0", "ID": "1a92725e-305a-4b2c-9b48-6cfabb6386cc", "DetectTime": "2024-05-21T12:24:57.335753+00:00", "EventTime": "2024-05-21T12:24:57.335772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHP9GH3efAOZ4RdEi"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "3a61f21b-59d5-4283-be3a-6601925afffe", "DetectTime": "2024-05-21T12:24:57.359784+00:00", "EventTime": "2024-05-21T12:24:57.359804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvvLt3DrgNgc7EVyd"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "0b41aa04-6523-49cf-a209-ada09b80feec", "DetectTime": "2024-05-21T12:24:57.370876+00:00", "EventTime": "2024-05-21T12:24:57.370896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cffbct2nqHbs4le2We"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "476943bd-b5ce-41f0-8d23-d3bb381aa05f", "DetectTime": "2024-05-21T12:24:57.375626+00:00", "EventTime": "2024-05-21T12:24:57.375645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46oAE2NVEnRs7Cqhf"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "a16a8d75-a622-4432-a309-cc43fda0d970", "DetectTime": "2024-05-21T12:24:57.412352+00:00", "EventTime": "2024-05-21T12:24:57.412370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanzBa38cFBwLlkRBe"], "accumulated_threat_level": 3.2, "timewindow": 11} +{"Format": "IDEA0", "ID": "b3da2bc0-138c-4f5f-8c12-f3b634797eff", "DetectTime": "2024-05-21T12:24:57.418790+00:00", "EventTime": "2024-05-21T12:24:57.418808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.114.37 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CriKou3iIJmn1lq7Fb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ce37c340-f7e8-4b76-8508-e4eed1575d28", "DetectTime": "2024-05-21T12:24:57.424028+00:00", "EventTime": "2024-05-21T12:24:57.424048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.165.116.48 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUrvt1U2BFL30ROb4"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "a10a8ceb-fce5-4d47-8f2b-f5f58b758085", "DetectTime": "2024-05-21T12:24:57.435920+00:00", "EventTime": "2024-05-21T12:24:57.435940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca3AxE21eRi1DwNkLg"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "1b332423-e1ab-42a8-8dc1-a0521b733ad0", "DetectTime": "2024-05-21T12:24:57.452532+00:00", "EventTime": "2024-05-21T12:24:57.452554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq8keK3E84gJafphHl"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "6f2409e5-1436-41eb-844b-7066d3cc0cfb", "DetectTime": "2024-05-21T12:24:57.466612+00:00", "EventTime": "2024-05-21T12:24:57.466630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxJzh39uLGTsLtDye"], "accumulated_threat_level": 4.0, "timewindow": 11} +{"Format": "IDEA0", "ID": "477f1a55-b4b0-4f4e-8562-4fbe0752d3e8", "DetectTime": "2024-05-21T12:24:57.482102+00:00", "EventTime": "2024-05-21T12:24:57.482121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.49.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8CT44xPR7EaUsVX8"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "152e3685-5366-429f-9943-c61d248600c2", "DetectTime": "2024-05-21T12:24:57.509956+00:00", "EventTime": "2024-05-21T12:24:57.509976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY0y9f4ea4eePdewvj"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "78313f4d-1beb-4ca5-b3b9-b7c83dfd3a1a", "DetectTime": "2024-05-21T12:24:57.535160+00:00", "EventTime": "2024-05-21T12:24:57.535180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMX1Ober3ft8wYOb"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "5a164f5d-d668-4cb7-8920-700f4ace65e2", "DetectTime": "2024-05-21T12:24:57.572343+00:00", "EventTime": "2024-05-21T12:24:57.572365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct5iDrCka02chu7ka", "CQN6i04pSZZGbndg42", "CAnrRD3ooN3uddrjQ9", "CoN7x34mvvpju5HRJl"], "accumulated_threat_level": 4.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "90ac9a29-c091-4e8e-86c8-abd2ca6c2643", "DetectTime": "2024-05-21T12:24:57.587446+00:00", "EventTime": "2024-05-21T12:24:57.587466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWXJv33UwAdS5JQUB5"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "ebb1f31a-336e-431e-b032-1c70fa805d5e", "DetectTime": "2024-05-21T12:24:57.606193+00:00", "EventTime": "2024-05-21T12:24:57.606215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl13QP1QZ4XgLiwjj1"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "b4e2b054-f060-4c3b-9af5-77d781698789", "DetectTime": "2024-05-21T12:24:57.636996+00:00", "EventTime": "2024-05-21T12:24:57.637017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsCmb4XpFa1fz1102"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "516f780d-1527-4b26-905d-7dad6f56051c", "DetectTime": "2024-05-21T12:24:57.661361+00:00", "EventTime": "2024-05-21T12:24:57.661382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxntGb10l0uERorOEl"], "accumulated_threat_level": 5.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "cbe3c471-81bb-4188-8378-b52c4eeb10d3", "DetectTime": "2024-05-21T12:24:57.669256+00:00", "EventTime": "2024-05-21T12:24:57.669274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxpECZkBhc9yfLSi"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "4a61e595-3371-4b96-87f8-98d67b1807d5", "DetectTime": "2024-05-21T12:24:57.694619+00:00", "EventTime": "2024-05-21T12:24:57.694641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOWeT34hFvInrlhK1"], "accumulated_threat_level": 6.1, "timewindow": 11} +{"Format": "IDEA0", "ID": "df5deaa3-25d0-4fa0-9ec5-aab61588bb26", "DetectTime": "2024-05-21T12:24:57.704770+00:00", "EventTime": "2024-05-21T12:24:57.704791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDZnI1dHvGk8jPXIc"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "4a5c7f7f-bfd6-4f91-98bb-4fc72778781d", "DetectTime": "2024-05-21T12:24:57.727676+00:00", "EventTime": "2024-05-21T12:24:57.727693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CACVwo1bBCqU6FEJne"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "c97e6f8d-3b62-4be8-942b-b12da8bf781b", "DetectTime": "2024-05-21T12:24:57.732350+00:00", "EventTime": "2024-05-21T12:24:57.732367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj2YX61Adk4CQEK8m3"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "571ec7d1-28ac-4e7c-8f5f-85947b67a6d5", "DetectTime": "2024-05-21T12:24:57.744384+00:00", "EventTime": "2024-05-21T12:24:57.744402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ORdy4EFMNelOeQCk"], "accumulated_threat_level": 2.0, "timewindow": 8} +{"Format": "IDEA0", "ID": "10bec2f7-dceb-4a4e-8da9-daaa98e180d8", "DetectTime": "2024-05-21T12:24:57.765061+00:00", "EventTime": "2024-05-21T12:24:57.765078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxn3ri1MSqYPHSSAi"], "accumulated_threat_level": 7.699999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "87e7cb57-2561-41df-94a6-2de9e60c3605", "DetectTime": "2024-05-21T12:24:57.785412+00:00", "EventTime": "2024-05-21T12:24:57.785432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFYjKgwsDaj9HFrb"], "accumulated_threat_level": 8.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "9c490126-ec8c-4fef-832e-168757a12c17", "DetectTime": "2024-05-21T12:24:57.807932+00:00", "EventTime": "2024-05-21T12:24:57.807951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTYXh18dAhZfjsvp3"], "accumulated_threat_level": 9.3, "timewindow": 11} +{"Format": "IDEA0", "ID": "7f850a7d-a3d5-4372-b329-ca545f886f2d", "DetectTime": "2024-05-21T12:24:57.840320+00:00", "EventTime": "2024-05-21T12:24:57.840340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKi3Q3Y2QOybmu5R4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 11} +{"Format": "IDEA0", "ID": "ad3c9203-895d-4bea-9b3f-1cf4cf9a143e", "DetectTime": "2024-05-21T12:24:57.873384+00:00", "EventTime": "2024-05-21T12:24:57.873405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFOFHr2sBWHkl6nyx1"], "accumulated_threat_level": 10.900000000000002, "timewindow": 11} +{"Format": "IDEA0", "ID": "bc8d84f5-d2be-4d94-87c2-a0316dd77c7b", "DetectTime": "2024-05-21T12:24:57.896983+00:00", "EventTime": "2024-05-21T12:24:57.897000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJnyEw2Vq4YGMt1Q6l"], "accumulated_threat_level": 11.700000000000003, "timewindow": 11} +{"Format": "IDEA0", "ID": "37a72dce-ac21-455c-8695-156121ecef8f", "DetectTime": "2024-05-21T12:24:57.936418+00:00", "EventTime": "2024-05-21T12:24:57.936441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMW6HxewO6UeWBnb"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "bfde9d35-dbd4-4efe-8ff4-1cd3aad83c37", "DetectTime": "2024-05-21T12:24:58.209232+00:00", "EventTime": "2024-05-21T12:24:58.209251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8gl1N3kQXy1sE9kJ3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 11} +{"Format": "Json", "ID": "bfde9d35-dbd4-4efe-8ff4-1cd3aad83c37", "DetectTime": "2024-05-21T12:24:58.209232+00:00", "EventTime": "2024-05-21T12:24:58.209251+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "1970-01-01T10:50:33.752534+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2024/05/21 12:24:58.563394)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 11, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "b1f8f4e4-f90f-4700-99f0-800994e6aaf0", "DetectTime": "2024-05-21T12:24:58.574205+00:00", "EventTime": "2024-05-21T12:24:58.574225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN4M7e1fimq3gHUqTd"], "accumulated_threat_level": 0.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "8b31a315-46e0-414c-bc89-d6a0f1736b60", "DetectTime": "2024-05-21T12:24:58.585672+00:00", "EventTime": "2024-05-21T12:24:58.585693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmLUTurQVuvEgq7Dd"], "accumulated_threat_level": 1.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "5c297683-fd18-4d4e-84e9-19b5169525cf", "DetectTime": "2024-05-21T12:24:58.596339+00:00", "EventTime": "2024-05-21T12:24:58.596356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 27744/UDP destination IP 110.138.67.41. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBWBxG1aYFRNX7dGaj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 11} +{"Format": "IDEA0", "ID": "d7039860-b0db-4258-ad86-e37f3db65a19", "DetectTime": "2024-05-21T12:24:58.606621+00:00", "EventTime": "2024-05-21T12:24:58.606639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD2Zh3xw0ujqOap0k"], "accumulated_threat_level": 3.2, "timewindow": 11} +{"Format": "IDEA0", "ID": "75e6fba5-1d17-41ad-bef6-e1e5434fc182", "DetectTime": "2024-05-21T12:24:58.618322+00:00", "EventTime": "2024-05-21T12:24:58.618344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csf3l72Ao8Gx5vKAAj"], "accumulated_threat_level": 4.0, "timewindow": 11} +{"Format": "IDEA0", "ID": "1fce9996-16e7-4d0f-ab75-2ae5ac023a6c", "DetectTime": "2024-05-21T12:24:58.623883+00:00", "EventTime": "2024-05-21T12:24:58.623904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.165.116.48 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cklfcy1XRmfo6FDMt9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "82759e3d-8cbc-4b53-8636-7cabf2e65825", "DetectTime": "2024-05-21T12:24:58.638689+00:00", "EventTime": "2024-05-21T12:24:58.638708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChV58r3anDVCIELKM"], "accumulated_threat_level": 4.8, "timewindow": 11} +{"Format": "IDEA0", "ID": "1e2307da-532b-4a1c-8eb1-470ace465e23", "DetectTime": "2024-05-21T12:24:58.649242+00:00", "EventTime": "2024-05-21T12:24:58.649260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.224.115"]}], "Attach": [{"Content": "Connection to unknown destination port 8696/UDP destination IP 94.240.224.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftTgH2S1oi7w5aNHh"], "accumulated_threat_level": 5.6, "timewindow": 11} +{"Format": "IDEA0", "ID": "6ade2129-7f88-4da0-85cf-9107b33b2f92", "DetectTime": "2024-05-21T12:24:58.663517+00:00", "EventTime": "2024-05-21T12:24:58.663544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["210.0.130.4"]}], "Attach": [{"Content": "Connection to unknown destination port 9272/UDP destination IP 210.0.130.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT1ho3t5ejJgusDY1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "f8e00e3e-6512-4766-8e3e-3d665b18e0a4", "DetectTime": "2024-05-21T12:24:58.673553+00:00", "EventTime": "2024-05-21T12:24:58.673571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cst6kf1bXgc4tXErZ3"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "c48771fd-ca0f-4aa1-8f4b-e0d650f40661", "DetectTime": "2024-05-21T12:24:58.690109+00:00", "EventTime": "2024-05-21T12:24:58.690131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9Yad4G9YbxNEgvk4"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "af62cbac-c02c-42a2-9bac-97650a580af7", "DetectTime": "2024-05-21T12:24:58.761644+00:00", "EventTime": "2024-05-21T12:24:58.761665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CylOJE3L97G6DPTRYj"], "accumulated_threat_level": 0.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "38e6d773-8f49-4f19-aa6f-4a00298bf8b6", "DetectTime": "2024-05-21T12:24:58.794757+00:00", "EventTime": "2024-05-21T12:24:58.794778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTI823Fgd0ahKBMwd"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "a9ea67a7-7d35-417d-a7f6-7a2bb5ec75b9", "DetectTime": "2024-05-21T12:24:58.922925+00:00", "EventTime": "2024-05-21T12:24:58.922946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C232jl263sEVssRJp6"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "a920eb56-b188-409f-89fe-60a1275c3c3c", "DetectTime": "2024-05-21T12:24:58.982339+00:00", "EventTime": "2024-05-21T12:24:58.982359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQ7wI3Gbm951zTeTg"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "931f7813-9379-4ba8-9498-325ce456727f", "DetectTime": "2024-05-21T12:24:59.012672+00:00", "EventTime": "2024-05-21T12:24:59.012696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyPpX1gOfWnsEP8Lk"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "3cfad925-2ed2-4149-9129-bf6d352746b0", "DetectTime": "2024-05-21T12:24:59.031386+00:00", "EventTime": "2024-05-21T12:24:59.031408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx48Fk2vcXJ8TXCGtd"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "08c7a1e4-9c5a-4a16-b9ba-08a79f96c878", "DetectTime": "2024-05-21T12:24:59.047698+00:00", "EventTime": "2024-05-21T12:24:59.047721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfM7AK1eIglQLuEnj7"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "c8e0946f-e8e7-4037-82ed-29c4ca5bd915", "DetectTime": "2024-05-21T12:24:59.067266+00:00", "EventTime": "2024-05-21T12:24:59.067287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc23kZ1j0n0L5YP28j"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "73053e2e-c9d6-4cb0-8252-1a10f2e1a11a", "DetectTime": "2024-05-21T12:24:59.091663+00:00", "EventTime": "2024-05-21T12:24:59.091686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mPVjTeoE2Q254Fj"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "d8f5021b-9159-4a19-92d7-fb4695611bcc", "DetectTime": "2024-05-21T12:24:59.115571+00:00", "EventTime": "2024-05-21T12:24:59.115593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEBk34x0yst8YhGP"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "95298d8e-ae43-40bc-84b0-5e0bcbcd2859", "DetectTime": "2024-05-21T12:24:59.133039+00:00", "EventTime": "2024-05-21T12:24:59.133060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtlx74BZJzsrgGLP2"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "675e6fdc-7526-4550-9089-c52603215e6c", "DetectTime": "2024-05-21T12:24:59.158955+00:00", "EventTime": "2024-05-21T12:24:59.158978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCTCbE4ktJPMFQlkw2"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "56ca6c04-c5e6-47d4-9bc5-e25fa5c7cf1f", "DetectTime": "2024-05-21T12:24:59.194999+00:00", "EventTime": "2024-05-21T12:24:59.195020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCgsLLo5oofsC1sb"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "1161add2-eafb-4bda-a485-146adba9c5c2", "DetectTime": "2024-05-21T12:24:59.248537+00:00", "EventTime": "2024-05-21T12:24:59.248557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpjAo4DTCQVMC3BEi"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "20bca258-de07-4aa0-9894-711616b81341", "DetectTime": "2024-05-21T12:24:59.273514+00:00", "EventTime": "2024-05-21T12:24:59.273538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLlGG1UssnkkEBEr6"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "1a54afb5-4792-4ac1-8872-6bf357d20500", "DetectTime": "2024-05-21T12:24:59.309034+00:00", "EventTime": "2024-05-21T12:24:59.309053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzGfJu35NywhvhiYu9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "55b2ee59-cbfd-4bbf-80ae-93eab8798cf3", "DetectTime": "2024-05-21T12:24:59.331768+00:00", "EventTime": "2024-05-21T12:24:59.331790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MTUB3ZabrK4pPG52"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "863fe23d-372d-468f-a4f0-aa0173bf0810", "DetectTime": "2024-05-21T12:24:59.366350+00:00", "EventTime": "2024-05-21T12:24:59.366372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGBZwU1ngaOJGUqzg"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "36635249-15d9-4213-a874-c6d0fdbc201a", "DetectTime": "2024-05-21T12:24:59.383533+00:00", "EventTime": "2024-05-21T12:24:59.383556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcxGCP2fh6Oti3Z8qi"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "3e4fdb63-2371-4ced-9f71-b10a4f7217c3", "DetectTime": "2024-05-21T12:24:59.394900+00:00", "EventTime": "2024-05-21T12:24:59.394921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEx9Vf3J7GSGWRr2D6", "Clw8hB2xBTOYTrNNmf", "Cqob7m4gKgkO1Eve9c", "C0TsEg2V5xuN4jUlH1"], "accumulated_threat_level": 1.3, "timewindow": 12} +{"Format": "IDEA0", "ID": "ae1aa28c-438e-4e49-b397-a8ab60012cc7", "DetectTime": "2024-05-21T12:24:59.408854+00:00", "EventTime": "2024-05-21T12:24:59.408875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7uE032i5TF6bLd92"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "bed08419-e1f9-4abb-a922-d725c34dc067", "DetectTime": "2024-05-21T12:24:59.425089+00:00", "EventTime": "2024-05-21T12:24:59.425108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVKE3KSAuE91pyzi"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "f76db6ad-116c-4322-a574-1da411e7d2ac", "DetectTime": "2024-05-21T12:24:59.455956+00:00", "EventTime": "2024-05-21T12:24:59.455974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTs0A33If2qyjAbJ31"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "fa42fdc8-9d0a-429f-bbad-fd422b67cbfe", "DetectTime": "2024-05-21T12:24:59.487799+00:00", "EventTime": "2024-05-21T12:24:59.487820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHAXADp4RTdcsb"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "be9ce382-a623-4e2e-ad14-3cfff4610c4c", "DetectTime": "2024-05-21T12:24:59.509964+00:00", "EventTime": "2024-05-21T12:24:59.509985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCStMvYgJBcMPCJe"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "3a0d6971-8572-447b-bf40-4823034ef87b", "DetectTime": "2024-05-21T12:24:59.529545+00:00", "EventTime": "2024-05-21T12:24:59.529567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9V4eQ1GGJK0mJHU09"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9f9762a1-2b81-4fa6-abb4-c2a549b763d1", "DetectTime": "2024-05-21T12:24:59.614837+00:00", "EventTime": "2024-05-21T12:24:59.614859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyiCXY3JliL158Xci6"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "7fe60e3c-6ba3-4a34-afab-0316dcda9de4", "DetectTime": "2024-05-21T12:24:59.619999+00:00", "EventTime": "2024-05-21T12:24:59.620017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuc0fg5bU7CfsHiz2"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "28d6ee0f-bb20-4c96-aace-1a7a06fbb15b", "DetectTime": "2024-05-21T12:24:59.642794+00:00", "EventTime": "2024-05-21T12:24:59.642814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czsc8w2PUy0pqYcKU7"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "94a70b56-f6d6-4543-8128-8651aef32f8f", "DetectTime": "2024-05-21T12:24:59.665356+00:00", "EventTime": "2024-05-21T12:24:59.665377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZMp64X94mkzzYX53"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "dc910e42-4b6a-4e47-8dcf-dee5d76f3f41", "DetectTime": "2024-05-21T12:24:59.670230+00:00", "EventTime": "2024-05-21T12:24:59.670248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.114.37 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTh3y1SPMnkNoloig"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "8e25d445-96fd-43fc-be48-b11a02679e7a", "DetectTime": "2024-05-21T12:24:59.687153+00:00", "EventTime": "2024-05-21T12:24:59.687174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RShkQe1I38ZER1e"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "614710fd-f667-44a1-bc36-a7d3e2422812", "DetectTime": "2024-05-21T12:24:59.704003+00:00", "EventTime": "2024-05-21T12:24:59.704021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RZoAVeTpYM51KFf"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "ee0a0f5f-379d-45cb-a887-8e067455af78", "DetectTime": "2024-05-21T12:24:59.736723+00:00", "EventTime": "2024-05-21T12:24:59.736746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.49.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU69MVukdHbs6krWc"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "c611fdef-0ee9-49ef-8af9-2f05fb0ee845", "DetectTime": "2024-05-21T12:24:59.768106+00:00", "EventTime": "2024-05-21T12:24:59.768126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQyKbWxYGUTZyPHk"], "accumulated_threat_level": 2.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "936e5341-5cea-44d7-b3fd-0860cf8403ac", "DetectTime": "2024-05-21T12:24:59.788247+00:00", "EventTime": "2024-05-21T12:24:59.788264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GoKe39z9rrQ3RYmd"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 12} +{"Format": "IDEA0", "ID": "bdd58e90-ae74-4906-9661-54b6d0c0a061", "DetectTime": "2024-05-21T12:25:00.048959+00:00", "EventTime": "2024-05-21T12:25:00.048978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYy2L8r3ikS0VP7"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "e58db1cf-fe13-438b-8d9f-166ad5f77e6e", "DetectTime": "2024-05-21T12:25:00.063678+00:00", "EventTime": "2024-05-21T12:25:00.063698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYF6L53ljYyr6BLPcd"], "accumulated_threat_level": 3.7, "timewindow": 12} +{"Format": "IDEA0", "ID": "1620a4a9-ebff-4fc6-a8c4-571c23e59ede", "DetectTime": "2024-05-21T12:25:00.152516+00:00", "EventTime": "2024-05-21T12:25:00.152539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGPJt3x603idYbQ07"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "7f0f4e9e-be35-4a28-bb52-59fc869d4aae", "DetectTime": "2024-05-21T12:25:00.245604+00:00", "EventTime": "2024-05-21T12:25:00.245624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqoU0l2w6iowhPO03f"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "7c2923e1-385c-46fe-8746-226499e578b8", "DetectTime": "2024-05-21T12:25:00.336427+00:00", "EventTime": "2024-05-21T12:25:00.336446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRq6qf4wPjxR2iTbI4"], "accumulated_threat_level": 4.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "155b288f-947d-4fba-8eaa-931ef3b59292", "DetectTime": "2024-05-21T12:25:00.341705+00:00", "EventTime": "2024-05-21T12:25:00.341726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDxgj1WQEoSbPYDf"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "bb8226d5-90ef-414f-8533-c472977a2678", "DetectTime": "2024-05-21T12:25:00.374802+00:00", "EventTime": "2024-05-21T12:25:00.374824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZl7D14ijsyXVKAbe"], "accumulated_threat_level": 5.3, "timewindow": 12} +{"Format": "IDEA0", "ID": "7be2a1e4-4db0-4112-9028-64cba811dd40", "DetectTime": "2024-05-21T12:25:00.379955+00:00", "EventTime": "2024-05-21T12:25:00.379973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17Nea1ZQY7XVQTUx9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "5ff11d8e-0cb0-44c7-9465-0ca9f0b7dc4a", "DetectTime": "2024-05-21T12:25:00.397325+00:00", "EventTime": "2024-05-21T12:25:00.397347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQYreHyYeaGv3vF9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "1897dcb8-b943-4ad8-b477-8becac43796e", "DetectTime": "2024-05-21T12:25:00.415959+00:00", "EventTime": "2024-05-21T12:25:00.415979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWNC5243NCOs6LVEf4"], "accumulated_threat_level": 6.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "bd1c667b-c75a-4393-b9f1-92d95aa7941e", "DetectTime": "2024-05-21T12:25:00.425230+00:00", "EventTime": "2024-05-21T12:25:00.425252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQQMz3XIFd1Oee1w"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "d19f94d3-81fb-4a8b-b86d-bd700b3ce923", "DetectTime": "2024-05-21T12:25:00.442392+00:00", "EventTime": "2024-05-21T12:25:00.442426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKu6O51EPFMbv6u7D9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "f4382ab6-971e-42bc-899f-5b9881d4baa3", "DetectTime": "2024-05-21T12:25:00.460909+00:00", "EventTime": "2024-05-21T12:25:00.460931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa0qK5SiovTFGuMb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 12} +{"Format": "IDEA0", "ID": "9283af6d-355d-43e8-a547-ae888c863ac8", "DetectTime": "2024-05-21T12:25:00.482297+00:00", "EventTime": "2024-05-21T12:25:00.482320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCqAVBOKW8zszBoh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "c4014c1e-de4e-4025-9c70-2c5ee0657dd1", "DetectTime": "2024-05-21T12:25:00.509855+00:00", "EventTime": "2024-05-21T12:25:00.509876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmt7IR3d4am9NaKfej"], "accumulated_threat_level": 8.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "0145445f-e642-4ddb-8cae-413f5d89ca14", "DetectTime": "2024-05-21T12:25:00.532655+00:00", "EventTime": "2024-05-21T12:25:00.532675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LAOMwPjQuRQUd35"], "accumulated_threat_level": 9.3, "timewindow": 12} +{"Format": "IDEA0", "ID": "dec9849c-df49-4b67-81dc-b1140bbf2eba", "DetectTime": "2024-05-21T12:25:00.555118+00:00", "EventTime": "2024-05-21T12:25:00.555136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKk98D3ambRYp7vre"], "accumulated_threat_level": 10.100000000000001, "timewindow": 12} +{"Format": "IDEA0", "ID": "0c33cfce-097d-4ea0-bfef-8c9e8a01e778", "DetectTime": "2024-05-21T12:25:00.569724+00:00", "EventTime": "2024-05-21T12:25:00.569742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJl72461UfXg0tyT9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "f11657b3-711e-4960-8b77-3c7a9a9ba90e", "DetectTime": "2024-05-21T12:25:00.584694+00:00", "EventTime": "2024-05-21T12:25:00.584712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKxp92FYcvyQkaged"], "accumulated_threat_level": 10.900000000000002, "timewindow": 12} +{"Format": "IDEA0", "ID": "f78560ef-06bf-4ea0-9c04-8292add7b23e", "DetectTime": "2024-05-21T12:25:00.606069+00:00", "EventTime": "2024-05-21T12:25:00.606090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq85IdsmuDmOZOFNf"], "accumulated_threat_level": 11.700000000000003, "timewindow": 12} +{"Format": "IDEA0", "ID": "8b977edf-c7a5-4de7-8a1f-acf6f69da786", "DetectTime": "2024-05-21T12:25:00.629053+00:00", "EventTime": "2024-05-21T12:25:00.629074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MTmt3n5OfAWfj0Za"], "accumulated_threat_level": 12.500000000000004, "timewindow": 12} +{"Format": "Json", "ID": "8b977edf-c7a5-4de7-8a1f-acf6f69da786", "DetectTime": "2024-05-21T12:25:00.629053+00:00", "EventTime": "2024-05-21T12:25:00.629074+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "1970-01-01T11:23:06.387140+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2024/05/21 12:25:00.829151)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 12, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "7308972e-8ca0-42d6-bd37-15cb13f79269", "DetectTime": "2024-05-21T12:25:01.027189+00:00", "EventTime": "2024-05-21T12:25:01.027214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.114.37 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfELK3ECJEBzJpV2c"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "ba45de13-aa94-4db9-9937-eea5c886ca3b", "DetectTime": "2024-05-21T12:25:01.039670+00:00", "EventTime": "2024-05-21T12:25:01.039687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmm7iV26Zd9d3m6EX2"], "accumulated_threat_level": 0.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "4dbfd1f9-8b33-49b0-a505-98c119ffdc2e", "DetectTime": "2024-05-21T12:25:01.062096+00:00", "EventTime": "2024-05-21T12:25:01.062117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhUvy26mdFDh26hBl"], "accumulated_threat_level": 1.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "bf747ae5-e799-468f-a10d-3582208ecece", "DetectTime": "2024-05-21T12:25:01.099662+00:00", "EventTime": "2024-05-21T12:25:01.099681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpdKB2JMONTDoQhfl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 12} +{"Format": "IDEA0", "ID": "66385fc8-16bf-4f7c-9d2d-ff580429efe8", "DetectTime": "2024-05-21T12:25:01.117762+00:00", "EventTime": "2024-05-21T12:25:01.117781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAB2j14bYcZmLRIh29"], "accumulated_threat_level": 3.2, "timewindow": 12} +{"Format": "IDEA0", "ID": "ef0a908e-57a4-4df4-b1ae-3a62f53b24ad", "DetectTime": "2024-05-21T12:25:01.141969+00:00", "EventTime": "2024-05-21T12:25:01.141988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV6Ca3pkW5qFHsoe7"], "accumulated_threat_level": 4.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "55463792-9f27-4303-82c4-c2838d9be6be", "DetectTime": "2024-05-21T12:25:01.175835+00:00", "EventTime": "2024-05-21T12:25:01.175854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDTVqv4ZzoTTTZZj0j"], "accumulated_threat_level": 4.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "1ed4f880-5b4d-4af4-83f9-1176127d5081", "DetectTime": "2024-05-21T12:25:01.260908+00:00", "EventTime": "2024-05-21T12:25:01.260937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.49.121 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPloS1r2Sxv6sRM8e"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "70ee9fa4-5e33-42e7-90d0-d64a3086c4aa", "DetectTime": "2024-05-21T12:25:01.332920+00:00", "EventTime": "2024-05-21T12:25:01.332941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ1uOUwfm7ap9sh3d", "CfQl131PWQMlh6UfIi", "CnuSuf47na5m6Ut9cf", "CnKDpo1IHe4InzvRf6"], "accumulated_threat_level": 5.3, "timewindow": 12} +{"Format": "IDEA0", "ID": "75bcfe5b-f3d5-4333-ab88-4107b5b42810", "DetectTime": "2024-05-21T12:25:01.413607+00:00", "EventTime": "2024-05-21T12:25:01.413625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVENRI2hQqnwxVxkW4"], "accumulated_threat_level": 6.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "5716b705-0b70-4e91-8b7b-31660c28b015", "DetectTime": "2024-05-21T12:25:01.429819+00:00", "EventTime": "2024-05-21T12:25:01.429840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CieoV92CbgBZnNldzf"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9369118a-879d-4ac4-9387-c6673cd2ef33", "DetectTime": "2024-05-21T12:25:01.451192+00:00", "EventTime": "2024-05-21T12:25:01.451212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPxSm3OSPrD9j8dsl"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "304b5c65-89ad-48f5-bc20-2d88343adef7", "DetectTime": "2024-05-21T12:25:01.462332+00:00", "EventTime": "2024-05-21T12:25:01.462351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJEM9R3xq9Dgipys1j"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 12} +{"Format": "IDEA0", "ID": "195b9b8c-ca51-43e1-a2bc-3ae7434d8d4b", "DetectTime": "2024-05-21T12:25:01.481528+00:00", "EventTime": "2024-05-21T12:25:01.481547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Lrrd3LMvygfP5Bv3"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "69f6261e-b066-421f-89ce-77d1baa2d3ad", "DetectTime": "2024-05-21T12:25:01.491722+00:00", "EventTime": "2024-05-21T12:25:01.491740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU7JAPGNJvuBdqQk"], "accumulated_threat_level": 7.699999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "a8a40461-02ed-4dd9-869a-6dc5f8e7f1b2", "DetectTime": "2024-05-21T12:25:01.512333+00:00", "EventTime": "2024-05-21T12:25:01.512353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTqor1ZnVKZyHrNfa"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "bcbcf5d7-ba87-4fbf-8b62-330e28aace37", "DetectTime": "2024-05-21T12:25:01.537265+00:00", "EventTime": "2024-05-21T12:25:01.537284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySRDG2IsWYoOC5JM7"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9a42b036-4426-4879-9811-1feb0dd3404a", "DetectTime": "2024-05-21T12:25:01.575542+00:00", "EventTime": "2024-05-21T12:25:01.575562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhcT54avASWJoIzD2"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "025f9e21-153f-4c35-aec7-060891439177", "DetectTime": "2024-05-21T12:25:01.596441+00:00", "EventTime": "2024-05-21T12:25:01.596462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbPSD2XlCfj20ujJk"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "0a903844-f174-4f93-8234-5aeb524caa3f", "DetectTime": "2024-05-21T12:25:01.638003+00:00", "EventTime": "2024-05-21T12:25:01.638023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMJu03wq1C3OWRmOh"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "c5fd5375-a4ee-4fdb-8764-bd5b1a356fe9", "DetectTime": "2024-05-21T12:25:01.661923+00:00", "EventTime": "2024-05-21T12:25:01.661943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBOwP2lBPOGgBLOtc"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "312ff1c1-e90e-4050-b978-8b1e5196be14", "DetectTime": "2024-05-21T12:25:01.703177+00:00", "EventTime": "2024-05-21T12:25:01.703195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWirw14CMJZWjLZax2"], "accumulated_threat_level": 8.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "e5184b16-3f9d-43b4-a3d9-2bfb226b0b43", "DetectTime": "2024-05-21T12:25:01.707803+00:00", "EventTime": "2024-05-21T12:25:01.707821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxaiKR1IJdd3kOOYk9"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "344e48b0-c1f5-4ef0-94c2-359b61a1b21d", "DetectTime": "2024-05-21T12:25:01.738011+00:00", "EventTime": "2024-05-21T12:25:01.738031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgq6Q1j4jFdcbitj"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9da91401-db7e-43b4-8ce4-4c334aae5229", "DetectTime": "2024-05-21T12:25:01.767613+00:00", "EventTime": "2024-05-21T12:25:01.767636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5lC5q4oc7s4EWay5l"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "1f0d533b-380b-4685-b98c-e32acc4c98ef", "DetectTime": "2024-05-21T12:25:01.788463+00:00", "EventTime": "2024-05-21T12:25:01.788482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJAlV1yDkxJAE4uk6"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "d3dd3217-c643-4675-80c5-cd1369a2cdcf", "DetectTime": "2024-05-21T12:25:01.804789+00:00", "EventTime": "2024-05-21T12:25:01.804809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZYy14yegshzNH5vh"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "830c923a-f077-45e3-87e4-35134851d8fd", "DetectTime": "2024-05-21T12:25:01.825634+00:00", "EventTime": "2024-05-21T12:25:01.825655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7DOw3626psWVdIb4"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "85020de0-b456-4df8-8204-56c67e13d632", "DetectTime": "2024-05-21T12:25:01.861182+00:00", "EventTime": "2024-05-21T12:25:01.861202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUvxv3my3FrHuJwfi"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "5f0aeef4-f048-4a93-a177-8ee503b24f95", "DetectTime": "2024-05-21T12:25:01.886572+00:00", "EventTime": "2024-05-21T12:25:01.886591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTmHxh1OTSbynE1G3"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "2f793e68-86ac-4697-8220-544afce1447a", "DetectTime": "2024-05-21T12:25:01.915991+00:00", "EventTime": "2024-05-21T12:25:01.916011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1NIsG1BmLDZIu2j"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "dc5f28f7-bf3a-46c3-9e84-905fe2776a18", "DetectTime": "2024-05-21T12:25:01.939715+00:00", "EventTime": "2024-05-21T12:25:01.939737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5BmQjw7Bz2fGa7Xe"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "923c584f-6d9f-44ba-ad38-beb1a115f498", "DetectTime": "2024-05-21T12:25:01.981209+00:00", "EventTime": "2024-05-21T12:25:01.981230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiiIn2U2WyJwnI5J"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "0d27bb1d-c0c3-4f27-b558-8bb9627b110e", "DetectTime": "2024-05-21T12:25:02.009724+00:00", "EventTime": "2024-05-21T12:25:02.009743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTROwc3DsstA3EEzb8"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "ecb960bc-06b6-4d0c-9954-947df9d1402b", "DetectTime": "2024-05-21T12:25:02.043195+00:00", "EventTime": "2024-05-21T12:25:02.043219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgqVS2b2eg7BQP0Pi"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "00a7042a-b73a-4661-8a58-713b84cedb9f", "DetectTime": "2024-05-21T12:25:02.056681+00:00", "EventTime": "2024-05-21T12:25:02.056699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEUws19cGYb8R3gC6"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "69d4406a-4ec3-4590-ab7d-9499d85fee17", "DetectTime": "2024-05-21T12:25:02.085108+00:00", "EventTime": "2024-05-21T12:25:02.085130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6sbCc1SuG8jm0WzFh"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "eb03dce6-85c0-4fea-bccb-d5deda4fc603", "DetectTime": "2024-05-21T12:25:02.124981+00:00", "EventTime": "2024-05-21T12:25:02.125003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOLe33Hqm6oxIxE8l"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "e87625de-aef8-4f64-893b-4449418d1bd3", "DetectTime": "2024-05-21T12:25:02.149853+00:00", "EventTime": "2024-05-21T12:25:02.149873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeN4po4xlWerLVGa2d"], "accumulated_threat_level": 9.3, "timewindow": 12} +{"Format": "IDEA0", "ID": "66602684-b068-49b1-b542-e191a5ced8ca", "DetectTime": "2024-05-21T12:25:02.155641+00:00", "EventTime": "2024-05-21T12:25:02.155660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZEQWE1dNSloZ3KCG8"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "0c39b03a-1c99-486e-87c9-04b42094e160", "DetectTime": "2024-05-21T12:25:02.254718+00:00", "EventTime": "2024-05-21T12:25:02.254738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qyg93sSfnJnHYE7c"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "db33bc53-ab09-45b3-861d-1832bacee1cc", "DetectTime": "2024-05-21T12:25:02.283030+00:00", "EventTime": "2024-05-21T12:25:02.283052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmkgG1g1GzpCxdj2j"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "6007e688-c723-4e71-8e31-9dd5783abf1a", "DetectTime": "2024-05-21T12:25:02.310423+00:00", "EventTime": "2024-05-21T12:25:02.310442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XrZz1cN51VyrYb3g"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "b0c59ef4-ab52-4577-947d-ff8586e3f9f6", "DetectTime": "2024-05-21T12:25:02.342448+00:00", "EventTime": "2024-05-21T12:25:02.342469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo2Ia3wihs0Siy1fc"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "2a36095c-db0e-46fb-8edb-cad859bedb2c", "DetectTime": "2024-05-21T12:25:02.375562+00:00", "EventTime": "2024-05-21T12:25:02.375583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmyXb3LQpVrbAP3Tl"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "4473b2a8-26e0-44ff-915f-8179f0b30c85", "DetectTime": "2024-05-21T12:25:02.405802+00:00", "EventTime": "2024-05-21T12:25:02.405823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cehl59ymn2FS0eLWd"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "8f62596b-11bb-4563-98e4-47bddaf7f91e", "DetectTime": "2024-05-21T12:25:02.424411+00:00", "EventTime": "2024-05-21T12:25:02.424429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co7CE74b3zveuZZhVi"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9ccbdfff-d980-4002-8995-431f1628be68", "DetectTime": "2024-05-21T12:25:02.461864+00:00", "EventTime": "2024-05-21T12:25:02.461885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHxf93rjZ4rw83ed"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "9651e230-ecf2-4c60-8b11-31ccb148c9a9", "DetectTime": "2024-05-21T12:25:02.497426+00:00", "EventTime": "2024-05-21T12:25:02.497445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvuue4ZElGaALC8ci"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "013b177a-ffda-48ec-ba9b-65b6b5da6aa6", "DetectTime": "2024-05-21T12:25:02.507315+00:00", "EventTime": "2024-05-21T12:25:02.507333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfWAp527l1zPzwGfD4", "CfYb3B3keApGtmnWG9", "Ck2mT22Qn4kx5Qi6ai", "CIyRsu18mO5dBRNe65"], "accumulated_threat_level": 9.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "08d6085f-3099-4b95-9743-48715e075c93", "DetectTime": "2024-05-21T12:25:02.517355+00:00", "EventTime": "2024-05-21T12:25:02.517374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcGlypHY6j4QhBmdg"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "89712e88-637d-4a70-9b07-e89fb4903a3c", "DetectTime": "2024-05-21T12:25:02.543913+00:00", "EventTime": "2024-05-21T12:25:02.543930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChEuSL2at84c7T1zEk"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "49b3105f-1d86-4e25-9763-e5238d8cae84", "DetectTime": "2024-05-21T12:25:02.573731+00:00", "EventTime": "2024-05-21T12:25:02.573749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LJwUe7SVCV55tul"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "2f2fd415-30fe-4bbe-b475-620f52d91dd3", "DetectTime": "2024-05-21T12:25:02.599184+00:00", "EventTime": "2024-05-21T12:25:02.599204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUsZg2MRNhLOMJeCc"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "e4548e9f-27d3-4cab-b049-e3546a3382e9", "DetectTime": "2024-05-21T12:25:02.644932+00:00", "EventTime": "2024-05-21T12:25:02.644952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNCgWgO5nuUUZcBAe"], "accumulated_threat_level": 3.7, "timewindow": 9} +{"Format": "IDEA0", "ID": "6b7caa49-8ba7-419e-b07f-652af29fb283", "DetectTime": "2024-05-21T12:25:02.749108+00:00", "EventTime": "2024-05-21T12:25:02.749127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41YjF2D4OutUwX1x2"], "accumulated_threat_level": 10.600000000000001, "timewindow": 12} +{"Format": "IDEA0", "ID": "3c872734-d4e0-495d-b79f-272f2e09b233", "DetectTime": "2024-05-21T12:25:02.770909+00:00", "EventTime": "2024-05-21T12:25:02.770928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.217.117.139"]}], "Attach": [{"Content": "Connection to unknown destination port 8593/UDP destination IP 107.217.117.139. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcclO1vd8hudUnul9"], "accumulated_threat_level": 11.400000000000002, "timewindow": 12} +{"Format": "IDEA0", "ID": "dcd19965-c68d-4330-bdc6-574d0d8ce6ca", "DetectTime": "2024-05-21T12:25:02.780222+00:00", "EventTime": "2024-05-21T12:25:02.780242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm5DPS3j4DX92vvoua"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "0fb65e43-88e3-4f6d-93d2-18aa2d136107", "DetectTime": "2024-05-21T12:25:02.799927+00:00", "EventTime": "2024-05-21T12:25:02.799946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4XJH1fTDNKciUcw"], "accumulated_threat_level": 12.200000000000003, "timewindow": 12} +{"Format": "Json", "ID": "0fb65e43-88e3-4f6d-93d2-18aa2d136107", "DetectTime": "2024-05-21T12:25:02.799927+00:00", "EventTime": "2024-05-21T12:25:02.799946+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "1970-01-01T11:55:51.207513+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2024/05/21 12:25:03.038621)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 12, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "a44a5e19-d637-46c6-996b-38bb94c67568", "DetectTime": "2024-05-21T12:25:03.050545+00:00", "EventTime": "2024-05-21T12:25:03.050570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwYREs3DkZHj24VINb"], "accumulated_threat_level": 0.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "fd8969f8-1a31-424e-8000-2e02454cdd89", "DetectTime": "2024-05-21T12:25:03.064072+00:00", "EventTime": "2024-05-21T12:25:03.064091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "Connection to unknown destination port 24382/UDP destination IP 66.63.204.26. AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18NwbYNnArOavlhc"], "accumulated_threat_level": 1.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "82cd54da-c8af-4216-a7a3-73ee47d16557", "DetectTime": "2024-05-21T12:25:03.073920+00:00", "EventTime": "2024-05-21T12:25:03.073937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCn9Z7UIqAs5TGQ7k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 12} +{"Format": "IDEA0", "ID": "f21d0c19-1608-41fe-a33a-e390ba546d23", "DetectTime": "2024-05-21T12:25:03.089788+00:00", "EventTime": "2024-05-21T12:25:03.089807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6zmh4C7IEfkDH03d"], "accumulated_threat_level": 3.2, "timewindow": 12} +{"Format": "IDEA0", "ID": "6497ef12-7ee5-42f2-a4e9-0a1140aa40ce", "DetectTime": "2024-05-21T12:25:03.111687+00:00", "EventTime": "2024-05-21T12:25:03.111707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "Connection to unknown destination port 1002/UDP destination IP 1.168.10.20. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3KFzp3B8pLZoHmgy8"], "accumulated_threat_level": 4.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "a2ebe15c-c7b3-4282-8cca-575d0e9855de", "DetectTime": "2024-05-21T12:25:03.145586+00:00", "EventTime": "2024-05-21T12:25:03.145606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHVZI1gn7lgvhP2x1"], "accumulated_threat_level": 4.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "23977cda-832e-449e-bdb2-dbed933b3049", "DetectTime": "2024-05-21T12:25:03.168523+00:00", "EventTime": "2024-05-21T12:25:03.168542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.230.133.66"]}], "Attach": [{"Content": "Connection to unknown destination port 6474/UDP destination IP 2.230.133.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhjKS3Ln2FhkqlIzl"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "9cc06ee5-2a8a-4bc2-a97e-f905bef0fdc0", "DetectTime": "2024-05-21T12:25:03.202031+00:00", "EventTime": "2024-05-21T12:25:03.202050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoN1FZ2nutf2MAlr0e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 12} +{"Format": "IDEA0", "ID": "9c537518-c10e-47b1-b634-83f4d5378c35", "DetectTime": "2024-05-21T12:25:03.223836+00:00", "EventTime": "2024-05-21T12:25:03.223858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRTB11LSzLB4eHDm6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "a7322b9e-ccce-46b2-9b2f-ec8d5051ca07", "DetectTime": "2024-05-21T12:25:03.249849+00:00", "EventTime": "2024-05-21T12:25:03.249877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoBqTk14C6Ryc6Vf27"], "accumulated_threat_level": 7.999999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "0a7e81ad-cef2-465d-b499-4e74828987e4", "DetectTime": "2024-05-21T12:25:03.286262+00:00", "EventTime": "2024-05-21T12:25:03.286280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtUTs2tIhe6YeYVSk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "325408d5-421d-4463-871b-c3b829b7ba89", "DetectTime": "2024-05-21T12:25:03.319625+00:00", "EventTime": "2024-05-21T12:25:03.319645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl93Xv1lRmWb2hTCQ7"], "accumulated_threat_level": 9.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "e0b85019-2d6c-4ed0-b3b8-d27b8a7c3a55", "DetectTime": "2024-05-21T12:25:03.342666+00:00", "EventTime": "2024-05-21T12:25:03.342687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSLrn4KoPcecRtp86"], "accumulated_threat_level": 10.4, "timewindow": 12} +{"Format": "IDEA0", "ID": "8a4f8132-5673-4d0d-b54d-198938097ce9", "DetectTime": "2024-05-21T12:25:03.374561+00:00", "EventTime": "2024-05-21T12:25:03.374581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpQZ43GSFbAQ2G8Nb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 12} +{"Format": "IDEA0", "ID": "b80b08e7-48a7-422f-86d6-ece7f6f7183d", "DetectTime": "2024-05-21T12:25:03.397158+00:00", "EventTime": "2024-05-21T12:25:03.397177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtiHy2gOCDa0qS3Ng"], "accumulated_threat_level": 12.000000000000002, "timewindow": 12} +{"Format": "Json", "ID": "b80b08e7-48a7-422f-86d6-ece7f6f7183d", "DetectTime": "2024-05-21T12:25:03.397158+00:00", "EventTime": "2024-05-21T12:25:03.397177+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "1970-01-01T11:56:12.836852+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2024/05/21 12:25:03.551276)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 12, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "34a1d960-181f-4138-a8d1-587598e45c14", "DetectTime": "2024-05-21T12:25:03.561935+00:00", "EventTime": "2024-05-21T12:25:03.561960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUS3bb2pkf9Udem3el"], "accumulated_threat_level": 0.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "8abb009b-e493-40c6-b6f0-bb563f361376", "DetectTime": "2024-05-21T12:25:03.570497+00:00", "EventTime": "2024-05-21T12:25:03.570518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.67.138 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUZvl3gL8enu91lXj"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "a579c32a-b2b8-4465-9ed1-f9c998020d57", "DetectTime": "2024-05-21T12:25:03.582210+00:00", "EventTime": "2024-05-21T12:25:03.582230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "Connection to unknown destination port 17103/UDP destination IP 118.173.193.63. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzP8aZYreyWWFGE1"], "accumulated_threat_level": 1.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "094b560d-a358-4824-be32-ad597a5539f7", "DetectTime": "2024-05-21T12:25:03.593141+00:00", "EventTime": "2024-05-21T12:25:03.593159+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.72.103.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLEdfs4Nr3nux89hn3"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "82fbc7e3-12f4-4740-add4-55f76ff1ecac", "DetectTime": "2024-05-21T12:25:03.604022+00:00", "EventTime": "2024-05-21T12:25:03.604040+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.72.103.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.72.103.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLEdfs4Nr3nux89hn3"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "61f0ac70-8ad3-4246-9c1c-19e765c2cfb0", "DetectTime": "2024-05-21T12:25:03.615032+00:00", "EventTime": "2024-05-21T12:25:03.615052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bgfN1UiwdQ4bh4Kg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 12} +{"Format": "IDEA0", "ID": "d01ecd53-d5c0-461c-85ed-5161560bf65c", "DetectTime": "2024-05-21T12:25:03.629054+00:00", "EventTime": "2024-05-21T12:25:03.629075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "Connection to unknown destination port 1245/UDP destination IP 98.21.73.216. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx524x3xta1Kp25vMl"], "accumulated_threat_level": 3.2, "timewindow": 12} +{"Format": "IDEA0", "ID": "cdcce65d-fb94-419c-80f8-269392b7bdd7", "DetectTime": "2024-05-21T12:25:03.652156+00:00", "EventTime": "2024-05-21T12:25:03.652182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfA4e3MtBmbPP1fHi"], "accumulated_threat_level": 4.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "c1c41204-a075-4741-ab13-0e07955497f4", "DetectTime": "2024-05-21T12:25:03.710538+00:00", "EventTime": "2024-05-21T12:25:03.710560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMB7RvZWnK6pAIPpc"], "accumulated_threat_level": 4.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "ae406ff4-d6a9-49c1-b020-4e99fb9d6796", "DetectTime": "2024-05-21T12:25:03.721218+00:00", "EventTime": "2024-05-21T12:25:03.721241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.120.218.207 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOiHo1kuQ0jq47qg8"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "711fa47d-9961-4a0e-bbe4-65fe31277864", "DetectTime": "2024-05-21T12:25:03.738501+00:00", "EventTime": "2024-05-21T12:25:03.738520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpPpC1h49Ljz65eR"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "b7e40676-8858-4a8c-9c73-0029e5ed72a9", "DetectTime": "2024-05-21T12:25:03.841498+00:00", "EventTime": "2024-05-21T12:25:03.841517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.232.130"]}], "Attach": [{"Content": "Connection to unknown destination port 23450/UDP destination IP 94.64.232.130. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6Yf33eDbAhZ1lPs6"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "fa038daf-71b9-4a25-8d37-1a18e87fd6a8", "DetectTime": "2024-05-21T12:25:03.874985+00:00", "EventTime": "2024-05-21T12:25:03.875003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgYbQo3YfDmQDQoFCa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 12} +{"Format": "IDEA0", "ID": "b4b998de-6c1f-47e3-abf9-9ca0aaa0bb8a", "DetectTime": "2024-05-21T12:25:03.897313+00:00", "EventTime": "2024-05-21T12:25:03.897332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSCRO2ktI54Gvkt4h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "3a015b21-c473-4fe0-9600-fdff22db0078", "DetectTime": "2024-05-21T12:25:03.959888+00:00", "EventTime": "2024-05-21T12:25:03.959911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7DnI25JoI3sN8LJi"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "2c50b2df-3545-41c3-9a67-a268b4dcf6f6", "DetectTime": "2024-05-21T12:25:03.978227+00:00", "EventTime": "2024-05-21T12:25:03.978247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvi184kUcnsPpSZa"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "f3ea7dd8-9cc7-49b1-8568-705654487817", "DetectTime": "2024-05-21T12:25:03.991513+00:00", "EventTime": "2024-05-21T12:25:03.991534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vUdh43t2FKMbYdW9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "7ca82568-822f-4176-91cb-9e30cdc28d4a", "DetectTime": "2024-05-21T12:25:04.015699+00:00", "EventTime": "2024-05-21T12:25:04.015717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTlkU1lJhEtSP712f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 12} +{"Format": "IDEA0", "ID": "870f0401-5cad-4edc-aad3-1df8ac98623e", "DetectTime": "2024-05-21T12:25:04.024987+00:00", "EventTime": "2024-05-21T12:25:04.025006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE0lOL2aR5UpHltTcd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "bd632b5c-cd56-41c5-9c63-a4b6f127d4df", "DetectTime": "2024-05-21T12:25:04.041102+00:00", "EventTime": "2024-05-21T12:25:04.041122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cclp0E1VRzqV9OyR8d"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "d421634a-f988-46e0-98fb-42a5373a3a56", "DetectTime": "2024-05-21T12:25:04.066911+00:00", "EventTime": "2024-05-21T12:25:04.066929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.235.230"]}], "Attach": [{"Content": "Connection to unknown destination port 5737/UDP destination IP 172.190.235.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEnZl2bjbUJFfWHP2"], "accumulated_threat_level": 9.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "e8e36cd3-ed29-4f93-b9a7-f1f7c58f9a77", "DetectTime": "2024-05-21T12:25:04.071319+00:00", "EventTime": "2024-05-21T12:25:04.071336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPuws26vtMhMPmRa8"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "027eca5e-29da-4939-b7b0-559c8f8ee158", "DetectTime": "2024-05-21T12:25:04.085732+00:00", "EventTime": "2024-05-21T12:25:04.085754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmZ6o1Naix700FLee"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "8ebfdbd8-7690-467a-9e03-ec2a47647d5f", "DetectTime": "2024-05-21T12:25:04.158554+00:00", "EventTime": "2024-05-21T12:25:04.158574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oWMW10ufHZ2wLns5"], "accumulated_threat_level": 10.4, "timewindow": 12} +{"Format": "IDEA0", "ID": "c5afc95e-bbb3-4058-a805-a9d197e2506f", "DetectTime": "2024-05-21T12:25:04.165745+00:00", "EventTime": "2024-05-21T12:25:04.165763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2UIF1amTOrKxSzbi"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "840380f6-0279-4b92-9961-4a3327bdc3f0", "DetectTime": "2024-05-21T12:25:04.305816+00:00", "EventTime": "2024-05-21T12:25:04.305836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQR8uP3cqWQFeyJVDa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 12} +{"Format": "IDEA0", "ID": "4e5a5bac-0a86-4ec0-8a76-1d975c0da192", "DetectTime": "2024-05-21T12:25:04.394014+00:00", "EventTime": "2024-05-21T12:25:04.394032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBOYiu4mQXDUrrRHO1"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "570d1d06-a0cb-48c0-bebf-10cd9eca5b45", "DetectTime": "2024-05-21T12:25:04.623821+00:00", "EventTime": "2024-05-21T12:25:04.623840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaViytCdXRKwg3i8c"], "accumulated_threat_level": 12.000000000000002, "timewindow": 12} +{"Format": "Json", "ID": "570d1d06-a0cb-48c0-bebf-10cd9eca5b45", "DetectTime": "2024-05-21T12:25:04.623821+00:00", "EventTime": "2024-05-21T12:25:04.623840+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "1970-01-01T11:57:45.932143+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2024/05/21 12:25:04.814791)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 12, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d86ea753-b337-4c65-b0e8-9e154ba11748", "DetectTime": "2024-05-21T12:25:04.820330+00:00", "EventTime": "2024-05-21T12:25:04.820350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRTaJ3WaYRw1TzbK6"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "202e54ff-2115-497f-9ba4-035ebf029581", "DetectTime": "2024-05-21T12:25:04.825159+00:00", "EventTime": "2024-05-21T12:25:04.825178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ia2f4EOZSEC3LME2"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "3a3d7a21-060a-42cb-9d4d-0394a9698e2c", "DetectTime": "2024-05-21T12:25:04.829745+00:00", "EventTime": "2024-05-21T12:25:04.829763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVHaU3eY1vwTZLxE5"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "699d411f-fab8-48c8-9bf2-e83365ddfc28", "DetectTime": "2024-05-21T12:25:04.834485+00:00", "EventTime": "2024-05-21T12:25:04.834503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1Gg92dz5e1Lx9tI9"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "87b10eba-f513-4813-8f4a-5fa0cc2218f2", "DetectTime": "2024-05-21T12:25:04.838979+00:00", "EventTime": "2024-05-21T12:25:04.838997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsPAPj2K46MLS6491f"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "29d433db-f4a9-4983-a7f0-ededb716e981", "DetectTime": "2024-05-21T12:25:04.843531+00:00", "EventTime": "2024-05-21T12:25:04.843549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEVk7e981uGdtFLa"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "dfd08dca-9a50-4ef3-a78e-b8aa618cf5a3", "DetectTime": "2024-05-21T12:25:04.848125+00:00", "EventTime": "2024-05-21T12:25:04.848144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyHyF2qHtv4kTepQc"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "5bc0b7d3-aa57-4ab5-98d8-0a62565c1ed8", "DetectTime": "2024-05-21T12:25:04.852725+00:00", "EventTime": "2024-05-21T12:25:04.852743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56ZbaNVeD9gj23sd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "d28514c7-238a-43b2-9604-d57d6f1514bf", "DetectTime": "2024-05-21T12:25:04.857332+00:00", "EventTime": "2024-05-21T12:25:04.857352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWCOnQOl8yjNOS96"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "1609f48a-3ce4-47f3-a851-b50a8bde76d5", "DetectTime": "2024-05-21T12:25:04.862027+00:00", "EventTime": "2024-05-21T12:25:04.862046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3gcZ3Jif1N4gT3hi"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "07085da9-c199-4522-b3c0-68cf5575eb44", "DetectTime": "2024-05-21T12:25:04.866684+00:00", "EventTime": "2024-05-21T12:25:04.866702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLnp8ItzNYrKUUSDe"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "5006e236-8e1b-4d28-9f4f-0f495a0b1f40", "DetectTime": "2024-05-21T12:25:04.871239+00:00", "EventTime": "2024-05-21T12:25:04.871257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkj8z3W9jI26H0Z8f"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e71a2968-c2e7-4955-9558-e9ba1cfe21df", "DetectTime": "2024-05-21T12:25:04.876212+00:00", "EventTime": "2024-05-21T12:25:04.876231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK2g5OUmtyjprnyY"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "fd4e9f44-23e0-4cec-9cf5-c19c8a7704b0", "DetectTime": "2024-05-21T12:25:04.899469+00:00", "EventTime": "2024-05-21T12:25:04.899488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8mpF4NHHAM3JFjj"], "accumulated_threat_level": 0.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "c157b0ff-3713-4864-aca4-db5e38f397bc", "DetectTime": "2024-05-21T12:25:04.904204+00:00", "EventTime": "2024-05-21T12:25:04.904223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1x0ravkFxqscJIf"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "452fc951-9c19-41ec-9c6d-9b98835690fd", "DetectTime": "2024-05-21T12:25:04.908740+00:00", "EventTime": "2024-05-21T12:25:04.908757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugwkwyulsOnG3JGk"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "12adfbe4-4d3a-47ef-b86d-f3477a58a770", "DetectTime": "2024-05-21T12:25:04.913242+00:00", "EventTime": "2024-05-21T12:25:04.913260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1bCS1Dpie5QYkYNa"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "d1ee602a-277a-41a2-bd4d-ea06b0d10cbc", "DetectTime": "2024-05-21T12:25:04.943006+00:00", "EventTime": "2024-05-21T12:25:04.943026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeK1to3m3NVhZoEnc2"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "8fc38748-8a98-4aec-921b-ace349f16508", "DetectTime": "2024-05-21T12:25:04.952983+00:00", "EventTime": "2024-05-21T12:25:04.953001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Eoup4Mz3XgGwEILe"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e6c2a141-b947-4d2d-81b1-9bad916d81e5", "DetectTime": "2024-05-21T12:25:04.969223+00:00", "EventTime": "2024-05-21T12:25:04.969246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChRSNuByuaZlDDG9"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "befa569b-35b3-43ba-93db-a3576785e2ed", "DetectTime": "2024-05-21T12:25:04.991291+00:00", "EventTime": "2024-05-21T12:25:04.991311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clh8ZJ2y3tK1C628qc"], "accumulated_threat_level": 1.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "4ae02a0c-eb95-4dcf-80a8-64bdb9a82f55", "DetectTime": "2024-05-21T12:25:04.996069+00:00", "EventTime": "2024-05-21T12:25:04.996086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBuVi3sAwuecyOnw6"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "df7d1c50-a447-4730-a9d0-fe66a0082a10", "DetectTime": "2024-05-21T12:25:05.013020+00:00", "EventTime": "2024-05-21T12:25:05.013041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWcCC2G0UHNVXfJo1"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "6665f572-dc49-49bd-85cb-dc91500d4cbf", "DetectTime": "2024-05-21T12:25:05.080814+00:00", "EventTime": "2024-05-21T12:25:05.080831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrLppSQPxEf8RlN1"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "029c68dd-6693-4f99-999a-58d5541d9bf9", "DetectTime": "2024-05-21T12:25:05.142732+00:00", "EventTime": "2024-05-21T12:25:05.142751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvT3gw4WsZ12NaeOUj"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "d164c6cb-1135-46a2-9b25-0620a6176911", "DetectTime": "2024-05-21T12:25:05.155814+00:00", "EventTime": "2024-05-21T12:25:05.155836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8SsQ280y9hqpGcE9"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "bfed7e8f-9ed6-4574-9c7f-1d36cd700fbc", "DetectTime": "2024-05-21T12:25:05.173943+00:00", "EventTime": "2024-05-21T12:25:05.173960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiMBQK1Jzwxb6wXSVb"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "88c2600c-cdf9-4486-a340-b13321ccf2db", "DetectTime": "2024-05-21T12:25:05.202930+00:00", "EventTime": "2024-05-21T12:25:05.202953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4jb4hTRjRQOlgp5"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "043c51ab-5a86-4bf1-a388-7963fbcd2556", "DetectTime": "2024-05-21T12:25:05.237225+00:00", "EventTime": "2024-05-21T12:25:05.237246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CagIkLxCZvjmEjhYh"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "02d698cd-83e9-4fea-b5dd-b668ad9acabb", "DetectTime": "2024-05-21T12:25:05.275531+00:00", "EventTime": "2024-05-21T12:25:05.275552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.90.50.124"]}], "Attach": [{"Content": "Connection to unknown destination port 24606/UDP destination IP 2.90.50.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfYzq2JiSX5LNFxBc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 12} +{"Format": "IDEA0", "ID": "0cc8b8fb-da61-4f68-9f5e-a04afd9d5330", "DetectTime": "2024-05-21T12:25:05.303361+00:00", "EventTime": "2024-05-21T12:25:05.303382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUazX33DxXbr40t4Ab"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "7d7a6bc8-4b1f-4e23-9e1c-de6f43eb0c47", "DetectTime": "2024-05-21T12:25:05.339244+00:00", "EventTime": "2024-05-21T12:25:05.339263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.74.172.39"]}], "Attach": [{"Content": "Connection to unknown destination port 3059/UDP destination IP 108.74.172.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbihMg1ak2cKfxPxef"], "accumulated_threat_level": 3.2, "timewindow": 12} +{"Format": "IDEA0", "ID": "389a109d-13ed-4fa4-b23d-3ffdf359c4b0", "DetectTime": "2024-05-21T12:25:05.354232+00:00", "EventTime": "2024-05-21T12:25:05.354252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.135.135.193"]}], "Attach": [{"Content": "Connection to unknown destination port 29349/UDP destination IP 41.135.135.193. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CudPBZU6KMaIaoLZ9"], "accumulated_threat_level": 4.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "5c36b571-13c1-4b1c-8d13-6e1fc899246f", "DetectTime": "2024-05-21T12:25:05.359202+00:00", "EventTime": "2024-05-21T12:25:05.359220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAAdW2EJeRQJLbhE"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "ff023a6d-c6c9-4bf8-a29d-c28428c2689d", "DetectTime": "2024-05-21T12:25:05.385717+00:00", "EventTime": "2024-05-21T12:25:05.385736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0sBdc3rAe9YwCmxyd"], "accumulated_threat_level": 4.8, "timewindow": 12} +{"Format": "IDEA0", "ID": "2c861b54-95dd-4a3c-8be5-b9e36fbd977c", "DetectTime": "2024-05-21T12:25:05.408970+00:00", "EventTime": "2024-05-21T12:25:05.408990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXSca19nT640LrMQ8"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "9be1a07f-2b71-4b16-a6c9-b82b67264ae4", "DetectTime": "2024-05-21T12:25:05.431026+00:00", "EventTime": "2024-05-21T12:25:05.431045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGg9gW2QWGZs0yAJr2"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "3625b526-c47e-496c-a4ba-02dfc87b5487", "DetectTime": "2024-05-21T12:25:05.736972+00:00", "EventTime": "2024-05-21T12:25:05.736991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fRmo1E7mR5SN4Lue"], "accumulated_threat_level": 0.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "804c0745-1d09-4900-b3a0-83ae3b0fb800", "DetectTime": "2024-05-21T12:25:05.785210+00:00", "EventTime": "2024-05-21T12:25:05.785231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.200.82.4"]}], "Attach": [{"Content": "Connection to unknown destination port 11344/UDP destination IP 41.200.82.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gpbA4I5QVCOpQC4h"], "accumulated_threat_level": 1.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "dff725bd-a942-4fd8-b605-52b3b7f2417a", "DetectTime": "2024-05-21T12:25:05.889621+00:00", "EventTime": "2024-05-21T12:25:05.889641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CELMNO27v9DR0RK8A9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "3f5fbe2d-c2c9-4012-a4d0-9ade3b9cfd32", "DetectTime": "2024-05-21T12:25:05.912796+00:00", "EventTime": "2024-05-21T12:25:05.912816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDw2wwv5TNKGuPkYd"], "accumulated_threat_level": 3.2, "timewindow": 13} +{"Format": "IDEA0", "ID": "d62a9877-7812-4ab7-9c91-1d54dc0db2e5", "DetectTime": "2024-05-21T12:25:05.924535+00:00", "EventTime": "2024-05-21T12:25:05.924556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.96.161.63 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrA5uz1pwarWlSNpma"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e02e1674-ac05-4e78-885f-a550a7d138d7", "DetectTime": "2024-05-21T12:25:06.000132+00:00", "EventTime": "2024-05-21T12:25:06.000152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["91.137.174.85"]}], "Attach": [{"Content": "Connection to unknown destination port 6383/UDP destination IP 91.137.174.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIkam3xyy4fYP79Cc"], "accumulated_threat_level": 4.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "4d023763-738c-4cbd-9612-eb65b5949d29", "DetectTime": "2024-05-21T12:25:06.022148+00:00", "EventTime": "2024-05-21T12:25:06.022165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelCAZ0lJA2BS2f6b"], "accumulated_threat_level": 4.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "fd4972c3-e38e-4c37-9bb4-e61bd406d469", "DetectTime": "2024-05-21T12:25:06.044562+00:00", "EventTime": "2024-05-21T12:25:06.044581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDtCF378PfWcSN0Ye"], "accumulated_threat_level": 5.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "e81f460b-6417-4bce-8113-0ee0af7b7c75", "DetectTime": "2024-05-21T12:25:06.080061+00:00", "EventTime": "2024-05-21T12:25:06.080080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoJm7o1QKbl8WQ76Z2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 13} +{"Format": "IDEA0", "ID": "644f0ed0-60a4-4395-a305-19a0ee9949c8", "DetectTime": "2024-05-21T12:25:06.160147+00:00", "EventTime": "2024-05-21T12:25:06.160168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGttkv3a3vuM0JXeti"], "accumulated_threat_level": 7.199999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "ab9fd181-beaf-4db8-bac9-6e453cc0361b", "DetectTime": "2024-05-21T12:25:06.392755+00:00", "EventTime": "2024-05-21T12:25:06.392779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQd5nfpdOdVHDzvRb"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "1bb9af9b-bdbe-4fc2-97a2-651da9d4c179", "DetectTime": "2024-05-21T12:25:06.453963+00:00", "EventTime": "2024-05-21T12:25:06.453981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cKzSKwnDgn6usr6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "7e7faa27-d8af-4d52-baae-7f6804fbab11", "DetectTime": "2024-05-21T12:25:06.512011+00:00", "EventTime": "2024-05-21T12:25:06.512033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2uA9f2B93okb4kKLk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "8975f234-8963-4f18-8910-9b79107e429c", "DetectTime": "2024-05-21T12:25:06.538753+00:00", "EventTime": "2024-05-21T12:25:06.538774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "Connection to unknown destination port 7057/UDP destination IP 109.193.194.29. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4aNHA6L1WEfKvYel"], "accumulated_threat_level": 9.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "6f3380cd-b6be-46a6-9967-70047e1080a2", "DetectTime": "2024-05-21T12:25:06.571426+00:00", "EventTime": "2024-05-21T12:25:06.571445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2TGSw3lvAejeQHC24"], "accumulated_threat_level": 10.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "4e76d90b-cdb0-492c-aa63-33f188a61795", "DetectTime": "2024-05-21T12:25:06.576246+00:00", "EventTime": "2024-05-21T12:25:06.576264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.247.233.74 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyJtv1uOjBOXMwQPd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "f9c522a7-4c79-462e-8888-5b2729832061", "DetectTime": "2024-05-21T12:25:06.665354+00:00", "EventTime": "2024-05-21T12:25:06.665373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["149.3.4.183"]}], "Attach": [{"Content": "Connection to unknown destination port 21887/UDP destination IP 149.3.4.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSNdx44TQtwrGqQRd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 13} +{"Format": "IDEA0", "ID": "5098a141-fb89-4fe1-a08b-1e18cb236498", "DetectTime": "2024-05-21T12:25:06.670068+00:00", "EventTime": "2024-05-21T12:25:06.670086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwzBCj4lGBUEczGYvd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "3730ad62-3aa2-47c3-9080-5fd9421b6da1", "DetectTime": "2024-05-21T12:25:06.686403+00:00", "EventTime": "2024-05-21T12:25:06.686434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2qMP2ENhBjpb19N5"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "9258a594-4ec3-45d6-9b7b-723e9e85e225", "DetectTime": "2024-05-21T12:25:06.703826+00:00", "EventTime": "2024-05-21T12:25:06.703848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvDNM1dnkUrmELwL7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 13} +{"Format": "Json", "ID": "9258a594-4ec3-45d6-9b7b-723e9e85e225", "DetectTime": "2024-05-21T12:25:06.703826+00:00", "EventTime": "2024-05-21T12:25:06.703848+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"]}], "Attach": [{"Content": "1970-01-01T12:02:12.127623+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2024/05/21 12:25:06.829099)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 13, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "56410797-3967-4b2e-9e55-a73602bcee34", "DetectTime": "2024-05-21T12:25:06.833095+00:00", "EventTime": "2024-05-21T12:25:06.833113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjbn23anWfC514Imd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "bf05430d-9b54-4bc3-92ad-5d91bbd3e024", "DetectTime": "2024-05-21T12:25:06.838214+00:00", "EventTime": "2024-05-21T12:25:06.838234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNZQ13C76lYo9KJsg"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "82bcdb2e-7ae4-4f0c-91bc-115f80a97ed6", "DetectTime": "2024-05-21T12:25:06.842940+00:00", "EventTime": "2024-05-21T12:25:06.842959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CspAZq1Fr658LtCo3l"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "2dac7603-c6e7-4392-b4ba-f3d52837b1e0", "DetectTime": "2024-05-21T12:25:06.847592+00:00", "EventTime": "2024-05-21T12:25:06.847610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAyDzL1k65bhOJVh9a"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "06600855-6f0d-47e9-964f-4cf09b8bae3d", "DetectTime": "2024-05-21T12:25:06.852110+00:00", "EventTime": "2024-05-21T12:25:06.852128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70x5PbtwgMCMR4C5"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "faee5d66-3624-455c-8fb2-482218486fdf", "DetectTime": "2024-05-21T12:25:06.861223+00:00", "EventTime": "2024-05-21T12:25:06.861241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfRW3DQurucKhokf"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "b452da68-c8ea-4c7d-91cb-60825881c8c8", "DetectTime": "2024-05-21T12:25:06.881673+00:00", "EventTime": "2024-05-21T12:25:06.881695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkDyPgxCOh9R6Ej"], "accumulated_threat_level": 0.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "6e2b0576-2791-4bfe-a8a9-dd78c78bd201", "DetectTime": "2024-05-21T12:25:06.900293+00:00", "EventTime": "2024-05-21T12:25:06.900312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7XGT03K8xxkbQivj2"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "d107e967-5f4c-4656-b36e-2e32628d8a65", "DetectTime": "2024-05-21T12:25:06.918147+00:00", "EventTime": "2024-05-21T12:25:06.918164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9QDBs2TO8UD0T7MC3"], "accumulated_threat_level": 1.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "3b5c9985-e165-4d01-a1e4-7592a8405968", "DetectTime": "2024-05-21T12:25:06.988493+00:00", "EventTime": "2024-05-21T12:25:06.988511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTw6N3ZBw9ixwq9W5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "f15b8eb6-fceb-44c9-8472-73449662b485", "DetectTime": "2024-05-21T12:25:07.102062+00:00", "EventTime": "2024-05-21T12:25:07.102087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjYvq3ISUHC7Ua2c"], "accumulated_threat_level": 3.2, "timewindow": 13} +{"Format": "IDEA0", "ID": "824ed5b4-dc22-4072-9b62-76354832599d", "DetectTime": "2024-05-21T12:25:07.115054+00:00", "EventTime": "2024-05-21T12:25:07.115075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSynny3Z9W2o3Fe86g"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "ca519ef2-a113-4d7f-ac67-07948cacbb94", "DetectTime": "2024-05-21T12:25:07.170335+00:00", "EventTime": "2024-05-21T12:25:07.170354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDUqY2wYhPhjxJM24"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "807c0034-3eb6-4324-ad5a-5fe98b8192b1", "DetectTime": "2024-05-21T12:25:07.180224+00:00", "EventTime": "2024-05-21T12:25:07.180243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7vWeT3h2O9MJfnAc9"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "dc7bb083-995f-4e36-8cc3-818ecb0bb80a", "DetectTime": "2024-05-21T12:25:07.200415+00:00", "EventTime": "2024-05-21T12:25:07.200438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZUhc1Ezd8Nli6Uwd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "b0fd836c-b472-4645-80c8-bb582a597885", "DetectTime": "2024-05-21T12:25:07.219661+00:00", "EventTime": "2024-05-21T12:25:07.219681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHiy3SeSx4ZvuTB4"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "0acf5699-3825-4fe7-a0ed-0192c83e0be1", "DetectTime": "2024-05-21T12:25:07.271390+00:00", "EventTime": "2024-05-21T12:25:07.271413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cubqb71WBAVbRJWFg3"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "8326eb06-430b-4e02-be52-309312277a73", "DetectTime": "2024-05-21T12:25:07.290382+00:00", "EventTime": "2024-05-21T12:25:07.290421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrwXk2O6VruETN2Bg"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "61bb6b7d-6927-439a-9416-5ac12c2190cc", "DetectTime": "2024-05-21T12:25:07.323253+00:00", "EventTime": "2024-05-21T12:25:07.323275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccm6elxbWIUP6LQD6"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "ab5d200a-d8e5-4f31-a914-560f69d64ec8", "DetectTime": "2024-05-21T12:25:07.357558+00:00", "EventTime": "2024-05-21T12:25:07.357580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2756toBWzKAEGgP9"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "153d401c-e42d-474c-a19e-3fa52f6dc620", "DetectTime": "2024-05-21T12:25:07.387807+00:00", "EventTime": "2024-05-21T12:25:07.387829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbuw52K1WnMc6kqR7"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "8f315ff7-cb94-4824-b959-5cb18ca705ef", "DetectTime": "2024-05-21T12:25:07.489833+00:00", "EventTime": "2024-05-21T12:25:07.489856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDF8630yOeYNARNsk"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "63a0125c-49d6-468c-8728-287221274cf4", "DetectTime": "2024-05-21T12:25:07.522904+00:00", "EventTime": "2024-05-21T12:25:07.522925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzcN231z9QoB7Dfw7"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "d755c276-af31-4c11-9984-a7a27b015721", "DetectTime": "2024-05-21T12:25:07.540752+00:00", "EventTime": "2024-05-21T12:25:07.540775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjeST2Rgq0R4k9yT4"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "6edff44d-2eac-4ee2-9392-3e879007a66e", "DetectTime": "2024-05-21T12:25:07.572335+00:00", "EventTime": "2024-05-21T12:25:07.572359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8lpdE1RMjIMi8hIjd"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e2dd395d-6745-440c-8b1c-56d9fa8995a4", "DetectTime": "2024-05-21T12:25:07.596270+00:00", "EventTime": "2024-05-21T12:25:07.596294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdoG1w11X4CUbpJ6Ba"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e627d8f2-4999-4600-afc9-3dc2bd166d6d", "DetectTime": "2024-05-21T12:25:07.627263+00:00", "EventTime": "2024-05-21T12:25:07.627283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHn0k3c0XcZHo6Hw5"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "5f519843-ac2d-4013-99d8-6d4aae537314", "DetectTime": "2024-05-21T12:25:07.656746+00:00", "EventTime": "2024-05-21T12:25:07.656765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjWxF37digTCXdLg9"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "7874b5c6-8cef-4cd2-83fc-097f619ddb31", "DetectTime": "2024-05-21T12:25:07.678369+00:00", "EventTime": "2024-05-21T12:25:07.678390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwwln01pAJtRjf6Pq4"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "39a263a1-c124-4d01-b495-3983e8980b6e", "DetectTime": "2024-05-21T12:25:07.694127+00:00", "EventTime": "2024-05-21T12:25:07.694145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAtuH3uU2L9Tmnlf6"], "accumulated_threat_level": 4.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "ce7c8496-ac51-406c-8572-00bd7cb8b1d7", "DetectTime": "2024-05-21T12:25:07.710419+00:00", "EventTime": "2024-05-21T12:25:07.710441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6A90f2eAEs2HzpyE7"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "695dcf14-9bd4-4e69-be55-3dcd11291112", "DetectTime": "2024-05-21T12:25:07.733474+00:00", "EventTime": "2024-05-21T12:25:07.733495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqfRC13CKsVDWwkrN3"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "86407c4d-50fb-456a-aa69-ec7a35df6cb8", "DetectTime": "2024-05-21T12:25:07.764796+00:00", "EventTime": "2024-05-21T12:25:07.764818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlw0k3aJENy46i12b"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "37d0a1fb-8625-4ded-abee-181185037719", "DetectTime": "2024-05-21T12:25:07.785718+00:00", "EventTime": "2024-05-21T12:25:07.785741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pbuR10srZbcz8Rh6"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "f9d259ae-df09-4345-b7a1-abc3bdf0f52d", "DetectTime": "2024-05-21T12:25:07.820282+00:00", "EventTime": "2024-05-21T12:25:07.820302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaYyLLdhxaXKihEj"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "97cbc118-f089-4f15-8bff-4b05c3929e3a", "DetectTime": "2024-05-21T12:25:07.850654+00:00", "EventTime": "2024-05-21T12:25:07.850676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5udM2cQjsSA1TgG1"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "17856cf1-f3a8-4df8-bf63-a24ceb971da1", "DetectTime": "2024-05-21T12:25:07.873828+00:00", "EventTime": "2024-05-21T12:25:07.873846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShqTd3FCWxWmfht5e"], "accumulated_threat_level": 4.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "cdd8018f-7985-4d0b-a844-1e7eefe5efdc", "DetectTime": "2024-05-21T12:25:08.115269+00:00", "EventTime": "2024-05-21T12:25:08.115293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChUGY43T15ZsKdjDv8"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "c703384c-4bb7-492c-bd2c-6edfc148e0b4", "DetectTime": "2024-05-21T12:25:08.139871+00:00", "EventTime": "2024-05-21T12:25:08.139894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zQUI1cjtwqrHQJHb"], "accumulated_threat_level": 3.7, "timewindow": 10} +{"Format": "IDEA0", "ID": "e21d31f3-9605-4d41-ad6e-9852e3e41665", "DetectTime": "2024-05-21T12:25:08.263901+00:00", "EventTime": "2024-05-21T12:25:08.263923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu44MZVWSqpU55l5l"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "9306dc74-455d-4808-867f-d26093a23318", "DetectTime": "2024-05-21T12:25:08.323014+00:00", "EventTime": "2024-05-21T12:25:08.323033+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.242.248.65"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS99422z3WXXuWtVcd"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "0e372d30-9225-4fc2-b399-9f7725349884", "DetectTime": "2024-05-21T12:25:08.334121+00:00", "EventTime": "2024-05-21T12:25:08.334140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.242.248.65"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.242.248.65 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS99422z3WXXuWtVcd"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "4d389a72-fe0e-4c83-bd6b-a1d826e1deb8", "DetectTime": "2024-05-21T12:25:08.359688+00:00", "EventTime": "2024-05-21T12:25:08.359707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNCGGn22qhw9GVk2"], "accumulated_threat_level": 5.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "255dce13-2c9d-4c5e-8aff-e688be13960d", "DetectTime": "2024-05-21T12:25:08.385570+00:00", "EventTime": "2024-05-21T12:25:08.385588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHhsOr2172UxkjAiOc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 13} +{"Format": "IDEA0", "ID": "5659aa4b-66a1-4b81-ae20-82a87cc22c37", "DetectTime": "2024-05-21T12:25:08.448019+00:00", "EventTime": "2024-05-21T12:25:08.448038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4q5E4RYXnKwp30i5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "4e1ea9c7-3c79-4b3b-9aab-0e82b16a1f08", "DetectTime": "2024-05-21T12:25:08.482129+00:00", "EventTime": "2024-05-21T12:25:08.482147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTaza4ypUHDLOwG1a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "84d00031-e904-4f08-b5fb-93dc747ea344", "DetectTime": "2024-05-21T12:25:08.505042+00:00", "EventTime": "2024-05-21T12:25:08.505061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAGhJ13OOSqHV7PPg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "8827ae9c-2695-4fb6-997b-b6dea42e48c0", "DetectTime": "2024-05-21T12:25:08.538264+00:00", "EventTime": "2024-05-21T12:25:08.538281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vt173I4veiT1Q0Ye"], "accumulated_threat_level": 9.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "30021904-542f-419a-8b3a-18adab62fed9", "DetectTime": "2024-05-21T12:25:08.559488+00:00", "EventTime": "2024-05-21T12:25:08.559509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuwJt42MCBbhXLVb5k"], "accumulated_threat_level": 10.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "224fcfef-1bff-43a9-8afe-ed939db3b7d7", "DetectTime": "2024-05-21T12:25:08.595354+00:00", "EventTime": "2024-05-21T12:25:08.595384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUf8z4URFie0T4Zgd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 13} +{"Format": "IDEA0", "ID": "66258a1c-75a9-4d31-8259-d66cf84be80a", "DetectTime": "2024-05-21T12:25:08.675515+00:00", "EventTime": "2024-05-21T12:25:08.675536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjP3BF4VxVfGMgifN"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "7edbf228-4101-4a80-94b9-0aa55b39a4a1", "DetectTime": "2024-05-21T12:25:08.702183+00:00", "EventTime": "2024-05-21T12:25:08.702201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWCDtS1paSlfsBheOi"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "16faeaec-1dec-414f-b5dc-50467d0f680c", "DetectTime": "2024-05-21T12:25:08.727668+00:00", "EventTime": "2024-05-21T12:25:08.727689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8IcD3E5v1JmcMZH3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "35d1c389-ad61-441b-b539-80bd049e698a", "DetectTime": "2024-05-21T12:25:08.749589+00:00", "EventTime": "2024-05-21T12:25:08.749608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXY4x4OKaka0oGk8h"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "d91e95f3-11a8-4b08-965b-7421bff7e900", "DetectTime": "2024-05-21T12:25:08.780191+00:00", "EventTime": "2024-05-21T12:25:08.780213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtVuST0ij4Odq1z"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "d66ffc1e-6f47-4bcd-a96b-655a4318af2a", "DetectTime": "2024-05-21T12:25:08.803553+00:00", "EventTime": "2024-05-21T12:25:08.803575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSeob3Imkm2XSOXDi"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ff0d0633-2c35-4372-89e0-2a9f6b268599", "DetectTime": "2024-05-21T12:25:08.836477+00:00", "EventTime": "2024-05-21T12:25:08.836497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8osAI2mXUflv86A13"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "b52a3255-f0db-45dd-a508-00537ed17a46", "DetectTime": "2024-05-21T12:25:08.851654+00:00", "EventTime": "2024-05-21T12:25:08.851673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7yOq2TIP6otX2w4j"], "accumulated_threat_level": 12.000000000000002, "timewindow": 13} +{"Format": "Json", "ID": "b52a3255-f0db-45dd-a508-00537ed17a46", "DetectTime": "2024-05-21T12:25:08.851654+00:00", "EventTime": "2024-05-21T12:25:08.851673+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "1970-01-01T12:35:02.844493+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2024/05/21 12:25:08.986639)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 13, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4f26341f-0ddc-4b7a-88ea-3b9844c369b1", "DetectTime": "2024-05-21T12:25:08.990749+00:00", "EventTime": "2024-05-21T12:25:08.990766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxBfJPDRyJJSxTOf"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "c56cedc0-9ed2-4eeb-8923-b806e5213860", "DetectTime": "2024-05-21T12:25:08.995039+00:00", "EventTime": "2024-05-21T12:25:08.995057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9doDW2GbE1S6X9rz9"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "2fc9da13-842b-40de-bc55-c2e1c1a673c0", "DetectTime": "2024-05-21T12:25:09.005255+00:00", "EventTime": "2024-05-21T12:25:09.005272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COvV3U1OSrJYnwm0th"], "accumulated_threat_level": 0.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "41e9aea9-08a5-422d-a38e-a39addc08687", "DetectTime": "2024-05-21T12:25:09.009951+00:00", "EventTime": "2024-05-21T12:25:09.009977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQibC17pxpiOEQQ27"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "e1def179-4856-4d31-abe0-f50dac626159", "DetectTime": "2024-05-21T12:25:09.020827+00:00", "EventTime": "2024-05-21T12:25:09.020846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vdfh3HEHOGstYSM4"], "accumulated_threat_level": 1.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "e3fe69ca-91b9-420f-9b67-bef58caea3b1", "DetectTime": "2024-05-21T12:25:09.025631+00:00", "EventTime": "2024-05-21T12:25:09.025649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsGJya3Ko0qrRuiS8"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "37ccc403-49e5-43cb-939b-36958d3abdea", "DetectTime": "2024-05-21T12:25:09.030320+00:00", "EventTime": "2024-05-21T12:25:09.030338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS3QMd4WK9zRpWepQ7"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "c1c91a4e-095d-498f-85ee-3f676940e60c", "DetectTime": "2024-05-21T12:25:09.034711+00:00", "EventTime": "2024-05-21T12:25:09.034729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJYa4UqVQWY6LP49"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "6ecd778b-fbf3-496b-b057-ddf4e2d75e22", "DetectTime": "2024-05-21T12:25:09.046275+00:00", "EventTime": "2024-05-21T12:25:09.046293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CliC2y4hirAOHzdegj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "107076b8-bf32-443c-9d79-7cfbdbfa493c", "DetectTime": "2024-05-21T12:25:09.056588+00:00", "EventTime": "2024-05-21T12:25:09.056606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCal8h3eCyGdhy0sw7"], "accumulated_threat_level": 3.2, "timewindow": 13} +{"Format": "IDEA0", "ID": "40b2cdc0-8cad-4225-9dab-e8bd66d3da1f", "DetectTime": "2024-05-21T12:25:09.060909+00:00", "EventTime": "2024-05-21T12:25:09.060926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qprc2sAeWW5U7fg3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "de992eba-a1d1-41d3-a7d1-841f910d4616", "DetectTime": "2024-05-21T12:25:09.070490+00:00", "EventTime": "2024-05-21T12:25:09.070508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdfgMG2AgtA68XS2J5"], "accumulated_threat_level": 4.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "228216e0-b92c-460a-a48e-0fe846edd7a0", "DetectTime": "2024-05-21T12:25:09.082020+00:00", "EventTime": "2024-05-21T12:25:09.082039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU44XVOURbMMgxA1"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "7117f8e0-835a-488d-accd-233e77326728", "DetectTime": "2024-05-21T12:25:09.104603+00:00", "EventTime": "2024-05-21T12:25:09.104623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFDqe3uujXhBq7O49"], "accumulated_threat_level": 4.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "92f8ea65-2b98-4921-9086-defb886ee3e4", "DetectTime": "2024-05-21T12:25:09.183693+00:00", "EventTime": "2024-05-21T12:25:09.183715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdTGp3TVHBXLRxbC"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "4400d3cb-d260-48ff-96c4-27e63dd57c70", "DetectTime": "2024-05-21T12:25:09.203728+00:00", "EventTime": "2024-05-21T12:25:09.203750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLEHv1icEqNy28tZi"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "95bbe072-3c31-4845-ae0f-cd37eec53a79", "DetectTime": "2024-05-21T12:25:09.234257+00:00", "EventTime": "2024-05-21T12:25:09.234279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLha2z3xHnKc7pWfif"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "d649b9d9-51c3-45fb-b1ea-832dec21c2ae", "DetectTime": "2024-05-21T12:25:09.277655+00:00", "EventTime": "2024-05-21T12:25:09.277676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvazILwGOStlsgx5", "C8BUCe2vNctZEg2Bp7", "CvG2vS3rm5lJay3RYd", "Cu27Fhrq9DWASArDj"], "accumulated_threat_level": 5.3, "timewindow": 13} +{"Format": "IDEA0", "ID": "a367d7bc-e046-43e1-8cf7-10495eae4753", "DetectTime": "2024-05-21T12:25:09.285450+00:00", "EventTime": "2024-05-21T12:25:09.285470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcmWti3jjUAU85Fy12"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "52510283-14c5-4eb6-9f55-9de711c22822", "DetectTime": "2024-05-21T12:25:09.314479+00:00", "EventTime": "2024-05-21T12:25:09.314507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIGp4S1CNKwNEbcLt"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "3bdaedeb-0031-41b4-940f-2f332c6604d3", "DetectTime": "2024-05-21T12:25:09.335565+00:00", "EventTime": "2024-05-21T12:25:09.335584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviVA03PJr9R9uwjs"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "25a1ff36-980f-49b2-aee7-5a1c00f8a576", "DetectTime": "2024-05-21T12:25:09.372886+00:00", "EventTime": "2024-05-21T12:25:09.372912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZjXA3jDqDnzBe7u5"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ee2fb346-515e-4303-b688-210f2efafb6a", "DetectTime": "2024-05-21T12:25:09.462158+00:00", "EventTime": "2024-05-21T12:25:09.462177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPYkZtvO6CSynrPej"], "accumulated_threat_level": 6.1, "timewindow": 13} +{"Format": "IDEA0", "ID": "fe670c8a-e05e-4665-8492-79cdd1976d63", "DetectTime": "2024-05-21T12:25:09.495654+00:00", "EventTime": "2024-05-21T12:25:09.495674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9x2c3YdWYYoGppy5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 13} +{"Format": "IDEA0", "ID": "a79594ec-09ab-4cf3-aed1-1ac07f51fdb3", "DetectTime": "2024-05-21T12:25:09.563895+00:00", "EventTime": "2024-05-21T12:25:09.563915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtMIAor2fYj8uvGi"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "288c8158-2bfb-457a-82b6-8b85b292cddd", "DetectTime": "2024-05-21T12:25:09.620423+00:00", "EventTime": "2024-05-21T12:25:09.620442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3av3d2jTrP7W2jWZf"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "06eb31e9-d948-43b9-b8a8-4eaec1ba0237", "DetectTime": "2024-05-21T12:25:09.797963+00:00", "EventTime": "2024-05-21T12:25:09.797984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHc7T2Qe3QrlHjFYd"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "65c40f46-31bd-4183-84b1-91992df9d6da", "DetectTime": "2024-05-21T12:25:09.910169+00:00", "EventTime": "2024-05-21T12:25:09.910187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIQW1indzSTuVUCe"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "273c50a6-3330-43ce-900e-4f0edbe3d22c", "DetectTime": "2024-05-21T12:25:09.927407+00:00", "EventTime": "2024-05-21T12:25:09.927428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YvaU2tM5CkCjrhJ3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ed73cbb1-c155-4ffb-8099-7c679f978dd1", "DetectTime": "2024-05-21T12:25:09.963394+00:00", "EventTime": "2024-05-21T12:25:09.963416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziMFh34WlJP0YpS3i"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "75c5ba23-9646-4310-937e-cb8904e54d6c", "DetectTime": "2024-05-21T12:25:09.983985+00:00", "EventTime": "2024-05-21T12:25:09.984009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjW5Vf4rPITcXb7Qqf"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "73236998-2601-4be3-a20b-7acffc51334f", "DetectTime": "2024-05-21T12:25:10.018705+00:00", "EventTime": "2024-05-21T12:25:10.018726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEvXe46cJ9yubP0Sh"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "f80e5c04-4ad1-4066-b491-48a563ab2caa", "DetectTime": "2024-05-21T12:25:10.042729+00:00", "EventTime": "2024-05-21T12:25:10.042752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnx4nH3K1p5Su80qod"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "c6f0f8ee-97f5-4dd3-899e-a1a7685ea7d2", "DetectTime": "2024-05-21T12:25:10.066358+00:00", "EventTime": "2024-05-21T12:25:10.066378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf4TNV2fL8Y8M1kFb7"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "a9c4df75-5a33-4331-bf10-d83e59438d88", "DetectTime": "2024-05-21T12:25:10.095414+00:00", "EventTime": "2024-05-21T12:25:10.095434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdPdhrB09rYwJYgb"], "accumulated_threat_level": 7.699999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "366ca6b9-cc64-4b30-875a-803243f623c7", "DetectTime": "2024-05-21T12:25:10.152949+00:00", "EventTime": "2024-05-21T12:25:10.152968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UJQf3jwFvwhC8gP9"], "accumulated_threat_level": 8.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "b3dddf40-6457-47a9-8675-4f961b210b42", "DetectTime": "2024-05-21T12:25:10.176807+00:00", "EventTime": "2024-05-21T12:25:10.176825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGud003zKmjvVxvPR2"], "accumulated_threat_level": 9.3, "timewindow": 13} +{"Format": "IDEA0", "ID": "58df4cc0-a535-476d-972c-d6e149e3edb1", "DetectTime": "2024-05-21T12:25:10.245091+00:00", "EventTime": "2024-05-21T12:25:10.245117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PPJL16UQwplFE28d"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "454665bb-7543-4317-b2bc-bfad3c086725", "DetectTime": "2024-05-21T12:25:10.264486+00:00", "EventTime": "2024-05-21T12:25:10.264508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOmwQ3ZIyjy0pdEuf"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "60b629ce-3259-4973-9c36-62ccb65a239b", "DetectTime": "2024-05-21T12:25:10.306179+00:00", "EventTime": "2024-05-21T12:25:10.306197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSluE74mWVMBCH2dIa"], "accumulated_threat_level": 10.100000000000001, "timewindow": 13} +{"Format": "IDEA0", "ID": "e6cafbce-305f-4231-9df4-a3dcee59efed", "DetectTime": "2024-05-21T12:25:10.340381+00:00", "EventTime": "2024-05-21T12:25:10.340401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4OzBv15S9V2C4GlE4", "C5ZmAb3Dl3DHTHJjbf", "CcGjgr3g6PF08aNi1f", "CtitEc3p4zlLAUjf"], "accumulated_threat_level": 10.600000000000001, "timewindow": 13} +{"Format": "IDEA0", "ID": "2c24be7d-507e-4c96-bbad-90efe5f0ef74", "DetectTime": "2024-05-21T12:25:10.390789+00:00", "EventTime": "2024-05-21T12:25:10.390808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2KdO2PktEyqbJaA3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "63726747-7dfc-4bff-9318-2e66fbf73ac0", "DetectTime": "2024-05-21T12:25:10.465851+00:00", "EventTime": "2024-05-21T12:25:10.465869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdMcj3GpJQuLqlJD6"], "accumulated_threat_level": 11.400000000000002, "timewindow": 13} +{"Format": "IDEA0", "ID": "87256c03-4159-4298-b518-6bad4ac05333", "DetectTime": "2024-05-21T12:25:10.490706+00:00", "EventTime": "2024-05-21T12:25:10.490724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTfnB76CG2ETwDi2"], "accumulated_threat_level": 12.200000000000003, "timewindow": 13} +{"Format": "Json", "ID": "87256c03-4159-4298-b518-6bad4ac05333", "DetectTime": "2024-05-21T12:25:10.490706+00:00", "EventTime": "2024-05-21T12:25:10.490724+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "1970-01-01T12:36:23.838142+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2024/05/21 12:25:10.739967)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 13, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "52c90586-9d31-40cc-9738-0e636b012cf1", "DetectTime": "2024-05-21T12:25:10.757311+00:00", "EventTime": "2024-05-21T12:25:10.757345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.72.103.199 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLEdfs4Nr3nux89hn3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "24b5a813-61a4-4c73-9ae4-0f156a7ee0df", "DetectTime": "2024-05-21T12:25:10.912589+00:00", "EventTime": "2024-05-21T12:25:10.912609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYfa62G53DX52iVz6"], "accumulated_threat_level": 0.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "46ca4bda-66ae-4bdb-aa58-69bbd89ac6e5", "DetectTime": "2024-05-21T12:25:10.947457+00:00", "EventTime": "2024-05-21T12:25:10.947475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRLN773FOZkBXVVDZj"], "accumulated_threat_level": 1.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "46714bde-a573-406e-a805-4eff385ea602", "DetectTime": "2024-05-21T12:25:11.009644+00:00", "EventTime": "2024-05-21T12:25:11.009664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Uz1gZblYcdpLFr"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "59e71952-a1bc-46fb-b658-31147b6aaa5b", "DetectTime": "2024-05-21T12:25:11.014725+00:00", "EventTime": "2024-05-21T12:25:11.014744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.248.65 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS99422z3WXXuWtVcd"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "31922211-e7c1-44aa-84f7-04b5c452108e", "DetectTime": "2024-05-21T12:25:11.215384+00:00", "EventTime": "2024-05-21T12:25:11.215405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.24.79.246 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuh46A1YHKKlPskF4a"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "57472a53-e766-4d74-a92d-d38854d4d0d2", "DetectTime": "2024-05-21T12:25:11.325579+00:00", "EventTime": "2024-05-21T12:25:11.325597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZsyV1f51pBUpSOw7"], "accumulated_threat_level": 3.2, "timewindow": 13} +{"Format": "IDEA0", "ID": "73123d2e-69ed-4d20-9a4d-d751d51cec19", "DetectTime": "2024-05-21T12:25:11.349245+00:00", "EventTime": "2024-05-21T12:25:11.349262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMKXW30mQLAuQbWP1"], "accumulated_threat_level": 4.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "27f84534-2a35-4353-b8fa-dd2bd078dbb5", "DetectTime": "2024-05-21T12:25:11.433389+00:00", "EventTime": "2024-05-21T12:25:11.433409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbg4dm4iX3ta7WUiE9"], "accumulated_threat_level": 4.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "1514ac22-8999-4bb9-880f-05f5ceb4703a", "DetectTime": "2024-05-21T12:25:11.438348+00:00", "EventTime": "2024-05-21T12:25:11.438366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 222.124.64.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD4DyU1kjV9w01PfMl"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "3afc7a5e-20b9-47d1-9a04-a07007b56134", "DetectTime": "2024-05-21T12:25:11.464106+00:00", "EventTime": "2024-05-21T12:25:11.464124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwy3Z3Cvgx8RVip27"], "accumulated_threat_level": 5.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "340bba9a-c5b2-4fa5-a3cf-5a616b672ef1", "DetectTime": "2024-05-21T12:25:11.485589+00:00", "EventTime": "2024-05-21T12:25:11.485609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJI6b1y0vB1THdB72"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 13} +{"Format": "IDEA0", "ID": "9cf02a36-0ec8-4105-b3e3-7ebd1fd0e8f8", "DetectTime": "2024-05-21T12:25:11.520297+00:00", "EventTime": "2024-05-21T12:25:11.520315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3Qp02r5N17IzmwB1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "7e26f01d-65ca-4eb1-b18b-3f545b5fbe64", "DetectTime": "2024-05-21T12:25:11.546613+00:00", "EventTime": "2024-05-21T12:25:11.546632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgo2g3JVPxdmyiOnd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "59cecbca-9639-472a-bc63-8297f72c4015", "DetectTime": "2024-05-21T12:25:11.564510+00:00", "EventTime": "2024-05-21T12:25:11.564530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzWto47Rcb0jBdbhd"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ac863b59-7632-45f7-8e30-598c5aa0111e", "DetectTime": "2024-05-21T12:25:11.583650+00:00", "EventTime": "2024-05-21T12:25:11.583668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeOMsZ3YSvANTzRiL9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 13} +{"Format": "IDEA0", "ID": "630aeda4-e71b-482e-8b09-d3a5f4a93942", "DetectTime": "2024-05-21T12:25:11.606572+00:00", "EventTime": "2024-05-21T12:25:11.606593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EVzB3GVlVAunhLW1"], "accumulated_threat_level": 9.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "9d4d27d9-746c-43f8-b141-1c278bce2045", "DetectTime": "2024-05-21T12:25:11.641053+00:00", "EventTime": "2024-05-21T12:25:11.641073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzJxj4I3Mqofv1Ia3"], "accumulated_threat_level": 10.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "19ec1ade-e3f4-4460-bee8-987124f9d528", "DetectTime": "2024-05-21T12:25:11.677803+00:00", "EventTime": "2024-05-21T12:25:11.677820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1L6i1E5e3Eg4Bfsh"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "0c74deed-45f5-4905-a01e-a74b8fb8351e", "DetectTime": "2024-05-21T12:25:11.711068+00:00", "EventTime": "2024-05-21T12:25:11.711088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Sm0L2X5p3Ajeamtb"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "315eb08a-6d8d-49ae-bfce-d3363d012ad7", "DetectTime": "2024-05-21T12:25:11.727935+00:00", "EventTime": "2024-05-21T12:25:11.727958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPKFEq5mwGLIXqmd"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "7ac96ce1-5317-4abc-9c91-afd6cbe8c45c", "DetectTime": "2024-05-21T12:25:11.764087+00:00", "EventTime": "2024-05-21T12:25:11.764106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU0fu0nUFuKTW6S3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 13} +{"Format": "IDEA0", "ID": "44fa4fb7-03a4-4223-9705-d1dc96558a56", "DetectTime": "2024-05-21T12:25:11.803043+00:00", "EventTime": "2024-05-21T12:25:11.803065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHB1eRxbv2qdmgPM"], "accumulated_threat_level": 12.000000000000002, "timewindow": 13} +{"Format": "Json", "ID": "44fa4fb7-03a4-4223-9705-d1dc96558a56", "DetectTime": "2024-05-21T12:25:11.803043+00:00", "EventTime": "2024-05-21T12:25:11.803065+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "1970-01-01T12:37:59.444476+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2024/05/21 12:25:12.002188)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 13, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e7c2e10c-4cf0-43de-bb7b-d211619f6a16", "DetectTime": "2024-05-21T12:25:12.012073+00:00", "EventTime": "2024-05-21T12:25:12.012090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihGev3pXdzzWxnNul"], "accumulated_threat_level": 0.8, "timewindow": 13} +{"Format": "IDEA0", "ID": "b00be06f-c1ed-4613-bb52-03862f59cbdd", "DetectTime": "2024-05-21T12:25:12.021527+00:00", "EventTime": "2024-05-21T12:25:12.021545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgq1PB3l5yqC9kyAC"], "accumulated_threat_level": 1.6, "timewindow": 13} +{"Format": "IDEA0", "ID": "e8651709-4ed5-4432-a125-9fd08470fc36", "DetectTime": "2024-05-21T12:25:12.031394+00:00", "EventTime": "2024-05-21T12:25:12.031412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtIhW1ojuEdLPMPpl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "a01bbb67-ef50-4790-8877-b65723effb60", "DetectTime": "2024-05-21T12:25:12.113169+00:00", "EventTime": "2024-05-21T12:25:12.113187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXvyG4MdiVadJiq98"], "accumulated_threat_level": 0.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "6824de0b-1b15-45d9-b6d6-c3e650ff62f3", "DetectTime": "2024-05-21T12:25:12.125616+00:00", "EventTime": "2024-05-21T12:25:12.125635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTzdMAqAjCj4vfb"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "e3ab5ad1-9e9d-4fd6-a280-ae7ae7e9587b", "DetectTime": "2024-05-21T12:25:12.262696+00:00", "EventTime": "2024-05-21T12:25:12.262713+00:00", "Category": ["Anomaly.File"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["ExecutableMIMEType"]}], "Attach": [{"Content": "Download of an executable with MIME type: ['application/x-dosexec'] by 10.0.2.19 from 184.154.224.18 . threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIyai1ViLWCHiQOu"], "accumulated_threat_level": 1.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "9fd56f8e-1bda-4878-8e85-f014d07f55e4", "DetectTime": "2024-05-21T12:25:12.280541+00:00", "EventTime": "2024-05-21T12:25:12.280560+00:00", "Category": ["Anomaly.File"], "Confidence": 1, "Source": [{"IP4": ["184.154.224.18"], "Type": ["ExecutableMIMEType"]}], "Attach": [{"Content": "Download of an executable with MIME type: ['application/x-dosexec'] by 10.0.2.19 from 184.154.224.18 . threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIyai1ViLWCHiQOu"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ecf2fa8e-6041-44c3-87c1-0b89ca4292d8", "DetectTime": "2024-05-21T12:25:12.292192+00:00", "EventTime": "2024-05-21T12:25:12.292214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"], "Type": ["SendingUnencryptedData"]}], "Target": [{"IP4": ["184.154.224.18"]}], "Attach": [{"Content": "Unencrypted HTTP traffic from 10.0.2.19 to 184.154.224.18. threat level: low.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIyai1ViLWCHiQOu"], "accumulated_threat_level": 1.2, "timewindow": 14} +{"Format": "IDEA0", "ID": "56c3cdb3-b865-4d5e-ac5c-d8fa1ec7205a", "DetectTime": "2024-05-21T12:25:12.305970+00:00", "EventTime": "2024-05-21T12:25:12.305989+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.24.79.246"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuh46A1YHKKlPskF4a"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "e9ae7052-b470-4cd4-9a40-17c0ed0c8abb", "DetectTime": "2024-05-21T12:25:12.317131+00:00", "EventTime": "2024-05-21T12:25:12.317150+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.24.79.246"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.24.79.246 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuh46A1YHKKlPskF4a"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "4ad1a1a5-45db-4587-be11-940de13d32d4", "DetectTime": "2024-05-21T12:25:12.351938+00:00", "EventTime": "2024-05-21T12:25:12.351959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV70iw2BOLLlPhJ1Sg"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "eb8a9b6a-92f5-4b57-8d02-0e42a35be082", "DetectTime": "2024-05-21T12:25:12.367515+00:00", "EventTime": "2024-05-21T12:25:12.367533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxeaVwSoXgsPOhUI7"], "accumulated_threat_level": 2.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1319bc23-2cb5-4a73-a50a-419ee4d43afa", "DetectTime": "2024-05-21T12:25:12.472586+00:00", "EventTime": "2024-05-21T12:25:12.472609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanzBa38cFBwLlkRBe"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "777fe4db-34c8-43b1-9906-90058e24d9d1", "DetectTime": "2024-05-21T12:25:12.491686+00:00", "EventTime": "2024-05-21T12:25:12.491708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxJzh39uLGTsLtDye"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "e2554c4f-903e-440f-8ce0-4253b15104f6", "DetectTime": "2024-05-21T12:25:12.510695+00:00", "EventTime": "2024-05-21T12:25:12.510718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COw35i2V7RNbKRs8N9"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ac24dbe2-bde5-4519-bfa1-17e8caab3a00", "DetectTime": "2024-05-21T12:25:12.678330+00:00", "EventTime": "2024-05-21T12:25:12.678352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxntGb10l0uERorOEl"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ee95a6db-6150-4e6f-81b9-a4d70280ca6d", "DetectTime": "2024-05-21T12:25:12.710897+00:00", "EventTime": "2024-05-21T12:25:12.710915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOWeT34hFvInrlhK1"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "dc658bfa-da41-493f-a5b5-a5ee044ae16b", "DetectTime": "2024-05-21T12:25:12.770809+00:00", "EventTime": "2024-05-21T12:25:12.770829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CACVwo1bBCqU6FEJne"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "f20aed7b-87b9-4076-9a93-fdf07e771613", "DetectTime": "2024-05-21T12:25:12.785622+00:00", "EventTime": "2024-05-21T12:25:12.785643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxn3ri1MSqYPHSSAi"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "b42b61b6-ce28-40b5-b3c7-1b47b96943b8", "DetectTime": "2024-05-21T12:25:12.801731+00:00", "EventTime": "2024-05-21T12:25:12.801752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFYjKgwsDaj9HFrb"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "94ca89b0-de77-47a0-97ef-b15ad1c2ac22", "DetectTime": "2024-05-21T12:25:12.818935+00:00", "EventTime": "2024-05-21T12:25:12.818956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTYXh18dAhZfjsvp3"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "75abb9d2-241a-4cc2-a442-cbc8637d8575", "DetectTime": "2024-05-21T12:25:12.853643+00:00", "EventTime": "2024-05-21T12:25:12.853663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKi3Q3Y2QOybmu5R4"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "3a120cfc-c10e-4111-8577-2bdef311453b", "DetectTime": "2024-05-21T12:25:12.886244+00:00", "EventTime": "2024-05-21T12:25:12.886265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFOFHr2sBWHkl6nyx1"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "1b1c2aab-8991-4c6b-838a-f9cf3ea30243", "DetectTime": "2024-05-21T12:25:12.910288+00:00", "EventTime": "2024-05-21T12:25:12.910309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJnyEw2Vq4YGMt1Q6l"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "1ce2565d-9586-4f30-8326-aa7654a82727", "DetectTime": "2024-05-21T12:25:12.927678+00:00", "EventTime": "2024-05-21T12:25:12.927700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPzavd2cGOQvocqQC"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "e0180906-fff4-449a-9d18-9a1a70c3f421", "DetectTime": "2024-05-21T12:25:12.963791+00:00", "EventTime": "2024-05-21T12:25:12.963812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwFdj4sUvO6Oaor2e"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "550a8f37-c401-4d1c-9213-3a228d424e43", "DetectTime": "2024-05-21T12:25:13.035581+00:00", "EventTime": "2024-05-21T12:25:13.035606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw4GNpM0K3m70p2d9", "CzwStD4SuZrF8kUwab", "CneGTpJsK2IB6vf54", "CYO9Zc4cZ8yGrjVVQf"], "accumulated_threat_level": 2.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "c4a7105c-e7aa-4478-bc47-b076b8e1ce2a", "DetectTime": "2024-05-21T12:25:13.160827+00:00", "EventTime": "2024-05-21T12:25:13.160852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPKWe4CumhjSHvAC8"], "accumulated_threat_level": 3.3, "timewindow": 14} +{"Format": "IDEA0", "ID": "5e3474d5-cd43-4cfd-b331-3a8bd7ebfec7", "DetectTime": "2024-05-21T12:25:13.222305+00:00", "EventTime": "2024-05-21T12:25:13.222327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8gl1N3kQXy1sE9kJ3"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "6b9cd846-d681-4c84-adb9-f5871c0f8dc0", "DetectTime": "2024-05-21T12:25:13.250600+00:00", "EventTime": "2024-05-21T12:25:13.250623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN4M7e1fimq3gHUqTd"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "b15632c9-5b94-4a2d-81b1-dfceabc3b2ed", "DetectTime": "2024-05-21T12:25:13.276347+00:00", "EventTime": "2024-05-21T12:25:13.276368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmLUTurQVuvEgq7Dd"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "bb590a47-b04b-4453-baf5-fe2737c6d8f8", "DetectTime": "2024-05-21T12:25:13.334337+00:00", "EventTime": "2024-05-21T12:25:13.334359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBWBxG1aYFRNX7dGaj"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "e9128125-bdbd-42ba-9719-dd7a588017d7", "DetectTime": "2024-05-21T12:25:13.402218+00:00", "EventTime": "2024-05-21T12:25:13.402239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD2Zh3xw0ujqOap0k"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "27891cd5-bda3-4d5a-816e-841bf98d0d41", "DetectTime": "2024-05-21T12:25:13.438690+00:00", "EventTime": "2024-05-21T12:25:13.438707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTx8i21onfQtmSoGTg"], "accumulated_threat_level": 4.1, "timewindow": 14} +{"Format": "IDEA0", "ID": "09867956-498b-4ac9-a800-41eb65d0a7a1", "DetectTime": "2024-05-21T12:25:13.450118+00:00", "EventTime": "2024-05-21T12:25:13.450137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csf3l72Ao8Gx5vKAAj"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "942c9595-b1e5-4b8b-b56a-247924af0c6c", "DetectTime": "2024-05-21T12:25:13.467314+00:00", "EventTime": "2024-05-21T12:25:13.467331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChV58r3anDVCIELKM"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "b58422e3-3dee-46e0-9372-41fbed29a11f", "DetectTime": "2024-05-21T12:25:13.512346+00:00", "EventTime": "2024-05-21T12:25:13.512366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftTgH2S1oi7w5aNHh"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "2e44fb6d-013b-46a4-aa6c-d1c076126839", "DetectTime": "2024-05-21T12:25:13.544869+00:00", "EventTime": "2024-05-21T12:25:13.544889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT1ho3t5ejJgusDY1"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "ee3e5adf-7a28-49c2-8c80-5ada99538910", "DetectTime": "2024-05-21T12:25:13.567690+00:00", "EventTime": "2024-05-21T12:25:13.567710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2IDw3JbyAhVerfJ"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 11} +{"Format": "IDEA0", "ID": "628402a2-c910-40f3-b13d-cbf55e3ee5a0", "DetectTime": "2024-05-21T12:25:13.683835+00:00", "EventTime": "2024-05-21T12:25:13.683853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHurs8VU4lVdtKDg7"], "accumulated_threat_level": 4.8999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "e9208091-0206-4190-96e3-1671bb2f9cff", "DetectTime": "2024-05-21T12:25:13.774326+00:00", "EventTime": "2024-05-21T12:25:13.774349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CylOJE3L97G6DPTRYj"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3669ad03-0da0-4344-b95e-e2fe20532d49", "DetectTime": "2024-05-21T12:25:14.069304+00:00", "EventTime": "2024-05-21T12:25:14.069325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyaDNH3rCM0fkdqwzg", "CiM2yt2HP2R1LeTg27", "ChEXnh1aoKCWmdnXMl", "CcsRELPD2kPzBaZkk"], "accumulated_threat_level": 5.3999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "7e9496ee-cd8e-4564-9614-9da3b8f82030", "DetectTime": "2024-05-21T12:25:14.276166+00:00", "EventTime": "2024-05-21T12:25:14.276186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.65.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgAiGC1vitnDpApq99"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "a6cefb49-7daf-489a-98fb-15571fa14563", "DetectTime": "2024-05-21T12:25:14.499951+00:00", "EventTime": "2024-05-21T12:25:14.499974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTEqB1Bre3FKaPn0j"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "8dfb6281-c153-4afc-ac5b-d0228f7e1c76", "DetectTime": "2024-05-21T12:25:14.694175+00:00", "EventTime": "2024-05-21T12:25:14.694192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcipsfmJSnLW9sAe3"], "accumulated_threat_level": 6.199999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "f1310f8a-5fe3-434d-a63b-3c542b189bcd", "DetectTime": "2024-05-21T12:25:14.726483+00:00", "EventTime": "2024-05-21T12:25:14.726501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVwGF1DGr8x1tzdE4"], "accumulated_threat_level": 6.999999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "83c90680-2b9e-4a15-9b24-b7fa46428b46", "DetectTime": "2024-05-21T12:25:14.749295+00:00", "EventTime": "2024-05-21T12:25:14.749315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7LYSSX76ffxo7OH2"], "accumulated_threat_level": 7.799999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "cc05bf6a-1ac5-4796-934c-c521bedbea11", "DetectTime": "2024-05-21T12:25:14.772297+00:00", "EventTime": "2024-05-21T12:25:14.772315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMt373JW8vLRh8nBl"], "accumulated_threat_level": 8.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "39dc00fb-7ff4-4abc-908b-f551aa6be36b", "DetectTime": "2024-05-21T12:25:14.834880+00:00", "EventTime": "2024-05-21T12:25:14.834911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sZejacL0YwzFV3"], "accumulated_threat_level": 9.4, "timewindow": 14} +{"Format": "IDEA0", "ID": "2f6358c3-4d81-4962-a290-853d744f8c04", "DetectTime": "2024-05-21T12:25:15.040284+00:00", "EventTime": "2024-05-21T12:25:15.040305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQyKbWxYGUTZyPHk"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "b5cc4279-47cd-4dbd-add0-00213dd61fd7", "DetectTime": "2024-05-21T12:25:15.046030+00:00", "EventTime": "2024-05-21T12:25:15.046051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GoKe39z9rrQ3RYmd"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "ca35f206-ad91-4102-807c-f3dcc1f069ad", "DetectTime": "2024-05-21T12:25:15.080696+00:00", "EventTime": "2024-05-21T12:25:15.080716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.82.20.14 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfRmYGd6UqEoVuJ16"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "237fce3e-8efc-435b-9f23-89ad62398926", "DetectTime": "2024-05-21T12:25:15.095645+00:00", "EventTime": "2024-05-21T12:25:15.095665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3Beg3YKWqxxngODk"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "52bbb8d1-8c70-40a7-bf24-e4c11f9fba05", "DetectTime": "2024-05-21T12:25:15.106128+00:00", "EventTime": "2024-05-21T12:25:15.106146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtss54hXKViOJVhii"], "accumulated_threat_level": 10.200000000000001, "timewindow": 14} +{"Format": "IDEA0", "ID": "20579c15-8da0-4544-8310-fba91fd873a6", "DetectTime": "2024-05-21T12:25:15.115303+00:00", "EventTime": "2024-05-21T12:25:15.115320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYF6L53ljYyr6BLPcd"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3b0924c1-12c3-4a4b-9a16-b98fabe42971", "DetectTime": "2024-05-21T12:25:15.141851+00:00", "EventTime": "2024-05-21T12:25:15.141868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5UaZK3etocBjAldw1"], "accumulated_threat_level": 11.000000000000002, "timewindow": 14} +{"Format": "IDEA0", "ID": "e323eb4d-7ca1-4d85-878b-8ba1b0382376", "DetectTime": "2024-05-21T12:25:15.166247+00:00", "EventTime": "2024-05-21T12:25:15.166268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8WNFA16AcrFLiYjfk"], "accumulated_threat_level": 11.800000000000002, "timewindow": 14} +{"Format": "IDEA0", "ID": "4dbf96aa-72a3-44b7-8a3c-3e3e985c2d2f", "DetectTime": "2024-05-21T12:25:15.186059+00:00", "EventTime": "2024-05-21T12:25:15.186078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlcw44UNJER09Tbdl"], "accumulated_threat_level": 12.600000000000003, "timewindow": 14} +{"Format": "Json", "ID": "4dbf96aa-72a3-44b7-8a3c-3e3e985c2d2f", "DetectTime": "2024-05-21T12:25:15.186059+00:00", "EventTime": "2024-05-21T12:25:15.186078+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "1970-01-01T13:10:56.620467+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:25:15.447264)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.600000000000003, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.600000000000003} +{"Format": "IDEA0", "ID": "6690ac70-ab3e-45bd-bdfb-751f34710a97", "DetectTime": "2024-05-21T12:25:15.464661+00:00", "EventTime": "2024-05-21T12:25:15.464682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZS3dK2IIsc5POwoRd"], "accumulated_threat_level": 0.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "07d9c4c7-12e0-46c1-97bf-635cf5629153", "DetectTime": "2024-05-21T12:25:15.477759+00:00", "EventTime": "2024-05-21T12:25:15.477777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA7YTI37rg8XT9NlRk"], "accumulated_threat_level": 1.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "c88daca1-c223-4fee-a7c5-500d6dd16a6f", "DetectTime": "2024-05-21T12:25:15.487389+00:00", "EventTime": "2024-05-21T12:25:15.487407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhSFKTwIbHkmLXH8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 14} +{"Format": "IDEA0", "ID": "8c715d13-c470-4cff-a9be-f1d05b4582bf", "DetectTime": "2024-05-21T12:25:15.497990+00:00", "EventTime": "2024-05-21T12:25:15.498011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qjUa289hfzM89Tx5"], "accumulated_threat_level": 3.2, "timewindow": 14} +{"Format": "IDEA0", "ID": "6bcff23b-37f7-41a1-a1ea-4df885cbda35", "DetectTime": "2024-05-21T12:25:15.508601+00:00", "EventTime": "2024-05-21T12:25:15.508619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRoguBqhyLm0OWUgc"], "accumulated_threat_level": 4.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "dab239a0-2ff7-4cf8-808c-297069a256a9", "DetectTime": "2024-05-21T12:25:15.520471+00:00", "EventTime": "2024-05-21T12:25:15.520493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQnxp1OXqomgD3QBb"], "accumulated_threat_level": 4.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "e7d57983-4a33-4e6e-87a4-7aebc1c9e232", "DetectTime": "2024-05-21T12:25:15.525269+00:00", "EventTime": "2024-05-21T12:25:15.525286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRq6qf4wPjxR2iTbI4"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "9c00241c-e71b-48fd-b894-d240e0b3bb34", "DetectTime": "2024-05-21T12:25:15.530047+00:00", "EventTime": "2024-05-21T12:25:15.530065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZl7D14ijsyXVKAbe"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "8b6f192d-96df-4c73-8c43-419c38aa0348", "DetectTime": "2024-05-21T12:25:15.534434+00:00", "EventTime": "2024-05-21T12:25:15.534452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWNC5243NCOs6LVEf4"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "809f6365-297a-4938-a0e2-ca56a5972a41", "DetectTime": "2024-05-21T12:25:15.545697+00:00", "EventTime": "2024-05-21T12:25:15.545718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYgk23mgGw2WItmhd"], "accumulated_threat_level": 5.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "f052bd86-729a-4880-ac31-3960eb67396c", "DetectTime": "2024-05-21T12:25:15.550733+00:00", "EventTime": "2024-05-21T12:25:15.550751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa0qK5SiovTFGuMb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "d1a63b82-7947-48e0-a8c1-3d783128f42b", "DetectTime": "2024-05-21T12:25:15.555388+00:00", "EventTime": "2024-05-21T12:25:15.555406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCqAVBOKW8zszBoh"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "e67a2072-ff3f-4a2c-8e4e-839fbf205132", "DetectTime": "2024-05-21T12:25:15.567137+00:00", "EventTime": "2024-05-21T12:25:15.567155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfnmeHZrXWXA6n7Jj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "513b8f8e-97e8-4c63-9edf-919ec73acfff", "DetectTime": "2024-05-21T12:25:15.571657+00:00", "EventTime": "2024-05-21T12:25:15.571675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmt7IR3d4am9NaKfej"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3e4e6f89-d628-47e1-a635-7d8e58cefbc9", "DetectTime": "2024-05-21T12:25:15.576081+00:00", "EventTime": "2024-05-21T12:25:15.576098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LAOMwPjQuRQUd35"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "55cbb879-19a0-4972-b48b-2d3e24347396", "DetectTime": "2024-05-21T12:25:15.585976+00:00", "EventTime": "2024-05-21T12:25:15.585994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKfGvHUfCKZhjDRh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "abbbdb2b-153b-44a1-92df-145af1b759e0", "DetectTime": "2024-05-21T12:25:15.590480+00:00", "EventTime": "2024-05-21T12:25:15.590496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKk98D3ambRYp7vre"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "d99f0d84-211b-48b1-b9d6-7dc36e3959a6", "DetectTime": "2024-05-21T12:25:15.601139+00:00", "EventTime": "2024-05-21T12:25:15.601157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeuhg1EJiYbYu2A8l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "25664f6f-2e9f-4669-a14f-a1f73522293c", "DetectTime": "2024-05-21T12:25:15.605565+00:00", "EventTime": "2024-05-21T12:25:15.605583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKxp92FYcvyQkaged"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "95e1e2cb-6846-41f9-b0cb-46dab7912f1e", "DetectTime": "2024-05-21T12:25:15.624505+00:00", "EventTime": "2024-05-21T12:25:15.624528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq85IdsmuDmOZOFNf"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "dc3c5a6a-75aa-401b-92af-87cc68522ab2", "DetectTime": "2024-05-21T12:25:15.647263+00:00", "EventTime": "2024-05-21T12:25:15.647283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD9rawlgx3oDUsMg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "fdfe4224-bc55-4770-be2a-5cc9619dc002", "DetectTime": "2024-05-21T12:25:15.653240+00:00", "EventTime": "2024-05-21T12:25:15.653258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MTmt3n5OfAWfj0Za"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "b6bafd2d-8cb2-4fdc-a570-aeda65005629", "DetectTime": "2024-05-21T12:25:15.679600+00:00", "EventTime": "2024-05-21T12:25:15.679620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNGTg3v2bmxyhP5y1"], "accumulated_threat_level": 9.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "b48807f2-21fa-41ab-91c6-213fc01a711e", "DetectTime": "2024-05-21T12:25:15.703031+00:00", "EventTime": "2024-05-21T12:25:15.703049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreQNT3g6yzZMXZXZ2"], "accumulated_threat_level": 10.4, "timewindow": 14} +{"Format": "IDEA0", "ID": "b8744f2e-3102-48af-b75f-08031364e856", "DetectTime": "2024-05-21T12:25:15.724035+00:00", "EventTime": "2024-05-21T12:25:15.724055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7JSr2ljbVCm7wu67"], "accumulated_threat_level": 11.200000000000001, "timewindow": 14} +{"Format": "IDEA0", "ID": "c8d781ff-32da-41a0-a35b-7b12295c4e0c", "DetectTime": "2024-05-21T12:25:15.747428+00:00", "EventTime": "2024-05-21T12:25:15.747446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Gixl16jlVqp4m9ob"], "accumulated_threat_level": 12.000000000000002, "timewindow": 14} +{"Format": "Json", "ID": "c8d781ff-32da-41a0-a35b-7b12295c4e0c", "DetectTime": "2024-05-21T12:25:15.747428+00:00", "EventTime": "2024-05-21T12:25:15.747446+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "1970-01-01T13:11:38.815578+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:25:15.885424)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c4b03a18-864e-436a-8d80-662d7289d344", "DetectTime": "2024-05-21T12:25:15.894940+00:00", "EventTime": "2024-05-21T12:25:15.894960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmcrL1RDzfNMDFE4"], "accumulated_threat_level": 0.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "fa6d5a08-df13-4c6d-bcb3-29c66745e1a0", "DetectTime": "2024-05-21T12:25:15.907818+00:00", "EventTime": "2024-05-21T12:25:15.907838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQdTP22NdyJev349h"], "accumulated_threat_level": 1.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "dfa84ef9-c231-4ba7-a6f3-4770dcd4305c", "DetectTime": "2024-05-21T12:25:15.918187+00:00", "EventTime": "2024-05-21T12:25:15.918205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDSMNb4GDuhXogxnn8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 14} +{"Format": "IDEA0", "ID": "30425c71-c5be-48e2-ba32-ee50c51aeccc", "DetectTime": "2024-05-21T12:25:15.938790+00:00", "EventTime": "2024-05-21T12:25:15.938808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRYAl83u6Dsn7hfMof"], "accumulated_threat_level": 3.2, "timewindow": 14} +{"Format": "IDEA0", "ID": "95f07b89-709e-4427-a993-845849f1f668", "DetectTime": "2024-05-21T12:25:15.995599+00:00", "EventTime": "2024-05-21T12:25:15.995619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSP3O61mbXXXgwAKb2"], "accumulated_threat_level": 4.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1e6c3314-3a37-4501-8ec7-f980d3cc95d3", "DetectTime": "2024-05-21T12:25:16.020329+00:00", "EventTime": "2024-05-21T12:25:16.020348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GkKi4f2YOIUMK5ia"], "accumulated_threat_level": 4.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "cdfdd409-7333-4728-92c8-8f88879199bb", "DetectTime": "2024-05-21T12:25:16.060644+00:00", "EventTime": "2024-05-21T12:25:16.060664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjeb5j1MHXgVHc2pNe"], "accumulated_threat_level": 5.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "24a1e8f5-1704-40e9-978c-73d618ab5de5", "DetectTime": "2024-05-21T12:25:16.065088+00:00", "EventTime": "2024-05-21T12:25:16.065105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmm7iV26Zd9d3m6EX2"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "937ec3b7-6f67-4126-8915-17bd6d37b495", "DetectTime": "2024-05-21T12:25:16.083957+00:00", "EventTime": "2024-05-21T12:25:16.083978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhUvy26mdFDh26hBl"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "c54c783e-e8eb-4531-baa7-ef9f5b9050f2", "DetectTime": "2024-05-21T12:25:16.101406+00:00", "EventTime": "2024-05-21T12:25:16.101426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0gn7253oMXLKrUyf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "9a596db0-32ef-4284-b104-878e4ae8fef0", "DetectTime": "2024-05-21T12:25:16.115258+00:00", "EventTime": "2024-05-21T12:25:16.115277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpdKB2JMONTDoQhfl"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "f1cdfc22-9fb2-473e-aef9-06bccd3fabab", "DetectTime": "2024-05-21T12:25:16.135929+00:00", "EventTime": "2024-05-21T12:25:16.135949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAB2j14bYcZmLRIh29"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "834cc709-4231-4dc9-a6f7-c22f5bbd50c5", "DetectTime": "2024-05-21T12:25:16.155930+00:00", "EventTime": "2024-05-21T12:25:16.155949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLR7e3ArxfzrihX1d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "b518a3aa-d7b4-4a68-bb3a-436554006f76", "DetectTime": "2024-05-21T12:25:16.168302+00:00", "EventTime": "2024-05-21T12:25:16.168332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV6Ca3pkW5qFHsoe7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7d98879a-c32f-4b3d-a101-ae915f9a2186", "DetectTime": "2024-05-21T12:25:16.195426+00:00", "EventTime": "2024-05-21T12:25:16.195458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KZxYJjKjlHaZ7G4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "63359dd7-e113-4115-beb5-831800c093c4", "DetectTime": "2024-05-21T12:25:16.202491+00:00", "EventTime": "2024-05-21T12:25:16.202512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDTVqv4ZzoTTTZZj0j"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "5f6953bf-cc8d-426a-b77b-22709de43629", "DetectTime": "2024-05-21T12:25:16.219764+00:00", "EventTime": "2024-05-21T12:25:16.219792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAG5y2r8xh1XpjFAk"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "87f7e5dc-3bcd-4867-8136-024daf31e8fa", "DetectTime": "2024-05-21T12:25:16.253063+00:00", "EventTime": "2024-05-21T12:25:16.253084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIsKuIUKowe7GtQ1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "d3c58e50-c646-4d4b-a48d-0ce93a29af0a", "DetectTime": "2024-05-21T12:25:16.299333+00:00", "EventTime": "2024-05-21T12:25:16.299352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkR52q3o6vvFVOFaS7"], "accumulated_threat_level": 9.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "2dc07db1-c132-453e-889c-84b2f9abab21", "DetectTime": "2024-05-21T12:25:16.346024+00:00", "EventTime": "2024-05-21T12:25:16.346043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI500ufHWKufYypH6"], "accumulated_threat_level": 10.4, "timewindow": 14} +{"Format": "IDEA0", "ID": "68afeba1-e3dc-46b9-b5aa-c03fc8cca668", "DetectTime": "2024-05-21T12:25:16.391623+00:00", "EventTime": "2024-05-21T12:25:16.391644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsWVhm2P6oP9ZoKFvi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 14} +{"Format": "IDEA0", "ID": "63d26fd8-9c03-47d1-9c74-70c291c7679f", "DetectTime": "2024-05-21T12:25:16.426717+00:00", "EventTime": "2024-05-21T12:25:16.426736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVENRI2hQqnwxVxkW4"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7d0fba40-e11c-4b61-a38c-e520765efe1d", "DetectTime": "2024-05-21T12:25:16.444303+00:00", "EventTime": "2024-05-21T12:25:16.444321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUsfGRfBsazAoCRh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 14} +{"Format": "Json", "ID": "7d0fba40-e11c-4b61-a38c-e520765efe1d", "DetectTime": "2024-05-21T12:25:16.444303+00:00", "EventTime": "2024-05-21T12:25:16.444321+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "1970-01-01T13:12:03.293257+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:25:16.585216)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "31509fe7-a05d-4bc4-afa4-2f47832e777d", "DetectTime": "2024-05-21T12:25:16.589712+00:00", "EventTime": "2024-05-21T12:25:16.589734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJEM9R3xq9Dgipys1j"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "1881ba23-e88e-489a-a940-12185df835e3", "DetectTime": "2024-05-21T12:25:16.594827+00:00", "EventTime": "2024-05-21T12:25:16.594847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU7JAPGNJvuBdqQk"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "e51dffaf-56d9-4f14-98dd-fe6ef8d0b23b", "DetectTime": "2024-05-21T12:25:16.599479+00:00", "EventTime": "2024-05-21T12:25:16.599498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcSJHL2oIz0nsgjUb7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "5c720e2d-6681-44d2-909a-9a4db89f3d90", "DetectTime": "2024-05-21T12:25:16.604050+00:00", "EventTime": "2024-05-21T12:25:16.604067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciq6A14Awq57wD4Ddd"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "408429c4-de58-40a3-bd4f-3af9987c744d", "DetectTime": "2024-05-21T12:25:16.654800+00:00", "EventTime": "2024-05-21T12:25:16.654819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51ADv1E2CcZ8hMhJd"], "accumulated_threat_level": 0.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "23791e77-c485-4f35-86b2-ecc45167d434", "DetectTime": "2024-05-21T12:25:16.767185+00:00", "EventTime": "2024-05-21T12:25:16.767206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWirw14CMJZWjLZax2"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "cac88acf-f598-4d25-8876-ed61d659df15", "DetectTime": "2024-05-21T12:25:16.936410+00:00", "EventTime": "2024-05-21T12:25:16.936434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr0r6ahpd0L3bZGpl", "Ctmkfe4WDscqSWWFx1", "CeJRB22KYlB5Fc7WIg", "CESLEb0drxS8LzrLd"], "accumulated_threat_level": 1.3, "timewindow": 14} +{"Format": "IDEA0", "ID": "ae8563f5-6ce3-439c-ad62-b8e95dd60435", "DetectTime": "2024-05-21T12:25:17.027670+00:00", "EventTime": "2024-05-21T12:25:17.027692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5KD2aoTD85WxMwj"], "accumulated_threat_level": 2.1, "timewindow": 14} +{"Format": "IDEA0", "ID": "55c24117-5105-4415-9b8a-ce0ef3f2e9f5", "DetectTime": "2024-05-21T12:25:17.052271+00:00", "EventTime": "2024-05-21T12:25:17.052295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7SgrJ3wYVqmqLkAt4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 14} +{"Format": "IDEA0", "ID": "80e20f79-9729-4ea4-b062-5347776023b9", "DetectTime": "2024-05-21T12:25:17.085802+00:00", "EventTime": "2024-05-21T12:25:17.085820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChuRrm3gThL2Yv1wYf"], "accumulated_threat_level": 3.7, "timewindow": 14} +{"Format": "IDEA0", "ID": "4a0a430b-f075-4375-9db3-593eac912b69", "DetectTime": "2024-05-21T12:25:17.109795+00:00", "EventTime": "2024-05-21T12:25:17.109812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueWNK1Oz2NGGjwnJc"], "accumulated_threat_level": 4.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "ce82d7ce-1575-4acb-baa3-5970207c45a6", "DetectTime": "2024-05-21T12:25:17.144602+00:00", "EventTime": "2024-05-21T12:25:17.144622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4j3Ny4ERhQhSMxrR8"], "accumulated_threat_level": 5.3, "timewindow": 14} +{"Format": "IDEA0", "ID": "b5a87643-193c-41a2-8315-ed78af51feba", "DetectTime": "2024-05-21T12:25:17.166507+00:00", "EventTime": "2024-05-21T12:25:17.166531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeN4po4xlWerLVGa2d"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "95329c28-be6f-4743-8992-e1d12b7eb10a", "DetectTime": "2024-05-21T12:25:17.180362+00:00", "EventTime": "2024-05-21T12:25:17.180379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2UEW1dbcQjkIb7U1"], "accumulated_threat_level": 6.1, "timewindow": 14} +{"Format": "IDEA0", "ID": "0af5b874-d81c-45c8-8d5f-efc3f4583e1b", "DetectTime": "2024-05-21T12:25:17.194388+00:00", "EventTime": "2024-05-21T12:25:17.194422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.67.41 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSmLS10XhDkeBkgSf"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "5dc780ad-6076-4978-8ab1-a08e960b1ca8", "DetectTime": "2024-05-21T12:25:17.218634+00:00", "EventTime": "2024-05-21T12:25:17.218658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHVMPu3jIpCcaIj8Nf"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "e2c2782e-8b3f-4b9b-867b-56494849c185", "DetectTime": "2024-05-21T12:25:17.252726+00:00", "EventTime": "2024-05-21T12:25:17.252745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6gjr4OWOpx2Q6Qfj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "324eae35-e9a8-4625-97da-3ee83668a03a", "DetectTime": "2024-05-21T12:25:17.276383+00:00", "EventTime": "2024-05-21T12:25:17.276402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCr1dA4PzeTVAXw294"], "accumulated_threat_level": 8.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "0be71fca-0c6d-47be-81ea-8f367632d5e6", "DetectTime": "2024-05-21T12:25:17.339490+00:00", "EventTime": "2024-05-21T12:25:17.339508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3UNu4ag3LUPmx7Gl"], "accumulated_threat_level": 9.3, "timewindow": 14} +{"Format": "IDEA0", "ID": "0218b182-d2c6-47b2-a189-6b38c6a17e9f", "DetectTime": "2024-05-21T12:25:17.376331+00:00", "EventTime": "2024-05-21T12:25:17.376355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFvPCe3U2Az4I4HdSk"], "accumulated_threat_level": 10.100000000000001, "timewindow": 14} +{"Format": "IDEA0", "ID": "f98c72e6-d75a-4a52-87e3-ec5698422b2f", "DetectTime": "2024-05-21T12:25:17.388543+00:00", "EventTime": "2024-05-21T12:25:17.388561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9J054l18hahTIvZb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "b4039b3d-b566-4533-af8d-1ff7d90148f6", "DetectTime": "2024-05-21T12:25:17.407710+00:00", "EventTime": "2024-05-21T12:25:17.407728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMzYCLBTxUcZxRE8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 14} +{"Format": "IDEA0", "ID": "4bf49f4c-f745-483a-819b-cce017f23e5c", "DetectTime": "2024-05-21T12:25:17.442131+00:00", "EventTime": "2024-05-21T12:25:17.442149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF02yg31VFeEu38pk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 14} +{"Format": "IDEA0", "ID": "a462959e-61e7-4f9d-8b6f-6759029127f5", "DetectTime": "2024-05-21T12:25:17.464802+00:00", "EventTime": "2024-05-21T12:25:17.464819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvY93f31HhEGaEvimh"], "accumulated_threat_level": 12.500000000000004, "timewindow": 14} +{"Format": "Json", "ID": "a462959e-61e7-4f9d-8b6f-6759029127f5", "DetectTime": "2024-05-21T12:25:17.464802+00:00", "EventTime": "2024-05-21T12:25:17.464819+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "1970-01-01T13:42:34.987816+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:25:17.693305)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "c6912b9c-b056-4fff-b624-77f3007f7e79", "DetectTime": "2024-05-21T12:25:17.704831+00:00", "EventTime": "2024-05-21T12:25:17.704850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRPytORW19pPnrf1"], "accumulated_threat_level": 0.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "2dca55e4-5122-4c2b-a3ac-840da3c1657a", "DetectTime": "2024-05-21T12:25:17.715007+00:00", "EventTime": "2024-05-21T12:25:17.715025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WFHt3N2qgss7QP16"], "accumulated_threat_level": 1.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "c9cd9526-2283-4aea-b808-bf12790357a5", "DetectTime": "2024-05-21T12:25:17.725367+00:00", "EventTime": "2024-05-21T12:25:17.725387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClDmxa47bblQIVY9Q"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 14} +{"Format": "IDEA0", "ID": "cecdb4fd-2bc2-40af-9ef0-736afffb3ce7", "DetectTime": "2024-05-21T12:25:17.735772+00:00", "EventTime": "2024-05-21T12:25:17.735790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVH9l25zYK2N7E3mg"], "accumulated_threat_level": 3.2, "timewindow": 14} +{"Format": "IDEA0", "ID": "b093c8da-19d8-45ac-a40f-4dc54d069569", "DetectTime": "2024-05-21T12:25:17.740211+00:00", "EventTime": "2024-05-21T12:25:17.740228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.224.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXLur94DRF0kZsNeP2"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7afa006b-823d-4b73-a51c-251bd7d8f329", "DetectTime": "2024-05-21T12:25:17.744795+00:00", "EventTime": "2024-05-21T12:25:17.744813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Ga724YPA5JC55j9h"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7a84f34d-f66a-4af9-b404-baed5a6db809", "DetectTime": "2024-05-21T12:25:17.754637+00:00", "EventTime": "2024-05-21T12:25:17.754659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnZPT16BBdAhb5Ou8"], "accumulated_threat_level": 4.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "5bac78b1-012b-4912-8e57-8c8783ffbdbb", "DetectTime": "2024-05-21T12:25:17.765627+00:00", "EventTime": "2024-05-21T12:25:17.765645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OEaGdoOhzcSj4e5"], "accumulated_threat_level": 4.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "cf327cc5-51c8-4d19-9642-0e401853dbcb", "DetectTime": "2024-05-21T12:25:17.775450+00:00", "EventTime": "2024-05-21T12:25:17.775468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yUov43PX3CSePJDe"], "accumulated_threat_level": 5.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "f129b56e-aa3e-4bb3-8cee-3b8cd57ec94e", "DetectTime": "2024-05-21T12:25:17.779842+00:00", "EventTime": "2024-05-21T12:25:17.779864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41YjF2D4OutUwX1x2"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "e3ce914b-9b49-4824-9b46-40c111bdfce8", "DetectTime": "2024-05-21T12:25:17.787253+00:00", "EventTime": "2024-05-21T12:25:17.787273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.217.117.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcclO1vd8hudUnul9"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "2b9d37e9-dbdf-4993-89c8-7219121f75b2", "DetectTime": "2024-05-21T12:25:17.797759+00:00", "EventTime": "2024-05-21T12:25:17.797776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqO12r3N0JN2VmDgL"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "8ff183b8-8c4f-4166-9a37-85273d1b1403", "DetectTime": "2024-05-21T12:25:17.818698+00:00", "EventTime": "2024-05-21T12:25:17.818719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4XJH1fTDNKciUcw"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "2f9e704f-0eb0-4f80-ad69-1df376ef7474", "DetectTime": "2024-05-21T12:25:17.842033+00:00", "EventTime": "2024-05-21T12:25:17.842052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqpg8z4uimYYbjiJH3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "b1a5263b-a799-4cd2-af02-e1293d456576", "DetectTime": "2024-05-21T12:25:17.846684+00:00", "EventTime": "2024-05-21T12:25:17.846702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwYREs3DkZHj24VINb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "36993073-267f-4f4e-8a75-aea4ef1a8d36", "DetectTime": "2024-05-21T12:25:17.867322+00:00", "EventTime": "2024-05-21T12:25:17.867343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.63.204.26 AS: BIRCH-TELECOM AS16526 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18NwbYNnArOavlhc"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "9a2cce95-1e7f-4e5e-8845-a6e2643b1357", "DetectTime": "2024-05-21T12:25:17.880993+00:00", "EventTime": "2024-05-21T12:25:17.881011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEm5T3vCqLXilH1X"], "accumulated_threat_level": 7.999999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "b5cad084-73b2-44d6-954d-0ed99407aa90", "DetectTime": "2024-05-21T12:25:17.903440+00:00", "EventTime": "2024-05-21T12:25:17.903460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25811/UDP destination IP 122.164.65.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CshzuY3yid7EuADakf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "a56268ac-a2aa-4e9b-93db-556d0a83cbcf", "DetectTime": "2024-05-21T12:25:17.925903+00:00", "EventTime": "2024-05-21T12:25:17.925921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbC14h1fa4K1Zn8Hu7"], "accumulated_threat_level": 9.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "2531b5e5-93af-420b-8d2f-adddd7a8649a", "DetectTime": "2024-05-21T12:25:17.949003+00:00", "EventTime": "2024-05-21T12:25:17.949024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTIyv4WDRonA8Lc15"], "accumulated_threat_level": 10.4, "timewindow": 14} +{"Format": "IDEA0", "ID": "6f8ba06c-d5c8-4467-b04a-c139092c69c6", "DetectTime": "2024-05-21T12:25:17.971321+00:00", "EventTime": "2024-05-21T12:25:17.971341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIdti118GUZDQiCGh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 14} +{"Format": "IDEA0", "ID": "f887c9fe-acc7-4ee3-9efc-a0e98e57df48", "DetectTime": "2024-05-21T12:25:17.995616+00:00", "EventTime": "2024-05-21T12:25:17.995636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EI3T2JFbRG9Xesxk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 14} +{"Format": "Json", "ID": "f887c9fe-acc7-4ee3-9efc-a0e98e57df48", "DetectTime": "2024-05-21T12:25:17.995616+00:00", "EventTime": "2024-05-21T12:25:17.995636+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "1970-01-01T13:42:38.087699+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:25:18.209676)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4913e053-508c-4e4f-99b7-f8ed851431d6", "DetectTime": "2024-05-21T12:25:18.220820+00:00", "EventTime": "2024-05-21T12:25:18.220840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte8BC24pTUfhEeOj"], "accumulated_threat_level": 0.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "dc40f1db-275f-430f-b06c-e8b9045c8f53", "DetectTime": "2024-05-21T12:25:18.231496+00:00", "EventTime": "2024-05-21T12:25:18.231514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgdVb1BCXGhBOlOre"], "accumulated_threat_level": 1.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "a25083bc-fca6-4a25-95ca-6830fd921462", "DetectTime": "2024-05-21T12:25:18.240376+00:00", "EventTime": "2024-05-21T12:25:18.240396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCn9Z7UIqAs5TGQ7k"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "6a93c724-39c6-42bf-891c-58478fbecc1b", "DetectTime": "2024-05-21T12:25:18.250767+00:00", "EventTime": "2024-05-21T12:25:18.250785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC1v8MJSYyzIJOU4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 14} +{"Format": "IDEA0", "ID": "bd391735-b973-4d11-93a8-862a2b251f48", "DetectTime": "2024-05-21T12:25:18.255191+00:00", "EventTime": "2024-05-21T12:25:18.255210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6zmh4C7IEfkDH03d"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "c8fe5c23-eea3-435d-8aca-3f13f6e81e4c", "DetectTime": "2024-05-21T12:25:18.259496+00:00", "EventTime": "2024-05-21T12:25:18.259514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.168.10.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3KFzp3B8pLZoHmgy8"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "e15fdf33-859e-4f0a-9102-92e66640b6e3", "DetectTime": "2024-05-21T12:25:18.263851+00:00", "EventTime": "2024-05-21T12:25:18.263869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHVZI1gn7lgvhP2x1"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "69d1b92f-6697-4d66-b87e-f289e119e275", "DetectTime": "2024-05-21T12:25:18.268197+00:00", "EventTime": "2024-05-21T12:25:18.268215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.230.133.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhjKS3Ln2FhkqlIzl"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "6fd46412-628d-472b-aed0-48248ab4cd37", "DetectTime": "2024-05-21T12:25:18.280237+00:00", "EventTime": "2024-05-21T12:25:18.280257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmgnE1PpkkTXjzqI"], "accumulated_threat_level": 3.2, "timewindow": 14} +{"Format": "IDEA0", "ID": "8c13a8c1-dfb0-49d7-b387-efa157e4a42e", "DetectTime": "2024-05-21T12:25:18.285969+00:00", "EventTime": "2024-05-21T12:25:18.285990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoN1FZ2nutf2MAlr0e"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "a44f1812-65b7-4266-954d-0575c5a5ae3e", "DetectTime": "2024-05-21T12:25:18.297233+00:00", "EventTime": "2024-05-21T12:25:18.297254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5McTo2I0jSoXYTFya"], "accumulated_threat_level": 4.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7a60ab39-1658-4fdc-9ab3-2c67884aec9f", "DetectTime": "2024-05-21T12:25:18.302100+00:00", "EventTime": "2024-05-21T12:25:18.302120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRTB11LSzLB4eHDm6"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "20dcb9f5-e009-472b-a88b-ab46299332d6", "DetectTime": "2024-05-21T12:25:18.306547+00:00", "EventTime": "2024-05-21T12:25:18.306565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoBqTk14C6Ryc6Vf27"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7274b682-dabb-4dd0-b5fc-57ac9474f2f4", "DetectTime": "2024-05-21T12:25:18.316263+00:00", "EventTime": "2024-05-21T12:25:18.316281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYRvg4sBGPRSgrS96"], "accumulated_threat_level": 4.8, "timewindow": 14} +{"Format": "IDEA0", "ID": "f490c9d4-4255-49e8-863a-488045e688c2", "DetectTime": "2024-05-21T12:25:18.320976+00:00", "EventTime": "2024-05-21T12:25:18.320997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtUTs2tIhe6YeYVSk"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "5d844f24-69b2-45d5-9ef6-fe8568c4659e", "DetectTime": "2024-05-21T12:25:18.332471+00:00", "EventTime": "2024-05-21T12:25:18.332490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl93Xv1lRmWb2hTCQ7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3cb45b30-eaa4-4dcf-b4eb-5b6ee35be0f9", "DetectTime": "2024-05-21T12:25:18.356023+00:00", "EventTime": "2024-05-21T12:25:18.356042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSLrn4KoPcecRtp86"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "19e4f83f-55c2-4a2d-83d2-e78a57b9aa86", "DetectTime": "2024-05-21T12:25:18.388635+00:00", "EventTime": "2024-05-21T12:25:18.388657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpQZ43GSFbAQ2G8Nb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "cf712a7a-86a6-4016-95cc-b6713e2c6c6e", "DetectTime": "2024-05-21T12:25:18.407462+00:00", "EventTime": "2024-05-21T12:25:18.407479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.92.101.126"]}], "Attach": [{"Content": "Connection to unknown destination port 10384/UDP destination IP 59.92.101.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlfZi353ZBQpi94h"], "accumulated_threat_level": 5.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "0ad2c683-b84e-47a8-bf45-0190771bb4d8", "DetectTime": "2024-05-21T12:25:18.419702+00:00", "EventTime": "2024-05-21T12:25:18.419721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtiHy2gOCDa0qS3Ng"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "8004f704-7d31-4334-aa5c-e7eb67a674fe", "DetectTime": "2024-05-21T12:25:18.450745+00:00", "EventTime": "2024-05-21T12:25:18.450762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSiyRS1FLyfQm7Oc9h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 14} +{"Format": "IDEA0", "ID": "ab9c5174-8c8f-4bfb-9978-d059a351d42d", "DetectTime": "2024-05-21T12:25:18.455140+00:00", "EventTime": "2024-05-21T12:25:18.455158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUS3bb2pkf9Udem3el"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "be9e3b0e-4ae8-4a48-b0b4-cf060f3ad7b9", "DetectTime": "2024-05-21T12:25:18.481803+00:00", "EventTime": "2024-05-21T12:25:18.481822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEm6348Ge3RZ20kg5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "bb46dc2b-1910-43c0-9193-000111615854", "DetectTime": "2024-05-21T12:25:18.502333+00:00", "EventTime": "2024-05-21T12:25:18.502352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp04TB2h7tdOWfNLJd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "fde47c51-4314-42c6-b901-8f9f22f69974", "DetectTime": "2024-05-21T12:25:18.525742+00:00", "EventTime": "2024-05-21T12:25:18.525762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2Sv33yXZk6jnKdX7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 14} +{"Format": "IDEA0", "ID": "47559755-d5aa-4327-926d-d70a7deda284", "DetectTime": "2024-05-21T12:25:18.547259+00:00", "EventTime": "2024-05-21T12:25:18.547280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrsWCIv0b6vhHq0Hj"], "accumulated_threat_level": 9.6, "timewindow": 14} +{"Format": "IDEA0", "ID": "6a8b9c53-fd0d-4983-8261-2d9eb8e95abc", "DetectTime": "2024-05-21T12:25:18.574996+00:00", "EventTime": "2024-05-21T12:25:18.575015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.173.193.63 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzP8aZYreyWWFGE1"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "2d740eac-d702-4453-8785-4c3fcd41882e", "DetectTime": "2024-05-21T12:25:18.607231+00:00", "EventTime": "2024-05-21T12:25:18.607250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bgfN1UiwdQ4bh4Kg"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "ddafa276-da01-404e-9d26-c940f0ca1d5d", "DetectTime": "2024-05-21T12:25:18.630288+00:00", "EventTime": "2024-05-21T12:25:18.630308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.21.73.216 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx524x3xta1Kp25vMl"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "63fd9ec2-b893-4def-a125-0c263789ca7a", "DetectTime": "2024-05-21T12:25:18.664527+00:00", "EventTime": "2024-05-21T12:25:18.664550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfA4e3MtBmbPP1fHi"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7217b2c2-3444-49f6-9efa-4f531fc50c4e", "DetectTime": "2024-05-21T12:25:18.684406+00:00", "EventTime": "2024-05-21T12:25:18.684429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0n5NE2HveDlGa9Pn2"], "accumulated_threat_level": 0.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "aa831d63-602d-4ae8-9500-e49e9c3a8384", "DetectTime": "2024-05-21T12:25:18.691862+00:00", "EventTime": "2024-05-21T12:25:18.691884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.65.37.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5de582vbWltVYcllb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "379a126c-90aa-416a-834e-6f929d8bd138", "DetectTime": "2024-05-21T12:25:18.725684+00:00", "EventTime": "2024-05-21T12:25:18.725707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMB7RvZWnK6pAIPpc"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "1f1fb6fd-9ec0-49a8-8dfe-96a6c5713e06", "DetectTime": "2024-05-21T12:25:18.746889+00:00", "EventTime": "2024-05-21T12:25:18.746911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.57.162.209 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8bTZRIeUXOFa6Ai"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "245588af-4fb1-45d9-835a-2a0173e99737", "DetectTime": "2024-05-21T12:25:18.765452+00:00", "EventTime": "2024-05-21T12:25:18.765471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.210.133.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1SjS31rO5hdJSu3D"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "20692e37-4b78-455e-a619-6b6643d8ceac", "DetectTime": "2024-05-21T12:25:18.856791+00:00", "EventTime": "2024-05-21T12:25:18.856811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.232.130 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6Yf33eDbAhZ1lPs6"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "7bb243be-bca0-4f76-b316-b83301faa6c7", "DetectTime": "2024-05-21T12:25:18.893575+00:00", "EventTime": "2024-05-21T12:25:18.893594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgYbQo3YfDmQDQoFCa"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "0f01395f-eba5-41e4-9eec-8bd3d738d7e3", "DetectTime": "2024-05-21T12:25:18.908126+00:00", "EventTime": "2024-05-21T12:25:18.908148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSCRO2ktI54Gvkt4h"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "068b2507-a4f3-4d59-b9a8-f6356ca8ff68", "DetectTime": "2024-05-21T12:25:18.932114+00:00", "EventTime": "2024-05-21T12:25:18.932136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.19.109.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQquC228mkt4hx8je7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "06b7503a-1adb-43f6-9f82-b5998c40bf4d", "DetectTime": "2024-05-21T12:25:18.958515+00:00", "EventTime": "2024-05-21T12:25:18.958537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.238.90.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCwCv7Ae8728FbVj"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "86d4c12a-5a7c-4951-b2ed-4745728df5a4", "DetectTime": "2024-05-21T12:25:19.006072+00:00", "EventTime": "2024-05-21T12:25:19.006092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vUdh43t2FKMbYdW9"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "172ef815-ad72-49cb-8897-f1e7096744a6", "DetectTime": "2024-05-21T12:25:19.032077+00:00", "EventTime": "2024-05-21T12:25:19.032097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTlkU1lJhEtSP712f"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "49c4fa25-d4a0-483c-a9d0-f1ff29e48d8d", "DetectTime": "2024-05-21T12:25:19.063856+00:00", "EventTime": "2024-05-21T12:25:19.063873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccleb94PKUMhV1uKr"], "accumulated_threat_level": 1.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "b7b0ea32-f875-479f-b557-b8411b4bb9e5", "DetectTime": "2024-05-21T12:25:19.089315+00:00", "EventTime": "2024-05-21T12:25:19.089336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.235.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEnZl2bjbUJFfWHP2"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "659271e7-a700-41d2-93b8-ea758f6fe110", "DetectTime": "2024-05-21T12:25:19.112544+00:00", "EventTime": "2024-05-21T12:25:19.112567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3TyJ135oSMONdDWj9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 15} +{"Format": "IDEA0", "ID": "95014f51-b42d-42d0-8cb4-f0c0a506220d", "DetectTime": "2024-05-21T12:25:19.117719+00:00", "EventTime": "2024-05-21T12:25:19.117739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.226.236.123 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXg1hE2F6lvCCyH8Ti"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "a8b1fe04-d54d-40bd-8e49-0a1e836e13a0", "DetectTime": "2024-05-21T12:25:19.140599+00:00", "EventTime": "2024-05-21T12:25:19.140616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGb9u4vhvtBIsnPv7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "59ffc660-786f-45db-94a0-ddd17bb7e947", "DetectTime": "2024-05-21T12:25:19.147289+00:00", "EventTime": "2024-05-21T12:25:19.147310+00:00", "Category": ["Malware"], "Confidence": 0.5, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Type": ["Malware"], "Hash": ["md5:10.0.2.19"]}], "ConnCount": 1, "Size": 35840, "uids": ["MjQyMWNmOGM4MzA3YzI2M2Jh"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "523badec-332c-46ba-a288-6c151bb9b7f6", "DetectTime": "2024-05-21T12:25:19.204544+00:00", "EventTime": "2024-05-21T12:25:19.204563+00:00", "Category": ["Malware"], "Confidence": 0.5, "Source": [{"IP4": ["184.154.224.18"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Type": ["Malware"], "Hash": ["md5:184.154.224.18"]}], "ConnCount": 1, "Size": 35840, "uids": ["MjQyMWNmOGM4MzA3YzI2M2Jh"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8d71106b-6f4a-4b94-89d5-52427bfb1062", "DetectTime": "2024-05-21T12:25:19.390382+00:00", "EventTime": "2024-05-21T12:25:19.390422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQR8uP3cqWQFeyJVDa"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "0fcde306-05ea-471a-872e-d34bf83ca3fa", "DetectTime": "2024-05-21T12:25:19.402047+00:00", "EventTime": "2024-05-21T12:25:19.402067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.234.126.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTI4Ci2idaOQEuIIP6"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "83e6894e-90b8-403b-acf0-2bae4c409291", "DetectTime": "2024-05-21T12:25:19.409799+00:00", "EventTime": "2024-05-21T12:25:19.409820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.22.24.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdP3kWxlZnqarPJpl"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "0edbb425-ad69-479a-a79c-88720f8bbfe8", "DetectTime": "2024-05-21T12:25:19.414399+00:00", "EventTime": "2024-05-21T12:25:19.414429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.67.131.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CytQFH2IzMS9OTtyo"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "464d88f6-1b5e-4d44-9062-359016aa6a99", "DetectTime": "2024-05-21T12:25:19.419267+00:00", "EventTime": "2024-05-21T12:25:19.419285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oWMW10ufHZ2wLns5"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "0d913ac1-eb5f-41b0-958e-e469bf155957", "DetectTime": "2024-05-21T12:25:19.423688+00:00", "EventTime": "2024-05-21T12:25:19.423706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.198.149.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Z1Sk3dmoY8mcF1A4"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "8b7e4d06-5116-4f57-9bbe-da44ddb1b3f4", "DetectTime": "2024-05-21T12:25:19.456624+00:00", "EventTime": "2024-05-21T12:25:19.456643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.54.51.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOpQ1TyvspJzWpe7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3b585aac-a6ea-4cd6-9f5b-3fb2188040c2", "DetectTime": "2024-05-21T12:25:19.467073+00:00", "EventTime": "2024-05-21T12:25:19.467091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBo2wy3si4RkRX57mk"], "accumulated_threat_level": 4.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "e07d33f4-1285-4064-93b9-b1c73e419289", "DetectTime": "2024-05-21T12:25:19.495702+00:00", "EventTime": "2024-05-21T12:25:19.495722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Zkkp1tS1zJ7kh8a6"], "accumulated_threat_level": 4.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "df2824c3-38e8-4383-a836-a5143945f779", "DetectTime": "2024-05-21T12:25:19.517213+00:00", "EventTime": "2024-05-21T12:25:19.517232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnt0bT2XhRt78JOYKa"], "accumulated_threat_level": 5.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "374b229f-2253-42b7-aea3-efa0fcc3c18b", "DetectTime": "2024-05-21T12:25:19.539460+00:00", "EventTime": "2024-05-21T12:25:19.539479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06K8P2l9vXDXydoqb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 15} +{"Format": "IDEA0", "ID": "dd84b942-3075-4e62-9ab2-da61dac6b06a", "DetectTime": "2024-05-21T12:25:19.559973+00:00", "EventTime": "2024-05-21T12:25:19.559992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChHRbCGsGtIl6BYrf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "1c4b489d-bd50-42f2-88f8-ad0a4c494564", "DetectTime": "2024-05-21T12:25:19.581826+00:00", "EventTime": "2024-05-21T12:25:19.581843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMyYv29yG5x5iiDH1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "96f297c8-0c93-44c6-8416-70a4014b9dd7", "DetectTime": "2024-05-21T12:25:19.604792+00:00", "EventTime": "2024-05-21T12:25:19.604811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpCSk4MZUXP8TnPQ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "7cb7e0ea-27c9-4837-8c1d-b2039cbfd134", "DetectTime": "2024-05-21T12:25:19.664477+00:00", "EventTime": "2024-05-21T12:25:19.664496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNEsQ1MaHGYNTx3Y5"], "accumulated_threat_level": 9.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "3b98e923-9b47-4208-ab4d-7755d40e8a64", "DetectTime": "2024-05-21T12:25:19.685206+00:00", "EventTime": "2024-05-21T12:25:19.685224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaViytCdXRKwg3i8c"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "cf20ac2c-b4f0-4e12-b837-ca6d4e01fe61", "DetectTime": "2024-05-21T12:25:19.703013+00:00", "EventTime": "2024-05-21T12:25:19.703033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwJ5z1dZyNtau17Ei"], "accumulated_threat_level": 10.4, "timewindow": 15} +{"Format": "IDEA0", "ID": "fa80f265-64ec-4020-a215-d8b578224750", "DetectTime": "2024-05-21T12:25:19.721926+00:00", "EventTime": "2024-05-21T12:25:19.721950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmx5h2v5oxLZTG0Z7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 15} +{"Format": "IDEA0", "ID": "22de67a4-21f8-49c9-bf2f-dc7ba0043578", "DetectTime": "2024-05-21T12:25:19.745061+00:00", "EventTime": "2024-05-21T12:25:19.745080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzLl31Uj0Ls7YYJNi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 15} +{"Format": "Json", "ID": "22de67a4-21f8-49c9-bf2f-dc7ba0043578", "DetectTime": "2024-05-21T12:25:19.745061+00:00", "EventTime": "2024-05-21T12:25:19.745080+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "1970-01-01T14:13:27.873912+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:25:19.874080)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e0d41dac-c03e-48a1-849b-e6519bd42f17", "DetectTime": "2024-05-21T12:25:19.908376+00:00", "EventTime": "2024-05-21T12:25:19.908397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpowL3zg6I1xTs6F2"], "accumulated_threat_level": 0.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "7d18e71a-5d7d-4367-91a8-1861f55239d0", "DetectTime": "2024-05-21T12:25:19.914428+00:00", "EventTime": "2024-05-21T12:25:19.914448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.19.92.194 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKJCRB4MPcZB3DIi"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "b3213923-b9f0-4f4c-ae36-c7007b734e1e", "DetectTime": "2024-05-21T12:25:19.919071+00:00", "EventTime": "2024-05-21T12:25:19.919091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.7.103.29 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiHod3Tgzjp36m3j2"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "c53272bd-eb6e-4625-8734-dcb8ff0dea53", "DetectTime": "2024-05-21T12:25:19.929910+00:00", "EventTime": "2024-05-21T12:25:19.929936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzU7Ig20BdlyjaFDx6"], "accumulated_threat_level": 1.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "280babe9-b446-4143-b1be-e1269754f70a", "DetectTime": "2024-05-21T12:25:19.941645+00:00", "EventTime": "2024-05-21T12:25:19.941663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVD4NEoSp1c7qLwLg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 15} +{"Format": "IDEA0", "ID": "5ef47ee6-81cd-4c2f-a82f-b37d134d08ae", "DetectTime": "2024-05-21T12:25:19.965531+00:00", "EventTime": "2024-05-21T12:25:19.965553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8mpF4NHHAM3JFjj"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "53b946cd-63f7-4862-91ee-765db0a23594", "DetectTime": "2024-05-21T12:25:19.983725+00:00", "EventTime": "2024-05-21T12:25:19.983744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgoji92iuheH3C08oh"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "95485dcd-d8d0-4545-987a-a536251e41ee", "DetectTime": "2024-05-21T12:25:20.006809+00:00", "EventTime": "2024-05-21T12:25:20.006827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfh3aq1iUG7H1gvAB6"], "accumulated_threat_level": 4.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "8015afbd-1d47-4e89-8fc0-0ea2bcfedaed", "DetectTime": "2024-05-21T12:25:20.020133+00:00", "EventTime": "2024-05-21T12:25:20.020154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clh8ZJ2y3tK1C628qc"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "c0e8a3cb-7893-41de-87e2-d05de4e2f8bf", "DetectTime": "2024-05-21T12:25:20.036549+00:00", "EventTime": "2024-05-21T12:25:20.036571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.238.126.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaJIy3iiJvDkjKuZa"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "5d088352-6f1d-4ba7-ad5a-aae4b4ae2e1a", "DetectTime": "2024-05-21T12:25:20.047557+00:00", "EventTime": "2024-05-21T12:25:20.047574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "Connection to unknown destination port 19839/UDP destination IP 110.164.36.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdY3a51hgORdwbLwE5"], "accumulated_threat_level": 4.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "476e8264-e692-4041-870c-a9e72e6520f5", "DetectTime": "2024-05-21T12:25:20.070397+00:00", "EventTime": "2024-05-21T12:25:20.070429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.85.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccu0OB4iAX4jd91yzk"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "047abb4b-1976-4144-805f-85a33650ab94", "DetectTime": "2024-05-21T12:25:20.084855+00:00", "EventTime": "2024-05-21T12:25:20.084875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.140.209.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPvIf2G5WUTomBKEf"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "a47d72f5-d4c1-48f8-a230-b67eee8e056e", "DetectTime": "2024-05-21T12:25:20.096031+00:00", "EventTime": "2024-05-21T12:25:20.096050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl2b4G4YXwOmFLKUYg"], "accumulated_threat_level": 5.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "51587ffa-1cfd-4872-84bc-ceb2fe7be1e8", "DetectTime": "2024-05-21T12:25:20.112046+00:00", "EventTime": "2024-05-21T12:25:20.112064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.138.219.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjaqp376l18ySA9J8"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "ada00f86-9ae6-4a8e-b49d-625fb957ffdd", "DetectTime": "2024-05-21T12:25:20.134788+00:00", "EventTime": "2024-05-21T12:25:20.134806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxwl5y4dJj5oj4esx6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 15} +{"Format": "IDEA0", "ID": "78f21fcc-8563-4f2e-9f5f-44791aa68ab2", "DetectTime": "2024-05-21T12:25:20.153532+00:00", "EventTime": "2024-05-21T12:25:20.153549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cypl6xAwIUUHq8dNa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "419cb147-6da6-4203-a410-73956a0e9d32", "DetectTime": "2024-05-21T12:25:20.165403+00:00", "EventTime": "2024-05-21T12:25:20.165422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.206.15.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clfbya1KgOfg1UiuOi"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3ab7ebe5-fcde-449a-9d00-655bc4cdc7ef", "DetectTime": "2024-05-21T12:25:20.194794+00:00", "EventTime": "2024-05-21T12:25:20.194813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.143.178.97 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQcI85F5q6U45Tie"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "6526ec67-8ee2-4f22-aa7f-519d7a2fed98", "DetectTime": "2024-05-21T12:25:20.206854+00:00", "EventTime": "2024-05-21T12:25:20.206872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMDVv1KQVqwsYtzld"], "accumulated_threat_level": 7.999999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "95526dfb-360a-4e48-a36c-5c71d1d66244", "DetectTime": "2024-05-21T12:25:20.224724+00:00", "EventTime": "2024-05-21T12:25:20.224747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.28.99.184 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVtUA11kemYAPLQUh"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "36f065e9-cb32-4828-8476-f855b1dd8fe1", "DetectTime": "2024-05-21T12:25:20.250452+00:00", "EventTime": "2024-05-21T12:25:20.250473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.104.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMZ6p1baQFGXXUc3i"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "d8baf748-34ad-4af8-8963-9adb9aef8aec", "DetectTime": "2024-05-21T12:25:20.264025+00:00", "EventTime": "2024-05-21T12:25:20.264043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNBrT3uj1aJe91FMi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "34bc8794-080e-4593-886d-91df4709daa5", "DetectTime": "2024-05-21T12:25:20.276715+00:00", "EventTime": "2024-05-21T12:25:20.276733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.41.99.7 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6gpT3wtWFQ8LsuA7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "f6ba1b59-ce9f-4023-b57b-86d9bb36acb8", "DetectTime": "2024-05-21T12:25:20.309579+00:00", "EventTime": "2024-05-21T12:25:20.309597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeoBuGXKg4LUv1se9"], "accumulated_threat_level": 9.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "c9675275-6b7d-4d3e-9ce9-3be1ac080b0f", "DetectTime": "2024-05-21T12:25:20.314309+00:00", "EventTime": "2024-05-21T12:25:20.314327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.90.50.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfYzq2JiSX5LNFxBc"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "46fc583c-c133-4af1-958e-6653546a6fb0", "DetectTime": "2024-05-21T12:25:20.325963+00:00", "EventTime": "2024-05-21T12:25:20.325982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.147.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwzRgVzEuZsusdi4a"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "04c2f9eb-7e12-4e3a-9dd2-1ce3220c2f58", "DetectTime": "2024-05-21T12:25:20.353085+00:00", "EventTime": "2024-05-21T12:25:20.353104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 39.230.140.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuTdanXVgyzbh4h6"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "6415e716-de32-4ffe-b89f-d434e91b8869", "DetectTime": "2024-05-21T12:25:20.369408+00:00", "EventTime": "2024-05-21T12:25:20.369429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.74.172.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbihMg1ak2cKfxPxef"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "afdf7094-d57b-4978-881c-9d323a3f5549", "DetectTime": "2024-05-21T12:25:20.381250+00:00", "EventTime": "2024-05-21T12:25:20.381268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eFcj4E9wsu7DccFk"], "accumulated_threat_level": 10.4, "timewindow": 15} +{"Format": "IDEA0", "ID": "f83715ed-3b6d-43e8-acd4-c8e86e523197", "DetectTime": "2024-05-21T12:25:20.402090+00:00", "EventTime": "2024-05-21T12:25:20.402112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.135.135.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CudPBZU6KMaIaoLZ9"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "5fbd5711-d6e0-4c71-ae3e-9b7275bc1a7c", "DetectTime": "2024-05-21T12:25:20.418438+00:00", "EventTime": "2024-05-21T12:25:20.418459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0sBdc3rAe9YwCmxyd"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "ccfbc300-953c-4fc2-819d-b673cd693c94", "DetectTime": "2024-05-21T12:25:20.443730+00:00", "EventTime": "2024-05-21T12:25:20.443750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.65.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXSca19nT640LrMQ8"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "3d68f52d-9207-413e-8bce-b5a7a4693e04", "DetectTime": "2024-05-21T12:25:20.455144+00:00", "EventTime": "2024-05-21T12:25:20.455163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "Connection to unknown destination port 17571/UDP destination IP 37.232.21.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WLZ119SvSOmDCITj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 15} +{"Format": "IDEA0", "ID": "d0eb5c26-9ac2-4bfd-b75a-f0d07f017c9b", "DetectTime": "2024-05-21T12:25:20.462221+00:00", "EventTime": "2024-05-21T12:25:20.462240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.225.116.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqeJdJ3Lzj18px8W58"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "a6fd64df-853c-42de-8e8d-2a2de84ab0cc", "DetectTime": "2024-05-21T12:25:20.495297+00:00", "EventTime": "2024-05-21T12:25:20.495318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.134.236.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiiPHW1LTj9wPr3221"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "ee9ffaf2-8d48-446d-923a-46ece7158d51", "DetectTime": "2024-05-21T12:25:20.508120+00:00", "EventTime": "2024-05-21T12:25:20.508141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.225.175.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzB6Q1c3hJ03qQ3rb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "1ce0d32b-4d62-48d6-8645-c10e518657d9", "DetectTime": "2024-05-21T12:25:20.527237+00:00", "EventTime": "2024-05-21T12:25:20.527258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czj9eg2b8GsYeBx6ub"], "accumulated_threat_level": 12.000000000000002, "timewindow": 15} +{"Format": "Json", "ID": "1ce0d32b-4d62-48d6-8645-c10e518657d9", "DetectTime": "2024-05-21T12:25:20.527237+00:00", "EventTime": "2024-05-21T12:25:20.527258+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "1970-01-01T14:13:47.125117+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:25:20.706619)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "eae00f17-b628-4839-a7dc-590fee9c3121", "DetectTime": "2024-05-21T12:25:20.710393+00:00", "EventTime": "2024-05-21T12:25:20.710425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.228.140.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdNHe4v0bZRH3Le3j"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "bb719545-d9bf-4f19-bb1c-378d5abd73c9", "DetectTime": "2024-05-21T12:25:20.714958+00:00", "EventTime": "2024-05-21T12:25:20.714976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.223.90.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpGwi2QeKxt24OTdh"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "64ca7571-b67d-4067-984c-0cafa1d246af", "DetectTime": "2024-05-21T12:25:20.719514+00:00", "EventTime": "2024-05-21T12:25:20.719531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.235.49.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQInRkAVD2YdIWOb"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "f3ade277-b231-4b14-a6e5-f08ce0611a47", "DetectTime": "2024-05-21T12:25:20.730794+00:00", "EventTime": "2024-05-21T12:25:20.730811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWqQc2I28CpyYqQm"], "accumulated_threat_level": 0.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "73a6ec8e-09cb-4de6-a6e0-3999e3b46af0", "DetectTime": "2024-05-21T12:25:20.735169+00:00", "EventTime": "2024-05-21T12:25:20.735185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.102.220.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyTT22oHPkNkSPy7"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "d12ac1fa-e5a9-49b4-a949-b4a7effcb4d8", "DetectTime": "2024-05-21T12:25:20.745693+00:00", "EventTime": "2024-05-21T12:25:20.745712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.15.162.66 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM876k1FzlV9uvqWm4"], "accumulated_threat_level": 5.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "bc8d0e02-28cb-43f6-8699-f334128f14c9", "DetectTime": "2024-05-21T12:25:20.756427+00:00", "EventTime": "2024-05-21T12:25:20.756445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIegsn3n1EcDOVbRQ8"], "accumulated_threat_level": 1.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "3946a1ef-42b6-4f7c-8745-6e771a805455", "DetectTime": "2024-05-21T12:25:20.766657+00:00", "EventTime": "2024-05-21T12:25:20.766676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0sa23V8ixWg8Kmzj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 15} +{"Format": "IDEA0", "ID": "9d68fe3b-7139-4905-8f05-8830288f6981", "DetectTime": "2024-05-21T12:25:20.771159+00:00", "EventTime": "2024-05-21T12:25:20.771177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.22.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKtue16G29NTjtsVk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "f25b4f3b-d1ca-44fd-9059-cf3ac04109c7", "DetectTime": "2024-05-21T12:25:20.780972+00:00", "EventTime": "2024-05-21T12:25:20.780989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNnB12xDLCRiJi9x7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "37ed5af2-669d-4c17-85ae-f534fd642413", "DetectTime": "2024-05-21T12:25:20.790654+00:00", "EventTime": "2024-05-21T12:25:20.790672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWitrJ2wqH0vlVmtQ9"], "accumulated_threat_level": 4.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "d71c09a1-06ae-42c5-8032-90f1d8746443", "DetectTime": "2024-05-21T12:25:20.795474+00:00", "EventTime": "2024-05-21T12:25:20.795492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.90.187.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaugNOM2geesH7el"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "64a9c686-065a-4f7e-9cb2-bb8d3de322ab", "DetectTime": "2024-05-21T12:25:20.805990+00:00", "EventTime": "2024-05-21T12:25:20.806009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGThr4lpliMPVqZL4"], "accumulated_threat_level": 4.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "12ebc7c7-32c9-47b0-923e-047d557ed6b3", "DetectTime": "2024-05-21T12:25:20.824653+00:00", "EventTime": "2024-05-21T12:25:20.824682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YyEFnlYKTByctZ2"], "accumulated_threat_level": 5.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "3ae9790b-66d0-4677-a772-607195ea12e5", "DetectTime": "2024-05-21T12:25:20.830314+00:00", "EventTime": "2024-05-21T12:25:20.830332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fRmo1E7mR5SN4Lue"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "d180e68a-32a7-4494-a947-7bc3a65f2318", "DetectTime": "2024-05-21T12:25:20.834696+00:00", "EventTime": "2024-05-21T12:25:20.834714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.131.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwzeg2S1UHrDTJpSb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "ee923cb6-6372-435e-89d5-6cd7185c2505", "DetectTime": "2024-05-21T12:25:20.846253+00:00", "EventTime": "2024-05-21T12:25:20.846273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 2024/UDP destination IP 125.224.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjPMdv2qu7Aw1RmzQ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 15} +{"Format": "IDEA0", "ID": "a067f805-fec4-4144-b0da-2c4e7b32cbbd", "DetectTime": "2024-05-21T12:25:20.851038+00:00", "EventTime": "2024-05-21T12:25:20.851061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.200.82.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gpbA4I5QVCOpQC4h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "d30350a5-5bad-4736-96d5-e976267ffad1", "DetectTime": "2024-05-21T12:25:20.857050+00:00", "EventTime": "2024-05-21T12:25:20.857068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.10.163.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RlYa6d93FYKZQd2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c99063b4-2557-4faf-96ba-c434e0088b89", "DetectTime": "2024-05-21T12:25:20.870203+00:00", "EventTime": "2024-05-21T12:25:20.870221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbrk0d3Fk0rnBtBoT6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "55e1054b-2ec0-40b2-917a-9dc6a274f0de", "DetectTime": "2024-05-21T12:25:20.875292+00:00", "EventTime": "2024-05-21T12:25:20.875310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.0.130.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C00xEn1vLYacDQ86h3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "116782f5-559d-4055-9b3b-dd68b3c415ae", "DetectTime": "2024-05-21T12:25:20.889126+00:00", "EventTime": "2024-05-21T12:25:20.889147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0guWk170WMXu1fDV8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "8776640c-2d5d-4c25-83c3-f4171dda1fcf", "DetectTime": "2024-05-21T12:25:20.903490+00:00", "EventTime": "2024-05-21T12:25:20.903510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CELMNO27v9DR0RK8A9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "7a078d2d-ef30-4f1a-af87-4fbefb3dca32", "DetectTime": "2024-05-21T12:25:20.920288+00:00", "EventTime": "2024-05-21T12:25:20.920307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "Connection to unknown destination port 20394/UDP destination IP 36.76.237.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AneG5SakMemnI6i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "dbc684f6-6995-498b-904d-60290677b8e0", "DetectTime": "2024-05-21T12:25:20.990278+00:00", "EventTime": "2024-05-21T12:25:20.990302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34sw12FvPG46keFs5", "CMTUiy19ssN57ygOtc", "CyZekM1WAwivXCaYqi", "CcPVa72yKTaju3F637"], "accumulated_threat_level": 9.299999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "c7941968-185e-4e06-8c3b-78fd03c8164c", "DetectTime": "2024-05-21T12:25:21.009690+00:00", "EventTime": "2024-05-21T12:25:21.009708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.227.238.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmvuCU1UtVZ3f6Cw0k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "45e36ce1-14dc-4734-838a-205b4e6fc709", "DetectTime": "2024-05-21T12:25:21.014387+00:00", "EventTime": "2024-05-21T12:25:21.014431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDw2wwv5TNKGuPkYd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "cac0afe4-2007-43de-b562-1fb7c3ad5058", "DetectTime": "2024-05-21T12:25:21.038903+00:00", "EventTime": "2024-05-21T12:25:21.038922+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Sm0L2X5p3Ajeamtb"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "02c6caf2-ff32-4410-a15e-89895ffc2541", "DetectTime": "2024-05-21T12:25:21.049250+00:00", "EventTime": "2024-05-21T12:25:21.049268+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Sm0L2X5p3Ajeamtb"], "accumulated_threat_level": 8.399999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "6df3fd52-2de8-442b-a4f8-05efa0208ea6", "DetectTime": "2024-05-21T12:25:21.053912+00:00", "EventTime": "2024-05-21T12:25:21.053931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 91.137.174.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIkam3xyy4fYP79Cc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "9260fafb-b280-4670-b25a-b0a7012593a5", "DetectTime": "2024-05-21T12:25:21.060975+00:00", "EventTime": "2024-05-21T12:25:21.060995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelCAZ0lJA2BS2f6b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "57be2747-54df-47c0-b934-9f0ae9998f03", "DetectTime": "2024-05-21T12:25:21.073590+00:00", "EventTime": "2024-05-21T12:25:21.073612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDtCF378PfWcSN0Ye"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "e6a11612-e8fd-4f74-b2f8-0a27f13b11b4", "DetectTime": "2024-05-21T12:25:21.087512+00:00", "EventTime": "2024-05-21T12:25:21.087529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClLAH412pc3DaVABJ8"], "accumulated_threat_level": 10.1, "timewindow": 15} +{"Format": "IDEA0", "ID": "a8a5d592-53a3-4141-8eae-d2ca58d5baed", "DetectTime": "2024-05-21T12:25:21.103655+00:00", "EventTime": "2024-05-21T12:25:21.103684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoJm7o1QKbl8WQ76Z2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "4079497a-738c-496b-9422-6135c6e0d4ed", "DetectTime": "2024-05-21T12:25:21.140569+00:00", "EventTime": "2024-05-21T12:25:21.140589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.156.171.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCHQ0l1OMAAcpHNNAe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "3d1b274f-b08c-4941-9e6e-01200aa47fc8", "DetectTime": "2024-05-21T12:25:21.172956+00:00", "EventTime": "2024-05-21T12:25:21.172977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGttkv3a3vuM0JXeti"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "5ae99219-19f3-4499-8712-502ac0bb54f4", "DetectTime": "2024-05-21T12:25:21.190075+00:00", "EventTime": "2024-05-21T12:25:21.190094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.94.191.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRb5Ua2b3SQCJhA6Jb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "dbb84dec-086e-4352-8dd1-ea2ce9427a9f", "DetectTime": "2024-05-21T12:25:21.231008+00:00", "EventTime": "2024-05-21T12:25:21.231028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.169.229.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUulq24xZad3PQdSa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "e72c0c85-928f-49c6-b786-fca326ad8913", "DetectTime": "2024-05-21T12:25:21.268107+00:00", "EventTime": "2024-05-21T12:25:21.268125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.192.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCHYWbh108yoK7o6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "fc81e182-f9f0-45fb-b54e-589522967654", "DetectTime": "2024-05-21T12:25:21.344620+00:00", "EventTime": "2024-05-21T12:25:21.344638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.67.62.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLpy94kahmn7DVxUj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "edf228ac-e84d-4364-91c5-251ab8ebc645", "DetectTime": "2024-05-21T12:25:21.367880+00:00", "EventTime": "2024-05-21T12:25:21.367901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.112.175.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7nhZ2FtljsofOQ6k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c3d698ad-01c2-43f3-a216-dbaf7021f260", "DetectTime": "2024-05-21T12:25:21.395845+00:00", "EventTime": "2024-05-21T12:25:21.395867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.74.88.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vD2x3xz8BY8rLa6j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "fc9e5c75-e8ae-4cb5-b82f-d1969c024538", "DetectTime": "2024-05-21T12:25:21.465994+00:00", "EventTime": "2024-05-21T12:25:21.466014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cKzSKwnDgn6usr6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "9407564b-a89c-4fff-aa89-33f9b1e9601f", "DetectTime": "2024-05-21T12:25:21.490464+00:00", "EventTime": "2024-05-21T12:25:21.490487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.90.33.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqLNJHMcBTELEaD5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "fd2892a5-60ec-4b5a-be4c-718b6fcdda37", "DetectTime": "2024-05-21T12:25:21.515048+00:00", "EventTime": "2024-05-21T12:25:21.515068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnf5Ih3tN9yiFdohdb"], "accumulated_threat_level": 10.9, "timewindow": 15} +{"Format": "IDEA0", "ID": "20ae982f-d99d-4d48-87fb-2ca5472cebfe", "DetectTime": "2024-05-21T12:25:21.571299+00:00", "EventTime": "2024-05-21T12:25:21.571319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2uA9f2B93okb4kKLk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "656b51f3-8a9b-48ae-92ca-4c52ec0682f1", "DetectTime": "2024-05-21T12:25:21.576950+00:00", "EventTime": "2024-05-21T12:25:21.576969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.194.29 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4aNHA6L1WEfKvYel"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "b925fec2-6d0d-46c1-81e5-9118db3cba5d", "DetectTime": "2024-05-21T12:25:21.604381+00:00", "EventTime": "2024-05-21T12:25:21.604400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2TGSw3lvAejeQHC24"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "d14fa4c2-f6b1-4b06-90ae-f991c91ac3bd", "DetectTime": "2024-05-21T12:25:21.615548+00:00", "EventTime": "2024-05-21T12:25:21.615566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.253.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHcW993ph81oAjp3lb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "8b68aaad-bd49-4c12-870e-a8d15f95c275", "DetectTime": "2024-05-21T12:25:21.688668+00:00", "EventTime": "2024-05-21T12:25:21.688688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 149.3.4.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSNdx44TQtwrGqQRd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "4758bc00-c3fc-4ac5-ba77-b01078c53d69", "DetectTime": "2024-05-21T12:25:21.715309+00:00", "EventTime": "2024-05-21T12:25:21.715332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.92.101.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvDNM1dnkUrmELwL7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "fcbda6b5-96e0-4832-93dd-de12d427a789", "DetectTime": "2024-05-21T12:25:21.732370+00:00", "EventTime": "2024-05-21T12:25:21.732392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.123.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLT4mpF1nvTZC2Qf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "bb221a25-a8d1-4a8c-adb4-d36de2bbb31d", "DetectTime": "2024-05-21T12:25:21.839714+00:00", "EventTime": "2024-05-21T12:25:21.839732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrNhV15yztOzdzcx8"], "accumulated_threat_level": 11.700000000000001, "timewindow": 15} +{"Format": "IDEA0", "ID": "12172a7a-df01-493f-83ad-0d89aae70d53", "DetectTime": "2024-05-21T12:25:21.852417+00:00", "EventTime": "2024-05-21T12:25:21.852436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.108.94.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6LSE3j5e9YZNhL9g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "37d53ce3-665e-4faa-a588-9bb3788baa2f", "DetectTime": "2024-05-21T12:25:21.873776+00:00", "EventTime": "2024-05-21T12:25:21.873797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifnuE4rgdINGFyI46"], "accumulated_threat_level": 12.500000000000002, "timewindow": 15} +{"Format": "Json", "ID": "37d53ce3-665e-4faa-a588-9bb3788baa2f", "DetectTime": "2024-05-21T12:25:21.873776+00:00", "EventTime": "2024-05-21T12:25:21.873797+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "1970-01-01T14:45:01.947576+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:25:22.071371)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "c56fa93d-7f30-4d2a-9db8-aebc0ad3803c", "DetectTime": "2024-05-21T12:25:22.080886+00:00", "EventTime": "2024-05-21T12:25:22.080904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C082Ja3W04KlpM7lX3"], "accumulated_threat_level": 0.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "9655083a-77ee-48ea-b831-f3b85df511f1", "DetectTime": "2024-05-21T12:25:22.085297+00:00", "EventTime": "2024-05-21T12:25:22.085315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkDyPgxCOh9R6Ej"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "8dc8ff97-a10d-4a4b-98d7-98aed6be7c38", "DetectTime": "2024-05-21T12:25:22.089749+00:00", "EventTime": "2024-05-21T12:25:22.089768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9QDBs2TO8UD0T7MC3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "4e24f234-e6cb-4a86-8451-39487d9d852d", "DetectTime": "2024-05-21T12:25:22.094057+00:00", "EventTime": "2024-05-21T12:25:22.094075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.243.228.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWuOQYUY5bJ43HeDg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "0804f0a7-4dd3-4faf-88ee-8a346b74385a", "DetectTime": "2024-05-21T12:25:22.098702+00:00", "EventTime": "2024-05-21T12:25:22.098721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.77.238.196 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvPez1YloMvPV798j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "7b6c9c5a-3bb5-4966-ace0-e8e4a01b4cba", "DetectTime": "2024-05-21T12:25:22.103216+00:00", "EventTime": "2024-05-21T12:25:22.103235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTw6N3ZBw9ixwq9W5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "a1989935-de90-4210-8297-06f325021799", "DetectTime": "2024-05-21T12:25:22.107683+00:00", "EventTime": "2024-05-21T12:25:22.107702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.0.89.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDXu41Bu5SiUpRJkk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "587aa734-1711-472a-b02d-30c1c0a5d38a", "DetectTime": "2024-05-21T12:25:22.112358+00:00", "EventTime": "2024-05-21T12:25:22.112377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.34.7.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatyVX14Y9ZOnvEYhh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "d87d54cb-9733-40c4-b32e-6e112d8a2078", "DetectTime": "2024-05-21T12:25:22.124720+00:00", "EventTime": "2024-05-21T12:25:22.124741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4O2b3r1f26bV3Qsi"], "accumulated_threat_level": 1.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "87c04151-f347-4f3d-8e0a-7e18d8ba6261", "DetectTime": "2024-05-21T12:25:22.130491+00:00", "EventTime": "2024-05-21T12:25:22.130511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjYvq3ISUHC7Ua2c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "5ddf986a-7d2d-4bc3-91bf-a385d96580f9", "DetectTime": "2024-05-21T12:25:22.149037+00:00", "EventTime": "2024-05-21T12:25:22.149056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.241.115.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8ilk2nMvteDaPbte"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "75d4c288-5956-45d5-af09-63d3e1ebb120", "DetectTime": "2024-05-21T12:25:22.168218+00:00", "EventTime": "2024-05-21T12:25:22.168237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3KBMowmnt0T8ifg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 15} +{"Format": "IDEA0", "ID": "2a74b181-55f0-4b2c-96ba-0f8b563ee568", "DetectTime": "2024-05-21T12:25:22.190396+00:00", "EventTime": "2024-05-21T12:25:22.190429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJsaiA4SKtvzdtYcW"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "fcc11175-c97a-443c-b54a-0ebf5ef18540", "DetectTime": "2024-05-21T12:25:22.219210+00:00", "EventTime": "2024-05-21T12:25:22.219229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqocJB17eCzajz74Cd"], "accumulated_threat_level": 4.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "dc469f43-b32f-434f-8639-0ac1636fb971", "DetectTime": "2024-05-21T12:25:22.402105+00:00", "EventTime": "2024-05-21T12:25:22.402128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.62.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGegLT22fFtnZhPji"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "9295641b-e7c1-4230-bee5-0eeaefefc1e7", "DetectTime": "2024-05-21T12:25:22.454607+00:00", "EventTime": "2024-05-21T12:25:22.454627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.3.157.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RLn14ULwEDQcHqR1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "564656b1-426a-46ed-a7cd-f7af91cbf69b", "DetectTime": "2024-05-21T12:25:22.459614+00:00", "EventTime": "2024-05-21T12:25:22.459633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnNzd15vEGhnDpoc3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "ed28661e-b8cb-452a-8d7a-b441016a87bd", "DetectTime": "2024-05-21T12:25:22.464441+00:00", "EventTime": "2024-05-21T12:25:22.464463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.137.25.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTp8511XRTqz9AuoCj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "1f9b5947-3380-46b4-9154-2acc0ad8bec0", "DetectTime": "2024-05-21T12:25:22.469348+00:00", "EventTime": "2024-05-21T12:25:22.469369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.8.181.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCx11ZVb2YOBGhU9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "11bf2b56-3f3d-4654-8ea2-4a49b4914cda", "DetectTime": "2024-05-21T12:25:22.490460+00:00", "EventTime": "2024-05-21T12:25:22.490481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "Connection to unknown destination port 26273/UDP destination IP 151.245.129.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71pAJ1iZLOksdPpYb"], "accumulated_threat_level": 4.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "9e760816-bc96-4bad-9a39-4d87d20f3b9d", "DetectTime": "2024-05-21T12:25:22.522740+00:00", "EventTime": "2024-05-21T12:25:22.522758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEMnJrbygbpJdzW"], "accumulated_threat_level": 5.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "1b168de2-0b31-4ab4-b20f-992df5de4904", "DetectTime": "2024-05-21T12:25:22.547385+00:00", "EventTime": "2024-05-21T12:25:22.547403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMWxK2EPY2jr0id6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 15} +{"Format": "IDEA0", "ID": "8fdae066-fa28-4db6-95f0-2f04d452a294", "DetectTime": "2024-05-21T12:25:22.569608+00:00", "EventTime": "2024-05-21T12:25:22.569628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OOHp4yDxiupLUE6i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "ca15393c-9699-4463-9188-c22d2a1f9b17", "DetectTime": "2024-05-21T12:25:22.593875+00:00", "EventTime": "2024-05-21T12:25:22.593894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdpBs2CC6k9Ox37g3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "7040890c-7771-4a4f-826e-ce3d68513049", "DetectTime": "2024-05-21T12:25:22.605064+00:00", "EventTime": "2024-05-21T12:25:22.605085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.213.229.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cagawx1eiZXzXXrC11"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "3c82e56a-b0b9-419f-91e7-b77dc8c574d3", "DetectTime": "2024-05-21T12:25:22.627264+00:00", "EventTime": "2024-05-21T12:25:22.627281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWI4I8rMxVMKXIKEd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "ac33a153-ee44-4145-9dba-36150011ce68", "DetectTime": "2024-05-21T12:25:22.632620+00:00", "EventTime": "2024-05-21T12:25:22.632638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.216.253.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBxbf3YbNVgMf6Wh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "a44adfd6-7d07-4d95-b4bf-7fe4b229db29", "DetectTime": "2024-05-21T12:25:22.661471+00:00", "EventTime": "2024-05-21T12:25:22.661488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOnelEqQcDH8ZqQ9"], "accumulated_threat_level": 9.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "1ea10d51-6d10-4f00-8a82-9ee43318c831", "DetectTime": "2024-05-21T12:25:22.678258+00:00", "EventTime": "2024-05-21T12:25:22.678277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.141.203.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE5OH5dKajry84agb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "fc73391f-984a-45a8-b9cc-61de872d0d8a", "DetectTime": "2024-05-21T12:25:22.699375+00:00", "EventTime": "2024-05-21T12:25:22.699394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "Connection to unknown destination port 4092/UDP destination IP 70.252.131.148. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yGvR1WE2QUJj2dc"], "accumulated_threat_level": 10.4, "timewindow": 15} +{"Format": "IDEA0", "ID": "cea7eaa9-9c94-4b05-9855-c392f92c510f", "DetectTime": "2024-05-21T12:25:22.706729+00:00", "EventTime": "2024-05-21T12:25:22.706747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtxtw2SrfElLcTyz9", "CACBIO2S4PiiFS52Dh", "CyE4Dj1kujcIbkFShg", "CtNECd1SV2sPzCaOa4"], "accumulated_threat_level": 10.9, "timewindow": 15} +{"Format": "IDEA0", "ID": "abfca685-2daa-42ad-b812-74cb7628ae66", "DetectTime": "2024-05-21T12:25:22.711841+00:00", "EventTime": "2024-05-21T12:25:22.711859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAtuH3uU2L9Tmnlf6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c8fd8fb8-8896-4e7f-992a-2a7ab4a6b0e7", "DetectTime": "2024-05-21T12:25:22.733915+00:00", "EventTime": "2024-05-21T12:25:22.733933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIkYKyAiiKa5rQ5i6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 15} +{"Format": "IDEA0", "ID": "884933f7-6880-4ceb-9570-fb41c3322b54", "DetectTime": "2024-05-21T12:25:22.741729+00:00", "EventTime": "2024-05-21T12:25:22.741750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.165.112.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjFbE2gpc1kVhy9pc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "0dd9bc0a-be39-4764-a2fa-ab0abcb12d3f", "DetectTime": "2024-05-21T12:25:22.766658+00:00", "EventTime": "2024-05-21T12:25:22.766677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQukoq18YQ69oaHM3a"], "accumulated_threat_level": 12.500000000000002, "timewindow": 15} +{"Format": "Json", "ID": "0dd9bc0a-be39-4764-a2fa-ab0abcb12d3f", "DetectTime": "2024-05-21T12:25:22.766658+00:00", "EventTime": "2024-05-21T12:25:22.766677+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "1970-01-01T14:45:05.713961+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:25:22.995536)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "e2b95701-8fe0-4a34-9e72-d1522f135ff6", "DetectTime": "2024-05-21T12:25:22.999449+00:00", "EventTime": "2024-05-21T12:25:22.999467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.251.66.43 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6juCE3T6ug1wUdXb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c6304d9a-3fe3-40b8-8ab8-958024542182", "DetectTime": "2024-05-21T12:25:23.004774+00:00", "EventTime": "2024-05-21T12:25:23.004797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.19.57.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cql7zA2J3rfr2Bcpxh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "6e49052e-dafc-4a6d-854f-6cc413aae5d1", "DetectTime": "2024-05-21T12:25:23.016293+00:00", "EventTime": "2024-05-21T12:25:23.016312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEXdipMdjyreWtshd"], "accumulated_threat_level": 0.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "cc8d6748-23ef-435a-b5f1-bbd3e11550c1", "DetectTime": "2024-05-21T12:25:23.020848+00:00", "EventTime": "2024-05-21T12:25:23.020866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShqTd3FCWxWmfht5e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "76be6b60-cc59-4fae-88d7-196c438da82d", "DetectTime": "2024-05-21T12:25:23.032794+00:00", "EventTime": "2024-05-21T12:25:23.032815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtitAZWb33XEgcdgh"], "accumulated_threat_level": 1.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "be6bb6c2-a0af-4bd2-ad51-0739252003f6", "DetectTime": "2024-05-21T12:25:23.062433+00:00", "EventTime": "2024-05-21T12:25:23.062453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9oCu2GU6ERBw5cG1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 15} +{"Format": "IDEA0", "ID": "4c64a9cb-361d-4490-a9dd-cfa33ee3dffe", "DetectTime": "2024-05-21T12:25:23.085425+00:00", "EventTime": "2024-05-21T12:25:23.085446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62lDu4XVHJZDgToN7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "26fc2ec0-458a-4769-90ee-e01370ea41f9", "DetectTime": "2024-05-21T12:25:23.118825+00:00", "EventTime": "2024-05-21T12:25:23.118845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqxYZM1QhAXp0WrVsl"], "accumulated_threat_level": 4.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "ca7f5714-6748-4cbc-9928-6606a6399b49", "DetectTime": "2024-05-21T12:25:23.152517+00:00", "EventTime": "2024-05-21T12:25:23.152535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8l7xRUzFKKgIBtj"], "accumulated_threat_level": 4.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "3aef8e08-cfc9-4beb-851c-4519ac8b95fb", "DetectTime": "2024-05-21T12:25:23.177009+00:00", "EventTime": "2024-05-21T12:25:23.177031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FMsl3LKzSwqi4HS6"], "accumulated_threat_level": 5.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "94447f9f-16d7-4c41-9668-805fe2a36e0a", "DetectTime": "2024-05-21T12:25:23.211637+00:00", "EventTime": "2024-05-21T12:25:23.211654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmuXxRpQJ2O2VOqd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 15} +{"Format": "IDEA0", "ID": "4aa61969-4465-4494-aa95-4e70ece5dbbd", "DetectTime": "2024-05-21T12:25:23.241182+00:00", "EventTime": "2024-05-21T12:25:23.241202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTzdMAqAjCj4vfb"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "de11bbf0-1a79-4816-9199-0148c06a109a", "DetectTime": "2024-05-21T12:25:23.252414+00:00", "EventTime": "2024-05-21T12:25:23.252433+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTzdMAqAjCj4vfb"], "accumulated_threat_level": 8.899999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "22bcd408-48f8-4f04-990c-ec7b977d41e2", "DetectTime": "2024-05-21T12:25:23.372716+00:00", "EventTime": "2024-05-21T12:25:23.372739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNCGGn22qhw9GVk2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "4db6fc98-313b-4703-bdd4-5cc0f9d2498e", "DetectTime": "2024-05-21T12:25:23.399164+00:00", "EventTime": "2024-05-21T12:25:23.399185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHhsOr2172UxkjAiOc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c1d4732b-45c2-4d4b-987b-ffdad0510234", "DetectTime": "2024-05-21T12:25:23.462382+00:00", "EventTime": "2024-05-21T12:25:23.462418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4q5E4RYXnKwp30i5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "7aea5a1f-8b9f-4c39-a718-41c5c0232a4c", "DetectTime": "2024-05-21T12:25:23.494475+00:00", "EventTime": "2024-05-21T12:25:23.494495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTaza4ypUHDLOwG1a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "3eedf77c-b00a-4424-a257-7091d749359f", "DetectTime": "2024-05-21T12:25:23.510828+00:00", "EventTime": "2024-05-21T12:25:23.510846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAS9km3JrZqNfyNkzj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "107eba83-eebf-44fd-b4a6-fac829bcac4c", "DetectTime": "2024-05-21T12:25:23.522961+00:00", "EventTime": "2024-05-21T12:25:23.522980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAGhJ13OOSqHV7PPg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "6a2cacf1-a908-4564-88d5-4b5dfa519a21", "DetectTime": "2024-05-21T12:25:23.545855+00:00", "EventTime": "2024-05-21T12:25:23.545873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgjZ32ZDGPe8Zg2m3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "33a4097c-870e-4975-9235-5868338bf20e", "DetectTime": "2024-05-21T12:25:23.558425+00:00", "EventTime": "2024-05-21T12:25:23.558449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vt173I4veiT1Q0Ye"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "bac30c05-23db-465f-8fd1-78632dca5a30", "DetectTime": "2024-05-21T12:25:23.583239+00:00", "EventTime": "2024-05-21T12:25:23.583259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnjTn4zkvoI2A5Rx9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 15} +{"Format": "IDEA0", "ID": "fbb368fb-f7a8-4861-8377-ce053c09bd87", "DetectTime": "2024-05-21T12:25:23.587931+00:00", "EventTime": "2024-05-21T12:25:23.587949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuwJt42MCBbhXLVb5k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "dc6ebf07-631b-4262-820a-5a320a38fce7", "DetectTime": "2024-05-21T12:25:23.613322+00:00", "EventTime": "2024-05-21T12:25:23.613344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUf8z4URFie0T4Zgd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "1fd2876a-b1ed-4e58-88fe-b7e688eba9d0", "DetectTime": "2024-05-21T12:25:23.624740+00:00", "EventTime": "2024-05-21T12:25:23.624758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy3O3h34G5ALafY2si"], "accumulated_threat_level": 9.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "1b381323-8ddc-4de4-95d9-38101839f987", "DetectTime": "2024-05-21T12:25:23.636420+00:00", "EventTime": "2024-05-21T12:25:23.636437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1PbX3fvptMiTLUq7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "1a10f737-320e-44d0-8302-ef239cd36453", "DetectTime": "2024-05-21T12:25:23.657658+00:00", "EventTime": "2024-05-21T12:25:23.657677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPx1sdcTjAbgIuRe"], "accumulated_threat_level": 10.4, "timewindow": 15} +{"Format": "IDEA0", "ID": "f34bc49d-5b14-48d8-a7d9-6a5f901a4106", "DetectTime": "2024-05-21T12:25:23.683657+00:00", "EventTime": "2024-05-21T12:25:23.683678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSG2of46lQ4xduyqP8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 15} +{"Format": "IDEA0", "ID": "5eb6d32a-9d86-46d7-9b00-116c59aa0f6f", "DetectTime": "2024-05-21T12:25:23.707049+00:00", "EventTime": "2024-05-21T12:25:23.707068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ggxK9PjaV3Kodcc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 15} +{"Format": "Json", "ID": "5eb6d32a-9d86-46d7-9b00-116c59aa0f6f", "DetectTime": "2024-05-21T12:25:23.707049+00:00", "EventTime": "2024-05-21T12:25:23.707068+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "1970-01-01T14:45:41.922304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:25:23.928941)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e1d1c43f-b872-4cd7-825b-6b7ad259c5fd", "DetectTime": "2024-05-21T12:25:23.941029+00:00", "EventTime": "2024-05-21T12:25:23.941060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSAZz727ImNO0Bfupj"], "accumulated_threat_level": 0.8, "timewindow": 15} +{"Format": "IDEA0", "ID": "51864942-6245-4b14-ba8c-fee987a9e1c8", "DetectTime": "2024-05-21T12:25:23.952542+00:00", "EventTime": "2024-05-21T12:25:23.952561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTQHT3yG6MuFUMGYb"], "accumulated_threat_level": 1.6, "timewindow": 15} +{"Format": "IDEA0", "ID": "d565dc0b-84d6-4283-9047-a236cf73103e", "DetectTime": "2024-05-21T12:25:23.957873+00:00", "EventTime": "2024-05-21T12:25:23.957892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7yOq2TIP6otX2w4j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "7c7e693f-f2dc-4b58-925f-f29f85ab214d", "DetectTime": "2024-05-21T12:25:23.962762+00:00", "EventTime": "2024-05-21T12:25:23.962780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COvV3U1OSrJYnwm0th"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "dcd8ed9f-c114-4847-be38-3a891b2b9a7e", "DetectTime": "2024-05-21T12:25:23.973119+00:00", "EventTime": "2024-05-21T12:25:23.973137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUJoD2mfnG4DKVJB2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 15} +{"Format": "IDEA0", "ID": "8b17e3bb-d309-44b0-9725-2d407f8b4de2", "DetectTime": "2024-05-21T12:25:23.983150+00:00", "EventTime": "2024-05-21T12:25:23.983168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDG3cCuQFjyHdyFac"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "2536fa32-e1f0-43ba-bccd-908782b3f364", "DetectTime": "2024-05-21T12:25:23.987490+00:00", "EventTime": "2024-05-21T12:25:23.987508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vdfh3HEHOGstYSM4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c5ea3253-b24f-49c5-836a-a4473e51d5ea", "DetectTime": "2024-05-21T12:25:24.017254+00:00", "EventTime": "2024-05-21T12:25:24.017277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CliC2y4hirAOHzdegj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "4646ccc1-79fb-489a-b25d-a9efc2d12004", "DetectTime": "2024-05-21T12:25:24.077969+00:00", "EventTime": "2024-05-21T12:25:24.077991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCal8h3eCyGdhy0sw7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "e6efa402-cdb6-41b0-a725-5095125f8dda", "DetectTime": "2024-05-21T12:25:24.096199+00:00", "EventTime": "2024-05-21T12:25:24.096218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdfgMG2AgtA68XS2J5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "8c3622b2-b38e-4ab9-aec9-e78263849c88", "DetectTime": "2024-05-21T12:25:24.117245+00:00", "EventTime": "2024-05-21T12:25:24.117268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFDqe3uujXhBq7O49"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "43246c51-ce63-4818-8a1c-3ec6babd10cd", "DetectTime": "2024-05-21T12:25:24.134112+00:00", "EventTime": "2024-05-21T12:25:24.134131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.232.130 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIgnB2PzCjqNt3sL6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "d98a0e0d-0111-4812-840a-d49a796712d3", "DetectTime": "2024-05-21T12:25:24.213485+00:00", "EventTime": "2024-05-21T12:25:24.213510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce4ggE40hcMhobV9A"], "accumulated_threat_level": 0.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "adbb9397-b637-4057-b783-ab332597394e", "DetectTime": "2024-05-21T12:25:24.474634+00:00", "EventTime": "2024-05-21T12:25:24.474655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPYkZtvO6CSynrPej"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "2167fccd-5aa6-4e6a-9d93-8ed7e7f4137c", "DetectTime": "2024-05-21T12:25:24.509306+00:00", "EventTime": "2024-05-21T12:25:24.509326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9x2c3YdWYYoGppy5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "f78ba0aa-0951-428a-8933-210e4d8afb65", "DetectTime": "2024-05-21T12:25:24.629032+00:00", "EventTime": "2024-05-21T12:25:24.629056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34yadQ5i5gkBSsIh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "aa8c745d-961f-4d26-ace4-a589356b8500", "DetectTime": "2024-05-21T12:25:24.646508+00:00", "EventTime": "2024-05-21T12:25:24.646528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUzjV1XsWIwBF0Uk8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "c5e0a8ab-9256-4d61-8f65-4cc138d4db55", "DetectTime": "2024-05-21T12:25:24.753778+00:00", "EventTime": "2024-05-21T12:25:24.753797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRX7VX3hp7fK8Ha3qb", "CTwkcP6OQWUM1Nt41", "CP01sF1Pf5AJe5U4Jg", "CiMUR82FiofWRn5Xll"], "accumulated_threat_level": 1.3, "timewindow": 16} +{"Format": "IDEA0", "ID": "8074cf43-5742-4f73-82cd-bcbd4cb2f6b4", "DetectTime": "2024-05-21T12:25:24.874238+00:00", "EventTime": "2024-05-21T12:25:24.874257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.235.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5nkKA2nx5asIrDfSj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "22a473dc-70da-4e25-80b9-c89e295e12b8", "DetectTime": "2024-05-21T12:25:25.108595+00:00", "EventTime": "2024-05-21T12:25:25.108617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdPdhrB09rYwJYgb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "9e59a73f-29ae-4ec8-bafb-b05b7e70e502", "DetectTime": "2024-05-21T12:25:25.171636+00:00", "EventTime": "2024-05-21T12:25:25.171655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UJQf3jwFvwhC8gP9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "de243486-4c74-481b-9538-d1dadf9ab102", "DetectTime": "2024-05-21T12:25:25.185097+00:00", "EventTime": "2024-05-21T12:25:25.185117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGud003zKmjvVxvPR2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "1c3a336f-36e8-48dc-800a-a47984910080", "DetectTime": "2024-05-21T12:25:25.274323+00:00", "EventTime": "2024-05-21T12:25:25.274341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanzBa38cFBwLlkRBe"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "049c127d-497f-46ea-940a-c1569c3b09b1", "DetectTime": "2024-05-21T12:25:25.288248+00:00", "EventTime": "2024-05-21T12:25:25.288266+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanzBa38cFBwLlkRBe"], "accumulated_threat_level": 9.399999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "da513639-43f5-416b-be79-24bdc2d4884b", "DetectTime": "2024-05-21T12:25:25.318584+00:00", "EventTime": "2024-05-21T12:25:25.318602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSluE74mWVMBCH2dIa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "13c12303-cbfa-4208-9876-98adbb5b858e", "DetectTime": "2024-05-21T12:25:25.481537+00:00", "EventTime": "2024-05-21T12:25:25.481558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdMcj3GpJQuLqlJD6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "9b64247d-e952-4008-b6cd-3031d63575ae", "DetectTime": "2024-05-21T12:25:25.505001+00:00", "EventTime": "2024-05-21T12:25:25.505022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTfnB76CG2ETwDi2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "ffcecd17-73f8-4277-b521-74d2a4be152b", "DetectTime": "2024-05-21T12:25:25.529245+00:00", "EventTime": "2024-05-21T12:25:25.529267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.90.50.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLCVr1uFykHOZUiGh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "b5e9358d-5348-4238-aeba-c2d9f1209e3b", "DetectTime": "2024-05-21T12:25:25.657838+00:00", "EventTime": "2024-05-21T12:25:25.657861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwgNDd1B6ZzT0Ak5V8", "CMfIQg3cj9cA2LfMHd", "Cq3mki3y5dPKFMevTh", "CC4Fqp1ASBDD3QT7S"], "accumulated_threat_level": 1.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "ec10b5c9-ae2b-49b7-a85a-856e7f79aa94", "DetectTime": "2024-05-21T12:25:25.690486+00:00", "EventTime": "2024-05-21T12:25:25.690508+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COw35i2V7RNbKRs8N9"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "cb3e3aee-3991-4b28-b163-f40845aef251", "DetectTime": "2024-05-21T12:25:25.702500+00:00", "EventTime": "2024-05-21T12:25:25.702519+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COw35i2V7RNbKRs8N9"], "accumulated_threat_level": 9.899999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "802f328b-6276-4d54-b42c-14dc9fadd5a3", "DetectTime": "2024-05-21T12:25:25.759310+00:00", "EventTime": "2024-05-21T12:25:25.759327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cojlhg2aWnWNYNwUWg"], "accumulated_threat_level": 2.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "80af8ff6-664e-4279-8e96-738dd9720424", "DetectTime": "2024-05-21T12:25:25.780847+00:00", "EventTime": "2024-05-21T12:25:25.780864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaCyztNr2SxpAqS6"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 16} +{"Format": "IDEA0", "ID": "fdf7bf3a-3a69-4ef5-964c-267dc89179d6", "DetectTime": "2024-05-21T12:25:25.816112+00:00", "EventTime": "2024-05-21T12:25:25.816133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CONhnjAExBcxbZuLg"], "accumulated_threat_level": 4.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "eaa40ea3-7c7a-4668-8cd8-16bc153c83c4", "DetectTime": "2024-05-21T12:25:25.924422+00:00", "EventTime": "2024-05-21T12:25:25.924443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.65.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYfa62G53DX52iVz6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "efba4975-d8a3-4525-8800-dcb4f2da221b", "DetectTime": "2024-05-21T12:25:25.958383+00:00", "EventTime": "2024-05-21T12:25:25.958416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRLN773FOZkBXVVDZj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "96fcd399-a355-4c88-95dc-8abbe3bffc55", "DetectTime": "2024-05-21T12:25:25.984425+00:00", "EventTime": "2024-05-21T12:25:25.984454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.135.135.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBKSDIy5ieiq4Kkf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "77087a10-1d1a-4b91-8644-647d00340096", "DetectTime": "2024-05-21T12:25:26.030247+00:00", "EventTime": "2024-05-21T12:25:26.030265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Uz1gZblYcdpLFr"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "217e2670-2348-40eb-9e3b-9b50aca8fe01", "DetectTime": "2024-05-21T12:25:26.048935+00:00", "EventTime": "2024-05-21T12:25:26.048956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.200.82.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C96p992PBeAJxhif86"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "1066c00a-ac1a-4351-8d41-3efa1581cfbf", "DetectTime": "2024-05-21T12:25:26.073814+00:00", "EventTime": "2024-05-21T12:25:26.073834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKXhdD414W80xQlRl"], "accumulated_threat_level": 5.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "d506f7b3-796d-4b7f-b2ac-3e45580028b0", "DetectTime": "2024-05-21T12:25:26.100470+00:00", "EventTime": "2024-05-21T12:25:26.100490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccudz41Cdit9RmTHf3"], "accumulated_threat_level": 5.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "614985ee-78df-4e83-8f3c-f60c8b84638b", "DetectTime": "2024-05-21T12:25:26.165995+00:00", "EventTime": "2024-05-21T12:25:26.166017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSObZBrdtLABkUoXi"], "accumulated_threat_level": 6.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "acea1845-3a10-4388-922d-6957bead986f", "DetectTime": "2024-05-21T12:25:26.220166+00:00", "EventTime": "2024-05-21T12:25:26.220184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuCJ3MN9unA27lbj"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 16} +{"Format": "IDEA0", "ID": "b2550658-248e-4bd7-baae-271e86167679", "DetectTime": "2024-05-21T12:25:26.256268+00:00", "EventTime": "2024-05-21T12:25:26.256286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5j95R0ogEoxRUt9"], "accumulated_threat_level": 8.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "f2ff9070-9e09-4433-a207-bebd88151cf6", "DetectTime": "2024-05-21T12:25:26.282271+00:00", "EventTime": "2024-05-21T12:25:26.282290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEGivpSAkpBirAff"], "accumulated_threat_level": 9.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "d81dfb6c-b669-45e1-af19-f6041b4f7087", "DetectTime": "2024-05-21T12:25:26.316225+00:00", "EventTime": "2024-05-21T12:25:26.316244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTNtW1e0PMfc9qT3l"], "accumulated_threat_level": 9.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "44428560-699c-47de-ace3-f666c1c05988", "DetectTime": "2024-05-21T12:25:26.337523+00:00", "EventTime": "2024-05-21T12:25:26.337544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZsyV1f51pBUpSOw7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "126ea15f-569b-499d-94c8-9aa5ddbc758c", "DetectTime": "2024-05-21T12:25:26.358600+00:00", "EventTime": "2024-05-21T12:25:26.358617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpOHx1OcM90yWyP0a"], "accumulated_threat_level": 10.600000000000001, "timewindow": 16} +{"Format": "IDEA0", "ID": "60615854-87b8-483b-b640-551d6ba6cfae", "DetectTime": "2024-05-21T12:25:26.435185+00:00", "EventTime": "2024-05-21T12:25:26.435205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMKXW30mQLAuQbWP1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "6e4a12ad-4704-4558-819e-37dfb499b6fe", "DetectTime": "2024-05-21T12:25:26.449317+00:00", "EventTime": "2024-05-21T12:25:26.449338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 91.137.174.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxsM42bSF9cqge1H7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "2d2fdd0f-1e91-4916-a965-b70df32d4078", "DetectTime": "2024-05-21T12:25:26.470424+00:00", "EventTime": "2024-05-21T12:25:26.470446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbg4dm4iX3ta7WUiE9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "bf39a9ef-264e-4d78-85f9-974932215aab", "DetectTime": "2024-05-21T12:25:26.486508+00:00", "EventTime": "2024-05-21T12:25:26.486528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwy3Z3Cvgx8RVip27"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "f801b7b1-4541-4051-8e11-f929cbb9e2c6", "DetectTime": "2024-05-21T12:25:26.507453+00:00", "EventTime": "2024-05-21T12:25:26.507477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJI6b1y0vB1THdB72"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "9e5c0a83-3a28-431b-8f40-eb6ebb6cad7d", "DetectTime": "2024-05-21T12:25:26.518946+00:00", "EventTime": "2024-05-21T12:25:26.518963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFR3htJPwdXdxFVli"], "accumulated_threat_level": 11.400000000000002, "timewindow": 16} +{"Format": "IDEA0", "ID": "e5fc9f9c-3295-454a-9480-105bc403b797", "DetectTime": "2024-05-21T12:25:26.535365+00:00", "EventTime": "2024-05-21T12:25:26.535386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3Qp02r5N17IzmwB1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "10304f21-8898-41b1-b23b-940aefb68dd0", "DetectTime": "2024-05-21T12:25:26.552115+00:00", "EventTime": "2024-05-21T12:25:26.552132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Choa6KjuPSNXkm4W6"], "accumulated_threat_level": 12.200000000000003, "timewindow": 16} +{"Format": "Json", "ID": "10304f21-8898-41b1-b23b-940aefb68dd0", "DetectTime": "2024-05-21T12:25:26.552115+00:00", "EventTime": "2024-05-21T12:25:26.552132+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "1970-01-01T15:18:53.515795+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2024/05/21 12:25:26.773378)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 16, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "f35b2527-a21f-42d5-8b97-f23006297685", "DetectTime": "2024-05-21T12:25:26.777086+00:00", "EventTime": "2024-05-21T12:25:26.777103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgo2g3JVPxdmyiOnd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "187aeb25-d3e6-48fd-8eee-7db59c2b64b1", "DetectTime": "2024-05-21T12:25:26.789583+00:00", "EventTime": "2024-05-21T12:25:26.789602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Sh7u24sQ2aPZiRD5"], "accumulated_threat_level": 0.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "8e7cc978-64a9-4135-99ba-2758f53bc9d6", "DetectTime": "2024-05-21T12:25:26.795761+00:00", "EventTime": "2024-05-21T12:25:26.795784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeOMsZ3YSvANTzRiL9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "4fcfb382-a252-4dac-8026-9f6e7e1bd227", "DetectTime": "2024-05-21T12:25:26.807725+00:00", "EventTime": "2024-05-21T12:25:26.807744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvlQTXWGhrW02Bl4"], "accumulated_threat_level": 1.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "bf19ecf0-a46c-40ea-8c0b-b0fb15e9fe3c", "DetectTime": "2024-05-21T12:25:26.812465+00:00", "EventTime": "2024-05-21T12:25:26.812483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EVzB3GVlVAunhLW1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "f19deec6-ae9f-43da-8d5c-1a9bd33d30af", "DetectTime": "2024-05-21T12:25:26.822216+00:00", "EventTime": "2024-05-21T12:25:26.822234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPL9KS3wZM50jaCva5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 16} +{"Format": "IDEA0", "ID": "45c4c020-ed77-42f4-8a20-4cebf0773ce0", "DetectTime": "2024-05-21T12:25:26.826987+00:00", "EventTime": "2024-05-21T12:25:26.827005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.92.101.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzJxj4I3Mqofv1Ia3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "ab80860e-d687-4c7b-9dc1-6a3f62c4614f", "DetectTime": "2024-05-21T12:25:26.831516+00:00", "EventTime": "2024-05-21T12:25:26.831534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 149.3.4.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87J5isTm7u1nKL78"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "aeaff51a-bbee-40c9-a068-6028b0f44202", "DetectTime": "2024-05-21T12:25:26.836524+00:00", "EventTime": "2024-05-21T12:25:26.836544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU0fu0nUFuKTW6S3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "0fb0eca9-4d9e-495b-88b5-e204bedbb632", "DetectTime": "2024-05-21T12:25:26.847323+00:00", "EventTime": "2024-05-21T12:25:26.847343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGiUw1ZirZPnvaL2k"], "accumulated_threat_level": 3.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "e9d1c3b3-0649-4d02-9322-fbd9b9b59fc5", "DetectTime": "2024-05-21T12:25:26.852118+00:00", "EventTime": "2024-05-21T12:25:26.852136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHB1eRxbv2qdmgPM"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "8fcc904c-dcda-4212-8e3f-3bf790a9967d", "DetectTime": "2024-05-21T12:25:26.864404+00:00", "EventTime": "2024-05-21T12:25:26.864424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyYUa2iz3IYfyMcWe"], "accumulated_threat_level": 4.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "ecaae32c-7fb2-4b6a-ae43-5917e60f8225", "DetectTime": "2024-05-21T12:25:26.870268+00:00", "EventTime": "2024-05-21T12:25:26.870289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihGev3pXdzzWxnNul"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "8a9da65b-015c-4784-9366-5eebbc0b064d", "DetectTime": "2024-05-21T12:25:26.882394+00:00", "EventTime": "2024-05-21T12:25:26.882422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjqZKIgkkI4Umlq"], "accumulated_threat_level": 4.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "561d651c-a4c9-49c2-9ba3-bb08d4762513", "DetectTime": "2024-05-21T12:25:26.886984+00:00", "EventTime": "2024-05-21T12:25:26.887002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgq1PB3l5yqC9kyAC"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "5bb610eb-279f-43e4-831d-1fbc0f7c2acc", "DetectTime": "2024-05-21T12:25:26.905895+00:00", "EventTime": "2024-05-21T12:25:26.905916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtIhW1ojuEdLPMPpl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "15d91d7e-454b-435e-8718-361871dc2324", "DetectTime": "2024-05-21T12:25:26.923301+00:00", "EventTime": "2024-05-21T12:25:26.923323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZZWl1AgvTL1XaITc"], "accumulated_threat_level": 5.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "11bebd2b-beef-48ef-80c5-51a800af4c1c", "DetectTime": "2024-05-21T12:25:26.946566+00:00", "EventTime": "2024-05-21T12:25:26.946584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrekTohK90f5Tl2g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 16} +{"Format": "IDEA0", "ID": "a82fa44a-f837-4644-939a-184b685f526a", "DetectTime": "2024-05-21T12:25:27.002845+00:00", "EventTime": "2024-05-21T12:25:27.002864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC0bP412vLI1DxgMB3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "23e35d7f-2eac-4ae3-b188-118757bf77da", "DetectTime": "2024-05-21T12:25:27.025546+00:00", "EventTime": "2024-05-21T12:25:27.025565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqYlB2x7kxOZrxQY8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "72fe0e6f-897d-412a-a780-d3e99984a1ac", "DetectTime": "2024-05-21T12:25:27.048885+00:00", "EventTime": "2024-05-21T12:25:27.048905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cddlb71SYaQtgzziA3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "58b683b2-7a9a-49e9-a28e-c61c605b3de8", "DetectTime": "2024-05-21T12:25:27.083405+00:00", "EventTime": "2024-05-21T12:25:27.083427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDLkW3X6RFmOctxDf"], "accumulated_threat_level": 9.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "19da74f0-36d8-4d09-88ae-5bcd5b6d466a", "DetectTime": "2024-05-21T12:25:27.120974+00:00", "EventTime": "2024-05-21T12:25:27.120993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP97IQHmLiB0GTL28"], "accumulated_threat_level": 10.4, "timewindow": 16} +{"Format": "IDEA0", "ID": "d28c6386-717b-42a9-acab-cc1ffd24ea5b", "DetectTime": "2024-05-21T12:25:27.129817+00:00", "EventTime": "2024-05-21T12:25:27.129840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXvyG4MdiVadJiq98"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "6f913357-372a-4d34-9d8a-837422b5c873", "DetectTime": "2024-05-21T12:25:27.146522+00:00", "EventTime": "2024-05-21T12:25:27.146542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3L7X3VHZp5157VS4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 16} +{"Format": "IDEA0", "ID": "a15eb982-8a1b-4d2e-be05-06c085970718", "DetectTime": "2024-05-21T12:25:27.169867+00:00", "EventTime": "2024-05-21T12:25:27.169884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cexlfp4LX7in4qo1L3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 16} +{"Format": "Json", "ID": "a15eb982-8a1b-4d2e-be05-06c085970718", "DetectTime": "2024-05-21T12:25:27.169867+00:00", "EventTime": "2024-05-21T12:25:27.169884+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "1970-01-01T15:18:56.197123+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2024/05/21 12:25:27.304930)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 16, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7458a95a-6680-45d0-baf3-142920cfe71f", "DetectTime": "2024-05-21T12:25:27.315030+00:00", "EventTime": "2024-05-21T12:25:27.315049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkIjv3nYOzm3LBvN1"], "accumulated_threat_level": 0.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "1c01f053-1254-475d-b3c9-a718fbe251d0", "DetectTime": "2024-05-21T12:25:27.344738+00:00", "EventTime": "2024-05-21T12:25:27.344757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmG3y3n6pbLtha4vk"], "accumulated_threat_level": 1.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "600b7c86-5291-4a7e-b676-b8d85b38d5f1", "DetectTime": "2024-05-21T12:25:27.367775+00:00", "EventTime": "2024-05-21T12:25:27.367796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2RSA1q8CivKBNzy5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 16} +{"Format": "IDEA0", "ID": "dec3ea2f-0333-4e60-a2e8-e8d166c1396e", "DetectTime": "2024-05-21T12:25:27.382086+00:00", "EventTime": "2024-05-21T12:25:27.382106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxeaVwSoXgsPOhUI7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "4909db4f-bee7-4f57-8b39-bc9216da11d3", "DetectTime": "2024-05-21T12:25:27.400230+00:00", "EventTime": "2024-05-21T12:25:27.400249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIdpLK1kbsvANuNeV3"], "accumulated_threat_level": 3.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "d5cd723b-8003-4c85-86b3-e04fa381de83", "DetectTime": "2024-05-21T12:25:27.435779+00:00", "EventTime": "2024-05-21T12:25:27.435798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBnun1K8e5UJW34Aa"], "accumulated_threat_level": 4.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "6296f722-a1ec-4fbf-a5e0-16d68d519b67", "DetectTime": "2024-05-21T12:25:27.564744+00:00", "EventTime": "2024-05-21T12:25:27.564762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdJrdI3H8yc5KbzG66"], "accumulated_threat_level": 4.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "9e55f802-fae7-4576-a2d0-790a08937ffd", "DetectTime": "2024-05-21T12:25:28.113475+00:00", "EventTime": "2024-05-21T12:25:28.113504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcNi8v3UmZTjVP0b8j", "C6Bf9G3OjM1MODU0Aj", "CQgRPw3yLpXBNkkgVk", "C7oyOq4ptyNxB6mYEh"], "accumulated_threat_level": 5.3, "timewindow": 16} +{"Format": "IDEA0", "ID": "8d515ab0-0ca9-4b6d-a310-defaf513e0c0", "DetectTime": "2024-05-21T12:25:28.174335+00:00", "EventTime": "2024-05-21T12:25:28.174353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPKWe4CumhjSHvAC8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "85bdc78f-b8c3-4e3c-8070-b4e46a0f7681", "DetectTime": "2024-05-21T12:25:28.200354+00:00", "EventTime": "2024-05-21T12:25:28.200377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.232.130 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kLOV3rinalxrxJW"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1d88cca4-9d94-45af-b31d-e6ee5581d2d7", "DetectTime": "2024-05-21T12:25:28.216789+00:00", "EventTime": "2024-05-21T12:25:28.216811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 2081/UDP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRvyU1BwqoxeP6n7e"], "accumulated_threat_level": 6.1, "timewindow": 16} +{"Format": "IDEA0", "ID": "a16e575c-9fec-49b7-821e-796b630c8323", "DetectTime": "2024-05-21T12:25:28.246730+00:00", "EventTime": "2024-05-21T12:25:28.246749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFyl54TCuD6zOXwr3"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 16} +{"Format": "IDEA0", "ID": "ce82e62f-67cc-40ed-a612-b7dda7f360a9", "DetectTime": "2024-05-21T12:25:28.524737+00:00", "EventTime": "2024-05-21T12:25:28.524760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.235.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C022p814skiJwh8FVl"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a962f3f9-8271-4897-9fbb-419a4abcc206", "DetectTime": "2024-05-21T12:25:28.530283+00:00", "EventTime": "2024-05-21T12:25:28.530304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTx8i21onfQtmSoGTg"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "24e7b990-696e-40ed-9325-b76ca39ce7ef", "DetectTime": "2024-05-21T12:25:28.696649+00:00", "EventTime": "2024-05-21T12:25:28.696671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHurs8VU4lVdtKDg7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ea226ac4-e3c2-48dd-be6e-41e1f8b63472", "DetectTime": "2024-05-21T12:25:28.713444+00:00", "EventTime": "2024-05-21T12:25:28.713465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.90.50.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UdxI1Bkdh1UCpqH9"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b736e996-d06c-4eb5-ab4b-4050b72a62b8", "DetectTime": "2024-05-21T12:25:28.802884+00:00", "EventTime": "2024-05-21T12:25:28.802912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHbKx4Xf0XN3mVZSi"], "accumulated_threat_level": 7.699999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "ae3cfea3-7535-4639-b052-d2b06da1bd44", "DetectTime": "2024-05-21T12:25:28.838997+00:00", "EventTime": "2024-05-21T12:25:28.839019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggsEz1pWO4jv8STAd"], "accumulated_threat_level": 8.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "e315961e-16c6-4c71-8630-6921a7b31c35", "DetectTime": "2024-05-21T12:25:28.896677+00:00", "EventTime": "2024-05-21T12:25:28.896695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbE3xg4Hl7oRoQj8V7"], "accumulated_threat_level": 9.3, "timewindow": 16} +{"Format": "IDEA0", "ID": "f66a4251-2a20-454e-aa6f-e246d2202259", "DetectTime": "2024-05-21T12:25:28.921256+00:00", "EventTime": "2024-05-21T12:25:28.921275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU62Ho1fIleGGzefwh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 16} +{"Format": "IDEA0", "ID": "7654c8bc-8164-4db5-8823-d35b6dc165c8", "DetectTime": "2024-05-21T12:25:28.931304+00:00", "EventTime": "2024-05-21T12:25:28.931324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.135.135.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cah0H5QUQ0VULpl4f"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "570695ad-644c-462b-a3db-ffa61d1e340d", "DetectTime": "2024-05-21T12:25:28.955510+00:00", "EventTime": "2024-05-21T12:25:28.955528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKpw32eDMMlzZG7ke"], "accumulated_threat_level": 10.900000000000002, "timewindow": 16} +{"Format": "IDEA0", "ID": "870db1a9-5091-4929-9e8d-d81721a6d0d8", "DetectTime": "2024-05-21T12:25:29.170220+00:00", "EventTime": "2024-05-21T12:25:29.170239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nTfE2U8vfQNOQdM2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 16} +{"Format": "IDEA0", "ID": "1aa172f7-2355-4acb-a1aa-5fb44c089f5b", "DetectTime": "2024-05-21T12:25:29.180124+00:00", "EventTime": "2024-05-21T12:25:29.180146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.200.82.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHAWM3eMxMY6V6WYf"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "f93391f0-7be3-4270-a4c9-4c3dc999323f", "DetectTime": "2024-05-21T12:25:29.205191+00:00", "EventTime": "2024-05-21T12:25:29.205214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZtySb2NoYMChH3E24"], "accumulated_threat_level": 12.500000000000004, "timewindow": 16} +{"Format": "Json", "ID": "f93391f0-7be3-4270-a4c9-4c3dc999323f", "DetectTime": "2024-05-21T12:25:29.205191+00:00", "EventTime": "2024-05-21T12:25:29.205214+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "1970-01-01T15:50:21.542519+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2024/05/21 12:25:29.427797)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 16, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "451dc6c7-937d-4034-a982-e6c0ccd05fa8", "DetectTime": "2024-05-21T12:25:29.438466+00:00", "EventTime": "2024-05-21T12:25:29.438484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutNDr4Y6N9pv1vMQ8"], "accumulated_threat_level": 0.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "98f856cc-c770-4a19-8c40-fdbba8a04271", "DetectTime": "2024-05-21T12:25:29.448909+00:00", "EventTime": "2024-05-21T12:25:29.448927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtcv5shobQt7eYd7"], "accumulated_threat_level": 1.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "d20d9c06-f34c-43bd-a86a-b48196c9c5d7", "DetectTime": "2024-05-21T12:25:29.459114+00:00", "EventTime": "2024-05-21T12:25:29.459136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWn0C2GVozofI3IFd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 16} +{"Format": "IDEA0", "ID": "0733cb00-08ec-445e-ba7d-38f9de417075", "DetectTime": "2024-05-21T12:25:29.471989+00:00", "EventTime": "2024-05-21T12:25:29.472009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRL9gl1v8tT0mVULz7"], "accumulated_threat_level": 3.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "2eae0934-e9d3-4458-b865-dea2424ccbca", "DetectTime": "2024-05-21T12:25:29.483876+00:00", "EventTime": "2024-05-21T12:25:29.483894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUhLkQ2SOfoyUWCd06"], "accumulated_threat_level": 4.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "e7132655-230a-4fc3-bb8e-29030689ea4a", "DetectTime": "2024-05-21T12:25:29.493520+00:00", "EventTime": "2024-05-21T12:25:29.493538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNimUn2vVCgqKl47Eb"], "accumulated_threat_level": 4.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "14739f79-5785-4277-bf6a-681fc69108ff", "DetectTime": "2024-05-21T12:25:29.500796+00:00", "EventTime": "2024-05-21T12:25:29.500817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 91.137.174.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvtDFF2ykH2k956bJ8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1ffb0c49-4d6b-442d-87be-b8f4b919bc45", "DetectTime": "2024-05-21T12:25:29.511611+00:00", "EventTime": "2024-05-21T12:25:29.511630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCepF4gONkPbss9i1"], "accumulated_threat_level": 5.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "d4fd7e1f-9e32-4567-a96c-e17be2418e87", "DetectTime": "2024-05-21T12:25:29.521884+00:00", "EventTime": "2024-05-21T12:25:29.521903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "Connection to unknown destination port 10876/UDP destination IP 151.45.220.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVY0a2aqF2g2tyWjf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 16} +{"Format": "IDEA0", "ID": "49306a7b-32f2-4a6d-a39a-70203b07911f", "DetectTime": "2024-05-21T12:25:29.533278+00:00", "EventTime": "2024-05-21T12:25:29.533298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59PKj2hh3IvmxwNrf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "0b62d12e-1e01-4b40-81c9-999040074899", "DetectTime": "2024-05-21T12:25:29.543505+00:00", "EventTime": "2024-05-21T12:25:29.543523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLlQbE2EuCEvjLx8x8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "a06e8385-6db3-4f47-8011-d509efbb0d73", "DetectTime": "2024-05-21T12:25:29.559852+00:00", "EventTime": "2024-05-21T12:25:29.559874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 149.3.4.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQviwE1hS2kwrXeVR8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "87e80600-0b0b-4e2d-9888-779d0733cf40", "DetectTime": "2024-05-21T12:25:29.575354+00:00", "EventTime": "2024-05-21T12:25:29.575372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWuLxzs2onINVbL2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "3d5308c1-3c94-4eb2-b247-7bf671dad892", "DetectTime": "2024-05-21T12:25:29.599993+00:00", "EventTime": "2024-05-21T12:25:29.600013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9eTS1pzEDPbDjAfe"], "accumulated_threat_level": 9.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "344339ce-636c-40c6-936c-0182bbdf2991", "DetectTime": "2024-05-21T12:25:29.624198+00:00", "EventTime": "2024-05-21T12:25:29.624219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Nfxi4ySyWPk3lmHc"], "accumulated_threat_level": 10.4, "timewindow": 16} +{"Format": "IDEA0", "ID": "91a0e46b-0a31-4b63-85cb-3f327b3d3845", "DetectTime": "2024-05-21T12:25:29.657597+00:00", "EventTime": "2024-05-21T12:25:29.657614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2HRN2ckCZcuXGmCi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 16} +{"Format": "IDEA0", "ID": "1cd86558-86de-4237-bcff-c5c869aae4b9", "DetectTime": "2024-05-21T12:25:29.680784+00:00", "EventTime": "2024-05-21T12:25:29.680802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2p2S01prWoeacidT7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 16} +{"Format": "Json", "ID": "1cd86558-86de-4237-bcff-c5c869aae4b9", "DetectTime": "2024-05-21T12:25:29.680784+00:00", "EventTime": "2024-05-21T12:25:29.680802+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "1970-01-01T15:50:41.353836+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2024/05/21 12:25:29.897700)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 16, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "eae91fd8-3e09-4bec-b088-df8dfffacd47", "DetectTime": "2024-05-21T12:25:29.901490+00:00", "EventTime": "2024-05-21T12:25:29.901507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcipsfmJSnLW9sAe3"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "dc9b677a-e391-4046-b5ba-0edaa3f57228", "DetectTime": "2024-05-21T12:25:29.912453+00:00", "EventTime": "2024-05-21T12:25:29.912472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6nM835PBbbipSqU4"], "accumulated_threat_level": 0.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "5df7aa74-1d75-4966-9222-d471d8e711fb", "DetectTime": "2024-05-21T12:25:29.919203+00:00", "EventTime": "2024-05-21T12:25:29.919221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVwGF1DGr8x1tzdE4"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "4b6d2a7e-55e3-4059-a9d6-b056a1c6caff", "DetectTime": "2024-05-21T12:25:29.932309+00:00", "EventTime": "2024-05-21T12:25:29.932327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ6bQQ7o2miN4Tv9b"], "accumulated_threat_level": 1.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "b1d14019-46f1-4e44-8330-80b54804433d", "DetectTime": "2024-05-21T12:25:29.937039+00:00", "EventTime": "2024-05-21T12:25:29.937057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7LYSSX76ffxo7OH2"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "67664ed4-a76d-4734-a38c-3d62730d5c60", "DetectTime": "2024-05-21T12:25:29.946890+00:00", "EventTime": "2024-05-21T12:25:29.946908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfUaO29fTtxNtom24"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 16} +{"Format": "IDEA0", "ID": "1773b471-bf3f-4332-97fe-99b35640a9a2", "DetectTime": "2024-05-21T12:25:29.951582+00:00", "EventTime": "2024-05-21T12:25:29.951600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMt373JW8vLRh8nBl"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "54563eb2-2769-4637-b4d0-ac4f489fe14d", "DetectTime": "2024-05-21T12:25:29.962374+00:00", "EventTime": "2024-05-21T12:25:29.962394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "Connection to unknown destination port 8329/UDP destination IP 189.191.37.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdfb5L1EkjRzfkcUOk"], "accumulated_threat_level": 3.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "1a122aa0-8191-4149-90ab-738887331f58", "DetectTime": "2024-05-21T12:25:29.973057+00:00", "EventTime": "2024-05-21T12:25:29.973076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjkCE4JPHczJW3yKd"], "accumulated_threat_level": 4.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "304dc54e-7703-4186-b4a5-61942dcd24c8", "DetectTime": "2024-05-21T12:25:29.983499+00:00", "EventTime": "2024-05-21T12:25:29.983525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "Connection to unknown destination port 4627/UDP destination IP 85.108.28.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzB14PM0l9LxmGbb"], "accumulated_threat_level": 4.8, "timewindow": 16} +{"Format": "IDEA0", "ID": "b57da934-4700-4ecc-b610-f72382c9c4b6", "DetectTime": "2024-05-21T12:25:29.996261+00:00", "EventTime": "2024-05-21T12:25:29.996281+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFYjKgwsDaj9HFrb"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "72eb02bf-ffac-47fe-9771-3ea3abe1393b", "DetectTime": "2024-05-21T12:25:30.006795+00:00", "EventTime": "2024-05-21T12:25:30.006815+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFYjKgwsDaj9HFrb"], "accumulated_threat_level": 10.399999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "31754c89-99e2-4a4f-b8ee-44654b50c680", "DetectTime": "2024-05-21T12:25:30.017209+00:00", "EventTime": "2024-05-21T12:25:30.017227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffLK640T5uO07ZWG"], "accumulated_threat_level": 5.6, "timewindow": 16} +{"Format": "IDEA0", "ID": "2a9e780d-0347-499f-aed7-7de6796681b9", "DetectTime": "2024-05-21T12:25:30.027211+00:00", "EventTime": "2024-05-21T12:25:30.027229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKHp22z1nQeEnDSU9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 16} +{"Format": "IDEA0", "ID": "ef7408d4-b46f-4de6-8872-67874976e373", "DetectTime": "2024-05-21T12:25:30.036945+00:00", "EventTime": "2024-05-21T12:25:30.036963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EtXWDhLAQOzYrx"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "69517cde-dc36-4c53-bffc-5ee2e427a03a", "DetectTime": "2024-05-21T12:25:30.052024+00:00", "EventTime": "2024-05-21T12:25:30.052045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTYXh18dAhZfjsvp3"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "b2541f4b-c904-4824-b25a-55a08eee4d4e", "DetectTime": "2024-05-21T12:25:30.064126+00:00", "EventTime": "2024-05-21T12:25:30.064145+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTYXh18dAhZfjsvp3"], "accumulated_threat_level": 10.899999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "cfd7ee1e-f600-401a-b818-3d10ed2e51e4", "DetectTime": "2024-05-21T12:25:30.069265+00:00", "EventTime": "2024-05-21T12:25:30.069284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sZejacL0YwzFV3"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e23cdac9-14f9-4edd-9a4c-2045931fe9c8", "DetectTime": "2024-05-21T12:25:30.126035+00:00", "EventTime": "2024-05-21T12:25:30.126053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNqf72JBfzvpBtje8"], "accumulated_threat_level": 0.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "14e861db-4e7d-4cdb-bef4-742948ff9fc9", "DetectTime": "2024-05-21T12:25:30.137868+00:00", "EventTime": "2024-05-21T12:25:30.137887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtss54hXKViOJVhii"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "3a54c543-0e28-4b25-a6d1-88d15f951ced", "DetectTime": "2024-05-21T12:25:30.158449+00:00", "EventTime": "2024-05-21T12:25:30.158471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5UaZK3etocBjAldw1"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c4c6ede5-7d2b-4aeb-8b73-90e1c151ad74", "DetectTime": "2024-05-21T12:25:30.177355+00:00", "EventTime": "2024-05-21T12:25:30.177374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8WNFA16AcrFLiYjfk"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "16d310c2-1720-4633-bc26-cd1e3a1c751f", "DetectTime": "2024-05-21T12:25:30.189322+00:00", "EventTime": "2024-05-21T12:25:30.189339+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKi3Q3Y2QOybmu5R4"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "eb08fae4-cf6c-42ab-9a9d-b622f9595c48", "DetectTime": "2024-05-21T12:25:30.201664+00:00", "EventTime": "2024-05-21T12:25:30.201684+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKi3Q3Y2QOybmu5R4"], "accumulated_threat_level": 11.399999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "d01a27b8-6513-4f0e-8f38-46266413389e", "DetectTime": "2024-05-21T12:25:30.206513+00:00", "EventTime": "2024-05-21T12:25:30.206532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlcw44UNJER09Tbdl"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c9715452-6950-4eb7-93a5-165efdb95cec", "DetectTime": "2024-05-21T12:25:30.221059+00:00", "EventTime": "2024-05-21T12:25:30.221078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZS3dK2IIsc5POwoRd"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "69f0eb98-8a3b-4709-befb-974248b443e5", "DetectTime": "2024-05-21T12:25:30.246593+00:00", "EventTime": "2024-05-21T12:25:30.246613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjEfi3IBTaruhxGog"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "dd6a9609-8eb5-49b5-b896-0c54958c5286", "DetectTime": "2024-05-21T12:25:30.271875+00:00", "EventTime": "2024-05-21T12:25:30.271896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA7YTI37rg8XT9NlRk"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b84da2ce-9bec-4204-ac1f-70c337130561", "DetectTime": "2024-05-21T12:25:30.296387+00:00", "EventTime": "2024-05-21T12:25:30.296405+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFOFHr2sBWHkl6nyx1"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "390ee6f7-5a0c-4ec7-a3b6-e2039387e1a5", "DetectTime": "2024-05-21T12:25:30.307718+00:00", "EventTime": "2024-05-21T12:25:30.307737+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFOFHr2sBWHkl6nyx1"], "accumulated_threat_level": 11.899999999999999, "timewindow": 11} +{"Format": "IDEA0", "ID": "967b5557-ecb0-4b78-9789-d08a3a8a0017", "DetectTime": "2024-05-21T12:25:30.312301+00:00", "EventTime": "2024-05-21T12:25:30.312318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhSFKTwIbHkmLXH8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8a1a6ef6-c1cc-4e4a-8f0a-cd8240f88feb", "DetectTime": "2024-05-21T12:25:30.323867+00:00", "EventTime": "2024-05-21T12:25:30.323888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qjUa289hfzM89Tx5"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "dd93702c-2824-469f-a2f6-90ac33e115f5", "DetectTime": "2024-05-21T12:25:30.346521+00:00", "EventTime": "2024-05-21T12:25:30.346541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRoguBqhyLm0OWUgc"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ba6d59e8-93bf-4f3d-8949-7babf87c09de", "DetectTime": "2024-05-21T12:25:30.367679+00:00", "EventTime": "2024-05-21T12:25:30.367697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQnxp1OXqomgD3QBb"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "28b2cc32-beb4-4622-bb46-135fc2faefb7", "DetectTime": "2024-05-21T12:25:30.493206+00:00", "EventTime": "2024-05-21T12:25:30.493225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYgk23mgGw2WItmhd"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "3eee9cec-6665-4155-85e4-00831e2b97d3", "DetectTime": "2024-05-21T12:25:30.537799+00:00", "EventTime": "2024-05-21T12:25:30.537821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfnmeHZrXWXA6n7Jj"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7f823874-42fb-4e08-9aab-7244f281dee7", "DetectTime": "2024-05-21T12:25:30.581462+00:00", "EventTime": "2024-05-21T12:25:30.581483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9U2TI7yNHfsY9W4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "d5a61946-c7be-427f-8b07-42bb46627844", "DetectTime": "2024-05-21T12:25:30.591163+00:00", "EventTime": "2024-05-21T12:25:30.591182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKfGvHUfCKZhjDRh"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b4fb9733-9817-4836-8f04-19f8d85bd153", "DetectTime": "2024-05-21T12:25:30.615766+00:00", "EventTime": "2024-05-21T12:25:30.615787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQJl8Fiolkr42G"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 17} +{"Format": "IDEA0", "ID": "5cc17524-700f-4cc6-80fe-6ecf0c016d4c", "DetectTime": "2024-05-21T12:25:30.628913+00:00", "EventTime": "2024-05-21T12:25:30.628933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeuhg1EJiYbYu2A8l"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "10b2d393-91ae-4ca3-8835-ac707dd51f18", "DetectTime": "2024-05-21T12:25:30.651272+00:00", "EventTime": "2024-05-21T12:25:30.651291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccmcwb4lahlKBTiYIl"], "accumulated_threat_level": 3.2, "timewindow": 17} +{"Format": "IDEA0", "ID": "0cc45198-8936-48b7-902b-de75889d3158", "DetectTime": "2024-05-21T12:25:30.663507+00:00", "EventTime": "2024-05-21T12:25:30.663526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD9rawlgx3oDUsMg"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "33c79cf9-3857-4e31-b03a-47d78407f798", "DetectTime": "2024-05-21T12:25:30.684867+00:00", "EventTime": "2024-05-21T12:25:30.684885+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwFdj4sUvO6Oaor2e"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "b45e9215-6558-46f5-b56b-b28f6b52053a", "DetectTime": "2024-05-21T12:25:30.696617+00:00", "EventTime": "2024-05-21T12:25:30.696639+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwFdj4sUvO6Oaor2e"], "accumulated_threat_level": 12.399999999999999, "timewindow": 11} +{"Format": "Json", "ID": "b45e9215-6558-46f5-b56b-b28f6b52053a", "DetectTime": "2024-05-21T12:25:30.696617+00:00", "EventTime": "2024-05-21T12:25:30.696639+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "1970-01-01T10:50:11.659367+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 11. (real time 2024/05/21 12:25:31.043949)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.399999999999999, "timewindow": 11, "profileid": "profile_10.0.2.19", "threat_level": 12.399999999999999} +{"Format": "IDEA0", "ID": "93f4f2f2-ce62-4a8b-be3e-9fc7261fc2ea", "DetectTime": "2024-05-21T12:25:31.054851+00:00", "EventTime": "2024-05-21T12:25:31.054876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNGTg3v2bmxyhP5y1"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "6796e810-5138-45a8-b481-1e395f4a617f", "DetectTime": "2024-05-21T12:25:31.059647+00:00", "EventTime": "2024-05-21T12:25:31.059665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.65.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreQNT3g6yzZMXZXZ2"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "46bfd57d-fb3c-4d7a-9ce3-6534bab2f6ee", "DetectTime": "2024-05-21T12:25:31.064042+00:00", "EventTime": "2024-05-21T12:25:31.064060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7JSr2ljbVCm7wu67"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a4382abd-6738-4c41-a8ce-6f2c70bf95be", "DetectTime": "2024-05-21T12:25:31.068840+00:00", "EventTime": "2024-05-21T12:25:31.068858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Gixl16jlVqp4m9ob"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0aff6470-14b2-4c3f-bac4-076f65b91cd1", "DetectTime": "2024-05-21T12:25:31.073746+00:00", "EventTime": "2024-05-21T12:25:31.073765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsgXMhVdwV8eV7Wp5", "CfNewl4DvnXy3b649g", "CPJr4M1ccw2I1pHz7j", "C5jgBHmwCN0pfh5ie"], "accumulated_threat_level": 3.7, "timewindow": 17} +{"Format": "IDEA0", "ID": "349898d1-0801-4e34-ac70-8f836aef9760", "DetectTime": "2024-05-21T12:25:31.087802+00:00", "EventTime": "2024-05-21T12:25:31.087822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmcrL1RDzfNMDFE4"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1aa38bd6-8428-436a-9372-b09a61da3e13", "DetectTime": "2024-05-21T12:25:31.092616+00:00", "EventTime": "2024-05-21T12:25:31.092635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQdTP22NdyJev349h"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c5c00fa3-57b1-4b68-b6b7-203ba97241ac", "DetectTime": "2024-05-21T12:25:31.097200+00:00", "EventTime": "2024-05-21T12:25:31.097218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDSMNb4GDuhXogxnn8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "9149475b-1d15-4815-8354-b684da232de3", "DetectTime": "2024-05-21T12:25:31.101627+00:00", "EventTime": "2024-05-21T12:25:31.101644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRYAl83u6Dsn7hfMof"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "5443dbc1-46d5-4a32-bc46-9276497b2c3b", "DetectTime": "2024-05-21T12:25:31.106530+00:00", "EventTime": "2024-05-21T12:25:31.106550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSP3O61mbXXXgwAKb2"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "623ce655-f38f-4d11-bfb7-049ab618a237", "DetectTime": "2024-05-21T12:25:31.111439+00:00", "EventTime": "2024-05-21T12:25:31.111459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GkKi4f2YOIUMK5ia"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ee5b9e84-bfcd-4645-ad8e-7075d09bb26f", "DetectTime": "2024-05-21T12:25:31.121826+00:00", "EventTime": "2024-05-21T12:25:31.121845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2eQIX6ycj5vB0gc3"], "accumulated_threat_level": 4.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "e36ed5b6-93b7-4041-a3a5-9f826958e0b0", "DetectTime": "2024-05-21T12:25:31.126597+00:00", "EventTime": "2024-05-21T12:25:31.126616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjeb5j1MHXgVHc2pNe"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c06b6c3b-8bc4-4a87-8281-91b5059d7ee5", "DetectTime": "2024-05-21T12:25:31.137827+00:00", "EventTime": "2024-05-21T12:25:31.137848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYley42Fi8iRMqKQi"], "accumulated_threat_level": 5.3, "timewindow": 17} +{"Format": "IDEA0", "ID": "4f4ae0d5-e585-4f00-8418-e2bbd2ec3b5c", "DetectTime": "2024-05-21T12:25:31.142739+00:00", "EventTime": "2024-05-21T12:25:31.142759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0gn7253oMXLKrUyf"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a0dd8001-5344-4d60-bda0-d67a3074e114", "DetectTime": "2024-05-21T12:25:31.154220+00:00", "EventTime": "2024-05-21T12:25:31.154239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkTduj3kVupVtN5VL1"], "accumulated_threat_level": 6.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "9d785716-cf94-4ce0-ac59-3314d640a5cb", "DetectTime": "2024-05-21T12:25:31.181264+00:00", "EventTime": "2024-05-21T12:25:31.181282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLAnM2HLeSo0pB6r5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 17} +{"Format": "IDEA0", "ID": "aef5dd7f-6e1f-4f0a-a052-0f74d1a47a0e", "DetectTime": "2024-05-21T12:25:31.186288+00:00", "EventTime": "2024-05-21T12:25:31.186307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLR7e3ArxfzrihX1d"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a9fc4f07-d5d8-4975-ae33-765d0fc6cd12", "DetectTime": "2024-05-21T12:25:31.215502+00:00", "EventTime": "2024-05-21T12:25:31.215521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB9lybzBCQOsFVek5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "bde7d27a-b949-411f-9005-8d91846fb59c", "DetectTime": "2024-05-21T12:25:31.229732+00:00", "EventTime": "2024-05-21T12:25:31.229752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.92.101.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KZxYJjKjlHaZ7G4"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "2e4cbc02-57b0-46cd-8aa9-ff991405b19f", "DetectTime": "2024-05-21T12:25:31.259923+00:00", "EventTime": "2024-05-21T12:25:31.259946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "Connection to unknown destination port 5689/UDP destination IP 190.204.37.238. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzkOz3HujDHGQyCak"], "accumulated_threat_level": 8.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "29f13f4f-fa06-4f85-9cfd-52e2eb64f0bd", "DetectTime": "2024-05-21T12:25:31.272163+00:00", "EventTime": "2024-05-21T12:25:31.272184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIsKuIUKowe7GtQ1"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a29bda25-7add-401b-a608-25529c42e90b", "DetectTime": "2024-05-21T12:25:31.293927+00:00", "EventTime": "2024-05-21T12:25:31.293949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4P1LHEyUAIuQLqk"], "accumulated_threat_level": 9.3, "timewindow": 17} +{"Format": "IDEA0", "ID": "2ab0602f-4f87-49b0-ac96-52460d64b982", "DetectTime": "2024-05-21T12:25:31.312734+00:00", "EventTime": "2024-05-21T12:25:31.312754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkR52q3o6vvFVOFaS7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8893fe41-e631-4a6f-a9e0-cee93e6b9911", "DetectTime": "2024-05-21T12:25:31.360643+00:00", "EventTime": "2024-05-21T12:25:31.360661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI500ufHWKufYypH6"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "95947353-3ee1-44ee-b8a2-286fa7aa8221", "DetectTime": "2024-05-21T12:25:31.393156+00:00", "EventTime": "2024-05-21T12:25:31.393174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhwhW2YPIv93DJ5og"], "accumulated_threat_level": 10.100000000000001, "timewindow": 17} +{"Format": "IDEA0", "ID": "275667f0-feed-4e33-8e9f-e5abd393c1fe", "DetectTime": "2024-05-21T12:25:31.405432+00:00", "EventTime": "2024-05-21T12:25:31.405455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsWVhm2P6oP9ZoKFvi"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "9d61a64a-12c4-42ac-b9d0-5aff1b6d9bc4", "DetectTime": "2024-05-21T12:25:31.467704+00:00", "EventTime": "2024-05-21T12:25:31.467726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7DOEY8Ac0XTnMXr5"], "accumulated_threat_level": 10.900000000000002, "timewindow": 17} +{"Format": "IDEA0", "ID": "38e129bd-7656-4e28-b225-f1e62fa82b3d", "DetectTime": "2024-05-21T12:25:31.481246+00:00", "EventTime": "2024-05-21T12:25:31.481264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUsfGRfBsazAoCRh"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "6d10f9b7-59fb-49c2-84a2-b2640f80b296", "DetectTime": "2024-05-21T12:25:31.567694+00:00", "EventTime": "2024-05-21T12:25:31.567715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7sjRs1OrmZEqPWPy6"], "accumulated_threat_level": 11.700000000000003, "timewindow": 17} +{"Format": "IDEA0", "ID": "70ee4d4e-9ecc-4f94-8d64-3350114f9a17", "DetectTime": "2024-05-21T12:25:31.603409+00:00", "EventTime": "2024-05-21T12:25:31.603427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cymgsj4MjKPlWi4Abe"], "accumulated_threat_level": 12.500000000000004, "timewindow": 17} +{"Format": "Json", "ID": "70ee4d4e-9ecc-4f94-8d64-3350114f9a17", "DetectTime": "2024-05-21T12:25:31.603409+00:00", "EventTime": "2024-05-21T12:25:31.603427+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "1970-01-01T16:21:13.785670+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2024/05/21 12:25:31.775191)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 17, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "0aeda2a0-4ece-4d54-9292-56ca855c2b08", "DetectTime": "2024-05-21T12:25:31.786158+00:00", "EventTime": "2024-05-21T12:25:31.786176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrnaf1V2sdF6Uxnd1"], "accumulated_threat_level": 0.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "c3ab89ea-ba37-4392-93a8-a9e3ffeb921b", "DetectTime": "2024-05-21T12:25:31.790724+00:00", "EventTime": "2024-05-21T12:25:31.790742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51ADv1E2CcZ8hMhJd"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7aa41981-21bd-44d8-af00-84b37f849489", "DetectTime": "2024-05-21T12:25:31.841146+00:00", "EventTime": "2024-05-21T12:25:31.841164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYBcObZXRdAivmG2"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "cfe72a8f-ad59-4e2a-a71c-12dc07e089f7", "DetectTime": "2024-05-21T12:25:31.866156+00:00", "EventTime": "2024-05-21T12:25:31.866173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH8Dxl4OIUwUJ9PSwc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 17} +{"Format": "IDEA0", "ID": "643c5048-93da-4916-bf3a-1cf226d41bf6", "DetectTime": "2024-05-21T12:25:31.924676+00:00", "EventTime": "2024-05-21T12:25:31.924698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBJgQ202YmrH64ML4"], "accumulated_threat_level": 3.2, "timewindow": 17} +{"Format": "IDEA0", "ID": "dac791bc-2ab3-4d58-b46b-1f08d1f61baf", "DetectTime": "2024-05-21T12:25:31.960068+00:00", "EventTime": "2024-05-21T12:25:31.960087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04JOK1aQx1Hz5LBEe"], "accumulated_threat_level": 4.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "b5c7c863-a568-49a1-b54f-6254b8f7d645", "DetectTime": "2024-05-21T12:25:31.984112+00:00", "EventTime": "2024-05-21T12:25:31.984130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.53.158.246"]}], "Attach": [{"Content": "Connection to unknown destination port 8864/UDP destination IP 5.53.158.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBQqy1y57EAk0Ft5a"], "accumulated_threat_level": 4.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "248eaadb-88c7-43cc-a9c4-969c550adc52", "DetectTime": "2024-05-21T12:25:32.018396+00:00", "EventTime": "2024-05-21T12:25:32.018441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.160.16.187"]}], "Attach": [{"Content": "Connection to unknown destination port 9292/UDP destination IP 182.160.16.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5O1g2Q4PEQyj4smb"], "accumulated_threat_level": 5.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "2bbb9597-b720-4e5e-97a6-13541146a4df", "DetectTime": "2024-05-21T12:25:32.044545+00:00", "EventTime": "2024-05-21T12:25:32.044563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVoge4IF1Us9phAEf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 17} +{"Format": "IDEA0", "ID": "44f600ce-067e-4011-8adc-524e144354e4", "DetectTime": "2024-05-21T12:25:32.056591+00:00", "EventTime": "2024-05-21T12:25:32.056610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5KD2aoTD85WxMwj"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e8fdd8c3-90ef-4f5a-8f75-edf541086382", "DetectTime": "2024-05-21T12:25:32.075697+00:00", "EventTime": "2024-05-21T12:25:32.075718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7SgrJ3wYVqmqLkAt4"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "dd0491ec-84c8-4a96-86b0-f845ee5c1fcf", "DetectTime": "2024-05-21T12:25:32.094848+00:00", "EventTime": "2024-05-21T12:25:32.094869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz92c81Gf5qFfjbMXl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "85e1dfa6-01e8-4013-8757-73c98656c960", "DetectTime": "2024-05-21T12:25:32.107195+00:00", "EventTime": "2024-05-21T12:25:32.107217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChuRrm3gThL2Yv1wYf"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e6a59a4a-dd7e-4f87-8302-a1059a035c68", "DetectTime": "2024-05-21T12:25:32.124778+00:00", "EventTime": "2024-05-21T12:25:32.124796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueWNK1Oz2NGGjwnJc"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "baa7287b-c8a2-4cf8-b5a4-e20cb0cdc8bb", "DetectTime": "2024-05-21T12:25:32.140307+00:00", "EventTime": "2024-05-21T12:25:32.140326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPTrI7bA7jw6ktXb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "736a8110-f77f-4a24-af68-f99b0f49bc91", "DetectTime": "2024-05-21T12:25:32.161059+00:00", "EventTime": "2024-05-21T12:25:32.161078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4j3Ny4ERhQhSMxrR8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "9165b02e-2836-489e-a9bf-d5e1df54eba1", "DetectTime": "2024-05-21T12:25:32.172310+00:00", "EventTime": "2024-05-21T12:25:32.172330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgF1u4jD7aHWM6W07"], "accumulated_threat_level": 8.799999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "c205718a-7662-45e5-9162-2032e72f3383", "DetectTime": "2024-05-21T12:25:32.201698+00:00", "EventTime": "2024-05-21T12:25:32.201715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYqYckEf2uE25xCIl"], "accumulated_threat_level": 9.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "53828227-2777-4e84-8e70-8f170322ba93", "DetectTime": "2024-05-21T12:25:32.212312+00:00", "EventTime": "2024-05-21T12:25:32.212331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2UEW1dbcQjkIb7U1"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b5b784fe-7c70-4b04-a9ba-4fc6193091b6", "DetectTime": "2024-05-21T12:25:32.232501+00:00", "EventTime": "2024-05-21T12:25:32.232523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHVMPu3jIpCcaIj8Nf"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ea24c36f-610a-4705-85d4-28a7ed5087bc", "DetectTime": "2024-05-21T12:25:32.481362+00:00", "EventTime": "2024-05-21T12:25:32.481383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtM3qG1lnymU1GlSt1"], "accumulated_threat_level": 10.4, "timewindow": 17} +{"Format": "IDEA0", "ID": "2f34c63f-e0e0-4a89-8d0e-c11d62ab2659", "DetectTime": "2024-05-21T12:25:32.563528+00:00", "EventTime": "2024-05-21T12:25:32.563547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFvPCe3U2Az4I4HdSk"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e0038aa1-d036-4509-845a-c21b24997aa6", "DetectTime": "2024-05-21T12:25:32.570765+00:00", "EventTime": "2024-05-21T12:25:32.570784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvY93f31HhEGaEvimh"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "5801ea4a-afc9-4ab3-865f-1c1c9f622d8a", "DetectTime": "2024-05-21T12:25:32.575153+00:00", "EventTime": "2024-05-21T12:25:32.575171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6gjr4OWOpx2Q6Qfj"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "6cd8998f-cf45-4b76-ab06-cf306719c28e", "DetectTime": "2024-05-21T12:25:32.582881+00:00", "EventTime": "2024-05-21T12:25:32.582899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF02yg31VFeEu38pk"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "bf834397-960c-4177-8639-8ca3b244706b", "DetectTime": "2024-05-21T12:25:32.587327+00:00", "EventTime": "2024-05-21T12:25:32.587346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMzYCLBTxUcZxRE8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "2c9341ec-18b1-4a2d-8b32-cefda20639b0", "DetectTime": "2024-05-21T12:25:32.600560+00:00", "EventTime": "2024-05-21T12:25:32.600599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRPytORW19pPnrf1"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ac663523-4716-42bb-9b63-b6776a394f43", "DetectTime": "2024-05-21T12:25:32.606095+00:00", "EventTime": "2024-05-21T12:25:32.606113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3UNu4ag3LUPmx7Gl"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "681efaca-abbe-4515-8725-315bc7bae541", "DetectTime": "2024-05-21T12:25:32.610934+00:00", "EventTime": "2024-05-21T12:25:32.610954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCr1dA4PzeTVAXw294"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "4d69b9e5-816d-48c2-bcf0-6bb677c386a7", "DetectTime": "2024-05-21T12:25:32.656495+00:00", "EventTime": "2024-05-21T12:25:32.656514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8KqX3Fmjr3iMA5y7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "9843ba98-e15c-44c9-883a-58a3e3e31de1", "DetectTime": "2024-05-21T12:25:32.662318+00:00", "EventTime": "2024-05-21T12:25:32.662340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WFHt3N2qgss7QP16"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "858b3e33-2aab-404c-8a23-ad49b00836af", "DetectTime": "2024-05-21T12:25:32.698565+00:00", "EventTime": "2024-05-21T12:25:32.698587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClDmxa47bblQIVY9Q"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "03185db6-05bc-45d5-8c7a-49bcb12829ef", "DetectTime": "2024-05-21T12:25:32.703806+00:00", "EventTime": "2024-05-21T12:25:32.703828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVH9l25zYK2N7E3mg"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "72fddad1-3e45-45a1-8c87-e14ea85c8f0d", "DetectTime": "2024-05-21T12:25:32.727939+00:00", "EventTime": "2024-05-21T12:25:32.727957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhYArifnUDMFTcpk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 17} +{"Format": "IDEA0", "ID": "b5323e06-fa5f-40f7-be00-0ec23add79e3", "DetectTime": "2024-05-21T12:25:32.740061+00:00", "EventTime": "2024-05-21T12:25:32.740081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnZPT16BBdAhb5Ou8"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "efaa142f-1874-459d-acdf-e6834bd32fae", "DetectTime": "2024-05-21T12:25:32.756573+00:00", "EventTime": "2024-05-21T12:25:32.756594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OEaGdoOhzcSj4e5"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "f324b2e5-693a-41dd-a762-c4bfb065b0ab", "DetectTime": "2024-05-21T12:25:32.776665+00:00", "EventTime": "2024-05-21T12:25:32.776686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yUov43PX3CSePJDe"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c6b3ffed-0431-445e-b5a8-a5440f9270b1", "DetectTime": "2024-05-21T12:25:32.800564+00:00", "EventTime": "2024-05-21T12:25:32.800582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXPll1oa47meUFGE5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 17} +{"Format": "Json", "ID": "c6b3ffed-0431-445e-b5a8-a5440f9270b1", "DetectTime": "2024-05-21T12:25:32.800564+00:00", "EventTime": "2024-05-21T12:25:32.800582+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "1970-01-01T16:22:08.187502+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2024/05/21 12:25:32.934091)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 17, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ae2efc2a-7426-43ce-8bd4-b392290d2739", "DetectTime": "2024-05-21T12:25:32.944910+00:00", "EventTime": "2024-05-21T12:25:32.944930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJj7M2ZVdM54TsaT7"], "accumulated_threat_level": 0.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "b76364a0-2951-4dea-b835-d8a2f40b938d", "DetectTime": "2024-05-21T12:25:32.949888+00:00", "EventTime": "2024-05-21T12:25:32.949906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqO12r3N0JN2VmDgL"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1301315b-0864-44fc-b128-9a7aacb8209b", "DetectTime": "2024-05-21T12:25:32.960899+00:00", "EventTime": "2024-05-21T12:25:32.960921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFh31tkNYtKsdHWPe"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "89eee2c4-62c4-4eb5-8e95-f9587c245804", "DetectTime": "2024-05-21T12:25:32.970429+00:00", "EventTime": "2024-05-21T12:25:32.970447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqpg8z4uimYYbjiJH3"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "92876ec3-ded7-4421-aa92-c72136836b14", "DetectTime": "2024-05-21T12:25:32.974964+00:00", "EventTime": "2024-05-21T12:25:32.974982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEm5T3vCqLXilH1X"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "5e6026ae-9cdc-46a4-90c4-7db2a20bbfe7", "DetectTime": "2024-05-21T12:25:32.984895+00:00", "EventTime": "2024-05-21T12:25:32.984913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFE6fn2nRNw4Tdzeq2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 17} +{"Format": "IDEA0", "ID": "234c2f69-f8ae-4b14-b2d8-1f29b18a9a3a", "DetectTime": "2024-05-21T12:25:32.989402+00:00", "EventTime": "2024-05-21T12:25:32.989420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.65.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CshzuY3yid7EuADakf"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b14dad99-554e-45ad-84e6-687edaed5b6f", "DetectTime": "2024-05-21T12:25:32.993598+00:00", "EventTime": "2024-05-21T12:25:32.993616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbC14h1fa4K1Zn8Hu7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "eba64c5a-58af-4440-aaad-abc83edd7c06", "DetectTime": "2024-05-21T12:25:32.998049+00:00", "EventTime": "2024-05-21T12:25:32.998066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTIyv4WDRonA8Lc15"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e25baa90-749d-4433-9ee7-63a61a539c2b", "DetectTime": "2024-05-21T12:25:33.003942+00:00", "EventTime": "2024-05-21T12:25:33.003960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIdti118GUZDQiCGh"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "d59db499-e9d5-4496-b002-9d812033ef37", "DetectTime": "2024-05-21T12:25:33.132325+00:00", "EventTime": "2024-05-21T12:25:33.132345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgdVb1BCXGhBOlOre"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0daa59d5-3e27-43ef-93dd-17f51641f449", "DetectTime": "2024-05-21T12:25:33.137126+00:00", "EventTime": "2024-05-21T12:25:33.137146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte8BC24pTUfhEeOj"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "d9bbebe7-dc48-4643-804b-926f30b4fb79", "DetectTime": "2024-05-21T12:25:33.156597+00:00", "EventTime": "2024-05-21T12:25:33.156618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EI3T2JFbRG9Xesxk"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0e8a6c4d-c505-4431-b6a5-979163add1d7", "DetectTime": "2024-05-21T12:25:33.169269+00:00", "EventTime": "2024-05-21T12:25:33.169288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC1v8MJSYyzIJOU4"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0c6e75ff-e955-4a83-88f2-018df1edb931", "DetectTime": "2024-05-21T12:25:33.219648+00:00", "EventTime": "2024-05-21T12:25:33.219677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmgnE1PpkkTXjzqI"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "cfd154fd-5bf7-422b-a469-4958a6f62b49", "DetectTime": "2024-05-21T12:25:33.260234+00:00", "EventTime": "2024-05-21T12:25:33.260254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5McTo2I0jSoXYTFya"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "f63a8b58-a89b-4c30-ac02-1eec4a0c6c98", "DetectTime": "2024-05-21T12:25:33.294256+00:00", "EventTime": "2024-05-21T12:25:33.294277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4A6SSRAj3vWQ2VSa", "C1K5Rh4AmysiqIjeDh", "CtloMK2njYK4HGpkp9", "CW3dCV1ybozaQftyxe"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 17} +{"Format": "IDEA0", "ID": "0075cfb2-1170-4a73-8e7c-1fac52b4c193", "DetectTime": "2024-05-21T12:25:33.299290+00:00", "EventTime": "2024-05-21T12:25:33.299308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYRvg4sBGPRSgrS96"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ccbde2d3-d179-4a4a-a3b0-2f81dddf02de", "DetectTime": "2024-05-21T12:25:33.319141+00:00", "EventTime": "2024-05-21T12:25:33.319162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMftX2MFfjZR1u1A7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "48670dfb-2740-466e-92ec-b6f9e6907d05", "DetectTime": "2024-05-21T12:25:33.426769+00:00", "EventTime": "2024-05-21T12:25:33.426790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.92.101.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlfZi353ZBQpi94h"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e7b6c65f-1c4f-4ed8-ac93-fab19df30e67", "DetectTime": "2024-05-21T12:25:33.472523+00:00", "EventTime": "2024-05-21T12:25:33.472553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSiyRS1FLyfQm7Oc9h"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "44a0cfbb-f909-404f-a365-6a5f8d133b7b", "DetectTime": "2024-05-21T12:25:33.493543+00:00", "EventTime": "2024-05-21T12:25:33.493561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEm6348Ge3RZ20kg5"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8a813e18-0063-48d8-8a6f-47efa025f4f0", "DetectTime": "2024-05-21T12:25:33.516583+00:00", "EventTime": "2024-05-21T12:25:33.516605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp04TB2h7tdOWfNLJd"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c047684e-68d4-4a18-af20-76e5ae8715e2", "DetectTime": "2024-05-21T12:25:33.538399+00:00", "EventTime": "2024-05-21T12:25:33.538431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2Sv33yXZk6jnKdX7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "23a83a39-464d-4015-b4b6-f9e42bd162d5", "DetectTime": "2024-05-21T12:25:33.561874+00:00", "EventTime": "2024-05-21T12:25:33.561893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrsWCIv0b6vhHq0Hj"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "d501f3fc-9522-4a41-952e-9d8533a11d86", "DetectTime": "2024-05-21T12:25:33.702730+00:00", "EventTime": "2024-05-21T12:25:33.702751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0n5NE2HveDlGa9Pn2"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "af601bc6-8bbe-4d92-8ab7-a51698aea684", "DetectTime": "2024-05-21T12:25:34.075050+00:00", "EventTime": "2024-05-21T12:25:34.075069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN4M7e1fimq3gHUqTd"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "d2a2c48f-85eb-4c66-9449-c108d0bb3d66", "DetectTime": "2024-05-21T12:25:34.086670+00:00", "EventTime": "2024-05-21T12:25:34.086695+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN4M7e1fimq3gHUqTd"], "accumulated_threat_level": 0.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "8f83edc8-764e-4312-ab5e-d3681a1ad2be", "DetectTime": "2024-05-21T12:25:34.091373+00:00", "EventTime": "2024-05-21T12:25:34.091390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccleb94PKUMhV1uKr"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "3cf69fa0-7ec0-4af8-bc81-90e66bfffce7", "DetectTime": "2024-05-21T12:25:34.134235+00:00", "EventTime": "2024-05-21T12:25:34.134254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3TyJ135oSMONdDWj9"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "726ff2cd-69d5-4974-9553-afe1d6215304", "DetectTime": "2024-05-21T12:25:34.145349+00:00", "EventTime": "2024-05-21T12:25:34.145369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjrsu3dnJQqie4TEk"], "accumulated_threat_level": 3.7, "timewindow": 17} +{"Format": "IDEA0", "ID": "16be0789-fce4-4ff3-99bd-de183211f475", "DetectTime": "2024-05-21T12:25:34.170298+00:00", "EventTime": "2024-05-21T12:25:34.170316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ4Kh13kZxmmn85R9c"], "accumulated_threat_level": 4.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "43ee683f-1704-4c3a-8c7d-4243873653bb", "DetectTime": "2024-05-21T12:25:34.197214+00:00", "EventTime": "2024-05-21T12:25:34.197240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV417W2P0n64uSmTj5"], "accumulated_threat_level": 5.3, "timewindow": 17} +{"Format": "IDEA0", "ID": "e5bd7805-d16c-45fd-b133-32915cbdf156", "DetectTime": "2024-05-21T12:25:34.389896+00:00", "EventTime": "2024-05-21T12:25:34.389919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBWBxG1aYFRNX7dGaj"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "646cff3a-88bc-47cb-ae2b-a36682615199", "DetectTime": "2024-05-21T12:25:34.403564+00:00", "EventTime": "2024-05-21T12:25:34.403586+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBWBxG1aYFRNX7dGaj"], "accumulated_threat_level": 1.0, "timewindow": 11} +{"Format": "IDEA0", "ID": "b235e115-9525-426e-b1de-dad10ee9dace", "DetectTime": "2024-05-21T12:25:34.408610+00:00", "EventTime": "2024-05-21T12:25:34.408627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGb9u4vhvtBIsnPv7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "a1896721-56c9-4d81-9758-1c746b3dc9dd", "DetectTime": "2024-05-21T12:25:34.487476+00:00", "EventTime": "2024-05-21T12:25:34.487498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBo2wy3si4RkRX57mk"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "8359170f-16b5-4ea4-acaf-dc894814e630", "DetectTime": "2024-05-21T12:25:34.495658+00:00", "EventTime": "2024-05-21T12:25:34.495678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLK4Hd1I1pU7htX1S9", "CSYJB7zryIstrIO35", "CpzoD02lDFRjGg4tY6", "CEvHI92p5cbmWhYGX5"], "accumulated_threat_level": 5.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "a5d4cae1-6c37-4565-8410-858289a0e7a6", "DetectTime": "2024-05-21T12:25:34.517129+00:00", "EventTime": "2024-05-21T12:25:34.517148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Zkkp1tS1zJ7kh8a6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "af0f7552-a5e1-43b4-84bd-cb5ff9f8dc95", "DetectTime": "2024-05-21T12:25:34.527903+00:00", "EventTime": "2024-05-21T12:25:34.527919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD2Zh3xw0ujqOap0k"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "4eb011c0-dba9-4f45-9108-796e01c27a85", "DetectTime": "2024-05-21T12:25:34.539269+00:00", "EventTime": "2024-05-21T12:25:34.539285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD2Zh3xw0ujqOap0k"], "accumulated_threat_level": 1.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "032d66b0-7f39-45d1-8e16-774f01547d18", "DetectTime": "2024-05-21T12:25:34.543784+00:00", "EventTime": "2024-05-21T12:25:34.543802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnt0bT2XhRt78JOYKa"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "7f6b8707-d3fc-4662-aac3-020e90f9af8c", "DetectTime": "2024-05-21T12:25:34.551340+00:00", "EventTime": "2024-05-21T12:25:34.551358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06K8P2l9vXDXydoqb"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "aec60e28-ec3e-4a79-b100-193604945717", "DetectTime": "2024-05-21T12:25:34.575875+00:00", "EventTime": "2024-05-21T12:25:34.575899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChHRbCGsGtIl6BYrf"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "e8c6aea7-454e-4f20-b6ea-10643f5de23b", "DetectTime": "2024-05-21T12:25:34.595529+00:00", "EventTime": "2024-05-21T12:25:34.595551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMyYv29yG5x5iiDH1"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "ed34072b-49be-4d2d-ab01-25f44275f9c6", "DetectTime": "2024-05-21T12:25:34.620097+00:00", "EventTime": "2024-05-21T12:25:34.620116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrkJr13FlO2hJ5IF"], "accumulated_threat_level": 6.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "40384417-d326-4800-a0df-aa3d7f3560b4", "DetectTime": "2024-05-21T12:25:34.638779+00:00", "EventTime": "2024-05-21T12:25:34.638798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpCSk4MZUXP8TnPQ5"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "aa6adb63-28e9-4a32-830e-fde0e3195ef1", "DetectTime": "2024-05-21T12:25:34.649098+00:00", "EventTime": "2024-05-21T12:25:34.649116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5uuHc2jYd8UnoXEOc"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "9b8a0bde-bb4c-46d2-8839-1f8087cedd29", "DetectTime": "2024-05-21T12:25:34.671021+00:00", "EventTime": "2024-05-21T12:25:34.671040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktLim2176nBItUJg9"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 17} +{"Format": "IDEA0", "ID": "f9da6565-fe0e-42ca-a3dc-532a83af4f57", "DetectTime": "2024-05-21T12:25:34.682612+00:00", "EventTime": "2024-05-21T12:25:34.682631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNEsQ1MaHGYNTx3Y5"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "beae9741-cc2c-44c5-9614-b83ffa94903b", "DetectTime": "2024-05-21T12:25:34.704193+00:00", "EventTime": "2024-05-21T12:25:34.704211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGtiW2GkvOq6PUiJ7"], "accumulated_threat_level": 8.2, "timewindow": 17} +{"Format": "IDEA0", "ID": "2d9ddd21-213d-4d5a-b710-6f6901a93a5b", "DetectTime": "2024-05-21T12:25:34.718626+00:00", "EventTime": "2024-05-21T12:25:34.718647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwJ5z1dZyNtau17Ei"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "dd183230-854e-4b29-b876-d3297967e506", "DetectTime": "2024-05-21T12:25:34.744358+00:00", "EventTime": "2024-05-21T12:25:34.744378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbInXf2IBRjLeP4R8k"], "accumulated_threat_level": 9.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "9123ec9f-a682-40bd-b826-a13b75e7871d", "DetectTime": "2024-05-21T12:25:34.749269+00:00", "EventTime": "2024-05-21T12:25:34.749287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmx5h2v5oxLZTG0Z7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "7ef5a86a-2076-428e-91ed-96ff16de7258", "DetectTime": "2024-05-21T12:25:34.771817+00:00", "EventTime": "2024-05-21T12:25:34.771836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzLl31Uj0Ls7YYJNi"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "5d4fc99b-a50b-451c-9fd8-c24feb77e844", "DetectTime": "2024-05-21T12:25:34.796598+00:00", "EventTime": "2024-05-21T12:25:34.796616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmoAQD4xTnoOrHo4t"], "accumulated_threat_level": 9.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "f6b1e086-f6a9-4c83-959b-66e495376c81", "DetectTime": "2024-05-21T12:25:34.801124+00:00", "EventTime": "2024-05-21T12:25:34.801146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpowL3zg6I1xTs6F2"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "a7ab514d-ff00-43a8-8372-ddda33e57d54", "DetectTime": "2024-05-21T12:25:34.830665+00:00", "EventTime": "2024-05-21T12:25:34.830686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7MOgM2ZukjxSVyj5g"], "accumulated_threat_level": 10.600000000000001, "timewindow": 17} +{"Format": "IDEA0", "ID": "94984b97-ebcb-4e27-81c1-d30c4a072bf8", "DetectTime": "2024-05-21T12:25:34.854158+00:00", "EventTime": "2024-05-21T12:25:34.854179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOnVv2C6BwFnKPr87"], "accumulated_threat_level": 11.400000000000002, "timewindow": 17} +{"Format": "IDEA0", "ID": "473508bb-ff6f-424b-a505-e99d5fbda62d", "DetectTime": "2024-05-21T12:25:34.929957+00:00", "EventTime": "2024-05-21T12:25:34.929980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzU7Ig20BdlyjaFDx6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "e8afc51e-7b4d-4eda-9419-e20328e76bd2", "DetectTime": "2024-05-21T12:25:34.953319+00:00", "EventTime": "2024-05-21T12:25:34.953340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVD4NEoSp1c7qLwLg"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "af7dc980-e0fb-4a06-a2f7-56dc08d2d19c", "DetectTime": "2024-05-21T12:25:34.976001+00:00", "EventTime": "2024-05-21T12:25:34.976022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChV58r3anDVCIELKM"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "f772ffc3-61fd-4f2f-b4fc-c3f5a2fbf7ac", "DetectTime": "2024-05-21T12:25:34.993792+00:00", "EventTime": "2024-05-21T12:25:34.993811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChV58r3anDVCIELKM"], "accumulated_threat_level": 2.0, "timewindow": 11} +{"Format": "IDEA0", "ID": "9d399694-0e9a-47fc-b029-2c2ac2ceb11a", "DetectTime": "2024-05-21T12:25:34.998533+00:00", "EventTime": "2024-05-21T12:25:34.998553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgoji92iuheH3C08oh"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "9b3bfced-6d09-47f7-8150-cc52986e8141", "DetectTime": "2024-05-21T12:25:35.021449+00:00", "EventTime": "2024-05-21T12:25:35.021471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfh3aq1iUG7H1gvAB6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "0f183367-b939-4d25-af89-45417c2a24e2", "DetectTime": "2024-05-21T12:25:35.063627+00:00", "EventTime": "2024-05-21T12:25:35.063656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpw8ubVBKEtkjJ484"], "accumulated_threat_level": 12.200000000000003, "timewindow": 17} +{"Format": "Json", "ID": "0f183367-b939-4d25-af89-45417c2a24e2", "DetectTime": "2024-05-21T12:25:35.063627+00:00", "EventTime": "2024-05-21T12:25:35.063656+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "1970-01-01T16:53:51.207166+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2024/05/21 12:25:35.348530)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 17, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "6c35076a-910d-484b-ace3-a6a561310e50", "DetectTime": "2024-05-21T12:25:35.352848+00:00", "EventTime": "2024-05-21T12:25:35.352867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdY3a51hgORdwbLwE5"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "a2e38d5c-a277-4ca3-a920-6e29b06d84b7", "DetectTime": "2024-05-21T12:25:35.363547+00:00", "EventTime": "2024-05-21T12:25:35.363565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFA3M30AJM4M2w3s8"], "accumulated_threat_level": 0.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "7a914117-cac6-4cdf-9a7f-aab6d82b3b11", "DetectTime": "2024-05-21T12:25:35.368365+00:00", "EventTime": "2024-05-21T12:25:35.368387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl2b4G4YXwOmFLKUYg"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "33780107-1a55-409d-9645-7a60e1dc4f74", "DetectTime": "2024-05-21T12:25:35.373222+00:00", "EventTime": "2024-05-21T12:25:35.373241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxwl5y4dJj5oj4esx6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "d2de2ecc-3174-41df-b176-817414fb3403", "DetectTime": "2024-05-21T12:25:35.377901+00:00", "EventTime": "2024-05-21T12:25:35.377920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cypl6xAwIUUHq8dNa"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "d7dfd4b0-661a-4f63-8d93-eff625611738", "DetectTime": "2024-05-21T12:25:35.382425+00:00", "EventTime": "2024-05-21T12:25:35.382444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.65.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYqXD3nS0rqbHkcP3"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "6e3beb21-7dd2-4ff3-b2fc-229bd8e757ca", "DetectTime": "2024-05-21T12:25:35.386961+00:00", "EventTime": "2024-05-21T12:25:35.386979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMDVv1KQVqwsYtzld"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "82965b09-58ea-4429-9e68-cc1e0d3373a1", "DetectTime": "2024-05-21T12:25:35.397856+00:00", "EventTime": "2024-05-21T12:25:35.397881+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2IDw3JbyAhVerfJ"], "accumulated_threat_level": 0, "timewindow": 11} +{"Format": "IDEA0", "ID": "92b6075a-6158-4f3d-b9f8-152eb0abf230", "DetectTime": "2024-05-21T12:25:35.410135+00:00", "EventTime": "2024-05-21T12:25:35.410153+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2IDw3JbyAhVerfJ"], "accumulated_threat_level": 2.5, "timewindow": 11} +{"Format": "IDEA0", "ID": "8113728e-0f25-4133-b631-fe4cc2c29f80", "DetectTime": "2024-05-21T12:25:35.414652+00:00", "EventTime": "2024-05-21T12:25:35.414669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNBrT3uj1aJe91FMi"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "8c367f3e-7f0e-44b2-8640-cc5978636cf3", "DetectTime": "2024-05-21T12:25:35.419351+00:00", "EventTime": "2024-05-21T12:25:35.419372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeoBuGXKg4LUv1se9"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "688b530b-84bc-49cb-90af-58d0705df699", "DetectTime": "2024-05-21T12:25:35.571049+00:00", "EventTime": "2024-05-21T12:25:35.571070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WLZ119SvSOmDCITj"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "2b61ba47-9bfd-4dfe-adcd-fa402e1c5b30", "DetectTime": "2024-05-21T12:25:35.584532+00:00", "EventTime": "2024-05-21T12:25:35.584551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbgfXcEdgt32HAnk3"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "9bfe7658-9a58-4b01-a20d-2135db461039", "DetectTime": "2024-05-21T12:25:35.647357+00:00", "EventTime": "2024-05-21T12:25:35.647380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eFcj4E9wsu7DccFk"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "8c85732a-0cff-4ccf-a83a-98d46e09b3a8", "DetectTime": "2024-05-21T12:25:35.652204+00:00", "EventTime": "2024-05-21T12:25:35.652223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czj9eg2b8GsYeBx6ub"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "1aaf996e-ef7a-463c-b8aa-55bbd079ed13", "DetectTime": "2024-05-21T12:25:35.668226+00:00", "EventTime": "2024-05-21T12:25:35.668246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWqQc2I28CpyYqQm"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "a9fd6a5e-c54a-4856-9f5c-9a5f0f525f4e", "DetectTime": "2024-05-21T12:25:35.683064+00:00", "EventTime": "2024-05-21T12:25:35.683083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDPv011gLijKTgHbf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 17} +{"Format": "IDEA0", "ID": "8f4610fe-842e-4a80-ac1a-e8b78a6d80d4", "DetectTime": "2024-05-21T12:25:35.706914+00:00", "EventTime": "2024-05-21T12:25:35.706933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIegsn3n1EcDOVbRQ8"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "8c757b0c-f281-44f8-bdb7-27fcb7ebb397", "DetectTime": "2024-05-21T12:25:35.712787+00:00", "EventTime": "2024-05-21T12:25:35.712805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0sa23V8ixWg8Kmzj"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "eae1eb1c-fd6e-41cf-9ccd-b49afa0de1fc", "DetectTime": "2024-05-21T12:25:35.743640+00:00", "EventTime": "2024-05-21T12:25:35.743662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNnB12xDLCRiJi9x7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "453641cc-daff-4da1-9859-ad51ada7deac", "DetectTime": "2024-05-21T12:25:35.760319+00:00", "EventTime": "2024-05-21T12:25:35.760339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWitrJ2wqH0vlVmtQ9"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "6bb9d3e7-db6e-401c-a4d5-1483fec01fa1", "DetectTime": "2024-05-21T12:25:35.780036+00:00", "EventTime": "2024-05-21T12:25:35.780058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCxgv43Bn5SMu6xE4"], "accumulated_threat_level": 3.2, "timewindow": 17} +{"Format": "IDEA0", "ID": "f75fa592-b367-4a9f-ad7f-fb3eb65b0805", "DetectTime": "2024-05-21T12:25:35.784651+00:00", "EventTime": "2024-05-21T12:25:35.784669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGThr4lpliMPVqZL4"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "00f6e90d-c7fb-468c-b230-61fa3e41f7a0", "DetectTime": "2024-05-21T12:25:35.803982+00:00", "EventTime": "2024-05-21T12:25:35.804001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YyEFnlYKTByctZ2"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "2bad27c6-31f8-4aa3-bc1d-a79c102d5df6", "DetectTime": "2024-05-21T12:25:35.834465+00:00", "EventTime": "2024-05-21T12:25:35.834485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CokyLq4sxe0vqFJZna"], "accumulated_threat_level": 4.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "fa1d0ef6-ef3c-4848-bb09-9a3e0cd3a230", "DetectTime": "2024-05-21T12:25:35.839066+00:00", "EventTime": "2024-05-21T12:25:35.839083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjPMdv2qu7Aw1RmzQ4"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "678ad9cd-670e-4390-a029-85c4ed21581c", "DetectTime": "2024-05-21T12:25:35.859379+00:00", "EventTime": "2024-05-21T12:25:35.859399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.92.101.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cquxkt1W3Mgrbxm404"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "d82e787c-9f43-4fe0-bda5-6164d8b01804", "DetectTime": "2024-05-21T12:25:35.885730+00:00", "EventTime": "2024-05-21T12:25:35.885749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTa6T94T8mGWDGQ2za"], "accumulated_threat_level": 4.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "98775a1a-cb0e-458d-a685-1f61dcf44092", "DetectTime": "2024-05-21T12:25:35.890983+00:00", "EventTime": "2024-05-21T12:25:35.891001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbrk0d3Fk0rnBtBoT6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "4e91ad38-1524-4aa3-a6b8-201fd1820b8e", "DetectTime": "2024-05-21T12:25:35.907936+00:00", "EventTime": "2024-05-21T12:25:35.907957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0guWk170WMXu1fDV8"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "49562a26-3732-441c-b025-9e464f0abc01", "DetectTime": "2024-05-21T12:25:35.927300+00:00", "EventTime": "2024-05-21T12:25:35.927320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYMhb310QDyf1x917"], "accumulated_threat_level": 5.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "d22d24df-785c-4e05-b8cb-ea13f5a81031", "DetectTime": "2024-05-21T12:25:35.938775+00:00", "EventTime": "2024-05-21T12:25:35.938793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AneG5SakMemnI6i"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "01a62326-0c77-494d-9246-bc8ad63fa766", "DetectTime": "2024-05-21T12:25:35.969591+00:00", "EventTime": "2024-05-21T12:25:35.969613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 5772/TCP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrZJt1TyNAfbKFDzf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 17} +{"Format": "IDEA0", "ID": "164fac38-85b9-4dda-bbe6-7e910afbb108", "DetectTime": "2024-05-21T12:25:36.061213+00:00", "EventTime": "2024-05-21T12:25:36.061232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mA5m30ULhdl10UV1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "1e260f1f-be98-4a7d-b140-630ff26c1eaf", "DetectTime": "2024-05-21T12:25:36.087052+00:00", "EventTime": "2024-05-21T12:25:36.087072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfaDly3URHuA9aMcO7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "eabe2d95-08f3-46ee-95f9-de478334d507", "DetectTime": "2024-05-21T12:25:36.115118+00:00", "EventTime": "2024-05-21T12:25:36.115136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9V7I1shwblsVkFZk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 17} +{"Format": "IDEA0", "ID": "e5dde5bf-4799-47f3-b937-8a19b9516aad", "DetectTime": "2024-05-21T12:25:36.119545+00:00", "EventTime": "2024-05-21T12:25:36.119563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClLAH412pc3DaVABJ8"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "70d315c5-122b-4e57-8182-624bd68f6181", "DetectTime": "2024-05-21T12:25:36.158582+00:00", "EventTime": "2024-05-21T12:25:36.158600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 6863/TCP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa08E9RwE7ulX3El"], "accumulated_threat_level": 9.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "718ad833-6c1c-4fd5-9681-cfa39ac4d0a5", "DetectTime": "2024-05-21T12:25:36.195724+00:00", "EventTime": "2024-05-21T12:25:36.195744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0Si43RYV4x60DZy3"], "accumulated_threat_level": 10.4, "timewindow": 17} +{"Format": "IDEA0", "ID": "615430d0-2aae-449e-a6c7-7fbb83197639", "DetectTime": "2024-05-21T12:25:36.219852+00:00", "EventTime": "2024-05-21T12:25:36.219872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnEd1n4M1JVgsaqd0b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 17} +{"Format": "IDEA0", "ID": "bd07dfa3-5c60-40dd-b0ee-b615f6d2aa38", "DetectTime": "2024-05-21T12:25:36.275444+00:00", "EventTime": "2024-05-21T12:25:36.275462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXttI2cnOjt8vCfD2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 17} +{"Format": "Json", "ID": "bd07dfa3-5c60-40dd-b0ee-b615f6d2aa38", "DetectTime": "2024-05-21T12:25:36.275444+00:00", "EventTime": "2024-05-21T12:25:36.275462+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "1970-01-01T16:54:26.561250+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2024/05/21 12:25:36.469735)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 17, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5aa9cd0d-e6c0-4cfc-a3f9-adbc6a087a0b", "DetectTime": "2024-05-21T12:25:36.480536+00:00", "EventTime": "2024-05-21T12:25:36.480553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggwL1Um5TSi629f6"], "accumulated_threat_level": 0.8, "timewindow": 17} +{"Format": "IDEA0", "ID": "e948246c-39da-4c13-afb7-57db62c98299", "DetectTime": "2024-05-21T12:25:36.534698+00:00", "EventTime": "2024-05-21T12:25:36.534719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kefj4hoazbPvy6C4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "93b797d4-ece7-44ef-b14f-9ed945a38a3c", "DetectTime": "2024-05-21T12:25:36.542353+00:00", "EventTime": "2024-05-21T12:25:36.542372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnf5Ih3tN9yiFdohdb"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "36f804b6-9f31-4e74-8d26-86f84534c9f1", "DetectTime": "2024-05-21T12:25:36.592942+00:00", "EventTime": "2024-05-21T12:25:36.592964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.65.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXdsOf2BVOuF6kRn3h"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "80e99f99-19c9-42a6-99b6-2bc5844520fb", "DetectTime": "2024-05-21T12:25:36.648716+00:00", "EventTime": "2024-05-21T12:25:36.648739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR4Rwm4D99fJG84YV5"], "accumulated_threat_level": 0.8, "timewindow": 18} +{"Format": "IDEA0", "ID": "34570d00-68c9-4cbf-94a4-d4dd52be62cc", "DetectTime": "2024-05-21T12:25:36.818152+00:00", "EventTime": "2024-05-21T12:25:36.818171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.92.101.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGYcs1pOYYr6jEr31"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "3fc1ff9d-7e93-4b4e-a801-22a611f74f78", "DetectTime": "2024-05-21T12:25:36.855753+00:00", "EventTime": "2024-05-21T12:25:36.855772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrNhV15yztOzdzcx8"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "7ff99747-6b3e-430f-ae31-c59511dbd894", "DetectTime": "2024-05-21T12:25:36.886657+00:00", "EventTime": "2024-05-21T12:25:36.886678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifnuE4rgdINGFyI46"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "0e57e1ec-12da-424b-9bb7-e3be8618e062", "DetectTime": "2024-05-21T12:25:36.910391+00:00", "EventTime": "2024-05-21T12:25:36.910422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C082Ja3W04KlpM7lX3"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "128031d1-dd1c-44e0-a722-e9c029551144", "DetectTime": "2024-05-21T12:25:37.017502+00:00", "EventTime": "2024-05-21T12:25:37.017521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkM4raMQn9WaqhgUf", "CMBvvL3hlbcS746BR4", "C3N8Oc3nLlnndGM0hj", "CbwX3p1xf8MXIvlUHa"], "accumulated_threat_level": 1.3, "timewindow": 18} +{"Format": "IDEA0", "ID": "95feb305-360a-4df6-89f8-930ada231d0d", "DetectTime": "2024-05-21T12:25:37.149861+00:00", "EventTime": "2024-05-21T12:25:37.149881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4O2b3r1f26bV3Qsi"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "7da88966-dd42-47eb-beab-696af35b694d", "DetectTime": "2024-05-21T12:25:37.183222+00:00", "EventTime": "2024-05-21T12:25:37.183243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3KBMowmnt0T8ifg"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "26e115e3-9146-4995-86c4-d5df02953baf", "DetectTime": "2024-05-21T12:25:37.206331+00:00", "EventTime": "2024-05-21T12:25:37.206353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJsaiA4SKtvzdtYcW"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "4be26aa6-9818-497b-b18c-6ad20566d2f7", "DetectTime": "2024-05-21T12:25:37.481385+00:00", "EventTime": "2024-05-21T12:25:37.481407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqocJB17eCzajz74Cd"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "8c070cfb-df6d-421b-8390-f2cf0533ecd2", "DetectTime": "2024-05-21T12:25:37.520890+00:00", "EventTime": "2024-05-21T12:25:37.520908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71pAJ1iZLOksdPpYb"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "7f620391-2c7a-4ce8-8067-1e2dd5dd1b66", "DetectTime": "2024-05-21T12:25:37.535775+00:00", "EventTime": "2024-05-21T12:25:37.535795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEMnJrbygbpJdzW"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "c8ffb90b-2fe6-4c71-87f2-e874430859f5", "DetectTime": "2024-05-21T12:25:37.559956+00:00", "EventTime": "2024-05-21T12:25:37.559977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMWxK2EPY2jr0id6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "54f6e463-1dd1-4243-8e3e-d9c287795d29", "DetectTime": "2024-05-21T12:25:37.581269+00:00", "EventTime": "2024-05-21T12:25:37.581290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OOHp4yDxiupLUE6i"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "250707a4-48ed-4d54-988b-4ab4764d5f29", "DetectTime": "2024-05-21T12:25:37.607009+00:00", "EventTime": "2024-05-21T12:25:37.607032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdpBs2CC6k9Ox37g3"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "94acd61e-3179-44e0-8911-e1b1d4286bc0", "DetectTime": "2024-05-21T12:25:37.654342+00:00", "EventTime": "2024-05-21T12:25:37.654363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWI4I8rMxVMKXIKEd"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "3c621a19-0601-4b56-8c13-2ce91fb012f9", "DetectTime": "2024-05-21T12:25:37.680239+00:00", "EventTime": "2024-05-21T12:25:37.680262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RFOzxVxjhZOm6Y1"], "accumulated_threat_level": 2.1, "timewindow": 18} +{"Format": "IDEA0", "ID": "1b5462e5-6240-438e-a841-b6b9c56985c0", "DetectTime": "2024-05-21T12:25:37.690078+00:00", "EventTime": "2024-05-21T12:25:37.690099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOnelEqQcDH8ZqQ9"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "d540be37-8746-4390-a0fe-c96385697969", "DetectTime": "2024-05-21T12:25:37.722848+00:00", "EventTime": "2024-05-21T12:25:37.722867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMtZ8l21DxjCitnFl2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 18} +{"Format": "IDEA0", "ID": "46a51470-9703-42fe-888f-43169c1500f3", "DetectTime": "2024-05-21T12:25:37.727800+00:00", "EventTime": "2024-05-21T12:25:37.727819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yGvR1WE2QUJj2dc"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "d5bb6d9f-35a1-41ee-87bf-0dad43589c42", "DetectTime": "2024-05-21T12:25:37.743826+00:00", "EventTime": "2024-05-21T12:25:37.743844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIkYKyAiiKa5rQ5i6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "a7bf0bf1-4e20-4a9e-b6e9-9f0172ff41bf", "DetectTime": "2024-05-21T12:25:37.762026+00:00", "EventTime": "2024-05-21T12:25:37.762046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CULRZp1fW3aUSQXnCk"], "accumulated_threat_level": 3.7, "timewindow": 18} +{"Format": "IDEA0", "ID": "a31e21e2-f541-46b6-8ca2-fce0c28b40fd", "DetectTime": "2024-05-21T12:25:37.790032+00:00", "EventTime": "2024-05-21T12:25:37.790049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQukoq18YQ69oaHM3a"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "71c29af7-1d1f-497f-9f9f-4c8849c47947", "DetectTime": "2024-05-21T12:25:37.813270+00:00", "EventTime": "2024-05-21T12:25:37.813289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDCeZ3XVAiEy4tQAf"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "b2defe57-d585-4c9d-bf6e-cccfc95dad21", "DetectTime": "2024-05-21T12:25:37.859948+00:00", "EventTime": "2024-05-21T12:25:37.859969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEXdipMdjyreWtshd"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "8fa77254-9d20-4462-9004-1ec57d7c7dbd", "DetectTime": "2024-05-21T12:25:37.888759+00:00", "EventTime": "2024-05-21T12:25:37.888779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9KMBwJ861ZsJS78"], "accumulated_threat_level": 4.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "ee1a17f2-b548-4b7e-b655-3ad230d53cbb", "DetectTime": "2024-05-21T12:25:37.923952+00:00", "EventTime": "2024-05-21T12:25:37.923971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "Connection to unknown destination port 1787/UDP destination IP 82.49.114.244. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6cq64ZYBdnbpItJ4"], "accumulated_threat_level": 5.3, "timewindow": 18} +{"Format": "IDEA0", "ID": "c0f0117b-0c42-4dc4-8c64-f4dd6640dbb5", "DetectTime": "2024-05-21T12:25:38.040999+00:00", "EventTime": "2024-05-21T12:25:38.041023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtitAZWb33XEgcdgh"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "7a98221e-42a6-48d5-b67f-0b4138eaf4a9", "DetectTime": "2024-05-21T12:25:38.075133+00:00", "EventTime": "2024-05-21T12:25:38.075156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9oCu2GU6ERBw5cG1"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "203da72c-b49f-4395-957b-8287f0490576", "DetectTime": "2024-05-21T12:25:38.099049+00:00", "EventTime": "2024-05-21T12:25:38.099072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62lDu4XVHJZDgToN7"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "b2f741a1-fcdd-4b4a-94f3-cc7aa8b27b3d", "DetectTime": "2024-05-21T12:25:38.131924+00:00", "EventTime": "2024-05-21T12:25:38.131945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqxYZM1QhAXp0WrVsl"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "9290617f-125d-437d-92a1-63214f392c88", "DetectTime": "2024-05-21T12:25:38.158075+00:00", "EventTime": "2024-05-21T12:25:38.158093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOLEs3oaF9Tpaxa3h"], "accumulated_threat_level": 6.1, "timewindow": 18} +{"Format": "IDEA0", "ID": "6e443e42-1e30-4742-aaf3-909f97f9a8f4", "DetectTime": "2024-05-21T12:25:38.170920+00:00", "EventTime": "2024-05-21T12:25:38.170941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8l7xRUzFKKgIBtj"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "cc855770-a8dc-4d67-ae59-d75b1df247bb", "DetectTime": "2024-05-21T12:25:38.194661+00:00", "EventTime": "2024-05-21T12:25:38.194681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKMBDD1EeNCmCyrvb1"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 18} +{"Format": "IDEA0", "ID": "c6d2fbbb-0b16-434d-897d-be790c67e771", "DetectTime": "2024-05-21T12:25:38.201786+00:00", "EventTime": "2024-05-21T12:25:38.201804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FMsl3LKzSwqi4HS6"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "12ced5b8-53d2-4072-9b87-9c1ed5ab28c0", "DetectTime": "2024-05-21T12:25:38.230907+00:00", "EventTime": "2024-05-21T12:25:38.230925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "Connection to unknown destination port 7605/UDP destination IP 84.59.131.0. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrI8x1PXEJftF9UBg"], "accumulated_threat_level": 7.699999999999999, "timewindow": 18} +{"Format": "IDEA0", "ID": "782a160f-785a-4927-b1ba-e61c0336937d", "DetectTime": "2024-05-21T12:25:38.237386+00:00", "EventTime": "2024-05-21T12:25:38.237408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmuXxRpQJ2O2VOqd"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "884906eb-671a-4469-a9c7-32f5d30bc391", "DetectTime": "2024-05-21T12:25:38.264776+00:00", "EventTime": "2024-05-21T12:25:38.264797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csrgv8lUiHOitr527"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "15782e00-192e-49b3-80c9-c174f4bcd46d", "DetectTime": "2024-05-21T12:25:38.324766+00:00", "EventTime": "2024-05-21T12:25:38.324783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnsONzWpRUAGWnZh"], "accumulated_threat_level": 8.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "ab517ac4-99bc-4aee-9cea-1c758fcbd4fb", "DetectTime": "2024-05-21T12:25:38.349734+00:00", "EventTime": "2024-05-21T12:25:38.349752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkM13SCXgZt5dY50a"], "accumulated_threat_level": 9.3, "timewindow": 18} +{"Format": "IDEA0", "ID": "8b99e5ff-0172-4234-8730-3600c0e0be8e", "DetectTime": "2024-05-21T12:25:38.373588+00:00", "EventTime": "2024-05-21T12:25:38.373608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwqVtM8Q0EuPrL6h"], "accumulated_threat_level": 10.100000000000001, "timewindow": 18} +{"Format": "IDEA0", "ID": "c019b9d3-5443-4932-b231-c6ce148ef5e1", "DetectTime": "2024-05-21T12:25:38.397697+00:00", "EventTime": "2024-05-21T12:25:38.397719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.93.177"]}], "Attach": [{"Content": "Connection to unknown destination port 24237/UDP destination IP 78.189.93.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO88GP1r15dbgeZ7Ml"], "accumulated_threat_level": 10.900000000000002, "timewindow": 18} +{"Format": "IDEA0", "ID": "d24f5343-d91a-4b2a-990c-e64ca6e12cc2", "DetectTime": "2024-05-21T12:25:38.421119+00:00", "EventTime": "2024-05-21T12:25:38.421137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73FMl1peHRmkoWGWa"], "accumulated_threat_level": 11.700000000000003, "timewindow": 18} +{"Format": "IDEA0", "ID": "06c538c8-e399-4c2e-b996-fe2da9b96ab6", "DetectTime": "2024-05-21T12:25:38.444740+00:00", "EventTime": "2024-05-21T12:25:38.444758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "Connection to unknown destination port 2583/UDP destination IP 116.203.152.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIli0Z3HAkrpr6MD26"], "accumulated_threat_level": 12.500000000000004, "timewindow": 18} +{"Format": "Json", "ID": "06c538c8-e399-4c2e-b996-fe2da9b96ab6", "DetectTime": "2024-05-21T12:25:38.444740+00:00", "EventTime": "2024-05-21T12:25:38.444758+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["116.203.152.56"]}], "Attach": [{"Content": "1970-01-01T17:26:42.974740+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2024/05/21 12:25:38.632849)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 18, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "0f587276-216b-40e2-b42f-cca42fd1d30f", "DetectTime": "2024-05-21T12:25:38.645128+00:00", "EventTime": "2024-05-21T12:25:38.645147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYOUsY1kz7ZgNHBPSb"], "accumulated_threat_level": 0.8, "timewindow": 18} +{"Format": "IDEA0", "ID": "bac3ed38-5783-415f-98d6-30a4374d2e0a", "DetectTime": "2024-05-21T12:25:38.655287+00:00", "EventTime": "2024-05-21T12:25:38.655304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "Connection to unknown destination port 26252/UDP destination IP 78.182.138.111. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CidleD4V3mUrDr19Q2"], "accumulated_threat_level": 1.6, "timewindow": 18} +{"Format": "IDEA0", "ID": "c983be36-10bd-427f-98f1-de4b60a13211", "DetectTime": "2024-05-21T12:25:38.660463+00:00", "EventTime": "2024-05-21T12:25:38.660481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAS9km3JrZqNfyNkzj"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "f5893e67-3d84-4728-b277-468d5b13f7cb", "DetectTime": "2024-05-21T12:25:38.671606+00:00", "EventTime": "2024-05-21T12:25:38.671626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgjZ32ZDGPe8Zg2m3"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "afa71a42-ae5d-4c62-ab76-6e81ca65f270", "DetectTime": "2024-05-21T12:25:38.676349+00:00", "EventTime": "2024-05-21T12:25:38.676369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnjTn4zkvoI2A5Rx9"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "37c8eb8e-66fa-44db-b360-f4abf27b6acb", "DetectTime": "2024-05-21T12:25:38.685925+00:00", "EventTime": "2024-05-21T12:25:38.685945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy3O3h34G5ALafY2si"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "03856569-3a97-4951-aaa7-d8d397417b7e", "DetectTime": "2024-05-21T12:25:38.705183+00:00", "EventTime": "2024-05-21T12:25:38.705202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPx1sdcTjAbgIuRe"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "897801bc-805b-47af-8745-f78c1f71fcca", "DetectTime": "2024-05-21T12:25:38.725814+00:00", "EventTime": "2024-05-21T12:25:38.725835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQ5kj3LgQEarN3ch4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 18} +{"Format": "IDEA0", "ID": "125358ce-1710-4a66-8793-221c8a5d8f96", "DetectTime": "2024-05-21T12:25:38.942630+00:00", "EventTime": "2024-05-21T12:25:38.942650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSG2of46lQ4xduyqP8"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "ca0ed71b-41b9-4252-bcd9-efb022037e0a", "DetectTime": "2024-05-21T12:25:38.979524+00:00", "EventTime": "2024-05-21T12:25:38.979546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ggxK9PjaV3Kodcc"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "34af5d10-4a2f-43c8-9293-8c32bc944b5f", "DetectTime": "2024-05-21T12:25:39.000441+00:00", "EventTime": "2024-05-21T12:25:39.000461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSAZz727ImNO0Bfupj"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "eef8f566-c9d2-4e1d-ba0a-59db630a246d", "DetectTime": "2024-05-21T12:25:39.047065+00:00", "EventTime": "2024-05-21T12:25:39.047087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUJoD2mfnG4DKVJB2"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "5dbff93d-0666-403a-b1cb-d865b9d64b8f", "DetectTime": "2024-05-21T12:25:39.065266+00:00", "EventTime": "2024-05-21T12:25:39.065284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ygVh4q36OUozYZ4"], "accumulated_threat_level": 3.2, "timewindow": 18} +{"Format": "IDEA0", "ID": "adfa84d4-e667-4a90-ace6-3ea15c32b9d3", "DetectTime": "2024-05-21T12:25:39.069767+00:00", "EventTime": "2024-05-21T12:25:39.069785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUqMD11MK542fbzfd"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "31ea8466-cfd8-4d6a-aea9-217d96cf6c94", "DetectTime": "2024-05-21T12:25:39.076742+00:00", "EventTime": "2024-05-21T12:25:39.076760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTQHT3yG6MuFUMGYb"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "c7c85c10-03d2-4c93-99f1-14f093476e7c", "DetectTime": "2024-05-21T12:25:39.081272+00:00", "EventTime": "2024-05-21T12:25:39.081291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDG3cCuQFjyHdyFac"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "dc6c65f0-616b-4ed7-8497-2ad616a28306", "DetectTime": "2024-05-21T12:25:39.104128+00:00", "EventTime": "2024-05-21T12:25:39.104148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGody42Y9iLoSvWNa8"], "accumulated_threat_level": 3.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "ef541694-f331-403a-abd7-b745708c4583", "DetectTime": "2024-05-21T12:25:39.136207+00:00", "EventTime": "2024-05-21T12:25:39.136229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTWtz23Exq3fAbjD4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "07727849-9e4b-4abb-ad71-0d9335c4a7e0", "DetectTime": "2024-05-21T12:25:39.160134+00:00", "EventTime": "2024-05-21T12:25:39.160152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKgYA45ITH281Lk22"], "accumulated_threat_level": 4.8, "timewindow": 18} +{"Format": "IDEA0", "ID": "653b644e-12a1-4969-8800-53f592beebed", "DetectTime": "2024-05-21T12:25:39.185649+00:00", "EventTime": "2024-05-21T12:25:39.185669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBc5QU3K53sj6lFpL5"], "accumulated_threat_level": 5.6, "timewindow": 18} +{"Format": "IDEA0", "ID": "7a500357-478a-4215-8fd4-a97313f6a3db", "DetectTime": "2024-05-21T12:25:39.209776+00:00", "EventTime": "2024-05-21T12:25:39.209798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPy4Zl3nBuXieToit"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 18} +{"Format": "IDEA0", "ID": "18af80e3-f628-435f-bc41-0fbfeca4c796", "DetectTime": "2024-05-21T12:25:39.228293+00:00", "EventTime": "2024-05-21T12:25:39.228315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce4ggE40hcMhobV9A"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "4a0a3ca4-20a5-486f-8cc9-fc9f4345e4c9", "DetectTime": "2024-05-21T12:25:39.262031+00:00", "EventTime": "2024-05-21T12:25:39.262050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUaX1Q3X6UfFYJnyM1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 18} +{"Format": "IDEA0", "ID": "3036e99b-2f17-4106-9e6b-b100515da2d0", "DetectTime": "2024-05-21T12:25:39.286163+00:00", "EventTime": "2024-05-21T12:25:39.286180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdlHj4ktRHaWBKzKj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 18} +{"Format": "IDEA0", "ID": "4c2e96fc-47e8-49de-88c3-db0f346986d2", "DetectTime": "2024-05-21T12:25:39.309797+00:00", "EventTime": "2024-05-21T12:25:39.309815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35gLAi8nOSzB3nZ4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 18} +{"Format": "IDEA0", "ID": "3649030c-b8b0-4d08-ac66-acfe4871a7ac", "DetectTime": "2024-05-21T12:25:39.334020+00:00", "EventTime": "2024-05-21T12:25:39.334039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "Connection to unknown destination port 14502/UDP destination IP 88.244.13.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9v8N2YbjgXWQ3MFg"], "accumulated_threat_level": 9.6, "timewindow": 18} +{"Format": "IDEA0", "ID": "eac7ad16-e665-4481-b93a-e652b9c7bd80", "DetectTime": "2024-05-21T12:25:39.358327+00:00", "EventTime": "2024-05-21T12:25:39.358349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap3qa46NZWCkQvPNa"], "accumulated_threat_level": 10.4, "timewindow": 18} +{"Format": "IDEA0", "ID": "b2d8a50e-2659-4727-a547-176b37c3505e", "DetectTime": "2024-05-21T12:25:39.412767+00:00", "EventTime": "2024-05-21T12:25:39.412794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1u1jd1YH9MrEFJnCe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 18} +{"Format": "IDEA0", "ID": "1be9f0e1-2ca4-4d9a-946e-2139decc5cf9", "DetectTime": "2024-05-21T12:25:39.539481+00:00", "EventTime": "2024-05-21T12:25:39.539504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvaiSF1VG37YxIoEV2", "CdfDTfPEBXguAZl44", "CRMHsottMWx1dd94k", "Cabn8V1QndCIjSjqv5"], "accumulated_threat_level": 11.700000000000001, "timewindow": 18} +{"Format": "IDEA0", "ID": "d551a0a4-2558-4542-9eba-96a99557070f", "DetectTime": "2024-05-21T12:25:39.628738+00:00", "EventTime": "2024-05-21T12:25:39.628759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.164.36.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9LGF2Ajh7Sy85ezh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "5707a731-e558-4402-b2fd-a9c168da549b", "DetectTime": "2024-05-21T12:25:39.878109+00:00", "EventTime": "2024-05-21T12:25:39.878128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59WFJ26Ya5vTsCUX1"], "accumulated_threat_level": 12.500000000000002, "timewindow": 18} +{"Format": "Json", "ID": "5707a731-e558-4402-b2fd-a9c168da549b", "DetectTime": "2024-05-21T12:25:39.878109+00:00", "EventTime": "2024-05-21T12:25:39.878128+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "1970-01-01T17:56:56.257111+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2024/05/21 12:25:40.074556)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 18, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "4f2f1d4c-115c-44ef-b092-1d5fd820628b", "DetectTime": "2024-05-21T12:25:40.086400+00:00", "EventTime": "2024-05-21T12:25:40.086434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6kT62LKn38ajyGcd"], "accumulated_threat_level": 0.8, "timewindow": 18} +{"Format": "IDEA0", "ID": "80bcbff4-46e9-4f63-8777-d6622abc25c7", "DetectTime": "2024-05-21T12:25:40.098157+00:00", "EventTime": "2024-05-21T12:25:40.098176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.238.65.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4636/UDP destination IP 123.238.65.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYC9zt46zzi04d8IJ2"], "accumulated_threat_level": 1.6, "timewindow": 18} +{"Format": "IDEA0", "ID": "6dc52e29-1572-4509-a850-3043b6d5a772", "DetectTime": "2024-05-21T12:25:40.102465+00:00", "EventTime": "2024-05-21T12:25:40.102482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.21.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3Owg1Z590vy476a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "d83e1516-6152-439c-8fe7-98ffc7de9fad", "DetectTime": "2024-05-21T12:25:40.112471+00:00", "EventTime": "2024-05-21T12:25:40.112489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKv12RmkMPav9Ehl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 18} +{"Format": "IDEA0", "ID": "ec78478f-bac0-4ebd-bfdf-b906d2c42caf", "DetectTime": "2024-05-21T12:25:40.130695+00:00", "EventTime": "2024-05-21T12:25:40.130713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI74Ho1FycibeytTwg"], "accumulated_threat_level": 3.2, "timewindow": 18} +{"Format": "IDEA0", "ID": "df290971-8a2d-478b-b958-fd79325e3ab4", "DetectTime": "2024-05-21T12:25:40.265018+00:00", "EventTime": "2024-05-21T12:25:40.265040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.224.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVuoz2JuRoXDwfOp8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "b4792b8b-7f86-430b-acdd-00f35be78576", "DetectTime": "2024-05-21T12:25:40.416583+00:00", "EventTime": "2024-05-21T12:25:40.416605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0CBYy4wXQIh5FGZcd"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "fc546655-8f0b-4be6-ba88-0f8e7eef8fde", "DetectTime": "2024-05-21T12:25:40.453309+00:00", "EventTime": "2024-05-21T12:25:40.453330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVR6By1r3hdvI3tkT5"], "accumulated_threat_level": 4.8, "timewindow": 18} +{"Format": "IDEA0", "ID": "f6f4cf76-b10f-40e5-b1fd-f8488cba5c01", "DetectTime": "2024-05-21T12:25:40.517143+00:00", "EventTime": "2024-05-21T12:25:40.517163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.237.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2w5kh4p3Y5EqWHaH5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "fd10cc06-9ad7-418d-be0b-3abb78e628d9", "DetectTime": "2024-05-21T12:25:40.536188+00:00", "EventTime": "2024-05-21T12:25:40.536207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UXW53gJYvREgifT8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "e4b44ac6-3d2c-491f-8326-413f2ba239d5", "DetectTime": "2024-05-21T12:25:40.713372+00:00", "EventTime": "2024-05-21T12:25:40.713391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWzEV2sXLHecs6Su4"], "accumulated_threat_level": 5.6, "timewindow": 18} +{"Format": "IDEA0", "ID": "f1ee8909-4cd1-40f7-88cb-853aae7c92fc", "DetectTime": "2024-05-21T12:25:40.773572+00:00", "EventTime": "2024-05-21T12:25:40.773604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cojlhg2aWnWNYNwUWg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "666b4b78-05e0-4da7-a336-125d8b81dac0", "DetectTime": "2024-05-21T12:25:40.795005+00:00", "EventTime": "2024-05-21T12:25:40.795024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaCyztNr2SxpAqS6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "2a4cb143-ce85-4c78-aa10-8c67e354da37", "DetectTime": "2024-05-21T12:25:40.829722+00:00", "EventTime": "2024-05-21T12:25:40.829742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CONhnjAExBcxbZuLg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "1526abdb-e682-4181-8e80-d603df1d543b", "DetectTime": "2024-05-21T12:25:40.850258+00:00", "EventTime": "2024-05-21T12:25:40.850278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XoNM2qEmsGIEAEK5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "4a9823b2-8ce7-4a3c-90b4-19e4f085ff5d", "DetectTime": "2024-05-21T12:25:40.878733+00:00", "EventTime": "2024-05-21T12:25:40.878757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyUAVPF7fNuoyZ2X7", "Cxw9C2o1L42PYzGQd", "C70PSE2dE4Z09yC1Gg", "CftE4E4AGovkY4tZpd"], "accumulated_threat_level": 6.1, "timewindow": 18} +{"Format": "IDEA0", "ID": "92e410b5-ae40-4a48-827a-af7cca714e13", "DetectTime": "2024-05-21T12:25:40.981604+00:00", "EventTime": "2024-05-21T12:25:40.981624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWbRe6zyphIqsvBl"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 18} +{"Format": "IDEA0", "ID": "73600f9e-60f3-4ceb-8798-023126cd8962", "DetectTime": "2024-05-21T12:25:41.088266+00:00", "EventTime": "2024-05-21T12:25:41.088285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKXhdD414W80xQlRl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "d9e78588-daf0-4f03-9adc-1623eba6796c", "DetectTime": "2024-05-21T12:25:41.113158+00:00", "EventTime": "2024-05-21T12:25:41.113179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccudz41Cdit9RmTHf3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "123237c9-7e88-4d33-8bc4-590e3726a4ae", "DetectTime": "2024-05-21T12:25:41.178589+00:00", "EventTime": "2024-05-21T12:25:41.178608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSObZBrdtLABkUoXi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "4d157c6b-23fc-4543-a4f7-4847fdcd7b96", "DetectTime": "2024-05-21T12:25:41.199650+00:00", "EventTime": "2024-05-21T12:25:41.199667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEC153eWxqJiRTyNe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "a63f33dd-e2cb-4dcc-b150-b094fdbb642d", "DetectTime": "2024-05-21T12:25:41.236559+00:00", "EventTime": "2024-05-21T12:25:41.236580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuCJ3MN9unA27lbj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "cc0f233c-3acc-4c84-ad35-3030458f9f2b", "DetectTime": "2024-05-21T12:25:41.266893+00:00", "EventTime": "2024-05-21T12:25:41.266919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzO9Fp4CS7qPQ0xwxa"], "accumulated_threat_level": 7.699999999999999, "timewindow": 18} +{"Format": "IDEA0", "ID": "7203ca7b-294d-4d05-8501-a3610e225eca", "DetectTime": "2024-05-21T12:25:41.281060+00:00", "EventTime": "2024-05-21T12:25:41.281079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5j95R0ogEoxRUt9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "cf755e53-765a-4a1a-8a62-e92e51848d05", "DetectTime": "2024-05-21T12:25:41.302968+00:00", "EventTime": "2024-05-21T12:25:41.302986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEGivpSAkpBirAff"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "c8098e33-8db3-4b82-8bc3-5220af139e3a", "DetectTime": "2024-05-21T12:25:41.330689+00:00", "EventTime": "2024-05-21T12:25:41.330711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTNtW1e0PMfc9qT3l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "2b2de72d-b966-43b3-8af0-2a4404f86a3e", "DetectTime": "2024-05-21T12:25:41.347740+00:00", "EventTime": "2024-05-21T12:25:41.347759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgA1BF2Tnu7iCkDyOd"], "accumulated_threat_level": 8.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "f3662c41-6b90-4118-b411-adb8392191dd", "DetectTime": "2024-05-21T12:25:41.403477+00:00", "EventTime": "2024-05-21T12:25:41.403499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpOHx1OcM90yWyP0a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "d04752b8-45e9-4273-b7bd-5ac2377f7259", "DetectTime": "2024-05-21T12:25:41.464527+00:00", "EventTime": "2024-05-21T12:25:41.464549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLy5d26kfWNrqrGhi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "073683e1-e405-410a-87ce-d0584549e9f4", "DetectTime": "2024-05-21T12:25:41.534762+00:00", "EventTime": "2024-05-21T12:25:41.534782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFR3htJPwdXdxFVli"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "faec3bc5-2955-4b31-bf8a-44685ec23222", "DetectTime": "2024-05-21T12:25:41.558702+00:00", "EventTime": "2024-05-21T12:25:41.558723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHsEpYsKXREq4QgMk"], "accumulated_threat_level": 9.3, "timewindow": 18} +{"Format": "IDEA0", "ID": "cc83c1ab-715e-4053-b4be-62f07cef8e7f", "DetectTime": "2024-05-21T12:25:41.572705+00:00", "EventTime": "2024-05-21T12:25:41.572726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Choa6KjuPSNXkm4W6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "05e33626-5a9b-4487-ac05-2686b004a172", "DetectTime": "2024-05-21T12:25:41.593417+00:00", "EventTime": "2024-05-21T12:25:41.593434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKiVY3f1V4xDtjzRj"], "accumulated_threat_level": 10.100000000000001, "timewindow": 18} +{"Format": "IDEA0", "ID": "fbde92fe-854d-4f0b-ba23-986f347da542", "DetectTime": "2024-05-21T12:25:41.609643+00:00", "EventTime": "2024-05-21T12:25:41.609664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Sh7u24sQ2aPZiRD5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "6e09dd3d-73d9-41b4-89ba-7e047c3a3359", "DetectTime": "2024-05-21T12:25:41.635730+00:00", "EventTime": "2024-05-21T12:25:41.635750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGutFT3knuk1IsqAXa"], "accumulated_threat_level": 10.900000000000002, "timewindow": 18} +{"Format": "IDEA0", "ID": "2b636a13-a0ec-4468-946d-4b7e24d8f91f", "DetectTime": "2024-05-21T12:25:41.640551+00:00", "EventTime": "2024-05-21T12:25:41.640572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvlQTXWGhrW02Bl4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "7b62b0fa-1cac-4a8a-8676-0e128a9d48d4", "DetectTime": "2024-05-21T12:25:41.660399+00:00", "EventTime": "2024-05-21T12:25:41.660422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPL9KS3wZM50jaCva5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "40b23fc8-67a8-42e8-a594-79ebcd108fea", "DetectTime": "2024-05-21T12:25:41.679782+00:00", "EventTime": "2024-05-21T12:25:41.679800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnR8LM1IQjrjkBVNCi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 18} +{"Format": "IDEA0", "ID": "84f5531a-cf87-4e82-8b36-4a5038de2380", "DetectTime": "2024-05-21T12:25:41.715826+00:00", "EventTime": "2024-05-21T12:25:41.715845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUg1MO1gIeTWczF1C6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 18} +{"Format": "Json", "ID": "84f5531a-cf87-4e82-8b36-4a5038de2380", "DetectTime": "2024-05-21T12:25:41.715826+00:00", "EventTime": "2024-05-21T12:25:41.715845+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "1970-01-01T17:58:41.798351+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2024/05/21 12:25:41.940679)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 18, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "8687763b-5f79-43c1-b00b-f2699a5267bd", "DetectTime": "2024-05-21T12:25:41.952017+00:00", "EventTime": "2024-05-21T12:25:41.952039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtrCorb4fDJFWvGg"], "accumulated_threat_level": 0.8, "timewindow": 18} +{"Format": "IDEA0", "ID": "3c065a15-eaee-40c6-94f2-c5e9e1846650", "DetectTime": "2024-05-21T12:25:41.962431+00:00", "EventTime": "2024-05-21T12:25:41.962449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMSAq2F30hT0Ol8k1"], "accumulated_threat_level": 1.6, "timewindow": 18} +{"Format": "IDEA0", "ID": "20dd9388-f812-4f40-a511-987b807906b8", "DetectTime": "2024-05-21T12:25:41.966938+00:00", "EventTime": "2024-05-21T12:25:41.966956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGiUw1ZirZPnvaL2k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "f930a6d7-b197-4696-98de-1a90946d241b", "DetectTime": "2024-05-21T12:25:41.971676+00:00", "EventTime": "2024-05-21T12:25:41.971695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyYUa2iz3IYfyMcWe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "c90e6573-5039-4011-9458-11cf77c60e8e", "DetectTime": "2024-05-21T12:25:41.976186+00:00", "EventTime": "2024-05-21T12:25:41.976204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjqZKIgkkI4Umlq"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "88cd6170-f3c0-47e1-bd4b-1eda26913e26", "DetectTime": "2024-05-21T12:25:41.980776+00:00", "EventTime": "2024-05-21T12:25:41.980794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZZWl1AgvTL1XaITc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "9da53c2a-bc37-4fa7-a770-df6f68695162", "DetectTime": "2024-05-21T12:25:41.992453+00:00", "EventTime": "2024-05-21T12:25:41.992471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvAoU2hsCixYuDCYl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 18} +{"Format": "IDEA0", "ID": "97bce162-74c0-4aa6-83a8-a0eb40392ae3", "DetectTime": "2024-05-21T12:25:41.997025+00:00", "EventTime": "2024-05-21T12:25:41.997043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrekTohK90f5Tl2g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "890542a0-07cf-4b9c-9eff-045c63c3d6d0", "DetectTime": "2024-05-21T12:25:42.008491+00:00", "EventTime": "2024-05-21T12:25:42.008508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdF98C4w51SobkHnRb"], "accumulated_threat_level": 3.2, "timewindow": 18} +{"Format": "IDEA0", "ID": "d8ce0b11-6bce-41a0-b874-83e669d0c4a4", "DetectTime": "2024-05-21T12:25:42.015664+00:00", "EventTime": "2024-05-21T12:25:42.015682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC0bP412vLI1DxgMB3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "f8f90d2c-0f51-4b44-8d1e-c33389e7842f", "DetectTime": "2024-05-21T12:25:42.039507+00:00", "EventTime": "2024-05-21T12:25:42.039529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqYlB2x7kxOZrxQY8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "afa52c58-4b6f-472b-961a-8066e164e3ae", "DetectTime": "2024-05-21T12:25:42.061284+00:00", "EventTime": "2024-05-21T12:25:42.061305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cddlb71SYaQtgzziA3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "48ed3cf1-30cd-4188-b735-9c2f4e08af20", "DetectTime": "2024-05-21T12:25:42.094921+00:00", "EventTime": "2024-05-21T12:25:42.094941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDLkW3X6RFmOctxDf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "93b6ab69-0ee0-4466-8172-0c7554197578", "DetectTime": "2024-05-21T12:25:42.112367+00:00", "EventTime": "2024-05-21T12:25:42.112386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WtX732ETcElRg9T5"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "fc8f9ac2-71c7-49d2-b60c-d64380a9b1c5", "DetectTime": "2024-05-21T12:25:42.215433+00:00", "EventTime": "2024-05-21T12:25:42.215453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP97IQHmLiB0GTL28"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "a9903fb0-f771-4def-a333-ab165077a478", "DetectTime": "2024-05-21T12:25:42.220331+00:00", "EventTime": "2024-05-21T12:25:42.220349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3L7X3VHZp5157VS4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "2a259088-c9e9-4489-ad4c-8cc75bd4f611", "DetectTime": "2024-05-21T12:25:42.253735+00:00", "EventTime": "2024-05-21T12:25:42.253754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAd4Vn4wg3vYz1ymE3"], "accumulated_threat_level": 0.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "d291256d-edfe-42b4-9aae-0d2b0e0699c6", "DetectTime": "2024-05-21T12:25:42.436529+00:00", "EventTime": "2024-05-21T12:25:42.436551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cexlfp4LX7in4qo1L3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "5b5e8a5f-b8bd-4d39-a1a8-5059f964791f", "DetectTime": "2024-05-21T12:25:42.460901+00:00", "EventTime": "2024-05-21T12:25:42.460924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkIjv3nYOzm3LBvN1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "b54909f7-9318-40ed-bf49-0a56146643f9", "DetectTime": "2024-05-21T12:25:42.488180+00:00", "EventTime": "2024-05-21T12:25:42.488202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2RSA1q8CivKBNzy5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "386ed50e-4393-4331-8531-e7e6ac889212", "DetectTime": "2024-05-21T12:25:42.493174+00:00", "EventTime": "2024-05-21T12:25:42.493193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIdpLK1kbsvANuNeV3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "a852d14b-56c6-4cc2-8841-0d4e21e2b8de", "DetectTime": "2024-05-21T12:25:42.529539+00:00", "EventTime": "2024-05-21T12:25:42.529561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmG3y3n6pbLtha4vk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "7650c3d1-e75f-4845-b876-f1113559a181", "DetectTime": "2024-05-21T12:25:42.543988+00:00", "EventTime": "2024-05-21T12:25:42.544011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBnun1K8e5UJW34Aa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "f3519ce7-07de-4eb5-82fc-ead4488bfecf", "DetectTime": "2024-05-21T12:25:42.577745+00:00", "EventTime": "2024-05-21T12:25:42.577766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdJrdI3H8yc5KbzG66"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "0ba7e58a-e75f-4928-913b-c2166c681c7b", "DetectTime": "2024-05-21T12:25:42.803408+00:00", "EventTime": "2024-05-21T12:25:42.803431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8RKH1Jyux8ZI4toi", "CRv39m18W96r06F45f", "CogY122zVWyiH2V5Qe", "ChwtkE3zePAqRR856a"], "accumulated_threat_level": 1.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "5ccc31f2-54f3-48c2-95fe-1a740da51e49", "DetectTime": "2024-05-21T12:25:43.231880+00:00", "EventTime": "2024-05-21T12:25:43.231902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRvyU1BwqoxeP6n7e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "0fa0194d-e662-4b5d-b559-583f8920c29e", "DetectTime": "2024-05-21T12:25:43.264035+00:00", "EventTime": "2024-05-21T12:25:43.264054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFyl54TCuD6zOXwr3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "89b3eb56-91a7-4d95-b1e7-608d4e60711a", "DetectTime": "2024-05-21T12:25:43.284942+00:00", "EventTime": "2024-05-21T12:25:43.284962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.245.129.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkbeFcgRX6Yf7vHe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "68f268a2-e206-4db9-aeb7-138d76e49323", "DetectTime": "2024-05-21T12:25:43.353954+00:00", "EventTime": "2024-05-21T12:25:43.353975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHvlB525e7SbqelQVg"], "accumulated_threat_level": 2.1, "timewindow": 19} +{"Format": "IDEA0", "ID": "7274b84d-9a8a-4594-ada9-ac6fee6593d2", "DetectTime": "2024-05-21T12:25:43.561004+00:00", "EventTime": "2024-05-21T12:25:43.561036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.252.131.148 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5O1lP1XVxWnC6Cbdc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "59cb2a21-7a8b-4796-b593-4cc8ece80e8f", "DetectTime": "2024-05-21T12:25:43.788976+00:00", "EventTime": "2024-05-21T12:25:43.788997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0btBd2n9x2k5z6nMk", "CvfGUC2jFnBwa65MYf", "CE47tqPrnh17qV8oh", "CdZ6dX3KGeft7fzb"], "accumulated_threat_level": 2.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "818090e8-fe45-45d7-bdcd-b4330d4430e0", "DetectTime": "2024-05-21T12:25:43.818903+00:00", "EventTime": "2024-05-21T12:25:43.818922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHbKx4Xf0XN3mVZSi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "eee153d7-6ad8-4d0f-aae6-bf064d3c80f9", "DetectTime": "2024-05-21T12:25:43.851164+00:00", "EventTime": "2024-05-21T12:25:43.851184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggsEz1pWO4jv8STAd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "9854f183-036d-41ea-a5ff-7351125aa67e", "DetectTime": "2024-05-21T12:25:43.872364+00:00", "EventTime": "2024-05-21T12:25:43.872386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SgTH1lGst4mjhwec"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "34b00b77-65d7-4ed5-8653-7ee20d46a278", "DetectTime": "2024-05-21T12:25:43.910003+00:00", "EventTime": "2024-05-21T12:25:43.910024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbE3xg4Hl7oRoQj8V7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "6126efec-6568-4459-8269-57498c7748c0", "DetectTime": "2024-05-21T12:25:43.940455+00:00", "EventTime": "2024-05-21T12:25:43.940476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU62Ho1fIleGGzefwh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "e9b9ee3c-0bd2-4d9e-b250-bcbedcdacc2d", "DetectTime": "2024-05-21T12:25:43.997554+00:00", "EventTime": "2024-05-21T12:25:43.997572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 8711/TCP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRYPXb4HnQPpxOaOo7"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 19} +{"Format": "IDEA0", "ID": "f11a9cf9-a51b-4109-8b18-b17368a0ef72", "DetectTime": "2024-05-21T12:25:44.104793+00:00", "EventTime": "2024-05-21T12:25:44.104811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.129.11.65"]}], "Attach": [{"Content": "Connection to unknown destination port 7570/UDP destination IP 79.129.11.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNt0OAv1rW3SryRa"], "accumulated_threat_level": 4.2, "timewindow": 19} +{"Format": "IDEA0", "ID": "78126b44-72d8-4248-80d7-680fad856184", "DetectTime": "2024-05-21T12:25:44.128936+00:00", "EventTime": "2024-05-21T12:25:44.128953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "Connection to unknown destination port 1684/UDP destination IP 76.226.114.217. AS: ATT-INTERNET4, US AS7018 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Uiv4FIzKAraHXV5"], "accumulated_threat_level": 5.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "31c116e7-599d-4ee7-9e8e-a939f24478ba", "DetectTime": "2024-05-21T12:25:44.160623+00:00", "EventTime": "2024-05-21T12:25:44.160645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKpw32eDMMlzZG7ke"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "830ee0a7-4c57-4aca-a6da-59c913025aeb", "DetectTime": "2024-05-21T12:25:44.171996+00:00", "EventTime": "2024-05-21T12:25:44.172020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7520/UDP destination IP 79.35.154.174. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBdy24JqTkgBwrsz6"], "accumulated_threat_level": 5.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "508edf55-707c-4013-8c9f-e8227003cbc9", "DetectTime": "2024-05-21T12:25:44.189148+00:00", "EventTime": "2024-05-21T12:25:44.189168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nTfE2U8vfQNOQdM2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "0953ed14-c41b-4d8b-92ba-8c1a6f720e12", "DetectTime": "2024-05-21T12:25:44.209010+00:00", "EventTime": "2024-05-21T12:25:44.209026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.24.145.94"]}], "Attach": [{"Content": "Connection to unknown destination port 1332/UDP destination IP 75.24.145.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy8QL1gVGcuNQPqR2"], "accumulated_threat_level": 6.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "53ab9fbc-f7f4-40fb-ae8b-6fdfbe26bfb5", "DetectTime": "2024-05-21T12:25:44.223337+00:00", "EventTime": "2024-05-21T12:25:44.223359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZtySb2NoYMChH3E24"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "246b892a-ba0b-4f74-a4db-9525c5c32899", "DetectTime": "2024-05-21T12:25:44.247503+00:00", "EventTime": "2024-05-21T12:25:44.247524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.147.65"]}], "Attach": [{"Content": "Connection to unknown destination port 3319/UDP destination IP 176.73.147.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KSvY3ZdjyPag260g"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 19} +{"Format": "IDEA0", "ID": "80f14e10-10ea-4319-a409-1c9197e12453", "DetectTime": "2024-05-21T12:25:44.254851+00:00", "EventTime": "2024-05-21T12:25:44.254869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutNDr4Y6N9pv1vMQ8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "12cbcf2d-496c-4588-a912-fff2fe256eec", "DetectTime": "2024-05-21T12:25:44.293642+00:00", "EventTime": "2024-05-21T12:25:44.293661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.219.135.113"]}], "Attach": [{"Content": "Connection to unknown destination port 7158/UDP destination IP 213.219.135.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEB167ddZUYjLWgn"], "accumulated_threat_level": 8.2, "timewindow": 19} +{"Format": "IDEA0", "ID": "fea138ef-ae95-40d2-b119-2c33a6af806f", "DetectTime": "2024-05-21T12:25:44.298070+00:00", "EventTime": "2024-05-21T12:25:44.298087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtcv5shobQt7eYd7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "afd7d36a-288a-4116-99d4-5210e30418b8", "DetectTime": "2024-05-21T12:25:44.319685+00:00", "EventTime": "2024-05-21T12:25:44.319707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWn0C2GVozofI3IFd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "9ee8ee6d-94cd-4e74-9436-a1abc644908b", "DetectTime": "2024-05-21T12:25:44.345042+00:00", "EventTime": "2024-05-21T12:25:44.345066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRL9gl1v8tT0mVULz7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "de7fc1ef-42ef-4180-b624-f881cdab7965", "DetectTime": "2024-05-21T12:25:44.364034+00:00", "EventTime": "2024-05-21T12:25:44.364055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFdNd2nFCGm2kUtdl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "ec69c0d8-9431-4beb-946f-2540183e3b9a", "DetectTime": "2024-05-21T12:25:44.395726+00:00", "EventTime": "2024-05-21T12:25:44.395747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.202.83.105"]}], "Attach": [{"Content": "Connection to unknown destination port 28269/UDP destination IP 190.202.83.105. AS: CANTV Servicios, Venezuela, VE AS8048 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNi7GZ3DI6d4pB4sck"], "accumulated_threat_level": 9.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "211a4744-aca0-4878-80f2-1158757629ad", "DetectTime": "2024-05-21T12:25:44.409396+00:00", "EventTime": "2024-05-21T12:25:44.409416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUhLkQ2SOfoyUWCd06"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "646157ef-c9d8-49c9-b642-4baf4457947e", "DetectTime": "2024-05-21T12:25:44.414009+00:00", "EventTime": "2024-05-21T12:25:44.414028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNimUn2vVCgqKl47Eb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "46c68677-23ae-41e6-a62e-43bd02fcf8a9", "DetectTime": "2024-05-21T12:25:44.436877+00:00", "EventTime": "2024-05-21T12:25:44.436897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 217.132.237.117. IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldSao4SCF7kgQqZle"], "accumulated_threat_level": 9.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "26140f5f-55da-40ce-8c00-2094000a9e87", "DetectTime": "2024-05-21T12:25:44.463696+00:00", "EventTime": "2024-05-21T12:25:44.463714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.204.12"]}], "Attach": [{"Content": "Connection to unknown destination port 7051/UDP destination IP 176.73.204.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0zgL1BDPs5PJys9l"], "accumulated_threat_level": 10.600000000000001, "timewindow": 19} +{"Format": "IDEA0", "ID": "9aa43946-fc50-4d71-8a09-fc865309ad3e", "DetectTime": "2024-05-21T12:25:44.468738+00:00", "EventTime": "2024-05-21T12:25:44.468755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCepF4gONkPbss9i1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "ce53aabf-bd03-4799-9e7f-c7ceecf471c9", "DetectTime": "2024-05-21T12:25:44.498891+00:00", "EventTime": "2024-05-21T12:25:44.498912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVY0a2aqF2g2tyWjf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "4c3fcaa9-5dac-4606-8dd3-57df4afe4972", "DetectTime": "2024-05-21T12:25:44.510089+00:00", "EventTime": "2024-05-21T12:25:44.510106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4826/UDP destination IP 82.211.141.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0l0fu1vcUz8oFodW2"], "accumulated_threat_level": 11.400000000000002, "timewindow": 19} +{"Format": "IDEA0", "ID": "1075aad2-1568-49bf-b248-b55b988e22cd", "DetectTime": "2024-05-21T12:25:44.527461+00:00", "EventTime": "2024-05-21T12:25:44.527482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59PKj2hh3IvmxwNrf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "873ee64d-36a4-4ea3-9803-55f113608b15", "DetectTime": "2024-05-21T12:25:44.552725+00:00", "EventTime": "2024-05-21T12:25:44.552743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "Connection to unknown destination port 10010/UDP destination IP 64.136.115.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPokWl2x36I8IfeB6l"], "accumulated_threat_level": 12.200000000000003, "timewindow": 19} +{"Format": "Json", "ID": "873ee64d-36a4-4ea3-9803-55f113608b15", "DetectTime": "2024-05-21T12:25:44.552725+00:00", "EventTime": "2024-05-21T12:25:44.552743+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["64.136.115.72"]}], "Attach": [{"Content": "1970-01-01T18:31:25.103923+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:25:44.767076)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "a60da3ee-526d-485f-aecc-e233c697ec82", "DetectTime": "2024-05-21T12:25:44.771486+00:00", "EventTime": "2024-05-21T12:25:44.771505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLlQbE2EuCEvjLx8x8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "6c5c5b7b-b020-4a32-92be-11a2733c6654", "DetectTime": "2024-05-21T12:25:44.782752+00:00", "EventTime": "2024-05-21T12:25:44.782771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDeJZn4batoNMnvUZ3"], "accumulated_threat_level": 0.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9bf80738-3959-43dc-ac32-c8fc38f90a09", "DetectTime": "2024-05-21T12:25:44.787669+00:00", "EventTime": "2024-05-21T12:25:44.787687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWuLxzs2onINVbL2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "ed431ce6-59ff-4134-ad53-98eccb8e927b", "DetectTime": "2024-05-21T12:25:44.792499+00:00", "EventTime": "2024-05-21T12:25:44.792518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9eTS1pzEDPbDjAfe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "d195c14a-bba7-4f58-bb31-e76275845da7", "DetectTime": "2024-05-21T12:25:44.803431+00:00", "EventTime": "2024-05-21T12:25:44.803451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWuJr3tYLKtGubWmc"], "accumulated_threat_level": 1.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "c57a9ebb-ecb6-4c0d-92d1-c811ec75e09e", "DetectTime": "2024-05-21T12:25:44.808620+00:00", "EventTime": "2024-05-21T12:25:44.808638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Nfxi4ySyWPk3lmHc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "b58bc34f-53fa-442f-a9cd-219d003b9266", "DetectTime": "2024-05-21T12:25:44.813257+00:00", "EventTime": "2024-05-21T12:25:44.813275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2HRN2ckCZcuXGmCi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "0ed3a1a7-d438-4949-b259-597ba11cd0e8", "DetectTime": "2024-05-21T12:25:44.824900+00:00", "EventTime": "2024-05-21T12:25:44.824922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHoI71wWAjF7tYXag"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 19} +{"Format": "IDEA0", "ID": "2c45625a-01e6-4be6-b136-d1aee5f979c7", "DetectTime": "2024-05-21T12:25:44.829999+00:00", "EventTime": "2024-05-21T12:25:44.830018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2p2S01prWoeacidT7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "9926ce8c-7efb-443e-a1a4-ffc467c1e3d6", "DetectTime": "2024-05-21T12:25:44.841679+00:00", "EventTime": "2024-05-21T12:25:44.841698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8gwR2r9wgq90S3cj"], "accumulated_threat_level": 3.2, "timewindow": 19} +{"Format": "IDEA0", "ID": "5fe9f1f0-55f4-492b-81fe-2bf391f084cd", "DetectTime": "2024-05-21T12:25:44.846500+00:00", "EventTime": "2024-05-21T12:25:44.846520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6nM835PBbbipSqU4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "5873c884-b3b6-4a95-bc4d-7af7bb59adcc", "DetectTime": "2024-05-21T12:25:44.856467+00:00", "EventTime": "2024-05-21T12:25:44.856485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8vzxf44WqZ91g86d8"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "17e46c4d-a102-471a-b0a1-378a6b3a2a33", "DetectTime": "2024-05-21T12:25:44.867319+00:00", "EventTime": "2024-05-21T12:25:44.867339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsCXxq1cd8AVE8jLeg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "84f90aad-7b47-49be-bac9-e9cd5d1bfb52", "DetectTime": "2024-05-21T12:25:44.872086+00:00", "EventTime": "2024-05-21T12:25:44.872104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ6bQQ7o2miN4Tv9b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "137dbbe8-ca95-4197-bc4b-25bd43c15ce5", "DetectTime": "2024-05-21T12:25:44.881125+00:00", "EventTime": "2024-05-21T12:25:44.881144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfUaO29fTtxNtom24"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "45227608-c083-4561-95aa-92e2262919b6", "DetectTime": "2024-05-21T12:25:44.893639+00:00", "EventTime": "2024-05-21T12:25:44.893663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdfb5L1EkjRzfkcUOk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "b039441a-61f0-4f72-b9c2-9c7d9038dadf", "DetectTime": "2024-05-21T12:25:44.912822+00:00", "EventTime": "2024-05-21T12:25:44.912840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjkCE4JPHczJW3yKd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "0ffb5e9e-a3d1-45d2-8f45-9d993be81142", "DetectTime": "2024-05-21T12:25:44.945487+00:00", "EventTime": "2024-05-21T12:25:44.945509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzB14PM0l9LxmGbb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "f64fd9b6-8af1-40d7-ad34-9efe66646eca", "DetectTime": "2024-05-21T12:25:45.053884+00:00", "EventTime": "2024-05-21T12:25:45.053905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yXwK3ajb3S5jlenk"], "accumulated_threat_level": 5.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "9f64126f-8d28-49d7-ae71-6da94605b902", "DetectTime": "2024-05-21T12:25:45.065783+00:00", "EventTime": "2024-05-21T12:25:45.065802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffLK640T5uO07ZWG"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "aec5fb5e-672a-45f2-8048-b9ba42207652", "DetectTime": "2024-05-21T12:25:45.080993+00:00", "EventTime": "2024-05-21T12:25:45.081016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKHp22z1nQeEnDSU9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "2ed07d35-bc58-416e-be82-265ba2c3cfa3", "DetectTime": "2024-05-21T12:25:45.086513+00:00", "EventTime": "2024-05-21T12:25:45.086535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EtXWDhLAQOzYrx"], "accumulated_threat_level": 7.199999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "43ae12c1-fbb0-46ae-a69a-21f97d000cf6", "DetectTime": "2024-05-21T12:25:45.122052+00:00", "EventTime": "2024-05-21T12:25:45.122071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNakOBTcpmTHipfT9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 19} +{"Format": "IDEA0", "ID": "56c6f950-7587-4558-b7cd-9bed495bdd5c", "DetectTime": "2024-05-21T12:25:45.151381+00:00", "EventTime": "2024-05-21T12:25:45.151402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5amw3XcEoPL6vVd7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "b2a92b2d-5367-49ac-995a-ce647461ab9a", "DetectTime": "2024-05-21T12:25:45.156133+00:00", "EventTime": "2024-05-21T12:25:45.156150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNqf72JBfzvpBtje8"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "a590a111-bfd7-4010-99d4-2acadc580adf", "DetectTime": "2024-05-21T12:25:45.186380+00:00", "EventTime": "2024-05-21T12:25:45.186396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6D62m3UYYIzQRQvR8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "0ae1fc76-29ea-423a-b894-0906c2b17dc8", "DetectTime": "2024-05-21T12:25:45.364451+00:00", "EventTime": "2024-05-21T12:25:45.364469+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTEqB1Bre3FKaPn0j"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "a0949baa-1952-4610-8126-c45164aaa69e", "DetectTime": "2024-05-21T12:25:45.375480+00:00", "EventTime": "2024-05-21T12:25:45.375502+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTEqB1Bre3FKaPn0j"], "accumulated_threat_level": 6.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "d17cea36-5890-432a-97d7-4c157867e9a0", "DetectTime": "2024-05-21T12:25:45.400567+00:00", "EventTime": "2024-05-21T12:25:45.400585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.45.57.114"]}], "Attach": [{"Content": "Connection to unknown destination port 1244/UDP destination IP 151.45.57.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUvxFptind1QmAy"], "accumulated_threat_level": 8.799999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "d25af305-d65c-490e-b194-a0dae3ce591c", "DetectTime": "2024-05-21T12:25:45.600747+00:00", "EventTime": "2024-05-21T12:25:45.600769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9U2TI7yNHfsY9W4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "280c0446-661e-4047-89e0-cedb710712af", "DetectTime": "2024-05-21T12:25:45.626341+00:00", "EventTime": "2024-05-21T12:25:45.626359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBfJz1SlhDVniQDh7"], "accumulated_threat_level": 9.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "0f7d69dc-e1a2-4f5e-8f5f-54f7ae3b5a54", "DetectTime": "2024-05-21T12:25:45.645297+00:00", "EventTime": "2024-05-21T12:25:45.645320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQJl8Fiolkr42G"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b4e3e5cb-9919-449b-936e-0a47091dfacd", "DetectTime": "2024-05-21T12:25:45.666946+00:00", "EventTime": "2024-05-21T12:25:45.666968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccmcwb4lahlKBTiYIl"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "c968450c-5d2f-4692-b136-4c3a3ccc46c6", "DetectTime": "2024-05-21T12:25:45.687972+00:00", "EventTime": "2024-05-21T12:25:45.687995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBbdsx1jTL7Afy2Zc8"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "236a50b0-7c33-40ef-af2c-811dd1663eb9", "DetectTime": "2024-05-21T12:25:46.101490+00:00", "EventTime": "2024-05-21T12:25:46.101512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2eQIX6ycj5vB0gc3"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "0583417a-e8c4-4a3d-834a-790041edc404", "DetectTime": "2024-05-21T12:25:46.138600+00:00", "EventTime": "2024-05-21T12:25:46.138620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYley42Fi8iRMqKQi"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "cbc40574-92f1-4b60-8044-286b5adf1766", "DetectTime": "2024-05-21T12:25:46.212484+00:00", "EventTime": "2024-05-21T12:25:46.212507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkTduj3kVupVtN5VL1"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "d37a6c8a-749d-49d9-b615-e01bcccbd091", "DetectTime": "2024-05-21T12:25:46.461405+00:00", "EventTime": "2024-05-21T12:25:46.461426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLAnM2HLeSo0pB6r5"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "3e90f0e5-acbf-4a11-93fa-5ba2979ed445", "DetectTime": "2024-05-21T12:25:46.505045+00:00", "EventTime": "2024-05-21T12:25:46.505065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4P1LHEyUAIuQLqk"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "c9f1066f-2582-4296-b133-4066fe27804e", "DetectTime": "2024-05-21T12:25:46.520787+00:00", "EventTime": "2024-05-21T12:25:46.520806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3N8JkCumgGETgHVg"], "accumulated_threat_level": 10.4, "timewindow": 19} +{"Format": "IDEA0", "ID": "873d3ef6-24b9-48a8-9776-2e97c904d555", "DetectTime": "2024-05-21T12:25:46.525235+00:00", "EventTime": "2024-05-21T12:25:46.525253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB9lybzBCQOsFVek5"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "5ffe6167-ebe2-43aa-b2d9-3e5de0ef3e67", "DetectTime": "2024-05-21T12:25:46.539219+00:00", "EventTime": "2024-05-21T12:25:46.539240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzkOz3HujDHGQyCak"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "6706aff4-df4e-4bdc-b7d1-1a7ba6055d84", "DetectTime": "2024-05-21T12:25:46.543802+00:00", "EventTime": "2024-05-21T12:25:46.543823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhwhW2YPIv93DJ5og"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "ad355ca8-fca4-406b-8085-41622a39156a", "DetectTime": "2024-05-21T12:25:46.565205+00:00", "EventTime": "2024-05-21T12:25:46.565223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7DOEY8Ac0XTnMXr5"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "76b49593-2480-492f-a9a1-b0068cd827d1", "DetectTime": "2024-05-21T12:25:46.588204+00:00", "EventTime": "2024-05-21T12:25:46.588224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7sjRs1OrmZEqPWPy6"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "7164e46a-c14b-4a4f-85a1-1ce3f7df28be", "DetectTime": "2024-05-21T12:25:46.599527+00:00", "EventTime": "2024-05-21T12:25:46.599546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCdhfY16t1Ko4sFGl8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 19} +{"Format": "IDEA0", "ID": "be57cbde-3b26-449e-a41f-26b428aeb20b", "DetectTime": "2024-05-21T12:25:46.617103+00:00", "EventTime": "2024-05-21T12:25:46.617125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cymgsj4MjKPlWi4Abe"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "6f1761e9-9b06-4ae9-893f-ee89be476e04", "DetectTime": "2024-05-21T12:25:46.635196+00:00", "EventTime": "2024-05-21T12:25:46.635213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1Jpk2V7JeesoWO1b"], "accumulated_threat_level": 12.000000000000002, "timewindow": 19} +{"Format": "Json", "ID": "6f1761e9-9b06-4ae9-893f-ee89be476e04", "DetectTime": "2024-05-21T12:25:46.635196+00:00", "EventTime": "2024-05-21T12:25:46.635213+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "1970-01-01T18:34:36.376536+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:25:46.780163)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "47d7469f-a74f-4d4e-8734-e1aa623fa46a", "DetectTime": "2024-05-21T12:25:46.785030+00:00", "EventTime": "2024-05-21T12:25:46.785056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrnaf1V2sdF6Uxnd1"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "53200e6c-3fda-4c7b-822d-63b6b95c3859", "DetectTime": "2024-05-21T12:25:46.797786+00:00", "EventTime": "2024-05-21T12:25:46.797806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"]}], "Attach": [{"Content": "Connection to unknown destination port 5281/UDP destination IP 68.162.252.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgLDDPaqiFMWlLvPa"], "accumulated_threat_level": 0.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "fbd92c38-1942-40db-a67c-cb51acfa38d0", "DetectTime": "2024-05-21T12:25:46.808611+00:00", "EventTime": "2024-05-21T12:25:46.808630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsF252yysjiOOPbBi"], "accumulated_threat_level": 1.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "4ee5269d-cd9f-4cdf-9a2a-f3d4cdfd7f3d", "DetectTime": "2024-05-21T12:25:46.818948+00:00", "EventTime": "2024-05-21T12:25:46.818967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "Connection to unknown destination port 29140/UDP destination IP 189.172.99.119. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYGUM3Fx63w6Pfl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 19} +{"Format": "IDEA0", "ID": "3bd43d2a-a97b-4b42-a4d0-ba87ea233b0d", "DetectTime": "2024-05-21T12:25:46.855585+00:00", "EventTime": "2024-05-21T12:25:46.855606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYBcObZXRdAivmG2"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "38b54a42-c0c4-4838-aa3a-a0e88aa5212b", "DetectTime": "2024-05-21T12:25:46.874027+00:00", "EventTime": "2024-05-21T12:25:46.874045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C23g4S1Z1lJcVNDht5"], "accumulated_threat_level": 3.2, "timewindow": 19} +{"Format": "IDEA0", "ID": "57b98a47-d412-45a5-bb2c-a7eec63e23c1", "DetectTime": "2024-05-21T12:25:46.888001+00:00", "EventTime": "2024-05-21T12:25:46.888019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH8Dxl4OIUwUJ9PSwc"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "4d9a93b9-3e4c-4dde-ad71-e9630b71fe90", "DetectTime": "2024-05-21T12:25:46.907390+00:00", "EventTime": "2024-05-21T12:25:46.907411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciqr5S10D70Uv4Z9F2"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "7e399d05-4ea1-4edf-bfeb-95addc863207", "DetectTime": "2024-05-21T12:25:46.937435+00:00", "EventTime": "2024-05-21T12:25:46.937453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBJgQ202YmrH64ML4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "2c2d6228-213d-4286-b115-e246c2d08592", "DetectTime": "2024-05-21T12:25:46.966955+00:00", "EventTime": "2024-05-21T12:25:46.966973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEB4i17Yxsqy1oyo1"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "4ef73685-43b7-420d-8b29-1b9dedba5c28", "DetectTime": "2024-05-21T12:25:46.976250+00:00", "EventTime": "2024-05-21T12:25:46.976270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04JOK1aQx1Hz5LBEe"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "5356b2e0-6499-4f9d-99ee-4bd528a1fc87", "DetectTime": "2024-05-21T12:25:46.995798+00:00", "EventTime": "2024-05-21T12:25:46.995818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwkPRx6ZxhwyRsl3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f505e683-d844-49a8-b9bc-39d55f3685fd", "DetectTime": "2024-05-21T12:25:47.008192+00:00", "EventTime": "2024-05-21T12:25:47.008213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBQqy1y57EAk0Ft5a"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b70f2e4b-53b5-4a27-a955-4102cd73c525", "DetectTime": "2024-05-21T12:25:47.084728+00:00", "EventTime": "2024-05-21T12:25:47.084749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQngv93vmWQwRtKjCd"], "accumulated_threat_level": 5.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "b989e0c4-b062-459c-995a-5304b5b41b91", "DetectTime": "2024-05-21T12:25:47.092955+00:00", "EventTime": "2024-05-21T12:25:47.092977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVoge4IF1Us9phAEf"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "0d97e62e-9c40-48c5-a65e-1bb092a2c6e0", "DetectTime": "2024-05-21T12:25:47.097839+00:00", "EventTime": "2024-05-21T12:25:47.097858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5O1g2Q4PEQyj4smb"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "84e343eb-3437-4219-a2a9-80707282d85a", "DetectTime": "2024-05-21T12:25:47.121143+00:00", "EventTime": "2024-05-21T12:25:47.121161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz92c81Gf5qFfjbMXl"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "03076757-3ee8-4fbf-8682-72d942e70dde", "DetectTime": "2024-05-21T12:25:47.140766+00:00", "EventTime": "2024-05-21T12:25:47.140786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMG4m11Bq4Pv2gi9eg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 19} +{"Format": "IDEA0", "ID": "880828f9-b025-4bf4-819b-0d6f8143c105", "DetectTime": "2024-05-21T12:25:47.153199+00:00", "EventTime": "2024-05-21T12:25:47.153219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPTrI7bA7jw6ktXb"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "9ca93b4d-db5d-469c-959b-f29fca82f582", "DetectTime": "2024-05-21T12:25:47.172073+00:00", "EventTime": "2024-05-21T12:25:47.172093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxRep2Yy9DWAxQW75"], "accumulated_threat_level": 7.199999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "02be426a-6265-48eb-8db8-20938073b08c", "DetectTime": "2024-05-21T12:25:47.190937+00:00", "EventTime": "2024-05-21T12:25:47.190958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgF1u4jD7aHWM6W07"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "6cc29374-bc45-47cb-a6ca-d0e2c46ed230", "DetectTime": "2024-05-21T12:25:47.292361+00:00", "EventTime": "2024-05-21T12:25:47.292381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUFAf2Uh2H2sdlul5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "ec8afacb-b7df-4993-9d62-80614c3e508c", "DetectTime": "2024-05-21T12:25:47.297920+00:00", "EventTime": "2024-05-21T12:25:47.297941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYqYckEf2uE25xCIl"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "f73a41e2-698d-405c-9e53-d4ce64dad2f3", "DetectTime": "2024-05-21T12:25:47.325898+00:00", "EventTime": "2024-05-21T12:25:47.325919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiNCk4c49JbxLWnrc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "69a96530-3b29-436f-9cd7-b96a2f942d07", "DetectTime": "2024-05-21T12:25:47.350828+00:00", "EventTime": "2024-05-21T12:25:47.350848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQEziK22TbKeTBqhJ7"], "accumulated_threat_level": 9.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "39735545-eb14-4bc7-9438-1dadc0bb787e", "DetectTime": "2024-05-21T12:25:47.387382+00:00", "EventTime": "2024-05-21T12:25:47.387402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU542D3DLfeQ8hrfKf"], "accumulated_threat_level": 10.4, "timewindow": 19} +{"Format": "IDEA0", "ID": "d575422a-6099-49b5-94b7-f938d9b88020", "DetectTime": "2024-05-21T12:25:47.412426+00:00", "EventTime": "2024-05-21T12:25:47.412444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.191.16.250"]}], "Attach": [{"Content": "Connection to unknown destination port 5675/UDP destination IP 186.191.16.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEcqh33efA7cjqaqe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 19} +{"Format": "IDEA0", "ID": "3fe0bef2-bbb8-444d-8f3d-050dd7cb575f", "DetectTime": "2024-05-21T12:25:47.483349+00:00", "EventTime": "2024-05-21T12:25:47.483370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COzQfp3u6VwtbEgYgl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 19} +{"Format": "Json", "ID": "3fe0bef2-bbb8-444d-8f3d-050dd7cb575f", "DetectTime": "2024-05-21T12:25:47.483349+00:00", "EventTime": "2024-05-21T12:25:47.483370+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "1970-01-01T18:35:53.817762+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:25:47.638324)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "19519642-3d36-4658-a5f9-d7045e84e82e", "DetectTime": "2024-05-21T12:25:47.649070+00:00", "EventTime": "2024-05-21T12:25:47.649089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cakhva4fwc04635wD7"], "accumulated_threat_level": 0.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "8bbbe6ec-0787-497c-88a7-4154984c2c7e", "DetectTime": "2024-05-21T12:25:47.653463+00:00", "EventTime": "2024-05-21T12:25:47.653480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtM3qG1lnymU1GlSt1"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "17a87f1b-b5e2-4a91-ac53-7787836d100f", "DetectTime": "2024-05-21T12:25:47.674167+00:00", "EventTime": "2024-05-21T12:25:47.674188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXq73m3ty4GMZRsh"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "cbbf99ec-c6b2-49fa-89ae-40823b5afe89", "DetectTime": "2024-05-21T12:25:47.748641+00:00", "EventTime": "2024-05-21T12:25:47.748661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.253.12"]}], "Attach": [{"Content": "Connection to unknown destination port 10407/UDP destination IP 188.169.253.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5dUiw2DcFlTJk7GHc"], "accumulated_threat_level": 1.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "693ff77a-d841-4bcc-b4ec-5286ccb04df2", "DetectTime": "2024-05-21T12:25:47.762962+00:00", "EventTime": "2024-05-21T12:25:47.762981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhYArifnUDMFTcpk"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "bf13db97-8897-4485-a14a-38267625e168", "DetectTime": "2024-05-21T12:25:47.785295+00:00", "EventTime": "2024-05-21T12:25:47.785315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZMyc1n0M77d444Pg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 19} +{"Format": "IDEA0", "ID": "de6ca2c8-7cbc-4dc2-a125-99716d8a963d", "DetectTime": "2024-05-21T12:25:47.795702+00:00", "EventTime": "2024-05-21T12:25:47.795724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQdg12IQidHYH37H8"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "5b52e465-486d-49e5-bc42-131f3b1bfd6c", "DetectTime": "2024-05-21T12:25:47.897171+00:00", "EventTime": "2024-05-21T12:25:47.897190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXPll1oa47meUFGE5"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "9bdba318-4321-406e-8001-aa1c984d6961", "DetectTime": "2024-05-21T12:25:47.912754+00:00", "EventTime": "2024-05-21T12:25:47.912776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJj7M2ZVdM54TsaT7"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "5299c419-98ad-4869-a02e-00a659981dbd", "DetectTime": "2024-05-21T12:25:47.917679+00:00", "EventTime": "2024-05-21T12:25:47.917700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFh31tkNYtKsdHWPe"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "e7adae87-f71c-4d6a-b7a3-9cfdcaa30056", "DetectTime": "2024-05-21T12:25:47.964714+00:00", "EventTime": "2024-05-21T12:25:47.964734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwffk2rXc9Z5btksh"], "accumulated_threat_level": 3.2, "timewindow": 19} +{"Format": "IDEA0", "ID": "cc5cf0b5-cccb-497f-a136-f89ad977bcbf", "DetectTime": "2024-05-21T12:25:47.971823+00:00", "EventTime": "2024-05-21T12:25:47.971843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFE6fn2nRNw4Tdzeq2"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "72027203-12d3-4032-a75a-dff8c14a194f", "DetectTime": "2024-05-21T12:25:48.402958+00:00", "EventTime": "2024-05-21T12:25:48.402976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czu7yg2RuunjOuMPq4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "46e5cabf-0366-4254-ae6b-28c0718e357a", "DetectTime": "2024-05-21T12:25:48.613307+00:00", "EventTime": "2024-05-21T12:25:48.613326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTpDAH88DVMeIENh"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "5daf0243-af5b-49af-a5ee-e697f311c52b", "DetectTime": "2024-05-21T12:25:48.650189+00:00", "EventTime": "2024-05-21T12:25:48.650208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.98.202.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6693/UDP destination IP 5.98.202.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZYLp3iQrgFS2hGEg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9d7eaa3f-5401-4268-9ecc-6fa79c7c4ced", "DetectTime": "2024-05-21T12:25:48.664766+00:00", "EventTime": "2024-05-21T12:25:48.664788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.220.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbjvoo1nys5XkAiFKc"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "d08a6029-6a8f-48e1-86d0-33cecd6ac122", "DetectTime": "2024-05-21T12:25:48.692624+00:00", "EventTime": "2024-05-21T12:25:48.692645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.191.37.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXZ0I3IkBWukgiBd6"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "6845142c-bac6-4174-bdd7-66b70a4e188a", "DetectTime": "2024-05-21T12:25:48.791297+00:00", "EventTime": "2024-05-21T12:25:48.791315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY911r31hHgO6tUaQk"], "accumulated_threat_level": 5.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "a0e1f3c8-29fb-492d-80cd-ba6045f749d9", "DetectTime": "2024-05-21T12:25:48.917385+00:00", "EventTime": "2024-05-21T12:25:48.917404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.108.28.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfCXCd1aZaTjT29pIc"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "9273aed7-3ace-42b5-b347-b06682205d6c", "DetectTime": "2024-05-21T12:25:48.953422+00:00", "EventTime": "2024-05-21T12:25:48.953442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAiiW1glnJwZDsYo6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 19} +{"Format": "IDEA0", "ID": "d73aaf10-2440-49da-bbfe-f412b8079e95", "DetectTime": "2024-05-21T12:25:49.163557+00:00", "EventTime": "2024-05-21T12:25:49.163579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjrsu3dnJQqie4TEk"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "33c1526d-cecb-4920-ac76-6cc63710855c", "DetectTime": "2024-05-21T12:25:49.175533+00:00", "EventTime": "2024-05-21T12:25:49.175551+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GoKe39z9rrQ3RYmd"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "01c13ea0-0285-4c0a-aac4-6f1eb810033d", "DetectTime": "2024-05-21T12:25:49.186376+00:00", "EventTime": "2024-05-21T12:25:49.186399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GoKe39z9rrQ3RYmd"], "accumulated_threat_level": 6.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "ad31a181-b1a9-4f25-987d-275d2a84f870", "DetectTime": "2024-05-21T12:25:49.197585+00:00", "EventTime": "2024-05-21T12:25:49.197607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqojJW5gXrao5jNs3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "205e0c2d-596d-4fbb-9381-4efdc1c78cfb", "DetectTime": "2024-05-21T12:25:49.202360+00:00", "EventTime": "2024-05-21T12:25:49.202379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ4Kh13kZxmmn85R9c"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "9f27251c-6ee2-4616-9602-9d5421b1becd", "DetectTime": "2024-05-21T12:25:49.214136+00:00", "EventTime": "2024-05-21T12:25:49.214158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV417W2P0n64uSmTj5"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "3bf28ac2-c20f-4856-8f76-39c64aaa6af4", "DetectTime": "2024-05-21T12:25:49.242105+00:00", "EventTime": "2024-05-21T12:25:49.242123+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.82.20.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfRmYGd6UqEoVuJ16"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "f2531445-8c60-4190-bc2e-a54bc7675673", "DetectTime": "2024-05-21T12:25:49.257449+00:00", "EventTime": "2024-05-21T12:25:49.257472+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.82.20.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.82.20.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfRmYGd6UqEoVuJ16"], "accumulated_threat_level": 7.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "2ff8e5c1-e116-47b5-85b3-b86b2bec9843", "DetectTime": "2024-05-21T12:25:49.293130+00:00", "EventTime": "2024-05-21T12:25:49.293154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOuNf4tboTrMPrWuh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "faba69e5-6f52-4665-be8b-07f309a975ee", "DetectTime": "2024-05-21T12:25:49.342054+00:00", "EventTime": "2024-05-21T12:25:49.342073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQjAQ1cbs6Rm0nAPc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 19} +{"Format": "IDEA0", "ID": "8e794393-e2a9-463a-b104-631f62e0bdd4", "DetectTime": "2024-05-21T12:25:49.379814+00:00", "EventTime": "2024-05-21T12:25:49.379834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6HcC49c55HCqaxO6"], "accumulated_threat_level": 9.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "8a6f0d69-13c5-4903-9c40-55e073ec117e", "DetectTime": "2024-05-21T12:25:49.513108+00:00", "EventTime": "2024-05-21T12:25:49.513128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrFSa32OmIbuyXCOl"], "accumulated_threat_level": 10.4, "timewindow": 19} +{"Format": "IDEA0", "ID": "0e572ee8-6238-4ba5-b32b-3fba330902bd", "DetectTime": "2024-05-21T12:25:49.573696+00:00", "EventTime": "2024-05-21T12:25:49.573716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXaSr2vlCyzfzU74k"], "accumulated_threat_level": 11.200000000000001, "timewindow": 19} +{"Format": "IDEA0", "ID": "6a6ab049-db49-4439-a411-f711fffa7583", "DetectTime": "2024-05-21T12:25:49.609281+00:00", "EventTime": "2024-05-21T12:25:49.609302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "Connection to unknown destination port 10223/UDP destination IP 178.88.57.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zbKu4QYYGHuaRww3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 19} +{"Format": "Json", "ID": "6a6ab049-db49-4439-a411-f711fffa7583", "DetectTime": "2024-05-21T12:25:49.609281+00:00", "EventTime": "2024-05-21T12:25:49.609302+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "1970-01-01T18:39:27.067116+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:25:49.811839)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "74d8e056-da52-44b1-a3cd-d897e5f4c34d", "DetectTime": "2024-05-21T12:25:49.815702+00:00", "EventTime": "2024-05-21T12:25:49.815720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrkJr13FlO2hJ5IF"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "4098d0b6-0eb0-4449-b194-3c02c54a1f1e", "DetectTime": "2024-05-21T12:25:49.820121+00:00", "EventTime": "2024-05-21T12:25:49.820139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktLim2176nBItUJg9"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "80563df8-3bc1-4785-92c2-c6e64a5d63de", "DetectTime": "2024-05-21T12:25:49.824446+00:00", "EventTime": "2024-05-21T12:25:49.824463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGtiW2GkvOq6PUiJ7"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b19222c4-1d06-4f50-ad86-2c6f611984a6", "DetectTime": "2024-05-21T12:25:49.828737+00:00", "EventTime": "2024-05-21T12:25:49.828755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbInXf2IBRjLeP4R8k"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "ba30be26-ef01-4c40-933e-3ff2957bfb61", "DetectTime": "2024-05-21T12:25:49.833103+00:00", "EventTime": "2024-05-21T12:25:49.833120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmoAQD4xTnoOrHo4t"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "cf859969-9ff9-4653-890e-8c3686c5876e", "DetectTime": "2024-05-21T12:25:49.844716+00:00", "EventTime": "2024-05-21T12:25:49.844737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7MOgM2ZukjxSVyj5g"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "21f832d6-14db-400f-a811-9d6652862cc6", "DetectTime": "2024-05-21T12:25:49.868646+00:00", "EventTime": "2024-05-21T12:25:49.868667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOnVv2C6BwFnKPr87"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "f9fb17ff-f3ff-454f-b59b-16dc8eed17aa", "DetectTime": "2024-05-21T12:25:49.891826+00:00", "EventTime": "2024-05-21T12:25:49.891845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1HWP1c2Gjp8yqEMd"], "accumulated_threat_level": 0.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b398dcf4-030e-46ac-a7f9-08e76709b16c", "DetectTime": "2024-05-21T12:25:49.896552+00:00", "EventTime": "2024-05-21T12:25:49.896569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQaqlrQ8ekNUNXte"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b46c73d7-d0f7-4504-9fc7-807d3422386e", "DetectTime": "2024-05-21T12:25:50.080116+00:00", "EventTime": "2024-05-21T12:25:50.080138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpw8ubVBKEtkjJ484"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "6c1e8e80-4f64-4401-a3ba-227dcaefeedb", "DetectTime": "2024-05-21T12:25:50.111518+00:00", "EventTime": "2024-05-21T12:25:50.111536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFA3M30AJM4M2w3s8"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "3cafda69-62c0-4390-b42e-7804ad2c337f", "DetectTime": "2024-05-21T12:25:50.180338+00:00", "EventTime": "2024-05-21T12:25:50.180358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iubC278etLvu4md9"], "accumulated_threat_level": 1.6, "timewindow": 19} +{"Format": "IDEA0", "ID": "3fca7b89-5017-404a-99e4-163f1a6e1400", "DetectTime": "2024-05-21T12:25:50.421456+00:00", "EventTime": "2024-05-21T12:25:50.421480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCClz42gAGECGPXzxd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 19} +{"Format": "IDEA0", "ID": "881418e4-5ec5-42fe-a467-3b89449e0203", "DetectTime": "2024-05-21T12:25:50.457447+00:00", "EventTime": "2024-05-21T12:25:50.457468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcbUS13ZrA74AIsm7"], "accumulated_threat_level": 3.2, "timewindow": 19} +{"Format": "IDEA0", "ID": "7e095e78-12a6-4950-9cec-f8d4e59f367f", "DetectTime": "2024-05-21T12:25:50.482428+00:00", "EventTime": "2024-05-21T12:25:50.482447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6r7K3fsFmQbqsqN8"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "f607a1c9-c1fa-49d7-9158-85dc34d61962", "DetectTime": "2024-05-21T12:25:50.616046+00:00", "EventTime": "2024-05-21T12:25:50.616066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.161.47"]}], "Attach": [{"Content": "Connection to unknown destination port 10348/UDP destination IP 95.156.161.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLDuh2NkVnl2hUOgh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "84a74994-5618-4534-893f-2199396d1d8e", "DetectTime": "2024-05-21T12:25:50.639023+00:00", "EventTime": "2024-05-21T12:25:50.639041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbgfXcEdgt32HAnk3"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "1cc014a1-99e8-4c24-89a7-c42d209616d2", "DetectTime": "2024-05-21T12:25:50.744903+00:00", "EventTime": "2024-05-21T12:25:50.744924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDPv011gLijKTgHbf"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "5957d0db-f64e-45fd-9531-da6da8c698bf", "DetectTime": "2024-05-21T12:25:50.812362+00:00", "EventTime": "2024-05-21T12:25:50.812382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCxgv43Bn5SMu6xE4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "700d5a7c-33bf-4b06-b301-af646a3b2348", "DetectTime": "2024-05-21T12:25:50.860920+00:00", "EventTime": "2024-05-21T12:25:50.860941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CokyLq4sxe0vqFJZna"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "8c204f6e-b4b5-4267-a245-e7aa024846aa", "DetectTime": "2024-05-21T12:25:50.902767+00:00", "EventTime": "2024-05-21T12:25:50.902788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTa6T94T8mGWDGQ2za"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b2240b72-b95d-47c8-b157-8bcbc5a31c98", "DetectTime": "2024-05-21T12:25:50.939479+00:00", "EventTime": "2024-05-21T12:25:50.939500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYMhb310QDyf1x917"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "49ecabf5-9f97-44d0-8a21-ebbdfa29d45c", "DetectTime": "2024-05-21T12:25:50.958751+00:00", "EventTime": "2024-05-21T12:25:50.958773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnhsoXLPg1JtmMiG2"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "a6e466b2-ad41-4311-822a-e2af8231037a", "DetectTime": "2024-05-21T12:25:51.028142+00:00", "EventTime": "2024-05-21T12:25:51.028164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrZJt1TyNAfbKFDzf"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "1b8dd9ac-d2ea-4f48-8998-3020b89ea2b3", "DetectTime": "2024-05-21T12:25:51.077928+00:00", "EventTime": "2024-05-21T12:25:51.077949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mA5m30ULhdl10UV1"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "23f6e8c8-c770-4d37-8025-a9616da825a6", "DetectTime": "2024-05-21T12:25:51.099906+00:00", "EventTime": "2024-05-21T12:25:51.099928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfaDly3URHuA9aMcO7"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "ed4a8b18-e9ad-467b-8fe7-a4ac816b29d3", "DetectTime": "2024-05-21T12:25:51.138680+00:00", "EventTime": "2024-05-21T12:25:51.138701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9V7I1shwblsVkFZk"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "74e8b837-5bec-4d93-8526-b301036a1017", "DetectTime": "2024-05-21T12:25:51.162312+00:00", "EventTime": "2024-05-21T12:25:51.162333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb8HL3AYnglJdxvu7"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b37d20d6-f81d-41e9-bf62-71cd4e716190", "DetectTime": "2024-05-21T12:25:51.173827+00:00", "EventTime": "2024-05-21T12:25:51.173844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEr5W1mMFwh8wSoQa"], "accumulated_threat_level": 0.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "11c2c224-5a5f-4052-a054-09528146eb04", "DetectTime": "2024-05-21T12:25:51.272208+00:00", "EventTime": "2024-05-21T12:25:51.272229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0Si43RYV4x60DZy3"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "d01c121d-5b4d-4b75-aaea-6305da14effa", "DetectTime": "2024-05-21T12:25:51.289007+00:00", "EventTime": "2024-05-21T12:25:51.289029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa08E9RwE7ulX3El"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "ac5d5c2a-e711-4b6a-af36-df8640ed9cc7", "DetectTime": "2024-05-21T12:25:51.384830+00:00", "EventTime": "2024-05-21T12:25:51.384855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXttI2cnOjt8vCfD2"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "685d562b-a1b5-40ce-b09e-ecd831983f39", "DetectTime": "2024-05-21T12:25:51.405327+00:00", "EventTime": "2024-05-21T12:25:51.405347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnEd1n4M1JVgsaqd0b"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "8c9884aa-7e48-4fc0-b0bf-69c43a988000", "DetectTime": "2024-05-21T12:25:51.417085+00:00", "EventTime": "2024-05-21T12:25:51.417105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggwL1Um5TSi629f6"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "ed6b3bd5-7833-45ac-b439-a0d1332b7a67", "DetectTime": "2024-05-21T12:25:51.486748+00:00", "EventTime": "2024-05-21T12:25:51.486768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTiFt3gPxZcCudp35"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "d742acaf-c0a0-4273-b530-0b4df719b8bc", "DetectTime": "2024-05-21T12:25:51.512336+00:00", "EventTime": "2024-05-21T12:25:51.512359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clwcmi2yu1z8tMIlge"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "12a629e9-b065-4855-a323-f4f999bd5ca5", "DetectTime": "2024-05-21T12:25:51.553726+00:00", "EventTime": "2024-05-21T12:25:51.553746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kefj4hoazbPvy6C4"], "accumulated_threat_level": 1.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "b2677b2b-329d-43f7-a947-d48846dc8a93", "DetectTime": "2024-05-21T12:25:51.611941+00:00", "EventTime": "2024-05-21T12:25:51.611961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84n7Z2XbBuY57HjMk"], "accumulated_threat_level": 1.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "3323276b-e4f0-442e-951c-f85d04936070", "DetectTime": "2024-05-21T12:25:51.645751+00:00", "EventTime": "2024-05-21T12:25:51.645771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1y56h3dow558qeZX7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 20} +{"Format": "IDEA0", "ID": "ec21365b-251b-41d0-8598-bd9dcc3f90f8", "DetectTime": "2024-05-21T12:25:51.661851+00:00", "EventTime": "2024-05-21T12:25:51.661869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR4Rwm4D99fJG84YV5"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "62d6f85d-6366-4d78-9775-1c54cd332b81", "DetectTime": "2024-05-21T12:25:51.685564+00:00", "EventTime": "2024-05-21T12:25:51.685583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CicTpd3fN4M1JGpto4"], "accumulated_threat_level": 3.2, "timewindow": 20} +{"Format": "IDEA0", "ID": "f1fc5aac-558a-4ba3-885d-35f91fc82e0a", "DetectTime": "2024-05-21T12:25:51.707575+00:00", "EventTime": "2024-05-21T12:25:51.707593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUm8tt4MXiqPHsKsrg"], "accumulated_threat_level": 4.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "67898730-3d96-470c-8d2c-7a361d4df904", "DetectTime": "2024-05-21T12:25:51.733109+00:00", "EventTime": "2024-05-21T12:25:51.733131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRStr01vesWwJKGXR"], "accumulated_threat_level": 4.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "97d8a41e-5754-4b9b-95e3-b40ca4fb5918", "DetectTime": "2024-05-21T12:25:51.942964+00:00", "EventTime": "2024-05-21T12:25:51.942985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWMzy1AKYXuG97V65"], "accumulated_threat_level": 5.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "230bf6c4-483b-4b4c-94e9-6d7411e83931", "DetectTime": "2024-05-21T12:25:51.966108+00:00", "EventTime": "2024-05-21T12:25:51.966125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wzcP3Ryx0eqfGBj8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 20} +{"Format": "IDEA0", "ID": "8ca3a2f6-d3ac-4c5d-aebe-c8bbdb7b93dc", "DetectTime": "2024-05-21T12:25:52.000370+00:00", "EventTime": "2024-05-21T12:25:52.000387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9vYd2L4OnDn0FZvc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ddd8417b-dcc3-4683-bf7d-dffda02e45db", "DetectTime": "2024-05-21T12:25:52.024107+00:00", "EventTime": "2024-05-21T12:25:52.024125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Sgll3gJTdwXt6iml"], "accumulated_threat_level": 7.999999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "1c27d21c-d2ab-40ef-a2fb-3d2bea8cd037", "DetectTime": "2024-05-21T12:25:52.063508+00:00", "EventTime": "2024-05-21T12:25:52.063529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorrLc3TqxGyr9vsUl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "da7c7380-e71e-4c1e-be17-97a23d547d59", "DetectTime": "2024-05-21T12:25:52.333087+00:00", "EventTime": "2024-05-21T12:25:52.333107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTuVjEoF3E84MkUe"], "accumulated_threat_level": 9.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "3c2eac60-90b9-42df-8980-0515206b170d", "DetectTime": "2024-05-21T12:25:52.347956+00:00", "EventTime": "2024-05-21T12:25:52.347978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhg7S10C1W5s3q28l"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "4c3cb716-64f6-4950-9e25-354892927bce", "DetectTime": "2024-05-21T12:25:52.376562+00:00", "EventTime": "2024-05-21T12:25:52.376579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKPs6TsV7Vd1K167"], "accumulated_threat_level": 10.4, "timewindow": 20} +{"Format": "IDEA0", "ID": "ee8a0150-9a07-43a9-8574-9e201d861dcf", "DetectTime": "2024-05-21T12:25:52.387739+00:00", "EventTime": "2024-05-21T12:25:52.387756+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRq6qf4wPjxR2iTbI4"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "8f5bca87-6dc2-45d3-b333-12c7880731f4", "DetectTime": "2024-05-21T12:25:52.399986+00:00", "EventTime": "2024-05-21T12:25:52.400004+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRq6qf4wPjxR2iTbI4"], "accumulated_threat_level": 7.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "19ee0238-708c-4bab-94fa-c5ff2456332e", "DetectTime": "2024-05-21T12:25:52.410206+00:00", "EventTime": "2024-05-21T12:25:52.410224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfb4cs3hXaHiGzKj73"], "accumulated_threat_level": 11.200000000000001, "timewindow": 20} +{"Format": "IDEA0", "ID": "88b36b8b-5110-442f-9734-285afc943b77", "DetectTime": "2024-05-21T12:25:52.421538+00:00", "EventTime": "2024-05-21T12:25:52.421554+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZl7D14ijsyXVKAbe"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "b16abdb2-5a7a-45a9-861e-03783faeea58", "DetectTime": "2024-05-21T12:25:52.432822+00:00", "EventTime": "2024-05-21T12:25:52.432840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZl7D14ijsyXVKAbe"], "accumulated_threat_level": 8.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "7978fd20-9cf1-463b-8994-7117e0495d8a", "DetectTime": "2024-05-21T12:25:52.442612+00:00", "EventTime": "2024-05-21T12:25:52.442629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTXe3fbO2bhtt9q"], "accumulated_threat_level": 12.000000000000002, "timewindow": 20} +{"Format": "Json", "ID": "7978fd20-9cf1-463b-8994-7117e0495d8a", "DetectTime": "2024-05-21T12:25:52.442612+00:00", "EventTime": "2024-05-21T12:25:52.442629+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "1970-01-01T19:12:48.841625+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:25:52.588445)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1fc339c5-a134-4436-932d-3ad7edc62d6c", "DetectTime": "2024-05-21T12:25:52.601288+00:00", "EventTime": "2024-05-21T12:25:52.601308+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa0qK5SiovTFGuMb"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "00750945-5a81-4d71-88de-d135fcdd6f8d", "DetectTime": "2024-05-21T12:25:52.615190+00:00", "EventTime": "2024-05-21T12:25:52.615209+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa0qK5SiovTFGuMb"], "accumulated_threat_level": 8.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "05c838ad-b9c1-45ad-913a-98c5366a27db", "DetectTime": "2024-05-21T12:25:52.631889+00:00", "EventTime": "2024-05-21T12:25:52.631908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.53.158.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9Ywl1a9Dtq1BlXVl"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "46e0398f-993f-44b1-8a73-4dbd4f2c8b8d", "DetectTime": "2024-05-21T12:25:52.657335+00:00", "EventTime": "2024-05-21T12:25:52.657357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.16.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuvIWF22ytsoa0e9T2"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "dd421a85-01db-4bff-820e-b180616f9109", "DetectTime": "2024-05-21T12:25:52.686292+00:00", "EventTime": "2024-05-21T12:25:52.686312+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq85IdsmuDmOZOFNf"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "c2882f5b-c1b0-45dd-b920-8dd8224a9ea6", "DetectTime": "2024-05-21T12:25:52.691039+00:00", "EventTime": "2024-05-21T12:25:52.691056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32XS2LeAxZ0aZFle", "C625Gj4XUOtPqoZKag", "C3nfpO1mkij9pzITdj", "CAPEx83Ul57GfF0Zti"], "accumulated_threat_level": 0.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "b019136d-d740-4a7c-9b00-8486a10c8a34", "DetectTime": "2024-05-21T12:25:52.702937+00:00", "EventTime": "2024-05-21T12:25:52.702953+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq85IdsmuDmOZOFNf"], "accumulated_threat_level": 9.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "3b4a2dd1-3765-4d8f-9678-8b039b051538", "DetectTime": "2024-05-21T12:25:52.720211+00:00", "EventTime": "2024-05-21T12:25:52.720228+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MTmt3n5OfAWfj0Za"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "7619e3c6-63a5-41dd-ab5e-31b257637d33", "DetectTime": "2024-05-21T12:25:52.733936+00:00", "EventTime": "2024-05-21T12:25:52.733956+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MTmt3n5OfAWfj0Za"], "accumulated_threat_level": 9.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "62adda5a-439f-496f-b4c7-d86522475430", "DetectTime": "2024-05-21T12:25:52.785117+00:00", "EventTime": "2024-05-21T12:25:52.785139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RFOzxVxjhZOm6Y1"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "9ad93f00-1b04-4fee-91f9-e424efebc027", "DetectTime": "2024-05-21T12:25:52.799901+00:00", "EventTime": "2024-05-21T12:25:52.799924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMtZ8l21DxjCitnFl2"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "4102c287-2eb8-4424-8f36-35b5c216d713", "DetectTime": "2024-05-21T12:25:52.840973+00:00", "EventTime": "2024-05-21T12:25:52.840994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CULRZp1fW3aUSQXnCk"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "00efca66-6c49-471b-b4e1-87f62b89f732", "DetectTime": "2024-05-21T12:25:52.853501+00:00", "EventTime": "2024-05-21T12:25:52.853519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mcZU2zZ33A4C4xgd"], "accumulated_threat_level": 1.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "5eab49c5-579f-4866-8335-c06a7cea3411", "DetectTime": "2024-05-21T12:25:52.858049+00:00", "EventTime": "2024-05-21T12:25:52.858067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3NEV1a6QkE63AFt9"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "9badbb9f-73fc-4cec-826f-e66397f9f260", "DetectTime": "2024-05-21T12:25:52.903382+00:00", "EventTime": "2024-05-21T12:25:52.903403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9KMBwJ861ZsJS78"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "7a7e8c01-9db8-48ca-8394-588d0c1454eb", "DetectTime": "2024-05-21T12:25:53.007888+00:00", "EventTime": "2024-05-21T12:25:53.007909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6cq64ZYBdnbpItJ4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "8b76e5ca-f6b5-4226-aecb-d048529264c7", "DetectTime": "2024-05-21T12:25:53.175581+00:00", "EventTime": "2024-05-21T12:25:53.175601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOLEs3oaF9Tpaxa3h"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "95fb2485-54fe-4b76-82ea-dbf7ba312d5c", "DetectTime": "2024-05-21T12:25:53.214132+00:00", "EventTime": "2024-05-21T12:25:53.214151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKMBDD1EeNCmCyrvb1"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "157fd413-68d7-4fae-8f1e-1e7cfc0a1f75", "DetectTime": "2024-05-21T12:25:53.231963+00:00", "EventTime": "2024-05-21T12:25:53.231981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfwbyn1zRR1pSZFXZ2"], "accumulated_threat_level": 2.1, "timewindow": 20} +{"Format": "IDEA0", "ID": "2b1db8f3-f25a-4775-800b-c529671ab398", "DetectTime": "2024-05-21T12:25:53.328268+00:00", "EventTime": "2024-05-21T12:25:53.328289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrI8x1PXEJftF9UBg"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "06e58c20-658e-4798-a379-bb560bbbe5d4", "DetectTime": "2024-05-21T12:25:53.350882+00:00", "EventTime": "2024-05-21T12:25:53.350901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnsONzWpRUAGWnZh"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "6af769ab-7236-4d7a-9dd7-7699c2f0fcaa", "DetectTime": "2024-05-21T12:25:53.370851+00:00", "EventTime": "2024-05-21T12:25:53.370872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkM13SCXgZt5dY50a"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "34180940-0f57-4400-94c1-5381ce951332", "DetectTime": "2024-05-21T12:25:53.398396+00:00", "EventTime": "2024-05-21T12:25:53.398425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CahDIQ1TLX35PVpr0a"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 20} +{"Format": "IDEA0", "ID": "c40cf257-1b7a-4eec-b152-9f05323473a8", "DetectTime": "2024-05-21T12:25:53.403966+00:00", "EventTime": "2024-05-21T12:25:53.403986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwqVtM8Q0EuPrL6h"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "83420724-8c1a-457c-b509-9b0a1542d4a0", "DetectTime": "2024-05-21T12:25:53.426959+00:00", "EventTime": "2024-05-21T12:25:53.426980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO88GP1r15dbgeZ7Ml"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "ebfc992d-5c33-4e6c-8a62-b3c70511a442", "DetectTime": "2024-05-21T12:25:53.457172+00:00", "EventTime": "2024-05-21T12:25:53.457190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYAWgC4QCD6AHIypVc"], "accumulated_threat_level": 3.7, "timewindow": 20} +{"Format": "IDEA0", "ID": "54fff8ce-c79f-432d-828f-3889e75cf7f7", "DetectTime": "2024-05-21T12:25:53.461389+00:00", "EventTime": "2024-05-21T12:25:53.461407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73FMl1peHRmkoWGWa"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "effad4af-2654-4e38-b075-9205b156a5a8", "DetectTime": "2024-05-21T12:25:53.484466+00:00", "EventTime": "2024-05-21T12:25:53.484486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIli0Z3HAkrpr6MD26"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "3a76131a-704b-4020-abfb-8f5d86ac81fd", "DetectTime": "2024-05-21T12:25:53.506148+00:00", "EventTime": "2024-05-21T12:25:53.506166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdq0xjaLppGQvzGi"], "accumulated_threat_level": 4.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "445a2666-30b0-4c55-baaf-284ee0a35e89", "DetectTime": "2024-05-21T12:25:53.510560+00:00", "EventTime": "2024-05-21T12:25:53.510578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYOUsY1kz7ZgNHBPSb"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "c076af6f-d546-4d64-9d5c-dca703ed7383", "DetectTime": "2024-05-21T12:25:53.529326+00:00", "EventTime": "2024-05-21T12:25:53.529348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CidleD4V3mUrDr19Q2"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "75094909-7190-45cc-a8fd-638a5a54eef5", "DetectTime": "2024-05-21T12:25:53.593874+00:00", "EventTime": "2024-05-21T12:25:53.593894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQk0as1aSH7K4XGpDj"], "accumulated_threat_level": 5.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "bafd1224-c536-4f17-b2ab-85ab2bc5d542", "DetectTime": "2024-05-21T12:25:53.619395+00:00", "EventTime": "2024-05-21T12:25:53.619418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSXwB36LVvwfh5cTi"], "accumulated_threat_level": 6.1, "timewindow": 20} +{"Format": "IDEA0", "ID": "2959877f-fce3-45bf-b65c-b1190a6a499c", "DetectTime": "2024-05-21T12:25:53.645246+00:00", "EventTime": "2024-05-21T12:25:53.645267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKVji1athfkiOfb99"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 20} +{"Format": "IDEA0", "ID": "6c97562d-14ad-47a3-89f2-149b0d780c58", "DetectTime": "2024-05-21T12:25:53.668464+00:00", "EventTime": "2024-05-21T12:25:53.668481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clu9Wo3AWIp1QUPc02"], "accumulated_threat_level": 7.699999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "a25fb077-67a5-4110-8a3f-1652cba7389c", "DetectTime": "2024-05-21T12:25:53.693009+00:00", "EventTime": "2024-05-21T12:25:53.693030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4N7e124c2aoWOImkh"], "accumulated_threat_level": 8.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "2cf81ae8-2508-40c3-aba2-bb09a654f787", "DetectTime": "2024-05-21T12:25:53.720280+00:00", "EventTime": "2024-05-21T12:25:53.720299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ajmi108sJP10rgql"], "accumulated_threat_level": 9.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "d23efa46-0a34-4dd2-a5e1-f9450519698a", "DetectTime": "2024-05-21T12:25:53.757613+00:00", "EventTime": "2024-05-21T12:25:53.757633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7W1WUTiYoYvzsfLc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 20} +{"Format": "IDEA0", "ID": "251946e7-363c-48d6-a031-794c1cad41c9", "DetectTime": "2024-05-21T12:25:53.780492+00:00", "EventTime": "2024-05-21T12:25:53.780511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcCJ9E3CuigDzpjh6k"], "accumulated_threat_level": 10.900000000000002, "timewindow": 20} +{"Format": "IDEA0", "ID": "86050de8-10e8-4943-8a60-4ff8da769d4b", "DetectTime": "2024-05-21T12:25:53.961722+00:00", "EventTime": "2024-05-21T12:25:53.961740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQ5kj3LgQEarN3ch4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "75d8bf0a-2e9c-4345-9d50-8da98e2f45d8", "DetectTime": "2024-05-21T12:25:54.042806+00:00", "EventTime": "2024-05-21T12:25:54.042829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxuhiU1d7rCXt6RBff"], "accumulated_threat_level": 11.700000000000003, "timewindow": 20} +{"Format": "IDEA0", "ID": "5bdbdbf3-b8b3-4c77-870f-da05b99e2b30", "DetectTime": "2024-05-21T12:25:54.081674+00:00", "EventTime": "2024-05-21T12:25:54.081695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNtYt1LwieSywoVRj"], "accumulated_threat_level": 12.500000000000004, "timewindow": 20} +{"Format": "Json", "ID": "5bdbdbf3-b8b3-4c77-870f-da05b99e2b30", "DetectTime": "2024-05-21T12:25:54.081674+00:00", "EventTime": "2024-05-21T12:25:54.081695+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "1970-01-01T19:14:03.068136+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:25:54.277393)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "cbe3ec68-216f-4f71-b3a4-530db655429a", "DetectTime": "2024-05-21T12:25:54.288683+00:00", "EventTime": "2024-05-21T12:25:54.288704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTQI6gyHak3dwwgi"], "accumulated_threat_level": 0.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "1788d2ba-0481-42ad-885f-f9a8b4deeae3", "DetectTime": "2024-05-21T12:25:54.293443+00:00", "EventTime": "2024-05-21T12:25:54.293460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ygVh4q36OUozYZ4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "23cb2863-67ea-4f41-9756-93bd609452ee", "DetectTime": "2024-05-21T12:25:54.297757+00:00", "EventTime": "2024-05-21T12:25:54.297774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTWtz23Exq3fAbjD4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "3b7bd57c-9082-4a55-be17-bdf23e22f9a4", "DetectTime": "2024-05-21T12:25:54.303484+00:00", "EventTime": "2024-05-21T12:25:54.303504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKgYA45ITH281Lk22"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "2d05befa-9699-4ab0-a1b3-4e2278da3ea9", "DetectTime": "2024-05-21T12:25:54.505458+00:00", "EventTime": "2024-05-21T12:25:54.505478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3GzS3aREFcxuKi72", "CggGVA2erznvCYc1Fd", "CkUHBg3U4Jk3lMXdc", "C9QdAus6zuMtCxJLh"], "accumulated_threat_level": 1.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "b07b746b-8614-41b6-8bc7-ffb32f6789d2", "DetectTime": "2024-05-21T12:25:54.527912+00:00", "EventTime": "2024-05-21T12:25:54.527929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPy4Zl3nBuXieToit"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "6b48cd65-d5bb-48f2-be56-009342d620f9", "DetectTime": "2024-05-21T12:25:54.535090+00:00", "EventTime": "2024-05-21T12:25:54.535110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1u1jd1YH9MrEFJnCe"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "0a635eae-e39c-49cb-9ea1-18c96544099f", "DetectTime": "2024-05-21T12:25:54.540453+00:00", "EventTime": "2024-05-21T12:25:54.540471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUaX1Q3X6UfFYJnyM1"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "52e8bb87-3bc9-4c5d-88a0-306f8d57bce1", "DetectTime": "2024-05-21T12:25:54.544820+00:00", "EventTime": "2024-05-21T12:25:54.544837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35gLAi8nOSzB3nZ4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "482e4f59-b7ec-44dc-a1dd-91b0e0424e85", "DetectTime": "2024-05-21T12:25:54.549090+00:00", "EventTime": "2024-05-21T12:25:54.549107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBc5QU3K53sj6lFpL5"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f12681e2-d94a-492d-874b-0446d36984b1", "DetectTime": "2024-05-21T12:25:54.553453+00:00", "EventTime": "2024-05-21T12:25:54.553471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9v8N2YbjgXWQ3MFg"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "0f8708bb-6273-486e-9900-b1fe6084c005", "DetectTime": "2024-05-21T12:25:54.569567+00:00", "EventTime": "2024-05-21T12:25:54.569590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap3qa46NZWCkQvPNa"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "4209fcde-f8e2-4d8d-83f3-3c98dc4b4428", "DetectTime": "2024-05-21T12:25:54.632203+00:00", "EventTime": "2024-05-21T12:25:54.632223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdlHj4ktRHaWBKzKj"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f1ad8ddf-ebd3-4a66-ad9a-1f93f04b331d", "DetectTime": "2024-05-21T12:25:54.679323+00:00", "EventTime": "2024-05-21T12:25:54.679345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNKyG4dmXuVV2Wknh"], "accumulated_threat_level": 2.1, "timewindow": 20} +{"Format": "IDEA0", "ID": "1e1b6d5b-2e5a-4205-bbda-fe0145cad317", "DetectTime": "2024-05-21T12:25:54.704385+00:00", "EventTime": "2024-05-21T12:25:54.704404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Qf0v1HWdZeVIZbg9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 20} +{"Format": "IDEA0", "ID": "3f4ec7e9-387c-48af-a1eb-81259f5fc882", "DetectTime": "2024-05-21T12:25:54.728352+00:00", "EventTime": "2024-05-21T12:25:54.728372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca111X3EfXYHKI57sh"], "accumulated_threat_level": 3.7, "timewindow": 20} +{"Format": "IDEA0", "ID": "b54ad789-309b-44e8-9cb1-9dd3de7b9c63", "DetectTime": "2024-05-21T12:25:54.752195+00:00", "EventTime": "2024-05-21T12:25:54.752213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBShJp1GJpSiTmoc"], "accumulated_threat_level": 4.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "a009b5d7-5291-42f2-83ea-6acfafd524eb", "DetectTime": "2024-05-21T12:25:54.776841+00:00", "EventTime": "2024-05-21T12:25:54.776859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtueBJCrJDkAi9Ic4"], "accumulated_threat_level": 5.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "d31b028e-c16f-44bb-9359-68ce811c21f4", "DetectTime": "2024-05-21T12:25:54.802842+00:00", "EventTime": "2024-05-21T12:25:54.802862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccd9Uv1nlYRg5zMoQ8"], "accumulated_threat_level": 6.1, "timewindow": 20} +{"Format": "IDEA0", "ID": "bb3bf554-1b6f-44fa-8192-3356fd22e26b", "DetectTime": "2024-05-21T12:25:54.839336+00:00", "EventTime": "2024-05-21T12:25:54.839356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJrnYeCT7TpxgRc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 20} +{"Format": "IDEA0", "ID": "2cc6763f-976b-4d4a-a243-c827e258a266", "DetectTime": "2024-05-21T12:25:54.876293+00:00", "EventTime": "2024-05-21T12:25:54.876311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "Connection to unknown destination port 10223/UDP destination IP 178.88.57.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Za494HKYS7DFKjna"], "accumulated_threat_level": 7.699999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "760ba9e6-c289-49e4-9e43-ac499c4acd65", "DetectTime": "2024-05-21T12:25:54.893576+00:00", "EventTime": "2024-05-21T12:25:54.893597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59WFJ26Ya5vTsCUX1"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "8c375db9-59d1-44fa-9d02-7f0370dcc151", "DetectTime": "2024-05-21T12:25:54.909493+00:00", "EventTime": "2024-05-21T12:25:54.909511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwDWE1EpqMhUWXhJ"], "accumulated_threat_level": 8.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "eed44d13-1e45-4869-a70b-441e4e4c429d", "DetectTime": "2024-05-21T12:25:54.939121+00:00", "EventTime": "2024-05-21T12:25:54.939140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CABBGIQ0YvjEfDwLf"], "accumulated_threat_level": 9.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "b1c77bf1-e6bd-455c-bb61-149316eb736a", "DetectTime": "2024-05-21T12:25:55.029062+00:00", "EventTime": "2024-05-21T12:25:55.029083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6kT62LKn38ajyGcd"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "054f1830-cd16-487d-b713-56bec04b8a1c", "DetectTime": "2024-05-21T12:25:55.034249+00:00", "EventTime": "2024-05-21T12:25:55.034272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYC9zt46zzi04d8IJ2"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f1c4376c-52ff-4d7a-98e5-ea5d599f23ec", "DetectTime": "2024-05-21T12:25:55.079445+00:00", "EventTime": "2024-05-21T12:25:55.079477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqxCK1yV62kYU74mc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 20} +{"Format": "IDEA0", "ID": "25e4cc26-8e15-4f86-89cc-4f37e6512b3c", "DetectTime": "2024-05-21T12:25:55.104939+00:00", "EventTime": "2024-05-21T12:25:55.104959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUeI13zgKk90X8b99"], "accumulated_threat_level": 10.900000000000002, "timewindow": 20} +{"Format": "IDEA0", "ID": "d1666351-fe7b-4e9e-aeaa-74f0eafde50c", "DetectTime": "2024-05-21T12:25:55.112906+00:00", "EventTime": "2024-05-21T12:25:55.112924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKv12RmkMPav9Ehl"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "b3b038c7-9d26-420c-b46a-e44e1eb6972b", "DetectTime": "2024-05-21T12:25:55.150720+00:00", "EventTime": "2024-05-21T12:25:55.150742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI74Ho1FycibeytTwg"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "b53dac5c-062a-4e17-8844-eb265f27895c", "DetectTime": "2024-05-21T12:25:55.245543+00:00", "EventTime": "2024-05-21T12:25:55.245578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHsIj1mr7P4eBfbIa"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "ed72bed4-9e63-4ea7-8856-4fa02c98b9f6", "DetectTime": "2024-05-21T12:25:55.431943+00:00", "EventTime": "2024-05-21T12:25:55.431965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0CBYy4wXQIh5FGZcd"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "0c945d9a-40d7-4ec4-b150-0d2e4a878a40", "DetectTime": "2024-05-21T12:25:55.468263+00:00", "EventTime": "2024-05-21T12:25:55.468281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVR6By1r3hdvI3tkT5"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "63701e82-fd27-46df-859d-cc8b6d1ba4d8", "DetectTime": "2024-05-21T12:25:55.485191+00:00", "EventTime": "2024-05-21T12:25:55.485212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnepm1P3aLmIYB3Ii"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "670aecd7-ce0b-4e0e-beb6-85401552508f", "DetectTime": "2024-05-21T12:25:55.530526+00:00", "EventTime": "2024-05-21T12:25:55.530544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqKHi171s9UQ8ImMd"], "accumulated_threat_level": 11.700000000000003, "timewindow": 20} +{"Format": "IDEA0", "ID": "96638048-0f5e-4e26-8376-2d1cfbe98b0e", "DetectTime": "2024-05-21T12:25:55.730631+00:00", "EventTime": "2024-05-21T12:25:55.730653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWzEV2sXLHecs6Su4"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "aef74f49-e4fe-446d-a069-bb526972548a", "DetectTime": "2024-05-21T12:25:55.809990+00:00", "EventTime": "2024-05-21T12:25:55.810012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz5wEi3d1MqkvmgABi"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "0ec5655c-477d-4fb2-af4e-fd0caabd9506", "DetectTime": "2024-05-21T12:25:55.927002+00:00", "EventTime": "2024-05-21T12:25:55.927021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmm7iV26Zd9d3m6EX2"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "854cc9ef-957c-47c9-9d4d-5dfb815a708e", "DetectTime": "2024-05-21T12:25:55.938760+00:00", "EventTime": "2024-05-21T12:25:55.938779+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmm7iV26Zd9d3m6EX2"], "accumulated_threat_level": 10.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "67dfbb6c-ba9a-4fab-a7e5-eed2b2db4d1a", "DetectTime": "2024-05-21T12:25:55.997145+00:00", "EventTime": "2024-05-21T12:25:55.997167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWbRe6zyphIqsvBl"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "25015cee-484a-4e75-9b03-d233fb217056", "DetectTime": "2024-05-21T12:25:56.018845+00:00", "EventTime": "2024-05-21T12:25:56.018862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLSb4t4g70T3G7LKse"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "b952dc63-fcf0-4e08-8959-1ce70a61ff0f", "DetectTime": "2024-05-21T12:25:56.146115+00:00", "EventTime": "2024-05-21T12:25:56.146132+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhUvy26mdFDh26hBl"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "8a87393c-2268-41e7-b9df-96a0f0f70142", "DetectTime": "2024-05-21T12:25:56.157941+00:00", "EventTime": "2024-05-21T12:25:56.157958+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhUvy26mdFDh26hBl"], "accumulated_threat_level": 10.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "97693ce8-77a2-4f03-a69f-e30355ddf201", "DetectTime": "2024-05-21T12:25:56.283302+00:00", "EventTime": "2024-05-21T12:25:56.283325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzO9Fp4CS7qPQ0xwxa"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "b7e48a99-698d-4b0e-bc2e-8251b57652e5", "DetectTime": "2024-05-21T12:25:56.307389+00:00", "EventTime": "2024-05-21T12:25:56.307410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C898yZ1FOpRsoXqBwb"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "0f9abb94-f8f8-4dd1-b958-452b30faa614", "DetectTime": "2024-05-21T12:25:56.336544+00:00", "EventTime": "2024-05-21T12:25:56.336565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPYa23cOehCRgS7g3", "CAuk9c1OqFtuP8Y0Vf", "C0sTdy4Fu5vjJMJqY7", "C8YS294JhJvh3FSlak"], "accumulated_threat_level": 12.200000000000003, "timewindow": 20} +{"Format": "Json", "ID": "0f9abb94-f8f8-4dd1-b958-452b30faa614", "DetectTime": "2024-05-21T12:25:56.336544+00:00", "EventTime": "2024-05-21T12:25:56.336565+00:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "1970-01-01T19:46:30.203749+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:25:56.708479)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "4148bb67-699a-4061-95fb-28dcf9a8c53c", "DetectTime": "2024-05-21T12:25:56.718882+00:00", "EventTime": "2024-05-21T12:25:56.718901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgA1BF2Tnu7iCkDyOd"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "38ecaa06-485d-499c-ac7f-a3562958370c", "DetectTime": "2024-05-21T12:25:56.723278+00:00", "EventTime": "2024-05-21T12:25:56.723297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHsEpYsKXREq4QgMk"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "342b5e73-c257-41f2-8dd6-80b480b425b5", "DetectTime": "2024-05-21T12:25:56.734586+00:00", "EventTime": "2024-05-21T12:25:56.734604+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV6Ca3pkW5qFHsoe7"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "f33019a6-73e0-4501-acc5-acfb3b12a569", "DetectTime": "2024-05-21T12:25:56.746534+00:00", "EventTime": "2024-05-21T12:25:56.746552+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV6Ca3pkW5qFHsoe7"], "accumulated_threat_level": 11.1, "timewindow": 12} +{"Format": "IDEA0", "ID": "4c20ea87-8964-44f2-9a2e-61d96732a95c", "DetectTime": "2024-05-21T12:25:56.751142+00:00", "EventTime": "2024-05-21T12:25:56.751161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKiVY3f1V4xDtjzRj"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "1af36909-e367-4d1c-a236-7ac46c29539e", "DetectTime": "2024-05-21T12:25:56.762695+00:00", "EventTime": "2024-05-21T12:25:56.762712+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAG5y2r8xh1XpjFAk"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "e0964b9e-f358-4f10-9eea-8b59339e3e8d", "DetectTime": "2024-05-21T12:25:56.773590+00:00", "EventTime": "2024-05-21T12:25:56.773607+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAG5y2r8xh1XpjFAk"], "accumulated_threat_level": 11.6, "timewindow": 12} +{"Format": "IDEA0", "ID": "baaf84c1-f922-4cae-a36c-7c8596b8f659", "DetectTime": "2024-05-21T12:25:56.784850+00:00", "EventTime": "2024-05-21T12:25:56.784868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.162.252.216"]}], "Attach": [{"Content": "Connection to unknown destination port 5281/UDP destination IP 68.162.252.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxyNRC156tDYmyKJoj"], "accumulated_threat_level": 0.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "bd81fbda-292a-4ace-998d-c4e19684cba0", "DetectTime": "2024-05-21T12:25:56.789806+00:00", "EventTime": "2024-05-21T12:25:56.789824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGutFT3knuk1IsqAXa"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "20f3bdf6-4355-4ac1-b078-e64da0964da6", "DetectTime": "2024-05-21T12:25:56.794199+00:00", "EventTime": "2024-05-21T12:25:56.794216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnR8LM1IQjrjkBVNCi"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "d7af2e2c-3e65-4b64-8fe0-2207ae3b523e", "DetectTime": "2024-05-21T12:25:56.798825+00:00", "EventTime": "2024-05-21T12:25:56.798844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iXCt26d0mpfUCvXg"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "56fb2619-00ce-4f67-ba51-580ae2d085e2", "DetectTime": "2024-05-21T12:25:56.808364+00:00", "EventTime": "2024-05-21T12:25:56.808382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUg1MO1gIeTWczF1C6"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f68f56e3-43a1-4fe4-a257-ef473fd3c1a9", "DetectTime": "2024-05-21T12:25:56.812619+00:00", "EventTime": "2024-05-21T12:25:56.812637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtrCorb4fDJFWvGg"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "df7f9736-5577-4d9c-90a9-efa5bdc21a41", "DetectTime": "2024-05-21T12:25:56.842511+00:00", "EventTime": "2024-05-21T12:25:56.842531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMSAq2F30hT0Ol8k1"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "c201fbca-eb23-4fa4-8879-fa63a478a64d", "DetectTime": "2024-05-21T12:25:57.056337+00:00", "EventTime": "2024-05-21T12:25:57.056357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdF98C4w51SobkHnRb"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f21068dd-3dbb-4f56-bb15-6bf25c40f1d1", "DetectTime": "2024-05-21T12:25:57.060969+00:00", "EventTime": "2024-05-21T12:25:57.060987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvAoU2hsCixYuDCYl"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "6cfbf242-9914-4657-a583-215af9436b74", "DetectTime": "2024-05-21T12:25:57.080648+00:00", "EventTime": "2024-05-21T12:25:57.080666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNXfl1PaUMPAzvyRj"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "772cec15-457d-4952-b876-64064f0632fd", "DetectTime": "2024-05-21T12:25:57.127901+00:00", "EventTime": "2024-05-21T12:25:57.127920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WtX732ETcElRg9T5"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "a70ffcbd-2f9a-4368-b2cc-4690fee81adf", "DetectTime": "2024-05-21T12:25:57.450578+00:00", "EventTime": "2024-05-21T12:25:57.450601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAd4Vn4wg3vYz1ymE3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "cedb11ba-c278-40b3-8632-8fd71d483ab0", "DetectTime": "2024-05-21T12:25:57.515263+00:00", "EventTime": "2024-05-21T12:25:57.515281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptwNF4wDVYR3fPzKe"], "accumulated_threat_level": 1.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "d14de389-4ceb-4a38-beb1-32b1889ffc7d", "DetectTime": "2024-05-21T12:25:57.661313+00:00", "EventTime": "2024-05-21T12:25:57.661336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GgrL2t0UuKKDiqwg", "CCWh28MyZiMKICpAa", "CuwmYH1x8bYGkKwvPe", "CSdo3o2ZfoYu8l0F84"], "accumulated_threat_level": 2.1, "timewindow": 20} +{"Format": "IDEA0", "ID": "d6ac05fe-c723-4596-8934-dff42c09cf5b", "DetectTime": "2024-05-21T12:25:57.755454+00:00", "EventTime": "2024-05-21T12:25:57.755473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4S4q2RZSdKtBQTo1"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 20} +{"Format": "IDEA0", "ID": "1c620e38-032e-40f4-8cfb-d960ec53f73f", "DetectTime": "2024-05-21T12:25:57.791211+00:00", "EventTime": "2024-05-21T12:25:57.791231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEhwW1UyDXIic5b48"], "accumulated_threat_level": 3.7, "timewindow": 20} +{"Format": "IDEA0", "ID": "975abb3a-060e-42dc-ab85-158867bdb874", "DetectTime": "2024-05-21T12:25:57.815045+00:00", "EventTime": "2024-05-21T12:25:57.815064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTZgkb4VOteDjTF4R2"], "accumulated_threat_level": 4.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "476b1d67-1cb7-4065-9091-c2c2be52972d", "DetectTime": "2024-05-21T12:25:57.852132+00:00", "EventTime": "2024-05-21T12:25:57.852154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zmkg4Rrs8TjLAIw5"], "accumulated_threat_level": 5.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "52ca8250-d44c-4fba-b3c2-9b3576ee7f39", "DetectTime": "2024-05-21T12:25:57.878721+00:00", "EventTime": "2024-05-21T12:25:57.878744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTX5Dw1XhcLoB0kXT9"], "accumulated_threat_level": 6.1, "timewindow": 20} +{"Format": "IDEA0", "ID": "4ac688c7-a7d9-489c-a0da-9a4132677aea", "DetectTime": "2024-05-21T12:25:57.944841+00:00", "EventTime": "2024-05-21T12:25:57.944862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.240.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4304/UDP destination IP 94.240.240.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6sP0vmVCIfDJpICc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 20} +{"Format": "IDEA0", "ID": "6c95af79-048e-41d4-b707-328d7840b894", "DetectTime": "2024-05-21T12:25:57.967853+00:00", "EventTime": "2024-05-21T12:25:57.967874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.49.114.244 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvMgw18p6nCVpsuU8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "dff4574b-1e36-440c-a886-d48d3af7030f", "DetectTime": "2024-05-21T12:25:57.998371+00:00", "EventTime": "2024-05-21T12:25:57.998391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFzASqDQUeXDs0Uca"], "accumulated_threat_level": 7.699999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ada60ad9-30df-4719-9ed6-b5e536ebe055", "DetectTime": "2024-05-21T12:25:58.022369+00:00", "EventTime": "2024-05-21T12:25:58.022389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2AVL1uG5bQqI5U2"], "accumulated_threat_level": 8.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "74c5aa21-ce99-4450-b561-0c05b2b32995", "DetectTime": "2024-05-21T12:25:58.039295+00:00", "EventTime": "2024-05-21T12:25:58.039314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQqnrznY8UQjl9P4"], "accumulated_threat_level": 9.3, "timewindow": 20} +{"Format": "IDEA0", "ID": "a5f5fbc5-b9fa-46ed-bb9f-d6f435f1b456", "DetectTime": "2024-05-21T12:25:58.064558+00:00", "EventTime": "2024-05-21T12:25:58.064576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKsAQQkPlOWTOIU2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 20} +{"Format": "IDEA0", "ID": "a5a416a8-9810-446f-b541-11db2a78aeb2", "DetectTime": "2024-05-21T12:25:58.104647+00:00", "EventTime": "2024-05-21T12:25:58.104667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMuir32TCFyrHVjyIh"], "accumulated_threat_level": 10.900000000000002, "timewindow": 20} +{"Format": "IDEA0", "ID": "7b1bfb83-0836-4031-b315-6e2fae973d0a", "DetectTime": "2024-05-21T12:25:58.207138+00:00", "EventTime": "2024-05-21T12:25:58.207156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4RJ1W3kWSaTiBpowk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 20} +{"Format": "IDEA0", "ID": "da296ace-ad64-48eb-8f03-006545e60ce8", "DetectTime": "2024-05-21T12:25:58.233354+00:00", "EventTime": "2024-05-21T12:25:58.233373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.59.131.0 AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmI0EZ303dnqTLKf6f"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3f54bf45-3fde-4d26-a54d-02c956c899af", "DetectTime": "2024-05-21T12:25:58.262018+00:00", "EventTime": "2024-05-21T12:25:58.262037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXdtInLpVN52drl6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 20} +{"Format": "Json", "ID": "3f54bf45-3fde-4d26-a54d-02c956c899af", "DetectTime": "2024-05-21T12:25:58.262018+00:00", "EventTime": "2024-05-21T12:25:58.262037+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "1970-01-01T19:47:06.484804+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:25:58.482740)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "f7d3bec8-9d1b-4420-8ef2-0fc14c8b4f5a", "DetectTime": "2024-05-21T12:25:58.493439+00:00", "EventTime": "2024-05-21T12:25:58.493457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT13ms4hv52EUVT3i"], "accumulated_threat_level": 0.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "ad857f19-bb0c-478c-ad81-539dd7aa52b8", "DetectTime": "2024-05-21T12:25:58.503237+00:00", "EventTime": "2024-05-21T12:25:58.503256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn3MDbGbZYnQ3qExk"], "accumulated_threat_level": 1.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "f6f3f18f-9ff3-4f94-aeb3-889c481071f8", "DetectTime": "2024-05-21T12:25:58.518713+00:00", "EventTime": "2024-05-21T12:25:58.518730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKxuw4M1yuOQbrqwc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 20} +{"Format": "IDEA0", "ID": "7c590d2b-8b95-456f-be5c-ff62e4d5371d", "DetectTime": "2024-05-21T12:25:58.523483+00:00", "EventTime": "2024-05-21T12:25:58.523511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHvlB525e7SbqelQVg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c5729dba-2570-473b-ad67-8a93e83855d2", "DetectTime": "2024-05-21T12:25:58.528260+00:00", "EventTime": "2024-05-21T12:25:58.528279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.93.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVws21gUwjHOy9YH3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0c3882fb-f242-4c0a-860a-a85a8945bc7d", "DetectTime": "2024-05-21T12:25:58.539792+00:00", "EventTime": "2024-05-21T12:25:58.539810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCvC8iR89Gf3gpE6"], "accumulated_threat_level": 3.2, "timewindow": 20} +{"Format": "IDEA0", "ID": "9d3e4976-d86b-4591-ac29-6e7d02e5412f", "DetectTime": "2024-05-21T12:25:58.549643+00:00", "EventTime": "2024-05-21T12:25:58.549661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ocAIAEoOwMF6mGi"], "accumulated_threat_level": 4.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "fb47021b-47c4-4504-b0d7-3042a93cfa5b", "DetectTime": "2024-05-21T12:25:58.573115+00:00", "EventTime": "2024-05-21T12:25:58.573136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY58nh4PbCmBt8g46d"], "accumulated_threat_level": 4.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "4d2333de-30cd-48a1-b29f-982d6219ba65", "DetectTime": "2024-05-21T12:25:58.613059+00:00", "EventTime": "2024-05-21T12:25:58.613079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRFkh2qEEJObbkQ91"], "accumulated_threat_level": 5.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "b381146d-b375-4a8b-820a-05671fade319", "DetectTime": "2024-05-21T12:25:58.622910+00:00", "EventTime": "2024-05-21T12:25:58.622928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.152.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck957d297RJBuoHnqd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "01375489-a84b-4450-b1f0-ac2577d1c480", "DetectTime": "2024-05-21T12:25:58.651106+00:00", "EventTime": "2024-05-21T12:25:58.651125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xWSp4cpXhp87Y898"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 20} +{"Format": "IDEA0", "ID": "7ef9f764-d92e-403f-886b-fc5dadf33759", "DetectTime": "2024-05-21T12:25:58.675443+00:00", "EventTime": "2024-05-21T12:25:58.675467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6UqtxaSym4EY8Dl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c3d6b575-b838-498b-acdf-8a6d42451618", "DetectTime": "2024-05-21T12:25:58.921253+00:00", "EventTime": "2024-05-21T12:25:58.921276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.138.111 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbVnn73YObGBI5E2T6"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "7809d4d8-7884-4bfe-a059-987f2d588c9f", "DetectTime": "2024-05-21T12:25:58.942544+00:00", "EventTime": "2024-05-21T12:25:58.942565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoVm54psuiOyJsQ95"], "accumulated_threat_level": 7.999999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c4391a2a-04b2-47d5-8e20-4cc63c10b8b9", "DetectTime": "2024-05-21T12:25:58.967369+00:00", "EventTime": "2024-05-21T12:25:58.967387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGm6Uw398an8f7KKyj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "9f49493b-e1d5-432a-b3f2-f2c70142ef85", "DetectTime": "2024-05-21T12:25:58.989637+00:00", "EventTime": "2024-05-21T12:25:58.989654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPlb9Lj5We3CdJpYg"], "accumulated_threat_level": 9.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "07fd5a5f-b5f7-4c73-a955-92655306ebd7", "DetectTime": "2024-05-21T12:25:59.013040+00:00", "EventTime": "2024-05-21T12:25:59.013064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRYPXb4HnQPpxOaOo7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "1ab550b4-51c0-4a7f-95df-c902c5fa1519", "DetectTime": "2024-05-21T12:25:59.023787+00:00", "EventTime": "2024-05-21T12:25:59.023806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce4BQj2uuG6vI1yLQ8"], "accumulated_threat_level": 10.4, "timewindow": 20} +{"Format": "IDEA0", "ID": "07c275ae-49f7-4407-99a3-ceef329572a1", "DetectTime": "2024-05-21T12:25:59.045384+00:00", "EventTime": "2024-05-21T12:25:59.045405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.13.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMazwNbNUcxj7OCc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b9212f6f-901d-42b7-af23-bc9f3d9ef4f7", "DetectTime": "2024-05-21T12:25:59.064372+00:00", "EventTime": "2024-05-21T12:25:59.064394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.238.65.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnhy5M3I58bZW07E2c"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f35eb611-5ee7-45c7-8718-3c29ad2fba02", "DetectTime": "2024-05-21T12:25:59.128766+00:00", "EventTime": "2024-05-21T12:25:59.128783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.11.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNt0OAv1rW3SryRa"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "581669f9-b211-4a49-a642-3e6eaf0555e9", "DetectTime": "2024-05-21T12:25:59.220112+00:00", "EventTime": "2024-05-21T12:25:59.220133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.226.114.217 AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Uiv4FIzKAraHXV5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ad518ee6-6509-4387-9c57-5551849d314c", "DetectTime": "2024-05-21T12:25:59.318810+00:00", "EventTime": "2024-05-21T12:25:59.318828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKPjU1O7NrSHSYxtd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 20} +{"Format": "IDEA0", "ID": "accfbb89-465c-4b44-a671-daeb7200bd00", "DetectTime": "2024-05-21T12:25:59.323527+00:00", "EventTime": "2024-05-21T12:25:59.323544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.24.145.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy8QL1gVGcuNQPqR2"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "24cdf312-0195-455b-bd02-10d6d6c5397d", "DetectTime": "2024-05-21T12:25:59.340360+00:00", "EventTime": "2024-05-21T12:25:59.340382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.35.154.174 AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it, IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBdy24JqTkgBwrsz6"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "68c6c284-12d6-4ed4-85f8-c7fe5fe4dd3f", "DetectTime": "2024-05-21T12:25:59.357410+00:00", "EventTime": "2024-05-21T12:25:59.357460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.147.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KSvY3ZdjyPag260g"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "7c85071b-3748-449b-b55b-7178a515910e", "DetectTime": "2024-05-21T12:25:59.374763+00:00", "EventTime": "2024-05-21T12:25:59.374784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.219.135.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEB167ddZUYjLWgn"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "753fa610-1eef-4ea2-9076-77b3d8ce73e7", "DetectTime": "2024-05-21T12:25:59.395329+00:00", "EventTime": "2024-05-21T12:25:59.395347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfefO1mWewMlqdY7k"], "accumulated_threat_level": 12.000000000000002, "timewindow": 20} +{"Format": "Json", "ID": "753fa610-1eef-4ea2-9076-77b3d8ce73e7", "DetectTime": "2024-05-21T12:25:59.395329+00:00", "EventTime": "2024-05-21T12:25:59.395347+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "1970-01-01T19:47:25.609163+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:25:59.631786)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1ccfcb2f-35c2-49d2-9f9a-30adc8adb0f6", "DetectTime": "2024-05-21T12:25:59.635527+00:00", "EventTime": "2024-05-21T12:25:59.635544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.202.83.105 AS: CANTV Servicios, Venezuela, VE AS8048 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNi7GZ3DI6d4pB4sck"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "966f2398-e976-47c2-8fd2-b1fb694b5fa1", "DetectTime": "2024-05-21T12:25:59.646753+00:00", "EventTime": "2024-05-21T12:25:59.646773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxOvb4jbYWCRAMfc2"], "accumulated_threat_level": 0.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "46e6a4d6-b85d-440d-ab6c-1fd392bd4ae9", "DetectTime": "2024-05-21T12:25:59.651762+00:00", "EventTime": "2024-05-21T12:25:59.651782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.132.237.117 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldSao4SCF7kgQqZle"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "d39244ab-2e3f-4f45-b099-36d98571f9ca", "DetectTime": "2024-05-21T12:25:59.663868+00:00", "EventTime": "2024-05-21T12:25:59.663889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLK7G1pOGEeVxsWOk"], "accumulated_threat_level": 1.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "599d97f4-a9eb-4735-bf09-476cf06ac0cb", "DetectTime": "2024-05-21T12:25:59.674942+00:00", "EventTime": "2024-05-21T12:25:59.674960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP3W2n1aq411XxOzv9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 20} +{"Format": "IDEA0", "ID": "4d0b3c06-e611-4297-be85-a12e23de1dbf", "DetectTime": "2024-05-21T12:25:59.679693+00:00", "EventTime": "2024-05-21T12:25:59.679712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.204.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0zgL1BDPs5PJys9l"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a0d7605e-e0ba-4705-af01-669e94237580", "DetectTime": "2024-05-21T12:25:59.684268+00:00", "EventTime": "2024-05-21T12:25:59.684287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0l0fu1vcUz8oFodW2"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f2cc4b72-53b2-4e61-8deb-fe195499eebd", "DetectTime": "2024-05-21T12:25:59.695174+00:00", "EventTime": "2024-05-21T12:25:59.695195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmNMv447Omn68uFC4"], "accumulated_threat_level": 3.2, "timewindow": 20} +{"Format": "IDEA0", "ID": "e4fe16e8-ae2d-4974-9196-0da291253c2b", "DetectTime": "2024-05-21T12:25:59.701736+00:00", "EventTime": "2024-05-21T12:25:59.701757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.136.115.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPokWl2x36I8IfeB6l"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "eb2b4a57-37db-4b8e-b00a-cb738c531052", "DetectTime": "2024-05-21T12:25:59.714479+00:00", "EventTime": "2024-05-21T12:25:59.714498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coxxeo4uqsrjl6U53d"], "accumulated_threat_level": 4.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "fb831a64-b691-4322-88af-fe2ec4225153", "DetectTime": "2024-05-21T12:25:59.724849+00:00", "EventTime": "2024-05-21T12:25:59.724867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdKyC41GRozHFHRxW4"], "accumulated_threat_level": 4.8, "timewindow": 20} +{"Format": "IDEA0", "ID": "4790421c-5b53-4ca7-a9c4-25087a9e3121", "DetectTime": "2024-05-21T12:25:59.729887+00:00", "EventTime": "2024-05-21T12:25:59.729906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDeJZn4batoNMnvUZ3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "4b8a8683-f86f-4c3c-a6ea-f4a18cd9fd82", "DetectTime": "2024-05-21T12:25:59.741119+00:00", "EventTime": "2024-05-21T12:25:59.741138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9BhzPjVkA0IottHf"], "accumulated_threat_level": 5.6, "timewindow": 20} +{"Format": "IDEA0", "ID": "057097e0-ce61-4a4c-a202-7de81441a56d", "DetectTime": "2024-05-21T12:25:59.745685+00:00", "EventTime": "2024-05-21T12:25:59.745704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWuJr3tYLKtGubWmc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c030e4ba-eb11-4dac-980f-aa5ef0b0b52e", "DetectTime": "2024-05-21T12:25:59.755903+00:00", "EventTime": "2024-05-21T12:25:59.755924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKel43Rnc6c9eysya"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 20} +{"Format": "IDEA0", "ID": "8873d4c3-b327-408a-9b19-f34ce9938cc1", "DetectTime": "2024-05-21T12:25:59.767213+00:00", "EventTime": "2024-05-21T12:25:59.767232+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVENRI2hQqnwxVxkW4"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "3361cc8f-dcc6-4aa6-8a06-cfba5249bc71", "DetectTime": "2024-05-21T12:25:59.779711+00:00", "EventTime": "2024-05-21T12:25:59.779732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVENRI2hQqnwxVxkW4"], "accumulated_threat_level": 12.1, "timewindow": 12} +{"Format": "Json", "ID": "3361cc8f-dcc6-4aa6-8a06-cfba5249bc71", "DetectTime": "2024-05-21T12:25:59.779711+00:00", "EventTime": "2024-05-21T12:25:59.779732+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "1970-01-01T11:23:42.766225+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2024/05/21 12:26:00.370719)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 12, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "58090766-ae8c-4cf5-95f0-e374e947be82", "DetectTime": "2024-05-21T12:26:00.380933+00:00", "EventTime": "2024-05-21T12:26:00.380952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9dja1ObymZY7oIjh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "29bac97b-1a4c-460c-a6fa-97a416153246", "DetectTime": "2024-05-21T12:26:00.385433+00:00", "EventTime": "2024-05-21T12:26:00.385452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHoI71wWAjF7tYXag"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b2da74eb-9171-4b47-9920-9852a13d5ace", "DetectTime": "2024-05-21T12:26:00.394898+00:00", "EventTime": "2024-05-21T12:26:00.394916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8gwR2r9wgq90S3cj"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "564bcd3b-82ea-4274-95e1-0ee7eb2ab04f", "DetectTime": "2024-05-21T12:26:00.399293+00:00", "EventTime": "2024-05-21T12:26:00.399312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8vzxf44WqZ91g86d8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "4fbd71b1-4ba1-461c-abb5-b5b3150b2445", "DetectTime": "2024-05-21T12:26:00.409804+00:00", "EventTime": "2024-05-21T12:26:00.409823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCEbU3EIhG62PhId6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ce9b683f-6131-4797-b074-834a2e05a864", "DetectTime": "2024-05-21T12:26:00.421527+00:00", "EventTime": "2024-05-21T12:26:00.421543+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU7JAPGNJvuBdqQk"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "7436e28f-ef32-4783-96ff-a3fbac0e3c5d", "DetectTime": "2024-05-21T12:26:00.433666+00:00", "EventTime": "2024-05-21T12:26:00.433684+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU7JAPGNJvuBdqQk"], "accumulated_threat_level": 0.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "6e0b973a-9d7a-4e25-908b-316a9e8d560f", "DetectTime": "2024-05-21T12:26:00.443218+00:00", "EventTime": "2024-05-21T12:26:00.443237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKMn01eGm6kOttQ82"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "31617824-4227-4801-9bdd-1eb188dc3544", "DetectTime": "2024-05-21T12:26:00.447550+00:00", "EventTime": "2024-05-21T12:26:00.447568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsCXxq1cd8AVE8jLeg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6c0f9743-c07e-4800-b071-bbfc36f9c2ec", "DetectTime": "2024-05-21T12:26:00.452187+00:00", "EventTime": "2024-05-21T12:26:00.452205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yXwK3ajb3S5jlenk"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "e4a2a511-1116-43c4-a8cf-f4be31eb5d28", "DetectTime": "2024-05-21T12:26:00.456492+00:00", "EventTime": "2024-05-21T12:26:00.456510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNakOBTcpmTHipfT9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ba3cd825-8bee-4879-b8d9-c0e68abcfc87", "DetectTime": "2024-05-21T12:26:00.461158+00:00", "EventTime": "2024-05-21T12:26:00.461177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5amw3XcEoPL6vVd7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "efce84ca-2bf5-4cc0-9d61-82b46395e598", "DetectTime": "2024-05-21T12:26:00.465911+00:00", "EventTime": "2024-05-21T12:26:00.465933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6D62m3UYYIzQRQvR8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "8d87125e-6c15-4814-bacf-b99c408f1548", "DetectTime": "2024-05-21T12:26:00.471318+00:00", "EventTime": "2024-05-21T12:26:00.471337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.36.77.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGNS54bXZ9A7yW5s1"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9b1d349e-9dc4-448f-9c2f-64dcfde6ff99", "DetectTime": "2024-05-21T12:26:00.475797+00:00", "EventTime": "2024-05-21T12:26:00.475816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.59.76.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C304D32RNFzpbZsbZi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "7c08320d-4d27-4753-a124-3d699b627e8c", "DetectTime": "2024-05-21T12:26:00.480437+00:00", "EventTime": "2024-05-21T12:26:00.480456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.230.122.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PYsljH5sc8LCy21"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "260c6f4b-b142-4237-83a7-4cb92da975ca", "DetectTime": "2024-05-21T12:26:00.488170+00:00", "EventTime": "2024-05-21T12:26:00.488191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.78.204.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqIzq3ZkyWLb2N7za"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "eb38f82d-71e9-4086-9765-1dda5f37f2d0", "DetectTime": "2024-05-21T12:26:00.492927+00:00", "EventTime": "2024-05-21T12:26:00.492947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.21.76.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGZ8Xk4ON94AEjhO98"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f4331863-4678-4c4f-9438-26e74ce2b75c", "DetectTime": "2024-05-21T12:26:00.497575+00:00", "EventTime": "2024-05-21T12:26:00.497594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.35.134.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpD1lV22BrX1ctzKsl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a68eada2-ab91-43b6-ad98-35288d369c67", "DetectTime": "2024-05-21T12:26:00.502245+00:00", "EventTime": "2024-05-21T12:26:00.502264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.57.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUvxFptind1QmAy"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "8ece8f35-63de-4d23-b939-2d78d88ea44d", "DetectTime": "2024-05-21T12:26:00.506808+00:00", "EventTime": "2024-05-21T12:26:00.506827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLdwVFzIebCgIpoY2"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "67eb4e10-4d71-4169-b283-bf9cd5d8a1d0", "DetectTime": "2024-05-21T12:26:00.518642+00:00", "EventTime": "2024-05-21T12:26:00.518663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApUaf4C0gZyeesCCb"], "accumulated_threat_level": 0.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "f17ef614-fc62-4550-9952-902639dab067", "DetectTime": "2024-05-21T12:26:00.523233+00:00", "EventTime": "2024-05-21T12:26:00.523251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.162.118.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtOwR1Ne3jca13eDi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6b3e726f-c84f-4cc4-8856-320cb05cd278", "DetectTime": "2024-05-21T12:26:00.601639+00:00", "EventTime": "2024-05-21T12:26:00.601658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.92.13.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HGM54di5FMUbpNc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "fb725318-4a31-4b07-9409-2ab57aacac8d", "DetectTime": "2024-05-21T12:26:00.732373+00:00", "EventTime": "2024-05-21T12:26:00.732394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBfJz1SlhDVniQDh7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "95c0ac74-caf9-4724-96c8-6df5e335e94c", "DetectTime": "2024-05-21T12:26:00.749371+00:00", "EventTime": "2024-05-21T12:26:00.749393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.55.197.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQhWiN3rDKw6eZqrF9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "afaca7c6-0596-43aa-8e5e-6abafd772d79", "DetectTime": "2024-05-21T12:26:00.774385+00:00", "EventTime": "2024-05-21T12:26:00.774417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.100.38.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx647zfgL7HIfKaQl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "140650e2-417d-4398-a321-108207b46c52", "DetectTime": "2024-05-21T12:26:00.779020+00:00", "EventTime": "2024-05-21T12:26:00.779042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.85.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKpVn2XXgCt0fR3i7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b24cbdd9-66de-49f3-80e4-74143e281ce4", "DetectTime": "2024-05-21T12:26:00.802735+00:00", "EventTime": "2024-05-21T12:26:00.802756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.70.36.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTolwh1wosQcMqOUeg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c6ab86bb-8024-4adf-b3de-13c4e94a8f40", "DetectTime": "2024-05-21T12:26:00.825055+00:00", "EventTime": "2024-05-21T12:26:00.825076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.233.236.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtlUF3vLdHQE7X6ok"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b725d1e4-ad67-4a91-8b46-61573c169bc0", "DetectTime": "2024-05-21T12:26:00.843728+00:00", "EventTime": "2024-05-21T12:26:00.843748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.67.185.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDU752V9pN5qg8qPa"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "cf986ece-9095-4c59-9847-d69df4295594", "DetectTime": "2024-05-21T12:26:00.871496+00:00", "EventTime": "2024-05-21T12:26:00.871518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 209.12.192.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5qyu4iqllJDCoUF5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "e9e48d4c-0f31-486d-bf79-c4bbe0351002", "DetectTime": "2024-05-21T12:26:00.890948+00:00", "EventTime": "2024-05-21T12:26:00.890969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.21.61.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7TuCb8r6X1nBlZc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3884bf2c-62ae-49c7-8a08-331eacca0236", "DetectTime": "2024-05-21T12:26:00.925861+00:00", "EventTime": "2024-05-21T12:26:00.925883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.200.223.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeCZoC3PTr3ULIGVcl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "4ec5d63c-bd58-4cdf-b728-251c4b3f887e", "DetectTime": "2024-05-21T12:26:01.006473+00:00", "EventTime": "2024-05-21T12:26:01.006495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwo5Gjg3XEKA5TFp", "CnGk6G4rOLVFeZqw6a", "CfltGYbJfa8aEwyXe", "Ct9cN630RZpxJBSrN1"], "accumulated_threat_level": 1.3, "timewindow": 21} +{"Format": "IDEA0", "ID": "fe3a0399-b484-4f0f-9fa4-a1348c36614b", "DetectTime": "2024-05-21T12:26:01.011771+00:00", "EventTime": "2024-05-21T12:26:01.011792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.137.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUvmcJK6Bg9eCi0b"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "d35d836f-9bbb-43a0-b1b3-7de8090b09ee", "DetectTime": "2024-05-21T12:26:01.041398+00:00", "EventTime": "2024-05-21T12:26:01.041419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.241.115.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdyKwTMJAwMIk5iW4"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "e43a03c8-cab3-4cf7-bbd6-1ee1dbfe2ca2", "DetectTime": "2024-05-21T12:26:01.067305+00:00", "EventTime": "2024-05-21T12:26:01.067328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.10.166.23 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6axAP1Ri8dTg8GJte"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c3121a10-4c8f-45be-8e65-d239f50e3ed6", "DetectTime": "2024-05-21T12:26:01.104842+00:00", "EventTime": "2024-05-21T12:26:01.104864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.54.105.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUpAJ15ervykYIOd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0947b42e-cb00-4a32-8bcf-2b0642005481", "DetectTime": "2024-05-21T12:26:01.115653+00:00", "EventTime": "2024-05-21T12:26:01.115671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgby541o7GmgPsbSUd"], "accumulated_threat_level": 2.1, "timewindow": 21} +{"Format": "IDEA0", "ID": "c7af638a-c2b8-4e90-bdf7-a199a4330e01", "DetectTime": "2024-05-21T12:26:01.134176+00:00", "EventTime": "2024-05-21T12:26:01.134199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.254.232.31 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXDvw2V6os7UTClJ"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f531ad02-756a-4225-a79a-a7c0f32ab7da", "DetectTime": "2024-05-21T12:26:01.154240+00:00", "EventTime": "2024-05-21T12:26:01.154258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce3iPz4NtS1cVKyTq8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 21} +{"Format": "IDEA0", "ID": "bddebde6-deea-43cf-bc09-dc2537ca0bc9", "DetectTime": "2024-05-21T12:26:01.444379+00:00", "EventTime": "2024-05-21T12:26:01.444399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWiu5xGsn5SCA1Na"], "accumulated_threat_level": 3.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "cc214aa1-884a-46f2-a37b-86b5c46b5385", "DetectTime": "2024-05-21T12:26:01.481315+00:00", "EventTime": "2024-05-21T12:26:01.481332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuwobp4c2Tb6oEG2Dh"], "accumulated_threat_level": 4.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "52c725f8-7b23-4a49-a717-f7cee78f3357", "DetectTime": "2024-05-21T12:26:01.531745+00:00", "EventTime": "2024-05-21T12:26:01.531764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6b7vn3stYjJkykNV"], "accumulated_threat_level": 5.3, "timewindow": 21} +{"Format": "IDEA0", "ID": "f96e4fbc-f5b3-4ce5-a564-a19d0cc2b07a", "DetectTime": "2024-05-21T12:26:01.567962+00:00", "EventTime": "2024-05-21T12:26:01.567983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZqaM71BRZ0Zl4cKb7"], "accumulated_threat_level": 6.1, "timewindow": 21} +{"Format": "IDEA0", "ID": "240ab281-059a-446a-9f67-1426b3d92785", "DetectTime": "2024-05-21T12:26:01.587147+00:00", "EventTime": "2024-05-21T12:26:01.587168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3N8JkCumgGETgHVg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9b2b92a0-f86e-4c30-8333-3e809b5181b8", "DetectTime": "2024-05-21T12:26:01.607941+00:00", "EventTime": "2024-05-21T12:26:01.607958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCNglt45R6W5VoyDp3"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 21} +{"Format": "IDEA0", "ID": "e15d530d-42e2-423c-a704-12bab5442981", "DetectTime": "2024-05-21T12:26:01.624104+00:00", "EventTime": "2024-05-21T12:26:01.624125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCdhfY16t1Ko4sFGl8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "1cf6b66c-84eb-4568-ad88-b79797f6e37a", "DetectTime": "2024-05-21T12:26:01.644309+00:00", "EventTime": "2024-05-21T12:26:01.644329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2oPGcvHEBZxAA3g"], "accumulated_threat_level": 7.699999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "b214fba3-d3f7-4a78-b049-eaf983c28992", "DetectTime": "2024-05-21T12:26:01.659094+00:00", "EventTime": "2024-05-21T12:26:01.659115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1Jpk2V7JeesoWO1b"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c63020ce-3e17-4da8-8988-01bede4358ca", "DetectTime": "2024-05-21T12:26:01.684315+00:00", "EventTime": "2024-05-21T12:26:01.684337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSg6v2XGGoccwsS55"], "accumulated_threat_level": 8.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "2039db72-53c5-4440-909c-e0a87cb394f4", "DetectTime": "2024-05-21T12:26:01.689010+00:00", "EventTime": "2024-05-21T12:26:01.689028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.59.245.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsjAWGHtxGYPSnXGi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "64d8ec31-564c-4791-847f-c64c90876bac", "DetectTime": "2024-05-21T12:26:02.010375+00:00", "EventTime": "2024-05-21T12:26:02.010394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.107.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4f9Vv4tRUhPfWpeuc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0712d94f-72f1-4440-89e5-79c67ff41d8f", "DetectTime": "2024-05-21T12:26:02.019452+00:00", "EventTime": "2024-05-21T12:26:02.019471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.236.185.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLSLLaibRjFynLIk"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "efe2e978-7355-478b-932c-f349a3329ba2", "DetectTime": "2024-05-21T12:26:02.024456+00:00", "EventTime": "2024-05-21T12:26:02.024475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.49.56.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COt9Ur44FWf7oNAFjd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "22c76b41-2010-474e-8acd-e0a165b7be22", "DetectTime": "2024-05-21T12:26:02.077687+00:00", "EventTime": "2024-05-21T12:26:02.077706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlXjb4cdm870pWGE9"], "accumulated_threat_level": 9.3, "timewindow": 21} +{"Format": "IDEA0", "ID": "a4c286b2-ddca-425c-9051-49311d7a2b43", "DetectTime": "2024-05-21T12:26:02.082310+00:00", "EventTime": "2024-05-21T12:26:02.082328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.37.238 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ilUeVl1w9tzm255"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "d12bc271-e0be-4e5a-8846-b6f5d1ca0272", "DetectTime": "2024-05-21T12:26:02.086918+00:00", "EventTime": "2024-05-21T12:26:02.086937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.55.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C23g4S1Z1lJcVNDht5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "57c0e3d4-d773-4e9d-8e0a-8a1a4253f265", "DetectTime": "2024-05-21T12:26:02.091203+00:00", "EventTime": "2024-05-21T12:26:02.091221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.136.52.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C52tar3suyPk8SKw9l"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9aacccc6-12f7-481e-a51e-a8e7f991980f", "DetectTime": "2024-05-21T12:26:02.114536+00:00", "EventTime": "2024-05-21T12:26:02.114557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.162.252.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgLDDPaqiFMWlLvPa"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "fa191d4b-739d-45e6-af8a-f3155b55411c", "DetectTime": "2024-05-21T12:26:02.119240+00:00", "EventTime": "2024-05-21T12:26:02.119261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.203.227.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTgdB1tq6UuTcuWie"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b4b94c20-0cee-48fe-8346-883f3f1e96c3", "DetectTime": "2024-05-21T12:26:02.124971+00:00", "EventTime": "2024-05-21T12:26:02.124992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.14.192.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgB6GR1CUab6ijmx7k"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3fcc19e2-4789-4ade-8511-5b2c5ab87939", "DetectTime": "2024-05-21T12:26:02.130190+00:00", "EventTime": "2024-05-21T12:26:02.130210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsF252yysjiOOPbBi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "72337263-5e70-43dd-8d93-608db39d215a", "DetectTime": "2024-05-21T12:26:02.135046+00:00", "EventTime": "2024-05-21T12:26:02.135064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYGUM3Fx63w6Pfl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "7e95a82f-1582-44f8-b6f3-01312cbaeaf5", "DetectTime": "2024-05-21T12:26:02.199213+00:00", "EventTime": "2024-05-21T12:26:02.199235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwkPRx6ZxhwyRsl3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "5b5c0b71-61f4-4096-bb44-aa8f4ff4f086", "DetectTime": "2024-05-21T12:26:02.204395+00:00", "EventTime": "2024-05-21T12:26:02.204414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEB4i17Yxsqy1oyo1"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c35fd1ea-4500-4df1-9076-2fb3edfbefa2", "DetectTime": "2024-05-21T12:26:02.263888+00:00", "EventTime": "2024-05-21T12:26:02.263913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQngv93vmWQwRtKjCd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ce1a23f8-adad-4bdc-802d-a6e3b53066bd", "DetectTime": "2024-05-21T12:26:02.268773+00:00", "EventTime": "2024-05-21T12:26:02.268793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMG4m11Bq4Pv2gi9eg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0fdbb75b-98fe-4c0e-9969-77ef4c092f2e", "DetectTime": "2024-05-21T12:26:02.289642+00:00", "EventTime": "2024-05-21T12:26:02.289663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkRH54pw71Zl90Fbl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 21} +{"Format": "IDEA0", "ID": "b042c7a8-e10d-4a93-891b-14a399bf3443", "DetectTime": "2024-05-21T12:26:02.295243+00:00", "EventTime": "2024-05-21T12:26:02.295262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.46.210.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2sTQ2igvDGCfgwza"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "77066200-3795-40c0-84dc-0204ff1a784c", "DetectTime": "2024-05-21T12:26:02.299928+00:00", "EventTime": "2024-05-21T12:26:02.299946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxRep2Yy9DWAxQW75"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6cf55b5d-a265-42bf-9a14-dc02ebed0c0b", "DetectTime": "2024-05-21T12:26:02.339130+00:00", "EventTime": "2024-05-21T12:26:02.339152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUFAf2Uh2H2sdlul5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "49b40ebc-262b-4402-922e-c997090d91e0", "DetectTime": "2024-05-21T12:26:02.355869+00:00", "EventTime": "2024-05-21T12:26:02.355889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiNCk4c49JbxLWnrc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ec124214-4c80-4e09-bbf5-6d1daece4905", "DetectTime": "2024-05-21T12:26:02.366467+00:00", "EventTime": "2024-05-21T12:26:02.366485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co21UTTVbvj2zWi1a"], "accumulated_threat_level": 10.900000000000002, "timewindow": 21} +{"Format": "IDEA0", "ID": "55356dab-ca54-41a3-b772-24cdb3fdb55f", "DetectTime": "2024-05-21T12:26:02.400363+00:00", "EventTime": "2024-05-21T12:26:02.400382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQEziK22TbKeTBqhJ7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "2f25c56c-cef2-4fee-97c4-356ea2178132", "DetectTime": "2024-05-21T12:26:02.412069+00:00", "EventTime": "2024-05-21T12:26:02.412090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.162.143.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcNjsRilwH95PIWh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0beed25b-3b4e-47ff-8b59-cdf4489344bf", "DetectTime": "2024-05-21T12:26:02.433655+00:00", "EventTime": "2024-05-21T12:26:02.433677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU542D3DLfeQ8hrfKf"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "255a4fd1-e927-4eed-83e9-fec32a9f5145", "DetectTime": "2024-05-21T12:26:02.445426+00:00", "EventTime": "2024-05-21T12:26:02.445448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYKl94rVXDePYHhD1"], "accumulated_threat_level": 11.700000000000003, "timewindow": 21} +{"Format": "IDEA0", "ID": "09cc5b64-9b17-4aa7-abfd-35eca2d7b58e", "DetectTime": "2024-05-21T12:26:02.469456+00:00", "EventTime": "2024-05-21T12:26:02.469477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.191.16.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEcqh33efA7cjqaqe"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "09ae5a34-5a9e-49c5-9ea7-6470de5f86b5", "DetectTime": "2024-05-21T12:26:02.480081+00:00", "EventTime": "2024-05-21T12:26:02.480103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.204.79.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXceUu4jpk6CpA577g"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "4b32001e-5597-4481-94c0-0f994c7fca74", "DetectTime": "2024-05-21T12:26:02.508926+00:00", "EventTime": "2024-05-21T12:26:02.508944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1ShdTT7grM5Ql14"], "accumulated_threat_level": 12.500000000000004, "timewindow": 21} +{"Format": "Json", "ID": "4b32001e-5597-4481-94c0-0f994c7fca74", "DetectTime": "2024-05-21T12:26:02.508926+00:00", "EventTime": "2024-05-21T12:26:02.508944+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "1970-01-01T20:19:19.623991+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:26:02.684250)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "6f7d3f83-4241-49e4-91e6-ad33e05520ed", "DetectTime": "2024-05-21T12:26:02.695164+00:00", "EventTime": "2024-05-21T12:26:02.695184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiVWZ23qdQjR3eDJg"], "accumulated_threat_level": 0.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "55c43478-b624-48f2-997e-55ed1c571ec4", "DetectTime": "2024-05-21T12:26:02.700928+00:00", "EventTime": "2024-05-21T12:26:02.700949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cakhva4fwc04635wD7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "94e45da6-1562-4e12-9aa3-7b847ddda880", "DetectTime": "2024-05-21T12:26:02.716885+00:00", "EventTime": "2024-05-21T12:26:02.716902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSqx14goU3etbYOL2"], "accumulated_threat_level": 1.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "6d8757a8-c825-458b-a070-e04fe2ca0ce9", "DetectTime": "2024-05-21T12:26:02.728445+00:00", "EventTime": "2024-05-21T12:26:02.728465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKOSv14AJ2bmF0BJ9h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 21} +{"Format": "IDEA0", "ID": "c989fcaa-001a-49cc-8a64-59db3c32e5a1", "DetectTime": "2024-05-21T12:26:02.739399+00:00", "EventTime": "2024-05-21T12:26:02.739420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrl4B2hnyow99alI4"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "109b9fa9-1d69-4988-bba4-e3c839f079c6", "DetectTime": "2024-05-21T12:26:02.749025+00:00", "EventTime": "2024-05-21T12:26:02.749043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMkgK3c9Ueiskagj5"], "accumulated_threat_level": 4.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "bf39ae92-be7e-47e3-97c3-bf4957708163", "DetectTime": "2024-05-21T12:26:02.753377+00:00", "EventTime": "2024-05-21T12:26:02.753395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.39.123.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcSDL15JMTmQ5Wad4"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3ae0018c-a8cf-41ed-8f1f-29b11e18157c", "DetectTime": "2024-05-21T12:26:02.764317+00:00", "EventTime": "2024-05-21T12:26:02.764337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJGJOZz1xjBJuEQJ"], "accumulated_threat_level": 4.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "070bd3df-683f-4cb5-a094-55a28222eac1", "DetectTime": "2024-05-21T12:26:02.769220+00:00", "EventTime": "2024-05-21T12:26:02.769240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.106.41.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45l4t47LShH34T4mi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "de24db0a-31f9-4b0b-aac3-f07cb13b00e9", "DetectTime": "2024-05-21T12:26:02.780246+00:00", "EventTime": "2024-05-21T12:26:02.780264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Prfa80xjAVJIgJ8"], "accumulated_threat_level": 5.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "1681631b-e9df-48ee-8ebc-fa6e2e1cd1e5", "DetectTime": "2024-05-21T12:26:02.784982+00:00", "EventTime": "2024-05-21T12:26:02.785000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.129.120.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZ5xl31drKETA8Db9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a069095e-4aa6-46a2-932c-9a48e82c50fc", "DetectTime": "2024-05-21T12:26:02.795427+00:00", "EventTime": "2024-05-21T12:26:02.795444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "Connection to unknown destination port 1868/UDP destination IP 188.6.55.163. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6grL32vj5ZR4mTiVf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 21} +{"Format": "IDEA0", "ID": "b7d5409c-4cb9-4dcb-b809-54fd456f24c8", "DetectTime": "2024-05-21T12:26:02.805183+00:00", "EventTime": "2024-05-21T12:26:02.805201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTU3943CVlpYi256Z9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "bcce1f7e-6318-4ecd-9980-d84e34357c3a", "DetectTime": "2024-05-21T12:26:02.809857+00:00", "EventTime": "2024-05-21T12:26:02.809875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.253.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5dUiw2DcFlTJk7GHc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6961f90f-1adf-49fd-9f37-3bdc0e2f9c42", "DetectTime": "2024-05-21T12:26:02.820541+00:00", "EventTime": "2024-05-21T12:26:02.820561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvCyY3mVHmIduk8u3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "b2ca894f-cbef-44d2-ad4d-3e9e768d9585", "DetectTime": "2024-05-21T12:26:02.825312+00:00", "EventTime": "2024-05-21T12:26:02.825331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZMyc1n0M77d444Pg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3586e0cf-2904-410d-9c4a-3c5bbc433415", "DetectTime": "2024-05-21T12:26:02.844470+00:00", "EventTime": "2024-05-21T12:26:02.844488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45CiA20n6AMH6VM02"], "accumulated_threat_level": 8.799999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "a298eef5-104a-4836-ad5a-67515a12f8d1", "DetectTime": "2024-05-21T12:26:02.858804+00:00", "EventTime": "2024-05-21T12:26:02.858822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.65.55.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImq5y1JW9DgD0l7E5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "2c6ec55b-7a88-429b-9376-7ba75a4b108c", "DetectTime": "2024-05-21T12:26:02.879252+00:00", "EventTime": "2024-05-21T12:26:02.879270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDiifFQOxVhMAU0Y6"], "accumulated_threat_level": 9.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "2e6f59ac-1bdc-4cd5-840c-3134256ec56d", "DetectTime": "2024-05-21T12:26:02.902128+00:00", "EventTime": "2024-05-21T12:26:02.902147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 7140/UDP destination IP 77.242.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8KXkX39g1bdEBGDfi"], "accumulated_threat_level": 10.4, "timewindow": 21} +{"Format": "IDEA0", "ID": "ce33b070-07b7-461c-9c46-8ec6b95a92d0", "DetectTime": "2024-05-21T12:26:02.918059+00:00", "EventTime": "2024-05-21T12:26:02.918076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.186.13.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUqWj1Y3JI5q4UOU7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "bc51bcb4-4933-4902-9dcb-0cfa2c4377ba", "DetectTime": "2024-05-21T12:26:02.941214+00:00", "EventTime": "2024-05-21T12:26:02.941232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX59hbuQuTsiDro6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 21} +{"Format": "IDEA0", "ID": "f2efe78d-5ce2-4127-b610-34c1d31e2798", "DetectTime": "2024-05-21T12:26:02.962853+00:00", "EventTime": "2024-05-21T12:26:02.962871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6nF720rDwce4HBbi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 21} +{"Format": "Json", "ID": "f2efe78d-5ce2-4127-b610-34c1d31e2798", "DetectTime": "2024-05-21T12:26:02.962853+00:00", "EventTime": "2024-05-21T12:26:02.962871+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "1970-01-01T20:19:22.957697+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:26:03.113997)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fb7ab576-4ffb-46bf-898b-8abde755c4f4", "DetectTime": "2024-05-21T12:26:03.117950+00:00", "EventTime": "2024-05-21T12:26:03.117968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwffk2rXc9Z5btksh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a511a6b4-d2ce-456a-87e0-b00b8a5e1812", "DetectTime": "2024-05-21T12:26:03.129216+00:00", "EventTime": "2024-05-21T12:26:03.129237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXuqKd27j1FBioTphf"], "accumulated_threat_level": 0.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "8eb5133c-e4b6-48ad-99a9-ca2451892a57", "DetectTime": "2024-05-21T12:26:03.134057+00:00", "EventTime": "2024-05-21T12:26:03.134075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.56.174.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JI6s2AQ9dFJ0fnZ9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "1f22352c-0e5c-4a8c-8300-7cf77d6b486d", "DetectTime": "2024-05-21T12:26:03.144718+00:00", "EventTime": "2024-05-21T12:26:03.144737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLM1hC2FI7r0apFfd3"], "accumulated_threat_level": 1.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "bb20ceb6-63ef-4e7f-a79c-3a97bebe7891", "DetectTime": "2024-05-21T12:26:03.149501+00:00", "EventTime": "2024-05-21T12:26:03.149519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.127.75.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXyX83YuKuCFzLeS"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "5dfca96d-7745-42c2-a1d7-a5da379ff3dc", "DetectTime": "2024-05-21T12:26:03.153845+00:00", "EventTime": "2024-05-21T12:26:03.153863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.33.151.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7N2o1o8hMp43NUlf"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6840070b-250a-4141-8461-92a3689bc29e", "DetectTime": "2024-05-21T12:26:03.163805+00:00", "EventTime": "2024-05-21T12:26:03.163823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crln974vf9E6Lbr2Yb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 21} +{"Format": "IDEA0", "ID": "23048460-9441-4cce-9607-53031631c1a7", "DetectTime": "2024-05-21T12:26:03.168158+00:00", "EventTime": "2024-05-21T12:26:03.168175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.134.184.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQly8LybNOd8mAR9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9de839ee-0d77-45ae-a064-6a1408f74f9c", "DetectTime": "2024-05-21T12:26:03.178289+00:00", "EventTime": "2024-05-21T12:26:03.178307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwmaur4SvREMnZ6Mlf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "e9777513-cb03-4783-88d0-e08e27f01bfa", "DetectTime": "2024-05-21T12:26:03.189683+00:00", "EventTime": "2024-05-21T12:26:03.189706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAU5g1WSXpvwG26Qd"], "accumulated_threat_level": 4.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "eef64009-1b0f-4f4d-aff5-9fa5265709cb", "DetectTime": "2024-05-21T12:26:03.201998+00:00", "EventTime": "2024-05-21T12:26:03.202017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9oaj1M9lVxGh5DIl"], "accumulated_threat_level": 4.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "4d1b018a-38e0-4f71-8fcc-ef1784d27e78", "DetectTime": "2024-05-21T12:26:03.211548+00:00", "EventTime": "2024-05-21T12:26:03.211566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coe4e55AHKHODuXaa"], "accumulated_threat_level": 5.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "cd856b3f-f5e1-40fe-8a99-c400680663ef", "DetectTime": "2024-05-21T12:26:03.221671+00:00", "EventTime": "2024-05-21T12:26:03.221689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBEPg4lhEQzcq5DAl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 21} +{"Format": "IDEA0", "ID": "6ee54d42-14c2-4081-aa1f-4147ed332979", "DetectTime": "2024-05-21T12:26:03.266792+00:00", "EventTime": "2024-05-21T12:26:03.266812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzTFv1zF8DMUHZWx1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "165bd2df-0dc9-49c6-8c11-8be9735a18c8", "DetectTime": "2024-05-21T12:26:03.292522+00:00", "EventTime": "2024-05-21T12:26:03.292541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOhhR24C920nBBzH6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "4b660e09-3326-404b-b740-36ef3fe40ac7", "DetectTime": "2024-05-21T12:26:03.317899+00:00", "EventTime": "2024-05-21T12:26:03.317918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64VdQ1BLC4EfS4qFe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "31e3dfa0-e129-4abc-8154-0c07f03ceeef", "DetectTime": "2024-05-21T12:26:03.368922+00:00", "EventTime": "2024-05-21T12:26:03.368940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnj1K21Tby2h7d16bl"], "accumulated_threat_level": 9.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "6afd3449-5a94-435c-a469-102f21dd3a70", "DetectTime": "2024-05-21T12:26:03.385493+00:00", "EventTime": "2024-05-21T12:26:03.385512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.198.175.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYwui3THoYUM7CJfi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "54b465ad-a73a-41d4-a25b-64eddbe6ee79", "DetectTime": "2024-05-21T12:26:03.406834+00:00", "EventTime": "2024-05-21T12:26:03.406854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.121.4.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czz4lS1JLFpFUBMUS6"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0994ac01-a126-4664-9050-600bfa9eb438", "DetectTime": "2024-05-21T12:26:03.448353+00:00", "EventTime": "2024-05-21T12:26:03.448375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.151.42.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpMDC4IUaetWtW7dj"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f9f8b571-18ef-4baa-b1f4-03d098fd1f4b", "DetectTime": "2024-05-21T12:26:03.483275+00:00", "EventTime": "2024-05-21T12:26:03.483296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.115.182.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ2rSszhv3uG5h3dk"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "eb49acc5-f786-4582-a77a-ae14f6c18734", "DetectTime": "2024-05-21T12:26:03.522174+00:00", "EventTime": "2024-05-21T12:26:03.522197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.124.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ANgD318cUoCz7Cq7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3c867138-d0b6-4195-8670-19e36d4d4d63", "DetectTime": "2024-05-21T12:26:03.543555+00:00", "EventTime": "2024-05-21T12:26:03.543573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.58.204.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmaeT137bS4IYoj09"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "def606f6-588a-4a32-a94f-d682268a1634", "DetectTime": "2024-05-21T12:26:03.628568+00:00", "EventTime": "2024-05-21T12:26:03.628589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTpDAH88DVMeIENh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ffdaefa9-4442-4486-9cec-974f970e0442", "DetectTime": "2024-05-21T12:26:03.811190+00:00", "EventTime": "2024-05-21T12:26:03.811211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck2N5m1dN10bsABlgi", "CN1Ime2XGT9WWnImZa", "CvtVin19r90mbIl2Ab", "CWHfBO2kOgnS89swbg"], "accumulated_threat_level": 10.1, "timewindow": 21} +{"Format": "IDEA0", "ID": "5e40b0e1-81e2-4380-b4b9-63f458548d8a", "DetectTime": "2024-05-21T12:26:03.921026+00:00", "EventTime": "2024-05-21T12:26:03.921047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY911r31hHgO6tUaQk"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "8755d08f-f19f-45c9-a005-47dfbb037824", "DetectTime": "2024-05-21T12:26:03.926428+00:00", "EventTime": "2024-05-21T12:26:03.926447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.25.211.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTDdLhLTOq6o5IRh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "bd690a3d-16cd-4b88-b30c-9c42d986722d", "DetectTime": "2024-05-21T12:26:03.930874+00:00", "EventTime": "2024-05-21T12:26:03.930891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 134.90.1.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1B0Z1M66eSPW3v5h"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "19b938f8-9065-4910-9276-3e980e00ea15", "DetectTime": "2024-05-21T12:26:03.935253+00:00", "EventTime": "2024-05-21T12:26:03.935271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.81.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4yUK3SMCtK5MluE5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c5217763-0aee-4038-a753-2a0e9bb496d3", "DetectTime": "2024-05-21T12:26:03.939768+00:00", "EventTime": "2024-05-21T12:26:03.939785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.41.37.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88lBg46D6jg0Fv09k"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f7b17638-2630-4b34-b6f3-000b791f5716", "DetectTime": "2024-05-21T12:26:03.944467+00:00", "EventTime": "2024-05-21T12:26:03.944490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.202.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZYLp3iQrgFS2hGEg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "06682047-d15e-46b0-8045-5449501d07f1", "DetectTime": "2024-05-21T12:26:03.955090+00:00", "EventTime": "2024-05-21T12:26:03.955110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.106.113.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp0yTz2CxcRA78kru3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3ee66980-2227-422c-b363-fd619d9e3b2d", "DetectTime": "2024-05-21T12:26:04.024345+00:00", "EventTime": "2024-05-21T12:26:04.024366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAiiW1glnJwZDsYo6"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "bbc742a9-fda9-4ac3-83ea-412d6bdcb7e2", "DetectTime": "2024-05-21T12:26:04.040974+00:00", "EventTime": "2024-05-21T12:26:04.040995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.105.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrjHZKnqnHX8U0lo3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9b5d3f05-da10-45b1-97c4-b58b53897d43", "DetectTime": "2024-05-21T12:26:04.055363+00:00", "EventTime": "2024-05-21T12:26:04.055380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.232.178.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sZ8n37HS7TeFOBG5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a09ae44e-54bd-4bf5-ac1c-79d4b21d5db4", "DetectTime": "2024-05-21T12:26:04.075953+00:00", "EventTime": "2024-05-21T12:26:04.075972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.233.38.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF44T00w1rKSAZQc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9bb59ea3-f813-4c1b-bca6-081830e5098c", "DetectTime": "2024-05-21T12:26:04.098263+00:00", "EventTime": "2024-05-21T12:26:04.098282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.67.62.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxUaB33Rilk5BGR86"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "47f08eb7-aa64-4d03-a7cd-ff286ade167e", "DetectTime": "2024-05-21T12:26:04.122474+00:00", "EventTime": "2024-05-21T12:26:04.122496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.251.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8Kyb3hJN9r0Fhdia"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "1da348a4-f5bf-4925-8acb-cba3c08fad60", "DetectTime": "2024-05-21T12:26:04.232168+00:00", "EventTime": "2024-05-21T12:26:04.232187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.133.20.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yYSI7mgI4R9hl8j"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6fd63206-782e-4cc4-9613-cacd1d630a61", "DetectTime": "2024-05-21T12:26:04.243549+00:00", "EventTime": "2024-05-21T12:26:04.243569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqojJW5gXrao5jNs3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "5bf85d35-ebc5-4a79-87f9-c1b7de5717ee", "DetectTime": "2024-05-21T12:26:04.273623+00:00", "EventTime": "2024-05-21T12:26:04.273643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.11.143.89 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnd5qu3DB6U9MCQcq3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "036822b1-e2e4-483c-ac5e-94cfce4340d4", "DetectTime": "2024-05-21T12:26:04.310390+00:00", "EventTime": "2024-05-21T12:26:04.310432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOuNf4tboTrMPrWuh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3bdedd40-4431-44be-88fb-3e7525bbc429", "DetectTime": "2024-05-21T12:26:04.359029+00:00", "EventTime": "2024-05-21T12:26:04.359050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQjAQ1cbs6Rm0nAPc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3438aa27-86f7-4a60-a8e9-8bce90db9517", "DetectTime": "2024-05-21T12:26:04.397636+00:00", "EventTime": "2024-05-21T12:26:04.397656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6HcC49c55HCqaxO6"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "87966259-29f4-4f42-b17c-84b3cf221243", "DetectTime": "2024-05-21T12:26:04.419688+00:00", "EventTime": "2024-05-21T12:26:04.419708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.78.174.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCZ6JAUbOsZr0cu"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "98270b54-3bb7-474f-8e24-06b5654535b0", "DetectTime": "2024-05-21T12:26:04.430552+00:00", "EventTime": "2024-05-21T12:26:04.430571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E3yw4uOerBLy7yr3"], "accumulated_threat_level": 10.9, "timewindow": 21} +{"Format": "IDEA0", "ID": "f7e99cf3-e633-4add-8ba8-1ff4708366e9", "DetectTime": "2024-05-21T12:26:04.451116+00:00", "EventTime": "2024-05-21T12:26:04.451136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.241.67.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtJam3Z8TLL6fvFJ9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "95012f2a-edff-4f44-b74f-6b4ea19daf61", "DetectTime": "2024-05-21T12:26:04.482815+00:00", "EventTime": "2024-05-21T12:26:04.482833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiyFy3iAUsFcOQUak"], "accumulated_threat_level": 11.700000000000001, "timewindow": 21} +{"Format": "IDEA0", "ID": "7bfcdd5c-f1e8-4b8f-953d-536fe279e6ea", "DetectTime": "2024-05-21T12:26:04.520075+00:00", "EventTime": "2024-05-21T12:26:04.520097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItuvI3DU1Dv5McvZ7"], "accumulated_threat_level": 12.500000000000002, "timewindow": 21} +{"Format": "Json", "ID": "7bfcdd5c-f1e8-4b8f-953d-536fe279e6ea", "DetectTime": "2024-05-21T12:26:04.520075+00:00", "EventTime": "2024-05-21T12:26:04.520097+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "1970-01-01T20:50:41.250610+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:26:04.722697)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "f1277c53-35f5-4522-996d-662ef838c50e", "DetectTime": "2024-05-21T12:26:04.726562+00:00", "EventTime": "2024-05-21T12:26:04.726580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrFSa32OmIbuyXCOl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "da85be93-9390-4c0a-850c-facbf3ef5aaa", "DetectTime": "2024-05-21T12:26:04.731007+00:00", "EventTime": "2024-05-21T12:26:04.731025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.138.17.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsGpKC4QFLlGNGVLKa"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "e53f9589-5cdd-4af3-90fb-9bec7a036d47", "DetectTime": "2024-05-21T12:26:04.743404+00:00", "EventTime": "2024-05-21T12:26:04.743422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNbP34VETALuoW3Fi"], "accumulated_threat_level": 0.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "a7f2cc0a-6999-41dd-a44b-7d98f46daaa3", "DetectTime": "2024-05-21T12:26:04.748243+00:00", "EventTime": "2024-05-21T12:26:04.748262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXaSr2vlCyzfzU74k"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "872ea405-0613-4f1c-9160-07320af85571", "DetectTime": "2024-05-21T12:26:04.753291+00:00", "EventTime": "2024-05-21T12:26:04.753312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.57.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zbKu4QYYGHuaRww3"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6c0de8bf-4c60-4b7b-9d3d-4b88455f4363", "DetectTime": "2024-05-21T12:26:04.758236+00:00", "EventTime": "2024-05-21T12:26:04.758255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.15.209.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Fbjwwsj85abY7Z6"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "d7843419-3681-43f0-b2f0-d07bb87245bd", "DetectTime": "2024-05-21T12:26:04.763303+00:00", "EventTime": "2024-05-21T12:26:04.763321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.18.54.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C65Cyq1vFVsINSPqli"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "48233eff-976e-4c91-856c-10d31d7d78bb", "DetectTime": "2024-05-21T12:26:04.774596+00:00", "EventTime": "2024-05-21T12:26:04.774615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.232.143"]}], "Attach": [{"Content": "Connection to unknown destination port 1873/UDP destination IP 94.240.232.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWyIkFMutVSM9Avkk"], "accumulated_threat_level": 1.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "b1785f97-7e1b-44b6-8d2e-aa0b132c63bf", "DetectTime": "2024-05-21T12:26:04.796412+00:00", "EventTime": "2024-05-21T12:26:04.796431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDaaI310Rjcs7hJU8c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 21} +{"Format": "IDEA0", "ID": "cf44ba52-009c-4042-87fd-15bbaf646657", "DetectTime": "2024-05-21T12:26:04.833195+00:00", "EventTime": "2024-05-21T12:26:04.833214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFT9PJ36nKCYidIAM6"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "eabbd47a-c36e-4cbf-a6e6-de0fefa37936", "DetectTime": "2024-05-21T12:26:04.860664+00:00", "EventTime": "2024-05-21T12:26:04.860684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqWsx1Yh49IRuTGp7"], "accumulated_threat_level": 4.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "932cde31-141f-4486-a1ac-1fd61d872d6e", "DetectTime": "2024-05-21T12:26:04.886463+00:00", "EventTime": "2024-05-21T12:26:04.886482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.121.218.120"]}], "Attach": [{"Content": "Connection to unknown destination port 7251/UDP destination IP 188.121.218.120. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNY5y53mJeL6Q9MJX4"], "accumulated_threat_level": 4.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "61b87040-95f2-4a4f-bafe-d998046f45be", "DetectTime": "2024-05-21T12:26:04.918376+00:00", "EventTime": "2024-05-21T12:26:04.918393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1HWP1c2Gjp8yqEMd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3fd0b48d-9311-4eca-8c47-3c172ab7cba1", "DetectTime": "2024-05-21T12:26:04.935322+00:00", "EventTime": "2024-05-21T12:26:04.935341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "Connection to unknown destination port 16838/UDP destination IP 95.10.18.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDt4y84WKMV28yDh35"], "accumulated_threat_level": 5.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "fe7335ca-1a16-484a-96d2-493a9c84c513", "DetectTime": "2024-05-21T12:26:04.950675+00:00", "EventTime": "2024-05-21T12:26:04.950696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.206.184.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkkh84ORbyAYxh743"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3cb98233-abef-4559-aecb-c3f91f17c5e2", "DetectTime": "2024-05-21T12:26:05.006802+00:00", "EventTime": "2024-05-21T12:26:05.006825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.132.224.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLEj07vetdcITiZEg"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "c07e47fc-13ae-4dfc-9799-33aa8c4b7ae6", "DetectTime": "2024-05-21T12:26:05.039111+00:00", "EventTime": "2024-05-21T12:26:05.039133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.15.51.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYxUS1B1eGp7X5R4d"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "dc463494-0ee9-4c20-a8c6-ae6a11dbe537", "DetectTime": "2024-05-21T12:26:05.064297+00:00", "EventTime": "2024-05-21T12:26:05.064316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "Connection to unknown destination port 9752/UDP destination IP 46.49.36.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2eRiGtOESJaaLq2c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 21} +{"Format": "IDEA0", "ID": "fc5918ed-e95a-493d-a3c4-ce125b078fe1", "DetectTime": "2024-05-21T12:26:05.079159+00:00", "EventTime": "2024-05-21T12:26:05.079179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.47.25.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IAm81lzOnhb0R4r7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6b6f6db9-bebd-40d2-a7b6-72088fa88c8b", "DetectTime": "2024-05-21T12:26:05.099932+00:00", "EventTime": "2024-05-21T12:26:05.099949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYvKC29u903Cub7nh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "2bf2b48d-e7e4-4ebb-9d8d-c3168bc0fd16", "DetectTime": "2024-05-21T12:26:05.113907+00:00", "EventTime": "2024-05-21T12:26:05.113927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.89.93.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uupU1NNCCh0JvxX8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b37c3e32-72ea-4fca-852e-1a9399d52a75", "DetectTime": "2024-05-21T12:26:05.230629+00:00", "EventTime": "2024-05-21T12:26:05.230648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIoapCyS99NCahYCf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "7fd94e61-4847-4b9a-8d3f-85c03c4b0842", "DetectTime": "2024-05-21T12:26:05.271942+00:00", "EventTime": "2024-05-21T12:26:05.271963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyawUl31WfrdTTrKfl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "37a10afa-c95a-4734-a122-4f08f058cfe9", "DetectTime": "2024-05-21T12:26:05.293261+00:00", "EventTime": "2024-05-21T12:26:05.293282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG5KR130JlOFGdro0j"], "accumulated_threat_level": 9.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "9034e795-6fe9-48fd-b1b1-b9573a71b7ea", "DetectTime": "2024-05-21T12:26:05.328559+00:00", "EventTime": "2024-05-21T12:26:05.328580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmKFbW3RtdQdAB7wCj"], "accumulated_threat_level": 10.4, "timewindow": 21} +{"Format": "IDEA0", "ID": "0d74fb40-7841-4bbd-b24c-7c3b2de5ff34", "DetectTime": "2024-05-21T12:26:05.360837+00:00", "EventTime": "2024-05-21T12:26:05.360858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGsp735ucRQzGIoK4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 21} +{"Format": "IDEA0", "ID": "4c0935b0-17da-4dfa-9969-38f7e85de95e", "DetectTime": "2024-05-21T12:26:05.386661+00:00", "EventTime": "2024-05-21T12:26:05.386682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6SQax3b2dBeHsqaul"], "accumulated_threat_level": 12.000000000000002, "timewindow": 21} +{"Format": "Json", "ID": "4c0935b0-17da-4dfa-9969-38f7e85de95e", "DetectTime": "2024-05-21T12:26:05.386661+00:00", "EventTime": "2024-05-21T12:26:05.386682+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "1970-01-01T20:50:44.313371+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:26:05.572231)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "eae62abd-3418-4eaa-a368-858fff075e9b", "DetectTime": "2024-05-21T12:26:05.575967+00:00", "EventTime": "2024-05-21T12:26:05.575984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iubC278etLvu4md9"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "e175df64-32b7-44e5-a3d3-04f9e46a7feb", "DetectTime": "2024-05-21T12:26:05.580445+00:00", "EventTime": "2024-05-21T12:26:05.580462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.250.125.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Hmcl3MbRE4tXoYIl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "0c8e1587-5743-4580-9e72-a1459df4bff9", "DetectTime": "2024-05-21T12:26:05.584767+00:00", "EventTime": "2024-05-21T12:26:05.584785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.242.237.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6g1f34WyaWLwb5Wek"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a9523cbc-92ed-4231-91f8-8f86c0f8a03c", "DetectTime": "2024-05-21T12:26:05.596389+00:00", "EventTime": "2024-05-21T12:26:05.596409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTIKtitJBDxEBcTzl"], "accumulated_threat_level": 0.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "61d0474f-ec90-4579-8df7-074baf3607e2", "DetectTime": "2024-05-21T12:26:05.600956+00:00", "EventTime": "2024-05-21T12:26:05.600973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCClz42gAGECGPXzxd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ceef3dc6-9118-4611-9b00-63eb8a717073", "DetectTime": "2024-05-21T12:26:05.605125+00:00", "EventTime": "2024-05-21T12:26:05.605142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.142.9.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxlYVS3XsnFyjMF2Gl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "441f023b-1c71-4535-88bd-c3a236645cb8", "DetectTime": "2024-05-21T12:26:05.609440+00:00", "EventTime": "2024-05-21T12:26:05.609457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcbUS13ZrA74AIsm7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "12a0ed65-d1ae-48a4-8dbd-1bcf6a1bdb0a", "DetectTime": "2024-05-21T12:26:05.614068+00:00", "EventTime": "2024-05-21T12:26:05.614086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6r7K3fsFmQbqsqN8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f028c2c5-7c67-414a-ba0b-a8861ee55534", "DetectTime": "2024-05-21T12:26:05.618548+00:00", "EventTime": "2024-05-21T12:26:05.618566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.191.232.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBvu4LiNbjpuAvWKa"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "b58b4a2a-2ead-45c9-bc27-147976d877f9", "DetectTime": "2024-05-21T12:26:05.628488+00:00", "EventTime": "2024-05-21T12:26:05.628506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja69xGHd71xM1oeb"], "accumulated_threat_level": 1.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "e7f6e355-1406-465d-8a24-3cb0bd32718b", "DetectTime": "2024-05-21T12:26:05.632864+00:00", "EventTime": "2024-05-21T12:26:05.632881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.206.0.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCf2ms34L4SHhGefc5"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a4ba89dd-35fe-4360-8a4f-b75e7f473c11", "DetectTime": "2024-05-21T12:26:05.637485+00:00", "EventTime": "2024-05-21T12:26:05.637503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.249.112.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFI2E61OrcD4oZhsug"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "706a3aaf-0eb5-42d7-bc11-539e61320ac7", "DetectTime": "2024-05-21T12:26:05.656802+00:00", "EventTime": "2024-05-21T12:26:05.656824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.224.10.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0tfB1W6FZJIlZitc"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "6223e625-fd57-456d-bfb7-69eb8b726fe4", "DetectTime": "2024-05-21T12:26:05.680343+00:00", "EventTime": "2024-05-21T12:26:05.680365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.161.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLDuh2NkVnl2hUOgh"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "64e20e2a-60e2-411f-ab59-3caa23ca554e", "DetectTime": "2024-05-21T12:26:05.697416+00:00", "EventTime": "2024-05-21T12:26:05.697437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 8.14.69.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFNtc2Ppp796jvpLl"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "2cbffbbd-e0c1-4960-9a0e-4a2b42563fcf", "DetectTime": "2024-05-21T12:26:05.710756+00:00", "EventTime": "2024-05-21T12:26:05.710774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDufkD4XE19kPuvMQf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 21} +{"Format": "IDEA0", "ID": "7c4081eb-26d2-4098-8062-f98d6ea48f2c", "DetectTime": "2024-05-21T12:26:05.731495+00:00", "EventTime": "2024-05-21T12:26:05.731515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.78.76.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPVveeRXx28k0lHd"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "dbd572c0-1cb7-414e-a7fb-e6796fca7335", "DetectTime": "2024-05-21T12:26:05.755912+00:00", "EventTime": "2024-05-21T12:26:05.755931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4384/UDP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNK9lKRU9emfGNnxl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "e63abbd7-eb8d-4155-aaa8-c61df6b94a3c", "DetectTime": "2024-05-21T12:26:05.762930+00:00", "EventTime": "2024-05-21T12:26:05.762950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.104.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY1cCM1QKJcKwANHUi"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "8c039e55-17fd-45e9-a869-c6efe93c662f", "DetectTime": "2024-05-21T12:26:05.792096+00:00", "EventTime": "2024-05-21T12:26:05.792116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOoQBYRBKHR4Ywpa"], "accumulated_threat_level": 4.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "f1a74f73-4ee0-4d1b-8bba-fc302921fcaf", "DetectTime": "2024-05-21T12:26:05.817187+00:00", "EventTime": "2024-05-21T12:26:05.817205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7wAz4w7Ge3pWhfR3"], "accumulated_threat_level": 4.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "7efade84-5129-422a-92b4-c79951f2ce5b", "DetectTime": "2024-05-21T12:26:05.879594+00:00", "EventTime": "2024-05-21T12:26:05.879613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "Connection to unknown destination port 11036/UDP destination IP 188.169.105.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8iI7r4Cj2WEDWPtFk"], "accumulated_threat_level": 5.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "dd2a23cd-5c07-4c20-a84c-b92a6aec2ef5", "DetectTime": "2024-05-21T12:26:05.889508+00:00", "EventTime": "2024-05-21T12:26:05.889527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.247.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAV9Kd2JbPWQl4dzHf"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "a4cd3c63-f5d3-451f-9071-89e45100f4b7", "DetectTime": "2024-05-21T12:26:05.910231+00:00", "EventTime": "2024-05-21T12:26:05.910252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.149.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsfSX2XaQeardrbic"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "d87d964f-a1b7-4337-b1b9-207f7709f516", "DetectTime": "2024-05-21T12:26:05.930978+00:00", "EventTime": "2024-05-21T12:26:05.930997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXEUJY2rxJ6wLhDBjb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 21} +{"Format": "IDEA0", "ID": "c161307a-ec7b-4bca-965c-8ec661573f7f", "DetectTime": "2024-05-21T12:26:05.945596+00:00", "EventTime": "2024-05-21T12:26:05.945618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.155.171.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNt5Hs4XdVDBm8aC8"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "f0ec27a4-3376-42b7-ba6d-20ec5f3d2ede", "DetectTime": "2024-05-21T12:26:05.967410+00:00", "EventTime": "2024-05-21T12:26:05.967431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7njF38533L7p4q4l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "16275d52-4095-40bf-b516-6c1542cc2e68", "DetectTime": "2024-05-21T12:26:05.986858+00:00", "EventTime": "2024-05-21T12:26:05.986880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.72.218.171 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysG8bYFl26q2QKv7"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "e2fc8b3f-c5e0-457d-994d-ccdf937693e5", "DetectTime": "2024-05-21T12:26:06.007884+00:00", "EventTime": "2024-05-21T12:26:06.007903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjxH13c3l1AiXtWc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "0e47decd-7e9c-441a-ba6b-641fccfed273", "DetectTime": "2024-05-21T12:26:06.019557+00:00", "EventTime": "2024-05-21T12:26:06.019575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.20.226.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDWpECpbDxNAWPDj"], "accumulated_threat_level": 4.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "aa06d2ee-aadb-49c4-bac8-b2a3e4843c43", "DetectTime": "2024-05-21T12:26:06.044831+00:00", "EventTime": "2024-05-21T12:26:06.044851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQudqk80eWco3hK6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 21} +{"Format": "IDEA0", "ID": "9ccf3f61-cd02-4681-bf6b-f928a013404b", "DetectTime": "2024-05-21T12:26:06.081177+00:00", "EventTime": "2024-05-21T12:26:06.081196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0H6X2G92UxVbmhWc"], "accumulated_threat_level": 9.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "7cfd8851-69a4-4a15-826e-5f84724cc599", "DetectTime": "2024-05-21T12:26:06.106280+00:00", "EventTime": "2024-05-21T12:26:06.106300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9z2cZXiDov59oSod"], "accumulated_threat_level": 10.4, "timewindow": 21} +{"Format": "IDEA0", "ID": "d92be5df-c4d4-46ad-8076-7fd831ad3f45", "DetectTime": "2024-05-21T12:26:06.132241+00:00", "EventTime": "2024-05-21T12:26:06.132263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CknZvP2kd7MOJVBQ0i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 21} +{"Format": "IDEA0", "ID": "5beb3eb4-7db2-40bc-a745-6cb2a4dadc4a", "DetectTime": "2024-05-21T12:26:06.157267+00:00", "EventTime": "2024-05-21T12:26:06.157287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2mv92tH6jJO7Wjo1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 21} +{"Format": "Json", "ID": "5beb3eb4-7db2-40bc-a745-6cb2a4dadc4a", "DetectTime": "2024-05-21T12:26:06.157267+00:00", "EventTime": "2024-05-21T12:26:06.157287+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "1970-01-01T20:51:38.516874+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:26:06.374758)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3a846fd1-e7dc-4532-b3c4-b0ebb794bed1", "DetectTime": "2024-05-21T12:26:06.384168+00:00", "EventTime": "2024-05-21T12:26:06.384186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7V8DdFveWtWwEAh"], "accumulated_threat_level": 0.8, "timewindow": 21} +{"Format": "IDEA0", "ID": "bf2f9a83-6cd3-44ee-9831-c29f51c57936", "DetectTime": "2024-05-21T12:26:06.393951+00:00", "EventTime": "2024-05-21T12:26:06.393969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUv8RBrBhSpaeqUJg"], "accumulated_threat_level": 1.6, "timewindow": 21} +{"Format": "IDEA0", "ID": "93f05b42-9af5-4230-b033-760e99965742", "DetectTime": "2024-05-21T12:26:06.401010+00:00", "EventTime": "2024-05-21T12:26:06.401035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEr5W1mMFwh8wSoQa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "28beb5b6-3725-41b5-8edc-ae389feb8bf4", "DetectTime": "2024-05-21T12:26:06.411821+00:00", "EventTime": "2024-05-21T12:26:06.411842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zLGB45o5FhoyTIPa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 21} +{"Format": "IDEA0", "ID": "d2d76ed8-5e00-4e8c-b56a-358f589e6e27", "DetectTime": "2024-05-21T12:26:06.421963+00:00", "EventTime": "2024-05-21T12:26:06.421982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiZAX3G12ByjkVbgf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "e0dcfedc-d643-4d98-aaee-e9d4448225e4", "DetectTime": "2024-05-21T12:26:06.503158+00:00", "EventTime": "2024-05-21T12:26:06.503176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CizZQN2vxJAzt2R4Gl"], "accumulated_threat_level": 0.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "eb734a6a-7e43-4e0d-8d2e-0293678a1db3", "DetectTime": "2024-05-21T12:26:06.650720+00:00", "EventTime": "2024-05-21T12:26:06.650742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrFQ7jMRK2Yqtqu3", "Ccoy0xQ75gbWNb2de", "CWlcLJaNJf6KBPwLb", "CnEnPGbCXCUJRfiZ5"], "accumulated_threat_level": 1.3, "timewindow": 22} +{"Format": "IDEA0", "ID": "e3bb93b0-d967-4261-b302-9dd2933f0105", "DetectTime": "2024-05-21T12:26:06.735161+00:00", "EventTime": "2024-05-21T12:26:06.735182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1y56h3dow558qeZX7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "fad3a9f2-e333-4bb5-9879-f84f9e9bd0bd", "DetectTime": "2024-05-21T12:26:06.754270+00:00", "EventTime": "2024-05-21T12:26:06.754292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84n7Z2XbBuY57HjMk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c94581f1-bad9-4634-ba7c-ee34a0164124", "DetectTime": "2024-05-21T12:26:06.781996+00:00", "EventTime": "2024-05-21T12:26:06.782018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CicTpd3fN4M1JGpto4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e4c863a0-bc1e-4a9b-bb80-8ef848659697", "DetectTime": "2024-05-21T12:26:06.786836+00:00", "EventTime": "2024-05-21T12:26:06.786855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUm8tt4MXiqPHsKsrg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "8d8592fd-b6f2-4e98-b923-40eaca5cdb18", "DetectTime": "2024-05-21T12:26:06.976009+00:00", "EventTime": "2024-05-21T12:26:06.976029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRStr01vesWwJKGXR"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c7cf6b51-cf27-4d54-a03e-521a5b3e0b9a", "DetectTime": "2024-05-21T12:26:07.024016+00:00", "EventTime": "2024-05-21T12:26:07.024036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWMzy1AKYXuG97V65"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "520ba23e-9392-4e7e-a2e1-78ae30cc5631", "DetectTime": "2024-05-21T12:26:07.029433+00:00", "EventTime": "2024-05-21T12:26:07.029452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wzcP3Ryx0eqfGBj8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "0e9b975d-ab52-4316-8e8a-1ce2f2454888", "DetectTime": "2024-05-21T12:26:07.048961+00:00", "EventTime": "2024-05-21T12:26:07.048982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9vYd2L4OnDn0FZvc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "fa55e867-bbd7-4191-912a-af1d73ba55ef", "DetectTime": "2024-05-21T12:26:07.076878+00:00", "EventTime": "2024-05-21T12:26:07.076898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Sgll3gJTdwXt6iml"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "b50aea83-c113-498b-8ee9-c8f9e7ca14e7", "DetectTime": "2024-05-21T12:26:07.100860+00:00", "EventTime": "2024-05-21T12:26:07.100883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorrLc3TqxGyr9vsUl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "69ec9f08-b6d6-49fa-a622-67a6f22f2a38", "DetectTime": "2024-05-21T12:26:07.112839+00:00", "EventTime": "2024-05-21T12:26:07.112860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.57.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtrej2hqSAN90x2b9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e5102069-e743-4ca0-aac5-9387add610d3", "DetectTime": "2024-05-21T12:26:07.191638+00:00", "EventTime": "2024-05-21T12:26:07.191659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYjs0H1NpCTnwlybP2"], "accumulated_threat_level": 2.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "b9560b74-fbe5-493a-a056-5dc513f6cad0", "DetectTime": "2024-05-21T12:26:07.419831+00:00", "EventTime": "2024-05-21T12:26:07.419852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTuVjEoF3E84MkUe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "95c48f93-8987-41d9-9780-c57d8193bb17", "DetectTime": "2024-05-21T12:26:07.452083+00:00", "EventTime": "2024-05-21T12:26:07.452103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKPs6TsV7Vd1K167"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "8786ef91-424e-4492-bcb4-80fa5adb204b", "DetectTime": "2024-05-21T12:26:07.457497+00:00", "EventTime": "2024-05-21T12:26:07.457517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfb4cs3hXaHiGzKj73"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "07cca9ee-7a82-4074-b236-b9987aea60c3", "DetectTime": "2024-05-21T12:26:07.490485+00:00", "EventTime": "2024-05-21T12:26:07.490507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTXe3fbO2bhtt9q"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "420253a9-1264-4362-b73b-3ca79ac3e28b", "DetectTime": "2024-05-21T12:26:07.495322+00:00", "EventTime": "2024-05-21T12:26:07.495342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.162.252.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1isGuUc0EN5aIK3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "89a22c09-791b-4fd9-b26a-eb83fbf4e494", "DetectTime": "2024-05-21T12:26:07.523546+00:00", "EventTime": "2024-05-21T12:26:07.523567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNStss4r6eS0b3Lyzk"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 22} +{"Format": "IDEA0", "ID": "18ba4c83-3a1f-46a8-9a9b-1fc892592e87", "DetectTime": "2024-05-21T12:26:07.559391+00:00", "EventTime": "2024-05-21T12:26:07.559409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.157.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8RLSg4k0a6QX8K8Fh"], "accumulated_threat_level": 3.7, "timewindow": 22} +{"Format": "IDEA0", "ID": "3600575e-987b-4fc5-95af-e81f46edf2b8", "DetectTime": "2024-05-21T12:26:07.584428+00:00", "EventTime": "2024-05-21T12:26:07.584444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4APE96wAHnVKyf6"], "accumulated_threat_level": 4.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "16c8e9b5-f35a-4b7e-9fa8-72e6f59aaa14", "DetectTime": "2024-05-21T12:26:07.650060+00:00", "EventTime": "2024-05-21T12:26:07.650079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrbTKEuqWwED6cxCk"], "accumulated_threat_level": 5.3, "timewindow": 22} +{"Format": "IDEA0", "ID": "21a0d630-11f8-422a-9304-343dc7829969", "DetectTime": "2024-05-21T12:26:07.675267+00:00", "EventTime": "2024-05-21T12:26:07.675287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrS6Dw2pzR3455WQll"], "accumulated_threat_level": 6.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "9973588f-414d-4d2e-aadd-ef70154adc42", "DetectTime": "2024-05-21T12:26:07.806621+00:00", "EventTime": "2024-05-21T12:26:07.806641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Pw2Z2wkLSLbfBA54"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 22} +{"Format": "IDEA0", "ID": "03c20936-c63c-4bdf-be99-5a8ca6a1ab93", "DetectTime": "2024-05-21T12:26:07.830050+00:00", "EventTime": "2024-05-21T12:26:07.830069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caw3sx1tJwaa7J74T5", "C7CGnM1BJKNE1pRK4b", "CnaugD3E0fC94wJFA5", "Cy0RWnYWphHN7FwOg"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 22} +{"Format": "IDEA0", "ID": "773d366e-ae12-4d17-870c-15cbec300c65", "DetectTime": "2024-05-21T12:26:07.888082+00:00", "EventTime": "2024-05-21T12:26:07.888101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mcZU2zZ33A4C4xgd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "53cc2b58-2975-4424-98ca-1569cd21aa8f", "DetectTime": "2024-05-21T12:26:07.943317+00:00", "EventTime": "2024-05-21T12:26:07.943338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwSKj1afhO61qxcg"], "accumulated_threat_level": 8.2, "timewindow": 22} +{"Format": "IDEA0", "ID": "60b90979-f340-402e-8494-bde656419940", "DetectTime": "2024-05-21T12:26:07.971659+00:00", "EventTime": "2024-05-21T12:26:07.971678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIWFuo1sEZL95Ekwbd"], "accumulated_threat_level": 9.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "d2ce8fbc-4f97-4b46-afa4-516264267fb7", "DetectTime": "2024-05-21T12:26:08.015721+00:00", "EventTime": "2024-05-21T12:26:08.015741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32iQo4H32szAULzH2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "66c09c1c-313a-46ec-adc4-51d5c4ce1014", "DetectTime": "2024-05-21T12:26:08.276140+00:00", "EventTime": "2024-05-21T12:26:08.276163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.55.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfwbyn1zRR1pSZFXZ2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ca5ed30a-bede-4a44-8395-ada01530fa2e", "DetectTime": "2024-05-21T12:26:08.434863+00:00", "EventTime": "2024-05-21T12:26:08.434902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CahDIQ1TLX35PVpr0a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "79ccb223-fd2b-4846-be24-39e0c27beef4", "DetectTime": "2024-05-21T12:26:08.484301+00:00", "EventTime": "2024-05-21T12:26:08.484323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYAWgC4QCD6AHIypVc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "44fe1c61-f055-44fe-a78d-55a51fb0074e", "DetectTime": "2024-05-21T12:26:08.508809+00:00", "EventTime": "2024-05-21T12:26:08.508825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPSwo1i97H2j4GZ75"], "accumulated_threat_level": 9.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "3dd241a5-d242-48a8-9d1b-7ca438fc38aa", "DetectTime": "2024-05-21T12:26:08.531415+00:00", "EventTime": "2024-05-21T12:26:08.531432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNDSb83NSEiqoFQoj2"], "accumulated_threat_level": 10.600000000000001, "timewindow": 22} +{"Format": "IDEA0", "ID": "a8d14b30-fb1c-4a79-bb51-ccaf4a67bf9c", "DetectTime": "2024-05-21T12:26:08.542989+00:00", "EventTime": "2024-05-21T12:26:08.543009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdq0xjaLppGQvzGi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e74cdc13-d8ff-44dd-93d9-c034e67f3b91", "DetectTime": "2024-05-21T12:26:08.610449+00:00", "EventTime": "2024-05-21T12:26:08.610471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQk0as1aSH7K4XGpDj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "de966e85-cb28-4657-ac66-ea858a02006d", "DetectTime": "2024-05-21T12:26:08.634219+00:00", "EventTime": "2024-05-21T12:26:08.634238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSXwB36LVvwfh5cTi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e8526224-0b45-4a05-8496-347ddb2bd152", "DetectTime": "2024-05-21T12:26:08.659677+00:00", "EventTime": "2024-05-21T12:26:08.659697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKVji1athfkiOfb99"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "fcb40a0e-cff5-453b-bd50-b42695a32b96", "DetectTime": "2024-05-21T12:26:08.683402+00:00", "EventTime": "2024-05-21T12:26:08.683424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clu9Wo3AWIp1QUPc02"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c312eb0e-b99f-4e55-b981-dc8c9aa0a415", "DetectTime": "2024-05-21T12:26:08.710256+00:00", "EventTime": "2024-05-21T12:26:08.710278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4N7e124c2aoWOImkh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "b3c251d9-3a22-4f7e-bb8c-c4662ed4bf5b", "DetectTime": "2024-05-21T12:26:08.737628+00:00", "EventTime": "2024-05-21T12:26:08.737648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ajmi108sJP10rgql"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "f5d32adc-58ac-4430-8edf-7c7cedc81204", "DetectTime": "2024-05-21T12:26:08.756571+00:00", "EventTime": "2024-05-21T12:26:08.756591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.191.16.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPtGe4jjEF0YuN28j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "045d6ab8-9b64-404b-8116-777dc7301856", "DetectTime": "2024-05-21T12:26:08.798863+00:00", "EventTime": "2024-05-21T12:26:08.798883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcCJ9E3CuigDzpjh6k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "72bb9253-6fae-46be-a8ea-66a605434036", "DetectTime": "2024-05-21T12:26:08.820076+00:00", "EventTime": "2024-05-21T12:26:08.820099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.253.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCUtw2baoBXewwkog"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "0e7899a8-4517-461d-950e-2c2dce3c4c2a", "DetectTime": "2024-05-21T12:26:09.056249+00:00", "EventTime": "2024-05-21T12:26:09.056373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRILxw2Ox7tfBvWsL6"], "accumulated_threat_level": 11.400000000000002, "timewindow": 22} +{"Format": "IDEA0", "ID": "5ea442e8-9ee8-475c-a770-3f00608dcbe3", "DetectTime": "2024-05-21T12:26:09.070091+00:00", "EventTime": "2024-05-21T12:26:09.070112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxuhiU1d7rCXt6RBff"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "6ba0d3cd-12f3-4526-ab1b-bb2b3f734581", "DetectTime": "2024-05-21T12:26:09.097693+00:00", "EventTime": "2024-05-21T12:26:09.097713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNtYt1LwieSywoVRj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "f422905b-d959-454c-a5f8-b40ccb6c457d", "DetectTime": "2024-05-21T12:26:09.116910+00:00", "EventTime": "2024-05-21T12:26:09.116929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2O01I2nR5VR3ZTBO3"], "accumulated_threat_level": 12.200000000000003, "timewindow": 22} +{"Format": "Json", "ID": "f422905b-d959-454c-a5f8-b40ccb6c457d", "DetectTime": "2024-05-21T12:26:09.116910+00:00", "EventTime": "2024-05-21T12:26:09.116929+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "1970-01-01T21:23:37.161852+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2024/05/21 12:26:09.340013)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 22, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "1bdc9004-fef3-4647-8ba1-5d1eae747281", "DetectTime": "2024-05-21T12:26:09.344657+00:00", "EventTime": "2024-05-21T12:26:09.344679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTQI6gyHak3dwwgi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "932cbc95-4522-4a06-a638-162e152dcf0f", "DetectTime": "2024-05-21T12:26:09.357875+00:00", "EventTime": "2024-05-21T12:26:09.357894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "Connection to unknown destination port 1318/UDP destination IP 31.192.3.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEVLc21BbmB5axLsj"], "accumulated_threat_level": 0.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "71f3ab99-f3dc-43a7-b4ea-bfffd5265f27", "DetectTime": "2024-05-21T12:26:09.407500+00:00", "EventTime": "2024-05-21T12:26:09.407519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIU8B4Y0SBvmsnlbk"], "accumulated_threat_level": 1.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "f1fd2d5a-bacc-4f9c-9540-df883a78c962", "DetectTime": "2024-05-21T12:26:09.428855+00:00", "EventTime": "2024-05-21T12:26:09.428876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtPCDOxiNn5VK958"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 22} +{"Format": "IDEA0", "ID": "2f4bf452-a12a-40d9-ba63-bb7b71944832", "DetectTime": "2024-05-21T12:26:09.465396+00:00", "EventTime": "2024-05-21T12:26:09.465414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COd1Ad16Fufdxxnnjc"], "accumulated_threat_level": 3.2, "timewindow": 22} +{"Format": "IDEA0", "ID": "a8bd176f-5fd7-4c9f-96c8-2dd789d1c2b1", "DetectTime": "2024-05-21T12:26:09.491054+00:00", "EventTime": "2024-05-21T12:26:09.491073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrZZj455MJalYJJPk"], "accumulated_threat_level": 4.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "22346621-94e8-4df6-aead-ff772be231fc", "DetectTime": "2024-05-21T12:26:09.502368+00:00", "EventTime": "2024-05-21T12:26:09.502387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSmLS10XhDkeBkgSf"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "7c936999-82d9-465e-aa5e-49d2ddb259f7", "DetectTime": "2024-05-21T12:26:09.513786+00:00", "EventTime": "2024-05-21T12:26:09.513808+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSmLS10XhDkeBkgSf"], "accumulated_threat_level": 1.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "9b2b970d-c8b6-4ed2-88a5-0ca2aa8c21b5", "DetectTime": "2024-05-21T12:26:09.529112+00:00", "EventTime": "2024-05-21T12:26:09.529130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vX6g1P9EHcHxMZS7"], "accumulated_threat_level": 4.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "548d5b2a-738e-4a9b-8818-a993144de958", "DetectTime": "2024-05-21T12:26:09.622708+00:00", "EventTime": "2024-05-21T12:26:09.622728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyyLUg1sUHHRzgunV5"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "cad66ecb-fc6b-47d9-8b2b-d28083f1b903", "DetectTime": "2024-05-21T12:26:09.637399+00:00", "EventTime": "2024-05-21T12:26:09.637421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.202.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCaWjBeVZWBvTnVN"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "751a0af9-4a19-43d5-823a-e7b0d9dfc8c5", "DetectTime": "2024-05-21T12:26:09.660795+00:00", "EventTime": "2024-05-21T12:26:09.660815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "Connection to unknown destination port 3181/UDP destination IP 31.192.30.121. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAf9Be3rCHFixzfgRi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 22} +{"Format": "IDEA0", "ID": "0549d20d-4cf1-40f1-8c75-1e0c6f1f3805", "DetectTime": "2024-05-21T12:26:09.687129+00:00", "EventTime": "2024-05-21T12:26:09.687150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLlBnB35oeGutjYymd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 22} +{"Format": "IDEA0", "ID": "a355ff1d-7737-435d-aaa2-b514ba7eced4", "DetectTime": "2024-05-21T12:26:09.701487+00:00", "EventTime": "2024-05-21T12:26:09.701509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNKyG4dmXuVV2Wknh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "4981b682-652e-4263-a051-9452a53a379c", "DetectTime": "2024-05-21T12:26:09.724432+00:00", "EventTime": "2024-05-21T12:26:09.724452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Qf0v1HWdZeVIZbg9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "80b57e02-34ba-4817-8272-18ebb18c5029", "DetectTime": "2024-05-21T12:26:09.745015+00:00", "EventTime": "2024-05-21T12:26:09.745035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca111X3EfXYHKI57sh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e2397d40-a469-44d9-9cd1-4627062c6831", "DetectTime": "2024-05-21T12:26:09.767962+00:00", "EventTime": "2024-05-21T12:26:09.767985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBShJp1GJpSiTmoc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "53b84f6d-bcb1-4947-afd0-da431cb8dab9", "DetectTime": "2024-05-21T12:26:09.792456+00:00", "EventTime": "2024-05-21T12:26:09.792477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtueBJCrJDkAi9Ic4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "9c1ce800-00a8-434c-9f56-fecc6a6de849", "DetectTime": "2024-05-21T12:26:09.825416+00:00", "EventTime": "2024-05-21T12:26:09.825436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkmlr2AirSerWUB87"], "accumulated_threat_level": 7.999999999999999, "timewindow": 22} +{"Format": "IDEA0", "ID": "bf66b658-0c2b-40a6-b5a3-41a4206f35dd", "DetectTime": "2024-05-21T12:26:09.830396+00:00", "EventTime": "2024-05-21T12:26:09.830436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccd9Uv1nlYRg5zMoQ8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "d5466694-fc76-4ec8-af44-61ffb1121d9d", "DetectTime": "2024-05-21T12:26:09.853118+00:00", "EventTime": "2024-05-21T12:26:09.853142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJrnYeCT7TpxgRc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ee1d380a-dec4-4601-9dc0-85c8aa139dec", "DetectTime": "2024-05-21T12:26:09.871636+00:00", "EventTime": "2024-05-21T12:26:09.871655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiX1j11938iugerWmh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 22} +{"Format": "IDEA0", "ID": "607e3c86-f151-4998-9771-eb6f2ecd5b86", "DetectTime": "2024-05-21T12:26:09.902147+00:00", "EventTime": "2024-05-21T12:26:09.902167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNxxq3jcbNEEzIo12"], "accumulated_threat_level": 9.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "13b88732-2f47-4648-829a-940ce72f3317", "DetectTime": "2024-05-21T12:26:09.906801+00:00", "EventTime": "2024-05-21T12:26:09.906819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.57.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Za494HKYS7DFKjna"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "0160ae4b-323f-40b9-b8c8-cbd421878287", "DetectTime": "2024-05-21T12:26:09.927652+00:00", "EventTime": "2024-05-21T12:26:09.927673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwDWE1EpqMhUWXhJ"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "a11e6437-a5fb-4701-9a2c-b01c122503b3", "DetectTime": "2024-05-21T12:26:09.946887+00:00", "EventTime": "2024-05-21T12:26:09.946907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBY11x4GWxSU3BDaP7"], "accumulated_threat_level": 10.4, "timewindow": 22} +{"Format": "IDEA0", "ID": "b5a8e255-80d1-4485-a3c5-375eaa6684fe", "DetectTime": "2024-05-21T12:26:09.971413+00:00", "EventTime": "2024-05-21T12:26:09.971433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfemI3Lg3CJeLnFT2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 22} +{"Format": "IDEA0", "ID": "4394c47c-daa6-43b4-96b6-ef73066b21da", "DetectTime": "2024-05-21T12:26:09.988391+00:00", "EventTime": "2024-05-21T12:26:09.988410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CABBGIQ0YvjEfDwLf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "f44b6e23-dafe-4d51-b8ee-374796bfa990", "DetectTime": "2024-05-21T12:26:10.010727+00:00", "EventTime": "2024-05-21T12:26:10.010747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyFoXD4QDffV3Cshtf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 22} +{"Format": "Json", "ID": "f44b6e23-dafe-4d51-b8ee-374796bfa990", "DetectTime": "2024-05-21T12:26:10.010727+00:00", "EventTime": "2024-05-21T12:26:10.010747+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "1970-01-01T21:24:13.759771+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2024/05/21 12:26:10.148290)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 22, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e92c61f1-2847-4655-b62f-a36fef23c54a", "DetectTime": "2024-05-21T12:26:10.160264+00:00", "EventTime": "2024-05-21T12:26:10.160284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORZ6027lW1ttyQZr8"], "accumulated_threat_level": 0.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "15a8c794-c4be-4195-955b-41c5124d2856", "DetectTime": "2024-05-21T12:26:10.337222+00:00", "EventTime": "2024-05-21T12:26:10.337241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vGa31Xyu8LbVNGFi"], "accumulated_threat_level": 1.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "5bf9d8f8-9d37-4a7f-99a4-a072b8277d66", "DetectTime": "2024-05-21T12:26:10.342210+00:00", "EventTime": "2024-05-21T12:26:10.342229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUeI13zgKk90X8b99"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "3c9e8e8a-9e50-4154-9168-a27edbab40b0", "DetectTime": "2024-05-21T12:26:10.347213+00:00", "EventTime": "2024-05-21T12:26:10.347232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQImuw1kmc95zggqvh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "da375f82-1c9e-4d57-b1b8-794720cdc672", "DetectTime": "2024-05-21T12:26:10.351755+00:00", "EventTime": "2024-05-21T12:26:10.351772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.161.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zt8U3D1i53tnsXsa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "a4e27e93-0989-427c-a034-1ffa681741fb", "DetectTime": "2024-05-21T12:26:10.356492+00:00", "EventTime": "2024-05-21T12:26:10.356511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqxCK1yV62kYU74mc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "44d5b62a-1ea6-4984-8627-d80dae16ddaa", "DetectTime": "2024-05-21T12:26:10.409204+00:00", "EventTime": "2024-05-21T12:26:10.409226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNtH43FQUK0RjUdz6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 22} +{"Format": "IDEA0", "ID": "95140f01-2ab1-42cc-a1d7-38bd9b9b78d0", "DetectTime": "2024-05-21T12:26:10.437319+00:00", "EventTime": "2024-05-21T12:26:10.437338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiqlDF6ANKu1OfYb"], "accumulated_threat_level": 3.2, "timewindow": 22} +{"Format": "IDEA0", "ID": "0681464b-4c12-41c6-b8d2-ccde25a75315", "DetectTime": "2024-05-21T12:26:10.466743+00:00", "EventTime": "2024-05-21T12:26:10.466765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCYjb3AAr1ceyBMEi"], "accumulated_threat_level": 4.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "231376d7-4fb7-45f6-9942-01bf84cb0343", "DetectTime": "2024-05-21T12:26:10.515560+00:00", "EventTime": "2024-05-21T12:26:10.515578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1MxqgSBVxFHrpQjb"], "accumulated_threat_level": 4.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "94df6b46-5b80-4c0f-9d0b-34dd39ad2f8b", "DetectTime": "2024-05-21T12:26:10.527158+00:00", "EventTime": "2024-05-21T12:26:10.527179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwlM82rEzvNig68Ed", "CU9tXj4QFlwS8zknZd", "C7zZ3n2juv9M6snh9", "C4LRfh3hQG5djKSZD2"], "accumulated_threat_level": 5.3, "timewindow": 22} +{"Format": "IDEA0", "ID": "cb5f0193-9c13-479b-8fc5-c3a66b15b40a", "DetectTime": "2024-05-21T12:26:10.606677+00:00", "EventTime": "2024-05-21T12:26:10.606700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqKHi171s9UQ8ImMd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "faf82aa3-6f4a-4d79-8353-9b43c78044c8", "DetectTime": "2024-05-21T12:26:11.172134+00:00", "EventTime": "2024-05-21T12:26:11.172154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.57.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeOf01oEAunjyW5Ik"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e802f6b5-f40e-4a2c-a061-4c11e6e6a181", "DetectTime": "2024-05-21T12:26:11.478592+00:00", "EventTime": "2024-05-21T12:26:11.478612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJKOX2vjUogp2i131", "C5yMU33mfWDuMrfFj3", "Cle65r4AoRPbw3YrF3", "CTqxZb26jAcfrmIcsb"], "accumulated_threat_level": 5.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "070cd737-1e50-4feb-9aec-48645e50b476", "DetectTime": "2024-05-21T12:26:11.713162+00:00", "EventTime": "2024-05-21T12:26:11.713298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.162.252.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxyNRC156tDYmyKJoj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e3164366-46eb-403b-94a5-351cc7c1f8fa", "DetectTime": "2024-05-21T12:26:11.756395+00:00", "EventTime": "2024-05-21T12:26:11.756417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.172.99.119 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppPAYSOrVQ2gQ476"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "0fec0eb5-d0d5-4f2d-9990-37530d3161dc", "DetectTime": "2024-05-21T12:26:11.957082+00:00", "EventTime": "2024-05-21T12:26:11.957104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.191.16.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C08lJW1N87T4ciP80e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "541d50dd-cad7-4b84-bfaf-c3689c9b818e", "DetectTime": "2024-05-21T12:26:12.200073+00:00", "EventTime": "2024-05-21T12:26:12.200096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.253.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbezN91YWIlQSFQKNf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "69a2b81c-e12b-45b1-b803-91e1ba63adaf", "DetectTime": "2024-05-21T12:26:12.483409+00:00", "EventTime": "2024-05-21T12:26:12.483432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.202.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDogfv12JjPWZSC2dj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "2fa9b5f9-debc-4691-a443-7364c0f76ef7", "DetectTime": "2024-05-21T12:26:12.530554+00:00", "EventTime": "2024-05-21T12:26:12.530575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptwNF4wDVYR3fPzKe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "5ae0b56d-a5bb-4af3-9a64-444edfb1a90f", "DetectTime": "2024-05-21T12:26:12.551641+00:00", "EventTime": "2024-05-21T12:26:12.551661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.161.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6oQocdmTLM9rbpW4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "0a68c6b3-88a0-4885-be79-900859dab344", "DetectTime": "2024-05-21T12:26:12.570839+00:00", "EventTime": "2024-05-21T12:26:12.570858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpnroq44chSCwP99t9"], "accumulated_threat_level": 6.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "6027c4f7-2be5-4186-9e7b-84e9ed4d771d", "DetectTime": "2024-05-21T12:26:12.605246+00:00", "EventTime": "2024-05-21T12:26:12.605267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crb8OSbPbZkFIg4we"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 22} +{"Format": "IDEA0", "ID": "61407bbb-f74e-44ee-a62f-c9023dfa8214", "DetectTime": "2024-05-21T12:26:12.805230+00:00", "EventTime": "2024-05-21T12:26:12.805252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywDKm1o54Pju0qfpj", "CPJwSKO0m2FzI55P1", "COmQs6w7RxpSanrfk", "CL1iAX3uxwJxQhFKf6"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 22} +{"Format": "IDEA0", "ID": "2e38ef8d-dbc0-4a71-bd46-2660d22d3a3e", "DetectTime": "2024-05-21T12:26:12.841871+00:00", "EventTime": "2024-05-21T12:26:12.841889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4S4q2RZSdKtBQTo1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "86055de8-3f65-481f-9639-118a273556d5", "DetectTime": "2024-05-21T12:26:12.858102+00:00", "EventTime": "2024-05-21T12:26:12.858121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEhwW1UyDXIic5b48"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "0fe0f011-fb16-4717-9c1c-f1146467c8ca", "DetectTime": "2024-05-21T12:26:12.862784+00:00", "EventTime": "2024-05-21T12:26:12.862802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTZgkb4VOteDjTF4R2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "874f39c3-abce-4afd-86f8-6c8e47167254", "DetectTime": "2024-05-21T12:26:12.904124+00:00", "EventTime": "2024-05-21T12:26:12.904145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zmkg4Rrs8TjLAIw5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "df22154f-3c7d-404a-af53-d006a5fe6f99", "DetectTime": "2024-05-21T12:26:12.919771+00:00", "EventTime": "2024-05-21T12:26:12.919789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTX5Dw1XhcLoB0kXT9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "8c04ed1d-8cb7-4f7d-8da4-12c7e5a53f4f", "DetectTime": "2024-05-21T12:26:12.944667+00:00", "EventTime": "2024-05-21T12:26:12.944686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRsM82ySYMrEm0z4i"], "accumulated_threat_level": 8.7, "timewindow": 22} +{"Format": "IDEA0", "ID": "0a87ee98-5611-47d7-8d56-94cdcc18c337", "DetectTime": "2024-05-21T12:26:12.968860+00:00", "EventTime": "2024-05-21T12:26:12.968881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUK5E44YasG2bFT902"], "accumulated_threat_level": 9.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "b8e8d1ec-9442-45b0-b685-032b2bfcb7dc", "DetectTime": "2024-05-21T12:26:12.982924+00:00", "EventTime": "2024-05-21T12:26:12.982943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6sP0vmVCIfDJpICc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "02d5666a-aece-4fe1-88a0-9c85e5bdddae", "DetectTime": "2024-05-21T12:26:13.012287+00:00", "EventTime": "2024-05-21T12:26:13.012322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4YQB72FTUmZnSmOoa"], "accumulated_threat_level": 10.3, "timewindow": 22} +{"Format": "IDEA0", "ID": "01e5b127-b0d6-4940-8e19-46ffe9204edf", "DetectTime": "2024-05-21T12:26:13.027222+00:00", "EventTime": "2024-05-21T12:26:13.027244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFzASqDQUeXDs0Uca"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "378329e7-70ad-48aa-91f4-a830922e8a10", "DetectTime": "2024-05-21T12:26:13.051576+00:00", "EventTime": "2024-05-21T12:26:13.051595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2AVL1uG5bQqI5U2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "80af1033-c8e4-496e-8a36-27298a72a1de", "DetectTime": "2024-05-21T12:26:13.062310+00:00", "EventTime": "2024-05-21T12:26:13.062329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14R3SxV78mbUMjo2"], "accumulated_threat_level": 11.100000000000001, "timewindow": 22} +{"Format": "IDEA0", "ID": "bf5a0a23-3d35-45d2-aeb8-089e760d42ce", "DetectTime": "2024-05-21T12:26:13.085452+00:00", "EventTime": "2024-05-21T12:26:13.085472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQqnrznY8UQjl9P4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c21b570b-7217-49d5-bb0d-2d28508174b6", "DetectTime": "2024-05-21T12:26:13.101490+00:00", "EventTime": "2024-05-21T12:26:13.101510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKsAQQkPlOWTOIU2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ab165b2e-c87d-4d3c-a68b-f419924c52d3", "DetectTime": "2024-05-21T12:26:13.154389+00:00", "EventTime": "2024-05-21T12:26:13.154425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnvsh299HkA99B9Ee"], "accumulated_threat_level": 11.900000000000002, "timewindow": 22} +{"Format": "IDEA0", "ID": "48bbecf5-8b05-435c-a37a-a1088b66b3dc", "DetectTime": "2024-05-21T12:26:13.197444+00:00", "EventTime": "2024-05-21T12:26:13.197464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMuir32TCFyrHVjyIh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "144c96e9-09a3-490f-bba2-b14912392912", "DetectTime": "2024-05-21T12:26:13.224246+00:00", "EventTime": "2024-05-21T12:26:13.224264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme68f3BwKK3BduMB1"], "accumulated_threat_level": 12.700000000000003, "timewindow": 22} +{"Format": "Json", "ID": "144c96e9-09a3-490f-bba2-b14912392912", "DetectTime": "2024-05-21T12:26:13.224246+00:00", "EventTime": "2024-05-21T12:26:13.224264+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "1970-01-01T21:56:28.608558+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2024/05/21 12:26:13.532625)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 22, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "a4614977-3559-4c12-bf76-295060a97cd2", "DetectTime": "2024-05-21T12:26:13.536770+00:00", "EventTime": "2024-05-21T12:26:13.536787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4RJ1W3kWSaTiBpowk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "a827b36c-532b-4083-8b21-0f06007c89cd", "DetectTime": "2024-05-21T12:26:13.552091+00:00", "EventTime": "2024-05-21T12:26:13.552108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7bkhXntvU7Axj86"], "accumulated_threat_level": 0.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "c777e190-0f95-4fe2-9bb0-826bed910a75", "DetectTime": "2024-05-21T12:26:13.556587+00:00", "EventTime": "2024-05-21T12:26:13.556609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXdtInLpVN52drl6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "8fd7a2a2-8643-41e9-9655-144b7a050cac", "DetectTime": "2024-05-21T12:26:13.572403+00:00", "EventTime": "2024-05-21T12:26:13.572422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcyCIrHfH8QHgvILe"], "accumulated_threat_level": 1.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "bcefa114-871d-4035-a713-32a7f0bf69e5", "DetectTime": "2024-05-21T12:26:13.576821+00:00", "EventTime": "2024-05-21T12:26:13.576838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT13ms4hv52EUVT3i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "3708dd24-15fa-4ef7-9aab-4a2bcdc7c736", "DetectTime": "2024-05-21T12:26:13.581254+00:00", "EventTime": "2024-05-21T12:26:13.581273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKxuw4M1yuOQbrqwc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ea2e37b2-c871-4aa0-861b-cc3536872fa5", "DetectTime": "2024-05-21T12:26:13.586450+00:00", "EventTime": "2024-05-21T12:26:13.586472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn3MDbGbZYnQ3qExk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "44e52548-95e1-4193-a880-1553733ed9cd", "DetectTime": "2024-05-21T12:26:13.596972+00:00", "EventTime": "2024-05-21T12:26:13.596989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiVfA4gTNG5ibs0xk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 22} +{"Format": "IDEA0", "ID": "15ea9896-eb9d-4630-8802-bdc9b95c2e20", "DetectTime": "2024-05-21T12:26:13.607178+00:00", "EventTime": "2024-05-21T12:26:13.607196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsI6oe36PVJrWLt45"], "accumulated_threat_level": 3.2, "timewindow": 22} +{"Format": "IDEA0", "ID": "a54d2c2d-4289-4a3b-83c2-6a34de9227c2", "DetectTime": "2024-05-21T12:26:13.616986+00:00", "EventTime": "2024-05-21T12:26:13.617004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTS2b3Tv85l5yJngl"], "accumulated_threat_level": 4.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "e604c358-539c-4075-9c4f-f3eb68dfc95d", "DetectTime": "2024-05-21T12:26:13.622201+00:00", "EventTime": "2024-05-21T12:26:13.622224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCvC8iR89Gf3gpE6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "a3fdf29d-be34-4325-980c-0f4eb4903918", "DetectTime": "2024-05-21T12:26:13.627223+00:00", "EventTime": "2024-05-21T12:26:13.627241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.55.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ocAIAEoOwMF6mGi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e497b56e-b7c5-42d5-87c4-c1d29c764996", "DetectTime": "2024-05-21T12:26:13.635437+00:00", "EventTime": "2024-05-21T12:26:13.635459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY58nh4PbCmBt8g46d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "b6d49d7c-b303-442b-8c0e-56ddbeceda62", "DetectTime": "2024-05-21T12:26:13.647565+00:00", "EventTime": "2024-05-21T12:26:13.647584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3JYDdCTXa5wCvjl"], "accumulated_threat_level": 4.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "e701f156-9729-437a-b631-caa4a3827a11", "DetectTime": "2024-05-21T12:26:13.652542+00:00", "EventTime": "2024-05-21T12:26:13.652559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRFkh2qEEJObbkQ91"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "02cd6470-1042-4146-bd8c-97e958deaa0b", "DetectTime": "2024-05-21T12:26:13.855241+00:00", "EventTime": "2024-05-21T12:26:13.855260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.193.222.108"]}], "Attach": [{"Content": "Connection to unknown destination port 3981/UDP destination IP 107.193.222.108. AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCN3pI29LE6cdVLpCd"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "3729a3e9-a33a-4520-abe4-2e21397641f7", "DetectTime": "2024-05-21T12:26:13.860618+00:00", "EventTime": "2024-05-21T12:26:13.860639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xWSp4cpXhp87Y898"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "6b2c0249-f8db-4b42-a71a-f3ce8dda486d", "DetectTime": "2024-05-21T12:26:13.889495+00:00", "EventTime": "2024-05-21T12:26:13.889514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHuKq2hGNHpMOwO36"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 22} +{"Format": "IDEA0", "ID": "1574f8c6-a72e-4bfa-a0d3-ed75a33218f4", "DetectTime": "2024-05-21T12:26:13.913113+00:00", "EventTime": "2024-05-21T12:26:13.913132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs1JUp9uP10OWrwd1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 22} +{"Format": "IDEA0", "ID": "c4b86f20-4efa-4ea9-8307-7d9f54dffa71", "DetectTime": "2024-05-21T12:26:13.929958+00:00", "EventTime": "2024-05-21T12:26:13.929976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6UqtxaSym4EY8Dl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "ed65ddc1-6418-4a10-a9d0-d241bf49168f", "DetectTime": "2024-05-21T12:26:13.957859+00:00", "EventTime": "2024-05-21T12:26:13.957879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoVm54psuiOyJsQ95"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "21d0255b-74ba-4e0e-907f-951ef45ca87c", "DetectTime": "2024-05-21T12:26:13.976515+00:00", "EventTime": "2024-05-21T12:26:13.976535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.231.146"]}], "Attach": [{"Content": "Connection to unknown destination port 11453/UDP destination IP 78.188.231.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjVzA2QYPfNTS2tEl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 22} +{"Format": "IDEA0", "ID": "a3bf4ef1-e427-4e16-b310-a3f09b6b2c5d", "DetectTime": "2024-05-21T12:26:13.991747+00:00", "EventTime": "2024-05-21T12:26:13.991769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGm6Uw398an8f7KKyj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "f1ef7e33-101d-424a-8753-c1247df3e204", "DetectTime": "2024-05-21T12:26:14.018071+00:00", "EventTime": "2024-05-21T12:26:14.018090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoZcO33g47zEaO68"], "accumulated_threat_level": 8.799999999999999, "timewindow": 22} +{"Format": "IDEA0", "ID": "a08f923c-a9dc-4a39-8262-15867f64ff47", "DetectTime": "2024-05-21T12:26:14.023828+00:00", "EventTime": "2024-05-21T12:26:14.023848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPlb9Lj5We3CdJpYg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e0f5fbbc-a1da-4c87-85d0-bf225bf72a73", "DetectTime": "2024-05-21T12:26:14.065317+00:00", "EventTime": "2024-05-21T12:26:14.065336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.120.125"]}], "Attach": [{"Content": "Connection to unknown destination port 17516/UDP destination IP 31.146.120.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceffsa4bioiRIXBHAk"], "accumulated_threat_level": 9.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "1ef6a0ad-90cc-4627-b388-f57436ce60ce", "DetectTime": "2024-05-21T12:26:14.070096+00:00", "EventTime": "2024-05-21T12:26:14.070113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce4BQj2uuG6vI1yLQ8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "3fd603de-441a-4c1c-97e4-0b29cf6e10e2", "DetectTime": "2024-05-21T12:26:14.098608+00:00", "EventTime": "2024-05-21T12:26:14.098627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdqvvePzf8PQUSO2"], "accumulated_threat_level": 10.4, "timewindow": 22} +{"Format": "IDEA0", "ID": "750920dd-dd79-4ab3-bbf1-6946ed3c273e", "DetectTime": "2024-05-21T12:26:14.158385+00:00", "EventTime": "2024-05-21T12:26:14.158403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwtft91UK34Tclp4Sd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 22} +{"Format": "IDEA0", "ID": "7c3dd183-c5e6-41a9-be8e-1cf4e1e435e1", "DetectTime": "2024-05-21T12:26:14.186938+00:00", "EventTime": "2024-05-21T12:26:14.186958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6E96Z2HLX2LoIJIp2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 22} +{"Format": "Json", "ID": "7c3dd183-c5e6-41a9-be8e-1cf4e1e435e1", "DetectTime": "2024-05-21T12:26:14.186938+00:00", "EventTime": "2024-05-21T12:26:14.186958+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "1970-01-01T21:57:09.648496+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2024/05/21 12:26:14.447072)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 22, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "97d0ec5c-4ef2-4e54-a098-5876a50f8c26", "DetectTime": "2024-05-21T12:26:14.458249+00:00", "EventTime": "2024-05-21T12:26:14.458271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMYki2OvMub85Rab"], "accumulated_threat_level": 0.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "2ea39815-cfcf-4cd5-b1a1-1576d4a7f50a", "DetectTime": "2024-05-21T12:26:14.468268+00:00", "EventTime": "2024-05-21T12:26:14.468286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XmwuqxltByiJ0g"], "accumulated_threat_level": 1.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "6850f443-e6da-410f-9a3c-8e3660812533", "DetectTime": "2024-05-21T12:26:14.478368+00:00", "EventTime": "2024-05-21T12:26:14.478385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMcCEm27R1Oa5Nogkk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 22} +{"Format": "IDEA0", "ID": "650af309-87eb-4405-a315-8dad1d7b9d6d", "DetectTime": "2024-05-21T12:26:14.488271+00:00", "EventTime": "2024-05-21T12:26:14.488289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6j8Li3nUfWMbfnxUf"], "accumulated_threat_level": 3.2, "timewindow": 22} +{"Format": "IDEA0", "ID": "5599afbe-9a12-4bd8-9a1b-0cb4713dcb50", "DetectTime": "2024-05-21T12:26:14.499523+00:00", "EventTime": "2024-05-21T12:26:14.499546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cro5VM2WlGZ5lJfE0j"], "accumulated_threat_level": 4.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "22276a2a-3d9b-4c3b-a5c9-8aad806dc89d", "DetectTime": "2024-05-21T12:26:14.510261+00:00", "EventTime": "2024-05-21T12:26:14.510280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTHGyHtNIWd8wPIJ5"], "accumulated_threat_level": 4.8, "timewindow": 22} +{"Format": "IDEA0", "ID": "a230e9f7-f68f-4e01-802a-f2a1b98b687a", "DetectTime": "2024-05-21T12:26:14.520631+00:00", "EventTime": "2024-05-21T12:26:14.520650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJosPXxWrdFJD5SLf"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "e5e10ef3-1555-48fa-8dbf-e082e06439c9", "DetectTime": "2024-05-21T12:26:14.525456+00:00", "EventTime": "2024-05-21T12:26:14.525477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKPjU1O7NrSHSYxtd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "fe7843dc-8842-43bf-88a6-05666c053412", "DetectTime": "2024-05-21T12:26:14.530311+00:00", "EventTime": "2024-05-21T12:26:14.530329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfefO1mWewMlqdY7k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "92d94bf2-6c9a-426f-ad30-f23043a14849", "DetectTime": "2024-05-21T12:26:14.534756+00:00", "EventTime": "2024-05-21T12:26:14.534774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxOvb4jbYWCRAMfc2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "107ef8a1-2330-4ef2-a496-f6c8ca9b3d95", "DetectTime": "2024-05-21T12:26:14.545453+00:00", "EventTime": "2024-05-21T12:26:14.545470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55zKx3RrvKmXL9SV9"], "accumulated_threat_level": 0.8, "timewindow": 23} +{"Format": "IDEA0", "ID": "30726a67-792c-4b6b-aedf-79fdf8d9132d", "DetectTime": "2024-05-21T12:26:14.549806+00:00", "EventTime": "2024-05-21T12:26:14.549823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLK7G1pOGEeVxsWOk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "dec4861b-ab02-41a6-9a59-cda1ef05e295", "DetectTime": "2024-05-21T12:26:14.554026+00:00", "EventTime": "2024-05-21T12:26:14.554042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP3W2n1aq411XxOzv9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "f72ccd9c-2613-4445-8efa-ea43fa4522f6", "DetectTime": "2024-05-21T12:26:14.558581+00:00", "EventTime": "2024-05-21T12:26:14.558599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6c2FlP1U5oSFefGk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "06b45328-6747-465d-bad4-d19cc742be37", "DetectTime": "2024-05-21T12:26:14.567775+00:00", "EventTime": "2024-05-21T12:26:14.567795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmNMv447Omn68uFC4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "6ec58d10-b06f-4312-937a-b470767539f4", "DetectTime": "2024-05-21T12:26:14.601573+00:00", "EventTime": "2024-05-21T12:26:14.601593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coxxeo4uqsrjl6U53d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "94225f54-7691-4fba-9750-2921d9c21613", "DetectTime": "2024-05-21T12:26:14.632250+00:00", "EventTime": "2024-05-21T12:26:14.632269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdKyC41GRozHFHRxW4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "c7b05cf6-dd7c-4c2e-8d1e-6f5011ea4c52", "DetectTime": "2024-05-21T12:26:14.665323+00:00", "EventTime": "2024-05-21T12:26:14.665342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9BhzPjVkA0IottHf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "afb7a7ef-5cbd-4e46-9cc8-2e1da0561a40", "DetectTime": "2024-05-21T12:26:14.702827+00:00", "EventTime": "2024-05-21T12:26:14.702850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKel43Rnc6c9eysya"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "6084bfcd-7315-4f55-89b2-aa2aa0a5e358", "DetectTime": "2024-05-21T12:26:14.744676+00:00", "EventTime": "2024-05-21T12:26:14.744699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9dja1ObymZY7oIjh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "7316c985-7f1c-437a-b1b1-7306b64154cc", "DetectTime": "2024-05-21T12:26:14.874367+00:00", "EventTime": "2024-05-21T12:26:14.874388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.57.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdjq938006r3MVqQi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "9c975696-bb65-4348-82a6-dd17ffa4d0db", "DetectTime": "2024-05-21T12:26:14.887679+00:00", "EventTime": "2024-05-21T12:26:14.887700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCEbU3EIhG62PhId6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "7971556f-8cce-4a80-a717-1674609839a3", "DetectTime": "2024-05-21T12:26:14.909935+00:00", "EventTime": "2024-05-21T12:26:14.909955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKMn01eGm6kOttQ82"], "accumulated_threat_level": 8.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "727ea0ab-5240-42b1-938d-71709b95a498", "DetectTime": "2024-05-21T12:26:15.350243+00:00", "EventTime": "2024-05-21T12:26:15.350264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfvxCK31I4ZXtpgEpk", "C18dql4dvdueA87f19", "CLKG5bbQZjqRTF9re", "CDUOKI3geAQ6bOmN5l"], "accumulated_threat_level": 1.3, "timewindow": 23} +{"Format": "IDEA0", "ID": "e16e395e-4681-419a-b45b-cdb5cf3a672b", "DetectTime": "2024-05-21T12:26:15.540202+00:00", "EventTime": "2024-05-21T12:26:15.540225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApUaf4C0gZyeesCCb"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "9942a009-ae42-4aaf-904b-c15c50a99a78", "DetectTime": "2024-05-21T12:26:15.905682+00:00", "EventTime": "2024-05-21T12:26:15.905702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwtd669ZAuSDCywph"], "accumulated_threat_level": 2.1, "timewindow": 23} +{"Format": "IDEA0", "ID": "254c6540-8130-4d6a-b989-20ef8ae8c7ea", "DetectTime": "2024-05-21T12:26:15.932117+00:00", "EventTime": "2024-05-21T12:26:15.932135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbupED1dHecAive9Uf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 23} +{"Format": "IDEA0", "ID": "1efabe8f-91a2-476e-a308-c64bdbd5dc41", "DetectTime": "2024-05-21T12:26:16.016291+00:00", "EventTime": "2024-05-21T12:26:16.016311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4cAekmjuAhHSYV8"], "accumulated_threat_level": 3.7, "timewindow": 23} +{"Format": "IDEA0", "ID": "bf12b41e-454f-465d-a7ea-754560e89803", "DetectTime": "2024-05-21T12:26:16.276551+00:00", "EventTime": "2024-05-21T12:26:16.276568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.57.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkP994L1YWwUq1R7k"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "650bd5aa-3649-47e9-ab1a-6c4d40d1d596", "DetectTime": "2024-05-21T12:26:16.281029+00:00", "EventTime": "2024-05-21T12:26:16.281050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.162.252.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZEnrZJEs0rDJtV3"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "424a373b-2aa3-4b49-a8c0-a035c8ffcb95", "DetectTime": "2024-05-21T12:26:16.306691+00:00", "EventTime": "2024-05-21T12:26:16.306712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce3iPz4NtS1cVKyTq8"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "7df929d8-86ea-4714-9426-74b52e8928c8", "DetectTime": "2024-05-21T12:26:16.327713+00:00", "EventTime": "2024-05-21T12:26:16.327731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.182"]}], "Attach": [{"Content": "Connection to unknown destination port 5457/UDP destination IP 82.211.180.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwN0Bm4YVyEpCZ9zY1"], "accumulated_threat_level": 4.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "bd4512a5-eec8-468e-82e3-96578e9f8a0b", "DetectTime": "2024-05-21T12:26:16.353081+00:00", "EventTime": "2024-05-21T12:26:16.353099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoFSg4WaUph2emtb4"], "accumulated_threat_level": 5.3, "timewindow": 23} +{"Format": "IDEA0", "ID": "6a78afbb-ad0d-4b68-9815-b91395dffd8d", "DetectTime": "2024-05-21T12:26:16.385461+00:00", "EventTime": "2024-05-21T12:26:16.385480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co75FQ1KywTKDaojsk"], "accumulated_threat_level": 6.1, "timewindow": 23} +{"Format": "IDEA0", "ID": "f09acee3-bad0-4ecf-b811-d80836688544", "DetectTime": "2024-05-21T12:26:16.411251+00:00", "EventTime": "2024-05-21T12:26:16.411269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBd70N1HaFPI7P4rC6"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 23} +{"Format": "IDEA0", "ID": "3c2bb243-161b-4ba5-90bf-93a2cdd0a5c8", "DetectTime": "2024-05-21T12:26:16.441170+00:00", "EventTime": "2024-05-21T12:26:16.441189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX72n12pbYwxgk6Swg"], "accumulated_threat_level": 7.699999999999999, "timewindow": 23} +{"Format": "IDEA0", "ID": "8fc233d4-e548-4904-b0ee-2c68ad3fbaea", "DetectTime": "2024-05-21T12:26:16.464594+00:00", "EventTime": "2024-05-21T12:26:16.464614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvYnp3gyspcM133S6"], "accumulated_threat_level": 8.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "1d595397-4e03-473f-aede-3930382eb27f", "DetectTime": "2024-05-21T12:26:16.473725+00:00", "EventTime": "2024-05-21T12:26:16.473746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWiu5xGsn5SCA1Na"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "bde9fe82-75ee-41dc-8b67-218c375fdbcd", "DetectTime": "2024-05-21T12:26:16.576934+00:00", "EventTime": "2024-05-21T12:26:16.576958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeqEc3i1EYK2WeUP9"], "accumulated_threat_level": 9.3, "timewindow": 23} +{"Format": "IDEA0", "ID": "90283a0a-430e-45d8-bb00-de44fe2b53ae", "DetectTime": "2024-05-21T12:26:16.596908+00:00", "EventTime": "2024-05-21T12:26:16.596931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuwobp4c2Tb6oEG2Dh"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "090a8144-87d9-4ec0-a9b4-0e9a5013da5a", "DetectTime": "2024-05-21T12:26:16.601893+00:00", "EventTime": "2024-05-21T12:26:16.601913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusbSz3D1f315gcm6j"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "d892d3e7-bf55-4c1d-a9b6-8981d1692ccb", "DetectTime": "2024-05-21T12:26:16.632163+00:00", "EventTime": "2024-05-21T12:26:16.632183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6b7vn3stYjJkykNV"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "30f0da56-dbe3-46c9-80f0-dbc281f313e7", "DetectTime": "2024-05-21T12:26:16.649002+00:00", "EventTime": "2024-05-21T12:26:16.649024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZqaM71BRZ0Zl4cKb7"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "334d1f2e-8f09-485e-98d3-7142d0b0d2c5", "DetectTime": "2024-05-21T12:26:16.692111+00:00", "EventTime": "2024-05-21T12:26:16.692130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTilg41bXHLljg78k"], "accumulated_threat_level": 10.100000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "a036f29f-d4c6-4e9f-bcc4-e1ce1bc40dd4", "DetectTime": "2024-05-21T12:26:16.706702+00:00", "EventTime": "2024-05-21T12:26:16.706723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2oPGcvHEBZxAA3g"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "6d7170de-d616-4326-b77d-971ae0599fe3", "DetectTime": "2024-05-21T12:26:16.721331+00:00", "EventTime": "2024-05-21T12:26:16.721350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCNglt45R6W5VoyDp3"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "315ec737-2cdd-4c48-9446-cd11dc1bf3ed", "DetectTime": "2024-05-21T12:26:16.749109+00:00", "EventTime": "2024-05-21T12:26:16.749126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7Y1U1dMfiAVKtkV3"], "accumulated_threat_level": 10.900000000000002, "timewindow": 23} +{"Format": "IDEA0", "ID": "24d729d1-4e27-4afe-a896-68d00b403baf", "DetectTime": "2024-05-21T12:26:16.810677+00:00", "EventTime": "2024-05-21T12:26:16.810697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCf604SX75nidMaY6"], "accumulated_threat_level": 11.700000000000003, "timewindow": 23} +{"Format": "IDEA0", "ID": "1ce0cd88-bcb6-49af-ad06-ac77d367503d", "DetectTime": "2024-05-21T12:26:16.836568+00:00", "EventTime": "2024-05-21T12:26:16.836585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtGie3ERDO6uLrl2d"], "accumulated_threat_level": 12.500000000000004, "timewindow": 23} +{"Format": "Json", "ID": "1ce0cd88-bcb6-49af-ad06-ac77d367503d", "DetectTime": "2024-05-21T12:26:16.836568+00:00", "EventTime": "2024-05-21T12:26:16.836585+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "1970-01-01T22:28:51.663479+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 23. (real time 2024/05/21 12:26:17.021833)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 23, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "89b2105c-504f-4791-8fc4-d90dbc885160", "DetectTime": "2024-05-21T12:26:17.034364+00:00", "EventTime": "2024-05-21T12:26:17.034382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmKgN2j3y6mQ7SoKf"], "accumulated_threat_level": 0.8, "timewindow": 23} +{"Format": "IDEA0", "ID": "17b5943e-0bf0-4257-9900-c60814cc6153", "DetectTime": "2024-05-21T12:26:17.044405+00:00", "EventTime": "2024-05-21T12:26:17.044422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "Connection to unknown destination port 12661/UDP destination IP 188.169.156.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcecG92chiWaWhFpD5"], "accumulated_threat_level": 1.6, "timewindow": 23} +{"Format": "IDEA0", "ID": "93ba1f88-958b-4628-beab-17cbc3ad7428", "DetectTime": "2024-05-21T12:26:17.059999+00:00", "EventTime": "2024-05-21T12:26:17.060017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVtnL3RLk78bahgIb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 23} +{"Format": "IDEA0", "ID": "fe0a8870-f3ce-4899-b1ed-a1f26eab40a4", "DetectTime": "2024-05-21T12:26:17.070174+00:00", "EventTime": "2024-05-21T12:26:17.070192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdUrp8NsvFiyfELl"], "accumulated_threat_level": 3.2, "timewindow": 23} +{"Format": "IDEA0", "ID": "cc278a08-a436-4dbd-bc7b-07a0c94d3c1f", "DetectTime": "2024-05-21T12:26:17.074997+00:00", "EventTime": "2024-05-21T12:26:17.075015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSg6v2XGGoccwsS55"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "57aef544-96c3-450c-94c3-f1d1a6afed81", "DetectTime": "2024-05-21T12:26:17.099917+00:00", "EventTime": "2024-05-21T12:26:17.099936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAoBy2eDAodRiiCgc"], "accumulated_threat_level": 4.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "8d7a2de5-b30c-434f-b36b-7e221e51a300", "DetectTime": "2024-05-21T12:26:17.135949+00:00", "EventTime": "2024-05-21T12:26:17.135968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "Connection to unknown destination port 19831/UDP destination IP 88.235.44.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFk4YF3kD5T3VcYIlf"], "accumulated_threat_level": 4.8, "timewindow": 23} +{"Format": "IDEA0", "ID": "38a51ef9-ce79-4bbb-ad63-f66e7a865c95", "DetectTime": "2024-05-21T12:26:17.162195+00:00", "EventTime": "2024-05-21T12:26:17.162213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "Connection to unknown destination port 12439/UDP destination IP 41.68.167.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48gPc2UTo27Oashj6"], "accumulated_threat_level": 5.6, "timewindow": 23} +{"Format": "IDEA0", "ID": "2ef04713-bda2-4315-9242-bdb7c0b70abc", "DetectTime": "2024-05-21T12:26:17.198077+00:00", "EventTime": "2024-05-21T12:26:17.198102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgBWB1uxS51iq6kIh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 23} +{"Format": "IDEA0", "ID": "abcda5fb-bff8-4880-ba03-75ba64321708", "DetectTime": "2024-05-21T12:26:17.219223+00:00", "EventTime": "2024-05-21T12:26:17.219241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlXjb4cdm870pWGE9"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "83d77699-07f3-4285-9811-1bfc67b87f71", "DetectTime": "2024-05-21T12:26:17.248100+00:00", "EventTime": "2024-05-21T12:26:17.248118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NLmm3jEbRa9hPKdh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 23} +{"Format": "IDEA0", "ID": "14c9a8e9-c1f1-4072-b068-e5bc21ad74ab", "DetectTime": "2024-05-21T12:26:17.276792+00:00", "EventTime": "2024-05-21T12:26:17.276814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2A9X2WcC029bAS62"], "accumulated_threat_level": 7.999999999999999, "timewindow": 23} +{"Format": "IDEA0", "ID": "1a0c2169-556e-444f-be15-21ca04266448", "DetectTime": "2024-05-21T12:26:17.307185+00:00", "EventTime": "2024-05-21T12:26:17.307203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.190.93.78"]}], "Attach": [{"Content": "Connection to unknown destination port 28569/UDP destination IP 78.190.93.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSZC92uw4kUqtC1d7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 23} +{"Format": "IDEA0", "ID": "8f975a53-81d9-4bac-a990-361e1973872f", "DetectTime": "2024-05-21T12:26:17.335812+00:00", "EventTime": "2024-05-21T12:26:17.335832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemPYHbO3zxUnjUT8"], "accumulated_threat_level": 9.6, "timewindow": 23} +{"Format": "IDEA0", "ID": "4a4d29d1-0536-4f91-81bd-36786552e475", "DetectTime": "2024-05-21T12:26:17.354788+00:00", "EventTime": "2024-05-21T12:26:17.354809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkRH54pw71Zl90Fbl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "8139bd86-da34-4b5b-b271-65ebdf4ee1ff", "DetectTime": "2024-05-21T12:26:17.380479+00:00", "EventTime": "2024-05-21T12:26:17.380498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdvWqe35GjNI99KZm3"], "accumulated_threat_level": 10.4, "timewindow": 23} +{"Format": "IDEA0", "ID": "3cce65bf-1ce6-4abd-9e1d-e0598331fc1f", "DetectTime": "2024-05-21T12:26:17.399460+00:00", "EventTime": "2024-05-21T12:26:17.399483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co21UTTVbvj2zWi1a"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "f3338a83-9a99-4834-9d93-b685be763170", "DetectTime": "2024-05-21T12:26:17.466952+00:00", "EventTime": "2024-05-21T12:26:17.466975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUBqZ3WGbkUA6eBC5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "e5dab5dd-261a-4e30-99c3-5bfc0307169f", "DetectTime": "2024-05-21T12:26:17.493034+00:00", "EventTime": "2024-05-21T12:26:17.493055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYKl94rVXDePYHhD1"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "58a255ab-9153-4b2b-b84d-ca87dbddc9a8", "DetectTime": "2024-05-21T12:26:17.790178+00:00", "EventTime": "2024-05-21T12:26:17.790203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrl4B2hnyow99alI4"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "c2d116a2-0280-4339-b888-0b5734f3a4cf", "DetectTime": "2024-05-21T12:26:17.795224+00:00", "EventTime": "2024-05-21T12:26:17.795243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiVWZ23qdQjR3eDJg"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "a9fb4053-1be3-441c-bc41-b26a0f407f62", "DetectTime": "2024-05-21T12:26:17.832273+00:00", "EventTime": "2024-05-21T12:26:17.832295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKOSv14AJ2bmF0BJ9h"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "dee674fc-6a05-43ac-babd-c19b33f3a08d", "DetectTime": "2024-05-21T12:26:17.837257+00:00", "EventTime": "2024-05-21T12:26:17.837276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJGJOZz1xjBJuEQJ"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "11c79e3d-ea28-43f4-b12a-b8f6f1d9645e", "DetectTime": "2024-05-21T12:26:17.848555+00:00", "EventTime": "2024-05-21T12:26:17.848573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwYREs3DkZHj24VINb"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "0f88445b-3889-41c0-a546-d391f2dcbf41", "DetectTime": "2024-05-21T12:26:17.859940+00:00", "EventTime": "2024-05-21T12:26:17.859958+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwYREs3DkZHj24VINb"], "accumulated_threat_level": 1.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "76375cc2-d890-4577-84de-af49661bc138", "DetectTime": "2024-05-21T12:26:17.864785+00:00", "EventTime": "2024-05-21T12:26:17.864803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMkgK3c9Ueiskagj5"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "fd09d9cf-4dde-42e4-86da-5544fffa529a", "DetectTime": "2024-05-21T12:26:17.869264+00:00", "EventTime": "2024-05-21T12:26:17.869282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSqx14goU3etbYOL2"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "a1222cdf-4dca-454e-b684-3fef8d8d10a0", "DetectTime": "2024-05-21T12:26:17.948948+00:00", "EventTime": "2024-05-21T12:26:17.948969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Prfa80xjAVJIgJ8"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "3324ba04-fbbf-4951-920a-e6fcf057e730", "DetectTime": "2024-05-21T12:26:17.963267+00:00", "EventTime": "2024-05-21T12:26:17.963288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTU3943CVlpYi256Z9"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "0d594cb5-a425-4e46-84a1-5590e09672d8", "DetectTime": "2024-05-21T12:26:17.977076+00:00", "EventTime": "2024-05-21T12:26:17.977093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["66.63.204.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18NwbYNnArOavlhc"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "04ee133c-224c-4782-9256-d5bd567c1e6d", "DetectTime": "2024-05-21T12:26:17.991337+00:00", "EventTime": "2024-05-21T12:26:17.991355+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["66.63.204.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 66.63.204.26 from 10.0.2.19. AS: BIRCH-TELECOM AS16526 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18NwbYNnArOavlhc"], "accumulated_threat_level": 2.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "0e962170-d7d1-479e-9206-11fca6cefded", "DetectTime": "2024-05-21T12:26:17.996061+00:00", "EventTime": "2024-05-21T12:26:17.996079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.55.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6grL32vj5ZR4mTiVf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "473e8eba-6bf1-4f3b-9652-4df88e6e90f2", "DetectTime": "2024-05-21T12:26:18.000936+00:00", "EventTime": "2024-05-21T12:26:18.000955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1ShdTT7grM5Ql14"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "fa77a1d0-482e-4c4a-905b-c9a3b2e43d49", "DetectTime": "2024-05-21T12:26:18.023717+00:00", "EventTime": "2024-05-21T12:26:18.023737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvCyY3mVHmIduk8u3"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "b0f2956b-6284-444b-92d2-d8c374af818a", "DetectTime": "2024-05-21T12:26:18.042945+00:00", "EventTime": "2024-05-21T12:26:18.042965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDiifFQOxVhMAU0Y6"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "f6b95e3b-9840-480d-9a72-2282f49cd620", "DetectTime": "2024-05-21T12:26:18.053160+00:00", "EventTime": "2024-05-21T12:26:18.053180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45CiA20n6AMH6VM02"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "6bc14f80-e1fc-4dc9-860c-00f3dd9a7d3b", "DetectTime": "2024-05-21T12:26:18.058074+00:00", "EventTime": "2024-05-21T12:26:18.058093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5FNXA3HXW8EqZGiT5", "CwG97T2fk0Th0CWo7i", "CzJnip4ABMdjwPybre", "CFoJFz3kM1qA8aXic"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "bc2cfd2c-f520-49ee-b23a-47434c1315d7", "DetectTime": "2024-05-21T12:26:18.079430+00:00", "EventTime": "2024-05-21T12:26:18.079450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8KXkX39g1bdEBGDfi"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "268bfade-29a2-4caf-8f7f-6eb28b3968bf", "DetectTime": "2024-05-21T12:26:18.113802+00:00", "EventTime": "2024-05-21T12:26:18.113823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX59hbuQuTsiDro6"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "1934a59b-76cb-4eb4-a527-6642643d38d7", "DetectTime": "2024-05-21T12:26:18.134903+00:00", "EventTime": "2024-05-21T12:26:18.134925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXuqKd27j1FBioTphf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "44005b8e-044c-434b-b833-2c3e8db65fe2", "DetectTime": "2024-05-21T12:26:18.152237+00:00", "EventTime": "2024-05-21T12:26:18.152259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6nF720rDwce4HBbi"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "93f4e72f-6bc9-4b69-a4bb-b7079a5ee218", "DetectTime": "2024-05-21T12:26:18.183524+00:00", "EventTime": "2024-05-21T12:26:18.183546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crln974vf9E6Lbr2Yb"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "e0642cfa-3a34-4497-934c-8819bdd913e3", "DetectTime": "2024-05-21T12:26:18.202018+00:00", "EventTime": "2024-05-21T12:26:18.202040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLM1hC2FI7r0apFfd3"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "3ed4c497-27d3-4bc9-9e71-dd139104d40f", "DetectTime": "2024-05-21T12:26:18.216547+00:00", "EventTime": "2024-05-21T12:26:18.216565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6zmh4C7IEfkDH03d"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "dae15b9e-2d74-46d9-9db6-e3511dd6ff35", "DetectTime": "2024-05-21T12:26:18.221864+00:00", "EventTime": "2024-05-21T12:26:18.221882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwmaur4SvREMnZ6Mlf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "dd163f66-16a9-4796-bcb8-ef48054df466", "DetectTime": "2024-05-21T12:26:18.235807+00:00", "EventTime": "2024-05-21T12:26:18.235826+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6zmh4C7IEfkDH03d"], "accumulated_threat_level": 2.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "42e0975b-5d7d-4dd1-b710-7caf888bfc93", "DetectTime": "2024-05-21T12:26:18.240432+00:00", "EventTime": "2024-05-21T12:26:18.240450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAU5g1WSXpvwG26Qd"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "1b311ae8-3e83-4472-b3e2-76996a486a4a", "DetectTime": "2024-05-21T12:26:18.272865+00:00", "EventTime": "2024-05-21T12:26:18.272885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9oaj1M9lVxGh5DIl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "f463478c-1fb7-4a2b-ba50-38b07c397cf3", "DetectTime": "2024-05-21T12:26:18.284342+00:00", "EventTime": "2024-05-21T12:26:18.284361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coe4e55AHKHODuXaa"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "ce4389a0-f15e-4ab0-bbda-3fcf7c0a7d8c", "DetectTime": "2024-05-21T12:26:18.324371+00:00", "EventTime": "2024-05-21T12:26:18.324392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBEPg4lhEQzcq5DAl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "f8cba7b8-1e1b-4ad6-8d77-b017a7d64ba2", "DetectTime": "2024-05-21T12:26:18.329299+00:00", "EventTime": "2024-05-21T12:26:18.329320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2naSQ3hP8rE07rn2"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "f7955d58-b949-48bf-b186-95e6e046b76d", "DetectTime": "2024-05-21T12:26:18.347844+00:00", "EventTime": "2024-05-21T12:26:18.347864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.168.10.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3KFzp3B8pLZoHmgy8"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "e5fd093a-9ea1-4063-a377-9c0c28e0cbec", "DetectTime": "2024-05-21T12:26:18.361280+00:00", "EventTime": "2024-05-21T12:26:18.361299+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.168.10.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.168.10.20 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-168-10-20.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3KFzp3B8pLZoHmgy8"], "accumulated_threat_level": 3.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "8a0244b9-3b71-48d4-87ae-70d5b7109b49", "DetectTime": "2024-05-21T12:26:18.366215+00:00", "EventTime": "2024-05-21T12:26:18.366233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzTFv1zF8DMUHZWx1"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "9a1ffd79-feb0-48de-92bd-676293832d58", "DetectTime": "2024-05-21T12:26:18.375199+00:00", "EventTime": "2024-05-21T12:26:18.375221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOhhR24C920nBBzH6"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "6bd64808-76be-48eb-b366-beb4218f2795", "DetectTime": "2024-05-21T12:26:18.394290+00:00", "EventTime": "2024-05-21T12:26:18.394308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64VdQ1BLC4EfS4qFe"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "a65f1fff-989a-461a-a578-c4c68c5e9242", "DetectTime": "2024-05-21T12:26:18.475734+00:00", "EventTime": "2024-05-21T12:26:18.475756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnj1K21Tby2h7d16bl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "7aadc9b1-267b-4a74-82b7-b2c56be252b9", "DetectTime": "2024-05-21T12:26:18.911486+00:00", "EventTime": "2024-05-21T12:26:18.911504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMDTHl3tbkLZP6kZXi"], "accumulated_threat_level": 0.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c165b3f7-3af0-4bfd-8844-6ec6feb36a29", "DetectTime": "2024-05-21T12:26:18.939760+00:00", "EventTime": "2024-05-21T12:26:18.939781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSOMm3CkT1XvG6GH7"], "accumulated_threat_level": 1.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "e71b8b66-25fc-49c3-97d0-429c1cbf8f7e", "DetectTime": "2024-05-21T12:26:18.969473+00:00", "EventTime": "2024-05-21T12:26:18.969492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11097/UDP destination IP 83.31.89.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tthCkmS9fdDriJf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 24} +{"Format": "IDEA0", "ID": "51581faf-01f3-47bf-bf2f-3461b8b5b0ae", "DetectTime": "2024-05-21T12:26:19.007596+00:00", "EventTime": "2024-05-21T12:26:19.007618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMilV1OQgf0SkopKe"], "accumulated_threat_level": 3.2, "timewindow": 24} +{"Format": "IDEA0", "ID": "243f02e7-0e30-45f8-b497-a1e5dd39fbe3", "DetectTime": "2024-05-21T12:26:19.068105+00:00", "EventTime": "2024-05-21T12:26:19.068128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.162.252.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoUIa1WLErUdUCA9h"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "7030da79-2bb0-4807-b6bf-b7a67e8b16b5", "DetectTime": "2024-05-21T12:26:19.124361+00:00", "EventTime": "2024-05-21T12:26:19.124381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.240.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dXef4bl1zPgxUJVd"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "909e6cd7-36a7-42cc-82ce-21f5092e9d42", "DetectTime": "2024-05-21T12:26:19.137224+00:00", "EventTime": "2024-05-21T12:26:19.137245+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoBqTk14C6Ryc6Vf27"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "e6c0c52d-7a56-407e-8602-3e2eacf57306", "DetectTime": "2024-05-21T12:26:19.147969+00:00", "EventTime": "2024-05-21T12:26:19.147987+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoBqTk14C6Ryc6Vf27"], "accumulated_threat_level": 3.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "a21ead56-d903-4a8a-a62e-28ee4c0e4752", "DetectTime": "2024-05-21T12:26:19.186855+00:00", "EventTime": "2024-05-21T12:26:19.186875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0nWKq4LHy0Kgi9fse", "CGrmP74VIM7U8vjdS9", "CI97xr2KQQUJhdx9Y7", "CaFKGm26frOSCuA7ql"], "accumulated_threat_level": 3.7, "timewindow": 24} +{"Format": "IDEA0", "ID": "c2320aae-8b83-45b9-85b7-45c9d9b5d070", "DetectTime": "2024-05-21T12:26:19.323043+00:00", "EventTime": "2024-05-21T12:26:19.323064+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtUTs2tIhe6YeYVSk"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "b4688fb8-9398-4ba4-b7e8-25f76440b57a", "DetectTime": "2024-05-21T12:26:19.336621+00:00", "EventTime": "2024-05-21T12:26:19.336639+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtUTs2tIhe6YeYVSk"], "accumulated_threat_level": 4.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "cd267784-42c3-41bd-aca2-45de3666bafc", "DetectTime": "2024-05-21T12:26:19.389177+00:00", "EventTime": "2024-05-21T12:26:19.389196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY0Jn1Uzxjtucwy1"], "accumulated_threat_level": 4.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "0acad2bd-e57e-4a03-9704-adeaa0dc09cd", "DetectTime": "2024-05-21T12:26:19.424384+00:00", "EventTime": "2024-05-21T12:26:19.424407+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl93Xv1lRmWb2hTCQ7"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "d0597457-823d-44b5-bf54-96d5bfdd9cb0", "DetectTime": "2024-05-21T12:26:19.436121+00:00", "EventTime": "2024-05-21T12:26:19.436140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl93Xv1lRmWb2hTCQ7"], "accumulated_threat_level": 4.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "e8436184-dc16-4f95-9ed2-efe74a6fc142", "DetectTime": "2024-05-21T12:26:19.452424+00:00", "EventTime": "2024-05-21T12:26:19.452446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E3yw4uOerBLy7yr3"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "369b99fd-3182-4dc8-8067-e5618a4121e3", "DetectTime": "2024-05-21T12:26:19.498402+00:00", "EventTime": "2024-05-21T12:26:19.498435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiyFy3iAUsFcOQUak"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "55fdca87-f3bc-4d7e-aafc-1720bc1313f3", "DetectTime": "2024-05-21T12:26:19.518820+00:00", "EventTime": "2024-05-21T12:26:19.518839+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpQZ43GSFbAQ2G8Nb"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "c6d06d43-fcc7-4811-9620-eb4933bcb533", "DetectTime": "2024-05-21T12:26:19.531815+00:00", "EventTime": "2024-05-21T12:26:19.531836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpQZ43GSFbAQ2G8Nb"], "accumulated_threat_level": 5.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "41b3d572-5a70-45aa-be89-3834380cbef1", "DetectTime": "2024-05-21T12:26:19.544230+00:00", "EventTime": "2024-05-21T12:26:19.544247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtiHy2gOCDa0qS3Ng"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "2b0e6b6e-b6ed-4ed1-a7be-3cb9842271e0", "DetectTime": "2024-05-21T12:26:19.556707+00:00", "EventTime": "2024-05-21T12:26:19.556726+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtiHy2gOCDa0qS3Ng"], "accumulated_threat_level": 5.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "0278920a-849a-405a-8975-29f339c3148f", "DetectTime": "2024-05-21T12:26:19.586300+00:00", "EventTime": "2024-05-21T12:26:19.586319+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.173.193.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzP8aZYreyWWFGE1"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "403a8d8f-77d7-4919-9560-bf51934161ea", "DetectTime": "2024-05-21T12:26:19.599060+00:00", "EventTime": "2024-05-21T12:26:19.599080+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.173.193.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.173.193.63 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzP8aZYreyWWFGE1"], "accumulated_threat_level": 6.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "b1e96082-b4e2-4a5c-b0c6-6b5a2784ce98", "DetectTime": "2024-05-21T12:26:19.639599+00:00", "EventTime": "2024-05-21T12:26:19.639617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.21.73.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx524x3xta1Kp25vMl"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "94819567-ff69-4e49-96c8-f203412509fc", "DetectTime": "2024-05-21T12:26:19.652304+00:00", "EventTime": "2024-05-21T12:26:19.652325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.21.73.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.21.73.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx524x3xta1Kp25vMl"], "accumulated_threat_level": 6.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "2f12ad47-8171-4122-a76b-8a7450da2b4c", "DetectTime": "2024-05-21T12:26:19.779937+00:00", "EventTime": "2024-05-21T12:26:19.779958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItuvI3DU1Dv5McvZ7"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "bdd22e76-cf75-40c9-b366-2cb4775061db", "DetectTime": "2024-05-21T12:26:19.839652+00:00", "EventTime": "2024-05-21T12:26:19.839669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwodHC2otom0mklIbi"], "accumulated_threat_level": 5.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "be9eef65-2deb-4a01-acbb-ce8f647d3a2a", "DetectTime": "2024-05-21T12:26:19.844558+00:00", "EventTime": "2024-05-21T12:26:19.844576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNbP34VETALuoW3Fi"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "0263f3d6-bc72-4748-942d-6ff46fcd873d", "DetectTime": "2024-05-21T12:26:19.856574+00:00", "EventTime": "2024-05-21T12:26:19.856593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.57.162.209"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.57.162.209 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8bTZRIeUXOFa6Ai"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "e278cf3c-aead-4386-a01f-700c46639002", "DetectTime": "2024-05-21T12:26:19.861831+00:00", "EventTime": "2024-05-21T12:26:19.861851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWyIkFMutVSM9Avkk"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "4f73c26d-43af-4365-963d-60366a3c77af", "DetectTime": "2024-05-21T12:26:19.874610+00:00", "EventTime": "2024-05-21T12:26:19.874632+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.57.162.209"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.57.162.209 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8bTZRIeUXOFa6Ai"], "accumulated_threat_level": 7.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "17cff568-710e-486f-8332-65d5f9986ad7", "DetectTime": "2024-05-21T12:26:19.884382+00:00", "EventTime": "2024-05-21T12:26:19.884403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDaaI310Rjcs7hJU8c"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "0f24ad3a-5a3f-46f5-9c39-23c29895b23f", "DetectTime": "2024-05-21T12:26:19.901904+00:00", "EventTime": "2024-05-21T12:26:19.901922+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.210.133.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.210.133.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1SjS31rO5hdJSu3D"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "b404494e-c43e-4ad9-a523-d48cfcf63fe8", "DetectTime": "2024-05-21T12:26:19.914242+00:00", "EventTime": "2024-05-21T12:26:19.914260+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.210.133.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.210.133.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1SjS31rO5hdJSu3D"], "accumulated_threat_level": 7.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "aa72e625-23d3-4131-bb02-493f504f9607", "DetectTime": "2024-05-21T12:26:19.919187+00:00", "EventTime": "2024-05-21T12:26:19.919205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFT9PJ36nKCYidIAM6"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "d17a5418-751e-48ff-a021-9271d8806d08", "DetectTime": "2024-05-21T12:26:19.923636+00:00", "EventTime": "2024-05-21T12:26:19.923654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqWsx1Yh49IRuTGp7"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "903f324d-d8bd-45a9-b33b-8b59facb4018", "DetectTime": "2024-05-21T12:26:19.935694+00:00", "EventTime": "2024-05-21T12:26:19.935714+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.232.130"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6Yf33eDbAhZ1lPs6"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "946fbcf7-e6e3-47a1-9f2d-c381d2604c0c", "DetectTime": "2024-05-21T12:26:19.947194+00:00", "EventTime": "2024-05-21T12:26:19.947212+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.232.130"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6Yf33eDbAhZ1lPs6"], "accumulated_threat_level": 8.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "af610389-ff5f-46df-8844-0859abd5fc93", "DetectTime": "2024-05-21T12:26:19.958766+00:00", "EventTime": "2024-05-21T12:26:19.958784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbggtj4V2rESNsxC9i"], "accumulated_threat_level": 6.1, "timewindow": 24} +{"Format": "IDEA0", "ID": "1f160dee-68df-408d-b7c2-7a4aa333db61", "DetectTime": "2024-05-21T12:26:19.964357+00:00", "EventTime": "2024-05-21T12:26:19.964375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNY5y53mJeL6Q9MJX4"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "59bbd321-0e56-4163-8304-8faa565a086d", "DetectTime": "2024-05-21T12:26:19.976920+00:00", "EventTime": "2024-05-21T12:26:19.976940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDt4y84WKMV28yDh35"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "60a5a742-dfdd-476d-a7b2-c579aa958ff7", "DetectTime": "2024-05-21T12:26:20.002266+00:00", "EventTime": "2024-05-21T12:26:20.002289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "Connection to unknown destination port 5162/UDP destination IP 95.104.30.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rohf3uoFSNUDOTI6"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 24} +{"Format": "IDEA0", "ID": "5f182449-3682-4370-b798-c510926f6ffd", "DetectTime": "2024-05-21T12:26:20.028625+00:00", "EventTime": "2024-05-21T12:26:20.028644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvTAU2NflEnFbQTig"], "accumulated_threat_level": 7.699999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "d7814199-c147-4ee1-aa6d-58dbc0792430", "DetectTime": "2024-05-21T12:26:20.061203+00:00", "EventTime": "2024-05-21T12:26:20.061221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPohvp3pbQslVtNIoi"], "accumulated_threat_level": 8.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "a1ce7c2f-0143-44c5-87cd-81710befa5db", "DetectTime": "2024-05-21T12:26:20.087141+00:00", "EventTime": "2024-05-21T12:26:20.087162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnlBF19Vcn5FmUCE8"], "accumulated_threat_level": 9.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "0751b59b-0116-4b3f-819a-9a1ea6ebb4c0", "DetectTime": "2024-05-21T12:26:20.099304+00:00", "EventTime": "2024-05-21T12:26:20.099323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2eRiGtOESJaaLq2c"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "5c552b83-4d55-42de-9994-797b14354847", "DetectTime": "2024-05-21T12:26:20.118609+00:00", "EventTime": "2024-05-21T12:26:20.118631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYvKC29u903Cub7nh"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "ffae0db7-31a2-475d-9da6-9a4830aef2db", "DetectTime": "2024-05-21T12:26:20.140026+00:00", "EventTime": "2024-05-21T12:26:20.140047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBFGa2K8Ya0Dwpuj6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 24} +{"Format": "IDEA0", "ID": "befb0229-e9cd-40a9-88ad-bb26e055385a", "DetectTime": "2024-05-21T12:26:20.165867+00:00", "EventTime": "2024-05-21T12:26:20.165887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgA3j51MLSFoB6Pj"], "accumulated_threat_level": 10.900000000000002, "timewindow": 24} +{"Format": "IDEA0", "ID": "312fb193-e12a-4a45-bcaf-9eb719b9cb0e", "DetectTime": "2024-05-21T12:26:20.191579+00:00", "EventTime": "2024-05-21T12:26:20.191598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwu0Dz04gG7B5Zfb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 24} +{"Format": "IDEA0", "ID": "91149bef-eb31-4873-9322-6e3dbba86dea", "DetectTime": "2024-05-21T12:26:20.247593+00:00", "EventTime": "2024-05-21T12:26:20.247612+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgYbQo3YfDmQDQoFCa"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "fbcdf72a-c575-4dcc-a4e3-674c37e7d6ce", "DetectTime": "2024-05-21T12:26:20.259391+00:00", "EventTime": "2024-05-21T12:26:20.259409+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgYbQo3YfDmQDQoFCa"], "accumulated_threat_level": 8.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "5bbb924e-0e88-4a06-89ed-46f4d613f54c", "DetectTime": "2024-05-21T12:26:20.264366+00:00", "EventTime": "2024-05-21T12:26:20.264387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIoapCyS99NCahYCf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "f82beeba-2d66-467c-a1c2-ba6c135f30ff", "DetectTime": "2024-05-21T12:26:20.288219+00:00", "EventTime": "2024-05-21T12:26:20.288239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyawUl31WfrdTTrKfl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "9ed7cfde-053d-48d1-a71f-e4736cde059c", "DetectTime": "2024-05-21T12:26:20.308606+00:00", "EventTime": "2024-05-21T12:26:20.308625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh5ac3M4Yo0Zi03Xa"], "accumulated_threat_level": 12.500000000000004, "timewindow": 24} +{"Format": "Json", "ID": "9ed7cfde-053d-48d1-a71f-e4736cde059c", "DetectTime": "2024-05-21T12:26:20.308606+00:00", "EventTime": "2024-05-21T12:26:20.308625+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "1970-01-01T23:01:04.200674+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:26:20.797697)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "f417e6d7-b093-490f-b096-b45e6abe949e", "DetectTime": "2024-05-21T12:26:20.801683+00:00", "EventTime": "2024-05-21T12:26:20.801700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG5KR130JlOFGdro0j"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "e11f5b22-e11d-4a1e-b311-9ebc856afc58", "DetectTime": "2024-05-21T12:26:20.812392+00:00", "EventTime": "2024-05-21T12:26:20.812409+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.19.109.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.19.109.35 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQquC228mkt4hx8je7"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "77e91a08-77d4-4e9f-a76a-36691846a1f3", "DetectTime": "2024-05-21T12:26:20.823005+00:00", "EventTime": "2024-05-21T12:26:20.823023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.19.109.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.19.109.35 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQquC228mkt4hx8je7"], "accumulated_threat_level": 9.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "7fbdc8ec-e211-4b7c-abdf-e54304600ab9", "DetectTime": "2024-05-21T12:26:20.832827+00:00", "EventTime": "2024-05-21T12:26:20.832845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6ydPSeC95MJq258"], "accumulated_threat_level": 0.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6cac0359-0241-4e94-81d7-0ae34a1a4cce", "DetectTime": "2024-05-21T12:26:20.843288+00:00", "EventTime": "2024-05-21T12:26:20.843305+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.238.90.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.238.90.149 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCwCv7Ae8728FbVj"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "319363ab-93f2-4a78-b87f-e281a30c8ddc", "DetectTime": "2024-05-21T12:26:20.853602+00:00", "EventTime": "2024-05-21T12:26:20.853620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.238.90.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.238.90.149 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCwCv7Ae8728FbVj"], "accumulated_threat_level": 9.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "58cf6fd4-0f8f-4411-9f8c-b176ce7cba5b", "DetectTime": "2024-05-21T12:26:20.858281+00:00", "EventTime": "2024-05-21T12:26:20.858299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmKFbW3RtdQdAB7wCj"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "7a3cb801-79ab-492b-ba8c-9742afc9fd27", "DetectTime": "2024-05-21T12:26:20.862751+00:00", "EventTime": "2024-05-21T12:26:20.862768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGsp735ucRQzGIoK4"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "16b5aaef-978d-46e0-8adb-b1547a3bc809", "DetectTime": "2024-05-21T12:26:20.867336+00:00", "EventTime": "2024-05-21T12:26:20.867354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6SQax3b2dBeHsqaul"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "c1393891-17be-4115-bf5c-e8a236f68dd4", "DetectTime": "2024-05-21T12:26:20.878234+00:00", "EventTime": "2024-05-21T12:26:20.878253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci5osgAZX47pg6v9"], "accumulated_threat_level": 1.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "81ed7456-09db-4da5-8bc2-57fe22b7d658", "DetectTime": "2024-05-21T12:26:20.891730+00:00", "EventTime": "2024-05-21T12:26:20.891749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTlkU1lJhEtSP712f"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "de920ef1-eb46-4424-8ae9-3426e22052a2", "DetectTime": "2024-05-21T12:26:20.902744+00:00", "EventTime": "2024-05-21T12:26:20.902762+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTlkU1lJhEtSP712f"], "accumulated_threat_level": 10.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "e5d800e3-e487-45ba-a062-c483243e8137", "DetectTime": "2024-05-21T12:26:20.907406+00:00", "EventTime": "2024-05-21T12:26:20.907424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTIKtitJBDxEBcTzl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "d60aad76-230b-452c-b18c-74afcbfd181c", "DetectTime": "2024-05-21T12:26:20.929378+00:00", "EventTime": "2024-05-21T12:26:20.929394+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["172.190.235.230"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.235.230 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEnZl2bjbUJFfWHP2"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "b737ff0d-df28-409f-95b9-5350c664a969", "DetectTime": "2024-05-21T12:26:20.951849+00:00", "EventTime": "2024-05-21T12:26:20.951871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["172.190.235.230"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.235.230 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEnZl2bjbUJFfWHP2"], "accumulated_threat_level": 10.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "48a72761-1425-4b47-a927-6be3b1421ccf", "DetectTime": "2024-05-21T12:26:20.962986+00:00", "EventTime": "2024-05-21T12:26:20.963004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbYOh45hlX11UGgHk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 24} +{"Format": "IDEA0", "ID": "f66f0693-7736-4f55-8caa-b495e80e653e", "DetectTime": "2024-05-21T12:26:20.974117+00:00", "EventTime": "2024-05-21T12:26:20.974135+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.226.236.123"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.226.236.123 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXg1hE2F6lvCCyH8Ti"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "e7796d3a-d1ff-44cd-bf90-d4431ae433b2", "DetectTime": "2024-05-21T12:26:20.985437+00:00", "EventTime": "2024-05-21T12:26:20.985455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.226.236.123"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.226.236.123 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXg1hE2F6lvCCyH8Ti"], "accumulated_threat_level": 11.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "0667a293-4cd5-4d8d-b883-74282e7d7e99", "DetectTime": "2024-05-21T12:26:20.995962+00:00", "EventTime": "2024-05-21T12:26:20.995980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKO062bjcuzOtNEh8"], "accumulated_threat_level": 3.2, "timewindow": 24} +{"Format": "IDEA0", "ID": "b1014d14-c9b3-4955-984f-20fe8d0c67c2", "DetectTime": "2024-05-21T12:26:21.007032+00:00", "EventTime": "2024-05-21T12:26:21.007050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgLwR1sjuj2VHhdNc"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "56f6b24f-d135-4c99-97e0-f881129eceb8", "DetectTime": "2024-05-21T12:26:21.018308+00:00", "EventTime": "2024-05-21T12:26:21.018328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEN9i4oKQiiOdIzac"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "7fa1ced0-c819-4d95-8baf-082c6a28b8b2", "DetectTime": "2024-05-21T12:26:21.029659+00:00", "EventTime": "2024-05-21T12:26:21.029677+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.234.126.36"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.234.126.36 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTI4Ci2idaOQEuIIP6"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "14cb18a7-b6ae-4d10-86d0-e88ea6bafce0", "DetectTime": "2024-05-21T12:26:21.042985+00:00", "EventTime": "2024-05-21T12:26:21.043006+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.234.126.36"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.234.126.36 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTI4Ci2idaOQEuIIP6"], "accumulated_threat_level": 11.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "1da42099-5740-4212-ae06-bd9d04b1354c", "DetectTime": "2024-05-21T12:26:21.053931+00:00", "EventTime": "2024-05-21T12:26:21.053949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1f5z46sC4PZgQHJl"], "accumulated_threat_level": 5.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "82bf1895-3906-48d7-8b45-c5ecbb136eba", "DetectTime": "2024-05-21T12:26:21.058349+00:00", "EventTime": "2024-05-21T12:26:21.058366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja69xGHd71xM1oeb"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "4be299b2-57ff-4920-841a-a7d6dc3a6141", "DetectTime": "2024-05-21T12:26:21.062671+00:00", "EventTime": "2024-05-21T12:26:21.062688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDufkD4XE19kPuvMQf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "686a040c-1854-41a3-abfd-031981fb57e4", "DetectTime": "2024-05-21T12:26:21.067007+00:00", "EventTime": "2024-05-21T12:26:21.067025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNK9lKRU9emfGNnxl"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "0e6c169e-1ddd-433b-8658-f7584fe45696", "DetectTime": "2024-05-21T12:26:21.080050+00:00", "EventTime": "2024-05-21T12:26:21.080072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.67.131.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.67.131.119 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CytQFH2IzMS9OTtyo"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "6978527f-88b6-4648-8823-4d262cfd2a5a", "DetectTime": "2024-05-21T12:26:21.092340+00:00", "EventTime": "2024-05-21T12:26:21.092360+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.67.131.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.67.131.119 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CytQFH2IzMS9OTtyo"], "accumulated_threat_level": 12.0, "timewindow": 12} +{"Format": "Json", "ID": "6978527f-88b6-4648-8823-4d262cfd2a5a", "DetectTime": "2024-05-21T12:26:21.092340+00:00", "EventTime": "2024-05-21T12:26:21.092360+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.67.131.119"]}], "Attach": [{"Content": "1970-01-01T11:57:31.895832+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 12. (real time 2024/05/21 12:26:21.433525)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 12, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "244d8978-b466-4c12-99fd-55777a204f80", "DetectTime": "2024-05-21T12:26:21.437647+00:00", "EventTime": "2024-05-21T12:26:21.437666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOoQBYRBKHR4Ywpa"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "8c96312d-3d24-4ea1-8818-8c9565d962cc", "DetectTime": "2024-05-21T12:26:21.442104+00:00", "EventTime": "2024-05-21T12:26:21.442121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7wAz4w7Ge3pWhfR3"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "e7c84bd2-3141-4d75-8299-2755a0a1f893", "DetectTime": "2024-05-21T12:26:21.454792+00:00", "EventTime": "2024-05-21T12:26:21.454813+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["121.54.51.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 121.54.51.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOpQ1TyvspJzWpe7"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "edee640b-07db-428c-9fae-d4f1c85cf488", "DetectTime": "2024-05-21T12:26:21.466475+00:00", "EventTime": "2024-05-21T12:26:21.466494+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["121.54.51.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 121.54.51.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOpQ1TyvspJzWpe7"], "accumulated_threat_level": 0.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "84192a0c-2571-46f2-87d5-220c102ebc92", "DetectTime": "2024-05-21T12:26:21.471206+00:00", "EventTime": "2024-05-21T12:26:21.471224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.55.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2IKr4dZuKdaxp67g"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "1a98f0fc-d7db-4d13-bf93-ee30813cffcd", "DetectTime": "2024-05-21T12:26:21.475828+00:00", "EventTime": "2024-05-21T12:26:21.475846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NWqC4odPs2rJy4A4"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "6fe81300-bc13-463b-985a-e82bebb142d3", "DetectTime": "2024-05-21T12:26:21.492794+00:00", "EventTime": "2024-05-21T12:26:21.492810+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.19.92.194"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.19.92.194 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKJCRB4MPcZB3DIi"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "d5163ecc-7315-42f4-bad7-2ef811f30f17", "DetectTime": "2024-05-21T12:26:21.504550+00:00", "EventTime": "2024-05-21T12:26:21.504570+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.19.92.194"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.19.92.194 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKJCRB4MPcZB3DIi"], "accumulated_threat_level": 1.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "2d1d2d9b-fe47-4441-ae4d-9294f210bb9e", "DetectTime": "2024-05-21T12:26:21.509493+00:00", "EventTime": "2024-05-21T12:26:21.509513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8iI7r4Cj2WEDWPtFk"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "aab0497f-f840-4ae6-b0ef-6c300cdf282e", "DetectTime": "2024-05-21T12:26:21.521746+00:00", "EventTime": "2024-05-21T12:26:21.521764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.7.103.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiHod3Tgzjp36m3j2"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "1761035d-f214-4d00-a4d4-d3b89202115a", "DetectTime": "2024-05-21T12:26:21.533413+00:00", "EventTime": "2024-05-21T12:26:21.533431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.7.103.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.7.103.29 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiHod3Tgzjp36m3j2"], "accumulated_threat_level": 1.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "b78b281d-d1c9-4069-897b-007e6a202a3b", "DetectTime": "2024-05-21T12:26:21.545133+00:00", "EventTime": "2024-05-21T12:26:21.545150+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clh8ZJ2y3tK1C628qc"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "fd1ad001-8b5c-426b-a990-b49ceefd2dd6", "DetectTime": "2024-05-21T12:26:21.557569+00:00", "EventTime": "2024-05-21T12:26:21.557589+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clh8ZJ2y3tK1C628qc"], "accumulated_threat_level": 2.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "23a7c82a-2938-4455-86ab-6b2819950b77", "DetectTime": "2024-05-21T12:26:21.568994+00:00", "EventTime": "2024-05-21T12:26:21.569012+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.238.126.195"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.238.126.195 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaJIy3iiJvDkjKuZa"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "d5d87ad7-9588-4b85-9cb0-c0db1f5f2229", "DetectTime": "2024-05-21T12:26:21.581334+00:00", "EventTime": "2024-05-21T12:26:21.581356+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.238.126.195"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.238.126.195 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaJIy3iiJvDkjKuZa"], "accumulated_threat_level": 2.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "5df8f7bc-11b1-4ed0-af56-c5379bab568c", "DetectTime": "2024-05-21T12:26:21.596090+00:00", "EventTime": "2024-05-21T12:26:21.596111+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["80.140.209.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 80.140.209.239 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPvIf2G5WUTomBKEf"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "6df9b732-73c0-4acc-b0b0-97d277593600", "DetectTime": "2024-05-21T12:26:21.607452+00:00", "EventTime": "2024-05-21T12:26:21.607471+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["80.140.209.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 80.140.209.239 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPvIf2G5WUTomBKEf"], "accumulated_threat_level": 3.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "422c2e05-c530-432e-a133-d319f15cdec5", "DetectTime": "2024-05-21T12:26:21.618010+00:00", "EventTime": "2024-05-21T12:26:21.618028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7N6J2UI5dPHrq4oc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 24} +{"Format": "IDEA0", "ID": "b9f98313-e595-477f-b654-65084dc2e634", "DetectTime": "2024-05-21T12:26:21.622610+00:00", "EventTime": "2024-05-21T12:26:21.622628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQudqk80eWco3hK6"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "3ab76bc4-daa3-4035-920c-879c3fd53c86", "DetectTime": "2024-05-21T12:26:21.633636+00:00", "EventTime": "2024-05-21T12:26:21.633654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlWj2p6CR2RO4mDh"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "0b69a0f2-2ebf-4acb-8786-fbe0d08e9cdf", "DetectTime": "2024-05-21T12:26:21.637984+00:00", "EventTime": "2024-05-21T12:26:21.638002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7njF38533L7p4q4l"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "22dd7440-ca81-4c97-b584-1e9d315abdfe", "DetectTime": "2024-05-21T12:26:21.642389+00:00", "EventTime": "2024-05-21T12:26:21.642420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9z2cZXiDov59oSod"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "3d014178-3880-4364-89c9-649b2c955705", "DetectTime": "2024-05-21T12:26:21.653683+00:00", "EventTime": "2024-05-21T12:26:21.653700+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["175.138.219.91"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 175.138.219.91 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjaqp376l18ySA9J8"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "94c23eea-0448-41b3-b192-f6a021874a88", "DetectTime": "2024-05-21T12:26:21.664698+00:00", "EventTime": "2024-05-21T12:26:21.664715+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["175.138.219.91"]}], "Attach": [{"Content": "connection to blacklisted IP: 175.138.219.91 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjaqp376l18ySA9J8"], "accumulated_threat_level": 3.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "3e259def-a2a5-403e-819d-98812230d128", "DetectTime": "2024-05-21T12:26:21.668971+00:00", "EventTime": "2024-05-21T12:26:21.668987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXEUJY2rxJ6wLhDBjb"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "4192d41e-56e8-4e29-8851-c1443f2802e8", "DetectTime": "2024-05-21T12:26:21.673720+00:00", "EventTime": "2024-05-21T12:26:21.673741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0H6X2G92UxVbmhWc"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "b9c6102d-e15b-49ac-903f-5ff9c040705c", "DetectTime": "2024-05-21T12:26:21.684822+00:00", "EventTime": "2024-05-21T12:26:21.684840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.206.15.133"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.206.15.133 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clfbya1KgOfg1UiuOi"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "9f58f51d-15e7-4d48-8cf5-74b01667d130", "DetectTime": "2024-05-21T12:26:21.695405+00:00", "EventTime": "2024-05-21T12:26:21.695423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.206.15.133"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.206.15.133 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clfbya1KgOfg1UiuOi"], "accumulated_threat_level": 4.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "2932e909-3067-49ef-a854-dfd4d3eec648", "DetectTime": "2024-05-21T12:26:21.707100+00:00", "EventTime": "2024-05-21T12:26:21.707117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["202.143.178.97"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 202.143.178.97 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQcI85F5q6U45Tie"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "1bc01b03-e7b3-40df-b887-6765fab8f782", "DetectTime": "2024-05-21T12:26:21.719057+00:00", "EventTime": "2024-05-21T12:26:21.719078+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["202.143.178.97"]}], "Attach": [{"Content": "connection to blacklisted IP: 202.143.178.97 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQcI85F5q6U45Tie"], "accumulated_threat_level": 4.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "14625c29-87bb-49f1-8259-6f4a21cf8f7e", "DetectTime": "2024-05-21T12:26:21.723884+00:00", "EventTime": "2024-05-21T12:26:21.723902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjxH13c3l1AiXtWc"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "6c9ad0cb-9bc6-4a05-b491-384ba342a097", "DetectTime": "2024-05-21T12:26:21.728595+00:00", "EventTime": "2024-05-21T12:26:21.728617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CknZvP2kd7MOJVBQ0i"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "85e97c26-9f34-4a9c-91c4-cd6f6f59b723", "DetectTime": "2024-05-21T12:26:21.740477+00:00", "EventTime": "2024-05-21T12:26:21.740496+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["77.28.99.184"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 77.28.99.184 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVtUA11kemYAPLQUh"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "a1d5cf05-fa64-454b-9d7b-69c73cfa79e5", "DetectTime": "2024-05-21T12:26:21.752391+00:00", "EventTime": "2024-05-21T12:26:21.752410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["77.28.99.184"]}], "Attach": [{"Content": "connection to blacklisted IP: 77.28.99.184 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVtUA11kemYAPLQUh"], "accumulated_threat_level": 5.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "391d4567-ba79-4d8c-8708-117f112f07e4", "DetectTime": "2024-05-21T12:26:21.756856+00:00", "EventTime": "2024-05-21T12:26:21.756874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2mv92tH6jJO7Wjo1"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "587824a5-dbf5-482c-95d6-580bdce4c543", "DetectTime": "2024-05-21T12:26:21.761252+00:00", "EventTime": "2024-05-21T12:26:21.761269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7V8DdFveWtWwEAh"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "329ae8ec-c982-411b-948b-b44387fd814b", "DetectTime": "2024-05-21T12:26:21.771212+00:00", "EventTime": "2024-05-21T12:26:21.771229+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.104.2"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.104.2 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMZ6p1baQFGXXUc3i"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "6b505440-a941-4841-9563-345f78e953b7", "DetectTime": "2024-05-21T12:26:21.782841+00:00", "EventTime": "2024-05-21T12:26:21.782860+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.104.2"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.104.2 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMZ6p1baQFGXXUc3i"], "accumulated_threat_level": 5.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "b1c698bd-d1de-4f39-8150-1f7ee872a97a", "DetectTime": "2024-05-21T12:26:21.787625+00:00", "EventTime": "2024-05-21T12:26:21.787643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUv8RBrBhSpaeqUJg"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "8df91029-f20f-49ca-a7fc-4f6ec7728ef3", "DetectTime": "2024-05-21T12:26:21.792062+00:00", "EventTime": "2024-05-21T12:26:21.792080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zLGB45o5FhoyTIPa"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "3dd07e5e-070d-483b-b88c-655d12b45947", "DetectTime": "2024-05-21T12:26:21.802301+00:00", "EventTime": "2024-05-21T12:26:21.802319+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.41.99.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.41.99.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6gpT3wtWFQ8LsuA7"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "5f4ec417-d430-478e-8a8f-d4c2095142e4", "DetectTime": "2024-05-21T12:26:21.806842+00:00", "EventTime": "2024-05-21T12:26:21.806859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiZAX3G12ByjkVbgf"], "accumulated_threat_level": 3.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "34c0aae0-5870-46ad-b2e6-6863f4f53343", "DetectTime": "2024-05-21T12:26:21.817436+00:00", "EventTime": "2024-05-21T12:26:21.817455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.41.99.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.41.99.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6gpT3wtWFQ8LsuA7"], "accumulated_threat_level": 6.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "a4a04b5b-4233-47d9-abea-2dcdc84bb076", "DetectTime": "2024-05-21T12:26:21.833788+00:00", "EventTime": "2024-05-21T12:26:21.833806+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.90.50.124"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.90.50.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfYzq2JiSX5LNFxBc"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "ce763569-b7d9-4215-9bf3-41df9d9818a9", "DetectTime": "2024-05-21T12:26:21.845624+00:00", "EventTime": "2024-05-21T12:26:21.845645+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.90.50.124"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.90.50.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfYzq2JiSX5LNFxBc"], "accumulated_threat_level": 6.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "34399a0b-d4d1-4ff1-886c-2a46042e113d", "DetectTime": "2024-05-21T12:26:21.850541+00:00", "EventTime": "2024-05-21T12:26:21.850560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qKMx2PLpDVsNTVz1", "Ck8e0Ynifx0E6Cnx", "ClnWJf25faXPDxK9md", "C1du0n1wriUpvlGMu8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 24} +{"Format": "IDEA0", "ID": "77418d4d-bb51-4f6a-87ac-baece2e6dbbd", "DetectTime": "2024-05-21T12:26:21.855095+00:00", "EventTime": "2024-05-21T12:26:21.855114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CizZQN2vxJAzt2R4Gl"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "8b08988f-b66f-4ca6-b987-4675c256a40f", "DetectTime": "2024-05-21T12:26:21.874042+00:00", "EventTime": "2024-05-21T12:26:21.874061+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["39.230.140.48"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 39.230.140.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuTdanXVgyzbh4h6"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "901f10d9-0f75-44f3-8f89-b8e32528066a", "DetectTime": "2024-05-21T12:26:21.885338+00:00", "EventTime": "2024-05-21T12:26:21.885356+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["39.230.140.48"]}], "Attach": [{"Content": "connection to blacklisted IP: 39.230.140.48 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuTdanXVgyzbh4h6"], "accumulated_threat_level": 7.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "350e3b08-7755-41b1-be6d-0ec54aa9d315", "DetectTime": "2024-05-21T12:26:21.905818+00:00", "EventTime": "2024-05-21T12:26:21.905835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0sBdc3rAe9YwCmxyd"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "2e0c27c0-785a-4ebd-b7bd-2df983b08bb9", "DetectTime": "2024-05-21T12:26:21.916114+00:00", "EventTime": "2024-05-21T12:26:21.916132+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0sBdc3rAe9YwCmxyd"], "accumulated_threat_level": 7.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "741275f4-17c3-4b95-8022-af3f3c00e1c1", "DetectTime": "2024-05-21T12:26:21.932197+00:00", "EventTime": "2024-05-21T12:26:21.932218+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.164.65.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXSca19nT640LrMQ8"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "ccf1819c-0152-4da4-831c-debe83a9ca09", "DetectTime": "2024-05-21T12:26:21.944987+00:00", "EventTime": "2024-05-21T12:26:21.945006+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXSca19nT640LrMQ8"], "accumulated_threat_level": 8.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "79470850-d111-4496-94de-16dba8dfdcfd", "DetectTime": "2024-05-21T12:26:22.077738+00:00", "EventTime": "2024-05-21T12:26:22.077757+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.225.175.68"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.225.175.68 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzB6Q1c3hJ03qQ3rb"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "077342f6-d6e9-4242-acdd-287f21be7d5e", "DetectTime": "2024-05-21T12:26:22.088954+00:00", "EventTime": "2024-05-21T12:26:22.088977+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.225.175.68"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.225.175.68 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzB6Q1c3hJ03qQ3rb"], "accumulated_threat_level": 8.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "fc35876e-f758-414c-9ced-41b245696219", "DetectTime": "2024-05-21T12:26:22.218024+00:00", "EventTime": "2024-05-21T12:26:22.218046+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.223.90.86"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.223.90.86 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpGwi2QeKxt24OTdh"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "ac9534b9-0cb2-4b06-a6e4-9590495887f6", "DetectTime": "2024-05-21T12:26:22.232142+00:00", "EventTime": "2024-05-21T12:26:22.232161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.223.90.86"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.223.90.86 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpGwi2QeKxt24OTdh"], "accumulated_threat_level": 9.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "0255d703-a80f-40e2-bba2-bece2902310a", "DetectTime": "2024-05-21T12:26:22.236843+00:00", "EventTime": "2024-05-21T12:26:22.236861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.6.55.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkk8q49JeOzf7O7x"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "958c65af-a6a5-4aa5-9440-c22cc9c52ba0", "DetectTime": "2024-05-21T12:26:22.362896+00:00", "EventTime": "2024-05-21T12:26:22.362915+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.102.220.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.102.220.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyTT22oHPkNkSPy7"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "c0dc7818-ad57-4c65-a964-a78ba65113c4", "DetectTime": "2024-05-21T12:26:22.374830+00:00", "EventTime": "2024-05-21T12:26:22.374849+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.102.220.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.102.220.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyTT22oHPkNkSPy7"], "accumulated_threat_level": 9.5, "timewindow": 12} +{"Format": "IDEA0", "ID": "31fcc454-ec22-4014-867c-94878303f02a", "DetectTime": "2024-05-21T12:26:22.460451+00:00", "EventTime": "2024-05-21T12:26:22.460469+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.15.162.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.15.162.66 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM876k1FzlV9uvqWm4"], "accumulated_threat_level": 0, "timewindow": 12} +{"Format": "IDEA0", "ID": "a821fde1-6bd6-4f42-a917-aed1042e08f5", "DetectTime": "2024-05-21T12:26:22.471659+00:00", "EventTime": "2024-05-21T12:26:22.471677+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.15.162.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.15.162.66 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM876k1FzlV9uvqWm4"], "accumulated_threat_level": 10.0, "timewindow": 12} +{"Format": "IDEA0", "ID": "beabd691-0e23-43b5-b853-44f8b0cf4bd3", "DetectTime": "2024-05-21T12:26:22.502742+00:00", "EventTime": "2024-05-21T12:26:22.502759+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.72.22.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.72.22.199 from 10.0.2.19. Description: IP under the control of, used by, or made available for use by spammers and abusers in unsolicited bulk email or other types of Internet-based abuse that threatens networks or users. Source: SBL DROP/EDROP Data, PBL Spamhaus Maintained, SBL Data, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKtue16G29NTjtsVk"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "ff30970c-e402-4fac-bff3-01176afc65b3", "DetectTime": "2024-05-21T12:26:22.513465+00:00", "EventTime": "2024-05-21T12:26:22.513482+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.72.22.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.72.22.199 from 10.0.2.19. Description: IP under the control of, used by, or made available for use by spammers and abusers in unsolicited bulk email or other types of Internet-based abuse that threatens networks or users. Source: SBL DROP/EDROP Data, PBL Spamhaus Maintained, SBL Data, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKtue16G29NTjtsVk"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "5c549f43-dd5d-4c10-baa3-9e57c57c1b5f", "DetectTime": "2024-05-21T12:26:22.538303+00:00", "EventTime": "2024-05-21T12:26:22.538321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNStss4r6eS0b3Lyzk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "b54f55eb-14ba-4379-b2fa-04689335997f", "DetectTime": "2024-05-21T12:26:22.555758+00:00", "EventTime": "2024-05-21T12:26:22.555779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbaHRL1bHugzbG2Vwi", "C1ORfu3l4WIVKO0oTa", "Cl2qXVLRpEnCNLdtd", "CvqPDxHnIIkYow1wi"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 24} +{"Format": "IDEA0", "ID": "77e3d714-e19d-4fc1-a7e0-7a5985cbc69f", "DetectTime": "2024-05-21T12:26:22.561748+00:00", "EventTime": "2024-05-21T12:26:22.561767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZz0tu23n2c9uVTXbj"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "02d55c41-fbbe-4ee7-b574-80ca4caaf1aa", "DetectTime": "2024-05-21T12:26:22.579260+00:00", "EventTime": "2024-05-21T12:26:22.579278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8RLSg4k0a6QX8K8Fh"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "c13c3a3e-0031-46b3-89db-be411b5ea58f", "DetectTime": "2024-05-21T12:26:22.598020+00:00", "EventTime": "2024-05-21T12:26:22.598043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4APE96wAHnVKyf6"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0e34e936-5889-40a7-9868-e25e26970228", "DetectTime": "2024-05-21T12:26:22.653812+00:00", "EventTime": "2024-05-21T12:26:22.653831+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fRmo1E7mR5SN4Lue"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "208e2bef-fb87-48bd-87c5-54e336106437", "DetectTime": "2024-05-21T12:26:22.665243+00:00", "EventTime": "2024-05-21T12:26:22.665261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fRmo1E7mR5SN4Lue"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "dea82a8a-2445-4b0f-aa29-4ebcf53b733e", "DetectTime": "2024-05-21T12:26:22.669900+00:00", "EventTime": "2024-05-21T12:26:22.669919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrbTKEuqWwED6cxCk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "88f6a87b-a73d-4218-a33c-bded011e58ba", "DetectTime": "2024-05-21T12:26:22.690700+00:00", "EventTime": "2024-05-21T12:26:22.690721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrS6Dw2pzR3455WQll"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "d431caa1-7cae-4c38-8fda-27820ee6499c", "DetectTime": "2024-05-21T12:26:22.703168+00:00", "EventTime": "2024-05-21T12:26:22.703186+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.131.242"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.131.242 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwzeg2S1UHrDTJpSb"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "21761a0b-89cd-4a21-bff6-832ec3fa47bb", "DetectTime": "2024-05-21T12:26:22.714804+00:00", "EventTime": "2024-05-21T12:26:22.714822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.131.242"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.131.242 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwzeg2S1UHrDTJpSb"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 13} +{"Format": "IDEA0", "ID": "27dbb11b-1d37-4406-90b0-587b4ce66a85", "DetectTime": "2024-05-21T12:26:22.749456+00:00", "EventTime": "2024-05-21T12:26:22.749474+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.200.82.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.200.82.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gpbA4I5QVCOpQC4h"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "71ba2ba5-2bfa-4e62-9da8-9bf766a0b854", "DetectTime": "2024-05-21T12:26:22.760499+00:00", "EventTime": "2024-05-21T12:26:22.760516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.200.82.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.200.82.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gpbA4I5QVCOpQC4h"], "accumulated_threat_level": 4.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "d7ef6848-7140-4778-a1dc-a9100aa812f5", "DetectTime": "2024-05-21T12:26:22.821790+00:00", "EventTime": "2024-05-21T12:26:22.821809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Pw2Z2wkLSLbfBA54"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "3058796f-8e7d-4746-974d-31e2fac9eac2", "DetectTime": "2024-05-21T12:26:22.958678+00:00", "EventTime": "2024-05-21T12:26:22.958699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwSKj1afhO61qxcg"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0b2834a7-0eea-49ff-9eb7-92a85531e84a", "DetectTime": "2024-05-21T12:26:22.990092+00:00", "EventTime": "2024-05-21T12:26:22.990116+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CELMNO27v9DR0RK8A9"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "6eb711b2-8af7-4ef9-a945-d974048d610a", "DetectTime": "2024-05-21T12:26:23.001949+00:00", "EventTime": "2024-05-21T12:26:23.001969+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CELMNO27v9DR0RK8A9"], "accumulated_threat_level": 4.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "d97e879a-73ef-4ff0-b44e-e694dee08ec6", "DetectTime": "2024-05-21T12:26:23.056541+00:00", "EventTime": "2024-05-21T12:26:23.056560+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDw2wwv5TNKGuPkYd"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "47f4c3ca-099d-4eed-8c8e-c3977e772770", "DetectTime": "2024-05-21T12:26:23.071282+00:00", "EventTime": "2024-05-21T12:26:23.071301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDw2wwv5TNKGuPkYd"], "accumulated_threat_level": 5.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "300fd7e6-2406-458a-a0a1-241aaab0c4cd", "DetectTime": "2024-05-21T12:26:23.084079+00:00", "EventTime": "2024-05-21T12:26:23.084097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8Xj22jLcfKIDrxu4"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "26ef21d2-4b63-41a5-9550-ad9c405dfddd", "DetectTime": "2024-05-21T12:26:23.088877+00:00", "EventTime": "2024-05-21T12:26:23.088895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIWFuo1sEZL95Ekwbd"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0f2f81c6-fb92-41c4-aa90-4550a07f2aef", "DetectTime": "2024-05-21T12:26:23.204440+00:00", "EventTime": "2024-05-21T12:26:23.204457+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelCAZ0lJA2BS2f6b"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "9d288d47-237e-4775-bfed-080da33ca6e7", "DetectTime": "2024-05-21T12:26:23.215869+00:00", "EventTime": "2024-05-21T12:26:23.215889+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelCAZ0lJA2BS2f6b"], "accumulated_threat_level": 5.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "02115054-4e39-484d-9eb7-9a39a5670b2f", "DetectTime": "2024-05-21T12:26:23.253944+00:00", "EventTime": "2024-05-21T12:26:23.253963+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDtCF378PfWcSN0Ye"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "a5625be1-aacd-4360-9a83-73b4e003a131", "DetectTime": "2024-05-21T12:26:23.265846+00:00", "EventTime": "2024-05-21T12:26:23.265866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPwwf2ZU5g8eXr231"], "accumulated_threat_level": 8.2, "timewindow": 24} +{"Format": "IDEA0", "ID": "4dd8576f-bbd3-42f1-bb0b-5c07e64028ba", "DetectTime": "2024-05-21T12:26:23.279050+00:00", "EventTime": "2024-05-21T12:26:23.279068+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDtCF378PfWcSN0Ye"], "accumulated_threat_level": 6.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "b103186e-b6b9-4507-881c-90861da354cb", "DetectTime": "2024-05-21T12:26:23.298515+00:00", "EventTime": "2024-05-21T12:26:23.298535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmgsvo4OMUh8lP8QA2"], "accumulated_threat_level": 9.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "d31f6be2-e9d4-4a95-bd17-a4f8ae2cdfb2", "DetectTime": "2024-05-21T12:26:23.310106+00:00", "EventTime": "2024-05-21T12:26:23.310124+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoJm7o1QKbl8WQ76Z2"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "ede68485-b3df-4624-8344-7a63975b50ca", "DetectTime": "2024-05-21T12:26:23.321304+00:00", "EventTime": "2024-05-21T12:26:23.321322+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoJm7o1QKbl8WQ76Z2"], "accumulated_threat_level": 6.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "99227a44-be91-4389-a103-134a3c5f9a4c", "DetectTime": "2024-05-21T12:26:23.336316+00:00", "EventTime": "2024-05-21T12:26:23.336335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaw8Z2J69n6mH1IW1"], "accumulated_threat_level": 9.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "1df435e6-b81d-496c-9973-5dff21487d5d", "DetectTime": "2024-05-21T12:26:23.374832+00:00", "EventTime": "2024-05-21T12:26:23.374852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1TJra4VZbho5j4n1d"], "accumulated_threat_level": 10.600000000000001, "timewindow": 24} +{"Format": "IDEA0", "ID": "533fc449-7715-4fc9-a373-7a73af7e6b7d", "DetectTime": "2024-05-21T12:26:23.406087+00:00", "EventTime": "2024-05-21T12:26:23.406104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaEVr43qdKxdXgess7"], "accumulated_threat_level": 11.400000000000002, "timewindow": 24} +{"Format": "IDEA0", "ID": "85fa66e4-7908-429a-9621-5aebd16d8cb6", "DetectTime": "2024-05-21T12:26:23.439222+00:00", "EventTime": "2024-05-21T12:26:23.439240+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.169.229.240"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.169.229.240 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUulq24xZad3PQdSa"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "d4145093-5633-4ffd-be08-8680c8fbf25a", "DetectTime": "2024-05-21T12:26:23.450313+00:00", "EventTime": "2024-05-21T12:26:23.450331+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.169.229.240"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.169.229.240 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUulq24xZad3PQdSa"], "accumulated_threat_level": 7.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "f48bdb8a-31e3-4322-9bc7-1915af994ecf", "DetectTime": "2024-05-21T12:26:23.483219+00:00", "EventTime": "2024-05-21T12:26:23.483238+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.43.192.181"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.43.192.181 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCHYWbh108yoK7o6"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "e6d7efa0-7ccc-4092-ab9b-01681b950337", "DetectTime": "2024-05-21T12:26:23.495167+00:00", "EventTime": "2024-05-21T12:26:23.495186+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.43.192.181"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.43.192.181 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCHYWbh108yoK7o6"], "accumulated_threat_level": 7.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "f36d77f3-d1ec-41f7-adfc-46c940669f8a", "DetectTime": "2024-05-21T12:26:23.521621+00:00", "EventTime": "2024-05-21T12:26:23.521639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7WeU1w9PaB3kY2ui"], "accumulated_threat_level": 12.200000000000003, "timewindow": 24} +{"Format": "Json", "ID": "f36d77f3-d1ec-41f7-adfc-46c940669f8a", "DetectTime": "2024-05-21T12:26:23.521621+00:00", "EventTime": "2024-05-21T12:26:23.521639+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "1970-01-01T23:34:32.181522+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:26:23.754007)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "529f27f9-de43-4913-80ce-441ebfa02ef4", "DetectTime": "2024-05-21T12:26:23.758545+00:00", "EventTime": "2024-05-21T12:26:23.758561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPSwo1i97H2j4GZ75"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "bc7531d3-7534-4308-97fa-e6dde4cb8aba", "DetectTime": "2024-05-21T12:26:23.769903+00:00", "EventTime": "2024-05-21T12:26:23.769921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCvHq2uApQ6ciaqdg"], "accumulated_threat_level": 0.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "64d2efec-87f1-4d0e-84c3-6f0345e83892", "DetectTime": "2024-05-21T12:26:23.780138+00:00", "EventTime": "2024-05-21T12:26:23.780155+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.67.62.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.67.62.148 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLpy94kahmn7DVxUj"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "26c5e7db-4a0b-4940-ac48-ca6c27d8b1c1", "DetectTime": "2024-05-21T12:26:23.790678+00:00", "EventTime": "2024-05-21T12:26:23.790696+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.67.62.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.67.62.148 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLpy94kahmn7DVxUj"], "accumulated_threat_level": 8.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "4d1bfc9e-1854-495b-b9d1-793274a14e7e", "DetectTime": "2024-05-21T12:26:23.797062+00:00", "EventTime": "2024-05-21T12:26:23.797081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNDSb83NSEiqoFQoj2"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "f8a591fa-2c9d-42c1-9a5a-4b67b4ba0b20", "DetectTime": "2024-05-21T12:26:23.801608+00:00", "EventTime": "2024-05-21T12:26:23.801627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOHRtbq8JHSz4zCe"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "45336fd7-0871-47c7-8334-33914a39581f", "DetectTime": "2024-05-21T12:26:23.806169+00:00", "EventTime": "2024-05-21T12:26:23.806188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDn1s2tNcypVklQp1"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "d180e15a-90e5-4d4f-a8f4-ab020f191b13", "DetectTime": "2024-05-21T12:26:23.816697+00:00", "EventTime": "2024-05-21T12:26:23.816715+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.90.33.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.90.33.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqLNJHMcBTELEaD5"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "59bb1d39-4c90-4efa-b6a9-b0c196bf161d", "DetectTime": "2024-05-21T12:26:23.827108+00:00", "EventTime": "2024-05-21T12:26:23.827126+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.90.33.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.90.33.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqLNJHMcBTELEaD5"], "accumulated_threat_level": 8.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "d2508b84-332b-4c75-915b-62759dde5758", "DetectTime": "2024-05-21T12:26:23.838447+00:00", "EventTime": "2024-05-21T12:26:23.838465+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2uA9f2B93okb4kKLk"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "685b5a33-b926-491c-9fe0-af11614ad79d", "DetectTime": "2024-05-21T12:26:23.850374+00:00", "EventTime": "2024-05-21T12:26:23.850391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2uA9f2B93okb4kKLk"], "accumulated_threat_level": 9.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "b2f08456-185e-4ed2-81db-a8552b523738", "DetectTime": "2024-05-21T12:26:23.861510+00:00", "EventTime": "2024-05-21T12:26:23.861528+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.194.29"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4aNHA6L1WEfKvYel"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "0850d2a8-44c7-4796-bfae-1ea9f1bb4333", "DetectTime": "2024-05-21T12:26:23.873302+00:00", "EventTime": "2024-05-21T12:26:23.873320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.194.29"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.194.29 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: ip-109-193-194-029.um39.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4aNHA6L1WEfKvYel"], "accumulated_threat_level": 9.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "6a0498f4-4773-4e7d-8c43-aa109acb350e", "DetectTime": "2024-05-21T12:26:23.883724+00:00", "EventTime": "2024-05-21T12:26:23.883741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2TGSw3lvAejeQHC24"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "ba350647-2979-448b-8cc0-3baee6df4857", "DetectTime": "2024-05-21T12:26:23.895670+00:00", "EventTime": "2024-05-21T12:26:23.895690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2TGSw3lvAejeQHC24"], "accumulated_threat_level": 10.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "1c7351b4-24db-4899-bc2c-ac7f0cb1b498", "DetectTime": "2024-05-21T12:26:23.908013+00:00", "EventTime": "2024-05-21T12:26:23.908032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbZvd1fBjlET20lU1"], "accumulated_threat_level": 1.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "e34986aa-cdcc-49aa-8fb1-074588151cc2", "DetectTime": "2024-05-21T12:26:23.918832+00:00", "EventTime": "2024-05-21T12:26:23.918850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.253.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHcW993ph81oAjp3lb"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "f9400b22-1647-4cdb-a7cf-5524851df168", "DetectTime": "2024-05-21T12:26:23.929220+00:00", "EventTime": "2024-05-21T12:26:23.929240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UNtx26xeDirAzo5d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 24} +{"Format": "IDEA0", "ID": "5018bacf-adf3-49db-8f49-d0dc3196db15", "DetectTime": "2024-05-21T12:26:23.940803+00:00", "EventTime": "2024-05-21T12:26:23.940820+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.253.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHcW993ph81oAjp3lb"], "accumulated_threat_level": 10.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "59634f04-007d-412c-b538-8358df98ad6c", "DetectTime": "2024-05-21T12:26:23.950723+00:00", "EventTime": "2024-05-21T12:26:23.950740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2C1i64jg789s3Z3n7"], "accumulated_threat_level": 3.2, "timewindow": 24} +{"Format": "IDEA0", "ID": "39ff6032-d257-4d02-8f5b-b558f351687d", "DetectTime": "2024-05-21T12:26:23.961965+00:00", "EventTime": "2024-05-21T12:26:23.961989+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["149.3.4.183"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 149.3.4.183 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSNdx44TQtwrGqQRd"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "0e2b1715-1548-430f-921b-de31d3b2b4e3", "DetectTime": "2024-05-21T12:26:23.975064+00:00", "EventTime": "2024-05-21T12:26:23.975084+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["149.3.4.183"]}], "Attach": [{"Content": "connection to blacklisted IP: 149.3.4.183 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSNdx44TQtwrGqQRd"], "accumulated_threat_level": 11.4, "timewindow": 13} +{"Format": "IDEA0", "ID": "6ca4c769-a714-4885-b1c5-0645dcc08c0b", "DetectTime": "2024-05-21T12:26:23.985457+00:00", "EventTime": "2024-05-21T12:26:23.985475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVj36KWdqbeq9OIrj"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "30140b33-5f06-4a2e-89b0-5eba2af9b397", "DetectTime": "2024-05-21T12:26:23.995289+00:00", "EventTime": "2024-05-21T12:26:23.995309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIAoVB332CR5Ek6a1j"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "f1cdae5a-a94d-41de-9e55-14e84e5833b2", "DetectTime": "2024-05-21T12:26:24.009677+00:00", "EventTime": "2024-05-21T12:26:24.009694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["112.210.123.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.210.123.33 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLT4mpF1nvTZC2Qf"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "90bb2a28-f2db-426f-a568-906cab1e8e14", "DetectTime": "2024-05-21T12:26:24.019871+00:00", "EventTime": "2024-05-21T12:26:24.019889+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["112.210.123.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.210.123.33 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLT4mpF1nvTZC2Qf"], "accumulated_threat_level": 11.9, "timewindow": 13} +{"Format": "IDEA0", "ID": "d1409758-ecd9-4866-a986-8eed141fac65", "DetectTime": "2024-05-21T12:26:24.029602+00:00", "EventTime": "2024-05-21T12:26:24.029620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ETOog4HJwZfGi1d"], "accumulated_threat_level": 5.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "318e4a67-9e6d-4c99-bbf4-a05ba5787cc2", "DetectTime": "2024-05-21T12:26:24.042350+00:00", "EventTime": "2024-05-21T12:26:24.042374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8R243nrQJJKwX1kl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 24} +{"Format": "IDEA0", "ID": "efb189a7-4db6-4093-995e-e8457b233f67", "DetectTime": "2024-05-21T12:26:24.053757+00:00", "EventTime": "2024-05-21T12:26:24.053776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTnsc2L2mO5VoNA56"], "accumulated_threat_level": 7.199999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "2e3aac46-013c-451a-8cbc-e5e29f30fecb", "DetectTime": "2024-05-21T12:26:24.064629+00:00", "EventTime": "2024-05-21T12:26:24.064647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkDyPgxCOh9R6Ej"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "2eaf4143-b44b-455b-9e91-795d94c7a5ff", "DetectTime": "2024-05-21T12:26:24.076253+00:00", "EventTime": "2024-05-21T12:26:24.076271+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkDyPgxCOh9R6Ej"], "accumulated_threat_level": 12.4, "timewindow": 13} +{"Format": "Json", "ID": "2eaf4143-b44b-455b-9e91-795d94c7a5ff", "DetectTime": "2024-05-21T12:26:24.076253+00:00", "EventTime": "2024-05-21T12:26:24.076271+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "1970-01-01T12:02:26.925803+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2024/05/21 12:26:24.671123)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.4, "timewindow": 13, "profileid": "profile_10.0.2.19", "threat_level": 12.4} +{"Format": "IDEA0", "ID": "b90d5aba-6811-407d-b381-cb790d728cea", "DetectTime": "2024-05-21T12:26:24.683404+00:00", "EventTime": "2024-05-21T12:26:24.683422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cReX3wRqafqiTJxd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "2511d3fa-6681-4565-ac13-714ab6845776", "DetectTime": "2024-05-21T12:26:24.695398+00:00", "EventTime": "2024-05-21T12:26:24.695415+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9QDBs2TO8UD0T7MC3"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "eac5a54b-fd11-4e3d-8bf5-155380e4119e", "DetectTime": "2024-05-21T12:26:24.708691+00:00", "EventTime": "2024-05-21T12:26:24.708708+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9QDBs2TO8UD0T7MC3"], "accumulated_threat_level": 0.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "e06bb814-ba7f-48c8-a9d0-9a4a64a699f3", "DetectTime": "2024-05-21T12:26:24.718961+00:00", "EventTime": "2024-05-21T12:26:24.718978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.77.238.196"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.77.238.196 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvPez1YloMvPV798j"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "c7cbfd8d-be24-40d8-bb36-3fb0ec4231e2", "DetectTime": "2024-05-21T12:26:24.730597+00:00", "EventTime": "2024-05-21T12:26:24.730617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.77.238.196"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.77.238.196 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvPez1YloMvPV798j"], "accumulated_threat_level": 1.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "5c28021f-9945-4608-9f74-05a3d1287ed1", "DetectTime": "2024-05-21T12:26:24.743719+00:00", "EventTime": "2024-05-21T12:26:24.743737+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTw6N3ZBw9ixwq9W5"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "160fc92e-0801-401b-bebe-583cfffcfb36", "DetectTime": "2024-05-21T12:26:24.755801+00:00", "EventTime": "2024-05-21T12:26:24.755818+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTw6N3ZBw9ixwq9W5"], "accumulated_threat_level": 1.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "f97af039-a4b4-4e80-8e13-21df04e966f4", "DetectTime": "2024-05-21T12:26:24.765856+00:00", "EventTime": "2024-05-21T12:26:24.765873+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.34.7.46"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.34.7.46 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatyVX14Y9ZOnvEYhh"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "d95c354f-56d9-4f91-b17c-558080520df5", "DetectTime": "2024-05-21T12:26:24.777376+00:00", "EventTime": "2024-05-21T12:26:24.777394+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.34.7.46"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.34.7.46 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatyVX14Y9ZOnvEYhh"], "accumulated_threat_level": 2.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "fb34d03f-0e1e-4157-99a4-a05a53950b96", "DetectTime": "2024-05-21T12:26:24.783036+00:00", "EventTime": "2024-05-21T12:26:24.783057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEVLc21BbmB5axLsj"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "4c3e82ac-b7aa-4cf1-bf80-6f30d1bbe1fb", "DetectTime": "2024-05-21T12:26:24.787589+00:00", "EventTime": "2024-05-21T12:26:24.787608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRILxw2Ox7tfBvWsL6"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "bebd02fb-cbc7-4faf-be58-9f77eaf7ada2", "DetectTime": "2024-05-21T12:26:24.792216+00:00", "EventTime": "2024-05-21T12:26:24.792236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzzZK2YDvahOTtgtk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "f3687b21-6493-4328-9810-a00db08d254c", "DetectTime": "2024-05-21T12:26:24.802999+00:00", "EventTime": "2024-05-21T12:26:24.803019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.177.70.33"]}], "Attach": [{"Content": "Connection to unknown destination port 5375/UDP destination IP 78.177.70.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8iJh2UYik3XaIc98"], "accumulated_threat_level": 8.799999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "424a6e8a-65e5-49ad-b162-9b938569866a", "DetectTime": "2024-05-21T12:26:24.808260+00:00", "EventTime": "2024-05-21T12:26:24.808282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2O01I2nR5VR3ZTBO3"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "a7ebdd56-5525-4d5d-91f4-27b3ea954d8a", "DetectTime": "2024-05-21T12:26:24.819009+00:00", "EventTime": "2024-05-21T12:26:24.819027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZloA3CBZLvYJHqp9"], "accumulated_threat_level": 9.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "00d18ea4-88c8-4a0e-8a1a-bd7911e9aba8", "DetectTime": "2024-05-21T12:26:24.829704+00:00", "EventTime": "2024-05-21T12:26:24.829721+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjYvq3ISUHC7Ua2c"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "0c98fc60-cfc5-4166-a5f0-97d945ed9774", "DetectTime": "2024-05-21T12:26:24.840199+00:00", "EventTime": "2024-05-21T12:26:24.840217+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjYvq3ISUHC7Ua2c"], "accumulated_threat_level": 2.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "c75c6800-d24c-4075-857a-7fce4ee476cb", "DetectTime": "2024-05-21T12:26:24.844673+00:00", "EventTime": "2024-05-21T12:26:24.844691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtPCDOxiNn5VK958"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "a23c4f66-9200-45a4-80e0-33547444b9c6", "DetectTime": "2024-05-21T12:26:24.856126+00:00", "EventTime": "2024-05-21T12:26:24.856148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsQcH3q0f9o12RNvi"], "accumulated_threat_level": 10.4, "timewindow": 24} +{"Format": "IDEA0", "ID": "94b08027-67c4-4cd2-a290-cc1fa067d98a", "DetectTime": "2024-05-21T12:26:24.860650+00:00", "EventTime": "2024-05-21T12:26:24.860667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIU8B4Y0SBvmsnlbk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "db54e04c-7496-4196-b8ba-5baeba71fa36", "DetectTime": "2024-05-21T12:26:24.864791+00:00", "EventTime": "2024-05-21T12:26:24.864808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COd1Ad16Fufdxxnnjc"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "1ab8c2fc-9384-49f4-b164-17b8543f6eb9", "DetectTime": "2024-05-21T12:26:24.869542+00:00", "EventTime": "2024-05-21T12:26:24.869561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrZZj455MJalYJJPk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "86433c59-9545-4145-b032-f8f05052e3b9", "DetectTime": "2024-05-21T12:26:24.873986+00:00", "EventTime": "2024-05-21T12:26:24.874004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vX6g1P9EHcHxMZS7"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "8e5cdee4-dbad-42b3-946d-1eeafffa4bff", "DetectTime": "2024-05-21T12:26:24.878294+00:00", "EventTime": "2024-05-21T12:26:24.878312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNuSOb41JXpLpmMaf1"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "2ecd216f-e080-4784-9548-ae52cb122e58", "DetectTime": "2024-05-21T12:26:24.888831+00:00", "EventTime": "2024-05-21T12:26:24.888849+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.7.101"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.7.101 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnNzd15vEGhnDpoc3"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "bd2e2602-2edc-4d5d-94bc-02d3822e29e5", "DetectTime": "2024-05-21T12:26:24.901227+00:00", "EventTime": "2024-05-21T12:26:24.901247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.7.101"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.7.101 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnNzd15vEGhnDpoc3"], "accumulated_threat_level": 3.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "b239e09f-e760-4aec-9bcf-7508537345ed", "DetectTime": "2024-05-21T12:26:24.906259+00:00", "EventTime": "2024-05-21T12:26:24.906278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyyLUg1sUHHRzgunV5"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "1578c88d-1405-4232-876a-24e617294c8a", "DetectTime": "2024-05-21T12:26:24.911637+00:00", "EventTime": "2024-05-21T12:26:24.911660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAf9Be3rCHFixzfgRi"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "8d6374d0-fc51-41b0-95c6-7349b2b1427f", "DetectTime": "2024-05-21T12:26:24.923178+00:00", "EventTime": "2024-05-21T12:26:24.923197+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.3.157.95"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.3.157.95 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RLn14ULwEDQcHqR1"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "9b1bfae1-0799-4ef1-b360-5ca3c3de1b6b", "DetectTime": "2024-05-21T12:26:24.933752+00:00", "EventTime": "2024-05-21T12:26:24.933771+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.3.157.95"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.3.157.95 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RLn14ULwEDQcHqR1"], "accumulated_threat_level": 3.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "46cd647b-5158-4eab-8952-e28ab9fb1cb9", "DetectTime": "2024-05-21T12:26:24.938197+00:00", "EventTime": "2024-05-21T12:26:24.938215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLlBnB35oeGutjYymd"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "02312c51-8448-4931-a716-440992671b2d", "DetectTime": "2024-05-21T12:26:24.942752+00:00", "EventTime": "2024-05-21T12:26:24.942772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYm4sv1l0TMs2s6Ii"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "928cd6de-376f-4278-8ad5-5a106cb1ca4d", "DetectTime": "2024-05-21T12:26:24.954384+00:00", "EventTime": "2024-05-21T12:26:24.954417+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.8.181.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.8.181.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCx11ZVb2YOBGhU9"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "e8fc0910-c5d6-4acf-82f5-188a4c80bc6c", "DetectTime": "2024-05-21T12:26:24.966565+00:00", "EventTime": "2024-05-21T12:26:24.966584+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.8.181.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.8.181.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCx11ZVb2YOBGhU9"], "accumulated_threat_level": 4.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "cf703b19-ac70-43ba-a44a-3bc7181aa656", "DetectTime": "2024-05-21T12:26:24.976316+00:00", "EventTime": "2024-05-21T12:26:24.976333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.27.248"]}], "Attach": [{"Content": "Connection to unknown destination port 16896/UDP destination IP 188.169.27.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrDg143lrSe4SGwX4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 24} +{"Format": "IDEA0", "ID": "857116a9-2023-467b-a9fd-5cebba913824", "DetectTime": "2024-05-21T12:26:24.988631+00:00", "EventTime": "2024-05-21T12:26:24.988649+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.213.229.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.213.229.78 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cagawx1eiZXzXXrC11"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "d7dfbcf4-3f97-484d-b1d0-cbf5c4eaf2e6", "DetectTime": "2024-05-21T12:26:25.000473+00:00", "EventTime": "2024-05-21T12:26:25.000491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.213.229.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.213.229.78 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cagawx1eiZXzXXrC11"], "accumulated_threat_level": 4.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "e29e6396-6321-4a47-ac3c-c002d098b3cc", "DetectTime": "2024-05-21T12:26:25.010963+00:00", "EventTime": "2024-05-21T12:26:25.010981+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["14.216.253.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 14.216.253.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBxbf3YbNVgMf6Wh"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "ef5ca617-0a95-4d4d-8ecc-74244777f926", "DetectTime": "2024-05-21T12:26:25.022811+00:00", "EventTime": "2024-05-21T12:26:25.022830+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["14.216.253.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 14.216.253.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBxbf3YbNVgMf6Wh"], "accumulated_threat_level": 5.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "376416f2-085d-409a-8d70-6452c2b32974", "DetectTime": "2024-05-21T12:26:25.027532+00:00", "EventTime": "2024-05-21T12:26:25.027550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkmlr2AirSerWUB87"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "20e347cd-f057-4778-b9db-e71b90777f13", "DetectTime": "2024-05-21T12:26:25.032117+00:00", "EventTime": "2024-05-21T12:26:25.032135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiX1j11938iugerWmh"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "b1ad6fe0-a70a-4717-bc70-3145fb1f7f93", "DetectTime": "2024-05-21T12:26:25.042570+00:00", "EventTime": "2024-05-21T12:26:25.042588+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAtuH3uU2L9Tmnlf6"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "58a62370-2658-400b-b0f9-284197135e32", "DetectTime": "2024-05-21T12:26:25.054107+00:00", "EventTime": "2024-05-21T12:26:25.054125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAtuH3uU2L9Tmnlf6"], "accumulated_threat_level": 5.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "a3f17a4b-b9ea-4112-bfbe-86205dd294df", "DetectTime": "2024-05-21T12:26:25.058679+00:00", "EventTime": "2024-05-21T12:26:25.058697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNxxq3jcbNEEzIo12"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "3236bda8-7324-4768-a842-8fa0e4ddf452", "DetectTime": "2024-05-21T12:26:25.069011+00:00", "EventTime": "2024-05-21T12:26:25.069029+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["113.165.112.128"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.112.128 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjFbE2gpc1kVhy9pc"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "d50b6527-7dc4-4ba6-a1d4-ea723f113937", "DetectTime": "2024-05-21T12:26:25.079844+00:00", "EventTime": "2024-05-21T12:26:25.079863+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["113.165.112.128"]}], "Attach": [{"Content": "connection to blacklisted IP: 113.165.112.128 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjFbE2gpc1kVhy9pc"], "accumulated_threat_level": 6.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "bb51c054-3a01-4f94-9b87-c52906188f83", "DetectTime": "2024-05-21T12:26:25.084330+00:00", "EventTime": "2024-05-21T12:26:25.084348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBY11x4GWxSU3BDaP7"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "b4a0274b-41f7-4ec4-b8b1-f1a3fe4a732a", "DetectTime": "2024-05-21T12:26:25.088791+00:00", "EventTime": "2024-05-21T12:26:25.088808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfemI3Lg3CJeLnFT2"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "1cb83ee4-627b-4a74-b99d-a9ca74fa1f76", "DetectTime": "2024-05-21T12:26:25.093184+00:00", "EventTime": "2024-05-21T12:26:25.093201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyFoXD4QDffV3Cshtf"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "6f0931c6-c1d1-4667-9e8d-c4cd68b0135e", "DetectTime": "2024-05-21T12:26:25.232679+00:00", "EventTime": "2024-05-21T12:26:25.232704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.173.238.41"]}], "Attach": [{"Content": "Connection to unknown destination port 22369/UDP destination IP 78.173.238.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLDzr4Nv6t2D21zfg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 24} +{"Format": "Json", "ID": "6f0931c6-c1d1-4667-9e8d-c4cd68b0135e", "DetectTime": "2024-05-21T12:26:25.232679+00:00", "EventTime": "2024-05-21T12:26:25.232704+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.173.238.41"]}], "Attach": [{"Content": "1970-01-01T23:36:25.863581+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:26:25.396190)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3cc4bae3-03a1-4443-bec1-fde3da11e001", "DetectTime": "2024-05-21T12:26:25.400494+00:00", "EventTime": "2024-05-21T12:26:25.400515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORZ6027lW1ttyQZr8"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "9a15b126-ab9b-4089-80fe-3ee19af802e1", "DetectTime": "2024-05-21T12:26:25.404953+00:00", "EventTime": "2024-05-21T12:26:25.404971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vGa31Xyu8LbVNGFi"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "42b3aee6-be49-4efc-b73b-1a38099dc71c", "DetectTime": "2024-05-21T12:26:25.426284+00:00", "EventTime": "2024-05-21T12:26:25.426305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNtH43FQUK0RjUdz6"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "e72f791c-519c-48b7-8778-983ca6591f8f", "DetectTime": "2024-05-21T12:26:25.457354+00:00", "EventTime": "2024-05-21T12:26:25.457376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiqlDF6ANKu1OfYb"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "f280046a-8120-4da7-a6ea-fe3d8349e66d", "DetectTime": "2024-05-21T12:26:25.484151+00:00", "EventTime": "2024-05-21T12:26:25.484174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCYjb3AAr1ceyBMEi"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0363accc-013b-4c69-8142-b72f30501b70", "DetectTime": "2024-05-21T12:26:25.593263+00:00", "EventTime": "2024-05-21T12:26:25.593284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1MxqgSBVxFHrpQjb"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "d81ee1fa-510c-4238-82b7-ab7b55caf684", "DetectTime": "2024-05-21T12:26:26.094622+00:00", "EventTime": "2024-05-21T12:26:26.094644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.232.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvtz401puE53Ih9b5b"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "c517c5ff-6566-4f52-a8bc-1d4996e1ecd1", "DetectTime": "2024-05-21T12:26:26.252942+00:00", "EventTime": "2024-05-21T12:26:26.252963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.92.75.150"]}], "Attach": [{"Content": "Connection to unknown destination port 4736/UDP destination IP 78.92.75.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdjj3PltpOIhM4a1"], "accumulated_threat_level": 0.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "a99be5a3-3966-48ed-8558-2a5b6ea64ebd", "DetectTime": "2024-05-21T12:26:26.345775+00:00", "EventTime": "2024-05-21T12:26:26.345795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.10.18.143 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ybTXSCUMQU5JZn8"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "47c0a011-d802-444f-b65f-17bfd85acd9d", "DetectTime": "2024-05-21T12:26:26.364433+00:00", "EventTime": "2024-05-21T12:26:26.364453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgy1q3MT7a9c0YqMb"], "accumulated_threat_level": 1.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "2a876768-f50d-4670-8e91-02065bc90263", "DetectTime": "2024-05-21T12:26:26.424777+00:00", "EventTime": "2024-05-21T12:26:26.424796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 49.49.17.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9FFVbnrP0Wz6999"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 24} +{"Format": "IDEA0", "ID": "73a26224-fda2-4190-8df1-ffb5c730d84e", "DetectTime": "2024-05-21T12:26:26.539038+00:00", "EventTime": "2024-05-21T12:26:26.539057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.183.152"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.183.152. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ocSCIcNJ2FgoaH2"], "accumulated_threat_level": 3.2, "timewindow": 24} +{"Format": "IDEA0", "ID": "1fcb6c0c-648b-41b8-8b61-739626c01fd6", "DetectTime": "2024-05-21T12:26:26.584708+00:00", "EventTime": "2024-05-21T12:26:26.584728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.121.218.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuWuYe3CbyDzOZNlR7"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0aa257bc-0474-4cfb-963b-de86663063f1", "DetectTime": "2024-05-21T12:26:26.609373+00:00", "EventTime": "2024-05-21T12:26:26.609389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "Connection to unknown destination port 27958/UDP destination IP 109.93.140.11. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvM57Q3Zg6GO4cQfTd"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "0d4edc6c-12f5-4bb7-8351-253153eb5c50", "DetectTime": "2024-05-21T12:26:26.641430+00:00", "EventTime": "2024-05-21T12:26:26.641447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09nNv3CYrKONZ74W2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0dac8540-183d-40f6-ac71-e68778617ed8", "DetectTime": "2024-05-21T12:26:26.838138+00:00", "EventTime": "2024-05-21T12:26:26.838158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJp2r2yh11na0dTb4"], "accumulated_threat_level": 5.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "4e352825-d9bf-41f2-aec6-92c20328448f", "DetectTime": "2024-05-21T12:26:26.866687+00:00", "EventTime": "2024-05-21T12:26:26.866710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.36.20 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2CR5XmcufiFPAEd6"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "439f104f-7499-48bd-88bf-b2aa260ddb9e", "DetectTime": "2024-05-21T12:26:26.888024+00:00", "EventTime": "2024-05-21T12:26:26.888044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkZMePleTwkrTwZf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 24} +{"Format": "IDEA0", "ID": "ded7ec52-d78e-4f06-887e-6335a0aff41e", "DetectTime": "2024-05-21T12:26:26.913910+00:00", "EventTime": "2024-05-21T12:26:26.913929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq3glB3fyXR3i2W1va"], "accumulated_threat_level": 7.199999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "e83b7a6a-f64b-4ad9-ba87-e8e62e6dc2b2", "DetectTime": "2024-05-21T12:26:26.939254+00:00", "EventTime": "2024-05-21T12:26:26.939274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs4kac3HjrZJrOcZQi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "9b5b96fc-b100-4e86-9fdd-74df9d00b479", "DetectTime": "2024-05-21T12:26:27.072747+00:00", "EventTime": "2024-05-21T12:26:27.072765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCzxZ3xDIitZvf977"], "accumulated_threat_level": 8.799999999999999, "timewindow": 24} +{"Format": "IDEA0", "ID": "5f958455-777a-4e36-bdaf-d5e4bfd84858", "DetectTime": "2024-05-21T12:26:27.099776+00:00", "EventTime": "2024-05-21T12:26:27.099795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfmvk03mOphPTiYhE8"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "8b8e8598-00e7-46fd-9164-4a3202bc2f2e", "DetectTime": "2024-05-21T12:26:27.229183+00:00", "EventTime": "2024-05-21T12:26:27.229201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.38.248"]}], "Attach": [{"Content": "Connection to unknown destination port 22106/UDP destination IP 85.75.38.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbuhg4L4UBs5yPJP6"], "accumulated_threat_level": 9.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "c1053684-f28b-41c4-8dad-dcecb22bc6d8", "DetectTime": "2024-05-21T12:26:27.345655+00:00", "EventTime": "2024-05-21T12:26:27.345678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.105.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0svcU3FbRIEimhF0d"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "d1425e3f-1817-4d81-8459-d6da6cb42ef4", "DetectTime": "2024-05-21T12:26:27.504617+00:00", "EventTime": "2024-05-21T12:26:27.504637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 28353/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtlILHiFBNxG6OB7"], "accumulated_threat_level": 10.4, "timewindow": 24} +{"Format": "IDEA0", "ID": "dd5d732e-7f1b-415e-bc84-3f53231a0e0e", "DetectTime": "2024-05-21T12:26:27.620635+00:00", "EventTime": "2024-05-21T12:26:27.620655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crb8OSbPbZkFIg4we"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "4f4947ad-9487-48e5-93ea-021376827427", "DetectTime": "2024-05-21T12:26:27.673766+00:00", "EventTime": "2024-05-21T12:26:27.673786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLUGpTjfLb0QovXvc"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0701cfd7-cb14-4227-88e9-ad2530e87e01", "DetectTime": "2024-05-21T12:26:27.699744+00:00", "EventTime": "2024-05-21T12:26:27.699762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "Connection to unknown destination port 8045/UDP destination IP 177.189.51.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxIDF2QLqaDuhQ98c"], "accumulated_threat_level": 11.200000000000001, "timewindow": 24} +{"Format": "IDEA0", "ID": "fb4616c0-0e86-417c-a42c-48fdccc929ac", "DetectTime": "2024-05-21T12:26:27.731281+00:00", "EventTime": "2024-05-21T12:26:27.731298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSZ7p1WdmN5DFVpPg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 24} +{"Format": "Json", "ID": "fb4616c0-0e86-417c-a42c-48fdccc929ac", "DetectTime": "2024-05-21T12:26:27.731281+00:00", "EventTime": "2024-05-21T12:26:27.731298+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "1970-01-01T23:41:11.498288+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:26:27.908803)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2248fe9f-c799-4967-9c0a-0e6a85241d8f", "DetectTime": "2024-05-21T12:26:27.958543+00:00", "EventTime": "2024-05-21T12:26:27.958563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRsM82ySYMrEm0z4i"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "5608d2d4-e306-46ba-8258-72f77fd009db", "DetectTime": "2024-05-21T12:26:27.992735+00:00", "EventTime": "2024-05-21T12:26:27.992755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUK5E44YasG2bFT902"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "01162c12-9aea-4b09-8769-313108dc7d25", "DetectTime": "2024-05-21T12:26:28.033676+00:00", "EventTime": "2024-05-21T12:26:28.033697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4YQB72FTUmZnSmOoa"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "7f544972-1c16-4e7b-8e4e-194f8074fddf", "DetectTime": "2024-05-21T12:26:28.094519+00:00", "EventTime": "2024-05-21T12:26:28.094538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14R3SxV78mbUMjo2"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "a89c0b0e-1770-4aea-ad64-d99f083fd6ff", "DetectTime": "2024-05-21T12:26:28.380871+00:00", "EventTime": "2024-05-21T12:26:28.380893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnvsh299HkA99B9Ee"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "ccb94e82-1c04-4957-89a8-af5d8becdf2e", "DetectTime": "2024-05-21T12:26:28.482709+00:00", "EventTime": "2024-05-21T12:26:28.482732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7bkhXntvU7Axj86"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "d851b1de-fa2e-4e9d-9480-bff075257bc1", "DetectTime": "2024-05-21T12:26:28.530988+00:00", "EventTime": "2024-05-21T12:26:28.531007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme68f3BwKK3BduMB1"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "7848447a-9559-4c44-958a-50f084e7373b", "DetectTime": "2024-05-21T12:26:28.600165+00:00", "EventTime": "2024-05-21T12:26:28.600187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsI6oe36PVJrWLt45"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "c271211a-b469-4e6b-8dc8-075487ef16ed", "DetectTime": "2024-05-21T12:26:28.605928+00:00", "EventTime": "2024-05-21T12:26:28.605949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiVfA4gTNG5ibs0xk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "e477d8bc-8ade-42aa-8e37-48f877b480c8", "DetectTime": "2024-05-21T12:26:28.610853+00:00", "EventTime": "2024-05-21T12:26:28.610873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mHz41uWrQ2EqqIn3"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "e54ac00d-c9d6-43bd-afb2-c72744141609", "DetectTime": "2024-05-21T12:26:28.615525+00:00", "EventTime": "2024-05-21T12:26:28.615543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcyCIrHfH8QHgvILe"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "3b44e6df-5d0b-444d-aed1-8793a25fb579", "DetectTime": "2024-05-21T12:26:28.637022+00:00", "EventTime": "2024-05-21T12:26:28.637043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTS2b3Tv85l5yJngl"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "49c01d05-9ce5-4d5b-93f5-a50a16cf3555", "DetectTime": "2024-05-21T12:26:28.681164+00:00", "EventTime": "2024-05-21T12:26:28.681184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT3Q52jKSWrPySJvg"], "accumulated_threat_level": 0.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "604cf1ca-bff7-41c0-bfa4-afd6d032d702", "DetectTime": "2024-05-21T12:26:28.691132+00:00", "EventTime": "2024-05-21T12:26:28.691151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3JYDdCTXa5wCvjl"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "db1f9d05-70ba-4c2f-b232-41a2f4f69e2a", "DetectTime": "2024-05-21T12:26:28.719618+00:00", "EventTime": "2024-05-21T12:26:28.719636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.77.231.101"]}], "Attach": [{"Content": "Connection to unknown destination port 4013/UDP destination IP 95.77.231.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKSsq47C5m6Vqmwje"], "accumulated_threat_level": 1.6, "timewindow": 24} +{"Format": "IDEA0", "ID": "e1aa6cf4-600d-4a9e-a63f-7f483b23169f", "DetectTime": "2024-05-21T12:26:28.771165+00:00", "EventTime": "2024-05-21T12:26:28.771185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"]}], "Attach": [{"Content": "Connection to unknown destination port 5857/UDP destination IP 46.237.70.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0ntC1figvmMU8uwa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 24} +{"Format": "IDEA0", "ID": "2957c283-fd30-4a74-8a4f-65b9014cb52a", "DetectTime": "2024-05-21T12:26:28.796838+00:00", "EventTime": "2024-05-21T12:26:28.796858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKmfs3gxOBsBa9MO2"], "accumulated_threat_level": 3.2, "timewindow": 24} +{"Format": "IDEA0", "ID": "9d508dbd-556a-41ad-bf85-9f2d80bcd0aa", "DetectTime": "2024-05-21T12:26:28.918956+00:00", "EventTime": "2024-05-21T12:26:28.918974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cei24R2DbJXEVHqHWf"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "859a7940-d153-45ac-9743-28b7bbcad237", "DetectTime": "2024-05-21T12:26:28.971309+00:00", "EventTime": "2024-05-21T12:26:28.971330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHuKq2hGNHpMOwO36"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "b38a3259-5332-4811-9087-dff751d74a21", "DetectTime": "2024-05-21T12:26:28.976834+00:00", "EventTime": "2024-05-21T12:26:28.976853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCN3pI29LE6cdVLpCd"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "336bdcb5-f21a-465b-ba70-cf301dd12c67", "DetectTime": "2024-05-21T12:26:29.017765+00:00", "EventTime": "2024-05-21T12:26:29.017785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs1JUp9uP10OWrwd1"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0a989296-26ef-457d-8e08-05621b465f4a", "DetectTime": "2024-05-21T12:26:29.022624+00:00", "EventTime": "2024-05-21T12:26:29.022643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTYfx1XTmHHiMnac6"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "2f1da007-355f-4fd2-bbbf-fee6847a5939", "DetectTime": "2024-05-21T12:26:29.035806+00:00", "EventTime": "2024-05-21T12:26:29.035824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHhsOr2172UxkjAiOc"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "370a854d-7e81-4faf-af97-5e3bcb70182d", "DetectTime": "2024-05-21T12:26:29.050102+00:00", "EventTime": "2024-05-21T12:26:29.050123+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHhsOr2172UxkjAiOc"], "accumulated_threat_level": 6.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "14fc0f10-6831-4e19-801b-37dcf54be730", "DetectTime": "2024-05-21T12:26:29.054779+00:00", "EventTime": "2024-05-21T12:26:29.054796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjVzA2QYPfNTS2tEl"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "65f18cfa-e0c8-4ff8-b279-426e99260dca", "DetectTime": "2024-05-21T12:26:29.072971+00:00", "EventTime": "2024-05-21T12:26:29.072993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoZcO33g47zEaO68"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "3d4203e9-2bc2-4b4f-a2db-22e06178c995", "DetectTime": "2024-05-21T12:26:29.086582+00:00", "EventTime": "2024-05-21T12:26:29.086602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAGhJ13OOSqHV7PPg"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "c1491a50-5e47-4233-9725-56916d89c933", "DetectTime": "2024-05-21T12:26:29.099360+00:00", "EventTime": "2024-05-21T12:26:29.099379+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAGhJ13OOSqHV7PPg"], "accumulated_threat_level": 7.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "285ef0b0-19cb-4c8b-8666-f2ae08ddb2a0", "DetectTime": "2024-05-21T12:26:29.105189+00:00", "EventTime": "2024-05-21T12:26:29.105211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceffsa4bioiRIXBHAk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "6f14b1b5-002d-40c4-ba87-fc7e3adb1908", "DetectTime": "2024-05-21T12:26:29.117134+00:00", "EventTime": "2024-05-21T12:26:29.117154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdqvvePzf8PQUSO2"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "f2bfb81e-a648-49e3-8bf1-a5b95e05a625", "DetectTime": "2024-05-21T12:26:29.138078+00:00", "EventTime": "2024-05-21T12:26:29.138098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.86.63"]}], "Attach": [{"Content": "Connection to unknown destination port 8552/UDP destination IP 117.198.86.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuROYA2TbvZZnpBH"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "efbe37f7-1505-43ef-8706-28a781a75508", "DetectTime": "2024-05-21T12:26:29.162534+00:00", "EventTime": "2024-05-21T12:26:29.162551+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUf8z4URFie0T4Zgd"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "13d67cf9-95e5-44e7-86bf-6e3a64895b8b", "DetectTime": "2024-05-21T12:26:29.177799+00:00", "EventTime": "2024-05-21T12:26:29.177819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUf8z4URFie0T4Zgd"], "accumulated_threat_level": 7.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "298dd5d7-e47a-461e-850e-e3a80b352e61", "DetectTime": "2024-05-21T12:26:29.188964+00:00", "EventTime": "2024-05-21T12:26:29.188982+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1PbX3fvptMiTLUq7"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "271d8f99-db9f-4892-b016-dbe38968656b", "DetectTime": "2024-05-21T12:26:29.193637+00:00", "EventTime": "2024-05-21T12:26:29.193655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwtft91UK34Tclp4Sd"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "8655299b-4800-4b0e-802c-5e974eddd9d0", "DetectTime": "2024-05-21T12:26:29.238853+00:00", "EventTime": "2024-05-21T12:26:29.238873+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1PbX3fvptMiTLUq7"], "accumulated_threat_level": 8.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "fac118ca-255f-4346-829e-addeb61855a2", "DetectTime": "2024-05-21T12:26:29.259296+00:00", "EventTime": "2024-05-21T12:26:29.259317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMYki2OvMub85Rab"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "0f9b09cc-1cf5-41a4-ab41-6435f67e1d18", "DetectTime": "2024-05-21T12:26:29.264242+00:00", "EventTime": "2024-05-21T12:26:29.264260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6E96Z2HLX2LoIJIp2"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "be876371-e59f-43dd-aeff-1a1b8fff662c", "DetectTime": "2024-05-21T12:26:29.298832+00:00", "EventTime": "2024-05-21T12:26:29.298854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XmwuqxltByiJ0g"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "5ec3257f-c87b-4ee7-8f0a-cf3b69faf2f0", "DetectTime": "2024-05-21T12:26:29.318063+00:00", "EventTime": "2024-05-21T12:26:29.318083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMcCEm27R1Oa5Nogkk"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "e092c698-c88f-4704-91fb-7317aa5cd99e", "DetectTime": "2024-05-21T12:26:29.339394+00:00", "EventTime": "2024-05-21T12:26:29.339415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6j8Li3nUfWMbfnxUf"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "f2eb68a5-98b5-4d8f-b2ef-a6b239b2d559", "DetectTime": "2024-05-21T12:26:29.355918+00:00", "EventTime": "2024-05-21T12:26:29.355937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cro5VM2WlGZ5lJfE0j"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "9d02aabe-2594-41d8-a77a-10be70f66a32", "DetectTime": "2024-05-21T12:26:29.374690+00:00", "EventTime": "2024-05-21T12:26:29.374709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTHGyHtNIWd8wPIJ5"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "a400ea69-1c3a-44fa-8f9a-6446cac9bb3e", "DetectTime": "2024-05-21T12:26:29.397794+00:00", "EventTime": "2024-05-21T12:26:29.397816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJosPXxWrdFJD5SLf"], "accumulated_threat_level": 5.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "88fb2474-ade7-4ec0-9ab7-3fd3381c17c5", "DetectTime": "2024-05-21T12:26:29.554687+00:00", "EventTime": "2024-05-21T12:26:29.554706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55zKx3RrvKmXL9SV9"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "191c85a9-880d-4ef6-a0f1-eaa591b58a1e", "DetectTime": "2024-05-21T12:26:29.808186+00:00", "EventTime": "2024-05-21T12:26:29.808206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tbmk2K3qyn8fTsC6"], "accumulated_threat_level": 0.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "da5a7a66-c684-4110-90fc-98c58a814eaa", "DetectTime": "2024-05-21T12:26:30.190939+00:00", "EventTime": "2024-05-21T12:26:30.190960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.157.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbxgi93pMwlctxsaB4"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "d7e35417-b88d-4ea4-afce-6b032a916a19", "DetectTime": "2024-05-21T12:26:30.214790+00:00", "EventTime": "2024-05-21T12:26:30.214811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jFvH2N7KWddNSkAc"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "10713e2a-9c7a-4f42-941e-8877ca873df5", "DetectTime": "2024-05-21T12:26:30.224923+00:00", "EventTime": "2024-05-21T12:26:30.224943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXqu6M24adOqrcKUcg", "CDoI4N3kbACpfLCOy9", "CQus0Z1s5uxcY4EgM1", "CrRVuK2I8sK7ep99Ze"], "accumulated_threat_level": 1.3, "timewindow": 25} +{"Format": "IDEA0", "ID": "b1b4fdbb-77cb-4b50-9df0-1210c51d168d", "DetectTime": "2024-05-21T12:26:30.330470+00:00", "EventTime": "2024-05-21T12:26:30.330489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZy92l10pKY7mngsk8"], "accumulated_threat_level": 2.1, "timewindow": 25} +{"Format": "IDEA0", "ID": "802efd61-1e80-442f-a926-d4840ebf55c8", "DetectTime": "2024-05-21T12:26:30.355666+00:00", "EventTime": "2024-05-21T12:26:30.355684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS2AqqPkVltZsQlOh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 25} +{"Format": "IDEA0", "ID": "c4390589-0c77-4875-85bd-4b3453830424", "DetectTime": "2024-05-21T12:26:30.408277+00:00", "EventTime": "2024-05-21T12:26:30.408297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2cc1izGCGJXukGrb"], "accumulated_threat_level": 3.7, "timewindow": 25} +{"Format": "IDEA0", "ID": "6e7b1a83-f19d-46c2-9ca5-26b5f017928f", "DetectTime": "2024-05-21T12:26:30.434128+00:00", "EventTime": "2024-05-21T12:26:30.434149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wiQK2TSwDonEbh31"], "accumulated_threat_level": 4.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "7f38af3c-7ce0-4e97-8bc1-a114b26484b9", "DetectTime": "2024-05-21T12:26:30.466010+00:00", "EventTime": "2024-05-21T12:26:30.466027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0uVP37LN49Wmoelk"], "accumulated_threat_level": 5.3, "timewindow": 25} +{"Format": "IDEA0", "ID": "6fdac24c-bd34-41f9-a358-7a37e71524c8", "DetectTime": "2024-05-21T12:26:30.597752+00:00", "EventTime": "2024-05-21T12:26:30.597774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2o763YvbqppHUFbg"], "accumulated_threat_level": 6.1, "timewindow": 25} +{"Format": "IDEA0", "ID": "3580cf89-b14a-4564-a69a-9d8781e2fe70", "DetectTime": "2024-05-21T12:26:30.685753+00:00", "EventTime": "2024-05-21T12:26:30.685777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.30.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlnYd6fzCDS9Pkc3"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "b5fe42eb-2d66-4889-8ae7-8ea0c3657241", "DetectTime": "2024-05-21T12:26:30.774631+00:00", "EventTime": "2024-05-21T12:26:30.774651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "Connection to unknown destination port 18670/UDP destination IP 94.68.238.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzDPHr1bN7Iahl7U62"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 25} +{"Format": "IDEA0", "ID": "689e9840-7c42-4e17-9df7-ccf2e611fdb2", "DetectTime": "2024-05-21T12:26:30.803582+00:00", "EventTime": "2024-05-21T12:26:30.803602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GYA116erXIvjBEdh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "cd73f265-df3c-4a62-aa14-5bb7f7e934ce", "DetectTime": "2024-05-21T12:26:30.827375+00:00", "EventTime": "2024-05-21T12:26:30.827394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBKHlC2p4CjiNYHzu5"], "accumulated_threat_level": 8.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "7d60d528-dda0-41d6-9c4c-69c6d29bde4d", "DetectTime": "2024-05-21T12:26:30.867059+00:00", "EventTime": "2024-05-21T12:26:30.867078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bGqg3V2mnPKN55bg"], "accumulated_threat_level": 9.3, "timewindow": 25} +{"Format": "IDEA0", "ID": "e5889200-100b-40d8-a796-cf33620b8d84", "DetectTime": "2024-05-21T12:26:30.892229+00:00", "EventTime": "2024-05-21T12:26:30.892248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDDLR1xQDnQKcsDyf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 25} +{"Format": "IDEA0", "ID": "a1c8cc92-fceb-41ae-9616-58569665d064", "DetectTime": "2024-05-21T12:26:30.919928+00:00", "EventTime": "2024-05-21T12:26:30.919950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctOL54xct8lhiGs85"], "accumulated_threat_level": 10.900000000000002, "timewindow": 25} +{"Format": "IDEA0", "ID": "ec1e70c5-0747-4264-8f37-81f2fec33b76", "DetectTime": "2024-05-21T12:26:30.948921+00:00", "EventTime": "2024-05-21T12:26:30.948941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbupED1dHecAive9Uf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "59d9a58c-d8f5-4a1d-b5c7-955e744130d0", "DetectTime": "2024-05-21T12:26:30.967027+00:00", "EventTime": "2024-05-21T12:26:30.967044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVyhT2NBEgkBEHzcg"], "accumulated_threat_level": 11.700000000000003, "timewindow": 25} +{"Format": "IDEA0", "ID": "374bb915-1d1b-4a70-843d-f3b6779dd338", "DetectTime": "2024-05-21T12:26:30.994380+00:00", "EventTime": "2024-05-21T12:26:30.994398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMtFj2svgH30Bwpjj"], "accumulated_threat_level": 12.500000000000004, "timewindow": 25} +{"Format": "Json", "ID": "374bb915-1d1b-4a70-843d-f3b6779dd338", "DetectTime": "2024-05-21T12:26:30.994380+00:00", "EventTime": "2024-05-21T12:26:30.994398+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "1970-01-02T00:15:00.475073+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:26:31.193230)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "0cdb8432-ec0a-4c73-a363-2db4a5e0e5dd", "DetectTime": "2024-05-21T12:26:31.205488+00:00", "EventTime": "2024-05-21T12:26:31.205510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LEeE2VhuSK9R47c9"], "accumulated_threat_level": 0.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "2b21019a-cbfa-45c1-bac0-a4dad383d670", "DetectTime": "2024-05-21T12:26:31.216257+00:00", "EventTime": "2024-05-21T12:26:31.216277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4Z004FW68B6ySseh"], "accumulated_threat_level": 1.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "0a48ac75-3191-4551-93c5-bc08ff646e80", "DetectTime": "2024-05-21T12:26:31.286286+00:00", "EventTime": "2024-05-21T12:26:31.286305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4cAekmjuAhHSYV8"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "398c9db2-eb3a-4a3d-9917-66eb5a62bbf1", "DetectTime": "2024-05-21T12:26:31.344224+00:00", "EventTime": "2024-05-21T12:26:31.344246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwN0Bm4YVyEpCZ9zY1"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "06f5fb10-68cc-4e51-8878-1a2c1d2120a1", "DetectTime": "2024-05-21T12:26:31.412016+00:00", "EventTime": "2024-05-21T12:26:31.412037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoFSg4WaUph2emtb4"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "92eb1114-962a-4a31-855b-e9642e1ea92f", "DetectTime": "2024-05-21T12:26:31.416784+00:00", "EventTime": "2024-05-21T12:26:31.416803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co75FQ1KywTKDaojsk"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "ffe4bbd9-65c1-417f-b509-d95c7619d836", "DetectTime": "2024-05-21T12:26:31.442931+00:00", "EventTime": "2024-05-21T12:26:31.442951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBd70N1HaFPI7P4rC6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "a8e02898-866e-4f61-833e-90f1321bfd8d", "DetectTime": "2024-05-21T12:26:31.601022+00:00", "EventTime": "2024-05-21T12:26:31.601044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX72n12pbYwxgk6Swg"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "5efbe93e-5d65-4a6c-b12b-20b1753b3e6c", "DetectTime": "2024-05-21T12:26:31.621853+00:00", "EventTime": "2024-05-21T12:26:31.621876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C98izD2Mhv9S1BK1U6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 25} +{"Format": "IDEA0", "ID": "7fbb9ea6-1e1a-41dd-b3b1-755f67e7ad71", "DetectTime": "2024-05-21T12:26:31.627167+00:00", "EventTime": "2024-05-21T12:26:31.627190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvYnp3gyspcM133S6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "0f7d2b75-435e-44c9-92c8-4e65db15ef8a", "DetectTime": "2024-05-21T12:26:31.657403+00:00", "EventTime": "2024-05-21T12:26:31.657423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeqEc3i1EYK2WeUP9"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "74f0df2c-3cd4-4bc1-8408-e89d1dcc64d4", "DetectTime": "2024-05-21T12:26:31.676640+00:00", "EventTime": "2024-05-21T12:26:31.676658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxpMVXk9qnriojqk"], "accumulated_threat_level": 3.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "9a149af8-0c1e-4da4-8894-41df7402e17e", "DetectTime": "2024-05-21T12:26:31.702996+00:00", "EventTime": "2024-05-21T12:26:31.703015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.27.248"]}], "Attach": [{"Content": "Connection to unknown destination port 16896/UDP destination IP 188.169.27.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxV1g174RhVLXsHae"], "accumulated_threat_level": 4.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "71cbcf23-9788-4897-bfa7-12d35f671aaa", "DetectTime": "2024-05-21T12:26:31.731379+00:00", "EventTime": "2024-05-21T12:26:31.731400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTilg41bXHLljg78k"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "b5838f80-33cb-435e-b230-4c6cdc08f631", "DetectTime": "2024-05-21T12:26:31.752300+00:00", "EventTime": "2024-05-21T12:26:31.752320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.92.75.150"]}], "Attach": [{"Content": "Connection to unknown destination port 4736/UDP destination IP 78.92.75.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpyi24XthCh2IBKVg"], "accumulated_threat_level": 4.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "c1d87ba0-d2d5-4384-927d-7a725101f65e", "DetectTime": "2024-05-21T12:26:31.766742+00:00", "EventTime": "2024-05-21T12:26:31.766762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7Y1U1dMfiAVKtkV3"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "54129256-75b9-4a85-9816-306f79f402b4", "DetectTime": "2024-05-21T12:26:31.848693+00:00", "EventTime": "2024-05-21T12:26:31.848712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 49.49.17.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1Mmh3IwsVixcrht7"], "accumulated_threat_level": 5.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "a4465048-d7cf-4cc4-abc9-8c7ac3fb10a2", "DetectTime": "2024-05-21T12:26:31.869199+00:00", "EventTime": "2024-05-21T12:26:31.869218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrNlH1IJ62y6nx1G7"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "8c3465a6-168c-4d32-846f-9f47e9b1a0b5", "DetectTime": "2024-05-21T12:26:31.898381+00:00", "EventTime": "2024-05-21T12:26:31.898402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCf604SX75nidMaY6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "dd9a6f8a-a787-4b10-b9b1-6a149162b45d", "DetectTime": "2024-05-21T12:26:31.926097+00:00", "EventTime": "2024-05-21T12:26:31.926115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtGie3ERDO6uLrl2d"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "49cc5fca-2725-4c19-91fc-60e7f438639e", "DetectTime": "2024-05-21T12:26:31.933780+00:00", "EventTime": "2024-05-21T12:26:31.933799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmKgN2j3y6mQ7SoKf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "7c3c4c27-2625-4865-be15-257331e34fa5", "DetectTime": "2024-05-21T12:26:31.974712+00:00", "EventTime": "2024-05-21T12:26:31.974730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch4vRj1IIp8RkOYbLj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 25} +{"Format": "IDEA0", "ID": "f16aaf1c-c320-45f6-b196-2303e1d3b512", "DetectTime": "2024-05-21T12:26:31.979473+00:00", "EventTime": "2024-05-21T12:26:31.979493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcecG92chiWaWhFpD5"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "85f00394-46ac-4652-904d-9ac9d3d12229", "DetectTime": "2024-05-21T12:26:31.998210+00:00", "EventTime": "2024-05-21T12:26:31.998232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVmdk2b1XlZZcq367"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "56bc2dce-b62d-443d-b62e-411f4fce201a", "DetectTime": "2024-05-21T12:26:32.030067+00:00", "EventTime": "2024-05-21T12:26:32.030089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVtnL3RLk78bahgIb"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "e1bbcb1e-7ebd-4b47-8b3b-b10fa28a93fa", "DetectTime": "2024-05-21T12:26:32.035293+00:00", "EventTime": "2024-05-21T12:26:32.035312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdUrp8NsvFiyfELl"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "b191b547-7581-4a75-a223-dbbafef74076", "DetectTime": "2024-05-21T12:26:32.053862+00:00", "EventTime": "2024-05-21T12:26:32.053883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgJaB1rcvDhHschFe"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "510b889e-f309-4a4f-bc97-3278ec20cbf4", "DetectTime": "2024-05-21T12:26:32.067804+00:00", "EventTime": "2024-05-21T12:26:32.067826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.135.183.152"]}], "Attach": [{"Content": "Connection to unknown destination port 1728/UDP destination IP 189.135.183.152. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZv4Dq34HqpSlB5Mcl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "fd4dc7e1-a269-4938-b456-4cab4ce0a6c8", "DetectTime": "2024-05-21T12:26:32.102099+00:00", "EventTime": "2024-05-21T12:26:32.102119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "Connection to unknown destination port 27958/UDP destination IP 109.93.140.11. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4gM54j82uE99l1X1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "c9ebbd50-2619-4bdb-9a15-dbdd0dcdb95b", "DetectTime": "2024-05-21T12:26:32.118450+00:00", "EventTime": "2024-05-21T12:26:32.118472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAoBy2eDAodRiiCgc"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "2f64c7c0-457e-4c0c-a801-3a6be2e5e948", "DetectTime": "2024-05-21T12:26:32.163624+00:00", "EventTime": "2024-05-21T12:26:32.163654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JSKxfoBYB31ZqO4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "38828277-d892-450c-8981-ad9f77b6015e", "DetectTime": "2024-05-21T12:26:32.170055+00:00", "EventTime": "2024-05-21T12:26:32.170077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFk4YF3kD5T3VcYIlf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "2df3d6ac-3201-45f9-99ba-0773a5e04363", "DetectTime": "2024-05-21T12:26:32.185149+00:00", "EventTime": "2024-05-21T12:26:32.185167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7yOq2TIP6otX2w4j"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "404a52d3-8513-46e8-828f-7cfcb274cf7f", "DetectTime": "2024-05-21T12:26:32.198680+00:00", "EventTime": "2024-05-21T12:26:32.198698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7yOq2TIP6otX2w4j"], "accumulated_threat_level": 8.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "51a1f624-37d6-4bba-8b87-970f70969141", "DetectTime": "2024-05-21T12:26:32.272643+00:00", "EventTime": "2024-05-21T12:26:32.272666+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vdfh3HEHOGstYSM4"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "defc9a1d-90d5-4bb2-9843-7b1b73c1ac7b", "DetectTime": "2024-05-21T12:26:32.295905+00:00", "EventTime": "2024-05-21T12:26:32.295926+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vdfh3HEHOGstYSM4"], "accumulated_threat_level": 9.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "8b112ecf-b662-43ab-9cc8-539d977fbecd", "DetectTime": "2024-05-21T12:26:32.408068+00:00", "EventTime": "2024-05-21T12:26:32.408086+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.232.130"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-64-232-130.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIgnB2PzCjqNt3sL6"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "d6fd667f-3667-4a2e-8d01-a5f208297361", "DetectTime": "2024-05-21T12:26:32.462041+00:00", "EventTime": "2024-05-21T12:26:32.462061+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.232.130"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-64-232-130.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIgnB2PzCjqNt3sL6"], "accumulated_threat_level": 9.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "5d287a2d-e616-4688-ba40-3e123ce872e5", "DetectTime": "2024-05-21T12:26:32.493737+00:00", "EventTime": "2024-05-21T12:26:32.493756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgBWB1uxS51iq6kIh"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "dfbe76a6-2b26-48d7-b915-4feaad200e6e", "DetectTime": "2024-05-21T12:26:32.503193+00:00", "EventTime": "2024-05-21T12:26:32.503212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48gPc2UTo27Oashj6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "5255ab3a-da8e-4b37-a4cf-1fdeb378a93d", "DetectTime": "2024-05-21T12:26:32.513511+00:00", "EventTime": "2024-05-21T12:26:32.513532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2A9X2WcC029bAS62"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "fdefcac0-816c-47f7-bb70-ee9713974d4f", "DetectTime": "2024-05-21T12:26:32.518235+00:00", "EventTime": "2024-05-21T12:26:32.518254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NLmm3jEbRa9hPKdh"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "51f7dd24-a491-44b6-9515-a6efb986f84a", "DetectTime": "2024-05-21T12:26:32.556675+00:00", "EventTime": "2024-05-21T12:26:32.556696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdvWqe35GjNI99KZm3"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "f0538991-210d-4b01-995f-b0c645e6a7ba", "DetectTime": "2024-05-21T12:26:32.588900+00:00", "EventTime": "2024-05-21T12:26:32.588921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemPYHbO3zxUnjUT8"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "faf5c5e3-5eae-4d66-a011-c9f34c052ed4", "DetectTime": "2024-05-21T12:26:32.600929+00:00", "EventTime": "2024-05-21T12:26:32.600950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2ntK2daUdQOPfC5l"], "accumulated_threat_level": 9.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "a558eb87-da46-4d4a-96b8-68ec63b30181", "DetectTime": "2024-05-21T12:26:32.606005+00:00", "EventTime": "2024-05-21T12:26:32.606023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSZC92uw4kUqtC1d7"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "7e0d8cd4-17d8-454f-af3e-b1dcbfee8b17", "DetectTime": "2024-05-21T12:26:32.682420+00:00", "EventTime": "2024-05-21T12:26:32.682439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUBqZ3WGbkUA6eBC5"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "2190bc13-cd3a-4bf5-ae9c-870deaab03ab", "DetectTime": "2024-05-21T12:26:32.708158+00:00", "EventTime": "2024-05-21T12:26:32.708177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5G78Y18T7hDfRCf59"], "accumulated_threat_level": 10.4, "timewindow": 25} +{"Format": "IDEA0", "ID": "c4e7d3e0-8fa7-4361-be3d-69dd58d898ee", "DetectTime": "2024-05-21T12:26:32.735477+00:00", "EventTime": "2024-05-21T12:26:32.735495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgr2Il4UYmnt9t7I"], "accumulated_threat_level": 11.200000000000001, "timewindow": 25} +{"Format": "IDEA0", "ID": "15e449f6-46e0-410f-b997-9b5f93605859", "DetectTime": "2024-05-21T12:26:32.761564+00:00", "EventTime": "2024-05-21T12:26:32.761583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAxZC4RdjIjb7IYya"], "accumulated_threat_level": 12.000000000000002, "timewindow": 25} +{"Format": "Json", "ID": "15e449f6-46e0-410f-b997-9b5f93605859", "DetectTime": "2024-05-21T12:26:32.761564+00:00", "EventTime": "2024-05-21T12:26:32.761583+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "1970-01-02T00:15:37.353797+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:26:32.903267)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d7ab34bd-8804-4b37-87b3-9884b4413e20", "DetectTime": "2024-05-21T12:26:32.913608+00:00", "EventTime": "2024-05-21T12:26:32.913625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "Connection to unknown destination port 8045/UDP destination IP 177.189.51.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPAri4sIc0mVnNDdc"], "accumulated_threat_level": 0.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "e7d59fe0-0a6d-45a4-9ea8-43f36a20f92e", "DetectTime": "2024-05-21T12:26:32.928162+00:00", "EventTime": "2024-05-21T12:26:32.928182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNASVT2AoeOe54DM77"], "accumulated_threat_level": 1.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "b7dbae12-26ad-4124-879d-49d443d49573", "DetectTime": "2024-05-21T12:26:32.939050+00:00", "EventTime": "2024-05-21T12:26:32.939068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.77.231.101"]}], "Attach": [{"Content": "Connection to unknown destination port 4013/UDP destination IP 95.77.231.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqz54N2Mz89YgNgxD5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 25} +{"Format": "IDEA0", "ID": "7888addf-1ec7-4386-a32c-1020762ee6f4", "DetectTime": "2024-05-21T12:26:32.950658+00:00", "EventTime": "2024-05-21T12:26:32.950679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigQllz2dAoVkggJd"], "accumulated_threat_level": 3.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "3dfa4810-c561-43fd-8c19-d294a2a46750", "DetectTime": "2024-05-21T12:26:32.960579+00:00", "EventTime": "2024-05-21T12:26:32.960596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"]}], "Attach": [{"Content": "Connection to unknown destination port 5857/UDP destination IP 46.237.70.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAtaSl1OOV3qsLSlra"], "accumulated_threat_level": 4.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "7dcc03fd-2117-4cab-ae7e-4d4e6d096a3d", "DetectTime": "2024-05-21T12:26:32.972056+00:00", "EventTime": "2024-05-21T12:26:32.972077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLR2FJ3LRZacpyPEn3"], "accumulated_threat_level": 4.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "011de643-f34b-41e7-ae55-44277d7e0b3b", "DetectTime": "2024-05-21T12:26:32.976725+00:00", "EventTime": "2024-05-21T12:26:32.976743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXn6n4qwjE79u2Ok3", "CB7UHc15hMYveaeJmj", "CH5gFl3eBEuuqqw2ob", "CQLcn7ND31jjUfBM9"], "accumulated_threat_level": 5.3, "timewindow": 25} +{"Format": "IDEA0", "ID": "e893114a-ebb5-460f-9290-1220dbd433b3", "DetectTime": "2024-05-21T12:26:32.987026+00:00", "EventTime": "2024-05-21T12:26:32.987044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkyYi9rbvd9EvgJ9"], "accumulated_threat_level": 6.1, "timewindow": 25} +{"Format": "IDEA0", "ID": "9b8cd7a1-8ef6-4920-9ce9-e6f473857e36", "DetectTime": "2024-05-21T12:26:33.046271+00:00", "EventTime": "2024-05-21T12:26:33.046291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhMNk3glQMa38bKK6"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 25} +{"Format": "IDEA0", "ID": "600daf38-2dd5-4af0-8091-d46ee3345037", "DetectTime": "2024-05-21T12:26:33.556661+00:00", "EventTime": "2024-05-21T12:26:33.556680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.231.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOuovt9gy2hmR2fj"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "c79dec4b-185f-4550-91ee-2ebbc6c2db4b", "DetectTime": "2024-05-21T12:26:33.568343+00:00", "EventTime": "2024-05-21T12:26:33.568361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.193.222.108 AS: ATT-INTERNET4, US AS7018 rDNS: 107-193-222-108.lightspeed.austtx.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWO6yh4Bem1t1GsEx8"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "41e96780-61d9-46fc-9e81-a5ea81208100", "DetectTime": "2024-05-21T12:26:33.663735+00:00", "EventTime": "2024-05-21T12:26:33.663753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.120.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjO2iW3RejVNkTbh22"], "accumulated_threat_level": 11.700000000000001, "timewindow": 23} +{"Format": "IDEA0", "ID": "db4a6758-2245-4e09-86f0-d72a71c8bf7e", "DetectTime": "2024-05-21T12:26:33.961422+00:00", "EventTime": "2024-05-21T12:26:33.961442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSOMm3CkT1XvG6GH7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "a710e75f-f82a-4329-9eac-08f05d4a999f", "DetectTime": "2024-05-21T12:26:33.966272+00:00", "EventTime": "2024-05-21T12:26:33.966292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzIkFc3XIJM2bOyn41", "CzvRCH1tm9vMSXRMri", "CIKnWMsge2cylEbhh", "C3dYFn39nqzwnlTA9"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 25} +{"Format": "IDEA0", "ID": "07ce7be6-ea83-4de6-89f2-e24ad5c6ac76", "DetectTime": "2024-05-21T12:26:33.987410+00:00", "EventTime": "2024-05-21T12:26:33.987431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tthCkmS9fdDriJf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "352ac242-da71-4cf8-a9c6-292aee9586de", "DetectTime": "2024-05-21T12:26:34.024379+00:00", "EventTime": "2024-05-21T12:26:34.024400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMilV1OQgf0SkopKe"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "774b134a-7511-425f-bf15-254ef62e6ee2", "DetectTime": "2024-05-21T12:26:34.049824+00:00", "EventTime": "2024-05-21T12:26:34.049842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnBDV3OzBd5qB50Ej"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "056719f9-9f78-45e5-935c-c9fe832ca8c3", "DetectTime": "2024-05-21T12:26:34.405299+00:00", "EventTime": "2024-05-21T12:26:34.405321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY0Jn1Uzxjtucwy1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c636863b-2409-4f93-9ee2-3a7abb3ff683", "DetectTime": "2024-05-21T12:26:34.838940+00:00", "EventTime": "2024-05-21T12:26:34.838958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwC1M521TkLiyyTrc6"], "accumulated_threat_level": 8.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "a7e4fab6-5a29-4477-8936-63dab0ede828", "DetectTime": "2024-05-21T12:26:34.878304+00:00", "EventTime": "2024-05-21T12:26:34.878324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWpWdXmkbLxSsKb7"], "accumulated_threat_level": 9.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "3733047b-adac-49ed-bfa2-f360c392a534", "DetectTime": "2024-05-21T12:26:34.962595+00:00", "EventTime": "2024-05-21T12:26:34.962613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHmND1bc2MljLWcng"], "accumulated_threat_level": 9.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "68616cb7-fa5a-4dac-ade1-bda396120718", "DetectTime": "2024-05-21T12:26:34.967183+00:00", "EventTime": "2024-05-21T12:26:34.967201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwodHC2otom0mklIbi"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "dc0a38ad-379f-4452-831d-4d6a6985ff38", "DetectTime": "2024-05-21T12:26:34.991328+00:00", "EventTime": "2024-05-21T12:26:34.991350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbggtj4V2rESNsxC9i"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "dbb4025b-41d8-4068-9caa-36e39b1b3738", "DetectTime": "2024-05-21T12:26:35.011874+00:00", "EventTime": "2024-05-21T12:26:35.011893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "Connection to unknown destination port 18202/UDP destination IP 189.231.69.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVK4T83190jlICdpHf"], "accumulated_threat_level": 10.600000000000001, "timewindow": 25} +{"Format": "IDEA0", "ID": "4ecd60a2-40e4-432e-806f-20f56df75924", "DetectTime": "2024-05-21T12:26:35.025973+00:00", "EventTime": "2024-05-21T12:26:35.025995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rohf3uoFSNUDOTI6"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "e638d261-1815-487d-8ec0-805b8cd931d4", "DetectTime": "2024-05-21T12:26:35.126107+00:00", "EventTime": "2024-05-21T12:26:35.126124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFmK13mABI5t8vfad"], "accumulated_threat_level": 11.400000000000002, "timewindow": 25} +{"Format": "IDEA0", "ID": "ea2336a2-6685-49b8-a14c-8249d606c98b", "DetectTime": "2024-05-21T12:26:35.140882+00:00", "EventTime": "2024-05-21T12:26:35.140903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvTAU2NflEnFbQTig"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "fc7565d5-bb44-4124-a5a0-ed7a70730771", "DetectTime": "2024-05-21T12:26:35.148105+00:00", "EventTime": "2024-05-21T12:26:35.148124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPohvp3pbQslVtNIoi"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "14b0cd80-e18e-40f3-92d8-57563f4f1ae6", "DetectTime": "2024-05-21T12:26:35.159177+00:00", "EventTime": "2024-05-21T12:26:35.159196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOy3T1XrtW6KtMb7l", "CtuR8v17DjtfWYYCr1", "CynORf1HFVrDFk8co4", "C3NrlY3gPVlKDRxgT5"], "accumulated_threat_level": 11.900000000000002, "timewindow": 25} +{"Format": "IDEA0", "ID": "280b7125-5c15-4408-b669-ffb7f0aa3053", "DetectTime": "2024-05-21T12:26:35.183980+00:00", "EventTime": "2024-05-21T12:26:35.184027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnlBF19Vcn5FmUCE8"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8e255f4c-0c43-4482-ae6a-ccde3b0ef82a", "DetectTime": "2024-05-21T12:26:35.440964+00:00", "EventTime": "2024-05-21T12:26:35.440983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBFGa2K8Ya0Dwpuj6"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "a8ea89e0-f56f-4de1-905a-9ad2dfa24e70", "DetectTime": "2024-05-21T12:26:35.445668+00:00", "EventTime": "2024-05-21T12:26:35.445687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgA3j51MLSFoB6Pj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "ee0dfbb3-478c-43d1-824b-c788ab48030f", "DetectTime": "2024-05-21T12:26:35.486910+00:00", "EventTime": "2024-05-21T12:26:35.486932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwu0Dz04gG7B5Zfb"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "31202ae1-e410-4594-bc01-9ac42977fbd3", "DetectTime": "2024-05-21T12:26:35.492257+00:00", "EventTime": "2024-05-21T12:26:35.492280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvSDy24uGqyYra0VU5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8820d05e-6782-428f-bb8d-219d415b64ca", "DetectTime": "2024-05-21T12:26:35.518509+00:00", "EventTime": "2024-05-21T12:26:35.518529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh5ac3M4Yo0Zi03Xa"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "bd9ae5ba-54fb-45d7-9744-cb7d1658c87e", "DetectTime": "2024-05-21T12:26:35.535559+00:00", "EventTime": "2024-05-21T12:26:35.535581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6ydPSeC95MJq258"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "537b1b39-a3da-45f8-811b-fc70f0bcaf6c", "DetectTime": "2024-05-21T12:26:35.570060+00:00", "EventTime": "2024-05-21T12:26:35.570081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci5osgAZX47pg6v9"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "ee2c0bed-a291-48a6-87b4-0141777f92a0", "DetectTime": "2024-05-21T12:26:35.574794+00:00", "EventTime": "2024-05-21T12:26:35.574813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLTuT71FgHSjftMH44"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "260bcab4-2b7c-480b-8f8e-033987673835", "DetectTime": "2024-05-21T12:26:35.606008+00:00", "EventTime": "2024-05-21T12:26:35.606030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjpQUwEItFJKNB2Ma"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "228d5ae6-194f-4c18-8d0c-af521702d73e", "DetectTime": "2024-05-21T12:26:35.616759+00:00", "EventTime": "2024-05-21T12:26:35.616777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxodQAECgDVknmGZk"], "accumulated_threat_level": 12.700000000000003, "timewindow": 25} +{"Format": "Json", "ID": "228d5ae6-194f-4c18-8d0c-af521702d73e", "DetectTime": "2024-05-21T12:26:35.616759+00:00", "EventTime": "2024-05-21T12:26:35.616777+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "1970-01-02T00:48:32.499519+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:26:35.919606)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "83b33088-e8f8-46a6-9b95-3ff6ab5a7b5d", "DetectTime": "2024-05-21T12:26:35.923438+00:00", "EventTime": "2024-05-21T12:26:35.923455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbYOh45hlX11UGgHk"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "18e6a2c8-0c77-4510-b662-3b980e1f60bc", "DetectTime": "2024-05-21T12:26:35.927787+00:00", "EventTime": "2024-05-21T12:26:35.927805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKO062bjcuzOtNEh8"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3c0ca306-ae68-4bf2-82a4-b22ef14baebd", "DetectTime": "2024-05-21T12:26:35.932198+00:00", "EventTime": "2024-05-21T12:26:35.932216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgLwR1sjuj2VHhdNc"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "7faf8c2c-4acf-4c59-a6bc-c03695b8d25d", "DetectTime": "2024-05-21T12:26:35.936720+00:00", "EventTime": "2024-05-21T12:26:35.936737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEN9i4oKQiiOdIzac"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "872d1393-9e2c-440c-a171-1a4e472ce4b6", "DetectTime": "2024-05-21T12:26:35.949911+00:00", "EventTime": "2024-05-21T12:26:35.949932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGBE7tt3JCqYfxX4"], "accumulated_threat_level": 0.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "3f327e31-1127-49ce-9ad7-bcf49a925d2b", "DetectTime": "2024-05-21T12:26:35.954621+00:00", "EventTime": "2024-05-21T12:26:35.954640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1f5z46sC4PZgQHJl"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3f851ac6-65e4-469b-b557-2d6831075dfb", "DetectTime": "2024-05-21T12:26:35.959252+00:00", "EventTime": "2024-05-21T12:26:35.959270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsrSW1OIMT7HkUpF8"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d5c8eb3c-762d-4faf-8bf7-0f83f577a494", "DetectTime": "2024-05-21T12:26:35.975902+00:00", "EventTime": "2024-05-21T12:26:35.975922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDgzqrCAhIT3x76c"], "accumulated_threat_level": 1.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "c2dbcafa-4d46-474e-9935-c4871081d8e1", "DetectTime": "2024-05-21T12:26:35.986218+00:00", "EventTime": "2024-05-21T12:26:35.986236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyuaO03OOY8rbtsULe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 25} +{"Format": "IDEA0", "ID": "2dad6762-9a86-4cbf-8a3f-a37e8374e03d", "DetectTime": "2024-05-21T12:26:35.996114+00:00", "EventTime": "2024-05-21T12:26:35.996132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5WeU39shezvZZMNa"], "accumulated_threat_level": 3.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "13094bb5-7aea-4058-b651-d21bb9796466", "DetectTime": "2024-05-21T12:26:36.007879+00:00", "EventTime": "2024-05-21T12:26:36.007898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauT9W2ElXJ4tQPf6i"], "accumulated_threat_level": 4.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "a6a2f1f5-53e6-44e8-8136-b6ac9ef7e887", "DetectTime": "2024-05-21T12:26:36.018856+00:00", "EventTime": "2024-05-21T12:26:36.018877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCBuM3Y8cdM6ce4d8"], "accumulated_threat_level": 4.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "a1a9c111-384c-4b4f-ba9c-712b71f275ca", "DetectTime": "2024-05-21T12:26:36.030820+00:00", "EventTime": "2024-05-21T12:26:36.030842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "Connection to unknown destination port 13795/UDP destination IP 1.4.149.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbya22nAMmzv4o4Rd"], "accumulated_threat_level": 5.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "a7b12120-9f21-4893-b554-9d2edb870577", "DetectTime": "2024-05-21T12:26:36.076314+00:00", "EventTime": "2024-05-21T12:26:36.076336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKjuZ1fsBvLMiEhu1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 25} +{"Format": "IDEA0", "ID": "a63982c7-657c-478c-8636-fd43deda6181", "DetectTime": "2024-05-21T12:26:36.087540+00:00", "EventTime": "2024-05-21T12:26:36.087559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf4W71C9NPi3HB66j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "36ee5f77-d75f-431b-bc9e-8029e00cbd90", "DetectTime": "2024-05-21T12:26:36.097760+00:00", "EventTime": "2024-05-21T12:26:36.097780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVthv3uFnyCqcqomh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "ccea0fcb-c641-401a-97ed-f8d8722a060e", "DetectTime": "2024-05-21T12:26:36.108932+00:00", "EventTime": "2024-05-21T12:26:36.108949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI7kYB2dhdqn8Cwrih"], "accumulated_threat_level": 8.799999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "8accb304-c3f2-43b9-bfe8-bb5bd2286d74", "DetectTime": "2024-05-21T12:26:36.361231+00:00", "EventTime": "2024-05-21T12:26:36.361251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 49.49.17.72. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1h84l2NDyrbLXoWSk"], "accumulated_threat_level": 9.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "4cac3889-2e64-45c6-9e46-cdc5e09199cf", "DetectTime": "2024-05-21T12:26:36.445653+00:00", "EventTime": "2024-05-21T12:26:36.445670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7N6J2UI5dPHrq4oc"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "af4fbc01-fc78-4f94-871c-06e86d365154", "DetectTime": "2024-05-21T12:26:36.653693+00:00", "EventTime": "2024-05-21T12:26:36.653712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "Connection to unknown destination port 27958/UDP destination IP 109.93.140.11. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDN80G1ezfho4RPepc"], "accumulated_threat_level": 10.4, "timewindow": 25} +{"Format": "IDEA0", "ID": "4ab3129a-c606-4776-92ef-9e763efd9089", "DetectTime": "2024-05-21T12:26:36.697905+00:00", "EventTime": "2024-05-21T12:26:36.697923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjQMx497pHV2qrORi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 25} +{"Format": "IDEA0", "ID": "a7637653-3e8f-472a-a6d2-e6408fa5dfb9", "DetectTime": "2024-05-21T12:26:36.730465+00:00", "EventTime": "2024-05-21T12:26:36.730484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeey61qStftr2JY4e"], "accumulated_threat_level": 12.000000000000002, "timewindow": 25} +{"Format": "Json", "ID": "a7637653-3e8f-472a-a6d2-e6408fa5dfb9", "DetectTime": "2024-05-21T12:26:36.730465+00:00", "EventTime": "2024-05-21T12:26:36.730484+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "1970-01-02T00:49:26.887671+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:26:36.965623)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "dd3a8901-c98e-4d1c-b03e-e63a1cd53b92", "DetectTime": "2024-05-21T12:26:36.976650+00:00", "EventTime": "2024-05-21T12:26:36.976671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9ziZjxM2QQwlFuf"], "accumulated_threat_level": 0.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "56c20ca3-32a5-4f0e-a91e-c3e8cf9e3e7f", "DetectTime": "2024-05-21T12:26:36.987549+00:00", "EventTime": "2024-05-21T12:26:36.987568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyxEknLEcwKq6HSp2"], "accumulated_threat_level": 1.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "4e3eb7a6-0d44-4aec-9ee8-eb4b369d70a9", "DetectTime": "2024-05-21T12:26:36.992084+00:00", "EventTime": "2024-05-21T12:26:36.992102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFwjD3rGGRtKXvdq9"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "7c086e49-01cd-49f1-9dd4-eb8d59dd75f0", "DetectTime": "2024-05-21T12:26:37.002053+00:00", "EventTime": "2024-05-21T12:26:37.002073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7hl52UMzUxdIvmw5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 25} +{"Format": "IDEA0", "ID": "c1f27299-f92b-4982-b653-01e1e854bb26", "DetectTime": "2024-05-21T12:26:37.012839+00:00", "EventTime": "2024-05-21T12:26:37.012857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKviK3fJkdS3a5URc"], "accumulated_threat_level": 3.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "92588950-81ca-4509-8af7-799331de56b1", "DetectTime": "2024-05-21T12:26:37.022543+00:00", "EventTime": "2024-05-21T12:26:37.022560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMTgFYFIPJtZPU28"], "accumulated_threat_level": 4.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "b6ea40ae-9497-4bf5-a676-adb8ed6bf4eb", "DetectTime": "2024-05-21T12:26:37.032601+00:00", "EventTime": "2024-05-21T12:26:37.032619+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPYkZtvO6CSynrPej"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "f969be6b-2367-446a-a005-8cfa5071faa1", "DetectTime": "2024-05-21T12:26:37.044472+00:00", "EventTime": "2024-05-21T12:26:37.044491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPYkZtvO6CSynrPej"], "accumulated_threat_level": 10.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "2e442e0b-87bb-48dc-95b1-72466e158873", "DetectTime": "2024-05-21T12:26:37.169964+00:00", "EventTime": "2024-05-21T12:26:37.169984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.156.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYR1A3soFZAuBoXaj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "cb81ba9d-37a2-4f81-b749-67a8322c1fc3", "DetectTime": "2024-05-21T12:26:37.216872+00:00", "EventTime": "2024-05-21T12:26:37.216893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.237.70.170"]}], "Attach": [{"Content": "Connection to unknown destination port 5857/UDP destination IP 46.237.70.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH2Bk2VdJvoQJX6zg"], "accumulated_threat_level": 4.8, "timewindow": 25} +{"Format": "IDEA0", "ID": "596d7acb-2c90-4d4c-91ae-df35a0d4439d", "DetectTime": "2024-05-21T12:26:37.330353+00:00", "EventTime": "2024-05-21T12:26:37.330372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtpCN1FqhexcnOGrk"], "accumulated_threat_level": 5.6, "timewindow": 25} +{"Format": "IDEA0", "ID": "f346cc8a-4469-4fc8-933b-5cf54c258b44", "DetectTime": "2024-05-21T12:26:37.422978+00:00", "EventTime": "2024-05-21T12:26:37.422999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.68.167.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31lJ4d002jxvGVnh"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "79c76933-048f-4ee9-8678-a5b13b2a7e78", "DetectTime": "2024-05-21T12:26:37.465694+00:00", "EventTime": "2024-05-21T12:26:37.465717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPSDEhAsxl6b1R63"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 25} +{"Format": "IDEA0", "ID": "a0c41865-6b5e-4984-98bf-1eb48bbabec2", "DetectTime": "2024-05-21T12:26:37.503095+00:00", "EventTime": "2024-05-21T12:26:37.503115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUIDDqkZROxyIuce"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "8ee92ea7-6d8f-403b-b1e6-1ae8eda1e56c", "DetectTime": "2024-05-21T12:26:37.612108+00:00", "EventTime": "2024-05-21T12:26:37.612129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNzqG3fSNZzOcTJKb"], "accumulated_threat_level": 0.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "e56bd081-2aea-460c-9a50-c3b26f3fa303", "DetectTime": "2024-05-21T12:26:37.663711+00:00", "EventTime": "2024-05-21T12:26:37.663730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.44.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Zmb2rtUccn87Od9"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "bb8c1adc-4f1e-427c-92ed-10fe7e9cdcef", "DetectTime": "2024-05-21T12:26:37.951398+00:00", "EventTime": "2024-05-21T12:26:37.951417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.190.93.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNUnM1yN0U6d4f2hf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "dc029f88-926f-4234-9f0b-cd1b5c39d99f", "DetectTime": "2024-05-21T12:26:38.027921+00:00", "EventTime": "2024-05-21T12:26:38.027938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5WHmF4GWbyPRRIqf9", "Cue4oc2FpF0q3WGyl1", "Clsdvc2BKdmuEZDFoj", "CCYnZc2faVb7DHCeIh"], "accumulated_threat_level": 1.3, "timewindow": 26} +{"Format": "IDEA0", "ID": "161ec635-9c8c-442c-b9c6-bc665f9104de", "DetectTime": "2024-05-21T12:26:38.199624+00:00", "EventTime": "2024-05-21T12:26:38.199649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.89.85 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0afl35hTzRstyquk"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3143871b-d5dd-4864-8603-c621d71afa17", "DetectTime": "2024-05-21T12:26:38.221814+00:00", "EventTime": "2024-05-21T12:26:38.221835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.30.151 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hHlvvKg3cQ3dvW5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "4ace530a-13b9-4271-a402-388cd574171e", "DetectTime": "2024-05-21T12:26:38.283002+00:00", "EventTime": "2024-05-21T12:26:38.283025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPwwf2ZU5g8eXr231"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "742f245e-b028-4be6-8070-ecc701205b79", "DetectTime": "2024-05-21T12:26:38.316268+00:00", "EventTime": "2024-05-21T12:26:38.316286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmgsvo4OMUh8lP8QA2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "acf1733d-f593-40e0-8205-051877663b19", "DetectTime": "2024-05-21T12:26:38.352986+00:00", "EventTime": "2024-05-21T12:26:38.353007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaw8Z2J69n6mH1IW1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d2271f36-56a4-4db2-bdb9-25acbb3bb991", "DetectTime": "2024-05-21T12:26:38.392155+00:00", "EventTime": "2024-05-21T12:26:38.392177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1TJra4VZbho5j4n1d"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "df8272b1-bf3d-40c3-942e-4fb99e283c61", "DetectTime": "2024-05-21T12:26:38.478834+00:00", "EventTime": "2024-05-21T12:26:38.478856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaEVr43qdKxdXgess7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d49e5bea-2e06-4253-a3c1-a77949c6ab53", "DetectTime": "2024-05-21T12:26:38.549189+00:00", "EventTime": "2024-05-21T12:26:38.549212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7WeU1w9PaB3kY2ui"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c58ef526-2328-4033-bfa4-9dca3c991d67", "DetectTime": "2024-05-21T12:26:38.680969+00:00", "EventTime": "2024-05-21T12:26:38.680991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCvHq2uApQ6ciaqdg"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "e7933050-800a-47f6-8576-1f7fc09fcaaa", "DetectTime": "2024-05-21T12:26:38.827318+00:00", "EventTime": "2024-05-21T12:26:38.827341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbZvd1fBjlET20lU1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d7aef45c-2576-4037-9624-41c971afd70f", "DetectTime": "2024-05-21T12:26:38.860728+00:00", "EventTime": "2024-05-21T12:26:38.860746+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUzjV1XsWIwBF0Uk8"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "a901d96a-7a54-49b6-88d9-f311de7e63aa", "DetectTime": "2024-05-21T12:26:38.871579+00:00", "EventTime": "2024-05-21T12:26:38.871597+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUzjV1XsWIwBF0Uk8"], "accumulated_threat_level": 10.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "e04e0dae-8126-4a1d-8f48-ae2c793e9488", "DetectTime": "2024-05-21T12:26:38.877505+00:00", "EventTime": "2024-05-21T12:26:38.877528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UNtx26xeDirAzo5d"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "85f1673c-b373-4733-b1ee-4ea7febb6b30", "DetectTime": "2024-05-21T12:26:38.890275+00:00", "EventTime": "2024-05-21T12:26:38.890292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2C1i64jg789s3Z3n7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "4f1ed5fc-d568-4286-9974-c0ef2dd402a9", "DetectTime": "2024-05-21T12:26:38.969209+00:00", "EventTime": "2024-05-21T12:26:38.969231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIAoVB332CR5Ek6a1j"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "864e0144-27e3-4d36-bd11-b019b8a32862", "DetectTime": "2024-05-21T12:26:38.980637+00:00", "EventTime": "2024-05-21T12:26:38.980659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVj36KWdqbeq9OIrj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "debcfc7b-5bef-4356-9615-47f86426aaba", "DetectTime": "2024-05-21T12:26:39.068592+00:00", "EventTime": "2024-05-21T12:26:39.068616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Jp0q2rA1zM9XT3b4", "CAJ47O2AVG54oCzqid", "CQ8SsL2wcrIqOY100f", "C45URc47Krfg4mZSFf"], "accumulated_threat_level": 1.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "3d37d32a-1066-42ba-a40e-a0e4a23ed158", "DetectTime": "2024-05-21T12:26:39.257617+00:00", "EventTime": "2024-05-21T12:26:39.257643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ETOog4HJwZfGi1d"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "1312f8b6-8604-4d52-a3cc-6d334692e91a", "DetectTime": "2024-05-21T12:26:39.262278+00:00", "EventTime": "2024-05-21T12:26:39.262295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8R243nrQJJKwX1kl"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "dccafd22-e18f-4332-9d53-ad2fc61f8947", "DetectTime": "2024-05-21T12:26:39.272344+00:00", "EventTime": "2024-05-21T12:26:39.272363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTnsc2L2mO5VoNA56"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "18f29753-2183-427b-8735-dd2b73c85b8d", "DetectTime": "2024-05-21T12:26:39.312614+00:00", "EventTime": "2024-05-21T12:26:39.312634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cReX3wRqafqiTJxd"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0ea22a7e-6481-4404-a717-39f13b9784be", "DetectTime": "2024-05-21T12:26:39.408390+00:00", "EventTime": "2024-05-21T12:26:39.408411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8iJh2UYik3XaIc98"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "20010077-fb37-4199-bea9-d6a4d139978d", "DetectTime": "2024-05-21T12:26:39.433797+00:00", "EventTime": "2024-05-21T12:26:39.433819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZloA3CBZLvYJHqp9"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "16dc83f0-3e64-4457-afb0-940a365e33e0", "DetectTime": "2024-05-21T12:26:39.569855+00:00", "EventTime": "2024-05-21T12:26:39.569879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsQcH3q0f9o12RNvi"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d767b615-356d-457a-94eb-f3b5b835a624", "DetectTime": "2024-05-21T12:26:39.665296+00:00", "EventTime": "2024-05-21T12:26:39.665317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.49.45.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmAgFQVCTC1QHWwc"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3114b5cc-4650-4de3-b9c5-7bce55559fe1", "DetectTime": "2024-05-21T12:26:39.686200+00:00", "EventTime": "2024-05-21T12:26:39.686221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.2.156.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8U1YLaId9DFtuGgg"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "fffedc44-64da-42a0-bc74-fdafb924f110", "DetectTime": "2024-05-21T12:26:39.707940+00:00", "EventTime": "2024-05-21T12:26:39.707961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.6.136.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilsoV2r4pExer6Vzc"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "b20a51bc-37eb-483a-9036-dd7d68c7537b", "DetectTime": "2024-05-21T12:26:39.726951+00:00", "EventTime": "2024-05-21T12:26:39.726974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.44.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycRka4ScBZ298T2od"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "255bf506-4d9d-4431-a422-98fcf84ca6c5", "DetectTime": "2024-05-21T12:26:39.749820+00:00", "EventTime": "2024-05-21T12:26:39.749899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.151.250.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2AmOL14LQmf0ZEO9"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "41a2b4d8-efff-4e93-b80a-320bafa693b8", "DetectTime": "2024-05-21T12:26:39.800905+00:00", "EventTime": "2024-05-21T12:26:39.800926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.27.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrDg143lrSe4SGwX4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9a651091-0b22-4726-a985-2b9db970dc4a", "DetectTime": "2024-05-21T12:26:39.821032+00:00", "EventTime": "2024-05-21T12:26:39.821053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.232.196.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYc9h3aPMdvqHIK34"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "69be29af-b05c-4da0-878d-0d6eef992b02", "DetectTime": "2024-05-21T12:26:39.841830+00:00", "EventTime": "2024-05-21T12:26:39.841852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.235.76.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFQVB1ist6DpVP5Le"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "131ed055-fb84-4240-ae5c-659d99555c0d", "DetectTime": "2024-05-21T12:26:39.881497+00:00", "EventTime": "2024-05-21T12:26:39.881519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.230.140.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDofwi23AwVFLM6GQk"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "a8ea9203-d930-494e-a982-1b5d76779cd1", "DetectTime": "2024-05-21T12:26:39.949258+00:00", "EventTime": "2024-05-21T12:26:39.949280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.147.182.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RsmC4Ofn7kgENVGb"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "e91122ca-583c-47c6-9f11-1cdce3ceecff", "DetectTime": "2024-05-21T12:26:39.992751+00:00", "EventTime": "2024-05-21T12:26:39.992772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.130.195.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtlQ1aGkA6kAWsPJh"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "7b69bf86-898d-4e34-b6ef-4006bb2a05bf", "DetectTime": "2024-05-21T12:26:40.019629+00:00", "EventTime": "2024-05-21T12:26:40.019647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhITv36lLKQS0dc88"], "accumulated_threat_level": 2.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "18499a94-3e0e-42a9-ad40-a482ddb392b0", "DetectTime": "2024-05-21T12:26:40.036968+00:00", "EventTime": "2024-05-21T12:26:40.036988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.136.48.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXUFI3LaiKTABVYs5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6b0cfc9f-8e64-42bc-b56c-44d8c62cf5ae", "DetectTime": "2024-05-21T12:26:40.066361+00:00", "EventTime": "2024-05-21T12:26:40.066383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COCZWh4g9ZdFGbadj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 26} +{"Format": "IDEA0", "ID": "4c2351fb-6065-4fc5-b311-a5cfbee5fb49", "DetectTime": "2024-05-21T12:26:40.075939+00:00", "EventTime": "2024-05-21T12:26:40.075959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.60.95.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5SrKe1b4AwSrg98gi"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "eb827e90-644b-48fc-8dfc-743aa2d31b9a", "DetectTime": "2024-05-21T12:26:40.097273+00:00", "EventTime": "2024-05-21T12:26:40.097295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.46.210.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw6xXn1PXzAfovLmT4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "1d757049-f43c-4383-a841-bb9a211ea476", "DetectTime": "2024-05-21T12:26:40.115887+00:00", "EventTime": "2024-05-21T12:26:40.115912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVSe01cWq8v94rBq6"], "accumulated_threat_level": 4.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "3a1d7eb1-a4f1-4af5-8333-981414b762f5", "DetectTime": "2024-05-21T12:26:40.144211+00:00", "EventTime": "2024-05-21T12:26:40.144232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPhDSKn7f69MrvH8"], "accumulated_threat_level": 5.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "80dedd3a-8f3f-4fbc-913a-8449d6b5b115", "DetectTime": "2024-05-21T12:26:40.249209+00:00", "EventTime": "2024-05-21T12:26:40.249230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.173.238.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLDzr4Nv6t2D21zfg"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "88b276f6-2c37-4598-8412-31270ba100bf", "DetectTime": "2024-05-21T12:26:40.285204+00:00", "EventTime": "2024-05-21T12:26:40.285231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.199.127.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB32aq2J6vOEibwcX6"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "38fc63d6-d021-4f78-9076-01053281b66d", "DetectTime": "2024-05-21T12:26:40.289904+00:00", "EventTime": "2024-05-21T12:26:40.289923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAJ5C1B3utJnLVF31", "CCxFGx2cuDg1TleVEl", "CTBQivCxGLYyKjkg5", "CcIjY64US0t9c4K7m3"], "accumulated_threat_level": 5.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "3717f091-279d-481f-8050-b03574295e1c", "DetectTime": "2024-05-21T12:26:40.407415+00:00", "EventTime": "2024-05-21T12:26:40.407436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq5cNl38XUj4v0t7C4"], "accumulated_threat_level": 6.3, "timewindow": 26} +{"Format": "IDEA0", "ID": "ff710cad-9a32-4a03-85f2-d946bdd5f83d", "DetectTime": "2024-05-21T12:26:40.433455+00:00", "EventTime": "2024-05-21T12:26:40.433476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.33.151.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsyU93TrxhmAcySzl"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "5408a72b-afc2-44fc-9d26-3c1165e2c810", "DetectTime": "2024-05-21T12:26:40.454420+00:00", "EventTime": "2024-05-21T12:26:40.454442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.46.172.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkRB61a9TQU73n1Pl"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "df0a163b-0eb2-4f40-b3c8-1ed7fecf6e84", "DetectTime": "2024-05-21T12:26:40.492684+00:00", "EventTime": "2024-05-21T12:26:40.492706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.191.232.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CinDthwqlAUoCrmmk"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "cd46ab82-3f57-4886-8d40-07f062499f20", "DetectTime": "2024-05-21T12:26:40.523856+00:00", "EventTime": "2024-05-21T12:26:40.523877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.138.17.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV6vES3vFWGFRyrsN1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0a72a3ba-f6a4-4047-89f6-1ebc069ec68d", "DetectTime": "2024-05-21T12:26:40.603321+00:00", "EventTime": "2024-05-21T12:26:40.603343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 39.32.142.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wL2mz5C3NsI5xqa"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "f2710448-fdea-4f31-acb7-47d5bfc03e1c", "DetectTime": "2024-05-21T12:26:40.624343+00:00", "EventTime": "2024-05-21T12:26:40.624364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.198.175.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLLNM3ekkQ8FUASyh"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6394c829-fd94-4053-990d-741c0271f34b", "DetectTime": "2024-05-21T12:26:40.679978+00:00", "EventTime": "2024-05-21T12:26:40.680000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.110.178.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZI5O1wzvaLLhGY81"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "1ceca9da-5a51-42fb-beeb-aa12e1f55627", "DetectTime": "2024-05-21T12:26:40.731525+00:00", "EventTime": "2024-05-21T12:26:40.731544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.171.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLuQ3145nkfrcRhW7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "5b5c6bee-d3d5-4235-9cec-0e4535d9628e", "DetectTime": "2024-05-21T12:26:40.754896+00:00", "EventTime": "2024-05-21T12:26:40.754918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.248.150.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfHb0t4JGEwz2sQEQ4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "2f01aeb8-de15-402d-96c2-77c1ba6a6b79", "DetectTime": "2024-05-21T12:26:40.772835+00:00", "EventTime": "2024-05-21T12:26:40.772853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9aVbU3uhpCC3CEc3i"], "accumulated_threat_level": 7.1, "timewindow": 26} +{"Format": "IDEA0", "ID": "26077a56-a3fd-4d2d-bf3f-c745da021965", "DetectTime": "2024-05-21T12:26:40.860722+00:00", "EventTime": "2024-05-21T12:26:40.860745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.37.223.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN73673LtJp9vexO0f"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9802c1dc-78cf-452e-b0cc-08db5c003f95", "DetectTime": "2024-05-21T12:26:40.883184+00:00", "EventTime": "2024-05-21T12:26:40.883205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.138.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDM9I31MyYL4tvN11"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c86633a9-62f5-4aa4-bc23-685b14ca6242", "DetectTime": "2024-05-21T12:26:40.919643+00:00", "EventTime": "2024-05-21T12:26:40.919662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.214.16.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNitdF9EiaKMuf1d5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0814a96e-b4bd-4315-9ef3-e5baa2bd4ce0", "DetectTime": "2024-05-21T12:26:40.952793+00:00", "EventTime": "2024-05-21T12:26:40.952814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.121.4.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8ne24FzGVZ6uYuYa"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "70c09fd8-79b0-486e-be96-2a644e209bc5", "DetectTime": "2024-05-21T12:26:40.999840+00:00", "EventTime": "2024-05-21T12:26:40.999862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.149.98.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci70LN3QXgt58iBySf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c50b62d3-a10d-483f-85a5-a6e0c5349688", "DetectTime": "2024-05-21T12:26:41.068431+00:00", "EventTime": "2024-05-21T12:26:41.068453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.56.118.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFrOy64Vz1ougMcNGf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "db343935-e8b6-404d-a069-ad948d23cbeb", "DetectTime": "2024-05-21T12:26:41.128151+00:00", "EventTime": "2024-05-21T12:26:41.128169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.52.51.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbHhr2AbbezYbxsX3"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c699b59b-5341-488e-a89b-4dff30378188", "DetectTime": "2024-05-21T12:26:41.149063+00:00", "EventTime": "2024-05-21T12:26:41.149082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "Connection to unknown destination port 18734/UDP destination IP 41.104.81.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcXSA1JltDKlR0188"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 26} +{"Format": "IDEA0", "ID": "2921139e-3fb1-4015-8e47-1fa6131d95a9", "DetectTime": "2024-05-21T12:26:41.166089+00:00", "EventTime": "2024-05-21T12:26:41.166115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 208.2.86.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRO57947W2sJQlwkq4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "ea0703f4-3517-48c6-a199-aa24d922641a", "DetectTime": "2024-05-21T12:26:41.186815+00:00", "EventTime": "2024-05-21T12:26:41.186835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.232.28.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDbh14q1GMVjToy9a"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9a9479d9-b395-4630-96e8-282bb7da085c", "DetectTime": "2024-05-21T12:26:41.480673+00:00", "EventTime": "2024-05-21T12:26:41.480693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.17.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9FFVbnrP0Wz6999"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d04daad5-d886-4474-b4a4-dfcd41ef3cb6", "DetectTime": "2024-05-21T12:26:41.485460+00:00", "EventTime": "2024-05-21T12:26:41.485479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.92.75.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdjj3PltpOIhM4a1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "ef893b3a-6331-417e-af31-42d8abcff1b0", "DetectTime": "2024-05-21T12:26:41.495430+00:00", "EventTime": "2024-05-21T12:26:41.495451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.208.123.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgy1q3MT7a9c0YqMb"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d859d6dc-20ee-4f1b-8b4b-3fb72a447601", "DetectTime": "2024-05-21T12:26:41.506907+00:00", "EventTime": "2024-05-21T12:26:41.506924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.9.154.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0gRSE4evAy5ouJdp"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "95a80c2d-adaf-4a20-8225-d1ed4d1343be", "DetectTime": "2024-05-21T12:26:41.511631+00:00", "EventTime": "2024-05-21T12:26:41.511651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.233.38.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgnPX24SoR0n170La4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0d57839d-be1c-4a9c-92e4-9d5e5521b971", "DetectTime": "2024-05-21T12:26:41.555225+00:00", "EventTime": "2024-05-21T12:26:41.555244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "Connection to unknown destination port 6760/UDP destination IP 93.75.11.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsyOM2NousuiEFkCi"], "accumulated_threat_level": 8.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "4fc0b73f-b7ca-4bec-ad8a-4c6a408cec93", "DetectTime": "2024-05-21T12:26:41.582804+00:00", "EventTime": "2024-05-21T12:26:41.582827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.214.92.208 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mdK3QLvHLmApN22"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "92d80591-bdd6-4f06-9d06-fe4f8bea4948", "DetectTime": "2024-05-21T12:26:41.604611+00:00", "EventTime": "2024-05-21T12:26:41.604634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.183.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ocSCIcNJ2FgoaH2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "cf48222b-8b86-44ea-bbec-6db1cd9ea1bd", "DetectTime": "2024-05-21T12:26:41.609450+00:00", "EventTime": "2024-05-21T12:26:41.609469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.148.188.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8dedzpnf5wK44yf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "708c9164-424d-4a63-b79a-66f224884df6", "DetectTime": "2024-05-21T12:26:41.642279+00:00", "EventTime": "2024-05-21T12:26:41.642296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbngd1JBFC2XUMKv6"], "accumulated_threat_level": 9.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "4da9d5a4-ef94-4c33-8fec-1ab5f5c2fba6", "DetectTime": "2024-05-21T12:26:41.653934+00:00", "EventTime": "2024-05-21T12:26:41.653954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.93.140.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvM57Q3Zg6GO4cQfTd"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "651d0fb2-1603-40ea-99bc-20d8851bb8c0", "DetectTime": "2024-05-21T12:26:41.690589+00:00", "EventTime": "2024-05-21T12:26:41.690608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09nNv3CYrKONZ74W2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9b996dc2-b547-4fea-ad74-c036610fd819", "DetectTime": "2024-05-21T12:26:41.695184+00:00", "EventTime": "2024-05-21T12:26:41.695202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.253.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvuMKO3Ei7cZgrLXB1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "df7075a0-f7e0-4b33-b56a-1fa3006dadab", "DetectTime": "2024-05-21T12:26:41.728556+00:00", "EventTime": "2024-05-21T12:26:41.728575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.69.138.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIAoW8UAuM9BjS6Ol"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "e982e495-d69d-4a29-988e-41d224310245", "DetectTime": "2024-05-21T12:26:41.739729+00:00", "EventTime": "2024-05-21T12:26:41.739746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iwjR1nC5Gx0ecwsc"], "accumulated_threat_level": 10.3, "timewindow": 26} +{"Format": "IDEA0", "ID": "5dd1777c-7a7f-48d1-8796-508197f07b17", "DetectTime": "2024-05-21T12:26:41.762874+00:00", "EventTime": "2024-05-21T12:26:41.762894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.145.211 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Bjj44jp2zcUN4uh7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "5ff0986c-8793-4cc0-bb66-cdc507135fca", "DetectTime": "2024-05-21T12:26:41.822747+00:00", "EventTime": "2024-05-21T12:26:41.822773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLroz2WAvAyPUw7M8"], "accumulated_threat_level": 11.100000000000001, "timewindow": 26} +{"Format": "IDEA0", "ID": "9d3edb11-fb11-45d9-995b-8517a12bb4ab", "DetectTime": "2024-05-21T12:26:41.830843+00:00", "EventTime": "2024-05-21T12:26:41.830860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.2.156.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG3dlk36EWhLRQMZF1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c6cff580-25a0-41ef-9b08-6b47c7dabae5", "DetectTime": "2024-05-21T12:26:41.859270+00:00", "EventTime": "2024-05-21T12:26:41.859288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOdoM2fsYypixMMgh"], "accumulated_threat_level": 11.900000000000002, "timewindow": 26} +{"Format": "IDEA0", "ID": "4f2a66e4-1f3b-4fcb-bd47-3cd50c6fd489", "DetectTime": "2024-05-21T12:26:41.868819+00:00", "EventTime": "2024-05-21T12:26:41.868839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJp2r2yh11na0dTb4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "264f956a-24cb-4264-9fea-a0b2604a9124", "DetectTime": "2024-05-21T12:26:41.900267+00:00", "EventTime": "2024-05-21T12:26:41.900285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBEFAE25UfROCCFacb"], "accumulated_threat_level": 12.700000000000003, "timewindow": 26} +{"Format": "Json", "ID": "264f956a-24cb-4264-9fea-a0b2604a9124", "DetectTime": "2024-05-21T12:26:41.900267+00:00", "EventTime": "2024-05-21T12:26:41.900285+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "1970-01-02T01:23:12.581735+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2024/05/21 12:26:42.174710)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 26, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "61a83cda-dc6a-4f5e-b855-d6eaeb73a39b", "DetectTime": "2024-05-21T12:26:42.178859+00:00", "EventTime": "2024-05-21T12:26:42.178882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkZMePleTwkrTwZf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "037f1659-1a27-4791-ba31-1e1ee8da7ae5", "DetectTime": "2024-05-21T12:26:42.183847+00:00", "EventTime": "2024-05-21T12:26:42.183867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq3glB3fyXR3i2W1va"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9d9db9d3-e808-4417-ab17-c2db897580dd", "DetectTime": "2024-05-21T12:26:42.188895+00:00", "EventTime": "2024-05-21T12:26:42.188914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs4kac3HjrZJrOcZQi"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "e9d09e60-7172-4b35-bbe0-dfb95a5e2a39", "DetectTime": "2024-05-21T12:26:42.193368+00:00", "EventTime": "2024-05-21T12:26:42.193386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.172.186.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlA23EO5jLWrl8S4"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6d07d5c0-d1f4-4f7e-b0a2-4be12b6f87ed", "DetectTime": "2024-05-21T12:26:42.205811+00:00", "EventTime": "2024-05-21T12:26:42.205832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPfnJbnCDbfhV9X7"], "accumulated_threat_level": 0.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "c1b067c4-c443-41ce-919a-4d8d66efd8be", "DetectTime": "2024-05-21T12:26:42.216089+00:00", "EventTime": "2024-05-21T12:26:42.216108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfw2X2kZn3uVnelG8"], "accumulated_threat_level": 1.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "6553ec5f-adaf-4743-a41f-272d3d18ba09", "DetectTime": "2024-05-21T12:26:42.230907+00:00", "EventTime": "2024-05-21T12:26:42.230924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6bda4gy11dujDBDf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 26} +{"Format": "IDEA0", "ID": "20352f53-1d30-4164-a5bf-89f111fca7c4", "DetectTime": "2024-05-21T12:26:42.242430+00:00", "EventTime": "2024-05-21T12:26:42.242449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "Connection to unknown destination port 8651/UDP destination IP 187.208.123.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOp824bmWD5TLwJO"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "55d0fbe2-d86a-43c5-9a46-d9b7311c71ac", "DetectTime": "2024-05-21T12:26:42.247732+00:00", "EventTime": "2024-05-21T12:26:42.247751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCzxZ3xDIitZvf977"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "514b232d-7f5f-469d-a956-5fffecd7333c", "DetectTime": "2024-05-21T12:26:42.252115+00:00", "EventTime": "2024-05-21T12:26:42.252134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.231.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8Tr73kF2HqE4X6xa"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "a9363d48-a318-4eac-94e9-ee99404b9465", "DetectTime": "2024-05-21T12:26:42.257125+00:00", "EventTime": "2024-05-21T12:26:42.257144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.158.193.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pUrv2jbzqBqNeKsl"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6995ba5d-c6f9-4668-86eb-317593437569", "DetectTime": "2024-05-21T12:26:42.267482+00:00", "EventTime": "2024-05-21T12:26:42.267502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqS9hcRu4PWXxpua9"], "accumulated_threat_level": 4.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "02a11d70-a66c-45ce-9f1a-cd78833ad9b7", "DetectTime": "2024-05-21T12:26:42.290009+00:00", "EventTime": "2024-05-21T12:26:42.290030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["172.190.235.230"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.235.230 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5nkKA2nx5asIrDfSj"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "84a3b4ce-4287-4ab8-8abf-9f1786fef50f", "DetectTime": "2024-05-21T12:26:42.311406+00:00", "EventTime": "2024-05-21T12:26:42.311423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["172.190.235.230"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.235.230 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5nkKA2nx5asIrDfSj"], "accumulated_threat_level": 11.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "f4582009-15dc-46df-a789-ad1d7b61803f", "DetectTime": "2024-05-21T12:26:42.315909+00:00", "EventTime": "2024-05-21T12:26:42.315926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.80.15.32 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWshI82fiuNzHnnav7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8b04fb77-2d60-4f14-ace3-c040a55f5616", "DetectTime": "2024-05-21T12:26:42.320497+00:00", "EventTime": "2024-05-21T12:26:42.320515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.38.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbuhg4L4UBs5yPJP6"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d9721cd6-944b-4fd3-97f1-dc807389b561", "DetectTime": "2024-05-21T12:26:42.325003+00:00", "EventTime": "2024-05-21T12:26:42.325020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.65.190.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY66lF4l0sbsY0KEvj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d94d178e-beb7-4eef-ace7-be4cae09f971", "DetectTime": "2024-05-21T12:26:42.368407+00:00", "EventTime": "2024-05-21T12:26:42.368425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbK6mr3FI7MHdAGwK7"], "accumulated_threat_level": 4.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "6756d199-ce04-4988-89bc-e7828bb9ba5a", "DetectTime": "2024-05-21T12:26:42.385933+00:00", "EventTime": "2024-05-21T12:26:42.385951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzvDl4ZjXGyC0r4aj"], "accumulated_threat_level": 5.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "67f34036-291f-4e47-938c-22245b40569a", "DetectTime": "2024-05-21T12:26:42.390618+00:00", "EventTime": "2024-05-21T12:26:42.390636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.146.8.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN5ukjskMRpb0gOQj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8eb248dd-5c21-4fe1-9912-03ddd4ab48fd", "DetectTime": "2024-05-21T12:26:42.416233+00:00", "EventTime": "2024-05-21T12:26:42.416256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.193.149.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2mBzNnKFTySN9ik"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8f2a8115-919d-45eb-9dd6-0798d14863f7", "DetectTime": "2024-05-21T12:26:42.421208+00:00", "EventTime": "2024-05-21T12:26:42.421227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.155.171.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kb2h1h1XOwGySLv8"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "56b1d90e-3e2e-4d83-aa6d-6e1caa97ae64", "DetectTime": "2024-05-21T12:26:42.451854+00:00", "EventTime": "2024-05-21T12:26:42.451875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 204.155.61.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFrexz3M7dtTwtvgF5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "2154a60c-d7f5-4f9f-88d6-ea6d935d4bd6", "DetectTime": "2024-05-21T12:26:42.470658+00:00", "EventTime": "2024-05-21T12:26:42.470679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.76.136.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8mZL3QvXIcd03EM6"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8f1eec80-f466-44d8-87fe-290fee4893ad", "DetectTime": "2024-05-21T12:26:42.746431+00:00", "EventTime": "2024-05-21T12:26:42.746451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAk1X1459AvAeWt1e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 26} +{"Format": "IDEA0", "ID": "962fa69f-2671-420d-8906-d1f9f682a29d", "DetectTime": "2024-05-21T12:26:42.752005+00:00", "EventTime": "2024-05-21T12:26:42.752024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.233.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFEMe3agvxC8I965a"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6f7dc7e6-1b39-455e-9d8f-eba5c4170afb", "DetectTime": "2024-05-21T12:26:42.757956+00:00", "EventTime": "2024-05-21T12:26:42.757975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.43.15.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNpYfU3nGfmio77B55"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6c177929-5101-4780-b621-a49338988a97", "DetectTime": "2024-05-21T12:26:42.762681+00:00", "EventTime": "2024-05-21T12:26:42.762701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtlILHiFBNxG6OB7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0bdabff3-c757-4b6e-a7d0-7d595ac80508", "DetectTime": "2024-05-21T12:26:42.786099+00:00", "EventTime": "2024-05-21T12:26:42.786124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.189.51.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxIDF2QLqaDuhQ98c"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "0c9e9065-67f8-4c94-bb63-5422135a9c6c", "DetectTime": "2024-05-21T12:26:42.791531+00:00", "EventTime": "2024-05-21T12:26:42.791550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCfAqyekRkaBbMtR", "CLrE371FJkI6ymTtL7", "ChUyP73oqb6LMewHo3", "C8JtVyEitSe3OJfre"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 26} +{"Format": "IDEA0", "ID": "2ce54361-800a-46ad-87f8-97ce00a91aad", "DetectTime": "2024-05-21T12:26:42.815219+00:00", "EventTime": "2024-05-21T12:26:42.815241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.97.35.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTbx31zYBlcyzMXt1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "291b4082-dfae-4588-af8e-73d0332b7db8", "DetectTime": "2024-05-21T12:26:42.835643+00:00", "EventTime": "2024-05-21T12:26:42.835666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSZ7p1WdmN5DFVpPg"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "5af91997-552d-48b8-a006-3a5abf2a2b63", "DetectTime": "2024-05-21T12:26:42.851774+00:00", "EventTime": "2024-05-21T12:26:42.851795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.148.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66cB5e5WXHSOQDwj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "5391aa43-ecb4-4c28-9b89-459e18b2b899", "DetectTime": "2024-05-21T12:26:42.872396+00:00", "EventTime": "2024-05-21T12:26:42.872416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwXlJ1EO47T3oxrX6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 26} +{"Format": "IDEA0", "ID": "eef19999-eb14-4ddf-80d6-6b34e5b9ed23", "DetectTime": "2024-05-21T12:26:42.897903+00:00", "EventTime": "2024-05-21T12:26:42.897923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX5uLS2SUBfMcREV49"], "accumulated_threat_level": 8.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "3c46e334-a5ad-4096-a4dd-6f1a0b30a2f3", "DetectTime": "2024-05-21T12:26:42.940555+00:00", "EventTime": "2024-05-21T12:26:42.940574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.104.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOpOZ1xSYCdRFnjV5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d12a709a-feff-465f-aeed-9c32adc442c3", "DetectTime": "2024-05-21T12:26:42.970927+00:00", "EventTime": "2024-05-21T12:26:42.970945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjhhj2B3Gd8vc9Y3d"], "accumulated_threat_level": 9.3, "timewindow": 26} +{"Format": "IDEA0", "ID": "814a3d5c-4840-4277-8321-38b0789ad3bd", "DetectTime": "2024-05-21T12:26:42.986275+00:00", "EventTime": "2024-05-21T12:26:42.986295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.106.107.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxEhNDJtFPPAuXWig"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c812b570-1678-4087-9bd1-d62b644b2af3", "DetectTime": "2024-05-21T12:26:43.063064+00:00", "EventTime": "2024-05-21T12:26:43.063084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.61.30.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR6qz1y3ftQyrYh7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "acf5ba8b-1bb3-4e34-b847-cb074f1c5fd1", "DetectTime": "2024-05-21T12:26:43.090609+00:00", "EventTime": "2024-05-21T12:26:43.090630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.89.55.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSadwh2MvVGwmZyFJ8"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9517310d-1b5d-47e6-a04c-2dc39d67da47", "DetectTime": "2024-05-21T12:26:43.343726+00:00", "EventTime": "2024-05-21T12:26:43.343746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.25.211.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB4mY84z29g9e1aj7f"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "89b450bd-9c23-40d1-aa34-1f32a0959e73", "DetectTime": "2024-05-21T12:26:43.405731+00:00", "EventTime": "2024-05-21T12:26:43.405754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 198.57.81.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpGgk2KruOPWYapP7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "ed834463-060d-4aab-bde7-f5bb07e3dca0", "DetectTime": "2024-05-21T12:26:43.427037+00:00", "EventTime": "2024-05-21T12:26:43.427055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.37.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvhPOV8IbREMp1Ui"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9e82cc7b-37d9-4ca4-90e2-6aaf278599c0", "DetectTime": "2024-05-21T12:26:43.518462+00:00", "EventTime": "2024-05-21T12:26:43.518483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 206.108.130.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSKg1hlUfApaMnTb"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "d9f130a1-2736-48cb-86ef-fdc2c1e1d468", "DetectTime": "2024-05-21T12:26:43.559353+00:00", "EventTime": "2024-05-21T12:26:43.559372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtEQ7U2mRcaWlzR1mk"], "accumulated_threat_level": 10.100000000000001, "timewindow": 26} +{"Format": "IDEA0", "ID": "d259b4eb-cda8-4ce5-b77d-53e622c447ff", "DetectTime": "2024-05-21T12:26:43.590093+00:00", "EventTime": "2024-05-21T12:26:43.590116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "Connection to unknown destination port 4510/UDP destination IP 189.242.78.118. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcjTH3xmmlspdz27c"], "accumulated_threat_level": 10.900000000000002, "timewindow": 26} +{"Format": "IDEA0", "ID": "7118f89c-63ab-4313-a53a-7b8d73b52ac5", "DetectTime": "2024-05-21T12:26:43.606961+00:00", "EventTime": "2024-05-21T12:26:43.606981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.233.116.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU09eCSRUO9J60og"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "f328f7f5-89eb-4f45-8e4d-b13b1d9d37d6", "DetectTime": "2024-05-21T12:26:43.701882+00:00", "EventTime": "2024-05-21T12:26:43.701904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT3Q52jKSWrPySJvg"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3eb2913a-e8e3-4d02-809c-e4f8d5a6bae1", "DetectTime": "2024-05-21T12:26:43.735575+00:00", "EventTime": "2024-05-21T12:26:43.735597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.77.231.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKSsq47C5m6Vqmwje"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3efff5ef-9ee5-4ffb-b891-1ae749b75786", "DetectTime": "2024-05-21T12:26:43.770665+00:00", "EventTime": "2024-05-21T12:26:43.770685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.58.78.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqJ2IX3GX9OeZSnndl"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c9c208aa-760c-480e-835d-3900b066be21", "DetectTime": "2024-05-21T12:26:43.787024+00:00", "EventTime": "2024-05-21T12:26:43.787042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.200.130.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIMNeC6e5IhZ1JjQ2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "b445cfa2-a244-4131-8f86-beb561c3b0c0", "DetectTime": "2024-05-21T12:26:43.814450+00:00", "EventTime": "2024-05-21T12:26:43.814470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.237.70.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0ntC1figvmMU8uwa"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "2756556d-27ca-47c2-ad8e-ac2b6e018e41", "DetectTime": "2024-05-21T12:26:43.829920+00:00", "EventTime": "2024-05-21T12:26:43.829943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKmfs3gxOBsBa9MO2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "2b2a23c8-06fb-48bf-8b97-e7a12c0f4a16", "DetectTime": "2024-05-21T12:26:43.913673+00:00", "EventTime": "2024-05-21T12:26:43.913692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.67.62.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdW44xjClDBDFO4S1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "13c44835-5e91-4cbc-96c3-18cd649e90ab", "DetectTime": "2024-05-21T12:26:43.918318+00:00", "EventTime": "2024-05-21T12:26:43.918336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.64.9.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Of1E2akP7tRhKbN7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "de72c427-db53-4a0a-a38f-b48e51e190dc", "DetectTime": "2024-05-21T12:26:43.922818+00:00", "EventTime": "2024-05-21T12:26:43.922836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.183.105.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnEwM3OBLAMEJJj46"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "79bcc9e6-6832-43ae-9e60-aac76ca46afa", "DetectTime": "2024-05-21T12:26:43.927412+00:00", "EventTime": "2024-05-21T12:26:43.927430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.243.180.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRirah1TeifDmLmbx7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "6e370992-57c0-4dc3-89e6-91b655e5a559", "DetectTime": "2024-05-21T12:26:43.932039+00:00", "EventTime": "2024-05-21T12:26:43.932058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.73.241.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbVTBW3NbdBDp9wFXa"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "b9592bd8-329f-427e-89b8-c905fb46efcd", "DetectTime": "2024-05-21T12:26:43.988145+00:00", "EventTime": "2024-05-21T12:26:43.988166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cei24R2DbJXEVHqHWf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "1880e608-210f-45fa-ad17-0e15fc60610f", "DetectTime": "2024-05-21T12:26:44.031153+00:00", "EventTime": "2024-05-21T12:26:44.031172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.97.95.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwaIGd2dgLV2HA5DJf"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "f591772f-50ad-4e7c-b34b-aed60be0f60b", "DetectTime": "2024-05-21T12:26:44.063687+00:00", "EventTime": "2024-05-21T12:26:44.063709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4OR5M1MlNVdu6O52a", "CkQ5Mef622PuuFgKg", "CKQXXn4zGgLqsnHIte", "ClaETpgKSAiqyAKfi"], "accumulated_threat_level": 11.400000000000002, "timewindow": 26} +{"Format": "IDEA0", "ID": "fe1f72f2-2957-4e8d-b2b0-d74d26d819a4", "DetectTime": "2024-05-21T12:26:44.085638+00:00", "EventTime": "2024-05-21T12:26:44.085658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.59.98.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA1fXX2RmFJuU6R3Se"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8f63fec6-d2fb-4ddd-9098-0a8f4f339b99", "DetectTime": "2024-05-21T12:26:44.152873+00:00", "EventTime": "2024-05-21T12:26:44.152893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.86.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuROYA2TbvZZnpBH"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "422fa313-006c-45d0-8abb-939ed04ba4c0", "DetectTime": "2024-05-21T12:26:44.180287+00:00", "EventTime": "2024-05-21T12:26:44.180310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.219.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkseCM2jcHf8LFnpNh"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "15eaa70c-22a3-42dd-9459-b26baf613450", "DetectTime": "2024-05-21T12:26:44.195217+00:00", "EventTime": "2024-05-21T12:26:44.195237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.162.78.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU45qF49H1eEyrkUQ7"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "90a99575-57ba-4ca8-93bd-d5a8e878d6a8", "DetectTime": "2024-05-21T12:26:44.221804+00:00", "EventTime": "2024-05-21T12:26:44.221822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.131.39.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz53fC4l8NnoTNOIZb"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "24496a6e-6252-4240-9798-e19f1ffe7963", "DetectTime": "2024-05-21T12:26:44.481342+00:00", "EventTime": "2024-05-21T12:26:44.481363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.176.133.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QO892cckGVPFHiP5"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "932d98a8-d77b-4982-80f3-45a7d4346425", "DetectTime": "2024-05-21T12:26:44.486385+00:00", "EventTime": "2024-05-21T12:26:44.486403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.91.137.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFNMA3OtCtypAjikj"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "84dc6c7d-e4ef-4da3-9566-61705d72a5b7", "DetectTime": "2024-05-21T12:26:44.491297+00:00", "EventTime": "2024-05-21T12:26:44.491315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.137.45.123 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgDZh825djJuleF5W8"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "5c0f8699-a0ee-45c2-878e-4ea01e9902c9", "DetectTime": "2024-05-21T12:26:44.531947+00:00", "EventTime": "2024-05-21T12:26:44.531968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.158.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a3EZ2teCxr4WtrJ1"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "63e86380-57f0-48ef-94b6-bb67baede42c", "DetectTime": "2024-05-21T12:26:44.549180+00:00", "EventTime": "2024-05-21T12:26:44.549202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.226.153.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItQZQ3KYUAW3cTCVb"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "e66d73ab-daf3-4ec3-b61d-1a75497a5103", "DetectTime": "2024-05-21T12:26:44.575863+00:00", "EventTime": "2024-05-21T12:26:44.575883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.97.122.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8Q8NnLCIEc6DdQ9"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "faeaf2b4-a984-4e1b-89da-439661d7a8f3", "DetectTime": "2024-05-21T12:26:44.646220+00:00", "EventTime": "2024-05-21T12:26:44.646243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.252.146.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjC8v24VvH8xvTxuc"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "1f2930a5-49d7-40e6-8aeb-98c365e5a386", "DetectTime": "2024-05-21T12:26:44.669441+00:00", "EventTime": "2024-05-21T12:26:44.669460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.90.122.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Ffbz1ZMA0UX1Hfb2"], "accumulated_threat_level": 4.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "50b8b514-431e-45c2-ab6c-0c5de73e54e8", "DetectTime": "2024-05-21T12:26:44.882554+00:00", "EventTime": "2024-05-21T12:26:44.882576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tbmk2K3qyn8fTsC6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "01798ca0-c34b-4660-80c2-92723b947ad5", "DetectTime": "2024-05-21T12:26:44.951583+00:00", "EventTime": "2024-05-21T12:26:44.951602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iubA0K6sp8Gl4v8"], "accumulated_threat_level": 12.200000000000003, "timewindow": 26} +{"Format": "Json", "ID": "01798ca0-c34b-4660-80c2-92723b947ad5", "DetectTime": "2024-05-21T12:26:44.951583+00:00", "EventTime": "2024-05-21T12:26:44.951602+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "1970-01-02T01:55:48.614245+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2024/05/21 12:26:45.189766)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 26, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "8fbe8910-1cd7-4c97-8430-7f0733e59268", "DetectTime": "2024-05-21T12:26:45.201176+00:00", "EventTime": "2024-05-21T12:26:45.201199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfiHfr1O3zwSTzi3y8"], "accumulated_threat_level": 0.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "676ad1fc-0037-41d6-95c1-6a45e06a70ca", "DetectTime": "2024-05-21T12:26:45.253689+00:00", "EventTime": "2024-05-21T12:26:45.253709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzbdB2XoX02ow3BJ3"], "accumulated_threat_level": 1.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "7fcf6c93-3eff-4f00-be34-ed60fda05aa1", "DetectTime": "2024-05-21T12:26:45.293366+00:00", "EventTime": "2024-05-21T12:26:45.293385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8oDm34QHiQZFyuge"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 26} +{"Format": "IDEA0", "ID": "56ff0a57-8d31-4935-9758-5527b5128bd3", "DetectTime": "2024-05-21T12:26:45.346629+00:00", "EventTime": "2024-05-21T12:26:45.346650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZy92l10pKY7mngsk8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "d0dea7ed-3e68-413a-b911-69b149d93695", "DetectTime": "2024-05-21T12:26:45.373117+00:00", "EventTime": "2024-05-21T12:26:45.373138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS2AqqPkVltZsQlOh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "3a64ce8a-e308-4fe7-8a38-5e3b22f9ba09", "DetectTime": "2024-05-21T12:26:45.424271+00:00", "EventTime": "2024-05-21T12:26:45.424292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2cc1izGCGJXukGrb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "eb79fff8-726a-4516-9f0a-b0d3430f8341", "DetectTime": "2024-05-21T12:26:45.450788+00:00", "EventTime": "2024-05-21T12:26:45.450807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wiQK2TSwDonEbh31"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "e070da8f-7eb7-4be1-943a-11a46c64dec7", "DetectTime": "2024-05-21T12:26:45.552767+00:00", "EventTime": "2024-05-21T12:26:45.552785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci59X81iIh7D2jTK3l"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "8b18fd63-4135-42e5-9fb2-c6e5591cdef2", "DetectTime": "2024-05-21T12:26:45.558032+00:00", "EventTime": "2024-05-21T12:26:45.558058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0uVP37LN49Wmoelk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "a5c1947e-091f-46e1-aba5-c10b8a885ad3", "DetectTime": "2024-05-21T12:26:45.601216+00:00", "EventTime": "2024-05-21T12:26:45.601239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxI5E3gDZH3iqfQFa"], "accumulated_threat_level": 4.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "7ad43124-0718-4a38-86c1-2a1d08846a2c", "DetectTime": "2024-05-21T12:26:45.622136+00:00", "EventTime": "2024-05-21T12:26:45.622155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2o763YvbqppHUFbg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "b4f4121a-ea09-4f2f-b8ce-7178de1d3446", "DetectTime": "2024-05-21T12:26:45.646277+00:00", "EventTime": "2024-05-21T12:26:45.646297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW537Z1bp7hALjMSi9"], "accumulated_threat_level": 4.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "ee165dd1-0d9d-40b2-9c24-22e255944d73", "DetectTime": "2024-05-21T12:26:45.685648+00:00", "EventTime": "2024-05-21T12:26:45.685668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLTiZ1GgiV4G5186"], "accumulated_threat_level": 5.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "406e66d7-1a02-4676-8cd4-a56a5d8c0e89", "DetectTime": "2024-05-21T12:26:45.716169+00:00", "EventTime": "2024-05-21T12:26:45.716191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJ2U52cwIBvsN6mDa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 26} +{"Format": "IDEA0", "ID": "76b2ceef-a504-465d-aad1-cfb492de8724", "DetectTime": "2024-05-21T12:26:45.753562+00:00", "EventTime": "2024-05-21T12:26:45.753585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsqqc1RWxMGme8qWh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 26} +{"Format": "IDEA0", "ID": "a9cf9015-3e2d-457a-b821-6164cd13b6b4", "DetectTime": "2024-05-21T12:26:45.797728+00:00", "EventTime": "2024-05-21T12:26:45.797747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1RNB3su7dfA7xuHj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 26} +{"Format": "IDEA0", "ID": "dcbd9b3a-e333-4513-a91b-74b2c6b97b76", "DetectTime": "2024-05-21T12:26:45.809449+00:00", "EventTime": "2024-05-21T12:26:45.809467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzDPHr1bN7Iahl7U62"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "22041e9f-25c4-43a3-90bc-e99b5d614120", "DetectTime": "2024-05-21T12:26:45.929454+00:00", "EventTime": "2024-05-21T12:26:45.929473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7k24uFkgQmY9JP6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 26} +{"Format": "IDEA0", "ID": "a9c85643-c479-4a1c-b67c-384a85832141", "DetectTime": "2024-05-21T12:26:45.954704+00:00", "EventTime": "2024-05-21T12:26:45.954725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GYA116erXIvjBEdh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "6028b9c0-9892-4182-b01d-926e0c5a4c39", "DetectTime": "2024-05-21T12:26:45.959714+00:00", "EventTime": "2024-05-21T12:26:45.959735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBKHlC2p4CjiNYHzu5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "3f40285c-4dfe-4346-90fc-a7a4511a4ff5", "DetectTime": "2024-05-21T12:26:45.992334+00:00", "EventTime": "2024-05-21T12:26:45.992355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDDLR1xQDnQKcsDyf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "14f88f92-5459-47d1-af83-60c156769ad6", "DetectTime": "2024-05-21T12:26:45.997190+00:00", "EventTime": "2024-05-21T12:26:45.997209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bGqg3V2mnPKN55bg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "a48ae10b-9998-4bb9-8e73-7b561643ec8f", "DetectTime": "2024-05-21T12:26:46.001743+00:00", "EventTime": "2024-05-21T12:26:46.001761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctOL54xct8lhiGs85"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "dad4663f-2c9e-45e1-9795-200022f2d11a", "DetectTime": "2024-05-21T12:26:46.056990+00:00", "EventTime": "2024-05-21T12:26:46.057010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVyhT2NBEgkBEHzcg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "18278240-1f4c-4c5f-bbbd-e93423bd1be9", "DetectTime": "2024-05-21T12:26:46.069937+00:00", "EventTime": "2024-05-21T12:26:46.069980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LEeE2VhuSK9R47c9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "e5efd052-1302-4113-8aba-0613f50383f2", "DetectTime": "2024-05-21T12:26:46.080887+00:00", "EventTime": "2024-05-21T12:26:46.080906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMtFj2svgH30Bwpjj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "0f92dade-6429-4bd9-b98a-1554ef99e03e", "DetectTime": "2024-05-21T12:26:46.111064+00:00", "EventTime": "2024-05-21T12:26:46.111087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4Z004FW68B6ySseh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "8aa29dfc-567b-4194-950c-49e6dd0629eb", "DetectTime": "2024-05-21T12:26:46.123507+00:00", "EventTime": "2024-05-21T12:26:46.123527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9y9VK11r0zLO3gOUc"], "accumulated_threat_level": 9.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "43cd01a7-9fae-4cd8-a946-3bb8a958b689", "DetectTime": "2024-05-21T12:26:46.156549+00:00", "EventTime": "2024-05-21T12:26:46.156568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyxff73XJgEQwWFLWi"], "accumulated_threat_level": 10.4, "timewindow": 26} +{"Format": "IDEA0", "ID": "a68dd94d-c325-441d-949f-08c84a8db5e1", "DetectTime": "2024-05-21T12:26:46.183497+00:00", "EventTime": "2024-05-21T12:26:46.183516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq99QQ1jilSHxcdMh5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 26} +{"Format": "IDEA0", "ID": "6c73785c-65a2-455c-b966-90a8eabd06ec", "DetectTime": "2024-05-21T12:26:46.211731+00:00", "EventTime": "2024-05-21T12:26:46.211748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0DM23szs7NF8QYG7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 26} +{"Format": "Json", "ID": "6c73785c-65a2-455c-b966-90a8eabd06ec", "DetectTime": "2024-05-21T12:26:46.211731+00:00", "EventTime": "2024-05-21T12:26:46.211748+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "1970-01-02T01:56:43.566168+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2024/05/21 12:26:46.382883)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 26, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7674dfa2-be20-4e5d-a189-21bce90045a9", "DetectTime": "2024-05-21T12:26:46.394723+00:00", "EventTime": "2024-05-21T12:26:46.394742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4XBT1jUvBK8WFz7d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "25603e4f-e70b-47a1-bafc-dc8e869d5a21", "DetectTime": "2024-05-21T12:26:46.420127+00:00", "EventTime": "2024-05-21T12:26:46.420146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrVfK3E5SfhbPL5h4"], "accumulated_threat_level": 0.8, "timewindow": 26} +{"Format": "IDEA0", "ID": "21b27496-b3ed-449a-b0cb-d214e76b84bb", "DetectTime": "2024-05-21T12:26:46.448473+00:00", "EventTime": "2024-05-21T12:26:46.448490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugAHp2dCDEacC4zuh"], "accumulated_threat_level": 1.6, "timewindow": 26} +{"Format": "IDEA0", "ID": "f62d0733-e38c-4fd8-a862-a621e291b19c", "DetectTime": "2024-05-21T12:26:46.469329+00:00", "EventTime": "2024-05-21T12:26:46.469348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdWnk2RGyE9h5rRr6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 26} +{"Format": "IDEA0", "ID": "df0e554f-d5ae-49e7-8694-37b35fa784ee", "DetectTime": "2024-05-21T12:26:46.497167+00:00", "EventTime": "2024-05-21T12:26:46.497197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYOOcA22PdomoWJxa8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "8ebd566d-5cab-41e5-8f7f-ef5247469102", "DetectTime": "2024-05-21T12:26:46.548844+00:00", "EventTime": "2024-05-21T12:26:46.548863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXukdc1DXHoYnKy5k3"], "accumulated_threat_level": 0.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "cb9269fa-a718-4414-a3cb-4c7140a69308", "DetectTime": "2024-05-21T12:26:46.630612+00:00", "EventTime": "2024-05-21T12:26:46.630633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfyx21hkSqNzo6rqg", "C6eYr34i9V2T2Umc5c", "CwjWgk4cxQHAmKMNN8", "Cf3QTV1UJ9h2Y87SU3"], "accumulated_threat_level": 1.3, "timewindow": 27} +{"Format": "IDEA0", "ID": "b245953e-880b-440c-8bdc-9a3a04446b12", "DetectTime": "2024-05-21T12:26:46.704093+00:00", "EventTime": "2024-05-21T12:26:46.704111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C98izD2Mhv9S1BK1U6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "f4041e19-f388-4772-864c-2027f0b79efd", "DetectTime": "2024-05-21T12:26:46.711254+00:00", "EventTime": "2024-05-21T12:26:46.711273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxpMVXk9qnriojqk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "54aee721-0c40-4e2f-b991-c29dc84da635", "DetectTime": "2024-05-21T12:26:46.750238+00:00", "EventTime": "2024-05-21T12:26:46.750256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.173.238.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU6PN19dyzUsNl1Ka"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "fd2cd650-3c15-412b-920a-d5aeee1212c6", "DetectTime": "2024-05-21T12:26:46.754991+00:00", "EventTime": "2024-05-21T12:26:46.755009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.27.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxV1g174RhVLXsHae"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "125688fc-80a2-4648-9bbe-fd9d6cbb65db", "DetectTime": "2024-05-21T12:26:46.780299+00:00", "EventTime": "2024-05-21T12:26:46.780317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.92.75.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpyi24XthCh2IBKVg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "218c3a51-80bd-4e00-9f8e-8ae312febecf", "DetectTime": "2024-05-21T12:26:46.888680+00:00", "EventTime": "2024-05-21T12:26:46.888700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.17.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1Mmh3IwsVixcrht7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "dfd888f8-1228-462d-88e1-68bedffa8bd1", "DetectTime": "2024-05-21T12:26:47.028165+00:00", "EventTime": "2024-05-21T12:26:47.028186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.208.123.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch4vRj1IIp8RkOYbLj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "10545bb2-7fbb-45b3-8c35-1f296aed88eb", "DetectTime": "2024-05-21T12:26:47.093129+00:00", "EventTime": "2024-05-21T12:26:47.093151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.183.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZv4Dq34HqpSlB5Mcl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "d9aae1fb-f4ea-4739-9fc6-bc2c566baaed", "DetectTime": "2024-05-21T12:26:47.120161+00:00", "EventTime": "2024-05-21T12:26:47.120181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.93.140.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4gM54j82uE99l1X1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "bb77721e-6570-4b21-a284-4d1ab9d6df48", "DetectTime": "2024-05-21T12:26:47.412186+00:00", "EventTime": "2024-05-21T12:26:47.412206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JSKxfoBYB31ZqO4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "a1816ee4-9a21-42fe-b6ea-123c3428a0a5", "DetectTime": "2024-05-21T12:26:47.693486+00:00", "EventTime": "2024-05-21T12:26:47.693507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2ntK2daUdQOPfC5l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "56b91b57-82f0-42ac-9f22-7e11433e96c2", "DetectTime": "2024-05-21T12:26:47.727241+00:00", "EventTime": "2024-05-21T12:26:47.727261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5G78Y18T7hDfRCf59"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "6bc8e065-da24-4af4-8f89-23dbc4097a7b", "DetectTime": "2024-05-21T12:26:47.753268+00:00", "EventTime": "2024-05-21T12:26:47.753288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgr2Il4UYmnt9t7I"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "a58c1cfc-e43e-471e-8574-1cb24ce3b630", "DetectTime": "2024-05-21T12:26:47.812604+00:00", "EventTime": "2024-05-21T12:26:47.812626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2gF4V1X6FXIrt4SF5", "COIWkd1IZBVJw1Ko52", "CGJJ9d4ht7YJp5qprc", "CUR3l23CW6AGz98Ufg"], "accumulated_threat_level": 1.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "be768ec0-f754-4f50-9b2a-97495cb4f217", "DetectTime": "2024-05-21T12:26:47.842430+00:00", "EventTime": "2024-05-21T12:26:47.842450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.38.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKpBuLZViyqYmiTe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "eb0cc4d6-66cf-412c-bc91-548be788c04e", "DetectTime": "2024-05-21T12:26:47.847320+00:00", "EventTime": "2024-05-21T12:26:47.847337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAxZC4RdjIjb7IYya"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "fc09265b-12ce-440c-bad7-5ce86699d1cc", "DetectTime": "2024-05-21T12:26:47.851729+00:00", "EventTime": "2024-05-21T12:26:47.851747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGLlAEjpdNdxiBZ58"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "ce9c0a9e-a37c-4fb7-9c16-484f34713ee1", "DetectTime": "2024-05-21T12:26:47.893712+00:00", "EventTime": "2024-05-21T12:26:47.893732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.189.51.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPAri4sIc0mVnNDdc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "a4f51950-3899-46b7-9513-0e5b00d9fde4", "DetectTime": "2024-05-21T12:26:47.898646+00:00", "EventTime": "2024-05-21T12:26:47.898666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNASVT2AoeOe54DM77"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "b3807de0-ff29-4984-bc2a-d5bb0793f1fd", "DetectTime": "2024-05-21T12:26:47.933287+00:00", "EventTime": "2024-05-21T12:26:47.933309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.77.231.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqz54N2Mz89YgNgxD5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "581f57e7-9332-4d82-a506-e7743968779f", "DetectTime": "2024-05-21T12:26:47.952427+00:00", "EventTime": "2024-05-21T12:26:47.952447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigQllz2dAoVkggJd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "84b364da-87ca-47ed-9836-ad95b70396de", "DetectTime": "2024-05-21T12:26:47.983079+00:00", "EventTime": "2024-05-21T12:26:47.983100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.237.70.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAtaSl1OOV3qsLSlra"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "f1fa8654-0dc7-4973-8bea-4631a46c8437", "DetectTime": "2024-05-21T12:26:47.992793+00:00", "EventTime": "2024-05-21T12:26:47.992815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLR2FJ3LRZacpyPEn3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "b9a709f0-da91-4641-b76c-6075e68d4172", "DetectTime": "2024-05-21T12:26:48.018744+00:00", "EventTime": "2024-05-21T12:26:48.018767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkyYi9rbvd9EvgJ9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "1d014424-db57-4386-9948-e2bee5981c9d", "DetectTime": "2024-05-21T12:26:48.030403+00:00", "EventTime": "2024-05-21T12:26:48.030435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.86.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoM7Y12jbq7ttVvuB6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "7b81918f-7a85-4610-803d-dcfa72401f20", "DetectTime": "2024-05-21T12:26:48.119304+00:00", "EventTime": "2024-05-21T12:26:48.119325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhMNk3glQMa38bKK6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "60a008cc-2d27-4705-b311-5990aa758bbe", "DetectTime": "2024-05-21T12:26:48.216732+00:00", "EventTime": "2024-05-21T12:26:48.216750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.18.68"]}], "Attach": [{"Content": "Connection to unknown destination port 15180/UDP destination IP 83.235.18.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZJoU2CZUX6C121Fh"], "accumulated_threat_level": 2.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "3a4922d1-d1bc-487b-98d2-7983612397ca", "DetectTime": "2024-05-21T12:26:48.318720+00:00", "EventTime": "2024-05-21T12:26:48.318737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUId5H2AhusLn5Mfe9"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 27} +{"Format": "IDEA0", "ID": "fa94800f-0f7f-4be6-85e2-35b7c4b36a45", "DetectTime": "2024-05-21T12:26:48.338777+00:00", "EventTime": "2024-05-21T12:26:48.338795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAUwF2aeVDp7ljsi3"], "accumulated_threat_level": 4.2, "timewindow": 27} +{"Format": "IDEA0", "ID": "a3b255c3-ecc1-46eb-9bc5-5b2db7735b5e", "DetectTime": "2024-05-21T12:26:48.371352+00:00", "EventTime": "2024-05-21T12:26:48.371376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgJoI3YD5pXkTjej"], "accumulated_threat_level": 5.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "b398371b-8486-4322-846e-34760586fd3a", "DetectTime": "2024-05-21T12:26:48.416942+00:00", "EventTime": "2024-05-21T12:26:48.416959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK89TpZrX69K0cfCa"], "accumulated_threat_level": 5.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "f8c0418d-267a-4061-996b-40ecfc76cc65", "DetectTime": "2024-05-21T12:26:48.550393+00:00", "EventTime": "2024-05-21T12:26:48.550429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEnVdv5QvNngKSL8"], "accumulated_threat_level": 6.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "68927ab8-1a28-47f6-b4c0-63b4a571e4b6", "DetectTime": "2024-05-21T12:26:48.575818+00:00", "EventTime": "2024-05-21T12:26:48.575844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsTYg47h14z1njjq3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 27} +{"Format": "IDEA0", "ID": "e367580a-f3ef-4247-a468-cf61e725d1bc", "DetectTime": "2024-05-21T12:26:48.592860+00:00", "EventTime": "2024-05-21T12:26:48.592884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.177.70.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzstf2QJuK3QONRU9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "78f374bc-a2b2-4d51-a645-6055f864322c", "DetectTime": "2024-05-21T12:26:48.616122+00:00", "EventTime": "2024-05-21T12:26:48.616143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG1FQq48TUVUjMIQtj"], "accumulated_threat_level": 8.2, "timewindow": 27} +{"Format": "IDEA0", "ID": "f702a633-8314-432c-a8e3-4776317138fc", "DetectTime": "2024-05-21T12:26:48.642134+00:00", "EventTime": "2024-05-21T12:26:48.642154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA52ty0LUgYKvJXvk"], "accumulated_threat_level": 9.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "7c176c6f-7210-4650-a055-3533b4af290b", "DetectTime": "2024-05-21T12:26:48.670758+00:00", "EventTime": "2024-05-21T12:26:48.670779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLkZDWXoJSNSSth5"], "accumulated_threat_level": 9.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "61429c27-486c-4b3d-a419-46baa93235c4", "DetectTime": "2024-05-21T12:26:48.714400+00:00", "EventTime": "2024-05-21T12:26:48.714440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT3wf44RfAcaJCe9Z1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 27} +{"Format": "IDEA0", "ID": "dab3bcfe-c047-4529-a610-e4ff8569ffbd", "DetectTime": "2024-05-21T12:26:48.736059+00:00", "EventTime": "2024-05-21T12:26:48.736080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAfmt3z3HM0AJcEOe"], "accumulated_threat_level": 11.400000000000002, "timewindow": 27} +{"Format": "IDEA0", "ID": "072eecfd-5f99-4bc3-bcb3-d5218fc2e538", "DetectTime": "2024-05-21T12:26:48.775411+00:00", "EventTime": "2024-05-21T12:26:48.775431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ltb81r5njRWNumk"], "accumulated_threat_level": 12.200000000000003, "timewindow": 27} +{"Format": "Json", "ID": "072eecfd-5f99-4bc3-bcb3-d5218fc2e538", "DetectTime": "2024-05-21T12:26:48.775411+00:00", "EventTime": "2024-05-21T12:26:48.775431+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "1970-01-02T02:28:58.306525+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2024/05/21 12:26:49.004306)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 27, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "363c18ac-f265-41e3-9b22-8f1f23155d12", "DetectTime": "2024-05-21T12:26:49.011869+00:00", "EventTime": "2024-05-21T12:26:49.011888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.173.238.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmILK13rQxeT5251O3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "47a05725-cbc4-4ace-ad05-a5f82105efde", "DetectTime": "2024-05-21T12:26:49.033505+00:00", "EventTime": "2024-05-21T12:26:49.033524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSavWE4ydIW34Ku9Fl"], "accumulated_threat_level": 0.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "6756c4ed-f6f2-4348-a393-addf0e6edf3a", "DetectTime": "2024-05-21T12:26:49.060254+00:00", "EventTime": "2024-05-21T12:26:49.060273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYk1Vw45L2SGOx1tR5"], "accumulated_threat_level": 1.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "93cec65b-8d4f-4241-9b9c-b448546a8b2d", "DetectTime": "2024-05-21T12:26:49.091271+00:00", "EventTime": "2024-05-21T12:26:49.091294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rcP623RP6TNbTMOj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 27} +{"Format": "IDEA0", "ID": "937be8d2-7b7e-4ab9-9a3e-efa5f163be85", "DetectTime": "2024-05-21T12:26:49.103964+00:00", "EventTime": "2024-05-21T12:26:49.103982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.38.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0iAn2nE0C7ASVMp5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "2f850856-a856-4de8-9899-1481def27847", "DetectTime": "2024-05-21T12:26:49.138637+00:00", "EventTime": "2024-05-21T12:26:49.138656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW274c2swaZKAmEcic"], "accumulated_threat_level": 3.2, "timewindow": 27} +{"Format": "IDEA0", "ID": "6392b078-417a-4f28-b7d8-55b2f6043480", "DetectTime": "2024-05-21T12:26:49.159355+00:00", "EventTime": "2024-05-21T12:26:49.159374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHM1Hg1kcn9e4a6nvj"], "accumulated_threat_level": 4.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "b30de5ae-3e7b-47b4-9708-7e949681e3e3", "DetectTime": "2024-05-21T12:26:49.189708+00:00", "EventTime": "2024-05-21T12:26:49.189727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwdsT2U2LrawdxzC7"], "accumulated_threat_level": 4.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "4075e46c-7b74-499b-90c4-d25c8a3a2d75", "DetectTime": "2024-05-21T12:26:49.215975+00:00", "EventTime": "2024-05-21T12:26:49.215997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPFah1xFlrirpnVk1"], "accumulated_threat_level": 5.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "930e626a-9668-4da5-8518-a501d69deaef", "DetectTime": "2024-05-21T12:26:49.249116+00:00", "EventTime": "2024-05-21T12:26:49.249137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4SsvE3sL3aIYXKCT8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 27} +{"Format": "IDEA0", "ID": "e147ab54-f196-4051-86f4-535873478b4b", "DetectTime": "2024-05-21T12:26:49.333320+00:00", "EventTime": "2024-05-21T12:26:49.333342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa6MG30g2Z4qRQ1Di"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "99300598-5ea5-400c-8054-e7241156d1ad", "DetectTime": "2024-05-21T12:26:49.354762+00:00", "EventTime": "2024-05-21T12:26:49.354785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.86.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNVtw4QYtpkNk426f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "65008217-9400-405a-a138-27fdf6d5fefe", "DetectTime": "2024-05-21T12:26:49.498339+00:00", "EventTime": "2024-05-21T12:26:49.498358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.117.66.104"]}], "Attach": [{"Content": "Connection to unknown destination port 5675/UDP destination IP 181.117.66.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziKcn1het86HdtKNg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "178b1525-b7f8-4e81-9da5-1debf9ee1654", "DetectTime": "2024-05-21T12:26:49.522210+00:00", "EventTime": "2024-05-21T12:26:49.522227+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTfnB76CG2ETwDi2"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "85c328c5-24aa-42f9-b42a-7b46fc11fba4", "DetectTime": "2024-05-21T12:26:49.533631+00:00", "EventTime": "2024-05-21T12:26:49.533649+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTfnB76CG2ETwDi2"], "accumulated_threat_level": 11.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "0c0fb4b7-8385-4739-99c7-8a35e81896eb", "DetectTime": "2024-05-21T12:26:49.607067+00:00", "EventTime": "2024-05-21T12:26:49.607085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoRaQ5jZ4GgTAkLwk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "b59198b5-9d64-4a5d-bdd7-c458164011dc", "DetectTime": "2024-05-21T12:26:49.670577+00:00", "EventTime": "2024-05-21T12:26:49.670597+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.90.50.124"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.90.50.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLCVr1uFykHOZUiGh"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "534c6be4-dc20-4f15-9344-3c0fe0c3f8fc", "DetectTime": "2024-05-21T12:26:49.681599+00:00", "EventTime": "2024-05-21T12:26:49.681617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.90.50.124"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.90.50.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLCVr1uFykHOZUiGh"], "accumulated_threat_level": 12.0, "timewindow": 13} +{"Format": "Json", "ID": "534c6be4-dc20-4f15-9344-3c0fe0c3f8fc", "DetectTime": "2024-05-21T12:26:49.681599+00:00", "EventTime": "2024-05-21T12:26:49.681617+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.90.50.124"]}], "Attach": [{"Content": "1970-01-01T12:36:24.564099+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 13. (real time 2024/05/21 12:26:50.061880)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 13, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "aa14c485-bc34-4be1-8886-ce3904364561", "DetectTime": "2024-05-21T12:26:50.072270+00:00", "EventTime": "2024-05-21T12:26:50.072288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "Connection to unknown destination port 12298/UDP destination IP 187.232.5.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ4UmecAV4WuTTQh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "b0f032b6-ab2b-48af-92e7-c05a8a5f043f", "DetectTime": "2024-05-21T12:26:50.076868+00:00", "EventTime": "2024-05-21T12:26:50.076886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwC1M521TkLiyyTrc6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "957e2663-0947-4f38-8bad-4a502eb5bff3", "DetectTime": "2024-05-21T12:26:50.081371+00:00", "EventTime": "2024-05-21T12:26:50.081390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWpWdXmkbLxSsKb7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "86a539cb-50ab-4a99-adcd-1deabef18d9a", "DetectTime": "2024-05-21T12:26:50.085708+00:00", "EventTime": "2024-05-21T12:26:50.085726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHmND1bc2MljLWcng"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "c18a37a0-d484-4980-b376-0e330fef5b68", "DetectTime": "2024-05-21T12:26:50.090398+00:00", "EventTime": "2024-05-21T12:26:50.090437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVK4T83190jlICdpHf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "e7759748-7494-4846-97e0-6640e6b714fa", "DetectTime": "2024-05-21T12:26:50.234027+00:00", "EventTime": "2024-05-21T12:26:50.234049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFmK13mABI5t8vfad"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "d6db16fa-95e0-492b-8f28-cc0fb5332f79", "DetectTime": "2024-05-21T12:26:50.263097+00:00", "EventTime": "2024-05-21T12:26:50.263121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.232.9.206"]}], "Attach": [{"Content": "Connection to unknown destination port 4792/UDP destination IP 76.232.9.206. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bfK64sroUrbPlxV5"], "accumulated_threat_level": 9.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "348cca8b-73bf-4e98-bdb7-5bc657ec4910", "DetectTime": "2024-05-21T12:26:50.288423+00:00", "EventTime": "2024-05-21T12:26:50.288442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtwbf2YNyy4VXrvs8"], "accumulated_threat_level": 10.4, "timewindow": 27} +{"Format": "IDEA0", "ID": "87018514-3170-4134-be8e-6d02de3741e2", "DetectTime": "2024-05-21T12:26:50.324160+00:00", "EventTime": "2024-05-21T12:26:50.324182+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQupQr4XoOHYGh0qw4"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "9d499564-af10-41ab-b018-26588de67f19", "DetectTime": "2024-05-21T12:26:50.355678+00:00", "EventTime": "2024-05-21T12:26:50.355696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COqjkq2jlkcrnKSX5g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 27} +{"Format": "IDEA0", "ID": "8799fb09-f992-4411-af5c-d76e476f18d8", "DetectTime": "2024-05-21T12:26:50.395623+00:00", "EventTime": "2024-05-21T12:26:50.395644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.136.52.21"]}], "Attach": [{"Content": "Connection to unknown destination port 20658/UDP destination IP 2.136.52.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxlSM0263apzfVZpd1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 27} +{"Format": "Json", "ID": "8799fb09-f992-4411-af5c-d76e476f18d8", "DetectTime": "2024-05-21T12:26:50.395623+00:00", "EventTime": "2024-05-21T12:26:50.395644+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.136.52.21"]}], "Attach": [{"Content": "1970-01-02T02:30:54.036330+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2024/05/21 12:26:50.556203)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 27, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bb3ce4d6-cdf9-405c-bb00-81d6bf614627", "DetectTime": "2024-05-21T12:26:50.560390+00:00", "EventTime": "2024-05-21T12:26:50.560409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbxZGL1NKV2GAXtFs4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "85c905db-8846-4dd1-bfb7-a7f1fbc9e1c7", "DetectTime": "2024-05-21T12:26:50.643511+00:00", "EventTime": "2024-05-21T12:26:50.643529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleEkr3zIvyTfKif1a"], "accumulated_threat_level": 0.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "7c442e77-4a06-4ab6-8183-ff4b4ae4e435", "DetectTime": "2024-05-21T12:26:50.671622+00:00", "EventTime": "2024-05-21T12:26:50.671644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxodQAECgDVknmGZk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "bd9c972e-5d2f-464b-9afe-cf2543ae9307", "DetectTime": "2024-05-21T12:26:50.833203+00:00", "EventTime": "2024-05-21T12:26:50.833224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGBE7tt3JCqYfxX4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "1504e386-3811-4ae1-bdd6-4e06e1bdc562", "DetectTime": "2024-05-21T12:26:50.853958+00:00", "EventTime": "2024-05-21T12:26:50.853979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDgzqrCAhIT3x76c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "762fd631-b6a4-4ffe-b811-a4d113625413", "DetectTime": "2024-05-21T12:26:50.875416+00:00", "EventTime": "2024-05-21T12:26:50.875438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyuaO03OOY8rbtsULe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "91a44c1b-d658-45a5-a94b-44346dea6d34", "DetectTime": "2024-05-21T12:26:50.912823+00:00", "EventTime": "2024-05-21T12:26:50.912845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5WeU39shezvZZMNa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "f19cf5eb-908a-4688-940b-bc6b8bdbfcc1", "DetectTime": "2024-05-21T12:26:50.924659+00:00", "EventTime": "2024-05-21T12:26:50.924677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwZw7ykDB2rJLKZ3"], "accumulated_threat_level": 1.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "1269a107-128c-4b11-b605-0e9c8bf11876", "DetectTime": "2024-05-21T12:26:50.929331+00:00", "EventTime": "2024-05-21T12:26:50.929348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauT9W2ElXJ4tQPf6i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "11e43c7b-362c-486f-a971-3d5bcf301393", "DetectTime": "2024-05-21T12:26:50.958927+00:00", "EventTime": "2024-05-21T12:26:50.958947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCBuM3Y8cdM6ce4d8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "99210782-e49c-4123-a4db-f9cedb94a12d", "DetectTime": "2024-05-21T12:26:50.984709+00:00", "EventTime": "2024-05-21T12:26:50.984728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbya22nAMmzv4o4Rd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "c31bfd63-94df-47ff-b493-0206fe21537d", "DetectTime": "2024-05-21T12:26:51.011821+00:00", "EventTime": "2024-05-21T12:26:51.011844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKjuZ1fsBvLMiEhu1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "49c51787-3438-4986-b2bf-1924a379d8c0", "DetectTime": "2024-05-21T12:26:51.034744+00:00", "EventTime": "2024-05-21T12:26:51.034764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf4W71C9NPi3HB66j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "edf36a5b-c6ba-4bb7-8607-d5a69fed42fe", "DetectTime": "2024-05-21T12:26:51.046371+00:00", "EventTime": "2024-05-21T12:26:51.046390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdcc63QzvYp98Qv8e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 27} +{"Format": "IDEA0", "ID": "f34e1701-60b9-4d92-ab3e-e92f74f37f6f", "DetectTime": "2024-05-21T12:26:51.078636+00:00", "EventTime": "2024-05-21T12:26:51.078656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVthv3uFnyCqcqomh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "45c507ab-41aa-4abd-a6a7-9c9bc2c9ac32", "DetectTime": "2024-05-21T12:26:51.095668+00:00", "EventTime": "2024-05-21T12:26:51.095689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI7kYB2dhdqn8Cwrih"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "7dc92fc0-0b0f-4439-a839-4d37803a1ed7", "DetectTime": "2024-05-21T12:26:51.110756+00:00", "EventTime": "2024-05-21T12:26:51.110778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.27.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKQ251tWCJmu4YVt4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "8a76297b-5e2a-42e3-bc9e-158736bfff99", "DetectTime": "2024-05-21T12:26:51.136717+00:00", "EventTime": "2024-05-21T12:26:51.136739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.92.75.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAltdgH1M3lRYQiy8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "60d70c68-6ca3-4406-a154-ef9b712d1d19", "DetectTime": "2024-05-21T12:26:51.207870+00:00", "EventTime": "2024-05-21T12:26:51.207888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.154.84.83"]}], "Attach": [{"Content": "Connection to unknown destination port 1134/UDP destination IP 78.154.84.83. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4M0b4esTKrhJjN9c"], "accumulated_threat_level": 3.2, "timewindow": 27} +{"Format": "IDEA0", "ID": "19d864a2-f0a6-431a-a6c9-10f63e2063f0", "DetectTime": "2024-05-21T12:26:51.375217+00:00", "EventTime": "2024-05-21T12:26:51.375236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT9Aa3F8YrIpM3IA8"], "accumulated_threat_level": 4.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "3e83b4f8-a921-45b3-b82f-04e18b74a48f", "DetectTime": "2024-05-21T12:26:51.393696+00:00", "EventTime": "2024-05-21T12:26:51.393719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.17.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1h84l2NDyrbLXoWSk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "db29ed76-e505-4d10-8372-020b7e73641f", "DetectTime": "2024-05-21T12:26:51.416695+00:00", "EventTime": "2024-05-21T12:26:51.416714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.183.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTyGw3jQ8NydHdKnc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "ddf447c1-9219-4348-a31d-021af84b4366", "DetectTime": "2024-05-21T12:26:51.673236+00:00", "EventTime": "2024-05-21T12:26:51.673258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.93.140.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDN80G1ezfho4RPepc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "598ada50-8c53-422a-be67-3a87863ef930", "DetectTime": "2024-05-21T12:26:51.696837+00:00", "EventTime": "2024-05-21T12:26:51.696860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDKjZO2NDvyeJF8UH"], "accumulated_threat_level": 4.8, "timewindow": 27} +{"Format": "IDEA0", "ID": "c5b92c24-8a98-4f80-a411-b1f62fde1f8d", "DetectTime": "2024-05-21T12:26:51.721857+00:00", "EventTime": "2024-05-21T12:26:51.721878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjQMx497pHV2qrORi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "b48126b3-2e71-48d0-943d-cca9f5a836d4", "DetectTime": "2024-05-21T12:26:51.747260+00:00", "EventTime": "2024-05-21T12:26:51.747281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.208.123.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeey61qStftr2JY4e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "3a8212ac-4033-409a-ad9c-353fd630ea43", "DetectTime": "2024-05-21T12:26:51.786967+00:00", "EventTime": "2024-05-21T12:26:51.786986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9ziZjxM2QQwlFuf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "6d0370bc-272d-46ef-8376-11b84958471f", "DetectTime": "2024-05-21T12:26:51.806076+00:00", "EventTime": "2024-05-21T12:26:51.806095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJEBI3bZ7tGaw20g5"], "accumulated_threat_level": 5.6, "timewindow": 27} +{"Format": "IDEA0", "ID": "c1fa70b8-be5e-4bdb-a15c-c5c5b5044d00", "DetectTime": "2024-05-21T12:26:51.825870+00:00", "EventTime": "2024-05-21T12:26:51.825892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyxEknLEcwKq6HSp2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "dd132554-f143-401b-95dc-62bebe51910e", "DetectTime": "2024-05-21T12:26:51.848249+00:00", "EventTime": "2024-05-21T12:26:51.848268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaxnZg2i4XP98Nqwth"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 27} +{"Format": "IDEA0", "ID": "6dc607c4-bfc0-4356-860f-12e30c0c7160", "DetectTime": "2024-05-21T12:26:51.927892+00:00", "EventTime": "2024-05-21T12:26:51.927912+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49w6D2zcX5YMCHCo3"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c3c853b2-ded4-4f2c-b451-500e6c3fcfcf", "DetectTime": "2024-05-21T12:26:51.958227+00:00", "EventTime": "2024-05-21T12:26:51.958246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7hl52UMzUxdIvmw5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "c1209792-8435-4ae1-90c8-b504042d3521", "DetectTime": "2024-05-21T12:26:51.977383+00:00", "EventTime": "2024-05-21T12:26:51.977404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKviK3fJkdS3a5URc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "e40a5cc9-deab-4f05-948d-4da9da8fafa2", "DetectTime": "2024-05-21T12:26:52.003779+00:00", "EventTime": "2024-05-21T12:26:52.003800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMTgFYFIPJtZPU28"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "20177681-5a4b-4341-a85a-c59b666af21c", "DetectTime": "2024-05-21T12:26:52.071214+00:00", "EventTime": "2024-05-21T12:26:52.071236+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1k0m37EAp8HLEvPi"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "2823c7b8-67b6-443f-a64b-4d7ca170c79b", "DetectTime": "2024-05-21T12:26:52.115553+00:00", "EventTime": "2024-05-21T12:26:52.115573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSEhGr15kWyK7HXVh4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "570b903c-00ef-45b3-8620-eced55face4c", "DetectTime": "2024-05-21T12:26:52.251986+00:00", "EventTime": "2024-05-21T12:26:52.252008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2cLK1DFoiCbcoV3j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ac8d81be-78c0-429e-b2d1-c4ea926f7c16", "DetectTime": "2024-05-21T12:26:52.258964+00:00", "EventTime": "2024-05-21T12:26:52.258985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.237.70.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH2Bk2VdJvoQJX6zg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "a5cd4721-10d3-4d06-a49f-fe3ebfaf1334", "DetectTime": "2024-05-21T12:26:52.274320+00:00", "EventTime": "2024-05-21T12:26:52.274341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.77.231.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2s3r2XmD7y9S4pJ8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "9235edea-04e6-4cf9-8ef5-c72640585abd", "DetectTime": "2024-05-21T12:26:52.349388+00:00", "EventTime": "2024-05-21T12:26:52.349411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtpCN1FqhexcnOGrk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "8f7ac14a-fbe8-4432-9f47-5df1fd169159", "DetectTime": "2024-05-21T12:26:52.368957+00:00", "EventTime": "2024-05-21T12:26:52.368979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.189.51.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck5WPQ13EXX18yLwm4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "9fba9681-227d-4300-8d7d-6d61a4bd578e", "DetectTime": "2024-05-21T12:26:52.484078+00:00", "EventTime": "2024-05-21T12:26:52.484100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPSDEhAsxl6b1R63"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "ea64ccd0-ee3f-47d8-ae85-5265c24d8491", "DetectTime": "2024-05-21T12:26:52.520636+00:00", "EventTime": "2024-05-21T12:26:52.520657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUIDDqkZROxyIuce"], "accumulated_threat_level": 7.199999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "5ee4172f-fa82-4933-8d42-7949b6bf6beb", "DetectTime": "2024-05-21T12:26:52.687435+00:00", "EventTime": "2024-05-21T12:26:52.687455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNzqG3fSNZzOcTJKb"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "da2db351-72ab-40d2-839e-86296f9a1409", "DetectTime": "2024-05-21T12:26:52.819770+00:00", "EventTime": "2024-05-21T12:26:52.819788+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.164.65.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYfa62G53DX52iVz6"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "2a715ad0-1165-49e1-abaa-40f9d86ec5dd", "DetectTime": "2024-05-21T12:26:52.830305+00:00", "EventTime": "2024-05-21T12:26:52.830323+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYfa62G53DX52iVz6"], "accumulated_threat_level": 0.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "b833c518-4c00-4334-bce1-9f190bbcbfc3", "DetectTime": "2024-05-21T12:26:52.853828+00:00", "EventTime": "2024-05-21T12:26:52.853850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGNOCA1gzUhAFP0EW5", "CkxLYP3g5SECgclFW1", "CECOT71TuXiVbSAafk", "Chzl3e2mWKeZ3mKIKa"], "accumulated_threat_level": 0.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "caf5205b-3ec1-4b96-859e-e7b53839329b", "DetectTime": "2024-05-21T12:26:52.980207+00:00", "EventTime": "2024-05-21T12:26:52.980225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRLN773FOZkBXVVDZj"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "b316c7b5-3803-4ff9-b730-dcfcf69cc2a1", "DetectTime": "2024-05-21T12:26:52.991724+00:00", "EventTime": "2024-05-21T12:26:52.991742+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRLN773FOZkBXVVDZj"], "accumulated_threat_level": 1.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "02c4bfaa-0b81-422e-ac5e-2dc72b4008b6", "DetectTime": "2024-05-21T12:26:53.007364+00:00", "EventTime": "2024-05-21T12:26:53.007383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7zC945MHcqIHcGI5"], "accumulated_threat_level": 1.3, "timewindow": 28} +{"Format": "IDEA0", "ID": "b91d1a0e-d2c6-47c9-8c86-189806053070", "DetectTime": "2024-05-21T12:26:53.025052+00:00", "EventTime": "2024-05-21T12:26:53.025070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJWdMnI3qXyWfvIRf"], "accumulated_threat_level": 2.1, "timewindow": 28} +{"Format": "IDEA0", "ID": "14a92dc9-ba08-4d20-8aa4-0c7196ef6069", "DetectTime": "2024-05-21T12:26:53.291108+00:00", "EventTime": "2024-05-21T12:26:53.291131+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Uz1gZblYcdpLFr"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "4540119a-e642-406c-b1a6-d801fbd1a66a", "DetectTime": "2024-05-21T12:26:53.302284+00:00", "EventTime": "2024-05-21T12:26:53.302302+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Uz1gZblYcdpLFr"], "accumulated_threat_level": 1.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "f7041431-37b5-4639-bf3a-abc111af2eba", "DetectTime": "2024-05-21T12:26:53.376265+00:00", "EventTime": "2024-05-21T12:26:53.376285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.238.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVClav1oiApYqNYP69"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "1c9b159b-fa2d-4124-bccb-e0c6c8df30f6", "DetectTime": "2024-05-21T12:26:53.436548+00:00", "EventTime": "2024-05-21T12:26:53.436566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "Connection to unknown destination port 11787/UDP destination IP 78.163.112.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxquEx2tSEs9uhQpZd"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 28} +{"Format": "IDEA0", "ID": "b83ac4b4-5b1f-4717-9592-132b91a004f9", "DetectTime": "2024-05-21T12:26:53.465067+00:00", "EventTime": "2024-05-21T12:26:53.465084+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.200.82.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.200.82.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C96p992PBeAJxhif86"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "97758752-61b6-4ef0-ad1c-c4204466031c", "DetectTime": "2024-05-21T12:26:53.480851+00:00", "EventTime": "2024-05-21T12:26:53.480868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ6rMO2ntq9214eFV4"], "accumulated_threat_level": 3.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "fb190c96-0cea-49e2-bb7e-e1ffcad7eb5d", "DetectTime": "2024-05-21T12:26:53.491277+00:00", "EventTime": "2024-05-21T12:26:53.491295+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.200.82.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.200.82.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C96p992PBeAJxhif86"], "accumulated_threat_level": 2.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "6c976b00-e377-48c4-b4ce-c7e223731509", "DetectTime": "2024-05-21T12:26:53.501996+00:00", "EventTime": "2024-05-21T12:26:53.502015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHZV18HoJ58TzWE1"], "accumulated_threat_level": 4.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "002acc0d-d8a2-468c-b23c-8d898d1b9c54", "DetectTime": "2024-05-21T12:26:53.533735+00:00", "EventTime": "2024-05-21T12:26:53.533755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnbDt3OsjyZvXYAS6"], "accumulated_threat_level": 5.3, "timewindow": 28} +{"Format": "IDEA0", "ID": "c314e723-d245-4b75-9159-498351734283", "DetectTime": "2024-05-21T12:26:53.560465+00:00", "EventTime": "2024-05-21T12:26:53.560483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyhhph1Xom67irSYb"], "accumulated_threat_level": 6.1, "timewindow": 28} +{"Format": "IDEA0", "ID": "e984d001-f4db-4f25-bf99-5462057be7af", "DetectTime": "2024-05-21T12:26:53.587424+00:00", "EventTime": "2024-05-21T12:26:53.587442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64Imf3BoYRiDdin8f"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 28} +{"Format": "IDEA0", "ID": "89b91e7c-9bcc-4aa5-aea7-f389ec9c999a", "DetectTime": "2024-05-21T12:26:53.661747+00:00", "EventTime": "2024-05-21T12:26:53.661769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKwcz36wsBW5Xzmse"], "accumulated_threat_level": 7.699999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "4616b971-4438-4ff1-b080-a167108a0fee", "DetectTime": "2024-05-21T12:26:53.688174+00:00", "EventTime": "2024-05-21T12:26:53.688196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.27.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1avgfVO0H3IvfNNk"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "b9b440c4-4ae6-47c6-ab61-7d39bcd6676c", "DetectTime": "2024-05-21T12:26:53.716048+00:00", "EventTime": "2024-05-21T12:26:53.716066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqiPJS2uoUUpi1Fu38"], "accumulated_threat_level": 8.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "182c3bc2-7a06-4c95-9b6b-eedb2128ba87", "DetectTime": "2024-05-21T12:26:53.738474+00:00", "EventTime": "2024-05-21T12:26:53.738492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnczhp4CCO6eEdpfXj"], "accumulated_threat_level": 9.3, "timewindow": 28} +{"Format": "IDEA0", "ID": "6a3fe16c-3869-49d6-89ce-d4bfecfc4d2b", "DetectTime": "2024-05-21T12:26:53.765466+00:00", "EventTime": "2024-05-21T12:26:53.765485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWpSV74H8ZGFBewne4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 28} +{"Format": "IDEA0", "ID": "fe8f6137-22ec-4f15-b255-26887a2cb33d", "DetectTime": "2024-05-21T12:26:53.803525+00:00", "EventTime": "2024-05-21T12:26:53.803544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jc9m3bZuoUC5CFLl"], "accumulated_threat_level": 10.900000000000002, "timewindow": 28} +{"Format": "IDEA0", "ID": "cd19404d-752d-436e-aff1-dfac5b6b3144", "DetectTime": "2024-05-21T12:26:53.830043+00:00", "EventTime": "2024-05-21T12:26:53.830062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4yzRloWYJJA2kTg"], "accumulated_threat_level": 11.700000000000003, "timewindow": 28} +{"Format": "IDEA0", "ID": "64193eab-590a-4c3e-a1fb-213286dcd6fc", "DetectTime": "2024-05-21T12:26:53.868646+00:00", "EventTime": "2024-05-21T12:26:53.868666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXGrv1Ymx7XDbHpF3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 28} +{"Format": "Json", "ID": "64193eab-590a-4c3e-a1fb-213286dcd6fc", "DetectTime": "2024-05-21T12:26:53.868646+00:00", "EventTime": "2024-05-21T12:26:53.868666+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "1970-01-02T03:04:02.848957+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2024/05/21 12:26:54.052509)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 28, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "2dd97b56-bcb2-4e11-a51b-3f1df0170dc8", "DetectTime": "2024-05-21T12:26:54.056313+00:00", "EventTime": "2024-05-21T12:26:54.056330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.92.75.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGt6hCJdC4kj3RLb"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "c7d62f46-27fb-4115-b065-1d2cb17cb22b", "DetectTime": "2024-05-21T12:26:54.067584+00:00", "EventTime": "2024-05-21T12:26:54.067604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWWjzU2yHVrvEwhAP"], "accumulated_threat_level": 0.8, "timewindow": 28} +{"Format": "IDEA0", "ID": "97088ffc-ca9d-4ef4-94df-6f492a556b6e", "DetectTime": "2024-05-21T12:26:54.113776+00:00", "EventTime": "2024-05-21T12:26:54.113794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CePPUU3bFUMvlEdKdd"], "accumulated_threat_level": 1.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "d614c0f3-a1fa-4f88-be4d-d8aed139e40e", "DetectTime": "2024-05-21T12:26:54.147255+00:00", "EventTime": "2024-05-21T12:26:54.147272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25nBd21o4T4NwToJg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 28} +{"Format": "IDEA0", "ID": "29304d19-f136-40d6-897e-8fca9e9a738a", "DetectTime": "2024-05-21T12:26:54.176901+00:00", "EventTime": "2024-05-21T12:26:54.176922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48HWF4iIHHlXPmyJd"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "01d023ed-48b8-4a6d-8944-21046b6bd48f", "DetectTime": "2024-05-21T12:26:54.216418+00:00", "EventTime": "2024-05-21T12:26:54.216437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGN9FcAdjQp57K0gb"], "accumulated_threat_level": 4.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "82e49f56-8f1b-4af0-8787-3509371f0618", "DetectTime": "2024-05-21T12:26:54.275172+00:00", "EventTime": "2024-05-21T12:26:54.275197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu3mO32TZ5k0yS3U9j"], "accumulated_threat_level": 4.8, "timewindow": 28} +{"Format": "IDEA0", "ID": "5087847b-0899-4e28-8a42-38dbf5f43eba", "DetectTime": "2024-05-21T12:26:54.313043+00:00", "EventTime": "2024-05-21T12:26:54.313065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.135.183.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHAoD8wsgzn42E21"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "17ac2b4c-6253-4d62-98be-a4e642ca25d9", "DetectTime": "2024-05-21T12:26:54.376213+00:00", "EventTime": "2024-05-21T12:26:54.376233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "Connection to unknown destination port 12298/UDP destination IP 187.232.5.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKNEd349LLThRlSfg"], "accumulated_threat_level": 5.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "0ff1a497-16f1-4eb8-b8e8-cf02ba0a1ca2", "DetectTime": "2024-05-21T12:26:54.463415+00:00", "EventTime": "2024-05-21T12:26:54.463436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.189.51.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBl0kKSTHZcJdAUe"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "82a659dc-3def-47c5-aaa2-6c05cd79e11e", "DetectTime": "2024-05-21T12:26:54.674771+00:00", "EventTime": "2024-05-21T12:26:54.674791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8JzB1zVwC7mTX6t"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 28} +{"Format": "IDEA0", "ID": "f1938ba1-cad1-4292-90c7-942f23f0fe4f", "DetectTime": "2024-05-21T12:26:54.769299+00:00", "EventTime": "2024-05-21T12:26:54.769320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.77.231.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgl35i2JsiZQQcX6"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "9f103ff7-de83-4f58-b4c5-4d20ca1e97fa", "DetectTime": "2024-05-21T12:26:54.942935+00:00", "EventTime": "2024-05-21T12:26:54.942953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb56XV39rRVbPrWoO6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "2787fab2-2f73-4199-b7cb-9d9ab37ba0cd", "DetectTime": "2024-05-21T12:26:55.040812+00:00", "EventTime": "2024-05-21T12:26:55.040835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhITv36lLKQS0dc88"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "860a164e-a9f5-4ff6-a571-f92ab19f0deb", "DetectTime": "2024-05-21T12:26:55.152478+00:00", "EventTime": "2024-05-21T12:26:55.152501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COCZWh4g9ZdFGbadj"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "f41d8d8d-9aca-405b-a522-dea4b4a9ed84", "DetectTime": "2024-05-21T12:26:55.173809+00:00", "EventTime": "2024-05-21T12:26:55.173828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVSe01cWq8v94rBq6"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "0f39eb6a-efc9-4054-82b8-b315e323e804", "DetectTime": "2024-05-21T12:26:55.204246+00:00", "EventTime": "2024-05-21T12:26:55.204268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPhDSKn7f69MrvH8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "1ca8bb58-9621-40d2-9939-c2f46a8e373d", "DetectTime": "2024-05-21T12:26:55.216166+00:00", "EventTime": "2024-05-21T12:26:55.216183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYsso4UfEiFDra5if"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "bdfffe02-a347-48a7-93e7-260a4203c79d", "DetectTime": "2024-05-21T12:26:55.370647+00:00", "EventTime": "2024-05-21T12:26:55.370666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnAwX1m5PtUAzk7eg", "CF2Wzc3IZhXAowKcbj", "CZE7l73MSTlOctQ32j", "CRMIPZ2c1yzM97s5o4"], "accumulated_threat_level": 7.699999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "bb26a3ec-6bbd-45f8-879e-77dc3471a948", "DetectTime": "2024-05-21T12:26:55.431039+00:00", "EventTime": "2024-05-21T12:26:55.431059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq5cNl38XUj4v0t7C4"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "113862b0-a720-42f9-a8d0-9f616d42cdee", "DetectTime": "2024-05-21T12:26:55.445932+00:00", "EventTime": "2024-05-21T12:26:55.445952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUkQMM2MvGX1Jt9f9i"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "b049b80c-6803-4053-b492-86af5a0ca55e", "DetectTime": "2024-05-21T12:26:55.483965+00:00", "EventTime": "2024-05-21T12:26:55.483984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetEPx4cetpiNpcOI9"], "accumulated_threat_level": 8.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "edeca898-de15-4cfe-9767-fb5397889134", "DetectTime": "2024-05-21T12:26:55.509674+00:00", "EventTime": "2024-05-21T12:26:55.509693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcgj74qccXWBxeaAf"], "accumulated_threat_level": 9.3, "timewindow": 28} +{"Format": "IDEA0", "ID": "bafcc24c-f396-4ecd-8cde-a626caf59acc", "DetectTime": "2024-05-21T12:26:55.549856+00:00", "EventTime": "2024-05-21T12:26:55.549875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEk86x40tmBmbX9rb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 28} +{"Format": "IDEA0", "ID": "fa448c00-8226-4c79-a86d-c37c636133d8", "DetectTime": "2024-05-21T12:26:55.611622+00:00", "EventTime": "2024-05-21T12:26:55.611639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZsMY1REQQLGkMg36"], "accumulated_threat_level": 10.900000000000002, "timewindow": 28} +{"Format": "IDEA0", "ID": "501f7279-d97a-4a82-9a85-9c10012f5f67", "DetectTime": "2024-05-21T12:26:55.639312+00:00", "EventTime": "2024-05-21T12:26:55.639330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyKhu3Kzs4RUEtyUk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 28} +{"Format": "IDEA0", "ID": "25b8dffc-5a1a-4c2b-ae8e-0739543f2328", "DetectTime": "2024-05-21T12:26:55.777514+00:00", "EventTime": "2024-05-21T12:26:55.777535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNpK5snWeS8JKvFk"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "fd78c6d3-de20-4532-ab92-9028e9931bf4", "DetectTime": "2024-05-21T12:26:55.798956+00:00", "EventTime": "2024-05-21T12:26:55.798974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7CWc4cBQpBJEYu67"], "accumulated_threat_level": 12.500000000000004, "timewindow": 28} +{"Format": "Json", "ID": "fd78c6d3-de20-4532-ab92-9028e9931bf4", "DetectTime": "2024-05-21T12:26:55.798956+00:00", "EventTime": "2024-05-21T12:26:55.798974+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "1970-01-02T03:05:52.702485+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2024/05/21 12:26:55.979862)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 28, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "1c6db6ca-22ce-49c8-a594-68e62e93ee1e", "DetectTime": "2024-05-21T12:26:55.983611+00:00", "EventTime": "2024-05-21T12:26:55.983628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9aVbU3uhpCC3CEc3i"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "7fa897f0-23af-4848-b30b-272f38261c98", "DetectTime": "2024-05-21T12:26:55.993871+00:00", "EventTime": "2024-05-21T12:26:55.993889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxDD52r4XuAZSBRXe"], "accumulated_threat_level": 0.8, "timewindow": 28} +{"Format": "IDEA0", "ID": "98b3f37c-260a-4088-8526-0929a18e9acf", "DetectTime": "2024-05-21T12:26:56.049998+00:00", "EventTime": "2024-05-21T12:26:56.050020+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1pHxxpaeGVwmrqti"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "74c1bc92-4180-429e-975a-9cfeb7ac6afb", "DetectTime": "2024-05-21T12:26:56.115747+00:00", "EventTime": "2024-05-21T12:26:56.115767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7znIK2gSDxDMJwmQ"], "accumulated_threat_level": 1.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "1cf58058-6f29-49ca-9589-9f26dfa8446b", "DetectTime": "2024-05-21T12:26:56.175588+00:00", "EventTime": "2024-05-21T12:26:56.175611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcXSA1JltDKlR0188"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "5f6394d6-007c-4dcb-a2a9-7596ccb84fd3", "DetectTime": "2024-05-21T12:26:56.202128+00:00", "EventTime": "2024-05-21T12:26:56.202147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXCWL1Xhjw7ZhCRgk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 28} +{"Format": "IDEA0", "ID": "80a7b457-e4f5-49d4-aacd-844b77b9d3d9", "DetectTime": "2024-05-21T12:26:56.593822+00:00", "EventTime": "2024-05-21T12:26:56.593851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsyOM2NousuiEFkCi"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "b4869aab-5c82-44a5-8053-2ed9c69f4291", "DetectTime": "2024-05-21T12:26:56.667372+00:00", "EventTime": "2024-05-21T12:26:56.667396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbngd1JBFC2XUMKv6"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "3c1414d5-20a7-4a9b-a13e-c62e5b6058d6", "DetectTime": "2024-05-21T12:26:56.700158+00:00", "EventTime": "2024-05-21T12:26:56.700178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvYIC2vEYxFeRnXDc"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "30268d08-20fd-4bd5-aa54-03a70cb17fd6", "DetectTime": "2024-05-21T12:26:56.770717+00:00", "EventTime": "2024-05-21T12:26:56.770738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iwjR1nC5Gx0ecwsc"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "fe60d095-d000-4985-ae8b-3bc7bbf3a7e5", "DetectTime": "2024-05-21T12:26:56.837723+00:00", "EventTime": "2024-05-21T12:26:56.837744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLroz2WAvAyPUw7M8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "1812f0eb-a06f-4b82-b28b-2848cd55aaee", "DetectTime": "2024-05-21T12:26:56.881741+00:00", "EventTime": "2024-05-21T12:26:56.881763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOdoM2fsYypixMMgh"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "06e26bce-4259-45e5-aca6-50215572758a", "DetectTime": "2024-05-21T12:26:56.927874+00:00", "EventTime": "2024-05-21T12:26:56.927895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBEFAE25UfROCCFacb"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "bcad4e41-03c8-48dd-b7cf-f942fc7a4a1d", "DetectTime": "2024-05-21T12:26:56.951198+00:00", "EventTime": "2024-05-21T12:26:56.951219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.17.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9Q5G3eyz3OeHc4ma"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "5aa854b7-4882-40f1-963a-2562c6010a54", "DetectTime": "2024-05-21T12:26:56.980325+00:00", "EventTime": "2024-05-21T12:26:56.980350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.93.140.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhvaZhFrsY7HjYUc"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "e142722a-d8d6-4558-8a57-31206f904861", "DetectTime": "2024-05-21T12:26:57.029265+00:00", "EventTime": "2024-05-21T12:26:57.029283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPfnJbnCDbfhV9X7"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "668dc350-c2a8-4152-b9d7-628ed31fcc45", "DetectTime": "2024-05-21T12:26:57.054244+00:00", "EventTime": "2024-05-21T12:26:57.054262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfw2X2kZn3uVnelG8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "d2dd77f7-90a2-49a3-8b51-223a0574e2cb", "DetectTime": "2024-05-21T12:26:57.089915+00:00", "EventTime": "2024-05-21T12:26:57.089933+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZsyV1f51pBUpSOw7"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "de8dd734-74e7-4397-a1d2-49469b240c1c", "DetectTime": "2024-05-21T12:26:57.102952+00:00", "EventTime": "2024-05-21T12:26:57.102973+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZsyV1f51pBUpSOw7"], "accumulated_threat_level": 2.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "c4901493-456c-4121-bbea-7d87c21c09a6", "DetectTime": "2024-05-21T12:26:57.107691+00:00", "EventTime": "2024-05-21T12:26:57.107709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6bda4gy11dujDBDf"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "33745f9e-9623-4605-9da3-e4da4268c722", "DetectTime": "2024-05-21T12:26:57.182482+00:00", "EventTime": "2024-05-21T12:26:57.182503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.208.123.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOp824bmWD5TLwJO"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "582cc030-785e-4d14-b0ae-e1414582c8a1", "DetectTime": "2024-05-21T12:26:57.275129+00:00", "EventTime": "2024-05-21T12:26:57.275150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqS9hcRu4PWXxpua9"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "0e878243-aea4-4547-a809-ba29b0ea71cb", "DetectTime": "2024-05-21T12:26:57.280021+00:00", "EventTime": "2024-05-21T12:26:57.280041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiOaPw4qNlNu9aNRl", "CzNZmi3bWDJQ9qnRT6", "C21BY53wlewoetlx79", "Cjci2i4uFeUG8pr4U"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 28} +{"Format": "IDEA0", "ID": "df0a4560-48a5-4b7f-8895-0a0bc773b909", "DetectTime": "2024-05-21T12:26:57.339975+00:00", "EventTime": "2024-05-21T12:26:57.339997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbK6mr3FI7MHdAGwK7"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "c13667b7-0793-4c1f-b328-018d5ab789a1", "DetectTime": "2024-05-21T12:26:57.402238+00:00", "EventTime": "2024-05-21T12:26:57.402256+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMKXW30mQLAuQbWP1"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "5c1ace01-060f-4bce-819d-915e465f19b8", "DetectTime": "2024-05-21T12:26:57.416732+00:00", "EventTime": "2024-05-21T12:26:57.416749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMKXW30mQLAuQbWP1"], "accumulated_threat_level": 3.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "e27a6717-5832-4be1-9027-1ab9f60b3912", "DetectTime": "2024-05-21T12:26:57.429637+00:00", "EventTime": "2024-05-21T12:26:57.429656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzvDl4ZjXGyC0r4aj"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "194ee20f-d9cd-4d88-93d6-9bcf4c3c4d4b", "DetectTime": "2024-05-21T12:26:57.477561+00:00", "EventTime": "2024-05-21T12:26:57.477579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.237.70.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQjST1lUDXLLLbnvf"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "6fce7222-3aed-40c8-af64-31e9c4e04934", "DetectTime": "2024-05-21T12:26:57.691881+00:00", "EventTime": "2024-05-21T12:26:57.691902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbg4dm4iX3ta7WUiE9"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "df4da4a5-12a8-4377-8e28-6566503fef9c", "DetectTime": "2024-05-21T12:26:57.705873+00:00", "EventTime": "2024-05-21T12:26:57.705895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbg4dm4iX3ta7WUiE9"], "accumulated_threat_level": 3.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "1315ba40-5f83-4bf0-a3d9-e9fcf51cfcd2", "DetectTime": "2024-05-21T12:26:57.810266+00:00", "EventTime": "2024-05-21T12:26:57.810286+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwy3Z3Cvgx8RVip27"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "36e49772-2def-4ee6-89a6-92f7ae997bf2", "DetectTime": "2024-05-21T12:26:57.823469+00:00", "EventTime": "2024-05-21T12:26:57.823491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwy3Z3Cvgx8RVip27"], "accumulated_threat_level": 4.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "3f336593-1cb8-42ac-8dd0-e4287be169d0", "DetectTime": "2024-05-21T12:26:57.835479+00:00", "EventTime": "2024-05-21T12:26:57.835498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAk1X1459AvAeWt1e"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "d9bf6dd1-9d4b-4c1a-97a0-bab37c3cd0da", "DetectTime": "2024-05-21T12:26:57.887135+00:00", "EventTime": "2024-05-21T12:26:57.887158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwXlJ1EO47T3oxrX6"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "3ace7c6d-b69b-4af9-85c4-3a726efa0ad3", "DetectTime": "2024-05-21T12:26:57.913118+00:00", "EventTime": "2024-05-21T12:26:57.913139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX5uLS2SUBfMcREV49"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "6b87517d-a491-478b-96e7-1d130577d9b4", "DetectTime": "2024-05-21T12:26:57.954897+00:00", "EventTime": "2024-05-21T12:26:57.954913+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJI6b1y0vB1THdB72"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "edaca120-6692-465b-bdfd-3b5c0a9c409f", "DetectTime": "2024-05-21T12:26:57.965566+00:00", "EventTime": "2024-05-21T12:26:57.965584+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJI6b1y0vB1THdB72"], "accumulated_threat_level": 4.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "8d53d498-7358-4d92-9424-a10e8ba66cf0", "DetectTime": "2024-05-21T12:26:58.047211+00:00", "EventTime": "2024-05-21T12:26:58.047234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjhhj2B3Gd8vc9Y3d"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "9680f74d-57b3-475c-9b3e-ca2c146cfef5", "DetectTime": "2024-05-21T12:26:58.209524+00:00", "EventTime": "2024-05-21T12:26:58.209546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C999BH3qkEwlmAWju5"], "accumulated_threat_level": 3.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "d456c87b-7b57-48dc-9774-b48b3e9f1d98", "DetectTime": "2024-05-21T12:26:58.225158+00:00", "EventTime": "2024-05-21T12:26:58.225176+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeOMsZ3YSvANTzRiL9"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "7ecf1698-f663-4b74-a1b8-6457a501aeb7", "DetectTime": "2024-05-21T12:26:58.237538+00:00", "EventTime": "2024-05-21T12:26:58.237556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeOMsZ3YSvANTzRiL9"], "accumulated_threat_level": 5.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "62112116-559b-4553-a6aa-7b8cc48301ac", "DetectTime": "2024-05-21T12:26:58.247934+00:00", "EventTime": "2024-05-21T12:26:58.247952+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EVzB3GVlVAunhLW1"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "9f7c75fc-b06f-46b1-aeb8-71ef0e522efc", "DetectTime": "2024-05-21T12:26:58.260058+00:00", "EventTime": "2024-05-21T12:26:58.260078+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EVzB3GVlVAunhLW1"], "accumulated_threat_level": 5.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "ef3cbca3-96cd-43ed-b1bf-b4282f5b2cb6", "DetectTime": "2024-05-21T12:26:58.272836+00:00", "EventTime": "2024-05-21T12:26:58.272856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClARnq1I8PTTRu9qCc"], "accumulated_threat_level": 4.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "c9ba7084-4c4a-4329-8502-9a9b34b87b6f", "DetectTime": "2024-05-21T12:26:58.297794+00:00", "EventTime": "2024-05-21T12:26:58.297814+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["149.3.4.183"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 149.3.4.183 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87J5isTm7u1nKL78"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "a156748e-b5b4-4598-bf59-a737161919fd", "DetectTime": "2024-05-21T12:26:58.358875+00:00", "EventTime": "2024-05-21T12:26:58.358895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["149.3.4.183"]}], "Attach": [{"Content": "connection to blacklisted IP: 149.3.4.183 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87J5isTm7u1nKL78"], "accumulated_threat_level": 6.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "a99ec8f0-66b1-4829-9c5e-0ff85a50918c", "DetectTime": "2024-05-21T12:26:58.493990+00:00", "EventTime": "2024-05-21T12:26:58.494013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.231.69.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xgv3h75CUMAZ1b7"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "05d6ea76-9957-4f01-bc85-5e334ce378d6", "DetectTime": "2024-05-21T12:26:58.530065+00:00", "EventTime": "2024-05-21T12:26:58.530084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8vLa4HBilFS6md1"], "accumulated_threat_level": 5.3, "timewindow": 28} +{"Format": "IDEA0", "ID": "e51e4fa2-3df3-40af-91f1-03e5eb407992", "DetectTime": "2024-05-21T12:26:58.555701+00:00", "EventTime": "2024-05-21T12:26:58.555720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3sWa38NHfv8RVImc"], "accumulated_threat_level": 6.1, "timewindow": 28} +{"Format": "IDEA0", "ID": "e840955f-a533-4d59-8bd9-19dffe78991d", "DetectTime": "2024-05-21T12:26:58.592330+00:00", "EventTime": "2024-05-21T12:26:58.592347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDnXlC31ogSiJU11Pc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 28} +{"Format": "IDEA0", "ID": "2dc50710-006c-4fda-bc05-ea51a91b4640", "DetectTime": "2024-05-21T12:26:58.597042+00:00", "EventTime": "2024-05-21T12:26:58.597059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtEQ7U2mRcaWlzR1mk"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "55a0c9a4-9288-4629-8973-bbba555d3849", "DetectTime": "2024-05-21T12:26:58.696971+00:00", "EventTime": "2024-05-21T12:26:58.696993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1RlzjysiN9UsNK32"], "accumulated_threat_level": 7.699999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "e346d285-d0b8-42e1-ac61-e6bb3d9f10bc", "DetectTime": "2024-05-21T12:26:58.702602+00:00", "EventTime": "2024-05-21T12:26:58.702623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.4.149.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWXl33Ltcm2O4Zq91"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "1287bb21-e013-4854-ab94-ca5d3c8d7c33", "DetectTime": "2024-05-21T12:26:58.713975+00:00", "EventTime": "2024-05-21T12:26:58.713993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcjTH3xmmlspdz27c"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "5ab0879c-bbb8-4483-9480-9d7acaa6173e", "DetectTime": "2024-05-21T12:26:58.754889+00:00", "EventTime": "2024-05-21T12:26:58.754907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5xRlG1wVrxEM8dTna"], "accumulated_threat_level": 8.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "329e09ca-6a9c-4ef0-86f8-fddefbbba947", "DetectTime": "2024-05-21T12:26:58.786604+00:00", "EventTime": "2024-05-21T12:26:58.786623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIiTiwe0znIWJ2kI3"], "accumulated_threat_level": 9.3, "timewindow": 28} +{"Format": "IDEA0", "ID": "79a78720-3adc-4f97-b6bc-8bfd23dcc59b", "DetectTime": "2024-05-21T12:26:58.811906+00:00", "EventTime": "2024-05-21T12:26:58.811925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgVqO2NnivNpQV69k"], "accumulated_threat_level": 10.100000000000001, "timewindow": 28} +{"Format": "IDEA0", "ID": "3fa9350a-88cf-4fa2-b024-a117bb47d572", "DetectTime": "2024-05-21T12:26:58.836894+00:00", "EventTime": "2024-05-21T12:26:58.836915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjc8b3U68BPevf2rf"], "accumulated_threat_level": 10.900000000000002, "timewindow": 28} +{"Format": "IDEA0", "ID": "9148c0ca-a268-486e-8afd-a273e4005fd3", "DetectTime": "2024-05-21T12:26:58.862509+00:00", "EventTime": "2024-05-21T12:26:58.862531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CesqCi4jQaGFJYujw1"], "accumulated_threat_level": 11.700000000000003, "timewindow": 28} +{"Format": "IDEA0", "ID": "4391b4d4-0fca-4549-8dfe-d399480b4f19", "DetectTime": "2024-05-21T12:26:58.891241+00:00", "EventTime": "2024-05-21T12:26:58.891264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpNT03Ujr3aeUsXTi"], "accumulated_threat_level": 12.500000000000004, "timewindow": 28} +{"Format": "Json", "ID": "4391b4d4-0fca-4549-8dfe-d399480b4f19", "DetectTime": "2024-05-21T12:26:58.891241+00:00", "EventTime": "2024-05-21T12:26:58.891264+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "1970-01-02T03:37:56.522102+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2024/05/21 12:26:59.137883)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 28, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "c8d611f2-6711-4d5f-a224-be3f4e4e562c", "DetectTime": "2024-05-21T12:26:59.148369+00:00", "EventTime": "2024-05-21T12:26:59.148392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.242.59.94"]}], "Attach": [{"Content": "Connection to unknown destination port 5526/UDP destination IP 77.242.59.94. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQZAJw43WjE4HUFub1"], "accumulated_threat_level": 0.8, "timewindow": 28} +{"Format": "IDEA0", "ID": "e9616a22-b379-45a4-ba58-dd63016b1970", "DetectTime": "2024-05-21T12:26:59.153525+00:00", "EventTime": "2024-05-21T12:26:59.153547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.17.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGIRXg1npQ8UsFgPsg"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "8f572a5d-f490-4ef7-bf33-01ed197e4877", "DetectTime": "2024-05-21T12:26:59.168815+00:00", "EventTime": "2024-05-21T12:26:59.168835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUxwd2QvZ97OY4qUg"], "accumulated_threat_level": 1.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "b59ad313-a9d6-4672-9191-176beb9544bc", "DetectTime": "2024-05-21T12:26:59.181072+00:00", "EventTime": "2024-05-21T12:26:59.181091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvox43DbKRjNOBBk9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 28} +{"Format": "IDEA0", "ID": "adc0e770-c837-4c17-8c10-860754dcd16a", "DetectTime": "2024-05-21T12:26:59.193043+00:00", "EventTime": "2024-05-21T12:26:59.193062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRxT1A3eu2NhBoRzK5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "7ee60589-e3b2-4dcd-bc0d-b5f49ad77700", "DetectTime": "2024-05-21T12:26:59.204264+00:00", "EventTime": "2024-05-21T12:26:59.204282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5DpcA21KMVR3F0fF6"], "accumulated_threat_level": 4.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "564c2d28-285b-47d1-bcaf-52e4cc56575b", "DetectTime": "2024-05-21T12:26:59.214915+00:00", "EventTime": "2024-05-21T12:26:59.214933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CODYVs4KNlbrSrukIi"], "accumulated_threat_level": 4.8, "timewindow": 28} +{"Format": "IDEA0", "ID": "24954213-4bcf-4c7e-a0b5-1a521e29a2f8", "DetectTime": "2024-05-21T12:26:59.219358+00:00", "EventTime": "2024-05-21T12:26:59.219376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.93.140.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cBf32o7AHhB7yy5a"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "b7860790-8772-4275-a263-ea93890e1907", "DetectTime": "2024-05-21T12:26:59.324906+00:00", "EventTime": "2024-05-21T12:26:59.324928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5n91b1ViQEIjrmWbl"], "accumulated_threat_level": 5.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "c94a530b-ff34-4535-a744-e7eb18ee6cf4", "DetectTime": "2024-05-21T12:26:59.351954+00:00", "EventTime": "2024-05-21T12:26:59.351976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2NIMFa2tKwHaXkpe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 28} +{"Format": "IDEA0", "ID": "52a4d6c7-4c81-4987-bd56-4f21dd9f4693", "DetectTime": "2024-05-21T12:26:59.388922+00:00", "EventTime": "2024-05-21T12:26:59.388941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxm8VA4qqjrrNPcG6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "90d71256-0cec-4902-9510-c384ddfda9c8", "DetectTime": "2024-05-21T12:26:59.427809+00:00", "EventTime": "2024-05-21T12:26:59.427830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "Connection to unknown destination port 12298/UDP destination IP 187.232.5.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWzhn2If8XS7FE8Tg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "fd0e3588-ea03-4fcb-8737-ae2dbcc92b39", "DetectTime": "2024-05-21T12:26:59.452806+00:00", "EventTime": "2024-05-21T12:26:59.452824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJeg211kbquESlex6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 28} +{"Format": "IDEA0", "ID": "35c55996-c6e4-4971-8c9c-308e4c6c61f1", "DetectTime": "2024-05-21T12:26:59.492572+00:00", "EventTime": "2024-05-21T12:26:59.492592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNh7m4BD2IAkxfUc6"], "accumulated_threat_level": 9.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "247fa249-d3f9-4932-9778-5918c0d6b50b", "DetectTime": "2024-05-21T12:26:59.520978+00:00", "EventTime": "2024-05-21T12:26:59.520996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzRDc4E55ab5t5ADc"], "accumulated_threat_level": 10.4, "timewindow": 28} +{"Format": "IDEA0", "ID": "3649342f-b369-4432-ac82-f76773188001", "DetectTime": "2024-05-21T12:26:59.558053+00:00", "EventTime": "2024-05-21T12:26:59.558073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIk9iA4XJZkDtvamz"], "accumulated_threat_level": 11.200000000000001, "timewindow": 28} +{"Format": "IDEA0", "ID": "dc071c4b-d57f-4ac0-b896-8d7c457af5f4", "DetectTime": "2024-05-21T12:26:59.596066+00:00", "EventTime": "2024-05-21T12:26:59.596085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJUcT1dc4Dt1oLwp5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 28} +{"Format": "Json", "ID": "dc071c4b-d57f-4ac0-b896-8d7c457af5f4", "DetectTime": "2024-05-21T12:26:59.596066+00:00", "EventTime": "2024-05-21T12:26:59.596085+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "1970-01-02T03:38:15.609697+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2024/05/21 12:26:59.801039)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 28, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2400bdd9-ada8-4e64-84a7-51ca23ee8171", "DetectTime": "2024-05-21T12:26:59.812112+00:00", "EventTime": "2024-05-21T12:26:59.812130+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU0fu0nUFuKTW6S3"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "7bd8d91c-15c1-497b-8b59-9e4a9de35200", "DetectTime": "2024-05-21T12:26:59.823157+00:00", "EventTime": "2024-05-21T12:26:59.823175+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU0fu0nUFuKTW6S3"], "accumulated_threat_level": 6.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "466e5cf1-aaa8-48db-a63e-5f7ba9b673f4", "DetectTime": "2024-05-21T12:26:59.833675+00:00", "EventTime": "2024-05-21T12:26:59.833694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9F8a31ZJkKvvovvte"], "accumulated_threat_level": 0.8, "timewindow": 28} +{"Format": "IDEA0", "ID": "5fde8a36-801b-4dd5-a105-e5f1c8da7f5f", "DetectTime": "2024-05-21T12:26:59.844893+00:00", "EventTime": "2024-05-21T12:26:59.844914+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHB1eRxbv2qdmgPM"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "6f7d6282-b59c-4aae-bce4-74d7eb71f6ec", "DetectTime": "2024-05-21T12:26:59.855946+00:00", "EventTime": "2024-05-21T12:26:59.855964+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHB1eRxbv2qdmgPM"], "accumulated_threat_level": 7.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "b3fb3713-6f18-4649-8626-00014ebdb8f7", "DetectTime": "2024-05-21T12:26:59.868304+00:00", "EventTime": "2024-05-21T12:26:59.868322+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihGev3pXdzzWxnNul"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "d2f1278e-efc0-4816-a28c-53f6f293cc28", "DetectTime": "2024-05-21T12:26:59.881555+00:00", "EventTime": "2024-05-21T12:26:59.881574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihGev3pXdzzWxnNul"], "accumulated_threat_level": 7.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "7eac39c6-1138-4d17-bdcd-fb22fb589f5e", "DetectTime": "2024-05-21T12:26:59.893172+00:00", "EventTime": "2024-05-21T12:26:59.893192+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgq1PB3l5yqC9kyAC"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "787ebd99-bb36-4949-8560-3139156a50d7", "DetectTime": "2024-05-21T12:26:59.904646+00:00", "EventTime": "2024-05-21T12:26:59.904663+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgq1PB3l5yqC9kyAC"], "accumulated_threat_level": 8.0, "timewindow": 13} +{"Format": "IDEA0", "ID": "5990e255-93d8-4366-a45b-41e7c898c414", "DetectTime": "2024-05-21T12:26:59.909606+00:00", "EventTime": "2024-05-21T12:26:59.909624+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qlwygczS6csQrCh"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "ff73734d-b770-4a0c-bf1c-65f49a48fe1e", "DetectTime": "2024-05-21T12:26:59.920002+00:00", "EventTime": "2024-05-21T12:26:59.920021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtIhW1ojuEdLPMPpl"], "accumulated_threat_level": 0, "timewindow": 13} +{"Format": "IDEA0", "ID": "0ae6f373-b165-420c-81df-53c99810aae9", "DetectTime": "2024-05-21T12:26:59.932596+00:00", "EventTime": "2024-05-21T12:26:59.932616+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtIhW1ojuEdLPMPpl"], "accumulated_threat_level": 8.5, "timewindow": 13} +{"Format": "IDEA0", "ID": "7b0eb976-450f-45e9-b967-f421df251868", "DetectTime": "2024-05-21T12:26:59.937295+00:00", "EventTime": "2024-05-21T12:26:59.937313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.237.70.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZuZp2W2ZdJUvh7Zg"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "0e61a8d4-a6b5-482b-b809-a7fb40f0360a", "DetectTime": "2024-05-21T12:26:59.947491+00:00", "EventTime": "2024-05-21T12:26:59.947509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73FRJ1NRxF33DUPKh"], "accumulated_threat_level": 1.6, "timewindow": 28} +{"Format": "IDEA0", "ID": "48fd29a5-c8a6-4df6-9bfc-8f8a4b7aa820", "DetectTime": "2024-05-21T12:26:59.959125+00:00", "EventTime": "2024-05-21T12:26:59.959146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFDThF1BAT4RWLmZef"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 28} +{"Format": "IDEA0", "ID": "b74c287d-b097-48c0-8a30-75a0a53d2a60", "DetectTime": "2024-05-21T12:26:59.964638+00:00", "EventTime": "2024-05-21T12:26:59.964656+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQqt94ccmJWZ3Uct1"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "e0986ec0-4510-46d8-9425-aa3095f17cd6", "DetectTime": "2024-05-21T12:26:59.977793+00:00", "EventTime": "2024-05-21T12:26:59.977812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czv1wg1r7scD5IPNU1"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "f9aa872b-df65-4397-805c-13c7201d7914", "DetectTime": "2024-05-21T12:26:59.982507+00:00", "EventTime": "2024-05-21T12:26:59.982525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iubA0K6sp8Gl4v8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "c3a66bae-9569-4269-89bc-602f291fa7f2", "DetectTime": "2024-05-21T12:27:00.008026+00:00", "EventTime": "2024-05-21T12:27:00.008045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfiHfr1O3zwSTzi3y8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "5676ca08-3458-497a-82b4-00045e125706", "DetectTime": "2024-05-21T12:27:00.141326+00:00", "EventTime": "2024-05-21T12:27:00.141346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKTOl5omK1udjiJQk", "C2Kams1JFY9GMDhbI9", "CLNzsA30A8umat4Of7", "CkV6f32kIjQDEfPKp5"], "accumulated_threat_level": 0.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "8c9fd44b-11ea-447b-af39-609458c5126c", "DetectTime": "2024-05-21T12:27:00.269126+00:00", "EventTime": "2024-05-21T12:27:00.269147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzbdB2XoX02ow3BJ3"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "2c49eaf8-19da-4ebf-9a7b-8771cdd4ae55", "DetectTime": "2024-05-21T12:27:00.375105+00:00", "EventTime": "2024-05-21T12:27:00.375126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8oDm34QHiQZFyuge"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "6de19ff2-2826-4aea-b4f1-42b4c4146623", "DetectTime": "2024-05-21T12:27:00.590902+00:00", "EventTime": "2024-05-21T12:27:00.590926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci59X81iIh7D2jTK3l"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "d1a8c92a-ecab-4e88-9dfe-3c9f00941a91", "DetectTime": "2024-05-21T12:27:00.613050+00:00", "EventTime": "2024-05-21T12:27:00.613070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwqeg3KuQk2QmhJNk"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "0b0119a9-1fa5-4c00-960c-b2335004d55c", "DetectTime": "2024-05-21T12:27:00.629808+00:00", "EventTime": "2024-05-21T12:27:00.629831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxI5E3gDZH3iqfQFa"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "f1373a92-38bf-4e91-adc7-dda5984872fe", "DetectTime": "2024-05-21T12:27:00.663211+00:00", "EventTime": "2024-05-21T12:27:00.663234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW537Z1bp7hALjMSi9"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "925d53f8-7fa6-430f-a99a-7617ab88bfea", "DetectTime": "2024-05-21T12:27:00.945962+00:00", "EventTime": "2024-05-21T12:27:00.945983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJ2U52cwIBvsN6mDa"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "8b750626-306f-4eb2-9fbf-cc1e32bfc636", "DetectTime": "2024-05-21T12:27:00.950816+00:00", "EventTime": "2024-05-21T12:27:00.950834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPiTVS2Xjkif4VGed7"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "a6ae0b2c-d3cf-44ea-8389-aae414759412", "DetectTime": "2024-05-21T12:27:00.986002+00:00", "EventTime": "2024-05-21T12:27:00.986022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1RNB3su7dfA7xuHj"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "dfca857b-a561-4a31-afae-7ad081f7b793", "DetectTime": "2024-05-21T12:27:00.990865+00:00", "EventTime": "2024-05-21T12:27:00.990886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsqqc1RWxMGme8qWh"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "db9c5eac-f643-40fa-907a-b37ce42000b4", "DetectTime": "2024-05-21T12:27:01.016259+00:00", "EventTime": "2024-05-21T12:27:01.016280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLTiZ1GgiV4G5186"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "4823831b-65de-487a-b171-b09dec2a6ee0", "DetectTime": "2024-05-21T12:27:01.043886+00:00", "EventTime": "2024-05-21T12:27:01.043907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7k24uFkgQmY9JP6"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "3483afc0-53e1-4727-bc5d-548fc44230ab", "DetectTime": "2024-05-21T12:27:01.060692+00:00", "EventTime": "2024-05-21T12:27:01.060713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.208.123.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFAKFC335NVVwgg28b"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "fa4f5d51-becf-46a3-9ff4-997448dd8603", "DetectTime": "2024-05-21T12:27:01.127869+00:00", "EventTime": "2024-05-21T12:27:01.127888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yFSN1T87uI6HrxD5"], "accumulated_threat_level": 1.3, "timewindow": 29} +{"Format": "IDEA0", "ID": "a95a3c86-2ba5-4b6a-be28-64a3706603e4", "DetectTime": "2024-05-21T12:27:01.145332+00:00", "EventTime": "2024-05-21T12:27:01.145352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9y9VK11r0zLO3gOUc"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "6bad6507-1b4e-4fad-bf34-e0436a05b3fe", "DetectTime": "2024-05-21T12:27:01.165717+00:00", "EventTime": "2024-05-21T12:27:01.165735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhzZCh9Lxep4WNvg"], "accumulated_threat_level": 2.1, "timewindow": 29} +{"Format": "IDEA0", "ID": "57ae752d-babe-4874-ae07-10686963f2be", "DetectTime": "2024-05-21T12:27:01.183239+00:00", "EventTime": "2024-05-21T12:27:01.183259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyxff73XJgEQwWFLWi"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "47747c8d-30dc-46c3-9ad7-096627fd85ee", "DetectTime": "2024-05-21T12:27:01.212374+00:00", "EventTime": "2024-05-21T12:27:01.212394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jSaF4iNw5BZbTvwk"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 29} +{"Format": "IDEA0", "ID": "b4e6b5fa-9a71-4161-921f-e6be3400dfc5", "DetectTime": "2024-05-21T12:27:01.219607+00:00", "EventTime": "2024-05-21T12:27:01.219625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq99QQ1jilSHxcdMh5"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "ab57d34f-a952-47f2-9f3c-e9a2ba582d09", "DetectTime": "2024-05-21T12:27:01.366717+00:00", "EventTime": "2024-05-21T12:27:01.366738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKCsf28Fc8xMe3T7", "C6b4mP2ybAf8tHmiwe", "Cgv3Fh1HcIlH6vfGre", "CS0KJi1ZfSproSG3Ka"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 29} +{"Format": "IDEA0", "ID": "eff3a6e3-dc5c-4614-9e07-73dd9fbb3974", "DetectTime": "2024-05-21T12:27:01.400199+00:00", "EventTime": "2024-05-21T12:27:01.400220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0DM23szs7NF8QYG7"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "aa628622-7e9d-4a8c-af2b-b33bc0a6f8d9", "DetectTime": "2024-05-21T12:27:01.437306+00:00", "EventTime": "2024-05-21T12:27:01.437327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrVfK3E5SfhbPL5h4"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "3d6f8e99-364b-466f-a83f-cff6e55d5eaf", "DetectTime": "2024-05-21T12:27:01.464926+00:00", "EventTime": "2024-05-21T12:27:01.464947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugAHp2dCDEacC4zuh"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "0ad256ae-913b-4950-b844-4d5be54ea4d4", "DetectTime": "2024-05-21T12:27:01.525268+00:00", "EventTime": "2024-05-21T12:27:01.525288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzozF2geEEpKSkfic"], "accumulated_threat_level": 4.2, "timewindow": 29} +{"Format": "IDEA0", "ID": "574d94de-7510-49dc-80f6-15f834cefa74", "DetectTime": "2024-05-21T12:27:01.543090+00:00", "EventTime": "2024-05-21T12:27:01.543112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdWnk2RGyE9h5rRr6"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "acc20a37-7aef-4c80-b859-853bea2135f3", "DetectTime": "2024-05-21T12:27:01.548182+00:00", "EventTime": "2024-05-21T12:27:01.548202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYOOcA22PdomoWJxa8"], "accumulated_threat_level": 3.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "de444c0c-7ed0-414a-be21-92d3b1b9f3ff", "DetectTime": "2024-05-21T12:27:01.607927+00:00", "EventTime": "2024-05-21T12:27:01.607946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDHel2ttoksI9EhEa"], "accumulated_threat_level": 5.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "87a9c2b6-39b8-4e14-a83d-f11414258124", "DetectTime": "2024-05-21T12:27:01.653120+00:00", "EventTime": "2024-05-21T12:27:01.653142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXukdc1DXHoYnKy5k3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "866fcb22-27b8-44b9-b5e1-93c60c1061eb", "DetectTime": "2024-05-21T12:27:01.678646+00:00", "EventTime": "2024-05-21T12:27:01.678665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jbze2pj6Tz6iaVSj"], "accumulated_threat_level": 5.8, "timewindow": 29} +{"Format": "IDEA0", "ID": "e1e0ed93-b6c5-41be-8d8b-2cd056702f5e", "DetectTime": "2024-05-21T12:27:01.713500+00:00", "EventTime": "2024-05-21T12:27:01.713517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2FwC2xRtq8uKQRBi"], "accumulated_threat_level": 6.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "0f65e661-db02-48ac-854a-d06f704e4169", "DetectTime": "2024-05-21T12:27:01.741436+00:00", "EventTime": "2024-05-21T12:27:01.741456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC91w30cU83uhdkC9"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 29} +{"Format": "IDEA0", "ID": "8d5f9b65-d689-49be-9e61-e7fa43167005", "DetectTime": "2024-05-21T12:27:01.762891+00:00", "EventTime": "2024-05-21T12:27:01.762911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8xX8JNGEQ4Ngz8Ld"], "accumulated_threat_level": 8.2, "timewindow": 29} +{"Format": "IDEA0", "ID": "36e463b2-254a-448b-98e1-50ce3b20fc5a", "DetectTime": "2024-05-21T12:27:01.790862+00:00", "EventTime": "2024-05-21T12:27:01.790884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqm0gkUDAcmTp7Cye"], "accumulated_threat_level": 9.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "33e4c6f1-0602-4c95-9698-21c7b323a34b", "DetectTime": "2024-05-21T12:27:01.816925+00:00", "EventTime": "2024-05-21T12:27:01.816944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQ9AF3AjCcXS0MFwh"], "accumulated_threat_level": 9.8, "timewindow": 29} +{"Format": "IDEA0", "ID": "25dab9b6-c857-4736-b35d-f290984b519d", "DetectTime": "2024-05-21T12:27:01.847133+00:00", "EventTime": "2024-05-21T12:27:01.847156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csjvb1MWzYBPOPx0j"], "accumulated_threat_level": 10.600000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "749424fe-548a-4481-8795-4784affedccf", "DetectTime": "2024-05-21T12:27:01.873307+00:00", "EventTime": "2024-05-21T12:27:01.873325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTdNJ2rp0wWYILagj"], "accumulated_threat_level": 11.400000000000002, "timewindow": 29} +{"Format": "IDEA0", "ID": "fa68010f-4223-4790-80c4-88fde2f4a8df", "DetectTime": "2024-05-21T12:27:01.900873+00:00", "EventTime": "2024-05-21T12:27:01.900891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdKR02yVUD9AVMIK6"], "accumulated_threat_level": 12.200000000000003, "timewindow": 29} +{"Format": "Json", "ID": "fa68010f-4223-4790-80c4-88fde2f4a8df", "DetectTime": "2024-05-21T12:27:01.900873+00:00", "EventTime": "2024-05-21T12:27:01.900891+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "1970-01-02T04:09:12.798971+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2024/05/21 12:27:02.124475)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 29, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "47193c16-6dd3-443f-8b12-94945c4d812d", "DetectTime": "2024-05-21T12:27:02.135005+00:00", "EventTime": "2024-05-21T12:27:02.135024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzEfNC3S7M0x6p1fN2"], "accumulated_threat_level": 0.8, "timewindow": 29} +{"Format": "IDEA0", "ID": "99c1b308-acf9-4b8c-9050-59df561c3803", "DetectTime": "2024-05-21T12:27:02.145702+00:00", "EventTime": "2024-05-21T12:27:02.145724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvpehF3o4JiVdfiB63"], "accumulated_threat_level": 1.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "9f87b419-079f-4940-9985-3aa96407ced1", "DetectTime": "2024-05-21T12:27:02.159797+00:00", "EventTime": "2024-05-21T12:27:02.159814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZR2K0TWrjv3dfbb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 29} +{"Format": "IDEA0", "ID": "00588f30-1072-47ee-94ea-e5d258df2ec3", "DetectTime": "2024-05-21T12:27:02.215493+00:00", "EventTime": "2024-05-21T12:27:02.215519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosKuj3Wywpb5iukaa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "efdde890-282c-4112-8154-fa4211ea0435", "DetectTime": "2024-05-21T12:27:02.410463+00:00", "EventTime": "2024-05-21T12:27:02.410484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiT2NQ1wJpmtvUu5Be"], "accumulated_threat_level": 3.2, "timewindow": 29} +{"Format": "IDEA0", "ID": "02288d8c-57cc-439f-bc53-20e4d37b3a94", "DetectTime": "2024-05-21T12:27:02.437729+00:00", "EventTime": "2024-05-21T12:27:02.437750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJTlb3NXrEw6JC8z1"], "accumulated_threat_level": 4.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "4ae26517-a7b1-4507-9003-cfb81617b1e9", "DetectTime": "2024-05-21T12:27:02.500985+00:00", "EventTime": "2024-05-21T12:27:02.501003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpkmcJ1bo8uLsTpfg5"], "accumulated_threat_level": 4.8, "timewindow": 29} +{"Format": "IDEA0", "ID": "f6111b9a-9169-4050-89be-7614998dbd7c", "DetectTime": "2024-05-21T12:27:02.539327+00:00", "EventTime": "2024-05-21T12:27:02.539347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUNfm2IRx4BB7osf9"], "accumulated_threat_level": 5.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "711db0b0-5db5-4bef-8759-f6dfbb56f4af", "DetectTime": "2024-05-21T12:27:02.603983+00:00", "EventTime": "2024-05-21T12:27:02.604003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ZVho1rhXfLf0zH6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 29} +{"Format": "IDEA0", "ID": "786b14d1-a391-4dc6-9058-f02eb39ac534", "DetectTime": "2024-05-21T12:27:02.630434+00:00", "EventTime": "2024-05-21T12:27:02.630456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyRyvLV8IaNiFdT"], "accumulated_threat_level": 7.199999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "e07e2bd3-8aab-4504-aa52-7ea128d4f938", "DetectTime": "2024-05-21T12:27:02.654826+00:00", "EventTime": "2024-05-21T12:27:02.654848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.75.11.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0npw2u91g1JiHP52"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "98a86d23-aff5-4de1-8155-703c1ddf16fb", "DetectTime": "2024-05-21T12:27:02.967841+00:00", "EventTime": "2024-05-21T12:27:02.967862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.208.123.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgMsW21Jok2CzxJNkh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "51851774-0e27-484f-ab2e-ca096ca51262", "DetectTime": "2024-05-21T12:27:02.997362+00:00", "EventTime": "2024-05-21T12:27:02.997382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAqWdm138jKU5ssQq2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "da2cfab7-d876-4045-b764-9a72597ad0cc", "DetectTime": "2024-05-21T12:27:03.024081+00:00", "EventTime": "2024-05-21T12:27:03.024099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClaKJA3ypVipx0zTyg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "e21cc103-ae56-4170-bbfd-f76299d5a047", "DetectTime": "2024-05-21T12:27:03.063900+00:00", "EventTime": "2024-05-21T12:27:03.063921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.222.140"]}], "Attach": [{"Content": "Connection to unknown destination port 8632/UDP destination IP 190.222.222.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9UdpBFSkXJov1lf"], "accumulated_threat_level": 9.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "b725dfc8-390d-478e-bb7e-5394831ecb3c", "DetectTime": "2024-05-21T12:27:03.285975+00:00", "EventTime": "2024-05-21T12:27:03.285994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZJoU2CZUX6C121Fh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "1d2b0158-9ac0-4a35-a0c8-6fda7a998de8", "DetectTime": "2024-05-21T12:27:03.342320+00:00", "EventTime": "2024-05-21T12:27:03.342339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0bgK71RtqlnINif09"], "accumulated_threat_level": 10.4, "timewindow": 29} +{"Format": "IDEA0", "ID": "99626422-43a5-42b4-8163-34bb4a9070f9", "DetectTime": "2024-05-21T12:27:03.387713+00:00", "EventTime": "2024-05-21T12:27:03.387733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.242.78.118 AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtOjm2vxujrdYsrvb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "2cbebfb2-26ad-41ed-af85-5896a774fde2", "DetectTime": "2024-05-21T12:27:03.461836+00:00", "EventTime": "2024-05-21T12:27:03.461855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAUwF2aeVDp7ljsi3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "1f3a40cc-992a-4adc-89c8-beb3341014f3", "DetectTime": "2024-05-21T12:27:03.514140+00:00", "EventTime": "2024-05-21T12:27:03.514159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgJoI3YD5pXkTjej"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "1e8ac2ae-ae6e-42fa-88ca-81b366e3658e", "DetectTime": "2024-05-21T12:27:03.519450+00:00", "EventTime": "2024-05-21T12:27:03.519469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK89TpZrX69K0cfCa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "96fe4886-24e2-44f0-81ca-ad40aef06134", "DetectTime": "2024-05-21T12:27:03.523970+00:00", "EventTime": "2024-05-21T12:27:03.523989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUId5H2AhusLn5Mfe9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "5d8277ef-70d0-419c-85bf-aef70e209094", "DetectTime": "2024-05-21T12:27:03.571675+00:00", "EventTime": "2024-05-21T12:27:03.571695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOkk24hHwgbqi6fxd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "b2d47354-d30b-49ca-b161-c5baa3d3cfcc", "DetectTime": "2024-05-21T12:27:03.580230+00:00", "EventTime": "2024-05-21T12:27:03.580248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEnVdv5QvNngKSL8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "79b10419-8f10-42bb-81d5-73381ba53ca9", "DetectTime": "2024-05-21T12:27:03.611796+00:00", "EventTime": "2024-05-21T12:27:03.611813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VMaC3fFmr63G4mYi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 29} +{"Format": "Json", "ID": "79b10419-8f10-42bb-81d5-73381ba53ca9", "DetectTime": "2024-05-21T12:27:03.611796+00:00", "EventTime": "2024-05-21T12:27:03.611813+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-02T04:11:55.960510+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2024/05/21 12:27:03.761419)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 29, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b6930448-07f2-427c-8dba-9e3eaab80821", "DetectTime": "2024-05-21T12:27:03.765876+00:00", "EventTime": "2024-05-21T12:27:03.765899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsTYg47h14z1njjq3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "16b0dc85-e353-4ee6-8409-c5ffe6660af9", "DetectTime": "2024-05-21T12:27:03.770878+00:00", "EventTime": "2024-05-21T12:27:03.770900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG1FQq48TUVUjMIQtj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "edeeabf3-3f13-4f5a-b5a4-0ce0c75d0825", "DetectTime": "2024-05-21T12:27:03.775747+00:00", "EventTime": "2024-05-21T12:27:03.775765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA52ty0LUgYKvJXvk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "2fb8ff5f-f359-4024-9e84-9a895303b15c", "DetectTime": "2024-05-21T12:27:03.786576+00:00", "EventTime": "2024-05-21T12:27:03.786594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLkZDWXoJSNSSth5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "16112873-35cc-40e8-ba1d-165936bdf565", "DetectTime": "2024-05-21T12:27:03.791651+00:00", "EventTime": "2024-05-21T12:27:03.791671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT3wf44RfAcaJCe9Z1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "75a9c7e5-6f3d-4f23-ad15-73765249c0f0", "DetectTime": "2024-05-21T12:27:03.795974+00:00", "EventTime": "2024-05-21T12:27:03.795991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAfmt3z3HM0AJcEOe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "f194e6a4-e1c1-453e-900e-e7a5d169f51c", "DetectTime": "2024-05-21T12:27:03.985808+00:00", "EventTime": "2024-05-21T12:27:03.985829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nBEW2OnplzoK5be6", "CL5QmQ2q25Zyej7KXf", "CxtfbV3yPN5i2QHoO9", "CpQjignleExjliOVb"], "accumulated_threat_level": 0.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "fe26e2a7-4bf0-4bd5-aa0f-572dd2b63a5c", "DetectTime": "2024-05-21T12:27:04.014795+00:00", "EventTime": "2024-05-21T12:27:04.014817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ltb81r5njRWNumk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "a876aeb8-d6fc-4237-9607-e7caae408b7f", "DetectTime": "2024-05-21T12:27:04.050526+00:00", "EventTime": "2024-05-21T12:27:04.050548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSavWE4ydIW34Ku9Fl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "7799c653-8c64-4758-a0de-ca94169de56f", "DetectTime": "2024-05-21T12:27:04.076376+00:00", "EventTime": "2024-05-21T12:27:04.076398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYk1Vw45L2SGOx1tR5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "f9df27c2-a2f9-42ba-afca-c2400d29fd74", "DetectTime": "2024-05-21T12:27:04.111325+00:00", "EventTime": "2024-05-21T12:27:04.111343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdkwV3A0OBQUbWr37"], "accumulated_threat_level": 1.3, "timewindow": 29} +{"Format": "IDEA0", "ID": "63a4d064-aa3e-48c8-a126-da80408a9b66", "DetectTime": "2024-05-21T12:27:04.121771+00:00", "EventTime": "2024-05-21T12:27:04.121794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rcP623RP6TNbTMOj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "000de102-83c6-41c4-b47a-513e9acdcb30", "DetectTime": "2024-05-21T12:27:04.156482+00:00", "EventTime": "2024-05-21T12:27:04.156500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW274c2swaZKAmEcic"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "f928a91d-0487-42a2-be7d-503c465b716d", "DetectTime": "2024-05-21T12:27:04.180138+00:00", "EventTime": "2024-05-21T12:27:04.180159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHM1Hg1kcn9e4a6nvj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "fec8d12f-cb8f-41fc-8714-613542c3c088", "DetectTime": "2024-05-21T12:27:04.200198+00:00", "EventTime": "2024-05-21T12:27:04.200215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefQPk39Pgi371YRZb"], "accumulated_threat_level": 2.1, "timewindow": 29} +{"Format": "IDEA0", "ID": "d49f59d1-8efe-41bf-a0ea-16626d692022", "DetectTime": "2024-05-21T12:27:04.215201+00:00", "EventTime": "2024-05-21T12:27:04.215221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwdsT2U2LrawdxzC7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "cef4a330-3eff-47c7-9e76-fce6a8b987ab", "DetectTime": "2024-05-21T12:27:04.244415+00:00", "EventTime": "2024-05-21T12:27:04.244438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPFah1xFlrirpnVk1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "a6a9caf6-4a82-4679-88a0-d4524b0c5cac", "DetectTime": "2024-05-21T12:27:04.265985+00:00", "EventTime": "2024-05-21T12:27:04.266004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4SsvE3sL3aIYXKCT8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "5ba3dce0-a8e3-49ef-a272-1e6cf01c1cc8", "DetectTime": "2024-05-21T12:27:04.289218+00:00", "EventTime": "2024-05-21T12:27:04.289240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.199.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnc0Ni8VJr7P0vuH9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ada9e20e-4c68-492a-86e4-4196e34df9b2", "DetectTime": "2024-05-21T12:27:04.441301+00:00", "EventTime": "2024-05-21T12:27:04.441322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.217.72.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64LFQ1G8lHl2ECLIh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "edfb6bf4-928e-4ee2-a700-9db1790e6553", "DetectTime": "2024-05-21T12:27:04.476387+00:00", "EventTime": "2024-05-21T12:27:04.476408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.103.110.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50b7T38pxPaCDeSI"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d4c31131-0caa-4eaa-a550-0ab2d7bc2c40", "DetectTime": "2024-05-21T12:27:04.516277+00:00", "EventTime": "2024-05-21T12:27:04.516300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.117.66.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziKcn1het86HdtKNg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "57c165bd-e416-45a5-bd2c-946a28a3f1ef", "DetectTime": "2024-05-21T12:27:04.543994+00:00", "EventTime": "2024-05-21T12:27:04.544013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBW9YI2lXHtIgByEH5"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 29} +{"Format": "IDEA0", "ID": "b7ab7c4d-c3bf-4a51-9568-d0d554c94017", "DetectTime": "2024-05-21T12:27:04.549118+00:00", "EventTime": "2024-05-21T12:27:04.549137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 198.2.5.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLdNez2D1BTxLN5SK3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "39c1364c-19f2-489b-85c8-d4fd014decf4", "DetectTime": "2024-05-21T12:27:04.607995+00:00", "EventTime": "2024-05-21T12:27:04.608015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhaAl1RxOyHipvoY4"], "accumulated_threat_level": 3.7, "timewindow": 29} +{"Format": "IDEA0", "ID": "07636b7b-23c8-4fdd-986d-be84d215d906", "DetectTime": "2024-05-21T12:27:04.637036+00:00", "EventTime": "2024-05-21T12:27:04.637057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsXff1A4i32WhMMmd"], "accumulated_threat_level": 4.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "ef3a3132-2a3d-45ff-8605-939ddf90b68f", "DetectTime": "2024-05-21T12:27:04.653403+00:00", "EventTime": "2024-05-21T12:27:04.653424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.156.122.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwYCV2NiH9oPI03Aa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "5bb1917d-b231-433c-a1a3-26e62ac34845", "DetectTime": "2024-05-21T12:27:04.683147+00:00", "EventTime": "2024-05-21T12:27:04.683170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "Connection to unknown destination port 5220/UDP destination IP 201.102.120.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcz1V12DuDSmFWlyl"], "accumulated_threat_level": 5.3, "timewindow": 29} +{"Format": "IDEA0", "ID": "13f544e4-0209-4d1b-b3c3-2388c9f69937", "DetectTime": "2024-05-21T12:27:04.688353+00:00", "EventTime": "2024-05-21T12:27:04.688371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.235.76.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboBPd3kvazKleonZb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d422dee6-825b-4120-8312-adb64123bb3b", "DetectTime": "2024-05-21T12:27:04.713626+00:00", "EventTime": "2024-05-21T12:27:04.713646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.147.182.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq3Wm1opQpWf4UWe7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "f4575c25-ea70-45f5-b879-0b5d31e8b630", "DetectTime": "2024-05-21T12:27:04.736101+00:00", "EventTime": "2024-05-21T12:27:04.736123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoeiJu1vLQyZcHz9B5"], "accumulated_threat_level": 6.1, "timewindow": 29} +{"Format": "IDEA0", "ID": "624e1b7b-e00e-401c-b2d1-088784f7e239", "DetectTime": "2024-05-21T12:27:04.763954+00:00", "EventTime": "2024-05-21T12:27:04.763975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGya8O3cDmHzg9fSB2"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 29} +{"Format": "IDEA0", "ID": "cdcad46a-9df3-479b-a584-1db97a4b5c87", "DetectTime": "2024-05-21T12:27:04.804011+00:00", "EventTime": "2024-05-21T12:27:04.804034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.232.5.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ4UmecAV4WuTTQh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d2572e80-65d4-4534-bb1e-e73858b3f8ae", "DetectTime": "2024-05-21T12:27:04.829122+00:00", "EventTime": "2024-05-21T12:27:04.829146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 166.102.225.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClNS2Y3Pmb6AejlsP4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "8b2b6da7-86ec-4cc4-92b6-429d06828972", "DetectTime": "2024-05-21T12:27:04.853691+00:00", "EventTime": "2024-05-21T12:27:04.853715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.46.210.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUGsqJD36OOtjZTd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "4100ff8e-e95f-4884-8872-7a5292e0cee5", "DetectTime": "2024-05-21T12:27:04.938290+00:00", "EventTime": "2024-05-21T12:27:04.938311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiBAXv3R9dDnzE4uRd"], "accumulated_threat_level": 7.699999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "637934b2-1673-4025-b4ea-bcf9e2f19908", "DetectTime": "2024-05-21T12:27:04.956931+00:00", "EventTime": "2024-05-21T12:27:04.956952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.37.188.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU0ps18A3ZHEyoRb8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "2bea8ed0-f126-4c61-84c2-cd35b64a7502", "DetectTime": "2024-05-21T12:27:05.248009+00:00", "EventTime": "2024-05-21T12:27:05.248035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWf6F4ECfrb09k636"], "accumulated_threat_level": 8.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "082853e7-2a78-4f9d-8cd4-b1cafc20379d", "DetectTime": "2024-05-21T12:27:05.273756+00:00", "EventTime": "2024-05-21T12:27:05.273776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.43.222.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSs3n53duICC82bdy3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ad123fc3-761c-4260-a40e-7de59f4a030d", "DetectTime": "2024-05-21T12:27:05.278427+00:00", "EventTime": "2024-05-21T12:27:05.278446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.195.58.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuoHg3jqZ7ugdvcGe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "fb2745f5-a3c7-487e-828f-0aceb6aaa28c", "DetectTime": "2024-05-21T12:27:05.283122+00:00", "EventTime": "2024-05-21T12:27:05.283141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.248.68.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgWXA1LygpjhcHB7a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "8bd63286-cf1e-48df-aa0e-5313f2b616c0", "DetectTime": "2024-05-21T12:27:05.288922+00:00", "EventTime": "2024-05-21T12:27:05.288939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.113.108.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNmf54jZlgFnHkxDf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d2d06df5-e22c-4948-84af-f7777d4b1976", "DetectTime": "2024-05-21T12:27:05.303045+00:00", "EventTime": "2024-05-21T12:27:05.303067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.178.233.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhQJo1JaYjwJfsmA"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "322c607d-1eb2-46a5-8f16-6c3aabcc9b4d", "DetectTime": "2024-05-21T12:27:05.365308+00:00", "EventTime": "2024-05-21T12:27:05.365328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVyck1QGbIcMb4Dxh"], "accumulated_threat_level": 9.3, "timewindow": 29} +{"Format": "IDEA0", "ID": "82e899ec-d133-4aa0-acc8-058de22e7108", "DetectTime": "2024-05-21T12:27:05.369983+00:00", "EventTime": "2024-05-21T12:27:05.370001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.232.9.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bfK64sroUrbPlxV5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "821d64b4-bbb1-4902-becb-31b1ab508fab", "DetectTime": "2024-05-21T12:27:05.404025+00:00", "EventTime": "2024-05-21T12:27:05.404044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.138.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0aGQO2XyGDvregcbb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "1d38fb9c-7f9e-4b61-8de7-0cc36c2b3771", "DetectTime": "2024-05-21T12:27:05.408539+00:00", "EventTime": "2024-05-21T12:27:05.408557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtwbf2YNyy4VXrvs8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "0252f5b6-86a3-4f6d-8f61-a4e4b59235bd", "DetectTime": "2024-05-21T12:27:05.438262+00:00", "EventTime": "2024-05-21T12:27:05.438283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COqjkq2jlkcrnKSX5g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ece2de5d-9030-4210-8fa3-670396486de6", "DetectTime": "2024-05-21T12:27:05.467955+00:00", "EventTime": "2024-05-21T12:27:05.467975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFEt9tRz18TRysZa"], "accumulated_threat_level": 10.100000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "33394237-c01a-46fc-830a-35add120726a", "DetectTime": "2024-05-21T12:27:05.472841+00:00", "EventTime": "2024-05-21T12:27:05.472860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.136.52.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxlSM0263apzfVZpd1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "2017e50d-0130-4d09-82f4-95d3aedf798d", "DetectTime": "2024-05-21T12:27:05.490157+00:00", "EventTime": "2024-05-21T12:27:05.490179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.33.151.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKpMA3c0En0HD8YR7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "c274d5eb-a990-4d0c-9919-6a05dd55a663", "DetectTime": "2024-05-21T12:27:05.530426+00:00", "EventTime": "2024-05-21T12:27:05.530444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQGWncPGu7UO5Cve"], "accumulated_threat_level": 10.900000000000002, "timewindow": 29} +{"Format": "IDEA0", "ID": "c1a57f85-ae0a-4448-b378-b0e494fce1a7", "DetectTime": "2024-05-21T12:27:05.551387+00:00", "EventTime": "2024-05-21T12:27:05.551409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNyDo52Hsq5vJudCO2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 29} +{"Format": "IDEA0", "ID": "4d02c002-c72d-400f-b1f8-31c3119a463a", "DetectTime": "2024-05-21T12:27:05.581835+00:00", "EventTime": "2024-05-21T12:27:05.581855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszyXQ1ZaDEox5Fite"], "accumulated_threat_level": 12.500000000000004, "timewindow": 29} +{"Format": "Json", "ID": "4d02c002-c72d-400f-b1f8-31c3119a463a", "DetectTime": "2024-05-21T12:27:05.581835+00:00", "EventTime": "2024-05-21T12:27:05.581855+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "1970-01-02T04:41:44.943033+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2024/05/21 12:27:05.806980)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 29, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "75a403d0-82dd-4446-aca6-1d5aad2330f7", "DetectTime": "2024-05-21T12:27:05.811384+00:00", "EventTime": "2024-05-21T12:27:05.811402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.56.118.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPSxXYKhSK7DjXu9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "90b6947f-4d7b-4644-a37d-98d8990c43ee", "DetectTime": "2024-05-21T12:27:05.815800+00:00", "EventTime": "2024-05-21T12:27:05.815817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.104.81.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbgJW1bV2f0xqN7Aj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "26ccde0c-bb7f-40be-bf1d-aeabe15d9fa8", "DetectTime": "2024-05-21T12:27:05.851880+00:00", "EventTime": "2024-05-21T12:27:05.851900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmi5vX23ihvDRgjPyi"], "accumulated_threat_level": 0.8, "timewindow": 29} +{"Format": "IDEA0", "ID": "111fe0b3-8ede-43d7-946a-74eab6984540", "DetectTime": "2024-05-21T12:27:05.862769+00:00", "EventTime": "2024-05-21T12:27:05.862788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEmjNv4UN3ANAonSLb"], "accumulated_threat_level": 1.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "0fd2a025-70d9-4823-83da-d24974164ec3", "DetectTime": "2024-05-21T12:27:05.867293+00:00", "EventTime": "2024-05-21T12:27:05.867311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleEkr3zIvyTfKif1a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "f3d133f5-934f-478d-b3e2-8c89a8a9b855", "DetectTime": "2024-05-21T12:27:05.871825+00:00", "EventTime": "2024-05-21T12:27:05.871843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.69.138.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3GRnK363JE5O1H5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "9b0c559c-fab1-4efb-8a57-05bfe6b0a7e0", "DetectTime": "2024-05-21T12:27:05.881851+00:00", "EventTime": "2024-05-21T12:27:05.881870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPw9Ay23aOSCmHNLWa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 29} +{"Format": "IDEA0", "ID": "b029e5d6-2b4c-4b47-a500-0ab8fb0a4736", "DetectTime": "2024-05-21T12:27:05.897944+00:00", "EventTime": "2024-05-21T12:27:05.897963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxDqe53AwqydcdvzW9"], "accumulated_threat_level": 3.2, "timewindow": 29} +{"Format": "IDEA0", "ID": "816521b2-ab40-48f3-befe-834f882c9261", "DetectTime": "2024-05-21T12:27:05.902393+00:00", "EventTime": "2024-05-21T12:27:05.902434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.92.142.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbDNg1lpa6GKFuUJg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "f7176ae4-d139-4f26-9105-75931a377f75", "DetectTime": "2024-05-21T12:27:05.913575+00:00", "EventTime": "2024-05-21T12:27:05.913596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0DCxJkklENRyWOca"], "accumulated_threat_level": 4.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "ce500cc8-0a81-4fd3-a200-5c3a67832d66", "DetectTime": "2024-05-21T12:27:05.923137+00:00", "EventTime": "2024-05-21T12:27:05.923155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cql3ON1TB2gGxukYBa"], "accumulated_threat_level": 4.8, "timewindow": 29} +{"Format": "IDEA0", "ID": "0cfaf453-9675-47ab-ac27-9569299cd9bd", "DetectTime": "2024-05-21T12:27:05.933506+00:00", "EventTime": "2024-05-21T12:27:05.933525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrXru1NcT402zUrWl"], "accumulated_threat_level": 5.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "1aa6738d-5aee-481a-a9b7-f4f77580adbd", "DetectTime": "2024-05-21T12:27:05.937836+00:00", "EventTime": "2024-05-21T12:27:05.937854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.80.15.32 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJKyJ2e9c9yueaePd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "e1083324-5dcf-4b4d-897c-50c221f8ea1a", "DetectTime": "2024-05-21T12:27:05.947743+00:00", "EventTime": "2024-05-21T12:27:05.947760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GLvk4u3mchcnZ4Sf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 29} +{"Format": "IDEA0", "ID": "676e0f0d-2816-4b59-8efd-5bd8aab2d23c", "DetectTime": "2024-05-21T12:27:05.957195+00:00", "EventTime": "2024-05-21T12:27:05.957213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "Connection to unknown destination port 4931/UDP destination IP 221.127.137.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ced60t4zOgtI6pobVg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "91d37bab-78ca-499c-9355-d4485c8167e6", "DetectTime": "2024-05-21T12:27:05.967374+00:00", "EventTime": "2024-05-21T12:27:05.967399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYJDwvvn9oUGbyv7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "fad337a1-28d7-4441-8a41-ec3fbb701bbf", "DetectTime": "2024-05-21T12:27:05.991062+00:00", "EventTime": "2024-05-21T12:27:05.991081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct3mPy1mykqO3Ru6dl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 29} +{"Format": "IDEA0", "ID": "5f4ccc11-9418-4e1c-9535-bfb085334c6a", "DetectTime": "2024-05-21T12:27:06.006758+00:00", "EventTime": "2024-05-21T12:27:06.006778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwZw7ykDB2rJLKZ3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "9278d43f-ed4d-48f8-9502-f63bda0a7a5d", "DetectTime": "2024-05-21T12:27:06.031846+00:00", "EventTime": "2024-05-21T12:27:06.031869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYPzZ2Br6OtsZ4nK9"], "accumulated_threat_level": 9.6, "timewindow": 29} +{"Format": "IDEA0", "ID": "d86f7aa1-53a7-46e5-b0f5-aa03cc59132d", "DetectTime": "2024-05-21T12:27:06.058912+00:00", "EventTime": "2024-05-21T12:27:06.058931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32uKc2fSt9ZgRwpHg"], "accumulated_threat_level": 10.4, "timewindow": 29} +{"Format": "IDEA0", "ID": "185c7a59-f020-46d8-a418-4af6238731e6", "DetectTime": "2024-05-21T12:27:06.086792+00:00", "EventTime": "2024-05-21T12:27:06.086813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdcc63QzvYp98Qv8e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "26bc3a70-d948-498c-a1b0-db875c7f76b2", "DetectTime": "2024-05-21T12:27:06.106234+00:00", "EventTime": "2024-05-21T12:27:06.106255+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5kbR1oHMKVSJglv5"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "38156904-a55e-484d-8c9f-bff9709416de", "DetectTime": "2024-05-21T12:27:06.132971+00:00", "EventTime": "2024-05-21T12:27:06.132989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZD2l3b7Wse5yfBI8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "d8b486ae-63ca-444f-8946-de9b14523725", "DetectTime": "2024-05-21T12:27:06.137434+00:00", "EventTime": "2024-05-21T12:27:06.137452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.191.232.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch0uJk4oR6YiYPxpie"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "3fdb913d-3656-48d9-9473-bbfab863367c", "DetectTime": "2024-05-21T12:27:06.165535+00:00", "EventTime": "2024-05-21T12:27:06.165556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.198.175.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQMI2Tcvhy8tHUda"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "75235f2c-0350-4486-89ea-a9098ce3a8fb", "DetectTime": "2024-05-21T12:27:06.196683+00:00", "EventTime": "2024-05-21T12:27:06.196706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.104.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRUNc4WpgOFa7w9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "1a038458-b23f-4175-bd73-531b72e38e75", "DetectTime": "2024-05-21T12:27:06.222141+00:00", "EventTime": "2024-05-21T12:27:06.222161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.106.107.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPuNcZ42pgmDkjtc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "4478db65-181e-4f84-bcfa-2e9833b68617", "DetectTime": "2024-05-21T12:27:06.244207+00:00", "EventTime": "2024-05-21T12:27:06.244226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.25.211.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2MsQ1iCgPAvai9V4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "832422e6-4a53-445a-8a7c-45325a2631a0", "DetectTime": "2024-05-21T12:27:06.276303+00:00", "EventTime": "2024-05-21T12:27:06.276323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.154.84.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4M0b4esTKrhJjN9c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "201f9c78-ae68-425b-9186-9242bf1c34c3", "DetectTime": "2024-05-21T12:27:06.291024+00:00", "EventTime": "2024-05-21T12:27:06.291045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.97.35.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmjuP2BQCVCEvLI27"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "6b6f9fd2-d28a-4dac-9c41-47dc27ff60d6", "DetectTime": "2024-05-21T12:27:06.330422+00:00", "EventTime": "2024-05-21T12:27:06.330446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoTUKp3Pc0o3QfGjb8"], "accumulated_threat_level": 0.8, "timewindow": 30} +{"Format": "IDEA0", "ID": "94f70c60-a187-4f0e-8e48-5652d437f304", "DetectTime": "2024-05-21T12:27:06.570071+00:00", "EventTime": "2024-05-21T12:27:06.570092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT9Aa3F8YrIpM3IA8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ad899b4d-9f37-4a83-a88e-225fb80f1d37", "DetectTime": "2024-05-21T12:27:06.575071+00:00", "EventTime": "2024-05-21T12:27:06.575089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.131.39.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vn78JpSczENdfd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "8d0e6f35-865e-4339-9f33-cc814be80345", "DetectTime": "2024-05-21T12:27:06.651724+00:00", "EventTime": "2024-05-21T12:27:06.651745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.42.171.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKKouBmw4XG4I25r"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "72498d14-f9e4-4087-a3ce-39501227d9c7", "DetectTime": "2024-05-21T12:27:06.677929+00:00", "EventTime": "2024-05-21T12:27:06.677949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.142.148.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8GjF32sto3uKE1Qk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d44bc753-d0d7-4451-86e7-beb3703f47fe", "DetectTime": "2024-05-21T12:27:06.724958+00:00", "EventTime": "2024-05-21T12:27:06.724978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.222.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDKjZO2NDvyeJF8UH"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "64f54891-59bd-4273-93cf-baa85c0d2e43", "DetectTime": "2024-05-21T12:27:06.746273+00:00", "EventTime": "2024-05-21T12:27:06.746293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.81.12.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3MH1ZvU2Ghe0Gzf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "12fc2493-a040-4f17-85b4-65f975d9f2a7", "DetectTime": "2024-05-21T12:27:06.751035+00:00", "EventTime": "2024-05-21T12:27:06.751052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0px44A9aWzu2wnT7", "Ct3fwZ1IGjCMH19qo6", "CINwn01pXklqsDUDzf", "Ci6YhK2cJi1zvKoUh4"], "accumulated_threat_level": 1.3, "timewindow": 30} +{"Format": "IDEA0", "ID": "8b930f2e-ed4e-4e32-89ec-bbc7c5553bd4", "DetectTime": "2024-05-21T12:27:06.770861+00:00", "EventTime": "2024-05-21T12:27:06.770884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.104.67.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjELyx1iNTycEltwwe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ee6c34ef-6742-4bd5-99bc-ade73e935331", "DetectTime": "2024-05-21T12:27:06.792486+00:00", "EventTime": "2024-05-21T12:27:06.792511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.0.20.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLU5mi1YWVcE6PMyZ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "5128c25c-8e93-4e51-903a-692758b54fb5", "DetectTime": "2024-05-21T12:27:06.826352+00:00", "EventTime": "2024-05-21T12:27:06.826375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJEBI3bZ7tGaw20g5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "788333b3-aa90-4c8c-bd26-923e6e6b8f48", "DetectTime": "2024-05-21T12:27:06.864028+00:00", "EventTime": "2024-05-21T12:27:06.864050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaxnZg2i4XP98Nqwth"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "7b973c78-c51b-4155-9a49-ad8148dd5966", "DetectTime": "2024-05-21T12:27:06.893630+00:00", "EventTime": "2024-05-21T12:27:06.893651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.227.151.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVrGl1wmRVst5F6hd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d3404d14-603d-4ff7-8aaf-986caf3c4c77", "DetectTime": "2024-05-21T12:27:06.910736+00:00", "EventTime": "2024-05-21T12:27:06.910754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISADu16pGppmbL3qi"], "accumulated_threat_level": 2.1, "timewindow": 30} +{"Format": "IDEA0", "ID": "199078c2-9f7d-4dc0-81ac-f6b4cad0c392", "DetectTime": "2024-05-21T12:27:06.936664+00:00", "EventTime": "2024-05-21T12:27:06.936684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.138.187.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czhgbc2fM6YyHEDbHk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "4f981b5e-8e93-4ea5-8390-dec7758cb33e", "DetectTime": "2024-05-21T12:27:06.958813+00:00", "EventTime": "2024-05-21T12:27:06.958836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.8.2.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb94stB9yoOHqm4S4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "d9a2261b-6089-4273-ae95-5c6ebbd2e9c0", "DetectTime": "2024-05-21T12:27:06.963792+00:00", "EventTime": "2024-05-21T12:27:06.963812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmM43tQlxJdgHq73"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "9ab6a282-2dc5-40f4-a418-89c688670ed6", "DetectTime": "2024-05-21T12:27:07.009533+00:00", "EventTime": "2024-05-21T12:27:07.009554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.233.116.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv5cBR1n4ZCNN6Xqs8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "49d16a88-2637-4804-b85f-ceda379d0d04", "DetectTime": "2024-05-21T12:27:07.035498+00:00", "EventTime": "2024-05-21T12:27:07.035519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.200.130.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9yJYJ3nNhB19qPav3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "0c72aa5f-b3da-4f08-b9e0-d067a7cb2a85", "DetectTime": "2024-05-21T12:27:07.068535+00:00", "EventTime": "2024-05-21T12:27:07.068557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.176.133.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYACk479e1eHLVlUh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "871f0983-3a7e-4044-b0a2-69932ace0d8e", "DetectTime": "2024-05-21T12:27:07.096462+00:00", "EventTime": "2024-05-21T12:27:07.096481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvxYE2f9y2PIIntm2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 30} +{"Format": "IDEA0", "ID": "c4f4eadc-bfe2-4df2-93c7-cad5679627a0", "DetectTime": "2024-05-21T12:27:07.135535+00:00", "EventTime": "2024-05-21T12:27:07.135554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSEhGr15kWyK7HXVh4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "e4885853-2177-4a19-bd06-24ee91775085", "DetectTime": "2024-05-21T12:27:07.156860+00:00", "EventTime": "2024-05-21T12:27:07.156880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.245.135.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWzMV1fKz3npai2ze"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "483159b1-e466-4f1c-9797-bedfe6f26475", "DetectTime": "2024-05-21T12:27:07.342084+00:00", "EventTime": "2024-05-21T12:27:07.342104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2cLK1DFoiCbcoV3j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 27} +{"Format": "IDEA0", "ID": "ee03681f-c80c-472b-9769-c0dd52ec9b8d", "DetectTime": "2024-05-21T12:27:07.394372+00:00", "EventTime": "2024-05-21T12:27:07.394393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0eIl4HUrpzx34dD4"], "accumulated_threat_level": 3.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "3863d357-25d6-4e31-a71d-f6b2ff033709", "DetectTime": "2024-05-21T12:27:07.421608+00:00", "EventTime": "2024-05-21T12:27:07.421627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2mUzS15h0iXAErkHe"], "accumulated_threat_level": 4.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "8e81109d-4e89-4e23-b825-68e7f93cde69", "DetectTime": "2024-05-21T12:27:07.460294+00:00", "EventTime": "2024-05-21T12:27:07.460314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3cjo3hQTGlXu2DIa"], "accumulated_threat_level": 5.3, "timewindow": 30} +{"Format": "IDEA0", "ID": "cfc436f7-5bdc-4490-abb8-3d480f53c41e", "DetectTime": "2024-05-21T12:27:07.488390+00:00", "EventTime": "2024-05-21T12:27:07.488408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuDaAkhKRLDzrHN3"], "accumulated_threat_level": 6.1, "timewindow": 30} +{"Format": "IDEA0", "ID": "53bd3474-2fc4-426e-8448-a9eea3c56c6b", "DetectTime": "2024-05-21T12:27:07.531211+00:00", "EventTime": "2024-05-21T12:27:07.531228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOeTR3nfvk1MgYwt"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 30} +{"Format": "IDEA0", "ID": "6dcc85e0-f3d4-40eb-8711-391898427de3", "DetectTime": "2024-05-21T12:27:07.884957+00:00", "EventTime": "2024-05-21T12:27:07.884974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZeLp34gtJUFjgsGf"], "accumulated_threat_level": 7.699999999999999, "timewindow": 30} +{"Format": "IDEA0", "ID": "c9b57e2d-3df7-4e61-bc75-87d8c4e1167c", "DetectTime": "2024-05-21T12:27:07.921998+00:00", "EventTime": "2024-05-21T12:27:07.922017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.121.50.50"]}], "Attach": [{"Content": "Connection to unknown destination port 8485/UDP destination IP 79.121.50.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHcNJ82kOwTRpn3tIe"], "accumulated_threat_level": 8.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "9e0e779b-310d-404c-a61d-4a171232eb1b", "DetectTime": "2024-05-21T12:27:07.949840+00:00", "EventTime": "2024-05-21T12:27:07.949856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9gkN2RY52OIJLo22"], "accumulated_threat_level": 9.3, "timewindow": 30} +{"Format": "IDEA0", "ID": "d2e9a2f6-6fa2-4d89-938c-770f267a836a", "DetectTime": "2024-05-21T12:27:07.966271+00:00", "EventTime": "2024-05-21T12:27:07.966292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.18.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nLUN3oGaV4wWyHC8"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "190ab08d-7ce1-46a7-b9fe-8d8db32c240c", "DetectTime": "2024-05-21T12:27:07.991278+00:00", "EventTime": "2024-05-21T12:27:07.991297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Q67j4gkiVfEHPZy6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 30} +{"Format": "IDEA0", "ID": "27858070-1e97-4dae-9e33-2274a3ad4581", "DetectTime": "2024-05-21T12:27:08.087496+00:00", "EventTime": "2024-05-21T12:27:08.087515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNgi42Xj6JdeS87kh"], "accumulated_threat_level": 10.900000000000002, "timewindow": 30} +{"Format": "IDEA0", "ID": "106c4e9f-43f6-4652-b379-9923813b3457", "DetectTime": "2024-05-21T12:27:08.095648+00:00", "EventTime": "2024-05-21T12:27:08.095666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJWdMnI3qXyWfvIRf"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "21956d77-fee7-4cef-98f2-e2f8f2a1cf7d", "DetectTime": "2024-05-21T12:27:08.100331+00:00", "EventTime": "2024-05-21T12:27:08.100349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7zC945MHcqIHcGI5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "27fe6bc5-35e4-41d5-97d4-a1cfb90b2281", "DetectTime": "2024-05-21T12:27:08.154360+00:00", "EventTime": "2024-05-21T12:27:08.154386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPakr4Fx5INm0ZiL8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 30} +{"Format": "IDEA0", "ID": "001ae362-91f0-474a-8703-75deb002dd92", "DetectTime": "2024-05-21T12:27:08.185109+00:00", "EventTime": "2024-05-21T12:27:08.185131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crr6xC4mazDMaKz15c"], "accumulated_threat_level": 12.500000000000004, "timewindow": 30} +{"Format": "Json", "ID": "001ae362-91f0-474a-8703-75deb002dd92", "DetectTime": "2024-05-21T12:27:08.185109+00:00", "EventTime": "2024-05-21T12:27:08.185131+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "1970-01-02T05:13:47.153482+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2024/05/21 12:27:08.402507)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 30, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "fedd6354-9ab3-4f75-830d-cc3c0390e42c", "DetectTime": "2024-05-21T12:27:08.413159+00:00", "EventTime": "2024-05-21T12:27:08.413177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COK2vF2eyJaI8Q0Dua"], "accumulated_threat_level": 0.8, "timewindow": 30} +{"Format": "IDEA0", "ID": "f9ae690f-e65a-4fa8-8dee-5ccf3e35042d", "DetectTime": "2024-05-21T12:27:08.423049+00:00", "EventTime": "2024-05-21T12:27:08.423067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1O0U3XeMRsuUFPH8"], "accumulated_threat_level": 1.6, "timewindow": 30} +{"Format": "IDEA0", "ID": "3bac3e66-c068-4cbc-b8cf-f74b6f305aaf", "DetectTime": "2024-05-21T12:27:08.434501+00:00", "EventTime": "2024-05-21T12:27:08.434524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrlwW12nlxnJ34SB0f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 30} +{"Format": "IDEA0", "ID": "2a4cc597-d09a-4fcf-9178-f865633c09a1", "DetectTime": "2024-05-21T12:27:08.468724+00:00", "EventTime": "2024-05-21T12:27:08.468744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVfqY16y91zXap4L2"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "ea06b2c1-c56a-4207-bdfa-419671c78bd4", "DetectTime": "2024-05-21T12:27:08.473776+00:00", "EventTime": "2024-05-21T12:27:08.473796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxquEx2tSEs9uhQpZd"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "27493a13-8ca6-4033-96a8-969b2ba6c8f1", "DetectTime": "2024-05-21T12:27:08.503541+00:00", "EventTime": "2024-05-21T12:27:08.503565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ6rMO2ntq9214eFV4"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "7aa786cc-79c6-4742-9b93-1ff461355b0d", "DetectTime": "2024-05-21T12:27:08.565286+00:00", "EventTime": "2024-05-21T12:27:08.565306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGsBzw45vuKuJpUCV1"], "accumulated_threat_level": 4.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "1842764e-68b8-4120-b3da-cd06d8b86936", "DetectTime": "2024-05-21T12:27:08.572729+00:00", "EventTime": "2024-05-21T12:27:08.572748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHZV18HoJ58TzWE1"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "1ff682b9-6c17-442d-b9c3-250c624c88a8", "DetectTime": "2024-05-21T12:27:08.819515+00:00", "EventTime": "2024-05-21T12:27:08.819537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnbDt3OsjyZvXYAS6"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "9c6302eb-7ac8-4edd-98c1-627409fc76d8", "DetectTime": "2024-05-21T12:27:08.880632+00:00", "EventTime": "2024-05-21T12:27:08.880651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBRMP29iugrOYNqd7"], "accumulated_threat_level": 4.8, "timewindow": 30} +{"Format": "IDEA0", "ID": "c41d4545-6438-475b-8109-12bbc96c5121", "DetectTime": "2024-05-21T12:27:08.908688+00:00", "EventTime": "2024-05-21T12:27:08.908716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyhhph1Xom67irSYb"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "2ab161f0-7c5d-4dbc-8bbb-d1f2a56e04f4", "DetectTime": "2024-05-21T12:27:08.921136+00:00", "EventTime": "2024-05-21T12:27:08.921156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnczhp4CCO6eEdpfXj"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "32cea062-9fb6-497f-a880-fc6674d2882d", "DetectTime": "2024-05-21T12:27:08.926704+00:00", "EventTime": "2024-05-21T12:27:08.926722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqiPJS2uoUUpi1Fu38"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "d63e3848-3d72-4efa-876e-af6060e492ef", "DetectTime": "2024-05-21T12:27:08.931764+00:00", "EventTime": "2024-05-21T12:27:08.931785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jc9m3bZuoUC5CFLl"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "fb2e0689-7469-44cf-998b-d87ddf8649d8", "DetectTime": "2024-05-21T12:27:08.936500+00:00", "EventTime": "2024-05-21T12:27:08.936519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKwcz36wsBW5Xzmse"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "18466c84-50e5-4334-93aa-e9f83f30c0aa", "DetectTime": "2024-05-21T12:27:08.940914+00:00", "EventTime": "2024-05-21T12:27:08.940933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64Imf3BoYRiDdin8f"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "e7afb410-ae31-4e36-93ca-d761f8b5f5c2", "DetectTime": "2024-05-21T12:27:08.953626+00:00", "EventTime": "2024-05-21T12:27:08.953646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWpSV74H8ZGFBewne4"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "86552d7c-0250-41be-9471-39a8b544527c", "DetectTime": "2024-05-21T12:27:09.029706+00:00", "EventTime": "2024-05-21T12:27:09.029728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4yzRloWYJJA2kTg"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "ea6b6c24-9713-4a2c-9b5b-a23256392fd3", "DetectTime": "2024-05-21T12:27:09.049034+00:00", "EventTime": "2024-05-21T12:27:09.049054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWWjzU2yHVrvEwhAP"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "4a634004-f2f4-4160-92e5-d28d96ef86b4", "DetectTime": "2024-05-21T12:27:09.053708+00:00", "EventTime": "2024-05-21T12:27:09.053729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXGrv1Ymx7XDbHpF3"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "ea5d6270-5dde-4c47-a1e4-f83dbefe4c29", "DetectTime": "2024-05-21T12:27:09.087360+00:00", "EventTime": "2024-05-21T12:27:09.087380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPs7GT18aMhkF4GoS2"], "accumulated_threat_level": 5.6, "timewindow": 30} +{"Format": "IDEA0", "ID": "e4d82a9f-4f2c-4ff8-b64f-154dd2f17a79", "DetectTime": "2024-05-21T12:27:09.114576+00:00", "EventTime": "2024-05-21T12:27:09.114593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBZQBIefyraHUsaa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 30} +{"Format": "IDEA0", "ID": "a24b7d15-a5bc-401c-a562-5c5be0ba4af8", "DetectTime": "2024-05-21T12:27:09.135556+00:00", "EventTime": "2024-05-21T12:27:09.135576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CePPUU3bFUMvlEdKdd"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "0b3e2da0-f1cb-4bda-bf16-8608fec65cb4", "DetectTime": "2024-05-21T12:27:09.166013+00:00", "EventTime": "2024-05-21T12:27:09.166035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25nBd21o4T4NwToJg"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "df09c698-cf48-463d-9d8d-0298f5682aea", "DetectTime": "2024-05-21T12:27:09.181124+00:00", "EventTime": "2024-05-21T12:27:09.181141+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRhqBjqCX12RGlyna"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "9ee345b2-223b-4090-ba61-c4ff99a96e60", "DetectTime": "2024-05-21T12:27:09.194023+00:00", "EventTime": "2024-05-21T12:27:09.194045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48HWF4iIHHlXPmyJd"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "3c4e7694-ff48-4ab2-88d3-fc232227f8bf", "DetectTime": "2024-05-21T12:27:09.219698+00:00", "EventTime": "2024-05-21T12:27:09.219717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch85Ap4DT9Io90LvPi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 30} +{"Format": "IDEA0", "ID": "f09d565e-2c84-4968-bc62-50a2ebdec6ca", "DetectTime": "2024-05-21T12:27:09.235576+00:00", "EventTime": "2024-05-21T12:27:09.235598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGN9FcAdjQp57K0gb"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "55d6646f-8a89-4c28-93d9-e0b3cb8f7873", "DetectTime": "2024-05-21T12:27:09.265714+00:00", "EventTime": "2024-05-21T12:27:09.265735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "Connection to unknown destination port 16086/UDP destination IP 190.40.169.168. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMf8p6182YjYNXb6r4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 30} +{"Format": "IDEA0", "ID": "ece3c55c-c2f3-46fd-8d69-8a040f0557d2", "DetectTime": "2024-05-21T12:27:09.278931+00:00", "EventTime": "2024-05-21T12:27:09.278949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.117.66.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTGlt1J817IjKNvW"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "db97316a-863a-421f-91f8-654fcc4fd05c", "DetectTime": "2024-05-21T12:27:09.353370+00:00", "EventTime": "2024-05-21T12:27:09.353387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9d5O27hlr7wfRwIg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 30} +{"Format": "IDEA0", "ID": "d5926e57-6a0f-440e-a7b6-9f1f4f50f09b", "DetectTime": "2024-05-21T12:27:09.386433+00:00", "EventTime": "2024-05-21T12:27:09.386454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.232.5.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKNEd349LLThRlSfg"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "7dc0ff64-30f7-4448-99b2-482c8d9396c1", "DetectTime": "2024-05-21T12:27:09.575577+00:00", "EventTime": "2024-05-21T12:27:09.575596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWujkc3UMHCqToq2j2", "CoX52q1BfTLFsoAiea", "CHwx0G36z7j6bL0Kae", "ChstYA1PaxUEYZeC9f"], "accumulated_threat_level": 9.299999999999999, "timewindow": 30} +{"Format": "IDEA0", "ID": "4dffc89d-385f-4db6-b113-c9b17b8faec3", "DetectTime": "2024-05-21T12:27:09.696858+00:00", "EventTime": "2024-05-21T12:27:09.696878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8JzB1zVwC7mTX6t"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "5c07a334-e84c-42ff-9a64-7c58b3694e0f", "DetectTime": "2024-05-21T12:27:09.714330+00:00", "EventTime": "2024-05-21T12:27:09.714353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.232.9.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkELm4VEQR6ItblGf"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "ead73c16-1253-4a1d-8fec-fe133b7e0d76", "DetectTime": "2024-05-21T12:27:09.742141+00:00", "EventTime": "2024-05-21T12:27:09.742165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.138.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhfDc1RRcvrwzc3v5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "2cc4c8f5-f89a-4546-8b4f-72f2b5e520a3", "DetectTime": "2024-05-21T12:27:09.918590+00:00", "EventTime": "2024-05-21T12:27:09.918610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1NO74rI7zgfVGq25"], "accumulated_threat_level": 10.1, "timewindow": 30} +{"Format": "IDEA0", "ID": "c341c28f-f2cd-4a9c-8597-698ccc2c9d6c", "DetectTime": "2024-05-21T12:27:09.965638+00:00", "EventTime": "2024-05-21T12:27:09.965660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb56XV39rRVbPrWoO6"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "3b108424-a347-4f10-95c5-7ea71449f240", "DetectTime": "2024-05-21T12:27:10.014875+00:00", "EventTime": "2024-05-21T12:27:10.014892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBF1y4T0ob3Gz7w9"], "accumulated_threat_level": 10.9, "timewindow": 30} +{"Format": "IDEA0", "ID": "ec1e504c-60a2-464e-8589-845186aee70a", "DetectTime": "2024-05-21T12:27:10.192502+00:00", "EventTime": "2024-05-21T12:27:10.192529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.136.52.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5SF7UJ2jMCj7VUC7"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "a22e716e-ba49-4b9c-80e7-3f9fdfe480ee", "DetectTime": "2024-05-21T12:27:10.305828+00:00", "EventTime": "2024-05-21T12:27:10.305848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSACnz1f4UD7uGtdeh"], "accumulated_threat_level": 11.700000000000001, "timewindow": 30} +{"Format": "IDEA0", "ID": "2455eb8b-1c8e-410d-ba08-df160930ccac", "DetectTime": "2024-05-21T12:27:10.501544+00:00", "EventTime": "2024-05-21T12:27:10.501565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetEPx4cetpiNpcOI9"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "059f2aff-da25-4f98-837f-eaf8d69df638", "DetectTime": "2024-05-21T12:27:10.529206+00:00", "EventTime": "2024-05-21T12:27:10.529226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcgj74qccXWBxeaAf"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "06387aac-feda-44ec-86f2-d0aa5360bbcc", "DetectTime": "2024-05-21T12:27:10.571443+00:00", "EventTime": "2024-05-21T12:27:10.571464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEk86x40tmBmbX9rb"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "f2fa9d41-4819-4891-8b46-88d5b7655e33", "DetectTime": "2024-05-21T12:27:10.592260+00:00", "EventTime": "2024-05-21T12:27:10.592281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.154.84.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAaDrWJ0FKqUMTIo5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "6615796f-50ba-4626-baac-aa271f19c119", "DetectTime": "2024-05-21T12:27:10.803018+00:00", "EventTime": "2024-05-21T12:27:10.803037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLnpZC18axPgPGjmf4"], "accumulated_threat_level": 12.500000000000002, "timewindow": 30} +{"Format": "Json", "ID": "6615796f-50ba-4626-baac-aa271f19c119", "DetectTime": "2024-05-21T12:27:10.803018+00:00", "EventTime": "2024-05-21T12:27:10.803037+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "1970-01-02T05:45:05.015045+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2024/05/21 12:27:10.994667)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 30, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "5510f96b-6e78-4c0e-ac3c-96efe775f1ba", "DetectTime": "2024-05-21T12:27:10.999217+00:00", "EventTime": "2024-05-21T12:27:10.999236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZsMY1REQQLGkMg36"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "604983e0-bdff-4517-a630-72ca7a705bc8", "DetectTime": "2024-05-21T12:27:11.004048+00:00", "EventTime": "2024-05-21T12:27:11.004067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFMl41RjurF6tAaai"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "4b9f197d-baa3-4b4d-aa3d-c0cbe878355f", "DetectTime": "2024-05-21T12:27:11.008653+00:00", "EventTime": "2024-05-21T12:27:11.008671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.222.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyKhu3Kzs4RUEtyUk"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "b8e33f67-ef94-4fba-85ca-66cb061c642f", "DetectTime": "2024-05-21T12:27:11.013105+00:00", "EventTime": "2024-05-21T12:27:11.013123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7CWc4cBQpBJEYu67"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "2d324151-9600-4e9a-9512-c6548cc86355", "DetectTime": "2024-05-21T12:27:11.025509+00:00", "EventTime": "2024-05-21T12:27:11.025526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BwrW1Mlr4vTYZem"], "accumulated_threat_level": 0.8, "timewindow": 30} +{"Format": "IDEA0", "ID": "8ee6416b-f277-4273-a1d6-88b0d751aaed", "DetectTime": "2024-05-21T12:27:11.029775+00:00", "EventTime": "2024-05-21T12:27:11.029792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxDD52r4XuAZSBRXe"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "c48d87e8-3439-4b49-a86f-dc9a1ddbfe24", "DetectTime": "2024-05-21T12:27:11.039506+00:00", "EventTime": "2024-05-21T12:27:11.039523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxWaGzZOlzAkuGRL1"], "accumulated_threat_level": 1.6, "timewindow": 30} +{"Format": "IDEA0", "ID": "ce0689fa-8b12-46d2-9e85-f2ed42fbd65e", "DetectTime": "2024-05-21T12:27:11.049145+00:00", "EventTime": "2024-05-21T12:27:11.049162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE5HT1ocrCWgR3Qt"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 30} +{"Format": "IDEA0", "ID": "bf26e488-402d-47eb-86c4-361aebab171a", "DetectTime": "2024-05-21T12:27:11.058776+00:00", "EventTime": "2024-05-21T12:27:11.058793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoLvE3mwZ4z8c9qE9"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "adffe8f1-7c69-46fa-916b-2829314c721a", "DetectTime": "2024-05-21T12:27:11.068512+00:00", "EventTime": "2024-05-21T12:27:11.068530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "Connection to unknown destination port 10390/UDP destination IP 122.161.209.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9GTtmpIeQf7teid"], "accumulated_threat_level": 4.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "0d08313e-1a80-4d33-9b92-742e7ea9321d", "DetectTime": "2024-05-21T12:27:11.072884+00:00", "EventTime": "2024-05-21T12:27:11.072902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.176.133.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5keL14U1kvfk2MFLd"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "fc7eb089-e659-473e-ad91-cf2916928d40", "DetectTime": "2024-05-21T12:27:11.084744+00:00", "EventTime": "2024-05-21T12:27:11.084767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqzvDT1FVp13gHrgUi"], "accumulated_threat_level": 4.8, "timewindow": 30} +{"Format": "IDEA0", "ID": "b0c45c34-5052-49ba-ad9a-54d6ec66ee93", "DetectTime": "2024-05-21T12:27:11.095048+00:00", "EventTime": "2024-05-21T12:27:11.095066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0f9p451VEcNvSqt6"], "accumulated_threat_level": 5.6, "timewindow": 30} +{"Format": "IDEA0", "ID": "71535655-6f4e-44e3-b3ab-09c640f91e24", "DetectTime": "2024-05-21T12:27:11.118041+00:00", "EventTime": "2024-05-21T12:27:11.118060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJ6pU20NLqT2DJrVh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 30} +{"Format": "IDEA0", "ID": "d3edb90b-e470-4812-b559-2b7096f32711", "DetectTime": "2024-05-21T12:27:11.137191+00:00", "EventTime": "2024-05-21T12:27:11.137211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7znIK2gSDxDMJwmQ"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "605a3595-9542-4283-b881-02daaf3a88c2", "DetectTime": "2024-05-21T12:27:11.242090+00:00", "EventTime": "2024-05-21T12:27:11.242111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwpaqT2TSgoZbz7Npd", "CH88wk16DcxSRbjGnk", "CeTJZa1nCfO2n5juC2", "C451J63CNJ646yfER9"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 30} +{"Format": "IDEA0", "ID": "053d7d25-dbbc-4773-b456-4a6c363ecb57", "DetectTime": "2024-05-21T12:27:11.279088+00:00", "EventTime": "2024-05-21T12:27:11.279107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXCWL1Xhjw7ZhCRgk"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "3b3f1bc5-e0a1-41a1-803c-358690899c1c", "DetectTime": "2024-05-21T12:27:11.358629+00:00", "EventTime": "2024-05-21T12:27:11.358647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGOkN2Xek3L9frEX9"], "accumulated_threat_level": 7.699999999999999, "timewindow": 30} +{"Format": "IDEA0", "ID": "732d3d21-cf4f-45e0-bd93-e8896029ba0e", "DetectTime": "2024-05-21T12:27:11.399046+00:00", "EventTime": "2024-05-21T12:27:11.399065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPKWe4CumhjSHvAC8"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "5beb53ee-e8e0-4d80-abcb-a27f87655d23", "DetectTime": "2024-05-21T12:27:11.410674+00:00", "EventTime": "2024-05-21T12:27:11.410691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxej57c3EiRdqODo"], "accumulated_threat_level": 8.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "3c887762-4875-4104-a4a2-200153b3c174", "DetectTime": "2024-05-21T12:27:11.422618+00:00", "EventTime": "2024-05-21T12:27:11.422639+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPKWe4CumhjSHvAC8"], "accumulated_threat_level": 10.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "708ae526-9eb1-4da9-9d57-c0e2dea1c0ed", "DetectTime": "2024-05-21T12:27:11.440227+00:00", "EventTime": "2024-05-21T12:27:11.440245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYz4grN0CL7l90Oi"], "accumulated_threat_level": 9.3, "timewindow": 30} +{"Format": "IDEA0", "ID": "3b70d45b-ae05-4b3b-9977-e62754b17081", "DetectTime": "2024-05-21T12:27:11.473160+00:00", "EventTime": "2024-05-21T12:27:11.473180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COo2cI1dqxDOIYgJdg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 30} +{"Format": "IDEA0", "ID": "b8c9e86b-040a-495b-ad88-0c1de5d5140b", "DetectTime": "2024-05-21T12:27:11.506203+00:00", "EventTime": "2024-05-21T12:27:11.506223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqiEnc6Cfzg3CjB2"], "accumulated_threat_level": 10.900000000000002, "timewindow": 30} +{"Format": "IDEA0", "ID": "c2abbe2b-c9af-4bf3-8248-3f4a691268e6", "DetectTime": "2024-05-21T12:27:11.537401+00:00", "EventTime": "2024-05-21T12:27:11.537423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpiKG1RX3nMhyzxJa"], "accumulated_threat_level": 11.700000000000003, "timewindow": 30} +{"Format": "IDEA0", "ID": "4445b0b5-4608-41a1-ba7b-3fc9912aa51c", "DetectTime": "2024-05-21T12:27:11.577321+00:00", "EventTime": "2024-05-21T12:27:11.577340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31Rdu3hmvviJdZ4ng"], "accumulated_threat_level": 12.500000000000004, "timewindow": 30} +{"Format": "Json", "ID": "4445b0b5-4608-41a1-ba7b-3fc9912aa51c", "DetectTime": "2024-05-21T12:27:11.577321+00:00", "EventTime": "2024-05-21T12:27:11.577340+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "1970-01-02T05:45:25.645336+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2024/05/21 12:27:11.811074)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 30, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "3614dc5b-d70f-479e-824f-2f56b094dbb3", "DetectTime": "2024-05-21T12:27:11.821107+00:00", "EventTime": "2024-05-21T12:27:11.821125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFuRAK3W2AG2L1zdWg"], "accumulated_threat_level": 0.8, "timewindow": 30} +{"Format": "IDEA0", "ID": "1c0d8519-2548-492c-a183-f7cd1b840242", "DetectTime": "2024-05-21T12:27:11.832588+00:00", "EventTime": "2024-05-21T12:27:11.832605+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.232.130"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-64-232-130.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kLOV3rinalxrxJW"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "bd2bf8f8-31f3-408a-b8f4-75b791296092", "DetectTime": "2024-05-21T12:27:11.844544+00:00", "EventTime": "2024-05-21T12:27:11.844561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.232.130"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.232.130 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-64-232-130.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kLOV3rinalxrxJW"], "accumulated_threat_level": 11.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ebfc07ce-d813-483a-b8c8-7704433b82df", "DetectTime": "2024-05-21T12:27:11.854531+00:00", "EventTime": "2024-05-21T12:27:11.854549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZ8t1219uNboY2Jn7"], "accumulated_threat_level": 1.6, "timewindow": 30} +{"Format": "IDEA0", "ID": "0cb65973-bf5e-4706-a1d9-59290a8236bf", "DetectTime": "2024-05-21T12:27:11.864460+00:00", "EventTime": "2024-05-21T12:27:11.864477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "Connection to unknown destination port 22243/UDP destination IP 125.167.168.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWUCo2WMcZfZAB9mi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 30} +{"Format": "IDEA0", "ID": "3a3169dc-d84d-4993-bb11-61ba9f15e88c", "DetectTime": "2024-05-21T12:27:11.917092+00:00", "EventTime": "2024-05-21T12:27:11.917112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MgV325ZLkhHaJMJl"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "b6c13289-2656-417f-976c-775ecc8c0be5", "DetectTime": "2024-05-21T12:27:11.935607+00:00", "EventTime": "2024-05-21T12:27:11.935627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.117.66.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgkhl71KQas8lRLFnh"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "c3e338bf-6f01-4707-8dc8-23b2cc95c977", "DetectTime": "2024-05-21T12:27:12.203162+00:00", "EventTime": "2024-05-21T12:27:12.203184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HkC63q1hOYZUT3Hd"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "afeb8e21-6cf8-4a40-acba-3f920a030be5", "DetectTime": "2024-05-21T12:27:12.394920+00:00", "EventTime": "2024-05-21T12:27:12.394941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.232.9.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV7e8u3fvPWfy803A3"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "0f56ea54-742c-4f7c-a655-2c08267eef1d", "DetectTime": "2024-05-21T12:27:12.654822+00:00", "EventTime": "2024-05-21T12:27:12.654846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.138.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COz1QV1BrKtweos4Hl"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "85d474ec-4372-49f8-a77c-24aa3ab132d0", "DetectTime": "2024-05-21T12:27:12.675317+00:00", "EventTime": "2024-05-21T12:27:12.675335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5wRx3g1iLuO8WkH3"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "603488a1-8a33-49f3-a09b-e51982f2f98b", "DetectTime": "2024-05-21T12:27:12.918282+00:00", "EventTime": "2024-05-21T12:27:12.918307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.136.52.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkZeV17voWZJM5gl"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "4056261f-7590-43de-a222-74fb5379c2ea", "DetectTime": "2024-05-21T12:27:13.134401+00:00", "EventTime": "2024-05-21T12:27:13.134430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbmDE44Hsfw7NisL1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "b09de191-4b58-47e0-ab6e-e1a662667eb4", "DetectTime": "2024-05-21T12:27:13.174328+00:00", "EventTime": "2024-05-21T12:27:13.174346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.154.84.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUitc3nGZUjTJ7614"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "bda74aa7-9578-4666-b033-d980c4222be4", "DetectTime": "2024-05-21T12:27:13.228790+00:00", "EventTime": "2024-05-21T12:27:13.228812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C999BH3qkEwlmAWju5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "28c08d07-943d-4927-81ce-51cf5aec2ce7", "DetectTime": "2024-05-21T12:27:13.338732+00:00", "EventTime": "2024-05-21T12:27:13.338756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CubNjg1au9fprQDhyc", "CVNMau4s3JCjqyjLbd", "CfPytR2aVpOEZOF6e4", "C3oWIp3EFq9Bhe1are"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "c44bf545-ea1c-4c39-b0b4-ada5e01aa95d", "DetectTime": "2024-05-21T12:27:13.457667+00:00", "EventTime": "2024-05-21T12:27:13.457685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwASSj3oeVKimE8RT3"], "accumulated_threat_level": 3.7, "timewindow": 31} +{"Format": "IDEA0", "ID": "65028cf3-7810-4df6-b7f9-ae25295a602d", "DetectTime": "2024-05-21T12:27:13.492237+00:00", "EventTime": "2024-05-21T12:27:13.492254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8v7fN1cUbuwH7QNj1"], "accumulated_threat_level": 4.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "dc637ba7-4a09-4fc5-a548-1a73c43a05ed", "DetectTime": "2024-05-21T12:27:13.504013+00:00", "EventTime": "2024-05-21T12:27:13.504031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClARnq1I8PTTRu9qCc"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "9a8c34af-3d41-4dc2-beea-2ed20d9e4e70", "DetectTime": "2024-05-21T12:27:13.539950+00:00", "EventTime": "2024-05-21T12:27:13.539967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7mSe4E6TdDRcRc7k"], "accumulated_threat_level": 5.3, "timewindow": 31} +{"Format": "IDEA0", "ID": "52dcc5ed-4a29-4d5a-96cb-17167541898c", "DetectTime": "2024-05-21T12:27:13.544414+00:00", "EventTime": "2024-05-21T12:27:13.544431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQgwhLyWR57gE2EX8"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "ce506ce4-aa82-4546-bc83-1b47922ca326", "DetectTime": "2024-05-21T12:27:13.562167+00:00", "EventTime": "2024-05-21T12:27:13.562187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8vLa4HBilFS6md1"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "8451d348-c632-49c5-ace4-5513db13ab86", "DetectTime": "2024-05-21T12:27:13.592552+00:00", "EventTime": "2024-05-21T12:27:13.592572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4jdU2egQDmMr2ll7"], "accumulated_threat_level": 6.1, "timewindow": 31} +{"Format": "IDEA0", "ID": "7febed11-75a7-407d-98e8-610df0f61b4d", "DetectTime": "2024-05-21T12:27:13.599516+00:00", "EventTime": "2024-05-21T12:27:13.599535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3sWa38NHfv8RVImc"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "0a3f7019-f34f-4437-9019-5416ae4e4495", "DetectTime": "2024-05-21T12:27:13.629847+00:00", "EventTime": "2024-05-21T12:27:13.629868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDnXlC31ogSiJU11Pc"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "d239bdaa-a949-4934-96fd-888e262266a9", "DetectTime": "2024-05-21T12:27:13.654955+00:00", "EventTime": "2024-05-21T12:27:13.654973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpV6Sc2GbiLWxR1zea"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "b529cbfa-d031-44d1-8025-929747240fe2", "DetectTime": "2024-05-21T12:27:13.943517+00:00", "EventTime": "2024-05-21T12:27:13.943539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIiTiwe0znIWJ2kI3"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "cea4e6ca-2b5b-4a79-9544-d0bb618d334d", "DetectTime": "2024-05-21T12:27:13.948240+00:00", "EventTime": "2024-05-21T12:27:13.948259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgVqO2NnivNpQV69k"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "1b2d43be-6cf2-4e65-9501-5446f5928282", "DetectTime": "2024-05-21T12:27:13.952814+00:00", "EventTime": "2024-05-21T12:27:13.952832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1RlzjysiN9UsNK32"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "2825aae7-16f5-4b3a-bbb7-c2e3a8368b5d", "DetectTime": "2024-05-21T12:27:13.957516+00:00", "EventTime": "2024-05-21T12:27:13.957534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjc8b3U68BPevf2rf"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "3550cf41-c563-4586-abcd-34f418f386d7", "DetectTime": "2024-05-21T12:27:14.062036+00:00", "EventTime": "2024-05-21T12:27:14.062055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CesqCi4jQaGFJYujw1"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "5fe7f652-db08-43fa-99eb-46f760be00d0", "DetectTime": "2024-05-21T12:27:14.067567+00:00", "EventTime": "2024-05-21T12:27:14.067586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpNT03Ujr3aeUsXTi"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "8f89ee20-552e-4fc8-a306-b7a79bfdc9cd", "DetectTime": "2024-05-21T12:27:14.104603+00:00", "EventTime": "2024-05-21T12:27:14.104623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5xRlG1wVrxEM8dTna"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "774eff00-302a-4d8a-b290-bd28f2ce1cdf", "DetectTime": "2024-05-21T12:27:14.117614+00:00", "EventTime": "2024-05-21T12:27:14.117632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAOQliyy2NvabL9h"], "accumulated_threat_level": 7.699999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "2ff1096b-f5ac-4d88-8ef4-46c4549d03a7", "DetectTime": "2024-05-21T12:27:14.133592+00:00", "EventTime": "2024-05-21T12:27:14.133610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQZAJw43WjE4HUFub1"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "c0fa86dc-5772-405e-83d9-d4aa5bffa385", "DetectTime": "2024-05-21T12:27:14.163282+00:00", "EventTime": "2024-05-21T12:27:14.163304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRxT1A3eu2NhBoRzK5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "c70ab456-f74b-4236-8677-c54d98d26dbb", "DetectTime": "2024-05-21T12:27:14.175736+00:00", "EventTime": "2024-05-21T12:27:14.175756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUxwd2QvZ97OY4qUg"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "7dec8271-c63f-49e0-a2a1-54dae2c1c71a", "DetectTime": "2024-05-21T12:27:14.193814+00:00", "EventTime": "2024-05-21T12:27:14.193835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvox43DbKRjNOBBk9"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "39c904cb-497d-4ed5-9e02-7f412cd34dd7", "DetectTime": "2024-05-21T12:27:14.210215+00:00", "EventTime": "2024-05-21T12:27:14.210235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5DpcA21KMVR3F0fF6"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "fffd96c6-000a-4fab-b96f-40647c20d312", "DetectTime": "2024-05-21T12:27:14.270637+00:00", "EventTime": "2024-05-21T12:27:14.270656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CODYVs4KNlbrSrukIi"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "47e8807d-7244-411f-97ea-560075a8b66d", "DetectTime": "2024-05-21T12:27:14.275456+00:00", "EventTime": "2024-05-21T12:27:14.275475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMlcZQ1Tv9zwTz6HMj"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "1c183493-0912-4e32-aedc-5f1878ce5938", "DetectTime": "2024-05-21T12:27:14.288743+00:00", "EventTime": "2024-05-21T12:27:14.288760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JTGW3EqfXet5jZ2c"], "accumulated_threat_level": 8.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "5546553e-e995-4bd2-9b4e-94d5d2456192", "DetectTime": "2024-05-21T12:27:14.318154+00:00", "EventTime": "2024-05-21T12:27:14.318176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeln33tdGuGQxdI4d"], "accumulated_threat_level": 9.3, "timewindow": 31} +{"Format": "IDEA0", "ID": "cf8b9ef3-cb97-4d77-961a-ef29b0a8e991", "DetectTime": "2024-05-21T12:27:14.342626+00:00", "EventTime": "2024-05-21T12:27:14.342647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5n91b1ViQEIjrmWbl"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "d47605e4-327f-44f1-8a6f-657fa3fbb229", "DetectTime": "2024-05-21T12:27:14.363750+00:00", "EventTime": "2024-05-21T12:27:14.363769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpleDD4d9IfSWZLC75"], "accumulated_threat_level": 10.100000000000001, "timewindow": 31} +{"Format": "IDEA0", "ID": "6c30560d-bb08-437f-b5ee-9eda14594cc3", "DetectTime": "2024-05-21T12:27:14.392429+00:00", "EventTime": "2024-05-21T12:27:14.392449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFE9Is4yoAzhJE4aw"], "accumulated_threat_level": 10.900000000000002, "timewindow": 31} +{"Format": "IDEA0", "ID": "8d73cd00-68c0-4334-80a9-63ea303c6f68", "DetectTime": "2024-05-21T12:27:14.409592+00:00", "EventTime": "2024-05-21T12:27:14.409613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxm8VA4qqjrrNPcG6"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "14b842fb-f9d0-42eb-b4f3-234a996b0aa6", "DetectTime": "2024-05-21T12:27:14.446568+00:00", "EventTime": "2024-05-21T12:27:14.446588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.232.5.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWzhn2If8XS7FE8Tg"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "76fe44d7-af8f-435d-8c15-07bb6275eb2c", "DetectTime": "2024-05-21T12:27:14.474053+00:00", "EventTime": "2024-05-21T12:27:14.474072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlZzl2fxBsPOKoGvc"], "accumulated_threat_level": 11.700000000000003, "timewindow": 31} +{"Format": "IDEA0", "ID": "24d036fc-aacb-4a6a-9b3e-22bbc118ab13", "DetectTime": "2024-05-21T12:27:14.489095+00:00", "EventTime": "2024-05-21T12:27:14.489118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJeg211kbquESlex6"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "34cabcef-7941-4343-abc4-67afe4b1f342", "DetectTime": "2024-05-21T12:27:14.515068+00:00", "EventTime": "2024-05-21T12:27:14.515088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNh7m4BD2IAkxfUc6"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "f575060b-d0b5-422f-a1f1-f67d381c2cf8", "DetectTime": "2024-05-21T12:27:14.537253+00:00", "EventTime": "2024-05-21T12:27:14.537273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCF2C1ZPrM3hORd9e"], "accumulated_threat_level": 12.500000000000004, "timewindow": 31} +{"Format": "Json", "ID": "f575060b-d0b5-422f-a1f1-f67d381c2cf8", "DetectTime": "2024-05-21T12:27:14.537253+00:00", "EventTime": "2024-05-21T12:27:14.537273+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "1970-01-02T06:17:01.516512+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:27:14.729194)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "547c2e9f-595e-4d39-8f57-561277ecbee0", "DetectTime": "2024-05-21T12:27:14.733139+00:00", "EventTime": "2024-05-21T12:27:14.733158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzRDc4E55ab5t5ADc"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "18b81d60-1ab7-4d44-a5e6-60f97fdd6bee", "DetectTime": "2024-05-21T12:27:14.745361+00:00", "EventTime": "2024-05-21T12:27:14.745386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDd8N1aD2yN7O3005"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "6d62309d-d663-4268-b4c8-15521a589670", "DetectTime": "2024-05-21T12:27:14.750957+00:00", "EventTime": "2024-05-21T12:27:14.750976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIk9iA4XJZkDtvamz"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "b25dc83e-45e2-4f35-b7d9-2ace7934d16f", "DetectTime": "2024-05-21T12:27:14.762692+00:00", "EventTime": "2024-05-21T12:27:14.762712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJUcT1dc4Dt1oLwp5"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "c501ce8e-e484-43ba-a24d-584f5e6c6188", "DetectTime": "2024-05-21T12:27:14.773198+00:00", "EventTime": "2024-05-21T12:27:14.773242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemHj93kfiMXC2n6a2"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "61bed90e-0623-4fe4-a8ab-455f0543d4fe", "DetectTime": "2024-05-21T12:27:14.778810+00:00", "EventTime": "2024-05-21T12:27:14.778832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.222.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9F8a31ZJkKvvovvte"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "8fd41b6e-89e2-43d0-bc00-61594e65f608", "DetectTime": "2024-05-21T12:27:14.783430+00:00", "EventTime": "2024-05-21T12:27:14.783448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.176.133.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWfbj4V5qsY0zrhke"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "9f9a27a5-cb0c-4a44-9019-287bc0a23d06", "DetectTime": "2024-05-21T12:27:14.796029+00:00", "EventTime": "2024-05-21T12:27:14.796050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzpH6twmbm7OLg7f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "0a66b7c0-5e6e-4b3f-9205-b82c040af4f5", "DetectTime": "2024-05-21T12:27:14.806843+00:00", "EventTime": "2024-05-21T12:27:14.806860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJMlr2EVHzObcgEfj"], "accumulated_threat_level": 3.2, "timewindow": 31} +{"Format": "IDEA0", "ID": "3bd7fe66-827f-440c-a6c0-d69ffa6e2795", "DetectTime": "2024-05-21T12:27:14.942292+00:00", "EventTime": "2024-05-21T12:27:14.942309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFDThF1BAT4RWLmZef"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "6487e728-5a82-4514-9d63-a19ece5eb1cf", "DetectTime": "2024-05-21T12:27:14.946889+00:00", "EventTime": "2024-05-21T12:27:14.946907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73FRJ1NRxF33DUPKh"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "a64db974-7729-48bf-81b6-88cda1d19c8b", "DetectTime": "2024-05-21T12:27:14.957235+00:00", "EventTime": "2024-05-21T12:27:14.957253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJGCh4eKTbVngb5yf"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "0fa73845-1377-49f0-8d84-9d23994b84ac", "DetectTime": "2024-05-21T12:27:14.970681+00:00", "EventTime": "2024-05-21T12:27:14.970699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBGXg4OZymdy6Cpa2"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "cc358518-52fb-4717-b3e6-6d2609ec944a", "DetectTime": "2024-05-21T12:27:15.079936+00:00", "EventTime": "2024-05-21T12:27:15.079953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUt0F71heffHOHD184"], "accumulated_threat_level": 4.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "954c1259-1c84-484f-b450-8207f0aea317", "DetectTime": "2024-05-21T12:27:15.084577+00:00", "EventTime": "2024-05-21T12:27:15.084594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czv1wg1r7scD5IPNU1"], "accumulated_threat_level": 3.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "539998af-c08e-4709-ad27-df13a3cab52b", "DetectTime": "2024-05-21T12:27:15.122097+00:00", "EventTime": "2024-05-21T12:27:15.122117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptWzG3iIgL9OQFigg"], "accumulated_threat_level": 5.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "cbf1d113-6b36-4152-af3c-e20b712d3057", "DetectTime": "2024-05-21T12:27:15.149782+00:00", "EventTime": "2024-05-21T12:27:15.149802+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["172.190.235.230"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.235.230 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C022p814skiJwh8FVl"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "725d4309-810f-4fd0-92e6-c7e83eeeb3d6", "DetectTime": "2024-05-21T12:27:15.171786+00:00", "EventTime": "2024-05-21T12:27:15.171803+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["172.190.235.230"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.235.230 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C022p814skiJwh8FVl"], "accumulated_threat_level": 11.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "cb4ac1b7-ba30-4999-aa25-fe852e768d23", "DetectTime": "2024-05-21T12:27:15.181305+00:00", "EventTime": "2024-05-21T12:27:15.181323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "Connection to unknown destination port 6781/UDP destination IP 190.79.75.84. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvnLu4vVu1Hopokda"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "6b08d492-c478-49c1-9ab0-e86a2e4746ad", "DetectTime": "2024-05-21T12:27:15.191151+00:00", "EventTime": "2024-05-21T12:27:15.191169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEPkQ1SqX0gVXzLe9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "623651d9-679e-4caa-b5da-4cbe1f978ca1", "DetectTime": "2024-05-21T12:27:15.300911+00:00", "EventTime": "2024-05-21T12:27:15.300930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTiqbV3uHn3w1uKzL2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "d146f2e3-7322-47a6-835a-b87856a53b68", "DetectTime": "2024-05-21T12:27:15.472203+00:00", "EventTime": "2024-05-21T12:27:15.472223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.163.112.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59vCP1LR9FGZrUOOj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "dec5b078-16b4-4783-99ea-6040aaa9807b", "DetectTime": "2024-05-21T12:27:15.643981+00:00", "EventTime": "2024-05-21T12:27:15.644000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "Connection to unknown destination port 13489/UDP destination IP 95.156.174.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0H9lc3Fr0xmmuEZzg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "954d5830-ce55-426d-982e-3ccdcce172d9", "DetectTime": "2024-05-21T12:27:15.673371+00:00", "EventTime": "2024-05-21T12:27:15.673388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "Connection to unknown destination port 10337/UDP destination IP 87.6.122.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrHK34hSASHVPofV7"], "accumulated_threat_level": 9.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "063af8b7-51af-40a8-88e3-d6e5435f6ea8", "DetectTime": "2024-05-21T12:27:15.714758+00:00", "EventTime": "2024-05-21T12:27:15.714778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "Connection to unknown destination port 20374/UDP destination IP 190.152.193.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgg2qHMrjoQuiOzPj"], "accumulated_threat_level": 10.4, "timewindow": 31} +{"Format": "IDEA0", "ID": "8fee5092-bdd5-406e-a5db-16aee820f72d", "DetectTime": "2024-05-21T12:27:15.742133+00:00", "EventTime": "2024-05-21T12:27:15.742153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.64.148.78"]}], "Attach": [{"Content": "Connection to unknown destination port 5787/UDP destination IP 99.64.148.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdEPS3u4CDeYMv7ge"], "accumulated_threat_level": 11.200000000000001, "timewindow": 31} +{"Format": "IDEA0", "ID": "7d079348-0120-4bb0-9b24-39c1d3c89312", "DetectTime": "2024-05-21T12:27:15.784750+00:00", "EventTime": "2024-05-21T12:27:15.784768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "Connection to unknown destination port 24587/UDP destination IP 2.40.243.93. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTjD7WNRo9RV2N13"], "accumulated_threat_level": 12.000000000000002, "timewindow": 31} +{"Format": "Json", "ID": "7d079348-0120-4bb0-9b24-39c1d3c89312", "DetectTime": "2024-05-21T12:27:15.784750+00:00", "EventTime": "2024-05-21T12:27:15.784768+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.40.243.93"]}], "Attach": [{"Content": "1970-01-02T06:48:26.669531+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:27:15.924324)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2fb760b5-b8cd-461d-8c85-ed705d3f4823", "DetectTime": "2024-05-21T12:27:15.957148+00:00", "EventTime": "2024-05-21T12:27:15.957167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.75.180.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6581/UDP destination IP 119.75.180.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CastNI2TuzHem0gJe1"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "8bbd8792-8b36-448e-8ca3-b7f0f3329392", "DetectTime": "2024-05-21T12:27:15.968427+00:00", "EventTime": "2024-05-21T12:27:15.968445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "Connection to unknown destination port 20233/UDP destination IP 118.68.238.0. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9dmB4BCib5vyGtUe"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "1a635db0-5b02-4bad-bc66-078b5fc394aa", "DetectTime": "2024-05-21T12:27:16.010360+00:00", "EventTime": "2024-05-21T12:27:16.010380+00:00", "Category": ["Recon"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.2"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Connecting to private IP: 10.0.2.19 on destination port: 1701 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeuUfk1if6uV4BvdM1"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "29b3c4d6-d3f4-4ad8-b6d2-3615bbc570f2", "DetectTime": "2024-05-21T12:27:16.052691+00:00", "EventTime": "2024-05-21T12:27:16.052710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "Connection to unknown destination port 18066/UDP destination IP 190.172.150.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMovEJ2rH0OyrD6Hpj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "8b3ff05e-55de-4328-981e-690b5976f3c3", "DetectTime": "2024-05-21T12:27:16.092476+00:00", "EventTime": "2024-05-21T12:27:16.092494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "Connection to unknown destination port 2843/UDP destination IP 98.80.247.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv615M11lthZC0bkt5"], "accumulated_threat_level": 3.2, "timewindow": 31} +{"Format": "IDEA0", "ID": "09c7b237-6e05-4931-ac92-bf18f4cc2a72", "DetectTime": "2024-05-21T12:27:16.119833+00:00", "EventTime": "2024-05-21T12:27:16.119851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "Connection to unknown destination port 22323/UDP destination IP 196.210.104.179. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbT9UUAkHV9sEIjj"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "2cd48a7e-bc99-477f-a7b9-3b74ec6f3e01", "DetectTime": "2024-05-21T12:27:16.153620+00:00", "EventTime": "2024-05-21T12:27:16.153638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.255.222.240"]}], "Attach": [{"Content": "Connection to unknown destination port 3529/UDP destination IP 24.255.222.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMAwe1NxceoRuGhY4"], "accumulated_threat_level": 4.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "14c8af4c-3e6d-4f04-8646-491bd05fa3db", "DetectTime": "2024-05-21T12:27:16.159451+00:00", "EventTime": "2024-05-21T12:27:16.159475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yFSN1T87uI6HrxD5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "16ee540b-eac3-412f-9364-25da45ae3024", "DetectTime": "2024-05-21T12:27:16.184855+00:00", "EventTime": "2024-05-21T12:27:16.184877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhzZCh9Lxep4WNvg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "6e44e0c9-455b-4b76-be18-1c9d37916b34", "DetectTime": "2024-05-21T12:27:16.213509+00:00", "EventTime": "2024-05-21T12:27:16.213526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.234.133.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8387/UDP destination IP 108.234.133.110. AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2luC16rQZhPJeDee"], "accumulated_threat_level": 5.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "884dcd08-03c4-4674-a453-86014abe446b", "DetectTime": "2024-05-21T12:27:16.238870+00:00", "EventTime": "2024-05-21T12:27:16.238888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.196.220.248"]}], "Attach": [{"Content": "Connection to unknown destination port 9105/UDP destination IP 108.196.220.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDAvLh14GSHZXPuMsg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "c610317b-37ea-47b5-9515-3700600dbad7", "DetectTime": "2024-05-21T12:27:16.262040+00:00", "EventTime": "2024-05-21T12:27:16.262060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jSaF4iNw5BZbTvwk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "30be7350-0bb1-4217-8b1a-33304f6b9c75", "DetectTime": "2024-05-21T12:27:16.280581+00:00", "EventTime": "2024-05-21T12:27:16.280604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8mdl1kwia72F0uBa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "c23cae03-4b1c-45cb-82ea-ce6cf423f6b7", "DetectTime": "2024-05-21T12:27:16.299658+00:00", "EventTime": "2024-05-21T12:27:16.299679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "Connection to unknown destination port 5068/UDP destination IP 95.104.77.164. IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwkftD3MdYRMWYZhdb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3ebb50bf-b62f-4189-81e6-8d09e2909b37", "DetectTime": "2024-05-21T12:27:16.328511+00:00", "EventTime": "2024-05-21T12:27:16.328529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "Connection to unknown destination port 13897/UDP destination IP 83.26.189.165. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9eDD4XhvbITKUlZi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e1e427b0-4c68-447c-a0ba-37461ed58ef6", "DetectTime": "2024-05-21T12:27:16.354724+00:00", "EventTime": "2024-05-21T12:27:16.354741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "Connection to unknown destination port 8275/UDP destination IP 190.37.198.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqCVS1vtDpwo4dhRj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "05d5bab9-1549-48d6-8f5c-d7d89ef3fb71", "DetectTime": "2024-05-21T12:27:16.384471+00:00", "EventTime": "2024-05-21T12:27:16.384489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "Connection to unknown destination port 6925/UDP destination IP 24.239.58.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheByO11NxH2FMIhTc"], "accumulated_threat_level": 9.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "c5582d92-6138-4fa5-b183-2d3c90d2e6cb", "DetectTime": "2024-05-21T12:27:16.411605+00:00", "EventTime": "2024-05-21T12:27:16.411622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "Connection to unknown destination port 1075/UDP destination IP 200.75.115.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8O1jRazrJ310NT3l"], "accumulated_threat_level": 10.4, "timewindow": 31} +{"Format": "IDEA0", "ID": "b3d2fffc-c30c-48d9-bf39-555ab4a1f73f", "DetectTime": "2024-05-21T12:27:16.447968+00:00", "EventTime": "2024-05-21T12:27:16.447987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.166.163.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9908/UDP destination IP 74.166.163.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtpCW1n8kiBWlrk9l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 31} +{"Format": "IDEA0", "ID": "c610eedb-6793-43fc-bd90-64a107f091f6", "DetectTime": "2024-05-21T12:27:16.477844+00:00", "EventTime": "2024-05-21T12:27:16.477863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "Connection to unknown destination port 10247/UDP destination IP 85.75.9.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSeLi4T3uv5lpCv3l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 31} +{"Format": "Json", "ID": "c610eedb-6793-43fc-bd90-64a107f091f6", "DetectTime": "2024-05-21T12:27:16.477844+00:00", "EventTime": "2024-05-21T12:27:16.477863+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "1970-01-02T06:48:25.667188+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:27:16.652709)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b74243ee-672d-457a-a5a5-43066d38360f", "DetectTime": "2024-05-21T12:27:16.662999+00:00", "EventTime": "2024-05-21T12:27:16.663017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.100.43.218"]}], "Attach": [{"Content": "Connection to unknown destination port 10957/UDP destination IP 78.100.43.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN4FfYmibVboyUMv7"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "be4be2e1-3571-423a-add1-784719a4b362", "DetectTime": "2024-05-21T12:27:16.679974+00:00", "EventTime": "2024-05-21T12:27:16.679997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.64.215.24"]}], "Attach": [{"Content": "Connection to unknown destination port 2668/UDP destination IP 108.64.215.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6dlNXugaKfFaQK"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "72c08c04-ea47-411a-aac3-9326d8f1f73f", "DetectTime": "2024-05-21T12:27:16.685035+00:00", "EventTime": "2024-05-21T12:27:16.685052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzozF2geEEpKSkfic"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "d40006a3-1ff6-48e0-945f-750330cf0b6d", "DetectTime": "2024-05-21T12:27:16.689360+00:00", "EventTime": "2024-05-21T12:27:16.689378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDHel2ttoksI9EhEa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "8095c631-c3bf-4cf3-a942-f04c6aadf382", "DetectTime": "2024-05-21T12:27:16.702045+00:00", "EventTime": "2024-05-21T12:27:16.702071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7PLChYOABGxFbGX9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "4fd4c233-209e-435b-97e0-ecc4c6524678", "DetectTime": "2024-05-21T12:27:16.707892+00:00", "EventTime": "2024-05-21T12:27:16.707914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jbze2pj6Tz6iaVSj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "df94e470-3054-4e51-9588-0d1c028685d1", "DetectTime": "2024-05-21T12:27:16.736284+00:00", "EventTime": "2024-05-21T12:27:16.736306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2FwC2xRtq8uKQRBi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "8f190a95-923a-4a3b-9253-09aa3c0a83d1", "DetectTime": "2024-05-21T12:27:16.852422+00:00", "EventTime": "2024-05-21T12:27:16.852444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8xX8JNGEQ4Ngz8Ld"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "c7715fd7-0e73-4b54-9698-6bfec371a878", "DetectTime": "2024-05-21T12:27:16.857308+00:00", "EventTime": "2024-05-21T12:27:16.857327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC91w30cU83uhdkC9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "4ea484a9-8912-45d6-bf4f-5fdfd2496b10", "DetectTime": "2024-05-21T12:27:16.874179+00:00", "EventTime": "2024-05-21T12:27:16.874201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQ9AF3AjCcXS0MFwh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "65e3b92f-4614-4474-a27d-062eb6ee6d3e", "DetectTime": "2024-05-21T12:27:16.879243+00:00", "EventTime": "2024-05-21T12:27:16.879260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqm0gkUDAcmTp7Cye"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "a96cbbc6-b968-438c-a323-d5a88e462f97", "DetectTime": "2024-05-21T12:27:17.163435+00:00", "EventTime": "2024-05-21T12:27:17.163453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.96.97.217"]}], "Attach": [{"Content": "Connection to unknown destination port 17994/UDP destination IP 118.96.97.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwduv1GNr2UuP6kSe"], "accumulated_threat_level": 3.2, "timewindow": 31} +{"Format": "IDEA0", "ID": "6a604ff2-5353-4108-b8fc-2f2e5017cc0a", "DetectTime": "2024-05-21T12:27:17.168353+00:00", "EventTime": "2024-05-21T12:27:17.168371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csjvb1MWzYBPOPx0j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "eca0d98e-b3cc-43f2-b8b0-b69c0ce48620", "DetectTime": "2024-05-21T12:27:17.223651+00:00", "EventTime": "2024-05-21T12:27:17.223671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzEfNC3S7M0x6p1fN2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "0f01a649-bff7-4479-8dae-c48d4988ca2e", "DetectTime": "2024-05-21T12:27:17.228752+00:00", "EventTime": "2024-05-21T12:27:17.228775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTdNJ2rp0wWYILagj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "abbedd36-da15-4ce7-ae0a-0157b5ea4260", "DetectTime": "2024-05-21T12:27:17.245285+00:00", "EventTime": "2024-05-21T12:27:17.245304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvpehF3o4JiVdfiB63"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "ff101bef-48a1-431d-bf1a-84861fc8c42c", "DetectTime": "2024-05-21T12:27:17.273750+00:00", "EventTime": "2024-05-21T12:27:17.273771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZR2K0TWrjv3dfbb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "7248f091-cf4b-4328-9ad4-707be74d295d", "DetectTime": "2024-05-21T12:27:17.278655+00:00", "EventTime": "2024-05-21T12:27:17.278673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdKR02yVUD9AVMIK6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "1e68c397-71ef-49ad-b498-9229dba32839", "DetectTime": "2024-05-21T12:27:17.285826+00:00", "EventTime": "2024-05-21T12:27:17.285844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPO12k4QzGE52mLo9j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "5bcfeedb-5590-4c5d-896e-2ca9022fbc13", "DetectTime": "2024-05-21T12:27:17.373254+00:00", "EventTime": "2024-05-21T12:27:17.373273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.105.251.166"]}], "Attach": [{"Content": "Connection to unknown destination port 1327/UDP destination IP 124.105.251.166. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMyN51nFX9ZiuwRQ6"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9ee0912f-bd02-4f90-a502-f0456ce6a9f2", "DetectTime": "2024-05-21T12:27:17.432092+00:00", "EventTime": "2024-05-21T12:27:17.432110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiT2NQ1wJpmtvUu5Be"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "debc986b-ecbf-4685-9849-b1e9f8bff259", "DetectTime": "2024-05-21T12:27:17.459696+00:00", "EventTime": "2024-05-21T12:27:17.459720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJTlb3NXrEw6JC8z1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "0f4e7aef-44a0-4168-a223-1fb24a6cf15c", "DetectTime": "2024-05-21T12:27:17.503443+00:00", "EventTime": "2024-05-21T12:27:17.503461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.148.5"]}], "Attach": [{"Content": "Connection to unknown destination port 2115/UDP destination IP 176.73.148.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHum46N8Tsx1gW3g9"], "accumulated_threat_level": 4.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "17269c9b-af9e-4265-93e1-9b39bbaccb94", "DetectTime": "2024-05-21T12:27:17.520484+00:00", "EventTime": "2024-05-21T12:27:17.520505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpkmcJ1bo8uLsTpfg5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "6ab820cf-0a0e-444d-bb03-631bc3e84c7a", "DetectTime": "2024-05-21T12:27:17.604545+00:00", "EventTime": "2024-05-21T12:27:17.604567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn74rl4wVAFReozQfk"], "accumulated_threat_level": 5.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "e170b78c-fbaa-408d-8d45-e6929cbcf8ae", "DetectTime": "2024-05-21T12:27:17.610009+00:00", "EventTime": "2024-05-21T12:27:17.610027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUNfm2IRx4BB7osf9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "4603af49-91a7-4032-9aa4-baf70c362870", "DetectTime": "2024-05-21T12:27:17.635367+00:00", "EventTime": "2024-05-21T12:27:17.635386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.232.5.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Boil46Fr04erCw5j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "663d540f-677d-4f46-8325-e9cf481977f6", "DetectTime": "2024-05-21T12:27:17.656269+00:00", "EventTime": "2024-05-21T12:27:17.656291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ZVho1rhXfLf0zH6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "ce3446d7-a2e3-4a67-a001-9f66daa202e5", "DetectTime": "2024-05-21T12:27:17.667509+00:00", "EventTime": "2024-05-21T12:27:17.667527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COvZGY29esqXHTGWo9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "1726962b-986b-46ea-b0f8-9f37e5f36429", "DetectTime": "2024-05-21T12:27:17.699416+00:00", "EventTime": "2024-05-21T12:27:17.699434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyRyvLV8IaNiFdT"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "fca0875c-7059-47ae-9fe0-b4da7cb335a5", "DetectTime": "2024-05-21T12:27:17.713238+00:00", "EventTime": "2024-05-21T12:27:17.713258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.176.133.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbpi2u3dRE5DQzYTya"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "d5bc13bf-a027-411d-8c73-90eb2b42d1af", "DetectTime": "2024-05-21T12:27:17.739387+00:00", "EventTime": "2024-05-21T12:27:17.739409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQStcA24dB3F5xSYqi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "610ae96e-4c07-44ac-b59b-e4e155ef21be", "DetectTime": "2024-05-21T12:27:18.015544+00:00", "EventTime": "2024-05-21T12:27:18.015563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAqWdm138jKU5ssQq2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "6d034495-e58b-457c-be91-0be77d7c15ee", "DetectTime": "2024-05-21T12:27:18.041405+00:00", "EventTime": "2024-05-21T12:27:18.041428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgDw4AKx2vCPd6A1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "f2ccf7db-20f2-4fe1-96d0-052e8cb6211c", "DetectTime": "2024-05-21T12:27:18.056868+00:00", "EventTime": "2024-05-21T12:27:18.056891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClaKJA3ypVipx0zTyg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "546dc9c4-a93b-41ca-a01c-24da63906c82", "DetectTime": "2024-05-21T12:27:18.082199+00:00", "EventTime": "2024-05-21T12:27:18.082216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKd1CC2rIwuEuytJX8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "65e95e07-50b2-42e0-b98b-ce0e0bd8e013", "DetectTime": "2024-05-21T12:27:18.197013+00:00", "EventTime": "2024-05-21T12:27:18.197035+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHurs8VU4lVdtKDg7"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "141ace3e-d249-4302-9e96-6c0c470a4d28", "DetectTime": "2024-05-21T12:27:18.208810+00:00", "EventTime": "2024-05-21T12:27:18.208829+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHurs8VU4lVdtKDg7"], "accumulated_threat_level": 12.0, "timewindow": 14} +{"Format": "Json", "ID": "141ace3e-d249-4302-9e96-6c0c470a4d28", "DetectTime": "2024-05-21T12:27:18.208810+00:00", "EventTime": "2024-05-21T12:27:18.208829+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "1970-01-01T13:08:59.154330+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:27:18.728210)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "8d07df6e-c7df-46f0-8f90-4c259bd5b0de", "DetectTime": "2024-05-21T12:27:18.739855+00:00", "EventTime": "2024-05-21T12:27:18.739875+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.90.50.124"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.90.50.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UdxI1Bkdh1UCpqH9"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "07af46fa-9087-4aa5-9b12-b2992a7520c5", "DetectTime": "2024-05-21T12:27:18.752794+00:00", "EventTime": "2024-05-21T12:27:18.752814+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.90.50.124"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.90.50.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UdxI1Bkdh1UCpqH9"], "accumulated_threat_level": 0.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "110eedef-8f4a-4aa2-a2f1-a7031e3406fb", "DetectTime": "2024-05-21T12:27:18.766958+00:00", "EventTime": "2024-05-21T12:27:18.766978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfkQ02mOOQgzGgUxc"], "accumulated_threat_level": 9.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "85ef6203-adda-4c48-a4a7-f466f04ed911", "DetectTime": "2024-05-21T12:27:18.772332+00:00", "EventTime": "2024-05-21T12:27:18.772353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.222.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9UdpBFSkXJov1lf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "cf732ef2-f0fe-4921-95ad-2e07676ee23f", "DetectTime": "2024-05-21T12:27:18.783500+00:00", "EventTime": "2024-05-21T12:27:18.783519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjz3nf4B7FuyRPYm6e"], "accumulated_threat_level": 10.4, "timewindow": 31} +{"Format": "IDEA0", "ID": "5a0001dc-5cee-41d9-96fd-8665a2c3dfd8", "DetectTime": "2024-05-21T12:27:18.794886+00:00", "EventTime": "2024-05-21T12:27:18.794907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjuk243OElONcUzbd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 31} +{"Format": "IDEA0", "ID": "5d17816f-534a-4c4f-912c-a3a6e927761f", "DetectTime": "2024-05-21T12:27:18.798822+00:00", "EventTime": "2024-05-21T12:27:18.798840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0bgK71RtqlnINif09"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "37c0964c-b484-4011-9492-d17742503a3d", "DetectTime": "2024-05-21T12:27:18.811937+00:00", "EventTime": "2024-05-21T12:27:18.811961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EtHL2H6OAxyY27Qj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 31} +{"Format": "Json", "ID": "37c0964c-b484-4011-9492-d17742503a3d", "DetectTime": "2024-05-21T12:27:18.811937+00:00", "EventTime": "2024-05-21T12:27:18.811961+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "1970-01-02T06:51:42.664008+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:27:19.039393)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8aa6b4d4-9318-4371-93f6-e60d5a636d3b", "DetectTime": "2024-05-21T12:27:19.051440+00:00", "EventTime": "2024-05-21T12:27:19.051466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnSVA1HHcrFWfq2Jj"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "2ecc64d1-a739-4951-b774-2b4c440846b6", "DetectTime": "2024-05-21T12:27:19.056556+00:00", "EventTime": "2024-05-21T12:27:19.056575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOkk24hHwgbqi6fxd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "bf12fda7-33f1-4918-ae93-53681f85fa6c", "DetectTime": "2024-05-21T12:27:19.070056+00:00", "EventTime": "2024-05-21T12:27:19.070075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDYIP1VCewaIC3QH6"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "d93f67d7-c5f4-4eea-8101-1f25c82cebd9", "DetectTime": "2024-05-21T12:27:19.080397+00:00", "EventTime": "2024-05-21T12:27:19.080417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnKQa3rWF33zxgXZc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "e6779dba-6600-477c-bca8-7544ed7e185a", "DetectTime": "2024-05-21T12:27:19.085372+00:00", "EventTime": "2024-05-21T12:27:19.085392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VMaC3fFmr63G4mYi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "210393d2-beb5-4732-800f-383cfa143aa8", "DetectTime": "2024-05-21T12:27:19.096279+00:00", "EventTime": "2024-05-21T12:27:19.096297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD5Lf1pYmDo9UdxF6"], "accumulated_threat_level": 3.2, "timewindow": 31} +{"Format": "IDEA0", "ID": "3212dd18-1773-44cf-bb68-6f0164c39f07", "DetectTime": "2024-05-21T12:27:19.106281+00:00", "EventTime": "2024-05-21T12:27:19.106298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrzSX3pwOY64Nhxg2"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "09a808fc-2f93-4662-a75b-3af0ad289637", "DetectTime": "2024-05-21T12:27:19.116204+00:00", "EventTime": "2024-05-21T12:27:19.116221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8EMx2X8E7fvX6Chb"], "accumulated_threat_level": 4.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "9ec5a6ab-cee3-4dfd-b069-390c2d104381", "DetectTime": "2024-05-21T12:27:19.134502+00:00", "EventTime": "2024-05-21T12:27:19.134522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdkwV3A0OBQUbWr37"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "0c996ce4-868f-4365-8d7a-2eec1a4f06d5", "DetectTime": "2024-05-21T12:27:19.156893+00:00", "EventTime": "2024-05-21T12:27:19.156920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.242.59.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB26FK3rTPVnLaAot7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "4c8ab9e2-0693-4674-a7d2-714703c6a9c5", "DetectTime": "2024-05-21T12:27:19.185495+00:00", "EventTime": "2024-05-21T12:27:19.185516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUuHVI3lydYWolU423"], "accumulated_threat_level": 5.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "416dbcbc-c5b8-4f62-8ee5-357d3b06c34b", "DetectTime": "2024-05-21T12:27:19.252617+00:00", "EventTime": "2024-05-21T12:27:19.252637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.232.5.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIVnm1yqCR5YzJrwj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "1d83b4f3-6b84-4d8f-ae3a-60d7f7bda8b2", "DetectTime": "2024-05-21T12:27:19.533968+00:00", "EventTime": "2024-05-21T12:27:19.533994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUN82S50XHa9ye4j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "188bf7ff-957f-4704-abce-1f76f50216ee", "DetectTime": "2024-05-21T12:27:19.610794+00:00", "EventTime": "2024-05-21T12:27:19.610817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxcBfU1rLCKW8QzInb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1fd91769-3344-464b-927f-b2f340428f09", "DetectTime": "2024-05-21T12:27:19.674589+00:00", "EventTime": "2024-05-21T12:27:19.674608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.176.133.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CikDho2IpguoVXp39b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "a9513b71-6ea2-496b-aa38-dc5ff4a3adc0", "DetectTime": "2024-05-21T12:27:19.679925+00:00", "EventTime": "2024-05-21T12:27:19.679943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBW9YI2lXHtIgByEH5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "63868896-d213-4e1c-8e45-180eded991b7", "DetectTime": "2024-05-21T12:27:19.715347+00:00", "EventTime": "2024-05-21T12:27:19.715369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhaAl1RxOyHipvoY4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "0e8c4ae0-d2cc-42b8-b892-17f60d68391c", "DetectTime": "2024-05-21T12:27:19.720861+00:00", "EventTime": "2024-05-21T12:27:19.720880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsXff1A4i32WhMMmd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "61a9a3d4-6e96-45d1-93ef-71fd147375e7", "DetectTime": "2024-05-21T12:27:19.759350+00:00", "EventTime": "2024-05-21T12:27:19.759371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcz1V12DuDSmFWlyl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "49490a8e-ac3b-480d-9489-2d78582f1746", "DetectTime": "2024-05-21T12:27:19.782669+00:00", "EventTime": "2024-05-21T12:27:19.782689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoeiJu1vLQyZcHz9B5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "92aa0e0e-0c5e-4561-be68-8d4ef52fc0bf", "DetectTime": "2024-05-21T12:27:19.804541+00:00", "EventTime": "2024-05-21T12:27:19.804563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGya8O3cDmHzg9fSB2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "902f1586-c279-4d3a-b997-b68f4bfece32", "DetectTime": "2024-05-21T12:27:19.851886+00:00", "EventTime": "2024-05-21T12:27:19.851904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEe1S1C3yNFgcPoWh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "fb4590be-f1a9-4fbd-85a2-f1f99418c4a4", "DetectTime": "2024-05-21T12:27:19.880138+00:00", "EventTime": "2024-05-21T12:27:19.880159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrgy52ypwNh5cmJB"], "accumulated_threat_level": 8.799999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "ba0713a4-74e2-406c-a26b-12d69ffc0063", "DetectTime": "2024-05-21T12:27:19.921403+00:00", "EventTime": "2024-05-21T12:27:19.921422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iUUR2hlCtCQjz5dj"], "accumulated_threat_level": 9.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "05c55f3b-ad07-4bc6-a9b9-3b7a2a6e53ab", "DetectTime": "2024-05-21T12:27:19.950824+00:00", "EventTime": "2024-05-21T12:27:19.950844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.253.163.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8108/UDP destination IP 124.253.163.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3YtN16bht4HgzLn5"], "accumulated_threat_level": 10.4, "timewindow": 31} +{"Format": "IDEA0", "ID": "86be09dc-2417-40d2-89ab-eec61f4e1877", "DetectTime": "2024-05-21T12:27:19.968429+00:00", "EventTime": "2024-05-21T12:27:19.968449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiBAXv3R9dDnzE4uRd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "356bccfb-4be2-4090-99cf-06847c85cc40", "DetectTime": "2024-05-21T12:27:20.006589+00:00", "EventTime": "2024-05-21T12:27:20.006607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C42sOC1a44kjOCkynk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 31} +{"Format": "IDEA0", "ID": "a4059f09-2a48-402b-a91b-e2eae6132004", "DetectTime": "2024-05-21T12:27:20.034534+00:00", "EventTime": "2024-05-21T12:27:20.034554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJrQAv4Ih2kH0yeu41"], "accumulated_threat_level": 12.000000000000002, "timewindow": 31} +{"Format": "Json", "ID": "a4059f09-2a48-402b-a91b-e2eae6132004", "DetectTime": "2024-05-21T12:27:20.034534+00:00", "EventTime": "2024-05-21T12:27:20.034554+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "1970-01-02T06:53:17.974693+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:27:20.245126)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c8512b87-bb0e-4be3-b186-a5c35a503113", "DetectTime": "2024-05-21T12:27:20.279584+00:00", "EventTime": "2024-05-21T12:27:20.279606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWf6F4ECfrb09k636"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "967e8f38-5cdb-47d5-9a08-3cb657217444", "DetectTime": "2024-05-21T12:27:20.300868+00:00", "EventTime": "2024-05-21T12:27:20.300888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8IK3a1H2mZlNewLCk"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "fa9f7cfe-b6ac-42d3-b43c-746a6bb14988", "DetectTime": "2024-05-21T12:27:20.353020+00:00", "EventTime": "2024-05-21T12:27:20.353039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjHeII3ZQStj6g5CF4"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "895c544f-1507-4a17-9428-827642b1e0d1", "DetectTime": "2024-05-21T12:27:20.382900+00:00", "EventTime": "2024-05-21T12:27:20.382918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8D2o2JREVoF1A6tf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "69a5d70d-b62a-4111-92c5-4f7a6b82142c", "DetectTime": "2024-05-21T12:27:20.407922+00:00", "EventTime": "2024-05-21T12:27:20.407942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVyck1QGbIcMb4Dxh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "96ca04c6-24c9-47d3-9308-d35557adffae", "DetectTime": "2024-05-21T12:27:20.433136+00:00", "EventTime": "2024-05-21T12:27:20.433156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQe8v1G6naCxihfp"], "accumulated_threat_level": 3.2, "timewindow": 31} +{"Format": "IDEA0", "ID": "c0765eb2-c5f8-4222-b246-83a84d77adbe", "DetectTime": "2024-05-21T12:27:20.460551+00:00", "EventTime": "2024-05-21T12:27:20.460569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYLQ51z4rrrVpnYai"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "0b08854c-a14e-47af-9a37-2a5331300231", "DetectTime": "2024-05-21T12:27:20.514371+00:00", "EventTime": "2024-05-21T12:27:20.514392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFEt9tRz18TRysZa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "dca29374-015b-4a13-98f5-a998bea79f66", "DetectTime": "2024-05-21T12:27:20.536157+00:00", "EventTime": "2024-05-21T12:27:20.536176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.205.60"]}], "Attach": [{"Content": "Connection to unknown destination port 20786/UDP destination IP 94.64.205.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIJ172bshhbi1OaOg"], "accumulated_threat_level": 4.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "ffc3b5a0-b698-4c5b-87d9-9de0e954a6b8", "DetectTime": "2024-05-21T12:27:20.632799+00:00", "EventTime": "2024-05-21T12:27:20.632821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQGWncPGu7UO5Cve"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "d214c2b4-0d83-4d65-b203-7caa698d4b7e", "DetectTime": "2024-05-21T12:27:20.644756+00:00", "EventTime": "2024-05-21T12:27:20.644775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnxjF12P0mw6DDOe3"], "accumulated_threat_level": 5.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "c97ca3d7-d8ef-40d8-ae33-1f60317a6893", "DetectTime": "2024-05-21T12:27:20.649533+00:00", "EventTime": "2024-05-21T12:27:20.649555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNyDo52Hsq5vJudCO2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "6d985485-9566-4ca4-850d-f157bc85f967", "DetectTime": "2024-05-21T12:27:20.684503+00:00", "EventTime": "2024-05-21T12:27:20.684524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszyXQ1ZaDEox5Fite"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "e2a19f24-fb38-4056-ae89-ff4656aeccf1", "DetectTime": "2024-05-21T12:27:20.713511+00:00", "EventTime": "2024-05-21T12:27:20.713531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmi5vX23ihvDRgjPyi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "f5296f77-05ad-4fef-a497-4c183dd57822", "DetectTime": "2024-05-21T12:27:20.945869+00:00", "EventTime": "2024-05-21T12:27:20.945889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEmjNv4UN3ANAonSLb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "ba44fd42-2d00-4fab-a9cf-6b2bad6d7e7a", "DetectTime": "2024-05-21T12:27:21.031629+00:00", "EventTime": "2024-05-21T12:27:21.031651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cql3ON1TB2gGxukYBa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "62957f9f-4189-4094-8e69-dd10c02964b6", "DetectTime": "2024-05-21T12:27:21.036365+00:00", "EventTime": "2024-05-21T12:27:21.036384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0DCxJkklENRyWOca"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "ac02ecb0-7be5-4da9-aee2-bc5f4fbe2795", "DetectTime": "2024-05-21T12:27:21.041005+00:00", "EventTime": "2024-05-21T12:27:21.041024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GLvk4u3mchcnZ4Sf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "90933399-9e6f-4241-b071-965dbd103081", "DetectTime": "2024-05-21T12:27:21.045921+00:00", "EventTime": "2024-05-21T12:27:21.045939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrXru1NcT402zUrWl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "4baf7243-8602-4bbd-b331-54115cd8d36f", "DetectTime": "2024-05-21T12:27:21.070763+00:00", "EventTime": "2024-05-21T12:27:21.070781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPw9Ay23aOSCmHNLWa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "7d7e81d6-896c-4e06-8213-31cff49a2ab0", "DetectTime": "2024-05-21T12:27:21.087028+00:00", "EventTime": "2024-05-21T12:27:21.087049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYJDwvvn9oUGbyv7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "7ddf26af-5db1-4436-82cd-92f3002e92aa", "DetectTime": "2024-05-21T12:27:21.092016+00:00", "EventTime": "2024-05-21T12:27:21.092034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ced60t4zOgtI6pobVg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "460c96d1-0524-4b75-98c7-1bf9de2dd6ed", "DetectTime": "2024-05-21T12:27:21.148689+00:00", "EventTime": "2024-05-21T12:27:21.148712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxDqe53AwqydcdvzW9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "3066c18e-f287-41e4-a97e-fa1c28a157ed", "DetectTime": "2024-05-21T12:27:21.162655+00:00", "EventTime": "2024-05-21T12:27:21.162675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct3mPy1mykqO3Ru6dl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "79464987-c30c-4f64-b1ff-a3e00fac8eb8", "DetectTime": "2024-05-21T12:27:21.192147+00:00", "EventTime": "2024-05-21T12:27:21.192166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYPzZ2Br6OtsZ4nK9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "7a0741c7-1547-4503-b8f9-8fbf0f8fff5d", "DetectTime": "2024-05-21T12:27:21.216391+00:00", "EventTime": "2024-05-21T12:27:21.216410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeKex1WCTMXHTfY1b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "7d49462e-9fac-44b0-95fd-8ce28ed84e18", "DetectTime": "2024-05-21T12:27:21.221304+00:00", "EventTime": "2024-05-21T12:27:21.221322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32uKc2fSt9ZgRwpHg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "9fc7f4f1-04ef-4cd6-be97-0bb247477adb", "DetectTime": "2024-05-21T12:27:21.262720+00:00", "EventTime": "2024-05-21T12:27:21.262742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWETZLWKMfOrQEFk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "df89af95-43bf-48ca-81d3-29dc37a1bc69", "DetectTime": "2024-05-21T12:27:21.284137+00:00", "EventTime": "2024-05-21T12:27:21.284158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZD2l3b7Wse5yfBI8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "77d423d8-d40c-4a37-801e-92af59a85394", "DetectTime": "2024-05-21T12:27:21.299158+00:00", "EventTime": "2024-05-21T12:27:21.299181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.222.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShllo2oivbpIkPXHb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "6004d0d2-98f5-4233-9cbd-b50229c2b915", "DetectTime": "2024-05-21T12:27:21.321894+00:00", "EventTime": "2024-05-21T12:27:21.321914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDLewa4YBVtJQolQQ2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7fa92bdf-f720-4fe4-8e86-4c3b77c80034", "DetectTime": "2024-05-21T12:27:21.350595+00:00", "EventTime": "2024-05-21T12:27:21.350625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79XDbEWxkYzoEc8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "784c39c0-3c66-41dd-aa1e-c846d28d1c1e", "DetectTime": "2024-05-21T12:27:21.377285+00:00", "EventTime": "2024-05-21T12:27:21.377307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQjPz2zKJyeZmxdQ4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "01d91fa5-3e71-4753-aac2-8ccee664bfcf", "DetectTime": "2024-05-21T12:27:21.428319+00:00", "EventTime": "2024-05-21T12:27:21.428339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBNJ7333PekbIl7Sa6"], "accumulated_threat_level": 9.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "1ec6dca8-0f2e-4483-8f55-960d6d0f26e0", "DetectTime": "2024-05-21T12:27:21.517688+00:00", "EventTime": "2024-05-21T12:27:21.517709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.98.24"]}], "Attach": [{"Content": "Connection to unknown destination port 14730/UDP destination IP 122.170.98.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7B6561DVVwzhY2Mh"], "accumulated_threat_level": 10.4, "timewindow": 31} +{"Format": "IDEA0", "ID": "f0a65a1f-dc18-43ca-812f-de06f1b954e9", "DetectTime": "2024-05-21T12:27:21.630456+00:00", "EventTime": "2024-05-21T12:27:21.630479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoTUKp3Pc0o3QfGjb8"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "e51447af-6c8b-48fe-8b0a-179ecab1a972", "DetectTime": "2024-05-21T12:27:21.654164+00:00", "EventTime": "2024-05-21T12:27:21.654185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.222.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCyiu31HKQR3xRrp5"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "f481845c-f4be-47dc-accd-d1ad79364c30", "DetectTime": "2024-05-21T12:27:21.675437+00:00", "EventTime": "2024-05-21T12:27:21.675456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBaxQD48hpCrTjAwo1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 31} +{"Format": "IDEA0", "ID": "bf6ddf5f-bdfe-4022-b1fe-72ce2ce9a102", "DetectTime": "2024-05-21T12:27:21.706697+00:00", "EventTime": "2024-05-21T12:27:21.706720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.134.193.60"]}], "Attach": [{"Content": "Connection to unknown destination port 1976/UDP destination IP 112.134.193.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOxL8eFO4kPRwb36"], "accumulated_threat_level": 12.000000000000002, "timewindow": 31} +{"Format": "Json", "ID": "bf6ddf5f-bdfe-4022-b1fe-72ce2ce9a102", "DetectTime": "2024-05-21T12:27:21.706697+00:00", "EventTime": "2024-05-21T12:27:21.706720+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.134.193.60"]}], "Attach": [{"Content": "1970-01-02T06:55:06.246766+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:27:21.963145)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "23306c6d-28fa-473a-a23c-c5b50b581bd6", "DetectTime": "2024-05-21T12:27:21.975549+00:00", "EventTime": "2024-05-21T12:27:21.975574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClmVg31TwuxzZvFjXk"], "accumulated_threat_level": 0.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "b67488f7-9a44-4d43-b734-1ed78420947e", "DetectTime": "2024-05-21T12:27:21.986995+00:00", "EventTime": "2024-05-21T12:27:21.987014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COaO2C2ZZ0m1KE72Xe"], "accumulated_threat_level": 1.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "ee8d2fdd-6af3-470b-b8e8-1f0c7357a65d", "DetectTime": "2024-05-21T12:27:21.991641+00:00", "EventTime": "2024-05-21T12:27:21.991658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISADu16pGppmbL3qi"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9fd4b403-3b15-4492-a39d-8e4a3e805ed6", "DetectTime": "2024-05-21T12:27:22.132750+00:00", "EventTime": "2024-05-21T12:27:22.132773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNy0rYwqMbvgWlt6"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "22eb1c4f-4275-4c3d-806c-38f4f3c82020", "DetectTime": "2024-05-21T12:27:22.338923+00:00", "EventTime": "2024-05-21T12:27:22.338942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfYZy1kBFqk3aJB7l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 31} +{"Format": "IDEA0", "ID": "7a77c6aa-2803-4065-a173-d6d462dd42f5", "DetectTime": "2024-05-21T12:27:22.379351+00:00", "EventTime": "2024-05-21T12:27:22.379380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptTbn4Gml6ckkbEx8"], "accumulated_threat_level": 3.2, "timewindow": 31} +{"Format": "IDEA0", "ID": "c71cecec-7076-40c0-9048-d81f7f926a17", "DetectTime": "2024-05-21T12:27:22.406516+00:00", "EventTime": "2024-05-21T12:27:22.406541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctw99O30bHfF8mfvL1"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a62dd590-c677-4b9d-b6ca-a87083f8ff22", "DetectTime": "2024-05-21T12:27:22.424364+00:00", "EventTime": "2024-05-21T12:27:22.424385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0eIl4HUrpzx34dD4"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "ab282e4c-21db-4739-bdce-310f1f3d90e4", "DetectTime": "2024-05-21T12:27:22.448609+00:00", "EventTime": "2024-05-21T12:27:22.448631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2mUzS15h0iXAErkHe"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "3e0cdcb1-f612-4d55-8f2a-cb80d8056dff", "DetectTime": "2024-05-21T12:27:22.479026+00:00", "EventTime": "2024-05-21T12:27:22.479046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3cjo3hQTGlXu2DIa"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "27f25dd8-0a03-4a6a-acd9-efc8cfa8cb0f", "DetectTime": "2024-05-21T12:27:22.505231+00:00", "EventTime": "2024-05-21T12:27:22.505249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuDaAkhKRLDzrHN3"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "8f15447d-edbe-4d54-88fc-064691cf48db", "DetectTime": "2024-05-21T12:27:22.558528+00:00", "EventTime": "2024-05-21T12:27:22.558548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOeTR3nfvk1MgYwt"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9fb1822c-459a-4a2e-aa8a-fc82d1c6bb34", "DetectTime": "2024-05-21T12:27:22.577376+00:00", "EventTime": "2024-05-21T12:27:22.577398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95Glb2F8cTPbnNubb"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "f0b50f4d-ae42-480d-8d58-d48b29202524", "DetectTime": "2024-05-21T12:27:22.597932+00:00", "EventTime": "2024-05-21T12:27:22.597953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIePOpIj2Nvw0IEg"], "accumulated_threat_level": 4.8, "timewindow": 31} +{"Format": "IDEA0", "ID": "9d6cfa51-e48f-4191-b8b3-dc235f3a0782", "DetectTime": "2024-05-21T12:27:22.893498+00:00", "EventTime": "2024-05-21T12:27:22.893517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwN8s1KlKwbwF4tk5"], "accumulated_threat_level": 5.6, "timewindow": 31} +{"Format": "IDEA0", "ID": "253e8e28-da30-4123-91ba-47566911a90c", "DetectTime": "2024-05-21T12:27:22.910275+00:00", "EventTime": "2024-05-21T12:27:22.910295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZeLp34gtJUFjgsGf"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9406f98c-d7dd-4d8e-9dca-c2f7e466a21b", "DetectTime": "2024-05-21T12:27:22.932776+00:00", "EventTime": "2024-05-21T12:27:22.932795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLyPeRBP4N9PQHMc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 31} +{"Format": "IDEA0", "ID": "d34d2f28-e966-4334-abca-f29368fb4aa0", "DetectTime": "2024-05-21T12:27:22.948758+00:00", "EventTime": "2024-05-21T12:27:22.948776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHcNJ82kOwTRpn3tIe"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "869f409d-7a23-4c9d-9b35-38450671474f", "DetectTime": "2024-05-21T12:27:22.974376+00:00", "EventTime": "2024-05-21T12:27:22.974398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9gkN2RY52OIJLo22"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "7d561199-b1fc-4f8b-a5e8-97b182c5dfc3", "DetectTime": "2024-05-21T12:27:22.996026+00:00", "EventTime": "2024-05-21T12:27:22.996047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctf50r3BFz5xUnU1x4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7e3b031c-86bd-430b-849b-58361142fc12", "DetectTime": "2024-05-21T12:27:23.024290+00:00", "EventTime": "2024-05-21T12:27:23.024310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Q67j4gkiVfEHPZy6"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "f7a03827-b496-4578-b3f4-ddb8b8b9090d", "DetectTime": "2024-05-21T12:27:23.130505+00:00", "EventTime": "2024-05-21T12:27:23.130527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNgi42Xj6JdeS87kh"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "23841c99-c27d-4ca1-954c-0eee18e76d66", "DetectTime": "2024-05-21T12:27:23.266536+00:00", "EventTime": "2024-05-21T12:27:23.266556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPakr4Fx5INm0ZiL8"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "53e97590-9788-449b-aeba-906b61dfda89", "DetectTime": "2024-05-21T12:27:23.276393+00:00", "EventTime": "2024-05-21T12:27:23.276412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJwMVP3yT0lNK4bll4"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "a4fb2a31-6b62-4f1a-87e7-aba6a8f7f505", "DetectTime": "2024-05-21T12:27:23.310122+00:00", "EventTime": "2024-05-21T12:27:23.310141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crr6xC4mazDMaKz15c"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "3bde1c3b-cf87-49c7-8988-2ba028ed5dd2", "DetectTime": "2024-05-21T12:27:23.320369+00:00", "EventTime": "2024-05-21T12:27:23.320388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COK2vF2eyJaI8Q0Dua"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "842d2d20-3789-4e9c-8e37-866b87455697", "DetectTime": "2024-05-21T12:27:23.334652+00:00", "EventTime": "2024-05-21T12:27:23.334672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1O0U3XeMRsuUFPH8"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "8578f789-0434-47ac-b466-341809e0efa0", "DetectTime": "2024-05-21T12:27:23.371563+00:00", "EventTime": "2024-05-21T12:27:23.371582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrlwW12nlxnJ34SB0f"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "ce674ae3-34c0-4f36-8d65-a3ec96c30b94", "DetectTime": "2024-05-21T12:27:23.421239+00:00", "EventTime": "2024-05-21T12:27:23.421257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFico1u5UdDy1sCP"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "ccf04724-d0d8-4e88-9351-d828415280d0", "DetectTime": "2024-05-21T12:27:23.449937+00:00", "EventTime": "2024-05-21T12:27:23.449955+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.200.82.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.200.82.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHAWM3eMxMY6V6WYf"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0e469c91-81f3-4879-9cd9-01efddb5379a", "DetectTime": "2024-05-21T12:27:23.461636+00:00", "EventTime": "2024-05-21T12:27:23.461654+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.200.82.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.200.82.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHAWM3eMxMY6V6WYf"], "accumulated_threat_level": 1.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "596fd91b-c245-4c95-aeec-86f80cbabc4f", "DetectTime": "2024-05-21T12:27:23.504022+00:00", "EventTime": "2024-05-21T12:27:23.504042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVfqY16y91zXap4L2"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "4def430e-32e5-4040-a820-5d1ed501198b", "DetectTime": "2024-05-21T12:27:23.559288+00:00", "EventTime": "2024-05-21T12:27:23.559315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFSQE1zXlEMPwq32f"], "accumulated_threat_level": 0.8, "timewindow": 32} +{"Format": "IDEA0", "ID": "02182a4d-9d3f-4405-a14d-c19aeb58ccfe", "DetectTime": "2024-05-21T12:27:23.586124+00:00", "EventTime": "2024-05-21T12:27:23.586143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGsBzw45vuKuJpUCV1"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9efcf219-5c51-4135-93c6-541f1f7bd24b", "DetectTime": "2024-05-21T12:27:23.741369+00:00", "EventTime": "2024-05-21T12:27:23.741392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTOJs3vld5WHIdr5d", "CMuAtm42nfIX3Gk9Fj", "CaojU61BisnbVrd1z5", "Ccb8GG3un64gVqqtYa"], "accumulated_threat_level": 1.3, "timewindow": 32} +{"Format": "IDEA0", "ID": "07224a13-452b-49e4-8b13-b5dcb0ba22b0", "DetectTime": "2024-05-21T12:27:24.022729+00:00", "EventTime": "2024-05-21T12:27:24.022748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBRMP29iugrOYNqd7"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "84e4360e-e66d-473f-92fe-31bb00ee8c61", "DetectTime": "2024-05-21T12:27:24.059664+00:00", "EventTime": "2024-05-21T12:27:24.059686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipvnVPmNbjr5cOHk"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "d231948c-cec5-456a-8408-f22be2d9fef8", "DetectTime": "2024-05-21T12:27:24.109826+00:00", "EventTime": "2024-05-21T12:27:24.109844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPs7GT18aMhkF4GoS2"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "0324a4f6-3d30-4ff0-89a1-838e76a6349e", "DetectTime": "2024-05-21T12:27:24.139727+00:00", "EventTime": "2024-05-21T12:27:24.139749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBZQBIefyraHUsaa"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "3e73cf34-67d9-446e-afb1-79de7506ac65", "DetectTime": "2024-05-21T12:27:24.163221+00:00", "EventTime": "2024-05-21T12:27:24.163243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7coyL172zbrnUqBai"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "ad6da03f-6f8b-4734-8ea2-a11ab39164fa", "DetectTime": "2024-05-21T12:27:24.236457+00:00", "EventTime": "2024-05-21T12:27:24.236480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch85Ap4DT9Io90LvPi"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "b8305a99-39f2-4269-b5ff-8832af87db24", "DetectTime": "2024-05-21T12:27:24.285033+00:00", "EventTime": "2024-05-21T12:27:24.285055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMf8p6182YjYNXb6r4"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9cc74781-1c82-4bea-b76b-3b1ff45a827f", "DetectTime": "2024-05-21T12:27:24.427973+00:00", "EventTime": "2024-05-21T12:27:24.427996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9d5O27hlr7wfRwIg"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "6f93b8e6-7b5f-4ec0-a816-670fe08dadd6", "DetectTime": "2024-05-21T12:27:24.533686+00:00", "EventTime": "2024-05-21T12:27:24.533705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cbW11xHkzDycQgpl"], "accumulated_threat_level": 2.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "3c9e67d9-de16-428a-be61-e845ed3b0802", "DetectTime": "2024-05-21T12:27:24.560633+00:00", "EventTime": "2024-05-21T12:27:24.560651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxU6i1P8LmZ9aZxW1"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 32} +{"Format": "IDEA0", "ID": "3ab0a12c-decd-4142-b5c9-5868030eea26", "DetectTime": "2024-05-21T12:27:24.603178+00:00", "EventTime": "2024-05-21T12:27:24.603195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfs5PO2m7Qa0quSLM1"], "accumulated_threat_level": 3.7, "timewindow": 32} +{"Format": "IDEA0", "ID": "3618b76b-c918-4692-9fe8-6c8025b700b2", "DetectTime": "2024-05-21T12:27:24.660606+00:00", "EventTime": "2024-05-21T12:27:24.660630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czl4dH170JV8wuqELb"], "accumulated_threat_level": 4.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "eb9bd83a-d361-4382-9eca-3da6d5acc301", "DetectTime": "2024-05-21T12:27:24.756609+00:00", "EventTime": "2024-05-21T12:27:24.756628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiL6oh24S9Enqicznc"], "accumulated_threat_level": 5.3, "timewindow": 32} +{"Format": "IDEA0", "ID": "2a1c5ea5-a064-4953-b42e-972cbf5f052d", "DetectTime": "2024-05-21T12:27:24.785575+00:00", "EventTime": "2024-05-21T12:27:24.785595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hX733DD3Q8dboQml"], "accumulated_threat_level": 6.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "77724a92-c151-4da2-8c53-e59e8f0f669f", "DetectTime": "2024-05-21T12:27:24.937977+00:00", "EventTime": "2024-05-21T12:27:24.937998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJxjq4vf0fEbSfRBf"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 32} +{"Format": "IDEA0", "ID": "54041b98-3cde-4010-b343-aec8929f5ed5", "DetectTime": "2024-05-21T12:27:25.221305+00:00", "EventTime": "2024-05-21T12:27:25.221328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1NO74rI7zgfVGq25"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "f4622411-04bc-4c33-822b-db291818f246", "DetectTime": "2024-05-21T12:27:25.226170+00:00", "EventTime": "2024-05-21T12:27:25.226189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.127.137.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzT9Tggik8s2jbOc3"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "4d7e7f78-4d51-4f79-888e-5ad65a40268f", "DetectTime": "2024-05-21T12:27:25.250773+00:00", "EventTime": "2024-05-21T12:27:25.250795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.102.120.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuyDOL1zgeevQD7ZG5"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "534687c6-470e-412a-99b8-c11a6321b4b8", "DetectTime": "2024-05-21T12:27:25.321856+00:00", "EventTime": "2024-05-21T12:27:25.321875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBF1y4T0ob3Gz7w9"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "6bd2283d-fd10-49b8-9cde-0b1b16cc9e1f", "DetectTime": "2024-05-21T12:27:25.350111+00:00", "EventTime": "2024-05-21T12:27:25.350133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSACnz1f4UD7uGtdeh"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "bd3ac2a2-cfb2-484f-adb7-62c66ac8c9e7", "DetectTime": "2024-05-21T12:27:25.362004+00:00", "EventTime": "2024-05-21T12:27:25.362026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHGy6nZlxMUSOfA8"], "accumulated_threat_level": 7.699999999999999, "timewindow": 32} +{"Format": "IDEA0", "ID": "a63bc137-9ec7-4b75-b9b0-c60b90890f97", "DetectTime": "2024-05-21T12:27:25.400315+00:00", "EventTime": "2024-05-21T12:27:25.400338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TefB3XQEOw72l20k"], "accumulated_threat_level": 8.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "72691122-a2e4-4586-b3cd-c57487061764", "DetectTime": "2024-05-21T12:27:25.425599+00:00", "EventTime": "2024-05-21T12:27:25.425617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdLn016HcazN1Dfgb"], "accumulated_threat_level": 9.3, "timewindow": 32} +{"Format": "IDEA0", "ID": "f8fc4b4c-1383-4f3b-9f3d-04b56ee7549c", "DetectTime": "2024-05-21T12:27:25.453603+00:00", "EventTime": "2024-05-21T12:27:25.453621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfmph4LEEqVPzKWR2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 32} +{"Format": "IDEA0", "ID": "fe50add8-2e7d-4f0d-b101-8e91dbfb107b", "DetectTime": "2024-05-21T12:27:25.485024+00:00", "EventTime": "2024-05-21T12:27:25.485041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT4ipOsUo0da04iMk"], "accumulated_threat_level": 10.900000000000002, "timewindow": 32} +{"Format": "IDEA0", "ID": "e86e0e2c-fcfb-4515-aa48-0434935100b9", "DetectTime": "2024-05-21T12:27:25.510960+00:00", "EventTime": "2024-05-21T12:27:25.510982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoCAxx3MpwQkFM47D5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 32} +{"Format": "IDEA0", "ID": "63cbfaeb-100b-4191-9949-e800420d9266", "DetectTime": "2024-05-21T12:27:25.537646+00:00", "EventTime": "2024-05-21T12:27:25.537675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3F1I61rJ7a25zOu45"], "accumulated_threat_level": 12.500000000000004, "timewindow": 32} +{"Format": "Json", "ID": "63cbfaeb-100b-4191-9949-e800420d9266", "DetectTime": "2024-05-21T12:27:25.537646+00:00", "EventTime": "2024-05-21T12:27:25.537675+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "1970-01-02T07:28:18.142382+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2024/05/21 12:27:25.761322)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 32, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "bd79f451-f1a1-496a-a02b-6e46a9e03c95", "DetectTime": "2024-05-21T12:27:25.771691+00:00", "EventTime": "2024-05-21T12:27:25.771710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUusQw4X7vQQ8exrKa"], "accumulated_threat_level": 0.8, "timewindow": 32} +{"Format": "IDEA0", "ID": "a1877297-b38d-4f8c-b559-4166673c7226", "DetectTime": "2024-05-21T12:27:25.783484+00:00", "EventTime": "2024-05-21T12:27:25.783505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIB5y4SEBlJuf4OL2"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "3642db5d-239e-46b3-821e-7553a1195d7d", "DetectTime": "2024-05-21T12:27:25.791877+00:00", "EventTime": "2024-05-21T12:27:25.791895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCe2S2HZMmqhMO64c", "CfLtO54UJDZxV2y0Ci", "CtRJwV3Y320p8WcVef", "Cl4rVQ1qjTvLjABjh3"], "accumulated_threat_level": 2.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "6161935f-e93a-4f22-85ee-8f90a0988ae7", "DetectTime": "2024-05-21T12:27:25.801825+00:00", "EventTime": "2024-05-21T12:27:25.801843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbrbw4nKFUFb5qY13"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 32} +{"Format": "IDEA0", "ID": "56aaa8fb-2b54-438e-9450-d5d2681897ef", "DetectTime": "2024-05-21T12:27:25.821313+00:00", "EventTime": "2024-05-21T12:27:25.821333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKfK54sNIJhOllwKc"], "accumulated_threat_level": 3.7, "timewindow": 32} +{"Format": "IDEA0", "ID": "45a0f8bb-ca92-4004-a6c4-ee7c0eb623e1", "DetectTime": "2024-05-21T12:27:25.844293+00:00", "EventTime": "2024-05-21T12:27:25.844311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLnpZC18axPgPGjmf4"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "f3c72e02-8f74-42b1-8a19-70128355398b", "DetectTime": "2024-05-21T12:27:25.866317+00:00", "EventTime": "2024-05-21T12:27:25.866335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3r2cC19oWT5kuxTIf"], "accumulated_threat_level": 4.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "bda550e8-029f-496b-98d3-4ceb2a54b66d", "DetectTime": "2024-05-21T12:27:25.896031+00:00", "EventTime": "2024-05-21T12:27:25.896050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLlP56IZU6HsPP1e"], "accumulated_threat_level": 5.3, "timewindow": 32} +{"Format": "IDEA0", "ID": "92e1ffe0-f0d9-4da9-b1ef-ab3b605a4046", "DetectTime": "2024-05-21T12:27:25.934539+00:00", "EventTime": "2024-05-21T12:27:25.934557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BwrW1Mlr4vTYZem"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "ccc7472c-9c4e-4223-ae60-14de38838af5", "DetectTime": "2024-05-21T12:27:25.965583+00:00", "EventTime": "2024-05-21T12:27:25.965602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxWaGzZOlzAkuGRL1"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "7e861503-8828-466a-8d9c-4e09d2472c53", "DetectTime": "2024-05-21T12:27:25.988814+00:00", "EventTime": "2024-05-21T12:27:25.988834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE5HT1ocrCWgR3Qt"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "49e20d25-60a4-45aa-8b65-fd43169bbf33", "DetectTime": "2024-05-21T12:27:26.054754+00:00", "EventTime": "2024-05-21T12:27:26.054777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9GTtmpIeQf7teid"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "2b2d5187-e718-404a-bae6-3364597ad041", "DetectTime": "2024-05-21T12:27:26.059589+00:00", "EventTime": "2024-05-21T12:27:26.059607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoLvE3mwZ4z8c9qE9"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "5a1972f9-64f7-4c88-907a-ec523186880a", "DetectTime": "2024-05-21T12:27:26.096406+00:00", "EventTime": "2024-05-21T12:27:26.096427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqzvDT1FVp13gHrgUi"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "d05d3bc2-4ea9-403e-a97c-b49cb288efbc", "DetectTime": "2024-05-21T12:27:26.117883+00:00", "EventTime": "2024-05-21T12:27:26.117903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0f9p451VEcNvSqt6"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "fa238247-175d-4efa-b8f8-080227c4e8db", "DetectTime": "2024-05-21T12:27:26.139152+00:00", "EventTime": "2024-05-21T12:27:26.139173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJ6pU20NLqT2DJrVh"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "a4d96871-7ca0-4034-8522-8de48c38ad41", "DetectTime": "2024-05-21T12:27:26.161270+00:00", "EventTime": "2024-05-21T12:27:26.161288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE5n2DoZ0GjGHtru1"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "5417383a-af83-47ea-a1ce-654065679b1a", "DetectTime": "2024-05-21T12:27:26.398303+00:00", "EventTime": "2024-05-21T12:27:26.398325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGOkN2Xek3L9frEX9"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "ec437571-b687-4b70-bac9-acec4a379f20", "DetectTime": "2024-05-21T12:27:26.427178+00:00", "EventTime": "2024-05-21T12:27:26.427199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ExKE3jlpqIg1xKrk"], "accumulated_threat_level": 6.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "b33802c1-e667-4946-9493-1c66eeff8bc8", "DetectTime": "2024-05-21T12:27:26.438185+00:00", "EventTime": "2024-05-21T12:27:26.438207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxej57c3EiRdqODo"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "0acbb036-9720-4371-8830-44c5256ea9ee", "DetectTime": "2024-05-21T12:27:26.466787+00:00", "EventTime": "2024-05-21T12:27:26.466809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYz4grN0CL7l90Oi"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "2db2e94a-ab74-4ce9-85fb-09ed7bcdc973", "DetectTime": "2024-05-21T12:27:26.492872+00:00", "EventTime": "2024-05-21T12:27:26.492891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHr8FYkPxWLxW51We"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 32} +{"Format": "IDEA0", "ID": "1b5c38f6-dc70-4cc2-9b96-c7eb37cb1200", "DetectTime": "2024-05-21T12:27:26.512907+00:00", "EventTime": "2024-05-21T12:27:26.512928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COo2cI1dqxDOIYgJdg"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "8e905598-a16e-4ab8-9fde-a4cf7b78eec6", "DetectTime": "2024-05-21T12:27:26.546072+00:00", "EventTime": "2024-05-21T12:27:26.546090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIbv7D438CjcKinu6a"], "accumulated_threat_level": 7.699999999999999, "timewindow": 32} +{"Format": "IDEA0", "ID": "58419400-645e-473e-bfba-6f8a2afb6e5a", "DetectTime": "2024-05-21T12:27:26.550969+00:00", "EventTime": "2024-05-21T12:27:26.550987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqiEnc6Cfzg3CjB2"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9b6178d6-f9a1-4d98-8842-b02c42dda69e", "DetectTime": "2024-05-21T12:27:26.581555+00:00", "EventTime": "2024-05-21T12:27:26.581577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpiKG1RX3nMhyzxJa"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "d4f05bbe-3353-4f2e-9102-10e4fa963b41", "DetectTime": "2024-05-21T12:27:26.609838+00:00", "EventTime": "2024-05-21T12:27:26.609862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz0Oep1RvgkZjKybc2"], "accumulated_threat_level": 8.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "ea0be983-48fb-4b14-8f14-51e7b2bd813e", "DetectTime": "2024-05-21T12:27:26.621964+00:00", "EventTime": "2024-05-21T12:27:26.621984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31Rdu3hmvviJdZ4ng"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "d97fb550-cf4e-4592-81ee-10c8f261e95a", "DetectTime": "2024-05-21T12:27:26.646525+00:00", "EventTime": "2024-05-21T12:27:26.646547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFuRAK3W2AG2L1zdWg"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "c45a709a-f0b5-47f8-bd68-ac8c926b1a4a", "DetectTime": "2024-05-21T12:27:26.676220+00:00", "EventTime": "2024-05-21T12:27:26.676240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatwHp5L9FUVCW5hl"], "accumulated_threat_level": 9.3, "timewindow": 32} +{"Format": "IDEA0", "ID": "c0bec5a4-0fac-430d-9f56-53dd60881454", "DetectTime": "2024-05-21T12:27:26.684409+00:00", "EventTime": "2024-05-21T12:27:26.684429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZ8t1219uNboY2Jn7"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "553a7c72-dd4c-4858-bb8b-e9c78a326796", "DetectTime": "2024-05-21T12:27:26.751641+00:00", "EventTime": "2024-05-21T12:27:26.751661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAH6IqJcBxAjnnrG8"], "accumulated_threat_level": 10.100000000000001, "timewindow": 32} +{"Format": "IDEA0", "ID": "09d64eda-236e-44b2-ba33-54a6f0d9cfa4", "DetectTime": "2024-05-21T12:27:26.769878+00:00", "EventTime": "2024-05-21T12:27:26.769896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBsIn1EFjxcU79Z5d"], "accumulated_threat_level": 10.900000000000002, "timewindow": 32} +{"Format": "IDEA0", "ID": "06345c93-bb5b-4b79-9d6d-0e7418607d38", "DetectTime": "2024-05-21T12:27:26.798951+00:00", "EventTime": "2024-05-21T12:27:26.798975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.64.205.60"]}], "Attach": [{"Content": "Connection to unknown destination port 20786/UDP destination IP 94.64.205.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfTg91gy4o11TjtIk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 32} +{"Format": "IDEA0", "ID": "f0bade48-9d0a-4ce2-a665-59e54ae91acf", "DetectTime": "2024-05-21T12:27:26.824915+00:00", "EventTime": "2024-05-21T12:27:26.824934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85zTL38L9QMIYuPM"], "accumulated_threat_level": 12.500000000000004, "timewindow": 32} +{"Format": "Json", "ID": "f0bade48-9d0a-4ce2-a665-59e54ae91acf", "DetectTime": "2024-05-21T12:27:26.824915+00:00", "EventTime": "2024-05-21T12:27:26.824934+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "1970-01-02T07:28:54.619533+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2024/05/21 12:27:27.044466)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 32, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "764cc0cb-14fc-4a2c-898a-cfa3e187842c", "DetectTime": "2024-05-21T12:27:27.055964+00:00", "EventTime": "2024-05-21T12:27:27.055988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedJjj4t8pSzoCUUMg"], "accumulated_threat_level": 0.8, "timewindow": 32} +{"Format": "IDEA0", "ID": "a43f01c9-4995-4cf0-a802-8b28ec0c2b9a", "DetectTime": "2024-05-21T12:27:27.061143+00:00", "EventTime": "2024-05-21T12:27:27.061165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWUCo2WMcZfZAB9mi"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "32db012e-0618-439b-9ceb-6f184860f095", "DetectTime": "2024-05-21T12:27:27.071867+00:00", "EventTime": "2024-05-21T12:27:27.071885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3mpu2H4f5b0xT1Ph"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "1fadef78-3d44-4cf3-83f1-6553925d37dc", "DetectTime": "2024-05-21T12:27:27.076303+00:00", "EventTime": "2024-05-21T12:27:27.076321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJc9FC1cvDxapLg6Ih"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "1b8e969f-533a-4fde-b8a8-f1e781a726d3", "DetectTime": "2024-05-21T12:27:27.086723+00:00", "EventTime": "2024-05-21T12:27:27.086746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFb5A52N5FFNAOWBfg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 32} +{"Format": "IDEA0", "ID": "02d3cade-595f-46af-85d9-c883754f2b02", "DetectTime": "2024-05-21T12:27:27.091847+00:00", "EventTime": "2024-05-21T12:27:27.091866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MgV325ZLkhHaJMJl"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "9c4ceabf-54f3-4223-a48a-20565b677ea2", "DetectTime": "2024-05-21T12:27:27.096264+00:00", "EventTime": "2024-05-21T12:27:27.096283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COmBlC4F6Ek77WpnWk"], "accumulated_threat_level": 3.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "53a13db0-3049-4e58-97e9-6c605118ef15", "DetectTime": "2024-05-21T12:27:27.107956+00:00", "EventTime": "2024-05-21T12:27:27.107977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdgUU43FFF6t9z0zb5"], "accumulated_threat_level": 3.2, "timewindow": 32} +{"Format": "IDEA0", "ID": "951e345a-3ae6-4f3e-b8b4-02b803a220b3", "DetectTime": "2024-05-21T12:27:27.166998+00:00", "EventTime": "2024-05-21T12:27:27.167022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyFsY3Vyy9IKvyNJ7"], "accumulated_threat_level": 4.0, "timewindow": 32} +{"Format": "IDEA0", "ID": "ed580b75-62c3-42d3-9fea-be55025e8551", "DetectTime": "2024-05-21T12:27:27.279771+00:00", "EventTime": "2024-05-21T12:27:27.279791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HkC63q1hOYZUT3Hd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "776bdbaf-80df-454b-aebb-4b4b2721418c", "DetectTime": "2024-05-21T12:27:27.325814+00:00", "EventTime": "2024-05-21T12:27:27.325836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7gKiC3aa0tHM5rj"], "accumulated_threat_level": 4.8, "timewindow": 32} +{"Format": "IDEA0", "ID": "4eaad54d-7db7-4f35-9325-0b44b83de925", "DetectTime": "2024-05-21T12:27:27.363287+00:00", "EventTime": "2024-05-21T12:27:27.363307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnoht2LD9gpcaUkj1"], "accumulated_threat_level": 5.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "53b8e3ea-b2ba-4153-8c95-11f4e8e5f1c7", "DetectTime": "2024-05-21T12:27:27.390236+00:00", "EventTime": "2024-05-21T12:27:27.390255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQ6um7LUUxAYDr4e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 32} +{"Format": "IDEA0", "ID": "502b9449-4850-49e4-aa6d-b2b30f3133f2", "DetectTime": "2024-05-21T12:27:27.429047+00:00", "EventTime": "2024-05-21T12:27:27.429067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdxytp2ksLS1VnZMLd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 32} +{"Format": "IDEA0", "ID": "4a7c7634-d635-4c2f-9646-fed400530c7d", "DetectTime": "2024-05-21T12:27:27.456998+00:00", "EventTime": "2024-05-21T12:27:27.457018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7NXk2yZFOlqHZmh3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 32} +{"Format": "IDEA0", "ID": "d67fb528-467b-4bef-a894-2876b572e329", "DetectTime": "2024-05-21T12:27:27.497498+00:00", "EventTime": "2024-05-21T12:27:27.497518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZALdx3MusoKahN43b"], "accumulated_threat_level": 8.799999999999999, "timewindow": 32} +{"Format": "IDEA0", "ID": "313210d4-ad3b-4fae-a4fb-e3b77b8a79d9", "DetectTime": "2024-05-21T12:27:27.536624+00:00", "EventTime": "2024-05-21T12:27:27.536643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5NRs4ZrIbXughys1"], "accumulated_threat_level": 9.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "879593b1-9067-4c1c-88e1-c692baf95563", "DetectTime": "2024-05-21T12:27:27.566527+00:00", "EventTime": "2024-05-21T12:27:27.566547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoIvVp38XYo9IxJbld"], "accumulated_threat_level": 10.4, "timewindow": 32} +{"Format": "IDEA0", "ID": "0dd520e3-7174-431b-a93b-f2ce3e43cb97", "DetectTime": "2024-05-21T12:27:27.607081+00:00", "EventTime": "2024-05-21T12:27:27.607099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWwwg1MLPTg93gYb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 32} +{"Format": "IDEA0", "ID": "1cfdd5ef-25c7-4ea1-9201-b83b69603088", "DetectTime": "2024-05-21T12:27:27.677019+00:00", "EventTime": "2024-05-21T12:27:27.677040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdbs3v4Z36PE0TTj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 32} +{"Format": "Json", "ID": "1cfdd5ef-25c7-4ea1-9201-b83b69603088", "DetectTime": "2024-05-21T12:27:27.677019+00:00", "EventTime": "2024-05-21T12:27:27.677040+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "1970-01-02T07:29:45.176971+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2024/05/21 12:27:27.947767)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 32, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "828ae399-ac16-446d-8df9-71518f03d435", "DetectTime": "2024-05-21T12:27:27.954027+00:00", "EventTime": "2024-05-21T12:27:27.954047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.121.50.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsfLha11HMjmO2zN2c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1b7c50de-2bd4-4004-a4cb-1906c27cc5d7", "DetectTime": "2024-05-21T12:27:27.966639+00:00", "EventTime": "2024-05-21T12:27:27.966659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO7J7s2VH3MAxlLrZ6"], "accumulated_threat_level": 0.8, "timewindow": 32} +{"Format": "IDEA0", "ID": "19eb754a-74e3-402c-b3cf-def6cbe9836e", "DetectTime": "2024-05-21T12:27:28.152946+00:00", "EventTime": "2024-05-21T12:27:28.152968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbmDE44Hsfw7NisL1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "0cd59c4d-dd59-4620-a204-2e103174af8b", "DetectTime": "2024-05-21T12:27:28.175135+00:00", "EventTime": "2024-05-21T12:27:28.175156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.40.169.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjeL1Pu1SZfkS7g7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "738a1ed6-d585-43e0-8a0d-9b0dfaa54413", "DetectTime": "2024-05-21T12:27:28.476272+00:00", "EventTime": "2024-05-21T12:27:28.476291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwASSj3oeVKimE8RT3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "de6e237d-3c98-4d5f-be59-010cb5d7dc5a", "DetectTime": "2024-05-21T12:27:28.585931+00:00", "EventTime": "2024-05-21T12:27:28.585951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8v7fN1cUbuwH7QNj1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7d6817e2-7b07-477b-9c97-e80fccce5dac", "DetectTime": "2024-05-21T12:27:28.604705+00:00", "EventTime": "2024-05-21T12:27:28.604727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7mSe4E6TdDRcRc7k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "54aade58-05b7-4412-aa54-a6c72e3d785c", "DetectTime": "2024-05-21T12:27:28.628354+00:00", "EventTime": "2024-05-21T12:27:28.628375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4jdU2egQDmMr2ll7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "35d294ff-d0c7-4e65-9f31-ac218fe08e89", "DetectTime": "2024-05-21T12:27:28.768394+00:00", "EventTime": "2024-05-21T12:27:28.768416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQZ9Jl3cY8lDF5X9jh", "CQB5Xd4VjIBwUmoIl1", "CHYMZr1GMiJnUL50bb", "CLF7p9k3dhFeZAIVf"], "accumulated_threat_level": 0.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "787f3f85-961f-4441-a80c-969892d4c4c8", "DetectTime": "2024-05-21T12:27:28.885411+00:00", "EventTime": "2024-05-21T12:27:28.885434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeM653eRky4OuL13l"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "8cfd6e47-1b57-4b4b-bc92-bfcfe1e95ee8", "DetectTime": "2024-05-21T12:27:28.907480+00:00", "EventTime": "2024-05-21T12:27:28.907501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpV6Sc2GbiLWxR1zea"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "aa7a0b2e-3c5d-439e-8a7b-0cad862aa03e", "DetectTime": "2024-05-21T12:27:29.200645+00:00", "EventTime": "2024-05-21T12:27:29.200663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehNZk208TACF9COA1"], "accumulated_threat_level": 1.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "08f6bb27-57d8-4404-963d-7c2e9dfb2bf6", "DetectTime": "2024-05-21T12:27:29.222094+00:00", "EventTime": "2024-05-21T12:27:29.222115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAOQliyy2NvabL9h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a9ca35f6-04c0-4f50-b2ef-ff03bb36764e", "DetectTime": "2024-05-21T12:27:29.245668+00:00", "EventTime": "2024-05-21T12:27:29.245688+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["149.3.4.183"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 149.3.4.183 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQviwE1hS2kwrXeVR8"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "3ab956b4-8ebd-432d-aeaa-86747d1cfe3a", "DetectTime": "2024-05-21T12:27:29.258050+00:00", "EventTime": "2024-05-21T12:27:29.258069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["149.3.4.183"]}], "Attach": [{"Content": "connection to blacklisted IP: 149.3.4.183 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQviwE1hS2kwrXeVR8"], "accumulated_threat_level": 1.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "310688bd-d7cd-4f3c-abce-6526330dfc9e", "DetectTime": "2024-05-21T12:27:29.355494+00:00", "EventTime": "2024-05-21T12:27:29.355525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeln33tdGuGQxdI4d"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3c31e4c5-aa73-48bb-beba-21272883eff8", "DetectTime": "2024-05-21T12:27:29.360379+00:00", "EventTime": "2024-05-21T12:27:29.360398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JTGW3EqfXet5jZ2c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3edc9ccf-9ec9-4e70-9320-8aa6a8134650", "DetectTime": "2024-05-21T12:27:29.617113+00:00", "EventTime": "2024-05-21T12:27:29.617135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFE9Is4yoAzhJE4aw"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "d7333b3c-b004-485e-9481-37da395e430d", "DetectTime": "2024-05-21T12:27:29.623268+00:00", "EventTime": "2024-05-21T12:27:29.623287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAw7kJ0w6R989Tb3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "50b5c48f-3cd3-4217-a1c1-b7305ec8f183", "DetectTime": "2024-05-21T12:27:29.837833+00:00", "EventTime": "2024-05-21T12:27:29.837854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCF2C1ZPrM3hORd9e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "ccc60672-31bd-411f-ae53-1d70fb1f6984", "DetectTime": "2024-05-21T12:27:29.842847+00:00", "EventTime": "2024-05-21T12:27:29.842868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpleDD4d9IfSWZLC75"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1ecbe407-587c-4484-a875-554c602d7eab", "DetectTime": "2024-05-21T12:27:29.847576+00:00", "EventTime": "2024-05-21T12:27:29.847594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlZzl2fxBsPOKoGvc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3c08dfd8-fd28-41e4-9267-401ca4278be5", "DetectTime": "2024-05-21T12:27:29.852314+00:00", "EventTime": "2024-05-21T12:27:29.852332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDd8N1aD2yN7O3005"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9b1bb066-0a66-498e-aef2-5f45831d9d02", "DetectTime": "2024-05-21T12:27:29.856975+00:00", "EventTime": "2024-05-21T12:27:29.856992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemHj93kfiMXC2n6a2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dd0a196e-a055-4d5e-96dd-eabc0e964a12", "DetectTime": "2024-05-21T12:27:29.861692+00:00", "EventTime": "2024-05-21T12:27:29.861711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzpH6twmbm7OLg7f"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "db56f96e-ab90-450f-b35c-371f0236368a", "DetectTime": "2024-05-21T12:27:29.872242+00:00", "EventTime": "2024-05-21T12:27:29.872260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxUsC4bTPOq6JGdF1"], "accumulated_threat_level": 2.1, "timewindow": 33} +{"Format": "IDEA0", "ID": "64e3d9c3-1cc4-4f21-bfde-2ab87f0ed074", "DetectTime": "2024-05-21T12:27:29.882287+00:00", "EventTime": "2024-05-21T12:27:29.882305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfjxP42VJ1U9RtsRqi"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 33} +{"Format": "IDEA0", "ID": "d9de862d-dd33-41b6-951c-40b0b3bb2601", "DetectTime": "2024-05-21T12:27:29.893152+00:00", "EventTime": "2024-05-21T12:27:29.893170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWlCQr2o49HZTyBJD"], "accumulated_threat_level": 3.7, "timewindow": 33} +{"Format": "IDEA0", "ID": "f593a471-8387-4a31-bc35-1599cc9c09eb", "DetectTime": "2024-05-21T12:27:29.904097+00:00", "EventTime": "2024-05-21T12:27:29.904115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqbcPp3IoBlfiJAywk"], "accumulated_threat_level": 4.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "f5c5ee64-90d5-4eb9-9123-81a9f53a708f", "DetectTime": "2024-05-21T12:27:29.914705+00:00", "EventTime": "2024-05-21T12:27:29.914724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CitWyU3F88WMeePTXl"], "accumulated_threat_level": 5.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "b766abf1-fe69-4877-997f-9ca21e68845d", "DetectTime": "2024-05-21T12:27:29.925582+00:00", "EventTime": "2024-05-21T12:27:29.925599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIMV23ePGmmVCIKTf"], "accumulated_threat_level": 6.1, "timewindow": 33} +{"Format": "IDEA0", "ID": "3d5a9414-f0b2-4353-ae51-36c75810d998", "DetectTime": "2024-05-21T12:27:29.939749+00:00", "EventTime": "2024-05-21T12:27:29.939769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJMlr2EVHzObcgEfj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6e6cb09c-386b-4948-99d2-289a44322804", "DetectTime": "2024-05-21T12:27:29.965193+00:00", "EventTime": "2024-05-21T12:27:29.965211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBFVo3hN6Yox56Bbd"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 33} +{"Format": "IDEA0", "ID": "3428eb18-bb19-4b76-b89e-e5319ff24b90", "DetectTime": "2024-05-21T12:27:30.041918+00:00", "EventTime": "2024-05-21T12:27:30.041938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYufm61d4tRnv9SLLb"], "accumulated_threat_level": 7.699999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "131b6541-49ee-44cc-909b-8a6e5fa5ab0a", "DetectTime": "2024-05-21T12:27:30.053000+00:00", "EventTime": "2024-05-21T12:27:30.053022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJGCh4eKTbVngb5yf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "65e1b7db-955a-4302-aca9-e7c0844a90d0", "DetectTime": "2024-05-21T12:27:30.086851+00:00", "EventTime": "2024-05-21T12:27:30.086872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcS4Ly1slvELQSTHIk"], "accumulated_threat_level": 8.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "ba466504-7a16-438f-b2ab-086b9559d230", "DetectTime": "2024-05-21T12:27:30.118236+00:00", "EventTime": "2024-05-21T12:27:30.118254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoozY3TYlDHR73Icf"], "accumulated_threat_level": 9.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "e5aa9096-b813-4eb3-8af0-33197706619d", "DetectTime": "2024-05-21T12:27:30.130326+00:00", "EventTime": "2024-05-21T12:27:30.130349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUt0F71heffHOHD184"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "0fea61d8-a2fc-40b0-a584-a94e35de2a35", "DetectTime": "2024-05-21T12:27:30.155258+00:00", "EventTime": "2024-05-21T12:27:30.155280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptWzG3iIgL9OQFigg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "33a0e725-90f7-4b62-9b70-a80eb31ec58e", "DetectTime": "2024-05-21T12:27:30.185537+00:00", "EventTime": "2024-05-21T12:27:30.185557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PEF42rhsgHI1eUa8"], "accumulated_threat_level": 10.100000000000001, "timewindow": 33} +{"Format": "IDEA0", "ID": "ecf00233-e0d2-42c2-9dcd-f92caec1cdab", "DetectTime": "2024-05-21T12:27:30.201873+00:00", "EventTime": "2024-05-21T12:27:30.201893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvnLu4vVu1Hopokda"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1b7b5b01-6bfd-461c-aa19-04e7c1d3f48d", "DetectTime": "2024-05-21T12:27:30.218223+00:00", "EventTime": "2024-05-21T12:27:30.218245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEOta4Ei8DGQSZXve"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "d11f84e3-cdbe-4263-a2ac-affe8f62ae4e", "DetectTime": "2024-05-21T12:27:30.248209+00:00", "EventTime": "2024-05-21T12:27:30.248232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7qBY23x46ZUdjfil"], "accumulated_threat_level": 10.900000000000002, "timewindow": 33} +{"Format": "IDEA0", "ID": "d0661765-b3b2-4074-ae71-11dda73ca8d1", "DetectTime": "2024-05-21T12:27:30.263494+00:00", "EventTime": "2024-05-21T12:27:30.263517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEPkQ1SqX0gVXzLe9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8ead2ad2-f506-4b05-9e44-5e4bde7b4a69", "DetectTime": "2024-05-21T12:27:30.289641+00:00", "EventTime": "2024-05-21T12:27:30.289660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8yUQ1pkt8H7YuiT2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 33} +{"Format": "IDEA0", "ID": "14283b3a-0fb3-4e8b-9655-ac7e4c00c4f1", "DetectTime": "2024-05-21T12:27:30.355058+00:00", "EventTime": "2024-05-21T12:27:30.355090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0OvdWhYDDIiTLxb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 33} +{"Format": "Json", "ID": "14283b3a-0fb3-4e8b-9655-ac7e4c00c4f1", "DetectTime": "2024-05-21T12:27:30.355058+00:00", "EventTime": "2024-05-21T12:27:30.355090+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "1970-01-02T08:01:30.945753+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:27:30.525698)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "507726eb-f0b3-4756-bb71-e3157ccaa31a", "DetectTime": "2024-05-21T12:27:30.530243+00:00", "EventTime": "2024-05-21T12:27:30.530266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTiqbV3uHn3w1uKzL2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "222dbd0f-fc29-4a86-ba1b-24c8bd090d8f", "DetectTime": "2024-05-21T12:27:30.541592+00:00", "EventTime": "2024-05-21T12:27:30.541610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMfha4flGpNneH2Ee"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "d53aa58d-c276-4651-ae78-977f92fbb4a4", "DetectTime": "2024-05-21T12:27:30.551687+00:00", "EventTime": "2024-05-21T12:27:30.551705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHxCp175potDt8LK6"], "accumulated_threat_level": 1.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "c3880572-ca0d-444a-94fa-471483434660", "DetectTime": "2024-05-21T12:27:30.562183+00:00", "EventTime": "2024-05-21T12:27:30.562208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ESSsUtAROKwuw6d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 33} +{"Format": "IDEA0", "ID": "f836d642-d381-435a-8cd1-fc286c7d7b6a", "DetectTime": "2024-05-21T12:27:30.567409+00:00", "EventTime": "2024-05-21T12:27:30.567432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.161.209.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdO2z3Tx1u7WH8jdd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "4a6050c9-43db-4a78-bb1b-acd103d11e41", "DetectTime": "2024-05-21T12:27:30.572123+00:00", "EventTime": "2024-05-21T12:27:30.572140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.168.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMCfB1Y4LNbGWemJk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8b7fb469-c5af-41e7-97c6-5893043c0d89", "DetectTime": "2024-05-21T12:27:30.592328+00:00", "EventTime": "2024-05-21T12:27:30.592348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5vfW1vDy2vpaDrS6"], "accumulated_threat_level": 3.2, "timewindow": 33} +{"Format": "IDEA0", "ID": "b87a9c1c-5fb0-4e5d-965f-462a2708cb26", "DetectTime": "2024-05-21T12:27:30.622085+00:00", "EventTime": "2024-05-21T12:27:30.622107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQ5Hm4CbHSrHf8Bk5"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "73423d26-e73e-4db8-bb98-c7c3e9c30e27", "DetectTime": "2024-05-21T12:27:30.650992+00:00", "EventTime": "2024-05-21T12:27:30.651013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cztoeb1wVeF4UXl9w4"], "accumulated_threat_level": 4.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "35f3a8f4-6944-4b45-bb13-8ba47a68d795", "DetectTime": "2024-05-21T12:27:30.852803+00:00", "EventTime": "2024-05-21T12:27:30.852821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVwGF1DGr8x1tzdE4"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "d758cf74-3926-45bd-8a71-9aaea7835be9", "DetectTime": "2024-05-21T12:27:30.866482+00:00", "EventTime": "2024-05-21T12:27:30.866503+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVwGF1DGr8x1tzdE4"], "accumulated_threat_level": 2.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a27d2c92-6882-4227-984d-063db72fe7d8", "DetectTime": "2024-05-21T12:27:30.910979+00:00", "EventTime": "2024-05-21T12:27:30.911000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.6.122.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrHK34hSASHVPofV7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "5295efa3-9c71-4ad7-93e6-ca20f774a481", "DetectTime": "2024-05-21T12:27:30.916489+00:00", "EventTime": "2024-05-21T12:27:30.916509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgg2qHMrjoQuiOzPj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "26ba0b0c-d960-4fce-b2fb-57fee1b2a699", "DetectTime": "2024-05-21T12:27:30.920982+00:00", "EventTime": "2024-05-21T12:27:30.920999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.243.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTjD7WNRo9RV2N13"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dd2a8dd0-616e-4e01-a3ef-c2a15f63b564", "DetectTime": "2024-05-21T12:27:30.925555+00:00", "EventTime": "2024-05-21T12:27:30.925573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.156.174.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0H9lc3Fr0xmmuEZzg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "d600397f-a1ac-40fd-9452-6803fde95cd7", "DetectTime": "2024-05-21T12:27:30.930094+00:00", "EventTime": "2024-05-21T12:27:30.930112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.64.148.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdEPS3u4CDeYMv7ge"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7b63aa74-191d-4e6f-9f90-0925fbe2eb45", "DetectTime": "2024-05-21T12:27:30.934736+00:00", "EventTime": "2024-05-21T12:27:30.934754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.75.180.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CastNI2TuzHem0gJe1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9e2fd8a5-0b93-4bfd-aa00-fea890597cc0", "DetectTime": "2024-05-21T12:27:30.974184+00:00", "EventTime": "2024-05-21T12:27:30.974202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sZejacL0YwzFV3"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "2646cd88-f5bf-4299-9756-946fb5b5a9d9", "DetectTime": "2024-05-21T12:27:30.986331+00:00", "EventTime": "2024-05-21T12:27:30.986348+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sZejacL0YwzFV3"], "accumulated_threat_level": 2.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "cd804c80-3093-4576-963e-eaea1d0f4cd8", "DetectTime": "2024-05-21T12:27:31.013461+00:00", "EventTime": "2024-05-21T12:27:31.013481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwU98s3VuNCF8qHvRf"], "accumulated_threat_level": 5.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "36e19e10-e846-4b86-9959-9645c7aea707", "DetectTime": "2024-05-21T12:27:31.039066+00:00", "EventTime": "2024-05-21T12:27:31.039087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.79.75.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPTZKl3HwFMBdrci36"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "536a29b6-72ce-4b49-8b50-5e09c702b592", "DetectTime": "2024-05-21T12:27:31.044245+00:00", "EventTime": "2024-05-21T12:27:31.044266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.238.0 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9dmB4BCib5vyGtUe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8dae46b6-ee83-4598-b436-9e239878f71c", "DetectTime": "2024-05-21T12:27:31.059490+00:00", "EventTime": "2024-05-21T12:27:31.059507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8WNFA16AcrFLiYjfk"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "dfb6466a-d418-475a-bd77-f53622ae53b0", "DetectTime": "2024-05-21T12:27:31.077320+00:00", "EventTime": "2024-05-21T12:27:31.077345+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8WNFA16AcrFLiYjfk"], "accumulated_threat_level": 3.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0944b6f9-e7be-4279-81e7-56b5c477de0e", "DetectTime": "2024-05-21T12:27:31.090838+00:00", "EventTime": "2024-05-21T12:27:31.090857+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlcw44UNJER09Tbdl"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "76679a1b-822b-4599-9f66-cd7a3efa99a0", "DetectTime": "2024-05-21T12:27:31.103200+00:00", "EventTime": "2024-05-21T12:27:31.103218+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlcw44UNJER09Tbdl"], "accumulated_threat_level": 3.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "7c6ac959-041c-419f-94db-481c3a1c33da", "DetectTime": "2024-05-21T12:27:31.113010+00:00", "EventTime": "2024-05-21T12:27:31.113028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccq4sU32DF2V2pgria"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 33} +{"Format": "IDEA0", "ID": "a1b0d279-3012-4155-b233-9e30d6ef5004", "DetectTime": "2024-05-21T12:27:31.125370+00:00", "EventTime": "2024-05-21T12:27:31.125387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZS3dK2IIsc5POwoRd"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8729efab-6a43-4e52-adf7-29b8445a0102", "DetectTime": "2024-05-21T12:27:31.177786+00:00", "EventTime": "2024-05-21T12:27:31.177807+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZS3dK2IIsc5POwoRd"], "accumulated_threat_level": 4.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "f949dd47-b20f-47c9-940f-b69f9856e02c", "DetectTime": "2024-05-21T12:27:31.182613+00:00", "EventTime": "2024-05-21T12:27:31.182631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.150.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMovEJ2rH0OyrD6Hpj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "c4ec8394-a994-497d-bd6a-8928f15a26f1", "DetectTime": "2024-05-21T12:27:31.188140+00:00", "EventTime": "2024-05-21T12:27:31.188162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.80.247.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv615M11lthZC0bkt5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "365a6f91-cdb3-4a87-a239-9f00fe2a1c77", "DetectTime": "2024-05-21T12:27:31.200262+00:00", "EventTime": "2024-05-21T12:27:31.200282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPpza3F2w2ZuBRve"], "accumulated_threat_level": 7.199999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "07631156-756b-4002-b8ce-311036c14783", "DetectTime": "2024-05-21T12:27:31.205093+00:00", "EventTime": "2024-05-21T12:27:31.205112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.210.104.179 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbT9UUAkHV9sEIjj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1905a0be-b5fd-4aa3-88d2-6d36158c70aa", "DetectTime": "2024-05-21T12:27:31.306594+00:00", "EventTime": "2024-05-21T12:27:31.306616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.196.220.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDAvLh14GSHZXPuMsg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "cd46a623-cf6b-4a3a-bc7f-624cd73cf06e", "DetectTime": "2024-05-21T12:27:31.311394+00:00", "EventTime": "2024-05-21T12:27:31.311413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.234.133.110 AS: ATT-INTERNET4, US AS7018 rDNS: 108-234-133-110.lightspeed.milwwi.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2luC16rQZhPJeDee"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "f9788a1e-5a1f-4c87-a36c-aa6723f2ec33", "DetectTime": "2024-05-21T12:27:31.347093+00:00", "EventTime": "2024-05-21T12:27:31.347112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9pxqO3c3ls8AF0C3l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "c1f50e2f-d879-44f3-a10b-fd6b155f8b28", "DetectTime": "2024-05-21T12:27:31.368171+00:00", "EventTime": "2024-05-21T12:27:31.368192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.77.164 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwkftD3MdYRMWYZhdb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "0f3e7ae4-5547-4e9a-9f4b-34730d9c8bc5", "DetectTime": "2024-05-21T12:27:31.373007+00:00", "EventTime": "2024-05-21T12:27:31.373026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.26.189.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9eDD4XhvbITKUlZi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "96cfc145-9008-44a1-84d7-dd2f916ebbdf", "DetectTime": "2024-05-21T12:27:31.414176+00:00", "EventTime": "2024-05-21T12:27:31.414197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.37.198.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqCVS1vtDpwo4dhRj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b165513f-1843-43aa-af0a-a1e356c0ccd5", "DetectTime": "2024-05-21T12:27:31.426984+00:00", "EventTime": "2024-05-21T12:27:31.427002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqzcC2iudr3Q36Ny"], "accumulated_threat_level": 8.799999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "46b8eb6f-beae-49bf-bba0-1226aa5e55bc", "DetectTime": "2024-05-21T12:27:31.446167+00:00", "EventTime": "2024-05-21T12:27:31.446185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.239.58.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheByO11NxH2FMIhTc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "2382570b-9706-4c1f-bac2-34091a31952d", "DetectTime": "2024-05-21T12:27:31.485632+00:00", "EventTime": "2024-05-21T12:27:31.485654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.75.115.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8O1jRazrJ310NT3l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "4d2aa4bd-dbb9-4b08-9f26-ab5b4116b371", "DetectTime": "2024-05-21T12:27:31.504300+00:00", "EventTime": "2024-05-21T12:27:31.504321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.166.163.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtpCW1n8kiBWlrk9l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1992e31f-62e9-42ad-8d8d-42ad7aa5c273", "DetectTime": "2024-05-21T12:27:31.529836+00:00", "EventTime": "2024-05-21T12:27:31.529855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsvgc4zx9813Penv"], "accumulated_threat_level": 9.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "c5d27943-8538-468c-aa2e-82c9412b4d2b", "DetectTime": "2024-05-21T12:27:31.555652+00:00", "EventTime": "2024-05-21T12:27:31.555673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.9.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSeLi4T3uv5lpCv3l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "097f642b-0663-4bcd-9644-39cae4f47739", "DetectTime": "2024-05-21T12:27:31.572379+00:00", "EventTime": "2024-05-21T12:27:31.572399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.100.43.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN4FfYmibVboyUMv7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "42d5d632-ef82-4308-be9f-140292111d04", "DetectTime": "2024-05-21T12:27:31.607705+00:00", "EventTime": "2024-05-21T12:27:31.607726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHncRF4paeN29Dc3Ih"], "accumulated_threat_level": 10.4, "timewindow": 33} +{"Format": "IDEA0", "ID": "83e38109-8581-46d8-adc7-6d5c14c6b72a", "DetectTime": "2024-05-21T12:27:31.612820+00:00", "EventTime": "2024-05-21T12:27:31.612839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.64.215.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6dlNXugaKfFaQK"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3a059921-9c03-4afb-b3c0-00298d913db9", "DetectTime": "2024-05-21T12:27:31.648304+00:00", "EventTime": "2024-05-21T12:27:31.648324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDn2n22WWoyFZxQiaf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 33} +{"Format": "IDEA0", "ID": "7346d45f-08e5-451d-8d10-3bc82a8808fb", "DetectTime": "2024-05-21T12:27:31.892357+00:00", "EventTime": "2024-05-21T12:27:31.892379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.246.172.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTWvg1bUW22LFXsJb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "78c400fb-5813-4baf-82e3-8d812fb1e669", "DetectTime": "2024-05-21T12:27:31.897688+00:00", "EventTime": "2024-05-21T12:27:31.897708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.97.149.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEefc518ZP7GJT9N6l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "830cadd5-85f1-4080-aa0c-d4f9aa561e4f", "DetectTime": "2024-05-21T12:27:31.902296+00:00", "EventTime": "2024-05-21T12:27:31.902314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.4.69.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3ngKj1TEkxqxYx4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "02246dda-136c-4f89-b34a-ed1917f71969", "DetectTime": "2024-05-21T12:27:31.912825+00:00", "EventTime": "2024-05-21T12:27:31.912844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7PLChYOABGxFbGX9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9893fcd0-a33d-4a46-9958-e39517f54e24", "DetectTime": "2024-05-21T12:27:31.962154+00:00", "EventTime": "2024-05-21T12:27:31.962176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CObDJY2zLg1wte1Vf1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 33} +{"Format": "Json", "ID": "9893fcd0-a33d-4a46-9958-e39517f54e24", "DetectTime": "2024-05-21T12:27:31.962154+00:00", "EventTime": "2024-05-21T12:27:31.962176+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "1970-01-02T08:01:49.595081+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:27:32.109538)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a7c444f6-e5ea-4b76-b04a-27ea67168c11", "DetectTime": "2024-05-21T12:27:32.120886+00:00", "EventTime": "2024-05-21T12:27:32.120905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ93Yu3WjnUAXmaGbg"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "fff89522-9844-415d-983a-a03e1309d71b", "DetectTime": "2024-05-21T12:27:32.131762+00:00", "EventTime": "2024-05-21T12:27:32.131780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YPApmPX7IZF9FA3"], "accumulated_threat_level": 1.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "edfad7f7-a3be-4759-ba28-cd21b5804276", "DetectTime": "2024-05-21T12:27:32.142344+00:00", "EventTime": "2024-05-21T12:27:32.142361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW3OL0rOyUyob40e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 33} +{"Format": "IDEA0", "ID": "2405df2e-9024-4752-9fa9-85f0e41d5795", "DetectTime": "2024-05-21T12:27:32.153062+00:00", "EventTime": "2024-05-21T12:27:32.153080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctqz793Wvl6hCOIPtf"], "accumulated_threat_level": 3.2, "timewindow": 33} +{"Format": "IDEA0", "ID": "52d4ed5e-ca24-4334-96dc-bb48240ad102", "DetectTime": "2024-05-21T12:27:32.162860+00:00", "EventTime": "2024-05-21T12:27:32.162878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZVN22NRV7nCXq57d"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "d8c2c0df-bb8b-42b0-b9cc-606eddb34701", "DetectTime": "2024-05-21T12:27:32.173888+00:00", "EventTime": "2024-05-21T12:27:32.173911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmz2Yn33UhOnYh4JF2"], "accumulated_threat_level": 4.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "4fd5f474-048a-4e2e-afc5-910403cedc5a", "DetectTime": "2024-05-21T12:27:32.187969+00:00", "EventTime": "2024-05-21T12:27:32.187988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnApTg1GrD72ysvl92"], "accumulated_threat_level": 5.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "9d639fea-2034-490a-91c0-5494603265c5", "DetectTime": "2024-05-21T12:27:32.198785+00:00", "EventTime": "2024-05-21T12:27:32.198805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUVnXe3PAGprLsoOXj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 33} +{"Format": "IDEA0", "ID": "37ff1f56-4c0c-433a-be05-c543988e63c3", "DetectTime": "2024-05-21T12:27:32.212780+00:00", "EventTime": "2024-05-21T12:27:32.212799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWqIJ37HkitAbKTT4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "0f31fc12-367e-4f7a-b45a-981ef5d2d104", "DetectTime": "2024-05-21T12:27:32.254838+00:00", "EventTime": "2024-05-21T12:27:32.254860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0mWb4twywJEi5RXf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "c339962e-3a4c-49f8-802b-e58b99a5d3c4", "DetectTime": "2024-05-21T12:27:32.260854+00:00", "EventTime": "2024-05-21T12:27:32.260873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.96.97.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwduv1GNr2UuP6kSe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "11d59053-7209-45f2-b661-ab42a27b4c06", "DetectTime": "2024-05-21T12:27:32.295527+00:00", "EventTime": "2024-05-21T12:27:32.295548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaoOwn1lUG17CgNTZb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "d6f640c8-e5e8-4692-8038-a7d08d843714", "DetectTime": "2024-05-21T12:27:32.327974+00:00", "EventTime": "2024-05-21T12:27:32.327994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkYxmr1bofuVHLZsu4"], "accumulated_threat_level": 9.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "ed3432b7-d61e-4f80-98a2-b32be185e0eb", "DetectTime": "2024-05-21T12:27:32.342956+00:00", "EventTime": "2024-05-21T12:27:32.342980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 208.180.143.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCVWNx2LHBcoDW2syf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3d6c91c6-a746-4466-a2cd-b0a5205a22a0", "DetectTime": "2024-05-21T12:27:32.376830+00:00", "EventTime": "2024-05-21T12:27:32.376849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzbs34hbs328Hm5x3"], "accumulated_threat_level": 10.4, "timewindow": 33} +{"Format": "IDEA0", "ID": "e964c8bd-da31-4485-a0c6-d613b0ace991", "DetectTime": "2024-05-21T12:27:32.382401+00:00", "EventTime": "2024-05-21T12:27:32.382434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.147.159.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfLdo1s0pa3ZF0CG7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7745b75f-d5e0-4f78-9573-a00dcaf3f580", "DetectTime": "2024-05-21T12:27:32.417596+00:00", "EventTime": "2024-05-21T12:27:32.417621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.105.251.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMyN51nFX9ZiuwRQ6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "06511b31-8484-4593-9f65-4e9a9b1a2ef9", "DetectTime": "2024-05-21T12:27:32.423278+00:00", "EventTime": "2024-05-21T12:27:32.423296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.134.33.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkbIvN1RvX716zcIg3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9979b661-c939-47b0-ba40-e3e80eb6cd5f", "DetectTime": "2024-05-21T12:27:32.447534+00:00", "EventTime": "2024-05-21T12:27:32.447553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CksLBV3UEM2z0d3gBh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 33} +{"Format": "IDEA0", "ID": "7749aa68-0c5d-4a33-8a7d-3ecb4cbef58f", "DetectTime": "2024-05-21T12:27:32.483898+00:00", "EventTime": "2024-05-21T12:27:32.483920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.133.83.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9p7q3dJYQhLWwYz4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "102a98c5-3877-4ac7-a5e0-d81d1914aa9f", "DetectTime": "2024-05-21T12:27:32.511034+00:00", "EventTime": "2024-05-21T12:27:32.511056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.152.23.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnhW6r13PVs0hmpoC2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "f842a15e-952d-4a0b-9654-7cb0e9aeb7f4", "DetectTime": "2024-05-21T12:27:32.516940+00:00", "EventTime": "2024-05-21T12:27:32.516958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.162.43.171 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdpErF1IqkJwhybAof"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "89982fda-3f9f-4651-9181-080b942ad652", "DetectTime": "2024-05-21T12:27:32.739627+00:00", "EventTime": "2024-05-21T12:27:32.739647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.160.32.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnjty31GyFRb869ZS2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a97f01ee-596b-470c-bb23-0ab300198c56", "DetectTime": "2024-05-21T12:27:32.784019+00:00", "EventTime": "2024-05-21T12:27:32.784037+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQnxp1OXqomgD3QBb"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "58798c4c-23fe-4b2b-82bc-de87cbb010a4", "DetectTime": "2024-05-21T12:27:32.796465+00:00", "EventTime": "2024-05-21T12:27:32.796484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQnxp1OXqomgD3QBb"], "accumulated_threat_level": 4.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "4e592842-b83c-4978-b6de-f1e9fb3c390a", "DetectTime": "2024-05-21T12:27:32.801126+00:00", "EventTime": "2024-05-21T12:27:32.801144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.148.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHum46N8Tsx1gW3g9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "5426b4aa-7bdc-4331-99f1-c2a89aab440e", "DetectTime": "2024-05-21T12:27:32.805464+00:00", "EventTime": "2024-05-21T12:27:32.805482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.25.1.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cue23q1jftPYevrZd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e41989f4-e6de-420b-8270-4037fadb0f10", "DetectTime": "2024-05-21T12:27:32.844357+00:00", "EventTime": "2024-05-21T12:27:32.844379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7UJX1bZh8tm6cUU6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 33} +{"Format": "Json", "ID": "e41989f4-e6de-420b-8270-4037fadb0f10", "DetectTime": "2024-05-21T12:27:32.844357+00:00", "EventTime": "2024-05-21T12:27:32.844379+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-02T08:13:17.402043+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:27:33.048685)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b91e7186-3f56-40c3-88f6-b6b16de2c899", "DetectTime": "2024-05-21T12:27:33.052684+00:00", "EventTime": "2024-05-21T12:27:33.052702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn74rl4wVAFReozQfk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "42f86cbb-5ddf-431c-bb12-266470d13942", "DetectTime": "2024-05-21T12:27:33.057102+00:00", "EventTime": "2024-05-21T12:27:33.057120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQStcA24dB3F5xSYqi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "5a454951-c41c-4477-8cd2-ca3fe3346951", "DetectTime": "2024-05-21T12:27:33.061587+00:00", "EventTime": "2024-05-21T12:27:33.061605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COvZGY29esqXHTGWo9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e2694a42-6095-466a-8284-b7d1c0070377", "DetectTime": "2024-05-21T12:27:33.065956+00:00", "EventTime": "2024-05-21T12:27:33.065974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.215.7.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDf1B32cmEpxR4S0t8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "949702ed-c7dc-47ce-9cd9-e61b7edbf2ab", "DetectTime": "2024-05-21T12:27:33.076796+00:00", "EventTime": "2024-05-21T12:27:33.076814+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD9rawlgx3oDUsMg"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1877ee25-e00b-4e2a-9ce5-1442a687125d", "DetectTime": "2024-05-21T12:27:33.082013+00:00", "EventTime": "2024-05-21T12:27:33.082030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 61.114.81.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCbjW2h4IKwc3Ayo4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "eb4123f7-fe0e-4cc4-ae4c-9051d3ed1a7e", "DetectTime": "2024-05-21T12:27:33.097744+00:00", "EventTime": "2024-05-21T12:27:33.097765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdD9rawlgx3oDUsMg"], "accumulated_threat_level": 5.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "f6e88e78-0baa-40ee-9c61-2e4d4d0102e7", "DetectTime": "2024-05-21T12:27:33.102669+00:00", "EventTime": "2024-05-21T12:27:33.102687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.214.216.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCwrA2VFx3M8VG101"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "10aef3fb-0bc4-4546-95f1-33becd38f9d9", "DetectTime": "2024-05-21T12:27:33.115926+00:00", "EventTime": "2024-05-21T12:27:33.115946+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.164.65.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreQNT3g6yzZMXZXZ2"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "95599afa-fcdb-4004-9fd0-a650c2f3b1d3", "DetectTime": "2024-05-21T12:27:33.126912+00:00", "EventTime": "2024-05-21T12:27:33.126930+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreQNT3g6yzZMXZXZ2"], "accumulated_threat_level": 5.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "d5bedf66-18db-4aad-a905-d5572d0684fe", "DetectTime": "2024-05-21T12:27:33.131447+00:00", "EventTime": "2024-05-21T12:27:33.131465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.148.51.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZNQ74KTVpEGaFPAk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "cb6e9d19-32a1-4f6e-98f4-5aabf1387ace", "DetectTime": "2024-05-21T12:27:33.142447+00:00", "EventTime": "2024-05-21T12:27:33.142465+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7JSr2ljbVCm7wu67"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7ba6e268-7811-452c-a728-e5c19f4c4bdb", "DetectTime": "2024-05-21T12:27:33.153169+00:00", "EventTime": "2024-05-21T12:27:33.153187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7JSr2ljbVCm7wu67"], "accumulated_threat_level": 6.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "09f8d271-d6c3-4272-9c98-68d024a0dfee", "DetectTime": "2024-05-21T12:27:33.158299+00:00", "EventTime": "2024-05-21T12:27:33.158317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.103.123.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAcsH41ulK0L5O3W5c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "c6e5d092-5d10-4474-aa06-af0ead7e4ac5", "DetectTime": "2024-05-21T12:27:33.171531+00:00", "EventTime": "2024-05-21T12:27:33.171549+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Gixl16jlVqp4m9ob"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e603b66c-5dfe-4773-a664-0390ce4461f9", "DetectTime": "2024-05-21T12:27:33.184287+00:00", "EventTime": "2024-05-21T12:27:33.184307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Gixl16jlVqp4m9ob"], "accumulated_threat_level": 6.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "eff82915-7904-4f31-9485-f314476f6f03", "DetectTime": "2024-05-21T12:27:33.196741+00:00", "EventTime": "2024-05-21T12:27:33.196763+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmcrL1RDzfNMDFE4"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1b48d050-9db2-4ce0-9a4e-ebd3888534d5", "DetectTime": "2024-05-21T12:27:33.211644+00:00", "EventTime": "2024-05-21T12:27:33.211667+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmcrL1RDzfNMDFE4"], "accumulated_threat_level": 7.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "27c08c97-c958-4ab4-a32b-6576e85ba128", "DetectTime": "2024-05-21T12:27:33.216279+00:00", "EventTime": "2024-05-21T12:27:33.216296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.54.27.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGnkqdAvUH8Twx45j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "c4d65476-d712-492f-b45f-0e0e697603a8", "DetectTime": "2024-05-21T12:27:33.220708+00:00", "EventTime": "2024-05-21T12:27:33.220727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.238.214.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGy2wO3R7yF1J3FpY4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "40b9a7fd-173f-4962-bf88-b820481e580e", "DetectTime": "2024-05-21T12:27:33.225199+00:00", "EventTime": "2024-05-21T12:27:33.225216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 100.43.246.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV9vkK1brjUxhrjVtd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "d19babf1-a080-459b-8a73-38336f83c9aa", "DetectTime": "2024-05-21T12:27:33.238964+00:00", "EventTime": "2024-05-21T12:27:33.238986+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQdTP22NdyJev349h"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "fb7a970c-a4d8-4de7-a71a-6731f45e8bfa", "DetectTime": "2024-05-21T12:27:33.255676+00:00", "EventTime": "2024-05-21T12:27:33.255696+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQdTP22NdyJev349h"], "accumulated_threat_level": 7.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "5d942fcf-1b74-4c64-a4f1-96d6e63f7ae2", "DetectTime": "2024-05-21T12:27:33.280508+00:00", "EventTime": "2024-05-21T12:27:33.280526+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDSMNb4GDuhXogxnn8"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "f8d7ae32-d73b-4cf5-b61c-8afdd8c1088d", "DetectTime": "2024-05-21T12:27:33.293598+00:00", "EventTime": "2024-05-21T12:27:33.293617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDSMNb4GDuhXogxnn8"], "accumulated_threat_level": 8.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "bd8f136e-5213-4788-8565-6e02c9ee8d31", "DetectTime": "2024-05-21T12:27:33.306559+00:00", "EventTime": "2024-05-21T12:27:33.306579+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRYAl83u6Dsn7hfMof"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "3f6a6891-4242-4115-9232-12cd1c488198", "DetectTime": "2024-05-21T12:27:33.318904+00:00", "EventTime": "2024-05-21T12:27:33.318924+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRYAl83u6Dsn7hfMof"], "accumulated_threat_level": 8.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "084e5ea1-e7d9-4ef5-93c2-74349599f1c5", "DetectTime": "2024-05-21T12:27:33.324568+00:00", "EventTime": "2024-05-21T12:27:33.324588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.49.66.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7G1k4Jf2zF31IOq"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "2e6f8b4e-aeca-4b2a-8354-766d0b1f9ce0", "DetectTime": "2024-05-21T12:27:33.336777+00:00", "EventTime": "2024-05-21T12:27:33.336796+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSP3O61mbXXXgwAKb2"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "14d4aab6-56d3-4eb0-8967-6a15da6a40f0", "DetectTime": "2024-05-21T12:27:33.348635+00:00", "EventTime": "2024-05-21T12:27:33.348653+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSP3O61mbXXXgwAKb2"], "accumulated_threat_level": 9.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "cf5accae-f656-417e-9bfc-e76cd6ab75de", "DetectTime": "2024-05-21T12:27:33.353630+00:00", "EventTime": "2024-05-21T12:27:33.353647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgDw4AKx2vCPd6A1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "bbb0e32b-1a5f-48cb-85c1-74b4ffda92c7", "DetectTime": "2024-05-21T12:27:33.358855+00:00", "EventTime": "2024-05-21T12:27:33.358876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.59.75.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGIgQJ3j2jnlpyTfR7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "54236f16-b737-4081-b81b-a560118e58a6", "DetectTime": "2024-05-21T12:27:33.364079+00:00", "EventTime": "2024-05-21T12:27:33.364098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKd1CC2rIwuEuytJX8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b8baef5e-6733-4d49-8517-491252f9a345", "DetectTime": "2024-05-21T12:27:33.376628+00:00", "EventTime": "2024-05-21T12:27:33.376646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0gn7253oMXLKrUyf"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "bcca3b9f-61aa-4dc2-be30-baec9f487499", "DetectTime": "2024-05-21T12:27:33.423866+00:00", "EventTime": "2024-05-21T12:27:33.423887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0gn7253oMXLKrUyf"], "accumulated_threat_level": 9.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "c09e8e27-f4ac-4d97-81b7-adf2a2269535", "DetectTime": "2024-05-21T12:27:33.429701+00:00", "EventTime": "2024-05-21T12:27:33.429721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.185.52.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czf2mr46GjbmxV8Td9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "4e3df087-bf3c-466d-b91a-7a728d050fc4", "DetectTime": "2024-05-21T12:27:33.443505+00:00", "EventTime": "2024-05-21T12:27:33.443524+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLR7e3ArxfzrihX1d"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e50cacca-18ad-4e72-80fe-d26169b76f47", "DetectTime": "2024-05-21T12:27:33.448511+00:00", "EventTime": "2024-05-21T12:27:33.448533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.142.135.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj0Brm2auOWFBYl71"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "bf965829-db13-4c72-9b01-789755cfb716", "DetectTime": "2024-05-21T12:27:33.462776+00:00", "EventTime": "2024-05-21T12:27:33.462796+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLR7e3ArxfzrihX1d"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "31a74b47-bbe8-4c48-ad9d-250a7fe0a312", "DetectTime": "2024-05-21T12:27:33.473572+00:00", "EventTime": "2024-05-21T12:27:33.473591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6dYI3NuCIimkhRHj"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "22ea0f2f-0b5e-48d8-a408-7ea3bbe5f2e2", "DetectTime": "2024-05-21T12:27:33.485218+00:00", "EventTime": "2024-05-21T12:27:33.485237+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIsKuIUKowe7GtQ1"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7710ffab-29c3-4532-942f-bcc312ec0be3", "DetectTime": "2024-05-21T12:27:33.497582+00:00", "EventTime": "2024-05-21T12:27:33.497604+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIsKuIUKowe7GtQ1"], "accumulated_threat_level": 10.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "fdd393e3-89f4-457c-865b-d0d5c7ff1583", "DetectTime": "2024-05-21T12:27:33.509716+00:00", "EventTime": "2024-05-21T12:27:33.509737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMI8Z3IaLgoDl7n6f"], "accumulated_threat_level": 1.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "a64e629a-ccff-4715-a407-9d5804f3bf8d", "DetectTime": "2024-05-21T12:27:33.520622+00:00", "EventTime": "2024-05-21T12:27:33.520639+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkR52q3o6vvFVOFaS7"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "03b80295-5e35-4325-9a07-a1845cbdce1c", "DetectTime": "2024-05-21T12:27:33.531956+00:00", "EventTime": "2024-05-21T12:27:33.531974+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkR52q3o6vvFVOFaS7"], "accumulated_threat_level": 11.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ebf72000-6d96-4b64-8038-985b39aa4dbc", "DetectTime": "2024-05-21T12:27:33.537112+00:00", "EventTime": "2024-05-21T12:27:33.537129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfkQ02mOOQgzGgUxc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dcc0d362-7fc6-4f5b-a542-1f20f1981d24", "DetectTime": "2024-05-21T12:27:33.550559+00:00", "EventTime": "2024-05-21T12:27:33.550577+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI500ufHWKufYypH6"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "d79ee664-cce7-4adf-b086-9a086739457f", "DetectTime": "2024-05-21T12:27:33.562511+00:00", "EventTime": "2024-05-21T12:27:33.562530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI500ufHWKufYypH6"], "accumulated_threat_level": 11.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "36ae5946-6563-4e3d-a992-d32f6c6e3a82", "DetectTime": "2024-05-21T12:27:33.573037+00:00", "EventTime": "2024-05-21T12:27:33.573055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIO3m3rlSihfNaji5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 33} +{"Format": "IDEA0", "ID": "cfc358c8-854b-4a86-bc49-fd60c0deb86c", "DetectTime": "2024-05-21T12:27:33.584820+00:00", "EventTime": "2024-05-21T12:27:33.584838+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsWVhm2P6oP9ZoKFvi"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "ae3eb9a1-284f-4bf6-907e-1b8b8e6597a3", "DetectTime": "2024-05-21T12:27:33.596524+00:00", "EventTime": "2024-05-21T12:27:33.596541+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsWVhm2P6oP9ZoKFvi"], "accumulated_threat_level": 12.0, "timewindow": 14} +{"Format": "Json", "ID": "ae3eb9a1-284f-4bf6-907e-1b8b8e6597a3", "DetectTime": "2024-05-21T12:27:33.596524+00:00", "EventTime": "2024-05-21T12:27:33.596541+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "1970-01-01T13:12:02.243616+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:27:33.920712)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "550abc92-f3eb-468f-8adb-6456de826030", "DetectTime": "2024-05-21T12:27:33.925175+00:00", "EventTime": "2024-05-21T12:27:33.925193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjz3nf4B7FuyRPYm6e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "38a188d2-3e25-45af-b2bf-a3a37c28e32f", "DetectTime": "2024-05-21T12:27:33.937389+00:00", "EventTime": "2024-05-21T12:27:33.937407+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUsfGRfBsazAoCRh"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "d5df8bd4-f882-46c9-8005-ae6d6a1f876b", "DetectTime": "2024-05-21T12:27:33.949781+00:00", "EventTime": "2024-05-21T12:27:33.949806+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUsfGRfBsazAoCRh"], "accumulated_threat_level": 0.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "c15db9e7-d23a-4b3a-ba00-5a90f73d599f", "DetectTime": "2024-05-21T12:27:33.954988+00:00", "EventTime": "2024-05-21T12:27:33.955007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjuk243OElONcUzbd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "08a95d9b-46ce-4265-88f5-7d8dfc4a36b4", "DetectTime": "2024-05-21T12:27:33.967222+00:00", "EventTime": "2024-05-21T12:27:33.967242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqSAIKujvVVFBKJjh"], "accumulated_threat_level": 3.2, "timewindow": 33} +{"Format": "IDEA0", "ID": "c9e23973-165f-4f5d-bb54-895c11605dc1", "DetectTime": "2024-05-21T12:27:33.972201+00:00", "EventTime": "2024-05-21T12:27:33.972218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.83.174.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70Efc4JWZAFCGHqC5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a18bce92-b8be-43f2-8c7d-ea9a7060f496", "DetectTime": "2024-05-21T12:27:33.982749+00:00", "EventTime": "2024-05-21T12:27:33.982768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCDum4oiiJRMiRt6c"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "c9433450-5ea6-47e9-86e3-e2966f137a79", "DetectTime": "2024-05-21T12:27:33.987505+00:00", "EventTime": "2024-05-21T12:27:33.987523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 159.63.191.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTGboi35KEBWAAtZk6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6fb2a8da-0b2e-4cd1-a2df-0a53ada96c1d", "DetectTime": "2024-05-21T12:27:34.036876+00:00", "EventTime": "2024-05-21T12:27:34.036897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clqhi81P6FwnBSiJXa"], "accumulated_threat_level": 4.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "00dc355b-e451-4bc8-b0cc-673832891d90", "DetectTime": "2024-05-21T12:27:34.055783+00:00", "EventTime": "2024-05-21T12:27:34.055810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZwrk2vR2eGBYa24"], "accumulated_threat_level": 5.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "60aa21a2-c3bb-4267-9010-812a9019c879", "DetectTime": "2024-05-21T12:27:34.061536+00:00", "EventTime": "2024-05-21T12:27:34.061558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EtHL2H6OAxyY27Qj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9418d96d-7245-4530-a923-9388a3a2316c", "DetectTime": "2024-05-21T12:27:34.072162+00:00", "EventTime": "2024-05-21T12:27:34.072182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czbrng13ZzNk5oSCNh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 33} +{"Format": "IDEA0", "ID": "86fbbb4b-d537-432b-bcce-887d271e7276", "DetectTime": "2024-05-21T12:27:34.076709+00:00", "EventTime": "2024-05-21T12:27:34.076727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.7.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnSVA1HHcrFWfq2Jj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b4007834-3c42-40f0-93ff-43d0d5d38fc3", "DetectTime": "2024-05-21T12:27:34.086661+00:00", "EventTime": "2024-05-21T12:27:34.086680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXG1zNyUMwpPAyG4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "ff2f48f0-55ce-467d-a64a-9be48a1dec2b", "DetectTime": "2024-05-21T12:27:34.091071+00:00", "EventTime": "2024-05-21T12:27:34.091089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDYIP1VCewaIC3QH6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "2cafb1b4-d00e-4931-bcb4-d994fa756261", "DetectTime": "2024-05-21T12:27:34.100809+00:00", "EventTime": "2024-05-21T12:27:34.100827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 18052/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl39l82TY2vzZRUuyb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "11b54c67-831b-4748-9f7b-d509dc388f4d", "DetectTime": "2024-05-21T12:27:34.111522+00:00", "EventTime": "2024-05-21T12:27:34.111553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "Connection to unknown destination port 23509/UDP destination IP 180.248.7.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5JubFw5q4nR1REAf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "fb6bae12-d1a0-4d44-b616-8840c72f4f63", "DetectTime": "2024-05-21T12:27:34.123302+00:00", "EventTime": "2024-05-21T12:27:34.123320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdZf637jLlG0W1SGg"], "accumulated_threat_level": 9.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "c77c430a-351b-43f7-812b-6eb7703920fe", "DetectTime": "2024-05-21T12:27:34.134487+00:00", "EventTime": "2024-05-21T12:27:34.134504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Agnn11xztdcZ9Njc"], "accumulated_threat_level": 10.4, "timewindow": 33} +{"Format": "IDEA0", "ID": "ad1a5777-8d6b-46de-af2f-9d7b47450894", "DetectTime": "2024-05-21T12:27:34.146352+00:00", "EventTime": "2024-05-21T12:27:34.146370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUr95xk4RynLAR97"], "accumulated_threat_level": 11.200000000000001, "timewindow": 33} +{"Format": "IDEA0", "ID": "e0c7ee51-d2a6-4bd5-b849-53132262cdb3", "DetectTime": "2024-05-21T12:27:34.156817+00:00", "EventTime": "2024-05-21T12:27:34.156837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF8d31GKy7V2bw5t2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 33} +{"Format": "Json", "ID": "e0c7ee51-d2a6-4bd5-b849-53132262cdb3", "DetectTime": "2024-05-21T12:27:34.156817+00:00", "EventTime": "2024-05-21T12:27:34.156837+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "1970-01-02T08:32:29.284426+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:27:34.357441)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "128f2fee-fb6c-4c5c-895a-1f5bce3402c9", "DetectTime": "2024-05-21T12:27:34.367804+00:00", "EventTime": "2024-05-21T12:27:34.367821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP7JKbnbUQjm6YzVa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "fe3f079c-0a21-4cee-a63f-2797cab91c9a", "DetectTime": "2024-05-21T12:27:34.378342+00:00", "EventTime": "2024-05-21T12:27:34.378360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfyTA43V1MUMvLmAc"], "accumulated_threat_level": 1.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "6773a24f-0919-4e7d-b943-5bbcc624a913", "DetectTime": "2024-05-21T12:27:34.388729+00:00", "EventTime": "2024-05-21T12:27:34.388746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsAts2iVBeuzTpRx8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 33} +{"Format": "IDEA0", "ID": "0936f95d-b242-4d19-b810-fc27ad16fb9b", "DetectTime": "2024-05-21T12:27:34.399437+00:00", "EventTime": "2024-05-21T12:27:34.399458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0EU63sqAznwktoLi"], "accumulated_threat_level": 3.2, "timewindow": 33} +{"Format": "IDEA0", "ID": "1b50c6f1-3a58-45fb-828f-bfd11c41466b", "DetectTime": "2024-05-21T12:27:34.410990+00:00", "EventTime": "2024-05-21T12:27:34.411010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQMVH1NRfmYSQ5Bc3"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "710428ba-4fe8-4bc8-8df4-5014508445b9", "DetectTime": "2024-05-21T12:27:34.416598+00:00", "EventTime": "2024-05-21T12:27:34.416615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnKQa3rWF33zxgXZc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b4394db4-f86b-4564-aaca-9c84e168aee4", "DetectTime": "2024-05-21T12:27:34.428201+00:00", "EventTime": "2024-05-21T12:27:34.428219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZWcc2J2kMWg93Akd"], "accumulated_threat_level": 4.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "62ee1fde-46c0-4623-9737-5600ec681faa", "DetectTime": "2024-05-21T12:27:34.433026+00:00", "EventTime": "2024-05-21T12:27:34.433044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.134.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24KsX16S0CX220MRi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8c904c2d-4bf3-405a-a2e0-1d98442b46c4", "DetectTime": "2024-05-21T12:27:34.437641+00:00", "EventTime": "2024-05-21T12:27:34.437660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.207.189.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkxUh4Ujm6jSXVnW5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "499d213f-6535-4b64-a1e8-ea7607238a9e", "DetectTime": "2024-05-21T12:27:34.442418+00:00", "EventTime": "2024-05-21T12:27:34.442437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrzSX3pwOY64Nhxg2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1aef82da-8f38-4360-8092-d64dca38d418", "DetectTime": "2024-05-21T12:27:34.447449+00:00", "EventTime": "2024-05-21T12:27:34.447469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8EMx2X8E7fvX6Chb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "aeb17862-03a5-40a4-82dc-07e8a01969e5", "DetectTime": "2024-05-21T12:27:34.452347+00:00", "EventTime": "2024-05-21T12:27:34.452367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD5Lf1pYmDo9UdxF6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b2996d2d-e342-4f60-b638-e8595cb93a5d", "DetectTime": "2024-05-21T12:27:34.457214+00:00", "EventTime": "2024-05-21T12:27:34.457232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.64.162.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8XdG23aaiZnG64Hf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "f5df4acd-1fec-49b7-84f8-73461ca626ad", "DetectTime": "2024-05-21T12:27:34.461852+00:00", "EventTime": "2024-05-21T12:27:34.461870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.80.197.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMMFjr38sFoh8BNr8k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e15279dc-4f4b-4185-bd0d-cbb0d7712920", "DetectTime": "2024-05-21T12:27:34.466448+00:00", "EventTime": "2024-05-21T12:27:34.466465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.74.86.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXouZ1xd68kLZZJHd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3cbebe4f-3b1b-4e98-8b13-9da30b14253d", "DetectTime": "2024-05-21T12:27:34.472080+00:00", "EventTime": "2024-05-21T12:27:34.472099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUuHVI3lydYWolU423"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "bbeeb904-30cb-414e-a15a-003ae5f1d08e", "DetectTime": "2024-05-21T12:27:34.484493+00:00", "EventTime": "2024-05-21T12:27:34.484512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6cb81lUgOo0hxFKj"], "accumulated_threat_level": 5.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "10092420-4621-48b1-931e-2192736878d7", "DetectTime": "2024-05-21T12:27:34.496200+00:00", "EventTime": "2024-05-21T12:27:34.496219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICnrq2b3S4vO8Md2e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 33} +{"Format": "IDEA0", "ID": "f1bbeb75-7e4c-47ae-b85c-815a06ad7d9a", "DetectTime": "2024-05-21T12:27:34.501220+00:00", "EventTime": "2024-05-21T12:27:34.501240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.1.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFBhq2desLQBq6T08"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "5ab8aa57-5568-4ae9-b832-7ddf7ab1b526", "DetectTime": "2024-05-21T12:27:34.512053+00:00", "EventTime": "2024-05-21T12:27:34.512071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTl4W3ppWmxCCnqX3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "e64578e6-001c-40f0-b4a7-894d7416baa6", "DetectTime": "2024-05-21T12:27:34.517258+00:00", "EventTime": "2024-05-21T12:27:34.517276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.143.38.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41sJ12jPhXFYFloIk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b55464ff-9621-4b78-8dda-eb8ff51dc84d", "DetectTime": "2024-05-21T12:27:34.527837+00:00", "EventTime": "2024-05-21T12:27:34.527862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZpfQi3JMXjFrkjlee"], "accumulated_threat_level": 7.999999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "7e09b54f-d385-45a5-ae13-486fce69f513", "DetectTime": "2024-05-21T12:27:34.539825+00:00", "EventTime": "2024-05-21T12:27:34.539842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkiBj4HenLCX4lUr4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "15d5727a-2b39-4044-9cb7-2ee73ee103f8", "DetectTime": "2024-05-21T12:27:34.559263+00:00", "EventTime": "2024-05-21T12:27:34.559281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUf9FuswTlcfRo72"], "accumulated_threat_level": 9.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "320c7e24-291b-439c-9fa9-392b47d09a19", "DetectTime": "2024-05-21T12:27:34.567605+00:00", "EventTime": "2024-05-21T12:27:34.567627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUN82S50XHa9ye4j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "fff253c6-6859-4a50-9719-189d464ca49c", "DetectTime": "2024-05-21T12:27:34.607405+00:00", "EventTime": "2024-05-21T12:27:34.607431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHQ1y1cT91Uv3gu2f"], "accumulated_threat_level": 10.4, "timewindow": 33} +{"Format": "IDEA0", "ID": "a133820a-705b-4f73-9af3-0de1525c48cc", "DetectTime": "2024-05-21T12:27:34.634181+00:00", "EventTime": "2024-05-21T12:27:34.634202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQIPk3IpiRJNcqQm8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 33} +{"Format": "IDEA0", "ID": "1a33bb31-2225-4eef-ad0f-b7ee58706603", "DetectTime": "2024-05-21T12:27:34.689962+00:00", "EventTime": "2024-05-21T12:27:34.689983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxcBfU1rLCKW8QzInb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e150f002-dce4-4f87-843e-06d59f3d64fb", "DetectTime": "2024-05-21T12:27:34.718579+00:00", "EventTime": "2024-05-21T12:27:34.718597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpAI01mSEEafPVg4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 33} +{"Format": "Json", "ID": "e150f002-dce4-4f87-843e-06d59f3d64fb", "DetectTime": "2024-05-21T12:27:34.718579+00:00", "EventTime": "2024-05-21T12:27:34.718597+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "1970-01-02T08:32:33.001054+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:27:34.922602)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3f335f4e-673d-426d-bf2d-4c4a6b86a891", "DetectTime": "2024-05-21T12:27:34.933333+00:00", "EventTime": "2024-05-21T12:27:34.933354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJsSHag4UWLWoU43"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "04a68ec0-7863-45d0-81f7-847b66779447", "DetectTime": "2024-05-21T12:27:34.939481+00:00", "EventTime": "2024-05-21T12:27:34.939500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.12.253.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJhf5q36auGh94yX29"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "95e75c07-8e36-439a-a1c7-0a1946213df6", "DetectTime": "2024-05-21T12:27:34.944015+00:00", "EventTime": "2024-05-21T12:27:34.944033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEYV2A4FaMpfvo9Qr9", "Cuv19RJsCtKaAWEKc", "CTnfxV1GKfmbedMFak", "Cad7kFXA85JMDhAVf"], "accumulated_threat_level": 0.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "7224ce82-8bce-474c-946c-636efb3d71cf", "DetectTime": "2024-05-21T12:27:34.956707+00:00", "EventTime": "2024-05-21T12:27:34.956727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4K7Sy3Vi44maogeOd"], "accumulated_threat_level": 1.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "a997c2dc-2321-498d-83ee-825657c275d3", "DetectTime": "2024-05-21T12:27:34.967750+00:00", "EventTime": "2024-05-21T12:27:34.967768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.25.99.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJg9q3QZC1sGtMY93"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dd7b2180-ef3e-4b80-9291-cfe864bc95d2", "DetectTime": "2024-05-21T12:27:34.978198+00:00", "EventTime": "2024-05-21T12:27:34.978216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF63II3rz8hnaYMMOe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 33} +{"Format": "IDEA0", "ID": "553d87e9-adf5-41af-a2f4-a6cee090dffb", "DetectTime": "2024-05-21T12:27:34.982786+00:00", "EventTime": "2024-05-21T12:27:34.982804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.91.179.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZb0VG3jkeBHP5ZuS9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "311bc511-cddb-47d1-be2d-9d2672cff9f9", "DetectTime": "2024-05-21T12:27:34.987385+00:00", "EventTime": "2024-05-21T12:27:34.987403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 61.183.129.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjH5G23mxnAP0Lim5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "2a76e195-6ce4-464f-8aac-c51eb614d358", "DetectTime": "2024-05-21T12:27:34.998257+00:00", "EventTime": "2024-05-21T12:27:34.998276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lQBU2KLiamBq8umf"], "accumulated_threat_level": 3.2, "timewindow": 33} +{"Format": "IDEA0", "ID": "ca404792-e69c-482c-84e4-860583f06af1", "DetectTime": "2024-05-21T12:27:35.003167+00:00", "EventTime": "2024-05-21T12:27:35.003186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEe1S1C3yNFgcPoWh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "defce423-bfcb-44f8-8d46-3858efeb906e", "DetectTime": "2024-05-21T12:27:35.007881+00:00", "EventTime": "2024-05-21T12:27:35.007899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrgy52ypwNh5cmJB"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "00e4a492-6c52-4cee-b286-a393ad038530", "DetectTime": "2024-05-21T12:27:35.012576+00:00", "EventTime": "2024-05-21T12:27:35.012595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.213.189.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSrUDb4OylE3LJjbfj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "2e502bf0-899c-494e-afdb-e58b050da378", "DetectTime": "2024-05-21T12:27:35.025430+00:00", "EventTime": "2024-05-21T12:27:35.025449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAN2n2M4jBlqRr7ij"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "8782bd06-8e94-4e58-9442-831ccc0d8418", "DetectTime": "2024-05-21T12:27:35.036041+00:00", "EventTime": "2024-05-21T12:27:35.036061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iUUR2hlCtCQjz5dj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "c5a9c71c-db3b-461d-a183-4323ce27f53c", "DetectTime": "2024-05-21T12:27:35.040788+00:00", "EventTime": "2024-05-21T12:27:35.040807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.253.163.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3YtN16bht4HgzLn5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8e31bfca-b358-4ee8-8371-8a3d5bc6b053", "DetectTime": "2024-05-21T12:27:35.048427+00:00", "EventTime": "2024-05-21T12:27:35.048445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.197.8.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmu5oj2Jsdb3dzGI3a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7b433f4c-8c56-49d5-8834-c517bd43c92e", "DetectTime": "2024-05-21T12:27:35.072076+00:00", "EventTime": "2024-05-21T12:27:35.072098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C42sOC1a44kjOCkynk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "f2cdd04e-04e4-44c7-8bce-0fc14aae63f7", "DetectTime": "2024-05-21T12:27:35.310833+00:00", "EventTime": "2024-05-21T12:27:35.310854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbfBfC1tKdQTiGx5C3"], "accumulated_threat_level": 4.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "5a89719f-5035-4630-b83b-ae240128fdeb", "DetectTime": "2024-05-21T12:27:35.331429+00:00", "EventTime": "2024-05-21T12:27:35.331447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.79.52.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0w4SO3XkmkKkUlf3l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "408a97b7-bf0a-459b-b401-71d8505beb3c", "DetectTime": "2024-05-21T12:27:35.336204+00:00", "EventTime": "2024-05-21T12:27:35.336222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJrQAv4Ih2kH0yeu41"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3034515b-6001-4fa9-901d-3e100abe1aea", "DetectTime": "2024-05-21T12:27:35.386588+00:00", "EventTime": "2024-05-21T12:27:35.386608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.218.243.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjsHd5jQcx9Dpjv2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6a455d40-3d5f-4a02-87c1-9ad71da1b012", "DetectTime": "2024-05-21T12:27:35.393707+00:00", "EventTime": "2024-05-21T12:27:35.393725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.161.231.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GHJ94cJoM7OdDiZ8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "59231557-547a-4cb3-8477-4377c8a32fa1", "DetectTime": "2024-05-21T12:27:35.410095+00:00", "EventTime": "2024-05-21T12:27:35.410116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8IK3a1H2mZlNewLCk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "69d10c8a-87b7-4dea-b65f-16541c3fb0a3", "DetectTime": "2024-05-21T12:27:35.477130+00:00", "EventTime": "2024-05-21T12:27:35.477151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NPT14Z6Pjo40JAL9"], "accumulated_threat_level": 5.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "7de3502c-5fde-4b5b-ac44-0f8691bd8296", "DetectTime": "2024-05-21T12:27:35.481851+00:00", "EventTime": "2024-05-21T12:27:35.481868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjHeII3ZQStj6g5CF4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "47e5d87d-7c03-4731-be35-fd14487def96", "DetectTime": "2024-05-21T12:27:35.493144+00:00", "EventTime": "2024-05-21T12:27:35.493162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQe8v1G6naCxihfp"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b0b95ce2-b491-4ae2-9fc1-c161d65da4ea", "DetectTime": "2024-05-21T12:27:35.497628+00:00", "EventTime": "2024-05-21T12:27:35.497646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8D2o2JREVoF1A6tf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "82fd1178-1641-48de-9c08-110cfbd3f1e8", "DetectTime": "2024-05-21T12:27:35.564538+00:00", "EventTime": "2024-05-21T12:27:35.564558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYLQ51z4rrrVpnYai"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "97d44ff6-0cf6-4533-8925-0cc1a41647ce", "DetectTime": "2024-05-21T12:27:35.569230+00:00", "EventTime": "2024-05-21T12:27:35.569248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.72.145.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBQnt4a07Pio61xD"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b64ffc9c-e2b5-4aa1-baa3-594e29cd2196", "DetectTime": "2024-05-21T12:27:35.600395+00:00", "EventTime": "2024-05-21T12:27:35.600415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpE4D3Ue141118RJh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 33} +{"Format": "IDEA0", "ID": "885dd177-bc2a-441d-b789-68eada51da00", "DetectTime": "2024-05-21T12:27:35.617209+00:00", "EventTime": "2024-05-21T12:27:35.617226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.205.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIJ172bshhbi1OaOg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "776c221f-a837-4332-ac90-79dc0fd95840", "DetectTime": "2024-05-21T12:27:35.650089+00:00", "EventTime": "2024-05-21T12:27:35.650109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy18Qo18tAYd9jL8al"], "accumulated_threat_level": 7.199999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "ac81777b-9880-459a-b9bb-2d14bc93a05d", "DetectTime": "2024-05-21T12:27:35.681096+00:00", "EventTime": "2024-05-21T12:27:35.681114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.197.81.95"]}], "Attach": [{"Content": "Connection to unknown destination port 9155/UDP destination IP 107.197.81.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClvMNx2hP9gWzk4OYd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "3b8e31c0-7714-49ef-9c87-c427dd9dd093", "DetectTime": "2024-05-21T12:27:35.703155+00:00", "EventTime": "2024-05-21T12:27:35.703176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnxjF12P0mw6DDOe3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6a4d1ae1-4071-48ae-8e26-21bfeafc10ac", "DetectTime": "2024-05-21T12:27:35.724936+00:00", "EventTime": "2024-05-21T12:27:35.724955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8akN1DndIytQpGw5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 33} +{"Format": "IDEA0", "ID": "71e5463f-85ea-4761-93c0-ebafdffa46c6", "DetectTime": "2024-05-21T12:27:35.753088+00:00", "EventTime": "2024-05-21T12:27:35.753109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2sTe3gAvddTC3ZZd"], "accumulated_threat_level": 9.6, "timewindow": 33} +{"Format": "IDEA0", "ID": "4f72a777-7dbe-4c1a-9de2-bb38b1503235", "DetectTime": "2024-05-21T12:27:35.784683+00:00", "EventTime": "2024-05-21T12:27:35.784701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0X9y61BOC26eXjYuc"], "accumulated_threat_level": 10.4, "timewindow": 33} +{"Format": "IDEA0", "ID": "4e87bd52-c91e-401a-9ff0-791cad414fb0", "DetectTime": "2024-05-21T12:27:35.814774+00:00", "EventTime": "2024-05-21T12:27:35.814796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpzDi3GLq44yurZxa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 33} +{"Format": "IDEA0", "ID": "eb323054-8a3d-4c58-91bb-78ca1d210bd3", "DetectTime": "2024-05-21T12:27:35.846365+00:00", "EventTime": "2024-05-21T12:27:35.846382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5OmD3Qo4hcuR7fNa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 33} +{"Format": "Json", "ID": "eb323054-8a3d-4c58-91bb-78ca1d210bd3", "DetectTime": "2024-05-21T12:27:35.846365+00:00", "EventTime": "2024-05-21T12:27:35.846382+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "1970-01-02T08:32:36.046810+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:27:36.063697)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cff2f1a8-2a32-4eb3-b1eb-890dd90d562b", "DetectTime": "2024-05-21T12:27:36.076268+00:00", "EventTime": "2024-05-21T12:27:36.076287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RWA2KDizgdxmbA3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "ae58bbfb-9a16-4dd6-966b-209721d94d17", "DetectTime": "2024-05-21T12:27:36.087160+00:00", "EventTime": "2024-05-21T12:27:36.087179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwRDmOKEBT9MmuJf"], "accumulated_threat_level": 1.3, "timewindow": 34} +{"Format": "IDEA0", "ID": "8f3e5dcc-ae41-4cb2-80e0-637701ba57cc", "DetectTime": "2024-05-21T12:27:36.091976+00:00", "EventTime": "2024-05-21T12:27:36.091996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.118.193.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVweIRY8d9Rx7Cm5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "ce28aa73-47ed-4c3e-bac1-87eb3ba5a975", "DetectTime": "2024-05-21T12:27:36.101872+00:00", "EventTime": "2024-05-21T12:27:36.101889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXcmB2fxuWqvYvpe9"], "accumulated_threat_level": 2.1, "timewindow": 34} +{"Format": "IDEA0", "ID": "981c8580-a79d-4303-b301-abb4f251fdd9", "DetectTime": "2024-05-21T12:27:36.111904+00:00", "EventTime": "2024-05-21T12:27:36.111922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiIbAA3VvVF3a2aQEk"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "7e0b91b8-3784-4a92-96d7-23d828ffef0f", "DetectTime": "2024-05-21T12:27:36.122939+00:00", "EventTime": "2024-05-21T12:27:36.122957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBBd4N2uF1XxRos6q9"], "accumulated_threat_level": 3.7, "timewindow": 34} +{"Format": "IDEA0", "ID": "44ffb935-0c0c-4438-8333-43f049bbf1e5", "DetectTime": "2024-05-21T12:27:36.345985+00:00", "EventTime": "2024-05-21T12:27:36.346007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeKex1WCTMXHTfY1b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a8c107fc-850d-4e43-a8fd-f8f65952296f", "DetectTime": "2024-05-21T12:27:36.360462+00:00", "EventTime": "2024-05-21T12:27:36.360482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDLewa4YBVtJQolQQ2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "98201ea8-9590-4054-9d9e-f1442a1e08ef", "DetectTime": "2024-05-21T12:27:36.392817+00:00", "EventTime": "2024-05-21T12:27:36.392838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU5UgKWO3B8aURWRh"], "accumulated_threat_level": 4.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "192cf4d3-453d-4195-adec-d957843a8e28", "DetectTime": "2024-05-21T12:27:36.405582+00:00", "EventTime": "2024-05-21T12:27:36.405602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79XDbEWxkYzoEc8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "541a9ad7-54cd-4993-9e9e-6f221e05ed3b", "DetectTime": "2024-05-21T12:27:36.438034+00:00", "EventTime": "2024-05-21T12:27:36.438057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQjPz2zKJyeZmxdQ4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "65f776eb-e8f2-416c-b991-1cb5736bb343", "DetectTime": "2024-05-21T12:27:36.460532+00:00", "EventTime": "2024-05-21T12:27:36.460552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.235.174.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3Qco3q6krGGVq6C3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "b1d979f5-36dd-40c7-96e4-91246440ef39", "DetectTime": "2024-05-21T12:27:36.479364+00:00", "EventTime": "2024-05-21T12:27:36.479384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.129.124.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvXjUM1oFqg3J8CTK8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "efed62f1-14c9-447a-b501-c9457d2500b7", "DetectTime": "2024-05-21T12:27:36.491626+00:00", "EventTime": "2024-05-21T12:27:36.491647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCznF4gtygOJozjyd"], "accumulated_threat_level": 5.3, "timewindow": 34} +{"Format": "IDEA0", "ID": "f98a2c08-beab-4114-84fb-0cd73a08d72d", "DetectTime": "2024-05-21T12:27:36.538399+00:00", "EventTime": "2024-05-21T12:27:36.538433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.62.204.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrok13busnINKzFwh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "4d94337b-d106-4dee-b782-6b0aa621c177", "DetectTime": "2024-05-21T12:27:36.547895+00:00", "EventTime": "2024-05-21T12:27:36.547914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.116.204.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciw5364Th2zJQLNXVg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a69f03d0-11b4-4a83-96db-64898f956782", "DetectTime": "2024-05-21T12:27:36.587397+00:00", "EventTime": "2024-05-21T12:27:36.587416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.42.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpnkW2ajnB7RBUPa2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "fcd5e336-7534-4927-bc13-30acee28500a", "DetectTime": "2024-05-21T12:27:36.592432+00:00", "EventTime": "2024-05-21T12:27:36.592451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBNJ7333PekbIl7Sa6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "4c41b345-2ec9-4590-b0e9-c45ff9a76db4", "DetectTime": "2024-05-21T12:27:36.617802+00:00", "EventTime": "2024-05-21T12:27:36.617822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.98.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7B6561DVVwzhY2Mh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7bbd5811-538b-45cf-ac5a-205517aed543", "DetectTime": "2024-05-21T12:27:36.657104+00:00", "EventTime": "2024-05-21T12:27:36.657124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvtou64ruWN3Ld9HNh"], "accumulated_threat_level": 6.1, "timewindow": 34} +{"Format": "IDEA0", "ID": "5ebbff6d-8830-42a4-801e-1668762b976c", "DetectTime": "2024-05-21T12:27:36.661911+00:00", "EventTime": "2024-05-21T12:27:36.661927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.123.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthVej24Lh9Uzun6ka"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "1aeea8dc-5da0-44cb-b985-bce96755757c", "DetectTime": "2024-05-21T12:27:36.666929+00:00", "EventTime": "2024-05-21T12:27:36.666946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.131.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSKzmewbvjxfbEv3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "346682f6-6fc9-420e-ab38-2f102aed090b", "DetectTime": "2024-05-21T12:27:36.717115+00:00", "EventTime": "2024-05-21T12:27:36.717135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.222.80.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWo9xp3BRrx5fuAtxg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dabfdc31-a664-4034-a89f-642730dd9e52", "DetectTime": "2024-05-21T12:27:36.721730+00:00", "EventTime": "2024-05-21T12:27:36.721748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.27.131.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4NcabCQEuj0JOWi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6e48bcc6-83d9-4ad5-8013-a26180cb3643", "DetectTime": "2024-05-21T12:27:36.779214+00:00", "EventTime": "2024-05-21T12:27:36.779234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.134.193.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOxL8eFO4kPRwb36"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8b0a1cdb-d3fe-4c9f-af0a-2136200f536d", "DetectTime": "2024-05-21T12:27:36.790502+00:00", "EventTime": "2024-05-21T12:27:36.790521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6lWi3NsK1zAhIy6i"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 34} +{"Format": "IDEA0", "ID": "c1e2edc8-bedb-4170-a175-eedb87bb194d", "DetectTime": "2024-05-21T12:27:36.798135+00:00", "EventTime": "2024-05-21T12:27:36.798152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBaxQD48hpCrTjAwo1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "375918b0-86e1-4989-9dcf-5af77218f350", "DetectTime": "2024-05-21T12:27:36.839835+00:00", "EventTime": "2024-05-21T12:27:36.839855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.193.78.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxmQJ20CPcKsAJRqf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6a3706f6-9fcb-4559-a64b-969e75487678", "DetectTime": "2024-05-21T12:27:36.857406+00:00", "EventTime": "2024-05-21T12:27:36.857428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.197.81.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClmVg31TwuxzZvFjXk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8dbcb982-da1f-4745-a951-c1897a9f3201", "DetectTime": "2024-05-21T12:27:36.862429+00:00", "EventTime": "2024-05-21T12:27:36.862449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.132.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu3VTu4a36lFos1d1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "733f973a-0bb2-4358-8825-7aa321b529a3", "DetectTime": "2024-05-21T12:27:36.899458+00:00", "EventTime": "2024-05-21T12:27:36.899478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnCWh2C2z9LbG5CBc"], "accumulated_threat_level": 7.699999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "465741f8-dad2-4ca2-9e2e-b3c5d102b0c0", "DetectTime": "2024-05-21T12:27:37.000037+00:00", "EventTime": "2024-05-21T12:27:37.000055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBe8n8civT511eEd9"], "accumulated_threat_level": 8.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "60964bda-640f-4ac5-808c-0862a98bfe8b", "DetectTime": "2024-05-21T12:27:37.015430+00:00", "EventTime": "2024-05-21T12:27:37.015451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COaO2C2ZZ0m1KE72Xe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a48b9b3a-47fb-4397-bb6a-539040e88a14", "DetectTime": "2024-05-21T12:27:37.048134+00:00", "EventTime": "2024-05-21T12:27:37.048154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.64.114.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9vNO3ETT5gx4EJuk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e62b3374-db8f-437e-a2e4-a13a4d128c21", "DetectTime": "2024-05-21T12:27:37.281320+00:00", "EventTime": "2024-05-21T12:27:37.281338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.179.11.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbxpp2wne7dTZfWQf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "e4edd172-7a72-4359-99d1-f86275cf9e9d", "DetectTime": "2024-05-21T12:27:37.292792+00:00", "EventTime": "2024-05-21T12:27:37.292812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMtkG1A9kyY73L2J"], "accumulated_threat_level": 9.3, "timewindow": 34} +{"Format": "IDEA0", "ID": "6fa5a624-ebc3-4a86-a373-806c11c006fb", "DetectTime": "2024-05-21T12:27:37.361689+00:00", "EventTime": "2024-05-21T12:27:37.361714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.121.10.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrL2KFGyvOT8gLgb6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "86293221-5eab-4c22-bb4d-e8e789e86547", "DetectTime": "2024-05-21T12:27:37.366687+00:00", "EventTime": "2024-05-21T12:27:37.366706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.248.253.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgPZ4s2C9PiBrITlgd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "6e46f5ad-9ea5-436e-8d95-f833b0047d13", "DetectTime": "2024-05-21T12:27:37.371564+00:00", "EventTime": "2024-05-21T12:27:37.371588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.192.94.172 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCfVL1gT53GeckVFj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "36adb145-f8cb-47bf-be1c-95131f9f70f1", "DetectTime": "2024-05-21T12:27:37.380532+00:00", "EventTime": "2024-05-21T12:27:37.380550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.150.209.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C426bACG1A5zC8cG1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "69ce349a-0ede-49fd-b03c-b3b97ee4b5b1", "DetectTime": "2024-05-21T12:27:37.437855+00:00", "EventTime": "2024-05-21T12:27:37.437875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfYZy1kBFqk3aJB7l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "ce681c41-6bb8-4596-9c0b-a5ea813320d0", "DetectTime": "2024-05-21T12:27:37.450384+00:00", "EventTime": "2024-05-21T12:27:37.450403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPT0p31SoRAikg0l94"], "accumulated_threat_level": 10.100000000000001, "timewindow": 34} +{"Format": "IDEA0", "ID": "0b7f703d-e892-4c34-ab2b-57d63b8d4ea3", "DetectTime": "2024-05-21T12:27:37.486021+00:00", "EventTime": "2024-05-21T12:27:37.486042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptTbn4Gml6ckkbEx8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3acdd44c-89a4-4e82-b179-059d44724f80", "DetectTime": "2024-05-21T12:27:37.507850+00:00", "EventTime": "2024-05-21T12:27:37.507871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctw99O30bHfF8mfvL1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "db20f8a2-bfe4-41a6-9892-bc0f0254cc74", "DetectTime": "2024-05-21T12:27:37.512818+00:00", "EventTime": "2024-05-21T12:27:37.512837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 106.51.157.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRQDH39mKbJbt7w5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "fe2a1cce-80a8-4716-91cc-986642722fb7", "DetectTime": "2024-05-21T12:27:37.562323+00:00", "EventTime": "2024-05-21T12:27:37.562342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgRpi338avzkh5EVa"], "accumulated_threat_level": 10.900000000000002, "timewindow": 34} +{"Format": "IDEA0", "ID": "bb83f4ae-939d-45a3-90b1-1cedd71045e9", "DetectTime": "2024-05-21T12:27:37.567071+00:00", "EventTime": "2024-05-21T12:27:37.567089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.145.81.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpvfsz4XZDJizwBvSk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "574cd63f-3b5c-4182-9589-fb595add146e", "DetectTime": "2024-05-21T12:27:37.578985+00:00", "EventTime": "2024-05-21T12:27:37.579003+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7SgrJ3wYVqmqLkAt4"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "cd67c1da-ad82-41b3-975a-21c2e3334556", "DetectTime": "2024-05-21T12:27:37.591234+00:00", "EventTime": "2024-05-21T12:27:37.591251+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7SgrJ3wYVqmqLkAt4"], "accumulated_threat_level": 1.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1b18fe4e-f2aa-4c47-9bac-ea56a9d4e4d4", "DetectTime": "2024-05-21T12:27:37.595611+00:00", "EventTime": "2024-05-21T12:27:37.595628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.22.218.43 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwJo615KDHcBDaeRk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "4652805f-de40-49aa-8a75-9b022beead83", "DetectTime": "2024-05-21T12:27:37.619152+00:00", "EventTime": "2024-05-21T12:27:37.619171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.142.65.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ2lh9tg7icV9SE22"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "8c685c56-996f-4b0e-ab3f-7fb603e02b63", "DetectTime": "2024-05-21T12:27:37.630840+00:00", "EventTime": "2024-05-21T12:27:37.630857+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueWNK1Oz2NGGjwnJc"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1c9aebb5-cf5d-49c6-a428-4e7097010a88", "DetectTime": "2024-05-21T12:27:37.643092+00:00", "EventTime": "2024-05-21T12:27:37.643111+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueWNK1Oz2NGGjwnJc"], "accumulated_threat_level": 1.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "e2cd5dc5-b151-441b-b009-d68007073498", "DetectTime": "2024-05-21T12:27:37.653656+00:00", "EventTime": "2024-05-21T12:27:37.653675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsCNR2gaNa3QxC4te"], "accumulated_threat_level": 11.700000000000003, "timewindow": 34} +{"Format": "IDEA0", "ID": "876817cb-52b7-4999-bde6-6c42c7c19a1d", "DetectTime": "2024-05-21T12:27:37.669510+00:00", "EventTime": "2024-05-21T12:27:37.669528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc9O8w2DTAJbUFY9G4"], "accumulated_threat_level": 12.500000000000004, "timewindow": 34} +{"Format": "Json", "ID": "876817cb-52b7-4999-bde6-6c42c7c19a1d", "DetectTime": "2024-05-21T12:27:37.669510+00:00", "EventTime": "2024-05-21T12:27:37.669528+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-02T09:03:21.423991+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:27:37.870684)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "c186cf05-73e9-44f9-9cce-7284262c69b2", "DetectTime": "2024-05-21T12:27:37.881844+00:00", "EventTime": "2024-05-21T12:27:37.881864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApPPu33ePVhZLjWD3"], "accumulated_threat_level": 0.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "f811ab83-c656-4fcb-b000-718a84b09eda", "DetectTime": "2024-05-21T12:27:37.893245+00:00", "EventTime": "2024-05-21T12:27:37.893263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3N5n3I6ecbTX2Qjb"], "accumulated_threat_level": 1.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "f94e6644-814a-46e0-8d5d-68461435de0f", "DetectTime": "2024-05-21T12:27:37.905880+00:00", "EventTime": "2024-05-21T12:27:37.905897+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2UEW1dbcQjkIb7U1"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b663c8a0-6d01-405c-8371-cb70abb64329", "DetectTime": "2024-05-21T12:27:37.919153+00:00", "EventTime": "2024-05-21T12:27:37.919175+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2UEW1dbcQjkIb7U1"], "accumulated_threat_level": 2.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1f368c65-20ec-4aeb-ba82-f202bc174d29", "DetectTime": "2024-05-21T12:27:37.931609+00:00", "EventTime": "2024-05-21T12:27:37.931627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaeA54HwN3YwpgtS3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "448a0bc0-d96f-40de-adfb-0a5468a37887", "DetectTime": "2024-05-21T12:27:37.947879+00:00", "EventTime": "2024-05-21T12:27:37.947923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXFrl3sc339MLVoMe"], "accumulated_threat_level": 3.2, "timewindow": 34} +{"Format": "IDEA0", "ID": "12ad73fe-a1c1-4540-84f6-675e85d53443", "DetectTime": "2024-05-21T12:27:37.963225+00:00", "EventTime": "2024-05-21T12:27:37.963247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkQXc0N95zYcZ7sa"], "accumulated_threat_level": 4.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "d75aa3f3-26ef-40ba-9133-3c6cbfb312d1", "DetectTime": "2024-05-21T12:27:37.975704+00:00", "EventTime": "2024-05-21T12:27:37.975722+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCr1dA4PzeTVAXw294"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b6d3fdd5-3476-458b-88c1-43588907059b", "DetectTime": "2024-05-21T12:27:37.988570+00:00", "EventTime": "2024-05-21T12:27:37.988589+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCr1dA4PzeTVAXw294"], "accumulated_threat_level": 2.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "e2a51446-7b2c-45e8-b150-71c8528ce481", "DetectTime": "2024-05-21T12:27:37.998635+00:00", "EventTime": "2024-05-21T12:27:37.998653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9X52JqKrJWhc9J8"], "accumulated_threat_level": 4.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "2ef7499d-1f32-424b-9684-be770aba8dc9", "DetectTime": "2024-05-21T12:27:38.012092+00:00", "EventTime": "2024-05-21T12:27:38.012112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7d5l1dtbIoz0rDG3"], "accumulated_threat_level": 5.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "22835910-94b9-4fcb-a5af-a5b46821de7c", "DetectTime": "2024-05-21T12:27:38.017371+00:00", "EventTime": "2024-05-21T12:27:38.017389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIePOpIj2Nvw0IEg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "a78b764b-7414-4f89-b9a2-51c3ef1c6c8e", "DetectTime": "2024-05-21T12:27:38.022609+00:00", "EventTime": "2024-05-21T12:27:38.022629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.229.23.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RAb42q45djQQ6pIb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dcae7968-b16b-4615-9c7f-a95435df57fd", "DetectTime": "2024-05-21T12:27:38.039150+00:00", "EventTime": "2024-05-21T12:27:38.039171+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFvPCe3U2Az4I4HdSk"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "6d6441d2-79ab-4db4-ac52-62a12f1c581e", "DetectTime": "2024-05-21T12:27:38.055884+00:00", "EventTime": "2024-05-21T12:27:38.055905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFvPCe3U2Az4I4HdSk"], "accumulated_threat_level": 3.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8ef89fe4-71f7-4362-ba49-4292c4462ea8", "DetectTime": "2024-05-21T12:27:38.066341+00:00", "EventTime": "2024-05-21T12:27:38.066358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQSkP12jWRwkUpjz1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 34} +{"Format": "IDEA0", "ID": "b7a1701d-4ee1-44af-a4ce-d8140c7ff361", "DetectTime": "2024-05-21T12:27:38.071075+00:00", "EventTime": "2024-05-21T12:27:38.071092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwN8s1KlKwbwF4tk5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "14256d98-a97e-4ced-9af9-81b5cd9832da", "DetectTime": "2024-05-21T12:27:38.075523+00:00", "EventTime": "2024-05-21T12:27:38.075541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLyPeRBP4N9PQHMc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9df483fa-5bd0-494e-84cc-aa4262d9fbaa", "DetectTime": "2024-05-21T12:27:38.080225+00:00", "EventTime": "2024-05-21T12:27:38.080243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.160.175.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7p3dG4rFW3yucjMTd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "eade1925-e3dd-456f-8f02-9887a7cb0590", "DetectTime": "2024-05-21T12:27:38.090725+00:00", "EventTime": "2024-05-21T12:27:38.090744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMS0x4KTQ5SWIJaNl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "c66e4cf8-7722-43b6-903d-6cf1aed00676", "DetectTime": "2024-05-21T12:27:38.095527+00:00", "EventTime": "2024-05-21T12:27:38.095547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctf50r3BFz5xUnU1x4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "fce0fee9-d83a-4424-bc87-5c57bd085470", "DetectTime": "2024-05-21T12:27:38.100406+00:00", "EventTime": "2024-05-21T12:27:38.100425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.163.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czeneb3YraDUruWQ17"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "cd296c4e-5676-4143-a23f-bf9a4b528d12", "DetectTime": "2024-05-21T12:27:38.111281+00:00", "EventTime": "2024-05-21T12:27:38.111300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0bHM3ZDEpl5Zkd16"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "b69a3edf-3820-4a96-ba6d-065f3b30f579", "DetectTime": "2024-05-21T12:27:38.116490+00:00", "EventTime": "2024-05-21T12:27:38.116509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.77.4.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN73c14qgwDI5DWTg2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "9527e8a9-d853-4ede-8fc0-a8b26ef89520", "DetectTime": "2024-05-21T12:27:38.130561+00:00", "EventTime": "2024-05-21T12:27:38.130581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.91.186.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTW1UpNG29Jh0Rda"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "f1e17583-3d16-4603-b793-397daf517b92", "DetectTime": "2024-05-21T12:27:38.153240+00:00", "EventTime": "2024-05-21T12:27:38.153258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxBt5Qqd9nTe7Ngj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "899f6e54-7ff1-424f-b8c9-a9cb7eda1a77", "DetectTime": "2024-05-21T12:27:38.171463+00:00", "EventTime": "2024-05-21T12:27:38.171481+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMzYCLBTxUcZxRE8"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "68d178de-fdee-43fa-9277-d58d6f2456fe", "DetectTime": "2024-05-21T12:27:38.183374+00:00", "EventTime": "2024-05-21T12:27:38.183392+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMzYCLBTxUcZxRE8"], "accumulated_threat_level": 3.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "13f1f292-8487-450e-83fd-99b7f26046ab", "DetectTime": "2024-05-21T12:27:38.193573+00:00", "EventTime": "2024-05-21T12:27:38.193591+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF02yg31VFeEu38pk"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "764e5275-5bad-44c4-8f8d-4ed548a83f79", "DetectTime": "2024-05-21T12:27:38.206660+00:00", "EventTime": "2024-05-21T12:27:38.206679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVYrT3tuHGB5Qo59a"], "accumulated_threat_level": 9.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "cb9dd9e4-d230-4c24-8bca-d7dad85d039c", "DetectTime": "2024-05-21T12:27:38.218862+00:00", "EventTime": "2024-05-21T12:27:38.218882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF02yg31VFeEu38pk"], "accumulated_threat_level": 4.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "a5111f6c-a6e4-4531-a293-acfabf1134be", "DetectTime": "2024-05-21T12:27:38.229784+00:00", "EventTime": "2024-05-21T12:27:38.229802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BDrh2FXp4XJSVBs4"], "accumulated_threat_level": 10.4, "timewindow": 34} +{"Format": "IDEA0", "ID": "6162e6d5-c206-430e-99b7-f6a5ccd912e2", "DetectTime": "2024-05-21T12:27:38.243923+00:00", "EventTime": "2024-05-21T12:27:38.243943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwgoYM3StmHt02jmKc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 34} +{"Format": "IDEA0", "ID": "74b67fff-29ae-4ff1-bca6-63d10734016c", "DetectTime": "2024-05-21T12:27:38.273243+00:00", "EventTime": "2024-05-21T12:27:38.273263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1EH13Irhp3TMtCH5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 34} +{"Format": "Json", "ID": "74b67fff-29ae-4ff1-bca6-63d10734016c", "DetectTime": "2024-05-21T12:27:38.273243+00:00", "EventTime": "2024-05-21T12:27:38.273263+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "1970-01-02T09:03:24.438330+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:27:38.425880)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fc2e2398-ea18-47c1-a7f2-6516a581786f", "DetectTime": "2024-05-21T12:27:38.436767+00:00", "EventTime": "2024-05-21T12:27:38.436792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.245.191.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zRRRqCh8m0DKan1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "fec0f20e-6b1e-4708-aeb9-3480bfcef9a6", "DetectTime": "2024-05-21T12:27:38.448612+00:00", "EventTime": "2024-05-21T12:27:38.448631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKLkHB2Al0zUeOOqQg"], "accumulated_threat_level": 0.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "73f5924f-1bb3-4d4f-911d-e980b4ee0b3b", "DetectTime": "2024-05-21T12:27:38.453809+00:00", "EventTime": "2024-05-21T12:27:38.453829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.56.147.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtNF214NdrFMQz8ZUk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "dfc7f04c-9697-4682-8455-73691bddbcdf", "DetectTime": "2024-05-21T12:27:38.465745+00:00", "EventTime": "2024-05-21T12:27:38.465765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1kEV2RiW8siCVvP8"], "accumulated_threat_level": 1.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "65c21710-b70e-4ecf-95ff-47462eea37ad", "DetectTime": "2024-05-21T12:27:38.477035+00:00", "EventTime": "2024-05-21T12:27:38.477056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7743/UDP destination IP 31.192.63.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61cBGGbQLmoKUMAb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "3275525b-8962-4d68-b5d6-d26cfb052907", "DetectTime": "2024-05-21T12:27:38.481682+00:00", "EventTime": "2024-05-21T12:27:38.481699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6SN111JIFDiHLg4e", "CbRCZb1UY2qeZn4ute", "CKCOzzDepyR0DxKvl", "CoDartT6C2P34Otca"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "60daea71-98e7-46b9-ab9b-830895bd36e4", "DetectTime": "2024-05-21T12:27:38.486212+00:00", "EventTime": "2024-05-21T12:27:38.486230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.246.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1s8Vi1c7H4CBKSZd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "d0f2d957-11e3-4a46-b613-438038bf73c1", "DetectTime": "2024-05-21T12:27:38.504092+00:00", "EventTime": "2024-05-21T12:27:38.504112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZddD5JNOwgr2zQi"], "accumulated_threat_level": 3.7, "timewindow": 34} +{"Format": "IDEA0", "ID": "8f60786c-2120-49e3-9406-773aae5c4ac3", "DetectTime": "2024-05-21T12:27:38.509146+00:00", "EventTime": "2024-05-21T12:27:38.509164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFico1u5UdDy1sCP"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "7c1e8da4-294d-4aaa-b9d3-d0307796f1e1", "DetectTime": "2024-05-21T12:27:38.513894+00:00", "EventTime": "2024-05-21T12:27:38.513912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.105.31.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMdHTF2OBJZFHUsb1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "279e5c6e-09a2-4363-a0c4-3396dff229a5", "DetectTime": "2024-05-21T12:27:38.518269+00:00", "EventTime": "2024-05-21T12:27:38.518286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.131.229.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgwLT1jUVdDe5sSLf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 31} +{"Format": "IDEA0", "ID": "3d722e55-f944-47b5-88a3-bda00089300b", "DetectTime": "2024-05-21T12:27:38.531689+00:00", "EventTime": "2024-05-21T12:27:38.531711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQPzr2XJ7AH18oTAl"], "accumulated_threat_level": 4.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "053b8bd3-f5ca-4654-8ffc-c3286b9af626", "DetectTime": "2024-05-21T12:27:38.574443+00:00", "EventTime": "2024-05-21T12:27:38.574462+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVH9l25zYK2N7E3mg"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "bcf5ccfd-4d43-49d1-8776-59d45ca7cf66", "DetectTime": "2024-05-21T12:27:38.588449+00:00", "EventTime": "2024-05-21T12:27:38.588478+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVH9l25zYK2N7E3mg"], "accumulated_threat_level": 4.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "b34b684d-281d-4a3f-a4cf-16f9dba21604", "DetectTime": "2024-05-21T12:27:38.810951+00:00", "EventTime": "2024-05-21T12:27:38.810972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFSQE1zXlEMPwq32f"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "8589e5ba-7e1d-4aaf-80ed-c59e1f1a3f46", "DetectTime": "2024-05-21T12:27:38.832380+00:00", "EventTime": "2024-05-21T12:27:38.832401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iyWf4xjJ4z3yFPul"], "accumulated_threat_level": 5.3, "timewindow": 34} +{"Format": "IDEA0", "ID": "74abf9e2-fa12-4c7d-8af8-437025056958", "DetectTime": "2024-05-21T12:27:38.858896+00:00", "EventTime": "2024-05-21T12:27:38.858917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ziOn2A1OXITR3MMh"], "accumulated_threat_level": 6.1, "timewindow": 34} +{"Format": "IDEA0", "ID": "3dd278bc-a14e-4130-be45-53e03e27184a", "DetectTime": "2024-05-21T12:27:38.870981+00:00", "EventTime": "2024-05-21T12:27:38.871001+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqpg8z4uimYYbjiJH3"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1dd3cbfa-daa2-4f2a-8940-e9e7f2a1b7b8", "DetectTime": "2024-05-21T12:27:38.890039+00:00", "EventTime": "2024-05-21T12:27:38.890058+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqpg8z4uimYYbjiJH3"], "accumulated_threat_level": 5.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "e9368ad6-27dd-42c5-87f5-7670e775b278", "DetectTime": "2024-05-21T12:27:38.901832+00:00", "EventTime": "2024-05-21T12:27:38.901853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybFq621oWoKd7Imga"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 34} +{"Format": "IDEA0", "ID": "d126be15-8fb1-4314-a46c-78a82c537ef6", "DetectTime": "2024-05-21T12:27:38.920955+00:00", "EventTime": "2024-05-21T12:27:38.920972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkoGTr4ahNhKBiivy6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "2952b0ea-c329-43d7-9978-0a2cb577b6f5", "DetectTime": "2024-05-21T12:27:38.942893+00:00", "EventTime": "2024-05-21T12:27:38.942914+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.164.65.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CshzuY3yid7EuADakf"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "05f9a02e-98c3-450a-9857-af0e94fd21bb", "DetectTime": "2024-05-21T12:27:38.956767+00:00", "EventTime": "2024-05-21T12:27:38.956792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CshzuY3yid7EuADakf"], "accumulated_threat_level": 5.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "5df4a4ea-f05f-4578-b813-b1841071ed01", "DetectTime": "2024-05-21T12:27:38.968108+00:00", "EventTime": "2024-05-21T12:27:38.968128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpSuD1nhYCbLZakv4"], "accumulated_threat_level": 8.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "969ee5bc-e934-45bd-a47c-a1b55327372f", "DetectTime": "2024-05-21T12:27:38.980112+00:00", "EventTime": "2024-05-21T12:27:38.980131+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbC14h1fa4K1Zn8Hu7"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "c093f167-ca02-4e81-8fa4-51173a0a9d10", "DetectTime": "2024-05-21T12:27:38.993722+00:00", "EventTime": "2024-05-21T12:27:38.993740+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbC14h1fa4K1Zn8Hu7"], "accumulated_threat_level": 6.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "fdc57ca6-7599-4cd4-9d19-9da12f43b197", "DetectTime": "2024-05-21T12:27:39.004329+00:00", "EventTime": "2024-05-21T12:27:39.004346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTIyv4WDRonA8Lc15"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "775832c9-a1cb-4121-8c57-80adf3b0eee8", "DetectTime": "2024-05-21T12:27:39.015561+00:00", "EventTime": "2024-05-21T12:27:39.015579+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTIyv4WDRonA8Lc15"], "accumulated_threat_level": 6.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "9e2242d4-8844-45c2-81db-1afc3dae5a16", "DetectTime": "2024-05-21T12:27:39.026222+00:00", "EventTime": "2024-05-21T12:27:39.026244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUF3Va4WzqSd8YslE4"], "accumulated_threat_level": 9.3, "timewindow": 34} +{"Format": "IDEA0", "ID": "99474f3d-457f-4502-9f36-6917ea5d30ac", "DetectTime": "2024-05-21T12:27:39.040162+00:00", "EventTime": "2024-05-21T12:27:39.040181+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIdti118GUZDQiCGh"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "20c04fa0-d914-49da-a0a5-0ec2ccfc7151", "DetectTime": "2024-05-21T12:27:39.053771+00:00", "EventTime": "2024-05-21T12:27:39.053794+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIdti118GUZDQiCGh"], "accumulated_threat_level": 7.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7f946178-133f-409c-a67c-aca4b6b35605", "DetectTime": "2024-05-21T12:27:39.069262+00:00", "EventTime": "2024-05-21T12:27:39.069279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cepf3c28Tt1Vo1BCs9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 34} +{"Format": "IDEA0", "ID": "f622cafd-6c51-4bab-a539-554818e4099b", "DetectTime": "2024-05-21T12:27:39.080958+00:00", "EventTime": "2024-05-21T12:27:39.080976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EI3T2JFbRG9Xesxk"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "6ba1a4c4-c425-49a2-8db0-749ea52cbbb8", "DetectTime": "2024-05-21T12:27:39.092292+00:00", "EventTime": "2024-05-21T12:27:39.092311+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EI3T2JFbRG9Xesxk"], "accumulated_threat_level": 7.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "a3faf5d6-e6ef-4fc8-94c8-b202061cedbb", "DetectTime": "2024-05-21T12:27:39.103056+00:00", "EventTime": "2024-05-21T12:27:39.103077+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte8BC24pTUfhEeOj"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "789437a1-6651-423c-bfe4-1e0f4b36910b", "DetectTime": "2024-05-21T12:27:39.116559+00:00", "EventTime": "2024-05-21T12:27:39.116579+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte8BC24pTUfhEeOj"], "accumulated_threat_level": 8.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "b69eebd7-d7bf-4ae0-8644-1c526bbeb9e1", "DetectTime": "2024-05-21T12:27:39.127891+00:00", "EventTime": "2024-05-21T12:27:39.127909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnx8Mz4E4VlcxYzyGd"], "accumulated_threat_level": 10.900000000000002, "timewindow": 34} +{"Format": "IDEA0", "ID": "eb1bd415-9d8c-4440-a7d2-a680f2a6d4eb", "DetectTime": "2024-05-21T12:27:39.138794+00:00", "EventTime": "2024-05-21T12:27:39.138813+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgdVb1BCXGhBOlOre"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "16e70845-550b-4e92-996a-e98cbff079db", "DetectTime": "2024-05-21T12:27:39.150869+00:00", "EventTime": "2024-05-21T12:27:39.150889+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgdVb1BCXGhBOlOre"], "accumulated_threat_level": 8.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "7f875437-8f35-4d4a-93b0-59837aad1d3f", "DetectTime": "2024-05-21T12:27:39.162391+00:00", "EventTime": "2024-05-21T12:27:39.162419+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC1v8MJSYyzIJOU4"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "23efefe9-4ff9-4ffa-86ec-2237d91fff0b", "DetectTime": "2024-05-21T12:27:39.173471+00:00", "EventTime": "2024-05-21T12:27:39.173489+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC1v8MJSYyzIJOU4"], "accumulated_threat_level": 9.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "8547ca35-bdff-4bc2-a276-6d894975973f", "DetectTime": "2024-05-21T12:27:39.313340+00:00", "EventTime": "2024-05-21T12:27:39.313357+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYRvg4sBGPRSgrS96"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "927ea58d-d227-43cb-8110-6eaffc5e0f96", "DetectTime": "2024-05-21T12:27:39.324717+00:00", "EventTime": "2024-05-21T12:27:39.324736+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYRvg4sBGPRSgrS96"], "accumulated_threat_level": 9.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "f2212e83-aa3c-4c85-9c29-fcdece66ce13", "DetectTime": "2024-05-21T12:27:39.336443+00:00", "EventTime": "2024-05-21T12:27:39.336461+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMftX2MFfjZR1u1A7"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "7abacd2a-0984-4988-9a3f-6a7509177bab", "DetectTime": "2024-05-21T12:27:39.396472+00:00", "EventTime": "2024-05-21T12:27:39.396491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMftX2MFfjZR1u1A7"], "accumulated_threat_level": 10.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "80c3921a-4d7a-4c38-b1dd-cdc2f8a90ee5", "DetectTime": "2024-05-21T12:27:39.407893+00:00", "EventTime": "2024-05-21T12:27:39.407913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["96.125.211.49"]}], "Attach": [{"Content": "Connection to unknown destination port 4105/UDP destination IP 96.125.211.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvC4tr4rxwE1bSeXZj"], "accumulated_threat_level": 11.700000000000003, "timewindow": 34} +{"Format": "IDEA0", "ID": "cd596d0c-d15e-41da-9908-454aeb61da5f", "DetectTime": "2024-05-21T12:27:39.425700+00:00", "EventTime": "2024-05-21T12:27:39.425720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsvRrp4sH9lkPnFCVf"], "accumulated_threat_level": 12.500000000000004, "timewindow": 34} +{"Format": "Json", "ID": "cd596d0c-d15e-41da-9908-454aeb61da5f", "DetectTime": "2024-05-21T12:27:39.425700+00:00", "EventTime": "2024-05-21T12:27:39.425720+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "1970-01-02T09:34:36.821383+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:27:39.652319)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "7ea35e17-f6ad-49e2-babb-e5fad330dcec", "DetectTime": "2024-05-21T12:27:39.662305+00:00", "EventTime": "2024-05-21T12:27:39.662323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClL8Ji25BvMxnj95oi"], "accumulated_threat_level": 0.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "c072f23c-804f-41f9-9a61-729f50e07b30", "DetectTime": "2024-05-21T12:27:39.667506+00:00", "EventTime": "2024-05-21T12:27:39.667525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cbW11xHkzDycQgpl"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "36d47b52-ea67-4c49-a5a4-fa62972bc79d", "DetectTime": "2024-05-21T12:27:39.673081+00:00", "EventTime": "2024-05-21T12:27:39.673100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxU6i1P8LmZ9aZxW1"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "488eda41-d1d3-4e0e-a560-a05cc93ff0e4", "DetectTime": "2024-05-21T12:27:39.677584+00:00", "EventTime": "2024-05-21T12:27:39.677602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfs5PO2m7Qa0quSLM1"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "9648e005-722f-400b-b822-57766ed4276f", "DetectTime": "2024-05-21T12:27:39.689160+00:00", "EventTime": "2024-05-21T12:27:39.689179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCjnT38qv2sS5zFc4"], "accumulated_threat_level": 1.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "7362ede7-22bc-4e9f-b81c-0c245b5f384c", "DetectTime": "2024-05-21T12:27:39.702743+00:00", "EventTime": "2024-05-21T12:27:39.702766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6iaf4SaydzYw4Tp6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "d77468b6-d5d8-4baf-8eb3-4c450fceec44", "DetectTime": "2024-05-21T12:27:39.708107+00:00", "EventTime": "2024-05-21T12:27:39.708129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czl4dH170JV8wuqELb"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "4ffae15e-3bfe-49d3-8859-590f09a2df53", "DetectTime": "2024-05-21T12:27:39.718078+00:00", "EventTime": "2024-05-21T12:27:39.718101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJu68n31Yp7jjSOMJi"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "83d7e056-ed89-484d-9406-04831553f5aa", "DetectTime": "2024-05-21T12:27:39.740538+00:00", "EventTime": "2024-05-21T12:27:39.740557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "Connection to unknown destination port 29860/UDP destination IP 180.246.90.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCfVp38hA7GTfq5Wa"], "accumulated_threat_level": 3.2, "timewindow": 34} +{"Format": "IDEA0", "ID": "be4d064a-98b5-496d-9186-d42bb8de5975", "DetectTime": "2024-05-21T12:27:39.770138+00:00", "EventTime": "2024-05-21T12:27:39.770160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANGac4jybXJXToD4e"], "accumulated_threat_level": 4.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "1fbfff2a-de0f-4aea-93c8-a9e64348e61c", "DetectTime": "2024-05-21T12:27:39.789863+00:00", "EventTime": "2024-05-21T12:27:39.789887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiL6oh24S9Enqicznc"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "af82c844-6020-454e-ad8f-30c58d9b84ba", "DetectTime": "2024-05-21T12:27:39.819001+00:00", "EventTime": "2024-05-21T12:27:39.819023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6b2p5dUxYHZVBjd"], "accumulated_threat_level": 4.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "ef69eac8-22f2-41e7-82ca-7de25d0f47f4", "DetectTime": "2024-05-21T12:27:39.823883+00:00", "EventTime": "2024-05-21T12:27:39.823900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hX733DD3Q8dboQml"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "9f738a10-08d9-4173-b504-eded5b8933b3", "DetectTime": "2024-05-21T12:27:39.858521+00:00", "EventTime": "2024-05-21T12:27:39.858540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXRsXk2kkBmAT09Ui3"], "accumulated_threat_level": 5.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "0840d28a-c07f-4b6b-a489-c3c65aa8a13d", "DetectTime": "2024-05-21T12:27:39.886203+00:00", "EventTime": "2024-05-21T12:27:39.886222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02uUy3yhuTEyx0Rt4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 34} +{"Format": "IDEA0", "ID": "267d2e3f-691b-4e90-8bf6-24202ecb34c0", "DetectTime": "2024-05-21T12:27:39.913748+00:00", "EventTime": "2024-05-21T12:27:39.913768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIjJdf42gjHRZBdBN7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "ef52e9b4-d3df-485e-8458-7e5f79a795d9", "DetectTime": "2024-05-21T12:27:39.944014+00:00", "EventTime": "2024-05-21T12:27:39.944034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mBow2UWNZ3CtHjn9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "b2a10206-9040-4117-8c86-132499e15afc", "DetectTime": "2024-05-21T12:27:40.016146+00:00", "EventTime": "2024-05-21T12:27:40.016170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE83HE1Uge5YJNYmGj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "86508a6c-f3eb-47d4-b06e-86530930a128", "DetectTime": "2024-05-21T12:27:40.047861+00:00", "EventTime": "2024-05-21T12:27:40.047883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbUTKD27Dr722IuLwb"], "accumulated_threat_level": 9.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "def8cc0b-a8eb-4876-b863-e550ec4bfc4a", "DetectTime": "2024-05-21T12:27:40.087138+00:00", "EventTime": "2024-05-21T12:27:40.087159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cthuj72L3LBuArt9Ki"], "accumulated_threat_level": 10.4, "timewindow": 34} +{"Format": "IDEA0", "ID": "466354be-ab2e-4168-98f1-bf05099a610a", "DetectTime": "2024-05-21T12:27:40.121089+00:00", "EventTime": "2024-05-21T12:27:40.121109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35LKo3PiZsXfp5BTb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 34} +{"Format": "IDEA0", "ID": "5c96fbf0-80a6-4e13-93f9-f335e86b415c", "DetectTime": "2024-05-21T12:27:40.163220+00:00", "EventTime": "2024-05-21T12:27:40.163244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "Connection to unknown destination port 10805/UDP destination IP 60.48.67.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyVSgJt65gKtfJA6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 34} +{"Format": "Json", "ID": "5c96fbf0-80a6-4e13-93f9-f335e86b415c", "DetectTime": "2024-05-21T12:27:40.163220+00:00", "EventTime": "2024-05-21T12:27:40.163244+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "1970-01-02T09:34:40.024050+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:27:40.367618)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7004cd71-6c79-4693-bcfc-31b74ca4dc28", "DetectTime": "2024-05-21T12:27:40.378712+00:00", "EventTime": "2024-05-21T12:27:40.378733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJPVSLBnTXxHBjX7"], "accumulated_threat_level": 0.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "71809aec-350a-4e41-a514-c69c8421f1f0", "DetectTime": "2024-05-21T12:27:40.383636+00:00", "EventTime": "2024-05-21T12:27:40.383654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJxjq4vf0fEbSfRBf"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "2552627d-0153-4a1e-8b2b-de47142da974", "DetectTime": "2024-05-21T12:27:40.394531+00:00", "EventTime": "2024-05-21T12:27:40.394549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlQK21OdpdF3bFNSh"], "accumulated_threat_level": 1.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "80109e6a-17e0-4fdd-864a-8a90dfa87b4c", "DetectTime": "2024-05-21T12:27:40.405686+00:00", "EventTime": "2024-05-21T12:27:40.405704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqF1Tk3cis8KQT2t07"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "aae57ad1-0d5c-4d59-b4d2-42818dbc3ff5", "DetectTime": "2024-05-21T12:27:40.410310+00:00", "EventTime": "2024-05-21T12:27:40.410328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHGy6nZlxMUSOfA8"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "7af9350a-aeef-4897-a38c-13cf8c59c615", "DetectTime": "2024-05-21T12:27:40.429431+00:00", "EventTime": "2024-05-21T12:27:40.429453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TefB3XQEOw72l20k"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "a10cfc1d-a931-4d2a-b809-e21bb1b0709a", "DetectTime": "2024-05-21T12:27:40.453454+00:00", "EventTime": "2024-05-21T12:27:40.453474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySLqt32VaYyvlJgt9"], "accumulated_threat_level": 3.2, "timewindow": 34} +{"Format": "IDEA0", "ID": "514bd05b-7a54-48aa-8063-5182cd83898d", "DetectTime": "2024-05-21T12:27:40.470508+00:00", "EventTime": "2024-05-21T12:27:40.470530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.7.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdLn016HcazN1Dfgb"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "92044fa1-004b-45e0-960c-c874f51eda32", "DetectTime": "2024-05-21T12:27:40.491697+00:00", "EventTime": "2024-05-21T12:27:40.491717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfmph4LEEqVPzKWR2"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "6ff2e1e3-a337-4d61-8db6-048886aca815", "DetectTime": "2024-05-21T12:27:40.520813+00:00", "EventTime": "2024-05-21T12:27:40.520832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZkFh2KLJIuVul957"], "accumulated_threat_level": 4.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "fa3f38a0-1f28-4b9e-aa5a-635827d429f3", "DetectTime": "2024-05-21T12:27:40.533377+00:00", "EventTime": "2024-05-21T12:27:40.533396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT4ipOsUo0da04iMk"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "36f8179a-4996-47b4-850d-2386032936ed", "DetectTime": "2024-05-21T12:27:40.561313+00:00", "EventTime": "2024-05-21T12:27:40.561332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoCAxx3MpwQkFM47D5"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "dcdd0127-f097-4b32-ad9f-11aa3fd14601", "DetectTime": "2024-05-21T12:27:40.593449+00:00", "EventTime": "2024-05-21T12:27:40.593468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEW1G4su4YBdXmlsi"], "accumulated_threat_level": 4.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "5ca57278-ba55-4ac3-9e4c-c28cbcde9a24", "DetectTime": "2024-05-21T12:27:40.598108+00:00", "EventTime": "2024-05-21T12:27:40.598126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3F1I61rJ7a25zOu45"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "5ec834da-c066-4185-8f25-cc8fc938e47e", "DetectTime": "2024-05-21T12:27:40.637204+00:00", "EventTime": "2024-05-21T12:27:40.637224+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSiyRS1FLyfQm7Oc9h"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "1068780a-08af-47f3-b389-c98034971b06", "DetectTime": "2024-05-21T12:27:40.651901+00:00", "EventTime": "2024-05-21T12:27:40.651923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSiyRS1FLyfQm7Oc9h"], "accumulated_threat_level": 10.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "d5199130-b2e7-46c4-93a5-45b3d65c9338", "DetectTime": "2024-05-21T12:27:40.665551+00:00", "EventTime": "2024-05-21T12:27:40.665571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEm6348Ge3RZ20kg5"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "acda953a-301c-4dd4-ada6-54e5648dd466", "DetectTime": "2024-05-21T12:27:40.677715+00:00", "EventTime": "2024-05-21T12:27:40.677736+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEm6348Ge3RZ20kg5"], "accumulated_threat_level": 11.0, "timewindow": 14} +{"Format": "IDEA0", "ID": "0ea8f64a-fd7f-4e9f-bb84-99bbd012e716", "DetectTime": "2024-05-21T12:27:40.690083+00:00", "EventTime": "2024-05-21T12:27:40.690104+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp04TB2h7tdOWfNLJd"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "43616ba7-207c-4e18-b53a-7bcf487ad6c5", "DetectTime": "2024-05-21T12:27:40.705100+00:00", "EventTime": "2024-05-21T12:27:40.705122+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp04TB2h7tdOWfNLJd"], "accumulated_threat_level": 11.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "aec9f034-d071-49c1-8dd3-2116c0de624d", "DetectTime": "2024-05-21T12:27:40.719492+00:00", "EventTime": "2024-05-21T12:27:40.719510+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2Sv33yXZk6jnKdX7"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "5d37d412-d98c-4ade-9222-b9b88c745776", "DetectTime": "2024-05-21T12:27:40.733512+00:00", "EventTime": "2024-05-21T12:27:40.733534+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2Sv33yXZk6jnKdX7"], "accumulated_threat_level": 12.0, "timewindow": 14} +{"Format": "Json", "ID": "5d37d412-d98c-4ade-9222-b9b88c745776", "DetectTime": "2024-05-21T12:27:40.733512+00:00", "EventTime": "2024-05-21T12:27:40.733534+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "1970-01-01T13:42:57.559941+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 14. (real time 2024/05/21 12:27:41.124414)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 14, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "1a740b1f-6296-40c6-a13a-02c6731b1fa6", "DetectTime": "2024-05-21T12:27:41.136150+00:00", "EventTime": "2024-05-21T12:27:41.136169+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrsWCIv0b6vhHq0Hj"], "accumulated_threat_level": 0, "timewindow": 14} +{"Format": "IDEA0", "ID": "df230ed9-3911-44a2-823e-d8063aeaba47", "DetectTime": "2024-05-21T12:27:41.147660+00:00", "EventTime": "2024-05-21T12:27:41.147678+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrsWCIv0b6vhHq0Hj"], "accumulated_threat_level": 0.5, "timewindow": 14} +{"Format": "IDEA0", "ID": "00cc54dd-b7af-4748-93c4-b595f0543f0e", "DetectTime": "2024-05-21T12:27:41.152375+00:00", "EventTime": "2024-05-21T12:27:41.152393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUusQw4X7vQQ8exrKa"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "34c311a8-1259-4446-96ca-fdc28caac09a", "DetectTime": "2024-05-21T12:27:41.156767+00:00", "EventTime": "2024-05-21T12:27:41.156784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17uei2YFBAlaHKwd3"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "2f69eb64-0820-426a-bdfd-cab0fe0abc07", "DetectTime": "2024-05-21T12:27:41.166915+00:00", "EventTime": "2024-05-21T12:27:41.166935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbrbw4nKFUFb5qY13"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "b58783e5-42b3-4391-9d6b-9864376d5e88", "DetectTime": "2024-05-21T12:27:41.177676+00:00", "EventTime": "2024-05-21T12:27:41.177695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4xdB1Rhj4EJkaMuj"], "accumulated_threat_level": 5.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "967d559b-3284-444f-a77d-fbdb0500b790", "DetectTime": "2024-05-21T12:27:41.182308+00:00", "EventTime": "2024-05-21T12:27:41.182325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIB5y4SEBlJuf4OL2"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "c776e45d-70fa-4b1f-b542-0f2437b65d25", "DetectTime": "2024-05-21T12:27:41.186677+00:00", "EventTime": "2024-05-21T12:27:41.186694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKfK54sNIJhOllwKc"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "0c56a89f-a812-4b60-ad47-1772cd2ffe94", "DetectTime": "2024-05-21T12:27:41.191945+00:00", "EventTime": "2024-05-21T12:27:41.191962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3r2cC19oWT5kuxTIf"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "9b3074c5-c056-4389-abef-51423f5619c3", "DetectTime": "2024-05-21T12:27:41.196661+00:00", "EventTime": "2024-05-21T12:27:41.196680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLlP56IZU6HsPP1e"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "dcde9943-e032-400b-b8f2-5a9562de3a8e", "DetectTime": "2024-05-21T12:27:41.201097+00:00", "EventTime": "2024-05-21T12:27:41.201115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.253.163.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwKqkFgl3NKiC8Pk"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "56d65db3-be3b-4756-abe3-8485b274f985", "DetectTime": "2024-05-21T12:27:41.212190+00:00", "EventTime": "2024-05-21T12:27:41.212217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfQxE15YNdTqAcHW3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 34} +{"Format": "IDEA0", "ID": "166bcf47-099f-4d34-b28c-860698d8c22c", "DetectTime": "2024-05-21T12:27:41.224788+00:00", "EventTime": "2024-05-21T12:27:41.224808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGFeS3jHSUw81OTFi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "cbdb66b0-4200-4e6d-aef7-8badbb206555", "DetectTime": "2024-05-21T12:27:41.244598+00:00", "EventTime": "2024-05-21T12:27:41.244619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQbBE1ngNC7PhaMkc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a6354730-9800-481c-ad32-6b2f8c18be17", "DetectTime": "2024-05-21T12:27:41.255725+00:00", "EventTime": "2024-05-21T12:27:41.255746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJlRnpJT7mVD7BWa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "67d1ed0d-11e7-4ec9-911b-18fb681fa1ab", "DetectTime": "2024-05-21T12:27:41.266105+00:00", "EventTime": "2024-05-21T12:27:41.266124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNpbch6VGCVvmzLl"], "accumulated_threat_level": 9.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "7c487998-b9ee-476e-b354-bf1e63f4047d", "DetectTime": "2024-05-21T12:27:41.276728+00:00", "EventTime": "2024-05-21T12:27:41.276749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLemXL22vD8lwSFRX7"], "accumulated_threat_level": 10.4, "timewindow": 34} +{"Format": "IDEA0", "ID": "d3dc54b6-ef07-46af-b230-fef07a0d341c", "DetectTime": "2024-05-21T12:27:41.287973+00:00", "EventTime": "2024-05-21T12:27:41.287993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLErF1PaDq0u6ITVa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 34} +{"Format": "IDEA0", "ID": "34d2ce73-d28f-46b1-9dba-14694429a61d", "DetectTime": "2024-05-21T12:27:41.298739+00:00", "EventTime": "2024-05-21T12:27:41.298760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLmYZU2XN7i3wWZg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 34} +{"Format": "Json", "ID": "34d2ce73-d28f-46b1-9dba-14694429a61d", "DetectTime": "2024-05-21T12:27:41.298739+00:00", "EventTime": "2024-05-21T12:27:41.298760+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "1970-01-02T09:35:01.158232+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:27:41.510618)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3c84a33d-73b1-4356-9f74-7c33b0431f81", "DetectTime": "2024-05-21T12:27:41.522181+00:00", "EventTime": "2024-05-21T12:27:41.522204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIQye2AqiQUMKjVj8"], "accumulated_threat_level": 0.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "c8eb8698-2496-466c-b1c8-f93b32650242", "DetectTime": "2024-05-21T12:27:41.533183+00:00", "EventTime": "2024-05-21T12:27:41.533205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwA0XI3YHJXtnUeayc"], "accumulated_threat_level": 1.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "cdcae28e-7461-4d35-a698-e4c13c9be502", "DetectTime": "2024-05-21T12:27:41.544095+00:00", "EventTime": "2024-05-21T12:27:41.544114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgRtjv4U44bkSna2g6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 34} +{"Format": "IDEA0", "ID": "e01ea813-563c-44e5-86a9-b49fbe586ffd", "DetectTime": "2024-05-21T12:27:41.554715+00:00", "EventTime": "2024-05-21T12:27:41.554734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPPYS24BtYda8dqki"], "accumulated_threat_level": 3.2, "timewindow": 34} +{"Format": "IDEA0", "ID": "81e4b742-da4b-40c6-96b2-c9481695207a", "DetectTime": "2024-05-21T12:27:41.565290+00:00", "EventTime": "2024-05-21T12:27:41.565309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72rcn3jCliRrj6V9h"], "accumulated_threat_level": 4.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "855e09a3-9be8-4638-84b8-23bca2b4dd9d", "DetectTime": "2024-05-21T12:27:41.576311+00:00", "EventTime": "2024-05-21T12:27:41.576331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgUkz63shbdQXVRAQ7"], "accumulated_threat_level": 4.8, "timewindow": 34} +{"Format": "IDEA0", "ID": "849ca631-9d55-4880-9583-367473446e54", "DetectTime": "2024-05-21T12:27:41.581232+00:00", "EventTime": "2024-05-21T12:27:41.581251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ExKE3jlpqIg1xKrk"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "3e8ad34e-8e04-416f-912a-d7fc5accd021", "DetectTime": "2024-05-21T12:27:41.592019+00:00", "EventTime": "2024-05-21T12:27:41.592037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2WGsX2cgwypva07Nh"], "accumulated_threat_level": 5.6, "timewindow": 34} +{"Format": "IDEA0", "ID": "286e79fd-0e03-4601-b14f-d09f6bf072c2", "DetectTime": "2024-05-21T12:27:41.596680+00:00", "EventTime": "2024-05-21T12:27:41.596697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHr8FYkPxWLxW51We"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "e5668e9e-dfa0-47f9-a47f-ff3aba77d3fc", "DetectTime": "2024-05-21T12:27:41.648716+00:00", "EventTime": "2024-05-21T12:27:41.648736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqbBi41OwZIpmNUb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 34} +{"Format": "IDEA0", "ID": "0c919fd4-e17b-4a2e-9ea3-b0354445cf96", "DetectTime": "2024-05-21T12:27:41.794790+00:00", "EventTime": "2024-05-21T12:27:41.794810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIbv7D438CjcKinu6a"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "3170c346-4818-4111-b2e7-45aa0a001c8a", "DetectTime": "2024-05-21T12:27:41.800052+00:00", "EventTime": "2024-05-21T12:27:41.800069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAH6IqJcBxAjnnrG8"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "1dfd709b-042b-4117-8442-07358e2a7eb7", "DetectTime": "2024-05-21T12:27:41.814808+00:00", "EventTime": "2024-05-21T12:27:41.814830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatwHp5L9FUVCW5hl"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "539efaa9-efb0-43f0-ba8f-70b8f5230acc", "DetectTime": "2024-05-21T12:27:41.820290+00:00", "EventTime": "2024-05-21T12:27:41.820310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz0Oep1RvgkZjKybc2"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "8c9d705f-32aa-4652-a3b6-c46dd833eeeb", "DetectTime": "2024-05-21T12:27:41.855103+00:00", "EventTime": "2024-05-21T12:27:41.855124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBsIn1EFjxcU79Z5d"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "744d6046-bf09-4f7a-ae67-b4de693821f7", "DetectTime": "2024-05-21T12:27:41.886031+00:00", "EventTime": "2024-05-21T12:27:41.886050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRiOzp3JC7RBlGJr2b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "76c7497c-d272-495a-87cc-62326eac6c10", "DetectTime": "2024-05-21T12:27:41.921612+00:00", "EventTime": "2024-05-21T12:27:41.921632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.205.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfTg91gy4o11TjtIk"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "37eddf8c-73b1-4cb0-b764-24e01ac1b228", "DetectTime": "2024-05-21T12:27:41.928597+00:00", "EventTime": "2024-05-21T12:27:41.928617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85zTL38L9QMIYuPM"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "64643529-d34d-4601-8d25-d34bc94eb4aa", "DetectTime": "2024-05-21T12:27:41.965603+00:00", "EventTime": "2024-05-21T12:27:41.965625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedJjj4t8pSzoCUUMg"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "08bc20df-bdf2-4454-a3a9-eac511e21388", "DetectTime": "2024-05-21T12:27:41.970509+00:00", "EventTime": "2024-05-21T12:27:41.970529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3mpu2H4f5b0xT1Ph"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "ba602fd1-6ec5-43ce-9a1c-464dff95e568", "DetectTime": "2024-05-21T12:27:42.014016+00:00", "EventTime": "2024-05-21T12:27:42.014036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEeId1WZsEX9R9EJb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "7e35e9c6-f656-4217-9641-226644b7e594", "DetectTime": "2024-05-21T12:27:42.023779+00:00", "EventTime": "2024-05-21T12:27:42.023799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFb5A52N5FFNAOWBfg"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "b832b09b-51ad-4890-921a-9951bb72ea3a", "DetectTime": "2024-05-21T12:27:42.048483+00:00", "EventTime": "2024-05-21T12:27:42.048502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdgUU43FFF6t9z0zb5"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "cfd8ff76-23ee-4bc3-88dd-5f73e46817a9", "DetectTime": "2024-05-21T12:27:42.099891+00:00", "EventTime": "2024-05-21T12:27:42.099918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs21q3RqbTkBcUd01"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "0dd1ad1c-7a9b-4838-bb73-ed55dc5493b3", "DetectTime": "2024-05-21T12:27:42.134798+00:00", "EventTime": "2024-05-21T12:27:42.134821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.98.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBY4y1u0x8qXkyJni"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "55852369-d5e7-4863-b13b-eb39a14c743d", "DetectTime": "2024-05-21T12:27:42.142160+00:00", "EventTime": "2024-05-21T12:27:42.142184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPVqCGFQOIpjVf37", "CUTCTe4f5HttP1f3Kb", "CaztPu4KLhr7kw1bF8", "CSgpPB1cCM3iIJGw5g"], "accumulated_threat_level": 0.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "fff7a422-2a61-445b-b2ce-dd1a495be3ae", "DetectTime": "2024-05-21T12:27:42.186276+00:00", "EventTime": "2024-05-21T12:27:42.186295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyFsY3Vyy9IKvyNJ7"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "ed982e66-a007-4e86-9c14-121e337fa928", "DetectTime": "2024-05-21T12:27:42.211605+00:00", "EventTime": "2024-05-21T12:27:42.211627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.134.193.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjZLxb4MhOWDIJVnIh"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "dcf6cb7a-a2ae-4612-8d7c-3b9a6922b726", "DetectTime": "2024-05-21T12:27:42.345532+00:00", "EventTime": "2024-05-21T12:27:42.345553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.197.81.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7gKiC3aa0tHM5rj"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "5558fbdc-2e36-43fc-8f25-72163e333f51", "DetectTime": "2024-05-21T12:27:42.427202+00:00", "EventTime": "2024-05-21T12:27:42.427225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQ6um7LUUxAYDr4e"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "2a4b88e7-c4d4-407a-a0e6-0583dab9bcca", "DetectTime": "2024-05-21T12:27:42.432099+00:00", "EventTime": "2024-05-21T12:27:42.432117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnoht2LD9gpcaUkj1"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "3b014070-ef04-464b-82bc-4f03756524c6", "DetectTime": "2024-05-21T12:27:42.468627+00:00", "EventTime": "2024-05-21T12:27:42.468648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdxytp2ksLS1VnZMLd"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "84de8f40-efee-48e5-a8b3-4976a539053c", "DetectTime": "2024-05-21T12:27:42.488408+00:00", "EventTime": "2024-05-21T12:27:42.488428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7NXk2yZFOlqHZmh3"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "4b542a0c-e210-4b9c-8255-ac7ebbb8b898", "DetectTime": "2024-05-21T12:27:42.516366+00:00", "EventTime": "2024-05-21T12:27:42.516391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZALdx3MusoKahN43b"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "b30e9102-f3e2-492d-b925-a535c95ed4d9", "DetectTime": "2024-05-21T12:27:42.555274+00:00", "EventTime": "2024-05-21T12:27:42.555291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5NRs4ZrIbXughys1"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "1753c702-fdfc-436e-bf9e-6108184a17b6", "DetectTime": "2024-05-21T12:27:42.586835+00:00", "EventTime": "2024-05-21T12:27:42.586855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoIvVp38XYo9IxJbld"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "7dbd77c5-8397-4c4f-9d20-b1b41582a4da", "DetectTime": "2024-05-21T12:27:42.626255+00:00", "EventTime": "2024-05-21T12:27:42.626278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWwwg1MLPTg93gYb"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "1435a504-1663-46bb-973f-a502aea7dfcc", "DetectTime": "2024-05-21T12:27:42.694503+00:00", "EventTime": "2024-05-21T12:27:42.694524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdbs3v4Z36PE0TTj"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "962acb14-5cc4-49ea-8039-70fd098fe399", "DetectTime": "2024-05-21T12:27:42.987858+00:00", "EventTime": "2024-05-21T12:27:42.987885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO7J7s2VH3MAxlLrZ6"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "f50f34a5-2178-4e6d-9e24-929956b7e214", "DetectTime": "2024-05-21T12:27:43.014075+00:00", "EventTime": "2024-05-21T12:27:43.014094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQt5Ou3dcSeWRi03"], "accumulated_threat_level": 1.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "c9054ff1-ee26-4097-a879-d16815436d43", "DetectTime": "2024-05-21T12:27:43.085420+00:00", "EventTime": "2024-05-21T12:27:43.085441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmshNRzC5hJDfol7"], "accumulated_threat_level": 2.1, "timewindow": 35} +{"Format": "IDEA0", "ID": "44d627a9-96ef-4606-8380-afb9d9465432", "DetectTime": "2024-05-21T12:27:43.204880+00:00", "EventTime": "2024-05-21T12:27:43.204898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKBDG1zCYXfyjZJda"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 35} +{"Format": "IDEA0", "ID": "e449afcb-2e75-464d-9736-14f1584d13e3", "DetectTime": "2024-05-21T12:27:43.266870+00:00", "EventTime": "2024-05-21T12:27:43.266889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMmMzV1XGwGQh9jAm9"], "accumulated_threat_level": 3.7, "timewindow": 35} +{"Format": "IDEA0", "ID": "9ecf82d9-0755-4738-9b45-4200606cc10e", "DetectTime": "2024-05-21T12:27:43.442866+00:00", "EventTime": "2024-05-21T12:27:43.442885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6u6csPuUTi7zG28"], "accumulated_threat_level": 4.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "1ab1d9f0-9872-4af5-8e01-dc98557225da", "DetectTime": "2024-05-21T12:27:43.482239+00:00", "EventTime": "2024-05-21T12:27:43.482265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpI2NT2fnQVSjgImF3"], "accumulated_threat_level": 5.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "bc01fc5d-813a-4c19-b8df-beb6e47e8c38", "DetectTime": "2024-05-21T12:27:43.521765+00:00", "EventTime": "2024-05-21T12:27:43.521783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Vlo3ZZBNvwskEA8"], "accumulated_threat_level": 6.1, "timewindow": 35} +{"Format": "IDEA0", "ID": "0def0e0d-92b4-4899-8d1f-ab6b4306c8d2", "DetectTime": "2024-05-21T12:27:43.550180+00:00", "EventTime": "2024-05-21T12:27:43.550200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoU7UO2Hxloia28pX5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 35} +{"Format": "IDEA0", "ID": "4135e819-cbfe-474c-aa35-a43e1f8bb00c", "DetectTime": "2024-05-21T12:27:43.593036+00:00", "EventTime": "2024-05-21T12:27:43.593056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFDPLI1bmWcoRImMid"], "accumulated_threat_level": 7.699999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "5699afe0-7e47-499d-9118-3e66111250f0", "DetectTime": "2024-05-21T12:27:43.623420+00:00", "EventTime": "2024-05-21T12:27:43.623441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1V9F1X6y55uhSiah"], "accumulated_threat_level": 8.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "4f2a2faa-5a71-47a6-8b64-4b5a561c855f", "DetectTime": "2024-05-21T12:27:43.659871+00:00", "EventTime": "2024-05-21T12:27:43.659890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmphg3ndR16LgvHLb"], "accumulated_threat_level": 9.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "cc6bc004-56f5-42dd-a913-72a45571a4a9", "DetectTime": "2024-05-21T12:27:43.691234+00:00", "EventTime": "2024-05-21T12:27:43.691256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35ac346sPUE8qPjfe"], "accumulated_threat_level": 10.100000000000001, "timewindow": 35} +{"Format": "IDEA0", "ID": "106123dc-4b8e-4b85-b890-6483760b061c", "DetectTime": "2024-05-21T12:27:43.757711+00:00", "EventTime": "2024-05-21T12:27:43.757731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Vq9ilIL3iCe1O37"], "accumulated_threat_level": 10.900000000000002, "timewindow": 35} +{"Format": "IDEA0", "ID": "5bfd6696-1023-4282-bd7e-8da723251dd9", "DetectTime": "2024-05-21T12:27:43.799889+00:00", "EventTime": "2024-05-21T12:27:43.799908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeuOov17UmJvfJfEi8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 35} +{"Format": "IDEA0", "ID": "2648ec2d-ed92-4ae4-8f55-4b15afb64b0b", "DetectTime": "2024-05-21T12:27:43.826361+00:00", "EventTime": "2024-05-21T12:27:43.826380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdTo52b7Mu4x5DtJg"], "accumulated_threat_level": 12.500000000000004, "timewindow": 35} +{"Format": "Json", "ID": "2648ec2d-ed92-4ae4-8f55-4b15afb64b0b", "DetectTime": "2024-05-21T12:27:43.826361+00:00", "EventTime": "2024-05-21T12:27:43.826380+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "1970-01-02T10:06:29.898362+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:27:44.005291)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "e99a4451-dde5-43cd-b8c6-131ed3ce2694", "DetectTime": "2024-05-21T12:27:44.015752+00:00", "EventTime": "2024-05-21T12:27:44.015771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjeXCVaxBAYOh8KN6"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "e7f1b67d-2769-481c-8f2f-0a16659d49e4", "DetectTime": "2024-05-21T12:27:44.020681+00:00", "EventTime": "2024-05-21T12:27:44.020702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeM653eRky4OuL13l"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "7cacc34b-b0ca-4be5-b4dd-0d68e5a68679", "DetectTime": "2024-05-21T12:27:44.025279+00:00", "EventTime": "2024-05-21T12:27:44.025305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19crN1JluklSWnv5j"], "accumulated_threat_level": 1.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "c9afd7cd-671b-413f-90ac-c364def95c71", "DetectTime": "2024-05-21T12:27:44.030679+00:00", "EventTime": "2024-05-21T12:27:44.030699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.253.163.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmx0iO3UPePVAHsDTb"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "fd254c28-ca35-48f8-8d51-383c03827de3", "DetectTime": "2024-05-21T12:27:44.042079+00:00", "EventTime": "2024-05-21T12:27:44.042098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckpt2x2hRWpha9XXqj"], "accumulated_threat_level": 1.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "2423f116-71c7-4c3d-9489-68cd37485032", "DetectTime": "2024-05-21T12:27:44.060316+00:00", "EventTime": "2024-05-21T12:27:44.060335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkXdU3DceQ04Kp3Gc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 35} +{"Format": "IDEA0", "ID": "a520bbc0-77ef-4b52-a40d-1f94427edd56", "DetectTime": "2024-05-21T12:27:44.091034+00:00", "EventTime": "2024-05-21T12:27:44.091053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMI5g2CtYaEQIiGCg"], "accumulated_threat_level": 3.2, "timewindow": 35} +{"Format": "IDEA0", "ID": "045dd1d3-aab6-4d92-9783-494af87d09bb", "DetectTime": "2024-05-21T12:27:44.131989+00:00", "EventTime": "2024-05-21T12:27:44.132010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBmubU7q6CluhHmL9"], "accumulated_threat_level": 4.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "0e7cf5bf-08de-4588-b5d8-c3cfef1037c7", "DetectTime": "2024-05-21T12:27:44.162759+00:00", "EventTime": "2024-05-21T12:27:44.162777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9YXfFzRIGcQBswi"], "accumulated_threat_level": 4.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "380d2295-fe11-43d1-9efc-477f51d06ae2", "DetectTime": "2024-05-21T12:27:44.209762+00:00", "EventTime": "2024-05-21T12:27:44.209784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUMnR2Smcr3gtk05"], "accumulated_threat_level": 5.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "7defab00-3096-477d-99af-70a59817bd7b", "DetectTime": "2024-05-21T12:27:44.228624+00:00", "EventTime": "2024-05-21T12:27:44.228645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehNZk208TACF9COA1"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "3219c2dc-39df-4cda-b80b-730b13fdc30d", "DetectTime": "2024-05-21T12:27:44.271150+00:00", "EventTime": "2024-05-21T12:27:44.271171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKcHK3sKWpBGq3Qxk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 35} +{"Format": "IDEA0", "ID": "d8494c55-d879-4e9c-947f-72fdeaa5411f", "DetectTime": "2024-05-21T12:27:44.283887+00:00", "EventTime": "2024-05-21T12:27:44.283904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.98.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLikf92ubVDBjXMAcg"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "fa03a666-1735-4871-a065-f6b4850e35e3", "DetectTime": "2024-05-21T12:27:44.315733+00:00", "EventTime": "2024-05-21T12:27:44.315754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcNh11Fjm1PyGN8uk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "d4777efe-bb00-4072-ad33-0c1d7d2f8752", "DetectTime": "2024-05-21T12:27:44.344854+00:00", "EventTime": "2024-05-21T12:27:44.344875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXqSHb4u4K3Kn7s3gd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "62289898-a133-4894-953d-dff932f41223", "DetectTime": "2024-05-21T12:27:44.371501+00:00", "EventTime": "2024-05-21T12:27:44.371521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLudT22zmLms6M4yfi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "b80f0d4f-a8cb-47c1-86aa-cd38cb7eff63", "DetectTime": "2024-05-21T12:27:44.402962+00:00", "EventTime": "2024-05-21T12:27:44.402981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqB4T2sZIgKC7AMg9"], "accumulated_threat_level": 9.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "ce9afd93-5908-46a1-a335-dbfbf96c5fba", "DetectTime": "2024-05-21T12:27:44.530769+00:00", "EventTime": "2024-05-21T12:27:44.530787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CherZm2kQLeFMQ2iDh"], "accumulated_threat_level": 10.4, "timewindow": 35} +{"Format": "IDEA0", "ID": "774090c4-f64a-4506-8ce8-4dfbdc2acb38", "DetectTime": "2024-05-21T12:27:44.574599+00:00", "EventTime": "2024-05-21T12:27:44.574620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyHu4P3iy4kTkaUS8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 35} +{"Format": "IDEA0", "ID": "5bbbc616-a344-42d8-ad78-01c274987901", "DetectTime": "2024-05-21T12:27:44.644909+00:00", "EventTime": "2024-05-21T12:27:44.644929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6Nqx2g2f4Vazvne3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 35} +{"Format": "Json", "ID": "5bbbc616-a344-42d8-ad78-01c274987901", "DetectTime": "2024-05-21T12:27:44.644909+00:00", "EventTime": "2024-05-21T12:27:44.644929+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-02T10:06:51.801009+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:27:44.792325)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d60fd0e2-9eea-4cbb-9a3e-dc66c58e7c89", "DetectTime": "2024-05-21T12:27:44.803921+00:00", "EventTime": "2024-05-21T12:27:44.803944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyckBh1FBYuGru1Ivc"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "b5eb1267-a8a9-496f-bdf1-7d9f1c095c69", "DetectTime": "2024-05-21T12:27:44.816715+00:00", "EventTime": "2024-05-21T12:27:44.816734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwP0mR3Nsqj77uFTpc"], "accumulated_threat_level": 1.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "c8be56bc-785f-4722-b9bb-fb8823be13c0", "DetectTime": "2024-05-21T12:27:44.822180+00:00", "EventTime": "2024-05-21T12:27:44.822201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.134.193.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbc10Y1ManNrz6mNAa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "dedad25b-af6c-4ca8-84ea-0cec88526e03", "DetectTime": "2024-05-21T12:27:44.827180+00:00", "EventTime": "2024-05-21T12:27:44.827198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxUsC4bTPOq6JGdF1"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "1e6b472a-2ee1-428f-90a3-3a9bcc2d01ed", "DetectTime": "2024-05-21T12:27:44.831667+00:00", "EventTime": "2024-05-21T12:27:44.831684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfjxP42VJ1U9RtsRqi"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "077d8046-aaa5-4ac0-a3ad-3bf049e0252f", "DetectTime": "2024-05-21T12:27:44.844154+00:00", "EventTime": "2024-05-21T12:27:44.844174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWiviZ2syFngyfDPh6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 35} +{"Format": "IDEA0", "ID": "af009b75-8b05-412c-9967-165c1d292830", "DetectTime": "2024-05-21T12:27:44.873542+00:00", "EventTime": "2024-05-21T12:27:44.873563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWlCQr2o49HZTyBJD"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "32736b89-e281-43ba-902e-9554c43b829f", "DetectTime": "2024-05-21T12:27:44.900835+00:00", "EventTime": "2024-05-21T12:27:44.900856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqbcPp3IoBlfiJAywk"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "ebb63a20-a007-4368-8d81-460f69c882a6", "DetectTime": "2024-05-21T12:27:44.925695+00:00", "EventTime": "2024-05-21T12:27:44.925716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CitWyU3F88WMeePTXl"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "fbc0d144-9ab9-4b8c-a94a-7b0e64443fb6", "DetectTime": "2024-05-21T12:27:44.951512+00:00", "EventTime": "2024-05-21T12:27:44.951532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIMV23ePGmmVCIKTf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "a7704740-2413-4739-b541-c9d425c524f1", "DetectTime": "2024-05-21T12:27:44.984107+00:00", "EventTime": "2024-05-21T12:27:44.984129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBFVo3hN6Yox56Bbd"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "5643c4fc-d27c-4d6a-bdaa-ba68b2fe6773", "DetectTime": "2024-05-21T12:27:45.065180+00:00", "EventTime": "2024-05-21T12:27:45.065201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYufm61d4tRnv9SLLb"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f92a9a93-9c6e-4523-9fab-dd25346c6b5b", "DetectTime": "2024-05-21T12:27:45.089581+00:00", "EventTime": "2024-05-21T12:27:45.089605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoGlY17iVjL0dIv68"], "accumulated_threat_level": 3.2, "timewindow": 35} +{"Format": "IDEA0", "ID": "65cdce86-4561-4f86-b900-b0682416e87f", "DetectTime": "2024-05-21T12:27:45.106618+00:00", "EventTime": "2024-05-21T12:27:45.106641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.7.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcS4Ly1slvELQSTHIk"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "c9e608d9-6b16-4f8d-a63c-ac16e740d237", "DetectTime": "2024-05-21T12:27:45.130907+00:00", "EventTime": "2024-05-21T12:27:45.130927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvoof1PuyXNUy4rl8"], "accumulated_threat_level": 4.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "93841647-6483-4a7b-b8a0-b325bdb7e607", "DetectTime": "2024-05-21T12:27:45.163408+00:00", "EventTime": "2024-05-21T12:27:45.163426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZUhQ1iKt7goi959a"], "accumulated_threat_level": 4.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "9f9a3440-8866-4b7d-949c-8b929661b8be", "DetectTime": "2024-05-21T12:27:45.423465+00:00", "EventTime": "2024-05-21T12:27:45.423486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoozY3TYlDHR73Icf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f13ad26e-9b80-49d9-a946-1042819b4b34", "DetectTime": "2024-05-21T12:27:45.476904+00:00", "EventTime": "2024-05-21T12:27:45.476925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg23Mn2PKENodIsAS9", "CQbmvB21CmXegyvNYf", "CwF7Bb2cR8PUNjfD3i", "CVizgE4DzlKTmaXRAh"], "accumulated_threat_level": 5.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "2d022474-7bda-44ed-9b61-05e7bcd1b0a1", "DetectTime": "2024-05-21T12:27:45.492071+00:00", "EventTime": "2024-05-21T12:27:45.492093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PEF42rhsgHI1eUa8"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "b930b86e-be3d-4246-a52d-b833a6ccbd03", "DetectTime": "2024-05-21T12:27:45.505633+00:00", "EventTime": "2024-05-21T12:27:45.505653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8yUQ1pkt8H7YuiT2"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "d7a38f60-25ca-4617-a09f-522d750b1a95", "DetectTime": "2024-05-21T12:27:45.510090+00:00", "EventTime": "2024-05-21T12:27:45.510108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0OvdWhYDDIiTLxb"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "9b3341d9-0a18-456f-8315-d6a044a2c8dd", "DetectTime": "2024-05-21T12:27:45.514806+00:00", "EventTime": "2024-05-21T12:27:45.514823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMfha4flGpNneH2Ee"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "e7cfffe5-0a1d-4ad2-8579-ebd97e0ef190", "DetectTime": "2024-05-21T12:27:45.526041+00:00", "EventTime": "2024-05-21T12:27:45.526058+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3TyJ135oSMONdDWj9"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "2ad1b829-d75f-4982-8b95-8d840ba4fc27", "DetectTime": "2024-05-21T12:27:45.537628+00:00", "EventTime": "2024-05-21T12:27:45.537646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3TyJ135oSMONdDWj9"], "accumulated_threat_level": 3.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "02f82eed-aff8-470e-a716-b4a235743810", "DetectTime": "2024-05-21T12:27:45.568769+00:00", "EventTime": "2024-05-21T12:27:45.568790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7qBY23x46ZUdjfil"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "8a436a0f-bd1f-4517-94d4-5c9d00895c89", "DetectTime": "2024-05-21T12:27:45.586675+00:00", "EventTime": "2024-05-21T12:27:45.586693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNmObr13T07xwYaE0l"], "accumulated_threat_level": 6.1, "timewindow": 35} +{"Format": "IDEA0", "ID": "7c9bd832-f860-420b-85aa-86aa062b9ee1", "DetectTime": "2024-05-21T12:27:45.605578+00:00", "EventTime": "2024-05-21T12:27:45.605596+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGb9u4vhvtBIsnPv7"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "62922c47-431c-47fe-8f42-0289f402a534", "DetectTime": "2024-05-21T12:27:45.619111+00:00", "EventTime": "2024-05-21T12:27:45.619130+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGb9u4vhvtBIsnPv7"], "accumulated_threat_level": 4.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "72f0914a-fe88-4edf-b8ab-4bf6f6ca73e3", "DetectTime": "2024-05-21T12:27:45.628784+00:00", "EventTime": "2024-05-21T12:27:45.628802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHxCp175potDt8LK6"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "72b34c3e-89f0-4465-b8fe-4e7d1bc1245f", "DetectTime": "2024-05-21T12:27:45.633378+00:00", "EventTime": "2024-05-21T12:27:45.633399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ESSsUtAROKwuw6d"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "e09603f4-d130-47f2-b4a4-ea0652d5be14", "DetectTime": "2024-05-21T12:27:45.659658+00:00", "EventTime": "2024-05-21T12:27:45.659677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5vfW1vDy2vpaDrS6"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "8332f38b-c396-4d50-afee-657eebac6f8c", "DetectTime": "2024-05-21T12:27:45.680602+00:00", "EventTime": "2024-05-21T12:27:45.680624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQ5Hm4CbHSrHf8Bk5"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0550b855-29dc-47e4-a3eb-b3bc2bb240e1", "DetectTime": "2024-05-21T12:27:45.706897+00:00", "EventTime": "2024-05-21T12:27:45.706914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwafk31FDe7RfiF2K6"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 35} +{"Format": "IDEA0", "ID": "7db51fb7-478d-4014-bb19-1a6ae0c381d7", "DetectTime": "2024-05-21T12:27:45.813726+00:00", "EventTime": "2024-05-21T12:27:45.813744+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnt0bT2XhRt78JOYKa"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "2cbb613b-842b-4f3d-b88e-01ff0ab16575", "DetectTime": "2024-05-21T12:27:45.825898+00:00", "EventTime": "2024-05-21T12:27:45.825916+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnt0bT2XhRt78JOYKa"], "accumulated_threat_level": 4.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "c2c796f5-deb8-4659-b473-dad38f6179c8", "DetectTime": "2024-05-21T12:27:45.836562+00:00", "EventTime": "2024-05-21T12:27:45.836582+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06K8P2l9vXDXydoqb"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "dd68914a-3100-48fd-84a1-5cd74192919d", "DetectTime": "2024-05-21T12:27:45.854670+00:00", "EventTime": "2024-05-21T12:27:45.854694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06K8P2l9vXDXydoqb"], "accumulated_threat_level": 5.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "4f212da3-81c8-4c95-bc5c-03b8fc40438c", "DetectTime": "2024-05-21T12:27:45.906560+00:00", "EventTime": "2024-05-21T12:27:45.906582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cztoeb1wVeF4UXl9w4"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "7fd979d3-42d2-4df5-a109-b73a78558a98", "DetectTime": "2024-05-21T12:27:46.047173+00:00", "EventTime": "2024-05-21T12:27:46.047195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwU98s3VuNCF8qHvRf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "3f064622-84d8-46b9-ae21-ec7d24174c8d", "DetectTime": "2024-05-21T12:27:46.118225+00:00", "EventTime": "2024-05-21T12:27:46.118246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccq4sU32DF2V2pgria"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "5c1ed8c5-0102-4721-90fd-af8418a032ef", "DetectTime": "2024-05-21T12:27:46.224983+00:00", "EventTime": "2024-05-21T12:27:46.225008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPpza3F2w2ZuBRve"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "756dd7ab-557e-4824-b957-d46c0d1a8511", "DetectTime": "2024-05-21T12:27:46.274217+00:00", "EventTime": "2024-05-21T12:27:46.274236+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpCSk4MZUXP8TnPQ5"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "c10d0a6d-d33b-42f8-a3df-277d1bcb507a", "DetectTime": "2024-05-21T12:27:46.286381+00:00", "EventTime": "2024-05-21T12:27:46.286398+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpCSk4MZUXP8TnPQ5"], "accumulated_threat_level": 5.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "6c989fec-9ac1-4578-874e-1af18f4769ab", "DetectTime": "2024-05-21T12:27:46.290856+00:00", "EventTime": "2024-05-21T12:27:46.290872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.205.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGk2WsuWzcBVAXPl"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "433d6f52-4894-4343-a593-622d1488a450", "DetectTime": "2024-05-21T12:27:46.380704+00:00", "EventTime": "2024-05-21T12:27:46.380725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9pxqO3c3ls8AF0C3l"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "7df2860e-93b4-4e58-9d62-a4ce41f99799", "DetectTime": "2024-05-21T12:27:46.479421+00:00", "EventTime": "2024-05-21T12:27:46.479444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqzcC2iudr3Q36Ny"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "de95c695-4496-437e-b4ed-529aae22e76b", "DetectTime": "2024-05-21T12:27:46.566777+00:00", "EventTime": "2024-05-21T12:27:46.566800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsvgc4zx9813Penv"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "c1e696ea-fe81-4ad4-a20e-520a47d10bb6", "DetectTime": "2024-05-21T12:27:46.591365+00:00", "EventTime": "2024-05-21T12:27:46.591396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "Connection to unknown destination port 21990/UDP destination IP 223.205.53.114. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVP4K38CmrPKD70F2"], "accumulated_threat_level": 7.699999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "86ce1818-3db3-4e39-bf51-2af7a42d655d", "DetectTime": "2024-05-21T12:27:46.620040+00:00", "EventTime": "2024-05-21T12:27:46.620060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJ1Cn1Zkffbj9ruwg"], "accumulated_threat_level": 8.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "fb4fba87-c510-441f-b513-7ef1e1519c98", "DetectTime": "2024-05-21T12:27:46.639221+00:00", "EventTime": "2024-05-21T12:27:46.639243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHncRF4paeN29Dc3Ih"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "2684b5e9-6ccb-42af-9307-6ff867941fed", "DetectTime": "2024-05-21T12:27:46.661956+00:00", "EventTime": "2024-05-21T12:27:46.661976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6Pbw3OELLD06cKG5"], "accumulated_threat_level": 9.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "e5a1f664-58b3-4004-9643-27d7af6d62a4", "DetectTime": "2024-05-21T12:27:46.691327+00:00", "EventTime": "2024-05-21T12:27:46.691347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRZEl2bucPDuQKkh7"], "accumulated_threat_level": 10.100000000000001, "timewindow": 35} +{"Format": "IDEA0", "ID": "77072cb8-ac81-45eb-ba41-5a266094b2a0", "DetectTime": "2024-05-21T12:27:46.722274+00:00", "EventTime": "2024-05-21T12:27:46.722294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RJr11xVeu7BiQY34"], "accumulated_threat_level": 10.900000000000002, "timewindow": 35} +{"Format": "IDEA0", "ID": "59e2b593-4cea-43eb-9f89-9bcce08863f2", "DetectTime": "2024-05-21T12:27:46.947963+00:00", "EventTime": "2024-05-21T12:27:46.947984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDn2n22WWoyFZxQiaf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "29dca658-f1cd-4542-8df5-304f48c9f299", "DetectTime": "2024-05-21T12:27:46.973552+00:00", "EventTime": "2024-05-21T12:27:46.973574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8DaYdOdQhDchmUb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 35} +{"Format": "IDEA0", "ID": "6a17334d-5af2-474b-8e7f-74c921529d01", "DetectTime": "2024-05-21T12:27:47.043275+00:00", "EventTime": "2024-05-21T12:27:47.043296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CObDJY2zLg1wte1Vf1"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "84866933-49a0-4348-9c50-90ed87442e34", "DetectTime": "2024-05-21T12:27:47.061522+00:00", "EventTime": "2024-05-21T12:27:47.061540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ93Yu3WjnUAXmaGbg"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "e0f4ee12-8d6c-41f0-85d0-0383347224e0", "DetectTime": "2024-05-21T12:27:47.085383+00:00", "EventTime": "2024-05-21T12:27:47.085403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAG0454AtwfHk6kPh7"], "accumulated_threat_level": 12.500000000000004, "timewindow": 35} +{"Format": "Json", "ID": "e0f4ee12-8d6c-41f0-85d0-0383347224e0", "DetectTime": "2024-05-21T12:27:47.085383+00:00", "EventTime": "2024-05-21T12:27:47.085403+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "1970-01-02T10:37:50.996283+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:27:47.317809)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "800b9ac5-0355-4b75-be8f-e08c115d2d28", "DetectTime": "2024-05-21T12:27:47.321829+00:00", "EventTime": "2024-05-21T12:27:47.321846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YPApmPX7IZF9FA3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "b6539d52-5cc5-4db4-accc-fd6e00790d43", "DetectTime": "2024-05-21T12:27:47.332272+00:00", "EventTime": "2024-05-21T12:27:47.332290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW3OL0rOyUyob40e"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "1482f8e0-2a50-4aab-bddf-42975d38ec62", "DetectTime": "2024-05-21T12:27:47.336837+00:00", "EventTime": "2024-05-21T12:27:47.336857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctqz793Wvl6hCOIPtf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f6310b40-1cb2-44dd-b979-b9d4ad0d8a3f", "DetectTime": "2024-05-21T12:27:47.341601+00:00", "EventTime": "2024-05-21T12:27:47.341621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZVN22NRV7nCXq57d"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0598627f-8048-4241-8fca-b4b96053b3d4", "DetectTime": "2024-05-21T12:27:47.346137+00:00", "EventTime": "2024-05-21T12:27:47.346155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmz2Yn33UhOnYh4JF2"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "462a0506-89a0-479b-84c9-4bfe8aff24b5", "DetectTime": "2024-05-21T12:27:47.358136+00:00", "EventTime": "2024-05-21T12:27:47.358161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvo1Icm885tVJO2G2"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "d9c6fd9b-ff77-45e4-9217-81142fdcc9c0", "DetectTime": "2024-05-21T12:27:47.363043+00:00", "EventTime": "2024-05-21T12:27:47.363061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.197.81.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnApTg1GrD72ysvl92"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "1bb09e94-9468-4056-b1b7-3ee953471f38", "DetectTime": "2024-05-21T12:27:47.368061+00:00", "EventTime": "2024-05-21T12:27:47.368079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUVnXe3PAGprLsoOXj"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "48bd52b2-9169-46ba-b937-7e5ab6716b75", "DetectTime": "2024-05-21T12:27:47.372469+00:00", "EventTime": "2024-05-21T12:27:47.372487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWqIJ37HkitAbKTT4"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "1ea6da94-b702-4f5a-a886-f8743b6d026c", "DetectTime": "2024-05-21T12:27:47.384204+00:00", "EventTime": "2024-05-21T12:27:47.384223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGsGbZ2wh23lo9Kkrh"], "accumulated_threat_level": 1.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "d6eee643-e58f-43e2-99d8-30a719a58588", "DetectTime": "2024-05-21T12:27:47.389057+00:00", "EventTime": "2024-05-21T12:27:47.389075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0mWb4twywJEi5RXf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "07c61548-e362-4919-9c90-5b7a1b2fc8cb", "DetectTime": "2024-05-21T12:27:47.394628+00:00", "EventTime": "2024-05-21T12:27:47.394649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaoOwn1lUG17CgNTZb"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "1389d901-2fa9-41f9-a3c2-11e2d017955f", "DetectTime": "2024-05-21T12:27:47.400004+00:00", "EventTime": "2024-05-21T12:27:47.400024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkYxmr1bofuVHLZsu4"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "2f346342-ef75-4ece-8cd0-caa67f8f97bf", "DetectTime": "2024-05-21T12:27:47.411271+00:00", "EventTime": "2024-05-21T12:27:47.411291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74LiW7HgXOByc1V"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 35} +{"Format": "IDEA0", "ID": "b6406394-562e-4b66-9bb1-c2d9c61b4947", "DetectTime": "2024-05-21T12:27:47.426213+00:00", "EventTime": "2024-05-21T12:27:47.426233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzbs34hbs328Hm5x3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "d67d3921-9a57-48ad-9dbc-c56d35fc3770", "DetectTime": "2024-05-21T12:27:47.458249+00:00", "EventTime": "2024-05-21T12:27:47.458270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFt4Fd3zvEkw03MWZi"], "accumulated_threat_level": 3.2, "timewindow": 35} +{"Format": "IDEA0", "ID": "1710e6ae-df44-4084-9642-85364756a57c", "DetectTime": "2024-05-21T12:27:47.486026+00:00", "EventTime": "2024-05-21T12:27:47.486045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuU0MC6YFwLk04cig"], "accumulated_threat_level": 4.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "02fb6c73-083b-4e9f-b67b-85f55724e7a0", "DetectTime": "2024-05-21T12:27:47.506012+00:00", "EventTime": "2024-05-21T12:27:47.506036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CksLBV3UEM2z0d3gBh"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "a6f72de3-47fc-4933-8d0c-ad0bec87e1d1", "DetectTime": "2024-05-21T12:27:47.532247+00:00", "EventTime": "2024-05-21T12:27:47.532266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVdoE49uAzQiCj944"], "accumulated_threat_level": 4.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "60bd906f-5bd1-4d43-8ba8-9aacc1d01c6c", "DetectTime": "2024-05-21T12:27:47.574548+00:00", "EventTime": "2024-05-21T12:27:47.574565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPf6K1Oz5mEJbUdDc"], "accumulated_threat_level": 5.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "281c5e22-8e56-45e0-92f8-f902b0ea9213", "DetectTime": "2024-05-21T12:27:47.604548+00:00", "EventTime": "2024-05-21T12:27:47.604567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyauiR2nrC0bQ5QG89"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 35} +{"Format": "IDEA0", "ID": "606d5dc5-a476-4728-9f24-239270b2489b", "DetectTime": "2024-05-21T12:27:47.635380+00:00", "EventTime": "2024-05-21T12:27:47.635402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEFUn4TPaNEb5B4jf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "54f05f0e-2aac-4e66-b65c-4ef5f32b666b", "DetectTime": "2024-05-21T12:27:47.709304+00:00", "EventTime": "2024-05-21T12:27:47.709321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjvbrjZjkZ97BrC1g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "8205b951-cf12-4c69-96d5-4c423c4772fe", "DetectTime": "2024-05-21T12:27:47.739112+00:00", "EventTime": "2024-05-21T12:27:47.739130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1R6e4vZK6zDXR2jk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "266e3ce7-f00f-42ed-8249-2bd08ae47c5e", "DetectTime": "2024-05-21T12:27:47.769618+00:00", "EventTime": "2024-05-21T12:27:47.769635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZjSJqcIwqQjzjPd"], "accumulated_threat_level": 9.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "f329f74d-5fd5-4f0b-8083-d9c4a9195ee1", "DetectTime": "2024-05-21T12:27:47.796856+00:00", "EventTime": "2024-05-21T12:27:47.796875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VX3gZZYDwfMxog"], "accumulated_threat_level": 10.4, "timewindow": 35} +{"Format": "IDEA0", "ID": "22effbab-e105-4fa5-926f-f991e0219706", "DetectTime": "2024-05-21T12:27:47.827057+00:00", "EventTime": "2024-05-21T12:27:47.827078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfja9ZfMG8WzG3rce"], "accumulated_threat_level": 11.200000000000001, "timewindow": 35} +{"Format": "IDEA0", "ID": "177b8c60-21f7-40f9-97e8-47f750567bbf", "DetectTime": "2024-05-21T12:27:47.857322+00:00", "EventTime": "2024-05-21T12:27:47.857341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLqkgW3TwhtWiLLnS9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 35} +{"Format": "Json", "ID": "177b8c60-21f7-40f9-97e8-47f750567bbf", "DetectTime": "2024-05-21T12:27:47.857322+00:00", "EventTime": "2024-05-21T12:27:47.857341+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "1970-01-02T10:38:11.669477+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:27:48.039050)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f74e8622-a9ec-475d-b52a-fa7ab325cf50", "DetectTime": "2024-05-21T12:27:48.049825+00:00", "EventTime": "2024-05-21T12:27:48.049845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLg6i4A775hiQ5rt9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "cee8d71f-65a2-400d-bc36-70ffc83fc871", "DetectTime": "2024-05-21T12:27:48.061072+00:00", "EventTime": "2024-05-21T12:27:48.061090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CahgsA3W3kg8piDy0c"], "accumulated_threat_level": 1.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "d9b01d4c-5f49-46ca-b6fa-a07b1aed8664", "DetectTime": "2024-05-21T12:27:48.071527+00:00", "EventTime": "2024-05-21T12:27:48.071545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "Connection to unknown destination port 24577/UDP destination IP 110.138.15.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbENoW10dnYhJWiYZf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 35} +{"Format": "IDEA0", "ID": "643fca1a-ab6d-44de-a9f9-d0c8f2fa1290", "DetectTime": "2024-05-21T12:27:48.082533+00:00", "EventTime": "2024-05-21T12:27:48.082552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy40k11ok6HoqEArq8"], "accumulated_threat_level": 3.2, "timewindow": 35} +{"Format": "IDEA0", "ID": "9f83c10a-a8b0-4f7e-bd69-7f6a72b79e5d", "DetectTime": "2024-05-21T12:27:48.093997+00:00", "EventTime": "2024-05-21T12:27:48.094019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGbqJXvy3gHSVA3j"], "accumulated_threat_level": 4.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "84d72248-5a76-451c-aecf-ed21769f7c47", "DetectTime": "2024-05-21T12:27:48.099083+00:00", "EventTime": "2024-05-21T12:27:48.099102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7UJX1bZh8tm6cUU6"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "2b60d9e2-8c79-4352-a68f-17d587b7b66a", "DetectTime": "2024-05-21T12:27:48.110942+00:00", "EventTime": "2024-05-21T12:27:48.110961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHdZ6PdPtfbC6NGl"], "accumulated_threat_level": 4.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "49a1813f-f656-4be5-8cde-e2dc06c05d13", "DetectTime": "2024-05-21T12:27:48.133009+00:00", "EventTime": "2024-05-21T12:27:48.133028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMALi4FKxPxvnkQTb"], "accumulated_threat_level": 5.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "f76aedf8-4fdb-42d1-ba2f-1c0b9731c70e", "DetectTime": "2024-05-21T12:27:48.162332+00:00", "EventTime": "2024-05-21T12:27:48.162352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9L8jnreonWLQSxel"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 35} +{"Format": "IDEA0", "ID": "c805b899-dea5-4958-9517-3123013116ad", "DetectTime": "2024-05-21T12:27:48.191694+00:00", "EventTime": "2024-05-21T12:27:48.191714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7a5t2sGR4v1Larh5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "26fd019b-ccaa-48c9-a2ae-a91922d0e986", "DetectTime": "2024-05-21T12:27:48.221143+00:00", "EventTime": "2024-05-21T12:27:48.221166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEjx67IZFSC8ibYd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "f9e9bd4f-c2c4-4fc1-9b83-0983d5c7fe8e", "DetectTime": "2024-05-21T12:27:48.245142+00:00", "EventTime": "2024-05-21T12:27:48.245163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.205.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXZvM24sys428M4pa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0b6bae6d-5ebb-4c93-a3cb-c9a1d783d9db", "DetectTime": "2024-05-21T12:27:48.268824+00:00", "EventTime": "2024-05-21T12:27:48.268842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8uVe92N2m5kCTW8B2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 35} +{"Format": "IDEA0", "ID": "5dfdf9d3-2b12-4bd7-8900-53f8b878d719", "DetectTime": "2024-05-21T12:27:48.335730+00:00", "EventTime": "2024-05-21T12:27:48.335751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6dYI3NuCIimkhRHj"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "43d82e87-653a-4dbd-8a28-a4742efe0b71", "DetectTime": "2024-05-21T12:27:48.340991+00:00", "EventTime": "2024-05-21T12:27:48.341009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMI8Z3IaLgoDl7n6f"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0fb42bc7-17bd-4a50-b010-84f1c78f7f6f", "DetectTime": "2024-05-21T12:27:48.381503+00:00", "EventTime": "2024-05-21T12:27:48.381522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnA0Fa3n0YutPdTZfe"], "accumulated_threat_level": 9.6, "timewindow": 35} +{"Format": "IDEA0", "ID": "5406a379-ad3b-42a4-b32b-2f69cbb57821", "DetectTime": "2024-05-21T12:27:48.389245+00:00", "EventTime": "2024-05-21T12:27:48.389266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIO3m3rlSihfNaji5"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "5b900a2c-07c0-4e26-a56f-1b74e54a9741", "DetectTime": "2024-05-21T12:27:48.430822+00:00", "EventTime": "2024-05-21T12:27:48.430841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6mpG11ePBLblxEF4"], "accumulated_threat_level": 10.4, "timewindow": 35} +{"Format": "IDEA0", "ID": "16a64435-2d6b-435e-9c73-a7f24bcb4fcb", "DetectTime": "2024-05-21T12:27:48.446187+00:00", "EventTime": "2024-05-21T12:27:48.446204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqSAIKujvVVFBKJjh"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "ec03f058-aa39-44df-999c-d49c6dc37e82", "DetectTime": "2024-05-21T12:27:48.660208+00:00", "EventTime": "2024-05-21T12:27:48.660230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3tqx2AXFIev93uWi", "C7p2lXL6ts4IX4psl", "CKo4bJ26t16GnmAaf2", "C2s4kB4BFmNljr8lr6"], "accumulated_threat_level": 0.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "86c5f9e0-fb0c-4453-b468-b92470e4b5a8", "DetectTime": "2024-05-21T12:27:48.689800+00:00", "EventTime": "2024-05-21T12:27:48.689818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6aKS52FXe1OT0IeY1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 35} +{"Format": "IDEA0", "ID": "aff34a9e-4936-4f4f-97e6-d835fd2779ea", "DetectTime": "2024-05-21T12:27:48.726681+00:00", "EventTime": "2024-05-21T12:27:48.726702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXG1zNyUMwpPAyG4"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "ea4af096-92d1-4d9d-a707-56f1d893d355", "DetectTime": "2024-05-21T12:27:48.745216+00:00", "EventTime": "2024-05-21T12:27:48.745236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCDum4oiiJRMiRt6c"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "9cee600e-b164-4530-a200-fdcb831db77b", "DetectTime": "2024-05-21T12:27:48.750047+00:00", "EventTime": "2024-05-21T12:27:48.750066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czbrng13ZzNk5oSCNh"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "42f24532-1de4-40b7-848e-3d35975e7cd7", "DetectTime": "2024-05-21T12:27:48.759070+00:00", "EventTime": "2024-05-21T12:27:48.759090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clqhi81P6FwnBSiJXa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "d7c5adcc-fce5-4be0-b4ee-d1965d0505e3", "DetectTime": "2024-05-21T12:27:48.763730+00:00", "EventTime": "2024-05-21T12:27:48.763748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZwrk2vR2eGBYa24"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "2c693e54-5f6e-45b8-99d6-f9ebeb3ba5be", "DetectTime": "2024-05-21T12:27:48.844751+00:00", "EventTime": "2024-05-21T12:27:48.844775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.7.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5JubFw5q4nR1REAf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "c44fceb3-4564-4eed-af36-949114bfb722", "DetectTime": "2024-05-21T12:27:48.849706+00:00", "EventTime": "2024-05-21T12:27:48.849725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl39l82TY2vzZRUuyb"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "df1f9417-5381-4642-90d6-ad977e30f5d3", "DetectTime": "2024-05-21T12:27:48.902232+00:00", "EventTime": "2024-05-21T12:27:48.902251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "Connection to unknown destination port 12619/UDP destination IP 125.161.71.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBbI18vNho8oaYV9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 35} +{"Format": "Json", "ID": "df1f9417-5381-4642-90d6-ad977e30f5d3", "DetectTime": "2024-05-21T12:27:48.902232+00:00", "EventTime": "2024-05-21T12:27:48.902251+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "1970-01-02T10:38:14.896758+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:27:49.138288)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b94fe77f-8c62-4d95-8e2b-0f2e36a161a1", "DetectTime": "2024-05-21T12:27:49.142683+00:00", "EventTime": "2024-05-21T12:27:49.142703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdZf637jLlG0W1SGg"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "44a587d6-6028-483e-8bcb-a52bda01cf66", "DetectTime": "2024-05-21T12:27:49.147343+00:00", "EventTime": "2024-05-21T12:27:49.147361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUr95xk4RynLAR97"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "ff0c026b-961c-4f5c-990a-afe16ad6a993", "DetectTime": "2024-05-21T12:27:49.159427+00:00", "EventTime": "2024-05-21T12:27:49.159445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Agnn11xztdcZ9Njc"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "b9fb69f9-9614-4116-b9d9-8d7fc7c85c8f", "DetectTime": "2024-05-21T12:27:49.165511+00:00", "EventTime": "2024-05-21T12:27:49.165530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF8d31GKy7V2bw5t2"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "bc0646f2-d595-4949-bb2c-5832f9a5cc27", "DetectTime": "2024-05-21T12:27:49.170094+00:00", "EventTime": "2024-05-21T12:27:49.170112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP7JKbnbUQjm6YzVa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "b88cb94f-705e-40ff-81fa-9f038d25afec", "DetectTime": "2024-05-21T12:27:49.196968+00:00", "EventTime": "2024-05-21T12:27:49.196994+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwJ5z1dZyNtau17Ei"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "c1985e0a-1c72-4b47-b291-6460d6350e0c", "DetectTime": "2024-05-21T12:27:49.214130+00:00", "EventTime": "2024-05-21T12:27:49.214148+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwJ5z1dZyNtau17Ei"], "accumulated_threat_level": 6.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "5014b3e7-63f2-4345-b981-13775948ce82", "DetectTime": "2024-05-21T12:27:49.219489+00:00", "EventTime": "2024-05-21T12:27:49.219508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfyTA43V1MUMvLmAc"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f8a6ee43-19da-49d7-aac0-99e4db418a10", "DetectTime": "2024-05-21T12:27:49.224392+00:00", "EventTime": "2024-05-21T12:27:49.224411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0EU63sqAznwktoLi"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "6f08e2c0-ccdc-4d7f-a1b3-6ec9c539c9c1", "DetectTime": "2024-05-21T12:27:49.228962+00:00", "EventTime": "2024-05-21T12:27:49.228980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsAts2iVBeuzTpRx8"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "39961b55-2aee-4832-b654-492c4310cf0d", "DetectTime": "2024-05-21T12:27:49.244288+00:00", "EventTime": "2024-05-21T12:27:49.244306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmx5h2v5oxLZTG0Z7"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "e53843fb-9997-4183-a662-1abf46fa087e", "DetectTime": "2024-05-21T12:27:49.256407+00:00", "EventTime": "2024-05-21T12:27:49.256426+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmx5h2v5oxLZTG0Z7"], "accumulated_threat_level": 6.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "2d6daf28-f8cd-4635-a61c-cdac966d1afe", "DetectTime": "2024-05-21T12:27:49.262317+00:00", "EventTime": "2024-05-21T12:27:49.262335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQMVH1NRfmYSQ5Bc3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "29b83af8-13d1-4238-8dd0-fa8b28119800", "DetectTime": "2024-05-21T12:27:49.273558+00:00", "EventTime": "2024-05-21T12:27:49.273577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyV0LK1jG0vRaqiHHd"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "94b7f8ed-cc48-4608-a6d5-a1e7d46419ca", "DetectTime": "2024-05-21T12:27:49.284278+00:00", "EventTime": "2024-05-21T12:27:49.284296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVD4NEoSp1c7qLwLg"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "645ab7f3-156e-4b17-a14d-d6e6ea59732b", "DetectTime": "2024-05-21T12:27:49.295854+00:00", "EventTime": "2024-05-21T12:27:49.295872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVD4NEoSp1c7qLwLg"], "accumulated_threat_level": 7.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "152d6885-3d5a-4145-ba8e-2e05268cae83", "DetectTime": "2024-05-21T12:27:49.313685+00:00", "EventTime": "2024-05-21T12:27:49.313703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZWcc2J2kMWg93Akd"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "01de02ce-8025-473f-85f4-6f10058d4add", "DetectTime": "2024-05-21T12:27:49.344430+00:00", "EventTime": "2024-05-21T12:27:49.344448+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdY3a51hgORdwbLwE5"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "5519a3ef-9366-4397-89a6-6cf0b773b0ad", "DetectTime": "2024-05-21T12:27:49.361249+00:00", "EventTime": "2024-05-21T12:27:49.361267+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdY3a51hgORdwbLwE5"], "accumulated_threat_level": 7.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "12d893ad-aefa-4689-b74b-12153e953dca", "DetectTime": "2024-05-21T12:27:49.401384+00:00", "EventTime": "2024-05-21T12:27:49.401405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6cb81lUgOo0hxFKj"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "20febc61-abfb-4010-9e48-51a65dea6617", "DetectTime": "2024-05-21T12:27:49.433918+00:00", "EventTime": "2024-05-21T12:27:49.433939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICnrq2b3S4vO8Md2e"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "b91aae2c-cf41-494a-b339-e872e1a4e20d", "DetectTime": "2024-05-21T12:27:49.449598+00:00", "EventTime": "2024-05-21T12:27:49.449618+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxwl5y4dJj5oj4esx6"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "8453e20a-f793-4631-9cb1-b8f1bf0f065a", "DetectTime": "2024-05-21T12:27:49.461074+00:00", "EventTime": "2024-05-21T12:27:49.461092+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxwl5y4dJj5oj4esx6"], "accumulated_threat_level": 8.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "33095489-9f66-4daa-bbc4-3a53961c8a4d", "DetectTime": "2024-05-21T12:27:49.474880+00:00", "EventTime": "2024-05-21T12:27:49.474898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTl4W3ppWmxCCnqX3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "5a25b67d-841a-4dd1-b78a-ab2ad325fbb4", "DetectTime": "2024-05-21T12:27:49.516201+00:00", "EventTime": "2024-05-21T12:27:49.516220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZpfQi3JMXjFrkjlee"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "a0f04565-bb85-4d43-8187-134ffffb699a", "DetectTime": "2024-05-21T12:27:49.544965+00:00", "EventTime": "2024-05-21T12:27:49.544984+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.164.65.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYqXD3nS0rqbHkcP3"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "de6212ed-ed0d-461e-851e-317f1388ccc4", "DetectTime": "2024-05-21T12:27:49.555603+00:00", "EventTime": "2024-05-21T12:27:49.555621+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYqXD3nS0rqbHkcP3"], "accumulated_threat_level": 8.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "45f9651a-e6e7-4f50-8aeb-21378b993852", "DetectTime": "2024-05-21T12:27:49.560755+00:00", "EventTime": "2024-05-21T12:27:49.560777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkiBj4HenLCX4lUr4"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "9956e4dc-23fc-4cc1-bdf4-d9cf0236594a", "DetectTime": "2024-05-21T12:27:49.595865+00:00", "EventTime": "2024-05-21T12:27:49.595885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUf9FuswTlcfRo72"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "4e08fb78-f9d0-4a7d-b73b-49874fe07d0f", "DetectTime": "2024-05-21T12:27:49.625037+00:00", "EventTime": "2024-05-21T12:27:49.625060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHQ1y1cT91Uv3gu2f"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "a5e373d1-49a8-40e4-8e8f-a3790b9dc2de", "DetectTime": "2024-05-21T12:27:49.695392+00:00", "EventTime": "2024-05-21T12:27:49.695414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQIPk3IpiRJNcqQm8"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "bde25598-c71a-4433-a546-3d027eef4f56", "DetectTime": "2024-05-21T12:27:49.729525+00:00", "EventTime": "2024-05-21T12:27:49.729548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeoBuGXKg4LUv1se9"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "7b09379a-d03c-4935-a38a-4a22ebe9cb31", "DetectTime": "2024-05-21T12:27:49.747533+00:00", "EventTime": "2024-05-21T12:27:49.747552+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeoBuGXKg4LUv1se9"], "accumulated_threat_level": 9.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "5fefc13f-f31a-43fa-bc69-a8bfc7a8ced1", "DetectTime": "2024-05-21T12:27:49.752597+00:00", "EventTime": "2024-05-21T12:27:49.752619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpAI01mSEEafPVg4"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "c7b5441d-96b2-4792-a777-c47f328cd758", "DetectTime": "2024-05-21T12:27:49.765337+00:00", "EventTime": "2024-05-21T12:27:49.765354+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eFcj4E9wsu7DccFk"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "bb72b147-19eb-4b57-9740-81633de7ca78", "DetectTime": "2024-05-21T12:27:49.777229+00:00", "EventTime": "2024-05-21T12:27:49.777248+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eFcj4E9wsu7DccFk"], "accumulated_threat_level": 9.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "3e9c7bd9-da1d-4a98-af29-e627a4bbfbf1", "DetectTime": "2024-05-21T12:27:49.782103+00:00", "EventTime": "2024-05-21T12:27:49.782124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJsSHag4UWLWoU43"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f17036aa-1e12-40a5-a928-1bf48b972daf", "DetectTime": "2024-05-21T12:27:49.808150+00:00", "EventTime": "2024-05-21T12:27:49.808172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4K7Sy3Vi44maogeOd"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "22f87ea6-dfb8-4e61-b2dd-2ed88a915120", "DetectTime": "2024-05-21T12:27:49.820159+00:00", "EventTime": "2024-05-21T12:27:49.820177+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WLZ119SvSOmDCITj"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "56746c5d-83ed-4573-ae18-0b712df9d565", "DetectTime": "2024-05-21T12:27:49.831479+00:00", "EventTime": "2024-05-21T12:27:49.831499+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WLZ119SvSOmDCITj"], "accumulated_threat_level": 10.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "2b211a64-abca-4d6e-87a6-5843ba963da9", "DetectTime": "2024-05-21T12:27:49.842466+00:00", "EventTime": "2024-05-21T12:27:49.842485+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czj9eg2b8GsYeBx6ub"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "ae7f98ff-79d7-4717-a086-5cacb30ff235", "DetectTime": "2024-05-21T12:27:49.854051+00:00", "EventTime": "2024-05-21T12:27:49.854069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czj9eg2b8GsYeBx6ub"], "accumulated_threat_level": 10.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "badc8911-c7ef-4ac8-aa7a-69047712514b", "DetectTime": "2024-05-21T12:27:49.866619+00:00", "EventTime": "2024-05-21T12:27:49.866638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWqQc2I28CpyYqQm"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "19850e65-c3d2-4e27-8211-4a0187f66e35", "DetectTime": "2024-05-21T12:27:49.878734+00:00", "EventTime": "2024-05-21T12:27:49.878754+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWqQc2I28CpyYqQm"], "accumulated_threat_level": 11.2, "timewindow": 15} +{"Format": "IDEA0", "ID": "78369e69-9d25-49fa-ad1d-b6077351bd96", "DetectTime": "2024-05-21T12:27:49.935792+00:00", "EventTime": "2024-05-21T12:27:49.935809+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNnB12xDLCRiJi9x7"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "45bccb6c-0df3-4876-8960-411bb40a8ab2", "DetectTime": "2024-05-21T12:27:49.953413+00:00", "EventTime": "2024-05-21T12:27:49.953434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNnB12xDLCRiJi9x7"], "accumulated_threat_level": 11.7, "timewindow": 15} +{"Format": "IDEA0", "ID": "1ad60b4d-bfb4-467b-8050-e1fe3f20faa1", "DetectTime": "2024-05-21T12:27:49.967151+00:00", "EventTime": "2024-05-21T12:27:49.967170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWitrJ2wqH0vlVmtQ9"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "f706f154-8b7f-4cc1-b10a-353159bc7aec", "DetectTime": "2024-05-21T12:27:49.979382+00:00", "EventTime": "2024-05-21T12:27:49.979401+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWitrJ2wqH0vlVmtQ9"], "accumulated_threat_level": 12.2, "timewindow": 15} +{"Format": "Json", "ID": "f706f154-8b7f-4cc1-b10a-353159bc7aec", "DetectTime": "2024-05-21T12:27:49.979382+00:00", "EventTime": "2024-05-21T12:27:49.979401+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "1970-01-01T14:13:48.157794+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:27:50.385282)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "89f8d078-dade-4c0c-b934-bd032870d722", "DetectTime": "2024-05-21T12:27:50.397945+00:00", "EventTime": "2024-05-21T12:27:50.397965+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGThr4lpliMPVqZL4"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "ca28ab28-1960-46e7-b09a-3ca60f1425de", "DetectTime": "2024-05-21T12:27:50.410360+00:00", "EventTime": "2024-05-21T12:27:50.410383+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGThr4lpliMPVqZL4"], "accumulated_threat_level": 0.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "e176a861-210b-4562-b887-967578e4635f", "DetectTime": "2024-05-21T12:27:50.421746+00:00", "EventTime": "2024-05-21T12:27:50.421764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YyEFnlYKTByctZ2"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "010d3f34-8f8e-4e74-854a-28c643040019", "DetectTime": "2024-05-21T12:27:50.435272+00:00", "EventTime": "2024-05-21T12:27:50.435291+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YyEFnlYKTByctZ2"], "accumulated_threat_level": 1.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "51579062-8380-4c0d-85e4-a6f424f70ef4", "DetectTime": "2024-05-21T12:27:50.446104+00:00", "EventTime": "2024-05-21T12:27:50.446121+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjPMdv2qu7Aw1RmzQ4"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "2e8d2f85-aa4d-4bb7-bf94-41624bd653c5", "DetectTime": "2024-05-21T12:27:50.456960+00:00", "EventTime": "2024-05-21T12:27:50.456978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjPMdv2qu7Aw1RmzQ4"], "accumulated_threat_level": 1.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "9f467756-1457-4dbf-adab-50de2a7b7739", "DetectTime": "2024-05-21T12:27:50.467392+00:00", "EventTime": "2024-05-21T12:27:50.467410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ei0qJs9FyoshJl2"], "accumulated_threat_level": 1.3, "timewindow": 36} +{"Format": "IDEA0", "ID": "c8cc1eae-d487-4b23-a9e0-444c00712679", "DetectTime": "2024-05-21T12:27:50.472136+00:00", "EventTime": "2024-05-21T12:27:50.472153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF63II3rz8hnaYMMOe"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "eb891aff-4ba4-4b5a-b3ef-9419060e7c73", "DetectTime": "2024-05-21T12:27:50.476412+00:00", "EventTime": "2024-05-21T12:27:50.476429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lQBU2KLiamBq8umf"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "16a6dea3-c14e-4e2e-9d2c-d85e41ea856d", "DetectTime": "2024-05-21T12:27:50.480919+00:00", "EventTime": "2024-05-21T12:27:50.480937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAN2n2M4jBlqRr7ij"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0c7b9d23-8a0e-443f-87ff-6d08fe333ab4", "DetectTime": "2024-05-21T12:27:50.490902+00:00", "EventTime": "2024-05-21T12:27:50.490919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0j3BP4QoSlQZaSa"], "accumulated_threat_level": 2.1, "timewindow": 36} +{"Format": "IDEA0", "ID": "002dcbca-40d0-424c-a6b8-2230df83c0e3", "DetectTime": "2024-05-21T12:27:50.502009+00:00", "EventTime": "2024-05-21T12:27:50.502026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQxlNgnxAnKYPsH7"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 36} +{"Format": "IDEA0", "ID": "7cbbbbca-667f-4225-9e9c-967a8beab0b6", "DetectTime": "2024-05-21T12:27:50.515134+00:00", "EventTime": "2024-05-21T12:27:50.515155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFUgA40FXPd8c2Pq3"], "accumulated_threat_level": 3.7, "timewindow": 36} +{"Format": "IDEA0", "ID": "0a7dcd8a-617e-49c2-b2a5-00046eca42fd", "DetectTime": "2024-05-21T12:27:50.525355+00:00", "EventTime": "2024-05-21T12:27:50.525373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPCrq2RvBVxD9yrre"], "accumulated_threat_level": 4.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "d33ebf4b-5577-46c6-9a05-365b96bc9558", "DetectTime": "2024-05-21T12:27:50.537852+00:00", "EventTime": "2024-05-21T12:27:50.537871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cypr7q3OtnQUWcsY0j"], "accumulated_threat_level": 5.3, "timewindow": 36} +{"Format": "IDEA0", "ID": "1e4216dd-2f20-4709-83d4-55f15e0d8911", "DetectTime": "2024-05-21T12:27:50.549202+00:00", "EventTime": "2024-05-21T12:27:50.549220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkxHs0UrZZVTH5Le"], "accumulated_threat_level": 6.1, "timewindow": 36} +{"Format": "IDEA0", "ID": "39489be2-39f7-4079-9eaa-1ea3c10e7635", "DetectTime": "2024-05-21T12:27:50.559317+00:00", "EventTime": "2024-05-21T12:27:50.559335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXyhQM2FuBdGUIFpvk"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 36} +{"Format": "IDEA0", "ID": "390dd505-d612-4242-b816-e3bd3adcf226", "DetectTime": "2024-05-21T12:27:50.569633+00:00", "EventTime": "2024-05-21T12:27:50.569652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3ZmIEFIqxlGMuy7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "e6ea6964-59fd-4dc5-bee5-36d08378a0b1", "DetectTime": "2024-05-21T12:27:50.580323+00:00", "EventTime": "2024-05-21T12:27:50.580346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LOX31GzaZPjZMIF1"], "accumulated_threat_level": 8.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "aa39e6fe-9a8c-4b32-8be8-6c2b05fde429", "DetectTime": "2024-05-21T12:27:50.585589+00:00", "EventTime": "2024-05-21T12:27:50.585609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbfBfC1tKdQTiGx5C3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "7d0f4d85-a5ef-4eee-90c3-1624ea2a5b85", "DetectTime": "2024-05-21T12:27:50.596712+00:00", "EventTime": "2024-05-21T12:27:50.596731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6Rnv4r2spX2lmf0d"], "accumulated_threat_level": 9.3, "timewindow": 36} +{"Format": "IDEA0", "ID": "bd4aa831-78a7-47db-ba8e-201159476818", "DetectTime": "2024-05-21T12:27:50.608168+00:00", "EventTime": "2024-05-21T12:27:50.608188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKxQcz2Fxe8P7Nem7j"], "accumulated_threat_level": 10.100000000000001, "timewindow": 36} +{"Format": "IDEA0", "ID": "80a04e75-746b-4a57-abfd-4d9e17250f2d", "DetectTime": "2024-05-21T12:27:50.618460+00:00", "EventTime": "2024-05-21T12:27:50.618478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblDpe4HROKgczuUcc"], "accumulated_threat_level": 10.900000000000002, "timewindow": 36} +{"Format": "IDEA0", "ID": "5bb83833-b9d1-4243-8f34-3e17ec32b85e", "DetectTime": "2024-05-21T12:27:50.628565+00:00", "EventTime": "2024-05-21T12:27:50.628582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbzrjo23p8h7e7S1ec"], "accumulated_threat_level": 11.700000000000003, "timewindow": 36} +{"Format": "IDEA0", "ID": "d92930a1-5b8d-457e-af3e-9c09f78ba8a7", "DetectTime": "2024-05-21T12:27:50.633137+00:00", "EventTime": "2024-05-21T12:27:50.633154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NPT14Z6Pjo40JAL9"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "422300ea-3bd5-477e-85b4-8ed50c710231", "DetectTime": "2024-05-21T12:27:50.642446+00:00", "EventTime": "2024-05-21T12:27:50.642464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdVwSl4xxoepRp3Cn4"], "accumulated_threat_level": 12.500000000000004, "timewindow": 36} +{"Format": "Json", "ID": "422300ea-3bd5-477e-85b4-8ed50c710231", "DetectTime": "2024-05-21T12:27:50.642446+00:00", "EventTime": "2024-05-21T12:27:50.642464+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "1970-01-02T11:09:13.617107+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2024/05/21 12:27:50.832588)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 36, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "6bab7906-01aa-4eb9-8565-1b5ad949eca8", "DetectTime": "2024-05-21T12:27:50.842430+00:00", "EventTime": "2024-05-21T12:27:50.842447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clw6UX9CkzCynlghh"], "accumulated_threat_level": 0.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "7b74af96-4b2b-4a3d-bdff-9b6f6b5ad89f", "DetectTime": "2024-05-21T12:27:50.853087+00:00", "EventTime": "2024-05-21T12:27:50.853107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipiBa2xh54TTH5gCk"], "accumulated_threat_level": 1.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "c02fe408-dac8-4bf5-848b-ae3054a10750", "DetectTime": "2024-05-21T12:27:50.857745+00:00", "EventTime": "2024-05-21T12:27:50.857763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpE4D3Ue141118RJh"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "6e98b4f7-6e28-4afe-819b-175ba5e245b7", "DetectTime": "2024-05-21T12:27:50.865390+00:00", "EventTime": "2024-05-21T12:27:50.865410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy18Qo18tAYd9jL8al"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f2e9554b-e037-4994-aefe-68b4e7c2469a", "DetectTime": "2024-05-21T12:27:50.869932+00:00", "EventTime": "2024-05-21T12:27:50.869949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.197.81.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClvMNx2hP9gWzk4OYd"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "4fbb9228-04e5-4eb5-b253-273d9231291a", "DetectTime": "2024-05-21T12:27:50.874285+00:00", "EventTime": "2024-05-21T12:27:50.874302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8akN1DndIytQpGw5"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "a2f8e708-d73e-4c94-8b5d-418b91c4661f", "DetectTime": "2024-05-21T12:27:50.880217+00:00", "EventTime": "2024-05-21T12:27:50.880237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2sTe3gAvddTC3ZZd"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "8aab77e5-ff1d-414b-8d94-3b4c61fe2965", "DetectTime": "2024-05-21T12:27:50.885369+00:00", "EventTime": "2024-05-21T12:27:50.885387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0X9y61BOC26eXjYuc"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "29696412-d94b-4044-8a05-af824667dca5", "DetectTime": "2024-05-21T12:27:50.890597+00:00", "EventTime": "2024-05-21T12:27:50.890616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpzDi3GLq44yurZxa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "165aa657-9599-48b9-9bf4-4f500f9532ea", "DetectTime": "2024-05-21T12:27:50.904040+00:00", "EventTime": "2024-05-21T12:27:50.904058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI5bFv1MHbCYBaIAr4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 36} +{"Format": "IDEA0", "ID": "d2f743e3-c9c2-4b71-ade1-6680a0a5d94b", "DetectTime": "2024-05-21T12:27:50.908573+00:00", "EventTime": "2024-05-21T12:27:50.908591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5OmD3Qo4hcuR7fNa"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "b4ec5ff0-c9e4-4d73-a0d6-8c5c0b53e4d4", "DetectTime": "2024-05-21T12:27:50.942165+00:00", "EventTime": "2024-05-21T12:27:50.942187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7k1S24c5zXa9jiLa"], "accumulated_threat_level": 3.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "8b15a261-1a57-479a-a950-e55cc86735be", "DetectTime": "2024-05-21T12:27:50.984608+00:00", "EventTime": "2024-05-21T12:27:50.984629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RWA2KDizgdxmbA3"], "accumulated_threat_level": 0.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0db86e54-5501-4f89-a23d-8358b5d1d2f4", "DetectTime": "2024-05-21T12:27:51.011372+00:00", "EventTime": "2024-05-21T12:27:51.011392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwRDmOKEBT9MmuJf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "d91a5cc6-221f-4f07-924d-14dc7d28b715", "DetectTime": "2024-05-21T12:27:51.023121+00:00", "EventTime": "2024-05-21T12:27:51.023141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0dhv24Eclk2Ub44h"], "accumulated_threat_level": 4.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "c79ff44e-8ce8-4cbe-a12d-ef483d609846", "DetectTime": "2024-05-21T12:27:51.053234+00:00", "EventTime": "2024-05-21T12:27:51.053254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXcmB2fxuWqvYvpe9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "5a8585a7-e5c0-4f7a-bec7-8bac82805504", "DetectTime": "2024-05-21T12:27:51.074845+00:00", "EventTime": "2024-05-21T12:27:51.074867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpgX31S3GB8uHSk5d"], "accumulated_threat_level": 4.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "acd86e2d-61b3-4513-b8c9-f3fef221de20", "DetectTime": "2024-05-21T12:27:51.092435+00:00", "EventTime": "2024-05-21T12:27:51.092453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiIbAA3VvVF3a2aQEk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "5cd77a0e-30d5-43e6-9020-48319fb460c0", "DetectTime": "2024-05-21T12:27:51.128964+00:00", "EventTime": "2024-05-21T12:27:51.128983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4Slj1rOxopfL99hi"], "accumulated_threat_level": 5.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "bb1ea6a2-1d08-4426-8048-3b108018f738", "DetectTime": "2024-05-21T12:27:51.158886+00:00", "EventTime": "2024-05-21T12:27:51.158905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0TbB25oCJkucwHWh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 36} +{"Format": "IDEA0", "ID": "5797a8d3-1a69-404b-a7bf-dd70b61ba70e", "DetectTime": "2024-05-21T12:27:51.187610+00:00", "EventTime": "2024-05-21T12:27:51.187630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNxQE4cSz8J1Xfsi4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "05adbd28-9f6f-4343-b0e4-4a80225a5f7f", "DetectTime": "2024-05-21T12:27:51.318371+00:00", "EventTime": "2024-05-21T12:27:51.318389+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbrk0d3Fk0rnBtBoT6"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "bf001147-a9bf-4203-a52f-7179552b2627", "DetectTime": "2024-05-21T12:27:51.330207+00:00", "EventTime": "2024-05-21T12:27:51.330226+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbrk0d3Fk0rnBtBoT6"], "accumulated_threat_level": 2.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "e1a953b6-262b-4597-8f3a-b89d4c8918d9", "DetectTime": "2024-05-21T12:27:51.342364+00:00", "EventTime": "2024-05-21T12:27:51.342381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0guWk170WMXu1fDV8"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "039f8a26-fb0e-4b6e-b53e-d0d856981f65", "DetectTime": "2024-05-21T12:27:51.357141+00:00", "EventTime": "2024-05-21T12:27:51.357165+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0guWk170WMXu1fDV8"], "accumulated_threat_level": 2.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "19976605-bb35-4355-9a73-9109b00a63aa", "DetectTime": "2024-05-21T12:27:51.368243+00:00", "EventTime": "2024-05-21T12:27:51.368262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AneG5SakMemnI6i"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "73128144-a53a-4510-b42c-3cb495d09b15", "DetectTime": "2024-05-21T12:27:51.379458+00:00", "EventTime": "2024-05-21T12:27:51.379477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AneG5SakMemnI6i"], "accumulated_threat_level": 3.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "981833db-a1d6-4748-90ea-51b9b23c9237", "DetectTime": "2024-05-21T12:27:51.384569+00:00", "EventTime": "2024-05-21T12:27:51.384593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBBd4N2uF1XxRos6q9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "2b99263f-5cde-4b7b-ba64-45a32df41207", "DetectTime": "2024-05-21T12:27:51.436890+00:00", "EventTime": "2024-05-21T12:27:51.436910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIilDL1LeqJpnwO59"], "accumulated_threat_level": 7.999999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "94762b4e-b2d7-4f6b-86e7-5e05534ea67a", "DetectTime": "2024-05-21T12:27:51.451682+00:00", "EventTime": "2024-05-21T12:27:51.451701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU5UgKWO3B8aURWRh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "21c28854-26fa-4022-8516-833d4595cefb", "DetectTime": "2024-05-21T12:27:51.484716+00:00", "EventTime": "2024-05-21T12:27:51.484737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU4Jbh16P2pqhbS8c8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "60c16646-1495-46e0-a9ac-e734843b1369", "DetectTime": "2024-05-21T12:27:51.512414+00:00", "EventTime": "2024-05-21T12:27:51.512433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "Connection to unknown destination port 18232/UDP destination IP 118.68.135.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfwSU2jdNuMH7kFA2"], "accumulated_threat_level": 9.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "02ae2d11-4196-4a05-9103-c05a02f9096f", "DetectTime": "2024-05-21T12:27:51.542132+00:00", "EventTime": "2024-05-21T12:27:51.542151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRpWt2RQKZQn7UiAe"], "accumulated_threat_level": 10.4, "timewindow": 36} +{"Format": "IDEA0", "ID": "4b88f389-fdf4-4824-8bd1-0ee2266e41b5", "DetectTime": "2024-05-21T12:27:51.561962+00:00", "EventTime": "2024-05-21T12:27:51.561983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCznF4gtygOJozjyd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "458062bd-53ad-4081-8fcd-c307e85e403e", "DetectTime": "2024-05-21T12:27:51.584996+00:00", "EventTime": "2024-05-21T12:27:51.585017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch3bST1pCCilQgYd64"], "accumulated_threat_level": 11.200000000000001, "timewindow": 36} +{"Format": "IDEA0", "ID": "149ee5ad-f3fc-42a2-a3ee-0530919aff36", "DetectTime": "2024-05-21T12:27:51.612462+00:00", "EventTime": "2024-05-21T12:27:51.612484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COJ3aP1ZB88xaWM5X7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 36} +{"Format": "Json", "ID": "149ee5ad-f3fc-42a2-a3ee-0530919aff36", "DetectTime": "2024-05-21T12:27:51.612462+00:00", "EventTime": "2024-05-21T12:27:51.612484+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "1970-01-02T11:09:32.483295+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2024/05/21 12:27:51.769926)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 36, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b0af75c3-6741-406d-af5e-92444dadd427", "DetectTime": "2024-05-21T12:27:51.783687+00:00", "EventTime": "2024-05-21T12:27:51.783705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszKh92gTPIzeURJL4"], "accumulated_threat_level": 0.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "616cc603-96cb-4b7d-829e-1e245ea72f3b", "DetectTime": "2024-05-21T12:27:51.794696+00:00", "EventTime": "2024-05-21T12:27:51.794719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycFef2CkykpD4L32"], "accumulated_threat_level": 1.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "ac344376-b626-4dfe-a8aa-bbcd7d7fa9ee", "DetectTime": "2024-05-21T12:27:51.805645+00:00", "EventTime": "2024-05-21T12:27:51.805663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYEPd16wEt5PO893l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 36} +{"Format": "IDEA0", "ID": "df68521e-2a17-4bbf-8b5a-949060fad125", "DetectTime": "2024-05-21T12:27:51.816236+00:00", "EventTime": "2024-05-21T12:27:51.816255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUyn829f128EvqTde"], "accumulated_threat_level": 3.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "217063fd-5e6d-4f67-b977-b6afc3fa3fec", "DetectTime": "2024-05-21T12:27:51.821899+00:00", "EventTime": "2024-05-21T12:27:51.821918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvtou64ruWN3Ld9HNh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "57eba9b7-b31b-4caa-a275-997aca54b2a0", "DetectTime": "2024-05-21T12:27:51.834217+00:00", "EventTime": "2024-05-21T12:27:51.834238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4YIB4GnDbpnYpg3"], "accumulated_threat_level": 4.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "0ececb8a-fc6a-4faa-96b4-f7511f371ea5", "DetectTime": "2024-05-21T12:27:51.868722+00:00", "EventTime": "2024-05-21T12:27:51.868743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6lWi3NsK1zAhIy6i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "7d2e7e07-7993-4714-8c2e-183efe86d27f", "DetectTime": "2024-05-21T12:27:51.917057+00:00", "EventTime": "2024-05-21T12:27:51.917077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnCWh2C2z9LbG5CBc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "6a7409e7-f0ea-4032-b8c3-f2b2e2f2c1ca", "DetectTime": "2024-05-21T12:27:51.943388+00:00", "EventTime": "2024-05-21T12:27:51.943408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoW1Fw1rJI719Qf3pi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "5bfad6c2-3458-43c2-a8da-8e5b6e097c03", "DetectTime": "2024-05-21T12:27:51.988124+00:00", "EventTime": "2024-05-21T12:27:51.988147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.7.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCpKu2Ec61akLdKHk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "dcd5f7f1-e422-4aab-97f0-fb01ed8dc6e1", "DetectTime": "2024-05-21T12:27:52.004464+00:00", "EventTime": "2024-05-21T12:27:52.004486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMAnz49eWtwo3Xv5e", "C7T8A5GaWFnH000a1", "CA1bNZ1nTD09m2h6d4", "CwwCp6dGOWKn2v1di"], "accumulated_threat_level": 4.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "07df5846-f7e2-4911-ab5a-1a7b45583885", "DetectTime": "2024-05-21T12:27:52.029351+00:00", "EventTime": "2024-05-21T12:27:52.029370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBe8n8civT511eEd9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "abe7ea63-0551-4b24-a786-9e370004d1d2", "DetectTime": "2024-05-21T12:27:52.355939+00:00", "EventTime": "2024-05-21T12:27:52.355962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMtkG1A9kyY73L2J"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "dcd8f285-7e20-4bca-9262-7d6184d96194", "DetectTime": "2024-05-21T12:27:52.502337+00:00", "EventTime": "2024-05-21T12:27:52.502356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPT0p31SoRAikg0l94"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "ba0d5a40-d81a-442d-8107-85ce71f6256c", "DetectTime": "2024-05-21T12:27:52.626546+00:00", "EventTime": "2024-05-21T12:27:52.626567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgRpi338avzkh5EVa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "b85aae8d-5785-4647-a438-a4d40c4de90c", "DetectTime": "2024-05-21T12:27:52.659707+00:00", "EventTime": "2024-05-21T12:27:52.659728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsCNR2gaNa3QxC4te"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "933ab0c1-b09b-42f8-b20d-f8fb8a3dd40d", "DetectTime": "2024-05-21T12:27:52.689458+00:00", "EventTime": "2024-05-21T12:27:52.689478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc9O8w2DTAJbUFY9G4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "0bf3c2c0-296c-49ae-973c-bc14aff3c8cf", "DetectTime": "2024-05-21T12:27:52.719681+00:00", "EventTime": "2024-05-21T12:27:52.719703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApPPu33ePVhZLjWD3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "453328b8-0f18-4fe8-95bf-db98b7c5d536", "DetectTime": "2024-05-21T12:27:52.748701+00:00", "EventTime": "2024-05-21T12:27:52.748726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3N5n3I6ecbTX2Qjb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "51fe092d-8db9-4ca4-9b56-9b93e476c3c0", "DetectTime": "2024-05-21T12:27:52.778804+00:00", "EventTime": "2024-05-21T12:27:52.778824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaeA54HwN3YwpgtS3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "67818c12-dec9-4e36-9ec5-eed5f0d71f48", "DetectTime": "2024-05-21T12:27:52.804652+00:00", "EventTime": "2024-05-21T12:27:52.804676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXFrl3sc339MLVoMe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "b9d3a3c4-e194-49a9-8eed-606d9657f8ff", "DetectTime": "2024-05-21T12:27:52.830872+00:00", "EventTime": "2024-05-21T12:27:52.830891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkQXc0N95zYcZ7sa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "204f23f0-e862-45e2-a0b7-fcac08b7176d", "DetectTime": "2024-05-21T12:27:52.857505+00:00", "EventTime": "2024-05-21T12:27:52.857527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9X52JqKrJWhc9J8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "e1b9b7e6-0409-4efb-b6e1-658ae5315865", "DetectTime": "2024-05-21T12:27:53.114494+00:00", "EventTime": "2024-05-21T12:27:53.114514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQSkP12jWRwkUpjz1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "582aa96c-f307-4850-ae4d-7679d9b5d2b5", "DetectTime": "2024-05-21T12:27:53.119214+00:00", "EventTime": "2024-05-21T12:27:53.119234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMS0x4KTQ5SWIJaNl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "4711e7cb-e8d5-4a36-9e80-ebe4abeb65f0", "DetectTime": "2024-05-21T12:27:53.125103+00:00", "EventTime": "2024-05-21T12:27:53.125123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7d5l1dtbIoz0rDG3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "9bb4ffcc-39cd-469e-ae51-176e9f62920e", "DetectTime": "2024-05-21T12:27:53.176351+00:00", "EventTime": "2024-05-21T12:27:53.176373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0bHM3ZDEpl5Zkd16"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "be2c4457-a733-491e-9131-5cfc477ae771", "DetectTime": "2024-05-21T12:27:53.195460+00:00", "EventTime": "2024-05-21T12:27:53.195482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxBt5Qqd9nTe7Ngj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "6037a225-0659-4fe0-908f-6e5b4a38608e", "DetectTime": "2024-05-21T12:27:53.238740+00:00", "EventTime": "2024-05-21T12:27:53.238761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVYrT3tuHGB5Qo59a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "6b180ad8-4d41-4d80-811e-ddbd01299b9a", "DetectTime": "2024-05-21T12:27:53.251335+00:00", "EventTime": "2024-05-21T12:27:53.251356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvFuBt2kU1Nkl8tCu7"], "accumulated_threat_level": 5.3, "timewindow": 36} +{"Format": "IDEA0", "ID": "9986faa9-f05f-460c-9f25-feb1821e8135", "DetectTime": "2024-05-21T12:27:53.274995+00:00", "EventTime": "2024-05-21T12:27:53.275017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BDrh2FXp4XJSVBs4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "d3c88344-6617-4b52-be2c-3106db76ac13", "DetectTime": "2024-05-21T12:27:53.304615+00:00", "EventTime": "2024-05-21T12:27:53.304637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwgoYM3StmHt02jmKc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "0dc84498-71bb-40c7-b06e-d1d676af3af7", "DetectTime": "2024-05-21T12:27:53.324678+00:00", "EventTime": "2024-05-21T12:27:53.324698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1EH13Irhp3TMtCH5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "ea864692-453b-45f4-abf6-c6857801dbdf", "DetectTime": "2024-05-21T12:27:53.337090+00:00", "EventTime": "2024-05-21T12:27:53.337116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwET4i4mW8L5Ra5UK7"], "accumulated_threat_level": 6.1, "timewindow": 36} +{"Format": "IDEA0", "ID": "b5a8a655-4a1d-4fa6-b510-6f83fdb101d4", "DetectTime": "2024-05-21T12:27:53.364718+00:00", "EventTime": "2024-05-21T12:27:53.364740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKLkHB2Al0zUeOOqQg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "ec3af4a6-afc3-4da0-9986-3f13db46a2be", "DetectTime": "2024-05-21T12:27:53.396322+00:00", "EventTime": "2024-05-21T12:27:53.396340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4FIPh2f8Chro9SnDa"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 36} +{"Format": "IDEA0", "ID": "11ff07cc-facc-4bdf-9c26-44456e8e6de4", "DetectTime": "2024-05-21T12:27:53.401175+00:00", "EventTime": "2024-05-21T12:27:53.401192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1kEV2RiW8siCVvP8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a5f7cd25-c054-4aef-86c2-a947440cb606", "DetectTime": "2024-05-21T12:27:53.428296+00:00", "EventTime": "2024-05-21T12:27:53.428315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61cBGGbQLmoKUMAb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "f4377025-1ca8-482e-aaf7-dd3809bef227", "DetectTime": "2024-05-21T12:27:53.460437+00:00", "EventTime": "2024-05-21T12:27:53.460456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvzmSc15FOTU9MQEa4"], "accumulated_threat_level": 7.699999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "8bbf7ad2-5ace-495d-80ec-15579445fd39", "DetectTime": "2024-05-21T12:27:53.467934+00:00", "EventTime": "2024-05-21T12:27:53.467952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZddD5JNOwgr2zQi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a6bf67f5-305e-4838-9898-9395dc49c202", "DetectTime": "2024-05-21T12:27:53.502807+00:00", "EventTime": "2024-05-21T12:27:53.502826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6POuR3279U2BDXlB8"], "accumulated_threat_level": 8.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "883cc4c5-3630-45d0-9a0f-1ea410c98397", "DetectTime": "2024-05-21T12:27:53.533290+00:00", "EventTime": "2024-05-21T12:27:53.533309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpONl18KqpQj3I78k"], "accumulated_threat_level": 9.3, "timewindow": 36} +{"Format": "IDEA0", "ID": "92a278e6-b831-4188-832f-f4cbe0451ad9", "DetectTime": "2024-05-21T12:27:53.564137+00:00", "EventTime": "2024-05-21T12:27:53.564158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRYgB4PNLdDuoyac8"], "accumulated_threat_level": 10.100000000000001, "timewindow": 36} +{"Format": "IDEA0", "ID": "4d01e9e3-8234-46ab-95cb-58586d205e47", "DetectTime": "2024-05-21T12:27:53.592543+00:00", "EventTime": "2024-05-21T12:27:53.592561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1W1C1o5R2NQ6GCvl"], "accumulated_threat_level": 10.900000000000002, "timewindow": 36} +{"Format": "IDEA0", "ID": "852c6c6d-5ab9-4f00-8067-17be56389d54", "DetectTime": "2024-05-21T12:27:53.622009+00:00", "EventTime": "2024-05-21T12:27:53.622034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZ8Vt30O5efqiYOqb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 36} +{"Format": "IDEA0", "ID": "d6e25e9f-9094-411f-81c7-b27d58ae4c37", "DetectTime": "2024-05-21T12:27:53.697601+00:00", "EventTime": "2024-05-21T12:27:53.697623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2egA2itIRvxUlha3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 36} +{"Format": "Json", "ID": "d6e25e9f-9094-411f-81c7-b27d58ae4c37", "DetectTime": "2024-05-21T12:27:53.697601+00:00", "EventTime": "2024-05-21T12:27:53.697623+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "1970-01-02T11:41:11.853188+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2024/05/21 12:27:53.928753)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 36, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "1c0f77ae-0938-49a7-8e42-672592b2dd66", "DetectTime": "2024-05-21T12:27:53.940007+00:00", "EventTime": "2024-05-21T12:27:53.940027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnwVz2p8JpZ4lMi4a"], "accumulated_threat_level": 0.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "c380fb8e-5f7b-42be-b40b-790d21daaf55", "DetectTime": "2024-05-21T12:27:53.950498+00:00", "EventTime": "2024-05-21T12:27:53.950516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5WQJ32yIlDqw6nTGk"], "accumulated_threat_level": 1.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "187b856a-b786-48f9-a2c6-8df9357540b5", "DetectTime": "2024-05-21T12:27:53.960821+00:00", "EventTime": "2024-05-21T12:27:53.960839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxpepDhs2dZZEYiz9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 36} +{"Format": "IDEA0", "ID": "1e17ec0a-cb73-43b1-ba46-18581b2e2fec", "DetectTime": "2024-05-21T12:27:53.965405+00:00", "EventTime": "2024-05-21T12:27:53.965423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQPzr2XJ7AH18oTAl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "689ab2c1-e173-44f5-b3b2-c6060d156108", "DetectTime": "2024-05-21T12:27:53.975479+00:00", "EventTime": "2024-05-21T12:27:53.975497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIZkvLdzX0fHKim1"], "accumulated_threat_level": 3.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "ed8d2464-2a76-4bcc-b092-4cc56d5fd24d", "DetectTime": "2024-05-21T12:27:54.125115+00:00", "EventTime": "2024-05-21T12:27:54.125134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUF3Va4WzqSd8YslE4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "4e3c5398-af50-4dfb-b954-4442d6759471", "DetectTime": "2024-05-21T12:27:54.129899+00:00", "EventTime": "2024-05-21T12:27:54.129919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybFq621oWoKd7Imga"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "7fd2b8b9-d4e4-45f0-ba7b-627b945e9d05", "DetectTime": "2024-05-21T12:27:54.144103+00:00", "EventTime": "2024-05-21T12:27:54.144124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkoGTr4ahNhKBiivy6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "4c4d786d-7073-430f-8359-095bccbec8c4", "DetectTime": "2024-05-21T12:27:54.149148+00:00", "EventTime": "2024-05-21T12:27:54.149168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iyWf4xjJ4z3yFPul"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "c95e8e0d-4ad0-4815-bb59-bf795000b38f", "DetectTime": "2024-05-21T12:27:54.158920+00:00", "EventTime": "2024-05-21T12:27:54.158940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ziOn2A1OXITR3MMh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "25bbb7c2-e280-4906-9df6-47ac529ac299", "DetectTime": "2024-05-21T12:27:54.197250+00:00", "EventTime": "2024-05-21T12:27:54.197271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.197.81.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1fRZm3mcxAdAVvsZ"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "4d664139-c13b-4833-831f-44adebff1b7f", "DetectTime": "2024-05-21T12:27:54.208921+00:00", "EventTime": "2024-05-21T12:27:54.208941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92yhn3X7kuecRfr6j"], "accumulated_threat_level": 4.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "a1049b04-df0d-4eab-a416-e2016879d7b8", "DetectTime": "2024-05-21T12:27:54.214661+00:00", "EventTime": "2024-05-21T12:27:54.214678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpSuD1nhYCbLZakv4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "9c7efe73-aeaa-4f5c-a6be-b42559cef3aa", "DetectTime": "2024-05-21T12:27:54.223283+00:00", "EventTime": "2024-05-21T12:27:54.223302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cepf3c28Tt1Vo1BCs9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "18482534-511a-4a23-8fe4-3a6a613d40a6", "DetectTime": "2024-05-21T12:27:54.377046+00:00", "EventTime": "2024-05-21T12:27:54.377067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnx8Mz4E4VlcxYzyGd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "94695013-5398-4009-b4d6-2749042e0824", "DetectTime": "2024-05-21T12:27:54.381748+00:00", "EventTime": "2024-05-21T12:27:54.381766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.7.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKGJN1EbyVFsQrnh1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "d5d68390-70d9-4891-803e-295f66e15c47", "DetectTime": "2024-05-21T12:27:54.411544+00:00", "EventTime": "2024-05-21T12:27:54.411565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKACm4wimmcHdXyxb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "f0797edd-859b-4b33-89d2-5014f679828b", "DetectTime": "2024-05-21T12:27:54.417313+00:00", "EventTime": "2024-05-21T12:27:54.417333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.197.81.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbAspf4JhsoJVDvlyk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "82619f9b-234b-49a5-adfa-a2376321316a", "DetectTime": "2024-05-21T12:27:54.462762+00:00", "EventTime": "2024-05-21T12:27:54.462780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwHstMpw5s4a6PCi"], "accumulated_threat_level": 4.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "45226ab6-9c83-43bf-9814-a5afc05fa6c7", "DetectTime": "2024-05-21T12:27:54.483724+00:00", "EventTime": "2024-05-21T12:27:54.483746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvC4tr4rxwE1bSeXZj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "35d65d82-51fa-45e5-980d-18405c1581a6", "DetectTime": "2024-05-21T12:27:54.507505+00:00", "EventTime": "2024-05-21T12:27:54.507525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsvRrp4sH9lkPnFCVf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "767e0b58-f0db-4eac-987c-42997d6e644f", "DetectTime": "2024-05-21T12:27:54.526519+00:00", "EventTime": "2024-05-21T12:27:54.526539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClL8Ji25BvMxnj95oi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a2d370ff-6daa-471f-9506-d3635ac10307", "DetectTime": "2024-05-21T12:27:54.541188+00:00", "EventTime": "2024-05-21T12:27:54.541207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0YJb6C9waK6kRxj"], "accumulated_threat_level": 5.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "d41e7d35-6915-43ba-90ad-12a7ffffe908", "DetectTime": "2024-05-21T12:27:54.580283+00:00", "EventTime": "2024-05-21T12:27:54.580304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqtkV2rr3wWXgsLE6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 36} +{"Format": "IDEA0", "ID": "82d45445-eb78-40a6-8145-e8e8ffa15759", "DetectTime": "2024-05-21T12:27:54.608347+00:00", "EventTime": "2024-05-21T12:27:54.608365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OLJr22v03D28f9Sk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "e6d86cb7-f84a-4b21-843e-81b58fe3f901", "DetectTime": "2024-05-21T12:27:54.636717+00:00", "EventTime": "2024-05-21T12:27:54.636737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPA3B3ALhjEe3KW3i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "d39f1d5a-a6e2-4a60-b7da-7ef7eb6d24cc", "DetectTime": "2024-05-21T12:27:54.671507+00:00", "EventTime": "2024-05-21T12:27:54.671526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfvPJ3DFTQ67bcFxf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "341e5ecd-6a5c-4498-bf8e-c0549ac544fa", "DetectTime": "2024-05-21T12:27:54.681692+00:00", "EventTime": "2024-05-21T12:27:54.681714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCjnT38qv2sS5zFc4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a4653724-dbe9-46f7-a556-fe4d33b02be3", "DetectTime": "2024-05-21T12:27:54.707386+00:00", "EventTime": "2024-05-21T12:27:54.707407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6iaf4SaydzYw4Tp6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "986ec5e3-4f2d-4951-8705-e905023aebeb", "DetectTime": "2024-05-21T12:27:54.730520+00:00", "EventTime": "2024-05-21T12:27:54.730541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcToRC2ByEjynFWOBb"], "accumulated_threat_level": 9.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "0c86cf17-94b6-493e-a97c-0b6b7856eb2f", "DetectTime": "2024-05-21T12:27:54.760992+00:00", "EventTime": "2024-05-21T12:27:54.761013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9R7Ta2hXfXRzaobo4"], "accumulated_threat_level": 10.4, "timewindow": 36} +{"Format": "IDEA0", "ID": "7824bc76-a123-4c65-ad62-37f2365a1af1", "DetectTime": "2024-05-21T12:27:54.775950+00:00", "EventTime": "2024-05-21T12:27:54.775969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCfVp38hA7GTfq5Wa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "d401ade2-d745-49e6-9d08-175cff989735", "DetectTime": "2024-05-21T12:27:54.803273+00:00", "EventTime": "2024-05-21T12:27:54.803293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANGac4jybXJXToD4e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "f651444e-78a6-4cc8-b2fe-f14cd7fcea51", "DetectTime": "2024-05-21T12:27:55.034331+00:00", "EventTime": "2024-05-21T12:27:55.034351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJa8EL11zcoE3oC0U5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 36} +{"Format": "IDEA0", "ID": "7ed6637c-455f-415c-b02d-bb741d1a4916", "DetectTime": "2024-05-21T12:27:55.101091+00:00", "EventTime": "2024-05-21T12:27:55.101112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIjJdf42gjHRZBdBN7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "9fe8464d-a15d-4958-ba9f-6b4f6f4ff42e", "DetectTime": "2024-05-21T12:27:55.110002+00:00", "EventTime": "2024-05-21T12:27:55.110047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mBow2UWNZ3CtHjn9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "c5cbd549-9aeb-4bba-83a0-00bacd168507", "DetectTime": "2024-05-21T12:27:55.116137+00:00", "EventTime": "2024-05-21T12:27:55.116156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXRsXk2kkBmAT09Ui3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a8d7000f-aee7-41b3-a5bd-5a3a7450d772", "DetectTime": "2024-05-21T12:27:55.120685+00:00", "EventTime": "2024-05-21T12:27:55.120704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE83HE1Uge5YJNYmGj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "9b290433-b9aa-4575-a164-21b5f4a2a609", "DetectTime": "2024-05-21T12:27:55.125396+00:00", "EventTime": "2024-05-21T12:27:55.125415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6b2p5dUxYHZVBjd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "eba7630d-0738-4ca1-a4c4-e3f737efecad", "DetectTime": "2024-05-21T12:27:55.132111+00:00", "EventTime": "2024-05-21T12:27:55.132132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02uUy3yhuTEyx0Rt4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "4b63c654-360e-4aa8-81ca-781de3a91afd", "DetectTime": "2024-05-21T12:27:55.210829+00:00", "EventTime": "2024-05-21T12:27:55.210853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbUTKD27Dr722IuLwb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "ec7a79a9-a6a3-433f-bde5-2f77220a2e87", "DetectTime": "2024-05-21T12:27:55.224208+00:00", "EventTime": "2024-05-21T12:27:55.224226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COoHUm4eXn5MBW299l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 36} +{"Format": "Json", "ID": "ec7a79a9-a6a3-433f-bde5-2f77220a2e87", "DetectTime": "2024-05-21T12:27:55.224208+00:00", "EventTime": "2024-05-21T12:27:55.224226+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "1970-01-02T11:41:14.237658+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2024/05/21 12:27:55.476872)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 36, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2e96788c-af16-4257-ba6a-8b7aab38b8b2", "DetectTime": "2024-05-21T12:27:55.480922+00:00", "EventTime": "2024-05-21T12:27:55.480940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cthuj72L3LBuArt9Ki"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "0e256e2e-fc3e-44fa-8a95-f683bfb6324d", "DetectTime": "2024-05-21T12:27:55.485615+00:00", "EventTime": "2024-05-21T12:27:55.485633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35LKo3PiZsXfp5BTb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "042ae804-fe12-4ecc-917c-67e666028743", "DetectTime": "2024-05-21T12:27:55.490096+00:00", "EventTime": "2024-05-21T12:27:55.490114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyVSgJt65gKtfJA6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "4d51466c-345a-4dc1-9efc-3f3f85559bfd", "DetectTime": "2024-05-21T12:27:55.494800+00:00", "EventTime": "2024-05-21T12:27:55.494818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJPVSLBnTXxHBjX7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "43a71a9f-51b0-473c-9721-f0cf98fcdaf0", "DetectTime": "2024-05-21T12:27:55.499109+00:00", "EventTime": "2024-05-21T12:27:55.499127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy9iSi3eHWHyQWGwDd", "C2wDOS1Qnt2JSVHZye", "C2ccW72v7lZuqcXNNg", "CUTlfb1Wd2bhR1qky4"], "accumulated_threat_level": 0.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "ee1a1b96-db5d-4446-94a2-bf161b626390", "DetectTime": "2024-05-21T12:27:55.503692+00:00", "EventTime": "2024-05-21T12:27:55.503710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlQK21OdpdF3bFNSh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "35c50b32-d8f3-4f48-8068-96d5c85b4f99", "DetectTime": "2024-05-21T12:27:55.520567+00:00", "EventTime": "2024-05-21T12:27:55.520585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZlhMiD1UJZwcmCj"], "accumulated_threat_level": 0.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "c36b5800-9673-4dd4-951d-b18843ebec0c", "DetectTime": "2024-05-21T12:27:55.530775+00:00", "EventTime": "2024-05-21T12:27:55.530794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBE5bePk6VXicgqi"], "accumulated_threat_level": 1.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "dbe5741c-0527-4d91-9cc0-e20e95f1d38f", "DetectTime": "2024-05-21T12:27:55.535247+00:00", "EventTime": "2024-05-21T12:27:55.535264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqF1Tk3cis8KQT2t07"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "0912b197-dc0c-45fb-8c93-764ef408c9ac", "DetectTime": "2024-05-21T12:27:55.548935+00:00", "EventTime": "2024-05-21T12:27:55.548954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2CBn1wPQZoTkggS1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 36} +{"Format": "IDEA0", "ID": "a94e538a-6526-4b0e-a773-7dee8ffdb722", "DetectTime": "2024-05-21T12:27:55.560208+00:00", "EventTime": "2024-05-21T12:27:55.560230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSqyM2rUINOYpe4hf"], "accumulated_threat_level": 3.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "81bd03fb-ad07-4b4b-bb01-03f2f92f5492", "DetectTime": "2024-05-21T12:27:55.565789+00:00", "EventTime": "2024-05-21T12:27:55.565808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySLqt32VaYyvlJgt9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "59b30c42-f0f0-41bd-9f1e-ed0ba49edac6", "DetectTime": "2024-05-21T12:27:55.577044+00:00", "EventTime": "2024-05-21T12:27:55.577062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs1yI3V58uL1hxwS8"], "accumulated_threat_level": 4.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "d6cc84e7-98b7-4bf3-ae57-54cf617e4f9d", "DetectTime": "2024-05-21T12:27:55.596348+00:00", "EventTime": "2024-05-21T12:27:55.596366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEh6rX3fMBha8NTmF"], "accumulated_threat_level": 4.8, "timewindow": 36} +{"Format": "IDEA0", "ID": "38fa2c6c-7446-4e0a-8799-ab0a0448b8d9", "DetectTime": "2024-05-21T12:27:55.600972+00:00", "EventTime": "2024-05-21T12:27:55.600989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZkFh2KLJIuVul957"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "0e17c89a-a3fb-49ec-b021-b34ee6da5a7a", "DetectTime": "2024-05-21T12:27:55.611256+00:00", "EventTime": "2024-05-21T12:27:55.611275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImHTA4QYBDV45dSN3"], "accumulated_threat_level": 5.6, "timewindow": 36} +{"Format": "IDEA0", "ID": "09946402-ff0c-488c-b82a-a82d8a1d3ee6", "DetectTime": "2024-05-21T12:27:55.631242+00:00", "EventTime": "2024-05-21T12:27:55.631262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgWBItvDUZGMGA7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 36} +{"Format": "IDEA0", "ID": "e38d5413-ae60-493c-9ea3-3084ef2ed687", "DetectTime": "2024-05-21T12:27:55.661941+00:00", "EventTime": "2024-05-21T12:27:55.661959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7MZz2yk387Czin99"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "41a78b45-fe29-4c58-92e6-6984a75a1017", "DetectTime": "2024-05-21T12:27:55.814529+00:00", "EventTime": "2024-05-21T12:27:55.814551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDxtA1yt06iYcU6P4"], "accumulated_threat_level": 1.3, "timewindow": 37} +{"Format": "IDEA0", "ID": "e3e8eb46-c4fd-495c-84fd-761e52b4fc22", "DetectTime": "2024-05-21T12:27:55.838874+00:00", "EventTime": "2024-05-21T12:27:55.838891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VEuL2hCLAKdgUCFc"], "accumulated_threat_level": 2.1, "timewindow": 37} +{"Format": "IDEA0", "ID": "bda0c750-becb-4a06-a30a-8974874eaeaf", "DetectTime": "2024-05-21T12:27:55.864283+00:00", "EventTime": "2024-05-21T12:27:55.864303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEW1G4su4YBdXmlsi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "71a87216-ab8e-4114-937f-d02f175f90a3", "DetectTime": "2024-05-21T12:27:55.875050+00:00", "EventTime": "2024-05-21T12:27:55.875068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkTQ1E4kU0oKb2Gt11"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 37} +{"Format": "IDEA0", "ID": "fbb6ca30-6d47-4cb6-bae1-4a8f294ac8f5", "DetectTime": "2024-05-21T12:27:55.911725+00:00", "EventTime": "2024-05-21T12:27:55.911745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX9WfU2ZRRB0cUlXh1"], "accumulated_threat_level": 3.7, "timewindow": 37} +{"Format": "IDEA0", "ID": "400d652c-c168-4602-bc1f-0443b4f0086e", "DetectTime": "2024-05-21T12:27:56.169946+00:00", "EventTime": "2024-05-21T12:27:56.169969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4xdB1Rhj4EJkaMuj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "30c0480a-7b67-490c-8ecc-023ca198887a", "DetectTime": "2024-05-21T12:27:56.175262+00:00", "EventTime": "2024-05-21T12:27:56.175282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQbBE1ngNC7PhaMkc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "0f5715a1-d1ce-4d63-a3b6-e67fbec35f79", "DetectTime": "2024-05-21T12:27:56.189764+00:00", "EventTime": "2024-05-21T12:27:56.189784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfQxE15YNdTqAcHW3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "60e0c42c-f81d-459b-a88b-4e39807c78d5", "DetectTime": "2024-05-21T12:27:56.194804+00:00", "EventTime": "2024-05-21T12:27:56.194824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGFeS3jHSUw81OTFi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "aa61ad85-0437-4d47-88c4-39411253be45", "DetectTime": "2024-05-21T12:27:56.238988+00:00", "EventTime": "2024-05-21T12:27:56.239007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXe812nQJYIMYZ4S"], "accumulated_threat_level": 4.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "31255f79-59b8-4852-90a4-ff443242b249", "DetectTime": "2024-05-21T12:27:56.251992+00:00", "EventTime": "2024-05-21T12:27:56.252014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJlRnpJT7mVD7BWa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "5c1af1b0-a796-4d08-82e0-6fe7abd6f084", "DetectTime": "2024-05-21T12:27:56.324871+00:00", "EventTime": "2024-05-21T12:27:56.324890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLErF1PaDq0u6ITVa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "a92146a7-f4d3-4c98-9344-9c9105c8efd3", "DetectTime": "2024-05-21T12:27:56.330830+00:00", "EventTime": "2024-05-21T12:27:56.330850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuMCfA4ZVR6jd8kcJl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "6912a9d3-bd7e-4988-8e85-184b16ac75af", "DetectTime": "2024-05-21T12:27:56.335857+00:00", "EventTime": "2024-05-21T12:27:56.335875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNpbch6VGCVvmzLl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "94854b27-4211-405c-8a98-b39d7b6b0e75", "DetectTime": "2024-05-21T12:27:56.370057+00:00", "EventTime": "2024-05-21T12:27:56.370079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLmYZU2XN7i3wWZg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "dccad6c2-47d0-4a40-88c7-0215e489e771", "DetectTime": "2024-05-21T12:27:56.375218+00:00", "EventTime": "2024-05-21T12:27:56.375239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLemXL22vD8lwSFRX7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "8759f909-2919-40f3-ba1b-f4d642b94c84", "DetectTime": "2024-05-21T12:27:56.439953+00:00", "EventTime": "2024-05-21T12:27:56.439973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIQye2AqiQUMKjVj8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "1edb2c7a-10db-47fd-b0ab-1485ca42d82c", "DetectTime": "2024-05-21T12:27:56.451188+00:00", "EventTime": "2024-05-21T12:27:56.451207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfOPu424Pd1shC3B1"], "accumulated_threat_level": 5.3, "timewindow": 37} +{"Format": "IDEA0", "ID": "361d3e0e-11e9-4194-8a5e-c411f8702699", "DetectTime": "2024-05-21T12:27:56.479404+00:00", "EventTime": "2024-05-21T12:27:56.479428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwA0XI3YHJXtnUeayc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "c97f7516-e8d5-41a2-816d-8e9ff5935e4e", "DetectTime": "2024-05-21T12:27:56.499883+00:00", "EventTime": "2024-05-21T12:27:56.499904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgRtjv4U44bkSna2g6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "432e51cc-67ad-4c8f-8d46-50c7bde95202", "DetectTime": "2024-05-21T12:27:56.525677+00:00", "EventTime": "2024-05-21T12:27:56.525698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72rcn3jCliRrj6V9h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "072bcab1-96da-48c1-9d57-10e0b671b9ef", "DetectTime": "2024-05-21T12:27:56.536387+00:00", "EventTime": "2024-05-21T12:27:56.536406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPPYS24BtYda8dqki"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "3064e0ba-f5c5-4fc1-a847-4dc8e67e5be7", "DetectTime": "2024-05-21T12:27:56.567531+00:00", "EventTime": "2024-05-21T12:27:56.567550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgUkz63shbdQXVRAQ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "b910da77-ad7b-4a37-af88-986521badda6", "DetectTime": "2024-05-21T12:27:56.607899+00:00", "EventTime": "2024-05-21T12:27:56.607934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2WGsX2cgwypva07Nh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "c53a3542-6550-4013-b4c9-7489f6c2f840", "DetectTime": "2024-05-21T12:27:56.620064+00:00", "EventTime": "2024-05-21T12:27:56.620086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNGh2I3MMNgsGcnrF9"], "accumulated_threat_level": 6.1, "timewindow": 37} +{"Format": "IDEA0", "ID": "44fe2bca-26f3-44c6-aedd-989d7676f2f3", "DetectTime": "2024-05-21T12:27:56.658187+00:00", "EventTime": "2024-05-21T12:27:56.658209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDH2hS32bACsvDqoOh"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "e1658527-f7d2-4a7d-826e-9632afdc44f4", "DetectTime": "2024-05-21T12:27:56.686975+00:00", "EventTime": "2024-05-21T12:27:56.686994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtIio4StHAsLSW24c"], "accumulated_threat_level": 7.699999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "4b4e5a17-4251-4350-b2fd-f990eb88abb6", "DetectTime": "2024-05-21T12:27:56.716216+00:00", "EventTime": "2024-05-21T12:27:56.716235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILg4E3AzxXJgqaYlg"], "accumulated_threat_level": 8.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "41eeb6e9-f73f-46f0-aa49-221752f8f261", "DetectTime": "2024-05-21T12:27:56.747285+00:00", "EventTime": "2024-05-21T12:27:56.747306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDWXH3VkXSi87SCZ6"], "accumulated_threat_level": 9.3, "timewindow": 37} +{"Format": "IDEA0", "ID": "3b8c62ec-0dbb-444d-b814-1e2881c02916", "DetectTime": "2024-05-21T12:27:56.780257+00:00", "EventTime": "2024-05-21T12:27:56.780276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauZBx3r8bLNS0fsq"], "accumulated_threat_level": 10.100000000000001, "timewindow": 37} +{"Format": "IDEA0", "ID": "4edddc0a-036a-4b51-84cd-c1b5fcc61af9", "DetectTime": "2024-05-21T12:27:56.799000+00:00", "EventTime": "2024-05-21T12:27:56.799019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqbBi41OwZIpmNUb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "962f5895-4eed-432d-981a-e36ab4388f18", "DetectTime": "2024-05-21T12:27:56.825062+00:00", "EventTime": "2024-05-21T12:27:56.825082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5ARY6byFeX1iMT4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 37} +{"Format": "IDEA0", "ID": "e6b6066a-8992-4265-a2fc-36aec29d0870", "DetectTime": "2024-05-21T12:27:56.853531+00:00", "EventTime": "2024-05-21T12:27:56.853550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIebmv1Y3N4YK3rEwi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 37} +{"Format": "IDEA0", "ID": "6d8cc2a2-0dd2-4566-a31a-66941f25adcd", "DetectTime": "2024-05-21T12:27:56.883396+00:00", "EventTime": "2024-05-21T12:27:56.883415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVfE3VZNT2RxEgu9"], "accumulated_threat_level": 12.500000000000004, "timewindow": 37} +{"Format": "Json", "ID": "6d8cc2a2-0dd2-4566-a31a-66941f25adcd", "DetectTime": "2024-05-21T12:27:56.883396+00:00", "EventTime": "2024-05-21T12:27:56.883415+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "1970-01-02T12:12:04.627721+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2024/05/21 12:27:57.074689)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 37, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "a7844b54-212e-4079-890a-44f4af3ba796", "DetectTime": "2024-05-21T12:27:57.085840+00:00", "EventTime": "2024-05-21T12:27:57.085866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKLiE83zARXVG9G4a7"], "accumulated_threat_level": 0.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "2165e951-7192-473b-9ceb-3d7639a9c0f2", "DetectTime": "2024-05-21T12:27:57.091223+00:00", "EventTime": "2024-05-21T12:27:57.091242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRiOzp3JC7RBlGJr2b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "e09a07a4-3bbd-45c0-8f70-db2ea4247392", "DetectTime": "2024-05-21T12:27:57.102428+00:00", "EventTime": "2024-05-21T12:27:57.102448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COdapF2KI3A2DmWCd1"], "accumulated_threat_level": 1.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "14c0ccee-08d8-46ec-bd1f-e41b3059f725", "DetectTime": "2024-05-21T12:27:57.112923+00:00", "EventTime": "2024-05-21T12:27:57.112941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYw3CVhlLm2JesFi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 37} +{"Format": "IDEA0", "ID": "ca8593bb-bdf2-4dbb-9a85-5a076bbc2aee", "DetectTime": "2024-05-21T12:27:57.124576+00:00", "EventTime": "2024-05-21T12:27:57.124594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0XqW1FohrAMtg9Pe"], "accumulated_threat_level": 3.2, "timewindow": 37} +{"Format": "IDEA0", "ID": "802638dd-1a89-46ed-a6e8-43bdb4f8031a", "DetectTime": "2024-05-21T12:27:57.138594+00:00", "EventTime": "2024-05-21T12:27:57.138614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb2Rd1ihmo4zDIx1h"], "accumulated_threat_level": 4.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "e8c50059-6110-4df9-a413-93f5b6d075e6", "DetectTime": "2024-05-21T12:27:57.149212+00:00", "EventTime": "2024-05-21T12:27:57.149230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDp2l1Ihg4nMNWnY1"], "accumulated_threat_level": 4.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "64e222b1-d4bc-4699-8d03-0db2177c8882", "DetectTime": "2024-05-21T12:27:57.154673+00:00", "EventTime": "2024-05-21T12:27:57.154691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEeId1WZsEX9R9EJb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 34} +{"Format": "IDEA0", "ID": "f80094da-9e31-46fe-ae50-5b0bb9a47c32", "DetectTime": "2024-05-21T12:27:57.364257+00:00", "EventTime": "2024-05-21T12:27:57.364275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP0uNq4IuTDdrrZgx6"], "accumulated_threat_level": 5.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "a8c2f82b-617f-4996-9ddd-e411962e4c62", "DetectTime": "2024-05-21T12:27:57.394260+00:00", "EventTime": "2024-05-21T12:27:57.394283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaB6ZR3F1cmBQkgCx7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a5046c23-80d0-43d7-973a-fdaf41118962", "DetectTime": "2024-05-21T12:27:57.424378+00:00", "EventTime": "2024-05-21T12:27:57.424397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CThX1I3F19dsey8J23"], "accumulated_threat_level": 7.199999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "3c237787-a3f3-453a-abaa-3ce8bdca0b89", "DetectTime": "2024-05-21T12:27:57.454016+00:00", "EventTime": "2024-05-21T12:27:57.454035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRondd1laMwa5oji"], "accumulated_threat_level": 7.999999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "5014968d-e78d-483e-a108-28a7a0875fa6", "DetectTime": "2024-05-21T12:27:57.486690+00:00", "EventTime": "2024-05-21T12:27:57.486708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2lVeQ2vRmGsGPy"], "accumulated_threat_level": 8.799999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "3ae2ed26-a522-45cd-ae46-a6d8ea3539d8", "DetectTime": "2024-05-21T12:27:57.517664+00:00", "EventTime": "2024-05-21T12:27:57.517682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTxuF2X0E97noPl3d"], "accumulated_threat_level": 9.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "22ecd62e-00a1-4016-8209-e06952dd8739", "DetectTime": "2024-05-21T12:27:57.553900+00:00", "EventTime": "2024-05-21T12:27:57.553919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB48xg11sGnCbabreh"], "accumulated_threat_level": 10.4, "timewindow": 37} +{"Format": "IDEA0", "ID": "c1dd4ac5-1a6f-4b8b-a66f-3bada9ca3ba1", "DetectTime": "2024-05-21T12:27:57.568514+00:00", "EventTime": "2024-05-21T12:27:57.568534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.63.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTlpbe4A0zRd183Arh"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "9c037189-f236-46c8-8cb3-79752b2d76fe", "DetectTime": "2024-05-21T12:27:57.614473+00:00", "EventTime": "2024-05-21T12:27:57.614495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsmWum3utbtDqnRd0d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 37} +{"Format": "IDEA0", "ID": "5a01d9e8-0516-464b-8aea-d0fa638f395f", "DetectTime": "2024-05-21T12:27:57.643697+00:00", "EventTime": "2024-05-21T12:27:57.643715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKWzUa1Vxnxfeos593"], "accumulated_threat_level": 12.000000000000002, "timewindow": 37} +{"Format": "Json", "ID": "5a01d9e8-0516-464b-8aea-d0fa638f395f", "DetectTime": "2024-05-21T12:27:57.643697+00:00", "EventTime": "2024-05-21T12:27:57.643715+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "1970-01-02T12:12:07.046326+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2024/05/21 12:27:57.786419)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 37, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "811ef70f-3736-4555-89bb-feee2e810e19", "DetectTime": "2024-05-21T12:27:57.797317+00:00", "EventTime": "2024-05-21T12:27:57.797346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgVyz22ExchSyemwh"], "accumulated_threat_level": 0.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "8b5aea15-777f-495a-82ab-79159e17f9fd", "DetectTime": "2024-05-21T12:27:57.812343+00:00", "EventTime": "2024-05-21T12:27:57.812365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gtzM1hFb2VlQ24bj"], "accumulated_threat_level": 1.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "23982b52-c1f3-478d-93e1-d94520ccd505", "DetectTime": "2024-05-21T12:27:57.854971+00:00", "EventTime": "2024-05-21T12:27:57.854994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnmy73SLFku0ImDC5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 37} +{"Format": "IDEA0", "ID": "adf7c8c6-fae1-4eb9-9371-4543b97060c8", "DetectTime": "2024-05-21T12:27:57.871405+00:00", "EventTime": "2024-05-21T12:27:57.871423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDMFg4KPeWU18vGN6"], "accumulated_threat_level": 3.2, "timewindow": 37} +{"Format": "IDEA0", "ID": "9fcd173c-debd-459e-9cc1-40d40cb53411", "DetectTime": "2024-05-21T12:27:57.882274+00:00", "EventTime": "2024-05-21T12:27:57.882295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPICrb3U44hfKzmia2"], "accumulated_threat_level": 4.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "cbe325d8-280f-43aa-9042-31430e522e4d", "DetectTime": "2024-05-21T12:27:57.894137+00:00", "EventTime": "2024-05-21T12:27:57.894155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeaW382j7fwiOyuzJ5"], "accumulated_threat_level": 4.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "2a75e0a7-b101-4c28-ab49-3eb921b00e65", "DetectTime": "2024-05-21T12:27:57.921823+00:00", "EventTime": "2024-05-21T12:27:57.921844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FCaW2QN3G4197gRe"], "accumulated_threat_level": 5.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "c21b14bd-9c3b-4441-857c-54c9f2e4b0f1", "DetectTime": "2024-05-21T12:27:57.951458+00:00", "EventTime": "2024-05-21T12:27:57.951476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKD0iw4apQ6B3itWU8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "c525c28f-1735-4784-8862-08dfb2e4c539", "DetectTime": "2024-05-21T12:27:57.979702+00:00", "EventTime": "2024-05-21T12:27:57.979721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtUt7p3T1WsPQ1pSm5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "1a773c73-facc-403a-a485-05ee582edf4a", "DetectTime": "2024-05-21T12:27:58.002947+00:00", "EventTime": "2024-05-21T12:27:58.002968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvSOq2D4EyK8JC4ig"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "bf858fb4-ee5b-4e77-ad25-6898ba0d0caf", "DetectTime": "2024-05-21T12:27:58.030470+00:00", "EventTime": "2024-05-21T12:27:58.030489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3wVP2gAb3kruDZua"], "accumulated_threat_level": 7.999999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "62032cd8-1025-409b-a0d5-14a34b7d8fb1", "DetectTime": "2024-05-21T12:27:58.049384+00:00", "EventTime": "2024-05-21T12:27:58.049404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQt5Ou3dcSeWRi03"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a03ab904-f3cb-49c0-9515-e3912736d767", "DetectTime": "2024-05-21T12:27:58.091299+00:00", "EventTime": "2024-05-21T12:27:58.091317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIl8gx3mp8KBo1Nn0j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "a3b15ccf-064b-461a-bf64-141c659b8b07", "DetectTime": "2024-05-21T12:27:58.116629+00:00", "EventTime": "2024-05-21T12:27:58.116650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmshNRzC5hJDfol7"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "760294f5-3075-4cb6-b8d8-11a1b6f5500d", "DetectTime": "2024-05-21T12:27:58.137766+00:00", "EventTime": "2024-05-21T12:27:58.137787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PAKj3cDN0mzSVoj6"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "cecafcd4-0a53-44b6-81f2-e135dabd661c", "DetectTime": "2024-05-21T12:27:58.149240+00:00", "EventTime": "2024-05-21T12:27:58.149260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.192.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHneM1WYwxiNyrXfc"], "accumulated_threat_level": 9.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "a1dd0773-a809-4ff8-a4c2-b92da82b8888", "DetectTime": "2024-05-21T12:27:58.181071+00:00", "EventTime": "2024-05-21T12:27:58.181090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyygohHMSt55uz0j"], "accumulated_threat_level": 10.4, "timewindow": 37} +{"Format": "IDEA0", "ID": "f6c5c747-3782-40db-a49a-68a96a24667e", "DetectTime": "2024-05-21T12:27:58.213414+00:00", "EventTime": "2024-05-21T12:27:58.213433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhFfCeVYpRfMXg1b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 37} +{"Format": "IDEA0", "ID": "b3bd5aa6-eec2-433f-9268-de8ba0f64cac", "DetectTime": "2024-05-21T12:27:58.488129+00:00", "EventTime": "2024-05-21T12:27:58.488151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMmMzV1XGwGQh9jAm9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "24a1876f-200e-45b6-b13b-dc5928e39caa", "DetectTime": "2024-05-21T12:27:58.493458+00:00", "EventTime": "2024-05-21T12:27:58.493476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKBDG1zCYXfyjZJda"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "2337d638-4700-41bb-b0e7-c52eaacc23a5", "DetectTime": "2024-05-21T12:27:58.498545+00:00", "EventTime": "2024-05-21T12:27:58.498563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6u6csPuUTi7zG28"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "6a023007-d8c5-480d-8a4b-a81b9294b8ff", "DetectTime": "2024-05-21T12:27:58.544512+00:00", "EventTime": "2024-05-21T12:27:58.544531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cvV83luQMGId8QA5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 37} +{"Format": "Json", "ID": "6a023007-d8c5-480d-8a4b-a81b9294b8ff", "DetectTime": "2024-05-21T12:27:58.544512+00:00", "EventTime": "2024-05-21T12:27:58.544531+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "1970-01-02T12:42:15.423339+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2024/05/21 12:27:58.721303)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 37, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "33777859-6bbd-4c71-b1e8-5b060dc1496e", "DetectTime": "2024-05-21T12:27:58.725237+00:00", "EventTime": "2024-05-21T12:27:58.725254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpI2NT2fnQVSjgImF3"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a4a36e39-68aa-4ea4-8ee8-7e0e0f80e3f0", "DetectTime": "2024-05-21T12:27:58.729604+00:00", "EventTime": "2024-05-21T12:27:58.729622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Vlo3ZZBNvwskEA8"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "71243548-6cbb-49f6-9a55-d4af56f87022", "DetectTime": "2024-05-21T12:27:58.734015+00:00", "EventTime": "2024-05-21T12:27:58.734032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoU7UO2Hxloia28pX5"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "97d7e873-f774-43f6-9e4c-93687f053c07", "DetectTime": "2024-05-21T12:27:58.745651+00:00", "EventTime": "2024-05-21T12:27:58.745673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsdflk7djAxYajwi"], "accumulated_threat_level": 0.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "c9d536c6-37fb-4941-acec-c45a1f7d3d22", "DetectTime": "2024-05-21T12:27:58.750338+00:00", "EventTime": "2024-05-21T12:27:58.750355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFDPLI1bmWcoRImMid"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "1d4c70df-c45f-4dd5-a532-e4f9ec9f1646", "DetectTime": "2024-05-21T12:27:58.754564+00:00", "EventTime": "2024-05-21T12:27:58.754581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1V9F1X6y55uhSiah"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "8363d4fb-a368-4c13-84e7-5720c92abb96", "DetectTime": "2024-05-21T12:27:58.765904+00:00", "EventTime": "2024-05-21T12:27:58.765925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjDC21vPL37iFY6Vl"], "accumulated_threat_level": 1.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "90a59bf7-f3ae-4dc4-836a-ec6a51feb9ae", "DetectTime": "2024-05-21T12:27:58.771031+00:00", "EventTime": "2024-05-21T12:27:58.771050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmphg3ndR16LgvHLb"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "5f1683be-f6c1-4dec-904d-fe2599432349", "DetectTime": "2024-05-21T12:27:58.775536+00:00", "EventTime": "2024-05-21T12:27:58.775553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35ac346sPUE8qPjfe"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "43543b53-b5ce-405a-8b6e-056a7b8ea4df", "DetectTime": "2024-05-21T12:27:58.781450+00:00", "EventTime": "2024-05-21T12:27:58.781470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRPVA3NWqrV1F3GBk"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "52946c48-3df2-48f6-ae49-279aaba964f5", "DetectTime": "2024-05-21T12:27:58.793834+00:00", "EventTime": "2024-05-21T12:27:58.793853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhAgi2iB2HiAtU2ra"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 37} +{"Format": "IDEA0", "ID": "61cb5499-b524-4c92-8176-d8dc56ddc2d6", "DetectTime": "2024-05-21T12:27:58.800101+00:00", "EventTime": "2024-05-21T12:27:58.800120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Vq9ilIL3iCe1O37"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "b8c0c265-b9af-4964-b832-d82cc0409da4", "DetectTime": "2024-05-21T12:27:58.827948+00:00", "EventTime": "2024-05-21T12:27:58.827971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeuOov17UmJvfJfEi8"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "64f384e5-cf22-4226-bd9c-d3654512f9c3", "DetectTime": "2024-05-21T12:27:58.853101+00:00", "EventTime": "2024-05-21T12:27:58.853120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "Connection to unknown destination port 7313/UDP destination IP 1.162.239.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRdeq4S306ENse0nd"], "accumulated_threat_level": 3.2, "timewindow": 37} +{"Format": "IDEA0", "ID": "b3d7c9ed-f875-462e-917d-777c5566cd18", "DetectTime": "2024-05-21T12:27:58.867782+00:00", "EventTime": "2024-05-21T12:27:58.867800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdTo52b7Mu4x5DtJg"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "fb05c4d5-5b42-49b1-9bcd-cbc7821faa26", "DetectTime": "2024-05-21T12:27:58.892923+00:00", "EventTime": "2024-05-21T12:27:58.892940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjeXCVaxBAYOh8KN6"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "c7158009-e3bd-4d41-9f69-f5200d5b08dd", "DetectTime": "2024-05-21T12:27:58.903060+00:00", "EventTime": "2024-05-21T12:27:58.903077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaX2Co4tu7Ks8JSbD1"], "accumulated_threat_level": 4.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "996b0703-99c2-422f-8029-e91b81eb73cc", "DetectTime": "2024-05-21T12:27:58.946166+00:00", "EventTime": "2024-05-21T12:27:58.946183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwFWT3gt6mgIvOcE5"], "accumulated_threat_level": 4.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "8fa69fd2-7dcd-42f3-abd9-c69f2d6ace89", "DetectTime": "2024-05-21T12:27:58.976128+00:00", "EventTime": "2024-05-21T12:27:58.976146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87JhQ14r837HlBPz8"], "accumulated_threat_level": 5.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "bdacd2ef-1649-48bc-a854-b08f99d50eae", "DetectTime": "2024-05-21T12:27:59.008993+00:00", "EventTime": "2024-05-21T12:27:59.009015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBT0134L0EVJo7rrb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "16b7d3fa-df3c-4576-a064-765d6b1abe04", "DetectTime": "2024-05-21T12:27:59.036646+00:00", "EventTime": "2024-05-21T12:27:59.036665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme5wA4ijwyQUw7ejl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "4d3010d8-8877-40d0-bbfd-321d3e45337a", "DetectTime": "2024-05-21T12:27:59.054740+00:00", "EventTime": "2024-05-21T12:27:59.054763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckpt2x2hRWpha9XXqj"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a38f2aad-9e32-4f1e-bd8a-c3339bdb93a7", "DetectTime": "2024-05-21T12:27:59.084944+00:00", "EventTime": "2024-05-21T12:27:59.084962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEj0j16WYnN8xNOy4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "0f24e2d8-6e51-4bd7-a373-2a97135e5546", "DetectTime": "2024-05-21T12:27:59.100105+00:00", "EventTime": "2024-05-21T12:27:59.100126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkXdU3DceQ04Kp3Gc"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "5f745f0f-5bb9-4db2-9e1c-0adb4412f87d", "DetectTime": "2024-05-21T12:27:59.128069+00:00", "EventTime": "2024-05-21T12:27:59.128088+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.164.65.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXdsOf2BVOuF6kRn3h"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "b404a426-7f87-44a5-a391-f3d1bd35677a", "DetectTime": "2024-05-21T12:27:59.139853+00:00", "EventTime": "2024-05-21T12:27:59.139870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.164.65.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.164.65.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXdsOf2BVOuF6kRn3h"], "accumulated_threat_level": 3.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "833da93b-1717-4d45-8106-a48a51b4535e", "DetectTime": "2024-05-21T12:27:59.144407+00:00", "EventTime": "2024-05-21T12:27:59.144424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMI5g2CtYaEQIiGCg"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "4b3d5a44-29fe-4db0-9381-653fb3a7bdc5", "DetectTime": "2024-05-21T12:27:59.204791+00:00", "EventTime": "2024-05-21T12:27:59.204809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnU6xA2OfUy0GpVwM3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "d449d14c-0861-4204-8bfe-e1bb99a4266d", "DetectTime": "2024-05-21T12:27:59.221709+00:00", "EventTime": "2024-05-21T12:27:59.221731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9YXfFzRIGcQBswi"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "765db207-a607-4d4e-bc14-8375f8ac6eee", "DetectTime": "2024-05-21T12:27:59.226715+00:00", "EventTime": "2024-05-21T12:27:59.226733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBmubU7q6CluhHmL9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "2358e629-9ce3-4631-aa01-4c4d215e61e9", "DetectTime": "2024-05-21T12:27:59.268343+00:00", "EventTime": "2024-05-21T12:27:59.268362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUMnR2Smcr3gtk05"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "88dcb0cf-3701-45f8-b20a-ecf8e5e4c305", "DetectTime": "2024-05-21T12:27:59.294082+00:00", "EventTime": "2024-05-21T12:27:59.294101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRiug3SO3TT1Tnao2"], "accumulated_threat_level": 9.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "2b875b5b-6ff9-4fef-9621-1c9a5a17bb2e", "DetectTime": "2024-05-21T12:27:59.540878+00:00", "EventTime": "2024-05-21T12:27:59.540897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKcHK3sKWpBGq3Qxk"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "296bbb90-3f44-4334-9344-2dc8ae09c10b", "DetectTime": "2024-05-21T12:27:59.559732+00:00", "EventTime": "2024-05-21T12:27:59.559753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4IPf4Y4sBsj49y8j"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "abae61b4-46eb-4181-ae6f-85f05fd6d142", "DetectTime": "2024-05-21T12:27:59.565296+00:00", "EventTime": "2024-05-21T12:27:59.565316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqB4T2sZIgKC7AMg9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "22d5e12b-e094-4b94-b9b9-a33e4cede3e2", "DetectTime": "2024-05-21T12:27:59.569832+00:00", "EventTime": "2024-05-21T12:27:59.569850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXqSHb4u4K3Kn7s3gd"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "b3c55912-31fa-4553-8602-a1099966fa4b", "DetectTime": "2024-05-21T12:27:59.574382+00:00", "EventTime": "2024-05-21T12:27:59.574400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcNh11Fjm1PyGN8uk"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "deea4203-ff0f-4cf7-8cd3-86cf662a1d1e", "DetectTime": "2024-05-21T12:27:59.582249+00:00", "EventTime": "2024-05-21T12:27:59.582271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLudT22zmLms6M4yfi"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "e03b7944-2e4a-4441-bf42-e8c3cbd26db3", "DetectTime": "2024-05-21T12:27:59.653816+00:00", "EventTime": "2024-05-21T12:27:59.653837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrN1tfM1nb5c5eBa"], "accumulated_threat_level": 10.4, "timewindow": 37} +{"Format": "IDEA0", "ID": "446cec3f-22a8-46ab-b8e5-0cdbb5e21b8c", "DetectTime": "2024-05-21T12:27:59.659693+00:00", "EventTime": "2024-05-21T12:27:59.659713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CherZm2kQLeFMQ2iDh"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "0c08df55-5562-48f9-abdd-43cb71cb2d29", "DetectTime": "2024-05-21T12:27:59.697493+00:00", "EventTime": "2024-05-21T12:27:59.697513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyHu4P3iy4kTkaUS8"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "83fc43ef-7d75-4c7a-a146-2b6d1b34b8ec", "DetectTime": "2024-05-21T12:27:59.724248+00:00", "EventTime": "2024-05-21T12:27:59.724268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6Nqx2g2f4Vazvne3"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "311a9eb0-39c3-4663-9ae3-59f1441a1909", "DetectTime": "2024-05-21T12:27:59.745603+00:00", "EventTime": "2024-05-21T12:27:59.745624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyckBh1FBYuGru1Ivc"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "2d550f8b-c045-4b7d-887f-ac585515d5c4", "DetectTime": "2024-05-21T12:27:59.767167+00:00", "EventTime": "2024-05-21T12:27:59.767186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwP0mR3Nsqj77uFTpc"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "3454abee-d333-4683-af1d-aed7ec49ff3d", "DetectTime": "2024-05-21T12:27:59.835660+00:00", "EventTime": "2024-05-21T12:27:59.835677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["101.63.216.247"]}], "Attach": [{"Content": "Connection to unknown destination port 5361/UDP destination IP 101.63.216.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJqkvQejMbn8s6Ll"], "accumulated_threat_level": 11.200000000000001, "timewindow": 37} +{"Format": "IDEA0", "ID": "97a6a025-a81f-44e2-b201-902418e5b5a1", "DetectTime": "2024-05-21T12:27:59.872022+00:00", "EventTime": "2024-05-21T12:27:59.872041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqhi261mj8x0p8OZGi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 37} +{"Format": "Json", "ID": "97a6a025-a81f-44e2-b201-902418e5b5a1", "DetectTime": "2024-05-21T12:27:59.872022+00:00", "EventTime": "2024-05-21T12:27:59.872041+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "1970-01-02T12:42:18.086247+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2024/05/21 12:28:00.063451)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 37, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "db876d35-c697-462a-afff-c6ad5a1e29fa", "DetectTime": "2024-05-21T12:28:00.067402+00:00", "EventTime": "2024-05-21T12:28:00.067421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWiviZ2syFngyfDPh6"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "327c6912-c5b9-49ae-852d-59135d814ea3", "DetectTime": "2024-05-21T12:28:00.078989+00:00", "EventTime": "2024-05-21T12:28:00.079012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDscxT3B3bxr9uRTMh"], "accumulated_threat_level": 0.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "e0c29c82-e565-45ca-9e96-e1348aeefbdc", "DetectTime": "2024-05-21T12:28:00.089331+00:00", "EventTime": "2024-05-21T12:28:00.089348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YiGk4M11TfJ5uyh8"], "accumulated_threat_level": 1.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "960d4762-7a7d-4353-92c7-bee69b469f1d", "DetectTime": "2024-05-21T12:28:00.099492+00:00", "EventTime": "2024-05-21T12:28:00.099510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1rO81tDmX8HCIPx6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 37} +{"Format": "IDEA0", "ID": "1b0fd3b8-cdf1-4d35-8e4f-e68f03910a1c", "DetectTime": "2024-05-21T12:28:00.109482+00:00", "EventTime": "2024-05-21T12:28:00.109500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "Connection to unknown destination port 6839/UDP destination IP 117.223.129.15. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDsD7638zBz75rrjU2"], "accumulated_threat_level": 3.2, "timewindow": 37} +{"Format": "IDEA0", "ID": "7cd25fee-2874-4aa9-b02f-36dc4145f736", "DetectTime": "2024-05-21T12:28:00.120432+00:00", "EventTime": "2024-05-21T12:28:00.120451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGkD31SdfmEVwWSp2"], "accumulated_threat_level": 4.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "aefe8092-bccb-44cc-9463-fcf30cac786b", "DetectTime": "2024-05-21T12:28:00.134815+00:00", "EventTime": "2024-05-21T12:28:00.134832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjXLgn8VV0NRVuZ6"], "accumulated_threat_level": 4.8, "timewindow": 37} +{"Format": "IDEA0", "ID": "24621175-9fe2-4212-ae3f-d3b968856ec8", "DetectTime": "2024-05-21T12:28:00.145518+00:00", "EventTime": "2024-05-21T12:28:00.145539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAVJK1fJtUPKIxyga"], "accumulated_threat_level": 5.6, "timewindow": 37} +{"Format": "IDEA0", "ID": "ff3c836d-78df-4467-830a-00777b83158d", "DetectTime": "2024-05-21T12:28:00.156044+00:00", "EventTime": "2024-05-21T12:28:00.156062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoGlY17iVjL0dIv68"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "86bec36a-a83e-4c7e-b376-d67338e467fe", "DetectTime": "2024-05-21T12:28:00.167560+00:00", "EventTime": "2024-05-21T12:28:00.167578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJHFo2rOTeShbMbnj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "588ccdc4-9617-4820-ad55-0ead9b354dfe", "DetectTime": "2024-05-21T12:28:00.172342+00:00", "EventTime": "2024-05-21T12:28:00.172360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvoof1PuyXNUy4rl8"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "38109efb-fd11-48dd-abfd-b882ffa5a8cc", "DetectTime": "2024-05-21T12:28:00.370646+00:00", "EventTime": "2024-05-21T12:28:00.370664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZGRl1IV8LItD00Y2"], "accumulated_threat_level": 0.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "783576bb-9dba-4a77-9693-e109c97d7b76", "DetectTime": "2024-05-21T12:28:00.415957+00:00", "EventTime": "2024-05-21T12:28:00.415981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFevetW6XEz9B5T"], "accumulated_threat_level": 1.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "d2a765b0-acf2-4c50-9ce4-1a56ed54f6d3", "DetectTime": "2024-05-21T12:28:00.439133+00:00", "EventTime": "2024-05-21T12:28:00.439153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17p282I3A3x42kwXg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 38} +{"Format": "IDEA0", "ID": "0514c39d-8a99-444e-96b0-620a0167e2c3", "DetectTime": "2024-05-21T12:28:00.478565+00:00", "EventTime": "2024-05-21T12:28:00.478586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZUhQ1iKt7goi959a"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "12ea337a-6418-49f2-ac25-012c613c555d", "DetectTime": "2024-05-21T12:28:00.509385+00:00", "EventTime": "2024-05-21T12:28:00.509405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefVjp43wuCP6Jonel"], "accumulated_threat_level": 3.2, "timewindow": 38} +{"Format": "IDEA0", "ID": "c501bb91-bb99-487b-80ba-a76af7f8b135", "DetectTime": "2024-05-21T12:28:00.776039+00:00", "EventTime": "2024-05-21T12:28:00.776060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNmObr13T07xwYaE0l"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "df88a624-d7d0-4798-aede-d5e7d7eb7eac", "DetectTime": "2024-05-21T12:28:00.866523+00:00", "EventTime": "2024-05-21T12:28:00.866547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CclHo242ghVFT8XsXk"], "accumulated_threat_level": 4.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "521df451-d3a9-4474-8f97-357f8fa67eac", "DetectTime": "2024-05-21T12:28:00.872086+00:00", "EventTime": "2024-05-21T12:28:00.872107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwafk31FDe7RfiF2K6"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "cf8d45ce-6128-4def-893b-ae12594998ea", "DetectTime": "2024-05-21T12:28:00.888859+00:00", "EventTime": "2024-05-21T12:28:00.888877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuDcx1fxVJL8S0hPc"], "accumulated_threat_level": 4.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "348af1de-c311-4bf6-a3ef-1e30143ac305", "DetectTime": "2024-05-21T12:28:00.918686+00:00", "EventTime": "2024-05-21T12:28:00.918703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbnm0m12MV48ENy7Di"], "accumulated_threat_level": 5.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "6f4bf075-efab-4ffb-b493-286e115e004f", "DetectTime": "2024-05-21T12:28:01.077031+00:00", "EventTime": "2024-05-21T12:28:01.077052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.125.211.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CModSV1Yk6mF9KXl7k"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "6f332324-c5b5-4cda-9c57-72362bed1506", "DetectTime": "2024-05-21T12:28:01.214739+00:00", "EventTime": "2024-05-21T12:28:01.214758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJU5CsimxSGuegDl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 38} +{"Format": "IDEA0", "ID": "cd83dbf9-2890-4ac7-8473-2e0b431bc74e", "DetectTime": "2024-05-21T12:28:01.255339+00:00", "EventTime": "2024-05-21T12:28:01.255359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFptI3di2AdIqSny9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "4aebb4c9-d54a-4bc6-84f7-6e0689d0461a", "DetectTime": "2024-05-21T12:28:01.296726+00:00", "EventTime": "2024-05-21T12:28:01.296747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilOKp3uieivZTqys3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "d81e4f20-5928-41cf-84d1-fb9dfda5c486", "DetectTime": "2024-05-21T12:28:01.337796+00:00", "EventTime": "2024-05-21T12:28:01.337817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjvCh2QziPvcdCvFh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "c83b71df-246b-4d3f-965a-7e03c0e04d8a", "DetectTime": "2024-05-21T12:28:01.366874+00:00", "EventTime": "2024-05-21T12:28:01.366894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOwxz3i5oPA0PKtj"], "accumulated_threat_level": 9.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "3b528643-25dd-4576-ab66-960b0f186846", "DetectTime": "2024-05-21T12:28:01.411394+00:00", "EventTime": "2024-05-21T12:28:01.411413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUxP8a3LXD79rBhPUh"], "accumulated_threat_level": 10.4, "timewindow": 38} +{"Format": "IDEA0", "ID": "e3182ca5-9a77-48ab-b4af-713820273ef3", "DetectTime": "2024-05-21T12:28:01.511170+00:00", "EventTime": "2024-05-21T12:28:01.511189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.90.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMXmv2ycexNVRU0gl"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "08407384-3123-4667-b440-2d8b56e0055c", "DetectTime": "2024-05-21T12:28:01.545441+00:00", "EventTime": "2024-05-21T12:28:01.545460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.48.67.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgRykrPWKRq5iSi"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "3f2d9778-6a82-4dc9-94a7-8968f7a070ea", "DetectTime": "2024-05-21T12:28:01.611990+00:00", "EventTime": "2024-05-21T12:28:01.612011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVP4K38CmrPKD70F2"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "8cb9a8d1-9995-4ee3-8d7d-eb16b7aab0d2", "DetectTime": "2024-05-21T12:28:01.622724+00:00", "EventTime": "2024-05-21T12:28:01.622745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl4yBe1Rp3r3eJypd7", "CGU5uf3oaQd9sQXC73", "CdYelf3fvCr2up04Ye", "CV7C0A1tFPSYi5gcf8"], "accumulated_threat_level": 10.9, "timewindow": 38} +{"Format": "IDEA0", "ID": "5eb18ee4-b588-4cc8-8149-7a2243813c56", "DetectTime": "2024-05-21T12:28:01.650098+00:00", "EventTime": "2024-05-21T12:28:01.650117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJ1Cn1Zkffbj9ruwg"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "4a40da73-81cb-4138-85c3-89465d64439e", "DetectTime": "2024-05-21T12:28:01.682871+00:00", "EventTime": "2024-05-21T12:28:01.682890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB6Pbw3OELLD06cKG5"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "4edfb5f9-1a2d-43d1-961a-bb987a16be82", "DetectTime": "2024-05-21T12:28:01.715071+00:00", "EventTime": "2024-05-21T12:28:01.715093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRZEl2bucPDuQKkh7"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "19aa180d-9070-4b28-8f57-9aa7087de944", "DetectTime": "2024-05-21T12:28:01.742705+00:00", "EventTime": "2024-05-21T12:28:01.742724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yqxW2t0tiJGEhZl6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "12636831-bf0e-4adf-a0c5-65011b2c1bb1", "DetectTime": "2024-05-21T12:28:01.782758+00:00", "EventTime": "2024-05-21T12:28:01.782776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d1mq4yPaPlVJdh43"], "accumulated_threat_level": 12.500000000000002, "timewindow": 38} +{"Format": "Json", "ID": "12636831-bf0e-4adf-a0c5-65011b2c1bb1", "DetectTime": "2024-05-21T12:28:01.782758+00:00", "EventTime": "2024-05-21T12:28:01.782776+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "1970-01-02T13:13:26.861633+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2024/05/21 12:28:01.972137)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 38, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "b70ae8fc-8c5a-4dc8-88a2-ee4951cd6c6f", "DetectTime": "2024-05-21T12:28:01.982838+00:00", "EventTime": "2024-05-21T12:28:01.982859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkVjuA3z9crdvxfAi4"], "accumulated_threat_level": 0.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "b41efeeb-c467-4432-a5ba-20ab603c8566", "DetectTime": "2024-05-21T12:28:01.987927+00:00", "EventTime": "2024-05-21T12:28:01.987947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RJr11xVeu7BiQY34"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "5808c91b-425f-4aa4-9d20-ecbecee559b2", "DetectTime": "2024-05-21T12:28:01.999702+00:00", "EventTime": "2024-05-21T12:28:01.999721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYT4vbO1BmQFDaDU5"], "accumulated_threat_level": 1.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "dc61e0c4-54c2-47d4-8192-0dcd58474c0c", "DetectTime": "2024-05-21T12:28:02.030282+00:00", "EventTime": "2024-05-21T12:28:02.030304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1nlyOQgXPvXbI4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 38} +{"Format": "IDEA0", "ID": "0ae026af-057a-4946-9031-8a602d4a1c8f", "DetectTime": "2024-05-21T12:28:02.047806+00:00", "EventTime": "2024-05-21T12:28:02.047825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8DaYdOdQhDchmUb"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "2f9f65b1-8ec4-400b-aa08-f59f1a8e4143", "DetectTime": "2024-05-21T12:28:02.086277+00:00", "EventTime": "2024-05-21T12:28:02.086296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxcTT620ifzUfBgcPl"], "accumulated_threat_level": 3.2, "timewindow": 38} +{"Format": "IDEA0", "ID": "3fa1732c-f0a9-4be5-934e-05485b524da3", "DetectTime": "2024-05-21T12:28:02.107567+00:00", "EventTime": "2024-05-21T12:28:02.107585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKffvK3si3IHMaCXji"], "accumulated_threat_level": 4.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "9b4bf701-0b21-4aca-9e51-0d93def405ea", "DetectTime": "2024-05-21T12:28:02.141624+00:00", "EventTime": "2024-05-21T12:28:02.141643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybRbZ3anN9xFlF87f"], "accumulated_threat_level": 4.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "342bd6d7-d920-42ba-976a-18bc0de9f6a5", "DetectTime": "2024-05-21T12:28:02.381346+00:00", "EventTime": "2024-05-21T12:28:02.381368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAG0454AtwfHk6kPh7"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "1fbc19bb-b8d3-4e41-98bf-ee835f597f05", "DetectTime": "2024-05-21T12:28:02.416014+00:00", "EventTime": "2024-05-21T12:28:02.416035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvo1Icm885tVJO2G2"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a52e9fe9-6e80-49fb-a3f2-f760106629b2", "DetectTime": "2024-05-21T12:28:02.431732+00:00", "EventTime": "2024-05-21T12:28:02.431753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGsGbZ2wh23lo9Kkrh"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "69604e53-3eaa-4052-a1ea-8bee757b3071", "DetectTime": "2024-05-21T12:28:02.457861+00:00", "EventTime": "2024-05-21T12:28:02.457879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYf7C93y0I0xdQ134k"], "accumulated_threat_level": 5.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "446f33ab-eae4-47f3-a4f2-40118a6e528f", "DetectTime": "2024-05-21T12:28:02.477100+00:00", "EventTime": "2024-05-21T12:28:02.477123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74LiW7HgXOByc1V"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "ad7aa0d2-eb8d-4e74-8a69-65ff550a12d5", "DetectTime": "2024-05-21T12:28:02.497041+00:00", "EventTime": "2024-05-21T12:28:02.497065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFt4Fd3zvEkw03MWZi"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "25a5c8a8-3af2-4970-86f8-7c552362428c", "DetectTime": "2024-05-21T12:28:02.525097+00:00", "EventTime": "2024-05-21T12:28:02.525118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuU0MC6YFwLk04cig"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "0b622c76-1e89-4e65-8899-1fc3efa5c1fa", "DetectTime": "2024-05-21T12:28:02.556437+00:00", "EventTime": "2024-05-21T12:28:02.556455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUb9wx2tiJmBGvFZx6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 38} +{"Format": "IDEA0", "ID": "60c5b8c2-129f-45da-b4a2-dabe4b51a063", "DetectTime": "2024-05-21T12:28:02.570993+00:00", "EventTime": "2024-05-21T12:28:02.571017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVdoE49uAzQiCj944"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "1a200d35-a50f-4fc2-8253-bccfb5080a1b", "DetectTime": "2024-05-21T12:28:02.594344+00:00", "EventTime": "2024-05-21T12:28:02.594365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHrg12ZMJiuboiWKd"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "76b11047-b711-4af2-adc2-312477cf8cc7", "DetectTime": "2024-05-21T12:28:02.620011+00:00", "EventTime": "2024-05-21T12:28:02.620029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPf6K1Oz5mEJbUdDc"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "975b611d-ed0a-4c58-a572-25ad8181c5b6", "DetectTime": "2024-05-21T12:28:02.630688+00:00", "EventTime": "2024-05-21T12:28:02.630706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNTJb4kdap1i3DT3a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "6e087b08-13d8-449a-aa64-dd60f6b3a6a7", "DetectTime": "2024-05-21T12:28:02.665686+00:00", "EventTime": "2024-05-21T12:28:02.665707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyauiR2nrC0bQ5QG89"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a535ef88-ff33-4937-978b-3cc6a32e4f08", "DetectTime": "2024-05-21T12:28:02.683626+00:00", "EventTime": "2024-05-21T12:28:02.683647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEFUn4TPaNEb5B4jf"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "32e30ece-4e96-42e1-8c80-7de9e264c483", "DetectTime": "2024-05-21T12:28:02.709983+00:00", "EventTime": "2024-05-21T12:28:02.710005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpCVzHs19fHLFhpll"], "accumulated_threat_level": 7.999999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "d97bdb3b-3e13-403e-ae0f-0f40cf9261b8", "DetectTime": "2024-05-21T12:28:02.728956+00:00", "EventTime": "2024-05-21T12:28:02.728977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjvbrjZjkZ97BrC1g"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "c4dfab31-07ec-4f18-a49c-289bcf42911d", "DetectTime": "2024-05-21T12:28:02.751796+00:00", "EventTime": "2024-05-21T12:28:02.751815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtX9RXQbzyU7CERb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "6bf787ec-25c2-4ccb-9e34-3884c8a16ab3", "DetectTime": "2024-05-21T12:28:02.770311+00:00", "EventTime": "2024-05-21T12:28:02.770330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1R6e4vZK6zDXR2jk"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "49dcd28b-1a55-46f7-abdc-b7a9222de30e", "DetectTime": "2024-05-21T12:28:02.809491+00:00", "EventTime": "2024-05-21T12:28:02.809509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBJlNo4PySPQWQDjkb"], "accumulated_threat_level": 9.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "5fd53c02-938e-4c6b-8891-daf492f62585", "DetectTime": "2024-05-21T12:28:02.814035+00:00", "EventTime": "2024-05-21T12:28:02.814052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZjSJqcIwqQjzjPd"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "9cfb9b47-d09b-4b40-b401-82561fe393ba", "DetectTime": "2024-05-21T12:28:02.837343+00:00", "EventTime": "2024-05-21T12:28:02.837363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VX3gZZYDwfMxog"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "39972d4c-6594-4e1a-8a51-d25a1e2bbe23", "DetectTime": "2024-05-21T12:28:02.859411+00:00", "EventTime": "2024-05-21T12:28:02.859433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfja9ZfMG8WzG3rce"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "c16ee0f2-c6a5-4465-9f8c-af1be1fef972", "DetectTime": "2024-05-21T12:28:02.883148+00:00", "EventTime": "2024-05-21T12:28:02.883168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eAHI1I7QCiESuVS6"], "accumulated_threat_level": 10.4, "timewindow": 38} +{"Format": "IDEA0", "ID": "731ab8e6-ac89-44ce-9d0d-2827aa767282", "DetectTime": "2024-05-21T12:28:02.906845+00:00", "EventTime": "2024-05-21T12:28:02.906867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLqkgW3TwhtWiLLnS9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "0e089ff8-774a-4ee5-a371-9e8933b63f45", "DetectTime": "2024-05-21T12:28:03.143348+00:00", "EventTime": "2024-05-21T12:28:03.143367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLg6i4A775hiQ5rt9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "b1d295a2-5f0c-45d7-b91d-c67ab1a533e5", "DetectTime": "2024-05-21T12:28:03.198309+00:00", "EventTime": "2024-05-21T12:28:03.198332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHdZ6PdPtfbC6NGl"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "211f2d82-e7f9-4f5e-b297-0bb00011f64b", "DetectTime": "2024-05-21T12:28:03.212081+00:00", "EventTime": "2024-05-21T12:28:03.212101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUWLG2tjBn23LVl6g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "b6e287ad-26e4-4fad-b461-ee3c46ee3fa1", "DetectTime": "2024-05-21T12:28:03.220424+00:00", "EventTime": "2024-05-21T12:28:03.220442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CahgsA3W3kg8piDy0c"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "66f4cc4f-a469-4ea5-a15c-e688eb50f016", "DetectTime": "2024-05-21T12:28:03.225136+00:00", "EventTime": "2024-05-21T12:28:03.225155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGbqJXvy3gHSVA3j"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "ab3f7777-20a6-44f4-948e-b4d69069b296", "DetectTime": "2024-05-21T12:28:03.229772+00:00", "EventTime": "2024-05-21T12:28:03.229791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbENoW10dnYhJWiYZf"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "ea686eb6-7657-40ea-bb80-d3e236b92d9b", "DetectTime": "2024-05-21T12:28:03.267641+00:00", "EventTime": "2024-05-21T12:28:03.267666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy40k11ok6HoqEArq8"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "cfd0e5f7-f82f-4690-985b-1a71a5d40af5", "DetectTime": "2024-05-21T12:28:03.284987+00:00", "EventTime": "2024-05-21T12:28:03.285005+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifnuE4rgdINGFyI46"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "afdd5a21-a530-4368-b7c9-e052caab24c3", "DetectTime": "2024-05-21T12:28:03.298369+00:00", "EventTime": "2024-05-21T12:28:03.298388+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifnuE4rgdINGFyI46"], "accumulated_threat_level": 4.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "bfcb4317-5cfb-47a2-958c-919156ab7934", "DetectTime": "2024-05-21T12:28:03.313530+00:00", "EventTime": "2024-05-21T12:28:03.313550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9L8jnreonWLQSxel"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "5901b581-33e3-4bd9-87ee-7fe3dd9645c4", "DetectTime": "2024-05-21T12:28:03.318488+00:00", "EventTime": "2024-05-21T12:28:03.318506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMALi4FKxPxvnkQTb"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "5726ae52-9a2c-465f-8bdd-eb2f073c93af", "DetectTime": "2024-05-21T12:28:03.358515+00:00", "EventTime": "2024-05-21T12:28:03.358536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7a5t2sGR4v1Larh5"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "cdb3bcae-e773-4873-84df-ed804db04271", "DetectTime": "2024-05-21T12:28:03.363413+00:00", "EventTime": "2024-05-21T12:28:03.363431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEjx67IZFSC8ibYd"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a171172d-8bdc-49d2-a7e6-baa2efdca49f", "DetectTime": "2024-05-21T12:28:03.402940+00:00", "EventTime": "2024-05-21T12:28:03.402959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1hxE3GsnsRjf4MRi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 38} +{"Format": "Json", "ID": "a171172d-8bdc-49d2-a7e6-baa2efdca49f", "DetectTime": "2024-05-21T12:28:03.402940+00:00", "EventTime": "2024-05-21T12:28:03.402959+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-02T13:14:04.656604+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2024/05/21 12:28:03.552607)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 38, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b4b026a0-564e-41ed-a6f1-d7b430dfedc1", "DetectTime": "2024-05-21T12:28:03.556669+00:00", "EventTime": "2024-05-21T12:28:03.556687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8uVe92N2m5kCTW8B2"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "f7e915d9-23bc-4f86-a3da-4c498d7a488e", "DetectTime": "2024-05-21T12:28:03.576791+00:00", "EventTime": "2024-05-21T12:28:03.576811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4O2b3r1f26bV3Qsi"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "ea2288f1-b021-42df-9b8c-d0053a07c5d7", "DetectTime": "2024-05-21T12:28:03.589094+00:00", "EventTime": "2024-05-21T12:28:03.589113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4O2b3r1f26bV3Qsi"], "accumulated_threat_level": 4.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "b2f91343-135e-432b-a55b-c1b386db6471", "DetectTime": "2024-05-21T12:28:03.593784+00:00", "EventTime": "2024-05-21T12:28:03.593803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnA0Fa3n0YutPdTZfe"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "dbe5d3d7-7172-46d2-9882-c0dcb1a0e70c", "DetectTime": "2024-05-21T12:28:03.598435+00:00", "EventTime": "2024-05-21T12:28:03.598454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6mpG11ePBLblxEF4"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "0d3cdb2a-04d0-40dc-9f88-981fea9ec448", "DetectTime": "2024-05-21T12:28:03.610064+00:00", "EventTime": "2024-05-21T12:28:03.610082+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJsaiA4SKtvzdtYcW"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "c3946b08-9086-437f-95d2-706a4a0d47ad", "DetectTime": "2024-05-21T12:28:03.624565+00:00", "EventTime": "2024-05-21T12:28:03.624585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJsaiA4SKtvzdtYcW"], "accumulated_threat_level": 5.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "c946ac8c-9da3-4cad-9f81-277fbe7c9a60", "DetectTime": "2024-05-21T12:28:03.637323+00:00", "EventTime": "2024-05-21T12:28:03.637342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX0SoO2bgRjDA8LKDl"], "accumulated_threat_level": 0.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "4a0249f1-3ff8-4294-985e-fb3deaa17993", "DetectTime": "2024-05-21T12:28:03.781534+00:00", "EventTime": "2024-05-21T12:28:03.781556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6aKS52FXe1OT0IeY1"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "ad77a299-df77-4362-b9ff-458fcc040606", "DetectTime": "2024-05-21T12:28:03.911636+00:00", "EventTime": "2024-05-21T12:28:03.911655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVzubs3dp2rTdNMXDc", "CGd2sr4E3dGOsIdRH9", "C9YiOF4mrOhrnSeyAl", "CmqUiF99t78XLa24b"], "accumulated_threat_level": 1.3, "timewindow": 38} +{"Format": "IDEA0", "ID": "7b3994c4-2b52-45cb-9f36-12a1156b61d0", "DetectTime": "2024-05-21T12:28:03.988236+00:00", "EventTime": "2024-05-21T12:28:03.988259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBbI18vNho8oaYV9"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "3b536be9-61ae-4285-8a39-3cfa6d8c8d35", "DetectTime": "2024-05-21T12:28:04.101269+00:00", "EventTime": "2024-05-21T12:28:04.101290+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71pAJ1iZLOksdPpYb"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "cc8f0422-aa83-4741-b0b5-f7f50c85b9aa", "DetectTime": "2024-05-21T12:28:04.112714+00:00", "EventTime": "2024-05-21T12:28:04.112733+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71pAJ1iZLOksdPpYb"], "accumulated_threat_level": 5.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "fe5653f4-7aac-41e4-bba7-421e0663dfdd", "DetectTime": "2024-05-21T12:28:04.152493+00:00", "EventTime": "2024-05-21T12:28:04.152511+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMWxK2EPY2jr0id6"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "36633448-ec39-4749-8829-77441f9889e7", "DetectTime": "2024-05-21T12:28:04.165199+00:00", "EventTime": "2024-05-21T12:28:04.165219+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMWxK2EPY2jr0id6"], "accumulated_threat_level": 6.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "375dee0e-6ca9-4406-87f6-81c8fdae54ef", "DetectTime": "2024-05-21T12:28:04.210522+00:00", "EventTime": "2024-05-21T12:28:04.210544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyV0LK1jG0vRaqiHHd"], "accumulated_threat_level": 0.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "4e2a7e81-d80e-4970-bb1a-9cbda16a3dd3", "DetectTime": "2024-05-21T12:28:04.256952+00:00", "EventTime": "2024-05-21T12:28:04.256971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOnelEqQcDH8ZqQ9"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "fa7fb29f-516f-4fc3-b74f-7824fe2851b9", "DetectTime": "2024-05-21T12:28:04.270005+00:00", "EventTime": "2024-05-21T12:28:04.270025+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOnelEqQcDH8ZqQ9"], "accumulated_threat_level": 6.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "6b8f3ed2-8d20-44f9-ad8c-c0538b336e06", "DetectTime": "2024-05-21T12:28:04.283604+00:00", "EventTime": "2024-05-21T12:28:04.283626+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yGvR1WE2QUJj2dc"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "802732c3-b74b-4e8d-9068-74aa89c64a34", "DetectTime": "2024-05-21T12:28:04.297474+00:00", "EventTime": "2024-05-21T12:28:04.297491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yGvR1WE2QUJj2dc"], "accumulated_threat_level": 7.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "4734694a-3caf-46ae-953e-20c296cbbc44", "DetectTime": "2024-05-21T12:28:04.315301+00:00", "EventTime": "2024-05-21T12:28:04.315318+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIkYKyAiiKa5rQ5i6"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "c13b9da9-868d-4ee2-8b5a-dc5dbea83adc", "DetectTime": "2024-05-21T12:28:04.327167+00:00", "EventTime": "2024-05-21T12:28:04.327185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIkYKyAiiKa5rQ5i6"], "accumulated_threat_level": 7.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "63536f5c-3e85-4f39-beda-bb430937c6a4", "DetectTime": "2024-05-21T12:28:04.582375+00:00", "EventTime": "2024-05-21T12:28:04.582399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qYVs1HQ7e1ll3zVf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "141a4cf9-2c6c-4d69-ad97-fccb36aa17f3", "DetectTime": "2024-05-21T12:28:04.624476+00:00", "EventTime": "2024-05-21T12:28:04.624496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ3CAk211M7KdqoX79"], "accumulated_threat_level": 2.1, "timewindow": 38} +{"Format": "IDEA0", "ID": "1db93c11-31c1-45a0-b870-bb18c274cf9b", "DetectTime": "2024-05-21T12:28:04.667908+00:00", "EventTime": "2024-05-21T12:28:04.667928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztmavpUIlys0KlKh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 38} +{"Format": "IDEA0", "ID": "e8c51b48-a53d-473f-8d3f-6c25b753d09f", "DetectTime": "2024-05-21T12:28:04.743509+00:00", "EventTime": "2024-05-21T12:28:04.743528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfFhpx3cLIKsWD6zJ8"], "accumulated_threat_level": 3.7, "timewindow": 38} +{"Format": "IDEA0", "ID": "b9f90427-32a7-4352-b824-f96203926052", "DetectTime": "2024-05-21T12:28:04.773327+00:00", "EventTime": "2024-05-21T12:28:04.773344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vz1v4eIJdqgRStT2"], "accumulated_threat_level": 4.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "c4a3f3bb-9fac-4e6e-a6a4-76245a561a28", "DetectTime": "2024-05-21T12:28:04.805529+00:00", "EventTime": "2024-05-21T12:28:04.805547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRCl7SMPz3IhXfb3"], "accumulated_threat_level": 5.3, "timewindow": 38} +{"Format": "IDEA0", "ID": "766228bf-8db4-46cb-a83a-cd19fddc29d2", "DetectTime": "2024-05-21T12:28:04.845579+00:00", "EventTime": "2024-05-21T12:28:04.845599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIn0o4n4dS6m7Dxa5"], "accumulated_threat_level": 6.1, "timewindow": 38} +{"Format": "IDEA0", "ID": "0b66e8c0-8d0e-4fbb-b9fd-1b3a5103c805", "DetectTime": "2024-05-21T12:28:04.877492+00:00", "EventTime": "2024-05-21T12:28:04.877511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvrNp9snH2naGC8i"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 38} +{"Format": "IDEA0", "ID": "a561e004-c738-4e03-bc3c-c89214c057fd", "DetectTime": "2024-05-21T12:28:04.917885+00:00", "EventTime": "2024-05-21T12:28:04.917905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgl5s21DgG34yyZnUd"], "accumulated_threat_level": 7.699999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "7c9a552b-8ac2-4adf-bcd1-c351726603db", "DetectTime": "2024-05-21T12:28:04.960286+00:00", "EventTime": "2024-05-21T12:28:04.960304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKXzK3Hj1858CL57b"], "accumulated_threat_level": 8.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "f987bfaa-a007-4a0e-a7bb-eecf4558ba09", "DetectTime": "2024-05-21T12:28:05.003975+00:00", "EventTime": "2024-05-21T12:28:05.003994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0JY54JPnT4LCeCLh"], "accumulated_threat_level": 9.3, "timewindow": 38} +{"Format": "IDEA0", "ID": "67fc84d0-f25a-422d-a33f-be15c670b5d2", "DetectTime": "2024-05-21T12:28:05.043743+00:00", "EventTime": "2024-05-21T12:28:05.043761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzoMN3K7yHLBgvoxf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "11433561-caba-49f0-b9b3-b251b8e51a8e", "DetectTime": "2024-05-21T12:28:05.127952+00:00", "EventTime": "2024-05-21T12:28:05.127974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ei0qJs9FyoshJl2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "8595e9e0-3324-4dd7-978e-7fb272980079", "DetectTime": "2024-05-21T12:28:05.157402+00:00", "EventTime": "2024-05-21T12:28:05.157440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0j3BP4QoSlQZaSa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "bd50dc8f-0f71-4ce8-973d-418ea7c6121e", "DetectTime": "2024-05-21T12:28:05.186489+00:00", "EventTime": "2024-05-21T12:28:05.186508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFZLi3U9hTCpvgzr2"], "accumulated_threat_level": 10.900000000000002, "timewindow": 38} +{"Format": "IDEA0", "ID": "71c586d3-67ab-4967-87f7-44d286d42090", "DetectTime": "2024-05-21T12:28:05.209748+00:00", "EventTime": "2024-05-21T12:28:05.209768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4yXxVdCHzsDPJwf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "eebfb08f-2e75-4154-9a97-84f8156e2fac", "DetectTime": "2024-05-21T12:28:05.462051+00:00", "EventTime": "2024-05-21T12:28:05.462071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQxlNgnxAnKYPsH7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "cb7db76b-a577-4c55-bae3-99e95839203e", "DetectTime": "2024-05-21T12:28:05.518567+00:00", "EventTime": "2024-05-21T12:28:05.518587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGbTi2bgoneKdDlC7"], "accumulated_threat_level": 11.700000000000003, "timewindow": 38} +{"Format": "IDEA0", "ID": "218b9eec-da4a-449a-9c57-4bf4f69719aa", "DetectTime": "2024-05-21T12:28:05.572836+00:00", "EventTime": "2024-05-21T12:28:05.572856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cypr7q3OtnQUWcsY0j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "f37d7648-03c1-4804-9b95-705d3cb19134", "DetectTime": "2024-05-21T12:28:05.577988+00:00", "EventTime": "2024-05-21T12:28:05.578011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LOX31GzaZPjZMIF1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "75c4544e-1c00-4b2d-990c-ca90f72ad4bd", "DetectTime": "2024-05-21T12:28:05.583944+00:00", "EventTime": "2024-05-21T12:28:05.583962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkxHs0UrZZVTH5Le"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "667e3263-9f41-4e06-ba7f-362b6f7fac7d", "DetectTime": "2024-05-21T12:28:05.588336+00:00", "EventTime": "2024-05-21T12:28:05.588354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3ZmIEFIqxlGMuy7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "c8612497-2a6e-41d5-8776-7dc20cb1e908", "DetectTime": "2024-05-21T12:28:05.593407+00:00", "EventTime": "2024-05-21T12:28:05.593425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPCrq2RvBVxD9yrre"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "907c1acc-8172-4750-bf61-cb85f8e4ff05", "DetectTime": "2024-05-21T12:28:05.597788+00:00", "EventTime": "2024-05-21T12:28:05.597806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXyhQM2FuBdGUIFpvk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "704a5abe-5b7d-4e44-a0f9-3172eed54477", "DetectTime": "2024-05-21T12:28:05.619075+00:00", "EventTime": "2024-05-21T12:28:05.619097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKxQcz2Fxe8P7Nem7j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "46bb652c-76f2-4686-8afb-192fb36ea8c8", "DetectTime": "2024-05-21T12:28:05.653620+00:00", "EventTime": "2024-05-21T12:28:05.653640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6Rnv4r2spX2lmf0d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "f5659c41-8d49-44c2-8bde-8b44c90f6b51", "DetectTime": "2024-05-21T12:28:05.697808+00:00", "EventTime": "2024-05-21T12:28:05.697831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFUgA40FXPd8c2Pq3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "72961497-2989-40ae-851c-5d6c75f80c33", "DetectTime": "2024-05-21T12:28:05.731101+00:00", "EventTime": "2024-05-21T12:28:05.731123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbzrjo23p8h7e7S1ec"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "266bcc7f-d76c-40d0-8fea-7c0671410920", "DetectTime": "2024-05-21T12:28:05.736507+00:00", "EventTime": "2024-05-21T12:28:05.736528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblDpe4HROKgczuUcc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "97012b74-543f-491b-aea9-c3a1eff33484", "DetectTime": "2024-05-21T12:28:05.752058+00:00", "EventTime": "2024-05-21T12:28:05.752077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "Connection to unknown destination port 3401/UDP destination IP 176.73.103.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYumlVViuZ3QvAeE6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 38} +{"Format": "Json", "ID": "97012b74-543f-491b-aea9-c3a1eff33484", "DetectTime": "2024-05-21T12:28:05.752058+00:00", "EventTime": "2024-05-21T12:28:05.752077+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.103.182"]}], "Attach": [{"Content": "1970-01-02T13:45:49.081427+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2024/05/21 12:28:05.965245)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 38, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "297de93b-4ed1-41b8-8a84-4ea322df3fc6", "DetectTime": "2024-05-21T12:28:05.969235+00:00", "EventTime": "2024-05-21T12:28:05.969253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdVwSl4xxoepRp3Cn4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "06ffdc6f-b9b1-4332-82a8-1046236bce57", "DetectTime": "2024-05-21T12:28:05.973594+00:00", "EventTime": "2024-05-21T12:28:05.973613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clw6UX9CkzCynlghh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "b83b2bf1-70da-4b31-849d-061670be620c", "DetectTime": "2024-05-21T12:28:05.980297+00:00", "EventTime": "2024-05-21T12:28:05.980315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipiBa2xh54TTH5gCk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "f9d48303-9dc7-4796-9f66-74cce75f1545", "DetectTime": "2024-05-21T12:28:05.991599+00:00", "EventTime": "2024-05-21T12:28:05.991617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWVnTQ6T9OeojGOsi"], "accumulated_threat_level": 0.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "3b9787e7-b6f1-42a8-804b-7a6030523b8a", "DetectTime": "2024-05-21T12:28:06.001659+00:00", "EventTime": "2024-05-21T12:28:06.001677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQIITvs33zF9oBDg"], "accumulated_threat_level": 1.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "e9a86918-dbd6-4adb-9918-60965626e335", "DetectTime": "2024-05-21T12:28:06.006203+00:00", "EventTime": "2024-05-21T12:28:06.006221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI5bFv1MHbCYBaIAr4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "b7398b5d-a042-472a-9371-d0033cb8d4af", "DetectTime": "2024-05-21T12:28:06.016131+00:00", "EventTime": "2024-05-21T12:28:06.016149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEck962BVDcBphryQc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 38} +{"Format": "IDEA0", "ID": "c8fe7105-2e88-43fd-ab68-a7654c18c404", "DetectTime": "2024-05-21T12:28:06.025728+00:00", "EventTime": "2024-05-21T12:28:06.025745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUegw2j7IQa28y9N"], "accumulated_threat_level": 3.2, "timewindow": 38} +{"Format": "IDEA0", "ID": "86fc2c00-2bfe-4e5e-8299-14259f43681f", "DetectTime": "2024-05-21T12:28:06.030154+00:00", "EventTime": "2024-05-21T12:28:06.030172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7k1S24c5zXa9jiLa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "dfcf1fce-2669-4ff6-ad76-7caff26647d8", "DetectTime": "2024-05-21T12:28:06.039852+00:00", "EventTime": "2024-05-21T12:28:06.039870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjwtYM1CqORNh8jtea"], "accumulated_threat_level": 4.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "9bad47df-4b6e-48d4-b59f-8ae3d814f70e", "DetectTime": "2024-05-21T12:28:06.050159+00:00", "EventTime": "2024-05-21T12:28:06.050178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nHpbsMfyLYfwzre"], "accumulated_threat_level": 4.8, "timewindow": 38} +{"Format": "IDEA0", "ID": "d735f71a-94b7-4e7c-9b05-89d01219d8cf", "DetectTime": "2024-05-21T12:28:06.249218+00:00", "EventTime": "2024-05-21T12:28:06.249240+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDCeZ3XVAiEy4tQAf"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "35b36451-bbf0-48a2-857f-e35c35f0a78d", "DetectTime": "2024-05-21T12:28:06.297745+00:00", "EventTime": "2024-05-21T12:28:06.297765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDCeZ3XVAiEy4tQAf"], "accumulated_threat_level": 8.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "8f9df307-e5ec-48c5-b7b4-9f2130a7c694", "DetectTime": "2024-05-21T12:28:06.328731+00:00", "EventTime": "2024-05-21T12:28:06.328753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpgX31S3GB8uHSk5d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "d4c95a9a-cc1b-484d-a54f-9f34bbc4a09a", "DetectTime": "2024-05-21T12:28:06.341081+00:00", "EventTime": "2024-05-21T12:28:06.341100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0TbB25oCJkucwHWh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ed645001-67d8-4de0-abc0-283006c5db3c", "DetectTime": "2024-05-21T12:28:06.353124+00:00", "EventTime": "2024-05-21T12:28:06.353145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4Slj1rOxopfL99hi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "4a33bc03-2f6d-4478-ab36-02c743e85b9c", "DetectTime": "2024-05-21T12:28:06.369839+00:00", "EventTime": "2024-05-21T12:28:06.369859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjFon5Ct03KYK9ph"], "accumulated_threat_level": 5.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "4797a6b1-889c-4c62-bd57-9a72b27d89f4", "DetectTime": "2024-05-21T12:28:06.374832+00:00", "EventTime": "2024-05-21T12:28:06.374852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTR74r1u9u1hmzS9z7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "f2f4e168-5f32-49bd-8328-d2683b5db10a", "DetectTime": "2024-05-21T12:28:06.380436+00:00", "EventTime": "2024-05-21T12:28:06.380459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0dhv24Eclk2Ub44h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "a9e96a6f-a4e0-446d-97a1-da8c8644493d", "DetectTime": "2024-05-21T12:28:06.438238+00:00", "EventTime": "2024-05-21T12:28:06.438259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNxQE4cSz8J1Xfsi4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ca696c85-da13-43f1-999c-7e8c9572ca91", "DetectTime": "2024-05-21T12:28:06.473386+00:00", "EventTime": "2024-05-21T12:28:06.473406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJr3rgCaHUau0xUx"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 38} +{"Format": "IDEA0", "ID": "5931c05d-a232-4904-9d1e-4e992d416654", "DetectTime": "2024-05-21T12:28:06.478363+00:00", "EventTime": "2024-05-21T12:28:06.478382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIilDL1LeqJpnwO59"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "8737ecf9-1a94-4db9-a06a-e45428451ceb", "DetectTime": "2024-05-21T12:28:06.506727+00:00", "EventTime": "2024-05-21T12:28:06.506748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU4Jbh16P2pqhbS8c8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "4e4a87e1-e3a9-4298-9442-e8a837200261", "DetectTime": "2024-05-21T12:28:06.529643+00:00", "EventTime": "2024-05-21T12:28:06.529663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN3aT328cyXO1yOJJj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "fb35c918-02be-40ff-aed2-52149d42079b", "DetectTime": "2024-05-21T12:28:06.547645+00:00", "EventTime": "2024-05-21T12:28:06.547664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfwSU2jdNuMH7kFA2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "9382f411-b447-431f-9ee8-8ac9a114d756", "DetectTime": "2024-05-21T12:28:06.576097+00:00", "EventTime": "2024-05-21T12:28:06.576125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRpWt2RQKZQn7UiAe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "a5276dd0-ed6e-48bf-8a77-a1130adce5ac", "DetectTime": "2024-05-21T12:28:06.587595+00:00", "EventTime": "2024-05-21T12:28:06.587612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfMZVkGYcOphzaDh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "afecf001-6960-45ad-af45-ae2dc33a5c65", "DetectTime": "2024-05-21T12:28:06.618148+00:00", "EventTime": "2024-05-21T12:28:06.618168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch3bST1pCCilQgYd64"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "946b5f32-16b3-4c89-96a5-ad2d9537052d", "DetectTime": "2024-05-21T12:28:06.650934+00:00", "EventTime": "2024-05-21T12:28:06.650955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5sS5Gq3ZakNlTbok"], "accumulated_threat_level": 8.799999999999999, "timewindow": 38} +{"Format": "IDEA0", "ID": "de0f9516-7806-4e56-85cd-6ddcfceb7d84", "DetectTime": "2024-05-21T12:28:06.658366+00:00", "EventTime": "2024-05-21T12:28:06.658387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COJ3aP1ZB88xaWM5X7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "9c13e651-72a4-4df0-a876-c2ab7c6f9408", "DetectTime": "2024-05-21T12:28:06.695587+00:00", "EventTime": "2024-05-21T12:28:06.695608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszKh92gTPIzeURJL4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "8beec80b-e856-42b3-8a9c-537f03678284", "DetectTime": "2024-05-21T12:28:06.710333+00:00", "EventTime": "2024-05-21T12:28:06.710352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycFef2CkykpD4L32"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "38948121-71c2-4f2a-9c04-082b401e6c71", "DetectTime": "2024-05-21T12:28:06.742224+00:00", "EventTime": "2024-05-21T12:28:06.742240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIOZM2ONg6EkbxQL6"], "accumulated_threat_level": 9.6, "timewindow": 38} +{"Format": "IDEA0", "ID": "0330e164-f787-4c78-bb7c-859f17184005", "DetectTime": "2024-05-21T12:28:06.752156+00:00", "EventTime": "2024-05-21T12:28:06.752175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYEPd16wEt5PO893l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ca35194e-5893-4ee7-90ed-43126b5d1c30", "DetectTime": "2024-05-21T12:28:06.784858+00:00", "EventTime": "2024-05-21T12:28:06.784880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUyn829f128EvqTde"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "623f51a9-59be-4150-a737-3486e3ab54c7", "DetectTime": "2024-05-21T12:28:06.795964+00:00", "EventTime": "2024-05-21T12:28:06.795985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyW2UEmM6nnhi51x6"], "accumulated_threat_level": 10.4, "timewindow": 38} +{"Format": "IDEA0", "ID": "d0361708-0bea-4d79-8a79-387fde28bf51", "DetectTime": "2024-05-21T12:28:06.803119+00:00", "EventTime": "2024-05-21T12:28:06.803139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNexNWjz6NPJQQej"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "14caab97-01d2-4d86-ae4b-4a8a755f37f9", "DetectTime": "2024-05-21T12:28:07.114581+00:00", "EventTime": "2024-05-21T12:28:07.114601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1y0Ib13cyWsyq8Hn3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "11391fc1-87f2-4ab0-9140-b641d8ec2f12", "DetectTime": "2024-05-21T12:28:07.119844+00:00", "EventTime": "2024-05-21T12:28:07.119863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4YIB4GnDbpnYpg3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "b7f695b4-9702-436a-bd09-a5754956b7e1", "DetectTime": "2024-05-21T12:28:07.207367+00:00", "EventTime": "2024-05-21T12:28:07.207390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8l8x2EdBUIy9cRzk"], "accumulated_threat_level": 0.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "1c5e851b-4e70-40b2-9235-526999545d92", "DetectTime": "2024-05-21T12:28:07.275623+00:00", "EventTime": "2024-05-21T12:28:07.275647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2z15a3CKWKuZ8e0Xa"], "accumulated_threat_level": 1.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "8b4b1fe1-a338-49a4-a793-3273bf488dcf", "DetectTime": "2024-05-21T12:28:07.300138+00:00", "EventTime": "2024-05-21T12:28:07.300156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVw9Yp12Z826ufvTdd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 39} +{"Format": "IDEA0", "ID": "5ad0ec8a-8dc0-427b-a7b8-7c6aed15eaa4", "DetectTime": "2024-05-21T12:28:07.329565+00:00", "EventTime": "2024-05-21T12:28:07.329582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAm4NC1kq4Dh93T3rc"], "accumulated_threat_level": 3.2, "timewindow": 39} +{"Format": "IDEA0", "ID": "fb75302a-5d9c-4779-8b9c-92861655998e", "DetectTime": "2024-05-21T12:28:07.376884+00:00", "EventTime": "2024-05-21T12:28:07.376904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6Bhw44OV0oKgYPI7"], "accumulated_threat_level": 4.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "9805982c-1817-4ec2-b2fd-b683347be0b5", "DetectTime": "2024-05-21T12:28:07.403167+00:00", "EventTime": "2024-05-21T12:28:07.403185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDg1A1DncIcoiAhI2"], "accumulated_threat_level": 4.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "c47fba19-9532-4986-a9ff-f0700fb0838c", "DetectTime": "2024-05-21T12:28:07.434851+00:00", "EventTime": "2024-05-21T12:28:07.434870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJQc02J9pqWUGF2O3"], "accumulated_threat_level": 5.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "4281f867-1176-4999-aad5-3813864d1edf", "DetectTime": "2024-05-21T12:28:07.461758+00:00", "EventTime": "2024-05-21T12:28:07.461777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrXgiI29kHpOZAoXzc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 39} +{"Format": "IDEA0", "ID": "5c413919-acb5-4bac-b33d-3bd225ce4dd4", "DetectTime": "2024-05-21T12:28:07.493338+00:00", "EventTime": "2024-05-21T12:28:07.493357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNC6Pf2S8STrvzfXH1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "c6caf27d-0704-4723-8424-249904557a99", "DetectTime": "2024-05-21T12:28:07.523211+00:00", "EventTime": "2024-05-21T12:28:07.523232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISdqo42zq9SFoVACc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "bd920a36-c02a-45da-ad5e-d98c393e3b41", "DetectTime": "2024-05-21T12:28:07.553893+00:00", "EventTime": "2024-05-21T12:28:07.553911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdGHe2hl45H8qGIlf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "1907c839-0397-437e-9357-0743afe0df59", "DetectTime": "2024-05-21T12:28:07.583632+00:00", "EventTime": "2024-05-21T12:28:07.583649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2U9SE4XFr8dNtGLD6"], "accumulated_threat_level": 9.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "7d735173-2228-4c44-9a8d-2fcd5b4ac7be", "DetectTime": "2024-05-21T12:28:07.615687+00:00", "EventTime": "2024-05-21T12:28:07.615707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HV6G2bZtL2mzGCvl"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "8fee916c-6786-4bd1-a9a0-1b1a3cc88715", "DetectTime": "2024-05-21T12:28:07.648058+00:00", "EventTime": "2024-05-21T12:28:07.648078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzSUa36jsMIrXQ6lc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 39} +{"Format": "IDEA0", "ID": "b5358001-3059-4526-bb70-e357b93cc7b5", "DetectTime": "2024-05-21T12:28:07.680547+00:00", "EventTime": "2024-05-21T12:28:07.680571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EHBH2KAYTc4QfUDj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 39} +{"Format": "Json", "ID": "b5358001-3059-4526-bb70-e357b93cc7b5", "DetectTime": "2024-05-21T12:28:07.680547+00:00", "EventTime": "2024-05-21T12:28:07.680571+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "1970-01-02T14:15:53.509618+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2024/05/21 12:28:07.817395)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 39, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8f648bc4-45ec-4467-8002-229c4d02024d", "DetectTime": "2024-05-21T12:28:07.828184+00:00", "EventTime": "2024-05-21T12:28:07.828201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhrAI35IkToz7RbNb"], "accumulated_threat_level": 0.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "6a2b3bcd-47dc-46d0-9dc4-c141d2db4633", "DetectTime": "2024-05-21T12:28:07.838264+00:00", "EventTime": "2024-05-21T12:28:07.838283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjuF91ZJvAsHpy0f"], "accumulated_threat_level": 1.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "18883962-4bf2-430c-92af-abcb3779bce8", "DetectTime": "2024-05-21T12:28:07.849752+00:00", "EventTime": "2024-05-21T12:28:07.849778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9oCu2GU6ERBw5cG1"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "ce132f8f-483f-474b-b5bb-6b4428ba5b97", "DetectTime": "2024-05-21T12:28:07.862780+00:00", "EventTime": "2024-05-21T12:28:07.862800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9oCu2GU6ERBw5cG1"], "accumulated_threat_level": 8.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "9a198285-c453-4da7-9a3a-d706be33edec", "DetectTime": "2024-05-21T12:28:07.875399+00:00", "EventTime": "2024-05-21T12:28:07.875417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmohRZT69xjhKSWFi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 39} +{"Format": "IDEA0", "ID": "00374f1e-0e1b-4884-8d13-1b580bb24fec", "DetectTime": "2024-05-21T12:28:07.886136+00:00", "EventTime": "2024-05-21T12:28:07.886155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROPYmF9Z1JS8XFi4"], "accumulated_threat_level": 3.2, "timewindow": 39} +{"Format": "IDEA0", "ID": "24c849d1-daed-4b7c-a770-749e76ee234d", "DetectTime": "2024-05-21T12:28:07.891238+00:00", "EventTime": "2024-05-21T12:28:07.891267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.205.53.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4DWu3YllmyNdKRYf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "89f99176-3449-4fac-a41c-a628db095854", "DetectTime": "2024-05-21T12:28:07.904212+00:00", "EventTime": "2024-05-21T12:28:07.904232+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8l7xRUzFKKgIBtj"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "9b582a58-3d79-4343-b0b3-43bead4408fb", "DetectTime": "2024-05-21T12:28:07.917468+00:00", "EventTime": "2024-05-21T12:28:07.917487+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8l7xRUzFKKgIBtj"], "accumulated_threat_level": 9.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "c8c08eb3-6692-427f-80f9-230f0d8dd3a8", "DetectTime": "2024-05-21T12:28:07.922722+00:00", "EventTime": "2024-05-21T12:28:07.922739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.15.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COPP8z4h5AqebT2ZEe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "3c86a934-4035-449c-aea5-2e28babb0d1b", "DetectTime": "2024-05-21T12:28:07.974232+00:00", "EventTime": "2024-05-21T12:28:07.974255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQk45i4tQSpGnQZmna"], "accumulated_threat_level": 4.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "94a095a0-15ef-4d52-9302-52885e53cde0", "DetectTime": "2024-05-21T12:28:07.985598+00:00", "EventTime": "2024-05-21T12:28:07.985617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnq9z4dkPfXw9zRfh"], "accumulated_threat_level": 4.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "73e5b361-11fd-47ee-9d11-d1751000805f", "DetectTime": "2024-05-21T12:28:07.996859+00:00", "EventTime": "2024-05-21T12:28:07.996878+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csrgv8lUiHOitr527"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "605d6897-1546-4e9b-8e77-93785e1a9ddd", "DetectTime": "2024-05-21T12:28:08.008765+00:00", "EventTime": "2024-05-21T12:28:08.008785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csrgv8lUiHOitr527"], "accumulated_threat_level": 9.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "92354578-5925-4e0e-b389-463bdf363df2", "DetectTime": "2024-05-21T12:28:08.021023+00:00", "EventTime": "2024-05-21T12:28:08.021045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3Q1y2dtNI1tUA3g8"], "accumulated_threat_level": 5.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "0b1c3482-d91b-4638-94e4-45239785b5d9", "DetectTime": "2024-05-21T12:28:08.032643+00:00", "EventTime": "2024-05-21T12:28:08.032661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYGea1OaEad7x1DR3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 39} +{"Format": "IDEA0", "ID": "da905249-272a-4379-8f70-577acf64c148", "DetectTime": "2024-05-21T12:28:08.043182+00:00", "EventTime": "2024-05-21T12:28:08.043200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xGIF4KWAI8SW5I1g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "b047610f-4cfe-4273-9632-107f4ed58568", "DetectTime": "2024-05-21T12:28:08.054171+00:00", "EventTime": "2024-05-21T12:28:08.054189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1x8m199cQqP1prvc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "27314e53-6386-4008-8433-c258f29929a3", "DetectTime": "2024-05-21T12:28:08.084071+00:00", "EventTime": "2024-05-21T12:28:08.084091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE9wnq1W5Q0Ztukk4b"], "accumulated_threat_level": 8.799999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "cb94cb90-a9ec-4ed8-8eeb-9fbe4c48ddbe", "DetectTime": "2024-05-21T12:28:08.113361+00:00", "EventTime": "2024-05-21T12:28:08.113384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOwfsNltzFdtG0Kl"], "accumulated_threat_level": 9.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "09914589-b3f1-4fe3-9eb8-e1ddc698eb6e", "DetectTime": "2024-05-21T12:28:08.160330+00:00", "EventTime": "2024-05-21T12:28:08.160352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Epc3Z5NQpovV7B3"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "cfb77c37-ba96-46df-bd46-63a2eaf9a1e1", "DetectTime": "2024-05-21T12:28:08.183747+00:00", "EventTime": "2024-05-21T12:28:08.183766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmdvr2UKLHDJVLeX1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 39} +{"Format": "IDEA0", "ID": "ddd27993-5963-4995-9a4d-3bad40e6cabc", "DetectTime": "2024-05-21T12:28:08.207130+00:00", "EventTime": "2024-05-21T12:28:08.207153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmOCg2fWNKlbi7pwa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "822123e7-b640-41e6-b1cf-76a6e265d52a", "DetectTime": "2024-05-21T12:28:08.286317+00:00", "EventTime": "2024-05-21T12:28:08.286335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvFuBt2kU1Nkl8tCu7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "653b855b-d24c-4336-8680-55d0005b0772", "DetectTime": "2024-05-21T12:28:08.550740+00:00", "EventTime": "2024-05-21T12:28:08.550758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmeQuG2aoxoDabO6Ob"], "accumulated_threat_level": 12.000000000000002, "timewindow": 39} +{"Format": "Json", "ID": "653b855b-d24c-4336-8680-55d0005b0772", "DetectTime": "2024-05-21T12:28:08.550740+00:00", "EventTime": "2024-05-21T12:28:08.550758+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-02T14:45:01.716404+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2024/05/21 12:28:08.894971)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 39, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1f489750-c7f2-4833-b2e0-d154a42c4c09", "DetectTime": "2024-05-21T12:28:08.899151+00:00", "EventTime": "2024-05-21T12:28:08.899171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4FIPh2f8Chro9SnDa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ed6f9922-d03d-48d9-9ebe-04b51990486c", "DetectTime": "2024-05-21T12:28:08.903775+00:00", "EventTime": "2024-05-21T12:28:08.903794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvzmSc15FOTU9MQEa4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "cbd7d6c6-de01-4991-bc19-99dfef43a557", "DetectTime": "2024-05-21T12:28:08.909157+00:00", "EventTime": "2024-05-21T12:28:08.909175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6POuR3279U2BDXlB8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "5507e91e-803b-489d-915b-e5e458c48375", "DetectTime": "2024-05-21T12:28:08.913595+00:00", "EventTime": "2024-05-21T12:28:08.913613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwET4i4mW8L5Ra5UK7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "0c3544f6-ed1a-4d33-ba6a-e87d216eab8f", "DetectTime": "2024-05-21T12:28:08.917888+00:00", "EventTime": "2024-05-21T12:28:08.917906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpONl18KqpQj3I78k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ec36f182-b21b-4883-828a-2ac47d8867cf", "DetectTime": "2024-05-21T12:28:08.922148+00:00", "EventTime": "2024-05-21T12:28:08.922166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRYgB4PNLdDuoyac8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ea3daf3e-6be8-4292-b6d7-4e77a982a86e", "DetectTime": "2024-05-21T12:28:08.926447+00:00", "EventTime": "2024-05-21T12:28:08.926464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZ8Vt30O5efqiYOqb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "b3ba7ef8-d390-4c79-b432-6f25125bcc13", "DetectTime": "2024-05-21T12:28:08.931011+00:00", "EventTime": "2024-05-21T12:28:08.931029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1W1C1o5R2NQ6GCvl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "a8f02e03-ce26-43ad-9a89-7072f5e38695", "DetectTime": "2024-05-21T12:28:08.937231+00:00", "EventTime": "2024-05-21T12:28:08.937252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2egA2itIRvxUlha3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "17f2a1ec-e492-4a2c-8454-03bef73ec345", "DetectTime": "2024-05-21T12:28:08.941836+00:00", "EventTime": "2024-05-21T12:28:08.941855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnwVz2p8JpZ4lMi4a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "34e1e56f-f730-4ddb-b461-dc8045c2a809", "DetectTime": "2024-05-21T12:28:08.946889+00:00", "EventTime": "2024-05-21T12:28:08.946909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxpepDhs2dZZEYiz9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "c1a7a646-05d1-4b4e-aae9-682c912789b6", "DetectTime": "2024-05-21T12:28:08.951532+00:00", "EventTime": "2024-05-21T12:28:08.951551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5WQJ32yIlDqw6nTGk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "ee724e55-c303-4280-a204-b8fae3520d87", "DetectTime": "2024-05-21T12:28:09.051840+00:00", "EventTime": "2024-05-21T12:28:09.051860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjtf8647L6y3jKiUwl"], "accumulated_threat_level": 0.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "654ae6c7-61dc-48d3-8e60-5d234d7bfc59", "DetectTime": "2024-05-21T12:28:09.070318+00:00", "EventTime": "2024-05-21T12:28:09.070338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIZkvLdzX0fHKim1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "0b512669-cddf-44ab-8f71-a1ebc2424c09", "DetectTime": "2024-05-21T12:28:09.094730+00:00", "EventTime": "2024-05-21T12:28:09.094748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mH4gyDVhfoSoNLl"], "accumulated_threat_level": 1.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "31e6f805-36e6-4e1f-b2b5-e03eebc29709", "DetectTime": "2024-05-21T12:28:09.147814+00:00", "EventTime": "2024-05-21T12:28:09.147836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhYuD36ZkGPjqRMM4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 39} +{"Format": "IDEA0", "ID": "8eb59b67-1ca9-4495-af8d-9efe0cfe1e99", "DetectTime": "2024-05-21T12:28:09.190498+00:00", "EventTime": "2024-05-21T12:28:09.190520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTITHZgZjKQO0uBAa"], "accumulated_threat_level": 3.2, "timewindow": 39} +{"Format": "IDEA0", "ID": "f69ee5a8-1398-49bc-b3ab-3cc5bea53c78", "DetectTime": "2024-05-21T12:28:09.220757+00:00", "EventTime": "2024-05-21T12:28:09.220776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5jRD3vyoW6Imkfzd"], "accumulated_threat_level": 4.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "96d38b98-9f17-46ed-a363-af3a2f800858", "DetectTime": "2024-05-21T12:28:09.262018+00:00", "EventTime": "2024-05-21T12:28:09.262039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyG3Fx1B132fDfahdj"], "accumulated_threat_level": 4.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "69948156-3082-4a11-8d17-5144fbc5cd37", "DetectTime": "2024-05-21T12:28:09.306100+00:00", "EventTime": "2024-05-21T12:28:09.306118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfT0MO2MHlKd5A3EAf"], "accumulated_threat_level": 5.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "8400e5bd-b8ef-4ced-bb51-ee6a2d377780", "DetectTime": "2024-05-21T12:28:09.339267+00:00", "EventTime": "2024-05-21T12:28:09.339296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvvs693BbUawkNvN49"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 39} +{"Format": "IDEA0", "ID": "02778563-f4d3-4195-b924-e89cc9596c88", "DetectTime": "2024-05-21T12:28:09.395763+00:00", "EventTime": "2024-05-21T12:28:09.395785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92yhn3X7kuecRfr6j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "da9aa3d5-3159-4f45-80a1-73ba7f437447", "DetectTime": "2024-05-21T12:28:09.431152+00:00", "EventTime": "2024-05-21T12:28:09.431173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 11005/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfooJ3VJBN14aAapb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "7d9afe77-daa3-4187-a6ec-13061cfd8598", "DetectTime": "2024-05-21T12:28:09.461706+00:00", "EventTime": "2024-05-21T12:28:09.461724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8c1ZB19VNbQURgg5h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "86b35f97-455a-48a3-b859-79db58b1d149", "DetectTime": "2024-05-21T12:28:09.735093+00:00", "EventTime": "2024-05-21T12:28:09.735114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OLJr22v03D28f9Sk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "f3fa140c-3ff1-465f-8c4f-a17dc3d2c771", "DetectTime": "2024-05-21T12:28:09.739917+00:00", "EventTime": "2024-05-21T12:28:09.739937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwHstMpw5s4a6PCi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "e5c5f7c4-a63c-4d23-8f62-9dadb25f442e", "DetectTime": "2024-05-21T12:28:09.744535+00:00", "EventTime": "2024-05-21T12:28:09.744553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPA3B3ALhjEe3KW3i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "549f8362-2661-4306-a4bb-a4ce11248946", "DetectTime": "2024-05-21T12:28:09.749424+00:00", "EventTime": "2024-05-21T12:28:09.749446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqtkV2rr3wWXgsLE6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "9a0414ee-c4a8-4275-9c3f-048327332781", "DetectTime": "2024-05-21T12:28:09.812521+00:00", "EventTime": "2024-05-21T12:28:09.812543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfvPJ3DFTQ67bcFxf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "663e5f7e-9417-4984-a6f0-dafb00128996", "DetectTime": "2024-05-21T12:28:09.817667+00:00", "EventTime": "2024-05-21T12:28:09.817685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0YJb6C9waK6kRxj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "d60bea19-b2c8-4f95-a207-f1d0c5dcfe3f", "DetectTime": "2024-05-21T12:28:09.829520+00:00", "EventTime": "2024-05-21T12:28:09.829541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFkOB1QBtb4jK54Bg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "0320cbd3-c404-4ff5-ad81-f09fa62bf63d", "DetectTime": "2024-05-21T12:28:09.878188+00:00", "EventTime": "2024-05-21T12:28:09.878207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcToRC2ByEjynFWOBb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "050dcd8a-c890-415c-a6ef-d365cc50e568", "DetectTime": "2024-05-21T12:28:09.882957+00:00", "EventTime": "2024-05-21T12:28:09.882977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9R7Ta2hXfXRzaobo4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "dd8b4a8e-665d-4c03-83f0-b804a18ac89d", "DetectTime": "2024-05-21T12:28:09.919976+00:00", "EventTime": "2024-05-21T12:28:09.919996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUeaAQ31hZLLxxYK1k"], "accumulated_threat_level": 9.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "dce65212-eb58-4f86-a16f-aee2d1f599a7", "DetectTime": "2024-05-21T12:28:09.950188+00:00", "EventTime": "2024-05-21T12:28:09.950207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAozo2UEHy9E2u9c"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "230c53d6-63b3-4005-874f-d31e36694ed3", "DetectTime": "2024-05-21T12:28:09.980570+00:00", "EventTime": "2024-05-21T12:28:09.980587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDPew73yLJIBoOhUAi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 39} +{"Format": "IDEA0", "ID": "96626c3f-6359-4ab9-b518-9dc19e67e349", "DetectTime": "2024-05-21T12:28:10.010899+00:00", "EventTime": "2024-05-21T12:28:10.010920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTiN6G1Q9HTT0hFvSj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 39} +{"Format": "Json", "ID": "96626c3f-6359-4ab9-b518-9dc19e67e349", "DetectTime": "2024-05-21T12:28:10.010899+00:00", "EventTime": "2024-05-21T12:28:10.010920+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "1970-01-02T14:46:56.281426+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2024/05/21 12:28:10.201493)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 39, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bfe2522c-3c03-4849-a591-669d1d801e17", "DetectTime": "2024-05-21T12:28:10.212434+00:00", "EventTime": "2024-05-21T12:28:10.212454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5cGR2hN2QGmA8VAd"], "accumulated_threat_level": 0.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "a69206a0-0c38-4729-9065-cd67263c9ed5", "DetectTime": "2024-05-21T12:28:10.223532+00:00", "EventTime": "2024-05-21T12:28:10.223554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccw3nC4UPSQtDBoFr2"], "accumulated_threat_level": 1.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "aee92f87-52f3-4a0f-9e66-4c64cb3de6e6", "DetectTime": "2024-05-21T12:28:10.228942+00:00", "EventTime": "2024-05-21T12:28:10.228963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJa8EL11zcoE3oC0U5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "66c93ac7-8c4b-4023-ad71-6126ea23721b", "DetectTime": "2024-05-21T12:28:10.242590+00:00", "EventTime": "2024-05-21T12:28:10.242613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMZWe2Rniif33poCe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 39} +{"Format": "IDEA0", "ID": "92ff6d95-a6dc-4548-bc03-83abeb548787", "DetectTime": "2024-05-21T12:28:10.252925+00:00", "EventTime": "2024-05-21T12:28:10.252943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbA8G1G0Pg5zOeyNd"], "accumulated_threat_level": 3.2, "timewindow": 39} +{"Format": "IDEA0", "ID": "383435f5-2408-4e0a-8e56-b468c4ee5d6e", "DetectTime": "2024-05-21T12:28:10.265769+00:00", "EventTime": "2024-05-21T12:28:10.265788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwD41p1chGbMPdkfE4"], "accumulated_threat_level": 4.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "d03fe755-d2a5-4b0d-86c3-28413a40ffe7", "DetectTime": "2024-05-21T12:28:10.278184+00:00", "EventTime": "2024-05-21T12:28:10.278203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmPQn2sHOg5s1xSfi"], "accumulated_threat_level": 4.8, "timewindow": 39} +{"Format": "IDEA0", "ID": "4f7b0275-cbda-474d-9023-1662e997f9d5", "DetectTime": "2024-05-21T12:28:10.289308+00:00", "EventTime": "2024-05-21T12:28:10.289328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYRf61rehWiG35LVe"], "accumulated_threat_level": 5.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "4825bd92-4305-4722-9adc-e00f6bba6102", "DetectTime": "2024-05-21T12:28:10.294181+00:00", "EventTime": "2024-05-21T12:28:10.294201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COoHUm4eXn5MBW299l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "3c63cbf5-76b1-4d3f-8d55-4e466b58411a", "DetectTime": "2024-05-21T12:28:10.319215+00:00", "EventTime": "2024-05-21T12:28:10.319234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUtxS2xozjK41MuWc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 39} +{"Format": "IDEA0", "ID": "feb3d4c3-8e68-46b2-9f75-9bb01cdb82c0", "DetectTime": "2024-05-21T12:28:10.348379+00:00", "EventTime": "2024-05-21T12:28:10.348398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEagY3imjeCXWyNAh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "d807f9d1-dac2-4252-ab21-bee2092cb275", "DetectTime": "2024-05-21T12:28:10.368037+00:00", "EventTime": "2024-05-21T12:28:10.368059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSjZwsVjx0OQBI5f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "edacb2cc-a21a-46e4-9503-0f9471c13270", "DetectTime": "2024-05-21T12:28:10.655694+00:00", "EventTime": "2024-05-21T12:28:10.655714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWPqxG2AJLoyj9zivl", "CuN1gf2MMP24lPkKN4", "CWbxW9tKOnihHiuYl", "CDuBn2K4eaupWBW3l"], "accumulated_threat_level": 0.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "df2b2618-3693-483b-9df7-5ee7989ae429", "DetectTime": "2024-05-21T12:28:10.673226+00:00", "EventTime": "2024-05-21T12:28:10.673246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32GPX1Z2Xpue8H6x8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "25e670c2-4dfd-4817-9da9-f4a5bc5092a9", "DetectTime": "2024-05-21T12:28:10.693811+00:00", "EventTime": "2024-05-21T12:28:10.693834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSqyM2rUINOYpe4hf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "d8fc53e6-cc0a-4640-9107-a9935544a8d3", "DetectTime": "2024-05-21T12:28:10.700804+00:00", "EventTime": "2024-05-21T12:28:10.700826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZlhMiD1UJZwcmCj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "c8a12af2-99b8-4a7f-aab6-5928e84031b3", "DetectTime": "2024-05-21T12:28:10.705836+00:00", "EventTime": "2024-05-21T12:28:10.705854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2CBn1wPQZoTkggS1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "c128af45-bc13-4776-a77e-097ee5fe75ae", "DetectTime": "2024-05-21T12:28:10.710402+00:00", "EventTime": "2024-05-21T12:28:10.710451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEh6rX3fMBha8NTmF"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "2d517da1-a5ed-4c06-8577-90c2cfef16a8", "DetectTime": "2024-05-21T12:28:10.719774+00:00", "EventTime": "2024-05-21T12:28:10.719794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBE5bePk6VXicgqi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "cc1e7fa4-8e21-4696-9d96-4b4a8188a914", "DetectTime": "2024-05-21T12:28:10.764854+00:00", "EventTime": "2024-05-21T12:28:10.764875+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAS9km3JrZqNfyNkzj"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "a3b20f12-7fac-4801-9526-ec11389264d9", "DetectTime": "2024-05-21T12:28:10.780327+00:00", "EventTime": "2024-05-21T12:28:10.780350+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAS9km3JrZqNfyNkzj"], "accumulated_threat_level": 10.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "d30e6fa2-0910-49dc-9797-9b354f88d6c9", "DetectTime": "2024-05-21T12:28:10.785529+00:00", "EventTime": "2024-05-21T12:28:10.785547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImHTA4QYBDV45dSN3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "c863f3dd-b465-44d9-b78f-eb1e52d0acb2", "DetectTime": "2024-05-21T12:28:10.789948+00:00", "EventTime": "2024-05-21T12:28:10.789966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs1yI3V58uL1hxwS8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "dad3b5ee-ff36-4cce-87e7-b567e67b640c", "DetectTime": "2024-05-21T12:28:10.801818+00:00", "EventTime": "2024-05-21T12:28:10.801835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgjZ32ZDGPe8Zg2m3"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "1662bc6a-124f-495c-a892-9de77f4ad423", "DetectTime": "2024-05-21T12:28:10.814275+00:00", "EventTime": "2024-05-21T12:28:10.814294+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgjZ32ZDGPe8Zg2m3"], "accumulated_threat_level": 10.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "3d3af57a-f8a0-481b-91f2-bfbc7fcc2607", "DetectTime": "2024-05-21T12:28:10.827290+00:00", "EventTime": "2024-05-21T12:28:10.827308+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnjTn4zkvoI2A5Rx9"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "a0e8b7f6-ebf7-46b5-869c-622400d6deda", "DetectTime": "2024-05-21T12:28:10.840392+00:00", "EventTime": "2024-05-21T12:28:10.840410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnjTn4zkvoI2A5Rx9"], "accumulated_threat_level": 11.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "8e0616f1-ad6c-4778-ba16-333e74e9a798", "DetectTime": "2024-05-21T12:28:10.845769+00:00", "EventTime": "2024-05-21T12:28:10.845789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgWBItvDUZGMGA7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "1f2b5b59-bd78-4711-ba4e-9ca1b53c78dd", "DetectTime": "2024-05-21T12:28:10.866255+00:00", "EventTime": "2024-05-21T12:28:10.866275+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPx1sdcTjAbgIuRe"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "044c4020-3068-4335-9d44-98264a6063cf", "DetectTime": "2024-05-21T12:28:10.878582+00:00", "EventTime": "2024-05-21T12:28:10.878600+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPx1sdcTjAbgIuRe"], "accumulated_threat_level": 11.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "36abbc23-5493-4b92-8a94-f37bc1fd30fa", "DetectTime": "2024-05-21T12:28:10.915824+00:00", "EventTime": "2024-05-21T12:28:10.915843+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ggxK9PjaV3Kodcc"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "f78456d0-b27a-4921-8e58-f0ab3e965e0e", "DetectTime": "2024-05-21T12:28:10.927007+00:00", "EventTime": "2024-05-21T12:28:10.927026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ggxK9PjaV3Kodcc"], "accumulated_threat_level": 12.0, "timewindow": 15} +{"Format": "Json", "ID": "f78456d0-b27a-4921-8e58-f0ab3e965e0e", "DetectTime": "2024-05-21T12:28:10.927007+00:00", "EventTime": "2024-05-21T12:28:10.927026+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "1970-01-01T14:45:41.922304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 15. (real time 2024/05/21 12:28:11.314745)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 15, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "ae72dc3b-5edb-4e5f-b381-bece4d3936cb", "DetectTime": "2024-05-21T12:28:11.327252+00:00", "EventTime": "2024-05-21T12:28:11.327271+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSAZz727ImNO0Bfupj"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "677745c5-ceb9-48d4-b789-e3b2d6d7f0b6", "DetectTime": "2024-05-21T12:28:11.341577+00:00", "EventTime": "2024-05-21T12:28:11.341596+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSAZz727ImNO0Bfupj"], "accumulated_threat_level": 0.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "8ea1890d-d7e5-407f-a366-10d7ebcae0f3", "DetectTime": "2024-05-21T12:28:11.346633+00:00", "EventTime": "2024-05-21T12:28:11.346650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.135.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm3auEVzQvVH7Mmb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "d575c97a-35e2-44de-8410-61abb3e08757", "DetectTime": "2024-05-21T12:28:11.351421+00:00", "EventTime": "2024-05-21T12:28:11.351439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VEuL2hCLAKdgUCFc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "ddcc4838-8a9d-4cae-b3f6-bf27a86feb0c", "DetectTime": "2024-05-21T12:28:11.362424+00:00", "EventTime": "2024-05-21T12:28:11.362445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQM142SaJNYkt48ci"], "accumulated_threat_level": 8.799999999999999, "timewindow": 39} +{"Format": "IDEA0", "ID": "c24f6bfc-abad-40e3-9664-25739b013e12", "DetectTime": "2024-05-21T12:28:11.367409+00:00", "EventTime": "2024-05-21T12:28:11.367427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7MZz2yk387Czin99"], "accumulated_threat_level": 7.199999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "cb300a01-6fec-4c33-805e-855e50590495", "DetectTime": "2024-05-21T12:28:11.379533+00:00", "EventTime": "2024-05-21T12:28:11.379553+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTQHT3yG6MuFUMGYb"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "9f2a1919-60a4-4d91-b446-76b6885747f7", "DetectTime": "2024-05-21T12:28:11.391497+00:00", "EventTime": "2024-05-21T12:28:11.391521+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTQHT3yG6MuFUMGYb"], "accumulated_threat_level": 1.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "8cbb77c7-4418-4e8a-9d8d-2fb3efba6d71", "DetectTime": "2024-05-21T12:28:11.402810+00:00", "EventTime": "2024-05-21T12:28:11.402830+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUqMD11MK542fbzfd"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "ea6f0b84-08db-4f7a-bf76-a336a6be75dd", "DetectTime": "2024-05-21T12:28:11.421997+00:00", "EventTime": "2024-05-21T12:28:11.422017+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUqMD11MK542fbzfd"], "accumulated_threat_level": 1.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "a6406d28-7556-49e1-bbb4-40c61732009e", "DetectTime": "2024-05-21T12:28:11.427243+00:00", "EventTime": "2024-05-21T12:28:11.427260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDxtA1yt06iYcU6P4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "0d333b92-20cd-48e2-b4b7-06515cd2a63b", "DetectTime": "2024-05-21T12:28:11.439751+00:00", "EventTime": "2024-05-21T12:28:11.439773+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUJoD2mfnG4DKVJB2"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "9702c57a-81cf-4f79-b525-e9b051faa55e", "DetectTime": "2024-05-21T12:28:11.451018+00:00", "EventTime": "2024-05-21T12:28:11.451038+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUJoD2mfnG4DKVJB2"], "accumulated_threat_level": 2.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "f561c146-1a60-4e0c-a454-5a3a339f3868", "DetectTime": "2024-05-21T12:28:11.462561+00:00", "EventTime": "2024-05-21T12:28:11.462578+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDG3cCuQFjyHdyFac"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "68fdb47d-08c9-422b-a25b-c3316581f1d7", "DetectTime": "2024-05-21T12:28:11.475366+00:00", "EventTime": "2024-05-21T12:28:11.475385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDG3cCuQFjyHdyFac"], "accumulated_threat_level": 2.5, "timewindow": 15} +{"Format": "IDEA0", "ID": "470c5b2e-33f5-43dd-8d7a-514d8757e751", "DetectTime": "2024-05-21T12:28:11.480502+00:00", "EventTime": "2024-05-21T12:28:11.480519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkTQ1E4kU0oKb2Gt11"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "0a7903c3-f7c0-45d2-9ba0-0c7773692ed8", "DetectTime": "2024-05-21T12:28:11.491096+00:00", "EventTime": "2024-05-21T12:28:11.491113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGody42Y9iLoSvWNa8"], "accumulated_threat_level": 0, "timewindow": 15} +{"Format": "IDEA0", "ID": "d501bd05-649e-4a80-b4f9-ca7ee7340010", "DetectTime": "2024-05-21T12:28:11.503927+00:00", "EventTime": "2024-05-21T12:28:11.503945+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGody42Y9iLoSvWNa8"], "accumulated_threat_level": 3.0, "timewindow": 15} +{"Format": "IDEA0", "ID": "adb46ce9-3a8c-45f4-97bc-622b1ae88f33", "DetectTime": "2024-05-21T12:28:11.517057+00:00", "EventTime": "2024-05-21T12:28:11.517081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JQrQ1iZTcumde8I"], "accumulated_threat_level": 9.6, "timewindow": 39} +{"Format": "IDEA0", "ID": "ab7ba285-084f-48ff-83a4-7ba2796e07b0", "DetectTime": "2024-05-21T12:28:11.528645+00:00", "EventTime": "2024-05-21T12:28:11.528663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAm9j4zQuuXyMaATf"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "a218e0e2-b100-4f22-be51-60501a16a270", "DetectTime": "2024-05-21T12:28:11.535948+00:00", "EventTime": "2024-05-21T12:28:11.535967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX9WfU2ZRRB0cUlXh1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "dfeeee5b-e399-4d76-9fa8-50d48639e8da", "DetectTime": "2024-05-21T12:28:11.552110+00:00", "EventTime": "2024-05-21T12:28:11.552126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpILs4RPjNekCW68k"], "accumulated_threat_level": 1.3, "timewindow": 40} +{"Format": "IDEA0", "ID": "c1bcc401-7332-4d75-b947-03dbeec83757", "DetectTime": "2024-05-21T12:28:11.562826+00:00", "EventTime": "2024-05-21T12:28:11.562844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoaicF7nseDK1IPXd"], "accumulated_threat_level": 2.1, "timewindow": 40} +{"Format": "IDEA0", "ID": "5fcca732-2a46-4ebd-88ea-910c31cdb35e", "DetectTime": "2024-05-21T12:28:11.574828+00:00", "EventTime": "2024-05-21T12:28:11.574848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2Z8sT9bZoOLMIK8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 40} +{"Format": "IDEA0", "ID": "8e226393-1092-4dd7-bff9-e73034d61823", "DetectTime": "2024-05-21T12:28:11.580048+00:00", "EventTime": "2024-05-21T12:28:11.580163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXe812nQJYIMYZ4S"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "c27d5935-aa23-470b-a4ea-cabf5879159f", "DetectTime": "2024-05-21T12:28:11.591148+00:00", "EventTime": "2024-05-21T12:28:11.591166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cryw0d3kRNL4Fgglb6"], "accumulated_threat_level": 3.7, "timewindow": 40} +{"Format": "IDEA0", "ID": "42a3f91e-c0d5-4a6c-997a-54bdaeee4a87", "DetectTime": "2024-05-21T12:28:11.602314+00:00", "EventTime": "2024-05-21T12:28:11.602333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8yXd1Xyjgo7V1vJ6"], "accumulated_threat_level": 4.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "5eaebaaa-8acf-4760-aeb5-a58c61d06089", "DetectTime": "2024-05-21T12:28:11.613646+00:00", "EventTime": "2024-05-21T12:28:11.613668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR40tv1nApHNxfc9Md"], "accumulated_threat_level": 5.3, "timewindow": 40} +{"Format": "IDEA0", "ID": "f2fb273d-d2d3-4d67-a958-391a522d728b", "DetectTime": "2024-05-21T12:28:11.625941+00:00", "EventTime": "2024-05-21T12:28:11.625961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YwlB25S8XpyBDuoi"], "accumulated_threat_level": 6.1, "timewindow": 40} +{"Format": "IDEA0", "ID": "15a5d15a-81af-4fa6-bc25-da6f26c1bfb1", "DetectTime": "2024-05-21T12:28:11.638287+00:00", "EventTime": "2024-05-21T12:28:11.638309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UR2J2BqxcRI1SN3j"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 40} +{"Format": "IDEA0", "ID": "d4324911-b556-4a89-9851-0aaaeb27434c", "DetectTime": "2024-05-21T12:28:11.648813+00:00", "EventTime": "2024-05-21T12:28:11.648831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtgcQg1gBRSPZK7cY5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "ad85da00-f336-4e0d-a382-808f2bd74992", "DetectTime": "2024-05-21T12:28:11.653301+00:00", "EventTime": "2024-05-21T12:28:11.653318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfOPu424Pd1shC3B1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "07829b90-19b7-40e3-ad97-36714d9a1525", "DetectTime": "2024-05-21T12:28:11.664623+00:00", "EventTime": "2024-05-21T12:28:11.664643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.159.92"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.159.92. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2F3Y2YdWgBxxGNv9"], "accumulated_threat_level": 8.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "ea849c42-99be-4d9a-bfab-fcbbe5b287df", "DetectTime": "2024-05-21T12:28:11.676014+00:00", "EventTime": "2024-05-21T12:28:11.676034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjIzM1jqvnmNymfVk"], "accumulated_threat_level": 9.3, "timewindow": 40} +{"Format": "IDEA0", "ID": "8eb84c27-2a9d-438d-90e1-21f705f41a9e", "DetectTime": "2024-05-21T12:28:11.680951+00:00", "EventTime": "2024-05-21T12:28:11.680970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNGh2I3MMNgsGcnrF9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "73ceab43-9f97-45d6-ac53-87bcb215e468", "DetectTime": "2024-05-21T12:28:11.691349+00:00", "EventTime": "2024-05-21T12:28:11.691367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezJMHb5yGYUKx9Bj"], "accumulated_threat_level": 10.100000000000001, "timewindow": 40} +{"Format": "IDEA0", "ID": "cad3445a-069e-45ab-8de6-6a2da867ac48", "DetectTime": "2024-05-21T12:28:11.696505+00:00", "EventTime": "2024-05-21T12:28:11.696524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDH2hS32bACsvDqoOh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "9228e660-fc72-44dd-a996-6c04ee87807a", "DetectTime": "2024-05-21T12:28:11.934726+00:00", "EventTime": "2024-05-21T12:28:11.934746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHgzQrAvcm0X8ih5"], "accumulated_threat_level": 10.900000000000002, "timewindow": 40} +{"Format": "IDEA0", "ID": "6fe62d7a-3b61-44f0-a1f3-eb9442cc80b0", "DetectTime": "2024-05-21T12:28:11.988435+00:00", "EventTime": "2024-05-21T12:28:11.988456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauZBx3r8bLNS0fsq"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "6d60826f-6629-4428-a0ee-e5136cf71034", "DetectTime": "2024-05-21T12:28:11.994970+00:00", "EventTime": "2024-05-21T12:28:11.994988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5ARY6byFeX1iMT4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "2b10b22a-3434-49dd-bcf6-d6b6ee6b29de", "DetectTime": "2024-05-21T12:28:12.000397+00:00", "EventTime": "2024-05-21T12:28:12.000418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIebmv1Y3N4YK3rEwi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "ec4e06d2-fac4-4d06-9e6a-014697e9c14d", "DetectTime": "2024-05-21T12:28:12.005503+00:00", "EventTime": "2024-05-21T12:28:12.005522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDWXH3VkXSi87SCZ6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "08c78593-d0d8-43e5-9acc-09197b67adac", "DetectTime": "2024-05-21T12:28:12.010764+00:00", "EventTime": "2024-05-21T12:28:12.010783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVfE3VZNT2RxEgu9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "c92f6b88-d037-4a6f-be82-f517ddd17117", "DetectTime": "2024-05-21T12:28:12.015414+00:00", "EventTime": "2024-05-21T12:28:12.015432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtIio4StHAsLSW24c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "5f409a35-e33d-469c-9c2a-3a90e315c913", "DetectTime": "2024-05-21T12:28:12.020496+00:00", "EventTime": "2024-05-21T12:28:12.020514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILg4E3AzxXJgqaYlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "44596fd2-cdd3-4a14-9fd5-c20623497e87", "DetectTime": "2024-05-21T12:28:12.131574+00:00", "EventTime": "2024-05-21T12:28:12.131595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKLiE83zARXVG9G4a7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "1b662488-2544-4931-9c45-95a077de6e9e", "DetectTime": "2024-05-21T12:28:12.167966+00:00", "EventTime": "2024-05-21T12:28:12.167988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3858C33DpioC8JzH8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 40} +{"Format": "IDEA0", "ID": "dd881fcd-d5d2-4662-9962-a59e1a67aeee", "DetectTime": "2024-05-21T12:28:12.178150+00:00", "EventTime": "2024-05-21T12:28:12.178171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COdapF2KI3A2DmWCd1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "16a4b994-3c90-49c3-95e7-1ed8a6f81770", "DetectTime": "2024-05-21T12:28:12.190840+00:00", "EventTime": "2024-05-21T12:28:12.190860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYw3CVhlLm2JesFi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "9dd5bd2b-5547-4554-a559-1a3dab03758c", "DetectTime": "2024-05-21T12:28:12.222846+00:00", "EventTime": "2024-05-21T12:28:12.222867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0XqW1FohrAMtg9Pe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "f022fa62-c539-4d8f-904e-9db1d12f1adf", "DetectTime": "2024-05-21T12:28:12.243765+00:00", "EventTime": "2024-05-21T12:28:12.243786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb2Rd1ihmo4zDIx1h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "58f71dea-b071-4052-81a8-2ec6e03fc2cf", "DetectTime": "2024-05-21T12:28:12.277493+00:00", "EventTime": "2024-05-21T12:28:12.277512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZxWpGlwfgljx0d2"], "accumulated_threat_level": 12.500000000000004, "timewindow": 40} +{"Format": "Json", "ID": "58f71dea-b071-4052-81a8-2ec6e03fc2cf", "DetectTime": "2024-05-21T12:28:12.277493+00:00", "EventTime": "2024-05-21T12:28:12.277512+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "1970-01-02T15:17:38.197368+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2024/05/21 12:28:12.476194)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 40, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "03b7c9f3-6a6f-443e-b6dc-53d87e7cfa10", "DetectTime": "2024-05-21T12:28:12.503602+00:00", "EventTime": "2024-05-21T12:28:12.503622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wQAr3ng6v15wjIC5"], "accumulated_threat_level": 0.8, "timewindow": 40} +{"Format": "IDEA0", "ID": "bb7944f0-8a68-45ad-a4bb-535137bdd91c", "DetectTime": "2024-05-21T12:28:12.515952+00:00", "EventTime": "2024-05-21T12:28:12.515971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQDdH6kZ4sVscse1"], "accumulated_threat_level": 1.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "ef9a2dbf-aeb8-4ae8-a759-1bcd8f612ec1", "DetectTime": "2024-05-21T12:28:12.520859+00:00", "EventTime": "2024-05-21T12:28:12.520877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDp2l1Ihg4nMNWnY1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "85bcd8d8-375d-497c-ad4d-1512331ecb18", "DetectTime": "2024-05-21T12:28:12.531926+00:00", "EventTime": "2024-05-21T12:28:12.531948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEVkz2tILGk73Jtq8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 40} +{"Format": "IDEA0", "ID": "57f090b3-18ba-4bdd-aa86-8e8742bb5f71", "DetectTime": "2024-05-21T12:28:12.537416+00:00", "EventTime": "2024-05-21T12:28:12.537438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP0uNq4IuTDdrrZgx6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "76bfa3ba-9654-4886-b8cc-845c52e31a0d", "DetectTime": "2024-05-21T12:28:12.542872+00:00", "EventTime": "2024-05-21T12:28:12.542891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaB6ZR3F1cmBQkgCx7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "fe6f8bf7-c141-4ad9-9783-94d16d2dea80", "DetectTime": "2024-05-21T12:28:12.553428+00:00", "EventTime": "2024-05-21T12:28:12.553446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChGYJN1l7q1oTZSnKf"], "accumulated_threat_level": 3.2, "timewindow": 40} +{"Format": "IDEA0", "ID": "6fcc3a38-79f5-4cdc-9329-00147cdb8b7f", "DetectTime": "2024-05-21T12:28:12.558935+00:00", "EventTime": "2024-05-21T12:28:12.558958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CThX1I3F19dsey8J23"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "363765f3-3c1f-48d0-a501-6394648cd471", "DetectTime": "2024-05-21T12:28:12.563836+00:00", "EventTime": "2024-05-21T12:28:12.563855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2lVeQ2vRmGsGPy"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "fb2bf409-4354-4186-8e05-9c3a5fdf6eb1", "DetectTime": "2024-05-21T12:28:12.568631+00:00", "EventTime": "2024-05-21T12:28:12.568650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRondd1laMwa5oji"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "eef891d0-c39c-48e0-816a-52c7ba566bba", "DetectTime": "2024-05-21T12:28:12.598924+00:00", "EventTime": "2024-05-21T12:28:12.598948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTxuF2X0E97noPl3d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "4c11c462-dbfb-4c7e-91e3-82a7956fd79c", "DetectTime": "2024-05-21T12:28:12.626766+00:00", "EventTime": "2024-05-21T12:28:12.626785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9MJmyZq6qi6LxNb"], "accumulated_threat_level": 4.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "1f2bf3b8-f4c2-43f5-b314-7234cc4497bc", "DetectTime": "2024-05-21T12:28:12.639828+00:00", "EventTime": "2024-05-21T12:28:12.639849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB48xg11sGnCbabreh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "bba4a84e-2c46-46a9-b98a-42cd4d2973d9", "DetectTime": "2024-05-21T12:28:12.670124+00:00", "EventTime": "2024-05-21T12:28:12.670143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsmWum3utbtDqnRd0d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "93dac4e1-8831-4bfb-9ef0-35eca32310ea", "DetectTime": "2024-05-21T12:28:12.696478+00:00", "EventTime": "2024-05-21T12:28:12.696502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKWzUa1Vxnxfeos593"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a1a086a8-5fa0-4a1e-8662-cb59c42148a1", "DetectTime": "2024-05-21T12:28:12.727031+00:00", "EventTime": "2024-05-21T12:28:12.727052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgVyz22ExchSyemwh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "06ee9d0a-7d59-4e75-915a-3892cfa395a7", "DetectTime": "2024-05-21T12:28:12.740585+00:00", "EventTime": "2024-05-21T12:28:12.740608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtehkY2i8ziNbkFBug"], "accumulated_threat_level": 4.8, "timewindow": 40} +{"Format": "IDEA0", "ID": "43533440-b721-4ac1-a102-577c3d410506", "DetectTime": "2024-05-21T12:28:13.016955+00:00", "EventTime": "2024-05-21T12:28:13.016975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gtzM1hFb2VlQ24bj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "ad666497-5b37-4aef-9f16-3f7cf80e03d9", "DetectTime": "2024-05-21T12:28:13.076872+00:00", "EventTime": "2024-05-21T12:28:13.076894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPICrb3U44hfKzmia2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "62266eee-cb49-42b3-bff7-783432683a34", "DetectTime": "2024-05-21T12:28:13.082383+00:00", "EventTime": "2024-05-21T12:28:13.082403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FCaW2QN3G4197gRe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "72b5f6ca-fe19-418d-a2d1-9a0c8a99bacd", "DetectTime": "2024-05-21T12:28:13.103337+00:00", "EventTime": "2024-05-21T12:28:13.103360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnmy73SLFku0ImDC5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a0027dd1-e34e-473a-86ed-da6a5e095de2", "DetectTime": "2024-05-21T12:28:13.143151+00:00", "EventTime": "2024-05-21T12:28:13.143174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKD0iw4apQ6B3itWU8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "28d954a7-2020-4828-a4b1-e73b0cb164be", "DetectTime": "2024-05-21T12:28:13.157306+00:00", "EventTime": "2024-05-21T12:28:13.157327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeaW382j7fwiOyuzJ5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "050f6239-e5ab-4d7b-bbbf-327312fa7767", "DetectTime": "2024-05-21T12:28:13.170750+00:00", "EventTime": "2024-05-21T12:28:13.170772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBg65290s9ng2xrm8"], "accumulated_threat_level": 5.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "588815a1-0de6-4489-9bff-74158577ffe6", "DetectTime": "2024-05-21T12:28:13.185470+00:00", "EventTime": "2024-05-21T12:28:13.185490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtUt7p3T1WsPQ1pSm5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "616500eb-8bad-420a-a609-5975c4980b3a", "DetectTime": "2024-05-21T12:28:13.273889+00:00", "EventTime": "2024-05-21T12:28:13.273910+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce6JpD4g3OECuY5I9i"], "accumulated_threat_level": 5.624, "timewindow": 40} +{"Format": "IDEA0", "ID": "dbdcf79d-950b-4d90-9f66-c4831f810a05", "DetectTime": "2024-05-21T12:28:13.285767+00:00", "EventTime": "2024-05-21T12:28:13.285786+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce6JpD4g3OECuY5I9i"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "a4f42d06-4c60-48ce-b204-e1e30f674d93", "DetectTime": "2024-05-21T12:28:13.299064+00:00", "EventTime": "2024-05-21T12:28:13.299086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3wVP2gAb3kruDZua"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "9eda0d55-f43e-497a-a888-502502331853", "DetectTime": "2024-05-21T12:28:13.304615+00:00", "EventTime": "2024-05-21T12:28:13.304635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDMFg4KPeWU18vGN6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "b837c8c7-6f1f-451a-926e-317cefe1426a", "DetectTime": "2024-05-21T12:28:13.309623+00:00", "EventTime": "2024-05-21T12:28:13.309642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPKNb2HhxvJ63oO5f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "e0e68d03-b8b3-435b-b0ee-f9168188e293", "DetectTime": "2024-05-21T12:28:13.362192+00:00", "EventTime": "2024-05-21T12:28:13.362214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHneM1WYwxiNyrXfc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "124555f1-fb23-4233-9bde-b8eb389000b6", "DetectTime": "2024-05-21T12:28:13.367087+00:00", "EventTime": "2024-05-21T12:28:13.367106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIl8gx3mp8KBo1Nn0j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "fc2dd699-9aca-463a-bf1f-0eb2b6ee2dd8", "DetectTime": "2024-05-21T12:28:13.399423+00:00", "EventTime": "2024-05-21T12:28:13.399445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyygohHMSt55uz0j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "e13602d7-23c8-4529-b9cd-acfafaf7f292", "DetectTime": "2024-05-21T12:28:13.410485+00:00", "EventTime": "2024-05-21T12:28:13.410504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDVAUJ26KSp0PTDeEb"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 40} +{"Format": "IDEA0", "ID": "918027d5-cbb9-4706-871f-5ece7e04ed8d", "DetectTime": "2024-05-21T12:28:13.454011+00:00", "EventTime": "2024-05-21T12:28:13.454031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPiUF2hdtaGVbSZU"], "accumulated_threat_level": 7.223999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "ef0314d3-428c-4910-b0c4-7e5200247882", "DetectTime": "2024-05-21T12:28:13.481649+00:00", "EventTime": "2024-05-21T12:28:13.481668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzQI93zEmXFJd26Y"], "accumulated_threat_level": 8.024, "timewindow": 40} +{"Format": "IDEA0", "ID": "728fcd49-c803-43c4-907b-cb48a463b20b", "DetectTime": "2024-05-21T12:28:13.500104+00:00", "EventTime": "2024-05-21T12:28:13.500123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhFfCeVYpRfMXg1b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "f0e1a2b2-2dad-4cdc-97df-2ee2d4906253", "DetectTime": "2024-05-21T12:28:13.527733+00:00", "EventTime": "2024-05-21T12:28:13.527752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhs5F497Qpbxc4dr2"], "accumulated_threat_level": 8.824, "timewindow": 40} +{"Format": "IDEA0", "ID": "8c26aec9-cc54-4b62-8382-ac5811514c92", "DetectTime": "2024-05-21T12:28:13.566669+00:00", "EventTime": "2024-05-21T12:28:13.566687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeCno0478iYg8t3SZa"], "accumulated_threat_level": 9.624, "timewindow": 40} +{"Format": "IDEA0", "ID": "64fadb58-2704-45cb-b8c8-eae8725a0d14", "DetectTime": "2024-05-21T12:28:13.800114+00:00", "EventTime": "2024-05-21T12:28:13.800140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsdflk7djAxYajwi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "d8eb2e12-2918-44ff-a9a9-0913a1b99561", "DetectTime": "2024-05-21T12:28:13.817962+00:00", "EventTime": "2024-05-21T12:28:13.817984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cvV83luQMGId8QA5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "645e45f1-44b9-40a3-a56b-7e9b82ed359b", "DetectTime": "2024-05-21T12:28:13.822862+00:00", "EventTime": "2024-05-21T12:28:13.822883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjDC21vPL37iFY6Vl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "84432697-8b8f-4605-a34c-46bafbca7d05", "DetectTime": "2024-05-21T12:28:13.834249+00:00", "EventTime": "2024-05-21T12:28:13.834268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZ8lB3klYC09Upcpl"], "accumulated_threat_level": 10.424000000000001, "timewindow": 40} +{"Format": "IDEA0", "ID": "a1fb3595-3757-4331-b378-a7ea5318ddb6", "DetectTime": "2024-05-21T12:28:13.893123+00:00", "EventTime": "2024-05-21T12:28:13.893143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhAgi2iB2HiAtU2ra"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "10c87a56-bfcc-4787-8f01-cc5803503be1", "DetectTime": "2024-05-21T12:28:13.910339+00:00", "EventTime": "2024-05-21T12:28:13.910358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRdeq4S306ENse0nd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "1d91f3d2-5ae5-462c-ab1f-3cc70077e6a7", "DetectTime": "2024-05-21T12:28:13.939449+00:00", "EventTime": "2024-05-21T12:28:13.939469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaX2Co4tu7Ks8JSbD1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "cb9682ab-d04f-4105-b336-02eb7b9dc54c", "DetectTime": "2024-05-21T12:28:13.967029+00:00", "EventTime": "2024-05-21T12:28:13.967048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwFWT3gt6mgIvOcE5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "79720af1-fea3-4c97-a24c-5b759ce6a666", "DetectTime": "2024-05-21T12:28:13.996967+00:00", "EventTime": "2024-05-21T12:28:13.996989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87JhQ14r837HlBPz8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "482858a4-51f3-4d7e-9e57-4b450cc42842", "DetectTime": "2024-05-21T12:28:14.009493+00:00", "EventTime": "2024-05-21T12:28:14.009510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU12XT1BEvmCAaoDSj"], "accumulated_threat_level": 11.224000000000002, "timewindow": 40} +{"Format": "IDEA0", "ID": "72a396bd-f54f-4e84-bf73-cbcb622f8193", "DetectTime": "2024-05-21T12:28:14.041342+00:00", "EventTime": "2024-05-21T12:28:14.041363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBT0134L0EVJo7rrb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a8ee50f9-693c-4325-9916-d2c743a568fd", "DetectTime": "2024-05-21T12:28:14.069762+00:00", "EventTime": "2024-05-21T12:28:14.069782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme5wA4ijwyQUw7ejl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a60c4e19-31bf-424c-8e5a-f1a58bdb1d6d", "DetectTime": "2024-05-21T12:28:14.135818+00:00", "EventTime": "2024-05-21T12:28:14.135838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEj0j16WYnN8xNOy4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "008bce4a-5eb7-44fd-8b07-c3327b930038", "DetectTime": "2024-05-21T12:28:14.198169+00:00", "EventTime": "2024-05-21T12:28:14.198187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFN164xLL2Fp863C3"], "accumulated_threat_level": 12.024000000000003, "timewindow": 40} +{"Format": "Json", "ID": "008bce4a-5eb7-44fd-8b07-c3327b930038", "DetectTime": "2024-05-21T12:28:14.198169+00:00", "EventTime": "2024-05-21T12:28:14.198187+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-02T15:48:05.754047+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2024/05/21 12:28:14.364948)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 40, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "0dbf05c0-2856-45dd-8237-2bb32c43f4fd", "DetectTime": "2024-05-21T12:28:14.375572+00:00", "EventTime": "2024-05-21T12:28:14.375590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxosb81HTV9XBV0mE7"], "accumulated_threat_level": 0.8, "timewindow": 40} +{"Format": "IDEA0", "ID": "25a1cac5-ef5e-4335-9b69-c87fad8e2636", "DetectTime": "2024-05-21T12:28:14.380658+00:00", "EventTime": "2024-05-21T12:28:14.380679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnU6xA2OfUy0GpVwM3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "3bd2832c-b756-4cb2-84fa-6fb2f970ac3f", "DetectTime": "2024-05-21T12:28:14.391350+00:00", "EventTime": "2024-05-21T12:28:14.391368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C29S8G4htfdxcphEW7"], "accumulated_threat_level": 1.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "c745147e-512b-4904-88fa-38b0827dc0cf", "DetectTime": "2024-05-21T12:28:14.404179+00:00", "EventTime": "2024-05-21T12:28:14.404199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgTIK1q6PydEWL5Sa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 40} +{"Format": "IDEA0", "ID": "36a0ebaf-264e-42cd-9199-a73c7ef58e95", "DetectTime": "2024-05-21T12:28:14.415188+00:00", "EventTime": "2024-05-21T12:28:14.415206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJeXl71xTHvBC1DvI8"], "accumulated_threat_level": 3.2, "timewindow": 40} +{"Format": "IDEA0", "ID": "f28919d2-cfd7-4fbc-9930-030a594989d7", "DetectTime": "2024-05-21T12:28:14.427281+00:00", "EventTime": "2024-05-21T12:28:14.427303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Oesy5wkPw4XIeUc"], "accumulated_threat_level": 4.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "ee747c95-91a3-43e7-9d1b-8649dec4ec69", "DetectTime": "2024-05-21T12:28:14.439212+00:00", "EventTime": "2024-05-21T12:28:14.439231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtsNAC4oXaHFHMYmeb"], "accumulated_threat_level": 4.8, "timewindow": 40} +{"Format": "IDEA0", "ID": "a4136db2-3037-4fe6-80a8-45961e008b27", "DetectTime": "2024-05-21T12:28:14.450433+00:00", "EventTime": "2024-05-21T12:28:14.450452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBTW63A0bOQJNsVmh"], "accumulated_threat_level": 5.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "2b56df1b-9ed5-4402-be90-404f96b1b7d4", "DetectTime": "2024-05-21T12:28:14.478183+00:00", "EventTime": "2024-05-21T12:28:14.478203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmlxxwdfAg9WVkoQ9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 40} +{"Format": "IDEA0", "ID": "3d734ff7-e390-4183-a33f-e92810ee3aa1", "DetectTime": "2024-05-21T12:28:14.508213+00:00", "EventTime": "2024-05-21T12:28:14.508232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C230Ob2X3htf0JGvWc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "98a54895-6c0f-44ad-895e-a660dc241a1f", "DetectTime": "2024-05-21T12:28:14.539581+00:00", "EventTime": "2024-05-21T12:28:14.539601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTMsip2ofKvawjLTgi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "3679c6a3-1143-4885-a4e3-3c85f6c39513", "DetectTime": "2024-05-21T12:28:14.556472+00:00", "EventTime": "2024-05-21T12:28:14.556493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRiug3SO3TT1Tnao2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "02cd787c-649d-4cdc-ae39-be2973af8b32", "DetectTime": "2024-05-21T12:28:14.589581+00:00", "EventTime": "2024-05-21T12:28:14.589600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXwZ03cznfZKuGzD6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "a594ab5d-ed8a-41e7-8137-f6cb52dec038", "DetectTime": "2024-05-21T12:28:14.614936+00:00", "EventTime": "2024-05-21T12:28:14.614954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxztYo3Gaj56uVE0oi"], "accumulated_threat_level": 9.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "56fa5245-6ca3-468a-9850-2cd5e38c62ed", "DetectTime": "2024-05-21T12:28:14.830247+00:00", "EventTime": "2024-05-21T12:28:14.830289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrN1tfM1nb5c5eBa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "2123665a-0c12-4d9d-bbef-5385f3a23a68", "DetectTime": "2024-05-21T12:28:14.867741+00:00", "EventTime": "2024-05-21T12:28:14.867761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJtGoX3jjJOiXTCO73"], "accumulated_threat_level": 10.4, "timewindow": 40} +{"Format": "IDEA0", "ID": "8b4df45c-5a02-40a7-80ad-381531342694", "DetectTime": "2024-05-21T12:28:14.881203+00:00", "EventTime": "2024-05-21T12:28:14.881223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJqkvQejMbn8s6Ll"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "ff2a5724-f340-4f36-9bf6-d40adf4afe93", "DetectTime": "2024-05-21T12:28:14.909213+00:00", "EventTime": "2024-05-21T12:28:14.909232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqhi261mj8x0p8OZGi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "8ef075c9-e196-473a-b57e-420360d5f285", "DetectTime": "2024-05-21T12:28:14.931877+00:00", "EventTime": "2024-05-21T12:28:14.931898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fzfw2eqYRjAaSk59"], "accumulated_threat_level": 11.200000000000001, "timewindow": 40} +{"Format": "IDEA0", "ID": "0f0916df-9e73-469f-8966-16634350159d", "DetectTime": "2024-05-21T12:28:14.950257+00:00", "EventTime": "2024-05-21T12:28:14.950276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDscxT3B3bxr9uRTMh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "ebedd0ab-01a3-4fe6-8946-3649a758a0c1", "DetectTime": "2024-05-21T12:28:14.982700+00:00", "EventTime": "2024-05-21T12:28:14.982723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWZkl53a7Nhuqihuj4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 40} +{"Format": "Json", "ID": "ebedd0ab-01a3-4fe6-8946-3649a758a0c1", "DetectTime": "2024-05-21T12:28:14.982700+00:00", "EventTime": "2024-05-21T12:28:14.982723+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "1970-01-02T15:48:26.044869+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2024/05/21 12:28:15.211955)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 40, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3c01e5e1-b33d-4719-bcea-bf6162828291", "DetectTime": "2024-05-21T12:28:15.216109+00:00", "EventTime": "2024-05-21T12:28:15.216128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YiGk4M11TfJ5uyh8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "d334a319-3024-4811-8653-636df24e46c0", "DetectTime": "2024-05-21T12:28:15.227905+00:00", "EventTime": "2024-05-21T12:28:15.227923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1rO81tDmX8HCIPx6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "2cccc1c5-eda7-4430-a226-ae5d8774fbaa", "DetectTime": "2024-05-21T12:28:15.232297+00:00", "EventTime": "2024-05-21T12:28:15.232315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDsD7638zBz75rrjU2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "4df66946-bce0-49f6-99b8-7aca19ac673b", "DetectTime": "2024-05-21T12:28:15.254646+00:00", "EventTime": "2024-05-21T12:28:15.254663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq4DT30KdQDKsrSQg"], "accumulated_threat_level": 0.8, "timewindow": 40} +{"Format": "IDEA0", "ID": "1cf1b0e9-0d53-4545-af34-898a5fd8a62c", "DetectTime": "2024-05-21T12:28:15.259715+00:00", "EventTime": "2024-05-21T12:28:15.259735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGkD31SdfmEVwWSp2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a987d0f6-f501-4136-bb67-0c522ad7ebc2", "DetectTime": "2024-05-21T12:28:15.264752+00:00", "EventTime": "2024-05-21T12:28:15.264770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjXLgn8VV0NRVuZ6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "0a9a68e4-0a01-4a1a-9ef5-6e43973d4469", "DetectTime": "2024-05-21T12:28:15.278153+00:00", "EventTime": "2024-05-21T12:28:15.278172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKnTo1OuBtSYIAvdj"], "accumulated_threat_level": 1.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "142ee477-4e4b-4e48-ae37-381c2c91eddf", "DetectTime": "2024-05-21T12:28:15.288019+00:00", "EventTime": "2024-05-21T12:28:15.288037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAVJK1fJtUPKIxyga"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "41f64f3a-eec3-4b93-8b7c-5a7f1983ed5d", "DetectTime": "2024-05-21T12:28:15.301337+00:00", "EventTime": "2024-05-21T12:28:15.301355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCcy5q17uu7SkkIGnj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 40} +{"Format": "IDEA0", "ID": "37ccc21b-2c20-4bbf-a2ce-faa884c4c5a2", "DetectTime": "2024-05-21T12:28:15.307030+00:00", "EventTime": "2024-05-21T12:28:15.307050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJHFo2rOTeShbMbnj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "b1bc19da-1fb6-47fb-a1f8-1f9169125adb", "DetectTime": "2024-05-21T12:28:15.319101+00:00", "EventTime": "2024-05-21T12:28:15.319119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCPdnx2Mv8MifxWoN"], "accumulated_threat_level": 3.2, "timewindow": 40} +{"Format": "IDEA0", "ID": "7931862b-3345-4160-959f-8825f294d951", "DetectTime": "2024-05-21T12:28:15.324277+00:00", "EventTime": "2024-05-21T12:28:15.324296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggAsT1PBbzuDqdXh8", "CBbASr4SpgsWqztZZ4", "CypoRu4VN8CGYN0D35", "CT3UZ11FLVWDGWFHM4"], "accumulated_threat_level": 0.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "177b0834-9830-4904-80ff-d91c55e84add", "DetectTime": "2024-05-21T12:28:15.335747+00:00", "EventTime": "2024-05-21T12:28:15.335768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtLCj4nxtvOdV1zak"], "accumulated_threat_level": 4.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "61182424-96e1-424f-b362-a8f33b61027a", "DetectTime": "2024-05-21T12:28:15.362525+00:00", "EventTime": "2024-05-21T12:28:15.362549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMyGHY1fBJOcfsXeBl"], "accumulated_threat_level": 4.8, "timewindow": 40} +{"Format": "IDEA0", "ID": "7b911143-b0a0-412b-a305-1dd0b701f813", "DetectTime": "2024-05-21T12:28:15.396676+00:00", "EventTime": "2024-05-21T12:28:15.396698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZGRl1IV8LItD00Y2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "129e837f-60b8-4307-8712-38faceba8aa4", "DetectTime": "2024-05-21T12:28:15.415833+00:00", "EventTime": "2024-05-21T12:28:15.415853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXEyl83DLEVf2pfd"], "accumulated_threat_level": 5.6, "timewindow": 40} +{"Format": "IDEA0", "ID": "faa6f499-3dd5-440a-bbcf-e4821439d968", "DetectTime": "2024-05-21T12:28:15.440145+00:00", "EventTime": "2024-05-21T12:28:15.440167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFevetW6XEz9B5T"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "d1ee9ebb-1de0-4a6d-a881-ea13fb839221", "DetectTime": "2024-05-21T12:28:15.477140+00:00", "EventTime": "2024-05-21T12:28:15.477175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWm7m71rVLg8LhG0yl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 40} +{"Format": "IDEA0", "ID": "854b65d9-5409-488e-b725-0e8a921e725e", "DetectTime": "2024-05-21T12:28:15.492540+00:00", "EventTime": "2024-05-21T12:28:15.492562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17p282I3A3x42kwXg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "107708d1-c357-494c-ae17-87c3e1bdaf39", "DetectTime": "2024-05-21T12:28:15.707245+00:00", "EventTime": "2024-05-21T12:28:15.707264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiN1cGOLyQ5sSPJf2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "3c6ae2ad-5867-4323-913a-dd8759107b03", "DetectTime": "2024-05-21T12:28:15.734570+00:00", "EventTime": "2024-05-21T12:28:15.734591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90b763UY6pwBYwGjd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "baeb500e-91cd-4094-8c70-1c21f95acbbc", "DetectTime": "2024-05-21T12:28:15.753663+00:00", "EventTime": "2024-05-21T12:28:15.753684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefVjp43wuCP6Jonel"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "366d9c98-242f-4767-b8ee-28470bbd2d52", "DetectTime": "2024-05-21T12:28:15.781510+00:00", "EventTime": "2024-05-21T12:28:15.781527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMboP1ZkzuG3f7Zrd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "30a110ef-eb18-4935-b907-ff253f0aa740", "DetectTime": "2024-05-21T12:28:15.856373+00:00", "EventTime": "2024-05-21T12:28:15.856393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnCg725tdKkCFcLu4"], "accumulated_threat_level": 1.3, "timewindow": 41} +{"Format": "IDEA0", "ID": "ecacc862-f20b-4378-a901-1b06c7445bee", "DetectTime": "2024-05-21T12:28:15.877606+00:00", "EventTime": "2024-05-21T12:28:15.877625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CclHo242ghVFT8XsXk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "a1830a06-4000-4e5c-aa88-d248c69b59b0", "DetectTime": "2024-05-21T12:28:15.909859+00:00", "EventTime": "2024-05-21T12:28:15.909880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuDcx1fxVJL8S0hPc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "553d4129-e205-4382-a7ff-ca1851f3f89f", "DetectTime": "2024-05-21T12:28:15.939703+00:00", "EventTime": "2024-05-21T12:28:15.939726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbnm0m12MV48ENy7Di"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "4e365e87-e49f-47ea-bca9-3d8dfff3489d", "DetectTime": "2024-05-21T12:28:15.980621+00:00", "EventTime": "2024-05-21T12:28:15.980643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW265lWKOtMykfBR7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "b3ce92f5-1129-4d2f-8513-13ea3fb9483f", "DetectTime": "2024-05-21T12:28:16.040440+00:00", "EventTime": "2024-05-21T12:28:16.040458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALlGr4nDErnvXDIU1"], "accumulated_threat_level": 2.1, "timewindow": 41} +{"Format": "IDEA0", "ID": "aac92e6e-3b6b-449c-babe-63f3156a7ec3", "DetectTime": "2024-05-21T12:28:16.108784+00:00", "EventTime": "2024-05-21T12:28:16.108804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmbfZ1U7nHztIygh4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 41} +{"Format": "IDEA0", "ID": "f7aaabf6-143c-4866-ba73-6ee67d0ad75b", "DetectTime": "2024-05-21T12:28:16.139026+00:00", "EventTime": "2024-05-21T12:28:16.139047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5M9THDEiLHAwcr6"], "accumulated_threat_level": 3.7, "timewindow": 41} +{"Format": "IDEA0", "ID": "ff23526d-72d9-43db-b6e3-cc6f641983e5", "DetectTime": "2024-05-21T12:28:16.167244+00:00", "EventTime": "2024-05-21T12:28:16.167265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUThVKdzhkXD5aLj2"], "accumulated_threat_level": 4.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "fdac47c1-0a23-40d7-bdf5-a3427e552f49", "DetectTime": "2024-05-21T12:28:16.236095+00:00", "EventTime": "2024-05-21T12:28:16.236118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJU5CsimxSGuegDl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "0f9636a6-b13b-4f9f-993b-ec0df984a9f7", "DetectTime": "2024-05-21T12:28:16.263826+00:00", "EventTime": "2024-05-21T12:28:16.263845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFptI3di2AdIqSny9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "fc4b1a92-8320-4db3-b379-94a9ada456ae", "DetectTime": "2024-05-21T12:28:16.289479+00:00", "EventTime": "2024-05-21T12:28:16.289497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "Connection to unknown destination port 27410/UDP destination IP 201.171.27.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUfkCe3lQWoJ2Pims"], "accumulated_threat_level": 5.3, "timewindow": 41} +{"Format": "IDEA0", "ID": "f3700a0d-cf7c-43a6-a45b-5400664e10c4", "DetectTime": "2024-05-21T12:28:16.324897+00:00", "EventTime": "2024-05-21T12:28:16.324918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CER0563Q2JxMSEgix9"], "accumulated_threat_level": 6.1, "timewindow": 41} +{"Format": "IDEA0", "ID": "de69c70c-ac8f-42cf-b3c7-7b3ba785d3e7", "DetectTime": "2024-05-21T12:28:16.332894+00:00", "EventTime": "2024-05-21T12:28:16.332912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilOKp3uieivZTqys3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "c0e44fef-7c32-4c67-ba7a-8428c81a0c13", "DetectTime": "2024-05-21T12:28:16.360365+00:00", "EventTime": "2024-05-21T12:28:16.360386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjvCh2QziPvcdCvFh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "52c5a19b-b146-408b-a3a7-bb376fbe2c2e", "DetectTime": "2024-05-21T12:28:16.383324+00:00", "EventTime": "2024-05-21T12:28:16.383342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjkE5c3eXUtZuC1r1k"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 41} +{"Format": "IDEA0", "ID": "8f70bb86-9420-4c01-bff0-db4af09fb47c", "DetectTime": "2024-05-21T12:28:16.404691+00:00", "EventTime": "2024-05-21T12:28:16.404711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOwxz3i5oPA0PKtj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "97036161-0132-4d8d-a196-84b63b8cd6c8", "DetectTime": "2024-05-21T12:28:16.436082+00:00", "EventTime": "2024-05-21T12:28:16.436101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhjQz19el3Hvd1vN1"], "accumulated_threat_level": 7.699999999999999, "timewindow": 41} +{"Format": "IDEA0", "ID": "46b0cc03-cd92-49b8-a3a2-8e9e10854ff0", "DetectTime": "2024-05-21T12:28:16.455058+00:00", "EventTime": "2024-05-21T12:28:16.455079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUxP8a3LXD79rBhPUh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "67e961df-aec3-40eb-9007-dffc0c362c52", "DetectTime": "2024-05-21T12:28:16.475807+00:00", "EventTime": "2024-05-21T12:28:16.475828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChHChfUs8HlyheSm"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "4fe8dcd3-5ede-437d-be41-003b2689270c", "DetectTime": "2024-05-21T12:28:16.501174+00:00", "EventTime": "2024-05-21T12:28:16.501191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMN4a2zq7E1eJBmx3"], "accumulated_threat_level": 8.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "54fef773-15b5-4752-bcd9-1f779153613b", "DetectTime": "2024-05-21T12:28:16.530527+00:00", "EventTime": "2024-05-21T12:28:16.530545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Wrkg39mkWsU3a09j"], "accumulated_threat_level": 9.3, "timewindow": 41} +{"Format": "IDEA0", "ID": "d3fbf103-41d8-4cc0-bc60-1619680d8d2b", "DetectTime": "2024-05-21T12:28:16.561565+00:00", "EventTime": "2024-05-21T12:28:16.561582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clvhwc1xvimzHY5fmi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 41} +{"Format": "IDEA0", "ID": "3384098d-a60f-48ab-8642-82044b5b26bb", "DetectTime": "2024-05-21T12:28:16.591234+00:00", "EventTime": "2024-05-21T12:28:16.591254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05gba4kbT0D0MWI1i"], "accumulated_threat_level": 10.900000000000002, "timewindow": 41} +{"Format": "IDEA0", "ID": "46b4c108-97ac-47cc-a181-2cc9c5fb0542", "DetectTime": "2024-05-21T12:28:16.621422+00:00", "EventTime": "2024-05-21T12:28:16.621444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHhMq31JXeytOCH04"], "accumulated_threat_level": 11.700000000000003, "timewindow": 41} +{"Format": "IDEA0", "ID": "9159d560-514d-4158-bfd5-23d4cbb0d6fb", "DetectTime": "2024-05-21T12:28:16.651742+00:00", "EventTime": "2024-05-21T12:28:16.651764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaCLaN3YslST4DMbIc"], "accumulated_threat_level": 12.500000000000004, "timewindow": 41} +{"Format": "Json", "ID": "9159d560-514d-4158-bfd5-23d4cbb0d6fb", "DetectTime": "2024-05-21T12:28:16.651742+00:00", "EventTime": "2024-05-21T12:28:16.651764+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "1970-01-02T16:19:24.389736+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2024/05/21 12:28:16.838655)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 41, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "c96ab069-4b13-42f7-ae18-d584c94bad2d", "DetectTime": "2024-05-21T12:28:16.864839+00:00", "EventTime": "2024-05-21T12:28:16.864861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8Isn3Nd3AUU9YMcd"], "accumulated_threat_level": 0.8, "timewindow": 41} +{"Format": "IDEA0", "ID": "ecf2e340-b375-4fb0-85f2-b55b00e413eb", "DetectTime": "2024-05-21T12:28:16.876471+00:00", "EventTime": "2024-05-21T12:28:16.876489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55VId19d8LPUBQ0U1"], "accumulated_threat_level": 1.6, "timewindow": 41} +{"Format": "IDEA0", "ID": "b16351e5-be79-4ba1-bfe2-072a40b7f8c2", "DetectTime": "2024-05-21T12:28:16.881016+00:00", "EventTime": "2024-05-21T12:28:16.881033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yqxW2t0tiJGEhZl6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "6b7a8705-7293-4ca4-b467-243084747985", "DetectTime": "2024-05-21T12:28:16.893659+00:00", "EventTime": "2024-05-21T12:28:16.893682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETWfd3rNtjcI6sVFa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 41} +{"Format": "IDEA0", "ID": "f0f9c77b-086e-459e-b5db-52318169cc2b", "DetectTime": "2024-05-21T12:28:17.035933+00:00", "EventTime": "2024-05-21T12:28:17.035954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d1mq4yPaPlVJdh43"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "dca75977-a70d-4c2c-8ba6-6f3122aab500", "DetectTime": "2024-05-21T12:28:17.050025+00:00", "EventTime": "2024-05-21T12:28:17.050046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYT4vbO1BmQFDaDU5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "5cf7c857-2b21-41ff-b663-a5982e13f799", "DetectTime": "2024-05-21T12:28:17.054745+00:00", "EventTime": "2024-05-21T12:28:17.054764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkVjuA3z9crdvxfAi4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "8ac1a4d8-ba45-4cd0-a752-86ac9b5e5c46", "DetectTime": "2024-05-21T12:28:17.100411+00:00", "EventTime": "2024-05-21T12:28:17.100428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrxLW742mNLDjcpWFc"], "accumulated_threat_level": 3.2, "timewindow": 41} +{"Format": "IDEA0", "ID": "7093d4a6-8955-4791-848a-504ec80407a8", "DetectTime": "2024-05-21T12:28:17.118951+00:00", "EventTime": "2024-05-21T12:28:17.118972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1nlyOQgXPvXbI4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "689e606c-1225-42da-a2f1-0c86f11094c2", "DetectTime": "2024-05-21T12:28:17.144224+00:00", "EventTime": "2024-05-21T12:28:17.144244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxcTT620ifzUfBgcPl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "c8efeab6-bc6d-4eb4-984e-a1e86d6ea71c", "DetectTime": "2024-05-21T12:28:17.162959+00:00", "EventTime": "2024-05-21T12:28:17.162978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKffvK3si3IHMaCXji"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "fab2f934-aeb9-4a85-8c06-d5ee7fef6aaf", "DetectTime": "2024-05-21T12:28:17.185967+00:00", "EventTime": "2024-05-21T12:28:17.185985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPKb73AjUyHFVKLAa"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "aa1c6800-495e-41ee-baa0-e7d9f4ca3671", "DetectTime": "2024-05-21T12:28:17.218466+00:00", "EventTime": "2024-05-21T12:28:17.218483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBD18KdbiC1pnDna"], "accumulated_threat_level": 4.8, "timewindow": 41} +{"Format": "IDEA0", "ID": "dd3d936d-1a2e-4193-be9f-b36a7cdc7c3f", "DetectTime": "2024-05-21T12:28:17.255235+00:00", "EventTime": "2024-05-21T12:28:17.255254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR2XR2NSmEuhPJOTe"], "accumulated_threat_level": 5.6, "timewindow": 41} +{"Format": "IDEA0", "ID": "01354e47-53c1-4f27-b363-0bd30278e9ea", "DetectTime": "2024-05-21T12:28:17.286706+00:00", "EventTime": "2024-05-21T12:28:17.286726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZs4Wy4MwRr4z8aY61"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 41} +{"Format": "IDEA0", "ID": "1ffebc8f-c514-4935-b308-0c8bd277304b", "DetectTime": "2024-05-21T12:28:17.332218+00:00", "EventTime": "2024-05-21T12:28:17.332241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3BSbLQ33d25rgJ83"], "accumulated_threat_level": 7.199999999999999, "timewindow": 41} +{"Format": "IDEA0", "ID": "c82106e9-b929-49a8-af43-8e009d731189", "DetectTime": "2024-05-21T12:28:17.366914+00:00", "EventTime": "2024-05-21T12:28:17.366933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57l2E24X4F4vV1fth"], "accumulated_threat_level": 7.999999999999999, "timewindow": 41} +{"Format": "IDEA0", "ID": "ac675739-07e5-4500-93e6-fd2925027e8d", "DetectTime": "2024-05-21T12:28:17.414457+00:00", "EventTime": "2024-05-21T12:28:17.414477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybRbZ3anN9xFlF87f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "099fab33-7360-410d-8484-ec833c5faea1", "DetectTime": "2024-05-21T12:28:17.454880+00:00", "EventTime": "2024-05-21T12:28:17.454900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ6iTk2MuR6t9vwSMe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 41} +{"Format": "IDEA0", "ID": "ace8a2c1-cf62-4730-9942-ae3478d283e4", "DetectTime": "2024-05-21T12:28:17.493840+00:00", "EventTime": "2024-05-21T12:28:17.493860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYf7C93y0I0xdQ134k"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "4ef2d9cb-fd94-43d6-83d1-848f23840d30", "DetectTime": "2024-05-21T12:28:17.529497+00:00", "EventTime": "2024-05-21T12:28:17.529518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwlxm4xm2AK7SM8M4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "8ff57389-ae41-4b02-8626-37f1cda7317c", "DetectTime": "2024-05-21T12:28:17.585073+00:00", "EventTime": "2024-05-21T12:28:17.585096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUb9wx2tiJmBGvFZx6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "0bb01987-7eb2-4c32-b5e9-3ed30c01aeb5", "DetectTime": "2024-05-21T12:28:17.630551+00:00", "EventTime": "2024-05-21T12:28:17.630571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.164.36.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9LGF2Ajh7Sy85ezh"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "9b73b0e0-bf1b-41a1-8081-8c96e97d7b9c", "DetectTime": "2024-05-21T12:28:17.674771+00:00", "EventTime": "2024-05-21T12:28:17.674792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.164.36.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.164.36.164 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9LGF2Ajh7Sy85ezh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 16} +{"Format": "IDEA0", "ID": "ab6a8296-cb6e-4cff-b6a5-f2e5ff6724a6", "DetectTime": "2024-05-21T12:28:17.685661+00:00", "EventTime": "2024-05-21T12:28:17.685681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNTJb4kdap1i3DT3a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "af539025-354b-401c-ab1e-a05093812b81", "DetectTime": "2024-05-21T12:28:17.732015+00:00", "EventTime": "2024-05-21T12:28:17.732047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpCVzHs19fHLFhpll"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "cd2d12ad-8614-440f-aed8-a1a2a501c57a", "DetectTime": "2024-05-21T12:28:17.781408+00:00", "EventTime": "2024-05-21T12:28:17.781431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtX9RXQbzyU7CERb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "7f9b3206-b5ad-4b77-8b15-3b6bbf3da911", "DetectTime": "2024-05-21T12:28:17.849543+00:00", "EventTime": "2024-05-21T12:28:17.849563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBJlNo4PySPQWQDjkb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "39f58254-5b47-4615-a5d2-7e2961584346", "DetectTime": "2024-05-21T12:28:17.909193+00:00", "EventTime": "2024-05-21T12:28:17.909216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eAHI1I7QCiESuVS6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "5c68e822-6030-497b-ade9-6564383057c2", "DetectTime": "2024-05-21T12:28:18.104040+00:00", "EventTime": "2024-05-21T12:28:18.104059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8tXr2dCJDkSNOhJg"], "accumulated_threat_level": 9.6, "timewindow": 41} +{"Format": "IDEA0", "ID": "1beec9fb-1f1b-4ff2-904e-f148579d2ca6", "DetectTime": "2024-05-21T12:28:18.133722+00:00", "EventTime": "2024-05-21T12:28:18.133740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOR4b3DLqIVAppnS3"], "accumulated_threat_level": 10.4, "timewindow": 41} +{"Format": "IDEA0", "ID": "d63a192d-9546-4871-b974-b1845da958c8", "DetectTime": "2024-05-21T12:28:18.154643+00:00", "EventTime": "2024-05-21T12:28:18.154665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROyRyWVEoFHDL226"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "36e990a6-7724-4773-b9f4-daab652b8a32", "DetectTime": "2024-05-21T12:28:18.179770+00:00", "EventTime": "2024-05-21T12:28:18.179789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctuqo82D3hbahYwVJa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 41} +{"Format": "IDEA0", "ID": "9dc9aed4-5e9f-4475-a0ce-fc4cb7e262c2", "DetectTime": "2024-05-21T12:28:18.282232+00:00", "EventTime": "2024-05-21T12:28:18.282252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkNy73hzdMlRtbJEj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 41} +{"Format": "Json", "ID": "9dc9aed4-5e9f-4475-a0ce-fc4cb7e262c2", "DetectTime": "2024-05-21T12:28:18.282232+00:00", "EventTime": "2024-05-21T12:28:18.282252+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "1970-01-02T16:50:19.146321+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2024/05/21 12:28:18.411282)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 41, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b1f16e92-1c56-428c-9242-a97e390a316c", "DetectTime": "2024-05-21T12:28:18.423531+00:00", "EventTime": "2024-05-21T12:28:18.423552+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvRBM2K4fRBwBTueh"], "accumulated_threat_level": 0.024, "timewindow": 41} +{"Format": "IDEA0", "ID": "f19926ff-5d85-41ce-98af-9d60c3403630", "DetectTime": "2024-05-21T12:28:18.434118+00:00", "EventTime": "2024-05-21T12:28:18.434136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqASlp1tmd48AkDEv3"], "accumulated_threat_level": 0.8240000000000001, "timewindow": 41} +{"Format": "IDEA0", "ID": "0ebad4a9-b65b-45f1-8945-c2da46fa8845", "DetectTime": "2024-05-21T12:28:18.445306+00:00", "EventTime": "2024-05-21T12:28:18.445324+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvRBM2K4fRBwBTueh"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "c792e4a0-537b-4146-b4ae-3604d949ea14", "DetectTime": "2024-05-21T12:28:18.456737+00:00", "EventTime": "2024-05-21T12:28:18.456755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDf0oG1q3anv5REoZ4"], "accumulated_threat_level": 1.624, "timewindow": 41} +{"Format": "IDEA0", "ID": "ba124ec8-abbe-4170-98a8-a9f85e9437b1", "DetectTime": "2024-05-21T12:28:18.675106+00:00", "EventTime": "2024-05-21T12:28:18.675128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUWLG2tjBn23LVl6g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "ac33b181-90c7-4ec4-893f-4b3b0e4fe26b", "DetectTime": "2024-05-21T12:28:18.703787+00:00", "EventTime": "2024-05-21T12:28:18.703809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1hxE3GsnsRjf4MRi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "1d67aca2-6bfc-4d54-bd37-798b67655abb", "DetectTime": "2024-05-21T12:28:18.796710+00:00", "EventTime": "2024-05-21T12:28:18.796734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VNUV1iFSu10L1OQi"], "accumulated_threat_level": 2.4240000000000004, "timewindow": 41} +{"Format": "IDEA0", "ID": "7b26ccde-561d-4406-9b10-96b129382c2d", "DetectTime": "2024-05-21T12:28:18.802132+00:00", "EventTime": "2024-05-21T12:28:18.802151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX0SoO2bgRjDA8LKDl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "5f242332-a7f3-4e02-92b6-db2b73c74cf4", "DetectTime": "2024-05-21T12:28:18.809263+00:00", "EventTime": "2024-05-21T12:28:18.809283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.192.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBsv9s2H7jnq1mj03k"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "2aaea895-52f0-4df0-9f44-96e484ecff60", "DetectTime": "2024-05-21T12:28:18.873419+00:00", "EventTime": "2024-05-21T12:28:18.873438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdhplw4jJR4HMpcdO3"], "accumulated_threat_level": 3.224, "timewindow": 41} +{"Format": "IDEA0", "ID": "ff96b1d7-b3dc-413f-a920-a8065ae6d758", "DetectTime": "2024-05-21T12:28:18.904201+00:00", "EventTime": "2024-05-21T12:28:18.904220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDz2nz16t4aIpuhrij"], "accumulated_threat_level": 4.024, "timewindow": 41} +{"Format": "IDEA0", "ID": "6f6d00b1-530f-44c1-9c5d-a88d2a82bd4f", "DetectTime": "2024-05-21T12:28:18.933707+00:00", "EventTime": "2024-05-21T12:28:18.933730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cBy33LpnrpUlMPJd"], "accumulated_threat_level": 4.824, "timewindow": 41} +{"Format": "IDEA0", "ID": "0adafc28-90c8-4dd9-ad08-e395f237b781", "DetectTime": "2024-05-21T12:28:18.963924+00:00", "EventTime": "2024-05-21T12:28:18.963944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEilK3xT47J7m4xAb"], "accumulated_threat_level": 5.624, "timewindow": 41} +{"Format": "IDEA0", "ID": "4bc19d43-75c9-4dfe-9440-84845591e29b", "DetectTime": "2024-05-21T12:28:18.994999+00:00", "EventTime": "2024-05-21T12:28:18.995020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYSzS3Sqf7tWm6en"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 41} +{"Format": "IDEA0", "ID": "887622bf-8373-4b68-b7f1-9ad42b3b0bb0", "DetectTime": "2024-05-21T12:28:19.027257+00:00", "EventTime": "2024-05-21T12:28:19.027276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MtcF2vYnR3Uzaiw8"], "accumulated_threat_level": 7.223999999999999, "timewindow": 41} +{"Format": "IDEA0", "ID": "96469c61-7c18-41d5-8372-cf59ee62aa3e", "DetectTime": "2024-05-21T12:28:19.057703+00:00", "EventTime": "2024-05-21T12:28:19.057723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwZR24hkW8OCzLl23"], "accumulated_threat_level": 8.024, "timewindow": 41} +{"Format": "IDEA0", "ID": "5398d4b0-a381-4d87-ac6f-c111b0116782", "DetectTime": "2024-05-21T12:28:19.093032+00:00", "EventTime": "2024-05-21T12:28:19.093053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9WAh4GA050THZvW3"], "accumulated_threat_level": 8.824, "timewindow": 41} +{"Format": "IDEA0", "ID": "0309dfca-0a36-4e52-9e25-e9d00d51ecb3", "DetectTime": "2024-05-21T12:28:19.119245+00:00", "EventTime": "2024-05-21T12:28:19.119263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFatpl2KGFuyVTihm1"], "accumulated_threat_level": 9.624, "timewindow": 41} +{"Format": "IDEA0", "ID": "e30db621-b657-41fe-9754-f72abc826751", "DetectTime": "2024-05-21T12:28:19.150699+00:00", "EventTime": "2024-05-21T12:28:19.150717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpbKW03b3Zkgwu2Npj"], "accumulated_threat_level": 10.424000000000001, "timewindow": 41} +{"Format": "IDEA0", "ID": "d1ee9176-3fe0-4fb2-807b-408f5b1beb45", "DetectTime": "2024-05-21T12:28:19.178896+00:00", "EventTime": "2024-05-21T12:28:19.178914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgoCeo309buBcuP7Qi"], "accumulated_threat_level": 11.224000000000002, "timewindow": 41} +{"Format": "IDEA0", "ID": "9b990e41-220a-4739-96fd-7f87255a9a52", "DetectTime": "2024-05-21T12:28:19.242030+00:00", "EventTime": "2024-05-21T12:28:19.242051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHc7t3NoKGWyquys7"], "accumulated_threat_level": 12.024000000000003, "timewindow": 41} +{"Format": "Json", "ID": "9b990e41-220a-4739-96fd-7f87255a9a52", "DetectTime": "2024-05-21T12:28:19.242030+00:00", "EventTime": "2024-05-21T12:28:19.242051+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "1970-01-02T16:50:37.978475+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2024/05/21 12:28:19.419534)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 41, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "1213a87c-0acf-4779-935a-d742aa78b51c", "DetectTime": "2024-05-21T12:28:19.424611+00:00", "EventTime": "2024-05-21T12:28:19.424634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.162.239.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nY3z3rXe5c3rMr5h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "dbd03712-95cd-40de-b66e-ca0481842648", "DetectTime": "2024-05-21T12:28:19.439917+00:00", "EventTime": "2024-05-21T12:28:19.439937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyruP1Ql5ueH4mSde"], "accumulated_threat_level": 0.8, "timewindow": 41} +{"Format": "IDEA0", "ID": "425443d6-d74b-4dc8-addd-8107d56ba81b", "DetectTime": "2024-05-21T12:28:19.451597+00:00", "EventTime": "2024-05-21T12:28:19.451617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiFjO1aoXfN9nVZ4j"], "accumulated_threat_level": 1.6, "timewindow": 41} +{"Format": "IDEA0", "ID": "218429be-7bfd-4bd2-86da-be7ebd4f9b5a", "DetectTime": "2024-05-21T12:28:19.463661+00:00", "EventTime": "2024-05-21T12:28:19.463679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NvGCUg8ZC1Fnvvc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 41} +{"Format": "IDEA0", "ID": "4592fa08-b1fe-403b-961e-710d70ad79e4", "DetectTime": "2024-05-21T12:28:19.481573+00:00", "EventTime": "2024-05-21T12:28:19.481592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwstB41XpYimLXXCTa"], "accumulated_threat_level": 3.2, "timewindow": 41} +{"Format": "IDEA0", "ID": "baae3156-3005-46c3-bff8-1bd5649b09c9", "DetectTime": "2024-05-21T12:28:19.505447+00:00", "EventTime": "2024-05-21T12:28:19.505467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.63.216.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmnVP23yMOtmeTyBg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "60ea954f-c0ab-47ab-b500-d05773b422c7", "DetectTime": "2024-05-21T12:28:19.543631+00:00", "EventTime": "2024-05-21T12:28:19.543649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCw9l73pa6OdaI15S1"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "2ed4a319-1803-4404-9806-37443d915f27", "DetectTime": "2024-05-21T12:28:19.799163+00:00", "EventTime": "2024-05-21T12:28:19.799182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.223.129.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7cUHE6W7QnwCMC"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "775c7fae-4b47-4292-b4dd-7036cebc2261", "DetectTime": "2024-05-21T12:28:19.804395+00:00", "EventTime": "2024-05-21T12:28:19.804416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztmavpUIlys0KlKh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "cd52c8e6-af18-4819-bd0f-611f908b4201", "DetectTime": "2024-05-21T12:28:19.809983+00:00", "EventTime": "2024-05-21T12:28:19.810002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfFhpx3cLIKsWD6zJ8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "cf7470bd-10a8-4696-8361-89ea772b36b9", "DetectTime": "2024-05-21T12:28:19.814438+00:00", "EventTime": "2024-05-21T12:28:19.814457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CccctI2z2SWlOLnCWh", "CVttlB4X2n2ygskDY1", "CYkvb82bDv3dDJcJMk", "CLahDu31qz8mct314c"], "accumulated_threat_level": 0.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "bfa14f55-9800-4a72-b632-04182469cadb", "DetectTime": "2024-05-21T12:28:19.826866+00:00", "EventTime": "2024-05-21T12:28:19.826886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ3CAk211M7KdqoX79"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "92dba0aa-c6af-4e3d-93b7-7532388ed0dc", "DetectTime": "2024-05-21T12:28:19.831891+00:00", "EventTime": "2024-05-21T12:28:19.831911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUQOrX3XMH5sdnCJ4g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "e03b597f-fec6-4e3a-85a7-f457d529ceff", "DetectTime": "2024-05-21T12:28:19.917048+00:00", "EventTime": "2024-05-21T12:28:19.917066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vz1v4eIJdqgRStT2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "3bd0d311-8fe3-45f1-8701-512b05a667d4", "DetectTime": "2024-05-21T12:28:19.921533+00:00", "EventTime": "2024-05-21T12:28:19.921552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRCl7SMPz3IhXfb3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "f8bd3817-ad60-4016-b3d5-003b4236ad36", "DetectTime": "2024-05-21T12:28:19.933393+00:00", "EventTime": "2024-05-21T12:28:19.933415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIn0o4n4dS6m7Dxa5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "5e29c71a-16cc-43c2-b597-e662c38b8bb9", "DetectTime": "2024-05-21T12:28:19.958919+00:00", "EventTime": "2024-05-21T12:28:19.958940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvrNp9snH2naGC8i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "28dc528c-dca1-4a94-822a-f1c3d061bf8f", "DetectTime": "2024-05-21T12:28:20.012913+00:00", "EventTime": "2024-05-21T12:28:20.012931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLyQH2IstI5S5B65l"], "accumulated_threat_level": 1.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "5a4f88f5-5fee-48a3-abd3-6978a34fa0e7", "DetectTime": "2024-05-21T12:28:20.023842+00:00", "EventTime": "2024-05-21T12:28:20.023859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgl5s21DgG34yyZnUd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "3d12a38f-e31c-4283-b9cd-f91ce4ea7086", "DetectTime": "2024-05-21T12:28:20.028259+00:00", "EventTime": "2024-05-21T12:28:20.028276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKXzK3Hj1858CL57b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "29646270-6198-4e88-8cfd-816d816ba0b3", "DetectTime": "2024-05-21T12:28:20.071687+00:00", "EventTime": "2024-05-21T12:28:20.071708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0JY54JPnT4LCeCLh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "be3c60c2-1f22-4f73-be20-1c51c836808b", "DetectTime": "2024-05-21T12:28:20.097377+00:00", "EventTime": "2024-05-21T12:28:20.097399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzoMN3K7yHLBgvoxf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "16ea334c-38cd-4f3d-9060-6db29a16b362", "DetectTime": "2024-05-21T12:28:20.116032+00:00", "EventTime": "2024-05-21T12:28:20.116054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClI2f53aiF6cM41vvd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "98455ce0-19f8-4c68-bae4-c2af70bb1d88", "DetectTime": "2024-05-21T12:28:20.173753+00:00", "EventTime": "2024-05-21T12:28:20.173771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4QO02P00MBn8Vg3k"], "accumulated_threat_level": 2.1, "timewindow": 42} +{"Format": "IDEA0", "ID": "d6a57e75-028a-466f-8c79-f965ddd80524", "DetectTime": "2024-05-21T12:28:20.204301+00:00", "EventTime": "2024-05-21T12:28:20.204322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHXQk4XhszO1Grg5f"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 42} +{"Format": "IDEA0", "ID": "e871f715-d96d-4e12-9180-7fa19ed3341c", "DetectTime": "2024-05-21T12:28:20.223402+00:00", "EventTime": "2024-05-21T12:28:20.223423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFZLi3U9hTCpvgzr2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "9cc23968-58ff-45a8-a1c6-783a2e8e144c", "DetectTime": "2024-05-21T12:28:20.254919+00:00", "EventTime": "2024-05-21T12:28:20.254937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUvoh1YT6q3i1eVog"], "accumulated_threat_level": 3.7, "timewindow": 42} +{"Format": "IDEA0", "ID": "e202e738-eb2c-4e90-95cb-c026c0431876", "DetectTime": "2024-05-21T12:28:20.284453+00:00", "EventTime": "2024-05-21T12:28:20.284473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC00ei15Xx2Gtl9afb"], "accumulated_threat_level": 4.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "50016645-b96d-47e2-aceb-6e6360655e51", "DetectTime": "2024-05-21T12:28:20.314596+00:00", "EventTime": "2024-05-21T12:28:20.314615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI6L513LgkkjhDF912"], "accumulated_threat_level": 5.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "b5610f73-7316-459c-b1b8-45962e968a64", "DetectTime": "2024-05-21T12:28:20.356891+00:00", "EventTime": "2024-05-21T12:28:20.356912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.13.87.74"]}], "Attach": [{"Content": "Connection to unknown destination port 9898/UDP destination IP 75.13.87.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnbHhd21ZexMkZKwsh"], "accumulated_threat_level": 6.1, "timewindow": 42} +{"Format": "IDEA0", "ID": "adb341ef-6753-4761-b2ec-d0f50622fc3c", "DetectTime": "2024-05-21T12:28:20.386807+00:00", "EventTime": "2024-05-21T12:28:20.386827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCsgL3kBTdeATk1Q8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 42} +{"Format": "IDEA0", "ID": "a9982764-e699-47f2-8d4f-3a9783979c04", "DetectTime": "2024-05-21T12:28:20.418828+00:00", "EventTime": "2024-05-21T12:28:20.418849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chpd4T1iciAg7byRRk"], "accumulated_threat_level": 7.699999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "ed949878-90eb-4284-993b-25eecb49b494", "DetectTime": "2024-05-21T12:28:20.452353+00:00", "EventTime": "2024-05-21T12:28:20.452371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcEZjj1r5Cr9CF95db"], "accumulated_threat_level": 8.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "e99ba056-d96e-476d-b23f-bbb5783c35c7", "DetectTime": "2024-05-21T12:28:20.482341+00:00", "EventTime": "2024-05-21T12:28:20.482363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46Cbd2eO3wzebIk4k"], "accumulated_threat_level": 9.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "3d68bc6c-1228-45cc-bde5-8507a54c0849", "DetectTime": "2024-05-21T12:28:20.513164+00:00", "EventTime": "2024-05-21T12:28:20.513184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.180.109"]}], "Attach": [{"Content": "Connection to unknown destination port 5805/UDP destination IP 82.211.180.109. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWbKu1KorhjHbZsK9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 42} +{"Format": "IDEA0", "ID": "a204abc4-f15c-41fa-b6f1-54e050f08786", "DetectTime": "2024-05-21T12:28:20.571896+00:00", "EventTime": "2024-05-21T12:28:20.571919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGbTi2bgoneKdDlC7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "dd051f8c-5b53-4ebe-8d91-f220e58b681d", "DetectTime": "2024-05-21T12:28:20.755248+00:00", "EventTime": "2024-05-21T12:28:20.755269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTDSY1G0kRQSSsZhc"], "accumulated_threat_level": 10.900000000000002, "timewindow": 42} +{"Format": "IDEA0", "ID": "378f8e47-fd65-4f5f-926f-60acab5e18d0", "DetectTime": "2024-05-21T12:28:20.785177+00:00", "EventTime": "2024-05-21T12:28:20.785195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "Connection to unknown destination port 24285/UDP destination IP 79.131.35.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gCQ64kP1u4O0Xva4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 42} +{"Format": "IDEA0", "ID": "c5e3d8f8-1969-42b4-8bdd-6837b0f20157", "DetectTime": "2024-05-21T12:28:20.819107+00:00", "EventTime": "2024-05-21T12:28:20.819127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyORI14W0h9gYW1Dp"], "accumulated_threat_level": 12.500000000000004, "timewindow": 42} +{"Format": "Json", "ID": "c5e3d8f8-1969-42b4-8bdd-6837b0f20157", "DetectTime": "2024-05-21T12:28:20.819107+00:00", "EventTime": "2024-05-21T12:28:20.819127+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "1970-01-02T17:21:20.885272+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:28:21.012954)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "19e1bd3b-5577-4866-80ba-5eef9758d630", "DetectTime": "2024-05-21T12:28:21.016763+00:00", "EventTime": "2024-05-21T12:28:21.016780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYumlVViuZ3QvAeE6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "e04c780d-77cd-4279-88a4-b03883a6a0f9", "DetectTime": "2024-05-21T12:28:21.028397+00:00", "EventTime": "2024-05-21T12:28:21.028420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6po1d2bRfYNHGHO8e"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "67486bb5-247a-4140-a93c-4d0247ed367e", "DetectTime": "2024-05-21T12:28:21.033468+00:00", "EventTime": "2024-05-21T12:28:21.033487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWVnTQ6T9OeojGOsi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "37f388a6-c960-4d20-9d4c-cbf2a1c22789", "DetectTime": "2024-05-21T12:28:21.038112+00:00", "EventTime": "2024-05-21T12:28:21.038131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQIITvs33zF9oBDg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "8abe5f17-2cc4-48eb-a640-07fcc032404b", "DetectTime": "2024-05-21T12:28:21.042848+00:00", "EventTime": "2024-05-21T12:28:21.042866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEck962BVDcBphryQc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "3f3ad64a-c188-48c9-95cc-5051f350c53c", "DetectTime": "2024-05-21T12:28:21.200749+00:00", "EventTime": "2024-05-21T12:28:21.200777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjwtYM1CqORNh8jtea"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "5637a38f-cba7-4953-8369-a6a7cdf494ee", "DetectTime": "2024-05-21T12:28:21.205941+00:00", "EventTime": "2024-05-21T12:28:21.205961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUegw2j7IQa28y9N"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "337d0a17-ae3d-46c9-88c3-710bbb31ff50", "DetectTime": "2024-05-21T12:28:21.217104+00:00", "EventTime": "2024-05-21T12:28:21.217122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25400/UDP destination IP 122.174.187.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2BCxh2bxBw7Zp9"], "accumulated_threat_level": 1.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "61123267-26d5-4c6c-8312-eb2530611b2a", "DetectTime": "2024-05-21T12:28:21.271456+00:00", "EventTime": "2024-05-21T12:28:21.271477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChlRn24YzHm7msRYK1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 42} +{"Format": "IDEA0", "ID": "2068ea29-d6c1-4a0c-838a-31bbac44199d", "DetectTime": "2024-05-21T12:28:21.304000+00:00", "EventTime": "2024-05-21T12:28:21.304018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVYZh2WN6UBxZ5IE7"], "accumulated_threat_level": 3.2, "timewindow": 42} +{"Format": "IDEA0", "ID": "c2b49933-7d4d-4521-97ca-f6ba04733ea5", "DetectTime": "2024-05-21T12:28:21.352465+00:00", "EventTime": "2024-05-21T12:28:21.352484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nHpbsMfyLYfwzre"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "d892f290-b50f-432d-9b84-2df41ffbb2eb", "DetectTime": "2024-05-21T12:28:21.381749+00:00", "EventTime": "2024-05-21T12:28:21.381770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwUSh1oT9Tp6iDRbi"], "accumulated_threat_level": 4.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "458a54b6-d2ea-4117-ab1a-114a37b14afb", "DetectTime": "2024-05-21T12:28:21.419454+00:00", "EventTime": "2024-05-21T12:28:21.419478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYwyNzdElbwBsxg1"], "accumulated_threat_level": 4.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "efcf029e-b850-45ba-bed3-f4525d4603fc", "DetectTime": "2024-05-21T12:28:21.445448+00:00", "EventTime": "2024-05-21T12:28:21.445469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarF932G0dT78drUBb"], "accumulated_threat_level": 5.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "5370d099-c365-470e-a8b3-5455a1449351", "DetectTime": "2024-05-21T12:28:21.464594+00:00", "EventTime": "2024-05-21T12:28:21.464613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjFon5Ct03KYK9ph"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "e0fa8a5e-8cdc-4ec0-9d27-f2a884dff0f3", "DetectTime": "2024-05-21T12:28:21.498952+00:00", "EventTime": "2024-05-21T12:28:21.498971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4D5JE1MY58UwL5kFl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 42} +{"Format": "IDEA0", "ID": "39788be1-f6f0-4053-ba72-5301c5d2e11b", "DetectTime": "2024-05-21T12:28:21.517878+00:00", "EventTime": "2024-05-21T12:28:21.517899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJr3rgCaHUau0xUx"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "c377ef6f-fcbe-4658-a7fa-802cd76e9ae4", "DetectTime": "2024-05-21T12:28:21.550439+00:00", "EventTime": "2024-05-21T12:28:21.550459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxbVBS3HxPsIl5PR63"], "accumulated_threat_level": 7.199999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "7c57464e-e4cd-4df7-bc92-755ca6669ca8", "DetectTime": "2024-05-21T12:28:21.564991+00:00", "EventTime": "2024-05-21T12:28:21.565010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN3aT328cyXO1yOJJj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "0bdb33ad-889b-4a32-b21d-49697ed2c1e7", "DetectTime": "2024-05-21T12:28:21.591393+00:00", "EventTime": "2024-05-21T12:28:21.591412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChEm2J1eOETg7YG5K2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "4f98a437-8fa8-4afb-b15f-b452aec29048", "DetectTime": "2024-05-21T12:28:21.620707+00:00", "EventTime": "2024-05-21T12:28:21.620725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oopm24T5Xyiyh2ne"], "accumulated_threat_level": 8.799999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "1ce99c39-d77c-425e-a0d0-2c33ffbe59d6", "DetectTime": "2024-05-21T12:28:21.641834+00:00", "EventTime": "2024-05-21T12:28:21.641852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfMZVkGYcOphzaDh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "8caa18a6-dc36-479c-8ced-26f9a8bc49aa", "DetectTime": "2024-05-21T12:28:21.694821+00:00", "EventTime": "2024-05-21T12:28:21.694838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5sS5Gq3ZakNlTbok"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "b854e560-4c12-42d1-b5e5-6a2fee7cbf76", "DetectTime": "2024-05-21T12:28:21.768065+00:00", "EventTime": "2024-05-21T12:28:21.768084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIOZM2ONg6EkbxQL6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "8657e7d0-9980-4b77-af24-91e39b88ea77", "DetectTime": "2024-05-21T12:28:22.049628+00:00", "EventTime": "2024-05-21T12:28:22.049651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqhaVb3ChmQ9zzr8n2"], "accumulated_threat_level": 9.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "743a453a-fed3-459e-a226-bb3694427d22", "DetectTime": "2024-05-21T12:28:22.067890+00:00", "EventTime": "2024-05-21T12:28:22.067912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyW2UEmM6nnhi51x6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "00bacc85-0951-415b-bd7d-5bc892a565d5", "DetectTime": "2024-05-21T12:28:22.119878+00:00", "EventTime": "2024-05-21T12:28:22.119897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"]}], "Attach": [{"Content": "Connection to unknown destination port 4286/UDP destination IP 42.61.221.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSsZ0JMT0i6dD3mP3"], "accumulated_threat_level": 10.4, "timewindow": 42} +{"Format": "IDEA0", "ID": "cec3f144-214f-4a14-92b6-931cc97de48d", "DetectTime": "2024-05-21T12:28:22.148091+00:00", "EventTime": "2024-05-21T12:28:22.148112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1y0Ib13cyWsyq8Hn3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "4e4a1b1d-6c19-41dd-994e-ccec0496ebce", "DetectTime": "2024-05-21T12:28:22.298255+00:00", "EventTime": "2024-05-21T12:28:22.298276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8l8x2EdBUIy9cRzk"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "0215e8a2-12bb-4789-9aa0-d48a02938da2", "DetectTime": "2024-05-21T12:28:22.319302+00:00", "EventTime": "2024-05-21T12:28:22.319321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwv26Y15WBA1N1R4yk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 42} +{"Format": "IDEA0", "ID": "8d66002a-cbfb-4602-a62c-e3ecf526e538", "DetectTime": "2024-05-21T12:28:22.324024+00:00", "EventTime": "2024-05-21T12:28:22.324043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2z15a3CKWKuZ8e0Xa"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "bb3661db-08ae-47e0-a18f-d14e3b2eb709", "DetectTime": "2024-05-21T12:28:22.369782+00:00", "EventTime": "2024-05-21T12:28:22.369802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVw9Yp12Z826ufvTdd"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "4f914ff2-27df-4a2c-a1e9-014bdbef0e25", "DetectTime": "2024-05-21T12:28:22.399375+00:00", "EventTime": "2024-05-21T12:28:22.399395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxvfKrUUIeUNBevk"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "7ab59c65-f8dc-4cef-882d-84b22301837a", "DetectTime": "2024-05-21T12:28:22.410507+00:00", "EventTime": "2024-05-21T12:28:22.410526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTDsJ81eIJ2siPyK9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 42} +{"Format": "Json", "ID": "7ab59c65-f8dc-4cef-882d-84b22301837a", "DetectTime": "2024-05-21T12:28:22.410507+00:00", "EventTime": "2024-05-21T12:28:22.410526+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "1970-01-02T17:22:58.412762+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:28:22.563233)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "461a9a0b-9fb8-4a2e-8884-a3fad4722811", "DetectTime": "2024-05-21T12:28:22.567280+00:00", "EventTime": "2024-05-21T12:28:22.567298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAm4NC1kq4Dh93T3rc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "5b6f2a72-c21b-492e-9b3e-ae588ba035d9", "DetectTime": "2024-05-21T12:28:22.700447+00:00", "EventTime": "2024-05-21T12:28:22.700469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6Bhw44OV0oKgYPI7"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "4f346bc0-fab0-497c-afed-c0ab3293cca0", "DetectTime": "2024-05-21T12:28:22.740498+00:00", "EventTime": "2024-05-21T12:28:22.740518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2U9SE4XFr8dNtGLD6"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "7e386b43-07d9-4d12-8e72-bd1da9e6705c", "DetectTime": "2024-05-21T12:28:22.745673+00:00", "EventTime": "2024-05-21T12:28:22.745693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDg1A1DncIcoiAhI2"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "b4ccb648-2af9-4183-9fd5-4fe51d65542a", "DetectTime": "2024-05-21T12:28:22.757420+00:00", "EventTime": "2024-05-21T12:28:22.757441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNC6Pf2S8STrvzfXH1"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "8529b16d-dff1-484c-a6b4-22a6d141c24e", "DetectTime": "2024-05-21T12:28:22.800596+00:00", "EventTime": "2024-05-21T12:28:22.800614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzSUa36jsMIrXQ6lc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "f5b2923e-b446-4b2c-8ea2-12024b0f2b28", "DetectTime": "2024-05-21T12:28:22.821615+00:00", "EventTime": "2024-05-21T12:28:22.821636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISdqo42zq9SFoVACc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "44cbe78d-8d35-46aa-82b7-f3d460dc26c8", "DetectTime": "2024-05-21T12:28:22.826551+00:00", "EventTime": "2024-05-21T12:28:22.826570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdGHe2hl45H8qGIlf"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "8bf86d97-4d77-4adb-9a41-c24ca166da05", "DetectTime": "2024-05-21T12:28:22.831254+00:00", "EventTime": "2024-05-21T12:28:22.831273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrXgiI29kHpOZAoXzc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "f092ad40-fe7c-42a8-bd88-91a84fbe8a29", "DetectTime": "2024-05-21T12:28:22.839427+00:00", "EventTime": "2024-05-21T12:28:22.839445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJQc02J9pqWUGF2O3"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "3143b398-f723-4554-8359-e112e746e32b", "DetectTime": "2024-05-21T12:28:22.927375+00:00", "EventTime": "2024-05-21T12:28:22.927395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HV6G2bZtL2mzGCvl"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "27258036-c942-475a-ae73-1d03cabd9933", "DetectTime": "2024-05-21T12:28:22.932762+00:00", "EventTime": "2024-05-21T12:28:22.932781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr2aT1UcklLj87L61"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "48bdc70d-cc62-41fc-a34b-f5b89f9806db", "DetectTime": "2024-05-21T12:28:22.949237+00:00", "EventTime": "2024-05-21T12:28:22.949259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EHBH2KAYTc4QfUDj"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "9f13b5b1-0dd4-47b9-a395-dcd780fa541f", "DetectTime": "2024-05-21T12:28:22.991830+00:00", "EventTime": "2024-05-21T12:28:22.991852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3eGUO4Lj1mbmuLg"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "032d7a73-aa91-4590-9289-c51dd3ea0dd4", "DetectTime": "2024-05-21T12:28:23.010309+00:00", "EventTime": "2024-05-21T12:28:23.010329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjuF91ZJvAsHpy0f"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "fd905d04-07ee-43b8-ab3f-d4dad9d430a6", "DetectTime": "2024-05-21T12:28:23.028999+00:00", "EventTime": "2024-05-21T12:28:23.029021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhrAI35IkToz7RbNb"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "769f8d33-75ce-408a-88b2-186fc1921c3d", "DetectTime": "2024-05-21T12:28:23.046033+00:00", "EventTime": "2024-05-21T12:28:23.046055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmohRZT69xjhKSWFi"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "a622cfcf-4ab5-4bbb-a29e-cd9d27be5b3e", "DetectTime": "2024-05-21T12:28:23.074897+00:00", "EventTime": "2024-05-21T12:28:23.074920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQk45i4tQSpGnQZmna"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "a203bc7b-0fd3-45bd-92cb-907a9c3e3b2f", "DetectTime": "2024-05-21T12:28:23.082627+00:00", "EventTime": "2024-05-21T12:28:23.082648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROPYmF9Z1JS8XFi4"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "1d636fbe-313c-4b5f-8ded-1b6eb60453e4", "DetectTime": "2024-05-21T12:28:23.142375+00:00", "EventTime": "2024-05-21T12:28:23.142394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3Q1y2dtNI1tUA3g8"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "164204dd-572b-4220-a355-b3b0e8b23fa9", "DetectTime": "2024-05-21T12:28:23.183585+00:00", "EventTime": "2024-05-21T12:28:23.183607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnq9z4dkPfXw9zRfh"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "63f0e4b5-aa7b-456d-97ee-f61618bb4057", "DetectTime": "2024-05-21T12:28:23.209372+00:00", "EventTime": "2024-05-21T12:28:23.209392+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.232.21.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3Owg1Z590vy476a"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "c36eae48-8ba9-42be-8bd1-f5cf31eafd14", "DetectTime": "2024-05-21T12:28:23.223369+00:00", "EventTime": "2024-05-21T12:28:23.223390+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.232.21.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.232.21.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3Owg1Z590vy476a"], "accumulated_threat_level": 8.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "fabc3394-8c58-42d7-80af-47c88d7eb42f", "DetectTime": "2024-05-21T12:28:23.238013+00:00", "EventTime": "2024-05-21T12:28:23.238034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYGea1OaEad7x1DR3"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "4d17fa2b-15b1-43c9-9c65-928a1274aab0", "DetectTime": "2024-05-21T12:28:23.259083+00:00", "EventTime": "2024-05-21T12:28:23.259107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1x8m199cQqP1prvc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "711c5b64-8a5d-420e-a9ed-178b39c90428", "DetectTime": "2024-05-21T12:28:23.290435+00:00", "EventTime": "2024-05-21T12:28:23.290455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOwfsNltzFdtG0Kl"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "27ee773f-ba9d-4ff5-9423-3371ead5eca1", "DetectTime": "2024-05-21T12:28:23.295038+00:00", "EventTime": "2024-05-21T12:28:23.295057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xGIF4KWAI8SW5I1g"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "51dc3306-4a2e-4b1b-b22b-f61083c32899", "DetectTime": "2024-05-21T12:28:23.299457+00:00", "EventTime": "2024-05-21T12:28:23.299474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE9wnq1W5Q0Ztukk4b"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "df36a31e-5766-4f96-a639-fd1c1d4b341a", "DetectTime": "2024-05-21T12:28:23.534973+00:00", "EventTime": "2024-05-21T12:28:23.534996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmdvr2UKLHDJVLeX1"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "c5b568bc-a195-4bed-9e27-fec4f5027ac5", "DetectTime": "2024-05-21T12:28:23.566762+00:00", "EventTime": "2024-05-21T12:28:23.566780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Epc3Z5NQpovV7B3"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "8a399264-7b08-4380-9e27-3a3ee382d95f", "DetectTime": "2024-05-21T12:28:23.602976+00:00", "EventTime": "2024-05-21T12:28:23.602994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4uQfA90BwTJFUzh"], "accumulated_threat_level": 1.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "2cc35c0d-6da5-4870-ad70-57bb13529033", "DetectTime": "2024-05-21T12:28:23.683539+00:00", "EventTime": "2024-05-21T12:28:23.683559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmeQuG2aoxoDabO6Ob"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "3030b575-161b-4a6c-9231-4be1d2cb9f48", "DetectTime": "2024-05-21T12:28:23.758049+00:00", "EventTime": "2024-05-21T12:28:23.758069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2Ks42hfgojCz5HWl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 42} +{"Format": "IDEA0", "ID": "e9e0ac5a-017e-488f-93d9-212820e83772", "DetectTime": "2024-05-21T12:28:23.934957+00:00", "EventTime": "2024-05-21T12:28:23.934979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.103.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDiUd2SnTZ6BXrdse"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "6721033a-652e-4c7a-8334-92d4bf4f4bf0", "DetectTime": "2024-05-21T12:28:23.972343+00:00", "EventTime": "2024-05-21T12:28:23.972363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYiPh2nMmhGwBPvX5"], "accumulated_threat_level": 3.2, "timewindow": 42} +{"Format": "IDEA0", "ID": "3cec3031-bcc8-4843-8c64-936447973415", "DetectTime": "2024-05-21T12:28:24.003831+00:00", "EventTime": "2024-05-21T12:28:24.003854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 18100/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0Jom3yKlQEGl6Duj"], "accumulated_threat_level": 4.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "ed813f8e-2313-41f6-8ab9-e463eff94613", "DetectTime": "2024-05-21T12:28:24.032649+00:00", "EventTime": "2024-05-21T12:28:24.032667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbt47NXlg3B8C63j"], "accumulated_threat_level": 4.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "2ad8e578-a501-40a2-b702-f07bc8041ea1", "DetectTime": "2024-05-21T12:28:24.068029+00:00", "EventTime": "2024-05-21T12:28:24.068049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJ9gy2yLED9ywttjb"], "accumulated_threat_level": 5.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "49002e47-c771-4973-a3ca-d87439d2c91c", "DetectTime": "2024-05-21T12:28:24.082212+00:00", "EventTime": "2024-05-21T12:28:24.082233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjtf8647L6y3jKiUwl"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "d3d5aa78-35d4-49ee-87db-05139ba5c991", "DetectTime": "2024-05-21T12:28:24.113134+00:00", "EventTime": "2024-05-21T12:28:24.113152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mH4gyDVhfoSoNLl"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "5fcae2c8-9c50-4ec8-8129-c05f978c7ee8", "DetectTime": "2024-05-21T12:28:24.138579+00:00", "EventTime": "2024-05-21T12:28:24.138599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxUeG31HxsLcayBmbc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "b83fee5e-13dd-49dc-ae19-0c0b8c046054", "DetectTime": "2024-05-21T12:28:24.176465+00:00", "EventTime": "2024-05-21T12:28:24.176486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGq4jZ3v8FxUTZ3Cfb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 42} +{"Format": "IDEA0", "ID": "8687f8af-b633-47ca-9540-33209853c47c", "DetectTime": "2024-05-21T12:28:24.186272+00:00", "EventTime": "2024-05-21T12:28:24.186292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhYuD36ZkGPjqRMM4"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "93ededfa-4b27-470c-b8c5-d7b36fd45a60", "DetectTime": "2024-05-21T12:28:24.212753+00:00", "EventTime": "2024-05-21T12:28:24.212774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTITHZgZjKQO0uBAa"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "96b6968d-a20a-4fee-8d66-75c21f2d631c", "DetectTime": "2024-05-21T12:28:24.241096+00:00", "EventTime": "2024-05-21T12:28:24.241117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5jRD3vyoW6Imkfzd"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "0e54baf9-be7b-4131-a544-5b9d4f666235", "DetectTime": "2024-05-21T12:28:24.277429+00:00", "EventTime": "2024-05-21T12:28:24.277449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COCutD34ukO6zUic3g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "d0ed013e-f765-440f-b2dd-5f39cf745fff", "DetectTime": "2024-05-21T12:28:24.299315+00:00", "EventTime": "2024-05-21T12:28:24.299336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyG3Fx1B132fDfahdj"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "9ac948ac-febd-48f9-b27e-5fe7ee7eb421", "DetectTime": "2024-05-21T12:28:24.328323+00:00", "EventTime": "2024-05-21T12:28:24.328344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfT0MO2MHlKd5A3EAf"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "6ecc1340-ff25-492f-8a44-3a799c8ddb00", "DetectTime": "2024-05-21T12:28:24.352142+00:00", "EventTime": "2024-05-21T12:28:24.352159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRfSC1Coisi4CXcBi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "07ec21f1-a3cd-459a-9e9b-b5b152e47992", "DetectTime": "2024-05-21T12:28:24.372073+00:00", "EventTime": "2024-05-21T12:28:24.372095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvvs693BbUawkNvN49"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "32d418b1-f3d0-4211-9efd-9b3ef855e85a", "DetectTime": "2024-05-21T12:28:24.423922+00:00", "EventTime": "2024-05-21T12:28:24.423943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.229.42"]}], "Attach": [{"Content": "Connection to unknown destination port 13870/UDP destination IP 92.54.229.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctb7KgeYeM1AWlqDc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "ded0a0e8-cf8d-4a01-84ec-8e5d7b9a0ad8", "DetectTime": "2024-05-21T12:28:24.451593+00:00", "EventTime": "2024-05-21T12:28:24.451613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfooJ3VJBN14aAapb"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "c552646f-2744-43a3-80d3-20d2413ee6bb", "DetectTime": "2024-05-21T12:28:24.481043+00:00", "EventTime": "2024-05-21T12:28:24.481061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIviAN3deSphYUQ9Z2"], "accumulated_threat_level": 9.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "01233e8b-fa02-4d7a-b565-08a6e767852e", "DetectTime": "2024-05-21T12:28:24.582415+00:00", "EventTime": "2024-05-21T12:28:24.582438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48rbo4zhUHhFS2s57"], "accumulated_threat_level": 10.4, "timewindow": 42} +{"Format": "IDEA0", "ID": "c1bc4669-3945-4f3a-b3ce-d03068c8c9ac", "DetectTime": "2024-05-21T12:28:24.683673+00:00", "EventTime": "2024-05-21T12:28:24.683692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgE3w3xJmGUcVTjo"], "accumulated_threat_level": 11.200000000000001, "timewindow": 42} +{"Format": "IDEA0", "ID": "0b3a2b32-b40a-49f1-aa59-d1ae8995417a", "DetectTime": "2024-05-21T12:28:24.716751+00:00", "EventTime": "2024-05-21T12:28:24.716773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8c1ZB19VNbQURgg5h"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "9e710fc1-07a5-4d74-9f12-ec15961f12bd", "DetectTime": "2024-05-21T12:28:24.767296+00:00", "EventTime": "2024-05-21T12:28:24.767315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "Connection to unknown destination port 21005/UDP destination IP 41.108.40.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSAmT36jfOpwH8hj5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 42} +{"Format": "Json", "ID": "9e710fc1-07a5-4d74-9f12-ec15961f12bd", "DetectTime": "2024-05-21T12:28:24.767296+00:00", "EventTime": "2024-05-21T12:28:24.767315+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "1970-01-02T17:26:01.103700+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:28:24.937791)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d2912234-25fb-43f1-b424-2855964d31e1", "DetectTime": "2024-05-21T12:28:25.017615+00:00", "EventTime": "2024-05-21T12:28:25.017637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAozo2UEHy9E2u9c"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "2d82d55c-491c-495d-8983-e9b494ed0884", "DetectTime": "2024-05-21T12:28:25.022295+00:00", "EventTime": "2024-05-21T12:28:25.022313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUeaAQ31hZLLxxYK1k"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "f9dc532b-5234-445c-8c9c-f139ee01e840", "DetectTime": "2024-05-21T12:28:25.027023+00:00", "EventTime": "2024-05-21T12:28:25.027042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFkOB1QBtb4jK54Bg"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "ddf18f39-7a07-4422-9b01-7b9d533ac15f", "DetectTime": "2024-05-21T12:28:25.070469+00:00", "EventTime": "2024-05-21T12:28:25.070490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDPew73yLJIBoOhUAi"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "b116432c-eb14-4fff-85c9-a8b9a5bf15e2", "DetectTime": "2024-05-21T12:28:25.102586+00:00", "EventTime": "2024-05-21T12:28:25.102606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTiN6G1Q9HTT0hFvSj"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "4f301ba2-484a-4aa6-9fe5-73a2a1f22a96", "DetectTime": "2024-05-21T12:28:25.114501+00:00", "EventTime": "2024-05-21T12:28:25.114522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZa0qZpVj6v0JKmc8"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "1d69adfc-4387-4b63-a7d1-91385fb65fd9", "DetectTime": "2024-05-21T12:28:25.138914+00:00", "EventTime": "2024-05-21T12:28:25.138935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5cGR2hN2QGmA8VAd"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "227812b5-8fac-458d-98d5-0f4946416819", "DetectTime": "2024-05-21T12:28:25.219034+00:00", "EventTime": "2024-05-21T12:28:25.219057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccw3nC4UPSQtDBoFr2"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "1c6fd294-4a71-49cb-8f37-4eb4f5945d77", "DetectTime": "2024-05-21T12:28:25.230347+00:00", "EventTime": "2024-05-21T12:28:25.230365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"]}], "Attach": [{"Content": "Connection to unknown destination port 29021/UDP destination IP 200.25.212.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwmcmw4N9Nn1YYZOue"], "accumulated_threat_level": 1.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "89557125-cd8c-4eea-bcfc-42840be4c2fe", "DetectTime": "2024-05-21T12:28:25.262688+00:00", "EventTime": "2024-05-21T12:28:25.262709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMZWe2Rniif33poCe"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "8c10edaa-d9db-4bc5-b6a9-16d780e1b926", "DetectTime": "2024-05-21T12:28:25.317236+00:00", "EventTime": "2024-05-21T12:28:25.317256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbA8G1G0Pg5zOeyNd"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "e0a9e5f7-5850-4d08-a108-fa308adbaeb8", "DetectTime": "2024-05-21T12:28:25.322148+00:00", "EventTime": "2024-05-21T12:28:25.322168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmPQn2sHOg5s1xSfi"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "8a1fe7ba-dd8b-4a2a-b6da-17102d76f7b4", "DetectTime": "2024-05-21T12:28:25.327523+00:00", "EventTime": "2024-05-21T12:28:25.327542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwD41p1chGbMPdkfE4"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "67091767-92b5-47ec-ba06-b3f2f330ffb9", "DetectTime": "2024-05-21T12:28:25.386209+00:00", "EventTime": "2024-05-21T12:28:25.386230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYRf61rehWiG35LVe"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "11a90289-0696-48a2-b064-551e80de03b0", "DetectTime": "2024-05-21T12:28:25.416866+00:00", "EventTime": "2024-05-21T12:28:25.416887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUtxS2xozjK41MuWc"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "88722c0a-b4da-40c7-b597-4adbdc565840", "DetectTime": "2024-05-21T12:28:25.433094+00:00", "EventTime": "2024-05-21T12:28:25.433117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEagY3imjeCXWyNAh"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "28001fa5-f6d8-45d3-9ab6-cbb355f3d8e2", "DetectTime": "2024-05-21T12:28:25.574533+00:00", "EventTime": "2024-05-21T12:28:25.574553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.134.36.148"]}], "Attach": [{"Content": "Connection to unknown destination port 8025/UDP destination IP 189.134.36.148. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJerfG2HWwCeoxILZ"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 42} +{"Format": "IDEA0", "ID": "f1ccd0d1-8561-4935-8202-72639e30a136", "DetectTime": "2024-05-21T12:28:25.745822+00:00", "EventTime": "2024-05-21T12:28:25.745842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWh2Crd2aQ6na9XH7"], "accumulated_threat_level": 3.2, "timewindow": 42} +{"Format": "IDEA0", "ID": "e083961f-f117-44e6-8a59-0624eda13ba7", "DetectTime": "2024-05-21T12:28:25.791633+00:00", "EventTime": "2024-05-21T12:28:25.791655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbnSnpxOBuuISAWe"], "accumulated_threat_level": 4.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "62530be6-0536-44c5-8a3d-70e9edb7d9ee", "DetectTime": "2024-05-21T12:28:25.805113+00:00", "EventTime": "2024-05-21T12:28:25.805134+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.224.242.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVuoz2JuRoXDwfOp8"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "dfaaa3b4-c60f-4a18-b7ec-ed93f78f1855", "DetectTime": "2024-05-21T12:28:25.816547+00:00", "EventTime": "2024-05-21T12:28:25.816565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.224.242.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.224.242.149 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVuoz2JuRoXDwfOp8"], "accumulated_threat_level": 8.7, "timewindow": 16} +{"Format": "IDEA0", "ID": "1ef5ba18-5e56-451e-b6f0-c1f8cf4ce3e1", "DetectTime": "2024-05-21T12:28:25.871725+00:00", "EventTime": "2024-05-21T12:28:25.871747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.190.199"]}], "Attach": [{"Content": "Connection to unknown destination port 1554/UDP destination IP 176.73.190.199. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcKitwCeb5DL4GB2"], "accumulated_threat_level": 4.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "68e2ffd2-6aa1-4370-8583-b4722a1475cc", "DetectTime": "2024-05-21T12:28:25.884029+00:00", "EventTime": "2024-05-21T12:28:25.884049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32GPX1Z2Xpue8H6x8"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "9d68d802-dc7a-4440-b1f0-d4bedd049022", "DetectTime": "2024-05-21T12:28:26.046596+00:00", "EventTime": "2024-05-21T12:28:26.046618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQM142SaJNYkt48ci"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "3fa60428-5ddb-4164-93a9-8d2d9d2b2879", "DetectTime": "2024-05-21T12:28:26.094135+00:00", "EventTime": "2024-05-21T12:28:26.094157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadUSH3i5lAcNa53J6"], "accumulated_threat_level": 5.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "d3697580-3fb6-4854-bf29-4b0c4bf05666", "DetectTime": "2024-05-21T12:28:26.119640+00:00", "EventTime": "2024-05-21T12:28:26.119660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JQrQ1iZTcumde8I"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "83082b22-5b99-4a31-ab78-3bdbab38545b", "DetectTime": "2024-05-21T12:28:26.151605+00:00", "EventTime": "2024-05-21T12:28:26.151626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAm9j4zQuuXyMaATf"], "accumulated_threat_level": 10.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "95ed2d2f-4bb0-472f-8c12-d52eb7349a14", "DetectTime": "2024-05-21T12:28:26.305074+00:00", "EventTime": "2024-05-21T12:28:26.305094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.88.132.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6924/UDP destination IP 178.88.132.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIL8w2DuNGG1bBKQ8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 42} +{"Format": "IDEA0", "ID": "7ec9f96a-b66a-4f16-9de1-89b2b1ccfba7", "DetectTime": "2024-05-21T12:28:26.314182+00:00", "EventTime": "2024-05-21T12:28:26.314199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpILs4RPjNekCW68k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "12930631-dc86-4af1-8594-bf462081c0b6", "DetectTime": "2024-05-21T12:28:26.342211+00:00", "EventTime": "2024-05-21T12:28:26.342233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoaicF7nseDK1IPXd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "b186a30e-214c-414f-ae9d-35728f6d8e8b", "DetectTime": "2024-05-21T12:28:26.622318+00:00", "EventTime": "2024-05-21T12:28:26.622338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2Z8sT9bZoOLMIK8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "d4bd7da5-22a5-4b54-a83c-7a99ccae9774", "DetectTime": "2024-05-21T12:28:26.676515+00:00", "EventTime": "2024-05-21T12:28:26.676534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8yXd1Xyjgo7V1vJ6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "b4124d8a-f22d-4886-a0f2-8434037251f8", "DetectTime": "2024-05-21T12:28:26.681482+00:00", "EventTime": "2024-05-21T12:28:26.681501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cryw0d3kRNL4Fgglb6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "be15ca21-8fd4-44b9-bc10-f19e00ed130f", "DetectTime": "2024-05-21T12:28:26.686352+00:00", "EventTime": "2024-05-21T12:28:26.686374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR40tv1nApHNxfc9Md"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "f0e3ec89-e465-4cb3-8731-9a870119b8d3", "DetectTime": "2024-05-21T12:28:26.692083+00:00", "EventTime": "2024-05-21T12:28:26.692104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YwlB25S8XpyBDuoi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "4918cdf1-8b30-4744-8b8a-1fa12ac26718", "DetectTime": "2024-05-21T12:28:26.710258+00:00", "EventTime": "2024-05-21T12:28:26.710276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtgcQg1gBRSPZK7cY5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "ef94e7cb-f29d-4b71-94ac-df55cb985a0d", "DetectTime": "2024-05-21T12:28:26.735948+00:00", "EventTime": "2024-05-21T12:28:26.735971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UR2J2BqxcRI1SN3j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "8ee9f1be-4db8-4fe7-8236-5f6ee43c7549", "DetectTime": "2024-05-21T12:28:26.752748+00:00", "EventTime": "2024-05-21T12:28:26.752768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIRIXyybvK5QSVnc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "6ba2b74e-dcbd-41ba-a934-b09f3b0707f0", "DetectTime": "2024-05-21T12:28:26.789487+00:00", "EventTime": "2024-05-21T12:28:26.789506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEbCAwkaclpCTQH"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "760cf0a8-8b1a-49a1-8cd1-824e9f96293d", "DetectTime": "2024-05-21T12:28:26.833176+00:00", "EventTime": "2024-05-21T12:28:26.833196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjIzM1jqvnmNymfVk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "65c5e0e5-9926-4764-8029-f3db67ac8bf1", "DetectTime": "2024-05-21T12:28:26.838879+00:00", "EventTime": "2024-05-21T12:28:26.838901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2F3Y2YdWgBxxGNv9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "2689bf05-e877-472e-beb6-af796a079f36", "DetectTime": "2024-05-21T12:28:26.893757+00:00", "EventTime": "2024-05-21T12:28:26.893779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezJMHb5yGYUKx9Bj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "82a90c16-a4b0-412c-bc16-90778c8b88fd", "DetectTime": "2024-05-21T12:28:27.006184+00:00", "EventTime": "2024-05-21T12:28:27.006205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHgzQrAvcm0X8ih5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "1ac02f9c-745a-4825-9e3d-5159012dbf05", "DetectTime": "2024-05-21T12:28:27.254946+00:00", "EventTime": "2024-05-21T12:28:27.254969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3858C33DpioC8JzH8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "e2d1af8b-68ca-40dd-bf45-a1661491ac05", "DetectTime": "2024-05-21T12:28:27.297733+00:00", "EventTime": "2024-05-21T12:28:27.297753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZxWpGlwfgljx0d2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "dc3694ae-6c10-4b40-a461-cc8b21fa64c0", "DetectTime": "2024-05-21T12:28:27.325810+00:00", "EventTime": "2024-05-21T12:28:27.325831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wQAr3ng6v15wjIC5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "e57f3889-5e48-4441-9b5e-d5e9046c79b1", "DetectTime": "2024-05-21T12:28:27.361166+00:00", "EventTime": "2024-05-21T12:28:27.361187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQDdH6kZ4sVscse1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "e3a52bdd-cd87-420c-bbd9-e991cafc2746", "DetectTime": "2024-05-21T12:28:27.394070+00:00", "EventTime": "2024-05-21T12:28:27.394090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.73.4.190"]}], "Attach": [{"Content": "Connection to unknown destination port 7557/UDP destination IP 180.73.4.190. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRe2x1h9S6aTR6us1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "e71fcd2d-5879-4613-8144-1c6221daac06", "DetectTime": "2024-05-21T12:28:27.424556+00:00", "EventTime": "2024-05-21T12:28:27.424578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAh0Kko4RyFKqi8Jb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "1008a94e-0bb0-401a-92f5-2b966c02b581", "DetectTime": "2024-05-21T12:28:27.445489+00:00", "EventTime": "2024-05-21T12:28:27.445510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEVkz2tILGk73Jtq8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "70d1288b-a383-417c-ae00-aede9f930c63", "DetectTime": "2024-05-21T12:28:27.541311+00:00", "EventTime": "2024-05-21T12:28:27.541331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "Connection to unknown destination port 24967/UDP destination IP 180.254.84.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEpou1hQO0fC2P35c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 42} +{"Format": "IDEA0", "ID": "48cdf899-fb27-4303-babe-e6e5cd5a097d", "DetectTime": "2024-05-21T12:28:27.575547+00:00", "EventTime": "2024-05-21T12:28:27.575567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChGYJN1l7q1oTZSnKf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "018839a6-dc96-4a49-be69-e4b01591983e", "DetectTime": "2024-05-21T12:28:27.657293+00:00", "EventTime": "2024-05-21T12:28:27.657313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA974A35GHteQa1Kge"], "accumulated_threat_level": 9.6, "timewindow": 42} +{"Format": "IDEA0", "ID": "a13c94d7-e6db-44d4-a779-ee8d951b007c", "DetectTime": "2024-05-21T12:28:27.678001+00:00", "EventTime": "2024-05-21T12:28:27.678020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9MJmyZq6qi6LxNb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "9b1e8d74-7732-4650-b61b-bb0cd39d5b89", "DetectTime": "2024-05-21T12:28:27.817638+00:00", "EventTime": "2024-05-21T12:28:27.817656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiT89B1wOqnVl5RmSd"], "accumulated_threat_level": 10.4, "timewindow": 42} +{"Format": "IDEA0", "ID": "0563168a-c055-4db8-a938-44308a008e76", "DetectTime": "2024-05-21T12:28:28.044308+00:00", "EventTime": "2024-05-21T12:28:28.044330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtehkY2i8ziNbkFBug"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "9a6c5ba4-918b-4efa-b9c7-0ba803c71f30", "DetectTime": "2024-05-21T12:28:28.122106+00:00", "EventTime": "2024-05-21T12:28:28.122128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.189.109.9"]}], "Attach": [{"Content": "Connection to unknown destination port 25218/UDP destination IP 78.189.109.9. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COob4x1wuh28D2AtBd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 42} +{"Format": "IDEA0", "ID": "e1d7041f-6954-42e8-b790-8a3957afd4d9", "DetectTime": "2024-05-21T12:28:28.175240+00:00", "EventTime": "2024-05-21T12:28:28.175260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRa1S1kDVX3ulZ3qc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 42} +{"Format": "Json", "ID": "e1d7041f-6954-42e8-b790-8a3957afd4d9", "DetectTime": "2024-05-21T12:28:28.175240+00:00", "EventTime": "2024-05-21T12:28:28.175260+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "1970-01-02T17:31:09.166634+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:28:28.404520)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e2a98638-8f6b-4a49-8cdd-464750a096e4", "DetectTime": "2024-05-21T12:28:28.459480+00:00", "EventTime": "2024-05-21T12:28:28.459501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxpbxy13y7otP7xol5"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "0d1a52b6-26b4-4c44-855f-9cb28659aaf7", "DetectTime": "2024-05-21T12:28:28.466531+00:00", "EventTime": "2024-05-21T12:28:28.466555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBg65290s9ng2xrm8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "8aab3071-1b9e-4029-b9b4-b3b46a202fba", "DetectTime": "2024-05-21T12:28:28.479522+00:00", "EventTime": "2024-05-21T12:28:28.479540+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.237.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2w5kh4p3Y5EqWHaH5"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "e1625fad-cb49-4a31-8ebc-c40d0e969457", "DetectTime": "2024-05-21T12:28:28.499488+00:00", "EventTime": "2024-05-21T12:28:28.499515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.237.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.237.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2w5kh4p3Y5EqWHaH5"], "accumulated_threat_level": 9.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "56a55342-5c29-4b4e-a0c2-5c702b780ffc", "DetectTime": "2024-05-21T12:28:28.505280+00:00", "EventTime": "2024-05-21T12:28:28.505300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDVAUJ26KSp0PTDeEb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "561b94d1-d45f-41e9-a10f-f86735797055", "DetectTime": "2024-05-21T12:28:28.510017+00:00", "EventTime": "2024-05-21T12:28:28.510035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPiUF2hdtaGVbSZU"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "9a106ff5-4fef-45af-8960-5f5e8b43d1e2", "DetectTime": "2024-05-21T12:28:28.514594+00:00", "EventTime": "2024-05-21T12:28:28.514613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzQI93zEmXFJd26Y"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "c849ad3b-c751-4066-a900-340c9a7eda3d", "DetectTime": "2024-05-21T12:28:28.550294+00:00", "EventTime": "2024-05-21T12:28:28.550314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhs5F497Qpbxc4dr2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "67da6ddb-355a-4260-898c-323e51dcea5b", "DetectTime": "2024-05-21T12:28:28.789864+00:00", "EventTime": "2024-05-21T12:28:28.789886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeCno0478iYg8t3SZa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "39609153-07ff-44ca-925a-c31f1c8fd0d1", "DetectTime": "2024-05-21T12:28:28.895853+00:00", "EventTime": "2024-05-21T12:28:28.895875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZ8lB3klYC09Upcpl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "c3a65839-ace4-4f84-aab4-db6e8ccc26ff", "DetectTime": "2024-05-21T12:28:29.109390+00:00", "EventTime": "2024-05-21T12:28:29.109409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU12XT1BEvmCAaoDSj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "297b643a-79ba-4317-b188-943bb109c7ed", "DetectTime": "2024-05-21T12:28:29.143742+00:00", "EventTime": "2024-05-21T12:28:29.143764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGjlAn2fzntWRRGw24"], "accumulated_threat_level": 0.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "ee837de3-8285-4670-a88f-2fd09bb734f1", "DetectTime": "2024-05-21T12:28:29.177315+00:00", "EventTime": "2024-05-21T12:28:29.177334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1Zd53aBJDlpnm1Di"], "accumulated_threat_level": 1.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "84f5213a-e4f6-49ef-b1a0-03d8532ffed9", "DetectTime": "2024-05-21T12:28:29.241880+00:00", "EventTime": "2024-05-21T12:28:29.241901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpHps2xeTeo6fYtF8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "26b477b2-208d-464c-b79d-77503a4f298b", "DetectTime": "2024-05-21T12:28:29.250983+00:00", "EventTime": "2024-05-21T12:28:29.251002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFN164xLL2Fp863C3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "05b663d6-2ab9-4d2f-a5f3-480818fbc1b0", "DetectTime": "2024-05-21T12:28:29.294482+00:00", "EventTime": "2024-05-21T12:28:29.294503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxosb81HTV9XBV0mE7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "3e69b580-26d3-431f-9c9b-4317e7ef7429", "DetectTime": "2024-05-21T12:28:29.307212+00:00", "EventTime": "2024-05-21T12:28:29.307230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDo1EK34fUcGOFlNr3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 43} +{"Format": "IDEA0", "ID": "df1b4fa2-21b8-4946-b388-a21da8691f07", "DetectTime": "2024-05-21T12:28:29.311896+00:00", "EventTime": "2024-05-21T12:28:29.311914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce6JpD4g3OECuY5I9i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "1c8bae23-ac19-4e1c-87a8-08ad4e44f6cd", "DetectTime": "2024-05-21T12:28:29.366420+00:00", "EventTime": "2024-05-21T12:28:29.366443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C29S8G4htfdxcphEW7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "d197d5f4-4b86-4e8b-8f1e-1cf4ec7ccb16", "DetectTime": "2024-05-21T12:28:29.371569+00:00", "EventTime": "2024-05-21T12:28:29.371588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgTIK1q6PydEWL5Sa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "e5035964-6bc3-427e-9a5c-71edb2a461eb", "DetectTime": "2024-05-21T12:28:29.403850+00:00", "EventTime": "2024-05-21T12:28:29.403868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJeXl71xTHvBC1DvI8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "4e400743-71c2-4aab-b35a-8a62c31535e8", "DetectTime": "2024-05-21T12:28:29.419160+00:00", "EventTime": "2024-05-21T12:28:29.419181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoxqZ1yguGUE3B0A6"], "accumulated_threat_level": 3.2, "timewindow": 43} +{"Format": "IDEA0", "ID": "163990a8-bd84-4913-9a12-f02bcf005cd6", "DetectTime": "2024-05-21T12:28:29.455569+00:00", "EventTime": "2024-05-21T12:28:29.455588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Oesy5wkPw4XIeUc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "255627eb-de57-41ce-8025-284e171e33d9", "DetectTime": "2024-05-21T12:28:29.486502+00:00", "EventTime": "2024-05-21T12:28:29.486521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtsNAC4oXaHFHMYmeb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "51acb757-f734-4734-9ac7-1c7451f81198", "DetectTime": "2024-05-21T12:28:29.491246+00:00", "EventTime": "2024-05-21T12:28:29.491265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBTW63A0bOQJNsVmh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "c308ab35-5d9c-457f-8969-eda777132716", "DetectTime": "2024-05-21T12:28:29.541992+00:00", "EventTime": "2024-05-21T12:28:29.542010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChmwJp3KXBbZ1EzF8l"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e961c347-9c9f-4449-994f-a22937487df5", "DetectTime": "2024-05-21T12:28:29.547240+00:00", "EventTime": "2024-05-21T12:28:29.547261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDpia2LsyeWAwRaj8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "b5c81397-3c31-48c3-8bcb-7c04ded692b9", "DetectTime": "2024-05-21T12:28:29.575011+00:00", "EventTime": "2024-05-21T12:28:29.575029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmlxxwdfAg9WVkoQ9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "2b1e062c-70d8-438a-a426-43fbc84c4dc7", "DetectTime": "2024-05-21T12:28:29.812429+00:00", "EventTime": "2024-05-21T12:28:29.812450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C230Ob2X3htf0JGvWc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "469cf6ad-de41-498b-84e1-f6e3ecf64e02", "DetectTime": "2024-05-21T12:28:29.841577+00:00", "EventTime": "2024-05-21T12:28:29.841597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTMsip2ofKvawjLTgi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "3f3daad0-c820-46a5-8c9c-956144de2118", "DetectTime": "2024-05-21T12:28:29.867992+00:00", "EventTime": "2024-05-21T12:28:29.868014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXwZ03cznfZKuGzD6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "8cc0db01-f506-48c8-9643-8f8fcb7f7bbe", "DetectTime": "2024-05-21T12:28:29.878935+00:00", "EventTime": "2024-05-21T12:28:29.878953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHKHg3neDmcGWaHXl"], "accumulated_threat_level": 4.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "6fa1927b-7d93-45e9-8cf6-eb0c3826a0fe", "DetectTime": "2024-05-21T12:28:29.883787+00:00", "EventTime": "2024-05-21T12:28:29.883804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxztYo3Gaj56uVE0oi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "c43fa457-b564-4769-ae85-a943a8c9c94c", "DetectTime": "2024-05-21T12:28:29.924358+00:00", "EventTime": "2024-05-21T12:28:29.924377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJtGoX3jjJOiXTCO73"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "1a98cf4d-0dd7-4d44-a2bf-b98e8339b242", "DetectTime": "2024-05-21T12:28:29.959581+00:00", "EventTime": "2024-05-21T12:28:29.959600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fzfw2eqYRjAaSk59"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "b29043e2-173a-4a09-a7b3-4e64b311e475", "DetectTime": "2024-05-21T12:28:30.019592+00:00", "EventTime": "2024-05-21T12:28:30.019614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSRfh451W5b7vhH6"], "accumulated_threat_level": 5.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "1defc9a6-8cfc-4116-9a9f-c49cb87427ee", "DetectTime": "2024-05-21T12:28:30.033027+00:00", "EventTime": "2024-05-21T12:28:30.033048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWZkl53a7Nhuqihuj4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "6f5e98c5-e016-45e7-b3d1-db445d46f74b", "DetectTime": "2024-05-21T12:28:30.061217+00:00", "EventTime": "2024-05-21T12:28:30.061235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wZMU2kDeJJ1L79oa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 43} +{"Format": "IDEA0", "ID": "db730bba-5e0b-4591-8392-aed664d7e07f", "DetectTime": "2024-05-21T12:28:30.091194+00:00", "EventTime": "2024-05-21T12:28:30.091214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAnEiMXHEcrGwDZc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "de6f6717-094b-4f1b-a6ac-fb442d98b9c7", "DetectTime": "2024-05-21T12:28:30.110299+00:00", "EventTime": "2024-05-21T12:28:30.110320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq4DT30KdQDKsrSQg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "7c6be18f-d75f-4627-9cad-99492b4c089d", "DetectTime": "2024-05-21T12:28:30.181169+00:00", "EventTime": "2024-05-21T12:28:30.181188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5bdysOcr5xdNAWWi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8e3b5ec8-0e19-4812-8719-7304dd36cf02", "DetectTime": "2024-05-21T12:28:30.192678+00:00", "EventTime": "2024-05-21T12:28:30.192697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKnTo1OuBtSYIAvdj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "353738dd-d27b-48bb-8b14-333da5b6ff06", "DetectTime": "2024-05-21T12:28:30.230248+00:00", "EventTime": "2024-05-21T12:28:30.230268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVimtG30XsQ6GQwPW4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "96436ffa-2138-47dd-b830-44abe55d809e", "DetectTime": "2024-05-21T12:28:30.269438+00:00", "EventTime": "2024-05-21T12:28:30.269457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMl2A1wDCE15nYPjl"], "accumulated_threat_level": 9.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "c9762a66-0dd6-4635-9497-689ae9637e9b", "DetectTime": "2024-05-21T12:28:30.294948+00:00", "EventTime": "2024-05-21T12:28:30.294967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCcy5q17uu7SkkIGnj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "377c2cc7-3dd1-410e-85b3-7aaa06fe6b8a", "DetectTime": "2024-05-21T12:28:30.317687+00:00", "EventTime": "2024-05-21T12:28:30.317706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqLJF2sOYyg0rQwT7"], "accumulated_threat_level": 10.4, "timewindow": 43} +{"Format": "IDEA0", "ID": "0562b583-7501-459c-9d66-c94704f55d5d", "DetectTime": "2024-05-21T12:28:30.338784+00:00", "EventTime": "2024-05-21T12:28:30.338802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCPdnx2Mv8MifxWoN"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "e48ac7a4-5d8f-4384-92d4-ba2d4478ee2f", "DetectTime": "2024-05-21T12:28:30.376859+00:00", "EventTime": "2024-05-21T12:28:30.376876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXAsh4N9lMA21ea13"], "accumulated_threat_level": 11.200000000000001, "timewindow": 43} +{"Format": "IDEA0", "ID": "5a4d381e-24cf-41f1-b633-9e3c6a3db5e3", "DetectTime": "2024-05-21T12:28:30.382999+00:00", "EventTime": "2024-05-21T12:28:30.383021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtLCj4nxtvOdV1zak"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "afba1f96-b3fd-4215-972a-7054e651c2c2", "DetectTime": "2024-05-21T12:28:30.408706+00:00", "EventTime": "2024-05-21T12:28:30.408726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMyGHY1fBJOcfsXeBl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "c6acee31-91db-4685-829c-e5ccee7509c3", "DetectTime": "2024-05-21T12:28:30.437879+00:00", "EventTime": "2024-05-21T12:28:30.437898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rUre3PPbW08CA7za"], "accumulated_threat_level": 12.000000000000002, "timewindow": 43} +{"Format": "Json", "ID": "c6acee31-91db-4685-829c-e5ccee7509c3", "DetectTime": "2024-05-21T12:28:30.437879+00:00", "EventTime": "2024-05-21T12:28:30.437898+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "1970-01-02T18:01:44.441949+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:28:30.587224)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e4df7d0b-fb1b-4b4e-b3fe-13fcf0d8db47", "DetectTime": "2024-05-21T12:28:30.591264+00:00", "EventTime": "2024-05-21T12:28:30.591283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXEyl83DLEVf2pfd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "6cddaca5-62bc-4bd2-bb4b-a7d362257a1b", "DetectTime": "2024-05-21T12:28:30.604464+00:00", "EventTime": "2024-05-21T12:28:30.604484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0sr02s4c4DAaLWZa"], "accumulated_threat_level": 0.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "10c86b45-0d95-4772-9da9-4eb76bd1169f", "DetectTime": "2024-05-21T12:28:30.758090+00:00", "EventTime": "2024-05-21T12:28:30.758113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWm7m71rVLg8LhG0yl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "b8a348a3-431d-4281-9bac-a9646a5d4faf", "DetectTime": "2024-05-21T12:28:30.777767+00:00", "EventTime": "2024-05-21T12:28:30.777789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90b763UY6pwBYwGjd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "746d2c5b-0842-4cf1-b20b-b28f727355e4", "DetectTime": "2024-05-21T12:28:30.799249+00:00", "EventTime": "2024-05-21T12:28:30.799273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBrhO20XrhrIVtRB8"], "accumulated_threat_level": 1.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "204745db-0848-4852-9f7f-c0904349d086", "DetectTime": "2024-05-21T12:28:30.820930+00:00", "EventTime": "2024-05-21T12:28:30.820951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMboP1ZkzuG3f7Zrd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 40} +{"Format": "IDEA0", "ID": "14d28dea-360c-4e87-88d2-dfe643406cfe", "DetectTime": "2024-05-21T12:28:30.850992+00:00", "EventTime": "2024-05-21T12:28:30.851011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.61.221.194"]}], "Attach": [{"Content": "Connection to unknown destination port 4286/UDP destination IP 42.61.221.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuByyQ2EG7NttvOhZk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 43} +{"Format": "IDEA0", "ID": "ffc4aa3d-8be0-44cc-870b-8f4e8e9ac393", "DetectTime": "2024-05-21T12:28:30.916701+00:00", "EventTime": "2024-05-21T12:28:30.916722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0upwr1hZxYnCxJHAa"], "accumulated_threat_level": 3.2, "timewindow": 43} +{"Format": "IDEA0", "ID": "21026a55-fc3c-4034-a47a-ccee3b3ed173", "DetectTime": "2024-05-21T12:28:30.954165+00:00", "EventTime": "2024-05-21T12:28:30.954184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnCg725tdKkCFcLu4"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "e6e3df8d-2675-480c-9c0f-77c66c1348b4", "DetectTime": "2024-05-21T12:28:30.988307+00:00", "EventTime": "2024-05-21T12:28:30.988326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9Ihd43HltkrIBrSi"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "296a4e25-c3be-4d44-a993-6e4dd41cd293", "DetectTime": "2024-05-21T12:28:30.997674+00:00", "EventTime": "2024-05-21T12:28:30.997693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.159.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBijG92mhAJrvcuTDh"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "f88a06a5-570d-4255-accc-5a7749ed4eb7", "DetectTime": "2024-05-21T12:28:31.022510+00:00", "EventTime": "2024-05-21T12:28:31.022530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0K5Et18UZ3MJ4vto9", "Cxmmnl4KSA5ERo8z6j", "CFfAh74A9B4TTcWz8l", "C3botnge7bC6lLObk"], "accumulated_threat_level": 4.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "0268eb24-66e6-49de-a709-210d8a96b48a", "DetectTime": "2024-05-21T12:28:31.052916+00:00", "EventTime": "2024-05-21T12:28:31.052934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHo1TT29pAv1AMTBvk"], "accumulated_threat_level": 5.3, "timewindow": 43} +{"Format": "IDEA0", "ID": "45c14561-7adb-46e9-a6b8-8f090b62f562", "DetectTime": "2024-05-21T12:28:31.083062+00:00", "EventTime": "2024-05-21T12:28:31.083084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALlGr4nDErnvXDIU1"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "a62a9a0a-819e-480a-8d6f-043bf87912fd", "DetectTime": "2024-05-21T12:28:31.088149+00:00", "EventTime": "2024-05-21T12:28:31.088169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfF0V1wGXQh4XGNma"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "ca2e0d11-60e3-4e8f-a247-76019a8b62b0", "DetectTime": "2024-05-21T12:28:31.124317+00:00", "EventTime": "2024-05-21T12:28:31.124335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cycd2l2t8p1ug6QZo3"], "accumulated_threat_level": 6.1, "timewindow": 43} +{"Format": "IDEA0", "ID": "6ec02e9d-9661-4892-8122-bdb3d5c6b9bb", "DetectTime": "2024-05-21T12:28:31.145080+00:00", "EventTime": "2024-05-21T12:28:31.145101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsurW28324occwAeg"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "1ca7cde7-8cf7-44f7-99f0-bdb3ea93d92a", "DetectTime": "2024-05-21T12:28:31.174878+00:00", "EventTime": "2024-05-21T12:28:31.174901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmbfZ1U7nHztIygh4"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "46c05e72-fd96-43e3-bd5f-77328ec16361", "DetectTime": "2024-05-21T12:28:31.202815+00:00", "EventTime": "2024-05-21T12:28:31.202834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5M9THDEiLHAwcr6"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "84e4ef3a-a733-4b8e-b0db-2a8e1601ba87", "DetectTime": "2024-05-21T12:28:31.214640+00:00", "EventTime": "2024-05-21T12:28:31.214663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpPIuq1VWqMNyMbVWg"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 43} +{"Format": "IDEA0", "ID": "66120110-949f-45c3-ac00-cfdb7a60e3ad", "DetectTime": "2024-05-21T12:28:31.247707+00:00", "EventTime": "2024-05-21T12:28:31.247727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUThVKdzhkXD5aLj2"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "2fedad06-547b-4b5c-a921-6f6a7f6b106b", "DetectTime": "2024-05-21T12:28:31.285153+00:00", "EventTime": "2024-05-21T12:28:31.285171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 18100/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGpvljYXdmwWRiV7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b81ec4c4-7705-4162-aa8a-28d836cfc704", "DetectTime": "2024-05-21T12:28:31.308649+00:00", "EventTime": "2024-05-21T12:28:31.308667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUfkCe3lQWoJ2Pims"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "ec73dc5a-1657-442a-85e5-b00127fe1b94", "DetectTime": "2024-05-21T12:28:31.334809+00:00", "EventTime": "2024-05-21T12:28:31.334833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6cfOG2oFMoExZ4pi5"], "accumulated_threat_level": 8.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "86885376-e0b7-4f47-ab7e-31d593395dbc", "DetectTime": "2024-05-21T12:28:31.363817+00:00", "EventTime": "2024-05-21T12:28:31.363838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CER0563Q2JxMSEgix9"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "8fb86e3e-6701-4028-abbe-eedf1d2756f2", "DetectTime": "2024-05-21T12:28:31.376235+00:00", "EventTime": "2024-05-21T12:28:31.376258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8Xay21ljrK7l2jX8"], "accumulated_threat_level": 9.3, "timewindow": 43} +{"Format": "IDEA0", "ID": "e2e5b7f6-ef46-48a5-8f77-1541511cb222", "DetectTime": "2024-05-21T12:28:31.409752+00:00", "EventTime": "2024-05-21T12:28:31.409774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjkE5c3eXUtZuC1r1k"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "0deff467-9bb9-43ba-b2b7-8549d322021e", "DetectTime": "2024-05-21T12:28:31.438123+00:00", "EventTime": "2024-05-21T12:28:31.438141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3xsr3aqHOgjGMred"], "accumulated_threat_level": 10.100000000000001, "timewindow": 43} +{"Format": "IDEA0", "ID": "177a2a58-dca0-489a-9631-5576f9d83240", "DetectTime": "2024-05-21T12:28:31.476819+00:00", "EventTime": "2024-05-21T12:28:31.476836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZV1c1ydv0juhVbm8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 43} +{"Format": "IDEA0", "ID": "9a8aa7af-d8fd-410b-abe4-548a058d44b7", "DetectTime": "2024-05-21T12:28:31.487395+00:00", "EventTime": "2024-05-21T12:28:31.487435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhjQz19el3Hvd1vN1"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "117bf61c-4dc3-477a-81f6-aed80939be3c", "DetectTime": "2024-05-21T12:28:31.522967+00:00", "EventTime": "2024-05-21T12:28:31.522991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMN4a2zq7E1eJBmx3"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "4f3df790-e1cd-4903-b2d5-a6341a348552", "DetectTime": "2024-05-21T12:28:31.553684+00:00", "EventTime": "2024-05-21T12:28:31.553707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Wrkg39mkWsU3a09j"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "79482dc7-6385-4450-bb4d-7ffabf47db48", "DetectTime": "2024-05-21T12:28:31.566610+00:00", "EventTime": "2024-05-21T12:28:31.566634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtzhYSKkpUWph0f7"], "accumulated_threat_level": 11.700000000000003, "timewindow": 43} +{"Format": "IDEA0", "ID": "d33a9150-13a2-429a-a4a0-7901e9cc0513", "DetectTime": "2024-05-21T12:28:31.594475+00:00", "EventTime": "2024-05-21T12:28:31.594496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clvhwc1xvimzHY5fmi"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "25f917a0-5589-4b47-99cc-e0bcd8742399", "DetectTime": "2024-05-21T12:28:31.624488+00:00", "EventTime": "2024-05-21T12:28:31.624507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX10uqAauP0iMux5j"], "accumulated_threat_level": 12.500000000000004, "timewindow": 43} +{"Format": "Json", "ID": "25f917a0-5589-4b47-99cc-e0bcd8742399", "DetectTime": "2024-05-21T12:28:31.624488+00:00", "EventTime": "2024-05-21T12:28:31.624507+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "1970-01-02T18:01:47.542920+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:28:31.815889)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "e00ec9b7-788d-4308-b2a0-b44dbf81d0d1", "DetectTime": "2024-05-21T12:28:31.820034+00:00", "EventTime": "2024-05-21T12:28:31.820054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05gba4kbT0D0MWI1i"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "593c10d7-0b0a-4a8d-afd1-a58c90a5b86e", "DetectTime": "2024-05-21T12:28:31.833749+00:00", "EventTime": "2024-05-21T12:28:31.833770+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaCyztNr2SxpAqS6"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "6a062aae-4135-4b46-bdcb-0d9ac9a8b26b", "DetectTime": "2024-05-21T12:28:31.838718+00:00", "EventTime": "2024-05-21T12:28:31.838736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHhMq31JXeytOCH04"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "945a9444-2027-4ce1-a0d5-a76317c410e5", "DetectTime": "2024-05-21T12:28:31.850931+00:00", "EventTime": "2024-05-21T12:28:31.850950+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNaCyztNr2SxpAqS6"], "accumulated_threat_level": 9.7, "timewindow": 16} +{"Format": "IDEA0", "ID": "f182eafc-1b45-43fa-9374-1c8b9e5ffeaa", "DetectTime": "2024-05-21T12:28:31.929378+00:00", "EventTime": "2024-05-21T12:28:31.929400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaCLaN3YslST4DMbIc"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "5656c454-6047-485c-931a-d74cc0ca20f1", "DetectTime": "2024-05-21T12:28:31.935895+00:00", "EventTime": "2024-05-21T12:28:31.935918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55VId19d8LPUBQ0U1"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "247b1787-2ae5-4351-a4fa-ece4a3e2c08b", "DetectTime": "2024-05-21T12:28:31.949207+00:00", "EventTime": "2024-05-21T12:28:31.949225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8Isn3Nd3AUU9YMcd"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "af32baa1-4e32-4d5c-9c31-61f2a8e14af4", "DetectTime": "2024-05-21T12:28:31.989402+00:00", "EventTime": "2024-05-21T12:28:31.989420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7G15ElFKCtS1kolc"], "accumulated_threat_level": 0.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "2b3e664c-496c-4bba-be9d-12c0c8a0a7d2", "DetectTime": "2024-05-21T12:28:32.022336+00:00", "EventTime": "2024-05-21T12:28:32.022355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYS0ZG2rsnAc5MoPm8"], "accumulated_threat_level": 1.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "a55c6087-a165-42e0-8e50-9aadaf8f9bd8", "DetectTime": "2024-05-21T12:28:32.040498+00:00", "EventTime": "2024-05-21T12:28:32.040515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETWfd3rNtjcI6sVFa"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "a5e35cd9-e8c1-4b4b-a3b0-03d62ea0acbe", "DetectTime": "2024-05-21T12:28:32.065966+00:00", "EventTime": "2024-05-21T12:28:32.065984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIXZkG4m3BGGtu6DOg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 43} +{"Format": "IDEA0", "ID": "c66b22a5-f23e-460d-9bb1-fcfdbd097372", "DetectTime": "2024-05-21T12:28:32.097316+00:00", "EventTime": "2024-05-21T12:28:32.097336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "Connection to unknown destination port 21005/UDP destination IP 41.108.40.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE29KJ3HhT6A49D2H4"], "accumulated_threat_level": 3.2, "timewindow": 43} +{"Format": "IDEA0", "ID": "231da7ad-705f-4006-b561-3ee2108de7c5", "DetectTime": "2024-05-21T12:28:32.128895+00:00", "EventTime": "2024-05-21T12:28:32.128916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPWQd3arZYfldCvxg"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "62d82065-3cef-4d28-aba4-42f76e9fe0d8", "DetectTime": "2024-05-21T12:28:32.150006+00:00", "EventTime": "2024-05-21T12:28:32.150027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrxLW742mNLDjcpWFc"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "458863f5-72b2-48d7-9dce-1653e9b0ed33", "DetectTime": "2024-05-21T12:28:32.177093+00:00", "EventTime": "2024-05-21T12:28:32.177116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"]}], "Attach": [{"Content": "Connection to unknown destination port 29021/UDP destination IP 200.25.212.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CohDBp1iQnMtfUuQA8"], "accumulated_threat_level": 4.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "0d07859d-441f-43ff-b06d-e99abeddf187", "DetectTime": "2024-05-21T12:28:32.211202+00:00", "EventTime": "2024-05-21T12:28:32.211223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPKb73AjUyHFVKLAa"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "f58c516d-f806-450b-a001-8071a24dfed5", "DetectTime": "2024-05-21T12:28:32.246066+00:00", "EventTime": "2024-05-21T12:28:32.246085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBD18KdbiC1pnDna"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "bb06178e-bc02-4509-a423-e06d548595b3", "DetectTime": "2024-05-21T12:28:32.278689+00:00", "EventTime": "2024-05-21T12:28:32.278710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR2XR2NSmEuhPJOTe"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "05e25ec9-d48b-4cd3-bb43-5c78739628e3", "DetectTime": "2024-05-21T12:28:32.310886+00:00", "EventTime": "2024-05-21T12:28:32.310906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZs4Wy4MwRr4z8aY61"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "6aa3644a-a4eb-4cd0-91d0-b4781fe8ce2f", "DetectTime": "2024-05-21T12:28:32.336583+00:00", "EventTime": "2024-05-21T12:28:32.336604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBhK7v5P1Glc97ri"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "a2bc74f8-f930-469c-973a-31b80c87bb6c", "DetectTime": "2024-05-21T12:28:32.360210+00:00", "EventTime": "2024-05-21T12:28:32.360230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGbxa4H7C0HWnBKsf"], "accumulated_threat_level": 5.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "1a35eacb-e85f-461f-ac78-cdefdcf745ce", "DetectTime": "2024-05-21T12:28:32.382810+00:00", "EventTime": "2024-05-21T12:28:32.382830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3BSbLQ33d25rgJ83"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "cb4af6d6-b8f0-4735-b579-2d88dc882e44", "DetectTime": "2024-05-21T12:28:32.405850+00:00", "EventTime": "2024-05-21T12:28:32.405871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57l2E24X4F4vV1fth"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "184b7566-fcc1-4f24-bdd8-114ca25c530d", "DetectTime": "2024-05-21T12:28:32.431343+00:00", "EventTime": "2024-05-21T12:28:32.431365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWuJu24peR18Reqlb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 43} +{"Format": "IDEA0", "ID": "092074a4-d89f-4035-a777-642e7ed7b6ed", "DetectTime": "2024-05-21T12:28:32.504026+00:00", "EventTime": "2024-05-21T12:28:32.504047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnBBh9iV1UnzYgr3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "f564df4f-1af3-483c-802f-d9b56a5e2e8c", "DetectTime": "2024-05-21T12:28:32.567586+00:00", "EventTime": "2024-05-21T12:28:32.567605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ6iTk2MuR6t9vwSMe"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "2d13f6ff-74d7-4bf7-adbd-81badf200964", "DetectTime": "2024-05-21T12:28:32.621999+00:00", "EventTime": "2024-05-21T12:28:32.622018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8Ook4BDqeMkRlvh7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "37245dce-48a0-49f2-ad10-440747b1a6e8", "DetectTime": "2024-05-21T12:28:32.655842+00:00", "EventTime": "2024-05-21T12:28:32.655863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "Connection to unknown destination port 24967/UDP destination IP 180.254.84.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqTwZ2P7IxcivlqLj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "15bfb506-b160-4416-909b-f6765949a76f", "DetectTime": "2024-05-21T12:28:32.687773+00:00", "EventTime": "2024-05-21T12:28:32.687791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OABo2V4KUGaQ5iu"], "accumulated_threat_level": 9.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "6fa88356-6598-4411-be91-bb2e50210c08", "DetectTime": "2024-05-21T12:28:32.717860+00:00", "EventTime": "2024-05-21T12:28:32.717879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmFFH1sKZc3Umzri1"], "accumulated_threat_level": 10.4, "timewindow": 43} +{"Format": "IDEA0", "ID": "a8c02c48-4cc1-4c84-8b58-603acadf83c6", "DetectTime": "2024-05-21T12:28:33.013421+00:00", "EventTime": "2024-05-21T12:28:33.013441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTP7A74uSv5BiTjNMc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 43} +{"Format": "IDEA0", "ID": "0d29d3c9-fb05-4cf3-bf93-6b924de6df8e", "DetectTime": "2024-05-21T12:28:33.070514+00:00", "EventTime": "2024-05-21T12:28:33.070534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihCjo4qR68V5rd8Q9"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "7f4f1b60-e993-4a22-9ffa-52694a58d1fd", "DetectTime": "2024-05-21T12:28:33.124785+00:00", "EventTime": "2024-05-21T12:28:33.124804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8tXr2dCJDkSNOhJg"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "33862bc9-8a01-4a00-bd54-06a801d51a28", "DetectTime": "2024-05-21T12:28:33.151356+00:00", "EventTime": "2024-05-21T12:28:33.151376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95lhx3kIG7Ndb2JWd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 43} +{"Format": "Json", "ID": "33862bc9-8a01-4a00-bd54-06a801d51a28", "DetectTime": "2024-05-21T12:28:33.151356+00:00", "EventTime": "2024-05-21T12:28:33.151376+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-02T18:16:29.788301+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:28:33.333466)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "33605512-ca4e-4d54-8506-3d0c68af7401", "DetectTime": "2024-05-21T12:28:33.337827+00:00", "EventTime": "2024-05-21T12:28:33.337850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOR4b3DLqIVAppnS3"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "c08a4ad2-1828-43b0-a41a-c6bd1a63d4b1", "DetectTime": "2024-05-21T12:28:33.342772+00:00", "EventTime": "2024-05-21T12:28:33.342793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctuqo82D3hbahYwVJa"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "654dad50-3243-4693-a762-7b912952b997", "DetectTime": "2024-05-21T12:28:33.348032+00:00", "EventTime": "2024-05-21T12:28:33.348053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvRBM2K4fRBwBTueh"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "d0e64514-cc9a-4d44-8411-90fc7749a593", "DetectTime": "2024-05-21T12:28:33.352627+00:00", "EventTime": "2024-05-21T12:28:33.352647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkNy73hzdMlRtbJEj"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "0daf087b-15d5-4969-9224-6d6da11e0e82", "DetectTime": "2024-05-21T12:28:33.541056+00:00", "EventTime": "2024-05-21T12:28:33.541079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqASlp1tmd48AkDEv3"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "8b04e94e-08ac-48d8-a811-1cf39b1772da", "DetectTime": "2024-05-21T12:28:33.617942+00:00", "EventTime": "2024-05-21T12:28:33.617963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ4xZe1y2kZVi5q5y", "CLJxRT1xIEzXgjwbOf", "CwT5ky2k2ho82rwbT6", "CAFaAP1uJqVuXrHdz2"], "accumulated_threat_level": 0.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "2cdb45de-7829-4759-a03c-3b31acd41eb4", "DetectTime": "2024-05-21T12:28:33.683940+00:00", "EventTime": "2024-05-21T12:28:33.683960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDf0oG1q3anv5REoZ4"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "c96d60f4-e5e3-4b2a-856e-0e995c60eeab", "DetectTime": "2024-05-21T12:28:33.851333+00:00", "EventTime": "2024-05-21T12:28:33.851356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VNUV1iFSu10L1OQi"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "fd22ec6e-5f5b-44f4-ac22-fbbd8c0a6e3a", "DetectTime": "2024-05-21T12:28:33.880681+00:00", "EventTime": "2024-05-21T12:28:33.880701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYNRFYWabKsNoVk"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "216a69c6-9c22-42de-bb5f-dad59eaf8cf6", "DetectTime": "2024-05-21T12:28:33.906643+00:00", "EventTime": "2024-05-21T12:28:33.906669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdhplw4jJR4HMpcdO3"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "d6a8a123-61c6-43e8-88c2-435592707e05", "DetectTime": "2024-05-21T12:28:33.930855+00:00", "EventTime": "2024-05-21T12:28:33.930876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDz2nz16t4aIpuhrij"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "b04c8c78-48cb-48e1-98ab-f9db7eee01d1", "DetectTime": "2024-05-21T12:28:33.993211+00:00", "EventTime": "2024-05-21T12:28:33.993231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEilK3xT47J7m4xAb"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "952be195-57f4-440e-84ad-28b610bd10a5", "DetectTime": "2024-05-21T12:28:34.010361+00:00", "EventTime": "2024-05-21T12:28:34.010383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cBy33LpnrpUlMPJd"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "e3b49f95-e762-4c5e-bbbd-ea1f7b0e8455", "DetectTime": "2024-05-21T12:28:34.037504+00:00", "EventTime": "2024-05-21T12:28:34.037526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYSzS3Sqf7tWm6en"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "4e1316ef-9f51-4edb-90ea-0cd44ae7e0b9", "DetectTime": "2024-05-21T12:28:34.063022+00:00", "EventTime": "2024-05-21T12:28:34.063041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MtcF2vYnR3Uzaiw8"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "857a9d08-e073-45a4-8629-bc751890cde2", "DetectTime": "2024-05-21T12:28:34.089318+00:00", "EventTime": "2024-05-21T12:28:34.089338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwZR24hkW8OCzLl23"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "b8997c1b-b31a-4d37-ba74-16862ac941aa", "DetectTime": "2024-05-21T12:28:34.113322+00:00", "EventTime": "2024-05-21T12:28:34.113343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9WAh4GA050THZvW3"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "d4ae2b76-0531-49d6-9016-3426e657e704", "DetectTime": "2024-05-21T12:28:34.141720+00:00", "EventTime": "2024-05-21T12:28:34.141740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFatpl2KGFuyVTihm1"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "9b1e00f5-60c0-48cb-b2e1-fd1cb9601f3b", "DetectTime": "2024-05-21T12:28:34.169450+00:00", "EventTime": "2024-05-21T12:28:34.169471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpbKW03b3Zkgwu2Npj"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "527fb5f5-ccb6-4375-b026-c2022b0c217f", "DetectTime": "2024-05-21T12:28:34.199058+00:00", "EventTime": "2024-05-21T12:28:34.199080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgoCeo309buBcuP7Qi"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "4e2d386d-a1e3-4b7b-a6c8-a2628f03a71a", "DetectTime": "2024-05-21T12:28:34.274208+00:00", "EventTime": "2024-05-21T12:28:34.274231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHc7t3NoKGWyquys7"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "84adef61-c80f-4fd1-b856-70cf5e3c899e", "DetectTime": "2024-05-21T12:28:34.312191+00:00", "EventTime": "2024-05-21T12:28:34.312212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyruP1Ql5ueH4mSde"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "52aa68c4-6a74-4b5b-ad35-8854d6846aa0", "DetectTime": "2024-05-21T12:28:34.338211+00:00", "EventTime": "2024-05-21T12:28:34.338233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiFjO1aoXfN9nVZ4j"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "2b486665-8be7-4c27-9161-e95f9c7977b0", "DetectTime": "2024-05-21T12:28:34.475827+00:00", "EventTime": "2024-05-21T12:28:34.475849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NvGCUg8ZC1Fnvvc"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "b5a16679-a3dc-4b1d-a64c-ce41bcf4a866", "DetectTime": "2024-05-21T12:28:34.504263+00:00", "EventTime": "2024-05-21T12:28:34.504283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwstB41XpYimLXXCTa"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "f69a9ef3-5f9c-4b72-b347-f862cf0adb75", "DetectTime": "2024-05-21T12:28:34.780818+00:00", "EventTime": "2024-05-21T12:28:34.780841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCw9l73pa6OdaI15S1"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "f841c932-de66-4a3c-8405-ca5baa737ba4", "DetectTime": "2024-05-21T12:28:34.905777+00:00", "EventTime": "2024-05-21T12:28:34.905813+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKXhdD414W80xQlRl"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "1a57f766-b284-4d48-bc2d-bbb8adda44ba", "DetectTime": "2024-05-21T12:28:34.917903+00:00", "EventTime": "2024-05-21T12:28:34.917921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKXhdD414W80xQlRl"], "accumulated_threat_level": 10.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "47027a92-ed55-4a7a-b67d-0a87519fc2f0", "DetectTime": "2024-05-21T12:28:34.956678+00:00", "EventTime": "2024-05-21T12:28:34.956702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWD23LkRB9OpcncC1", "CulEkm2LKFbubwAnt5", "CaCiPJ06pbqvnVFlh", "CbG2474C0R4mtsqZtd"], "accumulated_threat_level": 1.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e5325052-6329-43c3-8a66-1e454974fa67", "DetectTime": "2024-05-21T12:28:35.094721+00:00", "EventTime": "2024-05-21T12:28:35.094741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccudz41Cdit9RmTHf3"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "8eb1d3b1-9531-4bbe-89bc-1415c20cee8a", "DetectTime": "2024-05-21T12:28:35.107439+00:00", "EventTime": "2024-05-21T12:28:35.107457+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccudz41Cdit9RmTHf3"], "accumulated_threat_level": 10.7, "timewindow": 16} +{"Format": "IDEA0", "ID": "0549d40b-32c4-4542-945e-a8ee682d5a31", "DetectTime": "2024-05-21T12:28:35.111963+00:00", "EventTime": "2024-05-21T12:28:35.111980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLyQH2IstI5S5B65l"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "27df4212-40c8-413b-9c9d-d6980d3e17ba", "DetectTime": "2024-05-21T12:28:35.163719+00:00", "EventTime": "2024-05-21T12:28:35.163740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.171.27.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTgQb4UT5H5bxb0s5"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "066fba5f-8fef-4b14-a35e-2b267bc98463", "DetectTime": "2024-05-21T12:28:35.194255+00:00", "EventTime": "2024-05-21T12:28:35.194277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4QO02P00MBn8Vg3k"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "8c3c6609-a73b-4db8-a0be-0b70a10339d4", "DetectTime": "2024-05-21T12:28:35.227047+00:00", "EventTime": "2024-05-21T12:28:35.227067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHXQk4XhszO1Grg5f"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "755384b0-b366-43ff-b5c3-3b8332c53b28", "DetectTime": "2024-05-21T12:28:35.276364+00:00", "EventTime": "2024-05-21T12:28:35.276386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUvoh1YT6q3i1eVog"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "5e499c50-8324-43de-9409-b636be113015", "DetectTime": "2024-05-21T12:28:35.305918+00:00", "EventTime": "2024-05-21T12:28:35.305939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC00ei15Xx2Gtl9afb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "d2107ff3-6af1-4859-9d84-89e79fb47f09", "DetectTime": "2024-05-21T12:28:35.334966+00:00", "EventTime": "2024-05-21T12:28:35.334988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI6L513LgkkjhDF912"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e65a43b6-eb1a-45b8-a7bf-c9286bc30c1d", "DetectTime": "2024-05-21T12:28:35.359609+00:00", "EventTime": "2024-05-21T12:28:35.359631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6DrKM2sW30u9UxHrf"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "53d612f2-e857-4c73-95da-3dee13f0af92", "DetectTime": "2024-05-21T12:28:35.425979+00:00", "EventTime": "2024-05-21T12:28:35.425998+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEC153eWxqJiRTyNe"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "2871ed3d-4a72-4e74-ab23-b52ec66fdc79", "DetectTime": "2024-05-21T12:28:35.440010+00:00", "EventTime": "2024-05-21T12:28:35.440028+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEC153eWxqJiRTyNe"], "accumulated_threat_level": 11.2, "timewindow": 16} +{"Format": "IDEA0", "ID": "3dcff563-7cc9-473f-afba-dbb0cded6920", "DetectTime": "2024-05-21T12:28:35.573063+00:00", "EventTime": "2024-05-21T12:28:35.573080+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuCJ3MN9unA27lbj"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "9f886b4d-65e5-4a3c-8661-b3048910ec01", "DetectTime": "2024-05-21T12:28:35.585818+00:00", "EventTime": "2024-05-21T12:28:35.585838+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuCJ3MN9unA27lbj"], "accumulated_threat_level": 11.7, "timewindow": 16} +{"Format": "IDEA0", "ID": "924d5a32-e383-49de-bbce-1dc752515e50", "DetectTime": "2024-05-21T12:28:35.643904+00:00", "EventTime": "2024-05-21T12:28:35.643924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.13.87.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnbHhd21ZexMkZKwsh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "41821577-53bd-4acc-9698-a9cea9312c01", "DetectTime": "2024-05-21T12:28:35.650032+00:00", "EventTime": "2024-05-21T12:28:35.650052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46Cbd2eO3wzebIk4k"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "aea1ed85-0872-4231-8925-f77644a995a3", "DetectTime": "2024-05-21T12:28:35.654881+00:00", "EventTime": "2024-05-21T12:28:35.654899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcEZjj1r5Cr9CF95db"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "7aee3eda-d3ec-47d5-9efb-52c454c66fa7", "DetectTime": "2024-05-21T12:28:35.659378+00:00", "EventTime": "2024-05-21T12:28:35.659398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCsgL3kBTdeATk1Q8"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b56baac5-bad3-4139-9531-d32c025a4b52", "DetectTime": "2024-05-21T12:28:35.663959+00:00", "EventTime": "2024-05-21T12:28:35.663979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chpd4T1iciAg7byRRk"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "140e5637-5229-4d23-8957-01feac183c92", "DetectTime": "2024-05-21T12:28:35.668954+00:00", "EventTime": "2024-05-21T12:28:35.668974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.180.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWbKu1KorhjHbZsK9"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "0834bf19-8525-4788-8a89-e63df44748b8", "DetectTime": "2024-05-21T12:28:35.779096+00:00", "EventTime": "2024-05-21T12:28:35.779118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTDSY1G0kRQSSsZhc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "00411e73-4946-48ab-b74f-d3545da1c87e", "DetectTime": "2024-05-21T12:28:35.807458+00:00", "EventTime": "2024-05-21T12:28:35.807477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.35.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gCQ64kP1u4O0Xva4"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "357a1c07-5072-4e04-8eea-df7acc78d84f", "DetectTime": "2024-05-21T12:28:35.844317+00:00", "EventTime": "2024-05-21T12:28:35.844348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyORI14W0h9gYW1Dp"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "50b9f029-622b-430a-9155-71212f9610a8", "DetectTime": "2024-05-21T12:28:35.891052+00:00", "EventTime": "2024-05-21T12:28:35.891074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6po1d2bRfYNHGHO8e"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "f51bf12d-5142-48d0-bc2c-8510ae738b5e", "DetectTime": "2024-05-21T12:28:35.936663+00:00", "EventTime": "2024-05-21T12:28:35.936684+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEGivpSAkpBirAff"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "8862e5ba-3163-4716-b69b-3f8bcb70c3b6", "DetectTime": "2024-05-21T12:28:35.950879+00:00", "EventTime": "2024-05-21T12:28:35.950904+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEGivpSAkpBirAff"], "accumulated_threat_level": 12.2, "timewindow": 16} +{"Format": "Json", "ID": "8862e5ba-3163-4716-b69b-3f8bcb70c3b6", "DetectTime": "2024-05-21T12:28:35.950879+00:00", "EventTime": "2024-05-21T12:28:35.950904+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "1970-01-01T15:18:35.674642+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2024/05/21 12:28:36.334329)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 16, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "40a25c2f-53b0-456b-8f92-a1e056cbcc27", "DetectTime": "2024-05-21T12:28:36.348582+00:00", "EventTime": "2024-05-21T12:28:36.348599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLy5d26kfWNrqrGhi"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "1422da66-6a0c-4e46-a42c-7b3045d587dd", "DetectTime": "2024-05-21T12:28:36.362830+00:00", "EventTime": "2024-05-21T12:28:36.362850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLy5d26kfWNrqrGhi"], "accumulated_threat_level": 0.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "c1802d26-5264-4671-94f4-45617091706b", "DetectTime": "2024-05-21T12:28:36.374184+00:00", "EventTime": "2024-05-21T12:28:36.374202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2BCxh2bxBw7Zp9"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "2ab295b6-119a-4b11-bc6f-bb73c9f1f587", "DetectTime": "2024-05-21T12:28:36.378522+00:00", "EventTime": "2024-05-21T12:28:36.378540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChlRn24YzHm7msRYK1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "d227c3a6-0153-4c88-9a58-fa02a2cd4262", "DetectTime": "2024-05-21T12:28:36.393695+00:00", "EventTime": "2024-05-21T12:28:36.393716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUQyi4qMdcN6K2aJi"], "accumulated_threat_level": 1.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "19cf2260-4c5c-47a5-bb0b-6a75824a07e1", "DetectTime": "2024-05-21T12:28:36.399668+00:00", "EventTime": "2024-05-21T12:28:36.399690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVYZh2WN6UBxZ5IE7"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "7a6fb07f-877c-4d9f-8ec9-7023d9ca56cb", "DetectTime": "2024-05-21T12:28:36.414366+00:00", "EventTime": "2024-05-21T12:28:36.414388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ7l7A2PMOJVueQGcf"], "accumulated_threat_level": 2.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "81494e4b-3798-42dc-b1d1-fbb1c1f76a39", "DetectTime": "2024-05-21T12:28:36.418917+00:00", "EventTime": "2024-05-21T12:28:36.418934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwUSh1oT9Tp6iDRbi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "32b784d9-261f-4f97-897a-416e1700b2f0", "DetectTime": "2024-05-21T12:28:36.445285+00:00", "EventTime": "2024-05-21T12:28:36.445306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYwyNzdElbwBsxg1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "f21b1430-0e2b-4df9-b969-1bd5d7b6ecf6", "DetectTime": "2024-05-21T12:28:36.467692+00:00", "EventTime": "2024-05-21T12:28:36.467713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfodId2bwxqJ4mMvGj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 43} +{"Format": "IDEA0", "ID": "4f7d817c-0cdd-460e-95d2-e02b7f416974", "DetectTime": "2024-05-21T12:28:36.488180+00:00", "EventTime": "2024-05-21T12:28:36.488199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarF932G0dT78drUBb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c495a21e-dd87-4813-8f5c-97701c66e6a3", "DetectTime": "2024-05-21T12:28:36.514020+00:00", "EventTime": "2024-05-21T12:28:36.514042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCN2KF304NHuHCRhC3"], "accumulated_threat_level": 4.2, "timewindow": 43} +{"Format": "IDEA0", "ID": "4a1691fd-457a-4a05-b66f-dbeb218f6fc7", "DetectTime": "2024-05-21T12:28:36.532786+00:00", "EventTime": "2024-05-21T12:28:36.532807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4D5JE1MY58UwL5kFl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b8082f85-a270-4325-b02f-554f765902cb", "DetectTime": "2024-05-21T12:28:36.702309+00:00", "EventTime": "2024-05-21T12:28:36.702330+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqy8zh1SVqeSFGaxP6"], "accumulated_threat_level": 4.224, "timewindow": 43} +{"Format": "IDEA0", "ID": "29aed178-5640-4ff4-81bf-8e63ab26340b", "DetectTime": "2024-05-21T12:28:36.781461+00:00", "EventTime": "2024-05-21T12:28:36.781479+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["93.109.245.154"], "Type": ["CC"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqy8zh1SVqeSFGaxP6"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "787d3b7a-d2f7-42ed-81ea-fa0e4277d82b", "DetectTime": "2024-05-21T12:28:36.819776+00:00", "EventTime": "2024-05-21T12:28:36.819799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc28g01atvJFsBaXhb"], "accumulated_threat_level": 5.024, "timewindow": 43} +{"Format": "IDEA0", "ID": "6eb936d2-a1b9-4e02-98ac-4079ceadc389", "DetectTime": "2024-05-21T12:28:36.870115+00:00", "EventTime": "2024-05-21T12:28:36.870135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.51.90.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDdUg3fF7Cj6Jw6Lb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "eb6d7ec4-e04d-4365-a7f9-e7b3e90014cf", "DetectTime": "2024-05-21T12:28:36.876171+00:00", "EventTime": "2024-05-21T12:28:36.876192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZE2mw4GcocDDJTH3a"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c1b2c2a3-76c2-4d51-8576-ef6115075ab2", "DetectTime": "2024-05-21T12:28:36.881527+00:00", "EventTime": "2024-05-21T12:28:36.881546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oopm24T5Xyiyh2ne"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "d9475fa1-0964-4006-9946-c3c628b63973", "DetectTime": "2024-05-21T12:28:36.886584+00:00", "EventTime": "2024-05-21T12:28:36.886603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.49.45.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyNxUscrzyoAw4E6"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9033c950-6a9e-416c-878d-44aeb9b6baf1", "DetectTime": "2024-05-21T12:28:36.890955+00:00", "EventTime": "2024-05-21T12:28:36.890974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.2.30.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4CdC1qVVFqPZ8SN8"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "bcd1815a-a51d-4c1a-81f3-a9a2d4fbe483", "DetectTime": "2024-05-21T12:28:36.895697+00:00", "EventTime": "2024-05-21T12:28:36.895715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChEm2J1eOETg7YG5K2"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "63fd0863-5aaf-4ac3-a4d1-e3437e6ae0c7", "DetectTime": "2024-05-21T12:28:36.900422+00:00", "EventTime": "2024-05-21T12:28:36.900442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.96.180.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeTqxo51Ekh4zxyb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3c95dba0-8008-4cdf-88eb-64f7eea91ffa", "DetectTime": "2024-05-21T12:28:36.905257+00:00", "EventTime": "2024-05-21T12:28:36.905276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxbVBS3HxPsIl5PR63"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "f10f4993-8dcc-4c23-9459-0e1604cd13b0", "DetectTime": "2024-05-21T12:28:37.015055+00:00", "EventTime": "2024-05-21T12:28:37.015078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.192.26.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6POH1UeufmpcizN1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "cf0f9204-c377-4aef-aadc-22de051eaa7b", "DetectTime": "2024-05-21T12:28:37.063623+00:00", "EventTime": "2024-05-21T12:28:37.063644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.223.188.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4dSTz2kliLsl4sqAl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "6a4a6d89-4aee-48d1-ba65-0ec6c55270fd", "DetectTime": "2024-05-21T12:28:37.091548+00:00", "EventTime": "2024-05-21T12:28:37.091571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.18.101.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Y8Nx16CKdqZwgHt4"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "2b8e7230-4592-4583-a570-e7d86ddffa73", "DetectTime": "2024-05-21T12:28:37.096825+00:00", "EventTime": "2024-05-21T12:28:37.096845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.45.73.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpdhK03PoGhuwFfbRh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "f8a86df9-fcfe-4d67-a93d-e6af6bf2a4fb", "DetectTime": "2024-05-21T12:28:37.101624+00:00", "EventTime": "2024-05-21T12:28:37.101643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.132.172.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKbLc41lLklET687Ph"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "4850c501-5a00-4f5d-9faa-b738823a9afd", "DetectTime": "2024-05-21T12:28:37.112451+00:00", "EventTime": "2024-05-21T12:28:37.112471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cug5FAqSmF3hUk3Ac"], "accumulated_threat_level": 5.824, "timewindow": 43} +{"Format": "IDEA0", "ID": "57eff55c-9ea9-442d-aef5-9f921f801387", "DetectTime": "2024-05-21T12:28:37.179779+00:00", "EventTime": "2024-05-21T12:28:37.179800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqhaVb3ChmQ9zzr8n2"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "d9285973-dee2-4a69-a5a4-04ba8f26b0e8", "DetectTime": "2024-05-21T12:28:37.184492+00:00", "EventTime": "2024-05-21T12:28:37.184509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.107.159.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xKiY2rXhEaPA1GTi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9017cddf-545f-42aa-a854-c370669679cf", "DetectTime": "2024-05-21T12:28:37.236531+00:00", "EventTime": "2024-05-21T12:28:37.236553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.61.221.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSsZ0JMT0i6dD3mP3"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "350edd9f-d098-4c59-ac60-fbf045ae8212", "DetectTime": "2024-05-21T12:28:37.260169+00:00", "EventTime": "2024-05-21T12:28:37.260187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.42.7.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPM5K1zUS9M2JP0g"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "bf5e6600-29a1-4133-899f-eb1092957db0", "DetectTime": "2024-05-21T12:28:37.287621+00:00", "EventTime": "2024-05-21T12:28:37.287642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.8.70.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdQJLrPI3Tn2nGlNg"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "22ced852-1b51-48d0-8cec-bcdb173e49f2", "DetectTime": "2024-05-21T12:28:37.299850+00:00", "EventTime": "2024-05-21T12:28:37.299870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlPZgh2jIWQjUe5b", "CCo8ppwxLkHda4sZk", "CEo4cY1t8HZhlCReV7", "CblQllL2nobgcxd59"], "accumulated_threat_level": 6.324, "timewindow": 43} +{"Format": "IDEA0", "ID": "bb6458de-29ba-4275-bdea-98b8b0b8387b", "DetectTime": "2024-05-21T12:28:37.307421+00:00", "EventTime": "2024-05-21T12:28:37.307443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.57.245.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBf20D2XYffXCGFIRe"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "fe2762f2-c747-4fcc-9b95-ab4714822b13", "DetectTime": "2024-05-21T12:28:37.331477+00:00", "EventTime": "2024-05-21T12:28:37.331494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvh2w42IAFDu2QpYp2"], "accumulated_threat_level": 7.124, "timewindow": 43} +{"Format": "IDEA0", "ID": "ef0ebbce-368f-4500-b4fa-83364a44a3fd", "DetectTime": "2024-05-21T12:28:37.365757+00:00", "EventTime": "2024-05-21T12:28:37.365779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJza2I10X95HaP5Je9"], "accumulated_threat_level": 7.9239999999999995, "timewindow": 43} +{"Format": "IDEA0", "ID": "73e915f5-dd48-471f-9326-d4cdc2095590", "DetectTime": "2024-05-21T12:28:37.384583+00:00", "EventTime": "2024-05-21T12:28:37.384602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwv26Y15WBA1N1R4yk"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "a609838b-9b91-4893-934b-9109afbf5988", "DetectTime": "2024-05-21T12:28:37.413221+00:00", "EventTime": "2024-05-21T12:28:37.413240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWpYs1TFedP03ZqY4"], "accumulated_threat_level": 8.724, "timewindow": 43} +{"Format": "IDEA0", "ID": "f344154b-cea8-42f7-a043-6c78377075ec", "DetectTime": "2024-05-21T12:28:37.573183+00:00", "EventTime": "2024-05-21T12:28:37.573202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Choa6KjuPSNXkm4W6"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "1c931c80-4088-4759-b600-ce9f47f7be9b", "DetectTime": "2024-05-21T12:28:37.587119+00:00", "EventTime": "2024-05-21T12:28:37.587138+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Choa6KjuPSNXkm4W6"], "accumulated_threat_level": 1.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "8e60be36-3291-494d-b6fd-4c48cfe131b0", "DetectTime": "2024-05-21T12:28:37.648797+00:00", "EventTime": "2024-05-21T12:28:37.648815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuENGsmixIhZJLKe"], "accumulated_threat_level": 9.524000000000001, "timewindow": 43} +{"Format": "IDEA0", "ID": "0d19cc1e-5e7c-4b5c-8fe9-04cee9a17bc2", "DetectTime": "2024-05-21T12:28:37.681201+00:00", "EventTime": "2024-05-21T12:28:37.681220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeq8XK76uoXNxpL7"], "accumulated_threat_level": 10.324000000000002, "timewindow": 43} +{"Format": "IDEA0", "ID": "9d1d234f-0689-4849-8542-0589657b1e12", "DetectTime": "2024-05-21T12:28:37.702488+00:00", "EventTime": "2024-05-21T12:28:37.702507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTDsJ81eIJ2siPyK9"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "79bb9da3-c8c7-40e4-9e82-bd9c5c8710a8", "DetectTime": "2024-05-21T12:28:37.727987+00:00", "EventTime": "2024-05-21T12:28:37.728007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7MSsY2Ro8OSARnMv5"], "accumulated_threat_level": 11.124000000000002, "timewindow": 43} +{"Format": "IDEA0", "ID": "cd1b0ece-9e54-4726-8500-8889cfc47ae1", "DetectTime": "2024-05-21T12:28:37.757028+00:00", "EventTime": "2024-05-21T12:28:37.757048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7amM1varCi2Ku469"], "accumulated_threat_level": 11.924000000000003, "timewindow": 43} +{"Format": "IDEA0", "ID": "95705934-7ab2-45d7-9f99-04d76a417fbf", "DetectTime": "2024-05-21T12:28:37.789680+00:00", "EventTime": "2024-05-21T12:28:37.789699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlNPnGgM6N6muQcd"], "accumulated_threat_level": 12.724000000000004, "timewindow": 43} +{"Format": "Json", "ID": "95705934-7ab2-45d7-9f99-04d76a417fbf", "DetectTime": "2024-05-21T12:28:37.789680+00:00", "EventTime": "2024-05-21T12:28:37.789699+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "1970-01-02T18:34:56.661153+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:28:38.127379)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.724000000000004, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.724000000000004} +{"Format": "IDEA0", "ID": "eea635bd-c0d9-483d-a9fd-9c93a09189a0", "DetectTime": "2024-05-21T12:28:38.131241+00:00", "EventTime": "2024-05-21T12:28:38.131259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.246.198.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AfMny1ddKuN9lPa"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "53f8800a-fb83-41e2-b179-b34d77ec16ed", "DetectTime": "2024-05-21T12:28:38.145563+00:00", "EventTime": "2024-05-21T12:28:38.145582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqnyt1LjhzsJXso0j"], "accumulated_threat_level": 0.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "9fabd4a7-2191-443d-81c3-afa0dd662e98", "DetectTime": "2024-05-21T12:28:38.163170+00:00", "EventTime": "2024-05-21T12:28:38.163190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeMEbI1LXxHRTQqmJc"], "accumulated_threat_level": 1.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "382007e0-d24e-4a87-bf59-94f20575a06e", "DetectTime": "2024-05-21T12:28:38.174298+00:00", "EventTime": "2024-05-21T12:28:38.174319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnX15521MVKpjy8dZ2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 43} +{"Format": "IDEA0", "ID": "e36d0122-026e-452f-b7d9-79590fdccae2", "DetectTime": "2024-05-21T12:28:38.188034+00:00", "EventTime": "2024-05-21T12:28:38.188055+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGiUw1ZirZPnvaL2k"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "065029d9-faf6-4156-a47d-b594fae91ff3", "DetectTime": "2024-05-21T12:28:38.200828+00:00", "EventTime": "2024-05-21T12:28:38.200850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGiUw1ZirZPnvaL2k"], "accumulated_threat_level": 1.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "983af60b-aa86-4153-9cb2-db4a752ce597", "DetectTime": "2024-05-21T12:28:38.212894+00:00", "EventTime": "2024-05-21T12:28:38.212915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtXvx3moVXouXEgnd"], "accumulated_threat_level": 3.2, "timewindow": 43} +{"Format": "IDEA0", "ID": "c0750d34-2385-4b69-9f64-c97515c763cf", "DetectTime": "2024-05-21T12:28:38.224103+00:00", "EventTime": "2024-05-21T12:28:38.224121+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZZWl1AgvTL1XaITc"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "f4b770af-aaf2-4bec-824f-e495ce68e5a1", "DetectTime": "2024-05-21T12:28:38.239880+00:00", "EventTime": "2024-05-21T12:28:38.239899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZZWl1AgvTL1XaITc"], "accumulated_threat_level": 2.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "143bef28-fee7-4ee7-ac71-845aed04013e", "DetectTime": "2024-05-21T12:28:38.247043+00:00", "EventTime": "2024-05-21T12:28:38.247069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3eGUO4Lj1mbmuLg"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "1c6ae05d-4e6d-4251-9468-172e38328429", "DetectTime": "2024-05-21T12:28:38.264924+00:00", "EventTime": "2024-05-21T12:28:38.264943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboKkN3drD2rGpLioa"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "5b7937d7-1e30-47ed-bf34-6a8ee771d2ad", "DetectTime": "2024-05-21T12:28:38.277286+00:00", "EventTime": "2024-05-21T12:28:38.277304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVP5DZgobMD5ICid"], "accumulated_threat_level": 4.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "1af63a9f-0395-4c50-8a42-057d1bcbbc77", "DetectTime": "2024-05-21T12:28:38.289678+00:00", "EventTime": "2024-05-21T12:28:38.289698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cddlb71SYaQtgzziA3"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "59c928bb-5fce-4701-a0b2-643af4a842cb", "DetectTime": "2024-05-21T12:28:38.306611+00:00", "EventTime": "2024-05-21T12:28:38.306629+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cddlb71SYaQtgzziA3"], "accumulated_threat_level": 2.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "36ac15b9-7cc4-4143-866a-53ad1caa9f7c", "DetectTime": "2024-05-21T12:28:38.313115+00:00", "EventTime": "2024-05-21T12:28:38.313134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.131.102.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPSnv2pzr3wxHCR4k"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "bb2adbd3-670d-4837-a855-4092231c9527", "DetectTime": "2024-05-21T12:28:38.328070+00:00", "EventTime": "2024-05-21T12:28:38.328088+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDLkW3X6RFmOctxDf"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "df15d3fb-277f-4056-a1f6-79bcff66daa9", "DetectTime": "2024-05-21T12:28:38.340788+00:00", "EventTime": "2024-05-21T12:28:38.340805+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDLkW3X6RFmOctxDf"], "accumulated_threat_level": 3.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "b297a845-f8bb-421e-a5c0-64d7b024d36a", "DetectTime": "2024-05-21T12:28:38.353157+00:00", "EventTime": "2024-05-21T12:28:38.353181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClibhG4vHlhZenh4hd"], "accumulated_threat_level": 5.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "e0bff410-cae6-4ba3-a034-5620da9efcfc", "DetectTime": "2024-05-21T12:28:38.366749+00:00", "EventTime": "2024-05-21T12:28:38.366772+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["50.140.64.3"], "Type": ["CC"], "Port": [7288], "Proto": ["TCP"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "C&C channel, destination IP: 50.140.64.3 port: 7288/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsCa3npNeFQKDxyl"], "accumulated_threat_level": 5.624, "timewindow": 43} +{"Format": "IDEA0", "ID": "1ba6e777-f0d3-4470-8b89-6ebd17c308c1", "DetectTime": "2024-05-21T12:28:38.372008+00:00", "EventTime": "2024-05-21T12:28:38.372029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.110.95.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7iE4x1mSQHT9yowId"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "ceba7377-662c-424e-8fe9-ba7a2b486c8a", "DetectTime": "2024-05-21T12:28:38.384633+00:00", "EventTime": "2024-05-21T12:28:38.384652+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["50.140.64.3"], "Type": ["CC"]}, {"IP4": ["50.140.64.3"], "Type": ["CC"], "Port": [7288], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 50.140.64.3 port: 7288/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsCa3npNeFQKDxyl"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "1d18d9ac-f8ec-4952-9266-3e151efcf0d5", "DetectTime": "2024-05-21T12:28:38.395720+00:00", "EventTime": "2024-05-21T12:28:38.395740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZAkm2fFPXq7N1vM"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 43} +{"Format": "IDEA0", "ID": "b4ebff65-7dc6-4aa3-b248-30b0cc54b470", "DetectTime": "2024-05-21T12:28:38.428898+00:00", "EventTime": "2024-05-21T12:28:38.428918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVmPa4rfG6J5FYIPd"], "accumulated_threat_level": 7.223999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "1a4bf595-873b-4269-b297-b08c23b929df", "DetectTime": "2024-05-21T12:28:38.478978+00:00", "EventTime": "2024-05-21T12:28:38.478997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xJSL1xbtAI4P3vw6"], "accumulated_threat_level": 8.024, "timewindow": 43} +{"Format": "IDEA0", "ID": "836344a3-2e8c-46a2-b2ca-adf0e5a8bf2b", "DetectTime": "2024-05-21T12:28:38.521735+00:00", "EventTime": "2024-05-21T12:28:38.521755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoRvlwVdVHVOgNFj"], "accumulated_threat_level": 8.824, "timewindow": 43} +{"Format": "IDEA0", "ID": "b56abac4-dd6b-4d14-8562-f6601f526ac5", "DetectTime": "2024-05-21T12:28:38.543722+00:00", "EventTime": "2024-05-21T12:28:38.543742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcv3k4hhulF1FMPza"], "accumulated_threat_level": 9.624, "timewindow": 43} +{"Format": "IDEA0", "ID": "46d846d1-108f-4505-bdb5-39928c682e22", "DetectTime": "2024-05-21T12:28:38.560690+00:00", "EventTime": "2024-05-21T12:28:38.560708+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP97IQHmLiB0GTL28"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "e11bc3ec-586d-4732-8126-b2fcadefff1e", "DetectTime": "2024-05-21T12:28:38.573109+00:00", "EventTime": "2024-05-21T12:28:38.573127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP97IQHmLiB0GTL28"], "accumulated_threat_level": 3.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "e28b53c8-c1ea-4839-88bf-0f99471000f8", "DetectTime": "2024-05-21T12:28:38.585017+00:00", "EventTime": "2024-05-21T12:28:38.585036+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3L7X3VHZp5157VS4"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "d1efa9af-13e5-4b6a-b783-989bbf3bfafb", "DetectTime": "2024-05-21T12:28:38.598282+00:00", "EventTime": "2024-05-21T12:28:38.598301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3L7X3VHZp5157VS4"], "accumulated_threat_level": 4.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "e5f3fbac-a531-4c40-a475-ba1df26eb46a", "DetectTime": "2024-05-21T12:28:38.604428+00:00", "EventTime": "2024-05-21T12:28:38.604449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.168.128.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CunqJ61d1LjZnKAbl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3c99cca9-4a53-4d9e-8fd1-2f62a25c8c9e", "DetectTime": "2024-05-21T12:28:38.615761+00:00", "EventTime": "2024-05-21T12:28:38.615778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cexlfp4LX7in4qo1L3"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "1a29639b-f2c8-417b-bd51-f6c6e8b6b9fb", "DetectTime": "2024-05-21T12:28:38.627876+00:00", "EventTime": "2024-05-21T12:28:38.627895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cexlfp4LX7in4qo1L3"], "accumulated_threat_level": 4.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "cc80668a-1f96-4d51-8ede-0bbce675b500", "DetectTime": "2024-05-21T12:28:38.639191+00:00", "EventTime": "2024-05-21T12:28:38.639210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGsGB2okHzxukBnFj"], "accumulated_threat_level": 10.424000000000001, "timewindow": 43} +{"Format": "IDEA0", "ID": "23932dba-2e67-442f-b8b6-2373fafaf31c", "DetectTime": "2024-05-21T12:28:38.650222+00:00", "EventTime": "2024-05-21T12:28:38.650239+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkIjv3nYOzm3LBvN1"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "e2832fcc-7f8e-4139-99d6-b968b8d2e2e6", "DetectTime": "2024-05-21T12:28:38.661425+00:00", "EventTime": "2024-05-21T12:28:38.661444+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkIjv3nYOzm3LBvN1"], "accumulated_threat_level": 5.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "05e2c6c5-0474-4984-bb73-6067452acdfc", "DetectTime": "2024-05-21T12:28:38.666493+00:00", "EventTime": "2024-05-21T12:28:38.666512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4uQfA90BwTJFUzh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "26d5289b-4f08-4839-8a50-28a322079a78", "DetectTime": "2024-05-21T12:28:38.680038+00:00", "EventTime": "2024-05-21T12:28:38.680055+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2RSA1q8CivKBNzy5"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "41467df5-2f98-4a21-8129-e56292a0b6b4", "DetectTime": "2024-05-21T12:28:38.691400+00:00", "EventTime": "2024-05-21T12:28:38.691419+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2RSA1q8CivKBNzy5"], "accumulated_threat_level": 5.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "af5f1690-01a9-4d35-b434-8834fe8d6d6a", "DetectTime": "2024-05-21T12:28:38.696387+00:00", "EventTime": "2024-05-21T12:28:38.696404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.32.136.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2G0vh2W5Frk9QDM36"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "833caf35-112b-4801-a545-162d9f07d431", "DetectTime": "2024-05-21T12:28:38.707773+00:00", "EventTime": "2024-05-21T12:28:38.707791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIdpLK1kbsvANuNeV3"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "65621814-9ff9-43f5-a1f9-36dc53772592", "DetectTime": "2024-05-21T12:28:38.719543+00:00", "EventTime": "2024-05-21T12:28:38.719562+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIdpLK1kbsvANuNeV3"], "accumulated_threat_level": 6.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "8e8200bf-10cc-49b0-af59-4f7aca70db1b", "DetectTime": "2024-05-21T12:28:38.740931+00:00", "EventTime": "2024-05-21T12:28:38.740959+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBnun1K8e5UJW34Aa"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "70a335f9-5e1a-4ec3-a2f4-16478be975e4", "DetectTime": "2024-05-21T12:28:38.754369+00:00", "EventTime": "2024-05-21T12:28:38.754388+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBnun1K8e5UJW34Aa"], "accumulated_threat_level": 6.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "9177738c-47f2-4adb-a89b-efc90413529f", "DetectTime": "2024-05-21T12:28:38.759799+00:00", "EventTime": "2024-05-21T12:28:38.759816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.59.178.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qm1s3HYkeRJekLFc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "a288c9b2-d1e8-41bb-bc7b-0a33de11fad8", "DetectTime": "2024-05-21T12:28:38.764153+00:00", "EventTime": "2024-05-21T12:28:38.764170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.110.19.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd81eOIjq3Y0WteF6"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "927956ad-d291-4728-835c-0506302c1a1b", "DetectTime": "2024-05-21T12:28:38.791747+00:00", "EventTime": "2024-05-21T12:28:38.791767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2Ks42hfgojCz5HWl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "a3c3c058-681c-434a-ac7a-b064dbf6f869", "DetectTime": "2024-05-21T12:28:39.039452+00:00", "EventTime": "2024-05-21T12:28:39.039472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.190.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxODu2PAT9cGGHlTl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c87d45d5-c1bc-414a-95bf-a9cb357ef981", "DetectTime": "2024-05-21T12:28:39.057837+00:00", "EventTime": "2024-05-21T12:28:39.057860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWfmiZSCMAFu9ovi"], "accumulated_threat_level": 11.224000000000002, "timewindow": 43} +{"Format": "IDEA0", "ID": "107a7598-75ae-4c36-ad90-38f89f70ae36", "DetectTime": "2024-05-21T12:28:39.163818+00:00", "EventTime": "2024-05-21T12:28:39.163839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.193.80.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRei8D4eL2T9CLXWtg"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "0104d85b-8d66-4302-b928-5f0947780ba7", "DetectTime": "2024-05-21T12:28:39.168811+00:00", "EventTime": "2024-05-21T12:28:39.168831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.229.13.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Q70B3VlbBPGjuWvh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "ebd42b54-1841-42a9-8142-c9c47cae452f", "DetectTime": "2024-05-21T12:28:39.173870+00:00", "EventTime": "2024-05-21T12:28:39.173888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.111.78.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46e3y4VqcrPZ4xzcj"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "cc919bff-2934-4262-8ef1-5af8e8221064", "DetectTime": "2024-05-21T12:28:39.178630+00:00", "EventTime": "2024-05-21T12:28:39.178647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0Jom3yKlQEGl6Duj"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e0243e60-63a0-4f97-aa7f-0cfcc85d7327", "DetectTime": "2024-05-21T12:28:39.196615+00:00", "EventTime": "2024-05-21T12:28:39.196638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.212.161.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpe9kg1UQy1urpyNQ9"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "7912dd5d-f847-4d93-ada7-c83fd1ab622f", "DetectTime": "2024-05-21T12:28:39.201455+00:00", "EventTime": "2024-05-21T12:28:39.201473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.250.18.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL819V2hSOYXiM5tp7"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "988696a4-bcd3-4380-bfd8-96f9459dbd3f", "DetectTime": "2024-05-21T12:28:39.206324+00:00", "EventTime": "2024-05-21T12:28:39.206344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.88.76.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ6teB1OKfiYuwCIM6"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "a074ded4-b104-43a0-b434-660e0210a4f6", "DetectTime": "2024-05-21T12:28:39.252073+00:00", "EventTime": "2024-05-21T12:28:39.252093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYiPh2nMmhGwBPvX5"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9e8bb2e8-9cf7-49ca-9cd8-9a6166286f9d", "DetectTime": "2024-05-21T12:28:39.288642+00:00", "EventTime": "2024-05-21T12:28:39.288660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.105.6.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsoZGX210Vd3IwsJxl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "101874cb-708d-42f1-895f-ab6ea61199b4", "DetectTime": "2024-05-21T12:28:39.343320+00:00", "EventTime": "2024-05-21T12:28:39.343339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJ9gy2yLED9ywttjb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e2764aab-433e-492a-8e76-56d8006523be", "DetectTime": "2024-05-21T12:28:39.378427+00:00", "EventTime": "2024-05-21T12:28:39.378448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbt47NXlg3B8C63j"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "6963edda-868a-4932-9c72-146ad566815b", "DetectTime": "2024-05-21T12:28:39.386082+00:00", "EventTime": "2024-05-21T12:28:39.386103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.184.128.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFChoK2ckUeyKYF6Ih"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "ce27c9d8-a794-416b-86e3-ed9afa7dc9d2", "DetectTime": "2024-05-21T12:28:39.393048+00:00", "EventTime": "2024-05-21T12:28:39.393066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.220.133.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6fJw1HWEU1iugBO7"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "8f6ec5d8-9022-4163-9549-36f6f143d7a8", "DetectTime": "2024-05-21T12:28:39.502059+00:00", "EventTime": "2024-05-21T12:28:39.502086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbohVO24PIhmfNGaP6"], "accumulated_threat_level": 12.024000000000003, "timewindow": 43} +{"Format": "Json", "ID": "8f6ec5d8-9022-4163-9549-36f6f143d7a8", "DetectTime": "2024-05-21T12:28:39.502059+00:00", "EventTime": "2024-05-21T12:28:39.502086+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "1970-01-02T18:36:25.137571+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:28:39.733824)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "018f1655-7891-45da-b838-b8afc1f29181", "DetectTime": "2024-05-21T12:28:39.737680+00:00", "EventTime": "2024-05-21T12:28:39.737698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.15.22.31 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2y0fLuTByzxHBkXc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3f569b11-f9aa-4b0c-88e5-e4aad35c4d95", "DetectTime": "2024-05-21T12:28:39.742079+00:00", "EventTime": "2024-05-21T12:28:39.742097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.207.189.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cenr9q2gx0NfcyBZVd"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3e606725-3ef5-42dd-bba0-3c86f7535bb1", "DetectTime": "2024-05-21T12:28:39.746536+00:00", "EventTime": "2024-05-21T12:28:39.746554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.15.173.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXTp732YSDV8Mj7Wa"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "7d6d704f-b62f-427d-b40d-536939929b74", "DetectTime": "2024-05-21T12:28:39.750984+00:00", "EventTime": "2024-05-21T12:28:39.751002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGq4jZ3v8FxUTZ3Cfb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "65838915-5c16-421e-8bfa-89f53f06006d", "DetectTime": "2024-05-21T12:28:39.755444+00:00", "EventTime": "2024-05-21T12:28:39.755462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRfSC1Coisi4CXcBi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c101304a-cef3-40b2-83a5-3b2213105a2a", "DetectTime": "2024-05-21T12:28:39.759968+00:00", "EventTime": "2024-05-21T12:28:39.759986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COCutD34ukO6zUic3g"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9adee78a-ea9b-4afc-9527-c129fec61699", "DetectTime": "2024-05-21T12:28:39.764330+00:00", "EventTime": "2024-05-21T12:28:39.764347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.187.205.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZeSVwpODI6DLzTsj"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "75c98bed-93be-4143-86b2-acd5b45163a2", "DetectTime": "2024-05-21T12:28:39.891741+00:00", "EventTime": "2024-05-21T12:28:39.891760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.168.104.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmWp82Cg5NTyfvzSe"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "daccf5cd-5472-4bfb-b125-0e7e3d46ab4b", "DetectTime": "2024-05-21T12:28:39.910334+00:00", "EventTime": "2024-05-21T12:28:39.910353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.229.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctb7KgeYeM1AWlqDc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9213c8bc-2c61-4a34-ab81-24a5b09ee510", "DetectTime": "2024-05-21T12:28:39.917930+00:00", "EventTime": "2024-05-21T12:28:39.917950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.97.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIviAN3deSphYUQ9Z2"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e296355e-d56d-4743-ac29-b36e0fa9c996", "DetectTime": "2024-05-21T12:28:39.952344+00:00", "EventTime": "2024-05-21T12:28:39.952366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.58.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5VFW1kOMR8q4aZml"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "14fd6225-9aa0-4920-acb9-076bba7db421", "DetectTime": "2024-05-21T12:28:39.957304+00:00", "EventTime": "2024-05-21T12:28:39.957323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.174.70.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsXOP3KOd1fgCOYHg"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e6b08043-af1f-412a-b987-5a1cdbbd7b25", "DetectTime": "2024-05-21T12:28:39.974078+00:00", "EventTime": "2024-05-21T12:28:39.974100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48rbo4zhUHhFS2s57"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "539d6df4-6f64-47bc-be59-089b801fbc99", "DetectTime": "2024-05-21T12:28:40.067284+00:00", "EventTime": "2024-05-21T12:28:40.067304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["200.25.212.195"]}], "Attach": [{"Content": "Connection to unknown destination port 29021/UDP destination IP 200.25.212.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6eFgOwBIOuDFRSHe"], "accumulated_threat_level": 0.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "fd283f2d-e8e6-4177-bbba-531252cbbd66", "DetectTime": "2024-05-21T12:28:40.072018+00:00", "EventTime": "2024-05-21T12:28:40.072036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.76.103.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDTTY3qJK2pHisoK1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "0dcc6609-0838-4a56-8a36-f2bd0941c798", "DetectTime": "2024-05-21T12:28:40.076328+00:00", "EventTime": "2024-05-21T12:28:40.076345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.32.95.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpCKD2M2YFiyNu21b"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c505d87c-8950-42b7-ac8b-2cf1b33cdbef", "DetectTime": "2024-05-21T12:28:40.080742+00:00", "EventTime": "2024-05-21T12:28:40.080760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgE3w3xJmGUcVTjo"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "8bec4a1b-3e1c-4428-a455-132d1319c19b", "DetectTime": "2024-05-21T12:28:40.151906+00:00", "EventTime": "2024-05-21T12:28:40.151928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.204.139.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbjUg3kxKB4N72Qy"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e4b88259-ccee-4b3a-ba95-53e14b7f5dbb", "DetectTime": "2024-05-21T12:28:40.156762+00:00", "EventTime": "2024-05-21T12:28:40.156780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.108.40.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSAmT36jfOpwH8hj5"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "fc690109-32c0-45bd-80f9-8f160b5151ec", "DetectTime": "2024-05-21T12:28:40.203189+00:00", "EventTime": "2024-05-21T12:28:40.203211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8S0XROu1Lj4xwJR8"], "accumulated_threat_level": 1.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "1d925c21-2032-4acc-98b4-b530adf14e33", "DetectTime": "2024-05-21T12:28:40.207574+00:00", "EventTime": "2024-05-21T12:28:40.207591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.61.86.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZa0qZpVj6v0JKmc8"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "34f30657-fa82-4233-b397-9de0bc29197a", "DetectTime": "2024-05-21T12:28:40.254059+00:00", "EventTime": "2024-05-21T12:28:40.254078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBHYl2w1zxlX3L1r7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 43} +{"Format": "IDEA0", "ID": "9738ba84-0da2-4579-91a8-308cafb80b9b", "DetectTime": "2024-05-21T12:28:40.318950+00:00", "EventTime": "2024-05-21T12:28:40.318971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCC5AqEbsTjKKpNgl"], "accumulated_threat_level": 3.2, "timewindow": 43} +{"Format": "IDEA0", "ID": "439a9386-0cc3-40fd-b8e2-80ce82b8c6d1", "DetectTime": "2024-05-21T12:28:40.404285+00:00", "EventTime": "2024-05-21T12:28:40.404303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.25.212.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwmcmw4N9Nn1YYZOue"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9eb20e05-4d8f-4180-a9f6-d3e4a12782a1", "DetectTime": "2024-05-21T12:28:40.415660+00:00", "EventTime": "2024-05-21T12:28:40.415678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2uWY3LZowpBE8kla"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "8a18e93b-b6fe-43dd-a5e0-8f868ab47b88", "DetectTime": "2024-05-21T12:28:40.420661+00:00", "EventTime": "2024-05-21T12:28:40.420681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 61.83.99.123 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qCfw3vqw0F6tpgui"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "79eba261-4319-4b93-8b91-897a38b5e8fd", "DetectTime": "2024-05-21T12:28:40.438453+00:00", "EventTime": "2024-05-21T12:28:40.438474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7AT01FUsIWUtJlbj"], "accumulated_threat_level": 4.8, "timewindow": 43} +{"Format": "IDEA0", "ID": "f596e7a8-3ae2-417b-a50d-387c6f080f7c", "DetectTime": "2024-05-21T12:28:40.458568+00:00", "EventTime": "2024-05-21T12:28:40.458586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXex2brqQI1keqD2"], "accumulated_threat_level": 5.6, "timewindow": 43} +{"Format": "IDEA0", "ID": "5a5a411d-f7c4-4bd7-a00a-4873f795bdf6", "DetectTime": "2024-05-21T12:28:40.741876+00:00", "EventTime": "2024-05-21T12:28:40.741894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 204.76.196.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71Kv71K52UpYRZI9a"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "76c5e529-45f7-4f4e-b370-71a3bdf841d6", "DetectTime": "2024-05-21T12:28:40.751830+00:00", "EventTime": "2024-05-21T12:28:40.751851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.252.47.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czv9ly1XZ3uzkl1tsi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "8b1360ec-aeea-4b26-8d0a-7d718c16a623", "DetectTime": "2024-05-21T12:28:40.756656+00:00", "EventTime": "2024-05-21T12:28:40.756676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.89.170.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBSq6i6bLunoe9Xh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "41f437d8-b001-411e-b412-c0d201cace7e", "DetectTime": "2024-05-21T12:28:40.761380+00:00", "EventTime": "2024-05-21T12:28:40.761400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.134.148.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gHwG3svroRu5okS1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "d5a5bff9-d7c1-4a8a-89fe-e68e77078852", "DetectTime": "2024-05-21T12:28:40.771565+00:00", "EventTime": "2024-05-21T12:28:40.771592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.134.36.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJerfG2HWwCeoxILZ"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "186361b3-5e68-4165-98c5-9670ccf30912", "DetectTime": "2024-05-21T12:28:40.777435+00:00", "EventTime": "2024-05-21T12:28:40.777454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.240.108.7 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUK8TcVLBqSNXFc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "235cbf6d-9e8f-42be-ad5e-46ef0bca20ae", "DetectTime": "2024-05-21T12:28:40.783445+00:00", "EventTime": "2024-05-21T12:28:40.783463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.134.25.43 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIIVde2mG0yYQG9nQ7"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "5fd69101-392a-49f1-94ef-9e31b8ce7217", "DetectTime": "2024-05-21T12:28:40.823592+00:00", "EventTime": "2024-05-21T12:28:40.823629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "Connection to unknown destination port 24967/UDP destination IP 180.254.84.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IyUj1zwOpck5Yahb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 43} +{"Format": "IDEA0", "ID": "af2c4bbe-27d1-4456-b02b-fe91da2d28dd", "DetectTime": "2024-05-21T12:28:40.857414+00:00", "EventTime": "2024-05-21T12:28:40.857436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.222.233.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEh67K1fXQL3TkLsMi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "2ea06ecb-609d-4830-82c9-ff4707b3e8bd", "DetectTime": "2024-05-21T12:28:40.919444+00:00", "EventTime": "2024-05-21T12:28:40.919465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.143.72.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlOtBVA93ODcOPQk"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "5997ee32-1afc-48d8-8426-6ff3e4dabed4", "DetectTime": "2024-05-21T12:28:40.979316+00:00", "EventTime": "2024-05-21T12:28:40.979335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbnSnpxOBuuISAWe"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "ee733923-7bd0-4437-bd29-16c760ceea6a", "DetectTime": "2024-05-21T12:28:40.984336+00:00", "EventTime": "2024-05-21T12:28:40.984354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWh2Crd2aQ6na9XH7"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3f4b8a98-0d41-4ed5-83cc-31390efd25e9", "DetectTime": "2024-05-21T12:28:40.992036+00:00", "EventTime": "2024-05-21T12:28:40.992055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.127.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6quPa1oHlQdZkIawd"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "5958a9cc-fb47-4bf4-b08c-db671038af84", "DetectTime": "2024-05-21T12:28:40.997446+00:00", "EventTime": "2024-05-21T12:28:40.997476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ3kgr1PiZ6kCHrrEi", "C2jeSa4ZTlq1vRYvwk", "C9AMFy3e90VNtq4TT5", "C7jdZNQEftbUNSNVl"], "accumulated_threat_level": 0.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "7e9d1df1-000c-4230-929b-da85ee82d08b", "DetectTime": "2024-05-21T12:28:41.021482+00:00", "EventTime": "2024-05-21T12:28:41.021504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 111.118.248.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvoF3r15LWa1ipvcqh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "25d32c81-adba-4930-a5e6-e77c79a2cd7a", "DetectTime": "2024-05-21T12:28:41.026248+00:00", "EventTime": "2024-05-21T12:28:41.026268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.190.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcKitwCeb5DL4GB2"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "32691760-1947-4356-8ddf-433f1670324f", "DetectTime": "2024-05-21T12:28:41.103883+00:00", "EventTime": "2024-05-21T12:28:41.103902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0zYu43Uh0OnruHSi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b57dd365-962c-4be0-a857-c9a38e03c8d9", "DetectTime": "2024-05-21T12:28:41.108585+00:00", "EventTime": "2024-05-21T12:28:41.108603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.59.53.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czy6xEiNwTdp3M32j"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "4b3c3bc5-48d4-4e51-81e4-c6478ff531ed", "DetectTime": "2024-05-21T12:28:41.129381+00:00", "EventTime": "2024-05-21T12:28:41.129402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.62.100.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cznsij22kKKbuJskhh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "6b3f608e-5dcb-45eb-9dee-0064591d26b5", "DetectTime": "2024-05-21T12:28:41.160083+00:00", "EventTime": "2024-05-21T12:28:41.160104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.188.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadUSH3i5lAcNa53J6"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "41f7e357-e1aa-41c7-b297-ddad68a1f529", "DetectTime": "2024-05-21T12:28:41.184283+00:00", "EventTime": "2024-05-21T12:28:41.184305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.178.136.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCNrRmCyAD21UNl4"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "5547a4c2-6114-4715-94a9-8fc14a409483", "DetectTime": "2024-05-21T12:28:41.196960+00:00", "EventTime": "2024-05-21T12:28:41.196980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCCj84P5b0XUApeN6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4d3e7cca-c6bf-49a8-a2e1-57a2930530bc", "DetectTime": "2024-05-21T12:28:41.444348+00:00", "EventTime": "2024-05-21T12:28:41.444368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 207.86.132.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caw2esoswzp0ApnUh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9eb78e69-b446-4315-8383-15df002aeebe", "DetectTime": "2024-05-21T12:28:41.470814+00:00", "EventTime": "2024-05-21T12:28:41.470836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.132.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIL8w2DuNGG1bBKQ8"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "69ef2e48-97e8-4176-8c3c-18d7fa2ee930", "DetectTime": "2024-05-21T12:28:41.475635+00:00", "EventTime": "2024-05-21T12:28:41.475653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.95.174.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYX2SK2o3hMLn20AC"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e46df398-4353-4860-9979-a66d883b3bd6", "DetectTime": "2024-05-21T12:28:41.521813+00:00", "EventTime": "2024-05-21T12:28:41.521832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbHc9iS8Bmg3MTNhc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "7a5588a6-2c87-464a-b88d-aa693bc2ab71", "DetectTime": "2024-05-21T12:28:41.642210+00:00", "EventTime": "2024-05-21T12:28:41.642242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.248.253.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreGPE4uK2QQ2nqHI"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3e2da8c4-dc1a-4440-b12a-016310383a8f", "DetectTime": "2024-05-21T12:28:41.746452+00:00", "EventTime": "2024-05-21T12:28:41.746472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.38.247.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAF3m2KWksQ2ymgHc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "50192f86-20fe-4c4d-9b70-f5aed06c456d", "DetectTime": "2024-05-21T12:28:41.868271+00:00", "EventTime": "2024-05-21T12:28:41.868288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yUms6iDDedsbDI6"], "accumulated_threat_level": 1.3, "timewindow": 44} +{"Format": "IDEA0", "ID": "e5a36632-6081-4f6e-9497-0293d195ea44", "DetectTime": "2024-05-21T12:28:41.958040+00:00", "EventTime": "2024-05-21T12:28:41.958060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.54.0.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmRUhC1xOHNtDeQpBf"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "27b4e718-095b-47f1-8c7f-2886eb125bbd", "DetectTime": "2024-05-21T12:28:41.986130+00:00", "EventTime": "2024-05-21T12:28:41.986152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.235.201 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5rw6LJXIakVfb6t9"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "535881a9-b380-427b-9469-5f3cce204f1f", "DetectTime": "2024-05-21T12:28:41.993628+00:00", "EventTime": "2024-05-21T12:28:41.993648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.14.232.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cekq8LZlYdAQO8dIj"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "a1d9b940-68c5-4e47-a690-d55beec4d64e", "DetectTime": "2024-05-21T12:28:42.051172+00:00", "EventTime": "2024-05-21T12:28:42.051191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.152.133.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifcmWdBw0uvhqJSh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b08741a1-4357-4d13-bf90-6dac1ea557ee", "DetectTime": "2024-05-21T12:28:42.086945+00:00", "EventTime": "2024-05-21T12:28:42.086966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.57.12.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJToj1N9njIXpxeq1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "da9c5ac9-f7c5-48a4-acb2-4398ea33b70d", "DetectTime": "2024-05-21T12:28:42.093162+00:00", "EventTime": "2024-05-21T12:28:42.093181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.229.208.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsgRCsxI9FcpSCGl"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "597aa763-a106-400f-a1f7-a64e1eb44296", "DetectTime": "2024-05-21T12:28:42.105178+00:00", "EventTime": "2024-05-21T12:28:42.105199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.152.36.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDC3XE4nCV8CJ4Phc2"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "2f561c66-d5b2-47f1-b888-cb4b82187a27", "DetectTime": "2024-05-21T12:28:42.154480+00:00", "EventTime": "2024-05-21T12:28:42.154501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.160.175.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1aHl4ti1wV5x0s4i"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "d74ec016-39e5-44f2-a00b-cbf1114efa02", "DetectTime": "2024-05-21T12:28:42.159470+00:00", "EventTime": "2024-05-21T12:28:42.159491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.110.162.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQgU4M3uUsv24gAT0c"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "6eaba23d-b460-4854-8901-44794fdb73d9", "DetectTime": "2024-05-21T12:28:42.205368+00:00", "EventTime": "2024-05-21T12:28:42.205392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.236.50.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Ysja3jiqnxS3dVmi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "265dee1e-a8d8-400e-bff4-0a82c44f8338", "DetectTime": "2024-05-21T12:28:42.240088+00:00", "EventTime": "2024-05-21T12:28:42.240117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxDwA2xSfMdNPUhli"], "accumulated_threat_level": 2.1, "timewindow": 44} +{"Format": "IDEA0", "ID": "1be4014d-f443-4b3d-94db-d15a3aa02951", "DetectTime": "2024-05-21T12:28:42.245934+00:00", "EventTime": "2024-05-21T12:28:42.245954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.101.27.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNz5wi1xMHAVQyNEoi"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c9296a58-4cf1-4be5-8515-b1481d5f6570", "DetectTime": "2024-05-21T12:28:42.278810+00:00", "EventTime": "2024-05-21T12:28:42.278829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.151.117.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgN0B7eiLcVBEFUrh"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "567cd7e1-6551-4fdd-981d-8b9647465fc5", "DetectTime": "2024-05-21T12:28:42.306679+00:00", "EventTime": "2024-05-21T12:28:42.306699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.193.78.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiCfy3d4hx1jMdz52"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "f35503a3-32b7-425f-944f-5f88b29959fa", "DetectTime": "2024-05-21T12:28:42.317730+00:00", "EventTime": "2024-05-21T12:28:42.317749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkAiw2wdQjd7tgUPf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 44} +{"Format": "IDEA0", "ID": "272a147f-fd48-401e-a624-f49a7df74a23", "DetectTime": "2024-05-21T12:28:42.350072+00:00", "EventTime": "2024-05-21T12:28:42.350094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.65.185.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyowNA3GFhbMGXmE14"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "25fdd6b6-dedf-4079-8d3c-8528d54bf9ab", "DetectTime": "2024-05-21T12:28:42.376129+00:00", "EventTime": "2024-05-21T12:28:42.376147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFyz24AGW46jV5Nve"], "accumulated_threat_level": 3.7, "timewindow": 44} +{"Format": "IDEA0", "ID": "2c60e913-dcb3-497e-92c7-03964abe9a04", "DetectTime": "2024-05-21T12:28:42.405952+00:00", "EventTime": "2024-05-21T12:28:42.405972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9lw43WxAuxHpI3Bc"], "accumulated_threat_level": 4.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "dd41c19c-a019-492b-89b3-068c61dba62e", "DetectTime": "2024-05-21T12:28:42.427603+00:00", "EventTime": "2024-05-21T12:28:42.427625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.73.4.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRe2x1h9S6aTR6us1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b599b71e-556b-4b87-a299-6563498c7058", "DetectTime": "2024-05-21T12:28:42.454566+00:00", "EventTime": "2024-05-21T12:28:42.454587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAh0Kko4RyFKqi8Jb"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "df9bf858-d12c-4943-9194-9e36dffa3059", "DetectTime": "2024-05-21T12:28:42.487692+00:00", "EventTime": "2024-05-21T12:28:42.487712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2C9L1pwnlcTj0mhf"], "accumulated_threat_level": 5.3, "timewindow": 44} +{"Format": "IDEA0", "ID": "18935e43-1caf-4430-b508-e218182519f3", "DetectTime": "2024-05-21T12:28:42.492476+00:00", "EventTime": "2024-05-21T12:28:42.492494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.195.133.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzvqG2E32hjhiu6oc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "58ca0b7d-73a8-43dd-9ee3-2d8d0a744b4a", "DetectTime": "2024-05-21T12:28:42.774282+00:00", "EventTime": "2024-05-21T12:28:42.774305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.140.158.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA974A35GHteQa1Kge"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "76048794-0f8a-4bb9-b1bc-ce2c90b86223", "DetectTime": "2024-05-21T12:28:42.779911+00:00", "EventTime": "2024-05-21T12:28:42.779930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.218.94.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9XX5ha8nxGMaDja"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "61cb5c52-eaf8-4549-aeba-231f1f9ae6a0", "DetectTime": "2024-05-21T12:28:42.784230+00:00", "EventTime": "2024-05-21T12:28:42.784247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.228.253.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85mi230ZfanOrtfg1"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "59a6a650-2940-48f1-9caa-33d9fb3ed018", "DetectTime": "2024-05-21T12:28:42.789022+00:00", "EventTime": "2024-05-21T12:28:42.789042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.254.84.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEpou1hQO0fC2P35c"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "cf990c19-8218-442c-a46e-8579c275fbea", "DetectTime": "2024-05-21T12:28:42.794615+00:00", "EventTime": "2024-05-21T12:28:42.794633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 208.29.231.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWIYzN2C4Jm5dx6Ns4"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "bac61f97-d9ca-45e9-98cf-109285d16229", "DetectTime": "2024-05-21T12:28:42.819905+00:00", "EventTime": "2024-05-21T12:28:42.819926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.22.180.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcR5BV24kk4FFv8mG8"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c40bbe69-e2de-49fc-ad76-e36650d36a71", "DetectTime": "2024-05-21T12:28:42.834425+00:00", "EventTime": "2024-05-21T12:28:42.834447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlVmL1XtUDdVToMng"], "accumulated_threat_level": 6.1, "timewindow": 44} +{"Format": "IDEA0", "ID": "8504948a-02da-404a-8a7b-59e62a9ff607", "DetectTime": "2024-05-21T12:28:42.919855+00:00", "EventTime": "2024-05-21T12:28:42.919875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwS9Vr2PkUbH38JRaf"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 44} +{"Format": "IDEA0", "ID": "fa324613-5482-492a-b35b-49106a96976d", "DetectTime": "2024-05-21T12:28:42.949750+00:00", "EventTime": "2024-05-21T12:28:42.949769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEjfmP1WeeW1FgdEDe"], "accumulated_threat_level": 7.699999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "f724f941-8cdc-4169-88ad-5e485c3c684a", "DetectTime": "2024-05-21T12:28:42.981095+00:00", "EventTime": "2024-05-21T12:28:42.981117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AZ48XF1W0A2N1kg"], "accumulated_threat_level": 8.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "35f12cec-0264-4754-88a0-b3f837c137de", "DetectTime": "2024-05-21T12:28:43.011682+00:00", "EventTime": "2024-05-21T12:28:43.011703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4iE93YDkVLe8t4V3"], "accumulated_threat_level": 9.3, "timewindow": 44} +{"Format": "IDEA0", "ID": "35ed9bd7-2652-4458-8189-b65398e2d5fb", "DetectTime": "2024-05-21T12:28:43.042154+00:00", "EventTime": "2024-05-21T12:28:43.042175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP09Vv26wZewrCSdQ9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "88b3016e-8b6e-4d38-96c9-bc688a6a2aea", "DetectTime": "2024-05-21T12:28:43.063588+00:00", "EventTime": "2024-05-21T12:28:43.063609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiT89B1wOqnVl5RmSd"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "0bfb85c7-6362-4bd0-90de-ebb9756c6884", "DetectTime": "2024-05-21T12:28:43.093361+00:00", "EventTime": "2024-05-21T12:28:43.093379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PnYP3vpgHZEeme8c"], "accumulated_threat_level": 10.900000000000002, "timewindow": 44} +{"Format": "IDEA0", "ID": "021c121d-9205-461d-b832-372105476c79", "DetectTime": "2024-05-21T12:28:43.108811+00:00", "EventTime": "2024-05-21T12:28:43.108834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.35.208 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnoB32bJI8aPpPZxk"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "abec5a58-4029-4958-bf49-a4110cbbb272", "DetectTime": "2024-05-21T12:28:43.148988+00:00", "EventTime": "2024-05-21T12:28:43.149010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.70.165.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL5Kln4q4KgkAoHOe6"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b5cae787-9eb5-46a5-8695-a03b502fcf7c", "DetectTime": "2024-05-21T12:28:43.154212+00:00", "EventTime": "2024-05-21T12:28:43.154234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.185.232.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBlls2tMJBpeY3Ty2"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b16bb294-7ff2-4d03-9002-39d62ef12051", "DetectTime": "2024-05-21T12:28:43.188573+00:00", "EventTime": "2024-05-21T12:28:43.188592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.109.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COob4x1wuh28D2AtBd"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "e3e9a6ee-6cdf-49eb-b23c-59aff48c6f5f", "DetectTime": "2024-05-21T12:28:43.205679+00:00", "EventTime": "2024-05-21T12:28:43.205698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNY9UU2DjFpUIOmusf"], "accumulated_threat_level": 11.700000000000003, "timewindow": 44} +{"Format": "IDEA0", "ID": "a2326167-792c-4d8b-a0c3-61a95bc09b8d", "DetectTime": "2024-05-21T12:28:43.227664+00:00", "EventTime": "2024-05-21T12:28:43.227686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.180.20.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XC6a1j4jBGOtW1od"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "3ab88430-2d4b-4bfd-8382-3fec3bd35207", "DetectTime": "2024-05-21T12:28:43.259672+00:00", "EventTime": "2024-05-21T12:28:43.259695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRa1S1kDVX3ulZ3qc"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "9d9f06bb-bc93-47f7-8e8d-aeaec9edef96", "DetectTime": "2024-05-21T12:28:43.313325+00:00", "EventTime": "2024-05-21T12:28:43.313348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92MHrFqcc5hRlro", "C9yUbW2l5OfQxvSCEk", "CiW3phRM70bM918Ej", "CZCmXNquRdalnxULk"], "accumulated_threat_level": 12.200000000000003, "timewindow": 44} +{"Format": "Json", "ID": "9d9f06bb-bc93-47f7-8e8d-aeaec9edef96", "DetectTime": "2024-05-21T12:28:43.313325+00:00", "EventTime": "2024-05-21T12:28:43.313348+00:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "1970-01-02T19:08:40.838367+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2024/05/21 12:28:43.561182)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 44, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "e420a6af-5147-44d3-b614-e10f3133fdaf", "DetectTime": "2024-05-21T12:28:43.572972+00:00", "EventTime": "2024-05-21T12:28:43.572994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cds8Jc14833fqQuWFh"], "accumulated_threat_level": 0.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "1ccb52a3-5bca-47fb-992c-1559f90bd7d1", "DetectTime": "2024-05-21T12:28:43.585038+00:00", "EventTime": "2024-05-21T12:28:43.585059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxpbxy13y7otP7xol5"], "accumulated_threat_level": 0.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "8dac0d87-d752-4405-905d-b3e3d6870679", "DetectTime": "2024-05-21T12:28:43.630715+00:00", "EventTime": "2024-05-21T12:28:43.630733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM5QdD2X05pnNIGSQc"], "accumulated_threat_level": 1.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "919dbb5e-03ca-4133-be04-ab01805304b4", "DetectTime": "2024-05-21T12:28:43.641858+00:00", "EventTime": "2024-05-21T12:28:43.641876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJjUklc1mvIDcDq4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 44} +{"Format": "IDEA0", "ID": "ce661b39-5fa1-4c78-892d-0d31d4dc6221", "DetectTime": "2024-05-21T12:28:43.652590+00:00", "EventTime": "2024-05-21T12:28:43.652607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnC6DW3cBprkHos7Ib"], "accumulated_threat_level": 3.2, "timewindow": 44} +{"Format": "IDEA0", "ID": "221a6c46-445f-453a-8dd5-2d9336f13593", "DetectTime": "2024-05-21T12:28:43.706633+00:00", "EventTime": "2024-05-21T12:28:43.706651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANbRP35mCrqJ0yHH4"], "accumulated_threat_level": 4.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "010e1197-1543-4b6e-8da5-07ac9a5ef0f3", "DetectTime": "2024-05-21T12:28:43.738845+00:00", "EventTime": "2024-05-21T12:28:43.738865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFpRa3dk97wwMHtGd"], "accumulated_threat_level": 4.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "f573e7a0-4ab8-401a-aeca-2931124c8217", "DetectTime": "2024-05-21T12:28:43.864401+00:00", "EventTime": "2024-05-21T12:28:43.864422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIGKnm1OA6Z3b2CUX9"], "accumulated_threat_level": 5.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "3711bd55-7f50-4cf7-8a71-45483c43ac56", "DetectTime": "2024-05-21T12:28:43.893950+00:00", "EventTime": "2024-05-21T12:28:43.893967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIMjh2U6GALFBUDc2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 44} +{"Format": "IDEA0", "ID": "57dd642f-63e0-48e0-a453-c274e6a1af7d", "DetectTime": "2024-05-21T12:28:44.167248+00:00", "EventTime": "2024-05-21T12:28:44.167269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGjlAn2fzntWRRGw24"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5ce54785-9e7d-4b4a-80bb-37bdb4ba5946", "DetectTime": "2024-05-21T12:28:44.241652+00:00", "EventTime": "2024-05-21T12:28:44.241675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGN1X174ov4cphWjf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "5a43096b-2fce-403d-b336-a7597e2994d1", "DetectTime": "2024-05-21T12:28:44.263468+00:00", "EventTime": "2024-05-21T12:28:44.263490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1Zd53aBJDlpnm1Di"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "dfced41d-be26-4796-9f7c-2fbedf32f302", "DetectTime": "2024-05-21T12:28:44.335790+00:00", "EventTime": "2024-05-21T12:28:44.335850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHBSr4ortyG3QS2q7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "8a106e03-7cfd-4fe4-aa73-325464354043", "DetectTime": "2024-05-21T12:28:44.398920+00:00", "EventTime": "2024-05-21T12:28:44.398942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoaGFGSqCvNXVQBa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "919417be-38e5-43dc-b036-37ae1af43d22", "DetectTime": "2024-05-21T12:28:44.410986+00:00", "EventTime": "2024-05-21T12:28:44.411004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDo1EK34fUcGOFlNr3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "e8e2a9c0-0408-4f34-acdd-e3a9ca82c402", "DetectTime": "2024-05-21T12:28:44.439916+00:00", "EventTime": "2024-05-21T12:28:44.439935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "Connection to unknown destination port 22322/UDP destination IP 79.131.97.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjxnc3dNFUduODgk2"], "accumulated_threat_level": 9.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "bd3e01b8-f33b-4c49-bbcd-8b5d21d0b04b", "DetectTime": "2024-05-21T12:28:44.488769+00:00", "EventTime": "2024-05-21T12:28:44.488787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoxqZ1yguGUE3B0A6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "89f7d920-ac1e-4801-8d31-5def6d39d948", "DetectTime": "2024-05-21T12:28:44.520588+00:00", "EventTime": "2024-05-21T12:28:44.520612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PsXT1pKBpYgWpAi2"], "accumulated_threat_level": 10.4, "timewindow": 44} +{"Format": "IDEA0", "ID": "e5786dfa-00df-4e90-8518-159cf76f833f", "DetectTime": "2024-05-21T12:28:44.551180+00:00", "EventTime": "2024-05-21T12:28:44.551199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7tvXM2rfxp2g3jlca"], "accumulated_threat_level": 11.200000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "f5ebe837-bed5-4dc0-a713-e2cf88ccbb17", "DetectTime": "2024-05-21T12:28:44.628311+00:00", "EventTime": "2024-05-21T12:28:44.628329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "Connection to unknown destination port 27560/UDP destination IP 186.61.86.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYkE14HKS1e0Egb45"], "accumulated_threat_level": 12.000000000000002, "timewindow": 44} +{"Format": "Json", "ID": "f5ebe837-bed5-4dc0-a713-e2cf88ccbb17", "DetectTime": "2024-05-21T12:28:44.628311+00:00", "EventTime": "2024-05-21T12:28:44.628329+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "1970-01-02T19:08:40.944113+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2024/05/21 12:28:44.777153)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 44, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1b92eb47-35f8-4bd7-9d98-b762a3dc0ff5", "DetectTime": "2024-05-21T12:28:44.787015+00:00", "EventTime": "2024-05-21T12:28:44.787034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSVQG1ld7xHgGMUA6"], "accumulated_threat_level": 0.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "dff5e79b-e84a-4b01-98bb-9a62097a9652", "DetectTime": "2024-05-21T12:28:44.810392+00:00", "EventTime": "2024-05-21T12:28:44.810448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "Connection to unknown destination port 19132/UDP destination IP 85.72.219.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCSwtm2w5JFQCdUc52"], "accumulated_threat_level": 1.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "05b4d215-1bdf-410e-ad94-0a0a525e0145", "DetectTime": "2024-05-21T12:28:44.838482+00:00", "EventTime": "2024-05-21T12:28:44.838503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChmwJp3KXBbZ1EzF8l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4d31c868-a836-4851-b48d-b1a0003c9cbb", "DetectTime": "2024-05-21T12:28:44.867674+00:00", "EventTime": "2024-05-21T12:28:44.867693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "Connection to unknown destination port 1196/UDP destination IP 5.140.158.40. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnZ7xDqgzchIptknf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 44} +{"Format": "IDEA0", "ID": "29cc8fdd-6079-4fcd-81a9-f907a3ca4d54", "DetectTime": "2024-05-21T12:28:44.927406+00:00", "EventTime": "2024-05-21T12:28:44.927426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHKHg3neDmcGWaHXl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b5722d83-f01f-4f43-8cdb-0e6e9ae99c08", "DetectTime": "2024-05-21T12:28:44.953727+00:00", "EventTime": "2024-05-21T12:28:44.953746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwt2aW3ce23SiZP265"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "ecef852d-aaa3-4716-96ce-0ae766324f21", "DetectTime": "2024-05-21T12:28:45.022254+00:00", "EventTime": "2024-05-21T12:28:45.022273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "Connection to unknown destination port 5541/UDP destination IP 78.139.188.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEe5qG4Hw2acAQSgRb"], "accumulated_threat_level": 3.2, "timewindow": 44} +{"Format": "IDEA0", "ID": "deabe6d8-c33c-4d3a-b2da-60dfe4f8f379", "DetectTime": "2024-05-21T12:28:45.044164+00:00", "EventTime": "2024-05-21T12:28:45.044185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSRfh451W5b7vhH6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8380438e-62b6-43b1-a12d-c3570acf6ef5", "DetectTime": "2024-05-21T12:28:45.073198+00:00", "EventTime": "2024-05-21T12:28:45.073218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRNln3GZ7zwrpbFFa"], "accumulated_threat_level": 4.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "e0d48fe2-04ee-4f61-af33-e628bd3c4d2f", "DetectTime": "2024-05-21T12:28:45.092046+00:00", "EventTime": "2024-05-21T12:28:45.092069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wZMU2kDeJJ1L79oa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8fbda907-7e91-4383-a98d-4d71046b05ba", "DetectTime": "2024-05-21T12:28:45.127822+00:00", "EventTime": "2024-05-21T12:28:45.127841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrAIp3Ph0CIhzZZg6"], "accumulated_threat_level": 4.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "5f4f52f6-f22e-4fee-ba8a-7396180c83ae", "DetectTime": "2024-05-21T12:28:45.132474+00:00", "EventTime": "2024-05-21T12:28:45.132494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAnEiMXHEcrGwDZc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "7f88e062-f414-4dce-998e-d06d538895fa", "DetectTime": "2024-05-21T12:28:45.165023+00:00", "EventTime": "2024-05-21T12:28:45.165044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0NhA3pFIDf054xu6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "504d296b-492c-4717-b215-b22693bfe2e5", "DetectTime": "2024-05-21T12:28:45.191372+00:00", "EventTime": "2024-05-21T12:28:45.191391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdEwjT3VwxPFsRm2Ck"], "accumulated_threat_level": 5.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "dc97e947-377e-4e05-a97a-92248bca080b", "DetectTime": "2024-05-21T12:28:45.446225+00:00", "EventTime": "2024-05-21T12:28:45.446248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMl2A1wDCE15nYPjl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "c43c9a05-27e9-4902-bfb4-4c8adcaed98f", "DetectTime": "2024-05-21T12:28:45.450918+00:00", "EventTime": "2024-05-21T12:28:45.450939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqLJF2sOYyg0rQwT7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "e96809f2-7ee5-4e34-a043-743f7afe2b30", "DetectTime": "2024-05-21T12:28:45.473036+00:00", "EventTime": "2024-05-21T12:28:45.473059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5bdysOcr5xdNAWWi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "e30d0927-c226-4b24-9972-556088a17da3", "DetectTime": "2024-05-21T12:28:45.491651+00:00", "EventTime": "2024-05-21T12:28:45.491670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVimtG30XsQ6GQwPW4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4a42eaaf-059e-4cf7-a51f-810f928faf80", "DetectTime": "2024-05-21T12:28:45.520887+00:00", "EventTime": "2024-05-21T12:28:45.520908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXAsh4N9lMA21ea13"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "c601e50f-f8eb-46a8-9227-f5fb0a288610", "DetectTime": "2024-05-21T12:28:45.563060+00:00", "EventTime": "2024-05-21T12:28:45.563081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rUre3PPbW08CA7za"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "0798de20-631d-4913-aaa0-ad2c68af6668", "DetectTime": "2024-05-21T12:28:45.575133+00:00", "EventTime": "2024-05-21T12:28:45.575152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNUJt1IZzYWAa72Kb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 44} +{"Format": "IDEA0", "ID": "8c2ba146-5c17-4e34-9cf8-488af955518f", "DetectTime": "2024-05-21T12:28:45.755743+00:00", "EventTime": "2024-05-21T12:28:45.755764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0sr02s4c4DAaLWZa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "17ce78c9-27b9-466b-bc2f-998cb053500d", "DetectTime": "2024-05-21T12:28:45.832011+00:00", "EventTime": "2024-05-21T12:28:45.832031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBrhO20XrhrIVtRB8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "7fbcb389-1c9e-4a18-9815-bb88071594aa", "DetectTime": "2024-05-21T12:28:45.874266+00:00", "EventTime": "2024-05-21T12:28:45.874288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.61.221.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuByyQ2EG7NttvOhZk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "cf074be3-3eda-4b85-83ec-f0aeabfbd38e", "DetectTime": "2024-05-21T12:28:45.966206+00:00", "EventTime": "2024-05-21T12:28:45.966228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0upwr1hZxYnCxJHAa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5fb9df5f-3a36-47e1-84ea-f1ef2f185722", "DetectTime": "2024-05-21T12:28:46.026385+00:00", "EventTime": "2024-05-21T12:28:46.026418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9Ihd43HltkrIBrSi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "44bb448b-330a-433e-a1cf-131fb78f5e47", "DetectTime": "2024-05-21T12:28:46.053052+00:00", "EventTime": "2024-05-21T12:28:46.053072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsmEB2KEznMJU4mEe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "26f0f04b-e7a3-4f25-a4f1-13a166d07749", "DetectTime": "2024-05-21T12:28:46.079940+00:00", "EventTime": "2024-05-21T12:28:46.079962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHo1TT29pAv1AMTBvk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "c7f7db78-5d68-448f-a58c-5be5005065ea", "DetectTime": "2024-05-21T12:28:46.179175+00:00", "EventTime": "2024-05-21T12:28:46.179195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cycd2l2t8p1ug6QZo3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "026199b8-09f0-4c88-b21f-fde280be79cc", "DetectTime": "2024-05-21T12:28:46.184806+00:00", "EventTime": "2024-05-21T12:28:46.184826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWpy22vEZ3LYrTRE", "CbVgLZ2ODYdl8cyCd3", "CIWgLA4WXHcbRZYwck", "CKjh4X3o1i2smxrCYd"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 44} +{"Format": "IDEA0", "ID": "5eac670b-db60-4eb7-811a-3108e4dbc501", "DetectTime": "2024-05-21T12:28:46.277866+00:00", "EventTime": "2024-05-21T12:28:46.277883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpPIuq1VWqMNyMbVWg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "d3e1a568-d7aa-4566-8c33-7e480cc9349a", "DetectTime": "2024-05-21T12:28:46.309255+00:00", "EventTime": "2024-05-21T12:28:46.309276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGpvljYXdmwWRiV7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8ebfbbaa-69ff-4643-a056-1503ca2dbb33", "DetectTime": "2024-05-21T12:28:46.320686+00:00", "EventTime": "2024-05-21T12:28:46.320706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJGKNO3E5Eg4PVXkCj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "5a1b6e5f-bd12-4057-8986-7f0f164e58c5", "DetectTime": "2024-05-21T12:28:46.356013+00:00", "EventTime": "2024-05-21T12:28:46.356034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6cfOG2oFMoExZ4pi5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "270c32f7-3b4e-4a1a-9841-012e5d2795ca", "DetectTime": "2024-05-21T12:28:46.381856+00:00", "EventTime": "2024-05-21T12:28:46.381875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZpVQ3Vj5mDSdRYbl"], "accumulated_threat_level": 8.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "ab68691c-5e3a-4739-8e56-00ab048db275", "DetectTime": "2024-05-21T12:28:46.412167+00:00", "EventTime": "2024-05-21T12:28:46.412187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8Xay21ljrK7l2jX8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b3e8e7bb-32c6-4520-83a2-9dc49076296e", "DetectTime": "2024-05-21T12:28:46.462568+00:00", "EventTime": "2024-05-21T12:28:46.462590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3xsr3aqHOgjGMred"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "fe428d93-e5e9-4bcc-b4b0-c09c8d99d822", "DetectTime": "2024-05-21T12:28:46.510922+00:00", "EventTime": "2024-05-21T12:28:46.510943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZV1c1ydv0juhVbm8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "1a2bb9b5-6f5c-42ed-8d8d-5d37dd32b6e1", "DetectTime": "2024-05-21T12:28:46.599051+00:00", "EventTime": "2024-05-21T12:28:46.599072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtzhYSKkpUWph0f7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "c7a24bc3-847d-457a-98a0-420149bc632f", "DetectTime": "2024-05-21T12:28:46.835706+00:00", "EventTime": "2024-05-21T12:28:46.835726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX10uqAauP0iMux5j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5c218c42-b767-4a95-8ca9-883943ccdf4e", "DetectTime": "2024-05-21T12:28:46.923753+00:00", "EventTime": "2024-05-21T12:28:46.923775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.229.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7DZB1eNmDMpxpsOg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "51443fbd-fb77-41c1-81de-8c084c784c87", "DetectTime": "2024-05-21T12:28:46.983205+00:00", "EventTime": "2024-05-21T12:28:46.983224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuFNlL2QeJReFMkWhd"], "accumulated_threat_level": 9.3, "timewindow": 44} +{"Format": "IDEA0", "ID": "35265db7-f8e1-458d-92b0-1ef11edbce19", "DetectTime": "2024-05-21T12:28:47.013818+00:00", "EventTime": "2024-05-21T12:28:47.013839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.97.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7G15ElFKCtS1kolc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "abd2d35a-5fff-4f72-9a88-02daa1a23806", "DetectTime": "2024-05-21T12:28:47.044701+00:00", "EventTime": "2024-05-21T12:28:47.044720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyo8yc2XNibtUMLhud"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "1ed50dbe-dea1-465e-a800-827a002d2604", "DetectTime": "2024-05-21T12:28:47.066925+00:00", "EventTime": "2024-05-21T12:28:47.066946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYS0ZG2rsnAc5MoPm8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "1f782fcc-aac4-4dcd-8ca4-1334ea16098c", "DetectTime": "2024-05-21T12:28:47.096234+00:00", "EventTime": "2024-05-21T12:28:47.096257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIXZkG4m3BGGtu6DOg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "2a31ec64-2ab1-43aa-a877-da07d74e45d8", "DetectTime": "2024-05-21T12:28:47.108072+00:00", "EventTime": "2024-05-21T12:28:47.108097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CThVd74d8eb7RAkJN9"], "accumulated_threat_level": 10.900000000000002, "timewindow": 44} +{"Format": "IDEA0", "ID": "e0b12743-000b-49a9-99c8-f374730f2194", "DetectTime": "2024-05-21T12:28:47.137957+00:00", "EventTime": "2024-05-21T12:28:47.137978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.108.40.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE29KJ3HhT6A49D2H4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "e27941e2-31ef-47a0-850c-d44f2e0738da", "DetectTime": "2024-05-21T12:28:47.170079+00:00", "EventTime": "2024-05-21T12:28:47.170097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkA4ry24fnmLeMEsWd"], "accumulated_threat_level": 11.700000000000003, "timewindow": 44} +{"Format": "IDEA0", "ID": "c01781ef-fe6b-4b25-b739-2ee8187376ea", "DetectTime": "2024-05-21T12:28:47.180090+00:00", "EventTime": "2024-05-21T12:28:47.180109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.61.86.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPWQd3arZYfldCvxg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4ab599d9-c682-40d6-a83b-e74677f4c938", "DetectTime": "2024-05-21T12:28:47.217303+00:00", "EventTime": "2024-05-21T12:28:47.217323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.25.212.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CohDBp1iQnMtfUuQA8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "a16a3986-29cf-41f4-acdd-ab9f48fd259b", "DetectTime": "2024-05-21T12:28:47.222712+00:00", "EventTime": "2024-05-21T12:28:47.222738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.134.36.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYrKN3Kdd5fQxU3R1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5b851b6f-1410-40c3-8af6-ec76a9e25f90", "DetectTime": "2024-05-21T12:28:47.244053+00:00", "EventTime": "2024-05-21T12:28:47.244076+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9XDo39aa1ObCyRT9"], "accumulated_threat_level": 11.724000000000002, "timewindow": 44} +{"Format": "IDEA0", "ID": "fbb7a1a4-ec9d-4820-9838-3834d90f1f3b", "DetectTime": "2024-05-21T12:28:47.266168+00:00", "EventTime": "2024-05-21T12:28:47.266189+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["93.109.245.154"], "Type": ["CC"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9XDo39aa1ObCyRT9"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "322b7ecb-0210-4113-9364-b84bfa1fc693", "DetectTime": "2024-05-21T12:28:47.281924+00:00", "EventTime": "2024-05-21T12:28:47.281946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUJer4bovMBbYgMD2"], "accumulated_threat_level": 12.524000000000003, "timewindow": 44} +{"Format": "Json", "ID": "322b7ecb-0210-4113-9364-b84bfa1fc693", "DetectTime": "2024-05-21T12:28:47.281924+00:00", "EventTime": "2024-05-21T12:28:47.281946+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "1970-01-02T19:39:44.306955+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2024/05/21 12:28:47.507953)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 44, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "3500afbd-1195-4345-805c-5f9dcbf46744", "DetectTime": "2024-05-21T12:28:47.521630+00:00", "EventTime": "2024-05-21T12:28:47.521650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkrvW2eyVGJoEHMIh"], "accumulated_threat_level": 0.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "ce57e39d-548a-4616-ba1d-d0210b00d073", "DetectTime": "2024-05-21T12:28:47.533541+00:00", "EventTime": "2024-05-21T12:28:47.533565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.245.129.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkbeFcgRX6Yf7vHe"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "b1b7bac3-a039-4872-bab4-ef96553d2c49", "DetectTime": "2024-05-21T12:28:47.546254+00:00", "EventTime": "2024-05-21T12:28:47.546272+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.245.129.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.245.129.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkbeFcgRX6Yf7vHe"], "accumulated_threat_level": 7.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "257681ac-d21d-4276-9b5a-a6e5ce9dc47e", "DetectTime": "2024-05-21T12:28:47.556355+00:00", "EventTime": "2024-05-21T12:28:47.556373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAdFxGSY2NHbUNESg"], "accumulated_threat_level": 1.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "535dc290-d4d8-4983-b518-ee9957df8356", "DetectTime": "2024-05-21T12:28:47.567351+00:00", "EventTime": "2024-05-21T12:28:47.567372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22OUD40vV2MVWzeQb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 44} +{"Format": "IDEA0", "ID": "35892f4d-4fec-4665-9df8-2bf707993cbb", "DetectTime": "2024-05-21T12:28:47.572080+00:00", "EventTime": "2024-05-21T12:28:47.572099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGbxa4H7C0HWnBKsf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5a14f034-4898-4b86-b659-4130b02d9733", "DetectTime": "2024-05-21T12:28:47.576610+00:00", "EventTime": "2024-05-21T12:28:47.576628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWuJu24peR18Reqlb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "489d0593-ed35-4562-850d-862a09cba10b", "DetectTime": "2024-05-21T12:28:47.586883+00:00", "EventTime": "2024-05-21T12:28:47.586901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jna9jyuO3lyDRw1"], "accumulated_threat_level": 3.2, "timewindow": 44} +{"Format": "IDEA0", "ID": "db4c5116-fb67-4c83-ac31-ef6841037bdd", "DetectTime": "2024-05-21T12:28:47.593333+00:00", "EventTime": "2024-05-21T12:28:47.593353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.188.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnBBh9iV1UnzYgr3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "002e29c3-7674-48a3-8ac7-aa4be9a51515", "DetectTime": "2024-05-21T12:28:47.641230+00:00", "EventTime": "2024-05-21T12:28:47.641250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6Gef1MBAfmen7rOk"], "accumulated_threat_level": 4.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "7e0e0298-a687-41a4-8d6c-67745857be16", "DetectTime": "2024-05-21T12:28:47.647303+00:00", "EventTime": "2024-05-21T12:28:47.647323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.132.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oCSTg8WU5QFzpSa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "dd9f7740-1baf-4fcf-b869-9ef1a9095a49", "DetectTime": "2024-05-21T12:28:47.651932+00:00", "EventTime": "2024-05-21T12:28:47.651950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.73.4.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1l6THbA5o2rXwP09"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "275ab9f7-33b2-44e2-8a9a-9a57381b9a4b", "DetectTime": "2024-05-21T12:28:47.696973+00:00", "EventTime": "2024-05-21T12:28:47.696998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8Ook4BDqeMkRlvh7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "bb0ec508-ecdb-487b-8592-b9d890a549b1", "DetectTime": "2024-05-21T12:28:47.716400+00:00", "EventTime": "2024-05-21T12:28:47.716420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.254.84.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqTwZ2P7IxcivlqLj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4d5f5f90-1b69-40c5-8839-832ed60e2ccf", "DetectTime": "2024-05-21T12:28:47.972871+00:00", "EventTime": "2024-05-21T12:28:47.972891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdbeP14UpISMHw8h6"], "accumulated_threat_level": 4.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "db14b1fd-8f5b-4212-8ba9-06245cc77375", "DetectTime": "2024-05-21T12:28:47.977725+00:00", "EventTime": "2024-05-21T12:28:47.977742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.140.158.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OABo2V4KUGaQ5iu"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b4d9de43-2d0e-4607-9bd0-20c5a458e452", "DetectTime": "2024-05-21T12:28:48.016753+00:00", "EventTime": "2024-05-21T12:28:48.016774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmFFH1sKZc3Umzri1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "ee670836-f54e-4254-9556-fe52c1d04308", "DetectTime": "2024-05-21T12:28:48.021591+00:00", "EventTime": "2024-05-21T12:28:48.021611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.109.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJZVB1OEtaf8f4CF4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "c8392a81-0c00-4002-a3fb-157e4d8252cb", "DetectTime": "2024-05-21T12:28:48.065854+00:00", "EventTime": "2024-05-21T12:28:48.065875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTP7A74uSv5BiTjNMc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "7a860324-95f2-4266-bf01-250e8f4f5c2d", "DetectTime": "2024-05-21T12:28:48.076777+00:00", "EventTime": "2024-05-21T12:28:48.076795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4vbf87ksebYfuW2"], "accumulated_threat_level": 5.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "5271d6af-dd30-443d-a5ff-6d487709158a", "DetectTime": "2024-05-21T12:28:48.119216+00:00", "EventTime": "2024-05-21T12:28:48.119233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrREL34JlZ7gvYYj4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 44} +{"Format": "IDEA0", "ID": "657f603a-a95b-4890-900c-ef73a3fcf9f4", "DetectTime": "2024-05-21T12:28:48.186739+00:00", "EventTime": "2024-05-21T12:28:48.186760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09Pmx325Udjus2ty9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "b810f980-fe7d-4853-af0f-44bc41988a21", "DetectTime": "2024-05-21T12:28:48.263618+00:00", "EventTime": "2024-05-21T12:28:48.263637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxuO2427UyehENJi1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "921cbee6-76d4-4922-a8c5-293949262ed2", "DetectTime": "2024-05-21T12:28:48.275578+00:00", "EventTime": "2024-05-21T12:28:48.275599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95lhx3kIG7Ndb2JWd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "927c40f4-7d2e-4d67-abdd-5e8bb2f081d7", "DetectTime": "2024-05-21T12:28:48.311902+00:00", "EventTime": "2024-05-21T12:28:48.311920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEY9lc30tU8dxe81G"], "accumulated_threat_level": 8.799999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "6f3f1cbe-2775-4e3e-a638-d9707e121137", "DetectTime": "2024-05-21T12:28:48.339812+00:00", "EventTime": "2024-05-21T12:28:48.339834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEgiE1jLCWjTsu5Ik"], "accumulated_threat_level": 9.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "fd5b6d33-8850-4bd4-8868-c8032e84e5a8", "DetectTime": "2024-05-21T12:28:48.370447+00:00", "EventTime": "2024-05-21T12:28:48.370466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIKRc3AXV8M7Z3Ga"], "accumulated_threat_level": 10.4, "timewindow": 44} +{"Format": "IDEA0", "ID": "2cae058f-e42d-4b7d-8eec-79236d40741e", "DetectTime": "2024-05-21T12:28:48.402253+00:00", "EventTime": "2024-05-21T12:28:48.402271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMc2H3SxMu57vNIz2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "f6241b5a-d577-438c-9ef2-d15bd0298bca", "DetectTime": "2024-05-21T12:28:48.433200+00:00", "EventTime": "2024-05-21T12:28:48.433218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAu1urnOXLE8mI0th"], "accumulated_threat_level": 12.000000000000002, "timewindow": 44} +{"Format": "Json", "ID": "f6241b5a-d577-438c-9ef2-d15bd0298bca", "DetectTime": "2024-05-21T12:28:48.433200+00:00", "EventTime": "2024-05-21T12:28:48.433218+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "1970-01-02T19:39:46.608960+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2024/05/21 12:28:48.663337)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 44, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a4e5e324-8482-4605-a473-2489751700bd", "DetectTime": "2024-05-21T12:28:48.674393+00:00", "EventTime": "2024-05-21T12:28:48.674425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqSmo2Pkbc2ihOiy4"], "accumulated_threat_level": 0.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "950ed392-079c-4cd0-a2ae-bc87b555ecb6", "DetectTime": "2024-05-21T12:28:48.691157+00:00", "EventTime": "2024-05-21T12:28:48.691179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw51AL3vMBljT4Gst6"], "accumulated_threat_level": 1.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "abfa0c09-5caa-4b47-8794-e6cf431708bc", "DetectTime": "2024-05-21T12:28:48.702565+00:00", "EventTime": "2024-05-21T12:28:48.702585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.161.19.18"]}], "Attach": [{"Content": "Connection to unknown destination port 4008/UDP destination IP 59.161.19.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2TjB1f9qScbwXUtf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 44} +{"Format": "IDEA0", "ID": "aecffc42-ec6a-49fd-b1d5-486d8fee4408", "DetectTime": "2024-05-21T12:28:48.717116+00:00", "EventTime": "2024-05-21T12:28:48.717134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerBIM1bWbJPiwe6ca"], "accumulated_threat_level": 3.2, "timewindow": 44} +{"Format": "IDEA0", "ID": "60442a7a-57df-47ab-b828-315c2c3a24f9", "DetectTime": "2024-05-21T12:28:48.738837+00:00", "EventTime": "2024-05-21T12:28:48.738954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn7GfP23vcG8zFd8tk"], "accumulated_threat_level": 4.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "793744d1-80cc-4037-8236-56b0ef52f925", "DetectTime": "2024-05-21T12:28:48.749823+00:00", "EventTime": "2024-05-21T12:28:48.749840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgf4iu2OI9G1GHJKHk"], "accumulated_threat_level": 4.8, "timewindow": 44} +{"Format": "IDEA0", "ID": "c2c4aed7-b748-40d1-a2b9-7e75e0a69e1e", "DetectTime": "2024-05-21T12:28:48.901652+00:00", "EventTime": "2024-05-21T12:28:48.901670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CChp6A29MdcLvHRVAg"], "accumulated_threat_level": 5.6, "timewindow": 44} +{"Format": "IDEA0", "ID": "9806ad4f-2097-4ae4-8562-93997c22dab3", "DetectTime": "2024-05-21T12:28:48.907346+00:00", "EventTime": "2024-05-21T12:28:48.907364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2QCHk1wOg3TqRR1r8", "Cn0RjEjAOkQaPURd7", "Co8vHs1sYOUIfePt62", "C7iyDR2Z8wDT6xz4td"], "accumulated_threat_level": 6.1, "timewindow": 44} +{"Format": "IDEA0", "ID": "3165a7c9-70d4-4094-a02c-e59f5c7d2c44", "DetectTime": "2024-05-21T12:28:49.039270+00:00", "EventTime": "2024-05-21T12:28:49.039290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.174.187.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgX5Ra3xxbPMbaDBe2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "02184b96-38a0-42c7-bebf-3e11703582e5", "DetectTime": "2024-05-21T12:28:49.303878+00:00", "EventTime": "2024-05-21T12:28:49.303898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcLuz3fOtX4YN23Zi"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 44} +{"Format": "IDEA0", "ID": "dee68ae5-e748-4d00-aa4d-56346a96e06f", "DetectTime": "2024-05-21T12:28:49.497050+00:00", "EventTime": "2024-05-21T12:28:49.497075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJJQ5XQhV5c4PfKf"], "accumulated_threat_level": 7.699999999999999, "timewindow": 44} +{"Format": "IDEA0", "ID": "4daac1bd-35b2-4265-88f9-d46e5246094b", "DetectTime": "2024-05-21T12:28:49.516924+00:00", "EventTime": "2024-05-21T12:28:49.516944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.229.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOgZTACZYfw25Ovf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "dc4890f1-f37b-401c-b512-82e5483dcf6d", "DetectTime": "2024-05-21T12:28:49.546008+00:00", "EventTime": "2024-05-21T12:28:49.546029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMW1dakc017t7s98f"], "accumulated_threat_level": 8.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "529864c9-9c32-4a9d-b114-3374711d3bdc", "DetectTime": "2024-05-21T12:28:49.577218+00:00", "EventTime": "2024-05-21T12:28:49.577237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoHPygUjIF6lJ5lWc"], "accumulated_threat_level": 9.3, "timewindow": 44} +{"Format": "IDEA0", "ID": "b7604c7c-5a8e-4be9-8226-cc3c7425ed67", "DetectTime": "2024-05-21T12:28:49.666676+00:00", "EventTime": "2024-05-21T12:28:49.666697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSScbOiuGbf7YZxg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "57afafaa-7f34-4bf7-b07a-94dc7ef72cc4", "DetectTime": "2024-05-21T12:28:49.811479+00:00", "EventTime": "2024-05-21T12:28:49.811500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.134.36.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPsqOc6nG0tIGTtZa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "49d31e82-4ad4-45cb-91e2-113b4e46e0eb", "DetectTime": "2024-05-21T12:28:50.092622+00:00", "EventTime": "2024-05-21T12:28:50.092644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.132.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfR4Bi4bzR0u0IHhik"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b36560a1-98d6-415b-81d0-0768ab38a6cb", "DetectTime": "2024-05-21T12:28:50.602838+00:00", "EventTime": "2024-05-21T12:28:50.602871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.252.131.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5O1lP1XVxWnC6Cbdc"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "5de94010-15d4-4746-93bf-a86d7d2ef4eb", "DetectTime": "2024-05-21T12:28:50.618401+00:00", "EventTime": "2024-05-21T12:28:50.618433+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.252.131.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.252.131.148 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: ppp-70-252-131-148.dsl.ksc2mo.swbell.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5O1lP1XVxWnC6Cbdc"], "accumulated_threat_level": 7.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "b3789f8b-7f11-4bc4-826e-3ac7a5aab8c2", "DetectTime": "2024-05-21T12:28:50.623775+00:00", "EventTime": "2024-05-21T12:28:50.623793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.73.4.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61Ryk2b03gKMFohh1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "dbbac5c0-866b-4bb8-bce1-0b7cb6fc7697", "DetectTime": "2024-05-21T12:28:50.785679+00:00", "EventTime": "2024-05-21T12:28:50.785699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.109.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDGJo4kQWZVWYe7va"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "268d92a8-5249-4d55-b56b-c6aab4464ed0", "DetectTime": "2024-05-21T12:28:50.871083+00:00", "EventTime": "2024-05-21T12:28:50.871105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nA0J1PVbTal0dHpl", "CKuI1N1FnnNhVahB6", "CpLIJj2wzc5znZzNM3", "CfNpvMaHHKp6iaS2a"], "accumulated_threat_level": 0.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "c254e835-f037-4936-b84a-89a894ff9168", "DetectTime": "2024-05-21T12:28:51.163561+00:00", "EventTime": "2024-05-21T12:28:51.163583+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SgTH1lGst4mjhwec"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "1f181e01-4871-4684-b8a1-09f8e3593456", "DetectTime": "2024-05-21T12:28:51.176355+00:00", "EventTime": "2024-05-21T12:28:51.176373+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SgTH1lGst4mjhwec"], "accumulated_threat_level": 8.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "64e78e93-199f-49bf-a9f6-cce540e9477b", "DetectTime": "2024-05-21T12:28:51.311875+00:00", "EventTime": "2024-05-21T12:28:51.311892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbE3xg4Hl7oRoQj8V7"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "4c4abb75-5972-4e98-9eb8-fd207656ddb1", "DetectTime": "2024-05-21T12:28:51.323787+00:00", "EventTime": "2024-05-21T12:28:51.323805+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbE3xg4Hl7oRoQj8V7"], "accumulated_threat_level": 8.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "2d92f62b-43ed-43cf-9060-8bf00ad9f894", "DetectTime": "2024-05-21T12:28:51.382897+00:00", "EventTime": "2024-05-21T12:28:51.382919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUQyi4qMdcN6K2aJi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "eac852af-c354-4fff-a4d1-3dc90835b836", "DetectTime": "2024-05-21T12:28:51.414708+00:00", "EventTime": "2024-05-21T12:28:51.414728+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKpw32eDMMlzZG7ke"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "f0022092-581a-45db-a857-e7200ed66ddf", "DetectTime": "2024-05-21T12:28:51.428277+00:00", "EventTime": "2024-05-21T12:28:51.428298+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKpw32eDMMlzZG7ke"], "accumulated_threat_level": 9.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "a870bcd5-46b3-424d-8300-a02b5f1dae35", "DetectTime": "2024-05-21T12:28:51.441707+00:00", "EventTime": "2024-05-21T12:28:51.441728+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nTfE2U8vfQNOQdM2"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "99b801f3-896e-4c35-b881-0447bcf4cefe", "DetectTime": "2024-05-21T12:28:51.454600+00:00", "EventTime": "2024-05-21T12:28:51.454619+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nTfE2U8vfQNOQdM2"], "accumulated_threat_level": 9.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "aeb75c43-92b1-4768-a6e8-ce8eb94f2794", "DetectTime": "2024-05-21T12:28:51.459369+00:00", "EventTime": "2024-05-21T12:28:51.459387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ7l7A2PMOJVueQGcf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4ab019d4-466c-47de-af11-48901cf9fac8", "DetectTime": "2024-05-21T12:28:51.491757+00:00", "EventTime": "2024-05-21T12:28:51.491778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfodId2bwxqJ4mMvGj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "ac3c631a-bcfd-4041-95c9-5b31f0c4d131", "DetectTime": "2024-05-21T12:28:51.522960+00:00", "EventTime": "2024-05-21T12:28:51.522978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtcv5shobQt7eYd7"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "c6876df6-5e17-4b8a-910a-2e26de578db2", "DetectTime": "2024-05-21T12:28:51.535076+00:00", "EventTime": "2024-05-21T12:28:51.535097+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtcv5shobQt7eYd7"], "accumulated_threat_level": 10.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "b689786e-7ee9-4040-a582-da24afcd0d4a", "DetectTime": "2024-05-21T12:28:51.539914+00:00", "EventTime": "2024-05-21T12:28:51.539932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCN2KF304NHuHCRhC3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b7982be8-dfa2-4b82-929b-43eeea3cd923", "DetectTime": "2024-05-21T12:28:51.602652+00:00", "EventTime": "2024-05-21T12:28:51.602681+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFdNd2nFCGm2kUtdl"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "21b36b78-88a2-43f7-99f2-4609f317c282", "DetectTime": "2024-05-21T12:28:51.654199+00:00", "EventTime": "2024-05-21T12:28:51.654222+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFdNd2nFCGm2kUtdl"], "accumulated_threat_level": 10.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "8a47a963-07d6-4186-be64-4618e5e3611f", "DetectTime": "2024-05-21T12:28:52.022575+00:00", "EventTime": "2024-05-21T12:28:52.022596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc28g01atvJFsBaXhb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "33f4f312-a9b6-45e7-8e63-e62935c34989", "DetectTime": "2024-05-21T12:28:52.085782+00:00", "EventTime": "2024-05-21T12:28:52.085801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cla3Wd30IzVjwEiDW9"], "accumulated_threat_level": 1.3, "timewindow": 45} +{"Format": "IDEA0", "ID": "1cf2bd87-90d8-4e02-9778-2fadba01cf10", "DetectTime": "2024-05-21T12:28:52.167309+00:00", "EventTime": "2024-05-21T12:28:52.167329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRFRg91eVn2INmfPa9"], "accumulated_threat_level": 2.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "7915c096-8048-4622-9331-5d4f3f1964d5", "DetectTime": "2024-05-21T12:28:52.202373+00:00", "EventTime": "2024-05-21T12:28:52.202391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbNb3cylQmaGGnMb"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 45} +{"Format": "IDEA0", "ID": "851f6da6-076f-4918-9cd9-3786ab9cc0be", "DetectTime": "2024-05-21T12:28:52.207105+00:00", "EventTime": "2024-05-21T12:28:52.207123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cug5FAqSmF3hUk3Ac"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5aae5062-a95e-4f27-a285-e249c30f28fd", "DetectTime": "2024-05-21T12:28:52.282113+00:00", "EventTime": "2024-05-21T12:28:52.282132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3F9b63TZQo9Gtkcb"], "accumulated_threat_level": 3.7, "timewindow": 45} +{"Format": "IDEA0", "ID": "51452aa5-ca79-4b20-aa33-447fa279f169", "DetectTime": "2024-05-21T12:28:52.289107+00:00", "EventTime": "2024-05-21T12:28:52.289126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqy8zh1SVqeSFGaxP6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "702fc5c3-e00f-4d6c-a10e-74b760f7bf36", "DetectTime": "2024-05-21T12:28:52.317013+00:00", "EventTime": "2024-05-21T12:28:52.317030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDn2n47v9PZImHr05"], "accumulated_threat_level": 4.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "da4435f8-11bb-4c4b-ac4a-f1a7e8e55a30", "DetectTime": "2024-05-21T12:28:52.365262+00:00", "EventTime": "2024-05-21T12:28:52.365284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK09eg4nxy6eZ2Xbcg"], "accumulated_threat_level": 5.3, "timewindow": 45} +{"Format": "IDEA0", "ID": "84982799-2876-4054-8895-57a63999de5c", "DetectTime": "2024-05-21T12:28:52.370495+00:00", "EventTime": "2024-05-21T12:28:52.370515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvh2w42IAFDu2QpYp2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "134fe976-0f96-4e34-b724-3425018ad050", "DetectTime": "2024-05-21T12:28:52.642523+00:00", "EventTime": "2024-05-21T12:28:52.642545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJza2I10X95HaP5Je9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "48adc2fa-cbb9-42ae-a042-93133c9d4c60", "DetectTime": "2024-05-21T12:28:52.663866+00:00", "EventTime": "2024-05-21T12:28:52.663886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWpYs1TFedP03ZqY4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "7f4b0e6e-18f4-412a-a0a0-63439507f868", "DetectTime": "2024-05-21T12:28:52.701623+00:00", "EventTime": "2024-05-21T12:28:52.701671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoY99X3Zr5y1juXxh4"], "accumulated_threat_level": 6.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "239375f9-52fb-4735-a3e2-83dbb07394cd", "DetectTime": "2024-05-21T12:28:52.713385+00:00", "EventTime": "2024-05-21T12:28:52.713407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuENGsmixIhZJLKe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "fb42712d-e50b-4468-89e1-70238882da9c", "DetectTime": "2024-05-21T12:28:52.739873+00:00", "EventTime": "2024-05-21T12:28:52.739896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeq8XK76uoXNxpL7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b12f83fd-e8f1-49be-9145-b1bc8cf59ebf", "DetectTime": "2024-05-21T12:28:52.765561+00:00", "EventTime": "2024-05-21T12:28:52.765581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7MSsY2Ro8OSARnMv5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "f057490b-c0c6-481e-8609-12960c631543", "DetectTime": "2024-05-21T12:28:52.778583+00:00", "EventTime": "2024-05-21T12:28:52.778601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVLl5NHKmR37Vj78"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 45} +{"Format": "IDEA0", "ID": "75ee901d-26bd-42e3-9dac-4d98b2ec794e", "DetectTime": "2024-05-21T12:28:52.820538+00:00", "EventTime": "2024-05-21T12:28:52.820559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7amM1varCi2Ku469"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "6969672a-08d9-445d-b925-4b634d6bb1f5", "DetectTime": "2024-05-21T12:28:52.842897+00:00", "EventTime": "2024-05-21T12:28:52.842920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlNPnGgM6N6muQcd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "7236b64c-11b1-4212-9955-0ff9f1343b79", "DetectTime": "2024-05-21T12:28:52.855253+00:00", "EventTime": "2024-05-21T12:28:52.855273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzGVw9sfTAOP9GU4"], "accumulated_threat_level": 7.699999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "dbe201ac-6aa9-4269-b8d8-fb81f50ae9fc", "DetectTime": "2024-05-21T12:28:52.896489+00:00", "EventTime": "2024-05-21T12:28:52.896511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqnyt1LjhzsJXso0j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "090b3b43-0373-421b-b164-63857290e48a", "DetectTime": "2024-05-21T12:28:52.929357+00:00", "EventTime": "2024-05-21T12:28:52.929379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeMEbI1LXxHRTQqmJc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "45ea66f4-c64b-4ae4-bf5d-312d2cfa0b8c", "DetectTime": "2024-05-21T12:28:52.942429+00:00", "EventTime": "2024-05-21T12:28:52.942449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq79T1iLw4G0Adaog"], "accumulated_threat_level": 8.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "28815441-cc9d-49d6-bf7a-cd5d5f2393cb", "DetectTime": "2024-05-21T12:28:52.974919+00:00", "EventTime": "2024-05-21T12:28:52.974939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnX15521MVKpjy8dZ2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "bd8d2aba-e772-4090-9da5-70f817ea804b", "DetectTime": "2024-05-21T12:28:53.002218+00:00", "EventTime": "2024-05-21T12:28:53.002238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbsFF4uNbBoodgpIl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "2b6e5511-d2b4-47d7-9a1c-43cf585c0664", "DetectTime": "2024-05-21T12:28:53.020957+00:00", "EventTime": "2024-05-21T12:28:53.020977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.61.221.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwtLQM3pTrUludoNng"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "fea49d19-4024-4510-a091-260793b10aed", "DetectTime": "2024-05-21T12:28:53.047070+00:00", "EventTime": "2024-05-21T12:28:53.047088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy06w3cxQ7LzUbs66"], "accumulated_threat_level": 9.3, "timewindow": 45} +{"Format": "IDEA0", "ID": "c98a488b-dc69-4d62-8d4f-162256ded81a", "DetectTime": "2024-05-21T12:28:53.079361+00:00", "EventTime": "2024-05-21T12:28:53.079380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CirySN5elei8RAq56"], "accumulated_threat_level": 10.100000000000001, "timewindow": 45} +{"Format": "IDEA0", "ID": "06fa96d8-e5bf-4b7d-9d3d-81912c927194", "DetectTime": "2024-05-21T12:28:53.111880+00:00", "EventTime": "2024-05-21T12:28:53.111898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZigZ3xc1JVS3mJwb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 45} +{"Format": "IDEA0", "ID": "031de844-3d92-4169-ae0d-7fe45f609ffe", "DetectTime": "2024-05-21T12:28:53.144119+00:00", "EventTime": "2024-05-21T12:28:53.144137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqoli1m7OOB9kHnk4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 45} +{"Format": "IDEA0", "ID": "5630acbd-ebec-43b9-9631-6b51684f2b37", "DetectTime": "2024-05-21T12:28:53.166545+00:00", "EventTime": "2024-05-21T12:28:53.166567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtXvx3moVXouXEgnd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5868700b-62d2-4ee0-ad7f-a8937a228bb2", "DetectTime": "2024-05-21T12:28:53.341671+00:00", "EventTime": "2024-05-21T12:28:53.341691+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVY0a2aqF2g2tyWjf"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "c78e6f55-5f64-42bf-90c4-9fc5a6e85be1", "DetectTime": "2024-05-21T12:28:53.353577+00:00", "EventTime": "2024-05-21T12:28:53.353596+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVY0a2aqF2g2tyWjf"], "accumulated_threat_level": 11.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "6165d3b2-ec7e-4430-a684-8b0a08e48f4e", "DetectTime": "2024-05-21T12:28:53.364321+00:00", "EventTime": "2024-05-21T12:28:53.364338+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59PKj2hh3IvmxwNrf"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "f576f87e-11f5-4370-843a-d778baf54d37", "DetectTime": "2024-05-21T12:28:53.375093+00:00", "EventTime": "2024-05-21T12:28:53.375110+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59PKj2hh3IvmxwNrf"], "accumulated_threat_level": 11.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "6c40fe20-2a58-4643-a67b-0970075da5b3", "DetectTime": "2024-05-21T12:28:53.428915+00:00", "EventTime": "2024-05-21T12:28:53.428933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWIU9391HoDOprZA1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 45} +{"Format": "Json", "ID": "6c40fe20-2a58-4643-a67b-0970075da5b3", "DetectTime": "2024-05-21T12:28:53.428915+00:00", "EventTime": "2024-05-21T12:28:53.428933+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "1970-01-02T20:12:58.363270+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2024/05/21 12:28:53.618386)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 45, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "035db67e-5dd7-4522-9028-82c015bf3f89", "DetectTime": "2024-05-21T12:28:53.622698+00:00", "EventTime": "2024-05-21T12:28:53.622718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZAkm2fFPXq7N1vM"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "57ad1301-3169-4bff-baa3-9333b5d89290", "DetectTime": "2024-05-21T12:28:53.628081+00:00", "EventTime": "2024-05-21T12:28:53.628101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClibhG4vHlhZenh4hd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "45614479-6525-4f1d-bd4b-ae68f9135eda", "DetectTime": "2024-05-21T12:28:53.632629+00:00", "EventTime": "2024-05-21T12:28:53.632648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsCa3npNeFQKDxyl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "f6e60067-7d55-4d9d-b806-531cd34d897a", "DetectTime": "2024-05-21T12:28:53.637375+00:00", "EventTime": "2024-05-21T12:28:53.637393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVP5DZgobMD5ICid"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "f8223065-956b-4127-8c7e-1a82f6bc33db", "DetectTime": "2024-05-21T12:28:53.642126+00:00", "EventTime": "2024-05-21T12:28:53.642144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboKkN3drD2rGpLioa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "e6b1341c-e762-4f0c-a452-836226a02d77", "DetectTime": "2024-05-21T12:28:53.646625+00:00", "EventTime": "2024-05-21T12:28:53.646642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COg8Zy4VQ9kxl0ERQ"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "0c052174-fe1a-4f66-9844-e4f340a96a99", "DetectTime": "2024-05-21T12:28:53.658987+00:00", "EventTime": "2024-05-21T12:28:53.659007+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Nfxi4ySyWPk3lmHc"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "3775fbe1-5c57-4235-b878-4603c065fdaa", "DetectTime": "2024-05-21T12:28:53.671375+00:00", "EventTime": "2024-05-21T12:28:53.671394+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Nfxi4ySyWPk3lmHc"], "accumulated_threat_level": 12.0, "timewindow": 16} +{"Format": "Json", "ID": "3775fbe1-5c57-4235-b878-4603c065fdaa", "DetectTime": "2024-05-21T12:28:53.671375+00:00", "EventTime": "2024-05-21T12:28:53.671394+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "1970-01-01T15:50:40.875973+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 16. (real time 2024/05/21 12:28:53.962467)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 16, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "017e6042-9ef5-4a2f-9b08-a3d6f96a1b67", "DetectTime": "2024-05-21T12:28:53.975340+00:00", "EventTime": "2024-05-21T12:28:53.975360+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6nM835PBbbipSqU4"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "5bc1f9cf-cd57-4183-b479-65320f96632a", "DetectTime": "2024-05-21T12:28:53.989718+00:00", "EventTime": "2024-05-21T12:28:53.989741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6nM835PBbbipSqU4"], "accumulated_threat_level": 0.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "9a805c25-5ac6-435a-8b2b-ee2bb37c563a", "DetectTime": "2024-05-21T12:28:54.002462+00:00", "EventTime": "2024-05-21T12:28:54.002480+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ6bQQ7o2miN4Tv9b"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "43335dc3-bead-4f2b-b8ab-f6cd56ba64b0", "DetectTime": "2024-05-21T12:28:54.016566+00:00", "EventTime": "2024-05-21T12:28:54.016589+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ6bQQ7o2miN4Tv9b"], "accumulated_threat_level": 1.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "f37f0e32-5a98-4809-add5-30913f721058", "DetectTime": "2024-05-21T12:28:54.028402+00:00", "EventTime": "2024-05-21T12:28:54.028420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQ7eo2cXLr8ci7xi"], "accumulated_threat_level": 0.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "b209f6e1-381b-4dfa-b5b0-e303daae3a8c", "DetectTime": "2024-05-21T12:28:54.033567+00:00", "EventTime": "2024-05-21T12:28:54.033585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVmPa4rfG6J5FYIPd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "73fd8169-e34c-40be-8874-02ed1cd88b38", "DetectTime": "2024-05-21T12:28:54.046175+00:00", "EventTime": "2024-05-21T12:28:54.046194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfUaO29fTtxNtom24"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "eb0d9092-4693-4fd5-8db0-10d41db63a3a", "DetectTime": "2024-05-21T12:28:54.057620+00:00", "EventTime": "2024-05-21T12:28:54.057638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfUaO29fTtxNtom24"], "accumulated_threat_level": 1.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "4a512e30-a1e1-4277-915d-613df063f888", "DetectTime": "2024-05-21T12:28:54.062638+00:00", "EventTime": "2024-05-21T12:28:54.062656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcv3k4hhulF1FMPza"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8d9a3480-1546-4959-bef3-7a61dfe9c269", "DetectTime": "2024-05-21T12:28:54.073642+00:00", "EventTime": "2024-05-21T12:28:54.073660+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdfb5L1EkjRzfkcUOk"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "a6722da0-2e89-4424-9764-f64d8bbf9651", "DetectTime": "2024-05-21T12:28:54.085697+00:00", "EventTime": "2024-05-21T12:28:54.085716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdfb5L1EkjRzfkcUOk"], "accumulated_threat_level": 2.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "6ae0c88a-3a41-4912-9697-842511bef5a2", "DetectTime": "2024-05-21T12:28:54.090310+00:00", "EventTime": "2024-05-21T12:28:54.090328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYzYxS2xYWGQgXOrMl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "d343b3ce-1c87-42f6-85bb-d4587b100b8b", "DetectTime": "2024-05-21T12:28:54.100978+00:00", "EventTime": "2024-05-21T12:28:54.100996+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjkCE4JPHczJW3yKd"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "1bd07a92-0f3b-4166-908f-0f50f48b75b9", "DetectTime": "2024-05-21T12:28:54.112264+00:00", "EventTime": "2024-05-21T12:28:54.112284+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjkCE4JPHczJW3yKd"], "accumulated_threat_level": 2.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "d83ce2ed-d8bb-44e6-ac04-554eb7a3ec00", "DetectTime": "2024-05-21T12:28:54.117102+00:00", "EventTime": "2024-05-21T12:28:54.117120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoRvlwVdVHVOgNFj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "c502e817-aac7-42ab-8275-79b377f0f1d9", "DetectTime": "2024-05-21T12:28:54.128039+00:00", "EventTime": "2024-05-21T12:28:54.128056+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzB14PM0l9LxmGbb"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "12545ca6-78ae-4101-bf48-18047d278e98", "DetectTime": "2024-05-21T12:28:54.133073+00:00", "EventTime": "2024-05-21T12:28:54.133095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xJSL1xbtAI4P3vw6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "ddbf2177-12e1-42dd-b05e-0f88bedde230", "DetectTime": "2024-05-21T12:28:54.176232+00:00", "EventTime": "2024-05-21T12:28:54.176251+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzB14PM0l9LxmGbb"], "accumulated_threat_level": 3.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "9d6896bb-2d4e-468b-a950-37b4b7144002", "DetectTime": "2024-05-21T12:28:54.181431+00:00", "EventTime": "2024-05-21T12:28:54.181451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.97.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGsGB2okHzxukBnFj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "db5abce2-947a-4b59-ab78-e7c921ca734b", "DetectTime": "2024-05-21T12:28:54.186176+00:00", "EventTime": "2024-05-21T12:28:54.186194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.108.40.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEbHjg1IqHURPpO1Ej"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "eec7f48c-433f-47ce-81f2-826cebcdf134", "DetectTime": "2024-05-21T12:28:54.200253+00:00", "EventTime": "2024-05-21T12:28:54.200275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cWUm4j1YG6BsFWka"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "81f5a61d-07ed-4665-ba69-fabbbd9cb634", "DetectTime": "2024-05-21T12:28:54.211019+00:00", "EventTime": "2024-05-21T12:28:54.211038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGoD0l1VCQ5Szlo0Ng"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 45} +{"Format": "IDEA0", "ID": "a6dd601e-6ed4-4c6e-8db7-44a6b8d661d1", "DetectTime": "2024-05-21T12:28:54.221581+00:00", "EventTime": "2024-05-21T12:28:54.221601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9sCjx6SkjtqBte2"], "accumulated_threat_level": 3.2, "timewindow": 45} +{"Format": "IDEA0", "ID": "f50a81e2-acbe-4296-a270-fb25e82ca8ac", "DetectTime": "2024-05-21T12:28:54.240518+00:00", "EventTime": "2024-05-21T12:28:54.240537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1e0E4qXcozIE00Sa"], "accumulated_threat_level": 4.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "3560aee6-ad2d-4fd5-8843-0c1057351cbf", "DetectTime": "2024-05-21T12:28:54.257338+00:00", "EventTime": "2024-05-21T12:28:54.257359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3024Y1dBn7gVPHLN2"], "accumulated_threat_level": 4.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "138cedfc-779a-4939-91f4-5c678d17c04f", "DetectTime": "2024-05-21T12:28:54.268282+00:00", "EventTime": "2024-05-21T12:28:54.268300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb2vsn4nLg5tL28bBd"], "accumulated_threat_level": 5.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "ff0d76e8-9968-45ac-844b-b21b6e67a33c", "DetectTime": "2024-05-21T12:28:54.283092+00:00", "EventTime": "2024-05-21T12:28:54.283110+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffLK640T5uO07ZWG"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "612525bd-9b71-4273-a681-47e57b037c71", "DetectTime": "2024-05-21T12:28:54.295254+00:00", "EventTime": "2024-05-21T12:28:54.295272+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffLK640T5uO07ZWG"], "accumulated_threat_level": 3.5, "timewindow": 16} +{"Format": "IDEA0", "ID": "ee5c59b2-671a-445f-90ea-0849e5f4bc03", "DetectTime": "2024-05-21T12:28:54.306235+00:00", "EventTime": "2024-05-21T12:28:54.306254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.140.64.3"]}], "Attach": [{"Content": "Connection to unknown destination port 8336/UDP destination IP 50.140.64.3. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEERgo1WYFWka5XH34"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 45} +{"Format": "IDEA0", "ID": "a227e785-7977-4f6d-b248-9ff42bf2b9db", "DetectTime": "2024-05-21T12:28:54.317558+00:00", "EventTime": "2024-05-21T12:28:54.317576+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EtXWDhLAQOzYrx"], "accumulated_threat_level": 0, "timewindow": 16} +{"Format": "IDEA0", "ID": "98d3e85c-71d9-4957-8031-ae5f5f8bce4e", "DetectTime": "2024-05-21T12:28:54.328597+00:00", "EventTime": "2024-05-21T12:28:54.328615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EtXWDhLAQOzYrx"], "accumulated_threat_level": 4.0, "timewindow": 16} +{"Format": "IDEA0", "ID": "97438323-d572-48e5-979a-094dff986305", "DetectTime": "2024-05-21T12:28:54.333098+00:00", "EventTime": "2024-05-21T12:28:54.333116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWfmiZSCMAFu9ovi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8f29d4bc-37cf-46de-82d8-2edfce773bd9", "DetectTime": "2024-05-21T12:28:54.355381+00:00", "EventTime": "2024-05-21T12:28:54.355403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Con1wZ2ooJlX0aL7p7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "daee6a21-19e9-404c-bc2d-f299c9074e7f", "DetectTime": "2024-05-21T12:28:54.371480+00:00", "EventTime": "2024-05-21T12:28:54.371497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12B1w28ezKTMNQKbf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "76f4dcdb-4c2b-47ec-9e36-37f6bd4d3613", "DetectTime": "2024-05-21T12:28:54.383330+00:00", "EventTime": "2024-05-21T12:28:54.383348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvnqZ94GZBFvfAfD1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "c00c312d-8a24-4934-8a10-964f05caa79a", "DetectTime": "2024-05-21T12:28:54.394239+00:00", "EventTime": "2024-05-21T12:28:54.394341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1W6P2YoS845bCRo3"], "accumulated_threat_level": 9.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "e3ba0a64-7468-4480-a003-0cba4915dac7", "DetectTime": "2024-05-21T12:28:54.399776+00:00", "EventTime": "2024-05-21T12:28:54.399795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6QpG1W6ijrQ2Zpb8", "C85Wlm4FjoPXjJ4lZc", "CG2GSs4uQnL9c57ao", "CcB2pq1sAS4OiCDQn5"], "accumulated_threat_level": 10.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "db9d768b-1516-4c59-a55f-ba49a763eec6", "DetectTime": "2024-05-21T12:28:54.410672+00:00", "EventTime": "2024-05-21T12:28:54.410690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgS3QJ1CLhUJEJ2Jv6"], "accumulated_threat_level": 10.9, "timewindow": 45} +{"Format": "IDEA0", "ID": "8203f42a-531b-408c-9598-c2e59369b5e2", "DetectTime": "2024-05-21T12:28:54.428085+00:00", "EventTime": "2024-05-21T12:28:54.428105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQQgz26tzEWOTZbpe"], "accumulated_threat_level": 11.700000000000001, "timewindow": 45} +{"Format": "IDEA0", "ID": "079ac1e9-5af1-422f-9757-86c501ae559a", "DetectTime": "2024-05-21T12:28:54.452981+00:00", "EventTime": "2024-05-21T12:28:54.453002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "Connection to unknown destination port 21114/UDP destination IP 31.146.121.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZngZ2ZSC96Ps4PS5"], "accumulated_threat_level": 12.500000000000002, "timewindow": 45} +{"Format": "Json", "ID": "079ac1e9-5af1-422f-9757-86c501ae559a", "DetectTime": "2024-05-21T12:28:54.452981+00:00", "EventTime": "2024-05-21T12:28:54.453002+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.146.121.78"]}], "Attach": [{"Content": "1970-01-02T20:13:17.748405+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2024/05/21 12:28:54.662618)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 45, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "cbdf6528-9dbf-4d9b-97a2-4d0a6587351b", "DetectTime": "2024-05-21T12:28:54.673639+00:00", "EventTime": "2024-05-21T12:28:54.673659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClhJYX3IarJrFBMcwf"], "accumulated_threat_level": 0.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "1a7e360b-be88-4ac7-8ee4-cd739fd35eac", "DetectTime": "2024-05-21T12:28:54.689550+00:00", "EventTime": "2024-05-21T12:28:54.689568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hK312C30uVcmhci3"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "17b1f8fd-e620-4d50-b03a-f60eec9e9b8a", "DetectTime": "2024-05-21T12:28:54.694215+00:00", "EventTime": "2024-05-21T12:28:54.694232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbohVO24PIhmfNGaP6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "e5de44f2-b6fc-4ec2-93d7-4a388504a055", "DetectTime": "2024-05-21T12:28:55.163576+00:00", "EventTime": "2024-05-21T12:28:55.163598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.25.212.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6eFgOwBIOuDFRSHe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "b5430ff2-6936-4a98-a55a-136a5e8fc991", "DetectTime": "2024-05-21T12:28:55.249259+00:00", "EventTime": "2024-05-21T12:28:55.249278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.61.86.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8S0XROu1Lj4xwJR8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "27f7fbf7-08e3-4d3e-a25a-2b372f3c787e", "DetectTime": "2024-05-21T12:28:55.276693+00:00", "EventTime": "2024-05-21T12:28:55.276712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBHYl2w1zxlX3L1r7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4ddd1043-ae04-46a2-a636-d4f9be22e626", "DetectTime": "2024-05-21T12:28:55.340688+00:00", "EventTime": "2024-05-21T12:28:55.340709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.188.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCC5AqEbsTjKKpNgl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "cbd32088-ac68-4d9b-8bcf-16a8408463c6", "DetectTime": "2024-05-21T12:28:55.368877+00:00", "EventTime": "2024-05-21T12:28:55.368895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLibRz3FGcmC8LuoJb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 45} +{"Format": "IDEA0", "ID": "6b65c1f0-693b-4d3e-ac59-a95f76b305a9", "DetectTime": "2024-05-21T12:28:55.405597+00:00", "EventTime": "2024-05-21T12:28:55.405615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2uWY3LZowpBE8kla"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "4f451d10-c3c5-49de-8986-6b3c8294238f", "DetectTime": "2024-05-21T12:28:55.451343+00:00", "EventTime": "2024-05-21T12:28:55.451363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7AT01FUsIWUtJlbj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "67e6efbc-6d89-426a-b473-bfe4ef5ae1de", "DetectTime": "2024-05-21T12:28:55.706662+00:00", "EventTime": "2024-05-21T12:28:55.706686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9OWo338l2qx1hVB1"], "accumulated_threat_level": 3.2, "timewindow": 45} +{"Format": "IDEA0", "ID": "347be555-cf38-421a-8e8f-ff0af68c8615", "DetectTime": "2024-05-21T12:28:55.727723+00:00", "EventTime": "2024-05-21T12:28:55.727742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.140.158.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXex2brqQI1keqD2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "1a561375-43e4-4e10-b158-b5bbf36e4462", "DetectTime": "2024-05-21T12:28:55.794215+00:00", "EventTime": "2024-05-21T12:28:55.794236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdXTI03CM3P9M4uRx8"], "accumulated_threat_level": 4.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "5fb00407-3ebc-4e88-91da-8994760569f6", "DetectTime": "2024-05-21T12:28:55.821937+00:00", "EventTime": "2024-05-21T12:28:55.821957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzGtt64SeI2DU19FC3"], "accumulated_threat_level": 4.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "76640c59-82bd-4007-af56-f64601f34b76", "DetectTime": "2024-05-21T12:28:55.854656+00:00", "EventTime": "2024-05-21T12:28:55.854687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm7Li146f42djS7b7"], "accumulated_threat_level": 5.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "7f2c6ead-fdf1-42e8-9206-9b21bcb4f9cf", "DetectTime": "2024-05-21T12:28:55.991132+00:00", "EventTime": "2024-05-21T12:28:55.991150+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEHCp1NiqfIz4gT7i"], "accumulated_threat_level": 5.624, "timewindow": 45} +{"Format": "IDEA0", "ID": "8b5466c9-ac46-45f1-950e-4cd30d7c1152", "DetectTime": "2024-05-21T12:28:56.012339+00:00", "EventTime": "2024-05-21T12:28:56.012357+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["93.109.245.154"], "Type": ["CC"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEHCp1NiqfIz4gT7i"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "29a647b2-8c85-4436-a7b7-bb8b0c9d7b53", "DetectTime": "2024-05-21T12:28:56.052475+00:00", "EventTime": "2024-05-21T12:28:56.052498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.254.84.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IyUj1zwOpck5Yahb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "feb8e910-383d-47bc-9409-0ad499e9ae23", "DetectTime": "2024-05-21T12:28:56.090454+00:00", "EventTime": "2024-05-21T12:28:56.090476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBwy53L7SdO29vCad"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 45} +{"Format": "IDEA0", "ID": "031ca311-a398-45a9-ad31-e064af5a31b5", "DetectTime": "2024-05-21T12:28:56.120980+00:00", "EventTime": "2024-05-21T12:28:56.121003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrNRkqxGoExtbQwe"], "accumulated_threat_level": 7.223999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "dc9da01d-276a-463e-ac24-d9b48a5daeba", "DetectTime": "2024-05-21T12:28:56.145252+00:00", "EventTime": "2024-05-21T12:28:56.145273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0zYu43Uh0OnruHSi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "ac9fd206-2a79-4e98-9795-d4dfc5d66519", "DetectTime": "2024-05-21T12:28:56.168920+00:00", "EventTime": "2024-05-21T12:28:56.168938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPoWN1gaEZaOuccz5"], "accumulated_threat_level": 8.024, "timewindow": 45} +{"Format": "IDEA0", "ID": "572b467d-3ba5-41ba-9e2c-dc4c0d8c3add", "DetectTime": "2024-05-21T12:28:56.202590+00:00", "EventTime": "2024-05-21T12:28:56.202612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKCNT3TPuMx3pve05"], "accumulated_threat_level": 8.824, "timewindow": 45} +{"Format": "IDEA0", "ID": "c7962179-84d6-4673-b95b-6215b9ab1ce9", "DetectTime": "2024-05-21T12:28:56.231321+00:00", "EventTime": "2024-05-21T12:28:56.231339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8jqO3KP9StlphrYc"], "accumulated_threat_level": 9.624, "timewindow": 45} +{"Format": "IDEA0", "ID": "ca343ed8-aecf-4ad7-b982-e4a58a939464", "DetectTime": "2024-05-21T12:28:56.276973+00:00", "EventTime": "2024-05-21T12:28:56.276990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHoJNv9tjoz8aO8d"], "accumulated_threat_level": 10.424000000000001, "timewindow": 45} +{"Format": "IDEA0", "ID": "d0e026c2-19f1-4feb-a812-3d428e6f6561", "DetectTime": "2024-05-21T12:28:56.306653+00:00", "EventTime": "2024-05-21T12:28:56.306673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWIQql4hSqzemOYH4"], "accumulated_threat_level": 11.224000000000002, "timewindow": 45} +{"Format": "IDEA0", "ID": "153e5a83-1630-46f9-a25f-32e117673f64", "DetectTime": "2024-05-21T12:28:56.338013+00:00", "EventTime": "2024-05-21T12:28:56.338033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmAcC1nXHGUUhjf"], "accumulated_threat_level": 12.024000000000003, "timewindow": 45} +{"Format": "Json", "ID": "153e5a83-1630-46f9-a25f-32e117673f64", "DetectTime": "2024-05-21T12:28:56.338013+00:00", "EventTime": "2024-05-21T12:28:56.338033+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-02T20:43:46.572167+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2024/05/21 12:28:56.536062)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 45, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "47ce9e6f-c1e0-4c8e-bab6-a20d2b61c455", "DetectTime": "2024-05-21T12:28:56.547664+00:00", "EventTime": "2024-05-21T12:28:56.547684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy9yo56wHpp3yXIh"], "accumulated_threat_level": 0.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "43d3ab1a-7be6-4d48-b985-b4fcd3b2bf2a", "DetectTime": "2024-05-21T12:28:56.559535+00:00", "EventTime": "2024-05-21T12:28:56.559558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbFXM34qCAl2g0gxf"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "9aa825fb-0441-4dd1-95ab-8f1c5de24af4", "DetectTime": "2024-05-21T12:28:56.564328+00:00", "EventTime": "2024-05-21T12:28:56.564347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCCj84P5b0XUApeN6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "71832ef1-cf9c-4c85-91cb-8d631deb24e7", "DetectTime": "2024-05-21T12:28:56.574371+00:00", "EventTime": "2024-05-21T12:28:56.574390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXk1ku2ZapskZXqXh5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 45} +{"Format": "IDEA0", "ID": "0cd0ca01-7be9-4f79-93d5-1527250052d5", "DetectTime": "2024-05-21T12:28:56.585307+00:00", "EventTime": "2024-05-21T12:28:56.585328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qSN22tMzhli1F3Na"], "accumulated_threat_level": 3.2, "timewindow": 45} +{"Format": "IDEA0", "ID": "c397142b-cde4-4f26-98d8-c6f28870f053", "DetectTime": "2024-05-21T12:28:56.627183+00:00", "EventTime": "2024-05-21T12:28:56.627205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFs5iG4qoGn9nZ4Vqh"], "accumulated_threat_level": 4.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "cf87c784-5007-4b4a-8932-f8d615e608c0", "DetectTime": "2024-05-21T12:28:56.632156+00:00", "EventTime": "2024-05-21T12:28:56.632174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbHc9iS8Bmg3MTNhc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "dd16cae3-af52-4fc1-9987-4c3891b36a94", "DetectTime": "2024-05-21T12:28:56.682075+00:00", "EventTime": "2024-05-21T12:28:56.682097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCEG42kb3Qj9YKlwb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "a5525977-183f-4550-8c16-a64f76246fff", "DetectTime": "2024-05-21T12:28:56.719676+00:00", "EventTime": "2024-05-21T12:28:56.719699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.61.221.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFP9ob3KU95kpduXJg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "36340d3a-3869-41bb-b011-17a3a4cdf920", "DetectTime": "2024-05-21T12:28:56.825240+00:00", "EventTime": "2024-05-21T12:28:56.825262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymY1D4tAL06KpGsP5"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "3660601c-0734-4279-8f0b-95ec36f43b5b", "DetectTime": "2024-05-21T12:28:56.855617+00:00", "EventTime": "2024-05-21T12:28:56.855638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "Connection to unknown destination port 2700/UDP destination IP 93.183.130.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrxOBC3fSZv7bNAfZ7"], "accumulated_threat_level": 4.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "2b367508-93f1-454b-a73c-900fb3056a35", "DetectTime": "2024-05-21T12:28:56.886581+00:00", "EventTime": "2024-05-21T12:28:56.886601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvd8Q2QslwiggkJw8"], "accumulated_threat_level": 5.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "e2e10abb-a360-4791-b608-ae6304f6477d", "DetectTime": "2024-05-21T12:28:56.913118+00:00", "EventTime": "2024-05-21T12:28:56.913141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yUms6iDDedsbDI6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "f52cbeba-039a-4d47-acb9-3fe20704e9bb", "DetectTime": "2024-05-21T12:28:56.929782+00:00", "EventTime": "2024-05-21T12:28:56.929803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.108.40.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhgJW3kTKmJbrOp2j"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "26a3d59a-8cdc-42e4-9901-5034e2d90ebb", "DetectTime": "2024-05-21T12:28:56.958536+00:00", "EventTime": "2024-05-21T12:28:56.958555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COktJtZBoUDukvlr3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 45} +{"Format": "IDEA0", "ID": "02a019f9-7801-4929-b7a4-91c76c4ab4ac", "DetectTime": "2024-05-21T12:28:56.987390+00:00", "EventTime": "2024-05-21T12:28:56.987410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZFsz4sND71jkihZb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "19612a20-996c-4214-a7dd-8cacab6be280", "DetectTime": "2024-05-21T12:28:57.039767+00:00", "EventTime": "2024-05-21T12:28:57.039784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCj482DgfANaNDBV3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "4c064d4d-ae9a-4e36-953e-adb8d29922ff", "DetectTime": "2024-05-21T12:28:57.092512+00:00", "EventTime": "2024-05-21T12:28:57.092535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZtHk1iG4jV6FTzXe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 45} +{"Format": "IDEA0", "ID": "6d78cd3a-bb68-42b7-a97c-9af1dbaa81e4", "DetectTime": "2024-05-21T12:28:57.293420+00:00", "EventTime": "2024-05-21T12:28:57.293440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxDwA2xSfMdNPUhli"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d8db6554-c2b2-4b98-a578-dd92cd784c8b", "DetectTime": "2024-05-21T12:28:57.332913+00:00", "EventTime": "2024-05-21T12:28:57.332933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjSrh20IjxLzfoYLj"], "accumulated_threat_level": 9.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "0fd525b3-30b6-431b-95b5-06b31b687d61", "DetectTime": "2024-05-21T12:28:57.354380+00:00", "EventTime": "2024-05-21T12:28:57.354402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkAiw2wdQjd7tgUPf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "e60a472f-0fd3-4a79-8c06-b8b0b3fe3925", "DetectTime": "2024-05-21T12:28:57.379321+00:00", "EventTime": "2024-05-21T12:28:57.379339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLWJMGo8V73JTKfb"], "accumulated_threat_level": 10.4, "timewindow": 45} +{"Format": "IDEA0", "ID": "b52964db-028f-4e19-9d57-854701501d5a", "DetectTime": "2024-05-21T12:28:57.397943+00:00", "EventTime": "2024-05-21T12:28:57.397965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFyz24AGW46jV5Nve"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "0ad6590b-4a24-457a-a743-4b309c3e3afe", "DetectTime": "2024-05-21T12:28:57.426537+00:00", "EventTime": "2024-05-21T12:28:57.426557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "Connection to unknown destination port 28398/UDP destination IP 94.71.97.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWfDTL1d02xHgJIM85"], "accumulated_threat_level": 11.200000000000001, "timewindow": 45} +{"Format": "IDEA0", "ID": "8f0af6cf-6d10-4771-9a86-b2ad788849cb", "DetectTime": "2024-05-21T12:28:57.447017+00:00", "EventTime": "2024-05-21T12:28:57.447039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9lw43WxAuxHpI3Bc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "a23aaa9c-bac6-4286-aa48-7252d5449667", "DetectTime": "2024-05-21T12:28:57.479890+00:00", "EventTime": "2024-05-21T12:28:57.479908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnV451O76HpnswGU4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 45} +{"Format": "Json", "ID": "a23aaa9c-bac6-4286-aa48-7252d5449667", "DetectTime": "2024-05-21T12:28:57.479890+00:00", "EventTime": "2024-05-21T12:28:57.479908+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "1970-01-02T20:44:23.664813+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2024/05/21 12:28:57.693868)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 45, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bc0d6065-602c-46c1-8de0-0cb862b2a74d", "DetectTime": "2024-05-21T12:28:57.698787+00:00", "EventTime": "2024-05-21T12:28:57.698812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92TWE2hsHICrJ73o5"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "24d58a03-0da0-4b3f-8c3f-0ffb76c96cab", "DetectTime": "2024-05-21T12:28:57.711413+00:00", "EventTime": "2024-05-21T12:28:57.711432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfRPf23jqxYlgGoo7"], "accumulated_threat_level": 0.8, "timewindow": 45} +{"Format": "IDEA0", "ID": "b8ce9dc6-aee9-426a-a676-ff489091aa9c", "DetectTime": "2024-05-21T12:28:57.725623+00:00", "EventTime": "2024-05-21T12:28:57.725643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRvLS2Sqt6nsNUwX9"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "5df83805-6e2f-44db-94de-d6a1d467fb27", "DetectTime": "2024-05-21T12:28:57.767745+00:00", "EventTime": "2024-05-21T12:28:57.767769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2C9L1pwnlcTj0mhf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d7769d81-756f-4021-b246-0bdc646e1673", "DetectTime": "2024-05-21T12:28:57.932216+00:00", "EventTime": "2024-05-21T12:28:57.932239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlVmL1XtUDdVToMng"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "14cf4a5e-e8b6-411a-a0c7-dc5af6acdee8", "DetectTime": "2024-05-21T12:28:57.959357+00:00", "EventTime": "2024-05-21T12:28:57.959379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwS9Vr2PkUbH38JRaf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "ea0127fd-2bc5-4ac1-aa8b-c3987136b6ee", "DetectTime": "2024-05-21T12:28:57.987510+00:00", "EventTime": "2024-05-21T12:28:57.987532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEjfmP1WeeW1FgdEDe"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "4b5bcae1-6b27-4930-a7b1-93d2e5c857bc", "DetectTime": "2024-05-21T12:28:58.014608+00:00", "EventTime": "2024-05-21T12:28:58.014629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AZ48XF1W0A2N1kg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "36138ebc-fc65-4204-bd67-ef9084891a58", "DetectTime": "2024-05-21T12:28:58.040696+00:00", "EventTime": "2024-05-21T12:28:58.040717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4iE93YDkVLe8t4V3"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "a022ecf9-40e0-48bf-8e85-30cc275e9925", "DetectTime": "2024-05-21T12:28:58.067182+00:00", "EventTime": "2024-05-21T12:28:58.067204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP09Vv26wZewrCSdQ9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "eb5c1430-6311-4f49-8357-febc1c3ef142", "DetectTime": "2024-05-21T12:28:58.118434+00:00", "EventTime": "2024-05-21T12:28:58.118455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgNL42qDGpFxlDr7k", "Cicjpd40QoI8kDimCj", "C4ZoOT3sri69meGuOa", "CmhZwN3ZnWDpAf8bTd"], "accumulated_threat_level": 0.5, "timewindow": 46} +{"Format": "IDEA0", "ID": "13ad5baf-5cf8-46ac-ae94-12d3e97f4646", "DetectTime": "2024-05-21T12:28:58.147643+00:00", "EventTime": "2024-05-21T12:28:58.147665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PnYP3vpgHZEeme8c"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "122a329c-b03b-421c-a2f0-4170dfe64a12", "DetectTime": "2024-05-21T12:28:58.267901+00:00", "EventTime": "2024-05-21T12:28:58.267923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNY9UU2DjFpUIOmusf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "c548907d-14ff-4da3-b305-8d846583a63f", "DetectTime": "2024-05-21T12:28:58.380402+00:00", "EventTime": "2024-05-21T12:28:58.380424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cds8Jc14833fqQuWFh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "5654fd84-b6a7-4d45-8380-3612c13db903", "DetectTime": "2024-05-21T12:28:58.625567+00:00", "EventTime": "2024-05-21T12:28:58.625587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJjUklc1mvIDcDq4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "3f753d24-25b6-49c7-abb8-d44b498e5919", "DetectTime": "2024-05-21T12:28:58.630566+00:00", "EventTime": "2024-05-21T12:28:58.630585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM5QdD2X05pnNIGSQc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "0ae7a5ef-7b2c-4d9d-8149-1f47945ea213", "DetectTime": "2024-05-21T12:28:58.680687+00:00", "EventTime": "2024-05-21T12:28:58.680706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnC6DW3cBprkHos7Ib"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "12ad987c-250d-46ef-b6bd-daa5c2829453", "DetectTime": "2024-05-21T12:28:58.688591+00:00", "EventTime": "2024-05-21T12:28:58.688611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCf8jz2bzYN7poqzfi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "425f0a6e-b502-46bf-bbe1-2c8c43715ecf", "DetectTime": "2024-05-21T12:28:58.717610+00:00", "EventTime": "2024-05-21T12:28:58.717630+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9U2TI7yNHfsY9W4"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "96e345b7-320c-437c-a828-7cd5ec35871a", "DetectTime": "2024-05-21T12:28:58.730610+00:00", "EventTime": "2024-05-21T12:28:58.730629+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9U2TI7yNHfsY9W4"], "accumulated_threat_level": 2.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "0153f8c0-d10e-4bb7-a5ae-d55081b45c5f", "DetectTime": "2024-05-21T12:28:58.735315+00:00", "EventTime": "2024-05-21T12:28:58.735332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANbRP35mCrqJ0yHH4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "3120addd-b04c-43f5-aad8-656d89e057ba", "DetectTime": "2024-05-21T12:28:58.761983+00:00", "EventTime": "2024-05-21T12:28:58.762001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtr9v4C5QsZGqB1V8"], "accumulated_threat_level": 1.3, "timewindow": 46} +{"Format": "IDEA0", "ID": "badd8da6-7dc6-478b-8267-60f925a8e6a2", "DetectTime": "2024-05-21T12:28:58.784309+00:00", "EventTime": "2024-05-21T12:28:58.784328+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQJl8Fiolkr42G"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "e57c5e0a-ed8e-41bd-bd0b-b49f41f4ec1d", "DetectTime": "2024-05-21T12:28:58.789204+00:00", "EventTime": "2024-05-21T12:28:58.789222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFpRa3dk97wwMHtGd"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "1836391d-74dc-45e7-8faf-99b14e27018b", "DetectTime": "2024-05-21T12:28:58.802076+00:00", "EventTime": "2024-05-21T12:28:58.802094+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQJl8Fiolkr42G"], "accumulated_threat_level": 2.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "c59161aa-a6c4-480e-9ffc-37b0551789a8", "DetectTime": "2024-05-21T12:28:58.885732+00:00", "EventTime": "2024-05-21T12:28:58.885753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIGKnm1OA6Z3b2CUX9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "a219e98b-91df-418e-bb71-956f867a8a88", "DetectTime": "2024-05-21T12:28:58.915649+00:00", "EventTime": "2024-05-21T12:28:58.915670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIMjh2U6GALFBUDc2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "fbae6d9b-507b-495d-9b32-f077c3d94746", "DetectTime": "2024-05-21T12:28:59.184787+00:00", "EventTime": "2024-05-21T12:28:59.184811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 5181/TCP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYq5m2vbfhBamj8B3"], "accumulated_threat_level": 2.1, "timewindow": 46} +{"Format": "IDEA0", "ID": "5f9565eb-c8c5-4edf-93f8-dadc9ecc7850", "DetectTime": "2024-05-21T12:28:59.282727+00:00", "EventTime": "2024-05-21T12:28:59.282750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGN1X174ov4cphWjf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "25347ad3-6e4e-4d2b-8a3b-3238be8fd9a4", "DetectTime": "2024-05-21T12:28:59.308121+00:00", "EventTime": "2024-05-21T12:28:59.308146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3hD3A3BYncL4A59hc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "df6ac210-7ace-43a7-9338-df5dd88577c8", "DetectTime": "2024-05-21T12:28:59.357740+00:00", "EventTime": "2024-05-21T12:28:59.357762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHBSr4ortyG3QS2q7"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "2df83933-6319-4594-a791-280746268078", "DetectTime": "2024-05-21T12:28:59.420991+00:00", "EventTime": "2024-05-21T12:28:59.421012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoaGFGSqCvNXVQBa"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "061ce977-5f20-417c-b537-5f88e88876b1", "DetectTime": "2024-05-21T12:28:59.461060+00:00", "EventTime": "2024-05-21T12:28:59.461078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.97.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjxnc3dNFUduODgk2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "9e234c1a-3c83-4359-8f98-65dd4d24ce54", "DetectTime": "2024-05-21T12:28:59.466322+00:00", "EventTime": "2024-05-21T12:28:59.466343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfMNqiWnGFBvERu6", "C2wmtP15sHBJbM0Oz9", "C2K7Kp3YVvzDeOIdA9", "CZt1Yu1JYHEFlKT36l"], "accumulated_threat_level": 2.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "53cf977d-8a10-4c25-8bc8-8d5e0fcff861", "DetectTime": "2024-05-21T12:28:59.493134+00:00", "EventTime": "2024-05-21T12:28:59.493153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21OA11ERJGCIylXPi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "c22d016b-3401-4e66-828e-b0e35ac8de78", "DetectTime": "2024-05-21T12:28:59.560438+00:00", "EventTime": "2024-05-21T12:28:59.560459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PsXT1pKBpYgWpAi2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d04ab493-bb26-41d8-a561-45bda6591235", "DetectTime": "2024-05-21T12:28:59.588845+00:00", "EventTime": "2024-05-21T12:28:59.588865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7tvXM2rfxp2g3jlca"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "14994193-249f-4144-8fe7-318044bcdce2", "DetectTime": "2024-05-21T12:28:59.616795+00:00", "EventTime": "2024-05-21T12:28:59.616815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.25.212.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zFZk29vr6QjJsFh7"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "99da2a70-0dc5-4c3b-b9c8-2b4f20e6c970", "DetectTime": "2024-05-21T12:28:59.638117+00:00", "EventTime": "2024-05-21T12:28:59.638135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtjRoe9Lfdn0EPNt9"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 46} +{"Format": "IDEA0", "ID": "08c1d1a2-cb90-4e57-88a7-ef328b7bb3aa", "DetectTime": "2024-05-21T12:28:59.659873+00:00", "EventTime": "2024-05-21T12:28:59.659893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.61.86.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYkE14HKS1e0Egb45"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "a3576eb6-b6c7-4907-9f4e-310852d2b23e", "DetectTime": "2024-05-21T12:28:59.685568+00:00", "EventTime": "2024-05-21T12:28:59.685587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hqQhDcl3b2sKLkb"], "accumulated_threat_level": 4.2, "timewindow": 46} +{"Format": "IDEA0", "ID": "067ad0dc-2f63-4b6e-8a40-aa4dcff52ddd", "DetectTime": "2024-05-21T12:28:59.707657+00:00", "EventTime": "2024-05-21T12:28:59.707679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSVQG1ld7xHgGMUA6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "b5926505-277e-4a5f-b5af-42c0694e87b8", "DetectTime": "2024-05-21T12:28:59.732114+00:00", "EventTime": "2024-05-21T12:28:59.732132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyNf92p04nt6jUIHi"], "accumulated_threat_level": 5.0, "timewindow": 46} +{"Format": "IDEA0", "ID": "69d3670a-27c1-4fb5-88a8-9566ec6cfeaa", "DetectTime": "2024-05-21T12:28:59.843075+00:00", "EventTime": "2024-05-21T12:28:59.843096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCSwtm2w5JFQCdUc52"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "90b65cda-2ab2-463d-b58f-11490c658aff", "DetectTime": "2024-05-21T12:28:59.889165+00:00", "EventTime": "2024-05-21T12:28:59.889191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.140.158.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnZ7xDqgzchIptknf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d1da9b95-efa6-4ee4-aea1-8d27e0ca5e5c", "DetectTime": "2024-05-21T12:29:00.132048+00:00", "EventTime": "2024-05-21T12:29:00.132070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.188.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEe5qG4Hw2acAQSgRb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "9ee54316-9900-4085-88f4-77bdb4c38085", "DetectTime": "2024-05-21T12:29:00.137011+00:00", "EventTime": "2024-05-21T12:29:00.137033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.254.84.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR8t2p1lvD6Qc5cDM2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "63100d84-74f6-498f-b38a-bfc27eb25b76", "DetectTime": "2024-05-21T12:29:00.141614+00:00", "EventTime": "2024-05-21T12:29:00.141632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRNln3GZ7zwrpbFFa"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "90715ec9-90e8-45fe-8e6f-92987185c78e", "DetectTime": "2024-05-21T12:29:00.197003+00:00", "EventTime": "2024-05-21T12:29:00.197024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQnOMg4xJ5OLL7SHDg"], "accumulated_threat_level": 5.8, "timewindow": 46} +{"Format": "IDEA0", "ID": "c6a6f688-65f6-4031-bbc0-14680110886f", "DetectTime": "2024-05-21T12:29:00.216186+00:00", "EventTime": "2024-05-21T12:29:00.216208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrAIp3Ph0CIhzZZg6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "32e008a7-4c25-489a-a84a-40777c56062e", "DetectTime": "2024-05-21T12:29:00.262707+00:00", "EventTime": "2024-05-21T12:29:00.262727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJG9C371ln3eYghk"], "accumulated_threat_level": 6.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "79ceb9b6-7db0-46d2-9c8a-6bc01aca32c2", "DetectTime": "2024-05-21T12:29:00.294802+00:00", "EventTime": "2024-05-21T12:29:00.294821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNudvh2eB9xYe8mAg3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 46} +{"Format": "IDEA0", "ID": "507cba39-5e8f-4f07-9311-04dcb2f29e9b", "DetectTime": "2024-05-21T12:29:00.440318+00:00", "EventTime": "2024-05-21T12:29:00.440338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYE7O3amtfd9YUHm5"], "accumulated_threat_level": 8.2, "timewindow": 46} +{"Format": "IDEA0", "ID": "5d1e1d56-236d-4386-82a7-91a97850302c", "DetectTime": "2024-05-21T12:29:00.445553+00:00", "EventTime": "2024-05-21T12:29:00.445571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdEwjT3VwxPFsRm2Ck"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "cb3e4a67-1223-4831-ac4c-c50fae48ed7a", "DetectTime": "2024-05-21T12:29:00.483996+00:00", "EventTime": "2024-05-21T12:29:00.484013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZRM2n4qvt5oq9qsZ5"], "accumulated_threat_level": 9.0, "timewindow": 46} +{"Format": "IDEA0", "ID": "4e7cdaa3-0072-4715-ad7e-44cdfd204c01", "DetectTime": "2024-05-21T12:29:00.514576+00:00", "EventTime": "2024-05-21T12:29:00.514597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBScCB4CLPKrruA6Qe"], "accumulated_threat_level": 9.8, "timewindow": 46} +{"Format": "IDEA0", "ID": "7ed721c7-c46b-4d47-9594-3591ab0c061e", "DetectTime": "2024-05-21T12:29:00.559803+00:00", "EventTime": "2024-05-21T12:29:00.559823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoibv4v2NXdkn5Y37"], "accumulated_threat_level": 10.600000000000001, "timewindow": 46} +{"Format": "IDEA0", "ID": "8b352caf-d355-43eb-882d-82f980ba0cd5", "DetectTime": "2024-05-21T12:29:00.590045+00:00", "EventTime": "2024-05-21T12:29:00.590066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMpEd4OvbfqfrhEok"], "accumulated_threat_level": 11.400000000000002, "timewindow": 46} +{"Format": "IDEA0", "ID": "a2592087-daeb-4f39-a05f-acf571840468", "DetectTime": "2024-05-21T12:29:00.679497+00:00", "EventTime": "2024-05-21T12:29:00.679519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkz5TX70lYelsce2"], "accumulated_threat_level": 12.200000000000003, "timewindow": 46} +{"Format": "Json", "ID": "a2592087-daeb-4f39-a05f-acf571840468", "DetectTime": "2024-05-21T12:29:00.679497+00:00", "EventTime": "2024-05-21T12:29:00.679519+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "1970-01-02T21:16:18.623783+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2024/05/21 12:29:00.919170)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 46, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "627147fc-49ae-471b-9c7c-5a50638dc68d", "DetectTime": "2024-05-21T12:29:00.923111+00:00", "EventTime": "2024-05-21T12:29:00.923130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNUJt1IZzYWAa72Kb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "797002e7-6232-437f-a392-eed563ff126d", "DetectTime": "2024-05-21T12:29:00.933100+00:00", "EventTime": "2024-05-21T12:29:00.933118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EJS12PlQZeCARBQl"], "accumulated_threat_level": 0.8, "timewindow": 46} +{"Format": "IDEA0", "ID": "9e34dc1d-bf7d-443f-b797-fbaeb5861561", "DetectTime": "2024-05-21T12:29:00.943545+00:00", "EventTime": "2024-05-21T12:29:00.943564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkxPd2VOaqHRetOPa"], "accumulated_threat_level": 1.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "2952584f-419d-445c-a96c-96cee9787462", "DetectTime": "2024-05-21T12:29:00.977654+00:00", "EventTime": "2024-05-21T12:29:00.977676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caj3G3uGo1caesc6a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 46} +{"Format": "IDEA0", "ID": "0988433f-ec0d-424b-9f0e-df9ef8d765f6", "DetectTime": "2024-05-21T12:29:01.084470+00:00", "EventTime": "2024-05-21T12:29:01.084490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vdI725HTWLUqY84c"], "accumulated_threat_level": 3.2, "timewindow": 46} +{"Format": "IDEA0", "ID": "53aa46e4-cedb-49ff-a5e1-8171406e6fce", "DetectTime": "2024-05-21T12:29:01.118301+00:00", "EventTime": "2024-05-21T12:29:01.118324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbfEJd3MzrMxkzZNje"], "accumulated_threat_level": 4.0, "timewindow": 46} +{"Format": "IDEA0", "ID": "1bc4706b-2c67-411e-8853-b41bb193e005", "DetectTime": "2024-05-21T12:29:01.159310+00:00", "EventTime": "2024-05-21T12:29:01.159330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCvBt4iOpYmxDwKq"], "accumulated_threat_level": 4.8, "timewindow": 46} +{"Format": "IDEA0", "ID": "93939b11-0e77-4280-b9ac-e6c78b327026", "DetectTime": "2024-05-21T12:29:01.375317+00:00", "EventTime": "2024-05-21T12:29:01.375339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJGKNO3E5Eg4PVXkCj"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "1b88a86b-e8a2-4a70-a1d8-fcb8491fa162", "DetectTime": "2024-05-21T12:29:01.405046+00:00", "EventTime": "2024-05-21T12:29:01.405066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LTgZQUxQuTYgWP5"], "accumulated_threat_level": 5.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "b912ef79-32bc-4752-8300-c35ba7a3b2ab", "DetectTime": "2024-05-21T12:29:01.419664+00:00", "EventTime": "2024-05-21T12:29:01.419684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZpVQ3Vj5mDSdRYbl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "6cc0b5a8-3fd1-40fe-85d2-054bcc6bb548", "DetectTime": "2024-05-21T12:29:01.448507+00:00", "EventTime": "2024-05-21T12:29:01.448529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.25.212.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmpCpK3DQE2btOzuR6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "74f5727d-5b69-4090-8333-02eb13b4c695", "DetectTime": "2024-05-21T12:29:01.475756+00:00", "EventTime": "2024-05-21T12:29:01.475775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdGCY1o8tE75h6f4l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 46} +{"Format": "IDEA0", "ID": "8c5e6e41-f462-4bbd-8c76-d47ab0bf2ad2", "DetectTime": "2024-05-21T12:29:01.515445+00:00", "EventTime": "2024-05-21T12:29:01.515462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLfaeD1nPHCln8wFyi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "5a7f8866-0861-4f05-b571-b00dee0279aa", "DetectTime": "2024-05-21T12:29:01.540363+00:00", "EventTime": "2024-05-21T12:29:01.540388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrYzl4mJrR0HV17De"], "accumulated_threat_level": 7.999999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "762d585d-afe8-4f13-9751-4f73828fe612", "DetectTime": "2024-05-21T12:29:01.565878+00:00", "EventTime": "2024-05-21T12:29:01.565899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C78lbw3HkA02BinbXk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "09bbf4b9-b6b9-42fc-b785-fcc3f2face4b", "DetectTime": "2024-05-21T12:29:01.598501+00:00", "EventTime": "2024-05-21T12:29:01.598520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXyjE30Uoh4YWg7r7"], "accumulated_threat_level": 9.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "2481c813-4cd4-4b7d-b8e9-fbfdd758b7fb", "DetectTime": "2024-05-21T12:29:01.629144+00:00", "EventTime": "2024-05-21T12:29:01.629163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm2Isf1oCnye48JHW2"], "accumulated_threat_level": 10.4, "timewindow": 46} +{"Format": "IDEA0", "ID": "237e3550-1da2-40f1-8570-b9e83c76b637", "DetectTime": "2024-05-21T12:29:01.672979+00:00", "EventTime": "2024-05-21T12:29:01.672997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nPtmhU5C78GrEi8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 46} +{"Format": "IDEA0", "ID": "a11f74ef-165f-4158-b211-f28228785b65", "DetectTime": "2024-05-21T12:29:01.751712+00:00", "EventTime": "2024-05-21T12:29:01.751736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJgw03IjbqLkfZBD8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 46} +{"Format": "Json", "ID": "a11f74ef-165f-4158-b211-f28228785b65", "DetectTime": "2024-05-21T12:29:01.751712+00:00", "EventTime": "2024-05-21T12:29:01.751736+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-02T21:47:03.222379+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2024/05/21 12:29:01.899818)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 46, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3b1b0bc5-4873-4df8-9466-b83ceffa27e4", "DetectTime": "2024-05-21T12:29:01.911503+00:00", "EventTime": "2024-05-21T12:29:01.911522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.254.84.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u8Vm4YQRBXJdaSj5"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "f74f9fd6-933b-4192-8d14-c284f35cfd12", "DetectTime": "2024-05-21T12:29:02.008055+00:00", "EventTime": "2024-05-21T12:29:02.008077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuFNlL2QeJReFMkWhd"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "0f4d3f0f-43ac-4408-946b-ceac72f478b5", "DetectTime": "2024-05-21T12:29:02.075491+00:00", "EventTime": "2024-05-21T12:29:02.075512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyo8yc2XNibtUMLhud"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "9a6b1113-e386-4473-81db-1f246010adce", "DetectTime": "2024-05-21T12:29:02.142659+00:00", "EventTime": "2024-05-21T12:29:02.142680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CThVd74d8eb7RAkJN9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "5a471ff0-0b1f-4304-85a8-d741e0ab5889", "DetectTime": "2024-05-21T12:29:02.212167+00:00", "EventTime": "2024-05-21T12:29:02.212187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkA4ry24fnmLeMEsWd"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "7c667e6b-be0f-4e55-bcc6-e63912a133bc", "DetectTime": "2024-05-21T12:29:02.255052+00:00", "EventTime": "2024-05-21T12:29:02.255072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9XDo39aa1ObCyRT9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "fe5f8536-67e3-4652-b21f-789ca6d50c66", "DetectTime": "2024-05-21T12:29:02.303823+00:00", "EventTime": "2024-05-21T12:29:02.303845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUJer4bovMBbYgMD2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "5b698174-dbee-4b73-8bfc-1b48ce28a5a6", "DetectTime": "2024-05-21T12:29:02.341598+00:00", "EventTime": "2024-05-21T12:29:02.341620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkrvW2eyVGJoEHMIh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "370c4d60-cc08-4ef3-b92a-eb6865a97bc4", "DetectTime": "2024-05-21T12:29:02.373225+00:00", "EventTime": "2024-05-21T12:29:02.373245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAdFxGSY2NHbUNESg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "0ba89262-b993-4c5d-b1f1-05532a036bce", "DetectTime": "2024-05-21T12:29:02.445589+00:00", "EventTime": "2024-05-21T12:29:02.445608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22OUD40vV2MVWzeQb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "e64920e5-e1c4-4cce-a486-3e06872c9255", "DetectTime": "2024-05-21T12:29:02.485114+00:00", "EventTime": "2024-05-21T12:29:02.485136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLaoro4MIXjATZ3Qsk", "Cjmd7c2HAu4O4qvtZf", "ClBZnxulotnDOTqjg", "CRlo2q49NITkR8Mqbg"], "accumulated_threat_level": 0.5, "timewindow": 46} +{"Format": "IDEA0", "ID": "ae938a76-3159-40d1-b88f-9d673041f158", "DetectTime": "2024-05-21T12:29:02.602484+00:00", "EventTime": "2024-05-21T12:29:02.602502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEdT3e2lowSgQoqprh"], "accumulated_threat_level": 1.3, "timewindow": 46} +{"Format": "IDEA0", "ID": "f4907edd-b799-4029-a509-eaad34171e88", "DetectTime": "2024-05-21T12:29:02.623569+00:00", "EventTime": "2024-05-21T12:29:02.623591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jna9jyuO3lyDRw1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "579c39c6-f101-4c4d-8ce2-d78d6fd99db7", "DetectTime": "2024-05-21T12:29:02.703256+00:00", "EventTime": "2024-05-21T12:29:02.703277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6Gef1MBAfmen7rOk"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "74a77284-95c3-409f-b5fc-cc41c825ff02", "DetectTime": "2024-05-21T12:29:03.032949+00:00", "EventTime": "2024-05-21T12:29:03.032970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdbeP14UpISMHw8h6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "f7159f29-a58e-4d47-9989-441771b600d2", "DetectTime": "2024-05-21T12:29:03.300932+00:00", "EventTime": "2024-05-21T12:29:03.300955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrREL34JlZ7gvYYj4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "bd629737-6665-4ef9-bfaa-b8c3b4a21265", "DetectTime": "2024-05-21T12:29:03.305874+00:00", "EventTime": "2024-05-21T12:29:03.305894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09Pmx325Udjus2ty9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "830a5ea9-71d2-489b-a70c-0a090eb5a4ba", "DetectTime": "2024-05-21T12:29:03.324385+00:00", "EventTime": "2024-05-21T12:29:03.324406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4vbf87ksebYfuW2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "148ee221-2c8f-406e-abc6-7c91d3ade566", "DetectTime": "2024-05-21T12:29:03.344868+00:00", "EventTime": "2024-05-21T12:29:03.344887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxuO2427UyehENJi1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "35816b4e-377e-4a18-bc56-33bcba50357f", "DetectTime": "2024-05-21T12:29:03.401532+00:00", "EventTime": "2024-05-21T12:29:03.401551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEY9lc30tU8dxe81G"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "c64c8ee5-c7c9-4303-a70c-046064e89fd4", "DetectTime": "2024-05-21T12:29:03.413128+00:00", "EventTime": "2024-05-21T12:29:03.413146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWR7PJ28E6gBmyMGph"], "accumulated_threat_level": 2.1, "timewindow": 46} +{"Format": "IDEA0", "ID": "d37d8702-715a-49b6-bc24-1269977b8753", "DetectTime": "2024-05-21T12:29:03.439470+00:00", "EventTime": "2024-05-21T12:29:03.439493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEgiE1jLCWjTsu5Ik"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "17975f7a-d118-493a-956e-7ab1768fce66", "DetectTime": "2024-05-21T12:29:03.471668+00:00", "EventTime": "2024-05-21T12:29:03.471689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIKRc3AXV8M7Z3Ga"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "848f320e-e14d-490c-a7a0-19b6527f9ba9", "DetectTime": "2024-05-21T12:29:03.500384+00:00", "EventTime": "2024-05-21T12:29:03.500409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMc2H3SxMu57vNIz2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "6efd79ed-5719-40da-a588-e2c18b5cd8dd", "DetectTime": "2024-05-21T12:29:03.522593+00:00", "EventTime": "2024-05-21T12:29:03.522616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAu1urnOXLE8mI0th"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "f1eea218-825c-4179-a293-d80e60c44929", "DetectTime": "2024-05-21T12:29:03.537810+00:00", "EventTime": "2024-05-21T12:29:03.537829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrE3mIZhnUjZsGTc"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 46} +{"Format": "IDEA0", "ID": "10a310e4-7899-48f8-b1a7-ff00c66ceea6", "DetectTime": "2024-05-21T12:29:03.572361+00:00", "EventTime": "2024-05-21T12:29:03.572381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqSmo2Pkbc2ihOiy4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "b5234fc2-c257-48ac-909f-319e34567b06", "DetectTime": "2024-05-21T12:29:03.591630+00:00", "EventTime": "2024-05-21T12:29:03.591652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw51AL3vMBljT4Gst6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d57344a5-2561-4856-a16f-e1621cabfa32", "DetectTime": "2024-05-21T12:29:03.636294+00:00", "EventTime": "2024-05-21T12:29:03.636315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2TjB1f9qScbwXUtf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "96af8787-78be-4350-b032-d5cee5aed3fb", "DetectTime": "2024-05-21T12:29:03.681466+00:00", "EventTime": "2024-05-21T12:29:03.681487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerBIM1bWbJPiwe6ca"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "fe073dce-e1d9-4426-89a8-a1c4286a044e", "DetectTime": "2024-05-21T12:29:03.693616+00:00", "EventTime": "2024-05-21T12:29:03.693636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cry6AK3uSTHI3Wxlha"], "accumulated_threat_level": 3.7, "timewindow": 46} +{"Format": "IDEA0", "ID": "29e96d2c-b37a-463d-9b0a-30d2f2a74047", "DetectTime": "2024-05-21T12:29:03.698965+00:00", "EventTime": "2024-05-21T12:29:03.698987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn7GfP23vcG8zFd8tk"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "44f2dfef-199a-49f7-8a0b-12d8faa3fe25", "DetectTime": "2024-05-21T12:29:03.706684+00:00", "EventTime": "2024-05-21T12:29:03.706706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.97.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUydBF2XYADJiM7FE3"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "c0b45364-b44b-436e-999c-368a9d78e44e", "DetectTime": "2024-05-21T12:29:03.776996+00:00", "EventTime": "2024-05-21T12:29:03.777015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDHj4WdakHZtgeUh"], "accumulated_threat_level": 4.5, "timewindow": 46} +{"Format": "IDEA0", "ID": "806725da-5efb-4f9c-942a-71ee606bc0a8", "DetectTime": "2024-05-21T12:29:03.808325+00:00", "EventTime": "2024-05-21T12:29:03.808349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmQ0k4LKlRwmQ9rm4"], "accumulated_threat_level": 5.3, "timewindow": 46} +{"Format": "IDEA0", "ID": "bc806ac9-423b-4a52-9a31-2089b66a05a0", "DetectTime": "2024-05-21T12:29:03.840716+00:00", "EventTime": "2024-05-21T12:29:03.840735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjqkxIpfDo8lnpIj"], "accumulated_threat_level": 6.1, "timewindow": 46} +{"Format": "IDEA0", "ID": "1e88d3eb-1bd1-4604-969d-3ccb5b1b06a4", "DetectTime": "2024-05-21T12:29:04.086791+00:00", "EventTime": "2024-05-21T12:29:04.086813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.140.158.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2b5FMqm1tbiXoF45"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "63e17de3-bc02-4412-bd00-7925d978009c", "DetectTime": "2024-05-21T12:29:04.092057+00:00", "EventTime": "2024-05-21T12:29:04.092078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CChp6A29MdcLvHRVAg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "63b77f63-28eb-491f-9c7c-90b5270d645c", "DetectTime": "2024-05-21T12:29:04.096631+00:00", "EventTime": "2024-05-21T12:29:04.096649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgf4iu2OI9G1GHJKHk"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "5a06f042-30b2-4d64-990b-9f577bc7cfa4", "DetectTime": "2024-05-21T12:29:04.155232+00:00", "EventTime": "2024-05-21T12:29:04.155250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkElN03pHjyagSJA93"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 46} +{"Format": "IDEA0", "ID": "53f0c629-c46e-4abd-b403-f5e0b6d37026", "DetectTime": "2024-05-21T12:29:04.189372+00:00", "EventTime": "2024-05-21T12:29:04.189392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctadaj1RJk35llBk6j"], "accumulated_threat_level": 7.699999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "22415e00-1e5e-4127-ba0a-9aaf4865e303", "DetectTime": "2024-05-21T12:29:04.240651+00:00", "EventTime": "2024-05-21T12:29:04.240670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CayykovaUPFGbj1me"], "accumulated_threat_level": 8.5, "timewindow": 46} +{"Format": "IDEA0", "ID": "b12740aa-19d1-40e3-8a8b-b1e7b94f8324", "DetectTime": "2024-05-21T12:29:04.261554+00:00", "EventTime": "2024-05-21T12:29:04.261577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.61.86.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZ3Bn3cUzxe5VuKrg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "0c6e64fd-3732-40ea-bcd4-9833d8cbad9d", "DetectTime": "2024-05-21T12:29:04.286542+00:00", "EventTime": "2024-05-21T12:29:04.286561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLAnM2HLeSo0pB6r5"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "2f70370c-7a48-473c-b22c-8c9817e8d376", "DetectTime": "2024-05-21T12:29:04.298791+00:00", "EventTime": "2024-05-21T12:29:04.298810+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLAnM2HLeSo0pB6r5"], "accumulated_threat_level": 3.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "43f46edc-f2c4-41f8-b86c-8c41a45314b8", "DetectTime": "2024-05-21T12:29:04.311944+00:00", "EventTime": "2024-05-21T12:29:04.311962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOrit26sbUDFetaC4"], "accumulated_threat_level": 9.3, "timewindow": 46} +{"Format": "IDEA0", "ID": "18bac280-c381-44d7-aad7-8a7f0a861c57", "DetectTime": "2024-05-21T12:29:04.324001+00:00", "EventTime": "2024-05-21T12:29:04.324022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB9lybzBCQOsFVek5"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "1634a432-f43e-4f73-9a1c-22720dbc9702", "DetectTime": "2024-05-21T12:29:04.337396+00:00", "EventTime": "2024-05-21T12:29:04.337415+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB9lybzBCQOsFVek5"], "accumulated_threat_level": 3.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "594ebfb1-34f4-467c-ad96-91dd72beffc5", "DetectTime": "2024-05-21T12:29:04.348969+00:00", "EventTime": "2024-05-21T12:29:04.348989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84Be61MuZudZtbGub"], "accumulated_threat_level": 10.100000000000001, "timewindow": 46} +{"Format": "IDEA0", "ID": "a0ff5e67-9ebb-4767-b0a3-9315406897a5", "DetectTime": "2024-05-21T12:29:04.361184+00:00", "EventTime": "2024-05-21T12:29:04.361201+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzkOz3HujDHGQyCak"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "e6ee2f17-9933-4bb6-9f51-df30e78640a3", "DetectTime": "2024-05-21T12:29:04.373174+00:00", "EventTime": "2024-05-21T12:29:04.373192+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzkOz3HujDHGQyCak"], "accumulated_threat_level": 4.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "8d7a67c6-33ec-4112-8034-dd5de3050a92", "DetectTime": "2024-05-21T12:29:04.377883+00:00", "EventTime": "2024-05-21T12:29:04.377901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcLuz3fOtX4YN23Zi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "27508898-1f44-4f7b-835e-8aac6d448391", "DetectTime": "2024-05-21T12:29:04.382962+00:00", "EventTime": "2024-05-21T12:29:04.382983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57gu22e9rnYQVV6P9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "769b6d17-6d53-46ef-a3ba-ec3bf65530e0", "DetectTime": "2024-05-21T12:29:04.435012+00:00", "EventTime": "2024-05-21T12:29:04.435030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2r4y3HsVFeeOvH86"], "accumulated_threat_level": 10.900000000000002, "timewindow": 46} +{"Format": "IDEA0", "ID": "b88e2638-efc2-4749-b5a0-d184762059fa", "DetectTime": "2024-05-21T12:29:04.442659+00:00", "EventTime": "2024-05-21T12:29:04.442677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.188.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce73LN1CRDehHmyQE1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "da5027ba-c75a-4109-9624-9a5dde05488b", "DetectTime": "2024-05-21T12:29:04.482018+00:00", "EventTime": "2024-05-21T12:29:04.482043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Y7UI3ZrUXRVbDtC7"], "accumulated_threat_level": 11.700000000000003, "timewindow": 46} +{"Format": "IDEA0", "ID": "2a2a2ffa-75de-4c8c-b18c-390119e113db", "DetectTime": "2024-05-21T12:29:04.511919+00:00", "EventTime": "2024-05-21T12:29:04.511938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jjqI3XrbwlRFg8ug"], "accumulated_threat_level": 12.500000000000004, "timewindow": 46} +{"Format": "Json", "ID": "2a2a2ffa-75de-4c8c-b18c-390119e113db", "DetectTime": "2024-05-21T12:29:04.511919+00:00", "EventTime": "2024-05-21T12:29:04.511938+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "1970-01-02T21:48:33.352650+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 46. (real time 2024/05/21 12:29:04.750851)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 46, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "6e24d439-4abd-43c7-95b5-e40bbc93ed45", "DetectTime": "2024-05-21T12:29:04.754643+00:00", "EventTime": "2024-05-21T12:29:04.754660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJJQ5XQhV5c4PfKf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d56ac327-7131-4cb0-b1a1-8794c9961c58", "DetectTime": "2024-05-21T12:29:04.767131+00:00", "EventTime": "2024-05-21T12:29:04.767152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaszAB16pBoHal6PBi"], "accumulated_threat_level": 0.8, "timewindow": 46} +{"Format": "IDEA0", "ID": "c84f2c7a-e0dc-4370-a074-da0a36c0b24b", "DetectTime": "2024-05-21T12:29:04.771752+00:00", "EventTime": "2024-05-21T12:29:04.771769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMW1dakc017t7s98f"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "d7645317-bf33-447c-aebf-2f192857caeb", "DetectTime": "2024-05-21T12:29:04.864318+00:00", "EventTime": "2024-05-21T12:29:04.864337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C80aUg3ZeSiISijR74"], "accumulated_threat_level": 1.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "2c0b8bd8-ec82-46a2-bc36-d87e4712b505", "DetectTime": "2024-05-21T12:29:04.869021+00:00", "EventTime": "2024-05-21T12:29:04.869039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoHPygUjIF6lJ5lWc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "fc0ba3cf-6d9b-4958-aba4-23ccf8175af4", "DetectTime": "2024-05-21T12:29:04.899296+00:00", "EventTime": "2024-05-21T12:29:04.899319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSScbOiuGbf7YZxg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "cc56239b-a077-4a9d-8b96-350e40c8eef0", "DetectTime": "2024-05-21T12:29:04.937644+00:00", "EventTime": "2024-05-21T12:29:04.937662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71J9g32shFp7c1Smj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 46} +{"Format": "IDEA0", "ID": "b67837b5-654a-4dab-9e34-79c559488f1b", "DetectTime": "2024-05-21T12:29:04.981387+00:00", "EventTime": "2024-05-21T12:29:04.981406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2j7PR33IPlDhjWTp5"], "accumulated_threat_level": 3.2, "timewindow": 46} +{"Format": "IDEA0", "ID": "457c2ca2-f963-4319-b0a2-505a7e8e8890", "DetectTime": "2024-05-21T12:29:05.046348+00:00", "EventTime": "2024-05-21T12:29:05.046366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqCEq2TkZydYG1W9"], "accumulated_threat_level": 4.0, "timewindow": 46} +{"Format": "IDEA0", "ID": "f59c7ee8-7fad-4562-88b8-f2912cb13b4c", "DetectTime": "2024-05-21T12:29:05.067080+00:00", "EventTime": "2024-05-21T12:29:05.067107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.160.95.162"]}], "Attach": [{"Content": "Connection to unknown destination port 3201/UDP destination IP 46.160.95.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWElVV3FjIJ2aRJ4Ak"], "accumulated_threat_level": 4.8, "timewindow": 46} +{"Format": "IDEA0", "ID": "6683461e-0805-4a5a-bae9-bbd28e07ec0b", "DetectTime": "2024-05-21T12:29:05.093380+00:00", "EventTime": "2024-05-21T12:29:05.093399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bzeK3QNzdm9Biv11"], "accumulated_threat_level": 5.6, "timewindow": 46} +{"Format": "IDEA0", "ID": "2c45aa88-67bf-45e8-958f-e59647df34be", "DetectTime": "2024-05-21T12:29:05.124948+00:00", "EventTime": "2024-05-21T12:29:05.124966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWrqU1wr2XEUU9HS7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 46} +{"Format": "IDEA0", "ID": "ba1ecf4e-c26f-4317-85f1-6436ff7d5663", "DetectTime": "2024-05-21T12:29:05.155127+00:00", "EventTime": "2024-05-21T12:29:05.155147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCNgoL1gzkNpAaLUk1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "d0eafe02-b92d-4b46-80f4-185df8481041", "DetectTime": "2024-05-21T12:29:05.188901+00:00", "EventTime": "2024-05-21T12:29:05.188925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDpUf4ffK5CP4WfWi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "bf380d3f-f698-496d-b51a-213af9a8e161", "DetectTime": "2024-05-21T12:29:05.219481+00:00", "EventTime": "2024-05-21T12:29:05.219500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKrBs4qi9h0eah8d3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "0e2099c0-1cd7-446d-be95-1c39e8a682f0", "DetectTime": "2024-05-21T12:29:05.298033+00:00", "EventTime": "2024-05-21T12:29:05.298050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNuofNbyOlaTu6Ena"], "accumulated_threat_level": 0.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "b0566ab7-d256-4130-b75d-2c777f08e1ff", "DetectTime": "2024-05-21T12:29:05.471044+00:00", "EventTime": "2024-05-21T12:29:05.471063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGvTYW2mQAU0uM2QI"], "accumulated_threat_level": 1.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "3fbb96d0-b792-4cf3-b84a-ef6c220a4fd4", "DetectTime": "2024-05-21T12:29:05.514849+00:00", "EventTime": "2024-05-21T12:29:05.514869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcfL6e48oG2Fvy2v0i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 47} +{"Format": "IDEA0", "ID": "d8af3f43-9588-4485-a46f-6474b9544e78", "DetectTime": "2024-05-21T12:29:05.706599+00:00", "EventTime": "2024-05-21T12:29:05.706620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.131.97.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUNfE6fcSsw31zW2"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "46637435-3bc6-4d02-86cc-501ce44bc1ef", "DetectTime": "2024-05-21T12:29:05.767304+00:00", "EventTime": "2024-05-21T12:29:05.767324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEhOv1TKHaXbQXJRh"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "77e79040-560f-464e-a88e-f9eb29f0cc53", "DetectTime": "2024-05-21T12:29:05.799599+00:00", "EventTime": "2024-05-21T12:29:05.799621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY7XH3pINmR8INi86"], "accumulated_threat_level": 4.0, "timewindow": 47} +{"Format": "IDEA0", "ID": "a5b90111-54b8-43f7-8d70-20a7500ce4fe", "DetectTime": "2024-05-21T12:29:05.843289+00:00", "EventTime": "2024-05-21T12:29:05.843312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqBMi3DGw87HV2NIh"], "accumulated_threat_level": 4.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "209e55d8-03f3-4989-8c46-fbfd81080179", "DetectTime": "2024-05-21T12:29:05.877434+00:00", "EventTime": "2024-05-21T12:29:05.877453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbESD3WMDnZBcgyfl"], "accumulated_threat_level": 5.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "921a85f4-2468-4010-9e03-2c6cba61f47e", "DetectTime": "2024-05-21T12:29:05.919377+00:00", "EventTime": "2024-05-21T12:29:05.919395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMjmtr3b9foMORAocb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 47} +{"Format": "IDEA0", "ID": "75ffdfee-9e63-442b-b3e8-217e4c1366c7", "DetectTime": "2024-05-21T12:29:05.992038+00:00", "EventTime": "2024-05-21T12:29:05.992058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIivV2XU74IuzQws2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "b880affd-cc58-4fd4-8790-1f4390737d35", "DetectTime": "2024-05-21T12:29:06.015143+00:00", "EventTime": "2024-05-21T12:29:06.015165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.61.86.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHny1d3GGxs2capOSc"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "5f646895-c852-4e8c-b735-18c84f3ac950", "DetectTime": "2024-05-21T12:29:06.042882+00:00", "EventTime": "2024-05-21T12:29:06.042902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWVjb3CSbUmcVAWq4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "c6174e31-1f54-497b-9555-b7e37d26f629", "DetectTime": "2024-05-21T12:29:06.075053+00:00", "EventTime": "2024-05-21T12:29:06.075073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdn0l12UdHwL4PFsuh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "31e3e798-276a-4540-b634-0347b86409db", "DetectTime": "2024-05-21T12:29:06.110024+00:00", "EventTime": "2024-05-21T12:29:06.110043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClHJ8W1QzjW7pjD9y8"], "accumulated_threat_level": 9.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "fa17fa7c-016b-4233-a0f5-75e0b92e63b0", "DetectTime": "2024-05-21T12:29:06.323036+00:00", "EventTime": "2024-05-21T12:29:06.323056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9D6u3zSEVFYZeLo2"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "2e6680a0-1a09-4918-b79a-b9e249df4cc5", "DetectTime": "2024-05-21T12:29:06.348255+00:00", "EventTime": "2024-05-21T12:29:06.348273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfhxdk3BGC0Y4hZ9hh"], "accumulated_threat_level": 10.4, "timewindow": 47} +{"Format": "IDEA0", "ID": "5fd80c87-1eb7-4641-8dd2-a990244f44fa", "DetectTime": "2024-05-21T12:29:06.386190+00:00", "EventTime": "2024-05-21T12:29:06.386214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwaSj38BRnn66fJ7f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 47} +{"Format": "IDEA0", "ID": "531a782d-1550-4289-919f-7edc6c0825ef", "DetectTime": "2024-05-21T12:29:06.413125+00:00", "EventTime": "2024-05-21T12:29:06.413147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcFcvi2cyVZ1YwDkyi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 47} +{"Format": "Json", "ID": "531a782d-1550-4289-919f-7edc6c0825ef", "DetectTime": "2024-05-21T12:29:06.413125+00:00", "EventTime": "2024-05-21T12:29:06.413147+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-02T22:19:03.953130+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2024/05/21 12:29:06.557030)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 47, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "06815727-91f5-44cb-833f-d6306fb3654c", "DetectTime": "2024-05-21T12:29:06.567078+00:00", "EventTime": "2024-05-21T12:29:06.567096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFUfbmvOcppkLZUi6"], "accumulated_threat_level": 0.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "82c6bc1e-7d68-4c96-ad26-67389dcbb5bd", "DetectTime": "2024-05-21T12:29:06.616388+00:00", "EventTime": "2024-05-21T12:29:06.616410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCcUJ8b6IJDNkMYel"], "accumulated_threat_level": 1.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "be5e632e-9e45-47e7-89d9-e9a7172a575d", "DetectTime": "2024-05-21T12:29:06.626826+00:00", "EventTime": "2024-05-21T12:29:06.626845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "Connection to unknown destination port 6606/UDP destination IP 5.20.80.35. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDUBWW3srlVqEcZBrl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 47} +{"Format": "IDEA0", "ID": "39111c2c-4ed4-4151-b2f2-cbdf50019ad7", "DetectTime": "2024-05-21T12:29:06.636931+00:00", "EventTime": "2024-05-21T12:29:06.636949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuhU2a2uLtAcYIfJr9"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "c722ec60-b812-49cd-a9db-562f00d742a6", "DetectTime": "2024-05-21T12:29:06.661487+00:00", "EventTime": "2024-05-21T12:29:06.661506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1BGqG1wPkk7sdHgR"], "accumulated_threat_level": 4.0, "timewindow": 47} +{"Format": "IDEA0", "ID": "8ef50645-ee6a-4192-867a-027e3782d65a", "DetectTime": "2024-05-21T12:29:06.677005+00:00", "EventTime": "2024-05-21T12:29:06.677022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymxQGXYlcWgEsckj"], "accumulated_threat_level": 4.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "1703e406-2312-4eba-8727-9622b4cb0c90", "DetectTime": "2024-05-21T12:29:06.747283+00:00", "EventTime": "2024-05-21T12:29:06.747303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdUsP2zhHjkXm5Rb"], "accumulated_threat_level": 5.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "0b06be55-d3f1-4499-9552-aa8c93c41d21", "DetectTime": "2024-05-21T12:29:06.798073+00:00", "EventTime": "2024-05-21T12:29:06.798093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswTTQ3SjXwJkoHiKf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 47} +{"Format": "IDEA0", "ID": "1b4fdffe-cc6e-4635-8319-8b79982eb194", "DetectTime": "2024-05-21T12:29:06.802882+00:00", "EventTime": "2024-05-21T12:29:06.802901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.140.158.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CumEXlWATaqfM0547"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "6970a8ed-de33-46fb-8dc1-287c334eae5b", "DetectTime": "2024-05-21T12:29:06.850509+00:00", "EventTime": "2024-05-21T12:29:06.850528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cze1WR3NAegkYKfEP5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "6794246b-9ed0-440c-a949-e8186df54d8a", "DetectTime": "2024-05-21T12:29:06.883804+00:00", "EventTime": "2024-05-21T12:29:06.883823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWi7v3MG5wOulFtTe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "946aa4c0-026d-4fbe-9c9d-16e5799e8ec4", "DetectTime": "2024-05-21T12:29:06.916114+00:00", "EventTime": "2024-05-21T12:29:06.916132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "Connection to unknown destination port 5549/UDP destination IP 94.137.169.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjSudrNabRrR1Xrg1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "dddd22fd-7af7-4249-8f1d-b6c648eb63bb", "DetectTime": "2024-05-21T12:29:07.055119+00:00", "EventTime": "2024-05-21T12:29:07.055140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.188.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqzr237sOVeMuXTd5"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "6e3865d7-5baf-4b0b-89bf-856b283c60bc", "DetectTime": "2024-05-21T12:29:07.108876+00:00", "EventTime": "2024-05-21T12:29:07.108897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cla3Wd30IzVjwEiDW9"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "ab4421db-bff3-408a-bbbb-79b326d0c622", "DetectTime": "2024-05-21T12:29:07.137491+00:00", "EventTime": "2024-05-21T12:29:07.137511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyGh02pDP8gxk8wC8"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "43079dbc-4576-40ee-aa24-8904645e2ffe", "DetectTime": "2024-05-21T12:29:07.191990+00:00", "EventTime": "2024-05-21T12:29:07.192012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRFRg91eVn2INmfPa9"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "f2d2fd67-622c-465e-89bb-3482eb4c1661", "DetectTime": "2024-05-21T12:29:07.245259+00:00", "EventTime": "2024-05-21T12:29:07.245282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbNb3cylQmaGGnMb"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "51463d38-4297-47a1-ab04-c9a884892e33", "DetectTime": "2024-05-21T12:29:07.344002+00:00", "EventTime": "2024-05-21T12:29:07.344021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cymgsj4MjKPlWi4Abe"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "92c4041a-2931-4c1f-965a-55b525a28690", "DetectTime": "2024-05-21T12:29:07.359668+00:00", "EventTime": "2024-05-21T12:29:07.359688+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cymgsj4MjKPlWi4Abe"], "accumulated_threat_level": 4.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "5ac7ff74-3de8-431c-86ec-b94bd468fdb5", "DetectTime": "2024-05-21T12:29:07.422346+00:00", "EventTime": "2024-05-21T12:29:07.422367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBg6e4k3jnIkTOvK9", "CDFdD84RRuQJ4cHCs1", "Cm0QO7Czyi0Y2lF5e", "Co9B661lRj7t21UUQ6"], "accumulated_threat_level": 9.299999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "20570b29-12a2-4c04-90e4-18e6ee8e996f", "DetectTime": "2024-05-21T12:29:07.457148+00:00", "EventTime": "2024-05-21T12:29:07.457166+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciqr5S10D70Uv4Z9F2"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "f94c8bbb-63a3-40bf-ab21-9ba8c6113676", "DetectTime": "2024-05-21T12:29:07.469002+00:00", "EventTime": "2024-05-21T12:29:07.469021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciqr5S10D70Uv4Z9F2"], "accumulated_threat_level": 5.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "4cc6f00f-accf-41e1-b23a-a83e3c1bb696", "DetectTime": "2024-05-21T12:29:07.480095+00:00", "EventTime": "2024-05-21T12:29:07.480113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3mN32zbThicFJaG8"], "accumulated_threat_level": 10.1, "timewindow": 47} +{"Format": "IDEA0", "ID": "8d544700-af2f-4611-8bc9-6cd3f70c2ad5", "DetectTime": "2024-05-21T12:29:07.499132+00:00", "EventTime": "2024-05-21T12:29:07.499153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1pfLepoeyFBim82b"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "6e2d1e22-e924-439e-8e76-6f27309989de", "DetectTime": "2024-05-21T12:29:07.503871+00:00", "EventTime": "2024-05-21T12:29:07.503890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3F9b63TZQo9Gtkcb"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "f85abf58-628c-49c6-98b9-f1da52031e6b", "DetectTime": "2024-05-21T12:29:07.508357+00:00", "EventTime": "2024-05-21T12:29:07.508376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDn2n47v9PZImHr05"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "117b99dd-0c61-4789-81e3-0ded3536f6dc", "DetectTime": "2024-05-21T12:29:07.650171+00:00", "EventTime": "2024-05-21T12:29:07.650190+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBJgQ202YmrH64ML4"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "2d8d6a63-1f85-409d-8d4c-561ea728da5a", "DetectTime": "2024-05-21T12:29:07.655025+00:00", "EventTime": "2024-05-21T12:29:07.655042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK09eg4nxy6eZ2Xbcg"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "339d971f-4688-4602-94e5-86454c333012", "DetectTime": "2024-05-21T12:29:07.666501+00:00", "EventTime": "2024-05-21T12:29:07.666519+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBJgQ202YmrH64ML4"], "accumulated_threat_level": 5.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "88343c23-8a6b-4450-99f2-2c9728b481d9", "DetectTime": "2024-05-21T12:29:07.729989+00:00", "EventTime": "2024-05-21T12:29:07.730016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoY99X3Zr5y1juXxh4"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "9495f43f-4326-4cec-8261-19d435ba2005", "DetectTime": "2024-05-21T12:29:07.828625+00:00", "EventTime": "2024-05-21T12:29:07.828643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz92c81Gf5qFfjbMXl"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "1c5ee9d6-8292-48b7-be6f-b49c8d81f66f", "DetectTime": "2024-05-21T12:29:07.841192+00:00", "EventTime": "2024-05-21T12:29:07.841210+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz92c81Gf5qFfjbMXl"], "accumulated_threat_level": 6.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "818afb57-810f-4b60-9820-fe281daf6a78", "DetectTime": "2024-05-21T12:29:07.845872+00:00", "EventTime": "2024-05-21T12:29:07.845889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVLl5NHKmR37Vj78"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "b5397cfd-02c9-4f61-9b90-779b00c9f2b1", "DetectTime": "2024-05-21T12:29:07.896032+00:00", "EventTime": "2024-05-21T12:29:07.896053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzGVw9sfTAOP9GU4"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "98ae61a9-eff1-4c02-b3e1-8cb5a2b90070", "DetectTime": "2024-05-21T12:29:07.929865+00:00", "EventTime": "2024-05-21T12:29:07.929882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgF1u4jD7aHWM6W07"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "f6e5fe63-04b7-4671-a1a6-1ec06f7953b1", "DetectTime": "2024-05-21T12:29:07.940860+00:00", "EventTime": "2024-05-21T12:29:07.940879+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgF1u4jD7aHWM6W07"], "accumulated_threat_level": 6.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "8c68b435-4968-4c4f-a7c2-02a486b6d4fa", "DetectTime": "2024-05-21T12:29:07.954571+00:00", "EventTime": "2024-05-21T12:29:07.954599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYqYckEf2uE25xCIl"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "26cd9edb-e90a-40c8-8d86-59c69b5e9d84", "DetectTime": "2024-05-21T12:29:07.968080+00:00", "EventTime": "2024-05-21T12:29:07.968098+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYqYckEf2uE25xCIl"], "accumulated_threat_level": 7.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "6263b639-92ab-402c-9e0d-7a909d7d11cb", "DetectTime": "2024-05-21T12:29:07.989101+00:00", "EventTime": "2024-05-21T12:29:07.989121+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtM3qG1lnymU1GlSt1"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "6e1032c3-1d80-45f6-985b-61b51bbf9c19", "DetectTime": "2024-05-21T12:29:08.001843+00:00", "EventTime": "2024-05-21T12:29:08.001863+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtM3qG1lnymU1GlSt1"], "accumulated_threat_level": 7.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "6109eb42-f8ec-477b-aa18-11fceaa0a950", "DetectTime": "2024-05-21T12:29:08.007210+00:00", "EventTime": "2024-05-21T12:29:08.007228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq79T1iLw4G0Adaog"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "e9cda227-e707-4494-9f36-0965f6b8f3c4", "DetectTime": "2024-05-21T12:29:08.019357+00:00", "EventTime": "2024-05-21T12:29:08.019377+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXq73m3ty4GMZRsh"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "2223d856-012a-451d-9b1b-012d57e4ec04", "DetectTime": "2024-05-21T12:29:08.032226+00:00", "EventTime": "2024-05-21T12:29:08.032246+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXq73m3ty4GMZRsh"], "accumulated_threat_level": 8.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "81f10f53-2436-40fd-95bb-32db1ed7d6ed", "DetectTime": "2024-05-21T12:29:08.071262+00:00", "EventTime": "2024-05-21T12:29:08.071284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy06w3cxQ7LzUbs66"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "1c690f55-b864-4483-834c-fa36cee9d925", "DetectTime": "2024-05-21T12:29:08.100371+00:00", "EventTime": "2024-05-21T12:29:08.100390+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhYArifnUDMFTcpk"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "cfcfe8b3-585b-46e3-9ac6-df20d32a8d85", "DetectTime": "2024-05-21T12:29:08.112906+00:00", "EventTime": "2024-05-21T12:29:08.112926+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhYArifnUDMFTcpk"], "accumulated_threat_level": 8.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "bd6c4b9b-f5bc-40da-b4f1-7c7d48d8f4cc", "DetectTime": "2024-05-21T12:29:08.125327+00:00", "EventTime": "2024-05-21T12:29:08.125346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbvlaK1hDOHhlzcFm3"], "accumulated_threat_level": 10.9, "timewindow": 47} +{"Format": "IDEA0", "ID": "bab515f3-3fdc-451e-8a19-169b314c533e", "DetectTime": "2024-05-21T12:29:08.136541+00:00", "EventTime": "2024-05-21T12:29:08.136562+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQdg12IQidHYH37H8"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "f06656af-f94b-4906-85dd-49e83bcbf11e", "DetectTime": "2024-05-21T12:29:08.142158+00:00", "EventTime": "2024-05-21T12:29:08.142178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CirySN5elei8RAq56"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "9da9931a-7e06-4469-85b8-b1c83fa59f0a", "DetectTime": "2024-05-21T12:29:08.188627+00:00", "EventTime": "2024-05-21T12:29:08.188651+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQdg12IQidHYH37H8"], "accumulated_threat_level": 9.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "746c7798-5898-4c15-95ff-f3e7d80d3ecf", "DetectTime": "2024-05-21T12:29:08.200182+00:00", "EventTime": "2024-05-21T12:29:08.200206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZigZ3xc1JVS3mJwb"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3debbd64-7d3d-46f4-8235-c100fe7adf32", "DetectTime": "2024-05-21T12:29:08.205150+00:00", "EventTime": "2024-05-21T12:29:08.205170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqoli1m7OOB9kHnk4"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "707ca0b7-e457-4138-aef7-a759a36e3d0d", "DetectTime": "2024-05-21T12:29:08.353299+00:00", "EventTime": "2024-05-21T12:29:08.353317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdxK12einWXDP1C4f"], "accumulated_threat_level": 11.700000000000001, "timewindow": 47} +{"Format": "IDEA0", "ID": "c73ecfe8-e75e-449b-b97d-9e13fd787ceb", "DetectTime": "2024-05-21T12:29:08.399036+00:00", "EventTime": "2024-05-21T12:29:08.399059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8Shi4yc7JamEwoc5"], "accumulated_threat_level": 12.500000000000002, "timewindow": 47} +{"Format": "Json", "ID": "c73ecfe8-e75e-449b-b97d-9e13fd787ceb", "DetectTime": "2024-05-21T12:29:08.399036+00:00", "EventTime": "2024-05-21T12:29:08.399059+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "1970-01-02T22:49:55.744840+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2024/05/21 12:29:08.611353)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 47, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "a582fe35-b73f-47a7-ada9-d1b3274239ae", "DetectTime": "2024-05-21T12:29:08.624109+00:00", "EventTime": "2024-05-21T12:29:08.624127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLQ2G2GXeDdy7DUb9"], "accumulated_threat_level": 0.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "6c1cdd4d-747c-45fd-ab34-db3853635f22", "DetectTime": "2024-05-21T12:29:08.634096+00:00", "EventTime": "2024-05-21T12:29:08.634114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqk4pARiSSsveJb4"], "accumulated_threat_level": 1.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "c6c8747d-5d21-466c-b8e8-7d55437c9848", "DetectTime": "2024-05-21T12:29:08.638986+00:00", "EventTime": "2024-05-21T12:29:08.639004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWIU9391HoDOprZA1"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "04318922-ccb5-4051-a215-f1807f2a3718", "DetectTime": "2024-05-21T12:29:08.650202+00:00", "EventTime": "2024-05-21T12:29:08.650223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COR0Md1uOgnP1lFgC3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 47} +{"Format": "IDEA0", "ID": "ae0e27ed-a04a-46a4-bbdd-abd77bdcf538", "DetectTime": "2024-05-21T12:29:08.691582+00:00", "EventTime": "2024-05-21T12:29:08.691603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcZ9SI2qplFr0zSg"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "34ab9387-b984-4552-a466-8d3c379836cb", "DetectTime": "2024-05-21T12:29:08.734816+00:00", "EventTime": "2024-05-21T12:29:08.734835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyKEj11JVWxc22rO8"], "accumulated_threat_level": 4.0, "timewindow": 47} +{"Format": "IDEA0", "ID": "1c8d003a-a1ff-425d-9066-05faf8109184", "DetectTime": "2024-05-21T12:29:08.774159+00:00", "EventTime": "2024-05-21T12:29:08.774177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5RfW3azVY1rCksp1"], "accumulated_threat_level": 4.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "3149e7ad-d70f-478d-9f64-7b3baef7f96a", "DetectTime": "2024-05-21T12:29:08.779796+00:00", "EventTime": "2024-05-21T12:29:08.779818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQ7eo2cXLr8ci7xi"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "7cb7156f-c6d1-444f-b4e3-23eb874fc521", "DetectTime": "2024-05-21T12:29:08.819662+00:00", "EventTime": "2024-05-21T12:29:08.819682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUePPo1x1JRyKCp6kd"], "accumulated_threat_level": 5.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "68834c1c-5a6b-4657-baec-9ebf1338f5d7", "DetectTime": "2024-05-21T12:29:08.851999+00:00", "EventTime": "2024-05-21T12:29:08.852017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA4ZFWWqerhSWybi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 47} +{"Format": "IDEA0", "ID": "01dc6952-a8fd-47c7-86bf-42cb20b5ce2d", "DetectTime": "2024-05-21T12:29:09.117140+00:00", "EventTime": "2024-05-21T12:29:09.117163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cWUm4j1YG6BsFWka"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "f3693752-9cc6-4cc0-9b9f-bcb85941d0d4", "DetectTime": "2024-05-21T12:29:09.151446+00:00", "EventTime": "2024-05-21T12:29:09.151466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb2vsn4nLg5tL28bBd"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "5824b438-fd4e-4c0b-b74e-8baa8d8378cf", "DetectTime": "2024-05-21T12:29:09.157459+00:00", "EventTime": "2024-05-21T12:29:09.157480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGoD0l1VCQ5Szlo0Ng"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "08836570-5d66-48bf-945c-0c98ef958707", "DetectTime": "2024-05-21T12:29:09.162036+00:00", "EventTime": "2024-05-21T12:29:09.162055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9sCjx6SkjtqBte2"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "80b94b5b-1203-4f38-9c70-81cc89c5791e", "DetectTime": "2024-05-21T12:29:09.166759+00:00", "EventTime": "2024-05-21T12:29:09.166777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1e0E4qXcozIE00Sa"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "070fcfdc-b921-4d88-9c79-9521b9d3e584", "DetectTime": "2024-05-21T12:29:09.206694+00:00", "EventTime": "2024-05-21T12:29:09.206712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdby6t1DDhQhjmNcs4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "241c62d4-c744-43fc-a7bb-58ef6998bc12", "DetectTime": "2024-05-21T12:29:09.211795+00:00", "EventTime": "2024-05-21T12:29:09.211814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3024Y1dBn7gVPHLN2"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "4b207ced-9f1a-4dc4-b824-40c2696ef5af", "DetectTime": "2024-05-21T12:29:09.300627+00:00", "EventTime": "2024-05-21T12:29:09.300646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEERgo1WYFWka5XH34"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "2338c56f-8171-4d59-9541-3a00da802091", "DetectTime": "2024-05-21T12:29:09.308689+00:00", "EventTime": "2024-05-21T12:29:09.308709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Con1wZ2ooJlX0aL7p7"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "0df0feb3-30d0-4519-bd18-5e3d2e40a6cc", "DetectTime": "2024-05-21T12:29:09.357258+00:00", "EventTime": "2024-05-21T12:29:09.357278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12B1w28ezKTMNQKbf"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "06a9fcfd-48ca-4b38-b95f-3b1d9d1fd95c", "DetectTime": "2024-05-21T12:29:09.384977+00:00", "EventTime": "2024-05-21T12:29:09.384996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5Xhp3kjciGXPsWtg"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "c500bf06-3d03-43e1-9f0c-d661b126212b", "DetectTime": "2024-05-21T12:29:09.389653+00:00", "EventTime": "2024-05-21T12:29:09.389672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvnqZ94GZBFvfAfD1"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3c849dac-c29e-4cd5-8146-29539c69cc60", "DetectTime": "2024-05-21T12:29:09.435728+00:00", "EventTime": "2024-05-21T12:29:09.435750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1W6P2YoS845bCRo3"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "5802130c-05fa-42c9-bf0a-ae2859aa7ccf", "DetectTime": "2024-05-21T12:29:09.447255+00:00", "EventTime": "2024-05-21T12:29:09.447275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMFsp2leESsFJQ9Ad"], "accumulated_threat_level": 7.999999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "c6a7b1df-931d-4432-9fee-2417a77dea4e", "DetectTime": "2024-05-21T12:29:09.491533+00:00", "EventTime": "2024-05-21T12:29:09.491557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgS3QJ1CLhUJEJ2Jv6"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "95004102-33fe-4326-927a-723504d9102f", "DetectTime": "2024-05-21T12:29:09.511317+00:00", "EventTime": "2024-05-21T12:29:09.511334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQQgz26tzEWOTZbpe"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "045b4d17-0bb7-482c-9dac-4554d20231a0", "DetectTime": "2024-05-21T12:29:09.560860+00:00", "EventTime": "2024-05-21T12:29:09.560880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZngZ2ZSC96Ps4PS5"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "450cafa1-49dd-42e1-b4fa-b8aac897ade5", "DetectTime": "2024-05-21T12:29:09.584126+00:00", "EventTime": "2024-05-21T12:29:09.584145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuW3n1zqwgODTTMvd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 47} +{"Format": "IDEA0", "ID": "48aa3675-23e6-4f56-937c-8a329ffe693b", "DetectTime": "2024-05-21T12:29:09.610723+00:00", "EventTime": "2024-05-21T12:29:09.610745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClhJYX3IarJrFBMcwf"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "18d6ebd4-b1e5-4d49-84ef-238a93d25d9a", "DetectTime": "2024-05-21T12:29:09.645031+00:00", "EventTime": "2024-05-21T12:29:09.645050+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXPll1oa47meUFGE5"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "f19a4161-861f-4385-b287-2ad7b01faea5", "DetectTime": "2024-05-21T12:29:09.657489+00:00", "EventTime": "2024-05-21T12:29:09.657509+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXPll1oa47meUFGE5"], "accumulated_threat_level": 9.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "72d34ce6-e284-45ef-b0f4-38fbde063717", "DetectTime": "2024-05-21T12:29:09.679364+00:00", "EventTime": "2024-05-21T12:29:09.679387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hK312C30uVcmhci3"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "da908a60-c2c3-486b-9af1-5c9f13c87bd4", "DetectTime": "2024-05-21T12:29:09.725868+00:00", "EventTime": "2024-05-21T12:29:09.725888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUmwhu3qBZz5EYe79f"], "accumulated_threat_level": 9.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "ad585e13-2de7-4be5-8c30-d93692bd14d9", "DetectTime": "2024-05-21T12:29:09.770501+00:00", "EventTime": "2024-05-21T12:29:09.770520+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFh31tkNYtKsdHWPe"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "6b671677-149e-4d28-9ecb-841114dafe16", "DetectTime": "2024-05-21T12:29:09.782602+00:00", "EventTime": "2024-05-21T12:29:09.782625+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFh31tkNYtKsdHWPe"], "accumulated_threat_level": 10.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "80b2df62-ed2d-4957-89fd-b9c6041547c5", "DetectTime": "2024-05-21T12:29:09.974989+00:00", "EventTime": "2024-05-21T12:29:09.975007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpgyC1uwktyh1bPHa"], "accumulated_threat_level": 10.4, "timewindow": 47} +{"Format": "IDEA0", "ID": "6231db87-fcb1-465b-a8a6-c585ba715883", "DetectTime": "2024-05-21T12:29:10.009749+00:00", "EventTime": "2024-05-21T12:29:10.009766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOVTA2LyFvToigCWe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 47} +{"Format": "IDEA0", "ID": "d843c798-6c5d-47e1-a05a-b5a56f91f9ef", "DetectTime": "2024-05-21T12:29:10.039442+00:00", "EventTime": "2024-05-21T12:29:10.039464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCcju27at5FEUg8J"], "accumulated_threat_level": 12.000000000000002, "timewindow": 47} +{"Format": "Json", "ID": "d843c798-6c5d-47e1-a05a-b5a56f91f9ef", "DetectTime": "2024-05-21T12:29:10.039442+00:00", "EventTime": "2024-05-21T12:29:10.039464+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-02T22:50:17.397117+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 47. (real time 2024/05/21 12:29:10.223747)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 47, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "92e1174e-52c4-456f-8d80-a0e3879820b7", "DetectTime": "2024-05-21T12:29:10.245337+00:00", "EventTime": "2024-05-21T12:29:10.245357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTs4My4zbW7Tp5aHib"], "accumulated_threat_level": 0.8, "timewindow": 47} +{"Format": "IDEA0", "ID": "b2633a8e-456e-414b-90ef-a9233f36131b", "DetectTime": "2024-05-21T12:29:10.256519+00:00", "EventTime": "2024-05-21T12:29:10.256538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOYx51Cv75fx25I11"], "accumulated_threat_level": 1.6, "timewindow": 47} +{"Format": "IDEA0", "ID": "3e4e2b79-04c0-41e4-a6b5-5bc6ec35513f", "DetectTime": "2024-05-21T12:29:10.266744+00:00", "EventTime": "2024-05-21T12:29:10.266762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxX9EZ3kbUVYR0pFu9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 47} +{"Format": "IDEA0", "ID": "1554de76-1122-4e3e-8e37-eb2ac40d7728", "DetectTime": "2024-05-21T12:29:10.277099+00:00", "EventTime": "2024-05-21T12:29:10.277118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPRiy2S3FNpw8U29d"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "732e14bb-88b2-4456-923d-c625a46bc761", "DetectTime": "2024-05-21T12:29:10.384548+00:00", "EventTime": "2024-05-21T12:29:10.384567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap1P1Dpmk2Do5KI2"], "accumulated_threat_level": 0.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "039c118b-3fab-4b9d-ac5d-9316fef68d2d", "DetectTime": "2024-05-21T12:29:10.416378+00:00", "EventTime": "2024-05-21T12:29:10.416401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLibRz3FGcmC8LuoJb"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "69b97315-21e9-4910-a6ee-db7eb1494024", "DetectTime": "2024-05-21T12:29:10.433242+00:00", "EventTime": "2024-05-21T12:29:10.433265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.161.19.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfCwsp4Th6z9h1H29j"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3688f320-a521-4638-8c28-b2f261f49733", "DetectTime": "2024-05-21T12:29:10.500935+00:00", "EventTime": "2024-05-21T12:29:10.500957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmO56klkXjK9KU0Dg", "CMxnxTtlWwubYSDe3", "CjISanfnLT7Phgoqh", "CcbERS1NFNWRgpwJL6"], "accumulated_threat_level": 1.3, "timewindow": 48} +{"Format": "IDEA0", "ID": "ae957c03-248c-4ae5-ac11-377b2956c3da", "DetectTime": "2024-05-21T12:29:10.728051+00:00", "EventTime": "2024-05-21T12:29:10.728069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9OWo338l2qx1hVB1"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "9c292fc8-17a3-466f-810c-3dd7d49587e2", "DetectTime": "2024-05-21T12:29:10.813355+00:00", "EventTime": "2024-05-21T12:29:10.813374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdXTI03CM3P9M4uRx8"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "0419bae7-e439-4095-b112-793c3785180d", "DetectTime": "2024-05-21T12:29:10.845556+00:00", "EventTime": "2024-05-21T12:29:10.845575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzGtt64SeI2DU19FC3"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "192bb42a-bad1-4a23-a4f9-6bed646cd887", "DetectTime": "2024-05-21T12:29:11.054828+00:00", "EventTime": "2024-05-21T12:29:11.054849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm7Li146f42djS7b7"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "7d4b9a5a-e1d7-407c-abd3-c12a3256925e", "DetectTime": "2024-05-21T12:29:11.080523+00:00", "EventTime": "2024-05-21T12:29:11.080544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEHCp1NiqfIz4gT7i"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "c98a38f1-8fd2-409e-bc8a-521bcf13b193", "DetectTime": "2024-05-21T12:29:11.111652+00:00", "EventTime": "2024-05-21T12:29:11.111693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBwy53L7SdO29vCad"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "277de65f-5a2e-40ae-aa13-a671b9c7bb0e", "DetectTime": "2024-05-21T12:29:11.145523+00:00", "EventTime": "2024-05-21T12:29:11.145544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrNRkqxGoExtbQwe"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "03f67c4b-64c4-4187-83e0-d7754b6dd6f6", "DetectTime": "2024-05-21T12:29:11.191385+00:00", "EventTime": "2024-05-21T12:29:11.191406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPoWN1gaEZaOuccz5"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "c1c3f352-cc01-490f-8d7e-de6c1a08489e", "DetectTime": "2024-05-21T12:29:11.224504+00:00", "EventTime": "2024-05-21T12:29:11.224526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKCNT3TPuMx3pve05"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "90a9a28a-c403-430c-8a29-86c4676f8e5f", "DetectTime": "2024-05-21T12:29:11.266847+00:00", "EventTime": "2024-05-21T12:29:11.266869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8jqO3KP9StlphrYc"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "6e36d2f8-c402-45f6-9301-6d70ac756616", "DetectTime": "2024-05-21T12:29:11.299004+00:00", "EventTime": "2024-05-21T12:29:11.299026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHoJNv9tjoz8aO8d"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "6fcc82ba-95b5-4b2d-ac4b-d243f7d37d39", "DetectTime": "2024-05-21T12:29:11.329665+00:00", "EventTime": "2024-05-21T12:29:11.329684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWIQql4hSqzemOYH4"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "1fb40217-dd13-4fdf-aa8c-b7d85b30a64c", "DetectTime": "2024-05-21T12:29:11.362005+00:00", "EventTime": "2024-05-21T12:29:11.362028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmAcC1nXHGUUhjf"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "b61f62cb-d72b-429d-b963-dbe309039c7c", "DetectTime": "2024-05-21T12:29:11.389635+00:00", "EventTime": "2024-05-21T12:29:11.389656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csi5QY3frJOmwl3QJf"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "ddb2b74f-0bbf-4d79-ae7b-8dd7fab8cd59", "DetectTime": "2024-05-21T12:29:11.416568+00:00", "EventTime": "2024-05-21T12:29:11.416588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy9yo56wHpp3yXIh"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "2802eda2-3ada-4c54-ad68-9b05bd22f67c", "DetectTime": "2024-05-21T12:29:11.487015+00:00", "EventTime": "2024-05-21T12:29:11.487037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbFXM34qCAl2g0gxf"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3b066b21-b74d-4db6-bdf9-f6f91626453f", "DetectTime": "2024-05-21T12:29:11.759853+00:00", "EventTime": "2024-05-21T12:29:11.759875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXk1ku2ZapskZXqXh5"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "87344d38-8d6a-437c-8556-dbeb683cf5d4", "DetectTime": "2024-05-21T12:29:11.764921+00:00", "EventTime": "2024-05-21T12:29:11.764940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFs5iG4qoGn9nZ4Vqh"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "04631aa9-da23-4d82-b45f-74bef82726f7", "DetectTime": "2024-05-21T12:29:11.769134+00:00", "EventTime": "2024-05-21T12:29:11.769151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qSN22tMzhli1F3Na"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "4eb60c82-f978-4052-a590-b5020fb3604d", "DetectTime": "2024-05-21T12:29:11.854342+00:00", "EventTime": "2024-05-21T12:29:11.854360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaeY3j1mUaW57Xecsc"], "accumulated_threat_level": 2.1, "timewindow": 48} +{"Format": "IDEA0", "ID": "8a663cac-1c7b-4194-aa12-c123e3ce645c", "DetectTime": "2024-05-21T12:29:11.877837+00:00", "EventTime": "2024-05-21T12:29:11.877855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrxOBC3fSZv7bNAfZ7"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "33352edd-eb17-4736-af46-7148f684c168", "DetectTime": "2024-05-21T12:29:11.902507+00:00", "EventTime": "2024-05-21T12:29:11.902542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ23nD46mkdtjEZlPb"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 48} +{"Format": "IDEA0", "ID": "a0c28485-120c-4fd6-b0ae-e2ee4037ad5e", "DetectTime": "2024-05-21T12:29:11.926039+00:00", "EventTime": "2024-05-21T12:29:11.926059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvd8Q2QslwiggkJw8"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "88557983-4152-41f8-8d81-0d093652aa8b", "DetectTime": "2024-05-21T12:29:11.952958+00:00", "EventTime": "2024-05-21T12:29:11.952978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEjXUrA04XY5NkGh"], "accumulated_threat_level": 3.7, "timewindow": 48} +{"Format": "IDEA0", "ID": "088abd08-916c-45b4-a101-bd888376be3f", "DetectTime": "2024-05-21T12:29:11.978320+00:00", "EventTime": "2024-05-21T12:29:11.978339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COktJtZBoUDukvlr3"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "fdf1c12b-fdcf-437a-8d9d-f8a7563f05c9", "DetectTime": "2024-05-21T12:29:12.004349+00:00", "EventTime": "2024-05-21T12:29:12.004367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcnrRS1E4fbRd06ex5"], "accumulated_threat_level": 4.5, "timewindow": 48} +{"Format": "IDEA0", "ID": "52399802-cf78-4b94-b4d4-e853b851f6ba", "DetectTime": "2024-05-21T12:29:12.035172+00:00", "EventTime": "2024-05-21T12:29:12.035193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZFsz4sND71jkihZb"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "7683ffcf-46b7-4350-87d0-9768672c6434", "DetectTime": "2024-05-21T12:29:12.043044+00:00", "EventTime": "2024-05-21T12:29:12.043064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCpfD31m6e3vch18c"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3696cb39-4c1f-43e5-826d-b4ba73ee26f5", "DetectTime": "2024-05-21T12:29:12.084203+00:00", "EventTime": "2024-05-21T12:29:12.084222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfZYa3eMi3guQ27Ua"], "accumulated_threat_level": 5.3, "timewindow": 48} +{"Format": "IDEA0", "ID": "68bb4a00-c7ea-46e1-b1f4-530510b3ec97", "DetectTime": "2024-05-21T12:29:12.103866+00:00", "EventTime": "2024-05-21T12:29:12.103886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCj482DgfANaNDBV3"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "89491d61-15a6-42bd-87ea-b379ea947e8d", "DetectTime": "2024-05-21T12:29:12.136659+00:00", "EventTime": "2024-05-21T12:29:12.136677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2VuN1iFTEC1u4fCb"], "accumulated_threat_level": 6.1, "timewindow": 48} +{"Format": "IDEA0", "ID": "473e8973-7177-4624-bf94-0706eda02892", "DetectTime": "2024-05-21T12:29:12.169656+00:00", "EventTime": "2024-05-21T12:29:12.169676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQdw1RdvXzG8AT88"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 48} +{"Format": "IDEA0", "ID": "fa795360-a762-4b55-9aef-9fa5ae20a888", "DetectTime": "2024-05-21T12:29:12.202665+00:00", "EventTime": "2024-05-21T12:29:12.202689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cor9cJ24rkSjH6cY56"], "accumulated_threat_level": 7.699999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "d0fdf1a6-b10a-4ade-ad1e-17db9c0408ee", "DetectTime": "2024-05-21T12:29:12.235375+00:00", "EventTime": "2024-05-21T12:29:12.235393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwpaB45xuV0LgtDgb"], "accumulated_threat_level": 8.5, "timewindow": 48} +{"Format": "IDEA0", "ID": "820263cf-d442-4af1-88ea-174b09a1b300", "DetectTime": "2024-05-21T12:29:12.266677+00:00", "EventTime": "2024-05-21T12:29:12.266696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChqFo31KixeZ5d7Jw1"], "accumulated_threat_level": 9.3, "timewindow": 48} +{"Format": "IDEA0", "ID": "c2fd19cc-f12a-4ba6-afe9-0f46e7b095e1", "DetectTime": "2024-05-21T12:29:12.315534+00:00", "EventTime": "2024-05-21T12:29:12.315553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJt912EnCXoCIl933"], "accumulated_threat_level": 10.100000000000001, "timewindow": 48} +{"Format": "IDEA0", "ID": "c907df5a-d2bd-4cd8-9b92-613d97c03d87", "DetectTime": "2024-05-21T12:29:12.327353+00:00", "EventTime": "2024-05-21T12:29:12.327372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZtHk1iG4jV6FTzXe"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "b231aac4-032e-425c-b282-53cfbac90a90", "DetectTime": "2024-05-21T12:29:12.562388+00:00", "EventTime": "2024-05-21T12:29:12.562424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTSff1qCtgWwoFhae"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "de2678fd-9429-4063-ab83-4995e65acd0d", "DetectTime": "2024-05-21T12:29:12.582959+00:00", "EventTime": "2024-05-21T12:29:12.582979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWfDTL1d02xHgJIM85"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "9600bfcd-b845-417d-8827-694e008b084c", "DetectTime": "2024-05-21T12:29:12.593998+00:00", "EventTime": "2024-05-21T12:29:12.594018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm2VhomttBbFWXwWb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 48} +{"Format": "IDEA0", "ID": "6da99aa4-fea9-4741-84a9-1cd16759561c", "DetectTime": "2024-05-21T12:29:12.602020+00:00", "EventTime": "2024-05-21T12:29:12.602039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCFv5SRlHQ02Aej4"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "609a6937-1ec2-4a19-b714-7f4f2ec28894", "DetectTime": "2024-05-21T12:29:12.606731+00:00", "EventTime": "2024-05-21T12:29:12.606750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLWJMGo8V73JTKfb"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "fab8ebb1-b113-48ea-a09b-8419caed7ad6", "DetectTime": "2024-05-21T12:29:12.621828+00:00", "EventTime": "2024-05-21T12:29:12.621850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjSrh20IjxLzfoYLj"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "383e97ff-f681-4906-ac62-155c5e90f433", "DetectTime": "2024-05-21T12:29:12.633523+00:00", "EventTime": "2024-05-21T12:29:12.633542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnV451O76HpnswGU4"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "876e05f9-c0d8-414f-8f3f-ac779cdfd1ee", "DetectTime": "2024-05-21T12:29:12.720257+00:00", "EventTime": "2024-05-21T12:29:12.720278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfRPf23jqxYlgGoo7"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "48955f1e-0f8c-4228-ada3-2707e3cc8a3d", "DetectTime": "2024-05-21T12:29:12.820065+00:00", "EventTime": "2024-05-21T12:29:12.820092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NtKv4YlWC7jEalEa"], "accumulated_threat_level": 11.700000000000003, "timewindow": 48} +{"Format": "IDEA0", "ID": "e79ad562-ac67-41fd-a80e-3d050147eade", "DetectTime": "2024-05-21T12:29:12.830299+00:00", "EventTime": "2024-05-21T12:29:12.830319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRvLS2Sqt6nsNUwX9"], "accumulated_threat_level": 1.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "472945df-cc06-47a9-8c9a-eb668029e9bb", "DetectTime": "2024-05-21T12:29:12.864358+00:00", "EventTime": "2024-05-21T12:29:12.864375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJtRM1vqJXEr2GLO"], "accumulated_threat_level": 12.500000000000004, "timewindow": 48} +{"Format": "Json", "ID": "472945df-cc06-47a9-8c9a-eb668029e9bb", "DetectTime": "2024-05-21T12:29:12.864358+00:00", "EventTime": "2024-05-21T12:29:12.864375+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "1970-01-02T23:22:29.249222+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2024/05/21 12:29:13.041558)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 48, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "38592053-f65a-41e4-914b-24fca95fd6f9", "DetectTime": "2024-05-21T12:29:13.058482+00:00", "EventTime": "2024-05-21T12:29:13.058507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHdO8RDAyuYv3qLd"], "accumulated_threat_level": 0.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "5a1a9092-892e-49e6-b1f7-bc7c9e755d1c", "DetectTime": "2024-05-21T12:29:13.071089+00:00", "EventTime": "2024-05-21T12:29:13.071109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGGXb4acxDQXBrxcd"], "accumulated_threat_level": 1.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "2d2add25-4033-45fc-8e0e-004a80f22ebe", "DetectTime": "2024-05-21T12:29:13.082015+00:00", "EventTime": "2024-05-21T12:29:13.082034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgINnm1v6ODMgOroMj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 48} +{"Format": "IDEA0", "ID": "b66c136d-00e2-47e3-bfa7-226f2b5c727f", "DetectTime": "2024-05-21T12:29:13.103406+00:00", "EventTime": "2024-05-21T12:29:13.103424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCjgf3KZT1mcwr9Ei"], "accumulated_threat_level": 3.2, "timewindow": 48} +{"Format": "IDEA0", "ID": "41af9d43-407c-4aab-ac84-6ab22f0aff53", "DetectTime": "2024-05-21T12:29:13.114193+00:00", "EventTime": "2024-05-21T12:29:13.114212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYdPs1Apb38DW2xK"], "accumulated_threat_level": 4.0, "timewindow": 48} +{"Format": "IDEA0", "ID": "771ef362-954c-46be-b96a-4f69af237f46", "DetectTime": "2024-05-21T12:29:13.124890+00:00", "EventTime": "2024-05-21T12:29:13.124910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLj7BW3sdMlsc28Hf7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9f4f0296-9677-40da-811f-b0f97abd9817", "DetectTime": "2024-05-21T12:29:13.135180+00:00", "EventTime": "2024-05-21T12:29:13.135198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAXgc63kOEf7QEy2j6"], "accumulated_threat_level": 5.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "0c2440fd-eb07-420e-bbad-7d2420794be6", "DetectTime": "2024-05-21T12:29:13.149313+00:00", "EventTime": "2024-05-21T12:29:13.149331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crkv4y3X0X6uxRuKrb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 48} +{"Format": "IDEA0", "ID": "122f9b35-30e1-43af-9c97-23a3aece0db4", "DetectTime": "2024-05-21T12:29:13.188275+00:00", "EventTime": "2024-05-21T12:29:13.188298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGncBNudxdAa3bycc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "dd5e261a-51df-4334-9034-0a75bfa5dde2", "DetectTime": "2024-05-21T12:29:13.220359+00:00", "EventTime": "2024-05-21T12:29:13.220380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLmcD2Dgfm927XFh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "fad2f45e-2194-4d36-9e51-bd6aa8051102", "DetectTime": "2024-05-21T12:29:13.473668+00:00", "EventTime": "2024-05-21T12:29:13.473687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUcaXt4fU04GnkhBh3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "db71bbf5-79be-4971-ba99-486acbf0c7ed", "DetectTime": "2024-05-21T12:29:13.789412+00:00", "EventTime": "2024-05-21T12:29:13.789431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtr9v4C5QsZGqB1V8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "a935534d-1bd3-43ab-8ca0-08ee2da625bf", "DetectTime": "2024-05-21T12:29:13.817733+00:00", "EventTime": "2024-05-21T12:29:13.817753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.140.64.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrzuwJzxswjr2AZd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "9d219025-5210-4d6c-a805-b021d34d68b5", "DetectTime": "2024-05-21T12:29:14.203598+00:00", "EventTime": "2024-05-21T12:29:14.203616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYq5m2vbfhBamj8B3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "78c8044e-2d59-4f08-a63e-f3e0e68c3b89", "DetectTime": "2024-05-21T12:29:14.233995+00:00", "EventTime": "2024-05-21T12:29:14.234016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.121.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ4duJ2V81ORA68PIa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "a6f27411-9d8f-471a-96ba-3e3022fb26fa", "DetectTime": "2024-05-21T12:29:14.311027+00:00", "EventTime": "2024-05-21T12:29:14.311046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0yvS2t4KEMXTJqS4"], "accumulated_threat_level": 9.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "a99d73b5-8e32-4d2f-a16b-11308be4ce88", "DetectTime": "2024-05-21T12:29:14.414348+00:00", "EventTime": "2024-05-21T12:29:14.414368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakXxb3fqxi10QLPKj"], "accumulated_threat_level": 10.4, "timewindow": 48} +{"Format": "IDEA0", "ID": "c434328c-3f50-43e4-b505-7d11ef60bd1d", "DetectTime": "2024-05-21T12:29:14.666594+00:00", "EventTime": "2024-05-21T12:29:14.666616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtjRoe9Lfdn0EPNt9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "14d20664-dc4d-4e47-aa83-478371162c36", "DetectTime": "2024-05-21T12:29:14.713091+00:00", "EventTime": "2024-05-21T12:29:14.713114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hqQhDcl3b2sKLkb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "0fb02a4e-58a9-4e18-b93b-8b57e2d726ce", "DetectTime": "2024-05-21T12:29:14.746978+00:00", "EventTime": "2024-05-21T12:29:14.746999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.4.205"]}], "Attach": [{"Content": "Connection to unknown destination port 14100/UDP destination IP 49.49.4.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SYnp4T6lLoOXU1Uc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 48} +{"Format": "IDEA0", "ID": "ab84ba9a-210d-4d43-9d74-11c080c2f331", "DetectTime": "2024-05-21T12:29:14.779529+00:00", "EventTime": "2024-05-21T12:29:14.779550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyNf92p04nt6jUIHi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "dc4a54e9-92c0-49ad-8331-b35e166c1cc1", "DetectTime": "2024-05-21T12:29:14.784886+00:00", "EventTime": "2024-05-21T12:29:14.784908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMlvif3lBMUSzIQvx"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "a61bfcee-f277-4dc7-9ac9-c2ea63ce6cbf", "DetectTime": "2024-05-21T12:29:14.821069+00:00", "EventTime": "2024-05-21T12:29:14.821088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csirx54qgqhU75kiq9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 48} +{"Format": "Json", "ID": "a61bfcee-f277-4dc7-9ac9-c2ea63ce6cbf", "DetectTime": "2024-05-21T12:29:14.821069+00:00", "EventTime": "2024-05-21T12:29:14.821088+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "1970-01-02T23:25:21.199641+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2024/05/21 12:29:14.962064)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 48, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e60f90de-cd9e-49e1-a3e6-744bd8f2038e", "DetectTime": "2024-05-21T12:29:14.972145+00:00", "EventTime": "2024-05-21T12:29:14.972163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ConbKc3bRjDvPqb7v1"], "accumulated_threat_level": 0.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e9b47229-d4c0-491d-bad3-bc8e4ac72055", "DetectTime": "2024-05-21T12:29:15.229970+00:00", "EventTime": "2024-05-21T12:29:15.229993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQnOMg4xJ5OLL7SHDg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "1b078171-4aff-4e77-8fba-f8f5ed5a5e3b", "DetectTime": "2024-05-21T12:29:15.308889+00:00", "EventTime": "2024-05-21T12:29:15.308911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CafHSg1HsOx8rPiFs8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "5b5d1430-cec1-44c5-bceb-1c8d0a542248", "DetectTime": "2024-05-21T12:29:15.387316+00:00", "EventTime": "2024-05-21T12:29:15.387337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNudvh2eB9xYe8mAg3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "214a62c7-1c5f-4c8e-b964-12394cc02213", "DetectTime": "2024-05-21T12:29:15.392136+00:00", "EventTime": "2024-05-21T12:29:15.392156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJG9C371ln3eYghk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "5e848def-81c8-40ec-9bb2-5de22420c6e1", "DetectTime": "2024-05-21T12:29:15.455155+00:00", "EventTime": "2024-05-21T12:29:15.455174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.144.13.22"]}], "Attach": [{"Content": "Connection to unknown destination port 18326/UDP destination IP 49.144.13.22. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClBQjE4rwvtCs5jdrd"], "accumulated_threat_level": 1.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "7b7452fc-3524-4bd0-9a60-785dc97702a3", "DetectTime": "2024-05-21T12:29:15.480594+00:00", "EventTime": "2024-05-21T12:29:15.480615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYE7O3amtfd9YUHm5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b752530b-5ef7-4776-984a-550106efd298", "DetectTime": "2024-05-21T12:29:15.510570+00:00", "EventTime": "2024-05-21T12:29:15.510589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZRM2n4qvt5oq9qsZ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "968ed8ad-5621-4a2f-916d-17f65e808e3a", "DetectTime": "2024-05-21T12:29:15.544486+00:00", "EventTime": "2024-05-21T12:29:15.544507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LVqH3MvOEg3p9heg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 48} +{"Format": "IDEA0", "ID": "0cba2400-a0a8-46bf-b607-bd339e419690", "DetectTime": "2024-05-21T12:29:15.552972+00:00", "EventTime": "2024-05-21T12:29:15.552997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBScCB4CLPKrruA6Qe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "c0f68155-71b5-45e7-a2d2-75a2982a6259", "DetectTime": "2024-05-21T12:29:15.585579+00:00", "EventTime": "2024-05-21T12:29:15.585600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoibv4v2NXdkn5Y37"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b26f76b0-d729-4042-bfa2-4974ce6ba608", "DetectTime": "2024-05-21T12:29:15.876372+00:00", "EventTime": "2024-05-21T12:29:15.876395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EJS12PlQZeCARBQl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "9fbee66b-610f-4809-be0a-41e632b98177", "DetectTime": "2024-05-21T12:29:15.881146+00:00", "EventTime": "2024-05-21T12:29:15.881165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMpEd4OvbfqfrhEok"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "82bedf08-d07c-459b-b5e7-760cee7f86dd", "DetectTime": "2024-05-21T12:29:15.885652+00:00", "EventTime": "2024-05-21T12:29:15.885670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkxPd2VOaqHRetOPa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "7c142719-0e07-4b41-b7a8-6db9b0dfcac2", "DetectTime": "2024-05-21T12:29:15.912296+00:00", "EventTime": "2024-05-21T12:29:15.912317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkz5TX70lYelsce2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b695cb2e-7ac0-424a-b15f-4e11f4343426", "DetectTime": "2024-05-21T12:29:15.935561+00:00", "EventTime": "2024-05-21T12:29:15.935580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjj2bMp0Pjc2ZeG"], "accumulated_threat_level": 3.2, "timewindow": 48} +{"Format": "IDEA0", "ID": "ed1179b9-aa4e-475e-aa7c-ea311f69fc7a", "DetectTime": "2024-05-21T12:29:15.985712+00:00", "EventTime": "2024-05-21T12:29:15.985733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn7cAo4F2t62t0jDmj"], "accumulated_threat_level": 4.0, "timewindow": 48} +{"Format": "IDEA0", "ID": "355a5b8e-aab9-46ff-8a11-8c6b637800e3", "DetectTime": "2024-05-21T12:29:16.011478+00:00", "EventTime": "2024-05-21T12:29:16.011499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caj3G3uGo1caesc6a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b1761262-7f6b-420a-aa31-ff3f9a4709ef", "DetectTime": "2024-05-21T12:29:16.037469+00:00", "EventTime": "2024-05-21T12:29:16.037492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA0yBT1gZe90S9ojZa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "d5f30857-5239-4ab7-815c-50881d1b70ce", "DetectTime": "2024-05-21T12:29:16.048987+00:00", "EventTime": "2024-05-21T12:29:16.049006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYkEE3CA8o8T4FoOh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "de2226e1-e3e0-4457-bbbc-5e92cdc1cba8", "DetectTime": "2024-05-21T12:29:16.109928+00:00", "EventTime": "2024-05-21T12:29:16.109948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vdI725HTWLUqY84c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "d6e6ea5c-1b75-43ce-9b5e-13ff72bd636e", "DetectTime": "2024-05-21T12:29:16.140955+00:00", "EventTime": "2024-05-21T12:29:16.140978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cax6Yz1dOXnP5PtYnh"], "accumulated_threat_level": 5.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "466e3a91-fe6d-4e11-9a04-65f8fafcf568", "DetectTime": "2024-05-21T12:29:16.163948+00:00", "EventTime": "2024-05-21T12:29:16.163968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbfEJd3MzrMxkzZNje"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "43f24a0b-a013-413a-8f6c-7d16fa7705d9", "DetectTime": "2024-05-21T12:29:16.208844+00:00", "EventTime": "2024-05-21T12:29:16.208861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqR5o3kPIWAOkzMjc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 48} +{"Format": "IDEA0", "ID": "4929dfaf-4b0c-4778-b1e1-293691c41163", "DetectTime": "2024-05-21T12:29:16.370199+00:00", "EventTime": "2024-05-21T12:29:16.370217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxUt03LwopPH067K1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "a0f4d19f-d046-4c73-821d-5a0acf6f045a", "DetectTime": "2024-05-21T12:29:16.395615+00:00", "EventTime": "2024-05-21T12:29:16.395635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCvBt4iOpYmxDwKq"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "a739a3dc-3ca7-4832-bc0b-3dc36911ee6a", "DetectTime": "2024-05-21T12:29:16.477819+00:00", "EventTime": "2024-05-21T12:29:16.477838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT0MhE2jPVIEa3hBAl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "50f61e58-6693-4bf6-b38f-89de3da0b641", "DetectTime": "2024-05-21T12:29:16.494676+00:00", "EventTime": "2024-05-21T12:29:16.494697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LTgZQUxQuTYgWP5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b5639279-cd1b-4cea-80a3-c43db1b78ef2", "DetectTime": "2024-05-21T12:29:16.531586+00:00", "EventTime": "2024-05-21T12:29:16.531607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdGCY1o8tE75h6f4l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "83cb9e79-4ef5-414b-8704-870e27481943", "DetectTime": "2024-05-21T12:29:16.578166+00:00", "EventTime": "2024-05-21T12:29:16.578189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLfaeD1nPHCln8wFyi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "8feecd7d-710c-4f99-bba6-397009e2bf4f", "DetectTime": "2024-05-21T12:29:16.589507+00:00", "EventTime": "2024-05-21T12:29:16.589525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.164.5.210"]}], "Attach": [{"Content": "Connection to unknown destination port 22806/UDP destination IP 85.164.5.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csra7R2jZ01FzmEe5a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "9d8b6617-cfbe-4ff2-94dd-f03b1d167724", "DetectTime": "2024-05-21T12:29:16.619643+00:00", "EventTime": "2024-05-21T12:29:16.619662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrYzl4mJrR0HV17De"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "00dabd59-3add-4d25-9a6e-90cfc8f4b1d4", "DetectTime": "2024-05-21T12:29:16.652143+00:00", "EventTime": "2024-05-21T12:29:16.652163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C78lbw3HkA02BinbXk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "70175751-22ec-47bc-98d5-2e0a441ada73", "DetectTime": "2024-05-21T12:29:16.687820+00:00", "EventTime": "2024-05-21T12:29:16.687841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXyjE30Uoh4YWg7r7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "baeba4fa-55cc-4737-a948-1a3660eaf22d", "DetectTime": "2024-05-21T12:29:16.718455+00:00", "EventTime": "2024-05-21T12:29:16.718473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm2Isf1oCnye48JHW2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "738307cc-cda1-411c-b694-2b3cfe884f36", "DetectTime": "2024-05-21T12:29:16.740543+00:00", "EventTime": "2024-05-21T12:29:16.740564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzJnF3RkYr1BXtlg9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "37b45a80-52cb-4687-9904-254cc3a9df6c", "DetectTime": "2024-05-21T12:29:16.762452+00:00", "EventTime": "2024-05-21T12:29:16.762473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nPtmhU5C78GrEi8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "a68fb5ee-d7a5-4e08-a558-441d27117ead", "DetectTime": "2024-05-21T12:29:16.822053+00:00", "EventTime": "2024-05-21T12:29:16.822071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.168.30.58"]}], "Attach": [{"Content": "Connection to unknown destination port 23479/UDP destination IP 122.168.30.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFYyLE4KKisdETrEDl"], "accumulated_threat_level": 9.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "ebfd087e-d780-44f8-8484-f0e227ffcdd6", "DetectTime": "2024-05-21T12:29:16.874621+00:00", "EventTime": "2024-05-21T12:29:16.874640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJgw03IjbqLkfZBD8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b5de61fa-0d07-475a-a769-032fe9dcd274", "DetectTime": "2024-05-21T12:29:17.139608+00:00", "EventTime": "2024-05-21T12:29:17.139626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcNz23CKM141IqHNg"], "accumulated_threat_level": 10.4, "timewindow": 48} +{"Format": "IDEA0", "ID": "70135ed2-f4f9-49f9-8782-1ba1562be188", "DetectTime": "2024-05-21T12:29:17.288675+00:00", "EventTime": "2024-05-21T12:29:17.288695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62A0guAS3gSI6tIi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 48} +{"Format": "IDEA0", "ID": "0defd705-b634-4d77-beb3-aff25fac8efb", "DetectTime": "2024-05-21T12:29:17.632824+00:00", "EventTime": "2024-05-21T12:29:17.632845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEdT3e2lowSgQoqprh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "cc1e0fb8-fee2-4370-81eb-677c86a88e09", "DetectTime": "2024-05-21T12:29:17.658585+00:00", "EventTime": "2024-05-21T12:29:17.658606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOnbN3RfuaBQTSZoc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "4887fcfb-46ea-49ad-ad27-ab16cfd2127f", "DetectTime": "2024-05-21T12:29:17.692042+00:00", "EventTime": "2024-05-21T12:29:17.692064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.183.130.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1pMu1IqWOY2t7E2g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "aefbac2f-e96d-45ab-ae67-8cbf0f6bf7c4", "DetectTime": "2024-05-21T12:29:18.085818+00:00", "EventTime": "2024-05-21T12:29:18.085838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RDCnzFglHFQ1OH3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 48} +{"Format": "Json", "ID": "aefbac2f-e96d-45ab-ae67-8cbf0f6bf7c4", "DetectTime": "2024-05-21T12:29:18.085818+00:00", "EventTime": "2024-05-21T12:29:18.085838+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-02T23:47:08.542814+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2024/05/21 12:29:18.484054)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 48, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a412af3e-6dc0-4612-bfa0-50f939da17cd", "DetectTime": "2024-05-21T12:29:18.487951+00:00", "EventTime": "2024-05-21T12:29:18.487969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsEs601svJN0F2u7xi", "CsHrQJ1DD5pv18CTJ5", "COTFF21FdStjTw4fyi", "CMP6yA4vhaLLcKOozd"], "accumulated_threat_level": 0.5, "timewindow": 48} +{"Format": "IDEA0", "ID": "d73492d3-4820-44fb-96d3-957ce36ccf30", "DetectTime": "2024-05-21T12:29:18.498684+00:00", "EventTime": "2024-05-21T12:29:18.498703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.97.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPhap4Y5GpPYYa3W2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "90bf9651-eaee-4e01-bf21-f44aba961162", "DetectTime": "2024-05-21T12:29:18.508121+00:00", "EventTime": "2024-05-21T12:29:18.508140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWR7PJ28E6gBmyMGph"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "82ac85f2-42f5-4ead-8f51-ded0d4e2f612", "DetectTime": "2024-05-21T12:29:18.610104+00:00", "EventTime": "2024-05-21T12:29:18.610126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrE3mIZhnUjZsGTc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "2e8375b9-f7f6-4bc2-bfba-ee3b8d070024", "DetectTime": "2024-05-21T12:29:18.714143+00:00", "EventTime": "2024-05-21T12:29:18.714162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH83XL3dInlHR0Nhnf"], "accumulated_threat_level": 1.3, "timewindow": 48} +{"Format": "IDEA0", "ID": "ea44eceb-f5b5-4e87-86e3-817eede84478", "DetectTime": "2024-05-21T12:29:18.756689+00:00", "EventTime": "2024-05-21T12:29:18.756709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUugac1WlMCas5p5J5"], "accumulated_threat_level": 2.1, "timewindow": 48} +{"Format": "IDEA0", "ID": "0bb93726-5bc4-4f2b-860c-087497042809", "DetectTime": "2024-05-21T12:29:18.781096+00:00", "EventTime": "2024-05-21T12:29:18.781116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cry6AK3uSTHI3Wxlha"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "3aea287c-fe7a-47bd-bf3d-5baa2d97959f", "DetectTime": "2024-05-21T12:29:18.809452+00:00", "EventTime": "2024-05-21T12:29:18.809474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDHj4WdakHZtgeUh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "42afa9f9-727b-493c-a43c-3d61da1f7ee2", "DetectTime": "2024-05-21T12:29:18.837759+00:00", "EventTime": "2024-05-21T12:29:18.837782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmQ0k4LKlRwmQ9rm4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "eea18bdb-6d84-498d-b5e7-4631a8266974", "DetectTime": "2024-05-21T12:29:19.014871+00:00", "EventTime": "2024-05-21T12:29:19.014890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC5KRJ39nYfXWqQxg2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 48} +{"Format": "IDEA0", "ID": "01f550a2-b595-45c7-b4d9-1b8f82bee96d", "DetectTime": "2024-05-21T12:29:19.046098+00:00", "EventTime": "2024-05-21T12:29:19.046116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcouPV3S4SJdb0Lu16"], "accumulated_threat_level": 3.7, "timewindow": 48} +{"Format": "IDEA0", "ID": "3ede9427-b7e0-46dc-805a-587b4455ad60", "DetectTime": "2024-05-21T12:29:19.081481+00:00", "EventTime": "2024-05-21T12:29:19.081503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjqkxIpfDo8lnpIj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "8a4c5b06-bdc8-4212-9fa8-db404d1043d8", "DetectTime": "2024-05-21T12:29:19.106736+00:00", "EventTime": "2024-05-21T12:29:19.106756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwdpgr1aLxqeG9T6c1"], "accumulated_threat_level": 4.5, "timewindow": 48} +{"Format": "IDEA0", "ID": "e6e65bb3-374c-4480-9bbc-7e7d1bba44d6", "DetectTime": "2024-05-21T12:29:19.138431+00:00", "EventTime": "2024-05-21T12:29:19.138450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgyJcC1jcAtLtmUMFb"], "accumulated_threat_level": 5.3, "timewindow": 48} +{"Format": "IDEA0", "ID": "1f42142c-8958-4250-af83-b49cb1db4d38", "DetectTime": "2024-05-21T12:29:19.177153+00:00", "EventTime": "2024-05-21T12:29:19.177170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY81oc3smmkIXExyF8"], "accumulated_threat_level": 6.1, "timewindow": 48} +{"Format": "IDEA0", "ID": "a9a94fc9-a409-400c-9900-6190ed597d68", "DetectTime": "2024-05-21T12:29:19.199099+00:00", "EventTime": "2024-05-21T12:29:19.199123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkElN03pHjyagSJA93"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "2d26f8ca-a562-4100-b439-44673bf64794", "DetectTime": "2024-05-21T12:29:19.472390+00:00", "EventTime": "2024-05-21T12:29:19.472413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDB5ySax5GvQmZWY8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 48} +{"Format": "IDEA0", "ID": "1ffa341e-af80-4899-a1cb-b8b5c9d64911", "DetectTime": "2024-05-21T12:29:19.478173+00:00", "EventTime": "2024-05-21T12:29:19.478192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOrit26sbUDFetaC4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "d7a3cd20-0917-48cd-bcdf-72a289fce87c", "DetectTime": "2024-05-21T12:29:19.482919+00:00", "EventTime": "2024-05-21T12:29:19.482939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84Be61MuZudZtbGub"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "46d90638-f5c6-40bd-8fc1-cb48fd01ceea", "DetectTime": "2024-05-21T12:29:19.487623+00:00", "EventTime": "2024-05-21T12:29:19.487642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yaso1LvDnTRflp42"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b778c71a-6d3d-4a42-a978-688e2082edfa", "DetectTime": "2024-05-21T12:29:19.568175+00:00", "EventTime": "2024-05-21T12:29:19.568196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctadaj1RJk35llBk6j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "3445a74c-4c29-4b23-afea-c0e5ef3f0f34", "DetectTime": "2024-05-21T12:29:19.572981+00:00", "EventTime": "2024-05-21T12:29:19.572999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CayykovaUPFGbj1me"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "0771cc89-7e19-49a3-8ac4-2aa416f59e6b", "DetectTime": "2024-05-21T12:29:19.630294+00:00", "EventTime": "2024-05-21T12:29:19.630313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2r4y3HsVFeeOvH86"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "b9ea5067-076b-4a19-a70b-d39336af9ff2", "DetectTime": "2024-05-21T12:29:19.655406+00:00", "EventTime": "2024-05-21T12:29:19.655426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Y7UI3ZrUXRVbDtC7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "bf0894b0-43a1-4a08-84f4-d71959eaa5a6", "DetectTime": "2024-05-21T12:29:19.665168+00:00", "EventTime": "2024-05-21T12:29:19.665188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jjqI3XrbwlRFg8ug"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "047b412a-0202-482f-8c2c-4fa5ff3961ec", "DetectTime": "2024-05-21T12:29:19.676246+00:00", "EventTime": "2024-05-21T12:29:19.676265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhC1d2nWVgvxcGNr8"], "accumulated_threat_level": 7.699999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "d326acae-a3ad-484f-92a2-ca2da13d0b34", "DetectTime": "2024-05-21T12:29:19.722292+00:00", "EventTime": "2024-05-21T12:29:19.722314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaszAB16pBoHal6PBi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "74f39ea4-b0c0-4f94-b4bb-5181cda8b214", "DetectTime": "2024-05-21T12:29:19.761828+00:00", "EventTime": "2024-05-21T12:29:19.761848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbUR1f4ph04mH7Q4k2"], "accumulated_threat_level": 8.5, "timewindow": 48} +{"Format": "IDEA0", "ID": "79c956a7-9e99-4940-913c-7087e5d4bcec", "DetectTime": "2024-05-21T12:29:19.793383+00:00", "EventTime": "2024-05-21T12:29:19.793403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnxy61DZK6k7ikZMe"], "accumulated_threat_level": 9.3, "timewindow": 48} +{"Format": "IDEA0", "ID": "649f6880-d834-4770-b0b8-8ea23726f913", "DetectTime": "2024-05-21T12:29:19.828168+00:00", "EventTime": "2024-05-21T12:29:19.828189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIsrXh2yljDSW2ob46"], "accumulated_threat_level": 10.100000000000001, "timewindow": 48} +{"Format": "IDEA0", "ID": "cccdf063-b9be-43da-bc91-5e954993942c", "DetectTime": "2024-05-21T12:29:19.865826+00:00", "EventTime": "2024-05-21T12:29:19.865843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7yx52hW6CR014MWa"], "accumulated_threat_level": 10.900000000000002, "timewindow": 48} +{"Format": "IDEA0", "ID": "4f14bc8c-fd99-4a90-8101-bcfa7cb0f7ab", "DetectTime": "2024-05-21T12:29:19.876812+00:00", "EventTime": "2024-05-21T12:29:19.876830+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.220.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbjvoo1nys5XkAiFKc"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "c3aae0d6-a5b1-4f91-a24d-2f94b4771273", "DetectTime": "2024-05-21T12:29:19.888084+00:00", "EventTime": "2024-05-21T12:29:19.888102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.220.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.220.199 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbjvoo1nys5XkAiFKc"], "accumulated_threat_level": 10.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "af52e403-4976-4fbe-9014-7736c6bede45", "DetectTime": "2024-05-21T12:29:19.899453+00:00", "EventTime": "2024-05-21T12:29:19.899473+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.191.37.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXZ0I3IkBWukgiBd6"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "83ce8e7d-67b1-480a-b5d0-d1cc95246d00", "DetectTime": "2024-05-21T12:29:19.910137+00:00", "EventTime": "2024-05-21T12:29:19.910156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlLBClmZxeZ2YxR4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 48} +{"Format": "IDEA0", "ID": "7ac5fd37-6652-40f8-b6c0-c6b1950f5bb0", "DetectTime": "2024-05-21T12:29:19.954832+00:00", "EventTime": "2024-05-21T12:29:19.954854+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.191.37.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.191.37.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXZ0I3IkBWukgiBd6"], "accumulated_threat_level": 11.1, "timewindow": 17} +{"Format": "IDEA0", "ID": "bc0c4e24-b9a1-42a7-ae89-adb3c6740ace", "DetectTime": "2024-05-21T12:29:19.971674+00:00", "EventTime": "2024-05-21T12:29:19.971693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtFeP3gvtiZx4gli9"], "accumulated_threat_level": 12.500000000000004, "timewindow": 48} +{"Format": "Json", "ID": "bc0c4e24-b9a1-42a7-ae89-adb3c6740ace", "DetectTime": "2024-05-21T12:29:19.971674+00:00", "EventTime": "2024-05-21T12:29:19.971693+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-02T23:59:23.423436+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2024/05/21 12:29:20.218924)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 48, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "d619be97-8f37-4388-a134-04c68768cc4b", "DetectTime": "2024-05-21T12:29:20.222765+00:00", "EventTime": "2024-05-21T12:29:20.222784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C80aUg3ZeSiISijR74"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "1be94189-b486-4e26-922d-2a37694e4504", "DetectTime": "2024-05-21T12:29:20.227068+00:00", "EventTime": "2024-05-21T12:29:20.227086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71J9g32shFp7c1Smj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "60a057c5-a2dc-4f74-bca1-e59e96b1410a", "DetectTime": "2024-05-21T12:29:20.231397+00:00", "EventTime": "2024-05-21T12:29:20.231416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2j7PR33IPlDhjWTp5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "337275ee-7254-4b60-b8c6-019dcc96fcfb", "DetectTime": "2024-05-21T12:29:20.248285+00:00", "EventTime": "2024-05-21T12:29:20.248304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIePd73uzH2FnUo6Ei"], "accumulated_threat_level": 0.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1d147b51-4e78-4250-b668-5b6df8fded01", "DetectTime": "2024-05-21T12:29:20.254397+00:00", "EventTime": "2024-05-21T12:29:20.254448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqCEq2TkZydYG1W9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "6e845719-3d58-4a8e-80ce-91daa4ade603", "DetectTime": "2024-05-21T12:29:20.375932+00:00", "EventTime": "2024-05-21T12:29:20.375951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKrBs4qi9h0eah8d3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "3b2dcb8b-8d3b-48af-8483-e3baee063722", "DetectTime": "2024-05-21T12:29:20.385653+00:00", "EventTime": "2024-05-21T12:29:20.385673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCNgoL1gzkNpAaLUk1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "e9607ca1-1325-4794-aa5e-5f153746b35e", "DetectTime": "2024-05-21T12:29:20.390377+00:00", "EventTime": "2024-05-21T12:29:20.390397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDpUf4ffK5CP4WfWi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "8867693f-dc0d-4b32-a727-b4dbeaae7737", "DetectTime": "2024-05-21T12:29:20.427574+00:00", "EventTime": "2024-05-21T12:29:20.427594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWrqU1wr2XEUU9HS7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "a970dccb-6bd6-428e-be3b-33e70d0d57c0", "DetectTime": "2024-05-21T12:29:20.432199+00:00", "EventTime": "2024-05-21T12:29:20.432217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bzeK3QNzdm9Biv11"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "722b0065-1d0e-4073-89f3-3ce3dccf75e1", "DetectTime": "2024-05-21T12:29:20.468052+00:00", "EventTime": "2024-05-21T12:29:20.468072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjQdy2CCbROh5wfsb"], "accumulated_threat_level": 1.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "4e0dc04e-1538-478e-a6d7-4dde0575d643", "DetectTime": "2024-05-21T12:29:20.489115+00:00", "EventTime": "2024-05-21T12:29:20.489140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWElVV3FjIJ2aRJ4Ak"], "accumulated_threat_level": 8.799999999999999, "timewindow": 46} +{"Format": "IDEA0", "ID": "7b7ecb95-52cf-4856-989a-f24d311c994a", "DetectTime": "2024-05-21T12:29:20.610858+00:00", "EventTime": "2024-05-21T12:29:20.610880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNuofNbyOlaTu6Ena"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "a37dca20-a118-4155-9687-2bf3da90f99a", "DetectTime": "2024-05-21T12:29:20.615972+00:00", "EventTime": "2024-05-21T12:29:20.615992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmciO3jYemjV5n7u5"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "93041be0-7170-4ee5-972a-469073d7611c", "DetectTime": "2024-05-21T12:29:20.632972+00:00", "EventTime": "2024-05-21T12:29:20.632995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcfL6e48oG2Fvy2v0i"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "5a48e14e-3c5b-490d-b076-0976216e3d94", "DetectTime": "2024-05-21T12:29:20.650838+00:00", "EventTime": "2024-05-21T12:29:20.650859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGvTYW2mQAU0uM2QI"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "20ed7f80-4d9c-49a0-9685-04c32ef2aac6", "DetectTime": "2024-05-21T12:29:20.666551+00:00", "EventTime": "2024-05-21T12:29:20.666571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9HSjO3UCaZLlcSiv"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 48} +{"Format": "IDEA0", "ID": "53d1cae8-fef7-47fd-88b0-d4c5b38ee0bf", "DetectTime": "2024-05-21T12:29:20.742772+00:00", "EventTime": "2024-05-21T12:29:20.742789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfLc3W24Knt8aDCb92"], "accumulated_threat_level": 3.2, "timewindow": 48} +{"Format": "IDEA0", "ID": "007c741f-1a41-4d3a-8052-bc16a2038ed4", "DetectTime": "2024-05-21T12:29:20.762370+00:00", "EventTime": "2024-05-21T12:29:20.762391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMRUd3cv1QKLg8LCj"], "accumulated_threat_level": 4.0, "timewindow": 48} +{"Format": "IDEA0", "ID": "c4264e97-61e8-46f1-8b17-294d890ff6bd", "DetectTime": "2024-05-21T12:29:20.789550+00:00", "EventTime": "2024-05-21T12:29:20.789571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEhOv1TKHaXbQXJRh"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "12b9a30a-412d-4d96-ad6e-7d867c940046", "DetectTime": "2024-05-21T12:29:20.813165+00:00", "EventTime": "2024-05-21T12:29:20.813186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTzObdwE9O4BB3J7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e0298f07-f625-43a8-b6f4-778524dfe586", "DetectTime": "2024-05-21T12:29:20.832943+00:00", "EventTime": "2024-05-21T12:29:20.832962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY7XH3pINmR8INi86"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "83c11775-1ce8-4c43-891d-a9a7b5db9bbf", "DetectTime": "2024-05-21T12:29:20.866894+00:00", "EventTime": "2024-05-21T12:29:20.866912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoSotcVjJkkg39Nrd"], "accumulated_threat_level": 5.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "dfcf124d-660b-4fb0-a851-3a6b51af5d3b", "DetectTime": "2024-05-21T12:29:20.885033+00:00", "EventTime": "2024-05-21T12:29:20.885055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqBMi3DGw87HV2NIh"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "909e1ae1-fe2c-4166-8a0f-b0fa40520a51", "DetectTime": "2024-05-21T12:29:20.912510+00:00", "EventTime": "2024-05-21T12:29:20.912531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbESD3WMDnZBcgyfl"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "851b37c5-d612-480c-8e9b-72edd20e5596", "DetectTime": "2024-05-21T12:29:20.942781+00:00", "EventTime": "2024-05-21T12:29:20.942813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVya01kK4OwpKT28f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 48} +{"Format": "IDEA0", "ID": "3e9f8451-9bf8-4a9a-ac4d-8a54167ae59d", "DetectTime": "2024-05-21T12:29:21.157142+00:00", "EventTime": "2024-05-21T12:29:21.157162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdn0l12UdHwL4PFsuh"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "b2d6066d-43fb-43ea-b7ec-7fe2bcb275c5", "DetectTime": "2024-05-21T12:29:21.170924+00:00", "EventTime": "2024-05-21T12:29:21.170944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMjmtr3b9foMORAocb"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "be6f3267-dc3d-4ce0-80f8-66ac97a699d2", "DetectTime": "2024-05-21T12:29:21.180651+00:00", "EventTime": "2024-05-21T12:29:21.180669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWVjb3CSbUmcVAWq4"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "6229c30a-f59f-49e1-adc7-1b1adc792fe3", "DetectTime": "2024-05-21T12:29:21.188090+00:00", "EventTime": "2024-05-21T12:29:21.188109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIivV2XU74IuzQws2"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "7c871836-46d8-45e2-82c4-aaedeff7a5ca", "DetectTime": "2024-05-21T12:29:21.246369+00:00", "EventTime": "2024-05-21T12:29:21.246394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxE01E136bO8BEPtNf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "29c26de5-4465-4693-8514-e76cb399ee6d", "DetectTime": "2024-05-21T12:29:21.282295+00:00", "EventTime": "2024-05-21T12:29:21.282315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTffVp50bI2JTcH7k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "74a820e1-6a38-462f-8bf8-e785ed6ee680", "DetectTime": "2024-05-21T12:29:21.313783+00:00", "EventTime": "2024-05-21T12:29:21.313801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72yLl1IJKGhKt9Nld"], "accumulated_threat_level": 8.799999999999999, "timewindow": 48} +{"Format": "IDEA0", "ID": "f46e5279-9509-4582-b15a-8c27c2b6c4e2", "DetectTime": "2024-05-21T12:29:21.337135+00:00", "EventTime": "2024-05-21T12:29:21.337157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClHJ8W1QzjW7pjD9y8"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "caaf541a-c33c-4a43-a371-223172da6eef", "DetectTime": "2024-05-21T12:29:21.364854+00:00", "EventTime": "2024-05-21T12:29:21.364872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFYYFGcCCEHqfpClk"], "accumulated_threat_level": 9.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "0b81bd46-2a37-4e27-ad18-33b782796f43", "DetectTime": "2024-05-21T12:29:21.388371+00:00", "EventTime": "2024-05-21T12:29:21.388393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfhxdk3BGC0Y4hZ9hh"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "0a8872b6-221c-428c-9be6-828867008556", "DetectTime": "2024-05-21T12:29:21.463149+00:00", "EventTime": "2024-05-21T12:29:21.463168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36Lto2pgrjPFCZH62"], "accumulated_threat_level": 10.4, "timewindow": 48} +{"Format": "IDEA0", "ID": "92d289af-31be-406c-b346-7a7fa36d6d78", "DetectTime": "2024-05-21T12:29:21.480600+00:00", "EventTime": "2024-05-21T12:29:21.480621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcFcvi2cyVZ1YwDkyi"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "41303959-36ef-4909-894e-b9f941c56d4c", "DetectTime": "2024-05-21T12:29:21.500607+00:00", "EventTime": "2024-05-21T12:29:21.500628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwaSj38BRnn66fJ7f"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "6fe3336d-668e-47d2-9c12-7bb560f6175a", "DetectTime": "2024-05-21T12:29:21.527819+00:00", "EventTime": "2024-05-21T12:29:21.527840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFUfbmvOcppkLZUi6"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "9a700ea1-03d3-44a4-839f-028dad7a257b", "DetectTime": "2024-05-21T12:29:21.567429+00:00", "EventTime": "2024-05-21T12:29:21.567451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCcUJ8b6IJDNkMYel"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "94a8d18d-d6a1-4f46-9eb1-f0d90bbab437", "DetectTime": "2024-05-21T12:29:21.572402+00:00", "EventTime": "2024-05-21T12:29:21.572421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDUBWW3srlVqEcZBrl"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "25ee8c68-8100-4920-85b4-421f49ae384c", "DetectTime": "2024-05-21T12:29:21.584181+00:00", "EventTime": "2024-05-21T12:29:21.584201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEKrc1NtyLKPka4E5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 48} +{"Format": "IDEA0", "ID": "0e114efe-1acb-415e-ad0b-a18ac9428251", "DetectTime": "2024-05-21T12:29:21.641562+00:00", "EventTime": "2024-05-21T12:29:21.641581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuhU2a2uLtAcYIfJr9"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "20f4ccfa-7b22-4c9a-bcbe-fcdcc46916e4", "DetectTime": "2024-05-21T12:29:21.694396+00:00", "EventTime": "2024-05-21T12:29:21.694427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1BGqG1wPkk7sdHgR"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "9d465430-881b-4f25-a1bf-34c314e06573", "DetectTime": "2024-05-21T12:29:21.718436+00:00", "EventTime": "2024-05-21T12:29:21.718455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymxQGXYlcWgEsckj"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "0e5e52ca-4f45-4485-b1f8-2f24078ef7eb", "DetectTime": "2024-05-21T12:29:21.723199+00:00", "EventTime": "2024-05-21T12:29:21.723219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUjEYTiQ76PMl6Mq7"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "d37434d6-f930-44d5-8d1a-6a2149b35040", "DetectTime": "2024-05-21T12:29:22.013766+00:00", "EventTime": "2024-05-21T12:29:22.013797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjSudrNabRrR1Xrg1"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "b6cbb474-23db-4054-b2c5-caa4c6d888b1", "DetectTime": "2024-05-21T12:29:22.019785+00:00", "EventTime": "2024-05-21T12:29:22.019806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cze1WR3NAegkYKfEP5"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "3ec71876-e928-44cb-96e8-dbbf9a88bd5e", "DetectTime": "2024-05-21T12:29:22.024713+00:00", "EventTime": "2024-05-21T12:29:22.024732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswTTQ3SjXwJkoHiKf"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "7ccb8f9c-a49a-4fdf-a0da-a2f8d80e76bd", "DetectTime": "2024-05-21T12:29:22.029172+00:00", "EventTime": "2024-05-21T12:29:22.029190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdUsP2zhHjkXm5Rb"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "8b7ee4b3-0903-4d5a-b293-bbaf84623057", "DetectTime": "2024-05-21T12:29:22.033793+00:00", "EventTime": "2024-05-21T12:29:22.033813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWi7v3MG5wOulFtTe"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "73f97368-fc76-4fee-b0d6-0349b7bca67c", "DetectTime": "2024-05-21T12:29:22.169166+00:00", "EventTime": "2024-05-21T12:29:22.169184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6lCLh2WPNeyILR4m3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 48} +{"Format": "Json", "ID": "73f97368-fc76-4fee-b0d6-0349b7bca67c", "DetectTime": "2024-05-21T12:29:22.169166+00:00", "EventTime": "2024-05-21T12:29:22.169184+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "1970-01-03T00:00:04.038088+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 48. (real time 2024/05/21 12:29:22.399105)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 48, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4c0b0c32-eb67-46da-a6f3-45bd6fcb3c4c", "DetectTime": "2024-05-21T12:29:22.410657+00:00", "EventTime": "2024-05-21T12:29:22.410679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKxhE1SuLJHIAwFzk"], "accumulated_threat_level": 0.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "3c3336eb-28c6-43f6-861a-bf34e15db2b8", "DetectTime": "2024-05-21T12:29:22.422360+00:00", "EventTime": "2024-05-21T12:29:22.422379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDO81H3dDsj6rsgMsh"], "accumulated_threat_level": 1.6, "timewindow": 48} +{"Format": "IDEA0", "ID": "783e3619-f6d1-4e80-8868-19dd954ba82c", "DetectTime": "2024-05-21T12:29:22.432942+00:00", "EventTime": "2024-05-21T12:29:22.432961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41n379Pqo8HXy9jg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 48} +{"Format": "IDEA0", "ID": "39f58af8-15a1-4716-ad03-08596f7af52f", "DetectTime": "2024-05-21T12:29:22.453006+00:00", "EventTime": "2024-05-21T12:29:22.453026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgAEx1i3sI5TkjuVf"], "accumulated_threat_level": 3.2, "timewindow": 48} +{"Format": "IDEA0", "ID": "12310eda-9e0d-41e3-abcc-ecb2a83488ed", "DetectTime": "2024-05-21T12:29:22.457215+00:00", "EventTime": "2024-05-21T12:29:22.457232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6d8RrWYYCIopYKb", "CiAgaC4GlsBQWyA4ad", "CAcBJ0312bWfr1rGhe", "CLDq3h1d1eQi7JUgkc"], "accumulated_threat_level": 0.5, "timewindow": 49} +{"Format": "IDEA0", "ID": "9ff722b4-23af-40f7-840d-8ea3b2f89c05", "DetectTime": "2024-05-21T12:29:22.475710+00:00", "EventTime": "2024-05-21T12:29:22.475729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6t3np1eDX6Tb4y3K3"], "accumulated_threat_level": 4.0, "timewindow": 48} +{"Format": "IDEA0", "ID": "526f2bfd-db89-44f8-843f-377417dfec03", "DetectTime": "2024-05-21T12:29:22.486321+00:00", "EventTime": "2024-05-21T12:29:22.486340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLDhi3bsbPta2ab27"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "efe8fbda-4c35-4049-aa00-d2a62bab3810", "DetectTime": "2024-05-21T12:29:22.497312+00:00", "EventTime": "2024-05-21T12:29:22.497330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQtm5V2KqMwufLADE9"], "accumulated_threat_level": 1.3, "timewindow": 49} +{"Format": "IDEA0", "ID": "843dedfb-b9bb-4109-8ac6-7a30f3499014", "DetectTime": "2024-05-21T12:29:22.508560+00:00", "EventTime": "2024-05-21T12:29:22.508579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ICsv150lgaWnITh8"], "accumulated_threat_level": 2.1, "timewindow": 49} +{"Format": "IDEA0", "ID": "43a692b1-3f4a-4bf4-a85c-9f61ad20df15", "DetectTime": "2024-05-21T12:29:22.524319+00:00", "EventTime": "2024-05-21T12:29:22.524342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJsDdk6HHwH5qYBnf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 49} +{"Format": "IDEA0", "ID": "e65637c1-bdd1-4253-9f8a-b0fe74ca9f39", "DetectTime": "2024-05-21T12:29:22.606792+00:00", "EventTime": "2024-05-21T12:29:22.606811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74Wqh3kz51cV703G9"], "accumulated_threat_level": 3.7, "timewindow": 49} +{"Format": "IDEA0", "ID": "d497f896-00bf-4d65-a1f5-6258d1566082", "DetectTime": "2024-05-21T12:29:22.611901+00:00", "EventTime": "2024-05-21T12:29:22.611919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3mN32zbThicFJaG8"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "720cc39e-5d7b-4619-9a2c-a79f321c61b4", "DetectTime": "2024-05-21T12:29:22.798567+00:00", "EventTime": "2024-05-21T12:29:22.798585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.160.95.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0dwO1Y1qmam1Usi8"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "c4e5dd0f-1eeb-4689-8c22-7a44ec3b260a", "DetectTime": "2024-05-21T12:29:22.909563+00:00", "EventTime": "2024-05-21T12:29:22.909585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.108.28.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfCXCd1aZaTjT29pIc"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "cd71f80a-b95a-44ed-8069-eb8824328aaa", "DetectTime": "2024-05-21T12:29:22.922306+00:00", "EventTime": "2024-05-21T12:29:22.922326+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.108.28.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.108.28.135 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfCXCd1aZaTjT29pIc"], "accumulated_threat_level": 11.6, "timewindow": 17} +{"Format": "IDEA0", "ID": "7a35476c-badd-40c8-acdc-77058baed42e", "DetectTime": "2024-05-21T12:29:23.161682+00:00", "EventTime": "2024-05-21T12:29:23.161704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbvlaK1hDOHhlzcFm3"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "cdca9b9c-a9dc-4a59-bfa1-0a56dfe35250", "DetectTime": "2024-05-21T12:29:23.403382+00:00", "EventTime": "2024-05-21T12:29:23.403404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdxK12einWXDP1C4f"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "db22d4f5-21e4-4431-95b2-659a976ec6c8", "DetectTime": "2024-05-21T12:29:23.432655+00:00", "EventTime": "2024-05-21T12:29:23.432677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8Shi4yc7JamEwoc5"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "2c19ad1e-9198-4d2e-afc9-d86c885aaef6", "DetectTime": "2024-05-21T12:29:23.463857+00:00", "EventTime": "2024-05-21T12:29:23.463880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLQ2G2GXeDdy7DUb9"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "ff4d89a8-dcea-4538-b109-692aaef1b438", "DetectTime": "2024-05-21T12:29:23.496937+00:00", "EventTime": "2024-05-21T12:29:23.496957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqk4pARiSSsveJb4"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "4368d251-3715-4a66-9f76-b77c09b5c7b0", "DetectTime": "2024-05-21T12:29:23.670071+00:00", "EventTime": "2024-05-21T12:29:23.670092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COR0Md1uOgnP1lFgC3"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "6f2b399a-6e85-4a6b-a346-bbcb084a5f01", "DetectTime": "2024-05-21T12:29:23.682085+00:00", "EventTime": "2024-05-21T12:29:23.682108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrRyRy8J37x0A70Ye", "CF1kKh2vGtRtHZveDh", "CngcB51Botqcm58nGb", "Cyxid01ZZUcXgbZnzd"], "accumulated_threat_level": 4.2, "timewindow": 49} +{"Format": "IDEA0", "ID": "95304cfb-79b4-4971-9c45-542800b95e1a", "DetectTime": "2024-05-21T12:29:23.758880+00:00", "EventTime": "2024-05-21T12:29:23.758899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcZ9SI2qplFr0zSg"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "47947271-c50f-421d-8209-97de25d711c5", "DetectTime": "2024-05-21T12:29:23.780262+00:00", "EventTime": "2024-05-21T12:29:23.780280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyKEj11JVWxc22rO8"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "a7419f93-79ba-43a1-aadb-b095ec5b0363", "DetectTime": "2024-05-21T12:29:23.813111+00:00", "EventTime": "2024-05-21T12:29:23.813130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5RfW3azVY1rCksp1"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "f82a47c4-0c49-4637-aaba-49ce90775b59", "DetectTime": "2024-05-21T12:29:23.841420+00:00", "EventTime": "2024-05-21T12:29:23.841440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUePPo1x1JRyKCp6kd"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "61c3f30e-46d0-4c2d-a83e-a4be09916cb5", "DetectTime": "2024-05-21T12:29:23.926427+00:00", "EventTime": "2024-05-21T12:29:23.926446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNAvQ3WC1QyGpJYDj"], "accumulated_threat_level": 5.0, "timewindow": 49} +{"Format": "IDEA0", "ID": "bf25bcbf-cad3-4455-8be0-084fa6b4b503", "DetectTime": "2024-05-21T12:29:23.969976+00:00", "EventTime": "2024-05-21T12:29:23.969996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEloSgHcyIKxPENz8"], "accumulated_threat_level": 5.8, "timewindow": 49} +{"Format": "IDEA0", "ID": "9bdeb4f6-75bb-4dc6-a3b2-286b1ec58404", "DetectTime": "2024-05-21T12:29:24.121624+00:00", "EventTime": "2024-05-21T12:29:24.121645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA4ZFWWqerhSWybi"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "1acde526-149b-47cc-af54-a757553391ea", "DetectTime": "2024-05-21T12:29:24.170389+00:00", "EventTime": "2024-05-21T12:29:24.170424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlkryus0qOdSApC2"], "accumulated_threat_level": 6.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "0ea0a9ef-20cc-4cc4-88d5-899ae620e2d4", "DetectTime": "2024-05-21T12:29:24.279750+00:00", "EventTime": "2024-05-21T12:29:24.279769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdby6t1DDhQhjmNcs4"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "c5eb8811-c7fb-4ceb-a864-7a266a184f6c", "DetectTime": "2024-05-21T12:29:24.355512+00:00", "EventTime": "2024-05-21T12:29:24.355536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeCUr4JLZm6xMoIYa"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 49} +{"Format": "IDEA0", "ID": "93a9505b-3efc-461b-96c7-ccb8c7a41848", "DetectTime": "2024-05-21T12:29:24.400807+00:00", "EventTime": "2024-05-21T12:29:24.400825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVceOpBzqlfaLuE4h"], "accumulated_threat_level": 8.2, "timewindow": 49} +{"Format": "IDEA0", "ID": "23fbd661-ff9f-4003-89d8-d45dfea48687", "DetectTime": "2024-05-21T12:29:24.435383+00:00", "EventTime": "2024-05-21T12:29:24.435404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZAoFRCiFGP7tqCl"], "accumulated_threat_level": 9.0, "timewindow": 49} +{"Format": "IDEA0", "ID": "6bfa79c3-4fa9-4249-81bf-d3ae818b3927", "DetectTime": "2024-05-21T12:29:24.467659+00:00", "EventTime": "2024-05-21T12:29:24.467677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Tct11XA0svCuWxe7"], "accumulated_threat_level": 9.8, "timewindow": 49} +{"Format": "IDEA0", "ID": "1d003815-164c-4e03-ba18-e04c9ec1eefd", "DetectTime": "2024-05-21T12:29:24.502596+00:00", "EventTime": "2024-05-21T12:29:24.502617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMFsp2leESsFJQ9Ad"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "13652547-43c1-49e2-b52b-f35bb070784d", "DetectTime": "2024-05-21T12:29:24.528334+00:00", "EventTime": "2024-05-21T12:29:24.528352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCggnbnsHcAdRy4b"], "accumulated_threat_level": 10.600000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "aa181f5e-05bd-41b8-adff-25a7c748f413", "DetectTime": "2024-05-21T12:29:24.560863+00:00", "EventTime": "2024-05-21T12:29:24.560882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQWnmHVO4xWfc1ij"], "accumulated_threat_level": 11.400000000000002, "timewindow": 49} +{"Format": "IDEA0", "ID": "900e0193-0808-4542-a936-95a9afa19313", "DetectTime": "2024-05-21T12:29:24.632434+00:00", "EventTime": "2024-05-21T12:29:24.632453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmF9K3yzN5KJf7XIe"], "accumulated_threat_level": 12.200000000000003, "timewindow": 49} +{"Format": "Json", "ID": "900e0193-0808-4542-a936-95a9afa19313", "DetectTime": "2024-05-21T12:29:24.632434+00:00", "EventTime": "2024-05-21T12:29:24.632453+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "1970-01-03T00:32:29.221185+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2024/05/21 12:29:24.873619)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 49, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "ba842bdf-1ee5-434b-b2f3-239795087692", "DetectTime": "2024-05-21T12:29:24.884051+00:00", "EventTime": "2024-05-21T12:29:24.884070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhDKC3Tdi7kX0LQk9"], "accumulated_threat_level": 0.8, "timewindow": 49} +{"Format": "IDEA0", "ID": "5ffc9d36-ca02-4177-89ce-df46cabcea0b", "DetectTime": "2024-05-21T12:29:24.888881+00:00", "EventTime": "2024-05-21T12:29:24.888900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuW3n1zqwgODTTMvd"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "159dd6a5-be9b-4946-bbdc-28c18cb03e91", "DetectTime": "2024-05-21T12:29:24.898642+00:00", "EventTime": "2024-05-21T12:29:24.898660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtpGo1w9zgwmiLb14"], "accumulated_threat_level": 1.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "16a2d36a-1323-4a13-99fd-5829e5b433f1", "DetectTime": "2024-05-21T12:29:24.915580+00:00", "EventTime": "2024-05-21T12:29:24.915598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54rNi2UYxMXx0O3d"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "65f0aa91-7ba9-422b-9103-c63db5538ea4", "DetectTime": "2024-05-21T12:29:24.954103+00:00", "EventTime": "2024-05-21T12:29:24.954124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jpIj2RlaEkXpx6Te"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 49} +{"Format": "IDEA0", "ID": "92564920-07f7-4818-bfda-eef8b4a8bc2d", "DetectTime": "2024-05-21T12:29:24.969753+00:00", "EventTime": "2024-05-21T12:29:24.969773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUmwhu3qBZz5EYe79f"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "8823c7ca-5767-4363-bec6-099d861a4b76", "DetectTime": "2024-05-21T12:29:25.001328+00:00", "EventTime": "2024-05-21T12:29:25.001348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4H2rd405rUUs8S98d"], "accumulated_threat_level": 3.2, "timewindow": 49} +{"Format": "IDEA0", "ID": "16bbe077-3dc4-41e0-b746-be167bc35596", "DetectTime": "2024-05-21T12:29:25.013903+00:00", "EventTime": "2024-05-21T12:29:25.013923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpgyC1uwktyh1bPHa"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "a7a11078-d99a-4d7f-9a34-909cfe3d0ee3", "DetectTime": "2024-05-21T12:29:25.046335+00:00", "EventTime": "2024-05-21T12:29:25.046353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOVTA2LyFvToigCWe"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "2df206dc-0def-44ff-955f-c6bff39a9189", "DetectTime": "2024-05-21T12:29:25.076069+00:00", "EventTime": "2024-05-21T12:29:25.076089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46AzH3j3jhxPDpka"], "accumulated_threat_level": 4.0, "timewindow": 49} +{"Format": "IDEA0", "ID": "bf314be2-c8b8-45ab-8734-6fc7c6595a65", "DetectTime": "2024-05-21T12:29:25.113862+00:00", "EventTime": "2024-05-21T12:29:25.113884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCcju27at5FEUg8J"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "892c5c61-c396-4dd3-94cb-0d485b89247d", "DetectTime": "2024-05-21T12:29:25.148085+00:00", "EventTime": "2024-05-21T12:29:25.148107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTs4My4zbW7Tp5aHib"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "1420483d-278b-4124-a47b-c7f1a5625289", "DetectTime": "2024-05-21T12:29:25.162382+00:00", "EventTime": "2024-05-21T12:29:25.162416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOYx51Cv75fx25I11"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "e329b7f0-4747-491d-9d64-355d16f9b15d", "DetectTime": "2024-05-21T12:29:25.193011+00:00", "EventTime": "2024-05-21T12:29:25.193031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClveiD3gR0jTlYM04l"], "accumulated_threat_level": 4.8, "timewindow": 49} +{"Format": "IDEA0", "ID": "b99a2f1d-3146-451d-b9ce-5add2e7f728f", "DetectTime": "2024-05-21T12:29:25.231523+00:00", "EventTime": "2024-05-21T12:29:25.231545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2b9i4JaoU01WpyIb"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "d40dbb73-003a-4d66-a5cb-5fc77edab39d", "DetectTime": "2024-05-21T12:29:25.264863+00:00", "EventTime": "2024-05-21T12:29:25.264881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8m6QR2L8rJn1oT3Ih"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "5cb8a8c2-a7ca-41e4-941f-9c1224099733", "DetectTime": "2024-05-21T12:29:25.276903+00:00", "EventTime": "2024-05-21T12:29:25.276924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxX9EZ3kbUVYR0pFu9"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "fd0f784d-c9ce-4df8-acbf-b1a8a6c20020", "DetectTime": "2024-05-21T12:29:25.346297+00:00", "EventTime": "2024-05-21T12:29:25.346319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPRiy2S3FNpw8U29d"], "accumulated_threat_level": 3.2, "timewindow": 47} +{"Format": "IDEA0", "ID": "b43300b6-a84f-4d1d-ba47-d1e2e98fa297", "DetectTime": "2024-05-21T12:29:25.364522+00:00", "EventTime": "2024-05-21T12:29:25.364543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzS4bA1v8R4gM6J7ha"], "accumulated_threat_level": 5.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "62542097-23d6-4b02-9eb7-e525bb16f3f7", "DetectTime": "2024-05-21T12:29:25.403915+00:00", "EventTime": "2024-05-21T12:29:25.403935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcC2pU3HqjZumkU8sb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 49} +{"Format": "IDEA0", "ID": "744adaec-1af1-4fc3-a1dd-33e87cf5b562", "DetectTime": "2024-05-21T12:29:25.493013+00:00", "EventTime": "2024-05-21T12:29:25.493034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgGJA4Il874lai0Zj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 49} +{"Format": "IDEA0", "ID": "9d81e74e-cd5e-4130-9593-75c4dd9e60ea", "DetectTime": "2024-05-21T12:29:25.498018+00:00", "EventTime": "2024-05-21T12:29:25.498038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap1P1Dpmk2Do5KI2"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "f17badad-0f2c-4b6c-94cd-f8787f5ae831", "DetectTime": "2024-05-21T12:29:25.550137+00:00", "EventTime": "2024-05-21T12:29:25.550154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "Connection to unknown destination port 7888/UDP destination IP 172.190.23.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqGVo1I0u2ZBdLTF3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 49} +{"Format": "IDEA0", "ID": "49cae7c2-1a7a-428e-abc7-3dddfca17086", "DetectTime": "2024-05-21T12:29:25.570049+00:00", "EventTime": "2024-05-21T12:29:25.570067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZLBO1wiMigeP4tA"], "accumulated_threat_level": 8.799999999999999, "timewindow": 49} +{"Format": "IDEA0", "ID": "1f99095c-10a2-4f7e-87e3-0f15b4957c8c", "DetectTime": "2024-05-21T12:29:25.600780+00:00", "EventTime": "2024-05-21T12:29:25.600801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhELj4SOh8JNH61X8"], "accumulated_threat_level": 9.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "e2aa47d8-76d7-4693-b0f4-36797343e650", "DetectTime": "2024-05-21T12:29:25.633820+00:00", "EventTime": "2024-05-21T12:29:25.633841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co2RNl39YMeVzWu6zg"], "accumulated_threat_level": 10.4, "timewindow": 49} +{"Format": "IDEA0", "ID": "e47f49f4-ec2b-4105-81d7-20be90e461c8", "DetectTime": "2024-05-21T12:29:25.664845+00:00", "EventTime": "2024-05-21T12:29:25.664872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwEBh4MhNxCuwjVKf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "924bd8c4-117f-4a99-8f00-39420f4b6308", "DetectTime": "2024-05-21T12:29:25.922250+00:00", "EventTime": "2024-05-21T12:29:25.922274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosvPx3fnmv5CnZ7K4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 49} +{"Format": "Json", "ID": "924bd8c4-117f-4a99-8f00-39420f4b6308", "DetectTime": "2024-05-21T12:29:25.922250+00:00", "EventTime": "2024-05-21T12:29:25.922274+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "1970-01-03T00:32:34.554419+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 49. (real time 2024/05/21 12:29:26.070285)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 49, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "08e86f3b-bdaf-4f6a-96ce-ccd31cc6e5c2", "DetectTime": "2024-05-21T12:29:26.108069+00:00", "EventTime": "2024-05-21T12:29:26.108087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGWCv1Er6zZj94FCi"], "accumulated_threat_level": 0.8, "timewindow": 49} +{"Format": "IDEA0", "ID": "fa006710-230b-4d41-9679-0b898137f163", "DetectTime": "2024-05-21T12:29:26.119367+00:00", "EventTime": "2024-05-21T12:29:26.119387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7jE6U2KHUq1d5s3e4"], "accumulated_threat_level": 1.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "2491dfa1-1a41-4b02-932b-94c23cc11c22", "DetectTime": "2024-05-21T12:29:26.132731+00:00", "EventTime": "2024-05-21T12:29:26.132749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjrsu3dnJQqie4TEk"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "1b3826cf-c042-4731-8190-4744a476b356", "DetectTime": "2024-05-21T12:29:26.150194+00:00", "EventTime": "2024-05-21T12:29:26.150213+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjrsu3dnJQqie4TEk"], "accumulated_threat_level": 12.1, "timewindow": 17} +{"Format": "Json", "ID": "1b3826cf-c042-4731-8190-4744a476b356", "DetectTime": "2024-05-21T12:29:26.150194+00:00", "EventTime": "2024-05-21T12:29:26.150213+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "1970-01-01T16:53:28.336485+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 17. (real time 2024/05/21 12:29:26.498655)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 17, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "deaa503b-40af-4cd7-922a-48b046a1e672", "DetectTime": "2024-05-21T12:29:26.509228+00:00", "EventTime": "2024-05-21T12:29:26.509247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI7lAj1a4I6oppBgb2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 49} +{"Format": "IDEA0", "ID": "be4f697a-34ea-45ea-bc9e-1bffffacc663", "DetectTime": "2024-05-21T12:29:26.522363+00:00", "EventTime": "2024-05-21T12:29:26.522381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV417W2P0n64uSmTj5"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "c008a7d8-5dc5-46b2-9471-e243545ad71a", "DetectTime": "2024-05-21T12:29:26.543899+00:00", "EventTime": "2024-05-21T12:29:26.543916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdpSp4YfuCBeZMjQ8"], "accumulated_threat_level": 3.2, "timewindow": 49} +{"Format": "IDEA0", "ID": "d53586c7-6700-4b4f-9fb5-018e354d7bc9", "DetectTime": "2024-05-21T12:29:26.556705+00:00", "EventTime": "2024-05-21T12:29:26.556723+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV417W2P0n64uSmTj5"], "accumulated_threat_level": 0.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "9595acac-d4d1-47db-827e-bc638308e262", "DetectTime": "2024-05-21T12:29:26.567796+00:00", "EventTime": "2024-05-21T12:29:26.567817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT0ypw14zaZ6vfaIQ2"], "accumulated_threat_level": 4.0, "timewindow": 49} +{"Format": "IDEA0", "ID": "572245cc-3802-4be7-b129-d97f6356c425", "DetectTime": "2024-05-21T12:29:26.577933+00:00", "EventTime": "2024-05-21T12:29:26.577950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIY0OD1iX0CtuWpbC8"], "accumulated_threat_level": 4.8, "timewindow": 49} +{"Format": "IDEA0", "ID": "b901ffa1-c771-4e1a-8d23-fb5dab28f3c7", "DetectTime": "2024-05-21T12:29:26.588556+00:00", "EventTime": "2024-05-21T12:29:26.588576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLf5bm133dHXiUSNc3"], "accumulated_threat_level": 5.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "2593a1eb-f1ab-43da-bba8-4e55169a3e32", "DetectTime": "2024-05-21T12:29:26.598431+00:00", "EventTime": "2024-05-21T12:29:26.598450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C43Trt2Z94RfcaixLl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 49} +{"Format": "IDEA0", "ID": "44e1143b-8fbf-4c92-86a6-92c8bcd18526", "DetectTime": "2024-05-21T12:29:26.608147+00:00", "EventTime": "2024-05-21T12:29:26.608164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyPGt2vYIQtzykmWj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 49} +{"Format": "IDEA0", "ID": "a2e9de7b-c2ed-4280-b7d4-2c23df2cd8b7", "DetectTime": "2024-05-21T12:29:26.618816+00:00", "EventTime": "2024-05-21T12:29:26.618843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DG1g1EORwmQ7GC79"], "accumulated_threat_level": 7.999999999999999, "timewindow": 49} +{"Format": "IDEA0", "ID": "8cd06a79-2427-4b18-95b3-668c472ce175", "DetectTime": "2024-05-21T12:29:26.629868+00:00", "EventTime": "2024-05-21T12:29:26.629887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxxuXJxuDc8rutBP9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 49} +{"Format": "IDEA0", "ID": "68f00eb1-d1bb-4627-a3c8-12a240bb4622", "DetectTime": "2024-05-21T12:29:26.639965+00:00", "EventTime": "2024-05-21T12:29:26.639983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuEgzv2Wc8KxuWtAif"], "accumulated_threat_level": 9.6, "timewindow": 49} +{"Format": "IDEA0", "ID": "71ca7cbf-1c41-46a7-9907-15a1e7848cb7", "DetectTime": "2024-05-21T12:29:26.645555+00:00", "EventTime": "2024-05-21T12:29:26.645572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.20.80.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavhBn3QjVJBZApQq1"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "58a173c4-cc31-49cc-87de-414aa68ad868", "DetectTime": "2024-05-21T12:29:26.656901+00:00", "EventTime": "2024-05-21T12:29:26.656921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkElk2CqtrHXBtqFk"], "accumulated_threat_level": 10.4, "timewindow": 49} +{"Format": "IDEA0", "ID": "59470dba-1f30-4aeb-84bf-4fd747e9cc8d", "DetectTime": "2024-05-21T12:29:26.670174+00:00", "EventTime": "2024-05-21T12:29:26.670193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4gjs3LLBK5wZEdsa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "28b47c42-b249-4e45-a6a3-8d5e5558453c", "DetectTime": "2024-05-21T12:29:26.775652+00:00", "EventTime": "2024-05-21T12:29:26.775672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL6SFx2IwRpHUH9ur9"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "eb63ec8d-3888-433a-821f-99c9e2194fc0", "DetectTime": "2024-05-21T12:29:26.846008+00:00", "EventTime": "2024-05-21T12:29:26.846031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.137.169.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbhSQt4HeFpuHdI7N7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e37f13dd-efc2-419a-9279-1884f12965d0", "DetectTime": "2024-05-21T12:29:26.878840+00:00", "EventTime": "2024-05-21T12:29:26.878862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaeY3j1mUaW57Xecsc"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ed9015b4-50be-4ea0-95b0-b80416ca62c6", "DetectTime": "2024-05-21T12:29:26.932162+00:00", "EventTime": "2024-05-21T12:29:26.932185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ23nD46mkdtjEZlPb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "b0869c83-4c02-410e-8d90-8424c79e9ab2", "DetectTime": "2024-05-21T12:29:26.976921+00:00", "EventTime": "2024-05-21T12:29:26.976943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEjXUrA04XY5NkGh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "426acb3c-c0d4-45cd-a3ab-47be2bc2ecdd", "DetectTime": "2024-05-21T12:29:27.033170+00:00", "EventTime": "2024-05-21T12:29:27.033189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcnrRS1E4fbRd06ex5"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "532014b1-e9c7-49a5-b4af-5f30587fca24", "DetectTime": "2024-05-21T12:29:27.116127+00:00", "EventTime": "2024-05-21T12:29:27.116148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfZYa3eMi3guQ27Ua"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "410ebcbf-61f2-47aa-8a90-d1630a982441", "DetectTime": "2024-05-21T12:29:27.402900+00:00", "EventTime": "2024-05-21T12:29:27.402922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChqFo31KixeZ5d7Jw1"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9d0d75f4-aaad-4510-96b2-bc47242312b7", "DetectTime": "2024-05-21T12:29:27.408332+00:00", "EventTime": "2024-05-21T12:29:27.408353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2VuN1iFTEC1u4fCb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a6b897ed-9634-4ea9-90da-26148d65df86", "DetectTime": "2024-05-21T12:29:27.413042+00:00", "EventTime": "2024-05-21T12:29:27.413061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQdw1RdvXzG8AT88"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2ef1db1b-50fd-4f3b-a07e-d80ca1f2bf04", "DetectTime": "2024-05-21T12:29:27.417613+00:00", "EventTime": "2024-05-21T12:29:27.417631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwpaB45xuV0LgtDgb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2a6795a9-2441-46a9-aea1-56ce41f920ce", "DetectTime": "2024-05-21T12:29:27.423171+00:00", "EventTime": "2024-05-21T12:29:27.423189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cor9cJ24rkSjH6cY56"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "3727ded9-4c4f-4c87-997c-dd000b936ede", "DetectTime": "2024-05-21T12:29:27.498418+00:00", "EventTime": "2024-05-21T12:29:27.498438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COAgUyxBJQqcQIvP1"], "accumulated_threat_level": 0.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "ec3cfc6b-728e-4358-a935-4d507eee59f9", "DetectTime": "2024-05-21T12:29:27.535140+00:00", "EventTime": "2024-05-21T12:29:27.535160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptbGbatNxGZiMrtg"], "accumulated_threat_level": 1.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "6c9e0458-5422-4b61-9b4b-036178690ee5", "DetectTime": "2024-05-21T12:29:27.556007+00:00", "EventTime": "2024-05-21T12:29:27.556027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJt912EnCXoCIl933"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "3b6ba442-ad64-4648-963f-1a4be5ebb0f6", "DetectTime": "2024-05-21T12:29:27.608009+00:00", "EventTime": "2024-05-21T12:29:27.608028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crl6Zf17OudV7f5ke3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 50} +{"Format": "IDEA0", "ID": "6fa4e2b7-0eb8-4b8b-9140-d545952d202e", "DetectTime": "2024-05-21T12:29:27.641601+00:00", "EventTime": "2024-05-21T12:29:27.641619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUm50g4jM4ihaylXy5"], "accumulated_threat_level": 3.2, "timewindow": 50} +{"Format": "IDEA0", "ID": "c75db752-c46b-474b-9665-8b451de68af2", "DetectTime": "2024-05-21T12:29:27.672138+00:00", "EventTime": "2024-05-21T12:29:27.672159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcUB31XWNR0glqch4"], "accumulated_threat_level": 4.0, "timewindow": 50} +{"Format": "IDEA0", "ID": "a56e7bcb-4e93-48e9-8026-4cbc12deca7a", "DetectTime": "2024-05-21T12:29:27.703020+00:00", "EventTime": "2024-05-21T12:29:27.703041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIDwj1in5vG6T1WSg"], "accumulated_threat_level": 4.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "eb127e26-c966-43e5-ba12-141a8c817eb6", "DetectTime": "2024-05-21T12:29:27.730129+00:00", "EventTime": "2024-05-21T12:29:27.730150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm2VhomttBbFWXwWb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "6028c541-fa58-4704-ba7d-21088cc791db", "DetectTime": "2024-05-21T12:29:27.755001+00:00", "EventTime": "2024-05-21T12:29:27.755020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf8N31zr6Z11yOpO"], "accumulated_threat_level": 5.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "a259ed3b-b62f-44ca-97a8-570291dd884d", "DetectTime": "2024-05-21T12:29:27.788494+00:00", "EventTime": "2024-05-21T12:29:27.788514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBINTHsqrmvOPBI9g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 50} +{"Format": "IDEA0", "ID": "eaf282e2-de20-4894-8380-3ea2c25efa91", "DetectTime": "2024-05-21T12:29:27.820650+00:00", "EventTime": "2024-05-21T12:29:27.820667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFvJq130Xqoemb1Ml"], "accumulated_threat_level": 7.199999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "92fe64ae-d93f-4d2a-a601-820f62474f2c", "DetectTime": "2024-05-21T12:29:27.845828+00:00", "EventTime": "2024-05-21T12:29:27.845849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NtKv4YlWC7jEalEa"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "eab4f0f9-8146-419b-b1aa-479769440b79", "DetectTime": "2024-05-21T12:29:27.872710+00:00", "EventTime": "2024-05-21T12:29:27.872733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "Connection to unknown destination port 22009/UDP destination IP 37.32.176.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb18Sg1R6ITiUv6ER7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "57e77494-ae1f-4f68-b094-47d342fdd577", "DetectTime": "2024-05-21T12:29:27.894811+00:00", "EventTime": "2024-05-21T12:29:27.894832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJtRM1vqJXEr2GLO"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e4a6d821-2e38-478d-877f-ce1339935bde", "DetectTime": "2024-05-21T12:29:27.931378+00:00", "EventTime": "2024-05-21T12:29:27.931396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zAUuJaOco1OC5Z9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "4790ae7b-a659-43dc-bd88-bf1e39ce21dd", "DetectTime": "2024-05-21T12:29:27.943627+00:00", "EventTime": "2024-05-21T12:29:27.943648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHdO8RDAyuYv3qLd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "0d2c7d44-dc5f-452d-83a2-bacbc06c50f1", "DetectTime": "2024-05-21T12:29:27.972846+00:00", "EventTime": "2024-05-21T12:29:27.972867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGGXb4acxDQXBrxcd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ec68e24e-de4e-4e23-92b3-1463ef22dd84", "DetectTime": "2024-05-21T12:29:28.001926+00:00", "EventTime": "2024-05-21T12:29:28.001948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgINnm1v6ODMgOroMj"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a2ee514f-b4a0-488d-9baa-4bbd759d293f", "DetectTime": "2024-05-21T12:29:28.014736+00:00", "EventTime": "2024-05-21T12:29:28.014758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAXmo3xQ8IpDB0Er5"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "309999d0-4817-4a1a-997d-8ed1ff383b7f", "DetectTime": "2024-05-21T12:29:28.073360+00:00", "EventTime": "2024-05-21T12:29:28.073382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCjgf3KZT1mcwr9Ei"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "13ea7669-5319-4760-9ed8-cce514ce9e27", "DetectTime": "2024-05-21T12:29:28.099965+00:00", "EventTime": "2024-05-21T12:29:28.099987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYdPs1Apb38DW2xK"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "c5f25bb1-6344-4ce8-8111-04510dd4a895", "DetectTime": "2024-05-21T12:29:28.347017+00:00", "EventTime": "2024-05-21T12:29:28.347036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptBOq3MztCtB1NX99"], "accumulated_threat_level": 10.4, "timewindow": 50} +{"Format": "IDEA0", "ID": "eafa5bda-89ea-45a0-9eb5-f03c9d947a18", "DetectTime": "2024-05-21T12:29:28.352016+00:00", "EventTime": "2024-05-21T12:29:28.352036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLj7BW3sdMlsc28Hf7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "5ce3f017-0650-4950-ae7d-34854778e9f3", "DetectTime": "2024-05-21T12:29:28.424028+00:00", "EventTime": "2024-05-21T12:29:28.424048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAXgc63kOEf7QEy2j6"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "76c73359-97e0-46b7-86c2-6635584a6a38", "DetectTime": "2024-05-21T12:29:28.467976+00:00", "EventTime": "2024-05-21T12:29:28.467998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.244.46.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83q8n1vJmhAxW3JNa"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "f376e4ac-3f30-479f-9fc0-324de96121cf", "DetectTime": "2024-05-21T12:29:28.475889+00:00", "EventTime": "2024-05-21T12:29:28.475910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLmcD2Dgfm927XFh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "46891796-d63d-4659-a686-558eb4fc4fd3", "DetectTime": "2024-05-21T12:29:28.480975+00:00", "EventTime": "2024-05-21T12:29:28.480996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crkv4y3X0X6uxRuKrb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "23eb3287-714a-4d3c-8496-e698d07b25c9", "DetectTime": "2024-05-21T12:29:28.485590+00:00", "EventTime": "2024-05-21T12:29:28.485608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.184.50.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD4VffQ953RmysQh9"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "11c0672b-5eec-44e8-948f-e24d1eeda394", "DetectTime": "2024-05-21T12:29:28.492665+00:00", "EventTime": "2024-05-21T12:29:28.492686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.141.117.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQznB2cyCU0eH4ku7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "677a94f5-bcd4-4498-8e49-965e0d982c69", "DetectTime": "2024-05-21T12:29:28.507250+00:00", "EventTime": "2024-05-21T12:29:28.507271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.60.118.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCDfx4I1IItV6obd7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "dcbba7f4-6a3d-47b4-b05d-c6c5a5eba392", "DetectTime": "2024-05-21T12:29:28.511914+00:00", "EventTime": "2024-05-21T12:29:28.511933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGncBNudxdAa3bycc"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ecf672a4-5d4b-4b2d-bcd7-0e7043d4c423", "DetectTime": "2024-05-21T12:29:28.622976+00:00", "EventTime": "2024-05-21T12:29:28.622996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.42.16.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZbit1DCprNliXt41"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "03cacbdf-6109-4c15-a6c8-6e46d46e3a80", "DetectTime": "2024-05-21T12:29:28.630555+00:00", "EventTime": "2024-05-21T12:29:28.630574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.198.227.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyz5KxHLBwkEIIBf4"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "855a7c63-2d80-4672-9cf3-7a2e256ca76c", "DetectTime": "2024-05-21T12:29:28.668424+00:00", "EventTime": "2024-05-21T12:29:28.668448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qkM03iIKNd2X6q8b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 50} +{"Format": "IDEA0", "ID": "17c14a03-3d5c-4d85-8cea-fd91def51881", "DetectTime": "2024-05-21T12:29:28.709360+00:00", "EventTime": "2024-05-21T12:29:28.709379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEQsF2bnY1vGscqo5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 50} +{"Format": "Json", "ID": "17c14a03-3d5c-4d85-8cea-fd91def51881", "DetectTime": "2024-05-21T12:29:28.709360+00:00", "EventTime": "2024-05-21T12:29:28.709379+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "1970-01-03T01:03:07.135711+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2024/05/21 12:29:28.859877)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 50, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "92654c5f-a430-418d-a104-ccc4e80c4875", "DetectTime": "2024-05-21T12:29:28.890174+00:00", "EventTime": "2024-05-21T12:29:28.890192+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGtiW2GkvOq6PUiJ7"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "f71f2b2e-cb11-4f3b-888c-34e1e5cfbfd4", "DetectTime": "2024-05-21T12:29:28.902498+00:00", "EventTime": "2024-05-21T12:29:28.902516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGtiW2GkvOq6PUiJ7"], "accumulated_threat_level": 1.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "96b70f48-e7a8-4381-8b55-6de2e27d3681", "DetectTime": "2024-05-21T12:29:28.970801+00:00", "EventTime": "2024-05-21T12:29:28.970825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.111.78.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwUM6624PiDTX5bhg8"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "f62d2893-e9a4-4425-b6d0-3b0a87bdbde1", "DetectTime": "2024-05-21T12:29:28.976577+00:00", "EventTime": "2024-05-21T12:29:28.976598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUcaXt4fU04GnkhBh3"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "93e9a48a-050f-4a40-8c13-f03632d2cb21", "DetectTime": "2024-05-21T12:29:28.981385+00:00", "EventTime": "2024-05-21T12:29:28.981405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 38.118.129.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C76cl94JCVaM4GOiGk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "c0769ae1-1c25-4753-b5dc-7a83e68db722", "DetectTime": "2024-05-21T12:29:28.986523+00:00", "EventTime": "2024-05-21T12:29:28.986542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.21.13.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyyBJ916ub8CUNOECd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "19c64da0-2a9b-4222-a26b-50717742e1c8", "DetectTime": "2024-05-21T12:29:28.998513+00:00", "EventTime": "2024-05-21T12:29:28.998539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.4.69.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOrVG2hJtO17PUJPc"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "965488e0-5cbd-4182-a807-48591b82ae4c", "DetectTime": "2024-05-21T12:29:29.055516+00:00", "EventTime": "2024-05-21T12:29:29.055533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C38Bjb3FIwPzVMFYed"], "accumulated_threat_level": 0.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "fa525c5e-a752-4394-a981-8020b0e3ef9c", "DetectTime": "2024-05-21T12:29:29.067692+00:00", "EventTime": "2024-05-21T12:29:29.067714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.107.159.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSkcAC3kSmgVvQrh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1a000c85-4a23-4065-b581-e46813845666", "DetectTime": "2024-05-21T12:29:29.160783+00:00", "EventTime": "2024-05-21T12:29:29.160805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.8.177.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5n0Ks4eebMEsNYr36"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "34ff009d-85d1-4bb0-a878-5c566782a6e0", "DetectTime": "2024-05-21T12:29:29.165879+00:00", "EventTime": "2024-05-21T12:29:29.165897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.61.221.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtKrmJ6VE4poHSn5"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "370efc1a-f63f-4d55-98ec-c68c69bd54fc", "DetectTime": "2024-05-21T12:29:29.172513+00:00", "EventTime": "2024-05-21T12:29:29.172531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.57.245.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CweIPGwGPaKpfP9Dg"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "b32f8943-e1a5-4ccb-b7cf-8a42ab2bbb31", "DetectTime": "2024-05-21T12:29:29.219944+00:00", "EventTime": "2024-05-21T12:29:29.219966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.79.52.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8m2izhSztsR1po"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "0ebe8923-eb92-4287-a240-fc59b7383361", "DetectTime": "2024-05-21T12:29:29.230422+00:00", "EventTime": "2024-05-21T12:29:29.230440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGSz62eI7RinXAjJ9"], "accumulated_threat_level": 1.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "11c7208a-1905-4b19-b9f2-37613d9274ac", "DetectTime": "2024-05-21T12:29:29.257527+00:00", "EventTime": "2024-05-21T12:29:29.257544+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmoAQD4xTnoOrHo4t"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "ff59fe3e-c916-4b64-ae62-90150b1f13b5", "DetectTime": "2024-05-21T12:29:29.270614+00:00", "EventTime": "2024-05-21T12:29:29.270636+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmoAQD4xTnoOrHo4t"], "accumulated_threat_level": 1.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "27d7eb03-52aa-427c-953d-163a0c5894d5", "DetectTime": "2024-05-21T12:29:29.275460+00:00", "EventTime": "2024-05-21T12:29:29.275479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.184.128.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CizI4WrIcYrB9P6yk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2866593a-5731-4e21-b7e8-e32cea82a24b", "DetectTime": "2024-05-21T12:29:29.307697+00:00", "EventTime": "2024-05-21T12:29:29.307716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "Connection to unknown destination port 7819/UDP destination IP 5.178.190.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXaEv3W9clua2pzU4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 50} +{"Format": "IDEA0", "ID": "3e4cb6ea-1ea7-4e61-8f2a-61f6d871e972", "DetectTime": "2024-05-21T12:29:29.312495+00:00", "EventTime": "2024-05-21T12:29:29.312513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.147.133.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvAOA3oKuSBeeMlAe"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "f7b30d7b-6d8a-4563-a9ac-af19eaee7033", "DetectTime": "2024-05-21T12:29:29.345477+00:00", "EventTime": "2024-05-21T12:29:29.345498+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQaqlrQ8ekNUNXte"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "ccea912f-3177-4126-aa90-e467660d6f34", "DetectTime": "2024-05-21T12:29:29.401093+00:00", "EventTime": "2024-05-21T12:29:29.401113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQaqlrQ8ekNUNXte"], "accumulated_threat_level": 2.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "16136f39-9020-4541-a7d4-08fc8bad4253", "DetectTime": "2024-05-21T12:29:29.406081+00:00", "EventTime": "2024-05-21T12:29:29.406099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.224.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0yvS2t4KEMXTJqS4"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "557e9a1f-6eec-4a79-8a0b-beab34ce1632", "DetectTime": "2024-05-21T12:29:29.410848+00:00", "EventTime": "2024-05-21T12:29:29.410866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.190.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuhCC94qBW67sUFYBe"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9d307ca6-c807-4e33-bc4f-65145b7b5dfc", "DetectTime": "2024-05-21T12:29:29.424090+00:00", "EventTime": "2024-05-21T12:29:29.424113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm5d2e4vhbVwugtcZi"], "accumulated_threat_level": 3.2, "timewindow": 50} +{"Format": "IDEA0", "ID": "33ebedb6-d161-4d4f-9e9d-dd1f89ad240a", "DetectTime": "2024-05-21T12:29:29.429602+00:00", "EventTime": "2024-05-21T12:29:29.429625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.111.224.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12zRh1nK252R0s6w2"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "38501c7e-239f-4a29-8be2-7129c33a2639", "DetectTime": "2024-05-21T12:29:29.689461+00:00", "EventTime": "2024-05-21T12:29:29.689482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdUFc64vNVLTwVKRs5"], "accumulated_threat_level": 4.0, "timewindow": 50} +{"Format": "IDEA0", "ID": "4811e7d3-2823-4c73-80fc-faabc2879c4b", "DetectTime": "2024-05-21T12:29:29.694040+00:00", "EventTime": "2024-05-21T12:29:29.694057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakXxb3fqxi10QLPKj"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "7bba7809-8bfe-4323-83e0-f862109c95f9", "DetectTime": "2024-05-21T12:29:29.705805+00:00", "EventTime": "2024-05-21T12:29:29.705824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.114.234.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmvsTv2Ck8Fw4quT18"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9dc35092-1e39-4c4e-8835-6ea074edf962", "DetectTime": "2024-05-21T12:29:29.710699+00:00", "EventTime": "2024-05-21T12:29:29.710718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.223.188.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMaHD924qfqpjZUP18"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a7a75a41-f642-4eda-9549-6a49b8f40bc7", "DetectTime": "2024-05-21T12:29:29.743245+00:00", "EventTime": "2024-05-21T12:29:29.743266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.212.161.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1R604iVcLhE4kthd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a5ca8fbe-441a-4291-a4f4-0f9e4aeaeef5", "DetectTime": "2024-05-21T12:29:29.790756+00:00", "EventTime": "2024-05-21T12:29:29.790776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.254.149.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTyWMh1bzUOgcbjibe"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ce6795b4-4e82-44cf-8502-f260b34cc155", "DetectTime": "2024-05-21T12:29:29.813896+00:00", "EventTime": "2024-05-21T12:29:29.813918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.4.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SYnp4T6lLoOXU1Uc"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e336ca88-09de-4471-ba99-4e1d696f80bb", "DetectTime": "2024-05-21T12:29:29.824894+00:00", "EventTime": "2024-05-21T12:29:29.824912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNcCh3w6EbJpkIhyf"], "accumulated_threat_level": 4.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "fb43c2f3-e04f-4e87-871b-4910d1856106", "DetectTime": "2024-05-21T12:29:29.859538+00:00", "EventTime": "2024-05-21T12:29:29.859559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csirx54qgqhU75kiq9"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "07d5b0ed-f4c6-429c-9616-009fee6f7415", "DetectTime": "2024-05-21T12:29:29.894858+00:00", "EventTime": "2024-05-21T12:29:29.894877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LTK31foJAvUiPR2k"], "accumulated_threat_level": 5.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c3a2996a-ab99-4a43-b061-ec2834d5d0f5", "DetectTime": "2024-05-21T12:29:29.899745+00:00", "EventTime": "2024-05-21T12:29:29.899767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ConbKc3bRjDvPqb7v1"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9bbeed6e-7a9d-467b-be31-d8a5f765cb30", "DetectTime": "2024-05-21T12:29:29.923145+00:00", "EventTime": "2024-05-21T12:29:29.923166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgJUx1MR9WySvMtb4", "Cl1tNO2st0m1Qmh2w7", "C6bYFd4pwD3ZvByPye", "CsZyjv2huPy1nEkDM3"], "accumulated_threat_level": 6.1, "timewindow": 50} +{"Format": "IDEA0", "ID": "0b9d88c5-0459-4fb8-98be-8c7da903af78", "DetectTime": "2024-05-21T12:29:29.933017+00:00", "EventTime": "2024-05-21T12:29:29.933038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.220.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9yvSA3PNO8hhRblW9"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "0760b5d5-c085-4eaf-941d-e5fb861ddcfa", "DetectTime": "2024-05-21T12:29:29.965537+00:00", "EventTime": "2024-05-21T12:29:29.965556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNB8753Fp7CoMS6ji8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 50} +{"Format": "IDEA0", "ID": "4fe03a0b-3639-4324-8cf6-e74d9113803e", "DetectTime": "2024-05-21T12:29:29.995930+00:00", "EventTime": "2024-05-21T12:29:29.995951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.207.189.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigiNR34JCK7j6OoE"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ee2a0877-f7e2-4cc0-8edd-9b3c3d0f021e", "DetectTime": "2024-05-21T12:29:30.029179+00:00", "EventTime": "2024-05-21T12:29:30.029199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUQgp1SJjiQeqOZzi"], "accumulated_threat_level": 7.699999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "8b60f907-f30a-47de-afcd-528b7d91905f", "DetectTime": "2024-05-21T12:29:30.063825+00:00", "EventTime": "2024-05-21T12:29:30.063845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0ZQP1IoLNPvqwMEa"], "accumulated_threat_level": 8.5, "timewindow": 50} +{"Format": "IDEA0", "ID": "4469b2eb-9b9c-4694-9ece-1062ca623db5", "DetectTime": "2024-05-21T12:29:30.097207+00:00", "EventTime": "2024-05-21T12:29:30.097230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzG0MH1zbj8cPddEu9"], "accumulated_threat_level": 9.3, "timewindow": 50} +{"Format": "IDEA0", "ID": "ebc80999-93cb-4e29-b7f1-5f8fb78d8cac", "DetectTime": "2024-05-21T12:29:30.129001+00:00", "EventTime": "2024-05-21T12:29:30.129022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSjd2H6QHO62JvB2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 50} +{"Format": "IDEA0", "ID": "e32933ef-d2c7-4a40-b02e-e53f1d6741a7", "DetectTime": "2024-05-21T12:29:30.192870+00:00", "EventTime": "2024-05-21T12:29:30.192890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.224.17"]}], "Attach": [{"Content": "Connection to unknown destination port 16573/UDP destination IP 190.254.224.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpqt383QA9IMeq5rsd"], "accumulated_threat_level": 10.900000000000002, "timewindow": 50} +{"Format": "IDEA0", "ID": "47d56355-76d2-4a41-920f-3c8bd04b27cc", "DetectTime": "2024-05-21T12:29:30.240091+00:00", "EventTime": "2024-05-21T12:29:30.240110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVgobgpWcUTX5kch"], "accumulated_threat_level": 11.700000000000003, "timewindow": 50} +{"Format": "IDEA0", "ID": "cf571856-a68e-43f0-82ee-c1b95e9a3a6b", "DetectTime": "2024-05-21T12:29:30.258277+00:00", "EventTime": "2024-05-21T12:29:30.258294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"]}], "Attach": [{"Content": "Connection to unknown destination port 20126/UDP destination IP 41.72.123.111. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkIxuF2HtkMgHlJgY1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 50} +{"Format": "Json", "ID": "cf571856-a68e-43f0-82ee-c1b95e9a3a6b", "DetectTime": "2024-05-21T12:29:30.258277+00:00", "EventTime": "2024-05-21T12:29:30.258294+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.72.123.111"]}], "Attach": [{"Content": "1970-01-03T01:03:29.163086+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2024/05/21 12:29:30.453959)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 50, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "1d98482c-efd7-4d55-84f1-a2588cb84bd9", "DetectTime": "2024-05-21T12:29:30.471825+00:00", "EventTime": "2024-05-21T12:29:30.471844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4RQr20x5R1dlVFi8"], "accumulated_threat_level": 0.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "3fbd1d51-32d6-48f5-af68-76aac1b29b28", "DetectTime": "2024-05-21T12:29:30.482196+00:00", "EventTime": "2024-05-21T12:29:30.482214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRDZl4R8vQW5JuhYk"], "accumulated_threat_level": 1.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "06f9f9d6-bb0c-48d8-8485-454d8d7eb278", "DetectTime": "2024-05-21T12:29:30.486713+00:00", "EventTime": "2024-05-21T12:29:30.486731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.0.1.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGYRs4RPdS6bp85p3"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "cb8c9699-46a6-4615-a24d-ff6c33adc5d5", "DetectTime": "2024-05-21T12:29:30.496691+00:00", "EventTime": "2024-05-21T12:29:30.496709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyqbe3VlsYVpm32V1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 50} +{"Format": "IDEA0", "ID": "31315cd2-628b-41ff-9175-90b16326f315", "DetectTime": "2024-05-21T12:29:30.506124+00:00", "EventTime": "2024-05-21T12:29:30.506141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVq0fG3LcAZyfkNU36"], "accumulated_threat_level": 3.2, "timewindow": 50} +{"Format": "IDEA0", "ID": "8e2425e4-cbfc-489a-a573-b88e1bd58e06", "DetectTime": "2024-05-21T12:29:30.683993+00:00", "EventTime": "2024-05-21T12:29:30.684015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.67.85.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1wR4EQFAzDdPtNSi"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ffc16925-8a80-4f41-a882-f2e39112b2c0", "DetectTime": "2024-05-21T12:29:30.689157+00:00", "EventTime": "2024-05-21T12:29:30.689175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 208.180.242.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcosa1JbZdbVkj1Wj"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "93d2c491-5de7-404b-b319-38e61fa2b814", "DetectTime": "2024-05-21T12:29:30.717495+00:00", "EventTime": "2024-05-21T12:29:30.717517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.157.42.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8ZVp1RIBsm1hhP0l"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e5be16d6-f130-47dd-8bb9-04fce0041a13", "DetectTime": "2024-05-21T12:29:30.722360+00:00", "EventTime": "2024-05-21T12:29:30.722379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.144.13.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClBQjE4rwvtCs5jdrd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "44b0bd07-7223-4aeb-b4c9-17f676af80b1", "DetectTime": "2024-05-21T12:29:30.727192+00:00", "EventTime": "2024-05-21T12:29:30.727211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LVqH3MvOEg3p9heg"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "50268505-f049-40bf-9e57-8ee7ee8f00f0", "DetectTime": "2024-05-21T12:29:30.799878+00:00", "EventTime": "2024-05-21T12:29:30.799898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfLu51K4Wvbo8iKi"], "accumulated_threat_level": 4.0, "timewindow": 50} +{"Format": "IDEA0", "ID": "e16750ba-8438-4012-b01b-2a31bd61f3df", "DetectTime": "2024-05-21T12:29:30.836804+00:00", "EventTime": "2024-05-21T12:29:30.836829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClCt2L3E6zLzTf8Xyi"], "accumulated_threat_level": 4.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "47917678-76a4-41e0-b632-9acaa8f96a86", "DetectTime": "2024-05-21T12:29:30.841710+00:00", "EventTime": "2024-05-21T12:29:30.841730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.180.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9AEZ2EPY3Nn6Zm88"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "bbee4205-cd55-4b19-a750-907f799a008a", "DetectTime": "2024-05-21T12:29:30.887776+00:00", "EventTime": "2024-05-21T12:29:30.887797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.138.18.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHglH1lIfbCvQfcff"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "b0c87f31-317d-4ab6-85bd-fafd35171679", "DetectTime": "2024-05-21T12:29:30.908832+00:00", "EventTime": "2024-05-21T12:29:30.908853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.1.245.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQXLs3biJtGTzoJM8"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "432555d0-88ae-4b84-9f3d-ea18ed7e63c0", "DetectTime": "2024-05-21T12:29:30.934215+00:00", "EventTime": "2024-05-21T12:29:30.934235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKdBN3aTKEenRPmLa"], "accumulated_threat_level": 5.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "5fff46bc-0f15-4f8c-a89d-4315fe76715c", "DetectTime": "2024-05-21T12:29:30.977938+00:00", "EventTime": "2024-05-21T12:29:30.977959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjj2bMp0Pjc2ZeG"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e2dd9a20-dcfd-4221-8279-8e6338615b3c", "DetectTime": "2024-05-21T12:29:31.004538+00:00", "EventTime": "2024-05-21T12:29:31.004557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcgjj2GOkRzXhXK74"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 50} +{"Format": "IDEA0", "ID": "fc2cdda5-40c9-44db-8042-c9300ae92332", "DetectTime": "2024-05-21T12:29:31.025672+00:00", "EventTime": "2024-05-21T12:29:31.025696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn7cAo4F2t62t0jDmj"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "134bb45d-124c-414f-af1c-ff834d59e0bb", "DetectTime": "2024-05-21T12:29:31.083843+00:00", "EventTime": "2024-05-21T12:29:31.083866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYkEE3CA8o8T4FoOh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "d340c33f-1de8-4b09-9df2-273ef70de069", "DetectTime": "2024-05-21T12:29:31.121680+00:00", "EventTime": "2024-05-21T12:29:31.121704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 100.1.75.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW14Pb3yQgcV6FScri"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "54ead53f-6aa8-411e-a1da-3f89e88d21b6", "DetectTime": "2024-05-21T12:29:31.126489+00:00", "EventTime": "2024-05-21T12:29:31.126508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 198.2.54.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkXbbg1HmLC1FWLzlk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "86926b37-7e2a-4f08-b236-77fc6c5e2321", "DetectTime": "2024-05-21T12:29:31.185861+00:00", "EventTime": "2024-05-21T12:29:31.185884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cax6Yz1dOXnP5PtYnh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ba0dd1de-cea0-43f9-88fe-bf77b2d883a7", "DetectTime": "2024-05-21T12:29:31.245374+00:00", "EventTime": "2024-05-21T12:29:31.245394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqR5o3kPIWAOkzMjc"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2fc604d3-a4b2-4f0f-be4a-9bb10c3793ad", "DetectTime": "2024-05-21T12:29:31.268940+00:00", "EventTime": "2024-05-21T12:29:31.268963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.95.174.120 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXe7sJ3eMPamFoFt2g"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "3b2313b2-4427-4f94-96f4-96a438beb3fd", "DetectTime": "2024-05-21T12:29:31.327296+00:00", "EventTime": "2024-05-21T12:29:31.327320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQE802R6LnlNqQLaa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "982057d3-b1d3-47d7-ab3e-a9933de6ea2f", "DetectTime": "2024-05-21T12:29:31.353929+00:00", "EventTime": "2024-05-21T12:29:31.353952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.248.253.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkE9o447EuI90uOeOg"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "79b8710b-cea4-4f29-8933-7dae0b1e64e1", "DetectTime": "2024-05-21T12:29:31.385031+00:00", "EventTime": "2024-05-21T12:29:31.385053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUjLF2JcnrrIiQ3m3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "06adc64a-60bc-407c-94d6-9cd1d34fde5e", "DetectTime": "2024-05-21T12:29:31.630956+00:00", "EventTime": "2024-05-21T12:29:31.630979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT0MhE2jPVIEa3hBAl"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1bf8647a-0f00-4e19-a3ae-add21faababc", "DetectTime": "2024-05-21T12:29:31.635797+00:00", "EventTime": "2024-05-21T12:29:31.635817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxUt03LwopPH067K1"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "317beb98-2842-403e-9fa0-502c40aa27cd", "DetectTime": "2024-05-21T12:29:31.666828+00:00", "EventTime": "2024-05-21T12:29:31.666852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 209.112.181.236 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTb2qqAT0PcRARfh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9e25ca51-f644-4ac4-b576-6cb0dc206f0e", "DetectTime": "2024-05-21T12:29:31.698579+00:00", "EventTime": "2024-05-21T12:29:31.698599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBKya7AoyuRf7svSh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "3eea9eb3-cbc6-424b-875d-ac9154d03873", "DetectTime": "2024-05-21T12:29:31.717501+00:00", "EventTime": "2024-05-21T12:29:31.717524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.164.5.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csra7R2jZ01FzmEe5a"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "cd04e32c-5a33-4e3e-8670-cdb6ce2ca265", "DetectTime": "2024-05-21T12:29:31.747775+00:00", "EventTime": "2024-05-21T12:29:31.747797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.57.194.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNAzFm4sxha1MD9GDd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "4d905af2-3321-435d-ab66-6a6e429e462f", "DetectTime": "2024-05-21T12:29:31.774493+00:00", "EventTime": "2024-05-21T12:29:31.774521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEzHsN3gcD7fmXHtci"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "e4dfb72d-46a8-494e-b08b-213a3ebb8720", "DetectTime": "2024-05-21T12:29:31.808800+00:00", "EventTime": "2024-05-21T12:29:31.808821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVzMKq8TiX7366WM9"], "accumulated_threat_level": 10.4, "timewindow": 50} +{"Format": "IDEA0", "ID": "9c2136bc-d352-4314-b8a8-654dbfaf0f7e", "DetectTime": "2024-05-21T12:29:31.840835+00:00", "EventTime": "2024-05-21T12:29:31.840855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIoCHHYRaQA9GJw6d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 50} +{"Format": "IDEA0", "ID": "cd8d5e0d-2974-4ed6-a3db-6432861d7829", "DetectTime": "2024-05-21T12:29:31.908442+00:00", "EventTime": "2024-05-21T12:29:31.908463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4E8wa1sJddamL5yr"], "accumulated_threat_level": 12.000000000000002, "timewindow": 50} +{"Format": "Json", "ID": "cd8d5e0d-2974-4ed6-a3db-6432861d7829", "DetectTime": "2024-05-21T12:29:31.908442+00:00", "EventTime": "2024-05-21T12:29:31.908463+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "1970-01-03T01:34:08.243694+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2024/05/21 12:29:32.078597)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 50, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1b5a7684-aa32-4f87-8d25-bfc94e7e4d12", "DetectTime": "2024-05-21T12:29:32.082722+00:00", "EventTime": "2024-05-21T12:29:32.082741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.168.30.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFYyLE4KKisdETrEDl"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1d5001bc-255a-4e60-9448-340c2a3648ba", "DetectTime": "2024-05-21T12:29:32.093768+00:00", "EventTime": "2024-05-21T12:29:32.093788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CSSA4DI5MbaoMTtb"], "accumulated_threat_level": 0.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "1e8e2243-c06c-4b94-a6e3-759015f99318", "DetectTime": "2024-05-21T12:29:32.104250+00:00", "EventTime": "2024-05-21T12:29:32.104268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBzmi1qK0aRIKf57b"], "accumulated_threat_level": 1.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "7f99d7fd-c033-4a11-9164-f5bb4477ff45", "DetectTime": "2024-05-21T12:29:32.114176+00:00", "EventTime": "2024-05-21T12:29:32.114195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuY1xJ3bkmsCcS42dd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 50} +{"Format": "IDEA0", "ID": "c5b9db26-cc36-4eab-9328-bc9bf8e6631d", "DetectTime": "2024-05-21T12:29:32.127429+00:00", "EventTime": "2024-05-21T12:29:32.127448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpl7pW1JRXw6K2nLLl"], "accumulated_threat_level": 3.2, "timewindow": 50} +{"Format": "IDEA0", "ID": "d7449205-73b9-4a43-bb4e-d078992d0a88", "DetectTime": "2024-05-21T12:29:32.139272+00:00", "EventTime": "2024-05-21T12:29:32.139292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPFVe1rcRZOoFAP1e"], "accumulated_threat_level": 4.0, "timewindow": 50} +{"Format": "IDEA0", "ID": "8438408c-20ec-4cb3-8fa6-d2391b66f725", "DetectTime": "2024-05-21T12:29:32.153868+00:00", "EventTime": "2024-05-21T12:29:32.153886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwugMN6DL1D3Y3OP"], "accumulated_threat_level": 4.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "0162edfc-327d-4584-b238-4d6c9c808610", "DetectTime": "2024-05-21T12:29:32.184226+00:00", "EventTime": "2024-05-21T12:29:32.184247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.202.249.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZceNc5MBJVsbzU3"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "aa8f526b-6027-4922-866c-c3d89ec02a3d", "DetectTime": "2024-05-21T12:29:32.189246+00:00", "EventTime": "2024-05-21T12:29:32.189264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcNz23CKM141IqHNg"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "38d1fb34-f66e-483f-9dd1-bb01cd5f49cb", "DetectTime": "2024-05-21T12:29:32.250946+00:00", "EventTime": "2024-05-21T12:29:32.250964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz2AdJ2sbHKPKc4iAd"], "accumulated_threat_level": 5.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "91dfcf04-4978-45ee-894d-14dccca91e08", "DetectTime": "2024-05-21T12:29:32.461590+00:00", "EventTime": "2024-05-21T12:29:32.461610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu1yez123RYD4MBu9h", "CUOtRp2t78qZHAmxC9", "CaYCcu4clLKhvmKbW5", "CfWlMf4aD2Fga7qHc1"], "accumulated_threat_level": 6.1, "timewindow": 50} +{"Format": "IDEA0", "ID": "a4b9e997-8808-4a02-bfbd-fb7dc4d2ab61", "DetectTime": "2024-05-21T12:29:32.524519+00:00", "EventTime": "2024-05-21T12:29:32.524543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWweG4caLmXjap6Be"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "0dd93692-677f-49bf-8429-cef19981cdd6", "DetectTime": "2024-05-21T12:29:32.541623+00:00", "EventTime": "2024-05-21T12:29:32.541643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.248.138.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CckrLl2g00592H5Tm6"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2a4a8f3f-9c5a-498c-9823-9c294354b938", "DetectTime": "2024-05-21T12:29:32.578892+00:00", "EventTime": "2024-05-21T12:29:32.579225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.40.53.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD85Ew3sbEzOvvtXQj"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1a2eaca6-bbd8-4110-924f-d845f3183707", "DetectTime": "2024-05-21T12:29:32.587520+00:00", "EventTime": "2024-05-21T12:29:32.587538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.168.104.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgAhEQ1zoO4VVQK9wh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "83261cbb-5236-4693-82a9-b5596c29ef3f", "DetectTime": "2024-05-21T12:29:32.675197+00:00", "EventTime": "2024-05-21T12:29:32.675217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.135.63.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8PJR2iqyLTDZyaY2"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a77d137e-a1f1-42e8-9e92-a31978b9600a", "DetectTime": "2024-05-21T12:29:32.680403+00:00", "EventTime": "2024-05-21T12:29:32.680423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.193.78.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXOgd3GM5MGNCPwxk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "16df9d88-27ab-4cc2-a171-b4169d78fae3", "DetectTime": "2024-05-21T12:29:32.685125+00:00", "EventTime": "2024-05-21T12:29:32.685142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.207.108.171 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55Niw38Ghre8Fpbu7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "530fa336-0c7c-4ad4-be89-8eeb3628e620", "DetectTime": "2024-05-21T12:29:32.690668+00:00", "EventTime": "2024-05-21T12:29:32.690688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.42.193.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Ebtf1vZjbI5gHbGb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "aa0e0bbb-a194-4ad6-a4bf-36176df5a6eb", "DetectTime": "2024-05-21T12:29:32.727399+00:00", "EventTime": "2024-05-21T12:29:32.727417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJK1Ih26nfnCN2KtX7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 50} +{"Format": "IDEA0", "ID": "409f793e-244c-4899-a956-c12a3846cb19", "DetectTime": "2024-05-21T12:29:32.732359+00:00", "EventTime": "2024-05-21T12:29:32.732378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.92.237.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COaiU53kjjSolQKfRi"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "40334426-c6a4-4005-b565-0e711b19291c", "DetectTime": "2024-05-21T12:29:32.736992+00:00", "EventTime": "2024-05-21T12:29:32.737010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.120.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUl5Y24xmYAuXCkLq6"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "5ef5d366-9643-432a-8232-1ce9a8cdc79a", "DetectTime": "2024-05-21T12:29:32.762402+00:00", "EventTime": "2024-05-21T12:29:32.762437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.94.186.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKBpA1KzGPHKjVqVk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "0ba8a659-8eff-4b76-99cd-374195e7d4a1", "DetectTime": "2024-05-21T12:29:32.777684+00:00", "EventTime": "2024-05-21T12:29:32.777707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62A0guAS3gSI6tIi"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "fc335cda-c04d-4b95-aa93-1890012df9e0", "DetectTime": "2024-05-21T12:29:32.782576+00:00", "EventTime": "2024-05-21T12:29:32.782595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.57.12.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpEJaY1I9E9o7dXv4i"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "8b8ccd42-4460-4095-af20-a734e1519fa6", "DetectTime": "2024-05-21T12:29:32.799090+00:00", "EventTime": "2024-05-21T12:29:32.799112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.23.159.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBs0s2FkWrQFjQ6Zi"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "7434bb20-fda2-4069-a22a-843aed407e45", "DetectTime": "2024-05-21T12:29:32.831473+00:00", "EventTime": "2024-05-21T12:29:32.831495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMWfAA3OPA9z5TSsaf"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e4fcce78-7faf-4ef7-9220-5c18af34dd7f", "DetectTime": "2024-05-21T12:29:33.015476+00:00", "EventTime": "2024-05-21T12:29:33.015494+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDPv011gLijKTgHbf"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "56eea98f-0ea2-42a2-8b52-e37d384c1bac", "DetectTime": "2024-05-21T12:29:33.027466+00:00", "EventTime": "2024-05-21T12:29:33.027484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDPv011gLijKTgHbf"], "accumulated_threat_level": 2.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "d6554882-f3ac-4097-a6c8-a843fdeea217", "DetectTime": "2024-05-21T12:29:33.134036+00:00", "EventTime": "2024-05-21T12:29:33.134054+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYMhb310QDyf1x917"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "5b70110d-5e77-4aed-a803-6fec3144d229", "DetectTime": "2024-05-21T12:29:33.146998+00:00", "EventTime": "2024-05-21T12:29:33.147020+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYMhb310QDyf1x917"], "accumulated_threat_level": 3.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "e5b6bb9f-6291-45c8-9605-06b21bfe708f", "DetectTime": "2024-05-21T12:29:33.189816+00:00", "EventTime": "2024-05-21T12:29:33.189836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrZJt1TyNAfbKFDzf"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "d826d6fc-0c8a-451d-8c65-7bdd2c63dedc", "DetectTime": "2024-05-21T12:29:33.204337+00:00", "EventTime": "2024-05-21T12:29:33.204360+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrZJt1TyNAfbKFDzf"], "accumulated_threat_level": 3.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "24eb13d2-780a-4737-879a-921c92ef96a8", "DetectTime": "2024-05-21T12:29:33.209427+00:00", "EventTime": "2024-05-21T12:29:33.209445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.160.175.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZre6d3SRhZxTVKQ54"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "65b5223a-2a9e-4e04-93f5-46cbd7d089f4", "DetectTime": "2024-05-21T12:29:33.213848+00:00", "EventTime": "2024-05-21T12:29:33.213866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.151.196.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg763L1engr52nEFke"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "5d9c6fba-9e87-48c1-b45b-8780bb83dc41", "DetectTime": "2024-05-21T12:29:33.278795+00:00", "EventTime": "2024-05-21T12:29:33.278816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.124.162.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CewcT31lxNMrzUXQE9"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "0a0d9def-277b-44d0-84d1-28f18f2772de", "DetectTime": "2024-05-21T12:29:33.339547+00:00", "EventTime": "2024-05-21T12:29:33.339568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYSXc130feOMukjd91"], "accumulated_threat_level": 7.699999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "000db45e-d221-4e12-890a-2740dbaa3a81", "DetectTime": "2024-05-21T12:29:33.344286+00:00", "EventTime": "2024-05-21T12:29:33.344303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.146.132.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyPJQDGR1P4J81B1"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "8c6aabbd-db93-4eda-93f3-0b6900c6a461", "DetectTime": "2024-05-21T12:29:33.375913+00:00", "EventTime": "2024-05-21T12:29:33.375937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RDCnzFglHFQ1OH3"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1b47751f-757d-4ab9-958d-be99aef92197", "DetectTime": "2024-05-21T12:29:33.415026+00:00", "EventTime": "2024-05-21T12:29:33.415047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvN82c1Ct1k7k4F0u3"], "accumulated_threat_level": 8.5, "timewindow": 50} +{"Format": "IDEA0", "ID": "eb72a47a-9bc0-4781-a9e9-1c573a0ecb15", "DetectTime": "2024-05-21T12:29:33.442596+00:00", "EventTime": "2024-05-21T12:29:33.442616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCUle14P52t9DB8qa"], "accumulated_threat_level": 9.3, "timewindow": 50} +{"Format": "IDEA0", "ID": "7816c3ef-f9e7-4910-b1f5-f5b46bccff36", "DetectTime": "2024-05-21T12:29:33.474944+00:00", "EventTime": "2024-05-21T12:29:33.474965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDGpU13EPG4dKpahOl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 50} +{"Format": "IDEA0", "ID": "46a44b09-2567-4873-b9f9-0b08409a8ea1", "DetectTime": "2024-05-21T12:29:33.506169+00:00", "EventTime": "2024-05-21T12:29:33.506188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chzo2p2G8w8zfq1awb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 50} +{"Format": "IDEA0", "ID": "d13fe946-b782-41f0-b4c7-a6b8b502a57d", "DetectTime": "2024-05-21T12:29:33.574257+00:00", "EventTime": "2024-05-21T12:29:33.574274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6A6XJ8t3WwO24O6h"], "accumulated_threat_level": 11.700000000000003, "timewindow": 50} +{"Format": "IDEA0", "ID": "5aa2ebd8-c8f1-4a55-8cb8-964d3743cf5a", "DetectTime": "2024-05-21T12:29:33.610460+00:00", "EventTime": "2024-05-21T12:29:33.610479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNT7Uz1u20w7wK8Wkj"], "accumulated_threat_level": 12.500000000000004, "timewindow": 50} +{"Format": "Json", "ID": "5aa2ebd8-c8f1-4a55-8cb8-964d3743cf5a", "DetectTime": "2024-05-21T12:29:33.610460+00:00", "EventTime": "2024-05-21T12:29:33.610479+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "1970-01-03T01:34:44.308994+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 50. (real time 2024/05/21 12:29:33.862111)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 50, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "120767a9-3a76-4262-a695-2b5cc8522ed4", "DetectTime": "2024-05-21T12:29:33.898569+00:00", "EventTime": "2024-05-21T12:29:33.898590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsA9NE4QbfiTbkA0fg"], "accumulated_threat_level": 0.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "c0c69dfe-3873-425e-b717-6e38993cb5af", "DetectTime": "2024-05-21T12:29:33.909273+00:00", "EventTime": "2024-05-21T12:29:33.909291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgnEssDsTWbWqV2mc"], "accumulated_threat_level": 1.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "aad2c0a7-66d8-4df4-ad0d-97aab64c3b28", "DetectTime": "2024-05-21T12:29:33.919193+00:00", "EventTime": "2024-05-21T12:29:33.919211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEswko3YTKpP2538S9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 50} +{"Format": "IDEA0", "ID": "3bceb45d-762c-4f63-8236-9b2c7e1ae3b4", "DetectTime": "2024-05-21T12:29:33.923841+00:00", "EventTime": "2024-05-21T12:29:33.923859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH83XL3dInlHR0Nhnf"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "1a16ba2a-fe00-4a56-9e8b-f1b4bac999a2", "DetectTime": "2024-05-21T12:29:33.934445+00:00", "EventTime": "2024-05-21T12:29:33.934463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuHI9o7iYb8QGehE8"], "accumulated_threat_level": 3.2, "timewindow": 50} +{"Format": "IDEA0", "ID": "122e33a7-01b6-4ad5-ada4-50dbadec909c", "DetectTime": "2024-05-21T12:29:33.939332+00:00", "EventTime": "2024-05-21T12:29:33.939351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUugac1WlMCas5p5J5"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "003c9bc1-41c3-4c4a-9ec0-263f893f22cb", "DetectTime": "2024-05-21T12:29:33.951138+00:00", "EventTime": "2024-05-21T12:29:33.951158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSIucy3O2vrZDdQfW4"], "accumulated_threat_level": 4.0, "timewindow": 50} +{"Format": "IDEA0", "ID": "bbfa8fd0-818e-45d1-9ae8-fa26310b58c2", "DetectTime": "2024-05-21T12:29:33.973620+00:00", "EventTime": "2024-05-21T12:29:33.973638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ5gDP34ZdGd1ZxNC1"], "accumulated_threat_level": 4.8, "timewindow": 50} +{"Format": "IDEA0", "ID": "053154ea-023e-4da5-9b03-c403b5f8cf2b", "DetectTime": "2024-05-21T12:29:33.983224+00:00", "EventTime": "2024-05-21T12:29:33.983252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrNmTk3ZDVqIL3U0C1"], "accumulated_threat_level": 5.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "342cd704-5d6c-487a-878b-d3a0ed2bdfec", "DetectTime": "2024-05-21T12:29:34.000605+00:00", "EventTime": "2024-05-21T12:29:34.000625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoENN74VvHvCwPZ2ta"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 50} +{"Format": "IDEA0", "ID": "abcc3bee-bd52-400a-9aae-feeb76350a9d", "DetectTime": "2024-05-21T12:29:34.226941+00:00", "EventTime": "2024-05-21T12:29:34.226962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgyJcC1jcAtLtmUMFb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "4bfd1705-fb4f-4f25-a539-9d05d24e34a1", "DetectTime": "2024-05-21T12:29:34.232390+00:00", "EventTime": "2024-05-21T12:29:34.232408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcouPV3S4SJdb0Lu16"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2e6e4499-9050-4cad-b61d-6dd58b2b3737", "DetectTime": "2024-05-21T12:29:34.249978+00:00", "EventTime": "2024-05-21T12:29:34.249999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC5KRJ39nYfXWqQxg2"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "567fe3d1-bb44-47e8-8fc6-2468e923ca94", "DetectTime": "2024-05-21T12:29:34.269077+00:00", "EventTime": "2024-05-21T12:29:34.269096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwdpgr1aLxqeG9T6c1"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "9310b0d5-85b4-473e-8bf9-fbee274167b8", "DetectTime": "2024-05-21T12:29:34.301044+00:00", "EventTime": "2024-05-21T12:29:34.301065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsS5KJ1IFt271P2vZ1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "e7b5f810-2126-4018-b4f8-934e72c61b5b", "DetectTime": "2024-05-21T12:29:34.305746+00:00", "EventTime": "2024-05-21T12:29:34.305764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY81oc3smmkIXExyF8"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "84546a02-329e-49fe-a55d-a6599698f605", "DetectTime": "2024-05-21T12:29:34.381952+00:00", "EventTime": "2024-05-21T12:29:34.381972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.222.31.42"]}], "Attach": [{"Content": "Connection to unknown destination port 24715/UDP destination IP 190.222.31.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHs7KG1ecN6r1plOuh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "37ceb2eb-c1dd-4d08-a9c4-04f2da102c0f", "DetectTime": "2024-05-21T12:29:34.413841+00:00", "EventTime": "2024-05-21T12:29:34.413859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysmtaY8eTQV96XTf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 50} +{"Format": "IDEA0", "ID": "e1a2e4e9-9684-4b63-8312-f92cebda368e", "DetectTime": "2024-05-21T12:29:34.468766+00:00", "EventTime": "2024-05-21T12:29:34.468785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxiM2b1cvLTZABT396"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "8ad0c263-f026-4637-9c13-385f864eba2d", "DetectTime": "2024-05-21T12:29:34.590447+00:00", "EventTime": "2024-05-21T12:29:34.590466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDB5ySax5GvQmZWY8"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "36541c19-847f-418d-8fbc-4ce9c05f28cc", "DetectTime": "2024-05-21T12:29:34.752589+00:00", "EventTime": "2024-05-21T12:29:34.752607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhC1d2nWVgvxcGNr8"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "7d99aea1-63fc-4097-a902-1bc48f6bc1ed", "DetectTime": "2024-05-21T12:29:34.783976+00:00", "EventTime": "2024-05-21T12:29:34.783998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbUR1f4ph04mH7Q4k2"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "943c7099-7cf7-4a78-a2f5-912a7ad7be7b", "DetectTime": "2024-05-21T12:29:34.817988+00:00", "EventTime": "2024-05-21T12:29:34.818011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnxy61DZK6k7ikZMe"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "2a95941b-15e4-457b-8bad-ced409538d67", "DetectTime": "2024-05-21T12:29:34.850785+00:00", "EventTime": "2024-05-21T12:29:34.850803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIsrXh2yljDSW2ob46"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "4d40ec7b-cfc9-46cf-a84e-83de4fd7fbfb", "DetectTime": "2024-05-21T12:29:34.889277+00:00", "EventTime": "2024-05-21T12:29:34.889297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7yx52hW6CR014MWa"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "708c29ad-e28a-4979-b357-80569151c43a", "DetectTime": "2024-05-21T12:29:34.921782+00:00", "EventTime": "2024-05-21T12:29:34.921803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlLBClmZxeZ2YxR4"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "aa18f16f-572b-47c3-a6e7-d5b5571d586c", "DetectTime": "2024-05-21T12:29:35.014949+00:00", "EventTime": "2024-05-21T12:29:35.014968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CasqAZ2eNe7lPj7Yp2", "CwH0SE1YWuSN17yzce", "Co6d1F2elmrPLxBqX7", "CH5lej4diakWu4wHa6"], "accumulated_threat_level": 0.5, "timewindow": 51} +{"Format": "IDEA0", "ID": "913af875-dcab-4117-9b41-7337ced706a2", "DetectTime": "2024-05-21T12:29:35.045037+00:00", "EventTime": "2024-05-21T12:29:35.045056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtFeP3gvtiZx4gli9"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "6ae56513-938f-4ca7-a145-e0f65e8932c4", "DetectTime": "2024-05-21T12:29:35.354055+00:00", "EventTime": "2024-05-21T12:29:35.354079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIePd73uzH2FnUo6Ei"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "cbad46de-1ee0-4eb8-908b-65b9fca276d6", "DetectTime": "2024-05-21T12:29:35.611873+00:00", "EventTime": "2024-05-21T12:29:35.611894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjQdy2CCbROh5wfsb"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "219e5ec9-00c6-4f8e-8f08-9b2a6eb7815c", "DetectTime": "2024-05-21T12:29:35.726526+00:00", "EventTime": "2024-05-21T12:29:35.726546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9HSjO3UCaZLlcSiv"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "6de76a96-8a18-4f9a-bc88-4477886bf2ea", "DetectTime": "2024-05-21T12:29:35.763985+00:00", "EventTime": "2024-05-21T12:29:35.764010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfLc3W24Knt8aDCb92"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "d37ab509-320d-40e5-96b2-f4ceb332a4c4", "DetectTime": "2024-05-21T12:29:35.789451+00:00", "EventTime": "2024-05-21T12:29:35.789472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMRUd3cv1QKLg8LCj"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "99cc8486-7992-4c4e-b675-17c49795c1b6", "DetectTime": "2024-05-21T12:29:35.838641+00:00", "EventTime": "2024-05-21T12:29:35.838660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTzObdwE9O4BB3J7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "7435c4b5-7cd9-44ff-82ec-755c68225d83", "DetectTime": "2024-05-21T12:29:35.893541+00:00", "EventTime": "2024-05-21T12:29:35.893563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoSotcVjJkkg39Nrd"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "52f14a73-0e36-4a4c-b933-8d2096f1bbc4", "DetectTime": "2024-05-21T12:29:36.127749+00:00", "EventTime": "2024-05-21T12:29:36.127767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9HzR3ipMpg1izUMe"], "accumulated_threat_level": 1.3, "timewindow": 51} +{"Format": "IDEA0", "ID": "35120287-0161-425d-8952-a0e284f76ba3", "DetectTime": "2024-05-21T12:29:36.151509+00:00", "EventTime": "2024-05-21T12:29:36.151529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVya01kK4OwpKT28f"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "46aa3402-ebde-4807-9294-fa49bcac3ec0", "DetectTime": "2024-05-21T12:29:36.177491+00:00", "EventTime": "2024-05-21T12:29:36.177508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZTsyXYkXZYd9qnk"], "accumulated_threat_level": 2.1, "timewindow": 51} +{"Format": "IDEA0", "ID": "2e927318-bf9b-4f90-9f14-0e106b339d23", "DetectTime": "2024-05-21T12:29:36.207712+00:00", "EventTime": "2024-05-21T12:29:36.207731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXL1gQ2LqLdrZIUz1g"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "57504954-7406-4be0-9da1-e475d0a460a4", "DetectTime": "2024-05-21T12:29:36.245057+00:00", "EventTime": "2024-05-21T12:29:36.245076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCljk2CddYoaZXNb2"], "accumulated_threat_level": 3.7, "timewindow": 51} +{"Format": "IDEA0", "ID": "e87f33a0-8824-44a4-85d6-64b46ceacf94", "DetectTime": "2024-05-21T12:29:36.277498+00:00", "EventTime": "2024-05-21T12:29:36.277518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNf0GvXa5DPdsPGZj"], "accumulated_threat_level": 4.5, "timewindow": 51} +{"Format": "IDEA0", "ID": "7f687168-6b28-4623-8a44-d010fd1339dc", "DetectTime": "2024-05-21T12:29:36.291520+00:00", "EventTime": "2024-05-21T12:29:36.291538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxE01E136bO8BEPtNf"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "e23957a8-627b-4261-8475-d1feb830c605", "DetectTime": "2024-05-21T12:29:36.322708+00:00", "EventTime": "2024-05-21T12:29:36.322729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTffVp50bI2JTcH7k"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "c5dcdb17-99b5-49f7-ba97-85f8113f2859", "DetectTime": "2024-05-21T12:29:36.349785+00:00", "EventTime": "2024-05-21T12:29:36.349804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGqSh4GdYMipJbCTl"], "accumulated_threat_level": 5.3, "timewindow": 51} +{"Format": "IDEA0", "ID": "99c60bb4-41ed-4b9d-99d8-bc6b9a811c80", "DetectTime": "2024-05-21T12:29:36.369110+00:00", "EventTime": "2024-05-21T12:29:36.369131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.224.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72yLl1IJKGhKt9Nld"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "c412b89a-ac71-4b3d-9c6e-743bed1a9554", "DetectTime": "2024-05-21T12:29:36.397011+00:00", "EventTime": "2024-05-21T12:29:36.397032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFYYFGcCCEHqfpClk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "c9334565-afc7-47fa-aee5-842ba166ab3f", "DetectTime": "2024-05-21T12:29:36.420952+00:00", "EventTime": "2024-05-21T12:29:36.420970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4Scw3hJ7Cm4VUh47"], "accumulated_threat_level": 6.1, "timewindow": 51} +{"Format": "IDEA0", "ID": "47a20c51-c911-4f4b-bd11-e5a48f7ec8e0", "DetectTime": "2024-05-21T12:29:36.456171+00:00", "EventTime": "2024-05-21T12:29:36.456190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAVyW39xuQe5BCY9i"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 51} +{"Format": "IDEA0", "ID": "4093b575-18dc-4ea9-9ff7-bc389c7a65ec", "DetectTime": "2024-05-21T12:29:36.493438+00:00", "EventTime": "2024-05-21T12:29:36.493456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS60X93BME1HiT4rA2"], "accumulated_threat_level": 7.699999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "51fbb0f1-d720-440c-9b31-af32eb353845", "DetectTime": "2024-05-21T12:29:36.519070+00:00", "EventTime": "2024-05-21T12:29:36.519091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36Lto2pgrjPFCZH62"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a7809e86-1f3a-47c0-9183-c1945cfe4c94", "DetectTime": "2024-05-21T12:29:36.546705+00:00", "EventTime": "2024-05-21T12:29:36.546723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP6OEp3vjums0o34w6"], "accumulated_threat_level": 8.5, "timewindow": 51} +{"Format": "IDEA0", "ID": "5a8012a5-c5bd-4366-9952-b3f3e8292420", "DetectTime": "2024-05-21T12:29:36.581588+00:00", "EventTime": "2024-05-21T12:29:36.581606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgd5kh3cFXThhvqYpd"], "accumulated_threat_level": 9.3, "timewindow": 51} +{"Format": "IDEA0", "ID": "14766c2b-81c6-46b8-9623-19d08dc96812", "DetectTime": "2024-05-21T12:29:36.616996+00:00", "EventTime": "2024-05-21T12:29:36.617015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaChe31CmxS7v4hG1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 51} +{"Format": "IDEA0", "ID": "fc839547-85ec-4f2f-b91a-1ad28b580d3e", "DetectTime": "2024-05-21T12:29:36.629179+00:00", "EventTime": "2024-05-21T12:29:36.629201+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9V7I1shwblsVkFZk"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "4ae343f2-5828-4a5a-a8eb-0fb3f3d87c27", "DetectTime": "2024-05-21T12:29:36.640782+00:00", "EventTime": "2024-05-21T12:29:36.640801+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9V7I1shwblsVkFZk"], "accumulated_threat_level": 4.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "72d911fb-2f38-4d1e-b038-417d8e85869e", "DetectTime": "2024-05-21T12:29:36.658759+00:00", "EventTime": "2024-05-21T12:29:36.658780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdYpuS1XEcCjy8lT8l"], "accumulated_threat_level": 10.900000000000002, "timewindow": 51} +{"Format": "IDEA0", "ID": "81037aea-3aae-4d9f-be18-fbf92062ac7a", "DetectTime": "2024-05-21T12:29:36.712909+00:00", "EventTime": "2024-05-21T12:29:36.712931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEKrc1NtyLKPka4E5"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "014c06e6-646b-4132-bd19-e7802f8a0665", "DetectTime": "2024-05-21T12:29:36.750517+00:00", "EventTime": "2024-05-21T12:29:36.750538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2hP8x1IvpUnigNcN6"], "accumulated_threat_level": 11.700000000000003, "timewindow": 51} +{"Format": "IDEA0", "ID": "228a5be7-462c-4e95-99ba-ce448c5b08ac", "DetectTime": "2024-05-21T12:29:36.756349+00:00", "EventTime": "2024-05-21T12:29:36.756369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.4.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf06Ubgk7jUs3X4Eh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "a7c03e3b-9b8c-43b2-b4bc-53808b729d02", "DetectTime": "2024-05-21T12:29:36.802605+00:00", "EventTime": "2024-05-21T12:29:36.802623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnxrKG1etUl9Em9S8j"], "accumulated_threat_level": 12.500000000000004, "timewindow": 51} +{"Format": "Json", "ID": "a7c03e3b-9b8c-43b2-b4bc-53808b729d02", "DetectTime": "2024-05-21T12:29:36.802605+00:00", "EventTime": "2024-05-21T12:29:36.802623+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-03T02:07:09.193278+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2024/05/21 12:29:37.005710)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 51, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "a8e9d137-c480-4b2f-b16b-4bd593a73267", "DetectTime": "2024-05-21T12:29:37.043140+00:00", "EventTime": "2024-05-21T12:29:37.043162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzNziP7tqkuWzWF"], "accumulated_threat_level": 0.8, "timewindow": 51} +{"Format": "IDEA0", "ID": "4560ce63-9f5f-497e-b049-e63d557c27c6", "DetectTime": "2024-05-21T12:29:37.075222+00:00", "EventTime": "2024-05-21T12:29:37.075241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18k3DIZLGLhy3MO4"], "accumulated_threat_level": 1.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "c97d1cf2-ee76-4054-a4a8-4d05ef4747e2", "DetectTime": "2024-05-21T12:29:37.107242+00:00", "EventTime": "2024-05-21T12:29:37.107261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjSbr44K1Tnt34vIU1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "592c5b26-fe47-4d0f-97b0-63e4183033a8", "DetectTime": "2024-05-21T12:29:37.134120+00:00", "EventTime": "2024-05-21T12:29:37.134140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.144.13.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGS2mT1ZkafrV3yFri"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "83f42577-6dc6-4029-9a6f-4a3dc6bf479f", "DetectTime": "2024-05-21T12:29:37.163827+00:00", "EventTime": "2024-05-21T12:29:37.163845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdDAi4aFU86JxmYj"], "accumulated_threat_level": 3.2, "timewindow": 51} +{"Format": "IDEA0", "ID": "f19596b2-908f-4c73-8f99-3cd1d99462aa", "DetectTime": "2024-05-21T12:29:37.197407+00:00", "EventTime": "2024-05-21T12:29:37.197429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4S7s1iay4s1zKQw1"], "accumulated_threat_level": 4.0, "timewindow": 51} +{"Format": "IDEA0", "ID": "347ddd9f-d6e4-4bb3-866c-83d25fc277c3", "DetectTime": "2024-05-21T12:29:37.209388+00:00", "EventTime": "2024-05-21T12:29:37.209408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6lCLh2WPNeyILR4m3"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "36b21c73-6f40-41b9-bb7a-858a4bcb6feb", "DetectTime": "2024-05-21T12:29:37.244027+00:00", "EventTime": "2024-05-21T12:29:37.244047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKxhE1SuLJHIAwFzk"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "6b8f854c-8a8a-42f9-8efa-6b8bf5514ba2", "DetectTime": "2024-05-21T12:29:37.274493+00:00", "EventTime": "2024-05-21T12:29:37.274515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg5bDt2vhRZCWaOqH4"], "accumulated_threat_level": 4.8, "timewindow": 51} +{"Format": "IDEA0", "ID": "8f1bac54-f15b-46f0-97d7-e7bab88f0361", "DetectTime": "2024-05-21T12:29:37.290686+00:00", "EventTime": "2024-05-21T12:29:37.290705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDO81H3dDsj6rsgMsh"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "efd4da7f-91a6-4e62-99d5-9d6dc0106a09", "DetectTime": "2024-05-21T12:29:37.369925+00:00", "EventTime": "2024-05-21T12:29:37.369945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN6Gh1yvyOnYpHTEc"], "accumulated_threat_level": 5.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "359ec40d-981d-4a77-8540-4b7f4f287714", "DetectTime": "2024-05-21T12:29:37.393110+00:00", "EventTime": "2024-05-21T12:29:37.393132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41n379Pqo8HXy9jg"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "ab57d928-10b9-414e-83a8-17eb605b0cde", "DetectTime": "2024-05-21T12:29:37.399048+00:00", "EventTime": "2024-05-21T12:29:37.399070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgAEx1i3sI5TkjuVf"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "5b90ba31-ab33-4656-b764-734338d7217b", "DetectTime": "2024-05-21T12:29:37.460172+00:00", "EventTime": "2024-05-21T12:29:37.460195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLDhi3bsbPta2ab27"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "875623aa-75e1-4443-8d42-94bada73c4d9", "DetectTime": "2024-05-21T12:29:37.465157+00:00", "EventTime": "2024-05-21T12:29:37.465175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6t3np1eDX6Tb4y3K3"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "3c9408fa-d200-4e50-b004-6a3070abd7d5", "DetectTime": "2024-05-21T12:29:37.530631+00:00", "EventTime": "2024-05-21T12:29:37.530652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oMUZWqkeIQrFzSi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 51} +{"Format": "IDEA0", "ID": "bcce4007-e9ad-4277-b8d5-8401d609bb12", "DetectTime": "2024-05-21T12:29:37.535578+00:00", "EventTime": "2024-05-21T12:29:37.535596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQtm5V2KqMwufLADE9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "fcf55914-c879-48e7-a611-f781efc34e59", "DetectTime": "2024-05-21T12:29:37.540346+00:00", "EventTime": "2024-05-21T12:29:37.540363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.164.5.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcCUjE3YC8pPT3VRY7"], "accumulated_threat_level": 4.8, "timewindow": 48} +{"Format": "IDEA0", "ID": "cf5661af-7eeb-4da4-9307-3e2c88c3b749", "DetectTime": "2024-05-21T12:29:37.545098+00:00", "EventTime": "2024-05-21T12:29:37.545117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.168.30.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEsA2J1XYP0c3qPnI1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "c04eff48-1c66-4374-a7c9-7e6329e20fea", "DetectTime": "2024-05-21T12:29:37.838298+00:00", "EventTime": "2024-05-21T12:29:37.838320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ICsv150lgaWnITh8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "b424b375-35a5-4111-85a4-c3f12b99a967", "DetectTime": "2024-05-21T12:29:37.851502+00:00", "EventTime": "2024-05-21T12:29:37.851525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJsDdk6HHwH5qYBnf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "6aaaa969-c71d-4502-b2b7-cacbfaf53bfd", "DetectTime": "2024-05-21T12:29:37.949201+00:00", "EventTime": "2024-05-21T12:29:37.949221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKAPC91YzyhbUtmPm3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "cb3e6080-c677-429f-b332-09845c0ac6c9", "DetectTime": "2024-05-21T12:29:37.974474+00:00", "EventTime": "2024-05-21T12:29:37.974495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74Wqh3kz51cV703G9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "240c51bf-a693-4a55-93a7-e17f8588dfe3", "DetectTime": "2024-05-21T12:29:37.997090+00:00", "EventTime": "2024-05-21T12:29:37.997110+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa08E9RwE7ulX3El"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "f78d55be-3571-40c0-ae16-4997664201e6", "DetectTime": "2024-05-21T12:29:38.010686+00:00", "EventTime": "2024-05-21T12:29:38.010709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa08E9RwE7ulX3El"], "accumulated_threat_level": 4.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "59227525-74fe-4fbc-af39-d239f8c6f005", "DetectTime": "2024-05-21T12:29:38.022695+00:00", "EventTime": "2024-05-21T12:29:38.022716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUIwVGKVRIjmHHiX2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "e43ce9a4-324c-4bc7-a031-cba33994f73c", "DetectTime": "2024-05-21T12:29:38.037510+00:00", "EventTime": "2024-05-21T12:29:38.037530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0Si43RYV4x60DZy3"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "5039adec-556d-4f78-a68b-9440bdbf1b45", "DetectTime": "2024-05-21T12:29:38.054754+00:00", "EventTime": "2024-05-21T12:29:38.054779+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0Si43RYV4x60DZy3"], "accumulated_threat_level": 5.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "3cd1647a-f65a-42c6-ae43-299333347ced", "DetectTime": "2024-05-21T12:29:38.065466+00:00", "EventTime": "2024-05-21T12:29:38.065484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMrqY12ryv8JCOhU3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "1c8dd0a1-2981-44d4-8727-79d2329a6848", "DetectTime": "2024-05-21T12:29:38.078785+00:00", "EventTime": "2024-05-21T12:29:38.078805+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnEd1n4M1JVgsaqd0b"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "4d1807c3-cb91-4587-9efa-4604d123aa20", "DetectTime": "2024-05-21T12:29:38.091392+00:00", "EventTime": "2024-05-21T12:29:38.091414+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnEd1n4M1JVgsaqd0b"], "accumulated_threat_level": 5.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "6d88b589-d38e-4c2f-beab-9eb47146bb84", "DetectTime": "2024-05-21T12:29:38.103941+00:00", "EventTime": "2024-05-21T12:29:38.103961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXttI2cnOjt8vCfD2"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "85c690c5-47c8-44a5-b2e6-f2fd740072e2", "DetectTime": "2024-05-21T12:29:38.116594+00:00", "EventTime": "2024-05-21T12:29:38.116613+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXttI2cnOjt8vCfD2"], "accumulated_threat_level": 6.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "8e62f56b-816c-4c37-9f03-aa9993c2bf71", "DetectTime": "2024-05-21T12:29:38.127623+00:00", "EventTime": "2024-05-21T12:29:38.127642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpCgJ3wNLVGQHmkWl"], "accumulated_threat_level": 9.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "6c8d677d-53f8-4d51-808e-200dce312046", "DetectTime": "2024-05-21T12:29:38.138943+00:00", "EventTime": "2024-05-21T12:29:38.138962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggwL1Um5TSi629f6"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "8ae7bc67-6ccc-4ca5-b846-b7cd0df504b3", "DetectTime": "2024-05-21T12:29:38.150318+00:00", "EventTime": "2024-05-21T12:29:38.150341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClggwL1Um5TSi629f6"], "accumulated_threat_level": 6.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "323d08c3-9fce-4540-bd5e-23d686f2f8b6", "DetectTime": "2024-05-21T12:29:38.172262+00:00", "EventTime": "2024-05-21T12:29:38.172283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.197.151.54"]}], "Attach": [{"Content": "Connection to unknown destination port 5554/UDP destination IP 142.197.151.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhLhR3v0pAYIW6Eyd"], "accumulated_threat_level": 10.4, "timewindow": 51} +{"Format": "IDEA0", "ID": "10bf844d-6b39-4bbc-91b7-3cbb2eb602b4", "DetectTime": "2024-05-21T12:29:38.185384+00:00", "EventTime": "2024-05-21T12:29:38.185407+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTiFt3gPxZcCudp35"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "c7433f81-9209-4111-9bf9-90a8562a1d26", "DetectTime": "2024-05-21T12:29:38.199700+00:00", "EventTime": "2024-05-21T12:29:38.199723+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTiFt3gPxZcCudp35"], "accumulated_threat_level": 7.0, "timewindow": 17} +{"Format": "IDEA0", "ID": "14324ec6-3516-475b-910e-7abebcfec68c", "DetectTime": "2024-05-21T12:29:38.210657+00:00", "EventTime": "2024-05-21T12:29:38.210675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NTvx3r4HGsYgvH73"], "accumulated_threat_level": 11.200000000000001, "timewindow": 51} +{"Format": "IDEA0", "ID": "b54f6649-b5cc-4b2b-ace7-9d79c1238d98", "DetectTime": "2024-05-21T12:29:38.221857+00:00", "EventTime": "2024-05-21T12:29:38.221879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyJZdu3ScKWBcADbub"], "accumulated_threat_level": 12.000000000000002, "timewindow": 51} +{"Format": "Json", "ID": "b54f6649-b5cc-4b2b-ace7-9d79c1238d98", "DetectTime": "2024-05-21T12:29:38.221857+00:00", "EventTime": "2024-05-21T12:29:38.221879+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "1970-01-03T02:07:15.499994+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2024/05/21 12:29:38.402085)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 51, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "04e248be-2cee-4b39-af5b-a4d8d3241d2f", "DetectTime": "2024-05-21T12:29:38.411788+00:00", "EventTime": "2024-05-21T12:29:38.411805+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kefj4hoazbPvy6C4"], "accumulated_threat_level": 0, "timewindow": 17} +{"Format": "IDEA0", "ID": "639b288b-e137-4974-85c8-8c9888a888aa", "DetectTime": "2024-05-21T12:29:38.423070+00:00", "EventTime": "2024-05-21T12:29:38.423090+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kefj4hoazbPvy6C4"], "accumulated_threat_level": 7.5, "timewindow": 17} +{"Format": "IDEA0", "ID": "37ca712a-b9b7-4ac6-a550-6eb6274701ea", "DetectTime": "2024-05-21T12:29:38.433198+00:00", "EventTime": "2024-05-21T12:29:38.433216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcWPsgFlaWeq76fg"], "accumulated_threat_level": 0.8, "timewindow": 51} +{"Format": "IDEA0", "ID": "91dfeb93-7f1a-4cf2-b0f4-68f1af405f7c", "DetectTime": "2024-05-21T12:29:38.443858+00:00", "EventTime": "2024-05-21T12:29:38.443879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJEkD3lKKE3NA02t4"], "accumulated_threat_level": 1.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "6776a9df-d0c9-4adf-947c-177599b0af10", "DetectTime": "2024-05-21T12:29:38.462037+00:00", "EventTime": "2024-05-21T12:29:38.462058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFdwI3uRsOQXAjB0k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "21b6cfdc-fd09-4086-b0f7-ddefc82b409d", "DetectTime": "2024-05-21T12:29:38.466422+00:00", "EventTime": "2024-05-21T12:29:38.466439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.4.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaCs5W1a4CO4Zg1nDd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "6096eccd-8ab7-4674-9444-986ae3e37789", "DetectTime": "2024-05-21T12:29:38.530324+00:00", "EventTime": "2024-05-21T12:29:38.530342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.144.13.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChheAc4kA4W0lEMhbd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "f67f8d5f-1d0c-45ba-ab86-c99906e9d295", "DetectTime": "2024-05-21T12:29:38.668895+00:00", "EventTime": "2024-05-21T12:29:38.668915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQT8C1i01JlXPs7ib", "CtEMtq4fzyMDFJXLN2", "C0zD43AWD3GqrO43", "CCYhjM207eB9K83Mgb"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "c3f12fba-6316-4b85-b7d8-97ae2d463a3c", "DetectTime": "2024-05-21T12:29:38.870258+00:00", "EventTime": "2024-05-21T12:29:38.870275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.164.5.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0gkwZzsZT1xdgSYe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "4545e08d-6ac2-46bd-9dd7-d0befd197d05", "DetectTime": "2024-05-21T12:29:38.899911+00:00", "EventTime": "2024-05-21T12:29:38.899934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.168.30.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ7h7X2WyMv7QWkf7h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "94267bef-84a5-4b58-be26-f283b626b111", "DetectTime": "2024-05-21T12:29:38.949240+00:00", "EventTime": "2024-05-21T12:29:38.949262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNAvQ3WC1QyGpJYDj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "17a953cb-8c0c-4cd4-8b6c-b3402de13469", "DetectTime": "2024-05-21T12:29:38.993214+00:00", "EventTime": "2024-05-21T12:29:38.993237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEloSgHcyIKxPENz8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "3bb6eb4f-212d-4418-b861-b44e378c7911", "DetectTime": "2024-05-21T12:29:39.192280+00:00", "EventTime": "2024-05-21T12:29:39.192310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlkryus0qOdSApC2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "d1b25fa4-a560-41f8-997d-1c8950d2e0cc", "DetectTime": "2024-05-21T12:29:39.222868+00:00", "EventTime": "2024-05-21T12:29:39.222890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUSRpFzjutPGrSP3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "7af8a435-56e0-4628-acf5-03a7e7f61619", "DetectTime": "2024-05-21T12:29:39.380397+00:00", "EventTime": "2024-05-21T12:29:39.380417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeCUr4JLZm6xMoIYa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "792855ab-1fd4-43d7-9108-bf8787dc653b", "DetectTime": "2024-05-21T12:29:39.426048+00:00", "EventTime": "2024-05-21T12:29:39.426067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVceOpBzqlfaLuE4h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "0af60f55-07a0-4f71-a677-c0f31b3e41ee", "DetectTime": "2024-05-21T12:29:39.459396+00:00", "EventTime": "2024-05-21T12:29:39.459418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZAoFRCiFGP7tqCl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "b8e2df04-f16e-41aa-b7d0-071586dab140", "DetectTime": "2024-05-21T12:29:39.490500+00:00", "EventTime": "2024-05-21T12:29:39.490519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Tct11XA0svCuWxe7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "2d377678-aef8-49f4-ae2a-45cf28600a88", "DetectTime": "2024-05-21T12:29:39.748873+00:00", "EventTime": "2024-05-21T12:29:39.748891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQWnmHVO4xWfc1ij"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "9cff5298-3b27-4702-b06f-1eab530668fa", "DetectTime": "2024-05-21T12:29:39.753874+00:00", "EventTime": "2024-05-21T12:29:39.753892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCggnbnsHcAdRy4b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "0d7d47f5-f8f6-4658-8069-348a58e6af6b", "DetectTime": "2024-05-21T12:29:39.758470+00:00", "EventTime": "2024-05-21T12:29:39.758489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmF9K3yzN5KJf7XIe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "fe3c2b9d-1482-48e7-9599-fdc9a1e94d39", "DetectTime": "2024-05-21T12:29:39.763302+00:00", "EventTime": "2024-05-21T12:29:39.763322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhDKC3Tdi7kX0LQk9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "1026d558-a773-4ebd-9389-f39b6541799f", "DetectTime": "2024-05-21T12:29:39.861514+00:00", "EventTime": "2024-05-21T12:29:39.861536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csf5n64HEj5xC2Kzz7"], "accumulated_threat_level": 3.7, "timewindow": 51} +{"Format": "IDEA0", "ID": "147e511a-5805-474d-9821-d214ba564079", "DetectTime": "2024-05-21T12:29:39.882846+00:00", "EventTime": "2024-05-21T12:29:39.882867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjledR2G5WOSVfvE2j"], "accumulated_threat_level": 4.5, "timewindow": 51} +{"Format": "IDEA0", "ID": "6a817ed1-f639-4a10-8088-bceaf392c0a8", "DetectTime": "2024-05-21T12:29:39.924220+00:00", "EventTime": "2024-05-21T12:29:39.924242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtpGo1w9zgwmiLb14"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "db9c8133-2f18-43cd-b719-7bcbf60a0b2c", "DetectTime": "2024-05-21T12:29:39.936162+00:00", "EventTime": "2024-05-21T12:29:39.936183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvrjMIFiNqEtcFnf"], "accumulated_threat_level": 5.3, "timewindow": 51} +{"Format": "IDEA0", "ID": "2a9b2f69-4e9f-4b64-8ab6-3cafaea833b2", "DetectTime": "2024-05-21T12:29:39.979222+00:00", "EventTime": "2024-05-21T12:29:39.979245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jpIj2RlaEkXpx6Te"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "94e3c8ce-1aa4-4d27-9e19-f094e635a430", "DetectTime": "2024-05-21T12:29:40.011376+00:00", "EventTime": "2024-05-21T12:29:40.011395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAyGD1Fh6oDzRG04d"], "accumulated_threat_level": 6.1, "timewindow": 51} +{"Format": "IDEA0", "ID": "c6363b45-a71b-489c-8897-3497ebebd362", "DetectTime": "2024-05-21T12:29:40.042458+00:00", "EventTime": "2024-05-21T12:29:40.042478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4H2rd405rUUs8S98d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "18ae23df-c49a-4689-bf63-286c8eb8b65f", "DetectTime": "2024-05-21T12:29:40.076710+00:00", "EventTime": "2024-05-21T12:29:40.076728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPtK73MvZ6Iva9bvb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 51} +{"Format": "IDEA0", "ID": "c2d6bf48-1805-4901-aeae-78171e78764d", "DetectTime": "2024-05-21T12:29:40.108309+00:00", "EventTime": "2024-05-21T12:29:40.108327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkzPP2qwBbtOMYxb7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "1d9b250b-6e03-444c-9a0b-ba00287b37e2", "DetectTime": "2024-05-21T12:29:40.132458+00:00", "EventTime": "2024-05-21T12:29:40.132482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46AzH3j3jhxPDpka"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "dd6583fd-6acc-41f2-bb52-d85953ee33c4", "DetectTime": "2024-05-21T12:29:40.161775+00:00", "EventTime": "2024-05-21T12:29:40.161793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjBDC4PWvVWTFARYc"], "accumulated_threat_level": 8.5, "timewindow": 51} +{"Format": "IDEA0", "ID": "a4ce9205-cb46-4498-a714-47ebbfbb1256", "DetectTime": "2024-05-21T12:29:40.194829+00:00", "EventTime": "2024-05-21T12:29:40.194847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGb3f1cuHy7I2gIvg"], "accumulated_threat_level": 9.3, "timewindow": 51} +{"Format": "IDEA0", "ID": "69461c26-4989-4a1f-b4cd-78c3c82bd269", "DetectTime": "2024-05-21T12:29:40.227506+00:00", "EventTime": "2024-05-21T12:29:40.227525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmgIi4HBxQLGfYNed"], "accumulated_threat_level": 10.100000000000001, "timewindow": 51} +{"Format": "IDEA0", "ID": "785ae208-f5c0-4712-9894-ee62ce85b51a", "DetectTime": "2024-05-21T12:29:40.265417+00:00", "EventTime": "2024-05-21T12:29:40.265436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHG2exX4VPwSz1tQb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 51} +{"Format": "IDEA0", "ID": "89e3e026-7525-4d93-a547-d7a4bfad9702", "DetectTime": "2024-05-21T12:29:40.289424+00:00", "EventTime": "2024-05-21T12:29:40.289447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClveiD3gR0jTlYM04l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "dfd7f7b4-ae94-40e2-a78e-e5a8304c7ce6", "DetectTime": "2024-05-21T12:29:40.320801+00:00", "EventTime": "2024-05-21T12:29:40.320821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNW69n4WImtnv0JZ32"], "accumulated_threat_level": 11.700000000000003, "timewindow": 51} +{"Format": "IDEA0", "ID": "e66d0abe-91bd-44fb-9d39-66de03c11169", "DetectTime": "2024-05-21T12:29:40.347385+00:00", "EventTime": "2024-05-21T12:29:40.347406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdBje4ArOB0mmisug"], "accumulated_threat_level": 12.500000000000004, "timewindow": 51} +{"Format": "Json", "ID": "e66d0abe-91bd-44fb-9d39-66de03c11169", "DetectTime": "2024-05-21T12:29:40.347385+00:00", "EventTime": "2024-05-21T12:29:40.347406+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-03T02:38:33.845331+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2024/05/21 12:29:40.615864)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 51, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "f928153f-2750-4c99-93db-0a54ded2e61e", "DetectTime": "2024-05-21T12:29:40.663507+00:00", "EventTime": "2024-05-21T12:29:40.663527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzS4bA1v8R4gM6J7ha"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "0d0cc80a-74b3-433b-9d2f-b0404e6383a2", "DetectTime": "2024-05-21T12:29:40.668516+00:00", "EventTime": "2024-05-21T12:29:40.668534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcC2pU3HqjZumkU8sb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "1066ae18-3eca-4c80-832f-49cda1a28cb2", "DetectTime": "2024-05-21T12:29:40.673020+00:00", "EventTime": "2024-05-21T12:29:40.673038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgGJA4Il874lai0Zj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "28745dbd-0d59-4fc6-b994-1f7edd607eb1", "DetectTime": "2024-05-21T12:29:40.677730+00:00", "EventTime": "2024-05-21T12:29:40.677748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqGVo1I0u2ZBdLTF3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "240bd9d2-6ba0-4d54-8dff-04c7b1c5c097", "DetectTime": "2024-05-21T12:29:40.714890+00:00", "EventTime": "2024-05-21T12:29:40.714912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZLBO1wiMigeP4tA"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "2f8a99ed-1c2b-472a-a4ba-d3867a2191d0", "DetectTime": "2024-05-21T12:29:40.774854+00:00", "EventTime": "2024-05-21T12:29:40.774876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJjZt4yg907d0Jqek"], "accumulated_threat_level": 0.8, "timewindow": 51} +{"Format": "IDEA0", "ID": "7c8caf7c-1498-4cc6-a22b-e5e66bd28a43", "DetectTime": "2024-05-21T12:29:40.780956+00:00", "EventTime": "2024-05-21T12:29:40.780977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co2RNl39YMeVzWu6zg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "2f5a67cd-7cfc-4812-a888-bf1db40e99b2", "DetectTime": "2024-05-21T12:29:40.814153+00:00", "EventTime": "2024-05-21T12:29:40.814178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhELj4SOh8JNH61X8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "e283e283-f33d-46ac-ac9c-2e45155c6c8f", "DetectTime": "2024-05-21T12:29:40.859448+00:00", "EventTime": "2024-05-21T12:29:40.859468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.138.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqOIeu3ApSblz9AfNl"], "accumulated_threat_level": 1.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "fc6c3811-6efe-4a22-b0a4-1dff65920fac", "DetectTime": "2024-05-21T12:29:40.890607+00:00", "EventTime": "2024-05-21T12:29:40.890627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpCVQe0TYay9ey25"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "1c720f52-914c-4764-85c7-052f55577d17", "DetectTime": "2024-05-21T12:29:40.916497+00:00", "EventTime": "2024-05-21T12:29:40.916519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwEBh4MhNxCuwjVKf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "71e8f331-0919-4f71-821a-f84fd41c66f1", "DetectTime": "2024-05-21T12:29:40.949200+00:00", "EventTime": "2024-05-21T12:29:40.949220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDT4ym2vjcHi2CcwT"], "accumulated_threat_level": 3.2, "timewindow": 51} +{"Format": "IDEA0", "ID": "2c3bf838-e031-4d64-a851-45892bae650e", "DetectTime": "2024-05-21T12:29:40.966112+00:00", "EventTime": "2024-05-21T12:29:40.966133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosvPx3fnmv5CnZ7K4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "5946e98f-f08a-4641-975e-3daac65bb8be", "DetectTime": "2024-05-21T12:29:40.993957+00:00", "EventTime": "2024-05-21T12:29:40.993979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGWCv1Er6zZj94FCi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "cfadda26-07d9-4afd-9baf-fadcba84dfd0", "DetectTime": "2024-05-21T12:29:41.022378+00:00", "EventTime": "2024-05-21T12:29:41.022395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEUXqezFOcMnuEti4"], "accumulated_threat_level": 4.0, "timewindow": 51} +{"Format": "IDEA0", "ID": "9cf3145b-7fb0-40da-9d3d-66f04708acb8", "DetectTime": "2024-05-21T12:29:41.049669+00:00", "EventTime": "2024-05-21T12:29:41.049689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7jE6U2KHUq1d5s3e4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "fe492a64-9709-48af-b0c8-4c29894f2475", "DetectTime": "2024-05-21T12:29:41.054748+00:00", "EventTime": "2024-05-21T12:29:41.054768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.224.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI7lAj1a4I6oppBgb2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "47787df8-e6f5-4ef4-a5bd-db7c2db08fe7", "DetectTime": "2024-05-21T12:29:41.310099+00:00", "EventTime": "2024-05-21T12:29:41.310118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmKf03H7l0KwP8QZ1"], "accumulated_threat_level": 4.8, "timewindow": 51} +{"Format": "IDEA0", "ID": "0af71109-593d-491a-9c8b-3cc134153793", "DetectTime": "2024-05-21T12:29:41.333240+00:00", "EventTime": "2024-05-21T12:29:41.333260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT0ypw14zaZ6vfaIQ2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "ab8b449f-9d2c-4e21-8f28-6f92478089f4", "DetectTime": "2024-05-21T12:29:41.379196+00:00", "EventTime": "2024-05-21T12:29:41.379217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C43Trt2Z94RfcaixLl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "f067a3c0-c98f-4c33-97f7-0a04df542cc3", "DetectTime": "2024-05-21T12:29:41.388809+00:00", "EventTime": "2024-05-21T12:29:41.388828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLf5bm133dHXiUSNc3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "496c6839-8a4e-49d6-baea-fe5584f7dc84", "DetectTime": "2024-05-21T12:29:41.400446+00:00", "EventTime": "2024-05-21T12:29:41.400467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DG1g1EORwmQ7GC79"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "45cc98a5-60bb-4e9e-9f13-2617e84a9683", "DetectTime": "2024-05-21T12:29:41.405124+00:00", "EventTime": "2024-05-21T12:29:41.405144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyPGt2vYIQtzykmWj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "e02681ee-1440-4ae2-b0d0-42821d8e4a66", "DetectTime": "2024-05-21T12:29:41.409616+00:00", "EventTime": "2024-05-21T12:29:41.409635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdpSp4YfuCBeZMjQ8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "eb8fd636-ac95-44de-abce-827b651e412d", "DetectTime": "2024-05-21T12:29:41.438479+00:00", "EventTime": "2024-05-21T12:29:41.438501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIY0OD1iX0CtuWpbC8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "69a2ea0b-ec7f-44f1-a427-767b04380877", "DetectTime": "2024-05-21T12:29:41.561412+00:00", "EventTime": "2024-05-21T12:29:41.561430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPgMO3yr2jBnQQj88"], "accumulated_threat_level": 5.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "a82a8b23-2bd6-4653-83fe-04ad9feddcb1", "DetectTime": "2024-05-21T12:29:41.565925+00:00", "EventTime": "2024-05-21T12:29:41.565943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxxuXJxuDc8rutBP9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "8ed87bc2-0533-433d-ab5b-7ba80bbd23cd", "DetectTime": "2024-05-21T12:29:41.570224+00:00", "EventTime": "2024-05-21T12:29:41.570241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuEgzv2Wc8KxuWtAif"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "de53fc27-32d5-44c2-b72c-b5a03b1faa3b", "DetectTime": "2024-05-21T12:29:41.636866+00:00", "EventTime": "2024-05-21T12:29:41.636889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkElk2CqtrHXBtqFk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "13775083-3188-45f1-8c4b-03dcd06dd4ed", "DetectTime": "2024-05-21T12:29:41.704186+00:00", "EventTime": "2024-05-21T12:29:41.704207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4gjs3LLBK5wZEdsa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 49} +{"Format": "IDEA0", "ID": "bde33033-cc0f-4cfb-9d01-476b0a381ae2", "DetectTime": "2024-05-21T12:29:41.715067+00:00", "EventTime": "2024-05-21T12:29:41.715085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clp3MIeCTPhO6XIp3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 51} +{"Format": "IDEA0", "ID": "a48f7964-f370-48f9-8c10-037cb5058fbd", "DetectTime": "2024-05-21T12:29:41.762602+00:00", "EventTime": "2024-05-21T12:29:41.762620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ANrh3lnD2SAHDvZe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "490318d3-c1ac-465f-b12c-322da5560348", "DetectTime": "2024-05-21T12:29:41.793972+00:00", "EventTime": "2024-05-21T12:29:41.793990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMdxLW1mViJjUybC9g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "1d5bba40-de83-4501-af8a-4b2587fdfc3c", "DetectTime": "2024-05-21T12:29:41.825309+00:00", "EventTime": "2024-05-21T12:29:41.825327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOOEk41Q6X3ZHJq0g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 51} +{"Format": "IDEA0", "ID": "d740c820-1920-42bc-8ee0-43670ea3dfcd", "DetectTime": "2024-05-21T12:29:41.861172+00:00", "EventTime": "2024-05-21T12:29:41.861191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlNjp21ckIMgqqqOh"], "accumulated_threat_level": 9.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "46ed4df3-abcc-46f2-b1a9-90021f6a79aa", "DetectTime": "2024-05-21T12:29:42.113287+00:00", "EventTime": "2024-05-21T12:29:42.113306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csnrje2dNBrZddzb9", "CWVKIx382wB6JFxFTf", "ClRKos2gDd8pYEACo2", "CF3kqE1X7CkNDZA6Qg"], "accumulated_threat_level": 0.5, "timewindow": 52} +{"Format": "IDEA0", "ID": "e48f5cf5-57e0-4566-af47-9af530df2103", "DetectTime": "2024-05-21T12:29:42.133433+00:00", "EventTime": "2024-05-21T12:29:42.133453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9DKc3DDenp3EfLD6"], "accumulated_threat_level": 10.4, "timewindow": 51} +{"Format": "IDEA0", "ID": "ad1fd130-5057-443e-a91b-255007e3b222", "DetectTime": "2024-05-21T12:29:42.201273+00:00", "EventTime": "2024-05-21T12:29:42.201298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CczGJG2xmIvNp6dDWj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 51} +{"Format": "IDEA0", "ID": "d04d369b-4c98-41d0-b4f0-3dd70395a6cc", "DetectTime": "2024-05-21T12:29:42.244143+00:00", "EventTime": "2024-05-21T12:29:42.244172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVzCt4lupWCFDwcjj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 51} +{"Format": "Json", "ID": "d04d369b-4c98-41d0-b4f0-3dd70395a6cc", "DetectTime": "2024-05-21T12:29:42.244143+00:00", "EventTime": "2024-05-21T12:29:42.244172+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "1970-01-03T02:38:52.568787+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 51. (real time 2024/05/21 12:29:42.468122)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 51, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "83433ab9-b7a6-4dca-bbe2-cd7104805d7f", "DetectTime": "2024-05-21T12:29:42.479303+00:00", "EventTime": "2024-05-21T12:29:42.479322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPOf53SFdvTCets5b"], "accumulated_threat_level": 0.8, "timewindow": 51} +{"Format": "IDEA0", "ID": "f32f2518-2535-4b06-b31d-7530584ba99a", "DetectTime": "2024-05-21T12:29:42.489565+00:00", "EventTime": "2024-05-21T12:29:42.489585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.98.90.21"]}], "Attach": [{"Content": "Connection to unknown destination port 25401/UDP destination IP 41.98.90.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxOYJ2ysCKQbEezDj"], "accumulated_threat_level": 1.6, "timewindow": 51} +{"Format": "IDEA0", "ID": "fd74105a-2c7b-4f75-aad9-11568d9c5eab", "DetectTime": "2024-05-21T12:29:42.506440+00:00", "EventTime": "2024-05-21T12:29:42.506458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6sRE21WY4Gtdn9qd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "fcd3635e-94cf-4264-9045-a8486ae0e4d6", "DetectTime": "2024-05-21T12:29:42.524943+00:00", "EventTime": "2024-05-21T12:29:42.524963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COAgUyxBJQqcQIvP1"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "68bed0f0-8b33-4f44-ab8a-5f60587af2f6", "DetectTime": "2024-05-21T12:29:42.559958+00:00", "EventTime": "2024-05-21T12:29:42.559979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptbGbatNxGZiMrtg"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "e621bbf4-9a04-4bfe-a669-d574c9864315", "DetectTime": "2024-05-21T12:29:42.629004+00:00", "EventTime": "2024-05-21T12:29:42.629022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crl6Zf17OudV7f5ke3"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "16999715-f74a-4fed-8ffd-ef41855bc0d6", "DetectTime": "2024-05-21T12:29:42.668881+00:00", "EventTime": "2024-05-21T12:29:42.668901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3oFjT2prYdPpcsuZb"], "accumulated_threat_level": 1.3, "timewindow": 52} +{"Format": "IDEA0", "ID": "a395ae10-184b-4992-9457-c980b5f5536f", "DetectTime": "2024-05-21T12:29:42.681792+00:00", "EventTime": "2024-05-21T12:29:42.681811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUm50g4jM4ihaylXy5"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "05c4d277-456c-4ee8-a87d-5acc26c10839", "DetectTime": "2024-05-21T12:29:42.719539+00:00", "EventTime": "2024-05-21T12:29:42.719558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkDcxQWRXrQyrRBl"], "accumulated_threat_level": 2.1, "timewindow": 52} +{"Format": "IDEA0", "ID": "8a58e6ee-7f02-4e6b-b444-56d06d19dc72", "DetectTime": "2024-05-21T12:29:42.729839+00:00", "EventTime": "2024-05-21T12:29:42.729857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcUB31XWNR0glqch4"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "7c89cc56-5c28-4be3-b52c-21a8af0d5bd0", "DetectTime": "2024-05-21T12:29:42.763958+00:00", "EventTime": "2024-05-21T12:29:42.763979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIDwj1in5vG6T1WSg"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c1d6a9da-f9f3-4c78-a934-23ee9e488d2c", "DetectTime": "2024-05-21T12:29:42.796672+00:00", "EventTime": "2024-05-21T12:29:42.796694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf8N31zr6Z11yOpO"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c2b32b4d-6957-4d57-bfbb-344de607246f", "DetectTime": "2024-05-21T12:29:42.828157+00:00", "EventTime": "2024-05-21T12:29:42.828178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBINTHsqrmvOPBI9g"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "e4353333-736e-4dbb-8ad9-d9f02ca2d60b", "DetectTime": "2024-05-21T12:29:42.859306+00:00", "EventTime": "2024-05-21T12:29:42.859327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFvJq130Xqoemb1Ml"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "44c24fe4-5813-4247-9479-8ea04f4a1960", "DetectTime": "2024-05-21T12:29:42.887224+00:00", "EventTime": "2024-05-21T12:29:42.887243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuHei3A3VpPk7NNjh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 52} +{"Format": "IDEA0", "ID": "5d4f1f7b-e86d-40c2-8ee4-1fc8fdb5b1b7", "DetectTime": "2024-05-21T12:29:42.911813+00:00", "EventTime": "2024-05-21T12:29:42.911834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb18Sg1R6ITiUv6ER7"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "75b82327-7631-4e4e-b045-b653284f8bed", "DetectTime": "2024-05-21T12:29:42.959395+00:00", "EventTime": "2024-05-21T12:29:42.959418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zAUuJaOco1OC5Z9"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "cdb4b8c6-cb3e-4b43-95ef-f3f16e577aa0", "DetectTime": "2024-05-21T12:29:43.074218+00:00", "EventTime": "2024-05-21T12:29:43.074238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0X0Ae4ZCs1YM4yyik"], "accumulated_threat_level": 3.7, "timewindow": 52} +{"Format": "IDEA0", "ID": "73f521eb-6d59-46f9-8e9d-f0a970c4b24e", "DetectTime": "2024-05-21T12:29:43.096277+00:00", "EventTime": "2024-05-21T12:29:43.096296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAXmo3xQ8IpDB0Er5"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "4cbe6519-6dbd-4f62-81e5-6d508d87b5b5", "DetectTime": "2024-05-21T12:29:43.353488+00:00", "EventTime": "2024-05-21T12:29:43.353507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3W0vd1E6H1pYngqY5"], "accumulated_threat_level": 4.5, "timewindow": 52} +{"Format": "IDEA0", "ID": "9eeb6342-7300-4e1b-b57e-549514f8f2b4", "DetectTime": "2024-05-21T12:29:43.385016+00:00", "EventTime": "2024-05-21T12:29:43.385033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZ9qv3sCFXvvLc6zf"], "accumulated_threat_level": 5.3, "timewindow": 52} +{"Format": "IDEA0", "ID": "1291ffe5-52db-4ecd-811b-64f8936792b2", "DetectTime": "2024-05-21T12:29:43.418665+00:00", "EventTime": "2024-05-21T12:29:43.418684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmcoWE41LV5x4mWr1k"], "accumulated_threat_level": 6.1, "timewindow": 52} +{"Format": "IDEA0", "ID": "173191e4-3104-4583-954a-aeb27474cbbd", "DetectTime": "2024-05-21T12:29:43.451039+00:00", "EventTime": "2024-05-21T12:29:43.451058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CClwzP29D4UKf0hc69"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 52} +{"Format": "IDEA0", "ID": "65f2d7b0-49ae-4900-b2f3-de37a911ba98", "DetectTime": "2024-05-21T12:29:43.483773+00:00", "EventTime": "2024-05-21T12:29:43.483794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ySjD4DNgJY2zlrO5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "92564f34-5131-46bf-b510-7e08fe7ce070", "DetectTime": "2024-05-21T12:29:43.507726+00:00", "EventTime": "2024-05-21T12:29:43.507746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptBOq3MztCtB1NX99"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "b9326835-049b-4e42-81df-2c48fd7b46d5", "DetectTime": "2024-05-21T12:29:43.534200+00:00", "EventTime": "2024-05-21T12:29:43.534224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKJW2h4jon3G0nKkH2"], "accumulated_threat_level": 8.5, "timewindow": 52} +{"Format": "IDEA0", "ID": "600f3377-3493-4861-91e3-95da5e31be8a", "DetectTime": "2024-05-21T12:29:43.577727+00:00", "EventTime": "2024-05-21T12:29:43.577746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhz6933ac4Ix9qZbl"], "accumulated_threat_level": 9.3, "timewindow": 52} +{"Format": "IDEA0", "ID": "d55d0d48-acc7-4934-abc0-b8713c6e3ec4", "DetectTime": "2024-05-21T12:29:43.680898+00:00", "EventTime": "2024-05-21T12:29:43.680918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CepQ8eSF8uktZJKv4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 52} +{"Format": "IDEA0", "ID": "d69e403b-7161-48ad-855c-f902845eb230", "DetectTime": "2024-05-21T12:29:43.710109+00:00", "EventTime": "2024-05-21T12:29:43.710130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qkM03iIKNd2X6q8b"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "d9fa0d82-1ab4-49ed-9b3d-c28bf01a8c4b", "DetectTime": "2024-05-21T12:29:43.738445+00:00", "EventTime": "2024-05-21T12:29:43.738467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBXeY3GBOt0f2Xzy9"], "accumulated_threat_level": 10.900000000000002, "timewindow": 52} +{"Format": "IDEA0", "ID": "08025a42-22fb-4a21-9c43-7290439aa17f", "DetectTime": "2024-05-21T12:29:43.819792+00:00", "EventTime": "2024-05-21T12:29:43.819812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mI3L3KcJMEoEmXe2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 52} +{"Format": "IDEA0", "ID": "69d4346e-ce7f-48cc-a7d4-ab9ce022e4b2", "DetectTime": "2024-05-21T12:29:43.854806+00:00", "EventTime": "2024-05-21T12:29:43.854826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJHAb4uIJ4tYC6Ye1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 52} +{"Format": "Json", "ID": "69d4346e-ce7f-48cc-a7d4-ab9ce022e4b2", "DetectTime": "2024-05-21T12:29:43.854806+00:00", "EventTime": "2024-05-21T12:29:43.854826+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-03T03:09:49.963121+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2024/05/21 12:29:44.038610)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 52, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "6ab9f264-3a97-4c94-97bf-f45b8313eba9", "DetectTime": "2024-05-21T12:29:44.054993+00:00", "EventTime": "2024-05-21T12:29:44.055038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSxWe4q60PEv0PZxi"], "accumulated_threat_level": 0.8, "timewindow": 52} +{"Format": "IDEA0", "ID": "9315db98-1ef5-43fe-9fff-af0763397351", "DetectTime": "2024-05-21T12:29:44.060885+00:00", "EventTime": "2024-05-21T12:29:44.060907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEQsF2bnY1vGscqo5"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "1fa0f6df-e532-4700-aefc-9c8e35586e48", "DetectTime": "2024-05-21T12:29:44.128221+00:00", "EventTime": "2024-05-21T12:29:44.128245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8L0t1PxguJ9zzWek"], "accumulated_threat_level": 1.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "ab59be7b-62f2-4cc5-90bb-3b6409f5c712", "DetectTime": "2024-05-21T12:29:44.170079+00:00", "EventTime": "2024-05-21T12:29:44.170100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C38Bjb3FIwPzVMFYed"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c04bd837-af02-433f-842a-0a9e27b61d85", "DetectTime": "2024-05-21T12:29:44.196466+00:00", "EventTime": "2024-05-21T12:29:44.196489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.143.194.227"]}], "Attach": [{"Content": "Connection to unknown destination port 6233/UDP destination IP 41.143.194.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZhPh1SkebGZRki5g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 52} +{"Format": "IDEA0", "ID": "39e00d27-cac2-4988-a1e4-9a81046595b9", "DetectTime": "2024-05-21T12:29:44.231619+00:00", "EventTime": "2024-05-21T12:29:44.231641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwvgX29oVIwmVBjbg"], "accumulated_threat_level": 3.2, "timewindow": 52} +{"Format": "IDEA0", "ID": "9eeda1b2-1e78-4310-8429-c9cefbe80cea", "DetectTime": "2024-05-21T12:29:44.259764+00:00", "EventTime": "2024-05-21T12:29:44.259785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGSz62eI7RinXAjJ9"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "321f9026-4d39-4129-bd44-bc4270de6e82", "DetectTime": "2024-05-21T12:29:44.287467+00:00", "EventTime": "2024-05-21T12:29:44.287486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZXGk3kZaqFyu1199"], "accumulated_threat_level": 4.0, "timewindow": 52} +{"Format": "IDEA0", "ID": "bf8a25b9-e993-4abe-963b-82dbca2bfeb8", "DetectTime": "2024-05-21T12:29:44.325717+00:00", "EventTime": "2024-05-21T12:29:44.325738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFH3p03iTHjWh8xKXj"], "accumulated_threat_level": 4.8, "timewindow": 52} +{"Format": "IDEA0", "ID": "46918430-5ef1-4221-9ae4-873cb9913463", "DetectTime": "2024-05-21T12:29:44.585167+00:00", "EventTime": "2024-05-21T12:29:44.585188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXaEv3W9clua2pzU4"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "b6070443-c426-4a96-abb6-0a7fd4ec9e07", "DetectTime": "2024-05-21T12:29:44.589795+00:00", "EventTime": "2024-05-21T12:29:44.589814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm5d2e4vhbVwugtcZi"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "04abc61e-f0c3-4aed-b25f-ce3797fef7a6", "DetectTime": "2024-05-21T12:29:44.630282+00:00", "EventTime": "2024-05-21T12:29:44.630305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7RNwB3xHPhvygpGg9"], "accumulated_threat_level": 5.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "20ff8c60-c5cf-403e-aa8f-75fe319ebca6", "DetectTime": "2024-05-21T12:29:44.660504+00:00", "EventTime": "2024-05-21T12:29:44.660523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdV4C13DqY10IUtiA9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 52} +{"Format": "IDEA0", "ID": "061ebb24-9db1-482b-984b-3f4800cea0cc", "DetectTime": "2024-05-21T12:29:44.707280+00:00", "EventTime": "2024-05-21T12:29:44.707299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5zdPhEFbujDM6k5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "7e3ae5dd-e587-486e-9c0f-f1afb32a2280", "DetectTime": "2024-05-21T12:29:44.739894+00:00", "EventTime": "2024-05-21T12:29:44.739912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsNS82aJ3dM9dQpyj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "35bac9aa-67a7-411a-91d4-68145b63f6d2", "DetectTime": "2024-05-21T12:29:44.779662+00:00", "EventTime": "2024-05-21T12:29:44.779682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HYu51Zem5O0jQyQ3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "8c849be6-6fd6-41e9-bdce-e1f84c2de0fb", "DetectTime": "2024-05-21T12:29:44.789239+00:00", "EventTime": "2024-05-21T12:29:44.789263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdUFc64vNVLTwVKRs5"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "31b9aae4-9991-4ce8-ab93-5f875800b8d6", "DetectTime": "2024-05-21T12:29:44.843764+00:00", "EventTime": "2024-05-21T12:29:44.843783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDGNw47k01T9dS70g"], "accumulated_threat_level": 9.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "9da85039-52b8-4778-bc22-fa8328ffa187", "DetectTime": "2024-05-21T12:29:44.905098+00:00", "EventTime": "2024-05-21T12:29:44.905120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNcCh3w6EbJpkIhyf"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "aa07bb01-8082-45d1-a574-d91de129ca12", "DetectTime": "2024-05-21T12:29:44.933446+00:00", "EventTime": "2024-05-21T12:29:44.933466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.205.87.147"]}], "Attach": [{"Content": "Connection to unknown destination port 5149/UDP destination IP 112.205.87.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ZQl3iX1FI3IiIpc"], "accumulated_threat_level": 10.4, "timewindow": 52} +{"Format": "IDEA0", "ID": "1c1b4bda-54e7-4ab2-aaf4-cd9fdddbdc11", "DetectTime": "2024-05-21T12:29:44.954857+00:00", "EventTime": "2024-05-21T12:29:44.954879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LTK31foJAvUiPR2k"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c507cc22-525f-4c0b-9e57-b0360e2226f2", "DetectTime": "2024-05-21T12:29:44.989147+00:00", "EventTime": "2024-05-21T12:29:44.989167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNB8753Fp7CoMS6ji8"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "950b714f-74fb-42cc-8ccc-83dcb4b97359", "DetectTime": "2024-05-21T12:29:45.020290+00:00", "EventTime": "2024-05-21T12:29:45.020312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKf55ZbklvFsl91ga"], "accumulated_threat_level": 11.200000000000001, "timewindow": 52} +{"Format": "IDEA0", "ID": "4bc1e9ec-e0c3-407d-a026-cd9939db83e4", "DetectTime": "2024-05-21T12:29:45.055523+00:00", "EventTime": "2024-05-21T12:29:45.055545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLnhCb9oukX05tIYd"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "3900d225-52a8-4809-9efd-86559a00092c", "DetectTime": "2024-05-21T12:29:45.082403+00:00", "EventTime": "2024-05-21T12:29:45.082442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUQgp1SJjiQeqOZzi"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "4e9ef8cf-fb28-42e7-9de3-4cc7b3b2363e", "DetectTime": "2024-05-21T12:29:45.115106+00:00", "EventTime": "2024-05-21T12:29:45.115126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0ZQP1IoLNPvqwMEa"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "08aabc5c-07be-4491-960b-64bfc27d027f", "DetectTime": "2024-05-21T12:29:45.146725+00:00", "EventTime": "2024-05-21T12:29:45.146745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzG0MH1zbj8cPddEu9"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "5740efca-59e6-4d78-9152-3c4b5c1c3d9e", "DetectTime": "2024-05-21T12:29:45.179675+00:00", "EventTime": "2024-05-21T12:29:45.179697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSjd2H6QHO62JvB2"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "79cedb91-1295-424b-aa70-a6035ba5f9b7", "DetectTime": "2024-05-21T12:29:45.216518+00:00", "EventTime": "2024-05-21T12:29:45.216539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.224.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpqt383QA9IMeq5rsd"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "b6463b7b-0336-4b05-a142-74cdc6a62ff9", "DetectTime": "2024-05-21T12:29:45.274361+00:00", "EventTime": "2024-05-21T12:29:45.274383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVgobgpWcUTX5kch"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "094ed880-ea66-438a-8ad7-fe830ecb5e48", "DetectTime": "2024-05-21T12:29:45.301051+00:00", "EventTime": "2024-05-21T12:29:45.301071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkIxuF2HtkMgHlJgY1"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "59082345-085c-44a3-8a1a-e6532c389746", "DetectTime": "2024-05-21T12:29:45.584372+00:00", "EventTime": "2024-05-21T12:29:45.584394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaFWe93WyxIKdjyl04", "CaPnhecfnOyHKpzya", "CRHE2H2aCmbsIx5It2", "CGUjmDxstmZsH2eb1"], "accumulated_threat_level": 11.700000000000001, "timewindow": 52} +{"Format": "IDEA0", "ID": "0831eaea-36c2-479c-9241-5008a9b21b51", "DetectTime": "2024-05-21T12:29:45.589751+00:00", "EventTime": "2024-05-21T12:29:45.589788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRDZl4R8vQW5JuhYk"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c3b6ac43-7532-408d-9663-ddecc1a4f94c", "DetectTime": "2024-05-21T12:29:45.594257+00:00", "EventTime": "2024-05-21T12:29:45.594274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4RQr20x5R1dlVFi8"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "78593928-a968-4f08-a524-4dcb0afa84a9", "DetectTime": "2024-05-21T12:29:45.598672+00:00", "EventTime": "2024-05-21T12:29:45.598690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJU6A1U4hN7LH2WQ"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "07220612-a1f9-4a70-a6a2-81bfeaec6429", "DetectTime": "2024-05-21T12:29:45.603131+00:00", "EventTime": "2024-05-21T12:29:45.603149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyqbe3VlsYVpm32V1"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "da5123ec-f126-4996-9f46-70492383c1a9", "DetectTime": "2024-05-21T12:29:45.716295+00:00", "EventTime": "2024-05-21T12:29:45.716316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVq0fG3LcAZyfkNU36"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "f31e931a-3463-4122-8268-29b240234a3b", "DetectTime": "2024-05-21T12:29:45.823090+00:00", "EventTime": "2024-05-21T12:29:45.823113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfLu51K4Wvbo8iKi"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "2259ee93-4c24-4f2b-af4b-aed65d8e35ae", "DetectTime": "2024-05-21T12:29:45.890687+00:00", "EventTime": "2024-05-21T12:29:45.890708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClCt2L3E6zLzTf8Xyi"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "0dd3d7fc-0a97-4a6e-8438-9817ee1f32fc", "DetectTime": "2024-05-21T12:29:45.956278+00:00", "EventTime": "2024-05-21T12:29:45.956299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKdBN3aTKEenRPmLa"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "f6f35ea2-64ba-4bc2-835c-7a584f417369", "DetectTime": "2024-05-21T12:29:46.092659+00:00", "EventTime": "2024-05-21T12:29:46.092681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcgjj2GOkRzXhXK74"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "9b898003-3655-4d2b-bf27-12cb7ac53c50", "DetectTime": "2024-05-21T12:29:46.226539+00:00", "EventTime": "2024-05-21T12:29:46.226560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.190.23.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnJhe3GdfR1ECURw6"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "b19f7b11-6c75-455c-bf2f-960d27ccb29f", "DetectTime": "2024-05-21T12:29:46.358286+00:00", "EventTime": "2024-05-21T12:29:46.358304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQE802R6LnlNqQLaa"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "4b6ddfad-d4c4-4076-a8ae-1f3ad3e5669e", "DetectTime": "2024-05-21T12:29:46.471563+00:00", "EventTime": "2024-05-21T12:29:46.471582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSVUzO3lZFa21pnO14"], "accumulated_threat_level": 12.500000000000002, "timewindow": 52} +{"Format": "Json", "ID": "4b6ddfad-d4c4-4076-a8ae-1f3ad3e5669e", "DetectTime": "2024-05-21T12:29:46.471563+00:00", "EventTime": "2024-05-21T12:29:46.471582+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "1970-01-03T03:41:04.923836+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2024/05/21 12:29:46.667833)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 52, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "3c5bd10e-3bdf-433a-b06f-ec4edb9f38dd", "DetectTime": "2024-05-21T12:29:46.683771+00:00", "EventTime": "2024-05-21T12:29:46.683787+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhg7S10C1W5s3q28l"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "fa601209-2e1e-4d1f-a649-905cd2a605e8", "DetectTime": "2024-05-21T12:29:46.695498+00:00", "EventTime": "2024-05-21T12:29:46.695516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhg7S10C1W5s3q28l"], "accumulated_threat_level": 4.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "74a013aa-c6fe-4c98-8046-73ce31c780d5", "DetectTime": "2024-05-21T12:29:46.700540+00:00", "EventTime": "2024-05-21T12:29:46.700557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUjLF2JcnrrIiQ3m3"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "072ece60-96e0-4dd4-a8b5-2c1ae8af52ca", "DetectTime": "2024-05-21T12:29:46.728253+00:00", "EventTime": "2024-05-21T12:29:46.728275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBKya7AoyuRf7svSh"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "930f46e0-c268-4516-b800-6be766d4d1e6", "DetectTime": "2024-05-21T12:29:46.802041+00:00", "EventTime": "2024-05-21T12:29:46.802061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEzHsN3gcD7fmXHtci"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "b6da4bf1-1b78-425a-95ba-8a62e2e198a6", "DetectTime": "2024-05-21T12:29:46.832456+00:00", "EventTime": "2024-05-21T12:29:46.832477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVzMKq8TiX7366WM9"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "637abc0c-c377-4acc-b495-aa76be268bac", "DetectTime": "2024-05-21T12:29:46.865371+00:00", "EventTime": "2024-05-21T12:29:46.865391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIoCHHYRaQA9GJw6d"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "6eb853d9-f355-4cea-ac92-b05652ae794e", "DetectTime": "2024-05-21T12:29:46.949147+00:00", "EventTime": "2024-05-21T12:29:46.949168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4E8wa1sJddamL5yr"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "41f6703b-771d-4597-a47f-1841937a686f", "DetectTime": "2024-05-21T12:29:46.984373+00:00", "EventTime": "2024-05-21T12:29:46.984394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CSSA4DI5MbaoMTtb"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "a13f0349-e8fe-460f-b6cb-1003887e4ec2", "DetectTime": "2024-05-21T12:29:46.996080+00:00", "EventTime": "2024-05-21T12:29:46.996100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj29w3D7LJoei36Ej"], "accumulated_threat_level": 0.8, "timewindow": 52} +{"Format": "IDEA0", "ID": "ab9f887f-1ead-454d-b752-f664a44adee6", "DetectTime": "2024-05-21T12:29:47.031121+00:00", "EventTime": "2024-05-21T12:29:47.031140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL6x674kzP4x4DRoDc"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "af64f81e-a8ac-4549-ba71-74d1440110e8", "DetectTime": "2024-05-21T12:29:47.304856+00:00", "EventTime": "2024-05-21T12:29:47.304875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZEbvCD9YaWZNKzg"], "accumulated_threat_level": 1.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "08ad3382-1424-4785-ab59-8a00baf92293", "DetectTime": "2024-05-21T12:29:47.309675+00:00", "EventTime": "2024-05-21T12:29:47.309693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPFVe1rcRZOoFAP1e"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "33f93746-6ee2-423f-9af7-3c18546185ff", "DetectTime": "2024-05-21T12:29:47.326987+00:00", "EventTime": "2024-05-21T12:29:47.327010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBzmi1qK0aRIKf57b"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "13e717f8-23a6-4ade-9054-d7e22fcc3349", "DetectTime": "2024-05-21T12:29:47.332572+00:00", "EventTime": "2024-05-21T12:29:47.332593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuY1xJ3bkmsCcS42dd"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "3e291110-f736-4dcb-87c4-891e25f4843d", "DetectTime": "2024-05-21T12:29:47.371941+00:00", "EventTime": "2024-05-21T12:29:47.371963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpl7pW1JRXw6K2nLLl"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "2862b3cf-10f5-4710-98bd-53b1877b71da", "DetectTime": "2024-05-21T12:29:47.390827+00:00", "EventTime": "2024-05-21T12:29:47.390848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwugMN6DL1D3Y3OP"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "29c84f97-0309-4897-9c79-cd92ba7104d9", "DetectTime": "2024-05-21T12:29:47.442807+00:00", "EventTime": "2024-05-21T12:29:47.442830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDc4Dj3BTDF1tm7z9g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 52} +{"Format": "IDEA0", "ID": "9accba4a-b527-4f92-b053-cb79ce749bc6", "DetectTime": "2024-05-21T12:29:47.473624+00:00", "EventTime": "2024-05-21T12:29:47.473643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQ4ay4eDI22nJr7L5"], "accumulated_threat_level": 3.2, "timewindow": 52} +{"Format": "IDEA0", "ID": "d6808c42-c101-4620-be24-48244ef59d80", "DetectTime": "2024-05-21T12:29:47.529557+00:00", "EventTime": "2024-05-21T12:29:47.529575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLkOz1QA1NpfZzyWe"], "accumulated_threat_level": 4.0, "timewindow": 52} +{"Format": "IDEA0", "ID": "b99552dd-39d1-4fd8-9545-9c1b2de30380", "DetectTime": "2024-05-21T12:29:47.564061+00:00", "EventTime": "2024-05-21T12:29:47.564086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGQR73dnTRT8FoJC"], "accumulated_threat_level": 4.8, "timewindow": 52} +{"Format": "IDEA0", "ID": "d7363704-1962-4ed5-9745-705922933615", "DetectTime": "2024-05-21T12:29:47.587856+00:00", "EventTime": "2024-05-21T12:29:47.587878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz2AdJ2sbHKPKc4iAd"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "be93b4bd-ae26-4273-86c5-90527d2c7a0d", "DetectTime": "2024-05-21T12:29:47.613694+00:00", "EventTime": "2024-05-21T12:29:47.613714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCMuM29mmzdLAs5Sc"], "accumulated_threat_level": 5.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "a88f3bfe-a72a-49e5-8e70-bd3de92ebac3", "DetectTime": "2024-05-21T12:29:47.647026+00:00", "EventTime": "2024-05-21T12:29:47.647046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuIhv034Cuf9mDanyc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 52} +{"Format": "IDEA0", "ID": "f6147da1-300f-431e-8e89-789e743bfa64", "DetectTime": "2024-05-21T12:29:47.676807+00:00", "EventTime": "2024-05-21T12:29:47.676825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW8y71i7GDPtydX53"], "accumulated_threat_level": 7.199999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "68d9bdbd-81c2-4c3d-a258-06fc88a4f9f2", "DetectTime": "2024-05-21T12:29:47.708756+00:00", "EventTime": "2024-05-21T12:29:47.708777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnIQIJ0mKVIS5qWX"], "accumulated_threat_level": 7.999999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "74c64a48-fc4a-4b85-aa28-469030cb641f", "DetectTime": "2024-05-21T12:29:47.742842+00:00", "EventTime": "2024-05-21T12:29:47.742863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.16.108.58"]}], "Attach": [{"Content": "Connection to unknown destination port 7037/UDP destination IP 99.16.108.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjUq22UV7xWLwu8zg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "3ee09794-2336-404f-a9d5-6ccdfffb89c1", "DetectTime": "2024-05-21T12:29:47.777881+00:00", "EventTime": "2024-05-21T12:29:47.777905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDi4jV3xN1lVXLNY31"], "accumulated_threat_level": 9.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "76f46b89-8ef1-494f-821a-4dcea736fc93", "DetectTime": "2024-05-21T12:29:47.808340+00:00", "EventTime": "2024-05-21T12:29:47.808361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDzldaNYtiTak481k"], "accumulated_threat_level": 10.4, "timewindow": 52} +{"Format": "IDEA0", "ID": "4641a930-2b99-4307-bbd9-b1a400df50fe", "DetectTime": "2024-05-21T12:29:47.841455+00:00", "EventTime": "2024-05-21T12:29:47.841477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBUx04x7Ab0Koerp2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 52} +{"Format": "IDEA0", "ID": "26bf8ccc-c409-4f4b-9603-f97849a8404a", "DetectTime": "2024-05-21T12:29:48.039338+00:00", "EventTime": "2024-05-21T12:29:48.039357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKaKTVHhrgqnPcV9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 52} +{"Format": "Json", "ID": "26bf8ccc-c409-4f4b-9603-f97849a8404a", "DetectTime": "2024-05-21T12:29:48.039338+00:00", "EventTime": "2024-05-21T12:29:48.039357+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "1970-01-03T03:41:25.235909+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 52. (real time 2024/05/21 12:29:48.233484)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 52, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "921c74ed-218d-44a2-ab40-cd109f5343c9", "DetectTime": "2024-05-21T12:29:48.253548+00:00", "EventTime": "2024-05-21T12:29:48.253568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.212.179.130"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 75.212.179.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU5lK18Tmmgjrneo"], "accumulated_threat_level": 0.8, "timewindow": 52} +{"Format": "IDEA0", "ID": "293b1db3-b85f-460e-b650-c04c3fcaccf9", "DetectTime": "2024-05-21T12:29:48.265700+00:00", "EventTime": "2024-05-21T12:29:48.265727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsnOJ2efkwcMEo9ug"], "accumulated_threat_level": 1.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "a37eba90-1be4-4a2b-9d7a-461db2f3761f", "DetectTime": "2024-05-21T12:29:48.285543+00:00", "EventTime": "2024-05-21T12:29:48.285565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoczz2Coavc9wsLCl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 52} +{"Format": "IDEA0", "ID": "5020ba88-c4a1-40fc-9fda-e14a475af351", "DetectTime": "2024-05-21T12:29:48.296724+00:00", "EventTime": "2024-05-21T12:29:48.296744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9ePn4KoqassCCNJk"], "accumulated_threat_level": 3.2, "timewindow": 52} +{"Format": "IDEA0", "ID": "8c38f187-0209-487a-92d9-a099fde6b721", "DetectTime": "2024-05-21T12:29:48.301497+00:00", "EventTime": "2024-05-21T12:29:48.301515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJK1Ih26nfnCN2KtX7"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "8af09595-b810-49e4-98f4-405af6452f5d", "DetectTime": "2024-05-21T12:29:48.312353+00:00", "EventTime": "2024-05-21T12:29:48.312371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpmHNE3QZoIM5loayg"], "accumulated_threat_level": 4.0, "timewindow": 52} +{"Format": "IDEA0", "ID": "67ad9b82-e042-45b2-b275-8cbcc6589453", "DetectTime": "2024-05-21T12:29:48.327805+00:00", "EventTime": "2024-05-21T12:29:48.327824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLdJ3lfEPaEceu4i3"], "accumulated_threat_level": 4.8, "timewindow": 52} +{"Format": "IDEA0", "ID": "25a968ec-9d63-4e62-9371-18bb6c56dcab", "DetectTime": "2024-05-21T12:29:48.338571+00:00", "EventTime": "2024-05-21T12:29:48.338589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWerTN2FyztOaAb0Ie"], "accumulated_threat_level": 5.6, "timewindow": 52} +{"Format": "IDEA0", "ID": "96e50413-fc5c-49cc-a434-b23e5223074f", "DetectTime": "2024-05-21T12:29:48.360532+00:00", "EventTime": "2024-05-21T12:29:48.360552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.167.93.138"]}], "Attach": [{"Content": "Connection to unknown destination port 15519/UDP destination IP 89.167.93.138. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyX4RQ1LuS3myso0Eb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 52} +{"Format": "IDEA0", "ID": "625b95f4-57cb-418f-90a1-55502832440c", "DetectTime": "2024-05-21T12:29:48.392051+00:00", "EventTime": "2024-05-21T12:29:48.392070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Nrh2zPqp67FK9Te"], "accumulated_threat_level": 7.199999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "790b5d4c-3d32-4b0b-8e8c-f0065de69cc7", "DetectTime": "2024-05-21T12:29:48.413150+00:00", "EventTime": "2024-05-21T12:29:48.413172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYSXc130feOMukjd91"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "7d1e687e-f2d2-4160-9c2c-8918192e4f77", "DetectTime": "2024-05-21T12:29:48.447070+00:00", "EventTime": "2024-05-21T12:29:48.447093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvN82c1Ct1k7k4F0u3"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "0e1e2c7d-aff6-4677-9efb-14e20c659d2d", "DetectTime": "2024-05-21T12:29:48.480610+00:00", "EventTime": "2024-05-21T12:29:48.480633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxD7JC2H0VV5JOnQtg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "a015f280-5d02-4829-82b2-df84f9c25066", "DetectTime": "2024-05-21T12:29:48.486224+00:00", "EventTime": "2024-05-21T12:29:48.486245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCUle14P52t9DB8qa"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "cf00578e-b71d-44a8-936e-b5a2fbaf13e8", "DetectTime": "2024-05-21T12:29:48.530158+00:00", "EventTime": "2024-05-21T12:29:48.530180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDGpU13EPG4dKpahOl"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "72096866-7bce-4bcb-bbe5-386c86e513c3", "DetectTime": "2024-05-21T12:29:48.554053+00:00", "EventTime": "2024-05-21T12:29:48.554078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chzo2p2G8w8zfq1awb"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "707018eb-fd1c-4977-8eb4-16388cc66f9a", "DetectTime": "2024-05-21T12:29:48.582486+00:00", "EventTime": "2024-05-21T12:29:48.582505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBzTBQ2zMLelikjkxa"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "98bc2cdb-8dee-4bb7-9d57-ab60ae96d21e", "DetectTime": "2024-05-21T12:29:48.613085+00:00", "EventTime": "2024-05-21T12:29:48.613107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6A6XJ8t3WwO24O6h"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "f7e9287a-7d0b-42a9-9aad-8082975fec4c", "DetectTime": "2024-05-21T12:29:48.944211+00:00", "EventTime": "2024-05-21T12:29:48.944233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1GY41L6l4V5anyBh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "999b758a-4a1b-4349-9b2d-ff1fc4374a0f", "DetectTime": "2024-05-21T12:29:48.987436+00:00", "EventTime": "2024-05-21T12:29:48.987458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr0on9kOKVf059bog", "CXVJd44a33EZzuxV05", "CT1Nba3FrJ0u9z5037", "CDp9W34JfbJBYFngB1"], "accumulated_threat_level": 0.5, "timewindow": 53} +{"Format": "IDEA0", "ID": "e73c923d-eb18-481e-a926-2bee3c4a9382", "DetectTime": "2024-05-21T12:29:48.993319+00:00", "EventTime": "2024-05-21T12:29:48.993338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuHI9o7iYb8QGehE8"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "0e578bc0-82f3-4bde-8d7c-422f2178cdd0", "DetectTime": "2024-05-21T12:29:48.997952+00:00", "EventTime": "2024-05-21T12:29:48.997971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnYjw4ryRsbRxAHgl"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "63e9ef23-3211-4016-a53d-f8406bdca94f", "DetectTime": "2024-05-21T12:29:49.004163+00:00", "EventTime": "2024-05-21T12:29:49.004182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEswko3YTKpP2538S9"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "a41a2813-0444-49a6-878a-987ad6e5db74", "DetectTime": "2024-05-21T12:29:49.009401+00:00", "EventTime": "2024-05-21T12:29:49.009420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnowW1sgHnAkeTL4c"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "e6fabd43-0612-49fc-ad1a-2c5c25863d3d", "DetectTime": "2024-05-21T12:29:49.013933+00:00", "EventTime": "2024-05-21T12:29:49.013950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgnEssDsTWbWqV2mc"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "03eeb03f-6879-447a-a437-7ca732bd5443", "DetectTime": "2024-05-21T12:29:49.023565+00:00", "EventTime": "2024-05-21T12:29:49.023586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNT7Uz1u20w7wK8Wkj"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "7f2934ba-c392-4a04-ba35-6310cd79a9e1", "DetectTime": "2024-05-21T12:29:49.028258+00:00", "EventTime": "2024-05-21T12:29:49.028276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSIucy3O2vrZDdQfW4"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "df20ef47-107b-4193-8a74-a98d9b5f66f4", "DetectTime": "2024-05-21T12:29:49.040917+00:00", "EventTime": "2024-05-21T12:29:49.040936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsA9NE4QbfiTbkA0fg"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "c4b84592-c632-4fdd-9fd8-474bdc074b89", "DetectTime": "2024-05-21T12:29:49.045618+00:00", "EventTime": "2024-05-21T12:29:49.045636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ5gDP34ZdGd1ZxNC1"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "24dd1b65-6295-4daf-9ce8-042f1d771634", "DetectTime": "2024-05-21T12:29:49.052837+00:00", "EventTime": "2024-05-21T12:29:49.052858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.224.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50PyV2fSRGWBRMOwf"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "2d99aa0e-e97b-4edc-b0b3-487effececdf", "DetectTime": "2024-05-21T12:29:49.205849+00:00", "EventTime": "2024-05-21T12:29:49.205870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrNmTk3ZDVqIL3U0C1"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "087beed2-3de6-48bf-ad76-8e20ddc54678", "DetectTime": "2024-05-21T12:29:49.236001+00:00", "EventTime": "2024-05-21T12:29:49.236022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoENN74VvHvCwPZ2ta"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "a0490d09-65a0-458e-a85e-353aeaa642f9", "DetectTime": "2024-05-21T12:29:49.372546+00:00", "EventTime": "2024-05-21T12:29:49.372565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsS5KJ1IFt271P2vZ1"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "ace2d87e-d29d-453c-b16d-d3297f0ec833", "DetectTime": "2024-05-21T12:29:49.405503+00:00", "EventTime": "2024-05-21T12:29:49.405521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHs7KG1ecN6r1plOuh"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "714e27a5-4f37-435a-907b-a981c596c7b8", "DetectTime": "2024-05-21T12:29:49.435502+00:00", "EventTime": "2024-05-21T12:29:49.435524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysmtaY8eTQV96XTf"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "8105fdbf-d7c0-4b0d-964f-e4033c87fd3c", "DetectTime": "2024-05-21T12:29:49.550300+00:00", "EventTime": "2024-05-21T12:29:49.550321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxiM2b1cvLTZABT396"], "accumulated_threat_level": 9.6, "timewindow": 50} +{"Format": "IDEA0", "ID": "aa39a5a6-0a21-4f42-a773-140f938ee1af", "DetectTime": "2024-05-21T12:29:49.851784+00:00", "EventTime": "2024-05-21T12:29:49.851807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.32.176.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJAr0i23H0Hn3abSLe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "268fd45e-7f60-4b02-8056-66d1c1b6823a", "DetectTime": "2024-05-21T12:29:50.126906+00:00", "EventTime": "2024-05-21T12:29:50.126927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEY791D1PjPBXa9B5"], "accumulated_threat_level": 1.3, "timewindow": 53} +{"Format": "IDEA0", "ID": "3cb6560b-af26-48e2-8375-7fb2b4768742", "DetectTime": "2024-05-21T12:29:50.148574+00:00", "EventTime": "2024-05-21T12:29:50.148595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.190.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJYVy733jJK4Bojvjh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "b42a9b7f-5701-4d89-bcf6-6658130ec0c7", "DetectTime": "2024-05-21T12:29:50.243853+00:00", "EventTime": "2024-05-21T12:29:50.243871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RFOzxVxjhZOm6Y1"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "60591fa7-6e6f-4cf5-9599-6c34c8ce3659", "DetectTime": "2024-05-21T12:29:50.256598+00:00", "EventTime": "2024-05-21T12:29:50.256618+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RFOzxVxjhZOm6Y1"], "accumulated_threat_level": 5.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "3f5e889b-1fbb-44f1-b7a5-1b9db10704e8", "DetectTime": "2024-05-21T12:29:50.392026+00:00", "EventTime": "2024-05-21T12:29:50.392046+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3NEV1a6QkE63AFt9"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "82c80706-4991-48cf-ae4a-0c135dc01030", "DetectTime": "2024-05-21T12:29:50.405117+00:00", "EventTime": "2024-05-21T12:29:50.405140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3NEV1a6QkE63AFt9"], "accumulated_threat_level": 5.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "3b3dc767-51d5-4229-bfbd-2aca9bde55d0", "DetectTime": "2024-05-21T12:29:50.410131+00:00", "EventTime": "2024-05-21T12:29:50.410149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1rXs2nfmTm8IhHfb", "CyCDle1V7SCgDpS9bk", "C4G01l3bMKAR4UV1ng", "CBSprD2TsatpwCbm61"], "accumulated_threat_level": 1.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "bca08a85-929e-4ce9-a64c-cb5536f554ce", "DetectTime": "2024-05-21T12:29:50.441088+00:00", "EventTime": "2024-05-21T12:29:50.441109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czhz4p1xz0cCici3pc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "1f00eeaa-435f-4320-8a56-dc43a78dbacb", "DetectTime": "2024-05-21T12:29:50.516264+00:00", "EventTime": "2024-05-21T12:29:50.516285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2k4RK1z0217TQU8li"], "accumulated_threat_level": 2.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "2b5a1d51-c6e1-4de3-bfb7-ac12fac1f848", "DetectTime": "2024-05-21T12:29:50.551001+00:00", "EventTime": "2024-05-21T12:29:50.551020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CximC54qgYi9NC92C1"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 53} +{"Format": "IDEA0", "ID": "d0d46a7b-960c-4ebf-a424-076a94cea934", "DetectTime": "2024-05-21T12:29:50.586943+00:00", "EventTime": "2024-05-21T12:29:50.586963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUHxz2gIaldZ6JXYd"], "accumulated_threat_level": 4.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "baa9b426-1073-4d67-ac34-31d877a577a5", "DetectTime": "2024-05-21T12:29:50.659418+00:00", "EventTime": "2024-05-21T12:29:50.659439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.72.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CToKVs37Rdhgn7kat4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "289c5bc7-c77e-4d93-92d0-adbabc89da1e", "DetectTime": "2024-05-21T12:29:50.781274+00:00", "EventTime": "2024-05-21T12:29:50.781294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqgw9KmpP1RADrRQc"], "accumulated_threat_level": 5.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "b7c81262-845a-42ff-8d66-cc5e41d631e8", "DetectTime": "2024-05-21T12:29:50.826127+00:00", "EventTime": "2024-05-21T12:29:50.826150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmNk24VLg7yfvurn7"], "accumulated_threat_level": 5.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "3c8b9f47-fef9-401c-b2e8-cfcba4f7b9b9", "DetectTime": "2024-05-21T12:29:51.112403+00:00", "EventTime": "2024-05-21T12:29:51.112426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.224.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1il002aSKxcKKFoug"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "9aa1dea3-8d0f-44cd-99b9-010fd7255678", "DetectTime": "2024-05-21T12:29:51.189028+00:00", "EventTime": "2024-05-21T12:29:51.189050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckin3g2d2pfyFgKeq2"], "accumulated_threat_level": 6.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "47b41c21-50e6-4e8f-b009-608f57bf4817", "DetectTime": "2024-05-21T12:29:51.204185+00:00", "EventTime": "2024-05-21T12:29:51.204205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9HzR3ipMpg1izUMe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "c1eda495-86c3-4737-9d4e-79892a3158a4", "DetectTime": "2024-05-21T12:29:51.232228+00:00", "EventTime": "2024-05-21T12:29:51.232250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZTsyXYkXZYd9qnk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d25300c2-49ac-4f38-b67a-66864d22d673", "DetectTime": "2024-05-21T12:29:51.243608+00:00", "EventTime": "2024-05-21T12:29:51.243628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crri9p2XySegkY4kT5"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 53} +{"Format": "IDEA0", "ID": "149cfbdf-0ccc-49ff-808b-86663c9600ec", "DetectTime": "2024-05-21T12:29:51.296805+00:00", "EventTime": "2024-05-21T12:29:51.296827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXL1gQ2LqLdrZIUz1g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "5a9b6dbb-1034-4f8d-8d2c-bf6508f9ab5b", "DetectTime": "2024-05-21T12:29:51.302191+00:00", "EventTime": "2024-05-21T12:29:51.302211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCljk2CddYoaZXNb2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "00048a1b-faed-4b74-b879-d610167b3212", "DetectTime": "2024-05-21T12:29:51.351277+00:00", "EventTime": "2024-05-21T12:29:51.351301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5OwD13AqGPgIlLPZb"], "accumulated_threat_level": 8.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "ec061aa3-7945-4fa4-9c7a-6c8749d6a71a", "DetectTime": "2024-05-21T12:29:51.356181+00:00", "EventTime": "2024-05-21T12:29:51.356201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNf0GvXa5DPdsPGZj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "4821f892-c9fb-4bc1-8329-d5b25f7952db", "DetectTime": "2024-05-21T12:29:51.391346+00:00", "EventTime": "2024-05-21T12:29:51.391364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGqSh4GdYMipJbCTl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "bd384ca7-be0f-4d0c-84e4-79ddf64074f9", "DetectTime": "2024-05-21T12:29:51.419114+00:00", "EventTime": "2024-05-21T12:29:51.419135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbAAq42sQAnUZIe3w3"], "accumulated_threat_level": 9.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "7d97b435-9327-4aa0-b8d9-72f56fe77044", "DetectTime": "2024-05-21T12:29:51.447577+00:00", "EventTime": "2024-05-21T12:29:51.447599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4Scw3hJ7Cm4VUh47"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "ec3ec2a7-5def-446e-8299-28037d0d5eea", "DetectTime": "2024-05-21T12:29:51.473130+00:00", "EventTime": "2024-05-21T12:29:51.473147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLkXo3XmnVE7xEw0c"], "accumulated_threat_level": 9.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "b843ca32-3a62-4f35-958d-01ff60196669", "DetectTime": "2024-05-21T12:29:51.495383+00:00", "EventTime": "2024-05-21T12:29:51.495405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAVyW39xuQe5BCY9i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "9da507d7-c0b8-42ea-9fb5-db1907eece88", "DetectTime": "2024-05-21T12:29:51.776567+00:00", "EventTime": "2024-05-21T12:29:51.776587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaChe31CmxS7v4hG1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "0fa44d32-f07f-49bb-8a29-cd4712c1578b", "DetectTime": "2024-05-21T12:29:51.788419+00:00", "EventTime": "2024-05-21T12:29:51.788439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COVUcS2I8XmcpOjobf"], "accumulated_threat_level": 10.600000000000001, "timewindow": 53} +{"Format": "IDEA0", "ID": "61f1b908-a83e-47db-ba3a-0798b814ac94", "DetectTime": "2024-05-21T12:29:51.793087+00:00", "EventTime": "2024-05-21T12:29:51.793105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS60X93BME1HiT4rA2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "7b156296-8602-40d8-afdb-36069d41777b", "DetectTime": "2024-05-21T12:29:51.797389+00:00", "EventTime": "2024-05-21T12:29:51.797406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdYpuS1XEcCjy8lT8l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d8a57ee5-59de-4218-b87c-c7afefffca90", "DetectTime": "2024-05-21T12:29:51.818271+00:00", "EventTime": "2024-05-21T12:29:51.818292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgd5kh3cFXThhvqYpd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "5fef9403-c902-42c8-b88d-df17164cbed9", "DetectTime": "2024-05-21T12:29:51.841623+00:00", "EventTime": "2024-05-21T12:29:51.841643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP6OEp3vjums0o34w6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "f98752bb-48e5-4ecd-859a-c9f1323cddfb", "DetectTime": "2024-05-21T12:29:51.906426+00:00", "EventTime": "2024-05-21T12:29:51.906447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2hP8x1IvpUnigNcN6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "cfee72b5-1bf8-4328-90ae-9b2aa684941c", "DetectTime": "2024-05-21T12:29:51.936893+00:00", "EventTime": "2024-05-21T12:29:51.936913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqdDL13MMYrpRxhOD5"], "accumulated_threat_level": 11.400000000000002, "timewindow": 53} +{"Format": "IDEA0", "ID": "869ff08d-a0cd-4c46-bd1c-db2dcf41b8cf", "DetectTime": "2024-05-21T12:29:51.967331+00:00", "EventTime": "2024-05-21T12:29:51.967352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NogG3NHNzrAZPgL6"], "accumulated_threat_level": 12.200000000000003, "timewindow": 53} +{"Format": "Json", "ID": "869ff08d-a0cd-4c46-bd1c-db2dcf41b8cf", "DetectTime": "2024-05-21T12:29:51.967331+00:00", "EventTime": "2024-05-21T12:29:51.967352+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-03T04:13:19.566300+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2024/05/21 12:29:52.364852)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 53, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "13014ee4-76c3-4ef1-9ebf-bfb0d9e4516e", "DetectTime": "2024-05-21T12:29:52.377190+00:00", "EventTime": "2024-05-21T12:29:52.377208+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6cq64ZYBdnbpItJ4"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "58299bb9-ed9e-41c3-a702-c66a43247d75", "DetectTime": "2024-05-21T12:29:52.388828+00:00", "EventTime": "2024-05-21T12:29:52.388847+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6cq64ZYBdnbpItJ4"], "accumulated_threat_level": 6.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f87d51d2-1cf0-4000-a841-dd3d614006c5", "DetectTime": "2024-05-21T12:29:52.398722+00:00", "EventTime": "2024-05-21T12:29:52.398739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71ACk4Qs0RH2eX5U5"], "accumulated_threat_level": 0.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "9b338510-e476-4000-ab1b-64111633aca4", "DetectTime": "2024-05-21T12:29:52.403368+00:00", "EventTime": "2024-05-21T12:29:52.403387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnxrKG1etUl9Em9S8j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "93748fe4-1d84-48d7-af42-a68025878c35", "DetectTime": "2024-05-21T12:29:52.414746+00:00", "EventTime": "2024-05-21T12:29:52.414764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrI8x1PXEJftF9UBg"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "c48b4858-4fa2-4e37-be38-c9b78e9914aa", "DetectTime": "2024-05-21T12:29:52.426342+00:00", "EventTime": "2024-05-21T12:29:52.426358+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrI8x1PXEJftF9UBg"], "accumulated_threat_level": 6.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "788e40f3-9a3d-4eeb-bac2-3c8b17e3b859", "DetectTime": "2024-05-21T12:29:52.440076+00:00", "EventTime": "2024-05-21T12:29:52.440094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IkxN2fWJnTK1XqLj"], "accumulated_threat_level": 1.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "1e2a5d7f-c9ec-4372-8055-cf7c60e28fd3", "DetectTime": "2024-05-21T12:29:52.444662+00:00", "EventTime": "2024-05-21T12:29:52.444680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzNziP7tqkuWzWF"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "ad678ee2-5abb-45ab-8b94-dbd1b1512c5b", "DetectTime": "2024-05-21T12:29:52.449846+00:00", "EventTime": "2024-05-21T12:29:52.449866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18k3DIZLGLhy3MO4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "69432a62-a50d-4251-bdb7-df6cd3c8eb74", "DetectTime": "2024-05-21T12:29:52.462000+00:00", "EventTime": "2024-05-21T12:29:52.462019+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwqVtM8Q0EuPrL6h"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "acfa5f1d-ffe5-469a-bb16-3afbbe5224d2", "DetectTime": "2024-05-21T12:29:52.475554+00:00", "EventTime": "2024-05-21T12:29:52.475575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwqVtM8Q0EuPrL6h"], "accumulated_threat_level": 7.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "828d8f0e-5402-4865-a6ee-f28e36f83c88", "DetectTime": "2024-05-21T12:29:52.485888+00:00", "EventTime": "2024-05-21T12:29:52.485908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTMwuO2gedDEoL3T92"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 53} +{"Format": "IDEA0", "ID": "12eb7967-818d-49a5-954b-80c2a51b2d28", "DetectTime": "2024-05-21T12:29:52.490720+00:00", "EventTime": "2024-05-21T12:29:52.490741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjSbr44K1Tnt34vIU1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d20d3273-cb8a-4365-8f66-ff06ab13e146", "DetectTime": "2024-05-21T12:29:52.495468+00:00", "EventTime": "2024-05-21T12:29:52.495487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdDAi4aFU86JxmYj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "160b72ba-85f9-468e-9613-5a0eff1097a4", "DetectTime": "2024-05-21T12:29:52.509607+00:00", "EventTime": "2024-05-21T12:29:52.509627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRkcNC9HY6U3Jsf"], "accumulated_threat_level": 3.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "858153f2-11ee-4559-95a8-36bc593bb6eb", "DetectTime": "2024-05-21T12:29:52.522247+00:00", "EventTime": "2024-05-21T12:29:52.522265+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CidleD4V3mUrDr19Q2"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "6613de39-25fb-4b1e-9d3d-1a8e19da37b5", "DetectTime": "2024-05-21T12:29:52.535882+00:00", "EventTime": "2024-05-21T12:29:52.535903+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CidleD4V3mUrDr19Q2"], "accumulated_threat_level": 7.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "52df2f23-7a93-49ab-b08b-0c5a34810906", "DetectTime": "2024-05-21T12:29:52.546608+00:00", "EventTime": "2024-05-21T12:29:52.546626+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTWtz23Exq3fAbjD4"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "691f0460-94ac-4b26-a216-0908fce3c9fc", "DetectTime": "2024-05-21T12:29:52.558834+00:00", "EventTime": "2024-05-21T12:29:52.558854+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTWtz23Exq3fAbjD4"], "accumulated_threat_level": 8.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "b0a455e6-d584-4bff-b34f-fee44bb39bd9", "DetectTime": "2024-05-21T12:29:52.569490+00:00", "EventTime": "2024-05-21T12:29:52.569507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPy4Zl3nBuXieToit"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "5cab2509-8271-4fee-8f28-3c28659c5a46", "DetectTime": "2024-05-21T12:29:52.581265+00:00", "EventTime": "2024-05-21T12:29:52.581283+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPy4Zl3nBuXieToit"], "accumulated_threat_level": 8.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "26e30437-cc72-4f28-be43-1d39bfe35ce5", "DetectTime": "2024-05-21T12:29:52.585744+00:00", "EventTime": "2024-05-21T12:29:52.585762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4S7s1iay4s1zKQw1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "7860248d-9d75-40c4-be74-dcf50e72637c", "DetectTime": "2024-05-21T12:29:52.590127+00:00", "EventTime": "2024-05-21T12:29:52.590146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN6Gh1yvyOnYpHTEc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "a9576779-9681-487a-9789-1ba8971a1ffe", "DetectTime": "2024-05-21T12:29:52.595513+00:00", "EventTime": "2024-05-21T12:29:52.595531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg5bDt2vhRZCWaOqH4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "e01cf097-8370-4514-a04d-c8ed09d27551", "DetectTime": "2024-05-21T12:29:52.613776+00:00", "EventTime": "2024-05-21T12:29:52.613804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFLJCzUQOGdlDxOl"], "accumulated_threat_level": 4.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "00d40113-9720-413e-bb27-0d6e8ddf6d6c", "DetectTime": "2024-05-21T12:29:52.625765+00:00", "EventTime": "2024-05-21T12:29:52.625783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5I7Vl3bigfcavC5D8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "72e0b399-dea2-4cf6-888f-19a144c2cc2d", "DetectTime": "2024-05-21T12:29:52.640669+00:00", "EventTime": "2024-05-21T12:29:52.640689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Gc7H1FPOifcxO97d"], "accumulated_threat_level": 5.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "272c6281-4b7e-45e2-b206-d6837f98b55a", "DetectTime": "2024-05-21T12:29:52.669869+00:00", "EventTime": "2024-05-21T12:29:52.669888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4arBQ2ibspc1gbo24"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 53} +{"Format": "IDEA0", "ID": "a9377f72-ceda-4808-9392-f10e9982f62f", "DetectTime": "2024-05-21T12:29:52.705942+00:00", "EventTime": "2024-05-21T12:29:52.705960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueeSO2OYBoTcUy9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "abd5d70b-3bb5-405b-99bd-44aa7fbc5915", "DetectTime": "2024-05-21T12:29:52.741765+00:00", "EventTime": "2024-05-21T12:29:52.741786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwO09YWAU3bzuhAcc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "7d301ec8-94f4-4d11-90d6-cfd87f4fd3a2", "DetectTime": "2024-05-21T12:29:52.767368+00:00", "EventTime": "2024-05-21T12:29:52.767385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUaX1Q3X6UfFYJnyM1"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "48d4ff4c-283c-4b57-90d3-cc81a5c24ca6", "DetectTime": "2024-05-21T12:29:52.779164+00:00", "EventTime": "2024-05-21T12:29:52.779185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUaX1Q3X6UfFYJnyM1"], "accumulated_threat_level": 9.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "146febc2-5b40-4079-93b2-85e9a4951572", "DetectTime": "2024-05-21T12:29:52.793942+00:00", "EventTime": "2024-05-21T12:29:52.793961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdlHj4ktRHaWBKzKj"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "8ab94ac3-6af1-4b85-915b-e631ce5a22a3", "DetectTime": "2024-05-21T12:29:52.806318+00:00", "EventTime": "2024-05-21T12:29:52.806337+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdlHj4ktRHaWBKzKj"], "accumulated_threat_level": 9.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "e59e5673-8913-4248-8116-8da99985b7cf", "DetectTime": "2024-05-21T12:29:52.817265+00:00", "EventTime": "2024-05-21T12:29:52.817283+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35gLAi8nOSzB3nZ4"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "4df28aef-5659-4f60-bdd8-294fe7932c77", "DetectTime": "2024-05-21T12:29:52.830833+00:00", "EventTime": "2024-05-21T12:29:52.830856+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35gLAi8nOSzB3nZ4"], "accumulated_threat_level": 10.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "33604fff-e8a5-45d9-b343-c831fbd67555", "DetectTime": "2024-05-21T12:29:52.843896+00:00", "EventTime": "2024-05-21T12:29:52.843917+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9v8N2YbjgXWQ3MFg"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "01c2a893-8554-41b9-85fa-ed22ebbb5985", "DetectTime": "2024-05-21T12:29:52.855274+00:00", "EventTime": "2024-05-21T12:29:52.855291+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9v8N2YbjgXWQ3MFg"], "accumulated_threat_level": 10.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "d574c3a2-2ccb-439d-8bbe-ee1a949f8b05", "DetectTime": "2024-05-21T12:29:52.859646+00:00", "EventTime": "2024-05-21T12:29:52.859663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oMUZWqkeIQrFzSi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "0da88392-24f1-48a3-b674-8b7211ba35cd", "DetectTime": "2024-05-21T12:29:52.870033+00:00", "EventTime": "2024-05-21T12:29:52.870051+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap3qa46NZWCkQvPNa"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "7fb45e3e-37e4-47a6-9a72-6871f7432c95", "DetectTime": "2024-05-21T12:29:52.881474+00:00", "EventTime": "2024-05-21T12:29:52.881495+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap3qa46NZWCkQvPNa"], "accumulated_threat_level": 11.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "324f1990-b83c-4339-b7f9-1ce3190021fd", "DetectTime": "2024-05-21T12:29:52.987065+00:00", "EventTime": "2024-05-21T12:29:52.987086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKAPC91YzyhbUtmPm3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "1bb3527a-97d9-4cd6-8faa-19b482386da4", "DetectTime": "2024-05-21T12:29:53.035013+00:00", "EventTime": "2024-05-21T12:29:53.035036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUIwVGKVRIjmHHiX2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "da6f1439-411c-4700-a2d2-db07377b8b9e", "DetectTime": "2024-05-21T12:29:53.069546+00:00", "EventTime": "2024-05-21T12:29:53.069564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkMrqY12ryv8JCOhU3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "88504a18-d334-4637-95bd-68438e397ea2", "DetectTime": "2024-05-21T12:29:53.103874+00:00", "EventTime": "2024-05-21T12:29:53.103896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpCgJ3wNLVGQHmkWl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "e2013f9e-ccdd-4ba9-ac90-e23dcf764bbd", "DetectTime": "2024-05-21T12:29:53.147398+00:00", "EventTime": "2024-05-21T12:29:53.147418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhLhR3v0pAYIW6Eyd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "ae068df5-83a9-4886-adb3-1de6b69cabe3", "DetectTime": "2024-05-21T12:29:53.175691+00:00", "EventTime": "2024-05-21T12:29:53.175712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NTvx3r4HGsYgvH73"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "cc578110-e338-4b95-ac9d-cb4f8280851e", "DetectTime": "2024-05-21T12:29:53.202454+00:00", "EventTime": "2024-05-21T12:29:53.202476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyJZdu3ScKWBcADbub"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "c644ca0f-c786-4cf3-8f50-4ab3047bf17b", "DetectTime": "2024-05-21T12:29:53.241670+00:00", "EventTime": "2024-05-21T12:29:53.241689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcWPsgFlaWeq76fg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d51666e6-efaa-4573-9c88-e6f1778f3fe9", "DetectTime": "2024-05-21T12:29:53.259921+00:00", "EventTime": "2024-05-21T12:29:53.259942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAx8h3wuIbZVruQ9j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "ac34a179-4e6a-43c9-8d57-121c3076a28c", "DetectTime": "2024-05-21T12:29:53.304510+00:00", "EventTime": "2024-05-21T12:29:53.304533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJEkD3lKKE3NA02t4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "aef2f578-7737-45ac-8915-250dfb2705de", "DetectTime": "2024-05-21T12:29:53.660791+00:00", "EventTime": "2024-05-21T12:29:53.660814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFdwI3uRsOQXAjB0k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "3fd1cf6b-bf41-473d-83c1-f3691b9f7eb5", "DetectTime": "2024-05-21T12:29:53.696340+00:00", "EventTime": "2024-05-21T12:29:53.696365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfryBu4mQXCcHQCJ4c", "CKTFbz4FPQM5dK6Yra", "CAYNGG2zJVg04yglU8", "CYOxSf5kisbETYUF3"], "accumulated_threat_level": 8.5, "timewindow": 53} +{"Format": "IDEA0", "ID": "c2c5eecc-3d72-46f4-8f39-11369ffceff9", "DetectTime": "2024-05-21T12:29:53.935689+00:00", "EventTime": "2024-05-21T12:29:53.935712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.130.197.245"]}], "Attach": [{"Content": "Connection to unknown destination port 6570/UDP destination IP 81.130.197.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COisez3htKtInfCMde"], "accumulated_threat_level": 9.3, "timewindow": 53} +{"Format": "IDEA0", "ID": "7b4878c1-6480-4973-a39e-e79d7ebfefbf", "DetectTime": "2024-05-21T12:29:54.060198+00:00", "EventTime": "2024-05-21T12:29:54.060217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQNiLa1Hjh8RdKVm4h"], "accumulated_threat_level": 10.100000000000001, "timewindow": 53} +{"Format": "IDEA0", "ID": "3c29dc40-4450-40f8-8d47-4f41812df3cd", "DetectTime": "2024-05-21T12:29:54.105840+00:00", "EventTime": "2024-05-21T12:29:54.105859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvaKmW3omKeuXGweX1"], "accumulated_threat_level": 10.900000000000002, "timewindow": 53} +{"Format": "IDEA0", "ID": "26b73934-a64e-4527-b09d-c91edc8c0290", "DetectTime": "2024-05-21T12:29:54.150601+00:00", "EventTime": "2024-05-21T12:29:54.150622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoaUbt4w4BnU1zRTZi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 53} +{"Format": "IDEA0", "ID": "872dee0a-a961-40e1-b8be-e1d21420c5d5", "DetectTime": "2024-05-21T12:29:54.197336+00:00", "EventTime": "2024-05-21T12:29:54.197362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSlYad4LSx4Yr1QPX6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 53} +{"Format": "Json", "ID": "872dee0a-a961-40e1-b8be-e1d21420c5d5", "DetectTime": "2024-05-21T12:29:54.197336+00:00", "EventTime": "2024-05-21T12:29:54.197362+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "1970-01-03T04:45:33.345163+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2024/05/21 12:29:54.425715)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 53, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "9536e163-b80b-437d-854e-1c99244ae8e7", "DetectTime": "2024-05-21T12:29:54.435778+00:00", "EventTime": "2024-05-21T12:29:54.435801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFiago26NTofsM38yh"], "accumulated_threat_level": 0.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "5ae6b024-6526-4a77-9680-193a40b3bac5", "DetectTime": "2024-05-21T12:29:54.441472+00:00", "EventTime": "2024-05-21T12:29:54.441494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.222.31.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJ5kxnLQHv0t5Iw4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "919d3cff-9cf8-4ba3-abaa-6f12fa06ee30", "DetectTime": "2024-05-21T12:29:54.452656+00:00", "EventTime": "2024-05-21T12:29:54.452676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUmdB1wxTNyIunxw9"], "accumulated_threat_level": 1.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "331aa32d-5396-4a6e-aeb1-7c5c7389bbc7", "DetectTime": "2024-05-21T12:29:54.463693+00:00", "EventTime": "2024-05-21T12:29:54.463712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtL9Pi1YLQlFEDKVYi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 53} +{"Format": "IDEA0", "ID": "492223d7-35d9-4bb9-b604-43c2512e39ae", "DetectTime": "2024-05-21T12:29:54.653154+00:00", "EventTime": "2024-05-21T12:29:54.653175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9GJ71ZCddz6cS8T8"], "accumulated_threat_level": 3.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "efd914a6-2b8a-4781-ad2d-42512822dbb2", "DetectTime": "2024-05-21T12:29:54.699888+00:00", "EventTime": "2024-05-21T12:29:54.699908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cma6744dEnjI8JN1rj"], "accumulated_threat_level": 4.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "e8df9919-b58f-4772-aa1b-e93a17cdb223", "DetectTime": "2024-05-21T12:29:54.745916+00:00", "EventTime": "2024-05-21T12:29:54.745934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXaIK1VDLuskkoJh4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "cc6e198e-1422-4fdd-ab6a-25c66d4815a5", "DetectTime": "2024-05-21T12:29:54.778402+00:00", "EventTime": "2024-05-21T12:29:54.778438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7L063oqG9xZ4RWoh"], "accumulated_threat_level": 5.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "296479f7-ce4b-4484-9c82-2b66447f94e5", "DetectTime": "2024-05-21T12:29:54.822095+00:00", "EventTime": "2024-05-21T12:29:54.822118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.221.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2414/UDP destination IP 188.129.221.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO1qeU3bDW0QjU4k28"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 53} +{"Format": "IDEA0", "ID": "51e884c9-83a3-450e-890f-8dd82966c0ac", "DetectTime": "2024-05-21T12:29:54.866856+00:00", "EventTime": "2024-05-21T12:29:54.866878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxFAY2e6iAa2LYtVa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "5626e76a-acc7-4451-825c-e0c7afdf8a43", "DetectTime": "2024-05-21T12:29:54.888011+00:00", "EventTime": "2024-05-21T12:29:54.888031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csf5n64HEj5xC2Kzz7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "32ce31a1-5251-488e-8409-34f5eef68e0c", "DetectTime": "2024-05-21T12:29:54.927906+00:00", "EventTime": "2024-05-21T12:29:54.927926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfZMWutGh0Ui6lik"], "accumulated_threat_level": 7.999999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "acceaf5e-3a0b-485f-a5a9-72857b3cc2bb", "DetectTime": "2024-05-21T12:29:54.941451+00:00", "EventTime": "2024-05-21T12:29:54.941472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjledR2G5WOSVfvE2j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "dbe85f58-d606-4606-84df-2683deff4beb", "DetectTime": "2024-05-21T12:29:54.968648+00:00", "EventTime": "2024-05-21T12:29:54.968667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5Pj82b3cerJELLu1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "428f9564-ad01-4acf-823d-5f918bcc876f", "DetectTime": "2024-05-21T12:29:54.996580+00:00", "EventTime": "2024-05-21T12:29:54.996601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvrjMIFiNqEtcFnf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "69ae5e7f-8a5f-44d4-a80a-99afef7cc1ce", "DetectTime": "2024-05-21T12:29:55.024383+00:00", "EventTime": "2024-05-21T12:29:55.024403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EPwLykNgrzFTkXd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "a8a8e9ff-c374-493c-9010-d63e607ce2f3", "DetectTime": "2024-05-21T12:29:55.324360+00:00", "EventTime": "2024-05-21T12:29:55.324382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGb3f1cuHy7I2gIvg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "da819716-6057-45b7-9b2f-37b4b388793a", "DetectTime": "2024-05-21T12:29:55.351758+00:00", "EventTime": "2024-05-21T12:29:55.351782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPtK73MvZ6Iva9bvb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "76b93b98-034c-439a-9792-48f21de13aed", "DetectTime": "2024-05-21T12:29:55.357158+00:00", "EventTime": "2024-05-21T12:29:55.357178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmgIi4HBxQLGfYNed"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "9d0c0f92-1c86-4601-998d-58b81bf5a5d1", "DetectTime": "2024-05-21T12:29:55.385340+00:00", "EventTime": "2024-05-21T12:29:55.385360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjBDC4PWvVWTFARYc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "37c42d69-33a5-4c91-9743-ea32c4a037ac", "DetectTime": "2024-05-21T12:29:55.408844+00:00", "EventTime": "2024-05-21T12:29:55.408866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkzPP2qwBbtOMYxb7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "35446b41-0571-40d6-a0a7-165cc39f2093", "DetectTime": "2024-05-21T12:29:55.414215+00:00", "EventTime": "2024-05-21T12:29:55.414236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHG2exX4VPwSz1tQb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "e063842d-4ce1-44bd-a1d0-4c8da831e393", "DetectTime": "2024-05-21T12:29:55.418879+00:00", "EventTime": "2024-05-21T12:29:55.418897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ16C1t4BZv5LcHxi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "3bfdf916-5d66-4f3a-b96a-a4f66d6ff808", "DetectTime": "2024-05-21T12:29:55.432340+00:00", "EventTime": "2024-05-21T12:29:55.432364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3KoGq6qgd9jenL1"], "accumulated_threat_level": 9.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "535ccd59-97d1-49b6-82e1-c52523ea5c1f", "DetectTime": "2024-05-21T12:29:55.452448+00:00", "EventTime": "2024-05-21T12:29:55.452471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAyGD1Fh6oDzRG04d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "7513b500-00de-473e-b96c-4a9d9ee68484", "DetectTime": "2024-05-21T12:29:55.533352+00:00", "EventTime": "2024-05-21T12:29:55.533371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNW69n4WImtnv0JZ32"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "bb7e95ae-3a3c-45a8-8528-fa26a3322e83", "DetectTime": "2024-05-21T12:29:55.577209+00:00", "EventTime": "2024-05-21T12:29:55.577227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55js23DxaXiPLbrQd"], "accumulated_threat_level": 10.4, "timewindow": 53} +{"Format": "IDEA0", "ID": "8745a8cb-c6db-4e67-9014-8c021f44715e", "DetectTime": "2024-05-21T12:29:55.604560+00:00", "EventTime": "2024-05-21T12:29:55.604579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhBMh2EbKbFax2F99"], "accumulated_threat_level": 11.200000000000001, "timewindow": 53} +{"Format": "IDEA0", "ID": "7ce4f2db-dc4b-4f6f-837a-bad898f28840", "DetectTime": "2024-05-21T12:29:55.641266+00:00", "EventTime": "2024-05-21T12:29:55.641285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnf1TF3cncY0jvp5xc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 53} +{"Format": "Json", "ID": "7ce4f2db-dc4b-4f6f-837a-bad898f28840", "DetectTime": "2024-05-21T12:29:55.641266+00:00", "EventTime": "2024-05-21T12:29:55.641285+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "1970-01-03T04:45:35.612480+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2024/05/21 12:29:55.826675)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 53, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "66ca731d-42e1-40bc-a30a-f5aa84ecb100", "DetectTime": "2024-05-21T12:29:55.890057+00:00", "EventTime": "2024-05-21T12:29:55.890080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJjZt4yg907d0Jqek"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "f0fa25ac-2a74-484b-9397-5049abadab70", "DetectTime": "2024-05-21T12:29:55.894981+00:00", "EventTime": "2024-05-21T12:29:55.895000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdBje4ArOB0mmisug"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "83d06856-1b14-4e9d-bdef-859b450d8c9b", "DetectTime": "2024-05-21T12:29:55.930680+00:00", "EventTime": "2024-05-21T12:29:55.930700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqOIeu3ApSblz9AfNl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "9294155c-6764-4b5b-b606-76dee8117497", "DetectTime": "2024-05-21T12:29:55.941552+00:00", "EventTime": "2024-05-21T12:29:55.941571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6AjA2jybGpWo4mr4"], "accumulated_threat_level": 0.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ed291ec7-ed21-49c3-ba2b-2678ef5462d4", "DetectTime": "2024-05-21T12:29:56.016254+00:00", "EventTime": "2024-05-21T12:29:56.016275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpCVQe0TYay9ey25"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "328c2408-1341-4a40-b69e-81129c2de480", "DetectTime": "2024-05-21T12:29:56.037861+00:00", "EventTime": "2024-05-21T12:29:56.037881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDT4ym2vjcHi2CcwT"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "0fa548ca-f680-4301-8b98-b301a7939951", "DetectTime": "2024-05-21T12:29:56.071672+00:00", "EventTime": "2024-05-21T12:29:56.071691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clso0524Hwdu3mDk9"], "accumulated_threat_level": 1.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "0352cfb8-0cd7-46ef-85e6-0ff06ebf9427", "DetectTime": "2024-05-21T12:29:56.091519+00:00", "EventTime": "2024-05-21T12:29:56.091541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEUXqezFOcMnuEti4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "1d058604-acad-48f4-a61b-ce55f192699a", "DetectTime": "2024-05-21T12:29:56.124020+00:00", "EventTime": "2024-05-21T12:29:56.124040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgS4EB3JMBBHSZP26c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 53} +{"Format": "IDEA0", "ID": "11e5c712-5ba5-47ec-bec6-95b9c7034815", "DetectTime": "2024-05-21T12:29:56.157521+00:00", "EventTime": "2024-05-21T12:29:56.157545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4DXG3T4H69DXvIjk"], "accumulated_threat_level": 3.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "dc255a1a-7f01-44c7-bdf6-929c3566f538", "DetectTime": "2024-05-21T12:29:56.215336+00:00", "EventTime": "2024-05-21T12:29:56.215359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawNXPaRajxMZ1QPe"], "accumulated_threat_level": 4.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "9d1be8ca-b34a-440e-8829-c1e2037aa77e", "DetectTime": "2024-05-21T12:29:56.379187+00:00", "EventTime": "2024-05-21T12:29:56.379205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLL4LWDdiEVPhSlk"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "d9ad29a0-ed7c-4992-917c-857ff14cc34f", "DetectTime": "2024-05-21T12:29:56.407076+00:00", "EventTime": "2024-05-21T12:29:56.407098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmKf03H7l0KwP8QZ1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "ba0d1b6c-a143-4eca-8393-bb6b2ced006d", "DetectTime": "2024-05-21T12:29:56.454880+00:00", "EventTime": "2024-05-21T12:29:56.454910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAnmv22LDkpjMh35J2"], "accumulated_threat_level": 5.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "483ddfe1-aba3-46e1-9f0d-6918ace2d1b0", "DetectTime": "2024-05-21T12:29:56.679933+00:00", "EventTime": "2024-05-21T12:29:56.679954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPgMO3yr2jBnQQj88"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "9287cc9c-abae-454c-9b82-00c8a2b14671", "DetectTime": "2024-05-21T12:29:56.752190+00:00", "EventTime": "2024-05-21T12:29:56.752218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clp3MIeCTPhO6XIp3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "6b9da28b-253f-4d69-8e79-9ea3ecf52d16", "DetectTime": "2024-05-21T12:29:56.784181+00:00", "EventTime": "2024-05-21T12:29:56.784202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ANrh3lnD2SAHDvZe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d2beebfc-a059-4f69-a971-7ee00f670928", "DetectTime": "2024-05-21T12:29:56.816181+00:00", "EventTime": "2024-05-21T12:29:56.816206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMdxLW1mViJjUybC9g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "a847ff95-fa14-493b-a315-b9c2013360bd", "DetectTime": "2024-05-21T12:29:56.850272+00:00", "EventTime": "2024-05-21T12:29:56.850295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOOEk41Q6X3ZHJq0g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d8fa70e9-2466-4d90-a964-7569789b5873", "DetectTime": "2024-05-21T12:29:56.874765+00:00", "EventTime": "2024-05-21T12:29:56.874787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.93.105.248"]}], "Attach": [{"Content": "Connection to unknown destination port 7628/UDP destination IP 186.93.105.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkpTB1qBQ4LPHBQ87"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 53} +{"Format": "IDEA0", "ID": "30050c37-caac-4924-895a-f9e5a45df81f", "DetectTime": "2024-05-21T12:29:56.908257+00:00", "EventTime": "2024-05-21T12:29:56.908277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSO4h2PqUk7TS14e9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "f718e7ad-e4ed-445a-a2a2-83c82e08d0b0", "DetectTime": "2024-05-21T12:29:56.975236+00:00", "EventTime": "2024-05-21T12:29:56.975257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLiBz2TXqqCB0Kdy8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "5afa5e6b-3b11-46d6-961e-6105b1c8561e", "DetectTime": "2024-05-21T12:29:57.239479+00:00", "EventTime": "2024-05-21T12:29:57.239500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9DKc3DDenp3EfLD6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "a2df2a2b-3c9e-4008-915a-cfeb4dd06140", "DetectTime": "2024-05-21T12:29:57.251964+00:00", "EventTime": "2024-05-21T12:29:57.251993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlNjp21ckIMgqqqOh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "d83f36ae-58be-4186-bf61-c8526900feec", "DetectTime": "2024-05-21T12:29:57.303605+00:00", "EventTime": "2024-05-21T12:29:57.303627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CczGJG2xmIvNp6dDWj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "ecffc586-b78a-4622-be74-4cc5fec135f0", "DetectTime": "2024-05-21T12:29:57.308606+00:00", "EventTime": "2024-05-21T12:29:57.308625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXNqp33GKM5wxV26e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "8de2f286-2c96-465c-9931-a0bb2b470c0c", "DetectTime": "2024-05-21T12:29:57.346712+00:00", "EventTime": "2024-05-21T12:29:57.346734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVzCt4lupWCFDwcjj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "acdc1dc5-2ace-49e2-9ae6-566c18a1f5df", "DetectTime": "2024-05-21T12:29:57.408026+00:00", "EventTime": "2024-05-21T12:29:57.408046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPOf53SFdvTCets5b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "4008b3dd-92e3-4581-9b28-67768bf14c10", "DetectTime": "2024-05-21T12:29:57.465016+00:00", "EventTime": "2024-05-21T12:29:57.465034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxOYJ2ysCKQbEezDj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "0b7f453e-80f5-4fc8-9437-0419527a6364", "DetectTime": "2024-05-21T12:29:57.499791+00:00", "EventTime": "2024-05-21T12:29:57.499809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR57zc4FlK0noaQ3Uc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "b705203a-2498-420a-9233-4133dbe22b97", "DetectTime": "2024-05-21T12:29:57.514374+00:00", "EventTime": "2024-05-21T12:29:57.514395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6sRE21WY4Gtdn9qd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 51} +{"Format": "IDEA0", "ID": "464f17eb-385e-4c12-9f55-3436246d7b40", "DetectTime": "2024-05-21T12:29:57.553870+00:00", "EventTime": "2024-05-21T12:29:57.553891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.120.59.74"]}], "Attach": [{"Content": "Connection to unknown destination port 11427/UDP destination IP 124.120.59.74. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mgaX3qGeM0pPEUua"], "accumulated_threat_level": 9.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "6bf464b3-f198-4db3-a609-83316c1ad2d1", "DetectTime": "2024-05-21T12:29:57.585517+00:00", "EventTime": "2024-05-21T12:29:57.585535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7w9uD1Xn1DYfn4Zf4"], "accumulated_threat_level": 10.4, "timewindow": 53} +{"Format": "IDEA0", "ID": "dfc126a6-0985-4064-97df-47e95f0f4c5e", "DetectTime": "2024-05-21T12:29:57.629857+00:00", "EventTime": "2024-05-21T12:29:57.629878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPz0CN7hcnPBJnk6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 53} +{"Format": "IDEA0", "ID": "f88a3f38-1d5f-49f8-a99f-87c9f1b107b0", "DetectTime": "2024-05-21T12:29:57.686353+00:00", "EventTime": "2024-05-21T12:29:57.686372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3oFjT2prYdPpcsuZb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "9316bc1b-1ce2-49aa-bd06-2e6c954be44a", "DetectTime": "2024-05-21T12:29:57.716978+00:00", "EventTime": "2024-05-21T12:29:57.716998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJJyiEqDXsHrhMdg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 53} +{"Format": "Json", "ID": "9316bc1b-1ce2-49aa-bd06-2e6c954be44a", "DetectTime": "2024-05-21T12:29:57.716978+00:00", "EventTime": "2024-05-21T12:29:57.716998+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "1970-01-03T04:48:12.803691+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2024/05/21 12:29:57.906450)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 53, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8b08a767-7100-4b19-a1db-ffbedb3a0dd1", "DetectTime": "2024-05-21T12:29:57.917635+00:00", "EventTime": "2024-05-21T12:29:57.917656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIhHp4qIPaTLl5QS4"], "accumulated_threat_level": 0.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "3bde51d9-4fe2-4534-a733-d5b89427ec67", "DetectTime": "2024-05-21T12:29:57.922447+00:00", "EventTime": "2024-05-21T12:29:57.922466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkDcxQWRXrQyrRBl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "f91eacf0-de6b-4539-9665-f9c770193bcb", "DetectTime": "2024-05-21T12:29:57.926990+00:00", "EventTime": "2024-05-21T12:29:57.927010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.197.151.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTUnNTdbIx2siHWSi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "959a7300-ee1b-4da3-abe8-f7e429599b48", "DetectTime": "2024-05-21T12:29:57.941063+00:00", "EventTime": "2024-05-21T12:29:57.941093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.232.123"]}], "Attach": [{"Content": "Connection to unknown destination port 7253/UDP destination IP 186.14.232.123. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch4VIM2YUbz3YoHQxa"], "accumulated_threat_level": 1.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "4bdcac07-6f88-45fc-acd6-d2661bc1dbfa", "DetectTime": "2024-05-21T12:29:57.946057+00:00", "EventTime": "2024-05-21T12:29:57.946076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuHei3A3VpPk7NNjh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "6367502a-de9c-4075-baf5-ce4a85055259", "DetectTime": "2024-05-21T12:29:57.985739+00:00", "EventTime": "2024-05-21T12:29:57.985762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"]}], "Attach": [{"Content": "Connection to unknown destination port 28779/UDP destination IP 2.134.161.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBlpn4KI61bIcF1X8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 53} +{"Format": "IDEA0", "ID": "ad778adb-8be8-4881-a040-60636fdbf1be", "DetectTime": "2024-05-21T12:29:58.171242+00:00", "EventTime": "2024-05-21T12:29:58.171264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0X0Ae4ZCs1YM4yyik"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "8ad7cad9-5568-47c5-b5e3-69f62e0a9029", "DetectTime": "2024-05-21T12:29:58.202591+00:00", "EventTime": "2024-05-21T12:29:58.202610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouuDov6WJC6sJIw8"], "accumulated_threat_level": 3.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "b8a1dfde-d5a5-446b-93b1-10a32280a08c", "DetectTime": "2024-05-21T12:29:58.250258+00:00", "EventTime": "2024-05-21T12:29:58.250277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLUNg3XQU0OJ3Wpx2"], "accumulated_threat_level": 4.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "af2e9406-fdf6-4803-bb4e-dcc55304ccc4", "DetectTime": "2024-05-21T12:29:58.369667+00:00", "EventTime": "2024-05-21T12:29:58.369688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.213.97"]}], "Attach": [{"Content": "Connection to unknown destination port 24196/UDP destination IP 94.66.213.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCuFgM2v51L8c4BYtj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "44ac8926-3635-4097-b823-fff057595b4b", "DetectTime": "2024-05-21T12:29:58.391992+00:00", "EventTime": "2024-05-21T12:29:58.392013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3W0vd1E6H1pYngqY5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "eb33ffde-e321-46a8-bf1d-0071f70ea03c", "DetectTime": "2024-05-21T12:29:58.422535+00:00", "EventTime": "2024-05-21T12:29:58.422557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZ9qv3sCFXvvLc6zf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "aeb6fcf5-6483-492f-a6e6-8557b6938e4c", "DetectTime": "2024-05-21T12:29:58.449605+00:00", "EventTime": "2024-05-21T12:29:58.449627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmcoWE41LV5x4mWr1k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "e1f36f93-dc86-41b0-a7e8-0ad4682fe9d5", "DetectTime": "2024-05-21T12:29:58.477498+00:00", "EventTime": "2024-05-21T12:29:58.477517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CClwzP29D4UKf0hc69"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "5434fb87-1907-40cc-8e8b-9b763bcc622d", "DetectTime": "2024-05-21T12:29:58.511161+00:00", "EventTime": "2024-05-21T12:29:58.511183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ySjD4DNgJY2zlrO5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "32ad6d44-d829-4eb0-a937-7069bbf3789a", "DetectTime": "2024-05-21T12:29:58.558634+00:00", "EventTime": "2024-05-21T12:29:58.558656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKJW2h4jon3G0nKkH2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "e9a85208-b640-4372-ae63-834203f79f09", "DetectTime": "2024-05-21T12:29:58.625909+00:00", "EventTime": "2024-05-21T12:29:58.625930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmhz6933ac4Ix9qZbl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "c6d131f3-afea-4701-a8d9-08dcf602c1af", "DetectTime": "2024-05-21T12:29:58.708627+00:00", "EventTime": "2024-05-21T12:29:58.708645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5UfrgfPx7hLnnYDl"], "accumulated_threat_level": 5.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "16f0d212-4f17-438a-8aee-5f1b11f31e5c", "DetectTime": "2024-05-21T12:29:58.733676+00:00", "EventTime": "2024-05-21T12:29:58.733696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CepQ8eSF8uktZJKv4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "fe926f42-fe09-455e-900c-5c900bfdc40f", "DetectTime": "2024-05-21T12:29:58.767390+00:00", "EventTime": "2024-05-21T12:29:58.767412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBXeY3GBOt0f2Xzy9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "1ffee9b9-299b-41e7-b6cb-db9ba90c2a4e", "DetectTime": "2024-05-21T12:29:58.795322+00:00", "EventTime": "2024-05-21T12:29:58.795343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72rUD1t3ONRsq9ELf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "8872eb39-cf3a-4331-a83b-b7a652f868d8", "DetectTime": "2024-05-21T12:29:58.847009+00:00", "EventTime": "2024-05-21T12:29:58.847028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mI3L3KcJMEoEmXe2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "d67d2215-8a36-46a0-9b2a-f23e386dc6fd", "DetectTime": "2024-05-21T12:29:58.877006+00:00", "EventTime": "2024-05-21T12:29:58.877025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJHAb4uIJ4tYC6Ye1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "2f7cad03-43e0-42a0-a91e-fae110b5fe00", "DetectTime": "2024-05-21T12:29:58.902528+00:00", "EventTime": "2024-05-21T12:29:58.902547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpxRp4E9DdOPC4AAj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 53} +{"Format": "IDEA0", "ID": "c97a621a-bfc0-499b-9f8a-5f81dcbe6c37", "DetectTime": "2024-05-21T12:29:58.930538+00:00", "EventTime": "2024-05-21T12:29:58.930559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSxWe4q60PEv0PZxi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "55126a13-b80f-4455-80a4-8c0623c7c219", "DetectTime": "2024-05-21T12:29:59.158763+00:00", "EventTime": "2024-05-21T12:29:59.158784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8L0t1PxguJ9zzWek"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "1fbd6b02-b82d-4fb1-b3d0-351e93b9c5ac", "DetectTime": "2024-05-21T12:29:59.223273+00:00", "EventTime": "2024-05-21T12:29:59.223293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZhPh1SkebGZRki5g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "2fa284fa-1b75-4d56-8cb5-d46527169393", "DetectTime": "2024-05-21T12:29:59.278358+00:00", "EventTime": "2024-05-21T12:29:59.278376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPplUogXjaEFev395"], "accumulated_threat_level": 7.199999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "4add8055-0e94-47c0-a7b8-47834b2ccb9c", "DetectTime": "2024-05-21T12:29:59.290511+00:00", "EventTime": "2024-05-21T12:29:59.290531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwvgX29oVIwmVBjbg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "009051db-e064-4699-a12d-d7f50d5fadb9", "DetectTime": "2024-05-21T12:29:59.323201+00:00", "EventTime": "2024-05-21T12:29:59.323222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZXGk3kZaqFyu1199"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "bc24bb61-ff5c-4082-9521-7864e9760b31", "DetectTime": "2024-05-21T12:29:59.551569+00:00", "EventTime": "2024-05-21T12:29:59.551586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.192.22.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1932/UDP destination IP 107.192.22.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxOg932bJEJfveqTJ9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "d7e46134-030a-4b7b-b820-fa239bf8055a", "DetectTime": "2024-05-21T12:29:59.587373+00:00", "EventTime": "2024-05-21T12:29:59.587394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFH3p03iTHjWh8xKXj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "94c138a0-d5d8-4f95-8948-da693a811837", "DetectTime": "2024-05-21T12:29:59.652761+00:00", "EventTime": "2024-05-21T12:29:59.652781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7RNwB3xHPhvygpGg9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "20c58595-7eac-434e-81aa-ab8c44159e20", "DetectTime": "2024-05-21T12:29:59.685593+00:00", "EventTime": "2024-05-21T12:29:59.685616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdV4C13DqY10IUtiA9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "2b20d2eb-ca20-4d58-bb91-1d2d4ef4fdf5", "DetectTime": "2024-05-21T12:29:59.717273+00:00", "EventTime": "2024-05-21T12:29:59.717294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPiQby2MoZDV8PcLye"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "8203e247-f0b1-49b4-bd4f-4614f0844928", "DetectTime": "2024-05-21T12:29:59.729406+00:00", "EventTime": "2024-05-21T12:29:59.729428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSMOT1yZBejGQWjf9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 53} +{"Format": "IDEA0", "ID": "0d037f1d-b577-4d8a-8479-9cd429250c4a", "DetectTime": "2024-05-21T12:29:59.771752+00:00", "EventTime": "2024-05-21T12:29:59.771774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5zdPhEFbujDM6k5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "581a0025-e262-4364-b5e8-812807a13216", "DetectTime": "2024-05-21T12:29:59.792993+00:00", "EventTime": "2024-05-21T12:29:59.793014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsNS82aJ3dM9dQpyj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "588fc0e2-743b-4611-9e0f-224b754ef001", "DetectTime": "2024-05-21T12:29:59.823714+00:00", "EventTime": "2024-05-21T12:29:59.823734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HYu51Zem5O0jQyQ3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "c708732a-ce15-47e4-9767-9525982efd41", "DetectTime": "2024-05-21T12:29:59.854667+00:00", "EventTime": "2024-05-21T12:29:59.854688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAn9P523yA8TW5QUn6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "b1196779-a24d-4d3f-b6e0-cf3bb5dce653", "DetectTime": "2024-05-21T12:29:59.869180+00:00", "EventTime": "2024-05-21T12:29:59.869198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59WFJ26Ya5vTsCUX1"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "7b064226-4faf-42ab-8952-55216184386b", "DetectTime": "2024-05-21T12:29:59.884481+00:00", "EventTime": "2024-05-21T12:29:59.884502+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59WFJ26Ya5vTsCUX1"], "accumulated_threat_level": 11.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "61a1e5b8-eb9e-495b-8a96-2d0e79f9e453", "DetectTime": "2024-05-21T12:29:59.896034+00:00", "EventTime": "2024-05-21T12:29:59.896052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCc5tH13idfzyparb6"], "accumulated_threat_level": 9.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "acf97e1e-9738-4450-93ae-fd2e7c01bc2c", "DetectTime": "2024-05-21T12:29:59.909074+00:00", "EventTime": "2024-05-21T12:29:59.909093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6kT62LKn38ajyGcd"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "65f29f48-3741-4c35-8d82-75effd682526", "DetectTime": "2024-05-21T12:29:59.922176+00:00", "EventTime": "2024-05-21T12:29:59.922195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6kT62LKn38ajyGcd"], "accumulated_threat_level": 12.0, "timewindow": 18} +{"Format": "Json", "ID": "65f29f48-3741-4c35-8d82-75effd682526", "DetectTime": "2024-05-21T12:29:59.922176+00:00", "EventTime": "2024-05-21T12:29:59.922195+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "1970-01-01T17:56:57.189225+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 18. (real time 2024/05/21 12:30:00.287753)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 18, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "44f86930-3dda-43dd-b70f-313a648039e7", "DetectTime": "2024-05-21T12:30:00.291796+00:00", "EventTime": "2024-05-21T12:30:00.291815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDGNw47k01T9dS70g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "a5fadaf1-1069-4e4d-849b-0fe69844a8a5", "DetectTime": "2024-05-21T12:30:00.296194+00:00", "EventTime": "2024-05-21T12:30:00.296212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ZQl3iX1FI3IiIpc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "e29beec1-20f3-4358-9921-b48fe2c49782", "DetectTime": "2024-05-21T12:30:00.310026+00:00", "EventTime": "2024-05-21T12:30:00.310045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHsIj1mr7P4eBfbIa"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f7817938-dc43-4550-9bd1-ef9034e1a57a", "DetectTime": "2024-05-21T12:30:00.322322+00:00", "EventTime": "2024-05-21T12:30:00.322340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHsIj1mr7P4eBfbIa"], "accumulated_threat_level": 0.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "18e8462e-8549-45c7-b7df-03eb550ca695", "DetectTime": "2024-05-21T12:30:00.326752+00:00", "EventTime": "2024-05-21T12:30:00.326770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKf55ZbklvFsl91ga"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "4815afaf-c0fa-4761-932f-b441c927d261", "DetectTime": "2024-05-21T12:30:00.338879+00:00", "EventTime": "2024-05-21T12:30:00.338903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLqsqSPGZEGKaxGwc"], "accumulated_threat_level": 10.4, "timewindow": 53} +{"Format": "IDEA0", "ID": "0b373af9-9747-49a1-9476-83431c236829", "DetectTime": "2024-05-21T12:30:00.350765+00:00", "EventTime": "2024-05-21T12:30:00.350784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.250.88.135"]}], "Attach": [{"Content": "Connection to unknown destination port 10427/UDP destination IP 88.250.88.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NzvE4XKQmBwWsGDb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 53} +{"Format": "IDEA0", "ID": "84e484d6-623a-4600-9b6b-e645f46d26b4", "DetectTime": "2024-05-21T12:30:00.382550+00:00", "EventTime": "2024-05-21T12:30:00.382568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsLAg42Knh1x3HrSo4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 53} +{"Format": "Json", "ID": "84e484d6-623a-4600-9b6b-e645f46d26b4", "DetectTime": "2024-05-21T12:30:00.382550+00:00", "EventTime": "2024-05-21T12:30:00.382568+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "1970-01-03T04:51:50.153019+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 53. (real time 2024/05/21 12:30:00.840264)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 53, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a13b59fa-7073-43ba-ae59-7933b6dd034d", "DetectTime": "2024-05-21T12:30:00.850742+00:00", "EventTime": "2024-05-21T12:30:00.850762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.206.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 21298/UDP destination IP 187.206.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnr1wzm8KkRJw4WA7"], "accumulated_threat_level": 0.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "69639876-30e1-4654-aa62-555ed376ce07", "DetectTime": "2024-05-21T12:30:00.861331+00:00", "EventTime": "2024-05-21T12:30:00.861349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYG4bE3fWRungakHe4"], "accumulated_threat_level": 1.6, "timewindow": 53} +{"Format": "IDEA0", "ID": "27736f72-94f0-4410-96e8-c4ff32e09b15", "DetectTime": "2024-05-21T12:30:00.870767+00:00", "EventTime": "2024-05-21T12:30:00.870784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["196.203.197.47"]}], "Attach": [{"Content": "Connection to unknown destination port 24417/UDP destination IP 196.203.197.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrMEA6GWzrmfRkCh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 53} +{"Format": "IDEA0", "ID": "0089e14c-cc26-4302-8ca3-a1f616a079fa", "DetectTime": "2024-05-21T12:30:00.891717+00:00", "EventTime": "2024-05-21T12:30:00.891739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmnak13MJ7EImjk0xa"], "accumulated_threat_level": 3.2, "timewindow": 53} +{"Format": "IDEA0", "ID": "cadb8979-5344-4666-9f6a-36b2de749c51", "DetectTime": "2024-05-21T12:30:00.936088+00:00", "EventTime": "2024-05-21T12:30:00.936108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xqZ14USRVFlyrBs6"], "accumulated_threat_level": 4.0, "timewindow": 53} +{"Format": "IDEA0", "ID": "7c275b94-37dd-450b-9446-aefa2d579227", "DetectTime": "2024-05-21T12:30:00.973228+00:00", "EventTime": "2024-05-21T12:30:00.973252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiI57s3eYw0Rd6C8Gc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ff1412d9-1d23-4658-807a-9885905f399f", "DetectTime": "2024-05-21T12:30:00.997301+00:00", "EventTime": "2024-05-21T12:30:00.997320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.138.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFR2O53oiDnsx3dKtl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "1284008f-2c31-4458-ac47-4eded4a33de1", "DetectTime": "2024-05-21T12:30:01.189878+00:00", "EventTime": "2024-05-21T12:30:01.189902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzqe71HKUyWGAaQyg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "404777d9-a37c-495c-bae5-52b90d91bf30", "DetectTime": "2024-05-21T12:30:01.495309+00:00", "EventTime": "2024-05-21T12:30:01.495330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSVUzO3lZFa21pnO14"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "98b24f35-d6ea-4128-9a51-de730ce490b4", "DetectTime": "2024-05-21T12:30:01.525891+00:00", "EventTime": "2024-05-21T12:30:01.525913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.98.90.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXsyW2iYzrPZnIKT"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "7b3c6b47-8983-4393-8ea0-27354c8c3c51", "DetectTime": "2024-05-21T12:30:01.944363+00:00", "EventTime": "2024-05-21T12:30:01.944382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4gzvcqZFY7Em2x6"], "accumulated_threat_level": 1.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "2255aafd-a07d-4e89-94ed-392aa86f0348", "DetectTime": "2024-05-21T12:30:01.983170+00:00", "EventTime": "2024-05-21T12:30:01.983188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jwYb4HuEf2csnwV7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "96f5a085-a93d-48d7-9f02-1c6987f00207", "DetectTime": "2024-05-21T12:30:02.028368+00:00", "EventTime": "2024-05-21T12:30:02.028389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9jSo4lfHe7OUzmzg"], "accumulated_threat_level": 3.2, "timewindow": 54} +{"Format": "IDEA0", "ID": "8b6e4ee9-cf4a-43e2-9408-f006e3d4324a", "DetectTime": "2024-05-21T12:30:02.051908+00:00", "EventTime": "2024-05-21T12:30:02.051930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj29w3D7LJoei36Ej"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "4ab86009-1e3e-41f0-9c9a-638097d82c18", "DetectTime": "2024-05-21T12:30:02.083882+00:00", "EventTime": "2024-05-21T12:30:02.083899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEorPz2biRXXDLCPgc"], "accumulated_threat_level": 4.0, "timewindow": 54} +{"Format": "IDEA0", "ID": "7ba3b8a5-afdc-4f3a-aa87-f26be006ddb8", "DetectTime": "2024-05-21T12:30:02.114507+00:00", "EventTime": "2024-05-21T12:30:02.114526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SZ6cXnv7bz14QLh"], "accumulated_threat_level": 4.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "88f0e179-2f10-4430-a611-b68f67c6bb31", "DetectTime": "2024-05-21T12:30:02.148874+00:00", "EventTime": "2024-05-21T12:30:02.148895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSIMo4rDlpnsm3hd"], "accumulated_threat_level": 5.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "5d4aef12-91c0-4455-b57c-6515bcaeb2a1", "DetectTime": "2024-05-21T12:30:02.196014+00:00", "EventTime": "2024-05-21T12:30:02.196035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6TQR2XQkva3d0jzb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 54} +{"Format": "IDEA0", "ID": "e903b42d-0541-4d43-a7c5-f692c8359d2b", "DetectTime": "2024-05-21T12:30:02.450254+00:00", "EventTime": "2024-05-21T12:30:02.450274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZEbvCD9YaWZNKzg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "aa11727a-606c-4f4d-9a5a-4bd0a1d56bc4", "DetectTime": "2024-05-21T12:30:02.485128+00:00", "EventTime": "2024-05-21T12:30:02.485149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDc4Dj3BTDF1tm7z9g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "b4214546-c84d-4d87-8248-f7b525f21086", "DetectTime": "2024-05-21T12:30:02.495691+00:00", "EventTime": "2024-05-21T12:30:02.495709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtydFL3dveUAjcJP86"], "accumulated_threat_level": 7.199999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "c361fe40-b698-4ce5-9945-e3dc2f56416a", "DetectTime": "2024-05-21T12:30:02.536996+00:00", "EventTime": "2024-05-21T12:30:02.537017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQ4ay4eDI22nJr7L5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "d4d84a5c-3198-4e30-a0ad-43f48da946cd", "DetectTime": "2024-05-21T12:30:02.575841+00:00", "EventTime": "2024-05-21T12:30:02.575860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCOGQ1NkrpNFEJCO4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "33e64c2a-c898-4f47-9449-248554655177", "DetectTime": "2024-05-21T12:30:02.580589+00:00", "EventTime": "2024-05-21T12:30:02.580608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLkOz1QA1NpfZzyWe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "4efe5d8d-de37-456a-a4a9-7fb25bea2764", "DetectTime": "2024-05-21T12:30:02.615318+00:00", "EventTime": "2024-05-21T12:30:02.615339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGQR73dnTRT8FoJC"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "e67b2a06-7818-456a-bfb0-0622228a0458", "DetectTime": "2024-05-21T12:30:02.649287+00:00", "EventTime": "2024-05-21T12:30:02.649305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnqUP1enW8Y051SH5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "d5f16dd4-3680-4693-824c-16b5975c9dda", "DetectTime": "2024-05-21T12:30:02.663809+00:00", "EventTime": "2024-05-21T12:30:02.663831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCMuM29mmzdLAs5Sc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "a5ad6bd4-95ba-4689-bad4-eaaa0b0e5752", "DetectTime": "2024-05-21T12:30:02.703131+00:00", "EventTime": "2024-05-21T12:30:02.703153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuIhv034Cuf9mDanyc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "e9cc98f7-aedf-42e9-a4e7-8d2dc96cdf86", "DetectTime": "2024-05-21T12:30:02.726866+00:00", "EventTime": "2024-05-21T12:30:02.726888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW8y71i7GDPtydX53"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "b0c4f4ff-2be7-4471-b70c-005f40430615", "DetectTime": "2024-05-21T12:30:02.737930+00:00", "EventTime": "2024-05-21T12:30:02.737948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTAjn1EWHOfUjXoYc"], "accumulated_threat_level": 9.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "da329a7e-af1a-4beb-afb5-0221715d6794", "DetectTime": "2024-05-21T12:30:02.778841+00:00", "EventTime": "2024-05-21T12:30:02.778861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnIQIJ0mKVIS5qWX"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "09210edb-f413-4612-b3b1-056a48bec7a4", "DetectTime": "2024-05-21T12:30:02.805228+00:00", "EventTime": "2024-05-21T12:30:02.805248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjUq22UV7xWLwu8zg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "1778556f-655e-4b8e-b16f-9db49752c91f", "DetectTime": "2024-05-21T12:30:02.869631+00:00", "EventTime": "2024-05-21T12:30:02.869649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDi4jV3xN1lVXLNY31"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "463d8e32-3612-405e-9f7c-8a7e2059a9aa", "DetectTime": "2024-05-21T12:30:02.890587+00:00", "EventTime": "2024-05-21T12:30:02.890608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDzldaNYtiTak481k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "17843d31-e701-461e-bf05-6a3c88e67b37", "DetectTime": "2024-05-21T12:30:02.933551+00:00", "EventTime": "2024-05-21T12:30:02.933568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CITRt2ZQyogg50u3b"], "accumulated_threat_level": 10.4, "timewindow": 54} +{"Format": "IDEA0", "ID": "c5976273-523f-4e46-a33e-7c4d9d8507ab", "DetectTime": "2024-05-21T12:30:02.962234+00:00", "EventTime": "2024-05-21T12:30:02.962254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLuLOhP6kS6lQxUUf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 54} +{"Format": "IDEA0", "ID": "afc0ab6f-0e81-4ae4-8119-6043c47183ef", "DetectTime": "2024-05-21T12:30:02.992813+00:00", "EventTime": "2024-05-21T12:30:02.992833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7u5d2gHV5Cvn7bs3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 54} +{"Format": "Json", "ID": "afc0ab6f-0e81-4ae4-8119-6043c47183ef", "DetectTime": "2024-05-21T12:30:02.992813+00:00", "EventTime": "2024-05-21T12:30:02.992833+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "1970-01-03T05:23:23.212210+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2024/05/21 12:30:03.140325)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 54, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7ba1c0a1-7afe-46c8-998f-f553bfd30931", "DetectTime": "2024-05-21T12:30:03.150544+00:00", "EventTime": "2024-05-21T12:30:03.150565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBUx04x7Ab0Koerp2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "11bc784d-8c21-404d-a294-a106a223f86d", "DetectTime": "2024-05-21T12:30:03.155715+00:00", "EventTime": "2024-05-21T12:30:03.155733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKaKTVHhrgqnPcV9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "c32d99e0-2375-46f3-923e-446a90c8f06d", "DetectTime": "2024-05-21T12:30:03.242181+00:00", "EventTime": "2024-05-21T12:30:03.242200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2f8u47Uzn2Vws4b3", "CHRw1i1SW4FRBgZl79", "Ccj9Jm4wQYSLVPjVq9", "CoYWWw4Fvd8SpkeT27"], "accumulated_threat_level": 0.5, "timewindow": 54} +{"Format": "IDEA0", "ID": "0f302422-0406-4d67-a3db-8fcf99750b87", "DetectTime": "2024-05-21T12:30:03.354047+00:00", "EventTime": "2024-05-21T12:30:03.354066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9ePn4KoqassCCNJk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "b4c53508-f9f3-42fe-8501-6e2bb53db6ec", "DetectTime": "2024-05-21T12:30:03.359004+00:00", "EventTime": "2024-05-21T12:30:03.359024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU5lK18Tmmgjrneo"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "e7a32b11-fa13-4e7d-8118-55ffbfa2fb26", "DetectTime": "2024-05-21T12:30:03.365765+00:00", "EventTime": "2024-05-21T12:30:03.365785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpmHNE3QZoIM5loayg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "0b6484d8-0a96-47e7-a24f-3418f0aaaef0", "DetectTime": "2024-05-21T12:30:03.371091+00:00", "EventTime": "2024-05-21T12:30:03.371111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvPWxV2QyNFURyG3t6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "8222e018-cea1-4be1-8899-e793b21f04c3", "DetectTime": "2024-05-21T12:30:03.412576+00:00", "EventTime": "2024-05-21T12:30:03.412598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoczz2Coavc9wsLCl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "c94e6007-d537-4caa-9c3d-e0b87f8ae529", "DetectTime": "2024-05-21T12:30:03.420344+00:00", "EventTime": "2024-05-21T12:30:03.420364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsnOJ2efkwcMEo9ug"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "1f696aa1-e55c-4743-9e7f-6ffb02346653", "DetectTime": "2024-05-21T12:30:03.512846+00:00", "EventTime": "2024-05-21T12:30:03.512870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLdJ3lfEPaEceu4i3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "7b7c602c-b612-47ee-89b7-bd105826fb7e", "DetectTime": "2024-05-21T12:30:03.518745+00:00", "EventTime": "2024-05-21T12:30:03.518767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWerTN2FyztOaAb0Ie"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "98e22b41-def6-4614-b8dc-bb490223072d", "DetectTime": "2024-05-21T12:30:03.556992+00:00", "EventTime": "2024-05-21T12:30:03.557011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdxML1CHYXNEPNe1l"], "accumulated_threat_level": 1.3, "timewindow": 54} +{"Format": "IDEA0", "ID": "369dc926-9826-4dbc-b8fe-dec6ad148162", "DetectTime": "2024-05-21T12:30:03.582396+00:00", "EventTime": "2024-05-21T12:30:03.582432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyX4RQ1LuS3myso0Eb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "f21a574c-37cc-427d-bcf4-609bedfbaebe", "DetectTime": "2024-05-21T12:30:03.607816+00:00", "EventTime": "2024-05-21T12:30:03.607836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Nrh2zPqp67FK9Te"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "a2608fc6-5c9d-44ff-8df8-ddb4643db52d", "DetectTime": "2024-05-21T12:30:03.613512+00:00", "EventTime": "2024-05-21T12:30:03.613533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf4hx2ltTMqiVDgNi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "47611cc1-8579-4ea7-9f69-cad95c10afaa", "DetectTime": "2024-05-21T12:30:03.676182+00:00", "EventTime": "2024-05-21T12:30:03.676203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxD7JC2H0VV5JOnQtg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "1951ef6f-a772-46f6-88b1-7ba55217128c", "DetectTime": "2024-05-21T12:30:03.704354+00:00", "EventTime": "2024-05-21T12:30:03.704376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRewB94N2aryXSLLwb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "951b310e-b1b1-4128-94ed-00250e6421e7", "DetectTime": "2024-05-21T12:30:03.735078+00:00", "EventTime": "2024-05-21T12:30:03.735099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXRDI2JN5oqU0XLS4"], "accumulated_threat_level": 2.1, "timewindow": 54} +{"Format": "IDEA0", "ID": "fee72829-6ac7-4513-aaed-3ab4621e598f", "DetectTime": "2024-05-21T12:30:03.766670+00:00", "EventTime": "2024-05-21T12:30:03.766692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.134.124.242"]}], "Attach": [{"Content": "Connection to unknown destination port 3205/UDP destination IP 81.134.124.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIIHyo22ddx11xf8b4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "867258dd-88bb-4b89-b65a-c06cd364ef34", "DetectTime": "2024-05-21T12:30:03.799521+00:00", "EventTime": "2024-05-21T12:30:03.799541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9tPm4BeBZGE97pP1"], "accumulated_threat_level": 3.7, "timewindow": 54} +{"Format": "IDEA0", "ID": "e82bfde1-b377-42b0-8c3f-ea0770b1cf82", "DetectTime": "2024-05-21T12:30:04.104599+00:00", "EventTime": "2024-05-21T12:30:04.104621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "Connection to unknown destination port 22421/UDP destination IP 94.69.172.54. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUqq3e1xAgGP3rTuT3"], "accumulated_threat_level": 4.5, "timewindow": 54} +{"Format": "IDEA0", "ID": "c1011df0-950b-4cb6-8dfe-f47543d27847", "DetectTime": "2024-05-21T12:30:04.109264+00:00", "EventTime": "2024-05-21T12:30:04.109282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1GY41L6l4V5anyBh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 52} +{"Format": "IDEA0", "ID": "4b3cb601-41b2-41f6-b92e-791af35aa31c", "DetectTime": "2024-05-21T12:30:04.155601+00:00", "EventTime": "2024-05-21T12:30:04.155619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C33vge2uf0c5AXURfa"], "accumulated_threat_level": 5.3, "timewindow": 54} +{"Format": "IDEA0", "ID": "aa2c3136-e145-4113-a514-84d1e5b0a4ad", "DetectTime": "2024-05-21T12:30:04.194804+00:00", "EventTime": "2024-05-21T12:30:04.194824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkdsP2FrcREMfdrB8"], "accumulated_threat_level": 6.1, "timewindow": 54} +{"Format": "IDEA0", "ID": "323d7093-f296-488c-8db8-cdb5605f8d6b", "DetectTime": "2024-05-21T12:30:04.225759+00:00", "EventTime": "2024-05-21T12:30:04.225779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4qdwJe1G6e6uNZX7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 54} +{"Format": "IDEA0", "ID": "7e2f6b0f-4c41-4a8a-9dc7-47f15e3b7fe1", "DetectTime": "2024-05-21T12:30:04.258656+00:00", "EventTime": "2024-05-21T12:30:04.258675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCh8hv4UqcIlxUuSz"], "accumulated_threat_level": 7.699999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "6fd28c26-c2a0-4122-89d7-bd05beff4d60", "DetectTime": "2024-05-21T12:30:04.293399+00:00", "EventTime": "2024-05-21T12:30:04.293417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9Idf4wil8fYXMKW4"], "accumulated_threat_level": 8.5, "timewindow": 54} +{"Format": "IDEA0", "ID": "dadaf855-fded-4be4-ab9f-ee5aa8090c1c", "DetectTime": "2024-05-21T12:30:04.338074+00:00", "EventTime": "2024-05-21T12:30:04.338094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1tOA4fAqtlgJHkqc"], "accumulated_threat_level": 9.3, "timewindow": 54} +{"Format": "IDEA0", "ID": "b02c74e5-1939-4a27-83c1-6f2bef2f19d5", "DetectTime": "2024-05-21T12:30:04.370252+00:00", "EventTime": "2024-05-21T12:30:04.370270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIaDGl4HGt1YnPSBs6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 54} +{"Format": "IDEA0", "ID": "0e60507a-de31-40cd-a097-292829a2af7b", "DetectTime": "2024-05-21T12:30:04.404282+00:00", "EventTime": "2024-05-21T12:30:04.404305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDCJXe1EoimpoHjY9g"], "accumulated_threat_level": 10.900000000000002, "timewindow": 54} +{"Format": "IDEA0", "ID": "65bbfa65-a920-46c8-a7de-a8939e5408ff", "DetectTime": "2024-05-21T12:30:04.434039+00:00", "EventTime": "2024-05-21T12:30:04.434058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yc2cJu3FMOiO9Qa"], "accumulated_threat_level": 11.700000000000003, "timewindow": 54} +{"Format": "IDEA0", "ID": "f94563b2-50d3-41a3-9516-ab6f2cf3ef64", "DetectTime": "2024-05-21T12:30:04.480986+00:00", "EventTime": "2024-05-21T12:30:04.481005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHwI12lS9PA54X3c8"], "accumulated_threat_level": 12.500000000000004, "timewindow": 54} +{"Format": "Json", "ID": "f94563b2-50d3-41a3-9516-ab6f2cf3ef64", "DetectTime": "2024-05-21T12:30:04.480986+00:00", "EventTime": "2024-05-21T12:30:04.481005+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "1970-01-03T05:24:02.476314+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2024/05/21 12:30:04.704055)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 54, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "e4188e3f-93c8-4bc0-a83c-0e5548bb4379", "DetectTime": "2024-05-21T12:30:04.713778+00:00", "EventTime": "2024-05-21T12:30:04.713797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqptrF4wkVNkMDjPD4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "5d1cd1f7-4964-45ef-ba0a-59c80f160055", "DetectTime": "2024-05-21T12:30:04.723865+00:00", "EventTime": "2024-05-21T12:30:04.723883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE14hNBSM28Ek3yhg"], "accumulated_threat_level": 1.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "fc351f37-fbc3-4cbd-821c-bd86bad9add8", "DetectTime": "2024-05-21T12:30:04.733207+00:00", "EventTime": "2024-05-21T12:30:04.733225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.143.194.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybHugX6ioPeDsM72"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a6cffe2b-6fda-4407-acb9-e07d3138c8a3", "DetectTime": "2024-05-21T12:30:04.765480+00:00", "EventTime": "2024-05-21T12:30:04.765503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"]}], "Attach": [{"Content": "Connection to unknown destination port 28779/UDP destination IP 2.134.161.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3mEof4WjEoi8vMAS5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "08e3df11-a4bd-4b1e-91f9-9145b99b0f21", "DetectTime": "2024-05-21T12:30:04.800201+00:00", "EventTime": "2024-05-21T12:30:04.800225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0baHsx22fgab3iW8"], "accumulated_threat_level": 3.2, "timewindow": 54} +{"Format": "IDEA0", "ID": "c92e0e03-45cf-463e-ae8b-ad8f0c6b6b91", "DetectTime": "2024-05-21T12:30:04.844602+00:00", "EventTime": "2024-05-21T12:30:04.844622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuhfp63kYUnrIiXLI5"], "accumulated_threat_level": 4.0, "timewindow": 54} +{"Format": "IDEA0", "ID": "a2bf71f7-7a8e-47ff-b1a1-766cc743a54e", "DetectTime": "2024-05-21T12:30:04.889036+00:00", "EventTime": "2024-05-21T12:30:04.889056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPK7Z2JM2aiqh2rij"], "accumulated_threat_level": 4.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "bc8cbaa1-a6c9-49cd-9c80-e86417b61ce6", "DetectTime": "2024-05-21T12:30:04.934066+00:00", "EventTime": "2024-05-21T12:30:04.934086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1gsLQ3nFxkXFEK6gf"], "accumulated_threat_level": 5.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "ad0d2f94-16e0-41f3-b48b-0aa7d41fe358", "DetectTime": "2024-05-21T12:30:05.153858+00:00", "EventTime": "2024-05-21T12:30:05.153877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxgcMEQXhfoly9HA6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 54} +{"Format": "IDEA0", "ID": "2a12e2d3-370e-4c8c-8424-06ccc700c0be", "DetectTime": "2024-05-21T12:30:05.175131+00:00", "EventTime": "2024-05-21T12:30:05.175155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEY791D1PjPBXa9B5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "c08de21e-35b4-4f03-a8de-1b37c21e9de1", "DetectTime": "2024-05-21T12:30:05.208964+00:00", "EventTime": "2024-05-21T12:30:05.208987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Tl9N16Ssv7OlkBTc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "0634e525-84f7-4654-8718-a2514e7b8674", "DetectTime": "2024-05-21T12:30:05.243620+00:00", "EventTime": "2024-05-21T12:30:05.243638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2Dmq3PHr3o1CXuff"], "accumulated_threat_level": 7.999999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "fa4a57a8-0438-4432-b240-ad2b9526c949", "DetectTime": "2024-05-21T12:30:05.273730+00:00", "EventTime": "2024-05-21T12:30:05.273753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmE1Tq2HLLkgQPrlK4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "d6385682-e05b-45bd-acf3-8679b7d3e11b", "DetectTime": "2024-05-21T12:30:05.307675+00:00", "EventTime": "2024-05-21T12:30:05.307696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuY3qa4LWL1oALDELl"], "accumulated_threat_level": 9.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "a978e887-6eb4-4158-a74b-4479d9cc5401", "DetectTime": "2024-05-21T12:30:05.341156+00:00", "EventTime": "2024-05-21T12:30:05.341180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkwlU77MbKfyOC8L1"], "accumulated_threat_level": 10.4, "timewindow": 54} +{"Format": "IDEA0", "ID": "c3df3a78-008e-4618-a946-a9bb84f514e3", "DetectTime": "2024-05-21T12:30:05.374544+00:00", "EventTime": "2024-05-21T12:30:05.374565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.206.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 21298/UDP destination IP 187.206.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE87HQ2zNOrhfxAGx4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 54} +{"Format": "IDEA0", "ID": "eb80dedd-3501-42ec-81ec-e8a0fcab2a64", "DetectTime": "2024-05-21T12:30:05.406805+00:00", "EventTime": "2024-05-21T12:30:05.406824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaaVY3Nig02k1gqof"], "accumulated_threat_level": 12.000000000000002, "timewindow": 54} +{"Format": "Json", "ID": "eb80dedd-3501-42ec-81ec-e8a0fcab2a64", "DetectTime": "2024-05-21T12:30:05.406805+00:00", "EventTime": "2024-05-21T12:30:05.406824+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "1970-01-03T05:24:24.789133+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2024/05/21 12:30:05.665815)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 54, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "da0fad15-6774-4567-a413-d339a2013ab2", "DetectTime": "2024-05-21T12:30:05.669615+00:00", "EventTime": "2024-05-21T12:30:05.669633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.87.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDAD2Q2YLS868ecSq3"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "337331c8-62b9-4e1d-9c9a-76ed6972939b", "DetectTime": "2024-05-21T12:30:05.679592+00:00", "EventTime": "2024-05-21T12:30:05.679610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CshZiNJ4z22iSHtna"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "01e503a4-31e9-4a9a-b5e6-3b1d8bd86ddb", "DetectTime": "2024-05-21T12:30:05.694738+00:00", "EventTime": "2024-05-21T12:30:05.694755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTBU1h1OuOaUNXm0wb"], "accumulated_threat_level": 1.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "73aba8bb-f825-43e7-bc46-07792a40431b", "DetectTime": "2024-05-21T12:30:05.699822+00:00", "EventTime": "2024-05-21T12:30:05.699841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2k4RK1z0217TQU8li"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a759a0f9-80a4-4d10-9d41-8c80c3a4a319", "DetectTime": "2024-05-21T12:30:05.710984+00:00", "EventTime": "2024-05-21T12:30:05.711002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBnDDPJFtPgUOzg2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "7bec01a1-145a-42f8-884a-2231f6dad190", "DetectTime": "2024-05-21T12:30:05.715708+00:00", "EventTime": "2024-05-21T12:30:05.715725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CximC54qgYi9NC92C1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "c12f367f-e0f0-4fd0-9776-c5b227184c99", "DetectTime": "2024-05-21T12:30:05.720412+00:00", "EventTime": "2024-05-21T12:30:05.720431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUHxz2gIaldZ6JXYd"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "948fb2de-e6b2-4ccc-9d71-ac80e81c3a1e", "DetectTime": "2024-05-21T12:30:05.804561+00:00", "EventTime": "2024-05-21T12:30:05.804583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqgw9KmpP1RADrRQc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8755bd43-0179-4421-b5e5-42277997eae8", "DetectTime": "2024-05-21T12:30:05.851076+00:00", "EventTime": "2024-05-21T12:30:05.851099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmNk24VLg7yfvurn7"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "43053098-2b73-4f84-b99b-c76357fad4f4", "DetectTime": "2024-05-21T12:30:05.881330+00:00", "EventTime": "2024-05-21T12:30:05.881350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkalX1OLiqUGxg4Xf"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7b20af6a-8dd2-4af5-862a-a4f5f6485792", "DetectTime": "2024-05-21T12:30:06.204692+00:00", "EventTime": "2024-05-21T12:30:06.204710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckin3g2d2pfyFgKeq2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "b6875f78-9ae3-4951-99ce-f337cd9ea51f", "DetectTime": "2024-05-21T12:30:06.306392+00:00", "EventTime": "2024-05-21T12:30:06.308847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crri9p2XySegkY4kT5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "14bfe984-c7c4-4332-ab47-6a03a24583d7", "DetectTime": "2024-05-21T12:30:06.393827+00:00", "EventTime": "2024-05-21T12:30:06.393850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5OwD13AqGPgIlLPZb"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "89843c84-0e6c-41df-b7ac-dd2955a2028e", "DetectTime": "2024-05-21T12:30:06.651005+00:00", "EventTime": "2024-05-21T12:30:06.651026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbAAq42sQAnUZIe3w3"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "9d8104cc-b1cc-4ba8-8b72-d9e7701f9fed", "DetectTime": "2024-05-21T12:30:06.656034+00:00", "EventTime": "2024-05-21T12:30:06.656053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLkXo3XmnVE7xEw0c"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "af12ce40-26b0-4782-bc76-d6b8a5553cc4", "DetectTime": "2024-05-21T12:30:06.882781+00:00", "EventTime": "2024-05-21T12:30:06.882802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBegbq4Zz6ankHFmj7", "CThSgCdlRDX6xsoz3", "CVylxs4xFBLisyFRNe", "Cdx32C4XX0PvQ7VkQi"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "b9b4812f-caa2-4650-8183-09be707b68c4", "DetectTime": "2024-05-21T12:30:06.913700+00:00", "EventTime": "2024-05-21T12:30:06.913723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COVUcS2I8XmcpOjobf"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "92875981-01c8-41cc-af0b-48d972ec2b3e", "DetectTime": "2024-05-21T12:30:06.961616+00:00", "EventTime": "2024-05-21T12:30:06.961636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqdDL13MMYrpRxhOD5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "3d096449-a70a-48d0-8603-a87c17c8c8b1", "DetectTime": "2024-05-21T12:30:06.990139+00:00", "EventTime": "2024-05-21T12:30:06.990160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NogG3NHNzrAZPgL6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "11b1e8e5-44fb-4c23-9919-c667ac603d6c", "DetectTime": "2024-05-21T12:30:07.018669+00:00", "EventTime": "2024-05-21T12:30:07.018688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWU6g38CFalBfm167"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "f446ae7d-ff49-4901-be4f-6c0b28b57019", "DetectTime": "2024-05-21T12:30:07.054743+00:00", "EventTime": "2024-05-21T12:30:07.054765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71ACk4Qs0RH2eX5U5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "698a512f-2efd-4f71-b10b-113d5f8eeaa2", "DetectTime": "2024-05-21T12:30:07.128801+00:00", "EventTime": "2024-05-21T12:30:07.128823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IkxN2fWJnTK1XqLj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "0e5ff09f-4c9c-407e-8ef7-b740795a0035", "DetectTime": "2024-05-21T12:30:07.202836+00:00", "EventTime": "2024-05-21T12:30:07.202858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTMwuO2gedDEoL3T92"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "6fd0dc25-347c-4f83-87ef-2ee7485ce551", "DetectTime": "2024-05-21T12:30:07.229347+00:00", "EventTime": "2024-05-21T12:30:07.229368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfQ94W2H2vYZZu9xEl"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ca9716c8-fd3c-443d-8243-abe90935b9b5", "DetectTime": "2024-05-21T12:30:07.476204+00:00", "EventTime": "2024-05-21T12:30:07.476229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRkcNC9HY6U3Jsf"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "0c954f84-5bdc-4aa2-998d-cd24ed4e805e", "DetectTime": "2024-05-21T12:30:07.576841+00:00", "EventTime": "2024-05-21T12:30:07.576864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFLJCzUQOGdlDxOl"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "4a9d7d3c-fcde-4622-9384-b31ad55308e5", "DetectTime": "2024-05-21T12:30:07.610629+00:00", "EventTime": "2024-05-21T12:30:07.610652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5I7Vl3bigfcavC5D8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "1f559575-ad0e-4738-a38c-faf5043dc4a6", "DetectTime": "2024-05-21T12:30:07.652899+00:00", "EventTime": "2024-05-21T12:30:07.652922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Gc7H1FPOifcxO97d"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8495eafe-d83a-46b4-97bb-77eafe700e6f", "DetectTime": "2024-05-21T12:30:07.680154+00:00", "EventTime": "2024-05-21T12:30:07.680174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwjVM27lI1EguABZb"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "2725ffbb-4fae-4d2e-a60e-350c9e961ea9", "DetectTime": "2024-05-21T12:30:07.708669+00:00", "EventTime": "2024-05-21T12:30:07.708693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4arBQ2ibspc1gbo24"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "c48f7f1a-e6ba-400a-ba6d-0763c2982db9", "DetectTime": "2024-05-21T12:30:07.735659+00:00", "EventTime": "2024-05-21T12:30:07.735679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueeSO2OYBoTcUy9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a7f6dfac-16d6-4900-afb2-074db357e6dc", "DetectTime": "2024-05-21T12:30:07.841100+00:00", "EventTime": "2024-05-21T12:30:07.841123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwO09YWAU3bzuhAcc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a869ce07-a2cd-4fcd-b9a5-e03213da8f95", "DetectTime": "2024-05-21T12:30:07.872858+00:00", "EventTime": "2024-05-21T12:30:07.872881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcdZBBrcRQcXe3Yj"], "accumulated_threat_level": 3.7, "timewindow": 54} +{"Format": "IDEA0", "ID": "9efbba33-7c89-4822-84b5-cffe832ae099", "DetectTime": "2024-05-21T12:30:07.928747+00:00", "EventTime": "2024-05-21T12:30:07.928770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVeCcC4nZgYHOj1v75"], "accumulated_threat_level": 4.5, "timewindow": 54} +{"Format": "IDEA0", "ID": "2988cf19-4cff-41ff-a0cb-7900af71138f", "DetectTime": "2024-05-21T12:30:07.977816+00:00", "EventTime": "2024-05-21T12:30:07.977837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBDRSVtGcX7jJdp"], "accumulated_threat_level": 5.3, "timewindow": 54} +{"Format": "IDEA0", "ID": "76bbc514-7d59-4b12-b4cd-d578c4524b46", "DetectTime": "2024-05-21T12:30:08.227910+00:00", "EventTime": "2024-05-21T12:30:08.227930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUORWUGT47fdTb6fi"], "accumulated_threat_level": 6.1, "timewindow": 54} +{"Format": "IDEA0", "ID": "e6283d0d-62cb-4f9c-b475-a3f9dc783a87", "DetectTime": "2024-05-21T12:30:08.270801+00:00", "EventTime": "2024-05-21T12:30:08.270819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7va94tUwAKyLhNT5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 54} +{"Format": "IDEA0", "ID": "93b0ced8-0a4e-409f-a260-fc733544a9ec", "DetectTime": "2024-05-21T12:30:08.306667+00:00", "EventTime": "2024-05-21T12:30:08.306688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVHYdkqlZf0mzv48"], "accumulated_threat_level": 7.699999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "479c8f28-78a0-4913-944a-cbcacdbe8dd9", "DetectTime": "2024-05-21T12:30:08.340366+00:00", "EventTime": "2024-05-21T12:30:08.340384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz1t7N34CinOAmfy93"], "accumulated_threat_level": 8.5, "timewindow": 54} +{"Format": "IDEA0", "ID": "0d484e03-fa77-4ae7-9e59-304d45a2ea1c", "DetectTime": "2024-05-21T12:30:08.374452+00:00", "EventTime": "2024-05-21T12:30:08.374473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFVUK1MPNbhTB5mjb"], "accumulated_threat_level": 9.3, "timewindow": 54} +{"Format": "IDEA0", "ID": "95d5ea80-1c38-45b4-9003-1714c5aa032e", "DetectTime": "2024-05-21T12:30:08.404028+00:00", "EventTime": "2024-05-21T12:30:08.404049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1jiHBd9laAMd39d"], "accumulated_threat_level": 10.100000000000001, "timewindow": 54} +{"Format": "IDEA0", "ID": "7e529212-811c-4c37-82b0-15ef9a0b86b1", "DetectTime": "2024-05-21T12:30:08.450223+00:00", "EventTime": "2024-05-21T12:30:08.450245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C60DPc3eh8pkhliPZ8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 54} +{"Format": "IDEA0", "ID": "c1435504-815c-43e0-ba01-2f32dc120bbe", "DetectTime": "2024-05-21T12:30:08.494056+00:00", "EventTime": "2024-05-21T12:30:08.494078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0jJc4U17eOLGvqqf"], "accumulated_threat_level": 11.700000000000003, "timewindow": 54} +{"Format": "IDEA0", "ID": "c05689ef-ebca-4fe2-9cbd-9a1a31944166", "DetectTime": "2024-05-21T12:30:08.541582+00:00", "EventTime": "2024-05-21T12:30:08.541603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1G1ry3MuvlwFlj5z2"], "accumulated_threat_level": 12.500000000000004, "timewindow": 54} +{"Format": "Json", "ID": "c05689ef-ebca-4fe2-9cbd-9a1a31944166", "DetectTime": "2024-05-21T12:30:08.541582+00:00", "EventTime": "2024-05-21T12:30:08.541603+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-03T05:55:44.267583+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2024/05/21 12:30:08.789085)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 54, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "ec9b681f-2c11-4fed-b23d-ebb3535038bc", "DetectTime": "2024-05-21T12:30:08.798789+00:00", "EventTime": "2024-05-21T12:30:08.798811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TeDDJ2ktZnVCwpi"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "50eceb79-0a01-49e8-9ded-5364761dee52", "DetectTime": "2024-05-21T12:30:08.809810+00:00", "EventTime": "2024-05-21T12:30:08.809828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUOCU33NHMFahXZj"], "accumulated_threat_level": 1.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "07aba40e-69ba-47b6-99f6-8bb307966e64", "DetectTime": "2024-05-21T12:30:08.820571+00:00", "EventTime": "2024-05-21T12:30:08.820589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC79lF3g1UET9n4uVg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "8c3cfe10-e0f0-4c48-aea3-e40a2fb65be6", "DetectTime": "2024-05-21T12:30:08.825445+00:00", "EventTime": "2024-05-21T12:30:08.825463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.16.108.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTAYsRps0z52ddDc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7da17765-ac16-4dee-bc66-50523765fc79", "DetectTime": "2024-05-21T12:30:08.854963+00:00", "EventTime": "2024-05-21T12:30:08.854986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.212.179.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtiDBC24K16n2QXcui"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ff409b8b-e72a-49c0-80d2-cfb3cc5d02e9", "DetectTime": "2024-05-21T12:30:08.891473+00:00", "EventTime": "2024-05-21T12:30:08.891493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAB2Lbmqwp5R5eHU5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "1d6bf440-aecd-4a20-831f-13a9e9599ced", "DetectTime": "2024-05-21T12:30:08.959583+00:00", "EventTime": "2024-05-21T12:30:08.959602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.130.197.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COisez3htKtInfCMde"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ca6e23e5-ab5d-457e-9f3a-b4c9976e25c3", "DetectTime": "2024-05-21T12:30:09.088285+00:00", "EventTime": "2024-05-21T12:30:09.088306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQNiLa1Hjh8RdKVm4h"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "581eca2e-d5cc-4a35-b636-140ddc90d373", "DetectTime": "2024-05-21T12:30:09.128405+00:00", "EventTime": "2024-05-21T12:30:09.128424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvaKmW3omKeuXGweX1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ce0767f7-2160-4899-8aac-6c8172417549", "DetectTime": "2024-05-21T12:30:09.174989+00:00", "EventTime": "2024-05-21T12:30:09.175012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoaUbt4w4BnU1zRTZi"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "32177575-a285-47e9-a578-3c0ed9f4d84f", "DetectTime": "2024-05-21T12:30:09.464120+00:00", "EventTime": "2024-05-21T12:30:09.464141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6OKY1Iyux74Rg8Ah"], "accumulated_threat_level": 3.2, "timewindow": 54} +{"Format": "IDEA0", "ID": "6800b1ae-fc85-4ea4-a3e5-98d61186c452", "DetectTime": "2024-05-21T12:30:09.469919+00:00", "EventTime": "2024-05-21T12:30:09.469941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSlYad4LSx4Yr1QPX6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "bb99e24c-f0a9-467f-9f58-d22010953f34", "DetectTime": "2024-05-21T12:30:09.474825+00:00", "EventTime": "2024-05-21T12:30:09.474845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUmdB1wxTNyIunxw9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "86133866-e76c-4bba-9a9b-0a0c137eaba7", "DetectTime": "2024-05-21T12:30:09.480099+00:00", "EventTime": "2024-05-21T12:30:09.480119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFiago26NTofsM38yh"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "70acc618-f18c-4d79-943c-7d10b91c536f", "DetectTime": "2024-05-21T12:30:09.551146+00:00", "EventTime": "2024-05-21T12:30:09.551169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtL9Pi1YLQlFEDKVYi"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ad3c10d6-a9b9-4e6d-9828-2d4321a6aa1a", "DetectTime": "2024-05-21T12:30:09.579629+00:00", "EventTime": "2024-05-21T12:30:09.579649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpewj54ZmTYEEwXn0f"], "accumulated_threat_level": 4.0, "timewindow": 54} +{"Format": "IDEA0", "ID": "684b8d97-86d1-4c36-bf45-a6c1494780ce", "DetectTime": "2024-05-21T12:30:09.623978+00:00", "EventTime": "2024-05-21T12:30:09.623999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmumUdhVAbpPIgqg9"], "accumulated_threat_level": 4.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "c47fc4c9-6924-427d-b8fd-6d959be46af2", "DetectTime": "2024-05-21T12:30:09.658540+00:00", "EventTime": "2024-05-21T12:30:09.658558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAlpXgN4aOCuJ28"], "accumulated_threat_level": 5.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "26f8a657-c617-42d8-9d4e-4ce14529ab61", "DetectTime": "2024-05-21T12:30:09.680841+00:00", "EventTime": "2024-05-21T12:30:09.680863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9GJ71ZCddz6cS8T8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "281d99fe-6aad-4ff9-9f45-a79aefbdf15f", "DetectTime": "2024-05-21T12:30:09.710420+00:00", "EventTime": "2024-05-21T12:30:09.710438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HB7D3YkablWvgj47"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 54} +{"Format": "IDEA0", "ID": "c8792c6b-2cc5-48fa-a50c-e5cb687d7031", "DetectTime": "2024-05-21T12:30:09.732039+00:00", "EventTime": "2024-05-21T12:30:09.732060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cma6744dEnjI8JN1rj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "c0551008-0c85-4932-b10a-a892d6f9f080", "DetectTime": "2024-05-21T12:30:09.759084+00:00", "EventTime": "2024-05-21T12:30:09.759103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKOQA3UCxDW0KBgol"], "accumulated_threat_level": 7.199999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "778dba33-00c4-4df1-9008-f7fd75678077", "DetectTime": "2024-05-21T12:30:09.780468+00:00", "EventTime": "2024-05-21T12:30:09.780489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXaIK1VDLuskkoJh4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a5067b7e-015c-43d1-a7db-b7ba264d8e48", "DetectTime": "2024-05-21T12:30:09.811381+00:00", "EventTime": "2024-05-21T12:30:09.811401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr9Htp36u0LZpyWSRl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "637d4723-4bb8-4cbe-a247-4bc4adb2fe44", "DetectTime": "2024-05-21T12:30:09.826018+00:00", "EventTime": "2024-05-21T12:30:09.826041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7L063oqG9xZ4RWoh"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "369e6547-57e1-4eb6-a568-9bbfcc3dbba7", "DetectTime": "2024-05-21T12:30:09.853702+00:00", "EventTime": "2024-05-21T12:30:09.853721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO1qeU3bDW0QjU4k28"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "077c1369-6907-4870-8025-7045f4610e2f", "DetectTime": "2024-05-21T12:30:09.881603+00:00", "EventTime": "2024-05-21T12:30:09.881624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHzc41PvzXwYanYR7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "026558b1-e29f-473a-8e39-fb08c32d16d2", "DetectTime": "2024-05-21T12:30:09.902462+00:00", "EventTime": "2024-05-21T12:30:09.902482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxFAY2e6iAa2LYtVa"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "fdfb41e4-f118-4460-9e49-34ec53886e4b", "DetectTime": "2024-05-21T12:30:10.159224+00:00", "EventTime": "2024-05-21T12:30:10.159244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CizliRhT5Mx15Odlk"], "accumulated_threat_level": 9.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "5c66bf65-44ab-4d13-8726-083386650b33", "DetectTime": "2024-05-21T12:30:10.171046+00:00", "EventTime": "2024-05-21T12:30:10.171067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfZMWutGh0Ui6lik"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "bde7f898-1e12-4e39-98b1-980d457b5c2e", "DetectTime": "2024-05-21T12:30:10.212714+00:00", "EventTime": "2024-05-21T12:30:10.212733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "Connection to unknown destination port 6169/UDP destination IP 139.0.116.21. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CddcVaUSKwKp3ODue"], "accumulated_threat_level": 10.4, "timewindow": 54} +{"Format": "IDEA0", "ID": "8ad251c5-79ee-451e-8c93-1e7453b8b3bf", "DetectTime": "2024-05-21T12:30:10.246048+00:00", "EventTime": "2024-05-21T12:30:10.246066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4U0Uh3e6zVH6umFrh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 54} +{"Format": "IDEA0", "ID": "96181275-b09d-495b-ad8e-a8f97a36c5c3", "DetectTime": "2024-05-21T12:30:10.278944+00:00", "EventTime": "2024-05-21T12:30:10.278966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCoLEVt6NDI5PeIc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 54} +{"Format": "Json", "ID": "96181275-b09d-495b-ad8e-a8f97a36c5c3", "DetectTime": "2024-05-21T12:30:10.278944+00:00", "EventTime": "2024-05-21T12:30:10.278966+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "1970-01-03T05:56:20.979115+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2024/05/21 12:30:10.499007)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 54, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f5ff96d3-b2b1-44af-9d3a-8fe3feede358", "DetectTime": "2024-05-21T12:30:10.511611+00:00", "EventTime": "2024-05-21T12:30:10.511628+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWzEV2sXLHecs6Su4"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "dfabc4c4-0b75-4061-9c20-57644721e814", "DetectTime": "2024-05-21T12:30:10.524338+00:00", "EventTime": "2024-05-21T12:30:10.524359+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWzEV2sXLHecs6Su4"], "accumulated_threat_level": 1.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "f696d499-fee7-4e1d-8755-a2d4b210fce0", "DetectTime": "2024-05-21T12:30:10.535757+00:00", "EventTime": "2024-05-21T12:30:10.535777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7YCC1mnPZNfncHba"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "d36da606-feff-4096-bcd7-a96a18c7472a", "DetectTime": "2024-05-21T12:30:10.540356+00:00", "EventTime": "2024-05-21T12:30:10.540374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EPwLykNgrzFTkXd"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e980469d-9727-4b3d-9ae8-f3343732cd95", "DetectTime": "2024-05-21T12:30:10.551099+00:00", "EventTime": "2024-05-21T12:30:10.551118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXePPd36G89Rpdv0Tc"], "accumulated_threat_level": 1.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "29282467-d3ad-4941-8100-f61eb04cc80a", "DetectTime": "2024-05-21T12:30:10.561829+00:00", "EventTime": "2024-05-21T12:30:10.561848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.134.161.217"]}], "Attach": [{"Content": "Connection to unknown destination port 28779/UDP destination IP 2.134.161.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMKUY33KFjn0Tp6M6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 54} +{"Format": "IDEA0", "ID": "19aa576a-bf75-4460-ad9f-425992fc8047", "DetectTime": "2024-05-21T12:30:10.574742+00:00", "EventTime": "2024-05-21T12:30:10.574760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcyfiyYJauZ93Pxb"], "accumulated_threat_level": 3.2, "timewindow": 54} +{"Format": "IDEA0", "ID": "31594cf5-9bd6-4cac-963e-1da25b9b5027", "DetectTime": "2024-05-21T12:30:10.586452+00:00", "EventTime": "2024-05-21T12:30:10.586471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CgI226wIP6PTwJIg"], "accumulated_threat_level": 4.0, "timewindow": 54} +{"Format": "IDEA0", "ID": "cc1c7e8a-2007-4ea5-88ed-b19b34cd7bf4", "DetectTime": "2024-05-21T12:30:10.597159+00:00", "EventTime": "2024-05-21T12:30:10.597177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMUNeLhflS6irol9"], "accumulated_threat_level": 4.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b524b605-5dad-4776-b849-b899b527471d", "DetectTime": "2024-05-21T12:30:10.608528+00:00", "EventTime": "2024-05-21T12:30:10.608549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCuKe72fyy1D9lLhml"], "accumulated_threat_level": 5.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "6b1687ee-404d-44c8-abf2-eba483d6d9f7", "DetectTime": "2024-05-21T12:30:10.624979+00:00", "EventTime": "2024-05-21T12:30:10.624999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavAA24gKf7Tfz4Krh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 54} +{"Format": "IDEA0", "ID": "e55db64c-b372-4580-9bc3-9a77b27ab4ca", "DetectTime": "2024-05-21T12:30:10.631142+00:00", "EventTime": "2024-05-21T12:30:10.631161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3KoGq6qgd9jenL1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "1819306e-0d23-41d3-ad4e-66c01bd28ff2", "DetectTime": "2024-05-21T12:30:10.641901+00:00", "EventTime": "2024-05-21T12:30:10.641919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9KhHTfPMYgKLlD9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "400719c4-1efd-41be-bdf5-f22b2362c050", "DetectTime": "2024-05-21T12:30:10.646358+00:00", "EventTime": "2024-05-21T12:30:10.646375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55js23DxaXiPLbrQd"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "404bcf4d-d559-47b4-8b8c-b6ecb4f0f573", "DetectTime": "2024-05-21T12:30:10.656981+00:00", "EventTime": "2024-05-21T12:30:10.656999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhBMh2EbKbFax2F99"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "96c09029-eb5b-4a58-b3f7-8b39943c7ef7", "DetectTime": "2024-05-21T12:30:10.696106+00:00", "EventTime": "2024-05-21T12:30:10.696130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3K0IijXOHN71wFb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "d84eb6b2-3383-456b-a7b5-2ed305289d49", "DetectTime": "2024-05-21T12:30:10.710486+00:00", "EventTime": "2024-05-21T12:30:10.710505+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz5wEi3d1MqkvmgABi"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "8c4bf7fc-e8eb-4e77-90ca-debea5490cc9", "DetectTime": "2024-05-21T12:30:10.722934+00:00", "EventTime": "2024-05-21T12:30:10.722954+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz5wEi3d1MqkvmgABi"], "accumulated_threat_level": 1.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "f36235b9-bc1b-41b3-8af7-123e51ad97b6", "DetectTime": "2024-05-21T12:30:10.733922+00:00", "EventTime": "2024-05-21T12:30:10.733941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8pHQ43x9CgTEJVWJ4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 54} +{"Format": "IDEA0", "ID": "98969a3c-20ae-43da-afd4-d09c65044997", "DetectTime": "2024-05-21T12:30:10.756107+00:00", "EventTime": "2024-05-21T12:30:10.756132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1SBKX10LJFp68xGX9"], "accumulated_threat_level": 9.6, "timewindow": 54} +{"Format": "IDEA0", "ID": "c89084f0-0a36-453c-b58d-080ca4d67830", "DetectTime": "2024-05-21T12:30:10.800701+00:00", "EventTime": "2024-05-21T12:30:10.800723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOgY42gY4X4ztBz9"], "accumulated_threat_level": 10.4, "timewindow": 54} +{"Format": "IDEA0", "ID": "7b59a5d8-bbc4-41cf-aa37-a441947b88e4", "DetectTime": "2024-05-21T12:30:11.057468+00:00", "EventTime": "2024-05-21T12:30:11.057488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnf1TF3cncY0jvp5xc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "838a3b19-a194-43df-9fb0-7cfe44312724", "DetectTime": "2024-05-21T12:30:11.062204+00:00", "EventTime": "2024-05-21T12:30:11.062223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6AjA2jybGpWo4mr4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ae66d070-495c-4989-ab86-8c6cd605c8b6", "DetectTime": "2024-05-21T12:30:11.113165+00:00", "EventTime": "2024-05-21T12:30:11.113185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiZAJ3afe76GQLKO5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 54} +{"Format": "IDEA0", "ID": "417bf5f1-da8e-45ec-8c86-c3e233156081", "DetectTime": "2024-05-21T12:30:11.123336+00:00", "EventTime": "2024-05-21T12:30:11.123355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clso0524Hwdu3mDk9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "9c416ffd-05db-4bbf-91ef-72f72381813c", "DetectTime": "2024-05-21T12:30:11.135085+00:00", "EventTime": "2024-05-21T12:30:11.135107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs84B3XggqL0PbrOe", "CaNHbt1gQPNZYv8Vsa", "Cv36rK1yf5hau9AWEg", "CiHzXq2pr7nKOF5319"], "accumulated_threat_level": 0.5, "timewindow": 55} +{"Format": "IDEA0", "ID": "43d7bda4-0b97-4323-b0e7-dea9e8ccd10e", "DetectTime": "2024-05-21T12:30:11.162184+00:00", "EventTime": "2024-05-21T12:30:11.162205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgS4EB3JMBBHSZP26c"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "4cf56f52-b41d-49c7-9ec0-b0a645927927", "DetectTime": "2024-05-21T12:30:11.178798+00:00", "EventTime": "2024-05-21T12:30:11.178816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6tS974QLANaFduxA9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 54} +{"Format": "Json", "ID": "4cf56f52-b41d-49c7-9ec0-b0a645927927", "DetectTime": "2024-05-21T12:30:11.178798+00:00", "EventTime": "2024-05-21T12:30:11.178816+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "1970-01-03T05:56:41.997759+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 54. (real time 2024/05/21 12:30:11.432191)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 54, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6177ead5-baf1-4964-8f67-f826a271a78d", "DetectTime": "2024-05-21T12:30:11.436416+00:00", "EventTime": "2024-05-21T12:30:11.436435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4DXG3T4H69DXvIjk"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "6bfb5108-54e5-476f-a81e-e2533e45e41a", "DetectTime": "2024-05-21T12:30:11.442442+00:00", "EventTime": "2024-05-21T12:30:11.442464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.184.50.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOjG84N9rAXGzOCUj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e45d03a7-e662-4c05-9f21-caacdadb0054", "DetectTime": "2024-05-21T12:30:11.454358+00:00", "EventTime": "2024-05-21T12:30:11.454376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnucbL3rZEGXNxRzUd"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "35110b62-ade6-49f7-9fcb-42ec26806d21", "DetectTime": "2024-05-21T12:30:11.459559+00:00", "EventTime": "2024-05-21T12:30:11.459582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.190.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COcIUzadofakki05c"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "3565c98c-a4ca-4a22-bd6f-5ce628c042af", "DetectTime": "2024-05-21T12:30:11.470107+00:00", "EventTime": "2024-05-21T12:30:11.470126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawNXPaRajxMZ1QPe"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "711b148c-074c-461d-babd-7069b741920c", "DetectTime": "2024-05-21T12:30:11.474866+00:00", "EventTime": "2024-05-21T12:30:11.474884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.15.18.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PrFn4CNg9CEEyqP2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "4f1b686e-28d4-46f8-a5f1-22bab87fa846", "DetectTime": "2024-05-21T12:30:11.479700+00:00", "EventTime": "2024-05-21T12:30:11.479719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.183.4.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuuUXd3R00rba6V1I5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7cee3639-0a42-43e9-a70f-8c5ac7bc0aa6", "DetectTime": "2024-05-21T12:30:11.484405+00:00", "EventTime": "2024-05-21T12:30:11.484424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.50.25.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsU22126FyayOI37Ij"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "b5dcf541-e346-437a-b473-a50605007305", "DetectTime": "2024-05-21T12:30:11.489008+00:00", "EventTime": "2024-05-21T12:30:11.489027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.4.69.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCynLi41xD0oloaxY1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "d8af1a19-db94-4bf0-b50d-8474c1e5d144", "DetectTime": "2024-05-21T12:30:11.493622+00:00", "EventTime": "2024-05-21T12:30:11.493642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.198.227.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0IpPM1zJ62rXJ0lf6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "bb7fde9d-ccd7-4923-a7fa-10db4e1718d5", "DetectTime": "2024-05-21T12:30:11.521596+00:00", "EventTime": "2024-05-21T12:30:11.521617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.107.159.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7OLcH3oRvsbOgJ1G1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "48c56503-60d9-44ed-864c-5a77ea721cb0", "DetectTime": "2024-05-21T12:30:11.526989+00:00", "EventTime": "2024-05-21T12:30:11.527010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.111.78.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUnkrx3Fzb6gVooCO3"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e4d4f650-9190-4221-b25f-62f63db27079", "DetectTime": "2024-05-21T12:30:11.832684+00:00", "EventTime": "2024-05-21T12:30:11.832703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRsKi2DbpnYXKlAD6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7a7d3e3c-1e21-428b-b38a-1553685037f8", "DetectTime": "2024-05-21T12:30:11.837506+00:00", "EventTime": "2024-05-21T12:30:11.837525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.100.136.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5IOiq2gjlTy47yBm6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8ca79895-63f1-44c8-ac88-60b56f0d66ed", "DetectTime": "2024-05-21T12:30:11.858727+00:00", "EventTime": "2024-05-21T12:30:11.858749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLL4LWDdiEVPhSlk"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "65e6b365-406a-418c-9089-4a2e93a4af6d", "DetectTime": "2024-05-21T12:30:11.885562+00:00", "EventTime": "2024-05-21T12:30:11.885582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 134.90.252.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9bvAvrDHlz2thT"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8cbb7a24-e46b-4bc7-a664-1e53cbd06b81", "DetectTime": "2024-05-21T12:30:11.917858+00:00", "EventTime": "2024-05-21T12:30:11.917876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.220.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClhCfW38ceKiHv9ga"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8374adc3-c26e-4758-8dce-f4d06deea6f5", "DetectTime": "2024-05-21T12:30:11.981954+00:00", "EventTime": "2024-05-21T12:30:11.981975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.168.116.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVneD39ODF4i08tR2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "3b6bd2f1-7702-42a5-8bca-0583147e32d5", "DetectTime": "2024-05-21T12:30:12.052895+00:00", "EventTime": "2024-05-21T12:30:12.052916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.239.247.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CidiFw3bxRgcV4NnXd"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7be9f554-8495-4102-b3c6-2274005a73bd", "DetectTime": "2024-05-21T12:30:12.061058+00:00", "EventTime": "2024-05-21T12:30:12.061077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 4.26.210.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK5sBE41oj8RR1QuU9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "9f85ff7a-3065-4b3b-8a87-d448a59679f8", "DetectTime": "2024-05-21T12:30:12.088921+00:00", "EventTime": "2024-05-21T12:30:12.088941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.207.189.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7E1wD3oPjmDLHoJol"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "91a831bf-6830-47d4-98f0-9776f1e2b65f", "DetectTime": "2024-05-21T12:30:12.135827+00:00", "EventTime": "2024-05-21T12:30:12.135848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.93.105.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkpTB1qBQ4LPHBQ87"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a504a4f2-c078-4e3f-b570-0b834df79bc7", "DetectTime": "2024-05-21T12:30:12.154123+00:00", "EventTime": "2024-05-21T12:30:12.154144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSO4h2PqUk7TS14e9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "80f14c11-53b3-4207-bfbe-893154247156", "DetectTime": "2024-05-21T12:30:12.194307+00:00", "EventTime": "2024-05-21T12:30:12.194330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAnmv22LDkpjMh35J2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e3f3d2df-7994-438b-b109-a8dab406c281", "DetectTime": "2024-05-21T12:30:12.227014+00:00", "EventTime": "2024-05-21T12:30:12.227032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNsDI3MBXghohEXa3"], "accumulated_threat_level": 1.3, "timewindow": 55} +{"Format": "IDEA0", "ID": "a5741f96-16c9-40e4-b742-6330d2530779", "DetectTime": "2024-05-21T12:30:12.251437+00:00", "EventTime": "2024-05-21T12:30:12.251461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLiBz2TXqqCB0Kdy8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "f54f5207-1807-4596-8add-3c01cb233aa9", "DetectTime": "2024-05-21T12:30:12.282502+00:00", "EventTime": "2024-05-21T12:30:12.282525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.160.108.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8lPr1W42v0FL6a4c"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7b9ba971-8e95-4eaa-89b9-3a8926cf1687", "DetectTime": "2024-05-21T12:30:12.546259+00:00", "EventTime": "2024-05-21T12:30:12.546289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR57zc4FlK0noaQ3Uc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "65174ae4-e8c7-410e-8046-d532a8c393e7", "DetectTime": "2024-05-21T12:30:12.813021+00:00", "EventTime": "2024-05-21T12:30:12.813041+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["31.192.3.38"], "Type": ["CC"], "Port": [2479], "Proto": ["TCP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "C&C channel, destination IP: 31.192.3.38 port: 2479/tcp score: 0.9937. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkv6aliG1is2HkZk"], "accumulated_threat_level": 1.324, "timewindow": 55} +{"Format": "IDEA0", "ID": "cbb38079-0f03-4097-a700-cda70fa2fde2", "DetectTime": "2024-05-21T12:30:12.824255+00:00", "EventTime": "2024-05-21T12:30:12.824273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRNR92HYn9VWt9b99"], "accumulated_threat_level": 2.124, "timewindow": 55} +{"Format": "IDEA0", "ID": "3ae02891-1f30-4b77-b5ba-960a8e6a0871", "DetectTime": "2024-05-21T12:30:12.850797+00:00", "EventTime": "2024-05-21T12:30:12.850817+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["31.192.3.38"], "Type": ["CC"]}, {"IP4": ["31.192.3.38"], "Type": ["CC"], "Port": [2479], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 31.192.3.38 port: 2479/tcp score: 0.9937. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkv6aliG1is2HkZk"], "accumulated_threat_level": 0, "timewindow": 55} +{"Format": "IDEA0", "ID": "b93d69a5-e161-43b8-ae70-23abd13c025f", "DetectTime": "2024-05-21T12:30:12.877338+00:00", "EventTime": "2024-05-21T12:30:12.877358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.14.79.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDd0YMutSdE8G07a8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "626f18e7-618e-43b0-ad93-4ada52c3872c", "DetectTime": "2024-05-21T12:30:12.882642+00:00", "EventTime": "2024-05-21T12:30:12.882661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7w9uD1Xn1DYfn4Zf4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a262f220-79d0-4352-a00a-7a8f996d6b82", "DetectTime": "2024-05-21T12:30:12.887423+00:00", "EventTime": "2024-05-21T12:30:12.887442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPz0CN7hcnPBJnk6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "92c3aa62-d50c-4ec6-9a2a-b5b750432c90", "DetectTime": "2024-05-21T12:30:12.969815+00:00", "EventTime": "2024-05-21T12:30:12.969834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.120.59.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mgaX3qGeM0pPEUua"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "54fc9007-0f3b-404d-aeab-f2e413e777ab", "DetectTime": "2024-05-21T12:30:12.976179+00:00", "EventTime": "2024-05-21T12:30:12.976301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.178.14.172 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJfclU2mYzgNnIIVOh"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "75500573-1277-4dc7-b94a-6b22cefee276", "DetectTime": "2024-05-21T12:30:12.985360+00:00", "EventTime": "2024-05-21T12:30:12.985378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.192.36.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPONEF1MxWMREtAL81"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "544e4348-58ee-497b-a232-c5f9110772f9", "DetectTime": "2024-05-21T12:30:12.990926+00:00", "EventTime": "2024-05-21T12:30:12.990944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJJyiEqDXsHrhMdg"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "533905d6-d629-41ff-bdba-50c27da1b088", "DetectTime": "2024-05-21T12:30:13.008679+00:00", "EventTime": "2024-05-21T12:30:13.008698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.133.71.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zt413KmPZg3wi53f"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "51a44178-dbd5-4be0-9f01-30706f8bad68", "DetectTime": "2024-05-21T12:30:13.014433+00:00", "EventTime": "2024-05-21T12:30:13.014452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIhHp4qIPaTLl5QS4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "81936e27-446d-46ee-8bc3-db2ae3417821", "DetectTime": "2024-05-21T12:30:13.029819+00:00", "EventTime": "2024-05-21T12:30:13.029839+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["151.45.9.200"], "Type": ["CC"], "Port": [2349], "Proto": ["TCP"]}], "Target": [{"IP4": ["151.45.9.200"]}], "Attach": [{"Content": "C&C channel, destination IP: 151.45.9.200 port: 2349/tcp score: 0.9937. AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBDJK32ztnwdIci84g"], "accumulated_threat_level": 2.148, "timewindow": 55} +{"Format": "IDEA0", "ID": "7d844188-e90d-4c6a-865a-68f819e0a947", "DetectTime": "2024-05-21T12:30:13.048096+00:00", "EventTime": "2024-05-21T12:30:13.048115+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["151.45.9.200"], "Type": ["CC"]}, {"IP4": ["151.45.9.200"], "Type": ["CC"], "Port": [2349], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 151.45.9.200 port: 2349/tcp score: 0.9937. AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBDJK32ztnwdIci84g"], "accumulated_threat_level": 0, "timewindow": 55} +{"Format": "IDEA0", "ID": "3fbc53ee-bbcc-4cb4-b4fe-1ef296a9abd7", "DetectTime": "2024-05-21T12:30:13.085580+00:00", "EventTime": "2024-05-21T12:30:13.085603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.110.72.32 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQNpy3Y7kgh6ti6Fg"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "19356283-0204-4e6f-a629-ae986e5bdcb6", "DetectTime": "2024-05-21T12:30:13.090614+00:00", "EventTime": "2024-05-21T12:30:13.090633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.174.204.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF85EL2F7rMmo4zcOe"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "549a33b0-c490-4140-827a-dc1bfdd114e5", "DetectTime": "2024-05-21T12:30:13.095521+00:00", "EventTime": "2024-05-21T12:30:13.095540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.144.127.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS53RpyjMY4xA2BHj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "25e4ae8f-bb92-4138-b39f-27b0b1044190", "DetectTime": "2024-05-21T12:30:13.141764+00:00", "EventTime": "2024-05-21T12:30:13.141785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.232.123 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch4VIM2YUbz3YoHQxa"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "25d84f09-d6b6-4d85-89a9-324cb441a788", "DetectTime": "2024-05-21T12:30:13.166678+00:00", "EventTime": "2024-05-21T12:30:13.166698+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["82.211.141.181"], "Type": ["CC"], "Port": [5977], "Proto": ["TCP"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "C&C channel, destination IP: 82.211.141.181 port: 5977/tcp score: 0.9937. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXTrH1pv0JmAuvgG8"], "accumulated_threat_level": 2.172, "timewindow": 55} +{"Format": "IDEA0", "ID": "f1a08a96-9085-4c68-96cd-60ebc8456dfb", "DetectTime": "2024-05-21T12:30:13.189814+00:00", "EventTime": "2024-05-21T12:30:13.189832+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["82.211.141.181"], "Type": ["CC"]}, {"IP4": ["82.211.141.181"], "Type": ["CC"], "Port": [5977], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 82.211.141.181 port: 5977/tcp score: 0.9937. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXTrH1pv0JmAuvgG8"], "accumulated_threat_level": 0, "timewindow": 55} +{"Format": "IDEA0", "ID": "f290f3fc-dc2d-4a30-bce3-b2620c5efd0a", "DetectTime": "2024-05-21T12:30:13.207776+00:00", "EventTime": "2024-05-21T12:30:13.207797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMktl4790pE11MYI2", "ChAkb51C1cD8YzUuui", "CAcln515hmQDkLvY93", "CQZa4j4Kmrpz00ZLVl"], "accumulated_threat_level": 2.672, "timewindow": 55} +{"Format": "IDEA0", "ID": "192bf30e-f9fa-4605-b5ea-742a6178e3ac", "DetectTime": "2024-05-21T12:30:13.218001+00:00", "EventTime": "2024-05-21T12:30:13.218020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.134.161.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBlpn4KI61bIcF1X8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "c416e054-e409-4ea7-ae9f-2d84d9f95b7c", "DetectTime": "2024-05-21T12:30:13.268572+00:00", "EventTime": "2024-05-21T12:30:13.268591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.6.58.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouuDov6WJC6sJIw8"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "f2ccf2bb-e2a6-4a4b-a9ca-ae0c9f95561c", "DetectTime": "2024-05-21T12:30:13.531367+00:00", "EventTime": "2024-05-21T12:30:13.531387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.28.110.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQtGr2b2GKwHrqUob"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "55ee3d2a-bd16-466f-9fef-9ef6eb10950f", "DetectTime": "2024-05-21T12:30:13.560214+00:00", "EventTime": "2024-05-21T12:30:13.560236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.35.23.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPqAM1KC4gEC03FL2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "19b819ee-f1b2-4174-bd98-7ad1e67ab17c", "DetectTime": "2024-05-21T12:30:13.627074+00:00", "EventTime": "2024-05-21T12:30:13.627095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLUNg3XQU0OJ3Wpx2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8b333f32-de0b-4ef3-9593-0f345c64778c", "DetectTime": "2024-05-21T12:30:13.637364+00:00", "EventTime": "2024-05-21T12:30:13.637386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.118.193.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5GAu3saxI2O425F"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "f14a74c2-387c-49c7-942d-c2560ee9364e", "DetectTime": "2024-05-21T12:30:13.642223+00:00", "EventTime": "2024-05-21T12:30:13.642245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.160.175.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CewkxCUlllDCHIimc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e766577a-ef81-4406-bb76-9bfba32d7ba3", "DetectTime": "2024-05-21T12:30:13.650192+00:00", "EventTime": "2024-05-21T12:30:13.650211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.96.223.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35Xno2Y5LmD8j2g3f"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "1ec727ca-1de8-4c06-a114-5bd2fc02a62d", "DetectTime": "2024-05-21T12:30:13.655034+00:00", "EventTime": "2024-05-21T12:30:13.655053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.213.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCuFgM2v51L8c4BYtj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "01b98a54-047b-424f-a6d2-552eb86fbaa9", "DetectTime": "2024-05-21T12:30:13.659753+00:00", "EventTime": "2024-05-21T12:30:13.659773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.22.131.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3VO5E1e1DR9iI5OC2"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "1e7b149a-c998-4e95-b4c4-db92a5a376fc", "DetectTime": "2024-05-21T12:30:13.678347+00:00", "EventTime": "2024-05-21T12:30:13.678366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 211.192.25.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnT5H2riFdgWobzdj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "797865ac-5acc-4d44-8523-288fd5bda978", "DetectTime": "2024-05-21T12:30:13.724500+00:00", "EventTime": "2024-05-21T12:30:13.724521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.229.235.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBunTZ9JMBrC077Kc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "b24322fc-5b60-48a7-8e07-4be0d8ebf293", "DetectTime": "2024-05-21T12:30:13.870582+00:00", "EventTime": "2024-05-21T12:30:13.870603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.75.78.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBJeneBxkj1s8T7c"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e32c5890-a52b-4658-894c-c575b182aa54", "DetectTime": "2024-05-21T12:30:13.875761+00:00", "EventTime": "2024-05-21T12:30:13.875781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.70.30.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYKYCp1IQyfg9VJYW6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "0d6f4ba9-2153-4322-90dc-e78ecbdf7183", "DetectTime": "2024-05-21T12:30:13.919094+00:00", "EventTime": "2024-05-21T12:30:13.919115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5UfrgfPx7hLnnYDl"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "cde36d89-c7f7-4069-acf6-a1d7416ad02f", "DetectTime": "2024-05-21T12:30:13.923816+00:00", "EventTime": "2024-05-21T12:30:13.923835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.193.78.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZwJY3N7XgNvkQppc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "48f5fead-5fc9-4bda-9037-27e74262464a", "DetectTime": "2024-05-21T12:30:14.199255+00:00", "EventTime": "2024-05-21T12:30:14.199278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpxRp4E9DdOPC4AAj"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "494de518-12a1-4ce7-b921-7c8deffe2ab4", "DetectTime": "2024-05-21T12:30:14.214110+00:00", "EventTime": "2024-05-21T12:30:14.214132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.214.75.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2xDyUoZpZHTkxni"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "bf475652-8032-49fa-aae3-231e36f3ede7", "DetectTime": "2024-05-21T12:30:14.255649+00:00", "EventTime": "2024-05-21T12:30:14.255669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.221.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CobI3jjXZpbQI1789"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a4519857-5d4e-4b21-af0d-155fc08bd5d0", "DetectTime": "2024-05-21T12:30:14.278388+00:00", "EventTime": "2024-05-21T12:30:14.278422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.196.211.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzLZ9143dZpCE73Ck"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "d09212ed-e81a-4bcf-8890-b8c4ed4e20e2", "DetectTime": "2024-05-21T12:30:14.314919+00:00", "EventTime": "2024-05-21T12:30:14.314941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJkm6a15EInovak941"], "accumulated_threat_level": 3.4720000000000004, "timewindow": 55} +{"Format": "IDEA0", "ID": "823c0ba7-0888-46fa-867a-b3128804e069", "DetectTime": "2024-05-21T12:30:14.337392+00:00", "EventTime": "2024-05-21T12:30:14.337413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPplUogXjaEFev395"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "3dc56e6f-c391-4ed0-85f2-efea2d083006", "DetectTime": "2024-05-21T12:30:14.367903+00:00", "EventTime": "2024-05-21T12:30:14.367924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.196.26.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy65hy11CUVwL3pz36"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "6a58daef-2e01-4bf1-882c-cd8ad5407ffb", "DetectTime": "2024-05-21T12:30:14.412228+00:00", "EventTime": "2024-05-21T12:30:14.412250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.60.238.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLe6N7U7fzlQ5m06"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7d586a25-2790-4b05-bfef-513fc926ed29", "DetectTime": "2024-05-21T12:30:14.447630+00:00", "EventTime": "2024-05-21T12:30:14.447651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.183.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzZZRN2DBZiSbPPLo1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "061cba02-875d-4477-a55c-ec7968427934", "DetectTime": "2024-05-21T12:30:14.494913+00:00", "EventTime": "2024-05-21T12:30:14.494933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.121.241.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7XIqv3oBmemljBbYa"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "50cd70fc-f746-4aff-83f6-98bd8f7df470", "DetectTime": "2024-05-21T12:30:14.571565+00:00", "EventTime": "2024-05-21T12:30:14.571586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9iljs2R3kjB7eUXP", "CB1chC3rcMxQg2Flak", "CEnThEuUGups3Rk6h", "Co3P2q3fLEC2ddpTm5"], "accumulated_threat_level": 3.9720000000000004, "timewindow": 55} +{"Format": "IDEA0", "ID": "195b3969-cefa-4273-a2c1-31e20388892c", "DetectTime": "2024-05-21T12:30:14.576320+00:00", "EventTime": "2024-05-21T12:30:14.576339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.192.22.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxOg932bJEJfveqTJ9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "15d781f6-1144-47ba-a797-20e472f9f65d", "DetectTime": "2024-05-21T12:30:14.618181+00:00", "EventTime": "2024-05-21T12:30:14.618203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.169.72.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7v9yi2KwllUbQybGe"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e2822d18-04a7-4f41-b5f1-91ee02f35522", "DetectTime": "2024-05-21T12:30:14.649856+00:00", "EventTime": "2024-05-21T12:30:14.649879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.77.199.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN2ZXhtIfFnvtIT4i"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "cf9993be-02e8-482c-a5d5-bb1ac116e4f9", "DetectTime": "2024-05-21T12:30:14.773778+00:00", "EventTime": "2024-05-21T12:30:14.773800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSMOT1yZBejGQWjf9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "597ec702-a666-4bda-b9c5-1c162dd1c12a", "DetectTime": "2024-05-21T12:30:14.824695+00:00", "EventTime": "2024-05-21T12:30:14.824713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.254.41.178 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C15j4p1UBmdqrjpiHl"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ad12bc20-0618-4ba1-9e3d-6fb06fc3a2ff", "DetectTime": "2024-05-21T12:30:14.856515+00:00", "EventTime": "2024-05-21T12:30:14.856538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.41.36.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIMF2xNRooZMepW6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "92e41076-e294-40fe-ab41-b8f943488961", "DetectTime": "2024-05-21T12:30:14.884253+00:00", "EventTime": "2024-05-21T12:30:14.884272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.167.93.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cabvk41wSYSIsaCfGf"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "9ff02d8f-f882-4d07-abd0-6128d8f04a66", "DetectTime": "2024-05-21T12:30:14.921581+00:00", "EventTime": "2024-05-21T12:30:14.921602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCc5tH13idfzyparb6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "c28016fa-7636-4961-81df-d002e7a7723b", "DetectTime": "2024-05-21T12:30:15.161330+00:00", "EventTime": "2024-05-21T12:30:15.161351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.24.109.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQ34M1LMOrVMLLvDh"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "40ee3f02-d480-49a9-87f0-54fbe35206fb", "DetectTime": "2024-05-21T12:30:15.234267+00:00", "EventTime": "2024-05-21T12:30:15.234290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.59.217.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzQR02HzEB9aHcqQ1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "7fbe5ac8-9634-4cad-9eff-141ee1104704", "DetectTime": "2024-05-21T12:30:15.269463+00:00", "EventTime": "2024-05-21T12:30:15.269487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.241.35.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDWWS3o90sjoq2U8i"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "792144dd-e02f-409d-aa86-8eb1000baf13", "DetectTime": "2024-05-21T12:30:15.318240+00:00", "EventTime": "2024-05-21T12:30:15.318261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLqsqSPGZEGKaxGwc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "37fd75e8-800e-4ea3-8998-fcc119a9d4a6", "DetectTime": "2024-05-21T12:30:15.361979+00:00", "EventTime": "2024-05-21T12:30:15.362003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.250.88.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NzvE4XKQmBwWsGDb"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "5889cfce-f858-438f-97fc-85000ed7e2cc", "DetectTime": "2024-05-21T12:30:15.404736+00:00", "EventTime": "2024-05-21T12:30:15.404754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsLAg42Knh1x3HrSo4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "49b2ea0c-39b5-4e92-82da-4cfce8677989", "DetectTime": "2024-05-21T12:30:15.435614+00:00", "EventTime": "2024-05-21T12:30:15.435636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.148.67.70 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8T97v6iC4zVBjOsi"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "04f9300f-a7cc-4d8c-ac3c-5b15b9471d33", "DetectTime": "2024-05-21T12:30:15.485881+00:00", "EventTime": "2024-05-21T12:30:15.485901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.206.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnr1wzm8KkRJw4WA7"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "eddc0d17-baa2-46fe-b101-58971c6f3096", "DetectTime": "2024-05-21T12:30:15.530975+00:00", "EventTime": "2024-05-21T12:30:15.530998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYG4bE3fWRungakHe4"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8353c459-e669-40d6-bbda-f2dba2387e62", "DetectTime": "2024-05-21T12:30:15.561880+00:00", "EventTime": "2024-05-21T12:30:15.561901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.210.102.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFSua4GmwXlHCmlMb"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "e8f826cb-3d10-42e8-87d6-a3253f5ffae6", "DetectTime": "2024-05-21T12:30:15.588750+00:00", "EventTime": "2024-05-21T12:30:15.588770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.63.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBwnn1xkB513Qx7N9"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a91cdd49-de8f-491e-8af7-1d4e52368bea", "DetectTime": "2024-05-21T12:30:15.661851+00:00", "EventTime": "2024-05-21T12:30:15.661869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.203.197.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrMEA6GWzrmfRkCh"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a135115b-dcdc-4bef-89f8-14482ec9eb84", "DetectTime": "2024-05-21T12:30:15.690833+00:00", "EventTime": "2024-05-21T12:30:15.690853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.6.101.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTBQeNhVevT7xZGd"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "ccdfa581-ad7b-4fe6-9b9b-735c3447529c", "DetectTime": "2024-05-21T12:30:15.755587+00:00", "EventTime": "2024-05-21T12:30:15.755606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.8.143.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmckL1O9BLU2WWAG5"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "faf612ef-f975-4850-95f4-d0be9635aed8", "DetectTime": "2024-05-21T12:30:15.846942+00:00", "EventTime": "2024-05-21T12:30:15.846962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.227.73.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4iHj2AdkKvP6Skh1"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "5b392db7-70df-4f9e-9843-77181767395c", "DetectTime": "2024-05-21T12:30:15.906024+00:00", "EventTime": "2024-05-21T12:30:15.906043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqY6Cb1NhJQYI41Fmf"], "accumulated_threat_level": 4.772, "timewindow": 55} +{"Format": "IDEA0", "ID": "96f6bf91-6b1f-4d36-9831-ffa37f101c23", "DetectTime": "2024-05-21T12:30:15.930591+00:00", "EventTime": "2024-05-21T12:30:15.930612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmnak13MJ7EImjk0xa"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "8eec65ed-44e2-4262-8bb6-076bb20ffc33", "DetectTime": "2024-05-21T12:30:15.961998+00:00", "EventTime": "2024-05-21T12:30:15.962020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xqZ14USRVFlyrBs6"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "196dc171-66a9-41a1-8253-e229ccf52723", "DetectTime": "2024-05-21T12:30:16.008851+00:00", "EventTime": "2024-05-21T12:30:16.008875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiI57s3eYw0Rd6C8Gc"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "5400ce60-30fb-41ef-8ced-5a5116dea162", "DetectTime": "2024-05-21T12:30:16.083120+00:00", "EventTime": "2024-05-21T12:30:16.083142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.46.106.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtxiUp2iYInuhkFkZa"], "accumulated_threat_level": 4.8, "timewindow": 53} +{"Format": "IDEA0", "ID": "a9b146b7-18d9-4bef-b72e-2410ca46e2cf", "DetectTime": "2024-05-21T12:30:16.332764+00:00", "EventTime": "2024-05-21T12:30:16.332785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzDGJ1wCM0kPCjWC9", "CVnByk35sWvEQZz0Ej", "Cco1QU2TL34imSkm76", "CW3S5ypX97IeQTdMl"], "accumulated_threat_level": 5.272, "timewindow": 55} +{"Format": "IDEA0", "ID": "fbfad8a0-377c-4901-8531-bf8dd5904204", "DetectTime": "2024-05-21T12:30:16.369868+00:00", "EventTime": "2024-05-21T12:30:16.369890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzqe71HKUyWGAaQyg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "83ff987f-841d-416d-9a6c-0565ac19fdf4", "DetectTime": "2024-05-21T12:30:16.456509+00:00", "EventTime": "2024-05-21T12:30:16.456528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRnkH2m2irYFXcNca"], "accumulated_threat_level": 6.072, "timewindow": 55} +{"Format": "IDEA0", "ID": "ea7dca6b-eea9-4841-ad6f-511bb9ac8b40", "DetectTime": "2024-05-21T12:30:16.492148+00:00", "EventTime": "2024-05-21T12:30:16.492166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzyoDB1RLtHsRV2tCd"], "accumulated_threat_level": 6.872, "timewindow": 55} +{"Format": "IDEA0", "ID": "8643244a-edce-4ee4-a4c4-374e60cc230f", "DetectTime": "2024-05-21T12:30:16.535112+00:00", "EventTime": "2024-05-21T12:30:16.535131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqcGe4IZN2dshkx77"], "accumulated_threat_level": 7.672, "timewindow": 55} +{"Format": "IDEA0", "ID": "cf7443c6-7448-4e72-82e1-f123c8a09532", "DetectTime": "2024-05-21T12:30:16.570038+00:00", "EventTime": "2024-05-21T12:30:16.570057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCf6p2B3MRbL74wg"], "accumulated_threat_level": 8.472, "timewindow": 55} +{"Format": "IDEA0", "ID": "99cee06c-ab7a-4ba7-8be1-e8bda259fb3d", "DetectTime": "2024-05-21T12:30:16.616813+00:00", "EventTime": "2024-05-21T12:30:16.616833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "Connection to unknown destination port 21244/UDP destination IP 36.74.200.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq0fv1uid9KWlT1j8"], "accumulated_threat_level": 9.272, "timewindow": 55} +{"Format": "IDEA0", "ID": "b5443620-8671-4865-8611-754082f3b856", "DetectTime": "2024-05-21T12:30:16.651248+00:00", "EventTime": "2024-05-21T12:30:16.651270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VYESBnjnsaTKqM9"], "accumulated_threat_level": 10.072000000000001, "timewindow": 55} +{"Format": "IDEA0", "ID": "2ca869ae-382d-4077-bd92-f5407c80583b", "DetectTime": "2024-05-21T12:30:16.706145+00:00", "EventTime": "2024-05-21T12:30:16.706170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRKZPzYTwA44Imsg"], "accumulated_threat_level": 10.872000000000002, "timewindow": 55} +{"Format": "IDEA0", "ID": "fae3816e-4bbf-4773-9eca-e1e4a99d28cf", "DetectTime": "2024-05-21T12:30:16.737101+00:00", "EventTime": "2024-05-21T12:30:16.737122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJhMW3mj9RTGzjMq7"], "accumulated_threat_level": 11.672000000000002, "timewindow": 55} +{"Format": "IDEA0", "ID": "4f9a34ed-67af-47bd-b44e-6a0ecf4af8fb", "DetectTime": "2024-05-21T12:30:16.785822+00:00", "EventTime": "2024-05-21T12:30:16.785840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJwnSHjiJDuyxxf6b"], "accumulated_threat_level": 12.472000000000003, "timewindow": 55} +{"Format": "Json", "ID": "4f9a34ed-67af-47bd-b44e-6a0ecf4af8fb", "DetectTime": "2024-05-21T12:30:16.785822+00:00", "EventTime": "2024-05-21T12:30:16.785840+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-03T06:27:43.628968+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2024/05/21 12:30:17.149946)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.472000000000003, "timewindow": 55, "profileid": "profile_10.0.2.19", "threat_level": 12.472000000000003} +{"Format": "IDEA0", "ID": "9ce0167f-9f3d-42e8-8d8e-e6d005007697", "DetectTime": "2024-05-21T12:30:17.160331+00:00", "EventTime": "2024-05-21T12:30:17.160350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdHpTW5RlEVO1LR8"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "b24c5d16-3f68-4d38-8be2-966875bac73a", "DetectTime": "2024-05-21T12:30:17.172850+00:00", "EventTime": "2024-05-21T12:30:17.172868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.127.101.197"]}], "Attach": [{"Content": "Connection to unknown destination port 1438/UDP destination IP 79.127.101.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLlsm3NtpIHyGuuQ6"], "accumulated_threat_level": 1.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "cef0279a-02f0-4c11-b106-eb38adf9e514", "DetectTime": "2024-05-21T12:30:17.177755+00:00", "EventTime": "2024-05-21T12:30:17.177774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4gzvcqZFY7Em2x6"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "4488898c-29ef-434b-a744-fbce6235869f", "DetectTime": "2024-05-21T12:30:17.182430+00:00", "EventTime": "2024-05-21T12:30:17.182450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jwYb4HuEf2csnwV7"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "47a65c2c-4c53-4106-90b9-8a14fa377c98", "DetectTime": "2024-05-21T12:30:17.193850+00:00", "EventTime": "2024-05-21T12:30:17.193870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywPSg1CRzYhhUYUNd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 55} +{"Format": "IDEA0", "ID": "ea15867e-2a35-4c85-adaf-2b3d7b31fcfe", "DetectTime": "2024-05-21T12:30:17.198988+00:00", "EventTime": "2024-05-21T12:30:17.199006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9jSo4lfHe7OUzmzg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "79c432ca-20c9-4256-88d1-a00133dc8b42", "DetectTime": "2024-05-21T12:30:17.203444+00:00", "EventTime": "2024-05-21T12:30:17.203462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEorPz2biRXXDLCPgc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b7e3d7e0-cd0e-415c-a725-9d49a5c98897", "DetectTime": "2024-05-21T12:30:17.208044+00:00", "EventTime": "2024-05-21T12:30:17.208061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SZ6cXnv7bz14QLh"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "bf81440e-31c1-435e-938e-feca8a49e38f", "DetectTime": "2024-05-21T12:30:17.218706+00:00", "EventTime": "2024-05-21T12:30:17.218724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5vWvSckfDUSSRId"], "accumulated_threat_level": 3.2, "timewindow": 55} +{"Format": "IDEA0", "ID": "55b340f8-bac9-49c1-93b5-3892801dbb00", "DetectTime": "2024-05-21T12:30:17.223429+00:00", "EventTime": "2024-05-21T12:30:17.223447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSIMo4rDlpnsm3hd"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "38bd82f9-3520-4943-9e84-4e7d4e6b6c63", "DetectTime": "2024-05-21T12:30:17.238010+00:00", "EventTime": "2024-05-21T12:30:17.238029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGctdH2LDNWq3Bc6je"], "accumulated_threat_level": 4.0, "timewindow": 55} +{"Format": "IDEA0", "ID": "891c16e8-3a2b-43e7-9384-a944fbcd5280", "DetectTime": "2024-05-21T12:30:17.455492+00:00", "EventTime": "2024-05-21T12:30:17.455513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6TQR2XQkva3d0jzb"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "28657d84-ee6c-44c2-997b-bed6740c1480", "DetectTime": "2024-05-21T12:30:17.720130+00:00", "EventTime": "2024-05-21T12:30:17.720149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTnrz3lINpDeZKBTc"], "accumulated_threat_level": 4.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "f7f1f252-e17c-47bc-8b51-911c73d1864e", "DetectTime": "2024-05-21T12:30:17.724981+00:00", "EventTime": "2024-05-21T12:30:17.724998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCOGQ1NkrpNFEJCO4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "5f37bc40-141c-421c-9073-bc8e6894e9d2", "DetectTime": "2024-05-21T12:30:17.744075+00:00", "EventTime": "2024-05-21T12:30:17.744096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtydFL3dveUAjcJP86"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b5241069-d5b4-412c-a057-1860b2f24b33", "DetectTime": "2024-05-21T12:30:17.779537+00:00", "EventTime": "2024-05-21T12:30:17.779559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnqUP1enW8Y051SH5"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "3e6283e0-8da4-4847-bbb0-bab48201f872", "DetectTime": "2024-05-21T12:30:17.809671+00:00", "EventTime": "2024-05-21T12:30:17.809691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTAjn1EWHOfUjXoYc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "96b4e1cf-53e3-4718-be56-f7c0470c1582", "DetectTime": "2024-05-21T12:30:17.838307+00:00", "EventTime": "2024-05-21T12:30:17.838326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "Connection to unknown destination port 5170/UDP destination IP 24.151.56.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6MEQZ1hbawG9oRwTl"], "accumulated_threat_level": 5.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "7810dea1-58f5-4fea-8371-7de3995f9a70", "DetectTime": "2024-05-21T12:30:17.859890+00:00", "EventTime": "2024-05-21T12:30:17.859910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyXIQ1PR9hVgnDBqi"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "678fb92d-3878-450f-85cc-90773ba84385", "DetectTime": "2024-05-21T12:30:17.896347+00:00", "EventTime": "2024-05-21T12:30:17.896369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zsuCeFXljHPKlKj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 55} +{"Format": "IDEA0", "ID": "37dcf457-5734-45f4-bc38-871567881249", "DetectTime": "2024-05-21T12:30:17.925934+00:00", "EventTime": "2024-05-21T12:30:17.925956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIIPr2Zi5n02L5sqe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "42e3615b-512a-4670-9af5-24fa064c38bf", "DetectTime": "2024-05-21T12:30:17.956752+00:00", "EventTime": "2024-05-21T12:30:17.956770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CITRt2ZQyogg50u3b"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "51cf60b5-3603-44c2-a9f6-652686b24e35", "DetectTime": "2024-05-21T12:30:17.984310+00:00", "EventTime": "2024-05-21T12:30:17.984329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqExwR2MArePQy38Y"], "accumulated_threat_level": 7.999999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "8f121fb7-34e6-47f1-9bcc-248c76d551df", "DetectTime": "2024-05-21T12:30:18.051090+00:00", "EventTime": "2024-05-21T12:30:18.051112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLuLOhP6kS6lQxUUf"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "be84d8d0-adc6-4965-b120-821c64976a5b", "DetectTime": "2024-05-21T12:30:18.072372+00:00", "EventTime": "2024-05-21T12:30:18.072394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7u5d2gHV5Cvn7bs3"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "06fc7bff-6577-4bc0-a266-21cd72867a7f", "DetectTime": "2024-05-21T12:30:18.104356+00:00", "EventTime": "2024-05-21T12:30:18.104374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzyKQkSFDdBIuljVl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "4fdc5955-d1b7-4d55-addb-a0f7c733cc66", "DetectTime": "2024-05-21T12:30:18.136481+00:00", "EventTime": "2024-05-21T12:30:18.136502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4NdCt3LBwwOMHvSc5"], "accumulated_threat_level": 9.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "20885c36-4cc8-4335-91f0-2cd56d4cee5e", "DetectTime": "2024-05-21T12:30:18.169387+00:00", "EventTime": "2024-05-21T12:30:18.169407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLSqeO2j6n1GarVqk5"], "accumulated_threat_level": 10.4, "timewindow": 55} +{"Format": "IDEA0", "ID": "94919dd7-53c8-4319-b1f3-5a84441ecf89", "DetectTime": "2024-05-21T12:30:18.204624+00:00", "EventTime": "2024-05-21T12:30:18.204644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwqX92OT9d9Siqjji"], "accumulated_threat_level": 11.200000000000001, "timewindow": 55} +{"Format": "IDEA0", "ID": "caeab666-1860-49db-b0fb-f37b881002f9", "DetectTime": "2024-05-21T12:30:18.255018+00:00", "EventTime": "2024-05-21T12:30:18.255046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXmAc22kaLvU6kHb3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 55} +{"Format": "Json", "ID": "caeab666-1860-49db-b0fb-f37b881002f9", "DetectTime": "2024-05-21T12:30:18.255018+00:00", "EventTime": "2024-05-21T12:30:18.255046+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "1970-01-03T06:27:46.653753+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2024/05/21 12:30:18.402308)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 55, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "86c8ae56-fbcf-4faa-996a-b26fdbfb36bc", "DetectTime": "2024-05-21T12:30:18.414158+00:00", "EventTime": "2024-05-21T12:30:18.414179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRBgx4yPaOwTnf7Mk"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "09796871-c135-400b-af2e-1ddc6b9a1c2d", "DetectTime": "2024-05-21T12:30:18.425285+00:00", "EventTime": "2024-05-21T12:30:18.425304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoOmM94SrNY1zTe0sh"], "accumulated_threat_level": 1.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "a3aa5641-8b0d-41b7-a4d9-c6f78ae2a7eb", "DetectTime": "2024-05-21T12:30:18.579388+00:00", "EventTime": "2024-05-21T12:30:18.579411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dgsc4aN2CTtW9p8c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 55} +{"Format": "IDEA0", "ID": "c3d082cc-94cc-451b-9dc7-07f8d6a22775", "DetectTime": "2024-05-21T12:30:18.638980+00:00", "EventTime": "2024-05-21T12:30:18.638999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtYwA2QTdrPj4FZ5f"], "accumulated_threat_level": 3.2, "timewindow": 55} +{"Format": "IDEA0", "ID": "b5c0c764-f30e-4a7f-8ee2-94f4f4da6d7e", "DetectTime": "2024-05-21T12:30:18.672707+00:00", "EventTime": "2024-05-21T12:30:18.672729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0vm94v2XxwSiVpMl"], "accumulated_threat_level": 4.0, "timewindow": 55} +{"Format": "IDEA0", "ID": "5d9a5ba3-2676-4cc5-b56f-be7f0b70be59", "DetectTime": "2024-05-21T12:30:18.696988+00:00", "EventTime": "2024-05-21T12:30:18.697011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdxML1CHYXNEPNe1l"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "e0ff84c8-b166-4457-9ef5-291617375634", "DetectTime": "2024-05-21T12:30:18.725733+00:00", "EventTime": "2024-05-21T12:30:18.725752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0Cqb3TCzaggBIXZf"], "accumulated_threat_level": 4.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "53094881-dd54-41a1-a74e-c195e49388fb", "DetectTime": "2024-05-21T12:30:18.763447+00:00", "EventTime": "2024-05-21T12:30:18.763467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrwhk2Vpi2a3ovHVh"], "accumulated_threat_level": 5.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "156b07f6-2e0d-4a1c-a439-1a53e69fbe18", "DetectTime": "2024-05-21T12:30:18.778020+00:00", "EventTime": "2024-05-21T12:30:18.778042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXRDI2JN5oqU0XLS4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "7b633d80-1c1e-46e8-99e7-0c96a86cb837", "DetectTime": "2024-05-21T12:30:18.808412+00:00", "EventTime": "2024-05-21T12:30:18.808432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIIHyo22ddx11xf8b4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "11930009-adb7-4f29-a8e8-d0c9194917d5", "DetectTime": "2024-05-21T12:30:18.877576+00:00", "EventTime": "2024-05-21T12:30:18.877597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["197.6.58.68"]}], "Attach": [{"Content": "Connection to unknown destination port 7265/UDP destination IP 197.6.58.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiAXH1CBy0tvUsts9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 55} +{"Format": "IDEA0", "ID": "d0bb1e76-cfad-44f7-98e8-70352bb4d625", "DetectTime": "2024-05-21T12:30:18.895199+00:00", "EventTime": "2024-05-21T12:30:18.895218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOwM5gSiTwYA6OUi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "8c9a525f-217e-4bd4-a029-0cea3d304789", "DetectTime": "2024-05-21T12:30:18.929095+00:00", "EventTime": "2024-05-21T12:30:18.929113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJAJzp2zqph8IbSGZ6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "ace05d72-1945-4a02-8d5f-ec140749269f", "DetectTime": "2024-05-21T12:30:18.963477+00:00", "EventTime": "2024-05-21T12:30:18.963496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVmfc2eJVtqMz4J"], "accumulated_threat_level": 8.799999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "9e97ffd9-c503-42de-98a2-fcb8c592235c", "DetectTime": "2024-05-21T12:30:18.996589+00:00", "EventTime": "2024-05-21T12:30:18.996608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZnjT43aFUpAy4SGhg"], "accumulated_threat_level": 9.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "0bf9e7e4-91a3-45bf-b013-ae0ecc871eaa", "DetectTime": "2024-05-21T12:30:19.029198+00:00", "EventTime": "2024-05-21T12:30:19.029217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCmnU1YkgcoWS7tQ4"], "accumulated_threat_level": 10.4, "timewindow": 55} +{"Format": "IDEA0", "ID": "8e968f4a-7ef1-4a16-aca2-38ec73ec78ac", "DetectTime": "2024-05-21T12:30:19.053062+00:00", "EventTime": "2024-05-21T12:30:19.053084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9tPm4BeBZGE97pP1"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "ef913c4d-d139-43dd-8de0-3964ebf9b4ad", "DetectTime": "2024-05-21T12:30:19.081731+00:00", "EventTime": "2024-05-21T12:30:19.081749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJ4hF3xemGU9kLr43"], "accumulated_threat_level": 11.200000000000001, "timewindow": 55} +{"Format": "IDEA0", "ID": "ab8059e6-4f0d-44c6-8537-91b5f018a36e", "DetectTime": "2024-05-21T12:30:19.114154+00:00", "EventTime": "2024-05-21T12:30:19.114174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQMFH2YYgUVR5aKna"], "accumulated_threat_level": 12.000000000000002, "timewindow": 55} +{"Format": "Json", "ID": "ab8059e6-4f0d-44c6-8537-91b5f018a36e", "DetectTime": "2024-05-21T12:30:19.114154+00:00", "EventTime": "2024-05-21T12:30:19.114174+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "1970-01-03T06:28:25.106356+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2024/05/21 12:30:19.296185)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 55, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e532c193-895f-4898-b01d-d8ace57579f8", "DetectTime": "2024-05-21T12:30:19.429755+00:00", "EventTime": "2024-05-21T12:30:19.429780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCh8hv4UqcIlxUuSz"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "d70a26f6-087c-42d7-acb3-61069d0b83de", "DetectTime": "2024-05-21T12:30:19.435638+00:00", "EventTime": "2024-05-21T12:30:19.435657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C33vge2uf0c5AXURfa"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "752f03ee-b5ec-4b1a-898a-c9d7657c51f1", "DetectTime": "2024-05-21T12:30:19.446277+00:00", "EventTime": "2024-05-21T12:30:19.446299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.93.105.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn5E2j1E1yIDZLOV2e"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "91657bb5-20bf-407f-a8e8-f81c9a4ce071", "DetectTime": "2024-05-21T12:30:19.451496+00:00", "EventTime": "2024-05-21T12:30:19.451515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4qdwJe1G6e6uNZX7"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "06501581-479f-4953-a57e-d22e79012755", "DetectTime": "2024-05-21T12:30:19.467831+00:00", "EventTime": "2024-05-21T12:30:19.467851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffuOk1Phum8ewW1Ad"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "b555c0e5-7193-48fa-a970-b263f89e698e", "DetectTime": "2024-05-21T12:30:19.472995+00:00", "EventTime": "2024-05-21T12:30:19.473014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1tOA4fAqtlgJHkqc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "28b068f9-16b3-4a61-b45d-ccc9ae0056c1", "DetectTime": "2024-05-21T12:30:19.478384+00:00", "EventTime": "2024-05-21T12:30:19.478402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9Idf4wil8fYXMKW4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "865c13a4-b7d8-4412-bf6b-37de7f34d23e", "DetectTime": "2024-05-21T12:30:19.505942+00:00", "EventTime": "2024-05-21T12:30:19.505964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUqq3e1xAgGP3rTuT3"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "269cdae4-5911-4bbc-a55e-8f1f2ffca8b8", "DetectTime": "2024-05-21T12:30:19.522630+00:00", "EventTime": "2024-05-21T12:30:19.522653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkdsP2FrcREMfdrB8"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "783d29e2-adb0-4154-a7dd-f6aa485c5308", "DetectTime": "2024-05-21T12:30:19.619222+00:00", "EventTime": "2024-05-21T12:30:19.619245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIaDGl4HGt1YnPSBs6"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "8369ff83-3435-4461-a21d-231d646decaf", "DetectTime": "2024-05-21T12:30:19.681138+00:00", "EventTime": "2024-05-21T12:30:19.681158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.120.59.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7bON2TMVqPqwvev6"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "958ef902-8a71-430e-9212-eb5baa596ff9", "DetectTime": "2024-05-21T12:30:19.737038+00:00", "EventTime": "2024-05-21T12:30:19.737058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDCJXe1EoimpoHjY9g"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "988d1128-e1a3-4ff7-995d-2bb72b009647", "DetectTime": "2024-05-21T12:30:19.756098+00:00", "EventTime": "2024-05-21T12:30:19.756117+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.09, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["82.211.141.181"], "Type": ["CC"], "Port": [5977], "Proto": ["TCP"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "C&C channel, destination IP: 82.211.141.181 port: 5977/tcp score: 0.9984. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMyacG2DWE6q0XI5g5"], "accumulated_threat_level": 0.872, "timewindow": 55} +{"Format": "IDEA0", "ID": "0028de55-506f-4351-a3d7-0b4037a5c0ea", "DetectTime": "2024-05-21T12:30:19.761423+00:00", "EventTime": "2024-05-21T12:30:19.761441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yc2cJu3FMOiO9Qa"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "2dfd774f-bd2b-4359-b484-139d6d5144f4", "DetectTime": "2024-05-21T12:30:19.765921+00:00", "EventTime": "2024-05-21T12:30:19.765940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHwI12lS9PA54X3c8"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "9f5b069b-0b3e-4076-9ae5-502175b65a88", "DetectTime": "2024-05-21T12:30:19.782993+00:00", "EventTime": "2024-05-21T12:30:19.783012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCQHwm2rEwQtch6X51"], "accumulated_threat_level": 1.6720000000000002, "timewindow": 55} +{"Format": "IDEA0", "ID": "1ec961e8-15cb-4a4c-b8d5-fc9f267d01cd", "DetectTime": "2024-05-21T12:30:19.787662+00:00", "EventTime": "2024-05-21T12:30:19.787679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE14hNBSM28Ek3yhg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "928fab26-1de3-4519-a40e-acd494805d68", "DetectTime": "2024-05-21T12:30:19.792337+00:00", "EventTime": "2024-05-21T12:30:19.792354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqptrF4wkVNkMDjPD4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "9ea44b16-6333-4c70-99cc-2b40f1bcca6c", "DetectTime": "2024-05-21T12:30:19.805808+00:00", "EventTime": "2024-05-21T12:30:19.805827+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.09, "Source": [{"IP4": ["82.211.141.181"], "Type": ["CC"]}, {"IP4": ["82.211.141.181"], "Type": ["CC"], "Port": [5977], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 82.211.141.181 port: 5977/tcp score: 0.9984. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMyacG2DWE6q0XI5g5"], "accumulated_threat_level": 0, "timewindow": 55} +{"Format": "IDEA0", "ID": "07730547-26bd-4bc8-9e7c-ca0a6a34fd89", "DetectTime": "2024-05-21T12:30:19.810845+00:00", "EventTime": "2024-05-21T12:30:19.810865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.232.123 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYmVKY2C7mzhG92wi8"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "0258f96d-c651-456c-8e97-b23789b2959f", "DetectTime": "2024-05-21T12:30:19.885134+00:00", "EventTime": "2024-05-21T12:30:19.885169+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.09, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["151.45.9.200"], "Type": ["CC"], "Port": [2349], "Proto": ["TCP"]}], "Target": [{"IP4": ["151.45.9.200"]}], "Attach": [{"Content": "C&C channel, destination IP: 151.45.9.200 port: 2349/tcp score: 0.9985. AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXYXY1CCVRLX6ueJ7"], "accumulated_threat_level": 1.7440000000000002, "timewindow": 55} +{"Format": "IDEA0", "ID": "99b2bf3f-0fe9-46ae-8540-26a9aa221edc", "DetectTime": "2024-05-21T12:30:19.904711+00:00", "EventTime": "2024-05-21T12:30:19.904731+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.09, "Source": [{"IP4": ["151.45.9.200"], "Type": ["CC"]}, {"IP4": ["151.45.9.200"], "Type": ["CC"], "Port": [2349], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 151.45.9.200 port: 2349/tcp score: 0.9985. AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXYXY1CCVRLX6ueJ7"], "accumulated_threat_level": 0, "timewindow": 55} +{"Format": "IDEA0", "ID": "4a007970-9339-4832-8b18-6b96e518ec51", "DetectTime": "2024-05-21T12:30:20.140469+00:00", "EventTime": "2024-05-21T12:30:20.140490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPK7Z2JM2aiqh2rij"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "40d8d72f-f146-41e8-8303-f9773d9e28b2", "DetectTime": "2024-05-21T12:30:20.145330+00:00", "EventTime": "2024-05-21T12:30:20.145350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.6.58.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0baHsx22fgab3iW8"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "fac28736-04df-4b80-8c34-55ce15f08459", "DetectTime": "2024-05-21T12:30:20.161895+00:00", "EventTime": "2024-05-21T12:30:20.161913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.134.161.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3mEof4WjEoi8vMAS5"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "03a39f8e-7283-476b-98f8-bd55e04739de", "DetectTime": "2024-05-21T12:30:20.166322+00:00", "EventTime": "2024-05-21T12:30:20.166338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuhfp63kYUnrIiXLI5"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "9a2e396d-fab3-4123-afca-cd157ec12db4", "DetectTime": "2024-05-21T12:30:20.255946+00:00", "EventTime": "2024-05-21T12:30:20.255966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1gsLQ3nFxkXFEK6gf"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "74cba054-77bb-4e17-b0f2-74398260e708", "DetectTime": "2024-05-21T12:30:20.260509+00:00", "EventTime": "2024-05-21T12:30:20.260527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Tl9N16Ssv7OlkBTc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "4d823e59-a07c-4ce6-a8a8-0847996a4f5f", "DetectTime": "2024-05-21T12:30:20.265033+00:00", "EventTime": "2024-05-21T12:30:20.265051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxgcMEQXhfoly9HA6"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "5e6f136f-39a2-4710-b770-e70e3b64750c", "DetectTime": "2024-05-21T12:30:20.334583+00:00", "EventTime": "2024-05-21T12:30:20.334603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2Dmq3PHr3o1CXuff"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "20316a83-f2d3-4e75-97e4-f5430177989c", "DetectTime": "2024-05-21T12:30:20.348894+00:00", "EventTime": "2024-05-21T12:30:20.348914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmE1Tq2HLLkgQPrlK4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "3b215b97-5f88-42d1-93fd-41d5a15e2fdc", "DetectTime": "2024-05-21T12:30:20.366174+00:00", "EventTime": "2024-05-21T12:30:20.366193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMyacG2DWE6q0XI5g5"], "accumulated_threat_level": 2.5440000000000005, "timewindow": 55} +{"Format": "IDEA0", "ID": "2cf4479f-0ca5-4dac-b2f2-1930d97d9f1f", "DetectTime": "2024-05-21T12:30:20.412935+00:00", "EventTime": "2024-05-21T12:30:20.412954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuY3qa4LWL1oALDELl"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "5c2a84b6-c2fe-4ff1-a612-bffa118db7c3", "DetectTime": "2024-05-21T12:30:20.444284+00:00", "EventTime": "2024-05-21T12:30:20.444305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkwlU77MbKfyOC8L1"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "e8bca0b8-eba1-4a9b-8e23-69c6cca9a24c", "DetectTime": "2024-05-21T12:30:20.459698+00:00", "EventTime": "2024-05-21T12:30:20.459728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6DJPj2ULRxUCW6qie", "CwRMdqjq4B7FYdbl", "CvRD1I1b4rMS84xEPk", "CxdNk51srUJZISrwD1"], "accumulated_threat_level": 3.0440000000000005, "timewindow": 55} +{"Format": "IDEA0", "ID": "4b38bae3-d0f5-4c91-b5f5-5cef363faaa8", "DetectTime": "2024-05-21T12:30:20.482924+00:00", "EventTime": "2024-05-21T12:30:20.482945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.206.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE87HQ2zNOrhfxAGx4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "237a7bf7-8604-43c6-aaca-1f4c6c039d1e", "DetectTime": "2024-05-21T12:30:20.500828+00:00", "EventTime": "2024-05-21T12:30:20.500846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaaVY3Nig02k1gqof"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "bc56ac34-b741-429a-a2d1-86ba8bf3f3e5", "DetectTime": "2024-05-21T12:30:20.546630+00:00", "EventTime": "2024-05-21T12:30:20.546651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CshZiNJ4z22iSHtna"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "50376869-0e7d-4766-b294-78b2dc97e3e7", "DetectTime": "2024-05-21T12:30:20.569309+00:00", "EventTime": "2024-05-21T12:30:20.569332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTBU1h1OuOaUNXm0wb"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "5f693a29-dd16-40a9-835f-77837e1ee1f5", "DetectTime": "2024-05-21T12:30:20.865833+00:00", "EventTime": "2024-05-21T12:30:20.865851+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKiVY3f1V4xDtjzRj"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "56e3101c-d4e8-49fd-8d09-4734a0741288", "DetectTime": "2024-05-21T12:30:20.876865+00:00", "EventTime": "2024-05-21T12:30:20.876883+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKiVY3f1V4xDtjzRj"], "accumulated_threat_level": 2.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "15b93b18-9e85-414b-9d3f-0a80e2a20ff1", "DetectTime": "2024-05-21T12:30:20.881602+00:00", "EventTime": "2024-05-21T12:30:20.881620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBnDDPJFtPgUOzg2"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "d74b141c-2674-40e9-b103-2d879f5c8abc", "DetectTime": "2024-05-21T12:30:21.163129+00:00", "EventTime": "2024-05-21T12:30:21.163148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrWp8Pfu8chKIepVa"], "accumulated_threat_level": 3.8440000000000003, "timewindow": 55} +{"Format": "IDEA0", "ID": "ec8380f8-a65e-4d7c-8e54-eecdfe98f0d9", "DetectTime": "2024-05-21T12:30:21.199083+00:00", "EventTime": "2024-05-21T12:30:21.199103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5x3gbodnvIxGBHJ5"], "accumulated_threat_level": 4.644, "timewindow": 55} +{"Format": "IDEA0", "ID": "f233b289-cde0-4102-8a5f-deef17d81142", "DetectTime": "2024-05-21T12:30:21.250520+00:00", "EventTime": "2024-05-21T12:30:21.250539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vHnp4pUJETCxGVX6"], "accumulated_threat_level": 5.444, "timewindow": 55} +{"Format": "IDEA0", "ID": "ec586661-f682-49c1-9561-3f5d0cf17205", "DetectTime": "2024-05-21T12:30:21.283233+00:00", "EventTime": "2024-05-21T12:30:21.283252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmFS6F4gZ2WAv1bRF4"], "accumulated_threat_level": 6.244, "timewindow": 55} +{"Format": "IDEA0", "ID": "9dd57843-1b50-4fa7-826a-06f782fdee48", "DetectTime": "2024-05-21T12:30:21.332562+00:00", "EventTime": "2024-05-21T12:30:21.332584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCYCw1z0Ux5d8t8t7"], "accumulated_threat_level": 7.044, "timewindow": 55} +{"Format": "IDEA0", "ID": "eb51d09c-2385-4c1c-be55-c66b6de70b23", "DetectTime": "2024-05-21T12:30:21.374253+00:00", "EventTime": "2024-05-21T12:30:21.374274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chlc8B34SLxLVk84Lj"], "accumulated_threat_level": 7.843999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "2f3c7ba0-422f-4e0d-a749-e566bb491fd0", "DetectTime": "2024-05-21T12:30:21.475364+00:00", "EventTime": "2024-05-21T12:30:21.475384+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iXCt26d0mpfUCvXg"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "e86c2658-d27d-457e-8927-bd6dcd45e45f", "DetectTime": "2024-05-21T12:30:21.486839+00:00", "EventTime": "2024-05-21T12:30:21.486858+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iXCt26d0mpfUCvXg"], "accumulated_threat_level": 2.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "3e5fc054-ffa3-4df5-936f-22b3aeacfb9c", "DetectTime": "2024-05-21T12:30:21.549162+00:00", "EventTime": "2024-05-21T12:30:21.549179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct57bu4E0zdi9NuwIe"], "accumulated_threat_level": 8.644, "timewindow": 55} +{"Format": "IDEA0", "ID": "754e72c7-aacb-43f6-be18-6e02f9ccd75a", "DetectTime": "2024-05-21T12:30:21.722018+00:00", "EventTime": "2024-05-21T12:30:21.722042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm77PO1jOcQ54XHcqh"], "accumulated_threat_level": 9.444, "timewindow": 55} +{"Format": "IDEA0", "ID": "f85ee6d1-5e46-475f-81bb-61ceb250065a", "DetectTime": "2024-05-21T12:30:21.726902+00:00", "EventTime": "2024-05-21T12:30:21.726920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.221.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce6o0X2rTAvREU8fR3"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "4131bec5-6e80-4f9f-820b-14195dd5a36b", "DetectTime": "2024-05-21T12:30:21.821157+00:00", "EventTime": "2024-05-21T12:30:21.821176+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtrCorb4fDJFWvGg"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "4a972bd2-e714-4863-a358-66cf3fc5eeba", "DetectTime": "2024-05-21T12:30:21.832344+00:00", "EventTime": "2024-05-21T12:30:21.832362+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtrCorb4fDJFWvGg"], "accumulated_threat_level": 3.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "d51b8e0f-a79d-4659-964b-87cec9a85d03", "DetectTime": "2024-05-21T12:30:21.850816+00:00", "EventTime": "2024-05-21T12:30:21.850836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMSAq2F30hT0Ol8k1"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "9091a298-8047-4b7b-ae9a-1b1876c41e51", "DetectTime": "2024-05-21T12:30:21.863222+00:00", "EventTime": "2024-05-21T12:30:21.863239+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMSAq2F30hT0Ol8k1"], "accumulated_threat_level": 3.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "13ab48e4-ce0a-43e0-92f6-6ed75c82c595", "DetectTime": "2024-05-21T12:30:21.874426+00:00", "EventTime": "2024-05-21T12:30:21.874444+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvAoU2hsCixYuDCYl"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "cf401b4d-1669-4ee1-b03d-8f947b9a1c89", "DetectTime": "2024-05-21T12:30:21.886567+00:00", "EventTime": "2024-05-21T12:30:21.886586+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvAoU2hsCixYuDCYl"], "accumulated_threat_level": 4.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "8de164ad-5992-48c5-88f8-58eb7ab70b84", "DetectTime": "2024-05-21T12:30:21.896988+00:00", "EventTime": "2024-05-21T12:30:21.897006+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdF98C4w51SobkHnRb"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "d2258a7e-3851-4897-95bb-26f72fd75dee", "DetectTime": "2024-05-21T12:30:21.908203+00:00", "EventTime": "2024-05-21T12:30:21.908221+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdF98C4w51SobkHnRb"], "accumulated_threat_level": 4.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "980aee43-3d0e-4d2e-aa6c-af9895139083", "DetectTime": "2024-05-21T12:30:21.920982+00:00", "EventTime": "2024-05-21T12:30:21.921004+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNXfl1PaUMPAzvyRj"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "ee791bf3-b5ed-4e13-8acb-1661305ca223", "DetectTime": "2024-05-21T12:30:21.932873+00:00", "EventTime": "2024-05-21T12:30:21.932896+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNXfl1PaUMPAzvyRj"], "accumulated_threat_level": 5.0, "timewindow": 18} +{"Format": "IDEA0", "ID": "2b902d2d-a47f-4814-8c3a-3455590f3eed", "DetectTime": "2024-05-21T12:30:22.005281+00:00", "EventTime": "2024-05-21T12:30:22.005301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPLtg3RWhMy9GhBrk"], "accumulated_threat_level": 10.244000000000002, "timewindow": 55} +{"Format": "IDEA0", "ID": "6b36a494-ac8c-4494-9f3b-793590ec3427", "DetectTime": "2024-05-21T12:30:22.051719+00:00", "EventTime": "2024-05-21T12:30:22.051746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxEaj4ecj3gAapIcl"], "accumulated_threat_level": 11.044000000000002, "timewindow": 55} +{"Format": "IDEA0", "ID": "6ad9f313-cad5-4fe5-af92-efded233dfca", "DetectTime": "2024-05-21T12:30:22.096070+00:00", "EventTime": "2024-05-21T12:30:22.096090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkE0aC3GCjO82VJOa2"], "accumulated_threat_level": 11.844000000000003, "timewindow": 55} +{"Format": "IDEA0", "ID": "ef676aec-c76a-4398-84d6-0742b2264a33", "DetectTime": "2024-05-21T12:30:22.130394+00:00", "EventTime": "2024-05-21T12:30:22.130427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqb9JXXbiHmeFVeH4"], "accumulated_threat_level": 12.644000000000004, "timewindow": 55} +{"Format": "Json", "ID": "ef676aec-c76a-4398-84d6-0742b2264a33", "DetectTime": "2024-05-21T12:30:22.130394+00:00", "EventTime": "2024-05-21T12:30:22.130427+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "1970-01-03T06:59:21.240807+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2024/05/21 12:30:22.379953)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.644000000000004, "timewindow": 55, "profileid": "profile_10.0.2.19", "threat_level": 12.644000000000004} +{"Format": "IDEA0", "ID": "db32fcd0-eebf-46b1-ae86-b6de39cfcbee", "DetectTime": "2024-05-21T12:30:22.383970+00:00", "EventTime": "2024-05-21T12:30:22.383988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.93.105.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gZeBwJ3h4pz4LJ7"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "90fbf6fb-75bc-4928-a092-52924669a6af", "DetectTime": "2024-05-21T12:30:22.395388+00:00", "EventTime": "2024-05-21T12:30:22.395409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.120.59.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nb092F6YZvgxGvF"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "523fe209-ae88-466c-83c5-3ba979b28dc0", "DetectTime": "2024-05-21T12:30:22.689238+00:00", "EventTime": "2024-05-21T12:30:22.689260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQW0zy4DU24J73WC25"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "305cea71-e279-488d-ab28-719c55d2b8b0", "DetectTime": "2024-05-21T12:30:22.735894+00:00", "EventTime": "2024-05-21T12:30:22.735913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UFjS2KSeBs3X6cId"], "accumulated_threat_level": 1.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "ea155c9f-f74b-4a0c-be29-fb1a3bba464c", "DetectTime": "2024-05-21T12:30:22.999096+00:00", "EventTime": "2024-05-21T12:30:22.999118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVeCcC4nZgYHOj1v75"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "5d785d9c-4d15-4bc7-9b90-8e9fd7747784", "DetectTime": "2024-05-21T12:30:23.004349+00:00", "EventTime": "2024-05-21T12:30:23.004369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.232.123 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNxtk42yfvx7anGEug"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "e9683b2f-6804-44f8-8d49-d07d43e9a7ff", "DetectTime": "2024-05-21T12:30:23.009259+00:00", "EventTime": "2024-05-21T12:30:23.009278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcdZBBrcRQcXe3Yj"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b2201469-bac4-40fc-9585-f55083b7fc32", "DetectTime": "2024-05-21T12:30:23.062476+00:00", "EventTime": "2024-05-21T12:30:23.062495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VuSQ298lhcmQf1Xk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 55} +{"Format": "IDEA0", "ID": "23e0c108-ba61-42e4-8f8e-e8fac1e80381", "DetectTime": "2024-05-21T12:30:23.111935+00:00", "EventTime": "2024-05-21T12:30:23.111954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW9LPnckVxdP9102j"], "accumulated_threat_level": 3.2, "timewindow": 55} +{"Format": "IDEA0", "ID": "851f7a28-7b05-410a-8fba-81ea4c8ea5f1", "DetectTime": "2024-05-21T12:30:23.141529+00:00", "EventTime": "2024-05-21T12:30:23.141548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv46FTSgYE4Xvjd35"], "accumulated_threat_level": 4.0, "timewindow": 55} +{"Format": "IDEA0", "ID": "655e7640-f031-447c-803d-70bc6229d2af", "DetectTime": "2024-05-21T12:30:23.174646+00:00", "EventTime": "2024-05-21T12:30:23.174667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllUb6WB1xQIvmuBc"], "accumulated_threat_level": 4.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "552dab93-0378-4943-ade1-0fbdccf9adf4", "DetectTime": "2024-05-21T12:30:23.209657+00:00", "EventTime": "2024-05-21T12:30:23.209678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIG9Z32mJVbcuQoKng"], "accumulated_threat_level": 5.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "fc875a20-29a3-4e11-833b-1889326c63b9", "DetectTime": "2024-05-21T12:30:23.233131+00:00", "EventTime": "2024-05-21T12:30:23.233151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBDRSVtGcX7jJdp"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "70f8a6fe-ca22-4848-a1e2-bbf08d27e192", "DetectTime": "2024-05-21T12:30:23.265547+00:00", "EventTime": "2024-05-21T12:30:23.265569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMFnC1rsLUHeqjBj8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 55} +{"Format": "IDEA0", "ID": "95d16491-046d-4499-b71d-c48bf1033438", "DetectTime": "2024-05-21T12:30:23.288756+00:00", "EventTime": "2024-05-21T12:30:23.288774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUORWUGT47fdTb6fi"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "91df7853-b1b1-45c8-9634-7acf5fc72675", "DetectTime": "2024-05-21T12:30:23.316908+00:00", "EventTime": "2024-05-21T12:30:23.316927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7va94tUwAKyLhNT5"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "14d14348-c596-40d8-883b-245336d98e44", "DetectTime": "2024-05-21T12:30:23.354031+00:00", "EventTime": "2024-05-21T12:30:23.354053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ZyCf3736wlsvv6O1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "dd50454e-9701-47dc-a2ad-b057bc912040", "DetectTime": "2024-05-21T12:30:23.380295+00:00", "EventTime": "2024-05-21T12:30:23.380314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WtX732ETcElRg9T5"], "accumulated_threat_level": 0, "timewindow": 18} +{"Format": "IDEA0", "ID": "bbffb544-f1b8-459a-9e5d-67056a5d1e88", "DetectTime": "2024-05-21T12:30:23.385127+00:00", "EventTime": "2024-05-21T12:30:23.385145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVHYdkqlZf0mzv48"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "e412e17f-c75a-4cc5-8af3-c9914df49594", "DetectTime": "2024-05-21T12:30:23.398126+00:00", "EventTime": "2024-05-21T12:30:23.398144+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WtX732ETcElRg9T5"], "accumulated_threat_level": 5.5, "timewindow": 18} +{"Format": "IDEA0", "ID": "eb535551-7036-418c-ac69-ef874dfc594f", "DetectTime": "2024-05-21T12:30:23.402907+00:00", "EventTime": "2024-05-21T12:30:23.402926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz1t7N34CinOAmfy93"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "e6211bb6-3bd0-4a04-966c-39f9f39848e0", "DetectTime": "2024-05-21T12:30:23.443703+00:00", "EventTime": "2024-05-21T12:30:23.443723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Mvhz3CijeRd0gBo2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "96095322-c5c4-4f5d-a240-25f0b4edbeeb", "DetectTime": "2024-05-21T12:30:23.448486+00:00", "EventTime": "2024-05-21T12:30:23.448504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFVUK1MPNbhTB5mjb"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "8480262e-fa3e-46bd-90fc-8ce4ab958c92", "DetectTime": "2024-05-21T12:30:23.520617+00:00", "EventTime": "2024-05-21T12:30:23.520641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1jiHBd9laAMd39d"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b00d23fa-9238-4c0e-8920-e5c35d1aed4a", "DetectTime": "2024-05-21T12:30:23.553540+00:00", "EventTime": "2024-05-21T12:30:23.553559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C60DPc3eh8pkhliPZ8"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "e037baae-b75c-4e1e-a31a-3d9ddbc3539d", "DetectTime": "2024-05-21T12:30:23.558687+00:00", "EventTime": "2024-05-21T12:30:23.558708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0jJc4U17eOLGvqqf"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "ac1548e9-0a14-45f9-b487-46e18df39425", "DetectTime": "2024-05-21T12:30:23.611808+00:00", "EventTime": "2024-05-21T12:30:23.611828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnr5a1WJncyOV2YH"], "accumulated_threat_level": 8.799999999999999, "timewindow": 55} +{"Format": "IDEA0", "ID": "b14074ed-439d-4cb6-850b-7ba96b8fb31b", "DetectTime": "2024-05-21T12:30:23.828037+00:00", "EventTime": "2024-05-21T12:30:23.828058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1G1ry3MuvlwFlj5z2"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "f5be4807-a22f-4bf3-a4a0-936933f34bea", "DetectTime": "2024-05-21T12:30:23.882891+00:00", "EventTime": "2024-05-21T12:30:23.882913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TeDDJ2ktZnVCwpi"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "60f78972-b8a1-4db6-ac02-83bc1f63c122", "DetectTime": "2024-05-21T12:30:23.888037+00:00", "EventTime": "2024-05-21T12:30:23.888056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIkwG63nzdlLDqtlGc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "2d2ecd4a-3f85-4dfc-b581-ccdf3eafff01", "DetectTime": "2024-05-21T12:30:23.892880+00:00", "EventTime": "2024-05-21T12:30:23.892900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC79lF3g1UET9n4uVg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "194e70c2-bf3d-4fda-9f8e-2e4a0326c23c", "DetectTime": "2024-05-21T12:30:23.898360+00:00", "EventTime": "2024-05-21T12:30:23.898380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUOCU33NHMFahXZj"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "97ff8169-0c20-4be9-be96-8ff7515f074f", "DetectTime": "2024-05-21T12:30:23.964786+00:00", "EventTime": "2024-05-21T12:30:23.964805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBu1835r4oLGGJBu6"], "accumulated_threat_level": 9.6, "timewindow": 55} +{"Format": "IDEA0", "ID": "7cbf6cf5-21f4-4da5-96dc-70bbf50135b8", "DetectTime": "2024-05-21T12:30:24.010091+00:00", "EventTime": "2024-05-21T12:30:24.010112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCSHt383NBY9BEU91"], "accumulated_threat_level": 10.4, "timewindow": 55} +{"Format": "IDEA0", "ID": "a8e9c73c-add7-4fb5-a7a1-aba280a453a2", "DetectTime": "2024-05-21T12:30:24.046974+00:00", "EventTime": "2024-05-21T12:30:24.046998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvpUY1ORqgBRpDAab"], "accumulated_threat_level": 11.200000000000001, "timewindow": 55} +{"Format": "IDEA0", "ID": "be270036-6710-4efd-bdc1-388c7b19e5df", "DetectTime": "2024-05-21T12:30:24.084894+00:00", "EventTime": "2024-05-21T12:30:24.084915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "Connection to unknown destination port 1243/UDP destination IP 46.180.116.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQThA32VvWzk95aKQc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 55} +{"Format": "Json", "ID": "be270036-6710-4efd-bdc1-388c7b19e5df", "DetectTime": "2024-05-21T12:30:24.084894+00:00", "EventTime": "2024-05-21T12:30:24.084915+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.180.116.48"]}], "Attach": [{"Content": "1970-01-03T07:00:01.993698+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 55. (real time 2024/05/21 12:30:24.308320)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 55, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0aeeeb7a-abcf-45a3-ba19-f8e9321a0559", "DetectTime": "2024-05-21T12:30:24.318587+00:00", "EventTime": "2024-05-21T12:30:24.318606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBs7sGrrVdvkpYfl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "798f5b46-0688-4943-ae0e-15e82987e729", "DetectTime": "2024-05-21T12:30:24.328932+00:00", "EventTime": "2024-05-21T12:30:24.328950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxFWVi4e3bbxjeu1ee"], "accumulated_threat_level": 0.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "371d62c2-760e-4f2a-b3e3-5578e999d343", "DetectTime": "2024-05-21T12:30:24.338852+00:00", "EventTime": "2024-05-21T12:30:24.338870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEyhlu2ekaiHoa0Hvk"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "2e3c6e6b-93bb-4a5f-b69f-9b7daee3ba9c", "DetectTime": "2024-05-21T12:30:24.350269+00:00", "EventTime": "2024-05-21T12:30:24.350289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSEJ4ykwpl9DUa53e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 56} +{"Format": "IDEA0", "ID": "f2fa7c43-c861-4bc3-92ce-d451738c5071", "DetectTime": "2024-05-21T12:30:24.362225+00:00", "EventTime": "2024-05-21T12:30:24.362244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHYPq1n1vImDRzFol"], "accumulated_threat_level": 3.2, "timewindow": 56} +{"Format": "IDEA0", "ID": "08be511a-f811-4dec-9db8-f55dbc0a27dc", "DetectTime": "2024-05-21T12:30:24.372616+00:00", "EventTime": "2024-05-21T12:30:24.372635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CncMGp4IaH3FB8Cug1"], "accumulated_threat_level": 4.0, "timewindow": 56} +{"Format": "IDEA0", "ID": "b9db1636-7308-43a9-a1ef-a3094590e7c2", "DetectTime": "2024-05-21T12:30:24.385030+00:00", "EventTime": "2024-05-21T12:30:24.385050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHojzxK0Qkxqk5uQ9"], "accumulated_threat_level": 4.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "a7af3bca-34c8-48f3-b438-eea600f7e907", "DetectTime": "2024-05-21T12:30:24.400742+00:00", "EventTime": "2024-05-21T12:30:24.400759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4r1NFEXiAJ3ZHne"], "accumulated_threat_level": 5.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "7f688315-2a27-492a-9222-1d234a78127b", "DetectTime": "2024-05-21T12:30:24.418031+00:00", "EventTime": "2024-05-21T12:30:24.418053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD1m6K1az3g7wYAVz2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 56} +{"Format": "IDEA0", "ID": "0a007624-6886-438d-8e88-7cbba4afca60", "DetectTime": "2024-05-21T12:30:24.601829+00:00", "EventTime": "2024-05-21T12:30:24.601848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCHCf64wrIQxPI4B7e", "C7H9eq1dfR6vArOTe1", "CTiIhg1sOjpn1rRpWd", "CF5avUE7SpD0mWMf7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 56} +{"Format": "IDEA0", "ID": "0cd5ab13-2ec3-4a8b-a5c6-21f66d2b004c", "DetectTime": "2024-05-21T12:30:24.658441+00:00", "EventTime": "2024-05-21T12:30:24.658463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cneb1f18HzDuHUzeul"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "da1aef37-de2e-4ca7-82cd-c19a3bfca1b9", "DetectTime": "2024-05-21T12:30:24.663795+00:00", "EventTime": "2024-05-21T12:30:24.663819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpewj54ZmTYEEwXn0f"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "79a7fc42-012b-4350-a601-1f211aa29f78", "DetectTime": "2024-05-21T12:30:24.668682+00:00", "EventTime": "2024-05-21T12:30:24.668703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6OKY1Iyux74Rg8Ah"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "f2efa591-cd67-4765-aecc-00e39d1153ee", "DetectTime": "2024-05-21T12:30:24.674590+00:00", "EventTime": "2024-05-21T12:30:24.674609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmumUdhVAbpPIgqg9"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "cf2fa6b6-6faa-468a-bfe9-fe0f17aed3c2", "DetectTime": "2024-05-21T12:30:24.699219+00:00", "EventTime": "2024-05-21T12:30:24.699241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfefpi35b3g3iKpaO1"], "accumulated_threat_level": 7.699999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "4ca29ab7-fb94-49a1-b246-a46ebc893f86", "DetectTime": "2024-05-21T12:30:24.791161+00:00", "EventTime": "2024-05-21T12:30:24.791186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAlpXgN4aOCuJ28"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "488a4be4-9d18-4ab3-af3b-b1f3ee0deb76", "DetectTime": "2024-05-21T12:30:24.820465+00:00", "EventTime": "2024-05-21T12:30:24.820488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HB7D3YkablWvgj47"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "67c12973-d875-476b-858f-f07b6f05751d", "DetectTime": "2024-05-21T12:30:24.825299+00:00", "EventTime": "2024-05-21T12:30:24.825318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKOQA3UCxDW0KBgol"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "056fa450-0976-4796-85b6-8fd3ee15814c", "DetectTime": "2024-05-21T12:30:24.873357+00:00", "EventTime": "2024-05-21T12:30:24.873377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cypce23H19rW81NEBj"], "accumulated_threat_level": 8.5, "timewindow": 56} +{"Format": "IDEA0", "ID": "22f30bd6-74e3-4b4f-9e0f-e45bf5f863b6", "DetectTime": "2024-05-21T12:30:24.894307+00:00", "EventTime": "2024-05-21T12:30:24.894326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr9Htp36u0LZpyWSRl"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "916373d0-de0b-464b-a024-9678256d5165", "DetectTime": "2024-05-21T12:30:24.959327+00:00", "EventTime": "2024-05-21T12:30:24.959350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHzc41PvzXwYanYR7"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "f07340a2-9f96-4e8a-a205-d0556066c97c", "DetectTime": "2024-05-21T12:30:25.201727+00:00", "EventTime": "2024-05-21T12:30:25.201750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CizliRhT5Mx15Odlk"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "c62e8d87-e34a-4598-8a63-0954f80f9e47", "DetectTime": "2024-05-21T12:30:25.237564+00:00", "EventTime": "2024-05-21T12:30:25.237585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CddcVaUSKwKp3ODue"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "82ff7de7-daae-4e38-acca-30e326498b24", "DetectTime": "2024-05-21T12:30:25.270355+00:00", "EventTime": "2024-05-21T12:30:25.270376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4U0Uh3e6zVH6umFrh"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "32b129cd-2660-4cff-896d-89e81dd18a41", "DetectTime": "2024-05-21T12:30:25.300133+00:00", "EventTime": "2024-05-21T12:30:25.300154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCoLEVt6NDI5PeIc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "76e37f54-25c2-4a18-8742-59fb292ab215", "DetectTime": "2024-05-21T12:30:25.340607+00:00", "EventTime": "2024-05-21T12:30:25.340627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7YCC1mnPZNfncHba"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "fcf0406f-5183-434e-883e-15f65d0750e2", "DetectTime": "2024-05-21T12:30:25.384446+00:00", "EventTime": "2024-05-21T12:30:25.384467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXePPd36G89Rpdv0Tc"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "cea9f7a8-9998-46f6-b242-cf55c0563bb5", "DetectTime": "2024-05-21T12:30:25.419340+00:00", "EventTime": "2024-05-21T12:30:25.419361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.134.161.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMKUY33KFjn0Tp6M6"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "9cddae23-a66b-4bc1-9d21-ae6becd90f54", "DetectTime": "2024-05-21T12:30:25.451240+00:00", "EventTime": "2024-05-21T12:30:25.451261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcyfiyYJauZ93Pxb"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "81768c28-f1a9-429d-a03f-0d7b1239f66d", "DetectTime": "2024-05-21T12:30:25.483696+00:00", "EventTime": "2024-05-21T12:30:25.483717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.6.58.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CgI226wIP6PTwJIg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "898506e0-1593-4961-b4c1-dcb65f520ad4", "DetectTime": "2024-05-21T12:30:25.514093+00:00", "EventTime": "2024-05-21T12:30:25.514116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMUNeLhflS6irol9"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b488fa4a-be0e-4ddf-b694-3c8b2737c4ca", "DetectTime": "2024-05-21T12:30:25.840637+00:00", "EventTime": "2024-05-21T12:30:25.840656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCuKe72fyy1D9lLhml"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "b0a217a0-0cba-4a0f-8ad2-65c6a7fb8f16", "DetectTime": "2024-05-21T12:30:25.845921+00:00", "EventTime": "2024-05-21T12:30:25.845939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9KhHTfPMYgKLlD9"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "deba6307-936b-42be-b433-700aa0aacc10", "DetectTime": "2024-05-21T12:30:25.851301+00:00", "EventTime": "2024-05-21T12:30:25.851319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavAA24gKf7Tfz4Krh"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "07ad2856-7d5c-4328-9967-6ac9cfc222f6", "DetectTime": "2024-05-21T12:30:25.856973+00:00", "EventTime": "2024-05-21T12:30:25.856992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3K0IijXOHN71wFb"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "ab3edb81-6cf4-4f35-9785-881c97267895", "DetectTime": "2024-05-21T12:30:25.862534+00:00", "EventTime": "2024-05-21T12:30:25.862553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8pHQ43x9CgTEJVWJ4"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "f7ccac58-1e78-480c-ab23-9cc664cdb7b0", "DetectTime": "2024-05-21T12:30:25.869719+00:00", "EventTime": "2024-05-21T12:30:25.869738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.206.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2UuU3vnDBjdEptcg"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "43c1616c-6637-480f-8127-a15aa0b78fdc", "DetectTime": "2024-05-21T12:30:25.878988+00:00", "EventTime": "2024-05-21T12:30:25.879007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1SBKX10LJFp68xGX9"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "fc2f41e8-6619-48c5-aca9-d12b663c06b9", "DetectTime": "2024-05-21T12:30:26.016005+00:00", "EventTime": "2024-05-21T12:30:26.016027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGbZDZ2rt52iwv6iYi", "ClH5NR3aw1r1si3xS", "CsHuKu26YsDyyqbHH3", "CIUP1rB6I0nrpWa36"], "accumulated_threat_level": 9.0, "timewindow": 56} +{"Format": "IDEA0", "ID": "abf2f620-ed27-4c02-815f-b84f41049a3c", "DetectTime": "2024-05-21T12:30:26.059209+00:00", "EventTime": "2024-05-21T12:30:26.059229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOgY42gY4X4ztBz9"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "8a43fb03-395b-47ac-a14f-6fa5478ad7f9", "DetectTime": "2024-05-21T12:30:26.144061+00:00", "EventTime": "2024-05-21T12:30:26.144082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiZAJ3afe76GQLKO5"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "6ff97a55-21a5-4fcb-800a-ccc48b6197ce", "DetectTime": "2024-05-21T12:30:26.217319+00:00", "EventTime": "2024-05-21T12:30:26.217341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6tS974QLANaFduxA9"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "209a9b23-ff63-4577-84e7-93e2deef5ca4", "DetectTime": "2024-05-21T12:30:26.398966+00:00", "EventTime": "2024-05-21T12:30:26.398984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnucbL3rZEGXNxRzUd"], "accumulated_threat_level": 0.8, "timewindow": 54} +{"Format": "IDEA0", "ID": "c46a0bdd-d696-43fb-a16a-f714693983c1", "DetectTime": "2024-05-21T12:30:26.720824+00:00", "EventTime": "2024-05-21T12:30:26.720847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChtVPNVDuZUDU7dkc"], "accumulated_threat_level": 9.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "fab13633-996a-4f7b-971d-c57a464d3937", "DetectTime": "2024-05-21T12:30:26.757411+00:00", "EventTime": "2024-05-21T12:30:26.757431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMcsCWsfIxlVsePg1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 56} +{"Format": "IDEA0", "ID": "385de70d-8251-4cb9-9d7b-1970032b1c3e", "DetectTime": "2024-05-21T12:30:26.804108+00:00", "EventTime": "2024-05-21T12:30:26.804126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgAIul1ZBcpjYrKy3g"], "accumulated_threat_level": 11.400000000000002, "timewindow": 56} +{"Format": "IDEA0", "ID": "5a4fd4b3-59d0-4836-9418-8e96d0b87b8f", "DetectTime": "2024-05-21T12:30:26.840854+00:00", "EventTime": "2024-05-21T12:30:26.840873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVT7nxczu6em1ndYf"], "accumulated_threat_level": 12.200000000000003, "timewindow": 56} +{"Format": "Json", "ID": "5a4fd4b3-59d0-4836-9418-8e96d0b87b8f", "DetectTime": "2024-05-21T12:30:26.840854+00:00", "EventTime": "2024-05-21T12:30:26.840873+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "1970-01-03T07:31:57.330610+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2024/05/21 12:30:27.066890)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 56, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "9e6e16ae-7ca7-4788-9834-4a9b1cb473d2", "DetectTime": "2024-05-21T12:30:27.105423+00:00", "EventTime": "2024-05-21T12:30:27.105443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJTfF3dBzKVnd5vy2"], "accumulated_threat_level": 0.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "d3c7e385-f00b-4862-82bf-d97d1c9dbdfd", "DetectTime": "2024-05-21T12:30:27.119534+00:00", "EventTime": "2024-05-21T12:30:27.119554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiG4eOtGsvBGRTwv5"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "c2a43a3f-49b2-45f5-aa05-89255d0f2de6", "DetectTime": "2024-05-21T12:30:27.146295+00:00", "EventTime": "2024-05-21T12:30:27.146315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3yszS3p9uSfsazvcc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 56} +{"Format": "IDEA0", "ID": "4085564b-f292-4048-a40e-aa4fdeaf322f", "DetectTime": "2024-05-21T12:30:27.193596+00:00", "EventTime": "2024-05-21T12:30:27.193616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOCz03YczMJZ1s08c"], "accumulated_threat_level": 3.2, "timewindow": 56} +{"Format": "IDEA0", "ID": "ffbda008-a1ed-4a96-83c6-b732bd88780e", "DetectTime": "2024-05-21T12:30:27.229746+00:00", "EventTime": "2024-05-21T12:30:27.229766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwjDG3YNnuwFRqUn1"], "accumulated_threat_level": 4.0, "timewindow": 56} +{"Format": "IDEA0", "ID": "fbe2bf64-8cb2-4a49-8659-c8289df9551a", "DetectTime": "2024-05-21T12:30:27.547600+00:00", "EventTime": "2024-05-21T12:30:27.547623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbIbOc3gPWI8OdjaK3"], "accumulated_threat_level": 4.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "af1620e1-28b4-4b7b-bc69-3924a6e7d159", "DetectTime": "2024-05-21T12:30:27.553489+00:00", "EventTime": "2024-05-21T12:30:27.553513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURPpx4UfsnKPj08Cb"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "134aa7a5-daa2-4a19-9a54-650f8236b09c", "DetectTime": "2024-05-21T12:30:27.565897+00:00", "EventTime": "2024-05-21T12:30:27.565918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNsDI3MBXghohEXa3"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "ef021c12-b7ea-4b18-aeb1-6e5f82e094d0", "DetectTime": "2024-05-21T12:30:27.651938+00:00", "EventTime": "2024-05-21T12:30:27.651958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA85O93fROR7YtLLK"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "28cfcfe0-bc56-4f6d-95da-37a0dc70bf27", "DetectTime": "2024-05-21T12:30:27.690793+00:00", "EventTime": "2024-05-21T12:30:27.690814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVfKhYQ9vZjJqaol"], "accumulated_threat_level": 5.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "d1651fe4-f1a1-4944-a693-a6125bf6eba6", "DetectTime": "2024-05-21T12:30:27.725398+00:00", "EventTime": "2024-05-21T12:30:27.725418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eFi02S1c4Us9TA96"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 56} +{"Format": "IDEA0", "ID": "8cfb2c05-f431-4fc1-ae5b-f3510a060913", "DetectTime": "2024-05-21T12:30:27.761353+00:00", "EventTime": "2024-05-21T12:30:27.761376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJghn4XiPRuzATBYa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "ee006f05-15bd-4476-99c7-91a664b308e0", "DetectTime": "2024-05-21T12:30:27.794916+00:00", "EventTime": "2024-05-21T12:30:27.794936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjaug71HOuMw4AgKi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "8595757f-b704-4ece-b279-dd182f1f7ad0", "DetectTime": "2024-05-21T12:30:27.832929+00:00", "EventTime": "2024-05-21T12:30:27.832948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5soG3TE3G6ljryD5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "e82d8590-5b5c-4fa3-a17f-b3dec6598375", "DetectTime": "2024-05-21T12:30:27.860967+00:00", "EventTime": "2024-05-21T12:30:27.860987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfzKbNh9Sz7I5EQd"], "accumulated_threat_level": 9.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "20f77062-4914-42a1-a974-20502317eead", "DetectTime": "2024-05-21T12:30:27.929699+00:00", "EventTime": "2024-05-21T12:30:27.929723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctw2PaXMRfixMMI6l"], "accumulated_threat_level": 10.4, "timewindow": 56} +{"Format": "IDEA0", "ID": "5b116d9d-43bb-4f9d-b4e8-95dbcfc314c7", "DetectTime": "2024-05-21T12:30:28.011440+00:00", "EventTime": "2024-05-21T12:30:28.011459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "Connection to unknown destination port 16218/UDP destination IP 42.119.49.245. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjiAwF4ynj68nLyrg7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 56} +{"Format": "IDEA0", "ID": "b1829e97-0ae0-488f-9c49-a1af2591c888", "DetectTime": "2024-05-21T12:30:28.036080+00:00", "EventTime": "2024-05-21T12:30:28.036100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRNR92HYn9VWt9b99"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1333c021-2e5e-497c-b19c-b37bc89c87a5", "DetectTime": "2024-05-21T12:30:28.076162+00:00", "EventTime": "2024-05-21T12:30:28.076181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvTGpC4JuxvEt8bgi3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 56} +{"Format": "Json", "ID": "1333c021-2e5e-497c-b19c-b37bc89c87a5", "DetectTime": "2024-05-21T12:30:28.076162+00:00", "EventTime": "2024-05-21T12:30:28.076181+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "1970-01-03T07:32:00.325578+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2024/05/21 12:30:28.219075)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 56, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "058d02e1-573e-4bff-8262-dbd7ab9f48ac", "DetectTime": "2024-05-21T12:30:28.230298+00:00", "EventTime": "2024-05-21T12:30:28.230317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOa5q1dGglhDPB76"], "accumulated_threat_level": 0.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "80803566-cccb-45fc-a3c1-7437151f4eb3", "DetectTime": "2024-05-21T12:30:28.240324+00:00", "EventTime": "2024-05-21T12:30:28.240343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0nsvt3xczT5SEUEAi"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "a6e6e9ef-f5e9-473d-b6f7-93cf6d296fed", "DetectTime": "2024-05-21T12:30:28.253440+00:00", "EventTime": "2024-05-21T12:30:28.253465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyrLj34RRBo6BPtee"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "bcb86c7e-cce7-47e7-aeb9-5a55a14fd0a4", "DetectTime": "2024-05-21T12:30:28.266550+00:00", "EventTime": "2024-05-21T12:30:28.266570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZeuDT17bQTaDKg802"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 56} +{"Format": "IDEA0", "ID": "62590409-f149-44a5-a75a-1a8ff43f6d8d", "DetectTime": "2024-05-21T12:30:28.455650+00:00", "EventTime": "2024-05-21T12:30:28.455669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkv6aliG1is2HkZk"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "6b8920d2-cace-44e5-b894-cda73768d36f", "DetectTime": "2024-05-21T12:30:28.485443+00:00", "EventTime": "2024-05-21T12:30:28.485464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJSS74FUP8PURZ8D7"], "accumulated_threat_level": 3.2, "timewindow": 56} +{"Format": "IDEA0", "ID": "a1b4ae0b-04a6-4599-9e13-9074b7689e18", "DetectTime": "2024-05-21T12:30:28.519410+00:00", "EventTime": "2024-05-21T12:30:28.519433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBDJK32ztnwdIci84g"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "10526548-d57d-4f71-b21f-c3494b41660f", "DetectTime": "2024-05-21T12:30:28.550685+00:00", "EventTime": "2024-05-21T12:30:28.550708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXTrH1pv0JmAuvgG8"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "b2f9f15b-8cc4-4d1e-aca3-50cff2d54d47", "DetectTime": "2024-05-21T12:30:28.579008+00:00", "EventTime": "2024-05-21T12:30:28.579031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QuCiHzRnoRJSrge"], "accumulated_threat_level": 4.0, "timewindow": 56} +{"Format": "IDEA0", "ID": "217d79d8-6560-417a-9eb9-8034612bbbce", "DetectTime": "2024-05-21T12:30:28.614060+00:00", "EventTime": "2024-05-21T12:30:28.614079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzwRAv1fE05InKoMBj"], "accumulated_threat_level": 4.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "9b5b5969-f666-4ca8-9582-0e1e639e2b19", "DetectTime": "2024-05-21T12:30:28.672647+00:00", "EventTime": "2024-05-21T12:30:28.672667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5fMvEynP1KcrqRc1"], "accumulated_threat_level": 5.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "fbb1221e-126c-4976-947d-98bc1180a3d2", "DetectTime": "2024-05-21T12:30:28.708251+00:00", "EventTime": "2024-05-21T12:30:28.708270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorAy93iLFvkHgdk35"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 56} +{"Format": "IDEA0", "ID": "afb71f15-793f-4078-a269-5112d30384f2", "DetectTime": "2024-05-21T12:30:28.741554+00:00", "EventTime": "2024-05-21T12:30:28.741573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7u1bysOHzyFfxkl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "70039793-3287-4be5-a5bd-d7e0fc263854", "DetectTime": "2024-05-21T12:30:28.774497+00:00", "EventTime": "2024-05-21T12:30:28.774518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.246.67.95"]}], "Attach": [{"Content": "Connection to unknown destination port 17275/UDP destination IP 180.246.67.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1idvH44rA44FfMa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "c2e7ec3d-4d40-455f-9c79-1d024aec69b9", "DetectTime": "2024-05-21T12:30:28.807977+00:00", "EventTime": "2024-05-21T12:30:28.807997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGHB44rIzugGorFQa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 56} +{"Format": "IDEA0", "ID": "083b68bf-536f-4bc5-b67f-4669baf49a04", "DetectTime": "2024-05-21T12:30:28.842714+00:00", "EventTime": "2024-05-21T12:30:28.842734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AT4Q3kgf948L8zOl"], "accumulated_threat_level": 9.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "20ba68be-2a19-4889-9d04-76d302ec4d0d", "DetectTime": "2024-05-21T12:30:28.882814+00:00", "EventTime": "2024-05-21T12:30:28.882833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1fcVx2QEhchL3i3d7"], "accumulated_threat_level": 10.4, "timewindow": 56} +{"Format": "IDEA0", "ID": "6bce8efc-598e-4d84-ac14-034c17610fb4", "DetectTime": "2024-05-21T12:30:28.909458+00:00", "EventTime": "2024-05-21T12:30:28.909477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4MtC4qTidfwLIasa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 56} +{"Format": "IDEA0", "ID": "38486f48-a05f-42d7-97d4-7dc384516e14", "DetectTime": "2024-05-21T12:30:28.956981+00:00", "EventTime": "2024-05-21T12:30:28.957004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8eYK3evqP9dLyS6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 56} +{"Format": "Json", "ID": "38486f48-a05f-42d7-97d4-7dc384516e14", "DetectTime": "2024-05-21T12:30:28.956981+00:00", "EventTime": "2024-05-21T12:30:28.957004+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "1970-01-03T07:32:24.099068+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 56. (real time 2024/05/21 12:30:29.371361)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 56, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "31ad6843-fdb2-4b36-bbd6-f0bab0f95926", "DetectTime": "2024-05-21T12:30:29.582087+00:00", "EventTime": "2024-05-21T12:30:29.582110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs3qTZkXCJbmPS3q8"], "accumulated_threat_level": 0.8, "timewindow": 56} +{"Format": "IDEA0", "ID": "1818afa7-878e-4c0f-8012-e966e3d2d44a", "DetectTime": "2024-05-21T12:30:29.588721+00:00", "EventTime": "2024-05-21T12:30:29.588742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChnZsP36aTeaijfAv1"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "411fa958-522c-4c2c-b54a-e10514936a1c", "DetectTime": "2024-05-21T12:30:29.646853+00:00", "EventTime": "2024-05-21T12:30:29.646871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu1ap53UqTpqOdxiCe"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "4c3f756e-c2e4-463f-9815-a669ca05fbf3", "DetectTime": "2024-05-21T12:30:29.678634+00:00", "EventTime": "2024-05-21T12:30:29.678653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRxZl2QLw7clbmXcc"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "e5ca817f-94ed-4568-aba8-1376acf10c26", "DetectTime": "2024-05-21T12:30:29.690289+00:00", "EventTime": "2024-05-21T12:30:29.690311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJkm6a15EInovak941"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "aa176c10-fb1c-489f-a654-984a81ebc152", "DetectTime": "2024-05-21T12:30:30.263768+00:00", "EventTime": "2024-05-21T12:30:30.263792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7ims1E31sMiNhwnd"], "accumulated_threat_level": 0.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "3ef8948e-7a5d-4a15-a37a-21d77622eac2", "DetectTime": "2024-05-21T12:30:30.473414+00:00", "EventTime": "2024-05-21T12:30:30.473435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.69.172.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C750XS2zQgjd9cKZyg"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "a42d8fcd-6eaf-412d-b5a2-7e6c7b274712", "DetectTime": "2024-05-21T12:30:30.502203+00:00", "EventTime": "2024-05-21T12:30:30.502223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj77q230Wjwjs8jd56", "CSHLPV2VSKXLAzuSUg", "CtGdL23bCeTTIrYNGi", "Cfk43l2xZMvW93CaU3"], "accumulated_threat_level": 1.3, "timewindow": 57} +{"Format": "IDEA0", "ID": "fea9a255-f1e1-493d-9fc0-e1aa0bffdde3", "DetectTime": "2024-05-21T12:30:30.798209+00:00", "EventTime": "2024-05-21T12:30:30.798229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.134.124.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3kp334B67ArjVlf91"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "c345b221-8f74-4c22-bca3-b21699763ef5", "DetectTime": "2024-05-21T12:30:30.810085+00:00", "EventTime": "2024-05-21T12:30:30.810104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cljhdb1j4IaLyY6sce"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "0f938498-9bbc-4887-8ea0-f230f6cd2e99", "DetectTime": "2024-05-21T12:30:30.833663+00:00", "EventTime": "2024-05-21T12:30:30.833684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbewK3JRe3Z9af4bl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "8e0bf5a1-1d7e-40f9-adda-7628cf71b938", "DetectTime": "2024-05-21T12:30:30.889312+00:00", "EventTime": "2024-05-21T12:30:30.889329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXLq8r1QH1GrP201i2"], "accumulated_threat_level": 2.1, "timewindow": 57} +{"Format": "IDEA0", "ID": "3bf774fa-3c27-4345-8230-19861b951dd6", "DetectTime": "2024-05-21T12:30:30.927523+00:00", "EventTime": "2024-05-21T12:30:30.927541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY5MZ4b1BtBpOjeU5"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 57} +{"Format": "IDEA0", "ID": "9aa67b7b-02de-4618-8455-3d3171f2ac1d", "DetectTime": "2024-05-21T12:30:31.035369+00:00", "EventTime": "2024-05-21T12:30:31.035386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CisXSepyx5G3OzmXh"], "accumulated_threat_level": 3.7, "timewindow": 57} +{"Format": "IDEA0", "ID": "07c6bcb1-4e63-4d44-9e5f-de7eacf4ad8a", "DetectTime": "2024-05-21T12:30:31.052608+00:00", "EventTime": "2024-05-21T12:30:31.052629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqY6Cb1NhJQYI41Fmf"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "47b7e9c8-8fdf-40cd-8eca-31c08029c4f9", "DetectTime": "2024-05-21T12:30:31.057797+00:00", "EventTime": "2024-05-21T12:30:31.057815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwQsqC4t1g8gYrZb59"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1fe0c5c0-3f58-4c8d-a82c-d18b8bfff2f8", "DetectTime": "2024-05-21T12:30:31.074455+00:00", "EventTime": "2024-05-21T12:30:31.074475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.206.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkuZH2kfUqGecJgs9"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "df0cdcd4-bd11-4fe5-a4ad-6bc096733ea5", "DetectTime": "2024-05-21T12:30:31.127587+00:00", "EventTime": "2024-05-21T12:30:31.127608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnL062CENSsYIvkZ6"], "accumulated_threat_level": 4.5, "timewindow": 57} +{"Format": "IDEA0", "ID": "75fe9433-ef6e-4d57-b6d0-d21a6156c3fa", "DetectTime": "2024-05-21T12:30:31.161063+00:00", "EventTime": "2024-05-21T12:30:31.161082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7yME4PylYqZ2aMy1"], "accumulated_threat_level": 5.3, "timewindow": 57} +{"Format": "IDEA0", "ID": "edf2a973-7a9e-49cc-b7e5-5264b452ba9f", "DetectTime": "2024-05-21T12:30:31.196290+00:00", "EventTime": "2024-05-21T12:30:31.196313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPC2i4ZxLsUQSou9b"], "accumulated_threat_level": 6.1, "timewindow": 57} +{"Format": "IDEA0", "ID": "0cfee165-5170-4370-a564-07dcf5c87b83", "DetectTime": "2024-05-21T12:30:31.231639+00:00", "EventTime": "2024-05-21T12:30:31.231658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnaDE34vpD6NfIf6c"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 57} +{"Format": "IDEA0", "ID": "027d905e-2788-45f6-98c4-8ffb8a8c5a44", "DetectTime": "2024-05-21T12:30:31.266858+00:00", "EventTime": "2024-05-21T12:30:31.266877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "Connection to unknown destination port 12489/UDP destination IP 105.236.59.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN10lg1b5ho3XRIBhc"], "accumulated_threat_level": 7.699999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "110bd7de-b22d-4a79-8a70-c4e3a427de6f", "DetectTime": "2024-05-21T12:30:31.298040+00:00", "EventTime": "2024-05-21T12:30:31.298060+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.49.114.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvMgw18p6nCVpsuU8"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "3707eb89-0c8d-4ea1-9d20-524b6dc70038", "DetectTime": "2024-05-21T12:30:31.312890+00:00", "EventTime": "2024-05-21T12:30:31.312908+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.49.114.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.49.114.244 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-82-49-114-244.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvMgw18p6nCVpsuU8"], "accumulated_threat_level": 5.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "5e27f283-e27b-415a-92d8-bbf8354a04e3", "DetectTime": "2024-05-21T12:30:31.355618+00:00", "EventTime": "2024-05-21T12:30:31.355639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWmbd1ygqKGGiE8Lj"], "accumulated_threat_level": 8.5, "timewindow": 57} +{"Format": "IDEA0", "ID": "1b372c80-926f-4fcc-ad0f-bd078818eaef", "DetectTime": "2024-05-21T12:30:31.369697+00:00", "EventTime": "2024-05-21T12:30:31.369720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6rnf4NFjUu6SO"], "accumulated_threat_level": 9.3, "timewindow": 57} +{"Format": "IDEA0", "ID": "e0dbfca4-ef92-48e4-ad7f-fb19db7e8a50", "DetectTime": "2024-05-21T12:30:31.398534+00:00", "EventTime": "2024-05-21T12:30:31.398554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OVgouH3y92MMfVa"], "accumulated_threat_level": 10.100000000000001, "timewindow": 57} +{"Format": "IDEA0", "ID": "98d12a07-3c3d-43d7-87d2-196652401a62", "DetectTime": "2024-05-21T12:30:31.432330+00:00", "EventTime": "2024-05-21T12:30:31.432350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfe0l1OdE8zhNx3s6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 57} +{"Format": "IDEA0", "ID": "844b34f0-4695-4f4f-8cc7-58ce47b49e49", "DetectTime": "2024-05-21T12:30:31.472719+00:00", "EventTime": "2024-05-21T12:30:31.472737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sAn2LSrUlIQAW95"], "accumulated_threat_level": 11.700000000000003, "timewindow": 57} +{"Format": "IDEA0", "ID": "7749acb3-8a3d-4289-aaac-5e7974c318cc", "DetectTime": "2024-05-21T12:30:31.491773+00:00", "EventTime": "2024-05-21T12:30:31.491794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRnkH2m2irYFXcNca"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "03d95b25-5270-4c65-b350-14a96a5baa78", "DetectTime": "2024-05-21T12:30:31.528570+00:00", "EventTime": "2024-05-21T12:30:31.528589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJMb441Kh2Lk18IB6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 57} +{"Format": "Json", "ID": "03d95b25-5270-4c65-b350-14a96a5baa78", "DetectTime": "2024-05-21T12:30:31.528570+00:00", "EventTime": "2024-05-21T12:30:31.528589+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "1970-01-03T08:02:55.412516+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2024/05/21 12:30:31.721333)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 57, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "76652c29-0534-4413-9506-1da407c4928c", "DetectTime": "2024-05-21T12:30:31.725416+00:00", "EventTime": "2024-05-21T12:30:31.725434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzyoDB1RLtHsRV2tCd"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "b44b7180-bac9-473e-8ade-d600dbceb728", "DetectTime": "2024-05-21T12:30:31.888275+00:00", "EventTime": "2024-05-21T12:30:31.888297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCf6p2B3MRbL74wg"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1ccf3759-7a98-4d94-8048-569753a9cd74", "DetectTime": "2024-05-21T12:30:31.895687+00:00", "EventTime": "2024-05-21T12:30:31.895708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRKZPzYTwA44Imsg"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "7117a138-fef6-4b1e-b4bc-d6e59ecbbdaf", "DetectTime": "2024-05-21T12:30:31.901797+00:00", "EventTime": "2024-05-21T12:30:31.901818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJwnSHjiJDuyxxf6b"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1e348c6b-8c0a-4d47-85fc-fd73d9a9e08b", "DetectTime": "2024-05-21T12:30:31.906880+00:00", "EventTime": "2024-05-21T12:30:31.906901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VYESBnjnsaTKqM9"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1ca8f434-3299-4098-9669-ebe5a03d9ebf", "DetectTime": "2024-05-21T12:30:31.911835+00:00", "EventTime": "2024-05-21T12:30:31.911854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq0fv1uid9KWlT1j8"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "b9538861-ff0b-41b8-966a-34349af1f5dc", "DetectTime": "2024-05-21T12:30:31.916769+00:00", "EventTime": "2024-05-21T12:30:31.916788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJhMW3mj9RTGzjMq7"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "24d59c0d-8965-421d-94e1-d4e221e2c8b3", "DetectTime": "2024-05-21T12:30:31.921501+00:00", "EventTime": "2024-05-21T12:30:31.921520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqcGe4IZN2dshkx77"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "d1eff465-8513-4d18-a32a-6cbe02e4e78f", "DetectTime": "2024-05-21T12:30:32.042043+00:00", "EventTime": "2024-05-21T12:30:32.042064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdHpTW5RlEVO1LR8"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1e41af08-0361-4224-9323-dc1a54ac3c97", "DetectTime": "2024-05-21T12:30:32.075019+00:00", "EventTime": "2024-05-21T12:30:32.075037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZRh221LIL1XvrNUWl"], "accumulated_threat_level": 0.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "72b492a0-e094-473e-9267-9ac42e299664", "DetectTime": "2024-05-21T12:30:32.114549+00:00", "EventTime": "2024-05-21T12:30:32.114571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLlsm3NtpIHyGuuQ6"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "b7c965c3-38db-4110-9a09-324f250c6eb2", "DetectTime": "2024-05-21T12:30:32.152597+00:00", "EventTime": "2024-05-21T12:30:32.152618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywPSg1CRzYhhUYUNd"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "70546cc5-81ff-421f-a167-6b7c9d2e97f4", "DetectTime": "2024-05-21T12:30:32.164950+00:00", "EventTime": "2024-05-21T12:30:32.164970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClNnWCotXimisPfC5"], "accumulated_threat_level": 1.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "db56213a-be75-43f6-84e8-15ae78e88ecd", "DetectTime": "2024-05-21T12:30:32.208405+00:00", "EventTime": "2024-05-21T12:30:32.208426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czt1schF43W192WHg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 57} +{"Format": "IDEA0", "ID": "49a685b7-f612-4b2f-8f83-c49fcba3d934", "DetectTime": "2024-05-21T12:30:32.229827+00:00", "EventTime": "2024-05-21T12:30:32.229848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5vWvSckfDUSSRId"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "8246f3ce-153c-4751-a585-a42c08bdaaed", "DetectTime": "2024-05-21T12:30:32.261753+00:00", "EventTime": "2024-05-21T12:30:32.261775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGctdH2LDNWq3Bc6je"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1bef49f1-3f6c-4b03-9c27-fbbda963a25b", "DetectTime": "2024-05-21T12:30:32.408823+00:00", "EventTime": "2024-05-21T12:30:32.408842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvkJDQP7OdLUkVBD1"], "accumulated_threat_level": 3.2, "timewindow": 57} +{"Format": "IDEA0", "ID": "97438db2-9288-4286-b79c-bfda0e27e8a4", "DetectTime": "2024-05-21T12:30:32.652181+00:00", "EventTime": "2024-05-21T12:30:32.652201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkzD9P2Q8UhUcAmn3c"], "accumulated_threat_level": 4.0, "timewindow": 57} +{"Format": "IDEA0", "ID": "cd32c2e5-0443-45ca-84f9-0569de8dcb0e", "DetectTime": "2024-05-21T12:30:32.689112+00:00", "EventTime": "2024-05-21T12:30:32.689135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "Connection to unknown destination port 25979/UDP destination IP 190.172.226.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJDCs1K2au0ZpWAtf"], "accumulated_threat_level": 4.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "6bef0442-cc95-4a61-9325-9137e1ee9791", "DetectTime": "2024-05-21T12:30:32.729602+00:00", "EventTime": "2024-05-21T12:30:32.729624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EEXj275RZYsk33i5"], "accumulated_threat_level": 5.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "d1700837-a575-4cfc-95c8-e2d827c9e3a2", "DetectTime": "2024-05-21T12:30:32.765828+00:00", "EventTime": "2024-05-21T12:30:32.765848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzhQv38pweVTD7T6k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 57} +{"Format": "IDEA0", "ID": "f55b512a-8f6f-4d3b-9462-284ab3f7f2ad", "DetectTime": "2024-05-21T12:30:32.795943+00:00", "EventTime": "2024-05-21T12:30:32.795968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTnrz3lINpDeZKBTc"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "a0172b37-8201-49f3-8430-1ce9047b793a", "DetectTime": "2024-05-21T12:30:32.877704+00:00", "EventTime": "2024-05-21T12:30:32.877723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAdxtFWB734XBS0Mk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "ce9fc359-12be-4431-b3ea-a5e46aa66b8a", "DetectTime": "2024-05-21T12:30:32.889893+00:00", "EventTime": "2024-05-21T12:30:32.889911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6MEQZ1hbawG9oRwTl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "e46435c6-1a2e-4a02-beed-a57d8557d1b5", "DetectTime": "2024-05-21T12:30:32.925829+00:00", "EventTime": "2024-05-21T12:30:32.925852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zsuCeFXljHPKlKj"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "19cd027e-d6ad-4131-bb46-6a113dea940c", "DetectTime": "2024-05-21T12:30:32.953122+00:00", "EventTime": "2024-05-21T12:30:32.953141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwtDa35cXS1E6bXA1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "7afe795d-51e9-4732-bdbc-cc8b923fbc9a", "DetectTime": "2024-05-21T12:30:32.976010+00:00", "EventTime": "2024-05-21T12:30:32.976031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIIPr2Zi5n02L5sqe"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "4980718e-d116-403d-b40a-96a6118a343e", "DetectTime": "2024-05-21T12:30:33.008628+00:00", "EventTime": "2024-05-21T12:30:33.008648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1j4393J0z99OFQJC9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "526a8a9c-2c2f-4906-b0a2-6fd97ec3eb80", "DetectTime": "2024-05-21T12:30:33.042199+00:00", "EventTime": "2024-05-21T12:30:33.042222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvEk74phi6PaTdNbc"], "accumulated_threat_level": 9.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "16133824-f4f8-4479-afa7-8a1d0e4ab246", "DetectTime": "2024-05-21T12:30:33.069347+00:00", "EventTime": "2024-05-21T12:30:33.069396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqExwR2MArePQy38Y"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "2f10d70f-a9d1-4d19-a666-ae248e87b026", "DetectTime": "2024-05-21T12:30:33.095325+00:00", "EventTime": "2024-05-21T12:30:33.095345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnrcbf2v0Y3rKVzVN2"], "accumulated_threat_level": 10.4, "timewindow": 57} +{"Format": "IDEA0", "ID": "4aa27f7e-d552-4a91-8da2-b2b1d93d3cde", "DetectTime": "2024-05-21T12:30:33.130736+00:00", "EventTime": "2024-05-21T12:30:33.130758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzyKQkSFDdBIuljVl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "8a63efad-9553-4bbd-ab30-d81f08d32a13", "DetectTime": "2024-05-21T12:30:33.160403+00:00", "EventTime": "2024-05-21T12:30:33.160425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4NdCt3LBwwOMHvSc5"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "f501c91c-c3a2-47bf-a65e-e0fe0c8ce219", "DetectTime": "2024-05-21T12:30:33.196140+00:00", "EventTime": "2024-05-21T12:30:33.196172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLSqeO2j6n1GarVqk5"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "0dad8166-143e-4c8e-ad2f-57d42d2e3b62", "DetectTime": "2024-05-21T12:30:33.231993+00:00", "EventTime": "2024-05-21T12:30:33.232017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwqX92OT9d9Siqjji"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "deebd9b2-6b46-4eaf-abe0-08b1f4eb3cd5", "DetectTime": "2024-05-21T12:30:33.281612+00:00", "EventTime": "2024-05-21T12:30:33.281633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXmAc22kaLvU6kHb3"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "9de2d3ff-9f88-4146-b1a1-11fdfe19b77c", "DetectTime": "2024-05-21T12:30:33.315404+00:00", "EventTime": "2024-05-21T12:30:33.315426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcRLD2Px9yVEc26mi"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "4ebd1325-05ab-446d-915e-6dbfd6408646", "DetectTime": "2024-05-21T12:30:33.339581+00:00", "EventTime": "2024-05-21T12:30:33.339604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRBgx4yPaOwTnf7Mk"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "26028213-3b8d-42a9-9a83-e27ad45ca256", "DetectTime": "2024-05-21T12:30:33.608337+00:00", "EventTime": "2024-05-21T12:30:33.608360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoOmM94SrNY1zTe0sh"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "3446d4cd-bb48-4272-947f-dacf4e2a1274", "DetectTime": "2024-05-21T12:30:33.635100+00:00", "EventTime": "2024-05-21T12:30:33.635121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dgsc4aN2CTtW9p8c"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "6e893e68-0d79-4fad-88db-a831e2e2991a", "DetectTime": "2024-05-21T12:30:33.652245+00:00", "EventTime": "2024-05-21T12:30:33.652265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvr1Rj2a2kdLpuIJI9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 57} +{"Format": "IDEA0", "ID": "eaf4d7a5-a438-47bc-a2b1-7e11fb8d465d", "DetectTime": "2024-05-21T12:30:33.697053+00:00", "EventTime": "2024-05-21T12:30:33.697075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.134.161.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9tySj4bhdFSzXhGe4"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "f4cf1695-8342-4615-b7b7-b822e1930722", "DetectTime": "2024-05-21T12:30:33.704649+00:00", "EventTime": "2024-05-21T12:30:33.704667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWXXNp1K0EnUMJXaac"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "c9177b3a-b411-43d4-8cc1-da48f8c59194", "DetectTime": "2024-05-21T12:30:33.750939+00:00", "EventTime": "2024-05-21T12:30:33.750960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtYwA2QTdrPj4FZ5f"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "6fec786b-69ea-4db4-8a22-8dde64e52a1f", "DetectTime": "2024-05-21T12:30:33.777171+00:00", "EventTime": "2024-05-21T12:30:33.777192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0vm94v2XxwSiVpMl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "629a3ce1-b100-4292-9515-9a07a49ef496", "DetectTime": "2024-05-21T12:30:33.788195+00:00", "EventTime": "2024-05-21T12:30:33.788213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjT1juLImdQsPXVN2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 57} +{"Format": "Json", "ID": "629a3ce1-b100-4292-9515-9a07a49ef496", "DetectTime": "2024-05-21T12:30:33.788195+00:00", "EventTime": "2024-05-21T12:30:33.788213+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "1970-01-03T08:03:35.232363+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2024/05/21 12:30:33.947524)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 57, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2c45fa99-71f7-4f71-b677-a99f07a7abc1", "DetectTime": "2024-05-21T12:30:33.957372+00:00", "EventTime": "2024-05-21T12:30:33.957392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0Cqb3TCzaggBIXZf"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "63435eeb-79c6-4282-816d-504002d5b29d", "DetectTime": "2024-05-21T12:30:33.961846+00:00", "EventTime": "2024-05-21T12:30:33.961862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrwhk2Vpi2a3ovHVh"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "24dde35d-393a-4a86-83a0-c8c5806a69e4", "DetectTime": "2024-05-21T12:30:33.972007+00:00", "EventTime": "2024-05-21T12:30:33.972026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHrc715g1fJOwv1o9"], "accumulated_threat_level": 0.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "1eca1534-3fd7-4e4c-9cad-66b1acdf281c", "DetectTime": "2024-05-21T12:30:33.976555+00:00", "EventTime": "2024-05-21T12:30:33.976573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.6.58.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiAXH1CBy0tvUsts9"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "50fb38a9-bdf3-4a21-94b4-b0161bb75712", "DetectTime": "2024-05-21T12:30:33.986857+00:00", "EventTime": "2024-05-21T12:30:33.986876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAXrPEkTAEgwGnBQh"], "accumulated_threat_level": 1.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "4e11b23f-b7fd-4045-86a1-0cace63e1c3a", "DetectTime": "2024-05-21T12:30:33.991495+00:00", "EventTime": "2024-05-21T12:30:33.991514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOwM5gSiTwYA6OUi"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "cf03b414-65de-4e31-8bdf-be8bbf59312e", "DetectTime": "2024-05-21T12:30:33.996791+00:00", "EventTime": "2024-05-21T12:30:33.996810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJAJzp2zqph8IbSGZ6"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "bcba056b-e6af-4d83-a3f4-f5770ae29c29", "DetectTime": "2024-05-21T12:30:34.008899+00:00", "EventTime": "2024-05-21T12:30:34.008921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGAEp2Q5rPpaKlPhl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 57} +{"Format": "IDEA0", "ID": "7fafdaa2-5bf6-433a-a5b1-cdd6456f4c23", "DetectTime": "2024-05-21T12:30:34.032782+00:00", "EventTime": "2024-05-21T12:30:34.032803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVmfc2eJVtqMz4J"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "93c01528-cb7e-4926-9ff2-f1f71b386a4d", "DetectTime": "2024-05-21T12:30:34.065713+00:00", "EventTime": "2024-05-21T12:30:34.065736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZnjT43aFUpAy4SGhg"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "3d7a2d6c-adf1-4bde-a2ac-0775f6c84169", "DetectTime": "2024-05-21T12:30:34.088157+00:00", "EventTime": "2024-05-21T12:30:34.088196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCmnU1YkgcoWS7tQ4"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "5487913e-acb4-4c4d-99fc-51093a96e7d4", "DetectTime": "2024-05-21T12:30:34.137350+00:00", "EventTime": "2024-05-21T12:30:34.137375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.126.4"]}], "Attach": [{"Content": "Connection to unknown destination port 17793/UDP destination IP 125.161.126.4. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcWleUoXzpqhFmd1c"], "accumulated_threat_level": 3.2, "timewindow": 57} +{"Format": "IDEA0", "ID": "6524625a-8afc-42c3-99cf-bcdba5c1cc9e", "DetectTime": "2024-05-21T12:30:34.199230+00:00", "EventTime": "2024-05-21T12:30:34.199252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcvLay3oZ41VwsKjza", "C0pml14bnwt23r2AJk", "ClAFp6P4YCyGlXKR9", "CiXHX32b9RqRRYpNR7"], "accumulated_threat_level": 3.7, "timewindow": 57} +{"Format": "IDEA0", "ID": "732486a5-186c-424e-b728-011d3890c367", "DetectTime": "2024-05-21T12:30:34.348586+00:00", "EventTime": "2024-05-21T12:30:34.348610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJ4hF3xemGU9kLr43"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "06a0eaf2-1977-4082-9aed-e0a0d77ddd29", "DetectTime": "2024-05-21T12:30:34.396087+00:00", "EventTime": "2024-05-21T12:30:34.396109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQMFH2YYgUVR5aKna"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "d8d0e120-6be1-4c1d-973a-c48bead58bb9", "DetectTime": "2024-05-21T12:30:34.611343+00:00", "EventTime": "2024-05-21T12:30:34.611376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"]}], "Attach": [{"Content": "Connection to unknown destination port 27555/TCP destination IP 77.50.112.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxRcXvImr5Es9PPAc"], "accumulated_threat_level": 4.5, "timewindow": 57} +{"Format": "IDEA0", "ID": "57fe1ad6-8222-4711-b893-8814e6f451c7", "DetectTime": "2024-05-21T12:30:34.700765+00:00", "EventTime": "2024-05-21T12:30:34.700788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffuOk1Phum8ewW1Ad"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "3309fff0-bfee-437d-be33-7bc463e88b9e", "DetectTime": "2024-05-21T12:30:35.086799+00:00", "EventTime": "2024-05-21T12:30:35.086817+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.59.131.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmI0EZ303dnqTLKf6f"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "34c516c5-f69c-4df3-a63e-5209a21b22bf", "DetectTime": "2024-05-21T12:30:35.099404+00:00", "EventTime": "2024-05-21T12:30:35.099422+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.59.131.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.59.131.0 from 10.0.2.19. AS: VODANET International IP-Backbone of Vodafone, DE AS3209 rDNS: dslb-084-059-131-000.084.059.pools.vodafone-ip.de Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmI0EZ303dnqTLKf6f"], "accumulated_threat_level": 5.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "bb22dc9c-5501-46ac-a567-4c23e06603dd", "DetectTime": "2024-05-21T12:30:35.141667+00:00", "EventTime": "2024-05-21T12:30:35.141688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCQHwm2rEwQtch6X51"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "ccf86d95-02eb-4881-a054-d87ea98d012f", "DetectTime": "2024-05-21T12:30:35.426401+00:00", "EventTime": "2024-05-21T12:30:35.426447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMyacG2DWE6q0XI5g5"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "de3b91f6-3744-46a7-8bf7-0ba607bd49f9", "DetectTime": "2024-05-21T12:30:35.563856+00:00", "EventTime": "2024-05-21T12:30:35.563879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.45.9.200 AS: ASN-WINDTRE IUNET, IT AS1267 rDNS: adsl-ull-200-9.45-151.wind.it, IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXYXY1CCVRLX6ueJ7"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "a95dd514-7b96-4b28-a1f1-cf0fb6091b65", "DetectTime": "2024-05-21T12:30:35.859837+00:00", "EventTime": "2024-05-21T12:30:35.859859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNRUlw1jYTHN4D7FDb", "CLzhg319H6wKw5Ijtg", "C6I3bd48ErHqkYySW9", "CIyA7O1vkGEceELdY1"], "accumulated_threat_level": 5.0, "timewindow": 57} +{"Format": "IDEA0", "ID": "d2beb9ba-2fde-4b9d-99a7-7cffdc893ecf", "DetectTime": "2024-05-21T12:30:35.993131+00:00", "EventTime": "2024-05-21T12:30:35.993150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.0.116.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74A4X1yT5N7OxiEI6"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "95406d50-99ae-43fe-8feb-f97944fc9be2", "DetectTime": "2024-05-21T12:30:36.131928+00:00", "EventTime": "2024-05-21T12:30:36.131950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.134.161.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYY7t73BWetCBm0v15"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "cc796d02-6ac5-4eb5-bbe4-b9946f1cec3c", "DetectTime": "2024-05-21T12:30:36.198376+00:00", "EventTime": "2024-05-21T12:30:36.198397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrWp8Pfu8chKIepVa"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "1cf013f1-245a-48a5-93ea-fd2f6ed75159", "DetectTime": "2024-05-21T12:30:36.227885+00:00", "EventTime": "2024-05-21T12:30:36.227906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5x3gbodnvIxGBHJ5"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "43335921-55ec-477b-8276-1db0346b58db", "DetectTime": "2024-05-21T12:30:36.278317+00:00", "EventTime": "2024-05-21T12:30:36.278338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vHnp4pUJETCxGVX6"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "291527dd-6f0b-4107-9dcd-7655805c973a", "DetectTime": "2024-05-21T12:30:36.307276+00:00", "EventTime": "2024-05-21T12:30:36.307296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmFS6F4gZ2WAv1bRF4"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "ec5e5876-fbef-4d11-968f-b3d8675f936b", "DetectTime": "2024-05-21T12:30:36.356345+00:00", "EventTime": "2024-05-21T12:30:36.356365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCYCw1z0Ux5d8t8t7"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "034d7c8f-3331-4950-8081-93f52cc9d4fa", "DetectTime": "2024-05-21T12:30:36.399226+00:00", "EventTime": "2024-05-21T12:30:36.399248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chlc8B34SLxLVk84Lj"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "3daec321-8372-4f4a-b366-858fed7c8918", "DetectTime": "2024-05-21T12:30:36.434146+00:00", "EventTime": "2024-05-21T12:30:36.434167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2T6Ny44M27IflUvm"], "accumulated_threat_level": 5.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "f4465c5a-7af7-4346-9e07-1b3c99060214", "DetectTime": "2024-05-21T12:30:36.573613+00:00", "EventTime": "2024-05-21T12:30:36.573634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct57bu4E0zdi9NuwIe"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "8330e40b-6f7e-4f32-b04f-282bede2502e", "DetectTime": "2024-05-21T12:30:36.821445+00:00", "EventTime": "2024-05-21T12:30:36.821466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm77PO1jOcQ54XHcqh"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "2def926e-525a-4376-b138-0b3568d8b0e9", "DetectTime": "2024-05-21T12:30:36.939457+00:00", "EventTime": "2024-05-21T12:30:36.939477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ft2rs3BKIyEgfO1"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "5e3eadff-62e9-4d5c-910e-65883988010d", "DetectTime": "2024-05-21T12:30:37.032608+00:00", "EventTime": "2024-05-21T12:30:37.032628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPLtg3RWhMy9GhBrk"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "f6aabb9a-b49f-4f10-9458-91b3cc8ae5c5", "DetectTime": "2024-05-21T12:30:37.075734+00:00", "EventTime": "2024-05-21T12:30:37.075757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxEaj4ecj3gAapIcl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "d9092413-e275-425b-b966-499dbc577e42", "DetectTime": "2024-05-21T12:30:37.119499+00:00", "EventTime": "2024-05-21T12:30:37.119520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkE0aC3GCjO82VJOa2"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "77da349e-859e-4423-aaa7-e58055f96086", "DetectTime": "2024-05-21T12:30:37.159484+00:00", "EventTime": "2024-05-21T12:30:37.159507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqb9JXXbiHmeFVeH4"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "33377ee1-8345-4580-b06b-88c9d0a7eb27", "DetectTime": "2024-05-21T12:30:37.187343+00:00", "EventTime": "2024-05-21T12:30:37.187364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYomz3HodrdyMwKr2"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "e8c15870-c553-4ffb-9f65-78b64f88dc00", "DetectTime": "2024-05-21T12:30:37.525975+00:00", "EventTime": "2024-05-21T12:30:37.526000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQkrh2xjAKxO6zM9b", "CZCXTL3NZpH00svJpc", "CTOEpLiQlugjrJOvi", "CWg4Ua4VKbGEsccJb7"], "accumulated_threat_level": 6.3, "timewindow": 57} +{"Format": "IDEA0", "ID": "6fafee76-09d5-43df-b1a9-43913b5809b4", "DetectTime": "2024-05-21T12:30:37.715551+00:00", "EventTime": "2024-05-21T12:30:37.715570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQW0zy4DU24J73WC25"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "72046150-5d56-4c5c-be2d-0204b75a9de6", "DetectTime": "2024-05-21T12:30:37.993816+00:00", "EventTime": "2024-05-21T12:30:37.993837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UFjS2KSeBs3X6cId"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "be359137-23de-48a8-bf61-f7e1f90df3d4", "DetectTime": "2024-05-21T12:30:38.087087+00:00", "EventTime": "2024-05-21T12:30:38.087108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VuSQ298lhcmQf1Xk"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "6324fefc-1ef7-474b-8ede-26f84c74627e", "DetectTime": "2024-05-21T12:30:38.118811+00:00", "EventTime": "2024-05-21T12:30:38.118832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2nsY131Mqa60fMKa"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "6b8b37a6-19c9-4e7a-b4ea-0cb326c459fe", "DetectTime": "2024-05-21T12:30:38.152811+00:00", "EventTime": "2024-05-21T12:30:38.152831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW9LPnckVxdP9102j"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "f38472fc-a49f-4674-8cc8-bf3a03a8660d", "DetectTime": "2024-05-21T12:30:38.181078+00:00", "EventTime": "2024-05-21T12:30:38.181100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv46FTSgYE4Xvjd35"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "ca5423a1-81b2-4bf3-a922-1f06469d3075", "DetectTime": "2024-05-21T12:30:38.213578+00:00", "EventTime": "2024-05-21T12:30:38.213598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllUb6WB1xQIvmuBc"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "a3dad9a2-8f87-4df8-81b7-c33f6f2f4e2c", "DetectTime": "2024-05-21T12:30:38.248898+00:00", "EventTime": "2024-05-21T12:30:38.248920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ92QATOXwb23b5ud"], "accumulated_threat_level": 7.1, "timewindow": 57} +{"Format": "IDEA0", "ID": "9b153d52-071d-41e7-81a1-3959d3785dfa", "DetectTime": "2024-05-21T12:30:38.267850+00:00", "EventTime": "2024-05-21T12:30:38.267871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIG9Z32mJVbcuQoKng"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "c6137eae-313f-4d90-95da-5e9304dec53e", "DetectTime": "2024-05-21T12:30:38.298823+00:00", "EventTime": "2024-05-21T12:30:38.298840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1P6Yobz6JOSXhAYk"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 57} +{"Format": "IDEA0", "ID": "0fa60cb6-bf67-42b2-825c-b5ee17e2e25a", "DetectTime": "2024-05-21T12:30:38.318037+00:00", "EventTime": "2024-05-21T12:30:38.318058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMFnC1rsLUHeqjBj8"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "506c7b47-2260-4063-87a4-b25382ebcfaa", "DetectTime": "2024-05-21T12:30:38.347665+00:00", "EventTime": "2024-05-21T12:30:38.347683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTTMe1AkS1I1FNLx7"], "accumulated_threat_level": 8.7, "timewindow": 57} +{"Format": "IDEA0", "ID": "bdb6cba4-a55f-4b91-bd26-32f0868bb448", "DetectTime": "2024-05-21T12:30:38.385013+00:00", "EventTime": "2024-05-21T12:30:38.385030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Che4Zm2k9UWqpvF4p2"], "accumulated_threat_level": 9.5, "timewindow": 57} +{"Format": "IDEA0", "ID": "61aaeb04-42d1-4052-adf2-a73ba725f135", "DetectTime": "2024-05-21T12:30:38.403593+00:00", "EventTime": "2024-05-21T12:30:38.403614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ZyCf3736wlsvv6O1"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "8ad129ff-41fe-4fba-8021-bc8f0fd866d8", "DetectTime": "2024-05-21T12:30:38.432063+00:00", "EventTime": "2024-05-21T12:30:38.432081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6WUu4YytezP8IYgd"], "accumulated_threat_level": 10.3, "timewindow": 57} +{"Format": "IDEA0", "ID": "d406d115-a478-40c8-8bed-8abee8b4b7eb", "DetectTime": "2024-05-21T12:30:38.672708+00:00", "EventTime": "2024-05-21T12:30:38.672727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Mvhz3CijeRd0gBo2"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "11e8e72d-b23a-48c4-affd-1721ca638944", "DetectTime": "2024-05-21T12:30:38.706511+00:00", "EventTime": "2024-05-21T12:30:38.706534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3TLWp1KXDZBzaBQ6"], "accumulated_threat_level": 11.100000000000001, "timewindow": 57} +{"Format": "IDEA0", "ID": "4d2d73f4-2ade-4381-824a-7ba24aa07e1b", "DetectTime": "2024-05-21T12:30:38.888062+00:00", "EventTime": "2024-05-21T12:30:38.888083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnr5a1WJncyOV2YH"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "7e59b426-7a13-4483-bb70-1dcae57927dc", "DetectTime": "2024-05-21T12:30:39.022937+00:00", "EventTime": "2024-05-21T12:30:39.022958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBu1835r4oLGGJBu6"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "00a25952-8df6-4a31-944d-2e12d729b65b", "DetectTime": "2024-05-21T12:30:39.054994+00:00", "EventTime": "2024-05-21T12:30:39.055014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCSHt383NBY9BEU91"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "80d3a99f-ee2c-4c69-81ce-27d7f50c1d1d", "DetectTime": "2024-05-21T12:30:39.092654+00:00", "EventTime": "2024-05-21T12:30:39.092673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvic94DN7m4yBPzUi"], "accumulated_threat_level": 11.900000000000002, "timewindow": 57} +{"Format": "IDEA0", "ID": "fec0e55a-27bb-4261-bc7d-897820a54b06", "DetectTime": "2024-05-21T12:30:39.109556+00:00", "EventTime": "2024-05-21T12:30:39.109575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvpUY1ORqgBRpDAab"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "0e07e2cd-b36e-44ae-824a-423b02216f47", "DetectTime": "2024-05-21T12:30:39.133027+00:00", "EventTime": "2024-05-21T12:30:39.133046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQThA32VvWzk95aKQc"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "ea5ad6e2-9907-4477-972c-ecb0030c1c84", "DetectTime": "2024-05-21T12:30:39.169398+00:00", "EventTime": "2024-05-21T12:30:39.169419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBs7sGrrVdvkpYfl"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "0e04ff71-dfac-410d-970d-ed13bab19911", "DetectTime": "2024-05-21T12:30:39.180263+00:00", "EventTime": "2024-05-21T12:30:39.180281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CafoEn4dATscLk7Zeh"], "accumulated_threat_level": 12.700000000000003, "timewindow": 57} +{"Format": "Json", "ID": "0e04ff71-dfac-410d-970d-ed13bab19911", "DetectTime": "2024-05-21T12:30:39.180263+00:00", "EventTime": "2024-05-21T12:30:39.180281+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "1970-01-03T08:34:38.902590+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2024/05/21 12:30:39.517417)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 57, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "f040ec4f-5261-4776-aaf3-1d8c3f6b5af7", "DetectTime": "2024-05-21T12:30:39.521578+00:00", "EventTime": "2024-05-21T12:30:39.521595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.6.58.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQFPR34uRIqFJNire"], "accumulated_threat_level": 0.8, "timewindow": 55} +{"Format": "IDEA0", "ID": "e0686a79-4017-4e3b-a270-f225f1d1b56f", "DetectTime": "2024-05-21T12:30:39.526252+00:00", "EventTime": "2024-05-21T12:30:39.526270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxFWVi4e3bbxjeu1ee"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "c8aec4d0-963e-4eb9-98f4-9e63b76feb7b", "DetectTime": "2024-05-21T12:30:39.530743+00:00", "EventTime": "2024-05-21T12:30:39.530761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEyhlu2ekaiHoa0Hvk"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "09f85d2e-2dc0-4c41-b765-74465ba71f48", "DetectTime": "2024-05-21T12:30:39.543410+00:00", "EventTime": "2024-05-21T12:30:39.543433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEfsC2qzrQG21NXr8"], "accumulated_threat_level": 0.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "6f8caa28-5f31-457e-95c3-9cbc185753ae", "DetectTime": "2024-05-21T12:30:39.548558+00:00", "EventTime": "2024-05-21T12:30:39.548578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSEJ4ykwpl9DUa53e"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "321d871e-b8d2-4a98-91eb-88074360d903", "DetectTime": "2024-05-21T12:30:39.553383+00:00", "EventTime": "2024-05-21T12:30:39.553401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHYPq1n1vImDRzFol"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "4fcbb920-d4ef-48a2-bc23-cfd83859eec0", "DetectTime": "2024-05-21T12:30:39.564397+00:00", "EventTime": "2024-05-21T12:30:39.564415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF3ib4EM2Dwerzmdf"], "accumulated_threat_level": 1.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "0a955ffa-c950-4c41-ad90-c163b8fcff2f", "DetectTime": "2024-05-21T12:30:39.569155+00:00", "EventTime": "2024-05-21T12:30:39.569173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CncMGp4IaH3FB8Cug1"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "9baf475e-cf35-4dc3-b843-7972f7f646dc", "DetectTime": "2024-05-21T12:30:39.573695+00:00", "EventTime": "2024-05-21T12:30:39.573714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHojzxK0Qkxqk5uQ9"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "08ab2c02-57a9-4e51-8a8f-8ceecd6021a6", "DetectTime": "2024-05-21T12:30:39.578328+00:00", "EventTime": "2024-05-21T12:30:39.578347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4r1NFEXiAJ3ZHne"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "37c173a8-36a2-4eb8-908b-9ced0c0ea078", "DetectTime": "2024-05-21T12:30:39.691051+00:00", "EventTime": "2024-05-21T12:30:39.691072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09EujFA0jTXAwSud"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 57} +{"Format": "IDEA0", "ID": "30da7082-7edc-4c78-b7a7-1615950c71ff", "DetectTime": "2024-05-21T12:30:39.707308+00:00", "EventTime": "2024-05-21T12:30:39.707331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD1m6K1az3g7wYAVz2"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "27368036-af81-49da-9ba3-ac2c3ca0ea2f", "DetectTime": "2024-05-21T12:30:39.754597+00:00", "EventTime": "2024-05-21T12:30:39.754617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg41iQ12UZ5Ze1D8qa"], "accumulated_threat_level": 3.2, "timewindow": 57} +{"Format": "IDEA0", "ID": "fb3d1856-fc45-42d8-b1db-6c8035b28c99", "DetectTime": "2024-05-21T12:30:39.790404+00:00", "EventTime": "2024-05-21T12:30:39.790437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mh1qDA1uI7qo3i8"], "accumulated_threat_level": 4.0, "timewindow": 57} +{"Format": "IDEA0", "ID": "56a43a58-a8bf-49b7-9cc7-a0df7ae0ada0", "DetectTime": "2024-05-21T12:30:39.813826+00:00", "EventTime": "2024-05-21T12:30:39.813846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfefpi35b3g3iKpaO1"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "51763210-13a6-4638-ba15-7f8c1a66298f", "DetectTime": "2024-05-21T12:30:39.850063+00:00", "EventTime": "2024-05-21T12:30:39.850085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQgZx3R3iYDMS5AL"], "accumulated_threat_level": 4.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "fe02f32a-d27c-4667-8d3e-68d51c886b0a", "DetectTime": "2024-05-21T12:30:39.877261+00:00", "EventTime": "2024-05-21T12:30:39.877280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerVwHl7cB6j1viHa"], "accumulated_threat_level": 5.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "cdc5c3d0-faaf-403c-b03f-6dfc294e2c6f", "DetectTime": "2024-05-21T12:30:39.918153+00:00", "EventTime": "2024-05-21T12:30:39.918171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzpJ3kD6onvb8aQK5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 57} +{"Format": "IDEA0", "ID": "11f42cb8-8c04-4974-bc9c-dbc129f11d3c", "DetectTime": "2024-05-21T12:30:39.932858+00:00", "EventTime": "2024-05-21T12:30:39.932878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cypce23H19rW81NEBj"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "830484d3-09a3-4552-9de5-a8489b83dad2", "DetectTime": "2024-05-21T12:30:39.968673+00:00", "EventTime": "2024-05-21T12:30:39.968691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKUmA3ChjPcRFMG79"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "ba18f235-b136-4bf7-8b4b-afc2a6aaa153", "DetectTime": "2024-05-21T12:30:40.003578+00:00", "EventTime": "2024-05-21T12:30:40.003598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvWMrlbZ1QQU8bAg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "fadd4fe9-1a07-4b54-991b-f0b014079160", "DetectTime": "2024-05-21T12:30:40.036849+00:00", "EventTime": "2024-05-21T12:30:40.036868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6thLW1lwOzJPceHSh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c0dcc569-d38c-4f19-a887-58c1c0219676", "DetectTime": "2024-05-21T12:30:40.335135+00:00", "EventTime": "2024-05-21T12:30:40.335157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmuzmd47VFjVld5gt7"], "accumulated_threat_level": 9.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "d5b73bd3-8198-42c8-acd2-5114686abdcf", "DetectTime": "2024-05-21T12:30:40.384177+00:00", "EventTime": "2024-05-21T12:30:40.384196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnAjx3tuIpz1z40Fj"], "accumulated_threat_level": 10.4, "timewindow": 57} +{"Format": "IDEA0", "ID": "c158a44f-7896-4363-b689-8b70e283e0fa", "DetectTime": "2024-05-21T12:30:40.426772+00:00", "EventTime": "2024-05-21T12:30:40.426795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA07vx2zzSwZ0Ur5qc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 57} +{"Format": "IDEA0", "ID": "085b65e9-d470-46a6-bc35-f4d5a9af7f39", "DetectTime": "2024-05-21T12:30:40.461514+00:00", "EventTime": "2024-05-21T12:30:40.461532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFFhFp7uEeyi5mBle"], "accumulated_threat_level": 12.000000000000002, "timewindow": 57} +{"Format": "Json", "ID": "085b65e9-d470-46a6-bc35-f4d5a9af7f39", "DetectTime": "2024-05-21T12:30:40.461514+00:00", "EventTime": "2024-05-21T12:30:40.461532+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "1970-01-03T08:34:59.397842+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 57. (real time 2024/05/21 12:30:40.862782)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 57, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4a2846b9-8a57-43ca-9ac0-641913bfaac9", "DetectTime": "2024-05-21T12:30:40.867345+00:00", "EventTime": "2024-05-21T12:30:40.867365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.200.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkI2DM1WqNCa6KMo0f"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "dc9db7b2-4fd1-4086-a938-ae30773de6fb", "DetectTime": "2024-05-21T12:30:40.879481+00:00", "EventTime": "2024-05-21T12:30:40.879502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jjyU3mUTj6Dm5vJe"], "accumulated_threat_level": 0.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "815c6f95-a9f3-44f0-aa12-77c361bc33a8", "DetectTime": "2024-05-21T12:30:40.892335+00:00", "EventTime": "2024-05-21T12:30:40.892353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0S1531IESM89SRK9l"], "accumulated_threat_level": 1.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "74d2abed-17da-4217-82f4-9c07af72a9d3", "DetectTime": "2024-05-21T12:30:40.903228+00:00", "EventTime": "2024-05-21T12:30:40.903246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdqi8h2zvQhhvhxJPi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 57} +{"Format": "IDEA0", "ID": "026e855c-e74f-4f77-848c-c4fab6a05633", "DetectTime": "2024-05-21T12:30:40.914335+00:00", "EventTime": "2024-05-21T12:30:40.914354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3lxlH3CSMFdK5qeU2"], "accumulated_threat_level": 3.2, "timewindow": 57} +{"Format": "IDEA0", "ID": "b10c920a-e990-486a-b7be-ad3ea9dbbcf8", "DetectTime": "2024-05-21T12:30:40.925379+00:00", "EventTime": "2024-05-21T12:30:40.925397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTz1dpd8tLZUX6Q7h"], "accumulated_threat_level": 4.0, "timewindow": 57} +{"Format": "IDEA0", "ID": "cff67f2b-0764-4687-865c-77566ac6913d", "DetectTime": "2024-05-21T12:30:40.941566+00:00", "EventTime": "2024-05-21T12:30:40.941584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwdX52HRJm60tZpkk"], "accumulated_threat_level": 4.8, "timewindow": 57} +{"Format": "IDEA0", "ID": "a3e2ad26-ae69-42df-bb16-6609206ba199", "DetectTime": "2024-05-21T12:30:40.952312+00:00", "EventTime": "2024-05-21T12:30:40.952332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2tdRp6vuMUFmaTm2"], "accumulated_threat_level": 5.6, "timewindow": 57} +{"Format": "IDEA0", "ID": "751c64b9-225b-46de-9629-40d8bd438ed0", "DetectTime": "2024-05-21T12:30:40.976576+00:00", "EventTime": "2024-05-21T12:30:40.976597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.127.101.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2fdn3ilL5PMd4xwd"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "4c19fe39-8cb9-4e04-9703-8ae811c98199", "DetectTime": "2024-05-21T12:30:41.005016+00:00", "EventTime": "2024-05-21T12:30:41.005037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9w8Nc3sKrlXlVSOA9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 57} +{"Format": "IDEA0", "ID": "3df7cb26-1db0-4177-b1e0-f7bfbeae9cb1", "DetectTime": "2024-05-21T12:30:41.037755+00:00", "EventTime": "2024-05-21T12:30:41.037776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI094W15LbFckuFuHe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "3168021f-7d7a-4e2d-8bd8-f358e72625e4", "DetectTime": "2024-05-21T12:30:41.152257+00:00", "EventTime": "2024-05-21T12:30:41.152277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.151.56.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2HGR92JeUZuWMFnUc"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "6952bc36-c700-41a0-82c3-0bc25f299a01", "DetectTime": "2024-05-21T12:30:41.191992+00:00", "EventTime": "2024-05-21T12:30:41.192011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.6.58.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUHBuj13Og8yc48Ec2"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "6be8a0b4-5c3f-40fa-b8ca-0d3a8baf6c5e", "DetectTime": "2024-05-21T12:30:41.248555+00:00", "EventTime": "2024-05-21T12:30:41.248576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPvCXh9UcMI94h79"], "accumulated_threat_level": 0.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "565fa251-bfce-45f0-9cd9-d8a8af270b3d", "DetectTime": "2024-05-21T12:30:41.687726+00:00", "EventTime": "2024-05-21T12:30:41.687749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxLcP6t8EdFQIZBV3"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "e6264bf3-9234-473b-a113-9436a1959b0e", "DetectTime": "2024-05-21T12:30:41.747417+00:00", "EventTime": "2024-05-21T12:30:41.747440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChtVPNVDuZUDU7dkc"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "553e8314-8685-4feb-bf3b-7bf33d39b75e", "DetectTime": "2024-05-21T12:30:41.781281+00:00", "EventTime": "2024-05-21T12:30:41.781300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMcsCWsfIxlVsePg1"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "8fd094d6-0538-4c4e-b043-be9e5894a18b", "DetectTime": "2024-05-21T12:30:41.828220+00:00", "EventTime": "2024-05-21T12:30:41.828248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgAIul1ZBcpjYrKy3g"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "7c35bb21-cff4-4b89-8a9f-6ee5a8e0553b", "DetectTime": "2024-05-21T12:30:41.845572+00:00", "EventTime": "2024-05-21T12:30:41.845590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9KLPK3nfJV6OBmQN5", "CjFCnVOuzNoivtgee", "C28Y5y4uwMvHxG6Uq4", "Clwn3ja6aUCvRXq1d"], "accumulated_threat_level": 1.3, "timewindow": 58} +{"Format": "IDEA0", "ID": "cbfb47ff-4d9b-4066-aa24-ef26245b63a9", "DetectTime": "2024-05-21T12:30:41.864636+00:00", "EventTime": "2024-05-21T12:30:41.864654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVT7nxczu6em1ndYf"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "e0e58196-6a80-4ef5-bb0b-c3f40469e88a", "DetectTime": "2024-05-21T12:30:41.912098+00:00", "EventTime": "2024-05-21T12:30:41.912118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJTfF3dBzKVnd5vy2"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "7fb5c69e-e3c4-475d-acb2-cebb75ea6211", "DetectTime": "2024-05-21T12:30:42.136157+00:00", "EventTime": "2024-05-21T12:30:42.136179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiG4eOtGsvBGRTwv5"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "900ac7c6-7b40-4019-b4c1-45030a00e54e", "DetectTime": "2024-05-21T12:30:42.173123+00:00", "EventTime": "2024-05-21T12:30:42.173143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3yszS3p9uSfsazvcc"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "996da064-75cd-4add-bf3d-f69418bc9974", "DetectTime": "2024-05-21T12:30:42.220835+00:00", "EventTime": "2024-05-21T12:30:42.220857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOCz03YczMJZ1s08c"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "4f1e0dea-79d5-4cb0-b1cb-098d180c3b72", "DetectTime": "2024-05-21T12:30:42.463345+00:00", "EventTime": "2024-05-21T12:30:42.463367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwjDG3YNnuwFRqUn1"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "8860cccf-4fe7-4878-99af-ae721d9a1ce3", "DetectTime": "2024-05-21T12:30:42.532494+00:00", "EventTime": "2024-05-21T12:30:42.532512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTlJBy2ie8TecjY7vb"], "accumulated_threat_level": 2.1, "timewindow": 58} +{"Format": "IDEA0", "ID": "c7a65c87-bcf4-4fdf-a7fd-ba15f4214d42", "DetectTime": "2024-05-21T12:30:42.569479+00:00", "EventTime": "2024-05-21T12:30:42.569498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZzsZ1HvwhTWE2IHi"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 58} +{"Format": "IDEA0", "ID": "7d963803-37db-4705-8ec8-ef51841af589", "DetectTime": "2024-05-21T12:30:42.662475+00:00", "EventTime": "2024-05-21T12:30:42.662498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbIbOc3gPWI8OdjaK3"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "800df2ea-ffe9-4709-9029-700510ab01fa", "DetectTime": "2024-05-21T12:30:42.716905+00:00", "EventTime": "2024-05-21T12:30:42.716927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVfKhYQ9vZjJqaol"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "678857d7-55eb-445f-b7f7-206acae95bb1", "DetectTime": "2024-05-21T12:30:42.752601+00:00", "EventTime": "2024-05-21T12:30:42.752618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD3lxrwG5wGptDQHa"], "accumulated_threat_level": 3.7, "timewindow": 58} +{"Format": "IDEA0", "ID": "627697c8-9027-458c-b940-faec40f6ee98", "DetectTime": "2024-05-21T12:30:42.770471+00:00", "EventTime": "2024-05-21T12:30:42.770490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eFi02S1c4Us9TA96"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "49b9a5b7-c7ef-49eb-bc43-e84c187a5907", "DetectTime": "2024-05-21T12:30:42.801568+00:00", "EventTime": "2024-05-21T12:30:42.801590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJghn4XiPRuzATBYa"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "ec474549-6e34-4b6b-9854-a65d6fa7db8c", "DetectTime": "2024-05-21T12:30:42.829039+00:00", "EventTime": "2024-05-21T12:30:42.829057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrvfI2v67UychoXbe"], "accumulated_threat_level": 4.5, "timewindow": 58} +{"Format": "IDEA0", "ID": "cd0ac4ec-a915-4721-8497-0fb5e7c79a52", "DetectTime": "2024-05-21T12:30:42.857541+00:00", "EventTime": "2024-05-21T12:30:42.857560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjaug71HOuMw4AgKi"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "cb09d18c-d8a1-4f0f-86b8-fd5b5043fbda", "DetectTime": "2024-05-21T12:30:42.883359+00:00", "EventTime": "2024-05-21T12:30:42.883381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5soG3TE3G6ljryD5"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "c5eecc68-6e19-4492-9a65-68311b8428d7", "DetectTime": "2024-05-21T12:30:42.927016+00:00", "EventTime": "2024-05-21T12:30:42.927039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVKm02G1Ahykze3J5"], "accumulated_threat_level": 5.3, "timewindow": 58} +{"Format": "IDEA0", "ID": "2bdc0e78-b97a-401f-8972-e38294214706", "DetectTime": "2024-05-21T12:30:42.935443+00:00", "EventTime": "2024-05-21T12:30:42.935465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfzKbNh9Sz7I5EQd"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "dfd32f38-afdc-41c8-90d0-4d0fbfea04f9", "DetectTime": "2024-05-21T12:30:42.966231+00:00", "EventTime": "2024-05-21T12:30:42.966253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctw2PaXMRfixMMI6l"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "e1ec022c-19a0-4c55-af26-4bc97c558c86", "DetectTime": "2024-05-21T12:30:42.999234+00:00", "EventTime": "2024-05-21T12:30:42.999254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Av1J24zLj5lTZbKe"], "accumulated_threat_level": 6.1, "timewindow": 58} +{"Format": "IDEA0", "ID": "42182779-fbe9-4598-ba1e-5832c1589405", "DetectTime": "2024-05-21T12:30:43.032608+00:00", "EventTime": "2024-05-21T12:30:43.032663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ezSQ1oXjgIyHTnu2"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 58} +{"Format": "IDEA0", "ID": "6668cd49-27c1-4a81-a3d7-cba19cb19de0", "DetectTime": "2024-05-21T12:30:43.086467+00:00", "EventTime": "2024-05-21T12:30:43.086490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjiAwF4ynj68nLyrg7"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "d4b8f60f-b973-47b6-80f2-619b19f9ecee", "DetectTime": "2024-05-21T12:30:43.363683+00:00", "EventTime": "2024-05-21T12:30:43.363703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSniy35wo2OVEcwed"], "accumulated_threat_level": 7.699999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "eaf07ab4-4fda-4f36-bae7-cabf3726772e", "DetectTime": "2024-05-21T12:30:43.369058+00:00", "EventTime": "2024-05-21T12:30:43.369078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyrLj34RRBo6BPtee"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "be626cde-77a2-456a-a40c-55707580aebf", "DetectTime": "2024-05-21T12:30:43.373675+00:00", "EventTime": "2024-05-21T12:30:43.373693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvTGpC4JuxvEt8bgi3"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "744fe08d-7aa1-4ce1-847a-50ebbef656b7", "DetectTime": "2024-05-21T12:30:43.380872+00:00", "EventTime": "2024-05-21T12:30:43.380891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOa5q1dGglhDPB76"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "f33ff7dc-7172-4c5d-bc7c-f0ddcb75d263", "DetectTime": "2024-05-21T12:30:43.449905+00:00", "EventTime": "2024-05-21T12:30:43.449925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZeuDT17bQTaDKg802"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "bceae242-572b-4f06-86b0-2c8a5ad84d85", "DetectTime": "2024-05-21T12:30:43.475987+00:00", "EventTime": "2024-05-21T12:30:43.476008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFat4UjpVjGF4AE3h"], "accumulated_threat_level": 8.5, "timewindow": 58} +{"Format": "IDEA0", "ID": "839698bf-e9fe-4010-bc73-52413d44ffdf", "DetectTime": "2024-05-21T12:30:43.507761+00:00", "EventTime": "2024-05-21T12:30:43.507782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1fr919u01IwCCYh1"], "accumulated_threat_level": 9.3, "timewindow": 58} +{"Format": "IDEA0", "ID": "0c1d068c-2e91-4dd1-8ec4-2152eb379126", "DetectTime": "2024-05-21T12:30:43.540806+00:00", "EventTime": "2024-05-21T12:30:43.540827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF3aLjNhhOjDjGTd3"], "accumulated_threat_level": 10.100000000000001, "timewindow": 58} +{"Format": "IDEA0", "ID": "b4dc9ccd-e70c-4924-9b9c-cddf698ddba0", "DetectTime": "2024-05-21T12:30:43.563911+00:00", "EventTime": "2024-05-21T12:30:43.563938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJSS74FUP8PURZ8D7"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "2ef8cf9b-48ef-4f91-9ba8-d132826b661f", "DetectTime": "2024-05-21T12:30:43.594607+00:00", "EventTime": "2024-05-21T12:30:43.594626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGnscV2mxdEjpqiRC6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 58} +{"Format": "IDEA0", "ID": "aad5c225-e98c-4f8a-a596-567492234e9b", "DetectTime": "2024-05-21T12:30:43.618284+00:00", "EventTime": "2024-05-21T12:30:43.618303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QuCiHzRnoRJSrge"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "e6e1aec3-8a72-41af-9bc0-befac96087d5", "DetectTime": "2024-05-21T12:30:43.662455+00:00", "EventTime": "2024-05-21T12:30:43.662475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx89sq1KYu6kWZbe4c"], "accumulated_threat_level": 11.700000000000003, "timewindow": 58} +{"Format": "IDEA0", "ID": "b38938a0-a65f-4522-8b3d-c2ab5a59df08", "DetectTime": "2024-05-21T12:30:43.681941+00:00", "EventTime": "2024-05-21T12:30:43.681963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr3S2a3vdXNeMiJaxd"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "36872ef8-3bd6-4048-9cce-412ee0fc006e", "DetectTime": "2024-05-21T12:30:43.686840+00:00", "EventTime": "2024-05-21T12:30:43.686859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzwRAv1fE05InKoMBj"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "54116126-40ea-4d05-92a3-6befd9b0ef72", "DetectTime": "2024-05-21T12:30:43.746716+00:00", "EventTime": "2024-05-21T12:30:43.746736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWFKe35vC38BRNFef"], "accumulated_threat_level": 12.500000000000004, "timewindow": 58} +{"Format": "Json", "ID": "54116126-40ea-4d05-92a3-6befd9b0ef72", "DetectTime": "2024-05-21T12:30:43.746716+00:00", "EventTime": "2024-05-21T12:30:43.746736+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "1970-01-03T09:06:23.261131+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2024/05/21 12:30:43.979785)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 58, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "a30602c1-8f1c-42aa-accd-a806e6329497", "DetectTime": "2024-05-21T12:30:43.984105+00:00", "EventTime": "2024-05-21T12:30:43.984126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5fMvEynP1KcrqRc1"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "1d6d6ae0-8db9-4031-915b-1f56d0b3e17a", "DetectTime": "2024-05-21T12:30:43.989070+00:00", "EventTime": "2024-05-21T12:30:43.989088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorAy93iLFvkHgdk35"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "5f403e9b-0fb5-4d09-a177-588e6b534d1e", "DetectTime": "2024-05-21T12:30:44.034128+00:00", "EventTime": "2024-05-21T12:30:44.034149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7u1bysOHzyFfxkl"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "48a47999-adf7-4a31-a517-e6eb1ad55fd2", "DetectTime": "2024-05-21T12:30:44.073777+00:00", "EventTime": "2024-05-21T12:30:44.073797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4MtC4qTidfwLIasa"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "b7fdcc23-adf0-41f6-a980-3b38cc4d754b", "DetectTime": "2024-05-21T12:30:44.079522+00:00", "EventTime": "2024-05-21T12:30:44.079542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1idvH44rA44FfMa"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "0b7628f3-7c76-4016-8440-080ec8304ac0", "DetectTime": "2024-05-21T12:30:44.091920+00:00", "EventTime": "2024-05-21T12:30:44.091938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTPJrrvsnzqJg5C3"], "accumulated_threat_level": 0.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "7fdad8af-454c-4692-af19-f11ec9c53f7d", "DetectTime": "2024-05-21T12:30:44.098011+00:00", "EventTime": "2024-05-21T12:30:44.098031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGHB44rIzugGorFQa"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "8571fd8d-4999-4656-8f8a-d923ac04b829", "DetectTime": "2024-05-21T12:30:44.102867+00:00", "EventTime": "2024-05-21T12:30:44.102886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AT4Q3kgf948L8zOl"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "f6c86b2a-b9a5-4161-a1e4-50be0e0170c2", "DetectTime": "2024-05-21T12:30:44.107487+00:00", "EventTime": "2024-05-21T12:30:44.107506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8eYK3evqP9dLyS6"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "e52e25fc-c7b8-4e0d-b564-80d2be48fc3a", "DetectTime": "2024-05-21T12:30:44.112094+00:00", "EventTime": "2024-05-21T12:30:44.112111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1fcVx2QEhchL3i3d7"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "57baf16d-b3cc-44d9-a63b-d2f090f38a73", "DetectTime": "2024-05-21T12:30:44.256490+00:00", "EventTime": "2024-05-21T12:30:44.256509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWr0vM1eiaHkiW5pbi"], "accumulated_threat_level": 1.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "ce7a159d-7ea0-48f9-96f6-f9f79a654047", "DetectTime": "2024-05-21T12:30:44.285727+00:00", "EventTime": "2024-05-21T12:30:44.285750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2R5vTxXqfQE96S8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 58} +{"Format": "IDEA0", "ID": "3b0b5cba-d6e0-476c-90a8-e59dc1c76103", "DetectTime": "2024-05-21T12:30:44.317286+00:00", "EventTime": "2024-05-21T12:30:44.317304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIQnSGyz76BM1sog"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "6f675073-6d2e-44ae-a858-0604e749c8d8", "DetectTime": "2024-05-21T12:30:44.340642+00:00", "EventTime": "2024-05-21T12:30:44.340663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs3qTZkXCJbmPS3q8"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "70f3e774-6928-4ecc-a9e3-bb4f103cb73f", "DetectTime": "2024-05-21T12:30:44.369880+00:00", "EventTime": "2024-05-21T12:30:44.369900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzxM94St5NEZfXMV7"], "accumulated_threat_level": 4.0, "timewindow": 58} +{"Format": "IDEA0", "ID": "80a970e7-79ea-44f0-8151-c064c2ef6d7a", "DetectTime": "2024-05-21T12:30:44.406475+00:00", "EventTime": "2024-05-21T12:30:44.406496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qn6x4KKlgWROLQth"], "accumulated_threat_level": 4.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "34b16566-ef88-4c8f-b310-633eb7333025", "DetectTime": "2024-05-21T12:30:44.473056+00:00", "EventTime": "2024-05-21T12:30:44.473075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCaM74xP1Vtycksle"], "accumulated_threat_level": 5.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "7769d8a1-0138-4809-ad76-7d6ee10ba90a", "DetectTime": "2024-05-21T12:30:44.508056+00:00", "EventTime": "2024-05-21T12:30:44.508077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpiLvr1bNNfvr1bPUc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 58} +{"Format": "IDEA0", "ID": "63d262a0-64b2-4319-8cef-9d46230fecc3", "DetectTime": "2024-05-21T12:30:44.541027+00:00", "EventTime": "2024-05-21T12:30:44.541047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHODSZDsqBuVMSI5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "f2718d2e-ec7e-43b8-bf13-256f326f5025", "DetectTime": "2024-05-21T12:30:44.576238+00:00", "EventTime": "2024-05-21T12:30:44.576256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nsW32WsYdsgiVAR2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "5ab6e483-6ef2-4598-b3df-30cdbf68d6ac", "DetectTime": "2024-05-21T12:30:44.613300+00:00", "EventTime": "2024-05-21T12:30:44.613320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvAY53UzdxtPrg7U1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "9b8083d6-03bc-4bf0-b484-e336def43157", "DetectTime": "2024-05-21T12:30:44.651969+00:00", "EventTime": "2024-05-21T12:30:44.651991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9xnd4dLrtR5Xnb35"], "accumulated_threat_level": 9.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "f07b16d3-c1c9-4d23-b74d-00d29cf4be8b", "DetectTime": "2024-05-21T12:30:44.692718+00:00", "EventTime": "2024-05-21T12:30:44.692736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM2LUZ2enwfGnUfLRi"], "accumulated_threat_level": 10.4, "timewindow": 58} +{"Format": "IDEA0", "ID": "d6b09c50-b977-494e-8335-42e7953355c4", "DetectTime": "2024-05-21T12:30:44.723191+00:00", "EventTime": "2024-05-21T12:30:44.723210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdBNb4KRXJWk9bgM5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 58} +{"Format": "IDEA0", "ID": "57ba5cc6-ba56-4238-bd35-b3ad75522396", "DetectTime": "2024-05-21T12:30:44.910532+00:00", "EventTime": "2024-05-21T12:30:44.910555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRxZl2QLw7clbmXcc"], "accumulated_threat_level": 1.6, "timewindow": 56} +{"Format": "IDEA0", "ID": "405e0773-6982-4fb7-b5b9-212ebaf686e6", "DetectTime": "2024-05-21T12:30:44.944537+00:00", "EventTime": "2024-05-21T12:30:44.944560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Curofj1vyBlYCfwRqh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 58} +{"Format": "Json", "ID": "405e0773-6982-4fb7-b5b9-212ebaf686e6", "DetectTime": "2024-05-21T12:30:44.944537+00:00", "EventTime": "2024-05-21T12:30:44.944560+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "1970-01-03T09:06:27.169047+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2024/05/21 12:30:45.101665)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 58, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f76a5d71-be97-48f7-8156-aa7b3df26f51", "DetectTime": "2024-05-21T12:30:45.113558+00:00", "EventTime": "2024-05-21T12:30:45.113579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrAa114lTvb3T6I8U4"], "accumulated_threat_level": 0.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "776a1f87-3ef1-4766-b641-3d3e293db574", "DetectTime": "2024-05-21T12:30:45.124545+00:00", "EventTime": "2024-05-21T12:30:45.124565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CukiLn3usnaArOmW8f"], "accumulated_threat_level": 1.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "81b6c14b-15b9-4852-8800-0a4a5e75bde7", "DetectTime": "2024-05-21T12:30:45.135085+00:00", "EventTime": "2024-05-21T12:30:45.135105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coldov3Wcv1CGWfKJk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 58} +{"Format": "IDEA0", "ID": "3f0bdb03-3968-4df4-bc0e-3f893e789520", "DetectTime": "2024-05-21T12:30:45.146803+00:00", "EventTime": "2024-05-21T12:30:45.146821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.182.138.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbVnn73YObGBI5E2T6"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "b16ee97f-22ee-4256-8c5b-5e950d0e6ee7", "DetectTime": "2024-05-21T12:30:45.160804+00:00", "EventTime": "2024-05-21T12:30:45.160822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.182.138.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.182.138.111 from 10.0.2.19. AS: TTNET, TR AS9121 rDNS: 78.182.138.111.dynamic.ttnet.com.tr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbVnn73YObGBI5E2T6"], "accumulated_threat_level": 6.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "62f12d20-c50a-4fc9-a915-01a24f1b626f", "DetectTime": "2024-05-21T12:30:45.179190+00:00", "EventTime": "2024-05-21T12:30:45.179213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39bx51DXAlORB6Weg"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "0539b10d-176d-4f8c-935f-5f3f87a97ee1", "DetectTime": "2024-05-21T12:30:45.193247+00:00", "EventTime": "2024-05-21T12:30:45.193267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhU2V1cky3y743Qh9"], "accumulated_threat_level": 4.0, "timewindow": 58} +{"Format": "IDEA0", "ID": "0ce69720-2102-4c0a-acd0-a5343adb8007", "DetectTime": "2024-05-21T12:30:45.206092+00:00", "EventTime": "2024-05-21T12:30:45.206110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6tXk93ouJGHs1l1va"], "accumulated_threat_level": 4.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "b0b3b262-8a25-4782-b122-2e46058bcb10", "DetectTime": "2024-05-21T12:30:45.230446+00:00", "EventTime": "2024-05-21T12:30:45.230474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cepij31gqCwrCpIs24"], "accumulated_threat_level": 5.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "7a86edb5-6b25-43d1-aa5f-ea4dd6601d27", "DetectTime": "2024-05-21T12:30:45.275971+00:00", "EventTime": "2024-05-21T12:30:45.275993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck4FIX8PqvyaNIIRh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 58} +{"Format": "IDEA0", "ID": "c34825b0-08fe-4aaf-8ed0-40889f45695d", "DetectTime": "2024-05-21T12:30:45.292232+00:00", "EventTime": "2024-05-21T12:30:45.292254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7ims1E31sMiNhwnd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "8b40cb38-79f2-46aa-a09a-5df03bbe8bac", "DetectTime": "2024-05-21T12:30:45.331894+00:00", "EventTime": "2024-05-21T12:30:45.331914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHtYP23B8Dm0Gzql6c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "4bcfd568-3c48-4f8a-8474-19f0af108a34", "DetectTime": "2024-05-21T12:30:45.336877+00:00", "EventTime": "2024-05-21T12:30:45.336898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.180.116.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caqbtr10AHPJeQjsd5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c5e8c96e-0acf-4b03-91eb-083164d22391", "DetectTime": "2024-05-21T12:30:45.410924+00:00", "EventTime": "2024-05-21T12:30:45.410947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN95fG3iOhuONlzo81"], "accumulated_threat_level": 7.999999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "b9878e93-c731-4922-9a7f-5a7ff2c4fff6", "DetectTime": "2024-05-21T12:30:45.453740+00:00", "EventTime": "2024-05-21T12:30:45.453760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbmOt2b56o2UFKF7c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "8be987f0-5fd6-4257-91e2-7713cf3b659f", "DetectTime": "2024-05-21T12:30:45.488763+00:00", "EventTime": "2024-05-21T12:30:45.488782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0kIYZ14Mu3J4EkgGf"], "accumulated_threat_level": 9.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "ff6c40d8-726a-4685-b005-a104b6e662d3", "DetectTime": "2024-05-21T12:30:45.524568+00:00", "EventTime": "2024-05-21T12:30:45.524590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mlsL3OsRyNXqWnxh"], "accumulated_threat_level": 10.4, "timewindow": 58} +{"Format": "IDEA0", "ID": "900346be-ff6f-4f7c-ac18-70789c5cb0d9", "DetectTime": "2024-05-21T12:30:45.559898+00:00", "EventTime": "2024-05-21T12:30:45.559920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9wp5P2B5DzmoIxe82"], "accumulated_threat_level": 11.200000000000001, "timewindow": 58} +{"Format": "IDEA0", "ID": "c9a9beaf-e174-473c-a8a5-b7f6327324b3", "DetectTime": "2024-05-21T12:30:45.592936+00:00", "EventTime": "2024-05-21T12:30:45.592961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7ihE3xqDBOlbgFFl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 58} +{"Format": "Json", "ID": "c9a9beaf-e174-473c-a8a5-b7f6327324b3", "DetectTime": "2024-05-21T12:30:45.592936+00:00", "EventTime": "2024-05-21T12:30:45.592961+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-03T09:36:35.738021+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2024/05/21 12:30:45.765275)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 58, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0f968a04-6ef4-469d-8429-318189cee3b5", "DetectTime": "2024-05-21T12:30:45.775919+00:00", "EventTime": "2024-05-21T12:30:45.775938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9lUZGODUNMzVgV07"], "accumulated_threat_level": 0.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "940d59af-92e5-4eb8-b226-ea8340ff5715", "DetectTime": "2024-05-21T12:30:45.786573+00:00", "EventTime": "2024-05-21T12:30:45.786592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdezp811NlPUmysosl"], "accumulated_threat_level": 1.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "cdeeb07e-5086-4152-b042-472b48b78873", "DetectTime": "2024-05-21T12:30:45.797246+00:00", "EventTime": "2024-05-21T12:30:45.797265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfOhkG1ggwZOCWq7e9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 58} +{"Format": "IDEA0", "ID": "0c08c947-e151-4c1a-b8bd-015242274314", "DetectTime": "2024-05-21T12:30:45.811262+00:00", "EventTime": "2024-05-21T12:30:45.811282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3I4QA14HlNcEs7P7c"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "b79d2a47-2867-43a8-9f20-92c601297d44", "DetectTime": "2024-05-21T12:30:45.822419+00:00", "EventTime": "2024-05-21T12:30:45.822438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4t4T2Cx2RJBNbBTe"], "accumulated_threat_level": 4.0, "timewindow": 58} +{"Format": "IDEA0", "ID": "ab02a360-c0b4-4e2f-94ee-f81439e59a43", "DetectTime": "2024-05-21T12:30:45.945837+00:00", "EventTime": "2024-05-21T12:30:45.945859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXLq8r1QH1GrP201i2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "e536397f-d3d7-42d9-84da-38de1ee10bec", "DetectTime": "2024-05-21T12:30:46.013609+00:00", "EventTime": "2024-05-21T12:30:46.013632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6IUF48TRlzsgxjv8"], "accumulated_threat_level": 4.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "34c1721d-7b2a-4445-b47e-26721f181c49", "DetectTime": "2024-05-21T12:30:46.018507+00:00", "EventTime": "2024-05-21T12:30:46.018524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY5MZ4b1BtBpOjeU5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "0d3bd614-b083-4f61-9983-f13b0857fd61", "DetectTime": "2024-05-21T12:30:46.048646+00:00", "EventTime": "2024-05-21T12:30:46.048667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CplMbY5QbNBuSq4Ll"], "accumulated_threat_level": 5.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "94e5dcfe-c832-42a0-b4cd-f10962b6e4ec", "DetectTime": "2024-05-21T12:30:46.075439+00:00", "EventTime": "2024-05-21T12:30:46.075462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CisXSepyx5G3OzmXh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "e79c087c-8985-4ca9-ace6-8f246fea19c7", "DetectTime": "2024-05-21T12:30:46.102778+00:00", "EventTime": "2024-05-21T12:30:46.102803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5rAXX2BX0TCYANN8j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 58} +{"Format": "IDEA0", "ID": "ddbb422d-a3d2-4feb-8da8-141409fd7a0e", "DetectTime": "2024-05-21T12:30:46.134850+00:00", "EventTime": "2024-05-21T12:30:46.134872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVPaI2P5Z6EgXCVj2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "bfc32fe6-784e-4b85-bec1-8d979c0c7e28", "DetectTime": "2024-05-21T12:30:46.163040+00:00", "EventTime": "2024-05-21T12:30:46.163059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnL062CENSsYIvkZ6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "fb01633a-b3c0-4811-b58f-9a307ce5d2cf", "DetectTime": "2024-05-21T12:30:46.199172+00:00", "EventTime": "2024-05-21T12:30:46.199189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.205.151.134"]}], "Attach": [{"Content": "Connection to unknown destination port 17413/UDP destination IP 190.205.151.134. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQL8oZ2KhZO6ZcGIY2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "e198cd83-2847-4288-8880-c7bf0f0fd2bc", "DetectTime": "2024-05-21T12:30:46.213544+00:00", "EventTime": "2024-05-21T12:30:46.213566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7yME4PylYqZ2aMy1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "bd458ef2-751c-4fab-9b7f-faf1ab175428", "DetectTime": "2024-05-21T12:30:46.257379+00:00", "EventTime": "2024-05-21T12:30:46.257406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPC2i4ZxLsUQSou9b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c8dbd8a5-53e2-47e0-b833-87303ce108b9", "DetectTime": "2024-05-21T12:30:46.295031+00:00", "EventTime": "2024-05-21T12:30:46.295056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwpFn612GpGmc7wWKf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 58} +{"Format": "IDEA0", "ID": "b0877a69-655b-42e4-a1b1-2e4aa9e837f2", "DetectTime": "2024-05-21T12:30:46.300046+00:00", "EventTime": "2024-05-21T12:30:46.300066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnaDE34vpD6NfIf6c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "3f4ec957-2593-4e81-87bd-3be82e8c1956", "DetectTime": "2024-05-21T12:30:46.341372+00:00", "EventTime": "2024-05-21T12:30:46.341391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN10lg1b5ho3XRIBhc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "ff44dd1b-2d04-494a-9116-c2110f65dae8", "DetectTime": "2024-05-21T12:30:46.365467+00:00", "EventTime": "2024-05-21T12:30:46.365489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWmbd1ygqKGGiE8Lj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "852d0259-27f1-4c60-98e2-5a465be5f13a", "DetectTime": "2024-05-21T12:30:46.398652+00:00", "EventTime": "2024-05-21T12:30:46.398673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ODqd1rjG0WOj9SM3"], "accumulated_threat_level": 9.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "92974fd5-1ef5-4e8c-95a2-39147f64f746", "DetectTime": "2024-05-21T12:30:46.415154+00:00", "EventTime": "2024-05-21T12:30:46.415175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6rnf4NFjUu6SO"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "f6d225d3-8b09-47bb-a275-a28c0eb9d5dd", "DetectTime": "2024-05-21T12:30:46.655354+00:00", "EventTime": "2024-05-21T12:30:46.655385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.244.13.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMazwNbNUcxj7OCc"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "3e70ee74-e550-4eb8-b904-c138b7e0539b", "DetectTime": "2024-05-21T12:30:46.669631+00:00", "EventTime": "2024-05-21T12:30:46.669654+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.244.13.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.244.13.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMazwNbNUcxj7OCc"], "accumulated_threat_level": 6.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ebadd28b-8e3b-4ab5-aaf5-fab729ba6e6d", "DetectTime": "2024-05-21T12:30:46.718514+00:00", "EventTime": "2024-05-21T12:30:46.718537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OVgouH3y92MMfVa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c3370ca1-65f6-4312-8b49-70a4722f4fbe", "DetectTime": "2024-05-21T12:30:46.745197+00:00", "EventTime": "2024-05-21T12:30:46.745219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfe0l1OdE8zhNx3s6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "e82de1b0-7b05-41c8-980c-1e5e83d1c480", "DetectTime": "2024-05-21T12:30:46.757257+00:00", "EventTime": "2024-05-21T12:30:46.757275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CroCroYWvt396TSd1"], "accumulated_threat_level": 10.4, "timewindow": 58} +{"Format": "IDEA0", "ID": "f0fa0b1e-a92c-4a8e-b973-d51ece373c71", "DetectTime": "2024-05-21T12:30:46.776969+00:00", "EventTime": "2024-05-21T12:30:46.776986+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["76.226.114.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Uiv4FIzKAraHXV5"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0f5818d8-780f-4c78-a69d-74e11853edb6", "DetectTime": "2024-05-21T12:30:46.790011+00:00", "EventTime": "2024-05-21T12:30:46.790030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["76.226.114.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 76.226.114.217 from 10.0.2.19. AS: ATT-INTERNET4, US AS7018 rDNS: adsl-76-226-114-217.dsl.sfldmi.sbcglobal.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Uiv4FIzKAraHXV5"], "accumulated_threat_level": 7.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "91fe3aac-156a-4872-98f4-7403d09243db", "DetectTime": "2024-05-21T12:30:46.794691+00:00", "EventTime": "2024-05-21T12:30:46.794709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sAn2LSrUlIQAW95"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "18523c63-6bd7-4308-9a94-b5f5b3a3080f", "DetectTime": "2024-05-21T12:30:46.828082+00:00", "EventTime": "2024-05-21T12:30:46.828100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcmno48KGtDLwi6Mk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 58} +{"Format": "IDEA0", "ID": "142db659-cc30-4424-adef-1794f014d924", "DetectTime": "2024-05-21T12:30:46.874472+00:00", "EventTime": "2024-05-21T12:30:46.874493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpW5pa4R4CeddBdKBe"], "accumulated_threat_level": 12.000000000000002, "timewindow": 58} +{"Format": "Json", "ID": "142db659-cc30-4424-adef-1794f014d924", "DetectTime": "2024-05-21T12:30:46.874472+00:00", "EventTime": "2024-05-21T12:30:46.874493+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "1970-01-03T09:36:39.246527+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 58. (real time 2024/05/21 12:30:47.076555)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 58, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f08d52f5-1f63-4594-a9dd-83f678ee7721", "DetectTime": "2024-05-21T12:30:47.086772+00:00", "EventTime": "2024-05-21T12:30:47.086793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJMb441Kh2Lk18IB6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "47f04ad1-48b9-4529-bfef-ca12bc309f51", "DetectTime": "2024-05-21T12:30:47.097855+00:00", "EventTime": "2024-05-21T12:30:47.097876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.0.223.238"]}], "Attach": [{"Content": "Connection to unknown destination port 22800/UDP destination IP 1.0.223.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUKQy2bYfOhaXL8id"], "accumulated_threat_level": 0.8, "timewindow": 58} +{"Format": "IDEA0", "ID": "fac81c93-664c-4fb2-944e-1c9aabf148f1", "DetectTime": "2024-05-21T12:30:47.108536+00:00", "EventTime": "2024-05-21T12:30:47.108554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQVkg3J8S03TubmF6"], "accumulated_threat_level": 1.6, "timewindow": 58} +{"Format": "IDEA0", "ID": "65ba3deb-be2b-465b-8bee-0e5b3c0dac30", "DetectTime": "2024-05-21T12:30:47.118113+00:00", "EventTime": "2024-05-21T12:30:47.118130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vtVa3Cer2XasKrT4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 58} +{"Format": "IDEA0", "ID": "f2a9732b-7774-495f-a06b-b574cfabe824", "DetectTime": "2024-05-21T12:30:47.128477+00:00", "EventTime": "2024-05-21T12:30:47.128495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGuCh4OAsSPi4n6Rd"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "4a82be42-5afb-4c90-bc91-6ca72cd75a1c", "DetectTime": "2024-05-21T12:30:47.252646+00:00", "EventTime": "2024-05-21T12:30:47.252663+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.35.154.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBdy24JqTkgBwrsz6"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "34ba4aef-c976-4457-a6b6-0530c683e87e", "DetectTime": "2024-05-21T12:30:47.267645+00:00", "EventTime": "2024-05-21T12:30:47.267670+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.35.154.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.35.154.174 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-79-35-154-174.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBdy24JqTkgBwrsz6"], "accumulated_threat_level": 7.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "aed7f276-173a-4af9-8c03-4b6b5ebdcebc", "DetectTime": "2024-05-21T12:30:47.273990+00:00", "EventTime": "2024-05-21T12:30:47.274008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czt1schF43W192WHg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "bf1e74dd-4ac1-4720-b3b6-040c74789ce8", "DetectTime": "2024-05-21T12:30:47.280062+00:00", "EventTime": "2024-05-21T12:30:47.280089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZRh221LIL1XvrNUWl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "71009601-109c-4aa8-85c4-1f2e3a4f1104", "DetectTime": "2024-05-21T12:30:47.284903+00:00", "EventTime": "2024-05-21T12:30:47.284921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClNnWCotXimisPfC5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "cd294cef-d82e-45d6-b0b5-b03a3bdfb011", "DetectTime": "2024-05-21T12:30:47.341104+00:00", "EventTime": "2024-05-21T12:30:47.341124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COi8CW274AGbogjPX9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "cc40dc12-2bc2-48ff-9932-2afe4d2c6c8d", "DetectTime": "2024-05-21T12:30:47.394697+00:00", "EventTime": "2024-05-21T12:30:47.394720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhEQNfI1B2CF5cz3"], "accumulated_threat_level": 0.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "32a7be9f-eda6-41b7-a52b-4fb845da24e1", "DetectTime": "2024-05-21T12:30:47.478350+00:00", "EventTime": "2024-05-21T12:30:47.478369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUYo34Ce4st78J3u7"], "accumulated_threat_level": 1.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "6a746f66-5c0d-4c3b-97d0-063f1ad7b0c8", "DetectTime": "2024-05-21T12:30:47.512394+00:00", "EventTime": "2024-05-21T12:30:47.512414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjrejMZ4p1OAVTtgj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 59} +{"Format": "IDEA0", "ID": "26ed4487-79a0-4160-88fe-1c183f2da7d2", "DetectTime": "2024-05-21T12:30:47.528258+00:00", "EventTime": "2024-05-21T12:30:47.528276+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["217.132.237.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldSao4SCF7kgQqZle"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "df76810d-2067-41db-80ec-7149a9b8af69", "DetectTime": "2024-05-21T12:30:47.542614+00:00", "EventTime": "2024-05-21T12:30:47.542633+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["217.132.237.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 217.132.237.117 from 10.0.2.19. AS: NV-ASN CELLCOM ltd., IL AS1680 rDNS: cbl217-132-237-117.bb.netvision.net.il Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldSao4SCF7kgQqZle"], "accumulated_threat_level": 8.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "ffa3860f-6eca-4ffa-aa70-a3ea191d6225", "DetectTime": "2024-05-21T12:30:47.554681+00:00", "EventTime": "2024-05-21T12:30:47.554701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFn8Z2HoJEq8PTgdd"], "accumulated_threat_level": 3.2, "timewindow": 59} +{"Format": "IDEA0", "ID": "cc9f515f-d8a8-44cd-97ac-c910b59f3dee", "DetectTime": "2024-05-21T12:30:47.580695+00:00", "EventTime": "2024-05-21T12:30:47.580730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZqPKG5kE3qYSnft9"], "accumulated_threat_level": 4.0, "timewindow": 59} +{"Format": "IDEA0", "ID": "28060016-4d9c-454f-8dc1-536d124850c9", "DetectTime": "2024-05-21T12:30:47.631925+00:00", "EventTime": "2024-05-21T12:30:47.631947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8KO711C2QDps2lfQ2"], "accumulated_threat_level": 4.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "2b6b59a8-e00f-4ccb-96f5-c3867422af22", "DetectTime": "2024-05-21T12:30:47.652516+00:00", "EventTime": "2024-05-21T12:30:47.652538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvkJDQP7OdLUkVBD1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "5c153624-d3b9-486c-90e6-55c7d392ee6c", "DetectTime": "2024-05-21T12:30:47.689555+00:00", "EventTime": "2024-05-21T12:30:47.689574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBEs8U3QLlaNcFuHH"], "accumulated_threat_level": 5.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "fb78d626-02ba-4fde-afbe-a7e7c9097721", "DetectTime": "2024-05-21T12:30:47.780989+00:00", "EventTime": "2024-05-21T12:30:47.781007+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHoI71wWAjF7tYXag"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0e8e3eda-4167-4f54-bb19-2741e9485db9", "DetectTime": "2024-05-21T12:30:47.794013+00:00", "EventTime": "2024-05-21T12:30:47.794035+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHoI71wWAjF7tYXag"], "accumulated_threat_level": 8.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "bb87789e-c544-4af0-967e-fb950c7206a1", "DetectTime": "2024-05-21T12:30:47.810117+00:00", "EventTime": "2024-05-21T12:30:47.810138+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8gwR2r9wgq90S3cj"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7306c91e-36cc-4d25-91de-248511e887dc", "DetectTime": "2024-05-21T12:30:47.824989+00:00", "EventTime": "2024-05-21T12:30:47.825010+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8gwR2r9wgq90S3cj"], "accumulated_threat_level": 9.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "4379127f-80e3-45e0-b5eb-55876a666e23", "DetectTime": "2024-05-21T12:30:47.929075+00:00", "EventTime": "2024-05-21T12:30:47.929093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yXwK3ajb3S5jlenk"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "983734f8-0ec7-4865-828c-a3e4265c0451", "DetectTime": "2024-05-21T12:30:47.944998+00:00", "EventTime": "2024-05-21T12:30:47.945016+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yXwK3ajb3S5jlenk"], "accumulated_threat_level": 9.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "3e26e9aa-c34f-4dcf-bb51-678acfa366ed", "DetectTime": "2024-05-21T12:30:47.957469+00:00", "EventTime": "2024-05-21T12:30:47.957488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNakOBTcpmTHipfT9"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "4dd1dd71-0aa0-4bd5-9734-b9dc71b01ee3", "DetectTime": "2024-05-21T12:30:47.970602+00:00", "EventTime": "2024-05-21T12:30:47.970623+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNakOBTcpmTHipfT9"], "accumulated_threat_level": 10.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "59b978f8-ab1c-495a-83b1-7ee2cbd9915e", "DetectTime": "2024-05-21T12:30:47.975474+00:00", "EventTime": "2024-05-21T12:30:47.975493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkzD9P2Q8UhUcAmn3c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "f511d87f-fdf2-4ff5-80d2-5707c3a0b27e", "DetectTime": "2024-05-21T12:30:47.987569+00:00", "EventTime": "2024-05-21T12:30:47.987588+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5amw3XcEoPL6vVd7"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "944fa14c-7a91-4222-af98-11a1fefec55e", "DetectTime": "2024-05-21T12:30:47.999666+00:00", "EventTime": "2024-05-21T12:30:47.999684+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5amw3XcEoPL6vVd7"], "accumulated_threat_level": 10.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "ea2ba2c2-8b3d-4889-9317-7fd51e948460", "DetectTime": "2024-05-21T12:30:48.010932+00:00", "EventTime": "2024-05-21T12:30:48.010952+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6D62m3UYYIzQRQvR8"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "4620912e-b6f3-4111-b315-0b0a6cef577e", "DetectTime": "2024-05-21T12:30:48.024941+00:00", "EventTime": "2024-05-21T12:30:48.024964+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6D62m3UYYIzQRQvR8"], "accumulated_threat_level": 11.3, "timewindow": 19} +{"Format": "IDEA0", "ID": "8be6c5c7-447d-45ea-b91f-aceb08d90e51", "DetectTime": "2024-05-21T12:30:48.029868+00:00", "EventTime": "2024-05-21T12:30:48.029886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJDCs1K2au0ZpWAtf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "3a0db5c9-d85e-40b7-a139-02f512a2af81", "DetectTime": "2024-05-21T12:30:48.034625+00:00", "EventTime": "2024-05-21T12:30:48.034644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzhQv38pweVTD7T6k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "baa49c3b-94ff-4e6d-ab58-d4aaf8e98fbb", "DetectTime": "2024-05-21T12:30:48.045913+00:00", "EventTime": "2024-05-21T12:30:48.045936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cahaii3SRtktLHhHJd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 59} +{"Format": "IDEA0", "ID": "84382ad8-5ad1-41f3-914a-62413670f5b9", "DetectTime": "2024-05-21T12:30:48.050883+00:00", "EventTime": "2024-05-21T12:30:48.050902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EEXj275RZYsk33i5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "78d4efe2-38d8-41d1-b7e9-b8f1ea4cb8c4", "DetectTime": "2024-05-21T12:30:48.055911+00:00", "EventTime": "2024-05-21T12:30:48.055930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAdxtFWB734XBS0Mk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "0c9182de-e33c-4f3f-b238-854704a5e2ce", "DetectTime": "2024-05-21T12:30:48.080543+00:00", "EventTime": "2024-05-21T12:30:48.080564+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.36.77.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.36.77.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGNS54bXZ9A7yW5s1"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "f00eaedd-4dbb-4376-8a51-3aa9ca850e43", "DetectTime": "2024-05-21T12:30:48.092999+00:00", "EventTime": "2024-05-21T12:30:48.093021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.36.77.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.36.77.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGNS54bXZ9A7yW5s1"], "accumulated_threat_level": 11.8, "timewindow": 19} +{"Format": "IDEA0", "ID": "9dee1f3d-8a95-4f33-8881-48fa380b536c", "DetectTime": "2024-05-21T12:30:48.140959+00:00", "EventTime": "2024-05-21T12:30:48.140980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwtDa35cXS1E6bXA1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "b513f7d9-2218-4f62-b31f-27528ea1e42c", "DetectTime": "2024-05-21T12:30:48.166986+00:00", "EventTime": "2024-05-21T12:30:48.167007+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.59.76.104"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.59.76.104 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C304D32RNFzpbZsbZi"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "afaba441-76f0-41fc-9831-d3f3156aa8c6", "DetectTime": "2024-05-21T12:30:48.178418+00:00", "EventTime": "2024-05-21T12:30:48.178437+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.59.76.104"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.59.76.104 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C304D32RNFzpbZsbZi"], "accumulated_threat_level": 12.3, "timewindow": 19} +{"Format": "Json", "ID": "afaba441-76f0-41fc-9831-d3f3156aa8c6", "DetectTime": "2024-05-21T12:30:48.178418+00:00", "EventTime": "2024-05-21T12:30:48.178437+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.59.76.104"]}], "Attach": [{"Content": "1970-01-01T18:31:57.227279+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:30:49.147176)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.3, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.3} +{"Format": "IDEA0", "ID": "7fedf8d2-be79-48b0-a252-b91dde983052", "DetectTime": "2024-05-21T12:30:49.151803+00:00", "EventTime": "2024-05-21T12:30:49.151821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1j4393J0z99OFQJC9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "7f630470-262a-4959-a39d-0f29db320bb3", "DetectTime": "2024-05-21T12:30:49.162181+00:00", "EventTime": "2024-05-21T12:30:49.162198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCGBqy2hHh7PW7li18"], "accumulated_threat_level": 7.199999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "147b7900-cb58-4d9c-841b-3417d2c1a9f5", "DetectTime": "2024-05-21T12:30:49.166642+00:00", "EventTime": "2024-05-21T12:30:49.166659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHzwP2Qz0UgcRlFTf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "02742ca1-2af5-4279-982e-dab71f9dd3a2", "DetectTime": "2024-05-21T12:30:49.171526+00:00", "EventTime": "2024-05-21T12:30:49.171545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvEk74phi6PaTdNbc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "2dedf238-0919-4701-b5f6-b105fc0e97cd", "DetectTime": "2024-05-21T12:30:49.175986+00:00", "EventTime": "2024-05-21T12:30:49.176004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnrcbf2v0Y3rKVzVN2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "0508fe09-4d43-49e5-97a2-60b55dcb0ed1", "DetectTime": "2024-05-21T12:30:49.186814+00:00", "EventTime": "2024-05-21T12:30:49.186833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnbdef30lrrPm7ajif"], "accumulated_threat_level": 7.999999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "d2dc53ec-61e3-486a-81c0-69dc497005dc", "DetectTime": "2024-05-21T12:30:49.198024+00:00", "EventTime": "2024-05-21T12:30:49.198043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnIOwDuZxwiUXuQ3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "0c55deca-649e-4aeb-9afa-59a1f0a3089b", "DetectTime": "2024-05-21T12:30:49.208587+00:00", "EventTime": "2024-05-21T12:30:49.208606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "Connection to unknown destination port 5239/UDP destination IP 184.91.3.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWNluq4LTRB2Wrsk"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "c0993a2e-9c10-4acb-9d44-fe31e2066130", "DetectTime": "2024-05-21T12:30:49.219277+00:00", "EventTime": "2024-05-21T12:30:49.219294+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.57.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUvxFptind1QmAy"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "3c2b0398-fdaf-47cf-ac13-578be6b8558e", "DetectTime": "2024-05-21T12:30:49.230781+00:00", "EventTime": "2024-05-21T12:30:49.230800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.57.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUvxFptind1QmAy"], "accumulated_threat_level": 0.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "6d3a4990-7ad0-4404-952a-80e5f87491b2", "DetectTime": "2024-05-21T12:30:49.244182+00:00", "EventTime": "2024-05-21T12:30:49.244202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRgRxMreDWoaCmCl"], "accumulated_threat_level": 10.4, "timewindow": 59} +{"Format": "IDEA0", "ID": "136e9aca-23a9-4eb4-b0ac-5b395c5cca39", "DetectTime": "2024-05-21T12:30:49.257400+00:00", "EventTime": "2024-05-21T12:30:49.257422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzzLe3LN5IEIdD6Ck"], "accumulated_threat_level": 11.200000000000001, "timewindow": 59} +{"Format": "IDEA0", "ID": "31f60ff8-e90f-4970-8de5-e08442eff913", "DetectTime": "2024-05-21T12:30:49.273069+00:00", "EventTime": "2024-05-21T12:30:49.273089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWqRKr3ipKDwrEW0Uk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 59} +{"Format": "Json", "ID": "31f60ff8-e90f-4970-8de5-e08442eff913", "DetectTime": "2024-05-21T12:30:49.273069+00:00", "EventTime": "2024-05-21T12:30:49.273089+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "1970-01-03T10:07:12.717683+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2024/05/21 12:30:49.417722)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 59, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fe1e310e-d1d7-444b-92b2-de03283a9a20", "DetectTime": "2024-05-21T12:30:49.428711+00:00", "EventTime": "2024-05-21T12:30:49.428729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9eEU2DAfErs5dw4"], "accumulated_threat_level": 0.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "c28760ea-2048-4711-b141-6d8e6a5d85c2", "DetectTime": "2024-05-21T12:30:49.442527+00:00", "EventTime": "2024-05-21T12:30:49.442545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN2V6q1xbUPqmkXsQ7"], "accumulated_threat_level": 1.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "1e964830-1a98-40a1-aeef-aa6c51981dd0", "DetectTime": "2024-05-21T12:30:49.452481+00:00", "EventTime": "2024-05-21T12:30:49.452499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvA1J3LRn19opytIg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 59} +{"Format": "IDEA0", "ID": "26935e25-7e47-4466-8739-bcf760825196", "DetectTime": "2024-05-21T12:30:49.461998+00:00", "EventTime": "2024-05-21T12:30:49.462016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFysEEh19kI9syvi"], "accumulated_threat_level": 3.2, "timewindow": 59} +{"Format": "IDEA0", "ID": "f9872f4a-b186-421c-b603-687526ce967f", "DetectTime": "2024-05-21T12:30:49.471745+00:00", "EventTime": "2024-05-21T12:30:49.471763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.141.121.62"]}], "Attach": [{"Content": "Connection to unknown destination port 12662/UDP destination IP 175.141.121.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMoiNCrm3a3oQw28"], "accumulated_threat_level": 4.0, "timewindow": 59} +{"Format": "IDEA0", "ID": "ac37c365-0be1-4c3f-a391-913caea9aa1f", "DetectTime": "2024-05-21T12:30:49.476140+00:00", "EventTime": "2024-05-21T12:30:49.476156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvr1Rj2a2kdLpuIJI9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "1cd25995-cf91-4bf0-90db-987bcc5b0182", "DetectTime": "2024-05-21T12:30:49.486292+00:00", "EventTime": "2024-05-21T12:30:49.486309+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["81.100.38.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 81.100.38.245 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx647zfgL7HIfKaQl"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "18cdb3c9-92f5-4301-84b0-3062bc7598cc", "DetectTime": "2024-05-21T12:30:49.496976+00:00", "EventTime": "2024-05-21T12:30:49.496994+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["81.100.38.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 81.100.38.245 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx647zfgL7HIfKaQl"], "accumulated_threat_level": 1.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "8aa846a1-5a45-44a7-92ff-eb076222dea7", "DetectTime": "2024-05-21T12:30:49.501257+00:00", "EventTime": "2024-05-21T12:30:49.501274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjT1juLImdQsPXVN2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "d0963388-c16e-4cd7-8405-c233493df55e", "DetectTime": "2024-05-21T12:30:49.512165+00:00", "EventTime": "2024-05-21T12:30:49.512183+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.67.185.152"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.67.185.152 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDU752V9pN5qg8qPa"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "f3ed3e33-ea45-434e-8b48-d39fb2cecbda", "DetectTime": "2024-05-21T12:30:49.524042+00:00", "EventTime": "2024-05-21T12:30:49.524061+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.67.185.152"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.67.185.152 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDU752V9pN5qg8qPa"], "accumulated_threat_level": 1.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "d9000c48-d51d-4110-b27b-f841086ec009", "DetectTime": "2024-05-21T12:30:49.528489+00:00", "EventTime": "2024-05-21T12:30:49.528507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHrc715g1fJOwv1o9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "721f5a1d-ca23-4f09-8598-b153d68215e7", "DetectTime": "2024-05-21T12:30:49.532719+00:00", "EventTime": "2024-05-21T12:30:49.532737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAXrPEkTAEgwGnBQh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "7f8e3d00-f0a3-45b5-bdab-9248be44a8e3", "DetectTime": "2024-05-21T12:30:49.543030+00:00", "EventTime": "2024-05-21T12:30:49.543048+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.21.61.195"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.21.61.195 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7TuCb8r6X1nBlZc"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "2fcf076e-53c4-4493-a6f8-5dad76050234", "DetectTime": "2024-05-21T12:30:49.553307+00:00", "EventTime": "2024-05-21T12:30:49.553325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.21.61.195"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.21.61.195 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU7TuCb8r6X1nBlZc"], "accumulated_threat_level": 2.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "9f890b92-ad3a-4cd6-9d28-5abf73398b12", "DetectTime": "2024-05-21T12:30:49.557948+00:00", "EventTime": "2024-05-21T12:30:49.557966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGAEp2Q5rPpaKlPhl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "3ef4d32c-4195-4bb4-a10b-78a1fec345db", "DetectTime": "2024-05-21T12:30:49.568641+00:00", "EventTime": "2024-05-21T12:30:49.568659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXxeRtJqmXtG1Puj"], "accumulated_threat_level": 4.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "381cc2c8-b4e0-45a1-b68b-f82ff40e83ad", "DetectTime": "2024-05-21T12:30:49.578930+00:00", "EventTime": "2024-05-21T12:30:49.578948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNrRYZn8RfdiQdfb"], "accumulated_threat_level": 5.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "fed9faa9-4cd5-4b11-8a53-3c207a56836d", "DetectTime": "2024-05-21T12:30:49.589572+00:00", "EventTime": "2024-05-21T12:30:49.589593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLwfT1I4P3mGnadT2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 59} +{"Format": "IDEA0", "ID": "7f1310a3-8ec6-47fb-be7f-8b0643a9e110", "DetectTime": "2024-05-21T12:30:49.600285+00:00", "EventTime": "2024-05-21T12:30:49.600305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6kWDG0GMg7tCN7l7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "4cdeb932-9e5a-48d7-9a1b-9a15e8a1f7d7", "DetectTime": "2024-05-21T12:30:49.610288+00:00", "EventTime": "2024-05-21T12:30:49.610306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "Connection to unknown destination port 8722/UDP destination IP 124.194.94.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLqEB2LmyoPnUgtIa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "f736c66c-24d6-49aa-a65d-3bfe55d2c7dc", "DetectTime": "2024-05-21T12:30:49.620442+00:00", "EventTime": "2024-05-21T12:30:49.620459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.137.28"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.137.28 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUvmcJK6Bg9eCi0b"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "327803e8-8bcc-44dc-8b4d-88c7ecca643e", "DetectTime": "2024-05-21T12:30:49.631477+00:00", "EventTime": "2024-05-21T12:30:49.631495+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.137.28"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.137.28 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUvmcJK6Bg9eCi0b"], "accumulated_threat_level": 2.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "2709bb85-9535-4d82-8df7-338d0f4ae633", "DetectTime": "2024-05-21T12:30:49.636741+00:00", "EventTime": "2024-05-21T12:30:49.636760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcWleUoXzpqhFmd1c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "e4837999-d16f-4b3d-be5f-1d7f551d2b0a", "DetectTime": "2024-05-21T12:30:49.641934+00:00", "EventTime": "2024-05-21T12:30:49.641953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFDef4BE4BDnk3V82"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "27aea721-e52c-491c-84bd-8f806c39f57d", "DetectTime": "2024-05-21T12:30:49.655900+00:00", "EventTime": "2024-05-21T12:30:49.655923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.54.105.83"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.54.105.83 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUpAJ15ervykYIOd"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "cf9d217a-aade-4098-910c-c3102beb7626", "DetectTime": "2024-05-21T12:30:49.668033+00:00", "EventTime": "2024-05-21T12:30:49.668053+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.54.105.83"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.54.105.83 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUpAJ15ervykYIOd"], "accumulated_threat_level": 3.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "f685471e-98df-45cf-a89e-d93b49799a58", "DetectTime": "2024-05-21T12:30:49.677767+00:00", "EventTime": "2024-05-21T12:30:49.677789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.50.112.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxRcXvImr5Es9PPAc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "3f3995ac-86f4-4c5d-8d24-5ab0bf1963dd", "DetectTime": "2024-05-21T12:30:49.689685+00:00", "EventTime": "2024-05-21T12:30:49.689704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCdhfY16t1Ko4sFGl8"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "9fe6e54b-5038-4a71-92b8-426e639cbaaa", "DetectTime": "2024-05-21T12:30:49.704088+00:00", "EventTime": "2024-05-21T12:30:49.704109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCdhfY16t1Ko4sFGl8"], "accumulated_threat_level": 3.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "1cbf4bee-904a-4930-9d40-757d94de3d39", "DetectTime": "2024-05-21T12:30:49.716586+00:00", "EventTime": "2024-05-21T12:30:49.716606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtmktB21nm9pfI19Xf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "b3f4fe33-0c70-4eac-9790-4d9263c98eb5", "DetectTime": "2024-05-21T12:30:49.749107+00:00", "EventTime": "2024-05-21T12:30:49.749127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPp5gQ2mYy3ZgtZgq9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "984facf9-2d20-4536-a08a-9442b8334b5c", "DetectTime": "2024-05-21T12:30:49.793233+00:00", "EventTime": "2024-05-21T12:30:49.793252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNs9FnGvM7Uaemvb9"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "6c0f7645-4e35-4151-ba7c-da230c62798b", "DetectTime": "2024-05-21T12:30:49.821150+00:00", "EventTime": "2024-05-21T12:30:49.821173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4BJCE7gnsbW9S0l"], "accumulated_threat_level": 10.4, "timewindow": 59} +{"Format": "IDEA0", "ID": "1b39143e-8629-45e3-91ee-46b959119586", "DetectTime": "2024-05-21T12:30:49.854772+00:00", "EventTime": "2024-05-21T12:30:49.854793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xhn62c3XR2JlWtZ3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 59} +{"Format": "IDEA0", "ID": "4f42865b-3dd6-4ce2-b6a9-bca896d6ca0d", "DetectTime": "2024-05-21T12:30:49.886433+00:00", "EventTime": "2024-05-21T12:30:49.886454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "Connection to unknown destination port 10000/UDP destination IP 118.174.83.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8WAx34ycTz8Ptib2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 59} +{"Format": "Json", "ID": "4f42865b-3dd6-4ce2-b6a9-bca896d6ca0d", "DetectTime": "2024-05-21T12:30:49.886433+00:00", "EventTime": "2024-05-21T12:30:49.886454+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.174.83.232"]}], "Attach": [{"Content": "1970-01-03T10:07:50.460761+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2024/05/21 12:30:50.035337)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 59, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f4d96f2e-5c31-4f6e-94cb-38c74fa1cae7", "DetectTime": "2024-05-21T12:30:50.046265+00:00", "EventTime": "2024-05-21T12:30:50.046282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1Jpk2V7JeesoWO1b"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "176d67a7-7649-4856-ba85-ecb6b3201e59", "DetectTime": "2024-05-21T12:30:50.057194+00:00", "EventTime": "2024-05-21T12:30:50.057212+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1Jpk2V7JeesoWO1b"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "70b15a92-3a61-4478-bb46-bc564c025c04", "DetectTime": "2024-05-21T12:30:50.111316+00:00", "EventTime": "2024-05-21T12:30:50.111344+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["90.49.56.170"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 90.49.56.170 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COt9Ur44FWf7oNAFjd"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "e67eb308-bbcd-430b-9897-433b636ce956", "DetectTime": "2024-05-21T12:30:50.126865+00:00", "EventTime": "2024-05-21T12:30:50.126894+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["90.49.56.170"]}], "Attach": [{"Content": "connection to blacklisted IP: 90.49.56.170 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COt9Ur44FWf7oNAFjd"], "accumulated_threat_level": 4.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "12061554-8e0b-4071-97c9-774d1a2924ef", "DetectTime": "2024-05-21T12:30:50.138957+00:00", "EventTime": "2024-05-21T12:30:50.138974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBGPoF6unD62WhQe"], "accumulated_threat_level": 0.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "72f1cf89-cc40-463c-9713-0f6078ffb962", "DetectTime": "2024-05-21T12:30:50.147799+00:00", "EventTime": "2024-05-21T12:30:50.147817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZjDLo2dwSWLZBNGtd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "38ccd1b5-ee84-4d48-b616-3f99484a4ac6", "DetectTime": "2024-05-21T12:30:50.174102+00:00", "EventTime": "2024-05-21T12:30:50.174126+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsF252yysjiOOPbBi"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "1cd3a88a-72a0-48f1-862d-376ea7bc8760", "DetectTime": "2024-05-21T12:30:50.187639+00:00", "EventTime": "2024-05-21T12:30:50.187657+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsF252yysjiOOPbBi"], "accumulated_threat_level": 5.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "bf4da691-df9e-4973-8462-f9fbb312e811", "DetectTime": "2024-05-21T12:30:50.288441+00:00", "EventTime": "2024-05-21T12:30:50.288459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.204.37.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ilUeVl1w9tzm255"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7d1bdcef-68ee-4c4f-a289-079e33179493", "DetectTime": "2024-05-21T12:30:50.301431+00:00", "EventTime": "2024-05-21T12:30:50.301449+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.204.37.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.204.37.238 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-204-37-238.bto-03-p66.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ilUeVl1w9tzm255"], "accumulated_threat_level": 5.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "c537a57d-d2da-4d52-bf91-0e7c9959e3e8", "DetectTime": "2024-05-21T12:30:50.314370+00:00", "EventTime": "2024-05-21T12:30:50.314391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYGUM3Fx63w6Pfl"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0d371e7b-d000-466f-95a3-878ba3f12d45", "DetectTime": "2024-05-21T12:30:50.327751+00:00", "EventTime": "2024-05-21T12:30:50.327772+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiYGUM3Fx63w6Pfl"], "accumulated_threat_level": 6.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "a0292a25-fdb0-46ec-9df2-042938e164f0", "DetectTime": "2024-05-21T12:30:50.419078+00:00", "EventTime": "2024-05-21T12:30:50.419097+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.6.55.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C23g4S1Z1lJcVNDht5"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "5015fff2-8628-43cd-98cc-920a335b2f8f", "DetectTime": "2024-05-21T12:30:50.430452+00:00", "EventTime": "2024-05-21T12:30:50.430470+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C23g4S1Z1lJcVNDht5"], "accumulated_threat_level": 6.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "37a47201-7e46-4521-bc3d-2ad2537994d6", "DetectTime": "2024-05-21T12:30:50.440088+00:00", "EventTime": "2024-05-21T12:30:50.440106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfaC8V2Vk5fPGW4DE1", "CTMcFk17fQ2fRnMPuf", "CeSQTLpV3H6hAW01f", "C9dP4B2GHHiZ98w5Hb"], "accumulated_threat_level": 1.3, "timewindow": 59} +{"Format": "IDEA0", "ID": "fe70e513-5167-49ac-a253-f8b148180fa8", "DetectTime": "2024-05-21T12:30:50.616279+00:00", "EventTime": "2024-05-21T12:30:50.616301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwkPRx6ZxhwyRsl3"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "4a163abb-9987-476e-8e3b-fda42f921030", "DetectTime": "2024-05-21T12:30:50.629853+00:00", "EventTime": "2024-05-21T12:30:50.629875+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwkPRx6ZxhwyRsl3"], "accumulated_threat_level": 7.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "dd5f8b03-0126-47b5-b695-42e02cce4282", "DetectTime": "2024-05-21T12:30:50.686399+00:00", "EventTime": "2024-05-21T12:30:50.686430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.60.50.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFlohc2yB89VAk2N95"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "6e6ed8f9-646b-42f1-ae1d-4e36f3333eaa", "DetectTime": "2024-05-21T12:30:50.976323+00:00", "EventTime": "2024-05-21T12:30:50.976340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMG4m11Bq4Pv2gi9eg"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "6b9aab56-546b-4a0b-82af-d429b6a2aa4d", "DetectTime": "2024-05-21T12:30:50.989042+00:00", "EventTime": "2024-05-21T12:30:50.989066+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMG4m11Bq4Pv2gi9eg"], "accumulated_threat_level": 7.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "7a2dec19-e80c-43f2-9c3b-9e26d86b4139", "DetectTime": "2024-05-21T12:30:51.002544+00:00", "EventTime": "2024-05-21T12:30:51.002566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.48.220.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwPvW2AYMikxHcRJh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c0d3ccc1-6a39-4b5c-9342-10a305b3aae4", "DetectTime": "2024-05-21T12:30:51.155433+00:00", "EventTime": "2024-05-21T12:30:51.155450+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUFAf2Uh2H2sdlul5"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "64083f06-8eaf-4c09-a364-44fec980b55c", "DetectTime": "2024-05-21T12:30:51.167684+00:00", "EventTime": "2024-05-21T12:30:51.167701+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUFAf2Uh2H2sdlul5"], "accumulated_threat_level": 8.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "5485b9e4-785a-4125-9243-ed771ad1bde5", "DetectTime": "2024-05-21T12:30:51.285361+00:00", "EventTime": "2024-05-21T12:30:51.285381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiNCk4c49JbxLWnrc"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "4c8eae4d-073c-479c-af6e-2c069b7b0553", "DetectTime": "2024-05-21T12:30:51.297813+00:00", "EventTime": "2024-05-21T12:30:51.297831+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiNCk4c49JbxLWnrc"], "accumulated_threat_level": 8.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "61345072-0305-4859-b383-ba3f20692cd5", "DetectTime": "2024-05-21T12:30:51.460289+00:00", "EventTime": "2024-05-21T12:30:51.460308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2T6Ny44M27IflUvm"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "408766b3-54b0-4220-9d59-5b84dfbccf98", "DetectTime": "2024-05-21T12:30:51.512509+00:00", "EventTime": "2024-05-21T12:30:51.512526+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.162.143.17"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.162.143.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcNjsRilwH95PIWh"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "018af5bf-1d64-47e3-9e75-f75beedc2726", "DetectTime": "2024-05-21T12:30:51.525732+00:00", "EventTime": "2024-05-21T12:30:51.525752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.162.143.17"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.162.143.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcNjsRilwH95PIWh"], "accumulated_threat_level": 9.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "e36506be-5d03-4b33-84ea-4abe84412c90", "DetectTime": "2024-05-21T12:30:51.828482+00:00", "EventTime": "2024-05-21T12:30:51.828504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.62.240.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Fs4T1PbhpBKg6kn1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "a89a8e91-8984-4119-a251-f6a3e2789324", "DetectTime": "2024-05-21T12:30:51.847145+00:00", "EventTime": "2024-05-21T12:30:51.847164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ1qpe4EVX79UKX47j", "C4N2wX4VzQMB0zYsi", "Chavoz35LeD1wVPKX", "CBfwYc4vhNcJMetco3"], "accumulated_threat_level": 1.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "3557358b-5638-4382-92d2-225b49afd08a", "DetectTime": "2024-05-21T12:30:51.856642+00:00", "EventTime": "2024-05-21T12:30:51.856666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.42.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch55wm39sKjaVtS8ii"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "975ba0cf-fa86-41f2-8d1b-7af0f9debcd2", "DetectTime": "2024-05-21T12:30:51.984901+00:00", "EventTime": "2024-05-21T12:30:51.984923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RaX61XpYHdXXxZK1"], "accumulated_threat_level": 2.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d22fab3d-7404-4285-ba26-564caac499e8", "DetectTime": "2024-05-21T12:30:52.015453+00:00", "EventTime": "2024-05-21T12:30:52.015474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXy2I024vspPXv6Ctl"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 59} +{"Format": "IDEA0", "ID": "f9c74ff0-f664-42a3-84b2-3f857665f694", "DetectTime": "2024-05-21T12:30:52.065606+00:00", "EventTime": "2024-05-21T12:30:52.065624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czv8gq4dv4ha9ifly5"], "accumulated_threat_level": 4.2, "timewindow": 59} +{"Format": "IDEA0", "ID": "396667ae-65f8-49f1-b3f5-bdd48f479ac3", "DetectTime": "2024-05-21T12:30:52.106840+00:00", "EventTime": "2024-05-21T12:30:52.106861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfyPaU1zCGILUwPcik"], "accumulated_threat_level": 5.0, "timewindow": 59} +{"Format": "IDEA0", "ID": "1657c3a9-3087-4b19-9f9b-ce280d66f4b1", "DetectTime": "2024-05-21T12:30:52.141056+00:00", "EventTime": "2024-05-21T12:30:52.141082+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU542D3DLfeQ8hrfKf"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "1bb03362-61fe-42ce-87a5-0d5570107007", "DetectTime": "2024-05-21T12:30:52.158885+00:00", "EventTime": "2024-05-21T12:30:52.158904+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU542D3DLfeQ8hrfKf"], "accumulated_threat_level": 9.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "bbd1ceb6-35d0-4ce4-bfa6-23800a1a3e54", "DetectTime": "2024-05-21T12:30:52.170235+00:00", "EventTime": "2024-05-21T12:30:52.170253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cea12uRudkIhHGeAh"], "accumulated_threat_level": 5.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "1d34c17b-b683-46b6-a60c-6da0bf9c4fbf", "DetectTime": "2024-05-21T12:30:52.197713+00:00", "EventTime": "2024-05-21T12:30:52.197736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C94XHZ2yWOTQgymzP8"], "accumulated_threat_level": 6.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8a9fe2b0-514a-42b3-a03e-52a5f10b4704", "DetectTime": "2024-05-21T12:30:52.251527+00:00", "EventTime": "2024-05-21T12:30:52.251549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckw18Y2Gvhxd8KPAoa"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 59} +{"Format": "IDEA0", "ID": "ee54b0d1-d893-4961-a718-6c57c19272a7", "DetectTime": "2024-05-21T12:30:52.296905+00:00", "EventTime": "2024-05-21T12:30:52.296927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C412Ax1IUhvu4bKVVf"], "accumulated_threat_level": 8.2, "timewindow": 59} +{"Format": "IDEA0", "ID": "61fcc801-3a12-4e7c-aace-14c149023dd7", "DetectTime": "2024-05-21T12:30:52.330140+00:00", "EventTime": "2024-05-21T12:30:52.330162+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.191.16.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.191.16.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEcqh33efA7cjqaqe"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "839cd864-5d67-41f6-88c2-5d4175a13ac2", "DetectTime": "2024-05-21T12:30:52.343989+00:00", "EventTime": "2024-05-21T12:30:52.344013+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.191.16.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.191.16.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEcqh33efA7cjqaqe"], "accumulated_threat_level": 10.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "66ca96fe-112a-4fbf-9dfd-633a74ce8251", "DetectTime": "2024-05-21T12:30:52.354915+00:00", "EventTime": "2024-05-21T12:30:52.354934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuEwq3AJh2ungcudb"], "accumulated_threat_level": 9.0, "timewindow": 59} +{"Format": "IDEA0", "ID": "73a8bf81-f78f-4b0d-bcea-d89f0c300ff5", "DetectTime": "2024-05-21T12:30:52.377595+00:00", "EventTime": "2024-05-21T12:30:52.377613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0HXHE1Wn7MwmojSac"], "accumulated_threat_level": 9.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "745811dc-53e4-422a-a00d-3ff512e8dad0", "DetectTime": "2024-05-21T12:30:52.402677+00:00", "EventTime": "2024-05-21T12:30:52.402695+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.204.79.47"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.204.79.47 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXceUu4jpk6CpA577g"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "00cd232c-cc66-4ccb-8b07-3a6d703b135d", "DetectTime": "2024-05-21T12:30:52.414433+00:00", "EventTime": "2024-05-21T12:30:52.414452+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.204.79.47"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.204.79.47 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXceUu4jpk6CpA577g"], "accumulated_threat_level": 10.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "be381b13-69e1-49c9-8c55-07e96ef69353", "DetectTime": "2024-05-21T12:30:52.425207+00:00", "EventTime": "2024-05-21T12:30:52.425226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrXSW01nUyS6wiJxA6"], "accumulated_threat_level": 10.600000000000001, "timewindow": 59} +{"Format": "IDEA0", "ID": "cc6d03b4-de77-4579-9ffd-a5141adc06ef", "DetectTime": "2024-05-21T12:30:52.468199+00:00", "EventTime": "2024-05-21T12:30:52.468220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvV2Lr2fm5JOwlDpBh"], "accumulated_threat_level": 11.400000000000002, "timewindow": 59} +{"Format": "IDEA0", "ID": "0a982ce1-1c64-4a2e-b574-efaebdab8421", "DetectTime": "2024-05-21T12:30:52.501577+00:00", "EventTime": "2024-05-21T12:30:52.501596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ROx215koZuTjk5Wl"], "accumulated_threat_level": 12.200000000000003, "timewindow": 59} +{"Format": "Json", "ID": "0a982ce1-1c64-4a2e-b574-efaebdab8421", "DetectTime": "2024-05-21T12:30:52.501577+00:00", "EventTime": "2024-05-21T12:30:52.501596+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "1970-01-03T10:38:59.658666+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 59. (real time 2024/05/21 12:30:52.780050)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 59, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "97db85e8-7f06-4c47-96d1-9f26eff2ba4d", "DetectTime": "2024-05-21T12:30:52.790946+00:00", "EventTime": "2024-05-21T12:30:52.790964+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["176.106.41.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 176.106.41.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45l4t47LShH34T4mi"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "b80fc259-39c0-4a34-a93a-627a967c3474", "DetectTime": "2024-05-21T12:30:52.803091+00:00", "EventTime": "2024-05-21T12:30:52.803112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["176.106.41.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 176.106.41.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45l4t47LShH34T4mi"], "accumulated_threat_level": 11.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "446b07ae-43a9-417b-bcb8-bd2c6f107533", "DetectTime": "2024-05-21T12:30:52.820384+00:00", "EventTime": "2024-05-21T12:30:52.820403+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.253.12"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5dUiw2DcFlTJk7GHc"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "28e26d48-475d-4a9d-8ea5-627ff6284363", "DetectTime": "2024-05-21T12:30:52.830806+00:00", "EventTime": "2024-05-21T12:30:52.830825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.253.12"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5dUiw2DcFlTJk7GHc"], "accumulated_threat_level": 11.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "8e8d0279-e13d-4987-a150-6de6e482eeab", "DetectTime": "2024-05-21T12:30:52.837511+00:00", "EventTime": "2024-05-21T12:30:52.837529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 42.119.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Zjqf2N5PDIqIxhr6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "4076ab9e-a49e-4380-8369-e62e9d330341", "DetectTime": "2024-05-21T12:30:52.873777+00:00", "EventTime": "2024-05-21T12:30:52.873798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.246.67.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeirE643q04swZX6Sa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "7bb8fdaf-b160-4978-812e-58128eb69e84", "DetectTime": "2024-05-21T12:30:52.897689+00:00", "EventTime": "2024-05-21T12:30:52.897708+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.65.55.186"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.65.55.186 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImq5y1JW9DgD0l7E5"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "93d05341-67d6-48c0-9d25-c004ff571a1f", "DetectTime": "2024-05-21T12:30:52.909801+00:00", "EventTime": "2024-05-21T12:30:52.909819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.65.55.186"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.65.55.186 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImq5y1JW9DgD0l7E5"], "accumulated_threat_level": 12.0, "timewindow": 19} +{"Format": "Json", "ID": "93d05341-67d6-48c0-9d25-c004ff571a1f", "DetectTime": "2024-05-21T12:30:52.909801+00:00", "EventTime": "2024-05-21T12:30:52.909819+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.65.55.186"]}], "Attach": [{"Content": "1970-01-01T18:36:16.119072+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:30:53.325514)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "01056f66-2316-4b50-8333-2dd0f0e5a22f", "DetectTime": "2024-05-21T12:30:53.336878+00:00", "EventTime": "2024-05-21T12:30:53.336899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvIfho2nPIkvsgraFg"], "accumulated_threat_level": 0.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "37bc910c-be82-494d-8350-be51eef7fa65", "DetectTime": "2024-05-21T12:30:53.347069+00:00", "EventTime": "2024-05-21T12:30:53.347087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccxub81bSwKEUYPXJl"], "accumulated_threat_level": 1.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "ab7362b7-e3a2-4c20-a255-cdd3555220ec", "DetectTime": "2024-05-21T12:30:53.363446+00:00", "EventTime": "2024-05-21T12:30:53.363467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrPHI33ewKfy97VIc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 59} +{"Format": "IDEA0", "ID": "e9c0313f-1bb1-4613-a66b-266d4dc3045c", "DetectTime": "2024-05-21T12:30:53.373717+00:00", "EventTime": "2024-05-21T12:30:53.373736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxuqe315vMGYyH9BIa"], "accumulated_threat_level": 3.2, "timewindow": 59} +{"Format": "IDEA0", "ID": "08bda562-bb57-4f9d-b1db-33f088dccf63", "DetectTime": "2024-05-21T12:30:53.384516+00:00", "EventTime": "2024-05-21T12:30:53.384535+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.186.13.109"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.186.13.109 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUqWj1Y3JI5q4UOU7"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "d0d2079a-01cd-4ac0-9fec-975d56d7e550", "DetectTime": "2024-05-21T12:30:53.397000+00:00", "EventTime": "2024-05-21T12:30:53.397023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.186.13.109"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.186.13.109 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUqWj1Y3JI5q4UOU7"], "accumulated_threat_level": 0.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "84b5ae2d-1ae6-49e3-9753-7757e72fbb4e", "DetectTime": "2024-05-21T12:30:53.409075+00:00", "EventTime": "2024-05-21T12:30:53.409093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4W5Vp5FgeE53hR4"], "accumulated_threat_level": 4.0, "timewindow": 59} +{"Format": "IDEA0", "ID": "95bd5ee7-cc56-46d6-8d4e-ccb6526b0367", "DetectTime": "2024-05-21T12:30:53.421293+00:00", "EventTime": "2024-05-21T12:30:53.421312+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwffk2rXc9Z5btksh"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0f6efb2a-124a-48f8-9a00-7df6c3d2faa6", "DetectTime": "2024-05-21T12:30:53.433898+00:00", "EventTime": "2024-05-21T12:30:53.433923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwffk2rXc9Z5btksh"], "accumulated_threat_level": 1.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "07f55e65-be70-487b-b9d0-5de93de2a690", "DetectTime": "2024-05-21T12:30:53.445747+00:00", "EventTime": "2024-05-21T12:30:53.445767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2Oep49r1Q9eNt9nc"], "accumulated_threat_level": 4.8, "timewindow": 59} +{"Format": "IDEA0", "ID": "f9dd8f1e-6120-4c31-a810-a4e01cde3370", "DetectTime": "2024-05-21T12:30:53.458483+00:00", "EventTime": "2024-05-21T12:30:53.458506+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["176.56.174.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 176.56.174.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JI6s2AQ9dFJ0fnZ9"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "01138b5f-254e-4f3a-b4da-7de829d4f269", "DetectTime": "2024-05-21T12:30:53.470899+00:00", "EventTime": "2024-05-21T12:30:53.470919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["176.56.174.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 176.56.174.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JI6s2AQ9dFJ0fnZ9"], "accumulated_threat_level": 1.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "fa56b04b-3b58-47ce-8d91-f3218933ecc1", "DetectTime": "2024-05-21T12:30:53.475786+00:00", "EventTime": "2024-05-21T12:30:53.475807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ92QATOXwb23b5ud"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "0c835cc4-0263-48fc-9996-d178f4165584", "DetectTime": "2024-05-21T12:30:53.486685+00:00", "EventTime": "2024-05-21T12:30:53.486705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8W8EP74dI8aEbVt"], "accumulated_threat_level": 5.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d6d04a28-dd4c-43a6-a919-e34e88c306e8", "DetectTime": "2024-05-21T12:30:53.491463+00:00", "EventTime": "2024-05-21T12:30:53.491481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1P6Yobz6JOSXhAYk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "3abe3b4c-4d89-47c0-b138-6690bf58c714", "DetectTime": "2024-05-21T12:30:53.505158+00:00", "EventTime": "2024-05-21T12:30:53.505179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["69.127.75.214"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.127.75.214 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXyX83YuKuCFzLeS"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "2316be54-5398-4ab3-b9b4-bfb58f004bc0", "DetectTime": "2024-05-21T12:30:53.518574+00:00", "EventTime": "2024-05-21T12:30:53.518594+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["69.127.75.214"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.127.75.214 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXyX83YuKuCFzLeS"], "accumulated_threat_level": 2.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "d533bf3c-9dba-452b-8c4d-c20cb90d9a94", "DetectTime": "2024-05-21T12:30:53.523307+00:00", "EventTime": "2024-05-21T12:30:53.523325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTTMe1AkS1I1FNLx7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "cc8bf621-6c71-49b4-9933-42d7940936c4", "DetectTime": "2024-05-21T12:30:53.533857+00:00", "EventTime": "2024-05-21T12:30:53.533876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGly04jvoJD7Pw104"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 59} +{"Format": "IDEA0", "ID": "b13daa81-6e77-4b0b-ab81-d4cfc862be6a", "DetectTime": "2024-05-21T12:30:53.545986+00:00", "EventTime": "2024-05-21T12:30:53.546003+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.33.151.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.33.151.168 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7N2o1o8hMp43NUlf"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "152a792e-0a20-4d7f-9505-967ea4ac7b2b", "DetectTime": "2024-05-21T12:30:53.559896+00:00", "EventTime": "2024-05-21T12:30:53.559920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.33.151.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.33.151.168 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7N2o1o8hMp43NUlf"], "accumulated_threat_level": 2.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "c4b94576-5a56-4e59-a516-6ef8f16b27d1", "DetectTime": "2024-05-21T12:30:53.565706+00:00", "EventTime": "2024-05-21T12:30:53.565729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Che4Zm2k9UWqpvF4p2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "4be1a20b-60a9-4a69-8e73-dc69fe753f77", "DetectTime": "2024-05-21T12:30:53.578414+00:00", "EventTime": "2024-05-21T12:30:53.578435+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.198.175.145"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.198.175.145 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYwui3THoYUM7CJfi"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "785689f5-0f29-4feb-a22e-482143a30a09", "DetectTime": "2024-05-21T12:30:53.591572+00:00", "EventTime": "2024-05-21T12:30:53.591592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.198.175.145"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.198.175.145 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYwui3THoYUM7CJfi"], "accumulated_threat_level": 3.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "e1554bb1-e991-45fd-9f57-3081cbe12001", "DetectTime": "2024-05-21T12:30:53.706710+00:00", "EventTime": "2024-05-21T12:30:53.706734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6WUu4YytezP8IYgd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "0ccf6791-3132-4023-8656-ced082cec517", "DetectTime": "2024-05-21T12:30:53.736868+00:00", "EventTime": "2024-05-21T12:30:53.736889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.210.98.167"]}], "Attach": [{"Content": "Connection to unknown destination port 17585/UDP destination IP 112.210.98.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jSbB1OBvIu0Wd2gj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "821d1496-6a12-474c-9a45-02e770a5a541", "DetectTime": "2024-05-21T12:30:53.763088+00:00", "EventTime": "2024-05-21T12:30:53.763108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3TLWp1KXDZBzaBQ6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "dac37f20-e294-4745-b972-916b5500e379", "DetectTime": "2024-05-21T12:30:53.793270+00:00", "EventTime": "2024-05-21T12:30:53.793290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["124.122.65.82"]}], "Attach": [{"Content": "Connection to unknown destination port 10637/UDP destination IP 124.122.65.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLiNX3JkiOmcCvMN1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "a180c8f3-77e0-4a5f-ba3b-48398f9b677a", "DetectTime": "2024-05-21T12:30:53.816529+00:00", "EventTime": "2024-05-21T12:30:53.816548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2AARxpQnOjwX3RIj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "d07559b1-4529-4afb-bf9d-ef58ab46cec5", "DetectTime": "2024-05-21T12:30:53.855942+00:00", "EventTime": "2024-05-21T12:30:53.855962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.238.124.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5225/UDP destination IP 173.238.124.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlHzD4DHpIj4FXNSa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 59} +{"Format": "IDEA0", "ID": "75684dbf-13ab-4bdb-abd6-6c8d2aded434", "DetectTime": "2024-05-21T12:30:53.880860+00:00", "EventTime": "2024-05-21T12:30:53.880879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0kghx1tEwqY1ERnMl"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "7636f69e-fce5-42c6-8f1f-42c37c1a3e4f", "DetectTime": "2024-05-21T12:30:53.959984+00:00", "EventTime": "2024-05-21T12:30:53.960004+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.121.4.95"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.121.4.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czz4lS1JLFpFUBMUS6"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "8c3197b5-2e7e-4b77-ad82-1e7803d6c608", "DetectTime": "2024-05-21T12:30:53.969728+00:00", "EventTime": "2024-05-21T12:30:53.969745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd1cU63jRYXu9PAzld"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "eb091b7b-5361-4292-b64e-3380f4b9b41a", "DetectTime": "2024-05-21T12:30:53.981650+00:00", "EventTime": "2024-05-21T12:30:53.981669+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.121.4.95"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.121.4.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czz4lS1JLFpFUBMUS6"], "accumulated_threat_level": 3.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "4bb5057e-1103-4bec-ab70-c975f62fe324", "DetectTime": "2024-05-21T12:30:54.073175+00:00", "EventTime": "2024-05-21T12:30:54.073194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.115.182.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.115.182.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ2rSszhv3uG5h3dk"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7f0c9de1-d46f-4898-8cd4-61612504f633", "DetectTime": "2024-05-21T12:30:54.085332+00:00", "EventTime": "2024-05-21T12:30:54.085351+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.115.182.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.115.182.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ2rSszhv3uG5h3dk"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "42f4e5b5-2be5-4670-95bc-4c18e4f7e00d", "DetectTime": "2024-05-21T12:30:54.131587+00:00", "EventTime": "2024-05-21T12:30:54.131607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvic94DN7m4yBPzUi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "8ddc9f1a-6f9a-4c28-8935-34b7e883171f", "DetectTime": "2024-05-21T12:30:54.246683+00:00", "EventTime": "2024-05-21T12:30:54.246704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CafoEn4dATscLk7Zeh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "aa6c77e8-f678-4022-97da-2e0649539142", "DetectTime": "2024-05-21T12:30:54.285916+00:00", "EventTime": "2024-05-21T12:30:54.285942+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.124.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.124.244 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ANgD318cUoCz7Cq7"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "c05cae42-c5aa-4ba5-b79e-f28d9f7f115e", "DetectTime": "2024-05-21T12:30:54.298803+00:00", "EventTime": "2024-05-21T12:30:54.298823+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.124.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.124.244 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ANgD318cUoCz7Cq7"], "accumulated_threat_level": 4.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "0023d88e-f2c3-4e15-8ed1-768dbbcbf9ca", "DetectTime": "2024-05-21T12:30:54.357747+00:00", "EventTime": "2024-05-21T12:30:54.357765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.58.204.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.58.204.34 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmaeT137bS4IYoj09"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "4cb6adf5-ac85-4cd3-8bb9-3c9ff00dd9d8", "DetectTime": "2024-05-21T12:30:54.364698+00:00", "EventTime": "2024-05-21T12:30:54.364718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEfsC2qzrQG21NXr8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "cf457e40-5051-4b62-9ca5-214b5e4345da", "DetectTime": "2024-05-21T12:30:54.376567+00:00", "EventTime": "2024-05-21T12:30:54.376584+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.58.204.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.58.204.34 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmaeT137bS4IYoj09"], "accumulated_threat_level": 5.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "490c6afb-7c1c-4063-99d9-5611488c69cb", "DetectTime": "2024-05-21T12:30:54.464305+00:00", "EventTime": "2024-05-21T12:30:54.464326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF3ib4EM2Dwerzmdf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "d38bce12-000a-47ad-9272-add0f6097a84", "DetectTime": "2024-05-21T12:30:54.568208+00:00", "EventTime": "2024-05-21T12:30:54.568230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgzTr4u677LBWmxag", "CQZkUO291vIhXn4wAk", "CCzdut4r0IFiIt6pji", "Cdx16m2a2eqFQh7BMd"], "accumulated_threat_level": 1.3, "timewindow": 60} +{"Format": "IDEA0", "ID": "7d9cc050-f884-4d09-9335-543ae6a6a34c", "DetectTime": "2024-05-21T12:30:54.612748+00:00", "EventTime": "2024-05-21T12:30:54.612766+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTpDAH88DVMeIENh"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "8bc8cdd3-fff6-4509-8e30-3e3b8ea6ea01", "DetectTime": "2024-05-21T12:30:54.624992+00:00", "EventTime": "2024-05-21T12:30:54.625012+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTpDAH88DVMeIENh"], "accumulated_threat_level": 5.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "9ed64480-7128-4d07-8f06-fbbbf86db1fd", "DetectTime": "2024-05-21T12:30:54.725963+00:00", "EventTime": "2024-05-21T12:30:54.725983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09EujFA0jTXAwSud"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "b235bf2b-9a02-4a16-bac1-58f26dff6228", "DetectTime": "2024-05-21T12:30:54.781260+00:00", "EventTime": "2024-05-21T12:30:54.781282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg41iQ12UZ5Ze1D8qa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "b77a11ab-5d83-4ef0-b4da-26a46d012990", "DetectTime": "2024-05-21T12:30:54.819087+00:00", "EventTime": "2024-05-21T12:30:54.819109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mh1qDA1uI7qo3i8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "dbf693d6-0235-4893-9cdf-f49405f30e6a", "DetectTime": "2024-05-21T12:30:54.874092+00:00", "EventTime": "2024-05-21T12:30:54.874113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQgZx3R3iYDMS5AL"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "583719cf-2dd3-47f3-8914-12398b81d522", "DetectTime": "2024-05-21T12:30:54.903440+00:00", "EventTime": "2024-05-21T12:30:54.903462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerVwHl7cB6j1viHa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "8d3c010f-976a-4a03-b671-79a453f945a8", "DetectTime": "2024-05-21T12:30:54.960362+00:00", "EventTime": "2024-05-21T12:30:54.960383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzpJ3kD6onvb8aQK5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c40e8e5e-0d7f-4202-a0b7-8df31dd21e1a", "DetectTime": "2024-05-21T12:30:54.984749+00:00", "EventTime": "2024-05-21T12:30:54.984773+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.81.199"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.81.199 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4yUK3SMCtK5MluE5"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "2ad6e76b-5cde-4909-94ab-f2831a6fff1c", "DetectTime": "2024-05-21T12:30:54.997166+00:00", "EventTime": "2024-05-21T12:30:54.997185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.81.199"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.81.199 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4yUK3SMCtK5MluE5"], "accumulated_threat_level": 6.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "e23ebdc4-81a8-43c7-9d5c-968acc9d2f33", "DetectTime": "2024-05-21T12:30:55.002177+00:00", "EventTime": "2024-05-21T12:30:55.002195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKUmA3ChjPcRFMG79"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "16cc036a-c5b9-472b-a7d9-57466a4c3775", "DetectTime": "2024-05-21T12:30:55.027645+00:00", "EventTime": "2024-05-21T12:30:55.027667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvWMrlbZ1QQU8bAg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "b944a7bc-81f3-4607-af64-ac788ea1f3a3", "DetectTime": "2024-05-21T12:30:55.059264+00:00", "EventTime": "2024-05-21T12:30:55.059285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6thLW1lwOzJPceHSh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "552d4e42-7aa8-4833-baf5-812a3cdc8b83", "DetectTime": "2024-05-21T12:30:55.087132+00:00", "EventTime": "2024-05-21T12:30:55.087152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8W2tf1aZdmCUFrcS3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "13f41c8d-bc3f-4d04-a177-25191b4c7e98", "DetectTime": "2024-05-21T12:30:55.149660+00:00", "EventTime": "2024-05-21T12:30:55.149677+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.41.37.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.41.37.148 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88lBg46D6jg0Fv09k"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "d5711ff0-f939-4367-8532-a4bfb4d7dd62", "DetectTime": "2024-05-21T12:30:55.162454+00:00", "EventTime": "2024-05-21T12:30:55.162478+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.41.37.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.41.37.148 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88lBg46D6jg0Fv09k"], "accumulated_threat_level": 6.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "af2cc730-3055-4252-a0fb-471ed0fc447a", "DetectTime": "2024-05-21T12:30:55.359267+00:00", "EventTime": "2024-05-21T12:30:55.359286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmuzmd47VFjVld5gt7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c89cf5cb-12ae-4966-b9bd-c6054998e274", "DetectTime": "2024-05-21T12:30:55.406942+00:00", "EventTime": "2024-05-21T12:30:55.406961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnAjx3tuIpz1z40Fj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "c726a980-5298-4f4e-ba6e-cbc7f4b6e3ca", "DetectTime": "2024-05-21T12:30:55.452194+00:00", "EventTime": "2024-05-21T12:30:55.452215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA07vx2zzSwZ0Ur5qc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "344fbff5-eff5-48d1-89ee-802da7421b88", "DetectTime": "2024-05-21T12:30:55.485968+00:00", "EventTime": "2024-05-21T12:30:55.485990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFFhFp7uEeyi5mBle"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "694bc772-f6ae-4ebd-87eb-679951d7d2c3", "DetectTime": "2024-05-21T12:30:55.639587+00:00", "EventTime": "2024-05-21T12:30:55.639606+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY911r31hHgO6tUaQk"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7479b55a-05ed-4e9b-93e3-bf137baec8ba", "DetectTime": "2024-05-21T12:30:55.651144+00:00", "EventTime": "2024-05-21T12:30:55.651173+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY911r31hHgO6tUaQk"], "accumulated_threat_level": 7.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "fbe12aa3-7237-49fa-b168-d3a64dbadc90", "DetectTime": "2024-05-21T12:30:55.780647+00:00", "EventTime": "2024-05-21T12:30:55.780671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jjyU3mUTj6Dm5vJe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "03850596-348d-4e70-84fb-f336b4748f71", "DetectTime": "2024-05-21T12:30:55.812370+00:00", "EventTime": "2024-05-21T12:30:55.812393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0S1531IESM89SRK9l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "54d0bd0a-14f2-48c3-91f6-1b250afb403a", "DetectTime": "2024-05-21T12:30:55.844934+00:00", "EventTime": "2024-05-21T12:30:55.844956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdqi8h2zvQhhvhxJPi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "a225e1e3-54a3-4afc-b1ad-c79b847c754a", "DetectTime": "2024-05-21T12:30:55.877967+00:00", "EventTime": "2024-05-21T12:30:55.877988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3lxlH3CSMFdK5qeU2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "83c7bd3d-f487-49db-9f77-82412bcc5ac7", "DetectTime": "2024-05-21T12:30:55.916094+00:00", "EventTime": "2024-05-21T12:30:55.916113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXgxu265MmxkovHB4"], "accumulated_threat_level": 2.1, "timewindow": 60} +{"Format": "IDEA0", "ID": "4827f924-4e91-4259-b383-a102485e0c3d", "DetectTime": "2024-05-21T12:30:55.931659+00:00", "EventTime": "2024-05-21T12:30:55.931681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTz1dpd8tLZUX6Q7h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "b60942a8-b5fe-41f7-aae9-922bcd3b3a21", "DetectTime": "2024-05-21T12:30:55.956053+00:00", "EventTime": "2024-05-21T12:30:55.956072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.106.113.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.106.113.244 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp0yTz2CxcRA78kru3"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "d72b9899-ede6-4388-a9d4-33484e6bc339", "DetectTime": "2024-05-21T12:30:55.968508+00:00", "EventTime": "2024-05-21T12:30:55.968527+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.106.113.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.106.113.244 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp0yTz2CxcRA78kru3"], "accumulated_threat_level": 7.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "c61eeb73-0cdf-4471-bce9-faa716ace46e", "DetectTime": "2024-05-21T12:30:55.973570+00:00", "EventTime": "2024-05-21T12:30:55.973587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwdX52HRJm60tZpkk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "5908823c-5c8c-48e9-8a11-7f61338aa2f9", "DetectTime": "2024-05-21T12:30:55.983857+00:00", "EventTime": "2024-05-21T12:30:55.983875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMeBmo10UamfkNoUTb"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "34c23e3c-a4be-4aa8-87b0-6c854b8b2f7c", "DetectTime": "2024-05-21T12:30:56.024375+00:00", "EventTime": "2024-05-21T12:30:56.024397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2tdRp6vuMUFmaTm2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "6a509a73-791c-4000-9bc0-12558e038d3e", "DetectTime": "2024-05-21T12:30:56.050846+00:00", "EventTime": "2024-05-21T12:30:56.050870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9w8Nc3sKrlXlVSOA9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "0dfc322a-39a0-47d0-a813-024a423d8010", "DetectTime": "2024-05-21T12:30:56.064957+00:00", "EventTime": "2024-05-21T12:30:56.064975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NDhU1ZPw6uV5MAk5"], "accumulated_threat_level": 3.7, "timewindow": 60} +{"Format": "IDEA0", "ID": "9ac769be-9721-42fe-b2b2-dc511270665e", "DetectTime": "2024-05-21T12:30:56.076859+00:00", "EventTime": "2024-05-21T12:30:56.076876+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.56.105.9"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.105.9 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrjHZKnqnHX8U0lo3"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "2bf045b1-3012-4273-be76-429c99deba79", "DetectTime": "2024-05-21T12:30:56.088534+00:00", "EventTime": "2024-05-21T12:30:56.088553+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.56.105.9"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.105.9 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrjHZKnqnHX8U0lo3"], "accumulated_threat_level": 8.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "84abe913-7538-48a2-8eec-716d15af0179", "DetectTime": "2024-05-21T12:30:56.109602+00:00", "EventTime": "2024-05-21T12:30:56.109624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI094W15LbFckuFuHe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "6c910397-2c68-4f3c-b37d-786b74319a93", "DetectTime": "2024-05-21T12:30:56.131315+00:00", "EventTime": "2024-05-21T12:30:56.131333+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.232.178.124"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.232.178.124 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sZ8n37HS7TeFOBG5"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7c04d00e-8736-4683-94e0-94738ce8f9d8", "DetectTime": "2024-05-21T12:30:56.143552+00:00", "EventTime": "2024-05-21T12:30:56.143575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.232.178.124"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.232.178.124 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sZ8n37HS7TeFOBG5"], "accumulated_threat_level": 8.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "e7baf1c9-ae3d-4db6-b79c-fafe72e2fd15", "DetectTime": "2024-05-21T12:30:56.149017+00:00", "EventTime": "2024-05-21T12:30:56.149038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXv8KC20VtHLQinYf5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 57} +{"Format": "IDEA0", "ID": "5422d52c-9e50-4aa5-aa53-32a45bcf634b", "DetectTime": "2024-05-21T12:30:56.162886+00:00", "EventTime": "2024-05-21T12:30:56.162908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnX10Be1CBABmVglj"], "accumulated_threat_level": 4.5, "timewindow": 60} +{"Format": "IDEA0", "ID": "62c1cc60-ebd1-4b87-bfae-4935b0bae0ba", "DetectTime": "2024-05-21T12:30:56.196477+00:00", "EventTime": "2024-05-21T12:30:56.196500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSuP14EkffxQIqNeh"], "accumulated_threat_level": 5.3, "timewindow": 60} +{"Format": "IDEA0", "ID": "19551727-416b-41a5-a1ee-dcacebd5420f", "DetectTime": "2024-05-21T12:30:56.242745+00:00", "EventTime": "2024-05-21T12:30:56.242782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtiYm14UBv2Kxdg01"], "accumulated_threat_level": 6.1, "timewindow": 60} +{"Format": "IDEA0", "ID": "df332405-3cb3-4762-8286-8b295410b467", "DetectTime": "2024-05-21T12:30:56.269269+00:00", "EventTime": "2024-05-21T12:30:56.269288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTaNn2GVMHbijC717"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 60} +{"Format": "IDEA0", "ID": "6145e1ae-e0a2-4757-ac87-64f2b5d2b0b9", "DetectTime": "2024-05-21T12:30:56.289494+00:00", "EventTime": "2024-05-21T12:30:56.289517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPvCXh9UcMI94h79"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "6d2b9a47-4be8-48a0-bdda-d70c1ace67af", "DetectTime": "2024-05-21T12:30:56.323250+00:00", "EventTime": "2024-05-21T12:30:56.323281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpa6Q61AF5T8MCTuyf"], "accumulated_threat_level": 7.699999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "13a9162f-c01f-41fd-bf93-470ff35e827f", "DetectTime": "2024-05-21T12:30:56.357898+00:00", "EventTime": "2024-05-21T12:30:56.357917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8TLwn2C756kWNuECf"], "accumulated_threat_level": 8.5, "timewindow": 60} +{"Format": "IDEA0", "ID": "a14a9734-72e2-451b-9bf8-b695cdf0441e", "DetectTime": "2024-05-21T12:30:56.392250+00:00", "EventTime": "2024-05-21T12:30:56.392268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmccVJ1FfdKOP32k3h"], "accumulated_threat_level": 9.3, "timewindow": 60} +{"Format": "IDEA0", "ID": "70ac75c9-c332-40e2-9109-6be2154951aa", "DetectTime": "2024-05-21T12:30:56.426026+00:00", "EventTime": "2024-05-21T12:30:56.426046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjfMWm3dYlDNEynmJf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 60} +{"Format": "IDEA0", "ID": "ae49f89b-d20a-4661-b9d2-3bb4fca15ad4", "DetectTime": "2024-05-21T12:30:56.461520+00:00", "EventTime": "2024-05-21T12:30:56.461539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8tWoJMbK2Ms2Ov7"], "accumulated_threat_level": 10.900000000000002, "timewindow": 60} +{"Format": "IDEA0", "ID": "fd863404-8bee-418e-8172-95a76e816949", "DetectTime": "2024-05-21T12:30:56.494108+00:00", "EventTime": "2024-05-21T12:30:56.494126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRQg52OPGaMMeBGV1"], "accumulated_threat_level": 11.700000000000003, "timewindow": 60} +{"Format": "IDEA0", "ID": "42a92b9c-1b5c-4ed3-b350-899066c228cb", "DetectTime": "2024-05-21T12:30:56.529226+00:00", "EventTime": "2024-05-21T12:30:56.529245+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.251.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.251.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8Kyb3hJN9r0Fhdia"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "fc2fa3a9-621d-482d-82f8-6121fa0d35a8", "DetectTime": "2024-05-21T12:30:56.540391+00:00", "EventTime": "2024-05-21T12:30:56.540409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TpE94Nzzva4roBsg"], "accumulated_threat_level": 12.500000000000004, "timewindow": 60} +{"Format": "Json", "ID": "fc2fa3a9-621d-482d-82f8-6121fa0d35a8", "DetectTime": "2024-05-21T12:30:56.540391+00:00", "EventTime": "2024-05-21T12:30:56.540409+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "1970-01-03T11:11:51.398330+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2024/05/21 12:30:56.743559)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 60, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "ad749578-ebf3-4218-b332-1e49c896c2f4", "DetectTime": "2024-05-21T12:30:56.757886+00:00", "EventTime": "2024-05-21T12:30:56.757908+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.251.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.251.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8Kyb3hJN9r0Fhdia"], "accumulated_threat_level": 9.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "45c22e9e-4e33-41c2-938d-76f17aa831c3", "DetectTime": "2024-05-21T12:30:56.774788+00:00", "EventTime": "2024-05-21T12:30:56.774807+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.133.20.125"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.133.20.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yYSI7mgI4R9hl8j"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "5a50d94a-91ab-4464-87ef-2c5fea413d87", "DetectTime": "2024-05-21T12:30:56.785750+00:00", "EventTime": "2024-05-21T12:30:56.785768+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.133.20.125"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.133.20.125 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yYSI7mgI4R9hl8j"], "accumulated_threat_level": 9.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "a0f976f7-5ca0-4bbe-b11c-17ffd7e0a528", "DetectTime": "2024-05-21T12:30:56.799884+00:00", "EventTime": "2024-05-21T12:30:56.799903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx9T6w4IvrWD9LPHz9"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "54245c50-dcfb-4cf7-ace1-fd684a038d52", "DetectTime": "2024-05-21T12:30:56.815695+00:00", "EventTime": "2024-05-21T12:30:56.815713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.11.143.89"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.11.143.89 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnd5qu3DB6U9MCQcq3"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "ae39e3ff-9b5a-41b5-b507-47dca2044619", "DetectTime": "2024-05-21T12:30:56.827881+00:00", "EventTime": "2024-05-21T12:30:56.827902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.11.143.89"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.11.143.89 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnd5qu3DB6U9MCQcq3"], "accumulated_threat_level": 10.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "1f008c67-3846-4d4b-aa14-fde9f45c258b", "DetectTime": "2024-05-21T12:30:56.838141+00:00", "EventTime": "2024-05-21T12:30:56.838159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZkIBM3rdGUuqZW64e"], "accumulated_threat_level": 1.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "cd533301-7f70-4b50-9a00-5c3ef3ac39b2", "DetectTime": "2024-05-21T12:30:56.849446+00:00", "EventTime": "2024-05-21T12:30:56.849468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXVz918T8dcI4FW4b", "C1nOlinDVoT8xTj2f", "CyKUP92IKr6sxSPCe5", "CPCQl3eNSCt7lJdh"], "accumulated_threat_level": 2.1, "timewindow": 60} +{"Format": "IDEA0", "ID": "c5915e22-1bcf-4ec5-8b66-914925dc8105", "DetectTime": "2024-05-21T12:30:56.984576+00:00", "EventTime": "2024-05-21T12:30:56.984598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chh7Oy2vnuNAmC7Dh5"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "aa3b45fb-93b1-4b76-90c7-978238324544", "DetectTime": "2024-05-21T12:30:57.017391+00:00", "EventTime": "2024-05-21T12:30:57.017410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBVEF15LXABfqUjZ6"], "accumulated_threat_level": 3.7, "timewindow": 60} +{"Format": "IDEA0", "ID": "868a83fd-2f42-4fac-9ab9-260a8f029d17", "DetectTime": "2024-05-21T12:30:57.063750+00:00", "EventTime": "2024-05-21T12:30:57.063772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.161.198.97"]}], "Attach": [{"Content": "Connection to unknown destination port 1042/UDP destination IP 118.161.198.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsSFVUxmvrqP61SN9"], "accumulated_threat_level": 4.5, "timewindow": 60} +{"Format": "IDEA0", "ID": "f73bae00-5479-432d-974f-7a8feb59a288", "DetectTime": "2024-05-21T12:30:57.097044+00:00", "EventTime": "2024-05-21T12:30:57.097062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRcOJ2jZ1PH0OFWdi"], "accumulated_threat_level": 5.3, "timewindow": 60} +{"Format": "IDEA0", "ID": "cd1120c6-c2ad-4f24-867a-b3b080ae69d6", "DetectTime": "2024-05-21T12:30:57.131033+00:00", "EventTime": "2024-05-21T12:30:57.131052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciivxh2Jt9qXWmNSDf"], "accumulated_threat_level": 6.1, "timewindow": 60} +{"Format": "IDEA0", "ID": "16cc7e46-01d6-4ec7-9e8c-da8cec1cc4b4", "DetectTime": "2024-05-21T12:30:57.161101+00:00", "EventTime": "2024-05-21T12:30:57.161118+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQjAQ1cbs6Rm0nAPc"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "d23ab98a-750d-4e2b-b936-764abf94a55b", "DetectTime": "2024-05-21T12:30:57.172559+00:00", "EventTime": "2024-05-21T12:30:57.172576+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQjAQ1cbs6Rm0nAPc"], "accumulated_threat_level": 10.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "0929a87d-687b-4c6c-a5e2-cd3b474742de", "DetectTime": "2024-05-21T12:30:57.227170+00:00", "EventTime": "2024-05-21T12:30:57.227187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6HcC49c55HCqaxO6"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "b831587d-d154-4c16-abee-f308225ee1fa", "DetectTime": "2024-05-21T12:30:57.238706+00:00", "EventTime": "2024-05-21T12:30:57.238724+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6HcC49c55HCqaxO6"], "accumulated_threat_level": 11.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "8996e431-b0f1-4d5f-80f4-215fe3ec563a", "DetectTime": "2024-05-21T12:30:57.390601+00:00", "EventTime": "2024-05-21T12:30:57.390622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.86.133.67"]}], "Attach": [{"Content": "Connection to unknown destination port 6612/UDP destination IP 2.86.133.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwCVsJ3pGgCNXWnwc9"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 60} +{"Format": "IDEA0", "ID": "e76d41e3-2443-418b-bb48-4a405965a09d", "DetectTime": "2024-05-21T12:30:57.476625+00:00", "EventTime": "2024-05-21T12:30:57.476644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrFSa32OmIbuyXCOl"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0492b583-4a07-4c44-95ac-c5dda41cad01", "DetectTime": "2024-05-21T12:30:57.482036+00:00", "EventTime": "2024-05-21T12:30:57.482055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.59.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWsGR3YSe0oMawZza"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "18fc1a1d-4e3a-4d37-a448-acefdbf9c172", "DetectTime": "2024-05-21T12:30:57.494106+00:00", "EventTime": "2024-05-21T12:30:57.494125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrFSa32OmIbuyXCOl"], "accumulated_threat_level": 11.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "6d317fde-c4fe-4540-901d-efd4982d8eb3", "DetectTime": "2024-05-21T12:30:57.504028+00:00", "EventTime": "2024-05-21T12:30:57.504049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.172.226.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpsRzr4TsQRx5y4hMk"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "35a7c22c-5ea8-4c50-89ed-53e9c07ad426", "DetectTime": "2024-05-21T12:30:57.534188+00:00", "EventTime": "2024-05-21T12:30:57.534211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.126.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD96dn1yVKVHHYp3jl"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "e4ff76f1-f452-41d3-aaa8-8ec9e77adbf6", "DetectTime": "2024-05-21T12:30:57.563839+00:00", "EventTime": "2024-05-21T12:30:57.563860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTlJBy2ie8TecjY7vb"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "af42e7ef-8c43-476c-be09-ae3d10c0efe6", "DetectTime": "2024-05-21T12:30:57.576026+00:00", "EventTime": "2024-05-21T12:30:57.576050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYTUVOTM92eIkGme"], "accumulated_threat_level": 7.699999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "573a7096-36bb-4db7-a847-f282e306ad9b", "DetectTime": "2024-05-21T12:30:57.590260+00:00", "EventTime": "2024-05-21T12:30:57.590277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXaSr2vlCyzfzU74k"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "ae869885-e88b-44cf-8a50-6d106b217a63", "DetectTime": "2024-05-21T12:30:57.602672+00:00", "EventTime": "2024-05-21T12:30:57.602696+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXaSr2vlCyzfzU74k"], "accumulated_threat_level": 12.0, "timewindow": 19} +{"Format": "Json", "ID": "ae869885-e88b-44cf-8a50-6d106b217a63", "DetectTime": "2024-05-21T12:30:57.602672+00:00", "EventTime": "2024-05-21T12:30:57.602696+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "1970-01-01T18:39:26.843948+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 19. (real time 2024/05/21 12:30:58.075412)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 19, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "960d12b3-a705-4a88-8e25-0511572b105d", "DetectTime": "2024-05-21T12:30:58.079614+00:00", "EventTime": "2024-05-21T12:30:58.079636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZzsZ1HvwhTWE2IHi"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "5656f053-97b1-4711-aeea-17f61eae6abf", "DetectTime": "2024-05-21T12:30:58.091552+00:00", "EventTime": "2024-05-21T12:30:58.091571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.57.242"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zbKu4QYYGHuaRww3"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0bee6e0b-8505-4651-b0af-a10477f268cf", "DetectTime": "2024-05-21T12:30:58.103065+00:00", "EventTime": "2024-05-21T12:30:58.103083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zbKu4QYYGHuaRww3"], "accumulated_threat_level": 0.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "a9acd080-4d26-4371-8dc6-528a2b0933de", "DetectTime": "2024-05-21T12:30:58.119796+00:00", "EventTime": "2024-05-21T12:30:58.119813+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["80.15.209.174"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 80.15.209.174 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Fbjwwsj85abY7Z6"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "b6187de6-38b8-45fd-8841-722748016906", "DetectTime": "2024-05-21T12:30:58.130818+00:00", "EventTime": "2024-05-21T12:30:58.130836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["80.15.209.174"]}], "Attach": [{"Content": "connection to blacklisted IP: 80.15.209.174 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Fbjwwsj85abY7Z6"], "accumulated_threat_level": 1.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "e400b15c-0552-4758-b083-66f83e3b8379", "DetectTime": "2024-05-21T12:30:58.137373+00:00", "EventTime": "2024-05-21T12:30:58.137392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD3lxrwG5wGptDQHa"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "079614b4-0454-4841-8735-9c95127a6040", "DetectTime": "2024-05-21T12:30:58.146813+00:00", "EventTime": "2024-05-21T12:30:58.146832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrvfI2v67UychoXbe"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "08c5b64b-aa0a-4d0f-8e63-4d72ea1bb7ac", "DetectTime": "2024-05-21T12:30:58.151403+00:00", "EventTime": "2024-05-21T12:30:58.151422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVKm02G1Ahykze3J5"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "b246f891-3db4-4d84-8497-f5117df9ed59", "DetectTime": "2024-05-21T12:30:58.163641+00:00", "EventTime": "2024-05-21T12:30:58.163661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Av1J24zLj5lTZbKe"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "90eba9e2-6e30-48aa-a0a2-2b407cdbb3a6", "DetectTime": "2024-05-21T12:30:58.168258+00:00", "EventTime": "2024-05-21T12:30:58.168275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ezSQ1oXjgIyHTnu2"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "c757c5fe-fc34-4475-b73f-5a10090935d0", "DetectTime": "2024-05-21T12:30:58.438528+00:00", "EventTime": "2024-05-21T12:30:58.438549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSniy35wo2OVEcwed"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "e85e536a-a566-464f-9056-8da1d26c18db", "DetectTime": "2024-05-21T12:30:58.498768+00:00", "EventTime": "2024-05-21T12:30:58.498789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFat4UjpVjGF4AE3h"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "f6e94034-4a66-48a9-be42-a26d7de868bf", "DetectTime": "2024-05-21T12:30:58.532364+00:00", "EventTime": "2024-05-21T12:30:58.532385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1fr919u01IwCCYh1"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "395cd7e9-af73-41e6-93d1-d7873b9fecf8", "DetectTime": "2024-05-21T12:30:58.569280+00:00", "EventTime": "2024-05-21T12:30:58.569302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF3aLjNhhOjDjGTd3"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "54a664ce-955f-490f-9548-b5b42b0194c2", "DetectTime": "2024-05-21T12:30:58.623844+00:00", "EventTime": "2024-05-21T12:30:58.623868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGnscV2mxdEjpqiRC6"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "0b6f02de-cbfd-4153-8d2a-ce02394fa690", "DetectTime": "2024-05-21T12:30:58.697842+00:00", "EventTime": "2024-05-21T12:30:58.697864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx89sq1KYu6kWZbe4c"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "f7a64af0-5c99-4d13-9066-8db7bdaf5e28", "DetectTime": "2024-05-21T12:30:58.793055+00:00", "EventTime": "2024-05-21T12:30:58.793071+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1HWP1c2Gjp8yqEMd"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "5f00e729-fe79-48fa-89a3-82e816699856", "DetectTime": "2024-05-21T12:30:58.804713+00:00", "EventTime": "2024-05-21T12:30:58.804732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1HWP1c2Gjp8yqEMd"], "accumulated_threat_level": 1.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "c27cc381-392a-472f-b879-2b3d43e6a906", "DetectTime": "2024-05-21T12:30:58.829746+00:00", "EventTime": "2024-05-21T12:30:58.829766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB65bef4hrKyiJ6uk", "CbGCkI2JzH8bs30Xej", "CDZDH12IcRKU2URx0f", "CZjRM3193jWi3CtTgg"], "accumulated_threat_level": 8.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "436df42a-16bb-4233-a3f3-5997e5b12c20", "DetectTime": "2024-05-21T12:30:59.081646+00:00", "EventTime": "2024-05-21T12:30:59.081667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWFKe35vC38BRNFef"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "c194baab-8347-4633-8f8f-c272230ef1c0", "DetectTime": "2024-05-21T12:30:59.129690+00:00", "EventTime": "2024-05-21T12:30:59.129709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.206.184.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.206.184.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkkh84ORbyAYxh743"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "8ce4b65b-91dc-4524-a07f-ce99ec577199", "DetectTime": "2024-05-21T12:30:59.142652+00:00", "EventTime": "2024-05-21T12:30:59.142672+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.206.184.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.206.184.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkkh84ORbyAYxh743"], "accumulated_threat_level": 2.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "e52b65b1-7581-4233-a53b-3838234dcc47", "DetectTime": "2024-05-21T12:30:59.247290+00:00", "EventTime": "2024-05-21T12:30:59.247310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTPJrrvsnzqJg5C3"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "4365bc05-7d41-4806-abb4-945f7a078920", "DetectTime": "2024-05-21T12:30:59.281681+00:00", "EventTime": "2024-05-21T12:30:59.281700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWr0vM1eiaHkiW5pbi"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "a1108d4c-c39a-4ab9-925e-e8c0374ec4c2", "DetectTime": "2024-05-21T12:30:59.310454+00:00", "EventTime": "2024-05-21T12:30:59.310477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2R5vTxXqfQE96S8"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "62a4424e-7802-4389-afe9-4352e3e01d56", "DetectTime": "2024-05-21T12:30:59.344873+00:00", "EventTime": "2024-05-21T12:30:59.344891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIQnSGyz76BM1sog"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "53164857-57bb-44ca-a6b3-02503020a43b", "DetectTime": "2024-05-21T12:30:59.401172+00:00", "EventTime": "2024-05-21T12:30:59.401192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzxM94St5NEZfXMV7"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "3afebcb5-69ea-4bdc-82ba-a2424c82a404", "DetectTime": "2024-05-21T12:30:59.464093+00:00", "EventTime": "2024-05-21T12:30:59.464114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qn6x4KKlgWROLQth"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "9b398de0-078a-4e57-a49b-03cb27966e43", "DetectTime": "2024-05-21T12:30:59.687502+00:00", "EventTime": "2024-05-21T12:30:59.687522+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.47.25.69"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.47.25.69 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IAm81lzOnhb0R4r7"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0a16165d-b65b-4733-b03c-8912a64d09ea", "DetectTime": "2024-05-21T12:30:59.702172+00:00", "EventTime": "2024-05-21T12:30:59.702197+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.47.25.69"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.47.25.69 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IAm81lzOnhb0R4r7"], "accumulated_threat_level": 2.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "c59114c8-c9e0-4baf-8a1c-0bd05c559c4e", "DetectTime": "2024-05-21T12:30:59.736523+00:00", "EventTime": "2024-05-21T12:30:59.736543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpiLvr1bNNfvr1bPUc"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "8d085af2-da21-4bd7-b448-aab65ed4464f", "DetectTime": "2024-05-21T12:30:59.741732+00:00", "EventTime": "2024-05-21T12:30:59.741752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvAY53UzdxtPrg7U1"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "a64545d4-8df6-42cf-8087-e336903e1581", "DetectTime": "2024-05-21T12:30:59.747192+00:00", "EventTime": "2024-05-21T12:30:59.747210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nsW32WsYdsgiVAR2"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "4220ad70-d6ca-4a83-8e43-d72036939e4d", "DetectTime": "2024-05-21T12:30:59.751745+00:00", "EventTime": "2024-05-21T12:30:59.751765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9xnd4dLrtR5Xnb35"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "c98097b1-9b54-453d-b492-8e987d359704", "DetectTime": "2024-05-21T12:30:59.757551+00:00", "EventTime": "2024-05-21T12:30:59.757573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCaM74xP1Vtycksle"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "12146376-c065-4fb5-b923-52ec7b49807d", "DetectTime": "2024-05-21T12:30:59.762381+00:00", "EventTime": "2024-05-21T12:30:59.762400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHODSZDsqBuVMSI5"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "53e9a5e5-b701-4d6d-9afe-8c1a011fcf7d", "DetectTime": "2024-05-21T12:30:59.773708+00:00", "EventTime": "2024-05-21T12:30:59.773726+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.89.93.133"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.89.93.133 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uupU1NNCCh0JvxX8"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "fceaa7bd-e9b9-4411-9dd3-2c094bd69866", "DetectTime": "2024-05-21T12:30:59.786264+00:00", "EventTime": "2024-05-21T12:30:59.786282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.89.93.133"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.89.93.133 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uupU1NNCCh0JvxX8"], "accumulated_threat_level": 3.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "82b56ada-d360-4bf2-a39c-3d171e867268", "DetectTime": "2024-05-21T12:30:59.893089+00:00", "EventTime": "2024-05-21T12:30:59.893109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM2LUZ2enwfGnUfLRi"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "256d17e0-4975-4b6c-a435-6195dfcb663a", "DetectTime": "2024-05-21T12:30:59.924090+00:00", "EventTime": "2024-05-21T12:30:59.924111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdBNb4KRXJWk9bgM5"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "fca197fd-c8e4-47b0-b27a-3ddc6d363ede", "DetectTime": "2024-05-21T12:30:59.968342+00:00", "EventTime": "2024-05-21T12:30:59.968361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.199.61.254"]}], "Attach": [{"Content": "Connection to unknown destination port 8239/UDP destination IP 107.199.61.254. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZTnv42mKL72a12tj3"], "accumulated_threat_level": 9.0, "timewindow": 60} +{"Format": "IDEA0", "ID": "d7db5749-2b1d-4f9c-861d-ce84052eab36", "DetectTime": "2024-05-21T12:30:59.991877+00:00", "EventTime": "2024-05-21T12:30:59.991896+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCClz42gAGECGPXzxd"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "cfd2b617-7eb6-4d18-9ca2-ee8819261a61", "DetectTime": "2024-05-21T12:30:59.996886+00:00", "EventTime": "2024-05-21T12:30:59.996904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Curofj1vyBlYCfwRqh"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "12f457a2-6a6a-4982-9c19-29d73f452e5e", "DetectTime": "2024-05-21T12:31:00.008522+00:00", "EventTime": "2024-05-21T12:31:00.008543+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCClz42gAGECGPXzxd"], "accumulated_threat_level": 3.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "575acef6-5e82-4de3-b738-52921f64b182", "DetectTime": "2024-05-21T12:31:00.022876+00:00", "EventTime": "2024-05-21T12:31:00.022896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrAa114lTvb3T6I8U4"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "528bd0fa-caa8-4455-82dc-085de35d3495", "DetectTime": "2024-05-21T12:31:00.035156+00:00", "EventTime": "2024-05-21T12:31:00.035178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "Connection to unknown destination port 25259/UDP destination IP 187.250.72.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRFZe4WTvSw1jg45l"], "accumulated_threat_level": 9.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "929d51e0-4775-456e-a291-7a051a11f9ad", "DetectTime": "2024-05-21T12:31:00.063049+00:00", "EventTime": "2024-05-21T12:31:00.063068+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.142.9.12"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.142.9.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxlYVS3XsnFyjMF2Gl"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "0a40535b-1154-4861-9c66-0f91e7137670", "DetectTime": "2024-05-21T12:31:00.076925+00:00", "EventTime": "2024-05-21T12:31:00.076946+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.142.9.12"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.142.9.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxlYVS3XsnFyjMF2Gl"], "accumulated_threat_level": 4.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "50d8c97c-609b-45a8-b6ec-5d19a1b75396", "DetectTime": "2024-05-21T12:31:00.081622+00:00", "EventTime": "2024-05-21T12:31:00.081639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CukiLn3usnaArOmW8f"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "3f0f76c9-00da-4f7f-b400-0319ad4af2bb", "DetectTime": "2024-05-21T12:31:00.102647+00:00", "EventTime": "2024-05-21T12:31:00.102668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co2gJO2qRX0M5hpHjk"], "accumulated_threat_level": 10.600000000000001, "timewindow": 60} +{"Format": "IDEA0", "ID": "f042e13f-fdb9-4903-be99-e54ff29c4a2e", "DetectTime": "2024-05-21T12:31:00.124258+00:00", "EventTime": "2024-05-21T12:31:00.124281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coldov3Wcv1CGWfKJk"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "b2079ece-d135-4801-8fe7-8c24bc50e2bd", "DetectTime": "2024-05-21T12:31:00.135698+00:00", "EventTime": "2024-05-21T12:31:00.135716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcbUS13ZrA74AIsm7"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "fa6d77ad-2791-434e-9af0-95e9b4e8b7f5", "DetectTime": "2024-05-21T12:31:00.150124+00:00", "EventTime": "2024-05-21T12:31:00.150144+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcbUS13ZrA74AIsm7"], "accumulated_threat_level": 4.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "23bb93b7-017c-4bf0-980f-e5991fb889fe", "DetectTime": "2024-05-21T12:31:00.162231+00:00", "EventTime": "2024-05-21T12:31:00.162249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "Connection to unknown destination port 3924/UDP destination IP 190.78.213.135. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefBvE1p6ZAF6hjteg"], "accumulated_threat_level": 11.400000000000002, "timewindow": 60} +{"Format": "IDEA0", "ID": "61da1347-b789-4437-b6e6-31556175d442", "DetectTime": "2024-05-21T12:31:00.167143+00:00", "EventTime": "2024-05-21T12:31:00.167161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39bx51DXAlORB6Weg"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "6eea1454-cd2d-413e-8f2d-48e72e0c88dd", "DetectTime": "2024-05-21T12:31:00.204288+00:00", "EventTime": "2024-05-21T12:31:00.204308+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6r7K3fsFmQbqsqN8"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "704b856d-70e7-4a60-b4fc-443bc197f789", "DetectTime": "2024-05-21T12:31:00.216578+00:00", "EventTime": "2024-05-21T12:31:00.216597+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6r7K3fsFmQbqsqN8"], "accumulated_threat_level": 5.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "6968d714-ab75-4e75-840a-b66a77b24bd0", "DetectTime": "2024-05-21T12:31:00.221090+00:00", "EventTime": "2024-05-21T12:31:00.221107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhU2V1cky3y743Qh9"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "2c7e11e1-92db-4363-b900-0a659994c03f", "DetectTime": "2024-05-21T12:31:00.248786+00:00", "EventTime": "2024-05-21T12:31:00.248805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "Connection to unknown destination port 6134/UDP destination IP 189.223.50.157. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBz7KXZ1DcZAh4M"], "accumulated_threat_level": 12.200000000000003, "timewindow": 60} +{"Format": "Json", "ID": "2c7e11e1-92db-4363-b900-0a659994c03f", "DetectTime": "2024-05-21T12:31:00.248786+00:00", "EventTime": "2024-05-21T12:31:00.248805+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.223.50.157"]}], "Attach": [{"Content": "1970-01-03T11:44:07.226318+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2024/05/21 12:31:00.509460)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 60, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "68144be6-c728-45f9-b881-5f16398ce985", "DetectTime": "2024-05-21T12:31:00.513365+00:00", "EventTime": "2024-05-21T12:31:00.513382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6tXk93ouJGHs1l1va"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "83c60c28-3925-4f7d-988a-bf438c7c18ca", "DetectTime": "2024-05-21T12:31:00.517807+00:00", "EventTime": "2024-05-21T12:31:00.517825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cepij31gqCwrCpIs24"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "56cd9d00-10eb-4440-a944-2eda563cca4c", "DetectTime": "2024-05-21T12:31:00.541489+00:00", "EventTime": "2024-05-21T12:31:00.541506+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["172.249.112.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.249.112.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFI2E61OrcD4oZhsug"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "ec500fb7-5af2-4653-8f79-dbae62f93df0", "DetectTime": "2024-05-21T12:31:00.571174+00:00", "EventTime": "2024-05-21T12:31:00.571202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["172.249.112.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.249.112.117 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFI2E61OrcD4oZhsug"], "accumulated_threat_level": 5.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "79aa77a4-0458-4ba4-9f0b-f3cc81a9c3e4", "DetectTime": "2024-05-21T12:31:00.576669+00:00", "EventTime": "2024-05-21T12:31:00.576687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck4FIX8PqvyaNIIRh"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "49eb3c91-08db-46c5-9764-cb939b4475cc", "DetectTime": "2024-05-21T12:31:00.589993+00:00", "EventTime": "2024-05-21T12:31:00.590015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoQbB2EZlVzxXhpae"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "d883f296-b43e-400c-b627-459afe6e5314", "DetectTime": "2024-05-21T12:31:00.601412+00:00", "EventTime": "2024-05-21T12:31:00.601430+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.224.10.194"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.224.10.194 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0tfB1W6FZJIlZitc"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "b6c8b301-fc65-4922-be92-e2f96cffc317", "DetectTime": "2024-05-21T12:31:00.613085+00:00", "EventTime": "2024-05-21T12:31:00.613104+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.224.10.194"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.224.10.194 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0tfB1W6FZJIlZitc"], "accumulated_threat_level": 6.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7cd929a4-17ea-41da-9181-4713fc55fae4", "DetectTime": "2024-05-21T12:31:00.623518+00:00", "EventTime": "2024-05-21T12:31:00.623535+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.161.47"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.161.47 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLDuh2NkVnl2hUOgh"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "fbf406cd-a82a-4e2b-b638-ce23acdffe9c", "DetectTime": "2024-05-21T12:31:00.635188+00:00", "EventTime": "2024-05-21T12:31:00.635207+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.161.47"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.161.47 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLDuh2NkVnl2hUOgh"], "accumulated_threat_level": 6.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "7bfafb70-39b7-435d-9109-439ab8e60875", "DetectTime": "2024-05-21T12:31:00.640704+00:00", "EventTime": "2024-05-21T12:31:00.640724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbmOt2b56o2UFKF7c"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "1dfc9b2c-6d6a-4826-889d-6fbefa4de713", "DetectTime": "2024-05-21T12:31:00.645425+00:00", "EventTime": "2024-05-21T12:31:00.645445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHtYP23B8Dm0Gzql6c"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "ffe5612e-4a4f-4c87-a056-56525548f3ae", "DetectTime": "2024-05-21T12:31:00.650183+00:00", "EventTime": "2024-05-21T12:31:00.650202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0kIYZ14Mu3J4EkgGf"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "cf360c9a-ea3d-4b82-9057-da19c84e2314", "DetectTime": "2024-05-21T12:31:00.662185+00:00", "EventTime": "2024-05-21T12:31:00.662203+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["70.78.76.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.78.76.87 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPVveeRXx28k0lHd"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "df5c711a-2d55-452e-a0a5-0b25b2c28a35", "DetectTime": "2024-05-21T12:31:00.674880+00:00", "EventTime": "2024-05-21T12:31:00.674899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["70.78.76.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 70.78.76.87 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPVveeRXx28k0lHd"], "accumulated_threat_level": 7.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "613b4a7e-e5f2-431f-a456-4aee9d26920c", "DetectTime": "2024-05-21T12:31:00.679281+00:00", "EventTime": "2024-05-21T12:31:00.679298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mlsL3OsRyNXqWnxh"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "ce2b13d9-dfc7-43d8-a65d-3a2f70696831", "DetectTime": "2024-05-21T12:31:00.683642+00:00", "EventTime": "2024-05-21T12:31:00.683660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN95fG3iOhuONlzo81"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "57fb27d4-49fa-42c6-85a5-cf326fe7cfda", "DetectTime": "2024-05-21T12:31:00.713063+00:00", "EventTime": "2024-05-21T12:31:00.713083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.104.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.104.33 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY1cCM1QKJcKwANHUi"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "228cc011-7407-4f35-80b0-98f761b22f3e", "DetectTime": "2024-05-21T12:31:00.727313+00:00", "EventTime": "2024-05-21T12:31:00.727331+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.104.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.104.33 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY1cCM1QKJcKwANHUi"], "accumulated_threat_level": 7.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "9685f7a1-b3fd-4de2-93d5-85b40b02bd35", "DetectTime": "2024-05-21T12:31:00.731983+00:00", "EventTime": "2024-05-21T12:31:00.732000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9wp5P2B5DzmoIxe82"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "af7d8abc-d83b-4a49-8d71-e4b13131b47f", "DetectTime": "2024-05-21T12:31:00.746277+00:00", "EventTime": "2024-05-21T12:31:00.746294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVTLhKBpcDo7Ajb3"], "accumulated_threat_level": 1.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "74b68d90-965e-4a1f-a40b-2eb31278cdbf", "DetectTime": "2024-05-21T12:31:00.809577+00:00", "EventTime": "2024-05-21T12:31:00.809596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7ihE3xqDBOlbgFFl"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "394fd205-9d94-435d-b83b-b7abae9f96a5", "DetectTime": "2024-05-21T12:31:00.832748+00:00", "EventTime": "2024-05-21T12:31:00.832769+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.149.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.149.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsfSX2XaQeardrbic"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "651e3338-837e-4c44-9d13-a7bf39ec1f93", "DetectTime": "2024-05-21T12:31:00.846082+00:00", "EventTime": "2024-05-21T12:31:00.846102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.149.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.149.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsfSX2XaQeardrbic"], "accumulated_threat_level": 8.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "7021951e-c764-4671-b3e1-e4be284c9e72", "DetectTime": "2024-05-21T12:31:00.851699+00:00", "EventTime": "2024-05-21T12:31:00.851718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfOhkG1ggwZOCWq7e9"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "cccae53a-1ca5-43b4-9fac-87a772109461", "DetectTime": "2024-05-21T12:31:00.856397+00:00", "EventTime": "2024-05-21T12:31:00.856416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdezp811NlPUmysosl"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "f578447a-b384-4388-8e01-35689b2ff5ad", "DetectTime": "2024-05-21T12:31:00.860878+00:00", "EventTime": "2024-05-21T12:31:00.860897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9lUZGODUNMzVgV07"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "a629bd62-58b7-45cd-a050-d85bf82dbe73", "DetectTime": "2024-05-21T12:31:00.873495+00:00", "EventTime": "2024-05-21T12:31:00.873517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3I4QA14HlNcEs7P7c"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "72513d9c-1221-4325-ab16-d6da96bd6555", "DetectTime": "2024-05-21T12:31:00.946903+00:00", "EventTime": "2024-05-21T12:31:00.946921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "Connection to unknown destination port 2516/UDP destination IP 71.63.188.231. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8CubS3h9qhvtJb7V6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "90b3f3d1-9aab-4b78-8dd5-68d7d0fe5cb6", "DetectTime": "2024-05-21T12:31:00.973946+00:00", "EventTime": "2024-05-21T12:31:00.973967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4t4T2Cx2RJBNbBTe"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "412f48a8-4701-438c-aa48-70a5be44df89", "DetectTime": "2024-05-21T12:31:01.003830+00:00", "EventTime": "2024-05-21T12:31:01.003849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.9.226.247"]}], "Attach": [{"Content": "Connection to unknown destination port 24104/UDP destination IP 95.9.226.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQO80N3yFYQI2KzGU8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "7529ebc9-2c97-40ae-99b8-59f442c97386", "DetectTime": "2024-05-21T12:31:01.030158+00:00", "EventTime": "2024-05-21T12:31:01.030180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6IUF48TRlzsgxjv8"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "b4b755b7-66f0-40ab-b56c-6f805c13741e", "DetectTime": "2024-05-21T12:31:01.059446+00:00", "EventTime": "2024-05-21T12:31:01.059468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qEwh148rdtGhQQf8"], "accumulated_threat_level": 4.0, "timewindow": 60} +{"Format": "IDEA0", "ID": "561f7979-ee7d-42c2-a522-465fa4f35ca7", "DetectTime": "2024-05-21T12:31:01.083052+00:00", "EventTime": "2024-05-21T12:31:01.083073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CplMbY5QbNBuSq4Ll"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "b357b165-4a96-4b08-b4f8-3eb1382fa32a", "DetectTime": "2024-05-21T12:31:01.113356+00:00", "EventTime": "2024-05-21T12:31:01.113378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.92.180.233"]}], "Attach": [{"Content": "Connection to unknown destination port 16365/UDP destination IP 193.92.180.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCeQ9l3wdCrHx3jUX5"], "accumulated_threat_level": 4.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "c919b290-4445-4d35-b7c7-dea4cd5be3a2", "DetectTime": "2024-05-21T12:31:01.136626+00:00", "EventTime": "2024-05-21T12:31:01.136647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5rAXX2BX0TCYANN8j"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "20f9863a-6eaf-4fca-8fd2-e7822af4f2f0", "DetectTime": "2024-05-21T12:31:01.170150+00:00", "EventTime": "2024-05-21T12:31:01.170169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "Connection to unknown destination port 4329/UDP destination IP 86.149.223.80. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWo8PI3NUpXpx82Ny"], "accumulated_threat_level": 5.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "edaa85ac-ef5a-437d-a3d2-4a6387c57a6f", "DetectTime": "2024-05-21T12:31:01.182290+00:00", "EventTime": "2024-05-21T12:31:01.182309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVPaI2P5Z6EgXCVj2"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "14fff722-ca05-4b3d-a1ff-480dd002106e", "DetectTime": "2024-05-21T12:31:01.225506+00:00", "EventTime": "2024-05-21T12:31:01.225527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.177.116.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8435/UDP destination IP 99.177.116.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcTkn3TZql0gAnyP5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 60} +{"Format": "IDEA0", "ID": "86fd8b74-e7ee-4613-812f-4e90682efad9", "DetectTime": "2024-05-21T12:31:01.251587+00:00", "EventTime": "2024-05-21T12:31:01.251608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQL8oZ2KhZO6ZcGIY2"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "c0a85734-48c8-4cca-bf67-7a9733a353a4", "DetectTime": "2024-05-21T12:31:01.281407+00:00", "EventTime": "2024-05-21T12:31:01.281429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdvZK2BWRdKCc1kY"], "accumulated_threat_level": 7.199999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "712790da-4f55-4617-9f51-a4288f0386d5", "DetectTime": "2024-05-21T12:31:01.317180+00:00", "EventTime": "2024-05-21T12:31:01.317198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWdXBL1M5mlaFMzHo7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "d13ad18b-583a-4086-8840-2a0655b342b7", "DetectTime": "2024-05-21T12:31:01.556212+00:00", "EventTime": "2024-05-21T12:31:01.556232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwpFn612GpGmc7wWKf"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "bceeac67-eab9-4bcf-822e-52ab4993191a", "DetectTime": "2024-05-21T12:31:01.560991+00:00", "EventTime": "2024-05-21T12:31:01.561010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ODqd1rjG0WOj9SM3"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "3891992a-f268-47d3-afc3-6c04097352fa", "DetectTime": "2024-05-21T12:31:01.610350+00:00", "EventTime": "2024-05-21T12:31:01.610367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.238.101.170"]}], "Attach": [{"Content": "Connection to unknown destination port 3001/UDP destination IP 108.238.101.170. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvXTB1gpEOdc8ZHR2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "c11c400c-8ffd-4c77-b947-1817f262517f", "DetectTime": "2024-05-21T12:31:01.639647+00:00", "EventTime": "2024-05-21T12:31:01.639666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.185.202.38"]}], "Attach": [{"Content": "Connection to unknown destination port 15730/UDP destination IP 46.185.202.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1yxp2nwO1JZbnkd2"], "accumulated_threat_level": 9.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "9c16f808-5d7c-46ef-aae9-68b48681c1c5", "DetectTime": "2024-05-21T12:31:01.673059+00:00", "EventTime": "2024-05-21T12:31:01.673079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "Connection to unknown destination port 7651/UDP destination IP 46.36.128.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqVLGZMBggocHJ75"], "accumulated_threat_level": 10.4, "timewindow": 60} +{"Format": "IDEA0", "ID": "5e6526b7-fb7f-4729-ad7a-92bdddd3f926", "DetectTime": "2024-05-21T12:31:01.708601+00:00", "EventTime": "2024-05-21T12:31:01.708620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.152.26"]}], "Attach": [{"Content": "Connection to unknown destination port 11337/UDP destination IP 187.233.152.26. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqnKM2c4hcej4k06"], "accumulated_threat_level": 11.200000000000001, "timewindow": 60} +{"Format": "IDEA0", "ID": "94a388c9-174f-4a23-85fb-fd8331041d17", "DetectTime": "2024-05-21T12:31:01.742810+00:00", "EventTime": "2024-05-21T12:31:01.742830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "Connection to unknown destination port 9109/UDP destination IP 186.55.74.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gKk63VJFHBhkknod"], "accumulated_threat_level": 12.000000000000002, "timewindow": 60} +{"Format": "Json", "ID": "94a388c9-174f-4a23-85fb-fd8331041d17", "DetectTime": "2024-05-21T12:31:01.742810+00:00", "EventTime": "2024-05-21T12:31:01.742830+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.55.74.216"]}], "Attach": [{"Content": "1970-01-03T11:44:26.473589+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2024/05/21 12:31:01.921370)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 60, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a88503ac-a8b8-4b0a-866f-2cca32a77746", "DetectTime": "2024-05-21T12:31:01.931983+00:00", "EventTime": "2024-05-21T12:31:01.932003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxblG52KInIupjmf8h"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "0e4618d3-9653-4852-8ca5-b800c32c0eb9", "DetectTime": "2024-05-21T12:31:01.936983+00:00", "EventTime": "2024-05-21T12:31:01.937000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CroCroYWvt396TSd1"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "7e1e79b6-8fd2-46b5-9922-d80664b802a1", "DetectTime": "2024-05-21T12:31:01.949397+00:00", "EventTime": "2024-05-21T12:31:01.949419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIxbdNzR6Q0at8xi9"], "accumulated_threat_level": 1.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "6f0de5a0-64f6-4baa-a950-dbaac7971416", "DetectTime": "2024-05-21T12:31:01.954330+00:00", "EventTime": "2024-05-21T12:31:01.954348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcmno48KGtDLwi6Mk"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "bcf7e71c-794b-416e-95f8-62d9b16bfdd0", "DetectTime": "2024-05-21T12:31:01.959181+00:00", "EventTime": "2024-05-21T12:31:01.959198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpW5pa4R4CeddBdKBe"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "d06f72e7-de1f-4a9e-98ee-02bcbd03a1dd", "DetectTime": "2024-05-21T12:31:01.969286+00:00", "EventTime": "2024-05-21T12:31:01.969304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDnu4n19Ae6wfRqFv"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "a2b9becc-91c9-44a9-b1f2-8779fbcf4918", "DetectTime": "2024-05-21T12:31:01.973987+00:00", "EventTime": "2024-05-21T12:31:01.974005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUKQy2bYfOhaXL8id"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "1e312d1a-b0f8-41a1-8f19-af9f0f446502", "DetectTime": "2024-05-21T12:31:02.002007+00:00", "EventTime": "2024-05-21T12:31:02.002027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQVkg3J8S03TubmF6"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "63ca1661-0771-401b-a1f2-acac83c50eec", "DetectTime": "2024-05-21T12:31:02.013576+00:00", "EventTime": "2024-05-21T12:31:02.013596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqkSJv4EcMGYgUaupc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a7df160d-e5fb-4c73-8749-b8f0820ac64e", "DetectTime": "2024-05-21T12:31:02.050735+00:00", "EventTime": "2024-05-21T12:31:02.050756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vtVa3Cer2XasKrT4"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "7ae386d9-8777-43ad-bf96-07a8b7956c18", "DetectTime": "2024-05-21T12:31:02.093134+00:00", "EventTime": "2024-05-21T12:31:02.093153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SwFC4jP9ifFTfWD1"], "accumulated_threat_level": 4.0, "timewindow": 60} +{"Format": "IDEA0", "ID": "c8dfbb65-4fb9-486a-878d-345ee054114e", "DetectTime": "2024-05-21T12:31:02.114042+00:00", "EventTime": "2024-05-21T12:31:02.114060+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.155.171.95"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.155.171.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNt5Hs4XdVDBm8aC8"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "70ebda12-35df-4f98-9745-64c74103ead1", "DetectTime": "2024-05-21T12:31:02.127266+00:00", "EventTime": "2024-05-21T12:31:02.127284+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.155.171.95"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.155.171.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNt5Hs4XdVDBm8aC8"], "accumulated_threat_level": 8.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "aff5bc15-9544-467d-8248-927deafb3bcb", "DetectTime": "2024-05-21T12:31:02.137703+00:00", "EventTime": "2024-05-21T12:31:02.137721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C52ho543oUjMVP6zTg"], "accumulated_threat_level": 4.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "79a8cdbe-7966-4d45-9980-29513f386746", "DetectTime": "2024-05-21T12:31:02.160345+00:00", "EventTime": "2024-05-21T12:31:02.160364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiCVz3ORu7ZrVHIn4"], "accumulated_threat_level": 5.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "1d5ea838-0eb9-4e4b-a145-13b6a3f20bb5", "DetectTime": "2024-05-21T12:31:02.191386+00:00", "EventTime": "2024-05-21T12:31:02.191403+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["173.72.218.171"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 173.72.218.171 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysG8bYFl26q2QKv7"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "8b1c422b-e52c-4372-bc1a-0a11923ad923", "DetectTime": "2024-05-21T12:31:02.212170+00:00", "EventTime": "2024-05-21T12:31:02.212188+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["173.72.218.171"]}], "Attach": [{"Content": "connection to blacklisted IP: 173.72.218.171 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysG8bYFl26q2QKv7"], "accumulated_threat_level": 9.0, "timewindow": 19} +{"Format": "IDEA0", "ID": "acccc291-b55b-47b8-94c0-cb4b4ea1de05", "DetectTime": "2024-05-21T12:31:02.223731+00:00", "EventTime": "2024-05-21T12:31:02.223761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wPyU3dY0rcCGlEra"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 60} +{"Format": "IDEA0", "ID": "474ebf02-1a2f-4681-8be6-af521ed9cbfb", "DetectTime": "2024-05-21T12:31:02.252628+00:00", "EventTime": "2024-05-21T12:31:02.252647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.20.226.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.20.226.85 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDWpECpbDxNAWPDj"], "accumulated_threat_level": 0, "timewindow": 19} +{"Format": "IDEA0", "ID": "13f655b2-402c-4c93-963c-22a3061df666", "DetectTime": "2024-05-21T12:31:02.265722+00:00", "EventTime": "2024-05-21T12:31:02.265741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.20.226.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.20.226.85 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDWpECpbDxNAWPDj"], "accumulated_threat_level": 9.5, "timewindow": 19} +{"Format": "IDEA0", "ID": "c72711fc-86a5-47b1-81e4-c1604a3866bb", "DetectTime": "2024-05-21T12:31:02.461367+00:00", "EventTime": "2024-05-21T12:31:02.461389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhEQNfI1B2CF5cz3"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "69d937cd-e00d-4f0e-a471-aa593749aaea", "DetectTime": "2024-05-21T12:31:02.466476+00:00", "EventTime": "2024-05-21T12:31:02.466496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGuCh4OAsSPi4n6Rd"], "accumulated_threat_level": 3.2, "timewindow": 58} +{"Format": "IDEA0", "ID": "4a7d75b5-1b63-4fe3-a674-1e7bf0c2c302", "DetectTime": "2024-05-21T12:31:02.512624+00:00", "EventTime": "2024-05-21T12:31:02.512645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUYo34Ce4st78J3u7"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "9f989392-e772-44b0-9682-d463edea94cc", "DetectTime": "2024-05-21T12:31:02.543749+00:00", "EventTime": "2024-05-21T12:31:02.543770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjrejMZ4p1OAVTtgj"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "268a3bba-ce88-4873-8263-de844526fca6", "DetectTime": "2024-05-21T12:31:02.574179+00:00", "EventTime": "2024-05-21T12:31:02.574200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFn8Z2HoJEq8PTgdd"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "43217ef0-c959-48c8-b3e5-9ed3ebec2683", "DetectTime": "2024-05-21T12:31:02.607249+00:00", "EventTime": "2024-05-21T12:31:02.607270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZqPKG5kE3qYSnft9"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "1a2a6d02-4381-441a-98ac-4a767b5bf4d0", "DetectTime": "2024-05-21T12:31:02.664421+00:00", "EventTime": "2024-05-21T12:31:02.664440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8KO711C2QDps2lfQ2"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "5b550c1b-46f7-45ae-a50a-4b6e2bc827ea", "DetectTime": "2024-05-21T12:31:02.709749+00:00", "EventTime": "2024-05-21T12:31:02.709768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzI3f1iXaGukDvqo4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "c1feceef-98b8-4fde-a9a1-61dc3c4e2f50", "DetectTime": "2024-05-21T12:31:02.755965+00:00", "EventTime": "2024-05-21T12:31:02.755984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4puG23ta8V5KCEHXl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "33625481-d4fb-4224-a736-a5416242fd51", "DetectTime": "2024-05-21T12:31:02.791785+00:00", "EventTime": "2024-05-21T12:31:02.791802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmuoD37TcEZQYZMN9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "2cbcf3fe-0a39-4e41-86f4-d1e615985389", "DetectTime": "2024-05-21T12:31:02.824757+00:00", "EventTime": "2024-05-21T12:31:02.824774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpIHA2YbcXvu0hMrf"], "accumulated_threat_level": 9.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "dba1d0cd-c68f-4533-a4a5-128b6e23ee05", "DetectTime": "2024-05-21T12:31:02.873475+00:00", "EventTime": "2024-05-21T12:31:02.873497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvshR92K81n1UFXd58"], "accumulated_threat_level": 10.4, "timewindow": 60} +{"Format": "IDEA0", "ID": "b13799af-9d3c-4e12-8841-f2e10665093f", "DetectTime": "2024-05-21T12:31:02.958881+00:00", "EventTime": "2024-05-21T12:31:02.958901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEcR74rF3NS3fjSH5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 60} +{"Format": "IDEA0", "ID": "2f472f06-aff4-4976-9100-13b6186a8354", "DetectTime": "2024-05-21T12:31:02.984997+00:00", "EventTime": "2024-05-21T12:31:02.985019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBEs8U3QLlaNcFuHH"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8218e3c4-8e40-4e32-9360-31b68ded79c9", "DetectTime": "2024-05-21T12:31:03.054808+00:00", "EventTime": "2024-05-21T12:31:03.054828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"]}], "Attach": [{"Content": "Connection to unknown destination port 11311/UDP destination IP 117.199.106.53. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ehvH2z3vO5LBK3U9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 60} +{"Format": "Json", "ID": "8218e3c4-8e40-4e32-9360-31b68ded79c9", "DetectTime": "2024-05-21T12:31:03.054808+00:00", "EventTime": "2024-05-21T12:31:03.054828+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"]}], "Attach": [{"Content": "1970-01-03T11:47:11.597904+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2024/05/21 12:31:03.289974)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 60, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2e54e3ad-fce4-4210-a4b9-45b9da8ec778", "DetectTime": "2024-05-21T12:31:03.299924+00:00", "EventTime": "2024-05-21T12:31:03.299942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxmyte4hdOgrWrnbI9"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "1d59d16f-d154-47e1-b96a-d53e8174eb1b", "DetectTime": "2024-05-21T12:31:03.305414+00:00", "EventTime": "2024-05-21T12:31:03.305431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cahaii3SRtktLHhHJd"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "901ce228-02ff-4a52-b8ca-767c790461a0", "DetectTime": "2024-05-21T12:31:03.310224+00:00", "EventTime": "2024-05-21T12:31:03.310243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCGBqy2hHh7PW7li18"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "a93006f4-5e54-4fac-9f4d-88a707990f9e", "DetectTime": "2024-05-21T12:31:03.578004+00:00", "EventTime": "2024-05-21T12:31:03.578024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLFuh17q4dhYUmQJk"], "accumulated_threat_level": 1.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "fbab2b0d-905a-43cd-a3d8-8f9334fbb2ad", "DetectTime": "2024-05-21T12:31:03.629630+00:00", "EventTime": "2024-05-21T12:31:03.629651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWqRKr3ipKDwrEW0Uk"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "29c1b331-ad2c-4062-9f1a-60969b22c70a", "DetectTime": "2024-05-21T12:31:03.641395+00:00", "EventTime": "2024-05-21T12:31:03.641414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzzLe3LN5IEIdD6Ck"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "a6b6ef2d-9095-4a32-8507-1f9cf23fd697", "DetectTime": "2024-05-21T12:31:03.665099+00:00", "EventTime": "2024-05-21T12:31:03.665125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRgRxMreDWoaCmCl"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "3e1811cf-fd64-4c02-b5b8-0282cbae9647", "DetectTime": "2024-05-21T12:31:03.673427+00:00", "EventTime": "2024-05-21T12:31:03.673447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWNluq4LTRB2Wrsk"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "cae30ff5-a552-43d1-96ed-14ce57d3cd9c", "DetectTime": "2024-05-21T12:31:03.678288+00:00", "EventTime": "2024-05-21T12:31:03.678307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnIOwDuZxwiUXuQ3"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "17734e9c-a19d-4d2b-9fe1-ff8605968837", "DetectTime": "2024-05-21T12:31:03.682886+00:00", "EventTime": "2024-05-21T12:31:03.682905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN2V6q1xbUPqmkXsQ7"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "af86137b-11ea-4e99-8b28-7349db59cd0b", "DetectTime": "2024-05-21T12:31:03.687999+00:00", "EventTime": "2024-05-21T12:31:03.688017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnbdef30lrrPm7ajif"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "c8234c81-e2d4-4dd0-9cb3-dab1b36110dd", "DetectTime": "2024-05-21T12:31:03.721544+00:00", "EventTime": "2024-05-21T12:31:03.721564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9eEU2DAfErs5dw4"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "004e5a23-346a-4246-970a-03b97ec35584", "DetectTime": "2024-05-21T12:31:03.833355+00:00", "EventTime": "2024-05-21T12:31:03.833373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFysEEh19kI9syvi"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "0bd31c8f-555c-4715-9673-d149d6215177", "DetectTime": "2024-05-21T12:31:03.838790+00:00", "EventTime": "2024-05-21T12:31:03.838810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvA1J3LRn19opytIg"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "3e3b68d6-62db-4beb-b7b3-94608ffdfee4", "DetectTime": "2024-05-21T12:31:03.889034+00:00", "EventTime": "2024-05-21T12:31:03.889053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMoiNCrm3a3oQw28"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "4fb7d502-52e7-4e02-aed2-d5af02042cae", "DetectTime": "2024-05-21T12:31:03.918703+00:00", "EventTime": "2024-05-21T12:31:03.918726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrXl3Z1jBkTFvgHCy3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "6253be7d-25bc-4302-a7c7-3653413da549", "DetectTime": "2024-05-21T12:31:03.952132+00:00", "EventTime": "2024-05-21T12:31:03.952150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP5EVD1RXKxZvULVxc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "fccaeb28-8bcd-4ecd-a715-ce9bce7f981f", "DetectTime": "2024-05-21T12:31:04.009239+00:00", "EventTime": "2024-05-21T12:31:04.009257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qJtF6XifZhSUdY"], "accumulated_threat_level": 4.0, "timewindow": 60} +{"Format": "IDEA0", "ID": "22441d43-22c9-4ed2-b6e7-a0260188d753", "DetectTime": "2024-05-21T12:31:04.291491+00:00", "EventTime": "2024-05-21T12:31:04.291512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNrRYZn8RfdiQdfb"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "47677971-5dde-4769-b931-8a749385ada2", "DetectTime": "2024-05-21T12:31:04.296339+00:00", "EventTime": "2024-05-21T12:31:04.296357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXeRq2fkjWqzAd959"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "cfbc6c87-25be-43e6-a625-572ebcf08f41", "DetectTime": "2024-05-21T12:31:04.300722+00:00", "EventTime": "2024-05-21T12:31:04.300739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXxeRtJqmXtG1Puj"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "bea6cf09-fd7a-4ae6-8c35-cac590878063", "DetectTime": "2024-05-21T12:31:04.340899+00:00", "EventTime": "2024-05-21T12:31:04.340920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLwfT1I4P3mGnadT2"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "01232d49-bad5-498e-862b-74a03aa47219", "DetectTime": "2024-05-21T12:31:04.392390+00:00", "EventTime": "2024-05-21T12:31:04.392411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6kWDG0GMg7tCN7l7"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "547f0e1d-a866-48f8-96a0-a6d9f97da2a4", "DetectTime": "2024-05-21T12:31:04.423014+00:00", "EventTime": "2024-05-21T12:31:04.423037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLqEB2LmyoPnUgtIa"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "96d98d6f-bce8-487b-87b3-8492ce66ec34", "DetectTime": "2024-05-21T12:31:04.478296+00:00", "EventTime": "2024-05-21T12:31:04.478317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"]}], "Attach": [{"Content": "Connection to unknown destination port 22710/UDP destination IP 122.3.142.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAvhHc9mTJ9iWT0Al"], "accumulated_threat_level": 4.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "3406c60e-0bb8-4ac4-b275-3a8fb65b2efc", "DetectTime": "2024-05-21T12:31:04.514624+00:00", "EventTime": "2024-05-21T12:31:04.514647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cki36i4JoSgCczIag6"], "accumulated_threat_level": 5.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "ff0aee65-db4e-46b6-b2b0-b5d0707929f6", "DetectTime": "2024-05-21T12:31:04.541761+00:00", "EventTime": "2024-05-21T12:31:04.541782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjhU9q3NfgZr4L22B7"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "670eb950-699d-4646-abfe-66680b0e87c2", "DetectTime": "2024-05-21T12:31:04.650576+00:00", "EventTime": "2024-05-21T12:31:04.650595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMtGz3K1QHYIg0vU2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 60} +{"Format": "IDEA0", "ID": "3780bd4c-d1e5-4dc4-a680-42d4e51d26c8", "DetectTime": "2024-05-21T12:31:04.683247+00:00", "EventTime": "2024-05-21T12:31:04.683266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CObcKj3ty3EfRF64Bl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "36092c97-14aa-409b-9b6e-1f9d1389d194", "DetectTime": "2024-05-21T12:31:04.761265+00:00", "EventTime": "2024-05-21T12:31:04.761288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtmktB21nm9pfI19Xf"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d4f54e25-b819-4372-b140-df72a23e6ed4", "DetectTime": "2024-05-21T12:31:04.815693+00:00", "EventTime": "2024-05-21T12:31:04.815716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNs9FnGvM7Uaemvb9"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "31800571-de16-4ec1-bdf2-ad53a9864bfa", "DetectTime": "2024-05-21T12:31:04.847600+00:00", "EventTime": "2024-05-21T12:31:04.847621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co4BJCE7gnsbW9S0l"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "f175e530-e213-4e89-a0a5-2790483a2afc", "DetectTime": "2024-05-21T12:31:05.114855+00:00", "EventTime": "2024-05-21T12:31:05.114878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xhn62c3XR2JlWtZ3"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "409fb013-3a58-4f3c-83f8-908373d0feb0", "DetectTime": "2024-05-21T12:31:05.136766+00:00", "EventTime": "2024-05-21T12:31:05.136786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8WAx34ycTz8Ptib2"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8ecc5c20-b58a-4869-b300-da9d5714d56d", "DetectTime": "2024-05-21T12:31:05.169902+00:00", "EventTime": "2024-05-21T12:31:05.169924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBGPoF6unD62WhQe"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "74574581-fb9d-4f03-82ec-18aceb532dd2", "DetectTime": "2024-05-21T12:31:05.200193+00:00", "EventTime": "2024-05-21T12:31:05.200216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4TH7r1F7fQceRkxF7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "96abd31c-81f5-4919-8e3f-07012cd2b031", "DetectTime": "2024-05-21T12:31:05.282068+00:00", "EventTime": "2024-05-21T12:31:05.282092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2tCRAIA0WQBBch4f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "7a98fad2-9d6a-499b-96f2-96bd9613905e", "DetectTime": "2024-05-21T12:31:05.326925+00:00", "EventTime": "2024-05-21T12:31:05.326945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.69.218.77"]}], "Attach": [{"Content": "Connection to unknown destination port 16776/UDP destination IP 36.69.218.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIFixPkyqJMXG4q8"], "accumulated_threat_level": 9.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "d8098ae5-4ba6-41f5-a020-344bd70c4ce7", "DetectTime": "2024-05-21T12:31:05.375911+00:00", "EventTime": "2024-05-21T12:31:05.375933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIcQM1nn2VYjw7ZH4"], "accumulated_threat_level": 10.4, "timewindow": 60} +{"Format": "IDEA0", "ID": "e809bd5d-188c-482d-8277-717dd6f366f9", "DetectTime": "2024-05-21T12:31:05.420261+00:00", "EventTime": "2024-05-21T12:31:05.420284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAyQtK3A9ESbvEtNdh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 60} +{"Format": "IDEA0", "ID": "097df3ff-a6ea-4c64-83e5-5986ae044c63", "DetectTime": "2024-05-21T12:31:05.599037+00:00", "EventTime": "2024-05-21T12:31:05.599058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXQZIehgTPkyI8G3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 60} +{"Format": "Json", "ID": "097df3ff-a6ea-4c64-83e5-5986ae044c63", "DetectTime": "2024-05-21T12:31:05.599037+00:00", "EventTime": "2024-05-21T12:31:05.599058+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "1970-01-03T11:50:01.571990+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2024/05/21 12:31:05.803598)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 60, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7e321df0-3f83-4bc9-879f-0ada888e38a6", "DetectTime": "2024-05-21T12:31:05.814085+00:00", "EventTime": "2024-05-21T12:31:05.814104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmhnuqmNpXFnzVUh"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "cead863e-8c1f-4daa-a254-b6328ea9bfcb", "DetectTime": "2024-05-21T12:31:05.829412+00:00", "EventTime": "2024-05-21T12:31:05.829433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx8RkY1BSKhHYRbZ37"], "accumulated_threat_level": 1.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "2c61af9e-c7fa-4bda-a1ad-ed44c1f4d194", "DetectTime": "2024-05-21T12:31:05.845978+00:00", "EventTime": "2024-05-21T12:31:05.845997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.205.151.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxJql43PUrZCLQGCc"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "96e2e4b7-a8b1-4be6-8963-c52397552bc2", "DetectTime": "2024-05-21T12:31:06.117917+00:00", "EventTime": "2024-05-21T12:31:06.117943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw25eHYhUZCi83s7j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "497496d0-bfdd-4ef0-9864-f26c3c7521ad", "DetectTime": "2024-05-21T12:31:06.152573+00:00", "EventTime": "2024-05-21T12:31:06.152593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"]}], "Attach": [{"Content": "Connection to unknown destination port 19526/UDP destination IP 122.170.10.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdtFY3zMx4Cxd3i0h"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "51174177-fbed-49a6-8857-e4f831f27df0", "DetectTime": "2024-05-21T12:31:06.242081+00:00", "EventTime": "2024-05-21T12:31:06.242101+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84n7Z2XbBuY57HjMk"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "f78b4a6e-cf38-451a-81da-a21d79967623", "DetectTime": "2024-05-21T12:31:06.258551+00:00", "EventTime": "2024-05-21T12:31:06.258571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84n7Z2XbBuY57HjMk"], "accumulated_threat_level": 9.299999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "e0af332e-4408-44e4-b203-19c1e45965f1", "DetectTime": "2024-05-21T12:31:06.269686+00:00", "EventTime": "2024-05-21T12:31:06.269704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1y56h3dow558qeZX7"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "aaf54c0f-b1d3-4630-b3b0-6007e252c825", "DetectTime": "2024-05-21T12:31:06.280557+00:00", "EventTime": "2024-05-21T12:31:06.280575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1y56h3dow558qeZX7"], "accumulated_threat_level": 9.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "46b63a4c-e1ca-437f-ab0b-28d500fa6e21", "DetectTime": "2024-05-21T12:31:06.357385+00:00", "EventTime": "2024-05-21T12:31:06.357406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBumU34862pYxwwTD7"], "accumulated_threat_level": 4.0, "timewindow": 60} +{"Format": "IDEA0", "ID": "b79e9675-9ece-4129-af1f-b797311f3f27", "DetectTime": "2024-05-21T12:31:06.404117+00:00", "EventTime": "2024-05-21T12:31:06.404136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.0.223.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFj4z8tP7klvVYUg"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "b3948fba-9c12-4824-b736-01f349d307ca", "DetectTime": "2024-05-21T12:31:06.418700+00:00", "EventTime": "2024-05-21T12:31:06.418719+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWMzy1AKYXuG97V65"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "1d5c655e-7cca-4f1f-bdd9-eb03c7b6eb52", "DetectTime": "2024-05-21T12:31:06.429369+00:00", "EventTime": "2024-05-21T12:31:06.429387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWMzy1AKYXuG97V65"], "accumulated_threat_level": 10.299999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "1dc00d59-4e9f-4447-8f1d-367108a2c572", "DetectTime": "2024-05-21T12:31:06.489445+00:00", "EventTime": "2024-05-21T12:31:06.489464+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9vYd2L4OnDn0FZvc"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "b265f3f4-6f4d-403f-9791-06e1379dbc99", "DetectTime": "2024-05-21T12:31:06.504812+00:00", "EventTime": "2024-05-21T12:31:06.504831+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9vYd2L4OnDn0FZvc"], "accumulated_threat_level": 10.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "9957abf2-16c1-44eb-812a-f5cf0611e623", "DetectTime": "2024-05-21T12:31:06.516710+00:00", "EventTime": "2024-05-21T12:31:06.516729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.241.253.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2917/UDP destination IP 80.241.253.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqadqq1Qb6uhpsMbnb"], "accumulated_threat_level": 4.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "16e310e4-327c-490b-b074-b6fed31801f0", "DetectTime": "2024-05-21T12:31:06.530294+00:00", "EventTime": "2024-05-21T12:31:06.530313+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Sgll3gJTdwXt6iml"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "3665c82f-6fa8-4a1a-834b-dd35af44183d", "DetectTime": "2024-05-21T12:31:06.542845+00:00", "EventTime": "2024-05-21T12:31:06.542863+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Sgll3gJTdwXt6iml"], "accumulated_threat_level": 11.299999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "44fbc31d-2d5a-43e9-9bea-de819a6c32e0", "DetectTime": "2024-05-21T12:31:06.554264+00:00", "EventTime": "2024-05-21T12:31:06.554286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.73.133"]}], "Attach": [{"Content": "Connection to unknown destination port 22126/UDP destination IP 85.97.73.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR8tG71SWyPdHcDo51"], "accumulated_threat_level": 5.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "7af9cc59-6b79-4e61-a6ab-f989b1486282", "DetectTime": "2024-05-21T12:31:06.568498+00:00", "EventTime": "2024-05-21T12:31:06.568517+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorrLc3TqxGyr9vsUl"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e98b1c24-e885-4a82-ae4c-f5dafc264a23", "DetectTime": "2024-05-21T12:31:06.580483+00:00", "EventTime": "2024-05-21T12:31:06.580507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorrLc3TqxGyr9vsUl"], "accumulated_threat_level": 11.799999999999999, "timewindow": 20} +{"Format": "IDEA0", "ID": "b36f298c-4b2c-41b8-9da1-bf5c7c04f24f", "DetectTime": "2024-05-21T12:31:06.627777+00:00", "EventTime": "2024-05-21T12:31:06.627795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.57.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtrej2hqSAN90x2b9"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "53a6bfde-2def-476e-9ded-58203f8929e1", "DetectTime": "2024-05-21T12:31:06.639100+00:00", "EventTime": "2024-05-21T12:31:06.639119+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.57.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtrej2hqSAN90x2b9"], "accumulated_threat_level": 12.299999999999999, "timewindow": 20} +{"Format": "Json", "ID": "53a6bfde-2def-476e-9ded-58203f8929e1", "DetectTime": "2024-05-21T12:31:06.639100+00:00", "EventTime": "2024-05-21T12:31:06.639119+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.57.114"]}], "Attach": [{"Content": "1970-01-01T19:12:29.960343+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:31:07.160803)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.299999999999999, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.299999999999999} +{"Format": "IDEA0", "ID": "0f0e77aa-a230-4af5-a155-9cc1e38c3511", "DetectTime": "2024-05-21T12:31:07.171331+00:00", "EventTime": "2024-05-21T12:31:07.171352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["120.63.10.102"]}], "Attach": [{"Content": "Connection to unknown destination port 10675/UDP destination IP 120.63.10.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbAx552zhf5kkNhnNb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 60} +{"Format": "IDEA0", "ID": "32dec3e8-b86d-4b61-84d8-4345fced8f6a", "DetectTime": "2024-05-21T12:31:07.182359+00:00", "EventTime": "2024-05-21T12:31:07.182379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2GP7r1pN0an2yUZf9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "042ca192-7909-40ce-82d2-62d5a8795a0a", "DetectTime": "2024-05-21T12:31:07.195921+00:00", "EventTime": "2024-05-21T12:31:07.195946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE7UsX1LuoAf9ppbUa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "f1fa306f-1ce2-49f3-96a0-bf2ff68296fd", "DetectTime": "2024-05-21T12:31:07.201363+00:00", "EventTime": "2024-05-21T12:31:07.201385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RaX61XpYHdXXxZK1"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d145608a-e469-4674-a115-06aad5dce288", "DetectTime": "2024-05-21T12:31:07.206473+00:00", "EventTime": "2024-05-21T12:31:07.206496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXy2I024vspPXv6Ctl"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "e06757f0-b835-418e-a4d2-75f91b80c13f", "DetectTime": "2024-05-21T12:31:07.367259+00:00", "EventTime": "2024-05-21T12:31:07.367282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5QxlV2mizf88T1mcl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 60} +{"Format": "IDEA0", "ID": "d163a2e2-bbe5-4d44-bcdf-4eb73902f84e", "DetectTime": "2024-05-21T12:31:07.386053+00:00", "EventTime": "2024-05-21T12:31:07.386072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C94XHZ2yWOTQgymzP8"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d4d2846c-e9ae-43d5-9a19-489705dbb996", "DetectTime": "2024-05-21T12:31:07.395511+00:00", "EventTime": "2024-05-21T12:31:07.395533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cea12uRudkIhHGeAh"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "b5c732bd-0007-48fa-8b56-db194e4380c3", "DetectTime": "2024-05-21T12:31:07.400670+00:00", "EventTime": "2024-05-21T12:31:07.400689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfyPaU1zCGILUwPcik"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8659745e-078e-4936-8a5f-c269b210b13c", "DetectTime": "2024-05-21T12:31:07.405172+00:00", "EventTime": "2024-05-21T12:31:07.405191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czv8gq4dv4ha9ifly5"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "dcee94a2-29a8-448a-9b3a-e3c587dacbe5", "DetectTime": "2024-05-21T12:31:07.409576+00:00", "EventTime": "2024-05-21T12:31:07.409594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckw18Y2Gvhxd8KPAoa"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "fcd50def-817b-4fb2-83f3-76982e84dab1", "DetectTime": "2024-05-21T12:31:07.417577+00:00", "EventTime": "2024-05-21T12:31:07.417598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuEwq3AJh2ungcudb"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "6c3dc48c-6f9f-4404-b5e2-a8d8f726a1f2", "DetectTime": "2024-05-21T12:31:07.528392+00:00", "EventTime": "2024-05-21T12:31:07.528414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C412Ax1IUhvu4bKVVf"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "2a681cf7-d144-47e8-a032-aa46e71c4093", "DetectTime": "2024-05-21T12:31:07.569431+00:00", "EventTime": "2024-05-21T12:31:07.569452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C11eAp2u3E2La9wCIl"], "accumulated_threat_level": 9.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "bbc7147b-3197-40e2-87fc-104c68364655", "DetectTime": "2024-05-21T12:31:07.574159+00:00", "EventTime": "2024-05-21T12:31:07.574178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0HXHE1Wn7MwmojSac"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8f712680-f54a-4d0f-8ed1-6f7368359416", "DetectTime": "2024-05-21T12:31:07.638669+00:00", "EventTime": "2024-05-21T12:31:07.638690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrXSW01nUyS6wiJxA6"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "b4f1ed0c-1b11-4e1a-83c1-a4de8ac36339", "DetectTime": "2024-05-21T12:31:07.644192+00:00", "EventTime": "2024-05-21T12:31:07.644210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvV2Lr2fm5JOwlDpBh"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "3471af0a-63f7-4c29-8f72-392ab4043fa5", "DetectTime": "2024-05-21T12:31:07.871459+00:00", "EventTime": "2024-05-21T12:31:07.871484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjbBMI2P8gd87HArQ1"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "121a887e-f7d3-40f6-b850-259138edfdab", "DetectTime": "2024-05-21T12:31:07.885519+00:00", "EventTime": "2024-05-21T12:31:07.885540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ROx215koZuTjk5Wl"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "e4c5b9c5-26f8-4025-ae80-0e13b8036c06", "DetectTime": "2024-05-21T12:31:07.994764+00:00", "EventTime": "2024-05-21T12:31:07.994785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1SWr3E4SSIAKLaze"], "accumulated_threat_level": 10.4, "timewindow": 60} +{"Format": "IDEA0", "ID": "d4cce9bd-6a53-42ab-8c97-0cf00ef8ef0d", "DetectTime": "2024-05-21T12:31:08.018206+00:00", "EventTime": "2024-05-21T12:31:08.018226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvIfho2nPIkvsgraFg"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "5d9a8836-04ef-4029-a6f6-1f85974c41ac", "DetectTime": "2024-05-21T12:31:08.048376+00:00", "EventTime": "2024-05-21T12:31:08.048395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0dLt4CU0tRy5hdv1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 60} +{"Format": "IDEA0", "ID": "8a5a0656-da17-4f65-83e5-6bfd52630fd3", "DetectTime": "2024-05-21T12:31:08.072687+00:00", "EventTime": "2024-05-21T12:31:08.072710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccxub81bSwKEUYPXJl"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "86c0d21d-436b-4aae-86a3-5b0ec0805f10", "DetectTime": "2024-05-21T12:31:08.110726+00:00", "EventTime": "2024-05-21T12:31:08.110746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrPHI33ewKfy97VIc"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8f787317-50d6-49b0-bfdd-fc113ed48ab6", "DetectTime": "2024-05-21T12:31:08.139483+00:00", "EventTime": "2024-05-21T12:31:08.139502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjNMwf1HkEJHD0h8Sa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 60} +{"Format": "Json", "ID": "8f787317-50d6-49b0-bfdd-fc113ed48ab6", "DetectTime": "2024-05-21T12:31:08.139483+00:00", "EventTime": "2024-05-21T12:31:08.139502+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "1970-01-03T11:51:09.309609+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 60. (real time 2024/05/21 12:31:08.618056)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 60, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "92b5f657-eb3a-41e8-89d4-0e14e7ad2d40", "DetectTime": "2024-05-21T12:31:08.621925+00:00", "EventTime": "2024-05-21T12:31:08.621943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxuqe315vMGYyH9BIa"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "5ee32d6b-0915-40d0-80cf-c9fa65f0087c", "DetectTime": "2024-05-21T12:31:08.626334+00:00", "EventTime": "2024-05-21T12:31:08.626352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4W5Vp5FgeE53hR4"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "424dd663-0a1c-47e9-8159-0505f593d0ab", "DetectTime": "2024-05-21T12:31:08.630748+00:00", "EventTime": "2024-05-21T12:31:08.630766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaSBJ43uNcKdcZMbrh"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d5a3b5f4-23d0-4168-b3de-47f8b45e6dc1", "DetectTime": "2024-05-21T12:31:08.642955+00:00", "EventTime": "2024-05-21T12:31:08.642973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNZvk1oL1jtZDbdp3"], "accumulated_threat_level": 0.8, "timewindow": 60} +{"Format": "IDEA0", "ID": "8b4e6507-480e-43cb-959f-19df6bddb3e5", "DetectTime": "2024-05-21T12:31:08.647521+00:00", "EventTime": "2024-05-21T12:31:08.647539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2Oep49r1Q9eNt9nc"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "d3c9685e-3aee-4572-a9e3-860239c7e672", "DetectTime": "2024-05-21T12:31:08.651973+00:00", "EventTime": "2024-05-21T12:31:08.651991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8W8EP74dI8aEbVt"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "44fafd64-4c21-48d9-acc9-1fa426cbc30c", "DetectTime": "2024-05-21T12:31:08.656695+00:00", "EventTime": "2024-05-21T12:31:08.656713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGly04jvoJD7Pw104"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8a3858d7-c4a2-4375-b299-8b62b087441b", "DetectTime": "2024-05-21T12:31:08.667161+00:00", "EventTime": "2024-05-21T12:31:08.667180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAOm7e4vMuwQKhD8ua"], "accumulated_threat_level": 1.6, "timewindow": 60} +{"Format": "IDEA0", "ID": "d0dcede1-f108-43ca-b37d-db50309eedc4", "DetectTime": "2024-05-21T12:31:08.680256+00:00", "EventTime": "2024-05-21T12:31:08.680274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjOKo1YSfP5eCxxNl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 60} +{"Format": "IDEA0", "ID": "dcd4cd1d-7e7b-483f-8314-c64329eafda3", "DetectTime": "2024-05-21T12:31:08.708323+00:00", "EventTime": "2024-05-21T12:31:08.708345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Zbda4gxojo62EHQc"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "b72aee0f-f965-4d67-8f56-e279ecbb8149", "DetectTime": "2024-05-21T12:31:08.753140+00:00", "EventTime": "2024-05-21T12:31:08.753160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBe4o2Qz5ufzw6Ta5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a7e0f776-b53b-4de8-815a-db89aaac894c", "DetectTime": "2024-05-21T12:31:08.775968+00:00", "EventTime": "2024-05-21T12:31:08.775992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jSbB1OBvIu0Wd2gj"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "83aae37f-6967-45ca-96e0-8e7a1a6102e8", "DetectTime": "2024-05-21T12:31:08.826682+00:00", "EventTime": "2024-05-21T12:31:08.826703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLiNX3JkiOmcCvMN1"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8cc7fab1-645b-4c1f-8a02-5723b41de5ca", "DetectTime": "2024-05-21T12:31:08.876947+00:00", "EventTime": "2024-05-21T12:31:08.876968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlHzD4DHpIj4FXNSa"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "8a07266a-0d77-46e3-96d9-65084a0c8ebb", "DetectTime": "2024-05-21T12:31:08.904112+00:00", "EventTime": "2024-05-21T12:31:08.904134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0kghx1tEwqY1ERnMl"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "2b8f4a28-7745-4c00-8ea5-bc562aae13af", "DetectTime": "2024-05-21T12:31:08.932706+00:00", "EventTime": "2024-05-21T12:31:08.932727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyrNS6v88ZM2G7I8k"], "accumulated_threat_level": 9.6, "timewindow": 59} +{"Format": "IDEA0", "ID": "c303a0f5-3f87-454b-949c-fa0c013e408c", "DetectTime": "2024-05-21T12:31:08.971249+00:00", "EventTime": "2024-05-21T12:31:08.971268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6EwE2df2hwTX37T8"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "8c5c3cd4-168f-45ae-8d35-01c16166e8dc", "DetectTime": "2024-05-21T12:31:08.997884+00:00", "EventTime": "2024-05-21T12:31:08.997904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd1cU63jRYXu9PAzld"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "75cc3307-5397-4760-9fd6-a962dac3385d", "DetectTime": "2024-05-21T12:31:09.467752+00:00", "EventTime": "2024-05-21T12:31:09.467774+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfb4cs3hXaHiGzKj73"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "433f7ef7-ac7b-4732-9c1b-49b0a7aabc97", "DetectTime": "2024-05-21T12:31:09.480410+00:00", "EventTime": "2024-05-21T12:31:09.480429+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfb4cs3hXaHiGzKj73"], "accumulated_threat_level": 0.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "4be0ffaf-0e55-4f47-89b0-e59a05e88a59", "DetectTime": "2024-05-21T12:31:09.559959+00:00", "EventTime": "2024-05-21T12:31:09.559980+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTXe3fbO2bhtt9q"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "489d73d5-a0f9-43f1-b352-d2207ab879f9", "DetectTime": "2024-05-21T12:31:09.574748+00:00", "EventTime": "2024-05-21T12:31:09.574769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCzVO2h2ljMK2C47c"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "21fc04c0-6e58-4a5c-baf0-e709964182bb", "DetectTime": "2024-05-21T12:31:09.586286+00:00", "EventTime": "2024-05-21T12:31:09.586306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYTXe3fbO2bhtt9q"], "accumulated_threat_level": 1.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "2585228f-6054-4388-bf52-f19ff6d15232", "DetectTime": "2024-05-21T12:31:09.610829+00:00", "EventTime": "2024-05-21T12:31:09.610846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGCO6KVOT2xdvhdl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "7d960549-f05e-4b0d-be87-b5550b635a6b", "DetectTime": "2024-05-21T12:31:09.676685+00:00", "EventTime": "2024-05-21T12:31:09.676703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnM9Yc3B3Id1Ml5OFh"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "b7180ba6-4fb8-4e3d-a8e5-55156bc536f7", "DetectTime": "2024-05-21T12:31:09.703383+00:00", "EventTime": "2024-05-21T12:31:09.703402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.91.3.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkGRI10MQDCWz08oc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "995214bd-49d4-4d9e-aed5-254785f08c77", "DetectTime": "2024-05-21T12:31:09.756599+00:00", "EventTime": "2024-05-21T12:31:09.756622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.141.121.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKHGAV11UE1yYfyj89"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c3463726-0646-4a6b-9954-9cd9fa15cb3d", "DetectTime": "2024-05-21T12:31:09.859369+00:00", "EventTime": "2024-05-21T12:31:09.859387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqD4IB4qzYaV28gJZd"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "bb7fd458-0abf-42c3-aadb-d1e6cd477e02", "DetectTime": "2024-05-21T12:31:09.902485+00:00", "EventTime": "2024-05-21T12:31:09.902507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0SgV27sK4jr5Run9", "CUjmLA1cRF6UoqJrRf", "C3uhWh29fRTmQzasMa", "CW4CkP1T18pmKdIabh"], "accumulated_threat_level": 4.5, "timewindow": 61} +{"Format": "IDEA0", "ID": "b0f401ab-c9c4-452c-b026-5fef636f5a4c", "DetectTime": "2024-05-21T12:31:10.031914+00:00", "EventTime": "2024-05-21T12:31:10.031932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgetws1g97nEgL12o2"], "accumulated_threat_level": 5.3, "timewindow": 61} +{"Format": "IDEA0", "ID": "d25b9bb6-e16b-4336-b1f3-460dd21e506a", "DetectTime": "2024-05-21T12:31:10.055395+00:00", "EventTime": "2024-05-21T12:31:10.055416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.194.94.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcGJRAe1lU41YbNK8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d566ea31-b16a-49de-89ca-224ba919953f", "DetectTime": "2024-05-21T12:31:10.082466+00:00", "EventTime": "2024-05-21T12:31:10.082485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIsOa4FZXJDdlDXqe"], "accumulated_threat_level": 6.1, "timewindow": 61} +{"Format": "IDEA0", "ID": "4f41fb06-6cea-42e8-8d1c-1f71a7335b3b", "DetectTime": "2024-05-21T12:31:10.117292+00:00", "EventTime": "2024-05-21T12:31:10.117313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNbcK2HE45Lkeh3gl"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 61} +{"Format": "IDEA0", "ID": "d3a03ed8-13fd-4fcf-8f5a-03fbca6d8e15", "DetectTime": "2024-05-21T12:31:10.151081+00:00", "EventTime": "2024-05-21T12:31:10.151102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChONuhitfvVrXk0n5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "a82dbba8-c2d1-4cf5-95bb-110c4aaa5f73", "DetectTime": "2024-05-21T12:31:10.188144+00:00", "EventTime": "2024-05-21T12:31:10.188163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HzCi342AuYp6jCY3"], "accumulated_threat_level": 8.5, "timewindow": 61} +{"Format": "IDEA0", "ID": "49d7aaee-9999-4b43-b4f9-ef95e2ac5cc8", "DetectTime": "2024-05-21T12:31:10.237027+00:00", "EventTime": "2024-05-21T12:31:10.237048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUStlxfpiRvpgUXRb"], "accumulated_threat_level": 9.3, "timewindow": 61} +{"Format": "IDEA0", "ID": "6e2eec55-93e1-40ab-8411-3c0ef0870894", "DetectTime": "2024-05-21T12:31:10.272809+00:00", "EventTime": "2024-05-21T12:31:10.272826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfZmg2PsCpuhHcuzf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 61} +{"Format": "IDEA0", "ID": "aaf0a3ff-3881-4aa9-9d50-d5c05842a3ce", "DetectTime": "2024-05-21T12:31:10.319236+00:00", "EventTime": "2024-05-21T12:31:10.319255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQpHZWBPNAcbClV4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 61} +{"Format": "IDEA0", "ID": "ed76cd15-4292-42d2-8985-2ff585bc6bf8", "DetectTime": "2024-05-21T12:31:10.352473+00:00", "EventTime": "2024-05-21T12:31:10.352492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaHaS1724q68B4T2a"], "accumulated_threat_level": 11.700000000000003, "timewindow": 61} +{"Format": "IDEA0", "ID": "2ea84d88-331b-4760-bac4-39a6dcca0574", "DetectTime": "2024-05-21T12:31:10.413211+00:00", "EventTime": "2024-05-21T12:31:10.413231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.174.83.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C93u4V1WDjXw5FWpZ4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "fa51ab6b-898a-42c7-a7f9-8f213bf1b57a", "DetectTime": "2024-05-21T12:31:10.448817+00:00", "EventTime": "2024-05-21T12:31:10.448839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjRIZB3XSIqfR4hxsd"], "accumulated_threat_level": 12.500000000000004, "timewindow": 61} +{"Format": "Json", "ID": "fa51ab6b-898a-42c7-a7f9-8f213bf1b57a", "DetectTime": "2024-05-21T12:31:10.448817+00:00", "EventTime": "2024-05-21T12:31:10.448839+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "1970-01-03T12:22:23.679402+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2024/05/21 12:31:10.634535)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 61, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "2e67cd78-ad1b-4347-96e1-1e41768b21c9", "DetectTime": "2024-05-21T12:31:10.645521+00:00", "EventTime": "2024-05-21T12:31:10.645541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKGKW1WwvoS8v39m9"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "59dc72d2-a6f6-4798-b7d5-2382bfd657b8", "DetectTime": "2024-05-21T12:31:10.699741+00:00", "EventTime": "2024-05-21T12:31:10.699763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxBYd3jmZ75E0H839"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "d8aba298-93d3-4999-a5d4-359c43ae31ed", "DetectTime": "2024-05-21T12:31:10.738670+00:00", "EventTime": "2024-05-21T12:31:10.738690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1dMJq4uhMWXHSM6M2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "e5579c5f-9301-4130-a7aa-7a917d3a3734", "DetectTime": "2024-05-21T12:31:10.777732+00:00", "EventTime": "2024-05-21T12:31:10.777754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.199.106.53"]}], "Attach": [{"Content": "Connection to unknown destination port 11311/UDP destination IP 117.199.106.53. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqoSTcWRI7YEyyby3"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "d0a75971-c36b-4249-bcc0-9055570561ed", "DetectTime": "2024-05-21T12:31:10.819790+00:00", "EventTime": "2024-05-21T12:31:10.819810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cworuo13TFSSNVmE1h"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "55790476-f6a9-4b86-a62e-0c42db4de223", "DetectTime": "2024-05-21T12:31:10.854923+00:00", "EventTime": "2024-05-21T12:31:10.854942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7RlY52M2ISqEkPzE1"], "accumulated_threat_level": 4.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "43bc5e24-ba15-495b-8918-bb4a1f1b358f", "DetectTime": "2024-05-21T12:31:10.900758+00:00", "EventTime": "2024-05-21T12:31:10.900778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgbpa3qs1VkXRkLv"], "accumulated_threat_level": 5.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "e0a075e7-f673-4f11-b7b0-19cfab5ef7c8", "DetectTime": "2024-05-21T12:31:10.938062+00:00", "EventTime": "2024-05-21T12:31:10.938084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRiJc3zNj4JF3O3oi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 61} +{"Format": "IDEA0", "ID": "4a2100de-2cc5-4dd1-b722-c9b7bb658aaa", "DetectTime": "2024-05-21T12:31:10.966283+00:00", "EventTime": "2024-05-21T12:31:10.966302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXgxu265MmxkovHB4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "07b1c2de-306b-4c7b-b237-862b77a0d458", "DetectTime": "2024-05-21T12:31:10.998358+00:00", "EventTime": "2024-05-21T12:31:10.998381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXRc841NT2YK1NuJ6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "ad413c37-ff0b-48bf-ac16-a572ff01f351", "DetectTime": "2024-05-21T12:31:11.027883+00:00", "EventTime": "2024-05-21T12:31:11.027904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMeBmo10UamfkNoUTb"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e96d7b84-b7be-42b0-b098-250bc13f6597", "DetectTime": "2024-05-21T12:31:11.060538+00:00", "EventTime": "2024-05-21T12:31:11.060559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"]}], "Attach": [{"Content": "Connection to unknown destination port 22710/UDP destination IP 122.3.142.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxIUfX2sxcWALdkeFa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "35cb8d41-832b-4195-8aff-3a0115de3bda", "DetectTime": "2024-05-21T12:31:11.104925+00:00", "EventTime": "2024-05-21T12:31:11.104944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtQeRb1W4ZbuIAM4u6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "6d1f4276-258a-4f9d-8ade-1eafb9ed754a", "DetectTime": "2024-05-21T12:31:11.131447+00:00", "EventTime": "2024-05-21T12:31:11.131468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NDhU1ZPw6uV5MAk5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d21782f7-296b-433b-88c4-cf51edfc9c7d", "DetectTime": "2024-05-21T12:31:11.191022+00:00", "EventTime": "2024-05-21T12:31:11.191043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwun5t12wRYuZv7Bu6"], "accumulated_threat_level": 9.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "e0e588f5-341f-446b-9212-588626bcc07f", "DetectTime": "2024-05-21T12:31:11.210244+00:00", "EventTime": "2024-05-21T12:31:11.210265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnX10Be1CBABmVglj"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "fa044976-d35a-439a-b765-a0927b443784", "DetectTime": "2024-05-21T12:31:11.253963+00:00", "EventTime": "2024-05-21T12:31:11.253981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdONm1DTf0MqKNGsf"], "accumulated_threat_level": 10.4, "timewindow": 61} +{"Format": "IDEA0", "ID": "6611766f-d740-4655-93e1-3fa7e55760a2", "DetectTime": "2024-05-21T12:31:11.258592+00:00", "EventTime": "2024-05-21T12:31:11.258609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSuP14EkffxQIqNeh"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5a0a8d07-cf04-4314-827c-b36447642e1f", "DetectTime": "2024-05-21T12:31:11.303713+00:00", "EventTime": "2024-05-21T12:31:11.303734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtiYm14UBv2Kxdg01"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d46e5e0a-9fd0-42ab-8411-72732cd339b3", "DetectTime": "2024-05-21T12:31:11.329804+00:00", "EventTime": "2024-05-21T12:31:11.329824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTaNn2GVMHbijC717"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "01f6ee35-17ba-4818-ba68-12918862cb15", "DetectTime": "2024-05-21T12:31:11.341102+00:00", "EventTime": "2024-05-21T12:31:11.341122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUSQ86Lb9piPqdVc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 61} +{"Format": "IDEA0", "ID": "627e47c3-d7ca-4ee1-9edc-1e95c43cdcd3", "DetectTime": "2024-05-21T12:31:11.385558+00:00", "EventTime": "2024-05-21T12:31:11.385576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpa6Q61AF5T8MCTuyf"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "45fb218f-6c90-4820-9a17-b30280d58621", "DetectTime": "2024-05-21T12:31:11.406573+00:00", "EventTime": "2024-05-21T12:31:11.406595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8TLwn2C756kWNuECf"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "381378be-c9df-4ba3-a44d-cce1f355d0b9", "DetectTime": "2024-05-21T12:31:11.434035+00:00", "EventTime": "2024-05-21T12:31:11.434053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoAf71DAjozQwLwu6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 61} +{"Format": "Json", "ID": "381378be-c9df-4ba3-a44d-cce1f355d0b9", "DetectTime": "2024-05-21T12:31:11.434035+00:00", "EventTime": "2024-05-21T12:31:11.434053+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"]}], "Attach": [{"Content": "1970-01-03T12:22:44.865636+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2024/05/21 12:31:11.581073)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 61, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "eca32b23-a7e6-4c6d-b023-4fb4a1ef38f6", "DetectTime": "2024-05-21T12:31:11.586081+00:00", "EventTime": "2024-05-21T12:31:11.586104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmccVJ1FfdKOP32k3h"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "09155687-540a-4fb3-8a1e-0eb7eff71963", "DetectTime": "2024-05-21T12:31:11.591357+00:00", "EventTime": "2024-05-21T12:31:11.591379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjfMWm3dYlDNEynmJf"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c24bfecd-08c4-4da3-a892-4d42d4689464", "DetectTime": "2024-05-21T12:31:11.596196+00:00", "EventTime": "2024-05-21T12:31:11.596216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8tWoJMbK2Ms2Ov7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "276461b9-05eb-4c64-b5da-87eb45d187e2", "DetectTime": "2024-05-21T12:31:11.607972+00:00", "EventTime": "2024-05-21T12:31:11.607992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLADcDRxRng9KJQk"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "c5301e88-52a4-42a9-944f-87f84de369dd", "DetectTime": "2024-05-21T12:31:11.613037+00:00", "EventTime": "2024-05-21T12:31:11.613054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRQg52OPGaMMeBGV1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "01be91d8-a404-485d-83e7-24d2ec117fa2", "DetectTime": "2024-05-21T12:31:11.626076+00:00", "EventTime": "2024-05-21T12:31:11.626095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChetOo16vx2K4NoCIa"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "bd5a4714-78ae-4f87-8567-3db45b5b8510", "DetectTime": "2024-05-21T12:31:11.660712+00:00", "EventTime": "2024-05-21T12:31:11.660732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl8kYv1B9zF93hYfjh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "44317f7c-0756-4177-b405-10f71a121695", "DetectTime": "2024-05-21T12:31:11.701622+00:00", "EventTime": "2024-05-21T12:31:11.701640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKxkSpIeZr76ip94"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "43914cf0-776a-42ff-b0da-311b3a9dfece", "DetectTime": "2024-05-21T12:31:11.731285+00:00", "EventTime": "2024-05-21T12:31:11.731304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtiBj3WkQGGgbDZ0d"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "5bdec2f8-143b-4f5a-82c3-93db78fda322", "DetectTime": "2024-05-21T12:31:11.765400+00:00", "EventTime": "2024-05-21T12:31:11.765419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"]}], "Attach": [{"Content": "Connection to unknown destination port 19526/UDP destination IP 122.170.10.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4gEW3eVLDqqUzXya"], "accumulated_threat_level": 4.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "e1d24898-177a-4fd2-aca7-1630e1221771", "DetectTime": "2024-05-21T12:31:11.787410+00:00", "EventTime": "2024-05-21T12:31:11.787432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TpE94Nzzva4roBsg"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3b6d3f84-45e2-4e42-8d0d-faa5d156a09c", "DetectTime": "2024-05-21T12:31:11.873780+00:00", "EventTime": "2024-05-21T12:31:11.873799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXa6KM2AgcLN5fOvKc"], "accumulated_threat_level": 5.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "12d5e466-da08-40a0-a09a-c04a0af26a92", "DetectTime": "2024-05-21T12:31:11.893476+00:00", "EventTime": "2024-05-21T12:31:11.893498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx9T6w4IvrWD9LPHz9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "aeac6cb3-39c7-48fa-aceb-c962f68976df", "DetectTime": "2024-05-21T12:31:11.898490+00:00", "EventTime": "2024-05-21T12:31:11.898510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZkIBM3rdGUuqZW64e"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "40d5440d-31e7-4b11-b351-aef4b04207ff", "DetectTime": "2024-05-21T12:31:11.955111+00:00", "EventTime": "2024-05-21T12:31:11.955130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.97.73.133"]}], "Attach": [{"Content": "Connection to unknown destination port 22126/UDP destination IP 85.97.73.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0s5N2jKauHA8lOo5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 61} +{"Format": "IDEA0", "ID": "4850bd3d-fd53-436f-8e81-66ab428e4864", "DetectTime": "2024-05-21T12:31:12.015171+00:00", "EventTime": "2024-05-21T12:31:12.015190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cizles82S0KPVvScc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "85de083e-02f2-4621-a48e-b8c91af1adbf", "DetectTime": "2024-05-21T12:31:12.029537+00:00", "EventTime": "2024-05-21T12:31:12.029557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chh7Oy2vnuNAmC7Dh5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "9cf7b05d-879d-4193-be02-1fbe5cbc8f1d", "DetectTime": "2024-05-21T12:31:12.060181+00:00", "EventTime": "2024-05-21T12:31:12.060203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBVEF15LXABfqUjZ6"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "68fbfc71-d518-49ae-983a-a0671dc61488", "DetectTime": "2024-05-21T12:31:12.093036+00:00", "EventTime": "2024-05-21T12:31:12.093059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJkap54rHBFcQ9yFO8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "0742074a-50bc-407b-9f6f-da1bb68b99a5", "DetectTime": "2024-05-21T12:31:12.108962+00:00", "EventTime": "2024-05-21T12:31:12.108982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsSFVUxmvrqP61SN9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3f893e02-4dee-4a5d-8a6e-653a5fefd7c7", "DetectTime": "2024-05-21T12:31:12.139858+00:00", "EventTime": "2024-05-21T12:31:12.139879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRcOJ2jZ1PH0OFWdi"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c99edd07-9374-42df-beb4-551b494ae3fe", "DetectTime": "2024-05-21T12:31:12.170103+00:00", "EventTime": "2024-05-21T12:31:12.170121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ3jfV2nplz0W0GNu9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "502ffe0f-1da7-4c98-bd5d-90bc3f2a086e", "DetectTime": "2024-05-21T12:31:12.196682+00:00", "EventTime": "2024-05-21T12:31:12.196702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciivxh2Jt9qXWmNSDf"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "cd7e2779-d71f-4b2f-a21e-4f0db5722ecc", "DetectTime": "2024-05-21T12:31:12.224092+00:00", "EventTime": "2024-05-21T12:31:12.224111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8eh9K1ZQ5fTJUM2rd"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "9380d139-5502-453e-a21a-56cebb80af5f", "DetectTime": "2024-05-21T12:31:12.274940+00:00", "EventTime": "2024-05-21T12:31:12.274962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C96RAML5HWVcylHN7"], "accumulated_threat_level": 9.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "e830a9c9-aedb-44eb-bb2b-35b9b1342569", "DetectTime": "2024-05-21T12:31:12.280015+00:00", "EventTime": "2024-05-21T12:31:12.280035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNRPg4sibczmWug"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2f74cb57-cdd3-4277-b324-08a6115658db", "DetectTime": "2024-05-21T12:31:12.314812+00:00", "EventTime": "2024-05-21T12:31:12.314833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrICtt4URkQWmaEYMe"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "533d772b-e047-4ccf-925a-f576194da27e", "DetectTime": "2024-05-21T12:31:12.346230+00:00", "EventTime": "2024-05-21T12:31:12.346249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkhSK3lcaB22Vl7w7"], "accumulated_threat_level": 10.4, "timewindow": 61} +{"Format": "IDEA0", "ID": "1d5c4672-fc21-4ca2-a83f-112f72130a34", "DetectTime": "2024-05-21T12:31:12.381192+00:00", "EventTime": "2024-05-21T12:31:12.381211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHuV03mOxuHLWIIu5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 61} +{"Format": "IDEA0", "ID": "449101ed-90b5-4559-b007-2db00d652b31", "DetectTime": "2024-05-21T12:31:12.418441+00:00", "EventTime": "2024-05-21T12:31:12.418459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEdFez2KeE3p5jnzC5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 61} +{"Format": "Json", "ID": "449101ed-90b5-4559-b007-2db00d652b31", "DetectTime": "2024-05-21T12:31:12.418441+00:00", "EventTime": "2024-05-21T12:31:12.418459+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "1970-01-03T12:23:19.780046+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2024/05/21 12:31:12.582683)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 61, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5c284024-6e29-496d-8da3-b2277c9ca1aa", "DetectTime": "2024-05-21T12:31:12.589804+00:00", "EventTime": "2024-05-21T12:31:12.589822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwCVsJ3pGgCNXWnwc9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "eda0cd51-3062-4f55-bfed-fe3f5bce5024", "DetectTime": "2024-05-21T12:31:12.601616+00:00", "EventTime": "2024-05-21T12:31:12.601635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkF3jS1SPTcOuJb2Qk"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "4abbba2c-57a5-4467-b054-3d86102fae2c", "DetectTime": "2024-05-21T12:31:12.642693+00:00", "EventTime": "2024-05-21T12:31:12.642715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0rP94UdqGhVxcTZ8"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "34472df6-de21-4d3c-b539-1e39b5728299", "DetectTime": "2024-05-21T12:31:12.654076+00:00", "EventTime": "2024-05-21T12:31:12.654096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccne1a3I1PXLdRglhh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "a2555eba-4688-489f-aac3-3978579436af", "DetectTime": "2024-05-21T12:31:12.666978+00:00", "EventTime": "2024-05-21T12:31:12.666997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mcZU2zZ33A4C4xgd"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "9cdff177-b899-4d4b-9fa9-45788d7a7046", "DetectTime": "2024-05-21T12:31:12.678701+00:00", "EventTime": "2024-05-21T12:31:12.678719+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mcZU2zZ33A4C4xgd"], "accumulated_threat_level": 1.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "5404a4da-cd42-4a90-b00a-776f70ff9eb3", "DetectTime": "2024-05-21T12:31:12.683425+00:00", "EventTime": "2024-05-21T12:31:12.683444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYTUVOTM92eIkGme"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e0433434-a2b2-47bf-ad90-18ea8c509804", "DetectTime": "2024-05-21T12:31:12.693374+00:00", "EventTime": "2024-05-21T12:31:12.693392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauMR22V2vEDJJLwbi"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "d2ce72cc-207e-433c-8fc0-0f57780c8de1", "DetectTime": "2024-05-21T12:31:13.274107+00:00", "EventTime": "2024-05-21T12:31:13.274132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1m8Ja36CxCMQizOPk"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "2a98b7fd-eee7-49d4-8022-c8090bd1a246", "DetectTime": "2024-05-21T12:31:13.656935+00:00", "EventTime": "2024-05-21T12:31:13.656959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.98.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62mK44zJDWJDEZBEh"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "b9787c70-800e-4466-9856-1b67e03fa735", "DetectTime": "2024-05-21T12:31:13.796055+00:00", "EventTime": "2024-05-21T12:31:13.796075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IQ5G4UwiRo75brW6", "CxtKW744XruJAkShhd", "CYdVRv96fqHt1yIRl", "CF5muH2rA7OqBireuf"], "accumulated_threat_level": 4.5, "timewindow": 61} +{"Format": "IDEA0", "ID": "976d90c6-d4e0-4325-9d28-d24498599917", "DetectTime": "2024-05-21T12:31:13.931379+00:00", "EventTime": "2024-05-21T12:31:13.931397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4irVl35yMDnB6sPP2"], "accumulated_threat_level": 5.3, "timewindow": 61} +{"Format": "IDEA0", "ID": "0e420935-14d1-4ddb-a90a-75e6a036fd70", "DetectTime": "2024-05-21T12:31:14.186987+00:00", "EventTime": "2024-05-21T12:31:14.187006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZISxYmiFXBGpwqqf"], "accumulated_threat_level": 6.1, "timewindow": 61} +{"Format": "IDEA0", "ID": "ba0cd081-184f-4cfc-b23d-45827b700559", "DetectTime": "2024-05-21T12:31:14.210441+00:00", "EventTime": "2024-05-21T12:31:14.210462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.122.65.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLgBX25jYc9jtmXa3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d63d40d5-53d5-4df5-ae7f-b2ecf268b108", "DetectTime": "2024-05-21T12:31:14.240249+00:00", "EventTime": "2024-05-21T12:31:14.240268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0HOW328GRqFlFf049"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 61} +{"Format": "IDEA0", "ID": "712bcb0e-35e3-4815-8d86-758b3511972e", "DetectTime": "2024-05-21T12:31:14.274346+00:00", "EventTime": "2024-05-21T12:31:14.274367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9WWzx2QogHoWzDhAk"], "accumulated_threat_level": 7.699999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "b206a8be-061e-49a8-8873-d509612348ad", "DetectTime": "2024-05-21T12:31:14.307844+00:00", "EventTime": "2024-05-21T12:31:14.307862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUHGr4nmaVL9pSxe3"], "accumulated_threat_level": 8.5, "timewindow": 61} +{"Format": "IDEA0", "ID": "b5b10360-f4d2-4dbd-9656-36592ecf5ae8", "DetectTime": "2024-05-21T12:31:14.384464+00:00", "EventTime": "2024-05-21T12:31:14.384484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPFL14n37wKqtMnX6"], "accumulated_threat_level": 9.3, "timewindow": 61} +{"Format": "IDEA0", "ID": "488db696-40dd-48c9-808a-1f3ac3c7d867", "DetectTime": "2024-05-21T12:31:14.403655+00:00", "EventTime": "2024-05-21T12:31:14.403672+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32iQo4H32szAULzH2"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "ef7e7f70-d48d-42f8-9f2d-769369aebbf1", "DetectTime": "2024-05-21T12:31:14.414716+00:00", "EventTime": "2024-05-21T12:31:14.414735+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32iQo4H32szAULzH2"], "accumulated_threat_level": 2.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "8699e6b9-27bb-4023-ba76-0e18a608b82a", "DetectTime": "2024-05-21T12:31:14.430116+00:00", "EventTime": "2024-05-21T12:31:14.430134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSmUK2JfiOmSUZ7Bl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 61} +{"Format": "IDEA0", "ID": "e344a281-9dff-4ed9-a943-264e51c3ef3d", "DetectTime": "2024-05-21T12:31:14.471573+00:00", "EventTime": "2024-05-21T12:31:14.471594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzilQMJeYRZuH3aIb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 61} +{"Format": "IDEA0", "ID": "db89ff84-d220-40af-a19b-cdf689694f43", "DetectTime": "2024-05-21T12:31:14.517075+00:00", "EventTime": "2024-05-21T12:31:14.517093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqMU54Cm6SoonYgvf"], "accumulated_threat_level": 11.700000000000003, "timewindow": 61} +{"Format": "IDEA0", "ID": "4bc4e3f4-9299-4c64-9634-a95133f68e72", "DetectTime": "2024-05-21T12:31:14.586270+00:00", "EventTime": "2024-05-21T12:31:14.586290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwOWC3JgFghWONSQk"], "accumulated_threat_level": 12.500000000000004, "timewindow": 61} +{"Format": "Json", "ID": "4bc4e3f4-9299-4c64-9634-a95133f68e72", "DetectTime": "2024-05-21T12:31:14.586270+00:00", "EventTime": "2024-05-21T12:31:14.586290+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "1970-01-03T12:54:07.294199+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2024/05/21 12:31:14.877475)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 61, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "99b8c81f-6c60-4889-895c-9070c222fad5", "DetectTime": "2024-05-21T12:31:14.890161+00:00", "EventTime": "2024-05-21T12:31:14.890181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDioYEB2qJvP27WSe"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "8a4584d4-b37b-4aa4-ae2d-41109734c45c", "DetectTime": "2024-05-21T12:31:14.901327+00:00", "EventTime": "2024-05-21T12:31:14.901348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9akkx1Kn7mRFz87P9"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "fc195446-5966-4a50-9029-ea321453ed60", "DetectTime": "2024-05-21T12:31:14.911988+00:00", "EventTime": "2024-05-21T12:31:14.912006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtn3a1woVy7X6b0a2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "78c483d8-f196-411c-ae9e-c192b913f6b4", "DetectTime": "2024-05-21T12:31:14.924710+00:00", "EventTime": "2024-05-21T12:31:14.924731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwUZ82kNQ5yZfdgTi"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "98ad86e4-de33-42cf-81c5-e9ce99836682", "DetectTime": "2024-05-21T12:31:14.930115+00:00", "EventTime": "2024-05-21T12:31:14.930134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.238.124.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbVyxE2563xftJqmUj"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "81ab3abc-c84a-4069-bbf7-f42fff4e32a4", "DetectTime": "2024-05-21T12:31:14.941643+00:00", "EventTime": "2024-05-21T12:31:14.941663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CygIJo1NTG2LmO8w86"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "bee451ef-c2ab-40cb-b09a-add09ae7a6a7", "DetectTime": "2024-05-21T12:31:14.951816+00:00", "EventTime": "2024-05-21T12:31:14.951833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YWUj47ZqVTRPPn21"], "accumulated_threat_level": 4.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "e7ff2391-1a25-43a8-8e29-65bc1f32b4c7", "DetectTime": "2024-05-21T12:31:14.956504+00:00", "EventTime": "2024-05-21T12:31:14.956522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.161.198.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpgrSf3pb36evHDB4b"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "eaa749e4-a8b1-41d4-b85a-d257f1dc5090", "DetectTime": "2024-05-21T12:31:14.976216+00:00", "EventTime": "2024-05-21T12:31:14.976237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.86.133.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuuakM2nOUJ2ZawwK6"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a54feb5c-b56a-4e87-bde5-d900549f8a25", "DetectTime": "2024-05-21T12:31:15.011125+00:00", "EventTime": "2024-05-21T12:31:15.011145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKltKQ15NOlpFZDb7a"], "accumulated_threat_level": 5.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "7c1b46e8-bbcd-4f6e-bd20-f3fb78b9a6de", "DetectTime": "2024-05-21T12:31:15.027787+00:00", "EventTime": "2024-05-21T12:31:15.027808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.199.61.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZTnv42mKL72a12tj3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "471af48f-7f45-4a32-811b-45971b2640ec", "DetectTime": "2024-05-21T12:31:15.078636+00:00", "EventTime": "2024-05-21T12:31:15.078656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.250.72.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRFZe4WTvSw1jg45l"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "fef1783b-b389-4c1a-8d80-69db9e6c38e1", "DetectTime": "2024-05-21T12:31:15.114816+00:00", "EventTime": "2024-05-21T12:31:15.114835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLjwD3Q6xilr0i141"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 61} +{"Format": "IDEA0", "ID": "a0b201b6-716e-43e2-b070-81db545b8b63", "DetectTime": "2024-05-21T12:31:15.139140+00:00", "EventTime": "2024-05-21T12:31:15.139162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co2gJO2qRX0M5hpHjk"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d3758fda-c187-4ee6-9bc2-ff6515888945", "DetectTime": "2024-05-21T12:31:15.171684+00:00", "EventTime": "2024-05-21T12:31:15.171703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc942F3J3jxEV5AIn7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "f5f4b41f-a972-493b-b25b-439734cad84d", "DetectTime": "2024-05-21T12:31:15.200485+00:00", "EventTime": "2024-05-21T12:31:15.200503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySvSY1LOc1u4GWL6g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "5e86a83c-52c5-48ad-9b85-ecc2c0eb07f8", "DetectTime": "2024-05-21T12:31:15.227486+00:00", "EventTime": "2024-05-21T12:31:15.227510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.78.213.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefBvE1p6ZAF6hjteg"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2f762299-6574-48d5-abf2-d527348b9114", "DetectTime": "2024-05-21T12:31:15.260401+00:00", "EventTime": "2024-05-21T12:31:15.260421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JKjOukdu9puF3Kl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "4b6e0514-719d-4a64-b995-5a089b7e0c35", "DetectTime": "2024-05-21T12:31:15.295870+00:00", "EventTime": "2024-05-21T12:31:15.295889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chv0Ep3cr4yAR4Nh5h"], "accumulated_threat_level": 9.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "0d76b2d7-57ba-47ba-b70f-391c13986773", "DetectTime": "2024-05-21T12:31:15.320056+00:00", "EventTime": "2024-05-21T12:31:15.320078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.223.50.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBz7KXZ1DcZAh4M"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "acdb5453-4e24-404c-b2fb-00ab0a532b2b", "DetectTime": "2024-05-21T12:31:15.350182+00:00", "EventTime": "2024-05-21T12:31:15.350199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5fzZLnrPb5sCsh4"], "accumulated_threat_level": 10.4, "timewindow": 61} +{"Format": "IDEA0", "ID": "a1946ccb-d3f5-45db-869f-8a68d800995e", "DetectTime": "2024-05-21T12:31:15.395777+00:00", "EventTime": "2024-05-21T12:31:15.395796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.3.142.198"]}], "Attach": [{"Content": "Connection to unknown destination port 22710/UDP destination IP 122.3.142.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5u1Ai2XYoSN4EqUhc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 61} +{"Format": "IDEA0", "ID": "af5dbfac-4db5-4cc8-8e05-c283ed1a8711", "DetectTime": "2024-05-21T12:31:15.430571+00:00", "EventTime": "2024-05-21T12:31:15.430592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSymjn3KvgjAYhxZhl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 61} +{"Format": "Json", "ID": "af5dbfac-4db5-4cc8-8e05-c283ed1a8711", "DetectTime": "2024-05-21T12:31:15.430571+00:00", "EventTime": "2024-05-21T12:31:15.430592+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "1970-01-03T12:54:26.414670+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2024/05/21 12:31:15.694660)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 61, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bc09720c-6043-45fc-b906-ce7319c8274d", "DetectTime": "2024-05-21T12:31:15.705681+00:00", "EventTime": "2024-05-21T12:31:15.705700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3AlA1XNeixmJZxP6"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "d8dd02a8-b071-4ac9-8c86-239480c39182", "DetectTime": "2024-05-21T12:31:15.720734+00:00", "EventTime": "2024-05-21T12:31:15.720751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaITo2f0yp8oKNvy7"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "7588cc8e-eef6-4bfb-8912-7a32150b170c", "DetectTime": "2024-05-21T12:31:15.730237+00:00", "EventTime": "2024-05-21T12:31:15.730255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bHJi1QefvEaKNgH"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "11a519ee-97e1-43c7-97ca-3541e3fed6d8", "DetectTime": "2024-05-21T12:31:15.735348+00:00", "EventTime": "2024-05-21T12:31:15.735366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoQbB2EZlVzxXhpae"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "8b254f66-3d96-4e10-bb3a-1fd55afe2bd8", "DetectTime": "2024-05-21T12:31:15.745926+00:00", "EventTime": "2024-05-21T12:31:15.745944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPCoD13cBlRSullGHd"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "5fd8a035-cdec-4a5e-8dc9-bbb2f30b2906", "DetectTime": "2024-05-21T12:31:15.756434+00:00", "EventTime": "2024-05-21T12:31:15.756453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9JVsSbuM1gpLF1Tb"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "864edff2-8ac5-4395-bc40-a04e71cf5e44", "DetectTime": "2024-05-21T12:31:15.794027+00:00", "EventTime": "2024-05-21T12:31:15.794048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiFp9o4CD4pWGdnSJ"], "accumulated_threat_level": 4.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "58b147d0-c56c-440e-93c9-c57189debb80", "DetectTime": "2024-05-21T12:31:15.843020+00:00", "EventTime": "2024-05-21T12:31:15.843041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVTLhKBpcDo7Ajb3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "60482afc-129a-4f59-8405-44de92241d42", "DetectTime": "2024-05-21T12:31:15.859439+00:00", "EventTime": "2024-05-21T12:31:15.859456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4hFrynBWt9HgEq2"], "accumulated_threat_level": 5.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "915399cb-5bb7-4cf2-938d-736427f0bd9d", "DetectTime": "2024-05-21T12:31:15.903525+00:00", "EventTime": "2024-05-21T12:31:15.903546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNlIa2K42soWILrj1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 61} +{"Format": "IDEA0", "ID": "6490ed22-b404-4ba2-98ba-d250856d8442", "DetectTime": "2024-05-21T12:31:15.980662+00:00", "EventTime": "2024-05-21T12:31:15.980683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.63.188.231 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8CubS3h9qhvtJb7V6"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e7b37b57-7cb7-425b-bab4-a8d4469f68f4", "DetectTime": "2024-05-21T12:31:16.034859+00:00", "EventTime": "2024-05-21T12:31:16.034881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.9.226.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQO80N3yFYQI2KzGU8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "dd28ff26-c45f-4830-ae88-f3800898a366", "DetectTime": "2024-05-21T12:31:16.076678+00:00", "EventTime": "2024-05-21T12:31:16.076701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKD7Na2nb7ogjGapT3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "bfaf2ed6-fcb7-42c9-9a40-c82c754bfcc3", "DetectTime": "2024-05-21T12:31:16.104858+00:00", "EventTime": "2024-05-21T12:31:16.104879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qEwh148rdtGhQQf8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e5c2576f-7988-4f5f-a4a7-ee79892d5032", "DetectTime": "2024-05-21T12:31:16.138913+00:00", "EventTime": "2024-05-21T12:31:16.138933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.170.10.62"]}], "Attach": [{"Content": "Connection to unknown destination port 19526/UDP destination IP 122.170.10.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Dao94eSCjIdunB6a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "2036bcc8-0eaf-48b0-9dbc-8ce71979746a", "DetectTime": "2024-05-21T12:31:16.203604+00:00", "EventTime": "2024-05-21T12:31:16.203627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTyFep1UOIDEBAbe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 61} +{"Format": "IDEA0", "ID": "a9014466-b91f-4ca9-8710-9a0c99b34a77", "DetectTime": "2024-05-21T12:31:16.208834+00:00", "EventTime": "2024-05-21T12:31:16.208854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.92.180.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCeQ9l3wdCrHx3jUX5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a822c876-f80f-4e1a-81bf-d36719412169", "DetectTime": "2024-05-21T12:31:16.256721+00:00", "EventTime": "2024-05-21T12:31:16.256742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.149.223.80 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWo8PI3NUpXpx82Ny"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a68b4666-482a-4691-85ad-0fbeb59bdc4c", "DetectTime": "2024-05-21T12:31:16.528606+00:00", "EventTime": "2024-05-21T12:31:16.528627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.177.116.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcTkn3TZql0gAnyP5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "6c967de3-7f93-4c2d-9aff-c73ea1b56f2b", "DetectTime": "2024-05-21T12:31:16.539967+00:00", "EventTime": "2024-05-21T12:31:16.539985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QMYB2xMUzf9DX8c7"], "accumulated_threat_level": 9.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "060d182a-9c80-4384-8025-15a5435db6bf", "DetectTime": "2024-05-21T12:31:16.582592+00:00", "EventTime": "2024-05-21T12:31:16.582615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdvZK2BWRdKCc1kY"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "099b623d-28f2-442b-a655-59d85eee16dd", "DetectTime": "2024-05-21T12:31:16.607328+00:00", "EventTime": "2024-05-21T12:31:16.607348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWdXBL1M5mlaFMzHo7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "87cadca3-e641-4edc-9aba-e6925292cb7e", "DetectTime": "2024-05-21T12:31:16.646284+00:00", "EventTime": "2024-05-21T12:31:16.646304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBYq1ISOWEsxnzn4"], "accumulated_threat_level": 10.4, "timewindow": 61} +{"Format": "IDEA0", "ID": "66c7be4b-a042-4a8b-9037-26a648f608c0", "DetectTime": "2024-05-21T12:31:16.667863+00:00", "EventTime": "2024-05-21T12:31:16.667887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.238.101.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvXTB1gpEOdc8ZHR2"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "69af8283-1740-4a76-bf88-b7a2824326d2", "DetectTime": "2024-05-21T12:31:16.692532+00:00", "EventTime": "2024-05-21T12:31:16.692553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.185.202.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1yxp2nwO1JZbnkd2"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "078b3daf-0516-4ff9-ad1e-c259e84f5ace", "DetectTime": "2024-05-21T12:31:16.723857+00:00", "EventTime": "2024-05-21T12:31:16.723878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.36.128.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqVLGZMBggocHJ75"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "cfa295f5-372f-4901-8043-26903ac6dddc", "DetectTime": "2024-05-21T12:31:16.735832+00:00", "EventTime": "2024-05-21T12:31:16.735856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusCiY1j8Hj7CY2mQ1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 61} +{"Format": "IDEA0", "ID": "736df476-9f42-4949-8f4a-49d9606d281d", "DetectTime": "2024-05-21T12:31:16.827546+00:00", "EventTime": "2024-05-21T12:31:16.827569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.152.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqnKM2c4hcej4k06"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "9ad5ca47-cba1-42ac-b780-a0f42ccf3c7a", "DetectTime": "2024-05-21T12:31:16.871740+00:00", "EventTime": "2024-05-21T12:31:16.871762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.9.241.203 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoJRdi2lE7x9DPsJP"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "0d9edda0-39db-411f-8565-148a61069c59", "DetectTime": "2024-05-21T12:31:16.877176+00:00", "EventTime": "2024-05-21T12:31:16.877195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.55.74.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gKk63VJFHBhkknod"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "b9e366c0-a725-49f3-bafb-e22810f9ac6a", "DetectTime": "2024-05-21T12:31:16.882026+00:00", "EventTime": "2024-05-21T12:31:16.882045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.152.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcxKH1EFAMNteBm4f"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "ad9b405e-f23f-4075-b06e-dbff45af8806", "DetectTime": "2024-05-21T12:31:16.901099+00:00", "EventTime": "2024-05-21T12:31:16.901118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hONlXE8VDsh3RN5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 61} +{"Format": "Json", "ID": "ad9b405e-f23f-4075-b06e-dbff45af8806", "DetectTime": "2024-05-21T12:31:16.901099+00:00", "EventTime": "2024-05-21T12:31:16.901118+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"]}], "Attach": [{"Content": "1970-01-03T12:54:48.786790+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 61. (real time 2024/05/21 12:31:17.144924)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 61, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b171c368-9dc0-4ad2-bd92-21d85d1dbbf1", "DetectTime": "2024-05-21T12:31:17.149132+00:00", "EventTime": "2024-05-21T12:31:17.149151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxblG52KInIupjmf8h"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d3cb7bed-6c01-4af8-82b9-af0106bf5d8f", "DetectTime": "2024-05-21T12:31:17.160500+00:00", "EventTime": "2024-05-21T12:31:17.160519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIxbdNzR6Q0at8xi9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "8fcc6a78-83a0-4559-aa4d-63dbd26da7f2", "DetectTime": "2024-05-21T12:31:17.165058+00:00", "EventTime": "2024-05-21T12:31:17.165076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDnu4n19Ae6wfRqFv"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "4ed98ac4-84cd-4505-9b57-10acc79196e8", "DetectTime": "2024-05-21T12:31:17.175159+00:00", "EventTime": "2024-05-21T12:31:17.175177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyc4aqz44m4KTBMz3"], "accumulated_threat_level": 0.8, "timewindow": 61} +{"Format": "IDEA0", "ID": "ae721fbf-231a-44a5-83e3-570eec80283c", "DetectTime": "2024-05-21T12:31:17.179823+00:00", "EventTime": "2024-05-21T12:31:17.179842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqkSJv4EcMGYgUaupc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "9e2a0e69-755c-47b1-872b-d93045698166", "DetectTime": "2024-05-21T12:31:17.190064+00:00", "EventTime": "2024-05-21T12:31:17.190081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeSEr1yronRWKs0Z9"], "accumulated_threat_level": 1.6, "timewindow": 61} +{"Format": "IDEA0", "ID": "49077a3b-41c2-4b18-a882-61147f111d74", "DetectTime": "2024-05-21T12:31:17.194615+00:00", "EventTime": "2024-05-21T12:31:17.194632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.180.9.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFd3x1cem4m1CvVHi"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "23c15b9c-e094-4972-8382-8282a137ac6e", "DetectTime": "2024-05-21T12:31:17.199572+00:00", "EventTime": "2024-05-21T12:31:17.199589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.99.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SwFC4jP9ifFTfWD1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "996372bc-ac7e-484d-851e-9d72518c5e70", "DetectTime": "2024-05-21T12:31:17.204604+00:00", "EventTime": "2024-05-21T12:31:17.204625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C52ho543oUjMVP6zTg"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2b8d26aa-bc5d-485e-a285-9431062ab271", "DetectTime": "2024-05-21T12:31:17.224504+00:00", "EventTime": "2024-05-21T12:31:17.224521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPyTdW1qm4p6fkDbHi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 61} +{"Format": "IDEA0", "ID": "a8e6bb26-e202-4a76-8944-37d8d56bd392", "DetectTime": "2024-05-21T12:31:17.245429+00:00", "EventTime": "2024-05-21T12:31:17.245447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.239.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiCVz3ORu7ZrVHIn4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5da9c2b8-c8b7-4417-a937-9f0cb0566f81", "DetectTime": "2024-05-21T12:31:17.282967+00:00", "EventTime": "2024-05-21T12:31:17.282985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71rX721tjyYRO3mYb"], "accumulated_threat_level": 3.2, "timewindow": 61} +{"Format": "IDEA0", "ID": "4f8ef362-f4af-425f-89c2-2d42d58b88d5", "DetectTime": "2024-05-21T12:31:17.319769+00:00", "EventTime": "2024-05-21T12:31:17.319788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CndyEs2JPE0psFp1F"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "7b1059ef-0c61-42a0-ba27-5549cca177b2", "DetectTime": "2024-05-21T12:31:17.371285+00:00", "EventTime": "2024-05-21T12:31:17.371304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6gvNp3AS8faOhtuUb"], "accumulated_threat_level": 0.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "98f58a6d-45f2-4aae-8d06-9933224225bc", "DetectTime": "2024-05-21T12:31:17.457369+00:00", "EventTime": "2024-05-21T12:31:17.457389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wPyU3dY0rcCGlEra"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5ca69d54-e571-4887-ae57-96a0e79b462e", "DetectTime": "2024-05-21T12:31:17.514446+00:00", "EventTime": "2024-05-21T12:31:17.514464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.86.152.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarJ1B2UHals2jCCV9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3e6ce7ec-6c7f-46e3-8cb5-f310c9a70874", "DetectTime": "2024-05-21T12:31:17.547085+00:00", "EventTime": "2024-05-21T12:31:17.547104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.46.196.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CON3wdeZ0ISbYuwWb"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "69c5224d-3762-4f43-95c7-452c4f1e3d69", "DetectTime": "2024-05-21T12:31:17.587046+00:00", "EventTime": "2024-05-21T12:31:17.587065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.6.55.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfwbyn1zRR1pSZFXZ2"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "70510372-806c-46b0-9c0c-c76a568cf50e", "DetectTime": "2024-05-21T12:31:17.600873+00:00", "EventTime": "2024-05-21T12:31:17.600892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfwbyn1zRR1pSZFXZ2"], "accumulated_threat_level": 2.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "b690295d-f0a0-4d91-85c9-a02ed18931ae", "DetectTime": "2024-05-21T12:31:17.605956+00:00", "EventTime": "2024-05-21T12:31:17.605981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.95.5.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wC2G1oSE1lPODFs3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "8a4c2b59-173c-4c93-8d28-5d2513853de5", "DetectTime": "2024-05-21T12:31:17.615569+00:00", "EventTime": "2024-05-21T12:31:17.615588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.45.73.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9gjj3XLEm9GyLeS1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "15273ea7-8da0-4233-ba3b-f8c174adbe34", "DetectTime": "2024-05-21T12:31:17.647055+00:00", "EventTime": "2024-05-21T12:31:17.647074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.96.88.23 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGD2A1AynoUE2mYtk"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3e0461ea-dd22-4bdd-ba39-58ecadb94ec6", "DetectTime": "2024-05-21T12:31:17.678361+00:00", "EventTime": "2024-05-21T12:31:17.678379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.32.225.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZ6I01IeELjGW34ql"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "82b90fff-efcc-4e24-a197-1d19a373e557", "DetectTime": "2024-05-21T12:31:17.715607+00:00", "EventTime": "2024-05-21T12:31:17.715628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.4.69.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuYhRLsTXeTjUSu4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "bfbae998-9699-4dcb-b37c-7b9eb07aaef2", "DetectTime": "2024-05-21T12:31:17.752639+00:00", "EventTime": "2024-05-21T12:31:17.752659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzI3f1iXaGukDvqo4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "289fb9fb-4e27-4643-b9c5-cb89af2eafa7", "DetectTime": "2024-05-21T12:31:17.758009+00:00", "EventTime": "2024-05-21T12:31:17.758030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.157.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C89F2n9sWDdJVenP7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "88402620-7992-4c52-95ab-fd8710693d26", "DetectTime": "2024-05-21T12:31:17.800604+00:00", "EventTime": "2024-05-21T12:31:17.800625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4puG23ta8V5KCEHXl"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "6ebfa2e1-8aa8-4f79-aa8a-0dff2faa14dd", "DetectTime": "2024-05-21T12:31:17.831915+00:00", "EventTime": "2024-05-21T12:31:17.831937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmuoD37TcEZQYZMN9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5f7927a8-015e-40ec-b7f7-cdd949a95f58", "DetectTime": "2024-05-21T12:31:18.093032+00:00", "EventTime": "2024-05-21T12:31:18.093055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.242.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CorSunDYpt5zSriuc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "b91a30ff-9e02-4830-b4d9-d9c049f041dd", "DetectTime": "2024-05-21T12:31:18.148329+00:00", "EventTime": "2024-05-21T12:31:18.148350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEcR74rF3NS3fjSH5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d8d89d54-3537-4b52-8fa1-967b71ba00bd", "DetectTime": "2024-05-21T12:31:18.161320+00:00", "EventTime": "2024-05-21T12:31:18.161340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.60.83.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNIBnWDJpb4iVMuhh"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "781e2864-d06a-4e11-b001-b45f0b3f7475", "DetectTime": "2024-05-21T12:31:18.167857+00:00", "EventTime": "2024-05-21T12:31:18.167878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.199.189.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBg1X139ZFW6Gin63"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d66b4daf-7d8f-4d1f-91cd-9652acedbdc8", "DetectTime": "2024-05-21T12:31:18.173944+00:00", "EventTime": "2024-05-21T12:31:18.173968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.31.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvshR92K81n1UFXd58"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "104112e1-e15f-4e7a-a5ce-e2ec40a6d483", "DetectTime": "2024-05-21T12:31:18.179133+00:00", "EventTime": "2024-05-21T12:31:18.179151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.156.246.70 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1g7E2vf0UHW4Q9b9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c91f36dc-c105-4b76-b3e9-a799fff56ff7", "DetectTime": "2024-05-21T12:31:18.183984+00:00", "EventTime": "2024-05-21T12:31:18.184003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.20.208.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIgQv71bbHEBmJxSIi"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "13984d6e-a02f-48da-94e2-d630bfa9728e", "DetectTime": "2024-05-21T12:31:18.196079+00:00", "EventTime": "2024-05-21T12:31:18.196102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.109.54.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtJQmMbZBVXNVHO2"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "7f1dd960-c0e8-47f8-a1db-ad5e81673eb7", "DetectTime": "2024-05-21T12:31:18.252206+00:00", "EventTime": "2024-05-21T12:31:18.252227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpIHA2YbcXvu0hMrf"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "9319dddd-16bf-44ca-8d43-549c0e5d583d", "DetectTime": "2024-05-21T12:31:18.273302+00:00", "EventTime": "2024-05-21T12:31:18.273325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyafyjYUbcsjsUQ0c", "CTPDliSOYBScQE9ch", "CeQ2msNvPDh5UMSOa", "CxRCPOXMrAAyytSm2"], "accumulated_threat_level": 1.3, "timewindow": 62} +{"Format": "IDEA0", "ID": "08e408d8-c907-427c-a093-b8ec3b51c80e", "DetectTime": "2024-05-21T12:31:18.322271+00:00", "EventTime": "2024-05-21T12:31:18.322292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxmyte4hdOgrWrnbI9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e8f6943c-4381-478e-9507-36da9e02ac6b", "DetectTime": "2024-05-21T12:31:18.364191+00:00", "EventTime": "2024-05-21T12:31:18.364212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.199.106.53 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ehvH2z3vO5LBK3U9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a31aca7b-2660-49c2-a117-35f0a0aa1140", "DetectTime": "2024-05-21T12:31:18.426151+00:00", "EventTime": "2024-05-21T12:31:18.426172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.14.83.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpn2gR3dBiRGiNbxZi"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a031b716-37f0-4b69-99a4-f48dfcf9bd40", "DetectTime": "2024-05-21T12:31:18.447801+00:00", "EventTime": "2024-05-21T12:31:18.447823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.251.230.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjz1630pC461NPuo5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "21470e8c-14b2-4423-bfde-48e476f5bba3", "DetectTime": "2024-05-21T12:31:18.702583+00:00", "EventTime": "2024-05-21T12:31:18.702602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLFuh17q4dhYUmQJk"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c8133df2-0668-44c4-9e15-c666523323fb", "DetectTime": "2024-05-21T12:31:18.733726+00:00", "EventTime": "2024-05-21T12:31:18.733747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NZcr3P3lgEeo3WN2"], "accumulated_threat_level": 2.1, "timewindow": 62} +{"Format": "IDEA0", "ID": "7d978fa4-b8b8-49b2-a4a5-0a2086bbe1bf", "DetectTime": "2024-05-21T12:31:18.769575+00:00", "EventTime": "2024-05-21T12:31:18.769596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsZ994FhuoM7WAdWg"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 62} +{"Format": "IDEA0", "ID": "cb27ff53-4cd0-447c-bc7f-ba635c4b480a", "DetectTime": "2024-05-21T12:31:18.802433+00:00", "EventTime": "2024-05-21T12:31:18.802455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhz5m1m0ORL31ka5"], "accumulated_threat_level": 3.7, "timewindow": 62} +{"Format": "IDEA0", "ID": "7c317a6b-f874-4603-a76d-8ecc3965064c", "DetectTime": "2024-05-21T12:31:18.842227+00:00", "EventTime": "2024-05-21T12:31:18.842247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0jHQ1lyNy6jZqT28"], "accumulated_threat_level": 4.5, "timewindow": 62} +{"Format": "IDEA0", "ID": "029f0b6c-febb-48cf-ada6-99115edcb9d0", "DetectTime": "2024-05-21T12:31:18.847565+00:00", "EventTime": "2024-05-21T12:31:18.847586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.29.55.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CttOfd1KFvrp7sLJei"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "768e6b4e-92a5-4930-9e62-c51f865ab47f", "DetectTime": "2024-05-21T12:31:18.898278+00:00", "EventTime": "2024-05-21T12:31:18.898301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwqcb4vsuCZBU2eH"], "accumulated_threat_level": 5.3, "timewindow": 62} +{"Format": "IDEA0", "ID": "266a4de6-9a81-4172-b2ec-1ca2a9208579", "DetectTime": "2024-05-21T12:31:18.935059+00:00", "EventTime": "2024-05-21T12:31:18.935079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HWah3p6NZdKgV7fk"], "accumulated_threat_level": 6.1, "timewindow": 62} +{"Format": "IDEA0", "ID": "f60f45d0-9c6e-4edf-bb85-1a89ee1c5f4c", "DetectTime": "2024-05-21T12:31:19.009980+00:00", "EventTime": "2024-05-21T12:31:19.010001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrXl3Z1jBkTFvgHCy3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c0d1532d-8916-45d2-b8ce-0941083021a5", "DetectTime": "2024-05-21T12:31:19.026160+00:00", "EventTime": "2024-05-21T12:31:19.026179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrQRC3jssjeT15wve"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 62} +{"Format": "IDEA0", "ID": "e42b1db8-b9b0-4fb0-a60e-1603e27cad76", "DetectTime": "2024-05-21T12:31:19.041984+00:00", "EventTime": "2024-05-21T12:31:19.042005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.77.23.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JSJK1RTFxLyJl8i5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5c9ccf98-314f-4a9c-a35d-bf7827f3f87f", "DetectTime": "2024-05-21T12:31:19.047171+00:00", "EventTime": "2024-05-21T12:31:19.047192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP5EVD1RXKxZvULVxc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "b20ac38b-d915-43fe-9099-4e776e54ba54", "DetectTime": "2024-05-21T12:31:19.076662+00:00", "EventTime": "2024-05-21T12:31:19.076685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.15.146.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9DRc4aPuqQEnF3ej"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "4df8872b-bb36-4179-b5ab-14b0b81a6e73", "DetectTime": "2024-05-21T12:31:19.157357+00:00", "EventTime": "2024-05-21T12:31:19.157375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2vbFwr2KVdNbuRj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "d82f1f72-f016-4cee-bfa5-2fb718fc7c10", "DetectTime": "2024-05-21T12:31:19.193407+00:00", "EventTime": "2024-05-21T12:31:19.193426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.239.118"]}], "Attach": [{"Content": "Connection to unknown destination port 6517/UDP destination IP 176.73.239.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBV2b1jraP6BPOIQe"], "accumulated_threat_level": 8.5, "timewindow": 62} +{"Format": "IDEA0", "ID": "eea2bf6b-d08c-4d13-a3a9-ff63b61129a0", "DetectTime": "2024-05-21T12:31:19.228580+00:00", "EventTime": "2024-05-21T12:31:19.228598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzKBwmwR2Zqx1oolg"], "accumulated_threat_level": 9.3, "timewindow": 62} +{"Format": "IDEA0", "ID": "6eaf0b1b-50cd-454c-b0f4-3efcd69a03d1", "DetectTime": "2024-05-21T12:31:19.265657+00:00", "EventTime": "2024-05-21T12:31:19.265678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6yAW3Dk1GroREnj7"], "accumulated_threat_level": 10.100000000000001, "timewindow": 62} +{"Format": "IDEA0", "ID": "5f24597f-e3c1-4754-8f69-1b9c620ead82", "DetectTime": "2024-05-21T12:31:19.293010+00:00", "EventTime": "2024-05-21T12:31:19.293030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qJtF6XifZhSUdY"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e420dcb4-4740-42f2-9f81-93c3750f543e", "DetectTime": "2024-05-21T12:31:19.556699+00:00", "EventTime": "2024-05-21T12:31:19.556717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.97.99.162"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.97.99.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBPeB1VEk13XNyS53"], "accumulated_threat_level": 10.900000000000002, "timewindow": 62} +{"Format": "IDEA0", "ID": "13f26392-921b-4071-ab61-6074d5903695", "DetectTime": "2024-05-21T12:31:19.561533+00:00", "EventTime": "2024-05-21T12:31:19.561551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.28.186.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02eR9OQ9Hyjk7dt"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c6fda96b-1efb-47ce-8e0b-bc0557910ed5", "DetectTime": "2024-05-21T12:31:19.595702+00:00", "EventTime": "2024-05-21T12:31:19.595720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.44.21.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGGUbV1RympWYHJ3a1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "fd7dc45b-7834-488e-b77e-5f5b4b237a16", "DetectTime": "2024-05-21T12:31:19.600772+00:00", "EventTime": "2024-05-21T12:31:19.600793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.167.175.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJrsF2BlZ4384w2Il"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "344e4b02-b561-42ac-b60f-ae78cd18af7b", "DetectTime": "2024-05-21T12:31:19.617588+00:00", "EventTime": "2024-05-21T12:31:19.617609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.3.142.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAvhHc9mTJ9iWT0Al"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "1b85900c-549c-4ea7-b3ce-e3fad1eddf9a", "DetectTime": "2024-05-21T12:31:19.657646+00:00", "EventTime": "2024-05-21T12:31:19.657665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cki36i4JoSgCczIag6"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a0c8d797-b193-45c3-ab9e-c7f0a4f36e22", "DetectTime": "2024-05-21T12:31:19.755105+00:00", "EventTime": "2024-05-21T12:31:19.755126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.0.121.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJkFS3mIFO1HD9vNd"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3dadb501-851c-4b96-8a98-9c7d1aa78f9d", "DetectTime": "2024-05-21T12:31:19.767264+00:00", "EventTime": "2024-05-21T12:31:19.767283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.181.208 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jtovhIvBLxoH0Ok"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3ecd13f2-57bb-46b2-9062-ec8cdf528635", "DetectTime": "2024-05-21T12:31:19.772331+00:00", "EventTime": "2024-05-21T12:31:19.772353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.64.171.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C892kSDzkQkIyiAP7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5382c484-674c-45c3-972b-24a134cefc08", "DetectTime": "2024-05-21T12:31:19.798346+00:00", "EventTime": "2024-05-21T12:31:19.798366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.22.196.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp0fA8PSGJlEW7Tl5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2c54629d-df0d-495c-99a7-455b43bf2770", "DetectTime": "2024-05-21T12:31:19.820488+00:00", "EventTime": "2024-05-21T12:31:19.820509+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CahDIQ1TLX35PVpr0a"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "dee3177c-f697-40cb-9b4d-c3ccc58fe38e", "DetectTime": "2024-05-21T12:31:19.834778+00:00", "EventTime": "2024-05-21T12:31:19.834797+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CahDIQ1TLX35PVpr0a"], "accumulated_threat_level": 3.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "dd48b5d4-52b2-48fe-975c-ea002b9920bb", "DetectTime": "2024-05-21T12:31:19.882018+00:00", "EventTime": "2024-05-21T12:31:19.882041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMtGz3K1QHYIg0vU2"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "6a53508f-f6e7-4426-a4f3-8708434d9fcf", "DetectTime": "2024-05-21T12:31:19.897762+00:00", "EventTime": "2024-05-21T12:31:19.897786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.252.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhfXC3rUT5FmtKfQ1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "ab87ff20-9f3a-4abc-9c42-691cb46d3c60", "DetectTime": "2024-05-21T12:31:19.910042+00:00", "EventTime": "2024-05-21T12:31:19.910060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEyJu3jzKKKhkIMu4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 62} +{"Format": "IDEA0", "ID": "c0c070f6-6882-4bf3-9f79-2e7538729a7a", "DetectTime": "2024-05-21T12:31:19.914940+00:00", "EventTime": "2024-05-21T12:31:19.914958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CObcKj3ty3EfRF64Bl"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "baeb6f8f-c822-458d-971c-8215edbd68ba", "DetectTime": "2024-05-21T12:31:19.919767+00:00", "EventTime": "2024-05-21T12:31:19.919784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.48.10.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWR4m33YbKF9Le50T2"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "af32bb2d-10b2-4376-82ae-a1579a9c0c1a", "DetectTime": "2024-05-21T12:31:19.936790+00:00", "EventTime": "2024-05-21T12:31:19.936809+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSXwB36LVvwfh5cTi"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "d8d93ce0-b461-42c0-a1ce-3f71043f5fe5", "DetectTime": "2024-05-21T12:31:19.949539+00:00", "EventTime": "2024-05-21T12:31:19.949558+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSXwB36LVvwfh5cTi"], "accumulated_threat_level": 3.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "22a6bbbe-65aa-4e04-b5f3-ace1019cf9f7", "DetectTime": "2024-05-21T12:31:19.961711+00:00", "EventTime": "2024-05-21T12:31:19.961729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKVji1athfkiOfb99"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e18ebf7d-8843-4614-aacb-aa66574d7166", "DetectTime": "2024-05-21T12:31:19.973894+00:00", "EventTime": "2024-05-21T12:31:19.973912+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKVji1athfkiOfb99"], "accumulated_threat_level": 4.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "bed9be88-b309-4d0e-8bb1-7e9da6f4cfd3", "DetectTime": "2024-05-21T12:31:19.989094+00:00", "EventTime": "2024-05-21T12:31:19.989113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clu9Wo3AWIp1QUPc02"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "c867589a-0d1f-405b-afbc-e156e9902c6d", "DetectTime": "2024-05-21T12:31:20.001532+00:00", "EventTime": "2024-05-21T12:31:20.001552+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clu9Wo3AWIp1QUPc02"], "accumulated_threat_level": 4.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "03dca720-53db-45c5-858f-a0892cd7a8c4", "DetectTime": "2024-05-21T12:31:20.039570+00:00", "EventTime": "2024-05-21T12:31:20.039593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ajmi108sJP10rgql"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "90cc5a9d-762a-41eb-882e-cb14300dd655", "DetectTime": "2024-05-21T12:31:20.052416+00:00", "EventTime": "2024-05-21T12:31:20.052436+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ajmi108sJP10rgql"], "accumulated_threat_level": 5.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "1f870b7f-0706-400d-8a5a-2777ff361bd0", "DetectTime": "2024-05-21T12:31:20.068513+00:00", "EventTime": "2024-05-21T12:31:20.068530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.191.16.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.191.16.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPtGe4jjEF0YuN28j"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "4b1b3e87-9f14-4cc0-8835-c729b62a5606", "DetectTime": "2024-05-21T12:31:20.081212+00:00", "EventTime": "2024-05-21T12:31:20.081230+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.191.16.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.191.16.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPtGe4jjEF0YuN28j"], "accumulated_threat_level": 5.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "65c653b1-144b-4bcf-8b55-9ba77574af8e", "DetectTime": "2024-05-21T12:31:20.120446+00:00", "EventTime": "2024-05-21T12:31:20.120465+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.253.12"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCUtw2baoBXewwkog"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "3037bb91-527d-4a31-aabd-ad6f37e51a5b", "DetectTime": "2024-05-21T12:31:20.132936+00:00", "EventTime": "2024-05-21T12:31:20.132955+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.253.12"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCUtw2baoBXewwkog"], "accumulated_threat_level": 6.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "5dfd30a9-65cc-4527-b699-13e2bd7bd748", "DetectTime": "2024-05-21T12:31:20.193427+00:00", "EventTime": "2024-05-21T12:31:20.193446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.3.9.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cds98x4BVfpyByKeYf"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2e200234-d0f1-4010-931e-214d8a179bfe", "DetectTime": "2024-05-21T12:31:20.273515+00:00", "EventTime": "2024-05-21T12:31:20.273536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.5.179.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu98Gt2wHJw5gdSld7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "df236fcd-234b-493f-b534-5a431d427e8c", "DetectTime": "2024-05-21T12:31:20.285820+00:00", "EventTime": "2024-05-21T12:31:20.285843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.147.34.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKf8T11HIbO4iaO4ca"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "1de50f6f-8c5a-4065-ac0d-ff7762eaa322", "DetectTime": "2024-05-21T12:31:20.326693+00:00", "EventTime": "2024-05-21T12:31:20.326716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.250.191 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGW6Hf4YqbtxSExGx4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "d9eacc83-bc35-442e-bcdc-5d35fd16d0b7", "DetectTime": "2024-05-21T12:31:20.393748+00:00", "EventTime": "2024-05-21T12:31:20.393770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 27.7.36.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGibAg3N3NMKLSt47c"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c0065d0f-b4c2-414c-8ac2-edf7877f7ba5", "DetectTime": "2024-05-21T12:31:20.403558+00:00", "EventTime": "2024-05-21T12:31:20.403578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4TH7r1F7fQceRkxF7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2f6ca5f6-283f-45ca-820e-d3d93c377e33", "DetectTime": "2024-05-21T12:31:20.414910+00:00", "EventTime": "2024-05-21T12:31:20.414932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9tPg2MIqtA5NuTwj"], "accumulated_threat_level": 12.500000000000004, "timewindow": 62} +{"Format": "Json", "ID": "2f6ca5f6-283f-45ca-820e-d3d93c377e33", "DetectTime": "2024-05-21T12:31:20.414910+00:00", "EventTime": "2024-05-21T12:31:20.414932+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "1970-01-03T13:25:43.909717+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2024/05/21 12:31:20.604114)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 62, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "e7d08765-a778-4583-972a-b38d9adf1890", "DetectTime": "2024-05-21T12:31:20.607988+00:00", "EventTime": "2024-05-21T12:31:20.608005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.224.186.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQX7nK36VWr59SdX2g"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "50f578a1-647d-4860-86cf-f04d9cda7f73", "DetectTime": "2024-05-21T12:31:20.612624+00:00", "EventTime": "2024-05-21T12:31:20.612648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2tCRAIA0WQBBch4f"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5cbdfd0e-2a9c-4647-9e65-aab5250d67f3", "DetectTime": "2024-05-21T12:31:20.758194+00:00", "EventTime": "2024-05-21T12:31:20.758215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.69.218.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIFixPkyqJMXG4q8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "db5a06d6-da17-4dd2-a94a-c3753f861373", "DetectTime": "2024-05-21T12:31:20.763438+00:00", "EventTime": "2024-05-21T12:31:20.763459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIcQM1nn2VYjw7ZH4"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "3902675d-bfa9-4eda-bd26-0b74f21904a5", "DetectTime": "2024-05-21T12:31:20.835965+00:00", "EventTime": "2024-05-21T12:31:20.835985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXQZIehgTPkyI8G3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "351c1a59-b369-46b6-aee6-e586829a75c1", "DetectTime": "2024-05-21T12:31:20.843953+00:00", "EventTime": "2024-05-21T12:31:20.843975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.64.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC3GtY258JeXtv7O9k"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "6fa31261-10c8-460f-b4bf-45b114982433", "DetectTime": "2024-05-21T12:31:20.849419+00:00", "EventTime": "2024-05-21T12:31:20.849438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAyQtK3A9ESbvEtNdh"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "8bb4bac1-01a1-4331-b08f-02bc7013864b", "DetectTime": "2024-05-21T12:31:20.854001+00:00", "EventTime": "2024-05-21T12:31:20.854021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmhnuqmNpXFnzVUh"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e92d76cf-a309-40c3-b640-9ea3f499ee04", "DetectTime": "2024-05-21T12:31:20.859369+00:00", "EventTime": "2024-05-21T12:31:20.859392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.89.101.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWSUbTn9lkSI0y8zi"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "390605cb-74dc-4185-be45-d7cc07faea00", "DetectTime": "2024-05-21T12:31:20.903610+00:00", "EventTime": "2024-05-21T12:31:20.903631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.64.144.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmM4Kr3cI8hRFXYui3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2ee1993d-bbc6-4a71-bb98-821b1ce90bb7", "DetectTime": "2024-05-21T12:31:20.932980+00:00", "EventTime": "2024-05-21T12:31:20.933001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9fEk2FlVMyQn3GRj"], "accumulated_threat_level": 0.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "fd029128-9fff-43a8-8893-618d067feca2", "DetectTime": "2024-05-21T12:31:21.038254+00:00", "EventTime": "2024-05-21T12:31:21.038276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.92.21.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CESe3d4mMgP5bvXUal"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "edb4fbd1-8c1f-41cb-9154-3b0b7d6ec5ff", "DetectTime": "2024-05-21T12:31:21.286371+00:00", "EventTime": "2024-05-21T12:31:21.286390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx8RkY1BSKhHYRbZ37"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "ea8ffee0-44b2-49f6-8fe8-223cfe24512f", "DetectTime": "2024-05-21T12:31:21.344288+00:00", "EventTime": "2024-05-21T12:31:21.344306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLjnG6utsLYSzEQ7"], "accumulated_threat_level": 1.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "d78be835-d426-4708-bfdb-da69dd64a6d9", "DetectTime": "2024-05-21T12:31:21.349265+00:00", "EventTime": "2024-05-21T12:31:21.349289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.10.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdtFY3zMx4Cxd3i0h"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "f8f9fb56-79b0-46c9-9c71-446c8cea4828", "DetectTime": "2024-05-21T12:31:21.356955+00:00", "EventTime": "2024-05-21T12:31:21.356977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.195.190 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5kK70XFZTjJemO6"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c2ec2323-4420-4af1-b7ee-08ee9a1e338d", "DetectTime": "2024-05-21T12:31:21.369991+00:00", "EventTime": "2024-05-21T12:31:21.370014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.87.88.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuXqT17P5WXiZ7aY9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "64405182-c4d5-4cc8-b88f-00c25ad7dba9", "DetectTime": "2024-05-21T12:31:21.399894+00:00", "EventTime": "2024-05-21T12:31:21.399913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw25eHYhUZCi83s7j"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "cd069d7c-1c27-4e30-8492-da7c57d379b5", "DetectTime": "2024-05-21T12:31:21.428004+00:00", "EventTime": "2024-05-21T12:31:21.428025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.103.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8Y401Q11Iz1T2Fm1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "ef3336a3-5705-4311-a8af-bf2d774690d5", "DetectTime": "2024-05-21T12:31:21.512706+00:00", "EventTime": "2024-05-21T12:31:21.512725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBumU34862pYxwwTD7"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "af824bea-b86c-4b09-a82a-b255040be2eb", "DetectTime": "2024-05-21T12:31:21.518161+00:00", "EventTime": "2024-05-21T12:31:21.518180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.149.104.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAAJD36swqksflcQ"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "997cfeb8-0236-4d50-9b93-6d95023fac28", "DetectTime": "2024-05-21T12:31:21.593030+00:00", "EventTime": "2024-05-21T12:31:21.593050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d4Sd4C3eUqRoS5I7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 62} +{"Format": "IDEA0", "ID": "13d4afc2-b1d2-4ef5-886f-486bfdb30a8c", "DetectTime": "2024-05-21T12:31:21.598196+00:00", "EventTime": "2024-05-21T12:31:21.598214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.133.70.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C68GYPh1IniluJLY2"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "958439a6-6e3f-4416-94f5-0c4541e3bb9a", "DetectTime": "2024-05-21T12:31:21.804138+00:00", "EventTime": "2024-05-21T12:31:21.804161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.241.253.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqadqq1Qb6uhpsMbnb"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "bf21a0e2-ba34-4144-ae89-9abdb0d9a33a", "DetectTime": "2024-05-21T12:31:21.827841+00:00", "EventTime": "2024-05-21T12:31:21.827862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.97.73.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR8tG71SWyPdHcDo51"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "e1eb6bbe-80bc-46a6-ac62-5376ef9d64d0", "DetectTime": "2024-05-21T12:31:21.878186+00:00", "EventTime": "2024-05-21T12:31:21.878207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.223.54.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHOaG1mpUy27hdAx8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a7613770-2895-4d7a-97b6-2924887b261b", "DetectTime": "2024-05-21T12:31:21.883139+00:00", "EventTime": "2024-05-21T12:31:21.883158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 120.63.10.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbAx552zhf5kkNhnNb"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "ef374432-c310-487f-a126-7c3b2ec54ef8", "DetectTime": "2024-05-21T12:31:21.888341+00:00", "EventTime": "2024-05-21T12:31:21.888359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2GP7r1pN0an2yUZf9"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "49f4b761-8241-41d5-b66e-0916abbadb38", "DetectTime": "2024-05-21T12:31:21.892879+00:00", "EventTime": "2024-05-21T12:31:21.892897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.240.31.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE7UsX1LuoAf9ppbUa"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "ce9f9fb0-837a-4df8-87a2-fcf5c5b7fef4", "DetectTime": "2024-05-21T12:31:21.907793+00:00", "EventTime": "2024-05-21T12:31:21.907811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjx57M263WeeC7gQP9"], "accumulated_threat_level": 3.2, "timewindow": 62} +{"Format": "IDEA0", "ID": "af849c8a-d70f-49d5-8e49-667d68ae6737", "DetectTime": "2024-05-21T12:31:22.001143+00:00", "EventTime": "2024-05-21T12:31:22.001161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8n2563YkUkXNjTkC9"], "accumulated_threat_level": 4.0, "timewindow": 62} +{"Format": "IDEA0", "ID": "cc7dba2d-d375-416d-a605-857a307c868f", "DetectTime": "2024-05-21T12:31:22.035056+00:00", "EventTime": "2024-05-21T12:31:22.035076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.96.31.105"]}], "Attach": [{"Content": "Connection to unknown destination port 27376/UDP destination IP 41.96.31.105. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgX44Z3LmsBrHjCwFl"], "accumulated_threat_level": 4.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "99485c19-6329-42ef-8657-5f1b4ae2fc0a", "DetectTime": "2024-05-21T12:31:22.068997+00:00", "EventTime": "2024-05-21T12:31:22.069014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLcnX3e3CY6doXNGg"], "accumulated_threat_level": 5.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "f01d2340-cf63-48ce-88d2-7347fa2de8c1", "DetectTime": "2024-05-21T12:31:22.106565+00:00", "EventTime": "2024-05-21T12:31:22.106585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySoSc4yoHwoDw7Rzf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 62} +{"Format": "IDEA0", "ID": "c2c463c3-8f12-4708-b805-4f6bc26c832e", "DetectTime": "2024-05-21T12:31:22.340084+00:00", "EventTime": "2024-05-21T12:31:22.340103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtAilO11tZJqYwEpy6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "9effa523-bdbf-4be0-bc68-4e0543b6f806", "DetectTime": "2024-05-21T12:31:22.373525+00:00", "EventTime": "2024-05-21T12:31:22.373543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaliMy37XWvcS1JyKh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "561d591a-27a3-43c2-b8a9-a14ce3641a50", "DetectTime": "2024-05-21T12:31:22.400322+00:00", "EventTime": "2024-05-21T12:31:22.400343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5QxlV2mizf88T1mcl"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "66956d25-f7d0-4f84-8ce3-36cc5ade498e", "DetectTime": "2024-05-21T12:31:22.440293+00:00", "EventTime": "2024-05-21T12:31:22.440313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOC1k2jwL8QXTgrU2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "e5a29e37-0f39-4d73-9f1b-d87d555d11c6", "DetectTime": "2024-05-21T12:31:22.474571+00:00", "EventTime": "2024-05-21T12:31:22.474590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5uda2EvJGFMvXR48"], "accumulated_threat_level": 9.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "968260a3-16fd-492c-9cfe-a727fcb56ef7", "DetectTime": "2024-05-21T12:31:22.510963+00:00", "EventTime": "2024-05-21T12:31:22.510980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMawUq1MzQrW4KdFYc"], "accumulated_threat_level": 10.4, "timewindow": 62} +{"Format": "IDEA0", "ID": "5e3f89fd-3d5b-4b7f-8ffb-b5e83f7af6b3", "DetectTime": "2024-05-21T12:31:22.544996+00:00", "EventTime": "2024-05-21T12:31:22.545026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDbm12grBVu6Poyc8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 62} +{"Format": "IDEA0", "ID": "3a74b396-9494-4e13-81f6-f4a51350ae90", "DetectTime": "2024-05-21T12:31:22.560112+00:00", "EventTime": "2024-05-21T12:31:22.560132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3h9zA34Bm3822WBAk", "C1mjiULlxXPDrIO7b", "C66Mok38p3JDl9VAe", "CHv8yD1rsOKI7LEVC3"], "accumulated_threat_level": 11.700000000000001, "timewindow": 62} +{"Format": "IDEA0", "ID": "22740c07-1770-46cb-9061-867e69244212", "DetectTime": "2024-05-21T12:31:22.586367+00:00", "EventTime": "2024-05-21T12:31:22.586388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMUCRR3Q90Otkr7kUh"], "accumulated_threat_level": 12.500000000000002, "timewindow": 62} +{"Format": "Json", "ID": "22740c07-1770-46cb-9061-867e69244212", "DetectTime": "2024-05-21T12:31:22.586367+00:00", "EventTime": "2024-05-21T12:31:22.586388+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "1970-01-03T13:26:03.754807+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2024/05/21 12:31:22.784645)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 62, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "d5eb7fcd-2e45-4dbe-ae86-bd6efe3b7089", "DetectTime": "2024-05-21T12:31:22.807204+00:00", "EventTime": "2024-05-21T12:31:22.807222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFB5Vo1gxtS8eLUmMg"], "accumulated_threat_level": 0.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "4310bad3-6fa3-4538-b831-dce6d467e46a", "DetectTime": "2024-05-21T12:31:22.811849+00:00", "EventTime": "2024-05-21T12:31:22.811866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C11eAp2u3E2La9wCIl"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c7dd875a-28ed-43c0-812c-6fe43136ae3e", "DetectTime": "2024-05-21T12:31:22.822288+00:00", "EventTime": "2024-05-21T12:31:22.822307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3y2N1MMciq750Ys"], "accumulated_threat_level": 1.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "bbc9a595-a53a-48d0-b6c5-2310d1921ba1", "DetectTime": "2024-05-21T12:31:22.938996+00:00", "EventTime": "2024-05-21T12:31:22.939014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6aSgIv9ZxYEyKP2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 62} +{"Format": "IDEA0", "ID": "95dd9bad-6cae-48f9-8e52-7add6b8511bd", "DetectTime": "2024-05-21T12:31:22.963591+00:00", "EventTime": "2024-05-21T12:31:22.963612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.73.228.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI0f3P2EUcFnDxbSTk"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "30c97875-6afa-4ad1-a9e5-1fa2f5cb05cf", "DetectTime": "2024-05-21T12:31:22.993813+00:00", "EventTime": "2024-05-21T12:31:22.993833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ8m4F48G3LDodTsK4"], "accumulated_threat_level": 3.2, "timewindow": 62} +{"Format": "IDEA0", "ID": "1c3a1c83-455e-41bd-89bd-c048ab0de876", "DetectTime": "2024-05-21T12:31:23.019821+00:00", "EventTime": "2024-05-21T12:31:23.019840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1SWr3E4SSIAKLaze"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "6d217f37-6cb2-46e6-b25d-1783759580bf", "DetectTime": "2024-05-21T12:31:23.058493+00:00", "EventTime": "2024-05-21T12:31:23.058515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClacF64sjP0sBiR8Bd"], "accumulated_threat_level": 4.0, "timewindow": 62} +{"Format": "IDEA0", "ID": "9eb72fe7-4177-4d17-a2e4-e4f951116ade", "DetectTime": "2024-05-21T12:31:23.081294+00:00", "EventTime": "2024-05-21T12:31:23.081317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0dLt4CU0tRy5hdv1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "4809d7e8-7ca4-468a-bfc4-56be7cb81918", "DetectTime": "2024-05-21T12:31:23.117025+00:00", "EventTime": "2024-05-21T12:31:23.117046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.185.46.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzxFJy2xUY0c03gD1g"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2ad491a7-e133-40cb-b346-d26d15ff3195", "DetectTime": "2024-05-21T12:31:23.144661+00:00", "EventTime": "2024-05-21T12:31:23.144682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2OL4x42cniuHQFvol"], "accumulated_threat_level": 4.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "98951575-c8d0-47bc-829b-8a7d61dcee20", "DetectTime": "2024-05-21T12:31:23.170395+00:00", "EventTime": "2024-05-21T12:31:23.170426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.162.184.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjNMwf1HkEJHD0h8Sa"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "c254889f-2a53-46d2-8a06-46cddaa847c8", "DetectTime": "2024-05-21T12:31:23.200867+00:00", "EventTime": "2024-05-21T12:31:23.200889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0I9Vx3wNXVOnPMK5b"], "accumulated_threat_level": 5.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "5a1d5f0e-7389-4b4d-be49-533d4e3488d7", "DetectTime": "2024-05-21T12:31:23.229103+00:00", "EventTime": "2024-05-21T12:31:23.229124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.179.199.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1gcG03UHnvOn6vfO"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5b93df4b-48b4-424a-b171-01d7f30b95b5", "DetectTime": "2024-05-21T12:31:23.270796+00:00", "EventTime": "2024-05-21T12:31:23.270817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.132.152.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwGx6k4BTP2spkdNSj"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "2cca194c-1dc5-4456-8908-a5521f4857a3", "DetectTime": "2024-05-21T12:31:23.359088+00:00", "EventTime": "2024-05-21T12:31:23.359108+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNtYt1LwieSywoVRj"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "b9d9756b-db7c-489e-be03-84718ea9b4a5", "DetectTime": "2024-05-21T12:31:23.372411+00:00", "EventTime": "2024-05-21T12:31:23.372434+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNtYt1LwieSywoVRj"], "accumulated_threat_level": 6.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "a68958a0-7dd8-4caf-a374-5d510724d5e0", "DetectTime": "2024-05-21T12:31:23.446485+00:00", "EventTime": "2024-05-21T12:31:23.446504+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTQI6gyHak3dwwgi"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e813fca9-6c6c-43b0-974b-de0ac3bd9563", "DetectTime": "2024-05-21T12:31:23.458706+00:00", "EventTime": "2024-05-21T12:31:23.458725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTQI6gyHak3dwwgi"], "accumulated_threat_level": 7.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "cdcbb30e-abb2-4b54-99fb-f7922f898b9a", "DetectTime": "2024-05-21T12:31:23.513294+00:00", "EventTime": "2024-05-21T12:31:23.513314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqGXt3la6Mown41tb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 62} +{"Format": "IDEA0", "ID": "4258bb5a-a3de-47fb-a7de-75f484d6bb82", "DetectTime": "2024-05-21T12:31:23.551639+00:00", "EventTime": "2024-05-21T12:31:23.551661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0nqjVq7sEjpfBVSb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "5082a786-9970-4ce4-8d0e-9b78a99779a0", "DetectTime": "2024-05-21T12:31:23.556680+00:00", "EventTime": "2024-05-21T12:31:23.556698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNZvk1oL1jtZDbdp3"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "dd4ea9cd-01d7-4ee3-be84-2c8d0f2438af", "DetectTime": "2024-05-21T12:31:23.607739+00:00", "EventTime": "2024-05-21T12:31:23.607758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvetJwUccQlSYLL73"], "accumulated_threat_level": 7.999999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "be67b795-4e05-4094-a41a-0b39de01ced2", "DetectTime": "2024-05-21T12:31:23.645129+00:00", "EventTime": "2024-05-21T12:31:23.645148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COa7tW25Ibyovoexh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "1557e5dc-71b5-4766-be13-c8bf9836e605", "DetectTime": "2024-05-21T12:31:23.664570+00:00", "EventTime": "2024-05-21T12:31:23.664592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAOm7e4vMuwQKhD8ua"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "bb728868-00b5-456b-b5ba-cef03a70fb3f", "DetectTime": "2024-05-21T12:31:23.694968+00:00", "EventTime": "2024-05-21T12:31:23.694989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.250.36.53 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASYen4jfU3pS5FJYc"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "1377d951-6a62-46bf-91b2-13dd3b1b6327", "DetectTime": "2024-05-21T12:31:23.732510+00:00", "EventTime": "2024-05-21T12:31:23.732529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.240.31.91"]}], "Attach": [{"Content": "Connection to unknown destination port 15876/UDP destination IP 88.240.31.91. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpI3Ge1iL4bagr4A42"], "accumulated_threat_level": 9.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "f1b87067-7946-4e74-b807-673bfe533c56", "DetectTime": "2024-05-21T12:31:23.738088+00:00", "EventTime": "2024-05-21T12:31:23.738109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjOKo1YSfP5eCxxNl"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "5aeaf57e-4ae6-4c27-86bf-e73e9c21caf6", "DetectTime": "2024-05-21T12:31:23.753294+00:00", "EventTime": "2024-05-21T12:31:23.753313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.88.182.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoqrLO14PjHF3C1N29"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "955efc81-69be-4bce-894b-c790004722ed", "DetectTime": "2024-05-21T12:31:23.816751+00:00", "EventTime": "2024-05-21T12:31:23.816769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.118.30.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpTsG4MNMzaZZGVL1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "44c00db6-5c45-40b0-a3a0-4264356778d3", "DetectTime": "2024-05-21T12:31:23.825019+00:00", "EventTime": "2024-05-21T12:31:23.825040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBe4o2Qz5ufzw6Ta5"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "aaf322d3-74a6-4d57-88ea-6e14b4c84c5c", "DetectTime": "2024-05-21T12:31:23.877796+00:00", "EventTime": "2024-05-21T12:31:23.877815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUXJB1YB8Tt5m60cf"], "accumulated_threat_level": 10.4, "timewindow": 62} +{"Format": "IDEA0", "ID": "7d6c9771-6584-4006-b9d8-46f23e06ce06", "DetectTime": "2024-05-21T12:31:23.883083+00:00", "EventTime": "2024-05-21T12:31:23.883101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.93.155.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHzbz1unK1HAPwUi1"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "a31dd878-897c-42be-a881-eed87bc83b07", "DetectTime": "2024-05-21T12:31:23.887738+00:00", "EventTime": "2024-05-21T12:31:23.887756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.234.117.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CefzzpwOqCPMqJ7A6"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "86a8f0e2-aa76-4e19-baab-25d13dd31cca", "DetectTime": "2024-05-21T12:31:23.950235+00:00", "EventTime": "2024-05-21T12:31:23.950258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.29.213.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDiIig2kAZWTYyOVCd"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "166797eb-970a-41a3-bbb8-b29cd19a8d08", "DetectTime": "2024-05-21T12:31:23.977721+00:00", "EventTime": "2024-05-21T12:31:23.977741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.51.77.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbmfy22m3vXzYl8Lo8"], "accumulated_threat_level": 3.2, "timewindow": 60} +{"Format": "IDEA0", "ID": "7969522e-b415-4b73-924a-f9b45d01a0a8", "DetectTime": "2024-05-21T12:31:24.008781+00:00", "EventTime": "2024-05-21T12:31:24.008800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZEOJYEtZihjnJd3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 62} +{"Format": "IDEA0", "ID": "f6324ced-94a1-4ca6-b582-fa2a49451ae4", "DetectTime": "2024-05-21T12:31:24.034528+00:00", "EventTime": "2024-05-21T12:31:24.034547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6EwE2df2hwTX37T8"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "3265c3f3-e3b6-42f2-bf62-d9774f6a351d", "DetectTime": "2024-05-21T12:31:24.069240+00:00", "EventTime": "2024-05-21T12:31:24.069258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "Connection to unknown destination port 10452/UDP destination IP 122.162.184.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctHEX1iWEzEBqQzle"], "accumulated_threat_level": 12.000000000000002, "timewindow": 62} +{"Format": "Json", "ID": "3265c3f3-e3b6-42f2-bf62-d9774f6a351d", "DetectTime": "2024-05-21T12:31:24.069240+00:00", "EventTime": "2024-05-21T12:31:24.069258+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.162.184.60"]}], "Attach": [{"Content": "1970-01-03T13:26:25.068444+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2024/05/21 12:31:24.248564)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 62, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9e908549-45c0-415d-a61b-ae657846ddf5", "DetectTime": "2024-05-21T12:31:24.263144+00:00", "EventTime": "2024-05-21T12:31:24.263164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmzl1J3ZjNC1dtQee3"], "accumulated_threat_level": 0.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "5e69e0e4-4464-4cda-9ab2-22550dea0769", "DetectTime": "2024-05-21T12:31:24.348746+00:00", "EventTime": "2024-05-21T12:31:24.348766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKe9s9eknlGBqYMWb"], "accumulated_threat_level": 1.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "bebac036-343a-44ec-82b9-d0d47eb13323", "DetectTime": "2024-05-21T12:31:24.588851+00:00", "EventTime": "2024-05-21T12:31:24.588872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCzVO2h2ljMK2C47c"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "626a8ddf-5349-4341-89e6-b623b14ca935", "DetectTime": "2024-05-21T12:31:24.616550+00:00", "EventTime": "2024-05-21T12:31:24.616568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjZ6DY2RTs2Cn8hTLe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 62} +{"Format": "IDEA0", "ID": "8214db61-ece7-40c2-bfaa-18ac41e847c8", "DetectTime": "2024-05-21T12:31:24.640593+00:00", "EventTime": "2024-05-21T12:31:24.640616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGCO6KVOT2xdvhdl"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "265bcc94-7268-4d94-8c58-31828f8147a3", "DetectTime": "2024-05-21T12:31:24.670059+00:00", "EventTime": "2024-05-21T12:31:24.670078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuVK9X1fYJFdgfgUf9"], "accumulated_threat_level": 3.2, "timewindow": 62} +{"Format": "IDEA0", "ID": "ca3ef94f-d5f9-4d63-b893-b52c0522f4ea", "DetectTime": "2024-05-21T12:31:24.705398+00:00", "EventTime": "2024-05-21T12:31:24.705418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsH4t27wSsUMeDIG8"], "accumulated_threat_level": 4.0, "timewindow": 62} +{"Format": "IDEA0", "ID": "4214124b-1d4a-4f8c-b5d3-9b2e895feee3", "DetectTime": "2024-05-21T12:31:24.729070+00:00", "EventTime": "2024-05-21T12:31:24.729089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnM9Yc3B3Id1Ml5OFh"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "80d35951-d153-43a1-82c3-82a269bc6050", "DetectTime": "2024-05-21T12:31:24.764032+00:00", "EventTime": "2024-05-21T12:31:24.764054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbHHi4PmO6Eio39wb"], "accumulated_threat_level": 4.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "b3915348-a577-4c95-baea-3647cff62619", "DetectTime": "2024-05-21T12:31:24.797011+00:00", "EventTime": "2024-05-21T12:31:24.797029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIRKD44YlmlRD54q2"], "accumulated_threat_level": 5.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "b52ea0af-512b-42a1-b817-7cc2f216db09", "DetectTime": "2024-05-21T12:31:24.870127+00:00", "EventTime": "2024-05-21T12:31:24.870148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdY76y4kM1Ec5WIMz2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 62} +{"Format": "IDEA0", "ID": "9af2a098-4bf1-4900-bca7-099f6cca8f01", "DetectTime": "2024-05-21T12:31:24.893625+00:00", "EventTime": "2024-05-21T12:31:24.893645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqD4IB4qzYaV28gJZd"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "c981ef04-f0c0-4983-877b-daaf335ca09e", "DetectTime": "2024-05-21T12:31:24.921553+00:00", "EventTime": "2024-05-21T12:31:24.921572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiiaSc4SoRmhpZeDpc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "ba004696-da5d-4d2c-9a75-aee275ce4912", "DetectTime": "2024-05-21T12:31:24.996426+00:00", "EventTime": "2024-05-21T12:31:24.996444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlCGp2PfhpIwKXXOi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "11946f6e-f9e4-428b-b7e7-71c67c0019a9", "DetectTime": "2024-05-21T12:31:25.029634+00:00", "EventTime": "2024-05-21T12:31:25.029653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Lo643piulum0iHi2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "8ea98750-a15f-48f6-8962-a15267994c1d", "DetectTime": "2024-05-21T12:31:25.056765+00:00", "EventTime": "2024-05-21T12:31:25.056787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgetws1g97nEgL12o2"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "681790ee-6c5e-4e09-9c91-a58674e65edf", "DetectTime": "2024-05-21T12:31:25.085970+00:00", "EventTime": "2024-05-21T12:31:25.085992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJ55C2OazBBFm7uNk"], "accumulated_threat_level": 9.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "5a648cbe-ebac-4b24-9f8c-5abfbc3266ae", "DetectTime": "2024-05-21T12:31:25.107956+00:00", "EventTime": "2024-05-21T12:31:25.107977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIsOa4FZXJDdlDXqe"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "13a8684c-874f-4ad4-89db-653f7387fd62", "DetectTime": "2024-05-21T12:31:25.140801+00:00", "EventTime": "2024-05-21T12:31:25.140820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNbcK2HE45Lkeh3gl"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "dec80cd8-0480-4b5e-b739-b428d75abe54", "DetectTime": "2024-05-21T12:31:25.169317+00:00", "EventTime": "2024-05-21T12:31:25.169336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtcDmn20hLXoaBopDj"], "accumulated_threat_level": 10.4, "timewindow": 62} +{"Format": "IDEA0", "ID": "534187f8-524c-4aa7-afa7-13b736292d3a", "DetectTime": "2024-05-21T12:31:25.193073+00:00", "EventTime": "2024-05-21T12:31:25.193092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.99.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChONuhitfvVrXk0n5"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "5686cc77-c229-4c70-b566-d79e493b9e3e", "DetectTime": "2024-05-21T12:31:25.223046+00:00", "EventTime": "2024-05-21T12:31:25.223065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.239.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HzCi342AuYp6jCY3"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "2e9d8a61-db40-4c2f-847b-2145d7244080", "DetectTime": "2024-05-21T12:31:25.258936+00:00", "EventTime": "2024-05-21T12:31:25.258953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEflO72fFB8lAb73Zf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 62} +{"Format": "IDEA0", "ID": "54e23753-bdc4-472b-8110-0a50e1911031", "DetectTime": "2024-05-21T12:31:25.277836+00:00", "EventTime": "2024-05-21T12:31:25.277855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUStlxfpiRvpgUXRb"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "7d81a214-043a-4bd4-a7cb-aa77f5620ebd", "DetectTime": "2024-05-21T12:31:25.312681+00:00", "EventTime": "2024-05-21T12:31:25.312703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXbZQ33jxGKF8TSZ2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 62} +{"Format": "Json", "ID": "7d81a214-043a-4bd4-a7cb-aa77f5620ebd", "DetectTime": "2024-05-21T12:31:25.312681+00:00", "EventTime": "2024-05-21T12:31:25.312703+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "1970-01-03T13:57:50.803099+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2024/05/21 12:31:25.520926)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 62, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "157b7f51-0d56-41d9-a182-b9d3710b06a6", "DetectTime": "2024-05-21T12:31:25.525759+00:00", "EventTime": "2024-05-21T12:31:25.525778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfZmg2PsCpuhHcuzf"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "821638d1-c777-4d03-ab17-2e91a3926f90", "DetectTime": "2024-05-21T12:31:25.530604+00:00", "EventTime": "2024-05-21T12:31:25.530622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQpHZWBPNAcbClV4"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "565221f0-09f5-430e-ac02-3791b29593df", "DetectTime": "2024-05-21T12:31:25.534967+00:00", "EventTime": "2024-05-21T12:31:25.534985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6BPNg3X8I6lhXp5hc", "CvmIXA2DKYnF66roY6", "CEgZ4O2sxI4S6ufpve", "CUhI1CbrBrVmiwvhg"], "accumulated_threat_level": 0.5, "timewindow": 62} +{"Format": "IDEA0", "ID": "624cd9f6-5a3f-4a9f-81b1-432bf8a70b7e", "DetectTime": "2024-05-21T12:31:25.548004+00:00", "EventTime": "2024-05-21T12:31:25.548025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGgjC4Ma81Aq8c5T3"], "accumulated_threat_level": 1.3, "timewindow": 62} +{"Format": "IDEA0", "ID": "227c9f90-f2f5-4fcc-831c-448309db74d3", "DetectTime": "2024-05-21T12:31:25.561482+00:00", "EventTime": "2024-05-21T12:31:25.561499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaHaS1724q68B4T2a"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "4ac0f4c9-fd7c-4d49-9bde-319718b7623f", "DetectTime": "2024-05-21T12:31:25.572818+00:00", "EventTime": "2024-05-21T12:31:25.572838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9qmi3sNfupUE3Bee"], "accumulated_threat_level": 2.1, "timewindow": 62} +{"Format": "IDEA0", "ID": "af06456c-8382-4c39-87e5-d58f68b66ad2", "DetectTime": "2024-05-21T12:31:25.578110+00:00", "EventTime": "2024-05-21T12:31:25.578129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjRIZB3XSIqfR4hxsd"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "d0d79a11-e7b5-4145-859f-ad10b95c51ab", "DetectTime": "2024-05-21T12:31:25.582711+00:00", "EventTime": "2024-05-21T12:31:25.582730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKGKW1WwvoS8v39m9"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "fe511a76-bc7c-4fc7-a524-361961913987", "DetectTime": "2024-05-21T12:31:25.629002+00:00", "EventTime": "2024-05-21T12:31:25.629022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["80.183.69.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7588/UDP destination IP 80.183.69.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWtBV1IiUPh9pDyf2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 62} +{"Format": "IDEA0", "ID": "443b0cb3-0972-4339-aeb9-b68326ae0f47", "DetectTime": "2024-05-21T12:31:25.729788+00:00", "EventTime": "2024-05-21T12:31:25.729811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.31.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxBYd3jmZ75E0H839"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "5363e09f-bbd4-450e-ac27-be50aba651fa", "DetectTime": "2024-05-21T12:31:25.763553+00:00", "EventTime": "2024-05-21T12:31:25.763576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1dMJq4uhMWXHSM6M2"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "a5ebdfc0-45cc-440c-913d-39d564610754", "DetectTime": "2024-05-21T12:31:25.797773+00:00", "EventTime": "2024-05-21T12:31:25.797796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.199.106.53 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqoSTcWRI7YEyyby3"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "b0ba58a4-86b9-4018-8cbf-d0fffa8ec9e6", "DetectTime": "2024-05-21T12:31:25.844652+00:00", "EventTime": "2024-05-21T12:31:25.844673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cworuo13TFSSNVmE1h"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "58135d58-4af9-44a2-aa47-27925ac177a4", "DetectTime": "2024-05-21T12:31:25.877063+00:00", "EventTime": "2024-05-21T12:31:25.877084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C377cy2uMzcqjrSwul"], "accumulated_threat_level": 3.7, "timewindow": 62} +{"Format": "IDEA0", "ID": "9d9992a0-0bf0-47d8-97b6-f99b004e95af", "DetectTime": "2024-05-21T12:31:25.902472+00:00", "EventTime": "2024-05-21T12:31:25.902493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7RlY52M2ISqEkPzE1"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "55c36fd7-1df5-4e84-8e39-ae6e2e5aa60b", "DetectTime": "2024-05-21T12:31:25.939048+00:00", "EventTime": "2024-05-21T12:31:25.939067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88XAx3nieglc6D3P9"], "accumulated_threat_level": 4.5, "timewindow": 62} +{"Format": "IDEA0", "ID": "5410d125-9167-4499-8e84-77080ebc3133", "DetectTime": "2024-05-21T12:31:25.952270+00:00", "EventTime": "2024-05-21T12:31:25.952292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgbpa3qs1VkXRkLv"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "26d24ec5-e428-46c4-8bb6-07188608799f", "DetectTime": "2024-05-21T12:31:25.983932+00:00", "EventTime": "2024-05-21T12:31:25.983952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRiJc3zNj4JF3O3oi"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "3c6a0590-ca45-4475-a0cd-c0317eaaf083", "DetectTime": "2024-05-21T12:31:26.030401+00:00", "EventTime": "2024-05-21T12:31:26.030448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCafULwV39PjyiV8"], "accumulated_threat_level": 5.3, "timewindow": 62} +{"Format": "IDEA0", "ID": "b2b4a7a7-3354-4818-bf31-848bcea5ab5a", "DetectTime": "2024-05-21T12:31:26.035265+00:00", "EventTime": "2024-05-21T12:31:26.035284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXRc841NT2YK1NuJ6"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "4414ca0a-7829-451a-a4c6-a4ea2ff88169", "DetectTime": "2024-05-21T12:31:26.071949+00:00", "EventTime": "2024-05-21T12:31:26.071974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsFOt1wkAbz3c8eAl"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "6ed9ccd5-0823-46fb-b864-0974fa0b24f3", "DetectTime": "2024-05-21T12:31:26.110350+00:00", "EventTime": "2024-05-21T12:31:26.110369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.212.59.249"]}], "Attach": [{"Content": "Connection to unknown destination port 21795/UDP destination IP 62.212.59.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiumq4EHCCmzPiezd"], "accumulated_threat_level": 6.1, "timewindow": 62} +{"Format": "IDEA0", "ID": "067757a0-2da1-4f25-ad0e-d2f2bf565a72", "DetectTime": "2024-05-21T12:31:26.114948+00:00", "EventTime": "2024-05-21T12:31:26.114965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.3.142.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxIUfX2sxcWALdkeFa"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "f93c2567-7da0-43ea-9c73-88f576acc62d", "DetectTime": "2024-05-21T12:31:26.153578+00:00", "EventTime": "2024-05-21T12:31:26.153597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtQeRb1W4ZbuIAM4u6"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "38817039-17d8-4615-a522-fe2599d97980", "DetectTime": "2024-05-21T12:31:26.183663+00:00", "EventTime": "2024-05-21T12:31:26.183682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdhM9dvELDXRgHe5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 62} +{"Format": "IDEA0", "ID": "4623370e-5313-42f5-8be0-eb4a80dcee65", "DetectTime": "2024-05-21T12:31:26.220863+00:00", "EventTime": "2024-05-21T12:31:26.220882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7NvHPfvxHrr0sNHl"], "accumulated_threat_level": 7.699999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "3721897c-9eb4-4abc-9524-c1ee9fb746f1", "DetectTime": "2024-05-21T12:31:26.242562+00:00", "EventTime": "2024-05-21T12:31:26.242582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwun5t12wRYuZv7Bu6"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "4d532d90-46e4-4125-afb0-ac83f9eca6a7", "DetectTime": "2024-05-21T12:31:26.286065+00:00", "EventTime": "2024-05-21T12:31:26.286085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZNWB2Y6rARWa4lr5"], "accumulated_threat_level": 8.5, "timewindow": 62} +{"Format": "IDEA0", "ID": "ba8dde6b-4657-44b7-bf19-d01cbdcd0d7d", "DetectTime": "2024-05-21T12:31:26.309643+00:00", "EventTime": "2024-05-21T12:31:26.309664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdONm1DTf0MqKNGsf"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "f6d55157-f87a-479d-b324-093e26f355a9", "DetectTime": "2024-05-21T12:31:26.340676+00:00", "EventTime": "2024-05-21T12:31:26.340695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqkRc3xclMY8Qoem5"], "accumulated_threat_level": 9.3, "timewindow": 62} +{"Format": "IDEA0", "ID": "694111ee-492f-4376-8776-b10cd18f57c7", "DetectTime": "2024-05-21T12:31:26.378025+00:00", "EventTime": "2024-05-21T12:31:26.378043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPddzOU9cBhBmpdni"], "accumulated_threat_level": 10.100000000000001, "timewindow": 62} +{"Format": "IDEA0", "ID": "a9107045-61ef-42de-8518-70e71b597014", "DetectTime": "2024-05-21T12:31:26.404331+00:00", "EventTime": "2024-05-21T12:31:26.404353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUSQ86Lb9piPqdVc"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "dff704dc-258f-4ea0-a95c-480d965c30c2", "DetectTime": "2024-05-21T12:31:26.416203+00:00", "EventTime": "2024-05-21T12:31:26.416221+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNKyG4dmXuVV2Wknh"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "5d52c57d-601a-4a2f-9a31-1445494ab434", "DetectTime": "2024-05-21T12:31:26.429998+00:00", "EventTime": "2024-05-21T12:31:26.430020+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNKyG4dmXuVV2Wknh"], "accumulated_threat_level": 7.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "8f89a2c9-48ef-495f-850e-db17c407be06", "DetectTime": "2024-05-21T12:31:26.440662+00:00", "EventTime": "2024-05-21T12:31:26.440681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHXvfdsujqLbdoQ9"], "accumulated_threat_level": 10.900000000000002, "timewindow": 62} +{"Format": "IDEA0", "ID": "a45204b7-11b3-42ee-a710-ffba7cd0741e", "DetectTime": "2024-05-21T12:31:26.483276+00:00", "EventTime": "2024-05-21T12:31:26.483332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoAf71DAjozQwLwu6"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "7572f520-3a10-4e82-a712-4b6714169da2", "DetectTime": "2024-05-21T12:31:26.500630+00:00", "EventTime": "2024-05-21T12:31:26.500650+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBShJp1GJpSiTmoc"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "19f6a342-bc06-46af-bdd1-446390924560", "DetectTime": "2024-05-21T12:31:26.513498+00:00", "EventTime": "2024-05-21T12:31:26.513517+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBShJp1GJpSiTmoc"], "accumulated_threat_level": 8.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "a99f7d9f-7569-4db5-8faa-99c99996c2f8", "DetectTime": "2024-05-21T12:31:26.524628+00:00", "EventTime": "2024-05-21T12:31:26.524646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtueBJCrJDkAi9Ic4"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "762b825e-492f-4c93-9b9b-ab66f25ba8aa", "DetectTime": "2024-05-21T12:31:26.536328+00:00", "EventTime": "2024-05-21T12:31:26.536347+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtueBJCrJDkAi9Ic4"], "accumulated_threat_level": 8.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "2ad2005c-5230-41e3-bc44-892bdb7ff754", "DetectTime": "2024-05-21T12:31:26.551851+00:00", "EventTime": "2024-05-21T12:31:26.551870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccd9Uv1nlYRg5zMoQ8"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "0f197ffc-ec15-42e4-b525-2a73d0e98d5b", "DetectTime": "2024-05-21T12:31:26.564662+00:00", "EventTime": "2024-05-21T12:31:26.564682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccd9Uv1nlYRg5zMoQ8"], "accumulated_threat_level": 9.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "30c8721c-27cd-4493-b84c-2ab3a39fe26c", "DetectTime": "2024-05-21T12:31:26.576698+00:00", "EventTime": "2024-05-21T12:31:26.576718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2tTsu3xRqOaanx5Oc"], "accumulated_threat_level": 11.700000000000003, "timewindow": 62} +{"Format": "IDEA0", "ID": "38434306-497d-4d32-a160-94bed2d9aa58", "DetectTime": "2024-05-21T12:31:26.587642+00:00", "EventTime": "2024-05-21T12:31:26.587660+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJrnYeCT7TpxgRc"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "5972a5d2-eae7-435e-92fe-6b49c18de256", "DetectTime": "2024-05-21T12:31:26.600946+00:00", "EventTime": "2024-05-21T12:31:26.600966+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJrnYeCT7TpxgRc"], "accumulated_threat_level": 9.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "31959918-4794-4460-8df2-39130af7c296", "DetectTime": "2024-05-21T12:31:26.613894+00:00", "EventTime": "2024-05-21T12:31:26.613918+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.57.242"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Za494HKYS7DFKjna"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "a3b2591c-63eb-482e-bc20-6626571342c1", "DetectTime": "2024-05-21T12:31:26.626825+00:00", "EventTime": "2024-05-21T12:31:26.626845+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Za494HKYS7DFKjna"], "accumulated_threat_level": 10.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e1fbee90-e140-4103-8147-9f94d1a0e5a2", "DetectTime": "2024-05-21T12:31:26.640526+00:00", "EventTime": "2024-05-21T12:31:26.640546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSGmN2rU3imGXK4L5"], "accumulated_threat_level": 12.500000000000004, "timewindow": 62} +{"Format": "Json", "ID": "e1fbee90-e140-4103-8147-9f94d1a0e5a2", "DetectTime": "2024-05-21T12:31:26.640526+00:00", "EventTime": "2024-05-21T12:31:26.640546+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "1970-01-03T13:58:26.178024+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 62. (real time 2024/05/21 12:31:26.907503)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 62, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "5fe49f9e-c70f-4e2e-9131-fdeddde6187a", "DetectTime": "2024-05-21T12:31:26.911486+00:00", "EventTime": "2024-05-21T12:31:26.911505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLADcDRxRng9KJQk"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "f197d287-ab5c-4eba-bff5-cbb9c3ccb938", "DetectTime": "2024-05-21T12:31:26.924281+00:00", "EventTime": "2024-05-21T12:31:26.924300+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwDWE1EpqMhUWXhJ"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "22a6acbc-dbda-4377-9a8d-b732df9c85ba", "DetectTime": "2024-05-21T12:31:26.937900+00:00", "EventTime": "2024-05-21T12:31:26.937921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwDWE1EpqMhUWXhJ"], "accumulated_threat_level": 10.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "5a7e5b5c-b20b-495f-a026-d76f418a4400", "DetectTime": "2024-05-21T12:31:26.943197+00:00", "EventTime": "2024-05-21T12:31:26.943216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.69.218.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdhVQ2S8PfbNi4Ti7"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "d8191c56-2c99-4b4c-b146-ccb3ebd57a16", "DetectTime": "2024-05-21T12:31:26.954473+00:00", "EventTime": "2024-05-21T12:31:26.954491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqxCK1yV62kYU74mc"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "5331eade-3b3a-4a4d-ac51-c37fb4d5bdd8", "DetectTime": "2024-05-21T12:31:26.966485+00:00", "EventTime": "2024-05-21T12:31:26.966503+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqxCK1yV62kYU74mc"], "accumulated_threat_level": 11.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "976ab118-9b7b-4f37-912e-f99071b2ecbf", "DetectTime": "2024-05-21T12:31:26.971261+00:00", "EventTime": "2024-05-21T12:31:26.971283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChetOo16vx2K4NoCIa"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "bbe25ccb-c842-46cc-8f3d-96e1cdb4eca2", "DetectTime": "2024-05-21T12:31:26.983150+00:00", "EventTime": "2024-05-21T12:31:26.983168+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUeI13zgKk90X8b99"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "be28fe9a-227f-4a37-b9bd-e5b17970926e", "DetectTime": "2024-05-21T12:31:26.995665+00:00", "EventTime": "2024-05-21T12:31:26.995685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUeI13zgKk90X8b99"], "accumulated_threat_level": 11.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "a03fa952-99f7-444f-9455-077138aea7e4", "DetectTime": "2024-05-21T12:31:27.006937+00:00", "EventTime": "2024-05-21T12:31:27.006955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.53.3.159"]}], "Attach": [{"Content": "Connection to unknown destination port 27404/UDP destination IP 113.53.3.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCr0o2jFzaAoyNgmj"], "accumulated_threat_level": 0.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "e930d032-d39c-4779-ba4a-c429691a6a12", "DetectTime": "2024-05-21T12:31:27.018625+00:00", "EventTime": "2024-05-21T12:31:27.018646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQImuw1kmc95zggqvh"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e6cc6c33-5d33-4ab4-bae8-c70f86036cb5", "DetectTime": "2024-05-21T12:31:27.032884+00:00", "EventTime": "2024-05-21T12:31:27.032904+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQImuw1kmc95zggqvh"], "accumulated_threat_level": 12.0, "timewindow": 20} +{"Format": "Json", "ID": "e6cc6c33-5d33-4ab4-bae8-c70f86036cb5", "DetectTime": "2024-05-21T12:31:27.032884+00:00", "EventTime": "2024-05-21T12:31:27.032904+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "1970-01-01T19:14:24.333352+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:31:27.394229)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "470b1a7a-6a91-4eaa-a8d2-682c6375fd50", "DetectTime": "2024-05-21T12:31:27.398218+00:00", "EventTime": "2024-05-21T12:31:27.398237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl8kYv1B9zF93hYfjh"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "61e9b715-4519-4622-90da-61632bfc8079", "DetectTime": "2024-05-21T12:31:27.438962+00:00", "EventTime": "2024-05-21T12:31:27.438980+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.161.47"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.161.47 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zt8U3D1i53tnsXsa"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "8386edcf-0da1-4e6a-8423-a575d7ebe353", "DetectTime": "2024-05-21T12:31:27.450311+00:00", "EventTime": "2024-05-21T12:31:27.450328+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.161.47"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.161.47 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zt8U3D1i53tnsXsa"], "accumulated_threat_level": 0.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "182c4833-8d0e-4258-84ee-a3f2dcd872d2", "DetectTime": "2024-05-21T12:31:27.455117+00:00", "EventTime": "2024-05-21T12:31:27.455136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKxkSpIeZr76ip94"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "ab93f7ff-9745-461c-a17a-f97d13df3254", "DetectTime": "2024-05-21T12:31:27.462393+00:00", "EventTime": "2024-05-21T12:31:27.462434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtiBj3WkQGGgbDZ0d"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "a315b54d-dcd3-44a3-9416-616efe691cc3", "DetectTime": "2024-05-21T12:31:27.474901+00:00", "EventTime": "2024-05-21T12:31:27.474921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmep42NYAAjjtwrN"], "accumulated_threat_level": 1.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "fa0464d7-7821-4a8c-972e-ea503d8b7cda", "DetectTime": "2024-05-21T12:31:27.480005+00:00", "EventTime": "2024-05-21T12:31:27.480023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.10.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4gEW3eVLDqqUzXya"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "a82072fa-3838-414c-b0a3-ea5f762324da", "DetectTime": "2024-05-21T12:31:27.493069+00:00", "EventTime": "2024-05-21T12:31:27.493088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQAF02JjLyiSJ9znl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 62} +{"Format": "IDEA0", "ID": "6f29ca6a-a74b-47bd-9ab8-66f33040c69b", "DetectTime": "2024-05-21T12:31:27.497882+00:00", "EventTime": "2024-05-21T12:31:27.497900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXa6KM2AgcLN5fOvKc"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "70feb907-4ba8-49e4-826f-4b1c9f2f3aad", "DetectTime": "2024-05-21T12:31:27.502351+00:00", "EventTime": "2024-05-21T12:31:27.502369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.97.73.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0s5N2jKauHA8lOo5"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "467709f9-79e4-4a66-ae76-8e1ab828ec4d", "DetectTime": "2024-05-21T12:31:27.515774+00:00", "EventTime": "2024-05-21T12:31:27.515795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.240.245.133"]}], "Attach": [{"Content": "Connection to unknown destination port 7534/UDP destination IP 94.240.245.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmChnH3O6qGCswvF7c"], "accumulated_threat_level": 3.2, "timewindow": 62} +{"Format": "IDEA0", "ID": "faf8bd0a-1503-42da-b52b-40eee73c3ec6", "DetectTime": "2024-05-21T12:31:27.520656+00:00", "EventTime": "2024-05-21T12:31:27.520674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 120.63.10.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsP8py4LOrUCzUo7Ng"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "c6c4dd16-542d-4e45-b1c0-9d96378657b1", "DetectTime": "2024-05-21T12:31:27.525182+00:00", "EventTime": "2024-05-21T12:31:27.525201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cizles82S0KPVvScc"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "d6851d3e-4a04-49c5-b21b-5ccc1171e6eb", "DetectTime": "2024-05-21T12:31:27.537410+00:00", "EventTime": "2024-05-21T12:31:27.537432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIEe8J1DChDJH75DW9"], "accumulated_threat_level": 4.0, "timewindow": 62} +{"Format": "IDEA0", "ID": "d64720c7-b09b-40ac-b9ad-4eb450b2396b", "DetectTime": "2024-05-21T12:31:27.547912+00:00", "EventTime": "2024-05-21T12:31:27.547932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4PBw1RJVkAR3KAI8"], "accumulated_threat_level": 4.8, "timewindow": 62} +{"Format": "IDEA0", "ID": "43f69582-6f7b-4ad5-833d-e2b565de0139", "DetectTime": "2024-05-21T12:31:27.552981+00:00", "EventTime": "2024-05-21T12:31:27.553003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.240.31.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJkap54rHBFcQ9yFO8"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "8dce6f04-fe7b-4ea6-b63d-5870743df052", "DetectTime": "2024-05-21T12:31:27.564273+00:00", "EventTime": "2024-05-21T12:31:27.564294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN5Pit3hll414pVfZ6"], "accumulated_threat_level": 5.6, "timewindow": 62} +{"Format": "IDEA0", "ID": "1a9c34f8-7bca-4826-93c0-5577b1f2e946", "DetectTime": "2024-05-21T12:31:27.569044+00:00", "EventTime": "2024-05-21T12:31:27.569063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ3jfV2nplz0W0GNu9"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "ffc1104b-edf3-4e9b-bcec-c61b8da1274a", "DetectTime": "2024-05-21T12:31:27.581080+00:00", "EventTime": "2024-05-21T12:31:27.581099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.136.223.205"]}], "Attach": [{"Content": "Connection to unknown destination port 12232/UDP destination IP 188.136.223.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWF9T3VOQphaGOUn3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 62} +{"Format": "IDEA0", "ID": "f1d288f7-b78a-4c85-ba40-8a53ecf2d7f3", "DetectTime": "2024-05-21T12:31:27.586764+00:00", "EventTime": "2024-05-21T12:31:27.586786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C96RAML5HWVcylHN7"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "ce05d072-c089-40e6-9d66-b8239315bfa0", "DetectTime": "2024-05-21T12:31:27.591508+00:00", "EventTime": "2024-05-21T12:31:27.591528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkhSK3lcaB22Vl7w7"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "a3e0469e-1d74-4c13-a899-690bd683f377", "DetectTime": "2024-05-21T12:31:27.596895+00:00", "EventTime": "2024-05-21T12:31:27.596914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHuV03mOxuHLWIIu5"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "71a460ad-219b-4a78-b5aa-4549b0d19f39", "DetectTime": "2024-05-21T12:31:27.608005+00:00", "EventTime": "2024-05-21T12:31:27.608023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czqk0h1gLhYtXVzBo8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "025ae2ed-a96b-46c4-a2cc-2ef905db72ce", "DetectTime": "2024-05-21T12:31:27.612582+00:00", "EventTime": "2024-05-21T12:31:27.612600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.162.184.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEdFez2KeE3p5jnzC5"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "3fb06ce0-eed1-4cb3-bdb5-7e69ffa80fc8", "DetectTime": "2024-05-21T12:31:27.617904+00:00", "EventTime": "2024-05-21T12:31:27.617924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkF3jS1SPTcOuJb2Qk"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "dc15fc07-86eb-4b29-aa90-93450c931dad", "DetectTime": "2024-05-21T12:31:27.622404+00:00", "EventTime": "2024-05-21T12:31:27.622436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0rP94UdqGhVxcTZ8"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "72a5243a-171b-41be-b95c-75dc2e123148", "DetectTime": "2024-05-21T12:31:27.632340+00:00", "EventTime": "2024-05-21T12:31:27.632359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccne1a3I1PXLdRglhh"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "9e4786ad-2985-4383-aa77-ba7541d81249", "DetectTime": "2024-05-21T12:31:27.706506+00:00", "EventTime": "2024-05-21T12:31:27.706529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauMR22V2vEDJJLwbi"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "f7dceda9-f77b-4e0b-945f-81dea6badf0d", "DetectTime": "2024-05-21T12:31:27.733670+00:00", "EventTime": "2024-05-21T12:31:27.733689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0lqXg29tT3xpCYKq2"], "accumulated_threat_level": 0.8, "timewindow": 63} +{"Format": "IDEA0", "ID": "c33469f2-0267-4edc-93d1-afbb8a5d0b37", "DetectTime": "2024-05-21T12:31:28.297952+00:00", "EventTime": "2024-05-21T12:31:28.297972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1m8Ja36CxCMQizOPk"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "5610d7cc-3a2d-4e9e-8bb4-81df3ae605f0", "DetectTime": "2024-05-21T12:31:28.328558+00:00", "EventTime": "2024-05-21T12:31:28.328578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.69.218.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXAjV0PW2KB25mce"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "5cae1699-0699-4ce7-a0bd-29413add1661", "DetectTime": "2024-05-21T12:31:28.629113+00:00", "EventTime": "2024-05-21T12:31:28.629131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 120.63.10.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrlkHT2iOilEYMyzO4"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "b1fe11a4-7df9-4b2d-9323-d9e7449c3153", "DetectTime": "2024-05-21T12:31:29.010037+00:00", "EventTime": "2024-05-21T12:31:29.010058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuBy234j1G5s3fHp9", "CQ2Xtq2y5XQBMMR6s8", "CuLFz25BomsrPdt29", "CvzzZ11dAM9VoOwKpe"], "accumulated_threat_level": 1.3, "timewindow": 63} +{"Format": "IDEA0", "ID": "3ab6c846-6e45-4b12-8402-54d96e52d45e", "DetectTime": "2024-05-21T12:31:29.177387+00:00", "EventTime": "2024-05-21T12:31:29.177409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4irVl35yMDnB6sPP2"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "15c0c5e3-a910-4720-89c5-3be0b4ca7cb1", "DetectTime": "2024-05-21T12:31:29.217266+00:00", "EventTime": "2024-05-21T12:31:29.217287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZISxYmiFXBGpwqqf"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "925fe728-0600-4592-9d81-3179043a288f", "DetectTime": "2024-05-21T12:31:29.264112+00:00", "EventTime": "2024-05-21T12:31:29.264133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0HOW328GRqFlFf049"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "323293a2-d3d5-482e-8892-ccaaa76248f2", "DetectTime": "2024-05-21T12:31:29.298168+00:00", "EventTime": "2024-05-21T12:31:29.298189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9WWzx2QogHoWzDhAk"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "254e7a64-d841-4e6a-ae9b-a032ce2f178c", "DetectTime": "2024-05-21T12:31:29.514550+00:00", "EventTime": "2024-05-21T12:31:29.514573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.239.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPFL14n37wKqtMnX6"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "260bee61-1c79-4e5a-97f1-b64242a814ce", "DetectTime": "2024-05-21T12:31:29.546647+00:00", "EventTime": "2024-05-21T12:31:29.546670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.99.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUHGr4nmaVL9pSxe3"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "6fc3c61b-e35b-44fb-baed-5b65e602ae29", "DetectTime": "2024-05-21T12:31:29.551699+00:00", "EventTime": "2024-05-21T12:31:29.551719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzilQMJeYRZuH3aIb"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "e446414b-2c32-48ff-9d65-7b29f6dd7f0d", "DetectTime": "2024-05-21T12:31:29.556804+00:00", "EventTime": "2024-05-21T12:31:29.556824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSmUK2JfiOmSUZ7Bl"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "87edb39f-027d-42f8-b384-f6ae7c4d60e4", "DetectTime": "2024-05-21T12:31:29.626445+00:00", "EventTime": "2024-05-21T12:31:29.626466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqMU54Cm6SoonYgvf"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "7da4a514-076f-4cbb-b330-9dc1e377ec14", "DetectTime": "2024-05-21T12:31:29.647940+00:00", "EventTime": "2024-05-21T12:31:29.647961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwOWC3JgFghWONSQk"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "e39dc760-ba47-4f7f-9909-a1acc1f1f229", "DetectTime": "2024-05-21T12:31:29.678397+00:00", "EventTime": "2024-05-21T12:31:29.678444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDioYEB2qJvP27WSe"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "d015a4c4-7b7d-4235-a426-f1dfa81835b9", "DetectTime": "2024-05-21T12:31:29.716529+00:00", "EventTime": "2024-05-21T12:31:29.716551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9akkx1Kn7mRFz87P9"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "45feb081-dca5-4518-9c44-752c73f35a44", "DetectTime": "2024-05-21T12:31:29.765403+00:00", "EventTime": "2024-05-21T12:31:29.765425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtn3a1woVy7X6b0a2"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "d1fe18b5-9db2-41dc-af82-50725d65f6b6", "DetectTime": "2024-05-21T12:31:29.808083+00:00", "EventTime": "2024-05-21T12:31:29.808104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9KUn1rmwmhM47ERk"], "accumulated_threat_level": 2.1, "timewindow": 63} +{"Format": "IDEA0", "ID": "90f29be9-a768-4c7a-b083-63ef74cdb54b", "DetectTime": "2024-05-21T12:31:29.831105+00:00", "EventTime": "2024-05-21T12:31:29.831122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwUZ82kNQ5yZfdgTi"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "c2b735f0-d227-44ce-b4e4-25c6c21c43b1", "DetectTime": "2024-05-21T12:31:29.905411+00:00", "EventTime": "2024-05-21T12:31:29.905429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CygIJo1NTG2LmO8w86"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "4ec0bb04-5076-44d8-a190-85ee8475b848", "DetectTime": "2024-05-21T12:31:29.980907+00:00", "EventTime": "2024-05-21T12:31:29.980930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YWUj47ZqVTRPPn21"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "0e8de9f3-9ceb-406b-948f-d08971d5d449", "DetectTime": "2024-05-21T12:31:30.039176+00:00", "EventTime": "2024-05-21T12:31:30.039197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKltKQ15NOlpFZDb7a"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "07f7dfca-4f44-44da-bc9c-4907f1659c8c", "DetectTime": "2024-05-21T12:31:30.068449+00:00", "EventTime": "2024-05-21T12:31:30.068468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.199.106.53 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUjJbnhcATQKEBY5i"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "396f54fe-5224-44e0-99f2-5f4c12a93916", "DetectTime": "2024-05-21T12:31:30.139325+00:00", "EventTime": "2024-05-21T12:31:30.139345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.31.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLjwD3Q6xilr0i141"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "e9b965f6-7cb4-4b8c-996b-823a96cee9e1", "DetectTime": "2024-05-21T12:31:30.189530+00:00", "EventTime": "2024-05-21T12:31:30.189551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc942F3J3jxEV5AIn7"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "7e111af9-4a66-4f9a-9563-85ea289cba63", "DetectTime": "2024-05-21T12:31:30.232642+00:00", "EventTime": "2024-05-21T12:31:30.232663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySvSY1LOc1u4GWL6g"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "3e8bc1f6-ec2e-4a86-a984-f85a049e3def", "DetectTime": "2024-05-21T12:31:30.266421+00:00", "EventTime": "2024-05-21T12:31:30.266440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.242.182.216"]}], "Attach": [{"Content": "Connection to unknown destination port 15206/UDP destination IP 180.242.182.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp93FAyeyUt1Sz9Dg"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 63} +{"Format": "IDEA0", "ID": "4c6b45da-fa8b-45e2-bd3e-309364b8d351", "DetectTime": "2024-05-21T12:31:30.289975+00:00", "EventTime": "2024-05-21T12:31:30.289996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JKjOukdu9puF3Kl"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "3341b06e-acbf-4196-a4b2-f2c22e6325bc", "DetectTime": "2024-05-21T12:31:30.319147+00:00", "EventTime": "2024-05-21T12:31:30.319167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eH0X24JSw1EpwSs1"], "accumulated_threat_level": 3.7, "timewindow": 63} +{"Format": "IDEA0", "ID": "4c1567d9-c3a1-4b01-8ed2-6e3748084e7e", "DetectTime": "2024-05-21T12:31:30.344917+00:00", "EventTime": "2024-05-21T12:31:30.344938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chv0Ep3cr4yAR4Nh5h"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "02c931a7-1654-4094-bb2e-aace2ad698a8", "DetectTime": "2024-05-21T12:31:30.369775+00:00", "EventTime": "2024-05-21T12:31:30.369794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Zpju2urIFr7BVB5i"], "accumulated_threat_level": 4.5, "timewindow": 63} +{"Format": "IDEA0", "ID": "24c86445-5f57-4088-8749-dd4938a4ed0f", "DetectTime": "2024-05-21T12:31:30.395103+00:00", "EventTime": "2024-05-21T12:31:30.395122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5fzZLnrPb5sCsh4"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "874a3560-0d25-4561-8809-bcd9af6243d7", "DetectTime": "2024-05-21T12:31:30.432647+00:00", "EventTime": "2024-05-21T12:31:30.432664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4sK923AlBCMFjpR8"], "accumulated_threat_level": 5.3, "timewindow": 63} +{"Format": "IDEA0", "ID": "ecaac096-fc34-4220-8e46-7e7bd5ee107a", "DetectTime": "2024-05-21T12:31:30.437159+00:00", "EventTime": "2024-05-21T12:31:30.437176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.3.142.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5u1Ai2XYoSN4EqUhc"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "f9e1e5b8-fece-4f46-aa2c-abea2191d0e4", "DetectTime": "2024-05-21T12:31:30.474473+00:00", "EventTime": "2024-05-21T12:31:30.474494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSymjn3KvgjAYhxZhl"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "6c7001e4-d1f4-48ad-84a2-c996d33e0ef0", "DetectTime": "2024-05-21T12:31:30.501990+00:00", "EventTime": "2024-05-21T12:31:30.502009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLhio446QIzsDd7"], "accumulated_threat_level": 6.1, "timewindow": 63} +{"Format": "IDEA0", "ID": "b92be263-8395-4366-aa5f-55e2f898838f", "DetectTime": "2024-05-21T12:31:30.526328+00:00", "EventTime": "2024-05-21T12:31:30.526345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3AlA1XNeixmJZxP6"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "ef5db516-b72a-430b-bb37-382f892175be", "DetectTime": "2024-05-21T12:31:30.573787+00:00", "EventTime": "2024-05-21T12:31:30.573805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qgarDTmvNOkdkAg"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 63} +{"Format": "IDEA0", "ID": "46985d75-433d-462e-a399-461b5754db32", "DetectTime": "2024-05-21T12:31:30.581047+00:00", "EventTime": "2024-05-21T12:31:30.581065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaITo2f0yp8oKNvy7"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "321ea9ba-3e15-4357-bd43-a995db39e4df", "DetectTime": "2024-05-21T12:31:30.628623+00:00", "EventTime": "2024-05-21T12:31:30.628645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bHJi1QefvEaKNgH"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "0568e7e7-380e-4d0b-bfea-b13773f99e76", "DetectTime": "2024-05-21T12:31:30.677050+00:00", "EventTime": "2024-05-21T12:31:30.677068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKksL1FcQSXWhITqb"], "accumulated_threat_level": 7.699999999999999, "timewindow": 63} +{"Format": "IDEA0", "ID": "d6f9f1a9-736d-44bf-b493-ab1c4ff241b2", "DetectTime": "2024-05-21T12:31:30.715613+00:00", "EventTime": "2024-05-21T12:31:30.715634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPCoD13cBlRSullGHd"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "5cf7f074-4493-44c3-9366-bf2f0a080565", "DetectTime": "2024-05-21T12:31:30.722291+00:00", "EventTime": "2024-05-21T12:31:30.722311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12mXF2tiN9jQOg1Xc", "Cw5LGXVB8VWNhy8s9", "CAbPb2eJQiJ3apJP3", "CWU5Qt3disNhrfIB03"], "accumulated_threat_level": 8.2, "timewindow": 63} +{"Format": "IDEA0", "ID": "6d26bce1-13a1-4504-9992-ee73ec71d1e6", "DetectTime": "2024-05-21T12:31:30.774194+00:00", "EventTime": "2024-05-21T12:31:30.774215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9JVsSbuM1gpLF1Tb"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "e81a86a8-7108-477f-8676-bdfb157f2dfa", "DetectTime": "2024-05-21T12:31:30.818867+00:00", "EventTime": "2024-05-21T12:31:30.818889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiFp9o4CD4pWGdnSJ"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "2e92a458-c1e3-4438-b2ef-134082115e16", "DetectTime": "2024-05-21T12:31:30.869830+00:00", "EventTime": "2024-05-21T12:31:30.869849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hVSZ2tgBM1F3cSY2"], "accumulated_threat_level": 9.0, "timewindow": 63} +{"Format": "IDEA0", "ID": "6b9c989c-3655-4ec0-9f3d-43937a47fc47", "DetectTime": "2024-05-21T12:31:30.901019+00:00", "EventTime": "2024-05-21T12:31:30.901037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4hFrynBWt9HgEq2"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "a8ea3521-79aa-486c-84e1-3c79463d74ab", "DetectTime": "2024-05-21T12:31:30.941781+00:00", "EventTime": "2024-05-21T12:31:30.941802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwWIBu3TVWjgI0eWr1"], "accumulated_threat_level": 9.8, "timewindow": 63} +{"Format": "IDEA0", "ID": "0a293509-0722-4e2b-90ff-8b64b33ae40c", "DetectTime": "2024-05-21T12:31:30.946555+00:00", "EventTime": "2024-05-21T12:31:30.946573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNlIa2K42soWILrj1"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "4ff5fcb6-e16d-424a-937f-c1b90eb64c97", "DetectTime": "2024-05-21T12:31:30.986034+00:00", "EventTime": "2024-05-21T12:31:30.986057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.97.73.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26Wc64Tu0zEvWGbi2"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "486e4d3c-608f-4843-a879-17919aa783d7", "DetectTime": "2024-05-21T12:31:31.019145+00:00", "EventTime": "2024-05-21T12:31:31.019165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCfjGC4v4yYsewk5X1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 63} +{"Format": "IDEA0", "ID": "d0e18417-cee4-4b48-891f-a321a365c423", "DetectTime": "2024-05-21T12:31:31.054094+00:00", "EventTime": "2024-05-21T12:31:31.054112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSk2y4Ntw8MVT5S15"], "accumulated_threat_level": 11.400000000000002, "timewindow": 63} +{"Format": "IDEA0", "ID": "278b24bf-0047-49d2-8163-52aee1a0c707", "DetectTime": "2024-05-21T12:31:31.089856+00:00", "EventTime": "2024-05-21T12:31:31.089874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkpHeM2vc2Jr0PBva7"], "accumulated_threat_level": 12.200000000000003, "timewindow": 63} +{"Format": "Json", "ID": "278b24bf-0047-49d2-8163-52aee1a0c707", "DetectTime": "2024-05-21T12:31:31.089856+00:00", "EventTime": "2024-05-21T12:31:31.089874+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "1970-01-03T14:30:52.027586+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 63. (real time 2024/05/21 12:31:31.330309)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 63, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "8bd3a4a0-6e26-477c-8854-4c78ff58137b", "DetectTime": "2024-05-21T12:31:31.334722+00:00", "EventTime": "2024-05-21T12:31:31.334743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKD7Na2nb7ogjGapT3"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "3f19863f-fbb8-463a-b216-9d2a8a6dc0be", "DetectTime": "2024-05-21T12:31:31.364317+00:00", "EventTime": "2024-05-21T12:31:31.364339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKj7tE3WgTxgHpclma"], "accumulated_threat_level": 0.8, "timewindow": 63} +{"Format": "IDEA0", "ID": "59428a22-9048-49bb-9cec-02913f2de047", "DetectTime": "2024-05-21T12:31:31.369206+00:00", "EventTime": "2024-05-21T12:31:31.369223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.10.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Dao94eSCjIdunB6a"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "df812629-c905-42ae-b6da-652110790b85", "DetectTime": "2024-05-21T12:31:31.379865+00:00", "EventTime": "2024-05-21T12:31:31.379883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsvOD1EHXBoOzZ4k9"], "accumulated_threat_level": 1.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "4383e7f7-dc2f-45c0-aed3-28c37f7887c2", "DetectTime": "2024-05-21T12:31:31.384339+00:00", "EventTime": "2024-05-21T12:31:31.384357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTyFep1UOIDEBAbe"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "02a7efaa-b70d-4c3c-90f9-db88fcac92db", "DetectTime": "2024-05-21T12:31:31.395299+00:00", "EventTime": "2024-05-21T12:31:31.395317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqFkxP0aXILCZfc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 63} +{"Format": "IDEA0", "ID": "4db7a859-561c-42f9-af0d-504dd32a12a3", "DetectTime": "2024-05-21T12:31:31.418669+00:00", "EventTime": "2024-05-21T12:31:31.418689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrPhu4vewdt9e1nI7"], "accumulated_threat_level": 3.2, "timewindow": 63} +{"Format": "IDEA0", "ID": "4b0a29ae-9d34-4d3f-aec9-36d6d3159bb1", "DetectTime": "2024-05-21T12:31:31.454805+00:00", "EventTime": "2024-05-21T12:31:31.454824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6JBEf10sqWgKwyYkk"], "accumulated_threat_level": 4.0, "timewindow": 63} +{"Format": "IDEA0", "ID": "060bfe8c-bc24-48c7-9e44-eef5901d74e8", "DetectTime": "2024-05-21T12:31:31.548923+00:00", "EventTime": "2024-05-21T12:31:31.548945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.160.114.142"]}], "Attach": [{"Content": "Connection to unknown destination port 16383/UDP destination IP 122.160.114.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLWOV9tB2CGguvY7"], "accumulated_threat_level": 4.8, "timewindow": 63} +{"Format": "IDEA0", "ID": "5d55c2de-35f9-4f2a-88ab-40fceb39bc15", "DetectTime": "2024-05-21T12:31:31.588875+00:00", "EventTime": "2024-05-21T12:31:31.588894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZeq1R15J6xrnlqxIe"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "5f58746e-b0c1-4c54-8bbe-05fdf07fd185", "DetectTime": "2024-05-21T12:31:31.608400+00:00", "EventTime": "2024-05-21T12:31:31.608423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QMYB2xMUzf9DX8c7"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "622a682a-836e-44f2-a7b6-5f8d7f6b6d98", "DetectTime": "2024-05-21T12:31:31.638791+00:00", "EventTime": "2024-05-21T12:31:31.638810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C798X1gUuBDfOYOha"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 63} +{"Format": "IDEA0", "ID": "fbba46db-11f5-465b-bf12-87a72d1ee1bd", "DetectTime": "2024-05-21T12:31:31.680689+00:00", "EventTime": "2024-05-21T12:31:31.680710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaBYq1ISOWEsxnzn4"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "d0adf023-2d48-4e92-9a9f-c0d522a294c7", "DetectTime": "2024-05-21T12:31:31.840057+00:00", "EventTime": "2024-05-21T12:31:31.840080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.240.31.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusCiY1j8Hj7CY2mQ1"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "60113778-b925-42a4-b8ec-c0db4b6d36da", "DetectTime": "2024-05-21T12:31:32.022004+00:00", "EventTime": "2024-05-21T12:31:32.022027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiNoT3PrkFCDHsoWf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 63} +{"Format": "IDEA0", "ID": "62133023-ce8b-4209-862c-34247996e01d", "DetectTime": "2024-05-21T12:31:32.034497+00:00", "EventTime": "2024-05-21T12:31:32.034518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hONlXE8VDsh3RN5"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "4861ef10-38c1-4029-b504-fb5e2d49863f", "DetectTime": "2024-05-21T12:31:32.066983+00:00", "EventTime": "2024-05-21T12:31:32.067004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwYrL11ICcBiXkMhD9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 63} +{"Format": "IDEA0", "ID": "36ae6331-9707-449d-a017-02ba006bd05b", "DetectTime": "2024-05-21T12:31:32.093619+00:00", "EventTime": "2024-05-21T12:31:32.093639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyc4aqz44m4KTBMz3"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "e481504b-15ce-47fc-ad32-bb53a501cd94", "DetectTime": "2024-05-21T12:31:32.124007+00:00", "EventTime": "2024-05-21T12:31:32.124026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSwsorCRzI8FHhobj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 63} +{"Format": "IDEA0", "ID": "d3d70a78-cef6-414d-ae2e-b263271d9cd1", "DetectTime": "2024-05-21T12:31:32.156849+00:00", "EventTime": "2024-05-21T12:31:32.156870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cou65FWGEKa2Z1nR"], "accumulated_threat_level": 9.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "28e5d8c7-e95f-4e19-a08f-32de11aa58ca", "DetectTime": "2024-05-21T12:31:32.181528+00:00", "EventTime": "2024-05-21T12:31:32.181550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeSEr1yronRWKs0Z9"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "b3697a8d-6506-4414-936c-92b101b07e1d", "DetectTime": "2024-05-21T12:31:32.212477+00:00", "EventTime": "2024-05-21T12:31:32.212497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQcyJ2vISvdBWl8Aa"], "accumulated_threat_level": 10.4, "timewindow": 63} +{"Format": "IDEA0", "ID": "7e150258-dcc6-4f59-9ddd-80a8249a61f3", "DetectTime": "2024-05-21T12:31:32.259415+00:00", "EventTime": "2024-05-21T12:31:32.259435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjXSqn22fKjjKzACxc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 63} +{"Format": "IDEA0", "ID": "79f81463-f3d7-46d6-a8dc-2809c058345b", "DetectTime": "2024-05-21T12:31:32.284451+00:00", "EventTime": "2024-05-21T12:31:32.284473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPyTdW1qm4p6fkDbHi"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "a532c2a3-5c14-448f-81ae-18e91a838e89", "DetectTime": "2024-05-21T12:31:32.318990+00:00", "EventTime": "2024-05-21T12:31:32.319011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "Connection to unknown destination port 18343/UDP destination IP 114.143.80.185. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUeXj2BiwczWgOqY4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 63} +{"Format": "Json", "ID": "a532c2a3-5c14-448f-81ae-18e91a838e89", "DetectTime": "2024-05-21T12:31:32.318990+00:00", "EventTime": "2024-05-21T12:31:32.319011+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["114.143.80.185"]}], "Attach": [{"Content": "1970-01-03T14:31:30.845957+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 63. (real time 2024/05/21 12:31:32.497065)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 63, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "99b504d0-1c03-4048-8b29-2425fa14df34", "DetectTime": "2024-05-21T12:31:32.502970+00:00", "EventTime": "2024-05-21T12:31:32.502989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.162.184.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71rX721tjyYRO3mYb"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "56797f47-56cd-4f5f-862f-f7a0f8f2976b", "DetectTime": "2024-05-21T12:31:32.507558+00:00", "EventTime": "2024-05-21T12:31:32.507577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CndyEs2JPE0psFp1F"], "accumulated_threat_level": 4.0, "timewindow": 61} +{"Format": "IDEA0", "ID": "855aa4a8-8d3f-4b0f-ab77-23d642f667e0", "DetectTime": "2024-05-21T12:31:32.518057+00:00", "EventTime": "2024-05-21T12:31:32.518075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2Fc8GeDXfH004mk"], "accumulated_threat_level": 0.8, "timewindow": 63} +{"Format": "IDEA0", "ID": "544a58c9-91b5-4226-b5f3-edd5d364fb05", "DetectTime": "2024-05-21T12:31:32.527495+00:00", "EventTime": "2024-05-21T12:31:32.527512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6gvNp3AS8faOhtuUb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "fe7d04af-bd7f-4018-8135-2c7533af7c50", "DetectTime": "2024-05-21T12:31:32.835526+00:00", "EventTime": "2024-05-21T12:31:32.835547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOaVw4Nt6nLQzsrd4"], "accumulated_threat_level": 1.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "3b0fd2bb-4ac7-4392-99fb-bb1c18df9bdc", "DetectTime": "2024-05-21T12:31:32.881568+00:00", "EventTime": "2024-05-21T12:31:32.881587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzzOBc4LSVfKamCbDb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 63} +{"Format": "IDEA0", "ID": "13ec0ea5-51dc-417f-882f-18596a2f3e88", "DetectTime": "2024-05-21T12:31:32.916254+00:00", "EventTime": "2024-05-21T12:31:32.916272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.234.97.81"]}], "Attach": [{"Content": "Connection to unknown destination port 11537/UDP destination IP 41.234.97.81. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfpDIx35DgKoO3GvN3"], "accumulated_threat_level": 3.2, "timewindow": 63} +{"Format": "IDEA0", "ID": "36b56db8-4a14-4226-a46f-ffbb8b4e5797", "DetectTime": "2024-05-21T12:31:33.103804+00:00", "EventTime": "2024-05-21T12:31:33.103825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.199.106.53 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1HWCa2LHnoTTCKzAb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "dc915ebb-a017-477d-a6c2-be825bbcc5b6", "DetectTime": "2024-05-21T12:31:33.201455+00:00", "EventTime": "2024-05-21T12:31:33.201476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cca6m73OU3KcAY4bVe"], "accumulated_threat_level": 4.0, "timewindow": 63} +{"Format": "IDEA0", "ID": "bb1afc2f-f7e5-44a6-998a-d767c328d2f2", "DetectTime": "2024-05-21T12:31:33.334503+00:00", "EventTime": "2024-05-21T12:31:33.334524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.97.73.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbfCN2P52C24k0L1l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "f2ca17c3-0fd7-418a-a0ec-157498a85c84", "DetectTime": "2024-05-21T12:31:33.439057+00:00", "EventTime": "2024-05-21T12:31:33.439078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpKPJ3LBr9KPPaAB3"], "accumulated_threat_level": 4.8, "timewindow": 63} +{"Format": "IDEA0", "ID": "9e740a57-deb0-4248-895a-39e193e4b5a8", "DetectTime": "2024-05-21T12:31:33.554373+00:00", "EventTime": "2024-05-21T12:31:33.554393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4SI336P2X4iNUEbb"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "4135be94-f4fa-435d-bb28-7c236f1ee38c", "DetectTime": "2024-05-21T12:31:33.757986+00:00", "EventTime": "2024-05-21T12:31:33.758007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NZcr3P3lgEeo3WN2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "062e12c8-1a3e-4bdb-8c26-858311b0d731", "DetectTime": "2024-05-21T12:31:33.791773+00:00", "EventTime": "2024-05-21T12:31:33.791793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsZ994FhuoM7WAdWg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "64b4c1a1-ce5e-4c0a-b89b-eb0c884d2bb2", "DetectTime": "2024-05-21T12:31:33.825522+00:00", "EventTime": "2024-05-21T12:31:33.825542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhz5m1m0ORL31ka5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "076d80b8-b5e5-44f4-a154-dc66ac7a2c15", "DetectTime": "2024-05-21T12:31:34.053353+00:00", "EventTime": "2024-05-21T12:31:34.053371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWUgp2L7Trf0Rmuu1", "Cg5xE13TfeTT7WAvKg", "CkItT04CSoOTycpxJe", "CXITIA12jP97BlGq93"], "accumulated_threat_level": 0.5, "timewindow": 64} +{"Format": "IDEA0", "ID": "ceffbd31-8149-4eaa-9cae-582251a1bad8", "DetectTime": "2024-05-21T12:31:34.099485+00:00", "EventTime": "2024-05-21T12:31:34.099507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0jHQ1lyNy6jZqT28"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "4bd14906-4353-40e7-8289-0774c039e83e", "DetectTime": "2024-05-21T12:31:34.104868+00:00", "EventTime": "2024-05-21T12:31:34.104887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwqcb4vsuCZBU2eH"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "1ab12598-4e4a-4db7-8c4f-8602e9225184", "DetectTime": "2024-05-21T12:31:34.109454+00:00", "EventTime": "2024-05-21T12:31:34.109472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HWah3p6NZdKgV7fk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "2ecbd220-da34-4094-8769-d0987cd87fc9", "DetectTime": "2024-05-21T12:31:34.172629+00:00", "EventTime": "2024-05-21T12:31:34.172650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrQRC3jssjeT15wve"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "5beee928-8912-4e9d-b69b-7575573874d3", "DetectTime": "2024-05-21T12:31:34.206677+00:00", "EventTime": "2024-05-21T12:31:34.206703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2vbFwr2KVdNbuRj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "1f8c5eb4-16bc-4144-8eff-16c8366b803f", "DetectTime": "2024-05-21T12:31:34.238556+00:00", "EventTime": "2024-05-21T12:31:34.238580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.239.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBV2b1jraP6BPOIQe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "d09842e8-7f04-482a-957f-28dbcfda14ef", "DetectTime": "2024-05-21T12:31:34.280887+00:00", "EventTime": "2024-05-21T12:31:34.280907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzKBwmwR2Zqx1oolg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "1081d4d9-6075-4626-867f-3fdc5075321c", "DetectTime": "2024-05-21T12:31:34.338960+00:00", "EventTime": "2024-05-21T12:31:34.338981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6yAW3Dk1GroREnj7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "22329016-7293-43f7-b8a5-a8f080bff17e", "DetectTime": "2024-05-21T12:31:34.690245+00:00", "EventTime": "2024-05-21T12:31:34.690263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.99.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBPeB1VEk13XNyS53"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "bd1da096-8423-4dcd-8f96-3db283a62327", "DetectTime": "2024-05-21T12:31:35.320644+00:00", "EventTime": "2024-05-21T12:31:35.320665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSQS3B3pvNF85CmWmf", "CPpmsl31bPGIIXDx", "CheqoZE6uen7kI3hf", "CnsYJo4WvL2BXNCDL1"], "accumulated_threat_level": 1.0, "timewindow": 64} +{"Format": "IDEA0", "ID": "a2e9e837-278c-4818-a7b8-acd989c180c7", "DetectTime": "2024-05-21T12:31:35.338887+00:00", "EventTime": "2024-05-21T12:31:35.338908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEyJu3jzKKKhkIMu4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "e73364eb-03bf-4265-b251-7bcafd866988", "DetectTime": "2024-05-21T12:31:35.774278+00:00", "EventTime": "2024-05-21T12:31:35.774300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9tPg2MIqtA5NuTwj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "e2019fdd-cc12-474d-98da-ed6766a43834", "DetectTime": "2024-05-21T12:31:36.053294+00:00", "EventTime": "2024-05-21T12:31:36.053315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9fEk2FlVMyQn3GRj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "38092607-92a9-482e-b99f-afb928d2bf0c", "DetectTime": "2024-05-21T12:31:36.105903+00:00", "EventTime": "2024-05-21T12:31:36.105923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbFmz1KfJS0q9mfNb"], "accumulated_threat_level": 1.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "8ae741d6-51cd-47e5-9079-9686bf7166a0", "DetectTime": "2024-05-21T12:31:36.458515+00:00", "EventTime": "2024-05-21T12:31:36.458533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVFo4X1FvuRD8qBy57"], "accumulated_threat_level": 2.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "f65e64d2-1f9b-43e0-9f14-33d878178655", "DetectTime": "2024-05-21T12:31:36.489375+00:00", "EventTime": "2024-05-21T12:31:36.489397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLjnG6utsLYSzEQ7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "0f8eac09-aae0-41a2-9f32-84af5ad6c77f", "DetectTime": "2024-05-21T12:31:36.519970+00:00", "EventTime": "2024-05-21T12:31:36.519987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeYW63vdUospwAJCb"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 64} +{"Format": "IDEA0", "ID": "a62820c1-b10a-4116-b850-e4829f9361e7", "DetectTime": "2024-05-21T12:31:36.554978+00:00", "EventTime": "2024-05-21T12:31:36.554996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqDEHOQycYqOiTmNb"], "accumulated_threat_level": 4.2, "timewindow": 64} +{"Format": "IDEA0", "ID": "efb0973c-dd5f-4fa2-920b-2cbc768c89b5", "DetectTime": "2024-05-21T12:31:36.589080+00:00", "EventTime": "2024-05-21T12:31:36.589098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLXGw2js703psYFci"], "accumulated_threat_level": 5.0, "timewindow": 64} +{"Format": "IDEA0", "ID": "16941e00-2081-4573-b3c6-eb21fccd2836", "DetectTime": "2024-05-21T12:31:36.623994+00:00", "EventTime": "2024-05-21T12:31:36.624014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cadmjo2rqSwjd499Ji"], "accumulated_threat_level": 5.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "6d559a79-9bfe-43b6-ad81-7043236dde8a", "DetectTime": "2024-05-21T12:31:36.681951+00:00", "EventTime": "2024-05-21T12:31:36.681968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJNiz1JnGoLEysd0j"], "accumulated_threat_level": 6.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "2177325b-34fe-4d12-bb91-759a5fe25db8", "DetectTime": "2024-05-21T12:31:36.714807+00:00", "EventTime": "2024-05-21T12:31:36.714829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPJsAzkprQdwZBZ5"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 64} +{"Format": "IDEA0", "ID": "2e794e72-b8df-46df-a48c-c9a10269a7bd", "DetectTime": "2024-05-21T12:31:36.761851+00:00", "EventTime": "2024-05-21T12:31:36.761870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0rV6NQnJE1IrX2Ke"], "accumulated_threat_level": 8.2, "timewindow": 64} +{"Format": "IDEA0", "ID": "2cdbc65f-15b6-4038-a5b1-12224cd76693", "DetectTime": "2024-05-21T12:31:36.796300+00:00", "EventTime": "2024-05-21T12:31:36.796320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNhsD1Ijx0pVX4S4a"], "accumulated_threat_level": 9.0, "timewindow": 64} +{"Format": "IDEA0", "ID": "fb13df7e-65ea-484e-8ca1-648543cdacfd", "DetectTime": "2024-05-21T12:31:36.821137+00:00", "EventTime": "2024-05-21T12:31:36.821159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d4Sd4C3eUqRoS5I7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "28a98f36-a6fb-4c2d-9e39-64a4694b3cf3", "DetectTime": "2024-05-21T12:31:36.846205+00:00", "EventTime": "2024-05-21T12:31:36.846223+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.45.57.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeOf01oEAunjyW5Ik"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "d4b712c2-9424-4414-913e-2cff3b3c83bc", "DetectTime": "2024-05-21T12:31:36.858054+00:00", "EventTime": "2024-05-21T12:31:36.858072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.45.57.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.45.57.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeOf01oEAunjyW5Ik"], "accumulated_threat_level": 1.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "9bbfe247-348a-47ab-8ef0-29f1ecdde2b2", "DetectTime": "2024-05-21T12:31:36.868188+00:00", "EventTime": "2024-05-21T12:31:36.868205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7LLN1wA0oQPJCuJe"], "accumulated_threat_level": 9.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "f7f0dfee-7031-42c7-9501-a1475b9f176b", "DetectTime": "2024-05-21T12:31:36.992644+00:00", "EventTime": "2024-05-21T12:31:36.992665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjx57M263WeeC7gQP9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "b8d7da8a-722c-4395-bcfc-cedc2ae62ad4", "DetectTime": "2024-05-21T12:31:37.054274+00:00", "EventTime": "2024-05-21T12:31:37.054304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnatGd3vX04rfA3KY", "Cx2c0z4CWH7QtUj11e", "Cu8Hph2bk3lhY8Hmth", "CJYQoV33Wn27XsfAb1"], "accumulated_threat_level": 10.3, "timewindow": 64} +{"Format": "IDEA0", "ID": "7bbd139f-5717-4b5d-a043-9bac3b23d186", "DetectTime": "2024-05-21T12:31:37.066960+00:00", "EventTime": "2024-05-21T12:31:37.066979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8n2563YkUkXNjTkC9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "5c18d3c9-b3ab-4554-a6ef-6a6a6baef7ff", "DetectTime": "2024-05-21T12:31:37.071942+00:00", "EventTime": "2024-05-21T12:31:37.071961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.31.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgX44Z3LmsBrHjCwFl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "c40147a8-d28f-41a8-981c-28b3949eee50", "DetectTime": "2024-05-21T12:31:37.119545+00:00", "EventTime": "2024-05-21T12:31:37.119566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLcnX3e3CY6doXNGg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "3b56d47e-9ea9-4256-8008-9b8f72b47401", "DetectTime": "2024-05-21T12:31:37.191505+00:00", "EventTime": "2024-05-21T12:31:37.191527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP6y0e1XAjmCbgp3Y4"], "accumulated_threat_level": 11.100000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "8d1c83af-e023-4072-82f7-0ad3fa50864a", "DetectTime": "2024-05-21T12:31:37.243086+00:00", "EventTime": "2024-05-21T12:31:37.243109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lvHB1RwFfu9NGtW4"], "accumulated_threat_level": 11.900000000000002, "timewindow": 64} +{"Format": "IDEA0", "ID": "f65d94da-d481-4202-ba03-12a4d44cf2ab", "DetectTime": "2024-05-21T12:31:37.285312+00:00", "EventTime": "2024-05-21T12:31:37.285332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crk7YV2aU0PKov7Jwh"], "accumulated_threat_level": 12.700000000000003, "timewindow": 64} +{"Format": "Json", "ID": "f65d94da-d481-4202-ba03-12a4d44cf2ab", "DetectTime": "2024-05-21T12:31:37.285312+00:00", "EventTime": "2024-05-21T12:31:37.285332+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "1970-01-03T15:04:57.939369+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2024/05/21 12:31:37.776553)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 64, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "f8e7130c-4d9d-45de-bbb1-2c515ea59460", "DetectTime": "2024-05-21T12:31:37.787797+00:00", "EventTime": "2024-05-21T12:31:37.787816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTADe634bLue04PHLb"], "accumulated_threat_level": 0.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "a17af352-70ac-45d8-926d-f6dfff5a3d67", "DetectTime": "2024-05-21T12:31:37.796285+00:00", "EventTime": "2024-05-21T12:31:37.796306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySoSc4yoHwoDw7Rzf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "93c36f03-f634-4960-b336-c0c9e6eea2b6", "DetectTime": "2024-05-21T12:31:37.807476+00:00", "EventTime": "2024-05-21T12:31:37.807495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblOMI3mVwdLZCzJcf"], "accumulated_threat_level": 1.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "ff425689-7cf8-4489-a568-978a19d35128", "DetectTime": "2024-05-21T12:31:37.812699+00:00", "EventTime": "2024-05-21T12:31:37.812717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtAilO11tZJqYwEpy6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "b7bf02bc-ff5d-4dc0-a91f-1dbb03d365b4", "DetectTime": "2024-05-21T12:31:37.817225+00:00", "EventTime": "2024-05-21T12:31:37.817242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaliMy37XWvcS1JyKh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "b20f9dcb-fd6a-4134-8f2a-9bcd79c34341", "DetectTime": "2024-05-21T12:31:37.821600+00:00", "EventTime": "2024-05-21T12:31:37.821618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.3.142.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKMWtz1EeYuj3Qqqi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "7c937e2e-bf3b-4da2-b5f8-10bb02b65c77", "DetectTime": "2024-05-21T12:31:37.837735+00:00", "EventTime": "2024-05-21T12:31:37.837753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2O9Vv3Gq5ON07Ptof"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 64} +{"Format": "IDEA0", "ID": "f75fae53-2122-4328-a47e-9a22ae8b2f32", "DetectTime": "2024-05-21T12:31:37.842357+00:00", "EventTime": "2024-05-21T12:31:37.842374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOC1k2jwL8QXTgrU2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "76f7d642-fef3-4b6b-8d98-c5c478338a4b", "DetectTime": "2024-05-21T12:31:37.848601+00:00", "EventTime": "2024-05-21T12:31:37.848621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5uda2EvJGFMvXR48"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "ce290fa2-8c67-4d27-a66b-949eb5939d28", "DetectTime": "2024-05-21T12:31:37.886103+00:00", "EventTime": "2024-05-21T12:31:37.886125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lh2w1kwomXhH2N1j"], "accumulated_threat_level": 3.2, "timewindow": 64} +{"Format": "IDEA0", "ID": "62077bfb-07e5-4c58-ace7-b7ea97be51ad", "DetectTime": "2024-05-21T12:31:37.890835+00:00", "EventTime": "2024-05-21T12:31:37.890852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMawUq1MzQrW4KdFYc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "64f0c408-9dc3-48da-983d-bfec5028d30d", "DetectTime": "2024-05-21T12:31:37.895037+00:00", "EventTime": "2024-05-21T12:31:37.895054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDbm12grBVu6Poyc8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "a3802417-9547-4657-b5f3-c341244ea493", "DetectTime": "2024-05-21T12:31:37.899571+00:00", "EventTime": "2024-05-21T12:31:37.899589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMUCRR3Q90Otkr7kUh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "725a6986-3a80-40ca-abf6-23a36def1808", "DetectTime": "2024-05-21T12:31:37.929005+00:00", "EventTime": "2024-05-21T12:31:37.929031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFB5Vo1gxtS8eLUmMg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "1d8ea83c-e5f5-4edd-84d4-65e50f301da7", "DetectTime": "2024-05-21T12:31:37.940331+00:00", "EventTime": "2024-05-21T12:31:37.940349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKLlx2hM2sf6GbAr3"], "accumulated_threat_level": 4.0, "timewindow": 64} +{"Format": "IDEA0", "ID": "dc978244-780e-49e4-8dc6-52e14339066b", "DetectTime": "2024-05-21T12:31:37.975950+00:00", "EventTime": "2024-05-21T12:31:37.975971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3y2N1MMciq750Ys"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "7c83f699-8dd9-4419-b7c9-7de7b36252db", "DetectTime": "2024-05-21T12:31:38.008132+00:00", "EventTime": "2024-05-21T12:31:38.008155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6aSgIv9ZxYEyKP2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "08ef2f80-7a62-4a50-b9fe-d1e7d19dc168", "DetectTime": "2024-05-21T12:31:38.042926+00:00", "EventTime": "2024-05-21T12:31:38.042944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYecXr3KnuGuQwLVS3"], "accumulated_threat_level": 4.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "8dc0efd7-d77f-4038-bf9b-010f74285ac4", "DetectTime": "2024-05-21T12:31:38.059500+00:00", "EventTime": "2024-05-21T12:31:38.059521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ8m4F48G3LDodTsK4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "f87c17aa-cd08-46c0-bf5d-ad45c9079c2b", "DetectTime": "2024-05-21T12:31:38.094630+00:00", "EventTime": "2024-05-21T12:31:38.094651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClacF64sjP0sBiR8Bd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "41f6df0e-d53e-43ea-b29d-12bfd2c502ee", "DetectTime": "2024-05-21T12:31:38.123622+00:00", "EventTime": "2024-05-21T12:31:38.123643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWIXjruLwhNeeonc"], "accumulated_threat_level": 5.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "6b299103-d876-46a8-a5b2-460214f5fa00", "DetectTime": "2024-05-21T12:31:38.147822+00:00", "EventTime": "2024-05-21T12:31:38.147843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.10.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGwgEX2yU7LnKVUsub"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "41b3021d-68d8-4ed1-a3cd-77621389849a", "DetectTime": "2024-05-21T12:31:38.181249+00:00", "EventTime": "2024-05-21T12:31:38.181273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2OL4x42cniuHQFvol"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "cb4fe675-6eb1-49d4-9730-2c205cefd1a1", "DetectTime": "2024-05-21T12:31:38.194054+00:00", "EventTime": "2024-05-21T12:31:38.194076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqn09F1fG53FDUsZzg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 64} +{"Format": "IDEA0", "ID": "4c2f08fe-039a-4559-b136-d4a2e58efb5f", "DetectTime": "2024-05-21T12:31:38.463494+00:00", "EventTime": "2024-05-21T12:31:38.463513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0I9Vx3wNXVOnPMK5b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "457502c9-831b-416d-ad09-dc5219d0c5fd", "DetectTime": "2024-05-21T12:31:38.494002+00:00", "EventTime": "2024-05-21T12:31:38.494023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtBnF3ZmgzSwngW65"], "accumulated_threat_level": 7.199999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "a914c5bb-498c-4422-8136-7ab2b39279e0", "DetectTime": "2024-05-21T12:31:38.526773+00:00", "EventTime": "2024-05-21T12:31:38.526795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1QLf4nuI87RvN9le"], "accumulated_threat_level": 7.999999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "80862f74-95e8-4478-8235-347b273fea46", "DetectTime": "2024-05-21T12:31:38.550556+00:00", "EventTime": "2024-05-21T12:31:38.550577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqGXt3la6Mown41tb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "bf0f439e-8223-4635-9da4-6067ef980f39", "DetectTime": "2024-05-21T12:31:38.580671+00:00", "EventTime": "2024-05-21T12:31:38.580689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVEaMB17TOuIux67S7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "84b54aee-ba38-4c7e-bae1-fe13f4602f99", "DetectTime": "2024-05-21T12:31:38.605255+00:00", "EventTime": "2024-05-21T12:31:38.605280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0nqjVq7sEjpfBVSb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "eef3748b-41ab-4c57-8b14-f657415157cc", "DetectTime": "2024-05-21T12:31:38.644889+00:00", "EventTime": "2024-05-21T12:31:38.644908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIJj02BBC65R9tgMg"], "accumulated_threat_level": 9.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "dfb41b48-5922-4096-8482-be4ee6e2e82f", "DetectTime": "2024-05-21T12:31:38.662764+00:00", "EventTime": "2024-05-21T12:31:38.662785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvetJwUccQlSYLL73"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "348f80f5-180d-4699-a962-5e170a8ce383", "DetectTime": "2024-05-21T12:31:38.698776+00:00", "EventTime": "2024-05-21T12:31:38.698793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COa7tW25Ibyovoexh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "35d1309f-7200-4ddf-a637-78019003a91e", "DetectTime": "2024-05-21T12:31:38.765208+00:00", "EventTime": "2024-05-21T12:31:38.765228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.119.104"]}], "Attach": [{"Content": "Connection to unknown destination port 23159/UDP destination IP 188.169.119.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhqWa4txKTavLOsnh"], "accumulated_threat_level": 10.4, "timewindow": 64} +{"Format": "IDEA0", "ID": "bc44d83c-ecdd-4e51-907d-f6cafdc1c4ea", "DetectTime": "2024-05-21T12:31:39.027129+00:00", "EventTime": "2024-05-21T12:31:39.027149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.240.31.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpI3Ge1iL4bagr4A42"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "a27de66b-b328-4ad3-b391-c68732e70c3d", "DetectTime": "2024-05-21T12:31:39.038346+00:00", "EventTime": "2024-05-21T12:31:39.038369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUXJB1YB8Tt5m60cf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "ceb403e4-aabd-41ec-a373-45ca0b44ab6c", "DetectTime": "2024-05-21T12:31:39.060109+00:00", "EventTime": "2024-05-21T12:31:39.060128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrIrD48VkGFuu6Fia"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "c69d3983-e1e6-4235-b489-bdcff8136dbe", "DetectTime": "2024-05-21T12:31:39.108908+00:00", "EventTime": "2024-05-21T12:31:39.108929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZEOJYEtZihjnJd3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "78a9cc3a-dbb0-4c81-a46c-bf9565ebcbba", "DetectTime": "2024-05-21T12:31:39.135375+00:00", "EventTime": "2024-05-21T12:31:39.135396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.162.184.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctHEX1iWEzEBqQzle"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "6586ef85-277b-4711-bd4b-ed71f625abb7", "DetectTime": "2024-05-21T12:31:39.164992+00:00", "EventTime": "2024-05-21T12:31:39.165014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmzl1J3ZjNC1dtQee3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "a247896e-ae9d-4d99-9585-23ade095167a", "DetectTime": "2024-05-21T12:31:39.199719+00:00", "EventTime": "2024-05-21T12:31:39.199740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduzuW18zxtKIl2fkj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 64} +{"Format": "Json", "ID": "a247896e-ae9d-4d99-9585-23ade095167a", "DetectTime": "2024-05-21T12:31:39.199719+00:00", "EventTime": "2024-05-21T12:31:39.199740+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "1970-01-03T15:05:50.502246+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2024/05/21 12:31:39.359867)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 64, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9e438bb0-2616-44e1-9874-211ca4fcf7c9", "DetectTime": "2024-05-21T12:31:39.375291+00:00", "EventTime": "2024-05-21T12:31:39.375309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crp5I540z3gq5KPcL7"], "accumulated_threat_level": 0.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "37ad11a8-ba67-414e-8823-3092ef40d927", "DetectTime": "2024-05-21T12:31:39.380427+00:00", "EventTime": "2024-05-21T12:31:39.380445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.3.142.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX3kTO3fYCr9oJIyoc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "ba3b0c3f-5cad-45c8-8d24-5838c0ed6ddd", "DetectTime": "2024-05-21T12:31:39.385908+00:00", "EventTime": "2024-05-21T12:31:39.385932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.170.10.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yoxk3jDfsm0YkwU2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "4b5cef31-3e50-4997-a06c-010122f9f5c9", "DetectTime": "2024-05-21T12:31:39.396778+00:00", "EventTime": "2024-05-21T12:31:39.396798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ZbcePf1LznCqq17"], "accumulated_threat_level": 1.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "b3b07a09-046b-47ed-8dee-b85d1d3e3b78", "DetectTime": "2024-05-21T12:31:39.606653+00:00", "EventTime": "2024-05-21T12:31:39.606674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKe9s9eknlGBqYMWb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "d0af5489-3a86-4abe-8c5b-55c1925c334b", "DetectTime": "2024-05-21T12:31:39.642785+00:00", "EventTime": "2024-05-21T12:31:39.642806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjZ6DY2RTs2Cn8hTLe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "14d36bf1-5b2d-4d18-b797-9cda9b208d5d", "DetectTime": "2024-05-21T12:31:39.693635+00:00", "EventTime": "2024-05-21T12:31:39.693656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuVK9X1fYJFdgfgUf9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "b0e703bc-acd3-4e18-af2e-939edcf1f7d5", "DetectTime": "2024-05-21T12:31:39.742818+00:00", "EventTime": "2024-05-21T12:31:39.742839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsH4t27wSsUMeDIG8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "d4a4d8a5-ef86-44f9-90b8-fa7077e3f1e6", "DetectTime": "2024-05-21T12:31:39.789999+00:00", "EventTime": "2024-05-21T12:31:39.790018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbHHi4PmO6Eio39wb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "5b436d69-db21-475f-9ba9-29d7ae08b267", "DetectTime": "2024-05-21T12:31:39.816753+00:00", "EventTime": "2024-05-21T12:31:39.816777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTtaC2zlyGQVgeyFd", "CQvUyI3LDi33ck4j87", "CqI2EK3DSLwf9yIxHd", "CoP32F33kubC6KDgKj"], "accumulated_threat_level": 2.1, "timewindow": 64} +{"Format": "IDEA0", "ID": "877db58b-d385-4da5-bf4f-3c4416b4b57a", "DetectTime": "2024-05-21T12:31:39.824373+00:00", "EventTime": "2024-05-21T12:31:39.824392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIRKD44YlmlRD54q2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "7941af63-d31f-4bfc-9b4e-db02e88db105", "DetectTime": "2024-05-21T12:31:39.857860+00:00", "EventTime": "2024-05-21T12:31:39.857879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.239.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyEKRz2s4NbJSN0uf9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "2363e32f-3a43-4d8d-9846-2789c8240c36", "DetectTime": "2024-05-21T12:31:39.900810+00:00", "EventTime": "2024-05-21T12:31:39.900832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdY76y4kM1Ec5WIMz2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "2e0e8201-7a1d-4195-a9b2-0091c4bc016f", "DetectTime": "2024-05-21T12:31:39.954037+00:00", "EventTime": "2024-05-21T12:31:39.954058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiiaSc4SoRmhpZeDpc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "bc5aa1ef-71a9-4efe-b7d5-599bfcdc3e50", "DetectTime": "2024-05-21T12:31:39.979568+00:00", "EventTime": "2024-05-21T12:31:39.979588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.99.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C68yBH39VQ9xS5Zoja"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "992ad304-1c91-4695-ad69-36d71068f81c", "DetectTime": "2024-05-21T12:31:40.021531+00:00", "EventTime": "2024-05-21T12:31:40.021557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlCGp2PfhpIwKXXOi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "ba156185-aa32-40da-92b8-d52630bc0bfb", "DetectTime": "2024-05-21T12:31:40.306107+00:00", "EventTime": "2024-05-21T12:31:40.306127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Lo643piulum0iHi2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "c9daa1bc-e900-4cd0-8e36-01960fd48108", "DetectTime": "2024-05-21T12:31:40.310882+00:00", "EventTime": "2024-05-21T12:31:40.310902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJ55C2OazBBFm7uNk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "c6ff7719-76ba-485c-ac41-352000ed8ae8", "DetectTime": "2024-05-21T12:31:40.315465+00:00", "EventTime": "2024-05-21T12:31:40.315484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtcDmn20hLXoaBopDj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "d7f584fa-4a72-45d8-9dba-93cd62109df5", "DetectTime": "2024-05-21T12:31:40.336681+00:00", "EventTime": "2024-05-21T12:31:40.336701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEflO72fFB8lAb73Zf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "3b241d8f-1585-4628-9a6b-f366cee91ad7", "DetectTime": "2024-05-21T12:31:40.403194+00:00", "EventTime": "2024-05-21T12:31:40.403224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXbZQ33jxGKF8TSZ2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "d1eb5fc7-dd65-4975-82f0-9356115cd611", "DetectTime": "2024-05-21T12:31:40.440126+00:00", "EventTime": "2024-05-21T12:31:40.440147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGgjC4Ma81Aq8c5T3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "e577a548-97b0-4359-9778-6fa0088edeb0", "DetectTime": "2024-05-21T12:31:40.452329+00:00", "EventTime": "2024-05-21T12:31:40.452348+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.172.99.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppPAYSOrVQ2gQ476"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "ba01d14a-a6e9-42ca-9e9a-0002e0680271", "DetectTime": "2024-05-21T12:31:40.465544+00:00", "EventTime": "2024-05-21T12:31:40.465562+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.172.99.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.172.99.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppPAYSOrVQ2gQ476"], "accumulated_threat_level": 1.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "d953bc08-2e5e-4706-8433-0a14afecd018", "DetectTime": "2024-05-21T12:31:40.478505+00:00", "EventTime": "2024-05-21T12:31:40.478527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9qmi3sNfupUE3Bee"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "ce611312-f97e-413c-8b6b-032c932353c6", "DetectTime": "2024-05-21T12:31:40.509700+00:00", "EventTime": "2024-05-21T12:31:40.509721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3ntCPNWfRqmgw5f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "02bf61bb-d26f-4926-8b75-509e5f021f62", "DetectTime": "2024-05-21T12:31:40.690168+00:00", "EventTime": "2024-05-21T12:31:40.690189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWtBV1IiUPh9pDyf2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "f1f7d558-61ed-4bf3-9d82-8ad61014755d", "DetectTime": "2024-05-21T12:31:40.907000+00:00", "EventTime": "2024-05-21T12:31:40.907021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C377cy2uMzcqjrSwul"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "2d0110ef-e73b-46eb-9c85-a220b2b1e05d", "DetectTime": "2024-05-21T12:31:40.983915+00:00", "EventTime": "2024-05-21T12:31:40.983937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88XAx3nieglc6D3P9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "5694a058-c78b-4692-bff8-9902d19c2273", "DetectTime": "2024-05-21T12:31:41.543193+00:00", "EventTime": "2024-05-21T12:31:41.543216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL6Phv3jytSDDpBYs3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 64} +{"Format": "IDEA0", "ID": "3788372f-06ed-46ff-ad8f-b29e2750cf99", "DetectTime": "2024-05-21T12:31:41.551988+00:00", "EventTime": "2024-05-21T12:31:41.552009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqkRc3xclMY8Qoem5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "7590416d-991c-48b6-96b6-6b876bbab840", "DetectTime": "2024-05-21T12:31:41.557100+00:00", "EventTime": "2024-05-21T12:31:41.557118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.31.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cucew63YLFxRoB1mO5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "c458945b-f5fb-4dff-9645-eb046951969a", "DetectTime": "2024-05-21T12:31:41.561853+00:00", "EventTime": "2024-05-21T12:31:41.561871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCafULwV39PjyiV8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "7d08fe7e-efec-4f05-8dfa-6b33b455bff9", "DetectTime": "2024-05-21T12:31:41.566270+00:00", "EventTime": "2024-05-21T12:31:41.566288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHXvfdsujqLbdoQ9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "eaecb76f-a30a-4cff-87b7-d976f15b05b0", "DetectTime": "2024-05-21T12:31:41.571131+00:00", "EventTime": "2024-05-21T12:31:41.571150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdhM9dvELDXRgHe5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "0d27c2fb-e028-45bf-982c-5f386d4b0eb7", "DetectTime": "2024-05-21T12:31:41.575581+00:00", "EventTime": "2024-05-21T12:31:41.575598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiumq4EHCCmzPiezd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "3d21560b-e817-4424-b18c-25d2307e1363", "DetectTime": "2024-05-21T12:31:41.615233+00:00", "EventTime": "2024-05-21T12:31:41.615258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPddzOU9cBhBmpdni"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "86ea5642-86b9-4ee1-b1f8-174d06536f5e", "DetectTime": "2024-05-21T12:31:41.625833+00:00", "EventTime": "2024-05-21T12:31:41.625854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7NvHPfvxHrr0sNHl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "2f38d9f4-a1b8-470e-a161-f9d0006929f2", "DetectTime": "2024-05-21T12:31:41.630885+00:00", "EventTime": "2024-05-21T12:31:41.630903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZNWB2Y6rARWa4lr5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "e03f6708-2217-427e-ae2a-ea570299ff52", "DetectTime": "2024-05-21T12:31:42.085898+00:00", "EventTime": "2024-05-21T12:31:42.085922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2tTsu3xRqOaanx5Oc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "c3e72d14-1105-4ef8-927e-1acc7a62f392", "DetectTime": "2024-05-21T12:31:42.127924+00:00", "EventTime": "2024-05-21T12:31:42.127946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSGmN2rU3imGXK4L5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "47a87d7a-305f-4c85-bed6-9ec766e99764", "DetectTime": "2024-05-21T12:31:42.133347+00:00", "EventTime": "2024-05-21T12:31:42.133366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmChnH3O6qGCswvF7c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "31a2925f-e230-4a36-b3ca-f10f6d39bdca", "DetectTime": "2024-05-21T12:31:42.138010+00:00", "EventTime": "2024-05-21T12:31:42.138027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCr0o2jFzaAoyNgmj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "521c6623-3be7-485f-b5e8-e7ee3bed03a7", "DetectTime": "2024-05-21T12:31:42.142489+00:00", "EventTime": "2024-05-21T12:31:42.142507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQAF02JjLyiSJ9znl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "bf17de89-62a3-44d4-a56a-eef161f3560c", "DetectTime": "2024-05-21T12:31:42.146944+00:00", "EventTime": "2024-05-21T12:31:42.146964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmep42NYAAjjtwrN"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "5eab9f85-7828-4eca-8f74-52831fd12f23", "DetectTime": "2024-05-21T12:31:42.288948+00:00", "EventTime": "2024-05-21T12:31:42.288967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIEe8J1DChDJH75DW9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "e3383f55-c1e1-498c-87b2-900c28722b4a", "DetectTime": "2024-05-21T12:31:42.336062+00:00", "EventTime": "2024-05-21T12:31:42.336084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCrxbq3fAYdkkjnhgc"], "accumulated_threat_level": 3.7, "timewindow": 64} +{"Format": "IDEA0", "ID": "86687b27-3b2d-4efd-aaae-e565ab769d92", "DetectTime": "2024-05-21T12:31:42.341355+00:00", "EventTime": "2024-05-21T12:31:42.341373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4PBw1RJVkAR3KAI8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "75e0dc4f-923c-4673-aab9-498423d1323b", "DetectTime": "2024-05-21T12:31:42.358484+00:00", "EventTime": "2024-05-21T12:31:42.358506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWF9T3VOQphaGOUn3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "21a4da88-7572-467f-84fd-9f24e7aa5e4e", "DetectTime": "2024-05-21T12:31:42.363196+00:00", "EventTime": "2024-05-21T12:31:42.363215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN5Pit3hll414pVfZ6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "b6b957ef-283b-43bf-abce-df9a26ef218d", "DetectTime": "2024-05-21T12:31:42.367847+00:00", "EventTime": "2024-05-21T12:31:42.367865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.240.31.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAtjh4Xo90adpY5Ge"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "795de1b3-f50b-41c5-a0d5-6c47db665a81", "DetectTime": "2024-05-21T12:31:42.471276+00:00", "EventTime": "2024-05-21T12:31:42.471297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJvyT1bECzHeM0OT8"], "accumulated_threat_level": 4.5, "timewindow": 64} +{"Format": "IDEA0", "ID": "2663aa34-ea9b-432f-9292-83eb8256909d", "DetectTime": "2024-05-21T12:31:42.508371+00:00", "EventTime": "2024-05-21T12:31:42.508390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnibdD2LqswXTi7ZNk"], "accumulated_threat_level": 5.3, "timewindow": 64} +{"Format": "IDEA0", "ID": "2019cb67-8bdb-4f15-b6ba-343d4f5aa90a", "DetectTime": "2024-05-21T12:31:42.532551+00:00", "EventTime": "2024-05-21T12:31:42.532571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czqk0h1gLhYtXVzBo8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "928e2bdc-c1ff-435d-9b6e-1e7b053552b4", "DetectTime": "2024-05-21T12:31:42.563201+00:00", "EventTime": "2024-05-21T12:31:42.563220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPbq01coMLYyaYujc"], "accumulated_threat_level": 6.1, "timewindow": 64} +{"Format": "IDEA0", "ID": "2bac8442-208b-4e0a-8d37-f999291b178e", "DetectTime": "2024-05-21T12:31:42.589355+00:00", "EventTime": "2024-05-21T12:31:42.589376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.162.184.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDdN01qQi87xzexrl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 62} +{"Format": "IDEA0", "ID": "c3f9b49d-650b-455b-977f-46e787bd1301", "DetectTime": "2024-05-21T12:31:42.625389+00:00", "EventTime": "2024-05-21T12:31:42.625408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQMVQP39QI9AYE9qvg"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 64} +{"Format": "IDEA0", "ID": "4d0890b0-2a1d-42d7-ac91-10bbc03ba217", "DetectTime": "2024-05-21T12:31:42.883443+00:00", "EventTime": "2024-05-21T12:31:42.883464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0lqXg29tT3xpCYKq2"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "a30a454f-fb54-41f2-bf09-352d52e3cd1f", "DetectTime": "2024-05-21T12:31:42.915452+00:00", "EventTime": "2024-05-21T12:31:42.915471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZp5cg265kcJ3swOXh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "46aec788-ac08-42b4-a19a-a4ca5758a583", "DetectTime": "2024-05-21T12:31:42.951613+00:00", "EventTime": "2024-05-21T12:31:42.951632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NY8z4T8Fjq3CKUj7"], "accumulated_threat_level": 8.5, "timewindow": 64} +{"Format": "IDEA0", "ID": "867be0b7-4c1d-4463-8628-7c193799a5d6", "DetectTime": "2024-05-21T12:31:42.987745+00:00", "EventTime": "2024-05-21T12:31:42.987765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAqi02A35TiwZvboc"], "accumulated_threat_level": 9.3, "timewindow": 64} +{"Format": "IDEA0", "ID": "a6604a1c-f02d-420d-94b7-fabc14974ace", "DetectTime": "2024-05-21T12:31:43.060567+00:00", "EventTime": "2024-05-21T12:31:43.060590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA6zn92kn7keU1XnQc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "cf5d4c5d-eaac-4f29-933c-145428a97fd2", "DetectTime": "2024-05-21T12:31:43.085946+00:00", "EventTime": "2024-05-21T12:31:43.085964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cook32Sd4mWtzoNtd"], "accumulated_threat_level": 10.900000000000002, "timewindow": 64} +{"Format": "IDEA0", "ID": "efca04eb-aa70-4dfa-95a1-513bd0285ae6", "DetectTime": "2024-05-21T12:31:43.127499+00:00", "EventTime": "2024-05-21T12:31:43.127516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3YoM2FoSCKWxD8q8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 64} +{"Format": "IDEA0", "ID": "951a229c-488a-42ca-8ecf-f4a0f49e56b7", "DetectTime": "2024-05-21T12:31:43.158499+00:00", "EventTime": "2024-05-21T12:31:43.158520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "Connection to unknown destination port 26128/UDP destination IP 41.97.86.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOCnO2N5t9nyJhZCh"], "accumulated_threat_level": 12.500000000000004, "timewindow": 64} +{"Format": "Json", "ID": "951a229c-488a-42ca-8ecf-f4a0f49e56b7", "DetectTime": "2024-05-21T12:31:43.158499+00:00", "EventTime": "2024-05-21T12:31:43.158520+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.97.86.66"]}], "Attach": [{"Content": "1970-01-03T15:37:58.094925+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 64. (real time 2024/05/21 12:31:43.407995)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 64, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "b7a74c3c-d7dc-42c4-8640-675d015567b7", "DetectTime": "2024-05-21T12:31:43.418508+00:00", "EventTime": "2024-05-21T12:31:43.418526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEWVp2UGPWowKGtx3"], "accumulated_threat_level": 0.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "25e16366-2366-4777-af43-190748185ecd", "DetectTime": "2024-05-21T12:31:43.429190+00:00", "EventTime": "2024-05-21T12:31:43.429208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFIwmvIJR1MET6uh"], "accumulated_threat_level": 1.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "02034410-51a6-4d1a-8279-851be4e8888f", "DetectTime": "2024-05-21T12:31:43.433478+00:00", "EventTime": "2024-05-21T12:31:43.433496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaE3Je2TAydTjeRhE8", "CDsuBZ2Ex0xP0m4BTd", "C6Isc5385FLPPTkfAd", "CoDisT2G8Tbne8f7R1"], "accumulated_threat_level": 0.5, "timewindow": 65} +{"Format": "IDEA0", "ID": "2b6036b3-69eb-4fd3-af9c-e5e38efa4a95", "DetectTime": "2024-05-21T12:31:43.449455+00:00", "EventTime": "2024-05-21T12:31:43.449473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvV3iz3k4iTtMF3UJ7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 64} +{"Format": "IDEA0", "ID": "524e7f83-4242-4cf9-9e91-eea2e707690c", "DetectTime": "2024-05-21T12:31:43.459808+00:00", "EventTime": "2024-05-21T12:31:43.459826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.249.160.108"]}], "Attach": [{"Content": "Connection to unknown destination port 1711/UDP destination IP 88.249.160.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmsC34CqPNf4Fv9Hd"], "accumulated_threat_level": 3.2, "timewindow": 64} +{"Format": "IDEA0", "ID": "e25cb786-1494-458b-a12a-2a547a1bbc60", "DetectTime": "2024-05-21T12:31:43.471372+00:00", "EventTime": "2024-05-21T12:31:43.471396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C38mGzhpgO2gpT5E5"], "accumulated_threat_level": 4.0, "timewindow": 64} +{"Format": "IDEA0", "ID": "63940f08-6ef6-4f33-a57a-bb9edb32c754", "DetectTime": "2024-05-21T12:31:43.482212+00:00", "EventTime": "2024-05-21T12:31:43.482232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKk4RL3GwhUVUa4Uji"], "accumulated_threat_level": 4.8, "timewindow": 64} +{"Format": "IDEA0", "ID": "7c1f0c72-94cd-4b56-a3cf-57f0c8400977", "DetectTime": "2024-05-21T12:31:43.646686+00:00", "EventTime": "2024-05-21T12:31:43.646706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvgGjg4NaAZHr8HEBh"], "accumulated_threat_level": 5.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "b02bb706-df2c-4eae-907c-bde3cd433886", "DetectTime": "2024-05-21T12:31:43.681749+00:00", "EventTime": "2024-05-21T12:31:43.681767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEIVpj1SjCKEi4QYY"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 64} +{"Format": "IDEA0", "ID": "06825d37-f1c7-4fd3-8a6c-b4ddef81a566", "DetectTime": "2024-05-21T12:31:43.723085+00:00", "EventTime": "2024-05-21T12:31:43.723108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmF38S2ZikrXuDZQO5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "1922f89b-be88-45d7-802c-e33f2b38addf", "DetectTime": "2024-05-21T12:31:43.753959+00:00", "EventTime": "2024-05-21T12:31:43.753983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4cpy1K0nwbT5MB76"], "accumulated_threat_level": 7.999999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "43ba7694-32cb-402b-ada6-07bfcd3f7925", "DetectTime": "2024-05-21T12:31:43.793340+00:00", "EventTime": "2024-05-21T12:31:43.793360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qw3U6MG3hcYOfQk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 64} +{"Format": "IDEA0", "ID": "aff17d77-09d8-4f4b-8967-017f692613ee", "DetectTime": "2024-05-21T12:31:43.817208+00:00", "EventTime": "2024-05-21T12:31:43.817229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.239.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsrPZ7IVKZxcyw38"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "698d8bcb-87fc-46ed-9f85-a412bcace278", "DetectTime": "2024-05-21T12:31:43.864811+00:00", "EventTime": "2024-05-21T12:31:43.864829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLp4s1xDd5jpum9Yb"], "accumulated_threat_level": 9.6, "timewindow": 64} +{"Format": "IDEA0", "ID": "5a62114c-8408-452e-9e0a-5f47bd0659fa", "DetectTime": "2024-05-21T12:31:43.898499+00:00", "EventTime": "2024-05-21T12:31:43.898517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVeJEq1TytkK2dryB4"], "accumulated_threat_level": 10.4, "timewindow": 64} +{"Format": "IDEA0", "ID": "4ac1d854-68d0-42d0-9331-64af23827473", "DetectTime": "2024-05-21T12:31:43.934376+00:00", "EventTime": "2024-05-21T12:31:43.934402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3x2uz2ZeIjASLQl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "0f9b73bc-c09f-4308-ad60-d1222585ea5f", "DetectTime": "2024-05-21T12:31:43.948504+00:00", "EventTime": "2024-05-21T12:31:43.948521+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.191.16.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.191.16.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C08lJW1N87T4ciP80e"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "28ef8b6d-ebd0-4925-8699-5d0e5afca200", "DetectTime": "2024-05-21T12:31:43.960474+00:00", "EventTime": "2024-05-21T12:31:43.960494+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.191.16.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.191.16.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C08lJW1N87T4ciP80e"], "accumulated_threat_level": 2.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "726d8245-6305-43a8-ad8e-86d9806324a0", "DetectTime": "2024-05-21T12:31:44.046499+00:00", "EventTime": "2024-05-21T12:31:44.046522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCv2XLaYbxteVevh"], "accumulated_threat_level": 1.3, "timewindow": 65} +{"Format": "IDEA0", "ID": "d81f66cb-59ef-4423-a6fd-cb6f8cba458f", "DetectTime": "2024-05-21T12:31:44.144663+00:00", "EventTime": "2024-05-21T12:31:44.144682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.97.99.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C427Ud26fqhhv6Cixl"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "6520031d-8e88-4e1a-b1d9-dc4306c4e7ea", "DetectTime": "2024-05-21T12:31:44.179920+00:00", "EventTime": "2024-05-21T12:31:44.179942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgDcAQ6TdatwMUPc"], "accumulated_threat_level": 2.1, "timewindow": 65} +{"Format": "IDEA0", "ID": "0b3ad2ae-3a26-4235-9b97-e3bf2dd27476", "DetectTime": "2024-05-21T12:31:44.458578+00:00", "EventTime": "2024-05-21T12:31:44.458596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXoBkD4q52ak27xpbg"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 65} +{"Format": "IDEA0", "ID": "0d4f4108-4b54-4730-b7ae-f944b620eee6", "DetectTime": "2024-05-21T12:31:44.756448+00:00", "EventTime": "2024-05-21T12:31:44.756468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXcCcsl1TEs3PAbza"], "accumulated_threat_level": 3.7, "timewindow": 65} +{"Format": "IDEA0", "ID": "77b9890c-7303-454e-9b37-f6ec2db2ac6c", "DetectTime": "2024-05-21T12:31:44.761498+00:00", "EventTime": "2024-05-21T12:31:44.761516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.96.31.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjh5P5GiyxVqCqQz"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "ede1961d-bb0c-4787-8e03-8b00384fb535", "DetectTime": "2024-05-21T12:31:44.813263+00:00", "EventTime": "2024-05-21T12:31:44.813283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM425yza7ACoeFwfk"], "accumulated_threat_level": 4.5, "timewindow": 65} +{"Format": "IDEA0", "ID": "f396b31c-0a9c-4c2c-88b1-ea505e4e12db", "DetectTime": "2024-05-21T12:31:44.836945+00:00", "EventTime": "2024-05-21T12:31:44.836965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9KUn1rmwmhM47ERk"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "de874e1c-47b8-4bc5-b314-8871a2107842", "DetectTime": "2024-05-21T12:31:44.872613+00:00", "EventTime": "2024-05-21T12:31:44.872635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXxZ418sVny6G8yJ1"], "accumulated_threat_level": 5.3, "timewindow": 65} +{"Format": "IDEA0", "ID": "ee2fe4fb-5f8b-4949-b518-801ca406998e", "DetectTime": "2024-05-21T12:31:44.890567+00:00", "EventTime": "2024-05-21T12:31:44.890589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.240.31.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwmBVDbXxdd6BbWQ4"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "51951dd3-cd16-43f4-804e-926029f29dbe", "DetectTime": "2024-05-21T12:31:44.933010+00:00", "EventTime": "2024-05-21T12:31:44.933029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQd1G4BiSs6PCZ1u5"], "accumulated_threat_level": 6.1, "timewindow": 65} +{"Format": "IDEA0", "ID": "0177cd11-603d-467f-a5d4-5b9aa671189e", "DetectTime": "2024-05-21T12:31:44.957942+00:00", "EventTime": "2024-05-21T12:31:44.957960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.162.184.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmwwj63Rr5mBNv2EL8"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "14271f35-e7e4-452d-b660-d0f093ae876f", "DetectTime": "2024-05-21T12:31:44.990899+00:00", "EventTime": "2024-05-21T12:31:44.990917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbdflu1ujnjOGV16l3"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 65} +{"Format": "IDEA0", "ID": "ac07864a-975e-49c2-adb6-77019c29b5d4", "DetectTime": "2024-05-21T12:31:45.026776+00:00", "EventTime": "2024-05-21T12:31:45.026795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEXKZs2TuA4CsNlo6g"], "accumulated_threat_level": 7.699999999999999, "timewindow": 65} +{"Format": "IDEA0", "ID": "b05a6109-25fa-45a9-9fe4-4721cf9fb1ed", "DetectTime": "2024-05-21T12:31:45.077187+00:00", "EventTime": "2024-05-21T12:31:45.077207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHGcE4ilBB6WoD4Z7"], "accumulated_threat_level": 8.5, "timewindow": 65} +{"Format": "IDEA0", "ID": "dffbbfb2-a48e-48d1-94a6-b4c88493dd3d", "DetectTime": "2024-05-21T12:31:45.109590+00:00", "EventTime": "2024-05-21T12:31:45.109607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckcat61hEH9AjvuNEb"], "accumulated_threat_level": 9.3, "timewindow": 65} +{"Format": "IDEA0", "ID": "b43db383-2a15-4030-9e93-990c144a7a0e", "DetectTime": "2024-05-21T12:31:45.144966+00:00", "EventTime": "2024-05-21T12:31:45.144984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYSHIK3YIdhie6OmK8"], "accumulated_threat_level": 10.100000000000001, "timewindow": 65} +{"Format": "IDEA0", "ID": "d352341f-8db4-444f-b34f-009717131be9", "DetectTime": "2024-05-21T12:31:45.194907+00:00", "EventTime": "2024-05-21T12:31:45.194929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWM2cTApKwPo9Mg8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 65} +{"Format": "IDEA0", "ID": "0cc4d8ba-4ce9-402f-9370-fde9f50baa36", "DetectTime": "2024-05-21T12:31:45.472976+00:00", "EventTime": "2024-05-21T12:31:45.472997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Zpju2urIFr7BVB5i"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "a93d48c8-e077-4d6c-8bf2-504423718079", "DetectTime": "2024-05-21T12:31:45.477726+00:00", "EventTime": "2024-05-21T12:31:45.477744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eH0X24JSw1EpwSs1"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "af7bd896-064e-4b79-9e2f-0e80c5890763", "DetectTime": "2024-05-21T12:31:45.482010+00:00", "EventTime": "2024-05-21T12:31:45.482028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp93FAyeyUt1Sz9Dg"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "0344b562-6d00-4f92-89a0-8dbc8696ee02", "DetectTime": "2024-05-21T12:31:45.534090+00:00", "EventTime": "2024-05-21T12:31:45.534109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54TZfUX7j1simsOe"], "accumulated_threat_level": 11.700000000000003, "timewindow": 65} +{"Format": "IDEA0", "ID": "5c4f923d-0f32-402f-97d8-6db4658c8cae", "DetectTime": "2024-05-21T12:31:45.636803+00:00", "EventTime": "2024-05-21T12:31:45.636824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4sK923AlBCMFjpR8"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "963ce119-5e26-4427-b6e6-de3a5c7716d3", "DetectTime": "2024-05-21T12:31:45.670077+00:00", "EventTime": "2024-05-21T12:31:45.670097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qgarDTmvNOkdkAg"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "10685acc-0f03-45bf-99ea-0bb3e0cf1ed4", "DetectTime": "2024-05-21T12:31:45.679537+00:00", "EventTime": "2024-05-21T12:31:45.679558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLhio446QIzsDd7"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "608c96a9-6114-43ca-b768-a2d834c54271", "DetectTime": "2024-05-21T12:31:45.729200+00:00", "EventTime": "2024-05-21T12:31:45.729220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4Awy2Kz2V74QPiRb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 65} +{"Format": "Json", "ID": "608c96a9-6114-43ca-b768-a2d834c54271", "DetectTime": "2024-05-21T12:31:45.729200+00:00", "EventTime": "2024-05-21T12:31:45.729220+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "1970-01-03T16:09:23.606857+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2024/05/21 12:31:45.935062)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 65, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "ec68c276-b7c2-40a6-9f71-71c47939fdd4", "DetectTime": "2024-05-21T12:31:45.939395+00:00", "EventTime": "2024-05-21T12:31:45.939415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKksL1FcQSXWhITqb"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "3f634dcc-e08b-4fc6-9b8e-487527ce62b7", "DetectTime": "2024-05-21T12:31:45.950793+00:00", "EventTime": "2024-05-21T12:31:45.950811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce3hJj3q2NQyrfKscf"], "accumulated_threat_level": 0.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "b0093827-7c4d-4b72-9434-2469747f0ddd", "DetectTime": "2024-05-21T12:31:45.960904+00:00", "EventTime": "2024-05-21T12:31:45.960922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJrCC3TRRqhP0zHm6"], "accumulated_threat_level": 1.6, "timewindow": 65} +{"Format": "IDEA0", "ID": "e7ed559f-f21f-4f5f-8dfb-0fdb4ed496b5", "DetectTime": "2024-05-21T12:31:45.976527+00:00", "EventTime": "2024-05-21T12:31:45.976547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP85NrjItzWLrVGw6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 65} +{"Format": "IDEA0", "ID": "14f62ce3-72bb-4d2c-add6-d2c5e1d30ea2", "DetectTime": "2024-05-21T12:31:45.981895+00:00", "EventTime": "2024-05-21T12:31:45.981914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hVSZ2tgBM1F3cSY2"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "04a2bd33-04f5-452a-9ab1-6262b5f276ae", "DetectTime": "2024-05-21T12:31:45.995257+00:00", "EventTime": "2024-05-21T12:31:45.995294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvwxD3enR9Kj5cqk4"], "accumulated_threat_level": 3.2, "timewindow": 65} +{"Format": "IDEA0", "ID": "0678f687-e7c1-4f4c-b4e9-d88a9714a4eb", "DetectTime": "2024-05-21T12:31:46.257129+00:00", "EventTime": "2024-05-21T12:31:46.257150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKj7tE3WgTxgHpclma"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "3d02295c-872c-48b7-b0e4-ca2e07d97ff4", "DetectTime": "2024-05-21T12:31:46.264211+00:00", "EventTime": "2024-05-21T12:31:46.264232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCfjGC4v4yYsewk5X1"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "70c21133-bbb0-462d-ab67-285c082c8444", "DetectTime": "2024-05-21T12:31:46.268999+00:00", "EventTime": "2024-05-21T12:31:46.269016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwWIBu3TVWjgI0eWr1"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "cc16c6ab-51b6-4f9e-8d91-13b0a5b2a10b", "DetectTime": "2024-05-21T12:31:46.275092+00:00", "EventTime": "2024-05-21T12:31:46.275115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkpHeM2vc2Jr0PBva7"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "78c34780-e555-4244-bc65-a8b9d07e6d73", "DetectTime": "2024-05-21T12:31:46.279651+00:00", "EventTime": "2024-05-21T12:31:46.279669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSk2y4Ntw8MVT5S15"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "c3791018-f769-4c28-8903-72b05e3a031b", "DetectTime": "2024-05-21T12:31:46.322116+00:00", "EventTime": "2024-05-21T12:31:46.322137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.76.136"]}], "Attach": [{"Content": "Connection to unknown destination port 17720/UDP destination IP 85.75.76.136. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpUNy3v0naq9DhwU9"], "accumulated_threat_level": 4.0, "timewindow": 65} +{"Format": "IDEA0", "ID": "99531ea5-0db8-4262-b81c-b5ceaceaa918", "DetectTime": "2024-05-21T12:31:46.328273+00:00", "EventTime": "2024-05-21T12:31:46.328291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsvOD1EHXBoOzZ4k9"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "662ff126-628a-46ab-ae1a-49996923ff3e", "DetectTime": "2024-05-21T12:31:46.457148+00:00", "EventTime": "2024-05-21T12:31:46.457171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqFkxP0aXILCZfc"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "d19b8bef-e1db-49c3-a516-45156d4f3fbf", "DetectTime": "2024-05-21T12:31:46.462060+00:00", "EventTime": "2024-05-21T12:31:46.462080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrPhu4vewdt9e1nI7"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "fe93ff85-ae26-4155-a996-4182fa680c58", "DetectTime": "2024-05-21T12:31:46.486775+00:00", "EventTime": "2024-05-21T12:31:46.486855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd90KRiEn8Jq6CKW4", "CwUEhh4MPVm5uvot1g", "C0WEM02wBJC4dzlw4d", "Cgm2BJZ6sURoSyjg2"], "accumulated_threat_level": 4.5, "timewindow": 65} +{"Format": "IDEA0", "ID": "c7efa838-ac34-4aa2-95d2-e6afc76ac702", "DetectTime": "2024-05-21T12:31:46.515975+00:00", "EventTime": "2024-05-21T12:31:46.515993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CspK4M1Je2RD3okpy6"], "accumulated_threat_level": 5.3, "timewindow": 65} +{"Format": "IDEA0", "ID": "a86e1c5f-2865-4bbd-ad46-558898250b04", "DetectTime": "2024-05-21T12:31:46.549589+00:00", "EventTime": "2024-05-21T12:31:46.549613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6JBEf10sqWgKwyYkk"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "ae42fb7f-3f07-463e-9276-02f490409e59", "DetectTime": "2024-05-21T12:31:46.554875+00:00", "EventTime": "2024-05-21T12:31:46.554897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyqrze1cfzyq70fdo1"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "c80d7645-0c8c-4c50-9758-fc28c5d9ead4", "DetectTime": "2024-05-21T12:31:46.608272+00:00", "EventTime": "2024-05-21T12:31:46.608291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGu8C28MlQdJle4p1"], "accumulated_threat_level": 6.1, "timewindow": 65} +{"Format": "IDEA0", "ID": "45c69c50-4da1-4786-a16e-131c6c06aee6", "DetectTime": "2024-05-21T12:31:46.613231+00:00", "EventTime": "2024-05-21T12:31:46.613251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLWOV9tB2CGguvY7"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "eac3dc3a-0095-4262-b54c-848fa48f8f9e", "DetectTime": "2024-05-21T12:31:46.882679+00:00", "EventTime": "2024-05-21T12:31:46.882699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZeq1R15J6xrnlqxIe"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "1b8df3af-4cee-4e7d-9b41-21974627d63d", "DetectTime": "2024-05-21T12:31:46.887410+00:00", "EventTime": "2024-05-21T12:31:46.887430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrHSh3qS2Y38Nsup2"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "5e551f0a-c901-40c0-b166-a01d439cb008", "DetectTime": "2024-05-21T12:31:46.892306+00:00", "EventTime": "2024-05-21T12:31:46.892327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C798X1gUuBDfOYOha"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "b6b3b608-be9b-4809-8637-dd60097f84b4", "DetectTime": "2024-05-21T12:31:46.953650+00:00", "EventTime": "2024-05-21T12:31:46.953675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLfAhS37b7RKhjO5Oc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 65} +{"Format": "IDEA0", "ID": "3e0f9205-ddd7-42e8-9228-fd053ace0ae0", "DetectTime": "2024-05-21T12:31:46.991697+00:00", "EventTime": "2024-05-21T12:31:46.991717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEdbF3MSObT4jC7C8"], "accumulated_threat_level": 7.699999999999999, "timewindow": 65} +{"Format": "IDEA0", "ID": "602dd3dd-c3ba-467c-b74b-cfc4d22a58fd", "DetectTime": "2024-05-21T12:31:47.031079+00:00", "EventTime": "2024-05-21T12:31:47.031099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerJdnAqwKvdRwpXl"], "accumulated_threat_level": 8.5, "timewindow": 65} +{"Format": "IDEA0", "ID": "da93fcaf-eb41-459a-8019-b4456234350c", "DetectTime": "2024-05-21T12:31:47.057781+00:00", "EventTime": "2024-05-21T12:31:47.057800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiNoT3PrkFCDHsoWf"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "2e432ac3-a2f6-4447-81ad-3497d0a363bd", "DetectTime": "2024-05-21T12:31:47.087876+00:00", "EventTime": "2024-05-21T12:31:47.087896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUc1O3kHjPddwyLrh"], "accumulated_threat_level": 9.3, "timewindow": 65} +{"Format": "IDEA0", "ID": "4030eed8-8207-4d16-a3e2-be93953fc046", "DetectTime": "2024-05-21T12:31:47.117110+00:00", "EventTime": "2024-05-21T12:31:47.117130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwYrL11ICcBiXkMhD9"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "6f05b839-42b9-4f24-be85-70f8c2f4711d", "DetectTime": "2024-05-21T12:31:47.147085+00:00", "EventTime": "2024-05-21T12:31:47.147110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSwsorCRzI8FHhobj"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "9700f6f8-3957-4ab9-b739-70d4596a0f9b", "DetectTime": "2024-05-21T12:31:47.184766+00:00", "EventTime": "2024-05-21T12:31:47.184785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cou65FWGEKa2Z1nR"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "468bda4e-423e-4a62-8631-cf60dda12d9c", "DetectTime": "2024-05-21T12:31:47.229403+00:00", "EventTime": "2024-05-21T12:31:47.229423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9DgV7ivgh6OS70g"], "accumulated_threat_level": 10.100000000000001, "timewindow": 65} +{"Format": "IDEA0", "ID": "831ff0b2-2d90-441e-ba01-885867178435", "DetectTime": "2024-05-21T12:31:47.255499+00:00", "EventTime": "2024-05-21T12:31:47.255522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQcyJ2vISvdBWl8Aa"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "4d847483-6769-48d9-b6a2-91a22e9f3b2e", "DetectTime": "2024-05-21T12:31:47.490192+00:00", "EventTime": "2024-05-21T12:31:47.490215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjXSqn22fKjjKzACxc"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "899f9c27-eefa-45f7-8644-6904502c09df", "DetectTime": "2024-05-21T12:31:47.495036+00:00", "EventTime": "2024-05-21T12:31:47.495055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUeXj2BiwczWgOqY4"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "a327e88b-7781-4e0b-baee-c27ba5c4e698", "DetectTime": "2024-05-21T12:31:47.511405+00:00", "EventTime": "2024-05-21T12:31:47.511427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2Fc8GeDXfH004mk"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "7c7e133e-05a5-4451-ad38-2d422ef329ab", "DetectTime": "2024-05-21T12:31:47.584620+00:00", "EventTime": "2024-05-21T12:31:47.584640+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.253.12"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbezN91YWIlQSFQKNf"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "809c46df-3342-4ac1-87b6-4ca3846a3fb6", "DetectTime": "2024-05-21T12:31:47.597765+00:00", "EventTime": "2024-05-21T12:31:47.597789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.253.12"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.253.12 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbezN91YWIlQSFQKNf"], "accumulated_threat_level": 2.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "4fe2ed09-d9dd-4386-a973-596b5485cfc3", "DetectTime": "2024-05-21T12:31:47.612623+00:00", "EventTime": "2024-05-21T12:31:47.612642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gasZ29fpKJCBKyh7"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "e36db6de-ea93-43fa-ad5e-5ba04f17438e", "DetectTime": "2024-05-21T12:31:47.861020+00:00", "EventTime": "2024-05-21T12:31:47.861039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOaVw4Nt6nLQzsrd4"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "c5d89e0b-2a34-41d9-a57b-54b06d87bf07", "DetectTime": "2024-05-21T12:31:47.908753+00:00", "EventTime": "2024-05-21T12:31:47.908775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzzOBc4LSVfKamCbDb"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "f5e972ab-6854-4b4d-aa60-81a60a6b3879", "DetectTime": "2024-05-21T12:31:47.945654+00:00", "EventTime": "2024-05-21T12:31:47.945677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfpDIx35DgKoO3GvN3"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "dfe57110-aedd-4793-b0c4-baf6b6026b7a", "DetectTime": "2024-05-21T12:31:48.102962+00:00", "EventTime": "2024-05-21T12:31:48.102982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxUNNoLulIFbFLfej", "CH1cHj4PFIkUVmFuob", "Cz0HsmvZHrrNEpipi", "CNQGci2VXTo4O74ve8"], "accumulated_threat_level": 10.600000000000001, "timewindow": 65} +{"Format": "IDEA0", "ID": "1dd48658-9f51-442c-927e-5c0f0467b3fd", "DetectTime": "2024-05-21T12:31:48.157095+00:00", "EventTime": "2024-05-21T12:31:48.157113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmDYzg3RnxnrltYRm2"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "c8cc43ec-1de9-4ef8-bf58-b8973a716adb", "DetectTime": "2024-05-21T12:31:48.230717+00:00", "EventTime": "2024-05-21T12:31:48.230744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cca6m73OU3KcAY4bVe"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "ccd12190-9cc0-40ac-bf2f-88c1200cd7f1", "DetectTime": "2024-05-21T12:31:48.269663+00:00", "EventTime": "2024-05-21T12:31:48.269684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8jpD43WDM5fQsHsh"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "628dbd96-c1ae-4604-8331-72e4ed614205", "DetectTime": "2024-05-21T12:31:48.466689+00:00", "EventTime": "2024-05-21T12:31:48.466712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpKPJ3LBr9KPPaAB3"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "494229b6-7e0b-44dd-b14d-9f824595d27d", "DetectTime": "2024-05-21T12:31:48.536462+00:00", "EventTime": "2024-05-21T12:31:48.536481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf07fr1DVPbyaSrZ9a"], "accumulated_threat_level": 11.400000000000002, "timewindow": 65} +{"Format": "IDEA0", "ID": "4bf53ea9-59f2-42c4-a537-7bb7d8769799", "DetectTime": "2024-05-21T12:31:48.587661+00:00", "EventTime": "2024-05-21T12:31:48.587681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUe8pR70sh81unlqh"], "accumulated_threat_level": 12.200000000000003, "timewindow": 65} +{"Format": "Json", "ID": "4bf53ea9-59f2-42c4-a537-7bb7d8769799", "DetectTime": "2024-05-21T12:31:48.587661+00:00", "EventTime": "2024-05-21T12:31:48.587681+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-03T16:41:00.504128+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2024/05/21 12:31:48.827962)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 65, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "b8965532-dd38-4dff-9091-3ebe680ce713", "DetectTime": "2024-05-21T12:31:48.832364+00:00", "EventTime": "2024-05-21T12:31:48.832383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4SI336P2X4iNUEbb"], "accumulated_threat_level": 5.6, "timewindow": 63} +{"Format": "IDEA0", "ID": "6608e018-af18-4e63-81b0-7bac31872538", "DetectTime": "2024-05-21T12:31:48.859677+00:00", "EventTime": "2024-05-21T12:31:48.859697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3VJek1twpPUXBVK2b"], "accumulated_threat_level": 0.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "1cc0ec54-71b6-4dfa-aa7f-a2adf587df89", "DetectTime": "2024-05-21T12:31:48.896556+00:00", "EventTime": "2024-05-21T12:31:48.896573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnwzlD13Fl9ZlAuMR1"], "accumulated_threat_level": 1.6, "timewindow": 65} +{"Format": "IDEA0", "ID": "6b2f437c-7cab-4595-aee7-35fd32adaaec", "DetectTime": "2024-05-21T12:31:48.932185+00:00", "EventTime": "2024-05-21T12:31:48.932205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kB0hDE7Y0MhLzz4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 65} +{"Format": "IDEA0", "ID": "9c867b96-dc20-42b5-9d28-766a44791257", "DetectTime": "2024-05-21T12:31:48.965257+00:00", "EventTime": "2024-05-21T12:31:48.965276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatXIV2rZfPdoMsHUd"], "accumulated_threat_level": 3.2, "timewindow": 65} +{"Format": "IDEA0", "ID": "1ae70cd0-287d-48f5-a871-f848426564de", "DetectTime": "2024-05-21T12:31:49.002061+00:00", "EventTime": "2024-05-21T12:31:49.002081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH6dx43tpb3zqMNn87"], "accumulated_threat_level": 4.0, "timewindow": 65} +{"Format": "IDEA0", "ID": "f6e03151-8af1-498c-940f-91295d9559e9", "DetectTime": "2024-05-21T12:31:49.037122+00:00", "EventTime": "2024-05-21T12:31:49.037141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjrHOp1aYUcbdsaip"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "2c7a3202-a6c4-4790-8761-7421bdbc8eb5", "DetectTime": "2024-05-21T12:31:49.077136+00:00", "EventTime": "2024-05-21T12:31:49.077154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAk5xa8VHNEWPIr3"], "accumulated_threat_level": 5.6, "timewindow": 65} +{"Format": "IDEA0", "ID": "3af48eca-cc79-485c-8541-dcb9b6d9ce7a", "DetectTime": "2024-05-21T12:31:49.170031+00:00", "EventTime": "2024-05-21T12:31:49.170055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.152.83.86"]}], "Attach": [{"Content": "Connection to unknown destination port 1377/UDP destination IP 81.152.83.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoC7a61CQxZ0BpoAGf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 65} +{"Format": "IDEA0", "ID": "fe8f4c78-b5b5-439c-89f1-37009e2c7bd8", "DetectTime": "2024-05-21T12:31:49.220839+00:00", "EventTime": "2024-05-21T12:31:49.220859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COELEz42aEULniZbzg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 65} +{"Format": "IDEA0", "ID": "10a78ac9-5dd8-49fd-aca6-cd854d49d229", "DetectTime": "2024-05-21T12:31:49.266059+00:00", "EventTime": "2024-05-21T12:31:49.266084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhYlG24w3Jupvp35i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 65} +{"Format": "IDEA0", "ID": "2bb5e375-1210-48ae-9f2e-8731c0e0afe8", "DetectTime": "2024-05-21T12:31:49.473878+00:00", "EventTime": "2024-05-21T12:31:49.473896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5t7Gb2lzikkQdzv3d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 65} +{"Format": "IDEA0", "ID": "08dcf4f2-d862-4c80-b736-33c9b81daa67", "DetectTime": "2024-05-21T12:31:49.511601+00:00", "EventTime": "2024-05-21T12:31:49.511624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.183.69.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2mUCA98lXRCOl87"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "7aba2863-0a0b-4619-a02e-d00746e92937", "DetectTime": "2024-05-21T12:31:49.544550+00:00", "EventTime": "2024-05-21T12:31:49.544574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uyhk4fIejtU3gN8b"], "accumulated_threat_level": 9.6, "timewindow": 65} +{"Format": "IDEA0", "ID": "d2699386-a5ab-4f2e-9f1e-6ce78d439e58", "DetectTime": "2024-05-21T12:31:49.573894+00:00", "EventTime": "2024-05-21T12:31:49.573915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50PIXcgMoxeHuHqd"], "accumulated_threat_level": 10.4, "timewindow": 65} +{"Format": "IDEA0", "ID": "bb6d2774-2c39-4bb9-aaa7-3dca8fbdbe9d", "DetectTime": "2024-05-21T12:31:49.828215+00:00", "EventTime": "2024-05-21T12:31:49.828246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.59.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cifl2e172lVDpDJMe3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "b9638ef4-10d8-46ac-9de1-12c43749cb58", "DetectTime": "2024-05-21T12:31:49.873542+00:00", "EventTime": "2024-05-21T12:31:49.873571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkBZO2mREimq6YfKh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 65} +{"Format": "IDEA0", "ID": "d019e4e3-61b1-4a3c-a8ce-864ab45b620b", "DetectTime": "2024-05-21T12:31:49.908971+00:00", "EventTime": "2024-05-21T12:31:49.908991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5lR325iJs0ficzr"], "accumulated_threat_level": 12.000000000000002, "timewindow": 65} +{"Format": "Json", "ID": "d019e4e3-61b1-4a3c-a8ce-864ab45b620b", "DetectTime": "2024-05-21T12:31:49.908971+00:00", "EventTime": "2024-05-21T12:31:49.908991+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "1970-01-03T16:41:39.440229+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 65. (real time 2024/05/21 12:31:50.097543)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 65, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5e65a932-7a4a-45a5-86ee-bbc9e4e4e89d", "DetectTime": "2024-05-21T12:31:50.108787+00:00", "EventTime": "2024-05-21T12:31:50.108806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfd2j31DN0OV8aJRAd"], "accumulated_threat_level": 0.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "c0e334a1-0b33-47a7-abdc-9ecbbdc6993a", "DetectTime": "2024-05-21T12:31:50.119066+00:00", "EventTime": "2024-05-21T12:31:50.119085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["83.235.22.116"]}], "Attach": [{"Content": "Connection to unknown destination port 14655/UDP destination IP 83.235.22.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C355kgmo7mjXK6c3f"], "accumulated_threat_level": 1.6, "timewindow": 65} +{"Format": "IDEA0", "ID": "e2e8fa9f-919f-48fe-9803-fc0a499e3d2c", "DetectTime": "2024-05-21T12:31:50.129818+00:00", "EventTime": "2024-05-21T12:31:50.129837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxd35aboMlNMXMJQ6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 65} +{"Format": "IDEA0", "ID": "b390d7bd-57d4-4b6d-9363-52e30a951d7a", "DetectTime": "2024-05-21T12:31:50.141213+00:00", "EventTime": "2024-05-21T12:31:50.141232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.55.62.226"]}], "Attach": [{"Content": "Connection to unknown destination port 17316/UDP destination IP 82.55.62.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChszoA3bZYqYlsAgX5"], "accumulated_threat_level": 3.2, "timewindow": 65} +{"Format": "IDEA0", "ID": "f4dea4b7-03db-4e31-9b90-58fa9ad58e8a", "DetectTime": "2024-05-21T12:31:50.153978+00:00", "EventTime": "2024-05-21T12:31:50.153999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQUm427J6IjcfYwlf"], "accumulated_threat_level": 4.0, "timewindow": 65} +{"Format": "IDEA0", "ID": "7dcbf8eb-941c-483a-8b47-ef404f163978", "DetectTime": "2024-05-21T12:31:50.158882+00:00", "EventTime": "2024-05-21T12:31:50.158900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.240.245.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceh6KZ1WwyIBQ8NRSh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "a7ad0930-2b1d-4d75-a00b-cfc4114172d7", "DetectTime": "2024-05-21T12:31:50.186470+00:00", "EventTime": "2024-05-21T12:31:50.186490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmqJA39AnGlCsJ6gk"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "23573c29-45c8-43f9-9624-cfab776e877d", "DetectTime": "2024-05-21T12:31:50.497945+00:00", "EventTime": "2024-05-21T12:31:50.497966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.3.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpqetq1fxyIUAYbbnh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "90db4408-e205-4213-bcdf-560c0c657503", "DetectTime": "2024-05-21T12:31:50.533688+00:00", "EventTime": "2024-05-21T12:31:50.533708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.136.223.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAjCz21Yfr1e5D7C8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "76fc3d30-ed76-4fce-aeb1-aa54a872c40c", "DetectTime": "2024-05-21T12:31:50.545189+00:00", "EventTime": "2024-05-21T12:31:50.545209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8xQ5j4g6twnANGF6"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "633970e9-969c-47ff-ae0f-9d12f273a2d3", "DetectTime": "2024-05-21T12:31:51.132595+00:00", "EventTime": "2024-05-21T12:31:51.132615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbFmz1KfJS0q9mfNb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "e2bcbc29-e04d-4ec3-b5b1-5b775ead7b7b", "DetectTime": "2024-05-21T12:31:51.163051+00:00", "EventTime": "2024-05-21T12:31:51.163071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQ5LC4qo5Mh8JyAL7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "ef1e706b-5473-41a8-b941-22d1fbfb31f4", "DetectTime": "2024-05-21T12:31:51.486829+00:00", "EventTime": "2024-05-21T12:31:51.486850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptwNF4wDVYR3fPzKe"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e59aae74-47be-4aaf-a8b0-c168bc1a247d", "DetectTime": "2024-05-21T12:31:51.502013+00:00", "EventTime": "2024-05-21T12:31:51.502038+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptwNF4wDVYR3fPzKe"], "accumulated_threat_level": 3.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "ad8187f2-df48-4316-877b-1cea78ce5ae4", "DetectTime": "2024-05-21T12:31:51.507679+00:00", "EventTime": "2024-05-21T12:31:51.507697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVFo4X1FvuRD8qBy57"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "6821707f-f746-408d-9189-948521ae90cd", "DetectTime": "2024-05-21T12:31:51.545878+00:00", "EventTime": "2024-05-21T12:31:51.545899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeYW63vdUospwAJCb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "98c41055-0baa-465d-8ca9-5c078a1385df", "DetectTime": "2024-05-21T12:31:51.578699+00:00", "EventTime": "2024-05-21T12:31:51.578720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqDEHOQycYqOiTmNb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "6d9eae98-8155-4585-a644-85dc5e37f6e0", "DetectTime": "2024-05-21T12:31:51.614273+00:00", "EventTime": "2024-05-21T12:31:51.614295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLXGw2js703psYFci"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "7bc2bead-e905-4e39-9ad8-f1f4ba7bd47a", "DetectTime": "2024-05-21T12:31:51.649892+00:00", "EventTime": "2024-05-21T12:31:51.649914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cadmjo2rqSwjd499Ji"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "f42f4eb5-bcc6-4a8d-9d5d-002b4dc97823", "DetectTime": "2024-05-21T12:31:51.706295+00:00", "EventTime": "2024-05-21T12:31:51.706317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJNiz1JnGoLEysd0j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "8cf8e539-4bcd-46c4-a325-f604da92f94d", "DetectTime": "2024-05-21T12:31:51.740889+00:00", "EventTime": "2024-05-21T12:31:51.740910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPJsAzkprQdwZBZ5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "02f2b59a-5a55-4fa4-a0ff-66565f29b7e1", "DetectTime": "2024-05-21T12:31:51.755308+00:00", "EventTime": "2024-05-21T12:31:51.755325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.161.47"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.161.47 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6oQocdmTLM9rbpW4"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "d0c5797f-0a36-4682-8d80-4d72be8ed15b", "DetectTime": "2024-05-21T12:31:51.767781+00:00", "EventTime": "2024-05-21T12:31:51.767800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.161.47"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.161.47 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6oQocdmTLM9rbpW4"], "accumulated_threat_level": 3.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "739bf75b-aad6-4567-84ee-9dde047d0e7c", "DetectTime": "2024-05-21T12:31:51.788956+00:00", "EventTime": "2024-05-21T12:31:51.788976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0rV6NQnJE1IrX2Ke"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "37d0d844-2812-4c04-9d7f-64ca27a1209e", "DetectTime": "2024-05-21T12:31:51.859283+00:00", "EventTime": "2024-05-21T12:31:51.859306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNhsD1Ijx0pVX4S4a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "0bf53a88-e915-47d5-897b-2af040671542", "DetectTime": "2024-05-21T12:31:51.864252+00:00", "EventTime": "2024-05-21T12:31:51.864271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvlK3esMUxXGThYm2", "CGkoeC1h4yWwnaCNFj", "COWzXl4ogjRfnPULMj", "CosDmP3rsH3xFJHN24"], "accumulated_threat_level": 1.3, "timewindow": 66} +{"Format": "IDEA0", "ID": "d2ec8d01-c35b-4b94-af44-147ad4e6ddf3", "DetectTime": "2024-05-21T12:31:51.903835+00:00", "EventTime": "2024-05-21T12:31:51.903854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7LLN1wA0oQPJCuJe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "ee04e4e1-28f8-4538-b19c-43ced3ee87b9", "DetectTime": "2024-05-21T12:31:51.908646+00:00", "EventTime": "2024-05-21T12:31:51.908664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICNdL2ZjmF0Ss4tl3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "8ffea857-bb0e-46a9-9a35-71d0c80e82dd", "DetectTime": "2024-05-21T12:31:52.010791+00:00", "EventTime": "2024-05-21T12:31:52.010810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyKqZJ2JoEBEz92ase"], "accumulated_threat_level": 2.1, "timewindow": 66} +{"Format": "IDEA0", "ID": "dac426d6-ed06-49bd-aa20-974443733fb6", "DetectTime": "2024-05-21T12:31:52.047452+00:00", "EventTime": "2024-05-21T12:31:52.047470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZP665a5GLpFlyT2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "1c00cc48-6680-4b31-85b5-8b2c70d203e7", "DetectTime": "2024-05-21T12:31:52.095452+00:00", "EventTime": "2024-05-21T12:31:52.095470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7KYE17SprQhnR7F4"], "accumulated_threat_level": 3.7, "timewindow": 66} +{"Format": "IDEA0", "ID": "2cf596dc-0b76-43cb-888a-8342a729501f", "DetectTime": "2024-05-21T12:31:52.218628+00:00", "EventTime": "2024-05-21T12:31:52.218648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP6y0e1XAjmCbgp3Y4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "ad8bd176-6918-4875-bf32-3194262f0199", "DetectTime": "2024-05-21T12:31:52.269089+00:00", "EventTime": "2024-05-21T12:31:52.269119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lvHB1RwFfu9NGtW4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "9d889ea1-5239-434d-b419-cab33a6041b6", "DetectTime": "2024-05-21T12:31:52.566878+00:00", "EventTime": "2024-05-21T12:31:52.566899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csy30N1yMkyBuFWJL9"], "accumulated_threat_level": 4.5, "timewindow": 66} +{"Format": "IDEA0", "ID": "f819bd04-b7b4-4632-a94a-81cc44db328c", "DetectTime": "2024-05-21T12:31:52.594970+00:00", "EventTime": "2024-05-21T12:31:52.594993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTADe634bLue04PHLb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "fe9c9ae5-6552-4da4-bfe1-6b63e3e259c9", "DetectTime": "2024-05-21T12:31:52.600221+00:00", "EventTime": "2024-05-21T12:31:52.600239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblOMI3mVwdLZCzJcf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "ee6bf264-166d-4969-8c11-9c1072f941c0", "DetectTime": "2024-05-21T12:31:52.604557+00:00", "EventTime": "2024-05-21T12:31:52.604575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crk7YV2aU0PKov7Jwh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "807bef9f-3b61-4896-966c-62e63a938015", "DetectTime": "2024-05-21T12:31:52.622885+00:00", "EventTime": "2024-05-21T12:31:52.622905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2O9Vv3Gq5ON07Ptof"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "3d5447f7-2920-4dab-b7c4-5620bccdf9c4", "DetectTime": "2024-05-21T12:31:52.719465+00:00", "EventTime": "2024-05-21T12:31:52.719483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCYUj2b5dbH12EZe"], "accumulated_threat_level": 5.3, "timewindow": 66} +{"Format": "IDEA0", "ID": "62db2bda-1ee3-4e4e-9bd4-81b335d2dc0f", "DetectTime": "2024-05-21T12:31:52.723991+00:00", "EventTime": "2024-05-21T12:31:52.724009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lh2w1kwomXhH2N1j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "dad5f4fc-22c8-4c1f-b18c-d8b2c0794ac5", "DetectTime": "2024-05-21T12:31:52.728623+00:00", "EventTime": "2024-05-21T12:31:52.728648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XQzr2k5SzpatlgJh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "f16bca55-99b8-422f-8847-ff1cbb9a4843", "DetectTime": "2024-05-21T12:31:52.802908+00:00", "EventTime": "2024-05-21T12:31:52.802929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJNnFu3pfXbbw9gg3i"], "accumulated_threat_level": 6.1, "timewindow": 66} +{"Format": "IDEA0", "ID": "d2aa0e5f-828e-4c6b-990c-4ff0d9c08328", "DetectTime": "2024-05-21T12:31:52.862547+00:00", "EventTime": "2024-05-21T12:31:52.862567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxrjWO2VFjvufZdhii"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "95433659-e0ce-4ad4-b16d-ead735a6b517", "DetectTime": "2024-05-21T12:31:52.898884+00:00", "EventTime": "2024-05-21T12:31:52.898903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHDJ1kzvHhtL8FWg"], "accumulated_threat_level": 7.699999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "b1c7dc05-c6ff-44e7-882c-1a1b59c2a715", "DetectTime": "2024-05-21T12:31:52.934662+00:00", "EventTime": "2024-05-21T12:31:52.934682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8J4I18zqDg8jfuI5"], "accumulated_threat_level": 8.5, "timewindow": 66} +{"Format": "IDEA0", "ID": "3c0a2407-8570-4972-a0ed-5d2172651e28", "DetectTime": "2024-05-21T12:31:52.969073+00:00", "EventTime": "2024-05-21T12:31:52.969092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHLZH9htLNyPAmbk"], "accumulated_threat_level": 9.3, "timewindow": 66} +{"Format": "IDEA0", "ID": "f3171df3-4f23-41b8-aa86-72f01a1dea79", "DetectTime": "2024-05-21T12:31:53.011694+00:00", "EventTime": "2024-05-21T12:31:53.011713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkNTnn40TmvcAQx64b"], "accumulated_threat_level": 10.100000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "1b1bedfc-7d57-4fea-b6da-30bdf6c450d4", "DetectTime": "2024-05-21T12:31:53.028921+00:00", "EventTime": "2024-05-21T12:31:53.028942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKLlx2hM2sf6GbAr3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "c41bb79d-59b7-419d-a944-ff42bc8e7d32", "DetectTime": "2024-05-21T12:31:53.071180+00:00", "EventTime": "2024-05-21T12:31:53.071199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWZeU1LenJ5RTDOT3"], "accumulated_threat_level": 10.900000000000002, "timewindow": 66} +{"Format": "IDEA0", "ID": "5e10e19d-7ebb-4966-9eb7-580a76edd1a2", "DetectTime": "2024-05-21T12:31:53.361770+00:00", "EventTime": "2024-05-21T12:31:53.361791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYecXr3KnuGuQwLVS3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "bd692f1a-e8d7-47c3-967a-79ccbb3b260a", "DetectTime": "2024-05-21T12:31:53.385751+00:00", "EventTime": "2024-05-21T12:31:53.385773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWIXjruLwhNeeonc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "c11f7637-e0dc-4342-835f-d453c08896fd", "DetectTime": "2024-05-21T12:31:53.417019+00:00", "EventTime": "2024-05-21T12:31:53.417039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6EpXO27uxm0kzkKfk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 66} +{"Format": "IDEA0", "ID": "e311d613-7e83-4b37-b9c5-22ae906fa39f", "DetectTime": "2024-05-21T12:31:53.451480+00:00", "EventTime": "2024-05-21T12:31:53.451500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeEr9XvY8xhYBbQ8"], "accumulated_threat_level": 12.500000000000004, "timewindow": 66} +{"Format": "Json", "ID": "e311d613-7e83-4b37-b9c5-22ae906fa39f", "DetectTime": "2024-05-21T12:31:53.451480+00:00", "EventTime": "2024-05-21T12:31:53.451500+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "1970-01-03T17:12:58.515446+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:31:53.640001)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "86006ea6-5f7f-4d57-b6a5-0e1d1707145a", "DetectTime": "2024-05-21T12:31:53.644636+00:00", "EventTime": "2024-05-21T12:31:53.644659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqn09F1fG53FDUsZzg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "71b6cf7a-eb82-4b0b-aeb6-f8e0febc29d0", "DetectTime": "2024-05-21T12:31:53.656759+00:00", "EventTime": "2024-05-21T12:31:53.656779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOe5NzJivrw7Jkpi"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "e8c57363-5954-40ae-8b67-3d0853bf00ed", "DetectTime": "2024-05-21T12:31:53.661267+00:00", "EventTime": "2024-05-21T12:31:53.661284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtBnF3ZmgzSwngW65"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "06da5102-f702-4056-acd5-cd1a5df7de3d", "DetectTime": "2024-05-21T12:31:53.670645+00:00", "EventTime": "2024-05-21T12:31:53.670663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWNpIF2hEBaCGdMpw2"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "b01b6ea6-7760-432f-93a1-077b217cd5bb", "DetectTime": "2024-05-21T12:31:53.675234+00:00", "EventTime": "2024-05-21T12:31:53.675252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1QLf4nuI87RvN9le"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "c21e9ad4-4765-4483-acc0-217ff33a02d1", "DetectTime": "2024-05-21T12:31:53.680077+00:00", "EventTime": "2024-05-21T12:31:53.680095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVEaMB17TOuIux67S7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "0a216b9e-a1f8-4f93-9492-b0681b0112bb", "DetectTime": "2024-05-21T12:31:53.690704+00:00", "EventTime": "2024-05-21T12:31:53.690723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu15Y01ngyf6NyHd3a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "2a29ef71-8e27-4e39-841d-9376b765bd5a", "DetectTime": "2024-05-21T12:31:53.696488+00:00", "EventTime": "2024-05-21T12:31:53.696511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIJj02BBC65R9tgMg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "1ea1ea9b-6444-4826-a83e-73142cb4ffbb", "DetectTime": "2024-05-21T12:31:53.732186+00:00", "EventTime": "2024-05-21T12:31:53.732206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb9Wtc2WRR0aCitJI9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "42922f8b-6570-4a7d-942f-ff7c4cbfe95c", "DetectTime": "2024-05-21T12:31:54.012183+00:00", "EventTime": "2024-05-21T12:31:54.012206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.36.121.227"]}], "Attach": [{"Content": "Connection to unknown destination port 1413/UDP destination IP 217.36.121.227. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIdWN1QUmsp2tLlva"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "2d97d77e-b082-4c0c-b20c-6609fbaaf64e", "DetectTime": "2024-05-21T12:31:54.037823+00:00", "EventTime": "2024-05-21T12:31:54.037844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhqWa4txKTavLOsnh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "43cdcb8f-710f-4abd-ad74-c7ae1b662b4a", "DetectTime": "2024-05-21T12:31:54.070381+00:00", "EventTime": "2024-05-21T12:31:54.070403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4WSf2nrf2ObzMzwg"], "accumulated_threat_level": 4.0, "timewindow": 66} +{"Format": "IDEA0", "ID": "16942b19-19a2-4976-beef-9394ed1e8aa4", "DetectTime": "2024-05-21T12:31:54.106619+00:00", "EventTime": "2024-05-21T12:31:54.106641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMaIC2QBgTEAJAdK8"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "481b3a33-674d-4864-a560-1cd65c5d9d8d", "DetectTime": "2024-05-21T12:31:54.133558+00:00", "EventTime": "2024-05-21T12:31:54.133580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrIrD48VkGFuu6Fia"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "d6172ced-c3cb-4ea0-b19e-27fd10c8f8d5", "DetectTime": "2024-05-21T12:31:54.171128+00:00", "EventTime": "2024-05-21T12:31:54.171186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJegcB4ZzebyXjXCj"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "63be7d64-4b5d-4eab-8dd6-e66df2f8092a", "DetectTime": "2024-05-21T12:31:54.194644+00:00", "EventTime": "2024-05-21T12:31:54.194666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl68oJ3DmIkXlanuL4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "0b8e29f2-3263-499b-99dc-1f6ce94e3dcb", "DetectTime": "2024-05-21T12:31:54.233389+00:00", "EventTime": "2024-05-21T12:31:54.233411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsGcAM10MYIWmQSva7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "71b97367-4ba5-4224-8bc3-30184c38b368", "DetectTime": "2024-05-21T12:31:54.243650+00:00", "EventTime": "2024-05-21T12:31:54.243669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduzuW18zxtKIl2fkj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "a9571247-9793-4e18-baa2-7e02ac2162e7", "DetectTime": "2024-05-21T12:31:54.278156+00:00", "EventTime": "2024-05-21T12:31:54.278177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crp5I540z3gq5KPcL7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "35bdb493-3a4c-4029-aea4-094c4068a105", "DetectTime": "2024-05-21T12:31:54.376802+00:00", "EventTime": "2024-05-21T12:31:54.376823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNw2Rf4tOnFN72e6gd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "48aaeb8a-7ee8-4634-857d-fcea643a9069", "DetectTime": "2024-05-21T12:31:54.411321+00:00", "EventTime": "2024-05-21T12:31:54.411340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHIE01kwRyrgHALR4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "adb76197-7199-40bd-922f-3721fd8c9ec2", "DetectTime": "2024-05-21T12:31:54.460823+00:00", "EventTime": "2024-05-21T12:31:54.460845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnb95H4hZpzWflXa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "aed971ea-72ca-4eb9-953e-be3a4964cff5", "DetectTime": "2024-05-21T12:31:54.497683+00:00", "EventTime": "2024-05-21T12:31:54.497709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4FUZX2ZmlgS7xnVLk"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "0d803dfa-8966-485b-9b0d-2b8344430a36", "DetectTime": "2024-05-21T12:31:54.749132+00:00", "EventTime": "2024-05-21T12:31:54.749153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ZbcePf1LznCqq17"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "b9500d81-dbe4-4907-af3b-d51fb91ea7b1", "DetectTime": "2024-05-21T12:31:54.779148+00:00", "EventTime": "2024-05-21T12:31:54.779168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgeY92XKTKPIQKy44"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "ed149d96-9de8-4678-b1d5-a76941aa9fb6", "DetectTime": "2024-05-21T12:31:54.803117+00:00", "EventTime": "2024-05-21T12:31:54.803137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.242.182.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJ5Yr19qvgnR9qzva"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "9b10303c-c547-47b1-9071-736ac4dfad49", "DetectTime": "2024-05-21T12:31:54.838007+00:00", "EventTime": "2024-05-21T12:31:54.838026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4azA3169Zu5timH4f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "18739897-4a32-43c9-bc9e-1b141849acd5", "DetectTime": "2024-05-21T12:31:54.873905+00:00", "EventTime": "2024-05-21T12:31:54.873925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ4vkJMx4D63nfn7l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 66} +{"Format": "Json", "ID": "18739897-4a32-43c9-bc9e-1b141849acd5", "DetectTime": "2024-05-21T12:31:54.873905+00:00", "EventTime": "2024-05-21T12:31:54.873925+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-03T17:14:04.898687+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:31:55.038288)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "41cda197-c951-4006-9d44-2896d657c17c", "DetectTime": "2024-05-21T12:31:55.048708+00:00", "EventTime": "2024-05-21T12:31:55.048726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbvjxU1rXYbwxZVqM4"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "83ed7e34-daca-4692-ae87-649e95d67524", "DetectTime": "2024-05-21T12:31:55.062917+00:00", "EventTime": "2024-05-21T12:31:55.062935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7n3pm3EhGXqxN736l"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "006b89c1-915e-43e9-bd92-6f29b8cc1ecc", "DetectTime": "2024-05-21T12:31:55.067290+00:00", "EventTime": "2024-05-21T12:31:55.067307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFVoX2Lty57A3eOhg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "d0f0a45d-5e03-4552-9637-db770328e415", "DetectTime": "2024-05-21T12:31:55.077642+00:00", "EventTime": "2024-05-21T12:31:55.077664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ColOZn3g6OrmVWMpb9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "898ee4d6-2f0d-4507-bd92-a08b7a3deecd", "DetectTime": "2024-05-21T12:31:55.088463+00:00", "EventTime": "2024-05-21T12:31:55.088482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLC3fi1zwVTOuCHVnd"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "bf891db5-8c40-42f3-b2a8-cd92dae7f176", "DetectTime": "2024-05-21T12:31:55.098729+00:00", "EventTime": "2024-05-21T12:31:55.098747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmFJd2SyR8vwvWANh"], "accumulated_threat_level": 4.0, "timewindow": 66} +{"Format": "IDEA0", "ID": "4aa1261e-054b-4c30-a388-023b387aabea", "DetectTime": "2024-05-21T12:31:55.110439+00:00", "EventTime": "2024-05-21T12:31:55.110458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6S2G6pJqvcUuA5he"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "fe3fa14b-e866-4291-90e1-f1cb4bfe93b9", "DetectTime": "2024-05-21T12:31:55.140096+00:00", "EventTime": "2024-05-21T12:31:55.140117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVADce6F5RD5moPa7"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "a33cd5a3-7789-44da-9d9f-3896618f7c40", "DetectTime": "2024-05-21T12:31:55.211554+00:00", "EventTime": "2024-05-21T12:31:55.211574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvj624TGjdU97Zlng"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "7bc6b9df-b73e-47c7-8d81-26b589949704", "DetectTime": "2024-05-21T12:31:55.455725+00:00", "EventTime": "2024-05-21T12:31:55.455746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.160.114.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8Oi32MnaNkN7xgh1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "9f7b646f-cd05-407d-8505-60e28f85184d", "DetectTime": "2024-05-21T12:31:55.497225+00:00", "EventTime": "2024-05-21T12:31:55.497246+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4S4q2RZSdKtBQTo1"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "e0876d6d-606b-4359-a351-a8543c031272", "DetectTime": "2024-05-21T12:31:55.511273+00:00", "EventTime": "2024-05-21T12:31:55.511294+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4S4q2RZSdKtBQTo1"], "accumulated_threat_level": 4.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "edb1513f-38c0-4353-876b-3dbf56ed3701", "DetectTime": "2024-05-21T12:31:55.643767+00:00", "EventTime": "2024-05-21T12:31:55.643787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.143.80.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbeXB3fWZQqh130va"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "41086b83-1304-4b29-88f2-e3fe2fb360db", "DetectTime": "2024-05-21T12:31:55.690004+00:00", "EventTime": "2024-05-21T12:31:55.690025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.234.97.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4A0mn99uSsrvWW8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "7fe43b9a-fda1-4d95-bb1a-3f72a50a1663", "DetectTime": "2024-05-21T12:31:55.723624+00:00", "EventTime": "2024-05-21T12:31:55.723644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEhwW1UyDXIic5b48"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "bd177983-095d-4966-bd5c-ac8d490abac8", "DetectTime": "2024-05-21T12:31:55.736691+00:00", "EventTime": "2024-05-21T12:31:55.736710+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEhwW1UyDXIic5b48"], "accumulated_threat_level": 4.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "c8393eba-fa4f-43dd-b4ec-9895fbec0f6e", "DetectTime": "2024-05-21T12:31:55.839416+00:00", "EventTime": "2024-05-21T12:31:55.839437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.96.182.207"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.96.182.207. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LlHA3X7Cl7NxUPJf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "3d92e2f8-6aa2-44ea-a6eb-1dbaee842094", "DetectTime": "2024-05-21T12:31:56.101815+00:00", "EventTime": "2024-05-21T12:31:56.101833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zmkg4Rrs8TjLAIw5"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "495f28ee-5235-466e-bdb6-bc783d3155eb", "DetectTime": "2024-05-21T12:31:56.113319+00:00", "EventTime": "2024-05-21T12:31:56.113339+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zmkg4Rrs8TjLAIw5"], "accumulated_threat_level": 5.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "1d44e494-6de6-441b-9718-11bf05386e76", "DetectTime": "2024-05-21T12:31:56.174165+00:00", "EventTime": "2024-05-21T12:31:56.174186+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFzASqDQUeXDs0Uca"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "a081d013-29fc-4c98-8cd6-520385d63cde", "DetectTime": "2024-05-21T12:31:56.186707+00:00", "EventTime": "2024-05-21T12:31:56.186724+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFzASqDQUeXDs0Uca"], "accumulated_threat_level": 5.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "e708580e-a173-4383-8e12-f825f9a5ffae", "DetectTime": "2024-05-21T12:31:56.221971+00:00", "EventTime": "2024-05-21T12:31:56.221991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQqnrznY8UQjl9P4"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "8b29b8e1-a41b-43d8-9ba4-5e12c8d27251", "DetectTime": "2024-05-21T12:31:56.235562+00:00", "EventTime": "2024-05-21T12:31:56.235583+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQqnrznY8UQjl9P4"], "accumulated_threat_level": 6.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "d315824d-a947-43de-8b3f-a43b32ea1bfe", "DetectTime": "2024-05-21T12:31:56.254625+00:00", "EventTime": "2024-05-21T12:31:56.254647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKsAQQkPlOWTOIU2"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "d2e1f19f-6900-4890-baa7-f5b7e942e2c5", "DetectTime": "2024-05-21T12:31:56.267673+00:00", "EventTime": "2024-05-21T12:31:56.267693+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKsAQQkPlOWTOIU2"], "accumulated_threat_level": 6.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "0046404c-d486-48a9-b78c-fbee0e2451bf", "DetectTime": "2024-05-21T12:31:56.332964+00:00", "EventTime": "2024-05-21T12:31:56.332982+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXdtInLpVN52drl6"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "75c39b0f-fb1c-4ba5-8787-c73d48f3d847", "DetectTime": "2024-05-21T12:31:56.345416+00:00", "EventTime": "2024-05-21T12:31:56.345437+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXdtInLpVN52drl6"], "accumulated_threat_level": 7.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "95db03ed-6532-4a61-b413-d330f26128ae", "DetectTime": "2024-05-21T12:31:56.363696+00:00", "EventTime": "2024-05-21T12:31:56.363716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT13ms4hv52EUVT3i"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "08c466f4-e5f2-4f14-84cf-17df6675cf94", "DetectTime": "2024-05-21T12:31:56.377156+00:00", "EventTime": "2024-05-21T12:31:56.377175+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT13ms4hv52EUVT3i"], "accumulated_threat_level": 7.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "f3b2e863-da4f-4176-ae7a-81cd670e1492", "DetectTime": "2024-05-21T12:31:56.390491+00:00", "EventTime": "2024-05-21T12:31:56.390510+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn3MDbGbZYnQ3qExk"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "b1f83ceb-efb7-405f-978b-966c8c8efbf4", "DetectTime": "2024-05-21T12:31:56.404071+00:00", "EventTime": "2024-05-21T12:31:56.404095+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn3MDbGbZYnQ3qExk"], "accumulated_threat_level": 8.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "22d14ab3-1ff0-43a7-bc9e-33bea0933179", "DetectTime": "2024-05-21T12:31:56.416824+00:00", "EventTime": "2024-05-21T12:31:56.416846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7jf8168Od9w1znXe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "5aed22b3-5b11-4bba-98ed-cc253ca820be", "DetectTime": "2024-05-21T12:31:56.445117+00:00", "EventTime": "2024-05-21T12:31:56.445137+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCvC8iR89Gf3gpE6"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "6f915e88-9880-4a40-904e-66504fb02a96", "DetectTime": "2024-05-21T12:31:56.458374+00:00", "EventTime": "2024-05-21T12:31:56.458394+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCvC8iR89Gf3gpE6"], "accumulated_threat_level": 8.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "6225d49a-0d16-4f16-b289-5e297098438c", "DetectTime": "2024-05-21T12:31:56.474815+00:00", "EventTime": "2024-05-21T12:31:56.474834+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.6.55.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ocAIAEoOwMF6mGi"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "74689af3-e69e-4992-840b-b4e3759a7ac3", "DetectTime": "2024-05-21T12:31:56.487055+00:00", "EventTime": "2024-05-21T12:31:56.487076+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ocAIAEoOwMF6mGi"], "accumulated_threat_level": 9.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "4764855a-785b-4b87-b7f8-23fe7d139d19", "DetectTime": "2024-05-21T12:31:56.500778+00:00", "EventTime": "2024-05-21T12:31:56.500796+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY58nh4PbCmBt8g46d"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "aaff09ed-5746-4faa-b212-64b97fc1691e", "DetectTime": "2024-05-21T12:31:56.511875+00:00", "EventTime": "2024-05-21T12:31:56.511895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY58nh4PbCmBt8g46d"], "accumulated_threat_level": 9.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "168b982a-fdb9-4ef5-ba25-62d853422aa0", "DetectTime": "2024-05-21T12:31:56.550490+00:00", "EventTime": "2024-05-21T12:31:56.550513+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xWSp4cpXhp87Y898"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "a5deec34-676e-4218-8bc0-e2c3ce3be0ca", "DetectTime": "2024-05-21T12:31:56.565118+00:00", "EventTime": "2024-05-21T12:31:56.565137+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xWSp4cpXhp87Y898"], "accumulated_threat_level": 10.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "57af8c62-c556-43d1-85a8-ab9e7303d470", "DetectTime": "2024-05-21T12:31:56.626499+00:00", "EventTime": "2024-05-21T12:31:56.626518+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGm6Uw398an8f7KKyj"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "b030b8dd-1508-485a-a9a1-6c2637980910", "DetectTime": "2024-05-21T12:31:56.639911+00:00", "EventTime": "2024-05-21T12:31:56.639929+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGm6Uw398an8f7KKyj"], "accumulated_threat_level": 10.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "11495e28-e684-48e1-a499-1d96170facb1", "DetectTime": "2024-05-21T12:31:56.652956+00:00", "EventTime": "2024-05-21T12:31:56.652975+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPlb9Lj5We3CdJpYg"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "d10138c0-7933-48d6-a185-438e9739ea97", "DetectTime": "2024-05-21T12:31:56.666529+00:00", "EventTime": "2024-05-21T12:31:56.666554+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPlb9Lj5We3CdJpYg"], "accumulated_threat_level": 11.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "57e7dd52-20c8-48e7-961b-d3515ab5339d", "DetectTime": "2024-05-21T12:31:56.814759+00:00", "EventTime": "2024-05-21T12:31:56.814782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL6Phv3jytSDDpBYs3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "5dea32ae-c123-4e4c-bf3e-528b884fdd7f", "DetectTime": "2024-05-21T12:31:56.996651+00:00", "EventTime": "2024-05-21T12:31:56.996669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwp8Ow3zlLoO2i7eu6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "a97e23c3-34cc-4e97-894d-d464ab7e829c", "DetectTime": "2024-05-21T12:31:57.132510+00:00", "EventTime": "2024-05-21T12:31:57.132531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Tz9IeHq6zWO5pcc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "c412ff8a-f76f-4456-950f-cf1e885529e5", "DetectTime": "2024-05-21T12:31:57.441681+00:00", "EventTime": "2024-05-21T12:31:57.441700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoTHr22G3Es4oterf"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "b26683aa-1209-4cba-b11a-2091fae0e449", "DetectTime": "2024-05-21T12:31:57.465207+00:00", "EventTime": "2024-05-21T12:31:57.465228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCrxbq3fAYdkkjnhgc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "3cac9375-35f1-41cf-aadb-c2d5c15293e6", "DetectTime": "2024-05-21T12:31:57.497893+00:00", "EventTime": "2024-05-21T12:31:57.497915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJvyT1bECzHeM0OT8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "5f825f30-1659-442b-9d5c-55b75eaa6be3", "DetectTime": "2024-05-21T12:31:57.537722+00:00", "EventTime": "2024-05-21T12:31:57.537744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnibdD2LqswXTi7ZNk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "8a040855-2ad7-42d4-b020-69b606dfd8c1", "DetectTime": "2024-05-21T12:31:57.597805+00:00", "EventTime": "2024-05-21T12:31:57.597826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPbq01coMLYyaYujc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "d8e21e6b-fed4-4997-9e28-a6a7bbc00e64", "DetectTime": "2024-05-21T12:31:57.889307+00:00", "EventTime": "2024-05-21T12:31:57.889332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQMVQP39QI9AYE9qvg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "2e96aa69-a4a4-41b1-9943-bac0ad9ad0e4", "DetectTime": "2024-05-21T12:31:58.203315+00:00", "EventTime": "2024-05-21T12:31:58.203334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAqi02A35TiwZvboc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "8f3149d8-f1dd-4c26-901f-54e8d6fedb81", "DetectTime": "2024-05-21T12:31:58.218585+00:00", "EventTime": "2024-05-21T12:31:58.218604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NY8z4T8Fjq3CKUj7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "4cfc64d7-c2bd-4f41-9646-013896f0e44b", "DetectTime": "2024-05-21T12:31:58.224232+00:00", "EventTime": "2024-05-21T12:31:58.224251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA6zn92kn7keU1XnQc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "fe1efcd0-7e2a-45fd-b165-29859cea49b0", "DetectTime": "2024-05-21T12:31:58.228930+00:00", "EventTime": "2024-05-21T12:31:58.228950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZp5cg265kcJ3swOXh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "27b4e47a-f519-4aeb-b8cd-c4f2f52c2107", "DetectTime": "2024-05-21T12:31:58.299289+00:00", "EventTime": "2024-05-21T12:31:58.299307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cook32Sd4mWtzoNtd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "4657d8b9-f81e-4652-962b-aef748c49e5c", "DetectTime": "2024-05-21T12:31:58.317932+00:00", "EventTime": "2024-05-21T12:31:58.317953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3YoM2FoSCKWxD8q8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "74c2672c-0208-49c8-a8c3-a9aeccd90b6b", "DetectTime": "2024-05-21T12:31:58.368316+00:00", "EventTime": "2024-05-21T12:31:58.368337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOCnO2N5t9nyJhZCh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "a785ad0f-7847-4667-8f74-08ca4c1693e9", "DetectTime": "2024-05-21T12:31:58.415683+00:00", "EventTime": "2024-05-21T12:31:58.415701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEWVp2UGPWowKGtx3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "5e5f54ef-35df-4817-bb8e-cd6b7f7edf75", "DetectTime": "2024-05-21T12:31:58.464459+00:00", "EventTime": "2024-05-21T12:31:58.464477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFIwmvIJR1MET6uh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "fdd98588-e382-462a-bd84-e67dcab6e895", "DetectTime": "2024-05-21T12:31:58.469475+00:00", "EventTime": "2024-05-21T12:31:58.469495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmsC34CqPNf4Fv9Hd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "78bf92e9-ee05-42d8-8179-091a60694c44", "DetectTime": "2024-05-21T12:31:58.474079+00:00", "EventTime": "2024-05-21T12:31:58.474097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C38mGzhpgO2gpT5E5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "40ed8c1e-b6f5-4d3e-a0fb-42cfa6ac3a00", "DetectTime": "2024-05-21T12:31:58.478640+00:00", "EventTime": "2024-05-21T12:31:58.478659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvV3iz3k4iTtMF3UJ7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "74144e5f-2fb1-4b27-b6e2-6d60c29ed78f", "DetectTime": "2024-05-21T12:31:58.651190+00:00", "EventTime": "2024-05-21T12:31:58.651209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGlqrF4liQzQxWxQZ2"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "f89038b7-6fee-4c09-b94f-387e1722ee78", "DetectTime": "2024-05-21T12:31:58.916512+00:00", "EventTime": "2024-05-21T12:31:58.916530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKk4RL3GwhUVUa4Uji"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "10e24180-7cc5-47e9-b8ef-f8ccdb9551b7", "DetectTime": "2024-05-21T12:31:58.984886+00:00", "EventTime": "2024-05-21T12:31:58.984906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qw3U6MG3hcYOfQk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "d850d2e5-608e-46e1-b690-7d05a84c9117", "DetectTime": "2024-05-21T12:31:59.003915+00:00", "EventTime": "2024-05-21T12:31:59.003937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvgGjg4NaAZHr8HEBh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "08350bcd-d383-4f21-9748-d7bded095de5", "DetectTime": "2024-05-21T12:31:59.009392+00:00", "EventTime": "2024-05-21T12:31:59.009413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEIVpj1SjCKEi4QYY"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "9eaf577f-c330-4cd1-bb09-2c219bc6df51", "DetectTime": "2024-05-21T12:31:59.013868+00:00", "EventTime": "2024-05-21T12:31:59.013885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4cpy1K0nwbT5MB76"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "29d91014-02dd-4a11-a34c-66e5eddf7d03", "DetectTime": "2024-05-21T12:31:59.018275+00:00", "EventTime": "2024-05-21T12:31:59.018293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zvud4kDilk72l4Pj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "53dd376b-6e4d-4259-8772-1703430bb592", "DetectTime": "2024-05-21T12:31:59.032157+00:00", "EventTime": "2024-05-21T12:31:59.032178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmF38S2ZikrXuDZQO5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "598a2459-61a2-4e90-a464-02af7c42073c", "DetectTime": "2024-05-21T12:31:59.047623+00:00", "EventTime": "2024-05-21T12:31:59.047645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.47.19.247"]}], "Attach": [{"Content": "Connection to unknown destination port 1126/UDP destination IP 92.47.19.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWS3RzCH7wiqDOCud"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "2886f24e-ee6d-466e-aecf-5e4960f3ed28", "DetectTime": "2024-05-21T12:31:59.108147+00:00", "EventTime": "2024-05-21T12:31:59.108172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLp4s1xDd5jpum9Yb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "e51a0df6-cb8c-407a-8254-699abb1959a7", "DetectTime": "2024-05-21T12:31:59.185329+00:00", "EventTime": "2024-05-21T12:31:59.185355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVeJEq1TytkK2dryB4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "ca07e13a-df3d-4c70-9df4-e7639243078b", "DetectTime": "2024-05-21T12:31:59.191203+00:00", "EventTime": "2024-05-21T12:31:59.191221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3x2uz2ZeIjASLQl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 64} +{"Format": "IDEA0", "ID": "cd1f129c-a3c3-494c-9fbe-f0d1b499f8fa", "DetectTime": "2024-05-21T12:31:59.358915+00:00", "EventTime": "2024-05-21T12:31:59.358934+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKPjU1O7NrSHSYxtd"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "4a95d7ef-4910-40e1-b075-4bde5c196cd9", "DetectTime": "2024-05-21T12:31:59.374346+00:00", "EventTime": "2024-05-21T12:31:59.374366+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKPjU1O7NrSHSYxtd"], "accumulated_threat_level": 11.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "658b6db2-b0b8-44aa-bc2c-d5fd47f7fe50", "DetectTime": "2024-05-21T12:31:59.408483+00:00", "EventTime": "2024-05-21T12:31:59.408507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxOvb4jbYWCRAMfc2"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "73313f1d-838f-4dfe-8915-b6ef158d46ed", "DetectTime": "2024-05-21T12:31:59.420394+00:00", "EventTime": "2024-05-21T12:31:59.420413+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxOvb4jbYWCRAMfc2"], "accumulated_threat_level": 12.0, "timewindow": 20} +{"Format": "Json", "ID": "73313f1d-838f-4dfe-8915-b6ef158d46ed", "DetectTime": "2024-05-21T12:31:59.420394+00:00", "EventTime": "2024-05-21T12:31:59.420413+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "1970-01-01T19:47:25.776037+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 20. (real time 2024/05/21 12:31:59.882025)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 20, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "13a59448-d6a2-46a1-bd3f-a0f2c5d2155f", "DetectTime": "2024-05-21T12:31:59.886882+00:00", "EventTime": "2024-05-21T12:31:59.886904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgDcAQ6TdatwMUPc"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "bf3bae37-5c20-4795-9574-28ce26bd9426", "DetectTime": "2024-05-21T12:31:59.892077+00:00", "EventTime": "2024-05-21T12:31:59.892096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.119.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAVkn455A6PqxLv7j"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "fff2ea18-2a68-4f69-8ada-feeee945f9f0", "DetectTime": "2024-05-21T12:31:59.897330+00:00", "EventTime": "2024-05-21T12:31:59.897348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHCv2XLaYbxteVevh"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "b3cf0d72-16d6-4ae5-b65d-ac036d5f5a6e", "DetectTime": "2024-05-21T12:31:59.909927+00:00", "EventTime": "2024-05-21T12:31:59.909947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.92.135.248"]}], "Attach": [{"Content": "Connection to unknown destination port 2741/UDP destination IP 186.92.135.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwL13D4DzOOGKCevCc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 66} +{"Format": "Json", "ID": "b3cf0d72-16d6-4ae5-b65d-ac036d5f5a6e", "DetectTime": "2024-05-21T12:31:59.909927+00:00", "EventTime": "2024-05-21T12:31:59.909947+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.92.135.248"]}], "Attach": [{"Content": "1970-01-03T17:18:31.565650+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:32:00.157532)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e07ccc45-022c-4739-8688-8b02717321b6", "DetectTime": "2024-05-21T12:32:00.169831+00:00", "EventTime": "2024-05-21T12:32:00.169852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdioMn3LTWZwiZRkFi"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "1649c314-70a6-4a81-9363-28b2fb5aa857", "DetectTime": "2024-05-21T12:32:00.181336+00:00", "EventTime": "2024-05-21T12:32:00.181357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cut5si2joemmSTSzhk"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "041db0e3-9820-4ad3-bb3f-8a7c8d4c201a", "DetectTime": "2024-05-21T12:32:00.192994+00:00", "EventTime": "2024-05-21T12:32:00.193013+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP3W2n1aq411XxOzv9"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "5868babe-7d9b-4d39-8eac-f4524ebbdce6", "DetectTime": "2024-05-21T12:32:00.205985+00:00", "EventTime": "2024-05-21T12:32:00.206006+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP3W2n1aq411XxOzv9"], "accumulated_threat_level": 0.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "81d10ba6-894c-47b5-801b-73c135dc120f", "DetectTime": "2024-05-21T12:32:00.210430+00:00", "EventTime": "2024-05-21T12:32:00.210447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXoBkD4q52ak27xpbg"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "4a61033d-cfd7-46d9-9ff8-18b9fd64a7a5", "DetectTime": "2024-05-21T12:32:00.222829+00:00", "EventTime": "2024-05-21T12:32:00.222847+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6c2FlP1U5oSFefGk"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "c31b95bd-622f-4d84-b7ca-1c5ce8c5eef3", "DetectTime": "2024-05-21T12:32:00.246002+00:00", "EventTime": "2024-05-21T12:32:00.246027+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6c2FlP1U5oSFefGk"], "accumulated_threat_level": 1.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "b6f09a29-acbe-482f-961e-a5a0a50b8361", "DetectTime": "2024-05-21T12:32:00.257652+00:00", "EventTime": "2024-05-21T12:32:00.257670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.246.2.43"]}], "Attach": [{"Content": "Connection to unknown destination port 8211/UDP destination IP 190.246.2.43. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOPLjirK8R6Kb9H"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "2ced3534-bfb3-487b-9f3e-15f2188e999f", "DetectTime": "2024-05-21T12:32:00.268009+00:00", "EventTime": "2024-05-21T12:32:00.268027+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coxxeo4uqsrjl6U53d"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "2df00bf2-1ecb-40eb-a27d-3193547c3013", "DetectTime": "2024-05-21T12:32:00.280185+00:00", "EventTime": "2024-05-21T12:32:00.280204+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coxxeo4uqsrjl6U53d"], "accumulated_threat_level": 1.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "d7382827-b2eb-4a4d-b384-0d00c74032dc", "DetectTime": "2024-05-21T12:32:00.284813+00:00", "EventTime": "2024-05-21T12:32:00.284831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXcCcsl1TEs3PAbza"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "0e064050-b52a-4d07-88fa-aef08af6197d", "DetectTime": "2024-05-21T12:32:00.296643+00:00", "EventTime": "2024-05-21T12:32:00.296662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiKxx34SaNSUFgsPd5"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "3125ec70-afc3-443b-8ad0-3b2e76c948af", "DetectTime": "2024-05-21T12:32:00.308055+00:00", "EventTime": "2024-05-21T12:32:00.308074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9BhzPjVkA0IottHf"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "c9fc6393-135a-43f4-b5ae-f98080722b1d", "DetectTime": "2024-05-21T12:32:00.320740+00:00", "EventTime": "2024-05-21T12:32:00.320758+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9BhzPjVkA0IottHf"], "accumulated_threat_level": 2.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "887f8ff5-8d00-4ba6-912b-69b17c83627b", "DetectTime": "2024-05-21T12:32:00.325604+00:00", "EventTime": "2024-05-21T12:32:00.325624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM425yza7ACoeFwfk"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "4728b89a-d479-4aa4-a655-91cca244beb5", "DetectTime": "2024-05-21T12:32:00.338163+00:00", "EventTime": "2024-05-21T12:32:00.338194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKel43Rnc6c9eysya"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "82352a28-3ca7-41bc-9d08-4103db05c2ae", "DetectTime": "2024-05-21T12:32:00.352175+00:00", "EventTime": "2024-05-21T12:32:00.352197+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKel43Rnc6c9eysya"], "accumulated_threat_level": 2.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "4bc305ec-b4ec-49a7-98c9-e46ca34ff11b", "DetectTime": "2024-05-21T12:32:00.363771+00:00", "EventTime": "2024-05-21T12:32:00.363788+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9dja1ObymZY7oIjh"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "40462616-7b14-4337-9df8-004f972159bb", "DetectTime": "2024-05-21T12:32:00.375774+00:00", "EventTime": "2024-05-21T12:32:00.375793+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9dja1ObymZY7oIjh"], "accumulated_threat_level": 3.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "c0f0bcf8-17ba-4a19-84bc-28c5dbfe36c1", "DetectTime": "2024-05-21T12:32:00.387192+00:00", "EventTime": "2024-05-21T12:32:00.387211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.57.242"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdjq938006r3MVqQi"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "fc0dc86a-59b0-4a20-a068-486b139275f8", "DetectTime": "2024-05-21T12:32:00.391891+00:00", "EventTime": "2024-05-21T12:32:00.391910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXxZ418sVny6G8yJ1"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "3644913f-0564-4506-b594-1d1c248adf5d", "DetectTime": "2024-05-21T12:32:00.403166+00:00", "EventTime": "2024-05-21T12:32:00.403185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuQnK1kUpI5HYWPme"], "accumulated_threat_level": 4.0, "timewindow": 66} +{"Format": "IDEA0", "ID": "67fe2520-1832-4202-9b2d-440853d4db8c", "DetectTime": "2024-05-21T12:32:00.414611+00:00", "EventTime": "2024-05-21T12:32:00.414629+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdjq938006r3MVqQi"], "accumulated_threat_level": 3.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "3e149e33-7135-4b4a-9d2d-20fb7552ec07", "DetectTime": "2024-05-21T12:32:00.419104+00:00", "EventTime": "2024-05-21T12:32:00.419122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQd1G4BiSs6PCZ1u5"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "c2ca4545-5695-4449-952c-9c13e977718b", "DetectTime": "2024-05-21T12:32:00.426951+00:00", "EventTime": "2024-05-21T12:32:00.426976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbdflu1ujnjOGV16l3"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "e31a7717-1d4f-47d1-a959-8e80d5e2849a", "DetectTime": "2024-05-21T12:32:00.432767+00:00", "EventTime": "2024-05-21T12:32:00.432789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxHGcE4ilBB6WoD4Z7"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "f5e3b600-df7a-45c2-a1eb-7e74029885a3", "DetectTime": "2024-05-21T12:32:00.437708+00:00", "EventTime": "2024-05-21T12:32:00.437727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSr3R33cbmHINfHJ"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "5c8f96f9-0c3c-4d40-a84f-5f6af10a07ad", "DetectTime": "2024-05-21T12:32:00.442224+00:00", "EventTime": "2024-05-21T12:32:00.442243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEXKZs2TuA4CsNlo6g"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "a0f3e717-8a1a-4837-8e72-135bad5f5dd4", "DetectTime": "2024-05-21T12:32:00.446971+00:00", "EventTime": "2024-05-21T12:32:00.446989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYSHIK3YIdhie6OmK8"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "2e2332c2-302e-427a-bb47-354bf0a4464e", "DetectTime": "2024-05-21T12:32:00.451417+00:00", "EventTime": "2024-05-21T12:32:00.451435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckcat61hEH9AjvuNEb"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "f129d0c5-3197-4b15-96f1-bcf83c5702ff", "DetectTime": "2024-05-21T12:32:00.455746+00:00", "EventTime": "2024-05-21T12:32:00.455763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRPVu3nxg8WFLdD6b"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "7a288a93-1cc7-48ef-bd0f-7da2bca0f68c", "DetectTime": "2024-05-21T12:32:00.465988+00:00", "EventTime": "2024-05-21T12:32:00.466006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJFzO3vlw0QAGN7p1"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "238959c2-6504-4288-983d-636ad3985a3c", "DetectTime": "2024-05-21T12:32:00.533332+00:00", "EventTime": "2024-05-21T12:32:00.533355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWM2cTApKwPo9Mg8"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "3359c57b-f87e-425c-9742-25b3c32d48a8", "DetectTime": "2024-05-21T12:32:00.642273+00:00", "EventTime": "2024-05-21T12:32:00.642292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"]}], "Attach": [{"Content": "Connection to unknown destination port 28610/UDP destination IP 78.166.143.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphFbJ3cDky4KQzDzf"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "c17bf960-20a8-492f-806b-a9fd1ddf295d", "DetectTime": "2024-05-21T12:32:00.667958+00:00", "EventTime": "2024-05-21T12:32:00.667978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54TZfUX7j1simsOe"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "b4200677-cd1d-495c-bf00-db9a655b5247", "DetectTime": "2024-05-21T12:32:00.698978+00:00", "EventTime": "2024-05-21T12:32:00.698999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.42.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXe7L2NAeawcGnb6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "ffd70926-00c1-4c60-ba3e-0d433da6b763", "DetectTime": "2024-05-21T12:32:00.994500+00:00", "EventTime": "2024-05-21T12:32:00.994518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP85NrjItzWLrVGw6"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "196a0c03-ef38-4289-9013-9ac3ce9f6636", "DetectTime": "2024-05-21T12:32:00.999865+00:00", "EventTime": "2024-05-21T12:32:00.999884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJrCC3TRRqhP0zHm6"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "512c7609-3be8-4c48-951f-70de82d17cfc", "DetectTime": "2024-05-21T12:32:01.004795+00:00", "EventTime": "2024-05-21T12:32:01.004813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce3hJj3q2NQyrfKscf"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "18cfab2c-ad2a-4fdf-b6e0-bee3e0e98988", "DetectTime": "2024-05-21T12:32:01.009093+00:00", "EventTime": "2024-05-21T12:32:01.009111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqi9ly2KKYL9vWRqw2"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "5ef1b368-28bb-4b46-9efa-2faa8ff7abec", "DetectTime": "2024-05-21T12:32:01.013779+00:00", "EventTime": "2024-05-21T12:32:01.013802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4Awy2Kz2V74QPiRb"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "7cb59f64-fd2c-4022-aed0-4aabffc34669", "DetectTime": "2024-05-21T12:32:01.143506+00:00", "EventTime": "2024-05-21T12:32:01.143529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.94.158.164"]}], "Attach": [{"Content": "Connection to unknown destination port 8384/UDP destination IP 188.94.158.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJoSBi3GjfEn6UBBs3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "7773132c-d61a-44ce-bb77-9dd07f219cfa", "DetectTime": "2024-05-21T12:32:01.217534+00:00", "EventTime": "2024-05-21T12:32:01.217556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvwxD3enR9Kj5cqk4"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "f615f0ad-376c-42ff-9f7e-729738db1af5", "DetectTime": "2024-05-21T12:32:01.255186+00:00", "EventTime": "2024-05-21T12:32:01.255205+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCEbU3EIhG62PhId6"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "5e997f13-5358-40e0-8e9f-95eebf7a28f7", "DetectTime": "2024-05-21T12:32:01.271924+00:00", "EventTime": "2024-05-21T12:32:01.271944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCEbU3EIhG62PhId6"], "accumulated_threat_level": 4.0, "timewindow": 20} +{"Format": "IDEA0", "ID": "312482b6-2c6a-426a-9567-e5e1fdadba9d", "DetectTime": "2024-05-21T12:32:01.283458+00:00", "EventTime": "2024-05-21T12:32:01.283477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.74.131.196"]}], "Attach": [{"Content": "Connection to unknown destination port 19105/UDP destination IP 151.74.131.196. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOuK3p5OWO9rgpc9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "edb999cf-b71d-476a-82d0-1d5aeb059458", "DetectTime": "2024-05-21T12:32:01.295900+00:00", "EventTime": "2024-05-21T12:32:01.295918+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKMn01eGm6kOttQ82"], "accumulated_threat_level": 0, "timewindow": 20} +{"Format": "IDEA0", "ID": "a390d9f6-a896-4642-8b6a-3cc78910a337", "DetectTime": "2024-05-21T12:32:01.307644+00:00", "EventTime": "2024-05-21T12:32:01.307662+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKMn01eGm6kOttQ82"], "accumulated_threat_level": 4.5, "timewindow": 20} +{"Format": "IDEA0", "ID": "c7bc07ea-de71-49fd-a61f-ea2f6bee4845", "DetectTime": "2024-05-21T12:32:01.354132+00:00", "EventTime": "2024-05-21T12:32:01.354157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9K4LP47V9yRdsTda"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "d0068e76-db4f-4643-a361-c42e26c27858", "DetectTime": "2024-05-21T12:32:01.414584+00:00", "EventTime": "2024-05-21T12:32:01.414604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"]}], "Attach": [{"Content": "Connection to unknown destination port 16788/UDP destination IP 188.169.80.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5M30kN9VvfeJYUr9"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "ed30b7ad-bde9-49f6-9126-3979850a70ac", "DetectTime": "2024-05-21T12:32:01.453091+00:00", "EventTime": "2024-05-21T12:32:01.453110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdigP1HIk8OOvsS1"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "3a13e638-79ed-42a9-b6b3-92f7be8de148", "DetectTime": "2024-05-21T12:32:01.477050+00:00", "EventTime": "2024-05-21T12:32:01.477073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpUNy3v0naq9DhwU9"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "e1d2c2e8-cf9f-484d-83b3-7038343aa82d", "DetectTime": "2024-05-21T12:32:01.525452+00:00", "EventTime": "2024-05-21T12:32:01.525473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJU5k25JWUSVndSh1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "b1accbc3-cacd-46e5-bd3d-221858c391a0", "DetectTime": "2024-05-21T12:32:01.774093+00:00", "EventTime": "2024-05-21T12:32:01.774114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CspK4M1Je2RD3okpy6"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "6079392c-a234-4d75-9f31-43b7cc165d3d", "DetectTime": "2024-05-21T12:32:01.854785+00:00", "EventTime": "2024-05-21T12:32:01.854805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDSkn27ETrcJoDjmf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 66} +{"Format": "Json", "ID": "6079392c-a234-4d75-9f31-43b7cc165d3d", "DetectTime": "2024-05-21T12:32:01.854785+00:00", "EventTime": "2024-05-21T12:32:01.854805+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "1970-01-03T17:21:33.883215+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:32:02.060354)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c445023e-12c7-41c1-9048-5e2d946ecc19", "DetectTime": "2024-05-21T12:32:02.064434+00:00", "EventTime": "2024-05-21T12:32:02.064454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGu8C28MlQdJle4p1"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "a767434f-85b3-46a5-99eb-edb3ee61ff73", "DetectTime": "2024-05-21T12:32:02.076234+00:00", "EventTime": "2024-05-21T12:32:02.076254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpgma4XrdsgSFFZbb"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "67508797-7ec9-4d5d-a923-091a52279984", "DetectTime": "2024-05-21T12:32:02.081148+00:00", "EventTime": "2024-05-21T12:32:02.081168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLfAhS37b7RKhjO5Oc"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "dc58775d-fe8a-471b-a22e-50919cf472fd", "DetectTime": "2024-05-21T12:32:02.085684+00:00", "EventTime": "2024-05-21T12:32:02.085702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEdbF3MSObT4jC7C8"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "d253cc13-c6e9-4ff5-8944-92bd26ce1888", "DetectTime": "2024-05-21T12:32:02.090221+00:00", "EventTime": "2024-05-21T12:32:02.090241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerJdnAqwKvdRwpXl"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "8fdcced9-4c31-4bb9-aaed-87d264e7ea38", "DetectTime": "2024-05-21T12:32:02.118931+00:00", "EventTime": "2024-05-21T12:32:02.118951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUc1O3kHjPddwyLrh"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "4e3df264-ac4f-4a3f-8172-2185077a7261", "DetectTime": "2024-05-21T12:32:02.182749+00:00", "EventTime": "2024-05-21T12:32:02.182767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNYQP1QzsU6YY3a7k"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "52ccaaa4-5749-4586-b176-115787f8f59e", "DetectTime": "2024-05-21T12:32:02.275488+00:00", "EventTime": "2024-05-21T12:32:02.275507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9DgV7ivgh6OS70g"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "0fc51f8b-5b7e-48bd-9f9a-9b69ef77badc", "DetectTime": "2024-05-21T12:32:02.287561+00:00", "EventTime": "2024-05-21T12:32:02.287582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVUQP2QDx3KrNxt7k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "01311e25-b9e8-489f-a845-d10011d41386", "DetectTime": "2024-05-21T12:32:02.335770+00:00", "EventTime": "2024-05-21T12:32:02.335789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMufl2tT6sNU4LBq5"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "4ca569e5-2fff-4285-8018-fb7417e107c1", "DetectTime": "2024-05-21T12:32:02.387150+00:00", "EventTime": "2024-05-21T12:32:02.387170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"]}], "Attach": [{"Content": "Connection to unknown destination port 21538/UDP destination IP 31.11.249.52. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CzA21tcWHE6xsPwk"], "accumulated_threat_level": 4.0, "timewindow": 66} +{"Format": "IDEA0", "ID": "7725effd-73d5-4db0-85d7-217950d4e30f", "DetectTime": "2024-05-21T12:32:02.468872+00:00", "EventTime": "2024-05-21T12:32:02.468893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKa5Iq3eLcCL90Ks9k"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "c616da8c-601e-4f31-87b6-35fdca249bcd", "DetectTime": "2024-05-21T12:32:02.718391+00:00", "EventTime": "2024-05-21T12:32:02.718430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAITlvwigqkvCgqm7"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "69c2ce72-bf80-4a5a-aae1-cbae4a997508", "DetectTime": "2024-05-21T12:32:02.776124+00:00", "EventTime": "2024-05-21T12:32:02.776146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.180.153.115"]}], "Attach": [{"Content": "Connection to unknown destination port 10466/UDP destination IP 59.180.153.115. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwOyUg3m4oWcts1AO8"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "b5ef8576-2818-4802-a11c-c952892db8f7", "DetectTime": "2024-05-21T12:32:02.812234+00:00", "EventTime": "2024-05-21T12:32:02.812259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQtrm138adm7fvCyPd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "df515efa-1612-4b95-8187-01777ff7865e", "DetectTime": "2024-05-21T12:32:02.849006+00:00", "EventTime": "2024-05-21T12:32:02.849026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.55.57.160"]}], "Attach": [{"Content": "Connection to unknown destination port 23412/UDP destination IP 217.55.57.160. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1Zfv2nMLuzyoQiHg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "a1448b53-cb82-4990-ab07-660e9897f7ac", "DetectTime": "2024-05-21T12:32:02.906430+00:00", "EventTime": "2024-05-21T12:32:02.906452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.249.160.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN38XU359I9D4qV3u8"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "c4387e08-7bb0-4397-beff-ce649ab112e9", "DetectTime": "2024-05-21T12:32:03.190933+00:00", "EventTime": "2024-05-21T12:32:03.190956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8aSHUFfFIKWnCb74"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "25d83beb-da0b-4235-9ed5-1da0972b0153", "DetectTime": "2024-05-21T12:32:03.475482+00:00", "EventTime": "2024-05-21T12:32:03.475500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.97.86.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7gNWaP3uLWewgF2"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "0b6fe1c2-026b-4fcd-a2e7-e26b3b18f125", "DetectTime": "2024-05-21T12:32:03.534025+00:00", "EventTime": "2024-05-21T12:32:03.534047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNfw41B0BrfDITKhf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "e568827f-4a81-4f43-bbc6-e2c06417b654", "DetectTime": "2024-05-21T12:32:03.562210+00:00", "EventTime": "2024-05-21T12:32:03.562232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf07fr1DVPbyaSrZ9a"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "dbb9e47a-76fb-43a5-916f-ebb59c01379c", "DetectTime": "2024-05-21T12:32:03.599352+00:00", "EventTime": "2024-05-21T12:32:03.599373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Dfw310flYyZYScWg"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "ed0987b4-54cc-421a-9b43-87277fd32d2c", "DetectTime": "2024-05-21T12:32:03.635924+00:00", "EventTime": "2024-05-21T12:32:03.635948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTY0w44YY3Sml0ndOk"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "3f3f605e-84a3-4d7f-ad9b-34ecd00c86c8", "DetectTime": "2024-05-21T12:32:03.849165+00:00", "EventTime": "2024-05-21T12:32:03.849184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUe8pR70sh81unlqh"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "35f7a600-c896-4da9-a379-fa0bf56c70a1", "DetectTime": "2024-05-21T12:32:03.886985+00:00", "EventTime": "2024-05-21T12:32:03.887007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3VJek1twpPUXBVK2b"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "55a07b76-c3b3-459a-95e4-317c3e9fa741", "DetectTime": "2024-05-21T12:32:03.922449+00:00", "EventTime": "2024-05-21T12:32:03.922472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnwzlD13Fl9ZlAuMR1"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "e8121d2f-1c5a-44ce-8c7c-0f656dc51fa5", "DetectTime": "2024-05-21T12:32:04.251851+00:00", "EventTime": "2024-05-21T12:32:04.251870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjrHOp1aYUcbdsaip"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "90619838-f7d0-4ff8-ad5f-a048470b849b", "DetectTime": "2024-05-21T12:32:04.261367+00:00", "EventTime": "2024-05-21T12:32:04.261387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kB0hDE7Y0MhLzz4"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "95528e9e-f2c4-42db-accb-b1c3996995e6", "DetectTime": "2024-05-21T12:32:04.266370+00:00", "EventTime": "2024-05-21T12:32:04.266390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAk5xa8VHNEWPIr3"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "cada6258-e6e3-4fdc-913a-7ac22714afb6", "DetectTime": "2024-05-21T12:32:04.271159+00:00", "EventTime": "2024-05-21T12:32:04.271181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatXIV2rZfPdoMsHUd"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "da3f90f6-f5c4-42e0-95b2-279c5e5ccf44", "DetectTime": "2024-05-21T12:32:04.275760+00:00", "EventTime": "2024-05-21T12:32:04.275783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH6dx43tpb3zqMNn87"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "8987eb96-0507-45cf-8e2b-91c17460ae3f", "DetectTime": "2024-05-21T12:32:04.280652+00:00", "EventTime": "2024-05-21T12:32:04.280673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrN9v73z5jkBM00Vsi"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "7a2f1843-ecf1-42f5-b7d4-9016ba827610", "DetectTime": "2024-05-21T12:32:04.399819+00:00", "EventTime": "2024-05-21T12:32:04.399841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoC7a61CQxZ0BpoAGf"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "bbc44ed0-20e2-46f0-a300-07c9ffad546e", "DetectTime": "2024-05-21T12:32:04.424501+00:00", "EventTime": "2024-05-21T12:32:04.424521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaerCq3BXFl5uAvfe7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "1979e9d8-39b8-4517-b4a5-be5812fde686", "DetectTime": "2024-05-21T12:32:04.464279+00:00", "EventTime": "2024-05-21T12:32:04.464299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COELEz42aEULniZbzg"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "32235e49-7172-48b5-bccc-c9c3bad3730a", "DetectTime": "2024-05-21T12:32:04.493826+00:00", "EventTime": "2024-05-21T12:32:04.493845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhYlG24w3Jupvp35i"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "ecd97530-7d0b-4029-af62-8b564fe264b3", "DetectTime": "2024-05-21T12:32:04.525119+00:00", "EventTime": "2024-05-21T12:32:04.525139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5t7Gb2lzikkQdzv3d"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "1f66ffa2-2de2-4b42-87b0-c696c4c73f24", "DetectTime": "2024-05-21T12:32:04.570779+00:00", "EventTime": "2024-05-21T12:32:04.570808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uyhk4fIejtU3gN8b"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "4ad85f2f-d247-4c42-a216-e5b6ff218b84", "DetectTime": "2024-05-21T12:32:04.832405+00:00", "EventTime": "2024-05-21T12:32:04.832424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50PIXcgMoxeHuHqd"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "00f0f2c5-d7bb-47f0-a7be-15b9d94e404f", "DetectTime": "2024-05-21T12:32:04.898851+00:00", "EventTime": "2024-05-21T12:32:04.898873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhH9I3Rb8foNWZcnc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 66} +{"Format": "Json", "ID": "00f0f2c5-d7bb-47f0-a7be-15b9d94e404f", "DetectTime": "2024-05-21T12:32:04.898851+00:00", "EventTime": "2024-05-21T12:32:04.898873+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "1970-01-03T17:36:11.805918+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:32:05.145320)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "92904d21-508d-413a-9c41-e4d46a75972e", "DetectTime": "2024-05-21T12:32:05.149135+00:00", "EventTime": "2024-05-21T12:32:05.149153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKPGU3Ww727pEqnvk"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "68ebf4b1-8eff-49ca-9512-6876cab3c54d", "DetectTime": "2024-05-21T12:32:05.153464+00:00", "EventTime": "2024-05-21T12:32:05.153482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkBZO2mREimq6YfKh"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "c53cb650-829d-485b-a404-5d553e968876", "DetectTime": "2024-05-21T12:32:05.158127+00:00", "EventTime": "2024-05-21T12:32:05.158147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5lR325iJs0ficzr"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "34cc4b2b-32da-4d48-a6a1-df2c48108532", "DetectTime": "2024-05-21T12:32:05.163056+00:00", "EventTime": "2024-05-21T12:32:05.163075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfd2j31DN0OV8aJRAd"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "2334cc4f-2b12-41c3-983b-d7038c495b05", "DetectTime": "2024-05-21T12:32:05.167474+00:00", "EventTime": "2024-05-21T12:32:05.167494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C355kgmo7mjXK6c3f"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "75b79d6f-208b-4eb3-a861-c624b7dd31c9", "DetectTime": "2024-05-21T12:32:05.171985+00:00", "EventTime": "2024-05-21T12:32:05.172004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxd35aboMlNMXMJQ6"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "88021162-1b48-413c-abcf-3080a00d45eb", "DetectTime": "2024-05-21T12:32:05.177009+00:00", "EventTime": "2024-05-21T12:32:05.177028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChszoA3bZYqYlsAgX5"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "37c81a08-eeba-45c8-9363-bbac57abbbdd", "DetectTime": "2024-05-21T12:32:05.181799+00:00", "EventTime": "2024-05-21T12:32:05.181822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQUm427J6IjcfYwlf"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "61b10342-b535-4a31-9b09-b00a4f75e338", "DetectTime": "2024-05-21T12:32:05.194089+00:00", "EventTime": "2024-05-21T12:32:05.194107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLT2yv9Ty4LNfpNC7"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "646cbba7-5d38-442b-b404-b32ce975f271", "DetectTime": "2024-05-21T12:32:05.221723+00:00", "EventTime": "2024-05-21T12:32:05.221744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmqJA39AnGlCsJ6gk"], "accumulated_threat_level": 4.8, "timewindow": 65} +{"Format": "IDEA0", "ID": "81393826-a021-410c-aa8f-871b2a8e02b5", "DetectTime": "2024-05-21T12:32:05.386631+00:00", "EventTime": "2024-05-21T12:32:05.386653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COn5t43KrHBCjqqohj", "C14SpOyeYenCAUoic", "CkfORS7PdHfEq5Mxj", "CYAgbP1KJpKy5d0U5"], "accumulated_threat_level": 1.3, "timewindow": 66} +{"Format": "IDEA0", "ID": "e2b0fa23-4735-4fb5-b915-44e4137fece8", "DetectTime": "2024-05-21T12:32:05.549373+00:00", "EventTime": "2024-05-21T12:32:05.549391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwKxQ21IFvIDWIYqy4"], "accumulated_threat_level": 2.1, "timewindow": 66} +{"Format": "IDEA0", "ID": "bfdfe81f-4f1c-424c-8faf-f090eaecd23d", "DetectTime": "2024-05-21T12:32:05.588472+00:00", "EventTime": "2024-05-21T12:32:05.588493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8xQ5j4g6twnANGF6"], "accumulated_threat_level": 2.1, "timewindow": 66} +{"Format": "IDEA0", "ID": "84732bdf-530f-4a11-8e9a-5db23d758f5c", "DetectTime": "2024-05-21T12:32:05.601081+00:00", "EventTime": "2024-05-21T12:32:05.601102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["65.131.151.100"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 65.131.151.100. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0SFOnnNic47cli6"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "e70210ae-a635-4f83-9f2f-ae9b4b5df3b9", "DetectTime": "2024-05-21T12:32:05.861018+00:00", "EventTime": "2024-05-21T12:32:05.861039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkAvn4dCiwElhumgb"], "accumulated_threat_level": 3.7, "timewindow": 66} +{"Format": "IDEA0", "ID": "3d325770-9ba4-4105-b119-674d80b82ebb", "DetectTime": "2024-05-21T12:32:05.895833+00:00", "EventTime": "2024-05-21T12:32:05.895854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uJzw2SVZcr3ma9sd"], "accumulated_threat_level": 4.5, "timewindow": 66} +{"Format": "IDEA0", "ID": "ab50c7f1-69f8-44f7-a4ee-0825ba611947", "DetectTime": "2024-05-21T12:32:05.930272+00:00", "EventTime": "2024-05-21T12:32:05.930295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhoz123lBD5bhQmE5"], "accumulated_threat_level": 5.3, "timewindow": 66} +{"Format": "IDEA0", "ID": "61fbf186-b09d-4fba-ad12-6f5e18b0fb04", "DetectTime": "2024-05-21T12:32:05.965167+00:00", "EventTime": "2024-05-21T12:32:05.965188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfHnB15FtvXRUzOwh"], "accumulated_threat_level": 6.1, "timewindow": 66} +{"Format": "IDEA0", "ID": "a5e3b678-9146-4c97-b05f-aad4fbb2ccd1", "DetectTime": "2024-05-21T12:32:06.013428+00:00", "EventTime": "2024-05-21T12:32:06.013448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtZ2q3Q2kFEud098a"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "706e0d2a-025b-477b-936b-53c9760ca21a", "DetectTime": "2024-05-21T12:32:06.058969+00:00", "EventTime": "2024-05-21T12:32:06.058986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Oclj15bVy3kMKAk6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "e66b81f2-fa24-4d95-9833-d0839a14c892", "DetectTime": "2024-05-21T12:32:06.105579+00:00", "EventTime": "2024-05-21T12:32:06.105598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2gUm4gIW5eaog6j"], "accumulated_threat_level": 8.5, "timewindow": 66} +{"Format": "IDEA0", "ID": "b397dad6-41f9-41e3-887b-d8b97d8f3615", "DetectTime": "2024-05-21T12:32:06.139858+00:00", "EventTime": "2024-05-21T12:32:06.139878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbg68j45Vr08e4dYK1"], "accumulated_threat_level": 9.3, "timewindow": 66} +{"Format": "IDEA0", "ID": "23b18da8-67d3-4160-a89c-efc7cd1b5bf8", "DetectTime": "2024-05-21T12:32:06.184941+00:00", "EventTime": "2024-05-21T12:32:06.184961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhQdb1VooQTudxLhe"], "accumulated_threat_level": 10.100000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "d0bbffb1-280c-488e-8702-dcff5f67be08", "DetectTime": "2024-05-21T12:32:06.239736+00:00", "EventTime": "2024-05-21T12:32:06.239754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDz1U2wcr7UZhyM5f"], "accumulated_threat_level": 10.900000000000002, "timewindow": 66} +{"Format": "IDEA0", "ID": "a57c5845-b798-4743-a6d9-77d5f96183a6", "DetectTime": "2024-05-21T12:32:06.270560+00:00", "EventTime": "2024-05-21T12:32:06.270579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyffkd4rBbfzdwwKB6"], "accumulated_threat_level": 11.700000000000003, "timewindow": 66} +{"Format": "IDEA0", "ID": "2e8da43a-0706-4c8f-9fdc-73d480220f3f", "DetectTime": "2024-05-21T12:32:06.316049+00:00", "EventTime": "2024-05-21T12:32:06.316069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGl8K13yhECyIbFYsj"], "accumulated_threat_level": 12.500000000000004, "timewindow": 66} +{"Format": "Json", "ID": "2e8da43a-0706-4c8f-9fdc-73d480220f3f", "DetectTime": "2024-05-21T12:32:06.316049+00:00", "EventTime": "2024-05-21T12:32:06.316069+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "1970-01-03T17:54:04.182575+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:32:06.602629)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "10856f3d-c8d8-48cd-988b-142aadfc153e", "DetectTime": "2024-05-21T12:32:06.615460+00:00", "EventTime": "2024-05-21T12:32:06.615479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbo8GikbNSDhgoam"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "bbb5bef4-c3e5-4455-b28e-3e9efad01048", "DetectTime": "2024-05-21T12:32:06.625899+00:00", "EventTime": "2024-05-21T12:32:06.625917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEltgf17Me2ROoDxTd"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "5813b2c0-5ce6-4938-b957-4265722d2041", "DetectTime": "2024-05-21T12:32:06.630962+00:00", "EventTime": "2024-05-21T12:32:06.630980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGTr3ckGi2qDIr14"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "ee5ddf75-4324-4583-8566-16a34f4eb0cb", "DetectTime": "2024-05-21T12:32:06.657503+00:00", "EventTime": "2024-05-21T12:32:06.657550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCq7lW2vzRMxhUqpR3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "9be1f72f-c115-428f-b4b2-7c0645985574", "DetectTime": "2024-05-21T12:32:06.674651+00:00", "EventTime": "2024-05-21T12:32:06.674674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.76.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtD0qq2VW4MqeBoDZ6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "bbc5f882-4bde-469e-a667-9e448e203d3c", "DetectTime": "2024-05-21T12:32:06.717903+00:00", "EventTime": "2024-05-21T12:32:06.717924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy9B3jfFs0vD6p6U3"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "ae6795cb-70b7-42ea-9909-4b89a879da48", "DetectTime": "2024-05-21T12:32:06.753120+00:00", "EventTime": "2024-05-21T12:32:06.753137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.96.182.207"]}], "Attach": [{"Content": "Connection to unknown destination port 4294/UDP destination IP 14.96.182.207. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFS7q4zbklQNABRC"], "accumulated_threat_level": 4.0, "timewindow": 66} +{"Format": "IDEA0", "ID": "bb81520b-0ecb-4d93-91ee-ad23c3c97d7b", "DetectTime": "2024-05-21T12:32:06.941888+00:00", "EventTime": "2024-05-21T12:32:06.941909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPweaC4hpAq8SGBPY7"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "779e5548-7c1e-4221-a09f-6fc9b10009be", "DetectTime": "2024-05-21T12:32:06.988221+00:00", "EventTime": "2024-05-21T12:32:06.988242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSRC31gh38WFr3bG7"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "b7fc66b1-6796-4817-82ce-e73d3c63db13", "DetectTime": "2024-05-21T12:32:07.037736+00:00", "EventTime": "2024-05-21T12:32:07.037758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyKqZJ2JoEBEz92ase"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "dd3a1616-97c1-4d27-8e64-11360cdd2950", "DetectTime": "2024-05-21T12:32:07.073084+00:00", "EventTime": "2024-05-21T12:32:07.073105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZP665a5GLpFlyT2"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "7f80ca8d-973b-4bc7-a37a-15baf14219b1", "DetectTime": "2024-05-21T12:32:07.124644+00:00", "EventTime": "2024-05-21T12:32:07.124664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7KYE17SprQhnR7F4"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "5737ac5a-68f9-4429-8f7c-b0bc56bfb9fb", "DetectTime": "2024-05-21T12:32:07.634680+00:00", "EventTime": "2024-05-21T12:32:07.634701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csy30N1yMkyBuFWJL9"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "9eaae2a9-2a2f-4e51-9dfb-f3384cc68819", "DetectTime": "2024-05-21T12:32:07.794225+00:00", "EventTime": "2024-05-21T12:32:07.794246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCYUj2b5dbH12EZe"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "a5e17f93-8172-45c4-8e3c-8686907717fc", "DetectTime": "2024-05-21T12:32:07.829322+00:00", "EventTime": "2024-05-21T12:32:07.829345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJNnFu3pfXbbw9gg3i"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "2a965ae3-b395-4d4f-bd6e-833476f0b24b", "DetectTime": "2024-05-21T12:32:07.865710+00:00", "EventTime": "2024-05-21T12:32:07.865730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBRthB2aP1HjOWimHb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "144409e0-1a37-4802-b641-6b51a069c8ed", "DetectTime": "2024-05-21T12:32:07.891498+00:00", "EventTime": "2024-05-21T12:32:07.891520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxrjWO2VFjvufZdhii"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "07e1df8a-8b89-436a-9b51-86806486474f", "DetectTime": "2024-05-21T12:32:08.164159+00:00", "EventTime": "2024-05-21T12:32:08.164183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQP3lf1yddnQ7voTZj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "514c2b04-57e6-42a8-965f-60fdf899647f", "DetectTime": "2024-05-21T12:32:08.199980+00:00", "EventTime": "2024-05-21T12:32:08.199999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8J4I18zqDg8jfuI5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "ef51fd88-b8b0-4483-9848-1a27e35406a3", "DetectTime": "2024-05-21T12:32:08.205633+00:00", "EventTime": "2024-05-21T12:32:08.205652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHDJ1kzvHhtL8FWg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "6c5b93cb-ecd8-461f-a134-e34a2255cabd", "DetectTime": "2024-05-21T12:32:08.229478+00:00", "EventTime": "2024-05-21T12:32:08.229496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHLZH9htLNyPAmbk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "c8c2d4e3-94a3-49b1-8d07-a9aec2c6eb71", "DetectTime": "2024-05-21T12:32:08.244835+00:00", "EventTime": "2024-05-21T12:32:08.244855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkNTnn40TmvcAQx64b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "952f4b5a-8f11-4994-a9ea-2ec08e7ce28d", "DetectTime": "2024-05-21T12:32:08.325682+00:00", "EventTime": "2024-05-21T12:32:08.325700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVnx8a3ZaLq9yyc0Ph"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "914da87f-0cb8-437d-9508-1c590e9af422", "DetectTime": "2024-05-21T12:32:08.364817+00:00", "EventTime": "2024-05-21T12:32:08.364840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWZeU1LenJ5RTDOT3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "3ac459f7-a878-46a5-80ef-394262ef15b1", "DetectTime": "2024-05-21T12:32:08.395314+00:00", "EventTime": "2024-05-21T12:32:08.395333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.42.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXU0X1UwAYmtUdcZh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "46dc8dcd-6ae5-4dd0-8990-fffd081fca6e", "DetectTime": "2024-05-21T12:32:08.473138+00:00", "EventTime": "2024-05-21T12:32:08.473165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.94.158.164"]}], "Attach": [{"Content": "Connection to unknown destination port 8384/UDP destination IP 188.94.158.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyIBt3S5jrHP4umM5"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "d1787704-ee04-43ed-8ed5-8ade8cbe9db9", "DetectTime": "2024-05-21T12:32:08.485509+00:00", "EventTime": "2024-05-21T12:32:08.485530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6EpXO27uxm0kzkKfk"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "612001d9-ba5b-4b99-92c1-e81e0d6d028a", "DetectTime": "2024-05-21T12:32:08.513983+00:00", "EventTime": "2024-05-21T12:32:08.514004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeEr9XvY8xhYBbQ8"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "2b44cc54-b71d-427f-936c-c6a183be7238", "DetectTime": "2024-05-21T12:32:08.544840+00:00", "EventTime": "2024-05-21T12:32:08.544861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.74.131.196"]}], "Attach": [{"Content": "Connection to unknown destination port 19105/UDP destination IP 151.74.131.196. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMaIgC2bQnOdzVq2"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "9e514c18-0b33-4e41-ad40-92ca1d2add91", "DetectTime": "2024-05-21T12:32:08.569047+00:00", "EventTime": "2024-05-21T12:32:08.569068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOe5NzJivrw7Jkpi"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "9a2385be-7ff9-4e9a-a735-4a440d644d98", "DetectTime": "2024-05-21T12:32:08.607721+00:00", "EventTime": "2024-05-21T12:32:08.607744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"]}], "Attach": [{"Content": "Connection to unknown destination port 16788/UDP destination IP 188.169.80.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chh3qJ3cDFg812TsNe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "469e35cb-8e87-4b66-b182-9eeb58b1574e", "DetectTime": "2024-05-21T12:32:08.844166+00:00", "EventTime": "2024-05-21T12:32:08.844187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.152.83.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5I4AJ3MeWOv50nihk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "9479ebcf-b8f0-44ee-b28c-306013ed18aa", "DetectTime": "2024-05-21T12:32:08.849345+00:00", "EventTime": "2024-05-21T12:32:08.849363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu15Y01ngyf6NyHd3a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "bceddb1c-1e1e-40c9-910f-5133de2d7a1b", "DetectTime": "2024-05-21T12:32:08.871078+00:00", "EventTime": "2024-05-21T12:32:08.871100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWNpIF2hEBaCGdMpw2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "9f459ed7-9103-47e8-a0f9-ef4f6d15e867", "DetectTime": "2024-05-21T12:32:08.921217+00:00", "EventTime": "2024-05-21T12:32:08.921235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1nXW1GKC1r72Yfjc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 66} +{"Format": "Json", "ID": "9f459ed7-9103-47e8-a0f9-ef4f6d15e867", "DetectTime": "2024-05-21T12:32:08.921217+00:00", "EventTime": "2024-05-21T12:32:08.921235+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "1970-01-03T17:54:47.103787+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:32:09.451343)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5b11d685-2246-4927-a0a3-b0fec37330e4", "DetectTime": "2024-05-21T12:32:09.465014+00:00", "EventTime": "2024-05-21T12:32:09.465034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4iA22W6tJYVvaxQ8"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "cb302d78-9985-4a04-a0fa-0c7675b9552a", "DetectTime": "2024-05-21T12:32:09.470378+00:00", "EventTime": "2024-05-21T12:32:09.470396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzihRS2w2hwAit7hOa"], "accumulated_threat_level": 0.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "fe184c9c-de15-41a8-bdee-14df540a5e0c", "DetectTime": "2024-05-21T12:32:09.483930+00:00", "EventTime": "2024-05-21T12:32:09.483950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxCWC1452lDsHjP73"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "f2674dbf-3a6b-4d42-9f5d-2eda85ee0313", "DetectTime": "2024-05-21T12:32:09.489760+00:00", "EventTime": "2024-05-21T12:32:09.489779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.55.62.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1rlW1SllA3UlUYQ4"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "2d1528c7-7908-417f-9f9d-585a7a873ac3", "DetectTime": "2024-05-21T12:32:09.495435+00:00", "EventTime": "2024-05-21T12:32:09.495453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIdWN1QUmsp2tLlva"], "accumulated_threat_level": 1.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "5e68ec19-abd9-4a61-ba15-d4da0fddcf18", "DetectTime": "2024-05-21T12:32:09.510257+00:00", "EventTime": "2024-05-21T12:32:09.510277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce3iPz4NtS1cVKyTq8"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "dee86f88-8a05-44e0-8ab9-969347c497e6", "DetectTime": "2024-05-21T12:32:09.525023+00:00", "EventTime": "2024-05-21T12:32:09.525043+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce3iPz4NtS1cVKyTq8"], "accumulated_threat_level": 3.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "a59fd34f-e2f9-4e50-b604-140e8098e3c8", "DetectTime": "2024-05-21T12:32:09.536721+00:00", "EventTime": "2024-05-21T12:32:09.536739+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.57.242"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkP994L1YWwUq1R7k"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "31ff5200-3537-489b-8c40-b6e9bb9c35f8", "DetectTime": "2024-05-21T12:32:09.548078+00:00", "EventTime": "2024-05-21T12:32:09.548099+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.57.242"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.57.242 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkP994L1YWwUq1R7k"], "accumulated_threat_level": 4.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "54349351-ac30-49d6-85f0-60aae326da78", "DetectTime": "2024-05-21T12:32:09.558596+00:00", "EventTime": "2024-05-21T12:32:09.558614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caab9g3vKmVHPvugd9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "93178e2c-705d-4ddd-a387-2b61380f26b6", "DetectTime": "2024-05-21T12:32:09.563240+00:00", "EventTime": "2024-05-21T12:32:09.563259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4WSf2nrf2ObzMzwg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "bed0979e-1beb-4205-a67b-cb58c45303c7", "DetectTime": "2024-05-21T12:32:09.572633+00:00", "EventTime": "2024-05-21T12:32:09.572651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJegcB4ZzebyXjXCj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "bc365e38-c531-4e21-92d1-c7d3de02ab33", "DetectTime": "2024-05-21T12:32:09.577104+00:00", "EventTime": "2024-05-21T12:32:09.577122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMaIC2QBgTEAJAdK8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 66} +{"Format": "IDEA0", "ID": "3e740ea2-dfb0-4988-a150-24434bed3e06", "DetectTime": "2024-05-21T12:32:09.589611+00:00", "EventTime": "2024-05-21T12:32:09.589632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTShx23XAB7qptl5jh"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "18346c6a-6b20-4e80-a9b1-3bdba6ba84da", "DetectTime": "2024-05-21T12:32:09.595129+00:00", "EventTime": "2024-05-21T12:32:09.595147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsGcAM10MYIWmQSva7"], "accumulated_threat_level": 3.2, "timewindow": 66} +{"Format": "IDEA0", "ID": "35ad5c79-fe7d-4db0-8c53-6393585b74ef", "DetectTime": "2024-05-21T12:32:09.606362+00:00", "EventTime": "2024-05-21T12:32:09.606381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn39M71rRv9CtZaf28"], "accumulated_threat_level": 4.0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b612ca9f-353e-4a94-8a83-d8e189fad903", "DetectTime": "2024-05-21T12:32:09.617927+00:00", "EventTime": "2024-05-21T12:32:09.617946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"]}], "Attach": [{"Content": "Connection to unknown destination port 21538/UDP destination IP 31.11.249.52. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwugH42jEM9Smd5dT6"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "bbb9b979-9e19-4ba3-81c0-979d320bf6e1", "DetectTime": "2024-05-21T12:32:09.666142+00:00", "EventTime": "2024-05-21T12:32:09.666164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnb95H4hZpzWflXa"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "67241846-a573-4e52-a6a2-d4176d03c1bd", "DetectTime": "2024-05-21T12:32:09.672632+00:00", "EventTime": "2024-05-21T12:32:09.672653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNw2Rf4tOnFN72e6gd"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "24eeb8e4-36be-4210-9e41-c6cf5d060039", "DetectTime": "2024-05-21T12:32:09.679332+00:00", "EventTime": "2024-05-21T12:32:09.679356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHIE01kwRyrgHALR4"], "accumulated_threat_level": 4.8, "timewindow": 66} +{"Format": "IDEA0", "ID": "0edfb5ee-752d-41cd-b0cb-416b7f237cfe", "DetectTime": "2024-05-21T12:32:09.742992+00:00", "EventTime": "2024-05-21T12:32:09.743012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvngQ2ZMbKCpw0L7"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "47581ba0-5438-46b4-a28e-9a9d2deed54b", "DetectTime": "2024-05-21T12:32:09.771335+00:00", "EventTime": "2024-05-21T12:32:09.771357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4FUZX2ZmlgS7xnVLk"], "accumulated_threat_level": 5.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "e7d34f9c-731c-4fce-ab2b-5d771594960e", "DetectTime": "2024-05-21T12:32:09.807196+00:00", "EventTime": "2024-05-21T12:32:09.807217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBbTjkO5C9fxZJpf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "c01cb90e-9b17-431f-875c-dd3eae8b987c", "DetectTime": "2024-05-21T12:32:09.834274+00:00", "EventTime": "2024-05-21T12:32:09.834294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgeY92XKTKPIQKy44"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 66} +{"Format": "IDEA0", "ID": "d64fcc8c-8080-4bdf-bf42-930a29dae8f0", "DetectTime": "2024-05-21T12:32:09.895761+00:00", "EventTime": "2024-05-21T12:32:09.895781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOP4D2abavfrxeLg6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "13a03149-dd16-4ab8-89e5-c851cf681b43", "DetectTime": "2024-05-21T12:32:09.901481+00:00", "EventTime": "2024-05-21T12:32:09.901503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4azA3169Zu5timH4f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "f273766a-f6e2-4c22-b815-42a64a2484ad", "DetectTime": "2024-05-21T12:32:09.959069+00:00", "EventTime": "2024-05-21T12:32:09.959093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ4vkJMx4D63nfn7l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "c9251cd3-dd18-428a-84bf-28ad6d2b1a1c", "DetectTime": "2024-05-21T12:32:09.974607+00:00", "EventTime": "2024-05-21T12:32:09.974629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbvjxU1rXYbwxZVqM4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "0ed0546e-6dce-408c-9793-9160deeb90c2", "DetectTime": "2024-05-21T12:32:10.012345+00:00", "EventTime": "2024-05-21T12:32:10.012365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7n3pm3EhGXqxN736l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "18b200bb-779f-4f8e-9add-7201c5ee7351", "DetectTime": "2024-05-21T12:32:10.050014+00:00", "EventTime": "2024-05-21T12:32:10.050033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiC6ls2y5bLahKNrKg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "75c0f97d-8cfc-4d8f-a429-8a6b3b6b672c", "DetectTime": "2024-05-21T12:32:10.281341+00:00", "EventTime": "2024-05-21T12:32:10.281362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ColOZn3g6OrmVWMpb9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "f1dc928b-22b3-475d-9e9c-5a6571e730a4", "DetectTime": "2024-05-21T12:32:10.338245+00:00", "EventTime": "2024-05-21T12:32:10.338264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVADce6F5RD5moPa7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "be493417-ea2e-4413-b812-82e80b042aca", "DetectTime": "2024-05-21T12:32:10.343028+00:00", "EventTime": "2024-05-21T12:32:10.343047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6S2G6pJqvcUuA5he"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "b4deca45-bd45-4a8c-ae29-d6872c8ad7a6", "DetectTime": "2024-05-21T12:32:10.347620+00:00", "EventTime": "2024-05-21T12:32:10.347639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLC3fi1zwVTOuCHVnd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "3686f0b7-9e2e-4580-b056-87f0515a59f1", "DetectTime": "2024-05-21T12:32:10.364568+00:00", "EventTime": "2024-05-21T12:32:10.364595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8S6A2hjCJwCzPZU9", "C0tnVzwD3qV0PvhLa", "CNgE7h48XDaHLCJP1e", "Cj8Zzv1OLXwAdGUgv7"], "accumulated_threat_level": 0.5, "timewindow": 67} +{"Format": "IDEA0", "ID": "b640569b-09f7-453d-a04c-904fff8ef4eb", "DetectTime": "2024-05-21T12:32:10.399805+00:00", "EventTime": "2024-05-21T12:32:10.399829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmFJd2SyR8vwvWANh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "e1303159-e163-447e-ae28-8337b0b298ca", "DetectTime": "2024-05-21T12:32:10.454174+00:00", "EventTime": "2024-05-21T12:32:10.454199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJSPn47tDiRDaDera"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "08639813-40c1-4bfb-b9d7-c80aa346b8e2", "DetectTime": "2024-05-21T12:32:10.479598+00:00", "EventTime": "2024-05-21T12:32:10.479620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvj624TGjdU97Zlng"], "accumulated_threat_level": 8.799999999999999, "timewindow": 66} +{"Format": "IDEA0", "ID": "fd5426c7-6c03-4a44-8c1c-60132db79ce0", "DetectTime": "2024-05-21T12:32:10.531928+00:00", "EventTime": "2024-05-21T12:32:10.531953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu47Di4IUfovuJA4bh"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "5fcc26e4-f490-4330-aa5e-1a756a87c603", "DetectTime": "2024-05-21T12:32:10.537061+00:00", "EventTime": "2024-05-21T12:32:10.537083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.152.71.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COV9ZU46QOuwUrOhi"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "3065116f-fd34-48cb-bef0-d064ec13a493", "DetectTime": "2024-05-21T12:32:10.542683+00:00", "EventTime": "2024-05-21T12:32:10.542703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.250.244.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUCfc1rzfqUzkF6Ka"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "e49c6f91-ecf4-4c36-81ca-bd7b8ab9c6a5", "DetectTime": "2024-05-21T12:32:10.558578+00:00", "EventTime": "2024-05-21T12:32:10.558598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.9.241.203 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj0aCw3f4zWNcnuaXd"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "17823d5f-133f-4042-a358-c92e02495d45", "DetectTime": "2024-05-21T12:32:10.649887+00:00", "EventTime": "2024-05-21T12:32:10.649908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.225.178.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWWn2BcxftWhOI6Bj"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "ec3d4363-4243-4053-82af-a8172d72bcde", "DetectTime": "2024-05-21T12:32:10.656331+00:00", "EventTime": "2024-05-21T12:32:10.656349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.110.95.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYWmc1PGtxrL5VCId"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "187631ce-f574-4e64-b2c6-32e894fafc7f", "DetectTime": "2024-05-21T12:32:10.663506+00:00", "EventTime": "2024-05-21T12:32:10.663527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.181.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFUraf43jHuMtBj4aa"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "d7543a98-228f-425e-ade4-70afcef070ba", "DetectTime": "2024-05-21T12:32:10.926898+00:00", "EventTime": "2024-05-21T12:32:10.926919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.192.108.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEg1Vvbn4GHRKXY7d"], "accumulated_threat_level": 9.6, "timewindow": 66} +{"Format": "IDEA0", "ID": "f5d79d3c-1c28-4d3d-bb45-6b657867cfb7", "DetectTime": "2024-05-21T12:32:10.938594+00:00", "EventTime": "2024-05-21T12:32:10.938616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8rxbm2L7qEWq1ODo6"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "bb2967de-3776-4951-8fa2-00a62343ae91", "DetectTime": "2024-05-21T12:32:11.069496+00:00", "EventTime": "2024-05-21T12:32:11.069518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.15.18.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cci6ydCC2o1MNZxFk"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "e4517111-5885-43d4-9edd-7a82a2805e5d", "DetectTime": "2024-05-21T12:32:11.074909+00:00", "EventTime": "2024-05-21T12:32:11.074930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.216.50.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJe4V32siVMB5y4a2"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "9d79361f-3e3d-4e04-939f-a17ad5a4958d", "DetectTime": "2024-05-21T12:32:11.079437+00:00", "EventTime": "2024-05-21T12:32:11.079455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.96.182.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LlHA3X7Cl7NxUPJf"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "ad0d5eeb-2d3b-41be-84df-27d23d6dbee8", "DetectTime": "2024-05-21T12:32:11.083942+00:00", "EventTime": "2024-05-21T12:32:11.083960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 8.18.2.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmwKNh3qqnWviqJXP5"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "5b875eb8-3aed-4160-b5a6-8d290871bd6c", "DetectTime": "2024-05-21T12:32:11.126354+00:00", "EventTime": "2024-05-21T12:32:11.126374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.164.39.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0HaJ03kKXEfKu93I8"], "accumulated_threat_level": 10.4, "timewindow": 66} +{"Format": "IDEA0", "ID": "5d8a54b9-be7a-4a92-8a8a-6d533f3f5405", "DetectTime": "2024-05-21T12:32:11.182065+00:00", "EventTime": "2024-05-21T12:32:11.182086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RfJv3NHbwF47zSti"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "81174339-b627-4720-838f-a90ae276a2c2", "DetectTime": "2024-05-21T12:32:11.232856+00:00", "EventTime": "2024-05-21T12:32:11.232878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.64.104.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl3C6B2elIC2QWVvRc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "823e3832-f02b-4b1c-9226-94e0ea46036f", "DetectTime": "2024-05-21T12:32:11.245985+00:00", "EventTime": "2024-05-21T12:32:11.246007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.80.29.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaHnoN2jX0vRrFvFFl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "2e2d1f10-6a5c-41e1-bae0-cbb1f4d880c8", "DetectTime": "2024-05-21T12:32:11.288131+00:00", "EventTime": "2024-05-21T12:32:11.288149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.198.227.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaioT1al22bLnZk7c"], "accumulated_threat_level": 11.200000000000001, "timewindow": 66} +{"Format": "IDEA0", "ID": "a77424b4-3497-4cb0-9a90-392ed5587777", "DetectTime": "2024-05-21T12:32:11.351118+00:00", "EventTime": "2024-05-21T12:32:11.351138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwBs21tritMjliJcd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 66} +{"Format": "Json", "ID": "a77424b4-3497-4cb0-9a90-392ed5587777", "DetectTime": "2024-05-21T12:32:11.351118+00:00", "EventTime": "2024-05-21T12:32:11.351138+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "1970-01-03T17:55:23.745479+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 66. (real time 2024/05/21 12:32:11.820623)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 66, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "accb1035-b843-41f9-aca8-8376d989facf", "DetectTime": "2024-05-21T12:32:11.824799+00:00", "EventTime": "2024-05-21T12:32:11.824817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.232.104.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70xqzzWRJSb3PWWi"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2677733d-437c-4dff-864f-a9cf14296eac", "DetectTime": "2024-05-21T12:32:11.829632+00:00", "EventTime": "2024-05-21T12:32:11.829658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.4.69.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfkiE1mTaCpLzYGF8"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "0d861e96-0769-4c19-9522-3e73c88d17ce", "DetectTime": "2024-05-21T12:32:11.850253+00:00", "EventTime": "2024-05-21T12:32:11.850272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.157.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CstLQC4X9Slm28rDy8"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "21d82795-3c54-4d89-a2bc-82118473d21e", "DetectTime": "2024-05-21T12:32:11.855707+00:00", "EventTime": "2024-05-21T12:32:11.855726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.80.99.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0to77sg1lqDLnd94"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "038aa6c3-13f8-438f-940e-fa5bf2092575", "DetectTime": "2024-05-21T12:32:11.861017+00:00", "EventTime": "2024-05-21T12:32:11.861034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.185.46.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chc9Q5kT3MulRLR5e"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "d514f0f9-d98f-40c0-9425-3847b304ebcd", "DetectTime": "2024-05-21T12:32:11.866739+00:00", "EventTime": "2024-05-21T12:32:11.866758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7jf8168Od9w1znXe"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "9d9ddae0-dcb0-4384-8ada-3eaa091e68ff", "DetectTime": "2024-05-21T12:32:11.872777+00:00", "EventTime": "2024-05-21T12:32:11.872796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.242.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4s5v54WD8k32I8Led"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "8b1bf37c-2b1e-4887-a9e4-17a897cc78dc", "DetectTime": "2024-05-21T12:32:11.878225+00:00", "EventTime": "2024-05-21T12:32:11.878244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.3.239.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEcG843gBUC6El8Mi"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "8d84e003-d67b-4d61-8d4f-94ff1a62513c", "DetectTime": "2024-05-21T12:32:11.889452+00:00", "EventTime": "2024-05-21T12:32:11.889471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsOJ131BZfdCOhDt5"], "accumulated_threat_level": 1.3, "timewindow": 67} +{"Format": "IDEA0", "ID": "d2d0a513-9795-4a14-ae8b-50815822df6d", "DetectTime": "2024-05-21T12:32:11.908625+00:00", "EventTime": "2024-05-21T12:32:11.908647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.14.83.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBEsP15XtaBoAMrc5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "c97fbfd0-ceca-4750-a283-1dcb87b0fc75", "DetectTime": "2024-05-21T12:32:11.955124+00:00", "EventTime": "2024-05-21T12:32:11.955147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.59.60.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHi2J2BMeltwZzipd"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "18f95cbe-6706-414a-9430-20162a4764e1", "DetectTime": "2024-05-21T12:32:12.025651+00:00", "EventTime": "2024-05-21T12:32:12.025674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwp8Ow3zlLoO2i7eu6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "8a7cd0ef-1690-4530-bf82-aebf6c2bc463", "DetectTime": "2024-05-21T12:32:12.059025+00:00", "EventTime": "2024-05-21T12:32:12.059044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.194.115.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOXWd1U5miNxnFBkg"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "4abb41d4-da0a-459c-8a29-e6dc770eb2c3", "DetectTime": "2024-05-21T12:32:12.112202+00:00", "EventTime": "2024-05-21T12:32:12.112223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.57.22.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChgQOQ2VK3Q1FSyue8"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "abe71ba9-97c1-4b8a-9bb0-fee72208394b", "DetectTime": "2024-05-21T12:32:12.400240+00:00", "EventTime": "2024-05-21T12:32:12.400260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 120.150.27.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvanDTvE6snXUJq2"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "956e38b8-f6e6-4fc9-a865-19ebd1d957f1", "DetectTime": "2024-05-21T12:32:12.406924+00:00", "EventTime": "2024-05-21T12:32:12.406945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.44.21.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgU8TMDLT4JeWcigj"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "ab1ede3d-2bba-4296-80dc-f4ce01c46e6f", "DetectTime": "2024-05-21T12:32:12.411818+00:00", "EventTime": "2024-05-21T12:32:12.411838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.251.230.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hKeI2vZDFq4d4Py3"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "7ee81810-a164-4e2a-b6d7-1311e8fd2c1c", "DetectTime": "2024-05-21T12:32:12.468827+00:00", "EventTime": "2024-05-21T12:32:12.468848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmstrx360Pei3j818j", "CUVj6s8qSp1WoUpf4", "CLJsGP1GbSnZamBkP6", "C3RBqd2ue8G873uKfj"], "accumulated_threat_level": 1.8, "timewindow": 67} +{"Format": "IDEA0", "ID": "b9d338d9-741a-4c85-bc20-f3be96f3f920", "DetectTime": "2024-05-21T12:32:12.510919+00:00", "EventTime": "2024-05-21T12:32:12.510941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.5.179.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfeHrDcjQYwOyjac"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "279389ba-54df-424d-bc3d-f896193be72a", "DetectTime": "2024-05-21T12:32:12.538436+00:00", "EventTime": "2024-05-21T12:32:12.538462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoTHr22G3Es4oterf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "447b0771-8425-4e25-bff9-bcf29b68f88c", "DetectTime": "2024-05-21T12:32:12.543421+00:00", "EventTime": "2024-05-21T12:32:12.543440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.141.117.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMcUx4EhC1CB4T3Rj"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "619a93ab-f80d-4a40-b87e-62c43660bd46", "DetectTime": "2024-05-21T12:32:12.596738+00:00", "EventTime": "2024-05-21T12:32:12.596759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.95.39.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJaPgXIJwKkGWibSf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "001c2e9c-0277-49d3-a852-510cf707724a", "DetectTime": "2024-05-21T12:32:12.624458+00:00", "EventTime": "2024-05-21T12:32:12.624478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"]}], "Attach": [{"Content": "Connection to unknown destination port 28610/UDP destination IP 78.166.143.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7siNl1GgRpUMRToP8"], "accumulated_threat_level": 2.6, "timewindow": 67} +{"Format": "IDEA0", "ID": "1a832ee4-75ad-4bd7-8437-839d356e52d9", "DetectTime": "2024-05-21T12:32:12.712928+00:00", "EventTime": "2024-05-21T12:32:12.712950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdK1yqAUuHzR9nSif"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 67} +{"Format": "IDEA0", "ID": "64512a0c-6fd9-44f4-b848-cdde54ede6e8", "DetectTime": "2024-05-21T12:32:12.750286+00:00", "EventTime": "2024-05-21T12:32:12.750307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXcxN1c2vpMdYOLtk"], "accumulated_threat_level": 4.2, "timewindow": 67} +{"Format": "IDEA0", "ID": "07866765-5729-48d5-a710-021234ce487b", "DetectTime": "2024-05-21T12:32:12.793938+00:00", "EventTime": "2024-05-21T12:32:12.793961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWiu5xGsn5SCA1Na"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "8d29417b-597a-4f9c-91c9-20abaaacf9eb", "DetectTime": "2024-05-21T12:32:12.807613+00:00", "EventTime": "2024-05-21T12:32:12.807633+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWiu5xGsn5SCA1Na"], "accumulated_threat_level": 4.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "5aa0ef2e-5025-45db-9ab3-b61a99050ff1", "DetectTime": "2024-05-21T12:32:12.823158+00:00", "EventTime": "2024-05-21T12:32:12.823179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 159.205.108.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1gDbm3jcwPgpfEyZ3"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "02b658d1-405c-4293-8b9e-46cf0a17f88f", "DetectTime": "2024-05-21T12:32:12.880704+00:00", "EventTime": "2024-05-21T12:32:12.880722+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuwobp4c2Tb6oEG2Dh"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "21f6bf84-35b6-425b-a175-62e0704fff1b", "DetectTime": "2024-05-21T12:32:12.893944+00:00", "EventTime": "2024-05-21T12:32:12.893962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuwobp4c2Tb6oEG2Dh"], "accumulated_threat_level": 5.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "fa97018b-f2a2-47f4-bbce-b871b21e673b", "DetectTime": "2024-05-21T12:32:12.951688+00:00", "EventTime": "2024-05-21T12:32:12.951706+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6b7vn3stYjJkykNV"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "8e640b90-1168-41fa-8aed-4bb0018b38c9", "DetectTime": "2024-05-21T12:32:12.964778+00:00", "EventTime": "2024-05-21T12:32:12.964801+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6b7vn3stYjJkykNV"], "accumulated_threat_level": 5.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "439c070c-41ca-49de-b960-52e1def9f841", "DetectTime": "2024-05-21T12:32:13.167382+00:00", "EventTime": "2024-05-21T12:32:13.167404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.99.102.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdwweC3LFdQVOITuJf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "059146b5-2316-44b7-9a6c-a16a41d3b33a", "DetectTime": "2024-05-21T12:32:13.246922+00:00", "EventTime": "2024-05-21T12:32:13.246943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6P8HZA6Gk4zgELs1"], "accumulated_threat_level": 5.0, "timewindow": 67} +{"Format": "IDEA0", "ID": "e1f5fa0d-4925-420b-9f5b-d85ca97675d5", "DetectTime": "2024-05-21T12:32:13.405343+00:00", "EventTime": "2024-05-21T12:32:13.405361+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2oPGcvHEBZxAA3g"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "20f2d664-bfff-4f4d-b8d5-3d4f1db5103e", "DetectTime": "2024-05-21T12:32:13.417219+00:00", "EventTime": "2024-05-21T12:32:13.417237+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2oPGcvHEBZxAA3g"], "accumulated_threat_level": 6.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "b6c9a236-4048-4d02-908f-48f70e146de1", "DetectTime": "2024-05-21T12:32:13.450462+00:00", "EventTime": "2024-05-21T12:32:13.450482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.73.228.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE0vWY2IGJJZW6BUA9"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "e183cb49-adb3-499a-8173-db4b7ee2da3f", "DetectTime": "2024-05-21T12:32:13.455906+00:00", "EventTime": "2024-05-21T12:32:13.455926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.103.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUFnq2TQE1UdpZFc5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "afaf7854-12df-4dd9-b0c1-e8b0011eeb8a", "DetectTime": "2024-05-21T12:32:13.489954+00:00", "EventTime": "2024-05-21T12:32:13.489974+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlXjb4cdm870pWGE9"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "d4cb32c1-2a0c-4e7b-8c5b-b983181528a9", "DetectTime": "2024-05-21T12:32:13.504226+00:00", "EventTime": "2024-05-21T12:32:13.504247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlXjb4cdm870pWGE9"], "accumulated_threat_level": 6.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "edaedecc-1c8a-422c-9013-ed183d0a65dd", "DetectTime": "2024-05-21T12:32:13.514664+00:00", "EventTime": "2024-05-21T12:32:13.514682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNChL16rtENMjmW9"], "accumulated_threat_level": 5.8, "timewindow": 67} +{"Format": "IDEA0", "ID": "6f89012d-862a-47d4-9c63-d94de1662eb9", "DetectTime": "2024-05-21T12:32:13.548749+00:00", "EventTime": "2024-05-21T12:32:13.548770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPlHL1PfHLMKARwE8"], "accumulated_threat_level": 6.6, "timewindow": 67} +{"Format": "IDEA0", "ID": "99af3b3d-06f9-44db-b4a3-ed81a6884786", "DetectTime": "2024-05-21T12:32:13.575519+00:00", "EventTime": "2024-05-21T12:32:13.575543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.228.163.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD0Ad01vCQTTLVObc1"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5cbd8f58-4978-4125-b840-6c70e444dcc2", "DetectTime": "2024-05-21T12:32:13.612294+00:00", "EventTime": "2024-05-21T12:32:13.612313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxjrRg1xArSoDFmwIh"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 67} +{"Format": "IDEA0", "ID": "25c525b1-0b19-4a61-a4ae-a02f5bc69d1f", "DetectTime": "2024-05-21T12:32:13.623892+00:00", "EventTime": "2024-05-21T12:32:13.623911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co21UTTVbvj2zWi1a"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "62e8733c-7396-4f4d-a8d2-c1112c4cf3cd", "DetectTime": "2024-05-21T12:32:13.635968+00:00", "EventTime": "2024-05-21T12:32:13.635985+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co21UTTVbvj2zWi1a"], "accumulated_threat_level": 7.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "388cadd5-6b25-4ed5-8c88-912fafd5655d", "DetectTime": "2024-05-21T12:32:13.641340+00:00", "EventTime": "2024-05-21T12:32:13.641357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.241.253.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkpZC4zRxBIR4Iszh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f511062e-5903-4ec5-b14e-2fa8d68fedef", "DetectTime": "2024-05-21T12:32:13.653519+00:00", "EventTime": "2024-05-21T12:32:13.653538+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYKl94rVXDePYHhD1"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "9c299fc3-36d1-4578-8ef4-885320504f79", "DetectTime": "2024-05-21T12:32:13.666683+00:00", "EventTime": "2024-05-21T12:32:13.666706+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYKl94rVXDePYHhD1"], "accumulated_threat_level": 7.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "e87de6ea-0c7d-4b53-95f8-c339715e00b7", "DetectTime": "2024-05-21T12:32:13.945686+00:00", "EventTime": "2024-05-21T12:32:13.945710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGlqrF4liQzQxWxQZ2"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "0a7140a0-c434-490f-a7b3-d232c42a99d8", "DetectTime": "2024-05-21T12:32:14.210322+00:00", "EventTime": "2024-05-21T12:32:14.210341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0Ifg40ZJRTFyiszg"], "accumulated_threat_level": 8.2, "timewindow": 67} +{"Format": "IDEA0", "ID": "f7612f77-5d82-4834-bbfa-b6ac438bdac1", "DetectTime": "2024-05-21T12:32:14.225139+00:00", "EventTime": "2024-05-21T12:32:14.225162+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiVWZ23qdQjR3eDJg"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "cc9d24a7-6403-41ce-ae3e-0d52d19b5c7e", "DetectTime": "2024-05-21T12:32:14.238169+00:00", "EventTime": "2024-05-21T12:32:14.238188+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiVWZ23qdQjR3eDJg"], "accumulated_threat_level": 8.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "3e1515da-ebb5-4d71-8e76-1d192c00f4d8", "DetectTime": "2024-05-21T12:32:14.251718+00:00", "EventTime": "2024-05-21T12:32:14.251738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwqyo4s82c6107VQf"], "accumulated_threat_level": 9.0, "timewindow": 67} +{"Format": "IDEA0", "ID": "f749f1dc-208b-44f7-b22b-d143ba5d9ec3", "DetectTime": "2024-05-21T12:32:14.294774+00:00", "EventTime": "2024-05-21T12:32:14.294795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKOSv14AJ2bmF0BJ9h"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "dd2f67e0-8aa2-448a-85aa-482bf83d78d0", "DetectTime": "2024-05-21T12:32:14.308854+00:00", "EventTime": "2024-05-21T12:32:14.308877+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKOSv14AJ2bmF0BJ9h"], "accumulated_threat_level": 8.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "92f29213-5911-4d85-868e-a28fef1b6b21", "DetectTime": "2024-05-21T12:32:14.324781+00:00", "EventTime": "2024-05-21T12:32:14.324799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNSHBpn7py0HUl3z6"], "accumulated_threat_level": 9.8, "timewindow": 67} +{"Format": "IDEA0", "ID": "c5d4f567-bb9e-45cc-af9c-ba46fe8e87ff", "DetectTime": "2024-05-21T12:32:14.337538+00:00", "EventTime": "2024-05-21T12:32:14.337559+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrl4B2hnyow99alI4"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "fd40cfe4-410e-4162-b506-e41ce055ed67", "DetectTime": "2024-05-21T12:32:14.352296+00:00", "EventTime": "2024-05-21T12:32:14.352320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrl4B2hnyow99alI4"], "accumulated_threat_level": 9.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "9d345461-2f6a-40d7-af23-dcc1c287f4c4", "DetectTime": "2024-05-21T12:32:14.364677+00:00", "EventTime": "2024-05-21T12:32:14.364695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBy103ymDnvSZ4rFi"], "accumulated_threat_level": 10.600000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "8a278846-d3e6-4e9b-8b9c-982c6d828c3d", "DetectTime": "2024-05-21T12:32:14.375722+00:00", "EventTime": "2024-05-21T12:32:14.375741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMkgK3c9Ueiskagj5"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "d0c4e3b2-0b4c-42a5-ae41-9d4dc0acb9f1", "DetectTime": "2024-05-21T12:32:14.389598+00:00", "EventTime": "2024-05-21T12:32:14.389620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMkgK3c9Ueiskagj5"], "accumulated_threat_level": 9.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "5f1a3139-3567-4b15-8ecb-9875816b888d", "DetectTime": "2024-05-21T12:32:14.402138+00:00", "EventTime": "2024-05-21T12:32:14.402159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGYSNr4MDIUo390Oq3"], "accumulated_threat_level": 11.400000000000002, "timewindow": 67} +{"Format": "IDEA0", "ID": "16c35093-59ee-48b8-bf77-1e8be9020852", "DetectTime": "2024-05-21T12:32:14.417706+00:00", "EventTime": "2024-05-21T12:32:14.417724+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Prfa80xjAVJIgJ8"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "cf155e3e-2243-41c2-b6df-e2963363f39e", "DetectTime": "2024-05-21T12:32:14.430226+00:00", "EventTime": "2024-05-21T12:32:14.430247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Prfa80xjAVJIgJ8"], "accumulated_threat_level": 10.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "49d4bebd-34cd-427e-984b-fb0b19b7f5ee", "DetectTime": "2024-05-21T12:32:14.445986+00:00", "EventTime": "2024-05-21T12:32:14.446008+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.6.55.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6grL32vj5ZR4mTiVf"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "aa7715ae-1d56-41a3-ac80-b638aa2ff683", "DetectTime": "2024-05-21T12:32:14.461383+00:00", "EventTime": "2024-05-21T12:32:14.461409+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6grL32vj5ZR4mTiVf"], "accumulated_threat_level": 10.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "385aa99b-4a10-4e37-bb32-6a1eb21737b6", "DetectTime": "2024-05-21T12:32:14.467121+00:00", "EventTime": "2024-05-21T12:32:14.467142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.47.19.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWS3RzCH7wiqDOCud"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5862fb66-f2c5-49ab-984e-406427551b4f", "DetectTime": "2024-05-21T12:32:14.479945+00:00", "EventTime": "2024-05-21T12:32:14.479966+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTU3943CVlpYi256Z9"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "5116f9e4-3f9e-46b2-a7b7-8e0365dd989f", "DetectTime": "2024-05-21T12:32:14.493548+00:00", "EventTime": "2024-05-21T12:32:14.493577+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTU3943CVlpYi256Z9"], "accumulated_threat_level": 11.2, "timewindow": 21} +{"Format": "IDEA0", "ID": "7c1dff62-5580-4f1c-8bc9-a41bbfffeccf", "DetectTime": "2024-05-21T12:32:14.536217+00:00", "EventTime": "2024-05-21T12:32:14.536234+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45CiA20n6AMH6VM02"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "2893f370-89d2-4622-89db-8b271633073c", "DetectTime": "2024-05-21T12:32:14.548621+00:00", "EventTime": "2024-05-21T12:32:14.548647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45CiA20n6AMH6VM02"], "accumulated_threat_level": 11.7, "timewindow": 21} +{"Format": "IDEA0", "ID": "43fd5a8d-1bcd-45e0-9dde-4ae0de2b0fe1", "DetectTime": "2024-05-21T12:32:14.653955+00:00", "EventTime": "2024-05-21T12:32:14.653976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX59hbuQuTsiDro6"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "32c90a52-dcfc-4b8d-9047-edb590f0c430", "DetectTime": "2024-05-21T12:32:14.668228+00:00", "EventTime": "2024-05-21T12:32:14.668246+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX59hbuQuTsiDro6"], "accumulated_threat_level": 12.2, "timewindow": 21} +{"Format": "Json", "ID": "32c90a52-dcfc-4b8d-9047-edb590f0c430", "DetectTime": "2024-05-21T12:32:14.668228+00:00", "EventTime": "2024-05-21T12:32:14.668246+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "1970-01-01T20:19:22.702605+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:32:15.067147)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "61609d14-200c-47d8-ad85-e7dadb9f042d", "DetectTime": "2024-05-21T12:32:15.079613+00:00", "EventTime": "2024-05-21T12:32:15.079634+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6nF720rDwce4HBbi"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "cfc21ef1-f885-43d8-90d8-45a8bfdeec66", "DetectTime": "2024-05-21T12:32:15.092877+00:00", "EventTime": "2024-05-21T12:32:15.092896+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6nF720rDwce4HBbi"], "accumulated_threat_level": 0.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "1923a514-2997-4423-a3aa-08597174ddab", "DetectTime": "2024-05-21T12:32:15.108803+00:00", "EventTime": "2024-05-21T12:32:15.108828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTGtR1GoVOsPG73Oj"], "accumulated_threat_level": 12.200000000000003, "timewindow": 67} +{"Format": "Json", "ID": "1923a514-2997-4423-a3aa-08597174ddab", "DetectTime": "2024-05-21T12:32:15.108803+00:00", "EventTime": "2024-05-21T12:32:15.108828+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "1970-01-03T18:27:32.260924+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2024/05/21 12:32:15.341787)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 67, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "2acd2702-1910-47ad-a62c-09e23a78cd68", "DetectTime": "2024-05-21T12:32:15.354438+00:00", "EventTime": "2024-05-21T12:32:15.354458+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXuqKd27j1FBioTphf"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "71220903-d367-4f72-a658-3b0c8dd0470a", "DetectTime": "2024-05-21T12:32:15.366474+00:00", "EventTime": "2024-05-21T12:32:15.366493+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXuqKd27j1FBioTphf"], "accumulated_threat_level": 1.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "ade07080-9ba8-4418-9f21-80ba8e52ab20", "DetectTime": "2024-05-21T12:32:15.372116+00:00", "EventTime": "2024-05-21T12:32:15.372134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.213.192.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZxFN1WPNX4PluO9j"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f2a434ec-5c1c-453f-b414-fb9ef8da7546", "DetectTime": "2024-05-21T12:32:15.378393+00:00", "EventTime": "2024-05-21T12:32:15.378428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.62.133.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPdA314HZ3oBnxn009"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2beda4be-3941-42a3-b2c0-6abec55227a0", "DetectTime": "2024-05-21T12:32:15.383769+00:00", "EventTime": "2024-05-21T12:32:15.383789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.101.74.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLI4eo2RPyq2qYpUog"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "bd845d10-27fb-4c26-97ff-7e70372ff399", "DetectTime": "2024-05-21T12:32:15.389300+00:00", "EventTime": "2024-05-21T12:32:15.389323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 207.114.249.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGg31aKcCQMZxZSx4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "aab2b57f-a501-4fe9-a7b0-51527e0a0300", "DetectTime": "2024-05-21T12:32:15.394335+00:00", "EventTime": "2024-05-21T12:32:15.394353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.207.56.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAV3N32xaDQEH3Xqf6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "44c2b1c7-f075-47d9-94b7-b0d9235a24d5", "DetectTime": "2024-05-21T12:32:15.399834+00:00", "EventTime": "2024-05-21T12:32:15.399854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdioMn3LTWZwiZRkFi"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "52e50479-34f0-4e35-8842-e6648555ff03", "DetectTime": "2024-05-21T12:32:15.405403+00:00", "EventTime": "2024-05-21T12:32:15.405428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.92.135.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwL13D4DzOOGKCevCc"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "1d562859-ef05-414c-af72-fd05e0a68026", "DetectTime": "2024-05-21T12:32:15.440451+00:00", "EventTime": "2024-05-21T12:32:15.440469+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crln974vf9E6Lbr2Yb"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "c093cb80-a085-4cec-85d3-cb65c26d159d", "DetectTime": "2024-05-21T12:32:15.452430+00:00", "EventTime": "2024-05-21T12:32:15.452449+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crln974vf9E6Lbr2Yb"], "accumulated_threat_level": 1.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "42177f36-6eb1-4dc0-9a17-b26b45538e26", "DetectTime": "2024-05-21T12:32:15.468967+00:00", "EventTime": "2024-05-21T12:32:15.468985+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9oaj1M9lVxGh5DIl"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "3c2bc3e8-21c1-4d83-b215-f107d51580d0", "DetectTime": "2024-05-21T12:32:15.481466+00:00", "EventTime": "2024-05-21T12:32:15.481485+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9oaj1M9lVxGh5DIl"], "accumulated_threat_level": 2.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "cbc5442c-bf1a-4739-a818-233f7379ed4a", "DetectTime": "2024-05-21T12:32:15.486590+00:00", "EventTime": "2024-05-21T12:32:15.486610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cut5si2joemmSTSzhk"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "6e23dd95-97a4-4966-8bf8-efc3afd560b8", "DetectTime": "2024-05-21T12:32:15.491319+00:00", "EventTime": "2024-05-21T12:32:15.491337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.15.230.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6SXBv11EPIpRmoTsk"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "0d598d80-3d44-41f6-bbd7-95f1e02b5021", "DetectTime": "2024-05-21T12:32:15.495862+00:00", "EventTime": "2024-05-21T12:32:15.495880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.230.228.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMv5Qe4QreiP5bhqRk"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "a8dc92a2-0e85-4db9-808b-a1ff7a8ad46a", "DetectTime": "2024-05-21T12:32:15.508133+00:00", "EventTime": "2024-05-21T12:32:15.508152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGzHD4yM67yWvnRqd"], "accumulated_threat_level": 0.8, "timewindow": 67} +{"Format": "IDEA0", "ID": "7197b99c-d9f9-4780-a958-694f71eeeb8a", "DetectTime": "2024-05-21T12:32:15.513157+00:00", "EventTime": "2024-05-21T12:32:15.513177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsARpn8qetc2uYqrd", "CQLyNB2qqvIngQqThf", "CJ1HTo3ysdieGNMvBc", "Cl2NIn2oaaWFvElzC2"], "accumulated_threat_level": 1.3, "timewindow": 67} +{"Format": "IDEA0", "ID": "d3b5f2fc-5e1c-42cb-9901-6cd0e5e83b2c", "DetectTime": "2024-05-21T12:32:15.518182+00:00", "EventTime": "2024-05-21T12:32:15.518202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.246.2.43 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOPLjirK8R6Kb9H"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "1d683245-261a-4b30-a827-53c4f2b88e7d", "DetectTime": "2024-05-21T12:32:15.523244+00:00", "EventTime": "2024-05-21T12:32:15.523262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.172.252.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXKAOD2LMq5f2rodZ6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "a2c35547-d91c-420e-92c1-931e6728627c", "DetectTime": "2024-05-21T12:32:15.528227+00:00", "EventTime": "2024-05-21T12:32:15.528246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.26.149.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crj1S736UorF0PsaQa"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f274fc3c-4718-47b4-814c-39da84cc874c", "DetectTime": "2024-05-21T12:32:15.547195+00:00", "EventTime": "2024-05-21T12:32:15.547216+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBEPg4lhEQzcq5DAl"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "4d0707e8-23a4-4f27-aa4e-07e8d3bfc18a", "DetectTime": "2024-05-21T12:32:15.559338+00:00", "EventTime": "2024-05-21T12:32:15.559359+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBEPg4lhEQzcq5DAl"], "accumulated_threat_level": 2.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "e2cc2b57-bd8e-4aec-b95a-806ddc9f55c3", "DetectTime": "2024-05-21T12:32:15.571340+00:00", "EventTime": "2024-05-21T12:32:15.571363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2naSQ3hP8rE07rn2"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "841c2941-ccdc-4e64-9795-4d96527db1fe", "DetectTime": "2024-05-21T12:32:15.584768+00:00", "EventTime": "2024-05-21T12:32:15.584790+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2naSQ3hP8rE07rn2"], "accumulated_threat_level": 3.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "79dd4112-fbd8-4782-be61-fa1a459e15a9", "DetectTime": "2024-05-21T12:32:15.590007+00:00", "EventTime": "2024-05-21T12:32:15.590025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.236.182.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C035212WKWDYCzxsi4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2e233b96-f3cd-450f-a71d-07ff007562ea", "DetectTime": "2024-05-21T12:32:15.594855+00:00", "EventTime": "2024-05-21T12:32:15.594873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiKxx34SaNSUFgsPd5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "9863b496-63fa-4683-8dd4-7d70dc0838da", "DetectTime": "2024-05-21T12:32:15.599801+00:00", "EventTime": "2024-05-21T12:32:15.599818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuQnK1kUpI5HYWPme"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "abbf7594-b90e-40f9-bdc7-7248ecc666ab", "DetectTime": "2024-05-21T12:32:15.615136+00:00", "EventTime": "2024-05-21T12:32:15.615154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu5YqX0mWZWbY5Dz6"], "accumulated_threat_level": 2.1, "timewindow": 67} +{"Format": "IDEA0", "ID": "c50d0990-92d1-4d96-8480-1dbe3c44aa37", "DetectTime": "2024-05-21T12:32:15.620093+00:00", "EventTime": "2024-05-21T12:32:15.620114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.231.72.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9XlJ8TJHDTzLYid"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "14d3383c-0d5f-45b5-bdba-6c0322802ef6", "DetectTime": "2024-05-21T12:32:15.624926+00:00", "EventTime": "2024-05-21T12:32:15.624945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJFzO3vlw0QAGN7p1"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "43aee8ef-e6a3-45e8-ae2e-6027960f0cdb", "DetectTime": "2024-05-21T12:32:15.635302+00:00", "EventTime": "2024-05-21T12:32:15.635320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7G2A1hnYVsD8SWr8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 67} +{"Format": "IDEA0", "ID": "2b6b5117-9a28-4c74-86ee-c0e1c7fd684a", "DetectTime": "2024-05-21T12:32:15.640966+00:00", "EventTime": "2024-05-21T12:32:15.640986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.185.247.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcbtewYQERogi5Et4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "c5beea75-04e8-4c79-92c3-030e8fbe46ea", "DetectTime": "2024-05-21T12:32:15.645642+00:00", "EventTime": "2024-05-21T12:32:15.645660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.74.14.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YYey2II6x8hDrpZh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "96c290ab-678b-44aa-ad16-dd36af15d3b4", "DetectTime": "2024-05-21T12:32:15.680549+00:00", "EventTime": "2024-05-21T12:32:15.680569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.154.145.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoeqJ3nl8mnOJ5ka4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "9692eba7-4b63-4976-bf87-b76ed6aa895c", "DetectTime": "2024-05-21T12:32:15.685646+00:00", "EventTime": "2024-05-21T12:32:15.685665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.166.143.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphFbJ3cDky4KQzDzf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2699a5a0-f9ba-445e-858e-826e7c734620", "DetectTime": "2024-05-21T12:32:15.936922+00:00", "EventTime": "2024-05-21T12:32:15.936945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfv9Re2Ly5VNb4ELKk"], "accumulated_threat_level": 3.7, "timewindow": 67} +{"Format": "IDEA0", "ID": "22b1bf8d-907a-440a-8689-654ca17d3bc3", "DetectTime": "2024-05-21T12:32:15.992605+00:00", "EventTime": "2024-05-21T12:32:15.992629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.42.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXe7L2NAeawcGnb6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b22c99d7-f4b4-4709-92f2-55c4ab5199b3", "DetectTime": "2024-05-21T12:32:16.086907+00:00", "EventTime": "2024-05-21T12:32:16.086930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6iP440eYHZo0fHa8"], "accumulated_threat_level": 4.5, "timewindow": 67} +{"Format": "IDEA0", "ID": "4e4b6eeb-a613-40b5-9a52-db53d206e1c6", "DetectTime": "2024-05-21T12:32:16.106828+00:00", "EventTime": "2024-05-21T12:32:16.106848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.191.210"]}], "Attach": [{"Content": "Connection to unknown destination port 9746/UDP destination IP 188.129.191.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUF9w2KPEV58WTGQ5"], "accumulated_threat_level": 5.3, "timewindow": 67} +{"Format": "IDEA0", "ID": "aa0b0316-3282-4b3e-bd12-45d7e64b40a1", "DetectTime": "2024-05-21T12:32:16.142025+00:00", "EventTime": "2024-05-21T12:32:16.142045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.164.178.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCoLE4rqqaaj9TuPa"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "8b3bc749-60d8-42ce-ba0c-78955d657d9b", "DetectTime": "2024-05-21T12:32:16.163765+00:00", "EventTime": "2024-05-21T12:32:16.163785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.30.193.92 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZVChRQ4WQoLhTYf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "3a58ff0b-78b9-439e-bd84-4f67667c8a73", "DetectTime": "2024-05-21T12:32:16.207831+00:00", "EventTime": "2024-05-21T12:32:16.207854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVt0jsMQWE5281o6i"], "accumulated_threat_level": 6.1, "timewindow": 67} +{"Format": "IDEA0", "ID": "106e0f52-792a-431a-afc5-2433f5362f9b", "DetectTime": "2024-05-21T12:32:16.241394+00:00", "EventTime": "2024-05-21T12:32:16.241414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.94.158.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJoSBi3GjfEn6UBBs3"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "951c3356-6554-44bc-bad6-0f23f6ae1168", "DetectTime": "2024-05-21T12:32:16.247831+00:00", "EventTime": "2024-05-21T12:32:16.247852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.6.39.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5oKQt2mEYekm9sRD9"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "76e3ab03-d8b5-497a-ba5c-5be492b09c2c", "DetectTime": "2024-05-21T12:32:16.278271+00:00", "EventTime": "2024-05-21T12:32:16.278293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.191.82.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMV6I1TaBReefn6bk"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "62c2af69-e577-4ec1-b5d5-cc86818789b7", "DetectTime": "2024-05-21T12:32:16.340489+00:00", "EventTime": "2024-05-21T12:32:16.340509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.114.75.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNHvwFttQceZh91e"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "02df32c4-314d-48ed-b805-bb5e60977a17", "DetectTime": "2024-05-21T12:32:16.365222+00:00", "EventTime": "2024-05-21T12:32:16.365246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqjWFu23hdzknZfkka"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 67} +{"Format": "IDEA0", "ID": "e8874b09-ee10-4b37-a2c7-9ad9a50aa319", "DetectTime": "2024-05-21T12:32:16.370655+00:00", "EventTime": "2024-05-21T12:32:16.370678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.64.46.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cknt2T1IDjj7fGMPXi"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f4f4af04-fdd3-470e-8903-10674034a138", "DetectTime": "2024-05-21T12:32:16.387837+00:00", "EventTime": "2024-05-21T12:32:16.387857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.107.16.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSILEj1KjUsp7br1m8"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "788f4b6d-5bf2-47d3-914b-5d0618dbe24c", "DetectTime": "2024-05-21T12:32:16.669927+00:00", "EventTime": "2024-05-21T12:32:16.669946+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzTFv1zF8DMUHZWx1"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "bccbe953-253f-4ac0-b003-707be6312e2a", "DetectTime": "2024-05-21T12:32:16.681407+00:00", "EventTime": "2024-05-21T12:32:16.681425+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzTFv1zF8DMUHZWx1"], "accumulated_threat_level": 3.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "e8100ddb-3718-4d9c-af81-fe14d133112a", "DetectTime": "2024-05-21T12:32:16.701144+00:00", "EventTime": "2024-05-21T12:32:16.701165+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOhhR24C920nBBzH6"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "3917d1f3-1fe5-41bf-8b45-3143f08d5320", "DetectTime": "2024-05-21T12:32:16.713649+00:00", "EventTime": "2024-05-21T12:32:16.713667+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOhhR24C920nBBzH6"], "accumulated_threat_level": 4.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "d267f104-0151-4270-bfaf-8277d2cdd17d", "DetectTime": "2024-05-21T12:32:16.718764+00:00", "EventTime": "2024-05-21T12:32:16.718783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.74.131.196 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOuK3p5OWO9rgpc9"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "0163d121-c7b0-44cd-9e4a-b009c6295fa2", "DetectTime": "2024-05-21T12:32:16.729559+00:00", "EventTime": "2024-05-21T12:32:16.729576+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64VdQ1BLC4EfS4qFe"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "d9173c02-600c-4be8-95c9-c0549d1a31e5", "DetectTime": "2024-05-21T12:32:16.737775+00:00", "EventTime": "2024-05-21T12:32:16.737793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.121.9.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQV01S1WE6qDGPj2th"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2961ff59-5fdf-47cc-b773-73e63f5f8f87", "DetectTime": "2024-05-21T12:32:16.743496+00:00", "EventTime": "2024-05-21T12:32:16.743519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.131.201.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3Fqm4AlbF63A9abh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "daa7e99b-a4f0-454a-80d0-35a6f1216576", "DetectTime": "2024-05-21T12:32:16.755175+00:00", "EventTime": "2024-05-21T12:32:16.755193+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64VdQ1BLC4EfS4qFe"], "accumulated_threat_level": 4.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "d4bbce71-d431-4627-b98b-2780aca6272d", "DetectTime": "2024-05-21T12:32:16.781153+00:00", "EventTime": "2024-05-21T12:32:16.781175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9K4LP47V9yRdsTda"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2e247231-5ffc-47c6-b0e3-6bfe752bb681", "DetectTime": "2024-05-21T12:32:16.810854+00:00", "EventTime": "2024-05-21T12:32:16.810873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.48.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWmyT34TWmJtcExka"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "95b7d251-8a68-4b6a-aa25-ba69a3a782d8", "DetectTime": "2024-05-21T12:32:16.820030+00:00", "EventTime": "2024-05-21T12:32:16.820053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.80.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5M30kN9VvfeJYUr9"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "466e16c1-93a1-4770-9742-9eaa3e396417", "DetectTime": "2024-05-21T12:32:16.863272+00:00", "EventTime": "2024-05-21T12:32:16.863293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdigP1HIk8OOvsS1"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "a72c0498-2113-4b33-b4f8-0070c4c44c11", "DetectTime": "2024-05-21T12:32:16.877169+00:00", "EventTime": "2024-05-21T12:32:16.877189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crha7ZphAe4DZ5qdg"], "accumulated_threat_level": 7.699999999999999, "timewindow": 67} +{"Format": "IDEA0", "ID": "f2c0a282-26d0-4629-a9b3-d42b072ae775", "DetectTime": "2024-05-21T12:32:16.964145+00:00", "EventTime": "2024-05-21T12:32:16.964166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.163.69.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdhpG46Q0gZtgza3k"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "141da8ce-a512-41bc-a5a8-befe1d8657be", "DetectTime": "2024-05-21T12:32:16.969436+00:00", "EventTime": "2024-05-21T12:32:16.969454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJU5k25JWUSVndSh1"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "353797b1-04f8-4230-a3e5-4b31526a03c8", "DetectTime": "2024-05-21T12:32:16.980433+00:00", "EventTime": "2024-05-21T12:32:16.980460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.142.200.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C30qJl2RZvsnnmago2"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "37ca774a-ff4c-4b7e-b52e-4d9a3d504c9e", "DetectTime": "2024-05-21T12:32:17.063004+00:00", "EventTime": "2024-05-21T12:32:17.063023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDSkn27ETrcJoDjmf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "197c35d4-75ef-4089-8081-b38d0df8608d", "DetectTime": "2024-05-21T12:32:17.091858+00:00", "EventTime": "2024-05-21T12:32:17.091881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpgma4XrdsgSFFZbb"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "73d1debc-f402-4ea0-81d9-86a3c7e64613", "DetectTime": "2024-05-21T12:32:17.099777+00:00", "EventTime": "2024-05-21T12:32:17.099797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.172.120.192 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6ewA1rZxmOiOLJFl"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f51d218e-5227-456c-be2e-13eef77e81f4", "DetectTime": "2024-05-21T12:32:17.105672+00:00", "EventTime": "2024-05-21T12:32:17.105691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.85.7.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwmLr4RzZvrYJDeH4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "24132ae7-1c3d-42a4-8e64-8ede0977a225", "DetectTime": "2024-05-21T12:32:17.120995+00:00", "EventTime": "2024-05-21T12:32:17.121015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbgxaL3U76vhGTW1Tk"], "accumulated_threat_level": 8.5, "timewindow": 67} +{"Format": "IDEA0", "ID": "6dec7a64-a67f-4d5e-bdba-65d3680a52a6", "DetectTime": "2024-05-21T12:32:17.442019+00:00", "EventTime": "2024-05-21T12:32:17.442038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.12.109.89 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxAW9I1CfJ4b9wISug"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5267b132-e2c1-4704-90b7-258af49af8cd", "DetectTime": "2024-05-21T12:32:17.461924+00:00", "EventTime": "2024-05-21T12:32:17.461949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMufl2tT6sNU4LBq5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5777b484-24cc-490f-9842-254b117de68e", "DetectTime": "2024-05-21T12:32:17.472215+00:00", "EventTime": "2024-05-21T12:32:17.472245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVUQP2QDx3KrNxt7k"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "60d9e8a9-1878-4bd9-8906-8bfd7a867a13", "DetectTime": "2024-05-21T12:32:17.515269+00:00", "EventTime": "2024-05-21T12:32:17.515290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNYQP1QzsU6YY3a7k"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "15538218-1d87-428e-8f2e-94511f089044", "DetectTime": "2024-05-21T12:32:17.546551+00:00", "EventTime": "2024-05-21T12:32:17.546574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.11.249.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CzA21tcWHE6xsPwk"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "fd8fe38e-49b2-4ca6-8f3f-364c58e805c6", "DetectTime": "2024-05-21T12:32:17.577257+00:00", "EventTime": "2024-05-21T12:32:17.577277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.123.48.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZVUkrlDDGZez5O2"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "cd72c7b7-bf50-4456-97ce-e3f57a10ea7e", "DetectTime": "2024-05-21T12:32:17.589385+00:00", "EventTime": "2024-05-21T12:32:17.589404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.42.42"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.42.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62iGY3isNNiXbErKe"], "accumulated_threat_level": 9.3, "timewindow": 67} +{"Format": "IDEA0", "ID": "b569f7ca-ccfd-4ab0-8f20-541747f52c52", "DetectTime": "2024-05-21T12:32:17.661371+00:00", "EventTime": "2024-05-21T12:32:17.661389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXhYXsSHOdRXfarb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "87f48277-1a0f-441f-99c2-2121cb1bb596", "DetectTime": "2024-05-21T12:32:17.697494+00:00", "EventTime": "2024-05-21T12:32:17.697516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.80.149"]}], "Attach": [{"Content": "Connection to unknown destination port 16788/UDP destination IP 188.169.80.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWXSP3rxmkFvDTmF3"], "accumulated_threat_level": 10.900000000000002, "timewindow": 67} +{"Format": "IDEA0", "ID": "c4f2dd6b-2c02-411b-8b71-4b886343c476", "DetectTime": "2024-05-21T12:32:17.722447+00:00", "EventTime": "2024-05-21T12:32:17.722467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKa5Iq3eLcCL90Ks9k"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "91ef9e59-0416-4dfa-b8a2-f055dcb04602", "DetectTime": "2024-05-21T12:32:17.754077+00:00", "EventTime": "2024-05-21T12:32:17.754098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.62.235.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnF5804yUsoXVw63s4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "dd59ed7d-7198-4d66-a448-ebade4cda246", "DetectTime": "2024-05-21T12:32:17.796794+00:00", "EventTime": "2024-05-21T12:32:17.796817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcmIx2SLZJwaAHoU8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 67} +{"Format": "IDEA0", "ID": "aa49c897-7500-4ccf-b637-4e64edbda4f9", "DetectTime": "2024-05-21T12:32:17.826973+00:00", "EventTime": "2024-05-21T12:32:17.826994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.180.153.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwOyUg3m4oWcts1AO8"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "cb92188f-c49b-4faf-a933-93de52f39e64", "DetectTime": "2024-05-21T12:32:18.099687+00:00", "EventTime": "2024-05-21T12:32:18.099706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLqJa2V9VDh8puyd5"], "accumulated_threat_level": 12.500000000000004, "timewindow": 67} +{"Format": "Json", "ID": "cb92188f-c49b-4faf-a933-93de52f39e64", "DetectTime": "2024-05-21T12:32:18.099687+00:00", "EventTime": "2024-05-21T12:32:18.099706+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "1970-01-03T18:28:24.995565+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 67. (real time 2024/05/21 12:32:18.301806)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 67, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "71d0cc4a-3f3e-405a-800d-76fcf698637f", "DetectTime": "2024-05-21T12:32:18.306013+00:00", "EventTime": "2024-05-21T12:32:18.306031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQtrm138adm7fvCyPd"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "efc2f516-4128-45b8-af28-6078b7b4255e", "DetectTime": "2024-05-21T12:32:18.310701+00:00", "EventTime": "2024-05-21T12:32:18.310720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.186.151.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsgKPC4SmvMDYBWmU2"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "9404eb3c-27f7-407d-bf0e-f39d553c2b1f", "DetectTime": "2024-05-21T12:32:18.315825+00:00", "EventTime": "2024-05-21T12:32:18.315846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.31.161.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9qAX1gBX4I63GF76"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "aa176619-d42a-4813-b029-b215aa622579", "DetectTime": "2024-05-21T12:32:18.320918+00:00", "EventTime": "2024-05-21T12:32:18.320939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.55.57.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1Zfv2nMLuzyoQiHg"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "4ea86236-e4bd-4156-9e02-43c603bff9e9", "DetectTime": "2024-05-21T12:32:18.338054+00:00", "EventTime": "2024-05-21T12:32:18.338073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyn88Nn6uCiPqkys1"], "accumulated_threat_level": 0.8, "timewindow": 67} +{"Format": "IDEA0", "ID": "16901bcc-80ee-45d9-85b4-f1b5d2dada3c", "DetectTime": "2024-05-21T12:32:18.342949+00:00", "EventTime": "2024-05-21T12:32:18.342967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8aSHUFfFIKWnCb74"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "07b32d97-26db-480b-9cf7-b189396d3538", "DetectTime": "2024-05-21T12:32:18.347617+00:00", "EventTime": "2024-05-21T12:32:18.347635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.1.55.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YRvP3d7gldOnFxR5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b1f37993-e351-40cb-a34e-a00b1ca7a344", "DetectTime": "2024-05-21T12:32:18.359369+00:00", "EventTime": "2024-05-21T12:32:18.359387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoEZ1b42dvG6aXQ6F7"], "accumulated_threat_level": 1.6, "timewindow": 67} +{"Format": "IDEA0", "ID": "e90af176-6600-43bb-86e4-f0c4646c0372", "DetectTime": "2024-05-21T12:32:18.364214+00:00", "EventTime": "2024-05-21T12:32:18.364233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.173.32 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJaoPU35wUdjPSPvc9"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "4f08f225-0bfe-4e5a-a1b3-4f5b6ab3fe18", "DetectTime": "2024-05-21T12:32:18.374351+00:00", "EventTime": "2024-05-21T12:32:18.374368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCYLCE4MYCmg0emBS5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 67} +{"Format": "IDEA0", "ID": "3c4c13d0-52e5-49b3-b539-d4343a4aaec6", "DetectTime": "2024-05-21T12:32:18.395768+00:00", "EventTime": "2024-05-21T12:32:18.395790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.114.0.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY2lql1oZ6a5VOrA64"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "cdbd02db-36c7-4f84-bdee-675cde9c7410", "DetectTime": "2024-05-21T12:32:18.462841+00:00", "EventTime": "2024-05-21T12:32:18.462863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5S3SAXgoqf9g5R5"], "accumulated_threat_level": 3.2, "timewindow": 67} +{"Format": "IDEA0", "ID": "1baf5b86-4850-43d5-9418-064068e30e79", "DetectTime": "2024-05-21T12:32:18.738661+00:00", "EventTime": "2024-05-21T12:32:18.738681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTY0w44YY3Sml0ndOk"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b59195c4-5ad6-4cd6-bbb6-f6d306046ba4", "DetectTime": "2024-05-21T12:32:18.745387+00:00", "EventTime": "2024-05-21T12:32:18.745407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.150.226.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxB2i20vrPhTbo87d"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "08c3dd4d-ea56-433f-9c12-9228f7a3a35f", "DetectTime": "2024-05-21T12:32:18.750299+00:00", "EventTime": "2024-05-21T12:32:18.750320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.182.152.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNf8C236f6W4jw9di"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "596c7ce1-f31f-4628-aa08-2f899afebdb7", "DetectTime": "2024-05-21T12:32:18.755345+00:00", "EventTime": "2024-05-21T12:32:18.755364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNfw41B0BrfDITKhf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "27c618af-92d4-486e-bae4-90d71f8435bb", "DetectTime": "2024-05-21T12:32:18.760083+00:00", "EventTime": "2024-05-21T12:32:18.760101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Dfw310flYyZYScWg"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "9ea51ece-c478-4ae7-bab9-e4542b30781a", "DetectTime": "2024-05-21T12:32:18.877922+00:00", "EventTime": "2024-05-21T12:32:18.877942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.11.249.52"]}], "Attach": [{"Content": "Connection to unknown destination port 21538/UDP destination IP 31.11.249.52. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFle02wk8i2x2Uy4l"], "accumulated_threat_level": 4.0, "timewindow": 67} +{"Format": "IDEA0", "ID": "8f19e372-3d0c-4e07-a6ec-f2803a8cad16", "DetectTime": "2024-05-21T12:32:18.900205+00:00", "EventTime": "2024-05-21T12:32:18.900230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 220.246.41.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnUeC3uANsSRZbXNf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2fdeaaa9-8700-459b-aa5a-bbb845f6f148", "DetectTime": "2024-05-21T12:32:18.924359+00:00", "EventTime": "2024-05-21T12:32:18.924377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.67.44.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGzXLs2hXVwKr4p9Ze"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5a180937-7a26-418a-bae6-ac8518a94603", "DetectTime": "2024-05-21T12:32:18.952764+00:00", "EventTime": "2024-05-21T12:32:18.952783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.234.138.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAckuv2EoXgdlqbNj6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "092b7a8c-1c25-421e-99f8-f1a5ba987a26", "DetectTime": "2024-05-21T12:32:18.985769+00:00", "EventTime": "2024-05-21T12:32:18.985788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsiqLe41aNfFnPJQca"], "accumulated_threat_level": 4.8, "timewindow": 67} +{"Format": "IDEA0", "ID": "9541fa9a-01f1-42ca-9a6d-abd436528b93", "DetectTime": "2024-05-21T12:32:19.021792+00:00", "EventTime": "2024-05-21T12:32:19.021816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHtD6hGQ4Xy5bA9n6"], "accumulated_threat_level": 5.6, "timewindow": 67} +{"Format": "IDEA0", "ID": "a0705f29-42ae-43ef-9ed9-b94f66481b57", "DetectTime": "2024-05-21T12:32:19.084576+00:00", "EventTime": "2024-05-21T12:32:19.084599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClSRex2ogtMpNRJbw7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 67} +{"Format": "IDEA0", "ID": "da2c2527-ce1e-45f2-9a58-6140a45062d1", "DetectTime": "2024-05-21T12:32:19.101549+00:00", "EventTime": "2024-05-21T12:32:19.101571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtndZC40OJ1QsKv6j8", "ChFvo84uJxmv37Umod", "CtOd2c3uzR760TmXn6", "Coi9rw2wcVsxjtB6mk"], "accumulated_threat_level": 0.5, "timewindow": 68} +{"Format": "IDEA0", "ID": "1fd4c02e-e336-4711-8b2c-59bc6b0a2a2f", "DetectTime": "2024-05-21T12:32:19.340222+00:00", "EventTime": "2024-05-21T12:32:19.340241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.77.39.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhSxi2VU1T5rOpPHb"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "52e11a1f-5247-4430-aae3-eed4e4af8511", "DetectTime": "2024-05-21T12:32:19.370268+00:00", "EventTime": "2024-05-21T12:32:19.370298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNANt2xkStihYUO13"], "accumulated_threat_level": 7.199999999999999, "timewindow": 67} +{"Format": "IDEA0", "ID": "ff5893a3-1074-4419-8a39-8e4d5bc95c63", "DetectTime": "2024-05-21T12:32:19.404440+00:00", "EventTime": "2024-05-21T12:32:19.404462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mdKf1U5kGx4xBcf6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 67} +{"Format": "IDEA0", "ID": "29846747-41a8-4e51-807f-153fd53fff89", "DetectTime": "2024-05-21T12:32:19.440684+00:00", "EventTime": "2024-05-21T12:32:19.440704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49izJ7WFe89Bu2hf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 67} +{"Format": "IDEA0", "ID": "73a2e3f4-794a-4e8a-bedf-70eaef9995a9", "DetectTime": "2024-05-21T12:32:19.478746+00:00", "EventTime": "2024-05-21T12:32:19.478766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5yMdy1jQhzUxzrTQa"], "accumulated_threat_level": 9.6, "timewindow": 67} +{"Format": "IDEA0", "ID": "d2cf2b68-8483-468c-9ec6-01f9fd07c6d5", "DetectTime": "2024-05-21T12:32:19.507919+00:00", "EventTime": "2024-05-21T12:32:19.507940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaerCq3BXFl5uAvfe7"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "818621ee-aac2-4628-9276-e9b441dc6cd0", "DetectTime": "2024-05-21T12:32:19.536808+00:00", "EventTime": "2024-05-21T12:32:19.536826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CteveD4rJuqvu0nbGk"], "accumulated_threat_level": 10.4, "timewindow": 67} +{"Format": "IDEA0", "ID": "46a6b9d4-4189-43ae-8b7e-c5bcd7710e0f", "DetectTime": "2024-05-21T12:32:19.560251+00:00", "EventTime": "2024-05-21T12:32:19.560272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.235.176.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0h854QlSb9IkC5G4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5d2d3257-bbdc-4a1e-ab44-77b3a5005521", "DetectTime": "2024-05-21T12:32:19.729052+00:00", "EventTime": "2024-05-21T12:32:19.729072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQIfHPGX1YGyoocq7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "1e9e891b-8ee2-4f8e-a3b5-7ce0a18e17f4", "DetectTime": "2024-05-21T12:32:19.957415+00:00", "EventTime": "2024-05-21T12:32:19.957435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhH9I3Rb8foNWZcnc"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "425eb322-5a5c-4301-9ec5-81160341f05b", "DetectTime": "2024-05-21T12:32:20.149162+00:00", "EventTime": "2024-05-21T12:32:20.149180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtISYlo13kHm2ocf"], "accumulated_threat_level": 1.3, "timewindow": 68} +{"Format": "IDEA0", "ID": "23d54445-dd9b-4c3d-aa29-fbe1fa570d34", "DetectTime": "2024-05-21T12:32:20.195350+00:00", "EventTime": "2024-05-21T12:32:20.195368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.166.143.39"]}], "Attach": [{"Content": "Connection to unknown destination port 28610/UDP destination IP 78.166.143.39. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIDkoQ1eDJLxzrQf9a"], "accumulated_threat_level": 2.1, "timewindow": 68} +{"Format": "IDEA0", "ID": "f9e004bb-a680-4dbb-bd77-0325e9adaf47", "DetectTime": "2024-05-21T12:32:20.226241+00:00", "EventTime": "2024-05-21T12:32:20.226263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLT2yv9Ty4LNfpNC7"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "3ee0310f-6085-4e23-8d99-a859eca8f5b9", "DetectTime": "2024-05-21T12:32:20.267948+00:00", "EventTime": "2024-05-21T12:32:20.267968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhBkdDrglP0Mr8b3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 68} +{"Format": "IDEA0", "ID": "6156a661-dbeb-488b-ab82-755fafd16d44", "DetectTime": "2024-05-21T12:32:20.521994+00:00", "EventTime": "2024-05-21T12:32:20.522014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxqcPdYAScGLDJnf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "04ab7275-a156-48bc-bd4e-f8002a954e7a", "DetectTime": "2024-05-21T12:32:20.567456+00:00", "EventTime": "2024-05-21T12:32:20.567478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4QAiz42GYk4bOKiy4"], "accumulated_threat_level": 3.7, "timewindow": 68} +{"Format": "IDEA0", "ID": "1b71ef58-8fab-4513-9de1-1519309b5eeb", "DetectTime": "2024-05-21T12:32:20.595222+00:00", "EventTime": "2024-05-21T12:32:20.595244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwKxQ21IFvIDWIYqy4"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "e134c940-b722-41ac-b6ef-7a28f9bd6970", "DetectTime": "2024-05-21T12:32:20.625580+00:00", "EventTime": "2024-05-21T12:32:20.625598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOnPiJ5LRPxOdVne"], "accumulated_threat_level": 4.5, "timewindow": 68} +{"Format": "IDEA0", "ID": "616a49ae-ca8e-46e2-a9a8-1a2222a16479", "DetectTime": "2024-05-21T12:32:20.689185+00:00", "EventTime": "2024-05-21T12:32:20.689206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLaZbxngiYcilUk3d"], "accumulated_threat_level": 5.3, "timewindow": 68} +{"Format": "IDEA0", "ID": "7d5643c2-e068-4381-9202-e5886cbef7b8", "DetectTime": "2024-05-21T12:32:20.728240+00:00", "EventTime": "2024-05-21T12:32:20.728261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwWL51NiFnM8fW6Z6"], "accumulated_threat_level": 6.1, "timewindow": 68} +{"Format": "IDEA0", "ID": "4235957d-2af0-4c80-b6b0-f76eced32eb1", "DetectTime": "2024-05-21T12:32:20.763619+00:00", "EventTime": "2024-05-21T12:32:20.763641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBwuR2r6QSxzGslI1"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 68} +{"Format": "IDEA0", "ID": "00836e5f-a0c8-4cb9-a8c8-a425ac07b910", "DetectTime": "2024-05-21T12:32:20.811302+00:00", "EventTime": "2024-05-21T12:32:20.811321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3u2BhbIZsfbcug6f"], "accumulated_threat_level": 7.699999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "2a30a020-d32a-4717-a81c-b5ccbaf1328b", "DetectTime": "2024-05-21T12:32:20.846616+00:00", "EventTime": "2024-05-21T12:32:20.846636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYbMOvxawL2FjyKh"], "accumulated_threat_level": 8.5, "timewindow": 68} +{"Format": "IDEA0", "ID": "0b50521a-0a3d-4e2d-b0b1-a5d8e903f2f2", "DetectTime": "2024-05-21T12:32:20.873663+00:00", "EventTime": "2024-05-21T12:32:20.873684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0SFOnnNic47cli6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "d98f5d8d-7b4c-4c33-8bf0-a6a19270cbb7", "DetectTime": "2024-05-21T12:32:20.908684+00:00", "EventTime": "2024-05-21T12:32:20.908703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COdBKXiX0mqWxjFlb"], "accumulated_threat_level": 9.3, "timewindow": 68} +{"Format": "IDEA0", "ID": "a1158c4b-63ab-4107-b247-2915bdd7448a", "DetectTime": "2024-05-21T12:32:20.913678+00:00", "EventTime": "2024-05-21T12:32:20.913696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkAvn4dCiwElhumgb"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "cd272be8-0aeb-4600-85ba-370accdceb41", "DetectTime": "2024-05-21T12:32:20.964756+00:00", "EventTime": "2024-05-21T12:32:20.964778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uJzw2SVZcr3ma9sd"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "9a75c8e9-d362-44c9-9d53-e62554a47c79", "DetectTime": "2024-05-21T12:32:20.993099+00:00", "EventTime": "2024-05-21T12:32:20.993122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhoz123lBD5bhQmE5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "6ee28f58-7814-42ff-a2a5-70212189b60f", "DetectTime": "2024-05-21T12:32:21.005309+00:00", "EventTime": "2024-05-21T12:32:21.005339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAERe610vDQVRUBjA1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 68} +{"Format": "IDEA0", "ID": "5414881a-816a-482e-8768-cf9f331abfae", "DetectTime": "2024-05-21T12:32:21.252558+00:00", "EventTime": "2024-05-21T12:32:21.252579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfHnB15FtvXRUzOwh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "3bcb0c5f-1aaf-4519-92aa-4e96942424be", "DetectTime": "2024-05-21T12:32:21.324576+00:00", "EventTime": "2024-05-21T12:32:21.324597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Oclj15bVy3kMKAk6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5ebe6832-92ee-4a28-ba1b-a3cc609a6830", "DetectTime": "2024-05-21T12:32:21.333962+00:00", "EventTime": "2024-05-21T12:32:21.333981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtZ2q3Q2kFEud098a"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "18393a02-e81c-4b7b-8cc2-ca14cd4d3bf0", "DetectTime": "2024-05-21T12:32:21.357563+00:00", "EventTime": "2024-05-21T12:32:21.357585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs5WXO3gj5XQPaqNs6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 68} +{"Format": "IDEA0", "ID": "eb317174-697b-44d6-a80a-387960535ecc", "DetectTime": "2024-05-21T12:32:21.367751+00:00", "EventTime": "2024-05-21T12:32:21.367772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbg68j45Vr08e4dYK1"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "aee97765-1d52-4aef-bc70-b1c961a1b5b3", "DetectTime": "2024-05-21T12:32:21.373194+00:00", "EventTime": "2024-05-21T12:32:21.373215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhQdb1VooQTudxLhe"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "22b7b203-db45-4e1d-ae65-0e97ce7e3922", "DetectTime": "2024-05-21T12:32:21.377946+00:00", "EventTime": "2024-05-21T12:32:21.377965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2gUm4gIW5eaog6j"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "99df3cda-acf4-4031-8e14-dc3734c1d605", "DetectTime": "2024-05-21T12:32:21.469900+00:00", "EventTime": "2024-05-21T12:32:21.469921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDz1U2wcr7UZhyM5f"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f32197a4-6f00-40a8-b1ee-d04a92ce0383", "DetectTime": "2024-05-21T12:32:21.535385+00:00", "EventTime": "2024-05-21T12:32:21.535406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyffkd4rBbfzdwwKB6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "7881fd8c-a48f-47f9-bf43-c8815282ccd5", "DetectTime": "2024-05-21T12:32:21.540589+00:00", "EventTime": "2024-05-21T12:32:21.540608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGl8K13yhECyIbFYsj"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f8e83842-cbef-4771-b80c-d414a3d8544f", "DetectTime": "2024-05-21T12:32:21.583515+00:00", "EventTime": "2024-05-21T12:32:21.583540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbo8GikbNSDhgoam"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "71fa3f22-d0df-4c1e-9417-591ce685d486", "DetectTime": "2024-05-21T12:32:21.870160+00:00", "EventTime": "2024-05-21T12:32:21.870187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCq7lW2vzRMxhUqpR3"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b75357cd-8f40-41f9-9423-43e70b210df3", "DetectTime": "2024-05-21T12:32:21.875519+00:00", "EventTime": "2024-05-21T12:32:21.875538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy9B3jfFs0vD6p6U3"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "d769f021-7560-44da-901f-48e2bcbd5f59", "DetectTime": "2024-05-21T12:32:21.880652+00:00", "EventTime": "2024-05-21T12:32:21.880669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.96.182.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFS7q4zbklQNABRC"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "68088440-d518-441b-ba4f-c88d245838da", "DetectTime": "2024-05-21T12:32:21.885149+00:00", "EventTime": "2024-05-21T12:32:21.885166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEltgf17Me2ROoDxTd"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "7101289d-340f-4a4f-a6e7-ca72791525f1", "DetectTime": "2024-05-21T12:32:21.975082+00:00", "EventTime": "2024-05-21T12:32:21.975103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqlC6ehz3soCuiMj"], "accumulated_threat_level": 11.700000000000003, "timewindow": 68} +{"Format": "IDEA0", "ID": "fa992ff0-25de-4403-9073-213567fa21f5", "DetectTime": "2024-05-21T12:32:21.999884+00:00", "EventTime": "2024-05-21T12:32:21.999918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMwUiZstumnEvwpvc", "CrUmWQzVXJL92rT98", "C0wIZE1dVqElynpTdg", "CI46peThxoI3uP4Bg"], "accumulated_threat_level": 12.200000000000003, "timewindow": 68} +{"Format": "Json", "ID": "fa992ff0-25de-4403-9073-213567fa21f5", "DetectTime": "2024-05-21T12:32:21.999884+00:00", "EventTime": "2024-05-21T12:32:21.999918+00:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "1970-01-03T19:01:45.773976+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2024/05/21 12:32:22.247209)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 68, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "2ebbf29a-8779-420a-8cfd-7fbe67c41306", "DetectTime": "2024-05-21T12:32:22.251806+00:00", "EventTime": "2024-05-21T12:32:22.251827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPweaC4hpAq8SGBPY7"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2affc9c5-089f-4bf8-874c-96db412ae243", "DetectTime": "2024-05-21T12:32:22.273205+00:00", "EventTime": "2024-05-21T12:32:22.273226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxFtMc2rbPe3Meczmg"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "284b9388-5b50-4fcd-86c7-7976f221b0a3", "DetectTime": "2024-05-21T12:32:22.278177+00:00", "EventTime": "2024-05-21T12:32:22.278195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSRC31gh38WFr3bG7"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "1d503d9f-5283-4563-ab0f-74a0a51fdb5b", "DetectTime": "2024-05-21T12:32:22.283287+00:00", "EventTime": "2024-05-21T12:32:22.283307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTA4ao3ivZY75T9ZZf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "5a1992d9-0903-4450-b945-052f6a7f63ba", "DetectTime": "2024-05-21T12:32:22.293501+00:00", "EventTime": "2024-05-21T12:32:22.293519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerGxrzWKCEN6Qsd6"], "accumulated_threat_level": 1.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "6eb9003d-da61-42b7-9ecd-d5efc19e0305", "DetectTime": "2024-05-21T12:32:22.303764+00:00", "EventTime": "2024-05-21T12:32:22.303781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK0AwQR5rNKYrF0Ji"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 68} +{"Format": "IDEA0", "ID": "a1edd126-5a07-406d-81de-f49312f08e15", "DetectTime": "2024-05-21T12:32:22.319303+00:00", "EventTime": "2024-05-21T12:32:22.319323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJewofJjqWkXgG38"], "accumulated_threat_level": 3.2, "timewindow": 68} +{"Format": "IDEA0", "ID": "d9a92ba5-d635-46e7-865e-578a62ce3f92", "DetectTime": "2024-05-21T12:32:22.361850+00:00", "EventTime": "2024-05-21T12:32:22.361870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LLNDoXH3okc2HLh"], "accumulated_threat_level": 4.0, "timewindow": 68} +{"Format": "IDEA0", "ID": "68c4fe7d-f7e4-425b-ae94-c583c2630ffa", "DetectTime": "2024-05-21T12:32:22.633802+00:00", "EventTime": "2024-05-21T12:32:22.633823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOwjx3WnY3D0erxEj"], "accumulated_threat_level": 4.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "d46d3250-8984-473d-a3b2-17ea7f2f8fa9", "DetectTime": "2024-05-21T12:32:22.683591+00:00", "EventTime": "2024-05-21T12:32:22.683609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbFw5u1t0Yed5a5OVl"], "accumulated_threat_level": 5.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "112b4b55-cd62-4b85-a2fb-ff107a7cab53", "DetectTime": "2024-05-21T12:32:22.721114+00:00", "EventTime": "2024-05-21T12:32:22.721137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5AYR1Z3nWlojkjh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 68} +{"Format": "IDEA0", "ID": "e3227466-684c-4b03-994c-1cdec2af0847", "DetectTime": "2024-05-21T12:32:22.770048+00:00", "EventTime": "2024-05-21T12:32:22.770067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7Czm1Pj0iH7u2iah"], "accumulated_threat_level": 7.199999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "0e0d03de-ffcd-448c-994c-09ef4b9c54de", "DetectTime": "2024-05-21T12:32:22.808956+00:00", "EventTime": "2024-05-21T12:32:22.808974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiEb63T7qidHPXYll"], "accumulated_threat_level": 7.999999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "ea3d49fb-2c3b-4d28-b9b6-aa9dc0b4c21f", "DetectTime": "2024-05-21T12:32:22.890886+00:00", "EventTime": "2024-05-21T12:32:22.890908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBRthB2aP1HjOWimHb"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "a05bc1a3-74e7-48c3-ad27-03db60459040", "DetectTime": "2024-05-21T12:32:22.923766+00:00", "EventTime": "2024-05-21T12:32:22.923784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgHP7GuXQSu8Pu5f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "9654ec95-d1bf-4e8b-8158-252dd7ceb2a5", "DetectTime": "2024-05-21T12:32:22.995634+00:00", "EventTime": "2024-05-21T12:32:22.995652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpiecSWNWyardzDh"], "accumulated_threat_level": 9.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "02e42e74-0e99-4cfc-9bc2-60b5cfba95a7", "DetectTime": "2024-05-21T12:32:23.026739+00:00", "EventTime": "2024-05-21T12:32:23.026759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqyBAv2tikaXA5kUT6"], "accumulated_threat_level": 10.4, "timewindow": 68} +{"Format": "IDEA0", "ID": "491a4636-1169-4594-9d2f-65bb3db5b44e", "DetectTime": "2024-05-21T12:32:23.075604+00:00", "EventTime": "2024-05-21T12:32:23.075623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuYo8B4OQBHt7SdGlb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 68} +{"Format": "IDEA0", "ID": "2d93a13d-32e2-45cd-ba47-9d3e1657bda7", "DetectTime": "2024-05-21T12:32:23.123259+00:00", "EventTime": "2024-05-21T12:32:23.123278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxPBR3lGsQrFnCP6g"], "accumulated_threat_level": 12.000000000000002, "timewindow": 68} +{"Format": "Json", "ID": "2d93a13d-32e2-45cd-ba47-9d3e1657bda7", "DetectTime": "2024-05-21T12:32:23.123259+00:00", "EventTime": "2024-05-21T12:32:23.123278+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "1970-01-03T19:01:29.663873+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2024/05/21 12:32:23.281749)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 68, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4fbb0d3f-7811-4c80-a0dc-569b03200d04", "DetectTime": "2024-05-21T12:32:23.292592+00:00", "EventTime": "2024-05-21T12:32:23.292611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQP3lf1yddnQ7voTZj"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "e7716ab0-32d5-42c7-9fb5-ea1186c4eb42", "DetectTime": "2024-05-21T12:32:23.342494+00:00", "EventTime": "2024-05-21T12:32:23.342517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYxvJ1vqBd15g5ur5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "e26e579c-260c-4fec-ac26-9b95c5c7bd60", "DetectTime": "2024-05-21T12:32:23.380783+00:00", "EventTime": "2024-05-21T12:32:23.380803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.166.143.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVmeru3TLjlpOFEDZ3"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "11ad35ca-d752-4298-b955-e20f549a1c1f", "DetectTime": "2024-05-21T12:32:23.385777+00:00", "EventTime": "2024-05-21T12:32:23.385797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVnx8a3ZaLq9yyc0Ph"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "65733ae8-4deb-4b71-a573-fb41dacd0480", "DetectTime": "2024-05-21T12:32:23.645353+00:00", "EventTime": "2024-05-21T12:32:23.645370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuqYk2LCbmhf3O22a"], "accumulated_threat_level": 1.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "bee0b0d0-4f55-4d71-b91a-6de564479c9a", "DetectTime": "2024-05-21T12:32:23.673541+00:00", "EventTime": "2024-05-21T12:32:23.673566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.42.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXU0X1UwAYmtUdcZh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "98ff53b9-affc-45ae-b748-7b494f67cf90", "DetectTime": "2024-05-21T12:32:23.679244+00:00", "EventTime": "2024-05-21T12:32:23.679265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.94.158.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClyIBt3S5jrHP4umM5"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "194e2bcb-37b9-4a04-b356-719d798f55ad", "DetectTime": "2024-05-21T12:32:23.683941+00:00", "EventTime": "2024-05-21T12:32:23.683959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.74.131.196 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMaIgC2bQnOdzVq2"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "2bff1024-db35-4abe-9b91-9fe5271cb54a", "DetectTime": "2024-05-21T12:32:23.781345+00:00", "EventTime": "2024-05-21T12:32:23.781364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cih6fm4NVgzFyjYr9j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 68} +{"Format": "IDEA0", "ID": "d7f79d92-0265-4c9d-8a13-7ee09473b99b", "DetectTime": "2024-05-21T12:32:23.819565+00:00", "EventTime": "2024-05-21T12:32:23.819586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTCYH3GREBuUiRS38"], "accumulated_threat_level": 3.2, "timewindow": 68} +{"Format": "IDEA0", "ID": "08a1f02c-4bc9-48ee-9b86-8200dfaee76b", "DetectTime": "2024-05-21T12:32:23.847677+00:00", "EventTime": "2024-05-21T12:32:23.847699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.80.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chh3qJ3cDFg812TsNe"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "87f52afc-8b02-4634-b932-9d897b79ff52", "DetectTime": "2024-05-21T12:32:23.880053+00:00", "EventTime": "2024-05-21T12:32:23.880072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBoJl4VLPGt5KBPvf"], "accumulated_threat_level": 4.0, "timewindow": 68} +{"Format": "IDEA0", "ID": "2bb3453e-7e44-461d-91a6-0c1f617af626", "DetectTime": "2024-05-21T12:32:23.917362+00:00", "EventTime": "2024-05-21T12:32:23.917383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7mPt44XONPLEL5yk3"], "accumulated_threat_level": 4.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "e258905c-e287-450a-ade3-5f6d033ce729", "DetectTime": "2024-05-21T12:32:23.951125+00:00", "EventTime": "2024-05-21T12:32:23.951145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1nXW1GKC1r72Yfjc"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "0e3510f5-f0e4-45b2-a095-4ac6dd4f6d23", "DetectTime": "2024-05-21T12:32:23.961784+00:00", "EventTime": "2024-05-21T12:32:23.961802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVZpR2vODLkh7YvCc"], "accumulated_threat_level": 5.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "0ce66d34-5bea-4e58-a2e3-80e502696c7c", "DetectTime": "2024-05-21T12:32:24.005863+00:00", "EventTime": "2024-05-21T12:32:24.005883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4iA22W6tJYVvaxQ8"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "a24838f3-79f7-4463-b952-5bc340034cb1", "DetectTime": "2024-05-21T12:32:24.034378+00:00", "EventTime": "2024-05-21T12:32:24.034398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKm7s4U3mLpZSF7S7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 68} +{"Format": "IDEA0", "ID": "044f38da-5b1c-4a2a-8f53-07e294447ab8", "DetectTime": "2024-05-21T12:32:24.280082+00:00", "EventTime": "2024-05-21T12:32:24.280103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caab9g3vKmVHPvugd9"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b93b3501-4db2-4894-ba3f-cb265b0f5cfb", "DetectTime": "2024-05-21T12:32:24.285105+00:00", "EventTime": "2024-05-21T12:32:24.285123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxCWC1452lDsHjP73"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "c5fae45c-ccca-4d62-952d-2527bbd7e57c", "DetectTime": "2024-05-21T12:32:24.332296+00:00", "EventTime": "2024-05-21T12:32:24.332319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTShx23XAB7qptl5jh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "1501a120-1926-4189-ae30-3ae51091beff", "DetectTime": "2024-05-21T12:32:24.359618+00:00", "EventTime": "2024-05-21T12:32:24.359640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbyq9F3JYhS4t9t92k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "5d263921-b7e5-4bda-b00e-0e73be5e34ed", "DetectTime": "2024-05-21T12:32:24.386211+00:00", "EventTime": "2024-05-21T12:32:24.386233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn39M71rRv9CtZaf28"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "b89961ed-9437-49f3-b551-04ab08ba54c5", "DetectTime": "2024-05-21T12:32:24.666334+00:00", "EventTime": "2024-05-21T12:32:24.666355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.11.249.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwugH42jEM9Smd5dT6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "c18b0724-9ee6-4af8-a316-52a1e3096cd5", "DetectTime": "2024-05-21T12:32:24.775635+00:00", "EventTime": "2024-05-21T12:32:24.775658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvngQ2ZMbKCpw0L7"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "01ba52ef-6dc3-42f1-952a-56d8318b2700", "DetectTime": "2024-05-21T12:32:24.838975+00:00", "EventTime": "2024-05-21T12:32:24.838999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBbTjkO5C9fxZJpf"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f2f51c14-11a7-4b32-a753-760650f6dee8", "DetectTime": "2024-05-21T12:32:24.953999+00:00", "EventTime": "2024-05-21T12:32:24.954021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGOP4D2abavfrxeLg6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "40b7842f-4879-470f-a9ae-be461ec7a3fa", "DetectTime": "2024-05-21T12:32:25.005422+00:00", "EventTime": "2024-05-21T12:32:25.005443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.55.57.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjm0CMp5xpqmAfKcd"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "ebd7b9f5-c82f-4cbf-bedd-2de8826379d9", "DetectTime": "2024-05-21T12:32:25.316767+00:00", "EventTime": "2024-05-21T12:32:25.316791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiC6ls2y5bLahKNrKg"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "6e72401c-834f-4d95-96b8-ed532a75be3f", "DetectTime": "2024-05-21T12:32:25.424341+00:00", "EventTime": "2024-05-21T12:32:25.424364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.180.153.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2piS174Lejsv6Oc"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "1b2b4dee-17bf-4d97-828f-26ab0d8311ff", "DetectTime": "2024-05-21T12:32:25.484882+00:00", "EventTime": "2024-05-21T12:32:25.484905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJSPn47tDiRDaDera"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "43fb0a12-1a9b-4d89-81f1-bcbe87eef6a4", "DetectTime": "2024-05-21T12:32:25.595126+00:00", "EventTime": "2024-05-21T12:32:25.595148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsxPaE2kFcJrKCmzBk", "C3eVhb1GAPm8uHEx47", "CQpQkRdvUM6sNPyqi", "CXTHFu4OqGCjnFnqYg"], "accumulated_threat_level": 7.699999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "5fdffa68-9110-4df7-9992-a466259e36df", "DetectTime": "2024-05-21T12:32:25.630700+00:00", "EventTime": "2024-05-21T12:32:25.630720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu47Di4IUfovuJA4bh"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "cde08bd5-addf-45fe-95ac-130e99e94c43", "DetectTime": "2024-05-21T12:32:26.083199+00:00", "EventTime": "2024-05-21T12:32:26.083219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8rxbm2L7qEWq1ODo6"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "7b433c97-91dd-4c0e-92f7-4ab831be2567", "DetectTime": "2024-05-21T12:32:26.281945+00:00", "EventTime": "2024-05-21T12:32:26.281969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RfJv3NHbwF47zSti"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "f1be6de2-8c85-4004-b3b3-f4d1d49f7cec", "DetectTime": "2024-05-21T12:32:26.692088+00:00", "EventTime": "2024-05-21T12:32:26.692106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwBs21tritMjliJcd"], "accumulated_threat_level": 0, "timewindow": 66} +{"Format": "IDEA0", "ID": "3f4e981e-cf62-4b62-932f-efb7af910d63", "DetectTime": "2024-05-21T12:32:27.200866+00:00", "EventTime": "2024-05-21T12:32:27.200886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck6AKW2RhRbhPkAvY5"], "accumulated_threat_level": 8.5, "timewindow": 68} +{"Format": "IDEA0", "ID": "746b98f9-691a-4608-a2c5-c67e97a381c4", "DetectTime": "2024-05-21T12:32:27.214053+00:00", "EventTime": "2024-05-21T12:32:27.214077+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTCJ34oqlDaj3G0M8"], "accumulated_threat_level": 8.524, "timewindow": 68} +{"Format": "IDEA0", "ID": "95867ed2-266f-4766-84e4-c2548e133ae6", "DetectTime": "2024-05-21T12:32:27.220125+00:00", "EventTime": "2024-05-21T12:32:27.220146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsOJ131BZfdCOhDt5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "1f53125e-b605-4a55-b556-a4e91d5e6e00", "DetectTime": "2024-05-21T12:32:27.246376+00:00", "EventTime": "2024-05-21T12:32:27.246395+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTCJ34oqlDaj3G0M8"], "accumulated_threat_level": 0, "timewindow": 68} +{"Format": "IDEA0", "ID": "d6b3fc55-2882-411d-b300-def9ba2390d0", "DetectTime": "2024-05-21T12:32:27.251325+00:00", "EventTime": "2024-05-21T12:32:27.251342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.36.121.227 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xL073S2h2Tx6bbGj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "de74acaa-53fc-4d3b-9229-40c4c726b771", "DetectTime": "2024-05-21T12:32:27.274040+00:00", "EventTime": "2024-05-21T12:32:27.274062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUmxNX5J3SbVGkv8"], "accumulated_threat_level": 9.324, "timewindow": 68} +{"Format": "IDEA0", "ID": "f9e29beb-0952-41e8-b295-ece0118a0f70", "DetectTime": "2024-05-21T12:32:27.309681+00:00", "EventTime": "2024-05-21T12:32:27.309699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoXGn4FVw5kiviRUl"], "accumulated_threat_level": 10.124, "timewindow": 68} +{"Format": "IDEA0", "ID": "6b567063-cf45-4426-9162-3b6c6552d4fe", "DetectTime": "2024-05-21T12:32:27.348359+00:00", "EventTime": "2024-05-21T12:32:27.348383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CayAX31VYUH6bE0vZd"], "accumulated_threat_level": 10.924000000000001, "timewindow": 68} +{"Format": "IDEA0", "ID": "e76364b9-ad48-44d1-93a0-c5dd0b4a73bf", "DetectTime": "2024-05-21T12:32:27.384322+00:00", "EventTime": "2024-05-21T12:32:27.384341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqt6QQ2mQCioiYftt7"], "accumulated_threat_level": 11.724000000000002, "timewindow": 68} +{"Format": "IDEA0", "ID": "24a58d99-11d5-4dd8-b7ef-d00bed44845e", "DetectTime": "2024-05-21T12:32:27.421109+00:00", "EventTime": "2024-05-21T12:32:27.421130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGrt6SUQNT0R6lfpc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ede30102-dd0d-45e6-929e-89e474f0e5d6", "DetectTime": "2024-05-21T12:32:27.456880+00:00", "EventTime": "2024-05-21T12:32:27.456902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"]}], "Attach": [{"Content": "Connection to unknown destination port 11369/UDP destination IP 49.49.97.102. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMnrC8wneypCIgn1"], "accumulated_threat_level": 12.524000000000003, "timewindow": 68} +{"Format": "Json", "ID": "ede30102-dd0d-45e6-929e-89e474f0e5d6", "DetectTime": "2024-05-21T12:32:27.456880+00:00", "EventTime": "2024-05-21T12:32:27.456902+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["49.49.97.102"]}], "Attach": [{"Content": "1970-01-03T19:33:27.245280+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2024/05/21 12:32:27.699262)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 68, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "4f28073e-6e1c-4007-82b6-2306b446f479", "DetectTime": "2024-05-21T12:32:27.712390+00:00", "EventTime": "2024-05-21T12:32:27.712418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2oBes4wMD6IRTT41l"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "4c36c001-c84c-4f0c-a251-03b39842d71d", "DetectTime": "2024-05-21T12:32:27.726865+00:00", "EventTime": "2024-05-21T12:32:27.726890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffAsn4CoNvvCptqB9"], "accumulated_threat_level": 1.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "4930d8f8-6134-4fa2-8591-869136c2d85d", "DetectTime": "2024-05-21T12:32:27.732687+00:00", "EventTime": "2024-05-21T12:32:27.732707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.180.153.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTTgbZ1YdcXFDB2hM1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "e4bb231a-76be-458d-99be-b5cd38f6e0cc", "DetectTime": "2024-05-21T12:32:27.737618+00:00", "EventTime": "2024-05-21T12:32:27.737640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.55.57.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSah9iDysAlOquHTl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "6d750ae6-bca0-44f3-8d5a-e88c906c4bca", "DetectTime": "2024-05-21T12:32:27.742921+00:00", "EventTime": "2024-05-21T12:32:27.742942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.166.143.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7siNl1GgRpUMRToP8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "bea8da94-8ab1-464c-be16-a3f105a48645", "DetectTime": "2024-05-21T12:32:28.019520+00:00", "EventTime": "2024-05-21T12:32:28.019537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDEjb5WmbpflloA6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 68} +{"Format": "IDEA0", "ID": "e8a92c4e-9948-42b5-b906-85e57e7b5fc1", "DetectTime": "2024-05-21T12:32:28.043296+00:00", "EventTime": "2024-05-21T12:32:28.043317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXcxN1c2vpMdYOLtk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "7f0b795c-4742-4cc0-b7e4-0dd3d44e0b5a", "DetectTime": "2024-05-21T12:32:28.048537+00:00", "EventTime": "2024-05-21T12:32:28.048557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9tzu2rHZvdIH2Fee"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "83b9c783-7bdd-4011-8b2c-f2c613a4edad", "DetectTime": "2024-05-21T12:32:28.053761+00:00", "EventTime": "2024-05-21T12:32:28.053782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdK1yqAUuHzR9nSif"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "58778413-3c6d-40ee-9bc2-d38d5ebcdb6d", "DetectTime": "2024-05-21T12:32:28.127580+00:00", "EventTime": "2024-05-21T12:32:28.127599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3t3Mb385iPRAIxla9"], "accumulated_threat_level": 3.2, "timewindow": 68} +{"Format": "IDEA0", "ID": "81139b8f-7abc-4eda-a90c-2ff5e85dea67", "DetectTime": "2024-05-21T12:32:28.163708+00:00", "EventTime": "2024-05-21T12:32:28.163729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsuHh3XDl4BYIUFld"], "accumulated_threat_level": 4.0, "timewindow": 68} +{"Format": "IDEA0", "ID": "d888a71a-4294-4290-8625-d88f38fd4b1f", "DetectTime": "2024-05-21T12:32:28.201843+00:00", "EventTime": "2024-05-21T12:32:28.201863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CId6Dm4q5spf6Dwn94"], "accumulated_threat_level": 4.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "384adc2b-76f5-45cc-8740-9c5769730b92", "DetectTime": "2024-05-21T12:32:28.252599+00:00", "EventTime": "2024-05-21T12:32:28.252624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbW43P34kMgpT8W0ub"], "accumulated_threat_level": 5.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "8d44b8bb-a6d8-4e12-8624-00b29e4f3143", "DetectTime": "2024-05-21T12:32:28.281283+00:00", "EventTime": "2024-05-21T12:32:28.281301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGovT3kSYl6sKd9Ll"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 68} +{"Format": "IDEA0", "ID": "402bf521-7c9a-43b2-bb6e-e58d427d7baa", "DetectTime": "2024-05-21T12:32:28.316075+00:00", "EventTime": "2024-05-21T12:32:28.316093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmwibu2un7YqhIcgl4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "b7b0da70-4ab0-4481-adcf-f98a6822f6da", "DetectTime": "2024-05-21T12:32:28.353559+00:00", "EventTime": "2024-05-21T12:32:28.353579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C642d22qATWbNhGkw9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "53786beb-a3b4-4582-b9dc-379ade25ff7e", "DetectTime": "2024-05-21T12:32:28.438365+00:00", "EventTime": "2024-05-21T12:32:28.438385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXD4JahjH2cHJP2Ii"], "accumulated_threat_level": 8.799999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "21e83d82-4f4d-4332-957a-ec2d82f7d0bc", "DetectTime": "2024-05-21T12:32:28.468784+00:00", "EventTime": "2024-05-21T12:32:28.468805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6P8HZA6Gk4zgELs1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "d1232ce0-9d9f-4428-8174-49ca3fa180a5", "DetectTime": "2024-05-21T12:32:28.765538+00:00", "EventTime": "2024-05-21T12:32:28.765560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1o412toDWUagiWq9"], "accumulated_threat_level": 9.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "c5c5ed86-b3ca-415f-8acc-3e86cf5f4fc5", "DetectTime": "2024-05-21T12:32:28.782533+00:00", "EventTime": "2024-05-21T12:32:28.782552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNChL16rtENMjmW9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "6d56e206-131b-47ac-825e-4e8fabb61e8b", "DetectTime": "2024-05-21T12:32:28.787945+00:00", "EventTime": "2024-05-21T12:32:28.787963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnPlHL1PfHLMKARwE8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "9ee7314a-874b-47de-a564-b6caa461ef7f", "DetectTime": "2024-05-21T12:32:28.792366+00:00", "EventTime": "2024-05-21T12:32:28.792383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBfZT2JlrYyY1SAk7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "c668e22e-9eac-48e4-a78e-c226dd650ab0", "DetectTime": "2024-05-21T12:32:28.800486+00:00", "EventTime": "2024-05-21T12:32:28.800503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxjrRg1xArSoDFmwIh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "8993b0e3-5082-4366-8718-de2ff2eb5f7b", "DetectTime": "2024-05-21T12:32:28.894189+00:00", "EventTime": "2024-05-21T12:32:28.894210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTjO624mKgpSlft6e"], "accumulated_threat_level": 10.4, "timewindow": 68} +{"Format": "IDEA0", "ID": "3a202968-1418-4eb0-a5db-7889006b8910", "DetectTime": "2024-05-21T12:32:28.930467+00:00", "EventTime": "2024-05-21T12:32:28.930487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1dRY2bRZrfNjXFW6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 68} +{"Format": "IDEA0", "ID": "98f2e8dd-1b11-480e-8858-7bfa51d775c7", "DetectTime": "2024-05-21T12:32:28.967572+00:00", "EventTime": "2024-05-21T12:32:28.967592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRONpC3c7H2GiUGH88"], "accumulated_threat_level": 12.000000000000002, "timewindow": 68} +{"Format": "Json", "ID": "98f2e8dd-1b11-480e-8858-7bfa51d775c7", "DetectTime": "2024-05-21T12:32:28.967572+00:00", "EventTime": "2024-05-21T12:32:28.967592+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "1970-01-03T19:33:46.799914+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2024/05/21 12:32:29.178030)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 68, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d9b037d8-afc5-48ae-8754-4b4ba32f54f3", "DetectTime": "2024-05-21T12:32:29.188998+00:00", "EventTime": "2024-05-21T12:32:29.189017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBU4LTLk6Gau7IMl6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "92f8df58-80c5-49ef-8f78-2faa820032fa", "DetectTime": "2024-05-21T12:32:29.202029+00:00", "EventTime": "2024-05-21T12:32:29.202052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYIYgc3GAVZaFuM5j"], "accumulated_threat_level": 1.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "4957ecae-a83c-4059-9f06-646bea9dfc33", "DetectTime": "2024-05-21T12:32:29.213942+00:00", "EventTime": "2024-05-21T12:32:29.213960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJwOn255FYC1RB3Gg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 68} +{"Format": "IDEA0", "ID": "4412f09a-e77a-458d-85a9-8a3dece5b530", "DetectTime": "2024-05-21T12:32:29.224827+00:00", "EventTime": "2024-05-21T12:32:29.224845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxELfs4OIU7zEzzH57"], "accumulated_threat_level": 3.2, "timewindow": 68} +{"Format": "IDEA0", "ID": "43af376d-0de9-408b-b248-24002b3e1f64", "DetectTime": "2024-05-21T12:32:29.245826+00:00", "EventTime": "2024-05-21T12:32:29.245847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYrWG1EbNapjsN1R5"], "accumulated_threat_level": 4.0, "timewindow": 68} +{"Format": "IDEA0", "ID": "129f9b92-4c03-4f5e-9ddb-ddcba4bcb2ad", "DetectTime": "2024-05-21T12:32:29.484758+00:00", "EventTime": "2024-05-21T12:32:29.484779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNSHBpn7py0HUl3z6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "dd29fe90-4f90-4620-9c13-fae7643217be", "DetectTime": "2024-05-21T12:32:29.489617+00:00", "EventTime": "2024-05-21T12:32:29.489635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGYSNr4MDIUo390Oq3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ad582241-c9d9-4750-8e11-9c9d0f698b5b", "DetectTime": "2024-05-21T12:32:29.496278+00:00", "EventTime": "2024-05-21T12:32:29.496296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBy103ymDnvSZ4rFi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "8d1022b1-4374-42d3-961c-9525f02c8462", "DetectTime": "2024-05-21T12:32:29.500944+00:00", "EventTime": "2024-05-21T12:32:29.500963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwqyo4s82c6107VQf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "407ecf83-337f-492c-bb74-d726ce9db98b", "DetectTime": "2024-05-21T12:32:29.518105+00:00", "EventTime": "2024-05-21T12:32:29.518127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0Ifg40ZJRTFyiszg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ef7abccb-5ff3-4291-a395-2e75d8f90f15", "DetectTime": "2024-05-21T12:32:29.568521+00:00", "EventTime": "2024-05-21T12:32:29.568542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq5ritCGC2OqToIR5"], "accumulated_threat_level": 4.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "8507a96b-60ab-4648-879b-060007e96f06", "DetectTime": "2024-05-21T12:32:29.659131+00:00", "EventTime": "2024-05-21T12:32:29.659153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMM1g3y0wflaitBqk"], "accumulated_threat_level": 5.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "aa16b973-f2fc-48d2-a192-1efb67343c3b", "DetectTime": "2024-05-21T12:32:29.739257+00:00", "EventTime": "2024-05-21T12:32:29.739281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCEj42SVZfonHR343"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 68} +{"Format": "IDEA0", "ID": "39658609-66fd-4ff7-9f16-a5ebc2b9dd38", "DetectTime": "2024-05-21T12:32:29.780390+00:00", "EventTime": "2024-05-21T12:32:29.780410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4VDm4L7N9fmsoMb9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "65a7e2da-730b-41c0-b2eb-ac01d4d66579", "DetectTime": "2024-05-21T12:32:29.815111+00:00", "EventTime": "2024-05-21T12:32:29.815134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjm5j1b682gGpKLS9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "7e110f9c-1890-4c59-8f84-dab308560d5d", "DetectTime": "2024-05-21T12:32:29.853846+00:00", "EventTime": "2024-05-21T12:32:29.853868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpjTw1kLWRpXvJyD8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 68} +{"Format": "IDEA0", "ID": "6980418c-9275-4e0d-bb36-cb1f53b88e49", "DetectTime": "2024-05-21T12:32:29.891933+00:00", "EventTime": "2024-05-21T12:32:29.891952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbG7l53ruhtKaaAtjc"], "accumulated_threat_level": 9.6, "timewindow": 68} +{"Format": "IDEA0", "ID": "7f0b2810-e75b-4484-b046-4caceb7f5c46", "DetectTime": "2024-05-21T12:32:29.896662+00:00", "EventTime": "2024-05-21T12:32:29.896680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTGtR1GoVOsPG73Oj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "14ba9664-0679-4744-84ab-d79b9f7311a5", "DetectTime": "2024-05-21T12:32:30.159994+00:00", "EventTime": "2024-05-21T12:32:30.160017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYMzqI3dzp63MOPsV9"], "accumulated_threat_level": 10.4, "timewindow": 68} +{"Format": "IDEA0", "ID": "23f1e399-dcfa-4c13-ab31-533bb089fb8b", "DetectTime": "2024-05-21T12:32:30.194068+00:00", "EventTime": "2024-05-21T12:32:30.194086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cckv8u3J7oTlOR9jJ9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 68} +{"Format": "IDEA0", "ID": "15fd33be-4051-47b9-8535-4064558e1840", "DetectTime": "2024-05-21T12:32:30.230901+00:00", "EventTime": "2024-05-21T12:32:30.230919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGReZ3eWfvSRhUmbc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 68} +{"Format": "Json", "ID": "15fd33be-4051-47b9-8535-4064558e1840", "DetectTime": "2024-05-21T12:32:30.230901+00:00", "EventTime": "2024-05-21T12:32:30.230919+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "1970-01-03T19:34:07.983533+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 68. (real time 2024/05/21 12:32:30.495055)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 68, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ddd3f79f-aaaa-40e6-9f28-99bfdd7da2c0", "DetectTime": "2024-05-21T12:32:30.506871+00:00", "EventTime": "2024-05-21T12:32:30.506894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlYe51jfKyMSUqsz6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "d299bdd7-6d61-4d03-9b69-84377441f715", "DetectTime": "2024-05-21T12:32:30.512255+00:00", "EventTime": "2024-05-21T12:32:30.512275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2869S30e3Fy9q7Qqi", "CKOqA53IoN5cK2mGV8", "CLgOkK3Q9Zs3JXYOA6", "CHyqa04WV4tYFdDeKe"], "accumulated_threat_level": 0.5, "timewindow": 69} +{"Format": "IDEA0", "ID": "4fe74267-8342-4e85-b046-feb6511b4007", "DetectTime": "2024-05-21T12:32:30.524061+00:00", "EventTime": "2024-05-21T12:32:30.524079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGzHD4yM67yWvnRqd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "3d147ca2-2fad-4936-859e-dc744c990a6a", "DetectTime": "2024-05-21T12:32:30.575310+00:00", "EventTime": "2024-05-21T12:32:30.575329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu5YqX0mWZWbY5Dz6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "9ef9c5d4-9129-4d50-a8ec-8924a1ed2abb", "DetectTime": "2024-05-21T12:32:30.676960+00:00", "EventTime": "2024-05-21T12:32:30.676979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7G2A1hnYVsD8SWr8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ca3df665-8fb2-435e-89cd-3f82ead8f34a", "DetectTime": "2024-05-21T12:32:30.703162+00:00", "EventTime": "2024-05-21T12:32:30.703182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmfcVqDYsyruN7C1k"], "accumulated_threat_level": 1.3, "timewindow": 69} +{"Format": "IDEA0", "ID": "811b2bbb-6d03-4095-bab7-8227ef216d6d", "DetectTime": "2024-05-21T12:32:30.740748+00:00", "EventTime": "2024-05-21T12:32:30.740768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxV8I22JUnZxWLod3"], "accumulated_threat_level": 2.1, "timewindow": 69} +{"Format": "IDEA0", "ID": "58be41aa-4c25-4750-9e0f-dc49e1a0f302", "DetectTime": "2024-05-21T12:32:30.915250+00:00", "EventTime": "2024-05-21T12:32:30.915270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVqqz2EX4enI2mb8j"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 69} +{"Format": "IDEA0", "ID": "1920d8c9-728c-4158-b9d4-bd4fcac3ed5a", "DetectTime": "2024-05-21T12:32:30.961549+00:00", "EventTime": "2024-05-21T12:32:30.961568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClhX2obpaGQXCfkA"], "accumulated_threat_level": 3.7, "timewindow": 69} +{"Format": "IDEA0", "ID": "a12a8ddf-48a1-4e96-ba3b-8c1c7edd04cf", "DetectTime": "2024-05-21T12:32:30.996802+00:00", "EventTime": "2024-05-21T12:32:30.996822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfv9Re2Ly5VNb4ELKk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ad211c4a-8737-49a8-9346-8c3231f0c28f", "DetectTime": "2024-05-21T12:32:31.023395+00:00", "EventTime": "2024-05-21T12:32:31.023416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.96.182.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5MMH1pfrAnnukZl6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "451db67e-1134-4378-bc2c-bf8eff5bfb42", "DetectTime": "2024-05-21T12:32:31.324829+00:00", "EventTime": "2024-05-21T12:32:31.324850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXYwy1UlJuP8Ioo86"], "accumulated_threat_level": 4.5, "timewindow": 69} +{"Format": "IDEA0", "ID": "65b0a481-759f-466f-8d95-271b95b5f90c", "DetectTime": "2024-05-21T12:32:31.349332+00:00", "EventTime": "2024-05-21T12:32:31.349353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6iP440eYHZo0fHa8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "a556fd6f-10a6-4a07-9273-ee146e9c2c98", "DetectTime": "2024-05-21T12:32:31.354131+00:00", "EventTime": "2024-05-21T12:32:31.354150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVt0jsMQWE5281o6i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "4dbe092b-10db-4c94-815c-5b95ba3023a5", "DetectTime": "2024-05-21T12:32:31.359098+00:00", "EventTime": "2024-05-21T12:32:31.359117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUF9w2KPEV58WTGQ5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "56f7193a-61c0-4fe6-b856-5d1708ce6ef7", "DetectTime": "2024-05-21T12:32:31.423840+00:00", "EventTime": "2024-05-21T12:32:31.423859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLjjCsaeV6HuXzxc8"], "accumulated_threat_level": 5.3, "timewindow": 69} +{"Format": "IDEA0", "ID": "2275b5b8-4809-42ab-bc40-ef4b6d777ef6", "DetectTime": "2024-05-21T12:32:31.464067+00:00", "EventTime": "2024-05-21T12:32:31.464086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcFfa2lVTSPsvcGj8"], "accumulated_threat_level": 6.1, "timewindow": 69} +{"Format": "IDEA0", "ID": "5228697a-279a-4525-9dcf-15d07c3c1ab8", "DetectTime": "2024-05-21T12:32:31.508184+00:00", "EventTime": "2024-05-21T12:32:31.508202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfaDC3wPBz1ako9tb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 69} +{"Format": "IDEA0", "ID": "58c99fc3-1359-4e0b-9222-63936e605eff", "DetectTime": "2024-05-21T12:32:31.544907+00:00", "EventTime": "2024-05-21T12:32:31.544925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGc6eQ6BLTV33JIb"], "accumulated_threat_level": 7.699999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ef90e8f9-a0e6-42dd-a3a4-0dce3716ff5b", "DetectTime": "2024-05-21T12:32:31.581375+00:00", "EventTime": "2024-05-21T12:32:31.581395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctvh9i25lEkSPQ94m5"], "accumulated_threat_level": 8.5, "timewindow": 69} +{"Format": "IDEA0", "ID": "5d2894f1-1872-4e89-8b8f-53f631fe6947", "DetectTime": "2024-05-21T12:32:31.624562+00:00", "EventTime": "2024-05-21T12:32:31.624595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMctu8dz8MITzfSEd"], "accumulated_threat_level": 9.3, "timewindow": 69} +{"Format": "IDEA0", "ID": "c402eb55-1ed9-4fe2-8a97-3fa735918b82", "DetectTime": "2024-05-21T12:32:31.657924+00:00", "EventTime": "2024-05-21T12:32:31.657941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWdGTUX74pQUvkoM4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 69} +{"Format": "IDEA0", "ID": "3b70a437-4018-4044-a2df-306c7f035cc9", "DetectTime": "2024-05-21T12:32:31.699566+00:00", "EventTime": "2024-05-21T12:32:31.699589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.28.246"]}], "Attach": [{"Content": "Connection to unknown destination port 23956/UDP destination IP 188.169.28.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6c8541RyiH5aJoBnb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 69} +{"Format": "IDEA0", "ID": "a2c2913b-66c0-4cba-bcb2-3c9a0761a986", "DetectTime": "2024-05-21T12:32:31.732455+00:00", "EventTime": "2024-05-21T12:32:31.732473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqjWFu23hdzknZfkka"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ae990a85-928d-4dfa-84ea-93da57c4b76f", "DetectTime": "2024-05-21T12:32:31.764173+00:00", "EventTime": "2024-05-21T12:32:31.764194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcsHqr1IZ4qRQ5U4X8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 69} +{"Format": "IDEA0", "ID": "bd65629f-6be1-4ed4-ada9-1f794779ac5e", "DetectTime": "2024-05-21T12:32:31.927196+00:00", "EventTime": "2024-05-21T12:32:31.927214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E3yw4uOerBLy7yr3"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "e8f1c3b5-74e3-4037-82ee-1c6f97c40873", "DetectTime": "2024-05-21T12:32:31.941020+00:00", "EventTime": "2024-05-21T12:32:31.941040+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E3yw4uOerBLy7yr3"], "accumulated_threat_level": 5.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "514c8395-ca5a-41c3-8f87-2116e04151ce", "DetectTime": "2024-05-21T12:32:31.962603+00:00", "EventTime": "2024-05-21T12:32:31.962622+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiyFy3iAUsFcOQUak"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "b079f89c-c00d-4661-b4e2-a3856d81619e", "DetectTime": "2024-05-21T12:32:31.974886+00:00", "EventTime": "2024-05-21T12:32:31.974905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiyFy3iAUsFcOQUak"], "accumulated_threat_level": 5.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "65264f78-0482-47e5-88b6-19cfeac377b2", "DetectTime": "2024-05-21T12:32:31.991814+00:00", "EventTime": "2024-05-21T12:32:31.991834+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItuvI3DU1Dv5McvZ7"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "a7084f8b-170e-4485-9605-38963ca067bf", "DetectTime": "2024-05-21T12:32:32.006637+00:00", "EventTime": "2024-05-21T12:32:32.006669+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItuvI3DU1Dv5McvZ7"], "accumulated_threat_level": 6.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "1764a681-434f-4221-89fb-13d416d93e5c", "DetectTime": "2024-05-21T12:32:32.023610+00:00", "EventTime": "2024-05-21T12:32:32.023629+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNbP34VETALuoW3Fi"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "3ef4b739-d63f-4cc9-9d65-efbfefabeeef", "DetectTime": "2024-05-21T12:32:32.029112+00:00", "EventTime": "2024-05-21T12:32:32.029132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crha7ZphAe4DZ5qdg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "94cc939c-4a45-4500-b9b3-e0a794cd83fd", "DetectTime": "2024-05-21T12:32:32.043628+00:00", "EventTime": "2024-05-21T12:32:32.043647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNbP34VETALuoW3Fi"], "accumulated_threat_level": 6.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "ca9146f4-b04c-464a-8b9a-c231fd6b9171", "DetectTime": "2024-05-21T12:32:32.056222+00:00", "EventTime": "2024-05-21T12:32:32.056242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqxHaQ16zmWKy6j3z1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 69} +{"Format": "Json", "ID": "ca9146f4-b04c-464a-8b9a-c231fd6b9171", "DetectTime": "2024-05-21T12:32:32.056222+00:00", "EventTime": "2024-05-21T12:32:32.056242+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "1970-01-03T20:05:17.032336+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2024/05/21 12:32:32.278280)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 69, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "d36f4f93-9787-473b-854d-989e1a6f261d", "DetectTime": "2024-05-21T12:32:32.325116+00:00", "EventTime": "2024-05-21T12:32:32.325133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqBwZIS72NJ1aI3c"], "accumulated_threat_level": 0.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "85cb50ee-f78e-4a00-9f08-77a2fecd880a", "DetectTime": "2024-05-21T12:32:32.336730+00:00", "EventTime": "2024-05-21T12:32:32.336752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu1yYI2plxlu2DAmVk"], "accumulated_threat_level": 1.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "6ec4cafc-7d1a-430e-8fd6-23eed6d19cee", "DetectTime": "2024-05-21T12:32:32.350180+00:00", "EventTime": "2024-05-21T12:32:32.350198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFT9PJ36nKCYidIAM6"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "9eecb661-1ab0-49b4-a811-7e8d3ed6378a", "DetectTime": "2024-05-21T12:32:32.362956+00:00", "EventTime": "2024-05-21T12:32:32.362975+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFT9PJ36nKCYidIAM6"], "accumulated_threat_level": 7.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "daafa264-5517-4e03-9415-83a47d1e622a", "DetectTime": "2024-05-21T12:32:32.373716+00:00", "EventTime": "2024-05-21T12:32:32.373735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C97zau36RQh4SeFHBd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 69} +{"Format": "IDEA0", "ID": "a4279325-db12-4190-a317-3872a7e197af", "DetectTime": "2024-05-21T12:32:32.386024+00:00", "EventTime": "2024-05-21T12:32:32.386043+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqWsx1Yh49IRuTGp7"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "413010e6-1a59-4679-b561-d4b941290f3a", "DetectTime": "2024-05-21T12:32:32.398704+00:00", "EventTime": "2024-05-21T12:32:32.398723+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqWsx1Yh49IRuTGp7"], "accumulated_threat_level": 7.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "f24f10ff-b6ff-4126-a41c-d7ea47cfc728", "DetectTime": "2024-05-21T12:32:32.410373+00:00", "EventTime": "2024-05-21T12:32:32.410391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bg7B36il6NJUlqeb"], "accumulated_threat_level": 3.2, "timewindow": 69} +{"Format": "IDEA0", "ID": "ce6bae86-2a29-4f5e-b878-ec32de751d48", "DetectTime": "2024-05-21T12:32:32.422453+00:00", "EventTime": "2024-05-21T12:32:32.422474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.51.236.113"]}], "Attach": [{"Content": "Connection to unknown destination port 19077/UDP destination IP 190.51.236.113. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu56vk1x8FQzpcIRmh"], "accumulated_threat_level": 4.0, "timewindow": 69} +{"Format": "IDEA0", "ID": "7f108dca-af19-4b25-85a9-fa739f9bd4fe", "DetectTime": "2024-05-21T12:32:32.434817+00:00", "EventTime": "2024-05-21T12:32:32.434836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDt4y84WKMV28yDh35"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "ef96e719-281d-4d6d-871a-07c3857bc224", "DetectTime": "2024-05-21T12:32:32.447230+00:00", "EventTime": "2024-05-21T12:32:32.447260+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDt4y84WKMV28yDh35"], "accumulated_threat_level": 8.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "4c2e8394-432e-4048-8b3d-dbfab395d083", "DetectTime": "2024-05-21T12:32:32.460694+00:00", "EventTime": "2024-05-21T12:32:32.460717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZEOmAufqrFt2SBlg"], "accumulated_threat_level": 4.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "91e894b6-79fe-478d-9a72-affad0273d3d", "DetectTime": "2024-05-21T12:32:32.473507+00:00", "EventTime": "2024-05-21T12:32:32.473526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csh0Xj1TMdLFhpvIh4"], "accumulated_threat_level": 5.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "ccafc77e-61ba-47c5-9e98-58ccc178e05e", "DetectTime": "2024-05-21T12:32:32.484240+00:00", "EventTime": "2024-05-21T12:32:32.484259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaXTMn395HwbrWt88d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 69} +{"Format": "IDEA0", "ID": "205aa4ed-5b09-4294-b76b-d319f9502838", "DetectTime": "2024-05-21T12:32:32.495741+00:00", "EventTime": "2024-05-21T12:32:32.495764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMh7g2kOLl13jLvI4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "435d7572-db79-41f7-97d5-b39fcc552fa6", "DetectTime": "2024-05-21T12:32:32.501078+00:00", "EventTime": "2024-05-21T12:32:32.501100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbgxaL3U76vhGTW1Tk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "1b70fcb4-7e62-4344-b5fe-99c297d8a241", "DetectTime": "2024-05-21T12:32:32.511575+00:00", "EventTime": "2024-05-21T12:32:32.511593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.21.216.25"]}], "Attach": [{"Content": "Connection to unknown destination port 1807/UDP destination IP 94.21.216.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiqIuE46fiuwE02Lgg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "bbcf58b9-350f-45ac-8322-a9cbcdfcf339", "DetectTime": "2024-05-21T12:32:32.522065+00:00", "EventTime": "2024-05-21T12:32:32.522083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQxtnc43zkaCSFkBke"], "accumulated_threat_level": 8.799999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "2f609cff-6131-4266-b35f-f747a852b7a6", "DetectTime": "2024-05-21T12:32:32.657196+00:00", "EventTime": "2024-05-21T12:32:32.657215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnvkg2x4dJrMuMDF1"], "accumulated_threat_level": 9.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "a79d9488-08ca-45c2-8ea4-466b672ca827", "DetectTime": "2024-05-21T12:32:32.676621+00:00", "EventTime": "2024-05-21T12:32:32.676643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.42.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62iGY3isNNiXbErKe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "32b1ca82-0f7f-43ae-9806-9c5bf892d613", "DetectTime": "2024-05-21T12:32:33.012103+00:00", "EventTime": "2024-05-21T12:32:33.012126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXhYXsSHOdRXfarb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "2fdd623d-cfa9-4f8e-b57a-692af87ac7a8", "DetectTime": "2024-05-21T12:32:33.017264+00:00", "EventTime": "2024-05-21T12:32:33.017284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEcmIx2SLZJwaAHoU8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "556cce06-cb69-435f-9850-724184f8ccf1", "DetectTime": "2024-05-21T12:32:33.029197+00:00", "EventTime": "2024-05-21T12:32:33.029218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uU2e3xUt9HGlS5B9"], "accumulated_threat_level": 10.4, "timewindow": 69} +{"Format": "IDEA0", "ID": "33949da9-cf51-44cf-a9fc-44f61f13589d", "DetectTime": "2024-05-21T12:32:33.034571+00:00", "EventTime": "2024-05-21T12:32:33.034591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.94.158.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNvljZLjPG47vXopl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "54f9430c-6e13-4134-a186-198da168d01d", "DetectTime": "2024-05-21T12:32:33.039867+00:00", "EventTime": "2024-05-21T12:32:33.039886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.80.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWXSP3rxmkFvDTmF3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "4b659109-dc9a-4d0d-add2-13a9563844b8", "DetectTime": "2024-05-21T12:32:33.092119+00:00", "EventTime": "2024-05-21T12:32:33.092140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.74.131.196 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj69is2NANkMoVdno4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "99c18812-1b52-44cd-af53-b791c1120044", "DetectTime": "2024-05-21T12:32:33.175522+00:00", "EventTime": "2024-05-21T12:32:33.175543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLqJa2V9VDh8puyd5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "d558e8c0-bb80-4612-adf4-75acb9482c91", "DetectTime": "2024-05-21T12:32:33.208757+00:00", "EventTime": "2024-05-21T12:32:33.208778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4E2gbJ3zfn3776a2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 69} +{"Format": "IDEA0", "ID": "39fb84f7-5222-43a5-8eed-9764979608c7", "DetectTime": "2024-05-21T12:32:33.247620+00:00", "EventTime": "2024-05-21T12:32:33.247641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGC1Ed1eNAy8MnDmy2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 69} +{"Format": "Json", "ID": "39fb84f7-5222-43a5-8eed-9764979608c7", "DetectTime": "2024-05-21T12:32:33.247620+00:00", "EventTime": "2024-05-21T12:32:33.247641+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-03T20:05:20.188461+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2024/05/21 12:32:33.396161)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 69, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c5ae1966-2a8e-4072-93be-431ac53c811e", "DetectTime": "2024-05-21T12:32:33.550452+00:00", "EventTime": "2024-05-21T12:32:33.550475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.221.67.129"]}], "Attach": [{"Content": "Connection to unknown destination port 9536/UDP destination IP 41.221.67.129. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZJ5i47VpV6H6uOL8"], "accumulated_threat_level": 0.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "11adecb9-d208-487a-9196-fed8550127d1", "DetectTime": "2024-05-21T12:32:33.556416+00:00", "EventTime": "2024-05-21T12:32:33.556435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyn88Nn6uCiPqkys1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "fcbc851b-487e-4bcd-baae-c582e4f16858", "DetectTime": "2024-05-21T12:32:33.567756+00:00", "EventTime": "2024-05-21T12:32:33.567775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTBEw4ytFSDsZOaLe"], "accumulated_threat_level": 1.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "aa34c53e-622d-44db-9f4a-8dad76a882cb", "DetectTime": "2024-05-21T12:32:33.580300+00:00", "EventTime": "2024-05-21T12:32:33.580319+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2eRiGtOESJaaLq2c"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "0de97912-bedb-4f40-a408-951d7efb19b4", "DetectTime": "2024-05-21T12:32:33.593803+00:00", "EventTime": "2024-05-21T12:32:33.593822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2eRiGtOESJaaLq2c"], "accumulated_threat_level": 8.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "04ed4d2b-eb37-4ae0-9d62-1b2b756dfb02", "DetectTime": "2024-05-21T12:32:33.598875+00:00", "EventTime": "2024-05-21T12:32:33.598893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoEZ1b42dvG6aXQ6F7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "a1895dcb-3089-4df8-abdd-3fb1e340e212", "DetectTime": "2024-05-21T12:32:33.603446+00:00", "EventTime": "2024-05-21T12:32:33.603463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCYLCE4MYCmg0emBS5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "e356ec54-66ec-4b59-806c-2ed2660e640e", "DetectTime": "2024-05-21T12:32:33.616775+00:00", "EventTime": "2024-05-21T12:32:33.616795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYvKC29u903Cub7nh"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "c8d7f082-a701-4f34-af70-f68607aed32d", "DetectTime": "2024-05-21T12:32:33.629729+00:00", "EventTime": "2024-05-21T12:32:33.629751+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYvKC29u903Cub7nh"], "accumulated_threat_level": 9.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "ce8c283c-3091-40db-949b-68cc94ffb1e5", "DetectTime": "2024-05-21T12:32:33.899041+00:00", "EventTime": "2024-05-21T12:32:33.899061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzTO1oBhIDYGvv19"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 69} +{"Format": "IDEA0", "ID": "0ca14652-2b3d-4f61-942e-69cbb86acb53", "DetectTime": "2024-05-21T12:32:33.918793+00:00", "EventTime": "2024-05-21T12:32:33.918816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5S3SAXgoqf9g5R5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "c59f3397-7f49-44fb-a746-3eab23450663", "DetectTime": "2024-05-21T12:32:33.965144+00:00", "EventTime": "2024-05-21T12:32:33.965162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4suIh40umyHnO1PLl"], "accumulated_threat_level": 3.2, "timewindow": 69} +{"Format": "IDEA0", "ID": "af1170de-9a44-4062-b18f-60e2839cb210", "DetectTime": "2024-05-21T12:32:33.969801+00:00", "EventTime": "2024-05-21T12:32:33.969818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.11.249.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFle02wk8i2x2Uy4l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "fe8b4abf-ec89-445b-9269-579159de22fc", "DetectTime": "2024-05-21T12:32:34.016105+00:00", "EventTime": "2024-05-21T12:32:34.016126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsiqLe41aNfFnPJQca"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "4842edbb-3ea6-4902-b3a9-e2ef9646b525", "DetectTime": "2024-05-21T12:32:34.044776+00:00", "EventTime": "2024-05-21T12:32:34.044795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvvV6jaFbM7NcqcNl"], "accumulated_threat_level": 4.0, "timewindow": 69} +{"Format": "IDEA0", "ID": "37877fbb-29f4-49d7-a5c8-b83f0dcee602", "DetectTime": "2024-05-21T12:32:34.077597+00:00", "EventTime": "2024-05-21T12:32:34.077619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHtD6hGQ4Xy5bA9n6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ad733e36-cea4-4e2e-b379-106ba0cd1a04", "DetectTime": "2024-05-21T12:32:34.100311+00:00", "EventTime": "2024-05-21T12:32:34.100328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxH8p2nIoN5hp3A79"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "ab695351-e8fb-4665-a28d-4ac37f4c9d28", "DetectTime": "2024-05-21T12:32:34.119808+00:00", "EventTime": "2024-05-21T12:32:34.119830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kLWx4S9StqNy9DWk"], "accumulated_threat_level": 4.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "691f4e71-5cb5-4d35-aaf2-3c43e9750142", "DetectTime": "2024-05-21T12:32:34.168822+00:00", "EventTime": "2024-05-21T12:32:34.168845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhrQN3ApSRrJ35l74"], "accumulated_threat_level": 5.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "40bafea8-0982-4d0b-b3ee-569278d01415", "DetectTime": "2024-05-21T12:32:34.340572+00:00", "EventTime": "2024-05-21T12:32:34.340593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClSRex2ogtMpNRJbw7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "900bbfdc-2d73-4ba7-9a05-c2f64a1ade56", "DetectTime": "2024-05-21T12:32:34.393742+00:00", "EventTime": "2024-05-21T12:32:34.393761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNANt2xkStihYUO13"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "e74edfea-e42b-4279-bebf-43102498b51e", "DetectTime": "2024-05-21T12:32:34.433497+00:00", "EventTime": "2024-05-21T12:32:34.433520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mdKf1U5kGx4xBcf6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "02a5b6a4-ffed-4ba3-8d46-62fc572f64f5", "DetectTime": "2024-05-21T12:32:34.712275+00:00", "EventTime": "2024-05-21T12:32:34.712301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhUf12WQNMyGjM27i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 69} +{"Format": "IDEA0", "ID": "662acef3-8ae9-4742-9019-de37fd4e3b29", "DetectTime": "2024-05-21T12:32:34.740635+00:00", "EventTime": "2024-05-21T12:32:34.740655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5yMdy1jQhzUxzrTQa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "54180cdc-76c7-41cb-9ec3-b1b7816f25ae", "DetectTime": "2024-05-21T12:32:34.745782+00:00", "EventTime": "2024-05-21T12:32:34.745799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CteveD4rJuqvu0nbGk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "e060c352-4388-4976-8c5c-2ce0d8586747", "DetectTime": "2024-05-21T12:32:34.750248+00:00", "EventTime": "2024-05-21T12:32:34.750266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.131.151.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrvUX2JViA3Dz5p51"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "710ac549-23b6-41fe-884c-05bb251c574c", "DetectTime": "2024-05-21T12:32:34.755634+00:00", "EventTime": "2024-05-21T12:32:34.755663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49izJ7WFe89Bu2hf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "59ea64c4-c631-4a09-ab7e-68305fb2b53e", "DetectTime": "2024-05-21T12:32:34.885106+00:00", "EventTime": "2024-05-21T12:32:34.885128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQIfHPGX1YGyoocq7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "0f1dda0e-d6f9-44b9-aa87-f34f5ec76609", "DetectTime": "2024-05-21T12:32:34.890807+00:00", "EventTime": "2024-05-21T12:32:34.890826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.96.182.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGpIfZSfe6PRVcW5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "d028a93c-9421-4d25-9865-fcfadc5f9e06", "DetectTime": "2024-05-21T12:32:34.895460+00:00", "EventTime": "2024-05-21T12:32:34.895479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.74.131.196 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClppYh7WEg69YORhl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "a8b5a2f7-bad9-40bc-81c9-5c29065279c1", "DetectTime": "2024-05-21T12:32:34.917363+00:00", "EventTime": "2024-05-21T12:32:34.917380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.94.158.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UA5s3gJnvgRetYH2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 67} +{"Format": "IDEA0", "ID": "3da50694-f2a4-4736-adae-da7fd0025f80", "DetectTime": "2024-05-21T12:32:35.029921+00:00", "EventTime": "2024-05-21T12:32:35.029939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.246.62.65"]}], "Attach": [{"Content": "Connection to unknown destination port 6857/UDP destination IP 217.246.62.65. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzdmD2VIOzte5YnOg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e8a32f36-5557-4c24-89e9-800092a4fe91", "DetectTime": "2024-05-21T12:32:35.067597+00:00", "EventTime": "2024-05-21T12:32:35.067616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XDG21NNucmHu8Qri"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "45b0faed-8757-4d7f-9cbd-3eaf03a931e8", "DetectTime": "2024-05-21T12:32:35.105806+00:00", "EventTime": "2024-05-21T12:32:35.105830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwvCq4cU6gOhG8glf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "54f9dcd1-3554-4959-8c47-5c4f8b2d399a", "DetectTime": "2024-05-21T12:32:35.295415+00:00", "EventTime": "2024-05-21T12:32:35.295433+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRfqA16uJmtvtHlGe"], "accumulated_threat_level": 8.823999999999998, "timewindow": 69} +{"Format": "IDEA0", "ID": "bc6c8d7b-02ce-4296-bb05-e0e9d0044f20", "DetectTime": "2024-05-21T12:32:35.332803+00:00", "EventTime": "2024-05-21T12:32:35.332822+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRfqA16uJmtvtHlGe"], "accumulated_threat_level": 0, "timewindow": 69} +{"Format": "IDEA0", "ID": "fe6474bd-d95a-4610-b0e5-59d3f68ebbac", "DetectTime": "2024-05-21T12:32:35.351834+00:00", "EventTime": "2024-05-21T12:32:35.351856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.166.143.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIDkoQ1eDJLxzrQf9a"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "af894288-c9a3-410e-a48b-00ec17571ca6", "DetectTime": "2024-05-21T12:32:35.356771+00:00", "EventTime": "2024-05-21T12:32:35.356790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtISYlo13kHm2ocf"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "441d76bd-7c63-466c-8bcd-6ff6e9ffc4f5", "DetectTime": "2024-05-21T12:32:35.406488+00:00", "EventTime": "2024-05-21T12:32:35.406508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUycbO1l7HEeXWSyic"], "accumulated_threat_level": 9.623999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "5a8c038d-0245-4f8e-8022-6f0782590c9b", "DetectTime": "2024-05-21T12:32:35.443905+00:00", "EventTime": "2024-05-21T12:32:35.443924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClIGl723jxR9vrXY0b"], "accumulated_threat_level": 10.424, "timewindow": 69} +{"Format": "IDEA0", "ID": "28a2df29-d5ac-494e-8151-caf4b4c4754c", "DetectTime": "2024-05-21T12:32:35.494441+00:00", "EventTime": "2024-05-21T12:32:35.494458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPtlL2kmwyyNMWej5"], "accumulated_threat_level": 11.224, "timewindow": 69} +{"Format": "IDEA0", "ID": "1405d45a-f6ae-4936-86d1-8f0aebbcc48d", "DetectTime": "2024-05-21T12:32:35.529748+00:00", "EventTime": "2024-05-21T12:32:35.529766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZf0CELqCud6PKiq6"], "accumulated_threat_level": 12.024000000000001, "timewindow": 69} +{"Format": "Json", "ID": "1405d45a-f6ae-4936-86d1-8f0aebbcc48d", "DetectTime": "2024-05-21T12:32:35.529748+00:00", "EventTime": "2024-05-21T12:32:35.529766+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "1970-01-03T20:35:51.440921+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2024/05/21 12:32:35.742227)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000001, "timewindow": 69, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000001} +{"Format": "IDEA0", "ID": "efafee32-99eb-43eb-beaf-fdba2f6bca91", "DetectTime": "2024-05-21T12:32:35.746852+00:00", "EventTime": "2024-05-21T12:32:35.746875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhBkdDrglP0Mr8b3"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "d99b4a93-cafd-4d4e-bc6a-0662db0310eb", "DetectTime": "2024-05-21T12:32:35.758206+00:00", "EventTime": "2024-05-21T12:32:35.758224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKs8V1VnQFFFMHtce"], "accumulated_threat_level": 0.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "1d708e09-8b2f-4b14-a0e3-476d8acf07ee", "DetectTime": "2024-05-21T12:32:35.763617+00:00", "EventTime": "2024-05-21T12:32:35.763639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4QAiz42GYk4bOKiy4"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "50643198-1a70-4cff-baf4-2d089213720c", "DetectTime": "2024-05-21T12:32:35.776562+00:00", "EventTime": "2024-05-21T12:32:35.776582+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG5KR130JlOFGdro0j"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "d323fae5-6f92-41b3-aa51-7ec0f0edea8c", "DetectTime": "2024-05-21T12:32:35.788707+00:00", "EventTime": "2024-05-21T12:32:35.788725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG5KR130JlOFGdro0j"], "accumulated_threat_level": 9.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "994b3d12-2a93-4c1e-a3ed-a10c125174fa", "DetectTime": "2024-05-21T12:32:35.799465+00:00", "EventTime": "2024-05-21T12:32:35.799484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1d6w718xE3DxHoD9j"], "accumulated_threat_level": 1.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "8e3cf0e0-1b8e-4763-ac98-c3a26d92098c", "DetectTime": "2024-05-21T12:32:35.804308+00:00", "EventTime": "2024-05-21T12:32:35.804326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOnPiJ5LRPxOdVne"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "63d12df3-b6c0-4bba-8f68-8034b39dbce6", "DetectTime": "2024-05-21T12:32:35.815699+00:00", "EventTime": "2024-05-21T12:32:35.815717+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGsp735ucRQzGIoK4"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "3fa18b8f-e7c9-44f0-a4f1-b7f5d627f90c", "DetectTime": "2024-05-21T12:32:35.828422+00:00", "EventTime": "2024-05-21T12:32:35.828441+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGsp735ucRQzGIoK4"], "accumulated_threat_level": 10.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "306bfa56-b8cb-4d63-a00e-446594f3ea15", "DetectTime": "2024-05-21T12:32:35.839395+00:00", "EventTime": "2024-05-21T12:32:35.839415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsEbrQucYqMRzLQ6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 69} +{"Format": "IDEA0", "ID": "fff57a52-f9da-465f-aab5-cfab25a61f3c", "DetectTime": "2024-05-21T12:32:35.844627+00:00", "EventTime": "2024-05-21T12:32:35.844646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLaZbxngiYcilUk3d"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "227902c1-5cb4-468a-9c5f-cada2ba1f970", "DetectTime": "2024-05-21T12:32:35.856798+00:00", "EventTime": "2024-05-21T12:32:35.856818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTKgZjPviCuKKqv4"], "accumulated_threat_level": 3.2, "timewindow": 69} +{"Format": "IDEA0", "ID": "517896f4-f87a-4703-b712-ca7f1a349394", "DetectTime": "2024-05-21T12:32:35.862040+00:00", "EventTime": "2024-05-21T12:32:35.862058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfwWL51NiFnM8fW6Z6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "e5f003d2-5e98-4896-8bab-8bf5d60ab8fa", "DetectTime": "2024-05-21T12:32:35.874710+00:00", "EventTime": "2024-05-21T12:32:35.874729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTIKtitJBDxEBcTzl"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "4bc3de85-a622-4ddf-ae23-805470c53622", "DetectTime": "2024-05-21T12:32:35.887508+00:00", "EventTime": "2024-05-21T12:32:35.887527+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTIKtitJBDxEBcTzl"], "accumulated_threat_level": 10.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "985034e0-9c1c-45cf-9214-9e30213735a5", "DetectTime": "2024-05-21T12:32:35.903336+00:00", "EventTime": "2024-05-21T12:32:35.903358+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja69xGHd71xM1oeb"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "1cffce68-15a1-4f17-9f3c-7d9881b04048", "DetectTime": "2024-05-21T12:32:35.916088+00:00", "EventTime": "2024-05-21T12:32:35.916107+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja69xGHd71xM1oeb"], "accumulated_threat_level": 11.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "bfb54e39-c2e1-462c-9e38-35859d51b364", "DetectTime": "2024-05-21T12:32:35.928222+00:00", "EventTime": "2024-05-21T12:32:35.928241+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDufkD4XE19kPuvMQf"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "50eec3b8-e3ff-4bca-b522-73a15a60ae0b", "DetectTime": "2024-05-21T12:32:35.941921+00:00", "EventTime": "2024-05-21T12:32:35.941943+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDufkD4XE19kPuvMQf"], "accumulated_threat_level": 11.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "d3fe8073-22a8-4ffb-b680-ed76187b0718", "DetectTime": "2024-05-21T12:32:35.961025+00:00", "EventTime": "2024-05-21T12:32:35.961044+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOoQBYRBKHR4Ywpa"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "3cd978a7-9ea7-4a81-88a8-2647ed5f8791", "DetectTime": "2024-05-21T12:32:35.973383+00:00", "EventTime": "2024-05-21T12:32:35.973402+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOoQBYRBKHR4Ywpa"], "accumulated_threat_level": 12.0, "timewindow": 21} +{"Format": "Json", "ID": "3cd978a7-9ea7-4a81-88a8-2647ed5f8791", "DetectTime": "2024-05-21T12:32:35.973383+00:00", "EventTime": "2024-05-21T12:32:35.973402+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "1970-01-01T20:50:45.534623+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 21. (real time 2024/05/21 12:32:36.377877)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 21, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "3bce0bbe-7b69-47f5-a88a-b51d49e3d6d4", "DetectTime": "2024-05-21T12:32:36.591964+00:00", "EventTime": "2024-05-21T12:32:36.591982+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.6.55.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2IKr4dZuKdaxp67g"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "51f33bf3-02ef-46d1-b57a-ad82c768f35e", "DetectTime": "2024-05-21T12:32:36.605308+00:00", "EventTime": "2024-05-21T12:32:36.605330+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2IKr4dZuKdaxp67g"], "accumulated_threat_level": 0.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "e4d991fa-8ccd-4a5a-a0d7-701a101ca710", "DetectTime": "2024-05-21T12:32:36.610294+00:00", "EventTime": "2024-05-21T12:32:36.610312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY2Gdz4gJrQAm3lhlg"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "b689a784-50fa-468a-bf2a-57ba965899b3", "DetectTime": "2024-05-21T12:32:36.614714+00:00", "EventTime": "2024-05-21T12:32:36.614733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYbMOvxawL2FjyKh"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "2fdf741f-7bac-4778-a1c2-65028ded61eb", "DetectTime": "2024-05-21T12:32:36.619212+00:00", "EventTime": "2024-05-21T12:32:36.619230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3u2BhbIZsfbcug6f"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "00220844-e766-4ab8-bdb2-eff163b6c0ac", "DetectTime": "2024-05-21T12:32:36.623603+00:00", "EventTime": "2024-05-21T12:32:36.623620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COdBKXiX0mqWxjFlb"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "44e8c72b-7f4c-426d-b722-f56b065001cd", "DetectTime": "2024-05-21T12:32:36.628202+00:00", "EventTime": "2024-05-21T12:32:36.628221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBwuR2r6QSxzGslI1"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "d7b33e8e-f6fc-4067-bcfc-37d2d2941597", "DetectTime": "2024-05-21T12:32:36.633040+00:00", "EventTime": "2024-05-21T12:32:36.633069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGSfx94A03xXL8LYV8", "Cf80Ur2RU8O3uUWcfk", "CaPWSg1nSHAt2a5Aye", "CgGvYS3o5d6jjOzEl"], "accumulated_threat_level": 3.7, "timewindow": 69} +{"Format": "IDEA0", "ID": "3d8bab20-6a2b-44fb-93f0-c9b93a0e59cd", "DetectTime": "2024-05-21T12:32:36.653666+00:00", "EventTime": "2024-05-21T12:32:36.653689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5O8Zp40BKo2nYj9y1"], "accumulated_threat_level": 4.5, "timewindow": 69} +{"Format": "IDEA0", "ID": "8c5b6674-639d-4bfa-9af0-5a03fd887b0d", "DetectTime": "2024-05-21T12:32:36.666023+00:00", "EventTime": "2024-05-21T12:32:36.666041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NWqC4odPs2rJy4A4"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "c9625ac2-f554-491c-87a5-9c06e09e744e", "DetectTime": "2024-05-21T12:32:36.678354+00:00", "EventTime": "2024-05-21T12:32:36.678373+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NWqC4odPs2rJy4A4"], "accumulated_threat_level": 1.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "50aae951-45ab-44e2-aa04-df32cdacf875", "DetectTime": "2024-05-21T12:32:36.683832+00:00", "EventTime": "2024-05-21T12:32:36.683850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAERe610vDQVRUBjA1"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "a70a77b8-f2b1-44ee-a0c7-191493ae0475", "DetectTime": "2024-05-21T12:32:36.697162+00:00", "EventTime": "2024-05-21T12:32:36.697184+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8iI7r4Cj2WEDWPtFk"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "62ddc640-e74b-485d-be08-08d777bf0e63", "DetectTime": "2024-05-21T12:32:36.711675+00:00", "EventTime": "2024-05-21T12:32:36.711692+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8iI7r4Cj2WEDWPtFk"], "accumulated_threat_level": 1.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "11ae1925-7f23-495e-b371-612bc6b4e791", "DetectTime": "2024-05-21T12:32:36.724876+00:00", "EventTime": "2024-05-21T12:32:36.724895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXEUJY2rxJ6wLhDBjb"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "e10dfe33-751d-47df-b83f-cc42a202c726", "DetectTime": "2024-05-21T12:32:36.737016+00:00", "EventTime": "2024-05-21T12:32:36.737039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxICs4cvbYLgxo683"], "accumulated_threat_level": 5.3, "timewindow": 69} +{"Format": "IDEA0", "ID": "8d0b93b0-a272-4fef-b8e6-8bc9d7c894e0", "DetectTime": "2024-05-21T12:32:36.749606+00:00", "EventTime": "2024-05-21T12:32:36.749626+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXEUJY2rxJ6wLhDBjb"], "accumulated_threat_level": 2.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "c7c3be3d-21a0-44b5-8df7-c72928cfad25", "DetectTime": "2024-05-21T12:32:36.760091+00:00", "EventTime": "2024-05-21T12:32:36.760109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAUCA4NBIQKLslUe8"], "accumulated_threat_level": 6.1, "timewindow": 69} +{"Format": "IDEA0", "ID": "5681981c-0b39-4599-9b57-7ba16be41a53", "DetectTime": "2024-05-21T12:32:36.774011+00:00", "EventTime": "2024-05-21T12:32:36.774029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CECg511reavry5X5wh"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 69} +{"Format": "IDEA0", "ID": "3e742908-b74a-46cd-8e6b-aba4e8de5f6b", "DetectTime": "2024-05-21T12:32:36.784602+00:00", "EventTime": "2024-05-21T12:32:36.784620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjxH13c3l1AiXtWc"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "076029ed-92e6-4a30-a570-9813184b1f15", "DetectTime": "2024-05-21T12:32:36.797741+00:00", "EventTime": "2024-05-21T12:32:36.797761+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjxH13c3l1AiXtWc"], "accumulated_threat_level": 2.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "b55d6b49-dc21-4b09-8ec1-4d6c1d0a0625", "DetectTime": "2024-05-21T12:32:36.810032+00:00", "EventTime": "2024-05-21T12:32:36.810050+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQudqk80eWco3hK6"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "a266703f-18f7-49c5-8f9f-0597ce9f219b", "DetectTime": "2024-05-21T12:32:36.820954+00:00", "EventTime": "2024-05-21T12:32:36.820972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYTnB4ePMDpDLdU09"], "accumulated_threat_level": 7.699999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "10b0e4b4-b583-4c57-a03f-55a97d2a20f8", "DetectTime": "2024-05-21T12:32:36.833071+00:00", "EventTime": "2024-05-21T12:32:36.833091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQudqk80eWco3hK6"], "accumulated_threat_level": 3.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "1660961b-930f-436c-a011-b3c728e11a7d", "DetectTime": "2024-05-21T12:32:36.838161+00:00", "EventTime": "2024-05-21T12:32:36.838181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs5WXO3gj5XQPaqNs6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "f75dfd5d-5b96-4359-85c5-451c178ea22a", "DetectTime": "2024-05-21T12:32:36.854107+00:00", "EventTime": "2024-05-21T12:32:36.854125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Xvkt7tBarnFEurc"], "accumulated_threat_level": 8.5, "timewindow": 69} +{"Format": "IDEA0", "ID": "38ce95dd-09c2-4081-860f-ade27e952d6b", "DetectTime": "2024-05-21T12:32:36.954255+00:00", "EventTime": "2024-05-21T12:32:36.954275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzIltI2YcMhoopDjbe"], "accumulated_threat_level": 9.3, "timewindow": 69} +{"Format": "IDEA0", "ID": "2377ee96-0023-486f-97ce-e8ce21b58e00", "DetectTime": "2024-05-21T12:32:37.002138+00:00", "EventTime": "2024-05-21T12:32:37.002156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClB8o52xsPyJt9QZ05"], "accumulated_threat_level": 10.100000000000001, "timewindow": 69} +{"Format": "IDEA0", "ID": "b53646c8-3371-4bcb-8804-78ae182241cf", "DetectTime": "2024-05-21T12:32:37.033254+00:00", "EventTime": "2024-05-21T12:32:37.033272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqlC6ehz3soCuiMj"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "b0354d02-f722-49f5-a7c3-2c95ae574c2e", "DetectTime": "2024-05-21T12:32:37.065641+00:00", "EventTime": "2024-05-21T12:32:37.065662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtH4c628WAFL4jo7d8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 69} +{"Format": "IDEA0", "ID": "7ad5a00f-b9c3-4d65-9e51-5181472f72aa", "DetectTime": "2024-05-21T12:32:37.091188+00:00", "EventTime": "2024-05-21T12:32:37.091207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxFtMc2rbPe3Meczmg"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "d6fec20b-6b4f-47b1-97de-2bc411decf74", "DetectTime": "2024-05-21T12:32:37.140618+00:00", "EventTime": "2024-05-21T12:32:37.140638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chse6s4aVrGpenB21l"], "accumulated_threat_level": 11.700000000000003, "timewindow": 69} +{"Format": "IDEA0", "ID": "a267e8d0-aed9-4ea0-a3e6-e8c042fb4b08", "DetectTime": "2024-05-21T12:32:37.166890+00:00", "EventTime": "2024-05-21T12:32:37.166912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerGxrzWKCEN6Qsd6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "79e79299-db24-45ae-a8ae-fbe84a80fe71", "DetectTime": "2024-05-21T12:32:37.206746+00:00", "EventTime": "2024-05-21T12:32:37.206771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNWKB3g6FqXCD8aIk"], "accumulated_threat_level": 12.500000000000004, "timewindow": 69} +{"Format": "Json", "ID": "79e79299-db24-45ae-a8ae-fbe84a80fe71", "DetectTime": "2024-05-21T12:32:37.206746+00:00", "EventTime": "2024-05-21T12:32:37.206771+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "1970-01-03T20:36:31.539008+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 69. (real time 2024/05/21 12:32:37.489089)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 69, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "62572165-5291-4b02-8005-f972ae6005aa", "DetectTime": "2024-05-21T12:32:37.493264+00:00", "EventTime": "2024-05-21T12:32:37.493282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK0AwQR5rNKYrF0Ji"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "c9288206-a048-4bba-a758-1a640494b795", "DetectTime": "2024-05-21T12:32:37.497621+00:00", "EventTime": "2024-05-21T12:32:37.497639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJewofJjqWkXgG38"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "b45127ce-d2ca-4ee6-8552-9001c37b56d5", "DetectTime": "2024-05-21T12:32:37.501931+00:00", "EventTime": "2024-05-21T12:32:37.501949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY2kcP3MdblJTaarub"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "fd55f1fe-a9f0-4d7a-9483-2b5b10feb1bb", "DetectTime": "2024-05-21T12:32:37.625152+00:00", "EventTime": "2024-05-21T12:32:37.625170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LLNDoXH3okc2HLh"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "7cef5dec-55a2-4bc4-a0c1-ec5a902249c9", "DetectTime": "2024-05-21T12:32:37.646329+00:00", "EventTime": "2024-05-21T12:32:37.646349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.42.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuU9wK1ppojHwEBbOk"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "3054c13f-d700-4373-a27e-1d362f59b3c1", "DetectTime": "2024-05-21T12:32:37.688164+00:00", "EventTime": "2024-05-21T12:32:37.688187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ85sEwikFAWwYBl"], "accumulated_threat_level": 0.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "3940f532-0aae-44b8-b82f-635dab6f9a27", "DetectTime": "2024-05-21T12:32:37.950667+00:00", "EventTime": "2024-05-21T12:32:37.950689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOwjx3WnY3D0erxEj"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "fd98bf20-bb13-426a-a2eb-277ad5c8e33a", "DetectTime": "2024-05-21T12:32:38.024125+00:00", "EventTime": "2024-05-21T12:32:38.024144+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9z2cZXiDov59oSod"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "79655edd-6cb8-4113-943d-c76da7a3350d", "DetectTime": "2024-05-21T12:32:38.037890+00:00", "EventTime": "2024-05-21T12:32:38.037910+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9z2cZXiDov59oSod"], "accumulated_threat_level": 3.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "c831064f-ea48-4fa2-a354-97a11b06ce35", "DetectTime": "2024-05-21T12:32:38.044059+00:00", "EventTime": "2024-05-21T12:32:38.044079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiEb63T7qidHPXYll"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "401b0162-00d2-49df-9409-a8651c8fdd65", "DetectTime": "2024-05-21T12:32:38.048800+00:00", "EventTime": "2024-05-21T12:32:38.048823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgHP7GuXQSu8Pu5f"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "39de45ea-d42d-4738-bb30-89dd70d1b136", "DetectTime": "2024-05-21T12:32:38.053778+00:00", "EventTime": "2024-05-21T12:32:38.053799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.80.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AQMk4qXooc8amJAb"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "78fa8e5c-ee3a-423f-a6b8-3ce1af68f34d", "DetectTime": "2024-05-21T12:32:38.059230+00:00", "EventTime": "2024-05-21T12:32:38.059252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5AYR1Z3nWlojkjh"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "dfbcd58b-828d-4135-aae7-b860ade770bb", "DetectTime": "2024-05-21T12:32:38.064623+00:00", "EventTime": "2024-05-21T12:32:38.064643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7Czm1Pj0iH7u2iah"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "4119662f-8628-43aa-8ae3-d9c2dadb10ca", "DetectTime": "2024-05-21T12:32:38.069712+00:00", "EventTime": "2024-05-21T12:32:38.069732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbFw5u1t0Yed5a5OVl"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "664c039d-a00c-42b0-bbd4-6de62431017d", "DetectTime": "2024-05-21T12:32:38.198796+00:00", "EventTime": "2024-05-21T12:32:38.198813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8KRP1DWubNEDD07l"], "accumulated_threat_level": 1.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "5cb8ea2e-d967-4008-b86d-ee0747c283b1", "DetectTime": "2024-05-21T12:32:38.203510+00:00", "EventTime": "2024-05-21T12:32:38.203528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCpiecSWNWyardzDh"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "28f3d9cc-a5e5-4b43-b15b-0b129cf99bb8", "DetectTime": "2024-05-21T12:32:38.274949+00:00", "EventTime": "2024-05-21T12:32:38.274967+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7V8DdFveWtWwEAh"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "b712d8a4-1ef0-471d-9131-7e320cbcce2d", "DetectTime": "2024-05-21T12:32:38.288266+00:00", "EventTime": "2024-05-21T12:32:38.288286+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7V8DdFveWtWwEAh"], "accumulated_threat_level": 4.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "a032ad92-d862-401e-955b-57c0ec9cb6bd", "DetectTime": "2024-05-21T12:32:38.295969+00:00", "EventTime": "2024-05-21T12:32:38.295987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.11.249.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpVLb02uHnTVgfqWP5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "2112444a-e9a0-4807-89a2-ec351975ecf4", "DetectTime": "2024-05-21T12:32:38.300342+00:00", "EventTime": "2024-05-21T12:32:38.300359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqyBAv2tikaXA5kUT6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "26352b45-84e2-48c1-b321-0367500deac9", "DetectTime": "2024-05-21T12:32:38.304682+00:00", "EventTime": "2024-05-21T12:32:38.304700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxPBR3lGsQrFnCP6g"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "feb47e22-3333-4c27-8bf7-858c6019853e", "DetectTime": "2024-05-21T12:32:38.309610+00:00", "EventTime": "2024-05-21T12:32:38.309631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuYo8B4OQBHt7SdGlb"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "013293d5-e1a2-45e4-8a42-c7f8a08b3ef7", "DetectTime": "2024-05-21T12:32:38.699771+00:00", "EventTime": "2024-05-21T12:32:38.699792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUv8RBrBhSpaeqUJg"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "538b95d5-dcb1-4f80-9223-6b95e8d46c42", "DetectTime": "2024-05-21T12:32:38.713158+00:00", "EventTime": "2024-05-21T12:32:38.713178+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUv8RBrBhSpaeqUJg"], "accumulated_threat_level": 4.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "aea7f29e-8cce-4ba4-83dd-a2027ddb6a2b", "DetectTime": "2024-05-21T12:32:38.726641+00:00", "EventTime": "2024-05-21T12:32:38.726663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtoGcqALDp5ND2g5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 69} +{"Format": "IDEA0", "ID": "a0d1bd50-6eed-4c9b-9014-19bfc7e50208", "DetectTime": "2024-05-21T12:32:38.738096+00:00", "EventTime": "2024-05-21T12:32:38.738113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zLGB45o5FhoyTIPa"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "540fff17-9928-4fd6-895e-54200384d70f", "DetectTime": "2024-05-21T12:32:38.751154+00:00", "EventTime": "2024-05-21T12:32:38.751176+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zLGB45o5FhoyTIPa"], "accumulated_threat_level": 5.0, "timewindow": 21} +{"Format": "IDEA0", "ID": "3d8ccbca-2eec-4bc0-8ca9-496282b403b7", "DetectTime": "2024-05-21T12:32:38.757651+00:00", "EventTime": "2024-05-21T12:32:38.757674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuqYk2LCbmhf3O22a"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "a4734085-7cd9-4a21-afec-1fcf068894a1", "DetectTime": "2024-05-21T12:32:38.763707+00:00", "EventTime": "2024-05-21T12:32:38.763728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYxvJ1vqBd15g5ur5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "a80875e6-822b-46ae-b42b-109fdbf83181", "DetectTime": "2024-05-21T12:32:38.775150+00:00", "EventTime": "2024-05-21T12:32:38.775168+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiZAX3G12ByjkVbgf"], "accumulated_threat_level": 0, "timewindow": 21} +{"Format": "IDEA0", "ID": "1da3cea8-c555-4ca2-a04f-243e3cc03e1b", "DetectTime": "2024-05-21T12:32:38.788268+00:00", "EventTime": "2024-05-21T12:32:38.788288+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiZAX3G12ByjkVbgf"], "accumulated_threat_level": 5.5, "timewindow": 21} +{"Format": "IDEA0", "ID": "ed086057-fbbf-41f8-b546-09ac17e0e401", "DetectTime": "2024-05-21T12:32:38.806640+00:00", "EventTime": "2024-05-21T12:32:38.806659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc1gJ63TtZd63miS73"], "accumulated_threat_level": 3.2, "timewindow": 69} +{"Format": "IDEA0", "ID": "e05805f8-2769-4b92-a2e9-d638b3cdce4f", "DetectTime": "2024-05-21T12:32:38.820462+00:00", "EventTime": "2024-05-21T12:32:38.820484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cih6fm4NVgzFyjYr9j"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "c65cdc78-0bc2-4a50-b38d-8cdcf5cb3b4c", "DetectTime": "2024-05-21T12:32:38.865228+00:00", "EventTime": "2024-05-21T12:32:38.865251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv95sa4jtlwC75geDk"], "accumulated_threat_level": 4.0, "timewindow": 69} +{"Format": "IDEA0", "ID": "3f46b261-e2b5-4893-9872-85f85a2d7da5", "DetectTime": "2024-05-21T12:32:38.877215+00:00", "EventTime": "2024-05-21T12:32:38.877236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTCYH3GREBuUiRS38"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "eb811ca0-dba7-44bf-b30c-3c7e47d9a094", "DetectTime": "2024-05-21T12:32:38.916419+00:00", "EventTime": "2024-05-21T12:32:38.916440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBoJl4VLPGt5KBPvf"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "5f7ee8d9-49ab-4a76-b4b0-5b0b4f034657", "DetectTime": "2024-05-21T12:32:38.968856+00:00", "EventTime": "2024-05-21T12:32:38.968874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD6PBuUhluajqj09"], "accumulated_threat_level": 4.8, "timewindow": 69} +{"Format": "IDEA0", "ID": "8d987814-533d-4bb9-9947-bc780816e720", "DetectTime": "2024-05-21T12:32:38.976442+00:00", "EventTime": "2024-05-21T12:32:38.976462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7mPt44XONPLEL5yk3"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "e528bc6f-4d1a-4404-9f1a-6601fc14ab57", "DetectTime": "2024-05-21T12:32:39.010863+00:00", "EventTime": "2024-05-21T12:32:39.010882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVZpR2vODLkh7YvCc"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "c50fc406-b441-4b39-bce3-45b9cad1d99c", "DetectTime": "2024-05-21T12:32:39.040740+00:00", "EventTime": "2024-05-21T12:32:39.040760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UJnV1K4pd7Q6qua2"], "accumulated_threat_level": 5.6, "timewindow": 69} +{"Format": "IDEA0", "ID": "4fa03ed2-eba1-4ef3-98b3-cd34bc81f636", "DetectTime": "2024-05-21T12:32:39.075555+00:00", "EventTime": "2024-05-21T12:32:39.075575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFTLY2gwIROkIdZc9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 69} +{"Format": "IDEA0", "ID": "669e65f8-b975-485f-9046-f0c3004206f6", "DetectTime": "2024-05-21T12:32:39.113169+00:00", "EventTime": "2024-05-21T12:32:39.113187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.76.202"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 95.104.76.202. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0THDB4YptifEJk5Of"], "accumulated_threat_level": 7.199999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e4950169-cf16-465c-9f83-e05027849cf5", "DetectTime": "2024-05-21T12:32:39.150558+00:00", "EventTime": "2024-05-21T12:32:39.150576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.14.194.158"]}], "Attach": [{"Content": "Connection to unknown destination port 8944/UDP destination IP 186.14.194.158. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmjhU63RNohgw8XMOi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "1edb334c-9bfe-4bb3-8ab4-c4d8b90d1b36", "DetectTime": "2024-05-21T12:32:39.250869+00:00", "EventTime": "2024-05-21T12:32:39.250888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx95u71jCz7KF8EKH3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "dd00be5f-d665-46ce-9049-09f0dee3acd5", "DetectTime": "2024-05-21T12:32:39.508926+00:00", "EventTime": "2024-05-21T12:32:39.508944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKm7s4U3mLpZSF7S7"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "f6f376c4-827c-45f8-87f9-92e88cf263bb", "DetectTime": "2024-05-21T12:32:39.513890+00:00", "EventTime": "2024-05-21T12:32:39.513909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbyq9F3JYhS4t9t92k"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "3e46882f-7d84-42f3-8512-1fca3996fd71", "DetectTime": "2024-05-21T12:32:39.761703+00:00", "EventTime": "2024-05-21T12:32:39.761723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhHmy32L6W858e3Aa", "C9d2M41KFgvcsTAFXf", "CgAChQ1V0662lIa6P8", "CQVfsC17OM0LfpzH1g"], "accumulated_threat_level": 1.3, "timewindow": 70} +{"Format": "IDEA0", "ID": "674b0881-a369-4318-98a2-af93e143edd1", "DetectTime": "2024-05-21T12:32:40.195236+00:00", "EventTime": "2024-05-21T12:32:40.195257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.42.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ8CcB1lkupXTWhBTb"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "04fe60b1-88c8-449c-9268-e7ab7a5762a6", "DetectTime": "2024-05-21T12:32:40.780327+00:00", "EventTime": "2024-05-21T12:32:40.780347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.191.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVo4H142V8FTyAlac6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "b6f3cf15-7419-43f9-abb5-c2a2f35a8544", "DetectTime": "2024-05-21T12:32:41.121280+00:00", "EventTime": "2024-05-21T12:32:41.121301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.80.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffVwz1FVTh4nf9av7"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "99e4da52-aaf3-4f9d-a8fd-1360617c9dae", "DetectTime": "2024-05-21T12:32:41.167269+00:00", "EventTime": "2024-05-21T12:32:41.167291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.11.249.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hcqD2SM4YwjgPcy5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "676af1fc-d22a-49c4-beca-ca825b445293", "DetectTime": "2024-05-21T12:32:41.343615+00:00", "EventTime": "2024-05-21T12:32:41.343638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxY6Ch2cjJhCWZ3J2c", "CzHQtm3GXDvrBAWgI9", "CK4zT91xw9ZgK92aKk", "CK9EIo1B52pDjFOHi7"], "accumulated_threat_level": 1.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "328a7009-32a7-4b06-84ea-6f826bd64ab5", "DetectTime": "2024-05-21T12:32:41.698142+00:00", "EventTime": "2024-05-21T12:32:41.698161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39EuS2lPLK2m5E1r3"], "accumulated_threat_level": 2.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "2dcc81c2-b9ff-4227-ac51-0f67116cbae8", "DetectTime": "2024-05-21T12:32:41.734843+00:00", "EventTime": "2024-05-21T12:32:41.734861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfUud4Bz6q26AcO71"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 70} +{"Format": "IDEA0", "ID": "38a65813-f5fe-4295-a2f9-5d78e3ec2939", "DetectTime": "2024-05-21T12:32:41.783590+00:00", "EventTime": "2024-05-21T12:32:41.783607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qLrD2Dnz0i5bL1u8"], "accumulated_threat_level": 4.2, "timewindow": 70} +{"Format": "IDEA0", "ID": "e157657a-5fd7-4b48-9c2f-8519dfba6f43", "DetectTime": "2024-05-21T12:32:41.832368+00:00", "EventTime": "2024-05-21T12:32:41.832386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9eE6f2Xyttku0YV6"], "accumulated_threat_level": 5.0, "timewindow": 70} +{"Format": "IDEA0", "ID": "4197a0a4-114d-4ef3-b1dd-835b1052a9c9", "DetectTime": "2024-05-21T12:32:41.868118+00:00", "EventTime": "2024-05-21T12:32:41.868136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9lY0O1XKWSVnbB0vc"], "accumulated_threat_level": 5.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "1fb26238-9c2f-43a5-8de5-57997452aabc", "DetectTime": "2024-05-21T12:32:41.917343+00:00", "EventTime": "2024-05-21T12:32:41.917364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clw8eF1us5l4ejZng2"], "accumulated_threat_level": 6.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "86b2e206-37ab-4c57-adab-4637dd9c71a5", "DetectTime": "2024-05-21T12:32:42.219774+00:00", "EventTime": "2024-05-21T12:32:42.219793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck6AKW2RhRbhPkAvY5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "974c900e-1c72-4bc5-af2d-d093f5f358c0", "DetectTime": "2024-05-21T12:32:42.498857+00:00", "EventTime": "2024-05-21T12:32:42.498880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUmxNX5J3SbVGkv8"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "57c47248-7ad8-4f03-b910-b6738d61f7e8", "DetectTime": "2024-05-21T12:32:42.509214+00:00", "EventTime": "2024-05-21T12:32:42.509234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoXGn4FVw5kiviRUl"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "5c1854c6-bcbc-4b36-b545-39d2820d8404", "DetectTime": "2024-05-21T12:32:42.514835+00:00", "EventTime": "2024-05-21T12:32:42.514855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTCJ34oqlDaj3G0M8"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "f3b71c05-bce7-4357-ac5d-8cea5efff035", "DetectTime": "2024-05-21T12:32:42.519471+00:00", "EventTime": "2024-05-21T12:32:42.519491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqt6QQ2mQCioiYftt7"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "c40d4a08-d9ff-4977-adf1-ff89d49086ee", "DetectTime": "2024-05-21T12:32:42.525932+00:00", "EventTime": "2024-05-21T12:32:42.525954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CayAX31VYUH6bE0vZd"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "703e916f-83fc-4fda-ac87-a9983bff7806", "DetectTime": "2024-05-21T12:32:42.644560+00:00", "EventTime": "2024-05-21T12:32:42.644583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMnrC8wneypCIgn1"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "36af2999-7c0c-4f48-a83d-3b0e55bb6555", "DetectTime": "2024-05-21T12:32:42.701941+00:00", "EventTime": "2024-05-21T12:32:42.701999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpxKIKCK0r3yWTn2"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 70} +{"Format": "IDEA0", "ID": "9629d09f-68c8-4bf1-8a1f-c9919f91f8e5", "DetectTime": "2024-05-21T12:32:42.721562+00:00", "EventTime": "2024-05-21T12:32:42.721584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2oBes4wMD6IRTT41l"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "509edccc-145e-44c6-8d9b-4886e9d4d8a3", "DetectTime": "2024-05-21T12:32:42.726611+00:00", "EventTime": "2024-05-21T12:32:42.726629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CffAsn4CoNvvCptqB9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "6912c706-9761-48dc-9b1f-430a3a569c32", "DetectTime": "2024-05-21T12:32:42.746223+00:00", "EventTime": "2024-05-21T12:32:42.746243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.166.143.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANw8P1FN7L00M0gn6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "58296a92-ab83-42a7-a878-6a53a37cceb3", "DetectTime": "2024-05-21T12:32:42.818580+00:00", "EventTime": "2024-05-21T12:32:42.818598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJjvm3g2gKxh8Bnmd"], "accumulated_threat_level": 8.2, "timewindow": 70} +{"Format": "IDEA0", "ID": "47eab2a1-475d-459e-ac1f-77133defe9b8", "DetectTime": "2024-05-21T12:32:42.857036+00:00", "EventTime": "2024-05-21T12:32:42.857056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyQ6u23Ut4oq95k0Kd"], "accumulated_threat_level": 9.0, "timewindow": 70} +{"Format": "IDEA0", "ID": "20f94e6c-25be-4e6e-ad47-ba12d721fed1", "DetectTime": "2024-05-21T12:32:42.893307+00:00", "EventTime": "2024-05-21T12:32:42.893326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILI8I2jWsCdlYFmdk"], "accumulated_threat_level": 9.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "9397226c-d2c7-4a51-99dc-0ce5a98d660b", "DetectTime": "2024-05-21T12:32:43.138365+00:00", "EventTime": "2024-05-21T12:32:43.138386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDEjb5WmbpflloA6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "a7099082-5abe-4398-9fc9-a79c65825edd", "DetectTime": "2024-05-21T12:32:43.181613+00:00", "EventTime": "2024-05-21T12:32:43.181634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI6obe4bzNu1cs0WV3"], "accumulated_threat_level": 10.600000000000001, "timewindow": 70} +{"Format": "IDEA0", "ID": "fc5f7baa-5b32-419c-a0fb-b3f613ed21e2", "DetectTime": "2024-05-21T12:32:43.200062+00:00", "EventTime": "2024-05-21T12:32:43.200082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3t3Mb385iPRAIxla9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "f937fe5d-9a5a-420b-9ba9-dd86f951af10", "DetectTime": "2024-05-21T12:32:43.259232+00:00", "EventTime": "2024-05-21T12:32:43.259253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CId6Dm4q5spf6Dwn94"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "97714dd5-87d6-41d1-894f-d4a38d2d163b", "DetectTime": "2024-05-21T12:32:43.264337+00:00", "EventTime": "2024-05-21T12:32:43.264355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsuHh3XDl4BYIUFld"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "0c3810f7-efb2-47a2-9b3b-de9cc6d44659", "DetectTime": "2024-05-21T12:32:43.276140+00:00", "EventTime": "2024-05-21T12:32:43.276158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUK3wC4Sc2g2ps1Mf8"], "accumulated_threat_level": 11.400000000000002, "timewindow": 70} +{"Format": "IDEA0", "ID": "9227994a-b515-4061-af7c-f95e1ab51889", "DetectTime": "2024-05-21T12:32:43.337902+00:00", "EventTime": "2024-05-21T12:32:43.337926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbW43P34kMgpT8W0ub"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "2b622f50-2214-4328-9725-3c7629ea1435", "DetectTime": "2024-05-21T12:32:43.378059+00:00", "EventTime": "2024-05-21T12:32:43.378079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGovT3kSYl6sKd9Ll"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "ff91fa2f-4714-4b24-aeec-11b7903b10d9", "DetectTime": "2024-05-21T12:32:43.382890+00:00", "EventTime": "2024-05-21T12:32:43.382909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmwibu2un7YqhIcgl4"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "2a71ea9e-ca1f-4be5-85fd-87b45bf72837", "DetectTime": "2024-05-21T12:32:43.414048+00:00", "EventTime": "2024-05-21T12:32:43.414067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cop8q64rvQpAF06MK6"], "accumulated_threat_level": 12.200000000000003, "timewindow": 70} +{"Format": "Json", "ID": "2a71ea9e-ca1f-4be5-85fd-87b45bf72837", "DetectTime": "2024-05-21T12:32:43.414048+00:00", "EventTime": "2024-05-21T12:32:43.414067+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "1970-01-03T21:08:45.959670+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2024/05/21 12:32:43.673258)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 70, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "a6bcaf0a-64fd-49c4-bfd7-07f4c74ce1c6", "DetectTime": "2024-05-21T12:32:43.677790+00:00", "EventTime": "2024-05-21T12:32:43.677819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C642d22qATWbNhGkw9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "6e098816-7135-460f-9121-e49b326b03b7", "DetectTime": "2024-05-21T12:32:43.683076+00:00", "EventTime": "2024-05-21T12:32:43.683098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXD4JahjH2cHJP2Ii"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "a933790a-a9a0-4611-ac6c-44a9d21d2a14", "DetectTime": "2024-05-21T12:32:43.726279+00:00", "EventTime": "2024-05-21T12:32:43.726301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3FSAu29EW5mVwDA7e"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "3f25c3cf-4a1a-479f-8acc-b736a2cbd6e6", "DetectTime": "2024-05-21T12:32:43.781839+00:00", "EventTime": "2024-05-21T12:32:43.781859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJeYhk2Q7nHYo5ZJo1"], "accumulated_threat_level": 1.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "571a1788-2d85-466d-8b19-db77b73938aa", "DetectTime": "2024-05-21T12:32:43.808309+00:00", "EventTime": "2024-05-21T12:32:43.808330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1o412toDWUagiWq9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "5d773922-0e15-4cb8-899f-9a7c64f891c7", "DetectTime": "2024-05-21T12:32:43.839898+00:00", "EventTime": "2024-05-21T12:32:43.839915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUjsmZsXCO69SV72"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 70} +{"Format": "IDEA0", "ID": "63250822-1719-4386-bb94-fb89f61f90ee", "DetectTime": "2024-05-21T12:32:43.877393+00:00", "EventTime": "2024-05-21T12:32:43.877412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1pVbe3uE2L9y2vC36"], "accumulated_threat_level": 3.2, "timewindow": 70} +{"Format": "IDEA0", "ID": "64633e44-707d-4dc2-b23d-62a0c796a880", "DetectTime": "2024-05-21T12:32:43.912847+00:00", "EventTime": "2024-05-21T12:32:43.912865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce2J5l4JcWceGF1qW8"], "accumulated_threat_level": 4.0, "timewindow": 70} +{"Format": "IDEA0", "ID": "fdfcb36a-f41b-4d18-b1ac-a9cdccfae824", "DetectTime": "2024-05-21T12:32:43.938764+00:00", "EventTime": "2024-05-21T12:32:43.938785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTjO624mKgpSlft6e"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "edc67201-b0de-4f5d-bb15-2c68ab40b8f2", "DetectTime": "2024-05-21T12:32:43.976525+00:00", "EventTime": "2024-05-21T12:32:43.976546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFw9Lc3mHWbfDthX39"], "accumulated_threat_level": 4.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "371ab060-ef4e-44bb-9563-c3c68124b4df", "DetectTime": "2024-05-21T12:32:43.981857+00:00", "EventTime": "2024-05-21T12:32:43.981877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1dRY2bRZrfNjXFW6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "326f658b-c683-4171-9e9f-aaf1c4e365c4", "DetectTime": "2024-05-21T12:32:44.033200+00:00", "EventTime": "2024-05-21T12:32:44.033222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRONpC3c7H2GiUGH88"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "fb3c4b69-ea38-4904-8288-e6b02a4516c9", "DetectTime": "2024-05-21T12:32:44.038756+00:00", "EventTime": "2024-05-21T12:32:44.038781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWeUXN2x6qZEoqui5k"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "03bdae8e-ec22-4ff6-b3fc-1cc96f6c4432", "DetectTime": "2024-05-21T12:32:44.093006+00:00", "EventTime": "2024-05-21T12:32:44.093028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDhnr42WVBFJxpFwE4"], "accumulated_threat_level": 5.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "c0b85418-78c6-40e2-8abb-2bd003716d5f", "DetectTime": "2024-05-21T12:32:44.107754+00:00", "EventTime": "2024-05-21T12:32:44.107773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBU4LTLk6Gau7IMl6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "f0e9b055-587c-4a1d-9701-183dd28186bd", "DetectTime": "2024-05-21T12:32:44.146335+00:00", "EventTime": "2024-05-21T12:32:44.146358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYIYgc3GAVZaFuM5j"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "79a71e3e-3129-4aa2-8755-3ce371b151bf", "DetectTime": "2024-05-21T12:32:44.179723+00:00", "EventTime": "2024-05-21T12:32:44.179744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJwOn255FYC1RB3Gg"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "93989a60-26d8-4f7f-b631-81e1aa75d6ee", "DetectTime": "2024-05-21T12:32:44.192132+00:00", "EventTime": "2024-05-21T12:32:44.192151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPuab19wQ5pmWVOAk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 70} +{"Format": "IDEA0", "ID": "8e0becd1-651f-4438-8b47-84a297eba3aa", "DetectTime": "2024-05-21T12:32:44.649800+00:00", "EventTime": "2024-05-21T12:32:44.649820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxELfs4OIU7zEzzH57"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "9162cf97-8de3-4b20-9501-be1f0cd69a8f", "DetectTime": "2024-05-21T12:32:44.676803+00:00", "EventTime": "2024-05-21T12:32:44.676826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYrWG1EbNapjsN1R5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "5c26943a-6768-4fb7-8073-08af39842f4c", "DetectTime": "2024-05-21T12:32:44.681784+00:00", "EventTime": "2024-05-21T12:32:44.681802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq5ritCGC2OqToIR5"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "2683c025-da43-495e-aff1-6299425e39ad", "DetectTime": "2024-05-21T12:32:44.734750+00:00", "EventTime": "2024-05-21T12:32:44.734768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqnsZ71ZzdQs00fcPa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "a5cf8f48-3fde-4fa3-a8e0-4ed005a56381", "DetectTime": "2024-05-21T12:32:44.755155+00:00", "EventTime": "2024-05-21T12:32:44.755179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMM1g3y0wflaitBqk"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "58e0e778-2477-4fcb-b3e4-d6b2a666f9c7", "DetectTime": "2024-05-21T12:32:44.787116+00:00", "EventTime": "2024-05-21T12:32:44.787137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCEj42SVZfonHR343"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "76736c6e-c739-444e-88cd-9581f15e48e9", "DetectTime": "2024-05-21T12:32:44.817287+00:00", "EventTime": "2024-05-21T12:32:44.817307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAV9P1JXrrouThYgk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "52e2bb34-be7a-49c7-9c3a-e142e4ab76fc", "DetectTime": "2024-05-21T12:32:44.850990+00:00", "EventTime": "2024-05-21T12:32:44.851009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4VDm4L7N9fmsoMb9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "5bdd45c6-0021-4833-8ff3-a070ad67c64e", "DetectTime": "2024-05-21T12:32:44.856399+00:00", "EventTime": "2024-05-21T12:32:44.856421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjm5j1b682gGpKLS9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "14a9e3a6-97ee-4ae4-98c8-0e46292cd059", "DetectTime": "2024-05-21T12:32:44.915179+00:00", "EventTime": "2024-05-21T12:32:44.915197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxRVU1qHmx3l1lNHl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "6707b049-8bab-468f-a153-cd821c082a8c", "DetectTime": "2024-05-21T12:32:44.932465+00:00", "EventTime": "2024-05-21T12:32:44.932488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpjTw1kLWRpXvJyD8"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "cf8134fc-8150-4b53-9b8a-34fafce4b745", "DetectTime": "2024-05-21T12:32:44.973626+00:00", "EventTime": "2024-05-21T12:32:44.973645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJU1812ycBAdBsCfZ8"], "accumulated_threat_level": 9.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "37019e20-308a-4380-8ad4-194fe2d6a348", "DetectTime": "2024-05-21T12:32:45.010620+00:00", "EventTime": "2024-05-21T12:32:45.010639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3gjD2W2PY45fNqbd"], "accumulated_threat_level": 10.4, "timewindow": 70} +{"Format": "IDEA0", "ID": "cc1fde17-b6a0-4d8f-a113-486af9188d62", "DetectTime": "2024-05-21T12:32:45.048347+00:00", "EventTime": "2024-05-21T12:32:45.048367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFiD2c2ropJKNtGMs3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 70} +{"Format": "IDEA0", "ID": "0229de5d-2bdb-40e6-af12-a5ce6cb36f93", "DetectTime": "2024-05-21T12:32:45.330370+00:00", "EventTime": "2024-05-21T12:32:45.330391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGReZ3eWfvSRhUmbc"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "cd4e83c8-6cc4-4073-a44e-f502395d2573", "DetectTime": "2024-05-21T12:32:45.335953+00:00", "EventTime": "2024-05-21T12:32:45.335974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYMzqI3dzp63MOPsV9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "02a06c6e-b6ce-4c59-967b-35a8a9363427", "DetectTime": "2024-05-21T12:32:45.340518+00:00", "EventTime": "2024-05-21T12:32:45.340537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbG7l53ruhtKaaAtjc"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "fe3ac44d-7bf4-4e58-9600-035ae3634f60", "DetectTime": "2024-05-21T12:32:45.345523+00:00", "EventTime": "2024-05-21T12:32:45.345546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cckv8u3J7oTlOR9jJ9"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "006f42ea-b8cb-4b6d-8191-27f3993ea060", "DetectTime": "2024-05-21T12:32:45.370400+00:00", "EventTime": "2024-05-21T12:32:45.370433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC1nzS3qHwaO0aHDjl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 70} +{"Format": "Json", "ID": "006f42ea-b8cb-4b6d-8191-27f3993ea060", "DetectTime": "2024-05-21T12:32:45.370400+00:00", "EventTime": "2024-05-21T12:32:45.370433+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "1970-01-03T21:08:49.658899+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2024/05/21 12:32:45.523919)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 70, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9ae45884-76d5-448b-ae86-1e62ff96cdeb", "DetectTime": "2024-05-21T12:32:45.528864+00:00", "EventTime": "2024-05-21T12:32:45.528883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlYe51jfKyMSUqsz6"], "accumulated_threat_level": 0.8, "timewindow": 68} +{"Format": "IDEA0", "ID": "f545b875-1382-445b-b9c9-b7b428deca16", "DetectTime": "2024-05-21T12:32:45.539790+00:00", "EventTime": "2024-05-21T12:32:45.539809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9MzCFdwBb98RWCc"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "08d46ef6-3797-4341-9115-1507df6ac71b", "DetectTime": "2024-05-21T12:32:45.616013+00:00", "EventTime": "2024-05-21T12:32:45.616033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI2KTr15D8JJu4qCr5"], "accumulated_threat_level": 1.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "eb1025d9-39e9-4922-8b10-17efa336e177", "DetectTime": "2024-05-21T12:32:45.643770+00:00", "EventTime": "2024-05-21T12:32:45.643792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.166.143.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fA7y4bpdZPwJ7Lg7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "faa76fd7-39f0-457d-8194-c10e7da652c7", "DetectTime": "2024-05-21T12:32:45.731503+00:00", "EventTime": "2024-05-21T12:32:45.731523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmfcVqDYsyruN7C1k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ac42d3aa-a062-4bfa-9698-9d65932c9d35", "DetectTime": "2024-05-21T12:32:45.768220+00:00", "EventTime": "2024-05-21T12:32:45.768245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxV8I22JUnZxWLod3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ab35b38a-dbcb-4b81-8793-8d8223246b70", "DetectTime": "2024-05-21T12:32:45.785322+00:00", "EventTime": "2024-05-21T12:32:45.785341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn0ingd4ZxeV58RS", "Cf5qpFqDJWtm3TNR6", "CttMia1Fj3BJfSUTY1", "Cuql6D2ImErJNnOkPe"], "accumulated_threat_level": 2.1, "timewindow": 70} +{"Format": "IDEA0", "ID": "fca3a04a-c0c9-437e-a7f2-b04f5b4fb32b", "DetectTime": "2024-05-21T12:32:45.802910+00:00", "EventTime": "2024-05-21T12:32:45.802932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX0U8a3Zl8EdBek5p1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "452efd37-9380-4491-b588-6850893c3d02", "DetectTime": "2024-05-21T12:32:45.941881+00:00", "EventTime": "2024-05-21T12:32:45.941902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVqqz2EX4enI2mb8j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "18a7f0c2-6c18-4e11-b982-3f65c2b8f0a4", "DetectTime": "2024-05-21T12:32:45.997410+00:00", "EventTime": "2024-05-21T12:32:45.997429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClhX2obpaGQXCfkA"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ead6f929-5f74-4552-917e-a4db0574c5bd", "DetectTime": "2024-05-21T12:32:46.190164+00:00", "EventTime": "2024-05-21T12:32:46.190183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc76iq2NDETNJwhQlg"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 70} +{"Format": "IDEA0", "ID": "4d5d4502-ef22-4ee4-8a13-69174dee6370", "DetectTime": "2024-05-21T12:32:46.280062+00:00", "EventTime": "2024-05-21T12:32:46.280080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDzk1ZFCpaNHCjRi"], "accumulated_threat_level": 3.7, "timewindow": 70} +{"Format": "IDEA0", "ID": "a0d129b1-a05e-4e64-b762-67c7fe4b726d", "DetectTime": "2024-05-21T12:32:46.463922+00:00", "EventTime": "2024-05-21T12:32:46.463942+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKhROt4C1BBgWvHRFb"], "accumulated_threat_level": 3.724, "timewindow": 70} +{"Format": "IDEA0", "ID": "f5f2d371-fc15-4605-b96d-04ab768f1555", "DetectTime": "2024-05-21T12:32:46.538500+00:00", "EventTime": "2024-05-21T12:32:46.538524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJdCg2OMzShYaKNg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "cc03c1ac-9044-4f48-97b7-70bf900111eb", "DetectTime": "2024-05-21T12:32:46.548454+00:00", "EventTime": "2024-05-21T12:32:46.548473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcFfa2lVTSPsvcGj8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "48d1ffcc-d9b3-4af3-b5a4-654468a4a8b7", "DetectTime": "2024-05-21T12:32:46.553537+00:00", "EventTime": "2024-05-21T12:32:46.553557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXYwy1UlJuP8Ioo86"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "76ba48a2-fe5d-4249-a016-b139d36b7ef8", "DetectTime": "2024-05-21T12:32:46.558420+00:00", "EventTime": "2024-05-21T12:32:46.558440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLjjCsaeV6HuXzxc8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e5526149-5722-49a2-a6c6-a2c3f8624f18", "DetectTime": "2024-05-21T12:32:46.653634+00:00", "EventTime": "2024-05-21T12:32:46.653661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChovcQ3dPgzt3pamgf"], "accumulated_threat_level": 4.524, "timewindow": 70} +{"Format": "IDEA0", "ID": "58b1b260-96d7-4d5c-9be9-e33f53a7d210", "DetectTime": "2024-05-21T12:32:46.659568+00:00", "EventTime": "2024-05-21T12:32:46.659591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfaDC3wPBz1ako9tb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ab606118-ecd2-4f6b-99ea-f9003faa9bb0", "DetectTime": "2024-05-21T12:32:46.744950+00:00", "EventTime": "2024-05-21T12:32:46.744973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctvh9i25lEkSPQ94m5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e41af41d-74d4-4876-978d-a1015223817a", "DetectTime": "2024-05-21T12:32:46.750622+00:00", "EventTime": "2024-05-21T12:32:46.750643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGc6eQ6BLTV33JIb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "156da504-b1ba-45c8-97e0-813eb24b2635", "DetectTime": "2024-05-21T12:32:46.755526+00:00", "EventTime": "2024-05-21T12:32:46.755545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMctu8dz8MITzfSEd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "872d6bc5-41f5-46ac-8c42-95d764597d0f", "DetectTime": "2024-05-21T12:32:46.785509+00:00", "EventTime": "2024-05-21T12:32:46.785530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWdGTUX74pQUvkoM4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "bfe933bd-b781-4c70-8030-1bdc94de3bf0", "DetectTime": "2024-05-21T12:32:46.801349+00:00", "EventTime": "2024-05-21T12:32:46.801366+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKhROt4C1BBgWvHRFb"], "accumulated_threat_level": 0, "timewindow": 70} +{"Format": "IDEA0", "ID": "c5091476-5c78-4648-81d8-539671d70ab1", "DetectTime": "2024-05-21T12:32:46.806209+00:00", "EventTime": "2024-05-21T12:32:46.806227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6c8541RyiH5aJoBnb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "c32ca115-a063-4729-b605-3f2c47650635", "DetectTime": "2024-05-21T12:32:46.879847+00:00", "EventTime": "2024-05-21T12:32:46.879867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbu0f2L9fQUEoBAW3"], "accumulated_threat_level": 5.324, "timewindow": 70} +{"Format": "IDEA0", "ID": "15181c17-0de2-4481-a9fe-8ba656228f6e", "DetectTime": "2024-05-21T12:32:46.939300+00:00", "EventTime": "2024-05-21T12:32:46.939320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.6.55.163"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkk8q49JeOzf7O7x"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "87817a9a-9ff0-4c68-9a07-b30ed60fe767", "DetectTime": "2024-05-21T12:32:46.951705+00:00", "EventTime": "2024-05-21T12:32:46.951727+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.6.55.163"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.6.55.163 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkk8q49JeOzf7O7x"], "accumulated_threat_level": 6.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "c224fb68-0bd2-4a57-bf4e-43cdee630b38", "DetectTime": "2024-05-21T12:32:47.134000+00:00", "EventTime": "2024-05-21T12:32:47.134020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqxHaQ16zmWKy6j3z1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "abeba6e4-b42f-42d4-a5a8-27ad0728569d", "DetectTime": "2024-05-21T12:32:47.138644+00:00", "EventTime": "2024-05-21T12:32:47.138663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcsHqr1IZ4qRQ5U4X8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "a98c1e26-9c33-4053-ad4e-742cc3d2cf98", "DetectTime": "2024-05-21T12:32:47.185930+00:00", "EventTime": "2024-05-21T12:32:47.185949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqBwZIS72NJ1aI3c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "00734899-0248-49e1-af86-a41284bf43a0", "DetectTime": "2024-05-21T12:32:47.199662+00:00", "EventTime": "2024-05-21T12:32:47.199686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWjxw2G4QPRjmmdGd"], "accumulated_threat_level": 6.124, "timewindow": 70} +{"Format": "IDEA0", "ID": "70e74a79-646b-4dd2-b9c4-86e188a96f05", "DetectTime": "2024-05-21T12:32:47.274141+00:00", "EventTime": "2024-05-21T12:32:47.274162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu1yYI2plxlu2DAmVk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "2a055617-1a98-488a-a736-670f8e89b45c", "DetectTime": "2024-05-21T12:32:47.281810+00:00", "EventTime": "2024-05-21T12:32:47.281830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C97zau36RQh4SeFHBd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "306629a0-28d2-4625-9221-dc9af0c2e4a2", "DetectTime": "2024-05-21T12:32:47.328865+00:00", "EventTime": "2024-05-21T12:32:47.328887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bg7B36il6NJUlqeb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "3638845d-7577-443a-b409-5003f81d720a", "DetectTime": "2024-05-21T12:32:47.335634+00:00", "EventTime": "2024-05-21T12:32:47.335656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu56vk1x8FQzpcIRmh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "c4d4549c-e58c-4bfb-8219-e7225808c06f", "DetectTime": "2024-05-21T12:32:47.347432+00:00", "EventTime": "2024-05-21T12:32:47.347450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckeorr3QFGopd7njP6"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 70} +{"Format": "IDEA0", "ID": "9f518391-979c-48f3-9b0a-3aa985b4734d", "DetectTime": "2024-05-21T12:32:47.435942+00:00", "EventTime": "2024-05-21T12:32:47.435963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZEOmAufqrFt2SBlg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ce33a3cf-411f-4661-92cf-1c4dd73ee146", "DetectTime": "2024-05-21T12:32:47.441109+00:00", "EventTime": "2024-05-21T12:32:47.441130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csh0Xj1TMdLFhpvIh4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "9dc49334-2031-4ae4-b662-e2c963de6068", "DetectTime": "2024-05-21T12:32:47.485740+00:00", "EventTime": "2024-05-21T12:32:47.485761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaXTMn395HwbrWt88d"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "292a0db4-a98c-46d2-81bc-069a43092676", "DetectTime": "2024-05-21T12:32:47.525975+00:00", "EventTime": "2024-05-21T12:32:47.525993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCzdY29DhdRqnnBPa"], "accumulated_threat_level": 7.723999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "79dfa6f4-2325-43c1-857d-6b91cdeedb9c", "DetectTime": "2024-05-21T12:32:47.530839+00:00", "EventTime": "2024-05-21T12:32:47.530856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMh7g2kOLl13jLvI4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "83a9ef91-813a-4b85-9dcb-42a516a90029", "DetectTime": "2024-05-21T12:32:47.814268+00:00", "EventTime": "2024-05-21T12:32:47.814290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiqIuE46fiuwE02Lgg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "01e295e9-e337-4801-9710-da05b17b0fc0", "DetectTime": "2024-05-21T12:32:47.819362+00:00", "EventTime": "2024-05-21T12:32:47.819380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQxtnc43zkaCSFkBke"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "f7067bde-0c1c-47e3-ae67-55a0a846b8ad", "DetectTime": "2024-05-21T12:32:47.823725+00:00", "EventTime": "2024-05-21T12:32:47.823743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnvkg2x4dJrMuMDF1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "7b92e44d-5378-4463-9dc7-0a60de589e0e", "DetectTime": "2024-05-21T12:32:47.890707+00:00", "EventTime": "2024-05-21T12:32:47.890728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0uVf3CcbsVUf0K3k"], "accumulated_threat_level": 8.524, "timewindow": 70} +{"Format": "IDEA0", "ID": "d010cb7f-dfed-4c30-9694-26ddc04821af", "DetectTime": "2024-05-21T12:32:47.929017+00:00", "EventTime": "2024-05-21T12:32:47.929035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXtmoH2XMMegDmqgLa"], "accumulated_threat_level": 9.324, "timewindow": 70} +{"Format": "IDEA0", "ID": "fa54ff12-6b6e-4a10-b7ae-b1af7565cd51", "DetectTime": "2024-05-21T12:32:47.965447+00:00", "EventTime": "2024-05-21T12:32:47.965466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COUa4R1kwBVfQOiFF2"], "accumulated_threat_level": 10.124, "timewindow": 70} +{"Format": "IDEA0", "ID": "0509e68c-0ece-446f-8487-757a0a1144ec", "DetectTime": "2024-05-21T12:32:48.002076+00:00", "EventTime": "2024-05-21T12:32:48.002094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GAyl07lPL1xez6f"], "accumulated_threat_level": 10.924000000000001, "timewindow": 70} +{"Format": "IDEA0", "ID": "fcd0e12a-1b21-4233-942d-14ab634b8675", "DetectTime": "2024-05-21T12:32:48.043106+00:00", "EventTime": "2024-05-21T12:32:48.043125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2gup1lhZwhSOOB9e"], "accumulated_threat_level": 11.724000000000002, "timewindow": 70} +{"Format": "IDEA0", "ID": "bb4ad15f-0024-4d24-9241-8316a07ccf92", "DetectTime": "2024-05-21T12:32:48.076275+00:00", "EventTime": "2024-05-21T12:32:48.076298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8HF73vnjlQFwf8Z8"], "accumulated_threat_level": 12.524000000000003, "timewindow": 70} +{"Format": "Json", "ID": "bb4ad15f-0024-4d24-9241-8316a07ccf92", "DetectTime": "2024-05-21T12:32:48.076275+00:00", "EventTime": "2024-05-21T12:32:48.076298+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "1970-01-03T21:40:46.890154+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2024/05/21 12:32:48.333516)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 70, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "34dba075-768e-49a4-ac4b-1c96a47b29f5", "DetectTime": "2024-05-21T12:32:48.344116+00:00", "EventTime": "2024-05-21T12:32:48.344135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50HBN3zkUXRCEX9Bj"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "45f35f4e-3b36-49b6-b85b-177b78ac8f8d", "DetectTime": "2024-05-21T12:32:48.355021+00:00", "EventTime": "2024-05-21T12:32:48.355041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vow64fDE6OcHq718"], "accumulated_threat_level": 1.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "c6c88c6f-901b-4e3b-8df2-e7c088ada873", "DetectTime": "2024-05-21T12:32:48.359474+00:00", "EventTime": "2024-05-21T12:32:48.359490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4uU2e3xUt9HGlS5B9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "799f3627-7883-4e04-b1bc-6ffcef444a68", "DetectTime": "2024-05-21T12:32:48.369683+00:00", "EventTime": "2024-05-21T12:32:48.369705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENThz3BbVTZCtSrD3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 70} +{"Format": "IDEA0", "ID": "071af40a-6d36-4f1c-acd2-aa72302c59fe", "DetectTime": "2024-05-21T12:32:48.374755+00:00", "EventTime": "2024-05-21T12:32:48.374775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4E2gbJ3zfn3776a2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "53bd25e4-7025-4247-b982-5d8c28c950fe", "DetectTime": "2024-05-21T12:32:48.385730+00:00", "EventTime": "2024-05-21T12:32:48.385748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxU8dI33wtgsGu28"], "accumulated_threat_level": 3.2, "timewindow": 70} +{"Format": "IDEA0", "ID": "7f3ca45f-ab0d-49b0-823d-7d450ec3ecaa", "DetectTime": "2024-05-21T12:32:48.529599+00:00", "EventTime": "2024-05-21T12:32:48.529622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGC1Ed1eNAy8MnDmy2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "2cc55d80-1fcd-4c91-8fa5-00ab144d168c", "DetectTime": "2024-05-21T12:32:48.569869+00:00", "EventTime": "2024-05-21T12:32:48.569888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZJ5i47VpV6H6uOL8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "cdc50a1d-b776-4a0b-bf23-51c40779ed3f", "DetectTime": "2024-05-21T12:32:48.598579+00:00", "EventTime": "2024-05-21T12:32:48.598601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTBEw4ytFSDsZOaLe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "79f42ea8-7da2-4e31-ace9-631334d38e28", "DetectTime": "2024-05-21T12:32:48.610007+00:00", "EventTime": "2024-05-21T12:32:48.610025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxUAkTV1NUlMh1h2"], "accumulated_threat_level": 4.0, "timewindow": 70} +{"Format": "IDEA0", "ID": "0bd39c68-b60c-4ca3-a89b-6ab02079c4a2", "DetectTime": "2024-05-21T12:32:48.661154+00:00", "EventTime": "2024-05-21T12:32:48.661172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJasAm25DUTV4F7N7"], "accumulated_threat_level": 4.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "7835442d-d402-4578-8344-fc48c44d62db", "DetectTime": "2024-05-21T12:32:48.697053+00:00", "EventTime": "2024-05-21T12:32:48.697075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCtEKK3zu7yJXIl1k6"], "accumulated_threat_level": 5.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "1aadba8a-9e35-474f-b7f4-264183ec9b44", "DetectTime": "2024-05-21T12:32:48.735864+00:00", "EventTime": "2024-05-21T12:32:48.735883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadzBc31OV6z2ecZh7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 70} +{"Format": "IDEA0", "ID": "e6c0139e-38f6-4e55-adea-d1dd705e29ec", "DetectTime": "2024-05-21T12:32:48.771371+00:00", "EventTime": "2024-05-21T12:32:48.771390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvr3pA3SFkeclYAtqe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "bbfbf033-ab1f-4e1d-806b-b29cbadf0ed7", "DetectTime": "2024-05-21T12:32:48.806008+00:00", "EventTime": "2024-05-21T12:32:48.806028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95bpb2lHvs0BQRNcl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "16a7c23d-fb2e-41f6-90ac-e6a80bd940b2", "DetectTime": "2024-05-21T12:32:48.845165+00:00", "EventTime": "2024-05-21T12:32:48.845185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6tYK9quqYtgmRLi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 70} +{"Format": "IDEA0", "ID": "3f24956d-7bd9-41c2-90ab-d1308b9580d3", "DetectTime": "2024-05-21T12:32:48.881335+00:00", "EventTime": "2024-05-21T12:32:48.881354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLTlywwASyWLK2NNl"], "accumulated_threat_level": 9.6, "timewindow": 70} +{"Format": "IDEA0", "ID": "0e19227d-8576-43a8-89c8-0e541a583e9c", "DetectTime": "2024-05-21T12:32:48.919808+00:00", "EventTime": "2024-05-21T12:32:48.919827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMw1l52eDw0xl3c0Nc"], "accumulated_threat_level": 10.4, "timewindow": 70} +{"Format": "IDEA0", "ID": "448a6fe0-d8a2-4f1a-8875-ce18fa32cd35", "DetectTime": "2024-05-21T12:32:48.946575+00:00", "EventTime": "2024-05-21T12:32:48.946597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzTO1oBhIDYGvv19"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "d2649143-d415-4f2e-be64-c7509d98c61f", "DetectTime": "2024-05-21T12:32:48.980174+00:00", "EventTime": "2024-05-21T12:32:48.980199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cph51ubwMnLRLgWxh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 70} +{"Format": "IDEA0", "ID": "57dac528-f81f-4412-be04-75417743e943", "DetectTime": "2024-05-21T12:32:49.051460+00:00", "EventTime": "2024-05-21T12:32:49.051479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1yeq1zjCeF05NQpb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 70} +{"Format": "Json", "ID": "57dac528-f81f-4412-be04-75417743e943", "DetectTime": "2024-05-21T12:32:49.051460+00:00", "EventTime": "2024-05-21T12:32:49.051479+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "1970-01-03T21:40:54.565430+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 70. (real time 2024/05/21 12:32:49.289621)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 70, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1ef50519-7ec2-4b6b-a438-bd00edf225a1", "DetectTime": "2024-05-21T12:32:49.293445+00:00", "EventTime": "2024-05-21T12:32:49.293463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4suIh40umyHnO1PLl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "1341654c-e98c-4eed-8d0e-090d685f65ef", "DetectTime": "2024-05-21T12:32:49.327143+00:00", "EventTime": "2024-05-21T12:32:49.327163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvvV6jaFbM7NcqcNl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "d54f47a0-3a41-4b1a-8d62-9d63e385c83f", "DetectTime": "2024-05-21T12:32:49.341402+00:00", "EventTime": "2024-05-21T12:32:49.341420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqs3vo11m4PfuKJkR5"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "521b13d3-3729-41de-92d6-b2da7f67799d", "DetectTime": "2024-05-21T12:32:49.361569+00:00", "EventTime": "2024-05-21T12:32:49.361590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhrQN3ApSRrJ35l74"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "2ee7e3b6-c09f-4545-a499-02b419ef4f2c", "DetectTime": "2024-05-21T12:32:49.366633+00:00", "EventTime": "2024-05-21T12:32:49.366651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kLWx4S9StqNy9DWk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "284161bc-da34-4107-a84c-df755e963841", "DetectTime": "2024-05-21T12:32:49.486824+00:00", "EventTime": "2024-05-21T12:32:49.486843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEm5iI3Pr1HRTRlARj"], "accumulated_threat_level": 0.8, "timewindow": 71} +{"Format": "IDEA0", "ID": "43f20944-8b19-4887-8a8d-b0e92e72877d", "DetectTime": "2024-05-21T12:32:49.561073+00:00", "EventTime": "2024-05-21T12:32:49.561090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSJSAxWkCkoQ5Da5"], "accumulated_threat_level": 1.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "f4ff1394-b53b-438d-a8de-c85ebf5ba319", "DetectTime": "2024-05-21T12:32:49.597080+00:00", "EventTime": "2024-05-21T12:32:49.597102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6pV9Z1PWx0aP4Biva"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 71} +{"Format": "IDEA0", "ID": "a50ebac5-54c8-4f5a-8ed6-668448d57728", "DetectTime": "2024-05-21T12:32:49.631539+00:00", "EventTime": "2024-05-21T12:32:49.631560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36sSk1heO2ZxpFjv2"], "accumulated_threat_level": 3.2, "timewindow": 71} +{"Format": "IDEA0", "ID": "7fadde1b-5ec9-45a9-ae99-8117db5b2f31", "DetectTime": "2024-05-21T12:32:49.693913+00:00", "EventTime": "2024-05-21T12:32:49.693931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tpfl4aboju7PV8T3"], "accumulated_threat_level": 4.0, "timewindow": 71} +{"Format": "IDEA0", "ID": "ec6efee1-d11e-418d-8380-7b7f0a0acb2e", "DetectTime": "2024-05-21T12:32:49.732970+00:00", "EventTime": "2024-05-21T12:32:49.732991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAzzDSIWXcHKMQkl"], "accumulated_threat_level": 4.8, "timewindow": 71} +{"Format": "IDEA0", "ID": "601ec5ab-9156-44f9-b05d-272cecf9921c", "DetectTime": "2024-05-21T12:32:49.763942+00:00", "EventTime": "2024-05-21T12:32:49.763961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNStss4r6eS0b3Lyzk"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "e00f9463-a86a-46fc-a85e-6aa1928f1244", "DetectTime": "2024-05-21T12:32:49.776521+00:00", "EventTime": "2024-05-21T12:32:49.776541+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNStss4r6eS0b3Lyzk"], "accumulated_threat_level": 6.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "2b703f77-cd81-49e9-81f4-4794e228d6c4", "DetectTime": "2024-05-21T12:32:49.789017+00:00", "EventTime": "2024-05-21T12:32:49.789036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXTLHp46bUu7EtuyGj"], "accumulated_threat_level": 5.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "544603b4-5482-41a3-acbb-31bfb0f4c682", "DetectTime": "2024-05-21T12:32:49.810111+00:00", "EventTime": "2024-05-21T12:32:49.810128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjmb6w3QulVpV4Qjfk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 71} +{"Format": "IDEA0", "ID": "04f2743c-db83-4b58-8749-5f99bd05ba7c", "DetectTime": "2024-05-21T12:32:49.846823+00:00", "EventTime": "2024-05-21T12:32:49.846847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0b2Rb3BFrvwhkgjz9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "3cd0f88d-2bda-4ebb-a759-897f241ba18c", "DetectTime": "2024-05-21T12:32:49.871576+00:00", "EventTime": "2024-05-21T12:32:49.871598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhUf12WQNMyGjM27i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "6c0927cc-4422-4fa7-920d-67393e196f83", "DetectTime": "2024-05-21T12:32:49.887464+00:00", "EventTime": "2024-05-21T12:32:49.887484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8RLSg4k0a6QX8K8Fh"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "9439d5b3-0cc9-4ed9-b185-2b35e9212fef", "DetectTime": "2024-05-21T12:32:49.901802+00:00", "EventTime": "2024-05-21T12:32:49.901821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8RLSg4k0a6QX8K8Fh"], "accumulated_threat_level": 7.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "642e65ea-4aa8-403b-a523-7d929ad6b870", "DetectTime": "2024-05-21T12:32:49.919869+00:00", "EventTime": "2024-05-21T12:32:49.919891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPU3003QEfOrQSJTUg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "716c721c-1cd6-450b-8dbb-e6696c1f399c", "DetectTime": "2024-05-21T12:32:49.934050+00:00", "EventTime": "2024-05-21T12:32:49.934069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4APE96wAHnVKyf6"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "622f13ab-7f88-4411-b87c-7746ae28ecd4", "DetectTime": "2024-05-21T12:32:49.946337+00:00", "EventTime": "2024-05-21T12:32:49.946356+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4APE96wAHnVKyf6"], "accumulated_threat_level": 7.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "36ad09a4-c650-4fc6-9a67-625b30813c17", "DetectTime": "2024-05-21T12:32:49.960498+00:00", "EventTime": "2024-05-21T12:32:49.960518+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrbTKEuqWwED6cxCk"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "23a22a27-8321-44ee-bf8a-ea1e78ab7f99", "DetectTime": "2024-05-21T12:32:49.974768+00:00", "EventTime": "2024-05-21T12:32:49.974786+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrbTKEuqWwED6cxCk"], "accumulated_threat_level": 8.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "671c2491-d103-4ce3-be42-e2ff79fdd4ef", "DetectTime": "2024-05-21T12:32:49.987389+00:00", "EventTime": "2024-05-21T12:32:49.987408+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrS6Dw2pzR3455WQll"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "49f7832b-2cb5-4345-b1b9-efd6d4351ab6", "DetectTime": "2024-05-21T12:32:50.000416+00:00", "EventTime": "2024-05-21T12:32:50.000435+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrS6Dw2pzR3455WQll"], "accumulated_threat_level": 8.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "389af945-d830-41f2-a17a-f9543c4bdad0", "DetectTime": "2024-05-21T12:32:50.181873+00:00", "EventTime": "2024-05-21T12:32:50.181896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzdmD2VIOzte5YnOg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "5aa8644c-b649-4bb6-8e62-95341830aba6", "DetectTime": "2024-05-21T12:32:50.187072+00:00", "EventTime": "2024-05-21T12:32:50.187090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XDG21NNucmHu8Qri"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "86c9691c-c460-4df8-94ac-a5fe33fc1bac", "DetectTime": "2024-05-21T12:32:50.191861+00:00", "EventTime": "2024-05-21T12:32:50.191878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 49.49.97.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtmAvN3SiniMEqZIk1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "5efc7ed9-67d7-40f2-b49f-789d8ccb9a45", "DetectTime": "2024-05-21T12:32:50.270224+00:00", "EventTime": "2024-05-21T12:32:50.270245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreSOY3AAmtz51Qn2g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "7ee571c7-f921-4b1a-9e5e-99173552a359", "DetectTime": "2024-05-21T12:32:50.312467+00:00", "EventTime": "2024-05-21T12:32:50.312485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4E8nHOhvDIQykKVi"], "accumulated_threat_level": 9.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "5cbda891-df6e-4a7a-a18c-8027a5c5c264", "DetectTime": "2024-05-21T12:32:50.357144+00:00", "EventTime": "2024-05-21T12:32:50.357163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf5RYj3aJ4IfsNFvg4"], "accumulated_threat_level": 10.4, "timewindow": 71} +{"Format": "IDEA0", "ID": "d391bd77-11aa-43a4-a977-ea8c244d0f75", "DetectTime": "2024-05-21T12:32:50.378799+00:00", "EventTime": "2024-05-21T12:32:50.378819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwvCq4cU6gOhG8glf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e5a14671-d84d-45ff-a751-5c2e78d2aef0", "DetectTime": "2024-05-21T12:32:50.417161+00:00", "EventTime": "2024-05-21T12:32:50.417179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuW5BV2iYVCON6u6s1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 71} +{"Format": "IDEA0", "ID": "738c3dc7-872b-49d6-ada7-e2cd0bd7d59c", "DetectTime": "2024-05-21T12:32:50.444874+00:00", "EventTime": "2024-05-21T12:32:50.444892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUycbO1l7HEeXWSyic"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "73708b94-f191-4d45-87c3-b4c6385e3fad", "DetectTime": "2024-05-21T12:32:50.475329+00:00", "EventTime": "2024-05-21T12:32:50.475347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAsFkD43GMZOCbqCO4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 71} +{"Format": "Json", "ID": "73708b94-f191-4d45-87c3-b4c6385e3fad", "DetectTime": "2024-05-21T12:32:50.475329+00:00", "EventTime": "2024-05-21T12:32:50.475347+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "1970-01-03T22:11:37.850494+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2024/05/21 12:32:50.622497)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 71, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ccd8c1c2-4f60-4dc3-8a21-f22f0afcb7e0", "DetectTime": "2024-05-21T12:32:50.626546+00:00", "EventTime": "2024-05-21T12:32:50.626563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClIGl723jxR9vrXY0b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e51fce6a-aea2-4959-8c87-7e229e9c6e43", "DetectTime": "2024-05-21T12:32:50.631317+00:00", "EventTime": "2024-05-21T12:32:50.631335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRfqA16uJmtvtHlGe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "6349d295-1bfd-44e4-a257-fde62235b37f", "DetectTime": "2024-05-21T12:32:50.649693+00:00", "EventTime": "2024-05-21T12:32:50.649724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpYRb17ughArzM9gf"], "accumulated_threat_level": 0.8, "timewindow": 71} +{"Format": "IDEA0", "ID": "99cdf2d2-df6d-4bd0-a38c-8c36eca0eab9", "DetectTime": "2024-05-21T12:32:50.655445+00:00", "EventTime": "2024-05-21T12:32:50.655465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPtlL2kmwyyNMWej5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "85e7e861-73d3-4f5b-9457-2aad7e5dadb0", "DetectTime": "2024-05-21T12:32:50.822463+00:00", "EventTime": "2024-05-21T12:32:50.822483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZf0CELqCud6PKiq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "a1107c78-a4e2-4007-b958-33100c8d06b5", "DetectTime": "2024-05-21T12:32:50.838913+00:00", "EventTime": "2024-05-21T12:32:50.838939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1d6w718xE3DxHoD9j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e48dac92-252e-463c-86c2-ad469ba7318b", "DetectTime": "2024-05-21T12:32:50.856041+00:00", "EventTime": "2024-05-21T12:32:50.856062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKs8V1VnQFFFMHtce"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "56ba3cf5-44f7-47a8-9c07-d460d66a9e23", "DetectTime": "2024-05-21T12:32:50.877940+00:00", "EventTime": "2024-05-21T12:32:50.877962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsEbrQucYqMRzLQ6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "9e87fdfc-3739-484e-b4c6-6a53a0e77913", "DetectTime": "2024-05-21T12:32:50.928220+00:00", "EventTime": "2024-05-21T12:32:50.928243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBy70a21BriB6VdZf7"], "accumulated_threat_level": 1.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "84b67a89-1378-493e-9e72-bec679ec717a", "DetectTime": "2024-05-21T12:32:50.963409+00:00", "EventTime": "2024-05-21T12:32:50.963429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNs4ONGmdYKRvkHE1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 71} +{"Format": "IDEA0", "ID": "9c0a0b1a-e1b0-4a51-a113-8e8053b93294", "DetectTime": "2024-05-21T12:32:51.000240+00:00", "EventTime": "2024-05-21T12:32:51.000261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1PDF72T7hhqt3nk"], "accumulated_threat_level": 3.2, "timewindow": 71} +{"Format": "IDEA0", "ID": "856add98-1d3f-4b56-ac0d-ca68bcad26de", "DetectTime": "2024-05-21T12:32:51.040015+00:00", "EventTime": "2024-05-21T12:32:51.040033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTZkdi1jYwRbPUXAP6"], "accumulated_threat_level": 4.0, "timewindow": 71} +{"Format": "IDEA0", "ID": "8d504d4e-eb59-4716-adab-87de5a729eae", "DetectTime": "2024-05-21T12:32:51.065517+00:00", "EventTime": "2024-05-21T12:32:51.065538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTKgZjPviCuKKqv4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "c7a39f07-5583-4b77-b759-2cb788e2da74", "DetectTime": "2024-05-21T12:32:51.097490+00:00", "EventTime": "2024-05-21T12:32:51.097507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBmyK0yYMKxgCa5a"], "accumulated_threat_level": 4.8, "timewindow": 71} +{"Format": "IDEA0", "ID": "e211dc37-6bc6-4447-8f72-e2a89a24690c", "DetectTime": "2024-05-21T12:32:51.135244+00:00", "EventTime": "2024-05-21T12:32:51.135262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLXtj8S2rCyvUPzh"], "accumulated_threat_level": 5.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "d667acc9-8b2e-4689-aa89-f4b96773c3fa", "DetectTime": "2024-05-21T12:32:51.173786+00:00", "EventTime": "2024-05-21T12:32:51.173803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcXH533TAK6tg7BHCd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 71} +{"Format": "IDEA0", "ID": "5da1b5ab-0bee-4db5-9c47-1429bd97973f", "DetectTime": "2024-05-21T12:32:51.214182+00:00", "EventTime": "2024-05-21T12:32:51.214205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwhWA4G4E6lpsG4yc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "679e6d2f-10b5-4ef9-8f3b-afd8af17ec58", "DetectTime": "2024-05-21T12:32:51.257973+00:00", "EventTime": "2024-05-21T12:32:51.257997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Pw2Z2wkLSLbfBA54"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "f3c20e4d-1910-42ae-9714-ea14872c58a3", "DetectTime": "2024-05-21T12:32:51.318570+00:00", "EventTime": "2024-05-21T12:32:51.318589+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Pw2Z2wkLSLbfBA54"], "accumulated_threat_level": 9.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "5fc08747-4859-4fa6-98be-10e7f25a19b3", "DetectTime": "2024-05-21T12:32:51.514340+00:00", "EventTime": "2024-05-21T12:32:51.514359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxICs4cvbYLgxo683"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "01470709-8c47-49f3-836b-1db3f62b91f5", "DetectTime": "2024-05-21T12:32:51.520551+00:00", "EventTime": "2024-05-21T12:32:51.520573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CECg511reavry5X5wh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "3d89e46b-2eee-4143-8164-8a8fe3c980f9", "DetectTime": "2024-05-21T12:32:51.534967+00:00", "EventTime": "2024-05-21T12:32:51.534986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAUCA4NBIQKLslUe8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "9db61635-0a4b-4895-b41a-02a9a390e6eb", "DetectTime": "2024-05-21T12:32:51.539715+00:00", "EventTime": "2024-05-21T12:32:51.539733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5O8Zp40BKo2nYj9y1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "3e060dfc-28fd-44e3-ae59-2cb2b71c3122", "DetectTime": "2024-05-21T12:32:51.554510+00:00", "EventTime": "2024-05-21T12:32:51.554535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYTnB4ePMDpDLdU09"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "2d735d52-ae07-4182-8031-f298ba3c254c", "DetectTime": "2024-05-21T12:32:51.617311+00:00", "EventTime": "2024-05-21T12:32:51.617331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2UFzhOePf0OxvVA8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "82a6fe1a-df29-4cb8-8129-a19a131dc9a3", "DetectTime": "2024-05-21T12:32:51.670377+00:00", "EventTime": "2024-05-21T12:32:51.670397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3j25x318o8toACjy5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "fcf154d4-e87f-4f38-b51a-37c0cfb1f429", "DetectTime": "2024-05-21T12:32:51.706492+00:00", "EventTime": "2024-05-21T12:32:51.706511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7MMs4g5T8MXojZck"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "4953fc0c-3c2e-4d34-9b4a-742b667d77ca", "DetectTime": "2024-05-21T12:32:51.744763+00:00", "EventTime": "2024-05-21T12:32:51.744784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnI7UjZTcqBhzwZQ6"], "accumulated_threat_level": 9.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "e0c9964d-5619-4924-ad36-33b3dcd7fb85", "DetectTime": "2024-05-21T12:32:51.783639+00:00", "EventTime": "2024-05-21T12:32:51.783659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnIDRl0kwKEWYDAg"], "accumulated_threat_level": 10.4, "timewindow": 71} +{"Format": "IDEA0", "ID": "e5b14691-db4b-45fb-aac1-136ad9e646b1", "DetectTime": "2024-05-21T12:32:51.820343+00:00", "EventTime": "2024-05-21T12:32:51.820363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGFJYC4vGI2BtY9N04"], "accumulated_threat_level": 11.200000000000001, "timewindow": 71} +{"Format": "IDEA0", "ID": "2fe6177a-ba1e-4f50-b7cd-aeba0d18ee52", "DetectTime": "2024-05-21T12:32:51.846030+00:00", "EventTime": "2024-05-21T12:32:51.846050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Xvkt7tBarnFEurc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "24fdad90-9189-463c-816f-3660dc80d494", "DetectTime": "2024-05-21T12:32:51.911887+00:00", "EventTime": "2024-05-21T12:32:51.911908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hIGA4cRBHITgAJo1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 71} +{"Format": "Json", "ID": "24fdad90-9189-463c-816f-3660dc80d494", "DetectTime": "2024-05-21T12:32:51.911887+00:00", "EventTime": "2024-05-21T12:32:51.911908+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "1970-01-03T22:36:42.359898+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2024/05/21 12:32:52.087830)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 71, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8448b866-4088-4cae-8a31-a47f6446897c", "DetectTime": "2024-05-21T12:32:52.099959+00:00", "EventTime": "2024-05-21T12:32:52.099984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzIltI2YcMhoopDjbe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "a4d422de-ed4d-42b7-b056-3cf42029a8ce", "DetectTime": "2024-05-21T12:32:52.105808+00:00", "EventTime": "2024-05-21T12:32:52.105829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClB8o52xsPyJt9QZ05"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "85ff5a16-b7c2-49c6-ba1f-78973a28e21a", "DetectTime": "2024-05-21T12:32:52.179959+00:00", "EventTime": "2024-05-21T12:32:52.179982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WX8y3lBujZpUSIB2", "Cm8Pqy3uY4IAyV7nod", "CObimo2wseuMe0ogm7", "CB3kL31c9TXYGYGr24"], "accumulated_threat_level": 0.5, "timewindow": 71} +{"Format": "IDEA0", "ID": "ed21fd87-7121-4a2c-b7d4-ce0a74a9a48e", "DetectTime": "2024-05-21T12:32:52.315838+00:00", "EventTime": "2024-05-21T12:32:52.315860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNWKB3g6FqXCD8aIk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "022d570e-04bb-4656-a95b-c5646966cca4", "DetectTime": "2024-05-21T12:32:52.321188+00:00", "EventTime": "2024-05-21T12:32:52.321207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtH4c628WAFL4jo7d8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ba4cdb60-7a6f-4e2e-bcd2-8cc5a29e42f4", "DetectTime": "2024-05-21T12:32:52.325616+00:00", "EventTime": "2024-05-21T12:32:52.325633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chse6s4aVrGpenB21l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "4d5b27ab-8b53-4202-8c21-8c7fe87d263c", "DetectTime": "2024-05-21T12:32:52.367456+00:00", "EventTime": "2024-05-21T12:32:52.367476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnyl4lGE5c9XKQoO4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "8f575223-3b5c-44e0-b30c-6c45b95dd7d9", "DetectTime": "2024-05-21T12:32:52.393367+00:00", "EventTime": "2024-05-21T12:32:52.393390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkYO4f8Eb61GtCfYe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "d8b4ffc1-a753-4f9c-8219-393c8621b200", "DetectTime": "2024-05-21T12:32:52.457862+00:00", "EventTime": "2024-05-21T12:32:52.457881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CULmd53CqgN6ZH8Ic2"], "accumulated_threat_level": 1.3, "timewindow": 71} +{"Format": "IDEA0", "ID": "09ee0823-69ba-4486-a075-f970aa5e1c3d", "DetectTime": "2024-05-21T12:32:52.573381+00:00", "EventTime": "2024-05-21T12:32:52.573400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQELWQ11ChBjMPTj26"], "accumulated_threat_level": 2.1, "timewindow": 71} +{"Format": "IDEA0", "ID": "b4b54a8a-cccd-4651-8d3d-3e8fb14a9f26", "DetectTime": "2024-05-21T12:32:52.661239+00:00", "EventTime": "2024-05-21T12:32:52.661262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTL2LpBVxlDGRM5x4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 71} +{"Format": "IDEA0", "ID": "c7b79fc5-abb0-4720-94dd-0ef3eb5037fd", "DetectTime": "2024-05-21T12:32:52.717577+00:00", "EventTime": "2024-05-21T12:32:52.717599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbOjgws3f6Ycljnye"], "accumulated_threat_level": 3.7, "timewindow": 71} +{"Format": "IDEA0", "ID": "21e9c4c5-3cb5-4b25-bc52-e31c857bd9c3", "DetectTime": "2024-05-21T12:32:52.731515+00:00", "EventTime": "2024-05-21T12:32:52.731535+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiLcXh26BWCouKHpo3"], "accumulated_threat_level": 3.724, "timewindow": 71} +{"Format": "IDEA0", "ID": "18997b26-5a70-413c-b93f-5383682cb6c5", "DetectTime": "2024-05-21T12:32:52.758004+00:00", "EventTime": "2024-05-21T12:32:52.758022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPcryd2h1GqiJGB0C1"], "accumulated_threat_level": 4.524, "timewindow": 71} +{"Format": "IDEA0", "ID": "5c739f1e-01c7-4f73-807d-ec3e0b9775ba", "DetectTime": "2024-05-21T12:32:52.770292+00:00", "EventTime": "2024-05-21T12:32:52.770310+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiLcXh26BWCouKHpo3"], "accumulated_threat_level": 0, "timewindow": 71} +{"Format": "IDEA0", "ID": "80380c6d-a2cf-4f3f-91b1-f3b58300dba6", "DetectTime": "2024-05-21T12:32:52.807063+00:00", "EventTime": "2024-05-21T12:32:52.807083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT21rM1OaBLj7bubUc"], "accumulated_threat_level": 5.324, "timewindow": 71} +{"Format": "IDEA0", "ID": "dc757512-b822-414e-a586-f6a2d2b19199", "DetectTime": "2024-05-21T12:32:52.858106+00:00", "EventTime": "2024-05-21T12:32:52.858124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Candf14JNBQUUNQcM2"], "accumulated_threat_level": 6.124, "timewindow": 71} +{"Format": "IDEA0", "ID": "a9f4b1c8-30d0-4c4f-b41a-903690722b0d", "DetectTime": "2024-05-21T12:32:52.896131+00:00", "EventTime": "2024-05-21T12:32:52.896152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CntsV257SmxIqEcS"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 71} +{"Format": "IDEA0", "ID": "fde02df8-6f56-48e5-b3ee-7832bc0471df", "DetectTime": "2024-05-21T12:32:52.945787+00:00", "EventTime": "2024-05-21T12:32:52.945807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbniIWmYb0eHrVYi6"], "accumulated_threat_level": 7.723999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "6567fc8c-90ae-4a7f-97f3-813b61a8bbfb", "DetectTime": "2024-05-21T12:32:52.977079+00:00", "EventTime": "2024-05-21T12:32:52.977099+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIWFuo1sEZL95Ekwbd"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "21e7ec4f-571c-4a11-9936-aee001b89db2", "DetectTime": "2024-05-21T12:32:52.992348+00:00", "EventTime": "2024-05-21T12:32:52.992371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIWFuo1sEZL95Ekwbd"], "accumulated_threat_level": 9.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "c27547f0-68e9-45f7-ba11-2c23efb3599a", "DetectTime": "2024-05-21T12:32:53.184269+00:00", "EventTime": "2024-05-21T12:32:53.184291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ85sEwikFAWwYBl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "46822f45-f9a7-4fec-a39f-824c3294db5b", "DetectTime": "2024-05-21T12:32:53.214893+00:00", "EventTime": "2024-05-21T12:32:53.214914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxXkn242d3AfUA2wml"], "accumulated_threat_level": 8.524, "timewindow": 71} +{"Format": "IDEA0", "ID": "7b78f860-7550-43bc-bab9-a4a0fd884378", "DetectTime": "2024-05-21T12:32:53.271759+00:00", "EventTime": "2024-05-21T12:32:53.271777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHlSO94QrztlE2TFOk"], "accumulated_threat_level": 9.324, "timewindow": 71} +{"Format": "IDEA0", "ID": "d8db8cba-c676-48c4-a981-6e451e6864c5", "DetectTime": "2024-05-21T12:32:53.292007+00:00", "EventTime": "2024-05-21T12:32:53.292030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLf4D4jNViVXJgff3"], "accumulated_threat_level": 10.124, "timewindow": 71} +{"Format": "IDEA0", "ID": "1e773319-e149-4f21-82a9-13370139b92d", "DetectTime": "2024-05-21T12:32:53.318420+00:00", "EventTime": "2024-05-21T12:32:53.318441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8KRP1DWubNEDD07l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "0b3341bd-59da-4908-a563-05a2faf3bf6e", "DetectTime": "2024-05-21T12:32:53.359384+00:00", "EventTime": "2024-05-21T12:32:53.359403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAPlB6273ez6nbpHWg"], "accumulated_threat_level": 10.924000000000001, "timewindow": 71} +{"Format": "IDEA0", "ID": "ecfe1d8d-cd97-4bf3-8869-98ef6d96db0a", "DetectTime": "2024-05-21T12:32:53.400473+00:00", "EventTime": "2024-05-21T12:32:53.400492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HLyG37lNP05YjCE8"], "accumulated_threat_level": 11.724000000000002, "timewindow": 71} +{"Format": "IDEA0", "ID": "cfac9e45-e518-42f9-a0a7-941580d35583", "DetectTime": "2024-05-21T12:32:53.484426+00:00", "EventTime": "2024-05-21T12:32:53.484444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQzku3iviH1ckLJY2"], "accumulated_threat_level": 12.524000000000003, "timewindow": 71} +{"Format": "Json", "ID": "cfac9e45-e518-42f9-a0a7-941580d35583", "DetectTime": "2024-05-21T12:32:53.484426+00:00", "EventTime": "2024-05-21T12:32:53.484444+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "1970-01-03T22:42:30.951361+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 71. (real time 2024/05/21 12:32:53.726381)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 71, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "dbead1e7-d201-461b-9719-478a7b0831cd", "DetectTime": "2024-05-21T12:32:53.737556+00:00", "EventTime": "2024-05-21T12:32:53.737577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYrHOqrzqlrld0Ul"], "accumulated_threat_level": 0.8, "timewindow": 71} +{"Format": "IDEA0", "ID": "e213eef3-ee23-4f09-b24b-90ed226b97bb", "DetectTime": "2024-05-21T12:32:53.748775+00:00", "EventTime": "2024-05-21T12:32:53.748795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9wci27v6wZHtmiX6"], "accumulated_threat_level": 1.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "6a23976f-fd64-4314-bd49-88ab79f17b3f", "DetectTime": "2024-05-21T12:32:53.760074+00:00", "EventTime": "2024-05-21T12:32:53.760094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQW6Xh1otGcYayWB6g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 71} +{"Format": "IDEA0", "ID": "48434b05-acb0-4468-9d22-a96e28fb2d1d", "DetectTime": "2024-05-21T12:32:53.786206+00:00", "EventTime": "2024-05-21T12:32:53.786227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtoGcqALDp5ND2g5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "a1f010dc-fa04-490a-b7b3-a0698c9a6055", "DetectTime": "2024-05-21T12:32:53.818682+00:00", "EventTime": "2024-05-21T12:32:53.818699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0Tug2oqtHBL7ODub"], "accumulated_threat_level": 3.2, "timewindow": 71} +{"Format": "IDEA0", "ID": "b97df13a-1d21-4b5c-9855-c51d0bf02bd6", "DetectTime": "2024-05-21T12:32:53.888415+00:00", "EventTime": "2024-05-21T12:32:53.888446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nD8k3p5W3ypfStx7"], "accumulated_threat_level": 4.0, "timewindow": 71} +{"Format": "IDEA0", "ID": "9aab90f2-dc3d-4bc2-8313-5ee6897cb6f4", "DetectTime": "2024-05-21T12:32:53.906076+00:00", "EventTime": "2024-05-21T12:32:53.906096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc1gJ63TtZd63miS73"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "452d57d1-1a92-4f61-8ec0-fbba7560ade8", "DetectTime": "2024-05-21T12:32:54.208942+00:00", "EventTime": "2024-05-21T12:32:54.208965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UJnV1K4pd7Q6qua2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "ee66b0d3-ed64-402f-9c86-cf60af471899", "DetectTime": "2024-05-21T12:32:54.213892+00:00", "EventTime": "2024-05-21T12:32:54.213912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv95sa4jtlwC75geDk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "4fdb7041-85a4-4c14-94e3-5fecbb306111", "DetectTime": "2024-05-21T12:32:54.218843+00:00", "EventTime": "2024-05-21T12:32:54.218864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD6PBuUhluajqj09"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "7e4772d9-3b82-4dbd-989b-4f301db46530", "DetectTime": "2024-05-21T12:32:54.224123+00:00", "EventTime": "2024-05-21T12:32:54.224143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0THDB4YptifEJk5Of"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "33616eb0-b0f4-4ba5-a1ad-29326abf0672", "DetectTime": "2024-05-21T12:32:54.229419+00:00", "EventTime": "2024-05-21T12:32:54.229438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6K52oYrI8YQ96pbe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "e665a5b6-a931-4552-8a67-335435c43b75", "DetectTime": "2024-05-21T12:32:54.310845+00:00", "EventTime": "2024-05-21T12:32:54.310868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFTLY2gwIROkIdZc9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "3fbb4c42-10c8-4212-bc13-ef187921234a", "DetectTime": "2024-05-21T12:32:54.316069+00:00", "EventTime": "2024-05-21T12:32:54.316089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmjhU63RNohgw8XMOi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 69} +{"Format": "IDEA0", "ID": "c71e44b9-ed95-4304-89e9-cbe7f7474d41", "DetectTime": "2024-05-21T12:32:54.385381+00:00", "EventTime": "2024-05-21T12:32:54.385401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnSQ73O7Nxq4VDvZ7"], "accumulated_threat_level": 4.8, "timewindow": 71} +{"Format": "IDEA0", "ID": "9e3f1949-04f6-4cdc-a0e1-107069ee4cdc", "DetectTime": "2024-05-21T12:32:54.422996+00:00", "EventTime": "2024-05-21T12:32:54.423014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEF7Ry1CdLwMvoGSvf"], "accumulated_threat_level": 5.6, "timewindow": 71} +{"Format": "IDEA0", "ID": "879bf2bd-6fb5-4e34-8deb-6605ea995c3d", "DetectTime": "2024-05-21T12:32:54.465613+00:00", "EventTime": "2024-05-21T12:32:54.465632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuUrzS8zBb7Byw19i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 71} +{"Format": "IDEA0", "ID": "a9ed7517-4b39-40d2-9b01-0db4c90ed91d", "DetectTime": "2024-05-21T12:32:54.507308+00:00", "EventTime": "2024-05-21T12:32:54.507330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6BF9122vCODSUFf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "3d0c3ccb-e534-48bb-9f83-3e741e90530d", "DetectTime": "2024-05-21T12:32:54.533778+00:00", "EventTime": "2024-05-21T12:32:54.533800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx95u71jCz7KF8EKH3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "bc64d6cc-0c6c-4478-8099-8a89549174db", "DetectTime": "2024-05-21T12:32:54.594703+00:00", "EventTime": "2024-05-21T12:32:54.594723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6rXY26P5V18WTzPl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "0683a08e-2e12-4695-b742-8d476e03d7e8", "DetectTime": "2024-05-21T12:32:54.616527+00:00", "EventTime": "2024-05-21T12:32:54.616551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26GYX2wqhSpXhvoV8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "88655c93-eec1-4364-9024-87f071e31034", "DetectTime": "2024-05-21T12:32:54.884930+00:00", "EventTime": "2024-05-21T12:32:54.884950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDjbj43LUzo5x94I6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "25bddccb-fe2e-40a8-9e46-f312f371d149", "DetectTime": "2024-05-21T12:32:54.955697+00:00", "EventTime": "2024-05-21T12:32:54.955716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bTKpEdIqNmgthQ4"], "accumulated_threat_level": 0.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "7a34bd66-2c23-47c0-8f97-bf7b435f2262", "DetectTime": "2024-05-21T12:32:55.187402+00:00", "EventTime": "2024-05-21T12:32:55.187423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.28.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQIox1EQfQcuLCnfk"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "cb8c0ad3-6853-4ec9-a288-9cd778acfac4", "DetectTime": "2024-05-21T12:32:55.312502+00:00", "EventTime": "2024-05-21T12:32:55.312523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR66vb3TZF4lQE1zJa"], "accumulated_threat_level": 1.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "b4c4cecf-f56a-440a-83eb-e58e2ca7d40c", "DetectTime": "2024-05-21T12:32:55.360782+00:00", "EventTime": "2024-05-21T12:32:55.360800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWA1T12Pjz2wlYYf8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 72} +{"Format": "IDEA0", "ID": "c9f1d130-88f4-42da-8a10-71090b1501a0", "DetectTime": "2024-05-21T12:32:55.398798+00:00", "EventTime": "2024-05-21T12:32:55.398829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAOOE4AMTjfjyn2Te"], "accumulated_threat_level": 3.2, "timewindow": 72} +{"Format": "IDEA0", "ID": "2b9d4e4e-54a0-4dd5-86fa-6c131193497a", "DetectTime": "2024-05-21T12:32:55.682119+00:00", "EventTime": "2024-05-21T12:32:55.682139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cba2OJ2w3HsKEn1C76"], "accumulated_threat_level": 4.0, "timewindow": 72} +{"Format": "IDEA0", "ID": "296f6ae5-2c03-40bd-95d1-f6225694008a", "DetectTime": "2024-05-21T12:32:55.709199+00:00", "EventTime": "2024-05-21T12:32:55.709222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.51.236.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzejG1ONlYguSIzQ5"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "9ac98dee-9478-4fd5-882b-51ecb165756d", "DetectTime": "2024-05-21T12:32:55.740326+00:00", "EventTime": "2024-05-21T12:32:55.740345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQM933JO92hoYEJ4k"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "f8c20717-8c6a-4359-84a9-30b716b80392", "DetectTime": "2024-05-21T12:32:55.777252+00:00", "EventTime": "2024-05-21T12:32:55.777271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.7.185.64"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.7.185.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Ji3E4f73WLghyMX2"], "accumulated_threat_level": 5.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "7c6b6718-24d7-4f43-b8fc-fc9e3e739ff3", "DetectTime": "2024-05-21T12:32:55.814375+00:00", "EventTime": "2024-05-21T12:32:55.814395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfRhg2qhwnP6Aw9h3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 72} +{"Format": "IDEA0", "ID": "5718d967-f49d-4179-b05c-fefc2e60772d", "DetectTime": "2024-05-21T12:32:55.853463+00:00", "EventTime": "2024-05-21T12:32:55.853482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfskPSXOyfqhYY6F"], "accumulated_threat_level": 7.199999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "c75ab945-56d8-4abd-a768-07fe381ecf8f", "DetectTime": "2024-05-21T12:32:55.904353+00:00", "EventTime": "2024-05-21T12:32:55.904373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGM2c3MyWziZBHyhb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "184b4b4d-62bd-4fd8-8c1b-346747270ea3", "DetectTime": "2024-05-21T12:32:55.939935+00:00", "EventTime": "2024-05-21T12:32:55.939953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjurRi37xY9b4zX8Pg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "744f8f8c-71c9-4d59-afb0-280cff6b7f83", "DetectTime": "2024-05-21T12:32:55.993111+00:00", "EventTime": "2024-05-21T12:32:55.993349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoTG7W2BEngAuwe4Qd"], "accumulated_threat_level": 9.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "9c311df7-b444-4013-a495-a35bc2d73ff7", "DetectTime": "2024-05-21T12:32:56.258199+00:00", "EventTime": "2024-05-21T12:32:56.258218+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDn1s2tNcypVklQp1"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "5fb2caf2-4672-4456-99c8-da4515f4130b", "DetectTime": "2024-05-21T12:32:56.314478+00:00", "EventTime": "2024-05-21T12:32:56.314496+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDn1s2tNcypVklQp1"], "accumulated_threat_level": 10.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "8b8b1cde-cde4-4aa9-a570-89709db16d5e", "DetectTime": "2024-05-21T12:32:56.319532+00:00", "EventTime": "2024-05-21T12:32:56.319552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.221.67.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9gBC4RDC5RPGEMze"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "1addcb83-c9bd-4b84-863e-f72c1d9a9893", "DetectTime": "2024-05-21T12:32:56.324808+00:00", "EventTime": "2024-05-21T12:32:56.324828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.21.216.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRFG5W30qqG7QYY8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "c6b86c0d-05fe-4465-a7c8-f8a12b147dc0", "DetectTime": "2024-05-21T12:32:56.335547+00:00", "EventTime": "2024-05-21T12:32:56.335565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLwENJPEBqZlRLpxb"], "accumulated_threat_level": 10.4, "timewindow": 72} +{"Format": "IDEA0", "ID": "31e51007-e151-45ff-b9ba-0da73efe52d8", "DetectTime": "2024-05-21T12:32:56.346787+00:00", "EventTime": "2024-05-21T12:32:56.346805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CClcLG1mFFLVXlur7a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 72} +{"Format": "IDEA0", "ID": "a9184f60-bf15-411f-9e05-27bac5d93e49", "DetectTime": "2024-05-21T12:32:56.387287+00:00", "EventTime": "2024-05-21T12:32:56.387304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKVV3cqnPajlZM6ui"], "accumulated_threat_level": 12.000000000000002, "timewindow": 72} +{"Format": "Json", "ID": "a9184f60-bf15-411f-9e05-27bac5d93e49", "DetectTime": "2024-05-21T12:32:56.387287+00:00", "EventTime": "2024-05-21T12:32:56.387304+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "1970-01-03T23:13:21.029341+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2024/05/21 12:32:56.540596)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 72, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d91bc830-0c40-44b0-9a56-38926afa37f7", "DetectTime": "2024-05-21T12:32:56.551634+00:00", "EventTime": "2024-05-21T12:32:56.551653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hhkm1uppW2DFqaFj"], "accumulated_threat_level": 0.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "7e1e6171-f47c-4f91-818d-959cdc7f576d", "DetectTime": "2024-05-21T12:32:56.564068+00:00", "EventTime": "2024-05-21T12:32:56.564088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COfMaZ1a4AVTNLcXEc"], "accumulated_threat_level": 1.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "ba7f9c73-6601-443a-a439-b7b8716c3b25", "DetectTime": "2024-05-21T12:32:56.575705+00:00", "EventTime": "2024-05-21T12:32:56.575724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co2aPf1jtfyOl5oIK7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 72} +{"Format": "IDEA0", "ID": "f388f23c-e18f-434a-ba07-9bdfbc2dfe40", "DetectTime": "2024-05-21T12:32:56.587660+00:00", "EventTime": "2024-05-21T12:32:56.587678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02DJo4iDZqGqSt8na"], "accumulated_threat_level": 3.2, "timewindow": 72} +{"Format": "IDEA0", "ID": "d2e750f8-5781-4f30-b81f-f195c28c7621", "DetectTime": "2024-05-21T12:32:56.608309+00:00", "EventTime": "2024-05-21T12:32:56.608328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanzsB4ydyPthYzJwa"], "accumulated_threat_level": 4.0, "timewindow": 72} +{"Format": "IDEA0", "ID": "4621dc63-07a5-4fd0-a484-6facb8a537c3", "DetectTime": "2024-05-21T12:32:56.658744+00:00", "EventTime": "2024-05-21T12:32:56.658779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRC9zgrgiihq7tok"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "fc651cff-e043-4dbc-9a61-ea3fc39f9a7b", "DetectTime": "2024-05-21T12:32:56.709167+00:00", "EventTime": "2024-05-21T12:32:56.709202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.30.110"]}], "Attach": [{"Content": "Connection to unknown destination port 2062/UDP destination IP 88.254.30.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CryWb91CATlF8TL2q9"], "accumulated_threat_level": 5.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "f2b96a37-eded-4e76-a0cd-9f22d704870b", "DetectTime": "2024-05-21T12:32:56.735230+00:00", "EventTime": "2024-05-21T12:32:56.735253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39EuS2lPLK2m5E1r3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "a46a0160-778b-4cde-88db-e4ac87f38f45", "DetectTime": "2024-05-21T12:32:56.772546+00:00", "EventTime": "2024-05-21T12:32:56.772564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.68.195"]}], "Attach": [{"Content": "Connection to unknown destination port 18579/UDP destination IP 88.254.68.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdvbI3WOEX9psnKc3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 72} +{"Format": "IDEA0", "ID": "84e029a2-cabc-4aa9-88f2-df5bd6fb461d", "DetectTime": "2024-05-21T12:32:56.777973+00:00", "EventTime": "2024-05-21T12:32:56.777990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfUud4Bz6q26AcO71"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "40be7f18-2e37-4ad3-bf9b-1f1d708197e5", "DetectTime": "2024-05-21T12:32:57.080496+00:00", "EventTime": "2024-05-21T12:32:57.080519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmFV82QxF6XzEPVdg"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "02225781-85fd-479e-88f0-1991acdd56d0", "DetectTime": "2024-05-21T12:32:57.086764+00:00", "EventTime": "2024-05-21T12:32:57.086784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qLrD2Dnz0i5bL1u8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "180bca2b-31c5-402e-9034-082b7976dc7f", "DetectTime": "2024-05-21T12:32:57.091660+00:00", "EventTime": "2024-05-21T12:32:57.091678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9lY0O1XKWSVnbB0vc"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "b6c1ec7b-e7d0-4c45-8769-7f0dbf0dcf66", "DetectTime": "2024-05-21T12:32:57.096382+00:00", "EventTime": "2024-05-21T12:32:57.096401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9eE6f2Xyttku0YV6"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "e7c78096-6a7e-4f13-939e-4a4c0edb10ee", "DetectTime": "2024-05-21T12:32:57.128731+00:00", "EventTime": "2024-05-21T12:32:57.128751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7JLe37xYRrQ8QoU8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "d330fc7b-572c-4cca-965c-ce0e025f13e9", "DetectTime": "2024-05-21T12:32:57.207617+00:00", "EventTime": "2024-05-21T12:32:57.207638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBkLKlO4kv3oQoL"], "accumulated_threat_level": 7.199999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "9cf97cb4-14b4-4044-8f20-c21aeb0dd8c1", "DetectTime": "2024-05-21T12:32:57.213234+00:00", "EventTime": "2024-05-21T12:32:57.213252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clw8eF1us5l4ejZng2"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "913f0b9e-bc50-487a-ad65-bacdf80fb44f", "DetectTime": "2024-05-21T12:32:57.297124+00:00", "EventTime": "2024-05-21T12:32:57.297145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXxDm3wQSMunkoEY"], "accumulated_threat_level": 7.999999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "c3623377-5d12-4103-888a-a9833aedf2c6", "DetectTime": "2024-05-21T12:32:57.335345+00:00", "EventTime": "2024-05-21T12:32:57.335363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvML6lURHAMub0UH2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "05974c33-d876-4343-9a96-357ce6fe60a5", "DetectTime": "2024-05-21T12:32:57.597228+00:00", "EventTime": "2024-05-21T12:32:57.597247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9cHm4xxvgWJ7mab7"], "accumulated_threat_level": 9.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "c7107f32-f9d1-4005-9ff9-6acc9aa170e1", "DetectTime": "2024-05-21T12:32:57.667501+00:00", "EventTime": "2024-05-21T12:32:57.667523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cakr2nReFInak3B1"], "accumulated_threat_level": 10.4, "timewindow": 72} +{"Format": "IDEA0", "ID": "225b32e9-4632-48bd-ba25-a19638c5176b", "DetectTime": "2024-05-21T12:32:57.757864+00:00", "EventTime": "2024-05-21T12:32:57.757885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpxKIKCK0r3yWTn2"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "0e92df4a-0288-4b82-b7ca-c23eeb9a96c2", "DetectTime": "2024-05-21T12:32:57.847804+00:00", "EventTime": "2024-05-21T12:32:57.847826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJjvm3g2gKxh8Bnmd"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "cad96dc0-5dfd-46a4-9350-b964820c8b27", "DetectTime": "2024-05-21T12:32:57.883712+00:00", "EventTime": "2024-05-21T12:32:57.883736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyQ6u23Ut4oq95k0Kd"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "71cb6a25-59a8-4c76-9bca-34f8fb765461", "DetectTime": "2024-05-21T12:32:58.264212+00:00", "EventTime": "2024-05-21T12:32:58.264233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOpwk1mwkmQDEgDQ1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 72} +{"Format": "IDEA0", "ID": "6f93633c-a142-414c-bcde-b59369a0f857", "DetectTime": "2024-05-21T12:32:58.286535+00:00", "EventTime": "2024-05-21T12:32:58.286558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI6obe4bzNu1cs0WV3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "db1239d4-dd27-4e8a-bb44-fb55adcf997b", "DetectTime": "2024-05-21T12:32:58.291207+00:00", "EventTime": "2024-05-21T12:32:58.291227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILI8I2jWsCdlYFmdk"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "4b44f794-a5e5-4e71-8194-74a64836ee24", "DetectTime": "2024-05-21T12:32:58.351964+00:00", "EventTime": "2024-05-21T12:32:58.351983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUK3wC4Sc2g2ps1Mf8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "e0585135-4efd-4d94-b71f-9ccec4f5a7dc", "DetectTime": "2024-05-21T12:32:58.476614+00:00", "EventTime": "2024-05-21T12:32:58.476635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cop8q64rvQpAF06MK6"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "a24250ee-c111-4d38-b81f-b9fd4f1b57b4", "DetectTime": "2024-05-21T12:32:58.751819+00:00", "EventTime": "2024-05-21T12:32:58.751844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYzNzy3jZF8OTWj0Cb", "COCK1r4eRgf3Os3pLl", "CLXmqMazEAoL9d9Ug", "CrYgq14unOEeH7OA19"], "accumulated_threat_level": 11.700000000000001, "timewindow": 72} +{"Format": "IDEA0", "ID": "44e6ef04-94cd-4cfc-bd64-2f5410953f4b", "DetectTime": "2024-05-21T12:32:58.771093+00:00", "EventTime": "2024-05-21T12:32:58.771120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3FSAu29EW5mVwDA7e"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "871c8f23-c06b-4f45-892d-d6f392b86973", "DetectTime": "2024-05-21T12:32:58.812026+00:00", "EventTime": "2024-05-21T12:32:58.812047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJeYhk2Q7nHYo5ZJo1"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "245623c2-1498-45fe-b7cf-e52657867798", "DetectTime": "2024-05-21T12:32:58.868512+00:00", "EventTime": "2024-05-21T12:32:58.868537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUjsmZsXCO69SV72"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "ed059e95-d730-43fa-8947-9e9b6a0f3964", "DetectTime": "2024-05-21T12:32:58.906432+00:00", "EventTime": "2024-05-21T12:32:58.906454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1pVbe3uE2L9y2vC36"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "9c0df869-93c0-461a-99c6-9ab1418b4594", "DetectTime": "2024-05-21T12:32:59.243855+00:00", "EventTime": "2024-05-21T12:32:59.243877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce2J5l4JcWceGF1qW8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "de50baec-d50b-4dc3-8d84-35514a962afb", "DetectTime": "2024-05-21T12:32:59.249799+00:00", "EventTime": "2024-05-21T12:32:59.249818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFw9Lc3mHWbfDthX39"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "701d28c1-b305-46b3-910c-e882665307e9", "DetectTime": "2024-05-21T12:32:59.266786+00:00", "EventTime": "2024-05-21T12:32:59.266806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDhnr42WVBFJxpFwE4"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "1007522e-34d0-49ba-902f-089c90cfb6d0", "DetectTime": "2024-05-21T12:32:59.659385+00:00", "EventTime": "2024-05-21T12:32:59.659407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPuab19wQ5pmWVOAk"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "9dea4f5c-ca4c-4e81-9a99-a53e21c84fe6", "DetectTime": "2024-05-21T12:32:59.799182+00:00", "EventTime": "2024-05-21T12:32:59.799214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "Connection to unknown destination port 1088/UDP destination IP 193.169.115.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHVWq50bZvdIArAg"], "accumulated_threat_level": 12.500000000000002, "timewindow": 72} +{"Format": "Json", "ID": "9dea4f5c-ca4c-4e81-9a99-a53e21c84fe6", "DetectTime": "2024-05-21T12:32:59.799182+00:00", "EventTime": "2024-05-21T12:32:59.799214+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["193.169.115.140"]}], "Attach": [{"Content": "1970-01-03T23:43:47.931315+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2024/05/21 12:33:00.015640)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 72, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "d3f01657-4242-457f-b478-da12d5e1f5f7", "DetectTime": "2024-05-21T12:33:00.020750+00:00", "EventTime": "2024-05-21T12:33:00.020772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqnsZ71ZzdQs00fcPa"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "98fc50b0-bd43-4a37-8fdb-aff1b9b8cdb8", "DetectTime": "2024-05-21T12:33:00.026877+00:00", "EventTime": "2024-05-21T12:33:00.026897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAV9P1JXrrouThYgk"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "27262307-1a63-4bcd-8231-796a6ecd4909", "DetectTime": "2024-05-21T12:33:00.037967+00:00", "EventTime": "2024-05-21T12:33:00.037986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9K7c2nf1gikqIV0b"], "accumulated_threat_level": 0.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "d94268de-7125-43c2-926c-eeecfbc1f19f", "DetectTime": "2024-05-21T12:33:00.043312+00:00", "EventTime": "2024-05-21T12:33:00.043331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxRVU1qHmx3l1lNHl"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "cea7b298-1219-4ad7-b55b-8a7f7cc2a99d", "DetectTime": "2024-05-21T12:33:00.054074+00:00", "EventTime": "2024-05-21T12:33:00.054093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnuFV1BGq8Pbb9hQ"], "accumulated_threat_level": 1.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "77d88228-a713-4b9a-afcb-fd22a82a1af8", "DetectTime": "2024-05-21T12:33:00.059035+00:00", "EventTime": "2024-05-21T12:33:00.059054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJU1812ycBAdBsCfZ8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "3e59e6e2-aad0-4897-abee-ab53d2dcfef3", "DetectTime": "2024-05-21T12:33:00.063560+00:00", "EventTime": "2024-05-21T12:33:00.063578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3gjD2W2PY45fNqbd"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "f453ff55-280a-4442-8f0b-84be1279626e", "DetectTime": "2024-05-21T12:33:00.110109+00:00", "EventTime": "2024-05-21T12:33:00.110128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX33beniwOdH88nr5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 72} +{"Format": "IDEA0", "ID": "9b97e32a-383e-45c0-b615-224bf9c065a4", "DetectTime": "2024-05-21T12:33:00.163069+00:00", "EventTime": "2024-05-21T12:33:00.163090+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NZTQPbIWBiznQe3"], "accumulated_threat_level": 2.4240000000000004, "timewindow": 72} +{"Format": "IDEA0", "ID": "6b6d0a89-ee22-461b-9a9d-7f9c302166ed", "DetectTime": "2024-05-21T12:33:00.196584+00:00", "EventTime": "2024-05-21T12:33:00.196607+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NZTQPbIWBiznQe3"], "accumulated_threat_level": 0, "timewindow": 72} +{"Format": "IDEA0", "ID": "ea9684ca-0479-4b23-9970-aa3d4598c3b6", "DetectTime": "2024-05-21T12:33:00.310947+00:00", "EventTime": "2024-05-21T12:33:00.310968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFiD2c2ropJKNtGMs3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "1810505a-5c6c-40fc-bd60-36f53bff7797", "DetectTime": "2024-05-21T12:33:00.483147+00:00", "EventTime": "2024-05-21T12:33:00.483168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC1nzS3qHwaO0aHDjl"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "718c2eda-8c60-4acf-87b9-b3d6fa8e74dd", "DetectTime": "2024-05-21T12:33:00.521763+00:00", "EventTime": "2024-05-21T12:33:00.521785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9MzCFdwBb98RWCc"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "9710d00d-57ec-4a21-8d7f-281133ecdbf4", "DetectTime": "2024-05-21T12:33:00.568174+00:00", "EventTime": "2024-05-21T12:33:00.568194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpfDR1Lt72rXQUDmb"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "7b7080d6-7050-430a-b8dd-a3080aaf17c3", "DetectTime": "2024-05-21T12:33:00.573260+00:00", "EventTime": "2024-05-21T12:33:00.573281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKaFt2Igv7rxufWyc"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "0f3bc7c9-d622-4229-839a-9a824fda77eb", "DetectTime": "2024-05-21T12:33:00.849153+00:00", "EventTime": "2024-05-21T12:33:00.849173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI2KTr15D8JJu4qCr5"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "86b3a01f-9669-4089-86ef-5f9e3b9ea8f5", "DetectTime": "2024-05-21T12:33:00.915088+00:00", "EventTime": "2024-05-21T12:33:00.915109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTWGu11CBPGXUtm7r", "CT2MlEKmLmF3Lj6Rl", "CSNBzH1rcRzX09trJ9", "CaCifJ2u4GqvA691I9"], "accumulated_threat_level": 2.9240000000000004, "timewindow": 72} +{"Format": "IDEA0", "ID": "a08d6ba3-851f-4cf9-8fc7-a8fcdc1d5240", "DetectTime": "2024-05-21T12:33:00.979436+00:00", "EventTime": "2024-05-21T12:33:00.979460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.246.62.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbP0aw0U7eNfvdG4"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "2565613b-2697-450b-b5a3-fcd5e4c3035c", "DetectTime": "2024-05-21T12:33:01.015748+00:00", "EventTime": "2024-05-21T12:33:01.015770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.14.194.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD1c624yYgzzsGV33e"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "4efbe9ff-4807-4c99-873f-0394fc9e17b3", "DetectTime": "2024-05-21T12:33:01.058067+00:00", "EventTime": "2024-05-21T12:33:01.058089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.76.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4N4B7cfwzpeOa82"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "fe66132e-d5af-4710-910a-0e5d67a7bede", "DetectTime": "2024-05-21T12:33:01.090790+00:00", "EventTime": "2024-05-21T12:33:01.090819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7maWq4G6kVWPLNh8"], "accumulated_threat_level": 3.724, "timewindow": 72} +{"Format": "IDEA0", "ID": "496e767e-44bf-475a-b049-49685e650f40", "DetectTime": "2024-05-21T12:33:01.126693+00:00", "EventTime": "2024-05-21T12:33:01.126713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VHsK2QIn9ZOFqxy9"], "accumulated_threat_level": 4.524, "timewindow": 72} +{"Format": "IDEA0", "ID": "647be49d-a16c-4a98-98b0-c2a2e827c3e4", "DetectTime": "2024-05-21T12:33:01.165094+00:00", "EventTime": "2024-05-21T12:33:01.165113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuLj01rtQHx3UOrE3"], "accumulated_threat_level": 5.324, "timewindow": 72} +{"Format": "IDEA0", "ID": "7b38fe4a-d677-4924-9950-bb8f7d56e9ce", "DetectTime": "2024-05-21T12:33:01.214787+00:00", "EventTime": "2024-05-21T12:33:01.214808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPKzB4MaeaIJKHRDk"], "accumulated_threat_level": 6.124, "timewindow": 72} +{"Format": "IDEA0", "ID": "5241801a-3448-4079-b048-1f04f34496a7", "DetectTime": "2024-05-21T12:33:01.247266+00:00", "EventTime": "2024-05-21T12:33:01.247286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc76iq2NDETNJwhQlg"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "a78524c9-2561-4a33-b4fa-faceef8cbb46", "DetectTime": "2024-05-21T12:33:01.281058+00:00", "EventTime": "2024-05-21T12:33:01.281077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qMzz1A0VupBiYIG2"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 72} +{"Format": "IDEA0", "ID": "ae6749aa-01eb-4076-a24b-c063de73f332", "DetectTime": "2024-05-21T12:33:01.318271+00:00", "EventTime": "2024-05-21T12:33:01.318291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyM7W92v09dE8MqKLc"], "accumulated_threat_level": 7.723999999999999, "timewindow": 72} +{"Format": "IDEA0", "ID": "905f4a5f-88ca-45be-8da0-5145286ddaa4", "DetectTime": "2024-05-21T12:33:01.356757+00:00", "EventTime": "2024-05-21T12:33:01.356775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy42FFhKISMMloxQc"], "accumulated_threat_level": 8.524, "timewindow": 72} +{"Format": "IDEA0", "ID": "b602092b-5163-4676-9ef1-c268c338b446", "DetectTime": "2024-05-21T12:33:01.613593+00:00", "EventTime": "2024-05-21T12:33:01.613616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDzk1ZFCpaNHCjRi"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "312666c8-85c5-45dd-a533-2a6cf1636bab", "DetectTime": "2024-05-21T12:33:01.652987+00:00", "EventTime": "2024-05-21T12:33:01.653005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYqVCznKxL4ZySVei"], "accumulated_threat_level": 9.324, "timewindow": 72} +{"Format": "IDEA0", "ID": "6c48c6a5-e50b-4ca4-95ed-d95499e53559", "DetectTime": "2024-05-21T12:33:01.682783+00:00", "EventTime": "2024-05-21T12:33:01.682807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGyjb37JJSn4hDRA7"], "accumulated_threat_level": 10.124, "timewindow": 72} +{"Format": "IDEA0", "ID": "efe4dd48-d901-4f20-9204-0e70e68308b5", "DetectTime": "2024-05-21T12:33:01.719628+00:00", "EventTime": "2024-05-21T12:33:01.719651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvB1LU1n1YZCrNHtz9"], "accumulated_threat_level": 10.924000000000001, "timewindow": 72} +{"Format": "IDEA0", "ID": "ce82edef-7ed2-4d00-ae26-cb5e93cf6b7b", "DetectTime": "2024-05-21T12:33:01.745498+00:00", "EventTime": "2024-05-21T12:33:01.745519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChovcQ3dPgzt3pamgf"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "8e9940ca-4dfc-4ecf-9747-080e49e8e724", "DetectTime": "2024-05-21T12:33:01.777990+00:00", "EventTime": "2024-05-21T12:33:01.778011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3B62zlkQcYJ2MyO8"], "accumulated_threat_level": 11.724000000000002, "timewindow": 72} +{"Format": "IDEA0", "ID": "a4078c0a-9592-40ec-bab2-45cd7239ec01", "DetectTime": "2024-05-21T12:33:01.819726+00:00", "EventTime": "2024-05-21T12:33:01.819746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co94II2SEJmDCHQgn5"], "accumulated_threat_level": 12.524000000000003, "timewindow": 72} +{"Format": "Json", "ID": "a4078c0a-9592-40ec-bab2-45cd7239ec01", "DetectTime": "2024-05-21T12:33:01.819726+00:00", "EventTime": "2024-05-21T12:33:01.819746+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "1970-01-03T23:44:10.080416+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 72. (real time 2024/05/21 12:33:02.063164)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 72, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "f56993ed-fb97-4012-9886-e1202a4b6b2c", "DetectTime": "2024-05-21T12:33:02.067415+00:00", "EventTime": "2024-05-21T12:33:02.067435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKhROt4C1BBgWvHRFb"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "a0c98f43-5c1a-42cf-8072-bde168abef18", "DetectTime": "2024-05-21T12:33:02.125063+00:00", "EventTime": "2024-05-21T12:33:02.125088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbu0f2L9fQUEoBAW3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "229a446a-ebe5-4cec-8150-cc145d078e25", "DetectTime": "2024-05-21T12:33:02.279808+00:00", "EventTime": "2024-05-21T12:33:02.279840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXb2LG3RDQBxQd8vW3"], "accumulated_threat_level": 0.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "ff7a271e-de0e-4419-9c3b-37a9a2b3e6be", "DetectTime": "2024-05-21T12:33:02.307096+00:00", "EventTime": "2024-05-21T12:33:02.307120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWjxw2G4QPRjmmdGd"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "fb78e0d1-6feb-4151-8de9-2890819e84bf", "DetectTime": "2024-05-21T12:33:02.342631+00:00", "EventTime": "2024-05-21T12:33:02.342648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuGl443jYZRXccVFh"], "accumulated_threat_level": 1.6, "timewindow": 72} +{"Format": "IDEA0", "ID": "b304a089-90a1-467d-97b0-c2f448cc2a1d", "DetectTime": "2024-05-21T12:33:02.381463+00:00", "EventTime": "2024-05-21T12:33:02.381481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CearIyVog0IbqOYcf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 72} +{"Format": "IDEA0", "ID": "c0a7d523-a57c-44f3-9821-587c278eb7ad", "DetectTime": "2024-05-21T12:33:02.422773+00:00", "EventTime": "2024-05-21T12:33:02.422793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWyDc2YJAQEcG3Y3l"], "accumulated_threat_level": 3.2, "timewindow": 72} +{"Format": "IDEA0", "ID": "b2172a41-2477-48fc-b69b-d4d3172cb2df", "DetectTime": "2024-05-21T12:33:02.486235+00:00", "EventTime": "2024-05-21T12:33:02.486252+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRILxw2Ox7tfBvWsL6"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "b85162e6-f1f2-456f-8413-df27fe041461", "DetectTime": "2024-05-21T12:33:02.497119+00:00", "EventTime": "2024-05-21T12:33:02.497137+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRILxw2Ox7tfBvWsL6"], "accumulated_threat_level": 10.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "7042a92c-c35b-4f10-afdd-7c93042782f5", "DetectTime": "2024-05-21T12:33:02.518926+00:00", "EventTime": "2024-05-21T12:33:02.518945+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzzZK2YDvahOTtgtk"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "2b47ff0b-cc98-423c-b69f-1c64d8fe1301", "DetectTime": "2024-05-21T12:33:02.530314+00:00", "EventTime": "2024-05-21T12:33:02.530333+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzzZK2YDvahOTtgtk"], "accumulated_threat_level": 11.1, "timewindow": 22} +{"Format": "IDEA0", "ID": "891ae1c2-6975-41c0-8ec1-bb5828880cd3", "DetectTime": "2024-05-21T12:33:02.680754+00:00", "EventTime": "2024-05-21T12:33:02.680775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckeorr3QFGopd7njP6"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "1c02952f-b3c9-45d4-a0c2-ddbc94ac17f1", "DetectTime": "2024-05-21T12:33:02.715932+00:00", "EventTime": "2024-05-21T12:33:02.715954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQflSIHzK2tjZFhr5"], "accumulated_threat_level": 4.0, "timewindow": 72} +{"Format": "IDEA0", "ID": "81cd8d32-292f-4faf-a4f7-29c42324d76f", "DetectTime": "2024-05-21T12:33:02.756169+00:00", "EventTime": "2024-05-21T12:33:02.756190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ACEn2iYqWjLigJui"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "f478dd75-d7e1-4535-b455-1a443970c832", "DetectTime": "2024-05-21T12:33:02.801682+00:00", "EventTime": "2024-05-21T12:33:02.801702+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2O01I2nR5VR3ZTBO3"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "c8339a1f-2121-4b84-bc76-3954dec9d36d", "DetectTime": "2024-05-21T12:33:02.816205+00:00", "EventTime": "2024-05-21T12:33:02.816228+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2O01I2nR5VR3ZTBO3"], "accumulated_threat_level": 11.6, "timewindow": 22} +{"Format": "IDEA0", "ID": "201e81c1-4e90-4d74-bf38-41a8f2a2a422", "DetectTime": "2024-05-21T12:33:02.821339+00:00", "EventTime": "2024-05-21T12:33:02.821358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCzdY29DhdRqnnBPa"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "815fd6f8-c367-4505-8154-8b400725db04", "DetectTime": "2024-05-21T12:33:02.835948+00:00", "EventTime": "2024-05-21T12:33:02.835966+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEVLc21BbmB5axLsj"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "0bf59479-118b-4bb3-99c2-d59d4c502d2a", "DetectTime": "2024-05-21T12:33:02.849448+00:00", "EventTime": "2024-05-21T12:33:02.849466+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEVLc21BbmB5axLsj"], "accumulated_threat_level": 12.1, "timewindow": 22} +{"Format": "Json", "ID": "0bf59479-118b-4bb3-99c2-d59d4c502d2a", "DetectTime": "2024-05-21T12:33:02.849448+00:00", "EventTime": "2024-05-21T12:33:02.849466+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "1970-01-01T21:23:37.367005+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2024/05/21 12:33:03.504706)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 22, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "50f3318c-18ec-40d0-999f-84b6a353f6da", "DetectTime": "2024-05-21T12:33:03.515632+00:00", "EventTime": "2024-05-21T12:33:03.515650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChDEFWeF5kS4MqE9i"], "accumulated_threat_level": 0.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "abc9de49-7084-4745-bb09-d1ba077585b3", "DetectTime": "2024-05-21T12:33:03.520420+00:00", "EventTime": "2024-05-21T12:33:03.520438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0uVf3CcbsVUf0K3k"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "34205605-f9bd-4cc0-b606-a3739ef4fc58", "DetectTime": "2024-05-21T12:33:03.530875+00:00", "EventTime": "2024-05-21T12:33:03.530893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtPCDOxiNn5VK958"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "2c700c40-a0df-4194-bd75-0e4135038d93", "DetectTime": "2024-05-21T12:33:03.542794+00:00", "EventTime": "2024-05-21T12:33:03.542815+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtPCDOxiNn5VK958"], "accumulated_threat_level": 0.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "a63351c2-e48f-4c97-a22f-f35b530550a1", "DetectTime": "2024-05-21T12:33:03.547380+00:00", "EventTime": "2024-05-21T12:33:03.547398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXtmoH2XMMegDmqgLa"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "31ff0228-d49b-47c7-a4d4-3b4b20406667", "DetectTime": "2024-05-21T12:33:03.551809+00:00", "EventTime": "2024-05-21T12:33:03.551827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COUa4R1kwBVfQOiFF2"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "8a9c50ca-9a10-4be7-b239-b8d5dffa76ee", "DetectTime": "2024-05-21T12:33:03.556131+00:00", "EventTime": "2024-05-21T12:33:03.556149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GAyl07lPL1xez6f"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "890b89a2-c617-4219-a7dc-6aac6a754532", "DetectTime": "2024-05-21T12:33:03.613343+00:00", "EventTime": "2024-05-21T12:33:03.613361+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrZZj455MJalYJJPk"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "4c60712b-a64d-4e80-bfdb-8e9c08ece5d9", "DetectTime": "2024-05-21T12:33:03.627586+00:00", "EventTime": "2024-05-21T12:33:03.627609+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrZZj455MJalYJJPk"], "accumulated_threat_level": 1.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "9f987d29-9282-4297-bb08-9d3ced4639cb", "DetectTime": "2024-05-21T12:33:03.632780+00:00", "EventTime": "2024-05-21T12:33:03.632799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2gup1lhZwhSOOB9e"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "25730735-23bf-4976-91c7-cac3d4cd5f80", "DetectTime": "2024-05-21T12:33:03.637590+00:00", "EventTime": "2024-05-21T12:33:03.637609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8HF73vnjlQFwf8Z8"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "522af55e-538f-44f5-82bf-7c30921bc271", "DetectTime": "2024-05-21T12:33:03.650282+00:00", "EventTime": "2024-05-21T12:33:03.650300+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vX6g1P9EHcHxMZS7"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "be5c3de8-bf32-4472-a223-1b63a3de6196", "DetectTime": "2024-05-21T12:33:03.663467+00:00", "EventTime": "2024-05-21T12:33:03.663486+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vX6g1P9EHcHxMZS7"], "accumulated_threat_level": 1.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "3ddd53d9-d3f2-41b5-b0a3-845ec0c1dabf", "DetectTime": "2024-05-21T12:33:03.674054+00:00", "EventTime": "2024-05-21T12:33:03.674072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50HBN3zkUXRCEX9Bj"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "a73977da-7d87-4547-8f91-7f38b5528c37", "DetectTime": "2024-05-21T12:33:03.678963+00:00", "EventTime": "2024-05-21T12:33:03.678981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENThz3BbVTZCtSrD3"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "ddeeee2a-3b0a-4102-bec2-265760a6e466", "DetectTime": "2024-05-21T12:33:03.683599+00:00", "EventTime": "2024-05-21T12:33:03.683616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vow64fDE6OcHq718"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "bedda638-89d5-4e85-92c6-046b9748100e", "DetectTime": "2024-05-21T12:33:03.696434+00:00", "EventTime": "2024-05-21T12:33:03.696456+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAf9Be3rCHFixzfgRi"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "70543751-613e-4691-8d7c-9ba5768bc243", "DetectTime": "2024-05-21T12:33:03.712008+00:00", "EventTime": "2024-05-21T12:33:03.712031+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAf9Be3rCHFixzfgRi"], "accumulated_threat_level": 2.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "1ae53f35-ff73-4d5e-9ca9-9724621511ce", "DetectTime": "2024-05-21T12:33:03.725188+00:00", "EventTime": "2024-05-21T12:33:03.725204+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLlBnB35oeGutjYymd"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "0e78c083-fa85-455f-b161-9133e768123d", "DetectTime": "2024-05-21T12:33:03.738635+00:00", "EventTime": "2024-05-21T12:33:03.738659+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLlBnB35oeGutjYymd"], "accumulated_threat_level": 2.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "79224394-e346-4955-9234-3a5262e1bec3", "DetectTime": "2024-05-21T12:33:03.758698+00:00", "EventTime": "2024-05-21T12:33:03.758716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYm4sv1l0TMs2s6Ii"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "c6218bbb-24b8-4671-bc72-4a8916bad114", "DetectTime": "2024-05-21T12:33:03.771169+00:00", "EventTime": "2024-05-21T12:33:03.771187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYm4sv1l0TMs2s6Ii"], "accumulated_threat_level": 3.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "7e2b2493-23db-4af7-b5a7-8935853a7cdd", "DetectTime": "2024-05-21T12:33:03.776374+00:00", "EventTime": "2024-05-21T12:33:03.776392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxU8dI33wtgsGu28"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "216ee20c-9947-4b92-b7a5-95abe01e1e84", "DetectTime": "2024-05-21T12:33:03.787008+00:00", "EventTime": "2024-05-21T12:33:03.787027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxUAkTV1NUlMh1h2"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "346c91f5-6b29-465b-893a-100c71f7d587", "DetectTime": "2024-05-21T12:33:03.792062+00:00", "EventTime": "2024-05-21T12:33:03.792081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJasAm25DUTV4F7N7"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "dfbfb6d6-b705-4bb9-a97c-18156ab9d8aa", "DetectTime": "2024-05-21T12:33:03.796858+00:00", "EventTime": "2024-05-21T12:33:03.796876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCtEKK3zu7yJXIl1k6"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "3efadbb7-da00-4fc3-9c86-3cef08699a59", "DetectTime": "2024-05-21T12:33:03.801508+00:00", "EventTime": "2024-05-21T12:33:03.801526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadzBc31OV6z2ecZh7"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "a3585b5b-a075-423c-94da-8e3973d800db", "DetectTime": "2024-05-21T12:33:03.806334+00:00", "EventTime": "2024-05-21T12:33:03.806352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvr3pA3SFkeclYAtqe"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "66a8a365-b551-42df-aa94-c178407941e4", "DetectTime": "2024-05-21T12:33:03.840355+00:00", "EventTime": "2024-05-21T12:33:03.840378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95bpb2lHvs0BQRNcl"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "2f66411e-e2e7-40d3-b60b-70fd9a5afbca", "DetectTime": "2024-05-21T12:33:03.879638+00:00", "EventTime": "2024-05-21T12:33:03.879660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6tYK9quqYtgmRLi"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "7d28d85e-d1ed-46fe-afe1-8cfd66020388", "DetectTime": "2024-05-21T12:33:03.911064+00:00", "EventTime": "2024-05-21T12:33:03.911085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLTlywwASyWLK2NNl"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "13179802-f954-4c53-9493-522b734f403f", "DetectTime": "2024-05-21T12:33:03.949741+00:00", "EventTime": "2024-05-21T12:33:03.949763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMw1l52eDw0xl3c0Nc"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "86ef6a3a-0274-49df-bff0-fe752a9efdbf", "DetectTime": "2024-05-21T12:33:04.203256+00:00", "EventTime": "2024-05-21T12:33:04.203280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cph51ubwMnLRLgWxh"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "3d505f42-3d4c-4a33-bad1-e64cf6060f20", "DetectTime": "2024-05-21T12:33:04.320208+00:00", "EventTime": "2024-05-21T12:33:04.320232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1yeq1zjCeF05NQpb"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "5f12bd49-bde2-4bf2-908e-78c6e92a90dc", "DetectTime": "2024-05-21T12:33:04.337152+00:00", "EventTime": "2024-05-21T12:33:04.337175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiIG3d1cUeP0fJOvMc", "Cbl63x2zG0KblypnZh", "C5DAsh151R8hisg8Yh", "CSaLS01bHe5vhZrIHd"], "accumulated_threat_level": 1.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "a7ed9568-014d-4365-9f2b-15fcd6bceaef", "DetectTime": "2024-05-21T12:33:04.441877+00:00", "EventTime": "2024-05-21T12:33:04.441897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqs3vo11m4PfuKJkR5"], "accumulated_threat_level": 0.8, "timewindow": 70} +{"Format": "IDEA0", "ID": "51252e89-5cbd-46d7-9676-ea8579b89a4c", "DetectTime": "2024-05-21T12:33:04.513808+00:00", "EventTime": "2024-05-21T12:33:04.513827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEm5iI3Pr1HRTRlARj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "d8349764-27b3-4f71-a138-6e20b6ff4d9f", "DetectTime": "2024-05-21T12:33:04.586844+00:00", "EventTime": "2024-05-21T12:33:04.586864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSJSAxWkCkoQ5Da5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "f890bcb1-8440-435f-b0f8-9e69fe55b02e", "DetectTime": "2024-05-21T12:33:04.621997+00:00", "EventTime": "2024-05-21T12:33:04.622018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6pV9Z1PWx0aP4Biva"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "374c4fb7-8a7b-4fc6-9a9d-3ff1fa4eab2c", "DetectTime": "2024-05-21T12:33:04.657338+00:00", "EventTime": "2024-05-21T12:33:04.657359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36sSk1heO2ZxpFjv2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "e4197cdf-ec21-41fb-a340-03d69496771d", "DetectTime": "2024-05-21T12:33:04.705469+00:00", "EventTime": "2024-05-21T12:33:04.705488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1SG1n3heaT9lfkmOj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "a68adaa4-b1cd-4027-95eb-e40a28142a9c", "DetectTime": "2024-05-21T12:33:04.711205+00:00", "EventTime": "2024-05-21T12:33:04.711223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjK3hyPIM4QfRX0Ff"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "bdffb3cd-743a-472f-a9e1-f259e1e61da0", "DetectTime": "2024-05-21T12:33:04.778684+00:00", "EventTime": "2024-05-21T12:33:04.778710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tpfl4aboju7PV8T3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "f3b1d039-3221-4a85-b7dc-876ac980a6f5", "DetectTime": "2024-05-21T12:33:04.803507+00:00", "EventTime": "2024-05-21T12:33:04.803530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAzzDSIWXcHKMQkl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "7bf2fcce-e96c-43d7-bd24-a6ce65658761", "DetectTime": "2024-05-21T12:33:04.851607+00:00", "EventTime": "2024-05-21T12:33:04.851630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXTLHp46bUu7EtuyGj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "ea1d7c90-dd81-4883-999f-8083d0552fee", "DetectTime": "2024-05-21T12:33:04.864252+00:00", "EventTime": "2024-05-21T12:33:04.864275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjmb6w3QulVpV4Qjfk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "42f51cac-d10c-4a1d-b336-f18fc43cd614", "DetectTime": "2024-05-21T12:33:05.131697+00:00", "EventTime": "2024-05-21T12:33:05.131721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0b2Rb3BFrvwhkgjz9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "6c35f7df-d7a8-448f-b4a7-d9030d6c12d2", "DetectTime": "2024-05-21T12:33:05.168589+00:00", "EventTime": "2024-05-21T12:33:05.168609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNkIC1N9HUinq73L4"], "accumulated_threat_level": 2.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "cd539430-635f-45a3-af67-c24187bc5aa4", "DetectTime": "2024-05-21T12:33:05.202209+00:00", "EventTime": "2024-05-21T12:33:05.202227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPU3003QEfOrQSJTUg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "355a8bb1-8e6d-490f-afe3-2f78d448290f", "DetectTime": "2024-05-21T12:33:05.301243+00:00", "EventTime": "2024-05-21T12:33:05.301265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreSOY3AAmtz51Qn2g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "f9db6032-b95e-402c-9d84-39dad7f4e432", "DetectTime": "2024-05-21T12:33:05.346204+00:00", "EventTime": "2024-05-21T12:33:05.346227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4E8nHOhvDIQykKVi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "1f290816-d7ae-4747-9393-125168bc9beb", "DetectTime": "2024-05-21T12:33:05.393190+00:00", "EventTime": "2024-05-21T12:33:05.393212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf5RYj3aJ4IfsNFvg4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "c48d1cd4-cee1-4865-abd7-f103fa50af26", "DetectTime": "2024-05-21T12:33:05.447359+00:00", "EventTime": "2024-05-21T12:33:05.447380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuW5BV2iYVCON6u6s1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "9a265ca9-c85c-4950-b737-a4c3e2416a46", "DetectTime": "2024-05-21T12:33:05.513389+00:00", "EventTime": "2024-05-21T12:33:05.513410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAsFkD43GMZOCbqCO4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "840ed054-12d7-49de-8d29-d7911f9e7cf6", "DetectTime": "2024-05-21T12:33:05.536384+00:00", "EventTime": "2024-05-21T12:33:05.536403+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiX1j11938iugerWmh"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "2cd8dbf2-c0a5-47d2-8df3-5b675e570c5e", "DetectTime": "2024-05-21T12:33:05.547951+00:00", "EventTime": "2024-05-21T12:33:05.547971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiX1j11938iugerWmh"], "accumulated_threat_level": 3.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "c9010076-9fe6-4a95-8b47-bbf3794fad0f", "DetectTime": "2024-05-21T12:33:05.692304+00:00", "EventTime": "2024-05-21T12:33:05.692323+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNxxq3jcbNEEzIo12"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "d10097b5-ef30-4ffc-a0a0-9adf53ddd256", "DetectTime": "2024-05-21T12:33:05.705900+00:00", "EventTime": "2024-05-21T12:33:05.705917+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNxxq3jcbNEEzIo12"], "accumulated_threat_level": 4.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "c07234ea-be14-4319-b25b-04a22961edb9", "DetectTime": "2024-05-21T12:33:05.798694+00:00", "EventTime": "2024-05-21T12:33:05.798713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBY11x4GWxSU3BDaP7"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "0f1538f7-d791-4c1d-9522-d3cbc4993111", "DetectTime": "2024-05-21T12:33:05.811088+00:00", "EventTime": "2024-05-21T12:33:05.811120+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBY11x4GWxSU3BDaP7"], "accumulated_threat_level": 4.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "fc97c05f-ecbd-4930-8a9a-b5ec06b279b2", "DetectTime": "2024-05-21T12:33:05.830086+00:00", "EventTime": "2024-05-21T12:33:05.830107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQpYRb17ughArzM9gf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "5426dafd-f394-4286-bad0-36d0e358f509", "DetectTime": "2024-05-21T12:33:05.955675+00:00", "EventTime": "2024-05-21T12:33:05.955696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBy70a21BriB6VdZf7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "2143ba54-f785-4623-87cc-b3619b68641c", "DetectTime": "2024-05-21T12:33:05.986278+00:00", "EventTime": "2024-05-21T12:33:05.986298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJmtB2lR9rwyap9p2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "e6ea192d-d110-47f0-9317-ed02d0570861", "DetectTime": "2024-05-21T12:33:06.014449+00:00", "EventTime": "2024-05-21T12:33:06.014477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNs4ONGmdYKRvkHE1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "16c76ad1-b6e6-4801-92c6-63df4368cd51", "DetectTime": "2024-05-21T12:33:06.057998+00:00", "EventTime": "2024-05-21T12:33:06.058016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWEYPnhlUHEVCaKl"], "accumulated_threat_level": 3.7, "timewindow": 73} +{"Format": "IDEA0", "ID": "262a32fd-5345-4e69-bd1f-c1ed4dcb9dbd", "DetectTime": "2024-05-21T12:33:06.062656+00:00", "EventTime": "2024-05-21T12:33:06.062674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1PDF72T7hhqt3nk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "4f42e870-c23a-4a20-abcc-9f8d7e0e7c8c", "DetectTime": "2024-05-21T12:33:06.301585+00:00", "EventTime": "2024-05-21T12:33:06.301603+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORZ6027lW1ttyQZr8"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "8650e840-6155-4f22-8a29-fa5a81036daa", "DetectTime": "2024-05-21T12:33:06.313174+00:00", "EventTime": "2024-05-21T12:33:06.313192+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORZ6027lW1ttyQZr8"], "accumulated_threat_level": 5.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "73114bb1-7255-4634-951d-71a159cc578f", "DetectTime": "2024-05-21T12:33:06.334382+00:00", "EventTime": "2024-05-21T12:33:06.334400+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vGa31Xyu8LbVNGFi"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "56065df6-5d4d-4d0e-adbd-bd77b0fb2cc0", "DetectTime": "2024-05-21T12:33:06.350558+00:00", "EventTime": "2024-05-21T12:33:06.350580+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vGa31Xyu8LbVNGFi"], "accumulated_threat_level": 5.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "e0455dd1-66a3-4a61-af4c-fd91447d00cf", "DetectTime": "2024-05-21T12:33:06.355799+00:00", "EventTime": "2024-05-21T12:33:06.355817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTZkdi1jYwRbPUXAP6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "6bbb663c-4994-4d2d-a506-770dbd0715c4", "DetectTime": "2024-05-21T12:33:06.367665+00:00", "EventTime": "2024-05-21T12:33:06.367682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNtH43FQUK0RjUdz6"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "8e76ec5b-a6af-4253-adfe-8d6381afaca7", "DetectTime": "2024-05-21T12:33:06.378831+00:00", "EventTime": "2024-05-21T12:33:06.378849+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNtH43FQUK0RjUdz6"], "accumulated_threat_level": 6.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "acd6ef46-2f90-4ccf-ab95-c9dd4f7eb038", "DetectTime": "2024-05-21T12:33:06.389406+00:00", "EventTime": "2024-05-21T12:33:06.389424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9jze1JgcROHTIVTl"], "accumulated_threat_level": 4.5, "timewindow": 73} +{"Format": "IDEA0", "ID": "46e71a1a-8989-4d8a-9c79-a0612c3d42d6", "DetectTime": "2024-05-21T12:33:06.394105+00:00", "EventTime": "2024-05-21T12:33:06.394123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBmyK0yYMKxgCa5a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "f4b352cf-b420-49ca-bc79-5b91169866ef", "DetectTime": "2024-05-21T12:33:06.398671+00:00", "EventTime": "2024-05-21T12:33:06.398689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcXH533TAK6tg7BHCd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "d12c8642-09a0-461c-b6de-8f86b79263dd", "DetectTime": "2024-05-21T12:33:06.403352+00:00", "EventTime": "2024-05-21T12:33:06.403369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLXtj8S2rCyvUPzh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "645f336c-76ee-4ade-b093-1d03eaa12b95", "DetectTime": "2024-05-21T12:33:06.520126+00:00", "EventTime": "2024-05-21T12:33:06.520146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwhWA4G4E6lpsG4yc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "868595f4-37af-4e58-abfa-d4802b14a410", "DetectTime": "2024-05-21T12:33:06.557963+00:00", "EventTime": "2024-05-21T12:33:06.557982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6wlR2cvX0nuCZIt5"], "accumulated_threat_level": 5.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "24db57d8-ae19-4b40-a0f3-f0e52262f407", "DetectTime": "2024-05-21T12:33:06.600342+00:00", "EventTime": "2024-05-21T12:33:06.600362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRNXx4D37ItwqodW5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "7b918d85-35d7-463c-969c-415ad898dbc4", "DetectTime": "2024-05-21T12:33:06.641697+00:00", "EventTime": "2024-05-21T12:33:06.641715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9VBD1F5X7hOhfGQb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 73} +{"Format": "IDEA0", "ID": "8c9dad0e-860c-4695-be05-9bb82662f58b", "DetectTime": "2024-05-21T12:33:06.678282+00:00", "EventTime": "2024-05-21T12:33:06.678301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nWt446E2a5t95hyh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "541589f7-c929-433a-8a36-ccd5d1de751e", "DetectTime": "2024-05-21T12:33:06.706042+00:00", "EventTime": "2024-05-21T12:33:06.706061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3j25x318o8toACjy5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "96807947-4b47-4749-ab79-f28dff97d02d", "DetectTime": "2024-05-21T12:33:06.974484+00:00", "EventTime": "2024-05-21T12:33:06.974506+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCYjb3AAr1ceyBMEi"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "127d7cf6-7b7e-47d1-a8dd-e58ac205e690", "DetectTime": "2024-05-21T12:33:06.986381+00:00", "EventTime": "2024-05-21T12:33:06.986400+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCYjb3AAr1ceyBMEi"], "accumulated_threat_level": 6.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "a745bcae-ed66-4e4d-831d-0e2a97d7cc24", "DetectTime": "2024-05-21T12:33:07.004432+00:00", "EventTime": "2024-05-21T12:33:07.004451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNoxq24DkdpZpTqcj"], "accumulated_threat_level": 8.5, "timewindow": 73} +{"Format": "IDEA0", "ID": "39748adb-b61f-4c93-b8aa-c3adc773afce", "DetectTime": "2024-05-21T12:33:07.034864+00:00", "EventTime": "2024-05-21T12:33:07.034885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hIGA4cRBHITgAJo1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "c3e27ca6-5754-4139-a7f9-341cd8f79131", "DetectTime": "2024-05-21T12:33:07.040813+00:00", "EventTime": "2024-05-21T12:33:07.040832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGFJYC4vGI2BtY9N04"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "df80ef74-db24-4453-9107-382435862ddf", "DetectTime": "2024-05-21T12:33:07.045437+00:00", "EventTime": "2024-05-21T12:33:07.045456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnIDRl0kwKEWYDAg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "00271c76-f3e6-4b94-8ec6-a9a3dbcf7823", "DetectTime": "2024-05-21T12:33:07.052411+00:00", "EventTime": "2024-05-21T12:33:07.052431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7MMs4g5T8MXojZck"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "9b2718cc-1ebd-43d7-888d-9afb110bdca9", "DetectTime": "2024-05-21T12:33:07.057427+00:00", "EventTime": "2024-05-21T12:33:07.057445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnI7UjZTcqBhzwZQ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "bb611209-c112-464c-b689-547587400ab3", "DetectTime": "2024-05-21T12:33:07.185317+00:00", "EventTime": "2024-05-21T12:33:07.185337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxfvXm3tXAkIiXkhFg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "662eee0e-da7d-4cf3-8d56-605dcc421b2e", "DetectTime": "2024-05-21T12:33:07.198678+00:00", "EventTime": "2024-05-21T12:33:07.198702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuI4MT3cUeKtxlnfC6"], "accumulated_threat_level": 9.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "65ba67ed-5fd2-4b61-8f85-5c63837ae507", "DetectTime": "2024-05-21T12:33:07.252990+00:00", "EventTime": "2024-05-21T12:33:07.253010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIcu7x1cuzGLjuWK98"], "accumulated_threat_level": 10.100000000000001, "timewindow": 73} +{"Format": "IDEA0", "ID": "50c51d20-3668-4134-93d7-c84ca308a23b", "DetectTime": "2024-05-21T12:33:07.295243+00:00", "EventTime": "2024-05-21T12:33:07.295261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROA6d4BwVQFZlnQjk"], "accumulated_threat_level": 10.900000000000002, "timewindow": 73} +{"Format": "IDEA0", "ID": "a42b16d4-7e3c-4938-8dfe-04ec9e0560d3", "DetectTime": "2024-05-21T12:33:07.328946+00:00", "EventTime": "2024-05-21T12:33:07.328965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRhCB1Ny6dcXLPTae"], "accumulated_threat_level": 11.700000000000003, "timewindow": 73} +{"Format": "IDEA0", "ID": "b1642aaa-5de4-42aa-b0cb-e5221036f1a0", "DetectTime": "2024-05-21T12:33:07.367687+00:00", "EventTime": "2024-05-21T12:33:07.367709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct98Um2I7XPrOYy1S9"], "accumulated_threat_level": 12.500000000000004, "timewindow": 73} +{"Format": "Json", "ID": "b1642aaa-5de4-42aa-b0cb-e5221036f1a0", "DetectTime": "2024-05-21T12:33:07.367687+00:00", "EventTime": "2024-05-21T12:33:07.367709+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-04T00:16:46.922066+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2024/05/21 12:33:07.578825)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 73, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "03f79c44-ffc8-49ac-9f3f-28dbfb6fb8c4", "DetectTime": "2024-05-21T12:33:07.591250+00:00", "EventTime": "2024-05-21T12:33:07.591269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjXZu3njMJ5Ouxli3"], "accumulated_threat_level": 0.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "093807b9-3a56-42a8-ae51-3425137b1da9", "DetectTime": "2024-05-21T12:33:07.603570+00:00", "EventTime": "2024-05-21T12:33:07.603592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBkEM1tu5rI7Nkfrh"], "accumulated_threat_level": 1.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "4fb47f83-84c2-4f92-8f5e-25eff7b341c9", "DetectTime": "2024-05-21T12:33:07.711277+00:00", "EventTime": "2024-05-21T12:33:07.711300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQELWQ11ChBjMPTj26"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "060431fd-2e43-495a-9805-b3e2d7b7378c", "DetectTime": "2024-05-21T12:33:07.716790+00:00", "EventTime": "2024-05-21T12:33:07.716808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTL2LpBVxlDGRM5x4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "1e0383ef-2784-44b2-9b27-84e37ddaff46", "DetectTime": "2024-05-21T12:33:07.721400+00:00", "EventTime": "2024-05-21T12:33:07.721418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CULmd53CqgN6ZH8Ic2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "5c838580-a098-470e-a755-49cfeac7eb09", "DetectTime": "2024-05-21T12:33:07.725958+00:00", "EventTime": "2024-05-21T12:33:07.725976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiLcXh26BWCouKHpo3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "76e3cfc3-5e2b-4c8d-8b1b-52c447b41734", "DetectTime": "2024-05-21T12:33:07.825459+00:00", "EventTime": "2024-05-21T12:33:07.825477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwtAg1vTbtIfFImL9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "c7d162a5-a394-4c88-9254-863f727e10c9", "DetectTime": "2024-05-21T12:33:07.868039+00:00", "EventTime": "2024-05-21T12:33:07.868058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbOjgws3f6Ycljnye"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "527e1542-4b81-4cff-92ab-fefb1d28622e", "DetectTime": "2024-05-21T12:33:07.872719+00:00", "EventTime": "2024-05-21T12:33:07.872737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPcryd2h1GqiJGB0C1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "dcc3e2b0-d5ba-4d90-b2ac-cd05891208c0", "DetectTime": "2024-05-21T12:33:07.914060+00:00", "EventTime": "2024-05-21T12:33:07.914086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT21rM1OaBLj7bubUc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "a497d6f1-ec8d-4db5-adef-6a29341ec5fb", "DetectTime": "2024-05-21T12:33:07.953672+00:00", "EventTime": "2024-05-21T12:33:07.953693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xw0C4Cdc8WpNQgYd"], "accumulated_threat_level": 3.2, "timewindow": 73} +{"Format": "IDEA0", "ID": "5dda3918-7f4d-4c87-a40a-0666c966137a", "DetectTime": "2024-05-21T12:33:07.982180+00:00", "EventTime": "2024-05-21T12:33:07.982203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Candf14JNBQUUNQcM2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "bf37710f-2e42-4fe6-9cc2-42679040160e", "DetectTime": "2024-05-21T12:33:07.987387+00:00", "EventTime": "2024-05-21T12:33:07.987410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CntsV257SmxIqEcS"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "13d80179-8fe8-409b-895a-8f9aa586b5c9", "DetectTime": "2024-05-21T12:33:08.312263+00:00", "EventTime": "2024-05-21T12:33:08.312287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxXkn242d3AfUA2wml"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "82ea8ec9-ab1e-408c-b27b-fec20f7a0478", "DetectTime": "2024-05-21T12:33:08.325064+00:00", "EventTime": "2024-05-21T12:33:08.325086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfNgd1kkKhUYOGq9f"], "accumulated_threat_level": 4.0, "timewindow": 73} +{"Format": "IDEA0", "ID": "357ee0e8-7c88-42b6-942f-339683f548fe", "DetectTime": "2024-05-21T12:33:08.330300+00:00", "EventTime": "2024-05-21T12:33:08.330318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHlSO94QrztlE2TFOk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "04b67727-aef9-4b87-bdd1-6427f3eb9850", "DetectTime": "2024-05-21T12:33:08.343062+00:00", "EventTime": "2024-05-21T12:33:08.343083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbniIWmYb0eHrVYi6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "c57663bc-6267-4e0e-87fe-bfd35690ed67", "DetectTime": "2024-05-21T12:33:08.434830+00:00", "EventTime": "2024-05-21T12:33:08.434849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAPlB6273ez6nbpHWg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "bc58973e-1cb3-4291-8647-f019b95ad14a", "DetectTime": "2024-05-21T12:33:08.439694+00:00", "EventTime": "2024-05-21T12:33:08.439713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLf4D4jNViVXJgff3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "5e4654aa-f858-4653-8516-b395c6b2f67f", "DetectTime": "2024-05-21T12:33:08.502022+00:00", "EventTime": "2024-05-21T12:33:08.502041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmxh0j3afuYThKNxRb"], "accumulated_threat_level": 4.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "7f2e9c71-2bed-428e-bbe8-e126fe09dcdb", "DetectTime": "2024-05-21T12:33:08.506389+00:00", "EventTime": "2024-05-21T12:33:08.506421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HLyG37lNP05YjCE8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "9715d832-b288-4f7c-b1fc-1a5fb12d45a7", "DetectTime": "2024-05-21T12:33:08.545968+00:00", "EventTime": "2024-05-21T12:33:08.545989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ3zTG1QDSAsM0skgg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "cc61b5a7-28e8-47e6-bb3d-c4aa343ede2d", "DetectTime": "2024-05-21T12:33:08.585497+00:00", "EventTime": "2024-05-21T12:33:08.585519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQzku3iviH1ckLJY2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "69dd20cd-a746-48cf-8b7a-a5751bb2a816", "DetectTime": "2024-05-21T12:33:08.614009+00:00", "EventTime": "2024-05-21T12:33:08.614031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYrHOqrzqlrld0Ul"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "141d4d92-18d4-4a75-8020-73855acdd4be", "DetectTime": "2024-05-21T12:33:08.625651+00:00", "EventTime": "2024-05-21T12:33:08.625673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEORDQ1j0RxaAWvtq"], "accumulated_threat_level": 5.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "ad8e15ba-bf8c-4316-be65-09393080927c", "DetectTime": "2024-05-21T12:33:08.674160+00:00", "EventTime": "2024-05-21T12:33:08.674183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9wci27v6wZHtmiX6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "fe8b82a6-ad21-404e-8e88-3a4427bfbe8b", "DetectTime": "2024-05-21T12:33:08.710389+00:00", "EventTime": "2024-05-21T12:33:08.710422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsC7zI2ArLdzZ5OA9a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 73} +{"Format": "IDEA0", "ID": "f83636ec-73bc-401c-877d-3077e60f7722", "DetectTime": "2024-05-21T12:33:09.031555+00:00", "EventTime": "2024-05-21T12:33:09.031575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQW6Xh1otGcYayWB6g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "4159ff07-e426-4140-a325-465b7686454d", "DetectTime": "2024-05-21T12:33:09.036412+00:00", "EventTime": "2024-05-21T12:33:09.036430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0Tug2oqtHBL7ODub"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "70930566-b045-424c-8498-52aeefb61272", "DetectTime": "2024-05-21T12:33:09.136563+00:00", "EventTime": "2024-05-21T12:33:09.136583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16yv84EtC1ZQK4vql"], "accumulated_threat_level": 7.199999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "af7c8d62-82ef-4239-88bc-ffbc31068ae0", "DetectTime": "2024-05-21T12:33:09.174804+00:00", "EventTime": "2024-05-21T12:33:09.174824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nD8k3p5W3ypfStx7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "bb178c14-4bf3-4248-be26-7d8b6a67d53c", "DetectTime": "2024-05-21T12:33:09.209075+00:00", "EventTime": "2024-05-21T12:33:09.209094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IFcP3p8Jt9uAjLc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "e03b6009-3e4f-491a-b0d6-3bb6bbfbd95c", "DetectTime": "2024-05-21T12:33:09.235594+00:00", "EventTime": "2024-05-21T12:33:09.235615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ConWC81PUrPwKPTSP4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "760ec7de-0f0a-46c3-b344-b6e5bbcbdf7d", "DetectTime": "2024-05-21T12:33:09.358230+00:00", "EventTime": "2024-05-21T12:33:09.358248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckds8a2cydOeSEh2ya"], "accumulated_threat_level": 8.799999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "b2760365-eae6-48c6-afc0-bb32efd0b931", "DetectTime": "2024-05-21T12:33:09.414396+00:00", "EventTime": "2024-05-21T12:33:09.414429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnSQ73O7Nxq4VDvZ7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "3281cfe9-cc20-4150-8f03-69a49677f7de", "DetectTime": "2024-05-21T12:33:09.453838+00:00", "EventTime": "2024-05-21T12:33:09.453857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEF7Ry1CdLwMvoGSvf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "e90b720f-e543-4001-beaf-1aa18db28cd2", "DetectTime": "2024-05-21T12:33:09.486000+00:00", "EventTime": "2024-05-21T12:33:09.486018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LWtl4AqTaBPhmdpf"], "accumulated_threat_level": 9.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "6f7a12a5-d87f-412b-8ebb-ad5e389a3100", "DetectTime": "2024-05-21T12:33:09.511744+00:00", "EventTime": "2024-05-21T12:33:09.511764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuUrzS8zBb7Byw19i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "b8ed39c4-368e-4f96-acd1-91b797ef6a2e", "DetectTime": "2024-05-21T12:33:09.545326+00:00", "EventTime": "2024-05-21T12:33:09.545346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6BF9122vCODSUFf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "bbeaa6b2-b90a-470b-86b3-7c0d1c9dd6c3", "DetectTime": "2024-05-21T12:33:09.873694+00:00", "EventTime": "2024-05-21T12:33:09.873717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6rXY26P5V18WTzPl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "be9452dd-f856-41eb-8412-a4b8744e0317", "DetectTime": "2024-05-21T12:33:09.911134+00:00", "EventTime": "2024-05-21T12:33:09.911155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDjbj43LUzo5x94I6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 71} +{"Format": "IDEA0", "ID": "0c33c8b8-3daf-4ee5-8c8f-7bbef49c38ba", "DetectTime": "2024-05-21T12:33:09.983342+00:00", "EventTime": "2024-05-21T12:33:09.983365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bTKpEdIqNmgthQ4"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "7251d4cf-29b5-479e-9687-f48d89b52641", "DetectTime": "2024-05-21T12:33:10.025032+00:00", "EventTime": "2024-05-21T12:33:10.025052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtgQi1BXlIAB2uoh6"], "accumulated_threat_level": 10.4, "timewindow": 73} +{"Format": "IDEA0", "ID": "4df70656-fae8-47d7-a958-d3e6a9aab8e9", "DetectTime": "2024-05-21T12:33:10.136030+00:00", "EventTime": "2024-05-21T12:33:10.136054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sKpFRPKVW4O2uQj"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "5010c319-5ad3-4623-97f3-66b1296229bb", "DetectTime": "2024-05-21T12:33:10.169388+00:00", "EventTime": "2024-05-21T12:33:10.169409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJlZc4dCWyQHVtd24"], "accumulated_threat_level": 11.200000000000001, "timewindow": 73} +{"Format": "IDEA0", "ID": "fe0df181-0de0-4fde-82b8-a44862d8e86f", "DetectTime": "2024-05-21T12:33:10.216220+00:00", "EventTime": "2024-05-21T12:33:10.216240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkPw94HYvgnmrSjLk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 73} +{"Format": "Json", "ID": "fe0df181-0de0-4fde-82b8-a44862d8e86f", "DetectTime": "2024-05-21T12:33:10.216220+00:00", "EventTime": "2024-05-21T12:33:10.216240+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "1970-01-04T00:20:19.634349+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2024/05/21 12:33:10.367940)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 73, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5b3752c8-c24b-48c8-9cf9-f9294050341d", "DetectTime": "2024-05-21T12:33:10.379661+00:00", "EventTime": "2024-05-21T12:33:10.379683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMeBi3HWLYX5fYDvc"], "accumulated_threat_level": 0.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "02161d8b-0c64-4724-b229-3dbda935d69e", "DetectTime": "2024-05-21T12:33:10.384432+00:00", "EventTime": "2024-05-21T12:33:10.384450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR66vb3TZF4lQE1zJa"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "57eb5e6f-fee0-4967-9df1-f662ed16b3ad", "DetectTime": "2024-05-21T12:33:10.389251+00:00", "EventTime": "2024-05-21T12:33:10.389269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWA1T12Pjz2wlYYf8"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "afca34f6-dfa4-4590-b0e3-69ec3a56fd96", "DetectTime": "2024-05-21T12:33:10.428870+00:00", "EventTime": "2024-05-21T12:33:10.428891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAOOE4AMTjfjyn2Te"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "336b0618-c6c5-4679-8b2d-4bdbff896151", "DetectTime": "2024-05-21T12:33:10.638623+00:00", "EventTime": "2024-05-21T12:33:10.638643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2kpo4IOufupE85v7"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "91c1aff0-335a-4baf-8740-f150c343ef34", "DetectTime": "2024-05-21T12:33:10.711619+00:00", "EventTime": "2024-05-21T12:33:10.711639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cba2OJ2w3HsKEn1C76"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "41fa3dc1-3aff-4ee9-813d-fdbd54f24a34", "DetectTime": "2024-05-21T12:33:10.767924+00:00", "EventTime": "2024-05-21T12:33:10.767947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQM933JO92hoYEJ4k"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "c087ea58-e3cd-4c00-a9d6-b3ab01bc3409", "DetectTime": "2024-05-21T12:33:11.052524+00:00", "EventTime": "2024-05-21T12:33:11.052544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.47.55.122"]}], "Attach": [{"Content": "Connection to unknown destination port 22660/UDP destination IP 186.47.55.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce0fVYuTflZYQFjtb"], "accumulated_threat_level": 1.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "5ec5b38e-cfc9-4f80-85b4-8316a50b5234", "DetectTime": "2024-05-21T12:33:11.057715+00:00", "EventTime": "2024-05-21T12:33:11.057734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGM2c3MyWziZBHyhb"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "2046a315-7b62-4f9d-8604-13de6c213d9b", "DetectTime": "2024-05-21T12:33:11.062377+00:00", "EventTime": "2024-05-21T12:33:11.062394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Ji3E4f73WLghyMX2"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "97921502-a556-471f-8ff3-c6938e9feb4b", "DetectTime": "2024-05-21T12:33:11.098068+00:00", "EventTime": "2024-05-21T12:33:11.098089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfskPSXOyfqhYY6F"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "62da3b17-9c43-4341-8623-e5c5fadeeba7", "DetectTime": "2024-05-21T12:33:11.110123+00:00", "EventTime": "2024-05-21T12:33:11.110141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfRhg2qhwnP6Aw9h3"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "b71ac244-8cd0-476e-a73d-d06d48f2f00c", "DetectTime": "2024-05-21T12:33:11.124819+00:00", "EventTime": "2024-05-21T12:33:11.124837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjurRi37xY9b4zX8Pg"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "f30c0be7-b504-4242-b3d1-c9b27bdfac3d", "DetectTime": "2024-05-21T12:33:11.248276+00:00", "EventTime": "2024-05-21T12:33:11.248400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoTG7W2BEngAuwe4Qd"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "76c1e3e3-baf9-41a5-b4d7-259373a27167", "DetectTime": "2024-05-21T12:33:11.296252+00:00", "EventTime": "2024-05-21T12:33:11.296271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.53.58.144"]}], "Attach": [{"Content": "Connection to unknown destination port 27629/UDP destination IP 60.53.58.144. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCf46Z2k3pgXp2xFje"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "eb37a806-49b6-4651-9936-f31c22facea4", "DetectTime": "2024-05-21T12:33:11.336255+00:00", "EventTime": "2024-05-21T12:33:11.336274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLwENJPEBqZlRLpxb"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "e4150a60-7a25-4b6a-b2b4-8d63e8dab532", "DetectTime": "2024-05-21T12:33:11.373753+00:00", "EventTime": "2024-05-21T12:33:11.373775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CClcLG1mFFLVXlur7a"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "07cd0dd5-c728-4626-8d6c-26811039fa8a", "DetectTime": "2024-05-21T12:33:11.411934+00:00", "EventTime": "2024-05-21T12:33:11.411956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7LYh02km1WLSr5jOf"], "accumulated_threat_level": 3.2, "timewindow": 73} +{"Format": "IDEA0", "ID": "9878886e-3529-4dd5-834e-de0f0c5de343", "DetectTime": "2024-05-21T12:33:11.439398+00:00", "EventTime": "2024-05-21T12:33:11.439422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKVV3cqnPajlZM6ui"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "1e12156f-0286-45e3-befa-f611636abdbb", "DetectTime": "2024-05-21T12:33:11.730736+00:00", "EventTime": "2024-05-21T12:33:11.730758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hhkm1uppW2DFqaFj"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "fadf0691-fcae-4786-97be-867840ee0a92", "DetectTime": "2024-05-21T12:33:11.743853+00:00", "EventTime": "2024-05-21T12:33:11.743874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co2aPf1jtfyOl5oIK7"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "dacfced7-0016-4ae0-a2be-e7a2246238d3", "DetectTime": "2024-05-21T12:33:11.755955+00:00", "EventTime": "2024-05-21T12:33:11.755977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"]}], "Attach": [{"Content": "Connection to unknown destination port 22330/UDP destination IP 181.65.46.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLg463aUjXS7KOlXe"], "accumulated_threat_level": 4.0, "timewindow": 73} +{"Format": "IDEA0", "ID": "0ee0523e-0f82-47b7-80fd-4ac257926071", "DetectTime": "2024-05-21T12:33:11.772956+00:00", "EventTime": "2024-05-21T12:33:11.772981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COfMaZ1a4AVTNLcXEc"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "1ddaeeed-b3ce-47e1-83f0-891f8166b415", "DetectTime": "2024-05-21T12:33:11.778401+00:00", "EventTime": "2024-05-21T12:33:11.778453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02DJo4iDZqGqSt8na"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "20ccc24a-80de-466b-a3de-d4da6a3ee090", "DetectTime": "2024-05-21T12:33:11.783283+00:00", "EventTime": "2024-05-21T12:33:11.783301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanzsB4ydyPthYzJwa"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "c0b44eb9-7ea7-46c1-88e9-d672bd560895", "DetectTime": "2024-05-21T12:33:11.802641+00:00", "EventTime": "2024-05-21T12:33:11.802662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRC9zgrgiihq7tok"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "d7d752b5-2de9-407a-b7eb-001f9704191a", "DetectTime": "2024-05-21T12:33:11.924868+00:00", "EventTime": "2024-05-21T12:33:11.924891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CryWb91CATlF8TL2q9"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "b3610cf2-0cce-4238-a908-980361fdcc65", "DetectTime": "2024-05-21T12:33:12.020990+00:00", "EventTime": "2024-05-21T12:33:12.021008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAH5Ou4RTvsXljcxK3"], "accumulated_threat_level": 4.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "0c41711c-830a-4c3e-8d2a-c27cff4ea34a", "DetectTime": "2024-05-21T12:33:12.059729+00:00", "EventTime": "2024-05-21T12:33:12.059749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWQTe73bZwCPkBQojd"], "accumulated_threat_level": 5.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "ef137b6f-1137-47d8-9c0b-411a7d92073c", "DetectTime": "2024-05-21T12:33:12.085821+00:00", "EventTime": "2024-05-21T12:33:12.085840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdvbI3WOEX9psnKc3"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "dfccf1f1-8ef1-408d-8cc0-00e38f147c18", "DetectTime": "2024-05-21T12:33:12.115627+00:00", "EventTime": "2024-05-21T12:33:12.115646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQPU31BaGKQdxGF3h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 73} +{"Format": "IDEA0", "ID": "6fa5e340-32f0-4d7b-be7e-e59273537ab9", "DetectTime": "2024-05-21T12:33:12.375629+00:00", "EventTime": "2024-05-21T12:33:12.375653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXxDm3wQSMunkoEY"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "13a306d0-56c5-40be-a262-a6cfa0e890a5", "DetectTime": "2024-05-21T12:33:12.381207+00:00", "EventTime": "2024-05-21T12:33:12.381232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBkLKlO4kv3oQoL"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "b2641990-5cca-4e3b-8114-814c3f3097d1", "DetectTime": "2024-05-21T12:33:12.661794+00:00", "EventTime": "2024-05-21T12:33:12.661814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvML6lURHAMub0UH2"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "d369d072-61b8-4f03-92c1-c4c5b55bfe13", "DetectTime": "2024-05-21T12:33:12.688078+00:00", "EventTime": "2024-05-21T12:33:12.688104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9cHm4xxvgWJ7mab7"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "efa0db54-003b-4f87-a992-62ec59157d3d", "DetectTime": "2024-05-21T12:33:12.700983+00:00", "EventTime": "2024-05-21T12:33:12.701002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYU7uhFfr6DTlxfh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "e355d2fc-5b5e-411b-81e0-04b6d7cb7e8d", "DetectTime": "2024-05-21T12:33:12.747243+00:00", "EventTime": "2024-05-21T12:33:12.747263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cakr2nReFInak3B1"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "fefb49f5-18c0-4bda-91d6-95d6f3ee5dae", "DetectTime": "2024-05-21T12:33:13.030685+00:00", "EventTime": "2024-05-21T12:33:13.030705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJhz6D1jkQLobaoj9g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "cc5ca5f9-ec90-4dd3-8519-183fc610bc6a", "DetectTime": "2024-05-21T12:33:13.425184+00:00", "EventTime": "2024-05-21T12:33:13.425205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPNrs4NGnKndPeck"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "3e8f4e17-1e28-4f25-a6c9-0411f3a6de0d", "DetectTime": "2024-05-21T12:33:13.430187+00:00", "EventTime": "2024-05-21T12:33:13.430208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSOpwk1mwkmQDEgDQ1"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "9c277fcd-efc0-43d2-ac87-e7338d9b398c", "DetectTime": "2024-05-21T12:33:13.481970+00:00", "EventTime": "2024-05-21T12:33:13.481991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgGcLC2xJLO9BM8nOj"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "5707cbaf-41c0-4360-8c92-b4dd80fbd4f7", "DetectTime": "2024-05-21T12:33:13.804842+00:00", "EventTime": "2024-05-21T12:33:13.804862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH3s8A3ddqk0oDXCt"], "accumulated_threat_level": 8.799999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "9759dab5-a576-43e2-b7cd-632a90f45c29", "DetectTime": "2024-05-21T12:33:13.903872+00:00", "EventTime": "2024-05-21T12:33:13.903893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cczmsv24PlIOlGLqEi"], "accumulated_threat_level": 9.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "1e1802f2-cb9b-494f-ba0a-22f16e6137a6", "DetectTime": "2024-05-21T12:33:13.988007+00:00", "EventTime": "2024-05-21T12:33:13.988025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"]}], "Attach": [{"Content": "Connection to unknown destination port 4440/UDP destination IP 201.155.76.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrsfK22UtHDUgy6QUg"], "accumulated_threat_level": 10.4, "timewindow": 73} +{"Format": "IDEA0", "ID": "52a378fb-a60e-4dbd-86ce-9b25316bed2b", "DetectTime": "2024-05-21T12:33:14.029025+00:00", "EventTime": "2024-05-21T12:33:14.029044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.254.182.91"]}], "Attach": [{"Content": "Connection to unknown destination port 5030/UDP destination IP 190.254.182.91. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFONGd4yy5kK6B6zE6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 73} +{"Format": "IDEA0", "ID": "9b7bff04-87c8-4dec-8cf5-73c7e0529cb1", "DetectTime": "2024-05-21T12:33:14.308959+00:00", "EventTime": "2024-05-21T12:33:14.308982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chl1VoEa3bGwD0DB5"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "d75fad98-87f9-4413-9630-a83827e5d601", "DetectTime": "2024-05-21T12:33:14.322011+00:00", "EventTime": "2024-05-21T12:33:14.322031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"]}], "Attach": [{"Content": "Connection to unknown destination port 1130/UDP destination IP 190.200.221.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBiwsw44uR0RNobmhc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 73} +{"Format": "Json", "ID": "d75fad98-87f9-4413-9630-a83827e5d601", "DetectTime": "2024-05-21T12:33:14.322011+00:00", "EventTime": "2024-05-21T12:33:14.322031+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"]}], "Attach": [{"Content": "1970-01-04T00:24:30.619014+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2024/05/21 12:33:14.508087)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 73, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "722bdf7d-e946-44e3-a1dd-0df64cc7d6d6", "DetectTime": "2024-05-21T12:33:14.859539+00:00", "EventTime": "2024-05-21T12:33:14.859560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHVWq50bZvdIArAg"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "3e22eb63-e14d-4d58-a000-c57c86ae351e", "DetectTime": "2024-05-21T12:33:14.949193+00:00", "EventTime": "2024-05-21T12:33:14.949215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9K7c2nf1gikqIV0b"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "c95c9a7c-35a6-4130-820f-e5ad7534cd47", "DetectTime": "2024-05-21T12:33:15.046833+00:00", "EventTime": "2024-05-21T12:33:15.046859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnuFV1BGq8Pbb9hQ"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "dab73d5a-a7fe-4ade-b3f4-25814ad4be43", "DetectTime": "2024-05-21T12:33:15.160520+00:00", "EventTime": "2024-05-21T12:33:15.160542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVunSwGD5VZizLeJ3"], "accumulated_threat_level": 0.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "363a67e4-bbcf-4a0e-a299-b8c42e038777", "DetectTime": "2024-05-21T12:33:15.188453+00:00", "EventTime": "2024-05-21T12:33:15.188473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NZTQPbIWBiznQe3"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "f0bac932-a09d-476d-940b-2900600e9a7e", "DetectTime": "2024-05-21T12:33:15.193562+00:00", "EventTime": "2024-05-21T12:33:15.193582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX33beniwOdH88nr5"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "c009682e-5670-4b42-b77d-cd521cdafb76", "DetectTime": "2024-05-21T12:33:15.246691+00:00", "EventTime": "2024-05-21T12:33:15.246712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrZb22njlt8S8UiV2"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "21dd91f0-d325-45e4-bbfd-39c7946fe1d4", "DetectTime": "2024-05-21T12:33:15.942466+00:00", "EventTime": "2024-05-21T12:33:15.942489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FwZN3GGFBEBYmylk", "CxQZA94mtUIpfav1K2", "CV2Ivc3ogYTGe7Efh3", "C0Uuzb3filEyxD3Sti"], "accumulated_threat_level": 1.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "1f9eb7e0-4bb5-46b8-969e-cb2961c639c8", "DetectTime": "2024-05-21T12:33:16.117994+00:00", "EventTime": "2024-05-21T12:33:16.118013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7maWq4G6kVWPLNh8"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "8d2526c6-4194-4406-9ce4-a200aad7e729", "DetectTime": "2024-05-21T12:33:16.155837+00:00", "EventTime": "2024-05-21T12:33:16.155860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VHsK2QIn9ZOFqxy9"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "851bfb60-ab79-4276-8eac-45f393627b1c", "DetectTime": "2024-05-21T12:33:16.261985+00:00", "EventTime": "2024-05-21T12:33:16.262008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuLj01rtQHx3UOrE3"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "fcf83623-2db3-4d1e-a110-ffc0107c77d0", "DetectTime": "2024-05-21T12:33:16.336547+00:00", "EventTime": "2024-05-21T12:33:16.336572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPKzB4MaeaIJKHRDk"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "9508cfa9-7162-495d-8641-fcce20ca6923", "DetectTime": "2024-05-21T12:33:16.342670+00:00", "EventTime": "2024-05-21T12:33:16.342691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qMzz1A0VupBiYIG2"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "8a9e5ad7-df8a-4c3d-a549-89baad6c1ff4", "DetectTime": "2024-05-21T12:33:16.504242+00:00", "EventTime": "2024-05-21T12:33:16.504260+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fkxR2gvXPcn11jyj"], "accumulated_threat_level": 1.324, "timewindow": 73} +{"Format": "IDEA0", "ID": "45104f28-d98c-4ce2-b250-3589be3135f9", "DetectTime": "2024-05-21T12:33:16.556637+00:00", "EventTime": "2024-05-21T12:33:16.556654+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fkxR2gvXPcn11jyj"], "accumulated_threat_level": 0, "timewindow": 73} +{"Format": "IDEA0", "ID": "ea97a8ee-7c75-4c72-a47a-60ff0e9a4d1c", "DetectTime": "2024-05-21T12:33:16.643701+00:00", "EventTime": "2024-05-21T12:33:16.643720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWXXB5bpruXbbAzf"], "accumulated_threat_level": 2.124, "timewindow": 73} +{"Format": "IDEA0", "ID": "540aefe3-50ed-4f91-b90f-d8d000e41375", "DetectTime": "2024-05-21T12:33:16.648598+00:00", "EventTime": "2024-05-21T12:33:16.648617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyM7W92v09dE8MqKLc"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "16f4ec4a-808d-47a5-8901-313f476d0c25", "DetectTime": "2024-05-21T12:33:16.690130+00:00", "EventTime": "2024-05-21T12:33:16.690150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy42FFhKISMMloxQc"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "6ab1e9da-343a-4d75-b211-4528f66b77e1", "DetectTime": "2024-05-21T12:33:16.736173+00:00", "EventTime": "2024-05-21T12:33:16.736193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYqVCznKxL4ZySVei"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "d737a948-c987-4d92-8e8a-c5d14c277b95", "DetectTime": "2024-05-21T12:33:16.760152+00:00", "EventTime": "2024-05-21T12:33:16.760184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGyjb37JJSn4hDRA7"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "c28a8286-3c13-4bd6-a6be-927e0b1ee691", "DetectTime": "2024-05-21T12:33:16.793351+00:00", "EventTime": "2024-05-21T12:33:16.793372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvB1LU1n1YZCrNHtz9"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "3ad4aa9e-8f6e-4438-8faf-c43ee8753e82", "DetectTime": "2024-05-21T12:33:16.827953+00:00", "EventTime": "2024-05-21T12:33:16.827973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSdeaq01FLmEYqxe"], "accumulated_threat_level": 2.9240000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "d1a89624-07a5-4ca4-b930-ecdb1b80dcbe", "DetectTime": "2024-05-21T12:33:16.851500+00:00", "EventTime": "2024-05-21T12:33:16.851521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3B62zlkQcYJ2MyO8"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "8144f214-3dd6-4593-9858-0fad24db2b04", "DetectTime": "2024-05-21T12:33:16.897245+00:00", "EventTime": "2024-05-21T12:33:16.897265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcbKxU2wMzHFVJf13b"], "accumulated_threat_level": 3.724, "timewindow": 73} +{"Format": "IDEA0", "ID": "d9c9a40d-8cd0-444b-ba70-4d4a73dff946", "DetectTime": "2024-05-21T12:33:16.901896+00:00", "EventTime": "2024-05-21T12:33:16.901914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co94II2SEJmDCHQgn5"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "fef66047-096d-41b9-8753-eb8be0d6df54", "DetectTime": "2024-05-21T12:33:16.943036+00:00", "EventTime": "2024-05-21T12:33:16.943054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHLpf2UyrcX75SBpl"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "638bdac7-7afd-4134-ba05-1a2db7f379bd", "DetectTime": "2024-05-21T12:33:16.986943+00:00", "EventTime": "2024-05-21T12:33:16.986965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.169.222.118"]}], "Attach": [{"Content": "Connection to unknown destination port 7026/UDP destination IP 99.169.222.118. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8WgXk1NIlCxToeSyl"], "accumulated_threat_level": 4.524, "timewindow": 73} +{"Format": "IDEA0", "ID": "16211526-1470-4132-926f-a9eda4ba1c90", "DetectTime": "2024-05-21T12:33:17.032001+00:00", "EventTime": "2024-05-21T12:33:17.032029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.123.76"]}], "Attach": [{"Content": "Connection to unknown destination port 14723/UDP destination IP 188.54.123.76. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4jXK2nSMsArmvbP6"], "accumulated_threat_level": 5.324, "timewindow": 73} +{"Format": "IDEA0", "ID": "dea4721b-2fff-44dd-920e-a38e9ee80058", "DetectTime": "2024-05-21T12:33:17.282663+00:00", "EventTime": "2024-05-21T12:33:17.282683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyGLa10hl29ZXDsFd"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "d1ad8aa3-9dad-4b13-8763-698ac4e5baf0", "DetectTime": "2024-05-21T12:33:17.319215+00:00", "EventTime": "2024-05-21T12:33:17.319237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C52dhR0BDg9qGACs4"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "cbb4341a-1be7-46e2-9ad9-74c3057b49bb", "DetectTime": "2024-05-21T12:33:17.355872+00:00", "EventTime": "2024-05-21T12:33:17.355891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqkVtc2bcjGTw2pxX1"], "accumulated_threat_level": 6.124, "timewindow": 73} +{"Format": "IDEA0", "ID": "10664dca-96b1-4401-956d-dfd8460533d0", "DetectTime": "2024-05-21T12:33:17.360745+00:00", "EventTime": "2024-05-21T12:33:17.360764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXb2LG3RDQBxQd8vW3"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "5bd402be-4203-47cd-a607-e39cb4f5b119", "DetectTime": "2024-05-21T12:33:17.595887+00:00", "EventTime": "2024-05-21T12:33:17.595909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CearIyVog0IbqOYcf"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "8e7f806e-1871-4e51-8431-fdb6f563627d", "DetectTime": "2024-05-21T12:33:17.600709+00:00", "EventTime": "2024-05-21T12:33:17.600728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuGl443jYZRXccVFh"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "33f6b956-1371-4579-941c-13b0c9c7668f", "DetectTime": "2024-05-21T12:33:17.649822+00:00", "EventTime": "2024-05-21T12:33:17.649840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhVS84qRgEmjPbnlj"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 73} +{"Format": "IDEA0", "ID": "f49cb122-5a31-4524-bb16-82483e8414a0", "DetectTime": "2024-05-21T12:33:17.687151+00:00", "EventTime": "2024-05-21T12:33:17.687171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWyDc2YJAQEcG3Y3l"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "caa3e427-107e-4d45-85fa-de46d52b0370", "DetectTime": "2024-05-21T12:33:17.699579+00:00", "EventTime": "2024-05-21T12:33:17.699598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8s5r29Ho2VUXW7ba"], "accumulated_threat_level": 7.723999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "8753518b-21e5-4395-81d1-7595651e6b31", "DetectTime": "2024-05-21T12:33:17.744338+00:00", "EventTime": "2024-05-21T12:33:17.744359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQflSIHzK2tjZFhr5"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "49ffb833-d8b8-4aeb-b83a-56927ec52987", "DetectTime": "2024-05-21T12:33:17.776478+00:00", "EventTime": "2024-05-21T12:33:17.776496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiaAsW2JrhG1ArQmgf"], "accumulated_threat_level": 8.524, "timewindow": 73} +{"Format": "IDEA0", "ID": "a92b0e7b-e879-44c4-8393-9eab5f167675", "DetectTime": "2024-05-21T12:33:17.801195+00:00", "EventTime": "2024-05-21T12:33:17.801216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ACEn2iYqWjLigJui"], "accumulated_threat_level": 4.8, "timewindow": 72} +{"Format": "IDEA0", "ID": "a3f45af8-572b-41c2-9225-46e3b0ac1570", "DetectTime": "2024-05-21T12:33:17.833151+00:00", "EventTime": "2024-05-21T12:33:17.833171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdK9732cStyGap9qK1"], "accumulated_threat_level": 9.324, "timewindow": 73} +{"Format": "IDEA0", "ID": "cdef1ff0-1837-445a-b178-0142e9c6b8a4", "DetectTime": "2024-05-21T12:33:17.875375+00:00", "EventTime": "2024-05-21T12:33:17.875400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COVYlg1TvTsOJICLCb"], "accumulated_threat_level": 10.124, "timewindow": 73} +{"Format": "IDEA0", "ID": "ef4965d4-20a0-4642-b13e-162ed6e54656", "DetectTime": "2024-05-21T12:33:18.233465+00:00", "EventTime": "2024-05-21T12:33:18.233486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKpFr3xsstcwmcp14"], "accumulated_threat_level": 10.924000000000001, "timewindow": 73} +{"Format": "IDEA0", "ID": "67a5388c-0a6e-4bf8-a972-4781814be9a9", "DetectTime": "2024-05-21T12:33:18.246210+00:00", "EventTime": "2024-05-21T12:33:18.246232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChDEFWeF5kS4MqE9i"], "accumulated_threat_level": 10.924000000000001, "timewindow": 73} +{"Format": "IDEA0", "ID": "9ddc8167-e515-417e-8021-3ea5c2bd0160", "DetectTime": "2024-05-21T12:33:18.290877+00:00", "EventTime": "2024-05-21T12:33:18.290898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5UaL6234WFoRmdDjl"], "accumulated_threat_level": 11.724000000000002, "timewindow": 73} +{"Format": "IDEA0", "ID": "76481d1d-de1f-45e7-9782-642902b63028", "DetectTime": "2024-05-21T12:33:18.328787+00:00", "EventTime": "2024-05-21T12:33:18.328810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDlhB7llpEkWNgMG3"], "accumulated_threat_level": 12.524000000000003, "timewindow": 73} +{"Format": "Json", "ID": "76481d1d-de1f-45e7-9782-642902b63028", "DetectTime": "2024-05-21T12:33:18.328787+00:00", "EventTime": "2024-05-21T12:33:18.328810+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "1970-01-04T00:56:01.996745+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2024/05/21 12:33:18.578988)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 73, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "44bff0f7-1d01-4350-8cb1-4e70cd15d143", "DetectTime": "2024-05-21T12:33:18.589192+00:00", "EventTime": "2024-05-21T12:33:18.589215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKmGxhRIJO4oLbH2"], "accumulated_threat_level": 0.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "f61dbc4d-6e02-4a73-8480-da7e980de76a", "DetectTime": "2024-05-21T12:33:18.601449+00:00", "EventTime": "2024-05-21T12:33:18.601471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTdY5G4aFfNfGgN1ej"], "accumulated_threat_level": 1.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "7b5780f0-cb72-4c22-9b2f-f253657c6175", "DetectTime": "2024-05-21T12:33:18.611865+00:00", "EventTime": "2024-05-21T12:33:18.611883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuj5CH9fgHic0Buoc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "04ff266a-f1ca-473a-8b7f-b4c64aa1ca64", "DetectTime": "2024-05-21T12:33:18.622696+00:00", "EventTime": "2024-05-21T12:33:18.622717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTvtbOGAnwpbfnP1"], "accumulated_threat_level": 3.2, "timewindow": 73} +{"Format": "IDEA0", "ID": "167d2e52-cd7b-44ef-a6f6-620c9b10b90e", "DetectTime": "2024-05-21T12:33:18.633461+00:00", "EventTime": "2024-05-21T12:33:18.633480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIKb8CstmLRDsOih"], "accumulated_threat_level": 4.0, "timewindow": 73} +{"Format": "IDEA0", "ID": "312e54be-4051-48f2-8a87-55846a0209cc", "DetectTime": "2024-05-21T12:33:18.644236+00:00", "EventTime": "2024-05-21T12:33:18.644254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTSfQx2d6VVGz6HULj"], "accumulated_threat_level": 4.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "2fae57a7-ec91-4fef-8600-7e889b89d6b2", "DetectTime": "2024-05-21T12:33:18.654960+00:00", "EventTime": "2024-05-21T12:33:18.654979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdSg423QAI6vYkEdLb"], "accumulated_threat_level": 5.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "79599f0d-fe28-4f29-93a9-ae326f23e802", "DetectTime": "2024-05-21T12:33:18.667707+00:00", "EventTime": "2024-05-21T12:33:18.667725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZXrk22qvCvjdby4i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 73} +{"Format": "IDEA0", "ID": "d25cddeb-2212-4782-897b-ffd72b162664", "DetectTime": "2024-05-21T12:33:18.935362+00:00", "EventTime": "2024-05-21T12:33:18.935383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeFQwNDzjS3net4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "484c112d-d810-4020-b26e-6dbea252c611", "DetectTime": "2024-05-21T12:33:19.008165+00:00", "EventTime": "2024-05-21T12:33:19.008189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXdpxU3frdzpyqpP3g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "0e544486-e0b8-4213-8b2f-2327aa610c0c", "DetectTime": "2024-05-21T12:33:19.219805+00:00", "EventTime": "2024-05-21T12:33:19.219824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDv3n1VwbnRiLRxlk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "cf06f9c8-692d-4448-a966-79d6ef34d04e", "DetectTime": "2024-05-21T12:33:19.246347+00:00", "EventTime": "2024-05-21T12:33:19.246369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ4ZJ61cFTY2wKmfb8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 73} +{"Format": "IDEA0", "ID": "00f24b3e-0c44-4e02-ac0d-b28140f60e93", "DetectTime": "2024-05-21T12:33:19.282156+00:00", "EventTime": "2024-05-21T12:33:19.282180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvpFQz1VWWWBOcBQzf"], "accumulated_threat_level": 9.6, "timewindow": 73} +{"Format": "IDEA0", "ID": "73896512-2d04-402e-8d2c-380458ff2f5a", "DetectTime": "2024-05-21T12:33:19.319125+00:00", "EventTime": "2024-05-21T12:33:19.319145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKUIVHQfF8oyVhxRh"], "accumulated_threat_level": 10.4, "timewindow": 73} +{"Format": "IDEA0", "ID": "404d944d-2616-4171-a65a-a31235e30979", "DetectTime": "2024-05-21T12:33:19.524527+00:00", "EventTime": "2024-05-21T12:33:19.524548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.7.185.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1GjR1S4J6i8wfCLa"], "accumulated_threat_level": 10.4, "timewindow": 73} +{"Format": "IDEA0", "ID": "c7a1cf72-8981-4ac2-bf15-b3a58282a461", "DetectTime": "2024-05-21T12:33:19.762649+00:00", "EventTime": "2024-05-21T12:33:19.762676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wSei48bLkCjdsC5h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 73} +{"Format": "IDEA0", "ID": "0db56a8a-f7b3-42d8-8bca-f68b05ac54af", "DetectTime": "2024-05-21T12:33:19.994907+00:00", "EventTime": "2024-05-21T12:33:19.994926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"]}], "Attach": [{"Content": "Connection to unknown destination port 22330/UDP destination IP 181.65.46.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0KBvkeRfD0hjUx2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 73} +{"Format": "Json", "ID": "0db56a8a-f7b3-42d8-8bca-f68b05ac54af", "DetectTime": "2024-05-21T12:33:19.994907+00:00", "EventTime": "2024-05-21T12:33:19.994926+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"]}], "Attach": [{"Content": "1970-01-04T00:56:58.036927+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 73. (real time 2024/05/21 12:33:20.250159)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 73, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fa1ab390-f4aa-4ed9-9895-043068464420", "DetectTime": "2024-05-21T12:33:20.311690+00:00", "EventTime": "2024-05-21T12:33:20.311708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNkIC1N9HUinq73L4"], "accumulated_threat_level": 0, "timewindow": 73} +{"Format": "IDEA0", "ID": "b9d2de99-4bbf-476e-9efd-c9e2a02d5bf4", "DetectTime": "2024-05-21T12:33:20.323090+00:00", "EventTime": "2024-05-21T12:33:20.323108+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.10.18.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ybTXSCUMQU5JZn8"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "228ae07c-1d9b-40d7-a641-b55fdb7fd3dc", "DetectTime": "2024-05-21T12:33:20.335295+00:00", "EventTime": "2024-05-21T12:33:20.335314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.10.18.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.10.18.143 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ybTXSCUMQU5JZn8"], "accumulated_threat_level": 7.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "457b983b-ff5d-4e94-8948-20d7e63346bb", "DetectTime": "2024-05-21T12:33:20.340097+00:00", "EventTime": "2024-05-21T12:33:20.340116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYYc31C8bmGkI8vlg"], "accumulated_threat_level": 0, "timewindow": 73} +{"Format": "IDEA0", "ID": "9807434a-e4e0-4db6-8bef-b59a2d102af9", "DetectTime": "2024-05-21T12:33:20.350442+00:00", "EventTime": "2024-05-21T12:33:20.350462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYeV7U2bHS9jqDSSFk"], "accumulated_threat_level": 0.8, "timewindow": 73} +{"Format": "IDEA0", "ID": "d567c988-67bf-4726-8820-a0a2009f94b4", "DetectTime": "2024-05-21T12:33:20.387248+00:00", "EventTime": "2024-05-21T12:33:20.387270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE7xxI00RovpJ8lbc", "CSKdU6OQ5HxiUC9p2", "CxcnCiati8EoNiOMk", "Cwa7j33uGO6kiWdQVg"], "accumulated_threat_level": 1.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "c047c843-fc6a-4dd9-9142-c587e2277837", "DetectTime": "2024-05-21T12:33:20.484035+00:00", "EventTime": "2024-05-21T12:33:20.484066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.30.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoiYIH6e4icKi6md8"], "accumulated_threat_level": 1.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "c5fcbd21-39a3-45de-8d94-91433cb325f9", "DetectTime": "2024-05-21T12:33:20.533276+00:00", "EventTime": "2024-05-21T12:33:20.533296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXV1d4NODiB3x6Abc"], "accumulated_threat_level": 2.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d0394172-c2ec-4412-9e04-0b139b52430a", "DetectTime": "2024-05-21T12:33:20.781319+00:00", "EventTime": "2024-05-21T12:33:20.781341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LHZw1E7Xo5vspBx5"], "accumulated_threat_level": 2.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "88b01782-72c7-4482-abce-c681be3b451f", "DetectTime": "2024-05-21T12:33:20.812293+00:00", "EventTime": "2024-05-21T12:33:20.812315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.169.115.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxi4L44e7qGqnwbKyf"], "accumulated_threat_level": 2.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5264e60e-ca16-44eb-9566-040212d14e58", "DetectTime": "2024-05-21T12:33:20.845756+00:00", "EventTime": "2024-05-21T12:33:20.845777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKk1i2cPIlDrNCyM5"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "e8404cce-0b6a-4090-b666-35d8028a3404", "DetectTime": "2024-05-21T12:33:20.871885+00:00", "EventTime": "2024-05-21T12:33:20.871907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WH8I0dbVCfgFHN9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 73} +{"Format": "IDEA0", "ID": "f8bdc2d7-4677-4373-9b6c-28b6b737885d", "DetectTime": "2024-05-21T12:33:20.902931+00:00", "EventTime": "2024-05-21T12:33:20.902951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0rl73LGe2yQV8xTf"], "accumulated_threat_level": 3.7, "timewindow": 73} +{"Format": "IDEA0", "ID": "b2ef0c19-df19-4343-b870-7d4d79d0b065", "DetectTime": "2024-05-21T12:33:20.937896+00:00", "EventTime": "2024-05-21T12:33:20.937918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca96CF32ypu7yT1iie"], "accumulated_threat_level": 4.5, "timewindow": 73} +{"Format": "IDEA0", "ID": "c6f2e2a5-87b2-4077-8662-63d5b69f9bd5", "DetectTime": "2024-05-21T12:33:20.984310+00:00", "EventTime": "2024-05-21T12:33:20.984329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1bit3Vd5fHVVtGH6"], "accumulated_threat_level": 5.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "d8a0c0a2-5f38-4e36-b732-92b9ee0d37a3", "DetectTime": "2024-05-21T12:33:21.020254+00:00", "EventTime": "2024-05-21T12:33:21.020274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJmtB2lR9rwyap9p2"], "accumulated_threat_level": 5.3, "timewindow": 73} +{"Format": "IDEA0", "ID": "b4afcdee-b76f-4f3e-be8f-d8b3e34ed110", "DetectTime": "2024-05-21T12:33:21.288472+00:00", "EventTime": "2024-05-21T12:33:21.288489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"]}], "Attach": [{"Content": "Connection to unknown destination port 1130/UDP destination IP 190.200.221.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEki1M1QtC6qPxAHx4"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "1395b728-0ace-49f0-83ff-81a43a17c33a", "DetectTime": "2024-05-21T12:33:21.338542+00:00", "EventTime": "2024-05-21T12:33:21.338560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWEYPnhlUHEVCaKl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f1aaf8ac-768e-4ea1-9805-3247dad2ddc3", "DetectTime": "2024-05-21T12:33:21.463412+00:00", "EventTime": "2024-05-21T12:33:21.463430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3eIv3iYvcCS8chFh"], "accumulated_threat_level": 0.8, "timewindow": 74} +{"Format": "IDEA0", "ID": "88048c67-5e5a-419e-9e5e-9275a114009c", "DetectTime": "2024-05-21T12:33:21.523389+00:00", "EventTime": "2024-05-21T12:33:21.523409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9jze1JgcROHTIVTl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "16f7ae68-4c3b-4935-9067-396725432646", "DetectTime": "2024-05-21T12:33:21.806460+00:00", "EventTime": "2024-05-21T12:33:21.806485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW6wlR2cvX0nuCZIt5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "c3f4508d-8eab-4f4d-ac05-a913f8141266", "DetectTime": "2024-05-21T12:33:21.811931+00:00", "EventTime": "2024-05-21T12:33:21.811950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nWt446E2a5t95hyh"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a64311e1-5574-4830-8ef9-fda09bfd0ce2", "DetectTime": "2024-05-21T12:33:21.816867+00:00", "EventTime": "2024-05-21T12:33:21.816886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9VBD1F5X7hOhfGQb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "1190bf14-8a16-4ccd-84b6-58ebc858f345", "DetectTime": "2024-05-21T12:33:21.821875+00:00", "EventTime": "2024-05-21T12:33:21.821894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRNXx4D37ItwqodW5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d0732510-9768-4549-b942-5256e5f8f29a", "DetectTime": "2024-05-21T12:33:22.200350+00:00", "EventTime": "2024-05-21T12:33:22.200376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNoxq24DkdpZpTqcj"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8a9de067-e9e6-4305-94ae-5e0489acb0b4", "DetectTime": "2024-05-21T12:33:22.247802+00:00", "EventTime": "2024-05-21T12:33:22.247826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuI4MT3cUeKtxlnfC6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f3879533-ce5c-4e0d-9755-adc5fe6a02e0", "DetectTime": "2024-05-21T12:33:22.283465+00:00", "EventTime": "2024-05-21T12:33:22.283491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIcu7x1cuzGLjuWK98"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f85dfd9c-b8ab-4c61-93e2-9d0068710782", "DetectTime": "2024-05-21T12:33:22.324102+00:00", "EventTime": "2024-05-21T12:33:22.324122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROA6d4BwVQFZlnQjk"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5ba208a1-8693-48d5-b1b5-1dfc74a9dca4", "DetectTime": "2024-05-21T12:33:22.359289+00:00", "EventTime": "2024-05-21T12:33:22.359311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRhCB1Ny6dcXLPTae"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "74a4e011-2489-4544-b7c6-3a14f8714f6a", "DetectTime": "2024-05-21T12:33:22.395453+00:00", "EventTime": "2024-05-21T12:33:22.395475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct98Um2I7XPrOYy1S9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "cf266009-6309-4f82-b2fa-364a35968a1d", "DetectTime": "2024-05-21T12:33:22.433645+00:00", "EventTime": "2024-05-21T12:33:22.433669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjXZu3njMJ5Ouxli3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a8feeebe-162b-4c9a-8385-dc18e32f6d83", "DetectTime": "2024-05-21T12:33:22.704490+00:00", "EventTime": "2024-05-21T12:33:22.704511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBkEM1tu5rI7Nkfrh"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "7870df3f-8bb1-4022-afce-ce517dc058c6", "DetectTime": "2024-05-21T12:33:22.923005+00:00", "EventTime": "2024-05-21T12:33:22.923026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwtAg1vTbtIfFImL9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "0f55fb02-3d21-4cfa-9fd4-d8a6fdf552a7", "DetectTime": "2024-05-21T12:33:22.951628+00:00", "EventTime": "2024-05-21T12:33:22.951648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpNRy3O7ACdGvKChg"], "accumulated_threat_level": 1.6, "timewindow": 74} +{"Format": "IDEA0", "ID": "3c800cfb-fe56-4e5d-937e-63f09e57a8e7", "DetectTime": "2024-05-21T12:33:23.012385+00:00", "EventTime": "2024-05-21T12:33:23.012406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xw0C4Cdc8WpNQgYd"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ea27722f-5e51-4b36-91fa-d6dc0d50c456", "DetectTime": "2024-05-21T12:33:23.174891+00:00", "EventTime": "2024-05-21T12:33:23.174924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7S4AU6hKwrU2JIe", "CFAD5d3RcfnOGVzMle", "ClMDSl38tgp2lhZ9e5", "CGJ4kU1H6gmui7x7w9"], "accumulated_threat_level": 2.1, "timewindow": 74} +{"Format": "IDEA0", "ID": "191eb0b2-b0d9-442e-a73c-ecfa8297bb6a", "DetectTime": "2024-05-21T12:33:23.630568+00:00", "EventTime": "2024-05-21T12:33:23.630590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmxh0j3afuYThKNxRb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "78415366-8cf2-4ec3-9fed-b14e38c3b620", "DetectTime": "2024-05-21T12:33:23.635725+00:00", "EventTime": "2024-05-21T12:33:23.635745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfNgd1kkKhUYOGq9f"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ca6823c9-4e7a-4f85-bb0d-c9336a762ba4", "DetectTime": "2024-05-21T12:33:23.685085+00:00", "EventTime": "2024-05-21T12:33:23.685106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEORDQ1j0RxaAWvtq"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8ae8ca9b-1baf-491c-9d72-ba04227d365e", "DetectTime": "2024-05-21T12:33:23.973926+00:00", "EventTime": "2024-05-21T12:33:23.973949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsC7zI2ArLdzZ5OA9a"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5bf9d38e-348a-48df-8521-0d9db53a5a76", "DetectTime": "2024-05-21T12:33:24.047051+00:00", "EventTime": "2024-05-21T12:33:24.047073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.49.45.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXkW9m3P1dbIVsWAN2"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "9e29938e-d893-4eb6-9cdb-81dfd696e6e3", "DetectTime": "2024-05-21T12:33:24.053435+00:00", "EventTime": "2024-05-21T12:33:24.053456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.5.194.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuppm44qSMTE8fCjX5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a67fd484-dded-43d0-96b7-32f8dbe1ea97", "DetectTime": "2024-05-21T12:33:24.063122+00:00", "EventTime": "2024-05-21T12:33:24.063142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.141.117.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLS23TH0ZGjRS08Ae"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ce28ca46-01df-4033-b92c-8b5c46fdd8eb", "DetectTime": "2024-05-21T12:33:24.152527+00:00", "EventTime": "2024-05-21T12:33:24.152548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlUVQ7mRgebqeQj1"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 74} +{"Format": "IDEA0", "ID": "408bd8d6-fc6f-41d6-a88c-89eb1d7cb618", "DetectTime": "2024-05-21T12:33:24.184957+00:00", "EventTime": "2024-05-21T12:33:24.184982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.77.237.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR4eNd1bBG69XLL0b"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5760484f-55ab-4dd8-a87d-95127cc4eae2", "DetectTime": "2024-05-21T12:33:24.450422+00:00", "EventTime": "2024-05-21T12:33:24.450443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.80.99.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OW3R3ONeG0q5SuI4"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "6723a80e-e21c-4474-b67b-d61f1f3d51d9", "DetectTime": "2024-05-21T12:33:24.464075+00:00", "EventTime": "2024-05-21T12:33:24.464097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.42.234.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjH5rC2fit4FMOKEee"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "25cf436d-d433-4690-a52e-fb96bf98e120", "DetectTime": "2024-05-21T12:33:24.565941+00:00", "EventTime": "2024-05-21T12:33:24.565964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16yv84EtC1ZQK4vql"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "6fa9a98d-1163-4a90-a3c4-eaaa08b4b1f4", "DetectTime": "2024-05-21T12:33:24.604843+00:00", "EventTime": "2024-05-21T12:33:24.604866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.153.6.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ia6s2YZYVVKoDDM1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d36cded3-4aac-42ed-8e15-c4a4b7aafde9", "DetectTime": "2024-05-21T12:33:24.677942+00:00", "EventTime": "2024-05-21T12:33:24.677963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.43.242.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEExhe4fCMgaDMAgW9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e6cac8f2-be5d-4a95-8045-367f50a40056", "DetectTime": "2024-05-21T12:33:24.683266+00:00", "EventTime": "2024-05-21T12:33:24.683287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IFcP3p8Jt9uAjLc"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ef9cca42-5971-4541-8d9b-07be279066ab", "DetectTime": "2024-05-21T12:33:24.688163+00:00", "EventTime": "2024-05-21T12:33:24.688183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.144.53.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4SHIL3gfoC61h7sDl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "bc646478-3464-41a9-aa7b-4a856d117bde", "DetectTime": "2024-05-21T12:33:24.703430+00:00", "EventTime": "2024-05-21T12:33:24.703454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.47.68.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cw4fAu7ScGXIgI7"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f66c9635-81a2-4e0e-96f3-ef72112cf24a", "DetectTime": "2024-05-21T12:33:24.708431+00:00", "EventTime": "2024-05-21T12:33:24.708452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.7.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQYmf2LUOshG8Vqy7"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d717f86d-23ed-4b31-9d3e-56b176a2e33f", "DetectTime": "2024-05-21T12:33:24.713172+00:00", "EventTime": "2024-05-21T12:33:24.713192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.98.108.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1FLr30mnZ8LZGS7h"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "eabb1372-0dce-4237-af01-48e9c174a560", "DetectTime": "2024-05-21T12:33:24.717739+00:00", "EventTime": "2024-05-21T12:33:24.717757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.54.86.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPoXIB1tOuQmUqoiyi"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "aa53ecce-1087-40ab-80b5-083069ec8866", "DetectTime": "2024-05-21T12:33:24.722272+00:00", "EventTime": "2024-05-21T12:33:24.722291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.175.211.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wRKD4PUxOXbRNlM9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f4d698c3-d56f-4117-b306-5407ec851958", "DetectTime": "2024-05-21T12:33:24.728903+00:00", "EventTime": "2024-05-21T12:33:24.728922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.64.171.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVl8Y81Smv6DXVmb7k"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a2fa0e9c-5fff-4c6a-9a8c-6c5db1213e1f", "DetectTime": "2024-05-21T12:33:24.733644+00:00", "EventTime": "2024-05-21T12:33:24.733664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.44.21.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3sdFp44Vz1BPlCE61"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8e5ac976-aab7-469c-82ee-b02e04289510", "DetectTime": "2024-05-21T12:33:24.754719+00:00", "EventTime": "2024-05-21T12:33:24.754743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckds8a2cydOeSEh2ya"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "66f2e63f-acda-4902-b77f-e4308f756191", "DetectTime": "2024-05-21T12:33:24.762140+00:00", "EventTime": "2024-05-21T12:33:24.762160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.167.175.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDA7N2JmmWOLvhjQ"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "b6a3f9b2-674f-4ee0-a128-70715f68dee0", "DetectTime": "2024-05-21T12:33:25.118024+00:00", "EventTime": "2024-05-21T12:33:25.118045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LWtl4AqTaBPhmdpf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d96b7b25-75e7-4deb-b5f2-21c2398a526e", "DetectTime": "2024-05-21T12:33:25.264412+00:00", "EventTime": "2024-05-21T12:33:25.264436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.189.32.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cbiA4wiZ7VM6c4T6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "21e0cac2-0370-4fe8-b961-eb48a49010db", "DetectTime": "2024-05-21T12:33:25.364703+00:00", "EventTime": "2024-05-21T12:33:25.364725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"]}], "Attach": [{"Content": "Connection to unknown destination port 4440/UDP destination IP 201.155.76.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hInF21F0lMF5mkv"], "accumulated_threat_level": 3.7, "timewindow": 74} +{"Format": "IDEA0", "ID": "1bac9a3c-a6ae-4f26-a9cb-347a901904d7", "DetectTime": "2024-05-21T12:33:25.429839+00:00", "EventTime": "2024-05-21T12:33:25.429859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.133.120.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYqVA4ekv08XHbcbl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "151ed4d0-ceaf-460e-9243-33148f437dfb", "DetectTime": "2024-05-21T12:33:25.436154+00:00", "EventTime": "2024-05-21T12:33:25.436176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.19.112.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0j32I1gtL2TqLjgf8"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ff87a771-a06a-48b7-ba74-16ae36f61526", "DetectTime": "2024-05-21T12:33:25.441072+00:00", "EventTime": "2024-05-21T12:33:25.441090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.247.158.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUDW32tWStkPYWSbg"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "fef94f12-ca09-4aa4-82df-6be8294c651e", "DetectTime": "2024-05-21T12:33:25.505472+00:00", "EventTime": "2024-05-21T12:33:25.505493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJlZc4dCWyQHVtd24"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5996adbd-8eb2-45ee-a09c-bd4a27c4f1bd", "DetectTime": "2024-05-21T12:33:25.515088+00:00", "EventTime": "2024-05-21T12:33:25.515108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.153.229.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw4MtZ3nVG69ajtfGf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d460475e-8c0a-4d03-a2a3-a79d44809444", "DetectTime": "2024-05-21T12:33:25.525661+00:00", "EventTime": "2024-05-21T12:33:25.525681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtgQi1BXlIAB2uoh6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "25c243b1-4823-4a53-a8f9-55ae53b1e4d1", "DetectTime": "2024-05-21T12:33:25.531353+00:00", "EventTime": "2024-05-21T12:33:25.531372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.179.199.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eqX32wHKNViuVNt5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "88a77913-a311-4dd2-820d-30c8d148e054", "DetectTime": "2024-05-21T12:33:25.547693+00:00", "EventTime": "2024-05-21T12:33:25.547714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMeBi3HWLYX5fYDvc"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "c1166436-cd8a-45df-906d-fbceb50bbf4f", "DetectTime": "2024-05-21T12:33:25.794977+00:00", "EventTime": "2024-05-21T12:33:25.795007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 208.64.183.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7X4Bc17GnlY20gpp2"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "3a1939fc-41e8-4f98-a7d2-b3248a1c4e89", "DetectTime": "2024-05-21T12:33:25.823490+00:00", "EventTime": "2024-05-21T12:33:25.823508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkPw94HYvgnmrSjLk"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "b7e132df-bad7-4c01-a6a0-e9b461326a87", "DetectTime": "2024-05-21T12:33:25.856321+00:00", "EventTime": "2024-05-21T12:33:25.856340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgbv8442CR8uK9zZPg"], "accumulated_threat_level": 4.5, "timewindow": 74} +{"Format": "IDEA0", "ID": "8a57d757-fd4c-4635-9ca4-8326a7a50234", "DetectTime": "2024-05-21T12:33:25.863509+00:00", "EventTime": "2024-05-21T12:33:25.863529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.228.163.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYg7n3PY9oxk9mjye"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "191ba412-9d68-4ce1-abf5-9f102238c42e", "DetectTime": "2024-05-21T12:33:25.990494+00:00", "EventTime": "2024-05-21T12:33:25.990515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.80.148.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV7GNA2XD7Uaau5tE3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "3cfa2380-e10e-4e11-a789-bc29e666124b", "DetectTime": "2024-05-21T12:33:25.995878+00:00", "EventTime": "2024-05-21T12:33:25.995898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.100.90.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsuSJG3CQ9nyD9mMtk"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "efa6aa1e-3e2d-419e-8b0b-2f63e7dcaa72", "DetectTime": "2024-05-21T12:33:26.050640+00:00", "EventTime": "2024-05-21T12:33:26.050662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0vTb1uMbQLaUTr1f"], "accumulated_threat_level": 5.3, "timewindow": 74} +{"Format": "IDEA0", "ID": "adee9da4-fdbf-4a0d-bbea-a2d0484cde58", "DetectTime": "2024-05-21T12:33:26.101485+00:00", "EventTime": "2024-05-21T12:33:26.101502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGpzd3RUQ80roAIxg"], "accumulated_threat_level": 6.1, "timewindow": 74} +{"Format": "IDEA0", "ID": "df98dd5b-dd7f-4854-9cdf-8e6c7fc84745", "DetectTime": "2024-05-21T12:33:26.430864+00:00", "EventTime": "2024-05-21T12:33:26.430885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.107.16.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGDl61Ep3nP0hb2g3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "3d226800-185a-4497-a673-bdbcd40eeb62", "DetectTime": "2024-05-21T12:33:26.438871+00:00", "EventTime": "2024-05-21T12:33:26.438892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.172.252.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFbhZ1ID5Rv5pRIjf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "3c94fd32-9b06-4746-b54e-cd5422e65fbf", "DetectTime": "2024-05-21T12:33:26.446126+00:00", "EventTime": "2024-05-21T12:33:26.446145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.53.58.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCf46Z2k3pgXp2xFje"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "443a7890-2e79-4d1d-9beb-da4294763fa1", "DetectTime": "2024-05-21T12:33:26.451550+00:00", "EventTime": "2024-05-21T12:33:26.451571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.48.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNyWr2cjlE14ExhW7"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "1d5a0f38-d00b-4c74-849a-dfd5dc113e78", "DetectTime": "2024-05-21T12:33:26.456231+00:00", "EventTime": "2024-05-21T12:33:26.456251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.9.162.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmjOlaFs7TNzNAfZd"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "b1cbabd3-2340-4a56-8119-0d8108c3bbd9", "DetectTime": "2024-05-21T12:33:26.461784+00:00", "EventTime": "2024-05-21T12:33:26.461803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.185.247.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRC7jI2BLMFg6j5uBh"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5fe2fa53-e8dc-494c-b09a-38c32ca8efa6", "DetectTime": "2024-05-21T12:33:26.466211+00:00", "EventTime": "2024-05-21T12:33:26.466229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.47.55.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce0fVYuTflZYQFjtb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f920a399-026e-4870-a851-9ab72a685455", "DetectTime": "2024-05-21T12:33:26.480240+00:00", "EventTime": "2024-05-21T12:33:26.480260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.230.228.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFzIj2i0FZmoRKAAg"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d94b4a9b-04e8-4635-81ae-3a4e420b277c", "DetectTime": "2024-05-21T12:33:26.509108+00:00", "EventTime": "2024-05-21T12:33:26.509127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.117.42.122"]}], "Attach": [{"Content": "Connection to unknown destination port 29881/UDP destination IP 85.117.42.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBw5X3FtpK7lf3ZO2"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "6c4b49cf-292f-48ca-a56b-fa031ed530d0", "DetectTime": "2024-05-21T12:33:26.553139+00:00", "EventTime": "2024-05-21T12:33:26.553159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.40.168.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyOCDc2nMoP90J73zg"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "da836b7d-e140-47e5-9b76-78b1738e9b1f", "DetectTime": "2024-05-21T12:33:26.968710+00:00", "EventTime": "2024-05-21T12:33:26.968730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7LYh02km1WLSr5jOf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "b1576341-65d5-497f-8f84-58d9bae9dfdf", "DetectTime": "2024-05-21T12:33:27.012878+00:00", "EventTime": "2024-05-21T12:33:27.012898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.46.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLg463aUjXS7KOlXe"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "1b696f46-a157-4e45-9f9a-5b0f577ff2d3", "DetectTime": "2024-05-21T12:33:27.025437+00:00", "EventTime": "2024-05-21T12:33:27.025460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.3.235.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNRgc2s1I4Kp7CMAa"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "4a6541f7-a954-4654-bd08-1174a8b0e57a", "DetectTime": "2024-05-21T12:33:27.098211+00:00", "EventTime": "2024-05-21T12:33:27.098233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.178.102.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8G9sn4PZtqtUJRBji"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "730e61ba-466b-463b-b40e-634247527cc3", "DetectTime": "2024-05-21T12:33:27.113086+00:00", "EventTime": "2024-05-21T12:33:27.113109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.185.58.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuhfWP3wkoSWMLGZt"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ef627d08-b33a-4f42-9b06-6da166fc7ad8", "DetectTime": "2024-05-21T12:33:27.118446+00:00", "EventTime": "2024-05-21T12:33:27.118465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.172.120.192 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YdEf94BbGxZunv8"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "291abcbe-7507-4324-adf7-d5efe4b2cfd1", "DetectTime": "2024-05-21T12:33:27.203220+00:00", "EventTime": "2024-05-21T12:33:27.203244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAH5Ou4RTvsXljcxK3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f99c1aed-e8dd-4a39-9f86-437cf7bfd608", "DetectTime": "2024-05-21T12:33:27.261242+00:00", "EventTime": "2024-05-21T12:33:27.261266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWQTe73bZwCPkBQojd"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "0b722d92-9cd7-438e-affd-743ad4dbb12a", "DetectTime": "2024-05-21T12:33:27.301688+00:00", "EventTime": "2024-05-21T12:33:27.301707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQPU31BaGKQdxGF3h"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "58930dd6-48fd-4861-8167-e57bc1ffac1d", "DetectTime": "2024-05-21T12:33:27.307125+00:00", "EventTime": "2024-05-21T12:33:27.307144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.110.78.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNkv726jDan0n6scb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f1e09867-056a-46a0-b9f9-251d12c9b3d4", "DetectTime": "2024-05-21T12:33:27.312010+00:00", "EventTime": "2024-05-21T12:33:27.312029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.4.124.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4veP2W7aUl5w1cgi"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d6ca37a8-5d0e-42a5-9602-6c5480b2daeb", "DetectTime": "2024-05-21T12:33:27.397952+00:00", "EventTime": "2024-05-21T12:33:27.397973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRVcQR2zgGrRnyv997"], "accumulated_threat_level": 7.699999999999999, "timewindow": 74} +{"Format": "IDEA0", "ID": "434b3507-1bd5-4daa-9a00-3db75a2aa7c0", "DetectTime": "2024-05-21T12:33:27.433868+00:00", "EventTime": "2024-05-21T12:33:27.433888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLQi5VJFGSVFiZV4"], "accumulated_threat_level": 8.5, "timewindow": 74} +{"Format": "IDEA0", "ID": "a068c9a7-751f-4c83-96d7-09154f9ca769", "DetectTime": "2024-05-21T12:33:27.472385+00:00", "EventTime": "2024-05-21T12:33:27.472404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6lLY1ohLLe2oiCYc"], "accumulated_threat_level": 9.3, "timewindow": 74} +{"Format": "IDEA0", "ID": "20678681-a085-461c-bce0-c4bb8e8efbb9", "DetectTime": "2024-05-21T12:33:27.507554+00:00", "EventTime": "2024-05-21T12:33:27.507572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cml9J91LceketlJzT4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 74} +{"Format": "IDEA0", "ID": "1cce0149-72b1-4eb7-8731-f12d250c7619", "DetectTime": "2024-05-21T12:33:27.767304+00:00", "EventTime": "2024-05-21T12:33:27.767324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.58.27.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0e5eF1Lj4SBgnl3Ha"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e61b96a3-8e6f-490d-8e0d-bcf877120b36", "DetectTime": "2024-05-21T12:33:27.793543+00:00", "EventTime": "2024-05-21T12:33:27.793562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYU7uhFfr6DTlxfh"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "cab16c7a-f875-483c-b379-8878ecde70f3", "DetectTime": "2024-05-21T12:33:27.829384+00:00", "EventTime": "2024-05-21T12:33:27.829402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cffx6PEu5U2kdAOC4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 74} +{"Format": "IDEA0", "ID": "7c10c7f7-80b4-44a8-b860-32ac532d0d78", "DetectTime": "2024-05-21T12:33:27.851856+00:00", "EventTime": "2024-05-21T12:33:27.851877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.42.0.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7y6xh2Iw875RCTXpl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "7e784924-d958-49d1-ab08-ed0546c555fb", "DetectTime": "2024-05-21T12:33:27.892169+00:00", "EventTime": "2024-05-21T12:33:27.892191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX9hFG3y4OHP4he7if"], "accumulated_threat_level": 11.700000000000003, "timewindow": 74} +{"Format": "IDEA0", "ID": "4eff0563-713b-4c7f-a438-81e4bb39be27", "DetectTime": "2024-05-21T12:33:27.922495+00:00", "EventTime": "2024-05-21T12:33:27.922515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.62.133.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIBcfF8N6i48Q2xV9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "9b93e021-c3a2-4323-991f-35ad69cfc37b", "DetectTime": "2024-05-21T12:33:27.956375+00:00", "EventTime": "2024-05-21T12:33:27.956396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.163.69.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3O8ju4nrkrCycog01"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "004577ce-e1e1-4cb5-8d79-7e4b3a991e53", "DetectTime": "2024-05-21T12:33:27.989248+00:00", "EventTime": "2024-05-21T12:33:27.989266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMl5a4nWpAnCYZqgf"], "accumulated_threat_level": 12.500000000000004, "timewindow": 74} +{"Format": "Json", "ID": "004577ce-e1e1-4cb5-8d79-7e4b3a991e53", "DetectTime": "2024-05-21T12:33:27.989248+00:00", "EventTime": "2024-05-21T12:33:27.989266+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "1970-01-04T01:29:27.509797+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 74. (real time 2024/05/21 12:33:28.186741)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 74, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "8c5ce38b-6f4c-4b6d-8d0a-928da4457b3a", "DetectTime": "2024-05-21T12:33:28.191514+00:00", "EventTime": "2024-05-21T12:33:28.191536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfR4M43CziMkPIxJFi", "CBz7im257caAMAtIUa", "CRWPFTnYRiwyEuhI9", "CC1uae2L2czjRer2n9"], "accumulated_threat_level": 0.5, "timewindow": 75} +{"Format": "IDEA0", "ID": "cf147cfe-716a-439a-9441-b6e24a4021ed", "DetectTime": "2024-05-21T12:33:28.198450+00:00", "EventTime": "2024-05-21T12:33:28.198592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.68.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C99QTg13SrzpWkBXc9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "91fb2ec5-fa62-4506-ad0a-069434c5f126", "DetectTime": "2024-05-21T12:33:28.220329+00:00", "EventTime": "2024-05-21T12:33:28.220360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Scfv3C8Xu2OONLO"], "accumulated_threat_level": 0.8, "timewindow": 74} +{"Format": "IDEA0", "ID": "d8449ab6-a8f2-44aa-b6ab-f12335eeb80a", "DetectTime": "2024-05-21T12:33:28.226247+00:00", "EventTime": "2024-05-21T12:33:28.226268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJhz6D1jkQLobaoj9g"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "3ce6cbdf-d526-49a2-89bc-9d5e56553fbb", "DetectTime": "2024-05-21T12:33:28.231331+00:00", "EventTime": "2024-05-21T12:33:28.231350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.78.128.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIxG21W9Xk8kUtYK1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "42c3f66d-ef3e-4077-9d9f-a082387e8f81", "DetectTime": "2024-05-21T12:33:28.254787+00:00", "EventTime": "2024-05-21T12:33:28.254808+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.36.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2CR5XmcufiFPAEd6"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "aaf47c49-df85-48b3-a1a6-3c9c0c7cbc90", "DetectTime": "2024-05-21T12:33:28.345001+00:00", "EventTime": "2024-05-21T12:33:28.345021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.36.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.36.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2CR5XmcufiFPAEd6"], "accumulated_threat_level": 7.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "a7c84117-bfd6-45f6-9a2f-7c8f054e65d6", "DetectTime": "2024-05-21T12:33:28.427341+00:00", "EventTime": "2024-05-21T12:33:28.427367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfZCC1Nqy8EiV2xPc"], "accumulated_threat_level": 1.6, "timewindow": 74} +{"Format": "IDEA0", "ID": "5f214c3a-479e-4338-829b-9099566eb6c6", "DetectTime": "2024-05-21T12:33:28.434401+00:00", "EventTime": "2024-05-21T12:33:28.434431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.232.62.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAlS4eNLGeu7V7LH6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "2175ec6f-1925-4d97-b2dc-de8b982e5971", "DetectTime": "2024-05-21T12:33:28.484421+00:00", "EventTime": "2024-05-21T12:33:28.484445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.50.158.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C390z4V2Ns4IcpNjh"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "844e0b3a-5b34-44eb-b0e6-f33e6d99578c", "DetectTime": "2024-05-21T12:33:28.497293+00:00", "EventTime": "2024-05-21T12:33:28.497311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.207.233.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS4TSN2to7rwQIadGf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "27e2a5a0-af4f-4d1b-93f2-dc265a7b04d6", "DetectTime": "2024-05-21T12:33:28.513415+00:00", "EventTime": "2024-05-21T12:33:28.513434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.48.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5Qro6MPOe8dn1Wk"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "2a4d4674-da7b-42a3-a08f-be8f2dfd4c05", "DetectTime": "2024-05-21T12:33:28.533838+00:00", "EventTime": "2024-05-21T12:33:28.533856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.9.249.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xI593p8Oj59iBKZ9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "25f1365b-e59b-4a7f-89a8-22140d9a2f59", "DetectTime": "2024-05-21T12:33:28.620275+00:00", "EventTime": "2024-05-21T12:33:28.620294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAkAZj15kbCr0RJiW8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 74} +{"Format": "IDEA0", "ID": "72d3367b-ebd5-40b7-942d-d0768cbd3b86", "DetectTime": "2024-05-21T12:33:28.633041+00:00", "EventTime": "2024-05-21T12:33:28.633064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.233.14.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDGu4IlRcJeimlk5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d95fe1f9-fe63-46c9-bdf9-7c1625cd5f8d", "DetectTime": "2024-05-21T12:33:28.681169+00:00", "EventTime": "2024-05-21T12:33:28.681193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqO8CwJ8lZTdQXt5"], "accumulated_threat_level": 3.2, "timewindow": 74} +{"Format": "IDEA0", "ID": "53ca6fe4-c6db-4e1e-bba1-00cb3831d20d", "DetectTime": "2024-05-21T12:33:28.721677+00:00", "EventTime": "2024-05-21T12:33:28.721699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsILDmL5Wm7pAllm1"], "accumulated_threat_level": 4.0, "timewindow": 74} +{"Format": "IDEA0", "ID": "88213e1a-e40e-4ebf-b955-fee4e81370e0", "DetectTime": "2024-05-21T12:33:28.759293+00:00", "EventTime": "2024-05-21T12:33:28.759312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.182"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.182. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEELy3FHERyC5xC4i"], "accumulated_threat_level": 4.8, "timewindow": 74} +{"Format": "IDEA0", "ID": "495f6f04-9f10-4ec5-9bc5-6af4edf243de", "DetectTime": "2024-05-21T12:33:28.787608+00:00", "EventTime": "2024-05-21T12:33:28.787633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.6.85.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfY8w83mFJdAZr4XT2"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ac4316e3-47a9-4c10-b985-42d9a0ca28c6", "DetectTime": "2024-05-21T12:33:28.823772+00:00", "EventTime": "2024-05-21T12:33:28.823790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciolpv3JPI1jymHt7k"], "accumulated_threat_level": 5.6, "timewindow": 74} +{"Format": "IDEA0", "ID": "350f7f1d-c377-4874-96b8-2fffc501e467", "DetectTime": "2024-05-21T12:33:28.847460+00:00", "EventTime": "2024-05-21T12:33:28.847480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH3s8A3ddqk0oDXCt"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "684f0f6b-e1e4-423e-8d02-04cc656251a1", "DetectTime": "2024-05-21T12:33:29.125489+00:00", "EventTime": "2024-05-21T12:33:29.125518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vFNl1POC4V22GBrh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "765e8c38-3ea4-486f-a00c-0000e8930690", "DetectTime": "2024-05-21T12:33:29.130943+00:00", "EventTime": "2024-05-21T12:33:29.130962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cczmsv24PlIOlGLqEi"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "21916757-3b4d-4389-a54a-46a4a30ab4c3", "DetectTime": "2024-05-21T12:33:29.155033+00:00", "EventTime": "2024-05-21T12:33:29.155056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.86.122.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktJfI3J0nxUNpeLy"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "0a8ba5bf-c342-45c9-ba9d-9a246579003f", "DetectTime": "2024-05-21T12:33:29.159871+00:00", "EventTime": "2024-05-21T12:33:29.159889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.155.76.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrsfK22UtHDUgy6QUg"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "056e4dda-d568-4157-ac71-28a63cd32ac6", "DetectTime": "2024-05-21T12:33:29.164185+00:00", "EventTime": "2024-05-21T12:33:29.164203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.56.42.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJpMrM1i51qB3Y02e1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "c470c98f-013c-4c80-90d0-2c8531bdacb4", "DetectTime": "2024-05-21T12:33:29.268206+00:00", "EventTime": "2024-05-21T12:33:29.268229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8E7EA3m0ZrgAFAXj9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 74} +{"Format": "IDEA0", "ID": "294e698a-8770-43bd-b621-e6af311c4e3f", "DetectTime": "2024-05-21T12:33:29.309076+00:00", "EventTime": "2024-05-21T12:33:29.309096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.182.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFONGd4yy5kK6B6zE6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "68945d4b-3bfc-467e-b2cd-cc95352ff14c", "DetectTime": "2024-05-21T12:33:29.315026+00:00", "EventTime": "2024-05-21T12:33:29.315047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.152.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Oy6IuNGj5cLvmHb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a433825b-4926-41ca-ad05-e51fdce1bdec", "DetectTime": "2024-05-21T12:33:29.346664+00:00", "EventTime": "2024-05-21T12:33:29.346684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVEB443PJqJkjQeAh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 74} +{"Format": "IDEA0", "ID": "4ec774b2-6f39-4040-adaa-64abead32b97", "DetectTime": "2024-05-21T12:33:29.389952+00:00", "EventTime": "2024-05-21T12:33:29.389974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.251.117.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGr0iB4KFqWzyx6YUj"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f519fab8-4191-4bd7-bbe1-3157eb56dd07", "DetectTime": "2024-05-21T12:33:29.422599+00:00", "EventTime": "2024-05-21T12:33:29.422616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.200.221.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBiwsw44uR0RNobmhc"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "1f7d71f5-8fd0-4943-8563-a555d42667ec", "DetectTime": "2024-05-21T12:33:29.691951+00:00", "EventTime": "2024-05-21T12:33:29.691972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gJ9p1VV1t1AS73G1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 74} +{"Format": "IDEA0", "ID": "1684304d-ca6a-446b-b81b-2c6a36d5bcd7", "DetectTime": "2024-05-21T12:33:29.697448+00:00", "EventTime": "2024-05-21T12:33:29.697469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.133.70.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAkj1KIWljCEQaeth"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "02868c42-0304-42ed-b0f8-c646f54d2e49", "DetectTime": "2024-05-21T12:33:29.720913+00:00", "EventTime": "2024-05-21T12:33:29.720932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.166.184.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCfx2e1XFUWw5CI1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "49dc7654-3b9c-45ff-aade-d3906f07486e", "DetectTime": "2024-05-21T12:33:29.725522+00:00", "EventTime": "2024-05-21T12:33:29.725541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.218.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQG762nHXMG35RF5g"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "5651ee80-5265-4ba1-a28d-d02fc5d9f405", "DetectTime": "2024-05-21T12:33:29.810761+00:00", "EventTime": "2024-05-21T12:33:29.810782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.172.168.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxjweLezcGkKMee3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e19cbca4-1080-416b-96cc-1a8fb2e640b1", "DetectTime": "2024-05-21T12:33:29.815563+00:00", "EventTime": "2024-05-21T12:33:29.815583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.50.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1S71q4U9ZLUaaBZtl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "4ba8cd58-8524-4167-a074-b528285e4521", "DetectTime": "2024-05-21T12:33:29.825914+00:00", "EventTime": "2024-05-21T12:33:29.825931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSmKRo4ODsDV9slH3d"], "accumulated_threat_level": 9.6, "timewindow": 74} +{"Format": "IDEA0", "ID": "9d65826f-f028-4926-9907-9e831606f4d7", "DetectTime": "2024-05-21T12:33:29.890008+00:00", "EventTime": "2024-05-21T12:33:29.890030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.21.97.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIh5R1lpPFtT2Iadb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "f72dac1c-5285-4517-9708-00ab3b6133b2", "DetectTime": "2024-05-21T12:33:29.923331+00:00", "EventTime": "2024-05-21T12:33:29.923352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.215.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpka9039aG2qMyp2V6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e7c01a1b-1fdc-4dfc-b568-f84435612d38", "DetectTime": "2024-05-21T12:33:29.934793+00:00", "EventTime": "2024-05-21T12:33:29.934816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtcjX3FFs13mF1Omb"], "accumulated_threat_level": 10.4, "timewindow": 74} +{"Format": "IDEA0", "ID": "0ce1e187-80ef-40d7-a7a8-8c238f008570", "DetectTime": "2024-05-21T12:33:29.976373+00:00", "EventTime": "2024-05-21T12:33:29.976392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.111.237.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmVNw4fBpUtYgsYK4"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "3faeb82d-cb92-4249-b040-c32cc574282e", "DetectTime": "2024-05-21T12:33:30.021008+00:00", "EventTime": "2024-05-21T12:33:30.021026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7q7notGcXMYf0T04"], "accumulated_threat_level": 11.200000000000001, "timewindow": 74} +{"Format": "IDEA0", "ID": "2de6f56b-912a-4d5f-b5a8-e9c77171fe80", "DetectTime": "2024-05-21T12:33:30.036025+00:00", "EventTime": "2024-05-21T12:33:30.036048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.57.22.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYEQE3UNCC0GhbL2f"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "2b43ee2b-0527-404e-a066-ca89aa9972fc", "DetectTime": "2024-05-21T12:33:30.079160+00:00", "EventTime": "2024-05-21T12:33:30.079200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZFQt029vlh6bMieD9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 74} +{"Format": "Json", "ID": "2b43ee2b-0527-404e-a066-ca89aa9972fc", "DetectTime": "2024-05-21T12:33:30.079160+00:00", "EventTime": "2024-05-21T12:33:30.079200+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "1970-01-04T01:29:31.354354+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 74. (real time 2024/05/21 12:33:30.256570)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 74, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "11bc79e0-50a3-4f9b-8a16-a54612a9add5", "DetectTime": "2024-05-21T12:33:30.411077+00:00", "EventTime": "2024-05-21T12:33:30.411100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.65.46.79"]}], "Attach": [{"Content": "Connection to unknown destination port 22330/UDP destination IP 181.65.46.79. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82Dwn2VToRRYbBtdb"], "accumulated_threat_level": 0.8, "timewindow": 74} +{"Format": "IDEA0", "ID": "8c728317-7190-4964-b428-9d6b6cfb3829", "DetectTime": "2024-05-21T12:33:30.416745+00:00", "EventTime": "2024-05-21T12:33:30.416764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVunSwGD5VZizLeJ3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "d4d0a9cb-130f-42ee-837a-51fe2fa9a2a3", "DetectTime": "2024-05-21T12:33:30.478692+00:00", "EventTime": "2024-05-21T12:33:30.478713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtU9flQ6HcszcW30h"], "accumulated_threat_level": 1.6, "timewindow": 74} +{"Format": "IDEA0", "ID": "eee96179-48de-4435-811a-b99ebc08f9e0", "DetectTime": "2024-05-21T12:33:30.525622+00:00", "EventTime": "2024-05-21T12:33:30.525640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAZZ8J2qr66o9L2eLj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 74} +{"Format": "IDEA0", "ID": "9531c51b-3a38-47a9-b1a8-9b6104934e9f", "DetectTime": "2024-05-21T12:33:30.560104+00:00", "EventTime": "2024-05-21T12:33:30.560124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUvWch8nZAwjZE86"], "accumulated_threat_level": 3.2, "timewindow": 74} +{"Format": "IDEA0", "ID": "9b695cea-e53d-45ca-b47a-da466c0d717f", "DetectTime": "2024-05-21T12:33:30.597694+00:00", "EventTime": "2024-05-21T12:33:30.597716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnU41w22ZRjHZuGA5"], "accumulated_threat_level": 4.0, "timewindow": 74} +{"Format": "IDEA0", "ID": "c419c4ec-382c-4854-a434-42a4f660906c", "DetectTime": "2024-05-21T12:33:30.636045+00:00", "EventTime": "2024-05-21T12:33:30.636065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsP47e42pudYlgtUTc"], "accumulated_threat_level": 4.8, "timewindow": 74} +{"Format": "IDEA0", "ID": "f5af251f-ceba-46ad-bfee-b535059da5cb", "DetectTime": "2024-05-21T12:33:30.674028+00:00", "EventTime": "2024-05-21T12:33:30.674049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.200.221.34"]}], "Attach": [{"Content": "Connection to unknown destination port 1130/UDP destination IP 190.200.221.34. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7BfVT3Ci7HgRebRsl"], "accumulated_threat_level": 5.6, "timewindow": 74} +{"Format": "IDEA0", "ID": "15808929-a5b9-4673-af20-11524cbb5f30", "DetectTime": "2024-05-21T12:33:30.723320+00:00", "EventTime": "2024-05-21T12:33:30.723342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bcEU3vWfPSVJsQkl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "bff25215-e2b1-4165-8fa3-4385816f795f", "DetectTime": "2024-05-21T12:33:31.197197+00:00", "EventTime": "2024-05-21T12:33:31.197222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPA7Yg3UmKyu7SaWEl"], "accumulated_threat_level": 1.3, "timewindow": 75} +{"Format": "IDEA0", "ID": "dab314a8-1ff7-438e-b5a4-287dc0894b33", "DetectTime": "2024-05-21T12:33:31.236305+00:00", "EventTime": "2024-05-21T12:33:31.236323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4VN72c6S8CKHPwz8"], "accumulated_threat_level": 2.1, "timewindow": 75} +{"Format": "IDEA0", "ID": "293bf038-618f-4bd8-a40f-e16b821e2363", "DetectTime": "2024-05-21T12:33:31.274835+00:00", "EventTime": "2024-05-21T12:33:31.274855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJItO2aHt94Sb2nRf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 75} +{"Format": "IDEA0", "ID": "e9f83127-5acc-476f-9586-eb0f05e097d5", "DetectTime": "2024-05-21T12:33:31.313801+00:00", "EventTime": "2024-05-21T12:33:31.313820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN1ad32qRnqdhLJuic"], "accumulated_threat_level": 3.7, "timewindow": 75} +{"Format": "IDEA0", "ID": "9eac25fc-6c2c-4d84-abea-ea626b01b21e", "DetectTime": "2024-05-21T12:33:31.563715+00:00", "EventTime": "2024-05-21T12:33:31.563733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ydEU1LgQFyblV0L5"], "accumulated_threat_level": 4.5, "timewindow": 75} +{"Format": "IDEA0", "ID": "a3001b4f-2b15-4ea2-9dba-e2084f0eb897", "DetectTime": "2024-05-21T12:33:31.599320+00:00", "EventTime": "2024-05-21T12:33:31.599340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.155.76.16"]}], "Attach": [{"Content": "Connection to unknown destination port 4440/UDP destination IP 201.155.76.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoEzX22zNQvcDfZBj8"], "accumulated_threat_level": 5.3, "timewindow": 75} +{"Format": "IDEA0", "ID": "c70073bd-f30e-4130-a8b2-3eda424c4b2c", "DetectTime": "2024-05-21T12:33:31.604607+00:00", "EventTime": "2024-05-21T12:33:31.604625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0HCsI1nzblpQGB5uf", "CE3cVW2SNQGN9l3O7i", "CT80dF1RaI8gDQoYPf", "CVSxGLpOwR3eZgK01"], "accumulated_threat_level": 5.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "47d7bf13-9996-4e04-bd0c-ac17c40768dd", "DetectTime": "2024-05-21T12:33:31.638129+00:00", "EventTime": "2024-05-21T12:33:31.638149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQxwGI2VnV8lbMcPu6"], "accumulated_threat_level": 6.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "0a427a12-91dd-4d07-b341-f88f0643cd58", "DetectTime": "2024-05-21T12:33:31.714793+00:00", "EventTime": "2024-05-21T12:33:31.714816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYWXXB5bpruXbbAzf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "7b2c62dc-8435-4c00-ade8-66026ac2aef9", "DetectTime": "2024-05-21T12:33:31.748524+00:00", "EventTime": "2024-05-21T12:33:31.748545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDLB73420ynZ1lqVh"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 75} +{"Format": "IDEA0", "ID": "e0723766-8945-4639-9be1-4a5465c98e75", "DetectTime": "2024-05-21T12:33:31.775617+00:00", "EventTime": "2024-05-21T12:33:31.775637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fkxR2gvXPcn11jyj"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "c88e317a-d8ed-478e-9dca-e42f7defb2b3", "DetectTime": "2024-05-21T12:33:31.810220+00:00", "EventTime": "2024-05-21T12:33:31.810240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgXaAK21vBeR61qPs5"], "accumulated_threat_level": 8.2, "timewindow": 75} +{"Format": "IDEA0", "ID": "93229609-93ff-4a54-bb66-05f320c43ffb", "DetectTime": "2024-05-21T12:33:31.848935+00:00", "EventTime": "2024-05-21T12:33:31.848954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofLcn4sHcvI3ixCL3"], "accumulated_threat_level": 9.0, "timewindow": 75} +{"Format": "IDEA0", "ID": "671209b4-6e18-44ed-b80e-74f94d9bcee3", "DetectTime": "2024-05-21T12:33:31.879551+00:00", "EventTime": "2024-05-21T12:33:31.879572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSdeaq01FLmEYqxe"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8b6f162d-023a-40ee-853d-21bab7add176", "DetectTime": "2024-05-21T12:33:31.912394+00:00", "EventTime": "2024-05-21T12:33:31.912413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9AeP02bYZm75stQ25"], "accumulated_threat_level": 9.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "f1f774e1-bf4a-4d7d-9f1f-f725eedada48", "DetectTime": "2024-05-21T12:33:31.956756+00:00", "EventTime": "2024-05-21T12:33:31.956782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpv63I2ctIBifBrux9"], "accumulated_threat_level": 10.600000000000001, "timewindow": 75} +{"Format": "IDEA0", "ID": "480f6fca-cb82-4c4e-97e2-0cf179256b86", "DetectTime": "2024-05-21T12:33:31.976556+00:00", "EventTime": "2024-05-21T12:33:31.976577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcbKxU2wMzHFVJf13b"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "9db8ec24-cdd8-4b2a-bbaa-997cd18eaa65", "DetectTime": "2024-05-21T12:33:32.247303+00:00", "EventTime": "2024-05-21T12:33:32.247323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKuNlk2iA4OZfQmEol"], "accumulated_threat_level": 11.400000000000002, "timewindow": 75} +{"Format": "IDEA0", "ID": "bb361abe-76a6-4a94-b65c-2688ee3dbe1a", "DetectTime": "2024-05-21T12:33:32.262548+00:00", "EventTime": "2024-05-21T12:33:32.262568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8WgXk1NIlCxToeSyl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8eb922ad-c5de-46aa-9cbb-5f7459d01650", "DetectTime": "2024-05-21T12:33:32.305455+00:00", "EventTime": "2024-05-21T12:33:32.305473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "Connection to unknown destination port 9471/UDP destination IP 94.251.242.238. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZidPc4AUW2jDcR577"], "accumulated_threat_level": 12.200000000000003, "timewindow": 75} +{"Format": "Json", "ID": "8eb922ad-c5de-46aa-9cbb-5f7459d01650", "DetectTime": "2024-05-21T12:33:32.305455+00:00", "EventTime": "2024-05-21T12:33:32.305473+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.251.242.238"]}], "Attach": [{"Content": "1970-01-04T02:01:15.912304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2024/05/21 12:33:32.593211)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 75, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "8f286099-93be-44aa-8391-957d9edeb303", "DetectTime": "2024-05-21T12:33:32.597660+00:00", "EventTime": "2024-05-21T12:33:32.597678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4jXK2nSMsArmvbP6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "2ef58e15-ff7f-42c4-b468-5c671b8e13c6", "DetectTime": "2024-05-21T12:33:32.608953+00:00", "EventTime": "2024-05-21T12:33:32.608973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrpTN1vd5Bx5JxIOh"], "accumulated_threat_level": 0.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "711f83c6-aa84-46bf-b263-37ad4a551f4f", "DetectTime": "2024-05-21T12:33:32.620411+00:00", "EventTime": "2024-05-21T12:33:32.620429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnzVt8b8PdNYfCll"], "accumulated_threat_level": 1.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "b4cfd02e-d3d5-4f5d-82bc-cba9cfbbee8a", "DetectTime": "2024-05-21T12:33:32.630501+00:00", "EventTime": "2024-05-21T12:33:32.630520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.148.49.183"]}], "Attach": [{"Content": "Connection to unknown destination port 2460/UDP destination IP 86.148.49.183. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJdWXmWBJhsoe3dj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 75} +{"Format": "IDEA0", "ID": "22e18d2e-ddac-4ab1-90d8-4c7737c62a05", "DetectTime": "2024-05-21T12:33:32.640625+00:00", "EventTime": "2024-05-21T12:33:32.640643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpqvt73FQbjWXvGBM7"], "accumulated_threat_level": 3.2, "timewindow": 75} +{"Format": "IDEA0", "ID": "fc663295-6bb8-4b00-8ed4-e1597a6a4cf9", "DetectTime": "2024-05-21T12:33:32.652772+00:00", "EventTime": "2024-05-21T12:33:32.652793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwF20z3LhYXVsPxO23"], "accumulated_threat_level": 4.0, "timewindow": 75} +{"Format": "IDEA0", "ID": "272a01d5-0e11-4e47-80e0-e2d4071eeec4", "DetectTime": "2024-05-21T12:33:32.666024+00:00", "EventTime": "2024-05-21T12:33:32.666045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4URQ1N9YKXblyUNb"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "522dab2c-a17c-4214-8a53-2a28f52704ff", "DetectTime": "2024-05-21T12:33:32.671196+00:00", "EventTime": "2024-05-21T12:33:32.671218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqkVtc2bcjGTw2pxX1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "578b417b-eb11-49a3-9c61-ead141881349", "DetectTime": "2024-05-21T12:33:32.682455+00:00", "EventTime": "2024-05-21T12:33:32.682474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBW6e1wcC5yCYJYze"], "accumulated_threat_level": 5.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "df10a444-3c5d-4664-a7ce-334341473d36", "DetectTime": "2024-05-21T12:33:32.687784+00:00", "EventTime": "2024-05-21T12:33:32.687803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhVS84qRgEmjPbnlj"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "6ae7ca96-b460-4a83-9b81-adf8399062d7", "DetectTime": "2024-05-21T12:33:32.962671+00:00", "EventTime": "2024-05-21T12:33:32.962691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjjN071ooufS32bcA1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 75} +{"Format": "IDEA0", "ID": "e3df6a6c-3dd6-446b-9eac-66ebdbda8c62", "DetectTime": "2024-05-21T12:33:32.998578+00:00", "EventTime": "2024-05-21T12:33:32.998604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8s5r29Ho2VUXW7ba"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e8edff81-c960-492a-8734-beeb6e684f74", "DetectTime": "2024-05-21T12:33:33.003580+00:00", "EventTime": "2024-05-21T12:33:33.003598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiaAsW2JrhG1ArQmgf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a402897e-1553-40fa-831f-ce91c68a0a18", "DetectTime": "2024-05-21T12:33:33.008080+00:00", "EventTime": "2024-05-21T12:33:33.008098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdK9732cStyGap9qK1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "4657a775-5230-4d1a-93c1-76663f86b15e", "DetectTime": "2024-05-21T12:33:33.088772+00:00", "EventTime": "2024-05-21T12:33:33.088796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Z1w32dwagA7320jl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 75} +{"Format": "IDEA0", "ID": "0be7f508-2ea1-40c0-9a0b-9848204aafc3", "DetectTime": "2024-05-21T12:33:33.123095+00:00", "EventTime": "2024-05-21T12:33:33.123115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ICCle0GgmD6kJN8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 75} +{"Format": "IDEA0", "ID": "3fc2fcb6-a692-42d6-b559-c77599f4a3c8", "DetectTime": "2024-05-21T12:33:33.161251+00:00", "EventTime": "2024-05-21T12:33:33.161270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCQCzE1yaaIcDLEEx3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 75} +{"Format": "IDEA0", "ID": "389049be-e818-4d0d-acd0-7924a57535ba", "DetectTime": "2024-05-21T12:33:33.187180+00:00", "EventTime": "2024-05-21T12:33:33.187201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COVYlg1TvTsOJICLCb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ee182f01-0ff3-4a3a-a517-e863842b9678", "DetectTime": "2024-05-21T12:33:33.223192+00:00", "EventTime": "2024-05-21T12:33:33.223209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUhp526wCV9S6AVO1"], "accumulated_threat_level": 9.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "c2332079-a851-4c57-9e83-789533c26311", "DetectTime": "2024-05-21T12:33:33.281543+00:00", "EventTime": "2024-05-21T12:33:33.281567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4E072sAeEdkFhYU2"], "accumulated_threat_level": 10.4, "timewindow": 75} +{"Format": "IDEA0", "ID": "aa124d6a-cb0b-4ef9-ba73-8db217dc86c6", "DetectTime": "2024-05-21T12:33:33.301968+00:00", "EventTime": "2024-05-21T12:33:33.301988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKpFr3xsstcwmcp14"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "591775bc-e8e1-4f37-9003-1c1e098bc76b", "DetectTime": "2024-05-21T12:33:33.344228+00:00", "EventTime": "2024-05-21T12:33:33.344246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpOU73mCkAGZKxlp8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 75} +{"Format": "IDEA0", "ID": "26164b3e-39f4-493c-9efc-bb01440a68eb", "DetectTime": "2024-05-21T12:33:33.593372+00:00", "EventTime": "2024-05-21T12:33:33.593394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5UaL6234WFoRmdDjl"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8bb85313-83f4-44ce-bb76-f6a3550641be", "DetectTime": "2024-05-21T12:33:33.649402+00:00", "EventTime": "2024-05-21T12:33:33.649424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuj5CH9fgHic0Buoc"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ace27198-7ef1-4706-9f52-7912399da991", "DetectTime": "2024-05-21T12:33:33.659158+00:00", "EventTime": "2024-05-21T12:33:33.659179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIKb8CstmLRDsOih"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8515b5f8-e1e0-46ea-9f59-8210f0b78dd9", "DetectTime": "2024-05-21T12:33:33.663881+00:00", "EventTime": "2024-05-21T12:33:33.663901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTvtbOGAnwpbfnP1"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "cd0aecb1-4217-437f-bde8-ee5209bfa243", "DetectTime": "2024-05-21T12:33:33.669206+00:00", "EventTime": "2024-05-21T12:33:33.669226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKmGxhRIJO4oLbH2"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "b43b8852-6c6f-4590-a52e-3fbc1a06d98f", "DetectTime": "2024-05-21T12:33:33.674230+00:00", "EventTime": "2024-05-21T12:33:33.674250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTdY5G4aFfNfGgN1ej"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "4e7efc8e-3805-4d32-81ca-d66f6b47426a", "DetectTime": "2024-05-21T12:33:33.749862+00:00", "EventTime": "2024-05-21T12:33:33.749881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJIOQ3esFOXO11Isa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 75} +{"Format": "Json", "ID": "4e7efc8e-3805-4d32-81ca-d66f6b47426a", "DetectTime": "2024-05-21T12:33:33.749862+00:00", "EventTime": "2024-05-21T12:33:33.749881+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "1970-01-04T02:01:36.789887+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2024/05/21 12:33:33.913934)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 75, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a9e8db2e-d73c-485b-a7d9-a9621bf1f738", "DetectTime": "2024-05-21T12:33:33.918226+00:00", "EventTime": "2024-05-21T12:33:33.918243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDlhB7llpEkWNgMG3"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "82657a50-1564-4857-9cb3-4a780c7e3fd2", "DetectTime": "2024-05-21T12:33:33.922780+00:00", "EventTime": "2024-05-21T12:33:33.922797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTSfQx2d6VVGz6HULj"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a647fc9e-a069-4091-b3d0-89acd9cd6b39", "DetectTime": "2024-05-21T12:33:33.927490+00:00", "EventTime": "2024-05-21T12:33:33.927509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdSg423QAI6vYkEdLb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e48d4707-2af8-4a1a-956e-1606d6444c99", "DetectTime": "2024-05-21T12:33:33.934109+00:00", "EventTime": "2024-05-21T12:33:33.934129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZXrk22qvCvjdby4i"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "45ba0996-56fd-4108-bdc0-fc481c752833", "DetectTime": "2024-05-21T12:33:33.981318+00:00", "EventTime": "2024-05-21T12:33:33.981337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLeWAV13OBEJMBNAD5"], "accumulated_threat_level": 0.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "1b72b832-1ef6-4501-9ec6-2cbf8e325451", "DetectTime": "2024-05-21T12:33:33.986359+00:00", "EventTime": "2024-05-21T12:33:33.986378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeFQwNDzjS3net4"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "87d39c50-6430-41e7-9790-ba08bfdfb833", "DetectTime": "2024-05-21T12:33:34.274877+00:00", "EventTime": "2024-05-21T12:33:34.274911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFw8rt2edpTMfwu1g7"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "8dd96aa0-045f-4206-9fb3-5903ec2cdb5e", "DetectTime": "2024-05-21T12:33:34.314459+00:00", "EventTime": "2024-05-21T12:33:34.314480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDv3n1VwbnRiLRxlk"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "a7b75b1c-e0f3-430d-b150-3918649c5888", "DetectTime": "2024-05-21T12:33:34.319700+00:00", "EventTime": "2024-05-21T12:33:34.319719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXdpxU3frdzpyqpP3g"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "624a5fb4-ef10-4b76-8d89-47ab57f930c4", "DetectTime": "2024-05-21T12:33:34.333341+00:00", "EventTime": "2024-05-21T12:33:34.333360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0bin3MnUqAopb6Uj"], "accumulated_threat_level": 1.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "6b5edc62-469a-4883-8d18-6489a03fbe19", "DetectTime": "2024-05-21T12:33:34.372345+00:00", "EventTime": "2024-05-21T12:33:34.372364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvpFQz1VWWWBOcBQzf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ac4cfc3c-47c6-429d-a344-c5d7791a5f6c", "DetectTime": "2024-05-21T12:33:34.446017+00:00", "EventTime": "2024-05-21T12:33:34.446039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKUIVHQfF8oyVhxRh"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "969832d8-d690-4cfa-9936-21686b6f9001", "DetectTime": "2024-05-21T12:33:34.470470+00:00", "EventTime": "2024-05-21T12:33:34.470490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.53.58.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfq9C3roav42gvtm5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ffdd1a48-9231-47bb-a7a8-c26dbcfe3631", "DetectTime": "2024-05-21T12:33:34.475356+00:00", "EventTime": "2024-05-21T12:33:34.475375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.47.55.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBBldA2TRq6p8pkHWb"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "55d5da16-15c1-49e1-ac1d-c6a0b64f422f", "DetectTime": "2024-05-21T12:33:34.502674+00:00", "EventTime": "2024-05-21T12:33:34.502710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpApSoMsWdfANhST"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 75} +{"Format": "IDEA0", "ID": "e17d591f-bf38-4ea5-b788-e770f6d96b04", "DetectTime": "2024-05-21T12:33:34.569083+00:00", "EventTime": "2024-05-21T12:33:34.569103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj2SGnV4XmuGJWPf7"], "accumulated_threat_level": 3.2, "timewindow": 75} +{"Format": "IDEA0", "ID": "043ce126-0298-4b9b-8447-72bee858543a", "DetectTime": "2024-05-21T12:33:34.633545+00:00", "EventTime": "2024-05-21T12:33:34.633564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ht9F3rSFZ0L20J4g"], "accumulated_threat_level": 4.0, "timewindow": 75} +{"Format": "IDEA0", "ID": "f75ec10d-6be8-4a6e-814f-393e80506776", "DetectTime": "2024-05-21T12:33:34.875804+00:00", "EventTime": "2024-05-21T12:33:34.875831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wSei48bLkCjdsC5h"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "66374889-2661-466a-82ae-534fdb6f175d", "DetectTime": "2024-05-21T12:33:35.108190+00:00", "EventTime": "2024-05-21T12:33:35.108212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.46.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0KBvkeRfD0hjUx2"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "ad4eb14f-5840-4dd6-b519-2c0514de9726", "DetectTime": "2024-05-21T12:33:35.243932+00:00", "EventTime": "2024-05-21T12:33:35.243952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8BlL2JgFRGxsFvf", "CShb692bSYMHDrJ4bf", "CY7CbC3VLMpbfvHsrj", "Cx08ackJZUFMI6Iph"], "accumulated_threat_level": 4.5, "timewindow": 75} +{"Format": "IDEA0", "ID": "ca517d95-562a-44f1-9a58-6d1d25ace14b", "DetectTime": "2024-05-21T12:33:35.367489+00:00", "EventTime": "2024-05-21T12:33:35.367511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYeV7U2bHS9jqDSSFk"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "04dfd5b0-b654-4417-a52d-2d5a1d5ca3a6", "DetectTime": "2024-05-21T12:33:35.789135+00:00", "EventTime": "2024-05-21T12:33:35.789154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXV1d4NODiB3x6Abc"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "c0f90d11-e156-4831-845a-9794271f7a8b", "DetectTime": "2024-05-21T12:33:35.821996+00:00", "EventTime": "2024-05-21T12:33:35.822019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrrjTH1M39qF9U1pPj"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "9455bf77-9e01-4319-829f-f5df8ccbceea", "DetectTime": "2024-05-21T12:33:35.877457+00:00", "EventTime": "2024-05-21T12:33:35.877476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKk1i2cPIlDrNCyM5"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "01378be7-d7c4-40bd-9f61-29c3eb6d4583", "DetectTime": "2024-05-21T12:33:35.932977+00:00", "EventTime": "2024-05-21T12:33:35.932999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0rl73LGe2yQV8xTf"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e19860b0-6121-423c-b9eb-4599308d03eb", "DetectTime": "2024-05-21T12:33:35.966256+00:00", "EventTime": "2024-05-21T12:33:35.966280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca96CF32ypu7yT1iie"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "1fd157e4-7955-4da2-8c47-d6d58ec2a6d7", "DetectTime": "2024-05-21T12:33:36.013329+00:00", "EventTime": "2024-05-21T12:33:36.013353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1bit3Vd5fHVVtGH6"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e377c1fd-a915-470c-8ec6-0e2a0a176da8", "DetectTime": "2024-05-21T12:33:36.055264+00:00", "EventTime": "2024-05-21T12:33:36.055287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.182.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUduNn165gjz3cswWc"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "de2c4f49-82cd-4074-9384-86468d94461d", "DetectTime": "2024-05-21T12:33:36.085698+00:00", "EventTime": "2024-05-21T12:33:36.085719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.155.76.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cip3fd4r0IE7MVBeI9"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "e014cdd5-cc66-4640-a7b0-0e9b5cf626ef", "DetectTime": "2024-05-21T12:33:36.245362+00:00", "EventTime": "2024-05-21T12:33:36.245383+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.105.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0svcU3FbRIEimhF0d"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "5dd3ea7b-c905-4282-8144-025d322890a5", "DetectTime": "2024-05-21T12:33:36.263801+00:00", "EventTime": "2024-05-21T12:33:36.263821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.105.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.105.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0svcU3FbRIEimhF0d"], "accumulated_threat_level": 8.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "c4e7809f-d495-4b77-8b1d-f7ae6515808b", "DetectTime": "2024-05-21T12:33:36.319135+00:00", "EventTime": "2024-05-21T12:33:36.319155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.200.221.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEki1M1QtC6qPxAHx4"], "accumulated_threat_level": 6.1, "timewindow": 73} +{"Format": "IDEA0", "ID": "90f7068c-7836-4f20-ab5e-fc8199f7e151", "DetectTime": "2024-05-21T12:33:36.531725+00:00", "EventTime": "2024-05-21T12:33:36.531742+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crb8OSbPbZkFIg4we"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "7bc40843-97d6-411d-aee5-1db933dda4a9", "DetectTime": "2024-05-21T12:33:36.543941+00:00", "EventTime": "2024-05-21T12:33:36.543977+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crb8OSbPbZkFIg4we"], "accumulated_threat_level": 8.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "fb74a932-ae6f-4b94-8c62-7c909c29d12f", "DetectTime": "2024-05-21T12:33:36.636990+00:00", "EventTime": "2024-05-21T12:33:36.637012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3eIv3iYvcCS8chFh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "ca237585-2842-4eb6-a8cf-d552f5363a04", "DetectTime": "2024-05-21T12:33:36.738620+00:00", "EventTime": "2024-05-21T12:33:36.738644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLUGpTjfLb0QovXvc"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "ab02f660-5870-4735-852f-023aaa1dd503", "DetectTime": "2024-05-21T12:33:36.755131+00:00", "EventTime": "2024-05-21T12:33:36.755158+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLUGpTjfLb0QovXvc"], "accumulated_threat_level": 9.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "aa551dbd-ab57-4d11-8704-3a35b3169be1", "DetectTime": "2024-05-21T12:33:37.378616+00:00", "EventTime": "2024-05-21T12:33:37.378637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwFsE3VfSpju6tq5i", "CbZztf3mdb8DUT48N4", "CJkNIj30aLsQ5FyB69", "CcwEcj1IjWVb8ja349"], "accumulated_threat_level": 5.0, "timewindow": 75} +{"Format": "IDEA0", "ID": "75028264-fccf-46b8-85ee-42260301723b", "DetectTime": "2024-05-21T12:33:37.540868+00:00", "EventTime": "2024-05-21T12:33:37.540887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRlpF3BCqMiCnT8hh"], "accumulated_threat_level": 5.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "db0e9e77-0e34-4c72-9eba-c04214c944a1", "DetectTime": "2024-05-21T12:33:37.592336+00:00", "EventTime": "2024-05-21T12:33:37.592354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswKZobZ3GBegvY1j"], "accumulated_threat_level": 6.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "bd005d17-3250-4cf4-b8f0-d1d396f9a088", "DetectTime": "2024-05-21T12:33:37.631715+00:00", "EventTime": "2024-05-21T12:33:37.631734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAe6439TjGax3ns5e"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 75} +{"Format": "IDEA0", "ID": "362c027e-26e6-47f0-b470-765486c1ec03", "DetectTime": "2024-05-21T12:33:37.889199+00:00", "EventTime": "2024-05-21T12:33:37.889218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwPi622JGgbyQ8PC7"], "accumulated_threat_level": 8.2, "timewindow": 75} +{"Format": "IDEA0", "ID": "ebe96156-2944-4bdf-9139-82fdc0454c1e", "DetectTime": "2024-05-21T12:33:38.037374+00:00", "EventTime": "2024-05-21T12:33:38.037393+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u1n73ZpGyO1glwha"], "accumulated_threat_level": 8.223999999999998, "timewindow": 75} +{"Format": "IDEA0", "ID": "9d36369a-9247-43d5-b580-15738c11c580", "DetectTime": "2024-05-21T12:33:38.052721+00:00", "EventTime": "2024-05-21T12:33:38.052742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.47.55.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVp9KT2fK0YL9PgCtf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "5dacde19-3a0b-4a5a-b553-035369da6417", "DetectTime": "2024-05-21T12:33:38.057665+00:00", "EventTime": "2024-05-21T12:33:38.057684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpNRy3O7ACdGvKChg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "0ff7b3b1-0a95-4c10-bff2-1cf9d18c9e44", "DetectTime": "2024-05-21T12:33:38.062630+00:00", "EventTime": "2024-05-21T12:33:38.062649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.53.58.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqpqwy2acpGP7M3I23"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "4d22a71d-8d3f-41a9-958a-56b86d92ee23", "DetectTime": "2024-05-21T12:33:38.074397+00:00", "EventTime": "2024-05-21T12:33:38.074429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJfQja2jECwglsU7"], "accumulated_threat_level": 9.024, "timewindow": 75} +{"Format": "IDEA0", "ID": "49fe3a05-a2d1-441c-8a6f-e1d2fea59039", "DetectTime": "2024-05-21T12:33:38.085389+00:00", "EventTime": "2024-05-21T12:33:38.085407+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u1n73ZpGyO1glwha"], "accumulated_threat_level": 0, "timewindow": 75} +{"Format": "IDEA0", "ID": "e65b6cfc-dd00-4a54-9d69-a4b52023c971", "DetectTime": "2024-05-21T12:33:38.169170+00:00", "EventTime": "2024-05-21T12:33:38.169194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOrk12DAgpTzkeBDh"], "accumulated_threat_level": 9.824, "timewindow": 75} +{"Format": "IDEA0", "ID": "028cafca-9f42-40d4-ab2c-1988b1dee3bf", "DetectTime": "2024-05-21T12:33:38.211780+00:00", "EventTime": "2024-05-21T12:33:38.211801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXR9KTNewqq8WsOl6"], "accumulated_threat_level": 10.624, "timewindow": 75} +{"Format": "IDEA0", "ID": "1039b9c2-07a6-4325-845d-25b471159b47", "DetectTime": "2024-05-21T12:33:38.248581+00:00", "EventTime": "2024-05-21T12:33:38.248601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8C0H1VyhKpJ9G5jf"], "accumulated_threat_level": 11.424000000000001, "timewindow": 75} +{"Format": "IDEA0", "ID": "8e9c8129-4bfd-47d5-adf6-34ed3325ca20", "DetectTime": "2024-05-21T12:33:38.511870+00:00", "EventTime": "2024-05-21T12:33:38.511889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzKRdFFWWTmuhdFg2"], "accumulated_threat_level": 12.224000000000002, "timewindow": 75} +{"Format": "Json", "ID": "8e9c8129-4bfd-47d5-adf6-34ed3325ca20", "DetectTime": "2024-05-21T12:33:38.511870+00:00", "EventTime": "2024-05-21T12:33:38.511889+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "1970-01-04T02:34:10.216293+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2024/05/21 12:33:38.785288)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.224000000000002, "timewindow": 75, "profileid": "profile_10.0.2.19", "threat_level": 12.224000000000002} +{"Format": "IDEA0", "ID": "9f135614-eab2-48e2-98ef-3ee12e7e3a1a", "DetectTime": "2024-05-21T12:33:38.801903+00:00", "EventTime": "2024-05-21T12:33:38.801923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bF604WGuMKo7TaR7"], "accumulated_threat_level": 0.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "a2e85d1f-3a2c-462d-a26a-5d741815b3ad", "DetectTime": "2024-05-21T12:33:38.814844+00:00", "EventTime": "2024-05-21T12:33:38.814865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEdPa1uFhdyCBiHbf"], "accumulated_threat_level": 1.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "3e3573e4-efab-4254-970f-d5f7ab8ac308", "DetectTime": "2024-05-21T12:33:38.824873+00:00", "EventTime": "2024-05-21T12:33:38.824895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdVfj2GecRBlz8GE4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 75} +{"Format": "IDEA0", "ID": "23134dd3-65a2-463a-8b70-a451080282cd", "DetectTime": "2024-05-21T12:33:38.836020+00:00", "EventTime": "2024-05-21T12:33:38.836043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpnINAStzJvrCxa6"], "accumulated_threat_level": 3.2, "timewindow": 75} +{"Format": "IDEA0", "ID": "c1dbfb40-47b8-4fd5-8a01-cda4ad21226c", "DetectTime": "2024-05-21T12:33:38.981951+00:00", "EventTime": "2024-05-21T12:33:38.981971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZO1k1t0znFf7NQic"], "accumulated_threat_level": 4.0, "timewindow": 75} +{"Format": "IDEA0", "ID": "1a894230-4659-44e0-a24a-3dd78c271657", "DetectTime": "2024-05-21T12:33:39.031271+00:00", "EventTime": "2024-05-21T12:33:39.031289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7vtbe2qRnAa7kMSi5"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "f29ac07a-fd62-46ea-89a9-131739208b48", "DetectTime": "2024-05-21T12:33:39.081058+00:00", "EventTime": "2024-05-21T12:33:39.081078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Qo8na91Yvz9C2pk"], "accumulated_threat_level": 5.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "38a2435f-8245-4944-8c01-a6707b3443e1", "DetectTime": "2024-05-21T12:33:39.166205+00:00", "EventTime": "2024-05-21T12:33:39.166226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpWjS3A7nXGpZpMoh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 75} +{"Format": "IDEA0", "ID": "a98e8d0f-4e56-4b39-970b-14690ad065cf", "DetectTime": "2024-05-21T12:33:39.280009+00:00", "EventTime": "2024-05-21T12:33:39.280033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhaWjIpOvXW6fs44"], "accumulated_threat_level": 7.199999999999999, "timewindow": 75} +{"Format": "IDEA0", "ID": "e0ff2993-4a41-43fb-a453-26658d8c4b3a", "DetectTime": "2024-05-21T12:33:39.315142+00:00", "EventTime": "2024-05-21T12:33:39.315163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUIZg498VbX9nQ5h2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 75} +{"Format": "IDEA0", "ID": "e9a24435-55d1-4666-8bc8-793d16d6d8d2", "DetectTime": "2024-05-21T12:33:39.367388+00:00", "EventTime": "2024-05-21T12:33:39.367413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKylL1K8Jlar4yOW"], "accumulated_threat_level": 8.799999999999999, "timewindow": 75} +{"Format": "IDEA0", "ID": "c6dbf6eb-a800-4480-8ebe-421dda006168", "DetectTime": "2024-05-21T12:33:39.615511+00:00", "EventTime": "2024-05-21T12:33:39.615532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlUVQ7mRgebqeQj1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "94ea625b-b2ae-4fce-9a00-4618823ee9eb", "DetectTime": "2024-05-21T12:33:39.646185+00:00", "EventTime": "2024-05-21T12:33:39.646205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CujuV74ycrzqTbvOh1"], "accumulated_threat_level": 9.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "95bc6799-abbb-49a2-8080-8024f97d7842", "DetectTime": "2024-05-21T12:33:39.678198+00:00", "EventTime": "2024-05-21T12:33:39.678219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.254.182.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcvNJp1oQtL9J8X087"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "52e7b370-887d-4a05-92d8-c29dac4dbb18", "DetectTime": "2024-05-21T12:33:39.706376+00:00", "EventTime": "2024-05-21T12:33:39.706395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVg3a6cGuWLihCPJa"], "accumulated_threat_level": 10.4, "timewindow": 75} +{"Format": "IDEA0", "ID": "c3a38d7b-4391-4456-9c42-84f87bb099fb", "DetectTime": "2024-05-21T12:33:39.747324+00:00", "EventTime": "2024-05-21T12:33:39.747347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C77bqh2I2xNW9Mv6b1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 75} +{"Format": "IDEA0", "ID": "d506b17e-91da-4409-966c-f3b195de6f35", "DetectTime": "2024-05-21T12:33:39.784611+00:00", "EventTime": "2024-05-21T12:33:39.784631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cumexu1IVcXAVIcvG3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 75} +{"Format": "Json", "ID": "d506b17e-91da-4409-966c-f3b195de6f35", "DetectTime": "2024-05-21T12:33:39.784611+00:00", "EventTime": "2024-05-21T12:33:39.784631+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "1970-01-04T02:34:47.593337+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 75. (real time 2024/05/21 12:33:39.981127)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 75, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "86846b69-9c0b-4435-b9a7-40eefa78ac6c", "DetectTime": "2024-05-21T12:33:39.992177+00:00", "EventTime": "2024-05-21T12:33:39.992197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIGRa4ujIdk2ikDc4"], "accumulated_threat_level": 0.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "c6587900-e0c1-451f-a952-037efe20d5f9", "DetectTime": "2024-05-21T12:33:40.004423+00:00", "EventTime": "2024-05-21T12:33:40.004442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C697en2EyxCzy89Rbb"], "accumulated_threat_level": 1.6, "timewindow": 75} +{"Format": "IDEA0", "ID": "a47ac21a-9953-4f4f-9e96-1a27cb2381d6", "DetectTime": "2024-05-21T12:33:40.017787+00:00", "EventTime": "2024-05-21T12:33:40.017807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.29.186.246"]}], "Attach": [{"Content": "Connection to unknown destination port 3326/UDP destination IP 70.29.186.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMHBm1k4V73tzMoNc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 75} +{"Format": "IDEA0", "ID": "7f7bcd66-58b7-48d5-ba0b-21756be99c5e", "DetectTime": "2024-05-21T12:33:40.114586+00:00", "EventTime": "2024-05-21T12:33:40.114609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yfOY382zIlSWey3f"], "accumulated_threat_level": 3.2, "timewindow": 75} +{"Format": "IDEA0", "ID": "abd3c173-c362-4a00-894e-bcc90e1561d9", "DetectTime": "2024-05-21T12:33:40.145368+00:00", "EventTime": "2024-05-21T12:33:40.145385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5JapK1pVvI9f9bIDa"], "accumulated_threat_level": 4.0, "timewindow": 75} +{"Format": "IDEA0", "ID": "a9e78e23-289e-4571-939e-ab2a018454ae", "DetectTime": "2024-05-21T12:33:40.265546+00:00", "EventTime": "2024-05-21T12:33:40.265568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm420OYJehGM9cRs3"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "014c0ef9-bfa4-4e36-b5ff-42b0a6289094", "DetectTime": "2024-05-21T12:33:40.445936+00:00", "EventTime": "2024-05-21T12:33:40.445959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.155.76.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hInF21F0lMF5mkv"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "15c1e500-5ab0-4d7a-b591-1a362047e6d1", "DetectTime": "2024-05-21T12:33:41.001390+00:00", "EventTime": "2024-05-21T12:33:41.001408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgbv8442CR8uK9zZPg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "00ebb152-b150-48d2-a4b7-7810a05b2594", "DetectTime": "2024-05-21T12:33:41.061457+00:00", "EventTime": "2024-05-21T12:33:41.061475+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRsM82ySYMrEm0z4i"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "662644b6-08ff-43de-b526-3aa88e10ca2d", "DetectTime": "2024-05-21T12:33:41.075581+00:00", "EventTime": "2024-05-21T12:33:41.075602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRsM82ySYMrEm0z4i"], "accumulated_threat_level": 9.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "40398a03-0927-4c16-9f25-778e1a318c2b", "DetectTime": "2024-05-21T12:33:41.081163+00:00", "EventTime": "2024-05-21T12:33:41.081182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU0vTb1uMbQLaUTr1f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "043d0fb3-e2d4-4136-a8b0-af62ba691d1e", "DetectTime": "2024-05-21T12:33:41.188994+00:00", "EventTime": "2024-05-21T12:33:41.189028+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUK5E44YasG2bFT902"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "fc4b16a9-2c78-45f4-8b7f-333c209a356f", "DetectTime": "2024-05-21T12:33:41.206160+00:00", "EventTime": "2024-05-21T12:33:41.206195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUK5E44YasG2bFT902"], "accumulated_threat_level": 10.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "c36fe504-9726-4602-bff2-78f88b16be4d", "DetectTime": "2024-05-21T12:33:41.228408+00:00", "EventTime": "2024-05-21T12:33:41.228430+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4YQB72FTUmZnSmOoa"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "15bbe085-0397-4432-b7dc-4e5c18c58899", "DetectTime": "2024-05-21T12:33:41.249314+00:00", "EventTime": "2024-05-21T12:33:41.249335+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4YQB72FTUmZnSmOoa"], "accumulated_threat_level": 10.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "80e58d50-f924-4880-a67f-591dba45373b", "DetectTime": "2024-05-21T12:33:41.309245+00:00", "EventTime": "2024-05-21T12:33:41.309263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14R3SxV78mbUMjo2"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "2f2f92b2-eab2-4a8f-88cf-50fae93c39f4", "DetectTime": "2024-05-21T12:33:41.322213+00:00", "EventTime": "2024-05-21T12:33:41.322242+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14R3SxV78mbUMjo2"], "accumulated_threat_level": 11.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "a1797939-a9c0-4b7d-8871-6aea04cae01a", "DetectTime": "2024-05-21T12:33:41.341515+00:00", "EventTime": "2024-05-21T12:33:41.341537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7WdE83J119EUr3IN6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "e87bf298-6eb3-40e7-abf9-44274d29ea79", "DetectTime": "2024-05-21T12:33:41.376388+00:00", "EventTime": "2024-05-21T12:33:41.376406+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme68f3BwKK3BduMB1"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "d2ef648c-fecf-406e-9293-3475930bd002", "DetectTime": "2024-05-21T12:33:41.392018+00:00", "EventTime": "2024-05-21T12:33:41.392045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme68f3BwKK3BduMB1"], "accumulated_threat_level": 11.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "f64d7cef-d83d-4f5c-9910-dd6d2ad1bf03", "DetectTime": "2024-05-21T12:33:41.397755+00:00", "EventTime": "2024-05-21T12:33:41.397777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGpzd3RUQ80roAIxg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "3ef5eb17-f32c-46f8-b8e5-4595cc68d8dc", "DetectTime": "2024-05-21T12:33:41.470903+00:00", "EventTime": "2024-05-21T12:33:41.470921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiVfA4gTNG5ibs0xk"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "4e1297fb-f7cb-4798-8a81-48617e18d02d", "DetectTime": "2024-05-21T12:33:41.483718+00:00", "EventTime": "2024-05-21T12:33:41.483738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiVfA4gTNG5ibs0xk"], "accumulated_threat_level": 12.0, "timewindow": 22} +{"Format": "Json", "ID": "4e1297fb-f7cb-4798-8a81-48617e18d02d", "DetectTime": "2024-05-21T12:33:41.483718+00:00", "EventTime": "2024-05-21T12:33:41.483738+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "1970-01-01T21:56:29.651253+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 22. (real time 2024/05/21 12:33:42.017071)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 22, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "a035a6d2-9fa9-482a-9a30-5bd281126435", "DetectTime": "2024-05-21T12:33:42.030179+00:00", "EventTime": "2024-05-21T12:33:42.030204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEA3nG1OGr7x3zF3i9"], "accumulated_threat_level": 0.8, "timewindow": 76} +{"Format": "IDEA0", "ID": "ef0ce4b7-e9de-4e5c-913e-a01d176b4fb3", "DetectTime": "2024-05-21T12:33:42.042546+00:00", "EventTime": "2024-05-21T12:33:42.042564+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mHz41uWrQ2EqqIn3"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "5f984eeb-e028-48fb-9a39-f15b55d837d2", "DetectTime": "2024-05-21T12:33:42.056258+00:00", "EventTime": "2024-05-21T12:33:42.056281+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mHz41uWrQ2EqqIn3"], "accumulated_threat_level": 0.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "902f2b1d-7db9-4062-918f-7ac8f3f7e99a", "DetectTime": "2024-05-21T12:33:42.073499+00:00", "EventTime": "2024-05-21T12:33:42.073516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsI6oe36PVJrWLt45"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "8146e442-ce9d-4c8f-8a97-c5d84e9ac727", "DetectTime": "2024-05-21T12:33:42.087447+00:00", "EventTime": "2024-05-21T12:33:42.087465+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsI6oe36PVJrWLt45"], "accumulated_threat_level": 1.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "361eb12a-808b-45d3-85d4-b68c7b9a576e", "DetectTime": "2024-05-21T12:33:42.098892+00:00", "EventTime": "2024-05-21T12:33:42.098911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3JYDdCTXa5wCvjl"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "f4052b34-edd4-4d90-9059-8a066be7c4ba", "DetectTime": "2024-05-21T12:33:42.109853+00:00", "EventTime": "2024-05-21T12:33:42.109872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3JYDdCTXa5wCvjl"], "accumulated_threat_level": 1.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "4a35644f-b20f-4000-8830-4571ad6f8ba0", "DetectTime": "2024-05-21T12:33:42.114986+00:00", "EventTime": "2024-05-21T12:33:42.115004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKN4cG2CtjrKpGPlDk", "Cr1Obu1vYM58pnxHJ9", "COewLd10tZxl5HuXhb", "CEe2GF4KxQWNSqkaPe"], "accumulated_threat_level": 1.3, "timewindow": 76} +{"Format": "IDEA0", "ID": "87b4f131-ff84-4aab-b132-20e167b26220", "DetectTime": "2024-05-21T12:33:42.126928+00:00", "EventTime": "2024-05-21T12:33:42.126947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBw5X3FtpK7lf3ZO2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "5bee71bd-5a31-4cfd-94da-17956a784d19", "DetectTime": "2024-05-21T12:33:42.131374+00:00", "EventTime": "2024-05-21T12:33:42.131392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChJBSp4CzNreW5kpqd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "e379036f-40ac-424b-aec5-35c6cfe81bfe", "DetectTime": "2024-05-21T12:33:42.144231+00:00", "EventTime": "2024-05-21T12:33:42.144249+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHuKq2hGNHpMOwO36"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "686db4b6-c8ce-4ee3-9b9f-c1b1b006ada9", "DetectTime": "2024-05-21T12:33:42.157456+00:00", "EventTime": "2024-05-21T12:33:42.157477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHuKq2hGNHpMOwO36"], "accumulated_threat_level": 2.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "0f5b4dad-f42c-455c-af04-d36c4b4ad838", "DetectTime": "2024-05-21T12:33:42.169725+00:00", "EventTime": "2024-05-21T12:33:42.169743+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs1JUp9uP10OWrwd1"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "77e8c07c-1625-4c6f-98cc-78046423d8af", "DetectTime": "2024-05-21T12:33:42.243917+00:00", "EventTime": "2024-05-21T12:33:42.243945+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs1JUp9uP10OWrwd1"], "accumulated_threat_level": 2.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "4350f6b2-1cf9-4c5f-aa11-d83c428f40a7", "DetectTime": "2024-05-21T12:33:42.263570+00:00", "EventTime": "2024-05-21T12:33:42.263598+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTYfx1XTmHHiMnac6"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "46eb73e5-e755-4424-a839-ff6263771545", "DetectTime": "2024-05-21T12:33:42.276556+00:00", "EventTime": "2024-05-21T12:33:42.276574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTYfx1XTmHHiMnac6"], "accumulated_threat_level": 3.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "3e82c089-9747-42bd-8a22-baefa5de9d6f", "DetectTime": "2024-05-21T12:33:42.309714+00:00", "EventTime": "2024-05-21T12:33:42.309738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCev5qjCGLRR6vJrg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "cd5bb135-705e-488d-8cd7-1925c285c752", "DetectTime": "2024-05-21T12:33:42.424156+00:00", "EventTime": "2024-05-21T12:33:42.424180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRVcQR2zgGrRnyv997"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "acc9b83f-58d8-4e29-be4f-01d84fd4b6fb", "DetectTime": "2024-05-21T12:33:42.459623+00:00", "EventTime": "2024-05-21T12:33:42.459644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLQi5VJFGSVFiZV4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "d7df675a-3a02-43f3-b699-f469d5d15532", "DetectTime": "2024-05-21T12:33:42.499005+00:00", "EventTime": "2024-05-21T12:33:42.499027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6lLY1ohLLe2oiCYc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "ee398eae-d5b5-46d9-87a1-9d99df78434d", "DetectTime": "2024-05-21T12:33:42.692886+00:00", "EventTime": "2024-05-21T12:33:42.692914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIyQ1PDeAVZqhFDlh"], "accumulated_threat_level": 2.1, "timewindow": 76} +{"Format": "IDEA0", "ID": "ff30e769-e0d3-417d-af1a-e741b69c0ad7", "DetectTime": "2024-05-21T12:33:42.732026+00:00", "EventTime": "2024-05-21T12:33:42.732047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RX6EaNJPZbSIZU"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 76} +{"Format": "IDEA0", "ID": "ef7cf6ab-dcdf-439a-9b0a-3e68158d7e40", "DetectTime": "2024-05-21T12:33:42.765912+00:00", "EventTime": "2024-05-21T12:33:42.765933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cml9J91LceketlJzT4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "5880c34e-b83e-4413-9dbf-b4ffdb40a34b", "DetectTime": "2024-05-21T12:33:42.801611+00:00", "EventTime": "2024-05-21T12:33:42.801633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHAvlz1zjK7sj6VaK"], "accumulated_threat_level": 3.7, "timewindow": 76} +{"Format": "IDEA0", "ID": "967a173d-f63e-45aa-b542-eae768465704", "DetectTime": "2024-05-21T12:33:43.075529+00:00", "EventTime": "2024-05-21T12:33:43.075551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMl5a4nWpAnCYZqgf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "359856be-1180-455c-bd4b-b0244cfeaf33", "DetectTime": "2024-05-21T12:33:43.080450+00:00", "EventTime": "2024-05-21T12:33:43.080467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cffx6PEu5U2kdAOC4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "f0d9b5b5-21ad-4b2d-a2b7-481755da9ff4", "DetectTime": "2024-05-21T12:33:43.085080+00:00", "EventTime": "2024-05-21T12:33:43.085098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX9hFG3y4OHP4he7if"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "542aeca7-8126-4cb7-92d3-e37ceb25c9d3", "DetectTime": "2024-05-21T12:33:43.161448+00:00", "EventTime": "2024-05-21T12:33:43.161468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Scfv3C8Xu2OONLO"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "c94ba8d5-f49f-4040-a473-347bc79a006a", "DetectTime": "2024-05-21T12:33:43.405901+00:00", "EventTime": "2024-05-21T12:33:43.405919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYAUsT3z5Sfxd3CC4"], "accumulated_threat_level": 4.5, "timewindow": 76} +{"Format": "IDEA0", "ID": "052b618a-b655-4002-8af0-6121fb8fa00c", "DetectTime": "2024-05-21T12:33:43.492570+00:00", "EventTime": "2024-05-21T12:33:43.492588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.120.58"]}], "Attach": [{"Content": "Connection to unknown destination port 1069/UDP destination IP 46.49.120.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdAmWhsG2Uukn4l4"], "accumulated_threat_level": 5.3, "timewindow": 76} +{"Format": "IDEA0", "ID": "c5f4eab3-72df-41f6-8b2d-e8b22f288b07", "DetectTime": "2024-05-21T12:33:43.522032+00:00", "EventTime": "2024-05-21T12:33:43.522052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfZCC1Nqy8EiV2xPc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "3a2e9c0e-726f-4b67-bf91-fa8c5963774d", "DetectTime": "2024-05-21T12:33:43.555272+00:00", "EventTime": "2024-05-21T12:33:43.555291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTVMmlWEcfxCgFGqb"], "accumulated_threat_level": 6.1, "timewindow": 76} +{"Format": "IDEA0", "ID": "6b578039-ef57-4ac8-a152-c060d36a2efe", "DetectTime": "2024-05-21T12:33:43.593077+00:00", "EventTime": "2024-05-21T12:33:43.593096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClaLCG3qaCVLtlGjGk"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 76} +{"Format": "IDEA0", "ID": "f3524e50-d0c1-419e-8c62-8db05f358d1f", "DetectTime": "2024-05-21T12:33:43.648037+00:00", "EventTime": "2024-05-21T12:33:43.648055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cchym94DlvMSZePX51"], "accumulated_threat_level": 7.699999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "812741ba-6ce6-48ca-93b2-cb0c4084b4e1", "DetectTime": "2024-05-21T12:33:43.671649+00:00", "EventTime": "2024-05-21T12:33:43.671671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAkAZj15kbCr0RJiW8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "e8b88fe3-e7ba-4391-80e6-98d0695ee24d", "DetectTime": "2024-05-21T12:33:43.703018+00:00", "EventTime": "2024-05-21T12:33:43.703036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH8OgGxerQuqaqUkg"], "accumulated_threat_level": 8.5, "timewindow": 76} +{"Format": "IDEA0", "ID": "90e6763c-edf7-4196-8da0-4e082cfc851f", "DetectTime": "2024-05-21T12:33:43.987654+00:00", "EventTime": "2024-05-21T12:33:43.987675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciolpv3JPI1jymHt7k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "6f32acfd-9e71-43ed-8d9e-15b57848714d", "DetectTime": "2024-05-21T12:33:43.993857+00:00", "EventTime": "2024-05-21T12:33:43.993876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqO8CwJ8lZTdQXt5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "d1437d48-eb90-4201-9bef-97648ec4a2e7", "DetectTime": "2024-05-21T12:33:43.998385+00:00", "EventTime": "2024-05-21T12:33:43.998404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsILDmL5Wm7pAllm1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "5a91ea50-af61-462b-9710-8a88373d4bb0", "DetectTime": "2024-05-21T12:33:44.003032+00:00", "EventTime": "2024-05-21T12:33:44.003052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEELy3FHERyC5xC4i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "d0aba030-fc2b-41f0-8750-01928e1d4267", "DetectTime": "2024-05-21T12:33:44.027963+00:00", "EventTime": "2024-05-21T12:33:44.027982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8gtl38mBs1JIjHWk"], "accumulated_threat_level": 9.3, "timewindow": 76} +{"Format": "IDEA0", "ID": "5eb91206-667f-4311-8338-499163cad373", "DetectTime": "2024-05-21T12:33:44.136514+00:00", "EventTime": "2024-05-21T12:33:44.136532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszpMCaYe7jsgCJ64"], "accumulated_threat_level": 10.100000000000001, "timewindow": 76} +{"Format": "IDEA0", "ID": "ae3e63ee-496d-4f14-a090-b959279775b8", "DetectTime": "2024-05-21T12:33:44.148518+00:00", "EventTime": "2024-05-21T12:33:44.148535+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoZcO33g47zEaO68"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "13a2682a-7a10-4bdd-9c94-bed01225e483", "DetectTime": "2024-05-21T12:33:44.161327+00:00", "EventTime": "2024-05-21T12:33:44.161347+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoZcO33g47zEaO68"], "accumulated_threat_level": 3.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "088b0a47-3874-40a4-b462-371b1ff689d8", "DetectTime": "2024-05-21T12:33:44.177137+00:00", "EventTime": "2024-05-21T12:33:44.177159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MjTm1vhLOYN6lmok"], "accumulated_threat_level": 10.900000000000002, "timewindow": 76} +{"Format": "IDEA0", "ID": "b6a471d5-dd45-4dd2-941f-155c71e04fdd", "DetectTime": "2024-05-21T12:33:44.206790+00:00", "EventTime": "2024-05-21T12:33:44.206809+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdqvvePzf8PQUSO2"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "f0c9e26c-8cc6-4e52-be04-35d7a7f5cc33", "DetectTime": "2024-05-21T12:33:44.221072+00:00", "EventTime": "2024-05-21T12:33:44.221094+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdqvvePzf8PQUSO2"], "accumulated_threat_level": 4.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "39ff16b6-5945-448e-8541-2f06fa8f0ef1", "DetectTime": "2024-05-21T12:33:44.231943+00:00", "EventTime": "2024-05-21T12:33:44.231961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbkpkl4BoNbWvCfg0c"], "accumulated_threat_level": 11.700000000000003, "timewindow": 76} +{"Format": "IDEA0", "ID": "84e01bfa-3efe-45af-bb1b-7fb034845344", "DetectTime": "2024-05-21T12:33:44.247458+00:00", "EventTime": "2024-05-21T12:33:44.247476+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwtft91UK34Tclp4Sd"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "4204282f-614b-4ecf-a7e8-7b5ba020c5a7", "DetectTime": "2024-05-21T12:33:44.259828+00:00", "EventTime": "2024-05-21T12:33:44.259848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwtft91UK34Tclp4Sd"], "accumulated_threat_level": 4.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "10d81cc0-7d93-4ecb-b73e-a426bb128872", "DetectTime": "2024-05-21T12:33:44.264604+00:00", "EventTime": "2024-05-21T12:33:44.264623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vFNl1POC4V22GBrh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "4ba05462-162a-4454-8c3b-38ad77c0c8ff", "DetectTime": "2024-05-21T12:33:44.278056+00:00", "EventTime": "2024-05-21T12:33:44.278074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6E96Z2HLX2LoIJIp2"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "9ec989e0-7119-41ec-981f-9b8803d735cd", "DetectTime": "2024-05-21T12:33:44.290231+00:00", "EventTime": "2024-05-21T12:33:44.290250+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6E96Z2HLX2LoIJIp2"], "accumulated_threat_level": 5.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "9d8c38ca-84fd-40ba-b5b9-a31ae3bf9fa0", "DetectTime": "2024-05-21T12:33:44.301721+00:00", "EventTime": "2024-05-21T12:33:44.301742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRK5if4aO4uiibISqh"], "accumulated_threat_level": 12.500000000000004, "timewindow": 76} +{"Format": "Json", "ID": "9d8c38ca-84fd-40ba-b5b9-a31ae3bf9fa0", "DetectTime": "2024-05-21T12:33:44.301721+00:00", "EventTime": "2024-05-21T12:33:44.301742+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "1970-01-04T03:06:47.320661+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2024/05/21 12:33:44.512293)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 76, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "df816456-09b7-4f6b-8beb-2a9a766ceac9", "DetectTime": "2024-05-21T12:33:44.524789+00:00", "EventTime": "2024-05-21T12:33:44.524812+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMYki2OvMub85Rab"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "b903a5a0-3a27-45bb-b94b-787c57be13db", "DetectTime": "2024-05-21T12:33:44.601167+00:00", "EventTime": "2024-05-21T12:33:44.601186+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMYki2OvMub85Rab"], "accumulated_threat_level": 5.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "31eb791c-3c74-474e-9fe5-8ca45edf4983", "DetectTime": "2024-05-21T12:33:44.605841+00:00", "EventTime": "2024-05-21T12:33:44.605859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8E7EA3m0ZrgAFAXj9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "38548186-5ae0-4ffb-a43a-e633391c9a1c", "DetectTime": "2024-05-21T12:33:44.617731+00:00", "EventTime": "2024-05-21T12:33:44.617753+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XmwuqxltByiJ0g"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "822ba1c3-54f4-4829-95f8-5e54745680a4", "DetectTime": "2024-05-21T12:33:44.631332+00:00", "EventTime": "2024-05-21T12:33:44.631359+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XmwuqxltByiJ0g"], "accumulated_threat_level": 6.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "413314c7-3a69-49f7-91f3-7e0df5d9435f", "DetectTime": "2024-05-21T12:33:44.644063+00:00", "EventTime": "2024-05-21T12:33:44.644086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9N3OpuhYxVK0kmzi"], "accumulated_threat_level": 0.8, "timewindow": 76} +{"Format": "IDEA0", "ID": "62ebb1bb-0d96-4249-b40c-4df33546b20c", "DetectTime": "2024-05-21T12:33:44.656056+00:00", "EventTime": "2024-05-21T12:33:44.656074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cro5VM2WlGZ5lJfE0j"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "1266d634-1348-4d61-8162-3701ef61995f", "DetectTime": "2024-05-21T12:33:44.668070+00:00", "EventTime": "2024-05-21T12:33:44.668088+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cro5VM2WlGZ5lJfE0j"], "accumulated_threat_level": 6.5, "timewindow": 22} +{"Format": "IDEA0", "ID": "d21c3987-2ff8-4e6c-9b82-6060f233e2a3", "DetectTime": "2024-05-21T12:33:44.679049+00:00", "EventTime": "2024-05-21T12:33:44.679068+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTHGyHtNIWd8wPIJ5"], "accumulated_threat_level": 0, "timewindow": 22} +{"Format": "IDEA0", "ID": "132737f0-3a9c-44b0-9894-d960ce0b834d", "DetectTime": "2024-05-21T12:33:44.691959+00:00", "EventTime": "2024-05-21T12:33:44.691984+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTHGyHtNIWd8wPIJ5"], "accumulated_threat_level": 7.0, "timewindow": 22} +{"Format": "IDEA0", "ID": "e28df630-703a-4e3a-8b6e-3378fab34fc5", "DetectTime": "2024-05-21T12:33:44.697965+00:00", "EventTime": "2024-05-21T12:33:44.697987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVEB443PJqJkjQeAh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "a8aaa88e-b683-40e1-9ab3-344fce69da41", "DetectTime": "2024-05-21T12:33:44.710460+00:00", "EventTime": "2024-05-21T12:33:44.710479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1asRsVLovN0gaxB1"], "accumulated_threat_level": 1.6, "timewindow": 76} +{"Format": "IDEA0", "ID": "f307ac5f-1beb-4ecf-8cbc-80001c67338c", "DetectTime": "2024-05-21T12:33:44.721075+00:00", "EventTime": "2024-05-21T12:33:44.721094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4p7mJ3CnhhC9vAzYd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 76} +{"Format": "IDEA0", "ID": "bf21e112-61b6-45ac-a8be-0942b93e6c7c", "DetectTime": "2024-05-21T12:33:44.732974+00:00", "EventTime": "2024-05-21T12:33:44.732993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTejih4NAzXLnSQtDb"], "accumulated_threat_level": 3.2, "timewindow": 76} +{"Format": "IDEA0", "ID": "f5134ff1-1893-4430-a660-4ab9c7fce42f", "DetectTime": "2024-05-21T12:33:44.757148+00:00", "EventTime": "2024-05-21T12:33:44.757170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gJ9p1VV1t1AS73G1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "b1e7a9f0-106f-425e-9b35-c0db3b161caf", "DetectTime": "2024-05-21T12:33:44.788690+00:00", "EventTime": "2024-05-21T12:33:44.788709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fdfo1LXivs2ehhPg"], "accumulated_threat_level": 4.0, "timewindow": 76} +{"Format": "IDEA0", "ID": "f1aa45aa-589f-49dd-8ff6-64b65709298a", "DetectTime": "2024-05-21T12:33:44.826565+00:00", "EventTime": "2024-05-21T12:33:44.826583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.202.252.61"]}], "Attach": [{"Content": "Connection to unknown destination port 4321/UDP destination IP 75.202.252.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMF18v1dcbMvzYkRV6"], "accumulated_threat_level": 4.8, "timewindow": 76} +{"Format": "IDEA0", "ID": "3c4088dd-36d6-4719-a97e-5b805a318e75", "DetectTime": "2024-05-21T12:33:44.863355+00:00", "EventTime": "2024-05-21T12:33:44.863374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChYljB3VlB9JnDBpz7"], "accumulated_threat_level": 5.6, "timewindow": 76} +{"Format": "IDEA0", "ID": "e426c7e9-3703-4725-8b15-ea1f18c5dc92", "DetectTime": "2024-05-21T12:33:44.903291+00:00", "EventTime": "2024-05-21T12:33:44.903309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTh8C1QKNrHZedsV3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 76} +{"Format": "IDEA0", "ID": "e3133418-3731-4db1-8f1a-16ccfd27860d", "DetectTime": "2024-05-21T12:33:44.916327+00:00", "EventTime": "2024-05-21T12:33:44.916348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSmKRo4ODsDV9slH3d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "b08e8b53-699b-406b-b440-8b77f3e8869e", "DetectTime": "2024-05-21T12:33:44.982932+00:00", "EventTime": "2024-05-21T12:33:44.982952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtcjX3FFs13mF1Omb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "cebf1642-0586-4906-b060-fbe9053065d6", "DetectTime": "2024-05-21T12:33:45.071536+00:00", "EventTime": "2024-05-21T12:33:45.071558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7q7notGcXMYf0T04"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "6f3f937f-c595-402f-b145-f187e449b47a", "DetectTime": "2024-05-21T12:33:45.104847+00:00", "EventTime": "2024-05-21T12:33:45.104868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czebfy2LqaNcSKwZ7c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "9b0a060b-1271-4fa3-9821-5500b356dd7e", "DetectTime": "2024-05-21T12:33:45.154824+00:00", "EventTime": "2024-05-21T12:33:45.154845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cta16G4V8EnmRvDgk3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "33c73304-5e39-4f6f-85f2-ed46689da0cb", "DetectTime": "2024-05-21T12:33:45.413163+00:00", "EventTime": "2024-05-21T12:33:45.413187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZFQt029vlh6bMieD9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "796d0b5e-958a-44fe-8692-1010f7794b41", "DetectTime": "2024-05-21T12:33:45.447417+00:00", "EventTime": "2024-05-21T12:33:45.447437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrBfn3WItOLD88GZb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "0e63969b-f64b-45e1-b627-544048997b57", "DetectTime": "2024-05-21T12:33:45.480863+00:00", "EventTime": "2024-05-21T12:33:45.480885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.46.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82Dwn2VToRRYbBtdb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "57f67392-a7de-4b77-b3b9-d39460adeeef", "DetectTime": "2024-05-21T12:33:45.516684+00:00", "EventTime": "2024-05-21T12:33:45.516702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wgxy4fHbeCfZ56s6"], "accumulated_threat_level": 9.6, "timewindow": 76} +{"Format": "IDEA0", "ID": "cf7d2727-2d63-4f07-a2c7-0bcf093bb66e", "DetectTime": "2024-05-21T12:33:45.542712+00:00", "EventTime": "2024-05-21T12:33:45.542735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtU9flQ6HcszcW30h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "b8cb3394-1bfb-4d8a-b2eb-72fd517c5ab7", "DetectTime": "2024-05-21T12:33:45.619238+00:00", "EventTime": "2024-05-21T12:33:45.619261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEo87s1QXUKTGiUnhb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "f6036b45-cb14-4867-8904-1396231d3c69", "DetectTime": "2024-05-21T12:33:45.650863+00:00", "EventTime": "2024-05-21T12:33:45.650888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUvWch8nZAwjZE86"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "2987e8a2-bb6b-4f63-a49d-a2e0d91e4a74", "DetectTime": "2024-05-21T12:33:45.656653+00:00", "EventTime": "2024-05-21T12:33:45.656675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAZZ8J2qr66o9L2eLj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "e8a67c80-70f1-407e-8784-439ef2dab1de", "DetectTime": "2024-05-21T12:33:45.685115+00:00", "EventTime": "2024-05-21T12:33:45.685138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnU41w22ZRjHZuGA5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "404201ef-80b6-40d4-9246-bfafe9af4e8d", "DetectTime": "2024-05-21T12:33:45.732974+00:00", "EventTime": "2024-05-21T12:33:45.732995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhZKmTTxQE6U2l2l"], "accumulated_threat_level": 10.4, "timewindow": 76} +{"Format": "IDEA0", "ID": "e36000c6-cb9e-40a6-b1a8-947eb2fa7040", "DetectTime": "2024-05-21T12:33:45.774958+00:00", "EventTime": "2024-05-21T12:33:45.774977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsP47e42pudYlgtUTc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "8fdb0fc8-0bf4-4f1e-9b1c-9220fc68155b", "DetectTime": "2024-05-21T12:33:45.789746+00:00", "EventTime": "2024-05-21T12:33:45.789771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.200.221.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7BfVT3Ci7HgRebRsl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "ab465b32-0802-464d-ad17-47a7c86cecb0", "DetectTime": "2024-05-21T12:33:46.115936+00:00", "EventTime": "2024-05-21T12:33:46.115956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2bcEU3vWfPSVJsQkl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 74} +{"Format": "IDEA0", "ID": "8c0892f4-7328-4672-8247-e91f5cdb71b9", "DetectTime": "2024-05-21T12:33:46.152127+00:00", "EventTime": "2024-05-21T12:33:46.152147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.169.222.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFKuI2oukVVVBZcq2"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "eb1af173-6bb9-4574-8054-8d0a904c5e85", "DetectTime": "2024-05-21T12:33:46.180359+00:00", "EventTime": "2024-05-21T12:33:46.180379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKEII1uuW7ZcZoEc4", "CIXNnRPIQgbYAZ97h", "CrpxoSMEsqyk2IIE2", "CaFiDZ11mxOrdpHnO7"], "accumulated_threat_level": 10.9, "timewindow": 76} +{"Format": "IDEA0", "ID": "9b02253a-ac33-4dee-9c5d-76a379af2616", "DetectTime": "2024-05-21T12:33:46.186061+00:00", "EventTime": "2024-05-21T12:33:46.186082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.123.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrjFB7ZeShDE1W7I6"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "0f8b50eb-a595-4e39-9313-a5e9325b7392", "DetectTime": "2024-05-21T12:33:46.238802+00:00", "EventTime": "2024-05-21T12:33:46.238824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPA7Yg3UmKyu7SaWEl"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "52dfce58-f611-4d41-94d3-b02ad4a3bc83", "DetectTime": "2024-05-21T12:33:46.287760+00:00", "EventTime": "2024-05-21T12:33:46.287778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQ5dL31GAooymHtsb"], "accumulated_threat_level": 11.700000000000001, "timewindow": 76} +{"Format": "IDEA0", "ID": "4552ba87-7ca6-408b-ba57-863f4947d727", "DetectTime": "2024-05-21T12:33:46.310839+00:00", "EventTime": "2024-05-21T12:33:46.310859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4VN72c6S8CKHPwz8"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "ef33c270-713c-4f1d-81b1-f90894d72dcc", "DetectTime": "2024-05-21T12:33:46.335094+00:00", "EventTime": "2024-05-21T12:33:46.335117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJItO2aHt94Sb2nRf"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "3a824efe-260d-4b58-bc0d-453a2b9b4edb", "DetectTime": "2024-05-21T12:33:46.557179+00:00", "EventTime": "2024-05-21T12:33:46.557201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN1ad32qRnqdhLJuic"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "3caf2549-d1b9-4986-aa58-6dbc5758026b", "DetectTime": "2024-05-21T12:33:46.590264+00:00", "EventTime": "2024-05-21T12:33:46.590285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ydEU1LgQFyblV0L5"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "94ccf048-0ba4-4e42-bd25-f12bebc0f555", "DetectTime": "2024-05-21T12:33:46.628328+00:00", "EventTime": "2024-05-21T12:33:46.628349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.155.76.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoEzX22zNQvcDfZBj8"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "957f2567-8654-4271-a87e-5fec7454f48a", "DetectTime": "2024-05-21T12:33:46.666892+00:00", "EventTime": "2024-05-21T12:33:46.666914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQxwGI2VnV8lbMcPu6"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "3860cb07-1391-4bbf-bb44-4e088c405761", "DetectTime": "2024-05-21T12:33:46.709773+00:00", "EventTime": "2024-05-21T12:33:46.709795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Dfqdk0YGEEhIiLb"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "d45d0387-6747-4d29-b526-9b91a456951c", "DetectTime": "2024-05-21T12:33:46.731859+00:00", "EventTime": "2024-05-21T12:33:46.731880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3M0R24WqQs6xuCPbi"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "c9bec497-9714-4eaa-8aa5-2bc431856e62", "DetectTime": "2024-05-21T12:33:46.806446+00:00", "EventTime": "2024-05-21T12:33:46.806468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDLB73420ynZ1lqVh"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "5f4164e3-5be0-43af-bd0b-25de8a928972", "DetectTime": "2024-05-21T12:33:47.095242+00:00", "EventTime": "2024-05-21T12:33:47.095265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgXaAK21vBeR61qPs5"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "8b802f39-66d5-4749-8ffe-fa16b19dee57", "DetectTime": "2024-05-21T12:33:47.100280+00:00", "EventTime": "2024-05-21T12:33:47.100301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9AeP02bYZm75stQ25"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "c1fd0aae-b6bc-439d-9167-032d7d22b030", "DetectTime": "2024-05-21T12:33:47.105206+00:00", "EventTime": "2024-05-21T12:33:47.105227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofLcn4sHcvI3ixCL3"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "0c3cc084-9ca5-4e2a-a618-54e1c0ae361e", "DetectTime": "2024-05-21T12:33:47.110031+00:00", "EventTime": "2024-05-21T12:33:47.110051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpv63I2ctIBifBrux9"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "7eebd1ea-c95c-43df-a7e9-636f940ad429", "DetectTime": "2024-05-21T12:33:47.180289+00:00", "EventTime": "2024-05-21T12:33:47.180322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJl4Tw3aRl0UuwX2ti"], "accumulated_threat_level": 12.500000000000002, "timewindow": 76} +{"Format": "Json", "ID": "7eebd1ea-c95c-43df-a7e9-636f940ad429", "DetectTime": "2024-05-21T12:33:47.180289+00:00", "EventTime": "2024-05-21T12:33:47.180322+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "1970-01-04T03:37:24.469908+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2024/05/21 12:33:47.389966)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 76, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "d4c30cba-7d71-431a-87ff-ed64329cffe9", "DetectTime": "2024-05-21T12:33:47.394056+00:00", "EventTime": "2024-05-21T12:33:47.394074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKuNlk2iA4OZfQmEol"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "037dfa2b-78a6-422e-98d4-f75e32347256", "DetectTime": "2024-05-21T12:33:47.398688+00:00", "EventTime": "2024-05-21T12:33:47.398706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZidPc4AUW2jDcR577"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "f2b307a4-79cd-4333-bafa-928dde0ce598", "DetectTime": "2024-05-21T12:33:47.403126+00:00", "EventTime": "2024-05-21T12:33:47.403144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrpTN1vd5Bx5JxIOh"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "aa979d4f-eb4a-4b12-a092-3349d1265cfd", "DetectTime": "2024-05-21T12:33:47.436443+00:00", "EventTime": "2024-05-21T12:33:47.436465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnzVt8b8PdNYfCll"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "81f30c9f-4f5b-4684-bf5b-5705460f4354", "DetectTime": "2024-05-21T12:33:47.471951+00:00", "EventTime": "2024-05-21T12:33:47.471974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJdWXmWBJhsoe3dj"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "edf9a07f-2ca8-4ba2-a5ab-8edbcf591fb8", "DetectTime": "2024-05-21T12:33:47.508533+00:00", "EventTime": "2024-05-21T12:33:47.508555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpqvt73FQbjWXvGBM7"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "3bd21f89-12f5-4f79-be66-1070cf108f80", "DetectTime": "2024-05-21T12:33:47.546084+00:00", "EventTime": "2024-05-21T12:33:47.546106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwF20z3LhYXVsPxO23"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "36c6c842-f1da-453e-95a1-e0b2bdbf37dc", "DetectTime": "2024-05-21T12:33:47.585637+00:00", "EventTime": "2024-05-21T12:33:47.585656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfxT51nNvyFqIEqTl"], "accumulated_threat_level": 0.8, "timewindow": 76} +{"Format": "IDEA0", "ID": "73ef4e20-5d24-45dc-b995-242b95abbdb4", "DetectTime": "2024-05-21T12:33:47.835529+00:00", "EventTime": "2024-05-21T12:33:47.835551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4BIMY3RieEyaRMx4d"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "7da58421-f05a-45e2-8d06-953c8b6a45e2", "DetectTime": "2024-05-21T12:33:47.876001+00:00", "EventTime": "2024-05-21T12:33:47.876025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBW6e1wcC5yCYJYze"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "7d827f50-f37e-4031-a20d-04ba943db46c", "DetectTime": "2024-05-21T12:33:47.881479+00:00", "EventTime": "2024-05-21T12:33:47.881497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4URQ1N9YKXblyUNb"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "1e9b8221-ebc1-4b90-9197-92bef4daacc2", "DetectTime": "2024-05-21T12:33:48.012690+00:00", "EventTime": "2024-05-21T12:33:48.012715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjjN071ooufS32bcA1"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "ce27fead-971f-47e3-ac13-3df3b3b78f6f", "DetectTime": "2024-05-21T12:33:48.112168+00:00", "EventTime": "2024-05-21T12:33:48.112186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Z1w32dwagA7320jl"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "baa80965-f103-4543-9784-fbfb425c7586", "DetectTime": "2024-05-21T12:33:48.152426+00:00", "EventTime": "2024-05-21T12:33:48.152446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ICCle0GgmD6kJN8"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "93875e2b-ef75-4dfb-b69a-f3b92faf7547", "DetectTime": "2024-05-21T12:33:48.186987+00:00", "EventTime": "2024-05-21T12:33:48.187007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "Connection to unknown destination port 20050/UDP destination IP 190.42.223.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQmHiEKbosLOVGL"], "accumulated_threat_level": 1.6, "timewindow": 76} +{"Format": "IDEA0", "ID": "d01a2e90-803e-4a1b-9bdc-93b8784fbbf1", "DetectTime": "2024-05-21T12:33:48.212584+00:00", "EventTime": "2024-05-21T12:33:48.212603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCQCzE1yaaIcDLEEx3"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "f1c69738-c915-4e53-bf60-a4c34fb8ffa8", "DetectTime": "2024-05-21T12:33:48.265991+00:00", "EventTime": "2024-05-21T12:33:48.266011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUhp526wCV9S6AVO1"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "1f31b54c-73ff-4af6-a088-11f9269a5b91", "DetectTime": "2024-05-21T12:33:48.281883+00:00", "EventTime": "2024-05-21T12:33:48.281905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cak8nc2crSA8bYbup4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 76} +{"Format": "IDEA0", "ID": "b0e0d34a-7176-4068-9325-e36391566928", "DetectTime": "2024-05-21T12:33:48.319708+00:00", "EventTime": "2024-05-21T12:33:48.319726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4E072sAeEdkFhYU2"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "3e10bfb6-adb9-47f4-a065-56c4d01bd546", "DetectTime": "2024-05-21T12:33:48.365596+00:00", "EventTime": "2024-05-21T12:33:48.365614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUZZq9iNcXSie6q2"], "accumulated_threat_level": 3.2, "timewindow": 76} +{"Format": "IDEA0", "ID": "5ccd9cc8-2321-4f55-9340-9bbe33c3fe80", "DetectTime": "2024-05-21T12:33:48.380665+00:00", "EventTime": "2024-05-21T12:33:48.380684+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["190.42.223.97"], "Type": ["CC"], "Port": [7646], "Proto": ["TCP"]}], "Target": [{"IP4": ["190.42.223.97"]}], "Attach": [{"Content": "C&C channel, destination IP: 190.42.223.97 port: 7646/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82EYfHZtINXB4GW"], "accumulated_threat_level": 3.224, "timewindow": 76} +{"Format": "IDEA0", "ID": "d706eead-ef41-4d8d-9b3b-e92aea96d277", "DetectTime": "2024-05-21T12:33:48.423192+00:00", "EventTime": "2024-05-21T12:33:48.423224+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["190.42.223.97"], "Type": ["CC"]}, {"IP4": ["190.42.223.97"], "Type": ["CC"], "Port": [7646], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 190.42.223.97 port: 7646/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82EYfHZtINXB4GW"], "accumulated_threat_level": 0, "timewindow": 76} +{"Format": "IDEA0", "ID": "fd7d19a8-ab4f-48ac-8e06-b893fad90f6d", "DetectTime": "2024-05-21T12:33:48.626370+00:00", "EventTime": "2024-05-21T12:33:48.626393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpOU73mCkAGZKxlp8"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "123e9ead-430b-454a-91f6-1f2e7f06aeaf", "DetectTime": "2024-05-21T12:33:48.675106+00:00", "EventTime": "2024-05-21T12:33:48.675124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jX4U2MVZldWfvql"], "accumulated_threat_level": 4.024, "timewindow": 76} +{"Format": "IDEA0", "ID": "60fdefcd-24ce-414a-8402-258f6ceb384d", "DetectTime": "2024-05-21T12:33:48.705385+00:00", "EventTime": "2024-05-21T12:33:48.705406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cliq5O1DXNuwFHMT45"], "accumulated_threat_level": 4.824, "timewindow": 76} +{"Format": "IDEA0", "ID": "67ecda1a-0c86-424b-95a1-749f8bba164b", "DetectTime": "2024-05-21T12:33:48.807201+00:00", "EventTime": "2024-05-21T12:33:48.807224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoH1vs23ZyIXtQpdDj"], "accumulated_threat_level": 5.624, "timewindow": 76} +{"Format": "IDEA0", "ID": "8764dd76-84b4-47e5-ac0e-e12778616aff", "DetectTime": "2024-05-21T12:33:48.829916+00:00", "EventTime": "2024-05-21T12:33:48.829936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQQaT2AoBQoQdVeUb"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 76} +{"Format": "IDEA0", "ID": "3219ef02-da46-4712-ab9e-02e20c747965", "DetectTime": "2024-05-21T12:33:48.867456+00:00", "EventTime": "2024-05-21T12:33:48.867476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLp5sY178ePF3fpkAg"], "accumulated_threat_level": 7.223999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "5c8582f4-710b-41aa-a1da-19cb3697f9b5", "DetectTime": "2024-05-21T12:33:48.916372+00:00", "EventTime": "2024-05-21T12:33:48.916392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZg3d2qO8zwUnvPFh"], "accumulated_threat_level": 8.024, "timewindow": 76} +{"Format": "IDEA0", "ID": "7435394a-742b-4676-9589-d6c187dedbf6", "DetectTime": "2024-05-21T12:33:48.947224+00:00", "EventTime": "2024-05-21T12:33:48.947248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJIOQ3esFOXO11Isa"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "37a8ed2d-4564-4750-b3f1-066f5e1699bb", "DetectTime": "2024-05-21T12:33:48.973882+00:00", "EventTime": "2024-05-21T12:33:48.973900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.46.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwjX8djZU2CZuWcHa"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "8242a1fa-4cc6-4958-bfd2-d5b3886bf90e", "DetectTime": "2024-05-21T12:33:49.007348+00:00", "EventTime": "2024-05-21T12:33:49.007367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C671Li3VjlSsIrvBH5"], "accumulated_threat_level": 8.824, "timewindow": 76} +{"Format": "IDEA0", "ID": "7ba6befb-ac21-40c7-b4e7-9dc1c9b26c81", "DetectTime": "2024-05-21T12:33:49.041675+00:00", "EventTime": "2024-05-21T12:33:49.041694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoqQP1xjYkl40ifce"], "accumulated_threat_level": 9.624, "timewindow": 76} +{"Format": "IDEA0", "ID": "6cb4fe0c-ae42-40ff-aa07-e5febd7a4d28", "DetectTime": "2024-05-21T12:33:49.080139+00:00", "EventTime": "2024-05-21T12:33:49.080159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIaTw4FFQ2tLfB1qf"], "accumulated_threat_level": 10.424000000000001, "timewindow": 76} +{"Format": "IDEA0", "ID": "9aaafbfd-d2fe-444a-9a3e-2c65881336b3", "DetectTime": "2024-05-21T12:33:49.118887+00:00", "EventTime": "2024-05-21T12:33:49.118906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSNM0726ElEW06uK75"], "accumulated_threat_level": 11.224000000000002, "timewindow": 76} +{"Format": "IDEA0", "ID": "e8498a77-a860-4a1f-99e1-bd478d0a04dd", "DetectTime": "2024-05-21T12:33:49.169953+00:00", "EventTime": "2024-05-21T12:33:49.169972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C07RW92uZSvy7qZ6Kc"], "accumulated_threat_level": 12.024000000000003, "timewindow": 76} +{"Format": "Json", "ID": "e8498a77-a860-4a1f-99e1-bd478d0a04dd", "DetectTime": "2024-05-21T12:33:49.169953+00:00", "EventTime": "2024-05-21T12:33:49.169972+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-04T03:38:38.740211+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 76. (real time 2024/05/21 12:33:49.381164)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 76, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "169fe3b1-4f41-48d0-aefd-c06eaf9fc21a", "DetectTime": "2024-05-21T12:33:49.392837+00:00", "EventTime": "2024-05-21T12:33:49.392859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMBDqO2WG4jjeQZm03"], "accumulated_threat_level": 0.8, "timewindow": 76} +{"Format": "IDEA0", "ID": "e126cccd-b4e2-458b-b6eb-edf750dd9841", "DetectTime": "2024-05-21T12:33:49.468304+00:00", "EventTime": "2024-05-21T12:33:49.468326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLeWAV13OBEJMBNAD5"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "acd14e14-2924-4c2d-bd5d-e91694efe13a", "DetectTime": "2024-05-21T12:33:49.473206+00:00", "EventTime": "2024-05-21T12:33:49.473226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0bin3MnUqAopb6Uj"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "6fdc6db5-9c8e-4c04-98b5-2548f2e10dea", "DetectTime": "2024-05-21T12:33:49.519075+00:00", "EventTime": "2024-05-21T12:33:49.519094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nDGe22hjkoOQS40i"], "accumulated_threat_level": 1.6, "timewindow": 76} +{"Format": "IDEA0", "ID": "af5129c7-f7a8-495a-aaca-2481b5cfa97b", "DetectTime": "2024-05-21T12:33:49.554087+00:00", "EventTime": "2024-05-21T12:33:49.554107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMUVO2GLDnaFY9PAd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 76} +{"Format": "IDEA0", "ID": "2f76356e-8e8e-4715-9ed5-4dca9ab67dda", "DetectTime": "2024-05-21T12:33:49.579889+00:00", "EventTime": "2024-05-21T12:33:49.579910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpApSoMsWdfANhST"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "681c5345-1922-4d13-85e6-8f6f9b4b3c20", "DetectTime": "2024-05-21T12:33:49.618883+00:00", "EventTime": "2024-05-21T12:33:49.618904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj2SGnV4XmuGJWPf7"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "eac42a9c-ed1d-4975-b3e5-3e4dc7ffe7ea", "DetectTime": "2024-05-21T12:33:49.623823+00:00", "EventTime": "2024-05-21T12:33:49.623840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.200.221.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd53P040xjLx9Rgi1f"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "60414808-4f42-43a6-962d-d6ebbf1e2354", "DetectTime": "2024-05-21T12:33:49.834292+00:00", "EventTime": "2024-05-21T12:33:49.834315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.235.166.233"]}], "Attach": [{"Content": "Connection to unknown destination port 10320/UDP destination IP 189.235.166.233. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETVnv4RgcCPUd4bi2"], "accumulated_threat_level": 3.2, "timewindow": 76} +{"Format": "IDEA0", "ID": "0375433c-1e52-4098-81a9-16c618f6818a", "DetectTime": "2024-05-21T12:33:49.941837+00:00", "EventTime": "2024-05-21T12:33:49.941857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NUGK2z4aDkgv3oxc"], "accumulated_threat_level": 4.0, "timewindow": 76} +{"Format": "IDEA0", "ID": "81d59a90-16c7-4888-bf42-6438e1e106dc", "DetectTime": "2024-05-21T12:33:49.962346+00:00", "EventTime": "2024-05-21T12:33:49.962368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ht9F3rSFZ0L20J4g"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "fdd6d74d-0655-4122-a850-638ad93f1302", "DetectTime": "2024-05-21T12:33:50.004768+00:00", "EventTime": "2024-05-21T12:33:50.004789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWvIO2YQN5t9bUYv9"], "accumulated_threat_level": 4.8, "timewindow": 76} +{"Format": "IDEA0", "ID": "8597b3ce-d3e6-4f09-9558-b261042ca439", "DetectTime": "2024-05-21T12:33:50.041026+00:00", "EventTime": "2024-05-21T12:33:50.041047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JyhR3xn7uXhTtVY6"], "accumulated_threat_level": 5.6, "timewindow": 76} +{"Format": "IDEA0", "ID": "96c03651-b00f-419e-8c5a-4beb3108c565", "DetectTime": "2024-05-21T12:33:50.079325+00:00", "EventTime": "2024-05-21T12:33:50.079345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO9U223MY5DqsSpyEa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 76} +{"Format": "IDEA0", "ID": "6cd18125-d390-442a-9dc5-54d0b8878dbd", "DetectTime": "2024-05-21T12:33:50.327301+00:00", "EventTime": "2024-05-21T12:33:50.327322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.117.42.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcZNx2M9rMHmvWIa6"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "d91eaf96-9ae2-46eb-981c-aa3221c99a9e", "DetectTime": "2024-05-21T12:33:50.366319+00:00", "EventTime": "2024-05-21T12:33:50.366340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAQPl3ONJo9Z9aZqe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "6f9a906a-f442-4d6c-9073-6a5c7df4a63b", "DetectTime": "2024-05-21T12:33:50.404324+00:00", "EventTime": "2024-05-21T12:33:50.404345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.182 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLaKL2SzMHrTZP0ol"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "990b70cc-4643-4a04-8a21-839c386a17d8", "DetectTime": "2024-05-21T12:33:50.467327+00:00", "EventTime": "2024-05-21T12:33:50.467346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6BnLDx5I3mfEboj"], "accumulated_threat_level": 0.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "1008a9b1-9629-49b4-ae52-3118fc4e0f99", "DetectTime": "2024-05-21T12:33:50.611004+00:00", "EventTime": "2024-05-21T12:33:50.611026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgjSwr4asiZVCbbD9c", "CpiwKI1n9uwnE3fTwh", "C6aYm23no4wj39SW5g", "Ckbg752lBOiTPyP6M1"], "accumulated_threat_level": 1.3, "timewindow": 77} +{"Format": "IDEA0", "ID": "261c5eb2-1246-4119-be6b-6109907fba7a", "DetectTime": "2024-05-21T12:33:50.974742+00:00", "EventTime": "2024-05-21T12:33:50.974763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.65.46.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl97Pq3vvxK92u7Df3"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "0abdf318-e1f3-44db-bb73-1a232b4e0b9b", "DetectTime": "2024-05-21T12:33:51.314222+00:00", "EventTime": "2024-05-21T12:33:51.314244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.200.221.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CljoQU3VI0hnsnIpyf"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "9269d710-dbdd-4f2b-8fcf-409325ef250f", "DetectTime": "2024-05-21T12:33:51.601011+00:00", "EventTime": "2024-05-21T12:33:51.601030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFZQy4TJpFSc23Ijj"], "accumulated_threat_level": 2.1, "timewindow": 77} +{"Format": "IDEA0", "ID": "9870679f-69c6-4c5a-a844-a27c727c0db4", "DetectTime": "2024-05-21T12:33:52.158116+00:00", "EventTime": "2024-05-21T12:33:52.158138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9DvB4u9qnrIgIyRc"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "583fe0d3-4959-4187-ae43-1078ea09d081", "DetectTime": "2024-05-21T12:33:52.409810+00:00", "EventTime": "2024-05-21T12:33:52.409834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLgIE1lPHsMZJmLp8", "C75S66zlwt5XMIWt4", "CvMDp837jI1yq1v47l", "Ca5hhL1czVAjoEQmmj"], "accumulated_threat_level": 2.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "6301769c-85a5-4119-95f9-b49676f68c88", "DetectTime": "2024-05-21T12:33:52.569930+00:00", "EventTime": "2024-05-21T12:33:52.569951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjurh1vwoAnaPHQ41"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 77} +{"Format": "IDEA0", "ID": "2625fafa-c608-4a2d-a01a-dc514235ed1f", "DetectTime": "2024-05-21T12:33:52.595222+00:00", "EventTime": "2024-05-21T12:33:52.595242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRlpF3BCqMiCnT8hh"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "600e20e5-5867-4c41-834c-2d19f49d582b", "DetectTime": "2024-05-21T12:33:52.639096+00:00", "EventTime": "2024-05-21T12:33:52.639117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.22.206.204"]}], "Attach": [{"Content": "Connection to unknown destination port 4251/UDP destination IP 186.22.206.204. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggZ2kdqqySQppm94"], "accumulated_threat_level": 4.2, "timewindow": 77} +{"Format": "IDEA0", "ID": "1937aea1-fbf8-4a5f-ba0b-89862c0090bc", "DetectTime": "2024-05-21T12:33:52.644000+00:00", "EventTime": "2024-05-21T12:33:52.644024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswKZobZ3GBegvY1j"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "f4c88318-3c97-41a5-90e6-9af9718b63bf", "DetectTime": "2024-05-21T12:33:52.973118+00:00", "EventTime": "2024-05-21T12:33:52.973144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwPi622JGgbyQ8PC7"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "e2ead700-732f-4da7-8c7b-5d82f8e93d07", "DetectTime": "2024-05-21T12:33:52.978134+00:00", "EventTime": "2024-05-21T12:33:52.978153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u1n73ZpGyO1glwha"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "fe53a96b-f754-4c78-8328-043ae44cdcd4", "DetectTime": "2024-05-21T12:33:52.982841+00:00", "EventTime": "2024-05-21T12:33:52.982859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAe6439TjGax3ns5e"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "339b76f1-8da0-4d0b-8889-b68685e2866c", "DetectTime": "2024-05-21T12:33:53.009527+00:00", "EventTime": "2024-05-21T12:33:53.009547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIsTG3lvHmyQV4mU8"], "accumulated_threat_level": 5.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5a52f4e6-9ae8-4214-acee-b2008034e4a2", "DetectTime": "2024-05-21T12:33:53.072090+00:00", "EventTime": "2024-05-21T12:33:53.072107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.155.76.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy9l5s1PPrrfIjRqEi"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "94269444-da2d-4ecf-9290-23b9cc62e3a5", "DetectTime": "2024-05-21T12:33:53.142875+00:00", "EventTime": "2024-05-21T12:33:53.142899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggcTs2FNranNBgNg1"], "accumulated_threat_level": 5.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "b069227d-b629-4f7f-a657-96b09a38832a", "DetectTime": "2024-05-21T12:33:53.168778+00:00", "EventTime": "2024-05-21T12:33:53.168800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJfQja2jECwglsU7"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "9bd608f8-8af3-42ef-aea1-dc89a947b762", "DetectTime": "2024-05-21T12:33:53.213131+00:00", "EventTime": "2024-05-21T12:33:53.213149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUftXi1ZUYF4TYQQ4"], "accumulated_threat_level": 6.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "cca0f101-838e-4206-9082-eb1757a45c4e", "DetectTime": "2024-05-21T12:33:53.227984+00:00", "EventTime": "2024-05-21T12:33:53.228009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOrk12DAgpTzkeBDh"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "26d2cfab-bb1b-4623-a3a5-0d32a60358a7", "DetectTime": "2024-05-21T12:33:53.262770+00:00", "EventTime": "2024-05-21T12:33:53.262792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXR9KTNewqq8WsOl6"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "eeaf4b17-8113-40c0-be38-586bcff91fa1", "DetectTime": "2024-05-21T12:33:53.293562+00:00", "EventTime": "2024-05-21T12:33:53.293581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7VsDZl5mdjWGZre"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 77} +{"Format": "IDEA0", "ID": "86b6dc8f-02b1-4e99-a502-45eb1a76b81d", "DetectTime": "2024-05-21T12:33:53.330429+00:00", "EventTime": "2024-05-21T12:33:53.330447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTP5YA3wXX1ZTb7mHl"], "accumulated_threat_level": 8.2, "timewindow": 77} +{"Format": "IDEA0", "ID": "102d9e6e-0763-4704-b168-c64018509718", "DetectTime": "2024-05-21T12:33:53.380613+00:00", "EventTime": "2024-05-21T12:33:53.380633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm5g052dLF1smuccs"], "accumulated_threat_level": 9.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "982c4666-2de3-466b-a5c3-aae18121fad1", "DetectTime": "2024-05-21T12:33:53.658038+00:00", "EventTime": "2024-05-21T12:33:53.658060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHZWI3PRb9qAcUsEl"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "64d2fc50-2e76-4910-b210-e437ded9007c", "DetectTime": "2024-05-21T12:33:53.663467+00:00", "EventTime": "2024-05-21T12:33:53.663490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzKRdFFWWTmuhdFg2"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "e3e87b59-f802-4f09-846b-81ef7cc3494b", "DetectTime": "2024-05-21T12:33:53.668400+00:00", "EventTime": "2024-05-21T12:33:53.668420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bF604WGuMKo7TaR7"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "21a0abe8-f7cd-4188-8a9d-5baa6e852f8d", "DetectTime": "2024-05-21T12:33:53.672953+00:00", "EventTime": "2024-05-21T12:33:53.672973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8C0H1VyhKpJ9G5jf"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "bf345513-990e-4a49-afa0-88e04840ad11", "DetectTime": "2024-05-21T12:33:53.720385+00:00", "EventTime": "2024-05-21T12:33:53.720404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6gUe22zDZuXpaVhPl"], "accumulated_threat_level": 9.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "fd5d1f55-c786-4e73-86b3-b15cb0b425c0", "DetectTime": "2024-05-21T12:33:53.784433+00:00", "EventTime": "2024-05-21T12:33:53.784456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEdPa1uFhdyCBiHbf"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "8b706661-d0e9-4ea1-acdf-705f29b7f764", "DetectTime": "2024-05-21T12:33:53.883358+00:00", "EventTime": "2024-05-21T12:33:53.883378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdVfj2GecRBlz8GE4"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "f972f6e7-a941-4815-b394-df35acbca2db", "DetectTime": "2024-05-21T12:33:53.896078+00:00", "EventTime": "2024-05-21T12:33:53.896097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYbOB4Jrl765Q3w07"], "accumulated_threat_level": 10.600000000000001, "timewindow": 77} +{"Format": "IDEA0", "ID": "1887d0ce-bafe-4c8e-8e22-3acbeff47c55", "DetectTime": "2024-05-21T12:33:53.942832+00:00", "EventTime": "2024-05-21T12:33:53.942852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQakCR0nuqWF1FePd"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "2e421b11-afff-4689-be6c-2e35ca1fb3c0", "DetectTime": "2024-05-21T12:33:53.948254+00:00", "EventTime": "2024-05-21T12:33:53.948272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpnINAStzJvrCxa6"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "00d6c641-01af-40e0-a2c2-551e39771e3d", "DetectTime": "2024-05-21T12:33:54.274770+00:00", "EventTime": "2024-05-21T12:33:54.274787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfF3JH1XDGEDZpy3Ef"], "accumulated_threat_level": 11.400000000000002, "timewindow": 77} +{"Format": "IDEA0", "ID": "0bf05a95-1f8d-4add-90f8-ccc8ea9b80a9", "DetectTime": "2024-05-21T12:33:54.301906+00:00", "EventTime": "2024-05-21T12:33:54.301926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7vtbe2qRnAa7kMSi5"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "18363989-91da-4680-9a46-6a4853992ca3", "DetectTime": "2024-05-21T12:33:54.307376+00:00", "EventTime": "2024-05-21T12:33:54.307397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZO1k1t0znFf7NQic"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "148ffe36-90d0-4326-b218-c7b303bf94f8", "DetectTime": "2024-05-21T12:33:54.312361+00:00", "EventTime": "2024-05-21T12:33:54.312380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpWjS3A7nXGpZpMoh"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "91e244c5-9bc4-4f4b-8996-7391b0035caf", "DetectTime": "2024-05-21T12:33:54.316998+00:00", "EventTime": "2024-05-21T12:33:54.317017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Qo8na91Yvz9C2pk"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "23cc99f5-923b-4d2c-8a65-12032893b409", "DetectTime": "2024-05-21T12:33:54.333208+00:00", "EventTime": "2024-05-21T12:33:54.333230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYEtYa4Kq8HBrlABtd"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "b775f9fc-aa60-4169-bd37-e8018af872a5", "DetectTime": "2024-05-21T12:33:54.445140+00:00", "EventTime": "2024-05-21T12:33:54.445162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhaWjIpOvXW6fs44"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "50bd60c5-556a-480b-bfb6-edd6c3bd89b2", "DetectTime": "2024-05-21T12:33:54.465579+00:00", "EventTime": "2024-05-21T12:33:54.465607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGcjwc5hIw1E2NQ1"], "accumulated_threat_level": 12.200000000000003, "timewindow": 77} +{"Format": "Json", "ID": "50bd60c5-556a-480b-bfb6-edd6c3bd89b2", "DetectTime": "2024-05-21T12:33:54.465579+00:00", "EventTime": "2024-05-21T12:33:54.465607+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "1970-01-04T04:10:29.208309+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2024/05/21 12:33:54.706290)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 77, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "2e882617-727d-4ec8-b6f0-048e6a4167d6", "DetectTime": "2024-05-21T12:33:54.710934+00:00", "EventTime": "2024-05-21T12:33:54.710956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUIZg498VbX9nQ5h2"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "85659026-0a34-412f-b4a4-743d057673df", "DetectTime": "2024-05-21T12:33:54.723240+00:00", "EventTime": "2024-05-21T12:33:54.723260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9m6w1kqM3xlFFTIi"], "accumulated_threat_level": 0.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "92d9259b-694a-4d3d-9b95-38adfaa9246b", "DetectTime": "2024-05-21T12:33:54.734196+00:00", "EventTime": "2024-05-21T12:33:54.734217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca99OHON4Ayb9K9De"], "accumulated_threat_level": 1.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "56959e07-7cbc-42e3-8229-d0e540a86071", "DetectTime": "2024-05-21T12:33:54.745473+00:00", "EventTime": "2024-05-21T12:33:54.745493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy42Rd4aoTo36CbMB5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 77} +{"Format": "IDEA0", "ID": "ce7d774a-8e5f-44f5-a6bd-c927e2e97a29", "DetectTime": "2024-05-21T12:33:54.891744+00:00", "EventTime": "2024-05-21T12:33:54.891765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKylL1K8Jlar4yOW"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "963014d7-e603-4e60-b99a-68837c13e643", "DetectTime": "2024-05-21T12:33:54.920780+00:00", "EventTime": "2024-05-21T12:33:54.920800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.157.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbxgi93pMwlctxsaB4"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "1d2c73e2-8bef-4899-892b-12db52daafbf", "DetectTime": "2024-05-21T12:33:54.933057+00:00", "EventTime": "2024-05-21T12:33:54.933080+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.157.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbxgi93pMwlctxsaB4"], "accumulated_threat_level": 12.200000000000001, "timewindow": 23} +{"Format": "Json", "ID": "1d2c73e2-8bef-4899-892b-12db52daafbf", "DetectTime": "2024-05-21T12:33:54.933057+00:00", "EventTime": "2024-05-21T12:33:54.933080+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.157.40"]}], "Attach": [{"Content": "1970-01-01T22:27:37.829031+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 23. (real time 2024/05/21 12:33:55.254812)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000001, "timewindow": 23, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000001} +{"Format": "IDEA0", "ID": "58742e9e-877f-475d-8b36-f3fcf27f29ea", "DetectTime": "2024-05-21T12:33:55.259640+00:00", "EventTime": "2024-05-21T12:33:55.259658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIGRa4ujIdk2ikDc4"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "b3f027c8-6be2-4e75-9963-3249a639c75f", "DetectTime": "2024-05-21T12:33:55.269203+00:00", "EventTime": "2024-05-21T12:33:55.269224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cumexu1IVcXAVIcvG3"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "0504fb5e-f80c-43d6-aef9-ca0895180c42", "DetectTime": "2024-05-21T12:33:55.273994+00:00", "EventTime": "2024-05-21T12:33:55.274012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CujuV74ycrzqTbvOh1"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "4a4b27b2-e6bc-4e60-9f34-3b303ef53498", "DetectTime": "2024-05-21T12:33:55.286339+00:00", "EventTime": "2024-05-21T12:33:55.286360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.152.219.188"]}], "Attach": [{"Content": "Connection to unknown destination port 6388/UDP destination IP 201.152.219.188. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj0kVOIAvv7xZdRh5"], "accumulated_threat_level": 3.2, "timewindow": 77} +{"Format": "IDEA0", "ID": "bc44ae9f-8247-4e7c-86ff-1d4c604d5673", "DetectTime": "2024-05-21T12:33:55.292401+00:00", "EventTime": "2024-05-21T12:33:55.292419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C77bqh2I2xNW9Mv6b1"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "566f13fb-811b-450d-87ea-7c1aaf036ca8", "DetectTime": "2024-05-21T12:33:55.296834+00:00", "EventTime": "2024-05-21T12:33:55.296853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVg3a6cGuWLihCPJa"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "39018638-7efd-45b0-974a-1661b9b6f92f", "DetectTime": "2024-05-21T12:33:55.301471+00:00", "EventTime": "2024-05-21T12:33:55.301490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C697en2EyxCzy89Rbb"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "30471fd8-14a4-4d4f-98c9-dd061471f21d", "DetectTime": "2024-05-21T12:33:55.320570+00:00", "EventTime": "2024-05-21T12:33:55.320588+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.3.38"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jFvH2N7KWddNSkAc"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "a022c18a-4910-4479-b25d-50a98fcbdd02", "DetectTime": "2024-05-21T12:33:55.335222+00:00", "EventTime": "2024-05-21T12:33:55.335243+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.3.38"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.3.38 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jFvH2N7KWddNSkAc"], "accumulated_threat_level": 0.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "e8fc5187-c2a7-44c2-a05b-697a68bf5db2", "DetectTime": "2024-05-21T12:33:55.340281+00:00", "EventTime": "2024-05-21T12:33:55.340301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMHBm1k4V73tzMoNc"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "120eb7da-dc67-4076-a45e-a31f35115c46", "DetectTime": "2024-05-21T12:33:55.352177+00:00", "EventTime": "2024-05-21T12:33:55.352197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrGTM2SUf8weCO3N9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0b6de56f-2ec1-4b4d-8b75-06092ee32cd0", "DetectTime": "2024-05-21T12:33:55.356738+00:00", "EventTime": "2024-05-21T12:33:55.356756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yfOY382zIlSWey3f"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "b477a235-e5e3-4d19-a1b7-1542ebc130d0", "DetectTime": "2024-05-21T12:33:55.361057+00:00", "EventTime": "2024-05-21T12:33:55.361075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5JapK1pVvI9f9bIDa"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "6c4626a9-fdb1-4d41-847f-38b798e80a5a", "DetectTime": "2024-05-21T12:33:55.633558+00:00", "EventTime": "2024-05-21T12:33:55.633579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBXmy4xO65zuwU8e9"], "accumulated_threat_level": 4.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "7d8dfa48-fb2c-428f-ab0b-62672df9a18a", "DetectTime": "2024-05-21T12:33:55.638567+00:00", "EventTime": "2024-05-21T12:33:55.638585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm420OYJehGM9cRs3"], "accumulated_threat_level": 4.8, "timewindow": 75} +{"Format": "IDEA0", "ID": "cab055cc-aeba-4add-88cc-7c3158674bcf", "DetectTime": "2024-05-21T12:33:55.696605+00:00", "EventTime": "2024-05-21T12:33:55.696630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPPis1f2mbMcArtC6"], "accumulated_threat_level": 5.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "49709106-107a-4ca1-8da9-f53080d88ce0", "DetectTime": "2024-05-21T12:33:55.747561+00:00", "EventTime": "2024-05-21T12:33:55.747582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ77o2kYWR6PLOYdh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 77} +{"Format": "IDEA0", "ID": "e98487f9-1499-45dc-ae91-4647c8b4c6fd", "DetectTime": "2024-05-21T12:33:55.784648+00:00", "EventTime": "2024-05-21T12:33:55.784667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cth5r91AwchdD22eQ4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "32a6ddc3-370b-4314-9ad6-28eda2a7357f", "DetectTime": "2024-05-21T12:33:55.825024+00:00", "EventTime": "2024-05-21T12:33:55.825043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOYJv1BQpq1Z5xIMb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "4f78b9fa-5d36-4cd4-bc69-a7024020fa3f", "DetectTime": "2024-05-21T12:33:55.920706+00:00", "EventTime": "2024-05-21T12:33:55.920729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwTzk93fTi5JLSpymk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "6b736cad-8553-44d5-9633-d9be258967ff", "DetectTime": "2024-05-21T12:33:56.284639+00:00", "EventTime": "2024-05-21T12:33:56.284659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COB8YN2ppMoNQZEX03"], "accumulated_threat_level": 9.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "fab93798-60ae-4f89-841a-9d04a58b8ba2", "DetectTime": "2024-05-21T12:33:56.556326+00:00", "EventTime": "2024-05-21T12:33:56.556347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1Sf9YHJ1vNY4tO", "CA3JI2FTvKdn7SVHc", "Cvvy2d4owIg8bHXAY5", "C63zuhuhjMUPQAfi8"], "accumulated_threat_level": 10.1, "timewindow": 77} +{"Format": "IDEA0", "ID": "f20d35c8-3997-4071-a303-2e28c5252cb9", "DetectTime": "2024-05-21T12:33:56.735927+00:00", "EventTime": "2024-05-21T12:33:56.735951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEA3nG1OGr7x3zF3i9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "86825f5a-da3a-4787-8716-903e6f185420", "DetectTime": "2024-05-21T12:33:56.770453+00:00", "EventTime": "2024-05-21T12:33:56.770474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.155.76.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGDb64GxbTy6NO1Mh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "9112dbc0-001d-4a74-966f-6d2647481f2c", "DetectTime": "2024-05-21T12:33:56.917901+00:00", "EventTime": "2024-05-21T12:33:56.917921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleElA1Vccvbh8h8l4"], "accumulated_threat_level": 10.9, "timewindow": 77} +{"Format": "IDEA0", "ID": "bb909996-b9cf-408c-814c-d32158590da1", "DetectTime": "2024-05-21T12:33:57.067757+00:00", "EventTime": "2024-05-21T12:33:57.067778+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKseQ2adDkTV57mV5"], "accumulated_threat_level": 10.924, "timewindow": 77} +{"Format": "IDEA0", "ID": "d415c77c-2946-4471-84ed-ab0715b891da", "DetectTime": "2024-05-21T12:33:57.144138+00:00", "EventTime": "2024-05-21T12:33:57.144159+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKseQ2adDkTV57mV5"], "accumulated_threat_level": 0, "timewindow": 77} +{"Format": "IDEA0", "ID": "78d514ca-b675-45dd-b0bf-bda699e760cb", "DetectTime": "2024-05-21T12:33:57.158964+00:00", "EventTime": "2024-05-21T12:33:57.158985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.251.242.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaD0b74Ks7M1Kw7MSe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "a0baffce-e4b1-4e62-b2af-25552b1f3ca9", "DetectTime": "2024-05-21T12:33:57.325786+00:00", "EventTime": "2024-05-21T12:33:57.325804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RTtw12K0HLX4kLvf"], "accumulated_threat_level": 11.724, "timewindow": 77} +{"Format": "IDEA0", "ID": "91ee3b8d-90db-4124-8e87-d82bf57ccb25", "DetectTime": "2024-05-21T12:33:57.377361+00:00", "EventTime": "2024-05-21T12:33:57.377380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdswn64zAfnBEy9aA3"], "accumulated_threat_level": 12.524000000000001, "timewindow": 77} +{"Format": "Json", "ID": "91ee3b8d-90db-4124-8e87-d82bf57ccb25", "DetectTime": "2024-05-21T12:33:57.377361+00:00", "EventTime": "2024-05-21T12:33:57.377380+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-04T04:42:40.467335+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2024/05/21 12:33:57.578849)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000001, "timewindow": 77, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000001} +{"Format": "IDEA0", "ID": "e158e6b3-bf4c-4aa6-85a4-fb4e0bcb80ff", "DetectTime": "2024-05-21T12:33:57.589079+00:00", "EventTime": "2024-05-21T12:33:57.589097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrXNv31bbpCwpCqG3"], "accumulated_threat_level": 0.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "93f4e88c-4484-4de9-af62-86df45f5674d", "DetectTime": "2024-05-21T12:33:57.600219+00:00", "EventTime": "2024-05-21T12:33:57.600239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50IDA3v94FMa5yx2b"], "accumulated_threat_level": 1.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "bc13bc60-424d-4a5d-8aa4-a6717c8327f7", "DetectTime": "2024-05-21T12:33:57.639864+00:00", "EventTime": "2024-05-21T12:33:57.639883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHnT61sOnf5ahYp0l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 77} +{"Format": "IDEA0", "ID": "82b8c128-d80a-480a-ad1e-cf3e7b04acde", "DetectTime": "2024-05-21T12:33:57.666997+00:00", "EventTime": "2024-05-21T12:33:57.667019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.49.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCfu52aVvqGueIbhb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "722fdb6a-6276-4ccc-87e6-84eda5008e1f", "DetectTime": "2024-05-21T12:33:57.708230+00:00", "EventTime": "2024-05-21T12:33:57.708249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMaxYs31dYV1zha9Ac"], "accumulated_threat_level": 3.2, "timewindow": 77} +{"Format": "IDEA0", "ID": "2d37120d-a25b-4501-8463-b05e52cb65cd", "DetectTime": "2024-05-21T12:33:57.730418+00:00", "EventTime": "2024-05-21T12:33:57.730440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIyQ1PDeAVZqhFDlh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "5e2b183e-fdc0-4e62-8c3c-adf490d9e4df", "DetectTime": "2024-05-21T12:33:57.771325+00:00", "EventTime": "2024-05-21T12:33:57.771345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUL6U012MxfQLKPYMe"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "34a5f0f5-ca39-41c8-a30b-7f6648c4a28e", "DetectTime": "2024-05-21T12:33:57.792728+00:00", "EventTime": "2024-05-21T12:33:57.792751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RX6EaNJPZbSIZU"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "a2b6d941-b7c6-4347-be1e-ebb1b4943ade", "DetectTime": "2024-05-21T12:33:58.045781+00:00", "EventTime": "2024-05-21T12:33:58.045800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZk2db3IcP5iv1oZfc"], "accumulated_threat_level": 4.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "ece26739-d73f-446c-aacd-a81188a9ee38", "DetectTime": "2024-05-21T12:33:58.059072+00:00", "EventTime": "2024-05-21T12:33:58.059090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHAvlz1zjK7sj6VaK"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "a9bacb18-6850-4d5f-a468-f5fb2634a149", "DetectTime": "2024-05-21T12:33:58.096535+00:00", "EventTime": "2024-05-21T12:33:58.096556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTdxlZXbsBEG7gf3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "c24f8142-93fb-4696-af55-5ab474458c73", "DetectTime": "2024-05-21T12:33:58.107451+00:00", "EventTime": "2024-05-21T12:33:58.107468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53C4zKP9q8A6rl7f"], "accumulated_threat_level": 5.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "79fb4fd1-74ac-4fd0-bcc4-6293ed83d16a", "DetectTime": "2024-05-21T12:33:58.375603+00:00", "EventTime": "2024-05-21T12:33:58.375624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C329bm37IqzuWDZULc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "31daec71-38a8-4096-91e8-971022527a38", "DetectTime": "2024-05-21T12:33:58.406782+00:00", "EventTime": "2024-05-21T12:33:58.406802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8zgY2QNbM7sBDo6l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 77} +{"Format": "IDEA0", "ID": "29b33f5f-b747-4f19-ae60-3d18fdc13077", "DetectTime": "2024-05-21T12:33:58.435871+00:00", "EventTime": "2024-05-21T12:33:58.435892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYAUsT3z5Sfxd3CC4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "e1e435aa-20cc-462e-9c52-8c814d1ebaf8", "DetectTime": "2024-05-21T12:33:58.469602+00:00", "EventTime": "2024-05-21T12:33:58.469622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwI4LO2nYktjgXfeRj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "ce4e8992-b7e1-48cf-86c3-b9b9c7a80de0", "DetectTime": "2024-05-21T12:33:58.494074+00:00", "EventTime": "2024-05-21T12:33:58.494095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA1Gpz2Bd5xT8uJFW7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "afa6985a-30ad-4611-b701-46c4ca1143e2", "DetectTime": "2024-05-21T12:33:58.529570+00:00", "EventTime": "2024-05-21T12:33:58.529591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdAmWhsG2Uukn4l4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "80554e3c-490f-4bcc-95ea-e254a3ce25d7", "DetectTime": "2024-05-21T12:33:58.560713+00:00", "EventTime": "2024-05-21T12:33:58.560731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPK4f64Et2qZDhWy31"], "accumulated_threat_level": 7.999999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "f5802ad3-6464-4f42-b1fa-98410e78f0f4", "DetectTime": "2024-05-21T12:33:58.588889+00:00", "EventTime": "2024-05-21T12:33:58.588908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTVMmlWEcfxCgFGqb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "03b75be0-c0e0-40ba-ac89-79b184bcbb8b", "DetectTime": "2024-05-21T12:33:58.621306+00:00", "EventTime": "2024-05-21T12:33:58.621325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdI3cVnvBHw2N8dyd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "e0007b83-087a-427a-bd27-1c9c8158f30b", "DetectTime": "2024-05-21T12:33:58.647756+00:00", "EventTime": "2024-05-21T12:33:58.647777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClaLCG3qaCVLtlGjGk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "473f668c-a7bb-4d9e-a838-27c1cdf64c6f", "DetectTime": "2024-05-21T12:33:58.690203+00:00", "EventTime": "2024-05-21T12:33:58.690222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cchym94DlvMSZePX51"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "044b5bf0-f2b1-43d3-8cfc-f360bbe13dda", "DetectTime": "2024-05-21T12:33:58.702622+00:00", "EventTime": "2024-05-21T12:33:58.702640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cusvpf4UTZ8dc0RhTa"], "accumulated_threat_level": 9.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "099e3347-d7be-45dd-af89-0322d9206aa5", "DetectTime": "2024-05-21T12:33:58.764756+00:00", "EventTime": "2024-05-21T12:33:58.764776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ1e9Jw2TdRqCHtO8"], "accumulated_threat_level": 10.4, "timewindow": 77} +{"Format": "IDEA0", "ID": "363d9c27-ff06-45e8-8e75-8c3c2ad18c7e", "DetectTime": "2024-05-21T12:33:58.974481+00:00", "EventTime": "2024-05-21T12:33:58.974510+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.30.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlnYd6fzCDS9Pkc3"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "cded0dbd-5b31-4fa3-821c-0f768ff27c89", "DetectTime": "2024-05-21T12:33:58.988880+00:00", "EventTime": "2024-05-21T12:33:58.988902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.30.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.30.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlnYd6fzCDS9Pkc3"], "accumulated_threat_level": 1.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "bacf0994-9e22-4478-8f49-8a830cfcf44e", "DetectTime": "2024-05-21T12:33:59.062565+00:00", "EventTime": "2024-05-21T12:33:59.062585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBRvN51MQVPShlBceg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 77} +{"Format": "IDEA0", "ID": "1c5a78db-4b82-426a-ab1c-df4814e56d5a", "DetectTime": "2024-05-21T12:33:59.081147+00:00", "EventTime": "2024-05-21T12:33:59.081167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH8OgGxerQuqaqUkg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "28be4b30-0975-40c8-bbd5-566ad907bfc6", "DetectTime": "2024-05-21T12:33:59.129294+00:00", "EventTime": "2024-05-21T12:33:59.129314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCAo0l2pMrtJG3W5Mg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 77} +{"Format": "Json", "ID": "28be4b30-0975-40c8-bbd5-566ad907bfc6", "DetectTime": "2024-05-21T12:33:59.129294+00:00", "EventTime": "2024-05-21T12:33:59.129314+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-04T04:42:05.353809+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2024/05/21 12:33:59.329795)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 77, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "112f514e-f105-4e09-a480-dda01e03c527", "DetectTime": "2024-05-21T12:33:59.334750+00:00", "EventTime": "2024-05-21T12:33:59.334768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8gtl38mBs1JIjHWk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "a88de158-e8a8-46da-b6e7-cb722906675a", "DetectTime": "2024-05-21T12:33:59.339535+00:00", "EventTime": "2024-05-21T12:33:59.339555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszpMCaYe7jsgCJ64"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ce2636a5-a1ed-4735-a4d1-32115d2e1c62", "DetectTime": "2024-05-21T12:33:59.351635+00:00", "EventTime": "2024-05-21T12:33:59.351655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSahgO13pg8mIxCdy2"], "accumulated_threat_level": 0.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "3c234d48-556e-4ea3-a01a-26dd596f9e20", "DetectTime": "2024-05-21T12:33:59.356511+00:00", "EventTime": "2024-05-21T12:33:59.356530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MjTm1vhLOYN6lmok"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "63d6c92e-4566-4acf-829d-6832b92fb9a5", "DetectTime": "2024-05-21T12:33:59.361806+00:00", "EventTime": "2024-05-21T12:33:59.361825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4h8x1EmGbFynP934"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "0c05daed-6cd0-4fb9-9984-25cca93994ba", "DetectTime": "2024-05-21T12:33:59.367017+00:00", "EventTime": "2024-05-21T12:33:59.367034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbkpkl4BoNbWvCfg0c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "40393e71-4421-473c-b9ab-8b2148df655b", "DetectTime": "2024-05-21T12:33:59.377913+00:00", "EventTime": "2024-05-21T12:33:59.377931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrvW5Z1ED6zOs9GIBf"], "accumulated_threat_level": 1.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "afd08e3d-78f9-4b03-bdbf-5b20c714d976", "DetectTime": "2024-05-21T12:33:59.382431+00:00", "EventTime": "2024-05-21T12:33:59.382449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRK5if4aO4uiibISqh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "5370f1c5-278a-4aa9-8e36-9f2f8bf0c46b", "DetectTime": "2024-05-21T12:33:59.413207+00:00", "EventTime": "2024-05-21T12:33:59.413229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsgGjf298RViAzHicj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 77} +{"Format": "IDEA0", "ID": "c3288597-eaae-46d5-a5e6-9596968c042c", "DetectTime": "2024-05-21T12:33:59.661316+00:00", "EventTime": "2024-05-21T12:33:59.661337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9N3OpuhYxVK0kmzi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ea59554d-cd96-4ff8-8eaa-3d8fe290b711", "DetectTime": "2024-05-21T12:33:59.705119+00:00", "EventTime": "2024-05-21T12:33:59.705140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vx2B2N8Mx5LW3rf"], "accumulated_threat_level": 3.2, "timewindow": 77} +{"Format": "IDEA0", "ID": "6041037e-02a2-43ab-9b25-821405da500b", "DetectTime": "2024-05-21T12:33:59.725688+00:00", "EventTime": "2024-05-21T12:33:59.725708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1asRsVLovN0gaxB1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "28b37e03-1d71-4055-b4e5-bf8c50643607", "DetectTime": "2024-05-21T12:33:59.770249+00:00", "EventTime": "2024-05-21T12:33:59.770271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4p7mJ3CnhhC9vAzYd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "f256779b-16a9-4083-9dc4-bd3db8024774", "DetectTime": "2024-05-21T12:33:59.775294+00:00", "EventTime": "2024-05-21T12:33:59.775312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTejih4NAzXLnSQtDb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "8544a9a7-fe41-4b30-ba3a-253af47a2ea5", "DetectTime": "2024-05-21T12:33:59.885881+00:00", "EventTime": "2024-05-21T12:33:59.885904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyz0J21BbBo2XzGx7h"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "f9cc7a3d-9cac-45c1-90a1-2bb4d7ed80b7", "DetectTime": "2024-05-21T12:33:59.906342+00:00", "EventTime": "2024-05-21T12:33:59.906362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fdfo1LXivs2ehhPg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "59cbb2c4-a323-4fa3-8705-2f45cd24a9dd", "DetectTime": "2024-05-21T12:33:59.933758+00:00", "EventTime": "2024-05-21T12:33:59.933776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChYljB3VlB9JnDBpz7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "e580eea7-6410-4ac2-a86e-fe6412c47041", "DetectTime": "2024-05-21T12:33:59.938258+00:00", "EventTime": "2024-05-21T12:33:59.938275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMF18v1dcbMvzYkRV6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "4463adcf-94d5-43d8-8298-6ac92da6bd94", "DetectTime": "2024-05-21T12:33:59.992889+00:00", "EventTime": "2024-05-21T12:33:59.992908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmTyF2h3iPA4iURUe"], "accumulated_threat_level": 4.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "d505a3d4-fb53-48eb-ac4d-fe5250b46558", "DetectTime": "2024-05-21T12:34:00.026565+00:00", "EventTime": "2024-05-21T12:34:00.026584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTh8C1QKNrHZedsV3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ba0c7cad-d524-4b50-84fa-34bb7f403cd6", "DetectTime": "2024-05-21T12:34:00.031715+00:00", "EventTime": "2024-05-21T12:34:00.031734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyDBAtYp48vyrMHCa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "aed016bc-0016-404f-bd1a-8a3c6f4bf62a", "DetectTime": "2024-05-21T12:34:00.192974+00:00", "EventTime": "2024-05-21T12:34:00.192997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czebfy2LqaNcSKwZ7c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "9a706709-c3c8-4ed3-b07a-fc397ae6f540", "DetectTime": "2024-05-21T12:34:00.439838+00:00", "EventTime": "2024-05-21T12:34:00.439858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cta16G4V8EnmRvDgk3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "817b9260-603f-4ffa-b3f8-ac103fdb0777", "DetectTime": "2024-05-21T12:34:00.485930+00:00", "EventTime": "2024-05-21T12:34:00.485948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrBfn3WItOLD88GZb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "51bdc9ff-81de-4d75-8e30-b9763c26cec3", "DetectTime": "2024-05-21T12:34:00.519372+00:00", "EventTime": "2024-05-21T12:34:00.519393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HTXh3JYPNbTWxO4"], "accumulated_threat_level": 5.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "04c15858-fb20-4161-b5a1-97db248dae86", "DetectTime": "2024-05-21T12:34:00.633054+00:00", "EventTime": "2024-05-21T12:34:00.633073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7ayw2PxdbrqjGc7e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 77} +{"Format": "IDEA0", "ID": "0bb6bf65-e126-4fd4-8916-3d51c367e130", "DetectTime": "2024-05-21T12:34:00.649153+00:00", "EventTime": "2024-05-21T12:34:00.649172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wgxy4fHbeCfZ56s6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "f3e38d3c-27ad-400b-9e39-8ba5163ef76b", "DetectTime": "2024-05-21T12:34:00.777867+00:00", "EventTime": "2024-05-21T12:34:00.777888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 18246/UDP destination IP 181.64.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiesP33oWdl2LsuUma"], "accumulated_threat_level": 7.199999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "0317aad3-2c72-4761-9935-71421101307a", "DetectTime": "2024-05-21T12:34:00.805072+00:00", "EventTime": "2024-05-21T12:34:00.805091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhZKmTTxQE6U2l2l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "422d6e2e-b0e7-43e6-affe-8e2a06997135", "DetectTime": "2024-05-21T12:34:00.875964+00:00", "EventTime": "2024-05-21T12:34:00.875989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcnI3c4D0dHYb1MfAj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "390b6a25-6273-419c-b236-3327d182dbd4", "DetectTime": "2024-05-21T12:34:00.924447+00:00", "EventTime": "2024-05-21T12:34:00.924466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6BOh2dLUMqE9qi4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 77} +{"Format": "IDEA0", "ID": "f8ca1c63-2320-4253-a18e-e4efe3a1728c", "DetectTime": "2024-05-21T12:34:01.065784+00:00", "EventTime": "2024-05-21T12:34:01.065807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hG1Z1SjXwS6DSB44"], "accumulated_threat_level": 9.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "dab5d802-0e13-4a5d-b456-3ca4c30c8152", "DetectTime": "2024-05-21T12:34:01.268411+00:00", "EventTime": "2024-05-21T12:34:01.268434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.88.250.25"]}], "Attach": [{"Content": "Connection to unknown destination port 9794/UDP destination IP 74.88.250.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1D1C2pA4pSgK2P4e"], "accumulated_threat_level": 10.4, "timewindow": 77} +{"Format": "IDEA0", "ID": "e44857e2-6724-4f77-8c54-e6f9e68ec104", "DetectTime": "2024-05-21T12:34:01.374609+00:00", "EventTime": "2024-05-21T12:34:01.374627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQ5dL31GAooymHtsb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "b3fb0372-6e1a-4528-a5aa-084502cae93d", "DetectTime": "2024-05-21T12:34:01.871343+00:00", "EventTime": "2024-05-21T12:34:01.871364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckr8LNu5zPDLC4535"], "accumulated_threat_level": 11.200000000000001, "timewindow": 77} +{"Format": "IDEA0", "ID": "9bc331ba-0013-465b-86de-acbc9b0d33b3", "DetectTime": "2024-05-21T12:34:01.981499+00:00", "EventTime": "2024-05-21T12:34:01.981519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7FhMX3TdVksWzBYz1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 77} +{"Format": "Json", "ID": "9bc331ba-0013-465b-86de-acbc9b0d33b3", "DetectTime": "2024-05-21T12:34:01.981499+00:00", "EventTime": "2024-05-21T12:34:01.981519+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "1970-01-04T04:46:11.553457+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 77. (real time 2024/05/21 12:34:02.208080)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 77, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "630f08dd-e78b-4fc2-8722-34627bf5eff6", "DetectTime": "2024-05-21T12:34:02.220361+00:00", "EventTime": "2024-05-21T12:34:02.220383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.177.244"]}], "Attach": [{"Content": "Connection to unknown destination port 3057/UDP destination IP 60.164.177.244. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3bTVI1BvZTbGc0AFb"], "accumulated_threat_level": 0.8, "timewindow": 77} +{"Format": "IDEA0", "ID": "1419695e-a579-4de8-a9b9-f14a3ed9120d", "DetectTime": "2024-05-21T12:34:02.251026+00:00", "EventTime": "2024-05-21T12:34:02.251044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJl4Tw3aRl0UuwX2ti"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ac78f11f-7a5f-4e27-bd5d-8983d538cc0d", "DetectTime": "2024-05-21T12:34:02.280080+00:00", "EventTime": "2024-05-21T12:34:02.280101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjrxc3wh8ArFStgL7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ced7ce2f-d1e7-44c0-930e-417296211c35", "DetectTime": "2024-05-21T12:34:02.364676+00:00", "EventTime": "2024-05-21T12:34:02.364696+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbupED1dHecAive9Uf"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "8e4e40b4-5699-4ffb-97a0-1141b1faf53b", "DetectTime": "2024-05-21T12:34:02.375674+00:00", "EventTime": "2024-05-21T12:34:02.375693+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbupED1dHecAive9Uf"], "accumulated_threat_level": 1.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "ae25bb51-f6a1-4f81-8881-e32ae99811ea", "DetectTime": "2024-05-21T12:34:02.393361+00:00", "EventTime": "2024-05-21T12:34:02.393381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4cAekmjuAhHSYV8"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "e2b620ad-d906-4bec-9953-db84e1db3396", "DetectTime": "2024-05-21T12:34:02.405375+00:00", "EventTime": "2024-05-21T12:34:02.405395+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4cAekmjuAhHSYV8"], "accumulated_threat_level": 2.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "5bd1a583-fb8e-4a91-a001-ece91f950f6c", "DetectTime": "2024-05-21T12:34:02.445110+00:00", "EventTime": "2024-05-21T12:34:02.445130+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoFSg4WaUph2emtb4"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "0fd40ee2-13fd-41ed-a943-c80e10658f6e", "DetectTime": "2024-05-21T12:34:02.457385+00:00", "EventTime": "2024-05-21T12:34:02.457404+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoFSg4WaUph2emtb4"], "accumulated_threat_level": 2.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "73b019df-743d-492d-8b9b-ba100cd2b93f", "DetectTime": "2024-05-21T12:34:02.470630+00:00", "EventTime": "2024-05-21T12:34:02.470650+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co75FQ1KywTKDaojsk"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "c8c91c1d-1063-4846-9b6b-28f4ad583860", "DetectTime": "2024-05-21T12:34:02.481725+00:00", "EventTime": "2024-05-21T12:34:02.481744+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co75FQ1KywTKDaojsk"], "accumulated_threat_level": 3.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "cde44181-ef4b-4cd7-a265-bcb3b6aa2c12", "DetectTime": "2024-05-21T12:34:02.499433+00:00", "EventTime": "2024-05-21T12:34:02.499455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBd70N1HaFPI7P4rC6"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "f64e5a93-e80b-4ebc-a523-23d5b4239c6d", "DetectTime": "2024-05-21T12:34:02.510528+00:00", "EventTime": "2024-05-21T12:34:02.510548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBd70N1HaFPI7P4rC6"], "accumulated_threat_level": 3.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "9974467f-327d-494b-90d3-0c18dd3f6aa6", "DetectTime": "2024-05-21T12:34:02.515232+00:00", "EventTime": "2024-05-21T12:34:02.515251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.29.186.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9GD63yqlUUGFkRBk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "8bcfa105-4386-4352-a796-38cd61d75019", "DetectTime": "2024-05-21T12:34:02.564777+00:00", "EventTime": "2024-05-21T12:34:02.564794+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvYnp3gyspcM133S6"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "6a1260a5-0de0-4b38-add7-7f2529d455b1", "DetectTime": "2024-05-21T12:34:02.577477+00:00", "EventTime": "2024-05-21T12:34:02.577498+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvYnp3gyspcM133S6"], "accumulated_threat_level": 4.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "32ef914f-190e-431c-91da-ebad925c3c61", "DetectTime": "2024-05-21T12:34:02.613328+00:00", "EventTime": "2024-05-21T12:34:02.613347+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTilg41bXHLljg78k"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "bfce6b87-16ca-4488-98d0-02aaf2f78eb0", "DetectTime": "2024-05-21T12:34:02.624950+00:00", "EventTime": "2024-05-21T12:34:02.624969+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTilg41bXHLljg78k"], "accumulated_threat_level": 4.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "ed5f1578-2f44-4484-bb06-375f9bf19fdc", "DetectTime": "2024-05-21T12:34:02.641433+00:00", "EventTime": "2024-05-21T12:34:02.641451+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7Y1U1dMfiAVKtkV3"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "2cc64175-49b7-4f45-98fe-aaf893171776", "DetectTime": "2024-05-21T12:34:02.654086+00:00", "EventTime": "2024-05-21T12:34:02.654106+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN7Y1U1dMfiAVKtkV3"], "accumulated_threat_level": 5.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "a91cb17b-b782-4fae-8ca7-6cf5da263782", "DetectTime": "2024-05-21T12:34:02.847405+00:00", "EventTime": "2024-05-21T12:34:02.847425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfxT51nNvyFqIEqTl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "7b1d2aae-380a-4a0e-b27d-2b79a7a25a24", "DetectTime": "2024-05-21T12:34:02.890247+00:00", "EventTime": "2024-05-21T12:34:02.890269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7LJtIqU9tf9YPs7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "315bd55a-f554-42e5-9587-12a0d301a30a", "DetectTime": "2024-05-21T12:34:02.924197+00:00", "EventTime": "2024-05-21T12:34:02.924219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbiGLCVGlYwry5ks9"], "accumulated_threat_level": 1.6, "timewindow": 77} +{"Format": "IDEA0", "ID": "5e2a75b0-cdc6-4b55-af50-eb8e88d87d06", "DetectTime": "2024-05-21T12:34:02.973833+00:00", "EventTime": "2024-05-21T12:34:02.973851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.198"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCzA24j77QisOhLs4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 77} +{"Format": "IDEA0", "ID": "c2683a0e-e9bb-4557-b16b-7bcafbf8673f", "DetectTime": "2024-05-21T12:34:03.128276+00:00", "EventTime": "2024-05-21T12:34:03.128295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvf124ZVfGamDRZqj"], "accumulated_threat_level": 3.2, "timewindow": 77} +{"Format": "IDEA0", "ID": "3cc84da8-ba80-4d50-b65d-bd7e970e5806", "DetectTime": "2024-05-21T12:34:03.177737+00:00", "EventTime": "2024-05-21T12:34:03.177756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.113.195"]}], "Attach": [{"Content": "Connection to unknown destination port 11677/UDP destination IP 36.83.113.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsQir30ydNgvJYBl9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c1be3d92-a795-49cf-86b4-31f08dcd8468", "DetectTime": "2024-05-21T12:34:03.221491+00:00", "EventTime": "2024-05-21T12:34:03.221513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQmHiEKbosLOVGL"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "d5048ba1-6112-446f-bd2b-33e2cbe57e39", "DetectTime": "2024-05-21T12:34:03.481980+00:00", "EventTime": "2024-05-21T12:34:03.482000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82EYfHZtINXB4GW"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "a2a6eabd-de6c-4a2b-94d3-45fa3837b240", "DetectTime": "2024-05-21T12:34:03.486722+00:00", "EventTime": "2024-05-21T12:34:03.486741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cak8nc2crSA8bYbup4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "8dce400e-1766-420e-83bf-91bdb483840f", "DetectTime": "2024-05-21T12:34:03.632683+00:00", "EventTime": "2024-05-21T12:34:03.632705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUZZq9iNcXSie6q2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "93b0b539-6ffe-4e94-bd2a-cb5444a6c8f9", "DetectTime": "2024-05-21T12:34:03.665912+00:00", "EventTime": "2024-05-21T12:34:03.665935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCOPa4hHROYzKbk05"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "8864bfec-289a-47fc-a305-49769f28e61a", "DetectTime": "2024-05-21T12:34:03.706095+00:00", "EventTime": "2024-05-21T12:34:03.706117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jX4U2MVZldWfvql"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "15a3e362-b4a4-4323-93c2-9c2c02184a23", "DetectTime": "2024-05-21T12:34:03.738329+00:00", "EventTime": "2024-05-21T12:34:03.738351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cliq5O1DXNuwFHMT45"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "90d21885-8067-48bb-9658-375f283a921b", "DetectTime": "2024-05-21T12:34:03.815902+00:00", "EventTime": "2024-05-21T12:34:03.815922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoH1vs23ZyIXtQpdDj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "fe166856-45c2-4495-9edd-f71e537d40db", "DetectTime": "2024-05-21T12:34:03.847061+00:00", "EventTime": "2024-05-21T12:34:03.847079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzPKy4lJbxQKQzvV7"], "accumulated_threat_level": 0.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "97cfc79a-bcf5-4318-8c96-7bdc345c58ac", "DetectTime": "2024-05-21T12:34:03.873378+00:00", "EventTime": "2024-05-21T12:34:03.873399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQQaT2AoBQoQdVeUb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "0081e633-820f-4d6b-8666-553dc166f334", "DetectTime": "2024-05-21T12:34:03.903908+00:00", "EventTime": "2024-05-21T12:34:03.903929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLp5sY178ePF3fpkAg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "f3a18bd7-b951-4709-b180-a45d6cec9132", "DetectTime": "2024-05-21T12:34:03.949514+00:00", "EventTime": "2024-05-21T12:34:03.949535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZg3d2qO8zwUnvPFh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "f338ee8c-8efe-445a-b200-6d90f5dc507b", "DetectTime": "2024-05-21T12:34:04.031718+00:00", "EventTime": "2024-05-21T12:34:04.031737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C671Li3VjlSsIrvBH5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "c5d5391f-fc90-463f-9912-fc1541deb657", "DetectTime": "2024-05-21T12:34:04.313149+00:00", "EventTime": "2024-05-21T12:34:04.313169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoqQP1xjYkl40ifce"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "b9cd8d87-9215-41b1-83a5-7b30be751572", "DetectTime": "2024-05-21T12:34:04.318029+00:00", "EventTime": "2024-05-21T12:34:04.318049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIaTw4FFQ2tLfB1qf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "7c4203ea-e6a5-482b-bcd4-1f3863952714", "DetectTime": "2024-05-21T12:34:04.323314+00:00", "EventTime": "2024-05-21T12:34:04.323334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSNM0726ElEW06uK75"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ed3c7141-2499-4955-9762-f88aecf29a97", "DetectTime": "2024-05-21T12:34:04.328095+00:00", "EventTime": "2024-05-21T12:34:04.328115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C07RW92uZSvy7qZ6Kc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "042df392-5f10-4720-a908-f3294dcc24c4", "DetectTime": "2024-05-21T12:34:04.462004+00:00", "EventTime": "2024-05-21T12:34:04.462024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMBDqO2WG4jjeQZm03"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "4176f476-94a5-47e3-9796-242c9a69742c", "DetectTime": "2024-05-21T12:34:04.548284+00:00", "EventTime": "2024-05-21T12:34:04.548308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nDGe22hjkoOQS40i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "ee9dbc51-f3aa-44c4-99f8-dd0138317967", "DetectTime": "2024-05-21T12:34:04.583582+00:00", "EventTime": "2024-05-21T12:34:04.583605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMUVO2GLDnaFY9PAd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "f4ec47d4-656a-4ea0-9fcb-98cf3824cca1", "DetectTime": "2024-05-21T12:34:04.692362+00:00", "EventTime": "2024-05-21T12:34:04.692382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqv2Hd3Z1Bfwloqq3f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "3bbae98b-548d-4c7e-90cc-f7c1b810d12d", "DetectTime": "2024-05-21T12:34:04.864036+00:00", "EventTime": "2024-05-21T12:34:04.864058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETVnv4RgcCPUd4bi2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "8d991748-cb03-4482-8804-b110009b26b2", "DetectTime": "2024-05-21T12:34:04.945034+00:00", "EventTime": "2024-05-21T12:34:04.945054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpqeek41uMXaZxD3wj", "CNFl2L3hVnWXspW0Hl", "CrkB7w4jojToCXazZ3", "CjQUEgsyW9ZG67Wzi"], "accumulated_threat_level": 1.3, "timewindow": 78} +{"Format": "IDEA0", "ID": "a4113f58-6115-4413-b0bd-e20a769a8770", "DetectTime": "2024-05-21T12:34:04.992702+00:00", "EventTime": "2024-05-21T12:34:04.992721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NUGK2z4aDkgv3oxc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "56cd2ae8-aa2c-4747-bc82-35f78d96ff60", "DetectTime": "2024-05-21T12:34:05.030784+00:00", "EventTime": "2024-05-21T12:34:05.030806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWvIO2YQN5t9bUYv9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "86317fe9-7650-47ee-859c-535914112722", "DetectTime": "2024-05-21T12:34:05.070312+00:00", "EventTime": "2024-05-21T12:34:05.070335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JyhR3xn7uXhTtVY6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "449cfa2a-48f9-408c-b815-5715f5c38b2b", "DetectTime": "2024-05-21T12:34:05.283284+00:00", "EventTime": "2024-05-21T12:34:05.283306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"]}], "Attach": [{"Content": "Connection to unknown destination port 27555/TCP destination IP 77.50.112.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGpDD2L9aYc3tObp5"], "accumulated_threat_level": 2.1, "timewindow": 78} +{"Format": "IDEA0", "ID": "d3b281bd-7913-4499-8f8c-0d4d65795b55", "DetectTime": "2024-05-21T12:34:05.607345+00:00", "EventTime": "2024-05-21T12:34:05.607366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO9U223MY5DqsSpyEa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "969d1bd6-1bcf-4f70-91b5-c08f1ab79ac9", "DetectTime": "2024-05-21T12:34:05.615073+00:00", "EventTime": "2024-05-21T12:34:05.615096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAQPl3ONJo9Z9aZqe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 76} +{"Format": "IDEA0", "ID": "cec8eef3-f8c5-4513-aac1-43b036240ca7", "DetectTime": "2024-05-21T12:34:05.667929+00:00", "EventTime": "2024-05-21T12:34:05.667947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6BnLDx5I3mfEboj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "daa45890-39cb-47f7-b38b-6a69d4a89fb2", "DetectTime": "2024-05-21T12:34:06.685683+00:00", "EventTime": "2024-05-21T12:34:06.685704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFZQy4TJpFSc23Ijj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "082bb798-8dcd-4b2b-a53d-8e55d1143dbe", "DetectTime": "2024-05-21T12:34:06.721414+00:00", "EventTime": "2024-05-21T12:34:06.721433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKgZ9H1OwVUvNVc6df"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c59bcc31-e223-4841-a225-3f5a79e7bd04", "DetectTime": "2024-05-21T12:34:06.875926+00:00", "EventTime": "2024-05-21T12:34:06.875943+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtGie3ERDO6uLrl2d"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "3f4d6615-9c90-4119-9d3e-9dc2c19c47f7", "DetectTime": "2024-05-21T12:34:06.887401+00:00", "EventTime": "2024-05-21T12:34:06.887419+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtGie3ERDO6uLrl2d"], "accumulated_threat_level": 5.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "813a5976-44dd-4a28-8f65-f3ee1717ae62", "DetectTime": "2024-05-21T12:34:06.928260+00:00", "EventTime": "2024-05-21T12:34:06.928280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck2ocXIkJ1XPLfOC7", "CaQtUB4UkILQK7xXOi", "C111VP2juDem3hHTd3", "COX1wE4Lb3jnmNn3cj"], "accumulated_threat_level": 2.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "804197b9-e0d5-4cc1-9dd2-7131d52ca44f", "DetectTime": "2024-05-21T12:34:07.037308+00:00", "EventTime": "2024-05-21T12:34:07.037329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.202.252.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyzcon1ITHlau71pcg"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "37e63acd-5564-4bc3-b426-fe7645855fb7", "DetectTime": "2024-05-21T12:34:07.065194+00:00", "EventTime": "2024-05-21T12:34:07.065215+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmKgN2j3y6mQ7SoKf"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "7240b5f3-d290-45b8-b3fd-dc631d48d3b8", "DetectTime": "2024-05-21T12:34:07.077948+00:00", "EventTime": "2024-05-21T12:34:07.077966+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmKgN2j3y6mQ7SoKf"], "accumulated_threat_level": 6.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "4531dade-6134-4e12-b0ad-651237a5d553", "DetectTime": "2024-05-21T12:34:07.277654+00:00", "EventTime": "2024-05-21T12:34:07.277672+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcecG92chiWaWhFpD5"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "0fb7cd1b-d921-4e41-9f6b-9bb5d6681cdc", "DetectTime": "2024-05-21T12:34:07.291192+00:00", "EventTime": "2024-05-21T12:34:07.291214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcecG92chiWaWhFpD5"], "accumulated_threat_level": 6.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "7d8f4817-caf2-4f95-b161-df3ec064c50a", "DetectTime": "2024-05-21T12:34:07.605399+00:00", "EventTime": "2024-05-21T12:34:07.605420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjurh1vwoAnaPHQ41"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a012474f-232b-4aa5-8534-5141c29a479f", "DetectTime": "2024-05-21T12:34:07.709906+00:00", "EventTime": "2024-05-21T12:34:07.709928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqGRq4r11MXsDuuZ5"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 78} +{"Format": "IDEA0", "ID": "1cf78e6f-cba1-4c5b-a33f-ebece46542ca", "DetectTime": "2024-05-21T12:34:07.766165+00:00", "EventTime": "2024-05-21T12:34:07.766183+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVtnL3RLk78bahgIb"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "31fdf3f7-15f1-41a6-8157-27139801cb12", "DetectTime": "2024-05-21T12:34:07.777391+00:00", "EventTime": "2024-05-21T12:34:07.777410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVtnL3RLk78bahgIb"], "accumulated_threat_level": 7.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "1b766e6c-9b9d-4aec-90f1-3d267deac053", "DetectTime": "2024-05-21T12:34:07.801439+00:00", "EventTime": "2024-05-21T12:34:07.801459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdUrp8NsvFiyfELl"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "afa866ef-2422-40ca-90c5-ffa0c172382b", "DetectTime": "2024-05-21T12:34:07.813131+00:00", "EventTime": "2024-05-21T12:34:07.813151+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdUrp8NsvFiyfELl"], "accumulated_threat_level": 7.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "3998ac46-7735-4f8b-9b61-18e2a46589e2", "DetectTime": "2024-05-21T12:34:07.955237+00:00", "EventTime": "2024-05-21T12:34:07.955259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggZ2kdqqySQppm94"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "074bddd9-0fe1-42eb-a1a0-4f2a70205f10", "DetectTime": "2024-05-21T12:34:08.107375+00:00", "EventTime": "2024-05-21T12:34:08.107396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIsTG3lvHmyQV4mU8"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a2649578-7183-4b17-adbb-30f4ed38fbb2", "DetectTime": "2024-05-21T12:34:08.148542+00:00", "EventTime": "2024-05-21T12:34:08.148561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ly76CJ7YUmZPe08"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "1bb277e6-b1a9-4753-8a16-37bd086473f1", "DetectTime": "2024-05-21T12:34:08.153075+00:00", "EventTime": "2024-05-21T12:34:08.153093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCGkAJ2879mvBf7O95"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "16f2fbc2-22c9-4f85-a07b-d0a0be8d13ca", "DetectTime": "2024-05-21T12:34:08.482610+00:00", "EventTime": "2024-05-21T12:34:08.482632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUftXi1ZUYF4TYQQ4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "45cf6b03-39b0-48d1-a1cc-43b107d3ebe7", "DetectTime": "2024-05-21T12:34:08.487777+00:00", "EventTime": "2024-05-21T12:34:08.487796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTP5YA3wXX1ZTb7mHl"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "f7f13e4f-f79b-44a1-b57d-911e7045b411", "DetectTime": "2024-05-21T12:34:08.492574+00:00", "EventTime": "2024-05-21T12:34:08.492592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggcTs2FNranNBgNg1"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5e22a57b-9fa7-4c9e-9584-a4e06dc19c04", "DetectTime": "2024-05-21T12:34:08.497126+00:00", "EventTime": "2024-05-21T12:34:08.497144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7VsDZl5mdjWGZre"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "21ea8f01-56b9-445b-996d-514420b01837", "DetectTime": "2024-05-21T12:34:08.501796+00:00", "EventTime": "2024-05-21T12:34:08.501814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1s47VrJfEjbAytE6"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "2686245f-5b2a-4749-952a-7f28e80d1584", "DetectTime": "2024-05-21T12:34:08.634373+00:00", "EventTime": "2024-05-21T12:34:08.634397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm5g052dLF1smuccs"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "4649404d-8217-4d7a-9d38-9c5618219d62", "DetectTime": "2024-05-21T12:34:08.686032+00:00", "EventTime": "2024-05-21T12:34:08.686050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C91YmHcpzKkxy5ep4"], "accumulated_threat_level": 4.2, "timewindow": 78} +{"Format": "IDEA0", "ID": "fa20e349-011d-4532-9ad2-2f33ec6b9ed8", "DetectTime": "2024-05-21T12:34:08.737035+00:00", "EventTime": "2024-05-21T12:34:08.737054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CudoOy1HTOh3O08ws4"], "accumulated_threat_level": 5.0, "timewindow": 78} +{"Format": "IDEA0", "ID": "b14572e3-4fb0-41a6-9b06-f67bddeebfba", "DetectTime": "2024-05-21T12:34:08.839514+00:00", "EventTime": "2024-05-21T12:34:08.839536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6gUe22zDZuXpaVhPl"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "8d6bb4c7-3e04-42e9-a573-230d1da45440", "DetectTime": "2024-05-21T12:34:08.908307+00:00", "EventTime": "2024-05-21T12:34:08.908327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6Ltv3mjdgROICJS5"], "accumulated_threat_level": 5.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "bc312fac-dd73-4ad6-a18e-3192c287de68", "DetectTime": "2024-05-21T12:34:08.957395+00:00", "EventTime": "2024-05-21T12:34:08.957415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3lFHv1oWDn2ZhniSl"], "accumulated_threat_level": 6.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "c6ef5610-41f7-4e7d-a3af-4d255773d9fc", "DetectTime": "2024-05-21T12:34:08.985953+00:00", "EventTime": "2024-05-21T12:34:08.985973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYbOB4Jrl765Q3w07"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "167abb3f-70f2-4475-bb5e-5601cb7477b7", "DetectTime": "2024-05-21T12:34:09.237710+00:00", "EventTime": "2024-05-21T12:34:09.237728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czw6ci3YFMNbYgmGRg"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 78} +{"Format": "IDEA0", "ID": "86cfdc80-bdbb-4e70-84a2-852ea5e60cdb", "DetectTime": "2024-05-21T12:34:09.275845+00:00", "EventTime": "2024-05-21T12:34:09.275864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQ4l3rgyqw4zyJYc"], "accumulated_threat_level": 8.2, "timewindow": 78} +{"Format": "IDEA0", "ID": "b3f5a779-7143-414d-b9aa-d7ceaba44a6c", "DetectTime": "2024-05-21T12:34:09.316562+00:00", "EventTime": "2024-05-21T12:34:09.316579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgFl04RZmM71dcSxd"], "accumulated_threat_level": 9.0, "timewindow": 78} +{"Format": "IDEA0", "ID": "c731adbd-015f-47a8-b049-9133ab29dbab", "DetectTime": "2024-05-21T12:34:09.346800+00:00", "EventTime": "2024-05-21T12:34:09.346819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGdJo42f9y3Y6rDIl"], "accumulated_threat_level": 9.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "89c10861-30e7-45fe-b78c-ad21526cc964", "DetectTime": "2024-05-21T12:34:09.372634+00:00", "EventTime": "2024-05-21T12:34:09.372657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfF3JH1XDGEDZpy3Ef"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "4c302edf-8cc7-4d9f-b092-adb18c556d1e", "DetectTime": "2024-05-21T12:34:09.401124+00:00", "EventTime": "2024-05-21T12:34:09.401142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWYe92brS8VZQ0aV1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 78} +{"Format": "IDEA0", "ID": "732f6f11-418e-4c8f-ad9a-cda54b74829a", "DetectTime": "2024-05-21T12:34:09.449544+00:00", "EventTime": "2024-05-21T12:34:09.449569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYSjQrPRMVEp5N8d"], "accumulated_threat_level": 11.400000000000002, "timewindow": 78} +{"Format": "IDEA0", "ID": "a7e0922d-dadd-4adf-9b71-dc0436ee8fdf", "DetectTime": "2024-05-21T12:34:09.499535+00:00", "EventTime": "2024-05-21T12:34:09.499553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ToJc41YFGvkHksb9"], "accumulated_threat_level": 12.200000000000003, "timewindow": 78} +{"Format": "Json", "ID": "a7e0922d-dadd-4adf-9b71-dc0436ee8fdf", "DetectTime": "2024-05-21T12:34:09.499535+00:00", "EventTime": "2024-05-21T12:34:09.499553+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-04T05:17:38.111020+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2024/05/21 12:34:09.738540)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 78, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "e56e50ac-bd6d-4175-b2de-ff8068a84b83", "DetectTime": "2024-05-21T12:34:09.742576+00:00", "EventTime": "2024-05-21T12:34:09.742596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGcjwc5hIw1E2NQ1"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c0806e20-2d4c-4e20-8e36-c466396027c1", "DetectTime": "2024-05-21T12:34:09.755415+00:00", "EventTime": "2024-05-21T12:34:09.755438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2QMny2qN6JOJNews5"], "accumulated_threat_level": 0.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "3b3eed5a-62e4-432a-9f91-b95226ea5a89", "DetectTime": "2024-05-21T12:34:09.760210+00:00", "EventTime": "2024-05-21T12:34:09.760227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9m6w1kqM3xlFFTIi"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0ed35d89-4864-43af-9ddc-4ae800beaa3d", "DetectTime": "2024-05-21T12:34:09.764391+00:00", "EventTime": "2024-05-21T12:34:09.764408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca99OHON4Ayb9K9De"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "ae5f64f6-4e63-40d0-8928-386f7db7dd47", "DetectTime": "2024-05-21T12:34:09.777588+00:00", "EventTime": "2024-05-21T12:34:09.777608+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAoBy2eDAodRiiCgc"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "495fa941-78c2-41d5-8b1d-aa32e1ac4c80", "DetectTime": "2024-05-21T12:34:09.790059+00:00", "EventTime": "2024-05-21T12:34:09.790079+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAoBy2eDAodRiiCgc"], "accumulated_threat_level": 8.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "76f19a17-82d6-4091-ad6b-cc394ffc0948", "DetectTime": "2024-05-21T12:34:09.802891+00:00", "EventTime": "2024-05-21T12:34:09.802911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFk4YF3kD5T3VcYIlf"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "c437214c-bfe5-477b-9e67-1019a9e30b80", "DetectTime": "2024-05-21T12:34:09.815554+00:00", "EventTime": "2024-05-21T12:34:09.815574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFk4YF3kD5T3VcYIlf"], "accumulated_threat_level": 8.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "85ebad11-d27f-454e-92eb-c61aa3997139", "DetectTime": "2024-05-21T12:34:09.827385+00:00", "EventTime": "2024-05-21T12:34:09.827405+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48gPc2UTo27Oashj6"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "e64b533c-576e-4677-be6f-bc0971c0fbde", "DetectTime": "2024-05-21T12:34:09.839547+00:00", "EventTime": "2024-05-21T12:34:09.839565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48gPc2UTo27Oashj6"], "accumulated_threat_level": 9.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "0b107088-d3ce-4aa7-a29a-56f0ea196de8", "DetectTime": "2024-05-21T12:34:09.850956+00:00", "EventTime": "2024-05-21T12:34:09.850974+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgBWB1uxS51iq6kIh"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "a167b44b-6da3-4f65-99d8-54b05b60aba6", "DetectTime": "2024-05-21T12:34:09.862948+00:00", "EventTime": "2024-05-21T12:34:09.862968+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgBWB1uxS51iq6kIh"], "accumulated_threat_level": 9.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "00150a22-ad1d-4eb2-9bdc-86525231a7b6", "DetectTime": "2024-05-21T12:34:09.873401+00:00", "EventTime": "2024-05-21T12:34:09.873419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBUlH3nnFlJoBCx84"], "accumulated_threat_level": 1.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "b5fe5749-bf9a-45de-856c-58bdcd6f5b4e", "DetectTime": "2024-05-21T12:34:09.908084+00:00", "EventTime": "2024-05-21T12:34:09.908104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy42Rd4aoTo36CbMB5"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "6b2aec42-8c76-4bbc-b2fe-8244e80e2cf2", "DetectTime": "2024-05-21T12:34:09.920379+00:00", "EventTime": "2024-05-21T12:34:09.920405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlmzmMgdQFe26l2j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 78} +{"Format": "IDEA0", "ID": "644fb9d5-84df-417d-963b-0b1b7327695b", "DetectTime": "2024-05-21T12:34:09.935552+00:00", "EventTime": "2024-05-21T12:34:09.935571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemPYHbO3zxUnjUT8"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "da4a465d-c1de-48e9-87fd-5c11a04950fc", "DetectTime": "2024-05-21T12:34:09.947684+00:00", "EventTime": "2024-05-21T12:34:09.947705+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemPYHbO3zxUnjUT8"], "accumulated_threat_level": 10.0, "timewindow": 23} +{"Format": "IDEA0", "ID": "02ce8d7b-139c-4d82-bcf5-2e5e831e0e5d", "DetectTime": "2024-05-21T12:34:09.959160+00:00", "EventTime": "2024-05-21T12:34:09.959179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdvWqe35GjNI99KZm3"], "accumulated_threat_level": 0, "timewindow": 23} +{"Format": "IDEA0", "ID": "ce6335de-566e-4fe3-8f61-623546f695df", "DetectTime": "2024-05-21T12:34:09.971095+00:00", "EventTime": "2024-05-21T12:34:09.971114+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdvWqe35GjNI99KZm3"], "accumulated_threat_level": 10.5, "timewindow": 23} +{"Format": "IDEA0", "ID": "e35014e2-0e22-4f62-87fb-afe21e5050bd", "DetectTime": "2024-05-21T12:34:09.982928+00:00", "EventTime": "2024-05-21T12:34:09.982949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWK3cu1yEoPbnIIwEj"], "accumulated_threat_level": 3.2, "timewindow": 78} +{"Format": "IDEA0", "ID": "c91af532-5519-47bb-9ecf-fc5bfe665197", "DetectTime": "2024-05-21T12:34:10.016195+00:00", "EventTime": "2024-05-21T12:34:10.016213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZVca1u8vg8crN2Wi"], "accumulated_threat_level": 4.0, "timewindow": 78} +{"Format": "IDEA0", "ID": "a990ff78-f2a7-425b-88a3-f6d0ba954343", "DetectTime": "2024-05-21T12:34:10.110655+00:00", "EventTime": "2024-05-21T12:34:10.110675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSAaDq3zINkfnS2mkk"], "accumulated_threat_level": 4.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "58f53b5d-0c8f-48c3-820e-b2d9fa9c7778", "DetectTime": "2024-05-21T12:34:10.150398+00:00", "EventTime": "2024-05-21T12:34:10.150436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COpPeo4HwG6K6RIbp"], "accumulated_threat_level": 5.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "e73fadc9-e123-4862-99a4-29022c976912", "DetectTime": "2024-05-21T12:34:10.179418+00:00", "EventTime": "2024-05-21T12:34:10.179440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj0kVOIAvv7xZdRh5"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c3c993d1-3520-4d5c-9f2a-1d513f14338a", "DetectTime": "2024-05-21T12:34:10.212565+00:00", "EventTime": "2024-05-21T12:34:10.212584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaepFO2ck2awUOzw2e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 78} +{"Format": "IDEA0", "ID": "a6a4d6a1-de13-4c50-a9d6-29129a5e0f8c", "DetectTime": "2024-05-21T12:34:10.254248+00:00", "EventTime": "2024-05-21T12:34:10.254271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtyqgRhAfL6U61me"], "accumulated_threat_level": 7.199999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "c3bdcb7c-14da-4c6c-b595-6e9f9774a021", "DetectTime": "2024-05-21T12:34:10.290012+00:00", "EventTime": "2024-05-21T12:34:10.290034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTAnD2Qbdl9xfD603"], "accumulated_threat_level": 7.999999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "dc2c0bc4-28e8-4552-92e0-29ecda30681c", "DetectTime": "2024-05-21T12:34:10.326999+00:00", "EventTime": "2024-05-21T12:34:10.327022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxXnx2LD47YBIHA46"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "c2abf97d-bc32-41bb-9e37-167dbc1d32b9", "DetectTime": "2024-05-21T12:34:10.476938+00:00", "EventTime": "2024-05-21T12:34:10.476959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhu4e3iw2aLUNdVTg"], "accumulated_threat_level": 9.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "e7a7971c-cd4e-4411-9923-c5f962fb213a", "DetectTime": "2024-05-21T12:34:10.757296+00:00", "EventTime": "2024-05-21T12:34:10.757317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPPis1f2mbMcArtC6"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "24928663-9e67-4e4b-b1c7-d44291a9ca8b", "DetectTime": "2024-05-21T12:34:10.769522+00:00", "EventTime": "2024-05-21T12:34:10.769540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwy59h2azbOezGydx1"], "accumulated_threat_level": 10.4, "timewindow": 78} +{"Format": "IDEA0", "ID": "54b10f2e-2ded-4941-b6f3-880c7e844e44", "DetectTime": "2024-05-21T12:34:10.773977+00:00", "EventTime": "2024-05-21T12:34:10.773995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBXmy4xO65zuwU8e9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "ef09d07f-b087-4c9d-8a9c-e12ddb95fd64", "DetectTime": "2024-05-21T12:34:10.778492+00:00", "EventTime": "2024-05-21T12:34:10.778510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrGTM2SUf8weCO3N9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "58c55cb9-f4dc-42a2-835c-efd07f5bbd2b", "DetectTime": "2024-05-21T12:34:10.782796+00:00", "EventTime": "2024-05-21T12:34:10.782814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Kk0WQZ35DwZ9T77"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0a652ca1-643b-4981-b4dc-69f1085f850e", "DetectTime": "2024-05-21T12:34:10.906788+00:00", "EventTime": "2024-05-21T12:34:10.906809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ77o2kYWR6PLOYdh"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "e65be9e7-5e55-42e2-a6aa-a46865b3b976", "DetectTime": "2024-05-21T12:34:10.911791+00:00", "EventTime": "2024-05-21T12:34:10.911810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cth5r91AwchdD22eQ4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "471f93a1-3f3e-4c46-9686-3ca90129e579", "DetectTime": "2024-05-21T12:34:10.916413+00:00", "EventTime": "2024-05-21T12:34:10.916432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOYJv1BQpq1Z5xIMb"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "4bbdcc44-1688-403f-884f-4493400d5eea", "DetectTime": "2024-05-21T12:34:10.988933+00:00", "EventTime": "2024-05-21T12:34:10.988952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIfk8r3GfuLVNbKYu2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 78} +{"Format": "IDEA0", "ID": "9f90486b-a767-4996-91d3-c228a45a35fb", "DetectTime": "2024-05-21T12:34:11.154720+00:00", "EventTime": "2024-05-21T12:34:11.154741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.42.223.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1g0q4WzATvi9O0el"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "e5f60b68-7a62-4100-bf16-1d60672cbafc", "DetectTime": "2024-05-21T12:34:11.166785+00:00", "EventTime": "2024-05-21T12:34:11.166803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb76fZ3yMRqqz0svV2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 78} +{"Format": "Json", "ID": "e5f60b68-7a62-4100-bf16-1d60672cbafc", "DetectTime": "2024-05-21T12:34:11.166785+00:00", "EventTime": "2024-05-21T12:34:11.166803+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"]}], "Attach": [{"Content": "1970-01-04T05:17:57.135512+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2024/05/21 12:34:11.323263)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 78, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "66591ee4-d157-451b-9bf3-4342a75b55e3", "DetectTime": "2024-05-21T12:34:11.327357+00:00", "EventTime": "2024-05-21T12:34:11.327376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwTzk93fTi5JLSpymk"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "6398ec31-8a97-4fd9-8281-08f18afcaea0", "DetectTime": "2024-05-21T12:34:11.339907+00:00", "EventTime": "2024-05-21T12:34:11.339929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL27S64h7QWZ50I142"], "accumulated_threat_level": 0.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "15757a2b-b212-4dc7-9e3d-4703fb6a3a7d", "DetectTime": "2024-05-21T12:34:11.507832+00:00", "EventTime": "2024-05-21T12:34:11.507855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COB8YN2ppMoNQZEX03"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "1c43a67a-a290-4194-81b7-9b4f4e1ef1e9", "DetectTime": "2024-05-21T12:34:11.512750+00:00", "EventTime": "2024-05-21T12:34:11.512770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.235.166.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnR8L3hJAHHMAnC0f"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a1bdff2b-ebd6-4fa1-9e77-95a91c1d8e5b", "DetectTime": "2024-05-21T12:34:11.517149+00:00", "EventTime": "2024-05-21T12:34:11.517167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfCVy13ARLW2gvOS8"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c18061e4-77a0-4a69-a440-1a69b963d45d", "DetectTime": "2024-05-21T12:34:11.559785+00:00", "EventTime": "2024-05-21T12:34:11.559804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.50.244.169"]}], "Attach": [{"Content": "Connection to unknown destination port 3653/UDP destination IP 99.50.244.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn0Fer4QczEAAg0H8"], "accumulated_threat_level": 1.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "8dd95767-4366-4b1d-a318-3608373cbc3a", "DetectTime": "2024-05-21T12:34:11.629428+00:00", "EventTime": "2024-05-21T12:34:11.629447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6TJBu2HubrCo6rPN2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 78} +{"Format": "IDEA0", "ID": "d0e909d5-33b7-4b18-8f20-3d58884cbbe1", "DetectTime": "2024-05-21T12:34:11.667204+00:00", "EventTime": "2024-05-21T12:34:11.667225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxKu7lriBn7jhNFdl"], "accumulated_threat_level": 3.2, "timewindow": 78} +{"Format": "IDEA0", "ID": "92572983-a60e-481e-a571-3c00d89d2d2b", "DetectTime": "2024-05-21T12:34:11.708294+00:00", "EventTime": "2024-05-21T12:34:11.708316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["60.164.177.244"]}], "Attach": [{"Content": "Connection to unknown destination port 3057/UDP destination IP 60.164.177.244. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgCge4fdKaCjpRAGe"], "accumulated_threat_level": 4.0, "timewindow": 78} +{"Format": "IDEA0", "ID": "6ddddad4-bdc7-4ff9-b18d-11a4856cbb00", "DetectTime": "2024-05-21T12:34:11.744855+00:00", "EventTime": "2024-05-21T12:34:11.744875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTuCvl2WAFYioxt5Pf"], "accumulated_threat_level": 4.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "e75b7be7-8869-49df-9e3d-ba4e445e75e0", "DetectTime": "2024-05-21T12:34:11.787735+00:00", "EventTime": "2024-05-21T12:34:11.787755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.42.92.198"]}], "Attach": [{"Content": "Connection to unknown destination port 9546/UDP destination IP 119.42.92.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdW833SYpPIVlg4yl"], "accumulated_threat_level": 5.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "01b6977e-ee26-468b-b309-29bacf656947", "DetectTime": "2024-05-21T12:34:11.825626+00:00", "EventTime": "2024-05-21T12:34:11.825646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5V6BFdBloMAXE1pj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 78} +{"Format": "IDEA0", "ID": "ecffad59-b8f4-4f30-8710-9c5c4410718d", "DetectTime": "2024-05-21T12:34:11.863209+00:00", "EventTime": "2024-05-21T12:34:11.863229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.83.113.195"]}], "Attach": [{"Content": "Connection to unknown destination port 11677/UDP destination IP 36.83.113.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDuLq3qTwvKR7GHs5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "433772b8-d368-441a-afb9-79e10fdeb937", "DetectTime": "2024-05-21T12:34:11.897138+00:00", "EventTime": "2024-05-21T12:34:11.897159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GJYa8yNN4KaBCcc", "CezBRK3SHDyUrFTcJ8", "C9aSgW3TnCeBw2sk1", "Cr6weM2h4Ond8duuAj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "82ab311f-9e56-488f-a348-a3e4ebead37e", "DetectTime": "2024-05-21T12:34:11.935842+00:00", "EventTime": "2024-05-21T12:34:11.935861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyKtLn2OX53JzNP93"], "accumulated_threat_level": 8.5, "timewindow": 78} +{"Format": "IDEA0", "ID": "5fba9e03-5b21-443d-b44a-c7d970ab2fcb", "DetectTime": "2024-05-21T12:34:12.203217+00:00", "EventTime": "2024-05-21T12:34:12.203243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleElA1Vccvbh8h8l4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "1f05a0d7-cf14-4044-b527-222880eb8021", "DetectTime": "2024-05-21T12:34:12.240331+00:00", "EventTime": "2024-05-21T12:34:12.240351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKseQ2adDkTV57mV5"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "47403658-25f7-4091-a16a-0c3a05f52f03", "DetectTime": "2024-05-21T12:34:12.283537+00:00", "EventTime": "2024-05-21T12:34:12.283557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFhAf4V6eeYHpgOJ8"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "f81b4369-6e6d-45e4-9643-3aa72ce7ad11", "DetectTime": "2024-05-21T12:34:12.288476+00:00", "EventTime": "2024-05-21T12:34:12.288496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.152.219.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1tBS15W7VUQ7Ijrl"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "58322980-265b-4cef-8cc3-ccf7c59244a3", "DetectTime": "2024-05-21T12:34:12.357000+00:00", "EventTime": "2024-05-21T12:34:12.357020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RTtw12K0HLX4kLvf"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "3d2da4f6-69e4-4db8-b732-90c5fbc09dd2", "DetectTime": "2024-05-21T12:34:12.420003+00:00", "EventTime": "2024-05-21T12:34:12.420027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdswn64zAfnBEy9aA3"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "99c84d59-73c8-4d9c-a887-7b927a71269d", "DetectTime": "2024-05-21T12:34:12.444865+00:00", "EventTime": "2024-05-21T12:34:12.444889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrXNv31bbpCwpCqG3"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "755e0adc-39f2-4180-84f5-9eeb8417d6e1", "DetectTime": "2024-05-21T12:34:12.631700+00:00", "EventTime": "2024-05-21T12:34:12.631722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50IDA3v94FMa5yx2b"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a32fa3b0-82c0-49b2-a7c2-cb182d05477e", "DetectTime": "2024-05-21T12:34:12.673044+00:00", "EventTime": "2024-05-21T12:34:12.673083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHnT61sOnf5ahYp0l"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "549ef287-d64f-4ef7-8c96-1d8eab4e51fd", "DetectTime": "2024-05-21T12:34:12.740346+00:00", "EventTime": "2024-05-21T12:34:12.740370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMaxYs31dYV1zha9Ac"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "e136db61-98ae-48d0-ad4d-b5dd26bd4fa1", "DetectTime": "2024-05-21T12:34:12.827532+00:00", "EventTime": "2024-05-21T12:34:12.827552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUL6U012MxfQLKPYMe"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "8d9e1f72-0d47-4082-b429-02219930f21e", "DetectTime": "2024-05-21T12:34:13.083434+00:00", "EventTime": "2024-05-21T12:34:13.083457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZk2db3IcP5iv1oZfc"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "2a27e7f8-12f2-46c6-8d10-c0457f06ead3", "DetectTime": "2024-05-21T12:34:13.376450+00:00", "EventTime": "2024-05-21T12:34:13.376471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53C4zKP9q8A6rl7f"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "dfc6096f-7d28-4f33-83a7-28324e33d0ba", "DetectTime": "2024-05-21T12:34:13.435388+00:00", "EventTime": "2024-05-21T12:34:13.435410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8zgY2QNbM7sBDo6l"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "42aa4e26-c6a0-4d83-85f3-6a0c2a406748", "DetectTime": "2024-05-21T12:34:13.702474+00:00", "EventTime": "2024-05-21T12:34:13.702493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wXa41hxmCRdS0nAd"], "accumulated_threat_level": 9.3, "timewindow": 78} +{"Format": "IDEA0", "ID": "6b216a89-f7dc-40a3-b72b-ba2efbbfae7e", "DetectTime": "2024-05-21T12:34:13.715149+00:00", "EventTime": "2024-05-21T12:34:13.715167+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["50.101.238.77"], "Type": ["CC"], "Port": [7040], "Proto": ["TCP"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "C&C channel, destination IP: 50.101.238.77 port: 7040/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8yhj1B5RghGBNSa"], "accumulated_threat_level": 9.324, "timewindow": 78} +{"Format": "IDEA0", "ID": "db3ac4ae-37fc-499f-976e-22bb121b4582", "DetectTime": "2024-05-21T12:34:13.727696+00:00", "EventTime": "2024-05-21T12:34:13.727717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwI4LO2nYktjgXfeRj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "8e4d3247-fcc6-4e90-af56-9a96b4ded613", "DetectTime": "2024-05-21T12:34:13.733301+00:00", "EventTime": "2024-05-21T12:34:13.733320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPK4f64Et2qZDhWy31"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5d5b1138-db5f-4f2f-9eea-5220ce2d294e", "DetectTime": "2024-05-21T12:34:13.737960+00:00", "EventTime": "2024-05-21T12:34:13.737978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdI3cVnvBHw2N8dyd"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "47323283-acf9-45e8-b2cd-c7ae82d745e4", "DetectTime": "2024-05-21T12:34:13.748882+00:00", "EventTime": "2024-05-21T12:34:13.748898+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["50.101.238.77"], "Type": ["CC"]}, {"IP4": ["50.101.238.77"], "Type": ["CC"], "Port": [7040], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 50.101.238.77 port: 7040/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8yhj1B5RghGBNSa"], "accumulated_threat_level": 0, "timewindow": 78} +{"Format": "IDEA0", "ID": "5d6573cd-5cdd-4e6f-857b-17f1a0be9ec7", "DetectTime": "2024-05-21T12:34:13.813152+00:00", "EventTime": "2024-05-21T12:34:13.813174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cusvpf4UTZ8dc0RhTa"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0de7bf6b-c3cd-4d33-afc7-6d00d351d5c8", "DetectTime": "2024-05-21T12:34:13.842633+00:00", "EventTime": "2024-05-21T12:34:13.842654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaglNx2NJFZvtXY74c"], "accumulated_threat_level": 10.124, "timewindow": 78} +{"Format": "IDEA0", "ID": "caa0e7f1-9351-4529-b012-c0c7345b7fb5", "DetectTime": "2024-05-21T12:34:13.878071+00:00", "EventTime": "2024-05-21T12:34:13.878092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzXuq35OhJcvw8LSc"], "accumulated_threat_level": 10.924000000000001, "timewindow": 78} +{"Format": "IDEA0", "ID": "1f5cdd5a-d7e2-4693-8525-83456cedc56b", "DetectTime": "2024-05-21T12:34:13.925319+00:00", "EventTime": "2024-05-21T12:34:13.925337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiJH15YQNeUD6mL1"], "accumulated_threat_level": 11.724000000000002, "timewindow": 78} +{"Format": "IDEA0", "ID": "334a8b0d-369f-41de-afc5-adbcfa702729", "DetectTime": "2024-05-21T12:34:13.969273+00:00", "EventTime": "2024-05-21T12:34:13.969293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJnp9rtNCm7hvupf"], "accumulated_threat_level": 12.524000000000003, "timewindow": 78} +{"Format": "Json", "ID": "334a8b0d-369f-41de-afc5-adbcfa702729", "DetectTime": "2024-05-21T12:34:13.969273+00:00", "EventTime": "2024-05-21T12:34:13.969293+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "1970-01-04T05:49:23.654347+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2024/05/21 12:34:14.251017)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 78, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "1eb3d9aa-546e-4867-8b66-87e3be4e4dfe", "DetectTime": "2024-05-21T12:34:14.262581+00:00", "EventTime": "2024-05-21T12:34:14.262601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgNuan3y2sFvwdzPj1"], "accumulated_threat_level": 0.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "14469149-a012-4b29-a3df-a583baeb47e6", "DetectTime": "2024-05-21T12:34:14.267900+00:00", "EventTime": "2024-05-21T12:34:14.267921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ1e9Jw2TdRqCHtO8"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "7ce70343-2f1e-40b4-8637-97609c613c15", "DetectTime": "2024-05-21T12:34:14.273212+00:00", "EventTime": "2024-05-21T12:34:14.273240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBRvN51MQVPShlBceg"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "7eaaa14b-5684-41d8-9034-5502600010a2", "DetectTime": "2024-05-21T12:34:14.286369+00:00", "EventTime": "2024-05-21T12:34:14.286392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqybgzeNSXdbzqcrk"], "accumulated_threat_level": 1.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "37313374-455a-4f19-a509-1f43dc5c3bc1", "DetectTime": "2024-05-21T12:34:14.299900+00:00", "EventTime": "2024-05-21T12:34:14.299920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCc1W92aJDn1CC5Enl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 78} +{"Format": "IDEA0", "ID": "4e823012-da88-4f0f-894f-7c109aec9a0e", "DetectTime": "2024-05-21T12:34:14.452495+00:00", "EventTime": "2024-05-21T12:34:14.452518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCAo0l2pMrtJG3W5Mg"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "be34e6fc-e3a6-4b41-90f3-c377dc4b4537", "DetectTime": "2024-05-21T12:34:14.464307+00:00", "EventTime": "2024-05-21T12:34:14.464327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrvW5Z1ED6zOs9GIBf"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "cb37848d-961d-4f54-b69f-4980a9f8110c", "DetectTime": "2024-05-21T12:34:14.480599+00:00", "EventTime": "2024-05-21T12:34:14.480619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSahgO13pg8mIxCdy2"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "01a7740d-ffc8-48a1-9cce-e99af119c65d", "DetectTime": "2024-05-21T12:34:14.536215+00:00", "EventTime": "2024-05-21T12:34:14.536234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0umONXBrBYH0Sie"], "accumulated_threat_level": 3.2, "timewindow": 78} +{"Format": "IDEA0", "ID": "fd5dc17c-9a13-4706-9414-c50eb556682c", "DetectTime": "2024-05-21T12:34:14.575479+00:00", "EventTime": "2024-05-21T12:34:14.575498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41VcO25Cdi6OUgUNd"], "accumulated_threat_level": 4.0, "timewindow": 78} +{"Format": "IDEA0", "ID": "ea3ea4da-7fc7-419b-afb0-dc2ef91ebb54", "DetectTime": "2024-05-21T12:34:14.614642+00:00", "EventTime": "2024-05-21T12:34:14.614661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw57ZQ1YsrjfAy7R2d"], "accumulated_threat_level": 4.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "eb551c7f-1556-4461-ac4a-b529273f77c1", "DetectTime": "2024-05-21T12:34:14.653399+00:00", "EventTime": "2024-05-21T12:34:14.653418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxK5El1c0DJKItF1q1"], "accumulated_threat_level": 5.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "aa56fcfe-5c95-4dfe-af36-bb7a81dfca36", "DetectTime": "2024-05-21T12:34:14.680550+00:00", "EventTime": "2024-05-21T12:34:14.680573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsgGjf298RViAzHicj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "b9367f5d-4c1c-4aa8-a78a-866d7d7fe96a", "DetectTime": "2024-05-21T12:34:14.714068+00:00", "EventTime": "2024-05-21T12:34:14.714086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVd7A4qdYY8xHLoy2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 78} +{"Format": "IDEA0", "ID": "0aa436b5-ac14-4120-b579-4576494eca37", "DetectTime": "2024-05-21T12:34:14.753607+00:00", "EventTime": "2024-05-21T12:34:14.753625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mEei32grRuf59qp6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "650dbf22-0b45-470f-a75e-075fef2ea187", "DetectTime": "2024-05-21T12:34:14.784344+00:00", "EventTime": "2024-05-21T12:34:14.784365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0vx2B2N8Mx5LW3rf"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a9e747ff-a4a4-4217-9e49-571358b3d5b3", "DetectTime": "2024-05-21T12:34:14.815467+00:00", "EventTime": "2024-05-21T12:34:14.815486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmYYC42TOFXmIDBX3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "3e7b7273-8736-444e-8b3b-cd60eeaadaa7", "DetectTime": "2024-05-21T12:34:15.124587+00:00", "EventTime": "2024-05-21T12:34:15.124610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyz0J21BbBo2XzGx7h"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "d1ff96f7-1b64-46b8-b4e5-bcfcf155505f", "DetectTime": "2024-05-21T12:34:15.129713+00:00", "EventTime": "2024-05-21T12:34:15.129735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmTyF2h3iPA4iURUe"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "16dfca9d-300d-47d9-becc-31be448d84e3", "DetectTime": "2024-05-21T12:34:15.134238+00:00", "EventTime": "2024-05-21T12:34:15.134257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.13.70.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crj1Wp4vRt5qw0MQJh"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "70235646-544b-48fa-a6b9-d3aadd361d36", "DetectTime": "2024-05-21T12:34:15.189616+00:00", "EventTime": "2024-05-21T12:34:15.189638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.116.98.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch7uMh1wAIy2Pd51O3"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "fdbf9121-117d-47cf-b127-8627989d927e", "DetectTime": "2024-05-21T12:34:15.202100+00:00", "EventTime": "2024-05-21T12:34:15.202120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfo9FBJJ1CmKDgec"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "c6a5b053-a90d-4901-85bd-4f58d02aad6e", "DetectTime": "2024-05-21T12:34:15.207182+00:00", "EventTime": "2024-05-21T12:34:15.207200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcRQt1sR1KQEFs8l4", "Cpe8nnzEvghGrxd1c", "CZWTYx4y5lRo42nRJj", "CP3NH84O31YiA9blY1"], "accumulated_threat_level": 9.299999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "5037d5c3-577b-4a77-8f42-dfce3562216e", "DetectTime": "2024-05-21T12:34:15.281660+00:00", "EventTime": "2024-05-21T12:34:15.281678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.4.69.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHfq6qVi2fRihUtj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "37f9d1b2-1420-46e4-8ba5-a5db39c50ea1", "DetectTime": "2024-05-21T12:34:15.286403+00:00", "EventTime": "2024-05-21T12:34:15.286433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.14.148.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmjfn71UBKVUTGRcjl"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "701d2acb-509b-4240-98ed-52caa954a999", "DetectTime": "2024-05-21T12:34:15.311900+00:00", "EventTime": "2024-05-21T12:34:15.311919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.39.6.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CufGS7jwByqGVUVk3"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5806eb64-d8c9-4608-8b59-b4fac8ccfc17", "DetectTime": "2024-05-21T12:34:15.367242+00:00", "EventTime": "2024-05-21T12:34:15.367262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vaY6KXNNJLZEAca"], "accumulated_threat_level": 10.1, "timewindow": 78} +{"Format": "IDEA0", "ID": "39d7bf47-c9d7-4dc5-8b5c-adbcf63c9a90", "DetectTime": "2024-05-21T12:34:15.417609+00:00", "EventTime": "2024-05-21T12:34:15.417632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gstP1zdhpGmBQPBf"], "accumulated_threat_level": 10.9, "timewindow": 78} +{"Format": "IDEA0", "ID": "661daaf4-e150-48e0-b1f5-eeb80a7c3bd6", "DetectTime": "2024-05-21T12:34:15.466133+00:00", "EventTime": "2024-05-21T12:34:15.466152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9w0xe4RdV1ZOu4Irg"], "accumulated_threat_level": 11.700000000000001, "timewindow": 78} +{"Format": "IDEA0", "ID": "839fdf8a-78b3-4e01-bd1e-4fa3514c0924", "DetectTime": "2024-05-21T12:34:15.495239+00:00", "EventTime": "2024-05-21T12:34:15.495258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.92.21.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW5VEs7hjsEKcFr6"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "fb91be5b-8cea-412f-92f8-286bad5e67f3", "DetectTime": "2024-05-21T12:34:15.796885+00:00", "EventTime": "2024-05-21T12:34:15.796905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UpVY3RhFdCXZnytl"], "accumulated_threat_level": 12.500000000000002, "timewindow": 78} +{"Format": "Json", "ID": "fb91be5b-8cea-412f-92f8-286bad5e67f3", "DetectTime": "2024-05-21T12:34:15.796885+00:00", "EventTime": "2024-05-21T12:34:15.796905+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "1970-01-04T05:49:27.502314+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 78. (real time 2024/05/21 12:34:16.044176)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 78, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "67f3f0f5-0ec3-4d99-ac2f-825e1c0cc5f0", "DetectTime": "2024-05-21T12:34:16.049026+00:00", "EventTime": "2024-05-21T12:34:16.049046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.127.147.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEvyK41OsvkbfPIlw9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "71d25f74-ea44-4918-9fab-6b27273ed0ae", "DetectTime": "2024-05-21T12:34:16.053705+00:00", "EventTime": "2024-05-21T12:34:16.053724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7ayw2PxdbrqjGc7e"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "b559ecbb-851e-4a96-b6ad-15e2462d531d", "DetectTime": "2024-05-21T12:34:16.059126+00:00", "EventTime": "2024-05-21T12:34:16.059144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.162.85.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co8hai1SD6aD2IIIzd"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0a07dfb8-2316-4d0d-9a3a-1ff226d7803e", "DetectTime": "2024-05-21T12:34:16.063602+00:00", "EventTime": "2024-05-21T12:34:16.063621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.44.21.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3BkUS1BPjle6N6rVe"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "f5221db3-49ab-4c04-90e9-86d845c78bde", "DetectTime": "2024-05-21T12:34:16.067968+00:00", "EventTime": "2024-05-21T12:34:16.067986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.137.54.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0PEZ2QmlhjlkVzod"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "59c9309c-f4e6-4631-ad52-ba744fc12331", "DetectTime": "2024-05-21T12:34:16.072403+00:00", "EventTime": "2024-05-21T12:34:16.072421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7HTXh3JYPNbTWxO4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "7494351c-9190-40fd-85f0-ae9890dbb217", "DetectTime": "2024-05-21T12:34:16.077234+00:00", "EventTime": "2024-05-21T12:34:16.077255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.167.175.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cha1yn2lpVnHfQ7wb"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a3b0f226-c33c-4ab9-812e-c3c9f9968623", "DetectTime": "2024-05-21T12:34:16.082448+00:00", "EventTime": "2024-05-21T12:34:16.082469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.79.15.23 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYRls3rEtpVenFQX6"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "696e534b-82cd-4a56-b894-0f5c7082acd0", "DetectTime": "2024-05-21T12:34:16.087339+00:00", "EventTime": "2024-05-21T12:34:16.087357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.64.171.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmVJKP3phVNF6cOd6a"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "64f9ed31-67cb-4107-9ebc-e67ba9c2fe49", "DetectTime": "2024-05-21T12:34:16.091944+00:00", "EventTime": "2024-05-21T12:34:16.091962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.64.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiesP33oWdl2LsuUma"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "ca9822cb-17f4-46be-ba91-ebe80fbc8bbf", "DetectTime": "2024-05-21T12:34:16.349774+00:00", "EventTime": "2024-05-21T12:34:16.349795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.183.248.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch0SMv4wBEG65aXfSl"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "8bfa8157-ddaa-4307-8aaf-d9bf742e4a5c", "DetectTime": "2024-05-21T12:34:16.423616+00:00", "EventTime": "2024-05-21T12:34:16.423635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmsuyz3UoblOvZOpF6"], "accumulated_threat_level": 0.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "f00a230a-96a6-417b-8eb8-f76c204abaa2", "DetectTime": "2024-05-21T12:34:16.430145+00:00", "EventTime": "2024-05-21T12:34:16.430164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.65.195.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0hTzV1j2W4vhy5w7h"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "4a55a8eb-f7b0-46dc-8533-7b14b49adba8", "DetectTime": "2024-05-21T12:34:16.460040+00:00", "EventTime": "2024-05-21T12:34:16.460062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.158.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcnI3c4D0dHYb1MfAj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "3513619b-2ac7-417f-a929-9f5ffd911c9f", "DetectTime": "2024-05-21T12:34:16.493265+00:00", "EventTime": "2024-05-21T12:34:16.493283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.70.233.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY2wTp1NCmuQMWwkLd"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a8e26d2f-4232-4865-803c-4ab5375bef3d", "DetectTime": "2024-05-21T12:34:16.540697+00:00", "EventTime": "2024-05-21T12:34:16.540719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.238.13.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtAXvL3C0R2BEC6ks4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5523ab71-4800-4db6-b597-75b267f8da1b", "DetectTime": "2024-05-21T12:34:16.589736+00:00", "EventTime": "2024-05-21T12:34:16.589754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6BOh2dLUMqE9qi4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "df09c9b6-2d50-4d47-8bf9-62c251111afc", "DetectTime": "2024-05-21T12:34:16.602539+00:00", "EventTime": "2024-05-21T12:34:16.602559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hG1Z1SjXwS6DSB44"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "f624561f-f31a-4b2d-ac42-ece2988edec3", "DetectTime": "2024-05-21T12:34:16.608021+00:00", "EventTime": "2024-05-21T12:34:16.608041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.88.250.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1D1C2pA4pSgK2P4e"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "cb6c9b69-9a0d-465e-8956-06f601f58f6f", "DetectTime": "2024-05-21T12:34:16.612631+00:00", "EventTime": "2024-05-21T12:34:16.612650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.207.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENmXy2Vbbr7XyhaS8"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5b8ad3ec-899a-498b-a126-39ce0c64be58", "DetectTime": "2024-05-21T12:34:16.617608+00:00", "EventTime": "2024-05-21T12:34:16.617626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.53.30.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1GdG10737Yt0skge"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "6a38bc5d-dfe0-435e-a855-237f76286519", "DetectTime": "2024-05-21T12:34:16.622115+00:00", "EventTime": "2024-05-21T12:34:16.622133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.48.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNmQIc1RQdQdTRctp2"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "66a49c1e-3f1e-4b0e-94d3-585e32d23543", "DetectTime": "2024-05-21T12:34:16.633871+00:00", "EventTime": "2024-05-21T12:34:16.633889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.47.68.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COVC1kZOmLt2eS2G"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "b49cb152-9355-41a3-bec5-6bcd525534e7", "DetectTime": "2024-05-21T12:34:16.711146+00:00", "EventTime": "2024-05-21T12:34:16.711167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.179.199.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ZU5yS4hkSObtpof"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0c5bd20b-cc5e-4fe7-858a-a04f71add926", "DetectTime": "2024-05-21T12:34:17.114827+00:00", "EventTime": "2024-05-21T12:34:17.114852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwupg437E5A0rsnrZ5"], "accumulated_threat_level": 1.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "60479498-3ccb-4329-a9f9-b368da92116f", "DetectTime": "2024-05-21T12:34:17.138054+00:00", "EventTime": "2024-05-21T12:34:17.138075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.100.90.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAvifqBGyt7xFJRDj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "8f80eb73-67e6-45c8-aecc-6ed34ccca32f", "DetectTime": "2024-05-21T12:34:17.145448+00:00", "EventTime": "2024-05-21T12:34:17.145470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.103.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5xqpDtaSGjtAdRD9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "8ab12c4f-afe0-4480-9c33-f7970dc62961", "DetectTime": "2024-05-21T12:34:17.165423+00:00", "EventTime": "2024-05-21T12:34:17.165447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.70.45.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh5eo3hjypdQnXbxf"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "5c8f6597-8568-4a27-afc9-e9c22a00ad04", "DetectTime": "2024-05-21T12:34:17.170684+00:00", "EventTime": "2024-05-21T12:34:17.170703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.136.208.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFFwP01f1fE6Oivjik"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "94e6c712-14a9-413c-82a9-a7b7041c02b5", "DetectTime": "2024-05-21T12:34:17.176266+00:00", "EventTime": "2024-05-21T12:34:17.176286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7RxFAfwfCMBvsES4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "190d5be7-5d20-4114-9300-c8ec11a4c83a", "DetectTime": "2024-05-21T12:34:17.283334+00:00", "EventTime": "2024-05-21T12:34:17.283357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7FhMX3TdVksWzBYz1"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "7a5230a6-ccd4-4ce7-a096-feb6cb458749", "DetectTime": "2024-05-21T12:34:17.296708+00:00", "EventTime": "2024-05-21T12:34:17.296731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckr8LNu5zPDLC4535"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "7238d14c-f7d9-4652-ac2f-232aeb6e342e", "DetectTime": "2024-05-21T12:34:17.304647+00:00", "EventTime": "2024-05-21T12:34:17.304668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.164.177.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3bTVI1BvZTbGc0AFb"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "4e4beaf9-aa44-445d-b9fc-5360b1dbaea4", "DetectTime": "2024-05-21T12:34:17.381973+00:00", "EventTime": "2024-05-21T12:34:17.381995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.6.137.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAt6W1oLkuiacCo0k"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "0d1ad374-7d13-4692-9bad-5e68640e1a31", "DetectTime": "2024-05-21T12:34:17.673406+00:00", "EventTime": "2024-05-21T12:34:17.673439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.130.34.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvTtG4LXdJicGRLrg"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "b2d1a60c-e610-4dd3-b043-2677f303741b", "DetectTime": "2024-05-21T12:34:17.685645+00:00", "EventTime": "2024-05-21T12:34:17.685665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWyfh3VExtH0a6fI8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 78} +{"Format": "IDEA0", "ID": "8366f87f-f4a9-45ed-986f-e99adc4b4fac", "DetectTime": "2024-05-21T12:34:17.691456+00:00", "EventTime": "2024-05-21T12:34:17.691476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.4.124.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5DxDMBLMA3nrkNgg"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "1839f9b5-59b1-4860-b1be-6d427b3bff63", "DetectTime": "2024-05-21T12:34:17.765946+00:00", "EventTime": "2024-05-21T12:34:17.765967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.97.114.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4tz3I2O9oHBy8aFW2"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "d2bd5d4b-5042-46cd-b26b-f02aeca20929", "DetectTime": "2024-05-21T12:34:17.771080+00:00", "EventTime": "2024-05-21T12:34:17.771099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.6.85.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvN5Gk4SUGMtDWdfF9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "1ac47c34-20db-4ce3-ac33-bf28c3e41aec", "DetectTime": "2024-05-21T12:34:17.821138+00:00", "EventTime": "2024-05-21T12:34:17.821160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.219.182.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhEEi6XhFOXkus3a"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c080a381-6fb4-47d0-82b3-d6767f2b659f", "DetectTime": "2024-05-21T12:34:17.854135+00:00", "EventTime": "2024-05-21T12:34:17.854158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.93.99.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25hJo4PAYoQ1x1qsl"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "835eceb4-e416-4b81-ac44-962062178e74", "DetectTime": "2024-05-21T12:34:17.867905+00:00", "EventTime": "2024-05-21T12:34:17.867926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHclWPzI42NnnWJL3"], "accumulated_threat_level": 3.2, "timewindow": 78} +{"Format": "IDEA0", "ID": "70c42c7a-d089-41f1-9480-62331a8cccf2", "DetectTime": "2024-05-21T12:34:17.926067+00:00", "EventTime": "2024-05-21T12:34:17.926088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.53.148.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEIJR3YC2R2MlRytf"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "a2de148f-d023-43f4-a814-62802968cfca", "DetectTime": "2024-05-21T12:34:18.196527+00:00", "EventTime": "2024-05-21T12:34:18.196548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u9aV1KDiV0h7BjF7"], "accumulated_threat_level": 4.0, "timewindow": 78} +{"Format": "IDEA0", "ID": "e73de9c7-9de9-4c6b-ae2b-4d68836a7313", "DetectTime": "2024-05-21T12:34:18.405990+00:00", "EventTime": "2024-05-21T12:34:18.406013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvf124ZVfGamDRZqj"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "cdaa559b-85c8-4a80-aa42-814337dceec8", "DetectTime": "2024-05-21T12:34:18.412966+00:00", "EventTime": "2024-05-21T12:34:18.412987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.47.239.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9il94ONc7q6UPw8d"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "d8447f91-432e-43c1-b607-8b5e31655bd2", "DetectTime": "2024-05-21T12:34:18.418618+00:00", "EventTime": "2024-05-21T12:34:18.418637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCzA24j77QisOhLs4"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "67ec5daf-b458-42c0-9184-a560660e2171", "DetectTime": "2024-05-21T12:34:18.423332+00:00", "EventTime": "2024-05-21T12:34:18.423350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbiGLCVGlYwry5ks9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "32be48eb-ca1c-465d-ad49-23739a237870", "DetectTime": "2024-05-21T12:34:18.429281+00:00", "EventTime": "2024-05-21T12:34:18.429300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 27.54.51.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUYXr4KXEKPZFv4Fd"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "d8700257-7695-44c4-bda1-f248a36feac4", "DetectTime": "2024-05-21T12:34:18.544547+00:00", "EventTime": "2024-05-21T12:34:18.544568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.113.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsQir30ydNgvJYBl9"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "c87a713f-8eb1-47c5-8bf1-6fc508b49dcb", "DetectTime": "2024-05-21T12:34:18.577782+00:00", "EventTime": "2024-05-21T12:34:18.577800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.139.173.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM07AF4V9P0gDQJY0b"], "accumulated_threat_level": 4.0, "timewindow": 77} +{"Format": "IDEA0", "ID": "579219a8-f82a-43c2-8d09-cb430a0d3a52", "DetectTime": "2024-05-21T12:34:18.590168+00:00", "EventTime": "2024-05-21T12:34:18.590193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvAUs4BkYhNCJEvfl"], "accumulated_threat_level": 4.8, "timewindow": 78} +{"Format": "IDEA0", "ID": "1012a39a-8cd2-4a9f-9a66-483d927a17a2", "DetectTime": "2024-05-21T12:34:18.659235+00:00", "EventTime": "2024-05-21T12:34:18.659255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxIqv31zzXxUQYqBy7"], "accumulated_threat_level": 5.6, "timewindow": 78} +{"Format": "IDEA0", "ID": "44256b05-8372-4ff3-9687-ac42ef70113a", "DetectTime": "2024-05-21T12:34:18.712140+00:00", "EventTime": "2024-05-21T12:34:18.712159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9d053N65WfAZCX8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 78} +{"Format": "IDEA0", "ID": "a97db012-0699-4b7e-8b1a-ec5b32c54927", "DetectTime": "2024-05-21T12:34:18.773866+00:00", "EventTime": "2024-05-21T12:34:18.773885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YCOq1nypEHVqyDRg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "15e52380-0b87-40b0-b650-b100cabd71fb", "DetectTime": "2024-05-21T12:34:18.812124+00:00", "EventTime": "2024-05-21T12:34:18.812144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx5kIy2ltRP8Ei9eY1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "25713b43-f3b4-4259-86c5-4ef4b0a4580c", "DetectTime": "2024-05-21T12:34:18.816941+00:00", "EventTime": "2024-05-21T12:34:18.816959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIXeH3Pp5aUuLAqlc", "CmW2pL13m5DpBLXrCj", "CapECQ2SwjBiaSgzWh", "CscLSA2DTDjmTR7cLb"], "accumulated_threat_level": 0.5, "timewindow": 79} +{"Format": "IDEA0", "ID": "07d5ecb6-c72f-4ebf-9f57-10d80b8da12d", "DetectTime": "2024-05-21T12:34:18.877877+00:00", "EventTime": "2024-05-21T12:34:18.877896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CixsWF3pOOYPDow7ji"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "a8aff359-bb43-462a-a079-179d068b9e26", "DetectTime": "2024-05-21T12:34:19.225104+00:00", "EventTime": "2024-05-21T12:34:19.225124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzPKy4lJbxQKQzvV7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "8199298c-7448-426d-8755-e49d6714240b", "DetectTime": "2024-05-21T12:34:19.303977+00:00", "EventTime": "2024-05-21T12:34:19.303997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCh0xA3KBCbkeI63Ra"], "accumulated_threat_level": 1.3, "timewindow": 79} +{"Format": "IDEA0", "ID": "8181bd55-e290-4e5f-b512-fc97328afe80", "DetectTime": "2024-05-21T12:34:20.081798+00:00", "EventTime": "2024-05-21T12:34:20.081818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCZNV1Jpn0W0MaBQl"], "accumulated_threat_level": 2.1, "timewindow": 79} +{"Format": "IDEA0", "ID": "2b92104d-112d-492a-8302-a050b8940c66", "DetectTime": "2024-05-21T12:34:20.133863+00:00", "EventTime": "2024-05-21T12:34:20.133882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg2bhe1r1Yo81hx0oc"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 79} +{"Format": "IDEA0", "ID": "306a9e1c-789c-4d01-ad88-937941dc44b2", "DetectTime": "2024-05-21T12:34:20.221709+00:00", "EventTime": "2024-05-21T12:34:20.221730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwVaN3tjIuXUqGYN9"], "accumulated_threat_level": 3.7, "timewindow": 79} +{"Format": "IDEA0", "ID": "4e2be715-d4ed-440b-a1f8-5c49e89b7ad7", "DetectTime": "2024-05-21T12:34:20.270582+00:00", "EventTime": "2024-05-21T12:34:20.270604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fPMa1U9KjHE8qR3h"], "accumulated_threat_level": 4.5, "timewindow": 79} +{"Format": "IDEA0", "ID": "348a7e0b-5b9e-4712-ac12-b7996fb42140", "DetectTime": "2024-05-21T12:34:20.327588+00:00", "EventTime": "2024-05-21T12:34:20.327609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTLam4AA3nRgdxtGd"], "accumulated_threat_level": 5.3, "timewindow": 79} +{"Format": "IDEA0", "ID": "0adfcaa4-581a-45ea-8c74-6bae0370d649", "DetectTime": "2024-05-21T12:34:20.373306+00:00", "EventTime": "2024-05-21T12:34:20.373323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9QrUo8CqT3cecR85"], "accumulated_threat_level": 6.1, "timewindow": 79} +{"Format": "IDEA0", "ID": "5ebdf118-381a-4b75-8f9a-e4a8e34c52ce", "DetectTime": "2024-05-21T12:34:20.413655+00:00", "EventTime": "2024-05-21T12:34:20.413677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7pif24RMoBwaevC8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 79} +{"Format": "IDEA0", "ID": "a00702c0-4fab-4a09-b450-f96181168c5e", "DetectTime": "2024-05-21T12:34:20.464791+00:00", "EventTime": "2024-05-21T12:34:20.464812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clt5EbcyXhajSMTP3"], "accumulated_threat_level": 7.699999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "110a639c-e505-4829-bed0-9f1ec81d29d7", "DetectTime": "2024-05-21T12:34:20.503777+00:00", "EventTime": "2024-05-21T12:34:20.503796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClT20q1iA4dI3iARe7"], "accumulated_threat_level": 8.5, "timewindow": 79} +{"Format": "IDEA0", "ID": "48b62bff-b723-4802-8a6d-d9a454fcbafb", "DetectTime": "2024-05-21T12:34:20.745522+00:00", "EventTime": "2024-05-21T12:34:20.745548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.50.112.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGpDD2L9aYc3tObp5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "19f764d3-fe44-4e60-8003-06a988689212", "DetectTime": "2024-05-21T12:34:20.784277+00:00", "EventTime": "2024-05-21T12:34:20.784294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cHOOoobn0LBnUh3"], "accumulated_threat_level": 9.3, "timewindow": 79} +{"Format": "IDEA0", "ID": "bddb1f87-3bbf-4b23-a9a0-b26da14454af", "DetectTime": "2024-05-21T12:34:20.789026+00:00", "EventTime": "2024-05-21T12:34:20.789043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.3.38 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CccEY3gptZZMQ3Xcc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "9ebae3e9-7a9b-4d8d-bc0c-65ac067d481f", "DetectTime": "2024-05-21T12:34:20.844170+00:00", "EventTime": "2024-05-21T12:34:20.844189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cupuuh2kDnWfafNFc1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 79} +{"Format": "IDEA0", "ID": "98dc413d-7055-45de-a26b-1a7f6bcd3196", "DetectTime": "2024-05-21T12:34:20.885312+00:00", "EventTime": "2024-05-21T12:34:20.885335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJx3uZJ3gaxFJBMf"], "accumulated_threat_level": 10.900000000000002, "timewindow": 79} +{"Format": "IDEA0", "ID": "65a37a83-a5a1-4ef5-a9d6-5a2a2e2303a2", "DetectTime": "2024-05-21T12:34:20.924474+00:00", "EventTime": "2024-05-21T12:34:20.924491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHpwg3h7BJubkkrWc"], "accumulated_threat_level": 11.700000000000003, "timewindow": 79} +{"Format": "IDEA0", "ID": "657250d3-84b4-4839-b777-be6e352a2276", "DetectTime": "2024-05-21T12:34:20.963755+00:00", "EventTime": "2024-05-21T12:34:20.963772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTqNpi4tWzT7fnFRe1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 79} +{"Format": "Json", "ID": "657250d3-84b4-4839-b777-be6e352a2276", "DetectTime": "2024-05-21T12:34:20.963755+00:00", "EventTime": "2024-05-21T12:34:20.963772+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-04T06:21:57.623944+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2024/05/21 12:34:21.178671)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 79, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "4a41f695-cbea-4f40-8016-3992fd3d8efd", "DetectTime": "2024-05-21T12:34:21.253812+00:00", "EventTime": "2024-05-21T12:34:21.253830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83qk7Nb8uXMrC6Y7"], "accumulated_threat_level": 0.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "40720c5d-888c-4249-a813-4db8f00a9e01", "DetectTime": "2024-05-21T12:34:21.265730+00:00", "EventTime": "2024-05-21T12:34:21.265749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.245.242"]}], "Attach": [{"Content": "Connection to unknown destination port 13944/UDP destination IP 85.75.245.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWMful1NwRQYk7pRx1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "3aeba629-2d96-4b52-b825-0e97c37f1b66", "DetectTime": "2024-05-21T12:34:21.278101+00:00", "EventTime": "2024-05-21T12:34:21.278120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETriA4udoVXGyzeg4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 79} +{"Format": "IDEA0", "ID": "8ad2dcaa-46a3-47d0-9abb-847ddfd16e0b", "DetectTime": "2024-05-21T12:34:21.285940+00:00", "EventTime": "2024-05-21T12:34:21.285958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.60.50.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7CMUr3R8lCclUoK9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "8f69bc79-f647-4556-b2f2-d8b145328e8a", "DetectTime": "2024-05-21T12:34:21.332176+00:00", "EventTime": "2024-05-21T12:34:21.332199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjFgU5aQ6BhTXV1a"], "accumulated_threat_level": 3.2, "timewindow": 79} +{"Format": "IDEA0", "ID": "c127fc11-5ef8-4e3c-a78e-8bba9240b3bc", "DetectTime": "2024-05-21T12:34:21.369331+00:00", "EventTime": "2024-05-21T12:34:21.369352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87eCh2GSRrznYOLU2"], "accumulated_threat_level": 4.0, "timewindow": 79} +{"Format": "IDEA0", "ID": "8c0314b4-6cc7-47d0-ae9b-a37b81da1f11", "DetectTime": "2024-05-21T12:34:21.407764+00:00", "EventTime": "2024-05-21T12:34:21.407784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UHh42a3tXdt8RhNe"], "accumulated_threat_level": 4.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "b0609e9d-2a2f-4169-9cc7-0ba6e444e8ec", "DetectTime": "2024-05-21T12:34:21.658399+00:00", "EventTime": "2024-05-21T12:34:21.658439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.48.220.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6gjuD2fSCdQFlRU24"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "3e042cfb-6cf8-4b42-9757-a4f4c35adcc2", "DetectTime": "2024-05-21T12:34:21.694018+00:00", "EventTime": "2024-05-21T12:34:21.694040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNdOlD2n3qmcBrPDO1"], "accumulated_threat_level": 5.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "68b14271-f586-4121-acfc-304d8f618992", "DetectTime": "2024-05-21T12:34:21.735557+00:00", "EventTime": "2024-05-21T12:34:21.735577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0Jdg3n2mFBBToGpc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 79} +{"Format": "IDEA0", "ID": "12947089-fc63-4fd7-9346-aea0c4a1d339", "DetectTime": "2024-05-21T12:34:21.774075+00:00", "EventTime": "2024-05-21T12:34:21.774094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYOPW1vjBcUOL7TY6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "a57840be-be7f-42cf-9139-8a0896b15971", "DetectTime": "2024-05-21T12:34:21.811848+00:00", "EventTime": "2024-05-21T12:34:21.811868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2zKL2cPKEGIttLZ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "147d8ddf-b759-4492-bfb8-c9c3cd18cb80", "DetectTime": "2024-05-21T12:34:21.851383+00:00", "EventTime": "2024-05-21T12:34:21.851402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFBEe3s9VUv5jWknf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "a44e83e7-6b6d-4cc9-b0df-cdfa328047d5", "DetectTime": "2024-05-21T12:34:21.887461+00:00", "EventTime": "2024-05-21T12:34:21.887480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.158.48"]}], "Attach": [{"Content": "Connection to unknown destination port 10849/UDP destination IP 180.241.158.48. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmiH043YNytb2aXLC1"], "accumulated_threat_level": 9.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "c40dea9b-247c-44fd-9287-299d84b996a2", "DetectTime": "2024-05-21T12:34:21.938645+00:00", "EventTime": "2024-05-21T12:34:21.938665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6DUvqT50Yw0wyTd"], "accumulated_threat_level": 10.4, "timewindow": 79} +{"Format": "IDEA0", "ID": "d1427976-8016-4b59-9d6f-4ac2826b3912", "DetectTime": "2024-05-21T12:34:21.990682+00:00", "EventTime": "2024-05-21T12:34:21.990701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetmSw1T1d60B1IPS3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 79} +{"Format": "IDEA0", "ID": "2a44c718-3d93-49c9-a5c8-3116485b2323", "DetectTime": "2024-05-21T12:34:22.030660+00:00", "EventTime": "2024-05-21T12:34:22.030681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIH0R1k4qPq5gX594"], "accumulated_threat_level": 12.000000000000002, "timewindow": 79} +{"Format": "Json", "ID": "2a44c718-3d93-49c9-a5c8-3116485b2323", "DetectTime": "2024-05-21T12:34:22.030660+00:00", "EventTime": "2024-05-21T12:34:22.030681+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "1970-01-04T06:22:01.633905+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2024/05/21 12:34:22.405794)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 79, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "98c020bd-75ad-4d8d-bef7-85d5eb9ffd48", "DetectTime": "2024-05-21T12:34:22.441953+00:00", "EventTime": "2024-05-21T12:34:22.441974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3noLq3qGdkHsqhTle"], "accumulated_threat_level": 0.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "3af85209-5dfc-4407-9108-c5fadacc9ca5", "DetectTime": "2024-05-21T12:34:22.447551+00:00", "EventTime": "2024-05-21T12:34:22.447571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.62.240.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJdNgA4uh9XfR1YcT9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "f0843668-6f35-4395-9c66-0b69e7092aec", "DetectTime": "2024-05-21T12:34:22.458509+00:00", "EventTime": "2024-05-21T12:34:22.458527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjMhK2rnsJ5wT5r12"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "319661b4-b624-4597-93bf-df5d8f9741d8", "DetectTime": "2024-05-21T12:34:22.484420+00:00", "EventTime": "2024-05-21T12:34:22.484442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS6hZ54XB2reRV6w0a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 79} +{"Format": "IDEA0", "ID": "c0abd9ed-22c3-491e-b5d8-9de4445feff1", "DetectTime": "2024-05-21T12:34:22.742171+00:00", "EventTime": "2024-05-21T12:34:22.742194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqGRq4r11MXsDuuZ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "9d6a7633-fb64-4b98-a1c9-d15530a94e49", "DetectTime": "2024-05-21T12:34:22.779264+00:00", "EventTime": "2024-05-21T12:34:22.779289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.42.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzw1Q3jFMaKEyWYi5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "13601220-0bed-4c81-9d96-a773cb0a0dd1", "DetectTime": "2024-05-21T12:34:22.870289+00:00", "EventTime": "2024-05-21T12:34:22.870309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdLmc1I5jFCbRovUl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "34672d94-813b-490a-80f7-b239a994ded0", "DetectTime": "2024-05-21T12:34:23.359646+00:00", "EventTime": "2024-05-21T12:34:23.359668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ypCrJ88E6oNYGRe"], "accumulated_threat_level": 3.2, "timewindow": 79} +{"Format": "IDEA0", "ID": "7e620e66-1b27-4d35-9923-ee87a5d1a297", "DetectTime": "2024-05-21T12:34:23.398912+00:00", "EventTime": "2024-05-21T12:34:23.398932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX0GW23JbPpYVld3f"], "accumulated_threat_level": 4.0, "timewindow": 79} +{"Format": "IDEA0", "ID": "fb815a88-0dde-4696-a4ab-eff539c186c8", "DetectTime": "2024-05-21T12:34:23.489764+00:00", "EventTime": "2024-05-21T12:34:23.489782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOypt4HMobwTlJ8P1"], "accumulated_threat_level": 4.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "c2d84771-a6dc-495a-857d-20a320d7059c", "DetectTime": "2024-05-21T12:34:23.536513+00:00", "EventTime": "2024-05-21T12:34:23.536534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0C2rLKJXjD7qJea"], "accumulated_threat_level": 5.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "9f204551-d498-4a8c-a1ff-f7add61be5cc", "DetectTime": "2024-05-21T12:34:23.717643+00:00", "EventTime": "2024-05-21T12:34:23.717663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C91YmHcpzKkxy5ep4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "72c38c5e-fe7e-4f7f-814e-e911fb6cd0e9", "DetectTime": "2024-05-21T12:34:23.768467+00:00", "EventTime": "2024-05-21T12:34:23.768490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CudoOy1HTOh3O08ws4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "1f6b4b4a-9696-4c0f-99ed-d436f5697e82", "DetectTime": "2024-05-21T12:34:23.809829+00:00", "EventTime": "2024-05-21T12:34:23.809849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2eAt1JUQroP8k55"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 79} +{"Format": "IDEA0", "ID": "46b1318f-8783-4b4d-91ac-f7ebd5a13f8d", "DetectTime": "2024-05-21T12:34:23.815308+00:00", "EventTime": "2024-05-21T12:34:23.815326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfPe63j9LlFHD4d1j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "3b787c34-923c-4aba-a9d5-d9aafa7b79ca", "DetectTime": "2024-05-21T12:34:23.869916+00:00", "EventTime": "2024-05-21T12:34:23.869934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfl6UaLmq2cbsqSqb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "1b173654-dbb6-4549-af29-304a8b0f304e", "DetectTime": "2024-05-21T12:34:23.907277+00:00", "EventTime": "2024-05-21T12:34:23.907297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY0WAo2Mp9jISWXLpc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "414c7900-1849-41db-85d1-296f81779e88", "DetectTime": "2024-05-21T12:34:24.198229+00:00", "EventTime": "2024-05-21T12:34:24.198251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3lFHv1oWDn2ZhniSl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "2f03f952-8cfa-4613-99c3-617f05d957e6", "DetectTime": "2024-05-21T12:34:24.203293+00:00", "EventTime": "2024-05-21T12:34:24.203311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE6Ltv3mjdgROICJS5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "bb5a2d95-236f-44d0-8a7b-e96f3174f627", "DetectTime": "2024-05-21T12:34:24.257553+00:00", "EventTime": "2024-05-21T12:34:24.257573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYWMu1ruYARvah5S4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "06441793-cc64-4ba4-a494-edfeaef704c5", "DetectTime": "2024-05-21T12:34:24.286636+00:00", "EventTime": "2024-05-21T12:34:24.286658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czw6ci3YFMNbYgmGRg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "3bca5516-1ce7-4d8b-840e-0c47e4cf781a", "DetectTime": "2024-05-21T12:34:24.326646+00:00", "EventTime": "2024-05-21T12:34:24.326667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGclqE3dUN05S0Rj81"], "accumulated_threat_level": 9.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "92941f3d-3e29-4bb7-8c93-966b94948c44", "DetectTime": "2024-05-21T12:34:24.345203+00:00", "EventTime": "2024-05-21T12:34:24.345227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQ4l3rgyqw4zyJYc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "dece0e38-3444-4106-9a8d-0705e2ef5403", "DetectTime": "2024-05-21T12:34:24.392376+00:00", "EventTime": "2024-05-21T12:34:24.392396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgFl04RZmM71dcSxd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "230da68d-a372-4ae0-8ab8-3da5938d65f8", "DetectTime": "2024-05-21T12:34:24.418609+00:00", "EventTime": "2024-05-21T12:34:24.418629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGdJo42f9y3Y6rDIl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "7e8cfe8c-9981-4a34-a7fc-40a5e43c380b", "DetectTime": "2024-05-21T12:34:24.457423+00:00", "EventTime": "2024-05-21T12:34:24.457442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClZAis1HOjgfe2B23"], "accumulated_threat_level": 10.4, "timewindow": 79} +{"Format": "IDEA0", "ID": "d73bad86-9f8b-4fde-b659-0a022db088a2", "DetectTime": "2024-05-21T12:34:24.477222+00:00", "EventTime": "2024-05-21T12:34:24.477245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWYe92brS8VZQ0aV1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "c504c22f-472c-42c4-aa67-989e5efb6818", "DetectTime": "2024-05-21T12:34:24.510625+00:00", "EventTime": "2024-05-21T12:34:24.510644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYSjQrPRMVEp5N8d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "83d49eb1-6986-412a-bd63-1d37a9ddbda2", "DetectTime": "2024-05-21T12:34:24.794447+00:00", "EventTime": "2024-05-21T12:34:24.794471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7rfi4MEMMg2nS7X8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 79} +{"Format": "IDEA0", "ID": "ac0481b7-de5c-44a8-8302-069b518de42d", "DetectTime": "2024-05-21T12:34:25.026930+00:00", "EventTime": "2024-05-21T12:34:25.026953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ToJc41YFGvkHksb9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "601d8272-2ebb-4086-8e7d-a1f533c05ff6", "DetectTime": "2024-05-21T12:34:25.032332+00:00", "EventTime": "2024-05-21T12:34:25.032352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2QMny2qN6JOJNews5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "b8184b88-7067-4ef9-bb5d-be23b3c6b7f6", "DetectTime": "2024-05-21T12:34:25.118269+00:00", "EventTime": "2024-05-21T12:34:25.118289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzlmzmMgdQFe26l2j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e6a77b3e-a8cd-4cf3-8b82-a7832b6f6bc1", "DetectTime": "2024-05-21T12:34:25.123802+00:00", "EventTime": "2024-05-21T12:34:25.123825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBUlH3nnFlJoBCx84"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "79a5e736-3308-4b05-a315-ab14aff4c34d", "DetectTime": "2024-05-21T12:34:25.128920+00:00", "EventTime": "2024-05-21T12:34:25.128940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWK3cu1yEoPbnIIwEj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e3ce3b70-8841-4003-bd7e-94d99bdc65d7", "DetectTime": "2024-05-21T12:34:25.184345+00:00", "EventTime": "2024-05-21T12:34:25.184366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkZVca1u8vg8crN2Wi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e1dd88cf-9b8d-4d8f-a0cb-2f9af07945ee", "DetectTime": "2024-05-21T12:34:25.201090+00:00", "EventTime": "2024-05-21T12:34:25.201109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkzZy3YWXDCTLv0Ma"], "accumulated_threat_level": 12.000000000000002, "timewindow": 79} +{"Format": "Json", "ID": "e1dd88cf-9b8d-4d8f-a0cb-2f9af07945ee", "DetectTime": "2024-05-21T12:34:25.201090+00:00", "EventTime": "2024-05-21T12:34:25.201109+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-04T06:52:36.214759+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2024/05/21 12:34:25.370026)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 79, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "37ee60ff-c36f-44a7-83c3-ade2a819e803", "DetectTime": "2024-05-21T12:34:25.374233+00:00", "EventTime": "2024-05-21T12:34:25.374252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COpPeo4HwG6K6RIbp"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "6d2cec9f-00d7-49d5-9382-e190c93993f9", "DetectTime": "2024-05-21T12:34:25.378868+00:00", "EventTime": "2024-05-21T12:34:25.378888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSAaDq3zINkfnS2mkk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "301f0e42-b7b0-4093-b7c3-8a9318a0d9ee", "DetectTime": "2024-05-21T12:34:25.383726+00:00", "EventTime": "2024-05-21T12:34:25.383745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaepFO2ck2awUOzw2e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e6565555-962f-48f6-9f0c-62c698f5339b", "DetectTime": "2024-05-21T12:34:25.389191+00:00", "EventTime": "2024-05-21T12:34:25.389210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtyqgRhAfL6U61me"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "394f4695-56cd-4a65-a0a0-5a792885e86f", "DetectTime": "2024-05-21T12:34:25.661774+00:00", "EventTime": "2024-05-21T12:34:25.661794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPl2DKLF63y5I6c4"], "accumulated_threat_level": 0.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "174eca5a-2e9c-4572-9b77-70ff475a9eb5", "DetectTime": "2024-05-21T12:34:25.688561+00:00", "EventTime": "2024-05-21T12:34:25.688581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTAnD2Qbdl9xfD603"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "acdeb661-9c45-40bd-a313-f4dfa43e6336", "DetectTime": "2024-05-21T12:34:25.693278+00:00", "EventTime": "2024-05-21T12:34:25.693297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxXnx2LD47YBIHA46"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e7faa72c-745b-4ab6-a1ef-4edad1d6ab80", "DetectTime": "2024-05-21T12:34:25.751392+00:00", "EventTime": "2024-05-21T12:34:25.751413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhu4e3iw2aLUNdVTg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "bd3a2347-92bd-4c0c-a02c-fa2509a36427", "DetectTime": "2024-05-21T12:34:25.765106+00:00", "EventTime": "2024-05-21T12:34:25.765129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuM8B10r4ZW46Z87g"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "0dcb71d8-60b9-49ec-b4b3-af17fa112668", "DetectTime": "2024-05-21T12:34:25.819431+00:00", "EventTime": "2024-05-21T12:34:25.819450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Q9JOKY22pmbMAb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 79} +{"Format": "IDEA0", "ID": "5fbe4aea-8ef8-40ae-b70a-307332f27708", "DetectTime": "2024-05-21T12:34:25.868875+00:00", "EventTime": "2024-05-21T12:34:25.868894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9G3QI2O6wnkmk0vYa"], "accumulated_threat_level": 3.2, "timewindow": 79} +{"Format": "IDEA0", "ID": "08ed4ddc-dbf3-4fd0-8037-50417b1670b4", "DetectTime": "2024-05-21T12:34:25.913163+00:00", "EventTime": "2024-05-21T12:34:25.913181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoAbr73D6oWqCOIujj"], "accumulated_threat_level": 4.0, "timewindow": 79} +{"Format": "IDEA0", "ID": "e22d0c4c-b46d-4e7d-bac9-7590552e5ae0", "DetectTime": "2024-05-21T12:34:25.930430+00:00", "EventTime": "2024-05-21T12:34:25.930450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwy59h2azbOezGydx1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "6ce89f80-260d-46f5-879a-baf6f71b9519", "DetectTime": "2024-05-21T12:34:25.976081+00:00", "EventTime": "2024-05-21T12:34:25.976102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWOVRH34TwHVtSa8d1"], "accumulated_threat_level": 4.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "80a458ed-aebe-4d26-b160-834f245b08f0", "DetectTime": "2024-05-21T12:34:26.012319+00:00", "EventTime": "2024-05-21T12:34:26.012339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD8Ew237BtHurCmIqa"], "accumulated_threat_level": 5.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "c3aa1afa-86eb-4ab2-af3d-8a002f07c5a7", "DetectTime": "2024-05-21T12:34:26.050285+00:00", "EventTime": "2024-05-21T12:34:26.050303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEXWr4WPPtm3ix3sb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 79} +{"Format": "IDEA0", "ID": "7ce355e8-35bb-4cf3-8f5f-e3ed1d6bafb8", "DetectTime": "2024-05-21T12:34:26.182850+00:00", "EventTime": "2024-05-21T12:34:26.182871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CivZ0l314CB4yPnyXf", "CiGGvQ3OiXFjL87k1d", "CKzJ8J2iAp7gQfZTuh", "CnAQPq2T234K5DnOF9"], "accumulated_threat_level": 0.5, "timewindow": 80} +{"Format": "IDEA0", "ID": "1d3073a0-7d82-44cc-876d-9cb438957458", "DetectTime": "2024-05-21T12:34:26.312631+00:00", "EventTime": "2024-05-21T12:34:26.312653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIfk8r3GfuLVNbKYu2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "820fe5d8-fff7-4b23-907c-9cad0e271cbb", "DetectTime": "2024-05-21T12:34:26.318131+00:00", "EventTime": "2024-05-21T12:34:26.318150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.64.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKgxv3JGtM7s5GFed"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "02c6f2f5-13f7-470a-8a18-cf4d64eec5b5", "DetectTime": "2024-05-21T12:34:26.322804+00:00", "EventTime": "2024-05-21T12:34:26.322823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.158.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb76fZ3yMRqqz0svV2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "8f335be7-4445-4994-933a-d79829e07bd2", "DetectTime": "2024-05-21T12:34:26.364071+00:00", "EventTime": "2024-05-21T12:34:26.364096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJvEG3x0AXhWHphWe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "29ad8ebc-57f6-472a-aa8c-f5e13fea9651", "DetectTime": "2024-05-21T12:34:26.435089+00:00", "EventTime": "2024-05-21T12:34:26.435109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OJ5k4oRYru7BNJoi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "b27168b8-6a8e-4cff-8761-b547fa260fb0", "DetectTime": "2024-05-21T12:34:26.471459+00:00", "EventTime": "2024-05-21T12:34:26.471477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZGRo4JkpBV8x2Rc8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 79} +{"Format": "IDEA0", "ID": "82d41bda-f4fa-41c9-8469-6b7996eb3b5a", "DetectTime": "2024-05-21T12:34:26.504043+00:00", "EventTime": "2024-05-21T12:34:26.504064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL27S64h7QWZ50I142"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "92e34185-2b7a-4114-9c0b-a3414b615bf2", "DetectTime": "2024-05-21T12:34:26.543287+00:00", "EventTime": "2024-05-21T12:34:26.543312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["139.194.211.145"]}], "Attach": [{"Content": "Connection to unknown destination port 9285/UDP destination IP 139.194.211.145. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV0GBhsEbdBbBuuJ6"], "accumulated_threat_level": 9.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "f68d29d9-226e-440b-8cfe-fca13a2ce344", "DetectTime": "2024-05-21T12:34:26.581754+00:00", "EventTime": "2024-05-21T12:34:26.581774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP3rKM11tQ0yFsVU74"], "accumulated_threat_level": 10.4, "timewindow": 79} +{"Format": "IDEA0", "ID": "01d12e8a-6c93-43a4-9257-77caad0b37a0", "DetectTime": "2024-05-21T12:34:26.609551+00:00", "EventTime": "2024-05-21T12:34:26.609572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn0Fer4QczEAAg0H8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "ecc9ceba-d781-4c28-9267-0b76a3a5c4fd", "DetectTime": "2024-05-21T12:34:26.650678+00:00", "EventTime": "2024-05-21T12:34:26.650699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.88.250.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbw7um3M3Lz539bBve"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "6dda0557-1067-454e-b15a-545f583828e5", "DetectTime": "2024-05-21T12:34:26.688714+00:00", "EventTime": "2024-05-21T12:34:26.688735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6TJBu2HubrCo6rPN2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "88a36abc-6365-47c9-b384-d5c9b0dd2486", "DetectTime": "2024-05-21T12:34:26.700049+00:00", "EventTime": "2024-05-21T12:34:26.700070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C03feH2JKgpiMaullh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 79} +{"Format": "IDEA0", "ID": "4e2860cd-a2fe-4b4c-a9fb-2ffb19233cd0", "DetectTime": "2024-05-21T12:34:26.993382+00:00", "EventTime": "2024-05-21T12:34:26.993403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdW833SYpPIVlg4yl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "232abce4-34ce-4f26-8537-96cfb2d22502", "DetectTime": "2024-05-21T12:34:27.000067+00:00", "EventTime": "2024-05-21T12:34:27.000090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxKu7lriBn7jhNFdl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "0972d249-5baa-4428-bbbf-5b496b50cecd", "DetectTime": "2024-05-21T12:34:27.025693+00:00", "EventTime": "2024-05-21T12:34:27.025715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTuCvl2WAFYioxt5Pf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "463bfbbe-f8a8-4fde-ac88-a67040af4a76", "DetectTime": "2024-05-21T12:34:27.031960+00:00", "EventTime": "2024-05-21T12:34:27.031982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.113.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDuLq3qTwvKR7GHs5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "4c304fb6-cb20-417b-93fb-a74752f49e8e", "DetectTime": "2024-05-21T12:34:27.044964+00:00", "EventTime": "2024-05-21T12:34:27.044985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.164.177.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgCge4fdKaCjpRAGe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "ff9fd6ef-308b-441c-88c1-bc3133d1c75c", "DetectTime": "2024-05-21T12:34:27.054647+00:00", "EventTime": "2024-05-21T12:34:27.054667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5V6BFdBloMAXE1pj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "169c95d5-32d7-4a36-80c9-1047bb4c7cdc", "DetectTime": "2024-05-21T12:34:27.110094+00:00", "EventTime": "2024-05-21T12:34:27.110112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "Connection to unknown destination port 2042/UDP destination IP 14.214.247.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5lHK2KwUZRroQDg3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 79} +{"Format": "Json", "ID": "169c95d5-32d7-4a36-80c9-1047bb4c7cdc", "DetectTime": "2024-05-21T12:34:27.110094+00:00", "EventTime": "2024-05-21T12:34:27.110112+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.214.247.251"]}], "Attach": [{"Content": "1970-01-04T06:53:18.079053+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 79. (real time 2024/05/21 12:34:27.333623)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 79, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a26384a7-e271-4a73-ae36-a4a27ac85c86", "DetectTime": "2024-05-21T12:34:27.338003+00:00", "EventTime": "2024-05-21T12:34:27.338024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyKtLn2OX53JzNP93"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "aac1fdd6-53c3-4b76-aaac-7a03c0eaf580", "DetectTime": "2024-05-21T12:34:27.350243+00:00", "EventTime": "2024-05-21T12:34:27.350262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrJgO3q927JdeAXH3"], "accumulated_threat_level": 0.8, "timewindow": 79} +{"Format": "IDEA0", "ID": "2436b22d-3336-4e75-bf0f-163da2f1b620", "DetectTime": "2024-05-21T12:34:27.362283+00:00", "EventTime": "2024-05-21T12:34:27.362304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPFj76pEz7dUeY1c"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "2f0b7ce8-0ef2-462f-9c09-580177c79966", "DetectTime": "2024-05-21T12:34:27.372424+00:00", "EventTime": "2024-05-21T12:34:27.372442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0hUYe35JlmxxAsVo3"], "accumulated_threat_level": 1.3, "timewindow": 80} +{"Format": "IDEA0", "ID": "27e08240-71bc-478b-a0ef-3461575e50cb", "DetectTime": "2024-05-21T12:34:27.570104+00:00", "EventTime": "2024-05-21T12:34:27.570127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.64.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllTLS2WkKNOxvxsF8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "2b71cfec-75da-4f05-9c20-f454ca3265f3", "DetectTime": "2024-05-21T12:34:27.842876+00:00", "EventTime": "2024-05-21T12:34:27.842897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cebare20T41lmSvQAi"], "accumulated_threat_level": 2.1, "timewindow": 80} +{"Format": "IDEA0", "ID": "69d9df90-b07c-438c-ab6c-9c35875e6194", "DetectTime": "2024-05-21T12:34:27.880762+00:00", "EventTime": "2024-05-21T12:34:27.880783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmXTr4Ttm3hSULUc4"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 80} +{"Format": "IDEA0", "ID": "9cb4c0c0-0a98-49dd-ad0a-6234a20716c6", "DetectTime": "2024-05-21T12:34:27.933122+00:00", "EventTime": "2024-05-21T12:34:27.933141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrHRd4RCM2uyve5Yj"], "accumulated_threat_level": 3.7, "timewindow": 80} +{"Format": "IDEA0", "ID": "867d3f97-8625-4378-b6db-d605a39f0549", "DetectTime": "2024-05-21T12:34:27.975011+00:00", "EventTime": "2024-05-21T12:34:27.975029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcSUGI3QSvsmjikNU2"], "accumulated_threat_level": 4.5, "timewindow": 80} +{"Format": "IDEA0", "ID": "0a0ce1aa-02c3-4a32-ad84-a96d32ba6d57", "DetectTime": "2024-05-21T12:34:28.007921+00:00", "EventTime": "2024-05-21T12:34:28.007940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEn2t5AeeyegFyX1"], "accumulated_threat_level": 5.3, "timewindow": 80} +{"Format": "IDEA0", "ID": "ae5edb15-06df-46b5-8d92-0d25c00e7e8f", "DetectTime": "2024-05-21T12:34:28.131254+00:00", "EventTime": "2024-05-21T12:34:28.131275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.88.250.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCOZh2LnywNHf9vYd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "3f5611c7-52bd-4175-a3c0-e5bef3040f2c", "DetectTime": "2024-05-21T12:34:28.184929+00:00", "EventTime": "2024-05-21T12:34:28.184948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2tDl1ZrXMiKroBk1"], "accumulated_threat_level": 6.1, "timewindow": 80} +{"Format": "IDEA0", "ID": "8c04b0f7-3246-476f-9ff2-09e28150292e", "DetectTime": "2024-05-21T12:34:28.225467+00:00", "EventTime": "2024-05-21T12:34:28.225487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXnW33xlkld7emwRi"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 80} +{"Format": "IDEA0", "ID": "0bc674b9-03ff-4e2f-a4e2-a07bc64fa9f9", "DetectTime": "2024-05-21T12:34:28.276833+00:00", "EventTime": "2024-05-21T12:34:28.276853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpnudd173bu5ZTPtw7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "963776ab-0af8-4692-8403-ae0b9c59a0a9", "DetectTime": "2024-05-21T12:34:28.326494+00:00", "EventTime": "2024-05-21T12:34:28.326513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxFmS3nUDx3Ad4Dkd"], "accumulated_threat_level": 8.5, "timewindow": 80} +{"Format": "IDEA0", "ID": "60b30f01-dc17-4f6b-a4d4-6536846555e1", "DetectTime": "2024-05-21T12:34:28.445230+00:00", "EventTime": "2024-05-21T12:34:28.445252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87de049So4mESzDb7"], "accumulated_threat_level": 9.3, "timewindow": 80} +{"Format": "IDEA0", "ID": "c2e5c777-458a-4ebe-9625-dd14401bdb65", "DetectTime": "2024-05-21T12:34:28.668786+00:00", "EventTime": "2024-05-21T12:34:28.668809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjDC22RL2WidlXjPh", "CL6Pj44OqbGDc2AY46", "CRc4uD1PZIO7b9lVyc", "CpasNw122ZbKejAXN"], "accumulated_threat_level": 9.8, "timewindow": 80} +{"Format": "IDEA0", "ID": "75ad0180-2045-4007-a377-198e473014bc", "DetectTime": "2024-05-21T12:34:28.809000+00:00", "EventTime": "2024-05-21T12:34:28.809024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wXa41hxmCRdS0nAd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "d479c3fb-4559-4d07-9ec4-6c4e2856cc43", "DetectTime": "2024-05-21T12:34:29.117997+00:00", "EventTime": "2024-05-21T12:34:29.118018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqhmVD4SvGHxCOHcz9"], "accumulated_threat_level": 10.600000000000001, "timewindow": 80} +{"Format": "IDEA0", "ID": "df05dfcb-8c6d-4459-89f8-506ff7dff5bf", "DetectTime": "2024-05-21T12:34:29.150048+00:00", "EventTime": "2024-05-21T12:34:29.150071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM8yhj1B5RghGBNSa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "368219ef-3a7a-4d4c-a114-a31b97419f53", "DetectTime": "2024-05-21T12:34:29.155816+00:00", "EventTime": "2024-05-21T12:34:29.155838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzXuq35OhJcvw8LSc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "8b715ec2-ca2e-4e49-ba57-0bc4cc80ef19", "DetectTime": "2024-05-21T12:34:29.161091+00:00", "EventTime": "2024-05-21T12:34:29.161110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJnp9rtNCm7hvupf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "7b4ebeb8-4e6e-46f5-be24-f0364bc19f80", "DetectTime": "2024-05-21T12:34:29.165380+00:00", "EventTime": "2024-05-21T12:34:29.165397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiJH15YQNeUD6mL1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "0c9f13be-960c-4e4c-954c-82b19b2b3e8a", "DetectTime": "2024-05-21T12:34:29.170219+00:00", "EventTime": "2024-05-21T12:34:29.170238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaglNx2NJFZvtXY74c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "0b3bff9f-79fe-469c-8888-68f10197a149", "DetectTime": "2024-05-21T12:34:29.192852+00:00", "EventTime": "2024-05-21T12:34:29.192874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgNuan3y2sFvwdzPj1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "0b49f98a-6259-465a-a483-a38b2ecfb39e", "DetectTime": "2024-05-21T12:34:29.332378+00:00", "EventTime": "2024-05-21T12:34:29.332400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgFMg1sUj9ZwIu3J5"], "accumulated_threat_level": 11.400000000000002, "timewindow": 80} +{"Format": "IDEA0", "ID": "84cff996-0f95-4351-8be9-83eb45c94b4a", "DetectTime": "2024-05-21T12:34:29.337590+00:00", "EventTime": "2024-05-21T12:34:29.337610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqybgzeNSXdbzqcrk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "bd273919-1e3d-43cb-bf3a-6d5b9d20596e", "DetectTime": "2024-05-21T12:34:29.395541+00:00", "EventTime": "2024-05-21T12:34:29.395568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAFQ21QnnrxaL09xd"], "accumulated_threat_level": 12.200000000000003, "timewindow": 80} +{"Format": "Json", "ID": "bd273919-1e3d-43cb-bf3a-6d5b9d20596e", "DetectTime": "2024-05-21T12:34:29.395541+00:00", "EventTime": "2024-05-21T12:34:29.395568+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-04T07:24:13.029795+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2024/05/21 12:34:29.658959)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 80, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "937b9a15-aed7-4072-ae50-126d60371e4f", "DetectTime": "2024-05-21T12:34:29.669843+00:00", "EventTime": "2024-05-21T12:34:29.669863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV6e822MFx2RDTVwDa"], "accumulated_threat_level": 0.8, "timewindow": 80} +{"Format": "IDEA0", "ID": "494d6abb-7e8b-4ae7-89fc-08b8772e91eb", "DetectTime": "2024-05-21T12:34:29.707160+00:00", "EventTime": "2024-05-21T12:34:29.707201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCc1W92aJDn1CC5Enl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "5166f799-282d-4512-a953-fc19ee1dfe20", "DetectTime": "2024-05-21T12:34:29.713016+00:00", "EventTime": "2024-05-21T12:34:29.713038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41VcO25Cdi6OUgUNd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "5d4a0deb-a1f1-42f3-8008-8b6f69227b18", "DetectTime": "2024-05-21T12:34:29.717843+00:00", "EventTime": "2024-05-21T12:34:29.717862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0umONXBrBYH0Sie"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "3aeb10d6-47e2-44a6-82e7-5e2f6a2c0182", "DetectTime": "2024-05-21T12:34:29.722565+00:00", "EventTime": "2024-05-21T12:34:29.722584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw57ZQ1YsrjfAy7R2d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "a2d064bd-65d6-430d-9114-039191611276", "DetectTime": "2024-05-21T12:34:29.727485+00:00", "EventTime": "2024-05-21T12:34:29.727504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxK5El1c0DJKItF1q1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "691acd37-eaa7-4d0a-8fab-e58983eb4e98", "DetectTime": "2024-05-21T12:34:29.828949+00:00", "EventTime": "2024-05-21T12:34:29.828977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdO6LThSW89Hh2Je"], "accumulated_threat_level": 1.6, "timewindow": 80} +{"Format": "IDEA0", "ID": "7ead105d-cd6f-4874-b674-addfea57bd75", "DetectTime": "2024-05-21T12:34:29.892048+00:00", "EventTime": "2024-05-21T12:34:29.892069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVd7A4qdYY8xHLoy2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "51dfda34-c28f-4377-8fe4-4abf89c277ec", "DetectTime": "2024-05-21T12:34:29.915535+00:00", "EventTime": "2024-05-21T12:34:29.915557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1mEei32grRuf59qp6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "045174e0-9b57-494e-95d2-af52214553bb", "DetectTime": "2024-05-21T12:34:29.947934+00:00", "EventTime": "2024-05-21T12:34:29.947953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEfLz47JB23BXLbdi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 80} +{"Format": "IDEA0", "ID": "a95d62e9-5303-4fbc-8069-5de8aac40a6d", "DetectTime": "2024-05-21T12:34:29.987481+00:00", "EventTime": "2024-05-21T12:34:29.987502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPsePo36HSdFK3GQq6"], "accumulated_threat_level": 3.2, "timewindow": 80} +{"Format": "IDEA0", "ID": "190321ac-9f5d-4f94-ac25-0a07ed30c677", "DetectTime": "2024-05-21T12:34:30.247471+00:00", "EventTime": "2024-05-21T12:34:30.247493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmYYC42TOFXmIDBX3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "5ed366f8-a008-4fa9-93ca-352d09b38006", "DetectTime": "2024-05-21T12:34:30.280206+00:00", "EventTime": "2024-05-21T12:34:30.280227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb35Qc3I9x2u5gkBpk"], "accumulated_threat_level": 4.0, "timewindow": 80} +{"Format": "IDEA0", "ID": "bafadb29-fd6a-4d89-8256-c3154a0f6ffa", "DetectTime": "2024-05-21T12:34:30.310197+00:00", "EventTime": "2024-05-21T12:34:30.310218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfo9FBJJ1CmKDgec"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "a16e591a-6873-46df-b396-d0721f25e8fe", "DetectTime": "2024-05-21T12:34:30.345678+00:00", "EventTime": "2024-05-21T12:34:30.345698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3tJKPEtFb6Lykre"], "accumulated_threat_level": 4.8, "timewindow": 80} +{"Format": "IDEA0", "ID": "6a9cc676-6ada-4cb8-8b73-8f84fc85a22b", "DetectTime": "2024-05-21T12:34:30.383169+00:00", "EventTime": "2024-05-21T12:34:30.383189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzCtP1Emb89sLTmL3"], "accumulated_threat_level": 5.6, "timewindow": 80} +{"Format": "IDEA0", "ID": "1c826277-60b2-41a7-a92a-ca772d4ebae1", "DetectTime": "2024-05-21T12:34:30.412657+00:00", "EventTime": "2024-05-21T12:34:30.412679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vaY6KXNNJLZEAca"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e9626743-3526-4b97-aa17-4a104b738854", "DetectTime": "2024-05-21T12:34:30.448403+00:00", "EventTime": "2024-05-21T12:34:30.448422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmaXQ1yTrVVRMgBn8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 80} +{"Format": "IDEA0", "ID": "2b40f5fb-8df9-4c7b-aa0a-5e2df20f0221", "DetectTime": "2024-05-21T12:34:30.467380+00:00", "EventTime": "2024-05-21T12:34:30.467400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gstP1zdhpGmBQPBf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "72f06dd3-e37f-466e-8232-5f1cc64ac767", "DetectTime": "2024-05-21T12:34:30.502388+00:00", "EventTime": "2024-05-21T12:34:30.502422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9w0xe4RdV1ZOu4Irg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "d0a44e0e-dc50-4835-81b2-7d44c35c8775", "DetectTime": "2024-05-21T12:34:30.546434+00:00", "EventTime": "2024-05-21T12:34:30.546452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dcGQ2JDvBNcgW7fe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "14c002ae-3e49-426a-9b80-1ce44c7a6e85", "DetectTime": "2024-05-21T12:34:30.584679+00:00", "EventTime": "2024-05-21T12:34:30.584698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWsxWN1sYAColPTg0l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "e70afe19-cf4e-4524-8290-8d0d23905bcf", "DetectTime": "2024-05-21T12:34:30.634036+00:00", "EventTime": "2024-05-21T12:34:30.634055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3mXK33LIp3ET9WHb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "b5c0e2b7-7428-40db-b9fd-3eb49a784b50", "DetectTime": "2024-05-21T12:34:30.685966+00:00", "EventTime": "2024-05-21T12:34:30.685987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBGQH20RzIJbtDzZ7"], "accumulated_threat_level": 9.6, "timewindow": 80} +{"Format": "IDEA0", "ID": "102ef4d3-18f5-48c8-9e47-a4fb44fe9a16", "DetectTime": "2024-05-21T12:34:30.723397+00:00", "EventTime": "2024-05-21T12:34:30.723415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fDVD1Ic67GSz9K7j"], "accumulated_threat_level": 10.4, "timewindow": 80} +{"Format": "IDEA0", "ID": "6c3ffb9a-38a5-4091-a226-a12bb8eee0a6", "DetectTime": "2024-05-21T12:34:30.965375+00:00", "EventTime": "2024-05-21T12:34:30.965396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UpVY3RhFdCXZnytl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "7fe4f9ab-23c0-4a00-853b-1db21c914e2b", "DetectTime": "2024-05-21T12:34:31.102461+00:00", "EventTime": "2024-05-21T12:34:31.102484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.143.18"]}], "Attach": [{"Content": "Connection to unknown destination port 5326/TCP destination IP 176.73.143.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjS1zj3oe9S2ErpWHh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 80} +{"Format": "IDEA0", "ID": "ace5144a-a3e7-41aa-88df-148f0780f635", "DetectTime": "2024-05-21T12:34:31.462400+00:00", "EventTime": "2024-05-21T12:34:31.462432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crb0OX3sajXjgLyYF6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 80} +{"Format": "Json", "ID": "ace5144a-a3e7-41aa-88df-148f0780f635", "DetectTime": "2024-05-21T12:34:31.462400+00:00", "EventTime": "2024-05-21T12:34:31.462432+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "1970-01-04T07:55:28.733133+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2024/05/21 12:34:31.605172)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 80, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "dccf6efb-3f7f-4ae9-86b4-3220490cc64e", "DetectTime": "2024-05-21T12:34:31.610993+00:00", "EventTime": "2024-05-21T12:34:31.611010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmsuyz3UoblOvZOpF6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "17196ea0-2ab8-4d3a-b4a0-4e1821b2234c", "DetectTime": "2024-05-21T12:34:31.775502+00:00", "EventTime": "2024-05-21T12:34:31.775521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RpMO2yIpnH6VklZ2"], "accumulated_threat_level": 0.8, "timewindow": 80} +{"Format": "IDEA0", "ID": "daaccfc8-d26e-4eb5-bc93-899d9b178982", "DetectTime": "2024-05-21T12:34:31.825317+00:00", "EventTime": "2024-05-21T12:34:31.825340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGgOoeTCTNwzbSzl"], "accumulated_threat_level": 1.6, "timewindow": 80} +{"Format": "IDEA0", "ID": "4f0f218b-add5-4517-8020-2b307406a053", "DetectTime": "2024-05-21T12:34:31.966537+00:00", "EventTime": "2024-05-21T12:34:31.966558+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAo6z3jiOQKKgiSj6"], "accumulated_threat_level": 1.624, "timewindow": 80} +{"Format": "IDEA0", "ID": "e9a78bf1-06f3-4167-9e72-4399583d3506", "DetectTime": "2024-05-21T12:34:32.004878+00:00", "EventTime": "2024-05-21T12:34:32.004897+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["217.220.223.98"], "Type": ["CC"]}, {"IP4": ["217.220.223.98"], "Type": ["CC"], "Port": [4580], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 217.220.223.98 port: 4580/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAo6z3jiOQKKgiSj6"], "accumulated_threat_level": 0, "timewindow": 80} +{"Format": "IDEA0", "ID": "374bdbe4-227a-4393-8e85-078fa9683870", "DetectTime": "2024-05-21T12:34:32.097852+00:00", "EventTime": "2024-05-21T12:34:32.097874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bra12CQF8Sk8xKYd"], "accumulated_threat_level": 2.4240000000000004, "timewindow": 80} +{"Format": "IDEA0", "ID": "301485b5-c720-4b15-8aff-7a4816aa91a9", "DetectTime": "2024-05-21T12:34:32.151282+00:00", "EventTime": "2024-05-21T12:34:32.151301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbFt1b3c4vHbqJSI1k"], "accumulated_threat_level": 3.224, "timewindow": 80} +{"Format": "IDEA0", "ID": "a77ff351-2b2d-4854-9929-55dff3dafccc", "DetectTime": "2024-05-21T12:34:32.198199+00:00", "EventTime": "2024-05-21T12:34:32.198217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwxJK3ZwxUQ2J8QN8"], "accumulated_threat_level": 4.024, "timewindow": 80} +{"Format": "IDEA0", "ID": "3cad5b37-acbe-4f36-9d2b-7c319648b409", "DetectTime": "2024-05-21T12:34:32.241462+00:00", "EventTime": "2024-05-21T12:34:32.241489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfBGUb90dKAKy8h"], "accumulated_threat_level": 4.824, "timewindow": 80} +{"Format": "IDEA0", "ID": "13ad82e1-3326-4acb-9584-2657557f66f0", "DetectTime": "2024-05-21T12:34:32.288119+00:00", "EventTime": "2024-05-21T12:34:32.288138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMxwB1xOOPDcWOvQ5"], "accumulated_threat_level": 5.624, "timewindow": 80} +{"Format": "IDEA0", "ID": "57e917fb-fbf1-4d0d-8993-9f25950b9d2d", "DetectTime": "2024-05-21T12:34:32.329777+00:00", "EventTime": "2024-05-21T12:34:32.329798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwupg437E5A0rsnrZ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "1b6d9221-ee16-400e-93d0-2d526b90a20d", "DetectTime": "2024-05-21T12:34:32.360887+00:00", "EventTime": "2024-05-21T12:34:32.360905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVb5F8bOidoEGbr0j"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 80} +{"Format": "IDEA0", "ID": "2f8eb249-1ad2-4310-9dc7-25b5a0bab43c", "DetectTime": "2024-05-21T12:34:32.400035+00:00", "EventTime": "2024-05-21T12:34:32.400055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVutV1VxzWpu8ug7e"], "accumulated_threat_level": 7.223999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "2f9434e0-9079-4689-bd3d-1fcf4deac68f", "DetectTime": "2024-05-21T12:34:32.530117+00:00", "EventTime": "2024-05-21T12:34:32.530135+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSOMm3CkT1XvG6GH7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "09467c32-5858-4a83-bf3f-1065d22dfad3", "DetectTime": "2024-05-21T12:34:32.542880+00:00", "EventTime": "2024-05-21T12:34:32.542899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSOMm3CkT1XvG6GH7"], "accumulated_threat_level": 5.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "297fc11f-3842-4321-a1e0-92a65660cf28", "DetectTime": "2024-05-21T12:34:32.558749+00:00", "EventTime": "2024-05-21T12:34:32.558768+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tthCkmS9fdDriJf"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "1873d75a-3ca2-44a4-b502-2b831fcdede7", "DetectTime": "2024-05-21T12:34:32.571280+00:00", "EventTime": "2024-05-21T12:34:32.571301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tthCkmS9fdDriJf"], "accumulated_threat_level": 5.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "95360408-ba1f-4d19-a505-9d1dbaceb23d", "DetectTime": "2024-05-21T12:34:32.587597+00:00", "EventTime": "2024-05-21T12:34:32.587615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMilV1OQgf0SkopKe"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "660f412a-2d9e-4722-a747-57220989d745", "DetectTime": "2024-05-21T12:34:32.599267+00:00", "EventTime": "2024-05-21T12:34:32.599286+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMilV1OQgf0SkopKe"], "accumulated_threat_level": 6.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "65e02ef9-16a2-4cd2-b951-d87a6f008f16", "DetectTime": "2024-05-21T12:34:33.037264+00:00", "EventTime": "2024-05-21T12:34:33.037284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEn0Az1KCLPBh3Gi"], "accumulated_threat_level": 8.024, "timewindow": 80} +{"Format": "IDEA0", "ID": "8717c280-2fea-4b0c-81e6-f39529bcb111", "DetectTime": "2024-05-21T12:34:33.064633+00:00", "EventTime": "2024-05-21T12:34:33.064657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWyfh3VExtH0a6fI8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "16d2fa21-8ae4-4d91-8903-cd47040d5784", "DetectTime": "2024-05-21T12:34:33.069679+00:00", "EventTime": "2024-05-21T12:34:33.069700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHclWPzI42NnnWJL3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "e3025707-9867-4905-824e-4e9f5211601b", "DetectTime": "2024-05-21T12:34:33.129993+00:00", "EventTime": "2024-05-21T12:34:33.130011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK2Ke34ykSnAESSP2f"], "accumulated_threat_level": 8.824, "timewindow": 80} +{"Format": "IDEA0", "ID": "e39fb1d1-4782-4f22-9d45-98fa3b97ab14", "DetectTime": "2024-05-21T12:34:33.170551+00:00", "EventTime": "2024-05-21T12:34:33.170574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.192.33.235"]}], "Attach": [{"Content": "Connection to unknown destination port 9139/UDP destination IP 31.192.33.235. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKPObQbbMMI6jsu6"], "accumulated_threat_level": 9.624, "timewindow": 80} +{"Format": "IDEA0", "ID": "efad1a01-391b-4de5-a304-5d012eaedc2d", "DetectTime": "2024-05-21T12:34:33.210895+00:00", "EventTime": "2024-05-21T12:34:33.210916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywI8P1WBy3TzZQg3e"], "accumulated_threat_level": 10.424000000000001, "timewindow": 80} +{"Format": "IDEA0", "ID": "a630b80c-aa5d-4ea9-a4be-e5814efac2bd", "DetectTime": "2024-05-21T12:34:33.255501+00:00", "EventTime": "2024-05-21T12:34:33.255520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCDFe0xA8NqKcOtc"], "accumulated_threat_level": 11.224000000000002, "timewindow": 80} +{"Format": "IDEA0", "ID": "3fd9c4cb-d180-4306-96f8-12eddf11585f", "DetectTime": "2024-05-21T12:34:33.296280+00:00", "EventTime": "2024-05-21T12:34:33.296301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJfWJg1hN4bFI7W1Nk"], "accumulated_threat_level": 12.024000000000003, "timewindow": 80} +{"Format": "Json", "ID": "3fd9c4cb-d180-4306-96f8-12eddf11585f", "DetectTime": "2024-05-21T12:34:33.296280+00:00", "EventTime": "2024-05-21T12:34:33.296301+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-04T07:56:05.812274+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 80. (real time 2024/05/21 12:34:33.501617)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 80, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "a060b477-1411-4e46-bc74-d93612e6f2e8", "DetectTime": "2024-05-21T12:34:33.512688+00:00", "EventTime": "2024-05-21T12:34:33.512714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74Frd3EFzBfYwtYA5"], "accumulated_threat_level": 0.8, "timewindow": 80} +{"Format": "IDEA0", "ID": "1767e02c-ce31-4ff2-bd5f-ad610c51a635", "DetectTime": "2024-05-21T12:34:33.524726+00:00", "EventTime": "2024-05-21T12:34:33.524757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQnKOe4tRaQhtxWt91"], "accumulated_threat_level": 1.6, "timewindow": 80} +{"Format": "IDEA0", "ID": "c5330ed5-e915-4f11-974a-de2bf0bf5338", "DetectTime": "2024-05-21T12:34:33.536563+00:00", "EventTime": "2024-05-21T12:34:33.536592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1Nne2F4bm3VyizTi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 80} +{"Format": "IDEA0", "ID": "bc6d7fec-0f8d-48a6-82ae-e97c29aeac1e", "DetectTime": "2024-05-21T12:34:33.541309+00:00", "EventTime": "2024-05-21T12:34:33.541328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u9aV1KDiV0h7BjF7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "078597f8-b5ac-474f-b39b-ede353136b83", "DetectTime": "2024-05-21T12:34:33.552912+00:00", "EventTime": "2024-05-21T12:34:33.552932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHoyx3DXBC6DDjzmj"], "accumulated_threat_level": 3.2, "timewindow": 80} +{"Format": "IDEA0", "ID": "115a091e-b71f-4ff0-a873-fe7de6bf6056", "DetectTime": "2024-05-21T12:34:33.567802+00:00", "EventTime": "2024-05-21T12:34:33.567836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbhUA85wIC1TLJxA5"], "accumulated_threat_level": 4.0, "timewindow": 80} +{"Format": "IDEA0", "ID": "6cb27458-37e0-42f8-8f8d-dae0e673cdb4", "DetectTime": "2024-05-21T12:34:33.865315+00:00", "EventTime": "2024-05-21T12:34:33.865335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.158.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvAUs4BkYhNCJEvfl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "10fd90af-2cb2-4318-af74-ee1987e74bff", "DetectTime": "2024-05-21T12:34:33.873592+00:00", "EventTime": "2024-05-21T12:34:33.873612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxIqv31zzXxUQYqBy7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "0b4245fc-1e58-4604-895a-7c3f3d0c874f", "DetectTime": "2024-05-21T12:34:33.878805+00:00", "EventTime": "2024-05-21T12:34:33.878828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9d053N65WfAZCX8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "aeafa381-2d94-4ef3-a36d-ab3992819a63", "DetectTime": "2024-05-21T12:34:33.884439+00:00", "EventTime": "2024-05-21T12:34:33.884458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YCOq1nypEHVqyDRg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "50b46962-a94a-4a6e-90f7-12ba08427ef0", "DetectTime": "2024-05-21T12:34:33.889366+00:00", "EventTime": "2024-05-21T12:34:33.889385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.164.177.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKuAsOTbSiu7ZxE5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "77e1c78e-94fa-46b5-b045-8925d1d4b169", "DetectTime": "2024-05-21T12:34:33.893872+00:00", "EventTime": "2024-05-21T12:34:33.893890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoE4k69TI4KiO05Ij"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "472d7f54-a3eb-4ec1-93dc-e63b7afe4e71", "DetectTime": "2024-05-21T12:34:34.027829+00:00", "EventTime": "2024-05-21T12:34:34.027855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwb6mU9OZW3XxiV9"], "accumulated_threat_level": 4.8, "timewindow": 80} +{"Format": "IDEA0", "ID": "b4758f9c-e5d8-4996-b42c-833eaa8fb4be", "DetectTime": "2024-05-21T12:34:34.035438+00:00", "EventTime": "2024-05-21T12:34:34.035458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx5kIy2ltRP8Ei9eY1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "f0d8ddb4-60e7-4e41-b3cd-b13438e685d3", "DetectTime": "2024-05-21T12:34:34.081919+00:00", "EventTime": "2024-05-21T12:34:34.081938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CujSQU2rI8UsDCh3Mc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "ede25178-22c1-4354-9471-d4405caa1a17", "DetectTime": "2024-05-21T12:34:34.154310+00:00", "EventTime": "2024-05-21T12:34:34.154330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccs7pE3RMZJw9tXEA9"], "accumulated_threat_level": 5.6, "timewindow": 80} +{"Format": "IDEA0", "ID": "f8eb64cb-1a2d-4133-b865-78a0eb4458d6", "DetectTime": "2024-05-21T12:34:34.196421+00:00", "EventTime": "2024-05-21T12:34:34.196440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKoor3AQwd2mIOI47"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 80} +{"Format": "IDEA0", "ID": "f4015188-5fee-47a3-b807-500f21f97d10", "DetectTime": "2024-05-21T12:34:34.483837+00:00", "EventTime": "2024-05-21T12:34:34.483857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CixsWF3pOOYPDow7ji"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "831c8932-ad5a-4864-a868-a62217864aaf", "DetectTime": "2024-05-21T12:34:34.523314+00:00", "EventTime": "2024-05-21T12:34:34.523335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.113.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgdvpj1hV2lBRKJh1j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 78} +{"Format": "IDEA0", "ID": "67b05be0-42b1-47cd-989e-88991cafcec2", "DetectTime": "2024-05-21T12:34:34.528440+00:00", "EventTime": "2024-05-21T12:34:34.528460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCh0xA3KBCbkeI63Ra"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "7a21834d-a255-4fe8-a47d-6b7ab85b3807", "DetectTime": "2024-05-21T12:34:34.533079+00:00", "EventTime": "2024-05-21T12:34:34.533097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.50.244.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnpgc2OBvmBjbz9Dh"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "238014e1-80a2-4595-a363-08bf3f956563", "DetectTime": "2024-05-21T12:34:34.604514+00:00", "EventTime": "2024-05-21T12:34:34.604537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYxYs3IgAOIf3RHtd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "438cb138-5232-4f6b-94ac-35980b0b7d25", "DetectTime": "2024-05-21T12:34:34.632819+00:00", "EventTime": "2024-05-21T12:34:34.632839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 60.164.177.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXzIc41logfALtnbb"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "25af5d2a-e135-4730-bbc6-d7d7ffa8c172", "DetectTime": "2024-05-21T12:34:34.667626+00:00", "EventTime": "2024-05-21T12:34:34.667646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSK5o3np8rhjwanh3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "14027ed4-ee4a-49ed-b8e2-5e27478da642", "DetectTime": "2024-05-21T12:34:34.697042+00:00", "EventTime": "2024-05-21T12:34:34.697065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.42.92.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP32n33XhA2NHpbWBf"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "443a748c-8947-46d8-9e57-35e48c33f87d", "DetectTime": "2024-05-21T12:34:34.728660+00:00", "EventTime": "2024-05-21T12:34:34.728680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70Qar284lxjFoNDZ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "fc0e971e-6315-4823-be18-afdcdccbbb43", "DetectTime": "2024-05-21T12:34:34.754512+00:00", "EventTime": "2024-05-21T12:34:34.754533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.83.113.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMmBv20XpafJ7vjPl"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "c6410d60-27f4-41eb-8e77-a61532e470c1", "DetectTime": "2024-05-21T12:34:34.840117+00:00", "EventTime": "2024-05-21T12:34:34.840135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch7rAu4IfFLZqqcdni"], "accumulated_threat_level": 0.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "9fed8ae9-852e-4df6-aa71-e79fbdd2ddce", "DetectTime": "2024-05-21T12:34:34.898146+00:00", "EventTime": "2024-05-21T12:34:34.898165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKa0A1XdZdzpGneKl", "CJHMrX2hAQ5ovXilB3", "C1GHGy8MEuBEKaFef", "CsSFz82Z318pF2c7Ok"], "accumulated_threat_level": 1.3, "timewindow": 81} +{"Format": "IDEA0", "ID": "28432418-3669-48e3-8eaf-189dfe6f6ae1", "DetectTime": "2024-05-21T12:34:35.042529+00:00", "EventTime": "2024-05-21T12:34:35.042554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CScBV14xSsZ2Q92Vkl"], "accumulated_threat_level": 2.1, "timewindow": 81} +{"Format": "IDEA0", "ID": "81392bbf-8e6f-48f9-a13b-d047ab2aeb73", "DetectTime": "2024-05-21T12:34:35.325292+00:00", "EventTime": "2024-05-21T12:34:35.325314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg2bhe1r1Yo81hx0oc"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "adf12804-53ef-4298-95f4-bf9898b9e022", "DetectTime": "2024-05-21T12:34:35.330582+00:00", "EventTime": "2024-05-21T12:34:35.330602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCZNV1Jpn0W0MaBQl"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "0044b03a-2042-46c7-b62a-0aee5fab4c6b", "DetectTime": "2024-05-21T12:34:35.336375+00:00", "EventTime": "2024-05-21T12:34:35.336398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsfUOa3QaEfsMrdlP2"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "42a24600-daef-4f89-9478-35822ebf9ebf", "DetectTime": "2024-05-21T12:34:35.341535+00:00", "EventTime": "2024-05-21T12:34:35.341556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwVaN3tjIuXUqGYN9"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "2586495b-0203-4cc5-83b1-c8e73ad2a68a", "DetectTime": "2024-05-21T12:34:35.354658+00:00", "EventTime": "2024-05-21T12:34:35.354676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6SfbC4cphOBxMRpeb"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 81} +{"Format": "IDEA0", "ID": "89488ab4-7a5b-4246-a178-c6c053a27540", "DetectTime": "2024-05-21T12:34:35.472088+00:00", "EventTime": "2024-05-21T12:34:35.472109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fPMa1U9KjHE8qR3h"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "1e88811a-77ee-4b1b-9d35-2d62e6474018", "DetectTime": "2024-05-21T12:34:35.531867+00:00", "EventTime": "2024-05-21T12:34:35.531889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9QrUo8CqT3cecR85"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "88cfd986-52c3-4478-822a-204a14e078e0", "DetectTime": "2024-05-21T12:34:35.537689+00:00", "EventTime": "2024-05-21T12:34:35.537708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTLam4AA3nRgdxtGd"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "02937b5c-8d54-464b-8349-b91ced41dd95", "DetectTime": "2024-05-21T12:34:35.542893+00:00", "EventTime": "2024-05-21T12:34:35.542913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7pif24RMoBwaevC8"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "aea26be4-d627-404c-84af-4adbc3101e20", "DetectTime": "2024-05-21T12:34:35.586122+00:00", "EventTime": "2024-05-21T12:34:35.586143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clt5EbcyXhajSMTP3"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "eee0f3dd-6618-49bb-85b9-c33e6bbe2363", "DetectTime": "2024-05-21T12:34:35.620131+00:00", "EventTime": "2024-05-21T12:34:35.620149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOsIR3Vn959JvcaZ9"], "accumulated_threat_level": 3.7, "timewindow": 81} +{"Format": "IDEA0", "ID": "0c375d2e-d027-4674-b5af-0e8cc0610ce6", "DetectTime": "2024-05-21T12:34:35.852656+00:00", "EventTime": "2024-05-21T12:34:35.852679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cHOOoobn0LBnUh3"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "d95cd82e-0e08-4a96-bc21-394c42c56aa1", "DetectTime": "2024-05-21T12:34:35.857953+00:00", "EventTime": "2024-05-21T12:34:35.857972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClT20q1iA4dI3iARe7"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "7f0fe41c-f622-491d-bc0d-9fb5ff8c773e", "DetectTime": "2024-05-21T12:34:35.908393+00:00", "EventTime": "2024-05-21T12:34:35.908415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxX3bJm4xNeXDNAD3"], "accumulated_threat_level": 4.5, "timewindow": 81} +{"Format": "IDEA0", "ID": "a8ae2dec-ce89-4d81-a322-b01c2cef96fb", "DetectTime": "2024-05-21T12:34:36.049803+00:00", "EventTime": "2024-05-21T12:34:36.049828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJx3uZJ3gaxFJBMf"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "eb6f49db-ccbd-48a6-92b0-cc8d1e54c65e", "DetectTime": "2024-05-21T12:34:36.055218+00:00", "EventTime": "2024-05-21T12:34:36.055241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cupuuh2kDnWfafNFc1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "536384de-c7b7-4038-8013-cb344b32f77a", "DetectTime": "2024-05-21T12:34:36.060159+00:00", "EventTime": "2024-05-21T12:34:36.060178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTqNpi4tWzT7fnFRe1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "b0b5e84e-0914-499c-a9bb-6f9517a42478", "DetectTime": "2024-05-21T12:34:36.065430+00:00", "EventTime": "2024-05-21T12:34:36.065456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHpwg3h7BJubkkrWc"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "e282b45a-e326-4921-906b-7184f354676c", "DetectTime": "2024-05-21T12:34:36.176116+00:00", "EventTime": "2024-05-21T12:34:36.176139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COesOn2VTOFl6H0y94"], "accumulated_threat_level": 5.3, "timewindow": 81} +{"Format": "IDEA0", "ID": "f04161f1-64b8-4470-940c-c8e6f54f5ba8", "DetectTime": "2024-05-21T12:34:36.181533+00:00", "EventTime": "2024-05-21T12:34:36.181554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83qk7Nb8uXMrC6Y7"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "b297e15d-7985-4c2e-a7e9-7c209a1e8fa9", "DetectTime": "2024-05-21T12:34:36.229789+00:00", "EventTime": "2024-05-21T12:34:36.229812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWMful1NwRQYk7pRx1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "8a5a148d-64c5-4740-af68-3b27a8d08cb4", "DetectTime": "2024-05-21T12:34:36.493738+00:00", "EventTime": "2024-05-21T12:34:36.493760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjFgU5aQ6BhTXV1a"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "29809b59-a120-4bd7-b564-c3a8994974c2", "DetectTime": "2024-05-21T12:34:36.498737+00:00", "EventTime": "2024-05-21T12:34:36.498755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87eCh2GSRrznYOLU2"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "ef424aa4-d352-42e6-8a3d-641fbbdde348", "DetectTime": "2024-05-21T12:34:36.522098+00:00", "EventTime": "2024-05-21T12:34:36.522120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETriA4udoVXGyzeg4"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "a8a3d438-cddd-4814-8bba-eb303dc9b7e2", "DetectTime": "2024-05-21T12:34:36.579709+00:00", "EventTime": "2024-05-21T12:34:36.579731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2jAF3aMbja8EbrE9"], "accumulated_threat_level": 6.1, "timewindow": 81} +{"Format": "IDEA0", "ID": "38742be8-4600-41a6-aeb7-ca24e827a3ee", "DetectTime": "2024-05-21T12:34:36.617386+00:00", "EventTime": "2024-05-21T12:34:36.617408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsiad4MaJHBj2mqV"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "1e15165f-e192-4b2d-8c77-5dd892c77ab7", "DetectTime": "2024-05-21T12:34:36.657215+00:00", "EventTime": "2024-05-21T12:34:36.657239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUseuO3tXtEYtl8tQ6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "8e43dc43-d319-4e75-be44-22ad9d733f83", "DetectTime": "2024-05-21T12:34:36.684283+00:00", "EventTime": "2024-05-21T12:34:36.684305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UHh42a3tXdt8RhNe"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "916f746a-90d2-4076-b085-2245ca157173", "DetectTime": "2024-05-21T12:34:36.717874+00:00", "EventTime": "2024-05-21T12:34:36.717893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPYRV2uQM0baRB3Fg"], "accumulated_threat_level": 8.5, "timewindow": 81} +{"Format": "IDEA0", "ID": "b9e20fe4-ed42-47b0-a06d-45699a308d0d", "DetectTime": "2024-05-21T12:34:36.744067+00:00", "EventTime": "2024-05-21T12:34:36.744087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNdOlD2n3qmcBrPDO1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "2d9ef7cf-b4b2-4e48-9b11-44f62469f781", "DetectTime": "2024-05-21T12:34:36.782122+00:00", "EventTime": "2024-05-21T12:34:36.782142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUTrV10BxQ4cRM718"], "accumulated_threat_level": 9.3, "timewindow": 81} +{"Format": "IDEA0", "ID": "6d34015c-5637-4736-8556-25c06b1e0d28", "DetectTime": "2024-05-21T12:34:36.804489+00:00", "EventTime": "2024-05-21T12:34:36.804511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0Jdg3n2mFBBToGpc"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "7389e0a8-c9c2-446e-9430-6d32671bf1cd", "DetectTime": "2024-05-21T12:34:36.842304+00:00", "EventTime": "2024-05-21T12:34:36.842326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYOPW1vjBcUOL7TY6"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "cd8d580b-f704-4f04-a5af-e7886fe53cc1", "DetectTime": "2024-05-21T12:34:37.108852+00:00", "EventTime": "2024-05-21T12:34:37.108869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnbDB83i43KUc44Eol"], "accumulated_threat_level": 10.100000000000001, "timewindow": 81} +{"Format": "IDEA0", "ID": "097058a5-dbeb-4831-a6d4-ac82ed5dc8b7", "DetectTime": "2024-05-21T12:34:37.117217+00:00", "EventTime": "2024-05-21T12:34:37.117237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2zKL2cPKEGIttLZ7"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "6f984099-089d-4b6d-b5ce-4f953446103c", "DetectTime": "2024-05-21T12:34:37.149301+00:00", "EventTime": "2024-05-21T12:34:37.149320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.158.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmiH043YNytb2aXLC1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "e706dc50-b3c7-4bdc-8c4a-f108768b5e93", "DetectTime": "2024-05-21T12:34:37.157541+00:00", "EventTime": "2024-05-21T12:34:37.157561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetmSw1T1d60B1IPS3"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "8e69de28-1fd6-4bea-a420-b23a3ca5a129", "DetectTime": "2024-05-21T12:34:37.162336+00:00", "EventTime": "2024-05-21T12:34:37.162355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIH0R1k4qPq5gX594"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "4dc0e7f4-ec63-4ea3-ba24-3df696f3d76b", "DetectTime": "2024-05-21T12:34:37.211237+00:00", "EventTime": "2024-05-21T12:34:37.211259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFBEe3s9VUv5jWknf"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "472631a4-93aa-4b58-a467-8b98f54e4909", "DetectTime": "2024-05-21T12:34:37.266359+00:00", "EventTime": "2024-05-21T12:34:37.266383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6DUvqT50Yw0wyTd"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "77a5010a-22f8-4061-a662-43c5b549eade", "DetectTime": "2024-05-21T12:34:37.300488+00:00", "EventTime": "2024-05-21T12:34:37.300507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3noLq3qGdkHsqhTle"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "d0004c49-c558-4258-b9df-cf91dc446909", "DetectTime": "2024-05-21T12:34:37.437093+00:00", "EventTime": "2024-05-21T12:34:37.437113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2F4p2TSyxZtPlNUa"], "accumulated_threat_level": 10.900000000000002, "timewindow": 81} +{"Format": "IDEA0", "ID": "eae96725-be2c-419d-90ad-7b3e57789a43", "DetectTime": "2024-05-21T12:34:37.464430+00:00", "EventTime": "2024-05-21T12:34:37.464452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjMhK2rnsJ5wT5r12"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "dd10b5fd-1c4c-45ba-9629-c97953bec363", "DetectTime": "2024-05-21T12:34:37.603682+00:00", "EventTime": "2024-05-21T12:34:37.603701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gXo21JYFEViKogkh"], "accumulated_threat_level": 11.700000000000003, "timewindow": 81} +{"Format": "IDEA0", "ID": "1cfa5e22-a916-48f8-9491-4965797f7b75", "DetectTime": "2024-05-21T12:34:37.625461+00:00", "EventTime": "2024-05-21T12:34:37.625486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS6hZ54XB2reRV6w0a"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "feacccda-73a0-469f-837f-96cd31582fad", "DetectTime": "2024-05-21T12:34:37.667623+00:00", "EventTime": "2024-05-21T12:34:37.667650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVLNZ1tSOALrgqgvc"], "accumulated_threat_level": 12.500000000000004, "timewindow": 81} +{"Format": "Json", "ID": "feacccda-73a0-469f-837f-96cd31582fad", "DetectTime": "2024-05-21T12:34:37.667623+00:00", "EventTime": "2024-05-21T12:34:37.667650+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-04T08:26:39.783170+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2024/05/21 12:34:37.865956)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 81, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "6ebe8d63-fedc-4536-8e95-bea2bd68eb8a", "DetectTime": "2024-05-21T12:34:37.875549+00:00", "EventTime": "2024-05-21T12:34:37.875568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcuaH44mNz5ghAg6s4"], "accumulated_threat_level": 0.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "5be816e8-0f2f-42f9-84b3-ce0996085222", "DetectTime": "2024-05-21T12:34:37.976484+00:00", "EventTime": "2024-05-21T12:34:37.976505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMHmH36SRhXkgqTNg"], "accumulated_threat_level": 1.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "2375c26d-9982-4c57-b432-31767a09a063", "DetectTime": "2024-05-21T12:34:38.014898+00:00", "EventTime": "2024-05-21T12:34:38.014918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C78XKO334Z7iuw7r84"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 81} +{"Format": "IDEA0", "ID": "873e30f4-5b8f-41f4-8948-1cf33dd61d79", "DetectTime": "2024-05-21T12:34:38.057078+00:00", "EventTime": "2024-05-21T12:34:38.057099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWeQrRgnAwf8lPtoe"], "accumulated_threat_level": 3.2, "timewindow": 81} +{"Format": "IDEA0", "ID": "51d3f0cd-c8d2-42e2-97f3-b5a3aceedcfd", "DetectTime": "2024-05-21T12:34:38.093975+00:00", "EventTime": "2024-05-21T12:34:38.093993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR21KC3AbFoqhVxSB6"], "accumulated_threat_level": 4.0, "timewindow": 81} +{"Format": "IDEA0", "ID": "eb5fb174-1b22-4b5b-b5da-8910413c31f9", "DetectTime": "2024-05-21T12:34:38.131051+00:00", "EventTime": "2024-05-21T12:34:38.131071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFI9rd496HD72srdaa"], "accumulated_threat_level": 4.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "a8e1927c-0145-4955-aba3-1c9fa21a5b9a", "DetectTime": "2024-05-21T12:34:38.171074+00:00", "EventTime": "2024-05-21T12:34:38.171092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnN0FC38xWTh4M9nBe"], "accumulated_threat_level": 5.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "5d836af5-f2b6-4d2d-bfae-1bae0e763486", "DetectTime": "2024-05-21T12:34:38.209278+00:00", "EventTime": "2024-05-21T12:34:38.209298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdSAQvAXq88Njbxnf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "bf70d577-b9ef-4332-b650-9d03651ffc14", "DetectTime": "2024-05-21T12:34:38.250876+00:00", "EventTime": "2024-05-21T12:34:38.250895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJmX72qb1wHQzFZe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "b26d3752-641e-4bae-85dc-79b450a4c717", "DetectTime": "2024-05-21T12:34:38.293735+00:00", "EventTime": "2024-05-21T12:34:38.293753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NESZ1eoJaQoT4mVc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "68287555-eb44-4791-ba94-b1ac74ad9c91", "DetectTime": "2024-05-21T12:34:38.336984+00:00", "EventTime": "2024-05-21T12:34:38.337003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3BNP2pnZuYlM5fAc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "6106577a-7ead-4221-a3d6-9443155e260d", "DetectTime": "2024-05-21T12:34:38.376456+00:00", "EventTime": "2024-05-21T12:34:38.376476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawHjs25vbTfccHN1a"], "accumulated_threat_level": 9.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "f2ce6184-cff8-4422-8b31-a71cb695a107", "DetectTime": "2024-05-21T12:34:38.405401+00:00", "EventTime": "2024-05-21T12:34:38.405422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ypCrJ88E6oNYGRe"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "9e5984e5-84d6-42ce-9aee-bff838c6f361", "DetectTime": "2024-05-21T12:34:38.439392+00:00", "EventTime": "2024-05-21T12:34:38.439413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX0GW23JbPpYVld3f"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "58d05ca1-7bb9-4c06-ad80-479742dfea0d", "DetectTime": "2024-05-21T12:34:38.709679+00:00", "EventTime": "2024-05-21T12:34:38.709701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQuYNX1whwshajADka"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "df02a36d-7382-4cef-8e84-d7f7065d9c7e", "DetectTime": "2024-05-21T12:34:38.714572+00:00", "EventTime": "2024-05-21T12:34:38.714591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOypt4HMobwTlJ8P1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "38ba9549-7dc3-42a8-ae7d-3187545f01b6", "DetectTime": "2024-05-21T12:34:38.719158+00:00", "EventTime": "2024-05-21T12:34:38.719176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0C2rLKJXjD7qJea"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "d824ac7d-98d9-47a5-8b50-d79249b61d65", "DetectTime": "2024-05-21T12:34:38.787649+00:00", "EventTime": "2024-05-21T12:34:38.787671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbSkRD1lcTW1IBw5I7"], "accumulated_threat_level": 10.4, "timewindow": 81} +{"Format": "IDEA0", "ID": "14705f51-7c4e-40fb-962d-fdb9498a56e5", "DetectTime": "2024-05-21T12:34:38.948424+00:00", "EventTime": "2024-05-21T12:34:38.948444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfl6UaLmq2cbsqSqb"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "f15cef00-bb1e-4d72-9572-c08fdf6aa3b2", "DetectTime": "2024-05-21T12:34:38.953663+00:00", "EventTime": "2024-05-21T12:34:38.953682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2eAt1JUQroP8k55"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "6ad71314-2be0-4a9d-b05e-0a704697ae9a", "DetectTime": "2024-05-21T12:34:39.055311+00:00", "EventTime": "2024-05-21T12:34:39.055331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfK7172XKpRK2IPNP9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 81} +{"Format": "IDEA0", "ID": "25641162-9120-499c-9167-eaf0de0f6c86", "DetectTime": "2024-05-21T12:34:39.092708+00:00", "EventTime": "2024-05-21T12:34:39.092729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrHPii29LQphcsygug"], "accumulated_threat_level": 12.000000000000002, "timewindow": 81} +{"Format": "Json", "ID": "25641162-9120-499c-9167-eaf0de0f6c86", "DetectTime": "2024-05-21T12:34:39.092708+00:00", "EventTime": "2024-05-21T12:34:39.092729+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "1970-01-04T08:57:27.914194+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2024/05/21 12:34:39.256925)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 81, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "19fa632a-2265-4da0-befb-fee7c38adfac", "DetectTime": "2024-05-21T12:34:39.275238+00:00", "EventTime": "2024-05-21T12:34:39.275257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdZIt3qZhMtDkeGM8"], "accumulated_threat_level": 0.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "4185b6fa-026a-4106-a459-a6a4e6eddabf", "DetectTime": "2024-05-21T12:34:39.291515+00:00", "EventTime": "2024-05-21T12:34:39.291534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SBzj3UvRxXHM9udh"], "accumulated_threat_level": 1.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "3a768520-2a8f-4947-95c6-94b6b6b1712c", "DetectTime": "2024-05-21T12:34:39.296734+00:00", "EventTime": "2024-05-21T12:34:39.296752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY0WAo2Mp9jISWXLpc"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "63eb529f-fedf-4740-bfad-c28948c7b0c5", "DetectTime": "2024-05-21T12:34:39.308116+00:00", "EventTime": "2024-05-21T12:34:39.308136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hWzwwnv6nDA1Vuj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 81} +{"Format": "IDEA0", "ID": "72f96711-74ed-4c4e-ae05-b4bc064c5f04", "DetectTime": "2024-05-21T12:34:39.505680+00:00", "EventTime": "2024-05-21T12:34:39.505701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYWMu1ruYARvah5S4"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "dd1714ad-6898-489e-8369-f682ac537d2f", "DetectTime": "2024-05-21T12:34:39.510527+00:00", "EventTime": "2024-05-21T12:34:39.510548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGclqE3dUN05S0Rj81"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "cec32dd9-72a3-4ed2-9824-dab21f0d1fe1", "DetectTime": "2024-05-21T12:34:39.564936+00:00", "EventTime": "2024-05-21T12:34:39.564956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClZAis1HOjgfe2B23"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "ce7d19db-4eb9-485e-ba52-dd479cbaa009", "DetectTime": "2024-05-21T12:34:39.597914+00:00", "EventTime": "2024-05-21T12:34:39.597934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdZ9026Vb97rcHxC"], "accumulated_threat_level": 3.2, "timewindow": 81} +{"Format": "IDEA0", "ID": "25ac254c-0b75-4ac2-9147-83eb64c30fa8", "DetectTime": "2024-05-21T12:34:39.636559+00:00", "EventTime": "2024-05-21T12:34:39.636577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4ynK3IVY8BlGfK9"], "accumulated_threat_level": 4.0, "timewindow": 81} +{"Format": "IDEA0", "ID": "e2b62215-3f52-4001-b7a1-7963f20319c7", "DetectTime": "2024-05-21T12:34:39.676617+00:00", "EventTime": "2024-05-21T12:34:39.676635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBO2ix1sD53Ek5gkOa"], "accumulated_threat_level": 4.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "1eb1cfe6-6b4a-40eb-85d3-7e023b5f1252", "DetectTime": "2024-05-21T12:34:39.715307+00:00", "EventTime": "2024-05-21T12:34:39.715327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CflZ7racloT84LXlg"], "accumulated_threat_level": 5.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "0c5d4b65-a5ce-4b7c-b92d-7dca114c8145", "DetectTime": "2024-05-21T12:34:39.754915+00:00", "EventTime": "2024-05-21T12:34:39.754934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHTi82FMNm8LlP7Vb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "918515db-540a-4ada-b9bb-4197ca780db9", "DetectTime": "2024-05-21T12:34:39.797623+00:00", "EventTime": "2024-05-21T12:34:39.797641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPhm83gKafC4CrxXj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "17e21d82-4ee4-48b7-95b5-ace73e6783ec", "DetectTime": "2024-05-21T12:34:39.836128+00:00", "EventTime": "2024-05-21T12:34:39.836148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIuUoJSXBYieCnGf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "c2f28c38-b329-4899-a70a-168fe7ecdc29", "DetectTime": "2024-05-21T12:34:39.874352+00:00", "EventTime": "2024-05-21T12:34:39.874373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPAHg4t60TKUOKHpc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 81} +{"Format": "IDEA0", "ID": "f60e3ea5-4f05-40c3-b632-2cefe9dab7e1", "DetectTime": "2024-05-21T12:34:39.911842+00:00", "EventTime": "2024-05-21T12:34:39.911863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0XIfLdPpGQton84l"], "accumulated_threat_level": 9.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "31879cc2-4ca1-47a9-b23d-e8f7b0047cf1", "DetectTime": "2024-05-21T12:34:39.948686+00:00", "EventTime": "2024-05-21T12:34:39.948707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2CghN3qz5993dlFT8"], "accumulated_threat_level": 10.4, "timewindow": 81} +{"Format": "IDEA0", "ID": "4eea8248-43c4-4310-b6e2-22c330630aff", "DetectTime": "2024-05-21T12:34:40.189303+00:00", "EventTime": "2024-05-21T12:34:40.189324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7rfi4MEMMg2nS7X8"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "0a4b2661-1897-4ba4-9275-93e81221a2f5", "DetectTime": "2024-05-21T12:34:40.330186+00:00", "EventTime": "2024-05-21T12:34:40.330211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9v4a2kaczWqs00bf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 81} +{"Format": "IDEA0", "ID": "4e439754-dc2a-4391-a96d-416d932195c9", "DetectTime": "2024-05-21T12:34:40.341375+00:00", "EventTime": "2024-05-21T12:34:40.341396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkzZy3YWXDCTLv0Ma"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "9dfea7ac-1f6e-4a3f-9816-d61a03074873", "DetectTime": "2024-05-21T12:34:40.377049+00:00", "EventTime": "2024-05-21T12:34:40.377069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kl8lCkTv7dwIxd5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 81} +{"Format": "Json", "ID": "9dfea7ac-1f6e-4a3f-9816-d61a03074873", "DetectTime": "2024-05-21T12:34:40.377049+00:00", "EventTime": "2024-05-21T12:34:40.377069+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-04T08:57:50.723389+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 81. (real time 2024/05/21 12:34:40.573642)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 81, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "821f73e9-43c6-4f9a-90a3-2f895c56923f", "DetectTime": "2024-05-21T12:34:40.583714+00:00", "EventTime": "2024-05-21T12:34:40.583733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMpsBkWGIFDU0iTh"], "accumulated_threat_level": 0.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "379a6170-018a-4288-b1ff-3e5df165b6b9", "DetectTime": "2024-05-21T12:34:40.594614+00:00", "EventTime": "2024-05-21T12:34:40.594633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDAEM2MmYHXJw2kd1"], "accumulated_threat_level": 1.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "eafa14c3-da0e-4883-8ca1-0f52b237c6db", "DetectTime": "2024-05-21T12:34:40.605797+00:00", "EventTime": "2024-05-21T12:34:40.605816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbvWg2uicbuEy9Tyj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 81} +{"Format": "IDEA0", "ID": "a5b0cade-d615-4176-8e83-bbf87a0f0784", "DetectTime": "2024-05-21T12:34:40.616820+00:00", "EventTime": "2024-05-21T12:34:40.616842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcdJh248B9bA7WjXf5"], "accumulated_threat_level": 3.2, "timewindow": 81} +{"Format": "IDEA0", "ID": "9ad193bc-b488-49da-9cee-2a51764472c6", "DetectTime": "2024-05-21T12:34:40.627847+00:00", "EventTime": "2024-05-21T12:34:40.627866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJM9Rx3Pyru7LEijhi"], "accumulated_threat_level": 4.0, "timewindow": 81} +{"Format": "IDEA0", "ID": "b6ba4fe4-7542-4403-9622-3819c3fa3b92", "DetectTime": "2024-05-21T12:34:40.637845+00:00", "EventTime": "2024-05-21T12:34:40.637863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJmRt1VCPnVZKus0i"], "accumulated_threat_level": 4.8, "timewindow": 81} +{"Format": "IDEA0", "ID": "a0bc79d1-eda7-48ba-90a2-e00f189935ae", "DetectTime": "2024-05-21T12:34:40.648511+00:00", "EventTime": "2024-05-21T12:34:40.648529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClOGDhiMnLiIvB6T3"], "accumulated_threat_level": 5.6, "timewindow": 81} +{"Format": "IDEA0", "ID": "0625c6ff-9359-4324-af5e-5a129904bfee", "DetectTime": "2024-05-21T12:34:40.683913+00:00", "EventTime": "2024-05-21T12:34:40.683932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhzmD2omMONdQTx3e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "1dae8b95-13b6-4648-89b9-5442d995fa19", "DetectTime": "2024-05-21T12:34:40.978285+00:00", "EventTime": "2024-05-21T12:34:40.978307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9G3QI2O6wnkmk0vYa"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "0b3e029c-9e03-4f62-87e0-d02ccc33c0bd", "DetectTime": "2024-05-21T12:34:40.984173+00:00", "EventTime": "2024-05-21T12:34:40.984191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuM8B10r4ZW46Z87g"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "b5031036-0f7f-4ae1-8a66-5c853f807f3c", "DetectTime": "2024-05-21T12:34:40.988696+00:00", "EventTime": "2024-05-21T12:34:40.988718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPl2DKLF63y5I6c4"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "2f38cf61-5a4a-49d6-a6f2-645d352a217a", "DetectTime": "2024-05-21T12:34:40.993516+00:00", "EventTime": "2024-05-21T12:34:40.993537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnmJhPS2GIGuhF8c"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "d9eded56-cf5c-4bbd-86b4-413f73b7f0df", "DetectTime": "2024-05-21T12:34:41.071379+00:00", "EventTime": "2024-05-21T12:34:41.071397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Q9JOKY22pmbMAb"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "fa6486a7-0386-4b5b-8c45-a6e95e3f46ca", "DetectTime": "2024-05-21T12:34:41.099152+00:00", "EventTime": "2024-05-21T12:34:41.099173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoAbr73D6oWqCOIujj"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "d59b3f3c-307c-4e15-8dc9-bcc741e0b423", "DetectTime": "2024-05-21T12:34:41.464664+00:00", "EventTime": "2024-05-21T12:34:41.464684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLN5mj3y5Knd0UNNM3"], "accumulated_threat_level": 0.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "aebe7d59-80fd-41ef-8493-182df97f629a", "DetectTime": "2024-05-21T12:34:41.469468+00:00", "EventTime": "2024-05-21T12:34:41.469487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWOVRH34TwHVtSa8d1"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "d7ea1656-528d-43c8-8a11-fc276ab4f822", "DetectTime": "2024-05-21T12:34:41.474253+00:00", "EventTime": "2024-05-21T12:34:41.474271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD8Ew237BtHurCmIqa"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "4b860e83-08b5-43df-9042-63de7ddba8ac", "DetectTime": "2024-05-21T12:34:41.550474+00:00", "EventTime": "2024-05-21T12:34:41.550497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEXWr4WPPtm3ix3sb"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "446762c3-6e79-43e0-ba03-7c46163498bc", "DetectTime": "2024-05-21T12:34:41.555961+00:00", "EventTime": "2024-05-21T12:34:41.555979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJvEG3x0AXhWHphWe"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "73f6e049-1720-493b-a04c-5488f9006808", "DetectTime": "2024-05-21T12:34:41.566111+00:00", "EventTime": "2024-05-21T12:34:41.566131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OJ5k4oRYru7BNJoi"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "ee396e15-a904-4557-a8a6-108498e3e8e5", "DetectTime": "2024-05-21T12:34:41.602791+00:00", "EventTime": "2024-05-21T12:34:41.602809+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY0Jn1Uzxjtucwy1"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "2634a345-53af-4370-b5d7-d9a082776bc5", "DetectTime": "2024-05-21T12:34:41.615099+00:00", "EventTime": "2024-05-21T12:34:41.615121+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY0Jn1Uzxjtucwy1"], "accumulated_threat_level": 6.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "c44c6b2d-0d06-4064-8e70-e042d84234d5", "DetectTime": "2024-05-21T12:34:41.889078+00:00", "EventTime": "2024-05-21T12:34:41.889099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXh1vz4EtCx0CiZJ63"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "a7df6fea-c06b-43ac-9421-5ed31d61ddd5", "DetectTime": "2024-05-21T12:34:41.893823+00:00", "EventTime": "2024-05-21T12:34:41.893842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZGRo4JkpBV8x2Rc8"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "dc6c45f7-6abb-4d74-8ae5-71a245a322d8", "DetectTime": "2024-05-21T12:34:41.961273+00:00", "EventTime": "2024-05-21T12:34:41.961295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV0GBhsEbdBbBuuJ6"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "5621325b-f823-4cc3-b8be-b79f206c438f", "DetectTime": "2024-05-21T12:34:41.966171+00:00", "EventTime": "2024-05-21T12:34:41.966190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP3rKM11tQ0yFsVU74"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "77a1f334-f737-4a60-ab05-202751f50e29", "DetectTime": "2024-05-21T12:34:41.970783+00:00", "EventTime": "2024-05-21T12:34:41.970801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.158.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjusH44tDnX5pQ6G25"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "2cc0bf9d-a59a-4a3f-9a8b-e91cef54e99b", "DetectTime": "2024-05-21T12:34:42.046768+00:00", "EventTime": "2024-05-21T12:34:42.046787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C03feH2JKgpiMaullh"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "74502aa2-43d6-4639-954d-4f7793c5ee0f", "DetectTime": "2024-05-21T12:34:42.078338+00:00", "EventTime": "2024-05-21T12:34:42.078358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C00Eg53xUDqN2rw04e"], "accumulated_threat_level": 1.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "c6d6cb61-b9b5-4c4f-92fd-61e8bd467536", "DetectTime": "2024-05-21T12:34:42.116666+00:00", "EventTime": "2024-05-21T12:34:42.116690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHG9w31d4l2OP2rIE6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 82} +{"Format": "IDEA0", "ID": "4b00ec52-52b2-46c9-9872-290b78b34005", "DetectTime": "2024-05-21T12:34:42.154915+00:00", "EventTime": "2024-05-21T12:34:42.154934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qLWE286AhBCsqbg1"], "accumulated_threat_level": 3.2, "timewindow": 82} +{"Format": "IDEA0", "ID": "098ece50-e29e-448d-b5d0-adc8c8fb372c", "DetectTime": "2024-05-21T12:34:42.215708+00:00", "EventTime": "2024-05-21T12:34:42.215727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbguu2wwuK7NOx2u1"], "accumulated_threat_level": 4.0, "timewindow": 82} +{"Format": "IDEA0", "ID": "289c1b73-f309-4ffd-bc2f-42d7cac1f62e", "DetectTime": "2024-05-21T12:34:42.284294+00:00", "EventTime": "2024-05-21T12:34:42.284317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPaHJ3ulOSM48FfV"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "060c5f4c-cb96-4c19-89c9-88c940689dc5", "DetectTime": "2024-05-21T12:34:42.289755+00:00", "EventTime": "2024-05-21T12:34:42.289777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5lHK2KwUZRroQDg3"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "b17e0676-df27-496a-a2da-171d8aae3c28", "DetectTime": "2024-05-21T12:34:42.341819+00:00", "EventTime": "2024-05-21T12:34:42.341841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrJgO3q927JdeAXH3"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "7d30e98e-10db-4338-a17d-a077f6c70ee3", "DetectTime": "2024-05-21T12:34:42.598307+00:00", "EventTime": "2024-05-21T12:34:42.598329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPFj76pEz7dUeY1c"], "accumulated_threat_level": 1.6, "timewindow": 79} +{"Format": "IDEA0", "ID": "23e10574-eb66-4723-a10d-322cea3d915f", "DetectTime": "2024-05-21T12:34:42.640109+00:00", "EventTime": "2024-05-21T12:34:42.640129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBW8T3VjkiRSp57Bg"], "accumulated_threat_level": 5.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "7a13cc90-41d5-4983-bc32-5ddb104c15d3", "DetectTime": "2024-05-21T12:34:42.671546+00:00", "EventTime": "2024-05-21T12:34:42.671566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0hUYe35JlmxxAsVo3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "9007581f-2d5b-4a9d-897f-10210b1cba35", "DetectTime": "2024-05-21T12:34:42.688667+00:00", "EventTime": "2024-05-21T12:34:42.688687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.158.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT872tCUAy2LN3BG6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "bf2d802f-1f38-4430-abc0-0e4b302db704", "DetectTime": "2024-05-21T12:34:42.706237+00:00", "EventTime": "2024-05-21T12:34:42.706259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.245.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4Aw6vVQo336KSgd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "d0c45144-99b6-48e0-b99e-948979e06083", "DetectTime": "2024-05-21T12:34:42.769632+00:00", "EventTime": "2024-05-21T12:34:42.769653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3g304wRqKuFf90na"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 82} +{"Format": "IDEA0", "ID": "dbfb6a01-2467-40d2-b128-2df8f75af56c", "DetectTime": "2024-05-21T12:34:42.806733+00:00", "EventTime": "2024-05-21T12:34:42.806752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0slMc4NKUiCar54Cj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "0219ff3f-011c-48b5-8948-2f3687698682", "DetectTime": "2024-05-21T12:34:42.852001+00:00", "EventTime": "2024-05-21T12:34:42.852025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdMSPZoAwyDDCXKg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "f31b9aea-42f2-4d07-a3a1-2d49d1d5614e", "DetectTime": "2024-05-21T12:34:42.872158+00:00", "EventTime": "2024-05-21T12:34:42.872179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cebare20T41lmSvQAi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "8dd5efde-62a8-4b42-805a-dc16cb395c9e", "DetectTime": "2024-05-21T12:34:42.906125+00:00", "EventTime": "2024-05-21T12:34:42.906143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChzJwy2HJBrCxmT8z3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "1b8e6055-4df3-4331-b80d-acff26c2517e", "DetectTime": "2024-05-21T12:34:42.938965+00:00", "EventTime": "2024-05-21T12:34:42.938988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmXTr4Ttm3hSULUc4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "d3083485-3087-4b91-bc6b-7f1442fdb7d6", "DetectTime": "2024-05-21T12:34:42.967318+00:00", "EventTime": "2024-05-21T12:34:42.967340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQhKUB33nPM3Na3oD6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "aacccbbc-24a9-4be4-9eb7-ee3a673f01bf", "DetectTime": "2024-05-21T12:34:43.011107+00:00", "EventTime": "2024-05-21T12:34:43.011129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckh6wa1XAqFYfGujci"], "accumulated_threat_level": 9.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "4234d601-2e00-42e8-b244-c00ce37d5ce3", "DetectTime": "2024-05-21T12:34:43.017618+00:00", "EventTime": "2024-05-21T12:34:43.017639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrHRd4RCM2uyve5Yj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "f22b82c5-3aad-46d7-bf85-da5e4dbc8a20", "DetectTime": "2024-05-21T12:34:43.409831+00:00", "EventTime": "2024-05-21T12:34:43.409851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcSUGI3QSvsmjikNU2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "8c8cf973-5d60-47b7-b684-9d3d262eb5c6", "DetectTime": "2024-05-21T12:34:43.430589+00:00", "EventTime": "2024-05-21T12:34:43.430607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rVtV3RBj8etNFwDj"], "accumulated_threat_level": 10.4, "timewindow": 82} +{"Format": "IDEA0", "ID": "b2917e98-921d-4db6-8ca1-4dc11bc51ecd", "DetectTime": "2024-05-21T12:34:43.495293+00:00", "EventTime": "2024-05-21T12:34:43.495312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXnW33xlkld7emwRi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "4038eb0a-e70a-4522-b8fd-0fdee15de1e1", "DetectTime": "2024-05-21T12:34:43.500566+00:00", "EventTime": "2024-05-21T12:34:43.500585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2tDl1ZrXMiKroBk1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "38aaf7b6-bb44-4806-a034-fd0ab49d9b8e", "DetectTime": "2024-05-21T12:34:43.505234+00:00", "EventTime": "2024-05-21T12:34:43.505254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpnudd173bu5ZTPtw7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "65460f5f-6e3b-400b-aa59-f4d06a21bb33", "DetectTime": "2024-05-21T12:34:43.509721+00:00", "EventTime": "2024-05-21T12:34:43.509740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxFmS3nUDx3Ad4Dkd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "01f6815d-a6f4-456d-8635-4c0a046051ff", "DetectTime": "2024-05-21T12:34:43.514837+00:00", "EventTime": "2024-05-21T12:34:43.514859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEn2t5AeeyegFyX1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "b7164c86-fc46-40e3-a26f-4b8da152093b", "DetectTime": "2024-05-21T12:34:43.553554+00:00", "EventTime": "2024-05-21T12:34:43.553574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8XcL3zqpoxZrnlS2", "Cinl9z1JmEU5eNfSng", "CZkUSxm7TCVknL9e1", "CZGb7r2b6PO2iKWIw9"], "accumulated_threat_level": 10.9, "timewindow": 82} +{"Format": "IDEA0", "ID": "596f1aa5-8bc9-4f1c-ab59-ec7ce044b31d", "DetectTime": "2024-05-21T12:34:43.657693+00:00", "EventTime": "2024-05-21T12:34:43.657718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeL014By1XwKUiu1e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "a2f74699-f551-435d-8426-a84de02db99e", "DetectTime": "2024-05-21T12:34:43.670844+00:00", "EventTime": "2024-05-21T12:34:43.670867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KMgX2Vj3Ngwa42V"], "accumulated_threat_level": 11.700000000000001, "timewindow": 82} +{"Format": "IDEA0", "ID": "c9b7892f-21d7-4e8b-84f9-8687e9a6d880", "DetectTime": "2024-05-21T12:34:43.697315+00:00", "EventTime": "2024-05-21T12:34:43.697336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87de049So4mESzDb7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "af90600c-07f4-49d7-b224-f77cf690ade8", "DetectTime": "2024-05-21T12:34:43.760986+00:00", "EventTime": "2024-05-21T12:34:43.761005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1HsK92h5VuPBnsgG4"], "accumulated_threat_level": 12.500000000000002, "timewindow": 82} +{"Format": "Json", "ID": "af90600c-07f4-49d7-b224-f77cf690ade8", "DetectTime": "2024-05-21T12:34:43.760986+00:00", "EventTime": "2024-05-21T12:34:43.761005+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-04T09:28:21.030415+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2024/05/21 12:34:43.967098)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 82, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "66f779bb-d401-4b01-9e84-709c7cce73c6", "DetectTime": "2024-05-21T12:34:43.982290+00:00", "EventTime": "2024-05-21T12:34:43.982307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTPlt3nnyGN3WUAl9"], "accumulated_threat_level": 0.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "b19977d3-ad00-40ee-bf4c-961ace5de419", "DetectTime": "2024-05-21T12:34:44.055392+00:00", "EventTime": "2024-05-21T12:34:44.055412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E3Rr3DtzKi7dqU3i"], "accumulated_threat_level": 1.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "e31a724f-5a2d-444e-8ffe-02ddd5f5759d", "DetectTime": "2024-05-21T12:34:44.092672+00:00", "EventTime": "2024-05-21T12:34:44.092693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPQFs1p5lfBYNpP18"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 82} +{"Format": "IDEA0", "ID": "7efbff66-9ec2-4eb0-8dc5-7048f13328bf", "DetectTime": "2024-05-21T12:34:44.131355+00:00", "EventTime": "2024-05-21T12:34:44.131377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckq1OoxJHgN1Z6Yje"], "accumulated_threat_level": 3.2, "timewindow": 82} +{"Format": "IDEA0", "ID": "319f2d7b-ea36-40f3-85f4-2479fe6381ec", "DetectTime": "2024-05-21T12:34:44.173227+00:00", "EventTime": "2024-05-21T12:34:44.173251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXYPO2Frk1DLokJse"], "accumulated_threat_level": 4.0, "timewindow": 82} +{"Format": "IDEA0", "ID": "db93ede8-1bff-47a1-b46c-2e38e7532474", "DetectTime": "2024-05-21T12:34:44.212993+00:00", "EventTime": "2024-05-21T12:34:44.213016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuOblt4uQBsY8pSmy5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "a23781bf-584a-4173-810c-02a54985597f", "DetectTime": "2024-05-21T12:34:44.273766+00:00", "EventTime": "2024-05-21T12:34:44.273788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.5.30.98"]}], "Attach": [{"Content": "Connection to unknown destination port 29683/UDP destination IP 122.5.30.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7XfH1ZpOiHheVX7l"], "accumulated_threat_level": 5.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "631820bf-09f2-4e97-b5ad-f63e41e11c6c", "DetectTime": "2024-05-21T12:34:44.299503+00:00", "EventTime": "2024-05-21T12:34:44.299525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqhmVD4SvGHxCOHcz9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "9008776f-c90f-42c4-bc14-2dc480e99b41", "DetectTime": "2024-05-21T12:34:44.346128+00:00", "EventTime": "2024-05-21T12:34:44.346151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9Yvw3bLMorTh9XR3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 82} +{"Format": "IDEA0", "ID": "f1d59bdd-3ff1-4252-8049-6ab0264c789e", "DetectTime": "2024-05-21T12:34:44.385008+00:00", "EventTime": "2024-05-21T12:34:44.385032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvhcxs2qU6caL9r8sk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "46544366-dc75-456a-b86e-ce60d5ce2842", "DetectTime": "2024-05-21T12:34:44.411081+00:00", "EventTime": "2024-05-21T12:34:44.411103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgFMg1sUj9ZwIu3J5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "2d1d5675-32da-4fa8-9645-e689e59837df", "DetectTime": "2024-05-21T12:34:44.448459+00:00", "EventTime": "2024-05-21T12:34:44.448480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAFQ21QnnrxaL09xd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "c01f4816-1e41-4d47-b469-c8d012405695", "DetectTime": "2024-05-21T12:34:44.683892+00:00", "EventTime": "2024-05-21T12:34:44.683911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.162.159.200"]}], "Attach": [{"Content": "Connection to unknown destination port 11664/UDP destination IP 125.162.159.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKR90R3lwJf0HqClEa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "c56b8c53-b477-4d8a-9da2-2824b8595df1", "DetectTime": "2024-05-21T12:34:44.696373+00:00", "EventTime": "2024-05-21T12:34:44.696400+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["50.101.238.77"], "Type": ["CC"], "Port": [7040], "Proto": ["TCP"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "C&C channel, destination IP: 50.101.238.77 port: 7040/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaS5i462f3MQ1hdne"], "accumulated_threat_level": 8.024, "timewindow": 82} +{"Format": "IDEA0", "ID": "0ace2acf-b436-43f7-a8ea-c60e074b8e4c", "DetectTime": "2024-05-21T12:34:44.716505+00:00", "EventTime": "2024-05-21T12:34:44.716526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV6e822MFx2RDTVwDa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "32bd541d-0a83-464f-a465-769d8e902660", "DetectTime": "2024-05-21T12:34:44.736509+00:00", "EventTime": "2024-05-21T12:34:44.736529+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["50.101.238.77"], "Type": ["CC"]}, {"IP4": ["50.101.238.77"], "Type": ["CC"], "Port": [7040], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 50.101.238.77 port: 7040/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaS5i462f3MQ1hdne"], "accumulated_threat_level": 0, "timewindow": 82} +{"Format": "IDEA0", "ID": "7d1640f9-afe5-4729-9623-092f335784ee", "DetectTime": "2024-05-21T12:34:44.752549+00:00", "EventTime": "2024-05-21T12:34:44.752569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mXMIAj4gf5Lbuh1"], "accumulated_threat_level": 8.824, "timewindow": 82} +{"Format": "IDEA0", "ID": "a39a7eaa-0118-48c0-b4ca-f800dbe24011", "DetectTime": "2024-05-21T12:34:44.792926+00:00", "EventTime": "2024-05-21T12:34:44.792944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEiZ24cHLZ4eFhdMk"], "accumulated_threat_level": 9.624, "timewindow": 82} +{"Format": "IDEA0", "ID": "f5eeb84c-a259-4a59-bd4c-cda4cae56917", "DetectTime": "2024-05-21T12:34:44.844403+00:00", "EventTime": "2024-05-21T12:34:44.844421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lf4h1VZWqSUvl442"], "accumulated_threat_level": 10.424000000000001, "timewindow": 82} +{"Format": "IDEA0", "ID": "68de9b93-0f61-4a4f-8feb-01b2a823269b", "DetectTime": "2024-05-21T12:34:44.896365+00:00", "EventTime": "2024-05-21T12:34:44.896387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdO6LThSW89Hh2Je"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "be86866a-c9ca-41c7-bace-fae02ab77426", "DetectTime": "2024-05-21T12:34:44.979137+00:00", "EventTime": "2024-05-21T12:34:44.979158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEfLz47JB23BXLbdi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "38be8c5d-bd91-432d-8bdc-bcee9f7a862c", "DetectTime": "2024-05-21T12:34:45.054080+00:00", "EventTime": "2024-05-21T12:34:45.054101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrsGa3wnLZq2iFJ76"], "accumulated_threat_level": 11.224000000000002, "timewindow": 82} +{"Format": "IDEA0", "ID": "3adee0a9-8def-4c32-a638-4088e1c9e18a", "DetectTime": "2024-05-21T12:34:45.091072+00:00", "EventTime": "2024-05-21T12:34:45.091091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgQLz17ofZ1Bz19k6"], "accumulated_threat_level": 12.024000000000003, "timewindow": 82} +{"Format": "Json", "ID": "3adee0a9-8def-4c32-a638-4088e1c9e18a", "DetectTime": "2024-05-21T12:34:45.091072+00:00", "EventTime": "2024-05-21T12:34:45.091091+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "1970-01-04T09:58:49.998688+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2024/05/21 12:34:45.257701)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 82, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "b6aaf5e2-c827-4c02-ae08-a495cbd3ecdc", "DetectTime": "2024-05-21T12:34:45.270331+00:00", "EventTime": "2024-05-21T12:34:45.270352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ugX335Bknx6RNf09"], "accumulated_threat_level": 0.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "8555e30c-1bfd-479d-a42a-27d839096faa", "DetectTime": "2024-05-21T12:34:45.287003+00:00", "EventTime": "2024-05-21T12:34:45.287023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbggtj4V2rESNsxC9i"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "c3a28d01-2208-4c71-bf96-6906f9f5097e", "DetectTime": "2024-05-21T12:34:45.300554+00:00", "EventTime": "2024-05-21T12:34:45.300573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbggtj4V2rESNsxC9i"], "accumulated_threat_level": 7.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "ff9fbf90-ab4a-488f-a67b-0ca4baf2a68a", "DetectTime": "2024-05-21T12:34:45.316938+00:00", "EventTime": "2024-05-21T12:34:45.316958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4NwWT2iKMybjwzaN8"], "accumulated_threat_level": 1.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "db12813e-0045-40c6-9eec-0c947a95dc25", "DetectTime": "2024-05-21T12:34:45.328142+00:00", "EventTime": "2024-05-21T12:34:45.328160+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rohf3uoFSNUDOTI6"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "aea4d349-5493-4989-848c-0e7c8bb0014f", "DetectTime": "2024-05-21T12:34:45.339578+00:00", "EventTime": "2024-05-21T12:34:45.339596+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rohf3uoFSNUDOTI6"], "accumulated_threat_level": 7.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "3202638e-d17b-4d9e-ab21-752deecd93d7", "DetectTime": "2024-05-21T12:34:45.351408+00:00", "EventTime": "2024-05-21T12:34:45.351426+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvTAU2NflEnFbQTig"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "bdd10adb-ddbe-493a-8e54-e29ae34f31ef", "DetectTime": "2024-05-21T12:34:45.364729+00:00", "EventTime": "2024-05-21T12:34:45.364753+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvTAU2NflEnFbQTig"], "accumulated_threat_level": 8.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "a9b142fa-ea03-45f0-b7d6-8ea87b16f099", "DetectTime": "2024-05-21T12:34:45.379358+00:00", "EventTime": "2024-05-21T12:34:45.379378+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnlBF19Vcn5FmUCE8"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "7f5d39a4-d68a-436c-b6b7-04d047a03dd6", "DetectTime": "2024-05-21T12:34:45.393377+00:00", "EventTime": "2024-05-21T12:34:45.393397+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnlBF19Vcn5FmUCE8"], "accumulated_threat_level": 8.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "8e3fb9f6-086d-498d-b9ff-68223cd89e6e", "DetectTime": "2024-05-21T12:34:45.405128+00:00", "EventTime": "2024-05-21T12:34:45.405146+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgA3j51MLSFoB6Pj"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "0078cebf-147c-42d2-b751-32b3e11ecc74", "DetectTime": "2024-05-21T12:34:45.417218+00:00", "EventTime": "2024-05-21T12:34:45.417240+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWgA3j51MLSFoB6Pj"], "accumulated_threat_level": 9.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "59a2e1a3-5988-4309-ad03-ff293f8889b1", "DetectTime": "2024-05-21T12:34:45.431052+00:00", "EventTime": "2024-05-21T12:34:45.431069+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwu0Dz04gG7B5Zfb"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "879d4c28-c506-4b03-a080-a5ecc4526e37", "DetectTime": "2024-05-21T12:34:45.445007+00:00", "EventTime": "2024-05-21T12:34:45.445026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwu0Dz04gG7B5Zfb"], "accumulated_threat_level": 9.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "386f6435-400b-4b8d-b7a2-3e5eb714bdac", "DetectTime": "2024-05-21T12:34:45.457877+00:00", "EventTime": "2024-05-21T12:34:45.457897+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvSDy24uGqyYra0VU5"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "854384fa-0dae-4c40-9ea8-05e3588aeaaf", "DetectTime": "2024-05-21T12:34:45.560034+00:00", "EventTime": "2024-05-21T12:34:45.560055+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvSDy24uGqyYra0VU5"], "accumulated_threat_level": 10.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "a483cfef-94cb-4c8a-9cc0-62aefe18b60c", "DetectTime": "2024-05-21T12:34:45.577080+00:00", "EventTime": "2024-05-21T12:34:45.577099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPsePo36HSdFK3GQq6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "93b60ae8-42e3-41eb-bca8-8b0c828b17b5", "DetectTime": "2024-05-21T12:34:45.584575+00:00", "EventTime": "2024-05-21T12:34:45.584599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzCtP1Emb89sLTmL3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "fa12c71f-0d22-4176-a4e9-c1d5c8011862", "DetectTime": "2024-05-21T12:34:45.791161+00:00", "EventTime": "2024-05-21T12:34:45.791184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb35Qc3I9x2u5gkBpk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "5898b8c4-fb9e-4071-b56f-c87853bd21d0", "DetectTime": "2024-05-21T12:34:45.804626+00:00", "EventTime": "2024-05-21T12:34:45.804648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXSKc25stIr2o98v"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 82} +{"Format": "IDEA0", "ID": "d1704509-f4ef-4507-bb98-4f5c0753f392", "DetectTime": "2024-05-21T12:34:45.809708+00:00", "EventTime": "2024-05-21T12:34:45.809727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3tJKPEtFb6Lykre"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "31353fe2-2a5d-42fd-9b34-aca225f2a587", "DetectTime": "2024-05-21T12:34:45.814142+00:00", "EventTime": "2024-05-21T12:34:45.814159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxyp5e1hfxo9hLwzm6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "5669624a-1c80-46b9-b3d3-65b154c12ff3", "DetectTime": "2024-05-21T12:34:45.818541+00:00", "EventTime": "2024-05-21T12:34:45.818558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmaXQ1yTrVVRMgBn8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "196c93a5-1d56-4b34-a0fe-f64b8b302fa1", "DetectTime": "2024-05-21T12:34:45.823062+00:00", "EventTime": "2024-05-21T12:34:45.823080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dcGQ2JDvBNcgW7fe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "f087538e-2253-4577-bfbc-eebd72b76d58", "DetectTime": "2024-05-21T12:34:45.917714+00:00", "EventTime": "2024-05-21T12:34:45.917734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBGQH20RzIJbtDzZ7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "004197f0-3d88-42d8-8146-9fe02e0c1257", "DetectTime": "2024-05-21T12:34:45.929122+00:00", "EventTime": "2024-05-21T12:34:45.929171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcbOHj30evQP5c7lmb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "13b6123a-de97-41c4-8638-4af95632e3e5", "DetectTime": "2024-05-21T12:34:45.935535+00:00", "EventTime": "2024-05-21T12:34:45.935552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQNjFCoqOCkr5pLQb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "eaf16d76-be9e-40c9-b7c3-0b1f3cff1355", "DetectTime": "2024-05-21T12:34:45.939988+00:00", "EventTime": "2024-05-21T12:34:45.940007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3mXK33LIp3ET9WHb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "e8e8e398-6a89-49c5-9b60-cdfb6f5f9275", "DetectTime": "2024-05-21T12:34:45.951537+00:00", "EventTime": "2024-05-21T12:34:45.951555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJTD1DMIpLit1pd6"], "accumulated_threat_level": 3.2, "timewindow": 82} +{"Format": "IDEA0", "ID": "f2205954-74a8-4765-b565-09378796b2eb", "DetectTime": "2024-05-21T12:34:45.956571+00:00", "EventTime": "2024-05-21T12:34:45.956595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWsxWN1sYAColPTg0l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "f13accb3-edf2-445f-955f-5480211bba16", "DetectTime": "2024-05-21T12:34:46.329063+00:00", "EventTime": "2024-05-21T12:34:46.329083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjS1zj3oe9S2ErpWHh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "10b0a4b1-421c-4de8-8b32-b53baa67623d", "DetectTime": "2024-05-21T12:34:46.333751+00:00", "EventTime": "2024-05-21T12:34:46.333769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fDVD1Ic67GSz9K7j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "eb7eea4a-bd7e-4d6c-8f4a-2349b3ee69ad", "DetectTime": "2024-05-21T12:34:46.393654+00:00", "EventTime": "2024-05-21T12:34:46.393673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMmFTw19Ys2u1nNdzg"], "accumulated_threat_level": 4.0, "timewindow": 82} +{"Format": "IDEA0", "ID": "a433a19f-2381-4c08-bb01-c898e8550475", "DetectTime": "2024-05-21T12:34:46.430795+00:00", "EventTime": "2024-05-21T12:34:46.430815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4bLB2RbvTg1WRVr5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "ceff2ae5-47f2-4c7d-99eb-f4eeb8957571", "DetectTime": "2024-05-21T12:34:46.468130+00:00", "EventTime": "2024-05-21T12:34:46.468150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVU3Xq3U2axiak2Uu7"], "accumulated_threat_level": 5.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "c5dac1a9-41c1-46a8-9dab-4311591508c5", "DetectTime": "2024-05-21T12:34:46.497858+00:00", "EventTime": "2024-05-21T12:34:46.497879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crb0OX3sajXjgLyYF6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "ac63400b-eab6-4649-a279-134fbbdf725a", "DetectTime": "2024-05-21T12:34:46.540729+00:00", "EventTime": "2024-05-21T12:34:46.540752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHb8zt4kEZuA2cekN1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 82} +{"Format": "IDEA0", "ID": "b4e04fec-660e-4023-8ebf-53c84d7b2dc5", "DetectTime": "2024-05-21T12:34:46.774638+00:00", "EventTime": "2024-05-21T12:34:46.774656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 139.194.211.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnN4SR3tP2a5u0tPff"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "e1994642-2ce6-45f3-b086-bd7e6377df12", "DetectTime": "2024-05-21T12:34:46.820549+00:00", "EventTime": "2024-05-21T12:34:46.820571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.214.247.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYeRQ2AYXaxRrKmc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "88dfa7c9-618f-4179-8eba-6d4a7df212ea", "DetectTime": "2024-05-21T12:34:46.847129+00:00", "EventTime": "2024-05-21T12:34:46.847151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RpMO2yIpnH6VklZ2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "fe9eba41-56dc-4bcb-bd55-c1ee47d8563e", "DetectTime": "2024-05-21T12:34:46.859943+00:00", "EventTime": "2024-05-21T12:34:46.859962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2FFg35FacQBPtX0h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "d4786a75-a743-4120-9699-cc8549701607", "DetectTime": "2024-05-21T12:34:46.918067+00:00", "EventTime": "2024-05-21T12:34:46.918088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGgOoeTCTNwzbSzl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "1d7b3e85-8b61-4104-b15a-d4b12f8b3405", "DetectTime": "2024-05-21T12:34:46.945658+00:00", "EventTime": "2024-05-21T12:34:46.945676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAo6z3jiOQKKgiSj6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "cada4501-27da-4c90-9f16-f0e97aae7b69", "DetectTime": "2024-05-21T12:34:46.980996+00:00", "EventTime": "2024-05-21T12:34:46.981015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV0Sb12MKIIsktn2sf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "5a59c0f2-d01e-48b3-8871-ffedb111bf44", "DetectTime": "2024-05-21T12:34:47.112578+00:00", "EventTime": "2024-05-21T12:34:47.112602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPLNbRWxv1SApF46"], "accumulated_threat_level": 8.799999999999999, "timewindow": 82} +{"Format": "IDEA0", "ID": "b610b3ae-4966-42ca-94a1-dc765eb76ef2", "DetectTime": "2024-05-21T12:34:47.137255+00:00", "EventTime": "2024-05-21T12:34:47.137275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lhwo3U9SCnqZ9oag"], "accumulated_threat_level": 9.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "38e2824f-7102-4fcb-9e89-ce1440e44b02", "DetectTime": "2024-05-21T12:34:47.142149+00:00", "EventTime": "2024-05-21T12:34:47.142167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bra12CQF8Sk8xKYd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "fcb9691b-aaab-4d26-896a-18027a1b33da", "DetectTime": "2024-05-21T12:34:47.193017+00:00", "EventTime": "2024-05-21T12:34:47.193037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbFt1b3c4vHbqJSI1k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "d3147ca8-4229-4813-a500-6fe7644f2934", "DetectTime": "2024-05-21T12:34:47.229674+00:00", "EventTime": "2024-05-21T12:34:47.229691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5u3sR3B0jEP683191"], "accumulated_threat_level": 10.4, "timewindow": 82} +{"Format": "IDEA0", "ID": "e06b448a-538a-43f6-8574-d8e9bc5ce887", "DetectTime": "2024-05-21T12:34:47.265669+00:00", "EventTime": "2024-05-21T12:34:47.265694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwxJK3ZwxUQ2J8QN8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "b3e51726-ac79-4a49-b16d-69cf50792523", "DetectTime": "2024-05-21T12:34:47.519758+00:00", "EventTime": "2024-05-21T12:34:47.519778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfBGUb90dKAKy8h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "ed40b7af-e1d2-4d8f-95a7-b95d3dfe4109", "DetectTime": "2024-05-21T12:34:47.564565+00:00", "EventTime": "2024-05-21T12:34:47.564597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0H8lf4fpjcjIodKy6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 82} +{"Format": "IDEA0", "ID": "e10d8357-4caa-4a4c-9c57-655964ff2cb7", "DetectTime": "2024-05-21T12:34:47.570567+00:00", "EventTime": "2024-05-21T12:34:47.570594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMxwB1xOOPDcWOvQ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "44c0f5b4-5e8f-4b1b-8563-267772ade2a6", "DetectTime": "2024-05-21T12:34:47.576332+00:00", "EventTime": "2024-05-21T12:34:47.576353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVb5F8bOidoEGbr0j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "3d49345c-0947-4b95-bdfa-f33594702748", "DetectTime": "2024-05-21T12:34:47.643772+00:00", "EventTime": "2024-05-21T12:34:47.643791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaVutV1VxzWpu8ug7e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "19f7e92c-c6c8-4c56-bb05-4e99649e61f5", "DetectTime": "2024-05-21T12:34:47.680340+00:00", "EventTime": "2024-05-21T12:34:47.680370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Y9zb2vQ2bC2foBl5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 82} +{"Format": "Json", "ID": "19f7e92c-c6c8-4c56-bb05-4e99649e61f5", "DetectTime": "2024-05-21T12:34:47.680340+00:00", "EventTime": "2024-05-21T12:34:47.680370+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-04T09:58:53.636464+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 82. (real time 2024/05/21 12:34:47.860503)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 82, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3334e60f-e3e9-488f-bf70-d0a5f5ed120c", "DetectTime": "2024-05-21T12:34:47.871339+00:00", "EventTime": "2024-05-21T12:34:47.871359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2ZzA1acIoO8rZDFj"], "accumulated_threat_level": 0.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "9def44e2-79b0-4bbf-bf4a-cbd6af8c096f", "DetectTime": "2024-05-21T12:34:47.884187+00:00", "EventTime": "2024-05-21T12:34:47.884208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuGnNI1ZkYIEoXW307"], "accumulated_threat_level": 1.6, "timewindow": 82} +{"Format": "IDEA0", "ID": "e111a081-2b92-42d6-95e0-a56d0a92fb4e", "DetectTime": "2024-05-21T12:34:47.895624+00:00", "EventTime": "2024-05-21T12:34:47.895642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmbjL3BzM5epn8Npe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 82} +{"Format": "IDEA0", "ID": "b30528f0-8421-4488-8231-4fae32e141f2", "DetectTime": "2024-05-21T12:34:47.908554+00:00", "EventTime": "2024-05-21T12:34:47.908573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy70RM3p9Boqwtahg3"], "accumulated_threat_level": 3.2, "timewindow": 82} +{"Format": "IDEA0", "ID": "4c18cfd1-9ace-4b2e-89c6-c61cc62b36fc", "DetectTime": "2024-05-21T12:34:47.919244+00:00", "EventTime": "2024-05-21T12:34:47.919263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6uqJ4OxjFgiUzre"], "accumulated_threat_level": 4.0, "timewindow": 82} +{"Format": "IDEA0", "ID": "a925fa5a-8610-4f60-9f4c-2a78be97835f", "DetectTime": "2024-05-21T12:34:48.215497+00:00", "EventTime": "2024-05-21T12:34:48.215515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciy24D1JzDy9tw2WJ5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "de5e278c-5760-4503-9184-28ef1a4a79e3", "DetectTime": "2024-05-21T12:34:48.242044+00:00", "EventTime": "2024-05-21T12:34:48.242065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEn0Az1KCLPBh3Gi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "33de4bde-78c5-4d1a-9c53-b258a08874a9", "DetectTime": "2024-05-21T12:34:48.247789+00:00", "EventTime": "2024-05-21T12:34:48.247809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKPObQbbMMI6jsu6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "33377d07-8814-4ee7-b8a6-44d95e82a077", "DetectTime": "2024-05-21T12:34:48.291849+00:00", "EventTime": "2024-05-21T12:34:48.291872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK2Ke34ykSnAESSP2f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "7ac08be9-042c-4435-807a-eb2f4298f56a", "DetectTime": "2024-05-21T12:34:48.344454+00:00", "EventTime": "2024-05-21T12:34:48.344478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCDFe0xA8NqKcOtc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "f3eb42fc-de00-49ad-a067-436040f5df7b", "DetectTime": "2024-05-21T12:34:48.350124+00:00", "EventTime": "2024-05-21T12:34:48.350142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywI8P1WBy3TzZQg3e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "0fa8e66a-ea92-4c2e-a567-a94ee213a4c5", "DetectTime": "2024-05-21T12:34:48.410810+00:00", "EventTime": "2024-05-21T12:34:48.410840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NBv3rKTOdiiU7ei"], "accumulated_threat_level": 0.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "bbac60a0-b3f3-4704-9d91-418eb0480b6b", "DetectTime": "2024-05-21T12:34:48.415793+00:00", "EventTime": "2024-05-21T12:34:48.415812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJfWJg1hN4bFI7W1Nk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "f470857a-f847-4b21-b629-9715931a7de6", "DetectTime": "2024-05-21T12:34:48.494970+00:00", "EventTime": "2024-05-21T12:34:48.494993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74Frd3EFzBfYwtYA5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "a1f8e4b6-52b2-4fb0-82c8-a4815e7694bd", "DetectTime": "2024-05-21T12:34:48.499831+00:00", "EventTime": "2024-05-21T12:34:48.499851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQnKOe4tRaQhtxWt91"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "064409bb-96cf-4d14-a949-ef444200fbde", "DetectTime": "2024-05-21T12:34:48.518463+00:00", "EventTime": "2024-05-21T12:34:48.518483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1Nne2F4bm3VyizTi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "67f9a86d-c2ad-44c5-bfb7-543d86e54acc", "DetectTime": "2024-05-21T12:34:48.826403+00:00", "EventTime": "2024-05-21T12:34:48.826437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHoyx3DXBC6DDjzmj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "ffea0018-f65e-44b6-8715-907771294ab0", "DetectTime": "2024-05-21T12:34:48.863558+00:00", "EventTime": "2024-05-21T12:34:48.863580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbhUA85wIC1TLJxA5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "c7d8ccd0-aad7-40ce-b62d-4ef2333a91d0", "DetectTime": "2024-05-21T12:34:48.962763+00:00", "EventTime": "2024-05-21T12:34:48.962780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.188.253.63"]}], "Attach": [{"Content": "Connection to unknown destination port 7184/UDP destination IP 99.188.253.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdtmx03q5YngsitKbe"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f368ebd3-6994-42e1-a4ff-cea272687f0e", "DetectTime": "2024-05-21T12:34:49.007917+00:00", "EventTime": "2024-05-21T12:34:49.007935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.194.154.27"]}], "Attach": [{"Content": "Connection to unknown destination port 2324/UDP destination IP 108.194.154.27. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFwIVnGpF2mwvZ8h9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 83} +{"Format": "IDEA0", "ID": "40a39748-4417-4aba-90c6-b37d6f5e4fd6", "DetectTime": "2024-05-21T12:34:49.041985+00:00", "EventTime": "2024-05-21T12:34:49.042004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.244.250.216"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 88.244.250.216. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZkoAl1fSQseeLx73e"], "accumulated_threat_level": 3.2, "timewindow": 83} +{"Format": "IDEA0", "ID": "221f99e2-406b-4d22-a5d5-524adceb5a62", "DetectTime": "2024-05-21T12:34:49.080041+00:00", "EventTime": "2024-05-21T12:34:49.080061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeO2F54E94Y0gS2iah"], "accumulated_threat_level": 4.0, "timewindow": 83} +{"Format": "IDEA0", "ID": "9b8c9b38-9151-4888-8bcb-8c9863615fd4", "DetectTime": "2024-05-21T12:34:49.124371+00:00", "EventTime": "2024-05-21T12:34:49.124388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COeTsu13oQUmAVu4Dj"], "accumulated_threat_level": 4.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "0d8880c4-aa34-4b2f-b05c-b3d9dd432495", "DetectTime": "2024-05-21T12:34:49.147767+00:00", "EventTime": "2024-05-21T12:34:49.147789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwb6mU9OZW3XxiV9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "60301581-0c22-40e5-aa2d-a070106be422", "DetectTime": "2024-05-21T12:34:49.179677+00:00", "EventTime": "2024-05-21T12:34:49.179694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmldFl34PVAJnjlVeb"], "accumulated_threat_level": 5.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9f32fd09-5e48-4c60-9cd4-c22ead492004", "DetectTime": "2024-05-21T12:34:49.207147+00:00", "EventTime": "2024-05-21T12:34:49.207168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccs7pE3RMZJw9tXEA9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "7ea9dbcf-82ec-4430-a55e-2518e2e398e8", "DetectTime": "2024-05-21T12:34:49.248274+00:00", "EventTime": "2024-05-21T12:34:49.248296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.118.5.189"]}], "Attach": [{"Content": "Connection to unknown destination port 8348/UDP destination IP 99.118.5.189. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQz8564izBge8MQySh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 83} +{"Format": "IDEA0", "ID": "1e23ae36-5926-4f06-ad93-96c71b773672", "DetectTime": "2024-05-21T12:34:49.287845+00:00", "EventTime": "2024-05-21T12:34:49.287865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.139.2.103"]}], "Attach": [{"Content": "Connection to unknown destination port 9922/UDP destination IP 89.139.2.103. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkIE9z4wUvdc4TsHqc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "2bae030d-bae4-4229-8784-e09579f6aba8", "DetectTime": "2024-05-21T12:34:49.325703+00:00", "EventTime": "2024-05-21T12:34:49.325723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.10.105.137"]}], "Attach": [{"Content": "Connection to unknown destination port 10088/UDP destination IP 46.10.105.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8BHrY07Oe0hN7dw5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "78dc0625-883f-4528-999b-029e709b4f3c", "DetectTime": "2024-05-21T12:34:49.363559+00:00", "EventTime": "2024-05-21T12:34:49.363577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.51.105.117"]}], "Attach": [{"Content": "Connection to unknown destination port 7836/UDP destination IP 92.51.105.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcdLd4r0Q5VzaRqR3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "3cbf73c0-81e0-4dc3-a0fa-9001642ebd8e", "DetectTime": "2024-05-21T12:34:49.583279+00:00", "EventTime": "2024-05-21T12:34:49.583297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKoor3AQwd2mIOI47"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "b322d31e-9b0a-4797-a163-c5bf3f45c4a1", "DetectTime": "2024-05-21T12:34:49.615838+00:00", "EventTime": "2024-05-21T12:34:49.615862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6pOP3ibdbCcg0QS1"], "accumulated_threat_level": 9.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c8ac24d6-8e14-4fb0-85a9-e4c49cc0a124", "DetectTime": "2024-05-21T12:34:49.645171+00:00", "EventTime": "2024-05-21T12:34:49.645194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYxYs3IgAOIf3RHtd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "ef35f746-1c53-4a32-810a-f2b0b98adcfe", "DetectTime": "2024-05-21T12:34:49.682027+00:00", "EventTime": "2024-05-21T12:34:49.682049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.149.119.209"]}], "Attach": [{"Content": "Connection to unknown destination port 25608/UDP destination IP 189.149.119.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45Eep100DYgeoTPO3"], "accumulated_threat_level": 10.4, "timewindow": 83} +{"Format": "IDEA0", "ID": "e4eb42a9-7627-4d06-9415-bc7e1e3f2ae5", "DetectTime": "2024-05-21T12:34:49.711544+00:00", "EventTime": "2024-05-21T12:34:49.711566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSK5o3np8rhjwanh3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "bebfeec6-4908-4aa4-9eb6-e8cdbb23ab77", "DetectTime": "2024-05-21T12:34:49.744112+00:00", "EventTime": "2024-05-21T12:34:49.744132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.36.56.127"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.36.56.127. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg4VdpFGOxzc31xC2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 83} +{"Format": "IDEA0", "ID": "ce7b201f-609d-42a9-8757-d4e098dd29bd", "DetectTime": "2024-05-21T12:34:49.770166+00:00", "EventTime": "2024-05-21T12:34:49.770188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C70Qar284lxjFoNDZ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 80} +{"Format": "IDEA0", "ID": "89fedab1-cc61-404c-8df8-31ef8fc09d34", "DetectTime": "2024-05-21T12:34:49.800742+00:00", "EventTime": "2024-05-21T12:34:49.800761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "Connection to unknown destination port 2756/UDP destination IP 2.85.40.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp7Dr61cJbj4bOYwtl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 83} +{"Format": "Json", "ID": "89fedab1-cc61-404c-8df8-31ef8fc09d34", "DetectTime": "2024-05-21T12:34:49.800742+00:00", "EventTime": "2024-05-21T12:34:49.800761+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.40.218"]}], "Attach": [{"Content": "1970-01-04T10:30:26.610205+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2024/05/21 12:34:49.948992)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 83, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "af5419a1-f3ff-4063-b354-19dcf1344709", "DetectTime": "2024-05-21T12:34:49.961224+00:00", "EventTime": "2024-05-21T12:34:49.961250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdAon3aOyuQxdI3md"], "accumulated_threat_level": 0.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "19927e38-ef38-4d98-935d-4f8e499a845b", "DetectTime": "2024-05-21T12:34:49.966746+00:00", "EventTime": "2024-05-21T12:34:49.966767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch7rAu4IfFLZqqcdni"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "ebd4247c-dd66-41df-a01b-44b6404a552b", "DetectTime": "2024-05-21T12:34:50.102565+00:00", "EventTime": "2024-05-21T12:34:50.102584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.160.9.130"]}], "Attach": [{"Content": "Connection to unknown destination port 8136/UDP destination IP 99.160.9.130. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxtstm1tkT0SJ2MJH5"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a94e6447-112a-495b-a30d-e4c765532aa3", "DetectTime": "2024-05-21T12:34:50.121934+00:00", "EventTime": "2024-05-21T12:34:50.121958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY6kpxGYZy0UhhSv2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "509d4933-0ca8-48ab-a480-175e3c5d02f0", "DetectTime": "2024-05-21T12:34:50.245108+00:00", "EventTime": "2024-05-21T12:34:50.245129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiinW18gB05B1MO3j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 83} +{"Format": "IDEA0", "ID": "cd970e75-2420-463b-a564-5f99dcc6e6da", "DetectTime": "2024-05-21T12:34:50.277622+00:00", "EventTime": "2024-05-21T12:34:50.277646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd4N44NP3NZ62u7f5"], "accumulated_threat_level": 3.2, "timewindow": 83} +{"Format": "IDEA0", "ID": "73cf4d94-e1dd-4789-acbb-733bee57d749", "DetectTime": "2024-05-21T12:34:50.306181+00:00", "EventTime": "2024-05-21T12:34:50.306203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CScBV14xSsZ2Q92Vkl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "df602205-219c-4240-b1a1-010276c32268", "DetectTime": "2024-05-21T12:34:50.338649+00:00", "EventTime": "2024-05-21T12:34:50.338669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1Lco4qVKLmeV86la"], "accumulated_threat_level": 4.0, "timewindow": 83} +{"Format": "IDEA0", "ID": "66f8adfa-8790-4307-a1cb-53b057946845", "DetectTime": "2024-05-21T12:34:50.378263+00:00", "EventTime": "2024-05-21T12:34:50.378283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbbs9r1dmYOvUhhOci"], "accumulated_threat_level": 4.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "75afadbc-a1b9-401e-9d24-c29eb395efcc", "DetectTime": "2024-05-21T12:34:50.418372+00:00", "EventTime": "2024-05-21T12:34:50.418393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.79.114.250"]}], "Attach": [{"Content": "Connection to unknown destination port 6123/UDP destination IP 76.79.114.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdDYsx43nEErIUxMN9"], "accumulated_threat_level": 5.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "0c7beff8-6793-43d0-b6b3-01e989e683f6", "DetectTime": "2024-05-21T12:34:50.456875+00:00", "EventTime": "2024-05-21T12:34:50.456896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.72.22.249"]}], "Attach": [{"Content": "Connection to unknown destination port 3956/UDP destination IP 190.72.22.249. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSz6Qf3duLfUdGppqd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 83} +{"Format": "IDEA0", "ID": "7fb27671-93fe-47ed-82ac-a9eca9f90979", "DetectTime": "2024-05-21T12:34:50.496651+00:00", "EventTime": "2024-05-21T12:34:50.496673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.52.57.142"]}], "Attach": [{"Content": "Connection to unknown destination port 10172/UDP destination IP 188.52.57.142. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI88MXfIRSuaiWHP3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "c8b830fc-2820-4532-ad01-3e88c81019eb", "DetectTime": "2024-05-21T12:34:50.525806+00:00", "EventTime": "2024-05-21T12:34:50.525825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6SfbC4cphOBxMRpeb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "ddd1788b-2ac3-44e9-b5f1-0f0f42e2ba93", "DetectTime": "2024-05-21T12:34:50.768573+00:00", "EventTime": "2024-05-21T12:34:50.768592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["183.89.113.140"]}], "Attach": [{"Content": "Connection to unknown destination port 28486/UDP destination IP 183.89.113.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Covpym2bYscK8loOY1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "bdf128bc-7352-45f9-9633-39807058c36c", "DetectTime": "2024-05-21T12:34:50.852580+00:00", "EventTime": "2024-05-21T12:34:50.852601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOsIR3Vn959JvcaZ9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "71eb639e-8027-498b-8732-7f6c89ff0fd1", "DetectTime": "2024-05-21T12:34:50.897218+00:00", "EventTime": "2024-05-21T12:34:50.897237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXEvz2Jxgia3wS0v5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "9231ec1b-2e7f-481d-abe3-488a8535ab14", "DetectTime": "2024-05-21T12:34:50.934985+00:00", "EventTime": "2024-05-21T12:34:50.935005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClQxxU2ysy7qVhJpVc"], "accumulated_threat_level": 9.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "ded9848a-818f-4b22-8e4a-b122aba582de", "DetectTime": "2024-05-21T12:34:50.973335+00:00", "EventTime": "2024-05-21T12:34:50.973355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8TWZk2fqLqexPkSKf"], "accumulated_threat_level": 10.4, "timewindow": 83} +{"Format": "IDEA0", "ID": "2d2cabe7-7ae3-4669-8081-170ab8122a8e", "DetectTime": "2024-05-21T12:34:51.013258+00:00", "EventTime": "2024-05-21T12:34:51.013279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVn5FA1HXstFuH3Jf6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 83} +{"Format": "IDEA0", "ID": "3f53f242-0758-4b2a-b0af-3692950615f9", "DetectTime": "2024-05-21T12:34:51.041618+00:00", "EventTime": "2024-05-21T12:34:51.041641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxX3bJm4xNeXDNAD3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "1996b01a-7f86-49eb-adaa-4904b4b853c6", "DetectTime": "2024-05-21T12:34:51.096859+00:00", "EventTime": "2024-05-21T12:34:51.096878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.15.211"]}], "Attach": [{"Content": "Connection to unknown destination port 10483/UDP destination IP 95.58.15.211. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgp26W1OKvhZKObdXj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 83} +{"Format": "Json", "ID": "1996b01a-7f86-49eb-adaa-4904b4b853c6", "DetectTime": "2024-05-21T12:34:51.096859+00:00", "EventTime": "2024-05-21T12:34:51.096878+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.58.15.211"]}], "Attach": [{"Content": "1970-01-04T10:31:12.927482+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2024/05/21 12:34:51.276195)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 83, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8c4b01a4-4734-4ffa-b2e1-c95b22c0cfaa", "DetectTime": "2024-05-21T12:34:51.287934+00:00", "EventTime": "2024-05-21T12:34:51.287957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2kSaMYqs2rvOXa"], "accumulated_threat_level": 0.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "211d328e-266b-42dd-afae-0f8d0084670f", "DetectTime": "2024-05-21T12:34:51.308447+00:00", "EventTime": "2024-05-21T12:34:51.308468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2Hse2iCBYF21qFPj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a55b9e28-34a5-4a36-914b-964cc1efce0b", "DetectTime": "2024-05-21T12:34:51.319625+00:00", "EventTime": "2024-05-21T12:34:51.319645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpS3eQ173z2oj8oybe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 83} +{"Format": "IDEA0", "ID": "b9909a36-58c3-414a-95fb-6fed113b0ba3", "DetectTime": "2024-05-21T12:34:51.324975+00:00", "EventTime": "2024-05-21T12:34:51.325000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COesOn2VTOFl6H0y94"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "0251f405-4dee-4c53-aa06-ffd9ffcccf23", "DetectTime": "2024-05-21T12:34:51.337356+00:00", "EventTime": "2024-05-21T12:34:51.337375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuTgZT1ZbKpOFPlMbi"], "accumulated_threat_level": 3.2, "timewindow": 83} +{"Format": "IDEA0", "ID": "281bbb42-adcc-4022-8d3b-aa35e6b3c4dc", "DetectTime": "2024-05-21T12:34:51.510556+00:00", "EventTime": "2024-05-21T12:34:51.510575+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh5ac3M4Yo0Zi03Xa"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "e7d13d8a-ef5f-493b-b7f4-526a1597ee93", "DetectTime": "2024-05-21T12:34:51.524013+00:00", "EventTime": "2024-05-21T12:34:51.524032+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh5ac3M4Yo0Zi03Xa"], "accumulated_threat_level": 10.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9c7d4d46-90c1-4dfc-a40b-413070e5caa7", "DetectTime": "2024-05-21T12:34:51.537962+00:00", "EventTime": "2024-05-21T12:34:51.537981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQi1jy9ahBvNpow7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "3e4256c7-5b64-4cb9-80fe-0de85fb6c3a7", "DetectTime": "2024-05-21T12:34:51.549757+00:00", "EventTime": "2024-05-21T12:34:51.549774+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6ydPSeC95MJq258"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "590ede43-8594-44bf-a344-ffb7ce8334c4", "DetectTime": "2024-05-21T12:34:51.563506+00:00", "EventTime": "2024-05-21T12:34:51.563532+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6ydPSeC95MJq258"], "accumulated_threat_level": 11.3, "timewindow": 24} +{"Format": "IDEA0", "ID": "ee131fe9-af55-4a9d-941b-6420cd8816cc", "DetectTime": "2024-05-21T12:34:51.578881+00:00", "EventTime": "2024-05-21T12:34:51.578900+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci5osgAZX47pg6v9"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "1af8d51b-e328-41c5-99a7-b0888a4618c5", "DetectTime": "2024-05-21T12:34:51.590307+00:00", "EventTime": "2024-05-21T12:34:51.590326+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci5osgAZX47pg6v9"], "accumulated_threat_level": 11.8, "timewindow": 24} +{"Format": "IDEA0", "ID": "9b771d44-ce01-4cbe-9522-f68f9e6e5394", "DetectTime": "2024-05-21T12:34:51.609189+00:00", "EventTime": "2024-05-21T12:34:51.609207+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLTuT71FgHSjftMH44"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "3429871a-818a-4b1c-bd67-e4e29560d398", "DetectTime": "2024-05-21T12:34:51.623006+00:00", "EventTime": "2024-05-21T12:34:51.623028+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLTuT71FgHSjftMH44"], "accumulated_threat_level": 12.3, "timewindow": 24} +{"Format": "Json", "ID": "3429871a-818a-4b1c-bd67-e4e29560d398", "DetectTime": "2024-05-21T12:34:51.623006+00:00", "EventTime": "2024-05-21T12:34:51.623028+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "1970-01-01T23:01:04.717782+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:34:52.642355)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.3, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.3} +{"Format": "IDEA0", "ID": "51ea08d3-5d10-487b-9cdb-8912218b926a", "DetectTime": "2024-05-21T12:34:52.646880+00:00", "EventTime": "2024-05-21T12:34:52.646900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2jAF3aMbja8EbrE9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "ed00ec78-fadf-41ef-8c46-f4bd5800340f", "DetectTime": "2024-05-21T12:34:52.659555+00:00", "EventTime": "2024-05-21T12:34:52.659574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjpQUwEItFJKNB2Ma"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "390193df-7151-4f91-b802-384265e5fba5", "DetectTime": "2024-05-21T12:34:52.671152+00:00", "EventTime": "2024-05-21T12:34:52.671171+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjpQUwEItFJKNB2Ma"], "accumulated_threat_level": 0.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "a96a7b64-efc8-44d2-984e-f7a1a6e6fca6", "DetectTime": "2024-05-21T12:34:52.675631+00:00", "EventTime": "2024-05-21T12:34:52.675648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsiad4MaJHBj2mqV"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "d24d91b7-10ca-4ff0-87b8-f2a3e05b88d3", "DetectTime": "2024-05-21T12:34:52.679859+00:00", "EventTime": "2024-05-21T12:34:52.679876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUseuO3tXtEYtl8tQ6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "ae56a4e1-a9e8-4659-a47e-e10230cb92f9", "DetectTime": "2024-05-21T12:34:52.690664+00:00", "EventTime": "2024-05-21T12:34:52.690683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXYyvW2ZyyiC0glJ"], "accumulated_threat_level": 4.0, "timewindow": 83} +{"Format": "IDEA0", "ID": "2ba9ec6f-11be-4788-a96d-ad4263a444e5", "DetectTime": "2024-05-21T12:34:52.696122+00:00", "EventTime": "2024-05-21T12:34:52.696139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPYRV2uQM0baRB3Fg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "5852ab23-a93b-44a2-82d0-7eddf53034eb", "DetectTime": "2024-05-21T12:34:52.708506+00:00", "EventTime": "2024-05-21T12:34:52.708528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXLbLS1TnUpIdHO82h"], "accumulated_threat_level": 4.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "9d518bd2-cc4a-4129-9bb9-a5f58069414f", "DetectTime": "2024-05-21T12:34:52.720089+00:00", "EventTime": "2024-05-21T12:34:52.720108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5K3w63mZm0MqKhRKf"], "accumulated_threat_level": 5.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "6d814b51-dc29-4a96-81f9-34905774b7cf", "DetectTime": "2024-05-21T12:34:52.725191+00:00", "EventTime": "2024-05-21T12:34:52.725211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUTrV10BxQ4cRM718"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "ee10377f-25a9-46f9-a0e2-bcaa8d3b8fde", "DetectTime": "2024-05-21T12:34:52.736338+00:00", "EventTime": "2024-05-21T12:34:52.736356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Azpj2aS1zTsM9X41"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 83} +{"Format": "IDEA0", "ID": "9675ac92-e5e1-4cb4-86b8-7837898b1a68", "DetectTime": "2024-05-21T12:34:52.747509+00:00", "EventTime": "2024-05-21T12:34:52.747526+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbYOh45hlX11UGgHk"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ab2ebf97-f340-48fc-9fad-a3b8775f6d53", "DetectTime": "2024-05-21T12:34:52.758439+00:00", "EventTime": "2024-05-21T12:34:52.758458+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbYOh45hlX11UGgHk"], "accumulated_threat_level": 1.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "6e0b991d-83b1-4558-962c-32a6526403f9", "DetectTime": "2024-05-21T12:34:52.769719+00:00", "EventTime": "2024-05-21T12:34:52.769740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDR98kQC7OeeFThy6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "bd2091c2-427c-4a3a-8c2e-2bf006a8c09c", "DetectTime": "2024-05-21T12:34:52.780680+00:00", "EventTime": "2024-05-21T12:34:52.780700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyvjb039xy4sRIFcp4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "88e6ec14-518e-4b43-b3fb-d9e81d358c0e", "DetectTime": "2024-05-21T12:34:52.792000+00:00", "EventTime": "2024-05-21T12:34:52.792018+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgLwR1sjuj2VHhdNc"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "13ceaabb-b243-46bb-9a4e-3d0007cee5d1", "DetectTime": "2024-05-21T12:34:52.803441+00:00", "EventTime": "2024-05-21T12:34:52.803459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgLwR1sjuj2VHhdNc"], "accumulated_threat_level": 1.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "697d6a47-3534-4a21-a02a-8a28ee6b44b1", "DetectTime": "2024-05-21T12:34:52.814762+00:00", "EventTime": "2024-05-21T12:34:52.814785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEN9i4oKQiiOdIzac"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "bc8ce089-57ca-4964-9901-be1edc14eed2", "DetectTime": "2024-05-21T12:34:52.826782+00:00", "EventTime": "2024-05-21T12:34:52.826800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEN9i4oKQiiOdIzac"], "accumulated_threat_level": 2.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "6e374c1e-32b7-49a8-9391-7483a9e656a3", "DetectTime": "2024-05-21T12:34:52.838162+00:00", "EventTime": "2024-05-21T12:34:52.838182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88WHbnE8mVNmCwa1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "d786fded-fdaf-48ad-ae59-ab7afcf2d610", "DetectTime": "2024-05-21T12:34:52.843131+00:00", "EventTime": "2024-05-21T12:34:52.843148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnbDB83i43KUc44Eol"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "44e04e42-cb61-4c84-8215-cc06ac531a1f", "DetectTime": "2024-05-21T12:34:52.847804+00:00", "EventTime": "2024-05-21T12:34:52.847822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2F4p2TSyxZtPlNUa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "174ed99c-600e-4abc-b893-8d9f5dc83645", "DetectTime": "2024-05-21T12:34:52.852635+00:00", "EventTime": "2024-05-21T12:34:52.852653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckmmlk2ADyV4D3rJUe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "a2b818a2-811e-4555-899a-f37b8bb06ee8", "DetectTime": "2024-05-21T12:34:52.856957+00:00", "EventTime": "2024-05-21T12:34:52.856975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gXo21JYFEViKogkh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "e041ce6b-90a2-4481-99e8-84fb9f25ad98", "DetectTime": "2024-05-21T12:34:52.861310+00:00", "EventTime": "2024-05-21T12:34:52.861327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVLNZ1tSOALrgqgvc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "bf67b275-c379-4219-acac-06d1f63c433a", "DetectTime": "2024-05-21T12:34:52.871578+00:00", "EventTime": "2024-05-21T12:34:52.871596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoAZrs4NlqB2Pn7NO7"], "accumulated_threat_level": 9.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "69630254-2601-4b88-a42a-122933119fe9", "DetectTime": "2024-05-21T12:34:52.884821+00:00", "EventTime": "2024-05-21T12:34:52.884842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.137.7.240"]}], "Attach": [{"Content": "Connection to unknown destination port 19010/UDP destination IP 110.137.7.240. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvr7Tg4IKlAnNRWet1"], "accumulated_threat_level": 10.4, "timewindow": 83} +{"Format": "IDEA0", "ID": "183246e9-1b62-402b-ba38-d26287639f92", "DetectTime": "2024-05-21T12:34:52.967726+00:00", "EventTime": "2024-05-21T12:34:52.967747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcuaH44mNz5ghAg6s4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "7e745c4a-af8a-439c-9910-7a9da0bb46d1", "DetectTime": "2024-05-21T12:34:53.006241+00:00", "EventTime": "2024-05-21T12:34:53.006263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMHmH36SRhXkgqTNg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "29d5be5f-5b50-47c9-9557-4e5500de6005", "DetectTime": "2024-05-21T12:34:53.043845+00:00", "EventTime": "2024-05-21T12:34:53.043865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C78XKO334Z7iuw7r84"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "76d475ee-1b54-4de5-b628-de3434be84ab", "DetectTime": "2024-05-21T12:34:53.083565+00:00", "EventTime": "2024-05-21T12:34:53.083585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWeQrRgnAwf8lPtoe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "35fabb4a-7e40-462d-9cd8-1048ff6477e8", "DetectTime": "2024-05-21T12:34:53.371878+00:00", "EventTime": "2024-05-21T12:34:53.371898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57cSf3ic6SDLfrVRa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 83} +{"Format": "IDEA0", "ID": "35e37312-041d-474a-ac04-1da79b5fc839", "DetectTime": "2024-05-21T12:34:53.383874+00:00", "EventTime": "2024-05-21T12:34:53.383894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NESZ1eoJaQoT4mVc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "58e0b582-9ee0-4fe9-96e5-105dc5302a6a", "DetectTime": "2024-05-21T12:34:53.415211+00:00", "EventTime": "2024-05-21T12:34:53.415233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnN0FC38xWTh4M9nBe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "4f45d00f-01b6-43d0-bf9a-b9c9237c23c6", "DetectTime": "2024-05-21T12:34:53.423565+00:00", "EventTime": "2024-05-21T12:34:53.423586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJmX72qb1wHQzFZe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "042192db-30c9-4434-bb51-b56b53cbd6f2", "DetectTime": "2024-05-21T12:34:53.433972+00:00", "EventTime": "2024-05-21T12:34:53.433993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFI9rd496HD72srdaa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "4fa1918e-f634-4f47-8610-3745e188ce70", "DetectTime": "2024-05-21T12:34:53.438884+00:00", "EventTime": "2024-05-21T12:34:53.438904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdSAQvAXq88Njbxnf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "675037ca-2e31-4b19-b1b2-66b8f0452ac9", "DetectTime": "2024-05-21T12:34:53.456107+00:00", "EventTime": "2024-05-21T12:34:53.456124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR21KC3AbFoqhVxSB6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "c93340e7-f26f-4c41-85f5-35fac5ec5bbb", "DetectTime": "2024-05-21T12:34:53.609100+00:00", "EventTime": "2024-05-21T12:34:53.609126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3BNP2pnZuYlM5fAc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "7dcd9ac3-2d2e-443b-a080-fd8c6ab7f9b7", "DetectTime": "2024-05-21T12:34:53.620300+00:00", "EventTime": "2024-05-21T12:34:53.620319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"]}], "Attach": [{"Content": "Connection to unknown destination port 15171/UDP destination IP 203.198.93.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLhQB2fe5LKvFXUY4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 83} +{"Format": "Json", "ID": "7dcd9ac3-2d2e-443b-a080-fd8c6ab7f9b7", "DetectTime": "2024-05-21T12:34:53.620300+00:00", "EventTime": "2024-05-21T12:34:53.620319+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"]}], "Attach": [{"Content": "1970-01-04T10:32:42.892691+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2024/05/21 12:34:53.835793)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 83, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c752619b-8a7f-4224-a818-11bcfc8fae2c", "DetectTime": "2024-05-21T12:34:53.839936+00:00", "EventTime": "2024-05-21T12:34:53.839957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawHjs25vbTfccHN1a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "16f744f7-0909-4251-9ee7-eb16d608871a", "DetectTime": "2024-05-21T12:34:53.850597+00:00", "EventTime": "2024-05-21T12:34:53.850616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmY8JSjWqEXsrTGj"], "accumulated_threat_level": 0.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "905cf2af-bfb5-40c1-814d-a7dbd824cdfd", "DetectTime": "2024-05-21T12:34:53.984509+00:00", "EventTime": "2024-05-21T12:34:53.984530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbSkRD1lcTW1IBw5I7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "21928cc3-6e95-433b-8e5a-058100e7c265", "DetectTime": "2024-05-21T12:34:54.045690+00:00", "EventTime": "2024-05-21T12:34:54.045713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.33.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrqGUC3X49I0CGSaMb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "7c7bd436-79c5-4fec-a803-348bad0270ef", "DetectTime": "2024-05-21T12:34:54.077983+00:00", "EventTime": "2024-05-21T12:34:54.078002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["182.64.80.71"]}], "Attach": [{"Content": "Connection to unknown destination port 17782/UDP destination IP 182.64.80.71. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZn3x2nd9UtEKCfm6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "1702dd9c-ad91-49db-a6fc-d005bc333aa9", "DetectTime": "2024-05-21T12:34:54.104537+00:00", "EventTime": "2024-05-21T12:34:54.104559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfK7172XKpRK2IPNP9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "88fa2c89-fcbc-4039-80bf-5319f3569fb3", "DetectTime": "2024-05-21T12:34:54.138156+00:00", "EventTime": "2024-05-21T12:34:54.138177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrHPii29LQphcsygug"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "32cfa48b-23a0-40d2-a9aa-f3bdcf17026a", "DetectTime": "2024-05-21T12:34:54.179474+00:00", "EventTime": "2024-05-21T12:34:54.179494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdZIt3qZhMtDkeGM8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "71b90c84-fd73-4e7b-b7e2-1eb3d4b9ac2a", "DetectTime": "2024-05-21T12:34:54.207969+00:00", "EventTime": "2024-05-21T12:34:54.207991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0PW2b1Cjt5JZvj2Rl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "e655d21e-74a8-46cc-b9a2-7664d89532c2", "DetectTime": "2024-05-21T12:34:54.248971+00:00", "EventTime": "2024-05-21T12:34:54.248989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SBzj3UvRxXHM9udh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "d929a9d7-96e8-4bdd-8e1a-80df9bf6712c", "DetectTime": "2024-05-21T12:34:54.321148+00:00", "EventTime": "2024-05-21T12:34:54.321167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 201.209.29.166. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbZ7q1kWwIsrc3wri"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 83} +{"Format": "IDEA0", "ID": "096d8487-1a87-43c1-b8f4-278daa674e00", "DetectTime": "2024-05-21T12:34:54.616605+00:00", "EventTime": "2024-05-21T12:34:54.616626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.74.91.96"]}], "Attach": [{"Content": "Connection to unknown destination port 4555/UDP destination IP 176.74.91.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5GsKY38lTCwCPLPhd"], "accumulated_threat_level": 3.2, "timewindow": 83} +{"Format": "IDEA0", "ID": "db4676eb-ba2d-48a7-a5e7-9c777fd976ef", "DetectTime": "2024-05-21T12:34:54.622037+00:00", "EventTime": "2024-05-21T12:34:54.622056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCYDAl4rmgHm1AGLd5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "37211a8a-0042-406e-bfb2-8e8fd6d1fef1", "DetectTime": "2024-05-21T12:34:54.636782+00:00", "EventTime": "2024-05-21T12:34:54.636803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hWzwwnv6nDA1Vuj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "480def05-41cc-4cd3-80e3-7fae68a06d04", "DetectTime": "2024-05-21T12:34:54.999242+00:00", "EventTime": "2024-05-21T12:34:54.999264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CflZ7racloT84LXlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "203fe5e5-985a-435f-8116-33c1f9ce1728", "DetectTime": "2024-05-21T12:34:55.007535+00:00", "EventTime": "2024-05-21T12:34:55.007557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHTi82FMNm8LlP7Vb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "03daab56-9e29-4d80-91dc-2bc0607fc1b2", "DetectTime": "2024-05-21T12:34:55.013208+00:00", "EventTime": "2024-05-21T12:34:55.013228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdZ9026Vb97rcHxC"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "9f6689b3-6791-4dcf-9d2b-41c8872fec0f", "DetectTime": "2024-05-21T12:34:55.018753+00:00", "EventTime": "2024-05-21T12:34:55.018773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIuUoJSXBYieCnGf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "c4b78499-1c12-409d-856b-54e665e4c376", "DetectTime": "2024-05-21T12:34:55.023166+00:00", "EventTime": "2024-05-21T12:34:55.023184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPhm83gKafC4CrxXj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "e9efd0fe-f5df-4376-a8f0-5de9958edda7", "DetectTime": "2024-05-21T12:34:55.028762+00:00", "EventTime": "2024-05-21T12:34:55.028779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPAHg4t60TKUOKHpc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "19b9bd23-4af2-4d11-978d-172ba293e94a", "DetectTime": "2024-05-21T12:34:55.033363+00:00", "EventTime": "2024-05-21T12:34:55.033382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4ynK3IVY8BlGfK9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "59aae31f-f13e-4a6c-b3ae-c8740d4524fb", "DetectTime": "2024-05-21T12:34:55.043826+00:00", "EventTime": "2024-05-21T12:34:55.043847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBO2ix1sD53Ek5gkOa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "3b743bbe-9e93-4b27-9da1-39a1924a9df6", "DetectTime": "2024-05-21T12:34:55.102334+00:00", "EventTime": "2024-05-21T12:34:55.102357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0XIfLdPpGQton84l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "42449f51-7cca-4db9-9946-81f30c92c34b", "DetectTime": "2024-05-21T12:34:55.301311+00:00", "EventTime": "2024-05-21T12:34:55.301334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2CghN3qz5993dlFT8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "e22a0bd7-90cf-49d5-97ef-664797584222", "DetectTime": "2024-05-21T12:34:55.306643+00:00", "EventTime": "2024-05-21T12:34:55.306664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czx6Q522RzOoQjaWP3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "749a621c-692a-4e17-8b4f-87f81b7e9289", "DetectTime": "2024-05-21T12:34:55.632060+00:00", "EventTime": "2024-05-21T12:34:55.632088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cig2Az2xnW0gpHHeWg"], "accumulated_threat_level": 4.0, "timewindow": 83} +{"Format": "IDEA0", "ID": "1b1758d0-4715-46d6-b24d-094522fd4fa9", "DetectTime": "2024-05-21T12:34:55.638675+00:00", "EventTime": "2024-05-21T12:34:55.638697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMpsBkWGIFDU0iTh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "84c4c2b8-7d4e-4760-bc36-4c8b99d17dd7", "DetectTime": "2024-05-21T12:34:55.643313+00:00", "EventTime": "2024-05-21T12:34:55.643331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9v4a2kaczWqs00bf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "84d053a5-1174-44e8-833f-0593183de667", "DetectTime": "2024-05-21T12:34:55.647606+00:00", "EventTime": "2024-05-21T12:34:55.647624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDAEM2MmYHXJw2kd1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "a2934dcc-a3b3-40c6-a06b-5da11fb6bf01", "DetectTime": "2024-05-21T12:34:55.652195+00:00", "EventTime": "2024-05-21T12:34:55.652212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbvWg2uicbuEy9Tyj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "dd8bad8a-b67d-4ec2-ab8f-e4eada166204", "DetectTime": "2024-05-21T12:34:55.656965+00:00", "EventTime": "2024-05-21T12:34:55.656982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcdJh248B9bA7WjXf5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "0636f546-453d-40a3-a735-5c1b480ed84d", "DetectTime": "2024-05-21T12:34:55.706037+00:00", "EventTime": "2024-05-21T12:34:55.706059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kl8lCkTv7dwIxd5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "fd82fc2b-669a-4698-87dd-03f613d0103e", "DetectTime": "2024-05-21T12:34:55.792723+00:00", "EventTime": "2024-05-21T12:34:55.792745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJM9Rx3Pyru7LEijhi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "e4a40f4b-ed70-4487-88e4-1a7a9b0dbe53", "DetectTime": "2024-05-21T12:34:55.867221+00:00", "EventTime": "2024-05-21T12:34:55.867240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJmRt1VCPnVZKus0i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "0b7379b4-6410-4094-90c4-c779752072a0", "DetectTime": "2024-05-21T12:34:55.898237+00:00", "EventTime": "2024-05-21T12:34:55.898260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClOGDhiMnLiIvB6T3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "d10f70d5-0e3f-4d89-a2ba-f3c16c2a4e6d", "DetectTime": "2024-05-21T12:34:56.158100+00:00", "EventTime": "2024-05-21T12:34:56.158121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhzmD2omMONdQTx3e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 81} +{"Format": "IDEA0", "ID": "88f44eb9-9922-4b2b-88a4-8a63da9d5596", "DetectTime": "2024-05-21T12:34:56.192684+00:00", "EventTime": "2024-05-21T12:34:56.192705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCbizT2j74Z6oaSjHf"], "accumulated_threat_level": 4.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "b236c68a-09a6-48b2-8876-3207bfd30c3b", "DetectTime": "2024-05-21T12:34:56.229907+00:00", "EventTime": "2024-05-21T12:34:56.229927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuQzj10rH6JFXFg3l"], "accumulated_threat_level": 5.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5dba7a57-a918-4e61-8c4c-b32248a7f258", "DetectTime": "2024-05-21T12:34:56.281424+00:00", "EventTime": "2024-05-21T12:34:56.281443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23413/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXkfL6vTBL8gpVvJ1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 83} +{"Format": "IDEA0", "ID": "a498713c-23aa-4b98-89be-27a203d068c7", "DetectTime": "2024-05-21T12:34:56.316523+00:00", "EventTime": "2024-05-21T12:34:56.316542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9Vku3Ssc4yniyMF"], "accumulated_threat_level": 7.199999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "94641a61-84c5-49d2-aa36-32d6639feb7b", "DetectTime": "2024-05-21T12:34:56.393492+00:00", "EventTime": "2024-05-21T12:34:56.393513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCRuG1sTT1MWpbvMj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "a687a007-4121-403e-866d-d53be54b25ad", "DetectTime": "2024-05-21T12:34:56.432985+00:00", "EventTime": "2024-05-21T12:34:56.433004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgJhv2tTEjBPiwt1a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "21c2a6e3-4fd4-4b89-9719-8cf2eb1341e2", "DetectTime": "2024-05-21T12:34:56.473542+00:00", "EventTime": "2024-05-21T12:34:56.473561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwTlq2MnPjlu5wDc8"], "accumulated_threat_level": 9.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "86d3c6e3-6511-45d4-8203-af596a7ec43a", "DetectTime": "2024-05-21T12:34:56.664749+00:00", "EventTime": "2024-05-21T12:34:56.664768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ve671lpuHtXlski4"], "accumulated_threat_level": 10.4, "timewindow": 83} +{"Format": "IDEA0", "ID": "357a266a-b4ce-4343-afd4-b75595fbdfab", "DetectTime": "2024-05-21T12:34:56.688262+00:00", "EventTime": "2024-05-21T12:34:56.688282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLN5mj3y5Knd0UNNM3"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "3715eedc-d019-438d-bf17-a545c08afd1e", "DetectTime": "2024-05-21T12:34:56.744636+00:00", "EventTime": "2024-05-21T12:34:56.744666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49byd3CoEXecmQccf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 83} +{"Format": "IDEA0", "ID": "af051de9-cc9a-485d-9a05-3df55b9fee89", "DetectTime": "2024-05-21T12:34:57.001271+00:00", "EventTime": "2024-05-21T12:34:57.001293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT6C8M3azrmeI7MoMd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 83} +{"Format": "Json", "ID": "af051de9-cc9a-485d-9a05-3df55b9fee89", "DetectTime": "2024-05-21T12:34:57.001271+00:00", "EventTime": "2024-05-21T12:34:57.001293+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"]}], "Attach": [{"Content": "1970-01-04T10:35:28.892989+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2024/05/21 12:34:57.208864)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 83, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ef1d0d02-d5bd-4c53-8d78-0fa67b57ce93", "DetectTime": "2024-05-21T12:34:57.219937+00:00", "EventTime": "2024-05-21T12:34:57.219957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.49.99"]}], "Attach": [{"Content": "Connection to unknown destination port 16780/UDP destination IP 180.183.49.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhGDt2JOYN4vspTQ"], "accumulated_threat_level": 0.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "ec2ccb6e-e81b-4b21-a585-2de77a56e377", "DetectTime": "2024-05-21T12:34:57.225272+00:00", "EventTime": "2024-05-21T12:34:57.225290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C00Eg53xUDqN2rw04e"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "4ef9308a-5be2-45b6-94ef-cd90cd030174", "DetectTime": "2024-05-21T12:34:57.229679+00:00", "EventTime": "2024-05-21T12:34:57.229697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHG9w31d4l2OP2rIE6"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "31ac1547-5db8-4add-a8ff-12304f5c3195", "DetectTime": "2024-05-21T12:34:57.251841+00:00", "EventTime": "2024-05-21T12:34:57.251864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qLWE286AhBCsqbg1"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "4f97e37f-3f60-48f4-9b01-f59cb59fa607", "DetectTime": "2024-05-21T12:34:57.257029+00:00", "EventTime": "2024-05-21T12:34:57.257049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35qeF3E9ljQ5j60U1"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "3bce7ee1-8016-4427-972e-51771b39cd6b", "DetectTime": "2024-05-21T12:34:57.266149+00:00", "EventTime": "2024-05-21T12:34:57.266168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbguu2wwuK7NOx2u1"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "52bce3b7-aff4-46b0-8954-8f2db7fa7516", "DetectTime": "2024-05-21T12:34:57.334134+00:00", "EventTime": "2024-05-21T12:34:57.334154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFwSX2zh0M2Qg8ocb"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "056738f9-4a36-420a-ab8b-4599945a1c1a", "DetectTime": "2024-05-21T12:34:57.369213+00:00", "EventTime": "2024-05-21T12:34:57.369235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEPaHJ3ulOSM48FfV"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "a2eae75b-6c0d-461e-8148-534f8ed19eaa", "DetectTime": "2024-05-21T12:34:57.428521+00:00", "EventTime": "2024-05-21T12:34:57.428542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["118.68.150.223"]}], "Attach": [{"Content": "Connection to unknown destination port 16833/UDP destination IP 118.68.150.223. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJFpP2345MTLgTdpl9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 83} +{"Format": "IDEA0", "ID": "37ea04f1-e804-4268-b616-507e2dedc6fb", "DetectTime": "2024-05-21T12:34:57.719232+00:00", "EventTime": "2024-05-21T12:34:57.719252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBW8T3VjkiRSp57Bg"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "019d69a3-11bc-4284-ac29-f4345ce50e6c", "DetectTime": "2024-05-21T12:34:57.994997+00:00", "EventTime": "2024-05-21T12:34:57.995017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctr4kHbnirrk2Sjid"], "accumulated_threat_level": 3.2, "timewindow": 83} +{"Format": "IDEA0", "ID": "d3e0b0df-549f-4af8-96eb-4ae0f8cac78c", "DetectTime": "2024-05-21T12:34:57.999726+00:00", "EventTime": "2024-05-21T12:34:57.999745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3g304wRqKuFf90na"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "b5b8d9c5-e879-4ae7-a469-76705e12e663", "DetectTime": "2024-05-21T12:34:58.004820+00:00", "EventTime": "2024-05-21T12:34:58.004839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdMSPZoAwyDDCXKg"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "4a6157d4-54ff-4ba5-9f79-2c969b375805", "DetectTime": "2024-05-21T12:34:58.078815+00:00", "EventTime": "2024-05-21T12:34:58.078837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChzJwy2HJBrCxmT8z3"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "fb95986c-d4ee-4c33-bb6c-d91378556f49", "DetectTime": "2024-05-21T12:34:58.084082+00:00", "EventTime": "2024-05-21T12:34:58.084102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0slMc4NKUiCar54Cj"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "b45379a7-5015-48b3-82f3-3ddf3a8cc0e6", "DetectTime": "2024-05-21T12:34:58.196078+00:00", "EventTime": "2024-05-21T12:34:58.196102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["59.181.111.224"]}], "Attach": [{"Content": "Connection to unknown destination port 14240/UDP destination IP 59.181.111.224. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeTbFO5DsnjC1zg8"], "accumulated_threat_level": 4.0, "timewindow": 83} +{"Format": "IDEA0", "ID": "93896d5e-8a09-4d24-96c4-edc2a7f0132b", "DetectTime": "2024-05-21T12:34:58.328975+00:00", "EventTime": "2024-05-21T12:34:58.328999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckh6wa1XAqFYfGujci"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "4005c4c7-1d3a-43bd-b909-451b2c69af90", "DetectTime": "2024-05-21T12:34:58.504091+00:00", "EventTime": "2024-05-21T12:34:58.504111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXxTB3q0iAwBtJGXd"], "accumulated_threat_level": 4.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "84ef619c-ba78-4e34-816d-8599ca43c4c0", "DetectTime": "2024-05-21T12:34:58.533272+00:00", "EventTime": "2024-05-21T12:34:58.533293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rVtV3RBj8etNFwDj"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "9a615326-ed5a-4e0e-99cb-50ac6966f53c", "DetectTime": "2024-05-21T12:34:58.567505+00:00", "EventTime": "2024-05-21T12:34:58.567527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZkq41xgPC3xE7cte"], "accumulated_threat_level": 5.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "8781fe15-a70a-440f-a787-dc5e03b3ec59", "DetectTime": "2024-05-21T12:34:58.606691+00:00", "EventTime": "2024-05-21T12:34:58.606713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaE9Hx1KU2WIv8ZNHf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 83} +{"Format": "IDEA0", "ID": "3c7de7d7-43ef-431b-bd32-6535df879aa0", "DetectTime": "2024-05-21T12:34:58.752765+00:00", "EventTime": "2024-05-21T12:34:58.752787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KMgX2Vj3Ngwa42V"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "1988ef08-559d-4ec5-81b3-6d0a7aa33af8", "DetectTime": "2024-05-21T12:34:58.887828+00:00", "EventTime": "2024-05-21T12:34:58.887849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1HsK92h5VuPBnsgG4"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "b13dfae1-1070-4c78-a276-e2796af00d22", "DetectTime": "2024-05-21T12:34:59.157762+00:00", "EventTime": "2024-05-21T12:34:59.157781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqB8B8X9Yt97L8ul"], "accumulated_threat_level": 7.199999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "411ec922-3a9a-4bf0-a60f-618784777b0b", "DetectTime": "2024-05-21T12:34:59.188874+00:00", "EventTime": "2024-05-21T12:34:59.188895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPQFs1p5lfBYNpP18"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "ac76338c-cd48-4076-acf9-58ee66657c3d", "DetectTime": "2024-05-21T12:34:59.194176+00:00", "EventTime": "2024-05-21T12:34:59.194197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E3Rr3DtzKi7dqU3i"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "ab6daa24-6655-46da-8cf0-a7c5a6c25e78", "DetectTime": "2024-05-21T12:34:59.233710+00:00", "EventTime": "2024-05-21T12:34:59.233729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTPlt3nnyGN3WUAl9"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "69af34ab-b697-4fa9-a1d5-40a8b7f026ab", "DetectTime": "2024-05-21T12:34:59.275560+00:00", "EventTime": "2024-05-21T12:34:59.275579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXYPO2Frk1DLokJse"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "a582fe1d-8115-4013-abd9-05384814b922", "DetectTime": "2024-05-21T12:34:59.308392+00:00", "EventTime": "2024-05-21T12:34:59.308414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckq1OoxJHgN1Z6Yje"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "f074121d-223c-4acb-9be7-c8b301376c29", "DetectTime": "2024-05-21T12:34:59.372884+00:00", "EventTime": "2024-05-21T12:34:59.372905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuOblt4uQBsY8pSmy5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "151611a1-ee02-4a14-8ace-1f931d78ba71", "DetectTime": "2024-05-21T12:34:59.389196+00:00", "EventTime": "2024-05-21T12:34:59.389216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7XfH1ZpOiHheVX7l"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "a4e11aaf-57a7-48a6-8547-a16e4924eb85", "DetectTime": "2024-05-21T12:34:59.433023+00:00", "EventTime": "2024-05-21T12:34:59.433045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9Yvw3bLMorTh9XR3"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "b438d1f0-6bc4-46f3-9d9e-2efcdabd44d7", "DetectTime": "2024-05-21T12:34:59.468381+00:00", "EventTime": "2024-05-21T12:34:59.468402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvhcxs2qU6caL9r8sk"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "e626c0fa-be36-4f55-8a66-bc6aea7d302f", "DetectTime": "2024-05-21T12:34:59.726077+00:00", "EventTime": "2024-05-21T12:34:59.726097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKR90R3lwJf0HqClEa"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "391dcbc6-b7dd-4465-ba7b-2482d14feee7", "DetectTime": "2024-05-21T12:34:59.784057+00:00", "EventTime": "2024-05-21T12:34:59.784076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mXMIAj4gf5Lbuh1"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "dae29a3e-2df7-41c7-9bda-822c8e8b0624", "DetectTime": "2024-05-21T12:35:00.051763+00:00", "EventTime": "2024-05-21T12:35:00.051782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lvnt3e5nQWXazfrk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "0c9771c9-8da4-4ec5-99c1-f8b5cfa62c45", "DetectTime": "2024-05-21T12:35:00.056844+00:00", "EventTime": "2024-05-21T12:35:00.056862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm88Sd44FraE81DCv2"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "3c05fdac-eb71-4c26-8b32-e7e0cda2ea53", "DetectTime": "2024-05-21T12:35:00.074183+00:00", "EventTime": "2024-05-21T12:35:00.074203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEiZ24cHLZ4eFhdMk"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "59baf499-2f92-4811-b700-74452b72497b", "DetectTime": "2024-05-21T12:35:00.100686+00:00", "EventTime": "2024-05-21T12:35:00.100707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lf4h1VZWqSUvl442"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "6d5fdd5d-0b33-4b71-a821-175dd357a5e7", "DetectTime": "2024-05-21T12:35:00.177280+00:00", "EventTime": "2024-05-21T12:35:00.177303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrsGa3wnLZq2iFJ76"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "2776c409-4cd4-4e73-b6e8-c3295f3e09de", "DetectTime": "2024-05-21T12:35:00.189843+00:00", "EventTime": "2024-05-21T12:35:00.189864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyir5l2tDyf9GRwhz9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 83} +{"Format": "IDEA0", "ID": "86b115c3-ae0f-4c13-a4bc-ca6cb56b65ad", "DetectTime": "2024-05-21T12:35:00.215409+00:00", "EventTime": "2024-05-21T12:35:00.215431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgQLz17ofZ1Bz19k6"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "1faff4b0-772f-453c-b56a-1d67f4d9dfc9", "DetectTime": "2024-05-21T12:35:00.256195+00:00", "EventTime": "2024-05-21T12:35:00.256216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ugX335Bknx6RNf09"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "da060b5d-5fe2-42bb-93e2-ae788d267c24", "DetectTime": "2024-05-21T12:35:00.273994+00:00", "EventTime": "2024-05-21T12:35:00.274017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaS5i462f3MQ1hdne"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "3ab9c64f-781b-4e75-a26c-1c7934e92e52", "DetectTime": "2024-05-21T12:35:00.345390+00:00", "EventTime": "2024-05-21T12:35:00.345409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9PGrC4QyEmMGpGWh"], "accumulated_threat_level": 9.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "0ce4c036-cb2f-4e12-9a3b-356e1e83ec6c", "DetectTime": "2024-05-21T12:35:00.385941+00:00", "EventTime": "2024-05-21T12:35:00.385960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQmyr2vVTmX116h03"], "accumulated_threat_level": 10.4, "timewindow": 83} +{"Format": "IDEA0", "ID": "85b42d83-4ae9-413d-bf63-1aabee0414b2", "DetectTime": "2024-05-21T12:35:00.436624+00:00", "EventTime": "2024-05-21T12:35:00.436643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.113.181.147"]}], "Attach": [{"Content": "Connection to unknown destination port 15020/UDP destination IP 125.113.181.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQX6d4YR0YrvkfwE7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 83} +{"Format": "IDEA0", "ID": "3134c2a9-4780-46e8-ba2e-665c3b519b59", "DetectTime": "2024-05-21T12:35:00.688020+00:00", "EventTime": "2024-05-21T12:35:00.688042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4NwWT2iKMybjwzaN8"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "43b7616d-021d-40e1-8184-d234be73da8a", "DetectTime": "2024-05-21T12:35:00.723599+00:00", "EventTime": "2024-05-21T12:35:00.723621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.187.96.177"]}], "Attach": [{"Content": "Connection to unknown destination port 26503/UDP destination IP 189.187.96.177. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzgKOC206ds3lB21k7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 83} +{"Format": "Json", "ID": "43b7616d-021d-40e1-8184-d234be73da8a", "DetectTime": "2024-05-21T12:35:00.723599+00:00", "EventTime": "2024-05-21T12:35:00.723621+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.187.96.177"]}], "Attach": [{"Content": "1970-01-04T10:38:35.815308+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 83. (real time 2024/05/21 12:35:01.218483)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 83, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1e0b222b-5cfa-4aaf-b994-d575efc10223", "DetectTime": "2024-05-21T12:35:01.223587+00:00", "EventTime": "2024-05-21T12:35:01.223610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXSKc25stIr2o98v"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "496a8690-a67f-475c-b4ac-e18cc301c015", "DetectTime": "2024-05-21T12:35:01.236530+00:00", "EventTime": "2024-05-21T12:35:01.236551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBr4vc4xYXWXXqOAMj"], "accumulated_threat_level": 0.8, "timewindow": 83} +{"Format": "IDEA0", "ID": "5d611e97-447f-42a1-ad1b-6555ee665039", "DetectTime": "2024-05-21T12:35:01.249182+00:00", "EventTime": "2024-05-21T12:35:01.249203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3KVj4UZ9BGbJlwPe"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "14bd279d-2c78-4811-9c14-cf37426e87e8", "DetectTime": "2024-05-21T12:35:01.336520+00:00", "EventTime": "2024-05-21T12:35:01.336542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJTD1DMIpLit1pd6"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "f30cb68f-d8f5-409b-aa02-a9a981787613", "DetectTime": "2024-05-21T12:35:01.362627+00:00", "EventTime": "2024-05-21T12:35:01.362648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgISN1oZZf0wPrDAi", "Cuo1Cc10PF5XENuQNh", "CW4XPx2P7LN5LrAGNg", "CuFtwY3gw6JYheXQ2k"], "accumulated_threat_level": 0.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "0289f74d-4e9e-4c6e-93c9-cd1c4b0b1d67", "DetectTime": "2024-05-21T12:35:01.423318+00:00", "EventTime": "2024-05-21T12:35:01.423340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMmFTw19Ys2u1nNdzg"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "b04031dd-6e5e-495e-bfd7-3cac98566e55", "DetectTime": "2024-05-21T12:35:01.457380+00:00", "EventTime": "2024-05-21T12:35:01.457401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca4bLB2RbvTg1WRVr5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "c193f943-a57e-4529-8338-baff52d934a0", "DetectTime": "2024-05-21T12:35:01.501647+00:00", "EventTime": "2024-05-21T12:35:01.501669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVU3Xq3U2axiak2Uu7"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "cade747c-c58f-40ec-a8ff-7063857985f4", "DetectTime": "2024-05-21T12:35:01.817821+00:00", "EventTime": "2024-05-21T12:35:01.817841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHb8zt4kEZuA2cekN1"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "443c58f1-d33b-48a2-87c1-6bf1a03285e9", "DetectTime": "2024-05-21T12:35:01.928186+00:00", "EventTime": "2024-05-21T12:35:01.928209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2FFg35FacQBPtX0h"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "88a4a91b-3169-4d45-81d4-0c45713ff91e", "DetectTime": "2024-05-21T12:35:02.010683+00:00", "EventTime": "2024-05-21T12:35:02.010701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV0Sb12MKIIsktn2sf"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "261357c1-3f19-42ed-8439-ee7c4b406ff0", "DetectTime": "2024-05-21T12:35:02.301074+00:00", "EventTime": "2024-05-21T12:35:02.301093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALW641qpzqi0Dj0Nl"], "accumulated_threat_level": 1.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "a3a9bbc1-b8e6-4b27-9b92-3740eaabf9ac", "DetectTime": "2024-05-21T12:35:02.335955+00:00", "EventTime": "2024-05-21T12:35:02.335975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5u3sR3B0jEP683191"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "aca9e6b8-e66f-4f42-8910-339008b84141", "DetectTime": "2024-05-21T12:35:02.342014+00:00", "EventTime": "2024-05-21T12:35:02.342033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lhwo3U9SCnqZ9oag"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "97bb6fa6-40a0-4d01-8edb-276dac5e833e", "DetectTime": "2024-05-21T12:35:02.346691+00:00", "EventTime": "2024-05-21T12:35:02.346710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPLNbRWxv1SApF46"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "78443265-0f56-4eac-bbe1-3b42c67bc93e", "DetectTime": "2024-05-21T12:35:02.441366+00:00", "EventTime": "2024-05-21T12:35:02.441384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtenWk3qFkmjA9ABh"], "accumulated_threat_level": 2.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "5fa3f9a2-3e27-4a44-8583-5acab9749f25", "DetectTime": "2024-05-21T12:35:02.481370+00:00", "EventTime": "2024-05-21T12:35:02.481392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61zxj3jE2BoQ3IWn9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "dc0accc5-ce83-4738-9342-80cd4c434c05", "DetectTime": "2024-05-21T12:35:02.518820+00:00", "EventTime": "2024-05-21T12:35:02.518839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJQS21k5dgk85MABe"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "0c6c94b8-4381-4ebf-87e7-5dd478b9c6b0", "DetectTime": "2024-05-21T12:35:02.558760+00:00", "EventTime": "2024-05-21T12:35:02.558781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce245F2pnCm4DcZksl"], "accumulated_threat_level": 4.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "7a42da1d-20d1-49c9-8c4c-452b56828c1f", "DetectTime": "2024-05-21T12:35:02.596471+00:00", "EventTime": "2024-05-21T12:35:02.596490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkCKP1uJosRYDkzz"], "accumulated_threat_level": 5.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "e84eddf1-3e82-493a-9cd0-20c2011ca875", "DetectTime": "2024-05-21T12:35:02.645691+00:00", "EventTime": "2024-05-21T12:35:02.645712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0H8lf4fpjcjIodKy6"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "13b1f836-fb95-4593-a48f-bb9c9f1b67d1", "DetectTime": "2024-05-21T12:35:02.709091+00:00", "EventTime": "2024-05-21T12:35:02.709110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Y9zb2vQ2bC2foBl5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "0c1e825b-9d97-41d1-be3c-a0ae4ec3679d", "DetectTime": "2024-05-21T12:35:02.751361+00:00", "EventTime": "2024-05-21T12:35:02.751385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF2ZzA1acIoO8rZDFj"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "8dc92c3d-6b78-4016-8d2a-47ea1c4556d9", "DetectTime": "2024-05-21T12:35:03.045289+00:00", "EventTime": "2024-05-21T12:35:03.045314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy70RM3p9Boqwtahg3"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "f84a41cf-9281-4b36-9488-df7ad7f0a87f", "DetectTime": "2024-05-21T12:35:03.050378+00:00", "EventTime": "2024-05-21T12:35:03.050398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuGnNI1ZkYIEoXW307"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "91d3d920-af86-47d3-b12b-c5f88fc4e918", "DetectTime": "2024-05-21T12:35:03.055365+00:00", "EventTime": "2024-05-21T12:35:03.055386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6uqJ4OxjFgiUzre"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "ccba4799-2466-4ebb-ac84-79e6358f4fa9", "DetectTime": "2024-05-21T12:35:03.060048+00:00", "EventTime": "2024-05-21T12:35:03.060067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3LffXoS7cqH12zOd"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "88f938cf-66ec-4f1e-9d21-babece0b5927", "DetectTime": "2024-05-21T12:35:03.064806+00:00", "EventTime": "2024-05-21T12:35:03.064825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuvyoIYsCQZ0om8N4"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "a7c13141-1eab-47f5-bade-0cce0a162cff", "DetectTime": "2024-05-21T12:35:03.084737+00:00", "EventTime": "2024-05-21T12:35:03.084759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmbjL3BzM5epn8Npe"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "36d6a70f-e143-469b-bf37-892118330aa4", "DetectTime": "2024-05-21T12:35:03.253157+00:00", "EventTime": "2024-05-21T12:35:03.253175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClOcGO2Teg42VUv5jj"], "accumulated_threat_level": 6.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "13d2f54c-245d-47a7-92e6-9f0d710141cb", "DetectTime": "2024-05-21T12:35:03.259035+00:00", "EventTime": "2024-05-21T12:35:03.259054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciy24D1JzDy9tw2WJ5"], "accumulated_threat_level": 4.8, "timewindow": 82} +{"Format": "IDEA0", "ID": "e785c470-50f3-4f3d-a2e4-64363cdaf079", "DetectTime": "2024-05-21T12:35:03.318476+00:00", "EventTime": "2024-05-21T12:35:03.318495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHyv41S3q7WHSABni"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "4dfa8adc-13f7-4b5f-b3b0-e648356e4f33", "DetectTime": "2024-05-21T12:35:03.567557+00:00", "EventTime": "2024-05-21T12:35:03.567579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NBv3rKTOdiiU7ei"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "3f9f7c67-7adf-4078-a1c1-62ce5ce64fab", "DetectTime": "2024-05-21T12:35:03.600873+00:00", "EventTime": "2024-05-21T12:35:03.600892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B1kvSX77Hk4ZPM1"], "accumulated_threat_level": 7.699999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "c674a552-2194-4995-82ab-f8a56f224667", "DetectTime": "2024-05-21T12:35:03.643325+00:00", "EventTime": "2024-05-21T12:35:03.643344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKN013nbvoLoT2Hf9"], "accumulated_threat_level": 8.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "a5e6c63a-2b56-426c-9e1a-6d49f33c9bda", "DetectTime": "2024-05-21T12:35:03.683107+00:00", "EventTime": "2024-05-21T12:35:03.683125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnaIET2cuVHbjmUMA1"], "accumulated_threat_level": 9.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "f5db6c85-0253-4f02-b478-4d3a7f522cde", "DetectTime": "2024-05-21T12:35:03.723558+00:00", "EventTime": "2024-05-21T12:35:03.723579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Nk9G7gvp7gFUOah"], "accumulated_threat_level": 10.100000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "12f13063-478f-47d6-a506-584afb4cc338", "DetectTime": "2024-05-21T12:35:03.762377+00:00", "EventTime": "2024-05-21T12:35:03.762396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXzEK43BGEmTABZdDf"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "c8b9b213-ac5b-4dbb-bceb-e18b632964ff", "DetectTime": "2024-05-21T12:35:03.802953+00:00", "EventTime": "2024-05-21T12:35:03.802974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpdPfo3monczSZRTD5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "3387300b-dbfb-40b4-acf3-cb4baaacff0c", "DetectTime": "2024-05-21T12:35:03.841110+00:00", "EventTime": "2024-05-21T12:35:03.841129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZItD2pSIygB2W0Lf"], "accumulated_threat_level": 12.500000000000004, "timewindow": 84} +{"Format": "Json", "ID": "3387300b-dbfb-40b4-acf3-cb4baaacff0c", "DetectTime": "2024-05-21T12:35:03.841110+00:00", "EventTime": "2024-05-21T12:35:03.841129+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-04T11:09:39.264981+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2024/05/21 12:35:04.036173)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 84, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "985d4f9d-2de1-4ba3-b978-ddf736e19abb", "DetectTime": "2024-05-21T12:35:04.048566+00:00", "EventTime": "2024-05-21T12:35:04.048586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQmPTF1eoPVEp4FjQ1"], "accumulated_threat_level": 0.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "214b2311-081e-4390-8f84-8c84b8aa1417", "DetectTime": "2024-05-21T12:35:04.059254+00:00", "EventTime": "2024-05-21T12:35:04.059273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.5.30.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPHh92edSdEJqchgf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e966a74a-efcb-477e-a986-fb1abf67d1f8", "DetectTime": "2024-05-21T12:35:04.071002+00:00", "EventTime": "2024-05-21T12:35:04.071022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CalqiM2IFp8MDQblPb"], "accumulated_threat_level": 1.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "6422526d-11a0-4562-b192-4c0a6d2a633a", "DetectTime": "2024-05-21T12:35:04.075950+00:00", "EventTime": "2024-05-21T12:35:04.075967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.162.159.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8D1oC3Vbom0Gq7It7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "912a5c51-a9fd-4e25-b703-f62d26d83e54", "DetectTime": "2024-05-21T12:35:04.080431+00:00", "EventTime": "2024-05-21T12:35:04.080448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQiH93xz7brU2C31k"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b880cd44-4ca5-4c5e-b169-cd5098417060", "DetectTime": "2024-05-21T12:35:04.302503+00:00", "EventTime": "2024-05-21T12:35:04.302524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.188.253.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdtmx03q5YngsitKbe"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "fe2c89e5-307e-442c-b34c-eacbbc07b614", "DetectTime": "2024-05-21T12:35:04.374749+00:00", "EventTime": "2024-05-21T12:35:04.374772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeO2F54E94Y0gS2iah"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "efdbb928-8add-4ddc-8762-dbc5b8bf1dce", "DetectTime": "2024-05-21T12:35:04.382213+00:00", "EventTime": "2024-05-21T12:35:04.382238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.244.250.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZkoAl1fSQseeLx73e"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "64ff3044-4813-4446-bec5-c7de91f4cc27", "DetectTime": "2024-05-21T12:35:04.387844+00:00", "EventTime": "2024-05-21T12:35:04.387867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COeTsu13oQUmAVu4Dj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "41045912-6c8c-4e52-8972-e409673022c9", "DetectTime": "2024-05-21T12:35:04.392816+00:00", "EventTime": "2024-05-21T12:35:04.392836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.118.5.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQz8564izBge8MQySh"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "daa12c71-088d-436f-b312-af83e9aa2709", "DetectTime": "2024-05-21T12:35:04.397386+00:00", "EventTime": "2024-05-21T12:35:04.397405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmldFl34PVAJnjlVeb"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "1ed753c2-0af8-492c-a75d-22edf0ace9e3", "DetectTime": "2024-05-21T12:35:04.449681+00:00", "EventTime": "2024-05-21T12:35:04.449727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnlk0929AxHr4E20qe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "0afaeaa0-9a13-44a1-9ffe-6759b4b1a306", "DetectTime": "2024-05-21T12:35:04.501448+00:00", "EventTime": "2024-05-21T12:35:04.501471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.194.154.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFwIVnGpF2mwvZ8h9"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "63304940-43cd-4e65-a1be-e1ec2f7ec3a8", "DetectTime": "2024-05-21T12:35:04.506968+00:00", "EventTime": "2024-05-21T12:35:04.506987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.139.2.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkIE9z4wUvdc4TsHqc"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "49abf513-ace6-4cc1-9074-456597842178", "DetectTime": "2024-05-21T12:35:04.607640+00:00", "EventTime": "2024-05-21T12:35:04.607661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.10.105.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8BHrY07Oe0hN7dw5"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e87a9fe9-6b10-4ee0-8b00-d0ed3f4b67d2", "DetectTime": "2024-05-21T12:35:04.638880+00:00", "EventTime": "2024-05-21T12:35:04.638903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.51.105.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcdLd4r0Q5VzaRqR3"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c3bebb39-3509-4790-8eff-cb188f499940", "DetectTime": "2024-05-21T12:35:04.808534+00:00", "EventTime": "2024-05-21T12:35:04.808553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ced0og47iD4dDuM0P1", "COyJRj2DkTtnGUidBk", "CRn6aA2ERfEoWJBo19", "CCcgJ12MgBO0DA3tS2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "cf0304c2-4753-417a-8ffd-506e48f60cc3", "DetectTime": "2024-05-21T12:35:04.923190+00:00", "EventTime": "2024-05-21T12:35:04.923210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.36.56.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg4VdpFGOxzc31xC2"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9b6cba0c-3237-4e0f-9bf5-2b0e52e13ea7", "DetectTime": "2024-05-21T12:35:04.930364+00:00", "EventTime": "2024-05-21T12:35:04.930387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdAon3aOyuQxdI3md"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "96dfb668-6576-41df-a940-fc214258fe8c", "DetectTime": "2024-05-21T12:35:04.935787+00:00", "EventTime": "2024-05-21T12:35:04.935810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6pOP3ibdbCcg0QS1"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a00af8c2-2f3b-40ff-83da-7d24f4044b36", "DetectTime": "2024-05-21T12:35:04.941179+00:00", "EventTime": "2024-05-21T12:35:04.941201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.40.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp7Dr61cJbj4bOYwtl"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "0c57b435-2550-4798-b920-deecf8cf1e02", "DetectTime": "2024-05-21T12:35:04.946290+00:00", "EventTime": "2024-05-21T12:35:04.946310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.149.119.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C45Eep100DYgeoTPO3"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "720e2e97-11c7-493e-824b-ee16abda019e", "DetectTime": "2024-05-21T12:35:05.097153+00:00", "EventTime": "2024-05-21T12:35:05.097173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["203.198.93.5"]}], "Attach": [{"Content": "Connection to unknown destination port 15171/UDP destination IP 203.198.93.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatKqThjgx9c6zLce"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "16e06222-490f-4116-ac68-8c3c7ef32613", "DetectTime": "2024-05-21T12:35:05.134850+00:00", "EventTime": "2024-05-21T12:35:05.134870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfs9pp4La3lrSpghH7"], "accumulated_threat_level": 4.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "a52ddca8-edd4-498c-b803-f86155bf268d", "DetectTime": "2024-05-21T12:35:05.161718+00:00", "EventTime": "2024-05-21T12:35:05.161739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.160.9.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxtstm1tkT0SJ2MJH5"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "3292c4c4-e390-4e02-99f0-ff15b966de51", "DetectTime": "2024-05-21T12:35:05.194224+00:00", "EventTime": "2024-05-21T12:35:05.194245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMBX7u8OsoEwCpiHf"], "accumulated_threat_level": 5.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "eaee6ce0-48c5-494d-97f2-b05807ecbfc3", "DetectTime": "2024-05-21T12:35:05.269387+00:00", "EventTime": "2024-05-21T12:35:05.269410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiinW18gB05B1MO3j"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "03890611-a0ca-4820-81b1-8f71b13ff61e", "DetectTime": "2024-05-21T12:35:05.561621+00:00", "EventTime": "2024-05-21T12:35:05.561641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.79.114.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdDYsx43nEErIUxMN9"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "87fbd437-76a9-4363-9e9d-a0ab705235d4", "DetectTime": "2024-05-21T12:35:05.567179+00:00", "EventTime": "2024-05-21T12:35:05.567199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbbs9r1dmYOvUhhOci"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c5eb440c-36e8-4152-a21b-2a1f72987edb", "DetectTime": "2024-05-21T12:35:05.571875+00:00", "EventTime": "2024-05-21T12:35:05.571893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1Lco4qVKLmeV86la"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "7607a954-aad1-44f3-b579-b9063ea7c0ff", "DetectTime": "2024-05-21T12:35:05.624099+00:00", "EventTime": "2024-05-21T12:35:05.624121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.72.22.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSz6Qf3duLfUdGppqd"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "cbdcb5b6-aa57-402d-bf27-881414d70bb1", "DetectTime": "2024-05-21T12:35:05.636478+00:00", "EventTime": "2024-05-21T12:35:05.636495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd4N44NP3NZ62u7f5"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "3c97e34f-debf-4b5b-a611-b592f25797a4", "DetectTime": "2024-05-21T12:35:05.655436+00:00", "EventTime": "2024-05-21T12:35:05.655456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.52.57.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI88MXfIRSuaiWHP3"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e84f0eaf-72a1-40c3-8aff-ba6b59e9bb96", "DetectTime": "2024-05-21T12:35:05.753674+00:00", "EventTime": "2024-05-21T12:35:05.753693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 201.209.29.166. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxH72aFA02tQRmz7h"], "accumulated_threat_level": 6.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "d12768df-35c8-4b20-a4d1-984c19595e49", "DetectTime": "2024-05-21T12:35:05.797246+00:00", "EventTime": "2024-05-21T12:35:05.797265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 183.89.113.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Covpym2bYscK8loOY1"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "8cad0230-5cc5-4e0a-826b-6f16ad4331ac", "DetectTime": "2024-05-21T12:35:05.847304+00:00", "EventTime": "2024-05-21T12:35:05.847326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.184.50.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6Yc83Zi7lPeRGop2"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "d6a35df1-b88b-447d-b452-45728ecc878d", "DetectTime": "2024-05-21T12:35:05.859359+00:00", "EventTime": "2024-05-21T12:35:05.859377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.190.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnrU712wl9Xx1sRTge"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a94e5e0b-ba09-4ffb-96b6-ee01b7418cf1", "DetectTime": "2024-05-21T12:35:05.879531+00:00", "EventTime": "2024-05-21T12:35:05.879551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.109.16.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ6rSV3Xn4MQBaJsNg"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f19d7081-a88d-4159-aea3-45a0fa9e80c2", "DetectTime": "2024-05-21T12:35:06.189535+00:00", "EventTime": "2024-05-21T12:35:06.189554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0U1h4R5rdZvnWZY9"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "5b909dd4-4930-4956-aef7-db1c10a30ca6", "DetectTime": "2024-05-21T12:35:06.257177+00:00", "EventTime": "2024-05-21T12:35:06.257199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.225.178.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Q4f2455FWdC4WcTd"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "8ff5f119-56ea-4d4d-a0dc-8ff63941f9e7", "DetectTime": "2024-05-21T12:35:06.265483+00:00", "EventTime": "2024-05-21T12:35:06.265502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.58.15.211 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgp26W1OKvhZKObdXj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "ae6cdd9d-400e-4633-b053-96b454585e36", "DetectTime": "2024-05-21T12:35:06.282332+00:00", "EventTime": "2024-05-21T12:35:06.282352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClQxxU2ysy7qVhJpVc"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "30676085-bd53-4b17-80a4-8278b94c06e9", "DetectTime": "2024-05-21T12:35:06.306596+00:00", "EventTime": "2024-05-21T12:35:06.306616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8TWZk2fqLqexPkSKf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "bb026e12-7396-46e5-bf5c-7855bb2907b0", "DetectTime": "2024-05-21T12:35:06.311511+00:00", "EventTime": "2024-05-21T12:35:06.311528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.110.49.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26yVnZop62iqAqwi"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "597a1413-5a7f-4fa5-b3a3-b53e8352850a", "DetectTime": "2024-05-21T12:35:06.332643+00:00", "EventTime": "2024-05-21T12:35:06.332665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.3.244 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8KYy3Ydhwz8U0qKk"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "42e19c03-97c0-4524-b35e-8091cd23f0c0", "DetectTime": "2024-05-21T12:35:06.338744+00:00", "EventTime": "2024-05-21T12:35:06.338764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXEvz2Jxgia3wS0v5"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b564df01-dc09-45a1-9bca-4f783bd85bf9", "DetectTime": "2024-05-21T12:35:06.344692+00:00", "EventTime": "2024-05-21T12:35:06.344711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVn5FA1HXstFuH3Jf6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "136071ea-3d73-4fb5-b90b-6ba2a3c26041", "DetectTime": "2024-05-21T12:35:06.395443+00:00", "EventTime": "2024-05-21T12:35:06.395465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2kSaMYqs2rvOXa"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a83b8c07-300f-46ae-bbb4-11ad2689ecd6", "DetectTime": "2024-05-21T12:35:06.424863+00:00", "EventTime": "2024-05-21T12:35:06.424883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2Hse2iCBYF21qFPj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "21bab5e3-f200-4d23-b101-d7675125ccfb", "DetectTime": "2024-05-21T12:35:06.798730+00:00", "EventTime": "2024-05-21T12:35:06.798751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpS3eQ173z2oj8oybe"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "69f7fb82-bf0b-48fd-9f73-ec66bc12b00a", "DetectTime": "2024-05-21T12:35:06.864908+00:00", "EventTime": "2024-05-21T12:35:06.864929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXYyvW2ZyyiC0glJ"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "19686e09-6bac-4566-a06f-4147ff1cc9c4", "DetectTime": "2024-05-21T12:35:06.869932+00:00", "EventTime": "2024-05-21T12:35:06.869952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuTgZT1ZbKpOFPlMbi"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "60caac88-ab00-4a84-a3ea-883899a34fa1", "DetectTime": "2024-05-21T12:35:06.878374+00:00", "EventTime": "2024-05-21T12:35:06.878396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.253.224.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cov7zY1P28rCYgLe8f"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "3f4103f4-1726-4ee6-8faf-a9551dc18bfd", "DetectTime": "2024-05-21T12:35:06.883293+00:00", "EventTime": "2024-05-21T12:35:06.883313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.160.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciwlvz5gkRQCeVAOj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "0096c6ae-514d-4b74-b0a4-88133cf9d817", "DetectTime": "2024-05-21T12:35:06.888169+00:00", "EventTime": "2024-05-21T12:35:06.888188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kLEcUwsiyob5ipa"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b963e7a6-d5b7-4a85-89f9-8fc045d65392", "DetectTime": "2024-05-21T12:35:06.892663+00:00", "EventTime": "2024-05-21T12:35:06.892681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.218.36.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1nWI2SjfVSdOj2ie"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "7568ae46-2dfb-4808-93a5-26e6c5b5a1ed", "DetectTime": "2024-05-21T12:35:07.071194+00:00", "EventTime": "2024-05-21T12:35:07.071214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2Ss04iGGWM6yQE2k"], "accumulated_threat_level": 7.699999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "7ab340c7-c7bf-462c-bfdf-a6425e2880f9", "DetectTime": "2024-05-21T12:35:07.076975+00:00", "EventTime": "2024-05-21T12:35:07.076995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXLbLS1TnUpIdHO82h"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "08d0c9f0-b8e1-4990-97eb-578f5e692c27", "DetectTime": "2024-05-21T12:35:07.081638+00:00", "EventTime": "2024-05-21T12:35:07.081656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 91.235.36.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8L8GV2FXffDrfhWR8"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f1aeb2e3-cdaf-43c0-b575-9f6b30e3f32e", "DetectTime": "2024-05-21T12:35:07.380646+00:00", "EventTime": "2024-05-21T12:35:07.380668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5K3w63mZm0MqKhRKf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "3a5b243c-58fa-4023-8561-1ecac86bbf9c", "DetectTime": "2024-05-21T12:35:07.595033+00:00", "EventTime": "2024-05-21T12:35:07.595055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Azpj2aS1zTsM9X41"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "087cdbaf-eb24-4b28-8bc2-afb5f4180be9", "DetectTime": "2024-05-21T12:35:07.601120+00:00", "EventTime": "2024-05-21T12:35:07.601140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDR98kQC7OeeFThy6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "76a56239-7f7e-48d8-802c-91a6452d488c", "DetectTime": "2024-05-21T12:35:07.606885+00:00", "EventTime": "2024-05-21T12:35:07.606905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.207.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8lzR14ea19VonWIDg"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "3ae7ba4c-02b3-4757-a4c3-c39ea6b05cb9", "DetectTime": "2024-05-21T12:35:07.640139+00:00", "EventTime": "2024-05-21T12:35:07.640160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyvjb039xy4sRIFcp4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5164f463-0533-4c97-b34f-6b3fdf4fa13d", "DetectTime": "2024-05-21T12:35:07.668392+00:00", "EventTime": "2024-05-21T12:35:07.668413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C88WHbnE8mVNmCwa1"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5980a97e-bc6a-4415-b767-61d3174fe7fd", "DetectTime": "2024-05-21T12:35:07.694807+00:00", "EventTime": "2024-05-21T12:35:07.694830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.192.107.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck8Vm04t2vPYMGMDOl"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "32c28b14-d088-448f-8fe3-5d5cc70abc11", "DetectTime": "2024-05-21T12:35:07.728610+00:00", "EventTime": "2024-05-21T12:35:07.728631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauppL32Yj9Thuf6Xe"], "accumulated_threat_level": 8.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "ba07a9cc-bc55-4342-b838-e8e89563f360", "DetectTime": "2024-05-21T12:35:07.818993+00:00", "EventTime": "2024-05-21T12:35:07.819013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.252.119.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreIed4w6Y5k7BscGb"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "00e12b73-73e4-47e5-9bb4-4e613101251c", "DetectTime": "2024-05-21T12:35:07.860058+00:00", "EventTime": "2024-05-21T12:35:07.860080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.23.51.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9rthP2f8qGCmYHpvi"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "be63fff3-570a-4d67-86a6-9398156c04e9", "DetectTime": "2024-05-21T12:35:07.865250+00:00", "EventTime": "2024-05-21T12:35:07.865270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoAZrs4NlqB2Pn7NO7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9e1dde20-1d5b-4239-abdc-c4ab188f0f42", "DetectTime": "2024-05-21T12:35:08.086044+00:00", "EventTime": "2024-05-21T12:35:08.086069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.187.82.127 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9REdE1GuNwGZdwIo"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "d780ac8c-f0b0-41b0-bf9b-054d2ecabbc0", "DetectTime": "2024-05-21T12:35:08.135149+00:00", "EventTime": "2024-05-21T12:35:08.135168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zSc41ClkLiX8C9O7"], "accumulated_threat_level": 9.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "bc184b73-c3a9-4e4a-a212-47cb89910a06", "DetectTime": "2024-05-21T12:35:08.139890+00:00", "EventTime": "2024-05-21T12:35:08.139908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.218.55.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvKiJ1G8ZVlSnFbu"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a2b67487-f628-48f2-a4db-86df832bcc32", "DetectTime": "2024-05-21T12:35:08.157700+00:00", "EventTime": "2024-05-21T12:35:08.157722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.137.7.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvr7Tg4IKlAnNRWet1"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "87f43c7c-ccf8-455c-a3f6-c84c57ad8651", "DetectTime": "2024-05-21T12:35:08.261242+00:00", "EventTime": "2024-05-21T12:35:08.261261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKbJ23NdBMEox1i54"], "accumulated_threat_level": 10.100000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "6c832e26-4254-45a3-a466-077ce1928caf", "DetectTime": "2024-05-21T12:35:08.296939+00:00", "EventTime": "2024-05-21T12:35:08.296959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Ep8U3QLy0hCU4iJa"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "a6638b15-e45b-4c55-9802-81867347962a", "DetectTime": "2024-05-21T12:35:08.379274+00:00", "EventTime": "2024-05-21T12:35:08.379294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEf0kI2OsDEBnVVhlk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "ca93c4c3-5ada-4cb5-84c3-b26ab9e0efc8", "DetectTime": "2024-05-21T12:35:08.440538+00:00", "EventTime": "2024-05-21T12:35:08.440558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwWOJw11OZLMKC1ur2"], "accumulated_threat_level": 12.500000000000004, "timewindow": 84} +{"Format": "Json", "ID": "ca93c4c3-5ada-4cb5-84c3-b26ab9e0efc8", "DetectTime": "2024-05-21T12:35:08.440538+00:00", "EventTime": "2024-05-21T12:35:08.440558+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-04T11:10:54.788651+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2024/05/21 12:35:08.648955)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 84, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "15df691f-3047-4d44-a20a-69c1603dab1e", "DetectTime": "2024-05-21T12:35:08.660950+00:00", "EventTime": "2024-05-21T12:35:08.660983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNritu1uvkJfHX4A1e"], "accumulated_threat_level": 0.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "79f694dd-b57a-4632-8145-65fbf4f7d755", "DetectTime": "2024-05-21T12:35:08.666403+00:00", "EventTime": "2024-05-21T12:35:08.666435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2dkRe41pgvVHeuFR5", "CnmFZ63feLNkHpWe1a", "CCyQzh2LHyF7ofi5fl", "CkBh0m1QXyZsERXh2"], "accumulated_threat_level": 1.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "c13088de-3f2e-4a32-ba65-e059f8952831", "DetectTime": "2024-05-21T12:35:08.678569+00:00", "EventTime": "2024-05-21T12:35:08.678605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSScnL3CAEntvHnjN2"], "accumulated_threat_level": 2.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "7aa46083-6877-4ab5-aa6f-e814716a2134", "DetectTime": "2024-05-21T12:35:08.684309+00:00", "EventTime": "2024-05-21T12:35:08.684329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57cSf3ic6SDLfrVRa"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e4e41ef7-952f-4c43-8390-c131292e9dec", "DetectTime": "2024-05-21T12:35:08.696894+00:00", "EventTime": "2024-05-21T12:35:08.696928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.49.99"]}], "Attach": [{"Content": "Connection to unknown destination port 16780/UDP destination IP 180.183.49.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nIKZ2j9kXzJ6SOba"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "cb247784-4c7a-4eb1-8de2-f0a735854114", "DetectTime": "2024-05-21T12:35:08.904258+00:00", "EventTime": "2024-05-21T12:35:08.904283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 61.5.44.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJk9W62l6cUu0RAN39"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "aa301f0e-4ad8-4dd5-b65f-e1b26576d84c", "DetectTime": "2024-05-21T12:35:08.909633+00:00", "EventTime": "2024-05-21T12:35:08.909652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.198.93.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLhQB2fe5LKvFXUY4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9b6b6bc9-b1b7-4b8e-9dcb-b61dcae66328", "DetectTime": "2024-05-21T12:35:08.914503+00:00", "EventTime": "2024-05-21T12:35:08.914523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.188.121 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpABLvsJVRJ92Zc7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "05e4964c-6b96-4481-870a-56c2aaf16208", "DetectTime": "2024-05-21T12:35:08.919479+00:00", "EventTime": "2024-05-21T12:35:08.919497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.14.171.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHe8dl29FXMF7ZMA82"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "a7db4728-b888-46bc-a365-7f49571bc7bb", "DetectTime": "2024-05-21T12:35:08.990453+00:00", "EventTime": "2024-05-21T12:35:08.990475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsS1LUv9y652oZXe"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "b36ffaa1-80e8-4683-93b8-dfa630155665", "DetectTime": "2024-05-21T12:35:09.059939+00:00", "EventTime": "2024-05-21T12:35:09.059960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmY8JSjWqEXsrTGj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "14212d88-8ade-4817-a227-9acfe916fa71", "DetectTime": "2024-05-21T12:35:09.064667+00:00", "EventTime": "2024-05-21T12:35:09.064686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.97.28.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hE5y3SGM36e5vsD6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "d6a88895-dc85-43d4-9944-733c8716fb04", "DetectTime": "2024-05-21T12:35:09.090939+00:00", "EventTime": "2024-05-21T12:35:09.090960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.231.149.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3fdbw1CeQ5VNVx5x8"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "4acb6bfa-7ee4-4936-b6b5-9b20fd22b05c", "DetectTime": "2024-05-21T12:35:09.164789+00:00", "EventTime": "2024-05-21T12:35:09.164811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.201.136.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6zzi1oppshBsNg3l"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "6d0b5991-25bc-454c-a695-15d44a79f54e", "DetectTime": "2024-05-21T12:35:09.169863+00:00", "EventTime": "2024-05-21T12:35:09.169885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.64.80.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZn3x2nd9UtEKCfm6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "479d67d2-6f88-45d6-8081-7d71ee48a76d", "DetectTime": "2024-05-21T12:35:09.463676+00:00", "EventTime": "2024-05-21T12:35:09.463699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.37.144.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTTXDF2fULEGfYEzfe"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9a6ae268-b56b-4c89-898a-6c9d4dbf07de", "DetectTime": "2024-05-21T12:35:09.469159+00:00", "EventTime": "2024-05-21T12:35:09.469181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.114.131.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpY3nc4kWc5F0YutFh"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5e70d46c-c6f5-44a0-9b35-791d8602d6e5", "DetectTime": "2024-05-21T12:35:09.474421+00:00", "EventTime": "2024-05-21T12:35:09.474442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.209.29.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbZ7q1kWwIsrc3wri"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "1d900cde-8adc-4e10-8c72-6c130f432319", "DetectTime": "2024-05-21T12:35:09.573938+00:00", "EventTime": "2024-05-21T12:35:09.573959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQc5mq4osIMCYzzwl4"], "accumulated_threat_level": 4.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "a2f72096-5757-40d4-b963-749ee9eae77d", "DetectTime": "2024-05-21T12:35:09.649497+00:00", "EventTime": "2024-05-21T12:35:09.649518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiARXsrpMEm0PBOzc"], "accumulated_threat_level": 5.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "01d11381-8065-4d42-9c92-ff4257b60526", "DetectTime": "2024-05-21T12:35:09.700398+00:00", "EventTime": "2024-05-21T12:35:09.700417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7iae3oHz9gN1UVa8"], "accumulated_threat_level": 6.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "2c580f69-c1c9-4747-abb2-227f99147404", "DetectTime": "2024-05-21T12:35:09.798388+00:00", "EventTime": "2024-05-21T12:35:09.798421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcXYuA3a8UoOxmCVW7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "470fc8db-ca91-4568-9c94-503e69bfbb34", "DetectTime": "2024-05-21T12:35:09.843435+00:00", "EventTime": "2024-05-21T12:35:09.843454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjl5aH2NcJOdKquDF2"], "accumulated_threat_level": 7.699999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "86e9e234-946e-43f3-8189-8e75c253206a", "DetectTime": "2024-05-21T12:35:09.894389+00:00", "EventTime": "2024-05-21T12:35:09.894422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAqEj4t5tgorDAFF1"], "accumulated_threat_level": 8.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "313f0a67-f7dd-4929-a6bb-ed154fb766b9", "DetectTime": "2024-05-21T12:35:09.959844+00:00", "EventTime": "2024-05-21T12:35:09.959866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.74.91.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5GsKY38lTCwCPLPhd"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5ca02c06-412d-4320-8171-a06c76be8dce", "DetectTime": "2024-05-21T12:35:10.033199+00:00", "EventTime": "2024-05-21T12:35:10.033220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 23.24.76.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpINQv4MODKFsCAKl4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "d1e12c6a-ea73-4755-8f67-e08d9d210486", "DetectTime": "2024-05-21T12:35:10.296607+00:00", "EventTime": "2024-05-21T12:35:10.296625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.39.67.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcGtJy2QVh21HVYNK7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "ddf68297-9ae3-43cf-9096-21d5453a86c7", "DetectTime": "2024-05-21T12:35:10.556833+00:00", "EventTime": "2024-05-21T12:35:10.556854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.53.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4e323gVxbNeXKH1i"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "97bab128-1226-47ff-97fe-b944453e9e75", "DetectTime": "2024-05-21T12:35:10.822790+00:00", "EventTime": "2024-05-21T12:35:10.822814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrZTBb4APEeBKzIu76"], "accumulated_threat_level": 9.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "cbbb84f2-4b6b-4f7e-a951-364d742dcf0f", "DetectTime": "2024-05-21T12:35:10.854827+00:00", "EventTime": "2024-05-21T12:35:10.854851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cig2Az2xnW0gpHHeWg"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "627f73bd-a1d7-49a8-b8d4-665eef2302fb", "DetectTime": "2024-05-21T12:35:10.912661+00:00", "EventTime": "2024-05-21T12:35:10.912683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.7.188 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIE14ktmwa6q4WQ8"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "0075128d-a02f-4ed4-8c0c-b5a938a38360", "DetectTime": "2024-05-21T12:35:11.178350+00:00", "EventTime": "2024-05-21T12:35:11.178370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C090Tr43GR2df10W77"], "accumulated_threat_level": 10.100000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "d1a81a39-baa0-487f-ac71-886b7e512684", "DetectTime": "2024-05-21T12:35:11.222223+00:00", "EventTime": "2024-05-21T12:35:11.222248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCbizT2j74Z6oaSjHf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "32e08349-45de-46a6-a449-3c94a6af7630", "DetectTime": "2024-05-21T12:35:11.267011+00:00", "EventTime": "2024-05-21T12:35:11.267034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuQzj10rH6JFXFg3l"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c606a67b-8c35-41d6-934c-7d5b95bbe613", "DetectTime": "2024-05-21T12:35:11.307578+00:00", "EventTime": "2024-05-21T12:35:11.307600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXkfL6vTBL8gpVvJ1"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "7e2c8737-de26-40cb-ab69-887344019421", "DetectTime": "2024-05-21T12:35:11.359627+00:00", "EventTime": "2024-05-21T12:35:11.359653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9Vku3Ssc4yniyMF"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "2f286c2e-0896-4f0b-a509-0d7ff2647fba", "DetectTime": "2024-05-21T12:35:11.397537+00:00", "EventTime": "2024-05-21T12:35:11.397558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.31.145.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLDNr4WkWDQ1EwiEh"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f59fcb14-4d79-4235-b81a-0f52dbac6d92", "DetectTime": "2024-05-21T12:35:11.402761+00:00", "EventTime": "2024-05-21T12:35:11.402780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.1.138.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chziky2CtEXmCQerOg"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "99b593de-5c10-4823-a4a5-c18be9a96235", "DetectTime": "2024-05-21T12:35:11.412620+00:00", "EventTime": "2024-05-21T12:35:11.412640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.91.199.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6w58m3NmWiS4BiqCb"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "d94e8372-3e0c-47cd-b6fe-5f535a8bb57f", "DetectTime": "2024-05-21T12:35:11.533283+00:00", "EventTime": "2024-05-21T12:35:11.533303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCRuG1sTT1MWpbvMj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "8b6cc76a-7bae-401c-b6c9-868da8f2f83f", "DetectTime": "2024-05-21T12:35:11.540140+00:00", "EventTime": "2024-05-21T12:35:11.540162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgJhv2tTEjBPiwt1a"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "10c142ca-3fe2-4b84-ac8c-b7134ae7c861", "DetectTime": "2024-05-21T12:35:11.784728+00:00", "EventTime": "2024-05-21T12:35:11.784749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwTlq2MnPjlu5wDc8"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f8035023-9130-41c4-831d-f9680fa5c23b", "DetectTime": "2024-05-21T12:35:11.789836+00:00", "EventTime": "2024-05-21T12:35:11.789855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.200.12.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTExZn4FBnbPqssvZ4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e042b8b0-d9a9-4e02-88dd-8a5f34155674", "DetectTime": "2024-05-21T12:35:11.903420+00:00", "EventTime": "2024-05-21T12:35:11.903446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NJi018Mfj40LUnf7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b831ac08-1f35-46f4-a295-b19742abbd37", "DetectTime": "2024-05-21T12:35:11.920870+00:00", "EventTime": "2024-05-21T12:35:11.920890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.233.201.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6CK03RUMNmgTYCG2"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c7f690c1-4d08-43c3-8ce4-784839a8b3a9", "DetectTime": "2024-05-21T12:35:11.932292+00:00", "EventTime": "2024-05-21T12:35:11.932314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.177.164.7 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQztmI258nUcc12kx3"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "983fcac5-a89d-4afa-9787-135e2f0b00c8", "DetectTime": "2024-05-21T12:35:11.939729+00:00", "EventTime": "2024-05-21T12:35:11.939751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.61.181.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezIC62DbZpxcf0Yhd"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5e1c5e4a-185d-456a-8381-ec90ed0643d5", "DetectTime": "2024-05-21T12:35:11.954876+00:00", "EventTime": "2024-05-21T12:35:11.954897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.91.101.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4594LPZwbjWIHef"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b49d7db8-5caa-4907-8b1a-c9323ffa6fd1", "DetectTime": "2024-05-21T12:35:11.990323+00:00", "EventTime": "2024-05-21T12:35:11.990344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 194.225.212.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6DHn3WRbtOKdkvk1"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f32c3e69-e4e9-4a43-8c36-3a428e3d1265", "DetectTime": "2024-05-21T12:35:11.995403+00:00", "EventTime": "2024-05-21T12:35:11.995423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.200.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoVAel1OIaRbkVKUT6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "539a9d3a-89a3-4d7c-a2f3-ada38fd08313", "DetectTime": "2024-05-21T12:35:12.093431+00:00", "EventTime": "2024-05-21T12:35:12.093451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ve671lpuHtXlski4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c70b1ae3-00df-41c0-9a1c-decbf89c0486", "DetectTime": "2024-05-21T12:35:12.297704+00:00", "EventTime": "2024-05-21T12:35:12.297726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ44bW376wwhR40el4", "CXpdZs3rSFqQG0biu6", "C0GUOq2TjlDfaq5kjf", "C5xExG1Vv0MmBSitp1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "332c8019-4424-4b7d-a52e-d4284b9630bc", "DetectTime": "2024-05-21T12:35:12.401976+00:00", "EventTime": "2024-05-21T12:35:12.401997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49byd3CoEXecmQccf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "fc9e4068-bd41-49c5-a814-844b5232de99", "DetectTime": "2024-05-21T12:35:12.418714+00:00", "EventTime": "2024-05-21T12:35:12.418735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.132.190.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeuJkg3sxcrhX5HCq9"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "0887d6c5-fa31-4e8c-8036-c4a3bfcad07d", "DetectTime": "2024-05-21T12:35:12.424736+00:00", "EventTime": "2024-05-21T12:35:12.424758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.118.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4OsmN3YJbOy9MG0Tc"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b2cd4904-2189-40c4-8516-44aac3f68777", "DetectTime": "2024-05-21T12:35:12.429747+00:00", "EventTime": "2024-05-21T12:35:12.429767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.119.5.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT6C8M3azrmeI7MoMd"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "41d74c42-3d58-4a84-a86f-61c90fff7477", "DetectTime": "2024-05-21T12:35:12.436350+00:00", "EventTime": "2024-05-21T12:35:12.436369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.49.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhGDt2JOYN4vspTQ"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9618f49b-298a-4b2b-9971-79507d3da77b", "DetectTime": "2024-05-21T12:35:12.517278+00:00", "EventTime": "2024-05-21T12:35:12.517297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 168.187.127.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4Az94n8ZFV602Ok"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "1091d027-3b04-4b7b-83f2-a336d305f760", "DetectTime": "2024-05-21T12:35:12.527903+00:00", "EventTime": "2024-05-21T12:35:12.527922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.151.196 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7Wlm2P5cy43EHtEl"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "d3bc2230-c05e-44b0-9a7e-5493ac65248b", "DetectTime": "2024-05-21T12:35:12.581341+00:00", "EventTime": "2024-05-21T12:35:12.581364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFwSX2zh0M2Qg8ocb"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "665c07cc-ecab-4fb0-b4ad-a413562c9806", "DetectTime": "2024-05-21T12:35:12.596712+00:00", "EventTime": "2024-05-21T12:35:12.596736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.25.122.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA19gf3xnPVqgiDRab"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "dee53054-cae5-4dda-b215-2c06904dc900", "DetectTime": "2024-05-21T12:35:12.601836+00:00", "EventTime": "2024-05-21T12:35:12.601855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.15.117.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WJN94sXXcfuxEwD5"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9f864888-3de6-4742-92ba-d5467f3a5ad6", "DetectTime": "2024-05-21T12:35:12.926145+00:00", "EventTime": "2024-05-21T12:35:12.926166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.150.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJFpP2345MTLgTdpl9"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "65b4b308-e294-4bb0-a93b-4b2757c8730b", "DetectTime": "2024-05-21T12:35:12.936476+00:00", "EventTime": "2024-05-21T12:35:12.936502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.8.121.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyozZRafil0QnAb"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "40ea4dcb-3153-41f5-961d-ff31506cae8e", "DetectTime": "2024-05-21T12:35:12.990486+00:00", "EventTime": "2024-05-21T12:35:12.990508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.150.84.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUzJS2l01uppZums4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "8a0f4073-0919-49ce-a9fb-e8379b99fde0", "DetectTime": "2024-05-21T12:35:12.996255+00:00", "EventTime": "2024-05-21T12:35:12.996274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.4.86.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuU8QRaYTJ0Crefnf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f05b493c-69fc-46da-851e-5d263ec2c4cd", "DetectTime": "2024-05-21T12:35:13.049420+00:00", "EventTime": "2024-05-21T12:35:13.049439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.33.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFzCFz1fva3gSYJsnh"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "7a9fbc10-0c89-4636-850e-985b37d78e15", "DetectTime": "2024-05-21T12:35:13.175213+00:00", "EventTime": "2024-05-21T12:35:13.175235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctr4kHbnirrk2Sjid"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "7cd833c7-76a2-4706-8357-269eb262d996", "DetectTime": "2024-05-21T12:35:13.210780+00:00", "EventTime": "2024-05-21T12:35:13.210801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 160.78.109.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Nx4Q1y4keahRIFp6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "07006fe5-79fd-4749-b086-8faa3685319f", "DetectTime": "2024-05-21T12:35:13.291297+00:00", "EventTime": "2024-05-21T12:35:13.291318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.7.208.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChHNpC1H2N7wF9hyX4"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "7d95aa75-2a65-4852-b3a7-5b9753492624", "DetectTime": "2024-05-21T12:35:13.296692+00:00", "EventTime": "2024-05-21T12:35:13.296713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.6.140.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Hhlr1L6Pie8lHeSc"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5a9534be-8875-4811-95cb-9d48f87962a3", "DetectTime": "2024-05-21T12:35:13.301554+00:00", "EventTime": "2024-05-21T12:35:13.301572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.181.111.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeTbFO5DsnjC1zg8"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "804106bb-ee78-4ac6-96c7-c11976127469", "DetectTime": "2024-05-21T12:35:13.378395+00:00", "EventTime": "2024-05-21T12:35:13.378428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.48.155.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYr6R126vtDEDTwM8"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "1b3bba68-bb26-4f2e-b6e9-a81806fb90af", "DetectTime": "2024-05-21T12:35:13.907942+00:00", "EventTime": "2024-05-21T12:35:13.907966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXxTB3q0iAwBtJGXd"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "4b7eeb0f-c181-4967-922e-2bc361d62c54", "DetectTime": "2024-05-21T12:35:13.917362+00:00", "EventTime": "2024-05-21T12:35:13.917381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.135.114.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjunfN2dTC7wt33LC"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "51e87d5d-c263-4ffd-8998-a46b55b6b927", "DetectTime": "2024-05-21T12:35:13.922016+00:00", "EventTime": "2024-05-21T12:35:13.922035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZkq41xgPC3xE7cte"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "b379632c-89ac-4204-b811-a0f53d2ae725", "DetectTime": "2024-05-21T12:35:13.927628+00:00", "EventTime": "2024-05-21T12:35:13.927649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaE9Hx1KU2WIv8ZNHf"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "14b8d859-ac41-4a5c-b39a-5497bb09e1c6", "DetectTime": "2024-05-21T12:35:13.940801+00:00", "EventTime": "2024-05-21T12:35:13.940822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.97.42.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYYwJ3H1ffxtLiEN2"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "2525f6a1-6d2f-4706-b433-2d049335dd91", "DetectTime": "2024-05-21T12:35:14.215312+00:00", "EventTime": "2024-05-21T12:35:14.215334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqB8B8X9Yt97L8ul"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "73054f8c-c802-4a8b-8037-50ae7c8fe04a", "DetectTime": "2024-05-21T12:35:14.303099+00:00", "EventTime": "2024-05-21T12:35:14.303121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.122.81.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGV5lKFAmDOQsEoKj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e145e9c4-ace5-45c0-82d9-c661171e9651", "DetectTime": "2024-05-21T12:35:14.403895+00:00", "EventTime": "2024-05-21T12:35:14.403917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.92.231.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftO8i3gjE5ee1Pxuk"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "33eb3d2d-6ac0-4c43-b5da-65732f409d1e", "DetectTime": "2024-05-21T12:35:14.515033+00:00", "EventTime": "2024-05-21T12:35:14.515059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.179.165.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8OQa3YSc7Z3nLDgh"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "439e6f26-8794-499e-b30d-162f4b7dfc05", "DetectTime": "2024-05-21T12:35:14.522018+00:00", "EventTime": "2024-05-21T12:35:14.522039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuMZD01fDITQg0lIM", "Cspc8s17E0o1XvvXbh", "CC7v7bcFpkwIaBEFa", "CgkArs2NKJUAUz79Gl"], "accumulated_threat_level": 11.100000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "8caa8635-8fb5-4b3f-9501-f30e1bed6a80", "DetectTime": "2024-05-21T12:35:14.561568+00:00", "EventTime": "2024-05-21T12:35:14.561593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.1.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSNKEz2Ose8H1b5vxk"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f41ef5e8-496e-4ad8-bd1a-ae59a618eb2b", "DetectTime": "2024-05-21T12:35:14.816420+00:00", "EventTime": "2024-05-21T12:35:14.816443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 210.177.99.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3bnm3chNJupdZxhl"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e301d8ed-e4ef-48d9-867c-6994979bf7aa", "DetectTime": "2024-05-21T12:35:14.826662+00:00", "EventTime": "2024-05-21T12:35:14.826683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.227.133.172 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEp3Bp3MI1fCa2Yxna"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "25f4a6f2-6c3d-40d4-b6f8-d189a9c3223d", "DetectTime": "2024-05-21T12:35:14.880958+00:00", "EventTime": "2024-05-21T12:35:14.880981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.211.49.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyl1P24O9Tcs6nyFDk"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "01569f88-19c6-4337-beaa-6c126e44bf96", "DetectTime": "2024-05-21T12:35:14.886198+00:00", "EventTime": "2024-05-21T12:35:14.886216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.198.7.32 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CevOnb3C7hKHtfo3jg"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "c7160e8b-e0f5-474c-9e6d-9172d4b48d97", "DetectTime": "2024-05-21T12:35:15.144663+00:00", "EventTime": "2024-05-21T12:35:15.144685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Lvnt3e5nQWXazfrk"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "f1205159-7cf3-42a0-b1dd-1da658ab3d23", "DetectTime": "2024-05-21T12:35:15.218934+00:00", "EventTime": "2024-05-21T12:35:15.218954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CADypc4fzcGa85g3N"], "accumulated_threat_level": 11.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "2909c1df-3ca6-4cca-a9c9-cd6d99d2b1d2", "DetectTime": "2024-05-21T12:35:15.316100+00:00", "EventTime": "2024-05-21T12:35:15.316121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.111.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyir5l2tDyf9GRwhz9"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9c1df169-ed87-4e46-ab20-4266ef50f166", "DetectTime": "2024-05-21T12:35:15.374630+00:00", "EventTime": "2024-05-21T12:35:15.374651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9PGrC4QyEmMGpGWh"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "2d427e21-6c84-4b06-85e2-23773361ce07", "DetectTime": "2024-05-21T12:35:15.413442+00:00", "EventTime": "2024-05-21T12:35:15.413464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQmyr2vVTmX116h03"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "459117ea-4d35-4513-b240-aefb8b0cf47d", "DetectTime": "2024-05-21T12:35:15.447905+00:00", "EventTime": "2024-05-21T12:35:15.447927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.55.18.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeBVq3mfJrlqJPEX6"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "004a46e9-cc30-45d4-87e4-907ecd04c6e4", "DetectTime": "2024-05-21T12:35:15.693945+00:00", "EventTime": "2024-05-21T12:35:15.693968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.113.181.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQX6d4YR0YrvkfwE7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "79153148-0c29-4c44-8bed-0913a744c9f3", "DetectTime": "2024-05-21T12:35:15.998822+00:00", "EventTime": "2024-05-21T12:35:15.998842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.187.96.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzgKOC206ds3lB21k7"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "e512ba23-299b-4fc1-b84a-80d25c8e46b5", "DetectTime": "2024-05-21T12:35:16.034047+00:00", "EventTime": "2024-05-21T12:35:16.034069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.9.247.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKydXi2ZjwTsyIJcse"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "4b079f73-103e-4fc1-bc77-ebe158bf77c4", "DetectTime": "2024-05-21T12:35:16.320652+00:00", "EventTime": "2024-05-21T12:35:16.320678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 3084/TCP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jnIu1S9FXLG6ZhPh"], "accumulated_threat_level": 12.700000000000003, "timewindow": 84} +{"Format": "Json", "ID": "4b079f73-103e-4fc1-bc77-ebe158bf77c4", "DetectTime": "2024-05-21T12:35:16.320652+00:00", "EventTime": "2024-05-21T12:35:16.320678+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "1970-01-04T11:44:16.952200+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2024/05/21 12:35:16.650917)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 84, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "c58cf3cc-2c2c-4aa1-8996-b1c971058c25", "DetectTime": "2024-05-21T12:35:16.654999+00:00", "EventTime": "2024-05-21T12:35:16.655017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.23.173.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQA1f2lqhw13Rruak"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "feda3d21-cde9-4a5c-8852-4347ddf3a566", "DetectTime": "2024-05-21T12:35:16.659841+00:00", "EventTime": "2024-05-21T12:35:16.659859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.109.94.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmvCs1sQdbggySkSk"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "5af8360c-e841-4ef1-8c93-f1933e28a0ed", "DetectTime": "2024-05-21T12:35:16.664381+00:00", "EventTime": "2024-05-21T12:35:16.664399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBr4vc4xYXWXXqOAMj"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "9a237a09-954d-4885-a971-30c493667134", "DetectTime": "2024-05-21T12:35:16.677496+00:00", "EventTime": "2024-05-21T12:35:16.677519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3KVj4UZ9BGbJlwPe"], "accumulated_threat_level": 1.6, "timewindow": 83} +{"Format": "IDEA0", "ID": "8b4e7e9f-d11b-4b9e-83d7-eb23948f5371", "DetectTime": "2024-05-21T12:35:17.177026+00:00", "EventTime": "2024-05-21T12:35:17.177049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyHU2J1Szik3Ymimb8", "CRJokI3vYpYfSR0aJj", "C6HAKdVsnmtDpWWtc", "CWVuA22dxfVWzvcu88"], "accumulated_threat_level": 0.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "234d99e3-3929-473e-a8a1-13b6c243ec01", "DetectTime": "2024-05-21T12:35:17.343783+00:00", "EventTime": "2024-05-21T12:35:17.343802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG4zyM261lW4boM4Ue"], "accumulated_threat_level": 1.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "b81f1a27-8123-45ee-84ee-4150aab896b5", "DetectTime": "2024-05-21T12:35:17.375765+00:00", "EventTime": "2024-05-21T12:35:17.375786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALW641qpzqi0Dj0Nl"], "accumulated_threat_level": 1.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "926df131-1db2-4113-81ba-7bff359883fe", "DetectTime": "2024-05-21T12:35:17.410440+00:00", "EventTime": "2024-05-21T12:35:17.410458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnv74syUFHicYc9si"], "accumulated_threat_level": 2.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "851482ba-ab4b-49e3-8f5c-0b025a3fbd83", "DetectTime": "2024-05-21T12:35:17.437900+00:00", "EventTime": "2024-05-21T12:35:17.437920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwTYN2XXeyFr8Qtoe"], "accumulated_threat_level": 2.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "cac41813-4b39-4465-b9e1-95e407bff570", "DetectTime": "2024-05-21T12:35:17.478474+00:00", "EventTime": "2024-05-21T12:35:17.478494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXdOk1A3Jw4ASLmK7"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "30c19688-e807-4376-b9e1-1bcecdddd4c6", "DetectTime": "2024-05-21T12:35:17.497859+00:00", "EventTime": "2024-05-21T12:35:17.497881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtenWk3qFkmjA9ABh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "bd64d5a4-31f7-4065-a37d-8b8efb599bf0", "DetectTime": "2024-05-21T12:35:17.535104+00:00", "EventTime": "2024-05-21T12:35:17.535125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61zxj3jE2BoQ3IWn9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "94f9bc5b-518c-4f9a-99d3-331d0c124604", "DetectTime": "2024-05-21T12:35:17.842927+00:00", "EventTime": "2024-05-21T12:35:17.842946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKYOdJ1DzvbbFQ7D62"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "f5a91b94-0d6e-4f29-ac80-c5d6a22eb523", "DetectTime": "2024-05-21T12:35:17.876788+00:00", "EventTime": "2024-05-21T12:35:17.876811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkCKP1uJosRYDkzz"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "2cd180e9-3424-41d3-bbec-b047d7316687", "DetectTime": "2024-05-21T12:35:17.881933+00:00", "EventTime": "2024-05-21T12:35:17.881953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJQS21k5dgk85MABe"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "fd7d96cc-2cd4-483c-a3e3-e68186c75020", "DetectTime": "2024-05-21T12:35:17.909028+00:00", "EventTime": "2024-05-21T12:35:17.909049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.58.15.211 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsnyUx3w8mrw1sHXn1"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "2b051227-13fd-46e7-80ba-f6de302c1515", "DetectTime": "2024-05-21T12:35:17.914240+00:00", "EventTime": "2024-05-21T12:35:17.914260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce245F2pnCm4DcZksl"], "accumulated_threat_level": 3.7, "timewindow": 84} +{"Format": "IDEA0", "ID": "93d10547-9feb-4f51-b6bc-a6b6b8ea52c4", "DetectTime": "2024-05-21T12:35:18.001762+00:00", "EventTime": "2024-05-21T12:35:18.001782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtnZx7DcEDlNeRfV6"], "accumulated_threat_level": 4.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "204fdbe1-e7ce-497e-8b9e-8cedc94680db", "DetectTime": "2024-05-21T12:35:18.040130+00:00", "EventTime": "2024-05-21T12:35:18.040149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72UfL1JdVb4NT8Hif"], "accumulated_threat_level": 5.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "dfcb4eed-16c1-4096-861b-9c58d406a764", "DetectTime": "2024-05-21T12:35:18.079911+00:00", "EventTime": "2024-05-21T12:35:18.079930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpF1KHwfD4ot81dej"], "accumulated_threat_level": 6.1, "timewindow": 84} +{"Format": "IDEA0", "ID": "ea6ada85-bc3c-4c19-b1e7-97563d54da0b", "DetectTime": "2024-05-21T12:35:18.206695+00:00", "EventTime": "2024-05-21T12:35:18.206715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkNoMX20KjsQPqNgK4"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "9404a127-d6dd-4175-90b0-8a5050002971", "DetectTime": "2024-05-21T12:35:18.257158+00:00", "EventTime": "2024-05-21T12:35:18.257181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ1WU3T5vQVO60gld"], "accumulated_threat_level": 7.699999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "fce3227b-0802-4aba-96ba-c49a4adb8cfb", "DetectTime": "2024-05-21T12:35:18.293324+00:00", "EventTime": "2024-05-21T12:35:18.293344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMRGUP2IKDGiToar56"], "accumulated_threat_level": 8.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "fdb51999-1c7e-49cd-9496-154db6984c7f", "DetectTime": "2024-05-21T12:35:18.539484+00:00", "EventTime": "2024-05-21T12:35:18.539505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClOcGO2Teg42VUv5jj"], "accumulated_threat_level": 8.5, "timewindow": 84} +{"Format": "IDEA0", "ID": "6d4f9bc0-eb79-4542-865d-2ea0256ec657", "DetectTime": "2024-05-21T12:35:18.579929+00:00", "EventTime": "2024-05-21T12:35:18.579950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZY2rH14UteZKA2fgl"], "accumulated_threat_level": 9.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "87ac7a66-397f-42b7-9e38-3e02cc0edfca", "DetectTime": "2024-05-21T12:35:18.605277+00:00", "EventTime": "2024-05-21T12:35:18.605300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHyv41S3q7WHSABni"], "accumulated_threat_level": 9.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "141e609c-a510-43db-91b0-8fe06e8fcb64", "DetectTime": "2024-05-21T12:35:18.643140+00:00", "EventTime": "2024-05-21T12:35:18.643161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B1kvSX77Hk4ZPM1"], "accumulated_threat_level": 9.3, "timewindow": 84} +{"Format": "IDEA0", "ID": "08a59995-7849-48e1-9574-6b8b06f29f20", "DetectTime": "2024-05-21T12:35:18.655014+00:00", "EventTime": "2024-05-21T12:35:18.655033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJAso1aC9J1MrDyHe"], "accumulated_threat_level": 10.100000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "fe4f12d7-a85d-411f-ab8b-1718438d58ac", "DetectTime": "2024-05-21T12:35:18.667287+00:00", "EventTime": "2024-05-21T12:35:18.667306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.156.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYR1A3soFZAuBoXaj"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ee9ab727-46a9-4ff2-9a2b-a72cc766ff7f", "DetectTime": "2024-05-21T12:35:18.680451+00:00", "EventTime": "2024-05-21T12:35:18.680474+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.156.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.156.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYR1A3soFZAuBoXaj"], "accumulated_threat_level": 2.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "eb5c0078-a5d6-474d-97ba-0fa78823b9a7", "DetectTime": "2024-05-21T12:35:18.702752+00:00", "EventTime": "2024-05-21T12:35:18.702776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKN013nbvoLoT2Hf9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "9bb0f180-9f2b-4026-9765-526bdf43dbe4", "DetectTime": "2024-05-21T12:35:18.840705+00:00", "EventTime": "2024-05-21T12:35:18.840731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSg6Hj2YifYfN2F7P6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "19681e65-d4c9-4be6-bebb-1ce6975becad", "DetectTime": "2024-05-21T12:35:18.846431+00:00", "EventTime": "2024-05-21T12:35:18.846456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnaIET2cuVHbjmUMA1"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "56f6a37c-9e20-4d0a-a1c6-4822bd1c4143", "DetectTime": "2024-05-21T12:35:18.872370+00:00", "EventTime": "2024-05-21T12:35:18.872391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXzEK43BGEmTABZdDf"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "cc750aff-0da6-49db-8046-c29b9704373f", "DetectTime": "2024-05-21T12:35:18.877204+00:00", "EventTime": "2024-05-21T12:35:18.877225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Nk9G7gvp7gFUOah"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "de258f9b-fd12-4d8f-9b09-5d3908df3b5f", "DetectTime": "2024-05-21T12:35:18.882034+00:00", "EventTime": "2024-05-21T12:35:18.882054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpdPfo3monczSZRTD5"], "accumulated_threat_level": 10.900000000000002, "timewindow": 84} +{"Format": "IDEA0", "ID": "789359e1-89c0-451e-9fcd-da48f0dce56d", "DetectTime": "2024-05-21T12:35:18.949946+00:00", "EventTime": "2024-05-21T12:35:18.949966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuS5kzrDegesU641"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "62f4160d-a6ba-426c-8988-281c4a365932", "DetectTime": "2024-05-21T12:35:18.972280+00:00", "EventTime": "2024-05-21T12:35:18.972302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZItD2pSIygB2W0Lf"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "6a3f6448-c368-49de-9977-26cd000b0cd2", "DetectTime": "2024-05-21T12:35:19.262799+00:00", "EventTime": "2024-05-21T12:35:19.262822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1UEL2KJK3wOaDJk1"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "5ad497c4-a1db-4dd4-ab57-416a1cf7dff4", "DetectTime": "2024-05-21T12:35:19.268160+00:00", "EventTime": "2024-05-21T12:35:19.268178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQmPTF1eoPVEp4FjQ1"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "578daa33-d607-4d9f-bb8f-46f67f98f3c3", "DetectTime": "2024-05-21T12:35:19.328916+00:00", "EventTime": "2024-05-21T12:35:19.328937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CalqiM2IFp8MDQblPb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 84} +{"Format": "IDEA0", "ID": "0adb8262-470b-4922-a045-22bbd40379b4", "DetectTime": "2024-05-21T12:35:19.362038+00:00", "EventTime": "2024-05-21T12:35:19.362059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6lQp4q17t3dqfvqk"], "accumulated_threat_level": 12.500000000000004, "timewindow": 84} +{"Format": "Json", "ID": "0adb8262-470b-4922-a045-22bbd40379b4", "DetectTime": "2024-05-21T12:35:19.362038+00:00", "EventTime": "2024-05-21T12:35:19.362059+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-04T11:45:30.473102+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2024/05/21 12:35:19.682242)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 84, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "f11ba981-4401-44c6-aa26-4bc74225d1dd", "DetectTime": "2024-05-21T12:35:19.693420+00:00", "EventTime": "2024-05-21T12:35:19.693442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cucdsq3YJZbQ0ID12a"], "accumulated_threat_level": 0.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "9d9bb3d4-f6aa-40b7-aed2-1be77dc75626", "DetectTime": "2024-05-21T12:35:19.704658+00:00", "EventTime": "2024-05-21T12:35:19.704677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9C2aACg340dIIbp6"], "accumulated_threat_level": 1.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "6ce18bce-ea1f-4edb-a360-e9c0f3a85ffe", "DetectTime": "2024-05-21T12:35:19.715927+00:00", "EventTime": "2024-05-21T12:35:19.715945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp06fA3YUX5JKkScvb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "3125023a-f7c5-4c09-9469-6440b4f74637", "DetectTime": "2024-05-21T12:35:19.726257+00:00", "EventTime": "2024-05-21T12:35:19.726276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHjr94Vo4rNpC1ria"], "accumulated_threat_level": 3.2, "timewindow": 84} +{"Format": "IDEA0", "ID": "657f0faa-86a7-40ce-bdeb-ea154af72660", "DetectTime": "2024-05-21T12:35:19.736709+00:00", "EventTime": "2024-05-21T12:35:19.736728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4qMJ1uMQMnoG7Nhb"], "accumulated_threat_level": 4.0, "timewindow": 84} +{"Format": "IDEA0", "ID": "90363fc9-54c4-4256-b0e8-27bc1e966987", "DetectTime": "2024-05-21T12:35:19.747230+00:00", "EventTime": "2024-05-21T12:35:19.747248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.209.29.166"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 201.209.29.166. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQIjOXQHQByweiLLi"], "accumulated_threat_level": 4.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "c6bf06cd-647c-4e1d-96a5-54194bad36cd", "DetectTime": "2024-05-21T12:35:19.751731+00:00", "EventTime": "2024-05-21T12:35:19.751750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnlk0929AxHr4E20qe"], "accumulated_threat_level": 4.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "5a5ab997-aeb7-46a2-953b-5d622b933733", "DetectTime": "2024-05-21T12:35:20.201683+00:00", "EventTime": "2024-05-21T12:35:20.201706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdcfT1y8S6h4PusA6"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "a692d1cc-15f9-4b72-9f65-7bf47cd4dbd3", "DetectTime": "2024-05-21T12:35:20.234000+00:00", "EventTime": "2024-05-21T12:35:20.234020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfs9pp4La3lrSpghH7"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "c43fa702-bacb-4335-9d7e-6403d81e8a94", "DetectTime": "2024-05-21T12:35:20.248705+00:00", "EventTime": "2024-05-21T12:35:20.248729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.137.7.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOYyJ2KoYR9w3Smyd"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "0b313874-a902-4d49-a1a3-2802ff99a1f7", "DetectTime": "2024-05-21T12:35:20.253698+00:00", "EventTime": "2024-05-21T12:35:20.253718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.198.93.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatKqThjgx9c6zLce"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "e681e8eb-8800-4a46-acaa-400f39f00e86", "DetectTime": "2024-05-21T12:35:20.377390+00:00", "EventTime": "2024-05-21T12:35:20.377409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCkKf2WRqfYx8lBs"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "648f9947-09dc-430e-b521-d4cc55d9e7d4", "DetectTime": "2024-05-21T12:35:20.382249+00:00", "EventTime": "2024-05-21T12:35:20.382268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMBX7u8OsoEwCpiHf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "f359a592-e4ec-46dd-8e63-b3a29451ce86", "DetectTime": "2024-05-21T12:35:20.404590+00:00", "EventTime": "2024-05-21T12:35:20.404612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.64.80.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfCe617nsKV5dAVkf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "504e9978-1747-443b-bcb2-eb8dac9e7d83", "DetectTime": "2024-05-21T12:35:20.430778+00:00", "EventTime": "2024-05-21T12:35:20.430799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1KKhJ1suf22dDrgB7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 84} +{"Format": "IDEA0", "ID": "5d559dec-a868-4eaa-ace0-30a586302b62", "DetectTime": "2024-05-21T12:35:20.501747+00:00", "EventTime": "2024-05-21T12:35:20.501769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQObf241u7VKjeF5El"], "accumulated_threat_level": 7.199999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "9a8bd3f6-d2ff-4551-ad0c-908d785f9980", "DetectTime": "2024-05-21T12:35:20.753089+00:00", "EventTime": "2024-05-21T12:35:20.753108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZgMHI3xvoTHc7xgAc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "98cbe07b-9424-451d-87c2-b4741cacf47e", "DetectTime": "2024-05-21T12:35:20.788896+00:00", "EventTime": "2024-05-21T12:35:20.788918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.209.29.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxH72aFA02tQRmz7h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "7622e50a-4d8e-45d6-95c3-b8dd57078bf8", "DetectTime": "2024-05-21T12:35:20.800192+00:00", "EventTime": "2024-05-21T12:35:20.800210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxVjm1zxADTXawQKj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "5947ff15-e3a2-45db-ac07-ec7709130075", "DetectTime": "2024-05-21T12:35:20.845741+00:00", "EventTime": "2024-05-21T12:35:20.845760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.74.91.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUU5B830yrtkAeomyg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 84} +{"Format": "IDEA0", "ID": "24187c83-9007-4e78-9c12-8de0b691dcf8", "DetectTime": "2024-05-21T12:35:20.883762+00:00", "EventTime": "2024-05-21T12:35:20.883785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVsk632ttxIhbVBIx1"], "accumulated_threat_level": 9.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "72cbe94c-4fdd-43c7-b6a9-63cf111674e3", "DetectTime": "2024-05-21T12:35:20.923192+00:00", "EventTime": "2024-05-21T12:35:20.923211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBM0126cdatvVBE7i"], "accumulated_threat_level": 10.4, "timewindow": 84} +{"Format": "IDEA0", "ID": "04097c9c-8695-49fe-9876-9613d1c3666a", "DetectTime": "2024-05-21T12:35:20.975625+00:00", "EventTime": "2024-05-21T12:35:20.975643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gLCC2okxRVpS2RKh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 84} +{"Format": "IDEA0", "ID": "8901863c-885f-47e3-adfd-f268474b6cc6", "DetectTime": "2024-05-21T12:35:21.014004+00:00", "EventTime": "2024-05-21T12:35:21.014023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62tsxSRjdhuUSLm4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 84} +{"Format": "Json", "ID": "8901863c-885f-47e3-adfd-f268474b6cc6", "DetectTime": "2024-05-21T12:35:21.014004+00:00", "EventTime": "2024-05-21T12:35:21.014023+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "1970-01-04T11:46:26.252364+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 84. (real time 2024/05/21 12:35:21.539258)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 84, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e700c834-f602-4f16-b4e6-a4188a8995de", "DetectTime": "2024-05-21T12:35:21.550972+00:00", "EventTime": "2024-05-21T12:35:21.550994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNcQyJ2SHtbEbV1Eg1"], "accumulated_threat_level": 0.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "e19490be-cb92-48a9-98e3-b37c83f13a9d", "DetectTime": "2024-05-21T12:35:21.564269+00:00", "EventTime": "2024-05-21T12:35:21.564287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIy6Zf4zOPZ3LO4lS8"], "accumulated_threat_level": 1.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "27c860cc-d094-4637-844d-c104b9477893", "DetectTime": "2024-05-21T12:35:21.574705+00:00", "EventTime": "2024-05-21T12:35:21.574723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwa6SX2JJc96W2Whl6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 84} +{"Format": "IDEA0", "ID": "6d6d6966-7377-4937-905f-467ff178641a", "DetectTime": "2024-05-21T12:35:21.589628+00:00", "EventTime": "2024-05-21T12:35:21.589646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqbyo30Dlc23RDb27"], "accumulated_threat_level": 3.2, "timewindow": 84} +{"Format": "IDEA0", "ID": "d1c10a64-d038-44d3-93ae-eb0ea2f5daa7", "DetectTime": "2024-05-21T12:35:21.600002+00:00", "EventTime": "2024-05-21T12:35:21.600020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0U1h4R5rdZvnWZY9"], "accumulated_threat_level": 3.2, "timewindow": 84} +{"Format": "IDEA0", "ID": "3c55f410-bcef-4935-8360-e0c56384c0a7", "DetectTime": "2024-05-21T12:35:21.609860+00:00", "EventTime": "2024-05-21T12:35:21.609877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFwf82VJsYBFUoUY"], "accumulated_threat_level": 4.0, "timewindow": 84} +{"Format": "IDEA0", "ID": "57d05b55-ee90-452c-b287-9e1f7015893a", "DetectTime": "2024-05-21T12:35:21.620829+00:00", "EventTime": "2024-05-21T12:35:21.620850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRn003MjDc8mzyAH1"], "accumulated_threat_level": 4.8, "timewindow": 84} +{"Format": "IDEA0", "ID": "a63dfd0c-a3f6-4bd0-961f-1a8095f5f353", "DetectTime": "2024-05-21T12:35:21.631456+00:00", "EventTime": "2024-05-21T12:35:21.631473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUxpL1Dckbkl1ft63"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5e4a0e85-1bf1-4691-b6e7-8dc5a9b44f45", "DetectTime": "2024-05-21T12:35:21.643663+00:00", "EventTime": "2024-05-21T12:35:21.643684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LNcv49VCyLpbEzCd"], "accumulated_threat_level": 0.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "a9c454c5-d957-44f5-b380-3dbddcaaafdb", "DetectTime": "2024-05-21T12:35:22.422518+00:00", "EventTime": "2024-05-21T12:35:22.422540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGSOE1AtTe88fktj9", "CAINDp2wXM6BLnqDc", "COEawz1X9BDQCKMz14", "C1FN4y3VfdRzX8cna8"], "accumulated_threat_level": 1.3, "timewindow": 85} +{"Format": "IDEA0", "ID": "e96ad57c-04b9-45f5-be20-d1e829ac0e7b", "DetectTime": "2024-05-21T12:35:22.607919+00:00", "EventTime": "2024-05-21T12:35:22.607951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2Ss04iGGWM6yQE2k"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "42e45fef-3433-4c24-a727-f434440d07a7", "DetectTime": "2024-05-21T12:35:22.827100+00:00", "EventTime": "2024-05-21T12:35:22.827118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauppL32Yj9Thuf6Xe"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "f33afd0f-184c-4837-bbec-94e7799cbf47", "DetectTime": "2024-05-21T12:35:22.870652+00:00", "EventTime": "2024-05-21T12:35:22.870674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CusVcX3YP6BrMVddej"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "acba05fd-2a2a-426f-87e2-218fe7d286b8", "DetectTime": "2024-05-21T12:35:23.215541+00:00", "EventTime": "2024-05-21T12:35:23.215561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zSc41ClkLiX8C9O7"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "7709daaa-6b3d-4f18-a495-650be0850ac8", "DetectTime": "2024-05-21T12:35:23.273705+00:00", "EventTime": "2024-05-21T12:35:23.273724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFfI71IfnnA6P3at7"], "accumulated_threat_level": 2.1, "timewindow": 85} +{"Format": "IDEA0", "ID": "079d99db-f401-4363-8d19-0d9418235ed9", "DetectTime": "2024-05-21T12:35:23.298657+00:00", "EventTime": "2024-05-21T12:35:23.298677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmDMnEpZpCWDkfw7f"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "1219098c-9db7-40cb-be89-ea0cdf317b6f", "DetectTime": "2024-05-21T12:35:23.340660+00:00", "EventTime": "2024-05-21T12:35:23.340683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKbJ23NdBMEox1i54"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "899ee97e-187f-4724-b5eb-432da1119caf", "DetectTime": "2024-05-21T12:35:23.595538+00:00", "EventTime": "2024-05-21T12:35:23.595563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwjyl4DWWyLZLi30b"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 85} +{"Format": "IDEA0", "ID": "30f782c0-3ec3-4504-9772-fefb6afb24f7", "DetectTime": "2024-05-21T12:35:23.622341+00:00", "EventTime": "2024-05-21T12:35:23.622363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Ep8U3QLy0hCU4iJa"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b8ef57ee-c905-4561-bd27-19ba795e56a9", "DetectTime": "2024-05-21T12:35:23.682612+00:00", "EventTime": "2024-05-21T12:35:23.682634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwWOJw11OZLMKC1ur2"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "c97fb1eb-1348-4dc2-8d2d-3bb06ea171c2", "DetectTime": "2024-05-21T12:35:23.687978+00:00", "EventTime": "2024-05-21T12:35:23.687996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3PTef3rLBDOO4tad8"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "90c65cee-304f-4861-8d9f-9a5bdf2fc874", "DetectTime": "2024-05-21T12:35:23.693315+00:00", "EventTime": "2024-05-21T12:35:23.693333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNritu1uvkJfHX4A1e"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5dbf1d02-332a-4fc2-a9e4-bc4a43a137b2", "DetectTime": "2024-05-21T12:35:23.698947+00:00", "EventTime": "2024-05-21T12:35:23.698970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEf0kI2OsDEBnVVhlk"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "560a6d0b-5163-4f3e-9b83-23eecfbbbad9", "DetectTime": "2024-05-21T12:35:23.751779+00:00", "EventTime": "2024-05-21T12:35:23.751800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.119.5.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSScnL3CAEntvHnjN2"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "66f4a784-ca23-45ce-abcf-df0d53a0df24", "DetectTime": "2024-05-21T12:35:23.756842+00:00", "EventTime": "2024-05-21T12:35:23.756862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiFqa4Hz2laUKsr0c"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "42a627a1-129a-4417-ae5f-2811ef27b2ae", "DetectTime": "2024-05-21T12:35:23.869626+00:00", "EventTime": "2024-05-21T12:35:23.869656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLHvI1luHHIRilaua"], "accumulated_threat_level": 3.7, "timewindow": 85} +{"Format": "IDEA0", "ID": "a4d24847-c670-4e18-b144-54a2b779a434", "DetectTime": "2024-05-21T12:35:23.897985+00:00", "EventTime": "2024-05-21T12:35:23.898006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.49.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nIKZ2j9kXzJ6SOba"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "14edf4aa-8aa8-4dd6-9af4-3bfce6fb3b06", "DetectTime": "2024-05-21T12:35:24.164037+00:00", "EventTime": "2024-05-21T12:35:24.164058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsS1LUv9y652oZXe"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "c8247998-1529-4ddc-b1a5-d705fe450c20", "DetectTime": "2024-05-21T12:35:24.174100+00:00", "EventTime": "2024-05-21T12:35:24.174121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.150.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMn8x4gVWifi1gJVk"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b11a0e5a-6e60-488c-928a-c6fa6ad46fed", "DetectTime": "2024-05-21T12:35:24.224087+00:00", "EventTime": "2024-05-21T12:35:24.224104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2C1yI2AXEXJs8hsOf"], "accumulated_threat_level": 4.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "13d8f777-f89f-43de-9517-da77a92b7952", "DetectTime": "2024-05-21T12:35:24.265630+00:00", "EventTime": "2024-05-21T12:35:24.265647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ueUd2di617QwNpq1"], "accumulated_threat_level": 5.3, "timewindow": 85} +{"Format": "IDEA0", "ID": "3b9a5bea-cd1a-4c4d-8a95-86f4aed0e68f", "DetectTime": "2024-05-21T12:35:24.302449+00:00", "EventTime": "2024-05-21T12:35:24.302469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pHHu1N8BPTlR9BPd"], "accumulated_threat_level": 6.1, "timewindow": 85} +{"Format": "IDEA0", "ID": "ed0a76f6-fe47-4624-901c-605e18c69f15", "DetectTime": "2024-05-21T12:35:24.341348+00:00", "EventTime": "2024-05-21T12:35:24.341367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COrxg34iJxjTQh48d8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 85} +{"Format": "IDEA0", "ID": "19948692-5790-4382-968d-eff959bc054f", "DetectTime": "2024-05-21T12:35:24.380088+00:00", "EventTime": "2024-05-21T12:35:24.380108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR07LlPeZbEUUf793"], "accumulated_threat_level": 7.699999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "b8843469-85c1-4acc-a57b-6ab687914893", "DetectTime": "2024-05-21T12:35:24.418954+00:00", "EventTime": "2024-05-21T12:35:24.418973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQitzi4h9ZVShfI9ld"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "33b54557-0094-447f-9d73-715383bf7bb6", "DetectTime": "2024-05-21T12:35:24.460062+00:00", "EventTime": "2024-05-21T12:35:24.460080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuIpO92qjWaZN2Ivz2"], "accumulated_threat_level": 9.3, "timewindow": 85} +{"Format": "IDEA0", "ID": "0b207a9f-48d6-410d-9a67-865de2fcdeca", "DetectTime": "2024-05-21T12:35:24.589452+00:00", "EventTime": "2024-05-21T12:35:24.589472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtxDRXFx2pqf8iwub"], "accumulated_threat_level": 10.100000000000001, "timewindow": 85} +{"Format": "IDEA0", "ID": "410cc96f-75b0-4588-a2d0-29396c9032f9", "DetectTime": "2024-05-21T12:35:24.620953+00:00", "EventTime": "2024-05-21T12:35:24.620979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQc5mq4osIMCYzzwl4"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "ad1ad80f-1927-4090-8de9-49c1e0417822", "DetectTime": "2024-05-21T12:35:24.655907+00:00", "EventTime": "2024-05-21T12:35:24.655930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.181.111.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzk9g1XmwEyahlG0h"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "a41ca0ff-724e-4c07-a239-eb24e924b712", "DetectTime": "2024-05-21T12:35:24.667399+00:00", "EventTime": "2024-05-21T12:35:24.667418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2QPO833psEW39yNgd"], "accumulated_threat_level": 10.900000000000002, "timewindow": 85} +{"Format": "IDEA0", "ID": "3017b3d7-8f38-4008-9c9c-31ce934180af", "DetectTime": "2024-05-21T12:35:24.988956+00:00", "EventTime": "2024-05-21T12:35:24.988985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiARXsrpMEm0PBOzc"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5d247f92-1750-493a-963a-068a085d3b8a", "DetectTime": "2024-05-21T12:35:24.998738+00:00", "EventTime": "2024-05-21T12:35:24.998758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAqEj4t5tgorDAFF1"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "3b9c84c8-d889-48ec-8e7b-8ef109c04da7", "DetectTime": "2024-05-21T12:35:25.006649+00:00", "EventTime": "2024-05-21T12:35:25.006670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjl5aH2NcJOdKquDF2"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "961a827e-0ab4-40a2-9008-22bdb9885059", "DetectTime": "2024-05-21T12:35:25.011819+00:00", "EventTime": "2024-05-21T12:35:25.011842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7iae3oHz9gN1UVa8"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "bca34932-9a81-4af5-90e2-39452507c12f", "DetectTime": "2024-05-21T12:35:25.036351+00:00", "EventTime": "2024-05-21T12:35:25.036374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4GqlgxATIwHadW47"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "8bed4d17-e7ca-43f9-b0b2-a3758afed56d", "DetectTime": "2024-05-21T12:35:25.088010+00:00", "EventTime": "2024-05-21T12:35:25.088031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.111.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcXYuA3a8UoOxmCVW7"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b4ca06a4-13ca-4610-bae1-d06573b74f2b", "DetectTime": "2024-05-21T12:35:25.154567+00:00", "EventTime": "2024-05-21T12:35:25.154600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTFn3VHWfBFTyFoi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 85} +{"Format": "IDEA0", "ID": "6108cd16-c980-4c06-912a-063a5db55143", "DetectTime": "2024-05-21T12:35:25.204469+00:00", "EventTime": "2024-05-21T12:35:25.204491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.113.181.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHN4518YcaV7zkINd"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "9bdc680a-941c-4ce1-8854-d316a50967a6", "DetectTime": "2024-05-21T12:35:25.230768+00:00", "EventTime": "2024-05-21T12:35:25.230789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.68.167.108"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31lJ4d002jxvGVnh"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "e26b180d-48d9-4b98-b8c6-67eef70db5be", "DetectTime": "2024-05-21T12:35:25.261931+00:00", "EventTime": "2024-05-21T12:35:25.261965+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.68.167.108"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.68.167.108 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31lJ4d002jxvGVnh"], "accumulated_threat_level": 3.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "89a984c8-09c1-42dc-8c51-4cec5a95691a", "DetectTime": "2024-05-21T12:35:25.274035+00:00", "EventTime": "2024-05-21T12:35:25.274057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4rWvjDhs2hsEMJL3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 85} +{"Format": "Json", "ID": "89a984c8-09c1-42dc-8c51-4cec5a95691a", "DetectTime": "2024-05-21T12:35:25.274035+00:00", "EventTime": "2024-05-21T12:35:25.274057+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-04T12:17:44.687673+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2024/05/21 12:35:25.556101)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 85, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "d13eb697-dab0-4381-9982-18bd002fe3a6", "DetectTime": "2024-05-21T12:35:25.566052+00:00", "EventTime": "2024-05-21T12:35:25.566070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Carrv7xtVYnmms70f"], "accumulated_threat_level": 0.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "67e6f363-615b-41cf-8321-1473fe4ed5aa", "DetectTime": "2024-05-21T12:35:25.576592+00:00", "EventTime": "2024-05-21T12:35:25.576610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYrpk3lKcEAdwQpOb"], "accumulated_threat_level": 1.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "1f2ccf04-1d8b-406d-b3ed-6e984a81b04d", "DetectTime": "2024-05-21T12:35:25.586969+00:00", "EventTime": "2024-05-21T12:35:25.586987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.203.24.77"]}], "Attach": [{"Content": "Connection to unknown destination port 7236/UDP destination IP 123.203.24.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHUJl4lzgaYvYk8Sa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 85} +{"Format": "IDEA0", "ID": "351d8b5a-8940-423d-976e-a1ded71b3d9f", "DetectTime": "2024-05-21T12:35:25.597520+00:00", "EventTime": "2024-05-21T12:35:25.597538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Celmx841eJ2diGcD63"], "accumulated_threat_level": 3.2, "timewindow": 85} +{"Format": "IDEA0", "ID": "e3e1e733-1e5b-4e3a-abe5-6beaee2e21d3", "DetectTime": "2024-05-21T12:35:25.637150+00:00", "EventTime": "2024-05-21T12:35:25.637170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwAAs257wY2jotzn9"], "accumulated_threat_level": 4.0, "timewindow": 85} +{"Format": "IDEA0", "ID": "b89a98cd-89fa-46fc-8a45-392244b60574", "DetectTime": "2024-05-21T12:35:25.678619+00:00", "EventTime": "2024-05-21T12:35:25.678638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgcer2JF25rAE5vn3"], "accumulated_threat_level": 4.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "9afc86af-e5c6-4f29-9e40-522b53357412", "DetectTime": "2024-05-21T12:35:25.718508+00:00", "EventTime": "2024-05-21T12:35:25.718525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGlfcW2uIVAxkVV4"], "accumulated_threat_level": 5.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "5a712198-7080-47eb-bc6b-cc185448d8f9", "DetectTime": "2024-05-21T12:35:25.784274+00:00", "EventTime": "2024-05-21T12:35:25.784292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHSFeC3qnHxjJyjnKh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 85} +{"Format": "IDEA0", "ID": "ee1154e4-e2d3-40b1-a141-7f0300b183e9", "DetectTime": "2024-05-21T12:35:25.815501+00:00", "EventTime": "2024-05-21T12:35:25.815523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.187.96.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHSA62wOuoshOAkA8"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "133d5ba5-68c7-441b-9472-09def656f808", "DetectTime": "2024-05-21T12:35:25.848497+00:00", "EventTime": "2024-05-21T12:35:25.848516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6mPH2N7TXi5SDD7g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "c35873e1-b79e-4bef-ba00-3db764075758", "DetectTime": "2024-05-21T12:35:25.881096+00:00", "EventTime": "2024-05-21T12:35:25.881118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrZTBb4APEeBKzIu76"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b1fc621b-27d7-4316-8e03-775dacd9fde3", "DetectTime": "2024-05-21T12:35:25.921103+00:00", "EventTime": "2024-05-21T12:35:25.921122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGhgb1Kr9AXpUWCHc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "d84b5b93-ca70-4998-857c-3bc49ce77c3b", "DetectTime": "2024-05-21T12:35:25.926163+00:00", "EventTime": "2024-05-21T12:35:25.926181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHFRHQ3cpVX4ORloy8"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "8ec49ed8-0040-4c8b-90fd-648225d51c6c", "DetectTime": "2024-05-21T12:35:26.220512+00:00", "EventTime": "2024-05-21T12:35:26.220543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTh8Pz42S6wBFOk3ie"], "accumulated_threat_level": 8.799999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "f7aa552b-b14f-4f3a-8592-74ab039a74b2", "DetectTime": "2024-05-21T12:35:26.226435+00:00", "EventTime": "2024-05-21T12:35:26.226456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C090Tr43GR2df10W77"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "737e3c12-83d0-49ff-9bd4-b0e062998065", "DetectTime": "2024-05-21T12:35:26.289920+00:00", "EventTime": "2024-05-21T12:35:26.289943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUypIq1FrejBVC4did"], "accumulated_threat_level": 9.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "c68b8daf-4348-452d-b20b-822d392a4334", "DetectTime": "2024-05-21T12:35:26.328050+00:00", "EventTime": "2024-05-21T12:35:26.328072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuOmyH2VjTXoyOIR32"], "accumulated_threat_level": 10.4, "timewindow": 85} +{"Format": "IDEA0", "ID": "aa7419e1-cb2a-4115-9847-d76b73c1684f", "DetectTime": "2024-05-21T12:35:26.365284+00:00", "EventTime": "2024-05-21T12:35:26.365305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csye1Q2zv9YbxKbTr2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 85} +{"Format": "IDEA0", "ID": "e6470d21-6268-4e70-97d8-11987b292a33", "DetectTime": "2024-05-21T12:35:26.404896+00:00", "EventTime": "2024-05-21T12:35:26.404916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"]}], "Attach": [{"Content": "Connection to unknown destination port 7884/UDP destination IP 115.119.5.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJF218MPeAMTIQa92"], "accumulated_threat_level": 12.000000000000002, "timewindow": 85} +{"Format": "Json", "ID": "e6470d21-6268-4e70-97d8-11987b292a33", "DetectTime": "2024-05-21T12:35:26.404896+00:00", "EventTime": "2024-05-21T12:35:26.404916+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["115.119.5.156"]}], "Attach": [{"Content": "1970-01-04T12:18:08.464387+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2024/05/21 12:35:26.800192)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 85, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "98f48ba8-eef6-4b7d-ba8f-0293e48ed995", "DetectTime": "2024-05-21T12:35:26.810936+00:00", "EventTime": "2024-05-21T12:35:26.810955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRt1O1LJTQ6W7zJxe"], "accumulated_threat_level": 0.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "06d9cc2f-398f-4f16-a622-952ce578136f", "DetectTime": "2024-05-21T12:35:26.821173+00:00", "EventTime": "2024-05-21T12:35:26.821191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4VOs2cH1ZtS4rmX4"], "accumulated_threat_level": 1.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "bba21dc8-ba0e-43ac-89c1-3b979cd06e7d", "DetectTime": "2024-05-21T12:35:26.832267+00:00", "EventTime": "2024-05-21T12:35:26.832288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJYHOo1YAKJJftHt7h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 85} +{"Format": "IDEA0", "ID": "30f64013-b0cf-465d-9b15-4b328ce6f1b2", "DetectTime": "2024-05-21T12:35:26.936477+00:00", "EventTime": "2024-05-21T12:35:26.936498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.107.111.107"]}], "Attach": [{"Content": "Connection to unknown destination port 11174/UDP destination IP 79.107.111.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQgBexS7pNq3Ov11"], "accumulated_threat_level": 3.2, "timewindow": 85} +{"Format": "IDEA0", "ID": "5fb8daa6-eb26-4aa5-a110-27d9a88d0f6f", "DetectTime": "2024-05-21T12:35:26.949787+00:00", "EventTime": "2024-05-21T12:35:26.949807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.176.58.33"]}], "Attach": [{"Content": "Connection to unknown destination port 20193/UDP destination IP 122.176.58.33. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2ufJ1NKhSq8si3y1"], "accumulated_threat_level": 4.0, "timewindow": 85} +{"Format": "IDEA0", "ID": "99abc840-1ebc-4d3d-8b3e-f59ce7f9e6d5", "DetectTime": "2024-05-21T12:35:26.966150+00:00", "EventTime": "2024-05-21T12:35:26.966168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU4mcH1poEGo5UARKl"], "accumulated_threat_level": 4.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "99867241-ce52-42cb-8677-6f1cfd4021a2", "DetectTime": "2024-05-21T12:35:27.224433+00:00", "EventTime": "2024-05-21T12:35:27.224453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.70.98.247"]}], "Attach": [{"Content": "Connection to unknown destination port 28606/UDP destination IP 36.70.98.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVpXMirz82mkM4ai"], "accumulated_threat_level": 5.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "75595658-0c8c-41a8-993e-2b7a2067e4bf", "DetectTime": "2024-05-21T12:35:27.281299+00:00", "EventTime": "2024-05-21T12:35:27.281318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSpqL1Z2AaBQV4el"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 85} +{"Format": "IDEA0", "ID": "905f9909-9b82-46b8-ac92-b34eaaa056a2", "DetectTime": "2024-05-21T12:35:27.357237+00:00", "EventTime": "2024-05-21T12:35:27.357256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQt99gEcPmmMNpyH2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "d12cc8db-cec3-40e0-bf36-892925065478", "DetectTime": "2024-05-21T12:35:27.659155+00:00", "EventTime": "2024-05-21T12:35:27.659176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.58.15.211 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2HROP6CPQvoUlqY5"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "c46df6cf-0b91-4360-8ddc-cce39cd16cf4", "DetectTime": "2024-05-21T12:35:28.060370+00:00", "EventTime": "2024-05-21T12:35:28.060392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUaJA16Ng9FwyrmBl", "CzAPFB44nWrCVPuNph", "Cy0iko4TGvQDlRQkc4", "CtbXOJ2BOYpwrm94d7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "83113e86-987c-46ec-8163-6af3c4f65fdf", "DetectTime": "2024-05-21T12:35:28.099548+00:00", "EventTime": "2024-05-21T12:35:28.099568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.137.7.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4e6jU1rYLRVevBjN9"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "977c3708-0930-4b63-bc14-176c0d36b78d", "DetectTime": "2024-05-21T12:35:28.414647+00:00", "EventTime": "2024-05-21T12:35:28.414666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCWFxa2urHZfv741gi"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "869fff38-925f-4c89-8697-bccfabe110ff", "DetectTime": "2024-05-21T12:35:28.466228+00:00", "EventTime": "2024-05-21T12:35:28.466250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVdAD2d2naPuc17Y8"], "accumulated_threat_level": 9.3, "timewindow": 85} +{"Format": "IDEA0", "ID": "1eeb45a2-1e02-4bf7-a0dd-a738212865ba", "DetectTime": "2024-05-21T12:35:28.635024+00:00", "EventTime": "2024-05-21T12:35:28.635045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZO9C02xU20j9iEwRb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 85} +{"Format": "IDEA0", "ID": "8e3b75df-f89e-4abe-b8b0-d0bd912b94f0", "DetectTime": "2024-05-21T12:35:28.675428+00:00", "EventTime": "2024-05-21T12:35:28.675449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.64.80.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9eIs43QMzIkKIXae"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "6351cdb9-2467-4418-9ba1-6cdeb4544aa6", "DetectTime": "2024-05-21T12:35:28.710155+00:00", "EventTime": "2024-05-21T12:35:28.710174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfLZ2e3WJGiwxVLns"], "accumulated_threat_level": 10.900000000000002, "timewindow": 85} +{"Format": "IDEA0", "ID": "fbf4af3e-a965-4b22-88f2-41321ca802fe", "DetectTime": "2024-05-21T12:35:28.750446+00:00", "EventTime": "2024-05-21T12:35:28.750466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIXYDf4EAvjW1BzXw"], "accumulated_threat_level": 11.700000000000003, "timewindow": 85} +{"Format": "IDEA0", "ID": "4cb0fd7d-81ec-45b4-86d3-9adc89f7ecc5", "DetectTime": "2024-05-21T12:35:29.004304+00:00", "EventTime": "2024-05-21T12:35:29.004329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfIy5m4Dz8Stp9XqL2"], "accumulated_threat_level": 12.500000000000004, "timewindow": 85} +{"Format": "Json", "ID": "4cb0fd7d-81ec-45b4-86d3-9adc89f7ecc5", "DetectTime": "2024-05-21T12:35:29.004304+00:00", "EventTime": "2024-05-21T12:35:29.004329+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "1970-01-04T12:48:34.928153+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2024/05/21 12:35:29.228887)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 85, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "4530ca4e-e942-43ce-b042-a260597da960", "DetectTime": "2024-05-21T12:35:29.243844+00:00", "EventTime": "2024-05-21T12:35:29.243878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzlHfQRerp7ftEse"], "accumulated_threat_level": 0.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "79e28179-e22c-45e1-a56c-974b6f14afd3", "DetectTime": "2024-05-21T12:35:29.256017+00:00", "EventTime": "2024-05-21T12:35:29.256041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2xR82mfIO0TSjZ6"], "accumulated_threat_level": 1.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "e725eefe-6f68-4eea-820b-8a560ddf3d9e", "DetectTime": "2024-05-21T12:35:29.268121+00:00", "EventTime": "2024-05-21T12:35:29.268145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszsCY2wEt8C2e3Nbh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 85} +{"Format": "IDEA0", "ID": "ab67ae83-fbeb-4300-acc8-1220eb762e7b", "DetectTime": "2024-05-21T12:35:29.280371+00:00", "EventTime": "2024-05-21T12:35:29.280390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2t9eN1M8s9jAvpkqi"], "accumulated_threat_level": 3.2, "timewindow": 85} +{"Format": "IDEA0", "ID": "685d7eab-0966-4e04-b22f-608b493284c1", "DetectTime": "2024-05-21T12:35:29.291043+00:00", "EventTime": "2024-05-21T12:35:29.291062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25JmX2hbpdVbzedt1"], "accumulated_threat_level": 4.0, "timewindow": 85} +{"Format": "IDEA0", "ID": "5ce27964-02b0-4377-8f2e-0fa33312d544", "DetectTime": "2024-05-21T12:35:29.302248+00:00", "EventTime": "2024-05-21T12:35:29.302266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CngfCa2HuLl6w7xfpi"], "accumulated_threat_level": 4.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "2f7ae839-14d6-41f0-aeb5-d3f0b0b3881e", "DetectTime": "2024-05-21T12:35:29.341230+00:00", "EventTime": "2024-05-21T12:35:29.341251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.74.91.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFeQ2D37cPKt39g5Hg"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "43a855e3-9093-4287-afa5-a6f19b5afb63", "DetectTime": "2024-05-21T12:35:29.504162+00:00", "EventTime": "2024-05-21T12:35:29.504181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Cg2K3sKeOMGqdzC1"], "accumulated_threat_level": 5.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "f82ee648-e5a6-4dad-a65f-b5b222e5ed3c", "DetectTime": "2024-05-21T12:35:29.553404+00:00", "EventTime": "2024-05-21T12:35:29.553422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCkF23F1tAnIAv4s4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 85} +{"Format": "IDEA0", "ID": "5a0702d2-cd02-403b-b5c4-844174a2b9c1", "DetectTime": "2024-05-21T12:35:29.593332+00:00", "EventTime": "2024-05-21T12:35:29.593353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["103.19.249.96"]}], "Attach": [{"Content": "Connection to unknown destination port 28066/UDP destination IP 103.19.249.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wnAX3WvQhxywv0U2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "3ef82939-1acf-4a23-b6a2-d6b6d755991f", "DetectTime": "2024-05-21T12:35:29.646120+00:00", "EventTime": "2024-05-21T12:35:29.646139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCGLc4LS9Pa10mCu4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "abb8512f-ee9f-4a12-a2e4-bc0b77ab234b", "DetectTime": "2024-05-21T12:35:29.855880+00:00", "EventTime": "2024-05-21T12:35:29.855898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYNLnid9krrVwWge"], "accumulated_threat_level": 8.799999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "138edab0-8e05-4578-8c72-756bcdeb34cd", "DetectTime": "2024-05-21T12:35:29.940717+00:00", "EventTime": "2024-05-21T12:35:29.940739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAQr01hynmfLT8tfk"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "0f4ece41-ce56-464f-abf8-18e04ff1918d", "DetectTime": "2024-05-21T12:35:30.228675+00:00", "EventTime": "2024-05-21T12:35:30.228697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJYpXdBUnrgm0js1"], "accumulated_threat_level": 9.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "06dcf48b-247c-45ca-9058-9172463d0cfb", "DetectTime": "2024-05-21T12:35:30.268924+00:00", "EventTime": "2024-05-21T12:35:30.268945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CADypc4fzcGa85g3N"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b033cccd-b7d5-4833-97d0-d1b9451e84ba", "DetectTime": "2024-05-21T12:35:30.302376+00:00", "EventTime": "2024-05-21T12:35:30.302398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.68.150.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59e6cB7ZaDmOLNX7"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "4261c263-76eb-4908-9db0-62235b731bda", "DetectTime": "2024-05-21T12:35:30.815106+00:00", "EventTime": "2024-05-21T12:35:30.815126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49E2e3m7ycK6nUkv8"], "accumulated_threat_level": 10.4, "timewindow": 85} +{"Format": "IDEA0", "ID": "18034522-ec89-44d8-92ac-6c58f98a102f", "DetectTime": "2024-05-21T12:35:30.864710+00:00", "EventTime": "2024-05-21T12:35:30.864729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHau1U1NoDTPOrPUlb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 85} +{"Format": "IDEA0", "ID": "c53b80d6-fe86-45c8-957a-3e81b1d5a052", "DetectTime": "2024-05-21T12:35:30.913485+00:00", "EventTime": "2024-05-21T12:35:30.913505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWi3H3jC16PITa4m2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 85} +{"Format": "Json", "ID": "c53b80d6-fe86-45c8-957a-3e81b1d5a052", "DetectTime": "2024-05-21T12:35:30.913485+00:00", "EventTime": "2024-05-21T12:35:30.913505+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-04T12:48:55.762687+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 85. (real time 2024/05/21 12:35:31.131696)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 85, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "887897bb-b7b4-4398-b147-9c64d6baa4cc", "DetectTime": "2024-05-21T12:35:31.141381+00:00", "EventTime": "2024-05-21T12:35:31.141398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTqi3qUtPiIKjGFE5"], "accumulated_threat_level": 0.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "b4efe82d-0cbb-4fea-bcb8-a7d3e3a4fed0", "DetectTime": "2024-05-21T12:35:31.146162+00:00", "EventTime": "2024-05-21T12:35:31.146179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.181.111.224 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVchPxBtPNkqLKgj"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "e619d335-0575-48c1-9fcd-b509641bd6be", "DetectTime": "2024-05-21T12:35:31.156388+00:00", "EventTime": "2024-05-21T12:35:31.156406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQ8Vo4vBU1Yf63yK4"], "accumulated_threat_level": 1.6, "timewindow": 85} +{"Format": "IDEA0", "ID": "81cb1578-b67b-413a-8c6d-3193674a0303", "DetectTime": "2024-05-21T12:35:31.378958+00:00", "EventTime": "2024-05-21T12:35:31.378994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANxxcDETLaUfJJpl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 85} +{"Format": "IDEA0", "ID": "cab970e1-1d10-43eb-8a3b-a0a4dbf33b69", "DetectTime": "2024-05-21T12:35:31.657732+00:00", "EventTime": "2024-05-21T12:35:31.657753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.187.96.177 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXqNtU4MT9DIDp9h"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "957675d8-42cb-4149-9963-dfca70dc6665", "DetectTime": "2024-05-21T12:35:31.662666+00:00", "EventTime": "2024-05-21T12:35:31.662686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jnIu1S9FXLG6ZhPh"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b5e82434-321c-4017-b088-9422e1eeef98", "DetectTime": "2024-05-21T12:35:31.717820+00:00", "EventTime": "2024-05-21T12:35:31.717840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0bPfH1yXhtbf8P2a"], "accumulated_threat_level": 3.2, "timewindow": 85} +{"Format": "IDEA0", "ID": "e797e33c-8b1a-4e9d-8da4-4d7fded0eaec", "DetectTime": "2024-05-21T12:35:31.744825+00:00", "EventTime": "2024-05-21T12:35:31.744848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.113.181.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTG79j3nVj9PbsQMG2"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5ac3950a-bf80-4f9e-9f5d-6e8397974cef", "DetectTime": "2024-05-21T12:35:31.781838+00:00", "EventTime": "2024-05-21T12:35:31.781857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYLM842n2ppRJdXua"], "accumulated_threat_level": 4.0, "timewindow": 85} +{"Format": "IDEA0", "ID": "e7f282a4-bf2e-4f6e-9d81-863781b5bde9", "DetectTime": "2024-05-21T12:35:31.823485+00:00", "EventTime": "2024-05-21T12:35:31.823505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["119.144.23.153"]}], "Attach": [{"Content": "Connection to unknown destination port 25403/UDP destination IP 119.144.23.153. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6J5xI1krBHjGBJiMh"], "accumulated_threat_level": 4.8, "timewindow": 85} +{"Format": "IDEA0", "ID": "574a19bd-a9aa-4da8-9845-0f77d5a57f81", "DetectTime": "2024-05-21T12:35:31.880467+00:00", "EventTime": "2024-05-21T12:35:31.880486+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.235.44.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Zmb2rtUccn87Od9"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "15b9a0bb-68db-45eb-91ef-0ac736560c0e", "DetectTime": "2024-05-21T12:35:31.891663+00:00", "EventTime": "2024-05-21T12:35:31.891682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.235.44.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.235.44.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Zmb2rtUccn87Od9"], "accumulated_threat_level": 3.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "bb13bbb7-ee04-4c69-8747-4bf0c394c585", "DetectTime": "2024-05-21T12:35:32.358638+00:00", "EventTime": "2024-05-21T12:35:32.358661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmMPq290DBNQUo3b4", "Cvakdq1MyFk8Kvyl8", "C0Pjo24kgh79K0wLug", "CjZo5i3m4OCfeXH51d"], "accumulated_threat_level": 5.3, "timewindow": 85} +{"Format": "IDEA0", "ID": "88f0698e-93dc-42ba-b19b-11938d30a4dc", "DetectTime": "2024-05-21T12:35:32.380812+00:00", "EventTime": "2024-05-21T12:35:32.380832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG4zyM261lW4boM4Ue"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "588e9688-8241-4d1e-8dcf-08daf01264f1", "DetectTime": "2024-05-21T12:35:32.444335+00:00", "EventTime": "2024-05-21T12:35:32.444358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnv74syUFHicYc9si"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5f2f0fef-4f22-4ea6-a772-b057d8f6f486", "DetectTime": "2024-05-21T12:35:32.530208+00:00", "EventTime": "2024-05-21T12:35:32.530228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2OYBj4w4dQRC8Hr0c"], "accumulated_threat_level": 6.1, "timewindow": 85} +{"Format": "IDEA0", "ID": "bb2653b3-297c-43a5-bfc1-d3354dc88763", "DetectTime": "2024-05-21T12:35:32.554400+00:00", "EventTime": "2024-05-21T12:35:32.554444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXdOk1A3Jw4ASLmK7"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "2c8c5ea4-def7-4532-a58f-5f994eeb34a7", "DetectTime": "2024-05-21T12:35:32.592826+00:00", "EventTime": "2024-05-21T12:35:32.592848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwCPbi1LvzIhmX6xv5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 85} +{"Format": "IDEA0", "ID": "832215ee-22c1-4162-90f8-ad656981f71f", "DetectTime": "2024-05-21T12:35:32.879561+00:00", "EventTime": "2024-05-21T12:35:32.879595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfxYkinyAIPXO5y9"], "accumulated_threat_level": 7.699999999999999, "timewindow": 85} +{"Format": "IDEA0", "ID": "09756b16-c35c-4077-96df-513bb7fd17ce", "DetectTime": "2024-05-21T12:35:32.927778+00:00", "EventTime": "2024-05-21T12:35:32.927797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMuTE1WXQifuApprk"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "2eb8fd37-a032-42d3-9533-3f4f7c3dea12", "DetectTime": "2024-05-21T12:35:32.949736+00:00", "EventTime": "2024-05-21T12:35:32.949759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKYOdJ1DzvbbFQ7D62"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "98a2557e-4f59-4899-bda2-a494ac0c2630", "DetectTime": "2024-05-21T12:35:33.031821+00:00", "EventTime": "2024-05-21T12:35:33.031842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtnZx7DcEDlNeRfV6"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5fe361c8-b981-4633-a07d-ae81a19de862", "DetectTime": "2024-05-21T12:35:33.070203+00:00", "EventTime": "2024-05-21T12:35:33.070224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72UfL1JdVb4NT8Hif"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "a7996fe5-8411-4fa6-b7a2-88c5edf6fe32", "DetectTime": "2024-05-21T12:35:33.199220+00:00", "EventTime": "2024-05-21T12:35:33.199240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpF1KHwfD4ot81dej"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "33486164-1ce8-4e4a-8a23-f814edcf4470", "DetectTime": "2024-05-21T12:35:33.238131+00:00", "EventTime": "2024-05-21T12:35:33.238149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkNoMX20KjsQPqNgK4"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "74090c0d-f495-4d55-99d3-9559fcf4d0c8", "DetectTime": "2024-05-21T12:35:33.285466+00:00", "EventTime": "2024-05-21T12:35:33.285484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ1WU3T5vQVO60gld"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "666f1c5e-513e-4e95-a9b2-a74b8a61da32", "DetectTime": "2024-05-21T12:35:33.383440+00:00", "EventTime": "2024-05-21T12:35:33.383460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsnHUq3XvLZ6H5cYW8"], "accumulated_threat_level": 0.8, "timewindow": 86} +{"Format": "IDEA0", "ID": "8711a85b-e886-4224-9ea3-9e7339efc442", "DetectTime": "2024-05-21T12:35:33.635779+00:00", "EventTime": "2024-05-21T12:35:33.635799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZY2rH14UteZKA2fgl"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "6df166b0-c0ae-4968-ad95-53375e69ba64", "DetectTime": "2024-05-21T12:35:33.640461+00:00", "EventTime": "2024-05-21T12:35:33.640480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMRGUP2IKDGiToar56"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "c597e947-05fe-44e7-a0b9-b28f9842c7b9", "DetectTime": "2024-05-21T12:35:33.707457+00:00", "EventTime": "2024-05-21T12:35:33.707479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJAso1aC9J1MrDyHe"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "1885cdab-d5da-43e2-8304-d9ac13e09219", "DetectTime": "2024-05-21T12:35:33.869917+00:00", "EventTime": "2024-05-21T12:35:33.869941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSg6Hj2YifYfN2F7P6"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b5f0b359-07bd-4cbf-832d-b04af4fbbd19", "DetectTime": "2024-05-21T12:35:34.292046+00:00", "EventTime": "2024-05-21T12:35:34.292068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuS5kzrDegesU641"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "9160ef9f-ea86-4cd3-bc1c-2902e572a393", "DetectTime": "2024-05-21T12:35:34.392385+00:00", "EventTime": "2024-05-21T12:35:34.392405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6lQp4q17t3dqfvqk"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "15988462-f368-4327-a0c6-6e67afb31b4e", "DetectTime": "2024-05-21T12:35:34.431724+00:00", "EventTime": "2024-05-21T12:35:34.431744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cucdsq3YJZbQ0ID12a"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "2ec9f018-1e75-4284-9804-e3f92135d7b7", "DetectTime": "2024-05-21T12:35:34.481749+00:00", "EventTime": "2024-05-21T12:35:34.481768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9C2aACg340dIIbp6"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "1a4aa2bc-7e8b-4ee8-ac9f-86f4b2930501", "DetectTime": "2024-05-21T12:35:34.532158+00:00", "EventTime": "2024-05-21T12:35:34.532179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp06fA3YUX5JKkScvb"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "6ff925c3-6cbc-4922-bc3b-ab527ccc1335", "DetectTime": "2024-05-21T12:35:34.571462+00:00", "EventTime": "2024-05-21T12:35:34.571480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHjr94Vo4rNpC1ria"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "6ff65971-a1b9-4ce2-84f5-98b1c7ac2fc6", "DetectTime": "2024-05-21T12:35:34.606584+00:00", "EventTime": "2024-05-21T12:35:34.606605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.198.93.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zMCO2teWNS7jo886"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "0cd6003d-374d-4e90-a950-4de9f5604e93", "DetectTime": "2024-05-21T12:35:34.640061+00:00", "EventTime": "2024-05-21T12:35:34.640082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4qMJ1uMQMnoG7Nhb"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "c1b8a298-c5aa-4f39-9087-9a4dbd30791c", "DetectTime": "2024-05-21T12:35:34.927181+00:00", "EventTime": "2024-05-21T12:35:34.927203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.209.29.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQIjOXQHQByweiLLi"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "d3796754-ccd1-4e5f-ba5c-f793bc0582e1", "DetectTime": "2024-05-21T12:35:34.959921+00:00", "EventTime": "2024-05-21T12:35:34.959943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7tmB3X29xaMZa9Y1"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "d5a32785-97f7-4193-a593-3b138ff576f3", "DetectTime": "2024-05-21T12:35:35.033502+00:00", "EventTime": "2024-05-21T12:35:35.033525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpQKJ1rVobaijPVbh", "C4Fnkw3XlFx79RUq33", "CcRIWJ2s43lYUoLWDa", "CThHKL1XQ0OioDblRd"], "accumulated_threat_level": 1.3, "timewindow": 86} +{"Format": "IDEA0", "ID": "7f2ae923-43ab-4d08-8e26-4c0e1f2948c3", "DetectTime": "2024-05-21T12:35:35.302435+00:00", "EventTime": "2024-05-21T12:35:35.302457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdcfT1y8S6h4PusA6"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "cd419677-f273-476a-b1e3-3e67d749a56e", "DetectTime": "2024-05-21T12:35:35.489299+00:00", "EventTime": "2024-05-21T12:35:35.489320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCkKf2WRqfYx8lBs"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "260df3f3-d666-4433-953f-062e3a4f486c", "DetectTime": "2024-05-21T12:35:35.742777+00:00", "EventTime": "2024-05-21T12:35:35.742799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQObf241u7VKjeF5El"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "68284884-6165-4433-b157-714d155c7580", "DetectTime": "2024-05-21T12:35:35.782557+00:00", "EventTime": "2024-05-21T12:35:35.782577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZgMHI3xvoTHc7xgAc"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "934ec370-80de-499a-a731-e5e9ccf04452", "DetectTime": "2024-05-21T12:35:35.822296+00:00", "EventTime": "2024-05-21T12:35:35.822314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca10jR2pfv211eGwjf"], "accumulated_threat_level": 2.1, "timewindow": 86} +{"Format": "IDEA0", "ID": "5048023a-add3-4711-be76-f36dc4e2fa23", "DetectTime": "2024-05-21T12:35:35.853938+00:00", "EventTime": "2024-05-21T12:35:35.853958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxVjm1zxADTXawQKj"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "0e1b7a1c-0956-44d1-98ea-abee64626394", "DetectTime": "2024-05-21T12:35:35.913748+00:00", "EventTime": "2024-05-21T12:35:35.913770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVsk632ttxIhbVBIx1"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "518b5dc3-37e0-4dd2-bb89-60b4c5590fef", "DetectTime": "2024-05-21T12:35:35.953651+00:00", "EventTime": "2024-05-21T12:35:35.953672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBM0126cdatvVBE7i"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "ff36f736-dc6b-4a2f-b6e4-8db1ca2de682", "DetectTime": "2024-05-21T12:35:35.987233+00:00", "EventTime": "2024-05-21T12:35:35.987257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.49.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGzJZi4YTtSurkduOa"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "740edd30-ee6b-4f53-916c-762742a35a38", "DetectTime": "2024-05-21T12:35:36.020282+00:00", "EventTime": "2024-05-21T12:35:36.020302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.119.5.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gLCC2okxRVpS2RKh"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "f3ea32e3-c0a7-4c0c-946c-9bd7bdc99d8f", "DetectTime": "2024-05-21T12:35:36.052843+00:00", "EventTime": "2024-05-21T12:35:36.052864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C62tsxSRjdhuUSLm4"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "0ebb94e7-17a3-4d26-9bcd-b791b7d74aaf", "DetectTime": "2024-05-21T12:35:36.089279+00:00", "EventTime": "2024-05-21T12:35:36.089298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNcQyJ2SHtbEbV1Eg1"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "96890e22-1a27-4ad4-9c91-f5103dd70c6c", "DetectTime": "2024-05-21T12:35:36.122858+00:00", "EventTime": "2024-05-21T12:35:36.122879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIy6Zf4zOPZ3LO4lS8"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "5a7e5721-de6b-4186-b01b-2899d18a3cef", "DetectTime": "2024-05-21T12:35:36.163644+00:00", "EventTime": "2024-05-21T12:35:36.163667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwa6SX2JJc96W2Whl6"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "b2c3271f-3dc8-4ecb-9dc5-91b2fbd888be", "DetectTime": "2024-05-21T12:35:36.441252+00:00", "EventTime": "2024-05-21T12:35:36.441273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqbyo30Dlc23RDb27"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "1be82ce7-cf56-421e-bf1f-4be05467a0e6", "DetectTime": "2024-05-21T12:35:36.495476+00:00", "EventTime": "2024-05-21T12:35:36.495497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.111.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFwf82VJsYBFUoUY"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "bcb4aea7-de20-4cd2-8660-603f6a538d87", "DetectTime": "2024-05-21T12:35:36.531749+00:00", "EventTime": "2024-05-21T12:35:36.531771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRn003MjDc8mzyAH1"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "bd573e5c-a4a1-45d2-8510-a701cf406f6e", "DetectTime": "2024-05-21T12:35:36.673382+00:00", "EventTime": "2024-05-21T12:35:36.673404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUxpL1Dckbkl1ft63"], "accumulated_threat_level": 5.6, "timewindow": 84} +{"Format": "IDEA0", "ID": "535c73ed-6be7-4666-a300-f91521752768", "DetectTime": "2024-05-21T12:35:36.703803+00:00", "EventTime": "2024-05-21T12:35:36.703823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LNcv49VCyLpbEzCd"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "72979d25-3a93-4f6f-acaa-2b89192b7b19", "DetectTime": "2024-05-21T12:35:36.938742+00:00", "EventTime": "2024-05-21T12:35:36.938760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVt8A1jrSXxyAeqK3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 86} +{"Format": "IDEA0", "ID": "6bf44074-0cfd-4c60-934d-709063f08ab6", "DetectTime": "2024-05-21T12:35:36.988498+00:00", "EventTime": "2024-05-21T12:35:36.988516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0nqQ29Wi4bP7LdYi"], "accumulated_threat_level": 3.7, "timewindow": 86} +{"Format": "IDEA0", "ID": "7263c88a-8a53-42bf-801a-9f794cddacca", "DetectTime": "2024-05-21T12:35:37.075144+00:00", "EventTime": "2024-05-21T12:35:37.075163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Tp3Q4Y5YvaYMKFg"], "accumulated_threat_level": 4.5, "timewindow": 86} +{"Format": "IDEA0", "ID": "15f9e27a-92c0-4d4b-9016-376c4e4d2f12", "DetectTime": "2024-05-21T12:35:37.113183+00:00", "EventTime": "2024-05-21T12:35:37.113201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuxiSQ0mcSl5JH1j"], "accumulated_threat_level": 5.3, "timewindow": 86} +{"Format": "IDEA0", "ID": "dfa9c0f6-f2c2-4023-bd4e-73592330bfe2", "DetectTime": "2024-05-21T12:35:37.164778+00:00", "EventTime": "2024-05-21T12:35:37.164799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDq0BhQIRmxWmhnXi"], "accumulated_threat_level": 6.1, "timewindow": 86} +{"Format": "IDEA0", "ID": "f9eacdc0-56d4-454d-96d7-c9075604524c", "DetectTime": "2024-05-21T12:35:37.214071+00:00", "EventTime": "2024-05-21T12:35:37.214090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNepc9Tz4cTk78td"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 86} +{"Format": "IDEA0", "ID": "a9f62418-43c5-4565-aadd-3ee7687d12af", "DetectTime": "2024-05-21T12:35:37.476547+00:00", "EventTime": "2024-05-21T12:35:37.476566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4McsX17jkHZvLM4Sl"], "accumulated_threat_level": 7.699999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "33900b89-c6e3-4587-9e3f-84ee9f3d97c0", "DetectTime": "2024-05-21T12:35:37.738026+00:00", "EventTime": "2024-05-21T12:35:37.738045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKpOs4f8zegTeUxJd"], "accumulated_threat_level": 8.5, "timewindow": 86} +{"Format": "IDEA0", "ID": "099253cf-7892-424f-a7ed-e5aa1dca4521", "DetectTime": "2024-05-21T12:35:37.776741+00:00", "EventTime": "2024-05-21T12:35:37.776759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CapHoj25aahot9HkIl"], "accumulated_threat_level": 9.3, "timewindow": 86} +{"Format": "IDEA0", "ID": "321574ae-dc8e-49b4-a2d0-3ae7c224e863", "DetectTime": "2024-05-21T12:35:37.804931+00:00", "EventTime": "2024-05-21T12:35:37.804950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.198.93.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAB4IYt3gEFdO2kMf"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "3a67e51a-501a-4adf-9bd5-fb59c47873e1", "DetectTime": "2024-05-21T12:35:37.839389+00:00", "EventTime": "2024-05-21T12:35:37.839409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9OePctxA9IgoFqb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "6f4e0d8d-24f2-4f44-91cd-0d9625f31f55", "DetectTime": "2024-05-21T12:35:37.862087+00:00", "EventTime": "2024-05-21T12:35:37.862108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZd5TOT4l8Vn9nFc"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "3f040b30-78a5-4f61-8fd8-6a1023bc5eab", "DetectTime": "2024-05-21T12:35:37.903753+00:00", "EventTime": "2024-05-21T12:35:37.903772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9AaCIXa9aj7YEH3"], "accumulated_threat_level": 10.900000000000002, "timewindow": 86} +{"Format": "IDEA0", "ID": "460c0351-ca60-4ce3-82f7-13d60ecd789b", "DetectTime": "2024-05-21T12:35:37.941905+00:00", "EventTime": "2024-05-21T12:35:37.941923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.253.198"]}], "Attach": [{"Content": "Connection to unknown destination port 2001/UDP destination IP 176.73.253.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8tcmwKC4RpY8pEg"], "accumulated_threat_level": 11.700000000000003, "timewindow": 86} +{"Format": "IDEA0", "ID": "666b7a0c-d1d0-4af9-a6b6-8d530154234c", "DetectTime": "2024-05-21T12:35:37.962292+00:00", "EventTime": "2024-05-21T12:35:37.962310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5OHGjaMEaQPWgxt6", "CEnLP61maJlo4OtAMa", "CqqiDhWPzfRnrvXMh", "CLtmll1gvXPhXvA8M2"], "accumulated_threat_level": 12.200000000000003, "timewindow": 86} +{"Format": "Json", "ID": "666b7a0c-d1d0-4af9-a6b6-8d530154234c", "DetectTime": "2024-05-21T12:35:37.962292+00:00", "EventTime": "2024-05-21T12:35:37.962310+00:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "1970-01-04T13:22:50.216393+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2024/05/21 12:35:38.279445)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 86, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "88b676ed-ebda-4b58-a45d-146a178ca7f8", "DetectTime": "2024-05-21T12:35:38.346822+00:00", "EventTime": "2024-05-21T12:35:38.346840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.49.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQFBd2uc8597INoah"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "ef307d41-bfd3-47f3-a2bb-e7dcd11094f5", "DetectTime": "2024-05-21T12:35:38.351352+00:00", "EventTime": "2024-05-21T12:35:38.351370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFfI71IfnnA6P3at7"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "dd86150f-395a-4d7a-979b-ac2dbbbff285", "DetectTime": "2024-05-21T12:35:38.422619+00:00", "EventTime": "2024-05-21T12:35:38.422641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6DYK3YTQVXQi9Jfe"], "accumulated_threat_level": 0.8, "timewindow": 86} +{"Format": "IDEA0", "ID": "aabfc6f0-12d6-4b93-a480-b6ecf5023317", "DetectTime": "2024-05-21T12:35:38.471053+00:00", "EventTime": "2024-05-21T12:35:38.471080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0PUT2x3VnzmUbV84"], "accumulated_threat_level": 1.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "d50a7ced-9673-4bfd-80a8-46f29307ad8b", "DetectTime": "2024-05-21T12:35:38.514830+00:00", "EventTime": "2024-05-21T12:35:38.514850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7iUZP15GSnVbBahil"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 86} +{"Format": "IDEA0", "ID": "6d495cc9-83f5-4a1b-b6bd-9d5f85eaf8df", "DetectTime": "2024-05-21T12:35:38.762787+00:00", "EventTime": "2024-05-21T12:35:38.762806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwjyl4DWWyLZLi30b"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "ed674639-2461-45c0-98e8-66d198bffd21", "DetectTime": "2024-05-21T12:35:38.796976+00:00", "EventTime": "2024-05-21T12:35:38.796994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4LyO2JzGLxZnbZ29"], "accumulated_threat_level": 3.2, "timewindow": 86} +{"Format": "IDEA0", "ID": "02e8a653-badc-4df4-8eef-4f216c827d72", "DetectTime": "2024-05-21T12:35:38.834825+00:00", "EventTime": "2024-05-21T12:35:38.834842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBS7VM1K1IkOJwmi25"], "accumulated_threat_level": 4.0, "timewindow": 86} +{"Format": "IDEA0", "ID": "f0b2c00d-d1e7-43f4-ab80-6a5dff8a64db", "DetectTime": "2024-05-21T12:35:38.873663+00:00", "EventTime": "2024-05-21T12:35:38.873682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIW60s1rva0ykSLtqc"], "accumulated_threat_level": 4.8, "timewindow": 86} +{"Format": "IDEA0", "ID": "1b63076f-5d3d-4131-89ab-418af33b8a53", "DetectTime": "2024-05-21T12:35:38.901828+00:00", "EventTime": "2024-05-21T12:35:38.901849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLHvI1luHHIRilaua"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "5c2e6d3e-6800-4b2a-b08f-e0c50bf313a7", "DetectTime": "2024-05-21T12:35:38.937190+00:00", "EventTime": "2024-05-21T12:35:38.937209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5ZNP1riO8Qe2OIXe"], "accumulated_threat_level": 5.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "c56e77e5-d374-4498-a378-6c4d66e57d7a", "DetectTime": "2024-05-21T12:35:38.976352+00:00", "EventTime": "2024-05-21T12:35:38.976371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTy6wc3AV4TpX8emZh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 86} +{"Format": "IDEA0", "ID": "a778a6da-e30e-4d9d-b35a-f3ca7ae662fd", "DetectTime": "2024-05-21T12:35:39.013860+00:00", "EventTime": "2024-05-21T12:35:39.013882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["14.99.39.64"]}], "Attach": [{"Content": "Connection to unknown destination port 3969/UDP destination IP 14.99.39.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4m3e3B70zq5SPbn7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "e29f1108-593d-444b-9b53-8bf9bf57e70d", "DetectTime": "2024-05-21T12:35:39.050638+00:00", "EventTime": "2024-05-21T12:35:39.050661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EYDh4IxYWvk2P2Pl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "97253775-1d4e-499d-af20-2b68c9066457", "DetectTime": "2024-05-21T12:35:39.086993+00:00", "EventTime": "2024-05-21T12:35:39.087012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaS93X2tmVOmJRotoc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "803c37de-2ad6-46a0-b8d1-877413a13f6e", "DetectTime": "2024-05-21T12:35:39.125502+00:00", "EventTime": "2024-05-21T12:35:39.125523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGZc41lPb4fka0eBk"], "accumulated_threat_level": 9.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "d6e8e325-7630-4f0d-afdb-b4eb3e1d9843", "DetectTime": "2024-05-21T12:35:39.420573+00:00", "EventTime": "2024-05-21T12:35:39.420594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmUz31fwu0GPiphU6"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "a1df265a-f629-4e8e-81a0-245815cdff1e", "DetectTime": "2024-05-21T12:35:39.425774+00:00", "EventTime": "2024-05-21T12:35:39.425792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ueUd2di617QwNpq1"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "3dfa42ab-44e1-4bfc-8e95-5d48ab6cbfa8", "DetectTime": "2024-05-21T12:35:39.459006+00:00", "EventTime": "2024-05-21T12:35:39.459027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2C1yI2AXEXJs8hsOf"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "9b9dc7c0-838e-46d5-b6cb-4bb9df9bb336", "DetectTime": "2024-05-21T12:35:39.463805+00:00", "EventTime": "2024-05-21T12:35:39.463826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pHHu1N8BPTlR9BPd"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "4872e4cd-b3bd-4069-9eb0-c37d81606e8e", "DetectTime": "2024-05-21T12:35:39.492024+00:00", "EventTime": "2024-05-21T12:35:39.492046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COrxg34iJxjTQh48d8"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "ca908bd2-fee8-4acf-ba76-c74ca9ab9570", "DetectTime": "2024-05-21T12:35:39.544942+00:00", "EventTime": "2024-05-21T12:35:39.544966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR07LlPeZbEUUf793"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "f5127fd7-8d1b-4a03-b5d4-fcb5abe988fc", "DetectTime": "2024-05-21T12:35:39.617923+00:00", "EventTime": "2024-05-21T12:35:39.617945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQitzi4h9ZVShfI9ld"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "1e9cc25c-5e4e-4eb5-9c61-de9c0c7b9748", "DetectTime": "2024-05-21T12:35:39.622858+00:00", "EventTime": "2024-05-21T12:35:39.622878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuIpO92qjWaZN2Ivz2"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "4a83c807-62a1-4345-9397-5ac99d350d45", "DetectTime": "2024-05-21T12:35:39.679673+00:00", "EventTime": "2024-05-21T12:35:39.679694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtxDRXFx2pqf8iwub"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "982ad066-428b-4ba9-a2be-bd41e5825e33", "DetectTime": "2024-05-21T12:35:39.719832+00:00", "EventTime": "2024-05-21T12:35:39.719853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7CEL1roDPP0chTwi"], "accumulated_threat_level": 10.4, "timewindow": 86} +{"Format": "IDEA0", "ID": "c4de7f7f-5766-45ae-87b1-f8edf1816082", "DetectTime": "2024-05-21T12:35:39.759444+00:00", "EventTime": "2024-05-21T12:35:39.759465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9D5tO3siq1AdKEFs9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "d3eeb157-259d-462c-8b89-b7db15910d6e", "DetectTime": "2024-05-21T12:35:40.017582+00:00", "EventTime": "2024-05-21T12:35:40.017600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2QPO833psEW39yNgd"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "63508263-8334-44d9-9aac-90532fd91b82", "DetectTime": "2024-05-21T12:35:40.058555+00:00", "EventTime": "2024-05-21T12:35:40.058575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQlgbN3mljoYF9PH2j"], "accumulated_threat_level": 12.000000000000002, "timewindow": 86} +{"Format": "Json", "ID": "63508263-8334-44d9-9aac-90532fd91b82", "DetectTime": "2024-05-21T12:35:40.058555+00:00", "EventTime": "2024-05-21T12:35:40.058575+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "1970-01-04T13:22:50.970711+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2024/05/21 12:35:40.203509)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 86, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3b93004d-bb07-4e0c-9d0e-019f13c8756c", "DetectTime": "2024-05-21T12:35:40.217480+00:00", "EventTime": "2024-05-21T12:35:40.217497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSsJtL2zCsnp6dmAH7"], "accumulated_threat_level": 0.8, "timewindow": 86} +{"Format": "IDEA0", "ID": "aab5c36d-93eb-4338-8fa8-10ef4a59eaf4", "DetectTime": "2024-05-21T12:35:40.229835+00:00", "EventTime": "2024-05-21T12:35:40.229856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj1dcd2wvyHUYj26kj"], "accumulated_threat_level": 1.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "773a6467-af2c-49fa-a1d3-1c7c1ac5cf5b", "DetectTime": "2024-05-21T12:35:40.234663+00:00", "EventTime": "2024-05-21T12:35:40.234681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTFn3VHWfBFTyFoi"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "d537bdc0-ef7e-4576-aa54-218276fff016", "DetectTime": "2024-05-21T12:35:40.270128+00:00", "EventTime": "2024-05-21T12:35:40.270156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4rWvjDhs2hsEMJL3"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "4034ec87-0862-42c5-89ae-f8dc343af017", "DetectTime": "2024-05-21T12:35:40.512198+00:00", "EventTime": "2024-05-21T12:35:40.512217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Carrv7xtVYnmms70f"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "9942090b-942c-45a5-a1c3-bf68c0531315", "DetectTime": "2024-05-21T12:35:40.549253+00:00", "EventTime": "2024-05-21T12:35:40.549274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYrpk3lKcEAdwQpOb"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "ab89f1e3-cb5d-420c-9039-d3b8b48510ff", "DetectTime": "2024-05-21T12:35:40.588580+00:00", "EventTime": "2024-05-21T12:35:40.588602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHUJl4lzgaYvYk8Sa"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "7b91e5b0-012f-4cf0-84ea-bfb1157e08a7", "DetectTime": "2024-05-21T12:35:40.628302+00:00", "EventTime": "2024-05-21T12:35:40.628325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Celmx841eJ2diGcD63"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "41d35504-b565-4bc7-8482-14ad4dd11d30", "DetectTime": "2024-05-21T12:35:40.668536+00:00", "EventTime": "2024-05-21T12:35:40.668555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwAAs257wY2jotzn9"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "334087e7-e95d-437f-ae5d-22cc05b9cab0", "DetectTime": "2024-05-21T12:35:40.991729+00:00", "EventTime": "2024-05-21T12:35:40.991750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.209.29.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwUqgZ2kvWxZGLY15e"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "beed0da6-c451-4d46-8146-ede5af9be38a", "DetectTime": "2024-05-21T12:35:40.997363+00:00", "EventTime": "2024-05-21T12:35:40.997382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHSFeC3qnHxjJyjnKh"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "fc8105be-7a5c-4526-97f9-e638be86e7b0", "DetectTime": "2024-05-21T12:35:41.001989+00:00", "EventTime": "2024-05-21T12:35:41.002006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGlfcW2uIVAxkVV4"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "d01d47ec-c6d9-4817-b1b0-c72869ebfb89", "DetectTime": "2024-05-21T12:35:41.006584+00:00", "EventTime": "2024-05-21T12:35:41.006604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6mPH2N7TXi5SDD7g"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "fafbe790-7285-4dd3-b4fd-95ad7ec9e2d1", "DetectTime": "2024-05-21T12:35:41.094325+00:00", "EventTime": "2024-05-21T12:35:41.094343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgcer2JF25rAE5vn3"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "bffe15a4-8cb7-420b-b3f7-ba528e152239", "DetectTime": "2024-05-21T12:35:41.208910+00:00", "EventTime": "2024-05-21T12:35:41.208929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxGhgb1Kr9AXpUWCHc"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "10d1f045-3a8f-409e-b09b-90ba31c1ea78", "DetectTime": "2024-05-21T12:35:41.279222+00:00", "EventTime": "2024-05-21T12:35:41.279241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTh8Pz42S6wBFOk3ie"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "7153881d-92f5-43a3-985d-279d60c9975c", "DetectTime": "2024-05-21T12:35:41.317786+00:00", "EventTime": "2024-05-21T12:35:41.317809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUypIq1FrejBVC4did"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "657eda16-c627-4d88-8ce7-b759ef9133c2", "DetectTime": "2024-05-21T12:35:41.355333+00:00", "EventTime": "2024-05-21T12:35:41.355356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuOmyH2VjTXoyOIR32"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "fffa2f97-d217-4671-84a8-a0729dd600f9", "DetectTime": "2024-05-21T12:35:41.395354+00:00", "EventTime": "2024-05-21T12:35:41.395377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csye1Q2zv9YbxKbTr2"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "24ad620c-e9ca-48fd-ba5d-19289f1aa110", "DetectTime": "2024-05-21T12:35:41.420937+00:00", "EventTime": "2024-05-21T12:35:41.420959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjsTVV3XqVENX4waeb", "CVwT0B2rTb170ZJHOf", "CQnHapnbwdcwu01fh", "CWAbIB9gJnDH8Tuf1"], "accumulated_threat_level": 2.1, "timewindow": 86} +{"Format": "IDEA0", "ID": "075a1032-7dc4-4941-8a05-0254e3ecb8c0", "DetectTime": "2024-05-21T12:35:41.431517+00:00", "EventTime": "2024-05-21T12:35:41.431538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.119.5.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJF218MPeAMTIQa92"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "44a837d8-1503-49c5-99a5-4b0f5f46a590", "DetectTime": "2024-05-21T12:35:41.702895+00:00", "EventTime": "2024-05-21T12:35:41.702913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRt1O1LJTQ6W7zJxe"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "dc310499-4d70-4afc-8d37-10f779109631", "DetectTime": "2024-05-21T12:35:41.980904+00:00", "EventTime": "2024-05-21T12:35:41.980926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxx4672eGDC9zvaGX1"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 86} +{"Format": "IDEA0", "ID": "3f1a03a6-8b48-4f76-b0f1-6c2b05fedcee", "DetectTime": "2024-05-21T12:35:42.008251+00:00", "EventTime": "2024-05-21T12:35:42.008275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.111.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQgBexS7pNq3Ov11"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "a5946e08-e65e-4eb6-b502-3c067f1c6426", "DetectTime": "2024-05-21T12:35:42.013618+00:00", "EventTime": "2024-05-21T12:35:42.013637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJYHOo1YAKJJftHt7h"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "fd95794e-f6f0-4d01-8e76-57b16901037d", "DetectTime": "2024-05-21T12:35:42.018142+00:00", "EventTime": "2024-05-21T12:35:42.018160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4VOs2cH1ZtS4rmX4"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "f5bcec5a-8a31-4625-ab14-8956e97bfedb", "DetectTime": "2024-05-21T12:35:42.063754+00:00", "EventTime": "2024-05-21T12:35:42.063776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2ufJ1NKhSq8si3y1"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "ee84269a-91e9-4f58-b24a-d8df9bd9c71a", "DetectTime": "2024-05-21T12:35:42.135023+00:00", "EventTime": "2024-05-21T12:35:42.135041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvhNh2NwDnKnWbOA6"], "accumulated_threat_level": 3.7, "timewindow": 86} +{"Format": "IDEA0", "ID": "8aa761f7-8e8b-4436-a160-ffe6916507d0", "DetectTime": "2024-05-21T12:35:42.172655+00:00", "EventTime": "2024-05-21T12:35:42.172675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyT4YHwb5ffxzU2ok"], "accumulated_threat_level": 4.5, "timewindow": 86} +{"Format": "IDEA0", "ID": "d29ee62b-f9ef-44a2-9ca2-df69b3dc3bb5", "DetectTime": "2024-05-21T12:35:42.197577+00:00", "EventTime": "2024-05-21T12:35:42.197595+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAW6424EftiM79EKa3"], "accumulated_threat_level": 4.524, "timewindow": 86} +{"Format": "IDEA0", "ID": "5330a20b-af96-4341-b9a9-d9e29de5bab9", "DetectTime": "2024-05-21T12:35:42.210058+00:00", "EventTime": "2024-05-21T12:35:42.210077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTu8O20rs9h6GJYAl"], "accumulated_threat_level": 5.324, "timewindow": 86} +{"Format": "IDEA0", "ID": "3b751fa6-ace1-46af-8fde-52fbff6cb652", "DetectTime": "2024-05-21T12:35:42.252881+00:00", "EventTime": "2024-05-21T12:35:42.252902+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["93.109.245.154"], "Type": ["CC"]}, {"IP4": ["93.109.245.154"], "Type": ["CC"], "Port": [6596], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 93.109.245.154 port: 6596/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAW6424EftiM79EKa3"], "accumulated_threat_level": 0, "timewindow": 86} +{"Format": "IDEA0", "ID": "937bd831-9d20-45fd-8a59-f6ec69126e0a", "DetectTime": "2024-05-21T12:35:42.258145+00:00", "EventTime": "2024-05-21T12:35:42.258166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU4mcH1poEGo5UARKl"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "c492f543-636e-43d2-ba5d-974bb0d7a749", "DetectTime": "2024-05-21T12:35:42.297678+00:00", "EventTime": "2024-05-21T12:35:42.297696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl5uli3b78oy2sl45k"], "accumulated_threat_level": 6.124, "timewindow": 86} +{"Format": "IDEA0", "ID": "0729e3ef-cfd9-4b38-9257-1d296a1d2290", "DetectTime": "2024-05-21T12:35:42.315111+00:00", "EventTime": "2024-05-21T12:35:42.315128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVpXMirz82mkM4ai"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "6147108b-59b6-4a57-827b-d54573f67097", "DetectTime": "2024-05-21T12:35:42.351483+00:00", "EventTime": "2024-05-21T12:35:42.351504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrSpqL1Z2AaBQV4el"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "0b8efcef-8018-4c8a-8271-ba276e187d5b", "DetectTime": "2024-05-21T12:35:42.595353+00:00", "EventTime": "2024-05-21T12:35:42.595373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Zd273unnWp6TjhFd"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 86} +{"Format": "IDEA0", "ID": "8fef458e-3c99-4ff8-a579-8aea43b68a58", "DetectTime": "2024-05-21T12:35:42.615151+00:00", "EventTime": "2024-05-21T12:35:42.615172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQt99gEcPmmMNpyH2"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "959d574f-dc38-41a9-80e5-3bdb000cf521", "DetectTime": "2024-05-21T12:35:42.661021+00:00", "EventTime": "2024-05-21T12:35:42.661042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBaFas4Hj4kGqMzc23"], "accumulated_threat_level": 7.723999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "99e16ae0-70d9-475c-881d-5eb941431ae1", "DetectTime": "2024-05-21T12:35:42.700709+00:00", "EventTime": "2024-05-21T12:35:42.700729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfrnup2D4nmQoI3Bj1"], "accumulated_threat_level": 8.524, "timewindow": 86} +{"Format": "IDEA0", "ID": "c884218e-25f2-4d35-a9b6-999eec0f12f6", "DetectTime": "2024-05-21T12:35:42.737827+00:00", "EventTime": "2024-05-21T12:35:42.737845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRCnZ2CbXcjhsybZi"], "accumulated_threat_level": 9.324, "timewindow": 86} +{"Format": "IDEA0", "ID": "4ae187fd-c4ae-4e23-986e-93d00211069a", "DetectTime": "2024-05-21T12:35:42.777544+00:00", "EventTime": "2024-05-21T12:35:42.777564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51rNk40BhvpOgMQLd"], "accumulated_threat_level": 10.124, "timewindow": 86} +{"Format": "IDEA0", "ID": "f0eb0473-6225-4ef3-a6ac-e20661161050", "DetectTime": "2024-05-21T12:35:42.814909+00:00", "EventTime": "2024-05-21T12:35:42.814930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFZUb3Q32o4b8iV1g"], "accumulated_threat_level": 10.924000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "f4eedd69-8981-41ff-8b92-df9e3653ac6b", "DetectTime": "2024-05-21T12:35:42.855431+00:00", "EventTime": "2024-05-21T12:35:42.855450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUV974cqRNEY88j07"], "accumulated_threat_level": 11.724000000000002, "timewindow": 86} +{"Format": "IDEA0", "ID": "6406925c-d58c-45e1-a796-880be23136f9", "DetectTime": "2024-05-21T12:35:42.888648+00:00", "EventTime": "2024-05-21T12:35:42.888681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.209.29.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqik7E1Ujz1NxvNgt6"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "beb37609-bed1-4e0e-87ea-1829ab1c6f89", "DetectTime": "2024-05-21T12:35:42.927072+00:00", "EventTime": "2024-05-21T12:35:42.927090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQvhP25CcxLKZYUQd"], "accumulated_threat_level": 12.524000000000003, "timewindow": 86} +{"Format": "Json", "ID": "beb37609-bed1-4e0e-87ea-1829ab1c6f89", "DetectTime": "2024-05-21T12:35:42.927072+00:00", "EventTime": "2024-05-21T12:35:42.927090+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "1970-01-04T13:53:43.904396+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 86. (real time 2024/05/21 12:35:43.208348)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 86, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "87b0fc93-d781-44cf-b9d9-e2278437e130", "DetectTime": "2024-05-21T12:35:43.518282+00:00", "EventTime": "2024-05-21T12:35:43.518303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCWFxa2urHZfv741gi"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "dc7cf7ec-9fdc-4122-8157-a30be532ee8e", "DetectTime": "2024-05-21T12:35:43.523114+00:00", "EventTime": "2024-05-21T12:35:43.523132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVdAD2d2naPuc17Y8"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "6db08a0d-68b0-4dda-b2f4-1e593bef4cea", "DetectTime": "2024-05-21T12:35:43.527645+00:00", "EventTime": "2024-05-21T12:35:43.527666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAHv8zn5fEE65rX9"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "f0519692-5023-47a5-b07a-f0d11c3e298f", "DetectTime": "2024-05-21T12:35:43.849320+00:00", "EventTime": "2024-05-21T12:35:43.849338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHOTUa15jkihTHCPie"], "accumulated_threat_level": 0.8, "timewindow": 86} +{"Format": "IDEA0", "ID": "fd339ca1-0bf3-48b1-9aba-224d92cd9d4c", "DetectTime": "2024-05-21T12:35:43.887964+00:00", "EventTime": "2024-05-21T12:35:43.887984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZO9C02xU20j9iEwRb"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "2f574e83-121a-416d-992d-c017961bbc33", "DetectTime": "2024-05-21T12:35:43.893079+00:00", "EventTime": "2024-05-21T12:35:43.893098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfLZ2e3WJGiwxVLns"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "18bc4490-1387-4733-99ab-b19677775c01", "DetectTime": "2024-05-21T12:35:43.958942+00:00", "EventTime": "2024-05-21T12:35:43.958962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIZQgl3nTh0wINkP46"], "accumulated_threat_level": 1.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "149856cc-80a4-4440-9904-8ec11de28666", "DetectTime": "2024-05-21T12:35:43.996500+00:00", "EventTime": "2024-05-21T12:35:43.996521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIXYDf4EAvjW1BzXw"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "a7c6ec35-63e8-4881-a12e-69d945153998", "DetectTime": "2024-05-21T12:35:44.007545+00:00", "EventTime": "2024-05-21T12:35:44.007563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nlgi49uh6NlzLwX4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 86} +{"Format": "IDEA0", "ID": "a8ff7c0d-2383-4982-88b5-149611b24509", "DetectTime": "2024-05-21T12:35:44.051086+00:00", "EventTime": "2024-05-21T12:35:44.051105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfIy5m4Dz8Stp9XqL2"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "d54972b8-1e74-40c1-b9ba-38a75841ddf6", "DetectTime": "2024-05-21T12:35:44.090766+00:00", "EventTime": "2024-05-21T12:35:44.090785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NWry4djC2qRmzBr2"], "accumulated_threat_level": 3.2, "timewindow": 86} +{"Format": "IDEA0", "ID": "44f0c34a-ad46-49da-8966-c306893e8955", "DetectTime": "2024-05-21T12:35:44.112198+00:00", "EventTime": "2024-05-21T12:35:44.112219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzlHfQRerp7ftEse"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "7514389d-70ad-41b0-9c52-3a75a19a599a", "DetectTime": "2024-05-21T12:35:44.152273+00:00", "EventTime": "2024-05-21T12:35:44.152294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2xR82mfIO0TSjZ6"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "014e5236-94d2-4dd9-828a-5350cb7108c8", "DetectTime": "2024-05-21T12:35:44.405554+00:00", "EventTime": "2024-05-21T12:35:44.405575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszsCY2wEt8C2e3Nbh"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "88d71327-11b9-4494-b5bb-9570323fd987", "DetectTime": "2024-05-21T12:35:44.417628+00:00", "EventTime": "2024-05-21T12:35:44.417648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMdbo3DAEZytGGXm1"], "accumulated_threat_level": 4.0, "timewindow": 86} +{"Format": "IDEA0", "ID": "c8ad7fb7-bf75-4af7-aeef-6c711b39a93c", "DetectTime": "2024-05-21T12:35:44.472606+00:00", "EventTime": "2024-05-21T12:35:44.472629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25JmX2hbpdVbzedt1"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "1e22fb8b-c3d7-4edc-92b0-59210bb8b7bb", "DetectTime": "2024-05-21T12:35:44.505143+00:00", "EventTime": "2024-05-21T12:35:44.505163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CngfCa2HuLl6w7xfpi"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "f260672f-92dc-499e-bdc0-edb772f5bbcb", "DetectTime": "2024-05-21T12:35:44.510687+00:00", "EventTime": "2024-05-21T12:35:44.510706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2t9eN1M8s9jAvpkqi"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "2a6f8970-1e39-429f-bc3e-d32aae12297e", "DetectTime": "2024-05-21T12:35:44.581242+00:00", "EventTime": "2024-05-21T12:35:44.581263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVtlta3tZQBMidk5Ne"], "accumulated_threat_level": 4.8, "timewindow": 86} +{"Format": "IDEA0", "ID": "a5b01751-6f3c-4004-90f2-6dc370414c0f", "DetectTime": "2024-05-21T12:35:44.627397+00:00", "EventTime": "2024-05-21T12:35:44.627418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Cg2K3sKeOMGqdzC1"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "3de2e844-9a3d-463c-8a2b-24aa9726d1b9", "DetectTime": "2024-05-21T12:35:44.656305+00:00", "EventTime": "2024-05-21T12:35:44.656325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCkF23F1tAnIAv4s4"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "02374127-1c8e-4c9e-9d68-4310e640e2e0", "DetectTime": "2024-05-21T12:35:44.686833+00:00", "EventTime": "2024-05-21T12:35:44.686855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wnAX3WvQhxywv0U2"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "ff10e25a-d6e5-45ec-86ee-21449ee40020", "DetectTime": "2024-05-21T12:35:44.702946+00:00", "EventTime": "2024-05-21T12:35:44.702968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiyRKcUMvnzWEE5re"], "accumulated_threat_level": 5.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "2aa55193-5a09-40e5-b165-b1327362302c", "DetectTime": "2024-05-21T12:35:44.968115+00:00", "EventTime": "2024-05-21T12:35:44.968135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCGLc4LS9Pa10mCu4"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "2773e5e7-0dc2-4283-a024-92e90d35bc5f", "DetectTime": "2024-05-21T12:35:45.005589+00:00", "EventTime": "2024-05-21T12:35:45.005611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYNLnid9krrVwWge"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "3f601523-1ab1-471f-9f28-8fb90bffa48c", "DetectTime": "2024-05-21T12:35:45.038688+00:00", "EventTime": "2024-05-21T12:35:45.038709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwP9x2eqQsB9QgLp3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 86} +{"Format": "IDEA0", "ID": "2bdfa851-ef1b-4076-bf44-4c8a94d3e1bb", "DetectTime": "2024-05-21T12:35:45.084690+00:00", "EventTime": "2024-05-21T12:35:45.084709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.31.89.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0afl35hTzRstyquk"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "73cde81d-e459-429d-9a89-90b12b9d8cb2", "DetectTime": "2024-05-21T12:35:45.098022+00:00", "EventTime": "2024-05-21T12:35:45.098041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.31.89.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.31.89.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0afl35hTzRstyquk"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "b1f1010d-3912-4f10-8a81-6206b39dab8e", "DetectTime": "2024-05-21T12:35:45.110752+00:00", "EventTime": "2024-05-21T12:35:45.110771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzkJd1GhpgDjmrEO9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "24cac6e3-1eca-49fe-9dd1-f2528c993694", "DetectTime": "2024-05-21T12:35:45.134351+00:00", "EventTime": "2024-05-21T12:35:45.134370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQh9F3188GjiXcx2D2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "ecd58447-230d-498e-8a5f-abebc9be9773", "DetectTime": "2024-05-21T12:35:45.176488+00:00", "EventTime": "2024-05-21T12:35:45.176507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtS2og36CpjZvFU0l2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 86} +{"Format": "IDEA0", "ID": "87d4b609-b952-4818-8281-9fa24f144edb", "DetectTime": "2024-05-21T12:35:45.216324+00:00", "EventTime": "2024-05-21T12:35:45.216342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTx3jtSPkkJR2PHh5"], "accumulated_threat_level": 9.6, "timewindow": 86} +{"Format": "IDEA0", "ID": "efe6fc0b-d84d-4bad-b911-7d9101850be4", "DetectTime": "2024-05-21T12:35:45.256810+00:00", "EventTime": "2024-05-21T12:35:45.256831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYBvI44Fi9uMBolAj3"], "accumulated_threat_level": 10.4, "timewindow": 86} +{"Format": "IDEA0", "ID": "7e50bacb-cde3-434d-9d3d-02655cd18f1f", "DetectTime": "2024-05-21T12:35:45.282325+00:00", "EventTime": "2024-05-21T12:35:45.282345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJYpXdBUnrgm0js1"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "4ad54497-60f6-40f5-8669-93ec4a94ccf3", "DetectTime": "2024-05-21T12:35:45.317408+00:00", "EventTime": "2024-05-21T12:35:45.317430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCeLPO2NgT22pVO5Vd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "e7de5b0b-1815-4ef8-85f9-a2553cd7bf89", "DetectTime": "2024-05-21T12:35:45.347263+00:00", "EventTime": "2024-05-21T12:35:45.347282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.30.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hHlvvKg3cQ3dvW5"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "8faad470-3f94-4cdb-8714-546f32a213ce", "DetectTime": "2024-05-21T12:35:45.360155+00:00", "EventTime": "2024-05-21T12:35:45.360174+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.30.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.30.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hHlvvKg3cQ3dvW5"], "accumulated_threat_level": 4.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "a0602022-55f5-49bf-9cd2-a026f521a6d9", "DetectTime": "2024-05-21T12:35:45.386229+00:00", "EventTime": "2024-05-21T12:35:45.386247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2OFj1IIfBd5QFYKl"], "accumulated_threat_level": 0.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "4124c87c-aa57-4b8b-9cc3-1180b266f964", "DetectTime": "2024-05-21T12:35:45.472844+00:00", "EventTime": "2024-05-21T12:35:45.472865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdkQ41jF3HzFRFURe"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "0dbbe82f-6e09-4bb1-a492-bfaf4b70cd44", "DetectTime": "2024-05-21T12:35:45.528947+00:00", "EventTime": "2024-05-21T12:35:45.528966+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPwwf2ZU5g8eXr231"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "61bae99e-b42e-457e-81c0-1e6243c1da6f", "DetectTime": "2024-05-21T12:35:45.542049+00:00", "EventTime": "2024-05-21T12:35:45.542070+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPwwf2ZU5g8eXr231"], "accumulated_threat_level": 5.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "3d972cab-624f-4a64-90d7-0615bed4a904", "DetectTime": "2024-05-21T12:35:45.725077+00:00", "EventTime": "2024-05-21T12:35:45.725096+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmgsvo4OMUh8lP8QA2"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "680a7ea1-df19-4c3e-b9cb-e02a4239fcb3", "DetectTime": "2024-05-21T12:35:45.738258+00:00", "EventTime": "2024-05-21T12:35:45.738277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmgsvo4OMUh8lP8QA2"], "accumulated_threat_level": 5.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "90c21b20-9185-4212-936b-21879727d7ce", "DetectTime": "2024-05-21T12:35:45.843926+00:00", "EventTime": "2024-05-21T12:35:45.843947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C49E2e3m7ycK6nUkv8"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "b56ca7eb-67e9-4664-a789-4d6a20301156", "DetectTime": "2024-05-21T12:35:45.861767+00:00", "EventTime": "2024-05-21T12:35:45.861788+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaw8Z2J69n6mH1IW1"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "7b621241-e6cf-4b05-af86-43430e7a0f3e", "DetectTime": "2024-05-21T12:35:45.873992+00:00", "EventTime": "2024-05-21T12:35:45.874014+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaw8Z2J69n6mH1IW1"], "accumulated_threat_level": 6.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "99ac46c4-5028-419a-8f1a-20aa9a52b477", "DetectTime": "2024-05-21T12:35:45.909810+00:00", "EventTime": "2024-05-21T12:35:45.909833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CykAwx2fOseYoObLih", "CTxFbR3ZqhsM47inrc", "CFhr4CsVM96uEzIfh", "CsH3Cp3fe84NQ4XHF4"], "accumulated_threat_level": 1.3, "timewindow": 87} +{"Format": "IDEA0", "ID": "b20e821b-1bf8-4ba5-b79e-233e0cb62fba", "DetectTime": "2024-05-21T12:35:46.065721+00:00", "EventTime": "2024-05-21T12:35:46.065744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWi3H3jC16PITa4m2"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "0b84eef9-b681-44e8-b37e-213010a2e3a2", "DetectTime": "2024-05-21T12:35:46.071342+00:00", "EventTime": "2024-05-21T12:35:46.071364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHau1U1NoDTPOrPUlb"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "8ed7d7a4-0464-4c26-b495-5909d4f9251d", "DetectTime": "2024-05-21T12:35:46.093853+00:00", "EventTime": "2024-05-21T12:35:46.093876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTqi3qUtPiIKjGFE5"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "a00091be-21bc-484d-8c86-a8e0d285ef04", "DetectTime": "2024-05-21T12:35:46.158367+00:00", "EventTime": "2024-05-21T12:35:46.158389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQ8Vo4vBU1Yf63yK4"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "07cd150d-9731-4664-a228-7a8fa0f2dc0f", "DetectTime": "2024-05-21T12:35:46.330573+00:00", "EventTime": "2024-05-21T12:35:46.330590+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1TJra4VZbho5j4n1d"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "8da4959e-8540-4f2c-8fda-0657b32d058b", "DetectTime": "2024-05-21T12:35:46.341969+00:00", "EventTime": "2024-05-21T12:35:46.341988+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1TJra4VZbho5j4n1d"], "accumulated_threat_level": 6.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "6d506e39-7dd3-4adb-988a-d277381f4386", "DetectTime": "2024-05-21T12:35:46.511679+00:00", "EventTime": "2024-05-21T12:35:46.511700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNnu84gJdEx9p2kn1"], "accumulated_threat_level": 2.1, "timewindow": 87} +{"Format": "IDEA0", "ID": "3c34e748-30ac-47a9-b4b3-8f5c18fd5b0d", "DetectTime": "2024-05-21T12:35:46.551480+00:00", "EventTime": "2024-05-21T12:35:46.551499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8ZJM3hF4EAmQCWwh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 87} +{"Format": "IDEA0", "ID": "9e877cda-b4ae-4e55-b4e2-00bb47a1738a", "DetectTime": "2024-05-21T12:35:46.601526+00:00", "EventTime": "2024-05-21T12:35:46.601546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbEnpJD5Mzm5ly23"], "accumulated_threat_level": 3.7, "timewindow": 87} +{"Format": "IDEA0", "ID": "ee5b8254-a380-472b-871f-1a7a16f0c52f", "DetectTime": "2024-05-21T12:35:46.642854+00:00", "EventTime": "2024-05-21T12:35:46.642873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT5VB836QywVDLXvgj"], "accumulated_threat_level": 4.5, "timewindow": 87} +{"Format": "IDEA0", "ID": "de2c3a56-45d8-4f20-8966-f76a2e42aa98", "DetectTime": "2024-05-21T12:35:46.675178+00:00", "EventTime": "2024-05-21T12:35:46.675239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANxxcDETLaUfJJpl"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "71000d47-fbf5-4e4c-bb78-57dc9eae608b", "DetectTime": "2024-05-21T12:35:46.744373+00:00", "EventTime": "2024-05-21T12:35:46.744395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXfYA1ObD3HqKKXU8"], "accumulated_threat_level": 5.3, "timewindow": 87} +{"Format": "IDEA0", "ID": "5db9ccbb-42a3-4724-b337-ce851ee97e2f", "DetectTime": "2024-05-21T12:35:46.882664+00:00", "EventTime": "2024-05-21T12:35:46.882687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYLM842n2ppRJdXua"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "c29c6f9d-b1b4-49dc-aa56-4a85e270ff13", "DetectTime": "2024-05-21T12:35:46.888293+00:00", "EventTime": "2024-05-21T12:35:46.888311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0bPfH1yXhtbf8P2a"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "64050494-d803-4b8a-9751-f3556332fa80", "DetectTime": "2024-05-21T12:35:46.892710+00:00", "EventTime": "2024-05-21T12:35:46.892728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6J5xI1krBHjGBJiMh"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "b9e8d27b-e07a-45bc-9d16-39f24a918d3d", "DetectTime": "2024-05-21T12:35:46.907031+00:00", "EventTime": "2024-05-21T12:35:46.907049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLbYg1yuGsiKBXqf2"], "accumulated_threat_level": 6.1, "timewindow": 87} +{"Format": "IDEA0", "ID": "19094ef8-4147-4987-b400-d72940fefdff", "DetectTime": "2024-05-21T12:35:47.161523+00:00", "EventTime": "2024-05-21T12:35:47.161546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.119.5.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRcA7S1IwTk1dTdWva"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "63ae4810-3820-4a1c-8642-3d7f5265314d", "DetectTime": "2024-05-21T12:35:47.248206+00:00", "EventTime": "2024-05-21T12:35:47.248229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OoUk4jByzPPUcyAe"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "4db76219-bcfc-4a11-9203-3e6accfa7b0f", "DetectTime": "2024-05-21T12:35:47.280453+00:00", "EventTime": "2024-05-21T12:35:47.280473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7FQ7c3BNnLbu32eL6"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 87} +{"Format": "IDEA0", "ID": "b38ee32b-e407-49d5-9ada-e5596af70ffe", "DetectTime": "2024-05-21T12:35:47.320079+00:00", "EventTime": "2024-05-21T12:35:47.320099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.210.233.68"]}], "Attach": [{"Content": "Connection to unknown destination port 4034/UDP destination IP 178.210.233.68. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtqvKh4vYaSxGYszL3"], "accumulated_threat_level": 7.699999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "2c5fb399-6b8f-4c4b-916b-a015415cc884", "DetectTime": "2024-05-21T12:35:47.358470+00:00", "EventTime": "2024-05-21T12:35:47.358493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.56.145.220"]}], "Attach": [{"Content": "Connection to unknown destination port 7196/UDP destination IP 94.56.145.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVdRNC2lICsvL1C2"], "accumulated_threat_level": 8.5, "timewindow": 87} +{"Format": "IDEA0", "ID": "473db899-2347-434f-917b-9ac8e6e74f22", "DetectTime": "2024-05-21T12:35:47.399718+00:00", "EventTime": "2024-05-21T12:35:47.399736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAVkvMf4j4Y3Vbfrk"], "accumulated_threat_level": 9.3, "timewindow": 87} +{"Format": "IDEA0", "ID": "7af84fbe-5ae0-46d7-a130-31969b6644fc", "DetectTime": "2024-05-21T12:35:47.440054+00:00", "EventTime": "2024-05-21T12:35:47.440076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COxbxJZXyetc2jKJ2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 87} +{"Format": "IDEA0", "ID": "e7f6569f-9567-4f0f-86c9-cbcee78d4f2c", "DetectTime": "2024-05-21T12:35:47.479863+00:00", "EventTime": "2024-05-21T12:35:47.479882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnExpP2w184qMfw1Ji"], "accumulated_threat_level": 10.900000000000002, "timewindow": 87} +{"Format": "IDEA0", "ID": "4108f5e0-0850-4786-9b3d-7567ca6d06c5", "DetectTime": "2024-05-21T12:35:47.517923+00:00", "EventTime": "2024-05-21T12:35:47.517940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOMjE45P1dyrrmfu3"], "accumulated_threat_level": 11.700000000000003, "timewindow": 87} +{"Format": "IDEA0", "ID": "9e3a0b4f-2a26-4010-a2f9-a5a9c0c95536", "DetectTime": "2024-05-21T12:35:47.560128+00:00", "EventTime": "2024-05-21T12:35:47.560148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYMHw23K8diUsBKzl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 87} +{"Format": "Json", "ID": "9e3a0b4f-2a26-4010-a2f9-a5a9c0c95536", "DetectTime": "2024-05-21T12:35:47.560128+00:00", "EventTime": "2024-05-21T12:35:47.560148+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-04T14:25:58.993451+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2024/05/21 12:35:47.773343)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 87, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "09dbd94e-3db5-4954-bb9d-5fa98fc5c25e", "DetectTime": "2024-05-21T12:35:47.808860+00:00", "EventTime": "2024-05-21T12:35:47.808882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2OYBj4w4dQRC8Hr0c"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "6cb63fbe-3e53-456c-9cc1-65f5ea23eabc", "DetectTime": "2024-05-21T12:35:47.851094+00:00", "EventTime": "2024-05-21T12:35:47.851114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDZMa4fo8bO2VNrGi"], "accumulated_threat_level": 0.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "1846994d-2d95-46e2-a2f7-10168f7caa5a", "DetectTime": "2024-05-21T12:35:47.870533+00:00", "EventTime": "2024-05-21T12:35:47.870554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwCPbi1LvzIhmX6xv5"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "93150d5d-854e-42fa-b0c4-3c006301760e", "DetectTime": "2024-05-21T12:35:48.012090+00:00", "EventTime": "2024-05-21T12:35:48.012114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C618R91MYWfI4WPjZe"], "accumulated_threat_level": 1.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "0a863e99-473f-4f43-a65e-4b04ea2db8c5", "DetectTime": "2024-05-21T12:35:48.017323+00:00", "EventTime": "2024-05-21T12:35:48.017343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.111.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrHPRKKzNfU95yiol"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "09288b4c-f519-49e3-a9fe-c10083e6b9f0", "DetectTime": "2024-05-21T12:35:48.038293+00:00", "EventTime": "2024-05-21T12:35:48.038314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGfxYkinyAIPXO5y9"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "b3c1aa6e-3c58-4722-b3ec-79d66c9764fa", "DetectTime": "2024-05-21T12:35:48.046008+00:00", "EventTime": "2024-05-21T12:35:48.046032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtjvOB2nJ1FcLH81"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "fe05b448-f5d2-412b-8fb6-8a57222af572", "DetectTime": "2024-05-21T12:35:48.128480+00:00", "EventTime": "2024-05-21T12:35:48.128502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMuTE1WXQifuApprk"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "531fd4dc-3b63-4bb5-954c-37ee602b66a3", "DetectTime": "2024-05-21T12:35:48.176963+00:00", "EventTime": "2024-05-21T12:35:48.176982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6FnO73KLUtaEGcA39"], "accumulated_threat_level": 8.5, "timewindow": 85} +{"Format": "IDEA0", "ID": "44c321f5-8013-4eee-a4df-819800bc7fae", "DetectTime": "2024-05-21T12:35:48.211918+00:00", "EventTime": "2024-05-21T12:35:48.211936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeU02u2Lge2gEulu9d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 87} +{"Format": "IDEA0", "ID": "c359fa66-04b4-41f2-84cf-8b965bc1323a", "DetectTime": "2024-05-21T12:35:48.346753+00:00", "EventTime": "2024-05-21T12:35:48.346774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAo234TXS1AbmeQp3"], "accumulated_threat_level": 3.2, "timewindow": 87} +{"Format": "IDEA0", "ID": "aac5ba20-d9c2-48ca-b361-3e0c7f23408f", "DetectTime": "2024-05-21T12:35:48.602051+00:00", "EventTime": "2024-05-21T12:35:48.602072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsnHUq3XvLZ6H5cYW8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "de5aaf9a-bef5-4ee5-94d0-2ba4b8008643", "DetectTime": "2024-05-21T12:35:48.640175+00:00", "EventTime": "2024-05-21T12:35:48.640195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDILdewk2Ieoau9q2"], "accumulated_threat_level": 4.0, "timewindow": 87} +{"Format": "IDEA0", "ID": "c697c000-d362-4928-9848-2a8f72ee4940", "DetectTime": "2024-05-21T12:35:48.691184+00:00", "EventTime": "2024-05-21T12:35:48.691206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkbE33nKCKGsZLQkg"], "accumulated_threat_level": 4.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "474961ef-6442-468c-bf52-3086bbdd75f9", "DetectTime": "2024-05-21T12:35:48.788908+00:00", "EventTime": "2024-05-21T12:35:48.788926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3VmHLIPPdMLzk9V3"], "accumulated_threat_level": 5.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "02b93185-54f3-439a-a436-a9ded63a66f3", "DetectTime": "2024-05-21T12:35:48.802694+00:00", "EventTime": "2024-05-21T12:35:48.802714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFlajvX6NK7c8IL7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 87} +{"Format": "IDEA0", "ID": "1436d868-d28c-4393-89ad-a80f9f2041e6", "DetectTime": "2024-05-21T12:35:48.843573+00:00", "EventTime": "2024-05-21T12:35:48.843593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coua211ZadyfgOz8cb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "4afed741-b700-4ae8-ba42-e60ab3913a46", "DetectTime": "2024-05-21T12:35:48.882833+00:00", "EventTime": "2024-05-21T12:35:48.882855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8ydvE2PWOKzoVQb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "6d324a84-2e31-4a54-9b99-efe3aa11aae2", "DetectTime": "2024-05-21T12:35:48.924652+00:00", "EventTime": "2024-05-21T12:35:48.924672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvpH21gp9YMJTLFta"], "accumulated_threat_level": 8.799999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "8f0c48c5-a126-4699-9d0f-da2ef4c26024", "DetectTime": "2024-05-21T12:35:48.965428+00:00", "EventTime": "2024-05-21T12:35:48.965448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSxpQw42a57C0dDzFb"], "accumulated_threat_level": 9.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "fdd5ea12-5d5f-4a91-bd15-1fd7ccb2c5c7", "DetectTime": "2024-05-21T12:35:49.241304+00:00", "EventTime": "2024-05-21T12:35:49.241322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTX0Vu3c7yXkK5m983"], "accumulated_threat_level": 10.4, "timewindow": 87} +{"Format": "IDEA0", "ID": "dc420c82-0496-47f3-9e7e-e659aa8d6682", "DetectTime": "2024-05-21T12:35:49.298848+00:00", "EventTime": "2024-05-21T12:35:49.298871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6idH1NyyRpCxRA5e"], "accumulated_threat_level": 11.200000000000001, "timewindow": 87} +{"Format": "IDEA0", "ID": "eae0924c-5f03-4e46-ba65-2a4d365cbaac", "DetectTime": "2024-05-21T12:35:49.683665+00:00", "EventTime": "2024-05-21T12:35:49.683683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5Nx34bDrzGSUe5p1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 87} +{"Format": "Json", "ID": "eae0924c-5f03-4e46-ba65-2a4d365cbaac", "DetectTime": "2024-05-21T12:35:49.683665+00:00", "EventTime": "2024-05-21T12:35:49.683683+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-04T14:56:28.951283+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2024/05/21 12:35:49.855303)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 87, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e8f9e549-a64b-4a17-9ec8-285296b02cde", "DetectTime": "2024-05-21T12:35:49.860402+00:00", "EventTime": "2024-05-21T12:35:49.860425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2CpD14dtmxg62lM"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "2a280f0d-5dac-4400-8e2c-0c9b7574e831", "DetectTime": "2024-05-21T12:35:49.879470+00:00", "EventTime": "2024-05-21T12:35:49.879488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCvHq2uApQ6ciaqdg"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "d2b11c4c-491a-4a6f-9946-bd5f4a3f5800", "DetectTime": "2024-05-21T12:35:49.892460+00:00", "EventTime": "2024-05-21T12:35:49.892478+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCvHq2uApQ6ciaqdg"], "accumulated_threat_level": 7.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "5c0cf515-fb82-4de9-bdcc-534381efc605", "DetectTime": "2024-05-21T12:35:50.085361+00:00", "EventTime": "2024-05-21T12:35:50.085382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cezxb82lZzeWfd5LIj"], "accumulated_threat_level": 0.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "faa398c6-ed44-417e-af47-9906591a9372", "DetectTime": "2024-05-21T12:35:50.177817+00:00", "EventTime": "2024-05-21T12:35:50.177837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.119.5.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEBXsD8XnVzMAT4v6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "c6fa32f4-fe1b-4ba7-a8fa-69f8acf70c36", "DetectTime": "2024-05-21T12:35:50.246691+00:00", "EventTime": "2024-05-21T12:35:50.246710+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UNtx26xeDirAzo5d"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "bee0e7b1-833c-46b9-8b0f-da0eecaf5cb9", "DetectTime": "2024-05-21T12:35:50.262027+00:00", "EventTime": "2024-05-21T12:35:50.262047+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UNtx26xeDirAzo5d"], "accumulated_threat_level": 7.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "b3e57d16-94f9-4aa0-9dcf-6c655106bb17", "DetectTime": "2024-05-21T12:35:50.344274+00:00", "EventTime": "2024-05-21T12:35:50.344294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8wcL1E8bkv8XWOib"], "accumulated_threat_level": 1.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "6f411169-006f-45cf-b6a6-28049fd4d6ee", "DetectTime": "2024-05-21T12:35:50.396358+00:00", "EventTime": "2024-05-21T12:35:50.396378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqITm172uM39bvTe3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 87} +{"Format": "IDEA0", "ID": "9a391e6a-cb4d-4a1d-93d9-3eeb144f082d", "DetectTime": "2024-05-21T12:35:50.435965+00:00", "EventTime": "2024-05-21T12:35:50.435987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["219.139.20.20"]}], "Attach": [{"Content": "Connection to unknown destination port 29519/UDP destination IP 219.139.20.20. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FMXU2LtLj7ecyqh3"], "accumulated_threat_level": 3.2, "timewindow": 87} +{"Format": "IDEA0", "ID": "38048205-f311-4e3b-be0f-b9171f4209b2", "DetectTime": "2024-05-21T12:35:50.447921+00:00", "EventTime": "2024-05-21T12:35:50.447940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2C1i64jg789s3Z3n7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "fc6ea750-8caa-4b02-9e36-aeea91478077", "DetectTime": "2024-05-21T12:35:50.461909+00:00", "EventTime": "2024-05-21T12:35:50.461931+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2C1i64jg789s3Z3n7"], "accumulated_threat_level": 8.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "47e2892e-90d4-40b9-a7dc-b05229ee9628", "DetectTime": "2024-05-21T12:35:50.522356+00:00", "EventTime": "2024-05-21T12:35:50.522376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmdsHuN6vhv7VWYd"], "accumulated_threat_level": 4.0, "timewindow": 87} +{"Format": "IDEA0", "ID": "a0d98b1e-5618-49ab-b7c5-ae1d2770261a", "DetectTime": "2024-05-21T12:35:50.550618+00:00", "EventTime": "2024-05-21T12:35:50.550637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBisi3bclLAUw5Wg7"], "accumulated_threat_level": 4.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "fbdba913-455a-4690-9e12-ae8d18eb897f", "DetectTime": "2024-05-21T12:35:50.703157+00:00", "EventTime": "2024-05-21T12:35:50.703179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVj36KWdqbeq9OIrj"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "efa07cb0-6cea-463c-a227-01b8bc5662ae", "DetectTime": "2024-05-21T12:35:50.716348+00:00", "EventTime": "2024-05-21T12:35:50.716366+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVj36KWdqbeq9OIrj"], "accumulated_threat_level": 8.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "4254a864-f6e2-436e-aedf-aedf84a8002a", "DetectTime": "2024-05-21T12:35:50.854269+00:00", "EventTime": "2024-05-21T12:35:50.854290+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIAoVB332CR5Ek6a1j"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "0d4dff2e-7ec6-47cc-92a5-e6f96aeabff1", "DetectTime": "2024-05-21T12:35:50.869124+00:00", "EventTime": "2024-05-21T12:35:50.869144+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIAoVB332CR5Ek6a1j"], "accumulated_threat_level": 9.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "98d37404-c112-4463-8e68-b5564408b705", "DetectTime": "2024-05-21T12:35:50.874952+00:00", "EventTime": "2024-05-21T12:35:50.874970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca10jR2pfv211eGwjf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "b538a3a8-3f57-4892-b4e3-eba74a0ada56", "DetectTime": "2024-05-21T12:35:51.010006+00:00", "EventTime": "2024-05-21T12:35:51.010023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ETOog4HJwZfGi1d"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "5c4a196f-5a6f-4ea9-b8db-f22de1f5ea29", "DetectTime": "2024-05-21T12:35:51.021281+00:00", "EventTime": "2024-05-21T12:35:51.021299+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ETOog4HJwZfGi1d"], "accumulated_threat_level": 9.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "e1bcd4a6-1439-461d-89dd-46e9effdeacf", "DetectTime": "2024-05-21T12:35:51.109434+00:00", "EventTime": "2024-05-21T12:35:51.109456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.176.58.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBrVnPpVFVeJCZyhi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "a802992d-4e64-4e5a-a77a-614d28ca5a08", "DetectTime": "2024-05-21T12:35:51.125668+00:00", "EventTime": "2024-05-21T12:35:51.125689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 5181/TCP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSkwiAJbmM8dD0Db"], "accumulated_threat_level": 5.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "5c391318-a6ec-4de5-984b-1af78c15a6b5", "DetectTime": "2024-05-21T12:35:51.162871+00:00", "EventTime": "2024-05-21T12:35:51.162889+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8R243nrQJJKwX1kl"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ded340b3-f503-49e5-b580-45587a5a99fb", "DetectTime": "2024-05-21T12:35:51.175826+00:00", "EventTime": "2024-05-21T12:35:51.175849+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8R243nrQJJKwX1kl"], "accumulated_threat_level": 10.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "f73e79f2-46c8-4cb6-98d3-0e16e8f7c79c", "DetectTime": "2024-05-21T12:35:51.192215+00:00", "EventTime": "2024-05-21T12:35:51.192235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGigZh16xBFLE7vQ4e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 87} +{"Format": "IDEA0", "ID": "763f58fb-e2a7-4247-ba3d-0652711fad24", "DetectTime": "2024-05-21T12:35:51.247476+00:00", "EventTime": "2024-05-21T12:35:51.247498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czbah7vUO26IcDxNc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "6a3b4af9-e582-4c3d-9668-5eeb27e64e69", "DetectTime": "2024-05-21T12:35:51.289950+00:00", "EventTime": "2024-05-21T12:35:51.289972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ZxQDHjerYUaRS97"], "accumulated_threat_level": 7.999999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "8139a96c-1b11-4fc9-acb2-d1ce825abbd4", "DetectTime": "2024-05-21T12:35:51.330867+00:00", "EventTime": "2024-05-21T12:35:51.330889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XpSu4LFLDAxAVTbi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "ae61f589-ae65-4792-8486-f03d1d863966", "DetectTime": "2024-05-21T12:35:51.369362+00:00", "EventTime": "2024-05-21T12:35:51.369387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 15655/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVM0bK2t1vPuFDOX0h"], "accumulated_threat_level": 9.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "026e305d-fd91-40d4-bbc0-1ac32ec3d64a", "DetectTime": "2024-05-21T12:35:51.382972+00:00", "EventTime": "2024-05-21T12:35:51.382991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTnsc2L2mO5VoNA56"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "32c42d85-7a0d-4b81-a9a2-6a858b91c277", "DetectTime": "2024-05-21T12:35:51.394636+00:00", "EventTime": "2024-05-21T12:35:51.394655+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTnsc2L2mO5VoNA56"], "accumulated_threat_level": 10.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "4bf83b41-661b-4fde-8d93-ceb04ceb6936", "DetectTime": "2024-05-21T12:35:51.410860+00:00", "EventTime": "2024-05-21T12:35:51.410878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkezL63EcMd8qbrFyg"], "accumulated_threat_level": 10.4, "timewindow": 87} +{"Format": "IDEA0", "ID": "61cd66df-8377-4a7d-8ced-90d3c7ba9e1e", "DetectTime": "2024-05-21T12:35:51.440850+00:00", "EventTime": "2024-05-21T12:35:51.440871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.107.111.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmVIf73eS8g3EXdfw3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "9780f3c9-a57f-444d-b4ba-68038b637b12", "DetectTime": "2024-05-21T12:35:51.477866+00:00", "EventTime": "2024-05-21T12:35:51.477887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANHcJ2AmqaumfEWLa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "02329288-5614-4ef3-9849-804c4fc25a9d", "DetectTime": "2024-05-21T12:35:51.589618+00:00", "EventTime": "2024-05-21T12:35:51.589638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cReX3wRqafqiTJxd"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "0b5191c4-a2df-40f9-b1ce-9bdbeb924b8d", "DetectTime": "2024-05-21T12:35:51.601663+00:00", "EventTime": "2024-05-21T12:35:51.601681+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cReX3wRqafqiTJxd"], "accumulated_threat_level": 11.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ee12b0d3-1a18-426d-bb5e-137d485e515d", "DetectTime": "2024-05-21T12:35:51.669548+00:00", "EventTime": "2024-05-21T12:35:51.669567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5QIIu3QXVHTjxbpKj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 87} +{"Format": "IDEA0", "ID": "09668da6-75b5-4b2f-9bcb-47c01f2bc2ca", "DetectTime": "2024-05-21T12:35:51.720600+00:00", "EventTime": "2024-05-21T12:35:51.720618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD13Um41seZYN51VFj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 87} +{"Format": "Json", "ID": "09668da6-75b5-4b2f-9bcb-47c01f2bc2ca", "DetectTime": "2024-05-21T12:35:51.720600+00:00", "EventTime": "2024-05-21T12:35:51.720618+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "1970-01-04T14:57:25.901204+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 87. (real time 2024/05/21 12:35:51.926234)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 87, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4039e074-4194-40af-a38a-b442cc74e316", "DetectTime": "2024-05-21T12:35:51.937979+00:00", "EventTime": "2024-05-21T12:35:51.937998+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZloA3CBZLvYJHqp9"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "0cdae09d-6351-492f-a379-1ed2d5c613bf", "DetectTime": "2024-05-21T12:35:51.949878+00:00", "EventTime": "2024-05-21T12:35:51.949895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyZloA3CBZLvYJHqp9"], "accumulated_threat_level": 11.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "9fc08891-189a-430b-84bc-c08bd45aef2a", "DetectTime": "2024-05-21T12:35:51.963326+00:00", "EventTime": "2024-05-21T12:35:51.963345+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.49.45.200"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.49.45.200 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmAgFQVCTC1QHWwc"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "26b72d82-d83d-44d0-b186-fb992ce17904", "DetectTime": "2024-05-21T12:35:51.977927+00:00", "EventTime": "2024-05-21T12:35:51.977944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.49.45.200"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.49.45.200 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmAgFQVCTC1QHWwc"], "accumulated_threat_level": 12.0, "timewindow": 24} +{"Format": "Json", "ID": "26b72d82-d83d-44d0-b186-fb992ce17904", "DetectTime": "2024-05-21T12:35:51.977927+00:00", "EventTime": "2024-05-21T12:35:51.977944+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.49.45.200"]}], "Attach": [{"Content": "1970-01-01T23:34:59.001350+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:35:52.627195)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "ed52129f-e85a-40f2-a995-a13a1621968b", "DetectTime": "2024-05-21T12:35:52.646084+00:00", "EventTime": "2024-05-21T12:35:52.646102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["173.2.156.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 173.2.156.79 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8U1YLaId9DFtuGgg"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "7c1f5ea8-2c3b-4b93-ac01-7e24b97b9d7a", "DetectTime": "2024-05-21T12:35:52.665363+00:00", "EventTime": "2024-05-21T12:35:52.665382+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["173.2.156.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 173.2.156.79 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8U1YLaId9DFtuGgg"], "accumulated_threat_level": 0.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "58f0ef16-2c7d-4874-a98f-44cc2f106e44", "DetectTime": "2024-05-21T12:35:52.670193+00:00", "EventTime": "2024-05-21T12:35:52.670210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVt8A1jrSXxyAeqK3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "5e344041-890b-4392-89fa-c23d5fdbc22e", "DetectTime": "2024-05-21T12:35:52.681977+00:00", "EventTime": "2024-05-21T12:35:52.682000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8c1Ub3cZAZqkJCpV5"], "accumulated_threat_level": 0.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "6ea5ae8e-3bd4-4855-889f-032233f9e31b", "DetectTime": "2024-05-21T12:35:52.687255+00:00", "EventTime": "2024-05-21T12:35:52.687273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0nqQ29Wi4bP7LdYi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "414baf9e-42f5-4372-8fb8-7eb7a726a74d", "DetectTime": "2024-05-21T12:35:52.692033+00:00", "EventTime": "2024-05-21T12:35:52.692051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1ixE1NMWiJKj0mWg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "96e7efc4-bc45-486c-9f8a-58507aeb0487", "DetectTime": "2024-05-21T12:35:52.704996+00:00", "EventTime": "2024-05-21T12:35:52.705019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6zL24BIIrOrTbqV9"], "accumulated_threat_level": 1.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "5695c002-e781-4331-9816-4517d0b24709", "DetectTime": "2024-05-21T12:35:52.710504+00:00", "EventTime": "2024-05-21T12:35:52.710522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Tp3Q4Y5YvaYMKFg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "7d1f838f-7e89-4f5b-bd92-1a60cd003db0", "DetectTime": "2024-05-21T12:35:52.715664+00:00", "EventTime": "2024-05-21T12:35:52.715683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfuxiSQ0mcSl5JH1j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "323a8179-458a-4045-b003-dc3254db08b1", "DetectTime": "2024-05-21T12:35:52.720081+00:00", "EventTime": "2024-05-21T12:35:52.720099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDq0BhQIRmxWmhnXi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "501e3a95-edfe-4c47-9cba-c51c4b8590c5", "DetectTime": "2024-05-21T12:35:52.732760+00:00", "EventTime": "2024-05-21T12:35:52.732780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 24635/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGM5ZY3Vh0CjMVIaa7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 87} +{"Format": "IDEA0", "ID": "753c76c1-e329-4a7d-841c-7faec71ec557", "DetectTime": "2024-05-21T12:35:52.737669+00:00", "EventTime": "2024-05-21T12:35:52.737687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNepc9Tz4cTk78td"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "ad92e03e-ff96-4e84-be40-67e6819ee270", "DetectTime": "2024-05-21T12:35:52.748548+00:00", "EventTime": "2024-05-21T12:35:52.748566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwoFg1vVOvlXZIzKj"], "accumulated_threat_level": 3.2, "timewindow": 87} +{"Format": "IDEA0", "ID": "00fe17eb-8f62-459e-b7f2-7e9643b21c0f", "DetectTime": "2024-05-21T12:35:52.760866+00:00", "EventTime": "2024-05-21T12:35:52.760887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.27.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrDg143lrSe4SGwX4"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "540f9425-4a02-49f2-9f00-19c1382c36ea", "DetectTime": "2024-05-21T12:35:52.775182+00:00", "EventTime": "2024-05-21T12:35:52.775207+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.27.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrDg143lrSe4SGwX4"], "accumulated_threat_level": 1.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "f941e071-9f3e-411e-aa7f-3157b8dec7f6", "DetectTime": "2024-05-21T12:35:52.791141+00:00", "EventTime": "2024-05-21T12:35:52.791164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqLTFq1Al53oqYrcYh"], "accumulated_threat_level": 4.0, "timewindow": 87} +{"Format": "IDEA0", "ID": "4e09849f-f125-4ccf-9595-8ce4f35ea11f", "DetectTime": "2024-05-21T12:35:52.803711+00:00", "EventTime": "2024-05-21T12:35:52.803729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.232.196.228"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.232.196.228 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYc9h3aPMdvqHIK34"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "df8ac86e-0885-499e-9872-722985024abd", "DetectTime": "2024-05-21T12:35:52.817242+00:00", "EventTime": "2024-05-21T12:35:52.817261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.232.196.228"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.232.196.228 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYc9h3aPMdvqHIK34"], "accumulated_threat_level": 1.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "4e89821d-426c-41d4-a435-c00dcfee3e4e", "DetectTime": "2024-05-21T12:35:52.829306+00:00", "EventTime": "2024-05-21T12:35:52.829325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.235.76.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.235.76.4 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFQVB1ist6DpVP5Le"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "4faea60f-9cdc-4628-af9e-df9c4528cf6f", "DetectTime": "2024-05-21T12:35:52.841538+00:00", "EventTime": "2024-05-21T12:35:52.841557+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.235.76.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.235.76.4 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFQVB1ist6DpVP5Le"], "accumulated_threat_level": 2.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "8174cb21-c7e6-4aa1-a393-b84ba9fc3916", "DetectTime": "2024-05-21T12:35:52.852230+00:00", "EventTime": "2024-05-21T12:35:52.852247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.230.140.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.230.140.231 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDofwi23AwVFLM6GQk"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ce16d2d4-0a6d-4f84-baec-67926e34847f", "DetectTime": "2024-05-21T12:35:52.864256+00:00", "EventTime": "2024-05-21T12:35:52.864274+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.230.140.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.230.140.231 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDofwi23AwVFLM6GQk"], "accumulated_threat_level": 2.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "5cc6ef9a-5fd0-4944-9261-ea117aa498f8", "DetectTime": "2024-05-21T12:35:52.874744+00:00", "EventTime": "2024-05-21T12:35:52.874761+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.147.182.182"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.147.182.182 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RsmC4Ofn7kgENVGb"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "741fa0a9-9c3d-488f-8af2-7e6ce0558cf7", "DetectTime": "2024-05-21T12:35:52.888602+00:00", "EventTime": "2024-05-21T12:35:52.888624+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.147.182.182"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.147.182.182 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RsmC4Ofn7kgENVGb"], "accumulated_threat_level": 3.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "920f94c0-7036-4a66-a8d3-82c0bf7431e9", "DetectTime": "2024-05-21T12:35:52.902333+00:00", "EventTime": "2024-05-21T12:35:52.902352+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.130.195.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.130.195.231 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtlQ1aGkA6kAWsPJh"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "c3d58278-7ebb-42f3-a7f8-e14bdbb0e688", "DetectTime": "2024-05-21T12:35:52.917065+00:00", "EventTime": "2024-05-21T12:35:52.917087+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.130.195.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.130.195.231 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtlQ1aGkA6kAWsPJh"], "accumulated_threat_level": 3.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "fee956eb-279d-46ac-bb2e-6f734279734c", "DetectTime": "2024-05-21T12:35:52.928798+00:00", "EventTime": "2024-05-21T12:35:52.928816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDoty3nc6EASf7dUd"], "accumulated_threat_level": 4.8, "timewindow": 87} +{"Format": "IDEA0", "ID": "725575bb-ca3d-4336-a1a4-14179b3427d8", "DetectTime": "2024-05-21T12:35:52.940045+00:00", "EventTime": "2024-05-21T12:35:52.940065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.136.48.204"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.136.48.204 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXUFI3LaiKTABVYs5"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "97026094-d81f-4e1e-b1f8-6bb490ec05d6", "DetectTime": "2024-05-21T12:35:52.952684+00:00", "EventTime": "2024-05-21T12:35:52.952704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.136.48.204"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.136.48.204 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXUFI3LaiKTABVYs5"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "8f932f78-e5c1-4860-957e-1693e47a8e83", "DetectTime": "2024-05-21T12:35:52.967598+00:00", "EventTime": "2024-05-21T12:35:52.967616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHjswOWlIO73NWWc"], "accumulated_threat_level": 5.6, "timewindow": 87} +{"Format": "IDEA0", "ID": "f55ca509-de20-4e1d-9c54-18041c52aba7", "DetectTime": "2024-05-21T12:35:52.978363+00:00", "EventTime": "2024-05-21T12:35:52.978380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUkNvi95QY7VTKPb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 87} +{"Format": "IDEA0", "ID": "9091f44c-39aa-40db-a3a2-5312b0b76c70", "DetectTime": "2024-05-21T12:35:52.983324+00:00", "EventTime": "2024-05-21T12:35:52.983343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4McsX17jkHZvLM4Sl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "636b2c6a-94dc-486f-a514-d6aa015af83a", "DetectTime": "2024-05-21T12:35:52.987706+00:00", "EventTime": "2024-05-21T12:35:52.987723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COVc0w1tGovnYgbmBd", "CvOfzR6GhGHdfTQG6", "ClF8X92kHByqD5k9Cf", "C638Vb3kEe72Ba9lvj"], "accumulated_threat_level": 0.5, "timewindow": 88} +{"Format": "IDEA0", "ID": "440d54a4-4e37-402c-82d7-89a53dd6bd2e", "DetectTime": "2024-05-21T12:35:53.005924+00:00", "EventTime": "2024-05-21T12:35:53.005944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.173.238.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.173.238.41 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLDzr4Nv6t2D21zfg"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "014a5d9f-54d1-45a7-911c-ae136d149861", "DetectTime": "2024-05-21T12:35:53.020308+00:00", "EventTime": "2024-05-21T12:35:53.020326+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.173.238.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.173.238.41 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFLDzr4Nv6t2D21zfg"], "accumulated_threat_level": 4.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "f1ce3394-9e90-4ae1-8d0e-11257f00ad97", "DetectTime": "2024-05-21T12:35:53.024890+00:00", "EventTime": "2024-05-21T12:35:53.024908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKpOs4f8zegTeUxJd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "2dd48649-89f1-4b8a-b212-da3d51f41549", "DetectTime": "2024-05-21T12:35:53.035172+00:00", "EventTime": "2024-05-21T12:35:53.035189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2k0Hi1BexDS9UIUsi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "05a9bcde-74eb-4ab6-9469-4ab14d2d32ad", "DetectTime": "2024-05-21T12:35:53.040151+00:00", "EventTime": "2024-05-21T12:35:53.040169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CapHoj25aahot9HkIl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "b39cf16a-3625-4cf7-b71c-0e4d43e7ce4a", "DetectTime": "2024-05-21T12:35:53.052163+00:00", "EventTime": "2024-05-21T12:35:53.052183+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.33.151.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.33.151.168 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsyU93TrxhmAcySzl"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "54e9b652-9d40-41bc-8bdf-70fe5b480c3e", "DetectTime": "2024-05-21T12:35:53.065074+00:00", "EventTime": "2024-05-21T12:35:53.065093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.33.151.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.33.151.168 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsyU93TrxhmAcySzl"], "accumulated_threat_level": 5.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "5e87cf47-320a-45b1-bb15-e72541d2bfbe", "DetectTime": "2024-05-21T12:35:53.072857+00:00", "EventTime": "2024-05-21T12:35:53.072880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9OePctxA9IgoFqb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "b8be68bf-42ff-44a9-b688-af3aa092f6f1", "DetectTime": "2024-05-21T12:35:53.088550+00:00", "EventTime": "2024-05-21T12:35:53.088573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9AaCIXa9aj7YEH3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "e55b427f-c13f-4fac-83ba-13246255e989", "DetectTime": "2024-05-21T12:35:53.094696+00:00", "EventTime": "2024-05-21T12:35:53.094716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8tcmwKC4RpY8pEg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "c4077000-72dd-4967-af83-e81bd9e7adaf", "DetectTime": "2024-05-21T12:35:53.109217+00:00", "EventTime": "2024-05-21T12:35:53.109237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiF6qd29RPqf4xxGLd"], "accumulated_threat_level": 1.3, "timewindow": 88} +{"Format": "IDEA0", "ID": "d3791308-d156-4f1f-ab36-52cb6797b2ff", "DetectTime": "2024-05-21T12:35:53.115089+00:00", "EventTime": "2024-05-21T12:35:53.115107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7H2Rf36HoozSJGAd4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "d1a9dd61-4012-4ae7-9498-8d7c6cf343f0", "DetectTime": "2024-05-21T12:35:53.130817+00:00", "EventTime": "2024-05-21T12:35:53.130844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["39.32.142.180"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 39.32.142.180 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wL2mz5C3NsI5xqa"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "41840004-19c9-402d-b53e-3242f620986c", "DetectTime": "2024-05-21T12:35:53.146609+00:00", "EventTime": "2024-05-21T12:35:53.146631+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["39.32.142.180"]}], "Attach": [{"Content": "connection to blacklisted IP: 39.32.142.180 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wL2mz5C3NsI5xqa"], "accumulated_threat_level": 5.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "247b8758-df2a-40a4-8cb6-6ec545b78ec7", "DetectTime": "2024-05-21T12:35:53.164538+00:00", "EventTime": "2024-05-21T12:35:53.164556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.198.175.145"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.198.175.145 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLLNM3ekkQ8FUASyh"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "fa27d288-25d9-4800-88ba-1255be519bbd", "DetectTime": "2024-05-21T12:35:53.176596+00:00", "EventTime": "2024-05-21T12:35:53.176614+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.198.175.145"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.198.175.145 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLLNM3ekkQ8FUASyh"], "accumulated_threat_level": 6.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "9c45dfcd-efa2-4dd2-a47e-3ff06c888e1d", "DetectTime": "2024-05-21T12:35:53.448538+00:00", "EventTime": "2024-05-21T12:35:53.448559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6DYK3YTQVXQi9Jfe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "f4b4f661-4755-47ee-bedf-280f69a2aac8", "DetectTime": "2024-05-21T12:35:53.509696+00:00", "EventTime": "2024-05-21T12:35:53.509714+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.110.178.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.110.178.147 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZI5O1wzvaLLhGY81"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "5d2edaa9-d195-452f-a66c-3c8195f14e49", "DetectTime": "2024-05-21T12:35:53.516052+00:00", "EventTime": "2024-05-21T12:35:53.516072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0PUT2x3VnzmUbV84"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "0e94430c-f117-43e4-bb33-a54df6160f5a", "DetectTime": "2024-05-21T12:35:53.529488+00:00", "EventTime": "2024-05-21T12:35:53.529511+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.110.178.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.110.178.147 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZI5O1wzvaLLhGY81"], "accumulated_threat_level": 6.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "1d9c4842-3e9e-4e1c-809c-803e34dff999", "DetectTime": "2024-05-21T12:35:53.676517+00:00", "EventTime": "2024-05-21T12:35:53.676535+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.200.171.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.200.171.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLuQ3145nkfrcRhW7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "a1b04910-cc11-4f72-aa74-4c16d888bcd8", "DetectTime": "2024-05-21T12:35:53.688847+00:00", "EventTime": "2024-05-21T12:35:53.688871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.200.171.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.200.171.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLuQ3145nkfrcRhW7"], "accumulated_threat_level": 7.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "29c890ef-256f-4ccd-a446-6e9eefa94329", "DetectTime": "2024-05-21T12:35:53.768504+00:00", "EventTime": "2024-05-21T12:35:53.768524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7iUZP15GSnVbBahil"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "ff4a7811-4df9-4f9d-a84b-5573672f9912", "DetectTime": "2024-05-21T12:35:53.825889+00:00", "EventTime": "2024-05-21T12:35:53.825908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4LyO2JzGLxZnbZ29"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "4f7af99e-9caa-412f-a240-1e8f3726cc00", "DetectTime": "2024-05-21T12:35:53.838251+00:00", "EventTime": "2024-05-21T12:35:53.838274+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.37.223.51"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.37.223.51 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN73673LtJp9vexO0f"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "9e8a0e18-eca2-4a82-9ec6-dabbb44532f5", "DetectTime": "2024-05-21T12:35:53.852871+00:00", "EventTime": "2024-05-21T12:35:53.852891+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.37.223.51"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.37.223.51 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN73673LtJp9vexO0f"], "accumulated_threat_level": 7.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "eab7073b-f8f1-439a-9995-4bb067563f86", "DetectTime": "2024-05-21T12:35:53.865109+00:00", "EventTime": "2024-05-21T12:35:53.865128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBS7VM1K1IkOJwmi25"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "d96d060f-955f-4f65-b55a-eb2a4178cdaf", "DetectTime": "2024-05-21T12:35:53.902758+00:00", "EventTime": "2024-05-21T12:35:53.902781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIW60s1rva0ykSLtqc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "77f54d57-cc9b-498d-b7d0-a45692e420c8", "DetectTime": "2024-05-21T12:35:53.966222+00:00", "EventTime": "2024-05-21T12:35:53.966243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5ZNP1riO8Qe2OIXe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "7300f983-8ab3-4461-a40c-908bc4a046a2", "DetectTime": "2024-05-21T12:35:53.981272+00:00", "EventTime": "2024-05-21T12:35:53.981291+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.121.4.95"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.121.4.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8ne24FzGVZ6uYuYa"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "8c0e4018-6001-4af3-8504-55dfc2f7df8c", "DetectTime": "2024-05-21T12:35:53.995543+00:00", "EventTime": "2024-05-21T12:35:53.995561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.121.4.95"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.121.4.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8ne24FzGVZ6uYuYa"], "accumulated_threat_level": 8.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "77dcbb3a-e264-4faf-bbfc-409a044d2782", "DetectTime": "2024-05-21T12:35:54.007111+00:00", "EventTime": "2024-05-21T12:35:54.007129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTy6wc3AV4TpX8emZh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "38f2bf57-012e-49b1-aad6-26bdb3f0a8fe", "DetectTime": "2024-05-21T12:35:54.039343+00:00", "EventTime": "2024-05-21T12:35:54.039363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["59.149.98.57"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.149.98.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci70LN3QXgt58iBySf"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "87c4a755-1882-4e69-9531-c1cfa966e6ad", "DetectTime": "2024-05-21T12:35:54.052996+00:00", "EventTime": "2024-05-21T12:35:54.053016+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["59.149.98.57"]}], "Attach": [{"Content": "connection to blacklisted IP: 59.149.98.57 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci70LN3QXgt58iBySf"], "accumulated_threat_level": 8.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "afc2756e-97bc-4f19-bd8e-ae76a4a8b81a", "DetectTime": "2024-05-21T12:35:54.058373+00:00", "EventTime": "2024-05-21T12:35:54.058392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4m3e3B70zq5SPbn7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "eee6bfb8-f7e8-4181-9f9c-338043b79064", "DetectTime": "2024-05-21T12:35:54.077253+00:00", "EventTime": "2024-05-21T12:35:54.077274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EYDh4IxYWvk2P2Pl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "4970a0da-9503-45be-9f40-8907cea80230", "DetectTime": "2024-05-21T12:35:54.117190+00:00", "EventTime": "2024-05-21T12:35:54.117210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaS93X2tmVOmJRotoc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "fa9bdfe8-c378-4357-824f-36d243ce58b8", "DetectTime": "2024-05-21T12:35:54.211769+00:00", "EventTime": "2024-05-21T12:35:54.211788+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.232.28.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.232.28.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDbh14q1GMVjToy9a"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "cfd870d7-4b69-4de7-af47-743ffa0bb9bd", "DetectTime": "2024-05-21T12:35:54.224510+00:00", "EventTime": "2024-05-21T12:35:54.224529+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.232.28.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.232.28.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDbh14q1GMVjToy9a"], "accumulated_threat_level": 9.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "14cee458-0185-4fc5-9fc1-4a1552cfbb53", "DetectTime": "2024-05-21T12:35:54.288554+00:00", "EventTime": "2024-05-21T12:35:54.288574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.92.75.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdjj3PltpOIhM4a1"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "36f74f0b-2fc0-4c7c-aaff-5ca545b8bb31", "DetectTime": "2024-05-21T12:35:54.301029+00:00", "EventTime": "2024-05-21T12:35:54.301048+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.92.75.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdjj3PltpOIhM4a1"], "accumulated_threat_level": 9.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "555f8033-61ff-49e3-a1c8-3448914a53c8", "DetectTime": "2024-05-21T12:35:54.367037+00:00", "EventTime": "2024-05-21T12:35:54.367056+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.208.123.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgy1q3MT7a9c0YqMb"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "7348a9a2-eafa-4a7e-a03e-bab60000636b", "DetectTime": "2024-05-21T12:35:54.379160+00:00", "EventTime": "2024-05-21T12:35:54.379179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgy1q3MT7a9c0YqMb"], "accumulated_threat_level": 10.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ba628108-c20b-42c2-8875-21c13339c62e", "DetectTime": "2024-05-21T12:35:54.407399+00:00", "EventTime": "2024-05-21T12:35:54.407420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGZc41lPb4fka0eBk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "e7343356-f555-4882-bf4f-cbf7f5ed230e", "DetectTime": "2024-05-21T12:35:54.458372+00:00", "EventTime": "2024-05-21T12:35:54.458391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["49.49.17.72"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9FFVbnrP0Wz6999"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "6bc7fad3-9bf9-4b00-b51a-984fa6383a1b", "DetectTime": "2024-05-21T12:35:54.471336+00:00", "EventTime": "2024-05-21T12:35:54.471354+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9FFVbnrP0Wz6999"], "accumulated_threat_level": 10.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "2a3b1f4b-4da1-4e6b-b2c7-967a532cc26b", "DetectTime": "2024-05-21T12:35:54.481279+00:00", "EventTime": "2024-05-21T12:35:54.481300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73ktoWnuGx49DYDk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "d5d4654a-cc34-4b46-a374-bbf618514bb8", "DetectTime": "2024-05-21T12:35:54.607171+00:00", "EventTime": "2024-05-21T12:35:54.607190+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["89.214.92.208"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.214.92.208 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mdK3QLvHLmApN22"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "d502a77f-5f73-4968-ad56-28f2f304deb2", "DetectTime": "2024-05-21T12:35:54.620000+00:00", "EventTime": "2024-05-21T12:35:54.620021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["89.214.92.208"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.214.92.208 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mdK3QLvHLmApN22"], "accumulated_threat_level": 11.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "647504ac-cdfb-4435-8eb1-35e4d4059369", "DetectTime": "2024-05-21T12:35:54.629189+00:00", "EventTime": "2024-05-21T12:35:54.629207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CseI7D4mopSdisLOja"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "67443851-d0da-4544-a26f-71dd1af63fd9", "DetectTime": "2024-05-21T12:35:54.633916+00:00", "EventTime": "2024-05-21T12:35:54.633935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cak7xX2Vp9BK8UG73a", "CfYgAh4n9uGsJ9xsI5", "CEF1enPy0J9IGvUF3", "C1OGQwKZv4LeEVJre"], "accumulated_threat_level": 1.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "a1d20543-14b9-4928-9d41-959a31b47c53", "DetectTime": "2024-05-21T12:35:54.717907+00:00", "EventTime": "2024-05-21T12:35:54.717924+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.183.152"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ocSCIcNJ2FgoaH2"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "c668232c-2589-4051-bdb0-3d08d8a07259", "DetectTime": "2024-05-21T12:35:54.732733+00:00", "EventTime": "2024-05-21T12:35:54.732757+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.183.152"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ocSCIcNJ2FgoaH2"], "accumulated_threat_level": 11.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "d223a330-2aad-4e74-a172-ab495e6804cf", "DetectTime": "2024-05-21T12:35:54.754287+00:00", "EventTime": "2024-05-21T12:35:54.754316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7CEL1roDPP0chTwi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "c9de8b53-e915-4ab1-80bd-d4eb83d8b6e0", "DetectTime": "2024-05-21T12:35:54.807092+00:00", "EventTime": "2024-05-21T12:35:54.807120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxuMu2gdoJYPRl8Xc"], "accumulated_threat_level": 2.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "de7b492f-134b-46cf-bda6-2b2019fe01d3", "DetectTime": "2024-05-21T12:35:54.867239+00:00", "EventTime": "2024-05-21T12:35:54.867258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjnTu3HkkAGzloqeh"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "65ed3c21-0108-4609-aa8e-6f00b19c89be", "DetectTime": "2024-05-21T12:35:54.909377+00:00", "EventTime": "2024-05-21T12:35:54.909406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Ghoo18QtUVpViE03"], "accumulated_threat_level": 4.2, "timewindow": 88} +{"Format": "IDEA0", "ID": "79bdd534-a98a-4f30-8e25-161b07e5bf25", "DetectTime": "2024-05-21T12:35:54.956983+00:00", "EventTime": "2024-05-21T12:35:54.957004+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.148.188.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.148.188.0 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8dedzpnf5wK44yf"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "d6d4fa8e-c7be-4d49-84ce-0b3198f3b5d3", "DetectTime": "2024-05-21T12:35:54.970565+00:00", "EventTime": "2024-05-21T12:35:54.970594+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.148.188.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.148.188.0 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8dedzpnf5wK44yf"], "accumulated_threat_level": 12.0, "timewindow": 24} +{"Format": "Json", "ID": "d6d4fa8e-c7be-4d49-84ce-0b3198f3b5d3", "DetectTime": "2024-05-21T12:35:54.970565+00:00", "EventTime": "2024-05-21T12:35:54.970594+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.148.188.0"]}], "Attach": [{"Content": "1970-01-01T23:39:00.594799+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:35:55.479276)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "373e2333-f0ac-4eba-9005-5f4c56149cd9", "DetectTime": "2024-05-21T12:35:55.491803+00:00", "EventTime": "2024-05-21T12:35:55.491825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.93.140.11"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvM57Q3Zg6GO4cQfTd"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "9e9b60d3-7721-48d2-8f80-6080f20378d0", "DetectTime": "2024-05-21T12:35:55.504147+00:00", "EventTime": "2024-05-21T12:35:55.504166+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvM57Q3Zg6GO4cQfTd"], "accumulated_threat_level": 0.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "7f7b6440-c80b-4ee2-a198-d300bb54c123", "DetectTime": "2024-05-21T12:35:55.509533+00:00", "EventTime": "2024-05-21T12:35:55.509553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9D5tO3siq1AdKEFs9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "abf06f98-415e-40ae-9733-cee0ad795344", "DetectTime": "2024-05-21T12:35:55.514053+00:00", "EventTime": "2024-05-21T12:35:55.514071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQlgbN3mljoYF9PH2j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "de7abd6d-acae-4278-81e9-0f1b12baf6bc", "DetectTime": "2024-05-21T12:35:55.524772+00:00", "EventTime": "2024-05-21T12:35:55.524789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.56.253.100"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.253.100 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvuMKO3Ei7cZgrLXB1"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "1f47f8ef-20f5-45d6-b7e1-14e505cdf885", "DetectTime": "2024-05-21T12:35:55.536662+00:00", "EventTime": "2024-05-21T12:35:55.536679+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.56.253.100"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.56.253.100 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvuMKO3Ei7cZgrLXB1"], "accumulated_threat_level": 1.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "346905da-54ba-484b-8713-4ffa972a3375", "DetectTime": "2024-05-21T12:35:55.547115+00:00", "EventTime": "2024-05-21T12:35:55.547133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLQt84SYyuiiJkTVf"], "accumulated_threat_level": 5.0, "timewindow": 88} +{"Format": "IDEA0", "ID": "6cef0816-807b-4488-938a-a75cafd1e7d0", "DetectTime": "2024-05-21T12:35:55.551780+00:00", "EventTime": "2024-05-21T12:35:55.551798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSsJtL2zCsnp6dmAH7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "8e87962d-8e2b-4b48-9d2b-7f97f2dcd699", "DetectTime": "2024-05-21T12:35:55.562442+00:00", "EventTime": "2024-05-21T12:35:55.562462+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.228.145.211"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.228.145.211 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Bjj44jp2zcUN4uh7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "e2806dea-76cb-4758-9ad5-3957241d9e87", "DetectTime": "2024-05-21T12:35:55.575487+00:00", "EventTime": "2024-05-21T12:35:55.575507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.228.145.211"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.228.145.211 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Bjj44jp2zcUN4uh7"], "accumulated_threat_level": 1.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "bdda5a5e-83d7-4e15-9f5f-f5211aaf37cd", "DetectTime": "2024-05-21T12:35:55.580893+00:00", "EventTime": "2024-05-21T12:35:55.580918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj1dcd2wvyHUYj26kj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "7c115f32-fb1d-4dc1-b97b-83ccc8149eaf", "DetectTime": "2024-05-21T12:35:55.592969+00:00", "EventTime": "2024-05-21T12:35:55.592995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8hglF32B64CIW6kf1"], "accumulated_threat_level": 5.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "fc395f18-f586-43fa-8a74-d5c74f9b3ff4", "DetectTime": "2024-05-21T12:35:55.606478+00:00", "EventTime": "2024-05-21T12:35:55.606499+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJp2r2yh11na0dTb4"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ca4cd2e0-84ec-4eec-b92a-211ee16b6045", "DetectTime": "2024-05-21T12:35:55.620054+00:00", "EventTime": "2024-05-21T12:35:55.620078+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJp2r2yh11na0dTb4"], "accumulated_threat_level": 2.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "c19e95e1-cf67-4fd3-81d2-65b2d0e27b86", "DetectTime": "2024-05-21T12:35:55.638845+00:00", "EventTime": "2024-05-21T12:35:55.638866+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkZMePleTwkrTwZf"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "79bcb3f0-35fc-4545-b261-e3b6b70cf28c", "DetectTime": "2024-05-21T12:35:55.651701+00:00", "EventTime": "2024-05-21T12:35:55.651720+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkZMePleTwkrTwZf"], "accumulated_threat_level": 2.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "051b6934-1a71-47a5-ba61-83a59068a20d", "DetectTime": "2024-05-21T12:35:55.670854+00:00", "EventTime": "2024-05-21T12:35:55.670875+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs4kac3HjrZJrOcZQi"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "fbef653b-bb32-4a6a-a08d-6027aa71d586", "DetectTime": "2024-05-21T12:35:55.685158+00:00", "EventTime": "2024-05-21T12:35:55.685176+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs4kac3HjrZJrOcZQi"], "accumulated_threat_level": 3.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "5995b5f0-1b55-4ff0-a282-a5ebe62d3545", "DetectTime": "2024-05-21T12:35:55.698020+00:00", "EventTime": "2024-05-21T12:35:55.698047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVio6I3WAZyQ2PlFQd"], "accumulated_threat_level": 6.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "b42a9281-3861-4e2c-bf12-7a0b185eed9d", "DetectTime": "2024-05-21T12:35:55.711816+00:00", "EventTime": "2024-05-21T12:35:55.711835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.231.100"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.231.100 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8Tr73kF2HqE4X6xa"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "2afb0728-5ddd-4a58-aa75-363949b234ff", "DetectTime": "2024-05-21T12:35:55.725718+00:00", "EventTime": "2024-05-21T12:35:55.725747+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.231.100"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.231.100 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8Tr73kF2HqE4X6xa"], "accumulated_threat_level": 3.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "84b17cde-f8e0-44f7-8631-25af4e738432", "DetectTime": "2024-05-21T12:35:55.738226+00:00", "EventTime": "2024-05-21T12:35:55.738245+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.158.193.82"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.158.193.82 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pUrv2jbzqBqNeKsl"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "7e1e77d3-6082-4197-b3ca-cb4534f17785", "DetectTime": "2024-05-21T12:35:55.751850+00:00", "EventTime": "2024-05-21T12:35:55.751879+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.158.193.82"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.158.193.82 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pUrv2jbzqBqNeKsl"], "accumulated_threat_level": 4.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "43256524-2004-4d1f-9cd4-5afd90a8d0b6", "DetectTime": "2024-05-21T12:35:55.772039+00:00", "EventTime": "2024-05-21T12:35:55.772057+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.38.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.38.248 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbuhg4L4UBs5yPJP6"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "15108899-a8d1-4acd-9543-13623deec8ae", "DetectTime": "2024-05-21T12:35:55.785834+00:00", "EventTime": "2024-05-21T12:35:55.785859+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.38.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.38.248 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbuhg4L4UBs5yPJP6"], "accumulated_threat_level": 4.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "42868730-931d-4566-baa8-9a6e64a349b4", "DetectTime": "2024-05-21T12:35:55.846296+00:00", "EventTime": "2024-05-21T12:35:55.846318+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.193.149.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.149.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2mBzNnKFTySN9ik"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "33eea1ff-1e71-408f-b4c2-adcef99c71b6", "DetectTime": "2024-05-21T12:35:55.860066+00:00", "EventTime": "2024-05-21T12:35:55.860093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.193.149.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.193.149.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2mBzNnKFTySN9ik"], "accumulated_threat_level": 5.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "486004d0-fd98-4fe8-ae02-4f542c845962", "DetectTime": "2024-05-21T12:35:55.877977+00:00", "EventTime": "2024-05-21T12:35:55.877998+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.155.171.95"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.155.171.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kb2h1h1XOwGySLv8"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "0935af19-a310-4c52-899a-36a49148a7ed", "DetectTime": "2024-05-21T12:35:55.891370+00:00", "EventTime": "2024-05-21T12:35:55.891399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.155.171.95"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.155.171.95 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kb2h1h1XOwGySLv8"], "accumulated_threat_level": 5.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "50978e67-1868-42ef-8e40-41cf4ef464bb", "DetectTime": "2024-05-21T12:35:56.025106+00:00", "EventTime": "2024-05-21T12:35:56.025127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.233.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.233.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFEMe3agvxC8I965a"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "a84395a8-93d0-4fb0-b360-d85c01f6cdf0", "DetectTime": "2024-05-21T12:35:56.037158+00:00", "EventTime": "2024-05-21T12:35:56.037177+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.233.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.233.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFEMe3agvxC8I965a"], "accumulated_threat_level": 6.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "35a6bb22-b78e-45ea-bc94-8f1d16bcd277", "DetectTime": "2024-05-21T12:35:56.163297+00:00", "EventTime": "2024-05-21T12:35:56.163323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wbjE1Dn9f2GLeSRb"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 88} +{"Format": "IDEA0", "ID": "9f4c48b8-40bc-436c-b3ba-9be8a5c7ba30", "DetectTime": "2024-05-21T12:35:56.217820+00:00", "EventTime": "2024-05-21T12:35:56.217847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqUPblfFZCEMqz0Ee"], "accumulated_threat_level": 8.2, "timewindow": 88} +{"Format": "IDEA0", "ID": "f7b89633-d259-4381-b3a4-b9d670492e31", "DetectTime": "2024-05-21T12:35:56.269928+00:00", "EventTime": "2024-05-21T12:35:56.269947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 103.19.249.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbMuh2Md8xqVSzPpk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "47a33a7e-de67-45f6-a88d-98a2e1013d65", "DetectTime": "2024-05-21T12:35:56.306850+00:00", "EventTime": "2024-05-21T12:35:56.306868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgl8Yn3K6cXzbhYnZ8"], "accumulated_threat_level": 9.0, "timewindow": 88} +{"Format": "IDEA0", "ID": "696f1551-286a-4260-ab29-3f9b11ea410a", "DetectTime": "2024-05-21T12:35:56.415578+00:00", "EventTime": "2024-05-21T12:35:56.415598+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtlILHiFBNxG6OB7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "60be2a1a-2772-4e0b-b7c8-d13e6e2e9b6b", "DetectTime": "2024-05-21T12:35:56.428027+00:00", "EventTime": "2024-05-21T12:35:56.428045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtlILHiFBNxG6OB7"], "accumulated_threat_level": 6.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "e31bc8d5-cc3b-4b8f-8913-a02c917655b7", "DetectTime": "2024-05-21T12:35:56.497825+00:00", "EventTime": "2024-05-21T12:35:56.497847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2pYE33ItiSPHKyAn9"], "accumulated_threat_level": 9.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "ffadbcad-2a9b-4f33-83e1-4eb816942d1d", "DetectTime": "2024-05-21T12:35:56.519800+00:00", "EventTime": "2024-05-21T12:35:56.519819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.97.35.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.97.35.111 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTbx31zYBlcyzMXt1"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "1c909dea-cf02-4e4c-8965-b3378e3e0b6f", "DetectTime": "2024-05-21T12:35:56.533582+00:00", "EventTime": "2024-05-21T12:35:56.533602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.97.35.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.97.35.111 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTbx31zYBlcyzMXt1"], "accumulated_threat_level": 7.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "d823126a-5012-4f86-84b2-844b55b51bd3", "DetectTime": "2024-05-21T12:35:56.574452+00:00", "EventTime": "2024-05-21T12:35:56.574472+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.43.15.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.43.15.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNpYfU3nGfmio77B55"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "cb1b3b60-b172-4cbb-a3b8-7d4770762780", "DetectTime": "2024-05-21T12:35:56.587549+00:00", "EventTime": "2024-05-21T12:35:56.587569+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.43.15.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.43.15.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNpYfU3nGfmio77B55"], "accumulated_threat_level": 7.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "ae02a740-402f-46f7-894b-8d73967e866b", "DetectTime": "2024-05-21T12:35:56.633544+00:00", "EventTime": "2024-05-21T12:35:56.633566+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.189.51.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxIDF2QLqaDuhQ98c"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "e88f54d6-feba-427d-94ff-694c19c4979b", "DetectTime": "2024-05-21T12:35:56.647082+00:00", "EventTime": "2024-05-21T12:35:56.647107+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxIDF2QLqaDuhQ98c"], "accumulated_threat_level": 8.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "edf722f6-059a-4ce2-917f-06d68b2baba8", "DetectTime": "2024-05-21T12:35:56.716225+00:00", "EventTime": "2024-05-21T12:35:56.716245+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.104.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.104.33 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOpOZ1xSYCdRFnjV5"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "c82314ac-d9fc-49bb-8bca-ce1625655870", "DetectTime": "2024-05-21T12:35:56.729671+00:00", "EventTime": "2024-05-21T12:35:56.729692+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.104.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.104.33 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOpOZ1xSYCdRFnjV5"], "accumulated_threat_level": 8.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "50196a4a-a0c5-4b28-a0ff-677477fd9e2e", "DetectTime": "2024-05-21T12:35:56.788635+00:00", "EventTime": "2024-05-21T12:35:56.788654+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.61.30.24"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.61.30.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR6qz1y3ftQyrYh7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "aa10e3c1-b223-465e-90ba-75000c95af76", "DetectTime": "2024-05-21T12:35:56.801140+00:00", "EventTime": "2024-05-21T12:35:56.801159+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.61.30.24"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.61.30.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR6qz1y3ftQyrYh7"], "accumulated_threat_level": 9.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "81b2a648-0587-4b15-9cf9-4d2947c60875", "DetectTime": "2024-05-21T12:35:56.849013+00:00", "EventTime": "2024-05-21T12:35:56.849030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["74.89.55.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.89.55.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSadwh2MvVGwmZyFJ8"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "f5f70c59-3628-405a-8217-361bcdc14a1d", "DetectTime": "2024-05-21T12:35:56.870570+00:00", "EventTime": "2024-05-21T12:35:56.870589+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["74.89.55.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.89.55.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSadwh2MvVGwmZyFJ8"], "accumulated_threat_level": 9.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "e3fd1dd1-4d7b-4984-ad36-4e0ee27a9f36", "DetectTime": "2024-05-21T12:35:56.881085+00:00", "EventTime": "2024-05-21T12:35:56.881103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CquNdl3VMBgiZNSUog"], "accumulated_threat_level": 10.600000000000001, "timewindow": 88} +{"Format": "IDEA0", "ID": "9b47b15c-9a07-476e-a7de-8cb9caaf57b6", "DetectTime": "2024-05-21T12:35:56.894139+00:00", "EventTime": "2024-05-21T12:35:56.894160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEy8m3m144Sah3klc"], "accumulated_threat_level": 11.400000000000002, "timewindow": 88} +{"Format": "IDEA0", "ID": "7dfd7b9e-73b4-4796-a0bd-c187683d54cd", "DetectTime": "2024-05-21T12:35:56.946009+00:00", "EventTime": "2024-05-21T12:35:56.946033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Rpac3zK7tinSpjzl"], "accumulated_threat_level": 12.200000000000003, "timewindow": 88} +{"Format": "Json", "ID": "7dfd7b9e-73b4-4796-a0bd-c187683d54cd", "DetectTime": "2024-05-21T12:35:56.946009+00:00", "EventTime": "2024-05-21T12:35:56.946033+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-04T15:30:25.821127+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2024/05/21 12:35:57.191657)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 88, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "43ca73bc-d473-4c39-9904-cf603ff4200e", "DetectTime": "2024-05-21T12:35:57.204959+00:00", "EventTime": "2024-05-21T12:35:57.204977+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.37.241"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.37.241 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvhPOV8IbREMp1Ui"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ad200c86-5065-456a-9263-8a7a845e3071", "DetectTime": "2024-05-21T12:35:57.216771+00:00", "EventTime": "2024-05-21T12:35:57.216789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.37.241"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.37.241 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvhPOV8IbREMp1Ui"], "accumulated_threat_level": 10.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "dc59c03c-5231-4f8d-b092-29a4b6a0ad56", "DetectTime": "2024-05-21T12:35:57.227575+00:00", "EventTime": "2024-05-21T12:35:57.227593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqvopc4LVRskdf4sKi"], "accumulated_threat_level": 0.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "997e8cf1-1a5c-4053-b3f2-592c66b96492", "DetectTime": "2024-05-21T12:35:57.253709+00:00", "EventTime": "2024-05-21T12:35:57.253730+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.233.116.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.233.116.80 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU09eCSRUO9J60og"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "46eabe53-08a9-4bc7-909b-c49b7422c765", "DetectTime": "2024-05-21T12:35:57.267872+00:00", "EventTime": "2024-05-21T12:35:57.267893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.233.116.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.233.116.80 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU09eCSRUO9J60og"], "accumulated_threat_level": 10.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "b1e843b4-4087-4ee8-b9ec-6e4aeb9958b4", "DetectTime": "2024-05-21T12:35:57.273147+00:00", "EventTime": "2024-05-21T12:35:57.273166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxx4672eGDC9zvaGX1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "b9891baa-70f5-43d2-8477-398c73c80a79", "DetectTime": "2024-05-21T12:35:57.284858+00:00", "EventTime": "2024-05-21T12:35:57.284877+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.77.231.101"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKSsq47C5m6Vqmwje"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "c2da45ca-2462-47cd-909c-00b970912015", "DetectTime": "2024-05-21T12:35:57.296032+00:00", "EventTime": "2024-05-21T12:35:57.296052+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.77.231.101"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKSsq47C5m6Vqmwje"], "accumulated_threat_level": 11.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "2304c8a3-2192-4774-8bc0-292aa41e8927", "DetectTime": "2024-05-21T12:35:57.307761+00:00", "EventTime": "2024-05-21T12:35:57.307780+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.183.105.68"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.183.105.68 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnEwM3OBLAMEJJj46"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "dbf25d93-c5ff-486d-bb8c-362966ac98a2", "DetectTime": "2024-05-21T12:35:57.319147+00:00", "EventTime": "2024-05-21T12:35:57.319164+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.183.105.68"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.183.105.68 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnEwM3OBLAMEJJj46"], "accumulated_threat_level": 11.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "fa4ddaba-5578-4934-b11c-0ede31ff3573", "DetectTime": "2024-05-21T12:35:57.329619+00:00", "EventTime": "2024-05-21T12:35:57.329638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qWn63AvQ2wjzLeej"], "accumulated_threat_level": 1.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "c1f1930a-69ba-45a0-8f1d-8324d7c742b2", "DetectTime": "2024-05-21T12:35:57.335420+00:00", "EventTime": "2024-05-21T12:35:57.335440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvhNh2NwDnKnWbOA6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "bb46ead8-af3e-425e-b037-aad519569255", "DetectTime": "2024-05-21T12:35:57.341107+00:00", "EventTime": "2024-05-21T12:35:57.341125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTu8O20rs9h6GJYAl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "a96671a8-2551-482e-abf8-0bed9213966a", "DetectTime": "2024-05-21T12:35:57.345894+00:00", "EventTime": "2024-05-21T12:35:57.345913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyT4YHwb5ffxzU2ok"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "438b29ac-55d0-4bff-98bf-f63d466d9951", "DetectTime": "2024-05-21T12:35:57.350867+00:00", "EventTime": "2024-05-21T12:35:57.350886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 119.144.23.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbtxod2WJ2XNpz0MC6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "a41f4630-2298-4481-9cfa-6b2820b99a70", "DetectTime": "2024-05-21T12:35:57.355650+00:00", "EventTime": "2024-05-21T12:35:57.355668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAW6424EftiM79EKa3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "cdc9675c-1639-41f6-8290-ceb3e2cb50ec", "DetectTime": "2024-05-21T12:35:57.435162+00:00", "EventTime": "2024-05-21T12:35:57.435182+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.97.95.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.97.95.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwaIGd2dgLV2HA5DJf"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "709ee666-274d-40e4-95e3-eb0becea967a", "DetectTime": "2024-05-21T12:35:57.449324+00:00", "EventTime": "2024-05-21T12:35:57.449344+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.97.95.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.97.95.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwaIGd2dgLV2HA5DJf"], "accumulated_threat_level": 12.0, "timewindow": 24} +{"Format": "Json", "ID": "709ee666-274d-40e4-95e3-eb0becea967a", "DetectTime": "2024-05-21T12:35:57.449324+00:00", "EventTime": "2024-05-21T12:35:57.449344+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.97.95.18"]}], "Attach": [{"Content": "1970-01-01T23:43:09.462634+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 24. (real time 2024/05/21 12:35:58.004002)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 24, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "d87a3138-6508-46a1-9f39-f199a6d52c93", "DetectTime": "2024-05-21T12:35:58.008662+00:00", "EventTime": "2024-05-21T12:35:58.008683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl5uli3b78oy2sl45k"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "05a388d7-5c70-4c1b-a8db-05b8be7ed7e5", "DetectTime": "2024-05-21T12:35:58.021084+00:00", "EventTime": "2024-05-21T12:35:58.021105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4lCGN6mvlLKFtw13"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "1e9077fb-edb5-4b83-8cd5-ee22b8354650", "DetectTime": "2024-05-21T12:35:58.032100+00:00", "EventTime": "2024-05-21T12:35:58.032119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3ggG3lWLgIGbACJk"], "accumulated_threat_level": 3.2, "timewindow": 88} +{"Format": "IDEA0", "ID": "a5cb8090-4a59-4579-a451-3660e8af951a", "DetectTime": "2024-05-21T12:35:58.043734+00:00", "EventTime": "2024-05-21T12:35:58.043753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVXzL3JQTh9XgZN22"], "accumulated_threat_level": 4.0, "timewindow": 88} +{"Format": "IDEA0", "ID": "eb90ce5c-687e-4632-bf64-3daed641082c", "DetectTime": "2024-05-21T12:35:58.048881+00:00", "EventTime": "2024-05-21T12:35:58.048900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Zd273unnWp6TjhFd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "e079c2f4-6f62-4097-8a9c-6d9edf2aa486", "DetectTime": "2024-05-21T12:35:58.060500+00:00", "EventTime": "2024-05-21T12:35:58.060517+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.198.86.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.198.86.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuROYA2TbvZZnpBH"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "5576c53f-3f7c-4197-b1d8-bd6126b7638d", "DetectTime": "2024-05-21T12:35:58.072884+00:00", "EventTime": "2024-05-21T12:35:58.072905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.198.86.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.198.86.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuROYA2TbvZZnpBH"], "accumulated_threat_level": 0.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "bb4908c1-4bcc-4c9a-bf38-bae3795a8538", "DetectTime": "2024-05-21T12:35:58.085563+00:00", "EventTime": "2024-05-21T12:35:58.085582+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.162.78.229"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.162.78.229 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU45qF49H1eEyrkUQ7"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "e112f932-b649-40f4-b209-5c06e4266a40", "DetectTime": "2024-05-21T12:35:58.102225+00:00", "EventTime": "2024-05-21T12:35:58.102262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.162.78.229"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.162.78.229 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU45qF49H1eEyrkUQ7"], "accumulated_threat_level": 1.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "3ceb4f9f-fe40-45b8-b21f-8ffe44028a65", "DetectTime": "2024-05-21T12:35:58.115064+00:00", "EventTime": "2024-05-21T12:35:58.115102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0MS13nZEQYESwSa9"], "accumulated_threat_level": 4.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "e0fd798b-326e-487b-a155-fe988fd15b62", "DetectTime": "2024-05-21T12:35:58.128150+00:00", "EventTime": "2024-05-21T12:35:58.128173+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.176.133.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QO892cckGVPFHiP5"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "ce660cf8-13f3-49a4-b50d-00b38cac14c3", "DetectTime": "2024-05-21T12:35:58.141772+00:00", "EventTime": "2024-05-21T12:35:58.141791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.176.133.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QO892cckGVPFHiP5"], "accumulated_threat_level": 1.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "5161ef7b-be8f-4473-b5b4-2d85ec2408fd", "DetectTime": "2024-05-21T12:35:58.146916+00:00", "EventTime": "2024-05-21T12:35:58.146935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUV974cqRNEY88j07"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "2819e338-b174-4eee-a2fb-ef0728bdd504", "DetectTime": "2024-05-21T12:35:58.152149+00:00", "EventTime": "2024-05-21T12:35:58.152168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBaFas4Hj4kGqMzc23"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "d740890c-79fd-4b92-8b69-c49a889a91e6", "DetectTime": "2024-05-21T12:35:58.157760+00:00", "EventTime": "2024-05-21T12:35:58.157781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRCnZ2CbXcjhsybZi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "3e0e1326-ab9f-4f29-a482-aa2c215cb03e", "DetectTime": "2024-05-21T12:35:58.162997+00:00", "EventTime": "2024-05-21T12:35:58.163017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51rNk40BhvpOgMQLd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "cba76db4-efc5-4cb6-a723-ebd00b02a5c9", "DetectTime": "2024-05-21T12:35:58.167889+00:00", "EventTime": "2024-05-21T12:35:58.167908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfrnup2D4nmQoI3Bj1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "cda2a206-ff9e-44e1-aa8c-dae43cec3d8f", "DetectTime": "2024-05-21T12:35:58.172644+00:00", "EventTime": "2024-05-21T12:35:58.172661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFZUb3Q32o4b8iV1g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "cac9b0e2-0e30-4b9e-b5a8-2bb8dcc0db39", "DetectTime": "2024-05-21T12:35:58.184483+00:00", "EventTime": "2024-05-21T12:35:58.184502+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.91.137.209"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.91.137.209 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFNMA3OtCtypAjikj"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "b04c3260-9c40-4145-a3e9-8d9dc32345e7", "DetectTime": "2024-05-21T12:35:58.197068+00:00", "EventTime": "2024-05-21T12:35:58.197092+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.91.137.209"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.91.137.209 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFNMA3OtCtypAjikj"], "accumulated_threat_level": 2.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "b3394394-53b5-466d-bb9b-6838b805b788", "DetectTime": "2024-05-21T12:35:58.202595+00:00", "EventTime": "2024-05-21T12:35:58.202613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQvhP25CcxLKZYUQd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "6df7e062-7d39-4194-a5af-95a57ef2feb4", "DetectTime": "2024-05-21T12:35:58.219830+00:00", "EventTime": "2024-05-21T12:35:58.219848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["74.137.45.123"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.137.45.123 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgDZh825djJuleF5W8"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "867eb337-4286-4524-97b5-7e674543ef94", "DetectTime": "2024-05-21T12:35:58.237669+00:00", "EventTime": "2024-05-21T12:35:58.237687+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["74.137.45.123"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.137.45.123 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgDZh825djJuleF5W8"], "accumulated_threat_level": 2.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "d8470285-d096-467e-bf6d-3be0ebf05682", "DetectTime": "2024-05-21T12:35:58.251242+00:00", "EventTime": "2024-05-21T12:35:58.251262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.76.158.188"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.158.188 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a3EZ2teCxr4WtrJ1"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "817b7274-34d7-4602-ab37-fe4ce316ce40", "DetectTime": "2024-05-21T12:35:58.266177+00:00", "EventTime": "2024-05-21T12:35:58.266196+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.76.158.188"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.76.158.188 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a3EZ2teCxr4WtrJ1"], "accumulated_threat_level": 3.0, "timewindow": 24} +{"Format": "IDEA0", "ID": "fe573cea-b4a7-4afd-9e3c-40c6e662528f", "DetectTime": "2024-05-21T12:35:58.271460+00:00", "EventTime": "2024-05-21T12:35:58.271479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CghuaC2Cn4NPYGnFG"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "c716825d-dcbf-47d7-971a-ef24cfc949da", "DetectTime": "2024-05-21T12:35:58.282158+00:00", "EventTime": "2024-05-21T12:35:58.282176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY5QtX1Q4sZ4055cL1"], "accumulated_threat_level": 5.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "d97d6cab-6823-4eab-af14-e40b7dec16e7", "DetectTime": "2024-05-21T12:35:58.293252+00:00", "EventTime": "2024-05-21T12:35:58.293270+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.97.122.157"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.97.122.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8Q8NnLCIEc6DdQ9"], "accumulated_threat_level": 0, "timewindow": 24} +{"Format": "IDEA0", "ID": "19af4664-710b-4d47-8cec-2968ccd9a0a5", "DetectTime": "2024-05-21T12:35:58.307552+00:00", "EventTime": "2024-05-21T12:35:58.307572+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.97.122.157"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.97.122.157 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8Q8NnLCIEc6DdQ9"], "accumulated_threat_level": 3.5, "timewindow": 24} +{"Format": "IDEA0", "ID": "8c631821-bb1e-461d-a788-42d202f79b2c", "DetectTime": "2024-05-21T12:35:58.505535+00:00", "EventTime": "2024-05-21T12:35:58.505559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ2deI3Zusz05aRKhf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 88} +{"Format": "IDEA0", "ID": "bfca1138-9885-4423-b2e5-7b75fcab864a", "DetectTime": "2024-05-21T12:35:58.543444+00:00", "EventTime": "2024-05-21T12:35:58.543462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcB4HO32vW29BbeVk8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "7b40b001-fbc7-4abc-9626-d5019ff7127b", "DetectTime": "2024-05-21T12:35:58.582013+00:00", "EventTime": "2024-05-21T12:35:58.582033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWTab4iLqQfF09I5i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "759daac6-ff38-4094-8fa1-a65513214572", "DetectTime": "2024-05-21T12:35:58.621717+00:00", "EventTime": "2024-05-21T12:35:58.621738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZyFg4vO7vbGrTzMe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "b0c1e140-ba86-4b59-8306-206c95da8442", "DetectTime": "2024-05-21T12:35:58.661828+00:00", "EventTime": "2024-05-21T12:35:58.661846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzzOtJynuhd0xi1"], "accumulated_threat_level": 9.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "f9d979cb-8744-481f-9f74-24933047fa69", "DetectTime": "2024-05-21T12:35:58.704199+00:00", "EventTime": "2024-05-21T12:35:58.704217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUAWtg2cUk7y38kCm"], "accumulated_threat_level": 10.4, "timewindow": 88} +{"Format": "IDEA0", "ID": "38db8eb8-e227-4df7-951a-b9c7e6ecfcf2", "DetectTime": "2024-05-21T12:35:58.741435+00:00", "EventTime": "2024-05-21T12:35:58.741454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqDEj45W4UCiGJMK"], "accumulated_threat_level": 11.200000000000001, "timewindow": 88} +{"Format": "IDEA0", "ID": "2c9a5f94-b32a-4fe9-871e-917fa8289988", "DetectTime": "2024-05-21T12:35:58.781506+00:00", "EventTime": "2024-05-21T12:35:58.781524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "Connection to unknown destination port 17939/UDP destination IP 109.127.20.14. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBn0p02mgVYoWpJ233"], "accumulated_threat_level": 12.000000000000002, "timewindow": 88} +{"Format": "Json", "ID": "2c9a5f94-b32a-4fe9-871e-917fa8289988", "DetectTime": "2024-05-21T12:35:58.781506+00:00", "EventTime": "2024-05-21T12:35:58.781524+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.127.20.14"]}], "Attach": [{"Content": "1970-01-04T15:30:02.195915+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2024/05/21 12:35:58.950787)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 88, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c234add5-1456-4144-a7f6-e3369811fc6d", "DetectTime": "2024-05-21T12:35:58.960881+00:00", "EventTime": "2024-05-21T12:35:58.960900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C567G8oao5R1Wgkz"], "accumulated_threat_level": 0.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "ba1675b7-ec9b-42a1-9651-93c31645b0ec", "DetectTime": "2024-05-21T12:35:58.976923+00:00", "EventTime": "2024-05-21T12:35:58.976941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvRk8WW8eak0I255"], "accumulated_threat_level": 1.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "6950b0e9-f746-4d08-9cef-1ce80235c286", "DetectTime": "2024-05-21T12:35:58.981838+00:00", "EventTime": "2024-05-21T12:35:58.981857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHOTUa15jkihTHCPie"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "224e8387-8af3-4930-bcd2-73526e20e31b", "DetectTime": "2024-05-21T12:35:58.987448+00:00", "EventTime": "2024-05-21T12:35:58.987466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHoh8N1SWR3uQQp7Bd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "5845a0d7-a4c6-43c8-8a3f-cd3bbf3613ac", "DetectTime": "2024-05-21T12:35:59.221163+00:00", "EventTime": "2024-05-21T12:35:59.221186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIZQgl3nTh0wINkP46"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "45ea1800-e19d-4f5c-8174-f98073eeec4a", "DetectTime": "2024-05-21T12:35:59.226966+00:00", "EventTime": "2024-05-21T12:35:59.226985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NWry4djC2qRmzBr2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "d3305e89-a48e-4d00-9ba7-2a03925fb907", "DetectTime": "2024-05-21T12:35:59.257739+00:00", "EventTime": "2024-05-21T12:35:59.257760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nlgi49uh6NlzLwX4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "60f1cf3c-c277-48ad-bfc2-c106e388c762", "DetectTime": "2024-05-21T12:35:59.399045+00:00", "EventTime": "2024-05-21T12:35:59.399067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrCvwvPNOZeyeVWb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "0e5ad2ef-6d4b-4d12-b95f-26ace94dc4dc", "DetectTime": "2024-05-21T12:35:59.491697+00:00", "EventTime": "2024-05-21T12:35:59.491720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMdbo3DAEZytGGXm1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "c8a9c676-346f-40b5-9481-6b9a451ad417", "DetectTime": "2024-05-21T12:35:59.633662+00:00", "EventTime": "2024-05-21T12:35:59.633683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVtlta3tZQBMidk5Ne"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "ba37d0ad-7b17-499f-976a-a4ca98362976", "DetectTime": "2024-05-21T12:35:59.983200+00:00", "EventTime": "2024-05-21T12:35:59.983221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiyRKcUMvnzWEE5re"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "2e0c32a6-0867-4144-9d93-8e24e0c10534", "DetectTime": "2024-05-21T12:36:00.070772+00:00", "EventTime": "2024-05-21T12:36:00.070795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwP9x2eqQsB9QgLp3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "a9326b7d-faef-4321-a704-500933a8d3d6", "DetectTime": "2024-05-21T12:36:00.106640+00:00", "EventTime": "2024-05-21T12:36:00.106663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnznAgI6geYqU5sqb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "0ba798a7-b0df-42bc-a990-8325d5a1fee2", "DetectTime": "2024-05-21T12:36:00.141067+00:00", "EventTime": "2024-05-21T12:36:00.141090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzkJd1GhpgDjmrEO9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "700d2a3b-bd0f-42fd-9e63-a428eb0fa007", "DetectTime": "2024-05-21T12:36:00.174011+00:00", "EventTime": "2024-05-21T12:36:00.174031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQh9F3188GjiXcx2D2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "46a6d710-b87c-4bbb-8986-98ee8cf94fa1", "DetectTime": "2024-05-21T12:36:00.210101+00:00", "EventTime": "2024-05-21T12:36:00.210123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtS2og36CpjZvFU0l2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "e30892b9-9c76-4666-bc3c-aa439cfa1a35", "DetectTime": "2024-05-21T12:36:00.446376+00:00", "EventTime": "2024-05-21T12:36:00.446401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYBvI44Fi9uMBolAj3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "4b708e4e-fde5-42d6-a200-6277875ac1a3", "DetectTime": "2024-05-21T12:36:00.452447+00:00", "EventTime": "2024-05-21T12:36:00.452468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTx3jtSPkkJR2PHh5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "0054ff34-fd4b-40be-8124-0a708bb0c825", "DetectTime": "2024-05-21T12:36:00.456986+00:00", "EventTime": "2024-05-21T12:36:00.457005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCeLPO2NgT22pVO5Vd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 86} +{"Format": "IDEA0", "ID": "221d0e4b-0cd1-4ef4-9de1-f9011efcb4a3", "DetectTime": "2024-05-21T12:36:00.475857+00:00", "EventTime": "2024-05-21T12:36:00.475878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB2OFj1IIfBd5QFYKl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "7a6cf9b5-4c62-4341-a478-04b103ffffe8", "DetectTime": "2024-05-21T12:36:00.551373+00:00", "EventTime": "2024-05-21T12:36:00.551394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CijJdwxKd2GXn94U5"], "accumulated_threat_level": 3.2, "timewindow": 88} +{"Format": "IDEA0", "ID": "98d86a4e-37e1-4db7-99f4-17b9aff6d983", "DetectTime": "2024-05-21T12:36:01.170011+00:00", "EventTime": "2024-05-21T12:36:01.170036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.253.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggJJ41IdozYukNDbh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "ae8b1d31-0e56-46ae-bb72-cae99bbf00cc", "DetectTime": "2024-05-21T12:36:01.289666+00:00", "EventTime": "2024-05-21T12:36:01.289689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvp1Nf3ucpZMdcUaK9"], "accumulated_threat_level": 4.0, "timewindow": 88} +{"Format": "IDEA0", "ID": "c9397416-f6cc-4dc6-b5f0-e5e48731a50f", "DetectTime": "2024-05-21T12:36:01.320898+00:00", "EventTime": "2024-05-21T12:36:01.320919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXonpA2CxJ1Aah2lEl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "8611801c-3ac3-4ce6-af3c-a388f9505f6e", "DetectTime": "2024-05-21T12:36:01.358152+00:00", "EventTime": "2024-05-21T12:36:01.358173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMttvZ8IdOTPP2y7"], "accumulated_threat_level": 4.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "5d36e159-9d6c-4f55-bb3d-e61800357ef6", "DetectTime": "2024-05-21T12:36:01.383117+00:00", "EventTime": "2024-05-21T12:36:01.383140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 14.99.39.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENWNU1E0tv6xlUNrk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "3391c5c3-5528-4663-9ac9-fe99f2eb8556", "DetectTime": "2024-05-21T12:36:01.426053+00:00", "EventTime": "2024-05-21T12:36:01.426073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQxREss3rPFgXz081"], "accumulated_threat_level": 5.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "e28fa018-bbb2-4d9b-bddd-af1f6666068c", "DetectTime": "2024-05-21T12:36:01.649689+00:00", "EventTime": "2024-05-21T12:36:01.649711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNnu84gJdEx9p2kn1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "ad5091dc-bb72-419b-a298-fa1a7300aa88", "DetectTime": "2024-05-21T12:36:01.654778+00:00", "EventTime": "2024-05-21T12:36:01.654799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8ZJM3hF4EAmQCWwh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "c471787b-e39c-4a69-83d7-b17bce0cf4e1", "DetectTime": "2024-05-21T12:36:01.699853+00:00", "EventTime": "2024-05-21T12:36:01.699879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbEnpJD5Mzm5ly23"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "11c65333-56f8-44bb-9179-4a530823509b", "DetectTime": "2024-05-21T12:36:01.711698+00:00", "EventTime": "2024-05-21T12:36:01.711718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"]}], "Attach": [{"Content": "Connection to unknown destination port 2039/UDP destination IP 88.247.65.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmLGOz1C98XQBS9Ug6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 88} +{"Format": "IDEA0", "ID": "4a34763b-7fb3-4c8b-91fd-d720a5fabf0d", "DetectTime": "2024-05-21T12:36:01.766709+00:00", "EventTime": "2024-05-21T12:36:01.766730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT5VB836QywVDLXvgj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "88b98b88-88ec-4cc3-a1a5-38cd98f3ac7a", "DetectTime": "2024-05-21T12:36:01.772088+00:00", "EventTime": "2024-05-21T12:36:01.772110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfgFI03vCUOLgoJITl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b5a45c87-c3be-4818-939c-cb394bccabdf", "DetectTime": "2024-05-21T12:36:01.873700+00:00", "EventTime": "2024-05-21T12:36:01.873723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXfYA1ObD3HqKKXU8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "0eb965bc-cb21-4a19-b6c0-791c8a6ca1fd", "DetectTime": "2024-05-21T12:36:01.911876+00:00", "EventTime": "2024-05-21T12:36:01.911904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"]}], "Attach": [{"Content": "Connection to unknown destination port 26762/UDP destination IP 190.239.253.243. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwIxSR1Ntv3UyZYFv2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "d9c1d6ab-ed57-40bd-9a9d-1312d4709b78", "DetectTime": "2024-05-21T12:36:01.954651+00:00", "EventTime": "2024-05-21T12:36:01.954671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKIAf2kZEfQLsaCQ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "3c5cfb39-b5ee-4eda-ade1-8bc99584a7ae", "DetectTime": "2024-05-21T12:36:02.249267+00:00", "EventTime": "2024-05-21T12:36:02.249288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLbYg1yuGsiKBXqf2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "acb804fb-def4-4261-9019-48654f9c18fd", "DetectTime": "2024-05-21T12:36:02.309720+00:00", "EventTime": "2024-05-21T12:36:02.309739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7FQ7c3BNnLbu32eL6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "2c1cc182-30ac-462a-b505-39630ab1486c", "DetectTime": "2024-05-21T12:36:02.349104+00:00", "EventTime": "2024-05-21T12:36:02.349125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtqvKh4vYaSxGYszL3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "59f38c81-92e8-49fd-b0f6-31b4252d410e", "DetectTime": "2024-05-21T12:36:02.667742+00:00", "EventTime": "2024-05-21T12:36:02.667763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVnPGc40jMMhimpg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "d7504c72-9918-436a-9e54-d55f722de299", "DetectTime": "2024-05-21T12:36:02.679429+00:00", "EventTime": "2024-05-21T12:36:02.679447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVdRNC2lICsvL1C2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "6ecd9a61-2880-4a8e-a988-785691734abf", "DetectTime": "2024-05-21T12:36:02.708194+00:00", "EventTime": "2024-05-21T12:36:02.708215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAVkvMf4j4Y3Vbfrk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "2de0c716-e206-4809-95ad-07af32b32ea5", "DetectTime": "2024-05-21T12:36:02.714091+00:00", "EventTime": "2024-05-21T12:36:02.714111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOMjE45P1dyrrmfu3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "8f720ea2-6265-478f-91f6-e5f1c4c71814", "DetectTime": "2024-05-21T12:36:02.718614+00:00", "EventTime": "2024-05-21T12:36:02.718632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnExpP2w184qMfw1Ji"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b217cf16-b20a-4327-b0ba-144a81770e25", "DetectTime": "2024-05-21T12:36:02.722937+00:00", "EventTime": "2024-05-21T12:36:02.722955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COxbxJZXyetc2jKJ2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "cbc76287-f160-4c87-974d-a4133d49eb1c", "DetectTime": "2024-05-21T12:36:02.866845+00:00", "EventTime": "2024-05-21T12:36:02.866866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYMHw23K8diUsBKzl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "e7cd0c2e-aa37-47db-a70d-7485ffce85e7", "DetectTime": "2024-05-21T12:36:02.878738+00:00", "EventTime": "2024-05-21T12:36:02.878757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKWgn3aKV1rOzo2W3"], "accumulated_threat_level": 9.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "a83fe0b0-6121-44ed-8bfb-9b0ed4b7ba9a", "DetectTime": "2024-05-21T12:36:02.930290+00:00", "EventTime": "2024-05-21T12:36:02.930313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDZMa4fo8bO2VNrGi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "fe2b2658-a3e8-47a2-b910-3dd782b0bdc3", "DetectTime": "2024-05-21T12:36:02.986679+00:00", "EventTime": "2024-05-21T12:36:02.986699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXKGbp1oHZQ8zDFv09"], "accumulated_threat_level": 10.4, "timewindow": 88} +{"Format": "IDEA0", "ID": "19930acb-a351-4c29-b412-e48e19db2a1f", "DetectTime": "2024-05-21T12:36:03.028320+00:00", "EventTime": "2024-05-21T12:36:03.028352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.99.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11735/UDP destination IP 78.188.99.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTAWbRcPKGbQ6vo0d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 88} +{"Format": "IDEA0", "ID": "8903f3de-8d25-4117-a2da-9e8a6a6eff46", "DetectTime": "2024-05-21T12:36:03.300363+00:00", "EventTime": "2024-05-21T12:36:03.300381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeU02u2Lge2gEulu9d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "e699d996-0b64-4da0-aaaf-813e9f188690", "DetectTime": "2024-05-21T12:36:03.304762+00:00", "EventTime": "2024-05-21T12:36:03.304780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C618R91MYWfI4WPjZe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "25be1a44-0e6f-4736-a125-989a6daeab05", "DetectTime": "2024-05-21T12:36:03.437974+00:00", "EventTime": "2024-05-21T12:36:03.437993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 31.51.19.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cab9364oWVc2rejPGf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 88} +{"Format": "Json", "ID": "25be1a44-0e6f-4736-a125-989a6daeab05", "DetectTime": "2024-05-21T12:36:03.437974+00:00", "EventTime": "2024-05-21T12:36:03.437993+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"]}], "Attach": [{"Content": "1970-01-04T15:36:17.415375+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2024/05/21 12:36:03.619585)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 88, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "272eafff-0a76-4c6d-8874-138480fc120a", "DetectTime": "2024-05-21T12:36:03.624222+00:00", "EventTime": "2024-05-21T12:36:03.624243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAo234TXS1AbmeQp3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "016bdcf2-055a-4c5c-b586-4e762581641c", "DetectTime": "2024-05-21T12:36:03.675136+00:00", "EventTime": "2024-05-21T12:36:03.675155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDILdewk2Ieoau9q2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "5269513e-cda4-4eaf-b9cc-77d304f72d7f", "DetectTime": "2024-05-21T12:36:03.717202+00:00", "EventTime": "2024-05-21T12:36:03.717221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkbE33nKCKGsZLQkg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "9c4c174d-4cd6-47c0-9e97-20c21b8a361e", "DetectTime": "2024-05-21T12:36:03.794669+00:00", "EventTime": "2024-05-21T12:36:03.794691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3VmHLIPPdMLzk9V3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "bbedb6b6-ce79-401c-ad80-a43c04718341", "DetectTime": "2024-05-21T12:36:03.827629+00:00", "EventTime": "2024-05-21T12:36:03.827649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQSDt1yu8gqQP5tad"], "accumulated_threat_level": 0.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "68f6bd96-3fcd-44dd-a723-f70efae996d8", "DetectTime": "2024-05-21T12:36:03.860355+00:00", "EventTime": "2024-05-21T12:36:03.860379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFlajvX6NK7c8IL7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "da8fac6b-6d86-4748-985f-cab078efee06", "DetectTime": "2024-05-21T12:36:03.906424+00:00", "EventTime": "2024-05-21T12:36:03.906445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3wb03Osox94gpwKc"], "accumulated_threat_level": 1.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "d40dbc1c-8d9a-48e1-a48c-4e39f9439725", "DetectTime": "2024-05-21T12:36:04.023256+00:00", "EventTime": "2024-05-21T12:36:04.023276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coua211ZadyfgOz8cb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "868d80ac-00c0-4ef9-a1c4-daf8f71f8918", "DetectTime": "2024-05-21T12:36:04.065538+00:00", "EventTime": "2024-05-21T12:36:04.065563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8ydvE2PWOKzoVQb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "76ba09d5-4655-44ea-ae89-7c4778244fc9", "DetectTime": "2024-05-21T12:36:04.070279+00:00", "EventTime": "2024-05-21T12:36:04.070298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvpH21gp9YMJTLFta"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "75d5d8f3-f170-4539-a6c7-01aaeccbc8b8", "DetectTime": "2024-05-21T12:36:04.356770+00:00", "EventTime": "2024-05-21T12:36:04.356790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLV40A4S9eyFP4sS52"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "239c0d3a-c41d-4a18-bc40-0cd2ae6c9552", "DetectTime": "2024-05-21T12:36:04.394445+00:00", "EventTime": "2024-05-21T12:36:04.394467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSxpQw42a57C0dDzFb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "4681c345-9ba2-4480-b4da-1237cc47ea1d", "DetectTime": "2024-05-21T12:36:04.399536+00:00", "EventTime": "2024-05-21T12:36:04.399556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTX0Vu3c7yXkK5m983"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b4d141f9-d28b-47ff-828a-2c295c091351", "DetectTime": "2024-05-21T12:36:04.450890+00:00", "EventTime": "2024-05-21T12:36:04.450913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6idH1NyyRpCxRA5e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b14cc66c-029c-4b5d-aacf-98fa63503350", "DetectTime": "2024-05-21T12:36:04.488961+00:00", "EventTime": "2024-05-21T12:36:04.488980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF94D3xwxZwEzBGqe"], "accumulated_threat_level": 3.2, "timewindow": 88} +{"Format": "IDEA0", "ID": "a26e4e05-f938-4e68-b633-45b360006585", "DetectTime": "2024-05-21T12:36:04.534996+00:00", "EventTime": "2024-05-21T12:36:04.535014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bwoA4J0al0ld7sSi"], "accumulated_threat_level": 4.0, "timewindow": 88} +{"Format": "IDEA0", "ID": "57990d3e-7722-4fcb-835c-a97295a21013", "DetectTime": "2024-05-21T12:36:04.612340+00:00", "EventTime": "2024-05-21T12:36:04.612359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ7T3gpCJfxOrykic"], "accumulated_threat_level": 4.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "93fc417e-4978-4bda-8d67-655d14462076", "DetectTime": "2024-05-21T12:36:04.663504+00:00", "EventTime": "2024-05-21T12:36:04.663521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWdUXe1dAl2D0nP3fh"], "accumulated_threat_level": 5.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "444e3685-2e50-4016-916c-337bd26a1542", "DetectTime": "2024-05-21T12:36:04.925777+00:00", "EventTime": "2024-05-21T12:36:04.925796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5Nx34bDrzGSUe5p1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "507b9dda-55c3-4aaf-98a8-93b5409c6c97", "DetectTime": "2024-05-21T12:36:05.021462+00:00", "EventTime": "2024-05-21T12:36:05.021482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Uzz03QRAwaGQsiof"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 88} +{"Format": "IDEA0", "ID": "225072b0-ae74-498b-9a0d-d4924989454f", "DetectTime": "2024-05-21T12:36:05.113652+00:00", "EventTime": "2024-05-21T12:36:05.113670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cezxb82lZzeWfd5LIj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "64fb583d-4ca6-4c19-ae5a-be995a55bc92", "DetectTime": "2024-05-21T12:36:05.149923+00:00", "EventTime": "2024-05-21T12:36:05.149944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkikj2b4hXOljcOP5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b8603931-a077-4fd6-abe9-0f4cfd24ae6a", "DetectTime": "2024-05-21T12:36:05.376759+00:00", "EventTime": "2024-05-21T12:36:05.376781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8wcL1E8bkv8XWOib"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b2025e11-0298-4c11-807f-083ddcbaa75c", "DetectTime": "2024-05-21T12:36:05.507696+00:00", "EventTime": "2024-05-21T12:36:05.507715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqITm172uM39bvTe3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "4d0c44c2-61f0-4d0b-928c-0afeaa97fc8b", "DetectTime": "2024-05-21T12:36:05.512320+00:00", "EventTime": "2024-05-21T12:36:05.512339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FMXU2LtLj7ecyqh3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "d28b1ed7-8b68-4c38-9a93-822b04a78d15", "DetectTime": "2024-05-21T12:36:05.537698+00:00", "EventTime": "2024-05-21T12:36:05.537717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALbcp42CWQNJTvyB2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "b4749121-abf8-4783-9bbc-52721b5ceb8f", "DetectTime": "2024-05-21T12:36:05.602360+00:00", "EventTime": "2024-05-21T12:36:05.602381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvmdsHuN6vhv7VWYd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "e08bea2c-949d-46de-87b0-1d4677bfe23e", "DetectTime": "2024-05-21T12:36:05.631411+00:00", "EventTime": "2024-05-21T12:36:05.631433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBisi3bclLAUw5Wg7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "9387f1d2-72ce-4649-a59e-901aef232da2", "DetectTime": "2024-05-21T12:36:05.668635+00:00", "EventTime": "2024-05-21T12:36:05.668657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7KZe3gty6DxXIkl8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "bf759d71-a724-4078-b561-2b9f7b9b6690", "DetectTime": "2024-05-21T12:36:05.925320+00:00", "EventTime": "2024-05-21T12:36:05.925339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG4cSy4JqBOtvHAmTb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "5f010399-3600-4a79-a36b-374ad2e153d2", "DetectTime": "2024-05-21T12:36:06.172300+00:00", "EventTime": "2024-05-21T12:36:06.172322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSkwiAJbmM8dD0Db"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "96bbc64f-1077-4802-b92c-a490777ec727", "DetectTime": "2024-05-21T12:36:06.207208+00:00", "EventTime": "2024-05-21T12:36:06.207230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQ0i336LYIOhd7Y42"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "83cd837a-8901-459c-b3b0-3f09b8277c14", "DetectTime": "2024-05-21T12:36:06.256229+00:00", "EventTime": "2024-05-21T12:36:06.256247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Che5gC4fU0vATuWqMa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 88} +{"Format": "IDEA0", "ID": "f037476d-5fa2-4ee8-825b-9bab18054ed2", "DetectTime": "2024-05-21T12:36:06.283109+00:00", "EventTime": "2024-05-21T12:36:06.283129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDn2Go15ceX2OC4i24"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "d532f29e-2ed9-4686-94a3-b91512f420f0", "DetectTime": "2024-05-21T12:36:06.295872+00:00", "EventTime": "2024-05-21T12:36:06.295895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGigZh16xBFLE7vQ4e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "c5cefdb2-ab24-45d7-913f-457e75bf66f6", "DetectTime": "2024-05-21T12:36:06.360488+00:00", "EventTime": "2024-05-21T12:36:06.360511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czbah7vUO26IcDxNc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "1bc5a4bc-b36d-44e5-b311-7a51c4727d0c", "DetectTime": "2024-05-21T12:36:06.365844+00:00", "EventTime": "2024-05-21T12:36:06.365864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ZxQDHjerYUaRS97"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "8a2d3390-06d2-47c9-8014-10610dabe9fe", "DetectTime": "2024-05-21T12:36:06.426261+00:00", "EventTime": "2024-05-21T12:36:06.426281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XpSu4LFLDAxAVTbi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "fc898dd3-63ad-42d3-8da1-5066f40abc9f", "DetectTime": "2024-05-21T12:36:06.463187+00:00", "EventTime": "2024-05-21T12:36:06.463207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVM0bK2t1vPuFDOX0h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "2fc50fa6-ed3a-4a70-b4d6-55f54550ce82", "DetectTime": "2024-05-21T12:36:06.497155+00:00", "EventTime": "2024-05-21T12:36:06.497176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkezL63EcMd8qbrFyg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "55ca0f15-c6ef-4202-bcdb-e878624a0994", "DetectTime": "2024-05-21T12:36:06.655176+00:00", "EventTime": "2024-05-21T12:36:06.655195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmIDy53n0UpKL0yQt6"], "accumulated_threat_level": 9.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "176de59d-c2ca-4bf6-9c25-a42836aa5a50", "DetectTime": "2024-05-21T12:36:06.806005+00:00", "EventTime": "2024-05-21T12:36:06.806023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZy92l10pKY7mngsk8"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d17463c3-495a-4ba9-985c-79e63a0965c9", "DetectTime": "2024-05-21T12:36:06.817030+00:00", "EventTime": "2024-05-21T12:36:06.817048+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZy92l10pKY7mngsk8"], "accumulated_threat_level": 7.699999999999999, "timewindow": 25} +{"Format": "IDEA0", "ID": "63aa90c2-9ec6-4257-9a92-f199cc0e3baf", "DetectTime": "2024-05-21T12:36:06.841144+00:00", "EventTime": "2024-05-21T12:36:06.841161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS2AqqPkVltZsQlOh"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "5ec2eacd-c8f2-4945-9b13-380067b095ad", "DetectTime": "2024-05-21T12:36:06.853809+00:00", "EventTime": "2024-05-21T12:36:06.853827+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS2AqqPkVltZsQlOh"], "accumulated_threat_level": 8.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "d5fd5e2d-228d-4bec-bbd1-326a91f5d384", "DetectTime": "2024-05-21T12:36:06.874583+00:00", "EventTime": "2024-05-21T12:36:06.874600+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2cc1izGCGJXukGrb"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "69ca1c3e-352d-4eec-ad4e-243ea8a008c2", "DetectTime": "2024-05-21T12:36:06.886108+00:00", "EventTime": "2024-05-21T12:36:06.886127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2cc1izGCGJXukGrb"], "accumulated_threat_level": 8.7, "timewindow": 25} +{"Format": "IDEA0", "ID": "2c596099-ce1d-4ed9-993c-28d0a2c5c197", "DetectTime": "2024-05-21T12:36:06.907923+00:00", "EventTime": "2024-05-21T12:36:06.907942+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wiQK2TSwDonEbh31"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d8c19b7a-0443-4773-b3c8-9c048d9e7c94", "DetectTime": "2024-05-21T12:36:06.922007+00:00", "EventTime": "2024-05-21T12:36:06.922030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wiQK2TSwDonEbh31"], "accumulated_threat_level": 9.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "6dd85b47-2ecb-410f-81bb-b41442c8c0d7", "DetectTime": "2024-05-21T12:36:06.932891+00:00", "EventTime": "2024-05-21T12:36:06.932915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5QIIu3QXVHTjxbpKj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "45f68474-0c50-4a26-9731-b7892cbaa8e7", "DetectTime": "2024-05-21T12:36:07.074908+00:00", "EventTime": "2024-05-21T12:36:07.074930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD13Um41seZYN51VFj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "aceac0a1-7f8b-4aae-a365-3d47f0e03936", "DetectTime": "2024-05-21T12:36:07.079705+00:00", "EventTime": "2024-05-21T12:36:07.079726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8c1Ub3cZAZqkJCpV5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "c3070e7b-a5ca-45a2-8512-6af8b7680231", "DetectTime": "2024-05-21T12:36:07.113593+00:00", "EventTime": "2024-05-21T12:36:07.113614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAXw412eBVLWPj6GVi"], "accumulated_threat_level": 10.4, "timewindow": 88} +{"Format": "IDEA0", "ID": "366c2001-e3a3-46d8-b14d-803d7e2895aa", "DetectTime": "2024-05-21T12:36:07.177961+00:00", "EventTime": "2024-05-21T12:36:07.177982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6zL24BIIrOrTbqV9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "6390bbbd-a457-41de-8587-f000098a56f7", "DetectTime": "2024-05-21T12:36:07.315553+00:00", "EventTime": "2024-05-21T12:36:07.315574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGM5ZY3Vh0CjMVIaa7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b5bae145-7b22-4ff5-b3da-cc58d4b56c24", "DetectTime": "2024-05-21T12:36:07.373778+00:00", "EventTime": "2024-05-21T12:36:07.373799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwoFg1vVOvlXZIzKj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "dca818d2-fb4f-43b1-b137-079df74a13a2", "DetectTime": "2024-05-21T12:36:07.433243+00:00", "EventTime": "2024-05-21T12:36:07.433265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMib52mtMjEeq77a2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 88} +{"Format": "IDEA0", "ID": "290351d7-4624-4700-a90c-901e18a39db5", "DetectTime": "2024-05-21T12:36:07.475757+00:00", "EventTime": "2024-05-21T12:36:07.475776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqmgjC3yl5MED0dWzi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 88} +{"Format": "Json", "ID": "290351d7-4624-4700-a90c-901e18a39db5", "DetectTime": "2024-05-21T12:36:07.475757+00:00", "EventTime": "2024-05-21T12:36:07.475776+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "1970-01-04T15:40:20.028701+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 88. (real time 2024/05/21 12:36:07.672422)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 88, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1cfdc553-93a3-4be4-bf5a-6949f177013f", "DetectTime": "2024-05-21T12:36:07.676528+00:00", "EventTime": "2024-05-21T12:36:07.676548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqLTFq1Al53oqYrcYh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "1b5e6696-551d-4bad-8462-fd20f9b13b78", "DetectTime": "2024-05-21T12:36:07.681781+00:00", "EventTime": "2024-05-21T12:36:07.681799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDoty3nc6EASf7dUd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "12eb6d85-9e9c-44f7-a4eb-505306acfa76", "DetectTime": "2024-05-21T12:36:07.999375+00:00", "EventTime": "2024-05-21T12:36:07.999399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHjswOWlIO73NWWc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "febf9a00-2d4e-482b-ba47-f66b307f184d", "DetectTime": "2024-05-21T12:36:08.004240+00:00", "EventTime": "2024-05-21T12:36:08.004259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUkNvi95QY7VTKPb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "b5b4a062-3356-4f5d-a91b-e8224b19a14c", "DetectTime": "2024-05-21T12:36:08.025828+00:00", "EventTime": "2024-05-21T12:36:08.025850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2k0Hi1BexDS9UIUsi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 87} +{"Format": "IDEA0", "ID": "9f0d33c1-5f26-4d16-a12c-fbc015c10d5b", "DetectTime": "2024-05-21T12:36:08.113498+00:00", "EventTime": "2024-05-21T12:36:08.113521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVlKFa2Ux7CkiqUcZh"], "accumulated_threat_level": 0.8, "timewindow": 88} +{"Format": "IDEA0", "ID": "663b4ba5-7513-4b20-9604-70a38c79342f", "DetectTime": "2024-05-21T12:36:08.192660+00:00", "EventTime": "2024-05-21T12:36:08.192681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFHt22BEjL3kf0PR9"], "accumulated_threat_level": 1.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "ddf919a0-f2f6-41ec-afc2-0aea3b3aadad", "DetectTime": "2024-05-21T12:36:08.331944+00:00", "EventTime": "2024-05-21T12:36:08.331965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiF6qd29RPqf4xxGLd"], "accumulated_threat_level": 1.6, "timewindow": 88} +{"Format": "IDEA0", "ID": "037252e1-62e7-4511-bb59-4f03d97a9f8b", "DetectTime": "2024-05-21T12:36:08.537752+00:00", "EventTime": "2024-05-21T12:36:08.537772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3gXk3mttky8Du657"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "513fdea2-eb57-4b9a-a8c2-0cd76dc3d508", "DetectTime": "2024-05-21T12:36:08.766803+00:00", "EventTime": "2024-05-21T12:36:08.766823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.56.145.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSWDq13s2l03yA6lRi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "11f9764e-2ac0-445e-8a4e-2d7045ba50cb", "DetectTime": "2024-05-21T12:36:08.929406+00:00", "EventTime": "2024-05-21T12:36:08.929425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7a7J2gDpHTNmPSHj"], "accumulated_threat_level": 0.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "cb12fbf9-84b6-4ead-a43f-ceeab970c017", "DetectTime": "2024-05-21T12:36:09.397370+00:00", "EventTime": "2024-05-21T12:36:09.397391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUS6ID2Z7eRiHRGRx3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3b866e0f-a279-452f-80ce-0ff7ee699bde", "DetectTime": "2024-05-21T12:36:09.536382+00:00", "EventTime": "2024-05-21T12:36:09.536401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COpM9vi4PzrTuaCc", "CW944c2hmWWL3HSlQ5", "Cy60RaqowIt3HCVi6", "Cf8tBw3Y8eZWl9Rnak"], "accumulated_threat_level": 1.3, "timewindow": 89} +{"Format": "IDEA0", "ID": "ab08e03b-747d-4794-90fd-d952dea09b31", "DetectTime": "2024-05-21T12:36:09.714116+00:00", "EventTime": "2024-05-21T12:36:09.714135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPQw94EMpJNuZTfol"], "accumulated_threat_level": 2.1, "timewindow": 89} +{"Format": "IDEA0", "ID": "a63d1d3a-105c-4e98-b076-67dd7db36deb", "DetectTime": "2024-05-21T12:36:09.994997+00:00", "EventTime": "2024-05-21T12:36:09.995019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjnTu3HkkAGzloqeh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "27dea884-de42-41ff-8810-9ee4b44d2f9c", "DetectTime": "2024-05-21T12:36:10.000798+00:00", "EventTime": "2024-05-21T12:36:10.000817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxuMu2gdoJYPRl8Xc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e2ee2cb5-352e-4211-ab6d-93679f40befa", "DetectTime": "2024-05-21T12:36:10.005845+00:00", "EventTime": "2024-05-21T12:36:10.005864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.210.233.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpRrHT2SJXbTEPruAg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "34552ef2-a283-4b3c-ae9b-8ecc663080b7", "DetectTime": "2024-05-21T12:36:10.029575+00:00", "EventTime": "2024-05-21T12:36:10.029596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Ghoo18QtUVpViE03"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "24875dac-d132-4ee0-a346-e62a46f45411", "DetectTime": "2024-05-21T12:36:10.173696+00:00", "EventTime": "2024-05-21T12:36:10.173716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDUnKq4iWOq01ayygk"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 89} +{"Format": "IDEA0", "ID": "fd4c0065-7655-4a5c-8622-5b00a6daab46", "DetectTime": "2024-05-21T12:36:10.199357+00:00", "EventTime": "2024-05-21T12:36:10.199376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDzSjCL1QRLzpnvJ"], "accumulated_threat_level": 3.7, "timewindow": 89} +{"Format": "IDEA0", "ID": "1f251de6-b5b7-47a5-96a6-590e10a0e0f5", "DetectTime": "2024-05-21T12:36:10.218895+00:00", "EventTime": "2024-05-21T12:36:10.218913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLQt84SYyuiiJkTVf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "edd421d7-46f3-455a-a437-0eb6f9cb0c50", "DetectTime": "2024-05-21T12:36:10.264645+00:00", "EventTime": "2024-05-21T12:36:10.264665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8hglF32B64CIW6kf1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e739289c-c6b3-446e-b9a4-ce9f41904299", "DetectTime": "2024-05-21T12:36:10.303310+00:00", "EventTime": "2024-05-21T12:36:10.303329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvjxt1fPjXwZQBXkj"], "accumulated_threat_level": 4.5, "timewindow": 89} +{"Format": "IDEA0", "ID": "d3ce9b74-069c-41fb-a93c-4680993fbe03", "DetectTime": "2024-05-21T12:36:10.322638+00:00", "EventTime": "2024-05-21T12:36:10.322660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7zA52VZRZaxIj5v7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "131ced61-c5bb-48ee-b678-c50e0eccdcec", "DetectTime": "2024-05-21T12:36:10.370196+00:00", "EventTime": "2024-05-21T12:36:10.370213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["213.123.181.44"]}], "Attach": [{"Content": "Connection to unknown destination port 4921/UDP destination IP 213.123.181.44. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcM8344le4FkRkPXH7"], "accumulated_threat_level": 5.3, "timewindow": 89} +{"Format": "IDEA0", "ID": "e92a0701-ebf5-4851-8a4a-07c5f5ff9102", "DetectTime": "2024-05-21T12:36:10.409092+00:00", "EventTime": "2024-05-21T12:36:10.409110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmcOfA244sZnNjTsQd"], "accumulated_threat_level": 6.1, "timewindow": 89} +{"Format": "IDEA0", "ID": "4b9b9b05-2dc6-4050-8495-835da3b8b575", "DetectTime": "2024-05-21T12:36:10.655333+00:00", "EventTime": "2024-05-21T12:36:10.655351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLV8G2oqaAMTOxSo7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 89} +{"Format": "IDEA0", "ID": "13586f18-a214-47a6-b599-2a8ad163f462", "DetectTime": "2024-05-21T12:36:10.696646+00:00", "EventTime": "2024-05-21T12:36:10.696670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHlQ1p1dznt5Rkt7t1"], "accumulated_threat_level": 7.699999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "1f679cda-06e3-4763-bb22-aa04e8e3ed82", "DetectTime": "2024-05-21T12:36:10.738014+00:00", "EventTime": "2024-05-21T12:36:10.738032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJQHXJ1ZYgD0HQdwn9"], "accumulated_threat_level": 8.5, "timewindow": 89} +{"Format": "IDEA0", "ID": "b79cd092-db79-4036-aa1c-457f20ee2100", "DetectTime": "2024-05-21T12:36:10.779822+00:00", "EventTime": "2024-05-21T12:36:10.779845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT50SM2jvj78CH7fv7"], "accumulated_threat_level": 9.3, "timewindow": 89} +{"Format": "IDEA0", "ID": "34cc6db6-336a-4b3c-95a6-472b51147cf1", "DetectTime": "2024-05-21T12:36:10.820461+00:00", "EventTime": "2024-05-21T12:36:10.820478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci7o7D1AC7Pc65Rvpb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 89} +{"Format": "IDEA0", "ID": "6e1afa17-4983-44d9-b9f4-1e96dcc914e8", "DetectTime": "2024-05-21T12:36:10.862226+00:00", "EventTime": "2024-05-21T12:36:10.862247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPjqNRfOH4767461"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4a257837-aec1-4c9f-8706-e2f26c0a585d", "DetectTime": "2024-05-21T12:36:10.866865+00:00", "EventTime": "2024-05-21T12:36:10.866884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVio6I3WAZyQ2PlFQd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "a59b6e4b-0a37-44db-890a-f427910a2aa6", "DetectTime": "2024-05-21T12:36:10.917875+00:00", "EventTime": "2024-05-21T12:36:10.917895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NLXk35V0yLUbTzX"], "accumulated_threat_level": 10.900000000000002, "timewindow": 89} +{"Format": "IDEA0", "ID": "155aafb2-b8b4-4b8f-bf50-7183acc3dc0c", "DetectTime": "2024-05-21T12:36:10.961501+00:00", "EventTime": "2024-05-21T12:36:10.961519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cY8r4Se2l75VPEk6"], "accumulated_threat_level": 11.700000000000003, "timewindow": 89} +{"Format": "IDEA0", "ID": "0298874b-c397-4459-adf0-0b374280e2cd", "DetectTime": "2024-05-21T12:36:11.003599+00:00", "EventTime": "2024-05-21T12:36:11.003617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmDzS3kt4TR3XBxud"], "accumulated_threat_level": 12.500000000000004, "timewindow": 89} +{"Format": "Json", "ID": "0298874b-c397-4459-adf0-0b374280e2cd", "DetectTime": "2024-05-21T12:36:11.003599+00:00", "EventTime": "2024-05-21T12:36:11.003617+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "1970-01-04T16:11:35.019725+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2024/05/21 12:36:11.202628)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 89, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "66044f5e-3daf-4bdc-b643-388e04982d91", "DetectTime": "2024-05-21T12:36:11.214476+00:00", "EventTime": "2024-05-21T12:36:11.214495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.55.215"]}], "Attach": [{"Content": "Connection to unknown destination port 18951/UDP destination IP 188.169.55.215. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8awC1xqteY5zoF18"], "accumulated_threat_level": 0.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "38b42a46-2e15-46bc-8987-ef047c2fccf1", "DetectTime": "2024-05-21T12:36:11.226900+00:00", "EventTime": "2024-05-21T12:36:11.226921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5lBCE4vZnxH1kcTte"], "accumulated_threat_level": 1.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "c31b8a02-d9e1-44bd-aaf4-3a39bd710aef", "DetectTime": "2024-05-21T12:36:11.379066+00:00", "EventTime": "2024-05-21T12:36:11.379088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqUPblfFZCEMqz0Ee"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "82bd6f9a-d146-41f5-899a-68fd04745288", "DetectTime": "2024-05-21T12:36:11.384591+00:00", "EventTime": "2024-05-21T12:36:11.384610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgl8Yn3K6cXzbhYnZ8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "1e232e5e-5ffb-4605-828d-9eb2586cdd91", "DetectTime": "2024-05-21T12:36:11.389265+00:00", "EventTime": "2024-05-21T12:36:11.389284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wbjE1Dn9f2GLeSRb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "6228f76d-de1e-41b4-a970-497eed48e2eb", "DetectTime": "2024-05-21T12:36:11.468353+00:00", "EventTime": "2024-05-21T12:36:11.468375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiP8yG2BAorKU5hlI1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 89} +{"Format": "IDEA0", "ID": "0771ab57-d090-4794-96aa-ea2f48a918e9", "DetectTime": "2024-05-21T12:36:11.501971+00:00", "EventTime": "2024-05-21T12:36:11.501993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.139.20.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRXXj3OiAbyowbG58"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "d9980a0d-e422-4125-b909-5bc02e6c2a6a", "DetectTime": "2024-05-21T12:36:11.554379+00:00", "EventTime": "2024-05-21T12:36:11.554401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRelrZ1aQOfzUZyOH7"], "accumulated_threat_level": 3.2, "timewindow": 89} +{"Format": "IDEA0", "ID": "b98fbff5-1039-46de-8e46-97dba227198c", "DetectTime": "2024-05-21T12:36:11.569880+00:00", "EventTime": "2024-05-21T12:36:11.569900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2pYE33ItiSPHKyAn9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "8306476c-a788-4f25-a76d-e3523be964cf", "DetectTime": "2024-05-21T12:36:11.712581+00:00", "EventTime": "2024-05-21T12:36:11.712604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgC43v4KhR5uaEJ99"], "accumulated_threat_level": 4.0, "timewindow": 89} +{"Format": "IDEA0", "ID": "5d67b4df-4f2d-462a-bfcb-2c54e50a23b8", "DetectTime": "2024-05-21T12:36:11.743208+00:00", "EventTime": "2024-05-21T12:36:11.743228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnptK33XVZZM4lJtQa"], "accumulated_threat_level": 4.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "70977ea9-23d5-4089-b41b-d38714c1fb76", "DetectTime": "2024-05-21T12:36:11.776178+00:00", "EventTime": "2024-05-21T12:36:11.776204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs9PbVYHxK5oj2vch"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "f1acc389-b8bc-4817-b056-c53442215f75", "DetectTime": "2024-05-21T12:36:11.814499+00:00", "EventTime": "2024-05-21T12:36:11.814521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrDpm3EPs8A3Shko1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "cbd04290-b155-4844-bb79-77294b837422", "DetectTime": "2024-05-21T12:36:11.860690+00:00", "EventTime": "2024-05-21T12:36:11.860711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YmGz3wISboJ8ojo3"], "accumulated_threat_level": 5.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "892934f1-42eb-4a5b-99c4-4a7033b65404", "DetectTime": "2024-05-21T12:36:12.149788+00:00", "EventTime": "2024-05-21T12:36:12.149811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Rpac3zK7tinSpjzl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "68f92b23-e0bf-4569-b5f9-dd3d28505a1b", "DetectTime": "2024-05-21T12:36:12.155324+00:00", "EventTime": "2024-05-21T12:36:12.155345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CquNdl3VMBgiZNSUog"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4419bc4b-da68-4ad1-8326-a38a9278ddc2", "DetectTime": "2024-05-21T12:36:12.160295+00:00", "EventTime": "2024-05-21T12:36:12.160314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEy8m3m144Sah3klc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "0204d0f5-ef51-406e-bdec-43bfc716aa36", "DetectTime": "2024-05-21T12:36:12.165252+00:00", "EventTime": "2024-05-21T12:36:12.165271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqvopc4LVRskdf4sKi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "dc700456-c749-42a5-b220-0ef72341dbe4", "DetectTime": "2024-05-21T12:36:12.240671+00:00", "EventTime": "2024-05-21T12:36:12.240695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7TmpZufP3IcxFFc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 89} +{"Format": "IDEA0", "ID": "8a2969f0-a682-4ed1-96f7-907949cdb28a", "DetectTime": "2024-05-21T12:36:12.322720+00:00", "EventTime": "2024-05-21T12:36:12.322739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coo1523PFCCZfZByck"], "accumulated_threat_level": 7.199999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "9af70c09-8f00-4060-91e6-4a84ce41c075", "DetectTime": "2024-05-21T12:36:12.362394+00:00", "EventTime": "2024-05-21T12:36:12.362427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkggaREUDPcQYGnl7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "43d28319-f85d-416c-a3f9-aa027d18aecf", "DetectTime": "2024-05-21T12:36:12.405468+00:00", "EventTime": "2024-05-21T12:36:12.405487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"]}], "Attach": [{"Content": "Connection to unknown destination port 2039/UDP destination IP 88.247.65.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbEXauuWTDDok8in2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "6fff93c1-d79d-41a8-a921-9f6c57eade23", "DetectTime": "2024-05-21T12:36:12.435041+00:00", "EventTime": "2024-05-21T12:36:12.435061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qWn63AvQ2wjzLeej"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "39740c5f-5165-40c8-99ec-11868b758de9", "DetectTime": "2024-05-21T12:36:12.489452+00:00", "EventTime": "2024-05-21T12:36:12.489470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ04cg3S1p72NV77ke"], "accumulated_threat_level": 9.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "83d03292-3542-4ae3-915c-29118c469bf2", "DetectTime": "2024-05-21T12:36:12.755284+00:00", "EventTime": "2024-05-21T12:36:12.755306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3ggG3lWLgIGbACJk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c2adb95b-0914-457b-b3da-a1015ffef624", "DetectTime": "2024-05-21T12:36:12.760370+00:00", "EventTime": "2024-05-21T12:36:12.760390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4lCGN6mvlLKFtw13"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3dba275a-aa69-4897-bfbc-8b2088b0e28c", "DetectTime": "2024-05-21T12:36:12.811496+00:00", "EventTime": "2024-05-21T12:36:12.811517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVXzL3JQTh9XgZN22"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "145ec54a-987c-43f4-b407-126e3e2216b3", "DetectTime": "2024-05-21T12:36:12.847144+00:00", "EventTime": "2024-05-21T12:36:12.847165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctLRs3JNXpiKKNRh"], "accumulated_threat_level": 10.4, "timewindow": 89} +{"Format": "IDEA0", "ID": "0187f399-4e25-4af5-8d29-aa1151d6cbf5", "DetectTime": "2024-05-21T12:36:12.887262+00:00", "EventTime": "2024-05-21T12:36:12.887282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQ18f11sRwRcxPGBf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 89} +{"Format": "IDEA0", "ID": "5b8466cb-7476-428c-af85-f817aea1840f", "DetectTime": "2024-05-21T12:36:12.927858+00:00", "EventTime": "2024-05-21T12:36:12.927876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgx2A93os7rPOjVsZ1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 89} +{"Format": "Json", "ID": "5b8466cb-7476-428c-af85-f817aea1840f", "DetectTime": "2024-05-21T12:36:12.927858+00:00", "EventTime": "2024-05-21T12:36:12.927876+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "1970-01-04T16:12:32.576599+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2024/05/21 12:36:13.092862)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 89, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3bb51b83-7234-4264-959c-6d734a0eb7a6", "DetectTime": "2024-05-21T12:36:13.106126+00:00", "EventTime": "2024-05-21T12:36:13.106145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.188.99.85"]}], "Attach": [{"Content": "Connection to unknown destination port 11735/UDP destination IP 78.188.99.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEPwU1NwXkSJt1wK7"], "accumulated_threat_level": 0.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "ac7b8361-c419-457c-8ca3-cbf1b984b039", "DetectTime": "2024-05-21T12:36:13.117665+00:00", "EventTime": "2024-05-21T12:36:13.117683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.51.19.187"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 31.51.19.187. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CucUSy1A5xc2QGfoJk"], "accumulated_threat_level": 1.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "9c639dc1-5947-4de7-9301-ff276bdb65ea", "DetectTime": "2024-05-21T12:36:13.123004+00:00", "EventTime": "2024-05-21T12:36:13.123032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0MS13nZEQYESwSa9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "bff8dda6-d13e-4afe-8be3-21b733bbaeb7", "DetectTime": "2024-05-21T12:36:13.136875+00:00", "EventTime": "2024-05-21T12:36:13.136897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjxQLm2svtPKfMaUb4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 89} +{"Format": "IDEA0", "ID": "5f7c8460-d12d-4263-b32e-cc823a4dbbd1", "DetectTime": "2024-05-21T12:36:13.148453+00:00", "EventTime": "2024-05-21T12:36:13.148471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXyjS27un3q2Cxenh"], "accumulated_threat_level": 3.2, "timewindow": 89} +{"Format": "IDEA0", "ID": "cc9e0ec7-7673-47ad-ba7e-4a073294e13c", "DetectTime": "2024-05-21T12:36:13.180430+00:00", "EventTime": "2024-05-21T12:36:13.180448+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzDPHr1bN7Iahl7U62"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "4ce941e3-59df-41f6-9d11-d97015db4092", "DetectTime": "2024-05-21T12:36:13.194136+00:00", "EventTime": "2024-05-21T12:36:13.194157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzDPHr1bN7Iahl7U62"], "accumulated_threat_level": 9.7, "timewindow": 25} +{"Format": "IDEA0", "ID": "b0acc3d5-2d22-4499-8277-fbf4ecef3511", "DetectTime": "2024-05-21T12:36:13.409967+00:00", "EventTime": "2024-05-21T12:36:13.409987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpgVi4h2qKrCUGmK4"], "accumulated_threat_level": 4.0, "timewindow": 89} +{"Format": "IDEA0", "ID": "a6ca5548-fe22-4fa6-8057-4065dc27ec6e", "DetectTime": "2024-05-21T12:36:13.458006+00:00", "EventTime": "2024-05-21T12:36:13.458023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrczV441b3OLDxeZJj"], "accumulated_threat_level": 4.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "492478fc-50c8-4b05-9f40-952ca0fb8fe5", "DetectTime": "2024-05-21T12:36:13.501058+00:00", "EventTime": "2024-05-21T12:36:13.501077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQtE1C36nqbTk22Cx1"], "accumulated_threat_level": 5.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "bf5da3e1-9222-47b4-9a25-0612d2d31e46", "DetectTime": "2024-05-21T12:36:13.514170+00:00", "EventTime": "2024-05-21T12:36:13.514188+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GYA116erXIvjBEdh"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "1b280ed6-74b9-46c8-99a9-96ee67880773", "DetectTime": "2024-05-21T12:36:13.527684+00:00", "EventTime": "2024-05-21T12:36:13.527703+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1GYA116erXIvjBEdh"], "accumulated_threat_level": 10.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "e02621b9-f45b-4f0d-a8b2-b0263ac8876b", "DetectTime": "2024-05-21T12:36:13.532597+00:00", "EventTime": "2024-05-21T12:36:13.532615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY5QtX1Q4sZ4055cL1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "f7b427b8-3f78-4cdd-a969-a329cfee4684", "DetectTime": "2024-05-21T12:36:13.563282+00:00", "EventTime": "2024-05-21T12:36:13.563305+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bGqg3V2mnPKN55bg"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "71579e8e-c53f-4e93-a403-722ab8d53454", "DetectTime": "2024-05-21T12:36:13.576188+00:00", "EventTime": "2024-05-21T12:36:13.576208+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bGqg3V2mnPKN55bg"], "accumulated_threat_level": 10.7, "timewindow": 25} +{"Format": "IDEA0", "ID": "10b6e01b-5525-40c6-9e4b-0f7be50131cc", "DetectTime": "2024-05-21T12:36:13.581358+00:00", "EventTime": "2024-05-21T12:36:13.581376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ2deI3Zusz05aRKhf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "b0a942c9-9c50-477b-9b8f-d62d83eb80f1", "DetectTime": "2024-05-21T12:36:13.596627+00:00", "EventTime": "2024-05-21T12:36:13.596654+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDDLR1xQDnQKcsDyf"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "a5710d6d-358e-4121-a36a-5fe783699297", "DetectTime": "2024-05-21T12:36:13.610034+00:00", "EventTime": "2024-05-21T12:36:13.610053+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDDLR1xQDnQKcsDyf"], "accumulated_threat_level": 11.2, "timewindow": 25} +{"Format": "IDEA0", "ID": "98d70b4f-f726-491c-be11-2445dd3310ab", "DetectTime": "2024-05-21T12:36:13.615921+00:00", "EventTime": "2024-05-21T12:36:13.615941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcB4HO32vW29BbeVk8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "0f07b5fb-e4a2-417a-92b4-2b5eab8f5f6c", "DetectTime": "2024-05-21T12:36:13.628001+00:00", "EventTime": "2024-05-21T12:36:13.628020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7T0lD44w7dK3DgVFh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 89} +{"Format": "IDEA0", "ID": "1cf28d3a-b42e-473d-936c-ce85a3043089", "DetectTime": "2024-05-21T12:36:13.640412+00:00", "EventTime": "2024-05-21T12:36:13.640430+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctOL54xct8lhiGs85"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "2aaeac7e-d746-4056-9f2c-a2e338ce73a2", "DetectTime": "2024-05-21T12:36:13.657068+00:00", "EventTime": "2024-05-21T12:36:13.657089+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctOL54xct8lhiGs85"], "accumulated_threat_level": 11.7, "timewindow": 25} +{"Format": "IDEA0", "ID": "65514e96-d2e3-4ca3-aa27-577e3d6bf04b", "DetectTime": "2024-05-21T12:36:13.669799+00:00", "EventTime": "2024-05-21T12:36:13.669817+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVyhT2NBEgkBEHzcg"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "26ec2570-9ed3-4818-aee1-54e15604172a", "DetectTime": "2024-05-21T12:36:13.683647+00:00", "EventTime": "2024-05-21T12:36:13.683666+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVyhT2NBEgkBEHzcg"], "accumulated_threat_level": 12.2, "timewindow": 25} +{"Format": "Json", "ID": "26ec2570-9ed3-4818-aee1-54e15604172a", "DetectTime": "2024-05-21T12:36:13.683647+00:00", "EventTime": "2024-05-21T12:36:13.683666+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "1970-01-02T00:15:00.342015+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:36:14.156793)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "0db4fd84-4895-428a-87b4-0abf65a79e81", "DetectTime": "2024-05-21T12:36:14.161978+00:00", "EventTime": "2024-05-21T12:36:14.162001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWTab4iLqQfF09I5i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "d2767d29-a979-4383-ad1f-69cf945380a4", "DetectTime": "2024-05-21T12:36:14.174303+00:00", "EventTime": "2024-05-21T12:36:14.174320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMtFj2svgH30Bwpjj"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "cf815d71-ab68-4191-b04c-ea9f4019132a", "DetectTime": "2024-05-21T12:36:14.191596+00:00", "EventTime": "2024-05-21T12:36:14.191622+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMtFj2svgH30Bwpjj"], "accumulated_threat_level": 0.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "9d169463-893c-4003-ab8a-be815ae8a249", "DetectTime": "2024-05-21T12:36:14.199502+00:00", "EventTime": "2024-05-21T12:36:14.199525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZyFg4vO7vbGrTzMe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "534d9757-084c-432f-9f43-fcf8b4be0058", "DetectTime": "2024-05-21T12:36:14.212869+00:00", "EventTime": "2024-05-21T12:36:14.212888+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LEeE2VhuSK9R47c9"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "acbf4001-4c78-4431-8034-50debcca7019", "DetectTime": "2024-05-21T12:36:14.227823+00:00", "EventTime": "2024-05-21T12:36:14.227850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LEeE2VhuSK9R47c9"], "accumulated_threat_level": 1.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "6ea83d13-79bd-4ce3-8acb-dfd5335bf8a3", "DetectTime": "2024-05-21T12:36:14.242152+00:00", "EventTime": "2024-05-21T12:36:14.242175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUjfQb1UYGRsonoJb5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "fe24e8c9-5a5a-4154-b0cc-5394181f0d5d", "DetectTime": "2024-05-21T12:36:14.255750+00:00", "EventTime": "2024-05-21T12:36:14.255775+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4Z004FW68B6ySseh"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "83d83b4e-5de9-4c53-8bc8-a0dcdeaad96a", "DetectTime": "2024-05-21T12:36:14.261262+00:00", "EventTime": "2024-05-21T12:36:14.261280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzzOtJynuhd0xi1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "5eb7cf14-89aa-466d-861b-c9796690ec30", "DetectTime": "2024-05-21T12:36:14.273796+00:00", "EventTime": "2024-05-21T12:36:14.273816+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4Z004FW68B6ySseh"], "accumulated_threat_level": 1.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "3fb332af-60dc-46b8-ade9-165bf7a70674", "DetectTime": "2024-05-21T12:36:14.279256+00:00", "EventTime": "2024-05-21T12:36:14.279273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUAWtg2cUk7y38kCm"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "80431518-5688-413b-9a83-322f8585ab9c", "DetectTime": "2024-05-21T12:36:14.283788+00:00", "EventTime": "2024-05-21T12:36:14.283806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqDEj45W4UCiGJMK"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "a2554433-48b0-4dc3-90ad-ab81f34b8718", "DetectTime": "2024-05-21T12:36:14.288186+00:00", "EventTime": "2024-05-21T12:36:14.288204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.166.194.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsbgvJFmRlRsczo8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "de42bd88-e0a8-411e-9aa5-91cd65a99a57", "DetectTime": "2024-05-21T12:36:14.299407+00:00", "EventTime": "2024-05-21T12:36:14.299430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iZrkhT42TCPGw7h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "e91922eb-be70-43d8-8c2b-5b40df9f4238", "DetectTime": "2024-05-21T12:36:14.304575+00:00", "EventTime": "2024-05-21T12:36:14.304596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C567G8oao5R1Wgkz"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "08667e0d-d20c-4fcd-85fe-57729e93b4d8", "DetectTime": "2024-05-21T12:36:14.309575+00:00", "EventTime": "2024-05-21T12:36:14.309594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.208.182.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zk3UbNPtdwBj8A"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3b98cced-0663-42fb-96b9-5f3c822fb41e", "DetectTime": "2024-05-21T12:36:14.315905+00:00", "EventTime": "2024-05-21T12:36:14.315923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvRk8WW8eak0I255"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "68dcdc2d-7b88-454b-9284-2b65a1ddccec", "DetectTime": "2024-05-21T12:36:14.320429+00:00", "EventTime": "2024-05-21T12:36:14.320446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBn0p02mgVYoWpJ233"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "1f952b44-c111-405f-a020-8f6eee807fc2", "DetectTime": "2024-05-21T12:36:14.324841+00:00", "EventTime": "2024-05-21T12:36:14.324859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 23.24.76.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQIy3c4L8EWdBObA6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e6a43e59-711a-4df2-9144-64fbf08e2f3b", "DetectTime": "2024-05-21T12:36:14.735113+00:00", "EventTime": "2024-05-21T12:36:14.735134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.39.67.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBsNc41NAUm76Nc93"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "ba9ed915-24c9-41d3-aec6-ca52b1d70afd", "DetectTime": "2024-05-21T12:36:14.745865+00:00", "EventTime": "2024-05-21T12:36:14.745886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.53.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPCp9Q3syOtfNpcfOk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "92af066f-d459-4d99-a961-d9c2875ee4ea", "DetectTime": "2024-05-21T12:36:14.751717+00:00", "EventTime": "2024-05-21T12:36:14.751736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.122.81.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8bpgl1puqOs6YQkLi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "5e0fcac0-b319-48d2-866a-e91b5bf471ba", "DetectTime": "2024-05-21T12:36:14.758148+00:00", "EventTime": "2024-05-21T12:36:14.758171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVSUqm1liLTekvr0Gi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "21042167-540b-4188-96f1-a58895408e1e", "DetectTime": "2024-05-21T12:36:14.763757+00:00", "EventTime": "2024-05-21T12:36:14.763778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.134.200.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwUSSj2hXPzJcgCDHl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2d88df43-4ab4-4909-8c2e-f1c3a28bf19d", "DetectTime": "2024-05-21T12:36:14.769709+00:00", "EventTime": "2024-05-21T12:36:14.769729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.7.208.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAssnx31pyp7YvyR78"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "75bf0bf1-fac4-44a3-9acd-8853b0e22e81", "DetectTime": "2024-05-21T12:36:14.775537+00:00", "EventTime": "2024-05-21T12:36:14.775556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.157.7.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COzGTd4qewq0F4aGPj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "9f88d14b-90dc-4b77-9b48-f1b7a9040e9e", "DetectTime": "2024-05-21T12:36:14.781041+00:00", "EventTime": "2024-05-21T12:36:14.781062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.236.103.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTQlA1eK4xr2m8mv"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "41cc1601-6249-40cb-81b4-5f669e564d59", "DetectTime": "2024-05-21T12:36:14.787891+00:00", "EventTime": "2024-05-21T12:36:14.787911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrCvwvPNOZeyeVWb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2a67f268-d7d8-4a56-a1a8-71cf5a3db01b", "DetectTime": "2024-05-21T12:36:14.889412+00:00", "EventTime": "2024-05-21T12:36:14.889430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 196.215.160.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxffVWcDFcvo1GBIb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2e5d3f0d-3541-437b-9070-8153d148db44", "DetectTime": "2024-05-21T12:36:14.973557+00:00", "EventTime": "2024-05-21T12:36:14.973576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.74.153.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAsSF1TwJMAzt9rD6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "97679532-f1fb-4623-b976-d2eb17e10ccb", "DetectTime": "2024-05-21T12:36:15.292820+00:00", "EventTime": "2024-05-21T12:36:15.292843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.194.118.70 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKuUD2yqDIU9INnL5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e7344786-6013-42af-8acd-fb14cdbed552", "DetectTime": "2024-05-21T12:36:15.299533+00:00", "EventTime": "2024-05-21T12:36:15.299551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD0S7Q2mJDDRRtjqFc", "CbZjqD3FViXa88FnT4", "C0LOLj3VTwbdxRc2D", "Cr699n1HyIr2JRn39a"], "accumulated_threat_level": 8.5, "timewindow": 89} +{"Format": "IDEA0", "ID": "ddb754db-e99d-4382-b9ca-fe62502534b9", "DetectTime": "2024-05-21T12:36:15.304101+00:00", "EventTime": "2024-05-21T12:36:15.304122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.183.131.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKPKQX2Okvpv7tqz42"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "0eee5d28-04e1-4684-8ffb-ee4097df8cbe", "DetectTime": "2024-05-21T12:36:15.379508+00:00", "EventTime": "2024-05-21T12:36:15.379542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwKIc2lQpq0orYls2"], "accumulated_threat_level": 9.3, "timewindow": 89} +{"Format": "IDEA0", "ID": "4c259751-1502-46d6-89b8-49c5f8df738a", "DetectTime": "2024-05-21T12:36:15.475247+00:00", "EventTime": "2024-05-21T12:36:15.475268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.20.182.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccfoc71sxwgnpRJHa1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c29a0d6b-2fa9-4283-94ab-41953e908852", "DetectTime": "2024-05-21T12:36:15.481965+00:00", "EventTime": "2024-05-21T12:36:15.481987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.109.200.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFoKX2XdwODt6y2U"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "ce3e991d-e816-48ca-9ab8-2e4cecf16b77", "DetectTime": "2024-05-21T12:36:15.486670+00:00", "EventTime": "2024-05-21T12:36:15.486690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.216.177.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYiyu31Ap0fTY58h7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "00dc3085-694c-4544-9a40-1f5ffcc57220", "DetectTime": "2024-05-21T12:36:15.494747+00:00", "EventTime": "2024-05-21T12:36:15.494769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 59.182.136.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7J8n2MDf1hE337Gk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "6e92c8b4-8184-448d-adf1-e69dd7d25470", "DetectTime": "2024-05-21T12:36:15.629580+00:00", "EventTime": "2024-05-21T12:36:15.629601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.1.138.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yi9z2V3FsRBeU2b4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "ba7ba10a-f83b-428b-86e1-26d1c8075b86", "DetectTime": "2024-05-21T12:36:15.641358+00:00", "EventTime": "2024-05-21T12:36:15.641383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfxWs149luX74I0QNl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 89} +{"Format": "IDEA0", "ID": "344acebd-e7e2-4ddb-b4dd-2a69579a6bee", "DetectTime": "2024-05-21T12:36:15.698358+00:00", "EventTime": "2024-05-21T12:36:15.698380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.139.132.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWiOs1b7nBdf7OjK7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4a361969-ebd3-48c8-aa33-e0379e2f1277", "DetectTime": "2024-05-21T12:36:15.704938+00:00", "EventTime": "2024-05-21T12:36:15.704960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CijJdwxKd2GXn94U5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2ea5b567-7e8d-4b5d-86ae-8f838ea52c63", "DetectTime": "2024-05-21T12:36:15.718129+00:00", "EventTime": "2024-05-21T12:36:15.718153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Co401ITyaKBUeGQ7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "71bd7a7e-fa2b-45eb-806c-e5cdb6fc943f", "DetectTime": "2024-05-21T12:36:15.979754+00:00", "EventTime": "2024-05-21T12:36:15.979775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.97.28.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WyBD3ekylGy57msk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "996cc37d-3b51-4437-adf5-ea5dea37b1f6", "DetectTime": "2024-05-21T12:36:16.008889+00:00", "EventTime": "2024-05-21T12:36:16.008911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.225.178.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSA4toJehbd9ZfnHb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4b7c307a-a0a8-4790-8fc1-29e419c88e42", "DetectTime": "2024-05-21T12:36:16.111690+00:00", "EventTime": "2024-05-21T12:36:16.111715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.253.14.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgc1xJ3nTfVxf886xd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "f0450f07-4fa2-4852-9fd4-d3199982ea16", "DetectTime": "2024-05-21T12:36:16.118225+00:00", "EventTime": "2024-05-21T12:36:16.118250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.28.238.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBPiX2q3eDEiYVsj1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e6d9fe5c-7b6c-41eb-bc5e-5fe8f77ece3b", "DetectTime": "2024-05-21T12:36:16.132611+00:00", "EventTime": "2024-05-21T12:36:16.132632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVobTz1NzLPPwiIozl"], "accumulated_threat_level": 10.900000000000002, "timewindow": 89} +{"Format": "IDEA0", "ID": "e5680907-ec72-4c2e-aed8-99f229216e6c", "DetectTime": "2024-05-21T12:36:16.138013+00:00", "EventTime": "2024-05-21T12:36:16.138034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.146.6.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqWTx1SvDsrrMZGPl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c95b78bf-ffd4-4f49-98fd-056779b94659", "DetectTime": "2024-05-21T12:36:16.168519+00:00", "EventTime": "2024-05-21T12:36:16.168539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.231.149.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC85qnOQFElcz4Cpj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "b37a533d-04d1-47aa-93ff-0284912458cf", "DetectTime": "2024-05-21T12:36:16.262487+00:00", "EventTime": "2024-05-21T12:36:16.262513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.221.166.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbbDJe1BnRnyV9b1i3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "6a0d7175-2094-4504-98ee-975f08cea212", "DetectTime": "2024-05-21T12:36:16.515236+00:00", "EventTime": "2024-05-21T12:36:16.515257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcidb3zAj9ts75xO"], "accumulated_threat_level": 11.700000000000003, "timewindow": 89} +{"Format": "IDEA0", "ID": "bb07442c-831b-40fd-9eff-fe4c52e7a4f2", "DetectTime": "2024-05-21T12:36:16.537216+00:00", "EventTime": "2024-05-21T12:36:16.537239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvp1Nf3ucpZMdcUaK9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "9172b09c-a7e3-4304-903e-19e47e90e045", "DetectTime": "2024-05-21T12:36:16.542653+00:00", "EventTime": "2024-05-21T12:36:16.542671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.70.205.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMttvZ8IdOTPP2y7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "47c899ca-1c14-481a-8dcc-c9ce3b4050d6", "DetectTime": "2024-05-21T12:36:16.606576+00:00", "EventTime": "2024-05-21T12:36:16.606597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPqhef1xym3D1IBFr3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 89} +{"Format": "Json", "ID": "47c899ca-1c14-481a-8dcc-c9ce3b4050d6", "DetectTime": "2024-05-21T12:36:16.606576+00:00", "EventTime": "2024-05-21T12:36:16.606597+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "1970-01-04T16:12:36.866035+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2024/05/21 12:36:17.099184)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 89, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "ba47fc7b-d6ce-4c8f-a1d5-9f140feb83a3", "DetectTime": "2024-05-21T12:36:17.110513+00:00", "EventTime": "2024-05-21T12:36:17.110535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clf3KH19U9OjeHEm5l"], "accumulated_threat_level": 0.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "791004d1-13df-43f1-a15b-253ce5f528c0", "DetectTime": "2024-05-21T12:36:17.116316+00:00", "EventTime": "2024-05-21T12:36:17.116337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQxREss3rPFgXz081"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "29838165-1557-4f2f-93eb-4dc918f2b3af", "DetectTime": "2024-05-21T12:36:17.127862+00:00", "EventTime": "2024-05-21T12:36:17.127882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cew0tC2DqEgNUsOQ8j"], "accumulated_threat_level": 1.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "9cdd28ce-401a-4d13-8d84-e0584b037f4e", "DetectTime": "2024-05-21T12:36:17.139862+00:00", "EventTime": "2024-05-21T12:36:17.139883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMlUNqBy8xMMWfBxe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 89} +{"Format": "IDEA0", "ID": "30de2c49-d75a-47d8-80a1-4498c2ddb204", "DetectTime": "2024-05-21T12:36:17.144741+00:00", "EventTime": "2024-05-21T12:36:17.144758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.247.65.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmLGOz1C98XQBS9Ug6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "742ac624-f1c2-4ea7-bb8a-70dd80432ba2", "DetectTime": "2024-05-21T12:36:17.158772+00:00", "EventTime": "2024-05-21T12:36:17.158794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 23.30.177.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjwmj917rrfh6mwAte"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "39e6364d-d21b-4173-b40a-3e09d492c378", "DetectTime": "2024-05-21T12:36:17.163870+00:00", "EventTime": "2024-05-21T12:36:17.163888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKIAf2kZEfQLsaCQ7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "fe4c4983-a99d-446a-8918-b3b8a0176e6c", "DetectTime": "2024-05-21T12:36:17.168271+00:00", "EventTime": "2024-05-21T12:36:17.168289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.98.145.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHkcD3iVPeFFq0px6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "b579f263-34df-4380-9d02-631c2e618b46", "DetectTime": "2024-05-21T12:36:17.172587+00:00", "EventTime": "2024-05-21T12:36:17.172604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.253.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwIxSR1Ntv3UyZYFv2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3a648ebc-86bf-4e6d-9ade-f0c05951d9c4", "DetectTime": "2024-05-21T12:36:17.176918+00:00", "EventTime": "2024-05-21T12:36:17.176936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.196.162.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQkxO1fQWDu2wyece"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "731ebc00-7661-47c7-820d-ebaab38d7075", "DetectTime": "2024-05-21T12:36:17.181296+00:00", "EventTime": "2024-05-21T12:36:17.181314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.58.15.211 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLqjv3rAkFwSK5JLj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c444ee96-7396-41a0-af53-fcc8f47c3aab", "DetectTime": "2024-05-21T12:36:17.185937+00:00", "EventTime": "2024-05-21T12:36:17.185955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTTUWd4kycAtxecMxb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "a60f190b-939e-48d8-baa7-496cb66f585b", "DetectTime": "2024-05-21T12:36:17.190805+00:00", "EventTime": "2024-05-21T12:36:17.190825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.119.61.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJFNB37sdxVQbVrF3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "db1a9ec1-baa3-444e-9577-75c52b3416fb", "DetectTime": "2024-05-21T12:36:17.295316+00:00", "EventTime": "2024-05-21T12:36:17.295335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CobZco3TeqLDQ9FbH"], "accumulated_threat_level": 3.2, "timewindow": 89} +{"Format": "IDEA0", "ID": "609e9dd2-791f-4367-9fe8-93ff215c1169", "DetectTime": "2024-05-21T12:36:17.403996+00:00", "EventTime": "2024-05-21T12:36:17.404017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 39.41.115.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Bh104WkEBnDigWD1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e8720ad7-7a51-4132-89a1-d7c6d8a4bfbd", "DetectTime": "2024-05-21T12:36:17.606578+00:00", "EventTime": "2024-05-21T12:36:17.606601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 27.3.194.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0rMUt2c3nTwe8pyi5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "5a5384b7-f54b-4b28-a89b-7232725a5e31", "DetectTime": "2024-05-21T12:36:17.611680+00:00", "EventTime": "2024-05-21T12:36:17.611698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.75.48.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36oGq17CLifNHw3jd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c2d18fcf-6c66-4b4f-a7b7-3c248727cc5a", "DetectTime": "2024-05-21T12:36:17.617320+00:00", "EventTime": "2024-05-21T12:36:17.617342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.179.3.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ2QGx1W47ma3f9sn9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "430aeda2-96df-47f4-9cd0-5ad25d2fba29", "DetectTime": "2024-05-21T12:36:17.704905+00:00", "EventTime": "2024-05-21T12:36:17.704926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.199.91.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1BCE2feakcBEi9b8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "1cfe620c-0cac-4b06-8ca6-f6c241923f9f", "DetectTime": "2024-05-21T12:36:17.739702+00:00", "EventTime": "2024-05-21T12:36:17.739722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVnPGc40jMMhimpg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c43c41c2-8573-4767-a8e2-c003ef5440f4", "DetectTime": "2024-05-21T12:36:17.920872+00:00", "EventTime": "2024-05-21T12:36:17.920906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.239.253.243"]}], "Attach": [{"Content": "Connection to unknown destination port 26762/UDP destination IP 190.239.253.243. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosblG1BG5FFvsFkIl"], "accumulated_threat_level": 4.0, "timewindow": 89} +{"Format": "IDEA0", "ID": "d6676d50-653b-43d2-855a-c1aa372c46be", "DetectTime": "2024-05-21T12:36:17.950576+00:00", "EventTime": "2024-05-21T12:36:17.950598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKWgn3aKV1rOzo2W3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "89130237-cd36-4136-9753-0fab1a4ae58f", "DetectTime": "2024-05-21T12:36:17.999359+00:00", "EventTime": "2024-05-21T12:36:17.999379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.236.250.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVtba2F1VGElR2O9k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "43e4ca8f-62d5-48da-92bc-b36940cbbd83", "DetectTime": "2024-05-21T12:36:18.004580+00:00", "EventTime": "2024-05-21T12:36:18.004598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.33.110.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJjxL3RgjVRiB7LJ1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "028396c1-7643-440d-8aea-dab80399a0fd", "DetectTime": "2024-05-21T12:36:18.062738+00:00", "EventTime": "2024-05-21T12:36:18.062765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YPnZFcDBAP1rMM2"], "accumulated_threat_level": 4.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "cb1c5f53-1ef8-4aaa-a2b3-98cea275c062", "DetectTime": "2024-05-21T12:36:18.318603+00:00", "EventTime": "2024-05-21T12:36:18.318623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXKGbp1oHZQ8zDFv09"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "fbb770bd-dd28-443e-8d54-1790bdc36782", "DetectTime": "2024-05-21T12:36:18.347594+00:00", "EventTime": "2024-05-21T12:36:18.347614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.99.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTAWbRcPKGbQ6vo0d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "0b2c711b-6dcb-43f2-b65e-59caa346a96e", "DetectTime": "2024-05-21T12:36:18.406036+00:00", "EventTime": "2024-05-21T12:36:18.406058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.174.80.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clj1nO6mRsoBFmQp1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3df0273a-3ebe-4d52-88dd-7da5b708fbe8", "DetectTime": "2024-05-21T12:36:18.424690+00:00", "EventTime": "2024-05-21T12:36:18.424709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHlUF31JeEaK8p9IGk"], "accumulated_threat_level": 5.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "f3542f5f-22b2-4512-bb3c-278c380bb2ff", "DetectTime": "2024-05-21T12:36:18.429462+00:00", "EventTime": "2024-05-21T12:36:18.429480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.24.108.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTUBb02uRno2jNChxg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "34a62aeb-2c0d-474f-96a4-28966f81220a", "DetectTime": "2024-05-21T12:36:18.459575+00:00", "EventTime": "2024-05-21T12:36:18.459595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.52.183 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUGaFy2Kfe8Ise6Goe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "92333b8f-c375-47e6-bd62-803cfa5f80fe", "DetectTime": "2024-05-21T12:36:18.520056+00:00", "EventTime": "2024-05-21T12:36:18.520077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.207.218.206 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8uqCj4d3nUF8KZg52"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "1b1074cf-903e-4e53-a23c-e2d080046729", "DetectTime": "2024-05-21T12:36:18.552752+00:00", "EventTime": "2024-05-21T12:36:18.552771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.73.234.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNt2Da4HvMRorIR1r5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "f0f1ed01-9f08-4bc0-a9d4-148e0935e6ca", "DetectTime": "2024-05-21T12:36:18.592213+00:00", "EventTime": "2024-05-21T12:36:18.592234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.2.71.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKHbiWYavWcfK3pb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c3161524-1f99-47ae-ada0-771478a840cc", "DetectTime": "2024-05-21T12:36:18.621923+00:00", "EventTime": "2024-05-21T12:36:18.621947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.51.19.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cab9364oWVc2rejPGf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "90baddca-9deb-4a1b-baef-c145a8283e00", "DetectTime": "2024-05-21T12:36:18.646447+00:00", "EventTime": "2024-05-21T12:36:18.646469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.205.233.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQU6m1UgacEAROZJf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "26bf10a6-da39-47e3-b7bb-0f49833a980e", "DetectTime": "2024-05-21T12:36:18.856363+00:00", "EventTime": "2024-05-21T12:36:18.856383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAFUpJBEeldoVy9Cj", "CAzdsm2z4uhDaFA1ve", "CyHVZf34NfG7R4n754", "C8AEa5AOvjyQRYeLi"], "accumulated_threat_level": 6.1, "timewindow": 89} +{"Format": "IDEA0", "ID": "09eb7f85-d996-4119-a09b-9963249b3985", "DetectTime": "2024-05-21T12:36:18.900328+00:00", "EventTime": "2024-05-21T12:36:18.900349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.141.110.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEyjgU3cWDg1ulTkI"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "a656f0c8-f777-4c6c-b3da-4ced9995c703", "DetectTime": "2024-05-21T12:36:18.905248+00:00", "EventTime": "2024-05-21T12:36:18.905267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.225.128.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIq3ai3t8E0JkXbtAc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "d156147d-a807-4a93-a51c-1a09e9618d21", "DetectTime": "2024-05-21T12:36:18.909944+00:00", "EventTime": "2024-05-21T12:36:18.909964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQSDt1yu8gqQP5tad"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4d2e5456-da23-4d4e-9769-5a3dab11220d", "DetectTime": "2024-05-21T12:36:18.921680+00:00", "EventTime": "2024-05-21T12:36:18.921701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEG2us4UBq2IxnQkIh"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 89} +{"Format": "IDEA0", "ID": "96bd992e-9e27-44bf-b60a-3069b515356b", "DetectTime": "2024-05-21T12:36:19.032241+00:00", "EventTime": "2024-05-21T12:36:19.032262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhzm81ViPvGenhvpa"], "accumulated_threat_level": 7.699999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "fb826495-4a46-4ce9-91c5-1123dcf15b8f", "DetectTime": "2024-05-21T12:36:19.061042+00:00", "EventTime": "2024-05-21T12:36:19.061062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3wb03Osox94gpwKc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "a34337fe-53a7-4558-b7a3-74375d7d7172", "DetectTime": "2024-05-21T12:36:19.096113+00:00", "EventTime": "2024-05-21T12:36:19.096133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKD8UqfysTGtkskf1"], "accumulated_threat_level": 8.5, "timewindow": 89} +{"Format": "IDEA0", "ID": "f36bd9e2-acde-4545-adf1-2e0494d190ba", "DetectTime": "2024-05-21T12:36:19.136210+00:00", "EventTime": "2024-05-21T12:36:19.136229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPfMGE2phCbdBPzcCf"], "accumulated_threat_level": 9.3, "timewindow": 89} +{"Format": "IDEA0", "ID": "a6c5f591-7e6a-4be9-a157-5acad7393d76", "DetectTime": "2024-05-21T12:36:19.410227+00:00", "EventTime": "2024-05-21T12:36:19.410248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6fTYd6rfgZHRGM6a"], "accumulated_threat_level": 10.100000000000001, "timewindow": 89} +{"Format": "IDEA0", "ID": "d90ad708-5757-49b0-8501-bccef6ea5a19", "DetectTime": "2024-05-21T12:36:19.442342+00:00", "EventTime": "2024-05-21T12:36:19.442362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLV40A4S9eyFP4sS52"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "21f2cccd-e58d-4df4-97f0-905a998a01e3", "DetectTime": "2024-05-21T12:36:19.478809+00:00", "EventTime": "2024-05-21T12:36:19.478829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJhWt20BSmpnKNE9a"], "accumulated_threat_level": 10.900000000000002, "timewindow": 89} +{"Format": "IDEA0", "ID": "8385e9a3-d370-49a7-859b-f51779c4e825", "DetectTime": "2024-05-21T12:36:19.519629+00:00", "EventTime": "2024-05-21T12:36:19.519653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF94D3xwxZwEzBGqe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "333ec9c1-083d-4bce-aa5c-62b4525c34b5", "DetectTime": "2024-05-21T12:36:19.531700+00:00", "EventTime": "2024-05-21T12:36:19.531720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkwG21liqlJtQOWR3"], "accumulated_threat_level": 11.700000000000003, "timewindow": 89} +{"Format": "IDEA0", "ID": "ad2277db-7aa3-4241-9c5e-0466bc0cfc7e", "DetectTime": "2024-05-21T12:36:19.583485+00:00", "EventTime": "2024-05-21T12:36:19.583505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.176.227.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn6ff44DxbVlpWlRv6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "6081f071-335a-4709-9bc4-26c523de60ad", "DetectTime": "2024-05-21T12:36:19.644823+00:00", "EventTime": "2024-05-21T12:36:19.644843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.167.82.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Kc161a9kJ347v3Hh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "099d8b4c-4867-4574-af7f-d628e86c940c", "DetectTime": "2024-05-21T12:36:19.650321+00:00", "EventTime": "2024-05-21T12:36:19.650344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.5.202.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbxfd4Iy3mi1Xeo34"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2b897bb7-9c24-445b-9baa-a99bbceafc94", "DetectTime": "2024-05-21T12:36:19.655848+00:00", "EventTime": "2024-05-21T12:36:19.655868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bwoA4J0al0ld7sSi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2778e04e-773f-4e8c-866d-23a61f2bd4c0", "DetectTime": "2024-05-21T12:36:19.759321+00:00", "EventTime": "2024-05-21T12:36:19.759340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBFcB4uVJUEPJufdg"], "accumulated_threat_level": 12.500000000000004, "timewindow": 89} +{"Format": "Json", "ID": "2778e04e-773f-4e8c-866d-23a61f2bd4c0", "DetectTime": "2024-05-21T12:36:19.759321+00:00", "EventTime": "2024-05-21T12:36:19.759340+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "1970-01-04T16:43:55.232749+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2024/05/21 12:36:20.035127)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 89, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "73e6d164-6e8a-4d9d-ae15-ef812124ac61", "DetectTime": "2024-05-21T12:36:20.039818+00:00", "EventTime": "2024-05-21T12:36:20.039836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.109.94.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUunlD3mQ8bcl7UPDi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c2c2ec6c-b444-4e2e-822f-bdde6919b974", "DetectTime": "2024-05-21T12:36:20.044651+00:00", "EventTime": "2024-05-21T12:36:20.044673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.227.166.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHxDs44jvjbiZl9Yb5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "93262357-8ceb-49ca-9b9c-558006679cdf", "DetectTime": "2024-05-21T12:36:20.049786+00:00", "EventTime": "2024-05-21T12:36:20.049807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ7T3gpCJfxOrykic"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "775d7011-bbee-46a6-a0cc-3a18d7e82341", "DetectTime": "2024-05-21T12:36:20.139800+00:00", "EventTime": "2024-05-21T12:36:20.139822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.130.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CicVKr2lTqZCLHyccl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "eb38df5c-85d4-43f3-ae07-0aeb8d2990bb", "DetectTime": "2024-05-21T12:36:20.148704+00:00", "EventTime": "2024-05-21T12:36:20.148724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.1.94.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Dx0y1BH6BrCvwGP2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c1c39354-9791-4a0a-8152-3d618c39b8c6", "DetectTime": "2024-05-21T12:36:20.154923+00:00", "EventTime": "2024-05-21T12:36:20.154943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.235.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8KsO92aT09tOkBJJ"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e4e4872e-3b0f-4c11-b4d0-14ff0b0c733b", "DetectTime": "2024-05-21T12:36:20.159915+00:00", "EventTime": "2024-05-21T12:36:20.159935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.25.116.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnp4KU2A6r6Z2nZBd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "87dabf3b-2c0f-4bb5-b145-9c846011f088", "DetectTime": "2024-05-21T12:36:20.172773+00:00", "EventTime": "2024-05-21T12:36:20.172793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.223.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Uzz03QRAwaGQsiof"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "dd923250-9fb6-4794-9244-9b78107f8772", "DetectTime": "2024-05-21T12:36:20.178067+00:00", "EventTime": "2024-05-21T12:36:20.178092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.72.118.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cys3hH39qNgZ6V4o69"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "b89c5279-30ca-483b-b159-6b6f40739686", "DetectTime": "2024-05-21T12:36:20.183785+00:00", "EventTime": "2024-05-21T12:36:20.183807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWdUXe1dAl2D0nP3fh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c16e65c5-fef7-4550-a401-7fe46fa66ecf", "DetectTime": "2024-05-21T12:36:20.202823+00:00", "EventTime": "2024-05-21T12:36:20.202844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5INl1Jd2heLyfnNl"], "accumulated_threat_level": 0.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "b816032e-97ba-4850-95da-834c088c0985", "DetectTime": "2024-05-21T12:36:20.305522+00:00", "EventTime": "2024-05-21T12:36:20.305543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.149.132.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5xvNF1Bljyhfh95G5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "31ec4bbd-e2f2-4895-9416-4a47f26fda5f", "DetectTime": "2024-05-21T12:36:20.334978+00:00", "EventTime": "2024-05-21T12:36:20.335011+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C98izD2Mhv9S1BK1U6"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "e7db94f0-3ebb-481a-8bd2-5a38a15d0983", "DetectTime": "2024-05-21T12:36:20.349241+00:00", "EventTime": "2024-05-21T12:36:20.349260+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C98izD2Mhv9S1BK1U6"], "accumulated_threat_level": 2.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "6e3bc218-6748-41bf-8f5c-5ade24042007", "DetectTime": "2024-05-21T12:36:20.603487+00:00", "EventTime": "2024-05-21T12:36:20.603512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 114.79.0.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosotY295U0ys6Sfs6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3ce2b4bf-d22f-401a-a774-16a71601479f", "DetectTime": "2024-05-21T12:36:20.640623+00:00", "EventTime": "2024-05-21T12:36:20.640646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALbcp42CWQNJTvyB2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "34b705d7-1fe3-4219-ac79-8a1de9f5cb7f", "DetectTime": "2024-05-21T12:36:20.678129+00:00", "EventTime": "2024-05-21T12:36:20.678148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.119.163.4 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCLwf3CG8zabJNVce"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "7a8a5aa0-c934-41a2-9483-3909e253027e", "DetectTime": "2024-05-21T12:36:20.712829+00:00", "EventTime": "2024-05-21T12:36:20.712853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.3.226.73"]}], "Attach": [{"Content": "Connection to unknown destination port 11075/UDP destination IP 87.3.226.73. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RWFN2vlvxZQYWW08"], "accumulated_threat_level": 1.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "f2e85605-812d-470e-bea0-f34b9bf9ff32", "DetectTime": "2024-05-21T12:36:20.726212+00:00", "EventTime": "2024-05-21T12:36:20.726233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.27.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxV1g174RhVLXsHae"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "743a3010-7ac4-4a8c-8671-d7cbeaf2bdb4", "DetectTime": "2024-05-21T12:36:20.739572+00:00", "EventTime": "2024-05-21T12:36:20.739592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.27.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxV1g174RhVLXsHae"], "accumulated_threat_level": 2.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "b83e0c35-f246-4881-8966-cc4862be811d", "DetectTime": "2024-05-21T12:36:20.745013+00:00", "EventTime": "2024-05-21T12:36:20.745034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 207.237.76.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLCrvhx9XuNRI9s9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "e5ccd1cc-3397-45c0-a544-086e1e5e713b", "DetectTime": "2024-05-21T12:36:20.788975+00:00", "EventTime": "2024-05-21T12:36:20.788996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.45.110.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqEsJ16LINX5jubk7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "8d889e12-9141-4e50-b32c-07d9ee5e3482", "DetectTime": "2024-05-21T12:36:20.822177+00:00", "EventTime": "2024-05-21T12:36:20.822197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ivvl3vaHOx201jJd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 89} +{"Format": "IDEA0", "ID": "64184ca9-a9e4-4319-912d-112dc93b62f3", "DetectTime": "2024-05-21T12:36:20.840919+00:00", "EventTime": "2024-05-21T12:36:20.840938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.173.238.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.173.238.41 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU6PN19dyzUsNl1Ka"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "bae30665-2cf5-49b7-8e7a-0f597b71f8b6", "DetectTime": "2024-05-21T12:36:20.855078+00:00", "EventTime": "2024-05-21T12:36:20.855099+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.173.238.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.173.238.41 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU6PN19dyzUsNl1Ka"], "accumulated_threat_level": 3.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "6cf1e0a9-bd89-4f49-8771-e4aa9fad1624", "DetectTime": "2024-05-21T12:36:20.860333+00:00", "EventTime": "2024-05-21T12:36:20.860355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.166.221.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuI9d93BPtHug4qLhf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c0d9d856-783a-4db7-8ab8-6b44b710fb53", "DetectTime": "2024-05-21T12:36:20.909745+00:00", "EventTime": "2024-05-21T12:36:20.909765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFV783bMe7otKyXp4"], "accumulated_threat_level": 3.2, "timewindow": 89} +{"Format": "IDEA0", "ID": "973dd95b-7f75-4410-b4a8-b52c8032c3b0", "DetectTime": "2024-05-21T12:36:20.960250+00:00", "EventTime": "2024-05-21T12:36:20.960272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyEFi13kAZi8IMV4f"], "accumulated_threat_level": 4.0, "timewindow": 89} +{"Format": "IDEA0", "ID": "5218c66b-71c1-48ba-ba64-ac4967f51335", "DetectTime": "2024-05-21T12:36:21.223390+00:00", "EventTime": "2024-05-21T12:36:21.223412+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.92.75.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpyi24XthCh2IBKVg"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "f32e15a0-5338-4833-bd31-956930ab5702", "DetectTime": "2024-05-21T12:36:21.243741+00:00", "EventTime": "2024-05-21T12:36:21.243761+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.92.75.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpyi24XthCh2IBKVg"], "accumulated_threat_level": 3.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "46ce443b-41ee-4bd4-8cc0-f8dce9cc9d26", "DetectTime": "2024-05-21T12:36:21.248751+00:00", "EventTime": "2024-05-21T12:36:21.248772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG4cSy4JqBOtvHAmTb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "b4c8eba1-2af1-42cc-815c-2af913fb011f", "DetectTime": "2024-05-21T12:36:21.254328+00:00", "EventTime": "2024-05-21T12:36:21.254350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 197.206.3.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBYOirogklAGJ1OBh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "94c5a31e-a792-4715-a3d1-e8ce65d2afa7", "DetectTime": "2024-05-21T12:36:21.268029+00:00", "EventTime": "2024-05-21T12:36:21.268048+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["49.49.17.72"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1Mmh3IwsVixcrht7"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "1320360d-c4fa-4acd-8ddc-39a150a66242", "DetectTime": "2024-05-21T12:36:21.281773+00:00", "EventTime": "2024-05-21T12:36:21.281795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1Mmh3IwsVixcrht7"], "accumulated_threat_level": 4.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d6e9c5fb-40a6-4611-a6f3-750633ef1c17", "DetectTime": "2024-05-21T12:36:21.300565+00:00", "EventTime": "2024-05-21T12:36:21.300583+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.208.123.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch4vRj1IIp8RkOYbLj"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "74cee8d2-dea4-41c9-9031-aea60c7348c4", "DetectTime": "2024-05-21T12:36:21.313546+00:00", "EventTime": "2024-05-21T12:36:21.313565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch4vRj1IIp8RkOYbLj"], "accumulated_threat_level": 4.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "434bce97-b3df-4d5f-a97f-1a7e474d6d00", "DetectTime": "2024-05-21T12:36:21.328504+00:00", "EventTime": "2024-05-21T12:36:21.328525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Che5gC4fU0vATuWqMa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "7731737b-fb21-4c53-9110-a2c31e36293b", "DetectTime": "2024-05-21T12:36:21.341549+00:00", "EventTime": "2024-05-21T12:36:21.341567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.183.152"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZv4Dq34HqpSlB5Mcl"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "3ae8e741-ff10-4fb5-ac4a-64a08e811f53", "DetectTime": "2024-05-21T12:36:21.354195+00:00", "EventTime": "2024-05-21T12:36:21.354214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.183.152"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZv4Dq34HqpSlB5Mcl"], "accumulated_threat_level": 5.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "4f1bc2e8-1af7-48a2-a6fb-ea2e57fba610", "DetectTime": "2024-05-21T12:36:21.374964+00:00", "EventTime": "2024-05-21T12:36:21.374983+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.93.140.11"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4gM54j82uE99l1X1"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d67ca705-9740-448c-be88-5c37188cc300", "DetectTime": "2024-05-21T12:36:21.387054+00:00", "EventTime": "2024-05-21T12:36:21.387073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxkpvn1DBpQdM4Su8b"], "accumulated_threat_level": 4.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "d0a514ed-797a-4e89-b772-f0d7d934d842", "DetectTime": "2024-05-21T12:36:21.403154+00:00", "EventTime": "2024-05-21T12:36:21.403174+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4gM54j82uE99l1X1"], "accumulated_threat_level": 5.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "e8f9e070-86b0-4367-b52b-81f7e43be49c", "DetectTime": "2024-05-21T12:36:21.408120+00:00", "EventTime": "2024-05-21T12:36:21.408138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.67.152.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUAPL1RWR2duNMWRe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "a89eea0a-2106-486e-bac0-718f6563fe0f", "DetectTime": "2024-05-21T12:36:21.520434+00:00", "EventTime": "2024-05-21T12:36:21.520454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgWpv49hJ3VsIK8Fi"], "accumulated_threat_level": 5.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "c9a951dc-9ba9-4a0a-9754-8c1b3f2f3f36", "DetectTime": "2024-05-21T12:36:21.549840+00:00", "EventTime": "2024-05-21T12:36:21.549860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.98.17.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpfBY03LjuGTEFHvWi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "cee9b775-b408-46b2-82e3-888593424e48", "DetectTime": "2024-05-21T12:36:21.555629+00:00", "EventTime": "2024-05-21T12:36:21.555649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 194.30.130.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEH4XS2G70YgqDaXF5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "777bb26e-8ce1-442f-94ec-428f156aea61", "DetectTime": "2024-05-21T12:36:21.621509+00:00", "EventTime": "2024-05-21T12:36:21.621532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.70.98.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cgKxChPEaFlyGZd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "6198c7a7-37e1-4a09-858d-0fe102b6e0ac", "DetectTime": "2024-05-21T12:36:21.865461+00:00", "EventTime": "2024-05-21T12:36:21.865485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.231.42.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsEx54MAT0hBPNZf9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "3f8c5c41-8cc8-416e-9fa8-cac7ff0b686a", "DetectTime": "2024-05-21T12:36:21.877952+00:00", "EventTime": "2024-05-21T12:36:21.877983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsuXj2MWmN6JamaH8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 89} +{"Format": "IDEA0", "ID": "f4cf6b55-b136-4931-bf8f-c1f269d9fea4", "DetectTime": "2024-05-21T12:36:21.934773+00:00", "EventTime": "2024-05-21T12:36:21.934794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmIDy53n0UpKL0yQt6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "80318e57-e150-41fb-8a4f-d484a727ac45", "DetectTime": "2024-05-21T12:36:21.977680+00:00", "EventTime": "2024-05-21T12:36:21.977703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.114.245.252 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSGNv171oeKql2U43"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "8c6ce0ae-0bf0-4b66-babe-9cafd7a1e9db", "DetectTime": "2024-05-21T12:36:22.013492+00:00", "EventTime": "2024-05-21T12:36:22.013514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.16.233 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CByZK84PcfJqXgx4kk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "56e9724c-deb7-484c-8f54-ffce4200257a", "DetectTime": "2024-05-21T12:36:22.053032+00:00", "EventTime": "2024-05-21T12:36:22.053053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.180.248.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3IrArNg4tMBI40ql"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "c799a558-9a51-4bb9-a31f-1f0f29e32b67", "DetectTime": "2024-05-21T12:36:22.093241+00:00", "EventTime": "2024-05-21T12:36:22.093259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIUD21xADNerU8uh8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "a09e2047-fa4d-4d39-a51e-5b969edad422", "DetectTime": "2024-05-21T12:36:22.136624+00:00", "EventTime": "2024-05-21T12:36:22.136644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkULC2tq5L1ZbHPq7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "89becb4a-6101-4cfe-9059-6b4374636334", "DetectTime": "2024-05-21T12:36:22.168637+00:00", "EventTime": "2024-05-21T12:36:22.168657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAXw412eBVLWPj6GVi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "44687e2d-f4ed-4790-b336-50c6e5a73089", "DetectTime": "2024-05-21T12:36:22.212109+00:00", "EventTime": "2024-05-21T12:36:22.212129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.247.65.143"]}], "Attach": [{"Content": "Connection to unknown destination port 2039/UDP destination IP 88.247.65.143. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCB0csTS1yaO8VU8i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "42ac200c-9f7f-404d-bd2e-e9bbdcf4ffde", "DetectTime": "2024-05-21T12:36:22.235181+00:00", "EventTime": "2024-05-21T12:36:22.235205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.117.148 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0Y6r49wa3XKVu6u2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "24378761-fc27-4199-8bc7-3fa0f7a39e2d", "DetectTime": "2024-05-21T12:36:22.269801+00:00", "EventTime": "2024-05-21T12:36:22.269822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.50.102.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYb0Y3EDWEXvidS45"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "7f52b537-9378-40f6-9bae-29c6bb003888", "DetectTime": "2024-05-21T12:36:22.538331+00:00", "EventTime": "2024-05-21T12:36:22.538350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS9s7V2lazZcPywex8"], "accumulated_threat_level": 9.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "7325506e-ed2b-41b7-8df8-f6f009477e9b", "DetectTime": "2024-05-21T12:36:22.577789+00:00", "EventTime": "2024-05-21T12:36:22.577813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMib52mtMjEeq77a2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4d35c9eb-623c-4a1c-bacb-44a832dbf5a9", "DetectTime": "2024-05-21T12:36:22.583493+00:00", "EventTime": "2024-05-21T12:36:22.583514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqmgjC3yl5MED0dWzi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "4bae24d3-3252-4846-8725-24f9fc2d42f2", "DetectTime": "2024-05-21T12:36:22.601343+00:00", "EventTime": "2024-05-21T12:36:22.601363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.171.136.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK94lx3KE4UpfTnr28"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "6a9abf52-9d42-4612-9619-f614a4c54f21", "DetectTime": "2024-05-21T12:36:22.664530+00:00", "EventTime": "2024-05-21T12:36:22.664549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7Hdt4VJUnv32pKNj"], "accumulated_threat_level": 10.4, "timewindow": 89} +{"Format": "IDEA0", "ID": "cfb90c03-f6ef-4056-8fe6-400161f36d3b", "DetectTime": "2024-05-21T12:36:22.695882+00:00", "EventTime": "2024-05-21T12:36:22.695904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.119.19.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1c5uv3cA1WE51G223"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "9d931692-600e-4e61-9703-b5d18e174686", "DetectTime": "2024-05-21T12:36:22.730962+00:00", "EventTime": "2024-05-21T12:36:22.730981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09r8k1w6q0fDqMI4f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 89} +{"Format": "IDEA0", "ID": "612e3b98-a43d-4cbd-af7f-4909f48b4563", "DetectTime": "2024-05-21T12:36:22.776333+00:00", "EventTime": "2024-05-21T12:36:22.776354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C328o03X9lOofNkH3g"], "accumulated_threat_level": 12.000000000000002, "timewindow": 89} +{"Format": "Json", "ID": "612e3b98-a43d-4cbd-af7f-4909f48b4563", "DetectTime": "2024-05-21T12:36:22.776333+00:00", "EventTime": "2024-05-21T12:36:22.776354+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "1970-01-04T16:44:49.969783+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2024/05/21 12:36:23.009538)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 89, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d2b22a1c-72f0-41f5-b8ca-cb97e94a2d36", "DetectTime": "2024-05-21T12:36:23.051663+00:00", "EventTime": "2024-05-21T12:36:23.051682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ePCv1Yuk4gq9E7E9"], "accumulated_threat_level": 0.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "626fa7fe-84d3-4786-97ec-04b6d723efa5", "DetectTime": "2024-05-21T12:36:23.068546+00:00", "EventTime": "2024-05-21T12:36:23.068564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ydxGNJjT9rN4QLl"], "accumulated_threat_level": 1.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "4f87aba6-632c-4831-baa5-72ddca3a77cb", "DetectTime": "2024-05-21T12:36:23.080670+00:00", "EventTime": "2024-05-21T12:36:23.080693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMMW4Ngz6a2MuK6j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 89} +{"Format": "IDEA0", "ID": "e0c89268-7d14-4a7d-b66a-e1c9be99c33f", "DetectTime": "2024-05-21T12:36:23.227132+00:00", "EventTime": "2024-05-21T12:36:23.227153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.125.134.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQmyc4R2gVlFHoe3f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "5eea02ff-b3ca-4886-b6a4-fab34e6b01f5", "DetectTime": "2024-05-21T12:36:23.232695+00:00", "EventTime": "2024-05-21T12:36:23.232718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVlKFa2Ux7CkiqUcZh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "f1ef47e3-4e83-434e-b046-41ea041f0289", "DetectTime": "2024-05-21T12:36:23.271089+00:00", "EventTime": "2024-05-21T12:36:23.271111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.146.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjvYN1CmDYSYbKDt"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "88e98a7e-2460-4abb-97d1-78cf392cd7fc", "DetectTime": "2024-05-21T12:36:23.284626+00:00", "EventTime": "2024-05-21T12:36:23.284648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHPOe1osemLXsZ2gc"], "accumulated_threat_level": 3.2, "timewindow": 89} +{"Format": "IDEA0", "ID": "b6a2946b-db7c-41de-b207-0624606b5771", "DetectTime": "2024-05-21T12:36:23.289910+00:00", "EventTime": "2024-05-21T12:36:23.289929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.107.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKICjc1gHvzAbEEaH1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "ff690de1-1e33-4020-b6d3-e3e08f337845", "DetectTime": "2024-05-21T12:36:23.294624+00:00", "EventTime": "2024-05-21T12:36:23.294643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.92.175.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4w2EL1JXtY7rAUHXa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "b9c18aa7-f3d2-4b32-8da8-1ca082e8b8da", "DetectTime": "2024-05-21T12:36:23.409669+00:00", "EventTime": "2024-05-21T12:36:23.409691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFHt22BEjL3kf0PR9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "06b8c220-c038-47ad-bc4e-f64a57ec0428", "DetectTime": "2024-05-21T12:36:23.449875+00:00", "EventTime": "2024-05-21T12:36:23.449894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWW7sF30p5zKdNGWW8"], "accumulated_threat_level": 4.0, "timewindow": 89} +{"Format": "IDEA0", "ID": "0f3ab2ee-3ec1-4dda-a0b4-2bf68949031e", "DetectTime": "2024-05-21T12:36:23.479246+00:00", "EventTime": "2024-05-21T12:36:23.479266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.45.144.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnZWl24OK2NxFiMw97"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "fe2e07aa-4075-4551-8122-09a9a5dcc48b", "DetectTime": "2024-05-21T12:36:23.556619+00:00", "EventTime": "2024-05-21T12:36:23.556637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ2axcFqbTf8cwYT5", "CQWw0u21WQVqGaXuvl", "CV8EyL31uiM0m4eL5g", "CqmU6R1MzLbF74ZT0l"], "accumulated_threat_level": 0.5, "timewindow": 90} +{"Format": "IDEA0", "ID": "1cd24fc0-7f65-42af-8f94-351798be3e65", "DetectTime": "2024-05-21T12:36:23.702825+00:00", "EventTime": "2024-05-21T12:36:23.702846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTZCH3LbC485da48j"], "accumulated_threat_level": 4.8, "timewindow": 89} +{"Format": "IDEA0", "ID": "e9d3782e-2f0f-4f92-8471-7b0d33356f55", "DetectTime": "2024-05-21T12:36:23.708659+00:00", "EventTime": "2024-05-21T12:36:23.708679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.93.30.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhIJa6zzwiQ5BcFg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "06d8a85f-751c-4ac4-9a1d-a773323145a1", "DetectTime": "2024-05-21T12:36:23.736441+00:00", "EventTime": "2024-05-21T12:36:23.736462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.179.33.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHyezu12w6J2GHm8b6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "570eb217-103b-4fcc-8a67-fb79bb63a81b", "DetectTime": "2024-05-21T12:36:23.742749+00:00", "EventTime": "2024-05-21T12:36:23.742769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3gXk3mttky8Du657"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "1697c135-23e2-4b12-a5be-c7caadaa5c4d", "DetectTime": "2024-05-21T12:36:23.791157+00:00", "EventTime": "2024-05-21T12:36:23.791180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.14.30.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLB7sd2w4rsc6KGG42"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "539eb337-51a2-498d-a64a-f4d2356606a0", "DetectTime": "2024-05-21T12:36:23.850307+00:00", "EventTime": "2024-05-21T12:36:23.850330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.91.101.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1VOcawosqaJb1Sk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 88} +{"Format": "IDEA0", "ID": "2e5e2b3b-5c68-42ce-b18b-b0cff5e7a169", "DetectTime": "2024-05-21T12:36:23.884058+00:00", "EventTime": "2024-05-21T12:36:23.884078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCb4Kh4uswyOeujmh"], "accumulated_threat_level": 5.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "ed6df03e-aa07-445d-8fa2-8f2f3abef462", "DetectTime": "2024-05-21T12:36:23.922646+00:00", "EventTime": "2024-05-21T12:36:23.922665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIutTPLwZ26T93q59"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 89} +{"Format": "IDEA0", "ID": "ce595d90-a92e-42f5-b98b-70a0177e6097", "DetectTime": "2024-05-21T12:36:23.965648+00:00", "EventTime": "2024-05-21T12:36:23.965669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdha64kY1VuZTN594"], "accumulated_threat_level": 7.199999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "c2a5c78f-6c5c-4a25-a659-beb4045eacb1", "DetectTime": "2024-05-21T12:36:24.209737+00:00", "EventTime": "2024-05-21T12:36:24.209759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7a7J2gDpHTNmPSHj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "81798c3d-ecd6-4202-9aab-408464a259a4", "DetectTime": "2024-05-21T12:36:24.269554+00:00", "EventTime": "2024-05-21T12:36:24.269572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfZrp1G3FyNZBg6Kg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "f77c27b9-d527-42e1-8ee5-f0cd2b53efcd", "DetectTime": "2024-05-21T12:36:24.299034+00:00", "EventTime": "2024-05-21T12:36:24.299053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtoOkG1Bnu8cjXsyl3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 89} +{"Format": "IDEA0", "ID": "bc36ba2e-ba28-4167-aa95-7fa20d48b4d1", "DetectTime": "2024-05-21T12:36:24.355442+00:00", "EventTime": "2024-05-21T12:36:24.355460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cipo3a1Wuj8OqcK596"], "accumulated_threat_level": 9.6, "timewindow": 89} +{"Format": "IDEA0", "ID": "c56e0001-82e2-49d2-bda2-3c283c758f84", "DetectTime": "2024-05-21T12:36:24.394085+00:00", "EventTime": "2024-05-21T12:36:24.394103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXdYO27IgBbtRaNh6"], "accumulated_threat_level": 10.4, "timewindow": 89} +{"Format": "IDEA0", "ID": "b0a37745-3019-4499-882b-133643d08323", "DetectTime": "2024-05-21T12:36:24.433315+00:00", "EventTime": "2024-05-21T12:36:24.433335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiIjgp1OcSuLZKCsth"], "accumulated_threat_level": 11.200000000000001, "timewindow": 89} +{"Format": "IDEA0", "ID": "6473a583-8d42-4d21-a5d0-4d142b5d7796", "DetectTime": "2024-05-21T12:36:24.474770+00:00", "EventTime": "2024-05-21T12:36:24.474792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxb2a2A3UJ74Qa1v7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 89} +{"Format": "Json", "ID": "6473a583-8d42-4d21-a5d0-4d142b5d7796", "DetectTime": "2024-05-21T12:36:24.474770+00:00", "EventTime": "2024-05-21T12:36:24.474792+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "1970-01-04T16:45:43.563116+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 89. (real time 2024/05/21 12:36:24.742961)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 89, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "49b8cb84-5d58-4b0e-ac7a-d2f88ab2b8f1", "DetectTime": "2024-05-21T12:36:24.856378+00:00", "EventTime": "2024-05-21T12:36:24.856409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpeX0l2orQIIVd70Ne"], "accumulated_threat_level": 1.3, "timewindow": 90} +{"Format": "IDEA0", "ID": "403a88e4-31ec-4a62-99e8-e8f04f07c55a", "DetectTime": "2024-05-21T12:36:24.877617+00:00", "EventTime": "2024-05-21T12:36:24.877634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZXUV31eqe7DTTlU"], "accumulated_threat_level": 2.1, "timewindow": 90} +{"Format": "IDEA0", "ID": "cd7782b8-d1a6-4171-95cb-5a356f689823", "DetectTime": "2024-05-21T12:36:24.987667+00:00", "EventTime": "2024-05-21T12:36:24.987689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPQw94EMpJNuZTfol"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "70978492-683d-4979-9002-a59a7835c142", "DetectTime": "2024-05-21T12:36:25.189477+00:00", "EventTime": "2024-05-21T12:36:25.189496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDUnKq4iWOq01ayygk"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "2dec1d07-3396-45d2-8618-54eca08087d1", "DetectTime": "2024-05-21T12:36:25.259169+00:00", "EventTime": "2024-05-21T12:36:25.259191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDzSjCL1QRLzpnvJ"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "c50713ba-573b-4fa7-9b0c-2cf972650022", "DetectTime": "2024-05-21T12:36:25.517240+00:00", "EventTime": "2024-05-21T12:36:25.517260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcM8344le4FkRkPXH7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "77d7f0f1-9a66-45a0-8137-8e9b88841e17", "DetectTime": "2024-05-21T12:36:25.522278+00:00", "EventTime": "2024-05-21T12:36:25.522297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvjxt1fPjXwZQBXkj"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "fda192f5-1ba6-4128-806e-7a73f128fef9", "DetectTime": "2024-05-21T12:36:25.646869+00:00", "EventTime": "2024-05-21T12:36:25.646892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmcOfA244sZnNjTsQd"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "1904a8bc-541d-4ffe-8cbc-c39d6641faa1", "DetectTime": "2024-05-21T12:36:25.687902+00:00", "EventTime": "2024-05-21T12:36:25.687921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLV8G2oqaAMTOxSo7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "de41fe82-9dba-4e47-9145-f191de7d9c7b", "DetectTime": "2024-05-21T12:36:25.729536+00:00", "EventTime": "2024-05-21T12:36:25.729556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHlQ1p1dznt5Rkt7t1"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "0ed912f2-f8fa-4405-9c32-103b73a2d0ca", "DetectTime": "2024-05-21T12:36:25.744157+00:00", "EventTime": "2024-05-21T12:36:25.744177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQrCo4ELg8ewooLNi", "CkhBKel71RS1TGpp1", "CZIo0c4YRsNY2Lhkqc", "CkpzKZ3S0X0Xfh2Jsd"], "accumulated_threat_level": 2.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "11ff9089-58ef-4c12-b2c9-4c1e8fd4e154", "DetectTime": "2024-05-21T12:36:25.770675+00:00", "EventTime": "2024-05-21T12:36:25.770696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJQHXJ1ZYgD0HQdwn9"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "30971711-52c4-4400-ab3f-ee8932b90581", "DetectTime": "2024-05-21T12:36:25.811376+00:00", "EventTime": "2024-05-21T12:36:25.811398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT50SM2jvj78CH7fv7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "d37b780d-42a2-4995-b100-89d6eddd30ab", "DetectTime": "2024-05-21T12:36:25.857329+00:00", "EventTime": "2024-05-21T12:36:25.857350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci7o7D1AC7Pc65Rvpb"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "b3b6e929-331c-45c0-b264-9d97d39ad4d8", "DetectTime": "2024-05-21T12:36:25.952581+00:00", "EventTime": "2024-05-21T12:36:25.952605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NLXk35V0yLUbTzX"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "1359fa50-4721-4a21-b5e3-947d1f337a2c", "DetectTime": "2024-05-21T12:36:25.993425+00:00", "EventTime": "2024-05-21T12:36:25.993448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cY8r4Se2l75VPEk6"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "0c5cfcdb-3fed-4aa1-ba34-6d7cfbf0c7b7", "DetectTime": "2024-05-21T12:36:26.037650+00:00", "EventTime": "2024-05-21T12:36:26.037671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmDzS3kt4TR3XBxud"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "9b393131-208d-4aed-af19-ef70e9e4b743", "DetectTime": "2024-05-21T12:36:26.081987+00:00", "EventTime": "2024-05-21T12:36:26.082009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8awC1xqteY5zoF18"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "692fd5c6-da5a-49de-a186-e05d122a92f3", "DetectTime": "2024-05-21T12:36:26.408346+00:00", "EventTime": "2024-05-21T12:36:26.408367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5lBCE4vZnxH1kcTte"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "af4172f6-c694-4fb0-9ce0-4a165520ebab", "DetectTime": "2024-05-21T12:36:26.510507+00:00", "EventTime": "2024-05-21T12:36:26.510529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiP8yG2BAorKU5hlI1"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "16eff83e-27b4-4001-90f8-e4f95b06c5f2", "DetectTime": "2024-05-21T12:36:26.566534+00:00", "EventTime": "2024-05-21T12:36:26.566553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7cl2d39iwPN8YVtqh"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 90} +{"Format": "IDEA0", "ID": "9c840575-f5de-4ff0-9062-b8efad4d9190", "DetectTime": "2024-05-21T12:36:26.617661+00:00", "EventTime": "2024-05-21T12:36:26.617682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRelrZ1aQOfzUZyOH7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "207f30df-9f04-4669-93a5-e04aa529f956", "DetectTime": "2024-05-21T12:36:26.722188+00:00", "EventTime": "2024-05-21T12:36:26.722208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgC43v4KhR5uaEJ99"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "8726428b-9dd4-4e98-83c9-6b486c2c1445", "DetectTime": "2024-05-21T12:36:26.782222+00:00", "EventTime": "2024-05-21T12:36:26.782241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnptK33XVZZM4lJtQa"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "5837caac-2d86-4c6d-b2a9-731c7ff018e3", "DetectTime": "2024-05-21T12:36:26.816908+00:00", "EventTime": "2024-05-21T12:36:26.816929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrlEB3pfhObGbwEek"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "28cdae2c-b5a0-4e9f-a483-d7a445b711cb", "DetectTime": "2024-05-21T12:36:27.138270+00:00", "EventTime": "2024-05-21T12:36:27.138292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YmGz3wISboJ8ojo3"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "6e3b5773-fb1b-4dff-9424-1438f326acc2", "DetectTime": "2024-05-21T12:36:27.185048+00:00", "EventTime": "2024-05-21T12:36:27.185067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjvJFp3leVaG1b3Pmd"], "accumulated_threat_level": 4.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "1fc1bd38-9a83-4c7b-8879-577610c8a177", "DetectTime": "2024-05-21T12:36:27.503106+00:00", "EventTime": "2024-05-21T12:36:27.503126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7TmpZufP3IcxFFc"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "9c754249-c2db-4701-a4a8-aaaee57a9093", "DetectTime": "2024-05-21T12:36:27.509346+00:00", "EventTime": "2024-05-21T12:36:27.509366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coo1523PFCCZfZByck"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "7bcb9ef5-0e92-4ed0-a59b-d4738e06c24e", "DetectTime": "2024-05-21T12:36:27.515349+00:00", "EventTime": "2024-05-21T12:36:27.515370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.70.205.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkggaREUDPcQYGnl7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "a243fb0d-387a-41ba-8886-4a6f09c4f0d5", "DetectTime": "2024-05-21T12:36:27.525164+00:00", "EventTime": "2024-05-21T12:36:27.525185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.247.65.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbEXauuWTDDok8in2"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "d5a04ba7-537e-4511-9473-a9c7b78f3b16", "DetectTime": "2024-05-21T12:36:27.543231+00:00", "EventTime": "2024-05-21T12:36:27.543253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OW3W1o4QLBfb3eIg"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "7a5b8a9b-a803-40d2-8399-5264863aac16", "DetectTime": "2024-05-21T12:36:27.670200+00:00", "EventTime": "2024-05-21T12:36:27.670220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnueQYvFendBMMw3h"], "accumulated_threat_level": 5.0, "timewindow": 90} +{"Format": "IDEA0", "ID": "fecf9a7c-90c6-4617-a49c-a4a02cc09570", "DetectTime": "2024-05-21T12:36:27.701063+00:00", "EventTime": "2024-05-21T12:36:27.701085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.253.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7uJu2KRC5yIi5e61"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "4263f718-b306-4fd7-bc1d-e6fe09e371c2", "DetectTime": "2024-05-21T12:36:27.751069+00:00", "EventTime": "2024-05-21T12:36:27.751090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRL931h0kiMTXw49a"], "accumulated_threat_level": 5.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "087d4cba-549c-4d83-bb3c-1e98ab868c8e", "DetectTime": "2024-05-21T12:36:27.784675+00:00", "EventTime": "2024-05-21T12:36:27.784697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ04cg3S1p72NV77ke"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "48f9408d-821d-48df-b1bd-7013fb03eddc", "DetectTime": "2024-05-21T12:36:27.823430+00:00", "EventTime": "2024-05-21T12:36:27.823449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Wcwx1UZoEQAZIFS"], "accumulated_threat_level": 6.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "6a43d07d-4006-4d58-81f1-2dd962d16dfd", "DetectTime": "2024-05-21T12:36:27.987349+00:00", "EventTime": "2024-05-21T12:36:27.987368+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2ntK2daUdQOPfC5l"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "52b10ab8-d936-4247-a740-eb8323937daf", "DetectTime": "2024-05-21T12:36:28.001147+00:00", "EventTime": "2024-05-21T12:36:28.001164+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2ntK2daUdQOPfC5l"], "accumulated_threat_level": 6.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "0b3657cc-2d47-4366-aa3a-ed96a3e1471a", "DetectTime": "2024-05-21T12:36:28.106428+00:00", "EventTime": "2024-05-21T12:36:28.106449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.99.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEPwU1NwXkSJt1wK7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "6b113076-eb26-447e-bf55-cb7e643b9b5a", "DetectTime": "2024-05-21T12:36:28.114614+00:00", "EventTime": "2024-05-21T12:36:28.114634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctLRs3JNXpiKKNRh"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "51696309-57fa-4b51-9598-c2e57e88bb1d", "DetectTime": "2024-05-21T12:36:28.121093+00:00", "EventTime": "2024-05-21T12:36:28.121114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQ18f11sRwRcxPGBf"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "648918a3-60d4-4c05-ad5c-422c76487643", "DetectTime": "2024-05-21T12:36:28.125887+00:00", "EventTime": "2024-05-21T12:36:28.125917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgx2A93os7rPOjVsZ1"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "cb600ad7-c616-4594-b17f-199830eb0961", "DetectTime": "2024-05-21T12:36:28.138166+00:00", "EventTime": "2024-05-21T12:36:28.138185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5G78Y18T7hDfRCf59"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "85c9441e-c244-41e1-8f65-f3322d0274c4", "DetectTime": "2024-05-21T12:36:28.150625+00:00", "EventTime": "2024-05-21T12:36:28.150644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5G78Y18T7hDfRCf59"], "accumulated_threat_level": 6.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "b9d0b549-f1a5-4921-a7be-e7c4053e23a2", "DetectTime": "2024-05-21T12:36:28.160264+00:00", "EventTime": "2024-05-21T12:36:28.160281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDpIj33nDZ2rAdTFu3"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 90} +{"Format": "IDEA0", "ID": "326ceda0-8ba0-4722-9764-39b2e541edf9", "DetectTime": "2024-05-21T12:36:28.223740+00:00", "EventTime": "2024-05-21T12:36:28.223762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.51.19.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CucUSy1A5xc2QGfoJk"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "45f8ff57-6b57-4a84-a752-1c5ae8d0bc6a", "DetectTime": "2024-05-21T12:36:28.277483+00:00", "EventTime": "2024-05-21T12:36:28.277505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjxQLm2svtPKfMaUb4"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "68b02f43-1918-4f36-9771-fa521a471885", "DetectTime": "2024-05-21T12:36:28.358992+00:00", "EventTime": "2024-05-21T12:36:28.359010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8kqI2YnQHeGgYPG8"], "accumulated_threat_level": 8.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "e56295ee-48b6-4254-9048-e3c43a3b5368", "DetectTime": "2024-05-21T12:36:28.403291+00:00", "EventTime": "2024-05-21T12:36:28.403312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXyjS27un3q2Cxenh"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "ef2eb1cb-594a-4919-bd97-dde802980c97", "DetectTime": "2024-05-21T12:36:28.505392+00:00", "EventTime": "2024-05-21T12:36:28.505410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAxZC4RdjIjb7IYya"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "a0af8961-2620-4146-a9a0-7d19c93a5937", "DetectTime": "2024-05-21T12:36:28.518091+00:00", "EventTime": "2024-05-21T12:36:28.518112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAxZC4RdjIjb7IYya"], "accumulated_threat_level": 7.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "1111374d-0761-4a07-9adc-2b409f91c3b8", "DetectTime": "2024-05-21T12:36:28.597402+00:00", "EventTime": "2024-05-21T12:36:28.597422+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.38.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.38.248 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKpBuLZViyqYmiTe"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d99af81c-9a61-44cb-875b-0fd4473adb78", "DetectTime": "2024-05-21T12:36:28.610774+00:00", "EventTime": "2024-05-21T12:36:28.610795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.38.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.38.248 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKpBuLZViyqYmiTe"], "accumulated_threat_level": 7.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "52a1e16b-cbf2-4fd4-8459-9340bf412166", "DetectTime": "2024-05-21T12:36:28.628938+00:00", "EventTime": "2024-05-21T12:36:28.628958+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGLlAEjpdNdxiBZ58"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "15fae3de-9ec7-4532-bd1b-9645921c1e99", "DetectTime": "2024-05-21T12:36:28.641690+00:00", "EventTime": "2024-05-21T12:36:28.641710+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGLlAEjpdNdxiBZ58"], "accumulated_threat_level": 8.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "a5a5b0a7-5ad9-436c-b8e8-6a301a0fbbe7", "DetectTime": "2024-05-21T12:36:28.661544+00:00", "EventTime": "2024-05-21T12:36:28.661564+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.189.51.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPAri4sIc0mVnNDdc"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d57537f3-80d5-4cd9-9382-7cfd287400f2", "DetectTime": "2024-05-21T12:36:28.673515+00:00", "EventTime": "2024-05-21T12:36:28.673533+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPAri4sIc0mVnNDdc"], "accumulated_threat_level": 8.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "97c71da4-bff6-40ee-afc2-64deaf7ae320", "DetectTime": "2024-05-21T12:36:28.685754+00:00", "EventTime": "2024-05-21T12:36:28.685773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHhVex1bxjUYokdfGc"], "accumulated_threat_level": 9.0, "timewindow": 90} +{"Format": "IDEA0", "ID": "4fad3bf9-72af-464c-bc97-83a594e055f7", "DetectTime": "2024-05-21T12:36:28.692082+00:00", "EventTime": "2024-05-21T12:36:28.692102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQtE1C36nqbTk22Cx1"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "ec6200c7-7fe8-438f-a723-a65cd3a36cc8", "DetectTime": "2024-05-21T12:36:28.697742+00:00", "EventTime": "2024-05-21T12:36:28.697764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpgVi4h2qKrCUGmK4"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "8fe55844-2a98-4a82-aecf-7be981fb0849", "DetectTime": "2024-05-21T12:36:28.703186+00:00", "EventTime": "2024-05-21T12:36:28.703209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrczV441b3OLDxeZJj"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "17e11c3d-39a0-4138-9e56-a6f496142e89", "DetectTime": "2024-05-21T12:36:28.819400+00:00", "EventTime": "2024-05-21T12:36:28.819423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7T0lD44w7dK3DgVFh"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "e872cdaf-60f4-44b3-b323-07a1a517ebaa", "DetectTime": "2024-05-21T12:36:28.862647+00:00", "EventTime": "2024-05-21T12:36:28.862669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Rcm51frSMeCvMU4b"], "accumulated_threat_level": 9.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "7708eb26-4b40-425a-9907-51f4290064ce", "DetectTime": "2024-05-21T12:36:28.904621+00:00", "EventTime": "2024-05-21T12:36:28.904641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eG4c2vSxYTUVSkQ1"], "accumulated_threat_level": 10.600000000000001, "timewindow": 90} +{"Format": "IDEA0", "ID": "e3bf48b3-7e95-4168-8e56-e759428db9c5", "DetectTime": "2024-05-21T12:36:28.947857+00:00", "EventTime": "2024-05-21T12:36:28.947875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9HoLvtVI2gZM4G3"], "accumulated_threat_level": 11.400000000000002, "timewindow": 90} +{"Format": "IDEA0", "ID": "ef892edc-b292-4ec0-877c-03ccaff471c0", "DetectTime": "2024-05-21T12:36:28.986974+00:00", "EventTime": "2024-05-21T12:36:28.986994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVI14G3LFiLBKvBMea"], "accumulated_threat_level": 12.200000000000003, "timewindow": 90} +{"Format": "Json", "ID": "ef892edc-b292-4ec0-877c-03ccaff471c0", "DetectTime": "2024-05-21T12:36:28.986974+00:00", "EventTime": "2024-05-21T12:36:28.986994+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-04T17:17:45.697777+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2024/05/21 12:36:29.251617)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 90, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "4c69d392-9984-4ba0-a28f-5c2d1b42b51b", "DetectTime": "2024-05-21T12:36:29.264372+00:00", "EventTime": "2024-05-21T12:36:29.264393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjRse03CmXEpSD6dT4"], "accumulated_threat_level": 0.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "8140b865-5096-45be-8731-05b40807fe07", "DetectTime": "2024-05-21T12:36:29.276928+00:00", "EventTime": "2024-05-21T12:36:29.276946+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.77.231.101"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqz54N2Mz89YgNgxD5"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "b6d1d0c7-d261-425e-8769-934aee0f8ae9", "DetectTime": "2024-05-21T12:36:29.288747+00:00", "EventTime": "2024-05-21T12:36:29.288766+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.77.231.101"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqz54N2Mz89YgNgxD5"], "accumulated_threat_level": 9.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "251809a7-2c35-4d4c-a9b3-883cbe35cbce", "DetectTime": "2024-05-21T12:36:29.296319+00:00", "EventTime": "2024-05-21T12:36:29.296339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUjfQb1UYGRsonoJb5"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "df7e30bf-6f5e-489e-80e0-819bae4cbd8b", "DetectTime": "2024-05-21T12:36:29.306334+00:00", "EventTime": "2024-05-21T12:36:29.306351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkboeC4sSFLMk0mfS3"], "accumulated_threat_level": 1.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "2d65f592-9db0-4099-a365-6a243bc6d54c", "DetectTime": "2024-05-21T12:36:29.368994+00:00", "EventTime": "2024-05-21T12:36:29.369017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtswV6280oS7aaHANf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 90} +{"Format": "IDEA0", "ID": "9706f858-6e34-444a-84dd-95e0f0d831bc", "DetectTime": "2024-05-21T12:36:29.406675+00:00", "EventTime": "2024-05-21T12:36:29.406694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvyo91MLxSXQ07Rpj"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "3e50f058-c5a8-4cac-a090-35b7f4da96ec", "DetectTime": "2024-05-21T12:36:29.448833+00:00", "EventTime": "2024-05-21T12:36:29.448853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6Xsm2XxIjRqv5UGa"], "accumulated_threat_level": 4.0, "timewindow": 90} +{"Format": "IDEA0", "ID": "fdbd1bef-47f6-4179-bf0e-f4c0140e550b", "DetectTime": "2024-05-21T12:36:29.473996+00:00", "EventTime": "2024-05-21T12:36:29.474015+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.198.86.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.198.86.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoM7Y12jbq7ttVvuB6"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "55164392-a867-4eb4-bcdf-7967d6e6a65b", "DetectTime": "2024-05-21T12:36:29.487580+00:00", "EventTime": "2024-05-21T12:36:29.487599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.198.86.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.198.86.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoM7Y12jbq7ttVvuB6"], "accumulated_threat_level": 9.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "97830101-44c6-4c99-b6e0-e9a8840230ea", "DetectTime": "2024-05-21T12:36:29.599991+00:00", "EventTime": "2024-05-21T12:36:29.600014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqimR33HenRKelmf8"], "accumulated_threat_level": 4.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "c3a497e2-0c59-4028-9da5-ed44f3e1bf91", "DetectTime": "2024-05-21T12:36:29.622138+00:00", "EventTime": "2024-05-21T12:36:29.622156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQEso2rpwbq0un4Ij"], "accumulated_threat_level": 5.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "b287d656-f98c-4f5a-b6d5-9a5b267ddb82", "DetectTime": "2024-05-21T12:36:29.676727+00:00", "EventTime": "2024-05-21T12:36:29.676748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.70.205.195"]}], "Attach": [{"Content": "Connection to unknown destination port 13908/UDP destination IP 212.70.205.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COV2iX3oXE010m1OQ6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 90} +{"Format": "IDEA0", "ID": "743384cf-9982-4357-b030-663690bd6bbc", "DetectTime": "2024-05-21T12:36:29.718885+00:00", "EventTime": "2024-05-21T12:36:29.718906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgXr5v1PTmhvZsRZXl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "17e3f909-4bfd-49e1-ad10-41ba138de269", "DetectTime": "2024-05-21T12:36:29.753048+00:00", "EventTime": "2024-05-21T12:36:29.753073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.223.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iZrkhT42TCPGw7h"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "83980140-a0fb-4ca2-a5f1-917d810d5cb4", "DetectTime": "2024-05-21T12:36:29.784238+00:00", "EventTime": "2024-05-21T12:36:29.784258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKCStqwY69RKaQg3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "93ff22a9-71b9-4d63-8b91-02ed29bbfffb", "DetectTime": "2024-05-21T12:36:30.069215+00:00", "EventTime": "2024-05-21T12:36:30.069235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR62z2Gg3bZhAe3i9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "ecb379da-922a-45d9-8fc7-6713543055e8", "DetectTime": "2024-05-21T12:36:30.111339+00:00", "EventTime": "2024-05-21T12:36:30.111358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkLPq1K7zwCD28q7b"], "accumulated_threat_level": 9.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "4d6c7777-908b-4a2e-bb17-10a4787acc49", "DetectTime": "2024-05-21T12:36:30.151469+00:00", "EventTime": "2024-05-21T12:36:30.151489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChGYlo4qTwrCzWrb7g"], "accumulated_threat_level": 10.4, "timewindow": 90} +{"Format": "IDEA0", "ID": "99a5d223-6230-43f7-b1f6-74b0088ebd18", "DetectTime": "2024-05-21T12:36:30.191754+00:00", "EventTime": "2024-05-21T12:36:30.191774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cihggc4Gl9bbFdSc9f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 90} +{"Format": "IDEA0", "ID": "dabd450e-e4e3-46ca-a256-0d9e49b152fc", "DetectTime": "2024-05-21T12:36:30.242072+00:00", "EventTime": "2024-05-21T12:36:30.242098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4T91N2A5ahMl6O7x6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 90} +{"Format": "Json", "ID": "dabd450e-e4e3-46ca-a256-0d9e49b152fc", "DetectTime": "2024-05-21T12:36:30.242072+00:00", "EventTime": "2024-05-21T12:36:30.242098+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "1970-01-04T17:18:21.325971+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2024/05/21 12:36:30.410611)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 90, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a99da7d0-7008-45ea-838f-dfd2f3861bae", "DetectTime": "2024-05-21T12:36:30.428075+00:00", "EventTime": "2024-05-21T12:36:30.428093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3i3u4NiI2vykJgCe"], "accumulated_threat_level": 0.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "509e7ed9-4de5-49ea-8fa5-5f5c29be8ca8", "DetectTime": "2024-05-21T12:36:30.444678+00:00", "EventTime": "2024-05-21T12:36:30.444695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw6ZIc2EFUOyIaKpv2"], "accumulated_threat_level": 1.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "a65a715b-8668-4489-981f-004f166e7468", "DetectTime": "2024-05-21T12:36:30.457205+00:00", "EventTime": "2024-05-21T12:36:30.457225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ0WAl1PINU55MmpRl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 90} +{"Format": "IDEA0", "ID": "fce86443-45bf-4d1d-84de-4bb9e9b05479", "DetectTime": "2024-05-21T12:36:30.468767+00:00", "EventTime": "2024-05-21T12:36:30.468787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMl1FkNoeFS98S2"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "029e2e96-4201-4b5f-81dd-045c7c71ec1d", "DetectTime": "2024-05-21T12:36:30.481908+00:00", "EventTime": "2024-05-21T12:36:30.481934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.161.223.169"]}], "Attach": [{"Content": "Connection to unknown destination port 15153/UDP destination IP 125.161.223.169. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Iffe3i77ZukUO5bi"], "accumulated_threat_level": 4.0, "timewindow": 90} +{"Format": "IDEA0", "ID": "2638acfa-d2c8-4116-83f6-fb1f55a6e2c2", "DetectTime": "2024-05-21T12:36:30.688247+00:00", "EventTime": "2024-05-21T12:36:30.688269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwKIc2lQpq0orYls2"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "055a796c-d2dc-4c3e-8d06-3422a7c01318", "DetectTime": "2024-05-21T12:36:30.726246+00:00", "EventTime": "2024-05-21T12:36:30.726268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6k3qa4ZoUEieMMpqh"], "accumulated_threat_level": 4.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "a321e4a1-27de-42d1-906f-073e18b70038", "DetectTime": "2024-05-21T12:36:30.789244+00:00", "EventTime": "2024-05-21T12:36:30.789262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhZJzzCHThaPayHd"], "accumulated_threat_level": 5.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "7b8e1ea9-3e0a-4232-892a-8addf28ea65b", "DetectTime": "2024-05-21T12:36:30.828167+00:00", "EventTime": "2024-05-21T12:36:30.828189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgrEEM1p6UkVTJ5Zt8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 90} +{"Format": "IDEA0", "ID": "325e1e13-b39d-4b5e-8b6c-f2c9ef29117c", "DetectTime": "2024-05-21T12:36:30.869609+00:00", "EventTime": "2024-05-21T12:36:30.869630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67aCn2Q3zxlJZVrTi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "9e8449d5-9e59-4739-9826-60141c7b3438", "DetectTime": "2024-05-21T12:36:30.914046+00:00", "EventTime": "2024-05-21T12:36:30.914066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKN4Hl1jLhpRSBpOt8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "49c417b8-4463-44a0-8e52-ea416fec3362", "DetectTime": "2024-05-21T12:36:30.954651+00:00", "EventTime": "2024-05-21T12:36:30.954670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZRAC1ECDCNAGlEm9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "6d77c591-4c6a-43f3-b37f-9119892403ab", "DetectTime": "2024-05-21T12:36:31.018453+00:00", "EventTime": "2024-05-21T12:36:31.018471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfxWs149luX74I0QNl"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "fbf89628-97fd-4155-b0c3-c7d9b24c03be", "DetectTime": "2024-05-21T12:36:31.066300+00:00", "EventTime": "2024-05-21T12:36:31.066318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgMh42dxHzTbgCCf"], "accumulated_threat_level": 9.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "c7f1b58b-eca7-439f-ab4b-6079f3051206", "DetectTime": "2024-05-21T12:36:31.138849+00:00", "EventTime": "2024-05-21T12:36:31.138867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1blp4kMWfv0N5h55", "CZLv8F15N629GNoTlj", "C5ljAp4yIUP3Yb3zr7", "Cx034D2Y34KXbgbwi"], "accumulated_threat_level": 10.1, "timewindow": 90} +{"Format": "IDEA0", "ID": "55a30403-624b-4b5b-be05-bce649163857", "DetectTime": "2024-05-21T12:36:31.273576+00:00", "EventTime": "2024-05-21T12:36:31.273600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVobTz1NzLPPwiIozl"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "254f273e-52fd-4c97-8b70-6fb76e4e7aa6", "DetectTime": "2024-05-21T12:36:31.576642+00:00", "EventTime": "2024-05-21T12:36:31.576667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcidb3zAj9ts75xO"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "bf802e52-8ba9-4eae-9256-1e9baafe14df", "DetectTime": "2024-05-21T12:36:31.636743+00:00", "EventTime": "2024-05-21T12:36:31.636763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPqhef1xym3D1IBFr3"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "00cb29e3-8ca5-4922-b2ac-d41ae1683706", "DetectTime": "2024-05-21T12:36:31.943936+00:00", "EventTime": "2024-05-21T12:36:31.943958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clf3KH19U9OjeHEm5l"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "b592c154-2718-451c-862d-6c7a0f7fb41f", "DetectTime": "2024-05-21T12:36:31.949285+00:00", "EventTime": "2024-05-21T12:36:31.949303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cew0tC2DqEgNUsOQ8j"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "2ead19ff-76b7-4128-8579-8747d1c47657", "DetectTime": "2024-05-21T12:36:31.953749+00:00", "EventTime": "2024-05-21T12:36:31.953766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMlUNqBy8xMMWfBxe"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "f2d7c73e-3620-4250-822d-64c5e87078e6", "DetectTime": "2024-05-21T12:36:32.419292+00:00", "EventTime": "2024-05-21T12:36:32.419310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CobZco3TeqLDQ9FbH"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "36fa5d5c-664f-4371-8a29-52132a264b71", "DetectTime": "2024-05-21T12:36:32.834348+00:00", "EventTime": "2024-05-21T12:36:32.834370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.127.20.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaidHK1yuDTKw2sxf7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "d93c44fb-8873-4c71-9b6a-65dac7434ab5", "DetectTime": "2024-05-21T12:36:32.870237+00:00", "EventTime": "2024-05-21T12:36:32.870259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COogsC02QQSAcDJF7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "98359090-a0c2-49f0-91dc-4fe8cb726a8b", "DetectTime": "2024-05-21T12:36:32.955234+00:00", "EventTime": "2024-05-21T12:36:32.955256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.253.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosblG1BG5FFvsFkIl"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "4b62d3e1-aee9-45c4-87ae-2f7556094910", "DetectTime": "2024-05-21T12:36:32.999709+00:00", "EventTime": "2024-05-21T12:36:32.999731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv67TB1xcHrtYOXSic"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "8b07b37e-0d38-4879-b28c-75cfea3f85c4", "DetectTime": "2024-05-21T12:36:33.246467+00:00", "EventTime": "2024-05-21T12:36:33.246492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnnZGb1RdPhppuezXi", "CyItAy2a99jpp4HbY3", "C7TZ2X25r9cdt4EPml", "CtSf9kzAST8jUjdN6"], "accumulated_threat_level": 10.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "69a11bc6-4fd9-46a4-a797-d918182552ff", "DetectTime": "2024-05-21T12:36:33.330657+00:00", "EventTime": "2024-05-21T12:36:33.330679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YPnZFcDBAP1rMM2"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "09c303b5-5620-4322-976b-cad2e0eabd6f", "DetectTime": "2024-05-21T12:36:33.559983+00:00", "EventTime": "2024-05-21T12:36:33.560004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHlUF31JeEaK8p9IGk"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "1dbd10e5-393b-4e34-bdac-9fadb69599ca", "DetectTime": "2024-05-21T12:36:34.024558+00:00", "EventTime": "2024-05-21T12:36:34.024578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEG2us4UBq2IxnQkIh"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "89de5b4a-325b-43aa-8195-60f29447997b", "DetectTime": "2024-05-21T12:36:34.287069+00:00", "EventTime": "2024-05-21T12:36:34.287089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5r9rT1uDyfKTHfxAk"], "accumulated_threat_level": 11.4, "timewindow": 90} +{"Format": "IDEA0", "ID": "c64fcbf9-ab3f-4a88-9f39-97bb7a8902c5", "DetectTime": "2024-05-21T12:36:34.322391+00:00", "EventTime": "2024-05-21T12:36:34.322428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhzm81ViPvGenhvpa"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "2137ff10-42a7-4d0e-ad0e-3457dd2c5464", "DetectTime": "2024-05-21T12:36:34.327409+00:00", "EventTime": "2024-05-21T12:36:34.327428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKD8UqfysTGtkskf1"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "47d4c9ab-b347-40da-9a6e-c9a4d0f639aa", "DetectTime": "2024-05-21T12:36:34.388621+00:00", "EventTime": "2024-05-21T12:36:34.388640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGuDy2dCifMiYso"], "accumulated_threat_level": 12.200000000000001, "timewindow": 90} +{"Format": "Json", "ID": "47d4c9ab-b347-40da-9a6e-c9a4d0f639aa", "DetectTime": "2024-05-21T12:36:34.388621+00:00", "EventTime": "2024-05-21T12:36:34.388640+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "1970-01-04T17:50:07.733231+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2024/05/21 12:36:34.660435)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000001, "timewindow": 90, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000001} +{"Format": "IDEA0", "ID": "8b37351e-f315-4453-8015-2558902b8fdf", "DetectTime": "2024-05-21T12:36:34.664911+00:00", "EventTime": "2024-05-21T12:36:34.664930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPfMGE2phCbdBPzcCf"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "559beeb1-1987-4366-98ba-dec8534bb1b3", "DetectTime": "2024-05-21T12:36:34.677244+00:00", "EventTime": "2024-05-21T12:36:34.677263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["62.18.183.173"]}], "Attach": [{"Content": "Connection to unknown destination port 2682/UDP destination IP 62.18.183.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CayoWd2C25AEWEnbDg"], "accumulated_threat_level": 0.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "01ec29a4-71b4-46bb-91db-113210eeb1c8", "DetectTime": "2024-05-21T12:36:34.682271+00:00", "EventTime": "2024-05-21T12:36:34.682291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6fTYd6rfgZHRGM6a"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "cf62030d-fe3c-429e-8d8d-51172c0bbe53", "DetectTime": "2024-05-21T12:36:34.687321+00:00", "EventTime": "2024-05-21T12:36:34.687345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJhWt20BSmpnKNE9a"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "9d46416b-2775-45b0-a618-e4a215125670", "DetectTime": "2024-05-21T12:36:34.701308+00:00", "EventTime": "2024-05-21T12:36:34.701330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNV7s2m4p1xiveesi"], "accumulated_threat_level": 1.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "02e71d39-b8fa-4bbd-a003-e58dc78c858c", "DetectTime": "2024-05-21T12:36:34.713226+00:00", "EventTime": "2024-05-21T12:36:34.713246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJH1pd2zmaCzFqHQTl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 90} +{"Format": "IDEA0", "ID": "fec2ffe9-7af0-49b7-aac0-2da6893bb4d0", "DetectTime": "2024-05-21T12:36:34.832231+00:00", "EventTime": "2024-05-21T12:36:34.832250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkwG21liqlJtQOWR3"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "81d4d547-4d6c-457c-b79d-b86dd5cb58c2", "DetectTime": "2024-05-21T12:36:34.868784+00:00", "EventTime": "2024-05-21T12:36:34.868802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwtCA4poxhiHkXwi3"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "0077bd02-dfcc-42ee-a1bc-f9a48ec4575e", "DetectTime": "2024-05-21T12:36:34.911120+00:00", "EventTime": "2024-05-21T12:36:34.911139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLBOZ2h43hc4x6Vm4"], "accumulated_threat_level": 4.0, "timewindow": 90} +{"Format": "IDEA0", "ID": "96bef6e7-5bcd-4fc0-82bd-fa4d6d5e0791", "DetectTime": "2024-05-21T12:36:34.953452+00:00", "EventTime": "2024-05-21T12:36:34.953473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Xomy1b9iyqdx6i43"], "accumulated_threat_level": 4.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "a495784b-5c7e-4d8f-bdde-c3281f43609c", "DetectTime": "2024-05-21T12:36:34.992727+00:00", "EventTime": "2024-05-21T12:36:34.992746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpPJWi4D6jrzEQrzke"], "accumulated_threat_level": 5.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "10f27b4e-14b1-4faf-adbe-65f316848b9c", "DetectTime": "2024-05-21T12:36:35.035881+00:00", "EventTime": "2024-05-21T12:36:35.035904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnuPs4tvbbHYXjy8c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 90} +{"Format": "IDEA0", "ID": "ae18bd2b-a063-412d-ba75-5c587e3eb3e5", "DetectTime": "2024-05-21T12:36:35.080611+00:00", "EventTime": "2024-05-21T12:36:35.080630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COWidE1iKf9NpSYzch"], "accumulated_threat_level": 7.199999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "2cfb7b16-98ee-41a3-af42-fae7eb1ddeca", "DetectTime": "2024-05-21T12:36:35.117731+00:00", "EventTime": "2024-05-21T12:36:35.117754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBFcB4uVJUEPJufdg"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "d39b979e-ff92-4563-a969-dfbb3f40b44a", "DetectTime": "2024-05-21T12:36:35.151583+00:00", "EventTime": "2024-05-21T12:36:35.151604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8glY41Stx9YPobmLk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "9db66e8d-2eb1-42d3-86af-90553af0acd5", "DetectTime": "2024-05-21T12:36:35.295992+00:00", "EventTime": "2024-05-21T12:36:35.296011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq3Aq71kwl2rAcvtX9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "33e4b1a6-95e3-4b25-9708-cecabb2e42ba", "DetectTime": "2024-05-21T12:36:35.574213+00:00", "EventTime": "2024-05-21T12:36:35.574232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CulHDK2ln2MCchEWw4"], "accumulated_threat_level": 9.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "e8ce2bb4-545d-4d34-9ecf-a9b427305855", "DetectTime": "2024-05-21T12:36:35.628865+00:00", "EventTime": "2024-05-21T12:36:35.628887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxJ8I3EVSYz9hiOB7"], "accumulated_threat_level": 10.4, "timewindow": 90} +{"Format": "IDEA0", "ID": "783fee00-e23a-46c0-a56f-955064d30273", "DetectTime": "2024-05-21T12:36:35.641958+00:00", "EventTime": "2024-05-21T12:36:35.641977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5INl1Jd2heLyfnNl"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "faa2c384-5a34-4e43-bb44-21449b035f98", "DetectTime": "2024-05-21T12:36:35.684816+00:00", "EventTime": "2024-05-21T12:36:35.684835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKPX0g4NwK1xR59uqa"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "d7adce98-68f6-4e98-9b75-62d2911820b0", "DetectTime": "2024-05-21T12:36:35.728714+00:00", "EventTime": "2024-05-21T12:36:35.728734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ldUQ9UbO4U4522"], "accumulated_threat_level": 11.200000000000001, "timewindow": 90} +{"Format": "IDEA0", "ID": "987a39ca-0418-42d5-9724-badda42db756", "DetectTime": "2024-05-21T12:36:35.754899+00:00", "EventTime": "2024-05-21T12:36:35.754922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RWFN2vlvxZQYWW08"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "c46dfbf8-5465-4bd5-a2ab-b3ceed4d3d74", "DetectTime": "2024-05-21T12:36:35.788985+00:00", "EventTime": "2024-05-21T12:36:35.789003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFrox4jpbtbuhBmZ9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 90} +{"Format": "Json", "ID": "c46dfbf8-5465-4bd5-a2ab-b3ceed4d3d74", "DetectTime": "2024-05-21T12:36:35.788985+00:00", "EventTime": "2024-05-21T12:36:35.789003+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "1970-01-04T17:50:11.115225+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2024/05/21 12:36:35.996740)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 90, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "80afd76d-884f-4a4b-8ad7-5de9495daf73", "DetectTime": "2024-05-21T12:36:36.007670+00:00", "EventTime": "2024-05-21T12:36:36.007689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.73.185.159"]}], "Attach": [{"Content": "Connection to unknown destination port 29304/UDP destination IP 36.73.185.159. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY1J2M1OZQ6gczO1Re"], "accumulated_threat_level": 0.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "f4a7647f-b0fd-48fa-ac51-cdf8375e1f37", "DetectTime": "2024-05-21T12:36:36.019545+00:00", "EventTime": "2024-05-21T12:36:36.019564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ivvl3vaHOx201jJd"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "eef2f558-55b3-49d0-a66e-90e6406abef9", "DetectTime": "2024-05-21T12:36:36.030924+00:00", "EventTime": "2024-05-21T12:36:36.030943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsoNHM3lLTWtbOodD6"], "accumulated_threat_level": 1.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "7d8574e7-2f3f-4ec6-8552-0103f8026696", "DetectTime": "2024-05-21T12:36:36.041884+00:00", "EventTime": "2024-05-21T12:36:36.041902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcWIil32PcvRGmwIHg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 90} +{"Format": "IDEA0", "ID": "b96eb972-afb0-4468-8629-fbbac5208584", "DetectTime": "2024-05-21T12:36:36.046652+00:00", "EventTime": "2024-05-21T12:36:36.046677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFV783bMe7otKyXp4"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "89f4cafa-7c2c-4ad0-9db6-5b9ef2e28927", "DetectTime": "2024-05-21T12:36:36.241055+00:00", "EventTime": "2024-05-21T12:36:36.241074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyEFi13kAZi8IMV4f"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "52f025b5-15be-46cd-984e-e8631316bcaa", "DetectTime": "2024-05-21T12:36:36.306529+00:00", "EventTime": "2024-05-21T12:36:36.306550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0n6XLyPbMaBr7v2a"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "25af9e90-9d77-42c9-9340-84c3849feb08", "DetectTime": "2024-05-21T12:36:36.349058+00:00", "EventTime": "2024-05-21T12:36:36.349078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDG21lLVO5EeuLW6"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "ff1eaea2-3fad-40b0-b0b5-c61721acf511", "DetectTime": "2024-05-21T12:36:36.401808+00:00", "EventTime": "2024-05-21T12:36:36.401828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rlOD2q1zpnJscwC6"], "accumulated_threat_level": 4.0, "timewindow": 90} +{"Format": "IDEA0", "ID": "250b7a7c-4b61-498a-9c2d-7306f5bb7b6b", "DetectTime": "2024-05-21T12:36:36.438897+00:00", "EventTime": "2024-05-21T12:36:36.438918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxkpvn1DBpQdM4Su8b"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "e2bc699a-c336-4389-b560-4cfe9d9c3b79", "DetectTime": "2024-05-21T12:36:36.476708+00:00", "EventTime": "2024-05-21T12:36:36.476727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C69Olu2XUQLftgfoch"], "accumulated_threat_level": 4.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "91b0b240-82df-4283-ad1c-29d574453a9e", "DetectTime": "2024-05-21T12:36:36.519570+00:00", "EventTime": "2024-05-21T12:36:36.519591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSlQcj491YWwyCOUh8"], "accumulated_threat_level": 5.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "2140a7ec-8c46-4603-99d1-66d19136d6b2", "DetectTime": "2024-05-21T12:36:36.566608+00:00", "EventTime": "2024-05-21T12:36:36.566626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2P2to3m2pwubhzKL2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 90} +{"Format": "IDEA0", "ID": "a3637c2b-0cc4-40c1-a476-1392c0b9dd43", "DetectTime": "2024-05-21T12:36:36.601906+00:00", "EventTime": "2024-05-21T12:36:36.601928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgWpv49hJ3VsIK8Fi"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "8e3f2aa2-5077-4fe7-ad7f-e91f07c036fd", "DetectTime": "2024-05-21T12:36:36.637788+00:00", "EventTime": "2024-05-21T12:36:36.637810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxDSp83mZeftVWKxph"], "accumulated_threat_level": 7.199999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "afac47f2-6b0c-4e48-a155-b3e1b576fecf", "DetectTime": "2024-05-21T12:36:36.722716+00:00", "EventTime": "2024-05-21T12:36:36.722733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY43yG3usKBOjoUc8j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "a431b3e6-6867-4d05-8388-4eb36227136a", "DetectTime": "2024-05-21T12:36:36.775123+00:00", "EventTime": "2024-05-21T12:36:36.775142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDeGNA33L89OYc00U"], "accumulated_threat_level": 8.799999999999999, "timewindow": 90} +{"Format": "IDEA0", "ID": "fed79ecf-f273-4342-a2cb-e286ec482a69", "DetectTime": "2024-05-21T12:36:37.026213+00:00", "EventTime": "2024-05-21T12:36:37.026233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSt6Fl3RMZ7b6k2LJ3"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "072f9d64-10a5-429c-a475-fc8d262a358f", "DetectTime": "2024-05-21T12:36:37.030842+00:00", "EventTime": "2024-05-21T12:36:37.030861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsuXj2MWmN6JamaH8"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "adaab560-7994-418e-a0c3-e213b5a46982", "DetectTime": "2024-05-21T12:36:37.092311+00:00", "EventTime": "2024-05-21T12:36:37.092335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGksw2Cs85xIYefh7"], "accumulated_threat_level": 9.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "238552de-17c7-4271-9bcf-bd5be9a8b4aa", "DetectTime": "2024-05-21T12:36:37.127696+00:00", "EventTime": "2024-05-21T12:36:37.127717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIUD21xADNerU8uh8"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "65c4cc52-dd70-42bd-a5e1-d33422924fe2", "DetectTime": "2024-05-21T12:36:37.168285+00:00", "EventTime": "2024-05-21T12:36:37.168305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZTHk4NxrciMTxf1l"], "accumulated_threat_level": 10.4, "timewindow": 90} +{"Format": "IDEA0", "ID": "ae7a4508-947e-4031-bdb3-df669cfdc1ab", "DetectTime": "2024-05-21T12:36:37.197961+00:00", "EventTime": "2024-05-21T12:36:37.197983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.70.205.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkULC2tq5L1ZbHPq7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "fa9a4567-6a9a-460f-8a6b-a42314b6b2c8", "DetectTime": "2024-05-21T12:36:37.261686+00:00", "EventTime": "2024-05-21T12:36:37.261706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.247.65.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCB0csTS1yaO8VU8i"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "16ec319e-0b13-4c15-a67c-8fecb316ee5b", "DetectTime": "2024-05-21T12:36:37.417184+00:00", "EventTime": "2024-05-21T12:36:37.417205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzKvh3JyHAx1oH3Kc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 90} +{"Format": "IDEA0", "ID": "949432d2-c300-4757-9cb1-6e153bc7f135", "DetectTime": "2024-05-21T12:36:37.458603+00:00", "EventTime": "2024-05-21T12:36:37.458623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC1UQ74OOHPHKPjIee"], "accumulated_threat_level": 12.000000000000002, "timewindow": 90} +{"Format": "Json", "ID": "949432d2-c300-4757-9cb1-6e153bc7f135", "DetectTime": "2024-05-21T12:36:37.458603+00:00", "EventTime": "2024-05-21T12:36:37.458623+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "1970-01-04T17:51:07.810359+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 90. (real time 2024/05/21 12:36:37.704270)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 90, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e1a1a1f1-ea23-40fb-bb92-177c34f89343", "DetectTime": "2024-05-21T12:36:37.716263+00:00", "EventTime": "2024-05-21T12:36:37.716285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7Hdt4VJUnv32pKNj"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "94cdc821-17ee-4638-9973-8207bf762ee9", "DetectTime": "2024-05-21T12:36:37.721214+00:00", "EventTime": "2024-05-21T12:36:37.721234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS9s7V2lazZcPywex8"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "c2f0fe0c-f503-4fce-99ac-e254d849467e", "DetectTime": "2024-05-21T12:36:37.777460+00:00", "EventTime": "2024-05-21T12:36:37.777478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaA1YE0N2Me8hQZX1"], "accumulated_threat_level": 0.8, "timewindow": 90} +{"Format": "IDEA0", "ID": "7772c8d4-a7b1-43c3-96ad-66601f0f035c", "DetectTime": "2024-05-21T12:36:37.812477+00:00", "EventTime": "2024-05-21T12:36:37.812497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09r8k1w6q0fDqMI4f"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "b0d01877-52aa-485b-b05e-bb6cc4fc2da8", "DetectTime": "2024-05-21T12:36:37.849925+00:00", "EventTime": "2024-05-21T12:36:37.849948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C328o03X9lOofNkH3g"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "19f1a3f2-be73-42c8-8241-6e3abf125e78", "DetectTime": "2024-05-21T12:36:37.888901+00:00", "EventTime": "2024-05-21T12:36:37.888925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3l7BG4vfRttxKsQv9"], "accumulated_threat_level": 1.6, "timewindow": 90} +{"Format": "IDEA0", "ID": "0d2ac45d-575c-4c39-bac7-e2105ef98052", "DetectTime": "2024-05-21T12:36:37.894647+00:00", "EventTime": "2024-05-21T12:36:37.894669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.99.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgdH44H4MXrG4cEX1"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "5a1583c3-4a18-430f-b16e-9078e88e9eca", "DetectTime": "2024-05-21T12:36:37.945344+00:00", "EventTime": "2024-05-21T12:36:37.945366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.51.19.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkYOHE2nFhaQYjVcKi"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "8984edf3-f377-4b19-9502-a40adb80db0c", "DetectTime": "2024-05-21T12:36:37.986901+00:00", "EventTime": "2024-05-21T12:36:37.986922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ePCv1Yuk4gq9E7E9"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "853b3d10-db99-48d9-b151-bcdab42e2847", "DetectTime": "2024-05-21T12:36:38.001721+00:00", "EventTime": "2024-05-21T12:36:38.001744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ydxGNJjT9rN4QLl"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "061986d1-28b3-42ce-ac5b-89d2b70ee7b9", "DetectTime": "2024-05-21T12:36:38.359212+00:00", "EventTime": "2024-05-21T12:36:38.359237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGD6HR3Jlq4KPYWcUf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 90} +{"Format": "IDEA0", "ID": "02fd409f-df61-4ce9-8fc2-af6ed7a4d407", "DetectTime": "2024-05-21T12:36:38.364542+00:00", "EventTime": "2024-05-21T12:36:38.364562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMMW4Ngz6a2MuK6j"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "c7242753-8d47-4d2f-867c-f81ce21917ec", "DetectTime": "2024-05-21T12:36:38.412182+00:00", "EventTime": "2024-05-21T12:36:38.412204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C60wHh5uOH3F0qjNb"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "be86dee6-dbfb-41a8-827c-2365bfeca958", "DetectTime": "2024-05-21T12:36:38.440468+00:00", "EventTime": "2024-05-21T12:36:38.440488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHPOe1osemLXsZ2gc"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "948320aa-3122-4071-9839-658bc7965daf", "DetectTime": "2024-05-21T12:36:38.486999+00:00", "EventTime": "2024-05-21T12:36:38.487021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWW7sF30p5zKdNGWW8"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "7b8559a9-cfdd-4611-a33e-7dabc80d6ae5", "DetectTime": "2024-05-21T12:36:38.533264+00:00", "EventTime": "2024-05-21T12:36:38.533284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLw3d30xdHUVTqnK3"], "accumulated_threat_level": 0.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "85703bff-c63c-4b67-8716-018e363296b3", "DetectTime": "2024-05-21T12:36:38.660348+00:00", "EventTime": "2024-05-21T12:36:38.660367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXthTX2GEEh8du3tth", "CxVc912Ag6MjaOyAL6", "C0zjZ23UmqDEctaw0a", "Cai4Tj26m6xkFBCTFd"], "accumulated_threat_level": 1.3, "timewindow": 91} +{"Format": "IDEA0", "ID": "4559225a-d987-45c8-8ef5-bbf96b273d9e", "DetectTime": "2024-05-21T12:36:38.818858+00:00", "EventTime": "2024-05-21T12:36:38.818879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTZCH3LbC485da48j"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "46231cce-fa26-4a71-9877-3d737efff112", "DetectTime": "2024-05-21T12:36:38.913383+00:00", "EventTime": "2024-05-21T12:36:38.913405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCb4Kh4uswyOeujmh"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "bb5cb44c-467d-4cd4-83b9-4e7e8f9eae6d", "DetectTime": "2024-05-21T12:36:38.952465+00:00", "EventTime": "2024-05-21T12:36:38.952487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.223.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIutTPLwZ26T93q59"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "ba6c475c-12a3-4d17-b289-c544074c8f45", "DetectTime": "2024-05-21T12:36:39.223075+00:00", "EventTime": "2024-05-21T12:36:39.223098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdha64kY1VuZTN594"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "42d03a47-cf0a-4235-809b-020f8bd918f2", "DetectTime": "2024-05-21T12:36:39.287375+00:00", "EventTime": "2024-05-21T12:36:39.287396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfZrp1G3FyNZBg6Kg"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "2e9f9b4d-d8f1-4079-8e01-a99b672acf46", "DetectTime": "2024-05-21T12:36:39.335381+00:00", "EventTime": "2024-05-21T12:36:39.335401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtoOkG1Bnu8cjXsyl3"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "4cda31d7-308b-45b0-8c4b-8fac22506aa5", "DetectTime": "2024-05-21T12:36:39.627175+00:00", "EventTime": "2024-05-21T12:36:39.627198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COTP0i4iAd9RyYpzJb"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "027cd8ee-5eb1-4179-afbf-3651396e12f4", "DetectTime": "2024-05-21T12:36:39.675803+00:00", "EventTime": "2024-05-21T12:36:39.675826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cipo3a1Wuj8OqcK596"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "603afdae-0afa-4273-9fe8-ead564c50972", "DetectTime": "2024-05-21T12:36:39.681812+00:00", "EventTime": "2024-05-21T12:36:39.681833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXdYO27IgBbtRaNh6"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "4d5f77c0-3765-4c8d-b4eb-085eff7c6982", "DetectTime": "2024-05-21T12:36:39.686629+00:00", "EventTime": "2024-05-21T12:36:39.686649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiIjgp1OcSuLZKCsth"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "c4275ca3-c3b6-458d-88a8-5cb0ce1aeb54", "DetectTime": "2024-05-21T12:36:39.691322+00:00", "EventTime": "2024-05-21T12:36:39.691341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxb2a2A3UJ74Qa1v7"], "accumulated_threat_level": 0, "timewindow": 89} +{"Format": "IDEA0", "ID": "5b9bf1bd-3260-416d-a66f-74cf9d83a450", "DetectTime": "2024-05-21T12:36:39.696453+00:00", "EventTime": "2024-05-21T12:36:39.696476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpeX0l2orQIIVd70Ne"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "acc954aa-db9b-4b2c-bd0a-abb5cb961af5", "DetectTime": "2024-05-21T12:36:39.835118+00:00", "EventTime": "2024-05-21T12:36:39.835139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.123.181.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cftq8KIV0aezDMmab"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "890bab35-39ed-4d68-923a-ffeebefd72a1", "DetectTime": "2024-05-21T12:36:39.868734+00:00", "EventTime": "2024-05-21T12:36:39.868758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiFuxu127K7SweLh9j"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "94ed6edf-ab6c-4192-82ed-fe81056caa9e", "DetectTime": "2024-05-21T12:36:39.873984+00:00", "EventTime": "2024-05-21T12:36:39.874006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZXUV31eqe7DTTlU"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "f7615a5a-e20c-424e-b9de-002c1598acf0", "DetectTime": "2024-05-21T12:36:39.984676+00:00", "EventTime": "2024-05-21T12:36:39.984696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBT4Lzuu3ha9uT677"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "7f506f05-f782-49bc-916e-914801d0bfe2", "DetectTime": "2024-05-21T12:36:40.043751+00:00", "EventTime": "2024-05-21T12:36:40.043774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJ99YSJP8i215cM3"], "accumulated_threat_level": 2.1, "timewindow": 91} +{"Format": "IDEA0", "ID": "47dacad9-df35-40fa-82ce-4d1d168edb7c", "DetectTime": "2024-05-21T12:36:40.306490+00:00", "EventTime": "2024-05-21T12:36:40.306521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKmVC3kzEvoWlUL22"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 91} +{"Format": "IDEA0", "ID": "872fbcd7-d9bf-4e6c-bb0e-177e291346a7", "DetectTime": "2024-05-21T12:36:40.347539+00:00", "EventTime": "2024-05-21T12:36:40.347563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5zE0f3Ybi8S97kShd"], "accumulated_threat_level": 3.7, "timewindow": 91} +{"Format": "IDEA0", "ID": "a08b67da-672d-45cf-988b-2bec80b9551e", "DetectTime": "2024-05-21T12:36:40.389460+00:00", "EventTime": "2024-05-21T12:36:40.389482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGemPq1FaCKsvZpgWh"], "accumulated_threat_level": 4.5, "timewindow": 91} +{"Format": "IDEA0", "ID": "46ce00f3-b376-4db5-8593-eb6a20065227", "DetectTime": "2024-05-21T12:36:40.441549+00:00", "EventTime": "2024-05-21T12:36:40.441567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsSu4546I04qZSuAJ6"], "accumulated_threat_level": 5.3, "timewindow": 91} +{"Format": "IDEA0", "ID": "beb68aba-73eb-4842-b6a1-a1354cd64e7b", "DetectTime": "2024-05-21T12:36:40.490695+00:00", "EventTime": "2024-05-21T12:36:40.490715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8BTl3nU76w3zOS9i"], "accumulated_threat_level": 6.1, "timewindow": 91} +{"Format": "IDEA0", "ID": "3630cd1c-62b7-4214-a909-7cab63d1b992", "DetectTime": "2024-05-21T12:36:40.528137+00:00", "EventTime": "2024-05-21T12:36:40.528157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQQUG3LSM9DuTlGlh"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 91} +{"Format": "IDEA0", "ID": "16b58682-6605-49a6-a4b0-773f552587b4", "DetectTime": "2024-05-21T12:36:40.578473+00:00", "EventTime": "2024-05-21T12:36:40.578493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.51.19.187 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPYn44x19ECcZk558"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "c6257662-558e-4d32-a017-baa1d039c207", "DetectTime": "2024-05-21T12:36:40.697998+00:00", "EventTime": "2024-05-21T12:36:40.698020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmAvQ1EZw76a0ExU9"], "accumulated_threat_level": 7.699999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "1a96e0e7-98ea-4be8-a77b-2fae4024f907", "DetectTime": "2024-05-21T12:36:40.738982+00:00", "EventTime": "2024-05-21T12:36:40.739000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbSNl1D0o0MLoykAg"], "accumulated_threat_level": 8.5, "timewindow": 91} +{"Format": "IDEA0", "ID": "0fc9fdaf-8953-4706-b88c-29d1f2cf6c20", "DetectTime": "2024-05-21T12:36:40.790089+00:00", "EventTime": "2024-05-21T12:36:40.790108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPsev3M80i2oMq5m"], "accumulated_threat_level": 9.3, "timewindow": 91} +{"Format": "IDEA0", "ID": "595b3bdc-07df-4052-957a-d6db3306d0a5", "DetectTime": "2024-05-21T12:36:41.038231+00:00", "EventTime": "2024-05-21T12:36:41.038250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.188.99.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5R4oJ3HK5F1sTwma1"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "19210f06-a43c-454c-9161-360e98c31f0a", "DetectTime": "2024-05-21T12:36:41.078267+00:00", "EventTime": "2024-05-21T12:36:41.078288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5Dsf1M58hca55OM2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 91} +{"Format": "IDEA0", "ID": "984cbd36-3e7c-4392-95cb-ff97501f8b61", "DetectTime": "2024-05-21T12:36:41.119554+00:00", "EventTime": "2024-05-21T12:36:41.119574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlO6g233lTsLS1bV7"], "accumulated_threat_level": 10.900000000000002, "timewindow": 91} +{"Format": "IDEA0", "ID": "2a8888d3-b978-4c46-9a9b-99b94b8b7c78", "DetectTime": "2024-05-21T12:36:41.160987+00:00", "EventTime": "2024-05-21T12:36:41.161010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CePadU3mu8k4Moja9e"], "accumulated_threat_level": 11.700000000000003, "timewindow": 91} +{"Format": "IDEA0", "ID": "085e652a-69b8-45cd-800c-36293a4bb0cb", "DetectTime": "2024-05-21T12:36:41.200862+00:00", "EventTime": "2024-05-21T12:36:41.200885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7exqxKO6Kr4cU1l"], "accumulated_threat_level": 12.500000000000004, "timewindow": 91} +{"Format": "Json", "ID": "085e652a-69b8-45cd-800c-36293a4bb0cb", "DetectTime": "2024-05-21T12:36:41.200862+00:00", "EventTime": "2024-05-21T12:36:41.200885+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "1970-01-04T18:22:31.417074+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2024/05/21 12:36:41.639329)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 91, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "282f9871-9da6-4550-afe9-29b7898819e8", "DetectTime": "2024-05-21T12:36:41.653660+00:00", "EventTime": "2024-05-21T12:36:41.653677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cirf8m8DL0RliZsug"], "accumulated_threat_level": 0.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "ed6c5a15-e70f-4083-a6c5-def012a1c028", "DetectTime": "2024-05-21T12:36:41.665111+00:00", "EventTime": "2024-05-21T12:36:41.665135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OBOxUAtCqLZXXm6"], "accumulated_threat_level": 1.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "beef8c7f-9fbc-404b-9c22-52242976f5c4", "DetectTime": "2024-05-21T12:36:41.676430+00:00", "EventTime": "2024-05-21T12:36:41.676448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CspO2uDdFnK8syFO7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 91} +{"Format": "IDEA0", "ID": "611aa8c9-dafe-4a4b-9a19-15217e7e9d49", "DetectTime": "2024-05-21T12:36:41.686919+00:00", "EventTime": "2024-05-21T12:36:41.686937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7cl2d39iwPN8YVtqh"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "c4814ccd-21ec-4e26-9fcf-86759fee4902", "DetectTime": "2024-05-21T12:36:41.720622+00:00", "EventTime": "2024-05-21T12:36:41.720643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtY4ro1j8aNY1x91Bj"], "accumulated_threat_level": 3.2, "timewindow": 91} +{"Format": "IDEA0", "ID": "088380d1-15e3-4737-a4a0-bdeaa0fa8a3f", "DetectTime": "2024-05-21T12:36:41.983442+00:00", "EventTime": "2024-05-21T12:36:41.983462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDdAt12RUOCn8i0X4"], "accumulated_threat_level": 4.0, "timewindow": 91} +{"Format": "IDEA0", "ID": "5948ddbf-5606-44ed-8b0b-2614322ad34d", "DetectTime": "2024-05-21T12:36:42.023947+00:00", "EventTime": "2024-05-21T12:36:42.023967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKR3NlztEkpFec6a"], "accumulated_threat_level": 4.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "0b3ef467-8a79-4902-bcbb-3e8512e7775a", "DetectTime": "2024-05-21T12:36:42.066625+00:00", "EventTime": "2024-05-21T12:36:42.066643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwMoB3YPRBIopA8hk"], "accumulated_threat_level": 5.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "3a0cb411-b908-4b5c-91a4-ee48092fe293", "DetectTime": "2024-05-21T12:36:42.106599+00:00", "EventTime": "2024-05-21T12:36:42.106617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSC4cB27phsPB8BnQe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 91} +{"Format": "IDEA0", "ID": "f062cac4-f678-4c5b-9c50-2989655f3428", "DetectTime": "2024-05-21T12:36:42.136557+00:00", "EventTime": "2024-05-21T12:36:42.136578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.253.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzMU8l1mo0ChH0w0N2"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "fc33066d-ad7a-4016-81d4-80ab65c8c713", "DetectTime": "2024-05-21T12:36:42.173689+00:00", "EventTime": "2024-05-21T12:36:42.173709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMht53M4p1IXk63Fk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "f564a14f-7b35-47c7-bcf5-6acb6c3b5913", "DetectTime": "2024-05-21T12:36:42.213063+00:00", "EventTime": "2024-05-21T12:36:42.213084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cef7i34dcZGDRzDyO5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "46d3b312-b604-483d-be9c-2116b418a72a", "DetectTime": "2024-05-21T12:36:42.255124+00:00", "EventTime": "2024-05-21T12:36:42.255144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRr5KySy0K1BPKVh3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "326874a6-3df2-444b-98ee-a164ea977c73", "DetectTime": "2024-05-21T12:36:42.294085+00:00", "EventTime": "2024-05-21T12:36:42.294104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqaVUi1Q75FjiVi3Je"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "162c1645-fee4-4b2f-ac17-4881677a00cf", "DetectTime": "2024-05-21T12:36:42.357894+00:00", "EventTime": "2024-05-21T12:36:42.357913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXrmm3lpqcxTdK7oe"], "accumulated_threat_level": 10.4, "timewindow": 91} +{"Format": "IDEA0", "ID": "a8214ba7-7105-441f-be51-0885ea5d216f", "DetectTime": "2024-05-21T12:36:42.409091+00:00", "EventTime": "2024-05-21T12:36:42.409109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjk3lA1DWW9QOvQFP6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 91} +{"Format": "IDEA0", "ID": "923aa674-ce61-4aab-acc2-a6d5d40558dc", "DetectTime": "2024-05-21T12:36:42.462620+00:00", "EventTime": "2024-05-21T12:36:42.462640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqyoPp3a1cxFx29U4l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 91} +{"Format": "Json", "ID": "923aa674-ce61-4aab-acc2-a6d5d40558dc", "DetectTime": "2024-05-21T12:36:42.462620+00:00", "EventTime": "2024-05-21T12:36:42.462640+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "1970-01-04T18:22:50.513255+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2024/05/21 12:36:42.621617)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 91, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9999a076-1e71-4771-9f49-79339ff66bb5", "DetectTime": "2024-05-21T12:36:42.736798+00:00", "EventTime": "2024-05-21T12:36:42.736819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjvJFp3leVaG1b3Pmd"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "9e05d459-bc8e-4daf-898b-01023bab7844", "DetectTime": "2024-05-21T12:36:42.741572+00:00", "EventTime": "2024-05-21T12:36:42.741591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnueQYvFendBMMw3h"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "9cdeabf1-fe94-436e-b5d1-ed8c01a02cc4", "DetectTime": "2024-05-21T12:36:42.794395+00:00", "EventTime": "2024-05-21T12:36:42.794426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBPfX2sPNISUFuiek"], "accumulated_threat_level": 0.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "31d6de73-5fe1-4ac9-8efb-d58ecc6a760a", "DetectTime": "2024-05-21T12:36:42.825311+00:00", "EventTime": "2024-05-21T12:36:42.825332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRL931h0kiMTXw49a"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "418c33ec-aae8-4d58-9e94-ece72ada05a8", "DetectTime": "2024-05-21T12:36:42.861931+00:00", "EventTime": "2024-05-21T12:36:42.861949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6TJSA2AHDUCvVV9se"], "accumulated_threat_level": 1.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "470a2526-5a92-414a-941a-35db09d5a191", "DetectTime": "2024-05-21T12:36:42.906951+00:00", "EventTime": "2024-05-21T12:36:42.906970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXo8r1i1rNNJZdtRh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 91} +{"Format": "IDEA0", "ID": "1577afcc-f7db-4d68-b4a0-34c69f997c5e", "DetectTime": "2024-05-21T12:36:42.948681+00:00", "EventTime": "2024-05-21T12:36:42.948701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb5iy8echkyjN9DU6"], "accumulated_threat_level": 3.2, "timewindow": 91} +{"Format": "IDEA0", "ID": "379f1534-ae34-4f11-9555-d4587e85cbb5", "DetectTime": "2024-05-21T12:36:42.993607+00:00", "EventTime": "2024-05-21T12:36:42.993643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtPJe2jrOOlC1G7l2"], "accumulated_threat_level": 4.0, "timewindow": 91} +{"Format": "IDEA0", "ID": "08fee673-11d3-4b9a-bccc-1db7cc993bcf", "DetectTime": "2024-05-21T12:36:43.036717+00:00", "EventTime": "2024-05-21T12:36:43.036752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKljFr3K2DIobSZggc"], "accumulated_threat_level": 4.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "5c001717-f974-4c1e-87e1-58f303d25e89", "DetectTime": "2024-05-21T12:36:43.092455+00:00", "EventTime": "2024-05-21T12:36:43.092476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Wcwx1UZoEQAZIFS"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "2f3f02e0-6392-4f39-83c9-1cc4bdb70bb3", "DetectTime": "2024-05-21T12:36:43.293583+00:00", "EventTime": "2024-05-21T12:36:43.293603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGxTnO3F7OhmTzHpek"], "accumulated_threat_level": 5.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "74ddeb40-2d61-4d15-8e56-5054e5e07473", "DetectTime": "2024-05-21T12:36:43.335809+00:00", "EventTime": "2024-05-21T12:36:43.335827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDpIj33nDZ2rAdTFu3"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "10e98f03-0275-483f-98d5-643b0290d348", "DetectTime": "2024-05-21T12:36:43.539986+00:00", "EventTime": "2024-05-21T12:36:43.540006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8kqI2YnQHeGgYPG8"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "02c8f0d2-6e2b-47a8-a01a-bd3e5ed71a77", "DetectTime": "2024-05-21T12:36:43.803344+00:00", "EventTime": "2024-05-21T12:36:43.803366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18Csg40pwYsguWbaj", "CpxOWb2pmLPx3djsM8", "CVALU22ZJ0Usnn2Fk9", "CxJzO61Q4LvDHqy9F6"], "accumulated_threat_level": 6.1, "timewindow": 91} +{"Format": "IDEA0", "ID": "70cbeec6-b82d-45a7-8f21-01f8c9da860c", "DetectTime": "2024-05-21T12:36:43.829830+00:00", "EventTime": "2024-05-21T12:36:43.829851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHhVex1bxjUYokdfGc"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "88add299-9e51-4777-886f-db5168193320", "DetectTime": "2024-05-21T12:36:43.896557+00:00", "EventTime": "2024-05-21T12:36:43.896579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Rcm51frSMeCvMU4b"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "66093fe1-9274-496e-b4a6-db76b7445cd3", "DetectTime": "2024-05-21T12:36:43.937959+00:00", "EventTime": "2024-05-21T12:36:43.937980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eG4c2vSxYTUVSkQ1"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "84ee0483-3a88-45d7-b84c-e5c7a26ff044", "DetectTime": "2024-05-21T12:36:43.976997+00:00", "EventTime": "2024-05-21T12:36:43.977019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9HoLvtVI2gZM4G3"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "d97c893b-5c31-445e-badf-2099f471b0f7", "DetectTime": "2024-05-21T12:36:44.018255+00:00", "EventTime": "2024-05-21T12:36:44.018277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVI14G3LFiLBKvBMea"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "4497130c-3674-4f5d-8326-c91b4b7f210d", "DetectTime": "2024-05-21T12:36:44.064326+00:00", "EventTime": "2024-05-21T12:36:44.064348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjRse03CmXEpSD6dT4"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "fddcc54b-bb6d-47c7-b4a0-402d20770012", "DetectTime": "2024-05-21T12:36:44.102195+00:00", "EventTime": "2024-05-21T12:36:44.102214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnAqke3MbBHRBka4c"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "8390f006-3407-472a-8833-89d0f0abc24d", "DetectTime": "2024-05-21T12:36:44.354156+00:00", "EventTime": "2024-05-21T12:36:44.354177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkboeC4sSFLMk0mfS3"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "6afa925d-956b-4b29-a29f-139f1ea1d6c1", "DetectTime": "2024-05-21T12:36:44.401684+00:00", "EventTime": "2024-05-21T12:36:44.401706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtswV6280oS7aaHANf"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "14fd4210-9149-4f24-b8a0-5285f51e9222", "DetectTime": "2024-05-21T12:36:44.802912+00:00", "EventTime": "2024-05-21T12:36:44.802931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdNGK8O3ENTx2dxib"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 91} +{"Format": "IDEA0", "ID": "20d73288-8f92-440c-8422-c095a7a3eede", "DetectTime": "2024-05-21T12:36:44.839989+00:00", "EventTime": "2024-05-21T12:36:44.840010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgXr5v1PTmhvZsRZXl"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "a43de5f9-667b-4f1a-8a20-5e54502f28cf", "DetectTime": "2024-05-21T12:36:44.852816+00:00", "EventTime": "2024-05-21T12:36:44.852869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.70.205.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COV2iX3oXE010m1OQ6"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "8970a473-6dd2-4035-9445-bb7287531f4e", "DetectTime": "2024-05-21T12:36:44.859343+00:00", "EventTime": "2024-05-21T12:36:44.859365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.247.65.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBaZ64hJWGtBH8U21"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "952a169d-06c6-4ed7-9ee3-47dfdc3ec8fd", "DetectTime": "2024-05-21T12:36:44.864295+00:00", "EventTime": "2024-05-21T12:36:44.864313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQEso2rpwbq0un4Ij"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "124b1c98-09fe-4189-a97c-515cec22b071", "DetectTime": "2024-05-21T12:36:44.868919+00:00", "EventTime": "2024-05-21T12:36:44.868937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6Xsm2XxIjRqv5UGa"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "c5325c18-d6af-416b-8304-044455765cdc", "DetectTime": "2024-05-21T12:36:44.873987+00:00", "EventTime": "2024-05-21T12:36:44.874005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvyo91MLxSXQ07Rpj"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "d2af94e5-dc04-448b-8579-5fe3dc80817d", "DetectTime": "2024-05-21T12:36:44.879092+00:00", "EventTime": "2024-05-21T12:36:44.879110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqimR33HenRKelmf8"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "960d8bb8-caaf-4559-855c-f27ec1909475", "DetectTime": "2024-05-21T12:36:45.066842+00:00", "EventTime": "2024-05-21T12:36:45.066860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfOdcf8pnkSoic84"], "accumulated_threat_level": 7.699999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "8bee1d20-ce55-4a6f-865c-9578611fc20d", "DetectTime": "2024-05-21T12:36:45.322925+00:00", "EventTime": "2024-05-21T12:36:45.322945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKCStqwY69RKaQg3"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "99b38b20-26cd-4f69-aa8a-262ecacc1665", "DetectTime": "2024-05-21T12:36:45.382359+00:00", "EventTime": "2024-05-21T12:36:45.382379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4T91N2A5ahMl6O7x6"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "a301e72c-8487-4de5-9480-ff74a6b299ee", "DetectTime": "2024-05-21T12:36:45.394159+00:00", "EventTime": "2024-05-21T12:36:45.394180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChGYlo4qTwrCzWrb7g"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "271d5369-30f7-4656-890b-a463a1a9c68f", "DetectTime": "2024-05-21T12:36:45.406698+00:00", "EventTime": "2024-05-21T12:36:45.406718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR62z2Gg3bZhAe3i9"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "23b1ab3c-573b-489c-99f4-c0c891d8965a", "DetectTime": "2024-05-21T12:36:45.433563+00:00", "EventTime": "2024-05-21T12:36:45.433583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkLPq1K7zwCD28q7b"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "cd9b276d-32fa-4570-b18a-c1ff68316ef4", "DetectTime": "2024-05-21T12:36:45.439688+00:00", "EventTime": "2024-05-21T12:36:45.439707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cihggc4Gl9bbFdSc9f"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "4b1ee461-7b76-45b5-a500-62881e3c21c1", "DetectTime": "2024-05-21T12:36:45.453106+00:00", "EventTime": "2024-05-21T12:36:45.453129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmiymv5nOyEjXXtg"], "accumulated_threat_level": 8.5, "timewindow": 91} +{"Format": "IDEA0", "ID": "8b9264d2-239b-4170-82cd-3effcf84527d", "DetectTime": "2024-05-21T12:36:45.458278+00:00", "EventTime": "2024-05-21T12:36:45.458299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3i3u4NiI2vykJgCe"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "d0dccf31-56ca-4890-a84c-ee71e6613393", "DetectTime": "2024-05-21T12:36:45.625161+00:00", "EventTime": "2024-05-21T12:36:45.625190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ0WAl1PINU55MmpRl"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "e04a832a-979f-43ad-9bde-8d45b22beb84", "DetectTime": "2024-05-21T12:36:45.630462+00:00", "EventTime": "2024-05-21T12:36:45.630482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw6ZIc2EFUOyIaKpv2"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "bbdeac37-e5e5-4c55-b776-45021470c25e", "DetectTime": "2024-05-21T12:36:45.888815+00:00", "EventTime": "2024-05-21T12:36:45.888836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMl1FkNoeFS98S2"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "a02f2d3b-66c3-4236-9ccd-dfea53b1982d", "DetectTime": "2024-05-21T12:36:46.007196+00:00", "EventTime": "2024-05-21T12:36:46.007218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.223.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Iffe3i77ZukUO5bi"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "65023038-71e6-48e4-8af9-7cea29cc1a1f", "DetectTime": "2024-05-21T12:36:46.014493+00:00", "EventTime": "2024-05-21T12:36:46.014513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67aCn2Q3zxlJZVrTi"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "cd7c5652-6e20-4205-bfd6-7320d7022f30", "DetectTime": "2024-05-21T12:36:46.028813+00:00", "EventTime": "2024-05-21T12:36:46.028834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFVCD14DoGJbHRK8i"], "accumulated_threat_level": 9.3, "timewindow": 91} +{"Format": "IDEA0", "ID": "e852ce64-1371-40fb-a112-da8f02443c68", "DetectTime": "2024-05-21T12:36:46.033830+00:00", "EventTime": "2024-05-21T12:36:46.033847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6k3qa4ZoUEieMMpqh"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "5648ef03-134b-44b3-85d2-d1fa60433eb9", "DetectTime": "2024-05-21T12:36:46.038743+00:00", "EventTime": "2024-05-21T12:36:46.038760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQofSU2f2PY5jYLhs2"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "5064f793-fd43-4776-bbad-b6bff78c5202", "DetectTime": "2024-05-21T12:36:46.043178+00:00", "EventTime": "2024-05-21T12:36:46.043196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhZJzzCHThaPayHd"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "36bbea9b-4342-496e-a6f5-9c8fc13c5c14", "DetectTime": "2024-05-21T12:36:46.054726+00:00", "EventTime": "2024-05-21T12:36:46.054745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgrEEM1p6UkVTJ5Zt8"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "5ce9cd2b-6e6a-4e6a-84d0-d389c02e1144", "DetectTime": "2024-05-21T12:36:46.129177+00:00", "EventTime": "2024-05-21T12:36:46.129198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKN4Hl1jLhpRSBpOt8"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "3a93021c-1c71-43cf-b4f1-2523a07f9887", "DetectTime": "2024-05-21T12:36:46.242036+00:00", "EventTime": "2024-05-21T12:36:46.242056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZRAC1ECDCNAGlEm9"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "38ff5819-5455-4ba6-a646-2d01716c0f02", "DetectTime": "2024-05-21T12:36:46.535562+00:00", "EventTime": "2024-05-21T12:36:46.535586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgMh42dxHzTbgCCf"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "ed70b0cd-9bde-49da-9ba3-c50ef341162e", "DetectTime": "2024-05-21T12:36:46.571298+00:00", "EventTime": "2024-05-21T12:36:46.571317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9Ik93UWPzTES1Sd2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 91} +{"Format": "IDEA0", "ID": "9af393c7-25d1-4cda-942d-29e58e60e2e1", "DetectTime": "2024-05-21T12:36:46.611925+00:00", "EventTime": "2024-05-21T12:36:46.611944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGcTC83hlB6YtoBjOa"], "accumulated_threat_level": 10.900000000000002, "timewindow": 91} +{"Format": "IDEA0", "ID": "fd359aeb-d3a6-41ad-ac01-3badd8071929", "DetectTime": "2024-05-21T12:36:46.652776+00:00", "EventTime": "2024-05-21T12:36:46.652794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZrE82nk9I0S8RJh2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 91} +{"Format": "IDEA0", "ID": "65227694-ac67-41b7-9261-194e391d5772", "DetectTime": "2024-05-21T12:36:46.692826+00:00", "EventTime": "2024-05-21T12:36:46.692844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoNHr4c20I8xCmeta"], "accumulated_threat_level": 12.500000000000004, "timewindow": 91} +{"Format": "Json", "ID": "65227694-ac67-41b7-9261-194e391d5772", "DetectTime": "2024-05-21T12:36:46.692826+00:00", "EventTime": "2024-05-21T12:36:46.692844+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-04T18:54:00.117271+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2024/05/21 12:36:46.931728)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 91, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "aac18ab5-7817-4680-88c1-e70172c3bb1a", "DetectTime": "2024-05-21T12:36:46.943145+00:00", "EventTime": "2024-05-21T12:36:46.943165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFovPY18PbfjGYvY27"], "accumulated_threat_level": 0.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "b6a3a156-2d3c-44b5-be86-c4b55f04192f", "DetectTime": "2024-05-21T12:36:46.954808+00:00", "EventTime": "2024-05-21T12:36:46.954826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTD1tt4HcxolHkxxsi"], "accumulated_threat_level": 1.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "35529973-2286-4876-8996-e85af779d6fa", "DetectTime": "2024-05-21T12:36:46.966175+00:00", "EventTime": "2024-05-21T12:36:46.966194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsX9B3EaODm7yOkj2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 91} +{"Format": "IDEA0", "ID": "b6715775-9854-46c9-95a9-d631a30e9951", "DetectTime": "2024-05-21T12:36:46.977894+00:00", "EventTime": "2024-05-21T12:36:46.977912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFUvFt4suuteLbqoZe"], "accumulated_threat_level": 3.2, "timewindow": 91} +{"Format": "IDEA0", "ID": "c500b360-db83-4a64-94fd-23506d426d20", "DetectTime": "2024-05-21T12:36:46.989142+00:00", "EventTime": "2024-05-21T12:36:46.989160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1aLec1Lt0AmaAPgId"], "accumulated_threat_level": 4.0, "timewindow": 91} +{"Format": "IDEA0", "ID": "d65efd47-9968-42d2-9999-32412431c8a8", "DetectTime": "2024-05-21T12:36:47.153372+00:00", "EventTime": "2024-05-21T12:36:47.153391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSTB01HMALaK9dOIa"], "accumulated_threat_level": 4.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "df2103d0-98ab-4c30-ab75-12c0fa201be1", "DetectTime": "2024-05-21T12:36:47.192094+00:00", "EventTime": "2024-05-21T12:36:47.192112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.71.187.210"]}], "Attach": [{"Content": "Connection to unknown destination port 13907/UDP destination IP 46.71.187.210. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgOf73SywS15YuRY"], "accumulated_threat_level": 5.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "f9668a35-9d25-4a3f-b20c-2e872012cd17", "DetectTime": "2024-05-21T12:36:47.245781+00:00", "EventTime": "2024-05-21T12:36:47.245804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COAuvR3or8jHttHhg1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 91} +{"Format": "IDEA0", "ID": "9cc57c70-5ea2-4562-8934-fdfafa638051", "DetectTime": "2024-05-21T12:36:47.272483+00:00", "EventTime": "2024-05-21T12:36:47.272503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnXHok2WqNcguqkac3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "3ccf956e-e026-45c1-9aa2-060658af8ef0", "DetectTime": "2024-05-21T12:36:47.311307+00:00", "EventTime": "2024-05-21T12:36:47.311324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZcnh3qHf9FrR30M4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "4e242ba6-f82a-4780-92ee-6d870c37d431", "DetectTime": "2024-05-21T12:36:47.351721+00:00", "EventTime": "2024-05-21T12:36:47.351744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjpy7KZDVdtDbhfq4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "28019297-1a60-4989-9247-91c402ed14bd", "DetectTime": "2024-05-21T12:36:47.390107+00:00", "EventTime": "2024-05-21T12:36:47.390125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAojlgHgGfFOzerb"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "82cfa654-8e52-49a8-bdf2-570acafc538c", "DetectTime": "2024-05-21T12:36:47.430185+00:00", "EventTime": "2024-05-21T12:36:47.430207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9iv3ne8is6UIDIh"], "accumulated_threat_level": 10.4, "timewindow": 91} +{"Format": "IDEA0", "ID": "3eb76ca2-8627-494b-81b4-91b1ae2b94cd", "DetectTime": "2024-05-21T12:36:47.459220+00:00", "EventTime": "2024-05-21T12:36:47.459239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.239.253.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pYAhL1iaPRDfXKe"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "86b5fa66-d23b-4705-9b45-57eee0adec48", "DetectTime": "2024-05-21T12:36:47.494402+00:00", "EventTime": "2024-05-21T12:36:47.494434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NPyW1sMQB25p0LXi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 91} +{"Format": "IDEA0", "ID": "27a71c15-6f63-4098-a102-59d65d2d3073", "DetectTime": "2024-05-21T12:36:47.749670+00:00", "EventTime": "2024-05-21T12:36:47.749690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEmgcT2Lx6hr7bpXnl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 91} +{"Format": "Json", "ID": "27a71c15-6f63-4098-a102-59d65d2d3073", "DetectTime": "2024-05-21T12:36:47.749670+00:00", "EventTime": "2024-05-21T12:36:47.749690+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "1970-01-04T18:54:03.322407+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 91. (real time 2024/05/21 12:36:47.972156)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 91, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c0daa812-66c7-4eac-a289-7a7317699895", "DetectTime": "2024-05-21T12:36:48.055886+00:00", "EventTime": "2024-05-21T12:36:48.055916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGwrJ15EJ9RPckiX6"], "accumulated_threat_level": 0.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "0b01ace3-8bb7-4828-ae25-5eb9b7d5e963", "DetectTime": "2024-05-21T12:36:48.068378+00:00", "EventTime": "2024-05-21T12:36:48.068406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjwgoBlWYmq64X8d"], "accumulated_threat_level": 1.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "a7f9fc97-226b-480a-9953-5e0f3d5e1223", "DetectTime": "2024-05-21T12:36:48.081795+00:00", "EventTime": "2024-05-21T12:36:48.081826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C060hB3HbKnEVyVmFg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 91} +{"Format": "IDEA0", "ID": "f08d4d4f-c62a-4c29-b946-464b311a9c1e", "DetectTime": "2024-05-21T12:36:48.093805+00:00", "EventTime": "2024-05-21T12:36:48.093832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQ9qm3fbm4KUiuNP6"], "accumulated_threat_level": 3.2, "timewindow": 91} +{"Format": "IDEA0", "ID": "c65625d2-e668-4e8d-91b7-8829cf416646", "DetectTime": "2024-05-21T12:36:48.106392+00:00", "EventTime": "2024-05-21T12:36:48.106428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6rlU22GLAoeA5qTh"], "accumulated_threat_level": 4.0, "timewindow": 91} +{"Format": "IDEA0", "ID": "e196c95d-77fc-4a15-b8a1-e850e590f19d", "DetectTime": "2024-05-21T12:36:48.111497+00:00", "EventTime": "2024-05-21T12:36:48.111515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.247.65.143 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSdEb1b7lIQKhuyOh"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "aa0e9bc7-bd79-49cb-8376-4b7956a2a922", "DetectTime": "2024-05-21T12:36:48.116229+00:00", "EventTime": "2024-05-21T12:36:48.116248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.3.226.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJczx3wkbJs2iJWeh"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "4cf7db7a-c0e3-4c00-af48-76d3adbf7633", "DetectTime": "2024-05-21T12:36:48.178075+00:00", "EventTime": "2024-05-21T12:36:48.178109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsL0oh4V5kGcFxoCTj"], "accumulated_threat_level": 4.8, "timewindow": 91} +{"Format": "IDEA0", "ID": "f72e1d7a-a65e-4514-9311-67a28a2b714c", "DetectTime": "2024-05-21T12:36:48.219269+00:00", "EventTime": "2024-05-21T12:36:48.219302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfxscm31MoaEqUfZT"], "accumulated_threat_level": 5.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8e1cf6a2-a36d-4b17-abc7-4622a3f40bb0", "DetectTime": "2024-05-21T12:36:48.280043+00:00", "EventTime": "2024-05-21T12:36:48.280061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SZYj43dEC6Ai6ejl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 91} +{"Format": "IDEA0", "ID": "7652a586-b739-4859-95ac-fb83e923fca3", "DetectTime": "2024-05-21T12:36:48.319000+00:00", "EventTime": "2024-05-21T12:36:48.319020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhlWp1XWw12fECXu8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "12538112-5844-41b3-a017-f3b5b9ba31d5", "DetectTime": "2024-05-21T12:36:48.565680+00:00", "EventTime": "2024-05-21T12:36:48.565701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKozex4O7mAbqYCtDd"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "d5205a1e-73a8-40f2-bb72-fa42e9b64230", "DetectTime": "2024-05-21T12:36:48.604352+00:00", "EventTime": "2024-05-21T12:36:48.604389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CquUJh1nailNJv4UNj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "d8c79545-938a-465d-b7e9-a7549791a7c5", "DetectTime": "2024-05-21T12:36:48.642526+00:00", "EventTime": "2024-05-21T12:36:48.642554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C80Ygr1n1p6SJa0nUl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 91} +{"Format": "IDEA0", "ID": "aa5abfb9-985f-448d-aabb-ddb22b72b49a", "DetectTime": "2024-05-21T12:36:48.682012+00:00", "EventTime": "2024-05-21T12:36:48.682031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8tPJ2FxLHUUbLpM6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "e57bd58c-e260-4a4a-b3e3-b08b4bd897cb", "DetectTime": "2024-05-21T12:36:48.753316+00:00", "EventTime": "2024-05-21T12:36:48.753335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfjQB4rinfLHLM60f"], "accumulated_threat_level": 0.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "146f27f1-62f6-41c6-b4e2-a893c4475475", "DetectTime": "2024-05-21T12:36:48.843798+00:00", "EventTime": "2024-05-21T12:36:48.843815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12ZVD2mo7ANACJTmh"], "accumulated_threat_level": 1.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "8afaa359-5d24-4b96-b942-4f5568530dc6", "DetectTime": "2024-05-21T12:36:48.881498+00:00", "EventTime": "2024-05-21T12:36:48.881516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.228.60"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.228.60. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crf2bT3swekdHdYIy6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 92} +{"Format": "IDEA0", "ID": "7563bd45-f1ea-4301-b1ea-68892cc02053", "DetectTime": "2024-05-21T12:36:48.922629+00:00", "EventTime": "2024-05-21T12:36:48.922649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBy5HidAvugJ9Q8q6"], "accumulated_threat_level": 3.2, "timewindow": 92} +{"Format": "IDEA0", "ID": "1d3f048d-70df-49ec-95e7-7f6e17ed1c2e", "DetectTime": "2024-05-21T12:36:48.964380+00:00", "EventTime": "2024-05-21T12:36:48.964397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdfwJfICcG8ZffFl"], "accumulated_threat_level": 4.0, "timewindow": 92} +{"Format": "IDEA0", "ID": "6b23b801-c079-4129-a222-de301dff0d04", "DetectTime": "2024-05-21T12:36:49.006882+00:00", "EventTime": "2024-05-21T12:36:49.006903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8euAs1BhkZiZFpZS7"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "78e4280e-541b-4bbc-be85-9ae1881e9747", "DetectTime": "2024-05-21T12:36:49.052803+00:00", "EventTime": "2024-05-21T12:36:49.052842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7x9BesGyj3kVCqmk"], "accumulated_threat_level": 5.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "c0667e3d-e73a-44c5-b1ea-7e0bfe16fd5e", "DetectTime": "2024-05-21T12:36:49.096148+00:00", "EventTime": "2024-05-21T12:36:49.096185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcg6l1f2eRswbhp5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 92} +{"Format": "IDEA0", "ID": "7b55105f-c53e-45c8-aecb-daebca7a4e92", "DetectTime": "2024-05-21T12:36:49.355283+00:00", "EventTime": "2024-05-21T12:36:49.355304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5r9rT1uDyfKTHfxAk"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "ae462048-58bd-4ea9-81b7-1eb570e6c876", "DetectTime": "2024-05-21T12:36:49.395119+00:00", "EventTime": "2024-05-21T12:36:49.395156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAjBi2BzQDbDEEiUb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "865eb1ed-671f-425c-b970-90235c40c8d2", "DetectTime": "2024-05-21T12:36:49.429787+00:00", "EventTime": "2024-05-21T12:36:49.429810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGuDy2dCifMiYso"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "cf9d324e-7219-4597-9fd8-3c85c6d0fbd8", "DetectTime": "2024-05-21T12:36:49.469476+00:00", "EventTime": "2024-05-21T12:36:49.469507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpvr2q3rqhXxEJ5898"], "accumulated_threat_level": 7.999999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "adb1ee32-e15b-44b1-a3e1-e378ffb587ba", "DetectTime": "2024-05-21T12:36:49.511135+00:00", "EventTime": "2024-05-21T12:36:49.511164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVv3911PYSZf4ZCT5c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "1dcd2dc2-2acc-4f82-ac10-346f60bc3e5f", "DetectTime": "2024-05-21T12:36:49.542055+00:00", "EventTime": "2024-05-21T12:36:49.542078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CayoWd2C25AEWEnbDg"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "dabde911-2773-4fbb-a94d-eb503ecf1cb6", "DetectTime": "2024-05-21T12:36:49.579068+00:00", "EventTime": "2024-05-21T12:36:49.579095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWG01BkCgrudgFK3b"], "accumulated_threat_level": 9.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "7d48fcef-4dc6-4b97-afc5-a07c8adb993b", "DetectTime": "2024-05-21T12:36:49.607128+00:00", "EventTime": "2024-05-21T12:36:49.607152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNV7s2m4p1xiveesi"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "3034153c-4666-428f-870f-1cb3ad7ce3cb", "DetectTime": "2024-05-21T12:36:49.646040+00:00", "EventTime": "2024-05-21T12:36:49.646072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgMAHE2OsWCl4X1K2f"], "accumulated_threat_level": 10.4, "timewindow": 92} +{"Format": "IDEA0", "ID": "47e96bfb-1f4b-484e-896c-258b8e4ff340", "DetectTime": "2024-05-21T12:36:49.686340+00:00", "EventTime": "2024-05-21T12:36:49.686360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqt0tZ1om8ptyTBOnk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 92} +{"Format": "IDEA0", "ID": "92602aed-4dc4-4ec2-8b25-4e2601910123", "DetectTime": "2024-05-21T12:36:49.963968+00:00", "EventTime": "2024-05-21T12:36:49.963993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJH1pd2zmaCzFqHQTl"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "0da9c873-3c9c-4c3f-911b-2b8457a99d03", "DetectTime": "2024-05-21T12:36:49.969669+00:00", "EventTime": "2024-05-21T12:36:49.969688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLBOZ2h43hc4x6Vm4"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "67e4d0ca-8e4a-46eb-b0d3-127e286b8fd1", "DetectTime": "2024-05-21T12:36:49.974358+00:00", "EventTime": "2024-05-21T12:36:49.974377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwtCA4poxhiHkXwi3"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "bca64123-4c1a-404b-afd4-d1091133ea53", "DetectTime": "2024-05-21T12:36:50.002379+00:00", "EventTime": "2024-05-21T12:36:50.002397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8av3w4u3tOzltd7lj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 92} +{"Format": "Json", "ID": "bca64123-4c1a-404b-afd4-d1091133ea53", "DetectTime": "2024-05-21T12:36:50.002379+00:00", "EventTime": "2024-05-21T12:36:50.002397+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "1970-01-04T19:24:16.022498+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2024/05/21 12:36:50.167149)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 92, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "12112dc4-5aff-45b1-950d-4e194e637898", "DetectTime": "2024-05-21T12:36:50.171525+00:00", "EventTime": "2024-05-21T12:36:50.171548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpPJWi4D6jrzEQrzke"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "e2083788-c385-441a-8f01-b353323a2a1a", "DetectTime": "2024-05-21T12:36:50.176559+00:00", "EventTime": "2024-05-21T12:36:50.176576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Xomy1b9iyqdx6i43"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "6f82b0e2-3182-4b96-a4a9-ce744f33d302", "DetectTime": "2024-05-21T12:36:50.181096+00:00", "EventTime": "2024-05-21T12:36:50.181114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnuPs4tvbbHYXjy8c"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "8c11633b-1cec-46f6-9d64-2536a9b20c33", "DetectTime": "2024-05-21T12:36:50.203752+00:00", "EventTime": "2024-05-21T12:36:50.203776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COWidE1iKf9NpSYzch"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "8457d316-a61b-4121-9468-59bbacc07e45", "DetectTime": "2024-05-21T12:36:50.255201+00:00", "EventTime": "2024-05-21T12:36:50.255219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkRDi3hi6MDRHzXP8"], "accumulated_threat_level": 0.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "5381d9f4-5e82-4851-a6b9-425d8a64b3f7", "DetectTime": "2024-05-21T12:36:50.491938+00:00", "EventTime": "2024-05-21T12:36:50.491959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8glY41Stx9YPobmLk"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "095c7506-6936-4893-9f22-b4f9c6deadd6", "DetectTime": "2024-05-21T12:36:50.541214+00:00", "EventTime": "2024-05-21T12:36:50.541231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKrna43K9cCgoNo1"], "accumulated_threat_level": 1.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "801e80a7-0055-44eb-ab08-9c625380fbc5", "DetectTime": "2024-05-21T12:36:50.569717+00:00", "EventTime": "2024-05-21T12:36:50.569735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq3Aq71kwl2rAcvtX9"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "992a1a34-b9e8-4184-a2ef-135dfb857f69", "DetectTime": "2024-05-21T12:36:50.607763+00:00", "EventTime": "2024-05-21T12:36:50.607782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ZlDu13QOs1w5nPL8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 92} +{"Format": "IDEA0", "ID": "c8a42923-c937-477b-999d-d0c8ac98f0e5", "DetectTime": "2024-05-21T12:36:50.632437+00:00", "EventTime": "2024-05-21T12:36:50.632457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CulHDK2ln2MCchEWw4"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "384ed15c-5802-4564-a3b8-308593ff20e9", "DetectTime": "2024-05-21T12:36:50.679596+00:00", "EventTime": "2024-05-21T12:36:50.679624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIM1YP1VW8oT2CI3O6"], "accumulated_threat_level": 3.2, "timewindow": 92} +{"Format": "IDEA0", "ID": "b94a7477-1254-473c-953e-084eadd32069", "DetectTime": "2024-05-21T12:36:50.717298+00:00", "EventTime": "2024-05-21T12:36:50.717318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxJ8I3EVSYz9hiOB7"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "6bb93000-009a-41c3-86c3-09015f2819a6", "DetectTime": "2024-05-21T12:36:50.751523+00:00", "EventTime": "2024-05-21T12:36:50.751540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVR5GJ1TZ3Y8c5YZU6"], "accumulated_threat_level": 4.0, "timewindow": 92} +{"Format": "IDEA0", "ID": "d5087f1a-dd5c-460b-8e19-5515316969db", "DetectTime": "2024-05-21T12:36:50.782464+00:00", "EventTime": "2024-05-21T12:36:50.782483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ldUQ9UbO4U4522"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "99fbd809-6d9c-4b64-acc3-4fcd66580587", "DetectTime": "2024-05-21T12:36:50.825546+00:00", "EventTime": "2024-05-21T12:36:50.825567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFrox4jpbtbuhBmZ9"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "8d0bd579-014b-41c6-8882-4c020d528d1a", "DetectTime": "2024-05-21T12:36:50.837464+00:00", "EventTime": "2024-05-21T12:36:50.837482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8aiB22MwMwsaPfEfg"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "1437d6b2-089a-4493-977c-a96cfa88badb", "DetectTime": "2024-05-21T12:36:50.884622+00:00", "EventTime": "2024-05-21T12:36:50.884647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY1J2M1OZQ6gczO1Re"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "fa3496a5-6567-40f7-b081-e5f2bb2f53d1", "DetectTime": "2024-05-21T12:36:51.227026+00:00", "EventTime": "2024-05-21T12:36:51.227044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0odRc3lSk3WW5MYL7"], "accumulated_threat_level": 5.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "25badca4-4072-4c3e-84fc-88cf2363f9ce", "DetectTime": "2024-05-21T12:36:51.252979+00:00", "EventTime": "2024-05-21T12:36:51.253000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsoNHM3lLTWtbOodD6"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "a3f8ae58-2828-4c19-a8a2-8a382a6e3c09", "DetectTime": "2024-05-21T12:36:51.257722+00:00", "EventTime": "2024-05-21T12:36:51.257742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcWIil32PcvRGmwIHg"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "e2c54ba1-dc9a-4e24-8d71-43562bd564bb", "DetectTime": "2024-05-21T12:36:51.344420+00:00", "EventTime": "2024-05-21T12:36:51.344439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNB90m39QSS9QJXlV8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 92} +{"Format": "IDEA0", "ID": "01e4bfee-9d14-469b-979e-5f46cb923ddd", "DetectTime": "2024-05-21T12:36:51.349089+00:00", "EventTime": "2024-05-21T12:36:51.349106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.70.205.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctBb41urzSq5K1UO4"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "1bd692a7-8b40-471e-be7f-23f2c9b92b5d", "DetectTime": "2024-05-21T12:36:51.386387+00:00", "EventTime": "2024-05-21T12:36:51.386424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDG21lLVO5EeuLW6"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "4f2da132-d44e-45bc-8b8a-37acc2333f8a", "DetectTime": "2024-05-21T12:36:51.428376+00:00", "EventTime": "2024-05-21T12:36:51.428398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5T0Cx9AYzaQHThf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "3c05ab69-33ad-4af0-9062-a2ac046db71b", "DetectTime": "2024-05-21T12:36:51.457521+00:00", "EventTime": "2024-05-21T12:36:51.457541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rlOD2q1zpnJscwC6"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "57d5e148-cc0b-4b38-9e6e-c72e6302923d", "DetectTime": "2024-05-21T12:36:51.493990+00:00", "EventTime": "2024-05-21T12:36:51.494011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdkYV3wGe9ap4aUki"], "accumulated_threat_level": 7.999999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "6c2dc9af-8d60-49f6-b1b4-ca970bf996c5", "DetectTime": "2024-05-21T12:36:51.521053+00:00", "EventTime": "2024-05-21T12:36:51.521074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C69Olu2XUQLftgfoch"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "846c5cf7-7eb2-445b-96e0-9432ac427f13", "DetectTime": "2024-05-21T12:36:51.564062+00:00", "EventTime": "2024-05-21T12:36:51.564086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdPPZ1GKXn4uaiXo"], "accumulated_threat_level": 8.799999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "166f6d6a-7678-4d5e-86c7-0e7b681f7d4b", "DetectTime": "2024-05-21T12:36:51.583104+00:00", "EventTime": "2024-05-21T12:36:51.583123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSlQcj491YWwyCOUh8"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "e5bf91ae-1a4f-4419-ab04-2f00ad7e6191", "DetectTime": "2024-05-21T12:36:51.897288+00:00", "EventTime": "2024-05-21T12:36:51.897307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82Zx5rMNHhPP5CW2"], "accumulated_threat_level": 9.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "a9ff153e-d24d-4435-9e2f-59124750ba18", "DetectTime": "2024-05-21T12:36:51.902760+00:00", "EventTime": "2024-05-21T12:36:51.902782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2P2to3m2pwubhzKL2"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "195a2014-3c25-47c0-8990-f2ec651ee7a9", "DetectTime": "2024-05-21T12:36:51.908058+00:00", "EventTime": "2024-05-21T12:36:51.908074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxDSp83mZeftVWKxph"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "276e6f32-4176-4906-b78b-597d62555a6c", "DetectTime": "2024-05-21T12:36:51.912821+00:00", "EventTime": "2024-05-21T12:36:51.912839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfXLDZ21XyccaXhFA1"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "571ef93f-bc94-49ee-95ee-dee4c9dd62e1", "DetectTime": "2024-05-21T12:36:51.917793+00:00", "EventTime": "2024-05-21T12:36:51.917813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY43yG3usKBOjoUc8j"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "8130bb07-f49d-408b-a9a2-82ea30965ea1", "DetectTime": "2024-05-21T12:36:52.050359+00:00", "EventTime": "2024-05-21T12:36:52.050383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDeGNA33L89OYc00U"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "d2688dbf-180b-42a6-a917-8f3b0aff0ced", "DetectTime": "2024-05-21T12:36:52.082155+00:00", "EventTime": "2024-05-21T12:36:52.082173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.147.12"]}], "Attach": [{"Content": "Connection to unknown destination port 8396/UDP destination IP 5.178.147.12. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEDcW3TWE4J2wkZL3"], "accumulated_threat_level": 10.4, "timewindow": 92} +{"Format": "IDEA0", "ID": "04aed3dc-546f-4cb1-b28c-28e06b3eb2b5", "DetectTime": "2024-05-21T12:36:52.123220+00:00", "EventTime": "2024-05-21T12:36:52.123241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.33.13"]}], "Attach": [{"Content": "Connection to unknown destination port 15074/UDP destination IP 94.43.33.13. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmkUs2yPo13A8UGr4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 92} +{"Format": "IDEA0", "ID": "fe17fec8-1bdb-4301-beef-ed0d24e49b2d", "DetectTime": "2024-05-21T12:36:52.128624+00:00", "EventTime": "2024-05-21T12:36:52.128644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3sZAV8qHwyfp4HUk", "CpwQmrPUbuVafBl96", "C0Y3oK308wY1Y05PB7", "CtBxWg1B4X6tnbWz2"], "accumulated_threat_level": 11.700000000000001, "timewindow": 92} +{"Format": "IDEA0", "ID": "bc418a6e-e4ca-4348-9af0-3b3477680356", "DetectTime": "2024-05-21T12:36:52.225732+00:00", "EventTime": "2024-05-21T12:36:52.225768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGksw2Cs85xIYefh7"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "f4ecc284-8768-44d7-b6c9-c9df517ce4a5", "DetectTime": "2024-05-21T12:36:52.244080+00:00", "EventTime": "2024-05-21T12:36:52.244098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tG0kyV0CUvBTwAb"], "accumulated_threat_level": 12.500000000000002, "timewindow": 92} +{"Format": "Json", "ID": "f4ecc284-8768-44d7-b6c9-c9df517ce4a5", "DetectTime": "2024-05-21T12:36:52.244080+00:00", "EventTime": "2024-05-21T12:36:52.244098+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "1970-01-04T19:24:35.844193+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2024/05/21 12:36:52.436662)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 92, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "527b5443-730e-41ae-bba2-7c154e562589", "DetectTime": "2024-05-21T12:36:52.482648+00:00", "EventTime": "2024-05-21T12:36:52.482669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.223.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGs8T5418BlnH8DPO4"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "6fbe2506-4520-43a7-8d03-9dd4b7b5fd3f", "DetectTime": "2024-05-21T12:36:52.487538+00:00", "EventTime": "2024-05-21T12:36:52.487557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZTHk4NxrciMTxf1l"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "3a7d1833-1f9a-4253-af13-ce0f20f3d990", "DetectTime": "2024-05-21T12:36:52.492188+00:00", "EventTime": "2024-05-21T12:36:52.492206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpzKvh3JyHAx1oH3Kc"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "455ea1af-1b09-478a-9dc5-5ae4384c1aec", "DetectTime": "2024-05-21T12:36:52.572091+00:00", "EventTime": "2024-05-21T12:36:52.572110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqWbe2y0j0bT1PDcg"], "accumulated_threat_level": 0.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "a9b3497e-2c31-4351-9877-dbee95ad4a51", "DetectTime": "2024-05-21T12:36:52.612809+00:00", "EventTime": "2024-05-21T12:36:52.612842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAi9hAD5Z7K7m4Rg9"], "accumulated_threat_level": 1.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "dad4a2f5-d2f2-4a6f-a212-a33fbf54eefe", "DetectTime": "2024-05-21T12:36:52.652433+00:00", "EventTime": "2024-05-21T12:36:52.652471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C865cD1aVER6B5ckBd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 92} +{"Format": "IDEA0", "ID": "c5cc4cf0-27be-4f9b-8976-7958387ad6d2", "DetectTime": "2024-05-21T12:36:52.693421+00:00", "EventTime": "2024-05-21T12:36:52.693441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEDqW13NNnXQNjd6a"], "accumulated_threat_level": 3.2, "timewindow": 92} +{"Format": "IDEA0", "ID": "fa6e81dc-7df2-485e-bdf3-2b8dee2671a6", "DetectTime": "2024-05-21T12:36:52.723684+00:00", "EventTime": "2024-05-21T12:36:52.723704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC1UQ74OOHPHKPjIee"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "9153ce18-c44e-4f89-9808-17c7420eebcb", "DetectTime": "2024-05-21T12:36:52.761033+00:00", "EventTime": "2024-05-21T12:36:52.761052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbOYg1d1EZStQ1pN1"], "accumulated_threat_level": 4.0, "timewindow": 92} +{"Format": "IDEA0", "ID": "e69090a4-a744-42b8-8f70-f60804cffbbd", "DetectTime": "2024-05-21T12:36:52.827091+00:00", "EventTime": "2024-05-21T12:36:52.827110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoHWph2AL5AcFqEc2d"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "7e5d5ee1-e1de-4d86-946c-bd00697862b3", "DetectTime": "2024-05-21T12:36:52.832007+00:00", "EventTime": "2024-05-21T12:36:52.832026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaA1YE0N2Me8hQZX1"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "f71e3b6f-cb78-4d6d-be24-de7145b10739", "DetectTime": "2024-05-21T12:36:53.099236+00:00", "EventTime": "2024-05-21T12:36:53.099258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3l7BG4vfRttxKsQv9"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "b70bf92e-72b2-46ae-9162-0dc1880733a0", "DetectTime": "2024-05-21T12:36:53.294730+00:00", "EventTime": "2024-05-21T12:36:53.294749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQT7g2LbBFRARhay7"], "accumulated_threat_level": 5.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "8ffaf598-e56c-47d0-b2be-5831cbf6a955", "DetectTime": "2024-05-21T12:36:53.336012+00:00", "EventTime": "2024-05-21T12:36:53.336032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67wLt2zDfiKZ0DD52"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 92} +{"Format": "IDEA0", "ID": "4a284214-53dc-40dc-b0d4-249978ee4623", "DetectTime": "2024-05-21T12:36:53.405281+00:00", "EventTime": "2024-05-21T12:36:53.405301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGD6HR3Jlq4KPYWcUf"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "aedc62d4-27c4-4c74-9f10-53a04d3789a0", "DetectTime": "2024-05-21T12:36:53.445423+00:00", "EventTime": "2024-05-21T12:36:53.445445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C60wHh5uOH3F0qjNb"], "accumulated_threat_level": 3.2, "timewindow": 90} +{"Format": "IDEA0", "ID": "bf1fa225-1473-4f14-a3e3-b41faff8ce70", "DetectTime": "2024-05-21T12:36:53.566526+00:00", "EventTime": "2024-05-21T12:36:53.566548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLw3d30xdHUVTqnK3"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "b527e77f-44b7-4777-84f5-bc94c0d442a6", "DetectTime": "2024-05-21T12:36:53.803094+00:00", "EventTime": "2024-05-21T12:36:53.803115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRyBD8CaguueLiZ9c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "85e9fa7b-73f2-4389-bc97-b8e683bc984b", "DetectTime": "2024-05-21T12:36:53.856065+00:00", "EventTime": "2024-05-21T12:36:53.856083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgyICApizDCdVaml"], "accumulated_threat_level": 7.999999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "a0b99e76-0965-457a-b5bf-3db7eb9fd76f", "DetectTime": "2024-05-21T12:36:53.911063+00:00", "EventTime": "2024-05-21T12:36:53.911083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8hT4n4yGfCKDSInba"], "accumulated_threat_level": 8.799999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "20827352-8ec5-43fa-b863-793fca97ba1f", "DetectTime": "2024-05-21T12:36:54.169417+00:00", "EventTime": "2024-05-21T12:36:54.169436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzKCst3RsoCZOzZini"], "accumulated_threat_level": 9.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "90ced288-e679-4bff-bc3c-151066a95b27", "DetectTime": "2024-05-21T12:36:54.209662+00:00", "EventTime": "2024-05-21T12:36:54.209682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09JDw1cxdWCLRJFbg"], "accumulated_threat_level": 10.4, "timewindow": 92} +{"Format": "IDEA0", "ID": "ab115534-4031-49ba-b39a-4c4eb89ef48d", "DetectTime": "2024-05-21T12:36:54.252012+00:00", "EventTime": "2024-05-21T12:36:54.252031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE4rw41Oihh0mMblc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 92} +{"Format": "IDEA0", "ID": "69c27ab4-e342-4ace-a287-6550ae5dcd8a", "DetectTime": "2024-05-21T12:36:54.408149+00:00", "EventTime": "2024-05-21T12:36:54.408169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQfcC3dGQ2HV6HTbe"], "accumulated_threat_level": 12.000000000000002, "timewindow": 92} +{"Format": "Json", "ID": "69c27ab4-e342-4ace-a287-6550ae5dcd8a", "DetectTime": "2024-05-21T12:36:54.408149+00:00", "EventTime": "2024-05-21T12:36:54.408169+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-04T19:56:01.820319+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2024/05/21 12:36:54.575876)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 92, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c01e2cad-1df4-4b48-8237-34f7deb899e4", "DetectTime": "2024-05-21T12:36:54.586650+00:00", "EventTime": "2024-05-21T12:36:54.586668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXQ1hSctdzeHbOD4"], "accumulated_threat_level": 0.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "9d83c545-3cbb-4559-9e1a-ecea25dd4c4c", "DetectTime": "2024-05-21T12:36:54.598526+00:00", "EventTime": "2024-05-21T12:36:54.598544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhWzGovzxdCv5Lha"], "accumulated_threat_level": 1.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "c9c1f538-29c2-42f0-ac15-1569577bb032", "DetectTime": "2024-05-21T12:36:54.611386+00:00", "EventTime": "2024-05-21T12:36:54.611404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfUnXrGJL1OTm8C9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 92} +{"Format": "IDEA0", "ID": "2b79c325-25ae-4779-8a9d-d55317d632ef", "DetectTime": "2024-05-21T12:36:54.638064+00:00", "EventTime": "2024-05-21T12:36:54.638086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.70.205.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coiv3NDrTcyb46Ppk"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "6ae332e4-2b8f-449c-82e0-40db73138278", "DetectTime": "2024-05-21T12:36:54.654241+00:00", "EventTime": "2024-05-21T12:36:54.654259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8GlV3Cyf5e3jPwF3"], "accumulated_threat_level": 3.2, "timewindow": 92} +{"Format": "IDEA0", "ID": "d9b34a45-a1c6-478e-b469-c969eef87750", "DetectTime": "2024-05-21T12:36:54.712995+00:00", "EventTime": "2024-05-21T12:36:54.713017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9tOzi4B76Omuyiu4c"], "accumulated_threat_level": 4.0, "timewindow": 92} +{"Format": "IDEA0", "ID": "8fca5f5c-1900-4d48-8639-976f07f7eeb1", "DetectTime": "2024-05-21T12:36:54.752697+00:00", "EventTime": "2024-05-21T12:36:54.752717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEvZEQ2bZMxYGctX05"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "05cbd646-994a-45fb-9ba5-d052b2c4fe63", "DetectTime": "2024-05-21T12:36:54.793761+00:00", "EventTime": "2024-05-21T12:36:54.793780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79sFW2BuCMYr1ZDQ2"], "accumulated_threat_level": 5.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "4e16acbb-69d3-4f40-ae4f-101b4c8b7019", "DetectTime": "2024-05-21T12:36:55.049337+00:00", "EventTime": "2024-05-21T12:36:55.049361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cirh8JlOYHAMLOWB1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 92} +{"Format": "IDEA0", "ID": "53ca4250-c381-4831-834d-f45d73a5456e", "DetectTime": "2024-05-21T12:36:55.088054+00:00", "EventTime": "2024-05-21T12:36:55.088072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C86z6L2jw6j4sCn7x"], "accumulated_threat_level": 7.199999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "a0a2a48f-a746-4fb0-8598-6fde90fa1ad1", "DetectTime": "2024-05-21T12:36:55.129479+00:00", "EventTime": "2024-05-21T12:36:55.129497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2x8SOVFzvnAUJp2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "aa0c35c7-a142-4b1c-badb-1319c75f4528", "DetectTime": "2024-05-21T12:36:55.171765+00:00", "EventTime": "2024-05-21T12:36:55.171784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJI2q3GFJENsNveK9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 92} +{"Format": "IDEA0", "ID": "ffde05d0-9f37-4b24-8ae0-a02bf1d631e2", "DetectTime": "2024-05-21T12:36:55.215926+00:00", "EventTime": "2024-05-21T12:36:55.215948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuECK33LMgDhGGo4Nh"], "accumulated_threat_level": 9.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "66b77ba2-01f8-4219-be2b-3434d2158308", "DetectTime": "2024-05-21T12:36:55.257384+00:00", "EventTime": "2024-05-21T12:36:55.257403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clfi3u2S2uFrWa36ee"], "accumulated_threat_level": 10.4, "timewindow": 92} +{"Format": "IDEA0", "ID": "f4df76e9-1d81-423a-b9ea-3cbf521fbbba", "DetectTime": "2024-05-21T12:36:55.300318+00:00", "EventTime": "2024-05-21T12:36:55.300337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJ99YSJP8i215cM3"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "86617960-aa1a-442c-b59f-99cd50aa4c59", "DetectTime": "2024-05-21T12:36:55.329342+00:00", "EventTime": "2024-05-21T12:36:55.329365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.161.223.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzEPjS102taNW36K82"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d9511f9c-7981-4f48-bf4c-524c1a2bf445", "DetectTime": "2024-05-21T12:36:55.367125+00:00", "EventTime": "2024-05-21T12:36:55.367147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKmVC3kzEvoWlUL22"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "984858a2-569c-451c-a090-bdc5d38d4438", "DetectTime": "2024-05-21T12:36:55.410574+00:00", "EventTime": "2024-05-21T12:36:55.410593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMjge3GhLKS7Rrbhl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 92} +{"Format": "IDEA0", "ID": "ff5c04f2-089d-4a4f-a7fc-f6ec323015f0", "DetectTime": "2024-05-21T12:36:55.438505+00:00", "EventTime": "2024-05-21T12:36:55.438525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5zE0f3Ybi8S97kShd"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "1483c266-6838-40bc-8784-dfff116930d7", "DetectTime": "2024-05-21T12:36:55.702347+00:00", "EventTime": "2024-05-21T12:36:55.702370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGemPq1FaCKsvZpgWh"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8ef7d913-6a2b-414f-89fe-f9169698d491", "DetectTime": "2024-05-21T12:36:55.708026+00:00", "EventTime": "2024-05-21T12:36:55.708045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CttNf62FDlaPvJwNLh"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "f6e78c63-e056-4a78-9245-3d7993cc7307", "DetectTime": "2024-05-21T12:36:55.794313+00:00", "EventTime": "2024-05-21T12:36:55.794330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3l0V3A6vDLXXnMqa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 92} +{"Format": "Json", "ID": "f6e78c63-e056-4a78-9245-3d7993cc7307", "DetectTime": "2024-05-21T12:36:55.794313+00:00", "EventTime": "2024-05-21T12:36:55.794330+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-04T19:56:05.164473+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 92. (real time 2024/05/21 12:36:56.008853)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 92, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5ddd936f-c746-425f-8383-2c9371ed493f", "DetectTime": "2024-05-21T12:36:56.012799+00:00", "EventTime": "2024-05-21T12:36:56.012816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8BTl3nU76w3zOS9i"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "3d1e296a-f292-4362-ad78-51069051616b", "DetectTime": "2024-05-21T12:36:56.017521+00:00", "EventTime": "2024-05-21T12:36:56.017539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQQUG3LSM9DuTlGlh"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "cf18af35-1755-4dd6-be46-85db9c7a3541", "DetectTime": "2024-05-21T12:36:56.022178+00:00", "EventTime": "2024-05-21T12:36:56.022195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsSu4546I04qZSuAJ6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "46849576-e139-4e95-b730-7cd6e689525b", "DetectTime": "2024-05-21T12:36:56.027153+00:00", "EventTime": "2024-05-21T12:36:56.027171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmAvQ1EZw76a0ExU9"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "cc3b9800-cdd4-4ad4-a3da-1b50af575dda", "DetectTime": "2024-05-21T12:36:56.031655+00:00", "EventTime": "2024-05-21T12:36:56.031673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChbSNl1D0o0MLoykAg"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8f508086-64cd-4299-951d-ad33eb749890", "DetectTime": "2024-05-21T12:36:56.043667+00:00", "EventTime": "2024-05-21T12:36:56.043686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAVf9F42AJmqdTVqm9"], "accumulated_threat_level": 0.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "afa07435-de27-4ce1-9487-5400b465be97", "DetectTime": "2024-05-21T12:36:56.056014+00:00", "EventTime": "2024-05-21T12:36:56.056032+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.173.238.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.173.238.41 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmILK13rQxeT5251O3"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "79d1d4dc-774d-442e-bfc2-70cda369151b", "DetectTime": "2024-05-21T12:36:56.067880+00:00", "EventTime": "2024-05-21T12:36:56.067898+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.173.238.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.173.238.41 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmILK13rQxeT5251O3"], "accumulated_threat_level": 10.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "f721f048-62a0-4619-a334-8984ab240e8a", "DetectTime": "2024-05-21T12:36:56.072947+00:00", "EventTime": "2024-05-21T12:36:56.072966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPsev3M80i2oMq5m"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "e4c27b4e-0973-42c0-878b-91d376026eb7", "DetectTime": "2024-05-21T12:36:56.084953+00:00", "EventTime": "2024-05-21T12:36:56.084973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA6IB342gd4l8Hk62"], "accumulated_threat_level": 1.6, "timewindow": 92} +{"Format": "IDEA0", "ID": "f7596804-0f7b-4214-832a-aecbac18ac07", "DetectTime": "2024-05-21T12:36:56.363740+00:00", "EventTime": "2024-05-21T12:36:56.363761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7exqxKO6Kr4cU1l"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "f2bfd416-51b9-42ef-a3fc-c0fcbae718d2", "DetectTime": "2024-05-21T12:36:56.371523+00:00", "EventTime": "2024-05-21T12:36:56.371541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5Dsf1M58hca55OM2"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "81449f96-f7d5-4323-b478-7ca163f5e0fb", "DetectTime": "2024-05-21T12:36:56.378797+00:00", "EventTime": "2024-05-21T12:36:56.378817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CePadU3mu8k4Moja9e"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "0f905206-c84b-4fbb-b4af-2af1e6868bdf", "DetectTime": "2024-05-21T12:36:56.405483+00:00", "EventTime": "2024-05-21T12:36:56.405500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cirf8m8DL0RliZsug"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8b6fb91f-7881-4435-bbad-17af111cc4de", "DetectTime": "2024-05-21T12:36:56.418216+00:00", "EventTime": "2024-05-21T12:36:56.418233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1RJpf4b0YRqlsDwmb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 92} +{"Format": "IDEA0", "ID": "075eadda-2508-49d7-b69c-7f94ceadad64", "DetectTime": "2024-05-21T12:36:56.431329+00:00", "EventTime": "2024-05-21T12:36:56.431352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlO6g233lTsLS1bV7"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "0f7bd47f-16c6-4c88-abb9-91f53b19cefb", "DetectTime": "2024-05-21T12:36:56.436954+00:00", "EventTime": "2024-05-21T12:36:56.436972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OBOxUAtCqLZXXm6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "528bcffc-3978-4666-826c-f560167d387b", "DetectTime": "2024-05-21T12:36:56.594160+00:00", "EventTime": "2024-05-21T12:36:56.594177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfU4Ka25Kl8wKRXcVl"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "e27d14ab-bc7f-4bd1-add8-f05ed0db976a", "DetectTime": "2024-05-21T12:36:56.599246+00:00", "EventTime": "2024-05-21T12:36:56.599263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CspO2uDdFnK8syFO7"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "20e82831-89dc-46e3-b1aa-e017be076cf8", "DetectTime": "2024-05-21T12:36:56.900510+00:00", "EventTime": "2024-05-21T12:36:56.900530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0h0x1rPa1i8Njy2k"], "accumulated_threat_level": 3.2, "timewindow": 92} +{"Format": "IDEA0", "ID": "8631229c-f379-4a98-b404-caeca05ae55d", "DetectTime": "2024-05-21T12:36:56.941778+00:00", "EventTime": "2024-05-21T12:36:56.941801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEP4oE1aWa6ucfcsb7"], "accumulated_threat_level": 4.0, "timewindow": 92} +{"Format": "IDEA0", "ID": "d815024c-0742-4650-aac6-7b5f6b0d3c7c", "DetectTime": "2024-05-21T12:36:56.978096+00:00", "EventTime": "2024-05-21T12:36:56.978119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtY4ro1j8aNY1x91Bj"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "464f6722-33f3-4c43-b5bf-4a585d6f274d", "DetectTime": "2024-05-21T12:36:56.989779+00:00", "EventTime": "2024-05-21T12:36:56.989797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGNj3pt6GAlDizNzi"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "05d9bdc3-80a1-4c37-b6bd-7c442bbba69c", "DetectTime": "2024-05-21T12:36:57.037956+00:00", "EventTime": "2024-05-21T12:36:57.037976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDdAt12RUOCn8i0X4"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "1b8e3a53-ebf8-43db-9d31-8a45da95c98b", "DetectTime": "2024-05-21T12:36:57.074117+00:00", "EventTime": "2024-05-21T12:36:57.074137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKR3NlztEkpFec6a"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "69639bbb-14be-4a59-b988-97a3a5b81d64", "DetectTime": "2024-05-21T12:36:57.109376+00:00", "EventTime": "2024-05-21T12:36:57.109398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwMoB3YPRBIopA8hk"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "abb8ff27-3edc-41cd-9259-5183d2c80716", "DetectTime": "2024-05-21T12:36:57.150851+00:00", "EventTime": "2024-05-21T12:36:57.150876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbQzD3pLy0IQomkE8", "CXQBIE4NTHJtH6jcE7", "CnaK452QROYgm5S3oa", "CK0Wz3pJMPeHeD7b"], "accumulated_threat_level": 0.5, "timewindow": 93} +{"Format": "IDEA0", "ID": "e257f39e-c9c6-4a7b-b838-ae9618e34447", "DetectTime": "2024-05-21T12:36:57.165823+00:00", "EventTime": "2024-05-21T12:36:57.165846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRFOx3sPak33wbsk"], "accumulated_threat_level": 1.3, "timewindow": 93} +{"Format": "IDEA0", "ID": "be9a6740-3b6e-455d-a8f1-f98f24b82649", "DetectTime": "2024-05-21T12:36:57.172030+00:00", "EventTime": "2024-05-21T12:36:57.172057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSC4cB27phsPB8BnQe"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "a9ba7f69-7c71-4696-9714-ae7bd9766e1e", "DetectTime": "2024-05-21T12:36:57.225058+00:00", "EventTime": "2024-05-21T12:36:57.225079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMht53M4p1IXk63Fk"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "7b0d9892-89b7-4dcc-8c27-a1865baf3aea", "DetectTime": "2024-05-21T12:36:57.272748+00:00", "EventTime": "2024-05-21T12:36:57.272766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cef7i34dcZGDRzDyO5"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d95b48ad-ca62-4adf-8412-b95585730652", "DetectTime": "2024-05-21T12:36:57.307693+00:00", "EventTime": "2024-05-21T12:36:57.307715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRr5KySy0K1BPKVh3"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "3dd6e94b-5306-4294-94e6-43167f14dd82", "DetectTime": "2024-05-21T12:36:57.591265+00:00", "EventTime": "2024-05-21T12:36:57.591287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXrmm3lpqcxTdK7oe"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "57ef02d6-7882-47b4-8ea5-d9999afb4151", "DetectTime": "2024-05-21T12:36:57.596276+00:00", "EventTime": "2024-05-21T12:36:57.596296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjk3lA1DWW9QOvQFP6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "f9c38498-f7fa-4a14-a02d-b79a7d16cfe5", "DetectTime": "2024-05-21T12:36:57.600754+00:00", "EventTime": "2024-05-21T12:36:57.600772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqaVUi1Q75FjiVi3Je"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "ded879fe-9ead-4bd6-84d6-c7382b68ce46", "DetectTime": "2024-05-21T12:36:57.768311+00:00", "EventTime": "2024-05-21T12:36:57.768332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqyoPp3a1cxFx29U4l"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "4a50187a-8da8-4eae-81ec-d91f6c5381a1", "DetectTime": "2024-05-21T12:36:57.833166+00:00", "EventTime": "2024-05-21T12:36:57.833188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBPfX2sPNISUFuiek"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "46c7a3fb-ff15-4d9f-80a4-a8de9bf2039b", "DetectTime": "2024-05-21T12:36:57.895620+00:00", "EventTime": "2024-05-21T12:36:57.895642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6TJSA2AHDUCvVV9se"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "aad2e593-caad-40a7-8ab0-76439002eac0", "DetectTime": "2024-05-21T12:36:57.941106+00:00", "EventTime": "2024-05-21T12:36:57.941129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXo8r1i1rNNJZdtRh"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "95b30320-7015-419a-9e89-5b3a10649333", "DetectTime": "2024-05-21T12:36:57.983938+00:00", "EventTime": "2024-05-21T12:36:57.983961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb5iy8echkyjN9DU6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "802e4867-0c0a-4d73-9286-0249775e7736", "DetectTime": "2024-05-21T12:36:58.027383+00:00", "EventTime": "2024-05-21T12:36:58.027407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtPJe2jrOOlC1G7l2"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "2395a4cd-b2c7-46c2-99ac-e04999aaa894", "DetectTime": "2024-05-21T12:36:58.068215+00:00", "EventTime": "2024-05-21T12:36:58.068238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKljFr3K2DIobSZggc"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "27d47d00-aa2a-4f92-966c-c86a6f46cb42", "DetectTime": "2024-05-21T12:36:58.328190+00:00", "EventTime": "2024-05-21T12:36:58.328212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGxTnO3F7OhmTzHpek"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "b37f2193-70d6-42a0-82d0-6ed30f64dec4", "DetectTime": "2024-05-21T12:36:59.186043+00:00", "EventTime": "2024-05-21T12:36:59.186065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE2fpo3NEV3ZwEKPxf", "CrlEnm2o54ximst5C2", "CI0Xi1el6bwky3D73", "CJeY6v2CaUxkvtodri"], "accumulated_threat_level": 1.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "df05b9c5-100a-47d1-a8e5-39c695e2b034", "DetectTime": "2024-05-21T12:36:59.213489+00:00", "EventTime": "2024-05-21T12:36:59.213514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.18.183.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbDR62pj486H9sQzf"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "2d992bb6-abf0-4b95-a129-38f15660a60e", "DetectTime": "2024-05-21T12:36:59.272693+00:00", "EventTime": "2024-05-21T12:36:59.272713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.73.185.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Ghxa2Ra4t8L4egae"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "4a354fe6-66cf-4a51-a22f-4ba2e7d25e40", "DetectTime": "2024-05-21T12:36:59.461063+00:00", "EventTime": "2024-05-21T12:36:59.461084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGv5Ks4jdKdaGHhc3k"], "accumulated_threat_level": 2.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "0923c11e-f35b-4eeb-8ddf-39a5a178b866", "DetectTime": "2024-05-21T12:36:59.695778+00:00", "EventTime": "2024-05-21T12:36:59.695802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnbpc7Q5iZ0vU6d"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 93} +{"Format": "IDEA0", "ID": "77ae0645-d29a-4ac2-84f6-f78c301bf2ec", "DetectTime": "2024-05-21T12:36:59.761899+00:00", "EventTime": "2024-05-21T12:36:59.761916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjnb6j1cMdPtZh6Fx2"], "accumulated_threat_level": 4.2, "timewindow": 93} +{"Format": "IDEA0", "ID": "9a719efc-49a0-4b66-8f55-2ad14c1c10c1", "DetectTime": "2024-05-21T12:36:59.814507+00:00", "EventTime": "2024-05-21T12:36:59.814526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXqNU2p8yolv69BBj"], "accumulated_threat_level": 5.0, "timewindow": 93} +{"Format": "IDEA0", "ID": "69bf3bdf-8c56-43da-a2cc-277158664fa8", "DetectTime": "2024-05-21T12:36:59.866993+00:00", "EventTime": "2024-05-21T12:36:59.867012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.174.226"]}], "Attach": [{"Content": "Connection to unknown destination port 13453/UDP destination IP 117.198.174.226. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CChfTs1aLmmjmLyNoc"], "accumulated_threat_level": 5.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "d6f11a16-5e77-4bd5-aaa8-63b246b2e162", "DetectTime": "2024-05-21T12:36:59.903762+00:00", "EventTime": "2024-05-21T12:36:59.903782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdNGK8O3ENTx2dxib"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "532b2a5c-1357-431c-ae49-3b7454c0a1e0", "DetectTime": "2024-05-21T12:36:59.941059+00:00", "EventTime": "2024-05-21T12:36:59.941076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpRiYD1j9VbPRu5876"], "accumulated_threat_level": 6.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "c667f7eb-dfc2-4ded-bbab-7d872169e70f", "DetectTime": "2024-05-21T12:37:00.204437+00:00", "EventTime": "2024-05-21T12:37:00.204457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2zlq2xX8tyv7Byji"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 93} +{"Format": "IDEA0", "ID": "b2d59daa-e521-4aa0-a946-a788dcbe485a", "DetectTime": "2024-05-21T12:37:00.241858+00:00", "EventTime": "2024-05-21T12:37:00.241879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwJT53LBfKDwrZRz8"], "accumulated_threat_level": 8.2, "timewindow": 93} +{"Format": "IDEA0", "ID": "4a3e9a37-2025-475a-aef0-969ce2dcbca6", "DetectTime": "2024-05-21T12:37:00.282334+00:00", "EventTime": "2024-05-21T12:37:00.282356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJulFn42RDpQ2eiOW9"], "accumulated_threat_level": 9.0, "timewindow": 93} +{"Format": "IDEA0", "ID": "f8c06b2d-a72e-4b40-a831-ddc097cf25c0", "DetectTime": "2024-05-21T12:37:00.319768+00:00", "EventTime": "2024-05-21T12:37:00.319791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBuKNm3dIwqno30eUl"], "accumulated_threat_level": 9.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "7579798d-ce0c-4c7d-9329-b0d6e7979880", "DetectTime": "2024-05-21T12:37:00.348437+00:00", "EventTime": "2024-05-21T12:37:00.348458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfOdcf8pnkSoic84"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "365bd159-429b-453f-b0c5-47e8b5e43f07", "DetectTime": "2024-05-21T12:37:00.386721+00:00", "EventTime": "2024-05-21T12:37:00.386755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0EacK2rBcZALe3s0e"], "accumulated_threat_level": 10.600000000000001, "timewindow": 93} +{"Format": "IDEA0", "ID": "55b52b0b-127b-4f0e-985a-181b5507df3e", "DetectTime": "2024-05-21T12:37:00.425802+00:00", "EventTime": "2024-05-21T12:37:00.425823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4YJf4BfFmkcKY90d"], "accumulated_threat_level": 11.400000000000002, "timewindow": 93} +{"Format": "IDEA0", "ID": "f8d46e8b-584c-4b6d-9213-de3563f063c5", "DetectTime": "2024-05-21T12:37:00.478167+00:00", "EventTime": "2024-05-21T12:37:00.478185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crlzic9HmQ996nBl8"], "accumulated_threat_level": 12.200000000000003, "timewindow": 93} +{"Format": "Json", "ID": "f8d46e8b-584c-4b6d-9213-de3563f063c5", "DetectTime": "2024-05-21T12:37:00.478167+00:00", "EventTime": "2024-05-21T12:37:00.478185+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "1970-01-04T20:28:16.385498+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 93. (real time 2024/05/21 12:37:00.730040)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 93, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "0fbc66ed-0d45-4f52-a068-d48f085c756a", "DetectTime": "2024-05-21T12:37:00.742486+00:00", "EventTime": "2024-05-21T12:37:00.742525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRk8T2VqJO3n7zUg"], "accumulated_threat_level": 0.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "26d348f0-4a2d-434e-9d18-ae48e206a1db", "DetectTime": "2024-05-21T12:37:00.799136+00:00", "EventTime": "2024-05-21T12:37:00.799157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmiymv5nOyEjXXtg"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "b705f504-24b3-4322-9b21-65aca9ede4da", "DetectTime": "2024-05-21T12:37:00.834698+00:00", "EventTime": "2024-05-21T12:37:00.834720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LZLm4tuFBPDkJj8k"], "accumulated_threat_level": 1.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "0cf841b2-2f25-45ea-bfcb-676fde9cf53c", "DetectTime": "2024-05-21T12:37:00.973736+00:00", "EventTime": "2024-05-21T12:37:00.973755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyqHxf3D9OVI8KfATl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 93} +{"Format": "IDEA0", "ID": "fcee1e41-f3c2-4656-860c-e4ffc8b1e068", "DetectTime": "2024-05-21T12:37:01.009711+00:00", "EventTime": "2024-05-21T12:37:01.009733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTqve2TyBcU10D008"], "accumulated_threat_level": 3.2, "timewindow": 93} +{"Format": "IDEA0", "ID": "1ad192e2-6974-430d-b9bc-e2faef72f2cd", "DetectTime": "2024-05-21T12:37:01.050503+00:00", "EventTime": "2024-05-21T12:37:01.050525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAvNa4d5C5sCuROyk"], "accumulated_threat_level": 4.0, "timewindow": 93} +{"Format": "IDEA0", "ID": "b30264c7-313b-491a-8a1c-8e30160d0c71", "DetectTime": "2024-05-21T12:37:01.090222+00:00", "EventTime": "2024-05-21T12:37:01.090242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCELE4URFDFxawco1"], "accumulated_threat_level": 4.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "96bbdb98-1ebb-4374-8759-ae34ce77342a", "DetectTime": "2024-05-21T12:37:01.133310+00:00", "EventTime": "2024-05-21T12:37:01.133331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.219.246"]}], "Attach": [{"Content": "Connection to unknown destination port 10197/UDP destination IP 85.72.219.246. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdX8y4XPDeNkfHGw4"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "9c3bf6bc-2544-4ae5-9192-155b31f3b2b9", "DetectTime": "2024-05-21T12:37:01.172723+00:00", "EventTime": "2024-05-21T12:37:01.172742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAT32I37Dglv6Ic4hd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 93} +{"Format": "IDEA0", "ID": "b0f5e7aa-29cd-48de-ab51-b7b77cf6652a", "DetectTime": "2024-05-21T12:37:01.216862+00:00", "EventTime": "2024-05-21T12:37:01.216885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy32QW3DNaKWHHMsw5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 93} +{"Format": "IDEA0", "ID": "f8b59b98-2c8a-4fd4-92f1-9691c3467d33", "DetectTime": "2024-05-21T12:37:01.513537+00:00", "EventTime": "2024-05-21T12:37:01.513555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzuwZ3S39CvywdYug"], "accumulated_threat_level": 7.999999999999999, "timewindow": 93} +{"Format": "IDEA0", "ID": "72f9f51d-1eb3-4693-9084-36c8238cac5e", "DetectTime": "2024-05-21T12:37:01.542756+00:00", "EventTime": "2024-05-21T12:37:01.542775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFVCD14DoGJbHRK8i"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "ae9bbd23-8ff6-4fa0-830d-ef1db35106f1", "DetectTime": "2024-05-21T12:37:01.580557+00:00", "EventTime": "2024-05-21T12:37:01.580575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXbLMgMYUfTv8pfcf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 93} +{"Format": "IDEA0", "ID": "3a51cfd1-459a-4d59-907a-d1391a4264a7", "DetectTime": "2024-05-21T12:37:01.609049+00:00", "EventTime": "2024-05-21T12:37:01.609069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9Ik93UWPzTES1Sd2"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d78de426-cc2c-4fe0-a0a1-257a1fe79a3f", "DetectTime": "2024-05-21T12:37:01.926720+00:00", "EventTime": "2024-05-21T12:37:01.926739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTD1tt4HcxolHkxxsi"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "37657e20-6172-4bef-8f2a-7abcb589f819", "DetectTime": "2024-05-21T12:37:01.932726+00:00", "EventTime": "2024-05-21T12:37:01.932745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFovPY18PbfjGYvY27"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "1e51c96c-a53e-46b4-bc6d-a0bbd332989f", "DetectTime": "2024-05-21T12:37:01.937369+00:00", "EventTime": "2024-05-21T12:37:01.937387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsX9B3EaODm7yOkj2"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d7bccaea-72ff-4231-a5e9-dadfffaca2b5", "DetectTime": "2024-05-21T12:37:01.941885+00:00", "EventTime": "2024-05-21T12:37:01.941903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZrE82nk9I0S8RJh2"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "fb49cca6-3346-440b-92d8-75c15db20193", "DetectTime": "2024-05-21T12:37:01.946478+00:00", "EventTime": "2024-05-21T12:37:01.946497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoNHr4c20I8xCmeta"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "18bfd7e1-fb8e-4965-a6dc-ebf7887af1d2", "DetectTime": "2024-05-21T12:37:01.961311+00:00", "EventTime": "2024-05-21T12:37:01.961332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGcTC83hlB6YtoBjOa"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "ad1cdbff-fac7-4771-a387-0845566abd81", "DetectTime": "2024-05-21T12:37:01.983348+00:00", "EventTime": "2024-05-21T12:37:01.983369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFUvFt4suuteLbqoZe"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8e608041-3669-498f-8286-a8d8583964e0", "DetectTime": "2024-05-21T12:37:02.018280+00:00", "EventTime": "2024-05-21T12:37:02.018298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUtFp4rovfXRVlII6"], "accumulated_threat_level": 9.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "031b58a3-82ea-4204-b1df-22da3d0a397d", "DetectTime": "2024-05-21T12:37:02.197679+00:00", "EventTime": "2024-05-21T12:37:02.197702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSTB01HMALaK9dOIa"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "9116f774-11d7-46f1-b6e7-979eb477e00e", "DetectTime": "2024-05-21T12:37:02.203530+00:00", "EventTime": "2024-05-21T12:37:02.203551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1aLec1Lt0AmaAPgId"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "e2d86f3a-6852-483c-9f7f-d914259a9233", "DetectTime": "2024-05-21T12:37:02.479337+00:00", "EventTime": "2024-05-21T12:37:02.479357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzvA830Gyz0Fm0eaj"], "accumulated_threat_level": 10.4, "timewindow": 93} +{"Format": "IDEA0", "ID": "ed2423ff-07df-403e-bc1a-2838a75fef93", "DetectTime": "2024-05-21T12:37:02.553818+00:00", "EventTime": "2024-05-21T12:37:02.553838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnXHok2WqNcguqkac3"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d1e3cf92-68a8-452f-8cff-de23abc6cebc", "DetectTime": "2024-05-21T12:37:02.561217+00:00", "EventTime": "2024-05-21T12:37:02.561236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAojlgHgGfFOzerb"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "dbe6a1fe-b2b5-4da3-8148-a77877fb47b0", "DetectTime": "2024-05-21T12:37:02.568354+00:00", "EventTime": "2024-05-21T12:37:02.568372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgOf73SywS15YuRY"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "7b239128-80c9-4bba-9a9d-04b3a060dfd0", "DetectTime": "2024-05-21T12:37:02.573342+00:00", "EventTime": "2024-05-21T12:37:02.573360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COAuvR3or8jHttHhg1"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "2efc91d8-06b1-4b14-b656-b2f90756d943", "DetectTime": "2024-05-21T12:37:02.577709+00:00", "EventTime": "2024-05-21T12:37:02.577727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZcnh3qHf9FrR30M4"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "f21b33fe-6e62-44c6-a5ac-c3e65f5ba611", "DetectTime": "2024-05-21T12:37:02.582028+00:00", "EventTime": "2024-05-21T12:37:02.582045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjpy7KZDVdtDbhfq4"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d4c9054c-520d-4c87-9a72-a42ac4d897d5", "DetectTime": "2024-05-21T12:37:02.594005+00:00", "EventTime": "2024-05-21T12:37:02.594025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9iv3ne8is6UIDIh"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "6940fe16-4319-4682-bee2-33e831d3ac21", "DetectTime": "2024-05-21T12:37:02.761647+00:00", "EventTime": "2024-05-21T12:37:02.761665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1WYb4wtm9caOwElc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 93} +{"Format": "IDEA0", "ID": "e612e91c-d644-4fdc-bb1b-b9c43d337d08", "DetectTime": "2024-05-21T12:37:02.981889+00:00", "EventTime": "2024-05-21T12:37:02.981911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.38.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.38.248 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0iAn2nE0C7ASVMp5"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "b4851a74-0cf2-4085-a9bf-5526cd38c60c", "DetectTime": "2024-05-21T12:37:02.994755+00:00", "EventTime": "2024-05-21T12:37:02.994775+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.38.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.38.248 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0iAn2nE0C7ASVMp5"], "accumulated_threat_level": 10.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "4982a106-213b-496e-81a7-6daba01bac7c", "DetectTime": "2024-05-21T12:37:03.031626+00:00", "EventTime": "2024-05-21T12:37:03.031647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NPyW1sMQB25p0LXi"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8a632fb8-4660-4795-9c19-2c9cbabc4cd2", "DetectTime": "2024-05-21T12:37:03.052720+00:00", "EventTime": "2024-05-21T12:37:03.052742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjwgoBlWYmq64X8d"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "37b0b467-2217-4144-a585-e9a351a44a9b", "DetectTime": "2024-05-21T12:37:03.087873+00:00", "EventTime": "2024-05-21T12:37:03.087896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQ9qm3fbm4KUiuNP6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "d35b4a0e-5ea7-4a7c-ae2f-4182cc07388e", "DetectTime": "2024-05-21T12:37:03.093298+00:00", "EventTime": "2024-05-21T12:37:03.093316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C060hB3HbKnEVyVmFg"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "bce03558-e71b-4289-8e15-35f043ef2871", "DetectTime": "2024-05-21T12:37:03.137662+00:00", "EventTime": "2024-05-21T12:37:03.137683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGwrJ15EJ9RPckiX6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "65838d7d-de80-4591-a5b5-fba1d2f9a06a", "DetectTime": "2024-05-21T12:37:03.143165+00:00", "EventTime": "2024-05-21T12:37:03.143183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEmgcT2Lx6hr7bpXnl"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "5b62caca-97ed-40a2-8a1e-003019fce342", "DetectTime": "2024-05-21T12:37:03.304336+00:00", "EventTime": "2024-05-21T12:37:03.304358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBN0MZNkuTCDwXVj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 93} +{"Format": "Json", "ID": "5b62caca-97ed-40a2-8a1e-003019fce342", "DetectTime": "2024-05-21T12:37:03.304336+00:00", "EventTime": "2024-05-21T12:37:03.304358+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "1970-01-04T20:28:54.690136+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 93. (real time 2024/05/21 12:37:03.472253)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 93, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "39fd85a4-393a-413c-bf8f-2fd99800ccb1", "DetectTime": "2024-05-21T12:37:03.476309+00:00", "EventTime": "2024-05-21T12:37:03.476326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2SZYj43dEC6Ai6ejl"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8a52c1fc-8525-4ecb-bb2c-4444a348aa1e", "DetectTime": "2024-05-21T12:37:03.481270+00:00", "EventTime": "2024-05-21T12:37:03.481288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6rlU22GLAoeA5qTh"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "78b2e7bd-81e0-4e84-8a77-06d1c5a8797b", "DetectTime": "2024-05-21T12:37:03.485952+00:00", "EventTime": "2024-05-21T12:37:03.485970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfxscm31MoaEqUfZT"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "5d412018-3572-4083-bf64-432dfdb7aee6", "DetectTime": "2024-05-21T12:37:03.490598+00:00", "EventTime": "2024-05-21T12:37:03.490617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsL0oh4V5kGcFxoCTj"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "e83f1a6d-0feb-47f8-b90f-84b6ae4ed2d1", "DetectTime": "2024-05-21T12:37:03.697559+00:00", "EventTime": "2024-05-21T12:37:03.697581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhlWp1XWw12fECXu8"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "c206684d-5e82-4ad2-b109-694321d4d16e", "DetectTime": "2024-05-21T12:37:03.702395+00:00", "EventTime": "2024-05-21T12:37:03.702429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CquUJh1nailNJv4UNj"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "87aa5cee-1ad4-433e-9d8e-42ef9c94e236", "DetectTime": "2024-05-21T12:37:03.739539+00:00", "EventTime": "2024-05-21T12:37:03.739560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cup8vv322Z41TWSXf6"], "accumulated_threat_level": 0.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "9ba8e205-f2f2-4866-a36b-7d27ec7d35f1", "DetectTime": "2024-05-21T12:37:03.745548+00:00", "EventTime": "2024-05-21T12:37:03.745567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C80Ygr1n1p6SJa0nUl"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "8823f804-e9d5-4f87-86e8-a908100245a3", "DetectTime": "2024-05-21T12:37:03.839108+00:00", "EventTime": "2024-05-21T12:37:03.839129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8tPJ2FxLHUUbLpM6"], "accumulated_threat_level": 9.6, "timewindow": 91} +{"Format": "IDEA0", "ID": "91ba4f95-5260-4b82-aaf9-dbaae0836e50", "DetectTime": "2024-05-21T12:37:03.873184+00:00", "EventTime": "2024-05-21T12:37:03.873205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfjQB4rinfLHLM60f"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "b1296e63-9798-4893-b878-3c85a7222f3b", "DetectTime": "2024-05-21T12:37:03.915992+00:00", "EventTime": "2024-05-21T12:37:03.916015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12ZVD2mo7ANACJTmh"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "9202983c-70a9-43ff-b692-d72fba5d83d6", "DetectTime": "2024-05-21T12:37:04.161770+00:00", "EventTime": "2024-05-21T12:37:04.161794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crf2bT3swekdHdYIy6"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "45b3f7bd-a3df-4219-ab9c-e3086db314d1", "DetectTime": "2024-05-21T12:37:04.225678+00:00", "EventTime": "2024-05-21T12:37:04.225700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdfwJfICcG8ZffFl"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "e356fba8-eee1-4a7e-b96a-0d666fb9b775", "DetectTime": "2024-05-21T12:37:04.230839+00:00", "EventTime": "2024-05-21T12:37:04.230859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8euAs1BhkZiZFpZS7"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "5019a310-4560-4d25-aa30-5486bf8e7dbe", "DetectTime": "2024-05-21T12:37:04.235720+00:00", "EventTime": "2024-05-21T12:37:04.235740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7x9BesGyj3kVCqmk"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "f9523dce-e4c6-4033-8c67-67758323660b", "DetectTime": "2024-05-21T12:37:04.241838+00:00", "EventTime": "2024-05-21T12:37:04.241858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBy5HidAvugJ9Q8q6"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "2070a7e0-6a21-4e28-b0ce-ba0114316c36", "DetectTime": "2024-05-21T12:37:04.364492+00:00", "EventTime": "2024-05-21T12:37:04.364512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcg6l1f2eRswbhp5"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "43797fad-2ea4-4856-ad68-381133389fa0", "DetectTime": "2024-05-21T12:37:04.430480+00:00", "EventTime": "2024-05-21T12:37:04.430500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAjBi2BzQDbDEEiUb"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "1afd48f3-e7eb-4ca1-95a8-d1424ac49447", "DetectTime": "2024-05-21T12:37:04.488341+00:00", "EventTime": "2024-05-21T12:37:04.488361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVavPl4WstTtIvTf55"], "accumulated_threat_level": 1.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "2d30aadf-6911-41ff-873f-0baf7788c558", "DetectTime": "2024-05-21T12:37:04.493754+00:00", "EventTime": "2024-05-21T12:37:04.493772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKbYW2yFIeWoHWV3a", "CLxheB4BuAr3526eA3", "CSyaC33NYG7zalHv6h", "CPsJiuSliU5d4vjR6"], "accumulated_threat_level": 0.5, "timewindow": 94} +{"Format": "IDEA0", "ID": "68de5ce3-03a9-41f9-82f1-5cc00b645258", "DetectTime": "2024-05-21T12:37:04.521393+00:00", "EventTime": "2024-05-21T12:37:04.521414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpvr2q3rqhXxEJ5898"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "b9852f8f-7952-488b-92b4-1ac9650ef842", "DetectTime": "2024-05-21T12:37:04.894245+00:00", "EventTime": "2024-05-21T12:37:04.894263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzSbTdHJqi6iPvXl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 93} +{"Format": "IDEA0", "ID": "98782bab-5706-4f34-a464-0dcce6c858be", "DetectTime": "2024-05-21T12:37:04.924635+00:00", "EventTime": "2024-05-21T12:37:04.924657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgMAHE2OsWCl4X1K2f"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "30a67742-1c40-492c-92c8-02ef585bc108", "DetectTime": "2024-05-21T12:37:04.930294+00:00", "EventTime": "2024-05-21T12:37:04.930317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWG01BkCgrudgFK3b"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "4775deea-75c7-4a7f-ba58-34aa22e9b3a4", "DetectTime": "2024-05-21T12:37:04.949433+00:00", "EventTime": "2024-05-21T12:37:04.949452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVv3911PYSZf4ZCT5c"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "5adf3629-4998-450d-94c9-a20cb44d7c4b", "DetectTime": "2024-05-21T12:37:05.015325+00:00", "EventTime": "2024-05-21T12:37:05.015346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqt0tZ1om8ptyTBOnk"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "1781bc11-f1b6-4f55-b519-edae1239ebbd", "DetectTime": "2024-05-21T12:37:05.027657+00:00", "EventTime": "2024-05-21T12:37:05.027676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDxZNR3gMz1nIRm6Ig"], "accumulated_threat_level": 3.2, "timewindow": 93} +{"Format": "IDEA0", "ID": "c6d368dc-ff4c-4b8f-adff-68e1507e2bd6", "DetectTime": "2024-05-21T12:37:05.089811+00:00", "EventTime": "2024-05-21T12:37:05.089831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2PRL3lX9I94Ozx1a"], "accumulated_threat_level": 4.0, "timewindow": 93} +{"Format": "IDEA0", "ID": "19a62a39-c233-4b3d-a208-265a485ed72b", "DetectTime": "2024-05-21T12:37:05.121496+00:00", "EventTime": "2024-05-21T12:37:05.121517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8av3w4u3tOzltd7lj"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "e66e2456-53a7-48ac-aea8-f638600abc97", "DetectTime": "2024-05-21T12:37:05.154664+00:00", "EventTime": "2024-05-21T12:37:05.154685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co7Ki34mKhBzpmm8ff"], "accumulated_threat_level": 4.8, "timewindow": 93} +{"Format": "IDEA0", "ID": "16312a2b-b4df-44a1-b04b-4efdbdd1f473", "DetectTime": "2024-05-21T12:37:05.212115+00:00", "EventTime": "2024-05-21T12:37:05.212134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd18r61lzlmKyFfInj"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "b640be64-c8b9-42f2-a035-741da9804e10", "DetectTime": "2024-05-21T12:37:05.267307+00:00", "EventTime": "2024-05-21T12:37:05.267326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM62KbuBsCO5oBGeb"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "11a9ebd3-9a9b-4170-a047-fd5ea3cfeb10", "DetectTime": "2024-05-21T12:37:05.321796+00:00", "EventTime": "2024-05-21T12:37:05.321816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7nqt4Zs0I97dBLxd"], "accumulated_threat_level": 1.3, "timewindow": 94} +{"Format": "IDEA0", "ID": "50efc7a1-c1a5-449d-9682-9c4f538b9887", "DetectTime": "2024-05-21T12:37:05.586656+00:00", "EventTime": "2024-05-21T12:37:05.586677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkRDi3hi6MDRHzXP8"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "31f88bb8-2f69-4af6-aded-86f7289991f7", "DetectTime": "2024-05-21T12:37:05.613136+00:00", "EventTime": "2024-05-21T12:37:05.613159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKrna43K9cCgoNo1"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "19695112-ccf6-4fc6-999f-5c47a5aeaa0b", "DetectTime": "2024-05-21T12:37:05.645172+00:00", "EventTime": "2024-05-21T12:37:05.645190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQeE554c4QLiqwv7Dj"], "accumulated_threat_level": 2.1, "timewindow": 94} +{"Format": "IDEA0", "ID": "704bec2e-b715-4139-a0e8-f13a3be0b960", "DetectTime": "2024-05-21T12:37:05.675351+00:00", "EventTime": "2024-05-21T12:37:05.675371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ZlDu13QOs1w5nPL8"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "4d498862-9516-4cf0-b7ac-edbc221e113b", "DetectTime": "2024-05-21T12:37:05.711014+00:00", "EventTime": "2024-05-21T12:37:05.711034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQF6tJ9JvLBUMqP"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 94} +{"Format": "IDEA0", "ID": "3b239d09-0958-43d8-8c0f-39e4456480ab", "DetectTime": "2024-05-21T12:37:05.740443+00:00", "EventTime": "2024-05-21T12:37:05.740467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIM1YP1VW8oT2CI3O6"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "952e845b-4562-467b-b6e0-0239530ca092", "DetectTime": "2024-05-21T12:37:05.773267+00:00", "EventTime": "2024-05-21T12:37:05.773286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CabRi61M3w4rFf3eI4"], "accumulated_threat_level": 3.7, "timewindow": 94} +{"Format": "IDEA0", "ID": "561db9ce-2a19-4a07-884a-56354ae25fbe", "DetectTime": "2024-05-21T12:37:05.802427+00:00", "EventTime": "2024-05-21T12:37:05.802448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVR5GJ1TZ3Y8c5YZU6"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "157f3c03-52fd-471f-ad8d-1e09755b6631", "DetectTime": "2024-05-21T12:37:05.837657+00:00", "EventTime": "2024-05-21T12:37:05.837678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C07jXZ3meYpeP2lg77"], "accumulated_threat_level": 4.5, "timewindow": 94} +{"Format": "IDEA0", "ID": "c441d09c-8f3c-4603-b78e-62eeb8c1b868", "DetectTime": "2024-05-21T12:37:05.876232+00:00", "EventTime": "2024-05-21T12:37:05.876253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5Svg2AyP6zCYqXi"], "accumulated_threat_level": 5.3, "timewindow": 94} +{"Format": "IDEA0", "ID": "9a58be92-8f1d-4b2e-87dc-f9bc36457231", "DetectTime": "2024-05-21T12:37:05.908250+00:00", "EventTime": "2024-05-21T12:37:05.908274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8aiB22MwMwsaPfEfg"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "478e9963-f484-4425-9578-415d8b1f90d4", "DetectTime": "2024-05-21T12:37:06.175894+00:00", "EventTime": "2024-05-21T12:37:06.175914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd0wS3uZNxDTHDw14"], "accumulated_threat_level": 6.1, "timewindow": 94} +{"Format": "IDEA0", "ID": "2c02959f-5220-4874-adb4-5e2f8c85d2b2", "DetectTime": "2024-05-21T12:37:06.216056+00:00", "EventTime": "2024-05-21T12:37:06.216090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjgpmw2gWMVpFu8h96"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 94} +{"Format": "IDEA0", "ID": "0b09586e-d783-475f-b6fd-0be751e2e26c", "DetectTime": "2024-05-21T12:37:06.261164+00:00", "EventTime": "2024-05-21T12:37:06.261182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETLL6bFPC1agTKdk"], "accumulated_threat_level": 7.699999999999999, "timewindow": 94} +{"Format": "IDEA0", "ID": "16a0ff11-32b5-4408-bd84-8cd3d657a813", "DetectTime": "2024-05-21T12:37:06.288127+00:00", "EventTime": "2024-05-21T12:37:06.288148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0odRc3lSk3WW5MYL7"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "73827ff0-0959-4aef-b984-e10902e139d0", "DetectTime": "2024-05-21T12:37:06.323717+00:00", "EventTime": "2024-05-21T12:37:06.323736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C539nN2alh52T1pxpj"], "accumulated_threat_level": 8.5, "timewindow": 94} +{"Format": "IDEA0", "ID": "ee8322c4-0359-4093-a54b-809d9b53b745", "DetectTime": "2024-05-21T12:37:06.361960+00:00", "EventTime": "2024-05-21T12:37:06.361978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["112.208.40.220"]}], "Attach": [{"Content": "Connection to unknown destination port 10763/UDP destination IP 112.208.40.220. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKZD84sfvrpeOsuxa"], "accumulated_threat_level": 9.3, "timewindow": 94} +{"Format": "IDEA0", "ID": "2876cbae-7aa5-4072-b542-2c5f493a72d0", "DetectTime": "2024-05-21T12:37:06.391096+00:00", "EventTime": "2024-05-21T12:37:06.391119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNB90m39QSS9QJXlV8"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "33c6e6a0-6fd6-430e-8d76-1246d6e052c3", "DetectTime": "2024-05-21T12:37:06.422886+00:00", "EventTime": "2024-05-21T12:37:06.422905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeTIo21i9Qw1jEObk"], "accumulated_threat_level": 10.100000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "1e2e370b-67dc-4c98-90d8-daba1b6c6d7e", "DetectTime": "2024-05-21T12:37:06.551424+00:00", "EventTime": "2024-05-21T12:37:06.551445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdkYV3wGe9ap4aUki"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "cd403250-9d68-4a34-9648-3fa7e216546e", "DetectTime": "2024-05-21T12:37:06.577354+00:00", "EventTime": "2024-05-21T12:37:06.577376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5T0Cx9AYzaQHThf"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "d4ecb0c6-cec4-4f8d-87cd-3314260d4cd6", "DetectTime": "2024-05-21T12:37:06.840084+00:00", "EventTime": "2024-05-21T12:37:06.840104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2hBU03snndCv1Dzvj"], "accumulated_threat_level": 10.900000000000002, "timewindow": 94} +{"Format": "IDEA0", "ID": "a5c06e00-1338-406c-814b-bd96c9eaa694", "DetectTime": "2024-05-21T12:37:06.871063+00:00", "EventTime": "2024-05-21T12:37:06.871084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdPPZ1GKXn4uaiXo"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "da8440e3-b199-49f2-99eb-641082f08b5e", "DetectTime": "2024-05-21T12:37:06.910335+00:00", "EventTime": "2024-05-21T12:37:06.910356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5N4bT1kL5DKd4dkCi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 94} +{"Format": "IDEA0", "ID": "02318c9a-9990-49aa-a197-aa7e41ca6db1", "DetectTime": "2024-05-21T12:37:06.948105+00:00", "EventTime": "2024-05-21T12:37:06.948124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJAra3Fn0Be3cVwgi"], "accumulated_threat_level": 12.500000000000004, "timewindow": 94} +{"Format": "Json", "ID": "02318c9a-9990-49aa-a197-aa7e41ca6db1", "DetectTime": "2024-05-21T12:37:06.948105+00:00", "EventTime": "2024-05-21T12:37:06.948124+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "1970-01-04T21:00:38.382177+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2024/05/21 12:37:07.146339)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 94, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "0b31a39e-1571-4911-a898-2c6e15edb65f", "DetectTime": "2024-05-21T12:37:07.157863+00:00", "EventTime": "2024-05-21T12:37:07.157884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPo6c0PzUIuLAil1"], "accumulated_threat_level": 0.8, "timewindow": 94} +{"Format": "IDEA0", "ID": "0c931710-a937-4cdf-8895-28c049b00625", "DetectTime": "2024-05-21T12:37:07.177618+00:00", "EventTime": "2024-05-21T12:37:07.177638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VMoY10eE6oJqvXUf"], "accumulated_threat_level": 1.6, "timewindow": 94} +{"Format": "IDEA0", "ID": "a2d6b091-e763-4533-9905-1e7c32bfcdfd", "DetectTime": "2024-05-21T12:37:07.183428+00:00", "EventTime": "2024-05-21T12:37:07.183447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82Zx5rMNHhPP5CW2"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "6fa76c47-d2ad-48f8-aa1b-5eb36b8aee35", "DetectTime": "2024-05-21T12:37:07.195330+00:00", "EventTime": "2024-05-21T12:37:07.195350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiekSp4vqg4kKDIq9c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 94} +{"Format": "IDEA0", "ID": "53d6137d-cb8b-4f86-85b4-1b740b14daee", "DetectTime": "2024-05-21T12:37:07.201404+00:00", "EventTime": "2024-05-21T12:37:07.201427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEDcW3TWE4J2wkZL3"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "c3ffe7ee-c701-428e-9843-e5c17bd11441", "DetectTime": "2024-05-21T12:37:07.398305+00:00", "EventTime": "2024-05-21T12:37:07.398341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuS2m73cVyBNEuDAR4"], "accumulated_threat_level": 3.2, "timewindow": 94} +{"Format": "IDEA0", "ID": "9578556f-8273-4f47-9969-530fd486e268", "DetectTime": "2024-05-21T12:37:07.419072+00:00", "EventTime": "2024-05-21T12:37:07.419094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmkUs2yPo13A8UGr4"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "63c26e00-0bb5-4119-8aa2-1256c6607114", "DetectTime": "2024-05-21T12:37:07.471159+00:00", "EventTime": "2024-05-21T12:37:07.471194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cni2fG248SrNUVYMSf"], "accumulated_threat_level": 4.0, "timewindow": 94} +{"Format": "IDEA0", "ID": "2f1f56f4-328a-4f8e-aec9-147a31cd37fa", "DetectTime": "2024-05-21T12:37:07.501211+00:00", "EventTime": "2024-05-21T12:37:07.501233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tG0kyV0CUvBTwAb"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "9acf3213-9730-4cee-b939-61033a04313b", "DetectTime": "2024-05-21T12:37:07.559463+00:00", "EventTime": "2024-05-21T12:37:07.559482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.141.181"]}], "Attach": [{"Content": "Connection to unknown destination port 5977/TCP destination IP 82.211.141.181. AS: MAGTICOMAS Magticom, GE AS16010 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgjMDd0GmzCMPblg7"], "accumulated_threat_level": 4.8, "timewindow": 94} +{"Format": "IDEA0", "ID": "e5ed9ad7-febd-4c98-aab9-319c9d616792", "DetectTime": "2024-05-21T12:37:07.602645+00:00", "EventTime": "2024-05-21T12:37:07.602666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqWbe2y0j0bT1PDcg"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "edaac624-dd69-4477-b9e7-588f1f84f2ee", "DetectTime": "2024-05-21T12:37:07.643600+00:00", "EventTime": "2024-05-21T12:37:07.643621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAi9hAD5Z7K7m4Rg9"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "dae87eec-4331-4c8d-a029-c56bb180cb6e", "DetectTime": "2024-05-21T12:37:07.680869+00:00", "EventTime": "2024-05-21T12:37:07.680891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C865cD1aVER6B5ckBd"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "a95bcc3f-6ad3-449f-a420-9d4c8b6d798f", "DetectTime": "2024-05-21T12:37:07.727559+00:00", "EventTime": "2024-05-21T12:37:07.727583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEDqW13NNnXQNjd6a"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "9a935d4b-1cc3-4b02-ac70-645874f1c2ac", "DetectTime": "2024-05-21T12:37:07.790932+00:00", "EventTime": "2024-05-21T12:37:07.790957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbOYg1d1EZStQ1pN1"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "452e6d8f-cf8a-4bef-b44d-59d2a43c8abb", "DetectTime": "2024-05-21T12:37:08.103678+00:00", "EventTime": "2024-05-21T12:37:08.103697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoHWph2AL5AcFqEc2d"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "a8133088-f953-423b-b66c-2e8a4cf75762", "DetectTime": "2024-05-21T12:37:08.249920+00:00", "EventTime": "2024-05-21T12:37:08.249942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.71.187.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPhmkh31QK98E1UYyc"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "0d3a8a92-225a-49f9-92a7-a91d5b815350", "DetectTime": "2024-05-21T12:37:08.537552+00:00", "EventTime": "2024-05-21T12:37:08.537574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoarU17EvZ4hohxz1"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "aa224cd1-6808-4225-bcb6-e21d16d0116a", "DetectTime": "2024-05-21T12:37:08.583247+00:00", "EventTime": "2024-05-21T12:37:08.583269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67wLt2zDfiKZ0DD52"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "27ae206f-45b8-4c43-8d8b-e470bc053d8b", "DetectTime": "2024-05-21T12:37:08.588102+00:00", "EventTime": "2024-05-21T12:37:08.588120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQT7g2LbBFRARhay7"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "8efd621b-7b13-41f0-91c7-8a6e6f9a997f", "DetectTime": "2024-05-21T12:37:08.592726+00:00", "EventTime": "2024-05-21T12:37:08.592744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C63PSLAZkJFbwhhxj"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "cdfe62c8-a1f8-4117-887d-a5c1e8fef8e5", "DetectTime": "2024-05-21T12:37:08.738697+00:00", "EventTime": "2024-05-21T12:37:08.738723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4Zsv2ofYL4XJbbO8", "CdpbWfIYrwdySRB67", "CYk7Me1zJZB4FqL4bc", "CaasO43Ydz6ONIcUx"], "accumulated_threat_level": 5.3, "timewindow": 94} +{"Format": "IDEA0", "ID": "accf58c3-0dc6-4dfb-bd07-86145c7d64e3", "DetectTime": "2024-05-21T12:37:08.835049+00:00", "EventTime": "2024-05-21T12:37:08.835069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRyBD8CaguueLiZ9c"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "18103ebd-ea84-4abc-a4e0-b5449c1e3a21", "DetectTime": "2024-05-21T12:37:08.890763+00:00", "EventTime": "2024-05-21T12:37:08.890782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgyICApizDCdVaml"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "5f39d4a4-2207-49c5-aa8e-2006cc84d5db", "DetectTime": "2024-05-21T12:37:09.161019+00:00", "EventTime": "2024-05-21T12:37:09.161040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8hT4n4yGfCKDSInba"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "a212514f-3d92-4658-b46d-e3e7ec63ff53", "DetectTime": "2024-05-21T12:37:09.201209+00:00", "EventTime": "2024-05-21T12:37:09.201231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzKCst3RsoCZOzZini"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "916a70e4-9b11-4b2d-bad0-8fa3a445713a", "DetectTime": "2024-05-21T12:37:09.262088+00:00", "EventTime": "2024-05-21T12:37:09.262110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09JDw1cxdWCLRJFbg"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "cfef2fa1-aa5d-4d35-90f3-f1de8c088840", "DetectTime": "2024-05-21T12:37:09.297680+00:00", "EventTime": "2024-05-21T12:37:09.297701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE4rw41Oihh0mMblc"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "33979c6c-524e-42af-beb1-128a3e1f5103", "DetectTime": "2024-05-21T12:37:09.441089+00:00", "EventTime": "2024-05-21T12:37:09.441112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQfcC3dGQ2HV6HTbe"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "00955dba-8896-4143-ae66-697249c40970", "DetectTime": "2024-05-21T12:37:09.480802+00:00", "EventTime": "2024-05-21T12:37:09.480823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXQ1hSctdzeHbOD4"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "23282e19-ca81-4274-942b-f37099596e32", "DetectTime": "2024-05-21T12:37:09.772884+00:00", "EventTime": "2024-05-21T12:37:09.772908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfUnXrGJL1OTm8C9"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "e52cd5fd-8620-40ad-9fbd-2fd08abf5ac8", "DetectTime": "2024-05-21T12:37:09.778543+00:00", "EventTime": "2024-05-21T12:37:09.778562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhWzGovzxdCv5Lha"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "5955c2be-a53b-4ff8-a8b0-6e9f00973dd7", "DetectTime": "2024-05-21T12:37:09.782890+00:00", "EventTime": "2024-05-21T12:37:09.782908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8GlV3Cyf5e3jPwF3"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "1bcecd94-75c3-44fe-826d-340d7cb5213e", "DetectTime": "2024-05-21T12:37:09.810720+00:00", "EventTime": "2024-05-21T12:37:09.810739+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa6MG30g2Z4qRQ1Di"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "bc76c019-7c96-48e5-b1d6-78befc4aa546", "DetectTime": "2024-05-21T12:37:09.816184+00:00", "EventTime": "2024-05-21T12:37:09.816203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9tOzi4B76Omuyiu4c"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "c9a0e3e2-3b5f-47ba-9f4d-55a783637471", "DetectTime": "2024-05-21T12:37:09.831231+00:00", "EventTime": "2024-05-21T12:37:09.831256+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQa6MG30g2Z4qRQ1Di"], "accumulated_threat_level": 11.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "7016fe48-d812-4396-9321-40e9fd216c38", "DetectTime": "2024-05-21T12:37:09.900727+00:00", "EventTime": "2024-05-21T12:37:09.900749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEvZEQ2bZMxYGctX05"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "61003946-8bda-492a-8a35-553468d94161", "DetectTime": "2024-05-21T12:37:09.941526+00:00", "EventTime": "2024-05-21T12:37:09.941557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Xt6q2YPPl8UFsiU9"], "accumulated_threat_level": 6.1, "timewindow": 94} +{"Format": "IDEA0", "ID": "26473456-8494-4285-b46b-54facdf9add2", "DetectTime": "2024-05-21T12:37:10.040079+00:00", "EventTime": "2024-05-21T12:37:10.040100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79sFW2BuCMYr1ZDQ2"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "78decce4-da7e-498a-955a-797145ac2f4b", "DetectTime": "2024-05-21T12:37:10.062213+00:00", "EventTime": "2024-05-21T12:37:10.062231+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.198.86.63"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.198.86.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNVtw4QYtpkNk426f"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "7ba895c2-5aba-4bd3-a931-a20f982a5c5f", "DetectTime": "2024-05-21T12:37:10.075951+00:00", "EventTime": "2024-05-21T12:37:10.075972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.198.86.63"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.198.86.63 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNVtw4QYtpkNk426f"], "accumulated_threat_level": 11.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "0796711c-a695-4df3-beb5-e9cd077d1953", "DetectTime": "2024-05-21T12:37:10.081730+00:00", "EventTime": "2024-05-21T12:37:10.081747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cirh8JlOYHAMLOWB1"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "7811b781-7b96-42d8-b35b-2249963b3a17", "DetectTime": "2024-05-21T12:37:10.119220+00:00", "EventTime": "2024-05-21T12:37:10.119243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C86z6L2jw6j4sCn7x"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "7aecc3fe-282b-439d-92d3-ff4507634db8", "DetectTime": "2024-05-21T12:37:10.168120+00:00", "EventTime": "2024-05-21T12:37:10.168140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg6H9J3IDfpwVfHgug"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 94} +{"Format": "IDEA0", "ID": "ba63ebe7-819c-48be-bed7-e1ec38590d5d", "DetectTime": "2024-05-21T12:37:10.173203+00:00", "EventTime": "2024-05-21T12:37:10.173221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2x8SOVFzvnAUJp2"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "91930085-9309-4c3f-a87d-02f05f4cfef1", "DetectTime": "2024-05-21T12:37:10.317123+00:00", "EventTime": "2024-05-21T12:37:10.317148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuECK33LMgDhGGo4Nh"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "2cbf3ab0-0d98-4630-b5c9-3e54d9a5e1f0", "DetectTime": "2024-05-21T12:37:10.322281+00:00", "EventTime": "2024-05-21T12:37:10.322299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJI2q3GFJENsNveK9"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "2a5bc968-90dd-4d81-bc8c-52a243dde6f8", "DetectTime": "2024-05-21T12:37:10.327040+00:00", "EventTime": "2024-05-21T12:37:10.327058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clfi3u2S2uFrWa36ee"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "cc138f9e-1004-4254-a320-acfface781cd", "DetectTime": "2024-05-21T12:37:10.624867+00:00", "EventTime": "2024-05-21T12:37:10.624889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCiwF936kyiUTodGm5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 94} +{"Format": "IDEA0", "ID": "dda576e4-4350-49d2-9685-e1abef937f98", "DetectTime": "2024-05-21T12:37:10.650983+00:00", "EventTime": "2024-05-21T12:37:10.651001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMjge3GhLKS7Rrbhl"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "51536b3e-35c7-4959-9fa4-2ec97e020871", "DetectTime": "2024-05-21T12:37:10.690652+00:00", "EventTime": "2024-05-21T12:37:10.690670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmlK7JRe2KMuIrh"], "accumulated_threat_level": 8.5, "timewindow": 94} +{"Format": "IDEA0", "ID": "ee8d0d4f-6300-465f-b802-8e3ec23f9e2a", "DetectTime": "2024-05-21T12:37:10.735622+00:00", "EventTime": "2024-05-21T12:37:10.735641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Df4h3Oc7igUbLpX6"], "accumulated_threat_level": 9.3, "timewindow": 94} +{"Format": "IDEA0", "ID": "dd02b241-b73a-452f-bdbf-01eda8726db5", "DetectTime": "2024-05-21T12:37:10.775101+00:00", "EventTime": "2024-05-21T12:37:10.775120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COOz6m1I1x3auf11N1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "1e62fdbb-fca4-4967-a8d2-b412e67dbf1c", "DetectTime": "2024-05-21T12:37:10.814103+00:00", "EventTime": "2024-05-21T12:37:10.814121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWVu4w2vWZ58eelS7e"], "accumulated_threat_level": 10.900000000000002, "timewindow": 94} +{"Format": "IDEA0", "ID": "d2d93c7f-485e-439d-b0fd-aee67b6e1caf", "DetectTime": "2024-05-21T12:37:10.852870+00:00", "EventTime": "2024-05-21T12:37:10.852890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxV6QJqAJs0FMhqWa"], "accumulated_threat_level": 11.700000000000003, "timewindow": 94} +{"Format": "IDEA0", "ID": "d467e9ee-3e6b-4f63-964f-85c1247ad49d", "DetectTime": "2024-05-21T12:37:11.132207+00:00", "EventTime": "2024-05-21T12:37:11.132227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAVf9F42AJmqdTVqm9"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "fce9f37d-7e7f-4ac0-aefd-01c477b16233", "DetectTime": "2024-05-21T12:37:11.136970+00:00", "EventTime": "2024-05-21T12:37:11.136989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bxVf1bqKpiAAc5Vk"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "d6548713-fc28-4389-9759-07fa9dae5618", "DetectTime": "2024-05-21T12:37:11.141476+00:00", "EventTime": "2024-05-21T12:37:11.141493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3l0V3A6vDLXXnMqa"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "42ddab9e-48ea-48ec-aea1-b78b77c5e938", "DetectTime": "2024-05-21T12:37:11.146202+00:00", "EventTime": "2024-05-21T12:37:11.146219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3UQK15EgGqtK2ZPk"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "f59cec04-4c53-42da-8fa0-8d4ac3cde8c0", "DetectTime": "2024-05-21T12:37:11.238356+00:00", "EventTime": "2024-05-21T12:37:11.238374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwaSH14pg5PSq0kPKl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 94} +{"Format": "Json", "ID": "f59cec04-4c53-42da-8fa0-8d4ac3cde8c0", "DetectTime": "2024-05-21T12:37:11.238356+00:00", "EventTime": "2024-05-21T12:37:11.238374+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "1970-01-04T21:31:35.992349+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 94. (real time 2024/05/21 12:37:11.448853)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 94, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "59c2dfc2-a319-4f4c-8d50-945a65a3fd38", "DetectTime": "2024-05-21T12:37:11.460091+00:00", "EventTime": "2024-05-21T12:37:11.460110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53kgc3bt9VynFHmFl"], "accumulated_threat_level": 0.8, "timewindow": 94} +{"Format": "IDEA0", "ID": "1377f50e-8147-4db3-accc-bec00e8f1bdd", "DetectTime": "2024-05-21T12:37:11.464970+00:00", "EventTime": "2024-05-21T12:37:11.464987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA6IB342gd4l8Hk62"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "73eae58f-f2b7-424f-8422-4c0ac02fc41a", "DetectTime": "2024-05-21T12:37:11.475580+00:00", "EventTime": "2024-05-21T12:37:11.475598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKLg8ylZq8005v09"], "accumulated_threat_level": 1.6, "timewindow": 94} +{"Format": "IDEA0", "ID": "96f4dea5-18d4-46e4-840c-8d412bfce0f3", "DetectTime": "2024-05-21T12:37:11.575937+00:00", "EventTime": "2024-05-21T12:37:11.575962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJes8VjVCsdBPF93j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 94} +{"Format": "IDEA0", "ID": "06384fa2-ef6a-4e4d-bee9-7430c66d9624", "DetectTime": "2024-05-21T12:37:11.872544+00:00", "EventTime": "2024-05-21T12:37:11.872567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1RJpf4b0YRqlsDwmb"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "82e6c038-deac-49fb-8d0d-cdccd50de2bc", "DetectTime": "2024-05-21T12:37:11.914190+00:00", "EventTime": "2024-05-21T12:37:11.914208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccrsfiz59saMkS0pd"], "accumulated_threat_level": 3.2, "timewindow": 94} +{"Format": "IDEA0", "ID": "82b5543c-ce04-455b-95b4-fd4619de9259", "DetectTime": "2024-05-21T12:37:11.937874+00:00", "EventTime": "2024-05-21T12:37:11.937896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0h0x1rPa1i8Njy2k"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "8f275e0d-2556-48e4-a13c-9e32b0b7f269", "DetectTime": "2024-05-21T12:37:11.975505+00:00", "EventTime": "2024-05-21T12:37:11.975524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoYcc4Kp00C8Bz414"], "accumulated_threat_level": 4.0, "timewindow": 94} +{"Format": "IDEA0", "ID": "1a70687a-7b31-408f-98cf-46f774b25266", "DetectTime": "2024-05-21T12:37:11.999198+00:00", "EventTime": "2024-05-21T12:37:11.999217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEP4oE1aWa6ucfcsb7"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "4feee3d1-c8db-40f1-a098-a10f79be5735", "DetectTime": "2024-05-21T12:37:12.046248+00:00", "EventTime": "2024-05-21T12:37:12.046269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGNj3pt6GAlDizNzi"], "accumulated_threat_level": 4.8, "timewindow": 92} +{"Format": "IDEA0", "ID": "dd695d0f-1c9d-4ba0-8f62-ab46977b80f6", "DetectTime": "2024-05-21T12:37:12.100260+00:00", "EventTime": "2024-05-21T12:37:12.100280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMnpA7286eTbNRteE4"], "accumulated_threat_level": 4.8, "timewindow": 94} +{"Format": "IDEA0", "ID": "e10caac5-a1d0-4d65-93da-4dda2e273fa8", "DetectTime": "2024-05-21T12:37:12.159295+00:00", "EventTime": "2024-05-21T12:37:12.159314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuJUb4GNQlhtqf2s7"], "accumulated_threat_level": 5.6, "timewindow": 94} +{"Format": "IDEA0", "ID": "1a3b9f9a-66bf-4234-b293-283358805b13", "DetectTime": "2024-05-21T12:37:12.213137+00:00", "EventTime": "2024-05-21T12:37:12.213159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHVYAG2anAyAPiJeaf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 94} +{"Format": "IDEA0", "ID": "e33e6954-b62b-4902-a682-bda039548736", "DetectTime": "2024-05-21T12:37:12.246568+00:00", "EventTime": "2024-05-21T12:37:12.246593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRFOx3sPak33wbsk"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "6c38f1e4-88d5-40c3-85e6-bcfcbe1e37e0", "DetectTime": "2024-05-21T12:37:12.499797+00:00", "EventTime": "2024-05-21T12:37:12.499819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkWhtl7naLUCjeLg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 94} +{"Format": "IDEA0", "ID": "c0895a82-17ce-449f-b7d8-2d5d97e4c530", "DetectTime": "2024-05-21T12:37:12.538543+00:00", "EventTime": "2024-05-21T12:37:12.538563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoTuX1kHLoU7fXr03"], "accumulated_threat_level": 7.999999999999999, "timewindow": 94} +{"Format": "IDEA0", "ID": "2caafdea-cced-4402-ac30-0bbb2adaa03d", "DetectTime": "2024-05-21T12:37:12.578359+00:00", "EventTime": "2024-05-21T12:37:12.578378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGy5hmSOrtkGuqyc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 94} +{"Format": "IDEA0", "ID": "06c99485-fb43-467d-a005-3de14f49f84a", "DetectTime": "2024-05-21T12:37:12.618887+00:00", "EventTime": "2024-05-21T12:37:12.618919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq0ts46OMIo9M0Ll3"], "accumulated_threat_level": 9.6, "timewindow": 94} +{"Format": "IDEA0", "ID": "711cdf4e-04c2-46be-8eb5-b95577ec34f4", "DetectTime": "2024-05-21T12:37:12.659322+00:00", "EventTime": "2024-05-21T12:37:12.659342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtkZWQ3tZ5Iqj6ZMKk"], "accumulated_threat_level": 10.4, "timewindow": 94} +{"Format": "IDEA0", "ID": "bedf455b-62d9-437c-9d82-f7c471001433", "DetectTime": "2024-05-21T12:37:12.823862+00:00", "EventTime": "2024-05-21T12:37:12.823883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRHNWm4UVZTIodTzCg", "CNVebQ263knKaRb9V5", "CRJI133QwmrgJaEJp1", "Ckwi1hkrsDh7K5m84"], "accumulated_threat_level": 10.9, "timewindow": 94} +{"Format": "IDEA0", "ID": "0ec2f884-0601-4b1d-8f56-75351c18fe83", "DetectTime": "2024-05-21T12:37:12.873510+00:00", "EventTime": "2024-05-21T12:37:12.873531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf676S15X103QxvYTf"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "8d2c3831-3ce4-48b8-ae0f-f769cb2b6a72", "DetectTime": "2024-05-21T12:37:13.096910+00:00", "EventTime": "2024-05-21T12:37:13.096933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVCJV2W3kHR1Dsoo2"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "d055f43b-06f9-42ec-aa3d-b986cc59fdc9", "DetectTime": "2024-05-21T12:37:13.378580+00:00", "EventTime": "2024-05-21T12:37:13.378602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.228.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfRhKP1UUWLepI5MRi"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "a75c1bfd-3622-404d-a4f1-72f2c4447d4f", "DetectTime": "2024-05-21T12:37:13.499962+00:00", "EventTime": "2024-05-21T12:37:13.499983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.147.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaPQuV3sXp4BjJ6kK8"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "63e524d6-a116-489b-9fdd-4578f4fe04e2", "DetectTime": "2024-05-21T12:37:13.982468+00:00", "EventTime": "2024-05-21T12:37:13.982487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.33.13 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOTIR1bcI5wyFkhbe"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "cf5cc241-4c83-4ee5-a57e-2c1f10d2e8bb", "DetectTime": "2024-05-21T12:37:14.426471+00:00", "EventTime": "2024-05-21T12:37:14.426491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNhjM3XRFgZ9s0XZ8"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "c79ff766-cfa5-43d5-b3a3-7f66b52076b0", "DetectTime": "2024-05-21T12:37:14.466290+00:00", "EventTime": "2024-05-21T12:37:14.466308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["195.110.142.232"]}], "Attach": [{"Content": "Connection to unknown destination port 16163/UDP destination IP 195.110.142.232. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzwNBUNJ5n2z2OC"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "488c6e26-5ab8-431c-953d-0438a0037915", "DetectTime": "2024-05-21T12:37:14.730688+00:00", "EventTime": "2024-05-21T12:37:14.730709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGv5Ks4jdKdaGHhc3k"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "e0ccdcf7-9daa-4429-a19b-5c061b7f2213", "DetectTime": "2024-05-21T12:37:14.764721+00:00", "EventTime": "2024-05-21T12:37:14.764743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnbpc7Q5iZ0vU6d"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "f312b471-608c-4bd9-a56d-af3767ae008f", "DetectTime": "2024-05-21T12:37:14.805210+00:00", "EventTime": "2024-05-21T12:37:14.805228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crgcjo4vhK1KOAf6gg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "b594c105-ecef-4d5a-9273-c034bb968b9c", "DetectTime": "2024-05-21T12:37:14.847830+00:00", "EventTime": "2024-05-21T12:37:14.847851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjnb6j1cMdPtZh6Fx2"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "175b500b-b018-4f94-9792-4fcb4b7bfd4c", "DetectTime": "2024-05-21T12:37:14.879052+00:00", "EventTime": "2024-05-21T12:37:14.879072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXqNU2p8yolv69BBj"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "87a50603-4a61-4307-9046-f4e7b10064c8", "DetectTime": "2024-05-21T12:37:14.894685+00:00", "EventTime": "2024-05-21T12:37:14.894704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a7eappD2blsOyvk"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "0146d29b-bc13-4dde-92ad-679d85c6bd54", "DetectTime": "2024-05-21T12:37:15.347318+00:00", "EventTime": "2024-05-21T12:37:15.347338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YlRk3JPhYOD2UzC3"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4dc0d2a9-48e0-43dd-8502-fe7a4994f0fc", "DetectTime": "2024-05-21T12:37:15.387181+00:00", "EventTime": "2024-05-21T12:37:15.387201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CChfTs1aLmmjmLyNoc"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "d3e7be8b-76b8-4f7b-b007-0342d7de5511", "DetectTime": "2024-05-21T12:37:15.394976+00:00", "EventTime": "2024-05-21T12:37:15.394996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwJT53LBfKDwrZRz8"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "4381eddc-ba2f-4eda-8920-a3cf5037d784", "DetectTime": "2024-05-21T12:37:15.405243+00:00", "EventTime": "2024-05-21T12:37:15.405263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2zlq2xX8tyv7Byji"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "cf5f9599-8e15-4f1b-b3df-fe6489e9a480", "DetectTime": "2024-05-21T12:37:15.410648+00:00", "EventTime": "2024-05-21T12:37:15.410668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJulFn42RDpQ2eiOW9"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "a4f888cd-ea59-4c27-9f6a-c1104b6eb182", "DetectTime": "2024-05-21T12:37:15.441299+00:00", "EventTime": "2024-05-21T12:37:15.441321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpRiYD1j9VbPRu5876"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "b3eee2bf-32c0-401c-9752-4cadd99a8f9d", "DetectTime": "2024-05-21T12:37:15.446233+00:00", "EventTime": "2024-05-21T12:37:15.446252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBuKNm3dIwqno30eUl"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "c74b438f-2988-4bd3-b548-fd337416c994", "DetectTime": "2024-05-21T12:37:15.836042+00:00", "EventTime": "2024-05-21T12:37:15.836061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM9QJw4dTPO09wMCel"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "264a220b-5812-4869-8356-c5bdb795dbb2", "DetectTime": "2024-05-21T12:37:15.841078+00:00", "EventTime": "2024-05-21T12:37:15.841096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4YJf4BfFmkcKY90d"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "cc422af4-c8d8-408e-a4e3-f2aab1aaf7c2", "DetectTime": "2024-05-21T12:37:15.845981+00:00", "EventTime": "2024-05-21T12:37:15.845999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crlzic9HmQ996nBl8"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "681a6b8e-7aa9-448c-85ed-746d2146d1d3", "DetectTime": "2024-05-21T12:37:15.851040+00:00", "EventTime": "2024-05-21T12:37:15.851060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0EacK2rBcZALe3s0e"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "20ce566a-bdac-425e-bff4-f05d488dfcb7", "DetectTime": "2024-05-21T12:37:15.947478+00:00", "EventTime": "2024-05-21T12:37:15.947499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRk8T2VqJO3n7zUg"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "9eef3fb2-4c59-4b29-aac2-e9b24f9b3d91", "DetectTime": "2024-05-21T12:37:15.988579+00:00", "EventTime": "2024-05-21T12:37:15.988599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LZLm4tuFBPDkJj8k"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "314ac1d2-3ac2-48c8-8338-c59485686edb", "DetectTime": "2024-05-21T12:37:16.033333+00:00", "EventTime": "2024-05-21T12:37:16.033351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmvdez38QF4qLIy15f"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "f9d734f3-be25-4d9f-834c-1d89063ef6f0", "DetectTime": "2024-05-21T12:37:16.060199+00:00", "EventTime": "2024-05-21T12:37:16.060220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyqHxf3D9OVI8KfATl"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "b429ebd4-7236-4ae4-98b7-a73a5d819cc3", "DetectTime": "2024-05-21T12:37:16.343864+00:00", "EventTime": "2024-05-21T12:37:16.343883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTqve2TyBcU10D008"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "9c70a7d8-db8c-4568-8b14-f1de318ffbf5", "DetectTime": "2024-05-21T12:37:16.394812+00:00", "EventTime": "2024-05-21T12:37:16.394830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.70.40.131"]}], "Attach": [{"Content": "Connection to unknown destination port 2307/UDP destination IP 77.70.40.131. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyPAec4FxyqLe3m0Mj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "d1147acc-a2dc-422f-8e1d-7a6292e62625", "DetectTime": "2024-05-21T12:37:16.399523+00:00", "EventTime": "2024-05-21T12:37:16.399541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy32QW3DNaKWHHMsw5"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "580c1013-cbce-4ca5-80e5-edcda6572a1e", "DetectTime": "2024-05-21T12:37:16.404066+00:00", "EventTime": "2024-05-21T12:37:16.404083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAvNa4d5C5sCuROyk"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "917988b3-ec8d-47f3-bd14-d3f44debb0d8", "DetectTime": "2024-05-21T12:37:16.439700+00:00", "EventTime": "2024-05-21T12:37:16.439719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdX8y4XPDeNkfHGw4"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "47a840a4-0248-4a88-9cfc-d86d624e7f3a", "DetectTime": "2024-05-21T12:37:16.461091+00:00", "EventTime": "2024-05-21T12:37:16.461114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCELE4URFDFxawco1"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "f28472f8-1135-46ff-a62c-7e252f9b3c44", "DetectTime": "2024-05-21T12:37:16.465963+00:00", "EventTime": "2024-05-21T12:37:16.465982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAT32I37Dglv6Ic4hd"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "4bca3383-c2d1-4c0d-a327-a832d29e23c5", "DetectTime": "2024-05-21T12:37:16.594785+00:00", "EventTime": "2024-05-21T12:37:16.594806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8FhenSDewdk94id"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "3222b972-8444-445b-8040-5c90519e54ff", "DetectTime": "2024-05-21T12:37:16.633444+00:00", "EventTime": "2024-05-21T12:37:16.633466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzuwZ3S39CvywdYug"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "e738823f-6c9b-49eb-b576-1c75dfefec82", "DetectTime": "2024-05-21T12:37:16.644768+00:00", "EventTime": "2024-05-21T12:37:16.644786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKJqakslClYmq874"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "4226b3af-6e88-4061-a62d-3110eadb7c0e", "DetectTime": "2024-05-21T12:37:17.074601+00:00", "EventTime": "2024-05-21T12:37:17.074623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXbLMgMYUfTv8pfcf"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "c52dcb07-a59b-4df8-81d2-2668de61da02", "DetectTime": "2024-05-21T12:37:17.103928+00:00", "EventTime": "2024-05-21T12:37:17.103950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhgF736DGkFcIqKPe"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "5167daef-7934-4435-b417-71e3a262897f", "DetectTime": "2024-05-21T12:37:17.139523+00:00", "EventTime": "2024-05-21T12:37:17.139541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4XDR11kia05tXRj3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "5d058206-dd79-46a0-9398-c3e65a8864e1", "DetectTime": "2024-05-21T12:37:17.180429+00:00", "EventTime": "2024-05-21T12:37:17.180448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgyer1kZn2CrKDxAi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "1c3be74b-d4d2-48af-93b1-439e40d979cf", "DetectTime": "2024-05-21T12:37:17.212211+00:00", "EventTime": "2024-05-21T12:37:17.212232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUtFp4rovfXRVlII6"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "c1d48ed9-9847-4571-84ee-947e2fcc8b7f", "DetectTime": "2024-05-21T12:37:17.247671+00:00", "EventTime": "2024-05-21T12:37:17.247690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05slg15ltjmwHs8id"], "accumulated_threat_level": 9.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "8e7088c1-3495-49f6-bcf2-d3dbceb09df0", "DetectTime": "2024-05-21T12:37:17.288872+00:00", "EventTime": "2024-05-21T12:37:17.288891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61t1WPoAbL6QRtgd"], "accumulated_threat_level": 10.4, "timewindow": 95} +{"Format": "IDEA0", "ID": "23f4c96e-cf8a-46bd-a7ff-984af4a03441", "DetectTime": "2024-05-21T12:37:17.330940+00:00", "EventTime": "2024-05-21T12:37:17.330960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kFbGisOT9BXxyX1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "3ffbaf2f-4891-460c-be28-99207b3b522f", "DetectTime": "2024-05-21T12:37:17.372620+00:00", "EventTime": "2024-05-21T12:37:17.372644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "Connection to unknown destination port 1192/UDP destination IP 188.129.248.221. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpkqfc2WZDsv1lBcx2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 95} +{"Format": "Json", "ID": "3ffbaf2f-4891-460c-be28-99207b3b522f", "DetectTime": "2024-05-21T12:37:17.372620+00:00", "EventTime": "2024-05-21T12:37:17.372644+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.248.221"]}], "Attach": [{"Content": "1970-01-04T22:03:55.954483+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2024/05/21 12:37:17.732126)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 95, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2f706b42-14d5-4b57-89ef-182c533311b9", "DetectTime": "2024-05-21T12:37:17.745070+00:00", "EventTime": "2024-05-21T12:37:17.745095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3ES9PtO72UxgXZ1"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "3e501950-037d-4396-8f9b-986702bea211", "DetectTime": "2024-05-21T12:37:17.757274+00:00", "EventTime": "2024-05-21T12:37:17.757293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc54h122sI2t22Nrsg"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "ffc3c75f-5204-427e-95c6-18463f21295c", "DetectTime": "2024-05-21T12:37:17.761797+00:00", "EventTime": "2024-05-21T12:37:17.761815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzvA830Gyz0Fm0eaj"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "2eca6839-407c-49ea-96e8-f6f3eb74875e", "DetectTime": "2024-05-21T12:37:17.777643+00:00", "EventTime": "2024-05-21T12:37:17.777661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRvZK1juhFbIJzGli"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "7132a297-f535-4ea0-8fda-309c3fc851c5", "DetectTime": "2024-05-21T12:37:17.807488+00:00", "EventTime": "2024-05-21T12:37:17.807508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOMky2uhqCcJGSCYe"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "ae0610e5-7403-45ad-8f25-7188f311ca55", "DetectTime": "2024-05-21T12:37:17.848656+00:00", "EventTime": "2024-05-21T12:37:17.848673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIEYsvVeg8E8JDY9c"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "03e7d795-0638-4e5c-9bc2-18dbfc83ac31", "DetectTime": "2024-05-21T12:37:17.889408+00:00", "EventTime": "2024-05-21T12:37:17.889428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGF4YI3Pul2SYV4NMh"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "15ac11a8-790c-40df-86e7-5fae48ec0dc6", "DetectTime": "2024-05-21T12:37:17.931673+00:00", "EventTime": "2024-05-21T12:37:17.931691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sbZo2olD5rifEHjc"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "fa22726e-c0d1-4333-b872-76c10c4da8b3", "DetectTime": "2024-05-21T12:37:17.972208+00:00", "EventTime": "2024-05-21T12:37:17.972231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO59e22RwI8hZBWKK5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "f478d200-5c00-4a62-82ac-667ff8e41e78", "DetectTime": "2024-05-21T12:37:18.012886+00:00", "EventTime": "2024-05-21T12:37:18.012907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwrFI2QjnWeMyJMSi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "f2709596-d148-45c2-9fd6-0d43acf405a2", "DetectTime": "2024-05-21T12:37:18.056686+00:00", "EventTime": "2024-05-21T12:37:18.056707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1WYb4wtm9caOwElc"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "cfe79a20-44bc-405d-bed1-3d6afcee0078", "DetectTime": "2024-05-21T12:37:18.098610+00:00", "EventTime": "2024-05-21T12:37:18.098630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.8.121.25"]}], "Attach": [{"Content": "Connection to unknown destination port 4727/UDP destination IP 99.8.121.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfCp815mtFiHdPCUe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "38b51e4e-2536-40b0-9321-37e9b5368cbb", "DetectTime": "2024-05-21T12:37:18.136862+00:00", "EventTime": "2024-05-21T12:37:18.136881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.91.64.56"]}], "Attach": [{"Content": "Connection to unknown destination port 24834/UDP destination IP 178.91.64.56. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cozdxz2MkJcipTdXue"], "accumulated_threat_level": 8.799999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "b55e64cf-fc5d-4e0d-9922-64a4a929a72b", "DetectTime": "2024-05-21T12:37:18.178039+00:00", "EventTime": "2024-05-21T12:37:18.178057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoLCIUhCIARS6m8h"], "accumulated_threat_level": 9.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "5bcc29aa-59c9-496c-b66b-3ffee31434f4", "DetectTime": "2024-05-21T12:37:18.388555+00:00", "EventTime": "2024-05-21T12:37:18.388577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBN0MZNkuTCDwXVj"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "132515a8-ac02-4419-8d15-7b5716b6f47e", "DetectTime": "2024-05-21T12:37:18.514875+00:00", "EventTime": "2024-05-21T12:37:18.514895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.17.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4403/UDP destination IP 186.95.17.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWoPJD2UZiycNDyWX9"], "accumulated_threat_level": 10.4, "timewindow": 95} +{"Format": "IDEA0", "ID": "05189f30-2998-4f0e-a4cb-c0353c64100b", "DetectTime": "2024-05-21T12:37:18.567395+00:00", "EventTime": "2024-05-21T12:37:18.567414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv86cKSREnL11mHr6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "acc33931-de0d-4427-a2fd-95e72449a4ac", "DetectTime": "2024-05-21T12:37:18.670181+00:00", "EventTime": "2024-05-21T12:37:18.670199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQmRz3ArpQeTg8HI3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 95} +{"Format": "Json", "ID": "acc33931-de0d-4427-a2fd-95e72449a4ac", "DetectTime": "2024-05-21T12:37:18.670181+00:00", "EventTime": "2024-05-21T12:37:18.670199+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "1970-01-04T22:05:39.794904+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2024/05/21 12:37:18.844014)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 95, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "97a6941a-ec42-4d90-926a-1b5ecd0bba5c", "DetectTime": "2024-05-21T12:37:18.855672+00:00", "EventTime": "2024-05-21T12:37:18.855693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8vA73R5eFEgGkY77"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "3999a9d2-75b7-487b-83cf-5288cb165ef5", "DetectTime": "2024-05-21T12:37:18.868136+00:00", "EventTime": "2024-05-21T12:37:18.868158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 4507/UDP destination IP 84.151.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnx8C2qnacJkKxZU9"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "5f85672a-20c3-4aed-bc62-66e489e5ad92", "DetectTime": "2024-05-21T12:37:18.873667+00:00", "EventTime": "2024-05-21T12:37:18.873687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cup8vv322Z41TWSXf6"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "571847ec-23ac-49cb-b43a-2dc4fa3260d2", "DetectTime": "2024-05-21T12:37:19.085280+00:00", "EventTime": "2024-05-21T12:37:19.085299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["95.104.67.50"]}], "Attach": [{"Content": "Connection to unknown destination port 9397/UDP destination IP 95.104.67.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtrHwa2z0GeKrnhII9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "d28f69e9-fa8d-4ca1-aaee-3ffa3be2d482", "DetectTime": "2024-05-21T12:37:19.139078+00:00", "EventTime": "2024-05-21T12:37:19.139095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeD8yV32wrNzCGeP2e"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "7a1b96df-6c2b-4aca-9347-9676209582bd", "DetectTime": "2024-05-21T12:37:19.429861+00:00", "EventTime": "2024-05-21T12:37:19.429880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnfdW2dN648iBrKR1"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "6d506362-1a75-4e73-b273-50e7ce4ab959", "DetectTime": "2024-05-21T12:37:19.525613+00:00", "EventTime": "2024-05-21T12:37:19.525634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVavPl4WstTtIvTf55"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "0cd0a5ba-0a56-411c-9905-caa1bc8d4ffc", "DetectTime": "2024-05-21T12:37:19.842289+00:00", "EventTime": "2024-05-21T12:37:19.842309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.118.81.174"]}], "Attach": [{"Content": "Connection to unknown destination port 7353/UDP destination IP 190.118.81.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBV171qhd81kbixT"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "68c2668a-35ed-417a-a524-69e546218fc8", "DetectTime": "2024-05-21T12:37:19.963768+00:00", "EventTime": "2024-05-21T12:37:19.963790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzSbTdHJqi6iPvXl"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "aed2cd7a-4c86-4e97-b426-3777eb45f4f6", "DetectTime": "2024-05-21T12:37:20.155415+00:00", "EventTime": "2024-05-21T12:37:20.155434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2PRL3lX9I94Ozx1a"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "3bb4706e-1db4-4811-a537-911aa46a9f2d", "DetectTime": "2024-05-21T12:37:20.183870+00:00", "EventTime": "2024-05-21T12:37:20.183889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDxZNR3gMz1nIRm6Ig"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "b05ab5d4-646e-4e8a-8127-90e8d3f47a8a", "DetectTime": "2024-05-21T12:37:20.231900+00:00", "EventTime": "2024-05-21T12:37:20.231922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co7Ki34mKhBzpmm8ff"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "7e42b802-8261-45dd-a6c5-4038dd8382cf", "DetectTime": "2024-05-21T12:37:20.261330+00:00", "EventTime": "2024-05-21T12:37:20.261352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ERJA2OQIG1Od0Xpf"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "83c3085b-ae9e-44b2-a782-c13c8c1ce8b6", "DetectTime": "2024-05-21T12:37:20.300809+00:00", "EventTime": "2024-05-21T12:37:20.300831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM62KbuBsCO5oBGeb"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "c0bc138f-edc3-4f50-b22a-4f2d0d5164fc", "DetectTime": "2024-05-21T12:37:20.340600+00:00", "EventTime": "2024-05-21T12:37:20.340621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmUOJk1rVrWhveOK94"], "accumulated_threat_level": 5.6, "timewindow": 93} +{"Format": "IDEA0", "ID": "20a3f3f4-49a4-4d61-8d8a-b1bde5108ed2", "DetectTime": "2024-05-21T12:37:20.596611+00:00", "EventTime": "2024-05-21T12:37:20.596650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7nqt4Zs0I97dBLxd"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "5787310e-076f-406b-b84c-b740f8e3eb82", "DetectTime": "2024-05-21T12:37:20.643287+00:00", "EventTime": "2024-05-21T12:37:20.643306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFXlw2lVgBccddw0c"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "07a3f89a-dfc6-4d23-99d8-f8857083c6a7", "DetectTime": "2024-05-21T12:37:20.681409+00:00", "EventTime": "2024-05-21T12:37:20.681429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQeE554c4QLiqwv7Dj"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "fce57ccf-2a02-4231-9e2c-94dd96bd2741", "DetectTime": "2024-05-21T12:37:20.746085+00:00", "EventTime": "2024-05-21T12:37:20.746108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQF6tJ9JvLBUMqP"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "4ee16ed0-1cd1-4e77-a9d7-cdd2109bf661", "DetectTime": "2024-05-21T12:37:20.809413+00:00", "EventTime": "2024-05-21T12:37:20.809433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CabRi61M3w4rFf3eI4"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "fb6ca169-70e1-4d6c-b529-366c4873f6e3", "DetectTime": "2024-05-21T12:37:20.867871+00:00", "EventTime": "2024-05-21T12:37:20.867892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C07jXZ3meYpeP2lg77"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "229f4156-7688-466a-be51-3f06c654f7a6", "DetectTime": "2024-05-21T12:37:20.913069+00:00", "EventTime": "2024-05-21T12:37:20.913089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkKKB4FmIw4uReJd5"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "347c21dd-9068-4524-bab5-56e1c5ae8029", "DetectTime": "2024-05-21T12:37:20.939860+00:00", "EventTime": "2024-05-21T12:37:20.939879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5Svg2AyP6zCYqXi"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "104561e1-763c-40fc-a159-64b38ad4245a", "DetectTime": "2024-05-21T12:37:20.984866+00:00", "EventTime": "2024-05-21T12:37:20.984886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzqvP2P2j1cIiDPJd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "e4364ee0-0eec-4bd0-b48c-5a195e8aa7cd", "DetectTime": "2024-05-21T12:37:21.205874+00:00", "EventTime": "2024-05-21T12:37:21.205895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmd0wS3uZNxDTHDw14"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "90eadc1d-a2ba-4b81-b479-9855fdd430fd", "DetectTime": "2024-05-21T12:37:21.254081+00:00", "EventTime": "2024-05-21T12:37:21.254102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjgpmw2gWMVpFu8h96"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "87fc4f52-3aeb-4d87-99d5-d43ccc554b77", "DetectTime": "2024-05-21T12:37:21.289456+00:00", "EventTime": "2024-05-21T12:37:21.289478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.225"]}], "Attach": [{"Content": "Connection to unknown destination port 1007/UDP destination IP 190.56.105.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIHYQ2GKZOTSEzlW7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "eeaab917-7051-4f58-9d1b-3974d0ec02cf", "DetectTime": "2024-05-21T12:37:21.575284+00:00", "EventTime": "2024-05-21T12:37:21.575306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETLL6bFPC1agTKdk"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "3d6c000d-e62a-4fc5-9817-a814428427eb", "DetectTime": "2024-05-21T12:37:21.612139+00:00", "EventTime": "2024-05-21T12:37:21.612161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeTIo21i9Qw1jEObk"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "e5facfbf-edc4-41b3-b1e9-e1fd413c7afd", "DetectTime": "2024-05-21T12:37:21.617829+00:00", "EventTime": "2024-05-21T12:37:21.617849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKZD84sfvrpeOsuxa"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "42d212a7-793b-4cfc-999d-c2fd5b59c703", "DetectTime": "2024-05-21T12:37:21.622569+00:00", "EventTime": "2024-05-21T12:37:21.622587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C539nN2alh52T1pxpj"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "a17bd22d-b055-49c9-9c8f-71b830102067", "DetectTime": "2024-05-21T12:37:22.038086+00:00", "EventTime": "2024-05-21T12:37:22.038106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJAra3Fn0Be3cVwgi"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "0dd51ff8-634c-47bd-97b3-e9e5ff077492", "DetectTime": "2024-05-21T12:37:22.043242+00:00", "EventTime": "2024-05-21T12:37:22.043262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3IQHa2etg0EvfiWf6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "79d38e8d-e77a-46cd-8ba6-4eea4f238c15", "DetectTime": "2024-05-21T12:37:22.047821+00:00", "EventTime": "2024-05-21T12:37:22.047839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2hBU03snndCv1Dzvj"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "cf87d288-0de4-4de7-8a8c-9a04bb93ed41", "DetectTime": "2024-05-21T12:37:22.052769+00:00", "EventTime": "2024-05-21T12:37:22.052787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5N4bT1kL5DKd4dkCi"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "450fb1b8-0368-4a19-9179-e31fab45cfe0", "DetectTime": "2024-05-21T12:37:22.100767+00:00", "EventTime": "2024-05-21T12:37:22.100789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cti9M5x8TpXPa71k7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "9d695609-70b8-46c4-98b4-241103a720ed", "DetectTime": "2024-05-21T12:37:22.133587+00:00", "EventTime": "2024-05-21T12:37:22.133608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChPo6c0PzUIuLAil1"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "d60b6cb7-56db-45a1-bdee-e556e2d94ebe", "DetectTime": "2024-05-21T12:37:22.458502+00:00", "EventTime": "2024-05-21T12:37:22.458524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiekSp4vqg4kKDIq9c"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "3c4af7ed-42d1-4384-a8b0-e175dddc15e1", "DetectTime": "2024-05-21T12:37:22.463804+00:00", "EventTime": "2024-05-21T12:37:22.463825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VMoY10eE6oJqvXUf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "43292190-175a-4a52-92a3-67d770376eb5", "DetectTime": "2024-05-21T12:37:22.523978+00:00", "EventTime": "2024-05-21T12:37:22.524001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuS2m73cVyBNEuDAR4"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "78dc0c65-8559-48cf-aee1-1104f3410e83", "DetectTime": "2024-05-21T12:37:22.553900+00:00", "EventTime": "2024-05-21T12:37:22.553920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cni2fG248SrNUVYMSf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "4f9ad274-6aed-40c4-97fb-356d293fb69b", "DetectTime": "2024-05-21T12:37:22.591805+00:00", "EventTime": "2024-05-21T12:37:22.591823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["151.70.71.239"]}], "Attach": [{"Content": "Connection to unknown destination port 19928/UDP destination IP 151.70.71.239. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BDN74OJGOoSdXCr6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "40db7fb3-1cf1-4ad6-ab45-08bef5932aba", "DetectTime": "2024-05-21T12:37:22.621272+00:00", "EventTime": "2024-05-21T12:37:22.621293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgjMDd0GmzCMPblg7"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "3998b0c4-76a8-496c-ab21-73594337b2d4", "DetectTime": "2024-05-21T12:37:22.959945+00:00", "EventTime": "2024-05-21T12:37:22.959963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarrTS1RnoUJeXEbkg"], "accumulated_threat_level": 9.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "4b948513-342e-4a63-bd08-0839efbfee28", "DetectTime": "2024-05-21T12:37:23.407862+00:00", "EventTime": "2024-05-21T12:37:23.407881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.116.82"]}], "Attach": [{"Content": "Connection to unknown destination port 16974/UDP destination IP 178.89.116.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAxV52guYiGatYS8h"], "accumulated_threat_level": 10.4, "timewindow": 95} +{"Format": "IDEA0", "ID": "17b15308-105a-48a4-b58e-8ad1f61cbfcb", "DetectTime": "2024-05-21T12:37:23.563928+00:00", "EventTime": "2024-05-21T12:37:23.563947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.174.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67lsj4PvihmV3Fmck"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "02117ace-bf7e-40a6-b5e3-175b32c7a16a", "DetectTime": "2024-05-21T12:37:23.575022+00:00", "EventTime": "2024-05-21T12:37:23.575041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.174.206.51"]}], "Attach": [{"Content": "Connection to unknown destination port 13316/UDP destination IP 190.174.206.51. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFd5J166AfN7ctt7a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "9618279c-1788-400c-81f4-bc9673baf285", "DetectTime": "2024-05-21T12:37:23.641338+00:00", "EventTime": "2024-05-21T12:37:23.641357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.9.147.155"]}], "Attach": [{"Content": "Connection to unknown destination port 8157/UDP destination IP 58.9.147.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCjt02mz716r02bI2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 95} +{"Format": "Json", "ID": "9618279c-1788-400c-81f4-bc9673baf285", "DetectTime": "2024-05-21T12:37:23.641338+00:00", "EventTime": "2024-05-21T12:37:23.641357+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["58.9.147.155"]}], "Attach": [{"Content": "1970-01-04T22:10:41.339381+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2024/05/21 12:37:23.857794)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 95, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e5262c82-c87c-406c-a375-3a51d31cde00", "DetectTime": "2024-05-21T12:37:23.870898+00:00", "EventTime": "2024-05-21T12:37:23.870919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.205.178.217"]}], "Attach": [{"Content": "Connection to unknown destination port 15479/UDP destination IP 187.205.178.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRxtr19QjocibQVnc"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "5ff20fa5-6180-48d3-96fc-95c05c1db3fe", "DetectTime": "2024-05-21T12:37:23.885353+00:00", "EventTime": "2024-05-21T12:37:23.885371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwC1M521TkLiyyTrc6"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "e80ec6e8-ec93-4f0b-b578-2502c42acd25", "DetectTime": "2024-05-21T12:37:23.901085+00:00", "EventTime": "2024-05-21T12:37:23.901106+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwC1M521TkLiyyTrc6"], "accumulated_threat_level": 12.0, "timewindow": 25} +{"Format": "Json", "ID": "e80ec6e8-ec93-4f0b-b578-2502c42acd25", "DetectTime": "2024-05-21T12:37:23.901085+00:00", "EventTime": "2024-05-21T12:37:23.901106+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "1970-01-02T00:48:13.276686+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:37:24.214562)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "c11ddf72-8d9a-49b9-9680-0ebe44fa702a", "DetectTime": "2024-05-21T12:37:24.227989+00:00", "EventTime": "2024-05-21T12:37:24.228010+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWpWdXmkbLxSsKb7"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "a65234f4-d1fe-458d-8de1-f0b6f4af0ed0", "DetectTime": "2024-05-21T12:37:24.252695+00:00", "EventTime": "2024-05-21T12:37:24.252717+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWpWdXmkbLxSsKb7"], "accumulated_threat_level": 0.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "7f2a86f4-8b7f-41d4-a778-60d33b14b73a", "DetectTime": "2024-05-21T12:37:24.264437+00:00", "EventTime": "2024-05-21T12:37:24.264455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHmND1bc2MljLWcng"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "ea8b57ea-bf11-4679-b236-15904837349c", "DetectTime": "2024-05-21T12:37:24.276971+00:00", "EventTime": "2024-05-21T12:37:24.276990+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHmND1bc2MljLWcng"], "accumulated_threat_level": 1.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "2c75a82c-c52e-419a-b607-fe8ba9c5e5e9", "DetectTime": "2024-05-21T12:37:24.281747+00:00", "EventTime": "2024-05-21T12:37:24.281765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnkJcz3jJVxgeBsacd"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "48a733bb-73f9-411a-a01d-055519e2f72d", "DetectTime": "2024-05-21T12:37:24.293072+00:00", "EventTime": "2024-05-21T12:37:24.293090+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVK4T83190jlICdpHf"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "0d0df9a9-7227-4d41-9c11-a9fa3533ebe5", "DetectTime": "2024-05-21T12:37:24.304981+00:00", "EventTime": "2024-05-21T12:37:24.304999+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVK4T83190jlICdpHf"], "accumulated_threat_level": 1.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "a4be5495-0880-4d67-8b5b-c8586f3d44b1", "DetectTime": "2024-05-21T12:37:24.315624+00:00", "EventTime": "2024-05-21T12:37:24.315642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"]}], "Attach": [{"Content": "Connection to unknown destination port 6668/UDP destination IP 94.71.146.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jwk73J1pa95N2Buj"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "ba8507b1-dd99-4e34-aed6-a5e33c66460c", "DetectTime": "2024-05-21T12:37:24.326100+00:00", "EventTime": "2024-05-21T12:37:24.326119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILKn02RktFWRp9Csb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "23b09079-9f0d-4b8d-a246-0c28d3c8f32a", "DetectTime": "2024-05-21T12:37:24.337268+00:00", "EventTime": "2024-05-21T12:37:24.337285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbxZGL1NKV2GAXtFs4"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "b3ee2d23-2743-4414-a8c1-3be3ee436d13", "DetectTime": "2024-05-21T12:37:24.348882+00:00", "EventTime": "2024-05-21T12:37:24.348900+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbxZGL1NKV2GAXtFs4"], "accumulated_threat_level": 2.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "057c398c-54ec-4d70-ae69-a56bb3e50911", "DetectTime": "2024-05-21T12:37:24.361082+00:00", "EventTime": "2024-05-21T12:37:24.361100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfikqj5j4a9dxRaAi"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "5dd92559-ddfd-4cd9-9b35-a93a5b947f38", "DetectTime": "2024-05-21T12:37:24.775405+00:00", "EventTime": "2024-05-21T12:37:24.775426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVFWb4nh5DiVn45pl"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "78a549c1-fa47-4e7d-bb37-39dcea50d23a", "DetectTime": "2024-05-21T12:37:24.974700+00:00", "EventTime": "2024-05-21T12:37:24.974723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Xt6q2YPPl8UFsiU9"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "78243f16-a6c7-43a2-9ffa-2e4eb5c742e0", "DetectTime": "2024-05-21T12:37:25.195966+00:00", "EventTime": "2024-05-21T12:37:25.195989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WQOw4htILZeU0h93"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "a0d7ee16-336a-4dbf-9fa4-b876a4707eeb", "DetectTime": "2024-05-21T12:37:25.258857+00:00", "EventTime": "2024-05-21T12:37:25.258881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2OfhT20v0xcUInmd9"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "b725ed50-3091-4a6f-a0db-c10a8e127d13", "DetectTime": "2024-05-21T12:37:25.312564+00:00", "EventTime": "2024-05-21T12:37:25.312582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLfwnbLVNJdWBDUc"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "1cdc9f54-cd77-4592-afe7-58451ec1c575", "DetectTime": "2024-05-21T12:37:25.340639+00:00", "EventTime": "2024-05-21T12:37:25.340658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg6H9J3IDfpwVfHgug"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "4b4d8882-15bc-46fa-ab8d-f51b349efe77", "DetectTime": "2024-05-21T12:37:25.663581+00:00", "EventTime": "2024-05-21T12:37:25.663602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCiwF936kyiUTodGm5"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "aac7f983-25ee-4e1e-9bc7-14516e08860f", "DetectTime": "2024-05-21T12:37:25.728592+00:00", "EventTime": "2024-05-21T12:37:25.728615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmlK7JRe2KMuIrh"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "74ce1e96-92a6-45af-931b-bd5accd3d704", "DetectTime": "2024-05-21T12:37:26.030315+00:00", "EventTime": "2024-05-21T12:37:26.030338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COOz6m1I1x3auf11N1"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "7477b44d-fed2-4f26-af44-c535bbb9c56f", "DetectTime": "2024-05-21T12:37:26.035940+00:00", "EventTime": "2024-05-21T12:37:26.035960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWVu4w2vWZ58eelS7e"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "796919dd-0627-4c45-8cc0-532db5b58126", "DetectTime": "2024-05-21T12:37:26.040481+00:00", "EventTime": "2024-05-21T12:37:26.040499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Df4h3Oc7igUbLpX6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "97ae655d-3495-4a51-b3f2-ae1df9047380", "DetectTime": "2024-05-21T12:37:26.134739+00:00", "EventTime": "2024-05-21T12:37:26.134763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxV6QJqAJs0FMhqWa"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "fdb448ae-cba7-4e6b-857f-2f593d54e50f", "DetectTime": "2024-05-21T12:37:26.170714+00:00", "EventTime": "2024-05-21T12:37:26.170736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBS1E2aFp8gmO3aoe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "17f4679f-7a18-4070-8d9c-9c7e07ef4cd1", "DetectTime": "2024-05-21T12:37:26.288058+00:00", "EventTime": "2024-05-21T12:37:26.288078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwaSH14pg5PSq0kPKl"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "6012f993-5de2-43dd-89e4-d48f3a7b16a6", "DetectTime": "2024-05-21T12:37:26.332043+00:00", "EventTime": "2024-05-21T12:37:26.332061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCB29Q6CaCjjjHk3l"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "b77ace0c-80a3-44e0-acfa-c942e29a6c44", "DetectTime": "2024-05-21T12:37:26.456460+00:00", "EventTime": "2024-05-21T12:37:26.456483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKwTi29GXJpF0PPd8"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "09a95a62-6fa3-48f7-ba6f-4dd5a9603c69", "DetectTime": "2024-05-21T12:37:26.486539+00:00", "EventTime": "2024-05-21T12:37:26.486563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53kgc3bt9VynFHmFl"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "0157ce4e-e344-462a-b794-24ff0e19bddf", "DetectTime": "2024-05-21T12:37:26.534625+00:00", "EventTime": "2024-05-21T12:37:26.534647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKLg8ylZq8005v09"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "0a302272-e79b-4aab-9fc2-02c699d1a8b0", "DetectTime": "2024-05-21T12:37:26.549284+00:00", "EventTime": "2024-05-21T12:37:26.549304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbq5ZYO3Jvio4KbRe"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "58c9babf-2c46-488c-8d3f-1aeabb6fd338", "DetectTime": "2024-05-21T12:37:26.877878+00:00", "EventTime": "2024-05-21T12:37:26.877898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJes8VjVCsdBPF93j"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "8bf7eae9-dc4a-4b17-91d8-f2a2476a7978", "DetectTime": "2024-05-21T12:37:27.154583+00:00", "EventTime": "2024-05-21T12:37:27.154607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccrsfiz59saMkS0pd"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "bd4f0577-10f2-49b9-8010-3ae6ad2886d3", "DetectTime": "2024-05-21T12:37:27.159488+00:00", "EventTime": "2024-05-21T12:37:27.159508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoYcc4Kp00C8Bz414"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "919c2e9e-6311-412a-bda9-2eb066c7b7f9", "DetectTime": "2024-05-21T12:37:27.163974+00:00", "EventTime": "2024-05-21T12:37:27.163993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CexvWj1Sw6tZNX1Bef"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "717fcaa6-0723-40fa-8a5c-7c86e02b19b8", "DetectTime": "2024-05-21T12:37:27.264492+00:00", "EventTime": "2024-05-21T12:37:27.264516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMnpA7286eTbNRteE4"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "4f1a9798-17db-42a9-a015-a240378c090f", "DetectTime": "2024-05-21T12:37:27.320869+00:00", "EventTime": "2024-05-21T12:37:27.320888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuJUb4GNQlhtqf2s7"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "138fbd3d-7588-4054-b9c7-4536794733ac", "DetectTime": "2024-05-21T12:37:27.325566+00:00", "EventTime": "2024-05-21T12:37:27.325583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHVYAG2anAyAPiJeaf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "9b3232df-83f6-449f-bc21-28adc5ef6a69", "DetectTime": "2024-05-21T12:37:27.504863+00:00", "EventTime": "2024-05-21T12:37:27.504881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHAA4vVEmBX1r4q09"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "0557faf9-4212-4231-b09a-5590736c141e", "DetectTime": "2024-05-21T12:37:27.534893+00:00", "EventTime": "2024-05-21T12:37:27.534913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkWhtl7naLUCjeLg"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "886c1cdc-113e-4d90-80b7-79b24bc59c89", "DetectTime": "2024-05-21T12:37:27.575063+00:00", "EventTime": "2024-05-21T12:37:27.575084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoTuX1kHLoU7fXr03"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "6f49dc0b-0c48-4d55-a68a-ee43242a53e7", "DetectTime": "2024-05-21T12:37:27.611129+00:00", "EventTime": "2024-05-21T12:37:27.611148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGy5hmSOrtkGuqyc"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "55710c06-3e4b-40ec-beef-63590bc654a6", "DetectTime": "2024-05-21T12:37:27.649453+00:00", "EventTime": "2024-05-21T12:37:27.649474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq0ts46OMIo9M0Ll3"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "fe1a3b2f-43c9-4cd2-b7dc-4c8bfd415e68", "DetectTime": "2024-05-21T12:37:27.691290+00:00", "EventTime": "2024-05-21T12:37:27.691311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtkZWQ3tZ5Iqj6ZMKk"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "93212594-be6e-4ec9-9e46-691ff9e41740", "DetectTime": "2024-05-21T12:37:28.065523+00:00", "EventTime": "2024-05-21T12:37:28.065545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjwNz2rLH6aU8PHbh", "CkMBlR3WVpRmtccE49", "CioeqC3j6IlNyyCcXa", "CvZ82r1H3v9Jshgzs5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "7120a0e0-88a3-46b8-96af-6955e47c99d4", "DetectTime": "2024-05-21T12:37:28.200161+00:00", "EventTime": "2024-05-21T12:37:28.200184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVCJV2W3kHR1Dsoo2"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "532cb450-0216-4cc8-816f-f3acd42ac522", "DetectTime": "2024-05-21T12:37:28.230077+00:00", "EventTime": "2024-05-21T12:37:28.230095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLSwbA2NVgqkj10NDf"], "accumulated_threat_level": 11.700000000000001, "timewindow": 94} +{"Format": "IDEA0", "ID": "923a46d5-1600-4668-bbce-25d7227668e7", "DetectTime": "2024-05-21T12:37:28.272350+00:00", "EventTime": "2024-05-21T12:37:28.272372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9xdnW3Cht7n8b3xzk"], "accumulated_threat_level": 8.5, "timewindow": 95} +{"Format": "IDEA0", "ID": "9d9ef0fb-9443-4514-9f2d-3454e1f85f38", "DetectTime": "2024-05-21T12:37:28.309806+00:00", "EventTime": "2024-05-21T12:37:28.309827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NIdu3ktCdgU4Kwk5"], "accumulated_threat_level": 9.3, "timewindow": 95} +{"Format": "IDEA0", "ID": "27a1743b-7537-48d7-a2db-e91c6007d874", "DetectTime": "2024-05-21T12:37:28.349225+00:00", "EventTime": "2024-05-21T12:37:28.349244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COyxR93iA3tYb0B6mg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "8d00c256-32a7-499f-a1cc-3c71b390a5d8", "DetectTime": "2024-05-21T12:37:28.400649+00:00", "EventTime": "2024-05-21T12:37:28.400672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviUG539sijf54tuv2"], "accumulated_threat_level": 10.900000000000002, "timewindow": 95} +{"Format": "IDEA0", "ID": "1e4ddef6-3d5f-4d94-b368-5ceaa80a3232", "DetectTime": "2024-05-21T12:37:28.452994+00:00", "EventTime": "2024-05-21T12:37:28.453014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbrKa4JQ6S2vroWy4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 95} +{"Format": "IDEA0", "ID": "858fded3-a496-4a4e-9997-904556e30dc7", "DetectTime": "2024-05-21T12:37:28.688094+00:00", "EventTime": "2024-05-21T12:37:28.688116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA3d5d4dEd8OG78OAl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 95} +{"Format": "Json", "ID": "858fded3-a496-4a4e-9997-904556e30dc7", "DetectTime": "2024-05-21T12:37:28.688094+00:00", "EventTime": "2024-05-21T12:37:28.688116+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "1970-01-04T22:43:53.408945+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2024/05/21 12:37:28.971648)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 95, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "5c5cbba1-b5a5-4511-b0c2-b600f6ce8bcd", "DetectTime": "2024-05-21T12:37:29.325538+00:00", "EventTime": "2024-05-21T12:37:29.325573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2JGXv4XB3QDMX4vfd"], "accumulated_threat_level": 0, "timewindow": 95} +{"Format": "IDEA0", "ID": "db788a49-98d0-48ce-97c5-72f80b2b449f", "DetectTime": "2024-05-21T12:37:29.359152+00:00", "EventTime": "2024-05-21T12:37:29.359174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrFFsg9cP3WDHQIi"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "33c7fde3-1797-4178-b50b-5147b10ba62a", "DetectTime": "2024-05-21T12:37:29.388088+00:00", "EventTime": "2024-05-21T12:37:29.388110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.208.40.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgCYg4Q51dwFaIfq5"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "9992784a-1231-4b5b-b2ce-4e9d67fcb279", "DetectTime": "2024-05-21T12:37:29.661365+00:00", "EventTime": "2024-05-21T12:37:29.661385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkerUp4R5bPc1mUzyc"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "a1ce98c7-df13-4b9d-92a4-5e47bddcd871", "DetectTime": "2024-05-21T12:37:29.681747+00:00", "EventTime": "2024-05-21T12:37:29.681767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNhjM3XRFgZ9s0XZ8"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "538d194f-3d1d-47c9-88f4-4ffa120a4bcc", "DetectTime": "2024-05-21T12:37:29.946842+00:00", "EventTime": "2024-05-21T12:37:29.946863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.110.142.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzwNBUNJ5n2z2OC"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "f66e9cde-0490-44c8-8be9-44cbc2acab81", "DetectTime": "2024-05-21T12:37:29.954630+00:00", "EventTime": "2024-05-21T12:37:29.954650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crgcjo4vhK1KOAf6gg"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "5abc6816-8cf6-44d0-a943-fc0d111a7169", "DetectTime": "2024-05-21T12:37:30.013036+00:00", "EventTime": "2024-05-21T12:37:30.013060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a7eappD2blsOyvk"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "d62eae4e-586f-4d43-a5c7-9be6a7aafb6d", "DetectTime": "2024-05-21T12:37:30.025131+00:00", "EventTime": "2024-05-21T12:37:30.025152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGwyZA32z5sRSDI1oi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "ec2f6b8d-6533-4788-ab06-1442d5d862fd", "DetectTime": "2024-05-21T12:37:30.088647+00:00", "EventTime": "2024-05-21T12:37:30.088666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwESV1qrNPcwG1dHe"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "ffe29bf3-e2eb-4a2a-9641-941b293e9e0b", "DetectTime": "2024-05-21T12:37:30.386312+00:00", "EventTime": "2024-05-21T12:37:30.386333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55VTc141cqofTu7S5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "1fb46874-ccb9-41af-945d-a547a9033c65", "DetectTime": "2024-05-21T12:37:30.480080+00:00", "EventTime": "2024-05-21T12:37:30.480101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YlRk3JPhYOD2UzC3"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "9e119462-c7bf-4a86-83af-98c8ff628ccc", "DetectTime": "2024-05-21T12:37:30.599842+00:00", "EventTime": "2024-05-21T12:37:30.599866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbruiM1xGKU9fnAmN2"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "d6965953-3500-40d6-989a-ad0ddd199db1", "DetectTime": "2024-05-21T12:37:30.845550+00:00", "EventTime": "2024-05-21T12:37:30.845569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZDZPUXdawyBRfYvc"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "80d4e44c-415a-4f49-b53d-5e7972d26d25", "DetectTime": "2024-05-21T12:37:30.879741+00:00", "EventTime": "2024-05-21T12:37:30.879763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.169.112"]}], "Attach": [{"Content": "Connection to unknown destination port 4102/UDP destination IP 176.73.169.112. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgynNu2qFnqIqJbynh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "e063a854-9ae4-45cf-84a8-a43216b00e14", "DetectTime": "2024-05-21T12:37:30.918034+00:00", "EventTime": "2024-05-21T12:37:30.918053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNK7Of4UnDn59Aqg8d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "f127f368-26a4-4a6e-9e43-f1fb336c9a7e", "DetectTime": "2024-05-21T12:37:30.964780+00:00", "EventTime": "2024-05-21T12:37:30.964799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM9QJw4dTPO09wMCel"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "209983d9-6cbe-4259-9c86-711ccc7e0c6f", "DetectTime": "2024-05-21T12:37:31.074235+00:00", "EventTime": "2024-05-21T12:37:31.074255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmvdez38QF4qLIy15f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "431a6d9f-dfd1-40f6-97c0-bda4c2722bbf", "DetectTime": "2024-05-21T12:37:31.270317+00:00", "EventTime": "2024-05-21T12:37:31.270336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGBE7tt3JCqYfxX4"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "691c6800-af25-4126-8bb9-799aa7d24977", "DetectTime": "2024-05-21T12:37:31.284095+00:00", "EventTime": "2024-05-21T12:37:31.284115+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGBE7tt3JCqYfxX4"], "accumulated_threat_level": 2.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "cfd7f1ea-a39a-4d0b-9bbc-fa1686fa595b", "DetectTime": "2024-05-21T12:37:31.340747+00:00", "EventTime": "2024-05-21T12:37:31.340767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNzg13B9pq9DhSO1l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "c21017aa-79f8-4e52-b114-62d03a35c036", "DetectTime": "2024-05-21T12:37:31.394443+00:00", "EventTime": "2024-05-21T12:37:31.394464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR7ei1zM6QE4lB65f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "747184dd-36db-41fe-b55d-24403a0f2b71", "DetectTime": "2024-05-21T12:37:31.448501+00:00", "EventTime": "2024-05-21T12:37:31.448520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3PMICDe00OGY5Ch"], "accumulated_threat_level": 9.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "f531a209-4a21-4ddc-9449-862e207b50d4", "DetectTime": "2024-05-21T12:37:31.503237+00:00", "EventTime": "2024-05-21T12:37:31.503258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVc8HAGxGxh48ftb3"], "accumulated_threat_level": 10.4, "timewindow": 95} +{"Format": "IDEA0", "ID": "020d6fcc-6c42-47ed-99e2-d732b913ac46", "DetectTime": "2024-05-21T12:37:31.546443+00:00", "EventTime": "2024-05-21T12:37:31.546465+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyuaO03OOY8rbtsULe"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "58f90ff4-3159-425e-aca3-6d6c4fcd234b", "DetectTime": "2024-05-21T12:37:31.561101+00:00", "EventTime": "2024-05-21T12:37:31.561121+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyuaO03OOY8rbtsULe"], "accumulated_threat_level": 3.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "ce78068e-667c-4119-87f5-f21ca9eed5c1", "DetectTime": "2024-05-21T12:37:31.572809+00:00", "EventTime": "2024-05-21T12:37:31.572828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.8.121.25"]}], "Attach": [{"Content": "Connection to unknown destination port 4727/UDP destination IP 99.8.121.25. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbmnB1lg3EWs9dAf1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "18d2c24b-73ce-4f3f-8fed-6d5faa5e162c", "DetectTime": "2024-05-21T12:37:31.586261+00:00", "EventTime": "2024-05-21T12:37:31.586280+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5WeU39shezvZZMNa"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "00220369-540b-4e67-83bd-b7940caccd37", "DetectTime": "2024-05-21T12:37:31.600160+00:00", "EventTime": "2024-05-21T12:37:31.600182+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj5WeU39shezvZZMNa"], "accumulated_threat_level": 3.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "0234d836-54c5-4b58-9203-f3c525972d1c", "DetectTime": "2024-05-21T12:37:31.621064+00:00", "EventTime": "2024-05-21T12:37:31.621081+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauT9W2ElXJ4tQPf6i"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "2f374bc4-467c-4dbe-81aa-d0d1e13be7a4", "DetectTime": "2024-05-21T12:37:31.632212+00:00", "EventTime": "2024-05-21T12:37:31.632230+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauT9W2ElXJ4tQPf6i"], "accumulated_threat_level": 4.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "1c758e94-a494-4d7e-9c46-7323189414ad", "DetectTime": "2024-05-21T12:37:31.653736+00:00", "EventTime": "2024-05-21T12:37:31.653754+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCBuM3Y8cdM6ce4d8"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "9bdb5149-e89e-4311-857f-2b01022b08dc", "DetectTime": "2024-05-21T12:37:31.666244+00:00", "EventTime": "2024-05-21T12:37:31.666263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyCBuM3Y8cdM6ce4d8"], "accumulated_threat_level": 4.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "3f76f196-a5fa-4cdf-a98b-35bf8fecdc82", "DetectTime": "2024-05-21T12:37:31.692230+00:00", "EventTime": "2024-05-21T12:37:31.692247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbya22nAMmzv4o4Rd"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "2fe7e11e-b29a-4c47-9edb-7283b92b78a4", "DetectTime": "2024-05-21T12:37:31.705939+00:00", "EventTime": "2024-05-21T12:37:31.705962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbya22nAMmzv4o4Rd"], "accumulated_threat_level": 5.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "0bc21cff-ef5c-426b-9e1f-cb0b83c1325b", "DetectTime": "2024-05-21T12:37:31.779539+00:00", "EventTime": "2024-05-21T12:37:31.779556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKjuZ1fsBvLMiEhu1"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "6625518d-d8b8-4027-9e0a-fcac43a9277f", "DetectTime": "2024-05-21T12:37:31.790930+00:00", "EventTime": "2024-05-21T12:37:31.790948+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKjuZ1fsBvLMiEhu1"], "accumulated_threat_level": 5.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "ad5736dd-a7bf-4667-bc96-1527b059e586", "DetectTime": "2024-05-21T12:37:31.815239+00:00", "EventTime": "2024-05-21T12:37:31.815262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf4W71C9NPi3HB66j"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "f3b041f8-8078-425c-9cde-179f47665a6c", "DetectTime": "2024-05-21T12:37:31.829506+00:00", "EventTime": "2024-05-21T12:37:31.829529+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf4W71C9NPi3HB66j"], "accumulated_threat_level": 6.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "26f8faa0-00dc-4c78-badb-9714cc69109e", "DetectTime": "2024-05-21T12:37:31.835454+00:00", "EventTime": "2024-05-21T12:37:31.835472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyPAec4FxyqLe3m0Mj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "a0804df4-e323-4783-8600-ca5d9928ab72", "DetectTime": "2024-05-21T12:37:31.851225+00:00", "EventTime": "2024-05-21T12:37:31.851243+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVthv3uFnyCqcqomh"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "eb9c2c69-24c9-4a47-b097-d27b1dc98e21", "DetectTime": "2024-05-21T12:37:31.863103+00:00", "EventTime": "2024-05-21T12:37:31.863122+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVthv3uFnyCqcqomh"], "accumulated_threat_level": 6.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "fcf9b7e7-2db2-443c-ab35-c9955f4af993", "DetectTime": "2024-05-21T12:37:31.996294+00:00", "EventTime": "2024-05-21T12:37:31.996315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6NAV2kQ6uNwE3yl3", "CpyGE42cmb5vJptH04", "CZrL9P2aoFkwsnYwBi", "CjplJzLvVNe5i8pNc"], "accumulated_threat_level": 11.700000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "c679d933-3c31-4c4d-8158-4858901e9f9a", "DetectTime": "2024-05-21T12:37:32.082104+00:00", "EventTime": "2024-05-21T12:37:32.082126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKJqakslClYmq874"], "accumulated_threat_level": 11.700000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "03662e89-52e8-49a3-9f4c-7db1ab3d4e16", "DetectTime": "2024-05-21T12:37:32.146286+00:00", "EventTime": "2024-05-21T12:37:32.146319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVQKu1j8kLyZw5aAi"], "accumulated_threat_level": 12.500000000000002, "timewindow": 95} +{"Format": "Json", "ID": "03662e89-52e8-49a3-9f4c-7db1ab3d4e16", "DetectTime": "2024-05-21T12:37:32.146286+00:00", "EventTime": "2024-05-21T12:37:32.146319+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "1970-01-04T22:45:12.937021+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2024/05/21 12:37:32.461959)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 95, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "06704447-a485-4bb4-bb84-6563a99a0e0a", "DetectTime": "2024-05-21T12:37:32.466647+00:00", "EventTime": "2024-05-21T12:37:32.466665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4XDR11kia05tXRj3"], "accumulated_threat_level": 0, "timewindow": 95} +{"Format": "IDEA0", "ID": "075e5146-4302-45d0-9e7c-ed4365ca9fe0", "DetectTime": "2024-05-21T12:37:32.479663+00:00", "EventTime": "2024-05-21T12:37:32.479681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.17.106"]}], "Attach": [{"Content": "Connection to unknown destination port 4403/UDP destination IP 186.95.17.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxmDHgdpR6NrrkzL4"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "6bd38597-dec6-48d5-adbd-82fddc61ecd0", "DetectTime": "2024-05-21T12:37:32.484576+00:00", "EventTime": "2024-05-21T12:37:32.484602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAgyer1kZn2CrKDxAi"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "0c49fb22-a770-4f62-b103-bed05ed6036d", "DetectTime": "2024-05-21T12:37:32.490137+00:00", "EventTime": "2024-05-21T12:37:32.490158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05slg15ltjmwHs8id"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "82e1a67a-0875-45a8-9bbb-3bf5a40f6b77", "DetectTime": "2024-05-21T12:37:32.503897+00:00", "EventTime": "2024-05-21T12:37:32.503915+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.27.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKQ251tWCJmu4YVt4"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "e09803e6-2666-4074-b6ff-50058852b5d2", "DetectTime": "2024-05-21T12:37:32.515616+00:00", "EventTime": "2024-05-21T12:37:32.515635+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.27.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKQ251tWCJmu4YVt4"], "accumulated_threat_level": 7.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "439b0bf9-345b-475c-b6f5-451ad8eaedcf", "DetectTime": "2024-05-21T12:37:32.520390+00:00", "EventTime": "2024-05-21T12:37:32.520409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61t1WPoAbL6QRtgd"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "ef4de50d-c8b9-477f-966a-03c21d0a5169", "DetectTime": "2024-05-21T12:37:32.531477+00:00", "EventTime": "2024-05-21T12:37:32.531497+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.92.75.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAltdgH1M3lRYQiy8"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "f018edbf-2f37-41d3-ba05-44a7ed7da585", "DetectTime": "2024-05-21T12:37:32.543925+00:00", "EventTime": "2024-05-21T12:37:32.543947+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.92.75.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAltdgH1M3lRYQiy8"], "accumulated_threat_level": 7.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "a4fb06f6-5376-4f7c-80a9-e6d022584140", "DetectTime": "2024-05-21T12:37:32.549181+00:00", "EventTime": "2024-05-21T12:37:32.549202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kFbGisOT9BXxyX1"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "d42c315b-a787-4bfc-ab20-1ade4e6fbb38", "DetectTime": "2024-05-21T12:37:32.554026+00:00", "EventTime": "2024-05-21T12:37:32.554044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3ES9PtO72UxgXZ1"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "96be4667-807f-434e-a86b-08dc89391f27", "DetectTime": "2024-05-21T12:37:32.558638+00:00", "EventTime": "2024-05-21T12:37:32.558656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpkqfc2WZDsv1lBcx2"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "8b84d185-843a-46e9-af09-af0fe45bfe4b", "DetectTime": "2024-05-21T12:37:32.569531+00:00", "EventTime": "2024-05-21T12:37:32.569550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUceQf15wL2fFCX232"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "1061f80e-d1c5-4e4e-8f34-ae8fb3b4268f", "DetectTime": "2024-05-21T12:37:32.825758+00:00", "EventTime": "2024-05-21T12:37:32.825780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc54h122sI2t22Nrsg"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "95e545da-d7db-40f4-9561-d443dd6867ca", "DetectTime": "2024-05-21T12:37:32.830889+00:00", "EventTime": "2024-05-21T12:37:32.830908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRvZK1juhFbIJzGli"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "0e452f09-b88f-44b4-93c4-8472917ae46b", "DetectTime": "2024-05-21T12:37:32.889476+00:00", "EventTime": "2024-05-21T12:37:32.889500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR3m6uLSVEM7jcYs1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "7ed685f3-82cf-4141-83a3-9c91cfe97d60", "DetectTime": "2024-05-21T12:37:32.923021+00:00", "EventTime": "2024-05-21T12:37:32.923042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOMky2uhqCcJGSCYe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "e4feb8be-b710-434d-bb18-9984fb8729e1", "DetectTime": "2024-05-21T12:37:32.928325+00:00", "EventTime": "2024-05-21T12:37:32.928345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIEYsvVeg8E8JDY9c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "5cfefb6d-0015-4b67-9f39-dd425c1af62e", "DetectTime": "2024-05-21T12:37:32.990436+00:00", "EventTime": "2024-05-21T12:37:32.990454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGF4YI3Pul2SYV4NMh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "2b5840e5-af90-4e0c-aa3e-2c7670c1d398", "DetectTime": "2024-05-21T12:37:33.036256+00:00", "EventTime": "2024-05-21T12:37:33.036275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlM894W9m6Widrb8j"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "b5949f86-a093-4328-a577-83d9542290d8", "DetectTime": "2024-05-21T12:37:33.040919+00:00", "EventTime": "2024-05-21T12:37:33.040938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sbZo2olD5rifEHjc"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "37299c94-35d6-46a6-98b8-9858392fe112", "DetectTime": "2024-05-21T12:37:33.093222+00:00", "EventTime": "2024-05-21T12:37:33.093242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO59e22RwI8hZBWKK5"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "ebdcd91a-b376-4829-97b9-858987513aae", "DetectTime": "2024-05-21T12:37:33.139271+00:00", "EventTime": "2024-05-21T12:37:33.139296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDwrFI2QjnWeMyJMSi"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "0a0f4250-945c-46f7-a9ef-b1ae15fdaa82", "DetectTime": "2024-05-21T12:37:33.144993+00:00", "EventTime": "2024-05-21T12:37:33.145012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.237.226.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQ8QfbEM2KSjqoK7"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "849581f8-fb45-44b1-9284-aaaa42ceb104", "DetectTime": "2024-05-21T12:37:33.215408+00:00", "EventTime": "2024-05-21T12:37:33.215428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 4507/UDP destination IP 84.151.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXbopB2yk4jgZgB8p9"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ae8187a6-0833-42dd-8990-26090fbe043f", "DetectTime": "2024-05-21T12:37:33.220354+00:00", "EventTime": "2024-05-21T12:37:33.220373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.8.121.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfCp815mtFiHdPCUe"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "f984669a-b010-4d42-b4a8-a6c1feaa0e63", "DetectTime": "2024-05-21T12:37:33.435195+00:00", "EventTime": "2024-05-21T12:37:33.435216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.91.64.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cozdxz2MkJcipTdXue"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "1648d07c-5622-4665-9afb-9efbed19b016", "DetectTime": "2024-05-21T12:37:33.514895+00:00", "EventTime": "2024-05-21T12:37:33.514916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoLCIUhCIARS6m8h"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "da1ff9bb-cfe9-46fd-a998-3d5e9c0bdfc5", "DetectTime": "2024-05-21T12:37:33.519982+00:00", "EventTime": "2024-05-21T12:37:33.520002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.6.169.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9InGL3d8N36qSRH57"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ee27fc56-4903-4fd0-b366-604cdc5473f0", "DetectTime": "2024-05-21T12:37:33.525905+00:00", "EventTime": "2024-05-21T12:37:33.525923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.53.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg9qvNMkSW9y8TC5f"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "9a79f7eb-d8c7-4b4a-8079-2397b6c9a2c8", "DetectTime": "2024-05-21T12:37:33.534433+00:00", "EventTime": "2024-05-21T12:37:33.534456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.112.55.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkigO3iEHVAVPmbUf"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ded12bcc-109f-4518-9534-2107ad92a063", "DetectTime": "2024-05-21T12:37:33.567732+00:00", "EventTime": "2024-05-21T12:37:33.567754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.134.200.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcXsvgZIeSS2glm6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "21432051-44d9-4194-8e9c-d3c5d4d793a1", "DetectTime": "2024-05-21T12:37:33.577840+00:00", "EventTime": "2024-05-21T12:37:33.577861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.13.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVZLVO108B4JMQL3gk"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "c26e988d-25af-4a35-a39f-767e4c2a3110", "DetectTime": "2024-05-21T12:37:33.605080+00:00", "EventTime": "2024-05-21T12:37:33.605101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.235.62.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLAIVP24ccNaTMc8I2"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "13d36879-5bb9-4e26-ba5c-19b0d11eb72b", "DetectTime": "2024-05-21T12:37:33.804745+00:00", "EventTime": "2024-05-21T12:37:33.804766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.17.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWoPJD2UZiycNDyWX9"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4ab1cd06-15b1-4408-b842-a483be09c873", "DetectTime": "2024-05-21T12:37:33.823289+00:00", "EventTime": "2024-05-21T12:37:33.823309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv86cKSREnL11mHr6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "26524de1-98a5-4d49-8441-f03de015bd40", "DetectTime": "2024-05-21T12:37:33.828217+00:00", "EventTime": "2024-05-21T12:37:33.828236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.223.117.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cau9Rs4Et4HORkDrOd"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "a9af96dd-0559-4428-b5e1-eee9797730e0", "DetectTime": "2024-05-21T12:37:33.834966+00:00", "EventTime": "2024-05-21T12:37:33.834989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.151.145.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqJJtN3MFJWiVsv9Xc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "3f27d76e-ee23-4558-b9fe-7896e8233f93", "DetectTime": "2024-05-21T12:37:33.840787+00:00", "EventTime": "2024-05-21T12:37:33.840809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.242.160.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NVff24v51bCBIAc7"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "89549eda-d45a-494b-a485-4f20b50eda33", "DetectTime": "2024-05-21T12:37:33.847826+00:00", "EventTime": "2024-05-21T12:37:33.847847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.21.140.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWLxockdoLS9HgB1"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "7d88c830-b52a-4ef0-9621-eb8d52ecffcf", "DetectTime": "2024-05-21T12:37:33.852733+00:00", "EventTime": "2024-05-21T12:37:33.852754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.240.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVM7EITniOoPLGdZd"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "13ace34f-b1ab-4c1f-be7e-fcd7c671e70c", "DetectTime": "2024-05-21T12:37:33.887954+00:00", "EventTime": "2024-05-21T12:37:33.887975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQmRz3ArpQeTg8HI3"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "485a8e8e-9772-4ecd-80fc-1604c5e07827", "DetectTime": "2024-05-21T12:37:34.282326+00:00", "EventTime": "2024-05-21T12:37:34.282347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.9.107.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4h7Dv1IRrqUQcjyuj"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "8e4a7cce-a1dc-4e81-a0f2-c4fa87e0a484", "DetectTime": "2024-05-21T12:37:34.304331+00:00", "EventTime": "2024-05-21T12:37:34.304353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8vA73R5eFEgGkY77"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "e4cfb964-7fba-4c68-816e-e033abc58663", "DetectTime": "2024-05-21T12:37:34.309430+00:00", "EventTime": "2024-05-21T12:37:34.309450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.174.119.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAW444UN5Uo9e1vGk"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4664a51d-1b24-4dbe-9847-1a453f07fb99", "DetectTime": "2024-05-21T12:37:34.314204+00:00", "EventTime": "2024-05-21T12:37:34.314223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.75.48.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQG4zj4hC8KO3iRkp2"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0e89ccb9-4977-498d-8c5c-6bfe0ea91b08", "DetectTime": "2024-05-21T12:37:34.346008+00:00", "EventTime": "2024-05-21T12:37:34.346031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C201Oe5i7nZChNwFk"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "6b0f7bbc-a27e-47e0-8a98-cd1374ab6f1c", "DetectTime": "2024-05-21T12:37:34.765964+00:00", "EventTime": "2024-05-21T12:37:34.765986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.178.208.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccymua22dVyJmsd7t4"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "41a553bd-4fcb-4c0c-bd7f-9707af5f808f", "DetectTime": "2024-05-21T12:37:34.784504+00:00", "EventTime": "2024-05-21T12:37:34.784524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.67.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtrHwa2z0GeKrnhII9"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "69b4de3e-e6fa-461d-841f-ceb4b7d2adbf", "DetectTime": "2024-05-21T12:37:34.803361+00:00", "EventTime": "2024-05-21T12:37:34.803382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.151.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnx8C2qnacJkKxZU9"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "7ee765d4-b82e-45cb-b08e-bbc27ed3fda2", "DetectTime": "2024-05-21T12:37:34.871508+00:00", "EventTime": "2024-05-21T12:37:34.871531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.128.198.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZINuO10q0skrWCxS8"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "db1f69e9-be3e-4005-a116-ddc4030df06c", "DetectTime": "2024-05-21T12:37:34.879851+00:00", "EventTime": "2024-05-21T12:37:34.879874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.86.45.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzWm8MSxm9TweN6l"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "95cc1d6a-ca39-442c-af2f-0cd5f84e1c3e", "DetectTime": "2024-05-21T12:37:34.887956+00:00", "EventTime": "2024-05-21T12:37:34.887977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.174.80.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64ZhD1jdFolqgC3Xi"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "478be2f1-0d7c-4cff-8b15-c42eb9b65ed4", "DetectTime": "2024-05-21T12:37:34.897931+00:00", "EventTime": "2024-05-21T12:37:34.897952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeD8yV32wrNzCGeP2e"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "1e884d56-1c5b-4d1f-b14b-d85db7645f66", "DetectTime": "2024-05-21T12:37:34.909918+00:00", "EventTime": "2024-05-21T12:37:34.909939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.115.63.192 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLwqf3tTEqKeUJWSh"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "d9c4447d-b261-4c1e-b6c4-94f1e22f2bad", "DetectTime": "2024-05-21T12:37:34.915242+00:00", "EventTime": "2024-05-21T12:37:34.915262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.3.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIQHyL3mWOdXnrfp4e"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "3742819c-97f0-416f-80b9-63ebbe4478ba", "DetectTime": "2024-05-21T12:37:34.931416+00:00", "EventTime": "2024-05-21T12:37:34.931439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.14.30.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5KqSv2WX5oOObmHg5"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "2f92fa2a-9172-47e2-b66b-12f3462d5193", "DetectTime": "2024-05-21T12:37:34.937918+00:00", "EventTime": "2024-05-21T12:37:34.937937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 177.206.32.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0LP63gacziqYMyYj"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "045b915a-5124-4167-80c6-2e2da73e56f9", "DetectTime": "2024-05-21T12:37:35.412738+00:00", "EventTime": "2024-05-21T12:37:35.412760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.220.195.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwjwG1Vxr49cJpDGh"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "73403f0e-2481-4afb-b506-1332a0c08ddd", "DetectTime": "2024-05-21T12:37:35.478375+00:00", "EventTime": "2024-05-21T12:37:35.478398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.118.81.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBV171qhd81kbixT"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "0f3864b6-9d59-476c-b5d6-7d8f55ce16d4", "DetectTime": "2024-05-21T12:37:35.533039+00:00", "EventTime": "2024-05-21T12:37:35.533059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.37.182.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj2DLm6TDXj47LMZe"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "fe7dbb89-c22e-434b-b43a-9e6f270113c9", "DetectTime": "2024-05-21T12:37:35.538542+00:00", "EventTime": "2024-05-21T12:37:35.538563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.217.224.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhlFL2CKqYcRqHa1e"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "2cdd8834-7c54-4af8-ac99-237d4c2a3511", "DetectTime": "2024-05-21T12:37:35.543950+00:00", "EventTime": "2024-05-21T12:37:35.543971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.237.68.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTE3Y1Ac2mstjBB5d"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "3af48dfd-c1f4-40d1-acf5-39d1c0ebe192", "DetectTime": "2024-05-21T12:37:35.549305+00:00", "EventTime": "2024-05-21T12:37:35.549325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.97.42.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW1qNm3oONXL2EHNbi"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "630fb965-9e92-48d1-8204-0c50588acfe6", "DetectTime": "2024-05-21T12:37:35.832575+00:00", "EventTime": "2024-05-21T12:37:35.832600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.25.116.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJscXi8XomqnfwSJ6"], "accumulated_threat_level": 4.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "b164e427-da2c-4932-84b5-ac6565c16b53", "DetectTime": "2024-05-21T12:37:35.979114+00:00", "EventTime": "2024-05-21T12:37:35.979134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciaa3j1iJ8secHRqJi"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "280e7cc7-e87b-4c43-891c-2efcc6b37e3d", "DetectTime": "2024-05-21T12:37:35.984865+00:00", "EventTime": "2024-05-21T12:37:35.984887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.7.208.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZL8MZ10oNWEFZWMTi"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "d71f3f44-07a8-4787-8b02-ff4f74da61f2", "DetectTime": "2024-05-21T12:37:35.989788+00:00", "EventTime": "2024-05-21T12:37:35.989807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBFXlw2lVgBccddw0c"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "6e00d279-cd1e-4d53-948b-97e1f1dbacf5", "DetectTime": "2024-05-21T12:37:35.994893+00:00", "EventTime": "2024-05-21T12:37:35.994910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.243.239.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEGDn4iUOooTEYToe"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "60b12fa1-1928-4ac8-9ca0-508ab3985318", "DetectTime": "2024-05-21T12:37:35.999250+00:00", "EventTime": "2024-05-21T12:37:35.999268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.183.131.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3nj64juac902XOL6"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "3338ba0d-4dfa-4063-80bd-018c9619c99e", "DetectTime": "2024-05-21T12:37:36.003712+00:00", "EventTime": "2024-05-21T12:37:36.003731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.88.11.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoIZR28p2j2n4kO2d"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "176f96f9-f510-41dd-a42a-4ecd785a6492", "DetectTime": "2024-05-21T12:37:36.402161+00:00", "EventTime": "2024-05-21T12:37:36.402186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkKKB4FmIw4uReJd5"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "f6aca754-8a5f-49ce-898f-ac64f6cb0552", "DetectTime": "2024-05-21T12:37:36.488738+00:00", "EventTime": "2024-05-21T12:37:36.488758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzqvP2P2j1cIiDPJd"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "a7f83262-e173-4a8e-a7b7-234910e57344", "DetectTime": "2024-05-21T12:37:36.493942+00:00", "EventTime": "2024-05-21T12:37:36.493961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.28.204.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu5LDU1uEySvmv2xU2"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "010a404b-649c-4a83-8082-47f71750c6c6", "DetectTime": "2024-05-21T12:37:36.500316+00:00", "EventTime": "2024-05-21T12:37:36.500341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.130.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbRHxz3giD0fl5YlT2"], "accumulated_threat_level": 5.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "883a598b-552b-4003-8ad9-9bda844d7f3f", "DetectTime": "2024-05-21T12:37:36.582847+00:00", "EventTime": "2024-05-21T12:37:36.582867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzWSW2JifO2CASrng"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "fac793f2-c292-4b4b-b794-f9d1e411f000", "DetectTime": "2024-05-21T12:37:36.612107+00:00", "EventTime": "2024-05-21T12:37:36.612129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.105.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIHYQ2GKZOTSEzlW7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 95} +{"Format": "IDEA0", "ID": "03f327cc-0489-4d8a-ba2b-b43b71981d7f", "DetectTime": "2024-05-21T12:37:36.656379+00:00", "EventTime": "2024-05-21T12:37:36.656398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMiOY62CjiyQgZFefi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "ca970c59-a7b9-48b1-aff0-6cc2e5587fb4", "DetectTime": "2024-05-21T12:37:36.672785+00:00", "EventTime": "2024-05-21T12:37:36.672807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.90.55.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWbJEm2OI86HOtT952"], "accumulated_threat_level": 7.199999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "04595ca4-2535-486d-8cc7-5efe53ff37cf", "DetectTime": "2024-05-21T12:37:36.728576+00:00", "EventTime": "2024-05-21T12:37:36.728595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.105.225"]}], "Attach": [{"Content": "Connection to unknown destination port 1007/UDP destination IP 190.56.105.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9CebXhCAJkedKTNg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "b88d4228-6dea-445f-b48c-ff06fa2e9894", "DetectTime": "2024-05-21T12:37:36.752902+00:00", "EventTime": "2024-05-21T12:37:36.752921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.231.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvcJXR2aFdSyBFlV3g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "815e4ecc-167c-46d9-86a7-332c7e64a34d", "DetectTime": "2024-05-21T12:37:36.796364+00:00", "EventTime": "2024-05-21T12:37:36.796383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZoz7G3ryDF8FVLRn2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 95} +{"Format": "IDEA0", "ID": "c1a3de86-cf12-451e-9004-ec8031c413ab", "DetectTime": "2024-05-21T12:37:36.854785+00:00", "EventTime": "2024-05-21T12:37:36.854807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpaU8b2YMIddEpOxTa", "CKVTvy35gTD2h6Tqd", "C4Nxyc4RMUk9ciqgJ1", "C0Xfci1LvQlb4HSmy2"], "accumulated_threat_level": 0.5, "timewindow": 96} +{"Format": "IDEA0", "ID": "68def6d0-ddd3-4539-944d-df12ebab6ce6", "DetectTime": "2024-05-21T12:37:36.875815+00:00", "EventTime": "2024-05-21T12:37:36.875833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nj64pkp5q9wBwEe"], "accumulated_threat_level": 9.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "3d507746-d849-43ea-8b22-755584fb82cb", "DetectTime": "2024-05-21T12:37:36.921467+00:00", "EventTime": "2024-05-21T12:37:36.921486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.89.116.82"]}], "Attach": [{"Content": "Connection to unknown destination port 16974/UDP destination IP 178.89.116.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMjgP2zSAhi5SRHh8"], "accumulated_threat_level": 10.4, "timewindow": 95} +{"Format": "IDEA0", "ID": "f636d445-e64c-4779-8149-4d99457bce0e", "DetectTime": "2024-05-21T12:37:37.192088+00:00", "EventTime": "2024-05-21T12:37:37.192117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.205.178.217"]}], "Attach": [{"Content": "Connection to unknown destination port 15479/UDP destination IP 187.205.178.217. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNpeDP30P7gR3Hpx18"], "accumulated_threat_level": 11.200000000000001, "timewindow": 95} +{"Format": "IDEA0", "ID": "420c2b17-c3ef-4133-b7e7-e990c458ecc8", "DetectTime": "2024-05-21T12:37:37.226090+00:00", "EventTime": "2024-05-21T12:37:37.226109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"]}], "Attach": [{"Content": "Connection to unknown destination port 6668/UDP destination IP 94.71.146.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPukG5Dy6ZdR0o1pb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 95} +{"Format": "Json", "ID": "420c2b17-c3ef-4133-b7e7-e990c458ecc8", "DetectTime": "2024-05-21T12:37:37.226090+00:00", "EventTime": "2024-05-21T12:37:37.226109+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.71.146.85"]}], "Attach": [{"Content": "1970-01-04T22:46:47.280330+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 95. (real time 2024/05/21 12:37:37.954562)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 95, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "df0e981a-6bc3-440d-97e1-c8a7f0cbeda7", "DetectTime": "2024-05-21T12:37:37.965981+00:00", "EventTime": "2024-05-21T12:37:37.966010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZGNJ38HZFoGzqbTb"], "accumulated_threat_level": 0.8, "timewindow": 95} +{"Format": "IDEA0", "ID": "3d802442-4fbd-488d-8fca-fbd2d8a8b85a", "DetectTime": "2024-05-21T12:37:37.979788+00:00", "EventTime": "2024-05-21T12:37:37.979820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE1ryW3zPOY0JTDMLi"], "accumulated_threat_level": 1.6, "timewindow": 95} +{"Format": "IDEA0", "ID": "0caf3db2-ac12-4e13-a06c-869f9455b096", "DetectTime": "2024-05-21T12:37:37.998736+00:00", "EventTime": "2024-05-21T12:37:37.998767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXWQY26uYt0td2Xu1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "76d0b02b-0e08-4926-aeda-689c8796a770", "DetectTime": "2024-05-21T12:37:38.004124+00:00", "EventTime": "2024-05-21T12:37:38.004145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cti9M5x8TpXPa71k7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 95} +{"Format": "IDEA0", "ID": "16766dac-d61a-487b-8587-209b42cfb238", "DetectTime": "2024-05-21T12:37:38.017709+00:00", "EventTime": "2024-05-21T12:37:38.017744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeCNB4Wua1fwMD8b6"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "667b5a78-5958-4bcf-afa0-e314b697474c", "DetectTime": "2024-05-21T12:37:38.023166+00:00", "EventTime": "2024-05-21T12:37:38.023185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.227.240.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Jo2m1VfqSt4Uwh9k"], "accumulated_threat_level": 3.2, "timewindow": 95} +{"Format": "IDEA0", "ID": "818d5301-7d76-49ad-aa19-42680c19c116", "DetectTime": "2024-05-21T12:37:38.035435+00:00", "EventTime": "2024-05-21T12:37:38.035459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDpJq4HO9lFysL1D5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "68c51bc3-61c3-4a68-9ba9-49a28f8d02db", "DetectTime": "2024-05-21T12:37:38.041261+00:00", "EventTime": "2024-05-21T12:37:38.041283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.70.71.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BDN74OJGOoSdXCr6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ffb82f81-f11b-4e27-a672-82b4bf269a7a", "DetectTime": "2024-05-21T12:37:38.046341+00:00", "EventTime": "2024-05-21T12:37:38.046361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.231.149.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7e4yI1jj0ZDu7kdPh"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ab33d852-45f5-4ab9-bfff-d8b206bc4950", "DetectTime": "2024-05-21T12:37:38.059702+00:00", "EventTime": "2024-05-21T12:37:38.059726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0uIx2a9my7RxzvL8"], "accumulated_threat_level": 1.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "ccfd9a78-9c5b-42fc-971e-83912d274f13", "DetectTime": "2024-05-21T12:37:38.064903+00:00", "EventTime": "2024-05-21T12:37:38.064923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.242.167.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOkhp5wrRa3G7ZSd"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ca36e965-94ff-4852-9ee8-9196a9b0ff52", "DetectTime": "2024-05-21T12:37:38.078233+00:00", "EventTime": "2024-05-21T12:37:38.078253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.14.191 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQw0yBz1UAtJr4Fh"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "8bc5f891-f4ae-48e5-a6a7-f8a03c863286", "DetectTime": "2024-05-21T12:37:38.084725+00:00", "EventTime": "2024-05-21T12:37:38.084746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.208.48.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUa9GMUm8c7ETo7j3"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "14ddaf40-39eb-4a38-93b6-5b420d0d3738", "DetectTime": "2024-05-21T12:37:38.090073+00:00", "EventTime": "2024-05-21T12:37:38.090092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.58.148.23 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNKjc528FoDAqPkZGh"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "8670607a-fd9d-450c-82c1-6ced30574ce0", "DetectTime": "2024-05-21T12:37:38.097598+00:00", "EventTime": "2024-05-21T12:37:38.097616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.8.125.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuuVLx4UcCK1a8nKZf"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "cc99f6aa-b335-42ad-a7ae-a8152115490f", "DetectTime": "2024-05-21T12:37:38.102134+00:00", "EventTime": "2024-05-21T12:37:38.102152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 204.214.40.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Rww54ofHYWN6LXY7"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "5c01c1b7-30a5-4cbb-87c2-a73a05416071", "DetectTime": "2024-05-21T12:37:38.106807+00:00", "EventTime": "2024-05-21T12:37:38.106825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.130.129.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxZr3c29dQBkV8Zvyi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "55552697-d88c-4592-add3-6ec4e00efb94", "DetectTime": "2024-05-21T12:37:38.111209+00:00", "EventTime": "2024-05-21T12:37:38.111226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.111.56.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6lQI2hUlQl1jESSj"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "3f341230-5989-4482-84ce-4d62196c095d", "DetectTime": "2024-05-21T12:37:38.523084+00:00", "EventTime": "2024-05-21T12:37:38.523106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.147.74.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2bDS3Hak9H8rz9Fa"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "8dde3f27-c6e1-4213-ad52-ecde016396cf", "DetectTime": "2024-05-21T12:37:38.565851+00:00", "EventTime": "2024-05-21T12:37:38.565874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.159.134.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8ROC4VIe4UOEc5k6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "fc955ce3-e4f5-4511-80e2-3f2411338158", "DetectTime": "2024-05-21T12:37:38.571115+00:00", "EventTime": "2024-05-21T12:37:38.571134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarrTS1RnoUJeXEbkg"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "2861c2aa-81b1-46db-a89b-e6ecb33ea5b5", "DetectTime": "2024-05-21T12:37:38.652797+00:00", "EventTime": "2024-05-21T12:37:38.652818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.174.252.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPPw22rwIV0I8Cewb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0c133dc1-f1d8-4979-9f35-c99df2b1d78a", "DetectTime": "2024-05-21T12:37:38.688136+00:00", "EventTime": "2024-05-21T12:37:38.688158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.89.116.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAxV52guYiGatYS8h"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "c0efcece-25ee-49e4-a4a4-91d9f39ea807", "DetectTime": "2024-05-21T12:37:38.697709+00:00", "EventTime": "2024-05-21T12:37:38.697738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.119.61.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8Mzu18uRODqfO2Cb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "bc11da93-bfce-4102-b9fc-306d9adf4bfd", "DetectTime": "2024-05-21T12:37:38.703283+00:00", "EventTime": "2024-05-21T12:37:38.703302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.24.108.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlicRJQ2X06Aavnc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0a756143-0622-4f57-98da-d24875236600", "DetectTime": "2024-05-21T12:37:38.733527+00:00", "EventTime": "2024-05-21T12:37:38.733550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.189.172.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuN1Iv4jZmJSYVMKp1"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "b869300a-79b1-445e-8e36-c27e171bd699", "DetectTime": "2024-05-21T12:37:38.830737+00:00", "EventTime": "2024-05-21T12:37:38.830763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.174.206.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFd5J166AfN7ctt7a"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "daf09212-8bbe-4e92-9aa0-fd748cabe781", "DetectTime": "2024-05-21T12:37:39.013232+00:00", "EventTime": "2024-05-21T12:37:39.013275+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["49.49.17.72"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1h84l2NDyrbLXoWSk"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "a7f1a3f3-2062-4e39-8847-8ad063be697b", "DetectTime": "2024-05-21T12:37:39.027670+00:00", "EventTime": "2024-05-21T12:37:39.027690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1h84l2NDyrbLXoWSk"], "accumulated_threat_level": 8.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "fdc96ffe-aedc-4929-9ca8-5e8423713b9d", "DetectTime": "2024-05-21T12:37:39.056942+00:00", "EventTime": "2024-05-21T12:37:39.056965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEQCJG2PeMZZBjhgD9", "CLorF24gZZIgZJgYW9", "C7M2osEZtpInkoFY1", "CklR3PHxjZ6xh1yih"], "accumulated_threat_level": 1.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "5495cb20-ac67-498a-91f5-4149b2f75205", "DetectTime": "2024-05-21T12:37:39.141863+00:00", "EventTime": "2024-05-21T12:37:39.141890+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.183.152"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTyGw3jQ8NydHdKnc"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "24a3a93d-2196-4936-bfd6-72d680776192", "DetectTime": "2024-05-21T12:37:39.158295+00:00", "EventTime": "2024-05-21T12:37:39.158316+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.183.152"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTyGw3jQ8NydHdKnc"], "accumulated_threat_level": 8.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "815e897c-b476-4b45-a993-24b0bc5ad10a", "DetectTime": "2024-05-21T12:37:39.163660+00:00", "EventTime": "2024-05-21T12:37:39.163678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.9.147.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCjt02mz716r02bI2"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ff53a8fa-4358-400b-bcd3-e9fe2c7f137d", "DetectTime": "2024-05-21T12:37:39.211554+00:00", "EventTime": "2024-05-21T12:37:39.211574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.205.178.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRxtr19QjocibQVnc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "a76f0501-7c2c-42d3-88f6-8f399258b397", "DetectTime": "2024-05-21T12:37:39.217806+00:00", "EventTime": "2024-05-21T12:37:39.217824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILKn02RktFWRp9Csb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ac7f4d6e-3d87-463b-8727-b97ec32f59ec", "DetectTime": "2024-05-21T12:37:39.222501+00:00", "EventTime": "2024-05-21T12:37:39.222519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.43.232.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTdnqi3q8Q13BzKTL8"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "81e31ca9-0946-40d7-b854-76f3d74b07dc", "DetectTime": "2024-05-21T12:37:39.227225+00:00", "EventTime": "2024-05-21T12:37:39.227243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.64.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CikKQ82wZzASbRPgjc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "27ce145e-7741-4f73-b95d-777f7db3fd88", "DetectTime": "2024-05-21T12:37:39.231880+00:00", "EventTime": "2024-05-21T12:37:39.231897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.146.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jwk73J1pa95N2Buj"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "a696f7b0-4f61-475e-a05b-7e5513fe276d", "DetectTime": "2024-05-21T12:37:39.404729+00:00", "EventTime": "2024-05-21T12:37:39.404766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.6.159.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvliQyDTUp6Y3JEKh"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "b0226bbb-918d-4ac2-8e1f-4c94b3544b1d", "DetectTime": "2024-05-21T12:37:39.410021+00:00", "EventTime": "2024-05-21T12:37:39.410042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.158.2.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfikqj5j4a9dxRaAi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "2191e9fc-8419-4c6c-aebc-70bd9139df88", "DetectTime": "2024-05-21T12:37:39.414913+00:00", "EventTime": "2024-05-21T12:37:39.414933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.46.127.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZlxj2Gc4kNhroAY3"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "1cd78236-17f0-4d8a-83ce-ec4831a2e6ea", "DetectTime": "2024-05-21T12:37:39.469534+00:00", "EventTime": "2024-05-21T12:37:39.469554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.85.182.203 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeOrAyCCHmalxgq6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "dbc107ca-6bed-48c1-86c5-2586b00e5906", "DetectTime": "2024-05-21T12:37:39.783685+00:00", "EventTime": "2024-05-21T12:37:39.783706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 165.138.86.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPcm34Bjs6GKYWk1f"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "b005d42e-0f4b-4c43-b3d9-a1926589c5d3", "DetectTime": "2024-05-21T12:37:39.789085+00:00", "EventTime": "2024-05-21T12:37:39.789105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.167.82.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3hhH24BTjJ5zSMm1"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "c910eca1-3092-43e8-9c7d-951b0f30ed71", "DetectTime": "2024-05-21T12:37:39.794454+00:00", "EventTime": "2024-05-21T12:37:39.794473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.228.9.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTQ2M2PLbLVEfD0lb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "6281e8c5-56c9-4bcb-a80c-e0666b688839", "DetectTime": "2024-05-21T12:37:39.815934+00:00", "EventTime": "2024-05-21T12:37:39.815955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.82.219.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuN9wo3TTKA1x34GKb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "63e82b03-37fe-4335-a2bb-4995a8f3ef1e", "DetectTime": "2024-05-21T12:37:39.954167+00:00", "EventTime": "2024-05-21T12:37:39.954185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrlgi1LCe99B0soI2"], "accumulated_threat_level": 2.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "87c25f06-a717-4917-bf2c-146e396fc3f4", "DetectTime": "2024-05-21T12:37:40.026560+00:00", "EventTime": "2024-05-21T12:37:40.026579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.45.144.39 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRumHXj7ruJrYph7"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4c4250a7-a5da-4ecf-a6f9-3ea76f988960", "DetectTime": "2024-05-21T12:37:40.295291+00:00", "EventTime": "2024-05-21T12:37:40.295311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WQOw4htILZeU0h93"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "fc9f9ff0-bd6a-413f-8101-29791fa5695b", "DetectTime": "2024-05-21T12:37:40.327683+00:00", "EventTime": "2024-05-21T12:37:40.327702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2OfhT20v0xcUInmd9"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "bca69e5a-84fd-4b77-b5e5-aec2ea460a9e", "DetectTime": "2024-05-21T12:37:40.370071+00:00", "EventTime": "2024-05-21T12:37:40.370099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLfwnbLVNJdWBDUc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "3d4e6d1b-5e7c-41ef-84ac-e6976e9fcdfc", "DetectTime": "2024-05-21T12:37:40.665281+00:00", "EventTime": "2024-05-21T12:37:40.665302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 61.15.33.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfLvn0WrFunO8kh"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "bce59f93-1abd-4c4b-88db-74706f03dba4", "DetectTime": "2024-05-21T12:37:40.673022+00:00", "EventTime": "2024-05-21T12:37:40.673040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.38.171.165 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6w4Jt1X9C8CMAZQn6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "57b0da40-db53-4225-9a26-83da23d7534c", "DetectTime": "2024-05-21T12:37:40.685308+00:00", "EventTime": "2024-05-21T12:37:40.685330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.203.24.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBS0yk2sGmW5q9t067"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "9a0ce2de-8513-4f34-a7cf-473adefd9bf1", "DetectTime": "2024-05-21T12:37:40.698348+00:00", "EventTime": "2024-05-21T12:37:40.698368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.219.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcOfPpge1zzcbpC8"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "7f873ac2-6152-4826-8f27-a315eb1c72ef", "DetectTime": "2024-05-21T12:37:40.704750+00:00", "EventTime": "2024-05-21T12:37:40.704772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.84.32 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4B3v20dLKk4VULye"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ad2a69cf-0e71-4236-ac1f-78a526a46305", "DetectTime": "2024-05-21T12:37:40.709552+00:00", "EventTime": "2024-05-21T12:37:40.709570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.199.91.254 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5XdjV357ZSWf5GLaj"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "75261800-ff87-4333-9067-9a09a002613c", "DetectTime": "2024-05-21T12:37:41.029620+00:00", "EventTime": "2024-05-21T12:37:41.029641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.33.110.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccte6r3pMAXuhQXpu4"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0db6f181-ee3a-4d21-99c4-77a9ce2770f0", "DetectTime": "2024-05-21T12:37:41.141746+00:00", "EventTime": "2024-05-21T12:37:41.141769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8l1i4zqJhgVywRze"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "3dc46149-a4ef-4118-b768-86c085f95f5b", "DetectTime": "2024-05-21T12:37:41.184183+00:00", "EventTime": "2024-05-21T12:37:41.184206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C354TEmBUbcjkWZNb", "C3WgIi2LEo1bUvmVSg", "CMTrlx2wVUoHJ5FHj5", "CKsaVyetT0iRQTPo2"], "accumulated_threat_level": 3.1, "timewindow": 96} +{"Format": "IDEA0", "ID": "e179faea-3553-4783-a91c-e6bebc9dfd09", "DetectTime": "2024-05-21T12:37:41.420796+00:00", "EventTime": "2024-05-21T12:37:41.420819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBS1E2aFp8gmO3aoe"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "6c4215f9-d990-496f-9569-c474fe006c0a", "DetectTime": "2024-05-21T12:37:41.427465+00:00", "EventTime": "2024-05-21T12:37:41.427485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.237.15.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboORo4e0lUyzktQld"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "b70e4d57-3f7b-47e0-92b8-af3d43abeabb", "DetectTime": "2024-05-21T12:37:41.432348+00:00", "EventTime": "2024-05-21T12:37:41.432366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.66.45.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CraKuN1fhR94AbS0od"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "62832f3c-c4a9-4532-b514-28905898d6c2", "DetectTime": "2024-05-21T12:37:41.521921+00:00", "EventTime": "2024-05-21T12:37:41.521947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.50.102.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNvjU22kQbLgqSVcEl"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "52bf84e2-b2a4-431c-87ca-9f3bda669b35", "DetectTime": "2024-05-21T12:37:41.561652+00:00", "EventTime": "2024-05-21T12:37:41.561675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.165.181.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TMls96nfMEVqap7"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "758230b3-6809-4d41-8a2a-9c586a78576e", "DetectTime": "2024-05-21T12:37:41.642664+00:00", "EventTime": "2024-05-21T12:37:41.642685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.248.120.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvc6O11pvakSYw1V7"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0f92fb63-89b0-4fac-993f-78f266dee641", "DetectTime": "2024-05-21T12:37:41.702653+00:00", "EventTime": "2024-05-21T12:37:41.702677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.131.236.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNRg5n3gwuGqg0DRbk"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "6dc330be-7739-4745-8cd8-4988286c68e9", "DetectTime": "2024-05-21T12:37:42.166166+00:00", "EventTime": "2024-05-21T12:37:42.166206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 141.99.133.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRVlOc16TzW7Ejjxp5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "1564952a-1ffc-40ff-8688-bb127d977959", "DetectTime": "2024-05-21T12:37:42.291177+00:00", "EventTime": "2024-05-21T12:37:42.291207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.96.97.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwq9JP3juiionzekb5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "802df2c2-3931-4158-9224-8855b8d16956", "DetectTime": "2024-05-21T12:37:42.343060+00:00", "EventTime": "2024-05-21T12:37:42.343078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5f1p74DTMzXszwn2b"], "accumulated_threat_level": 3.9000000000000004, "timewindow": 96} +{"Format": "IDEA0", "ID": "f76e65c1-fdc0-4b40-8866-127e090de35a", "DetectTime": "2024-05-21T12:37:42.756096+00:00", "EventTime": "2024-05-21T12:37:42.756120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdpgya21RG4J1fMrvf"], "accumulated_threat_level": 4.7, "timewindow": 96} +{"Format": "IDEA0", "ID": "c7656f20-f0e5-40d5-89e6-4998202fb60c", "DetectTime": "2024-05-21T12:37:42.809335+00:00", "EventTime": "2024-05-21T12:37:42.809356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHAA4vVEmBX1r4q09"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "5d410dfc-5bc8-47bd-8ae1-5d27bd8e6c8d", "DetectTime": "2024-05-21T12:37:42.848528+00:00", "EventTime": "2024-05-21T12:37:42.848546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp5bkMz3xxBVIZnjk"], "accumulated_threat_level": 5.5, "timewindow": 96} +{"Format": "IDEA0", "ID": "13d536a8-3276-4ef7-abf2-7c3eed9ffac5", "DetectTime": "2024-05-21T12:37:42.890318+00:00", "EventTime": "2024-05-21T12:37:42.890337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFZ9L3nwVi3LKonKg"], "accumulated_threat_level": 6.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "0e479251-e59a-4fc6-81ed-ba96b1e91410", "DetectTime": "2024-05-21T12:37:42.938432+00:00", "EventTime": "2024-05-21T12:37:42.938449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkWsT64sk8w2JL1SIk"], "accumulated_threat_level": 7.1, "timewindow": 96} +{"Format": "IDEA0", "ID": "369b4674-2011-4365-8077-56306cbe33b5", "DetectTime": "2024-05-21T12:37:42.982095+00:00", "EventTime": "2024-05-21T12:37:42.982114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgYgy3zhEFX7K8p07"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "bf5583da-55f8-407f-a569-9f721d8ec727", "DetectTime": "2024-05-21T12:37:43.027631+00:00", "EventTime": "2024-05-21T12:37:43.027653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeiMa33DPUWcWmlNve"], "accumulated_threat_level": 8.7, "timewindow": 96} +{"Format": "IDEA0", "ID": "3d5dbc1a-719e-41fd-b15d-932b25af9ec3", "DetectTime": "2024-05-21T12:37:43.301054+00:00", "EventTime": "2024-05-21T12:37:43.301075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9xdnW3Cht7n8b3xzk"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "12b37921-d5eb-4881-a20c-d96c2d05c062", "DetectTime": "2024-05-21T12:37:43.341333+00:00", "EventTime": "2024-05-21T12:37:43.341354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NIdu3ktCdgU4Kwk5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0eee93bb-a716-43f2-a9d4-975996137b16", "DetectTime": "2024-05-21T12:37:43.602814+00:00", "EventTime": "2024-05-21T12:37:43.602837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviUG539sijf54tuv2"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "c3a170de-55ce-429c-903a-61411828394b", "DetectTime": "2024-05-21T12:37:43.607686+00:00", "EventTime": "2024-05-21T12:37:43.607705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COyxR93iA3tYb0B6mg"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "499e9cc0-fb7c-4404-b2ec-4dd8c9309474", "DetectTime": "2024-05-21T12:37:43.652829+00:00", "EventTime": "2024-05-21T12:37:43.652848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbrKa4JQ6S2vroWy4"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "541fffaf-01a9-491d-b1cb-5ca6ff40397d", "DetectTime": "2024-05-21T12:37:43.691388+00:00", "EventTime": "2024-05-21T12:37:43.691406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTmrPw1zy4UZTpo003"], "accumulated_threat_level": 9.5, "timewindow": 96} +{"Format": "IDEA0", "ID": "2e39d7eb-4ea2-45b9-9fa5-94d9bcf96b97", "DetectTime": "2024-05-21T12:37:43.726816+00:00", "EventTime": "2024-05-21T12:37:43.726836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA3d5d4dEd8OG78OAl"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "853d0a03-c82e-4850-880c-c3577da3dbbf", "DetectTime": "2024-05-21T12:37:43.771204+00:00", "EventTime": "2024-05-21T12:37:43.771222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24ogF1V1lhScCWKkc"], "accumulated_threat_level": 10.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "d6989f19-8ba8-4c0d-b115-786e093af57e", "DetectTime": "2024-05-21T12:37:43.793064+00:00", "EventTime": "2024-05-21T12:37:43.793086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIrsEC1v4dlPQ1Ss7h"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4378c29f-2696-472f-bc82-40f03eac7b42", "DetectTime": "2024-05-21T12:37:43.841717+00:00", "EventTime": "2024-05-21T12:37:43.841738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWim9aqe1rckS5rb"], "accumulated_threat_level": 11.100000000000001, "timewindow": 96} +{"Format": "IDEA0", "ID": "923b9ebf-06cf-4409-bc0f-652409075992", "DetectTime": "2024-05-21T12:37:43.882202+00:00", "EventTime": "2024-05-21T12:37:43.882220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7vqN1y5VEDI5DSe4"], "accumulated_threat_level": 11.900000000000002, "timewindow": 96} +{"Format": "IDEA0", "ID": "d2108fae-a863-43c6-8e3a-b5e0c46d99ab", "DetectTime": "2024-05-21T12:37:43.940375+00:00", "EventTime": "2024-05-21T12:37:43.940393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheKGz4HTvTAqCRayf"], "accumulated_threat_level": 12.700000000000003, "timewindow": 96} +{"Format": "Json", "ID": "d2108fae-a863-43c6-8e3a-b5e0c46d99ab", "DetectTime": "2024-05-21T12:37:43.940375+00:00", "EventTime": "2024-05-21T12:37:43.940393+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-04T23:20:17.007037+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2024/05/21 12:37:44.241307)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 96, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "05d8ba50-abb9-495c-956c-70b37e1a6be2", "DetectTime": "2024-05-21T12:37:44.258820+00:00", "EventTime": "2024-05-21T12:37:44.258838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFf9nchoUMx7peU8b"], "accumulated_threat_level": 0.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "50b8810d-07f3-419a-992a-90eebc98106e", "DetectTime": "2024-05-21T12:37:44.393862+00:00", "EventTime": "2024-05-21T12:37:44.393884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrFFsg9cP3WDHQIi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "5ed57a46-360c-4d78-a722-b3b196be0769", "DetectTime": "2024-05-21T12:37:44.595364+00:00", "EventTime": "2024-05-21T12:37:44.595387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csh5kC3FPq4WoslfT3", "Cjaoiq2EOUmR5VNfw2", "CMxtf02nmJ7HzX33i1", "CiqVya4pCIxq0br4Na"], "accumulated_threat_level": 1.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "65b227e7-bc3f-4f93-8cb4-27a262086b93", "DetectTime": "2024-05-21T12:37:44.655185+00:00", "EventTime": "2024-05-21T12:37:44.655204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFTwK2zU8VhSIHVxb"], "accumulated_threat_level": 2.1, "timewindow": 96} +{"Format": "IDEA0", "ID": "dd2419f8-0593-45f2-8c49-1c9df27bc6f3", "DetectTime": "2024-05-21T12:37:44.753742+00:00", "EventTime": "2024-05-21T12:37:44.753762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSV5gur53dTDBn17"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 96} +{"Format": "IDEA0", "ID": "56c2c23f-f746-4eaa-822a-7dd3565b9260", "DetectTime": "2024-05-21T12:37:44.794559+00:00", "EventTime": "2024-05-21T12:37:44.794578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjzjpz1o0Td0GiauJ4"], "accumulated_threat_level": 3.7, "timewindow": 96} +{"Format": "IDEA0", "ID": "edd6757c-0d64-40e8-8acf-04ae54f0d4f9", "DetectTime": "2024-05-21T12:37:44.948859+00:00", "EventTime": "2024-05-21T12:37:44.948882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkerUp4R5bPc1mUzyc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "04d01fbe-a9f3-4644-be62-4e0447c7d49b", "DetectTime": "2024-05-21T12:37:45.081541+00:00", "EventTime": "2024-05-21T12:37:45.081563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGwyZA32z5sRSDI1oi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4b814827-7777-4b3d-9feb-18e58729b869", "DetectTime": "2024-05-21T12:37:45.123327+00:00", "EventTime": "2024-05-21T12:37:45.123350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwESV1qrNPcwG1dHe"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "53e6694f-f7ad-480e-8482-65ce3f92f102", "DetectTime": "2024-05-21T12:37:45.160504+00:00", "EventTime": "2024-05-21T12:37:45.160525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKY1912LolKMiPx1f"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "530198ff-96cd-42d6-a458-3c1a62766d19", "DetectTime": "2024-05-21T12:37:45.418037+00:00", "EventTime": "2024-05-21T12:37:45.418057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55VTc141cqofTu7S5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "d6cc27dc-8ccd-4dc7-8722-ff496007990e", "DetectTime": "2024-05-21T12:37:45.457718+00:00", "EventTime": "2024-05-21T12:37:45.457745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZDYKE1Xv4b9RXJhik"], "accumulated_threat_level": 4.5, "timewindow": 96} +{"Format": "IDEA0", "ID": "d9b02eb1-083a-4b81-a34c-58c624ecdf42", "DetectTime": "2024-05-21T12:37:45.834739+00:00", "EventTime": "2024-05-21T12:37:45.834764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbruiM1xGKU9fnAmN2"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "4263bd87-4c28-46d7-afce-8f0f185b40b9", "DetectTime": "2024-05-21T12:37:45.877213+00:00", "EventTime": "2024-05-21T12:37:45.877234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZDZPUXdawyBRfYvc"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "9d9865dd-500b-4574-81b6-797532487ce1", "DetectTime": "2024-05-21T12:37:45.922766+00:00", "EventTime": "2024-05-21T12:37:45.922785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.93.140.11"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDN80G1ezfho4RPepc"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "ae0270d8-ebb2-411c-b3df-3c32cdcd0006", "DetectTime": "2024-05-21T12:37:45.936308+00:00", "EventTime": "2024-05-21T12:37:45.936329+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDN80G1ezfho4RPepc"], "accumulated_threat_level": 9.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "1189a907-a9ca-4364-a2e3-9f45526f7f27", "DetectTime": "2024-05-21T12:37:46.161331+00:00", "EventTime": "2024-05-21T12:37:46.161351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgynNu2qFnqIqJbynh"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "04fdb542-08e7-4934-9bb0-0a4d56b68541", "DetectTime": "2024-05-21T12:37:46.166309+00:00", "EventTime": "2024-05-21T12:37:46.166328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4PA61TLF5Vkz0T6c"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "cd34bcb9-270f-475e-a860-ae8076a0d6a5", "DetectTime": "2024-05-21T12:37:46.171382+00:00", "EventTime": "2024-05-21T12:37:46.171401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNK7Of4UnDn59Aqg8d"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "d401db9e-329f-447a-b4c3-0a98df2a9530", "DetectTime": "2024-05-21T12:37:46.197446+00:00", "EventTime": "2024-05-21T12:37:46.197468+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.208.123.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeey61qStftr2JY4e"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d29a0354-df8e-42a6-b09f-c10a5dab5df0", "DetectTime": "2024-05-21T12:37:46.211419+00:00", "EventTime": "2024-05-21T12:37:46.211439+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeey61qStftr2JY4e"], "accumulated_threat_level": 9.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "e916db89-6d77-43c0-9aa7-dcf6a96c331a", "DetectTime": "2024-05-21T12:37:46.251260+00:00", "EventTime": "2024-05-21T12:37:46.251279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQh8XZwoE6bg0SK4g"], "accumulated_threat_level": 5.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "d29cfeaf-a968-4427-a11f-99090cf730a8", "DetectTime": "2024-05-21T12:37:46.292136+00:00", "EventTime": "2024-05-21T12:37:46.292161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVEHPc1VLyyyP7Ieae"], "accumulated_threat_level": 6.1, "timewindow": 96} +{"Format": "IDEA0", "ID": "55f9edd9-1abe-4657-a528-aeabe88fbaca", "DetectTime": "2024-05-21T12:37:46.333922+00:00", "EventTime": "2024-05-21T12:37:46.333940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7qidPFkepimuHxU2"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "c2a8c688-5e7b-4112-8374-a4236b3ab088", "DetectTime": "2024-05-21T12:37:46.346567+00:00", "EventTime": "2024-05-21T12:37:46.346585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9ziZjxM2QQwlFuf"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "0048013f-cac7-47b7-a715-e1f47a29ee98", "DetectTime": "2024-05-21T12:37:46.360020+00:00", "EventTime": "2024-05-21T12:37:46.360040+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9ziZjxM2QQwlFuf"], "accumulated_threat_level": 10.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "45a09c4a-4caa-48a5-aac2-428a9cd6312a", "DetectTime": "2024-05-21T12:37:46.372405+00:00", "EventTime": "2024-05-21T12:37:46.372429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNzg13B9pq9DhSO1l"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "2a2b3600-345e-47fe-85ec-a57f074cdd0f", "DetectTime": "2024-05-21T12:37:46.405595+00:00", "EventTime": "2024-05-21T12:37:46.405614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["84.151.242.149"]}], "Attach": [{"Content": "Connection to unknown destination port 4507/UDP destination IP 84.151.242.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jgCp1DHYT3WParq6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 96} +{"Format": "IDEA0", "ID": "ef593d0d-3ee5-4da4-948a-a31e5e71764b", "DetectTime": "2024-05-21T12:37:46.445333+00:00", "EventTime": "2024-05-21T12:37:46.445356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR7ei1zM6QE4lB65f"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "6f401a61-6709-45d4-a967-38cef50a6a96", "DetectTime": "2024-05-21T12:37:46.480672+00:00", "EventTime": "2024-05-21T12:37:46.480693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7FtJX3pKgzoYSxDGi"], "accumulated_threat_level": 8.5, "timewindow": 96} +{"Format": "IDEA0", "ID": "274096e6-7e46-4e9a-88ff-fb72a126e322", "DetectTime": "2024-05-21T12:37:46.601129+00:00", "EventTime": "2024-05-21T12:37:46.601149+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7hl52UMzUxdIvmw5"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "d7edd1b0-0a32-4bae-908f-1778e42a62f4", "DetectTime": "2024-05-21T12:37:46.614457+00:00", "EventTime": "2024-05-21T12:37:46.614477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7hl52UMzUxdIvmw5"], "accumulated_threat_level": 10.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "cd102ece-89f3-4e1d-a161-066bf31df8dc", "DetectTime": "2024-05-21T12:37:46.762293+00:00", "EventTime": "2024-05-21T12:37:46.762311+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKviK3fJkdS3a5URc"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "b7a89290-85af-417f-842c-f973999a025b", "DetectTime": "2024-05-21T12:37:46.775067+00:00", "EventTime": "2024-05-21T12:37:46.775086+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKviK3fJkdS3a5URc"], "accumulated_threat_level": 11.0, "timewindow": 25} +{"Format": "IDEA0", "ID": "2e74ef79-eb42-4284-b7be-f9bdb0fa0588", "DetectTime": "2024-05-21T12:37:46.780188+00:00", "EventTime": "2024-05-21T12:37:46.780205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3PMICDe00OGY5Ch"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "89f1b635-13ec-49a5-a129-cef5ab668acc", "DetectTime": "2024-05-21T12:37:46.791328+00:00", "EventTime": "2024-05-21T12:37:46.791348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVc8HAGxGxh48ftb3"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "c6b327d3-4f82-4356-b16a-5531851de5c8", "DetectTime": "2024-05-21T12:37:46.832462+00:00", "EventTime": "2024-05-21T12:37:46.832480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJoId10zxFdpvlBHc"], "accumulated_threat_level": 9.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "086dba9e-4838-4ec7-a754-5e8c8d205cbc", "DetectTime": "2024-05-21T12:37:46.851547+00:00", "EventTime": "2024-05-21T12:37:46.851568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.8.121.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbmnB1lg3EWs9dAf1"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "e1dac1c8-2c3a-4ae5-b07e-b42feab28b0d", "DetectTime": "2024-05-21T12:37:46.892443+00:00", "EventTime": "2024-05-21T12:37:46.892464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.91.64.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGwuNndOKBBdwums5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "7b3e319e-9abb-45ee-84a1-67914df9fce3", "DetectTime": "2024-05-21T12:37:46.926953+00:00", "EventTime": "2024-05-21T12:37:46.926972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.77.231.101"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2s3r2XmD7y9S4pJ8"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "00aacf36-4c1f-49e5-9b6d-a0a2d15a8353", "DetectTime": "2024-05-21T12:37:46.939883+00:00", "EventTime": "2024-05-21T12:37:46.939909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWecry2IyObby1EP14"], "accumulated_threat_level": 10.100000000000001, "timewindow": 96} +{"Format": "IDEA0", "ID": "6542400b-ede8-438c-b109-e639c27cb192", "DetectTime": "2024-05-21T12:37:46.953878+00:00", "EventTime": "2024-05-21T12:37:46.953897+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.77.231.101"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2s3r2XmD7y9S4pJ8"], "accumulated_threat_level": 11.5, "timewindow": 25} +{"Format": "IDEA0", "ID": "ef4f144d-922a-4033-8a59-3239d2f475a2", "DetectTime": "2024-05-21T12:37:46.970952+00:00", "EventTime": "2024-05-21T12:37:46.970970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPXUT1O4kE8g2PlV3"], "accumulated_threat_level": 10.900000000000002, "timewindow": 96} +{"Format": "IDEA0", "ID": "d19e0a07-4bfd-4754-ae48-762c8d121b4c", "DetectTime": "2024-05-21T12:37:47.010693+00:00", "EventTime": "2024-05-21T12:37:47.010713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwvJkA3HIKVnfCwwv5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 96} +{"Format": "IDEA0", "ID": "fd6d31c5-bb1c-48f1-b735-ba5e2ff6aac6", "DetectTime": "2024-05-21T12:37:47.050588+00:00", "EventTime": "2024-05-21T12:37:47.050608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3pB23sIT0cz9QRIl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 96} +{"Format": "Json", "ID": "fd6d31c5-bb1c-48f1-b735-ba5e2ff6aac6", "DetectTime": "2024-05-21T12:37:47.050588+00:00", "EventTime": "2024-05-21T12:37:47.050608+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "1970-01-04T23:20:56.705234+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2024/05/21 12:37:47.351479)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 96, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "3ccde886-e2ea-401f-94d0-ba134fbb985f", "DetectTime": "2024-05-21T12:37:47.364179+00:00", "EventTime": "2024-05-21T12:37:47.364198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.189.51.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck5WPQ13EXX18yLwm4"], "accumulated_threat_level": 0, "timewindow": 25} +{"Format": "IDEA0", "ID": "c2386745-ec6b-4450-a32a-39bf0c922c38", "DetectTime": "2024-05-21T12:37:47.376831+00:00", "EventTime": "2024-05-21T12:37:47.376848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck5WPQ13EXX18yLwm4"], "accumulated_threat_level": 12.0, "timewindow": 25} +{"Format": "Json", "ID": "c2386745-ec6b-4450-a32a-39bf0c922c38", "DetectTime": "2024-05-21T12:37:47.376831+00:00", "EventTime": "2024-05-21T12:37:47.376848+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "1970-01-02T00:49:46.984899+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 25. (real time 2024/05/21 12:37:47.928850)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 25, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "54c4e390-8191-4952-ab35-ac8ce5ce5956", "DetectTime": "2024-05-21T12:37:47.940039+00:00", "EventTime": "2024-05-21T12:37:47.940059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVQKu1j8kLyZw5aAi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "cbd991bc-0b22-4be6-8e22-e0781c4cdc02", "DetectTime": "2024-05-21T12:37:47.945005+00:00", "EventTime": "2024-05-21T12:37:47.945024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.17.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxmDHgdpR6NrrkzL4"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "a7282ca9-5c54-4582-afb0-38032fdd3b67", "DetectTime": "2024-05-21T12:37:47.956808+00:00", "EventTime": "2024-05-21T12:37:47.956828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2EhbvbShXTqb896"], "accumulated_threat_level": 0.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "408c344c-d52f-488d-b927-a7a1c504dd5d", "DetectTime": "2024-05-21T12:37:47.968626+00:00", "EventTime": "2024-05-21T12:37:47.968646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUceQf15wL2fFCX232"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "d6c3dfd5-1622-4bdf-9df1-8c0660534f5d", "DetectTime": "2024-05-21T12:37:47.979887+00:00", "EventTime": "2024-05-21T12:37:47.979908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9JyurSyPxj77fLi"], "accumulated_threat_level": 1.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "1e213e1a-da95-4a90-9596-981439401282", "DetectTime": "2024-05-21T12:37:47.984932+00:00", "EventTime": "2024-05-21T12:37:47.984951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR3m6uLSVEM7jcYs1"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "800992aa-a888-450e-8a16-db4ceea5c13d", "DetectTime": "2024-05-21T12:37:47.998957+00:00", "EventTime": "2024-05-21T12:37:47.998979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwPpN30AuXEKYmXcj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 96} +{"Format": "IDEA0", "ID": "c1dd1c76-809b-43e6-a605-a17993fc89a7", "DetectTime": "2024-05-21T12:37:48.038530+00:00", "EventTime": "2024-05-21T12:37:48.038552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcG2IY1FR5c2DRwrn1"], "accumulated_threat_level": 3.2, "timewindow": 96} +{"Format": "IDEA0", "ID": "d731f89b-c6aa-4c2d-ac02-e02f5f8741d0", "DetectTime": "2024-05-21T12:37:48.080696+00:00", "EventTime": "2024-05-21T12:37:48.080714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBg2r30zWgpbV5X3k"], "accumulated_threat_level": 4.0, "timewindow": 96} +{"Format": "IDEA0", "ID": "eedf6727-2449-4019-b8c5-4f364cb51ac9", "DetectTime": "2024-05-21T12:37:48.113389+00:00", "EventTime": "2024-05-21T12:37:48.113411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlM894W9m6Widrb8j"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "a606df3b-5fab-4f8a-b4de-416a6ac3b7ad", "DetectTime": "2024-05-21T12:37:48.154720+00:00", "EventTime": "2024-05-21T12:37:48.154740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPL3G7BM53tePBK9j"], "accumulated_threat_level": 4.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "3cf647e6-d8cf-469c-838b-99061ae3ce56", "DetectTime": "2024-05-21T12:37:48.448192+00:00", "EventTime": "2024-05-21T12:37:48.448212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hyD318ZX40zaAVHe"], "accumulated_threat_level": 5.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "86a64746-9932-4cd7-bca9-8673d1f22005", "DetectTime": "2024-05-21T12:37:48.477937+00:00", "EventTime": "2024-05-21T12:37:48.477957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.151.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXbopB2yk4jgZgB8p9"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ba8d7b57-94f3-4934-9103-be100f06fc2a", "DetectTime": "2024-05-21T12:37:48.540824+00:00", "EventTime": "2024-05-21T12:37:48.540843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.67.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpAKy22cPaaWFo0P9"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "9822aff4-49b4-498f-a932-c646e22de3d2", "DetectTime": "2024-05-21T12:37:48.772522+00:00", "EventTime": "2024-05-21T12:37:48.772544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CimIJd2kTiPmiyfQW3", "Cs5UlU1qyH6CnJte0f", "Cg3b7i4Sv3EbhK6469", "CdEHHu4P8jTiTpR5Da"], "accumulated_threat_level": 6.1, "timewindow": 96} +{"Format": "IDEA0", "ID": "02efb232-f2c7-49fd-8dda-a95c4658c220", "DetectTime": "2024-05-21T12:37:49.809285+00:00", "EventTime": "2024-05-21T12:37:49.809307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C201Oe5i7nZChNwFk"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "2812ef9f-8317-42ac-bf62-01f5e80835ea", "DetectTime": "2024-05-21T12:37:49.941512+00:00", "EventTime": "2024-05-21T12:37:49.941532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.118.81.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1iuX3FnVxL9vN2mg"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0c5a00a6-7cd3-4a1c-942d-c6862bb4e05d", "DetectTime": "2024-05-21T12:37:50.529398+00:00", "EventTime": "2024-05-21T12:37:50.529419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQaVDJ1sz7Jpxobdd3", "C0nK1z1GFFJoHxtEcf", "Ce5wzTpJI1kSSyfUa", "ClajEm28Ofk70f0Ob4"], "accumulated_threat_level": 6.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "85686150-a5aa-43fb-a783-02227d01e01d", "DetectTime": "2024-05-21T12:37:51.505462+00:00", "EventTime": "2024-05-21T12:37:51.505500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ciaa3j1iJ8secHRqJi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "fb2b0bb7-b700-4c00-af65-60eca3de7399", "DetectTime": "2024-05-21T12:37:51.622609+00:00", "EventTime": "2024-05-21T12:37:51.622630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTzWSW2JifO2CASrng"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "18c09b69-1b94-49e2-bfd9-01c7f2467253", "DetectTime": "2024-05-21T12:37:51.715572+00:00", "EventTime": "2024-05-21T12:37:51.715592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMiOY62CjiyQgZFefi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "f89bdead-6232-466a-b58a-12709786c5b6", "DetectTime": "2024-05-21T12:37:51.766246+00:00", "EventTime": "2024-05-21T12:37:51.766271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.105.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9CebXhCAJkedKTNg"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "7f1ab13a-1df6-48b4-aadf-a5356c0a0bc1", "DetectTime": "2024-05-21T12:37:51.830080+00:00", "EventTime": "2024-05-21T12:37:51.830098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZoz7G3ryDF8FVLRn2"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ae701fb4-fe38-4049-ad22-bd583c14e58d", "DetectTime": "2024-05-21T12:37:52.073678+00:00", "EventTime": "2024-05-21T12:37:52.073702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.70.71.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qLWx3CYdOBmiHFPj"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "6559409c-d9c1-45fc-930a-e6c3bb3dd0ce", "DetectTime": "2024-05-21T12:37:52.079177+00:00", "EventTime": "2024-05-21T12:37:52.079195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nj64pkp5q9wBwEe"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "ba4b7132-ebff-4d3c-9f3e-c099a5d630b5", "DetectTime": "2024-05-21T12:37:52.141886+00:00", "EventTime": "2024-05-21T12:37:52.141908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.89.116.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMjgP2zSAhi5SRHh8"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "04f42ea4-794a-4a5d-8dc8-84406762fb62", "DetectTime": "2024-05-21T12:37:52.199292+00:00", "EventTime": "2024-05-21T12:37:52.199312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.174.206.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeuB192pAMMZu4Aycg"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "b26a9a30-0ff7-4401-bb7e-877c17a7c1a5", "DetectTime": "2024-05-21T12:37:52.204494+00:00", "EventTime": "2024-05-21T12:37:52.204514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.9.147.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgZqR1QM4xE0rp9a"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "854502d8-c26c-4cc0-974a-d2d3df745564", "DetectTime": "2024-05-21T12:37:52.379463+00:00", "EventTime": "2024-05-21T12:37:52.379488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.205.178.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNpeDP30P7gR3Hpx18"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "3c966841-0fa0-4bb1-a829-a18d6fdcd3d0", "DetectTime": "2024-05-21T12:37:52.384195+00:00", "EventTime": "2024-05-21T12:37:52.384213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.146.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPukG5Dy6ZdR0o1pb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "6cb73446-c99d-4d19-98fd-ccd3a380961a", "DetectTime": "2024-05-21T12:37:52.433514+00:00", "EventTime": "2024-05-21T12:37:52.433536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZGNJ38HZFoGzqbTb"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "81587533-8fd0-4a3a-8a0c-5f942ea26191", "DetectTime": "2024-05-21T12:37:52.482837+00:00", "EventTime": "2024-05-21T12:37:52.482858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.158.2.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE1ryW3zPOY0JTDMLi"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "d46620cc-95de-40d4-8b2d-5c36b2c30aa8", "DetectTime": "2024-05-21T12:37:52.487897+00:00", "EventTime": "2024-05-21T12:37:52.487916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXWQY26uYt0td2Xu1"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "c1a7c147-86fb-431b-9dee-980a444efd0d", "DetectTime": "2024-05-21T12:37:52.551529+00:00", "EventTime": "2024-05-21T12:37:52.551551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEeCNB4Wua1fwMD8b6"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "0e07b0e9-540f-4d32-a4ff-fef83e7da607", "DetectTime": "2024-05-21T12:37:52.604432+00:00", "EventTime": "2024-05-21T12:37:52.604453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDpJq4HO9lFysL1D5"], "accumulated_threat_level": 4.0, "timewindow": 95} +{"Format": "IDEA0", "ID": "3e198531-60db-4536-a9e7-98bec1a3bed3", "DetectTime": "2024-05-21T12:37:52.808307+00:00", "EventTime": "2024-05-21T12:37:52.808328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2XEk2JUJyzqO9Uy7", "CiTvWV3ozBUMfwixT1", "CSjhnp33PkVTqylujf", "CvYior4xL7x7t05pgb"], "accumulated_threat_level": 7.1, "timewindow": 96} +{"Format": "IDEA0", "ID": "a99ad17e-f74e-4e82-ab28-0a88dfe4dab7", "DetectTime": "2024-05-21T12:37:53.527226+00:00", "EventTime": "2024-05-21T12:37:53.527249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbon03BWK8uzjcpBd"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "c0016f22-cbe0-4354-bd34-188c00a1a836", "DetectTime": "2024-05-21T12:37:53.614078+00:00", "EventTime": "2024-05-21T12:37:53.614097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0uIx2a9my7RxzvL8"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "ddc35cce-13b7-418f-add1-ec7dd9ce60e5", "DetectTime": "2024-05-21T12:37:53.939947+00:00", "EventTime": "2024-05-21T12:37:53.939967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.19.251.225"]}], "Attach": [{"Content": "Connection to unknown destination port 9616/UDP destination IP 87.19.251.225. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhcFFPvTMfc3Cy3d"], "accumulated_threat_level": 8.7, "timewindow": 96} +{"Format": "IDEA0", "ID": "328e59f4-a263-41df-ba2f-6436f88c8753", "DetectTime": "2024-05-21T12:37:54.103283+00:00", "EventTime": "2024-05-21T12:37:54.103304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOOuo2zlg99jGLmV7"], "accumulated_threat_level": 9.5, "timewindow": 96} +{"Format": "IDEA0", "ID": "f884e88b-3f8b-418f-b091-1c1451c5cee3", "DetectTime": "2024-05-21T12:37:54.352830+00:00", "EventTime": "2024-05-21T12:37:54.352848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44sge1dM5OLQZFYU3"], "accumulated_threat_level": 10.3, "timewindow": 96} +{"Format": "IDEA0", "ID": "29d3a167-29c9-47c5-bcc6-faa4ee8c8a46", "DetectTime": "2024-05-21T12:37:54.400921+00:00", "EventTime": "2024-05-21T12:37:54.400942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0VKm17uCb27ReA02"], "accumulated_threat_level": 11.100000000000001, "timewindow": 96} +{"Format": "IDEA0", "ID": "caf023c6-5f7f-48d1-a4b4-04b81a42a82c", "DetectTime": "2024-05-21T12:37:54.429564+00:00", "EventTime": "2024-05-21T12:37:54.429585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.70.40.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwBSFZ1kNNfsnNFDka"], "accumulated_threat_level": 11.100000000000001, "timewindow": 96} +{"Format": "IDEA0", "ID": "7b5d1177-f89d-4be7-a255-4915253b5f73", "DetectTime": "2024-05-21T12:37:54.465361+00:00", "EventTime": "2024-05-21T12:37:54.465381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.51.253"]}], "Attach": [{"Content": "Connection to unknown destination port 5060/UDP destination IP 176.73.51.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PgIB1N3Qga4zXiRe"], "accumulated_threat_level": 11.900000000000002, "timewindow": 96} +{"Format": "IDEA0", "ID": "b1f678b4-ae9f-44d3-954e-a9fe65d4173e", "DetectTime": "2024-05-21T12:37:54.503701+00:00", "EventTime": "2024-05-21T12:37:54.503723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5FV9c1fHH0wfeeiyk"], "accumulated_threat_level": 12.700000000000003, "timewindow": 96} +{"Format": "Json", "ID": "b1f678b4-ae9f-44d3-954e-a9fe65d4173e", "DetectTime": "2024-05-21T12:37:54.503701+00:00", "EventTime": "2024-05-21T12:37:54.503723+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "1970-01-04T23:54:49.198304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2024/05/21 12:37:54.829937)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 96, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "5e4c63ac-9731-4c3d-9ea7-a182c4716c01", "DetectTime": "2024-05-21T12:37:54.843269+00:00", "EventTime": "2024-05-21T12:37:54.843296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjn5v1OIbrUPrFhy"], "accumulated_threat_level": 0.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "029c71a8-6edb-4879-819b-7a9b863a576e", "DetectTime": "2024-05-21T12:37:54.848422+00:00", "EventTime": "2024-05-21T12:37:54.848440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.248.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNX5LNnJtThsNxOG6"], "accumulated_threat_level": 0.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "4c0a6f88-711d-4461-a84d-0d3d059a3ef3", "DetectTime": "2024-05-21T12:37:54.987792+00:00", "EventTime": "2024-05-21T12:37:54.987811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS35oa3BzDmCY37soc"], "accumulated_threat_level": 1.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "6c92b9a3-865f-4b18-9853-ea2f01fe2f01", "DetectTime": "2024-05-21T12:37:55.222290+00:00", "EventTime": "2024-05-21T12:37:55.222312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrlgi1LCe99B0soI2"], "accumulated_threat_level": 1.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "25e2fe0f-f09f-4c4d-bcb8-f7f8e6f65444", "DetectTime": "2024-05-21T12:37:55.227840+00:00", "EventTime": "2024-05-21T12:37:55.227858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.104.67.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAfq7q9efihEERO6"], "accumulated_threat_level": 1.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "8be39713-1cac-4f54-9ec4-40549c31f030", "DetectTime": "2024-05-21T12:37:55.238008+00:00", "EventTime": "2024-05-21T12:37:55.238034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.91.64.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2t7JY2P5DZBRIt0wb"], "accumulated_threat_level": 1.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "60c79518-bef5-47d8-bc31-5954fca9667e", "DetectTime": "2024-05-21T12:37:55.317549+00:00", "EventTime": "2024-05-21T12:37:55.317568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSye862dvTLfVv4Upg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 96} +{"Format": "IDEA0", "ID": "f313af31-7108-4f9f-8ca3-f90977b79b4a", "DetectTime": "2024-05-21T12:37:55.357969+00:00", "EventTime": "2024-05-21T12:37:55.357991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccfn8j2kWL5Q444VZ7"], "accumulated_threat_level": 3.2, "timewindow": 96} +{"Format": "IDEA0", "ID": "f7212604-0928-426f-94ea-e836cc353fb9", "DetectTime": "2024-05-21T12:37:55.385198+00:00", "EventTime": "2024-05-21T12:37:55.385216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.118.81.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeE4IhRhSN49nnjd"], "accumulated_threat_level": 3.2, "timewindow": 96} +{"Format": "IDEA0", "ID": "ec702b3d-0ec8-4e1e-bd6f-dce57a2c3584", "DetectTime": "2024-05-21T12:37:55.759569+00:00", "EventTime": "2024-05-21T12:37:55.759589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.70.71.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNw4yk2tVLaXu6Cxd6"], "accumulated_threat_level": 3.2, "timewindow": 96} +{"Format": "IDEA0", "ID": "124e8c5a-9cc2-4de6-b541-c7ca32ecca55", "DetectTime": "2024-05-21T12:37:55.803558+00:00", "EventTime": "2024-05-21T12:37:55.803583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbHeY2knVZ8lJs2Ng"], "accumulated_threat_level": 4.0, "timewindow": 96} +{"Format": "IDEA0", "ID": "07a55f5b-c2b3-4ceb-873c-719b1a82b4e6", "DetectTime": "2024-05-21T12:37:55.841824+00:00", "EventTime": "2024-05-21T12:37:55.841847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPS0cV2xCMxGsithY4"], "accumulated_threat_level": 4.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "9e2a44c5-e8bf-4578-8274-6cbf81007cb5", "DetectTime": "2024-05-21T12:37:56.063578+00:00", "EventTime": "2024-05-21T12:37:56.063600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.174.206.51 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZD493V2vaP4KGqac"], "accumulated_threat_level": 4.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "fa105752-4b13-4edd-9fa0-e6161c80b282", "DetectTime": "2024-05-21T12:37:56.103401+00:00", "EventTime": "2024-05-21T12:37:56.103418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChJ92C4aDwylhFOgc"], "accumulated_threat_level": 5.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "4dbd78a3-db10-4143-8f83-4532c2fd5d70", "DetectTime": "2024-05-21T12:37:56.138005+00:00", "EventTime": "2024-05-21T12:37:56.138024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ96f7L69Ef9rScge"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "889d9725-f857-476b-81a5-9b01119865e4", "DetectTime": "2024-05-21T12:37:56.178021+00:00", "EventTime": "2024-05-21T12:37:56.178040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUwLg3UJCI5OaVL29"], "accumulated_threat_level": 7.199999999999999, "timewindow": 96} +{"Format": "IDEA0", "ID": "3c155b7a-836e-4eb2-ae46-f61381d4fdb4", "DetectTime": "2024-05-21T12:37:56.216923+00:00", "EventTime": "2024-05-21T12:37:56.216942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL1nAr3UauV9ojNwDd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 96} +{"Format": "IDEA0", "ID": "580b4bfb-96e0-4b7f-a2e4-cdd834f1e9ff", "DetectTime": "2024-05-21T12:37:56.372824+00:00", "EventTime": "2024-05-21T12:37:56.372841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZoMhF2okg5yn5gmOf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 96} +{"Format": "IDEA0", "ID": "07c17edc-d90c-4492-8f31-2cf8d52fd57e", "DetectTime": "2024-05-21T12:37:56.426601+00:00", "EventTime": "2024-05-21T12:37:56.426621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURP6g2WbLH0ctUz82"], "accumulated_threat_level": 9.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "bdc362ff-25c6-4e30-9372-9f6efb0d1231", "DetectTime": "2024-05-21T12:37:56.478277+00:00", "EventTime": "2024-05-21T12:37:56.478297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1cqohGfX8V790zb"], "accumulated_threat_level": 10.4, "timewindow": 96} +{"Format": "IDEA0", "ID": "a2a44633-379e-4fe5-bac2-4347a6bce2fc", "DetectTime": "2024-05-21T12:37:56.530029+00:00", "EventTime": "2024-05-21T12:37:56.530048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDGlfv3LSkwvYmXBof"], "accumulated_threat_level": 11.200000000000001, "timewindow": 96} +{"Format": "IDEA0", "ID": "c695262d-7720-4021-a261-6ec36d7a57bb", "DetectTime": "2024-05-21T12:37:56.572421+00:00", "EventTime": "2024-05-21T12:37:56.572441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanBrn4BayNkjpwvja"], "accumulated_threat_level": 12.000000000000002, "timewindow": 96} +{"Format": "Json", "ID": "c695262d-7720-4021-a261-6ec36d7a57bb", "DetectTime": "2024-05-21T12:37:56.572421+00:00", "EventTime": "2024-05-21T12:37:56.572441+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "1970-01-04T23:55:44.385619+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 96. (real time 2024/05/21 12:37:56.866230)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 96, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "99ac8eb6-a8c2-4cfe-b198-9c957011fda1", "DetectTime": "2024-05-21T12:37:56.878366+00:00", "EventTime": "2024-05-21T12:37:56.878385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrbuHc48tm3v9nzf2j"], "accumulated_threat_level": 0.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "d0efa5f9-3bd1-45ef-98ab-a50bef637195", "DetectTime": "2024-05-21T12:37:56.889349+00:00", "EventTime": "2024-05-21T12:37:56.889367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWFRh3qALYsipD4k7"], "accumulated_threat_level": 1.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "8b5ef3da-fa19-4d60-be6b-54a7889d7066", "DetectTime": "2024-05-21T12:37:56.915961+00:00", "EventTime": "2024-05-21T12:37:56.915980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7z6dyY2G8JBjjzf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 96} +{"Format": "IDEA0", "ID": "d30110aa-ab63-484f-9d5e-6397def57a81", "DetectTime": "2024-05-21T12:37:56.946256+00:00", "EventTime": "2024-05-21T12:37:56.946279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 58.9.147.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKpE92AKB3F5KOr5j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 96} +{"Format": "IDEA0", "ID": "1efe095e-46f5-4d53-aff5-60c730e2eb3c", "DetectTime": "2024-05-21T12:37:56.982727+00:00", "EventTime": "2024-05-21T12:37:56.982748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT0Qvx4Vogpc9Nlv06"], "accumulated_threat_level": 3.2, "timewindow": 96} +{"Format": "IDEA0", "ID": "61abe0df-868e-4132-b4b8-2dfc91e4c457", "DetectTime": "2024-05-21T12:37:57.024009+00:00", "EventTime": "2024-05-21T12:37:57.024030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBk7E1kROy7GSoen9"], "accumulated_threat_level": 4.0, "timewindow": 96} +{"Format": "IDEA0", "ID": "f4599687-fd51-4ef9-9195-346d1802c410", "DetectTime": "2024-05-21T12:37:57.065093+00:00", "EventTime": "2024-05-21T12:37:57.065113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.158.2.78"]}], "Attach": [{"Content": "Connection to unknown destination port 8730/UDP destination IP 187.158.2.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTji453o5rlFug4krj"], "accumulated_threat_level": 4.8, "timewindow": 96} +{"Format": "IDEA0", "ID": "e0cce8e0-7bad-4a1b-a57d-59076b8b0b8f", "DetectTime": "2024-05-21T12:37:57.415731+00:00", "EventTime": "2024-05-21T12:37:57.415753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxM6mD4xBcIRc9exN2"], "accumulated_threat_level": 5.6, "timewindow": 96} +{"Format": "IDEA0", "ID": "831236e2-68ff-4293-a669-027d54277c3f", "DetectTime": "2024-05-21T12:37:57.468803+00:00", "EventTime": "2024-05-21T12:37:57.468827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUAi8u1ER6VOO9DTNk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "8e6f2393-503a-44bb-a750-8831cfa3363a", "DetectTime": "2024-05-21T12:37:57.613663+00:00", "EventTime": "2024-05-21T12:37:57.613694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkF44Y2IFhlRONGqU4"], "accumulated_threat_level": 0.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "773b63b7-cb07-4a9a-a62b-2a25b7b9e594", "DetectTime": "2024-05-21T12:37:57.639257+00:00", "EventTime": "2024-05-21T12:37:57.639281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5f1p74DTMzXszwn2b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f2776afe-d124-4b6a-a474-0e7bb607ed9e", "DetectTime": "2024-05-21T12:37:57.816678+00:00", "EventTime": "2024-05-21T12:37:57.816700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6NT45GDpzn7rAY4", "CWvrq11t98d8MFMVT7", "C1MHW73bco2PhAaUxl", "CBCeqB2DIck0a4zxdl"], "accumulated_threat_level": 1.3, "timewindow": 97} +{"Format": "IDEA0", "ID": "27040991-955c-463d-b231-3562e2ef2386", "DetectTime": "2024-05-21T12:37:57.884451+00:00", "EventTime": "2024-05-21T12:37:57.884471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdpgya21RG4J1fMrvf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "1ec78b76-d152-430e-990e-21c7b4cfd638", "DetectTime": "2024-05-21T12:37:57.913849+00:00", "EventTime": "2024-05-21T12:37:57.913872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp5bkMz3xxBVIZnjk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "6af3310b-926c-46f9-ae73-97536bba1c98", "DetectTime": "2024-05-21T12:37:57.950454+00:00", "EventTime": "2024-05-21T12:37:57.950479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFZ9L3nwVi3LKonKg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "ff7e4b22-987f-495f-a5e5-3962af2b92b5", "DetectTime": "2024-05-21T12:37:57.987392+00:00", "EventTime": "2024-05-21T12:37:57.987416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkWsT64sk8w2JL1SIk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "a7263161-af02-4d19-8d4f-8772f2232bbc", "DetectTime": "2024-05-21T12:37:58.024178+00:00", "EventTime": "2024-05-21T12:37:58.024200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgYgy3zhEFX7K8p07"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "c0ecb49d-b1da-485c-981c-f36501303613", "DetectTime": "2024-05-21T12:37:58.059654+00:00", "EventTime": "2024-05-21T12:37:58.059678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeiMa33DPUWcWmlNve"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "2ac4a377-be3a-47a3-88b1-42aa777b90fd", "DetectTime": "2024-05-21T12:37:58.093588+00:00", "EventTime": "2024-05-21T12:37:58.093610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw9mIC43N58cjAERFk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "29f27c90-ce3b-4816-9535-eb0d9957b478", "DetectTime": "2024-05-21T12:37:58.485931+00:00", "EventTime": "2024-05-21T12:37:58.485950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsP5Z543oryp7sVSKb"], "accumulated_threat_level": 2.1, "timewindow": 97} +{"Format": "IDEA0", "ID": "df5c50f7-7944-46cf-828a-8c96053501f4", "DetectTime": "2024-05-21T12:37:58.537930+00:00", "EventTime": "2024-05-21T12:37:58.537948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYVjW3DdgXpM6z8pj"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 97} +{"Format": "IDEA0", "ID": "b383cf22-51f2-4949-8058-b0736b498d08", "DetectTime": "2024-05-21T12:37:58.732245+00:00", "EventTime": "2024-05-21T12:37:58.732267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTmrPw1zy4UZTpo003"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "7f5ef2bd-7fcc-452d-a7ba-7a45a043a95e", "DetectTime": "2024-05-21T12:37:59.000064+00:00", "EventTime": "2024-05-21T12:37:59.000086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24ogF1V1lhScCWKkc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "fdabc3d1-b18b-4d9b-8529-fb12bb623c52", "DetectTime": "2024-05-21T12:37:59.006002+00:00", "EventTime": "2024-05-21T12:37:59.006027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWim9aqe1rckS5rb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "c7bfeacf-f2ec-4e34-9dfd-f7bd3fa3990d", "DetectTime": "2024-05-21T12:37:59.011167+00:00", "EventTime": "2024-05-21T12:37:59.011188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjb08m3Ufb7GqKiGme"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f0d3c0d9-d118-411c-92cf-4c5df0ca6b7e", "DetectTime": "2024-05-21T12:37:59.015707+00:00", "EventTime": "2024-05-21T12:37:59.015725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7vqN1y5VEDI5DSe4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "095a3bb1-41dd-4249-a117-811d8e99f47d", "DetectTime": "2024-05-21T12:37:59.064907+00:00", "EventTime": "2024-05-21T12:37:59.064924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheKGz4HTvTAqCRayf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f975f8e3-4634-471b-8a35-ce89c748fc64", "DetectTime": "2024-05-21T12:37:59.160950+00:00", "EventTime": "2024-05-21T12:37:59.160971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFf9nchoUMx7peU8b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "d6c99f39-9771-4cfa-8276-2c6480758162", "DetectTime": "2024-05-21T12:37:59.221215+00:00", "EventTime": "2024-05-21T12:37:59.221233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["178.215.217.209"]}], "Attach": [{"Content": "Connection to unknown destination port 18069/UDP destination IP 178.215.217.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiIVLkdFmhPaov4a"], "accumulated_threat_level": 3.7, "timewindow": 97} +{"Format": "IDEA0", "ID": "609f8465-9edf-4ae7-a2ff-d61e9aa7677d", "DetectTime": "2024-05-21T12:37:59.687497+00:00", "EventTime": "2024-05-21T12:37:59.687520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFTwK2zU8VhSIHVxb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "d83f9aed-203a-4469-93e2-4a6270b246a9", "DetectTime": "2024-05-21T12:37:59.787585+00:00", "EventTime": "2024-05-21T12:37:59.787603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSV5gur53dTDBn17"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "740c4332-d406-47aa-a9a6-93d6a98f716b", "DetectTime": "2024-05-21T12:37:59.827712+00:00", "EventTime": "2024-05-21T12:37:59.827735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjzjpz1o0Td0GiauJ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "e4d0119e-949a-46af-a40f-46add78587d2", "DetectTime": "2024-05-21T12:38:00.053148+00:00", "EventTime": "2024-05-21T12:38:00.053169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegTFC2tMzylLUbvN4"], "accumulated_threat_level": 4.5, "timewindow": 97} +{"Format": "IDEA0", "ID": "7fe913b1-8f7c-4a4a-87aa-e09ba8ccd7f4", "DetectTime": "2024-05-21T12:38:00.077713+00:00", "EventTime": "2024-05-21T12:38:00.077734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.8.121.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsjOr62EbXDXiChwaj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "e57f12ea-e11d-4f27-92f3-475507a753a8", "DetectTime": "2024-05-21T12:38:00.116623+00:00", "EventTime": "2024-05-21T12:38:00.116641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjtN83RNnjOisfLxd"], "accumulated_threat_level": 5.3, "timewindow": 97} +{"Format": "IDEA0", "ID": "5ccc071a-6314-48d2-b180-0ac5a6b342e2", "DetectTime": "2024-05-21T12:38:00.154439+00:00", "EventTime": "2024-05-21T12:38:00.154459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRba0w0YkHU1hFhb5", "CfuiOf2D9shlW6PAA4", "CfrwHF292hifoLW1c5", "CELBlo317ZevIMssH3"], "accumulated_threat_level": 5.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "1e0f0abc-3f25-4c75-8515-0f1523080c67", "DetectTime": "2024-05-21T12:38:00.488515+00:00", "EventTime": "2024-05-21T12:38:00.488537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZDYKE1Xv4b9RXJhik"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "89007bc8-a10f-40a5-b744-a9faad7fe6da", "DetectTime": "2024-05-21T12:38:00.526981+00:00", "EventTime": "2024-05-21T12:38:00.527001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.17.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxwSC1I7x57vn0jJ5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "d8a085c6-61e1-411c-b61a-8c063638fac4", "DetectTime": "2024-05-21T12:38:00.673843+00:00", "EventTime": "2024-05-21T12:38:00.673865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzgJdv3XdlhRThhPT2"], "accumulated_threat_level": 6.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "dd89e454-0087-4dc2-9073-ec1532be1514", "DetectTime": "2024-05-21T12:38:00.719035+00:00", "EventTime": "2024-05-21T12:38:00.719055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jKA14T6FElCjXSnb"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 97} +{"Format": "IDEA0", "ID": "58f27ae2-ead5-4eb7-ac64-330fab825340", "DetectTime": "2024-05-21T12:38:00.771350+00:00", "EventTime": "2024-05-21T12:38:00.771371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpzKv4xByX72znhTd"], "accumulated_threat_level": 8.2, "timewindow": 97} +{"Format": "IDEA0", "ID": "603a05aa-42ae-4250-a4c8-97e218576b3c", "DetectTime": "2024-05-21T12:38:00.812821+00:00", "EventTime": "2024-05-21T12:38:00.812841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkKux3fXJVpUIKA33"], "accumulated_threat_level": 9.0, "timewindow": 97} +{"Format": "IDEA0", "ID": "f39c74be-72d6-452f-b383-9ca6165e2975", "DetectTime": "2024-05-21T12:38:00.864808+00:00", "EventTime": "2024-05-21T12:38:00.864827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJvz4O3c1IjXhiisR3"], "accumulated_threat_level": 9.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "a878d72e-00c0-4436-84d1-124e79b17bc5", "DetectTime": "2024-05-21T12:38:00.918997+00:00", "EventTime": "2024-05-21T12:38:00.919018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2js3k3yl56JA72tZ7"], "accumulated_threat_level": 10.600000000000001, "timewindow": 97} +{"Format": "IDEA0", "ID": "197dee57-4e25-4fcd-ab12-48bfd2ef0d60", "DetectTime": "2024-05-21T12:38:01.149586+00:00", "EventTime": "2024-05-21T12:38:01.149609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmWqZtUg2Y3Wq5pE6"], "accumulated_threat_level": 11.400000000000002, "timewindow": 97} +{"Format": "IDEA0", "ID": "5fa52be6-99b4-43a5-b580-3376d3c7b72e", "DetectTime": "2024-05-21T12:38:01.190317+00:00", "EventTime": "2024-05-21T12:38:01.190338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FCkt2Qoc9aYeyov2"], "accumulated_threat_level": 12.200000000000003, "timewindow": 97} +{"Format": "Json", "ID": "5fa52be6-99b4-43a5-b580-3376d3c7b72e", "DetectTime": "2024-05-21T12:38:01.190317+00:00", "EventTime": "2024-05-21T12:38:01.190338+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-05T00:27:31.378869+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2024/05/21 12:38:01.449656)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 97, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "577621c8-d16b-412d-bf59-a67f186d9785", "DetectTime": "2024-05-21T12:38:01.464986+00:00", "EventTime": "2024-05-21T12:38:01.465005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfeEl3sikC7hs7Cdd"], "accumulated_threat_level": 0.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "b23097c3-0569-4da7-b908-61f8ceced435", "DetectTime": "2024-05-21T12:38:01.470005+00:00", "EventTime": "2024-05-21T12:38:01.470025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQh8XZwoE6bg0SK4g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "361034e1-ae9c-49e0-bd2e-d39178ba0ed7", "DetectTime": "2024-05-21T12:38:01.475559+00:00", "EventTime": "2024-05-21T12:38:01.475583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVEHPc1VLyyyP7Ieae"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "701e6c7c-85ae-4da3-a1af-2e19726b6c03", "DetectTime": "2024-05-21T12:38:01.481068+00:00", "EventTime": "2024-05-21T12:38:01.481091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7qidPFkepimuHxU2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "e6137815-93f6-4962-a7c4-2e86dfbf3d50", "DetectTime": "2024-05-21T12:38:01.486350+00:00", "EventTime": "2024-05-21T12:38:01.486371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.151.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jgCp1DHYT3WParq6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "4ab55c27-4851-4c69-b17d-96bae643707c", "DetectTime": "2024-05-21T12:38:01.497983+00:00", "EventTime": "2024-05-21T12:38:01.498002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdBjOL2K0HFeerWh"], "accumulated_threat_level": 1.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "a855bbb3-4b69-486d-908f-c8d466023bc3", "DetectTime": "2024-05-21T12:38:01.529816+00:00", "EventTime": "2024-05-21T12:38:01.529836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyppfN20vVW2FcViRk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 97} +{"Format": "IDEA0", "ID": "80e1cdf9-a5de-4a4c-87c0-2129b2c8f876", "DetectTime": "2024-05-21T12:38:01.579610+00:00", "EventTime": "2024-05-21T12:38:01.579632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVaQd3NS3cUrza6Z6"], "accumulated_threat_level": 3.2, "timewindow": 97} +{"Format": "IDEA0", "ID": "65567c92-e33e-4941-9939-e391f4629fb3", "DetectTime": "2024-05-21T12:38:01.618708+00:00", "EventTime": "2024-05-21T12:38:01.618729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfy6lQ1oX2coZ9NLVk"], "accumulated_threat_level": 4.0, "timewindow": 97} +{"Format": "IDEA0", "ID": "94e7938e-b567-429a-a1e7-e22c80293780", "DetectTime": "2024-05-21T12:38:01.852396+00:00", "EventTime": "2024-05-21T12:38:01.852417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7FtJX3pKgzoYSxDGi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f530bf89-01ea-4d79-8b9e-393ac9997bbc", "DetectTime": "2024-05-21T12:38:01.894647+00:00", "EventTime": "2024-05-21T12:38:01.894666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAopgV9Q1HXlRreri"], "accumulated_threat_level": 4.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "f9ea92a1-bceb-47d2-b98f-8a9950d26673", "DetectTime": "2024-05-21T12:38:01.899452+00:00", "EventTime": "2024-05-21T12:38:01.899470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJoId10zxFdpvlBHc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "242da6a2-e8cc-47b4-be30-f1744cfa987a", "DetectTime": "2024-05-21T12:38:01.967805+00:00", "EventTime": "2024-05-21T12:38:01.967823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1qJKqDnHt3CXnfl"], "accumulated_threat_level": 5.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "71fe0693-aeb9-4a48-83cf-fdc212e843ef", "DetectTime": "2024-05-21T12:38:01.973273+00:00", "EventTime": "2024-05-21T12:38:01.973297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWecry2IyObby1EP14"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "95cb9c3f-17ca-4956-b899-1c341a278cfc", "DetectTime": "2024-05-21T12:38:02.037463+00:00", "EventTime": "2024-05-21T12:38:02.037488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPXUT1O4kE8g2PlV3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f2e432e5-8ab6-458c-b4f6-a76f45443f33", "DetectTime": "2024-05-21T12:38:02.074597+00:00", "EventTime": "2024-05-21T12:38:02.074616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYI8enOon7PEOyLE9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 97} +{"Format": "IDEA0", "ID": "e7e1e77d-e7a4-4eea-a109-0e90fbd242dd", "DetectTime": "2024-05-21T12:38:02.101130+00:00", "EventTime": "2024-05-21T12:38:02.101152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwvJkA3HIKVnfCwwv5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "74d9cd1a-8872-4bd9-bf5c-9b7d17df5c47", "DetectTime": "2024-05-21T12:38:02.148497+00:00", "EventTime": "2024-05-21T12:38:02.148522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3pB23sIT0cz9QRIl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "e4383cdc-e7bd-4aac-9d5f-05a23cc92a3f", "DetectTime": "2024-05-21T12:38:02.153917+00:00", "EventTime": "2024-05-21T12:38:02.153937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.105.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsSGpD4VKtmA4B6qlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "27dc39fd-4d06-4767-a54b-05ca54d0a3ab", "DetectTime": "2024-05-21T12:38:02.185348+00:00", "EventTime": "2024-05-21T12:38:02.185383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRn9fF1ptf9GLsD2M5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "67ac2003-ec18-4ac6-bcbf-2ef657624862", "DetectTime": "2024-05-21T12:38:02.267194+00:00", "EventTime": "2024-05-21T12:38:02.267225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwa0q1CGmBsBu0Otd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "c438d65d-ba27-4e4f-a433-e3a5df4c15ce", "DetectTime": "2024-05-21T12:38:02.493742+00:00", "EventTime": "2024-05-21T12:38:02.493761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2rT5e2dPHb7hYDg4d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "009973c4-be46-4b9a-b9ec-712cebea96a1", "DetectTime": "2024-05-21T12:38:02.537108+00:00", "EventTime": "2024-05-21T12:38:02.537125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJEuGn32kZnhXvIfif"], "accumulated_threat_level": 9.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "39264198-e30f-40b2-b681-7f09e0d733a1", "DetectTime": "2024-05-21T12:38:02.665727+00:00", "EventTime": "2024-05-21T12:38:02.665746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqPXL3hPDf7gz2Pag"], "accumulated_threat_level": 10.4, "timewindow": 97} +{"Format": "IDEA0", "ID": "2b9204db-9b7a-4101-b403-7ee6af77faa2", "DetectTime": "2024-05-21T12:38:02.670593+00:00", "EventTime": "2024-05-21T12:38:02.670611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2EhbvbShXTqb896"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "655cf161-2cdd-45a9-8075-0d61f46d4247", "DetectTime": "2024-05-21T12:38:02.701203+00:00", "EventTime": "2024-05-21T12:38:02.701223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.146.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fhfg2laH5PTSbeUk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "15a1112b-88e3-413e-9cd1-2447f333df22", "DetectTime": "2024-05-21T12:38:02.728211+00:00", "EventTime": "2024-05-21T12:38:02.728234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.89.116.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0OCZo3p1WSOWQ2q2i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "904fcdb3-031d-42ea-8c14-d67e2a46ef37", "DetectTime": "2024-05-21T12:38:02.733285+00:00", "EventTime": "2024-05-21T12:38:02.733302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.205.178.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHU9YC2rBUmX4Y2IYd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "68cc37b7-72e0-4c7c-9021-81ae32f02cf3", "DetectTime": "2024-05-21T12:38:02.817016+00:00", "EventTime": "2024-05-21T12:38:02.817034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DPeE1hMG1Qrq8VOi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 97} +{"Format": "IDEA0", "ID": "eb5310b8-a73d-4466-977a-ecdcf64409d7", "DetectTime": "2024-05-21T12:38:02.871392+00:00", "EventTime": "2024-05-21T12:38:02.871410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDzAt2WVEUmuhPcj7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 97} +{"Format": "Json", "ID": "eb5310b8-a73d-4466-977a-ecdcf64409d7", "DetectTime": "2024-05-21T12:38:02.871392+00:00", "EventTime": "2024-05-21T12:38:02.871410+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-05T00:27:52.633500+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2024/05/21 12:38:03.035546)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 97, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7bb3c31c-a0f3-401a-81da-8862ec802246", "DetectTime": "2024-05-21T12:38:03.127979+00:00", "EventTime": "2024-05-21T12:38:03.128001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9JyurSyPxj77fLi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "46608cc1-46d8-4d59-9788-854a84a4e6aa", "DetectTime": "2024-05-21T12:38:03.134756+00:00", "EventTime": "2024-05-21T12:38:03.134777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.158.2.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwPpN30AuXEKYmXcj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "0b35890a-fb63-400a-b77b-6e9a216cbc56", "DetectTime": "2024-05-21T12:38:03.148648+00:00", "EventTime": "2024-05-21T12:38:03.148671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCw3l4o5tLCyVxjJj"], "accumulated_threat_level": 0.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "028876bf-45b8-4913-b9dc-ffdb27871d76", "DetectTime": "2024-05-21T12:38:03.154059+00:00", "EventTime": "2024-05-21T12:38:03.154079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcG2IY1FR5c2DRwrn1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "6ef95df7-be69-4b64-9a08-e9b5e217f10d", "DetectTime": "2024-05-21T12:38:03.201472+00:00", "EventTime": "2024-05-21T12:38:03.201494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBg2r30zWgpbV5X3k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "04599925-78d3-43f4-9ea3-b2b67e76716f", "DetectTime": "2024-05-21T12:38:03.315471+00:00", "EventTime": "2024-05-21T12:38:03.315490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WDpw2yQxzrt4j5v3"], "accumulated_threat_level": 1.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "f5c44504-2c93-4384-8810-c18f3b5e6800", "DetectTime": "2024-05-21T12:38:03.403205+00:00", "EventTime": "2024-05-21T12:38:03.403226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPL3G7BM53tePBK9j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "e4116c4a-7897-4650-be40-8aef7cd76b34", "DetectTime": "2024-05-21T12:38:03.545134+00:00", "EventTime": "2024-05-21T12:38:03.545155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hyD318ZX40zaAVHe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "5b433a90-a8f7-40ac-8b05-aed1ad77734f", "DetectTime": "2024-05-21T12:38:04.714247+00:00", "EventTime": "2024-05-21T12:38:04.714270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJlZoI2YnhLaBwDUpj", "CjgmfU2gpo8Wk8gU9g", "Cm0XJm25mYpq2M8dc2", "CRLZQqlb0plepIZ2k"], "accumulated_threat_level": 2.1, "timewindow": 97} +{"Format": "IDEA0", "ID": "8aac06ca-e776-4594-9e63-9a6908ccf8e9", "DetectTime": "2024-05-21T12:38:04.760501+00:00", "EventTime": "2024-05-21T12:38:04.760522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdSFze40O493eejDDk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "285b4f7c-2c5e-4abb-882b-7fccafd8b344", "DetectTime": "2024-05-21T12:38:05.073725+00:00", "EventTime": "2024-05-21T12:38:05.073744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8an363ZcsQImZRiXe"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 97} +{"Format": "IDEA0", "ID": "0d37d696-8317-4284-a48b-9b6acea71e4b", "DetectTime": "2024-05-21T12:38:05.329505+00:00", "EventTime": "2024-05-21T12:38:05.329525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.169.112 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3nHpg4K9GhRGLFWDi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "3b6060a0-6167-4a90-a791-3677871cfac1", "DetectTime": "2024-05-21T12:38:05.769244+00:00", "EventTime": "2024-05-21T12:38:05.769265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.8.121.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7zgu19DhK3MhwIGg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "1978e45c-d59f-4136-ae87-160259c2b470", "DetectTime": "2024-05-21T12:38:05.808534+00:00", "EventTime": "2024-05-21T12:38:05.808555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZfxR2yRzDRcQwLJk"], "accumulated_threat_level": 3.7, "timewindow": 97} +{"Format": "IDEA0", "ID": "4d1a9b54-71f1-4fac-ade3-aa77c84e0678", "DetectTime": "2024-05-21T12:38:06.056991+00:00", "EventTime": "2024-05-21T12:38:06.057009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQA3MC1FXfjuAqct0l"], "accumulated_threat_level": 4.5, "timewindow": 97} +{"Format": "IDEA0", "ID": "2f35c1e9-2421-4b37-91ea-da257e15ccb2", "DetectTime": "2024-05-21T12:38:06.097504+00:00", "EventTime": "2024-05-21T12:38:06.097523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFM8H3Kw4xa3qtMe5"], "accumulated_threat_level": 5.3, "timewindow": 97} +{"Format": "IDEA0", "ID": "66e43325-41d1-434f-93c1-d69cb38f62d4", "DetectTime": "2024-05-21T12:38:06.174206+00:00", "EventTime": "2024-05-21T12:38:06.174226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31qg41WvW58bPuvb3"], "accumulated_threat_level": 6.1, "timewindow": 97} +{"Format": "IDEA0", "ID": "957fd086-8765-4477-9980-274f56d53d7a", "DetectTime": "2024-05-21T12:38:06.228286+00:00", "EventTime": "2024-05-21T12:38:06.228304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgYCnT21kWFbGdjh33"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 97} +{"Format": "IDEA0", "ID": "a4e2a11e-6266-4163-af21-7bd2bb816527", "DetectTime": "2024-05-21T12:38:06.271755+00:00", "EventTime": "2024-05-21T12:38:06.271775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuZ372u2yTVRsdiyb"], "accumulated_threat_level": 7.699999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "8ee34a96-5188-488b-b7d7-01e1fa9451f2", "DetectTime": "2024-05-21T12:38:06.300139+00:00", "EventTime": "2024-05-21T12:38:06.300159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.17.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN2zbs1423BEULzxR7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "707b176a-85b0-49ee-9227-f5b26416a6dd", "DetectTime": "2024-05-21T12:38:06.335077+00:00", "EventTime": "2024-05-21T12:38:06.335097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CazTGw2o7sIRYpPMB2"], "accumulated_threat_level": 8.5, "timewindow": 97} +{"Format": "IDEA0", "ID": "4ba99a81-3125-4996-bbcc-984c5e8a5369", "DetectTime": "2024-05-21T12:38:06.561608+00:00", "EventTime": "2024-05-21T12:38:06.561628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9IOo2VrMaP8z4tLl"], "accumulated_threat_level": 9.3, "timewindow": 97} +{"Format": "IDEA0", "ID": "1599cbbe-3c65-4a64-9335-ce0d44041425", "DetectTime": "2024-05-21T12:38:06.616183+00:00", "EventTime": "2024-05-21T12:38:06.616203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tbxf1fVprizxGC9g"], "accumulated_threat_level": 10.100000000000001, "timewindow": 97} +{"Format": "IDEA0", "ID": "a3191eeb-0c44-40ee-b5fa-973d608be49f", "DetectTime": "2024-05-21T12:38:06.668455+00:00", "EventTime": "2024-05-21T12:38:06.668473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2742qj6J9AElbJ8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 97} +{"Format": "IDEA0", "ID": "69fbc5d8-a591-4864-98fb-a51aeac07d94", "DetectTime": "2024-05-21T12:38:06.703659+00:00", "EventTime": "2024-05-21T12:38:06.703678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqf7C1TG9eV82msYi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 97} +{"Format": "IDEA0", "ID": "7244bc3a-9c09-485a-b7b5-bf1df1306181", "DetectTime": "2024-05-21T12:38:06.766168+00:00", "EventTime": "2024-05-21T12:38:06.766189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv152Z99889qmyahk"], "accumulated_threat_level": 12.500000000000004, "timewindow": 97} +{"Format": "Json", "ID": "7244bc3a-9c09-485a-b7b5-bf1df1306181", "DetectTime": "2024-05-21T12:38:06.766168+00:00", "EventTime": "2024-05-21T12:38:06.766189+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-05T00:59:45.414218+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2024/05/21 12:38:06.997503)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 97, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "dffeb1c3-3978-4002-a668-a5904c5370a2", "DetectTime": "2024-05-21T12:38:07.010378+00:00", "EventTime": "2024-05-21T12:38:07.010399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtjOKz2nhr9UPu7JW6"], "accumulated_threat_level": 0.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "7641bf72-4cde-421b-a81f-d7ba5c6bba7f", "DetectTime": "2024-05-21T12:38:07.016449+00:00", "EventTime": "2024-05-21T12:38:07.016468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.105.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoRtRD2m4GNxGESdb1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "fad387ac-2b86-411f-a670-56debca6756a", "DetectTime": "2024-05-21T12:38:07.035816+00:00", "EventTime": "2024-05-21T12:38:07.035836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["98.20.5.95"]}], "Attach": [{"Content": "Connection to unknown destination port 4178/UDP destination IP 98.20.5.95. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ev852McDjrB6BW3f"], "accumulated_threat_level": 1.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "8db6e631-8688-4cdb-93aa-7f791f162a62", "DetectTime": "2024-05-21T12:38:07.088493+00:00", "EventTime": "2024-05-21T12:38:07.088513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C81JYu3oRXPrz5pplb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 97} +{"Format": "IDEA0", "ID": "0723ba60-a022-4340-aa48-2bb757d220cd", "DetectTime": "2024-05-21T12:38:07.142617+00:00", "EventTime": "2024-05-21T12:38:07.142637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clrsou2CSaYBnbHPth"], "accumulated_threat_level": 3.2, "timewindow": 97} +{"Format": "IDEA0", "ID": "d4304052-5726-4a0a-a644-95a7699a4c17", "DetectTime": "2024-05-21T12:38:07.249869+00:00", "EventTime": "2024-05-21T12:38:07.249888+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.238.16"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVClav1oiApYqNYP69"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "b1185820-47b7-403c-a0e7-03176c9dbc1f", "DetectTime": "2024-05-21T12:38:07.262675+00:00", "EventTime": "2024-05-21T12:38:07.262693+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.238.16"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.238.16 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVClav1oiApYqNYP69"], "accumulated_threat_level": 3.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "73257871-57fc-409b-8184-b7ff78922dba", "DetectTime": "2024-05-21T12:38:07.388753+00:00", "EventTime": "2024-05-21T12:38:07.388774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.89.116.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjm0W176bOcGvm4Qb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "a8b8a2d8-d7c0-45cb-8509-b5325ee0321a", "DetectTime": "2024-05-21T12:38:07.433326+00:00", "EventTime": "2024-05-21T12:38:07.433346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOBwFhvvHPd6g2ii"], "accumulated_threat_level": 4.0, "timewindow": 97} +{"Format": "IDEA0", "ID": "371c89bf-fde6-4d48-b8c9-d59998bb50d1", "DetectTime": "2024-05-21T12:38:07.472939+00:00", "EventTime": "2024-05-21T12:38:07.472957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBvkUjI9cnp5ra1W5"], "accumulated_threat_level": 4.8, "timewindow": 97} +{"Format": "IDEA0", "ID": "9b03f39d-ca92-4074-97da-7a10c0de8af4", "DetectTime": "2024-05-21T12:38:07.504618+00:00", "EventTime": "2024-05-21T12:38:07.504645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.205.178.217 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRdF8542SSA2xj2nr2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "1601fb9a-e373-49bd-9500-5cb06173a2b2", "DetectTime": "2024-05-21T12:38:07.541405+00:00", "EventTime": "2024-05-21T12:38:07.541428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.84.26.82"]}], "Attach": [{"Content": "Connection to unknown destination port 28328/UDP destination IP 2.84.26.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cit2Xr2ePFMl6RRUy3"], "accumulated_threat_level": 5.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "62b67136-7732-4bb2-acae-7afdcca8a0f5", "DetectTime": "2024-05-21T12:38:07.677794+00:00", "EventTime": "2024-05-21T12:38:07.677813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.43.182.45"]}], "Attach": [{"Content": "Connection to unknown destination port 19593/UDP destination IP 94.43.182.45. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3jCmY21gE3uriGHCg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 97} +{"Format": "IDEA0", "ID": "ea8ad4ee-6ed4-4654-94c7-ad0d0288550f", "DetectTime": "2024-05-21T12:38:07.717764+00:00", "EventTime": "2024-05-21T12:38:07.717783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ogRG2T23y2ZqFjy1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "1547c65e-9358-4f75-b510-de4247a1a6a6", "DetectTime": "2024-05-21T12:38:07.758930+00:00", "EventTime": "2024-05-21T12:38:07.758948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxe9uY2LdSZzcCACBj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "34857bc6-2e72-45cf-bcac-28026ced9439", "DetectTime": "2024-05-21T12:38:07.798859+00:00", "EventTime": "2024-05-21T12:38:07.798878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUT7JsEKNiI8HNwh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 97} +{"Format": "IDEA0", "ID": "21193a8e-443c-4557-a378-6af5d75588d6", "DetectTime": "2024-05-21T12:38:08.017444+00:00", "EventTime": "2024-05-21T12:38:08.017466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.146.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKd792DZVwCUaMOK7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "25e87780-7e71-44cc-8568-931351a14dbf", "DetectTime": "2024-05-21T12:38:08.053421+00:00", "EventTime": "2024-05-21T12:38:08.053441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czyzmx3ijzPUENtv24"], "accumulated_threat_level": 9.6, "timewindow": 97} +{"Format": "IDEA0", "ID": "a58679eb-6185-47f4-b57d-cbadc16923e4", "DetectTime": "2024-05-21T12:38:08.098719+00:00", "EventTime": "2024-05-21T12:38:08.098750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx8x373HYd5Oep8Tr7"], "accumulated_threat_level": 10.4, "timewindow": 97} +{"Format": "IDEA0", "ID": "4ddb1f79-91f0-479c-a21f-244c2a3a6029", "DetectTime": "2024-05-21T12:38:08.140492+00:00", "EventTime": "2024-05-21T12:38:08.140513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr0VJc2UO3M2PTTl6c"], "accumulated_threat_level": 11.200000000000001, "timewindow": 97} +{"Format": "IDEA0", "ID": "be86b54d-abd9-4c97-855d-a723c14afc4e", "DetectTime": "2024-05-21T12:38:08.180542+00:00", "EventTime": "2024-05-21T12:38:08.180563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "Connection to unknown destination port 7478/UDP destination IP 72.54.128.18. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsvPp2CrhNT0IBsyd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 97} +{"Format": "Json", "ID": "be86b54d-abd9-4c97-855d-a723c14afc4e", "DetectTime": "2024-05-21T12:38:08.180542+00:00", "EventTime": "2024-05-21T12:38:08.180563+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.54.128.18"]}], "Attach": [{"Content": "1970-01-05T00:59:50.318876+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 97. (real time 2024/05/21 12:38:08.388512)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 97, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1088dbe1-ee74-4c5a-b351-8c087f40deee", "DetectTime": "2024-05-21T12:38:08.399747+00:00", "EventTime": "2024-05-21T12:38:08.399769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxeFUE4LaUGwjlr9z6"], "accumulated_threat_level": 0.8, "timewindow": 98} +{"Format": "IDEA0", "ID": "60394b70-e46d-46d4-97a6-8e98d584fe8f", "DetectTime": "2024-05-21T12:38:08.570314+00:00", "EventTime": "2024-05-21T12:38:08.570338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbon03BWK8uzjcpBd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f3803817-f15a-46bb-b5db-8a2bd372e285", "DetectTime": "2024-05-21T12:38:09.116265+00:00", "EventTime": "2024-05-21T12:38:09.116286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNhcFFPvTMfc3Cy3d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "481449cb-2a70-4b66-9435-122fd4029024", "DetectTime": "2024-05-21T12:38:09.152180+00:00", "EventTime": "2024-05-21T12:38:09.152201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOOuo2zlg99jGLmV7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "450f845f-c616-4ef1-982e-cbf80a70e955", "DetectTime": "2024-05-21T12:38:09.383542+00:00", "EventTime": "2024-05-21T12:38:09.383562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44sge1dM5OLQZFYU3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "626a9c8a-d516-40e9-b606-4ce9a4992a7a", "DetectTime": "2024-05-21T12:38:09.632938+00:00", "EventTime": "2024-05-21T12:38:09.632957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftRC4B0cuchjGTb3"], "accumulated_threat_level": 1.6, "timewindow": 98} +{"Format": "IDEA0", "ID": "e957d00b-3ff9-434b-8a37-fc2877fd8f33", "DetectTime": "2024-05-21T12:38:09.658734+00:00", "EventTime": "2024-05-21T12:38:09.658754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEb2mgdHc3GhFmS3", "Cu1oX214mNaiZMkd7l", "CY2su014mbWGgWOq1l", "C0wDPV27VECYKCJof7"], "accumulated_threat_level": 2.1, "timewindow": 98} +{"Format": "IDEA0", "ID": "1425cbf5-52aa-4841-8093-f5a640d2c7d9", "DetectTime": "2024-05-21T12:38:09.683818+00:00", "EventTime": "2024-05-21T12:38:09.683843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5FV9c1fHH0wfeeiyk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "d6ca9bda-3ab8-4f0c-a900-d45e8cb379ed", "DetectTime": "2024-05-21T12:38:09.690242+00:00", "EventTime": "2024-05-21T12:38:09.690264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0VKm17uCb27ReA02"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "dd29988a-0a99-456b-876b-67ebf8ff3d29", "DetectTime": "2024-05-21T12:38:09.704719+00:00", "EventTime": "2024-05-21T12:38:09.704740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PgIB1N3Qga4zXiRe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f4ad9ad3-5fd2-454b-8ce6-4315ad60a0f7", "DetectTime": "2024-05-21T12:38:09.710831+00:00", "EventTime": "2024-05-21T12:38:09.710849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjn5v1OIbrUPrFhy"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "30852e34-8fb2-4b0a-a135-3692b9e7be38", "DetectTime": "2024-05-21T12:38:09.931908+00:00", "EventTime": "2024-05-21T12:38:09.931929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYvBwbYkEeeKBMv9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "b70e7a62-c05e-48fb-847b-ca6b9b22b1d1", "DetectTime": "2024-05-21T12:38:10.223201+00:00", "EventTime": "2024-05-21T12:38:10.223227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS35oa3BzDmCY37soc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "8a9d15fb-ff64-4dab-b47b-788145237ae5", "DetectTime": "2024-05-21T12:38:10.349256+00:00", "EventTime": "2024-05-21T12:38:10.349278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSye862dvTLfVv4Upg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "245513a4-09f9-4b79-af17-642afe27a755", "DetectTime": "2024-05-21T12:38:10.388966+00:00", "EventTime": "2024-05-21T12:38:10.388987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBgdpGdThuTveD95"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 98} +{"Format": "IDEA0", "ID": "3c097c43-7535-40e9-b19d-303f458fc60e", "DetectTime": "2024-05-21T12:38:10.422876+00:00", "EventTime": "2024-05-21T12:38:10.422897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccfn8j2kWL5Q444VZ7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "56432897-2f34-4816-93a8-cf757945d0e6", "DetectTime": "2024-05-21T12:38:10.658764+00:00", "EventTime": "2024-05-21T12:38:10.658786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwlTf62mpxybm7Rt46"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "9b942acf-9718-45b1-8320-76fe2ec14237", "DetectTime": "2024-05-21T12:38:10.677056+00:00", "EventTime": "2024-05-21T12:38:10.677075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCznQ93PiC3mBqSy9d"], "accumulated_threat_level": 3.7, "timewindow": 98} +{"Format": "IDEA0", "ID": "7adbcda6-80a7-4c05-8d45-1d0b16c465e7", "DetectTime": "2024-05-21T12:38:10.735619+00:00", "EventTime": "2024-05-21T12:38:10.735638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.105.8.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8076/UDP destination IP 113.105.8.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNla4j3W82QwnOeOi3"], "accumulated_threat_level": 4.5, "timewindow": 98} +{"Format": "IDEA0", "ID": "677cec5f-89ca-4c64-a68a-8f441c2ce6ac", "DetectTime": "2024-05-21T12:38:10.777408+00:00", "EventTime": "2024-05-21T12:38:10.777427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV7VpOTEVEMHuJxfa"], "accumulated_threat_level": 5.3, "timewindow": 98} +{"Format": "IDEA0", "ID": "7a63c189-acec-4c9a-af21-24c82d098d1b", "DetectTime": "2024-05-21T12:38:10.834503+00:00", "EventTime": "2024-05-21T12:38:10.834522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbHeY2knVZ8lJs2Ng"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "7e46723d-90cc-4c90-8bf1-5cafd8ca55c5", "DetectTime": "2024-05-21T12:38:11.068785+00:00", "EventTime": "2024-05-21T12:38:11.068805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPS0cV2xCMxGsithY4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "c0abbee2-cec3-459a-abd9-c479c1112789", "DetectTime": "2024-05-21T12:38:11.134201+00:00", "EventTime": "2024-05-21T12:38:11.134226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChJ92C4aDwylhFOgc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "c4fc978b-9a8d-432e-b716-a00c4e390eb0", "DetectTime": "2024-05-21T12:38:11.171959+00:00", "EventTime": "2024-05-21T12:38:11.171981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ96f7L69Ef9rScge"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "44f6e6d1-4006-4729-a7d0-664baafe6784", "DetectTime": "2024-05-21T12:38:11.211689+00:00", "EventTime": "2024-05-21T12:38:11.211707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNKZIM2v6JqQXiC2U6"], "accumulated_threat_level": 6.1, "timewindow": 98} +{"Format": "IDEA0", "ID": "68ee58f9-fe0a-4397-b55d-bd34b1466edd", "DetectTime": "2024-05-21T12:38:11.237991+00:00", "EventTime": "2024-05-21T12:38:11.238011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUwLg3UJCI5OaVL29"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "963376da-066f-4825-b504-d00f94957126", "DetectTime": "2024-05-21T12:38:11.501072+00:00", "EventTime": "2024-05-21T12:38:11.501091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1cXp19S3qSbYigAi"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 98} +{"Format": "IDEA0", "ID": "31dfa147-0ea0-45d9-a3f7-d566f6abafe8", "DetectTime": "2024-05-21T12:38:11.505902+00:00", "EventTime": "2024-05-21T12:38:11.505919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL1nAr3UauV9ojNwDd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "8687cc8f-4b05-451b-9e23-e2fdaf2552d8", "DetectTime": "2024-05-21T12:38:11.510642+00:00", "EventTime": "2024-05-21T12:38:11.510660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZoMhF2okg5yn5gmOf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "9134bc4c-c493-4588-9fca-d542f5441aa8", "DetectTime": "2024-05-21T12:38:11.516265+00:00", "EventTime": "2024-05-21T12:38:11.516284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURP6g2WbLH0ctUz82"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "2115673b-538f-4dca-9213-01290bf0bd30", "DetectTime": "2024-05-21T12:38:11.567812+00:00", "EventTime": "2024-05-21T12:38:11.567834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.151.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfeub3SLD7kP3Xobl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "effb402c-2875-4add-b7f6-0bf0b73281e7", "DetectTime": "2024-05-21T12:38:11.696840+00:00", "EventTime": "2024-05-21T12:38:11.696865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1cqohGfX8V790zb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "0f4ba7cc-af85-4a13-9323-544b26971d42", "DetectTime": "2024-05-21T12:38:11.705621+00:00", "EventTime": "2024-05-21T12:38:11.705642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDGlfv3LSkwvYmXBof"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "3aea4827-bf0d-42a5-a027-d77e02e7e318", "DetectTime": "2024-05-21T12:38:11.710349+00:00", "EventTime": "2024-05-21T12:38:11.710368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CanBrn4BayNkjpwvja"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "dfbee986-553f-45b4-a53e-e82f62272317", "DetectTime": "2024-05-21T12:38:11.741777+00:00", "EventTime": "2024-05-21T12:38:11.741797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWeW9L2Ka8jbUE26ia"], "accumulated_threat_level": 7.699999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "9fa9cedd-8aa1-4591-9436-d244361a85e7", "DetectTime": "2024-05-21T12:38:11.747028+00:00", "EventTime": "2024-05-21T12:38:11.747048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrbuHc48tm3v9nzf2j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "ef55f657-5434-4022-824b-462a7ea71e9e", "DetectTime": "2024-05-21T12:38:12.167621+00:00", "EventTime": "2024-05-21T12:38:12.167641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7z6dyY2G8JBjjzf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "5aa566e0-0cdd-4697-a1b3-c498ab9dfbb2", "DetectTime": "2024-05-21T12:38:12.173738+00:00", "EventTime": "2024-05-21T12:38:12.173758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWFRh3qALYsipD4k7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "73764167-2726-4244-8ccb-76eb55619eb0", "DetectTime": "2024-05-21T12:38:12.212421+00:00", "EventTime": "2024-05-21T12:38:12.212443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBk7E1kROy7GSoen9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "639f1a94-78b5-4cc0-be8f-d982bf8ee641", "DetectTime": "2024-05-21T12:38:12.248140+00:00", "EventTime": "2024-05-21T12:38:12.248162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.158.2.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTji453o5rlFug4krj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "9785a323-84aa-4c51-9b69-55a1df142daf", "DetectTime": "2024-05-21T12:38:12.253348+00:00", "EventTime": "2024-05-21T12:38:12.253366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT0Qvx4Vogpc9Nlv06"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "91b48bfa-bcb7-44e2-8dca-40f89da9ee95", "DetectTime": "2024-05-21T12:38:12.265366+00:00", "EventTime": "2024-05-21T12:38:12.265384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwHonUCLXsJ9L8H4"], "accumulated_threat_level": 8.5, "timewindow": 98} +{"Format": "IDEA0", "ID": "7bf7b3b7-6a77-4048-870d-1beade72c578", "DetectTime": "2024-05-21T12:38:12.293427+00:00", "EventTime": "2024-05-21T12:38:12.293449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmWap111bHXIzHWMb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "6c645750-6de6-4908-8f55-07433f8befdd", "DetectTime": "2024-05-21T12:38:12.415785+00:00", "EventTime": "2024-05-21T12:38:12.415805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CscMlH1gQ6qQERBlU2"], "accumulated_threat_level": 9.3, "timewindow": 98} +{"Format": "IDEA0", "ID": "f4e29159-87bd-40a7-b9ae-0dbcf36a18da", "DetectTime": "2024-05-21T12:38:12.688323+00:00", "EventTime": "2024-05-21T12:38:12.688344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUAi8u1ER6VOO9DTNk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "ebd64586-6097-48fe-a581-892b75953429", "DetectTime": "2024-05-21T12:38:12.694751+00:00", "EventTime": "2024-05-21T12:38:12.694775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxM6mD4xBcIRc9exN2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 96} +{"Format": "IDEA0", "ID": "f78cbb2e-74ea-4dd7-a49b-054b06135c80", "DetectTime": "2024-05-21T12:38:12.713075+00:00", "EventTime": "2024-05-21T12:38:12.713094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhvVz206tnvONHc62"], "accumulated_threat_level": 10.100000000000001, "timewindow": 98} +{"Format": "IDEA0", "ID": "b9264abb-f92a-403c-ba3b-5134bb1fb0ab", "DetectTime": "2024-05-21T12:38:12.819022+00:00", "EventTime": "2024-05-21T12:38:12.819046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkF44Y2IFhlRONGqU4"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "5e7db87a-d440-430b-89ad-828e287880bd", "DetectTime": "2024-05-21T12:38:12.865085+00:00", "EventTime": "2024-05-21T12:38:12.865104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nEKW2wxTAy61cRx8"], "accumulated_threat_level": 10.900000000000002, "timewindow": 98} +{"Format": "IDEA0", "ID": "6d5f0e43-e3df-4367-9df6-dd3dc0b8112c", "DetectTime": "2024-05-21T12:38:12.908251+00:00", "EventTime": "2024-05-21T12:38:12.908269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CngKbs2YV6cZVgzF43"], "accumulated_threat_level": 11.700000000000003, "timewindow": 98} +{"Format": "IDEA0", "ID": "4fcf5082-8acc-4f6d-a982-bc84ff5d9403", "DetectTime": "2024-05-21T12:38:12.914255+00:00", "EventTime": "2024-05-21T12:38:12.914273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch929J2wKwRO8yTIRh", "CBQxZL3dViUXS3FCb4", "CJfpwNqasY12dVcka", "C79d4e10g4CPDpI7k8"], "accumulated_threat_level": 12.200000000000003, "timewindow": 98} +{"Format": "Json", "ID": "4fcf5082-8acc-4f6d-a982-bc84ff5d9403", "DetectTime": "2024-05-21T12:38:12.914255+00:00", "EventTime": "2024-05-21T12:38:12.914273+00:00", "Category": "Alert", "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "1970-01-05T01:32:04.746020+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 98. (real time 2024/05/21 12:38:13.169043)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 98, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "feac848f-c4f8-4a79-a8a1-4e07f8c45a51", "DetectTime": "2024-05-21T12:38:13.186091+00:00", "EventTime": "2024-05-21T12:38:13.186110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwikRt45mSrVtXxKWl"], "accumulated_threat_level": 0.8, "timewindow": 98} +{"Format": "IDEA0", "ID": "8f4f5f31-9e8a-40b1-8d8b-6ce1132ecaa6", "DetectTime": "2024-05-21T12:38:13.197706+00:00", "EventTime": "2024-05-21T12:38:13.197724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwojk42Zri770ZDUk9"], "accumulated_threat_level": 1.6, "timewindow": 98} +{"Format": "IDEA0", "ID": "9635ffbf-1dec-455d-a349-95d124bf7d4f", "DetectTime": "2024-05-21T12:38:13.209011+00:00", "EventTime": "2024-05-21T12:38:13.209030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C89pdg3LNm68C5ro5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 98} +{"Format": "IDEA0", "ID": "6912128a-9777-412c-9557-1dd08fb020a8", "DetectTime": "2024-05-21T12:38:13.336053+00:00", "EventTime": "2024-05-21T12:38:13.336074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mQ2l4fcpHoefVxMf"], "accumulated_threat_level": 3.2, "timewindow": 98} +{"Format": "IDEA0", "ID": "4ebccd36-dd69-4dcc-a289-0d046fee761a", "DetectTime": "2024-05-21T12:38:13.413273+00:00", "EventTime": "2024-05-21T12:38:13.413294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsHIjrqdsIpfVx5e"], "accumulated_threat_level": 4.0, "timewindow": 98} +{"Format": "IDEA0", "ID": "f383f93f-9d89-4df8-9830-2d2e3e729e0a", "DetectTime": "2024-05-21T12:38:13.466074+00:00", "EventTime": "2024-05-21T12:38:13.466092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 6179/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClIWV52T1blpMrsllk"], "accumulated_threat_level": 4.8, "timewindow": 98} +{"Format": "IDEA0", "ID": "c7494a87-dc0e-4334-8d6d-26c3a5ecc753", "DetectTime": "2024-05-21T12:38:13.518216+00:00", "EventTime": "2024-05-21T12:38:13.518238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsP5Z543oryp7sVSKb"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "7d7fb06e-5c82-4be3-a481-2241230c5a0d", "DetectTime": "2024-05-21T12:38:13.569703+00:00", "EventTime": "2024-05-21T12:38:13.569724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYVjW3DdgXpM6z8pj"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "bc1721eb-1192-4e38-8891-9b469359c080", "DetectTime": "2024-05-21T12:38:13.605117+00:00", "EventTime": "2024-05-21T12:38:13.605138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 84.151.242.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6MgfWMBkieMa7mwb"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "18e4744a-4a5b-4601-9afb-b73029addcce", "DetectTime": "2024-05-21T12:38:13.707786+00:00", "EventTime": "2024-05-21T12:38:13.707805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzY72IaRaSUgFtNl"], "accumulated_threat_level": 5.6, "timewindow": 98} +{"Format": "IDEA0", "ID": "b3f14e91-a6aa-4eb0-a7f8-921a6911e6c9", "DetectTime": "2024-05-21T12:38:13.757864+00:00", "EventTime": "2024-05-21T12:38:13.757883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ErVd310Zsxrgq7h9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 98} +{"Format": "IDEA0", "ID": "f85dc8d8-4b68-450e-bc0f-e196fafb5e8f", "DetectTime": "2024-05-21T12:38:13.801281+00:00", "EventTime": "2024-05-21T12:38:13.801303+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.169.27.248"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1avgfVO0H3IvfNNk"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "432d8c9c-db3c-49af-8bb1-1cbfab9d6a35", "DetectTime": "2024-05-21T12:38:13.813573+00:00", "EventTime": "2024-05-21T12:38:13.813592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.169.27.248"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.169.27.248 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1avgfVO0H3IvfNNk"], "accumulated_threat_level": 4.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "d5639f10-0e90-4f8a-8512-970e473f88b2", "DetectTime": "2024-05-21T12:38:14.086958+00:00", "EventTime": "2024-05-21T12:38:14.086978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF5K1S1KWDdTIvyyJl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "af610ab6-d90d-465b-a728-47c1782d2314", "DetectTime": "2024-05-21T12:38:14.205740+00:00", "EventTime": "2024-05-21T12:38:14.205760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5pXx2rlwMTYze9a1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "71ebcc41-ff1b-4dc7-b59c-bf4a231dba7f", "DetectTime": "2024-05-21T12:38:14.260023+00:00", "EventTime": "2024-05-21T12:38:14.260046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYiIVLkdFmhPaov4a"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "d3b5b7ce-6b71-49ee-b023-908d76140f31", "DetectTime": "2024-05-21T12:38:14.294902+00:00", "EventTime": "2024-05-21T12:38:14.294933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZnVQ2mKD7t8QyX4f"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "85305e18-489c-41bc-af33-af88267fd748", "DetectTime": "2024-05-21T12:38:14.337887+00:00", "EventTime": "2024-05-21T12:38:14.337908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCmJmlmbtgrK3VM7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "7ac2f1c7-de86-45e0-8975-922d0685e496", "DetectTime": "2024-05-21T12:38:15.092337+00:00", "EventTime": "2024-05-21T12:38:15.092355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegTFC2tMzylLUbvN4"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "4753e34e-8802-493a-bc11-6c08d6d37c1e", "DetectTime": "2024-05-21T12:38:15.149069+00:00", "EventTime": "2024-05-21T12:38:15.149092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjtN83RNnjOisfLxd"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "9ad6c2ae-5df2-4eb4-a358-6fc61fd9225a", "DetectTime": "2024-05-21T12:38:15.189093+00:00", "EventTime": "2024-05-21T12:38:15.189117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuTTmI3Z4ywNTvXM6k"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "3d106156-f775-4ceb-9c6f-2f3457ab5c25", "DetectTime": "2024-05-21T12:38:15.592469+00:00", "EventTime": "2024-05-21T12:38:15.592490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNMAVyJ1kiDhjCNA5"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "f981c6b6-31d9-420f-ab66-62d8ef624e7b", "DetectTime": "2024-05-21T12:38:15.698615+00:00", "EventTime": "2024-05-21T12:38:15.698637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzgJdv3XdlhRThhPT2"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "ab7c8792-092c-4ff0-bf75-9c3b133e9fd6", "DetectTime": "2024-05-21T12:38:15.750672+00:00", "EventTime": "2024-05-21T12:38:15.750693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jKA14T6FElCjXSnb"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "2a93459d-2d1b-4bfc-90f1-91df1da1cf0e", "DetectTime": "2024-05-21T12:38:15.999429+00:00", "EventTime": "2024-05-21T12:38:15.999452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpzKv4xByX72znhTd"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "8e9ab7f4-97d6-4676-9cf1-5c1150bb3a3e", "DetectTime": "2024-05-21T12:38:16.005704+00:00", "EventTime": "2024-05-21T12:38:16.005728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkKux3fXJVpUIKA33"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "2d3017f9-bfc0-48a5-bfc1-ee3f9461fe9f", "DetectTime": "2024-05-21T12:38:16.010601+00:00", "EventTime": "2024-05-21T12:38:16.010620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJvz4O3c1IjXhiisR3"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "a3408abb-f972-4234-9dc7-e1ac113ee044", "DetectTime": "2024-05-21T12:38:16.041174+00:00", "EventTime": "2024-05-21T12:38:16.041194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGVhO83lof2QXo63K4"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e09fe8d6-b2fe-4630-ab05-0abb00a0fe9d", "DetectTime": "2024-05-21T12:38:16.143322+00:00", "EventTime": "2024-05-21T12:38:16.143343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2js3k3yl56JA72tZ7"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "b985312d-3258-4868-938e-e723453b5f19", "DetectTime": "2024-05-21T12:38:16.182520+00:00", "EventTime": "2024-05-21T12:38:16.182543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmWqZtUg2Y3Wq5pE6"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "8cf69b2e-f187-40f8-93fd-d88dd80f33ef", "DetectTime": "2024-05-21T12:38:16.225499+00:00", "EventTime": "2024-05-21T12:38:16.225521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FCkt2Qoc9aYeyov2"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "ac9142f9-5b3a-47cb-9f99-ffc604dc6fa2", "DetectTime": "2024-05-21T12:38:16.276133+00:00", "EventTime": "2024-05-21T12:38:16.276157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfeEl3sikC7hs7Cdd"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "3a23760c-fdf2-4200-b718-c74df10240e7", "DetectTime": "2024-05-21T12:38:16.319884+00:00", "EventTime": "2024-05-21T12:38:16.319906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1pvSH3zfGs2vjOgR1", "Cf9iXT1vyNUtNkhvl", "Cy7twq2pFTYp97PZF5", "Cv1OnWRiVp5C6rFkb"], "accumulated_threat_level": 1.3, "timewindow": 99} +{"Format": "IDEA0", "ID": "ab567c01-1e90-4716-a21c-62cf104762bc", "DetectTime": "2024-05-21T12:38:16.522053+00:00", "EventTime": "2024-05-21T12:38:16.522074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdBjOL2K0HFeerWh"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "af1c97a4-9a27-446f-8488-e92129d31983", "DetectTime": "2024-05-21T12:38:16.558460+00:00", "EventTime": "2024-05-21T12:38:16.558481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyppfN20vVW2FcViRk"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "0746db39-c107-4fed-8000-6106b29b9d03", "DetectTime": "2024-05-21T12:38:16.797698+00:00", "EventTime": "2024-05-21T12:38:16.797720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVaQd3NS3cUrza6Z6"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "33664b79-b393-4d92-9507-6386f610ffb0", "DetectTime": "2024-05-21T12:38:16.857174+00:00", "EventTime": "2024-05-21T12:38:16.857195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfy6lQ1oX2coZ9NLVk"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "1f2ca512-707e-4c84-ba6e-82c4886c4e19", "DetectTime": "2024-05-21T12:38:16.955725+00:00", "EventTime": "2024-05-21T12:38:16.955745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAopgV9Q1HXlRreri"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "22a42cbd-a6c8-472d-9b83-fac6e5942f1d", "DetectTime": "2024-05-21T12:38:17.031029+00:00", "EventTime": "2024-05-21T12:38:17.031051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1qJKqDnHt3CXnfl"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "61843979-e3a8-4aa0-aeb8-307d4da6b8d7", "DetectTime": "2024-05-21T12:38:17.113449+00:00", "EventTime": "2024-05-21T12:38:17.113471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYI8enOon7PEOyLE9"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "bc6460c6-b3a1-4135-bfec-6f388f2792e5", "DetectTime": "2024-05-21T12:38:17.249286+00:00", "EventTime": "2024-05-21T12:38:17.249308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRn9fF1ptf9GLsD2M5"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "4842e4d8-344f-4b12-93fe-64a5a651de11", "DetectTime": "2024-05-21T12:38:17.485394+00:00", "EventTime": "2024-05-21T12:38:17.485412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwa0q1CGmBsBu0Otd"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "0f9eeb87-c4ff-414b-8a33-92dede63b7ed", "DetectTime": "2024-05-21T12:38:17.635176+00:00", "EventTime": "2024-05-21T12:38:17.635194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2rT5e2dPHb7hYDg4d"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "b93c48ba-5ceb-47a3-8385-d2d100dbced8", "DetectTime": "2024-05-21T12:38:17.668499+00:00", "EventTime": "2024-05-21T12:38:17.668521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJEuGn32kZnhXvIfif"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "a63e1657-a03f-4e5f-8c7b-5d34c72b0dca", "DetectTime": "2024-05-21T12:38:17.766656+00:00", "EventTime": "2024-05-21T12:38:17.766677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqPXL3hPDf7gz2Pag"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "f47ca933-d338-490a-a9f4-78aaaa8c7dd7", "DetectTime": "2024-05-21T12:38:17.998644+00:00", "EventTime": "2024-05-21T12:38:17.998666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.158.2.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1OW7dRHMOe23Rs9"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "134cfcbd-b08b-41ac-afc6-7f7c04e34e35", "DetectTime": "2024-05-21T12:38:18.004229+00:00", "EventTime": "2024-05-21T12:38:18.004254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DPeE1hMG1Qrq8VOi"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "ddca32bb-8ae2-4d50-a1d5-ad5f107c8f14", "DetectTime": "2024-05-21T12:38:18.106351+00:00", "EventTime": "2024-05-21T12:38:18.106371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDzAt2WVEUmuhPcj7"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "83c3936f-39ac-41c2-bbdc-a9e864c95b52", "DetectTime": "2024-05-21T12:38:18.281758+00:00", "EventTime": "2024-05-21T12:38:18.281777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMCw3l4o5tLCyVxjJj"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "c2371a04-2cff-4989-bcbd-4ab7b9c9bca1", "DetectTime": "2024-05-21T12:38:18.404733+00:00", "EventTime": "2024-05-21T12:38:18.404758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1WDpw2yQxzrt4j5v3"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "c644e7da-1a05-436f-b66f-37f03e9c01e8", "DetectTime": "2024-05-21T12:38:18.468052+00:00", "EventTime": "2024-05-21T12:38:18.468071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EuirnfFNX3Br6P2"], "accumulated_threat_level": 2.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "4c1999e4-53d1-49d2-afff-7c5417fddeda", "DetectTime": "2024-05-21T12:38:18.705468+00:00", "EventTime": "2024-05-21T12:38:18.705485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gIwaveg2AluRrA9"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "0ff3bfef-e7e5-481b-a726-1d5ed80888e2", "DetectTime": "2024-05-21T12:38:18.747412+00:00", "EventTime": "2024-05-21T12:38:18.747430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdaJnL2lhGGjAu3dll"], "accumulated_threat_level": 3.7, "timewindow": 99} +{"Format": "IDEA0", "ID": "b7fa1c38-1ca0-492c-a710-96865c0d1135", "DetectTime": "2024-05-21T12:38:18.805129+00:00", "EventTime": "2024-05-21T12:38:18.805152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0k0xF4JEgV7JxAi72"], "accumulated_threat_level": 4.5, "timewindow": 99} +{"Format": "IDEA0", "ID": "7ae93c15-f327-4020-bbaa-40a5dc95be57", "DetectTime": "2024-05-21T12:38:18.850647+00:00", "EventTime": "2024-05-21T12:38:18.850665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmC3lX5EF3ziU379"], "accumulated_threat_level": 5.3, "timewindow": 99} +{"Format": "IDEA0", "ID": "47fc7052-5f7c-4b90-811c-28cf9f196439", "DetectTime": "2024-05-21T12:38:19.084562+00:00", "EventTime": "2024-05-21T12:38:19.084582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWry8k4qrYPUoVDh49"], "accumulated_threat_level": 6.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "67154a08-4658-4711-88a6-82755b75cba6", "DetectTime": "2024-05-21T12:38:19.113197+00:00", "EventTime": "2024-05-21T12:38:19.113218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.19.251.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRm1U1c657G8pdNR1"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "f68cd818-abc5-4ada-b282-aeb83d4fc3f5", "DetectTime": "2024-05-21T12:38:19.275236+00:00", "EventTime": "2024-05-21T12:38:19.275258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CId1Td13nnkegtnSkg"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "7d6e0093-bf5f-4691-bba7-77cd09bf7edf", "DetectTime": "2024-05-21T12:38:19.302524+00:00", "EventTime": "2024-05-21T12:38:19.302545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkYCq3B5qIkSTiK84"], "accumulated_threat_level": 7.699999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "46f0d445-4ebf-4e2c-92a9-fbe8c2c87533", "DetectTime": "2024-05-21T12:38:19.343108+00:00", "EventTime": "2024-05-21T12:38:19.343126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVn5X32FSzjyQy8bk2"], "accumulated_threat_level": 8.5, "timewindow": 99} +{"Format": "IDEA0", "ID": "8ec3be4c-eeef-47df-8b5f-8dc8c8ac7938", "DetectTime": "2024-05-21T12:38:19.387806+00:00", "EventTime": "2024-05-21T12:38:19.387825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1O4b8icUDvyUYjf9"], "accumulated_threat_level": 9.3, "timewindow": 99} +{"Format": "IDEA0", "ID": "2ab4d2c9-4afc-44ff-80f6-21e2d7f4321d", "DetectTime": "2024-05-21T12:38:19.427308+00:00", "EventTime": "2024-05-21T12:38:19.427330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["174.7.220.125"]}], "Attach": [{"Content": "Connection to unknown destination port 4786/UDP destination IP 174.7.220.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWhXI3ZMDph5Wrlg6"], "accumulated_threat_level": 10.100000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "ac4c8e57-c43f-4856-8de6-5a92b024cdd5", "DetectTime": "2024-05-21T12:38:19.468218+00:00", "EventTime": "2024-05-21T12:38:19.468240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP7OOt3Hhds1kZGSH6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 99} +{"Format": "IDEA0", "ID": "04e55deb-f624-4b70-b441-6bf015ff8f8c", "DetectTime": "2024-05-21T12:38:19.510368+00:00", "EventTime": "2024-05-21T12:38:19.510388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWsWrR3pBfdq3bbumf"], "accumulated_threat_level": 11.700000000000003, "timewindow": 99} +{"Format": "IDEA0", "ID": "fcd04b76-a82a-4f14-863e-0f73c100faa6", "DetectTime": "2024-05-21T12:38:19.750501+00:00", "EventTime": "2024-05-21T12:38:19.750519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTa9E4xyvRcHV1QZ4"], "accumulated_threat_level": 12.500000000000004, "timewindow": 99} +{"Format": "Json", "ID": "fcd04b76-a82a-4f14-863e-0f73c100faa6", "DetectTime": "2024-05-21T12:38:19.750501+00:00", "EventTime": "2024-05-21T12:38:19.750519+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-05T02:04:10.882360+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2024/05/21 12:38:19.960063)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 99, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "d6783dd4-d92f-4385-bbf6-65248d7b06e4", "DetectTime": "2024-05-21T12:38:19.972099+00:00", "EventTime": "2024-05-21T12:38:19.972119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9xPCAZRdv0a80uDh"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "df035db6-86d7-46d2-b428-44396be132b1", "DetectTime": "2024-05-21T12:38:19.982647+00:00", "EventTime": "2024-05-21T12:38:19.982665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch0cGP3LImdCXOfVhi"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "677e3f79-7cfa-4870-a86d-8013c89788ce", "DetectTime": "2024-05-21T12:38:19.993482+00:00", "EventTime": "2024-05-21T12:38:19.993500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9btndJR8lKKE1th"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "15a2fe96-ca8d-4f96-8609-e079f0bc948f", "DetectTime": "2024-05-21T12:38:20.005166+00:00", "EventTime": "2024-05-21T12:38:20.005183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["72.22.146.222"]}], "Attach": [{"Content": "Connection to unknown destination port 16179/UDP destination IP 72.22.146.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHAip3BGXUhb10AF5"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "848317bd-9095-468b-9aa5-ca4fd4f3d1a3", "DetectTime": "2024-05-21T12:38:20.015563+00:00", "EventTime": "2024-05-21T12:38:20.015581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eFjA3FwJaltG5Qej"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "6e5e44f1-8e68-4435-a88d-b7535f41bcee", "DetectTime": "2024-05-21T12:38:20.027472+00:00", "EventTime": "2024-05-21T12:38:20.027495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCDJc8waF0aljSCl"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e1d41475-7996-46bd-8d44-3ae8000d1023", "DetectTime": "2024-05-21T12:38:20.259354+00:00", "EventTime": "2024-05-21T12:38:20.259377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQC00y3SPsRpOekesi"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "8d982611-6bb8-4e22-966e-59d47ac8dba2", "DetectTime": "2024-05-21T12:38:20.300828+00:00", "EventTime": "2024-05-21T12:38:20.300849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgfibIQ9gY2CdqZi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "a4424713-4027-400c-9cfc-ba05448bb7a3", "DetectTime": "2024-05-21T12:38:20.550823+00:00", "EventTime": "2024-05-21T12:38:20.550845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.51.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YK7flxwWflOsjj1"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "b7b4e00c-a25b-404a-acb1-e0211c00ceaa", "DetectTime": "2024-05-21T12:38:20.556254+00:00", "EventTime": "2024-05-21T12:38:20.556273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8an363ZcsQImZRiXe"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "9976d5d8-128b-45a3-832a-7625d3b04dba", "DetectTime": "2024-05-21T12:38:20.561684+00:00", "EventTime": "2024-05-21T12:38:20.561705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.158.2.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdSdt3HhEWkERHqj6"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "c7d49193-cce3-46e4-bbf7-6e5ebcf3214b", "DetectTime": "2024-05-21T12:38:20.703217+00:00", "EventTime": "2024-05-21T12:38:20.703239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJnKzdP2IWdXxiQbg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "86826017-c308-4072-837c-5e391b65534e", "DetectTime": "2024-05-21T12:38:20.805901+00:00", "EventTime": "2024-05-21T12:38:20.805926+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.92.75.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGt6hCJdC4kj3RLb"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "9cf3146d-76b5-4aad-8e86-12d42923e89a", "DetectTime": "2024-05-21T12:38:20.819303+00:00", "EventTime": "2024-05-21T12:38:20.819326+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.92.75.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.92.75.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGt6hCJdC4kj3RLb"], "accumulated_threat_level": 4.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "a0146d42-e222-454f-b398-27cb96ea09a2", "DetectTime": "2024-05-21T12:38:20.840198+00:00", "EventTime": "2024-05-21T12:38:20.840220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZfxR2yRzDRcQwLJk"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "48a48eed-9b6c-452c-9f2b-6f7175e4c9e9", "DetectTime": "2024-05-21T12:38:20.876284+00:00", "EventTime": "2024-05-21T12:38:20.876309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6XpA2VgCfr9f3Qa5"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "87225b25-2522-42b2-a0f2-7c71ed691760", "DetectTime": "2024-05-21T12:38:20.995658+00:00", "EventTime": "2024-05-21T12:38:20.995682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyxVJXvCFVlm4tO1"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "788fa218-24d2-4643-bca3-93300dcef01c", "DetectTime": "2024-05-21T12:38:21.089678+00:00", "EventTime": "2024-05-21T12:38:21.089700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQA3MC1FXfjuAqct0l"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "fb260fea-bfeb-418d-83e7-0d8c9fee5c7e", "DetectTime": "2024-05-21T12:38:21.131220+00:00", "EventTime": "2024-05-21T12:38:21.131242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFM8H3Kw4xa3qtMe5"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "d05d1f7b-bd11-458c-9cdd-e85279b582ad", "DetectTime": "2024-05-21T12:38:21.207374+00:00", "EventTime": "2024-05-21T12:38:21.207397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31qg41WvW58bPuvb3"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "9682f939-ba8a-4215-8c8d-8ce7d1520d7b", "DetectTime": "2024-05-21T12:38:21.449740+00:00", "EventTime": "2024-05-21T12:38:21.449761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgYCnT21kWFbGdjh33"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "d77b27d6-cc96-4e81-85c7-3e4035e0b5c8", "DetectTime": "2024-05-21T12:38:21.454648+00:00", "EventTime": "2024-05-21T12:38:21.454667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuZ372u2yTVRsdiyb"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "5810bf45-d857-45da-81c8-80cbfe07fb02", "DetectTime": "2024-05-21T12:38:21.553435+00:00", "EventTime": "2024-05-21T12:38:21.553457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CazTGw2o7sIRYpPMB2"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "ba142ff5-e2b0-410e-9347-47f1ec059f89", "DetectTime": "2024-05-21T12:38:21.590838+00:00", "EventTime": "2024-05-21T12:38:21.590860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9IOo2VrMaP8z4tLl"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "12211743-c29c-48c5-a7cb-9fe3c83c266a", "DetectTime": "2024-05-21T12:38:21.644966+00:00", "EventTime": "2024-05-21T12:38:21.644988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tbxf1fVprizxGC9g"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "17406bdb-723d-406c-9d89-eb3c944c3448", "DetectTime": "2024-05-21T12:38:21.701090+00:00", "EventTime": "2024-05-21T12:38:21.701112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2742qj6J9AElbJ8"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "128b0d63-b0f7-4ada-8b6c-f27a46436ac7", "DetectTime": "2024-05-21T12:38:21.736224+00:00", "EventTime": "2024-05-21T12:38:21.736246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqf7C1TG9eV82msYi"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "e2e540e6-94a9-4141-8a09-715751511f21", "DetectTime": "2024-05-21T12:38:21.795944+00:00", "EventTime": "2024-05-21T12:38:21.795963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv152Z99889qmyahk"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "157fbe78-84ac-4f04-a060-c4d8aea4e8c3", "DetectTime": "2024-05-21T12:38:21.836726+00:00", "EventTime": "2024-05-21T12:38:21.836749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtjOKz2nhr9UPu7JW6"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "44040d26-2f85-433d-87e8-b4d45b2728ef", "DetectTime": "2024-05-21T12:38:22.067387+00:00", "EventTime": "2024-05-21T12:38:22.067408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ev852McDjrB6BW3f"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "515372a0-73d7-4462-8bf9-21ab91091009", "DetectTime": "2024-05-21T12:38:22.315189+00:00", "EventTime": "2024-05-21T12:38:22.315212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C81JYu3oRXPrz5pplb"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "5dcfe189-516a-4efd-977b-3eba9030db5b", "DetectTime": "2024-05-21T12:38:22.369577+00:00", "EventTime": "2024-05-21T12:38:22.369601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9ozf3rFQC2FFlCO8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "6e8e1de3-0d42-4816-b015-4e8f7342af26", "DetectTime": "2024-05-21T12:38:22.398355+00:00", "EventTime": "2024-05-21T12:38:22.398375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clrsou2CSaYBnbHPth"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "cec4842a-8233-416c-bf92-cfa23154e6fc", "DetectTime": "2024-05-21T12:38:22.463859+00:00", "EventTime": "2024-05-21T12:38:22.463880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOBwFhvvHPd6g2ii"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "8a03e792-ea93-491f-9b6a-567a59d14b4c", "DetectTime": "2024-05-21T12:38:22.608234+00:00", "EventTime": "2024-05-21T12:38:22.608255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBvkUjI9cnp5ra1W5"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "12a05692-f8f5-44b4-9695-ca135d778053", "DetectTime": "2024-05-21T12:38:22.666401+00:00", "EventTime": "2024-05-21T12:38:22.666433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cit2Xr2ePFMl6RRUy3"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "e79afe52-32c5-4255-9a83-afd97e2fc481", "DetectTime": "2024-05-21T12:38:22.707839+00:00", "EventTime": "2024-05-21T12:38:22.707862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3jCmY21gE3uriGHCg"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "2b37df74-a471-4dcb-a950-7cb83aaa79ea", "DetectTime": "2024-05-21T12:38:22.746438+00:00", "EventTime": "2024-05-21T12:38:22.746460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ogRG2T23y2ZqFjy1"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "e0c56ab5-eb89-45b4-9ea0-a43f5fb2e445", "DetectTime": "2024-05-21T12:38:22.788253+00:00", "EventTime": "2024-05-21T12:38:22.788275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxe9uY2LdSZzcCACBj"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "ae9e5a11-8a6d-44f6-92f8-92560e7e8b12", "DetectTime": "2024-05-21T12:38:22.840054+00:00", "EventTime": "2024-05-21T12:38:22.840074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cogd8k3ABgEU0hhFU1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "814ed3dd-eadd-4c4e-b4e8-14325027cbd3", "DetectTime": "2024-05-21T12:38:23.065712+00:00", "EventTime": "2024-05-21T12:38:23.065735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPUT7JsEKNiI8HNwh"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "140f4b96-1493-4936-ba9c-aac50ff80e70", "DetectTime": "2024-05-21T12:38:23.106346+00:00", "EventTime": "2024-05-21T12:38:23.106365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.116.195.1"]}], "Attach": [{"Content": "Connection to unknown destination port 8666/UDP destination IP 97.116.195.1. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjIYu2kpSqYcpAM7i"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "5207c65f-883b-428e-b409-131e8e346cfb", "DetectTime": "2024-05-21T12:38:23.111119+00:00", "EventTime": "2024-05-21T12:38:23.111138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czyzmx3ijzPUENtv24"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "b3d9c5c9-c3cc-4e84-a5ec-1eeabe28a885", "DetectTime": "2024-05-21T12:38:23.162314+00:00", "EventTime": "2024-05-21T12:38:23.162337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx8x373HYd5Oep8Tr7"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "a9d93cf8-73cc-458f-8379-4d38603aa8bc", "DetectTime": "2024-05-21T12:38:23.196423+00:00", "EventTime": "2024-05-21T12:38:23.196446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr0VJc2UO3M2PTTl6c"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "25cc3c8a-6377-497c-abaf-3d24d782afcb", "DetectTime": "2024-05-21T12:38:23.246290+00:00", "EventTime": "2024-05-21T12:38:23.246310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWj9yLB1PsdOoTYPd"], "accumulated_threat_level": 10.4, "timewindow": 99} +{"Format": "IDEA0", "ID": "ef1011fc-c369-4aeb-a6e7-5e7f48de6748", "DetectTime": "2024-05-21T12:38:23.251786+00:00", "EventTime": "2024-05-21T12:38:23.251806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsvPp2CrhNT0IBsyd"], "accumulated_threat_level": 0, "timewindow": 97} +{"Format": "IDEA0", "ID": "5bbfadc8-e8ce-42e6-9dfb-7a66b4e2893f", "DetectTime": "2024-05-21T12:38:23.357642+00:00", "EventTime": "2024-05-21T12:38:23.357668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtEF22fB3kDXlJn0d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "879363bb-130d-4eaa-8bc8-30d0bbc918b0", "DetectTime": "2024-05-21T12:38:23.362810+00:00", "EventTime": "2024-05-21T12:38:23.362831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxeFUE4LaUGwjlr9z6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "b1c6da0b-4fed-4ca4-8b05-79e2c1330352", "DetectTime": "2024-05-21T12:38:23.438924+00:00", "EventTime": "2024-05-21T12:38:23.438942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHnHt2JooH5ex0I2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 99} +{"Format": "Json", "ID": "b1c6da0b-4fed-4ca4-8b05-79e2c1330352", "DetectTime": "2024-05-21T12:38:23.438924+00:00", "EventTime": "2024-05-21T12:38:23.438942+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-05T02:08:05.948928+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2024/05/21 12:38:23.602968)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 99, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f33f74fa-b5ba-4e50-9ccd-bf8dc1c1c636", "DetectTime": "2024-05-21T12:38:23.683010+00:00", "EventTime": "2024-05-21T12:38:23.683032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwX3U1lsjYeBWacqk"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "59d3ef09-4304-4769-a1d9-9caed1edc946", "DetectTime": "2024-05-21T12:38:23.912883+00:00", "EventTime": "2024-05-21T12:38:23.912902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWyMBn2DQYBqSvgey4"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "21af6b0b-a7b0-4210-9a27-bfd0cf948d90", "DetectTime": "2024-05-21T12:38:24.425492+00:00", "EventTime": "2024-05-21T12:38:24.425511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DL0F4377tumOqre1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "6845ac81-661e-43a4-82a5-6de043d1464e", "DetectTime": "2024-05-21T12:38:24.474091+00:00", "EventTime": "2024-05-21T12:38:24.474109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26222/UDP destination IP 190.56.254.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPZB31tc7IkSzpYud"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "69a8cee9-4d6a-4eff-949f-83348eda2135", "DetectTime": "2024-05-21T12:38:24.634107+00:00", "EventTime": "2024-05-21T12:38:24.634126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpo7U2JLjonNkBqSf"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "797d6f5c-debf-4cff-b606-e7bae24e1f08", "DetectTime": "2024-05-21T12:38:24.709449+00:00", "EventTime": "2024-05-21T12:38:24.709471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftRC4B0cuchjGTb3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "7e1c5874-2832-4398-91f1-31e15e6f56c2", "DetectTime": "2024-05-21T12:38:24.812202+00:00", "EventTime": "2024-05-21T12:38:24.812225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.215.217.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1A8z84GrMzXK7RuP3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "811f516b-bcee-41c0-bd6c-7ea9f7916a8e", "DetectTime": "2024-05-21T12:38:24.848634+00:00", "EventTime": "2024-05-21T12:38:24.848656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CatKdX1XCmAVgwFc39"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "4631fff1-6496-4feb-84bd-8cb6692da93e", "DetectTime": "2024-05-21T12:38:25.429781+00:00", "EventTime": "2024-05-21T12:38:25.429801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBgdpGdThuTveD95"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "33cc7c5e-7c85-4a4a-accb-290775333794", "DetectTime": "2024-05-21T12:38:25.775126+00:00", "EventTime": "2024-05-21T12:38:25.775161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb5Qu513wswApaqpra"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "13b01739-4fdf-435a-8ff8-97919bd8b58f", "DetectTime": "2024-05-21T12:38:25.792380+00:00", "EventTime": "2024-05-21T12:38:25.792400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCznQ93PiC3mBqSy9d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "0293404f-afcc-4977-b3c5-51f966f6e477", "DetectTime": "2024-05-21T12:38:25.797434+00:00", "EventTime": "2024-05-21T12:38:25.797453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNla4j3W82QwnOeOi3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "a076bf9e-2016-43e3-ac52-74c3e382c4a0", "DetectTime": "2024-05-21T12:38:25.854776+00:00", "EventTime": "2024-05-21T12:38:25.854797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV7VpOTEVEMHuJxfa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "3c902e00-e6ea-4c93-ac47-7d9d2771c1e9", "DetectTime": "2024-05-21T12:38:26.246738+00:00", "EventTime": "2024-05-21T12:38:26.246760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNKZIM2v6JqQXiC2U6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "957de23e-1954-41e6-bf90-1dd9cee5c8a5", "DetectTime": "2024-05-21T12:38:26.633798+00:00", "EventTime": "2024-05-21T12:38:26.633817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3gHIJ3k0rutMtOwc2"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "76b96bac-34c3-4cad-afa8-e08ec180130c", "DetectTime": "2024-05-21T12:38:26.685734+00:00", "EventTime": "2024-05-21T12:38:26.685754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1cXp19S3qSbYigAi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "5f99d9d8-65f7-4828-9c6f-8dfc64385715", "DetectTime": "2024-05-21T12:38:26.950753+00:00", "EventTime": "2024-05-21T12:38:26.950774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhap92KrjnzuQ0CPh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "09b5ef51-86b6-4268-afd9-285ed206770f", "DetectTime": "2024-05-21T12:38:27.169551+00:00", "EventTime": "2024-05-21T12:38:27.169573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWeW9L2Ka8jbUE26ia"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "2a00f447-0314-46c1-8677-fae1d058593e", "DetectTime": "2024-05-21T12:38:27.329346+00:00", "EventTime": "2024-05-21T12:38:27.329365+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.135.183.152"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHAoD8wsgzn42E21"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "f65ae32b-738f-4c52-9557-c09536f6527c", "DetectTime": "2024-05-21T12:38:27.344821+00:00", "EventTime": "2024-05-21T12:38:27.344840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.135.183.152"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.135.183.152 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHAoD8wsgzn42E21"], "accumulated_threat_level": 5.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "b47b9447-0107-4d90-b76e-0de6dff2d02b", "DetectTime": "2024-05-21T12:38:27.358391+00:00", "EventTime": "2024-05-21T12:38:27.358426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5YBW2g9SWKmgqZHi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "8739d8ef-a585-4aeb-b0e4-a0ea2d1fc2aa", "DetectTime": "2024-05-21T12:38:27.568730+00:00", "EventTime": "2024-05-21T12:38:27.568751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwHonUCLXsJ9L8H4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "e206edd7-4ee9-426b-946e-a0d2527eaf0b", "DetectTime": "2024-05-21T12:38:27.630638+00:00", "EventTime": "2024-05-21T12:38:27.630657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTMS5R2afHasffXXe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "20e05b6a-36d9-4b36-be6f-dcc98c43df60", "DetectTime": "2024-05-21T12:38:27.657494+00:00", "EventTime": "2024-05-21T12:38:27.657515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CscMlH1gQ6qQERBlU2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "e5452145-4e65-4f1d-a1ed-4d7e29b89bbb", "DetectTime": "2024-05-21T12:38:27.855173+00:00", "EventTime": "2024-05-21T12:38:27.855194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYhvVz206tnvONHc62"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "a070d51a-5c64-4ceb-b056-3bd8469c2601", "DetectTime": "2024-05-21T12:38:27.867293+00:00", "EventTime": "2024-05-21T12:38:27.867312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrokW1VbFHmHQFex4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "985a8fef-1ec2-4872-87ca-9da55ee0497f", "DetectTime": "2024-05-21T12:38:27.921428+00:00", "EventTime": "2024-05-21T12:38:27.921448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nEKW2wxTAy61cRx8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "0ba0671e-ed08-47c5-99da-1b459b2ac5dd", "DetectTime": "2024-05-21T12:38:27.964075+00:00", "EventTime": "2024-05-21T12:38:27.964096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CngKbs2YV6cZVgzF43"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "0582eb60-cec1-48cd-b8b0-98b4bb1a41fe", "DetectTime": "2024-05-21T12:38:28.010247+00:00", "EventTime": "2024-05-21T12:38:28.010267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZuOZB3vpoiSvKDo06"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "be09defc-0a4e-4e4d-9e0c-d07878421767", "DetectTime": "2024-05-21T12:38:28.015073+00:00", "EventTime": "2024-05-21T12:38:28.015093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwikRt45mSrVtXxKWl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "e5a223e6-2f8f-4e55-83f2-41330d941a56", "DetectTime": "2024-05-21T12:38:28.068716+00:00", "EventTime": "2024-05-21T12:38:28.068739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwojk42Zri770ZDUk9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "923c7799-d4b7-46b1-a057-49ec63b3c843", "DetectTime": "2024-05-21T12:38:28.319018+00:00", "EventTime": "2024-05-21T12:38:28.319038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEc2t4qI4pz5K4yI2"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "d1449279-bf05-47d5-9262-0ebedb362db3", "DetectTime": "2024-05-21T12:38:28.324556+00:00", "EventTime": "2024-05-21T12:38:28.324574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuYNHw2JqDTykP1AYb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "3396d81d-81b5-4aa7-8ffb-051164cfac5c", "DetectTime": "2024-05-21T12:38:28.328919+00:00", "EventTime": "2024-05-21T12:38:28.328938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C89pdg3LNm68C5ro5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "deea94d7-325c-45ac-b6cc-db677477df06", "DetectTime": "2024-05-21T12:38:28.426823+00:00", "EventTime": "2024-05-21T12:38:28.426845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYCu74xm4N5BQgcm"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "1276f4f7-adeb-490c-8f0a-f6e0b960cb6f", "DetectTime": "2024-05-21T12:38:28.431521+00:00", "EventTime": "2024-05-21T12:38:28.431541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mQ2l4fcpHoefVxMf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "c4c860f0-22ab-4a7f-94d1-c56fa9dc472a", "DetectTime": "2024-05-21T12:38:28.436185+00:00", "EventTime": "2024-05-21T12:38:28.436204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbvni33XjnCio6xE45"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "96ffeb9b-30a8-4723-8196-c99b175511b6", "DetectTime": "2024-05-21T12:38:28.537901+00:00", "EventTime": "2024-05-21T12:38:28.537921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClIWV52T1blpMrsllk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "4daf1236-e107-4404-9a9b-47baa214adea", "DetectTime": "2024-05-21T12:38:28.542786+00:00", "EventTime": "2024-05-21T12:38:28.542807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsHIjrqdsIpfVx5e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "36b4dbd7-6149-48fc-8857-30c003fa795a", "DetectTime": "2024-05-21T12:38:28.655215+00:00", "EventTime": "2024-05-21T12:38:28.655232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtP7Du4XvtZ7z6UrJ1"], "accumulated_threat_level": 10.4, "timewindow": 99} +{"Format": "IDEA0", "ID": "2d8bb74b-7c25-4351-beff-2dd22616ee84", "DetectTime": "2024-05-21T12:38:28.914968+00:00", "EventTime": "2024-05-21T12:38:28.914992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMzY72IaRaSUgFtNl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "c178ac9a-556a-49de-9e5b-d8874a88bed2", "DetectTime": "2024-05-21T12:38:28.920000+00:00", "EventTime": "2024-05-21T12:38:28.920019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ErVd310Zsxrgq7h9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "901f5d09-97ff-424d-8760-e4bf319e35a9", "DetectTime": "2024-05-21T12:38:28.941182+00:00", "EventTime": "2024-05-21T12:38:28.941202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJCcGR8Fixf1XTob"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "45a4b247-9127-4a4d-9e7e-402d194bdc7c", "DetectTime": "2024-05-21T12:38:29.128460+00:00", "EventTime": "2024-05-21T12:38:29.128480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.177.185.85"]}], "Attach": [{"Content": "Connection to unknown destination port 6952/UDP destination IP 93.177.185.85. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8dJuqFBYeI93KWwi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "509aec79-4b6f-4f5d-be2d-4e165ecb2c80", "DetectTime": "2024-05-21T12:38:29.195161+00:00", "EventTime": "2024-05-21T12:38:29.195182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF5K1S1KWDdTIvyyJl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "82e7bf15-060c-45c6-9a04-16e90adc124a", "DetectTime": "2024-05-21T12:38:29.238592+00:00", "EventTime": "2024-05-21T12:38:29.238614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5pXx2rlwMTYze9a1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "dbd326a7-f548-4ac8-8626-f62eb9d85eb3", "DetectTime": "2024-05-21T12:38:29.424906+00:00", "EventTime": "2024-05-21T12:38:29.424928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCmJmlmbtgrK3VM7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 98} +{"Format": "IDEA0", "ID": "10cf3caf-74e7-4a0b-bf64-f3bc4a344274", "DetectTime": "2024-05-21T12:38:29.899710+00:00", "EventTime": "2024-05-21T12:38:29.899728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMext4AaKG0xnBsC3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 99} +{"Format": "Json", "ID": "10cf3caf-74e7-4a0b-bf64-f3bc4a344274", "DetectTime": "2024-05-21T12:38:29.899710+00:00", "EventTime": "2024-05-21T12:38:29.899728+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "1970-01-05T02:15:11.772710+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2024/05/21 12:38:30.261905)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 99, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "380f01a7-7543-408a-80b1-2ddd78edc3b5", "DetectTime": "2024-05-21T12:38:30.273847+00:00", "EventTime": "2024-05-21T12:38:30.273870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmou13NUSHfludZok"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9dc023d2-f649-4be6-b181-efaae6422094", "DetectTime": "2024-05-21T12:38:30.816415+00:00", "EventTime": "2024-05-21T12:38:30.816434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJugHq1KImeTDGttO3"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "c6c0737c-ba34-462f-8c0a-62fd3759fb23", "DetectTime": "2024-05-21T12:38:31.136964+00:00", "EventTime": "2024-05-21T12:38:31.136983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGVhO83lof2QXo63K4"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "3653829b-64cb-44d1-9d89-5d8db7ce1a44", "DetectTime": "2024-05-21T12:38:31.168979+00:00", "EventTime": "2024-05-21T12:38:31.168998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.20.5.95 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzMdcX1XvjZxeT5Ofd"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "956fc681-1e45-441d-8791-bc27b41d3545", "DetectTime": "2024-05-21T12:38:31.243258+00:00", "EventTime": "2024-05-21T12:38:31.243279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.198.255.149"]}], "Attach": [{"Content": "Connection to unknown destination port 9891/UDP destination IP 190.198.255.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFavYZ27IQB0YSItH3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "9fabd3a0-88aa-4a6e-8bd5-d1aa2c2c2e6c", "DetectTime": "2024-05-21T12:38:31.483773+00:00", "EventTime": "2024-05-21T12:38:31.483794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXLDr2VYtuZwRf9xj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "cf3c3ae3-1a3b-48b9-bfbc-a19a65c6d25c", "DetectTime": "2024-05-21T12:38:31.854022+00:00", "EventTime": "2024-05-21T12:38:31.854040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5xz7k1X7oFnOXHHc"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "ebdccb2d-5142-4741-9d18-3fd5120d05ed", "DetectTime": "2024-05-21T12:38:31.910824+00:00", "EventTime": "2024-05-21T12:38:31.910843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyJwuEFyipNAqtJla"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "85e0b2d5-7360-476d-9364-c4e44927fc59", "DetectTime": "2024-05-21T12:38:32.178437+00:00", "EventTime": "2024-05-21T12:38:32.178464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.84.26.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD58Ul2lnHQ9duwiW2"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "a33a6d07-2f77-4bbb-a40c-2b39bfef621b", "DetectTime": "2024-05-21T12:38:32.229874+00:00", "EventTime": "2024-05-21T12:38:32.229898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjO6792co3VHbuvg3"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8da1c049-02de-47a3-9927-c9524f43d2b5", "DetectTime": "2024-05-21T12:38:32.405384+00:00", "EventTime": "2024-05-21T12:38:32.405402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdK00m26hgEZM3cawh"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "5b720cff-5be1-4cf1-a970-c042ab2606a2", "DetectTime": "2024-05-21T12:38:32.584201+00:00", "EventTime": "2024-05-21T12:38:32.584239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPFh243ADDYZyqAI8", "CbM06025OUgSUBoAj8", "C8oQa32CuRJME5v436", "CbGoOX1sxGf1BWfgK7"], "accumulated_threat_level": 6.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "1c74f5ba-491b-498a-85b7-6c7ebfe10390", "DetectTime": "2024-05-21T12:38:32.706932+00:00", "EventTime": "2024-05-21T12:38:32.706954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.182.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgMs1i3PtjFxwUXIi"], "accumulated_threat_level": 6.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "45e4ec47-2361-4c5c-9687-230b1216e67f", "DetectTime": "2024-05-21T12:38:32.930704+00:00", "EventTime": "2024-05-21T12:38:32.930726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.54.128.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPvmLXoyifekqUG3h"], "accumulated_threat_level": 6.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "3f2369f5-9850-4466-bd41-3725cc818728", "DetectTime": "2024-05-21T12:38:33.248881+00:00", "EventTime": "2024-05-21T12:38:33.248901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.105.8.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Zkyo4jFGPEDGk2D3"], "accumulated_threat_level": 6.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "e457ebf6-ef8a-4c8c-9175-a5f2fa75758f", "DetectTime": "2024-05-21T12:38:33.290637+00:00", "EventTime": "2024-05-21T12:38:33.290655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI2sA3u39pWHFXRJk"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "1d568eb8-5c96-495c-9a8f-abbf19b79abf", "DetectTime": "2024-05-21T12:38:33.318847+00:00", "EventTime": "2024-05-21T12:38:33.318866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUHWGLA5ZqLl7PVe2"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "721058c5-5755-43f2-8382-834ac11641d3", "DetectTime": "2024-05-21T12:38:33.364135+00:00", "EventTime": "2024-05-21T12:38:33.364158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaY8qM1xtSARlN2Kn"], "accumulated_threat_level": 7.699999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "440b7764-d8ef-4e1e-82c5-4f2cb42d19fd", "DetectTime": "2024-05-21T12:38:33.404290+00:00", "EventTime": "2024-05-21T12:38:33.404311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGo224EImgRMt6IJ9"], "accumulated_threat_level": 8.5, "timewindow": 99} +{"Format": "IDEA0", "ID": "387fc978-af0c-4063-9b35-146d79faae4c", "DetectTime": "2024-05-21T12:38:33.445029+00:00", "EventTime": "2024-05-21T12:38:33.445050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZwW543dfc9IsE3Wb"], "accumulated_threat_level": 9.3, "timewindow": 99} +{"Format": "IDEA0", "ID": "9aca287a-6612-404c-83aa-117a0c41ee6a", "DetectTime": "2024-05-21T12:38:33.507807+00:00", "EventTime": "2024-05-21T12:38:33.507827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "Connection to unknown destination port 9279/UDP destination IP 46.49.74.62. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpI6qPBnFYl8rtc8"], "accumulated_threat_level": 10.100000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "14df61ce-8110-4bf7-bb1a-6e0f7863527c", "DetectTime": "2024-05-21T12:38:33.533295+00:00", "EventTime": "2024-05-21T12:38:33.533318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EuirnfFNX3Br6P2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "81d24772-dc83-44c7-95b4-f2dcc94b8820", "DetectTime": "2024-05-21T12:38:33.792202+00:00", "EventTime": "2024-05-21T12:38:33.792222+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.189.51.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBl0kKSTHZcJdAUe"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "23c19d73-81e8-4d0e-b637-b70fb282a118", "DetectTime": "2024-05-21T12:38:33.797089+00:00", "EventTime": "2024-05-21T12:38:33.797107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gIwaveg2AluRrA9"], "accumulated_threat_level": 10.100000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "73388619-3346-4fda-a40c-f5020e1d1f92", "DetectTime": "2024-05-21T12:38:33.809896+00:00", "EventTime": "2024-05-21T12:38:33.809920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.189.51.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.189.51.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBl0kKSTHZcJdAUe"], "accumulated_threat_level": 5.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "7e30e9fd-209c-43c5-9bfe-239a74a8b921", "DetectTime": "2024-05-21T12:38:33.815665+00:00", "EventTime": "2024-05-21T12:38:33.815683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdaJnL2lhGGjAu3dll"], "accumulated_threat_level": 10.100000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "1d606d11-ed87-4fa6-b9d2-89968510a7bf", "DetectTime": "2024-05-21T12:38:33.848368+00:00", "EventTime": "2024-05-21T12:38:33.848391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdz6TFoSJqJwKA7m1"], "accumulated_threat_level": 10.900000000000002, "timewindow": 99} +{"Format": "IDEA0", "ID": "0d7a947a-df92-4480-9c73-66fa2d0da6bb", "DetectTime": "2024-05-21T12:38:33.975610+00:00", "EventTime": "2024-05-21T12:38:33.975631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0k0xF4JEgV7JxAi72"], "accumulated_threat_level": 10.900000000000002, "timewindow": 99} +{"Format": "IDEA0", "ID": "e30fda30-9582-474a-934b-d2a7f8fcc048", "DetectTime": "2024-05-21T12:38:34.016061+00:00", "EventTime": "2024-05-21T12:38:34.016079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNKyyEZtwKDbGxH4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 99} +{"Format": "IDEA0", "ID": "2a4d8d39-0046-4e5d-8899-309c6d85ecd0", "DetectTime": "2024-05-21T12:38:34.055752+00:00", "EventTime": "2024-05-21T12:38:34.055772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswvPm42b5vT0bb0Hh"], "accumulated_threat_level": 12.500000000000004, "timewindow": 99} +{"Format": "Json", "ID": "2a4d8d39-0046-4e5d-8899-309c6d85ecd0", "DetectTime": "2024-05-21T12:38:34.055752+00:00", "EventTime": "2024-05-21T12:38:34.055772+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "1970-01-05T02:47:34.290184+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2024/05/21 12:38:34.373662)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 99, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "a1588ddc-376a-4c1d-8ddc-29338b11b98f", "DetectTime": "2024-05-21T12:38:34.377765+00:00", "EventTime": "2024-05-21T12:38:34.377783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmC3lX5EF3ziU379"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "d07e746b-a757-4433-959c-3c960c75194e", "DetectTime": "2024-05-21T12:38:34.389728+00:00", "EventTime": "2024-05-21T12:38:34.389749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWFxOrZmPwz9v8x2"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "56da078e-c28c-43ed-ab39-2a9a1256524a", "DetectTime": "2024-05-21T12:38:34.395220+00:00", "EventTime": "2024-05-21T12:38:34.395238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWry8k4qrYPUoVDh49"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "97f91487-ef13-4755-b7ab-32ff1f261993", "DetectTime": "2024-05-21T12:38:34.428199+00:00", "EventTime": "2024-05-21T12:38:34.428223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8Vwywdaw7wOBMck"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "09ba14b4-d8ee-4d0f-a94e-05e9259d6f27", "DetectTime": "2024-05-21T12:38:34.433461+00:00", "EventTime": "2024-05-21T12:38:34.433480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVn5X32FSzjyQy8bk2"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "a6b6347a-8da4-4eac-b024-8cf3d90533ea", "DetectTime": "2024-05-21T12:38:34.438315+00:00", "EventTime": "2024-05-21T12:38:34.438334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkYCq3B5qIkSTiK84"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "988fad4c-8770-4028-87cb-15d7835f0b74", "DetectTime": "2024-05-21T12:38:34.442823+00:00", "EventTime": "2024-05-21T12:38:34.442842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CId1Td13nnkegtnSkg"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "a30a8415-cfbc-4d75-a73f-9bc99a693e17", "DetectTime": "2024-05-21T12:38:34.556372+00:00", "EventTime": "2024-05-21T12:38:34.556391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1O4b8icUDvyUYjf9"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "a7b73931-b787-45af-93f3-c3b21a05c731", "DetectTime": "2024-05-21T12:38:34.603673+00:00", "EventTime": "2024-05-21T12:38:34.603694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP7OOt3Hhds1kZGSH6"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "12d0d267-0e59-4e1b-8e01-b2ad2b8345fd", "DetectTime": "2024-05-21T12:38:34.608654+00:00", "EventTime": "2024-05-21T12:38:34.608674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWhXI3ZMDph5Wrlg6"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "3b88397b-a120-4b96-beb9-39dbf013cc6a", "DetectTime": "2024-05-21T12:38:34.734563+00:00", "EventTime": "2024-05-21T12:38:34.734586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWsWrR3pBfdq3bbumf"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "714f60d7-6816-464b-9c2a-e757ea0ea9e9", "DetectTime": "2024-05-21T12:38:34.780996+00:00", "EventTime": "2024-05-21T12:38:34.781018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTa9E4xyvRcHV1QZ4"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "5d14804b-2e6f-498c-ac5b-5f4e3c276714", "DetectTime": "2024-05-21T12:38:35.053121+00:00", "EventTime": "2024-05-21T12:38:35.053141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHAip3BGXUhb10AF5"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "40ec5087-f4a0-4dcc-ae88-92897fdc90c5", "DetectTime": "2024-05-21T12:38:35.058013+00:00", "EventTime": "2024-05-21T12:38:35.058032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9btndJR8lKKE1th"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "2d5f063b-0e05-4937-9a4c-b366888809a6", "DetectTime": "2024-05-21T12:38:35.063078+00:00", "EventTime": "2024-05-21T12:38:35.063096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch0cGP3LImdCXOfVhi"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "0604a149-4e6d-46ec-9ad8-f8b6f1f64ab4", "DetectTime": "2024-05-21T12:38:35.067513+00:00", "EventTime": "2024-05-21T12:38:35.067531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9xPCAZRdv0a80uDh"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "5b48c21c-c999-4d7c-955c-514c04c88a1e", "DetectTime": "2024-05-21T12:38:35.071846+00:00", "EventTime": "2024-05-21T12:38:35.071864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eFjA3FwJaltG5Qej"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "78a92cad-64bb-44c1-9df2-76b860a80d68", "DetectTime": "2024-05-21T12:38:35.190084+00:00", "EventTime": "2024-05-21T12:38:35.190103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMIIz4ObwWQ9UvbR2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "0e5df62b-4b61-4798-831e-d4a029158559", "DetectTime": "2024-05-21T12:38:35.223272+00:00", "EventTime": "2024-05-21T12:38:35.223291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCDJc8waF0aljSCl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "24464652-e31a-4afc-b278-2bd60ecc3b0b", "DetectTime": "2024-05-21T12:38:35.299055+00:00", "EventTime": "2024-05-21T12:38:35.299075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmiTrNyg1GpiY3tji"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "5536d111-f686-4e62-a265-d68eed0994b8", "DetectTime": "2024-05-21T12:38:35.303887+00:00", "EventTime": "2024-05-21T12:38:35.303905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQC00y3SPsRpOekesi"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "00040e25-778b-42fe-87a5-07eb6f244a0c", "DetectTime": "2024-05-21T12:38:35.372843+00:00", "EventTime": "2024-05-21T12:38:35.372863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8VsUE1zyhnR5MNudl"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "834d1523-2577-416e-83c3-dddc8b7e81cf", "DetectTime": "2024-05-21T12:38:35.612054+00:00", "EventTime": "2024-05-21T12:38:35.612075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgfibIQ9gY2CdqZi"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "78994738-cfec-417c-ae11-047b60b6d30b", "DetectTime": "2024-05-21T12:38:35.616769+00:00", "EventTime": "2024-05-21T12:38:35.616788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.237.226.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnxAsB6EsbxaJowA2"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "16f23a38-adaf-4f0d-b1cd-86f9aeeff998", "DetectTime": "2024-05-21T12:38:35.679228+00:00", "EventTime": "2024-05-21T12:38:35.679250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjI5J713uKRcl454"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "3988189f-3c43-4b67-965a-d03b3b286681", "DetectTime": "2024-05-21T12:38:35.738851+00:00", "EventTime": "2024-05-21T12:38:35.738873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.7.241.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSxHW32AUGgaJXqx7k"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "977cd2e2-39dc-4db4-841d-3c99249ad4ce", "DetectTime": "2024-05-21T12:38:35.744499+00:00", "EventTime": "2024-05-21T12:38:35.744520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.141.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAd7N028ge0POHb2Mb"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "5642e6fa-1aa9-4bee-b708-c2de7835cf59", "DetectTime": "2024-05-21T12:38:35.749269+00:00", "EventTime": "2024-05-21T12:38:35.749289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.223.117.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd26HB4sCCiSuQ160i"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e05aae76-ba98-4763-a30b-3e433d812e37", "DetectTime": "2024-05-21T12:38:35.827345+00:00", "EventTime": "2024-05-21T12:38:35.827369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.174.80.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgfIw2Qh2XqiJaM41"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "a45eabd5-b621-4c0a-aeb3-4e7cc03c352c", "DetectTime": "2024-05-21T12:38:35.860178+00:00", "EventTime": "2024-05-21T12:38:35.860200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJnKzdP2IWdXxiQbg"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9978b850-6816-4c16-9fac-8b9e66487864", "DetectTime": "2024-05-21T12:38:35.874135+00:00", "EventTime": "2024-05-21T12:38:35.874158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYF7NF4InYoSYeyOHi"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "4811afe2-2c49-4fe1-a4a0-fe000114e028", "DetectTime": "2024-05-21T12:38:36.124559+00:00", "EventTime": "2024-05-21T12:38:36.124580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.234.151.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2RxvI8n6olsYbCfe"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "d254b966-321a-4d6d-b701-afc1147da222", "DetectTime": "2024-05-21T12:38:36.129235+00:00", "EventTime": "2024-05-21T12:38:36.129253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.241.71.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJHNAr1aDz2Zgj6V8d"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "8237f876-00b2-43fd-a354-6b72be10027f", "DetectTime": "2024-05-21T12:38:36.191391+00:00", "EventTime": "2024-05-21T12:38:36.191412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAZVUhk8IlOymFkKj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "15257957-6acd-49d2-a658-950ff98d0964", "DetectTime": "2024-05-21T12:38:36.215368+00:00", "EventTime": "2024-05-21T12:38:36.215389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 221.189.200.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtMVO2DmJfJGORLG4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "14a92ad5-db77-4ece-8851-5a9572c37b13", "DetectTime": "2024-05-21T12:38:36.264176+00:00", "EventTime": "2024-05-21T12:38:36.264200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbvn6N1hLTko6EVCIg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "fa2cdd8d-d690-4a72-92f1-5d9c9cccb2c2", "DetectTime": "2024-05-21T12:38:36.340147+00:00", "EventTime": "2024-05-21T12:38:36.340167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRu03m2fxjJIXCCbi4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "ee1c7b74-ccb5-4052-bdfd-cc3f18145d20", "DetectTime": "2024-05-21T12:38:36.381667+00:00", "EventTime": "2024-05-21T12:38:36.381688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci5TDn1XCWaM2FIK65"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "ba6e139f-6ba0-43f0-bc57-de9f1ceaa11a", "DetectTime": "2024-05-21T12:38:36.422856+00:00", "EventTime": "2024-05-21T12:38:36.422883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouaB84FmqsJmUVFc5"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "781c6213-c443-4e1a-8270-c8881c770818", "DetectTime": "2024-05-21T12:38:36.442035+00:00", "EventTime": "2024-05-21T12:38:36.442057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZS1fpWRT3wMVvt3", "CjEjza3faUwzAvNyIi", "Chp9Tk1ZltauuheEG7", "CnxiqK1TdzPAO2J8i6"], "accumulated_threat_level": 10.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "4e2e6722-5d08-48cb-a62c-bdd1346675c3", "DetectTime": "2024-05-21T12:38:36.452090+00:00", "EventTime": "2024-05-21T12:38:36.452110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.245.5.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsQZr4dUqy4J5Oagg"], "accumulated_threat_level": 10.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "04221ebc-fb40-47c5-a111-c43c30e04b0d", "DetectTime": "2024-05-21T12:38:36.712826+00:00", "EventTime": "2024-05-21T12:38:36.712845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.128.198.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcO9nr4JC8P4wsdYWg"], "accumulated_threat_level": 10.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "2d2fb2a8-4a83-4ce2-ba47-cf49d3f1fbcb", "DetectTime": "2024-05-21T12:38:36.718643+00:00", "EventTime": "2024-05-21T12:38:36.718665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.201.116.249 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsxZTA96dDgMcLlE6"], "accumulated_threat_level": 10.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "60c9349b-61fb-47ef-8180-13de7f5183e8", "DetectTime": "2024-05-21T12:38:36.723385+00:00", "EventTime": "2024-05-21T12:38:36.723404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.244.46.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gSPcRaQbUQxCu76"], "accumulated_threat_level": 10.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "f565bb8c-8f2a-462b-9fc4-f5ea29783192", "DetectTime": "2024-05-21T12:38:36.728196+00:00", "EventTime": "2024-05-21T12:38:36.728213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.74.153.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRY5DE4xbxU5fA8EUd"], "accumulated_threat_level": 10.1, "timewindow": 99} +{"Format": "IDEA0", "ID": "a920599f-63a5-42e2-9f93-9eb86c5b1074", "DetectTime": "2024-05-21T12:38:36.782186+00:00", "EventTime": "2024-05-21T12:38:36.782205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFSgHf3hQOvDneqS8a"], "accumulated_threat_level": 10.9, "timewindow": 99} +{"Format": "IDEA0", "ID": "2e6df63d-a916-47f0-b0b2-bf43dcc353ee", "DetectTime": "2024-05-21T12:38:36.876781+00:00", "EventTime": "2024-05-21T12:38:36.876801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.88.11.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsfFJn11SyzM33T669"], "accumulated_threat_level": 10.9, "timewindow": 99} +{"Format": "IDEA0", "ID": "6e3b4562-2ce7-4e96-abda-aa9ef9aac660", "DetectTime": "2024-05-21T12:38:36.907375+00:00", "EventTime": "2024-05-21T12:38:36.907397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.20.182.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqmCQTHrB2xZC9bqd"], "accumulated_threat_level": 10.9, "timewindow": 99} +{"Format": "IDEA0", "ID": "9eb69288-86d3-4445-999a-1f6f6942d23a", "DetectTime": "2024-05-21T12:38:36.949223+00:00", "EventTime": "2024-05-21T12:38:36.949244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.130.51.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8Szy8bWD1piebXi"], "accumulated_threat_level": 10.9, "timewindow": 99} +{"Format": "IDEA0", "ID": "30382171-2332-488c-a142-0b1f9aa077c9", "DetectTime": "2024-05-21T12:38:36.991788+00:00", "EventTime": "2024-05-21T12:38:36.991810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.141.85.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjTQWh1mDZnLkkJ9nf"], "accumulated_threat_level": 10.9, "timewindow": 99} +{"Format": "IDEA0", "ID": "a174b3f4-40d2-462a-b407-4ca76da35b21", "DetectTime": "2024-05-21T12:38:37.003683+00:00", "EventTime": "2024-05-21T12:38:37.003706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX2dQt2JMcdeIOjeb6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "ba6d7023-8300-4171-be03-ebf499a7b5b7", "DetectTime": "2024-05-21T12:38:37.274834+00:00", "EventTime": "2024-05-21T12:38:37.274853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.186.201.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaZE3i3YjKXejTAMa"], "accumulated_threat_level": 11.700000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "28f7acb2-810c-4f36-99d5-97a50403d5b0", "DetectTime": "2024-05-21T12:38:37.324685+00:00", "EventTime": "2024-05-21T12:38:37.324704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.217.176.193 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GjXMxU22YR1vcy6"], "accumulated_threat_level": 11.700000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "156ee8d9-5fb6-41f1-89b9-a21e3adbb43d", "DetectTime": "2024-05-21T12:38:37.337485+00:00", "EventTime": "2024-05-21T12:38:37.337508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZ75Z27hONgreMmr9"], "accumulated_threat_level": 12.500000000000002, "timewindow": 99} +{"Format": "Json", "ID": "156ee8d9-5fb6-41f1-89b9-a21e3adbb43d", "DetectTime": "2024-05-21T12:38:37.337485+00:00", "EventTime": "2024-05-21T12:38:37.337508+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "1970-01-05T02:48:35.297237+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2024/05/21 12:38:37.830886)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 99, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "355914da-0a0a-4f59-97d2-fea85af80ca2", "DetectTime": "2024-05-21T12:38:37.834788+00:00", "EventTime": "2024-05-21T12:38:37.834806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.219.238.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9t622fiDDAkNjyKd"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "8327819a-4f81-4840-bb53-be90c5ea1ab7", "DetectTime": "2024-05-21T12:38:37.839844+00:00", "EventTime": "2024-05-21T12:38:37.839862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.75.245.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9ozf3rFQC2FFlCO8"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "a0fa34bb-f323-4293-92c4-447facbefbf6", "DetectTime": "2024-05-21T12:38:37.844692+00:00", "EventTime": "2024-05-21T12:38:37.844714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.219.169 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOU0n2Rv12xmjCCba"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "44f3d197-f8b2-46cf-b73d-bb226e75f863", "DetectTime": "2024-05-21T12:38:37.856936+00:00", "EventTime": "2024-05-21T12:38:37.856954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv95fA3xCX5OTU19zg"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c0673fe2-e833-4d5d-9487-1da09245e790", "DetectTime": "2024-05-21T12:38:37.861473+00:00", "EventTime": "2024-05-21T12:38:37.861490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.176.96.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNahYp3qIhK3mkNYwa"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4d882385-214c-49f8-9721-2d00634b7c6b", "DetectTime": "2024-05-21T12:38:37.872823+00:00", "EventTime": "2024-05-21T12:38:37.872841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDgXV80gCQlCY3Hh"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "c2f98e8d-2216-4d24-af80-729dc01abffd", "DetectTime": "2024-05-21T12:38:37.883851+00:00", "EventTime": "2024-05-21T12:38:37.883871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKUgt1Qj8j6lLgpy7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "45ae6f80-e5e3-4f46-9bce-24aee8a2e768", "DetectTime": "2024-05-21T12:38:37.890769+00:00", "EventTime": "2024-05-21T12:38:37.890790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.231.149.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vOZz3usiDGLhQI0b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "cb3f283d-23a6-4fbe-a084-9a0458b4af60", "DetectTime": "2024-05-21T12:38:37.895888+00:00", "EventTime": "2024-05-21T12:38:37.895909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.59.252.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0H7h1a5CuAmVrOhh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "72576b51-1c1c-40f0-8291-9c7171500453", "DetectTime": "2024-05-21T12:38:37.918432+00:00", "EventTime": "2024-05-21T12:38:37.918454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUOp11OmClWmXPsu1"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "6d93d173-d3d6-4b54-8bb6-fb21113900b7", "DetectTime": "2024-05-21T12:38:37.946290+00:00", "EventTime": "2024-05-21T12:38:37.946309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C20Jh12hGaNlqvVuF"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "5cee69cf-8975-4dec-a18b-8068126c11b8", "DetectTime": "2024-05-21T12:38:37.983836+00:00", "EventTime": "2024-05-21T12:38:37.983860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26222/UDP destination IP 190.56.254.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJx3h4SWS5XPgVYUh"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "f2222f05-ad46-4e7c-9149-24d2f6d407bc", "DetectTime": "2024-05-21T12:38:38.024855+00:00", "EventTime": "2024-05-21T12:38:38.024875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XcNn8pZch2gxwx2"], "accumulated_threat_level": 5.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "8523db34-ea96-4f26-a940-31c40112e625", "DetectTime": "2024-05-21T12:38:38.065732+00:00", "EventTime": "2024-05-21T12:38:38.065754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXmEB3k6H6DG73hql"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "bd54da5d-fa8c-4313-8b0b-b440a2480cc9", "DetectTime": "2024-05-21T12:38:38.093639+00:00", "EventTime": "2024-05-21T12:38:38.093661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cogd8k3ABgEU0hhFU1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 99} +{"Format": "IDEA0", "ID": "4021238b-6e21-466d-a6db-1855d18419d2", "DetectTime": "2024-05-21T12:38:38.130299+00:00", "EventTime": "2024-05-21T12:38:38.130318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfOx9i1lCUUWUj1yba"], "accumulated_threat_level": 7.199999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "b659c591-5e5e-4bcc-80e7-8b4d494cc467", "DetectTime": "2024-05-21T12:38:38.173055+00:00", "EventTime": "2024-05-21T12:38:38.173075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV6fvy2enrqkiwBE42"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "6a28bf14-a346-4929-a137-32b9a28e5d61", "DetectTime": "2024-05-21T12:38:38.177931+00:00", "EventTime": "2024-05-21T12:38:38.177949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.195.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjIYu2kpSqYcpAM7i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "a56bc07c-f56f-4d47-ab4e-a454b0fc5a17", "DetectTime": "2024-05-21T12:38:38.471351+00:00", "EventTime": "2024-05-21T12:38:38.471374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtEF22fB3kDXlJn0d"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "511b3a16-e57f-423c-b12e-316183314e25", "DetectTime": "2024-05-21T12:38:38.574522+00:00", "EventTime": "2024-05-21T12:38:38.574543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.133.189.129 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBawGr2nodGPl3b0F7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "99126ed3-5ba2-49ee-ad9c-c2be45185a06", "DetectTime": "2024-05-21T12:38:38.588341+00:00", "EventTime": "2024-05-21T12:38:38.588360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2uwS2Nfvom5zhgq3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "746cdb6e-9092-47de-ab09-b413d6b1a808", "DetectTime": "2024-05-21T12:38:38.593525+00:00", "EventTime": "2024-05-21T12:38:38.593544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWj9yLB1PsdOoTYPd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "6a734881-1172-412c-a19f-8c2dee635692", "DetectTime": "2024-05-21T12:38:38.611595+00:00", "EventTime": "2024-05-21T12:38:38.611617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.219.71.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7KRM29n6MPwVI8di"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "340854a7-8324-4843-a3bc-06a775fd1bbe", "DetectTime": "2024-05-21T12:38:38.711604+00:00", "EventTime": "2024-05-21T12:38:38.711621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.246.37.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PUav2pTNQnEJ31Ie"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "0c38b68d-ea8f-429e-93a3-9c75cfef6c68", "DetectTime": "2024-05-21T12:38:38.717695+00:00", "EventTime": "2024-05-21T12:38:38.717714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHnHt2JooH5ex0I2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 99} +{"Format": "IDEA0", "ID": "8f2eb268-db1b-4add-b337-91fad10768af", "DetectTime": "2024-05-21T12:38:38.752862+00:00", "EventTime": "2024-05-21T12:38:38.752882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfb2PV3rOmgcDup2H6"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "3e27c8ab-2619-4c0a-b94a-fd1df7363416", "DetectTime": "2024-05-21T12:38:38.988784+00:00", "EventTime": "2024-05-21T12:38:38.988803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwX3U1lsjYeBWacqk"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "bc403c36-0aba-4462-a2dd-24366a3d6e93", "DetectTime": "2024-05-21T12:38:39.063562+00:00", "EventTime": "2024-05-21T12:38:39.063583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.227.139.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs63rz4rKdckroHr13"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "b4d88916-1243-40d7-87cc-bc98e21bb434", "DetectTime": "2024-05-21T12:38:39.106114+00:00", "EventTime": "2024-05-21T12:38:39.106136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.153.236.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zxDm2H1dqxH4SPRb"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "7d86be0d-5eec-4889-b403-9033c7abad82", "DetectTime": "2024-05-21T12:38:39.112012+00:00", "EventTime": "2024-05-21T12:38:39.112031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.24.211.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB47A81cxowPXGdlti"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "2c905583-2003-4067-bc99-4a116306e866", "DetectTime": "2024-05-21T12:38:39.117425+00:00", "EventTime": "2024-05-21T12:38:39.117448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.217.224.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Wxy3AbHqfH32j5"], "accumulated_threat_level": 9.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "586066b4-42db-4de0-a85f-86de0145bd6a", "DetectTime": "2024-05-21T12:38:39.130078+00:00", "EventTime": "2024-05-21T12:38:39.130099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrhLHo2tPuxYAGH8yj"], "accumulated_threat_level": 10.4, "timewindow": 99} +{"Format": "IDEA0", "ID": "fd3243a6-c2a5-48d3-885e-6234548aa1dd", "DetectTime": "2024-05-21T12:38:39.135026+00:00", "EventTime": "2024-05-21T12:38:39.135045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWyMBn2DQYBqSvgey4"], "accumulated_threat_level": 10.4, "timewindow": 99} +{"Format": "IDEA0", "ID": "f4e2ee7f-c4ea-4ad0-a311-5207c92ddb84", "DetectTime": "2024-05-21T12:38:39.286964+00:00", "EventTime": "2024-05-21T12:38:39.286982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEm8Ru8fSk046hWPl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "da633b98-98e5-4e33-9d74-02365b789121", "DetectTime": "2024-05-21T12:38:39.510650+00:00", "EventTime": "2024-05-21T12:38:39.510670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.146.168.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0daI72jhvmpeACHa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "52343152-ab32-431d-b1cb-96ceac811807", "DetectTime": "2024-05-21T12:38:39.516521+00:00", "EventTime": "2024-05-21T12:38:39.516543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DL0F4377tumOqre1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "bc7cd6d9-ce40-4a8d-b70e-491b27577db7", "DetectTime": "2024-05-21T12:38:39.583620+00:00", "EventTime": "2024-05-21T12:38:39.583640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.254.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPZB31tc7IkSzpYud"], "accumulated_threat_level": 11.200000000000001, "timewindow": 99} +{"Format": "IDEA0", "ID": "5fbacd00-a631-4790-9f61-a0e75e473d36", "DetectTime": "2024-05-21T12:38:39.634081+00:00", "EventTime": "2024-05-21T12:38:39.634100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl49GP3Tz6LPKoEC4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 99} +{"Format": "Json", "ID": "5fbacd00-a631-4790-9f61-a0e75e473d36", "DetectTime": "2024-05-21T12:38:39.634081+00:00", "EventTime": "2024-05-21T12:38:39.634100+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "1970-01-05T02:49:11.803802+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 99. (real time 2024/05/21 12:38:40.117266)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 99, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a82e81a1-ed63-4d7a-8848-8af322bc9611", "DetectTime": "2024-05-21T12:38:40.121499+00:00", "EventTime": "2024-05-21T12:38:40.121516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.111.56.170 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMtGXg23CWAUSPDHQ1"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "1a60e7df-e6b3-4be6-b51f-10a5e46b9c8b", "DetectTime": "2024-05-21T12:38:40.126217+00:00", "EventTime": "2024-05-21T12:38:40.126235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.12.140.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH6BjRRlEEDVXzvYa"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "5daae9ec-794b-438d-91b7-ba3eca4c53be", "DetectTime": "2024-05-21T12:38:40.139822+00:00", "EventTime": "2024-05-21T12:38:40.139843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpo7U2JLjonNkBqSf"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "9a17f993-e006-46b7-8ac0-f025bac4f61d", "DetectTime": "2024-05-21T12:38:40.144689+00:00", "EventTime": "2024-05-21T12:38:40.144708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.91.101.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsVN34D8jPFoa5Epl"], "accumulated_threat_level": 0, "timewindow": 99} +{"Format": "IDEA0", "ID": "2027271d-c51b-4520-be80-6ccf17b73e72", "DetectTime": "2024-05-21T12:38:40.155532+00:00", "EventTime": "2024-05-21T12:38:40.155553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpLzX2wuldunO4wDc"], "accumulated_threat_level": 0.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "58754907-e159-4f66-941e-cf06ef280015", "DetectTime": "2024-05-21T12:38:40.167884+00:00", "EventTime": "2024-05-21T12:38:40.167906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE870O1re9oZH04lfj"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "cb71f016-4f75-4ca8-9124-82fa5dbe83f1", "DetectTime": "2024-05-21T12:38:40.179007+00:00", "EventTime": "2024-05-21T12:38:40.179028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.248.71.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FVVu1Py9dbzNZaBh"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "d9a378b3-1310-41fa-ac8b-7d6befc0622f", "DetectTime": "2024-05-21T12:38:40.183905+00:00", "EventTime": "2024-05-21T12:38:40.183923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.208.48.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbaSXZBr32JtWOBx8"], "accumulated_threat_level": 1.6, "timewindow": 99} +{"Format": "IDEA0", "ID": "ba9dde90-2440-4f47-b3fc-d8b74fee524f", "DetectTime": "2024-05-21T12:38:40.196333+00:00", "EventTime": "2024-05-21T12:38:40.196356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.198.255.149"]}], "Attach": [{"Content": "Connection to unknown destination port 9891/UDP destination IP 190.198.255.149. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckfay51LMtKcWnE9Ch"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "a00eddd6-d18b-49b4-8eee-7769e5f1072a", "DetectTime": "2024-05-21T12:38:40.201444+00:00", "EventTime": "2024-05-21T12:38:40.201462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 116.15.24.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg6UAQ39mmhXtZ95V6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "8e04c6bd-9c1c-48e5-a883-103577d70b0f", "DetectTime": "2024-05-21T12:38:40.206387+00:00", "EventTime": "2024-05-21T12:38:40.206421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.109.94.100 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfFUK2JfyfVEnIlkk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 99} +{"Format": "IDEA0", "ID": "50b48e29-d893-4152-9677-e336ca56119b", "DetectTime": "2024-05-21T12:38:40.219423+00:00", "EventTime": "2024-05-21T12:38:40.219441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptC1w43YoSv97Xkzk"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "5424754b-cf5c-4f6e-a270-e833b19099a6", "DetectTime": "2024-05-21T12:38:40.270016+00:00", "EventTime": "2024-05-21T12:38:40.270036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.45.241.223 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLXuBH1NtQPYvTELU2"], "accumulated_threat_level": 3.2, "timewindow": 99} +{"Format": "IDEA0", "ID": "0ca67e06-3b64-4b2b-a536-57a2a1b9d254", "DetectTime": "2024-05-21T12:38:40.313249+00:00", "EventTime": "2024-05-21T12:38:40.313268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDPjcSTt5DFIwQBnc"], "accumulated_threat_level": 4.0, "timewindow": 99} +{"Format": "IDEA0", "ID": "39f52493-9437-4c83-a47d-ffedc70d27dc", "DetectTime": "2024-05-21T12:38:40.326793+00:00", "EventTime": "2024-05-21T12:38:40.326815+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.77.231.101"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgl35i2JsiZQQcX6"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "978be4f5-5ed8-4767-be44-603799857e7a", "DetectTime": "2024-05-21T12:38:40.341890+00:00", "EventTime": "2024-05-21T12:38:40.341917+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.77.231.101"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.77.231.101 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgl35i2JsiZQQcX6"], "accumulated_threat_level": 6.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "fc25d1cf-9c91-44f4-99b4-14b38e5f2031", "DetectTime": "2024-05-21T12:38:40.353914+00:00", "EventTime": "2024-05-21T12:38:40.353933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcM5uj4AkODh7GEZr9"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "84d076a6-3d8a-494b-a791-9c6546aff18d", "DetectTime": "2024-05-21T12:38:40.578040+00:00", "EventTime": "2024-05-21T12:38:40.578066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.207.149.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOy6F3ToO2pFmWf3b"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "7b024aa1-6a00-4c43-8ca0-464f47a23c14", "DetectTime": "2024-05-21T12:38:40.607158+00:00", "EventTime": "2024-05-21T12:38:40.607180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.92.72.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qwL31smlcobXdvl6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "1b6e8bb3-6b79-439b-aac4-340ec939c113", "DetectTime": "2024-05-21T12:38:40.674814+00:00", "EventTime": "2024-05-21T12:38:40.674835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhwCz1N4M9NHiBTu3"], "accumulated_threat_level": 0.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "207de9d7-61da-4603-93cb-5e9139ed1766", "DetectTime": "2024-05-21T12:38:40.754151+00:00", "EventTime": "2024-05-21T12:38:40.754172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSZX12qVxt08KIfol", "CgFkad1FNqh2XEI274", "Cm3PAppo4DP3WWqg5", "Cg2gHC4LDnVwcddjd6"], "accumulated_threat_level": 1.3, "timewindow": 100} +{"Format": "IDEA0", "ID": "b6423d57-bded-4cd0-aaa4-913f5353ee71", "DetectTime": "2024-05-21T12:38:40.795075+00:00", "EventTime": "2024-05-21T12:38:40.795093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb5Qu513wswApaqpra"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8e39d397-1bfd-4938-bc7e-60926fada808", "DetectTime": "2024-05-21T12:38:40.844102+00:00", "EventTime": "2024-05-21T12:38:40.844124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.165.170.202 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4cFc36IizX5uFqXb"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4be4874b-b1a2-4fad-99a0-ece53da99c16", "DetectTime": "2024-05-21T12:38:40.892720+00:00", "EventTime": "2024-05-21T12:38:40.892742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.171.87.44 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6c21G1c6WLdUnjkNi"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4ca3b848-f068-418a-8996-1c6dd380558e", "DetectTime": "2024-05-21T12:38:40.925936+00:00", "EventTime": "2024-05-21T12:38:40.925959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.56.10.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnIWbc3pyecCJT2NAe"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9133ce83-463e-40ab-a8a2-d7cd9af3f6a1", "DetectTime": "2024-05-21T12:38:41.032779+00:00", "EventTime": "2024-05-21T12:38:41.032803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.112.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJpVc1InElo3WZN8h"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "d44a557b-791a-46af-9740-6769929b8c00", "DetectTime": "2024-05-21T12:38:41.079020+00:00", "EventTime": "2024-05-21T12:38:41.079038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.178.57.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3DW7I2Ldknnb85749"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "7d6f9ec0-5e0b-4967-bc04-4424a703f42a", "DetectTime": "2024-05-21T12:38:41.149803+00:00", "EventTime": "2024-05-21T12:38:41.149826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.70.178 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHV7im3mmQ2PM8Bnkc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "d2705f90-050b-4701-a397-c9541527616b", "DetectTime": "2024-05-21T12:38:41.399103+00:00", "EventTime": "2024-05-21T12:38:41.399124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.249.120.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0UgCj49eKeXEm16i9"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b1f052c9-f0a7-4d9e-b5c1-5c240d201471", "DetectTime": "2024-05-21T12:38:41.405200+00:00", "EventTime": "2024-05-21T12:38:41.405219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.205.77.27 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn6N7s3ZUmpLbjSicb"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "603f4df1-3393-4605-8c3f-6a7421453729", "DetectTime": "2024-05-21T12:38:41.550348+00:00", "EventTime": "2024-05-21T12:38:41.550367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.221.159.35 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JrCJ21sk3yF0FXO6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "73919c54-dbd3-45ee-a37d-93e94c98bd04", "DetectTime": "2024-05-21T12:38:41.609791+00:00", "EventTime": "2024-05-21T12:38:41.609809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.129.134.157 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cizirz2MxkHMxFPhF2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e89c43d1-569b-49f8-b6fe-7dbdb5a070b0", "DetectTime": "2024-05-21T12:38:41.664584+00:00", "EventTime": "2024-05-21T12:38:41.664605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3gHIJ3k0rutMtOwc2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "65441950-ad12-4ced-aa74-8d1320511e7a", "DetectTime": "2024-05-21T12:38:41.705499+00:00", "EventTime": "2024-05-21T12:38:41.705521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.251.79.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmBSj1whH8oZHj07e"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "6182ddce-46a4-4f23-9028-216f8b609a2d", "DetectTime": "2024-05-21T12:38:41.744149+00:00", "EventTime": "2024-05-21T12:38:41.744173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.186.210.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyXvnk1DVBGRyPetbl"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "176921c0-d1ad-4dcb-a98f-b3a26f1bbac5", "DetectTime": "2024-05-21T12:38:41.780002+00:00", "EventTime": "2024-05-21T12:38:41.780021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YK2W2Vs5zbj9jm07"], "accumulated_threat_level": 2.1, "timewindow": 100} +{"Format": "IDEA0", "ID": "0a810219-b701-4ea7-b4f7-1539a82c9b5d", "DetectTime": "2024-05-21T12:38:41.810576+00:00", "EventTime": "2024-05-21T12:38:41.810597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.1.58.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIIBDp1SAO3nuyncpe"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "00ba4471-6c3b-4c64-8738-50a92066a13f", "DetectTime": "2024-05-21T12:38:41.910119+00:00", "EventTime": "2024-05-21T12:38:41.910147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.28.94.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZephj43HwxlhWXbn4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c1e4b362-442a-48ce-a1e3-3d17cab7eec8", "DetectTime": "2024-05-21T12:38:42.153586+00:00", "EventTime": "2024-05-21T12:38:42.153607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhap92KrjnzuQ0CPh"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8026029e-8ede-437c-a692-fd0d997d6407", "DetectTime": "2024-05-21T12:38:42.158615+00:00", "EventTime": "2024-05-21T12:38:42.158635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.133.177.109 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgwPfJ6WwjOurvkk"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "57b0b1cc-fa1d-4d05-b158-779ccb8434f0", "DetectTime": "2024-05-21T12:38:42.304019+00:00", "EventTime": "2024-05-21T12:38:42.304037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjNWd91ooVtPkFUL74"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 100} +{"Format": "IDEA0", "ID": "b45e5675-43db-4f62-87c2-95c6f2344761", "DetectTime": "2024-05-21T12:38:42.356268+00:00", "EventTime": "2024-05-21T12:38:42.356287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wNDHIj6lvahAabc"], "accumulated_threat_level": 3.7, "timewindow": 100} +{"Format": "IDEA0", "ID": "e4df9e4c-d3e7-43ba-9825-db39c97f321e", "DetectTime": "2024-05-21T12:38:42.558437+00:00", "EventTime": "2024-05-21T12:38:42.558458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpNds3y1GeeNJwAMi"], "accumulated_threat_level": 4.5, "timewindow": 100} +{"Format": "IDEA0", "ID": "b2593e3c-3a3c-469f-8a39-c936eb16a5e0", "DetectTime": "2024-05-21T12:38:42.677366+00:00", "EventTime": "2024-05-21T12:38:42.677388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.75.123.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcMxaoFnCAwrsfyG1"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "bc8e90ef-cf77-427e-a94d-e32d07022d48", "DetectTime": "2024-05-21T12:38:42.691561+00:00", "EventTime": "2024-05-21T12:38:42.691579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQttX8dD5f8CM9MRg"], "accumulated_threat_level": 5.3, "timewindow": 100} +{"Format": "IDEA0", "ID": "91b610ad-9d31-485f-a2ad-3190da9946c8", "DetectTime": "2024-05-21T12:38:42.697568+00:00", "EventTime": "2024-05-21T12:38:42.697590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5YBW2g9SWKmgqZHi"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "121e1514-ee6e-4b16-aace-eac53c38b821", "DetectTime": "2024-05-21T12:38:42.702909+00:00", "EventTime": "2024-05-21T12:38:42.702931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 4.28.39.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUw2A4e2ol7TwbGyc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "570117a7-3704-49ce-b050-9c0555c090cf", "DetectTime": "2024-05-21T12:38:42.808245+00:00", "EventTime": "2024-05-21T12:38:42.808266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTMS5R2afHasffXXe"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "61516d9a-170d-4e09-89e3-4dc941d0fa72", "DetectTime": "2024-05-21T12:38:43.067614+00:00", "EventTime": "2024-05-21T12:38:43.067638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.204.29.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdu6Rb3W7j6YwJzW3e"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "bf8b473b-9201-454b-8886-5f017121a9a2", "DetectTime": "2024-05-21T12:38:43.078056+00:00", "EventTime": "2024-05-21T12:38:43.078078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.199.133.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyE0BhvdEsxQdGed"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "921ab84f-5b42-43eb-a18e-c05566c004cc", "DetectTime": "2024-05-21T12:38:43.122043+00:00", "EventTime": "2024-05-21T12:38:43.122065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQ0BtTtzmDXdkbu3"], "accumulated_threat_level": 6.1, "timewindow": 100} +{"Format": "IDEA0", "ID": "852d8362-c354-4095-ade4-a9ddfce6dbc0", "DetectTime": "2024-05-21T12:38:43.127363+00:00", "EventTime": "2024-05-21T12:38:43.127380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.54.108.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2MO0G22ho3LP6g2Z2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4c247749-b568-4ce9-a9c4-65c09dbb485e", "DetectTime": "2024-05-21T12:38:43.132264+00:00", "EventTime": "2024-05-21T12:38:43.132282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.105.109.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7laiOtFmJhm2pR5k"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e1ff1b6f-3fcc-4a95-824b-c60dccbc3f40", "DetectTime": "2024-05-21T12:38:43.221446+00:00", "EventTime": "2024-05-21T12:38:43.221468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqrokW1VbFHmHQFex4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8f1ac8e9-f91d-4343-9f3e-ba3e1a880fcc", "DetectTime": "2024-05-21T12:38:43.276834+00:00", "EventTime": "2024-05-21T12:38:43.276856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrqjL332ObaP0pzm5k"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 100} +{"Format": "IDEA0", "ID": "a53557d4-5ec5-473b-8435-4309e1a530ea", "DetectTime": "2024-05-21T12:38:43.317756+00:00", "EventTime": "2024-05-21T12:38:43.317777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8N3Y19YH0dqPMFDj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "ba8468ec-9eb1-4bdf-bd49-1dfd80a76431", "DetectTime": "2024-05-21T12:38:43.372118+00:00", "EventTime": "2024-05-21T12:38:43.372138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXmnf1EnbqSyEQC37"], "accumulated_threat_level": 8.5, "timewindow": 100} +{"Format": "IDEA0", "ID": "3eb6ea22-2a75-4708-9461-2e309a511d88", "DetectTime": "2024-05-21T12:38:43.715115+00:00", "EventTime": "2024-05-21T12:38:43.715140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.254.20.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuQxgB44wrr51MuNg7"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "dae19dda-232d-4af6-af62-db6ff4a414fc", "DetectTime": "2024-05-21T12:38:43.720774+00:00", "EventTime": "2024-05-21T12:38:43.720793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEc2t4qI4pz5K4yI2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8fb27172-22bc-42e2-9450-e2124247655e", "DetectTime": "2024-05-21T12:38:43.725359+00:00", "EventTime": "2024-05-21T12:38:43.725377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.162.1.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chc65v4u8KOeOzmS72"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "ea2bf413-7a27-4bb6-aa14-d92608a298fa", "DetectTime": "2024-05-21T12:38:43.730323+00:00", "EventTime": "2024-05-21T12:38:43.730341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 206.53.94.14 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBXGzA2vTO7w8rHwf4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "fb75d16b-147b-4890-a4c1-727ba31f51c4", "DetectTime": "2024-05-21T12:38:43.735746+00:00", "EventTime": "2024-05-21T12:38:43.735776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.236.104.33 IP seen in blacklist: PBL Spamhaus Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXc9UC1PIP60qgNDL6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "87a10ba5-129f-4589-8334-6cc68c6ad33c", "DetectTime": "2024-05-21T12:38:43.765549+00:00", "EventTime": "2024-05-21T12:38:43.765569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXr3jz13KnHgEzX2z"], "accumulated_threat_level": 9.3, "timewindow": 100} +{"Format": "IDEA0", "ID": "1b8c4735-6fc3-49db-943f-d4cfb7d65727", "DetectTime": "2024-05-21T12:38:43.903796+00:00", "EventTime": "2024-05-21T12:38:43.903819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0g461QUPgdiXP3Ik"], "accumulated_threat_level": 10.100000000000001, "timewindow": 100} +{"Format": "IDEA0", "ID": "e7d18a6e-ba08-47f9-84e4-ff56fa931a1f", "DetectTime": "2024-05-21T12:38:43.942604+00:00", "EventTime": "2024-05-21T12:38:43.942627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtP7Du4XvtZ7z6UrJ1"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "cf32b20b-b6a5-4731-82b6-77c9e7b0d4c8", "DetectTime": "2024-05-21T12:38:43.993549+00:00", "EventTime": "2024-05-21T12:38:43.993567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqLSHS1ksPtKhfcQz7"], "accumulated_threat_level": 10.900000000000002, "timewindow": 100} +{"Format": "IDEA0", "ID": "0b1d9986-e611-4dbc-b5d6-86078f12bcfa", "DetectTime": "2024-05-21T12:38:44.009791+00:00", "EventTime": "2024-05-21T12:38:44.009812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.37.115.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6AcX1CXQXdTgHw9c"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "cb891d21-fadf-4e5b-b9cb-08574cab9136", "DetectTime": "2024-05-21T12:38:44.310346+00:00", "EventTime": "2024-05-21T12:38:44.310365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.32.165.211 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMS524wlFaKrkbqOk"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "82ed1cfa-00dc-4cba-820b-48800b7b1890", "DetectTime": "2024-05-21T12:38:44.315750+00:00", "EventTime": "2024-05-21T12:38:44.315768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.177.185.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8dJuqFBYeI93KWwi"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9a6be36b-6f5a-4223-912f-23231e8aa2df", "DetectTime": "2024-05-21T12:38:44.330593+00:00", "EventTime": "2024-05-21T12:38:44.330615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.161.119.149 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxY2YL2lQblsxcA4ob"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b2cd36e6-fd80-4d5b-8b80-ae98cc4271aa", "DetectTime": "2024-05-21T12:38:44.335768+00:00", "EventTime": "2024-05-21T12:38:44.335787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.24.30.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwKCED4ch9MJmm8F76"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9eaf4273-c210-4429-85a6-be3bb061ccfe", "DetectTime": "2024-05-21T12:38:44.347675+00:00", "EventTime": "2024-05-21T12:38:44.347694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsB9mo4VovZrxMkcJ8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 100} +{"Format": "IDEA0", "ID": "7607e26f-63f8-4ec3-814a-065faa6759c4", "DetectTime": "2024-05-21T12:38:44.378621+00:00", "EventTime": "2024-05-21T12:38:44.378643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.92.120.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRLXJ10V4RcCN4oV4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4ed6b960-c375-4b6c-8655-17cc75741bcd", "DetectTime": "2024-05-21T12:38:44.393180+00:00", "EventTime": "2024-05-21T12:38:44.393201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.103.36.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcGXn4OlLhr6WRgci"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "909f5ac9-133e-4743-8c15-506e0b3c62d7", "DetectTime": "2024-05-21T12:38:44.758109+00:00", "EventTime": "2024-05-21T12:38:44.758130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 115.64.28.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwT9G2AXFgcDSDpUa"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "99c164a5-335b-4f77-a525-c56ce9a35920", "DetectTime": "2024-05-21T12:38:44.764831+00:00", "EventTime": "2024-05-21T12:38:44.764852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.244.153.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhVqV11lLlNCNWW24"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8ddef6ab-2d74-4469-9440-737dee49aa01", "DetectTime": "2024-05-21T12:38:44.826849+00:00", "EventTime": "2024-05-21T12:38:44.826870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 194.236.15.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKISf2TkOQd6ax4S1"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "2af65576-10d1-47b4-870c-806f7d73711c", "DetectTime": "2024-05-21T12:38:44.843681+00:00", "EventTime": "2024-05-21T12:38:44.843702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.206.193.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClCA2u10e8om0Tx49j"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "5f4bf931-eed9-4bca-a7b1-8d90c5cc2cf4", "DetectTime": "2024-05-21T12:38:44.893609+00:00", "EventTime": "2024-05-21T12:38:44.893634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.100.61.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CStWST2PNeTXZrkz68"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "a7085a3a-c126-4063-b786-012c7e2769b9", "DetectTime": "2024-05-21T12:38:44.918306+00:00", "EventTime": "2024-05-21T12:38:44.918328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUhST2L3Vi5D7ewSj"], "accumulated_threat_level": 12.500000000000004, "timewindow": 100} +{"Format": "Json", "ID": "a7085a3a-c126-4063-b786-012c7e2769b9", "DetectTime": "2024-05-21T12:38:44.918306+00:00", "EventTime": "2024-05-21T12:38:44.918328+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "1970-01-05T03:20:57.421848+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2024/05/21 12:38:45.124522)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 100, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "4b685d29-a4a4-45c7-9c8c-837620524ef0", "DetectTime": "2024-05-21T12:38:45.128845+00:00", "EventTime": "2024-05-21T12:38:45.128864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 120.151.139.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZgBwkmzfLofJRj83"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "aa9d58bc-d8ee-4174-8019-0813f1f5807d", "DetectTime": "2024-05-21T12:38:45.133739+00:00", "EventTime": "2024-05-21T12:38:45.133758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMext4AaKG0xnBsC3"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "5d7dab93-e407-4c91-9120-06d3c7360dcb", "DetectTime": "2024-05-21T12:38:45.138602+00:00", "EventTime": "2024-05-21T12:38:45.138621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmou13NUSHfludZok"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "7e4085d5-ca1a-47cf-b79e-62de4c07deaa", "DetectTime": "2024-05-21T12:38:45.247728+00:00", "EventTime": "2024-05-21T12:38:45.247746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C171Bc2wyKnVVOsVP9"], "accumulated_threat_level": 0.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "9bb828d2-1f64-46c9-9653-78ba0f868f98", "DetectTime": "2024-05-21T12:38:45.252873+00:00", "EventTime": "2024-05-21T12:38:45.252890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.113.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTuoZD1iECE3BSFzDb"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "d773dd3d-de80-42b9-bd48-9b6f620b95c4", "DetectTime": "2024-05-21T12:38:45.337990+00:00", "EventTime": "2024-05-21T12:38:45.338014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.16.165.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPG7hQBUZpTwZNPX"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "acb329ef-a829-4fb2-9a01-e0b29989a91f", "DetectTime": "2024-05-21T12:38:45.343534+00:00", "EventTime": "2024-05-21T12:38:45.343557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.11.63.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSj01102OfON1Ni57"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "521badb5-6443-4bb2-b0a6-1794b3c76619", "DetectTime": "2024-05-21T12:38:45.397033+00:00", "EventTime": "2024-05-21T12:38:45.397054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAE0O1dnW3uipm6id"], "accumulated_threat_level": 1.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "08166336-1c8c-4b88-81ff-0183e58f1c70", "DetectTime": "2024-05-21T12:38:45.428183+00:00", "EventTime": "2024-05-21T12:38:45.428205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.115.194.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3LWjy1tD9xN1hfac8"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c51fcd7a-77fb-47f5-9720-c127e71ed890", "DetectTime": "2024-05-21T12:38:45.462876+00:00", "EventTime": "2024-05-21T12:38:45.462899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.17.25.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJcPg3LAQ3ZMtSsn1"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "00abbe29-565b-4f16-ad12-3fd0047f887f", "DetectTime": "2024-05-21T12:38:45.501636+00:00", "EventTime": "2024-05-21T12:38:45.501656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0wcy3DfhA85JMpfc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 100} +{"Format": "IDEA0", "ID": "213d00ec-73c6-4720-b59b-81eb7171f2fe", "DetectTime": "2024-05-21T12:38:45.544637+00:00", "EventTime": "2024-05-21T12:38:45.544657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOyAY18qXRh59ev4i"], "accumulated_threat_level": 3.2, "timewindow": 100} +{"Format": "IDEA0", "ID": "d5d1832b-9fbd-4942-9b54-5124edd2f00f", "DetectTime": "2024-05-21T12:38:45.588969+00:00", "EventTime": "2024-05-21T12:38:45.588992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVYNaK3lP9ldDFsTvl"], "accumulated_threat_level": 4.0, "timewindow": 100} +{"Format": "IDEA0", "ID": "08df021f-e8b2-4331-891c-76e98dcfcff6", "DetectTime": "2024-05-21T12:38:45.630255+00:00", "EventTime": "2024-05-21T12:38:45.630275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNxucR2XDqSJF27dLj"], "accumulated_threat_level": 4.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "dd99ef5b-9dce-45dc-8bef-62492140c00b", "DetectTime": "2024-05-21T12:38:45.854093+00:00", "EventTime": "2024-05-21T12:38:45.854114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.39.73.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsYMNqy34k9ndP3i"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "f875fd85-b15d-4522-9d68-b4a46f4a842b", "DetectTime": "2024-05-21T12:38:45.890227+00:00", "EventTime": "2024-05-21T12:38:45.890247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDZ4p1UFjDJKCluK5"], "accumulated_threat_level": 5.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "5d39d2c5-2e74-49e7-bdc7-eaed2661017c", "DetectTime": "2024-05-21T12:38:45.931480+00:00", "EventTime": "2024-05-21T12:38:45.931500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAanxi24CAr8Z2JFj8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 100} +{"Format": "IDEA0", "ID": "500e600e-e9e9-4d43-b7ca-3fa95ca6ded3", "DetectTime": "2024-05-21T12:38:45.975920+00:00", "EventTime": "2024-05-21T12:38:45.975939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLN6244Xh9IHXkWh6d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "d7c9f026-24c3-4d08-b9fb-6c925ed20f3e", "DetectTime": "2024-05-21T12:38:46.018488+00:00", "EventTime": "2024-05-21T12:38:46.018510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCxTMpQZARnMDMFC3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "9591e64c-cbac-4125-a6a1-2cfa1269d7e0", "DetectTime": "2024-05-21T12:38:46.061655+00:00", "EventTime": "2024-05-21T12:38:46.061680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJugHq1KImeTDGttO3"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "37bdc2ea-0421-4f1e-95b2-b0a11a3091f8", "DetectTime": "2024-05-21T12:38:46.075626+00:00", "EventTime": "2024-05-21T12:38:46.075647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.116.40.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxLjEK1kGlBihExVhc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9a6e6af7-8537-4166-b8d0-445eca25abd3", "DetectTime": "2024-05-21T12:38:46.086977+00:00", "EventTime": "2024-05-21T12:38:46.086997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.82.106.153 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ySmp4vR7g2ofBY18"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "49bf8fa4-b54d-46d4-9d4b-01cc6e88cf0c", "DetectTime": "2024-05-21T12:38:46.155889+00:00", "EventTime": "2024-05-21T12:38:46.155906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci7URD2zmWyqOWvULc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "6ddedd30-616d-4922-badb-7dbfd62b9665", "DetectTime": "2024-05-21T12:38:46.170203+00:00", "EventTime": "2024-05-21T12:38:46.170225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.88.44.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqSYx1UJc3YflyZt8"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "cdb959c5-83e9-4261-9c1b-31b79b608202", "DetectTime": "2024-05-21T12:38:46.425967+00:00", "EventTime": "2024-05-21T12:38:46.425991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.28.170.103 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Jvd110vf4FAPASH6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8d50bd50-8fb8-4e3e-b520-f0b8294fd738", "DetectTime": "2024-05-21T12:38:46.454665+00:00", "EventTime": "2024-05-21T12:38:46.454685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.166.33.7 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0VlQLvlc6BEfY4b"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c684706e-9211-4f5a-97ac-d5277d98fa3c", "DetectTime": "2024-05-21T12:38:46.508982+00:00", "EventTime": "2024-05-21T12:38:46.509001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQQWVUjR1RunUXCi"], "accumulated_threat_level": 9.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "e319667e-d975-48a9-b86d-b338abaa12ab", "DetectTime": "2024-05-21T12:38:46.514623+00:00", "EventTime": "2024-05-21T12:38:46.514641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.43.232.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzQYU2H7GcuK6WLhc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "55010453-b9a2-449f-8b7d-e4b165a574d3", "DetectTime": "2024-05-21T12:38:46.563005+00:00", "EventTime": "2024-05-21T12:38:46.563025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.235.118.178 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouPMf4l1RpGiZSP8"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "0397d777-8ae9-4763-ab62-cfb01277a304", "DetectTime": "2024-05-21T12:38:46.601487+00:00", "EventTime": "2024-05-21T12:38:46.601507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJSQf3WSe5IHMClE2"], "accumulated_threat_level": 10.4, "timewindow": 100} +{"Format": "IDEA0", "ID": "29668ee9-8646-4ef0-94bc-962edc6df80d", "DetectTime": "2024-05-21T12:38:46.627963+00:00", "EventTime": "2024-05-21T12:38:46.627984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.149.88.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2QRp4iMyea8BAN4g"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "f17afe96-064e-406d-9168-e37941daeea6", "DetectTime": "2024-05-21T12:38:46.664425+00:00", "EventTime": "2024-05-21T12:38:46.664448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.110.134.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWJssn1iK88uWoJ0Y6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4f367ccd-1026-4701-80a3-68f78f2d3672", "DetectTime": "2024-05-21T12:38:46.701581+00:00", "EventTime": "2024-05-21T12:38:46.701600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBzU635cQvMmWHrf7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 100} +{"Format": "IDEA0", "ID": "42298655-8530-4aa2-a2ac-5fde687595d8", "DetectTime": "2024-05-21T12:38:46.756606+00:00", "EventTime": "2024-05-21T12:38:46.756627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYlQnF4OTVRWR3aFba", "Cg4P6StpFAZBIQ9mg", "CgEcKn4AMMirpaJUp9", "CgFjvQ1s13q7I7Tq4h"], "accumulated_threat_level": 11.700000000000001, "timewindow": 100} +{"Format": "IDEA0", "ID": "8d4fc2b3-716f-4c52-9946-ab2fd65fc351", "DetectTime": "2024-05-21T12:38:46.815270+00:00", "EventTime": "2024-05-21T12:38:46.815296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhITv36lLKQS0dc88"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "efe88049-9fed-43a9-aee5-6e1f00c41484", "DetectTime": "2024-05-21T12:38:46.831650+00:00", "EventTime": "2024-05-21T12:38:46.831672+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXhITv36lLKQS0dc88"], "accumulated_threat_level": 6.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "f2dee8f8-8c0d-4117-9e52-ab907923aeb2", "DetectTime": "2024-05-21T12:38:46.922421+00:00", "EventTime": "2024-05-21T12:38:46.922440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.5.22.15 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNcIEz29hOskzpwu7a"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "d492bd9b-1e34-4e84-aff6-c4b5e6deb0d5", "DetectTime": "2024-05-21T12:38:46.982445+00:00", "EventTime": "2024-05-21T12:38:46.982467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5xz7k1X7oFnOXHHc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c21dedda-2850-4a72-b927-abbfd63680d6", "DetectTime": "2024-05-21T12:38:46.987693+00:00", "EventTime": "2024-05-21T12:38:46.987717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.179.193.243 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI23Kk4GxWpQnmfFib"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "66e1a050-ba4e-478d-89fe-7174e07c1af7", "DetectTime": "2024-05-21T12:38:47.026720+00:00", "EventTime": "2024-05-21T12:38:47.026739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTyXlvvglNFJBoRb"], "accumulated_threat_level": 12.500000000000002, "timewindow": 100} +{"Format": "Json", "ID": "66e1a050-ba4e-478d-89fe-7174e07c1af7", "DetectTime": "2024-05-21T12:38:47.026720+00:00", "EventTime": "2024-05-21T12:38:47.026739+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "1970-01-05T03:21:01.962619+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2024/05/21 12:38:47.235419)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000002, "timewindow": 100, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000002} +{"Format": "IDEA0", "ID": "3d0a0efe-28c2-4d49-86a8-a69d751541f9", "DetectTime": "2024-05-21T12:38:47.241561+00:00", "EventTime": "2024-05-21T12:38:47.241581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyJwuEFyipNAqtJla"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "98b7f679-ae25-4d2e-a3e6-f4972fbb90a3", "DetectTime": "2024-05-21T12:38:47.246890+00:00", "EventTime": "2024-05-21T12:38:47.246911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.218.26.31 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUp3ED3NQn6DyACfHa"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c7ebda35-a0a7-469e-a45f-c809bdcf9235", "DetectTime": "2024-05-21T12:38:47.259800+00:00", "EventTime": "2024-05-21T12:38:47.259826+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVSe01cWq8v94rBq6"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "f78e0319-7ad0-49ad-907a-3a37aa31a5cf", "DetectTime": "2024-05-21T12:38:47.272713+00:00", "EventTime": "2024-05-21T12:38:47.272732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVSe01cWq8v94rBq6"], "accumulated_threat_level": 7.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "05b00a4e-5eb7-41b9-aaf5-c18489bff77c", "DetectTime": "2024-05-21T12:38:47.286058+00:00", "EventTime": "2024-05-21T12:38:47.286080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAW0gPMdKoisQX9Hj"], "accumulated_threat_level": 0.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "81c12de3-6205-4940-9161-04587e43b2e7", "DetectTime": "2024-05-21T12:38:47.298019+00:00", "EventTime": "2024-05-21T12:38:47.298042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.56.254.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26222/UDP destination IP 190.56.254.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxMJZ2bVjMjpz2RWk"], "accumulated_threat_level": 1.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "e47569d1-415d-4927-bbc9-cdd1309800ed", "DetectTime": "2024-05-21T12:38:47.312033+00:00", "EventTime": "2024-05-21T12:38:47.312058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHjCa1y9kWYTfbzx3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 100} +{"Format": "IDEA0", "ID": "0757199e-5ef1-41d1-b2cd-f44f46346dac", "DetectTime": "2024-05-21T12:38:47.323856+00:00", "EventTime": "2024-05-21T12:38:47.323874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPhDSKn7f69MrvH8"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "8f6c7c60-831f-404c-8e2a-09324291d6d1", "DetectTime": "2024-05-21T12:38:47.336263+00:00", "EventTime": "2024-05-21T12:38:47.336285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPhDSKn7f69MrvH8"], "accumulated_threat_level": 7.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "b32386aa-8996-4143-bc9d-b07cf09c27ec", "DetectTime": "2024-05-21T12:38:47.341367+00:00", "EventTime": "2024-05-21T12:38:47.341386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjO6792co3VHbuvg3"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "94b1ef99-7c2d-4204-9f63-60029a45db3f", "DetectTime": "2024-05-21T12:38:47.448733+00:00", "EventTime": "2024-05-21T12:38:47.448752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYsso4UfEiFDra5if"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "8991129f-f3c7-4892-813e-fac90135ab14", "DetectTime": "2024-05-21T12:38:47.460758+00:00", "EventTime": "2024-05-21T12:38:47.460778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYsso4UfEiFDra5if"], "accumulated_threat_level": 8.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "23bb6472-669f-4a7a-bc0b-4b90eb2c73d6", "DetectTime": "2024-05-21T12:38:47.506260+00:00", "EventTime": "2024-05-21T12:38:47.506278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUjgFId5jaVO2Crl"], "accumulated_threat_level": 3.2, "timewindow": 100} +{"Format": "IDEA0", "ID": "17c7b9af-5530-4711-b226-345dc2b9843f", "DetectTime": "2024-05-21T12:38:47.644269+00:00", "EventTime": "2024-05-21T12:38:47.644290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdK00m26hgEZM3cawh"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "4d61e89a-5c22-4960-9107-b6b673e96050", "DetectTime": "2024-05-21T12:38:47.678900+00:00", "EventTime": "2024-05-21T12:38:47.678921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNq491kiEunXwa4Xk"], "accumulated_threat_level": 4.0, "timewindow": 100} +{"Format": "IDEA0", "ID": "28a798fb-e2b7-4357-a6c5-dcd73d03d77b", "DetectTime": "2024-05-21T12:38:47.721241+00:00", "EventTime": "2024-05-21T12:38:47.721264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPjWpwAtmG6b8k9g"], "accumulated_threat_level": 4.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "2965ccbf-28a6-4752-9cc6-fbc5e776e88d", "DetectTime": "2024-05-21T12:38:47.763694+00:00", "EventTime": "2024-05-21T12:38:47.763713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca95NObKBxX2zKtIe"], "accumulated_threat_level": 5.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "9a97a83f-ccd1-4b5e-815a-1db2a2667ed1", "DetectTime": "2024-05-21T12:38:47.809921+00:00", "EventTime": "2024-05-21T12:38:47.809938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZxT2Y3AuUazDpcj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 100} +{"Format": "IDEA0", "ID": "38129ffa-4d72-416e-af87-4b586ba4064b", "DetectTime": "2024-05-21T12:38:47.844407+00:00", "EventTime": "2024-05-21T12:38:47.844428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKpeO03fOGQeLxvxHi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "2a11c001-d7f5-4f17-94b5-e43941b18c8e", "DetectTime": "2024-05-21T12:38:47.886437+00:00", "EventTime": "2024-05-21T12:38:47.886459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgdp3U2AYHkqJqnLT6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "10e4d5fa-6291-4561-801c-3688ebff2ca5", "DetectTime": "2024-05-21T12:38:47.932369+00:00", "EventTime": "2024-05-21T12:38:47.932393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJM8WWmUf3Xo7tq8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "c3caa0c7-a4db-46c8-a395-8b2e73a5c93b", "DetectTime": "2024-05-21T12:38:47.978768+00:00", "EventTime": "2024-05-21T12:38:47.978791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuuo8C3RfXyfvOTad9"], "accumulated_threat_level": 9.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "e6be6898-6ecb-4ddf-9611-6c194d797359", "DetectTime": "2024-05-21T12:38:48.231626+00:00", "EventTime": "2024-05-21T12:38:48.231652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cajqib3gGdD6ukj14i"], "accumulated_threat_level": 10.4, "timewindow": 100} +{"Format": "IDEA0", "ID": "a09682cc-0cdb-41e1-b0fa-957cbb53a7bb", "DetectTime": "2024-05-21T12:38:48.273865+00:00", "EventTime": "2024-05-21T12:38:48.273891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGNhE4CPG3xri1jXl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 100} +{"Format": "IDEA0", "ID": "0e3ed7d3-b5f3-43c5-9842-ee76485bd7e0", "DetectTime": "2024-05-21T12:38:48.323101+00:00", "EventTime": "2024-05-21T12:38:48.323123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI2sA3u39pWHFXRJk"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b5236a7f-c1de-4026-af0f-04843b484f63", "DetectTime": "2024-05-21T12:38:48.376427+00:00", "EventTime": "2024-05-21T12:38:48.376448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6udTl4oTbO3gRJ9x"], "accumulated_threat_level": 12.000000000000002, "timewindow": 100} +{"Format": "Json", "ID": "b5236a7f-c1de-4026-af0f-04843b484f63", "DetectTime": "2024-05-21T12:38:48.376427+00:00", "EventTime": "2024-05-21T12:38:48.376448+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-05T03:43:12.755205+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2024/05/21 12:38:48.568378)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 100, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8ef2493a-f4d6-4b17-909e-a21b766b702b", "DetectTime": "2024-05-21T12:38:48.573352+00:00", "EventTime": "2024-05-21T12:38:48.573377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaY8qM1xtSARlN2Kn"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "eec19252-ce3e-40ea-be55-121ba9e98485", "DetectTime": "2024-05-21T12:38:48.579199+00:00", "EventTime": "2024-05-21T12:38:48.579221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGo224EImgRMt6IJ9"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "a3fe6514-4f6b-4179-b9f1-a0ed5a06ded2", "DetectTime": "2024-05-21T12:38:48.584241+00:00", "EventTime": "2024-05-21T12:38:48.584259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZwW543dfc9IsE3Wb"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "6a410dde-27f4-411d-835a-9ddf58e06363", "DetectTime": "2024-05-21T12:38:48.638212+00:00", "EventTime": "2024-05-21T12:38:48.638240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJxTk4MaDgc20VINl"], "accumulated_threat_level": 0.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "c592e2a9-30dd-4c6a-b075-4510acbdc427", "DetectTime": "2024-05-21T12:38:48.679409+00:00", "EventTime": "2024-05-21T12:38:48.679439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.72.34.37"]}], "Attach": [{"Content": "Connection to unknown destination port 1112/UDP destination IP 85.72.34.37. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnfmVgnPsmXeWeCO2"], "accumulated_threat_level": 1.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "5c4486ea-ff24-4ab4-ba6a-af5e9291998d", "DetectTime": "2024-05-21T12:38:48.731967+00:00", "EventTime": "2024-05-21T12:38:48.732003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrQHF4R2czZTMK1d5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 100} +{"Format": "IDEA0", "ID": "b7c65597-e240-40e0-bebc-b4a3f0136261", "DetectTime": "2024-05-21T12:38:48.952532+00:00", "EventTime": "2024-05-21T12:38:48.952555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpI6qPBnFYl8rtc8"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "2f06b6dc-520d-4285-8cdf-30cf19f5cad3", "DetectTime": "2024-05-21T12:38:48.992864+00:00", "EventTime": "2024-05-21T12:38:48.992883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTSaeC32yuiHnCzCpj"], "accumulated_threat_level": 3.2, "timewindow": 100} +{"Format": "IDEA0", "ID": "b70e9c72-b2fd-42a8-9c28-31bcaeb189f5", "DetectTime": "2024-05-21T12:38:49.017065+00:00", "EventTime": "2024-05-21T12:38:49.017086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdz6TFoSJqJwKA7m1"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "2538de34-a351-4932-8d5f-86f0fcb8aba4", "DetectTime": "2024-05-21T12:38:49.055047+00:00", "EventTime": "2024-05-21T12:38:49.055067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzNKyyEZtwKDbGxH4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "f3530f54-6ae5-4e96-bbc3-48c2132573a0", "DetectTime": "2024-05-21T12:38:49.091590+00:00", "EventTime": "2024-05-21T12:38:49.091609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHR1OJ1BlwedebqPQ5"], "accumulated_threat_level": 4.0, "timewindow": 100} +{"Format": "IDEA0", "ID": "3470085d-9f28-41f4-b681-f79116c5f16b", "DetectTime": "2024-05-21T12:38:49.186878+00:00", "EventTime": "2024-05-21T12:38:49.186901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswvPm42b5vT0bb0Hh"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "3ccf92c2-c366-4b77-b0be-e99f66e4e7b3", "DetectTime": "2024-05-21T12:38:49.229022+00:00", "EventTime": "2024-05-21T12:38:49.229043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4sRi4p7FxkoWYVb9"], "accumulated_threat_level": 4.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "c490090e-7bb1-4a1e-a3ea-fcebe53147d3", "DetectTime": "2024-05-21T12:38:49.271108+00:00", "EventTime": "2024-05-21T12:38:49.271127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTf932rb6Zt80q2b4"], "accumulated_threat_level": 5.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "dd6b74ea-77f8-4f49-8589-672eb8787947", "DetectTime": "2024-05-21T12:38:49.314063+00:00", "EventTime": "2024-05-21T12:38:49.314082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1DvYN21DJKoWaBBJg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 100} +{"Format": "IDEA0", "ID": "7a82786e-4a35-426b-a325-d6ea802c64ae", "DetectTime": "2024-05-21T12:38:49.537793+00:00", "EventTime": "2024-05-21T12:38:49.537814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWFxOrZmPwz9v8x2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "7656a046-363b-4b62-8810-459c5ed90bb0", "DetectTime": "2024-05-21T12:38:49.581283+00:00", "EventTime": "2024-05-21T12:38:49.581308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhCyp3GdlkqDBaLH2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "705b79a6-c148-4703-a402-d07c7ee04096", "DetectTime": "2024-05-21T12:38:49.600434+00:00", "EventTime": "2024-05-21T12:38:49.600457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8Vwywdaw7wOBMck"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b6b219b7-c46d-473c-8c06-8f770c4ffd84", "DetectTime": "2024-05-21T12:38:49.642170+00:00", "EventTime": "2024-05-21T12:38:49.642191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAv5hF0goLw5l2kPk"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "12415e4d-1d59-4729-a4b8-2885369a6466", "DetectTime": "2024-05-21T12:38:49.675483+00:00", "EventTime": "2024-05-21T12:38:49.675504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B1asxLyrTeRuIU6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "df34fee7-6bb3-42f8-8a8c-ef192610fd7d", "DetectTime": "2024-05-21T12:38:49.715612+00:00", "EventTime": "2024-05-21T12:38:49.715634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cntf9W2mhGjn1mKuva"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "03afd237-c1c6-481c-8de5-8eb052ee520a", "DetectTime": "2024-05-21T12:38:49.760084+00:00", "EventTime": "2024-05-21T12:38:49.760103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wgTO2YwFWPF6NdWg"], "accumulated_threat_level": 9.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "56655b0d-e507-42d0-af76-c6550260c1a1", "DetectTime": "2024-05-21T12:38:49.795784+00:00", "EventTime": "2024-05-21T12:38:49.795807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVuxqj1yXJFmc258p3"], "accumulated_threat_level": 10.4, "timewindow": 100} +{"Format": "IDEA0", "ID": "66873b87-42bc-4add-b177-3a79f2bb0b76", "DetectTime": "2024-05-21T12:38:49.836940+00:00", "EventTime": "2024-05-21T12:38:49.836962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwZOS1rDprS7Gxzk2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 100} +{"Format": "IDEA0", "ID": "e8a00510-a9b6-4996-9361-da4da6d0dda7", "DetectTime": "2024-05-21T12:38:49.877129+00:00", "EventTime": "2024-05-21T12:38:49.877146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnI0Je1c5957HpnPuc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 100} +{"Format": "Json", "ID": "e8a00510-a9b6-4996-9361-da4da6d0dda7", "DetectTime": "2024-05-21T12:38:49.877129+00:00", "EventTime": "2024-05-21T12:38:49.877146+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "1970-01-05T03:52:31.573510+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2024/05/21 12:38:50.077379)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 100, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "47470258-05d9-449a-9371-e9547b823f99", "DetectTime": "2024-05-21T12:38:50.105504+00:00", "EventTime": "2024-05-21T12:38:50.105526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cle82l259ykmCLkzv"], "accumulated_threat_level": 0.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "c532ccbc-62c5-4936-9451-92cc3eb0267d", "DetectTime": "2024-05-21T12:38:50.146766+00:00", "EventTime": "2024-05-21T12:38:50.146784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.165.82.66"]}], "Attach": [{"Content": "Connection to unknown destination port 7252/UDP destination IP 181.165.82.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdICno1ePGNATJNS1"], "accumulated_threat_level": 1.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "68f7e2bf-c176-46ee-b8f2-acc08df6c3c5", "DetectTime": "2024-05-21T12:38:50.189280+00:00", "EventTime": "2024-05-21T12:38:50.189300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQTfb1muEiyN7QW9a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 100} +{"Format": "IDEA0", "ID": "e6966094-42fc-4cdb-a10a-5b0295bd579b", "DetectTime": "2024-05-21T12:38:50.232018+00:00", "EventTime": "2024-05-21T12:38:50.232039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchlWFqYpcXqIprI9"], "accumulated_threat_level": 3.2, "timewindow": 100} +{"Format": "IDEA0", "ID": "b92435a5-007c-47a0-b51b-86771fabb113", "DetectTime": "2024-05-21T12:38:50.273992+00:00", "EventTime": "2024-05-21T12:38:50.274010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clkg5312NZaTS4zjLe"], "accumulated_threat_level": 4.0, "timewindow": 100} +{"Format": "IDEA0", "ID": "cbc430a5-f995-45f0-ba50-f65e5d7925f5", "DetectTime": "2024-05-21T12:38:50.303874+00:00", "EventTime": "2024-05-21T12:38:50.303895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMIIz4ObwWQ9UvbR2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "d4cf2356-cecf-4630-935f-1ddf4063ec5b", "DetectTime": "2024-05-21T12:38:50.337837+00:00", "EventTime": "2024-05-21T12:38:50.337856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkHaz4J0XyzsMLWoa"], "accumulated_threat_level": 4.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "a5572639-b957-45e6-b02d-df45c9b1fe66", "DetectTime": "2024-05-21T12:38:50.367686+00:00", "EventTime": "2024-05-21T12:38:50.367706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmiTrNyg1GpiY3tji"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "dcf3668d-99b8-47cb-80b6-a7bb1c0fa38f", "DetectTime": "2024-05-21T12:38:50.403314+00:00", "EventTime": "2024-05-21T12:38:50.403336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.75.245.104"]}], "Attach": [{"Content": "Connection to unknown destination port 7494/UDP destination IP 190.75.245.104. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLXnL1gF03p4Ijcs2"], "accumulated_threat_level": 5.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "1306c85b-ca94-4691-b223-77ef32879362", "DetectTime": "2024-05-21T12:38:50.451734+00:00", "EventTime": "2024-05-21T12:38:50.451756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EMWg2AKFTbnOtKe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 100} +{"Format": "IDEA0", "ID": "3db4c17c-69ff-4373-ae4b-239cc22457d8", "DetectTime": "2024-05-21T12:38:50.671726+00:00", "EventTime": "2024-05-21T12:38:50.671749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8VsUE1zyhnR5MNudl"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "29fff3b8-2473-44d0-b518-61585d8b85d0", "DetectTime": "2024-05-21T12:38:50.812067+00:00", "EventTime": "2024-05-21T12:38:50.812088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3Yol3k1qcKyPmHaa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "4b52801b-1c04-47e0-be62-e5a2b60807e5", "DetectTime": "2024-05-21T12:38:50.821773+00:00", "EventTime": "2024-05-21T12:38:50.821793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjI5J713uKRcl454"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b70cd20e-3d26-46b6-b9c2-1de2ec7dee0b", "DetectTime": "2024-05-21T12:38:50.860078+00:00", "EventTime": "2024-05-21T12:38:50.860096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cymoyw1LoKS1YkgtMi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "9804be18-7942-48fc-8e7e-59b8cde3bf40", "DetectTime": "2024-05-21T12:38:50.910845+00:00", "EventTime": "2024-05-21T12:38:50.910863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57yNo1rDxQ4uSzLDb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "ae05683d-d2b0-4bb6-bb0a-e49d9da89b59", "DetectTime": "2024-05-21T12:38:50.954304+00:00", "EventTime": "2024-05-21T12:38:50.954323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBRO5D12rYnqWLu0W"], "accumulated_threat_level": 9.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "3af7abe6-8275-482c-af72-f3a2762a1d3b", "DetectTime": "2024-05-21T12:38:50.992956+00:00", "EventTime": "2024-05-21T12:38:50.992976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdXSw1ETbJxzF1T1i"], "accumulated_threat_level": 10.4, "timewindow": 100} +{"Format": "IDEA0", "ID": "8080cc55-46d7-4412-8f5c-0d402fc72921", "DetectTime": "2024-05-21T12:38:51.039693+00:00", "EventTime": "2024-05-21T12:38:51.039744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Le5r1igan8jgH5mi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 100} +{"Format": "IDEA0", "ID": "ef04f155-b77d-4750-9556-2005433de5d8", "DetectTime": "2024-05-21T12:38:51.078341+00:00", "EventTime": "2024-05-21T12:38:51.078361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYHxv3ksFXUicf0w4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 100} +{"Format": "Json", "ID": "ef04f155-b77d-4750-9556-2005433de5d8", "DetectTime": "2024-05-21T12:38:51.078341+00:00", "EventTime": "2024-05-21T12:38:51.078361+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "1970-01-05T03:52:51.940609+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 100. (real time 2024/05/21 12:38:51.543828)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 100, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "69a22df3-6d89-4e59-b357-5cb3b5e3f2df", "DetectTime": "2024-05-21T12:38:51.555483+00:00", "EventTime": "2024-05-21T12:38:51.555504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7AyI1U2ePIsLolH1"], "accumulated_threat_level": 0.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "b46901c2-0ccf-48c0-9bf4-48a4d34f8dbf", "DetectTime": "2024-05-21T12:38:51.560617+00:00", "EventTime": "2024-05-21T12:38:51.560635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAZVUhk8IlOymFkKj"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "cd93486f-bdb5-4056-b38b-a4b94b478197", "DetectTime": "2024-05-21T12:38:51.565856+00:00", "EventTime": "2024-05-21T12:38:51.565874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAlKd73mz1hkkMRCnl"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "14bd7c8d-ec79-4e5d-8b4f-7c31459d5d4d", "DetectTime": "2024-05-21T12:38:51.570725+00:00", "EventTime": "2024-05-21T12:38:51.570743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYF7NF4InYoSYeyOHi"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "16fb8531-7f07-4196-b722-0ae4774ddb61", "DetectTime": "2024-05-21T12:38:51.575633+00:00", "EventTime": "2024-05-21T12:38:51.575651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbvn6N1hLTko6EVCIg"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c68c25cf-5d1d-4024-b7f8-0040c5e76756", "DetectTime": "2024-05-21T12:38:51.587985+00:00", "EventTime": "2024-05-21T12:38:51.588003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4CJT27ltomdsIJFl"], "accumulated_threat_level": 1.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "e7b11e49-7bb5-4f36-b1b1-46288ea42726", "DetectTime": "2024-05-21T12:38:51.593938+00:00", "EventTime": "2024-05-21T12:38:51.593966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRu03m2fxjJIXCCbi4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "66785b27-cb0b-4a43-918c-d09a6472f7d9", "DetectTime": "2024-05-21T12:38:51.599233+00:00", "EventTime": "2024-05-21T12:38:51.599252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci5TDn1XCWaM2FIK65"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "107651a6-ec80-40ce-88e5-e20e50ae805a", "DetectTime": "2024-05-21T12:38:51.603663+00:00", "EventTime": "2024-05-21T12:38:51.603681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouaB84FmqsJmUVFc5"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e93e975e-1156-4aef-b4d8-c7fe9528f35e", "DetectTime": "2024-05-21T12:38:51.629777+00:00", "EventTime": "2024-05-21T12:38:51.629796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbwgbu2DpVh4hUvQSj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 100} +{"Format": "IDEA0", "ID": "7d1b4992-7bec-420f-ba36-14eb16dc1bf6", "DetectTime": "2024-05-21T12:38:51.880081+00:00", "EventTime": "2024-05-21T12:38:51.880100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSkpP8svZ3Xe80Nic"], "accumulated_threat_level": 3.2, "timewindow": 100} +{"Format": "IDEA0", "ID": "2ba58a42-c012-4734-b426-4eb2308eeb1d", "DetectTime": "2024-05-21T12:38:51.911227+00:00", "EventTime": "2024-05-21T12:38:51.911250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFSgHf3hQOvDneqS8a"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c7a55146-61d0-4975-9ccf-156d94fe3240", "DetectTime": "2024-05-21T12:38:51.949428+00:00", "EventTime": "2024-05-21T12:38:51.949447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsX1ALuNUqO2GtKwb"], "accumulated_threat_level": 4.0, "timewindow": 100} +{"Format": "IDEA0", "ID": "d8031e11-6359-41b9-bf67-7d869f64c954", "DetectTime": "2024-05-21T12:38:51.998884+00:00", "EventTime": "2024-05-21T12:38:51.998901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvFWa1cK8Aw6b5Vwf"], "accumulated_threat_level": 4.8, "timewindow": 100} +{"Format": "IDEA0", "ID": "e0785eda-4095-4cbf-8e3c-c1fb7a9728b8", "DetectTime": "2024-05-21T12:38:52.044168+00:00", "EventTime": "2024-05-21T12:38:52.044187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8czD3q1TEgYR8Or5"], "accumulated_threat_level": 5.6, "timewindow": 100} +{"Format": "IDEA0", "ID": "052804de-5aec-4015-b6ff-8816a15cbd60", "DetectTime": "2024-05-21T12:38:52.083771+00:00", "EventTime": "2024-05-21T12:38:52.083791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFlqE42Ex4fHslI4g3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 100} +{"Format": "IDEA0", "ID": "362de0b1-46e8-41c0-b13f-ea32b7713410", "DetectTime": "2024-05-21T12:38:52.214548+00:00", "EventTime": "2024-05-21T12:38:52.214573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYl7r715B6ONccj4bl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "df3a3959-e026-470b-841e-231d71f06988", "DetectTime": "2024-05-21T12:38:52.259236+00:00", "EventTime": "2024-05-21T12:38:52.259253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBoEo3kbLOhlrp64c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "52c1e68b-c326-49a4-b54d-54d8272ae39a", "DetectTime": "2024-05-21T12:38:52.297765+00:00", "EventTime": "2024-05-21T12:38:52.297784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUutkA2gcEC61VpdNb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "ec5e247d-5e51-412d-9b72-7bac13c97f13", "DetectTime": "2024-05-21T12:38:52.340518+00:00", "EventTime": "2024-05-21T12:38:52.340539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.195.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcbBo196N2RKEZERi"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "3b30b658-e5e5-4b24-b6bd-11ab02e62081", "DetectTime": "2024-05-21T12:38:52.345482+00:00", "EventTime": "2024-05-21T12:38:52.345501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.75.245.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX2dQt2JMcdeIOjeb6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e34b904a-cfec-4779-b2da-71e4fcb7a252", "DetectTime": "2024-05-21T12:38:52.634320+00:00", "EventTime": "2024-05-21T12:38:52.634340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbm82Z3lftYAD7iHpf"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b8dd2c33-3715-42f1-9075-e9ab7b05bc60", "DetectTime": "2024-05-21T12:38:52.639600+00:00", "EventTime": "2024-05-21T12:38:52.639619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZ75Z27hONgreMmr9"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "9fc7cdd9-6365-42c5-be5a-47547ede29c2", "DetectTime": "2024-05-21T12:38:52.644606+00:00", "EventTime": "2024-05-21T12:38:52.644624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv95fA3xCX5OTU19zg"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8451d2f3-3410-40fb-a3eb-2da5ff42ba6b", "DetectTime": "2024-05-21T12:38:52.669908+00:00", "EventTime": "2024-05-21T12:38:52.669930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDgXV80gCQlCY3Hh"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "3bdfe30d-a63a-426e-a5e3-6130c6a42a1e", "DetectTime": "2024-05-21T12:38:52.757788+00:00", "EventTime": "2024-05-21T12:38:52.757811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShgMJ1AD0qr6sIztf"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "2351b022-d7cb-452e-ba38-83bcf851ee03", "DetectTime": "2024-05-21T12:38:52.832656+00:00", "EventTime": "2024-05-21T12:38:52.832677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKUgt1Qj8j6lLgpy7"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "86400023-71e0-4cb8-92f8-886f4cf68ce4", "DetectTime": "2024-05-21T12:38:52.916797+00:00", "EventTime": "2024-05-21T12:38:52.916818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF89tEfLyPJIULGXl", "CF748v4F5XsWyhrph", "CasYUR6skricaGyjl", "CsUm3y4GkUZuhBXpL2"], "accumulated_threat_level": 1.3, "timewindow": 101} +{"Format": "IDEA0", "ID": "169f7615-3532-46f1-9d57-3bf21ab2534f", "DetectTime": "2024-05-21T12:38:52.943314+00:00", "EventTime": "2024-05-21T12:38:52.943335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUOp11OmClWmXPsu1"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "641d730d-180d-466c-b8ba-bbb8a463c400", "DetectTime": "2024-05-21T12:38:52.986114+00:00", "EventTime": "2024-05-21T12:38:52.986134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C20Jh12hGaNlqvVuF"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "e3c2f6e4-8eb8-4a9b-8f97-eb3b67c68be4", "DetectTime": "2024-05-21T12:38:53.020215+00:00", "EventTime": "2024-05-21T12:38:53.020235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.254.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJx3h4SWS5XPgVYUh"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "8bb5b6e3-1f8d-4c76-8c6b-6aee690098b4", "DetectTime": "2024-05-21T12:38:53.282916+00:00", "EventTime": "2024-05-21T12:38:53.282935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXmEB3k6H6DG73hql"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "7b3faf54-c762-4f29-8bda-94d743939461", "DetectTime": "2024-05-21T12:38:53.287782+00:00", "EventTime": "2024-05-21T12:38:53.287799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfOx9i1lCUUWUj1yba"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "85b5d074-a35f-420d-b3f5-d4ba607d9198", "DetectTime": "2024-05-21T12:38:53.293481+00:00", "EventTime": "2024-05-21T12:38:53.293500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4XcNn8pZch2gxwx2"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "6b490cbd-5c69-4838-8690-2d4c2a8a424e", "DetectTime": "2024-05-21T12:38:53.444153+00:00", "EventTime": "2024-05-21T12:38:53.444174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbtZ8D2RdcDbkKCTm9"], "accumulated_threat_level": 2.1, "timewindow": 101} +{"Format": "IDEA0", "ID": "06ac43ab-588a-4f65-b2ac-b0c751875f5c", "DetectTime": "2024-05-21T12:38:53.477251+00:00", "EventTime": "2024-05-21T12:38:53.477272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV6fvy2enrqkiwBE42"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "3aeb4686-d77b-412f-8c20-c1e1dca1a9df", "DetectTime": "2024-05-21T12:38:53.705108+00:00", "EventTime": "2024-05-21T12:38:53.705131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC2uwS2Nfvom5zhgq3"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "81853a7e-d942-466f-aebb-094b759cca6f", "DetectTime": "2024-05-21T12:38:54.066352+00:00", "EventTime": "2024-05-21T12:38:54.066372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sugj2ZnBYRaeJbYc"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 101} +{"Format": "IDEA0", "ID": "fe91096f-aae5-4781-a8f9-e6587259e405", "DetectTime": "2024-05-21T12:38:54.094522+00:00", "EventTime": "2024-05-21T12:38:54.094547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfb2PV3rOmgcDup2H6"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "276ba6df-e6ed-4fdc-b6f9-f65992d86c48", "DetectTime": "2024-05-21T12:38:54.305272+00:00", "EventTime": "2024-05-21T12:38:54.305292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrhLHo2tPuxYAGH8yj"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "c062614c-ffa6-4ad8-bd5c-62412aadf096", "DetectTime": "2024-05-21T12:38:54.518849+00:00", "EventTime": "2024-05-21T12:38:54.518871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEm8Ru8fSk046hWPl"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "993f7c7a-f964-4ab4-b4ae-4387de585dbb", "DetectTime": "2024-05-21T12:38:54.758511+00:00", "EventTime": "2024-05-21T12:38:54.758530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl49GP3Tz6LPKoEC4"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "208ba620-0634-435c-87d1-9621cf62806f", "DetectTime": "2024-05-21T12:38:54.763371+00:00", "EventTime": "2024-05-21T12:38:54.763390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.177.185.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYxnfJ2eFsPT2wlS7h"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "1e13c96b-0663-45b9-b536-0ad68d28db90", "DetectTime": "2024-05-21T12:38:54.826829+00:00", "EventTime": "2024-05-21T12:38:54.826850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpLzX2wuldunO4wDc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "b66f9fd0-a0a4-4e54-9774-cd10e6f6f038", "DetectTime": "2024-05-21T12:38:54.977508+00:00", "EventTime": "2024-05-21T12:38:54.977529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAMAz63ixwC0E5cfq7", "C4r7Gg48KdmetZ5jj6", "C2R30m1uv0RVJnYDuj", "CZEZ4s1JGQfSOqH9Q4"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 101} +{"Format": "IDEA0", "ID": "f31444e0-af1f-4378-b804-cc3e3bbbe520", "DetectTime": "2024-05-21T12:38:55.079852+00:00", "EventTime": "2024-05-21T12:38:55.079875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE870O1re9oZH04lfj"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "91968c31-b578-4886-ba64-353321e04317", "DetectTime": "2024-05-21T12:38:55.280845+00:00", "EventTime": "2024-05-21T12:38:55.280865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptC1w43YoSv97Xkzk"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "5f3300f1-3749-41e7-b905-fc72778c1f29", "DetectTime": "2024-05-21T12:38:55.318464+00:00", "EventTime": "2024-05-21T12:38:55.318483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxjCNd3XxoFCMh3Byi"], "accumulated_threat_level": 4.2, "timewindow": 101} +{"Format": "IDEA0", "ID": "0fc544e1-2c62-4eeb-ae84-6a028747a008", "DetectTime": "2024-05-21T12:38:55.353438+00:00", "EventTime": "2024-05-21T12:38:55.353461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDPjcSTt5DFIwQBnc"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "05bd35d8-6bbc-4852-a232-b7161a973218", "DetectTime": "2024-05-21T12:38:55.387900+00:00", "EventTime": "2024-05-21T12:38:55.387919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDHNn5cttU9WddY5"], "accumulated_threat_level": 5.0, "timewindow": 101} +{"Format": "IDEA0", "ID": "af431d04-d848-4be3-98ce-ebe4002b192c", "DetectTime": "2024-05-21T12:38:55.430697+00:00", "EventTime": "2024-05-21T12:38:55.430718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7f4O1GkWcdQUOjlh"], "accumulated_threat_level": 5.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "4065c14d-f0fe-4645-ba7e-33dc144b9727", "DetectTime": "2024-05-21T12:38:55.473615+00:00", "EventTime": "2024-05-21T12:38:55.473644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2PVkcRFrNjOwEze"], "accumulated_threat_level": 6.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "df14bad6-67d9-41ce-82e8-e626b8dad24f", "DetectTime": "2024-05-21T12:38:55.813496+00:00", "EventTime": "2024-05-21T12:38:55.813517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcM5uj4AkODh7GEZr9"], "accumulated_threat_level": 4.8, "timewindow": 99} +{"Format": "IDEA0", "ID": "773ed597-6f3e-49b4-8f43-4829798bc24b", "DetectTime": "2024-05-21T12:38:55.888313+00:00", "EventTime": "2024-05-21T12:38:55.888333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj8KjzmxoC8IJ9Wu6"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 101} +{"Format": "IDEA0", "ID": "4f6e8692-1e68-4a4e-9882-6cbfb67f716b", "DetectTime": "2024-05-21T12:38:55.893574+00:00", "EventTime": "2024-05-21T12:38:55.893592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFhwCz1N4M9NHiBTu3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "098acf07-bbea-4183-aa6e-bb4b1e247d8d", "DetectTime": "2024-05-21T12:38:55.938605+00:00", "EventTime": "2024-05-21T12:38:55.938630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnxlq4deFqdJKoSpc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "d4adfba2-3c4d-4770-95cc-dab586357ef2", "DetectTime": "2024-05-21T12:38:55.987089+00:00", "EventTime": "2024-05-21T12:38:55.987111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0FsKf4lgeNbeg5B4"], "accumulated_threat_level": 8.2, "timewindow": 101} +{"Format": "IDEA0", "ID": "c9dee1e9-c0e3-4e2f-8c97-6d47b6045865", "DetectTime": "2024-05-21T12:38:56.026961+00:00", "EventTime": "2024-05-21T12:38:56.026981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["94.66.186.110"]}], "Attach": [{"Content": "Connection to unknown destination port 15516/UDP destination IP 94.66.186.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDMUOasHLKPCcRT6"], "accumulated_threat_level": 9.0, "timewindow": 101} +{"Format": "IDEA0", "ID": "2a8a624b-fadf-4e44-9d9d-ae7cc983f335", "DetectTime": "2024-05-21T12:38:56.067427+00:00", "EventTime": "2024-05-21T12:38:56.067445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLAODo3xmaqbBEYwxd"], "accumulated_threat_level": 9.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "0fc4f4d1-cfc9-4f22-b338-8943e1cccfe3", "DetectTime": "2024-05-21T12:38:56.106985+00:00", "EventTime": "2024-05-21T12:38:56.107005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2hyTw2LgVPFXnEPgh"], "accumulated_threat_level": 10.600000000000001, "timewindow": 101} +{"Format": "IDEA0", "ID": "ee906136-fa14-41ea-ac20-4e743e7db695", "DetectTime": "2024-05-21T12:38:56.143620+00:00", "EventTime": "2024-05-21T12:38:56.143642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.22.146.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwolL2brTng3kV7U5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "fcb5583d-3698-43f0-9a3e-b203398b1e44", "DetectTime": "2024-05-21T12:38:56.368096+00:00", "EventTime": "2024-05-21T12:38:56.368115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTKcQa2MvJV3V7I6H3"], "accumulated_threat_level": 11.400000000000002, "timewindow": 101} +{"Format": "IDEA0", "ID": "a1d7fa45-0c04-4bae-8b4e-3be797592cc7", "DetectTime": "2024-05-21T12:38:56.397476+00:00", "EventTime": "2024-05-21T12:38:56.397497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.116.195.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzVPa24ElnZrCQTbQ7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "9fb88440-17ee-45fc-901d-d2f88dff9622", "DetectTime": "2024-05-21T12:38:56.433917+00:00", "EventTime": "2024-05-21T12:38:56.433937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfUeDFKbHbwucgqi"], "accumulated_threat_level": 12.200000000000003, "timewindow": 101} +{"Format": "Json", "ID": "9fb88440-17ee-45fc-901d-d2f88dff9622", "DetectTime": "2024-05-21T12:38:56.433917+00:00", "EventTime": "2024-05-21T12:38:56.433937+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-05T04:23:52.113123+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2024/05/21 12:38:56.673644)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 101, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "cea0ccb9-b108-4a0d-b6aa-14e7398bfca1", "DetectTime": "2024-05-21T12:38:56.689090+00:00", "EventTime": "2024-05-21T12:38:56.689107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRg8Qd312EsyPkhsea"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "89934d17-e4b2-41c7-9d3b-6e978d132f59", "DetectTime": "2024-05-21T12:38:56.701308+00:00", "EventTime": "2024-05-21T12:38:56.701329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3978S1dbgytKFjgd2"], "accumulated_threat_level": 1.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "c1135dd9-af9b-40e8-b163-b794503d04dc", "DetectTime": "2024-05-21T12:38:56.711268+00:00", "EventTime": "2024-05-21T12:38:56.711287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OHF74JK53tHTp5Vh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 101} +{"Format": "IDEA0", "ID": "6681356d-a6be-42b3-ae78-1989e2df9a07", "DetectTime": "2024-05-21T12:38:56.721306+00:00", "EventTime": "2024-05-21T12:38:56.721323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISueh2HwFvwfdtvb"], "accumulated_threat_level": 3.2, "timewindow": 101} +{"Format": "IDEA0", "ID": "dd8ef5f4-02db-4e04-9996-dc6a92a76c55", "DetectTime": "2024-05-21T12:38:56.731418+00:00", "EventTime": "2024-05-21T12:38:56.731436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLLhb4C93z1Hm3dBj"], "accumulated_threat_level": 4.0, "timewindow": 101} +{"Format": "IDEA0", "ID": "501dd820-e4a1-49b7-a1f0-1d28b5c6a129", "DetectTime": "2024-05-21T12:38:56.741784+00:00", "EventTime": "2024-05-21T12:38:56.741802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJWRk2sxt424hwaOa"], "accumulated_threat_level": 4.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "0271dca8-da3d-48c5-a9d0-bcc8353d2736", "DetectTime": "2024-05-21T12:38:56.956729+00:00", "EventTime": "2024-05-21T12:38:56.956750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.177.185.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEgao203WlibT7T31"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "49662a25-e491-4077-bb10-38133499d4ea", "DetectTime": "2024-05-21T12:38:56.961742+00:00", "EventTime": "2024-05-21T12:38:56.961761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YK2W2Vs5zbj9jm07"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "ecd5ee07-6128-4440-9bdc-09b2b422e603", "DetectTime": "2024-05-21T12:38:57.020481+00:00", "EventTime": "2024-05-21T12:38:57.020500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClOXO41fW50oilzvk"], "accumulated_threat_level": 5.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "7ac1dc5d-4af2-422f-b304-1d69fb9fbbb7", "DetectTime": "2024-05-21T12:38:57.099648+00:00", "EventTime": "2024-05-21T12:38:57.099667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5qkh2EsT0VPSdpT2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 101} +{"Format": "IDEA0", "ID": "05070c1b-7180-4f74-abf2-a864badc5b10", "DetectTime": "2024-05-21T12:38:57.164647+00:00", "EventTime": "2024-05-21T12:38:57.164664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAlG2zEpvgyI56oi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "69f2ef58-6d9d-46d0-8b2a-633c059f3c7c", "DetectTime": "2024-05-21T12:38:57.209286+00:00", "EventTime": "2024-05-21T12:38:57.209307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIk2T6CJG6yoNwIe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "b1a6a603-bb8d-4edd-a542-745045a88761", "DetectTime": "2024-05-21T12:38:57.332916+00:00", "EventTime": "2024-05-21T12:38:57.332936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDNQj3mk3QOhAW5b3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "bf7cc1a7-f8b0-4bc6-857b-81077f32d1ad", "DetectTime": "2024-05-21T12:38:57.362164+00:00", "EventTime": "2024-05-21T12:38:57.362184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjNWd91ooVtPkFUL74"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "2249adc7-11b7-431f-a80d-5e81d8c2ecae", "DetectTime": "2024-05-21T12:38:57.399393+00:00", "EventTime": "2024-05-21T12:38:57.399414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wNDHIj6lvahAabc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "43dea40c-4df8-4fe2-9962-a19db1ffb90d", "DetectTime": "2024-05-21T12:38:57.621862+00:00", "EventTime": "2024-05-21T12:38:57.621881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelVU43QPL3bp291i3"], "accumulated_threat_level": 9.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "c5c5ac0c-1753-4c61-b4f8-bc6e23900f28", "DetectTime": "2024-05-21T12:38:57.644439+00:00", "EventTime": "2024-05-21T12:38:57.644461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpNds3y1GeeNJwAMi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "14a0ba24-d678-4e33-886a-95810e78a08e", "DetectTime": "2024-05-21T12:38:57.690939+00:00", "EventTime": "2024-05-21T12:38:57.690962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zT6h170GyCO80XD4"], "accumulated_threat_level": 10.4, "timewindow": 101} +{"Format": "IDEA0", "ID": "ea620e33-bfe6-4b8b-a4ac-555b870c4b35", "DetectTime": "2024-05-21T12:38:57.731360+00:00", "EventTime": "2024-05-21T12:38:57.731381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjnwuVfjQWLQKEV9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 101} +{"Format": "IDEA0", "ID": "f9e2b66a-0de8-48f3-9e0e-cac073b0e7ff", "DetectTime": "2024-05-21T12:38:57.775185+00:00", "EventTime": "2024-05-21T12:38:57.775204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq5al12ghq92ZjUDg6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 101} +{"Format": "Json", "ID": "f9e2b66a-0de8-48f3-9e0e-cac073b0e7ff", "DetectTime": "2024-05-21T12:38:57.775185+00:00", "EventTime": "2024-05-21T12:38:57.775204+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-05T04:24:46.168042+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2024/05/21 12:38:57.932384)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 101, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "73c7e9ee-0292-4791-af92-3c7853d5dabf", "DetectTime": "2024-05-21T12:38:57.937189+00:00", "EventTime": "2024-05-21T12:38:57.937206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQttX8dD5f8CM9MRg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "917c6f53-75ab-4114-a679-0b4c5efcfb08", "DetectTime": "2024-05-21T12:38:57.948306+00:00", "EventTime": "2024-05-21T12:38:57.948327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXmbp3B6Kr3x80yN5"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "1d528835-1bcf-4b90-9e10-354eb1f2cf4e", "DetectTime": "2024-05-21T12:38:57.959037+00:00", "EventTime": "2024-05-21T12:38:57.959055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQILET2aMToVUNBSqb"], "accumulated_threat_level": 1.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "c49296f2-2b2a-49e6-b8f3-d01333887d7a", "DetectTime": "2024-05-21T12:38:57.973519+00:00", "EventTime": "2024-05-21T12:38:57.973537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuSya2EfIlqL48Irb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 101} +{"Format": "IDEA0", "ID": "f9c535a3-bd5b-413a-9d4e-510556e73fb8", "DetectTime": "2024-05-21T12:38:58.014229+00:00", "EventTime": "2024-05-21T12:38:58.014247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcXJOOoJvSZe0Hpb"], "accumulated_threat_level": 3.2, "timewindow": 101} +{"Format": "IDEA0", "ID": "8f00968e-9929-4aa6-8ed4-9fe694cbc92b", "DetectTime": "2024-05-21T12:38:58.257070+00:00", "EventTime": "2024-05-21T12:38:58.257089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpd0Vl1oVEEQrMZ0Cc"], "accumulated_threat_level": 4.0, "timewindow": 101} +{"Format": "IDEA0", "ID": "fec6b55a-4436-4bfb-948e-95842ce89e96", "DetectTime": "2024-05-21T12:38:58.288702+00:00", "EventTime": "2024-05-21T12:38:58.288723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQ0BtTtzmDXdkbu3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "3e7c045f-625b-4a98-b437-3a7904c69038", "DetectTime": "2024-05-21T12:38:58.335853+00:00", "EventTime": "2024-05-21T12:38:58.335871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yYxa38HlrkgWghL"], "accumulated_threat_level": 4.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "a831ff85-82f7-432a-ae9f-78b215756c27", "DetectTime": "2024-05-21T12:38:58.350851+00:00", "EventTime": "2024-05-21T12:38:58.350871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrqjL332ObaP0pzm5k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "b1bf5f72-a23e-4172-90c0-f6529897922e", "DetectTime": "2024-05-21T12:38:58.399807+00:00", "EventTime": "2024-05-21T12:38:58.399830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8N3Y19YH0dqPMFDj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "2ceea193-77bf-49ed-9cde-f7ac25387d27", "DetectTime": "2024-05-21T12:38:58.414103+00:00", "EventTime": "2024-05-21T12:38:58.414125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MhqE3LFrUXy8C242"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "58ffd179-b403-46ed-b600-9bdd946862fa", "DetectTime": "2024-05-21T12:38:58.465071+00:00", "EventTime": "2024-05-21T12:38:58.465094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NCEd4tWE6yEOaCxe"], "accumulated_threat_level": 5.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "a4648897-6e3a-4d07-a59b-5e5cfc3db7f8", "DetectTime": "2024-05-21T12:38:58.506376+00:00", "EventTime": "2024-05-21T12:38:58.506396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cejxlo3aB3HqCazeQ1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 101} +{"Format": "IDEA0", "ID": "9919ac47-f40f-4432-89af-1dd2ffaa376a", "DetectTime": "2024-05-21T12:38:58.550349+00:00", "EventTime": "2024-05-21T12:38:58.550367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLTv61yBrMj35mz4a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "683ca29a-cbef-4891-81ac-9b8d1fb08f78", "DetectTime": "2024-05-21T12:38:58.629071+00:00", "EventTime": "2024-05-21T12:38:58.629089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWMsPA1imwvXbxBglg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "183e3f76-184f-41f7-92be-df62a07d90a6", "DetectTime": "2024-05-21T12:38:58.854168+00:00", "EventTime": "2024-05-21T12:38:58.854188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXmnf1EnbqSyEQC37"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "d41101b8-27fe-44cf-8624-72894304da0c", "DetectTime": "2024-05-21T12:38:58.892468+00:00", "EventTime": "2024-05-21T12:38:58.892490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXr3jz13KnHgEzX2z"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "a8fe45e0-7f27-4b54-8313-3935b8871402", "DetectTime": "2024-05-21T12:38:58.950115+00:00", "EventTime": "2024-05-21T12:38:58.950137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0g461QUPgdiXP3Ik"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "6db10501-295d-4f7b-98bf-fad2c54c2249", "DetectTime": "2024-05-21T12:38:59.252424+00:00", "EventTime": "2024-05-21T12:38:59.252445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqLSHS1ksPtKhfcQz7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "599add70-ad06-4410-942b-0895a5ffe865", "DetectTime": "2024-05-21T12:38:59.781399+00:00", "EventTime": "2024-05-21T12:38:59.781420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsB9mo4VovZrxMkcJ8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "14217d11-e3ec-48fd-a55b-fc9c667c0c57", "DetectTime": "2024-05-21T12:38:59.999939+00:00", "EventTime": "2024-05-21T12:38:59.999962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUhST2L3Vi5D7ewSj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "f0ba7f06-5968-48dd-bf51-3b1591ee822f", "DetectTime": "2024-05-21T12:39:00.334472+00:00", "EventTime": "2024-05-21T12:39:00.334493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C171Bc2wyKnVVOsVP9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "c096c2e0-b16b-4bdf-a485-ac0d4d69a129", "DetectTime": "2024-05-21T12:39:00.350183+00:00", "EventTime": "2024-05-21T12:39:00.350206+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNpK5snWeS8JKvFk"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "37cbf47e-715d-49df-a2ec-064671707ea0", "DetectTime": "2024-05-21T12:39:00.364180+00:00", "EventTime": "2024-05-21T12:39:00.364199+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNpK5snWeS8JKvFk"], "accumulated_threat_level": 8.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "b0f5a6d7-2055-4ac9-a266-ed6c0b0ab725", "DetectTime": "2024-05-21T12:39:00.428783+00:00", "EventTime": "2024-05-21T12:39:00.428804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHf0uB4h2fcXvhyWV7", "CfFwii1z0EACnhIUL4", "CF1IyQ16vnyXDJ4tgl", "ChSR2aaOt1GmtPVS5"], "accumulated_threat_level": 8.5, "timewindow": 101} +{"Format": "IDEA0", "ID": "d0585ea1-b25a-427a-a310-14176015bf0a", "DetectTime": "2024-05-21T12:39:00.471840+00:00", "EventTime": "2024-05-21T12:39:00.471862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAE0O1dnW3uipm6id"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "de860ddc-4e53-4a0c-bdec-b3f4a4836f01", "DetectTime": "2024-05-21T12:39:00.535213+00:00", "EventTime": "2024-05-21T12:39:00.535235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0wcy3DfhA85JMpfc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "35bc6664-c65e-4cc6-903d-7123921a5ef3", "DetectTime": "2024-05-21T12:39:00.577862+00:00", "EventTime": "2024-05-21T12:39:00.577884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOyAY18qXRh59ev4i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "f9406d39-ef56-4462-93b1-dc38c701a22c", "DetectTime": "2024-05-21T12:39:00.668900+00:00", "EventTime": "2024-05-21T12:39:00.668919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9aVbU3uhpCC3CEc3i"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "439a72f9-5174-40fc-b2ca-3801cce6f7f9", "DetectTime": "2024-05-21T12:39:00.681389+00:00", "EventTime": "2024-05-21T12:39:00.681408+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9aVbU3uhpCC3CEc3i"], "accumulated_threat_level": 9.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "fc842b80-70b6-4939-adbb-aa28b247d163", "DetectTime": "2024-05-21T12:39:00.879379+00:00", "EventTime": "2024-05-21T12:39:00.879401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNxucR2XDqSJF27dLj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "5f28d165-35ed-4f3b-9be9-67ff790da17c", "DetectTime": "2024-05-21T12:39:00.884296+00:00", "EventTime": "2024-05-21T12:39:00.884316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVYNaK3lP9ldDFsTvl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "30c81d35-bc5c-454c-ab79-743b7ef62ba7", "DetectTime": "2024-05-21T12:39:00.948308+00:00", "EventTime": "2024-05-21T12:39:00.948330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.75.245.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXDZ4p1UFjDJKCluK5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "537d907a-3de5-4a31-b4ad-999600db8b13", "DetectTime": "2024-05-21T12:39:00.985040+00:00", "EventTime": "2024-05-21T12:39:00.985063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAanxi24CAr8Z2JFj8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "383100ab-8c33-4c6f-8537-a4f10d5e54e8", "DetectTime": "2024-05-21T12:39:01.021867+00:00", "EventTime": "2024-05-21T12:39:01.021890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLN6244Xh9IHXkWh6d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "47ecdd31-ee9f-48bc-b85c-a9ba4f46264f", "DetectTime": "2024-05-21T12:39:01.057855+00:00", "EventTime": "2024-05-21T12:39:01.057876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCxTMpQZARnMDMFC3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "26a2106e-cafc-4925-aadc-b527f43ccc90", "DetectTime": "2024-05-21T12:39:01.456248+00:00", "EventTime": "2024-05-21T12:39:01.456273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci7URD2zmWyqOWvULc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "bcf8d948-014e-4a01-9308-72bc5560ca20", "DetectTime": "2024-05-21T12:39:01.568648+00:00", "EventTime": "2024-05-21T12:39:01.568667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBQQWVUjR1RunUXCi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "0a4bac0f-4e92-4da0-92b7-3ae5642633b6", "DetectTime": "2024-05-21T12:39:01.642862+00:00", "EventTime": "2024-05-21T12:39:01.642891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJSQf3WSe5IHMClE2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "e8145456-8375-4e68-84e5-f2eb27feaf4c", "DetectTime": "2024-05-21T12:39:01.932662+00:00", "EventTime": "2024-05-21T12:39:01.932683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChBzU635cQvMmWHrf7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "18a5cb60-8dbe-4c03-a8c0-2ffd5d9aa63b", "DetectTime": "2024-05-21T12:39:02.159076+00:00", "EventTime": "2024-05-21T12:39:02.159097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTyXlvvglNFJBoRb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "87574891-43f3-4ca4-b771-71b478f10781", "DetectTime": "2024-05-21T12:39:02.194645+00:00", "EventTime": "2024-05-21T12:39:02.194666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3OPva2wWd4NpCrmOb"], "accumulated_threat_level": 9.3, "timewindow": 101} +{"Format": "IDEA0", "ID": "2ad4fa44-913f-4c8b-b78c-96d8402b8e86", "DetectTime": "2024-05-21T12:39:02.223967+00:00", "EventTime": "2024-05-21T12:39:02.223990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAW0gPMdKoisQX9Hj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "2edfa6a2-6472-4c91-9e16-b787fce345c7", "DetectTime": "2024-05-21T12:39:02.256684+00:00", "EventTime": "2024-05-21T12:39:02.256706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.254.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxMJZ2bVjMjpz2RWk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "ec109b40-6d9a-4798-8649-c0cd7ee2b48c", "DetectTime": "2024-05-21T12:39:02.288655+00:00", "EventTime": "2024-05-21T12:39:02.288674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["1.23.68.2"]}], "Attach": [{"Content": "Connection to unknown destination port 8721/UDP destination IP 1.23.68.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcTmr4gSNrq4Cmkvh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 101} +{"Format": "IDEA0", "ID": "3f1decec-5055-4575-8d31-78cb26d98a48", "DetectTime": "2024-05-21T12:39:02.323425+00:00", "EventTime": "2024-05-21T12:39:02.323449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHjCa1y9kWYTfbzx3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "6c51a6da-e633-4ec5-ba3e-e8af3fda1409", "DetectTime": "2024-05-21T12:39:02.365638+00:00", "EventTime": "2024-05-21T12:39:02.365657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C172092h9J3xFhUXna"], "accumulated_threat_level": 10.900000000000002, "timewindow": 101} +{"Format": "IDEA0", "ID": "14dfaf23-f1fe-4162-9443-847af75ff4cd", "DetectTime": "2024-05-21T12:39:02.513939+00:00", "EventTime": "2024-05-21T12:39:02.513960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJNOk4VOHCWH8SWEd"], "accumulated_threat_level": 11.700000000000003, "timewindow": 101} +{"Format": "IDEA0", "ID": "1b67f139-f0ab-49b7-8d45-f4e1bcf12c42", "DetectTime": "2024-05-21T12:39:02.554469+00:00", "EventTime": "2024-05-21T12:39:02.554491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv2gE54fbJWWJq2817"], "accumulated_threat_level": 12.500000000000004, "timewindow": 101} +{"Format": "Json", "ID": "1b67f139-f0ab-49b7-8d45-f4e1bcf12c42", "DetectTime": "2024-05-21T12:39:02.554469+00:00", "EventTime": "2024-05-21T12:39:02.554491+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-05T04:56:22.934265+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2024/05/21 12:39:02.814883)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 101, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "f614b1d2-e738-4d54-a6b1-56a8ad90a04a", "DetectTime": "2024-05-21T12:39:02.818866+00:00", "EventTime": "2024-05-21T12:39:02.818884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNq491kiEunXwa4Xk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "0388a959-2be9-4b82-83bc-6a8da82afa94", "DetectTime": "2024-05-21T12:39:02.823628+00:00", "EventTime": "2024-05-21T12:39:02.823646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPjWpwAtmG6b8k9g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "dbc3ac59-d67a-4efb-9c50-ff6fb88deaf9", "DetectTime": "2024-05-21T12:39:02.828248+00:00", "EventTime": "2024-05-21T12:39:02.828266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUjgFId5jaVO2Crl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "a2c67afe-e64a-42e9-8bd0-28a13bdf4fa1", "DetectTime": "2024-05-21T12:39:02.840414+00:00", "EventTime": "2024-05-21T12:39:02.840435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjg6Uy3mZutmNkWkgf"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "73788edc-1dd0-4436-a6ca-953e4042f1ba", "DetectTime": "2024-05-21T12:39:02.949130+00:00", "EventTime": "2024-05-21T12:39:02.949151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca95NObKBxX2zKtIe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "6a16b102-cd4a-4bba-a7ed-58bb39ff4cb7", "DetectTime": "2024-05-21T12:39:02.989375+00:00", "EventTime": "2024-05-21T12:39:02.989397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKpeO03fOGQeLxvxHi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "da556d54-1175-4b9b-97db-76a5ee5561c1", "DetectTime": "2024-05-21T12:39:03.001074+00:00", "EventTime": "2024-05-21T12:39:03.001095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZxT2Y3AuUazDpcj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "37ab537b-1d6b-4b09-9ef0-ca5162f7397f", "DetectTime": "2024-05-21T12:39:03.067615+00:00", "EventTime": "2024-05-21T12:39:03.067638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgdp3U2AYHkqJqnLT6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "51941bc4-962d-42b1-8baf-b96b30e21267", "DetectTime": "2024-05-21T12:39:03.072782+00:00", "EventTime": "2024-05-21T12:39:03.072807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJM8WWmUf3Xo7tq8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "3b36b9c9-d2fb-4d7b-b1d3-6b52eb041836", "DetectTime": "2024-05-21T12:39:03.084437+00:00", "EventTime": "2024-05-21T12:39:03.084455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.206.29.96"]}], "Attach": [{"Content": "Connection to unknown destination port 13874/UDP destination IP 190.206.29.96. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkWAM1W9wXb2hpbfe"], "accumulated_threat_level": 1.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "608a2df7-563a-44c9-bda5-7148d9fb2a5e", "DetectTime": "2024-05-21T12:39:03.398146+00:00", "EventTime": "2024-05-21T12:39:03.398170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuuo8C3RfXyfvOTad9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "1fc822e8-ca05-4f81-b0ad-f9fe7b17517a", "DetectTime": "2024-05-21T12:39:03.403397+00:00", "EventTime": "2024-05-21T12:39:03.403416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cajqib3gGdD6ukj14i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "7e7772e3-02f0-4325-aaa1-286b7291c208", "DetectTime": "2024-05-21T12:39:03.408343+00:00", "EventTime": "2024-05-21T12:39:03.408362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGNhE4CPG3xri1jXl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "54c03cd6-0bd0-4673-a915-2e353f4c10f0", "DetectTime": "2024-05-21T12:39:03.480036+00:00", "EventTime": "2024-05-21T12:39:03.480057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmDyCZ1B4oMPp5Hnl9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 101} +{"Format": "IDEA0", "ID": "07c7c4ed-7e7e-4bf0-b4a1-a0a4d394778f", "DetectTime": "2024-05-21T12:39:03.585206+00:00", "EventTime": "2024-05-21T12:39:03.585229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6udTl4oTbO3gRJ9x"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "8579cb24-6e26-4daa-992b-50ff37745d88", "DetectTime": "2024-05-21T12:39:03.618608+00:00", "EventTime": "2024-05-21T12:39:03.618630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.74.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvk02f33Z3wXRexWog"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "b22551df-7ccf-447c-92b4-ceecb68a4e85", "DetectTime": "2024-05-21T12:39:03.661160+00:00", "EventTime": "2024-05-21T12:39:03.661184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbKCi31MJ6wXw6nCTi"], "accumulated_threat_level": 3.2, "timewindow": 101} +{"Format": "IDEA0", "ID": "cecd7866-68cb-42b3-90bb-16e061c2497e", "DetectTime": "2024-05-21T12:39:03.691897+00:00", "EventTime": "2024-05-21T12:39:03.691920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJxTk4MaDgc20VINl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "922c43c4-e407-478e-b671-9141da20d41c", "DetectTime": "2024-05-21T12:39:03.740514+00:00", "EventTime": "2024-05-21T12:39:03.740535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbP8p12aMcOj82lBS4"], "accumulated_threat_level": 4.0, "timewindow": 101} +{"Format": "IDEA0", "ID": "630de975-6e85-4282-a0f2-84152c35a50c", "DetectTime": "2024-05-21T12:39:03.952901+00:00", "EventTime": "2024-05-21T12:39:03.952921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnfmVgnPsmXeWeCO2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "fd5091c5-0b0a-4ddb-aefa-1372f5c0b04f", "DetectTime": "2024-05-21T12:39:03.958537+00:00", "EventTime": "2024-05-21T12:39:03.958558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUgnoy4xW5EmkKAVp4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "81ba9f07-f454-4c0b-8e4d-6e9db0f6f750", "DetectTime": "2024-05-21T12:39:04.024096+00:00", "EventTime": "2024-05-21T12:39:04.024117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrQHF4R2czZTMK1d5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "25faee45-7fc9-46fa-8c39-c8dfa46d5a1c", "DetectTime": "2024-05-21T12:39:04.067447+00:00", "EventTime": "2024-05-21T12:39:04.067469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsdZnoFZCnPKQzMj"], "accumulated_threat_level": 4.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "aaf9f179-3bb4-4017-b897-75b4a7caf343", "DetectTime": "2024-05-21T12:39:04.086326+00:00", "EventTime": "2024-05-21T12:39:04.086349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTSaeC32yuiHnCzCpj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "5f5fa382-fdb7-45f2-a638-90a7e5ba56e9", "DetectTime": "2024-05-21T12:39:04.141394+00:00", "EventTime": "2024-05-21T12:39:04.141413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4MhbM1iR5Sib18Kyj"], "accumulated_threat_level": 5.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "566c74fd-853b-43bb-b4e3-54bfbcc54291", "DetectTime": "2024-05-21T12:39:04.174464+00:00", "EventTime": "2024-05-21T12:39:04.174486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZdJ42qE7zRxeC491"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 101} +{"Format": "IDEA0", "ID": "b98c997a-e7f8-4e66-87ef-224519ca82b8", "DetectTime": "2024-05-21T12:39:04.206521+00:00", "EventTime": "2024-05-21T12:39:04.206542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHR1OJ1BlwedebqPQ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "93cbacbc-e82a-495e-8fcb-10f304b40fb5", "DetectTime": "2024-05-21T12:39:04.243834+00:00", "EventTime": "2024-05-21T12:39:04.243856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVIuz46l1Ebmo1r7e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "59909f7b-9759-49bb-a3c0-345744a54dca", "DetectTime": "2024-05-21T12:39:04.257280+00:00", "EventTime": "2024-05-21T12:39:04.257299+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcXSA1JltDKlR0188"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "7e3f92ce-8e60-4d23-bdd7-328a1171e9ce", "DetectTime": "2024-05-21T12:39:04.270372+00:00", "EventTime": "2024-05-21T12:39:04.270391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcXSA1JltDKlR0188"], "accumulated_threat_level": 9.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "1c583933-3728-4a2b-828f-c803b3022bdf", "DetectTime": "2024-05-21T12:39:04.275804+00:00", "EventTime": "2024-05-21T12:39:04.275822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4sRi4p7FxkoWYVb9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "9193abf6-cb33-4593-b410-69d2e616432f", "DetectTime": "2024-05-21T12:39:04.505373+00:00", "EventTime": "2024-05-21T12:39:04.505394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRxUk30WLW2TgqYbe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "8866d6f7-a328-47c8-a587-bff20790f3f7", "DetectTime": "2024-05-21T12:39:04.527706+00:00", "EventTime": "2024-05-21T12:39:04.527730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTf932rb6Zt80q2b4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "5c648d18-14b7-458f-ab19-dabdfe100c8e", "DetectTime": "2024-05-21T12:39:04.567658+00:00", "EventTime": "2024-05-21T12:39:04.567680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1DvYN21DJKoWaBBJg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "8b1a4c76-d552-41ca-91d8-3d8815f3c92e", "DetectTime": "2024-05-21T12:39:04.604588+00:00", "EventTime": "2024-05-21T12:39:04.604608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuA2An3MDFQVcm8YSf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "7a81bbf2-370e-4873-933d-17f557304c19", "DetectTime": "2024-05-21T12:39:04.649517+00:00", "EventTime": "2024-05-21T12:39:04.649535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnXViu2dFGgmgUm3Ij"], "accumulated_threat_level": 9.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "92698319-63bf-4244-98e1-58076438ab02", "DetectTime": "2024-05-21T12:39:04.671454+00:00", "EventTime": "2024-05-21T12:39:04.671477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhCyp3GdlkqDBaLH2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "715eac1b-8997-4c5e-aca4-52538ba1022c", "DetectTime": "2024-05-21T12:39:04.710438+00:00", "EventTime": "2024-05-21T12:39:04.710465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B1asxLyrTeRuIU6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "1b5fa52b-d018-49c6-be31-73da528b53bb", "DetectTime": "2024-05-21T12:39:04.747318+00:00", "EventTime": "2024-05-21T12:39:04.747337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.183.68.61"]}], "Attach": [{"Content": "Connection to unknown destination port 23507/UDP destination IP 180.183.68.61. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJb5Vw9k14QIFsfc"], "accumulated_threat_level": 10.4, "timewindow": 101} +{"Format": "IDEA0", "ID": "590f1045-ae6b-4490-8708-542e66b609d0", "DetectTime": "2024-05-21T12:39:04.775120+00:00", "EventTime": "2024-05-21T12:39:04.775143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cntf9W2mhGjn1mKuva"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "c28c00a5-9687-4410-aed6-3769386150cc", "DetectTime": "2024-05-21T12:39:04.819792+00:00", "EventTime": "2024-05-21T12:39:04.819813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wgTO2YwFWPF6NdWg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "4284e37b-5f27-4432-8342-ef84a543a27f", "DetectTime": "2024-05-21T12:39:04.831544+00:00", "EventTime": "2024-05-21T12:39:04.831562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7IyTa4gfLY2ohNwna"], "accumulated_threat_level": 11.200000000000001, "timewindow": 101} +{"Format": "IDEA0", "ID": "56a3a39d-a140-40d0-b4de-b3e161acc487", "DetectTime": "2024-05-21T12:39:05.068067+00:00", "EventTime": "2024-05-21T12:39:05.068088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVuxqj1yXJFmc258p3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "e09ef048-de4d-49fa-8690-b90b02c93c65", "DetectTime": "2024-05-21T12:39:05.105278+00:00", "EventTime": "2024-05-21T12:39:05.105299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwZOS1rDprS7Gxzk2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "2caba319-f905-4db0-af79-0f2230674052", "DetectTime": "2024-05-21T12:39:05.150823+00:00", "EventTime": "2024-05-21T12:39:05.150843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqWA77RQznHoH57a1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 101} +{"Format": "Json", "ID": "2caba319-f905-4db0-af79-0f2230674052", "DetectTime": "2024-05-21T12:39:05.150823+00:00", "EventTime": "2024-05-21T12:39:05.150843+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "1970-01-05T04:56:45.562494+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2024/05/21 12:39:05.417874)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 101, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7260b2d0-393e-4627-8445-f4dc60b758b4", "DetectTime": "2024-05-21T12:39:05.421729+00:00", "EventTime": "2024-05-21T12:39:05.421746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnI0Je1c5957HpnPuc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "6edbba7a-6267-43d7-99d4-9aee838d8e99", "DetectTime": "2024-05-21T12:39:05.426102+00:00", "EventTime": "2024-05-21T12:39:05.426120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cle82l259ykmCLkzv"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "80f3d614-cebd-4f88-93c1-d7b9d904c738", "DetectTime": "2024-05-21T12:39:05.430547+00:00", "EventTime": "2024-05-21T12:39:05.430565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdICno1ePGNATJNS1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "9c6144de-5b69-4503-9188-e9df4079162e", "DetectTime": "2024-05-21T12:39:05.442835+00:00", "EventTime": "2024-05-21T12:39:05.442856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJPRc3uJpX818LRx5"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "01ba89fb-0254-4fc9-9a8e-82863294f214", "DetectTime": "2024-05-21T12:39:05.447947+00:00", "EventTime": "2024-05-21T12:39:05.447967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQTfb1muEiyN7QW9a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "699f2a26-1d02-47c2-a37a-a8d69e9c40b7", "DetectTime": "2024-05-21T12:39:05.542780+00:00", "EventTime": "2024-05-21T12:39:05.542800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchlWFqYpcXqIprI9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "9b23d79d-6c4f-4dd0-82f8-2e14f2499ec4", "DetectTime": "2024-05-21T12:39:05.597912+00:00", "EventTime": "2024-05-21T12:39:05.597934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.75.245.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLXnL1gF03p4Ijcs2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "33abc7be-5c9d-4d29-8c70-5f15da6406e2", "DetectTime": "2024-05-21T12:39:05.603123+00:00", "EventTime": "2024-05-21T12:39:05.603143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clkg5312NZaTS4zjLe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "ef88c7e7-d747-4b5e-b2d0-6d1007ec72d1", "DetectTime": "2024-05-21T12:39:05.607665+00:00", "EventTime": "2024-05-21T12:39:05.607683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkHaz4J0XyzsMLWoa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "b30dbdc8-77ea-42b1-935b-8bec1a22780d", "DetectTime": "2024-05-21T12:39:05.688392+00:00", "EventTime": "2024-05-21T12:39:05.688410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwnJp4zBMsVKokSzk"], "accumulated_threat_level": 1.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "bb02495b-bc81-4de6-9aa7-e3faf88b5c9e", "DetectTime": "2024-05-21T12:39:05.726387+00:00", "EventTime": "2024-05-21T12:39:05.726424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5EMWg2AKFTbnOtKe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "a3494b07-f19b-4326-acd5-b575c82e9af4", "DetectTime": "2024-05-21T12:39:05.767056+00:00", "EventTime": "2024-05-21T12:39:05.767077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNu4Mf2JRNFuB4wROg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 101} +{"Format": "IDEA0", "ID": "e09ebec1-717d-43a0-a277-563a28f3aa73", "DetectTime": "2024-05-21T12:39:05.915738+00:00", "EventTime": "2024-05-21T12:39:05.915762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3Yol3k1qcKyPmHaa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "2d18636d-cd7c-4bf8-aac7-3bd252771f2f", "DetectTime": "2024-05-21T12:39:05.921062+00:00", "EventTime": "2024-05-21T12:39:05.921083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cymoyw1LoKS1YkgtMi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "8fe206f4-3a2f-4589-9b29-89a16ebbaa01", "DetectTime": "2024-05-21T12:39:06.008238+00:00", "EventTime": "2024-05-21T12:39:06.008259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6C5t1FK50gqKgT22"], "accumulated_threat_level": 3.2, "timewindow": 101} +{"Format": "IDEA0", "ID": "d1c6e115-dfe4-43d2-9e14-d0004a8c53f9", "DetectTime": "2024-05-21T12:39:06.233187+00:00", "EventTime": "2024-05-21T12:39:06.233209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.254.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COc3VaUh5o6uwxeG1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "bfd791df-bd94-47e0-b82d-53158a88e22f", "DetectTime": "2024-05-21T12:39:06.253968+00:00", "EventTime": "2024-05-21T12:39:06.253985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CncuXMQ4Owz4P1Jw5", "CfiOmv4cBCBCaflGN5", "CzEFQn1XPt1zmOXtp", "Ct0t3g3WC5edXdDcua"], "accumulated_threat_level": 0.5, "timewindow": 102} +{"Format": "IDEA0", "ID": "adaa0c26-7c14-43fb-8cfb-42113bcc7753", "DetectTime": "2024-05-21T12:39:06.259437+00:00", "EventTime": "2024-05-21T12:39:06.259458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBRO5D12rYnqWLu0W"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "0658a435-efa7-45b5-99df-bb6400beccc8", "DetectTime": "2024-05-21T12:39:06.266887+00:00", "EventTime": "2024-05-21T12:39:06.266907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57yNo1rDxQ4uSzLDb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "f78d48f0-ec36-4e04-b0c2-b910ffe37607", "DetectTime": "2024-05-21T12:39:06.345110+00:00", "EventTime": "2024-05-21T12:39:06.345134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Le5r1igan8jgH5mi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "5a1eb783-d990-4c8d-b5e9-66d3f9273c3f", "DetectTime": "2024-05-21T12:39:06.350830+00:00", "EventTime": "2024-05-21T12:39:06.350862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYHxv3ksFXUicf0w4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "7a72b4cb-a539-4cf9-9e2d-bd6ce4dd60e8", "DetectTime": "2024-05-21T12:39:06.356245+00:00", "EventTime": "2024-05-21T12:39:06.356265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdXSw1ETbJxzF1T1i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "51ccdde4-bae4-4f1d-98b8-a8500d46e0ad", "DetectTime": "2024-05-21T12:39:06.420244+00:00", "EventTime": "2024-05-21T12:39:06.420266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQgTV2CXqNOfyfFJa"], "accumulated_threat_level": 4.0, "timewindow": 101} +{"Format": "IDEA0", "ID": "a9b4baad-2bcd-4a0c-b35d-c431d7eab970", "DetectTime": "2024-05-21T12:39:06.465879+00:00", "EventTime": "2024-05-21T12:39:06.465898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7AyI1U2ePIsLolH1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "b74bee75-0345-4d4a-aa02-184f6ff73f99", "DetectTime": "2024-05-21T12:39:06.513370+00:00", "EventTime": "2024-05-21T12:39:06.513388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctfrjw4G5B3WgPrAri"], "accumulated_threat_level": 4.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "6987c89b-7294-4fc4-9ccb-57f9b645a7cd", "DetectTime": "2024-05-21T12:39:06.556327+00:00", "EventTime": "2024-05-21T12:39:06.556348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4CJT27ltomdsIJFl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "488f252c-aa03-4ef1-bc1a-12fd649f99cf", "DetectTime": "2024-05-21T12:39:06.569283+00:00", "EventTime": "2024-05-21T12:39:06.569304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr4xg3KvmJMszfLM3"], "accumulated_threat_level": 5.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "bc680e91-7ea4-41a8-8c66-b913cda67edf", "DetectTime": "2024-05-21T12:39:06.822252+00:00", "EventTime": "2024-05-21T12:39:06.822273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1paL1MoIKQ4yJY87"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 101} +{"Format": "IDEA0", "ID": "b08eb255-2615-43fd-bd4a-815b539cda16", "DetectTime": "2024-05-21T12:39:06.864774+00:00", "EventTime": "2024-05-21T12:39:06.864811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Umsy3RDa4fVtcW6f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "66e6b15d-d495-4149-8121-4d9d567b9838", "DetectTime": "2024-05-21T12:39:06.896480+00:00", "EventTime": "2024-05-21T12:39:06.896502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbwgbu2DpVh4hUvQSj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "f2dcf8d0-35fa-4970-b3b5-55859a5910a8", "DetectTime": "2024-05-21T12:39:06.948658+00:00", "EventTime": "2024-05-21T12:39:06.948676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZanVi35uLbtRVjqsi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "6ccffbde-5d6b-4654-8678-a59e0935f549", "DetectTime": "2024-05-21T12:39:06.953455+00:00", "EventTime": "2024-05-21T12:39:06.953473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSkpP8svZ3Xe80Nic"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "0c1a792d-3c1a-47e3-9824-808ab25537a0", "DetectTime": "2024-05-21T12:39:07.000129+00:00", "EventTime": "2024-05-21T12:39:07.000150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsX1ALuNUqO2GtKwb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "5334b528-6c24-4fbb-8028-1cf3a3126078", "DetectTime": "2024-05-21T12:39:07.050518+00:00", "EventTime": "2024-05-21T12:39:07.050536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqGjy2PVb3MV2MnIj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 101} +{"Format": "IDEA0", "ID": "eb451dd9-649b-4b26-b964-ac306d9e6753", "DetectTime": "2024-05-21T12:39:07.068648+00:00", "EventTime": "2024-05-21T12:39:07.068675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvFWa1cK8Aw6b5Vwf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "3b83e363-8dbf-4036-aea7-c6d74cae6fd6", "DetectTime": "2024-05-21T12:39:07.109810+00:00", "EventTime": "2024-05-21T12:39:07.109830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8czD3q1TEgYR8Or5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "68e4c1da-544b-4449-9831-ef5c936681f5", "DetectTime": "2024-05-21T12:39:07.365687+00:00", "EventTime": "2024-05-21T12:39:07.365708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGcxl13WDFSprsmXi"], "accumulated_threat_level": 9.6, "timewindow": 101} +{"Format": "IDEA0", "ID": "d29b6f00-17d0-4faa-8667-76200d405291", "DetectTime": "2024-05-21T12:39:07.371090+00:00", "EventTime": "2024-05-21T12:39:07.371108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFlqE42Ex4fHslI4g3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "1184c85c-c6eb-4901-b1bc-1fcd079f6fc0", "DetectTime": "2024-05-21T12:39:07.376005+00:00", "EventTime": "2024-05-21T12:39:07.376023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBoEo3kbLOhlrp64c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "433bb227-2b1a-4c5c-b9ec-1ff8e470917d", "DetectTime": "2024-05-21T12:39:07.422484+00:00", "EventTime": "2024-05-21T12:39:07.422506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYl7r715B6ONccj4bl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "861e7438-eff5-441d-8842-94bae3822c2d", "DetectTime": "2024-05-21T12:39:07.451881+00:00", "EventTime": "2024-05-21T12:39:07.451902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUutkA2gcEC61VpdNb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 100} +{"Format": "IDEA0", "ID": "e2869dfd-8246-428a-9a29-0e4b9c206490", "DetectTime": "2024-05-21T12:39:07.505692+00:00", "EventTime": "2024-05-21T12:39:07.505713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsyOM2NousuiEFkCi"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "37607eef-1c55-4a02-a7f1-420b893c79c9", "DetectTime": "2024-05-21T12:39:07.516676+00:00", "EventTime": "2024-05-21T12:39:07.516694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsyOM2NousuiEFkCi"], "accumulated_threat_level": 10.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "3577bb1d-8830-4f57-b15d-6a0b4a9d6fad", "DetectTime": "2024-05-21T12:39:07.528145+00:00", "EventTime": "2024-05-21T12:39:07.528165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAZh44yUKc7sBYrU"], "accumulated_threat_level": 10.4, "timewindow": 101} +{"Format": "IDEA0", "ID": "53aa9af4-73a7-4e66-bee7-9f9e4201e12a", "DetectTime": "2024-05-21T12:39:07.567142+00:00", "EventTime": "2024-05-21T12:39:07.567163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWTWc1BMoaIVtA3tc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 101} +{"Format": "IDEA0", "ID": "f129512f-e450-4389-a34f-ef98f2ad32e0", "DetectTime": "2024-05-21T12:39:07.606384+00:00", "EventTime": "2024-05-21T12:39:07.606423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7vzd1xZYo7tDOOXl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 101} +{"Format": "Json", "ID": "f129512f-e450-4389-a34f-ef98f2ad32e0", "DetectTime": "2024-05-21T12:39:07.606384+00:00", "EventTime": "2024-05-21T12:39:07.606423+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-05T04:56:49.307192+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 101. (real time 2024/05/21 12:39:07.842632)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 101, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4f570a60-f5d1-4e4c-acd7-44a34c3b9f93", "DetectTime": "2024-05-21T12:39:07.855250+00:00", "EventTime": "2024-05-21T12:39:07.855289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1Ykx4XufG6cji4I4"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "7a1d4a64-76dd-47bc-af71-02f1d1e1aff0", "DetectTime": "2024-05-21T12:39:07.869135+00:00", "EventTime": "2024-05-21T12:39:07.869157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbngd1JBFC2XUMKv6"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "b69cad85-33e6-4e09-b046-a390e7b00030", "DetectTime": "2024-05-21T12:39:07.977954+00:00", "EventTime": "2024-05-21T12:39:07.977973+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbngd1JBFC2XUMKv6"], "accumulated_threat_level": 10.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "eb8201ed-3b9c-49f3-b0f7-ec132cd68ded", "DetectTime": "2024-05-21T12:39:07.989816+00:00", "EventTime": "2024-05-21T12:39:07.989834+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvYIC2vEYxFeRnXDc"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "afe7670f-c198-45e5-88bd-df07350527dc", "DetectTime": "2024-05-21T12:39:08.003082+00:00", "EventTime": "2024-05-21T12:39:08.003100+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvYIC2vEYxFeRnXDc"], "accumulated_threat_level": 11.2, "timewindow": 26} +{"Format": "IDEA0", "ID": "c74fbc01-d9a3-4f95-9ac3-1777de513bad", "DetectTime": "2024-05-21T12:39:08.014589+00:00", "EventTime": "2024-05-21T12:39:08.014607+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iwjR1nC5Gx0ecwsc"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "0c693efb-f19e-4aeb-80c3-accc2f8eafa8", "DetectTime": "2024-05-21T12:39:08.025657+00:00", "EventTime": "2024-05-21T12:39:08.025675+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iwjR1nC5Gx0ecwsc"], "accumulated_threat_level": 11.7, "timewindow": 26} +{"Format": "IDEA0", "ID": "4f5253cd-d27c-4512-9cac-4b7bfcc572ee", "DetectTime": "2024-05-21T12:39:08.038440+00:00", "EventTime": "2024-05-21T12:39:08.038459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBzsp4olTpjiLIYJ3"], "accumulated_threat_level": 1.3, "timewindow": 102} +{"Format": "IDEA0", "ID": "550cb8ba-4ba5-4b0b-a934-57cc87086f6a", "DetectTime": "2024-05-21T12:39:08.058879+00:00", "EventTime": "2024-05-21T12:39:08.058901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShgMJ1AD0qr6sIztf"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "ec1222ca-b194-462e-8952-0e8d0b0e3a7e", "DetectTime": "2024-05-21T12:39:08.218950+00:00", "EventTime": "2024-05-21T12:39:08.218973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5CgJ3TAqGguHspf9"], "accumulated_threat_level": 2.1, "timewindow": 102} +{"Format": "IDEA0", "ID": "f677cd7c-fbdd-4b75-b517-ec57126fa5af", "DetectTime": "2024-05-21T12:39:08.263204+00:00", "EventTime": "2024-05-21T12:39:08.263224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGdsx301AjzTksvS1"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 102} +{"Format": "IDEA0", "ID": "025779ce-2e42-4492-a549-b173a8a46cbb", "DetectTime": "2024-05-21T12:39:08.354974+00:00", "EventTime": "2024-05-21T12:39:08.354996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxoKa23iyUL3xkg9d"], "accumulated_threat_level": 3.7, "timewindow": 102} +{"Format": "IDEA0", "ID": "fa54f910-0fc4-4c59-bf2b-e3a99ea1036c", "DetectTime": "2024-05-21T12:39:08.396559+00:00", "EventTime": "2024-05-21T12:39:08.396580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqbTtw3jWvk6FgNqzd"], "accumulated_threat_level": 4.5, "timewindow": 102} +{"Format": "IDEA0", "ID": "3f9a6ff2-9a34-4ab6-b042-3c1e1a13eb47", "DetectTime": "2024-05-21T12:39:08.437336+00:00", "EventTime": "2024-05-21T12:39:08.437355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9V0Tf4pgyqi8WIyPa"], "accumulated_threat_level": 5.3, "timewindow": 102} +{"Format": "IDEA0", "ID": "bdd15037-28ea-43a0-993a-2e42a5fa7ce6", "DetectTime": "2024-05-21T12:39:08.477835+00:00", "EventTime": "2024-05-21T12:39:08.477853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHaNq3KPN1u04Wmje"], "accumulated_threat_level": 6.1, "timewindow": 102} +{"Format": "IDEA0", "ID": "87320dc6-54fc-4757-b337-f4a4536c25da", "DetectTime": "2024-05-21T12:39:08.508617+00:00", "EventTime": "2024-05-21T12:39:08.508640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbtZ8D2RdcDbkKCTm9"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "c9252974-acc3-454b-91e8-48cfd5f3344c", "DetectTime": "2024-05-21T12:39:08.547478+00:00", "EventTime": "2024-05-21T12:39:08.547498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2lYra1uvNkm3td0P9"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 102} +{"Format": "IDEA0", "ID": "98d15d72-8d3b-45d7-86e2-4f4ee7425ed7", "DetectTime": "2024-05-21T12:39:08.772743+00:00", "EventTime": "2024-05-21T12:39:08.772766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.56.254.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ04gaY7Nz5U4x2za"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "850e1545-87d5-42ed-8c1f-ddc9c84f71ae", "DetectTime": "2024-05-21T12:39:08.807059+00:00", "EventTime": "2024-05-21T12:39:08.807077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBspf3Wh89Nm7IDQd"], "accumulated_threat_level": 7.699999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "0810d45a-a2c8-45ce-94ec-62a6cc525ce8", "DetectTime": "2024-05-21T12:39:08.849502+00:00", "EventTime": "2024-05-21T12:39:08.849521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtI1uW1yJSDa8Lfsg7"], "accumulated_threat_level": 8.5, "timewindow": 102} +{"Format": "IDEA0", "ID": "44d7d1e1-d2e8-48f2-8846-1cc7bef0813b", "DetectTime": "2024-05-21T12:39:08.892128+00:00", "EventTime": "2024-05-21T12:39:08.892148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0U4Xu1XVe3GPZq134"], "accumulated_threat_level": 9.3, "timewindow": 102} +{"Format": "IDEA0", "ID": "b5cd8b72-3869-44f9-8ecf-aca03e38c3e1", "DetectTime": "2024-05-21T12:39:08.934124+00:00", "EventTime": "2024-05-21T12:39:08.934144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0KZRE2v9sy6at4lP2"], "accumulated_threat_level": 10.100000000000001, "timewindow": 102} +{"Format": "IDEA0", "ID": "274cb193-c641-4787-8aea-0c0b25e8d698", "DetectTime": "2024-05-21T12:39:08.982424+00:00", "EventTime": "2024-05-21T12:39:08.982443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwU0RDrynTxQQefi"], "accumulated_threat_level": 10.900000000000002, "timewindow": 102} +{"Format": "IDEA0", "ID": "b2a8782e-cfd1-4c44-b83c-3095774d69ac", "DetectTime": "2024-05-21T12:39:09.017918+00:00", "EventTime": "2024-05-21T12:39:09.017938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yDEeRqejTxNMam"], "accumulated_threat_level": 11.700000000000003, "timewindow": 102} +{"Format": "IDEA0", "ID": "606c3063-87d1-432f-aca6-0eb38bc5c2c0", "DetectTime": "2024-05-21T12:39:09.057420+00:00", "EventTime": "2024-05-21T12:39:09.057440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1HL193hfb4fJUp8th"], "accumulated_threat_level": 12.500000000000004, "timewindow": 102} +{"Format": "Json", "ID": "606c3063-87d1-432f-aca6-0eb38bc5c2c0", "DetectTime": "2024-05-21T12:39:09.057420+00:00", "EventTime": "2024-05-21T12:39:09.057440+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "1970-01-05T05:27:58.220895+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2024/05/21 12:39:09.262570)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 102, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "ff4a4476-2eed-4dc1-bb18-a107fd606f00", "DetectTime": "2024-05-21T12:39:09.273386+00:00", "EventTime": "2024-05-21T12:39:09.273405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGVMF31aXqJ0HjlO7"], "accumulated_threat_level": 0.8, "timewindow": 102} +{"Format": "IDEA0", "ID": "a70839eb-588b-40f3-8f90-edb8ba8dd43b", "DetectTime": "2024-05-21T12:39:09.279187+00:00", "EventTime": "2024-05-21T12:39:09.279206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sugj2ZnBYRaeJbYc"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b1e82c8a-3bdf-401c-b090-7bb7f30a2cae", "DetectTime": "2024-05-21T12:39:09.374403+00:00", "EventTime": "2024-05-21T12:39:09.374441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqGtt63dRtxM5Pkl4b"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "cfe47906-f918-46ca-a78a-7d49a9426627", "DetectTime": "2024-05-21T12:39:09.512537+00:00", "EventTime": "2024-05-21T12:39:09.512557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NCHB242st83MEPKa"], "accumulated_threat_level": 1.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "16ac631a-b8f8-4b24-ae30-c415f5745361", "DetectTime": "2024-05-21T12:39:09.555712+00:00", "EventTime": "2024-05-21T12:39:09.555731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjl12JE7OoEjMtKd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 102} +{"Format": "IDEA0", "ID": "98046278-b7f7-4055-b73e-8bb0320414cd", "DetectTime": "2024-05-21T12:39:09.598519+00:00", "EventTime": "2024-05-21T12:39:09.598538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Klqr2iDyzhAiqP4"], "accumulated_threat_level": 3.2, "timewindow": 102} +{"Format": "IDEA0", "ID": "c50d0785-981f-4148-9475-c9a1a3e72075", "DetectTime": "2024-05-21T12:39:09.649396+00:00", "EventTime": "2024-05-21T12:39:09.649415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkcLA1lvXwh3bVeO9"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "da03185d-c2c4-4f7e-b66a-80ca7fc46aa0", "DetectTime": "2024-05-21T12:39:09.693883+00:00", "EventTime": "2024-05-21T12:39:09.693904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTlfPISkYA83kHM9"], "accumulated_threat_level": 4.8, "timewindow": 102} +{"Format": "IDEA0", "ID": "37385108-29df-4dd6-b67a-49ac6e79a204", "DetectTime": "2024-05-21T12:39:09.747681+00:00", "EventTime": "2024-05-21T12:39:09.747700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpflcF1FJ5L6lokk52"], "accumulated_threat_level": 5.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "16a9256c-0a17-4b19-8c33-112912729752", "DetectTime": "2024-05-21T12:39:09.779074+00:00", "EventTime": "2024-05-21T12:39:09.779095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnetfh2ix0iSUaeyYk"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "cb7419c5-4e5e-49bc-82a2-59fcb1dc62ba", "DetectTime": "2024-05-21T12:39:09.817200+00:00", "EventTime": "2024-05-21T12:39:09.817220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TQ433kcUTP97vcjc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 102} +{"Format": "IDEA0", "ID": "221be4fc-e2d5-466a-8a25-c0ce60823c3a", "DetectTime": "2024-05-21T12:39:10.018777+00:00", "EventTime": "2024-05-21T12:39:10.018796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSYOz2FRYIarEqn6k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "3416fe58-630d-44a8-9927-f8b7976e82eb", "DetectTime": "2024-05-21T12:39:10.256683+00:00", "EventTime": "2024-05-21T12:39:10.256702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjIkE1ptxwcyNZHyc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "f4b016f8-4956-4d67-9bc3-65f2402a02e8", "DetectTime": "2024-05-21T12:39:10.295982+00:00", "EventTime": "2024-05-21T12:39:10.296000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ircJ26XOT5oCcRYi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "87317f2a-57f0-48ef-89ed-03b906b1b68c", "DetectTime": "2024-05-21T12:39:10.338795+00:00", "EventTime": "2024-05-21T12:39:10.338814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVynEq29GbM0XYrdi1"], "accumulated_threat_level": 9.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "0e352c26-6506-4b55-936e-8be172810a42", "DetectTime": "2024-05-21T12:39:10.369810+00:00", "EventTime": "2024-05-21T12:39:10.369832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxjCNd3XxoFCMh3Byi"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "da02b966-3f5a-4df9-8b10-27e329bc04e3", "DetectTime": "2024-05-21T12:39:10.414920+00:00", "EventTime": "2024-05-21T12:39:10.414939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7vpA4E7Vnin53jAl"], "accumulated_threat_level": 10.4, "timewindow": 102} +{"Format": "IDEA0", "ID": "5c653afe-ee0d-4cfb-839b-655d83263bdb", "DetectTime": "2024-05-21T12:39:10.439268+00:00", "EventTime": "2024-05-21T12:39:10.439288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDHNn5cttU9WddY5"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "503524e4-86b7-4a60-abba-0b9ab0a7cd82", "DetectTime": "2024-05-21T12:39:10.487626+00:00", "EventTime": "2024-05-21T12:39:10.487643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ySau4PYzZDW71w0l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 102} +{"Format": "IDEA0", "ID": "98e3c6e0-3e40-42f3-96e3-d66a8045b893", "DetectTime": "2024-05-21T12:39:10.502564+00:00", "EventTime": "2024-05-21T12:39:10.502584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7f4O1GkWcdQUOjlh"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "7b9a3c93-5616-4aaf-a847-e1e18833fc4a", "DetectTime": "2024-05-21T12:39:10.555100+00:00", "EventTime": "2024-05-21T12:39:10.555119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRfMvq1vQ9HSR8oYvc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 102} +{"Format": "Json", "ID": "7b9a3c93-5616-4aaf-a847-e1e18833fc4a", "DetectTime": "2024-05-21T12:39:10.555100+00:00", "EventTime": "2024-05-21T12:39:10.555119+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "1970-01-05T05:28:19.682752+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2024/05/21 12:39:10.714015)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 102, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "677b58c1-e2bc-460b-a0b8-d537de2b1ea2", "DetectTime": "2024-05-21T12:39:10.727698+00:00", "EventTime": "2024-05-21T12:39:10.727730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa6DS3v2BClUgE8Q1"], "accumulated_threat_level": 0.8, "timewindow": 102} +{"Format": "IDEA0", "ID": "5a0c1eb9-656e-498b-942b-516d73035ef5", "DetectTime": "2024-05-21T12:39:10.815755+00:00", "EventTime": "2024-05-21T12:39:10.815791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2PVkcRFrNjOwEze"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "c1ea7338-93be-4d99-ac9b-17fd8f592af0", "DetectTime": "2024-05-21T12:39:10.952727+00:00", "EventTime": "2024-05-21T12:39:10.952746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1p573PpG2nGGr08c"], "accumulated_threat_level": 1.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "5a712a68-10d8-444c-8c0d-5af75d9ee651", "DetectTime": "2024-05-21T12:39:10.982052+00:00", "EventTime": "2024-05-21T12:39:10.982075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj8KjzmxoC8IJ9Wu6"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "ac5175bc-a1e6-4e62-acd6-2cbd1d105a1e", "DetectTime": "2024-05-21T12:39:11.021649+00:00", "EventTime": "2024-05-21T12:39:11.021668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0FsKf4lgeNbeg5B4"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "812c2531-54d6-48bd-bca7-8a54b71cae6d", "DetectTime": "2024-05-21T12:39:11.033947+00:00", "EventTime": "2024-05-21T12:39:11.033966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.224.58.24"]}], "Attach": [{"Content": "Connection to unknown destination port 26073/UDP destination IP 189.224.58.24. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66Mu83OkOeb48JJH6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 102} +{"Format": "IDEA0", "ID": "5bdcc445-5d4d-4bfa-8155-3e569b71f731", "DetectTime": "2024-05-21T12:39:11.087361+00:00", "EventTime": "2024-05-21T12:39:11.087382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDMUOasHLKPCcRT6"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b0e5b609-d7e0-4e8b-8906-9ea2dd58ac75", "DetectTime": "2024-05-21T12:39:11.130923+00:00", "EventTime": "2024-05-21T12:39:11.130945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIyGGo2XBCHBDmtEEf"], "accumulated_threat_level": 3.2, "timewindow": 102} +{"Format": "IDEA0", "ID": "c0514f5a-d963-4598-958f-7a86da2f3826", "DetectTime": "2024-05-21T12:39:11.150801+00:00", "EventTime": "2024-05-21T12:39:11.150824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLAODo3xmaqbBEYwxd"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "0ead4211-0ce5-48e8-9c5d-2ef90ec91807", "DetectTime": "2024-05-21T12:39:11.186224+00:00", "EventTime": "2024-05-21T12:39:11.186251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2hyTw2LgVPFXnEPgh"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "a0926a24-2252-4bf4-a2db-001429ddc5b9", "DetectTime": "2024-05-21T12:39:11.252565+00:00", "EventTime": "2024-05-21T12:39:11.252583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2Ciy14oUENmXwLwl"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "f32907b1-d937-4884-9ad8-6cfb971824ba", "DetectTime": "2024-05-21T12:39:11.481772+00:00", "EventTime": "2024-05-21T12:39:11.481795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTKcQa2MvJV3V7I6H3"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "de99e9f9-3dd4-4a36-8d8a-3e34d3829ded", "DetectTime": "2024-05-21T12:39:11.487331+00:00", "EventTime": "2024-05-21T12:39:11.487350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfUeDFKbHbwucgqi"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "5f1c6da1-2997-4869-9a8a-d9ac1f8b9390", "DetectTime": "2024-05-21T12:39:11.567269+00:00", "EventTime": "2024-05-21T12:39:11.567291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRg8Qd312EsyPkhsea"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "3194f7e4-fe4c-444c-baa1-44d3d4b6831c", "DetectTime": "2024-05-21T12:39:11.572671+00:00", "EventTime": "2024-05-21T12:39:11.572689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CotxLg3K2IGwAl33l7"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b6c0f5f6-bf96-4ace-af68-571fd3bd5467", "DetectTime": "2024-05-21T12:39:11.633250+00:00", "EventTime": "2024-05-21T12:39:11.633272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3978S1dbgytKFjgd2"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "c8899ee6-5549-4e1b-b3b3-75a28ecbf6c4", "DetectTime": "2024-05-21T12:39:11.674146+00:00", "EventTime": "2024-05-21T12:39:11.674166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OHF74JK53tHTp5Vh"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "c85dc739-2e11-4b50-a0a0-b67f6f22f08e", "DetectTime": "2024-05-21T12:39:11.704132+00:00", "EventTime": "2024-05-21T12:39:11.704155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISueh2HwFvwfdtvb"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "d30cf84a-fb25-472d-b29e-c697a466a5e5", "DetectTime": "2024-05-21T12:39:11.744160+00:00", "EventTime": "2024-05-21T12:39:11.744182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYLLhb4C93z1Hm3dBj"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "180b98d6-4f55-4e80-a5e5-dbd513605f49", "DetectTime": "2024-05-21T12:39:11.759717+00:00", "EventTime": "2024-05-21T12:39:11.759738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CteUVP1ZMSECLheS0a", "CxxxqC1zVyQpbZ0VGj", "CaZSJO6Z4khqrDPNa", "CoLpkM2SnPKtQaYz4i"], "accumulated_threat_level": 4.5, "timewindow": 102} +{"Format": "IDEA0", "ID": "cbdc542a-59a1-412e-aad5-ea4b7e1ac776", "DetectTime": "2024-05-21T12:39:11.955810+00:00", "EventTime": "2024-05-21T12:39:11.955834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJWRk2sxt424hwaOa"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "030231fd-6efc-44d0-a479-dc04cb173be6", "DetectTime": "2024-05-21T12:39:12.055828+00:00", "EventTime": "2024-05-21T12:39:12.055848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClOXO41fW50oilzvk"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "e06433a3-671f-4952-a072-0b0d6a24dbbb", "DetectTime": "2024-05-21T12:39:12.304369+00:00", "EventTime": "2024-05-21T12:39:12.304391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.75.245.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhAfX1UX2GxCA2Hm9"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "d84d282d-22e0-4089-9f38-783e98172a6d", "DetectTime": "2024-05-21T12:39:12.379517+00:00", "EventTime": "2024-05-21T12:39:12.379537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIk2T6CJG6yoNwIe"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "f017c084-ea12-40a4-a7ff-9174c4851dec", "DetectTime": "2024-05-21T12:39:12.384843+00:00", "EventTime": "2024-05-21T12:39:12.384862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5qkh2EsT0VPSdpT2"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "40d1e2e1-5c0b-45a2-96c2-302f31e6c17b", "DetectTime": "2024-05-21T12:39:12.390019+00:00", "EventTime": "2024-05-21T12:39:12.390037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAlG2zEpvgyI56oi"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "5f7a6ebf-d5a1-4cdd-bccb-8245eb7eef48", "DetectTime": "2024-05-21T12:39:12.395090+00:00", "EventTime": "2024-05-21T12:39:12.395111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAv6gP54TMT4JHZoc"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "3242c136-32d4-4b2b-8c36-d98a9e4ff353", "DetectTime": "2024-05-21T12:39:12.520000+00:00", "EventTime": "2024-05-21T12:39:12.520021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDNQj3mk3QOhAW5b3"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "d753e1cf-342d-4763-bf19-b4e5ee803eab", "DetectTime": "2024-05-21T12:39:12.680228+00:00", "EventTime": "2024-05-21T12:39:12.680248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelVU43QPL3bp291i3"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "bd4dc789-28e3-42b3-bcc6-f12d12fd598c", "DetectTime": "2024-05-21T12:39:12.722519+00:00", "EventTime": "2024-05-21T12:39:12.722541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zT6h170GyCO80XD4"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "76e3cfa7-017f-4a59-a2cd-f47756998186", "DetectTime": "2024-05-21T12:39:12.762404+00:00", "EventTime": "2024-05-21T12:39:12.762442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjnwuVfjQWLQKEV9"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "a4459954-966e-4b76-88b8-fcfb32ed41e2", "DetectTime": "2024-05-21T12:39:12.817770+00:00", "EventTime": "2024-05-21T12:39:12.817792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq5al12ghq92ZjUDg6"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "3e75b4d7-c119-41e1-a4e8-293bb185de03", "DetectTime": "2024-05-21T12:39:13.076121+00:00", "EventTime": "2024-05-21T12:39:13.076143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwuSya2EfIlqL48Irb"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "066e5cef-53a0-4501-a7fb-53b1b536f372", "DetectTime": "2024-05-21T12:39:13.081194+00:00", "EventTime": "2024-05-21T12:39:13.081212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmXmbp3B6Kr3x80yN5"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "bc577415-fc8a-4ea8-94d8-7938073d6f5c", "DetectTime": "2024-05-21T12:39:13.086364+00:00", "EventTime": "2024-05-21T12:39:13.086381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQILET2aMToVUNBSqb"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "0abccab2-5282-46f0-8fa8-c2bfb9658294", "DetectTime": "2024-05-21T12:39:13.246876+00:00", "EventTime": "2024-05-21T12:39:13.246898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcXJOOoJvSZe0Hpb"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "ccfe2ec3-e10b-4e05-adc3-ee24c3c43a19", "DetectTime": "2024-05-21T12:39:13.294287+00:00", "EventTime": "2024-05-21T12:39:13.294309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpd0Vl1oVEEQrMZ0Cc"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "46803dd2-cda1-4dfb-905f-a7bb17b48564", "DetectTime": "2024-05-21T12:39:13.406657+00:00", "EventTime": "2024-05-21T12:39:13.406675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0yYxa38HlrkgWghL"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "fcdc0326-810e-4c07-8a80-42379f88e195", "DetectTime": "2024-05-21T12:39:13.495880+00:00", "EventTime": "2024-05-21T12:39:13.495901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5NCEd4tWE6yEOaCxe"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "789de58e-4905-4da2-aacf-568be1b77611", "DetectTime": "2024-05-21T12:39:13.538516+00:00", "EventTime": "2024-05-21T12:39:13.538537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cejxlo3aB3HqCazeQ1"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "a283b1dc-68c1-4a65-98be-9a05e0b6387c", "DetectTime": "2024-05-21T12:39:13.766189+00:00", "EventTime": "2024-05-21T12:39:13.766212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLTv61yBrMj35mz4a"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "e9405429-f0c6-4ac0-83e3-2f419156bb08", "DetectTime": "2024-05-21T12:39:13.802651+00:00", "EventTime": "2024-05-21T12:39:13.802670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGZhr2i0qRkWE62A3"], "accumulated_threat_level": 5.3, "timewindow": 102} +{"Format": "IDEA0", "ID": "d8ec88f9-e386-456e-84b6-a6362a57958a", "DetectTime": "2024-05-21T12:39:13.848547+00:00", "EventTime": "2024-05-21T12:39:13.848565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUV303uKkPxntT7Ol"], "accumulated_threat_level": 6.1, "timewindow": 102} +{"Format": "IDEA0", "ID": "f2939f9d-042b-4a13-8cdd-9dd9cb73599c", "DetectTime": "2024-05-21T12:39:13.939059+00:00", "EventTime": "2024-05-21T12:39:13.939081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWMsPA1imwvXbxBglg"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "0dccdc73-7fa1-4581-9acb-d60a13fbd4aa", "DetectTime": "2024-05-21T12:39:13.950913+00:00", "EventTime": "2024-05-21T12:39:13.950931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2tSS1hUdj3XmHvi"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 102} +{"Format": "IDEA0", "ID": "d242c4c3-b970-4d25-a030-ac37f68d9819", "DetectTime": "2024-05-21T12:39:14.012469+00:00", "EventTime": "2024-05-21T12:39:14.012488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFbqR1wROY5hxwJme"], "accumulated_threat_level": 7.699999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "d58c2b76-1e23-48ba-9f1e-8afc5a0b5b83", "DetectTime": "2024-05-21T12:39:14.076966+00:00", "EventTime": "2024-05-21T12:39:14.076985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7NaL3e0K8IxI0Vkg"], "accumulated_threat_level": 8.5, "timewindow": 102} +{"Format": "IDEA0", "ID": "4d893630-aa81-4d44-9f85-31be73d4d5cf", "DetectTime": "2024-05-21T12:39:14.130853+00:00", "EventTime": "2024-05-21T12:39:14.130871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2HAXNpfnBYENIW4"], "accumulated_threat_level": 9.3, "timewindow": 102} +{"Format": "IDEA0", "ID": "546e2606-0d72-4d8d-bbd1-3c6dde239f15", "DetectTime": "2024-05-21T12:39:14.182584+00:00", "EventTime": "2024-05-21T12:39:14.182602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8td5O17c9USyeVoTe"], "accumulated_threat_level": 10.100000000000001, "timewindow": 102} +{"Format": "IDEA0", "ID": "5c8f3b28-7cda-452d-b4df-b11eda19c3b4", "DetectTime": "2024-05-21T12:39:14.210192+00:00", "EventTime": "2024-05-21T12:39:14.210212+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLroz2WAvAyPUw7M8"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "13171569-0097-4956-be85-95a5f35e2163", "DetectTime": "2024-05-21T12:39:14.222717+00:00", "EventTime": "2024-05-21T12:39:14.222736+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLroz2WAvAyPUw7M8"], "accumulated_threat_level": 12.2, "timewindow": 26} +{"Format": "Json", "ID": "13171569-0097-4956-be85-95a5f35e2163", "DetectTime": "2024-05-21T12:39:14.222717+00:00", "EventTime": "2024-05-21T12:39:14.222736+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "1970-01-02T01:23:12.170626+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2024/05/21 12:39:14.638009)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 26, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "48d60d3c-59d8-4bfe-b8c0-5bf76e9fe07a", "DetectTime": "2024-05-21T12:39:14.649682+00:00", "EventTime": "2024-05-21T12:39:14.649704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNdux18yAe4F5VcZj"], "accumulated_threat_level": 10.900000000000002, "timewindow": 102} +{"Format": "IDEA0", "ID": "3d021e80-d620-413e-b954-74257167c4ea", "DetectTime": "2024-05-21T12:39:14.662197+00:00", "EventTime": "2024-05-21T12:39:14.662215+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOdoM2fsYypixMMgh"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "28008fcd-1870-42e8-bcf4-ca543feef59b", "DetectTime": "2024-05-21T12:39:14.675825+00:00", "EventTime": "2024-05-21T12:39:14.675849+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOdoM2fsYypixMMgh"], "accumulated_threat_level": 0.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "b985dba5-7a0d-469f-afa2-f5546fbcc710", "DetectTime": "2024-05-21T12:39:14.688233+00:00", "EventTime": "2024-05-21T12:39:14.688253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0w2K3Dzfzk07JzTi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 102} +{"Format": "IDEA0", "ID": "9f7520e0-ffb1-471c-8e35-75b0cca50499", "DetectTime": "2024-05-21T12:39:14.701838+00:00", "EventTime": "2024-05-21T12:39:14.701863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiuYun3QtoPVCFf9Sh"], "accumulated_threat_level": 12.500000000000004, "timewindow": 102} +{"Format": "Json", "ID": "9f7520e0-ffb1-471c-8e35-75b0cca50499", "DetectTime": "2024-05-21T12:39:14.701838+00:00", "EventTime": "2024-05-21T12:39:14.701863+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "1970-01-05T05:59:36.391105+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2024/05/21 12:39:15.133949)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 102, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "8b585d69-2fa7-44b3-8672-18e8436abb69", "DetectTime": "2024-05-21T12:39:15.214764+00:00", "EventTime": "2024-05-21T12:39:15.214782+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["49.49.17.72"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9Q5G3eyz3OeHc4ma"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "8a03d550-292d-4814-a5b2-d23e187de553", "DetectTime": "2024-05-21T12:39:15.227816+00:00", "EventTime": "2024-05-21T12:39:15.227836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9Q5G3eyz3OeHc4ma"], "accumulated_threat_level": 1.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "fa37c247-b7d2-4667-92cf-238d12e73c31", "DetectTime": "2024-05-21T12:39:15.244283+00:00", "EventTime": "2024-05-21T12:39:15.244303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C900Eu45ukk7juwksc"], "accumulated_threat_level": 0.8, "timewindow": 102} +{"Format": "IDEA0", "ID": "b6a6f3cb-c074-4109-bced-244684c0b3fc", "DetectTime": "2024-05-21T12:39:15.259403+00:00", "EventTime": "2024-05-21T12:39:15.259421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9TW9J1VRKn5NfExxe"], "accumulated_threat_level": 1.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "26dbd85b-acbd-47aa-ba94-e363002e065e", "DetectTime": "2024-05-21T12:39:15.270461+00:00", "EventTime": "2024-05-21T12:39:15.270480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXkWm1obqyMqVX9M2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 102} +{"Format": "IDEA0", "ID": "3ad31509-1530-462b-9138-34e3ba0e4298", "DetectTime": "2024-05-21T12:39:15.281649+00:00", "EventTime": "2024-05-21T12:39:15.281666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQIAu2G2qxUQGoWc4"], "accumulated_threat_level": 3.2, "timewindow": 102} +{"Format": "IDEA0", "ID": "2dae45b4-23c2-4557-804b-9323a217aed7", "DetectTime": "2024-05-21T12:39:15.292657+00:00", "EventTime": "2024-05-21T12:39:15.292675+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.93.140.11"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhvaZhFrsY7HjYUc"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "5dc745b3-2538-4903-a289-39ac03eebe00", "DetectTime": "2024-05-21T12:39:15.305068+00:00", "EventTime": "2024-05-21T12:39:15.305088+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhvaZhFrsY7HjYUc"], "accumulated_threat_level": 1.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "549d60df-ee82-4e45-9ba6-d1cf245b8f41", "DetectTime": "2024-05-21T12:39:15.316682+00:00", "EventTime": "2024-05-21T12:39:15.316700+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfw2X2kZn3uVnelG8"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "44612a76-a58e-4692-b890-fd11082387cf", "DetectTime": "2024-05-21T12:39:15.328632+00:00", "EventTime": "2024-05-21T12:39:15.328651+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfw2X2kZn3uVnelG8"], "accumulated_threat_level": 2.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "5867f228-d3ba-4172-a027-5ac4fb3e5b77", "DetectTime": "2024-05-21T12:39:15.340136+00:00", "EventTime": "2024-05-21T12:39:15.340155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9Wo11odQXh7SpXFh"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "31a24537-544d-48f0-b168-45cc0a8e94e1", "DetectTime": "2024-05-21T12:39:15.352265+00:00", "EventTime": "2024-05-21T12:39:15.352284+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.208.123.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOp824bmWD5TLwJO"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "f22adea3-1f4f-4f3c-ac99-0aef0d4cf676", "DetectTime": "2024-05-21T12:39:15.365147+00:00", "EventTime": "2024-05-21T12:39:15.365166+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnOp824bmWD5TLwJO"], "accumulated_threat_level": 2.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "77a41512-d287-43b3-b28b-750dba8fc4fa", "DetectTime": "2024-05-21T12:39:15.377610+00:00", "EventTime": "2024-05-21T12:39:15.377630+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqS9hcRu4PWXxpua9"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "dd700123-c3b7-4550-8ac3-e27b6535056c", "DetectTime": "2024-05-21T12:39:15.391027+00:00", "EventTime": "2024-05-21T12:39:15.391046+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqS9hcRu4PWXxpua9"], "accumulated_threat_level": 3.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "84f8f9cc-a8c8-4f61-8041-16ee784dfe41", "DetectTime": "2024-05-21T12:39:15.403263+00:00", "EventTime": "2024-05-21T12:39:15.403282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbK6mr3FI7MHdAGwK7"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "c2bc77d9-0cbd-4f37-a740-b20a4a272ce9", "DetectTime": "2024-05-21T12:39:15.416072+00:00", "EventTime": "2024-05-21T12:39:15.416091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbK6mr3FI7MHdAGwK7"], "accumulated_threat_level": 3.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "e74e514f-ad0b-4012-9969-1b9cb89e6707", "DetectTime": "2024-05-21T12:39:15.427887+00:00", "EventTime": "2024-05-21T12:39:15.427905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7k8o2vB9OpVzU021"], "accumulated_threat_level": 4.8, "timewindow": 102} +{"Format": "IDEA0", "ID": "f0e35d8c-e0b1-4246-8181-06ec0f1e4544", "DetectTime": "2024-05-21T12:39:15.432642+00:00", "EventTime": "2024-05-21T12:39:15.432660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.72.34.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gPbS3SmsJuobf7e7"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b6492e8c-f84c-4143-94e3-a8899917ca7c", "DetectTime": "2024-05-21T12:39:15.444181+00:00", "EventTime": "2024-05-21T12:39:15.444201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmkAOdCZjvmpuBpK2"], "accumulated_threat_level": 5.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "6e26724c-6069-4ba7-82e7-8c067aa36f8d", "DetectTime": "2024-05-21T12:39:15.530274+00:00", "EventTime": "2024-05-21T12:39:15.530295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKMItyfroPrM7c7c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 102} +{"Format": "IDEA0", "ID": "790e7ce7-c33f-41e8-9dde-7a85b268d904", "DetectTime": "2024-05-21T12:39:15.584788+00:00", "EventTime": "2024-05-21T12:39:15.584809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNp3rp4fte7NMbR4x3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "a4c77e07-6e2e-4053-807b-8d391ba39865", "DetectTime": "2024-05-21T12:39:15.625391+00:00", "EventTime": "2024-05-21T12:39:15.625410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ecVa37XIspc2qXC8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "3cc2eab6-bcb4-4808-b1eb-4ad784efd4a9", "DetectTime": "2024-05-21T12:39:15.666678+00:00", "EventTime": "2024-05-21T12:39:15.666699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WtGHcs4ygHhu99i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 102} +{"Format": "IDEA0", "ID": "3cbb46e6-617d-4e6f-a322-2feb4a23372c", "DetectTime": "2024-05-21T12:39:15.708116+00:00", "EventTime": "2024-05-21T12:39:15.708136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMBXj3anDh8kySh26"], "accumulated_threat_level": 9.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "b188b6c4-74dd-41b6-97ac-f1a4f196f9ce", "DetectTime": "2024-05-21T12:39:15.748056+00:00", "EventTime": "2024-05-21T12:39:15.748076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chij1V3w5HI9NTeYAa"], "accumulated_threat_level": 10.4, "timewindow": 102} +{"Format": "IDEA0", "ID": "1dadfb3b-8075-4b05-8fad-15d53c7a7e48", "DetectTime": "2024-05-21T12:39:15.917266+00:00", "EventTime": "2024-05-21T12:39:15.917285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxQwu2xKR4YtNkG65"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "08bf4c90-37e9-48ef-882f-bdb8aaa69a10", "DetectTime": "2024-05-21T12:39:15.959913+00:00", "EventTime": "2024-05-21T12:39:15.959932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLoAJp2qYZmsvF0ODb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 102} +{"Format": "IDEA0", "ID": "084639f0-65bc-43d5-9b8e-3f73f521a2e3", "DetectTime": "2024-05-21T12:39:16.001044+00:00", "EventTime": "2024-05-21T12:39:16.001064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthVak1ZCn71MpXyM4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 102} +{"Format": "Json", "ID": "084639f0-65bc-43d5-9b8e-3f73f521a2e3", "DetectTime": "2024-05-21T12:39:16.001044+00:00", "EventTime": "2024-05-21T12:39:16.001064+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "1970-01-05T05:59:59.468336+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 102. (real time 2024/05/21 12:39:16.206474)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 102, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a444c03f-95d9-49bf-8921-3ab0307fdc15", "DetectTime": "2024-05-21T12:39:16.223831+00:00", "EventTime": "2024-05-21T12:39:16.223849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRucYlaFLAjVmYL32"], "accumulated_threat_level": 0.8, "timewindow": 102} +{"Format": "IDEA0", "ID": "55db0b04-fd86-4dc5-8aa7-2c1828f38bad", "DetectTime": "2024-05-21T12:39:16.291473+00:00", "EventTime": "2024-05-21T12:39:16.291491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xT7I38XfbqE4Bk2l"], "accumulated_threat_level": 1.6, "timewindow": 102} +{"Format": "IDEA0", "ID": "20a98a11-8e8e-4ea1-890c-1106670e0981", "DetectTime": "2024-05-21T12:39:16.316906+00:00", "EventTime": "2024-05-21T12:39:16.316927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.165.82.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Nb1k4vfTExhbKs47"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "9525be71-e5c8-4ceb-96a7-8579168196ac", "DetectTime": "2024-05-21T12:39:16.350773+00:00", "EventTime": "2024-05-21T12:39:16.350793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["201.214.0.19"]}], "Attach": [{"Content": "Connection to unknown destination port 8159/UDP destination IP 201.214.0.19. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBB1mF4tlvAF5wQ0Vj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 102} +{"Format": "IDEA0", "ID": "2ae5992a-dc08-4d8f-9fb3-9237af7d803d", "DetectTime": "2024-05-21T12:39:16.395555+00:00", "EventTime": "2024-05-21T12:39:16.395577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXIVS1oFD76H1sB2b"], "accumulated_threat_level": 3.2, "timewindow": 102} +{"Format": "IDEA0", "ID": "ee79f336-434b-4522-b7f4-4d4f005ecc11", "DetectTime": "2024-05-21T12:39:16.432216+00:00", "EventTime": "2024-05-21T12:39:16.432235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Ucky3UvAIePaiRli"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "0a266f76-6ec0-42e5-b9e5-921acedb6eb5", "DetectTime": "2024-05-21T12:39:16.869056+00:00", "EventTime": "2024-05-21T12:39:16.869074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPynpO1LrcIl7DIJi7"], "accumulated_threat_level": 0.8, "timewindow": 103} +{"Format": "IDEA0", "ID": "51484461-ec0d-40df-b857-8951d1e97994", "DetectTime": "2024-05-21T12:39:16.902381+00:00", "EventTime": "2024-05-21T12:39:16.902402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzwGze1p48t2dSTDI5"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "436c5e1f-b933-4ee5-8f46-44901bea8bd4", "DetectTime": "2024-05-21T12:39:16.939802+00:00", "EventTime": "2024-05-21T12:39:16.939822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.75.245.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUcu663Svx7LtNPdE8"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "65df5aa7-2056-4c7a-9457-64d5bf0a8420", "DetectTime": "2024-05-21T12:39:17.024501+00:00", "EventTime": "2024-05-21T12:39:17.024519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgNcQmsjDfAoPNZjc"], "accumulated_threat_level": 1.6, "timewindow": 103} +{"Format": "IDEA0", "ID": "e9dc60aa-35a6-477f-b084-804ee3315a2f", "DetectTime": "2024-05-21T12:39:17.238443+00:00", "EventTime": "2024-05-21T12:39:17.238465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3OPva2wWd4NpCrmOb"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "4a4d619e-cce0-40bb-a80a-2fbbae462156", "DetectTime": "2024-05-21T12:39:17.244445+00:00", "EventTime": "2024-05-21T12:39:17.244471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq0Qwq2xW3Hhx50k6c", "CkIBKu2nIknCKsmYdi", "CHMIqQ10EVupY1Vb01", "Ct52k84xncqcV6fhNi"], "accumulated_threat_level": 2.1, "timewindow": 103} +{"Format": "IDEA0", "ID": "fe980b3c-5602-4c6b-b952-16303b790778", "DetectTime": "2024-05-21T12:39:17.472703+00:00", "EventTime": "2024-05-21T12:39:17.472726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcTmr4gSNrq4Cmkvh"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "159a23c6-b5a7-4805-b7b3-5f8fba6746ab", "DetectTime": "2024-05-21T12:39:17.509923+00:00", "EventTime": "2024-05-21T12:39:17.509944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C172092h9J3xFhUXna"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "06bd84b9-b207-4a41-9867-7f35505ef90b", "DetectTime": "2024-05-21T12:39:17.546998+00:00", "EventTime": "2024-05-21T12:39:17.547019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJNOk4VOHCWH8SWEd"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "1203e18d-8f21-4f1e-a9e7-14af9a2edb09", "DetectTime": "2024-05-21T12:39:17.790707+00:00", "EventTime": "2024-05-21T12:39:17.790729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv2gE54fbJWWJq2817"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "a5adbcb6-6ca7-4554-b4a2-0ca81a278576", "DetectTime": "2024-05-21T12:39:17.970803+00:00", "EventTime": "2024-05-21T12:39:17.970821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGDqk2BTYzY9oB822"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 103} +{"Format": "IDEA0", "ID": "11a5dad4-8f2a-4437-9d32-0f40263aec56", "DetectTime": "2024-05-21T12:39:18.004776+00:00", "EventTime": "2024-05-21T12:39:18.004796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjg6Uy3mZutmNkWkgf"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "15d98ec6-1592-4573-8603-46974598fe63", "DetectTime": "2024-05-21T12:39:18.064330+00:00", "EventTime": "2024-05-21T12:39:18.064350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B6gi3rSp2lmMG3cb"], "accumulated_threat_level": 3.7, "timewindow": 103} +{"Format": "IDEA0", "ID": "98bb1425-5f48-44c4-a493-921430596618", "DetectTime": "2024-05-21T12:39:18.117827+00:00", "EventTime": "2024-05-21T12:39:18.117845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPe6kk1VcF7Mmqi0Qa"], "accumulated_threat_level": 4.5, "timewindow": 103} +{"Format": "IDEA0", "ID": "afff25db-4f31-46cd-9ac3-060ce1c4c434", "DetectTime": "2024-05-21T12:39:18.171905+00:00", "EventTime": "2024-05-21T12:39:18.171923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crm9jy1Z98pwY4cDh4"], "accumulated_threat_level": 5.3, "timewindow": 103} +{"Format": "IDEA0", "ID": "dfbc6872-3338-4e92-a336-92bd540a58c4", "DetectTime": "2024-05-21T12:39:18.424927+00:00", "EventTime": "2024-05-21T12:39:18.424948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkWAM1W9wXb2hpbfe"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "cf4b1ca3-b6df-45b0-85d0-9bf26bd4f050", "DetectTime": "2024-05-21T12:39:18.667425+00:00", "EventTime": "2024-05-21T12:39:18.667446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5Uo1qXFqWDcXgo8"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "f87bb5f9-72ca-4e61-be67-b87249dd0d3b", "DetectTime": "2024-05-21T12:39:18.672468+00:00", "EventTime": "2024-05-21T12:39:18.672487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmDyCZ1B4oMPp5Hnl9"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "fd0d2ced-b834-46d4-b2b0-5fbc188e59e1", "DetectTime": "2024-05-21T12:39:18.701687+00:00", "EventTime": "2024-05-21T12:39:18.701705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLd403MQ3Hxd80O67"], "accumulated_threat_level": 6.1, "timewindow": 103} +{"Format": "IDEA0", "ID": "1c6e70cf-00ac-472a-ab94-f1f04b07ffa2", "DetectTime": "2024-05-21T12:39:18.756035+00:00", "EventTime": "2024-05-21T12:39:18.756055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbKCi31MJ6wXw6nCTi"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "5e3d52a6-c171-4c2e-9545-7d061c2d0b15", "DetectTime": "2024-05-21T12:39:18.798728+00:00", "EventTime": "2024-05-21T12:39:18.798748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMxno1rrmtVbS6PA5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 103} +{"Format": "IDEA0", "ID": "3006a888-91df-499b-b9fb-0ad225a1a6dd", "DetectTime": "2024-05-21T12:39:18.836710+00:00", "EventTime": "2024-05-21T12:39:18.836729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeSDvuZdoGGIZs77"], "accumulated_threat_level": 7.699999999999999, "timewindow": 103} +{"Format": "IDEA0", "ID": "cbb0f31f-4978-457b-94ad-d8d876bd7db3", "DetectTime": "2024-05-21T12:39:18.877951+00:00", "EventTime": "2024-05-21T12:39:18.877970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCbEeYxspkokYui7"], "accumulated_threat_level": 8.5, "timewindow": 103} +{"Format": "IDEA0", "ID": "bb6bcd81-9bc4-43d5-a4d5-02e266ec670a", "DetectTime": "2024-05-21T12:39:18.920485+00:00", "EventTime": "2024-05-21T12:39:18.920505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkXJ1i4KHolYR9LFje"], "accumulated_threat_level": 9.3, "timewindow": 103} +{"Format": "IDEA0", "ID": "b9f5f805-9ff3-412b-b69a-892a3d306a28", "DetectTime": "2024-05-21T12:39:18.964423+00:00", "EventTime": "2024-05-21T12:39:18.964443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce4NKa2GSwNqUMGiqf"], "accumulated_threat_level": 10.100000000000001, "timewindow": 103} +{"Format": "IDEA0", "ID": "872f73e1-3bca-4793-958e-25d34afbf993", "DetectTime": "2024-05-21T12:39:19.002496+00:00", "EventTime": "2024-05-21T12:39:19.002517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbP8p12aMcOj82lBS4"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b45c211e-e836-47fe-9ce3-d2c045661592", "DetectTime": "2024-05-21T12:39:19.028521+00:00", "EventTime": "2024-05-21T12:39:19.028543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNo1sDjEYKM5BfdU3"], "accumulated_threat_level": 10.900000000000002, "timewindow": 103} +{"Format": "IDEA0", "ID": "ef593579-fbdb-445e-9314-f30693618fd6", "DetectTime": "2024-05-21T12:39:19.290912+00:00", "EventTime": "2024-05-21T12:39:19.290934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsdZnoFZCnPKQzMj"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "7736e274-256e-47d6-b584-3a348fd81e90", "DetectTime": "2024-05-21T12:39:19.296486+00:00", "EventTime": "2024-05-21T12:39:19.296506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZdJ42qE7zRxeC491"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "3d7ed489-59c8-4d57-9b1e-d82229d113c2", "DetectTime": "2024-05-21T12:39:19.301067+00:00", "EventTime": "2024-05-21T12:39:19.301087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4MhbM1iR5Sib18Kyj"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "5bb47736-f342-41a7-a06a-e27377b1abc3", "DetectTime": "2024-05-21T12:39:19.377414+00:00", "EventTime": "2024-05-21T12:39:19.377433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIG1r1F9OpRnSddeb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 103} +{"Format": "IDEA0", "ID": "ded06962-9e54-4ced-8d14-72379da848f9", "DetectTime": "2024-05-21T12:39:19.387229+00:00", "EventTime": "2024-05-21T12:39:19.387252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVIuz46l1Ebmo1r7e"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "1322d1a4-17fd-4162-a011-4347b3fc3d27", "DetectTime": "2024-05-21T12:39:19.460958+00:00", "EventTime": "2024-05-21T12:39:19.460976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDtd245r2On76zH6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 103} +{"Format": "Json", "ID": "1322d1a4-17fd-4162-a011-4347b3fc3d27", "DetectTime": "2024-05-21T12:39:19.460958+00:00", "EventTime": "2024-05-21T12:39:19.460976+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "1970-01-05T06:30:57.509974+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 103. (real time 2024/05/21 12:39:19.668463)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 103, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "dfee634d-51a2-493d-8330-55e5bb33f7e2", "DetectTime": "2024-05-21T12:39:19.679179+00:00", "EventTime": "2024-05-21T12:39:19.679200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuvLUj4zy2IPOtbAtc"], "accumulated_threat_level": 0.8, "timewindow": 103} +{"Format": "IDEA0", "ID": "38b83287-c66f-47b9-87a5-038157100adc", "DetectTime": "2024-05-21T12:39:19.690504+00:00", "EventTime": "2024-05-21T12:39:19.690522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQt1mO6LJnwqShZj"], "accumulated_threat_level": 1.6, "timewindow": 103} +{"Format": "IDEA0", "ID": "7c4fe5b1-1cbb-4407-bb78-106efc26c472", "DetectTime": "2024-05-21T12:39:19.695301+00:00", "EventTime": "2024-05-21T12:39:19.695319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRxUk30WLW2TgqYbe"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "82ceb433-7f96-435b-b0c3-c50577849e43", "DetectTime": "2024-05-21T12:39:19.870750+00:00", "EventTime": "2024-05-21T12:39:19.870778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8beLa1nncJw1xtJEe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 103} +{"Format": "IDEA0", "ID": "7ea39733-6fcc-47c7-8a73-df3858957985", "DetectTime": "2024-05-21T12:39:19.900119+00:00", "EventTime": "2024-05-21T12:39:19.900142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuA2An3MDFQVcm8YSf"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "dd852a3a-4540-40c3-82f4-265e4f715026", "DetectTime": "2024-05-21T12:39:19.905700+00:00", "EventTime": "2024-05-21T12:39:19.905719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJb5Vw9k14QIFsfc"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "6504b5d9-7af3-4873-ba16-38134d2da07f", "DetectTime": "2024-05-21T12:39:19.910311+00:00", "EventTime": "2024-05-21T12:39:19.910329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnXViu2dFGgmgUm3Ij"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "a16e4ce5-7c80-4ead-9698-fd9156ec49e7", "DetectTime": "2024-05-21T12:39:20.002786+00:00", "EventTime": "2024-05-21T12:39:20.002824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHruQj40czuyGDn5v9"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "ad79e821-3f3c-4e7b-a605-1f5efa3b51e4", "DetectTime": "2024-05-21T12:39:20.046585+00:00", "EventTime": "2024-05-21T12:39:20.046623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9N6clFXONjohpr5"], "accumulated_threat_level": 4.0, "timewindow": 103} +{"Format": "IDEA0", "ID": "262679db-afc7-4814-b79d-d53858976f62", "DetectTime": "2024-05-21T12:39:20.092715+00:00", "EventTime": "2024-05-21T12:39:20.092747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdBSS1B2z2gKvSt7j"], "accumulated_threat_level": 4.8, "timewindow": 103} +{"Format": "IDEA0", "ID": "c11786e4-a175-4545-900e-e579998d0934", "DetectTime": "2024-05-21T12:39:20.098019+00:00", "EventTime": "2024-05-21T12:39:20.098044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7IyTa4gfLY2ohNwna"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "c6eac84b-dc90-4a7e-ae97-310a99cd1a61", "DetectTime": "2024-05-21T12:39:20.163464+00:00", "EventTime": "2024-05-21T12:39:20.163496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxuOcq3IXFsfrweT5b"], "accumulated_threat_level": 5.6, "timewindow": 103} +{"Format": "IDEA0", "ID": "eb232312-93d5-4c11-9075-dc77c11136f7", "DetectTime": "2024-05-21T12:39:20.401701+00:00", "EventTime": "2024-05-21T12:39:20.401725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqWA77RQznHoH57a1"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "9b2f5cea-0e03-4340-af8b-877e851e4e63", "DetectTime": "2024-05-21T12:39:20.439958+00:00", "EventTime": "2024-05-21T12:39:20.439976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMWat1FQM29ITe6Pa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 103} +{"Format": "IDEA0", "ID": "5842441f-1511-4cbc-9c96-f41de778dd7c", "DetectTime": "2024-05-21T12:39:20.481007+00:00", "EventTime": "2024-05-21T12:39:20.481027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZOynV1oPUXzPw7Y2l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 103} +{"Format": "IDEA0", "ID": "b958e77b-ee73-4f59-b68b-abbbf773a513", "DetectTime": "2024-05-21T12:39:20.524783+00:00", "EventTime": "2024-05-21T12:39:20.524803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwIWdC98ilRqfTk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 103} +{"Format": "IDEA0", "ID": "4331d67d-221e-4e69-b7d0-9c4370b9579d", "DetectTime": "2024-05-21T12:39:20.573352+00:00", "EventTime": "2024-05-21T12:39:20.573370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDKahA2U1JxfRfQuf4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 103} +{"Format": "IDEA0", "ID": "6de770c2-f673-4650-a9aa-249cb373b3ab", "DetectTime": "2024-05-21T12:39:20.592464+00:00", "EventTime": "2024-05-21T12:39:20.592495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJPRc3uJpX818LRx5"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "28dae62b-ef01-45e0-92b5-bbe963ead264", "DetectTime": "2024-05-21T12:39:20.642399+00:00", "EventTime": "2024-05-21T12:39:20.642436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFYv4b12gReMYBMl"], "accumulated_threat_level": 9.6, "timewindow": 103} +{"Format": "IDEA0", "ID": "0c30612e-d9c0-4147-902e-255ebfb99c19", "DetectTime": "2024-05-21T12:39:20.693291+00:00", "EventTime": "2024-05-21T12:39:20.693308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOvKC17R0B1GPUxx9"], "accumulated_threat_level": 10.4, "timewindow": 103} +{"Format": "IDEA0", "ID": "bab1f64c-615e-480e-9323-ed784a961be1", "DetectTime": "2024-05-21T12:39:20.734526+00:00", "EventTime": "2024-05-21T12:39:20.734546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwnJp4zBMsVKokSzk"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b82bdd0e-356a-49b5-8ff2-cf82e0421a6e", "DetectTime": "2024-05-21T12:39:20.772033+00:00", "EventTime": "2024-05-21T12:39:20.772053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwS8221nlVigt4pSB5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 103} +{"Format": "IDEA0", "ID": "3a7b28b9-7645-4e56-b258-cdc6fb269814", "DetectTime": "2024-05-21T12:39:20.992400+00:00", "EventTime": "2024-05-21T12:39:20.992419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNu4Mf2JRNFuB4wROg"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "b120a422-1233-48f5-99d7-c41885785b14", "DetectTime": "2024-05-21T12:39:21.026627+00:00", "EventTime": "2024-05-21T12:39:21.026647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsO0W1bgRnot3lali"], "accumulated_threat_level": 12.000000000000002, "timewindow": 103} +{"Format": "Json", "ID": "b120a422-1233-48f5-99d7-c41885785b14", "DetectTime": "2024-05-21T12:39:21.026627+00:00", "EventTime": "2024-05-21T12:39:21.026647+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-05T06:31:19.240690+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 103. (real time 2024/05/21 12:39:21.193098)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 103, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6dbb2b2d-8f8e-4ed9-aeca-ed75f617bae1", "DetectTime": "2024-05-21T12:39:21.207230+00:00", "EventTime": "2024-05-21T12:39:21.207248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjDrbv2ApdRfgv2lAa"], "accumulated_threat_level": 0.8, "timewindow": 103} +{"Format": "IDEA0", "ID": "56e0f743-e605-4ac3-bf6f-455c4481ac74", "DetectTime": "2024-05-21T12:39:21.218130+00:00", "EventTime": "2024-05-21T12:39:21.218148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIsRFV1gxMKuOeBrPg"], "accumulated_threat_level": 1.6, "timewindow": 103} +{"Format": "IDEA0", "ID": "e051eb7d-7ca0-467e-98c9-4ec781c6d0da", "DetectTime": "2024-05-21T12:39:21.230334+00:00", "EventTime": "2024-05-21T12:39:21.230356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CruUgv4bqIbUrnoQm5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 103} +{"Format": "IDEA0", "ID": "80ef655b-58a5-4edc-9391-513ace7a0083", "DetectTime": "2024-05-21T12:39:21.251098+00:00", "EventTime": "2024-05-21T12:39:21.251119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUTE3B4OmAbl9EwiH7"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "10cee951-405f-467e-929d-04edaa9e6ee6", "DetectTime": "2024-05-21T12:39:21.272917+00:00", "EventTime": "2024-05-21T12:39:21.272940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6C5t1FK50gqKgT22"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "c2af1266-8521-4f2e-8987-f42fbd5a3b01", "DetectTime": "2024-05-21T12:39:21.480493+00:00", "EventTime": "2024-05-21T12:39:21.480516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQgTV2CXqNOfyfFJa"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "1e546644-0aaf-466d-adbd-67bfb3cc83fa", "DetectTime": "2024-05-21T12:39:21.546624+00:00", "EventTime": "2024-05-21T12:39:21.546646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctfrjw4G5B3WgPrAri"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "bbce4f27-85b9-4fdf-8e89-9b157745b230", "DetectTime": "2024-05-21T12:39:21.816358+00:00", "EventTime": "2024-05-21T12:39:21.816381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr4xg3KvmJMszfLM3"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "d565865d-3e15-438e-9bc3-ae2ae71a666f", "DetectTime": "2024-05-21T12:39:22.079871+00:00", "EventTime": "2024-05-21T12:39:22.079888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDArQH4Q3Cwv5eUy2"], "accumulated_threat_level": 0.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "b98059ec-38d3-4bff-9a09-2356a2df4bdc", "DetectTime": "2024-05-21T12:39:22.084700+00:00", "EventTime": "2024-05-21T12:39:22.084717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci1paL1MoIKQ4yJY87"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "2d842bd1-4179-4062-87b3-897807927212", "DetectTime": "2024-05-21T12:39:22.089453+00:00", "EventTime": "2024-05-21T12:39:22.089471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Umsy3RDa4fVtcW6f"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "ba236c17-b2e4-40b6-94fe-fcbb27d11b7d", "DetectTime": "2024-05-21T12:39:22.095581+00:00", "EventTime": "2024-05-21T12:39:22.095606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZanVi35uLbtRVjqsi"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "2e8b6d40-261b-4635-84c1-8804da3b875a", "DetectTime": "2024-05-21T12:39:22.196938+00:00", "EventTime": "2024-05-21T12:39:22.196961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqGjy2PVb3MV2MnIj"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "cc3c95d3-3a8b-4151-a3ca-213335e670b3", "DetectTime": "2024-05-21T12:39:22.232849+00:00", "EventTime": "2024-05-21T12:39:22.232880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCS2Y25lu0WCKIwLi"], "accumulated_threat_level": 1.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "429f2096-3454-4f94-8988-c4027be51900", "DetectTime": "2024-05-21T12:39:22.276727+00:00", "EventTime": "2024-05-21T12:39:22.276748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2KYjG8cUSqnSnwh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 104} +{"Format": "IDEA0", "ID": "c0982dde-60d5-410e-bb33-4a21df956c31", "DetectTime": "2024-05-21T12:39:22.317855+00:00", "EventTime": "2024-05-21T12:39:22.317874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7DeK3Oz24ot2Zfq3"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "d9e1edda-d988-4cb5-a0b1-2686307f842e", "DetectTime": "2024-05-21T12:39:22.361588+00:00", "EventTime": "2024-05-21T12:39:22.361607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmKmqf32ssrVCZ4Zc"], "accumulated_threat_level": 4.0, "timewindow": 104} +{"Format": "IDEA0", "ID": "93f62bd7-dd5a-4f6a-82a1-3dbfa779af32", "DetectTime": "2024-05-21T12:39:22.405123+00:00", "EventTime": "2024-05-21T12:39:22.405142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLAa01ewo619zCtbd"], "accumulated_threat_level": 4.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "687fb934-eb5d-4000-98ab-035cdabd17bf", "DetectTime": "2024-05-21T12:39:22.650129+00:00", "EventTime": "2024-05-21T12:39:22.650149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAZh44yUKc7sBYrU"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "6340f9c4-d054-4de3-a33c-e0a74ea193ad", "DetectTime": "2024-05-21T12:39:22.655925+00:00", "EventTime": "2024-05-21T12:39:22.655945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGcxl13WDFSprsmXi"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "dfc83840-85cb-45bc-9354-f1e10805b690", "DetectTime": "2024-05-21T12:39:22.660731+00:00", "EventTime": "2024-05-21T12:39:22.660750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWTWc1BMoaIVtA3tc"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "8a04c09f-0922-4f62-8f37-a9598af9fdc5", "DetectTime": "2024-05-21T12:39:22.674503+00:00", "EventTime": "2024-05-21T12:39:22.674522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxXB7b4veZ5sWpk6Wl"], "accumulated_threat_level": 5.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "6a0b9dd0-48a6-4da4-b919-f9142510ad30", "DetectTime": "2024-05-21T12:39:22.728015+00:00", "EventTime": "2024-05-21T12:39:22.728037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7vzd1xZYo7tDOOXl"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "e458ed45-023b-4eb6-a18e-089accefd774", "DetectTime": "2024-05-21T12:39:22.906439+00:00", "EventTime": "2024-05-21T12:39:22.906474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckwaq8uqGIVuD4Hnl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 104} +{"Format": "IDEA0", "ID": "5cacf8de-894c-4614-a1ca-5edb2cd46651", "DetectTime": "2024-05-21T12:39:22.914616+00:00", "EventTime": "2024-05-21T12:39:22.914635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1Ykx4XufG6cji4I4"], "accumulated_threat_level": 0.8, "timewindow": 101} +{"Format": "IDEA0", "ID": "086dd4c8-7c5b-4ba8-b906-a0e7a98e16fe", "DetectTime": "2024-05-21T12:39:22.956533+00:00", "EventTime": "2024-05-21T12:39:22.956569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqZa621N55vD17Ami"], "accumulated_threat_level": 7.199999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "6d572691-2250-4372-aa30-d9689cbefab1", "DetectTime": "2024-05-21T12:39:22.996159+00:00", "EventTime": "2024-05-21T12:39:22.996181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXYgNi3B7Lrx2kkfU2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "e965c7de-ceb6-4889-a4a8-86be25a12c09", "DetectTime": "2024-05-21T12:39:23.295870+00:00", "EventTime": "2024-05-21T12:39:23.295896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.66.186.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtXW8F4WXMcjP9w8Hh"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "92600b7d-5a63-47ad-8ea1-5e2119e66b2d", "DetectTime": "2024-05-21T12:39:23.350674+00:00", "EventTime": "2024-05-21T12:39:23.350703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQA9611RwIau3wKa7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "1ac6df76-41bc-4e50-a310-6a641008be41", "DetectTime": "2024-05-21T12:39:23.355659+00:00", "EventTime": "2024-05-21T12:39:23.355680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBzsp4olTpjiLIYJ3"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "a3b5b374-1f75-493a-b9b6-1244377c15d0", "DetectTime": "2024-05-21T12:39:23.360362+00:00", "EventTime": "2024-05-21T12:39:23.360380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5CgJ3TAqGguHspf9"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "bd1b9e8c-ab2b-4d4d-b238-f07679e49828", "DetectTime": "2024-05-21T12:39:23.461455+00:00", "EventTime": "2024-05-21T12:39:23.461475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblwjY2KBvyEikjZU3"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "cc0d5a06-f140-4b7e-b63b-9956b6f1c3c0", "DetectTime": "2024-05-21T12:39:23.466595+00:00", "EventTime": "2024-05-21T12:39:23.466616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGdsx301AjzTksvS1"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "f15508ac-b18c-49ed-b120-742a704af121", "DetectTime": "2024-05-21T12:39:23.474015+00:00", "EventTime": "2024-05-21T12:39:23.474036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDfOzH149wrAduj4g8"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "0cf03f60-f03d-485f-af61-05953b56e9d7", "DetectTime": "2024-05-21T12:39:23.541633+00:00", "EventTime": "2024-05-21T12:39:23.541654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxoKa23iyUL3xkg9d"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "dbcf4829-2013-438a-ac40-b7a4dd7a6ee3", "DetectTime": "2024-05-21T12:39:23.572936+00:00", "EventTime": "2024-05-21T12:39:23.572957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqbTtw3jWvk6FgNqzd"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "9ab92fac-42d6-4c34-ac59-85c19effa32a", "DetectTime": "2024-05-21T12:39:23.587288+00:00", "EventTime": "2024-05-21T12:39:23.587308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmPu036cHZCCUXMh3"], "accumulated_threat_level": 9.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "a7bbbf91-2261-4956-a72e-f9368fbf4e1e", "DetectTime": "2024-05-21T12:39:23.592789+00:00", "EventTime": "2024-05-21T12:39:23.592809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9V0Tf4pgyqi8WIyPa"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "884db6f4-3144-4363-b9b1-69f50ca4288c", "DetectTime": "2024-05-21T12:39:23.902072+00:00", "EventTime": "2024-05-21T12:39:23.902093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHaNq3KPN1u04Wmje"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "3262d37a-6ba3-48d8-9ab3-b0f5ab5a2bb7", "DetectTime": "2024-05-21T12:39:23.922486+00:00", "EventTime": "2024-05-21T12:39:23.922509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvBspf3Wh89Nm7IDQd"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "a1185b75-2868-47c4-b6fa-9e47eb5a9588", "DetectTime": "2024-05-21T12:39:23.980931+00:00", "EventTime": "2024-05-21T12:39:23.980953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2lYra1uvNkm3td0P9"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "33107994-2a68-412d-977d-8a016c16df59", "DetectTime": "2024-05-21T12:39:23.991843+00:00", "EventTime": "2024-05-21T12:39:23.991867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtI1uW1yJSDa8Lfsg7"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "c69bf880-8336-4336-91f4-da022b5120cb", "DetectTime": "2024-05-21T12:39:24.004466+00:00", "EventTime": "2024-05-21T12:39:24.004494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvvrk49O7hUpcEBdi"], "accumulated_threat_level": 10.4, "timewindow": 104} +{"Format": "IDEA0", "ID": "66d34c54-1def-4f7c-80b8-a4df6c60f07b", "DetectTime": "2024-05-21T12:39:24.057260+00:00", "EventTime": "2024-05-21T12:39:24.057282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0U4Xu1XVe3GPZq134"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "b1889a50-cc7f-4aea-9da9-78eee802c723", "DetectTime": "2024-05-21T12:39:24.145121+00:00", "EventTime": "2024-05-21T12:39:24.145140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0KZRE2v9sy6at4lP2"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "92f5d6d2-03d5-4c5b-b5a9-917d3f6a4f28", "DetectTime": "2024-05-21T12:39:24.162376+00:00", "EventTime": "2024-05-21T12:39:24.162395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwU0RDrynTxQQefi"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "26a94559-54b5-4453-afb5-0a829f0a5d56", "DetectTime": "2024-05-21T12:39:24.412109+00:00", "EventTime": "2024-05-21T12:39:24.412133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yDEeRqejTxNMam"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "af3984ec-f356-45d7-afba-04a9b7874b75", "DetectTime": "2024-05-21T12:39:24.421260+00:00", "EventTime": "2024-05-21T12:39:24.421282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1HL193hfb4fJUp8th"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "c5e2f490-47fd-4a80-b0fb-46d0c3412bc2", "DetectTime": "2024-05-21T12:39:24.446902+00:00", "EventTime": "2024-05-21T12:39:24.446921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGVMF31aXqJ0HjlO7"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "ba96cc5d-7e6a-44c0-a9b9-c8fa1e7f14ad", "DetectTime": "2024-05-21T12:39:24.513836+00:00", "EventTime": "2024-05-21T12:39:24.513856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1oY2a230zVfiZvtk7"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "ca9e8e44-6837-4333-a5f2-4b421f1edff4", "DetectTime": "2024-05-21T12:39:24.526718+00:00", "EventTime": "2024-05-21T12:39:24.526741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCjju4MwpyoWUy5J8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 104} +{"Format": "IDEA0", "ID": "77926969-6e38-4ba5-b6c5-5a15fa19a64c", "DetectTime": "2024-05-21T12:39:24.581018+00:00", "EventTime": "2024-05-21T12:39:24.581039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NCHB242st83MEPKa"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "2cceaada-15fc-40b8-8a03-ec795e1504f5", "DetectTime": "2024-05-21T12:39:24.619511+00:00", "EventTime": "2024-05-21T12:39:24.619533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjl12JE7OoEjMtKd"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "a9d9b91a-115c-43a0-bd2b-3ce6f384b0f5", "DetectTime": "2024-05-21T12:39:24.632242+00:00", "EventTime": "2024-05-21T12:39:24.632263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9AQt2292cBko2fkLf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 104} +{"Format": "Json", "ID": "a9d9b91a-115c-43a0-bd2b-3ce6f384b0f5", "DetectTime": "2024-05-21T12:39:24.632242+00:00", "EventTime": "2024-05-21T12:39:24.632263+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-05T07:01:44.074246+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2024/05/21 12:39:24.802420)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 104, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "40e3365d-ee72-4f5b-ac58-bc629ebe38b6", "DetectTime": "2024-05-21T12:39:24.807502+00:00", "EventTime": "2024-05-21T12:39:24.807523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Klqr2iDyzhAiqP4"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "56734954-8d0b-453f-82c3-ce54e892fe3d", "DetectTime": "2024-05-21T12:39:24.812286+00:00", "EventTime": "2024-05-21T12:39:24.812305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkcLA1lvXwh3bVeO9"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "8880d412-40ae-4480-b18f-c884ac8e1450", "DetectTime": "2024-05-21T12:39:24.822976+00:00", "EventTime": "2024-05-21T12:39:24.822995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvNIsr2gV3fZaPuZla"], "accumulated_threat_level": 0.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "d095dd15-cc65-4c58-8dd1-9d9a0930d5a7", "DetectTime": "2024-05-21T12:39:24.995284+00:00", "EventTime": "2024-05-21T12:39:24.995305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTlfPISkYA83kHM9"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "b5b1d3be-5e93-4f82-af4b-c2c6f525c5e8", "DetectTime": "2024-05-21T12:39:25.034609+00:00", "EventTime": "2024-05-21T12:39:25.034637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpflcF1FJ5L6lokk52"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "5b2cce44-0c79-43da-b5cd-0d48416e9d68", "DetectTime": "2024-05-21T12:39:25.040537+00:00", "EventTime": "2024-05-21T12:39:25.040558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TQ433kcUTP97vcjc"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "3a3d0278-8893-4976-bff5-5e560bf8f103", "DetectTime": "2024-05-21T12:39:25.104137+00:00", "EventTime": "2024-05-21T12:39:25.104171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvIb9uFYkx4ZLsCP5"], "accumulated_threat_level": 1.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "1742bfb5-eb62-4c36-b806-ae34696973f5", "DetectTime": "2024-05-21T12:39:25.146663+00:00", "EventTime": "2024-05-21T12:39:25.146697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzNQ14O8iYUeRSdXe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 104} +{"Format": "IDEA0", "ID": "0663f090-4450-417f-85e2-6951a83f43fd", "DetectTime": "2024-05-21T12:39:25.190336+00:00", "EventTime": "2024-05-21T12:39:25.190362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkTKD3nqTbIi1hDQh"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "db52363d-70e4-43a2-bf08-851a7ed4f6c6", "DetectTime": "2024-05-21T12:39:25.234228+00:00", "EventTime": "2024-05-21T12:39:25.234249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7BSD1FLPgg8uDly2"], "accumulated_threat_level": 4.0, "timewindow": 104} +{"Format": "IDEA0", "ID": "7b6cf7fe-14ec-4566-b74f-e7cfe8c4bfcd", "DetectTime": "2024-05-21T12:39:25.267888+00:00", "EventTime": "2024-05-21T12:39:25.267906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSYOz2FRYIarEqn6k"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "b25758ff-d468-49f9-8322-a155e2e190fe", "DetectTime": "2024-05-21T12:39:25.538784+00:00", "EventTime": "2024-05-21T12:39:25.538804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrZiLe2mWhybLMcz1"], "accumulated_threat_level": 4.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "e17479f8-2080-457d-80a5-1c0eedfb5d60", "DetectTime": "2024-05-21T12:39:25.543759+00:00", "EventTime": "2024-05-21T12:39:25.543778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjIkE1ptxwcyNZHyc"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "951a9a78-090b-4485-bdb3-1efdc8f31006", "DetectTime": "2024-05-21T12:39:25.555652+00:00", "EventTime": "2024-05-21T12:39:25.555671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ircJ26XOT5oCcRYi"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "43fc4908-2ffb-4992-b0e3-f010068d8d36", "DetectTime": "2024-05-21T12:39:25.590145+00:00", "EventTime": "2024-05-21T12:39:25.590168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7vpA4E7Vnin53jAl"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "ea29731f-f55a-4a26-ae40-28622633fe68", "DetectTime": "2024-05-21T12:39:25.649595+00:00", "EventTime": "2024-05-21T12:39:25.649620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVynEq29GbM0XYrdi1"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "d96cd19d-1aac-408a-8ff7-2d8f979bb592", "DetectTime": "2024-05-21T12:39:25.687501+00:00", "EventTime": "2024-05-21T12:39:25.687522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ySau4PYzZDW71w0l"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "17d84f79-df67-463a-9214-8ae3b1427718", "DetectTime": "2024-05-21T12:39:25.795002+00:00", "EventTime": "2024-05-21T12:39:25.795025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBkOh3oxbrojm21t1"], "accumulated_threat_level": 5.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "ce0924cc-4b8a-41cb-963e-79ae64c395ba", "DetectTime": "2024-05-21T12:39:25.817350+00:00", "EventTime": "2024-05-21T12:39:25.817372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRfMvq1vQ9HSR8oYvc"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "b5de1abe-9066-4791-95f8-9c617cae84f3", "DetectTime": "2024-05-21T12:39:25.859206+00:00", "EventTime": "2024-05-21T12:39:25.859227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa6DS3v2BClUgE8Q1"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "8b24a902-9f9c-4f28-905a-d88576821ef2", "DetectTime": "2024-05-21T12:39:25.894537+00:00", "EventTime": "2024-05-21T12:39:25.894557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFQIP1kocSmTSDkF8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 104} +{"Format": "IDEA0", "ID": "25154452-390f-4344-b7e4-eb140f1e90b8", "DetectTime": "2024-05-21T12:39:26.134191+00:00", "EventTime": "2024-05-21T12:39:26.134213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66Mu83OkOeb48JJH6"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "5454c221-6bb7-4b4d-9913-4f27d83e3ac2", "DetectTime": "2024-05-21T12:39:26.139281+00:00", "EventTime": "2024-05-21T12:39:26.139302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1p573PpG2nGGr08c"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "9f59b960-6e9d-4a1e-ab89-ed166d902a1a", "DetectTime": "2024-05-21T12:39:26.181984+00:00", "EventTime": "2024-05-21T12:39:26.182003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWGI93ngqIa0NH7f3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "f76e1189-249d-4289-b01d-2e83bdee7666", "DetectTime": "2024-05-21T12:39:26.251184+00:00", "EventTime": "2024-05-21T12:39:26.251208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIyGGo2XBCHBDmtEEf"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "edd2ff0a-1e34-4cd2-a680-05ba8ed11edf", "DetectTime": "2024-05-21T12:39:26.284917+00:00", "EventTime": "2024-05-21T12:39:26.284937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7BvDW2SCgNgzQmwI3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "5b279076-5169-40b7-81f2-e048732d2bed", "DetectTime": "2024-05-21T12:39:26.325751+00:00", "EventTime": "2024-05-21T12:39:26.325771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXIEUw3gWU2jtiS9I"], "accumulated_threat_level": 8.799999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "a188a524-3538-4b38-970a-7b452bf7a70f", "DetectTime": "2024-05-21T12:39:26.365793+00:00", "EventTime": "2024-05-21T12:39:26.365815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21JuL16wOWCDj03md"], "accumulated_threat_level": 9.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "8fa1adc0-1de7-4bf8-827e-0586d78e3ff6", "DetectTime": "2024-05-21T12:39:26.408545+00:00", "EventTime": "2024-05-21T12:39:26.408564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtVWRg1atwTHP21O6a"], "accumulated_threat_level": 10.4, "timewindow": 104} +{"Format": "IDEA0", "ID": "d835592e-3cf5-4554-91f2-642d13d95b00", "DetectTime": "2024-05-21T12:39:26.444947+00:00", "EventTime": "2024-05-21T12:39:26.444964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQYUj2FJLeMqKnCG6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 104} +{"Format": "IDEA0", "ID": "1bccc13a-baf5-414c-8e7d-0932e95993bd", "DetectTime": "2024-05-21T12:39:26.521906+00:00", "EventTime": "2024-05-21T12:39:26.521924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0PX8838nupkC9ABMi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 104} +{"Format": "Json", "ID": "1bccc13a-baf5-414c-8e7d-0932e95993bd", "DetectTime": "2024-05-21T12:39:26.521906+00:00", "EventTime": "2024-05-21T12:39:26.521924+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-05T07:01:48.434533+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2024/05/21 12:39:26.679909)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 104, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "55a28078-4cc2-4553-a2e9-09847fac5528", "DetectTime": "2024-05-21T12:39:26.788368+00:00", "EventTime": "2024-05-21T12:39:26.788389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2Ciy14oUENmXwLwl"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "e715fa25-9f3c-4479-b65d-b726bb62b2f4", "DetectTime": "2024-05-21T12:39:26.833540+00:00", "EventTime": "2024-05-21T12:39:26.833560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPOKC38iJ6PIXFH8g"], "accumulated_threat_level": 0.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "c237fecd-e4b1-449f-b289-6ed8b9601109", "DetectTime": "2024-05-21T12:39:26.886801+00:00", "EventTime": "2024-05-21T12:39:26.886825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV9CbLVSRCkiENEZg"], "accumulated_threat_level": 1.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "866eac5a-6402-41bd-a0ff-7a7b1a7bd329", "DetectTime": "2024-05-21T12:39:26.962052+00:00", "EventTime": "2024-05-21T12:39:26.962074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbntnc2svpRLfiCGCj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 104} +{"Format": "IDEA0", "ID": "74e5d129-828c-48bf-9da3-9a8011c4a911", "DetectTime": "2024-05-21T12:39:27.002839+00:00", "EventTime": "2024-05-21T12:39:27.002859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LJuP8EJ6GxoUuQ5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "9eb9781c-e5a5-4f35-95e9-8dacfc70a8ea", "DetectTime": "2024-05-21T12:39:27.044683+00:00", "EventTime": "2024-05-21T12:39:27.044702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJour1hmPAGHfyZmk"], "accumulated_threat_level": 4.0, "timewindow": 104} +{"Format": "IDEA0", "ID": "754d42e6-c279-4800-ae5f-9328a180686f", "DetectTime": "2024-05-21T12:39:27.085000+00:00", "EventTime": "2024-05-21T12:39:27.085021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8YgP38WTdObSzkY7"], "accumulated_threat_level": 4.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "36706f78-ceb6-4c50-b022-c1ba76acc2c1", "DetectTime": "2024-05-21T12:39:27.135809+00:00", "EventTime": "2024-05-21T12:39:27.135827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wrUr22gJSrQdsDle"], "accumulated_threat_level": 5.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "8aac5928-4544-42fd-b3e9-097d708619b1", "DetectTime": "2024-05-21T12:39:27.167323+00:00", "EventTime": "2024-05-21T12:39:27.167345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJK1w4Zfu0Wlz3vr6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 104} +{"Format": "IDEA0", "ID": "d921ff44-d324-4b3f-a027-d9e56d032a1d", "DetectTime": "2024-05-21T12:39:27.180489+00:00", "EventTime": "2024-05-21T12:39:27.180508+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.231.69.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xgv3h75CUMAZ1b7"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "b7471772-0d83-4698-a51b-0546eb6e0feb", "DetectTime": "2024-05-21T12:39:27.192174+00:00", "EventTime": "2024-05-21T12:39:27.192192+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.231.69.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.231.69.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xgv3h75CUMAZ1b7"], "accumulated_threat_level": 4.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "2713623d-9683-4844-bc20-afad532a0cc8", "DetectTime": "2024-05-21T12:39:27.326606+00:00", "EventTime": "2024-05-21T12:39:27.326628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQV2384yrhv14Tr2R5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "01e8d953-04a1-41bd-a31c-e4b2c135d171", "DetectTime": "2024-05-21T12:39:27.427527+00:00", "EventTime": "2024-05-21T12:39:27.427550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 1.23.68.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClnIJw4i7ONDcEFsr9"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "3f3e9ed9-97cf-41a9-8311-811fbd28c527", "DetectTime": "2024-05-21T12:39:27.464305+00:00", "EventTime": "2024-05-21T12:39:27.464327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZhqb1B1PluyRKskd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "c94654f2-247d-4478-9571-cdf91e409835", "DetectTime": "2024-05-21T12:39:27.507117+00:00", "EventTime": "2024-05-21T12:39:27.507136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jVG42vX5GBkbN7bb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "5caf813a-65d2-4011-9f4a-b04988694849", "DetectTime": "2024-05-21T12:39:27.546872+00:00", "EventTime": "2024-05-21T12:39:27.546891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHUBpjhbswqdvBZ2"], "accumulated_threat_level": 9.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "94ac78c0-dabd-42de-a915-eb953e3be73c", "DetectTime": "2024-05-21T12:39:27.588712+00:00", "EventTime": "2024-05-21T12:39:27.588732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31SVH3vAaDc1wuLBk"], "accumulated_threat_level": 10.4, "timewindow": 104} +{"Format": "IDEA0", "ID": "26f5233b-826a-478b-bf8b-82a6343ba808", "DetectTime": "2024-05-21T12:39:27.619134+00:00", "EventTime": "2024-05-21T12:39:27.619157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.206.29.96 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNPIUEnA3vUS6gGTc"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "e3337588-330b-4ec4-ac36-c866059312ba", "DetectTime": "2024-05-21T12:39:27.656975+00:00", "EventTime": "2024-05-21T12:39:27.656995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxGxRQD8OyOa7Azh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 104} +{"Format": "IDEA0", "ID": "55b88261-e8ae-4e54-a97e-3eebb4fd1d08", "DetectTime": "2024-05-21T12:39:27.702327+00:00", "EventTime": "2024-05-21T12:39:27.702346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceu0VW2lKWZ2zM2kRk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 104} +{"Format": "Json", "ID": "55b88261-e8ae-4e54-a97e-3eebb4fd1d08", "DetectTime": "2024-05-21T12:39:27.702327+00:00", "EventTime": "2024-05-21T12:39:27.702346+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-05T07:32:08.383983+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2024/05/21 12:39:27.892937)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 104, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ef3bdaf4-ae59-413b-95dc-4392afe6cbe3", "DetectTime": "2024-05-21T12:39:27.908105+00:00", "EventTime": "2024-05-21T12:39:27.908123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HrSb2kVZIqDNzlB6"], "accumulated_threat_level": 0.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "e2fb8a64-953f-4ae4-9d71-ec71a6d5146e", "DetectTime": "2024-05-21T12:39:27.918759+00:00", "EventTime": "2024-05-21T12:39:27.918778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSyD6849jjmjKFy7cb"], "accumulated_threat_level": 1.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "35b2f23a-244d-415d-94ba-ac5b5b5dc464", "DetectTime": "2024-05-21T12:39:27.944711+00:00", "EventTime": "2024-05-21T12:39:27.944734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjd1Qg2qGJ9gqGZlb3", "ChXIOq4L0FKzbTL5Ce", "Czy2oLI7RljDUplv3", "C9yJek1ZxRifFIjyjb"], "accumulated_threat_level": 0.5, "timewindow": 105} +{"Format": "IDEA0", "ID": "12e0a138-fbbb-4739-be52-e5b5cf2cb502", "DetectTime": "2024-05-21T12:39:28.012937+00:00", "EventTime": "2024-05-21T12:39:28.012970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 14298/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJd6JM2lYtJqMmPyQ7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 104} +{"Format": "IDEA0", "ID": "a1b5cadd-e7c5-475f-ae61-c385e9ecc61d", "DetectTime": "2024-05-21T12:39:28.056729+00:00", "EventTime": "2024-05-21T12:39:28.056758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8vLxDO17mFhywu"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "afe1cf63-078d-40de-b0fa-df2ff8bfb90a", "DetectTime": "2024-05-21T12:39:28.104083+00:00", "EventTime": "2024-05-21T12:39:28.104109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Eu572pFSUGyAQ6o5"], "accumulated_threat_level": 4.0, "timewindow": 104} +{"Format": "IDEA0", "ID": "8ff7436f-6950-4613-9b10-9a8e74298ce8", "DetectTime": "2024-05-21T12:39:28.148876+00:00", "EventTime": "2024-05-21T12:39:28.148893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3S9Jf2FDS4lwiHXJa"], "accumulated_threat_level": 4.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "5723eb81-4b9a-4f67-86eb-ddc12ce0805b", "DetectTime": "2024-05-21T12:39:28.182484+00:00", "EventTime": "2024-05-21T12:39:28.182503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.68.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPw204JFTteuINGtl"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "56a9d53e-6adf-40fa-b671-9a154efb2329", "DetectTime": "2024-05-21T12:39:28.218037+00:00", "EventTime": "2024-05-21T12:39:28.218059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ2hi7493uFxS3uGgl"], "accumulated_threat_level": 5.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "a338d1f8-f8ac-46bc-8f5c-de01cb59373c", "DetectTime": "2024-05-21T12:39:28.261185+00:00", "EventTime": "2024-05-21T12:39:28.261203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.242.6.156"]}], "Attach": [{"Content": "Connection to unknown destination port 19662/UDP destination IP 109.242.6.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBXrcC22iOODLtsAW4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 104} +{"Format": "IDEA0", "ID": "39ea391b-2bb2-49b0-95fc-cd7118ee7be5", "DetectTime": "2024-05-21T12:39:28.304831+00:00", "EventTime": "2024-05-21T12:39:28.304864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54hNA14TdMvn0FD5a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "59a58dc0-2e7d-4a10-bbd6-747f264237c2", "DetectTime": "2024-05-21T12:39:28.347985+00:00", "EventTime": "2024-05-21T12:39:28.348013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1LPP2qVJq891aUNl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "b779a609-aa2c-42fb-a5b7-a1153b25a28a", "DetectTime": "2024-05-21T12:39:28.397013+00:00", "EventTime": "2024-05-21T12:39:28.397051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EIvJ1BNf8p7eo2T5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 104} +{"Format": "IDEA0", "ID": "42fa522a-75bc-4250-afaa-31382669fe39", "DetectTime": "2024-05-21T12:39:28.623837+00:00", "EventTime": "2024-05-21T12:39:28.623857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPkVwA8RDZWq1Bn1"], "accumulated_threat_level": 9.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "9fbfadee-4c56-4707-8225-b85f5d9d434d", "DetectTime": "2024-05-21T12:39:28.669031+00:00", "EventTime": "2024-05-21T12:39:28.669051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4sK81CjPd0u5OkMa"], "accumulated_threat_level": 10.4, "timewindow": 104} +{"Format": "IDEA0", "ID": "5e38a168-241a-4b48-a8fb-4d8421cd41b3", "DetectTime": "2024-05-21T12:39:28.711349+00:00", "EventTime": "2024-05-21T12:39:28.711373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvugEJi2sZ3DMpbPl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 104} +{"Format": "IDEA0", "ID": "237c0b06-f7c2-4c28-93c7-b126e1ab21ec", "DetectTime": "2024-05-21T12:39:28.759516+00:00", "EventTime": "2024-05-21T12:39:28.759534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHrg96sTJy6mf4Xc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 104} +{"Format": "Json", "ID": "237c0b06-f7c2-4c28-93c7-b126e1ab21ec", "DetectTime": "2024-05-21T12:39:28.759516+00:00", "EventTime": "2024-05-21T12:39:28.759534+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-05T07:32:12.811521+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 104. (real time 2024/05/21 12:39:28.965728)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 104, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6460ccb6-c829-4841-9b5b-10c97559e4c8", "DetectTime": "2024-05-21T12:39:28.996310+00:00", "EventTime": "2024-05-21T12:39:28.996341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS3xD52zlZj5NPj0a6"], "accumulated_threat_level": 0.8, "timewindow": 104} +{"Format": "IDEA0", "ID": "65975784-426a-4d99-9408-5addaa16a111", "DetectTime": "2024-05-21T12:39:29.002035+00:00", "EventTime": "2024-05-21T12:39:29.002057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGZhr2i0qRkWE62A3"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "00c305f0-a1f2-488c-aa39-c39ce0c27bae", "DetectTime": "2024-05-21T12:39:29.014816+00:00", "EventTime": "2024-05-21T12:39:29.014839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YHiy2NMH1YbNMBP4"], "accumulated_threat_level": 1.6, "timewindow": 104} +{"Format": "IDEA0", "ID": "fa3e9f23-d32f-4c1f-8b7e-eebcb4084c42", "DetectTime": "2024-05-21T12:39:29.020705+00:00", "EventTime": "2024-05-21T12:39:29.020724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUV303uKkPxntT7Ol"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "01de7f9c-1ada-4d89-8784-0db49295e369", "DetectTime": "2024-05-21T12:39:29.032051+00:00", "EventTime": "2024-05-21T12:39:29.032070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zL2q4Mko3QRslC"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 104} +{"Format": "IDEA0", "ID": "0762adb1-fe58-4553-88bb-e2ed20bf2c4f", "DetectTime": "2024-05-21T12:39:29.036906+00:00", "EventTime": "2024-05-21T12:39:29.036924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2tSS1hUdj3XmHvi"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "ab3287e7-b102-4cdb-8ffd-37c6bbb6f156", "DetectTime": "2024-05-21T12:39:29.293732+00:00", "EventTime": "2024-05-21T12:39:29.293755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFbqR1wROY5hxwJme"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "c20fcf76-8c63-4364-b811-d772f110a3ff", "DetectTime": "2024-05-21T12:39:29.300597+00:00", "EventTime": "2024-05-21T12:39:29.300616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2HAXNpfnBYENIW4"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "84c3cb29-ca05-4a9a-b5ac-d3323eaee74d", "DetectTime": "2024-05-21T12:39:29.306269+00:00", "EventTime": "2024-05-21T12:39:29.306296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7NaL3e0K8IxI0Vkg"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "ab3bf4af-fd90-4fd6-a5a2-b0534a431152", "DetectTime": "2024-05-21T12:39:29.311652+00:00", "EventTime": "2024-05-21T12:39:29.311674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8td5O17c9USyeVoTe"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "d09a6eae-7ad4-48cc-94b2-20fd696c815c", "DetectTime": "2024-05-21T12:39:29.349056+00:00", "EventTime": "2024-05-21T12:39:29.349092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLDAA1peGNyQp6NI5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "48cab84a-d1ba-49bc-8ae5-df0123f8ff67", "DetectTime": "2024-05-21T12:39:29.465393+00:00", "EventTime": "2024-05-21T12:39:29.465416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuNdux18yAe4F5VcZj"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "a60458ca-8fc8-4d51-b6ab-9715c38e59a2", "DetectTime": "2024-05-21T12:39:29.506053+00:00", "EventTime": "2024-05-21T12:39:29.506075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ0w2K3Dzfzk07JzTi"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "d35050c5-612b-42ae-ad14-3c0bcf88594c", "DetectTime": "2024-05-21T12:39:29.544822+00:00", "EventTime": "2024-05-21T12:39:29.544844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiuYun3QtoPVCFf9Sh"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "48a3e6c4-981d-4770-b1de-f45de69eeefc", "DetectTime": "2024-05-21T12:39:29.590808+00:00", "EventTime": "2024-05-21T12:39:29.590829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C900Eu45ukk7juwksc"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "069312a1-ff8c-4530-aa5b-ebe18a0ec52e", "DetectTime": "2024-05-21T12:39:29.639300+00:00", "EventTime": "2024-05-21T12:39:29.639321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9TW9J1VRKn5NfExxe"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "0f7936d5-121c-486e-8d2f-db310c98ccbe", "DetectTime": "2024-05-21T12:39:29.885454+00:00", "EventTime": "2024-05-21T12:39:29.885476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQIAu2G2qxUQGoWc4"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "7d43ea28-dc7e-49de-b5b5-97ed46b3b444", "DetectTime": "2024-05-21T12:39:29.892807+00:00", "EventTime": "2024-05-21T12:39:29.892826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXkWm1obqyMqVX9M2"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "6680332d-dbc6-46c3-ba6e-f3c39a8bbb43", "DetectTime": "2024-05-21T12:39:29.923597+00:00", "EventTime": "2024-05-21T12:39:29.923620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETXUO3fXQMc73aeye"], "accumulated_threat_level": 1.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "9539a5d4-7c40-4ed9-8897-343f8b1ab2f5", "DetectTime": "2024-05-21T12:39:29.980248+00:00", "EventTime": "2024-05-21T12:39:29.980270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK9Wo11odQXh7SpXFh"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "c25c3039-d97d-4fd3-ad74-b3372a2d457f", "DetectTime": "2024-05-21T12:39:30.017738+00:00", "EventTime": "2024-05-21T12:39:30.017766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8LpW3wIrbhr4yLna"], "accumulated_threat_level": 2.1, "timewindow": 105} +{"Format": "IDEA0", "ID": "0700052d-b997-4bb6-ba41-3a50ab458d7d", "DetectTime": "2024-05-21T12:39:30.096917+00:00", "EventTime": "2024-05-21T12:39:30.096952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7CQPh4IOyYPK91Dx2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 105} +{"Format": "IDEA0", "ID": "9cc3bb7a-eab9-4810-ace8-a297831c9b67", "DetectTime": "2024-05-21T12:39:30.128269+00:00", "EventTime": "2024-05-21T12:39:30.128297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBcVH3hSOGK4FWfBb"], "accumulated_threat_level": 3.7, "timewindow": 105} +{"Format": "IDEA0", "ID": "9117f665-7c2a-4df4-baf6-e9125b6aea50", "DetectTime": "2024-05-21T12:39:30.169415+00:00", "EventTime": "2024-05-21T12:39:30.169436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83yps45k6OtYujwGe"], "accumulated_threat_level": 4.5, "timewindow": 105} +{"Format": "IDEA0", "ID": "b5f39bfb-d272-4887-b432-32613ff254c4", "DetectTime": "2024-05-21T12:39:30.210319+00:00", "EventTime": "2024-05-21T12:39:30.210338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoHwqcF2DUCTRsZh"], "accumulated_threat_level": 5.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "c6a8707f-b807-4ad2-8e70-8e2afb6e8bfb", "DetectTime": "2024-05-21T12:39:30.441796+00:00", "EventTime": "2024-05-21T12:39:30.441817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7k8o2vB9OpVzU021"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "63f977a9-f2bd-4702-b187-f2d556ba8242", "DetectTime": "2024-05-21T12:39:30.479262+00:00", "EventTime": "2024-05-21T12:39:30.479298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIER83vsPvIZbqYch"], "accumulated_threat_level": 6.1, "timewindow": 105} +{"Format": "IDEA0", "ID": "c4fdd40a-0a49-46f5-91f2-45df5f03b5ad", "DetectTime": "2024-05-21T12:39:30.528542+00:00", "EventTime": "2024-05-21T12:39:30.528562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5y3a3tqRpLOmQn7b"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 105} +{"Format": "IDEA0", "ID": "a2eb08a3-97c6-4e8c-b208-1ff296269717", "DetectTime": "2024-05-21T12:39:30.547910+00:00", "EventTime": "2024-05-21T12:39:30.547932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmkAOdCZjvmpuBpK2"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "a685d72c-2cdf-469f-9548-da62e4d3a156", "DetectTime": "2024-05-21T12:39:30.706506+00:00", "EventTime": "2024-05-21T12:39:30.706527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKMItyfroPrM7c7c"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "5d0ce746-9858-4a92-9ed3-37dc07d9d286", "DetectTime": "2024-05-21T12:39:30.721871+00:00", "EventTime": "2024-05-21T12:39:30.721893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0enr22S47u6wCR73c"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "500c7f74-c0f2-4c4c-a144-d1d2c3a47564", "DetectTime": "2024-05-21T12:39:30.735123+00:00", "EventTime": "2024-05-21T12:39:30.735140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzU7C4Z82jwQbG4pa"], "accumulated_threat_level": 7.699999999999999, "timewindow": 105} +{"Format": "IDEA0", "ID": "baada957-fd5b-4cfc-b592-b7950b9166f1", "DetectTime": "2024-05-21T12:39:30.792070+00:00", "EventTime": "2024-05-21T12:39:30.792091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ecVa37XIspc2qXC8"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "b57785d5-a6f9-4633-960d-6088034c9690", "DetectTime": "2024-05-21T12:39:30.797032+00:00", "EventTime": "2024-05-21T12:39:30.797050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNp3rp4fte7NMbR4x3"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "1ff846a8-5684-4243-9be7-87a5fb8ba326", "DetectTime": "2024-05-21T12:39:30.841374+00:00", "EventTime": "2024-05-21T12:39:30.841395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WtGHcs4ygHhu99i"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "24035617-a09f-4253-afaa-916c57863d11", "DetectTime": "2024-05-21T12:39:30.888180+00:00", "EventTime": "2024-05-21T12:39:30.888202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMBXj3anDh8kySh26"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "8f76698c-0e96-405c-81ed-7073a20754f3", "DetectTime": "2024-05-21T12:39:31.132053+00:00", "EventTime": "2024-05-21T12:39:31.132077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chij1V3w5HI9NTeYAa"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "2f6f55ad-5fee-4b40-855d-7dfad6b4c038", "DetectTime": "2024-05-21T12:39:31.151803+00:00", "EventTime": "2024-05-21T12:39:31.151823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4sHCu4AruVv8CTbuh"], "accumulated_threat_level": 8.5, "timewindow": 105} +{"Format": "IDEA0", "ID": "483e2e96-8137-432b-ad81-48dfdd168746", "DetectTime": "2024-05-21T12:39:31.210654+00:00", "EventTime": "2024-05-21T12:39:31.210675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthVak1ZCn71MpXyM4"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "eebe0f84-4127-4eb1-b94e-5f3c53ab8a84", "DetectTime": "2024-05-21T12:39:31.215847+00:00", "EventTime": "2024-05-21T12:39:31.215867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLoAJp2qYZmsvF0ODb"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "bbe81772-5a6d-4382-8651-0e8e988fd7ca", "DetectTime": "2024-05-21T12:39:31.286976+00:00", "EventTime": "2024-05-21T12:39:31.286996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRucYlaFLAjVmYL32"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "7982714a-ac7e-405c-b3e2-66169501649b", "DetectTime": "2024-05-21T12:39:31.326512+00:00", "EventTime": "2024-05-21T12:39:31.326535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RVj6pEpEKHxsbKf"], "accumulated_threat_level": 9.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "7c6b6b2c-f1e0-4704-9548-d7231a3cfa8a", "DetectTime": "2024-05-21T12:39:31.358163+00:00", "EventTime": "2024-05-21T12:39:31.358182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xT7I38XfbqE4Bk2l"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "a486fe2d-d7cd-41a5-bd41-b35582becf46", "DetectTime": "2024-05-21T12:39:31.405671+00:00", "EventTime": "2024-05-21T12:39:31.405690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFMnla2M4pIp6zrHra"], "accumulated_threat_level": 10.100000000000001, "timewindow": 105} +{"Format": "IDEA0", "ID": "4e27cfd2-e886-48cc-90e5-67bfcd0f3284", "DetectTime": "2024-05-21T12:39:31.411331+00:00", "EventTime": "2024-05-21T12:39:31.411352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBB1mF4tlvAF5wQ0Vj"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "e64235ef-316b-4e86-bd0c-4173803a99ec", "DetectTime": "2024-05-21T12:39:31.667590+00:00", "EventTime": "2024-05-21T12:39:31.667612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs4MXj4bP9XKrZRNY7"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "7be259b2-4ae4-47b4-8a84-3c860616c768", "DetectTime": "2024-05-21T12:39:31.672471+00:00", "EventTime": "2024-05-21T12:39:31.672491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Ucky3UvAIePaiRli"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "d4833e64-3fc8-4743-a723-e76b57a7ebaa", "DetectTime": "2024-05-21T12:39:31.677002+00:00", "EventTime": "2024-05-21T12:39:31.677020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXIVS1oFD76H1sB2b"], "accumulated_threat_level": 4.0, "timewindow": 102} +{"Format": "IDEA0", "ID": "c7f2cdd5-1fe6-44e0-90da-f28943300c17", "DetectTime": "2024-05-21T12:39:31.705559+00:00", "EventTime": "2024-05-21T12:39:31.705581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdwV42PJQrSuODtlb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 105} +{"Format": "IDEA0", "ID": "9a6ea04f-0cf3-4bca-a00b-060479a5c0d4", "DetectTime": "2024-05-21T12:39:31.805439+00:00", "EventTime": "2024-05-21T12:39:31.805456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEx705hMKqFx4AuVb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 105} +{"Format": "IDEA0", "ID": "3a6489e1-41c1-41bc-998b-752229213d97", "DetectTime": "2024-05-21T12:39:31.842212+00:00", "EventTime": "2024-05-21T12:39:31.842235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCv7Q1wBVR18CK7M1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 105} +{"Format": "Json", "ID": "3a6489e1-41c1-41bc-998b-752229213d97", "DetectTime": "2024-05-21T12:39:31.842212+00:00", "EventTime": "2024-05-21T12:39:31.842235+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-05T08:02:23.936960+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2024/05/21 12:39:32.077137)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 105, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "5973a101-70ab-4216-a62d-55922ec3b9b2", "DetectTime": "2024-05-21T12:39:32.180931+00:00", "EventTime": "2024-05-21T12:39:32.180952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgvyr4LC0Py2vWaej"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "0672f741-f1d5-4e14-9c63-c042ab0488f9", "DetectTime": "2024-05-21T12:39:32.186076+00:00", "EventTime": "2024-05-21T12:39:32.186096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPynpO1LrcIl7DIJi7"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "f450fc98-1970-422d-be85-0c30fb5a5662", "DetectTime": "2024-05-21T12:39:32.205369+00:00", "EventTime": "2024-05-21T12:39:32.205386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbD1oG9GMbxfccHu"], "accumulated_threat_level": 1.6, "timewindow": 105} +{"Format": "IDEA0", "ID": "a3690e12-ea18-4318-9de2-6358a63c7218", "DetectTime": "2024-05-21T12:39:32.260660+00:00", "EventTime": "2024-05-21T12:39:32.260681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgNcQmsjDfAoPNZjc"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "671c9ca3-0425-4e7a-a6b1-0e1d18fb36d6", "DetectTime": "2024-05-21T12:39:32.298934+00:00", "EventTime": "2024-05-21T12:39:32.298953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO1yFE4QwAzjdmWkq7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 105} +{"Format": "IDEA0", "ID": "298a62f6-d4ea-4f9e-8adc-6a91f04579e2", "DetectTime": "2024-05-21T12:39:32.342889+00:00", "EventTime": "2024-05-21T12:39:32.342911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo6Wb3WZHlQ92LT5e"], "accumulated_threat_level": 3.2, "timewindow": 105} +{"Format": "IDEA0", "ID": "5cc08386-dcc3-4cba-9850-2863bb305694", "DetectTime": "2024-05-21T12:39:32.409270+00:00", "EventTime": "2024-05-21T12:39:32.409291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofSi93PzhdM2PM232"], "accumulated_threat_level": 4.0, "timewindow": 105} +{"Format": "IDEA0", "ID": "7e6d5561-0a02-4051-a7ec-f391a2c86064", "DetectTime": "2024-05-21T12:39:32.458384+00:00", "EventTime": "2024-05-21T12:39:32.458403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkgUYT26xr2i6l3zBf"], "accumulated_threat_level": 4.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "ef656684-5b9d-4bb8-9420-dd600b30269e", "DetectTime": "2024-05-21T12:39:32.493284+00:00", "EventTime": "2024-05-21T12:39:32.493308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvt7BcfjlhT1XAaKk"], "accumulated_threat_level": 5.6, "timewindow": 105} +{"Format": "IDEA0", "ID": "fc6ef1fa-0a2f-4b5f-97e0-a9e6736514f8", "DetectTime": "2024-05-21T12:39:32.537551+00:00", "EventTime": "2024-05-21T12:39:32.537572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENzGw2kDRGU1rlXv8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 105} +{"Format": "IDEA0", "ID": "dc3e7208-684c-4c42-a5a5-c67ac834ca56", "DetectTime": "2024-05-21T12:39:32.543222+00:00", "EventTime": "2024-05-21T12:39:32.543240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccxnx63J18NVPlWRoj", "CGCY2hWP3yUGCAoYk", "CAIIbC2rkyJfdalDol", "C503DC3vGdKJR7DNW7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 105} +{"Format": "IDEA0", "ID": "707b0534-ceee-4fa0-bb20-143150d5df23", "DetectTime": "2024-05-21T12:39:32.579811+00:00", "EventTime": "2024-05-21T12:39:32.579829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfyBwMJ0KyNvxljSh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 105} +{"Format": "IDEA0", "ID": "6ed4c98d-765c-48d8-b3ff-d751c137fce5", "DetectTime": "2024-05-21T12:39:32.620270+00:00", "EventTime": "2024-05-21T12:39:32.620292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYG0rJ3GehMMkVIKwd"], "accumulated_threat_level": 8.5, "timewindow": 105} +{"Format": "IDEA0", "ID": "7a891a2a-d534-4828-84eb-edf57c33e884", "DetectTime": "2024-05-21T12:39:32.662762+00:00", "EventTime": "2024-05-21T12:39:32.662785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6q1qK3HXdnI9P3H52"], "accumulated_threat_level": 9.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "bd551ed2-7ff9-4c1b-969c-5560399f4bd5", "DetectTime": "2024-05-21T12:39:32.910043+00:00", "EventTime": "2024-05-21T12:39:32.910068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXyg9q32ViLyfL6IRc"], "accumulated_threat_level": 10.100000000000001, "timewindow": 105} +{"Format": "IDEA0", "ID": "76d301e7-b186-4ce4-96db-7f9f7bcedb00", "DetectTime": "2024-05-21T12:39:32.949928+00:00", "EventTime": "2024-05-21T12:39:32.949950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvK3CF40biHZlJlTse"], "accumulated_threat_level": 10.900000000000002, "timewindow": 105} +{"Format": "IDEA0", "ID": "09bf6053-b161-41eb-97b6-ddb24bb75700", "DetectTime": "2024-05-21T12:39:33.003597+00:00", "EventTime": "2024-05-21T12:39:33.003621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGDqk2BTYzY9oB822"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "01adb271-6bf9-49f0-9d5a-eef4b87ff4a5", "DetectTime": "2024-05-21T12:39:33.047918+00:00", "EventTime": "2024-05-21T12:39:33.047939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.58.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFe1D39N0qyw8ltGb"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "9e43f06f-b786-4b5c-ae8d-b64375a2f2e3", "DetectTime": "2024-05-21T12:39:33.099131+00:00", "EventTime": "2024-05-21T12:39:33.099149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B6gi3rSp2lmMG3cb"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "aac0f5fc-bb43-4aaa-94d2-1650ca9a555c", "DetectTime": "2024-05-21T12:39:33.110934+00:00", "EventTime": "2024-05-21T12:39:33.110953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8pam22EN73xJNuVd"], "accumulated_threat_level": 11.700000000000003, "timewindow": 105} +{"Format": "IDEA0", "ID": "ac8355de-9ce1-4807-b662-ccf4dfcdf0b4", "DetectTime": "2024-05-21T12:39:33.167061+00:00", "EventTime": "2024-05-21T12:39:33.167081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPe6kk1VcF7Mmqi0Qa"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "83c019a9-29fe-4874-8ff4-6e3d056a267f", "DetectTime": "2024-05-21T12:39:33.207255+00:00", "EventTime": "2024-05-21T12:39:33.207274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crm9jy1Z98pwY4cDh4"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "95e8ccac-e7a1-4a1d-81d4-7df9cc7bf420", "DetectTime": "2024-05-21T12:39:33.283225+00:00", "EventTime": "2024-05-21T12:39:33.283244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"]}], "Attach": [{"Content": "Connection to unknown destination port 27555/TCP destination IP 77.50.112.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQdzeK2IotxIhOLyE"], "accumulated_threat_level": 12.500000000000004, "timewindow": 105} +{"Format": "Json", "ID": "95e8ccac-e7a1-4a1d-81d4-7df9cc7bf420", "DetectTime": "2024-05-21T12:39:33.283225+00:00", "EventTime": "2024-05-21T12:39:33.283244+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["77.50.112.98"]}], "Attach": [{"Content": "1970-01-05T08:14:16.931712+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2024/05/21 12:39:33.708264)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 105, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "895a9c0b-0484-4502-a46f-482ff4855cfc", "DetectTime": "2024-05-21T12:39:33.724714+00:00", "EventTime": "2024-05-21T12:39:33.724732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.48.220.55"]}], "Attach": [{"Content": "Connection to unknown destination port 23394/TCP destination IP 46.48.220.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDp8dC2kChefUfTfm8"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "0565a55a-3ad5-4fdc-818f-1c658a554509", "DetectTime": "2024-05-21T12:39:33.766037+00:00", "EventTime": "2024-05-21T12:39:33.766058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLd403MQ3Hxd80O67"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "408e4c75-18b2-493b-ac7d-b8e099a46a5e", "DetectTime": "2024-05-21T12:39:33.798326+00:00", "EventTime": "2024-05-21T12:39:33.798346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcjTH3xmmlspdz27c"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "82b0b006-2e22-4a5e-9970-bcaa556d6ed3", "DetectTime": "2024-05-21T12:39:33.813459+00:00", "EventTime": "2024-05-21T12:39:33.813488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcjTH3xmmlspdz27c"], "accumulated_threat_level": 4.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "25d0f81c-22c8-46a5-a3d3-d6d2193c7e7a", "DetectTime": "2024-05-21T12:39:33.828289+00:00", "EventTime": "2024-05-21T12:39:33.828309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvMxno1rrmtVbS6PA5"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "8ef91ce8-0298-44aa-8fd9-6ad588c6a238", "DetectTime": "2024-05-21T12:39:33.868021+00:00", "EventTime": "2024-05-21T12:39:33.868042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeSDvuZdoGGIZs77"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "41f08528-d75a-449c-b228-0351fcbc3cdf", "DetectTime": "2024-05-21T12:39:33.909043+00:00", "EventTime": "2024-05-21T12:39:33.909060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCbEeYxspkokYui7"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "a3086f11-f757-4c77-add4-6b04d538557e", "DetectTime": "2024-05-21T12:39:33.965236+00:00", "EventTime": "2024-05-21T12:39:33.965254+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.4.149.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWXl33Ltcm2O4Zq91"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "b513e9e5-e4cf-48f9-b2e4-9283b34d1022", "DetectTime": "2024-05-21T12:39:33.970159+00:00", "EventTime": "2024-05-21T12:39:33.970176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkXJ1i4KHolYR9LFje"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "ca4d491c-7acf-4552-8b75-70fbd570b35d", "DetectTime": "2024-05-21T12:39:33.983534+00:00", "EventTime": "2024-05-21T12:39:33.983569+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.4.149.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.4.149.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWXl33Ltcm2O4Zq91"], "accumulated_threat_level": 5.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "15c1741b-a11c-4486-a71c-d605647baf2e", "DetectTime": "2024-05-21T12:39:33.996415+00:00", "EventTime": "2024-05-21T12:39:33.996435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce4NKa2GSwNqUMGiqf"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "2f04d57d-651f-48d6-ad5f-1a8e5e0e3401", "DetectTime": "2024-05-21T12:39:34.293685+00:00", "EventTime": "2024-05-21T12:39:34.293707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNo1sDjEYKM5BfdU3"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "6153de7b-8117-472d-9834-96ae3bbcf748", "DetectTime": "2024-05-21T12:39:34.453678+00:00", "EventTime": "2024-05-21T12:39:34.453702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIG1r1F9OpRnSddeb"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "bc22fdf1-c8e1-4c94-9591-01cc8a1da829", "DetectTime": "2024-05-21T12:39:34.495191+00:00", "EventTime": "2024-05-21T12:39:34.495214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDtd245r2On76zH6"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "8476676f-3139-4a1e-8c63-f9177b605164", "DetectTime": "2024-05-21T12:39:34.538276+00:00", "EventTime": "2024-05-21T12:39:34.538301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuvLUj4zy2IPOtbAtc"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "1d3fe6a2-5825-4d54-ba19-7c456dea3cc5", "DetectTime": "2024-05-21T12:39:34.771394+00:00", "EventTime": "2024-05-21T12:39:34.771415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTtccU1yjKLYuISNa3", "CXHp5O3bspWm2N20dk", "CsAGSp2A6ETepkPkEh", "CcwuAG2KBoJhH5gTTe"], "accumulated_threat_level": 1.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "b6e1df1a-6a05-4694-874d-4f168913cedf", "DetectTime": "2024-05-21T12:39:34.782546+00:00", "EventTime": "2024-05-21T12:39:34.782568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQt1mO6LJnwqShZj"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "37954116-d9de-47a9-b79f-a3764d811e5d", "DetectTime": "2024-05-21T12:39:34.940349+00:00", "EventTime": "2024-05-21T12:39:34.940370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8beLa1nncJw1xtJEe"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "d28e42ec-8cbe-480f-b236-f23e0ee4b24f", "DetectTime": "2024-05-21T12:39:35.034907+00:00", "EventTime": "2024-05-21T12:39:35.034928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHruQj40czuyGDn5v9"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "ad137961-a1e6-4091-b015-79f14b2cf859", "DetectTime": "2024-05-21T12:39:35.077860+00:00", "EventTime": "2024-05-21T12:39:35.077881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQuIe2SfqWMvtgxW3"], "accumulated_threat_level": 2.1, "timewindow": 105} +{"Format": "IDEA0", "ID": "83922abf-2952-4a1c-99b6-a7c068843b26", "DetectTime": "2024-05-21T12:39:35.108608+00:00", "EventTime": "2024-05-21T12:39:35.108629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9N6clFXONjohpr5"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "4552f2f1-c3c0-491c-bde4-66a3c3b258fc", "DetectTime": "2024-05-21T12:39:35.153553+00:00", "EventTime": "2024-05-21T12:39:35.153574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdBSS1B2z2gKvSt7j"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "0a4f27c8-4b2d-4804-aa6c-80f2f96cbd7d", "DetectTime": "2024-05-21T12:39:35.409284+00:00", "EventTime": "2024-05-21T12:39:35.409303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxuOcq3IXFsfrweT5b"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "fdb774ca-fcb2-479d-ab97-23f6b2b8b5c5", "DetectTime": "2024-05-21T12:39:35.472171+00:00", "EventTime": "2024-05-21T12:39:35.472195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMWat1FQM29ITe6Pa"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "8b80c8c1-180c-402c-b294-3d59a32e6ada", "DetectTime": "2024-05-21T12:39:35.517886+00:00", "EventTime": "2024-05-21T12:39:35.517908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZOynV1oPUXzPw7Y2l"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "04e23b55-942b-4789-9c87-07f2023cd2e5", "DetectTime": "2024-05-21T12:39:35.559328+00:00", "EventTime": "2024-05-21T12:39:35.559348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwIWdC98ilRqfTk"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "79cd94d4-f29e-4af8-b41d-73b395588ee2", "DetectTime": "2024-05-21T12:39:35.820883+00:00", "EventTime": "2024-05-21T12:39:35.820906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOvKC17R0B1GPUxx9"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "e41e7607-2616-4308-b934-7d08d9965854", "DetectTime": "2024-05-21T12:39:35.827706+00:00", "EventTime": "2024-05-21T12:39:35.827725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFYv4b12gReMYBMl"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "48fbae0d-b9ba-473f-a47d-1fc56e00bb33", "DetectTime": "2024-05-21T12:39:35.832208+00:00", "EventTime": "2024-05-21T12:39:35.832226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWNoa3n1Dqjj9oC1b"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "c3492b81-1855-4b34-bb3d-f83c26eefc1f", "DetectTime": "2024-05-21T12:39:35.910694+00:00", "EventTime": "2024-05-21T12:39:35.910715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDKahA2U1JxfRfQuf4"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "548ef8f7-a32c-4341-92ee-dd7b47d2d5c4", "DetectTime": "2024-05-21T12:39:36.001330+00:00", "EventTime": "2024-05-21T12:39:36.001351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwS8221nlVigt4pSB5"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "1fb4e1f2-8c0b-4c15-b9d4-3ceb1fcd0ea4", "DetectTime": "2024-05-21T12:39:36.058434+00:00", "EventTime": "2024-05-21T12:39:36.058453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsO0W1bgRnot3lali"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "b39be438-729d-4768-b2b3-e57e1cdb0210", "DetectTime": "2024-05-21T12:39:36.107961+00:00", "EventTime": "2024-05-21T12:39:36.107984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjDrbv2ApdRfgv2lAa"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "bd8dc01f-0c46-42f1-9e30-547328f7e9a6", "DetectTime": "2024-05-21T12:39:36.143033+00:00", "EventTime": "2024-05-21T12:39:36.143055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIsRFV1gxMKuOeBrPg"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "1484f6bd-21d9-4fc3-99e5-06d88d320621", "DetectTime": "2024-05-21T12:39:36.185846+00:00", "EventTime": "2024-05-21T12:39:36.185869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CruUgv4bqIbUrnoQm5"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "033e9ff4-8c37-426b-b01e-c9925a3cf617", "DetectTime": "2024-05-21T12:39:36.494821+00:00", "EventTime": "2024-05-21T12:39:36.494842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUTE3B4OmAbl9EwiH7"], "accumulated_threat_level": 3.2, "timewindow": 103} +{"Format": "IDEA0", "ID": "dbfd484c-2a76-441a-a4d8-396dca9a568c", "DetectTime": "2024-05-21T12:39:36.525636+00:00", "EventTime": "2024-05-21T12:39:36.525656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.214.0.19 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg8ic7Qe0sJ5SFMXb"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "b336caed-862a-4bf4-9948-55461d2b215a", "DetectTime": "2024-05-21T12:39:37.081477+00:00", "EventTime": "2024-05-21T12:39:37.081497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fgXthaylZk5oKwe"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 105} +{"Format": "IDEA0", "ID": "eef6fbda-10e0-432d-8eeb-bc5df08a7fcd", "DetectTime": "2024-05-21T12:39:37.199964+00:00", "EventTime": "2024-05-21T12:39:37.199983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDArQH4Q3Cwv5eUy2"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "ff3a8fce-9df1-4802-b4fe-d072b1f3efe6", "DetectTime": "2024-05-21T12:39:37.346422+00:00", "EventTime": "2024-05-21T12:39:37.346440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDQZb3k8iSyr4WGg5"], "accumulated_threat_level": 3.7, "timewindow": 105} +{"Format": "IDEA0", "ID": "fa247bfc-939b-44d2-b1df-9526979aef27", "DetectTime": "2024-05-21T12:39:37.366981+00:00", "EventTime": "2024-05-21T12:39:37.367009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs2KYjG8cUSqnSnwh"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "3d5e01ae-79e2-4ac5-aa33-d215541039af", "DetectTime": "2024-05-21T12:39:37.372821+00:00", "EventTime": "2024-05-21T12:39:37.372841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCS2Y25lu0WCKIwLi"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "7f684db1-3e2f-4553-917b-34cc3f013b78", "DetectTime": "2024-05-21T12:39:37.439605+00:00", "EventTime": "2024-05-21T12:39:37.439625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7DeK3Oz24ot2Zfq3"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "03ab19cb-76ea-4505-9ccf-982a72fff837", "DetectTime": "2024-05-21T12:39:37.486484+00:00", "EventTime": "2024-05-21T12:39:37.486505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXJ1t1rHYfAeBu5f"], "accumulated_threat_level": 4.5, "timewindow": 105} +{"Format": "IDEA0", "ID": "0d143a24-7dc3-4226-b7f8-35e1061c21ad", "DetectTime": "2024-05-21T12:39:37.695237+00:00", "EventTime": "2024-05-21T12:39:37.695260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmKmqf32ssrVCZ4Zc"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "6e6a1813-5d5a-44bb-b289-f8a191d5c003", "DetectTime": "2024-05-21T12:39:37.736531+00:00", "EventTime": "2024-05-21T12:39:37.736552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLAa01ewo619zCtbd"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "55bc432f-94ff-49be-9d81-d3bb3917e0a0", "DetectTime": "2024-05-21T12:39:37.784528+00:00", "EventTime": "2024-05-21T12:39:37.784548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCq5Nf2If96pYX2iH4"], "accumulated_threat_level": 5.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "368261ef-b344-4b20-9e63-af24da41de6a", "DetectTime": "2024-05-21T12:39:37.817063+00:00", "EventTime": "2024-05-21T12:39:37.817084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxXB7b4veZ5sWpk6Wl"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "7584a263-e680-4502-b91f-11e39fb14304", "DetectTime": "2024-05-21T12:39:37.852279+00:00", "EventTime": "2024-05-21T12:39:37.852296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAbX42OdeBFmDbmgc"], "accumulated_threat_level": 6.1, "timewindow": 105} +{"Format": "IDEA0", "ID": "83f52123-c951-40c0-b6be-6d76577cfefe", "DetectTime": "2024-05-21T12:39:37.892391+00:00", "EventTime": "2024-05-21T12:39:37.892409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdlTo322T5HfDOOIc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 105} +{"Format": "IDEA0", "ID": "74e8eca1-ecf9-4311-9e7b-ac55df35fbb8", "DetectTime": "2024-05-21T12:39:37.925567+00:00", "EventTime": "2024-05-21T12:39:37.925587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckwaq8uqGIVuD4Hnl"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "6f5d6af2-edbd-4849-a763-5a394d63294e", "DetectTime": "2024-05-21T12:39:37.964706+00:00", "EventTime": "2024-05-21T12:39:37.964724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS2YHa32xO94fhuKTb"], "accumulated_threat_level": 7.699999999999999, "timewindow": 105} +{"Format": "IDEA0", "ID": "6f495916-d432-4980-8097-ad93140ca615", "DetectTime": "2024-05-21T12:39:38.000492+00:00", "EventTime": "2024-05-21T12:39:38.000513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqZa621N55vD17Ami"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "b0782d63-7090-4b5d-99cc-bac432d2c7c1", "DetectTime": "2024-05-21T12:39:38.039538+00:00", "EventTime": "2024-05-21T12:39:38.039568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2Rdx31aTdGzjT3Pl"], "accumulated_threat_level": 8.5, "timewindow": 105} +{"Format": "IDEA0", "ID": "1cd7e8c5-019b-45f5-9b5b-e498786f5eb3", "DetectTime": "2024-05-21T12:39:38.281953+00:00", "EventTime": "2024-05-21T12:39:38.281972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxl5qY2zL488gcCcHj"], "accumulated_threat_level": 9.3, "timewindow": 105} +{"Format": "IDEA0", "ID": "15258afe-a0f2-4aff-bbf3-921b2ef1e65a", "DetectTime": "2024-05-21T12:39:38.287126+00:00", "EventTime": "2024-05-21T12:39:38.287148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXYgNi3B7Lrx2kkfU2"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "0db6b305-9cfe-45ea-be8b-40cc7e7abdef", "DetectTime": "2024-05-21T12:39:38.351943+00:00", "EventTime": "2024-05-21T12:39:38.351961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRs8t44ZjQHEKphdJi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 105} +{"Format": "IDEA0", "ID": "92e1ad06-8553-4e95-b27f-5d0b4ed80360", "DetectTime": "2024-05-21T12:39:38.394648+00:00", "EventTime": "2024-05-21T12:39:38.394666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYNENUZUq2538l48"], "accumulated_threat_level": 10.900000000000002, "timewindow": 105} +{"Format": "IDEA0", "ID": "b68c99d5-c12d-47d7-8829-a1e2801f5ac3", "DetectTime": "2024-05-21T12:39:38.443164+00:00", "EventTime": "2024-05-21T12:39:38.443181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmDNA2dvtcptzzdV7"], "accumulated_threat_level": 11.700000000000003, "timewindow": 105} +{"Format": "IDEA0", "ID": "99490081-4f75-4be1-bc37-6283ac1fd4c2", "DetectTime": "2024-05-21T12:39:38.486002+00:00", "EventTime": "2024-05-21T12:39:38.486025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQA9611RwIau3wKa7"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "a94f5a35-ebc9-4e62-89ff-8130e900d3eb", "DetectTime": "2024-05-21T12:39:38.497251+00:00", "EventTime": "2024-05-21T12:39:38.497270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXXqI3vFP7fCHWZqf"], "accumulated_threat_level": 12.500000000000004, "timewindow": 105} +{"Format": "Json", "ID": "a94f5a35-ebc9-4e62-89ff-8130e900d3eb", "DetectTime": "2024-05-21T12:39:38.497251+00:00", "EventTime": "2024-05-21T12:39:38.497270+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-05T08:34:40.885783+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2024/05/21 12:39:38.731278)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 105, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "1a94334e-a34f-4556-a7ed-6f55d69fff97", "DetectTime": "2024-05-21T12:39:38.801660+00:00", "EventTime": "2024-05-21T12:39:38.801679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVSKP315Je2NqNucRh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "236524b3-e812-4414-9904-55621a847956", "DetectTime": "2024-05-21T12:39:38.812619+00:00", "EventTime": "2024-05-21T12:39:38.812639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyede3UOqN4yA6X8g"], "accumulated_threat_level": 1.6, "timewindow": 105} +{"Format": "IDEA0", "ID": "22151d25-f3bf-4338-92ad-d00314191549", "DetectTime": "2024-05-21T12:39:38.824471+00:00", "EventTime": "2024-05-21T12:39:38.824492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBeZCJ28XsDshjjh62"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 105} +{"Format": "IDEA0", "ID": "f4f0defc-a2e7-49f1-983c-bb8c4fd1b56c", "DetectTime": "2024-05-21T12:39:39.018605+00:00", "EventTime": "2024-05-21T12:39:39.018627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmPu036cHZCCUXMh3"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "ea342096-bbaf-4973-9d4f-b55c4aec144b", "DetectTime": "2024-05-21T12:39:39.053338+00:00", "EventTime": "2024-05-21T12:39:39.053357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COtMlH1iTkXZzGp1uh"], "accumulated_threat_level": 3.2, "timewindow": 105} +{"Format": "IDEA0", "ID": "52ed0e26-8000-4002-955a-e8b8dcb89c0e", "DetectTime": "2024-05-21T12:39:39.097049+00:00", "EventTime": "2024-05-21T12:39:39.097068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEq5WT2IHe0NFVHg"], "accumulated_threat_level": 4.0, "timewindow": 105} +{"Format": "IDEA0", "ID": "86f21805-0660-4dc8-b79a-ba824efd9d84", "DetectTime": "2024-05-21T12:39:39.140414+00:00", "EventTime": "2024-05-21T12:39:39.140434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEdgr26kNyjTNv9xe"], "accumulated_threat_level": 4.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "d10f4da1-68c6-4cd0-94fe-a6d6ccd38cd5", "DetectTime": "2024-05-21T12:39:39.182198+00:00", "EventTime": "2024-05-21T12:39:39.182218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMDPT16cHeuCmiHMh"], "accumulated_threat_level": 5.6, "timewindow": 105} +{"Format": "IDEA0", "ID": "913f420d-08a5-4c27-ab98-bb64f0df3534", "DetectTime": "2024-05-21T12:39:39.213690+00:00", "EventTime": "2024-05-21T12:39:39.213712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvvrk49O7hUpcEBdi"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "db8fa5b6-d470-4c0b-b267-b9d98d4e98cf", "DetectTime": "2024-05-21T12:39:39.257115+00:00", "EventTime": "2024-05-21T12:39:39.257133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEpoj449xn25CyX0e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 105} +{"Format": "IDEA0", "ID": "f9dfaa72-4648-4aef-8630-fb5787d14511", "DetectTime": "2024-05-21T12:39:39.296508+00:00", "EventTime": "2024-05-21T12:39:39.296528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPHtW2axiJI2qv3Vc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 105} +{"Format": "IDEA0", "ID": "0704063c-0acb-4831-bc7b-fa44ca153782", "DetectTime": "2024-05-21T12:39:39.342801+00:00", "EventTime": "2024-05-21T12:39:39.342818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw154b32EXlKDFQfId"], "accumulated_threat_level": 7.999999999999999, "timewindow": 105} +{"Format": "IDEA0", "ID": "39e0843b-4f89-4252-a6b0-ac5ac248d5ae", "DetectTime": "2024-05-21T12:39:39.384363+00:00", "EventTime": "2024-05-21T12:39:39.384384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzeRI2NNdR2CRouqg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 105} +{"Format": "IDEA0", "ID": "99779009-877e-4db8-8e9b-ab212769bc6a", "DetectTime": "2024-05-21T12:39:39.599436+00:00", "EventTime": "2024-05-21T12:39:39.599455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCjju4MwpyoWUy5J8"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "f200e3e3-f988-4cc6-8c84-2a05feb2eddd", "DetectTime": "2024-05-21T12:39:39.635636+00:00", "EventTime": "2024-05-21T12:39:39.635655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoIGdUP8htU3HRK9"], "accumulated_threat_level": 9.6, "timewindow": 105} +{"Format": "IDEA0", "ID": "f38a7d52-5e6e-4f13-9f46-6f7841df407b", "DetectTime": "2024-05-21T12:39:39.677906+00:00", "EventTime": "2024-05-21T12:39:39.677926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxqZk91qHpfeNqBZG8"], "accumulated_threat_level": 10.4, "timewindow": 105} +{"Format": "IDEA0", "ID": "c9a6bc31-6a0f-46ca-a448-9866d7e6dcfa", "DetectTime": "2024-05-21T12:39:39.710317+00:00", "EventTime": "2024-05-21T12:39:39.710338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9AQt2292cBko2fkLf"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "2c0de0af-4ea8-4b67-b279-a5b7d1ede3eb", "DetectTime": "2024-05-21T12:39:39.746478+00:00", "EventTime": "2024-05-21T12:39:39.746497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHDZu12scoKtnHZT6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 105} +{"Format": "IDEA0", "ID": "f388dd32-778c-4049-8f69-3cfa09877e07", "DetectTime": "2024-05-21T12:39:39.792540+00:00", "EventTime": "2024-05-21T12:39:39.792561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0adG3H5bFaiOz95f"], "accumulated_threat_level": 12.000000000000002, "timewindow": 105} +{"Format": "Json", "ID": "f388dd32-778c-4049-8f69-3cfa09877e07", "DetectTime": "2024-05-21T12:39:39.792540+00:00", "EventTime": "2024-05-21T12:39:39.792561+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-05T08:34:45.338679+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 105. (real time 2024/05/21 12:39:39.995825)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 105, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "820da31d-47a5-4e49-a6b6-aefa9e74fb79", "DetectTime": "2024-05-21T12:39:40.006256+00:00", "EventTime": "2024-05-21T12:39:40.006275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jJd72T6rtmEFg45i"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "e2a185ef-4290-473e-bf49-72f1595cfdea", "DetectTime": "2024-05-21T12:39:40.028554+00:00", "EventTime": "2024-05-21T12:39:40.028576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvNIsr2gV3fZaPuZla"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "58f470bc-1c92-4a4a-9687-2fb98e464788", "DetectTime": "2024-05-21T12:39:40.112308+00:00", "EventTime": "2024-05-21T12:39:40.112328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sV9q3jIoDFXTDk7e", "CXK3YCzyFu2AFcqpb", "CVgXob45PMpAIvQpXc", "CWqkn1x2b9l503Yh6"], "accumulated_threat_level": 0.5, "timewindow": 106} +{"Format": "IDEA0", "ID": "9d963da3-0358-4732-8be7-87cf04ad2dcf", "DetectTime": "2024-05-21T12:39:40.138327+00:00", "EventTime": "2024-05-21T12:39:40.138349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvIb9uFYkx4ZLsCP5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "4283d1bb-c2c8-4f29-aafa-0210d03bd535", "DetectTime": "2024-05-21T12:39:40.181864+00:00", "EventTime": "2024-05-21T12:39:40.181886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzNQ14O8iYUeRSdXe"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "8a7cda79-7c28-457d-b1fb-462342011d0e", "DetectTime": "2024-05-21T12:39:40.374712+00:00", "EventTime": "2024-05-21T12:39:40.374732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["49.49.17.72"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGIRXg1npQ8UsFgPsg"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "9d12bf6f-18a5-4943-a440-da405ff28ff1", "DetectTime": "2024-05-21T12:39:40.387101+00:00", "EventTime": "2024-05-21T12:39:40.387121+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["49.49.17.72"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.49.17.72 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGIRXg1npQ8UsFgPsg"], "accumulated_threat_level": 5.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "98eec037-3cda-415a-894b-fa9d042909c2", "DetectTime": "2024-05-21T12:39:40.430642+00:00", "EventTime": "2024-05-21T12:39:40.430663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7BSD1FLPgg8uDly2"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "b26251b0-0eca-40af-af23-57d6fd7f0958", "DetectTime": "2024-05-21T12:39:40.435484+00:00", "EventTime": "2024-05-21T12:39:40.435503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYkTKD3nqTbIi1hDQh"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "75922b25-ce7a-4a20-9fb1-172f10cc2f8e", "DetectTime": "2024-05-21T12:39:40.520238+00:00", "EventTime": "2024-05-21T12:39:40.520259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVxCv4BYVS88XYczb"], "accumulated_threat_level": 1.3, "timewindow": 106} +{"Format": "IDEA0", "ID": "989d0bb7-3da2-4bfd-ae2c-0469e0256f0b", "DetectTime": "2024-05-21T12:39:40.564866+00:00", "EventTime": "2024-05-21T12:39:40.564883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWoys34UxDP0biFjz"], "accumulated_threat_level": 2.1, "timewindow": 106} +{"Format": "IDEA0", "ID": "d0472b6f-0212-46ff-b0b7-d456a611e33d", "DetectTime": "2024-05-21T12:39:40.618838+00:00", "EventTime": "2024-05-21T12:39:40.618855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRiOcu2yLEn4pXlMWf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 106} +{"Format": "IDEA0", "ID": "96aed1a0-261a-48fb-b418-50e69bc93d72", "DetectTime": "2024-05-21T12:39:40.664839+00:00", "EventTime": "2024-05-21T12:39:40.664859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21UIjtZGkaaOywz3"], "accumulated_threat_level": 3.7, "timewindow": 106} +{"Format": "IDEA0", "ID": "7919e66d-08bc-48d7-b847-171bbc05b9cd", "DetectTime": "2024-05-21T12:39:40.702289+00:00", "EventTime": "2024-05-21T12:39:40.702311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrZiLe2mWhybLMcz1"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "52e9b0c2-1150-477f-99f5-d8061aaf7b34", "DetectTime": "2024-05-21T12:39:40.798082+00:00", "EventTime": "2024-05-21T12:39:40.798101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQvTh7BJpN1AO4Ee"], "accumulated_threat_level": 4.5, "timewindow": 106} +{"Format": "IDEA0", "ID": "1da091e2-29af-4035-89f1-6b597af07478", "DetectTime": "2024-05-21T12:39:40.852726+00:00", "EventTime": "2024-05-21T12:39:40.852746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItOHH32B51BFjqOpd"], "accumulated_threat_level": 5.3, "timewindow": 106} +{"Format": "IDEA0", "ID": "54aaea46-1f76-48cf-ba4f-0d7780f4ed66", "DetectTime": "2024-05-21T12:39:40.886282+00:00", "EventTime": "2024-05-21T12:39:40.886302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBkOh3oxbrojm21t1"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "eb58371e-ad0d-4958-a6e1-83b14f5435aa", "DetectTime": "2024-05-21T12:39:41.111651+00:00", "EventTime": "2024-05-21T12:39:41.111687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIKVPv2ICt1xiN0Roa"], "accumulated_threat_level": 6.1, "timewindow": 106} +{"Format": "IDEA0", "ID": "5facef1d-6ebd-422a-b9e4-f70713864413", "DetectTime": "2024-05-21T12:39:41.146347+00:00", "EventTime": "2024-05-21T12:39:41.146368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFQIP1kocSmTSDkF8"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "8b95c2af-5fbf-4546-83b8-c3e5b8e4cf99", "DetectTime": "2024-05-21T12:39:41.184410+00:00", "EventTime": "2024-05-21T12:39:41.184446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCveS1AtzVTAU1v6c"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 106} +{"Format": "IDEA0", "ID": "a0806699-0e22-4b0c-9dc7-460dceaff548", "DetectTime": "2024-05-21T12:39:41.227793+00:00", "EventTime": "2024-05-21T12:39:41.227829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbT6uaEF71bSippMg"], "accumulated_threat_level": 7.699999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "f3a2fefd-234f-4b22-84f9-5fbded8ddb5b", "DetectTime": "2024-05-21T12:39:41.265212+00:00", "EventTime": "2024-05-21T12:39:41.265233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWGI93ngqIa0NH7f3"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "9ad085a0-179a-4732-8b24-4fd11d753f1b", "DetectTime": "2024-05-21T12:39:41.303238+00:00", "EventTime": "2024-05-21T12:39:41.303259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9JLSi2bOHdr9sTKQk"], "accumulated_threat_level": 8.5, "timewindow": 106} +{"Format": "IDEA0", "ID": "bf1eb946-3bb9-465f-844f-06f2ff3cdda7", "DetectTime": "2024-05-21T12:39:41.334886+00:00", "EventTime": "2024-05-21T12:39:41.334906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7BvDW2SCgNgzQmwI3"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "e4c5767d-3ad6-4887-abc7-cbf9d7d461f1", "DetectTime": "2024-05-21T12:39:41.376613+00:00", "EventTime": "2024-05-21T12:39:41.376630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3XoCG2zqMRbfYHRq4"], "accumulated_threat_level": 9.3, "timewindow": 106} +{"Format": "IDEA0", "ID": "aa4b3d50-36bc-471c-bebd-95f12fb58cce", "DetectTime": "2024-05-21T12:39:41.398901+00:00", "EventTime": "2024-05-21T12:39:41.398921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXIEUw3gWU2jtiS9I"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "9be47e37-b337-4105-8eb9-897b4ba4e106", "DetectTime": "2024-05-21T12:39:41.446074+00:00", "EventTime": "2024-05-21T12:39:41.446097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21JuL16wOWCDj03md"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "c3aac33b-d5aa-4244-8be5-549e9c47b2fd", "DetectTime": "2024-05-21T12:39:41.664223+00:00", "EventTime": "2024-05-21T12:39:41.664245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtVWRg1atwTHP21O6a"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "f639120d-2428-4146-b993-e6ff7924528d", "DetectTime": "2024-05-21T12:39:41.675877+00:00", "EventTime": "2024-05-21T12:39:41.675895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9QQeNtZ5xbnEMXi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 106} +{"Format": "IDEA0", "ID": "e76c98c5-b4d2-4939-b63f-b99333d14525", "DetectTime": "2024-05-21T12:39:41.732354+00:00", "EventTime": "2024-05-21T12:39:41.732374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQYUj2FJLeMqKnCG6"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "1ddc6e66-1bcb-41a1-9c9b-9d8196533867", "DetectTime": "2024-05-21T12:39:41.787539+00:00", "EventTime": "2024-05-21T12:39:41.787568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DoqZ2B5E6ns97B61"], "accumulated_threat_level": 10.900000000000002, "timewindow": 106} +{"Format": "IDEA0", "ID": "e2d428be-cc6d-4398-85f4-7e8abeff9c3b", "DetectTime": "2024-05-21T12:39:41.826969+00:00", "EventTime": "2024-05-21T12:39:41.826990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0PX8838nupkC9ABMi"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "5265a383-8fb9-4613-b3d0-d222b01c5a76", "DetectTime": "2024-05-21T12:39:41.869900+00:00", "EventTime": "2024-05-21T12:39:41.869917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU57Yt24TAtlAQag5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 106} +{"Format": "IDEA0", "ID": "450878d7-90b2-4f55-a0fa-599a9dd78285", "DetectTime": "2024-05-21T12:39:41.895714+00:00", "EventTime": "2024-05-21T12:39:41.895734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPOKC38iJ6PIXFH8g"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "99e1c3e3-a31f-4c8f-b5b9-a62834e25050", "DetectTime": "2024-05-21T12:39:41.975870+00:00", "EventTime": "2024-05-21T12:39:41.975888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueOtD4cT0jkAbqhr3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 106} +{"Format": "Json", "ID": "99e1c3e3-a31f-4c8f-b5b9-a62834e25050", "DetectTime": "2024-05-21T12:39:41.975870+00:00", "EventTime": "2024-05-21T12:39:41.975888+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "1970-01-05T09:05:13.551739+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2024/05/21 12:39:42.202216)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 106, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "4bb663e2-76d8-4037-be28-501f14394a6e", "DetectTime": "2024-05-21T12:39:42.206601+00:00", "EventTime": "2024-05-21T12:39:42.206621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV9CbLVSRCkiENEZg"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "79139b0d-be43-4e48-abf9-a505203075ca", "DetectTime": "2024-05-21T12:39:42.269587+00:00", "EventTime": "2024-05-21T12:39:42.269611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbntnc2svpRLfiCGCj"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "dc2a3e0b-5b41-4ec0-b37a-59ba521e3d75", "DetectTime": "2024-05-21T12:39:42.324983+00:00", "EventTime": "2024-05-21T12:39:42.325004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LJuP8EJ6GxoUuQ5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "6d6ef06f-852b-46ea-b318-f12bfc13a132", "DetectTime": "2024-05-21T12:39:42.342097+00:00", "EventTime": "2024-05-21T12:39:42.342116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXn3cf9PJLOuirMra"], "accumulated_threat_level": 0.8, "timewindow": 106} +{"Format": "IDEA0", "ID": "c6e03178-0b7f-4789-b6b9-80c6cbacb9f0", "DetectTime": "2024-05-21T12:39:42.377011+00:00", "EventTime": "2024-05-21T12:39:42.377034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJour1hmPAGHfyZmk"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "af14c873-578d-4304-a9ef-68601948c8b3", "DetectTime": "2024-05-21T12:39:42.404855+00:00", "EventTime": "2024-05-21T12:39:42.404879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNJK1w4Zfu0Wlz3vr6"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "fe25f513-1b68-4b2e-b138-6fa7a7e6c246", "DetectTime": "2024-05-21T12:39:42.410068+00:00", "EventTime": "2024-05-21T12:39:42.410087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wrUr22gJSrQdsDle"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "e9a8ff42-6c8b-4239-9702-8b437586269c", "DetectTime": "2024-05-21T12:39:42.414796+00:00", "EventTime": "2024-05-21T12:39:42.414821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8YgP38WTdObSzkY7"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "89d0acba-fd5d-49c0-a888-754aac168168", "DetectTime": "2024-05-21T12:39:42.557338+00:00", "EventTime": "2024-05-21T12:39:42.557362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQV2384yrhv14Tr2R5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "bc92e610-5b4f-452d-aafa-904954b1a8ca", "DetectTime": "2024-05-21T12:39:42.600502+00:00", "EventTime": "2024-05-21T12:39:42.600523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJW6Ml2k0XhEYZ5HSc"], "accumulated_threat_level": 1.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "5e6ef1a2-82f7-43c3-afca-06d18756e902", "DetectTime": "2024-05-21T12:39:42.605976+00:00", "EventTime": "2024-05-21T12:39:42.605994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jVG42vX5GBkbN7bb"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "2466a565-adb6-4297-b832-7129cb411ad8", "DetectTime": "2024-05-21T12:39:42.610330+00:00", "EventTime": "2024-05-21T12:39:42.610348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZhqb1B1PluyRKskd"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "fa37344a-5a28-472d-bbbc-ab2d7ae5c35e", "DetectTime": "2024-05-21T12:39:42.638106+00:00", "EventTime": "2024-05-21T12:39:42.638127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHUBpjhbswqdvBZ2"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "cbc98b83-d470-4873-b93d-ffe8ce7537aa", "DetectTime": "2024-05-21T12:39:42.958953+00:00", "EventTime": "2024-05-21T12:39:42.958973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31SVH3vAaDc1wuLBk"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "748d2804-ebcf-4992-8e33-b97b39b5536b", "DetectTime": "2024-05-21T12:39:42.975106+00:00", "EventTime": "2024-05-21T12:39:42.975127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkcWA4RIsC8gAg9Kb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 106} +{"Format": "IDEA0", "ID": "f288a5c6-1506-4184-947e-c39c1e71af62", "DetectTime": "2024-05-21T12:39:43.002137+00:00", "EventTime": "2024-05-21T12:39:43.002157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceu0VW2lKWZ2zM2kRk"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "2e3ad276-e04e-4897-9ffa-24b7b11b0680", "DetectTime": "2024-05-21T12:39:43.007747+00:00", "EventTime": "2024-05-21T12:39:43.007765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxGxRQD8OyOa7Azh"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "ba684118-44a3-494d-9d03-4f314368ee1c", "DetectTime": "2024-05-21T12:39:43.038529+00:00", "EventTime": "2024-05-21T12:39:43.038550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5HrSb2kVZIqDNzlB6"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "ba86a688-2b26-4a6c-877e-2b1b23c13b79", "DetectTime": "2024-05-21T12:39:43.146107+00:00", "EventTime": "2024-05-21T12:39:43.146130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJd6JM2lYtJqMmPyQ7"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "e23323f3-e714-45e5-8926-fb446ba8f4d9", "DetectTime": "2024-05-21T12:39:43.151050+00:00", "EventTime": "2024-05-21T12:39:43.151069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSyD6849jjmjKFy7cb"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "7e934942-f6ce-4a22-ab7e-dddf995375bb", "DetectTime": "2024-05-21T12:39:43.387952+00:00", "EventTime": "2024-05-21T12:39:43.387971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSwg1D4NIHOW91NvW5"], "accumulated_threat_level": 3.2, "timewindow": 106} +{"Format": "IDEA0", "ID": "5a2afa63-c40b-46f1-b686-a3c95d24a2b4", "DetectTime": "2024-05-21T12:39:43.409327+00:00", "EventTime": "2024-05-21T12:39:43.409348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8vLxDO17mFhywu"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "c89448fa-84f3-4537-9721-f4634a7d0b6a", "DetectTime": "2024-05-21T12:39:43.421129+00:00", "EventTime": "2024-05-21T12:39:43.421151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Eu572pFSUGyAQ6o5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "a6aaff46-a185-46f1-971e-83d359554b98", "DetectTime": "2024-05-21T12:39:43.539913+00:00", "EventTime": "2024-05-21T12:39:43.539934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3S9Jf2FDS4lwiHXJa"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "80711f09-11f3-4814-8988-f34aab7f9d4d", "DetectTime": "2024-05-21T12:39:43.549036+00:00", "EventTime": "2024-05-21T12:39:43.549055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBXrcC22iOODLtsAW4"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "d06379ba-3453-4173-9e25-c3f202e7ef85", "DetectTime": "2024-05-21T12:39:43.554344+00:00", "EventTime": "2024-05-21T12:39:43.554362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ2hi7493uFxS3uGgl"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "0c422ffa-6e62-40dc-99ed-c5d38fe614bd", "DetectTime": "2024-05-21T12:39:43.584724+00:00", "EventTime": "2024-05-21T12:39:43.584744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54hNA14TdMvn0FD5a"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "b905cfb5-fb22-44c7-bc29-59bf0ce6d614", "DetectTime": "2024-05-21T12:39:43.610186+00:00", "EventTime": "2024-05-21T12:39:43.610209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1LPP2qVJq891aUNl"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "d737fc8a-5240-4eaf-8032-ac1cc50db7c3", "DetectTime": "2024-05-21T12:39:43.959642+00:00", "EventTime": "2024-05-21T12:39:43.959661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3HB24395I7Fsn2wL8"], "accumulated_threat_level": 4.0, "timewindow": 106} +{"Format": "IDEA0", "ID": "740c62b6-bd1f-43fb-9b7f-217f1fd77eaa", "DetectTime": "2024-05-21T12:39:44.024608+00:00", "EventTime": "2024-05-21T12:39:44.024629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EIvJ1BNf8p7eo2T5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "1369c1c2-a911-43c3-95f2-428a61b7a0fd", "DetectTime": "2024-05-21T12:39:44.029854+00:00", "EventTime": "2024-05-21T12:39:44.029880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO4sK81CjPd0u5OkMa"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "c0fb57b4-4b7f-4585-9b4e-9004f7abea1d", "DetectTime": "2024-05-21T12:39:44.037121+00:00", "EventTime": "2024-05-21T12:39:44.037140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPkVwA8RDZWq1Bn1"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "bf79053c-cec8-4e21-92f7-e91548c71a7f", "DetectTime": "2024-05-21T12:39:44.042050+00:00", "EventTime": "2024-05-21T12:39:44.042068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YHiy2NMH1YbNMBP4"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "b0f1f8a6-5b4d-4d22-8702-95a41c60f4cb", "DetectTime": "2024-05-21T12:39:44.046508+00:00", "EventTime": "2024-05-21T12:39:44.046526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvugEJi2sZ3DMpbPl"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "02ae850a-5c10-4912-a80b-1863dffb93c9", "DetectTime": "2024-05-21T12:39:44.051873+00:00", "EventTime": "2024-05-21T12:39:44.051893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHrg96sTJy6mf4Xc"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "df5a6aa8-819b-4cda-b4b1-54c99db78c99", "DetectTime": "2024-05-21T12:39:44.056745+00:00", "EventTime": "2024-05-21T12:39:44.056768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS3xD52zlZj5NPj0a6"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "ffbce29a-3486-4760-a7ed-dd23878d901b", "DetectTime": "2024-05-21T12:39:44.247589+00:00", "EventTime": "2024-05-21T12:39:44.247627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ovcY3pltHBh9P964"], "accumulated_threat_level": 4.8, "timewindow": 106} +{"Format": "IDEA0", "ID": "516bf6e4-1c2a-428f-9b1f-4e04d861b2ea", "DetectTime": "2024-05-21T12:39:44.264503+00:00", "EventTime": "2024-05-21T12:39:44.264524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zL2q4Mko3QRslC"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "840119ea-a7e1-411e-8bfd-e3ba1fe1feca", "DetectTime": "2024-05-21T12:39:44.577987+00:00", "EventTime": "2024-05-21T12:39:44.578008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLDAA1peGNyQp6NI5"], "accumulated_threat_level": 3.2, "timewindow": 104} +{"Format": "IDEA0", "ID": "99e3de78-900b-4913-ae08-ad5e54ee93dc", "DetectTime": "2024-05-21T12:39:44.589250+00:00", "EventTime": "2024-05-21T12:39:44.589269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbN1vM5UsJZr1Ju4"], "accumulated_threat_level": 5.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "c86e32b1-9b68-4546-9421-ad17ff80b294", "DetectTime": "2024-05-21T12:39:44.654792+00:00", "EventTime": "2024-05-21T12:39:44.654812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvx56r4rKJj1IHobgl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 106} +{"Format": "IDEA0", "ID": "4d2c0cc1-c069-47e4-8382-a350bd9e42c4", "DetectTime": "2024-05-21T12:39:44.693971+00:00", "EventTime": "2024-05-21T12:39:44.693988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4K4C1BoFY3UOk1H5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "e9d79d4d-60b1-4816-884f-7f02690d86f9", "DetectTime": "2024-05-21T12:39:44.737601+00:00", "EventTime": "2024-05-21T12:39:44.737623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgcOPn14Iyvd2S4gil"], "accumulated_threat_level": 7.999999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "22591135-6555-493c-a5b2-887733044f22", "DetectTime": "2024-05-21T12:39:44.783645+00:00", "EventTime": "2024-05-21T12:39:44.783662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQ1sT2QOVsY871Ux2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "282b397a-08c5-4e04-9aa4-992d54918274", "DetectTime": "2024-05-21T12:39:44.819932+00:00", "EventTime": "2024-05-21T12:39:44.819950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs9nTM28dFzrbCAIjk"], "accumulated_threat_level": 9.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "17e3de05-2fa4-479c-8478-ad06ab34d00b", "DetectTime": "2024-05-21T12:39:44.862835+00:00", "EventTime": "2024-05-21T12:39:44.862858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFQ181AQCWRNmHKXj"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "79ec17e4-e3a9-4589-b251-864f04c77e99", "DetectTime": "2024-05-21T12:39:44.918106+00:00", "EventTime": "2024-05-21T12:39:44.918126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP7iGD2RQvTJ9QhFg3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 106} +{"Format": "IDEA0", "ID": "f389851e-c142-47a5-ad65-d62542bd94ed", "DetectTime": "2024-05-21T12:39:45.267711+00:00", "EventTime": "2024-05-21T12:39:45.267734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBcVH3hSOGK4FWfBb"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "34bf1a8f-db81-4140-a7f7-192cf2170954", "DetectTime": "2024-05-21T12:39:45.273420+00:00", "EventTime": "2024-05-21T12:39:45.273441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8LpW3wIrbhr4yLna"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "c76d8b6d-ce6a-41b6-b0dd-ad5e7c783667", "DetectTime": "2024-05-21T12:39:45.278379+00:00", "EventTime": "2024-05-21T12:39:45.278402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7CQPh4IOyYPK91Dx2"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "bf2e9113-e625-4bc7-9fb7-f818190f8ab5", "DetectTime": "2024-05-21T12:39:45.358335+00:00", "EventTime": "2024-05-21T12:39:45.358356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETXUO3fXQMc73aeye"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "4b2df60c-c2ee-40e7-bd1d-ee95d5adf3f8", "DetectTime": "2024-05-21T12:39:45.363617+00:00", "EventTime": "2024-05-21T12:39:45.363635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83yps45k6OtYujwGe"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "f6774d49-0369-4be6-9cf7-a89ed9ed8dc4", "DetectTime": "2024-05-21T12:39:45.447323+00:00", "EventTime": "2024-05-21T12:39:45.447346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoHwqcF2DUCTRsZh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "13a58295-06b0-4439-90cf-44064d658744", "DetectTime": "2024-05-21T12:39:45.502330+00:00", "EventTime": "2024-05-21T12:39:45.502351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8JHA1U40ItKPB1T1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 106} +{"Format": "Json", "ID": "13a58295-06b0-4439-90cf-44064d658744", "DetectTime": "2024-05-21T12:39:45.502330+00:00", "EventTime": "2024-05-21T12:39:45.502351+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "1970-01-05T09:39:46.140754+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2024/05/21 12:39:45.662528)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 106, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "138e36a3-eb84-4e36-abd4-4d9cfce2a958", "DetectTime": "2024-05-21T12:39:45.666747+00:00", "EventTime": "2024-05-21T12:39:45.666767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIER83vsPvIZbqYch"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "58dd4542-7da8-435e-a26c-2cfdaa651b6b", "DetectTime": "2024-05-21T12:39:45.767816+00:00", "EventTime": "2024-05-21T12:39:45.767835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsmVnu2h6iimXL5Gcc"], "accumulated_threat_level": 0.8, "timewindow": 106} +{"Format": "IDEA0", "ID": "f29e70fa-7f73-499f-9d5b-8a3bdf0747d9", "DetectTime": "2024-05-21T12:39:45.789768+00:00", "EventTime": "2024-05-21T12:39:45.789789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5y3a3tqRpLOmQn7b"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "c1c0482f-a883-4c6a-8153-aa211a44374e", "DetectTime": "2024-05-21T12:39:45.839839+00:00", "EventTime": "2024-05-21T12:39:45.839856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyFsy4uISDxDMNYTi"], "accumulated_threat_level": 1.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "8f1ada81-6d36-405b-8a43-835eb149b45a", "DetectTime": "2024-05-21T12:39:45.896384+00:00", "EventTime": "2024-05-21T12:39:45.896404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBNMv28bKbuA4Dduc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 106} +{"Format": "IDEA0", "ID": "27e4ff87-b576-4e6e-b3f6-ba021b7f04b0", "DetectTime": "2024-05-21T12:39:45.930314+00:00", "EventTime": "2024-05-21T12:39:45.930335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzU7C4Z82jwQbG4pa"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "d8c4afaf-da44-4432-b694-88d6f887b555", "DetectTime": "2024-05-21T12:39:45.974178+00:00", "EventTime": "2024-05-21T12:39:45.974198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84mCy2KuV4MJO8PI8"], "accumulated_threat_level": 3.2, "timewindow": 106} +{"Format": "IDEA0", "ID": "33087491-2f80-4ec3-9e80-33529b43772c", "DetectTime": "2024-05-21T12:39:46.018251+00:00", "EventTime": "2024-05-21T12:39:46.018271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuWQ5g4k4XWpejK28l"], "accumulated_threat_level": 4.0, "timewindow": 106} +{"Format": "IDEA0", "ID": "bfe1387e-d4e5-42ab-839b-65fe92998473", "DetectTime": "2024-05-21T12:39:46.061437+00:00", "EventTime": "2024-05-21T12:39:46.061460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZww7YFsFbdGAUM4e"], "accumulated_threat_level": 4.8, "timewindow": 106} +{"Format": "IDEA0", "ID": "4e3edf6b-670a-4067-bee0-91b3075e92bb", "DetectTime": "2024-05-21T12:39:46.106906+00:00", "EventTime": "2024-05-21T12:39:46.106927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZrhl27NNOy7cs3i1"], "accumulated_threat_level": 5.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "dc0fc821-6477-484f-a45b-a37ea401b41d", "DetectTime": "2024-05-21T12:39:46.149730+00:00", "EventTime": "2024-05-21T12:39:46.149770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3f7tO1aJKUBuzmMU2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 106} +{"Format": "IDEA0", "ID": "b881c481-0cc2-46a8-b362-c661a1725372", "DetectTime": "2024-05-21T12:39:46.378666+00:00", "EventTime": "2024-05-21T12:39:46.378687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4sHCu4AruVv8CTbuh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "50ad07b9-f785-4c01-b6e0-03374af1a491", "DetectTime": "2024-05-21T12:39:46.412411+00:00", "EventTime": "2024-05-21T12:39:46.412431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RVj6pEpEKHxsbKf"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "87e77ba0-cb2e-4dfd-9bc2-eb8ef031c6ee", "DetectTime": "2024-05-21T12:39:46.423835+00:00", "EventTime": "2024-05-21T12:39:46.423854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv3WUJZavBzlFyPwl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "a7e1f254-b024-4aa6-95bc-177492c5f329", "DetectTime": "2024-05-21T12:39:46.487534+00:00", "EventTime": "2024-05-21T12:39:46.487555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwqyew235xhHZsIpe6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "79588aec-73bb-420c-8644-033f3c3c5dea", "DetectTime": "2024-05-21T12:39:46.530545+00:00", "EventTime": "2024-05-21T12:39:46.530565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVGau38Yz0jLfx6S2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "8961035d-1255-4efe-95aa-37690e6614a8", "DetectTime": "2024-05-21T12:39:46.565414+00:00", "EventTime": "2024-05-21T12:39:46.565431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["109.93.140.11"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cBf32o7AHhB7yy5a"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "50a6320a-e5f4-41cd-90a3-ce59db52b884", "DetectTime": "2024-05-21T12:39:46.577270+00:00", "EventTime": "2024-05-21T12:39:46.577288+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["109.93.140.11"]}], "Attach": [{"Content": "connection to blacklisted IP: 109.93.140.11 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cBf32o7AHhB7yy5a"], "accumulated_threat_level": 6.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "ed430559-6715-4df5-bfa9-3b6cda632acb", "DetectTime": "2024-05-21T12:39:46.696387+00:00", "EventTime": "2024-05-21T12:39:46.696412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyruwo1GEMvAXE3KP"], "accumulated_threat_level": 9.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "d66b81ab-764b-428e-9ca9-d89800fd6055", "DetectTime": "2024-05-21T12:39:46.707475+00:00", "EventTime": "2024-05-21T12:39:46.707494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFMnla2M4pIp6zrHra"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "7679176b-6c67-449b-816e-0204bb923297", "DetectTime": "2024-05-21T12:39:46.751502+00:00", "EventTime": "2024-05-21T12:39:46.751520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAA3w16tdGpc71I4b"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "b875f23b-389b-422e-a31f-644e49eefd7a", "DetectTime": "2024-05-21T12:39:46.789141+00:00", "EventTime": "2024-05-21T12:39:46.789159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaYCp354Bjd0uHrF2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 106} +{"Format": "IDEA0", "ID": "9cfa970c-00c7-4fd4-87af-a1e70b541ec6", "DetectTime": "2024-05-21T12:39:46.818649+00:00", "EventTime": "2024-05-21T12:39:46.818671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdwV42PJQrSuODtlb"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "ae7aed60-74d8-4864-937f-cfcf5c2c636e", "DetectTime": "2024-05-21T12:39:47.072742+00:00", "EventTime": "2024-05-21T12:39:47.072763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsPHNl4tjBOFS22qz4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 106} +{"Format": "Json", "ID": "ae7aed60-74d8-4864-937f-cfcf5c2c636e", "DetectTime": "2024-05-21T12:39:47.072742+00:00", "EventTime": "2024-05-21T12:39:47.072763+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-05T09:40:06.775835+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 106. (real time 2024/05/21 12:39:47.282799)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 106, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "501586f5-bcba-45b3-b462-ce9f017298bd", "DetectTime": "2024-05-21T12:39:47.287038+00:00", "EventTime": "2024-05-21T12:39:47.287056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCv7Q1wBVR18CK7M1"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "dbdb810f-7f68-4a7e-9ce7-ff3f47c58f53", "DetectTime": "2024-05-21T12:39:47.291516+00:00", "EventTime": "2024-05-21T12:39:47.291534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEx705hMKqFx4AuVb"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "cd011af4-05c9-4bd9-8946-f4c07eacfe50", "DetectTime": "2024-05-21T12:39:47.296245+00:00", "EventTime": "2024-05-21T12:39:47.296263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEe6Zx3eO8DJTyOFSf"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "87cfb455-4f05-4c33-9732-312cdb0ae332", "DetectTime": "2024-05-21T12:39:47.301559+00:00", "EventTime": "2024-05-21T12:39:47.301576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBgvyr4LC0Py2vWaej"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "88751828-1f50-4b87-ad9a-86256cce3585", "DetectTime": "2024-05-21T12:39:47.313657+00:00", "EventTime": "2024-05-21T12:39:47.313678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYniR14prFYrufe9J6"], "accumulated_threat_level": 0.8, "timewindow": 106} +{"Format": "IDEA0", "ID": "4dfc10e7-16e4-403e-b656-c74d782c13d8", "DetectTime": "2024-05-21T12:39:47.318751+00:00", "EventTime": "2024-05-21T12:39:47.318770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbD1oG9GMbxfccHu"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "3fadce1c-8d8d-4498-8c60-7d726f327230", "DetectTime": "2024-05-21T12:39:47.323321+00:00", "EventTime": "2024-05-21T12:39:47.323338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRHzpz29NEaFDMbZub"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "5a56c844-4f92-43a4-a283-7f075332e7ca", "DetectTime": "2024-05-21T12:39:47.355503+00:00", "EventTime": "2024-05-21T12:39:47.355522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAPadI3tMkgDdcA0u5"], "accumulated_threat_level": 1.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "d255cc20-594c-4e59-98bc-91a4f2aa3338", "DetectTime": "2024-05-21T12:39:47.375754+00:00", "EventTime": "2024-05-21T12:39:47.375776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO1yFE4QwAzjdmWkq7"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "63c3e9b0-3808-4be4-abca-8198bc0ce68a", "DetectTime": "2024-05-21T12:39:47.653629+00:00", "EventTime": "2024-05-21T12:39:47.653651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo6Wb3WZHlQ92LT5e"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "2ea07843-774c-49f3-80ec-6ac24b40a125", "DetectTime": "2024-05-21T12:39:47.666458+00:00", "EventTime": "2024-05-21T12:39:47.666480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChM0rI2Xk44PAXMykj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 106} +{"Format": "IDEA0", "ID": "d8aab633-6577-43ed-a3a4-266c2b51119b", "DetectTime": "2024-05-21T12:39:47.717382+00:00", "EventTime": "2024-05-21T12:39:47.717407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfyBwMJ0KyNvxljSh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "01026690-470d-4d31-b8ef-4bfb1275029f", "DetectTime": "2024-05-21T12:39:47.723501+00:00", "EventTime": "2024-05-21T12:39:47.723519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofSi93PzhdM2PM232"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "e1c70beb-f24d-47c4-8328-a1de2bddb5ad", "DetectTime": "2024-05-21T12:39:47.727941+00:00", "EventTime": "2024-05-21T12:39:47.727959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENzGw2kDRGU1rlXv8"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "2a171d10-b8e9-45b7-af65-46b1d838774c", "DetectTime": "2024-05-21T12:39:47.737325+00:00", "EventTime": "2024-05-21T12:39:47.737344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZrUd2E5VbM4PP3L9"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "31b7331a-f65f-4d99-9d56-21d0e1757c85", "DetectTime": "2024-05-21T12:39:47.743957+00:00", "EventTime": "2024-05-21T12:39:47.743977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvt7BcfjlhT1XAaKk"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "09775dcd-096f-4279-b3c5-f0a303d6460f", "DetectTime": "2024-05-21T12:39:47.749010+00:00", "EventTime": "2024-05-21T12:39:47.749029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkgUYT26xr2i6l3zBf"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "878e8c2a-6ad0-4f60-8de9-bf1511aaa99a", "DetectTime": "2024-05-21T12:39:48.116489+00:00", "EventTime": "2024-05-21T12:39:48.116512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYG0rJ3GehMMkVIKwd"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "dc76ad28-b1d8-40b2-8784-5b741a3c2f9c", "DetectTime": "2024-05-21T12:39:48.208447+00:00", "EventTime": "2024-05-21T12:39:48.208465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXyg9q32ViLyfL6IRc"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "768d846a-d9ae-4303-8677-2838c9371a37", "DetectTime": "2024-05-21T12:39:48.220242+00:00", "EventTime": "2024-05-21T12:39:48.220260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUEmEh3BPNhPMSyFP2"], "accumulated_threat_level": 3.2, "timewindow": 106} +{"Format": "IDEA0", "ID": "387993be-db29-47c6-b58c-b39a1d9b8180", "DetectTime": "2024-05-21T12:39:48.225023+00:00", "EventTime": "2024-05-21T12:39:48.225041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvK3CF40biHZlJlTse"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "1eb92c5e-d3b1-4d3c-8dd3-f940dba30bfd", "DetectTime": "2024-05-21T12:39:48.230318+00:00", "EventTime": "2024-05-21T12:39:48.230343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6q1qK3HXdnI9P3H52"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "449fe796-a9e9-4c6a-b1a4-56302e229425", "DetectTime": "2024-05-21T12:39:48.396880+00:00", "EventTime": "2024-05-21T12:39:48.396901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8pam22EN73xJNuVd"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "4397106d-6802-4a26-800f-7a7504f1b13c", "DetectTime": "2024-05-21T12:39:48.425306+00:00", "EventTime": "2024-05-21T12:39:48.425328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.50.112.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQdzeK2IotxIhOLyE"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "a540def0-826f-4ca3-9ae5-d941559683c0", "DetectTime": "2024-05-21T12:39:48.469796+00:00", "EventTime": "2024-05-21T12:39:48.469815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNk9v11FBN2KcMDDa"], "accumulated_threat_level": 4.0, "timewindow": 106} +{"Format": "IDEA0", "ID": "4972a9aa-801c-4cff-b90f-b2277dcb2034", "DetectTime": "2024-05-21T12:39:48.506203+00:00", "EventTime": "2024-05-21T12:39:48.506221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyb8ie4fwPFApo9i78"], "accumulated_threat_level": 4.8, "timewindow": 106} +{"Format": "IDEA0", "ID": "1be374ac-d05e-4491-b2cd-695392ad1f86", "DetectTime": "2024-05-21T12:39:48.726210+00:00", "EventTime": "2024-05-21T12:39:48.726231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.48.220.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDp8dC2kChefUfTfm8"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "bebf599a-89e3-454a-b9a1-4ea1c17a3e73", "DetectTime": "2024-05-21T12:39:48.766606+00:00", "EventTime": "2024-05-21T12:39:48.766624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJdR82WGVIv06mnOh"], "accumulated_threat_level": 5.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "8519cc12-79b3-4236-8e67-ca6379b05675", "DetectTime": "2024-05-21T12:39:48.811929+00:00", "EventTime": "2024-05-21T12:39:48.811947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzgXd4fnbd5MnheOa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 106} +{"Format": "IDEA0", "ID": "f9c6276c-c153-429b-b796-53fc4d3b1901", "DetectTime": "2024-05-21T12:39:48.852111+00:00", "EventTime": "2024-05-21T12:39:48.852130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2V263zQKJrbPUwF2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "da02e649-bd8b-46d8-be26-9c64e2ef90e2", "DetectTime": "2024-05-21T12:39:48.900800+00:00", "EventTime": "2024-05-21T12:39:48.900826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYQSW1dPgWRZUEFt2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "7c519e28-3839-48c8-9c81-bb15ef2ac1c7", "DetectTime": "2024-05-21T12:39:48.931410+00:00", "EventTime": "2024-05-21T12:39:48.931433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.60.50.180 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwhy9h4LaRb89FKek"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "d4c04514-8e4f-4c78-95db-b6a5edf77182", "DetectTime": "2024-05-21T12:39:48.968284+00:00", "EventTime": "2024-05-21T12:39:48.968306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYTBG37ycvXRbHWeg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 106} +{"Format": "IDEA0", "ID": "c3e29571-2190-4799-9166-458e5ef2d362", "DetectTime": "2024-05-21T12:39:49.010866+00:00", "EventTime": "2024-05-21T12:39:49.010888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGzDLL1r2GvGayG2Ub"], "accumulated_threat_level": 9.6, "timewindow": 106} +{"Format": "IDEA0", "ID": "4f6d24c1-f9a5-4842-bdc3-07c1c36a9e7f", "DetectTime": "2024-05-21T12:39:49.064432+00:00", "EventTime": "2024-05-21T12:39:49.064453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV22qw3kk2JotwQ4Za"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "7844e227-5f63-477d-8be1-55b7eaa5a254", "DetectTime": "2024-05-21T12:39:49.155708+00:00", "EventTime": "2024-05-21T12:39:49.155731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCh0U2HwPuBPli0k9"], "accumulated_threat_level": 0.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "7b9c877a-2192-4556-9073-881742c848f6", "DetectTime": "2024-05-21T12:39:49.400942+00:00", "EventTime": "2024-05-21T12:39:49.400961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqyIR1Qe7YswAYyn"], "accumulated_threat_level": 1.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "b71f6087-09a0-4067-9817-93c01614288a", "DetectTime": "2024-05-21T12:39:49.449161+00:00", "EventTime": "2024-05-21T12:39:49.449179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBccrxmgd9mg0V9rb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 107} +{"Format": "IDEA0", "ID": "1e7c6dca-437e-4559-ae4b-45b468863360", "DetectTime": "2024-05-21T12:39:49.496427+00:00", "EventTime": "2024-05-21T12:39:49.496447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0UBA2snD8rLElxp3"], "accumulated_threat_level": 3.2, "timewindow": 107} +{"Format": "IDEA0", "ID": "371e864c-c9a9-459c-ab92-177b715200be", "DetectTime": "2024-05-21T12:39:49.536299+00:00", "EventTime": "2024-05-21T12:39:49.536319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QFtJVvioKmX2SB5"], "accumulated_threat_level": 4.0, "timewindow": 107} +{"Format": "IDEA0", "ID": "30d8d835-a48c-4255-ac74-8d8afc1b57fc", "DetectTime": "2024-05-21T12:39:49.579800+00:00", "EventTime": "2024-05-21T12:39:49.579820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nouu1o9GT9zq60Yl"], "accumulated_threat_level": 4.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "e4b54ae3-aaa4-422d-b74d-e55b85a3eb4b", "DetectTime": "2024-05-21T12:39:49.624594+00:00", "EventTime": "2024-05-21T12:39:49.624618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3VNM30oQF1Wdz6wc"], "accumulated_threat_level": 5.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "cf504dfb-2bde-47dd-8452-5edbe88de651", "DetectTime": "2024-05-21T12:39:49.667532+00:00", "EventTime": "2024-05-21T12:39:49.667553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUmGm1whreVaPEkRc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 107} +{"Format": "IDEA0", "ID": "bab3c590-58c8-4272-b9fd-ff8e41c53667", "DetectTime": "2024-05-21T12:39:49.808925+00:00", "EventTime": "2024-05-21T12:39:49.808944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2Jme1C3He8DiC5L2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "30ffef83-844c-4b3e-9d63-f78d75287021", "DetectTime": "2024-05-21T12:39:49.851630+00:00", "EventTime": "2024-05-21T12:39:49.851649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLK1jG40D6nAPO4qfh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "5b110ee6-5b99-4a17-95eb-1fd8e02ddc34", "DetectTime": "2024-05-21T12:39:49.895381+00:00", "EventTime": "2024-05-21T12:39:49.895401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcxpKn2AghdEcyZQE9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "f482b62a-c310-44a5-80fe-e3cbd83e535e", "DetectTime": "2024-05-21T12:39:50.121253+00:00", "EventTime": "2024-05-21T12:39:50.121276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQuIe2SfqWMvtgxW3"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "097e7abd-bbf9-4ffc-8fc8-3b48bff3a4c8", "DetectTime": "2024-05-21T12:39:50.162780+00:00", "EventTime": "2024-05-21T12:39:50.162800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4U9ekGBR9vwXE5b"], "accumulated_threat_level": 9.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "d24907a1-5283-4de6-942e-b9a6645fa258", "DetectTime": "2024-05-21T12:39:50.185415+00:00", "EventTime": "2024-05-21T12:39:50.185438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.62.240.159 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVZojwNimxLJzme"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "7ac8262f-cbaa-414d-b815-846425f4ebfd", "DetectTime": "2024-05-21T12:39:50.241536+00:00", "EventTime": "2024-05-21T12:39:50.241560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbVnL3fUo6OGbHLV3"], "accumulated_threat_level": 10.4, "timewindow": 107} +{"Format": "IDEA0", "ID": "1cf3b8f4-f77f-45c2-9aca-cfb0fdf3d170", "DetectTime": "2024-05-21T12:39:50.282193+00:00", "EventTime": "2024-05-21T12:39:50.282212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBbLv3L5Gjr9NNUBc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "be2f9517-1113-4dad-aa9a-dbc984c31d4d", "DetectTime": "2024-05-21T12:39:50.329779+00:00", "EventTime": "2024-05-21T12:39:50.329798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXZwECueyvAGMuI0j"], "accumulated_threat_level": 12.000000000000002, "timewindow": 107} +{"Format": "Json", "ID": "be2f9517-1113-4dad-aa9a-dbc984c31d4d", "DetectTime": "2024-05-21T12:39:50.329779+00:00", "EventTime": "2024-05-21T12:39:50.329798+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-05T10:10:35.023064+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2024/05/21 12:39:50.486924)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 107, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5e770eb6-a099-4a8f-906e-c5e78999a1f9", "DetectTime": "2024-05-21T12:39:50.491007+00:00", "EventTime": "2024-05-21T12:39:50.491024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.192.42.213 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4cKx2Skd2xgF0Ixc"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "2444193b-df06-4fb2-81bf-bc51263589f0", "DetectTime": "2024-05-21T12:39:50.503237+00:00", "EventTime": "2024-05-21T12:39:50.503260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NUwA3985xKDgNPS6"], "accumulated_threat_level": 0.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "7f98f35f-1df2-4ddd-abd3-e713131a0676", "DetectTime": "2024-05-21T12:39:50.515111+00:00", "EventTime": "2024-05-21T12:39:50.515130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ8dIl2a4THMSqdYA"], "accumulated_threat_level": 1.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "754d2280-1375-4932-8795-eee7630140db", "DetectTime": "2024-05-21T12:39:50.528549+00:00", "EventTime": "2024-05-21T12:39:50.528570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjPs3TFwYdLfb6V4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 107} +{"Format": "IDEA0", "ID": "08c95e13-aa6c-4d98-87bd-b72e77fb33ae", "DetectTime": "2024-05-21T12:39:50.711014+00:00", "EventTime": "2024-05-21T12:39:50.711034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHt3I2uqub2J8AKsk"], "accumulated_threat_level": 3.2, "timewindow": 107} +{"Format": "IDEA0", "ID": "ffec8bbc-a030-4135-9d36-643ecb7da419", "DetectTime": "2024-05-21T12:39:50.759499+00:00", "EventTime": "2024-05-21T12:39:50.759517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16kTi1NKQUl6tMUyl"], "accumulated_threat_level": 4.0, "timewindow": 107} +{"Format": "IDEA0", "ID": "11962a3b-1be0-4371-a3b4-d17d446d0bc3", "DetectTime": "2024-05-21T12:39:50.795417+00:00", "EventTime": "2024-05-21T12:39:50.795435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuISOM2eg32RaXqeXg"], "accumulated_threat_level": 4.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "7a06a935-289c-4ad8-be6b-2a3f373867f2", "DetectTime": "2024-05-21T12:39:50.835955+00:00", "EventTime": "2024-05-21T12:39:50.835974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmGqm22Ft1xJfOfO2"], "accumulated_threat_level": 5.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "9ff87983-d5aa-43ab-a41d-4a3cd805462c", "DetectTime": "2024-05-21T12:39:50.876898+00:00", "EventTime": "2024-05-21T12:39:50.876917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM3ytXqPjRPvgLOU7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 107} +{"Format": "IDEA0", "ID": "07d8c1ce-6b9a-456f-a486-de97e5f48c81", "DetectTime": "2024-05-21T12:39:50.919843+00:00", "EventTime": "2024-05-21T12:39:50.919861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGe9GX2jQVmdgkOK29"], "accumulated_threat_level": 7.199999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "25d2d383-9f69-49b6-8dd1-616b2ac3fc09", "DetectTime": "2024-05-21T12:39:50.963193+00:00", "EventTime": "2024-05-21T12:39:50.963215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4RF4wVZVrFzSOn"], "accumulated_threat_level": 7.999999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "99ec7777-fdbb-4f52-ae7a-ef51c59a287e", "DetectTime": "2024-05-21T12:39:51.001826+00:00", "EventTime": "2024-05-21T12:39:51.001845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qeE21QAjtbSVkKR"], "accumulated_threat_level": 8.799999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "81ad7c21-5086-4f08-a6e5-b2195e2bc3c3", "DetectTime": "2024-05-21T12:39:51.045132+00:00", "EventTime": "2024-05-21T12:39:51.045151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4i2LU2Amml4199bFe"], "accumulated_threat_level": 9.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "373d0acf-1a85-4dba-b5e6-b3da65942f97", "DetectTime": "2024-05-21T12:39:51.276804+00:00", "EventTime": "2024-05-21T12:39:51.276825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06DsmTb8ANmYzTPd"], "accumulated_threat_level": 10.4, "timewindow": 107} +{"Format": "IDEA0", "ID": "19999720-a301-4a0d-b16b-a39ba78443d2", "DetectTime": "2024-05-21T12:39:51.319537+00:00", "EventTime": "2024-05-21T12:39:51.319568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CguRE2xaaTJMONzh3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "5370722b-fba6-46ed-9312-79c65e51e4b6", "DetectTime": "2024-05-21T12:39:51.385552+00:00", "EventTime": "2024-05-21T12:39:51.385573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZX1S3444Lwqu8Ja1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 107} +{"Format": "Json", "ID": "5370722b-fba6-46ed-9312-79c65e51e4b6", "DetectTime": "2024-05-21T12:39:51.385552+00:00", "EventTime": "2024-05-21T12:39:51.385573+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "1970-01-05T10:19:57.797356+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2024/05/21 12:39:51.542839)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 107, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e6ee067f-06e8-4641-9ac7-51f51b8b1bf4", "DetectTime": "2024-05-21T12:39:51.563682+00:00", "EventTime": "2024-05-21T12:39:51.563699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTqLam1PL80jpSk3Jh"], "accumulated_threat_level": 0.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "0826acd4-95d2-48f6-8a34-71da2dd0b88c", "DetectTime": "2024-05-21T12:39:51.574187+00:00", "EventTime": "2024-05-21T12:39:51.574205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyUkfg1HrfDwra9L34"], "accumulated_threat_level": 1.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "0b54a3e9-1788-45f9-bd31-2cbd7b404b2e", "DetectTime": "2024-05-21T12:39:51.586433+00:00", "EventTime": "2024-05-21T12:39:51.586451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvaex33g2rfXT6tED6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 107} +{"Format": "IDEA0", "ID": "1e26f1b8-f155-481f-ba85-fcb9ff8f3ac6", "DetectTime": "2024-05-21T12:39:51.628007+00:00", "EventTime": "2024-05-21T12:39:51.628028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjqpT2396KgXNofle"], "accumulated_threat_level": 3.2, "timewindow": 107} +{"Format": "IDEA0", "ID": "8bd3c99e-32fd-458e-b853-294295227528", "DetectTime": "2024-05-21T12:39:51.669532+00:00", "EventTime": "2024-05-21T12:39:51.669552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUhpx1bEZqmGPZ78k"], "accumulated_threat_level": 4.0, "timewindow": 107} +{"Format": "IDEA0", "ID": "77921c46-e1d0-4d3e-98a4-5968c93c4212", "DetectTime": "2024-05-21T12:39:51.711557+00:00", "EventTime": "2024-05-21T12:39:51.711577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6NYB1f7hxmwCTYH1"], "accumulated_threat_level": 4.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "339c576f-34f4-421b-ae2e-a0e52b2b7e3b", "DetectTime": "2024-05-21T12:39:51.752898+00:00", "EventTime": "2024-05-21T12:39:51.752918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD20Sb28S8GSZvNroa"], "accumulated_threat_level": 5.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "ce5cface-d1bc-4bc3-a02b-b86678e21560", "DetectTime": "2024-05-21T12:39:51.792949+00:00", "EventTime": "2024-05-21T12:39:51.792968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Eko33aAtPxAlyiVi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 107} +{"Format": "IDEA0", "ID": "fe2fa968-a020-4b13-b0e7-a3b5224dfde7", "DetectTime": "2024-05-21T12:39:52.007018+00:00", "EventTime": "2024-05-21T12:39:52.007039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV4xJV3moj2lYmNR1g"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "455f04d9-e045-4b93-8ee7-4af3270adb0c", "DetectTime": "2024-05-21T12:39:52.046172+00:00", "EventTime": "2024-05-21T12:39:52.046191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C78UE3WRMPJ9ITYQb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "6179456c-6d42-4e86-9a45-72f1a7cd8326", "DetectTime": "2024-05-21T12:39:52.088643+00:00", "EventTime": "2024-05-21T12:39:52.088661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOwab2h0LxQJQ3KHa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "458e7871-184b-48dd-a4a1-b495125f87cb", "DetectTime": "2024-05-21T12:39:52.119727+00:00", "EventTime": "2024-05-21T12:39:52.119750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fgXthaylZk5oKwe"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "df6a43b1-aa1d-428e-bbd5-785b25b10055", "DetectTime": "2024-05-21T12:39:52.162342+00:00", "EventTime": "2024-05-21T12:39:52.162364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPatp3LsXMbecgtX5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "5eb05687-3c25-49a1-8540-27a3ee0114fa", "DetectTime": "2024-05-21T12:39:52.181856+00:00", "EventTime": "2024-05-21T12:39:52.181878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.242.6.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDE8r33wbCMrGcvjqh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "e75e098c-a600-4f9e-b171-305d0cde018f", "DetectTime": "2024-05-21T12:39:52.232325+00:00", "EventTime": "2024-05-21T12:39:52.232343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRW4f2HnHo8oFhBdl"], "accumulated_threat_level": 9.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "548d5eb7-1070-48c1-a48a-a7868a6c9b3c", "DetectTime": "2024-05-21T12:39:52.274760+00:00", "EventTime": "2024-05-21T12:39:52.274778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpZvPSS2y0RJ7VZ5"], "accumulated_threat_level": 10.4, "timewindow": 107} +{"Format": "IDEA0", "ID": "e8c6c86c-dc20-4b46-a557-cbe362193c77", "DetectTime": "2024-05-21T12:39:52.323148+00:00", "EventTime": "2024-05-21T12:39:52.323170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGoU12XtIBWzedkli"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "cb4ace7e-3e83-44ed-8b77-b2c6dbaeb8d6", "DetectTime": "2024-05-21T12:39:52.360506+00:00", "EventTime": "2024-05-21T12:39:52.360524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCRTg364E2e72Mbal"], "accumulated_threat_level": 12.000000000000002, "timewindow": 107} +{"Format": "Json", "ID": "cb4ace7e-3e83-44ed-8b77-b2c6dbaeb8d6", "DetectTime": "2024-05-21T12:39:52.360506+00:00", "EventTime": "2024-05-21T12:39:52.360524+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "1970-01-05T10:41:22.316075+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 107. (real time 2024/05/21 12:39:52.540863)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 107, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "87cfa17c-1065-4a03-ba4a-72d57ecf191d", "DetectTime": "2024-05-21T12:39:52.682137+00:00", "EventTime": "2024-05-21T12:39:52.682158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDQZb3k8iSyr4WGg5"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "6a384318-19ba-40ea-a4d2-ddbe72563a33", "DetectTime": "2024-05-21T12:39:52.727032+00:00", "EventTime": "2024-05-21T12:39:52.727052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQi8L3aNe6sHwq9Kb"], "accumulated_threat_level": 0.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "4d3f074b-b221-430c-b3be-327d0947d57a", "DetectTime": "2024-05-21T12:39:52.749195+00:00", "EventTime": "2024-05-21T12:39:52.749217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXJ1t1rHYfAeBu5f"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "474682f0-4a13-4695-9d7a-9e22f0ebd4c9", "DetectTime": "2024-05-21T12:39:52.790973+00:00", "EventTime": "2024-05-21T12:39:52.790992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05j4cXJIKYOBcRu2"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "55f93fe9-fb78-4bf8-9fb4-6be39e5e6f6b", "DetectTime": "2024-05-21T12:39:52.829721+00:00", "EventTime": "2024-05-21T12:39:52.829740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziMbg3sA4lHP6mbg"], "accumulated_threat_level": 1.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "152985e3-973d-4477-bc51-41ea782c30bc", "DetectTime": "2024-05-21T12:39:52.858729+00:00", "EventTime": "2024-05-21T12:39:52.858750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCq5Nf2If96pYX2iH4"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "26cfdec3-d0a4-4e3e-a16c-4923c5372410", "DetectTime": "2024-05-21T12:39:52.900673+00:00", "EventTime": "2024-05-21T12:39:52.900693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAbX42OdeBFmDbmgc"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "1661796f-5376-49ea-a472-fdc0d73da3b1", "DetectTime": "2024-05-21T12:39:52.911990+00:00", "EventTime": "2024-05-21T12:39:52.912008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZGZA4fMggTAeJf7j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 107} +{"Format": "IDEA0", "ID": "0a87c4b6-0f2b-4041-a4ee-9c07f9e88885", "DetectTime": "2024-05-21T12:39:52.967022+00:00", "EventTime": "2024-05-21T12:39:52.967043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdlTo322T5HfDOOIc"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "452911ad-6488-42ec-ac95-b3cfe586599d", "DetectTime": "2024-05-21T12:39:53.207830+00:00", "EventTime": "2024-05-21T12:39:53.207848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XoK21NV13bFXsj62"], "accumulated_threat_level": 3.2, "timewindow": 107} +{"Format": "IDEA0", "ID": "d259a7fb-7770-4cd3-81a4-4bd0d2a2254c", "DetectTime": "2024-05-21T12:39:53.213360+00:00", "EventTime": "2024-05-21T12:39:53.213383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS2YHa32xO94fhuKTb"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "2ee71f7f-f5cd-45cc-9e01-d9d455542d53", "DetectTime": "2024-05-21T12:39:53.279796+00:00", "EventTime": "2024-05-21T12:39:53.279817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZqmUSbDhiHeuqxd"], "accumulated_threat_level": 4.0, "timewindow": 107} +{"Format": "IDEA0", "ID": "e73c6fcb-7cd7-4da7-8622-87c7bdc27063", "DetectTime": "2024-05-21T12:39:53.284634+00:00", "EventTime": "2024-05-21T12:39:53.284651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2Rdx31aTdGzjT3Pl"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "a4d154be-f7d5-4bd5-8ac1-a2174a0e57f1", "DetectTime": "2024-05-21T12:39:53.343018+00:00", "EventTime": "2024-05-21T12:39:53.343037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxl5qY2zL488gcCcHj"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "3415608a-523e-422f-90d5-0a036e13d59c", "DetectTime": "2024-05-21T12:39:53.355057+00:00", "EventTime": "2024-05-21T12:39:53.355079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch7Iac1wRSayq9S2Gl"], "accumulated_threat_level": 4.8, "timewindow": 107} +{"Format": "IDEA0", "ID": "158828fe-588c-4eb9-b05f-25f013c44df6", "DetectTime": "2024-05-21T12:39:53.411929+00:00", "EventTime": "2024-05-21T12:39:53.411949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRs8t44ZjQHEKphdJi"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "453ff903-7235-4877-ae5e-e56e7b41a106", "DetectTime": "2024-05-21T12:39:53.462779+00:00", "EventTime": "2024-05-21T12:39:53.462807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP17d74ulI4HH0Iaoc"], "accumulated_threat_level": 5.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "0649cbd9-b51b-427a-a645-0ac1800bb7a2", "DetectTime": "2024-05-21T12:39:53.477476+00:00", "EventTime": "2024-05-21T12:39:53.477497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYNENUZUq2538l48"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "ff23f115-1518-4874-bbe0-d93ff78d262f", "DetectTime": "2024-05-21T12:39:53.517963+00:00", "EventTime": "2024-05-21T12:39:53.517984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmDNA2dvtcptzzdV7"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "eb6370cd-9132-4b1c-9081-56e4b7af1500", "DetectTime": "2024-05-21T12:39:53.767161+00:00", "EventTime": "2024-05-21T12:39:53.767179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgyGV28VYM8PGQ4Yj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 107} +{"Format": "IDEA0", "ID": "644f1812-dfa7-41b1-b916-10263d655b47", "DetectTime": "2024-05-21T12:39:53.795478+00:00", "EventTime": "2024-05-21T12:39:53.795500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXXqI3vFP7fCHWZqf"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "6bc4e4b9-cb38-4558-96f1-a3cb56aca411", "DetectTime": "2024-05-21T12:39:53.800490+00:00", "EventTime": "2024-05-21T12:39:53.800509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyede3UOqN4yA6X8g"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "a27baf60-ef6b-4ce6-ae32-57f1774b537b", "DetectTime": "2024-05-21T12:39:53.804939+00:00", "EventTime": "2024-05-21T12:39:53.804958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVSKP315Je2NqNucRh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "eb4850d3-a2c8-48a9-a965-ee74afca9575", "DetectTime": "2024-05-21T12:39:53.902177+00:00", "EventTime": "2024-05-21T12:39:53.902196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyi3bG3eLHKZ3LPYac"], "accumulated_threat_level": 7.199999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "546d4e30-c1be-4ec7-ad8e-be78e7f7caf4", "DetectTime": "2024-05-21T12:39:54.055863+00:00", "EventTime": "2024-05-21T12:39:54.055886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBeZCJ28XsDshjjh62"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "58d0a0e2-db0e-4d88-afc2-1ab697e5f6f6", "DetectTime": "2024-05-21T12:39:54.104440+00:00", "EventTime": "2024-05-21T12:39:54.104460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMmgDuq1Y9wpJzBh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "f45c2884-4e4e-4c72-bc12-ff62d99feb4c", "DetectTime": "2024-05-21T12:39:54.124174+00:00", "EventTime": "2024-05-21T12:39:54.124194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COtMlH1iTkXZzGp1uh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "01175aad-5441-417a-85cb-000d67811bac", "DetectTime": "2024-05-21T12:39:54.165589+00:00", "EventTime": "2024-05-21T12:39:54.165609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEq5WT2IHe0NFVHg"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "fccda829-3307-4317-8a14-6bd3fde1e06f", "DetectTime": "2024-05-21T12:39:54.209822+00:00", "EventTime": "2024-05-21T12:39:54.209841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4vznL3KfPURYI4qXg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 107} +{"Format": "IDEA0", "ID": "6e3e855c-e638-4ac7-83ff-e3e1f5a0b2d8", "DetectTime": "2024-05-21T12:39:54.215114+00:00", "EventTime": "2024-05-21T12:39:54.215135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEdgr26kNyjTNv9xe"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "a73b5574-e7d4-47e3-8f7b-0f6793ea322d", "DetectTime": "2024-05-21T12:39:54.502512+00:00", "EventTime": "2024-05-21T12:39:54.502535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw154b32EXlKDFQfId"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "b2d76954-0ad7-49ec-9e54-c6502a4e70d5", "DetectTime": "2024-05-21T12:39:54.507815+00:00", "EventTime": "2024-05-21T12:39:54.507834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEpoj449xn25CyX0e"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "06d20d32-63a0-4a16-9df1-aca89476b9db", "DetectTime": "2024-05-21T12:39:54.512353+00:00", "EventTime": "2024-05-21T12:39:54.512372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPHtW2axiJI2qv3Vc"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "2cb4f7c6-4df2-439c-b477-225eca65ad0d", "DetectTime": "2024-05-21T12:39:54.526962+00:00", "EventTime": "2024-05-21T12:39:54.526984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMDPT16cHeuCmiHMh"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "e97ad726-7e92-40e8-97f3-a95c2ca45d2f", "DetectTime": "2024-05-21T12:39:54.626178+00:00", "EventTime": "2024-05-21T12:39:54.626197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3kle1q7B1BvivtSc"], "accumulated_threat_level": 9.6, "timewindow": 107} +{"Format": "IDEA0", "ID": "f1237684-4ea0-434f-bd3a-50bf4bfeb2b8", "DetectTime": "2024-05-21T12:39:54.657341+00:00", "EventTime": "2024-05-21T12:39:54.657361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzeRI2NNdR2CRouqg"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "6d378242-ef44-49f2-8b74-a2b7baf61819", "DetectTime": "2024-05-21T12:39:54.701485+00:00", "EventTime": "2024-05-21T12:39:54.701502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiGx6A2jB7fxVp5Iwd"], "accumulated_threat_level": 10.4, "timewindow": 107} +{"Format": "IDEA0", "ID": "97fe1277-0eff-417e-863e-cab06209ee31", "DetectTime": "2024-05-21T12:39:54.706259+00:00", "EventTime": "2024-05-21T12:39:54.706276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoIGdUP8htU3HRK9"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "1ecf8ebe-96c2-49d0-9a0f-63de59fde08b", "DetectTime": "2024-05-21T12:39:54.967670+00:00", "EventTime": "2024-05-21T12:39:54.967692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxqZk91qHpfeNqBZG8"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "d65728e0-c0ab-43fc-bf3e-792d2e988312", "DetectTime": "2024-05-21T12:39:54.972858+00:00", "EventTime": "2024-05-21T12:39:54.972880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0adG3H5bFaiOz95f"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "cb049dcd-5309-4a82-a72b-256e82cc866e", "DetectTime": "2024-05-21T12:39:54.985631+00:00", "EventTime": "2024-05-21T12:39:54.985651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHDZu12scoKtnHZT6"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "63076e36-aa5a-46f5-bb40-69bca1e0cc90", "DetectTime": "2024-05-21T12:39:55.004865+00:00", "EventTime": "2024-05-21T12:39:55.004887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jJd72T6rtmEFg45i"], "accumulated_threat_level": 0.8, "timewindow": 105} +{"Format": "IDEA0", "ID": "afa70ce6-7eb9-4953-af71-b828eb6dae9d", "DetectTime": "2024-05-21T12:39:55.094767+00:00", "EventTime": "2024-05-21T12:39:55.094786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqmNZL1eYmXtVVDmQ3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "d829bdc3-95fb-48ec-8ae5-4086498a01ce", "DetectTime": "2024-05-21T12:39:55.165065+00:00", "EventTime": "2024-05-21T12:39:55.165084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGmlC1PnT2k3up8s4"], "accumulated_threat_level": 0.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "df82def7-14d8-4249-bbfe-02de8bbed1f3", "DetectTime": "2024-05-21T12:39:55.205738+00:00", "EventTime": "2024-05-21T12:39:55.205756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwx55u1ahwXjH9sqkh"], "accumulated_threat_level": 1.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "b8649a21-2031-4685-b677-af940df07629", "DetectTime": "2024-05-21T12:39:55.259231+00:00", "EventTime": "2024-05-21T12:39:55.259249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPSLbt3wFv5WA1Acy2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 108} +{"Format": "IDEA0", "ID": "78a7c0c4-bdc1-4e9f-b491-51bbd4c901ce", "DetectTime": "2024-05-21T12:39:55.289329+00:00", "EventTime": "2024-05-21T12:39:55.289348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDuFsP1pTW9YLp8qj6"], "accumulated_threat_level": 3.2, "timewindow": 108} +{"Format": "IDEA0", "ID": "39cd9c3a-19c4-47c6-bd9c-32782ea9722d", "DetectTime": "2024-05-21T12:39:55.523405+00:00", "EventTime": "2024-05-21T12:39:55.523423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uamG2svbEYqy2Zla"], "accumulated_threat_level": 4.0, "timewindow": 108} +{"Format": "IDEA0", "ID": "f4dc0ef6-cf55-43c1-9911-bb7579c4f230", "DetectTime": "2024-05-21T12:39:55.555688+00:00", "EventTime": "2024-05-21T12:39:55.555710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVxCv4BYVS88XYczb"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "83e2753e-5c9b-46a2-a818-76da25faff8c", "DetectTime": "2024-05-21T12:39:55.592802+00:00", "EventTime": "2024-05-21T12:39:55.592821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzncl1E0y6d6cMyz2"], "accumulated_threat_level": 4.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "207c534f-8a5e-4ae3-a9c5-7cfb9103a30f", "DetectTime": "2024-05-21T12:39:55.631286+00:00", "EventTime": "2024-05-21T12:39:55.631308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWoys34UxDP0biFjz"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "c61de9c4-5f4b-426c-bb1c-1ee7bc7dd74e", "DetectTime": "2024-05-21T12:39:55.668682+00:00", "EventTime": "2024-05-21T12:39:55.668700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXvkj2MHuUhOWSjs"], "accumulated_threat_level": 5.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "a89452fa-8ba7-4d4f-be25-92e55e1aaf3d", "DetectTime": "2024-05-21T12:39:55.715242+00:00", "EventTime": "2024-05-21T12:39:55.715263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRiOcu2yLEn4pXlMWf"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "7416fe52-279a-4776-9900-08dfaabb78df", "DetectTime": "2024-05-21T12:39:55.745231+00:00", "EventTime": "2024-05-21T12:39:55.745254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21UIjtZGkaaOywz3"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "8437144d-9d0c-4f3b-bed2-6a0bb9ab776b", "DetectTime": "2024-05-21T12:39:55.780456+00:00", "EventTime": "2024-05-21T12:39:55.780475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCG1eE1lq5b2XgLIC8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 108} +{"Format": "IDEA0", "ID": "a3090039-96c7-41be-878e-0f6150fb1c46", "DetectTime": "2024-05-21T12:39:55.823963+00:00", "EventTime": "2024-05-21T12:39:55.823982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyyzCOhMvLCvi0Sk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "6c40c860-9846-41c4-b1aa-00a5ef301633", "DetectTime": "2024-05-21T12:39:55.856937+00:00", "EventTime": "2024-05-21T12:39:55.856956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQvTh7BJpN1AO4Ee"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "ee65210f-6672-4915-a5b9-b398cf35359b", "DetectTime": "2024-05-21T12:39:56.092211+00:00", "EventTime": "2024-05-21T12:39:56.092230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7lpG5TpqN83IEq8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "fe434668-9b93-45f7-a6c6-e5274be7cd2c", "DetectTime": "2024-05-21T12:39:56.114523+00:00", "EventTime": "2024-05-21T12:39:56.114545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CItOHH32B51BFjqOpd"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "5734a9f5-5b05-485d-9cc0-cc0f6145e396", "DetectTime": "2024-05-21T12:39:56.153896+00:00", "EventTime": "2024-05-21T12:39:56.153917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIKVPv2ICt1xiN0Roa"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "1da70f12-4066-4c35-af85-186455adb14d", "DetectTime": "2024-05-21T12:39:56.187365+00:00", "EventTime": "2024-05-21T12:39:56.187384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjSXu26zYWiiTeiUk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "77eaa605-b293-4105-b14c-d0bddf88800d", "DetectTime": "2024-05-21T12:39:56.222929+00:00", "EventTime": "2024-05-21T12:39:56.222947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCveS1AtzVTAU1v6c"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "f41c9605-f3b1-48fb-af16-10de5fd74a7e", "DetectTime": "2024-05-21T12:39:56.261325+00:00", "EventTime": "2024-05-21T12:39:56.261346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTO1D21LWdLiwRdkN1"], "accumulated_threat_level": 9.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "0a17ca46-25d5-4424-8089-5bfc1b50679c", "DetectTime": "2024-05-21T12:39:56.292825+00:00", "EventTime": "2024-05-21T12:39:56.292846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbT6uaEF71bSippMg"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "e1f63040-3cd0-42b0-a9ec-8b2d7ee3c9d2", "DetectTime": "2024-05-21T12:39:56.330065+00:00", "EventTime": "2024-05-21T12:39:56.330084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGBKhK3SDp9oGWX9x8"], "accumulated_threat_level": 10.4, "timewindow": 108} +{"Format": "IDEA0", "ID": "490ba4bc-cb8b-4170-ba39-53b2db8a1667", "DetectTime": "2024-05-21T12:39:56.365482+00:00", "EventTime": "2024-05-21T12:39:56.365508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9JLSi2bOHdr9sTKQk"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "ef704f40-5ffc-475b-8d92-7c9021a6b31e", "DetectTime": "2024-05-21T12:39:56.595531+00:00", "EventTime": "2024-05-21T12:39:56.595553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCp9yP12TP8e8JZHPa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 108} +{"Format": "IDEA0", "ID": "072cfec8-c4ac-464f-97e9-aeef7f75b24a", "DetectTime": "2024-05-21T12:39:56.614649+00:00", "EventTime": "2024-05-21T12:39:56.614667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3XoCG2zqMRbfYHRq4"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "29765c58-829a-46e5-9e88-ddc2b364cee7", "DetectTime": "2024-05-21T12:39:56.668366+00:00", "EventTime": "2024-05-21T12:39:56.668385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1tGk3zNmKDeOWDg5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 108} +{"Format": "Json", "ID": "29765c58-829a-46e5-9e88-ddc2b364cee7", "DetectTime": "2024-05-21T12:39:56.668366+00:00", "EventTime": "2024-05-21T12:39:56.668385+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-05T11:11:32.524108+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2024/05/21 12:39:56.831410)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 108, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "02fcadf5-eb2e-4860-bf55-664f8d2aebce", "DetectTime": "2024-05-21T12:39:56.865763+00:00", "EventTime": "2024-05-21T12:39:56.865784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpu7YGx578pUQEpi3"], "accumulated_threat_level": 0.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "735755fb-b862-4187-913d-a37254454f58", "DetectTime": "2024-05-21T12:39:56.870989+00:00", "EventTime": "2024-05-21T12:39:56.871009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9QQeNtZ5xbnEMXi"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "35f85bf7-f11e-434c-a3b5-8b122f5a21f3", "DetectTime": "2024-05-21T12:39:56.881795+00:00", "EventTime": "2024-05-21T12:39:56.881812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrEbzrRhlNxLWUM4"], "accumulated_threat_level": 1.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "bf66b4d9-da43-438d-a321-8d845faf72e3", "DetectTime": "2024-05-21T12:39:56.912442+00:00", "EventTime": "2024-05-21T12:39:56.912471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DoqZ2B5E6ns97B61"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "af96e25d-0c7a-4f19-8052-c9fec626fb1b", "DetectTime": "2024-05-21T12:39:56.917961+00:00", "EventTime": "2024-05-21T12:39:56.917980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2MPvx1Lp7YssjAMOh"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "7eaf7680-afe7-46af-827d-4348bf553545", "DetectTime": "2024-05-21T12:39:56.984421+00:00", "EventTime": "2024-05-21T12:39:56.984440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU57Yt24TAtlAQag5"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "a9b52c05-7813-4e20-8a14-6b497022ffb8", "DetectTime": "2024-05-21T12:39:57.220236+00:00", "EventTime": "2024-05-21T12:39:57.220256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueOtD4cT0jkAbqhr3"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "9edd1599-6bfd-4835-95b6-304a45c4074e", "DetectTime": "2024-05-21T12:39:57.259218+00:00", "EventTime": "2024-05-21T12:39:57.259239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsybzeH7M8duoCdO9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 108} +{"Format": "IDEA0", "ID": "168b7cea-52b1-47b4-ae2a-28e1c438eb3f", "DetectTime": "2024-05-21T12:39:57.303082+00:00", "EventTime": "2024-05-21T12:39:57.303106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpOkG30oWaLzJwze1"], "accumulated_threat_level": 3.2, "timewindow": 108} +{"Format": "IDEA0", "ID": "073ecbad-7fc9-4d47-aeaf-a78f8ea3f7b8", "DetectTime": "2024-05-21T12:39:57.350755+00:00", "EventTime": "2024-05-21T12:39:57.350774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8eL8L3rHsd1NR02l2"], "accumulated_threat_level": 4.0, "timewindow": 108} +{"Format": "IDEA0", "ID": "24e284a8-adc1-4515-978f-20aaff210b0d", "DetectTime": "2024-05-21T12:39:57.388429+00:00", "EventTime": "2024-05-21T12:39:57.388449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzLIylB33XZJ8aJh"], "accumulated_threat_level": 4.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "c60d576e-576c-4ebe-8d27-613a1d6b3de0", "DetectTime": "2024-05-21T12:39:57.431206+00:00", "EventTime": "2024-05-21T12:39:57.431227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOTY910Cyw9ZzOdf1"], "accumulated_threat_level": 5.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "728852dd-1e2f-46f1-90b2-77836107e5af", "DetectTime": "2024-05-21T12:39:57.473511+00:00", "EventTime": "2024-05-21T12:39:57.473529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehtEe3K3gWaF7FhHc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 108} +{"Format": "IDEA0", "ID": "b1d4f9d6-3515-4b7b-8518-32f225740df7", "DetectTime": "2024-05-21T12:39:57.508190+00:00", "EventTime": "2024-05-21T12:39:57.508212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXn3cf9PJLOuirMra"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "c57b86b6-4988-4eed-8de7-a2544b0a5baa", "DetectTime": "2024-05-21T12:39:57.548556+00:00", "EventTime": "2024-05-21T12:39:57.548578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtA7bt2CI777fdwqkj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "32ab7087-79f3-463e-99b6-2ebf8e1f4d47", "DetectTime": "2024-05-21T12:39:57.775229+00:00", "EventTime": "2024-05-21T12:39:57.775251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CncL93pZb2R8CqWS1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "255bf594-374c-4f96-b293-203f6613aaee", "DetectTime": "2024-05-21T12:39:57.817376+00:00", "EventTime": "2024-05-21T12:39:57.817395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApuZolmKJ6KpG6Bj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "eb8adfad-a5f4-4e83-8024-3b3225381465", "DetectTime": "2024-05-21T12:39:57.861165+00:00", "EventTime": "2024-05-21T12:39:57.861184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3Ihp1rfhopL2jBZc"], "accumulated_threat_level": 9.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "a0812b4d-70e3-4fa7-a5ff-fc4d05361eda", "DetectTime": "2024-05-21T12:39:57.908977+00:00", "EventTime": "2024-05-21T12:39:57.908994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNRzPA3u7nseuG1xqf"], "accumulated_threat_level": 10.4, "timewindow": 108} +{"Format": "IDEA0", "ID": "c914f490-f17a-4940-a7f2-78e9de8527e7", "DetectTime": "2024-05-21T12:39:57.935057+00:00", "EventTime": "2024-05-21T12:39:57.935079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJW6Ml2k0XhEYZ5HSc"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "e708f77f-d81e-4161-93f2-2093cddd65b0", "DetectTime": "2024-05-21T12:39:57.973638+00:00", "EventTime": "2024-05-21T12:39:57.973658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkYDYz4X405okRVaS1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 108} +{"Format": "IDEA0", "ID": "8ed43470-45b5-44a4-9ca2-f76f98214708", "DetectTime": "2024-05-21T12:39:58.018098+00:00", "EventTime": "2024-05-21T12:39:58.018117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKPMM1MvzzHXYs8P2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 108} +{"Format": "Json", "ID": "8ed43470-45b5-44a4-9ca2-f76f98214708", "DetectTime": "2024-05-21T12:39:58.018098+00:00", "EventTime": "2024-05-21T12:39:58.018117+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "1970-01-05T11:20:02.650865+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2024/05/21 12:39:58.463152)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 108, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1340b8a5-2c89-46d3-b903-a757605d7c0e", "DetectTime": "2024-05-21T12:39:58.467150+00:00", "EventTime": "2024-05-21T12:39:58.467169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkcWA4RIsC8gAg9Kb"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "7f0ddd1c-23c0-4ed1-a22a-8919c587cf8e", "DetectTime": "2024-05-21T12:39:58.506998+00:00", "EventTime": "2024-05-21T12:39:58.507026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQeS7yN14YVrsZ3Re"], "accumulated_threat_level": 0.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "bf7405b5-1426-4d77-8f17-e261928f0499", "DetectTime": "2024-05-21T12:39:58.521993+00:00", "EventTime": "2024-05-21T12:39:58.522011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRP0A83bTWdviNmTcj"], "accumulated_threat_level": 1.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "790dc663-4e3b-489b-b0fe-8b6cdca307a7", "DetectTime": "2024-05-21T12:39:58.527027+00:00", "EventTime": "2024-05-21T12:39:58.527044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkcXlx2fm3r8cgeAdk", "CDjAuZ1LqYGhas1xy7", "Cst3iX2cZXTAmg98n3", "C8sIPA1SbDqcJOuma1"], "accumulated_threat_level": 0.5, "timewindow": 109} +{"Format": "IDEA0", "ID": "b7f48942-0d48-4ef5-ab5f-4e60372cf6a7", "DetectTime": "2024-05-21T12:39:58.546601+00:00", "EventTime": "2024-05-21T12:39:58.546621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzysdG1alxDR6e3qch"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 108} +{"Format": "IDEA0", "ID": "844220c6-266b-42b8-b96b-f130292422e7", "DetectTime": "2024-05-21T12:39:58.558956+00:00", "EventTime": "2024-05-21T12:39:58.558974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9zJS3Ofchp5CxuOf"], "accumulated_threat_level": 3.2, "timewindow": 108} +{"Format": "IDEA0", "ID": "b1366234-72ea-412e-81b1-281ba3a0027d", "DetectTime": "2024-05-21T12:39:58.591127+00:00", "EventTime": "2024-05-21T12:39:58.591147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSwg1D4NIHOW91NvW5"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "95846ff4-cb34-49e3-afb5-bb7b247dde72", "DetectTime": "2024-05-21T12:39:58.638103+00:00", "EventTime": "2024-05-21T12:39:58.638125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASz45pAbNUvL1R48"], "accumulated_threat_level": 4.0, "timewindow": 108} +{"Format": "IDEA0", "ID": "b44d66af-3271-4170-89d6-04ccd34e90a3", "DetectTime": "2024-05-21T12:39:58.674732+00:00", "EventTime": "2024-05-21T12:39:58.674752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChOEeJB4A92Fisov3"], "accumulated_threat_level": 4.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "58da62d1-79c9-445d-a1c9-41276eff36f2", "DetectTime": "2024-05-21T12:39:58.926697+00:00", "EventTime": "2024-05-21T12:39:58.926719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqLIY1O2N3Xpw2Uii"], "accumulated_threat_level": 5.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "64099e68-957e-406d-8c99-32696b414738", "DetectTime": "2024-05-21T12:39:58.970654+00:00", "EventTime": "2024-05-21T12:39:58.970675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEKMl1xKAmUlaxiLl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 108} +{"Format": "IDEA0", "ID": "e923dc27-90bd-403f-8ebe-5caf76acc7ba", "DetectTime": "2024-05-21T12:39:59.012970+00:00", "EventTime": "2024-05-21T12:39:59.012994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMox42rl4AFSsseHh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "c8332853-802c-4adf-9d2d-5a8dac7c11d0", "DetectTime": "2024-05-21T12:39:59.047019+00:00", "EventTime": "2024-05-21T12:39:59.047039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3HB24395I7Fsn2wL8"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "acef98ad-01ee-4754-8f50-29e58eaa2527", "DetectTime": "2024-05-21T12:39:59.086022+00:00", "EventTime": "2024-05-21T12:39:59.086042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8D2dtsl2YIjJDvpf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "8200e7bb-ff71-4807-8c8f-be9974f8152c", "DetectTime": "2024-05-21T12:39:59.128249+00:00", "EventTime": "2024-05-21T12:39:59.128270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiaxTN6XDInxlaZTb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "784e85b7-a610-4bf3-b09b-2e0dfc9a590d", "DetectTime": "2024-05-21T12:39:59.169104+00:00", "EventTime": "2024-05-21T12:39:59.169124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LdS44GPMgmDhHMjb"], "accumulated_threat_level": 9.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "718ecf9f-e67e-4755-bfed-312923dbdd7e", "DetectTime": "2024-05-21T12:39:59.213254+00:00", "EventTime": "2024-05-21T12:39:59.213275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.207.22.66"]}], "Attach": [{"Content": "Connection to unknown destination port 25906/UDP destination IP 223.207.22.66. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbq05s4AxZIlBZmP88"], "accumulated_threat_level": 10.4, "timewindow": 108} +{"Format": "IDEA0", "ID": "54c19bd0-2918-4749-b36b-e2727e623201", "DetectTime": "2024-05-21T12:39:59.258589+00:00", "EventTime": "2024-05-21T12:39:59.258609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5hyo1fqnu1oJCVsa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 108} +{"Format": "IDEA0", "ID": "b0a43c98-8157-4dc1-ac26-843671cadf61", "DetectTime": "2024-05-21T12:39:59.305476+00:00", "EventTime": "2024-05-21T12:39:59.305494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjpKgn2eHuf5fjtuCi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 108} +{"Format": "Json", "ID": "b0a43c98-8157-4dc1-ac26-843671cadf61", "DetectTime": "2024-05-21T12:39:59.305476+00:00", "EventTime": "2024-05-21T12:39:59.305494+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-05T11:41:42.565520+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2024/05/21 12:39:59.509570)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 108, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "253e25af-7043-4281-ba93-77d989c8cd37", "DetectTime": "2024-05-21T12:39:59.521028+00:00", "EventTime": "2024-05-21T12:39:59.521047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZFN54LJuRYXu5x5g"], "accumulated_threat_level": 0.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "9003a0aa-8e78-4fc6-a7cb-1c6df8aa099c", "DetectTime": "2024-05-21T12:39:59.532682+00:00", "EventTime": "2024-05-21T12:39:59.532702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIRtKc1FVhRYhWdDGf"], "accumulated_threat_level": 1.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "f1426ba2-3808-441e-b4cc-6033bd3179be", "DetectTime": "2024-05-21T12:39:59.610167+00:00", "EventTime": "2024-05-21T12:39:59.610189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ovcY3pltHBh9P964"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "a5b81939-9b17-4795-8b22-7d85c40bc867", "DetectTime": "2024-05-21T12:39:59.645986+00:00", "EventTime": "2024-05-21T12:39:59.646006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjpqjr3TKXj29nStX5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 108} +{"Format": "IDEA0", "ID": "6db35bd9-8832-4d31-9373-48df44ce99d9", "DetectTime": "2024-05-21T12:39:59.678802+00:00", "EventTime": "2024-05-21T12:39:59.678823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbN1vM5UsJZr1Ju4"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "2b3e6e77-2e2d-4138-b404-bc8f66e2221d", "DetectTime": "2024-05-21T12:39:59.726133+00:00", "EventTime": "2024-05-21T12:39:59.726156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvx56r4rKJj1IHobgl"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "11614b67-c07f-4586-9e75-aa858366ef0c", "DetectTime": "2024-05-21T12:39:59.738231+00:00", "EventTime": "2024-05-21T12:39:59.738250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCzyC13LyCoQxDT9i1"], "accumulated_threat_level": 3.2, "timewindow": 108} +{"Format": "IDEA0", "ID": "4d57a22c-ea8a-4f40-98bb-7f71b33dfd45", "DetectTime": "2024-05-21T12:39:59.798214+00:00", "EventTime": "2024-05-21T12:39:59.798239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4K4C1BoFY3UOk1H5"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "67fd8970-e8eb-4bc3-aa0d-3304e8e22b7f", "DetectTime": "2024-05-21T12:39:59.962081+00:00", "EventTime": "2024-05-21T12:39:59.962100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgcOPn14Iyvd2S4gil"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "1def434a-0157-4d69-b7dd-c0ee18e3841a", "DetectTime": "2024-05-21T12:39:59.982700+00:00", "EventTime": "2024-05-21T12:39:59.982719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6P1Jv4fhhhgf0svPk"], "accumulated_threat_level": 4.0, "timewindow": 108} +{"Format": "IDEA0", "ID": "8a2db097-8bc7-42f4-95a1-6fbcb88f8b31", "DetectTime": "2024-05-21T12:40:00.034925+00:00", "EventTime": "2024-05-21T12:40:00.034947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQ1sT2QOVsY871Ux2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "1589236e-3e37-4ee0-baa5-0d9bc87b6a3d", "DetectTime": "2024-05-21T12:40:00.040109+00:00", "EventTime": "2024-05-21T12:40:00.040128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs9nTM28dFzrbCAIjk"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "bcfa7e0d-5e01-419f-81ba-c9d765a0caac", "DetectTime": "2024-05-21T12:40:00.065505+00:00", "EventTime": "2024-05-21T12:40:00.065549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqFQ181AQCWRNmHKXj"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "7804a9f3-9173-4083-8fff-9a080cfac884", "DetectTime": "2024-05-21T12:40:00.323231+00:00", "EventTime": "2024-05-21T12:40:00.323254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP7iGD2RQvTJ9QhFg3"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "4b2072ed-dd23-4fc0-a270-2ba33c124e1f", "DetectTime": "2024-05-21T12:40:00.336581+00:00", "EventTime": "2024-05-21T12:40:00.336600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2G16G3LiyyiWmVsik"], "accumulated_threat_level": 4.8, "timewindow": 108} +{"Format": "IDEA0", "ID": "5a326eb1-9bac-4936-9e80-7008aa9103ca", "DetectTime": "2024-05-21T12:40:00.401566+00:00", "EventTime": "2024-05-21T12:40:00.401584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqbBf3SOIrG4sCCwa"], "accumulated_threat_level": 5.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "22170023-210d-4ee6-88a0-f0e3e559b283", "DetectTime": "2024-05-21T12:40:00.445499+00:00", "EventTime": "2024-05-21T12:40:00.445517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOqtp1szcfT0AuV6d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 108} +{"Format": "IDEA0", "ID": "1f755d14-a802-4b38-bc4d-51bc9a7e2abb", "DetectTime": "2024-05-21T12:40:00.491225+00:00", "EventTime": "2024-05-21T12:40:00.491243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0lp22yY1JoYdlVH6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "c2f5a879-49ba-4194-a307-eb8775fdd45c", "DetectTime": "2024-05-21T12:40:00.533197+00:00", "EventTime": "2024-05-21T12:40:00.533217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmyEWC2qXCwFm0qBD4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "f77b5a31-fd5f-4ca8-9298-9a4370d89e91", "DetectTime": "2024-05-21T12:40:00.569521+00:00", "EventTime": "2024-05-21T12:40:00.569544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8JHA1U40ItKPB1T1"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "7b475e42-ebcd-43a2-99e5-9ea9a9851ecd", "DetectTime": "2024-05-21T12:40:00.609429+00:00", "EventTime": "2024-05-21T12:40:00.609452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCrjel4r21DIRL5Wld"], "accumulated_threat_level": 8.799999999999999, "timewindow": 108} +{"Format": "IDEA0", "ID": "2e3d312d-7633-46d5-802c-69218917047c", "DetectTime": "2024-05-21T12:40:00.655318+00:00", "EventTime": "2024-05-21T12:40:00.655337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8Tsl4vGct1j5YqN4"], "accumulated_threat_level": 9.6, "timewindow": 108} +{"Format": "IDEA0", "ID": "edd36e7c-3097-4f8c-b536-7a620a292ec0", "DetectTime": "2024-05-21T12:40:00.911732+00:00", "EventTime": "2024-05-21T12:40:00.911755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyFsy4uISDxDMNYTi"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "afd789b2-d0ab-4da5-a9d3-951b72a42402", "DetectTime": "2024-05-21T12:40:00.918306+00:00", "EventTime": "2024-05-21T12:40:00.918324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsmVnu2h6iimXL5Gcc"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "2773f10e-f06f-4b7c-9bef-765eafb1a8f6", "DetectTime": "2024-05-21T12:40:00.933741+00:00", "EventTime": "2024-05-21T12:40:00.933759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwQhhG2nVa19kVBAg"], "accumulated_threat_level": 10.4, "timewindow": 108} +{"Format": "IDEA0", "ID": "4f7ae554-1642-489d-9275-d0c9b5c2e983", "DetectTime": "2024-05-21T12:40:00.938350+00:00", "EventTime": "2024-05-21T12:40:00.938367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQHwa2U98yjxwsk63"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "802c786f-f95b-4cc0-88ff-e89b2ca45e1f", "DetectTime": "2024-05-21T12:40:01.060913+00:00", "EventTime": "2024-05-21T12:40:01.060935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBNMv28bKbuA4Dduc"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "6edf0b31-cb44-4137-bc32-556c0571b48c", "DetectTime": "2024-05-21T12:40:01.066122+00:00", "EventTime": "2024-05-21T12:40:01.066144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84mCy2KuV4MJO8PI8"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "b526a1cb-af73-4e08-860f-5f8be6b14b32", "DetectTime": "2024-05-21T12:40:01.094978+00:00", "EventTime": "2024-05-21T12:40:01.095002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuWQ5g4k4XWpejK28l"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "69169a27-2e2c-451a-865a-c5a23c0d6ae4", "DetectTime": "2024-05-21T12:40:01.134562+00:00", "EventTime": "2024-05-21T12:40:01.134583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmQX1vwdh00UyS9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 108} +{"Format": "IDEA0", "ID": "82f5c051-f66c-4b1c-84a7-93562bb2e976", "DetectTime": "2024-05-21T12:40:01.197833+00:00", "EventTime": "2024-05-21T12:40:01.197858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZww7YFsFbdGAUM4e"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "4d8bc0e3-83a0-49c9-b84b-0ff090f4f722", "DetectTime": "2024-05-21T12:40:01.418951+00:00", "EventTime": "2024-05-21T12:40:01.418973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZrhl27NNOy7cs3i1"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "6717a35b-ee5c-478f-a9ae-6201885cadeb", "DetectTime": "2024-05-21T12:40:01.457405+00:00", "EventTime": "2024-05-21T12:40:01.457427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3f7tO1aJKUBuzmMU2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "25106948-7696-4e4f-a06e-51e4b7707624", "DetectTime": "2024-05-21T12:40:01.503089+00:00", "EventTime": "2024-05-21T12:40:01.503115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDHIT54fBVjVhjtCm5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 108} +{"Format": "Json", "ID": "25106948-7696-4e4f-a06e-51e4b7707624", "DetectTime": "2024-05-21T12:40:01.503089+00:00", "EventTime": "2024-05-21T12:40:01.503115+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "1970-01-05T11:50:05.113020+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 108. (real time 2024/05/21 12:40:01.724231)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 108, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "98033b7d-2d8a-4ea2-8302-0f74a77a50d3", "DetectTime": "2024-05-21T12:40:01.729388+00:00", "EventTime": "2024-05-21T12:40:01.729410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv3WUJZavBzlFyPwl"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "5a4e7663-2368-4ceb-b589-e6b53715afe6", "DetectTime": "2024-05-21T12:40:01.734907+00:00", "EventTime": "2024-05-21T12:40:01.734926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwqyew235xhHZsIpe6"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "a48271a4-198a-4617-9da0-c5ccca8ebf85", "DetectTime": "2024-05-21T12:40:01.739688+00:00", "EventTime": "2024-05-21T12:40:01.739707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMVGau38Yz0jLfx6S2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "dfcf7f93-7caa-4050-b3be-d927cfa92a17", "DetectTime": "2024-05-21T12:40:01.881151+00:00", "EventTime": "2024-05-21T12:40:01.881174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZoWt4PnEHCMPIIO2"], "accumulated_threat_level": 1.3, "timewindow": 109} +{"Format": "IDEA0", "ID": "00b11193-01ce-4d8d-ba8d-9754d26b6991", "DetectTime": "2024-05-21T12:40:01.887044+00:00", "EventTime": "2024-05-21T12:40:01.887065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyruwo1GEMvAXE3KP"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "cd3fbb42-19cf-4ffd-bd8d-6c45be66905e", "DetectTime": "2024-05-21T12:40:01.986643+00:00", "EventTime": "2024-05-21T12:40:01.986661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyMejDeVVGcWoEfb"], "accumulated_threat_level": 2.1, "timewindow": 109} +{"Format": "IDEA0", "ID": "ca46abd9-1d53-4f2f-ae18-205bc26b15ea", "DetectTime": "2024-05-21T12:40:01.991704+00:00", "EventTime": "2024-05-21T12:40:01.991729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaYCp354Bjd0uHrF2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "5c777b3d-f1c8-46fa-a519-6399516bb3bf", "DetectTime": "2024-05-21T12:40:01.996797+00:00", "EventTime": "2024-05-21T12:40:01.996819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAA3w16tdGpc71I4b"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "26e927fe-f559-45a9-8181-cae54e733706", "DetectTime": "2024-05-21T12:40:02.124098+00:00", "EventTime": "2024-05-21T12:40:02.124118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAStxJ1ykYN8oH7Txg"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 109} +{"Format": "IDEA0", "ID": "44d43df4-a854-46e5-a12f-a3994e2a1caf", "DetectTime": "2024-05-21T12:40:02.168551+00:00", "EventTime": "2024-05-21T12:40:02.168581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rXHG3TGztPYPAEu"], "accumulated_threat_level": 3.7, "timewindow": 109} +{"Format": "IDEA0", "ID": "4332f45b-8a46-45bd-9984-25a9e78b440c", "DetectTime": "2024-05-21T12:40:02.200137+00:00", "EventTime": "2024-05-21T12:40:02.200160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsPHNl4tjBOFS22qz4"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "487e48d6-4018-4c49-9530-b8fa72fcef48", "DetectTime": "2024-05-21T12:40:02.238470+00:00", "EventTime": "2024-05-21T12:40:02.238492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHrMI2tcgHwIa7FF1"], "accumulated_threat_level": 4.5, "timewindow": 109} +{"Format": "IDEA0", "ID": "b9619586-7217-4c3d-bbe5-fce30c4c0066", "DetectTime": "2024-05-21T12:40:02.282865+00:00", "EventTime": "2024-05-21T12:40:02.282885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDAQ2E4wo8p3sGcmg5"], "accumulated_threat_level": 5.3, "timewindow": 109} +{"Format": "IDEA0", "ID": "98c8fdd3-8f95-468e-96ef-0f6b1e3cb809", "DetectTime": "2024-05-21T12:40:02.523720+00:00", "EventTime": "2024-05-21T12:40:02.523740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYniR14prFYrufe9J6"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "d182f274-a7d9-416e-bb51-51166a03890b", "DetectTime": "2024-05-21T12:40:02.528971+00:00", "EventTime": "2024-05-21T12:40:02.528990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAPadI3tMkgDdcA0u5"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "4ca97f3d-da43-4362-bfe1-6a8cc53a14e5", "DetectTime": "2024-05-21T12:40:02.584693+00:00", "EventTime": "2024-05-21T12:40:02.584713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34HEJ3OpK1NEN1at"], "accumulated_threat_level": 6.1, "timewindow": 109} +{"Format": "IDEA0", "ID": "13fc113a-ed22-4bff-b95f-0d89718e3c9f", "DetectTime": "2024-05-21T12:40:02.627345+00:00", "EventTime": "2024-05-21T12:40:02.627364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmVQWJ1W3mrlo7kNFd"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 109} +{"Format": "IDEA0", "ID": "5c6f8e58-2f08-4295-91d9-efec135485c7", "DetectTime": "2024-05-21T12:40:02.672130+00:00", "EventTime": "2024-05-21T12:40:02.672148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRvRx3rxILyctqkx4"], "accumulated_threat_level": 7.699999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "1bac4a93-4a4e-461a-bea9-f35335bb2f5c", "DetectTime": "2024-05-21T12:40:02.741497+00:00", "EventTime": "2024-05-21T12:40:02.741516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJo51h1sqt65vq6pE5"], "accumulated_threat_level": 8.5, "timewindow": 109} +{"Format": "IDEA0", "ID": "e1bc5c44-a584-41d1-8da3-b2b870f31b7e", "DetectTime": "2024-05-21T12:40:02.782237+00:00", "EventTime": "2024-05-21T12:40:02.782257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDGVXNZ7t3g626t7"], "accumulated_threat_level": 9.3, "timewindow": 109} +{"Format": "IDEA0", "ID": "f7d280c1-cfed-4ebe-82fd-3406550d5970", "DetectTime": "2024-05-21T12:40:02.846334+00:00", "EventTime": "2024-05-21T12:40:02.846354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVPjob1YZLQQSOEmrh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 109} +{"Format": "IDEA0", "ID": "2a8c6f37-7199-4f72-93b7-2543a5010b54", "DetectTime": "2024-05-21T12:40:02.885527+00:00", "EventTime": "2024-05-21T12:40:02.885547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnujS3RlK1ghnTGg4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 109} +{"Format": "IDEA0", "ID": "8f945eb7-d164-4924-88e0-30e8b566053c", "DetectTime": "2024-05-21T12:40:02.927689+00:00", "EventTime": "2024-05-21T12:40:02.927710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57u2h15tUhW7avLgh"], "accumulated_threat_level": 11.700000000000003, "timewindow": 109} +{"Format": "IDEA0", "ID": "b99b3449-fe5a-4b1b-8bcb-09778c71d007", "DetectTime": "2024-05-21T12:40:02.977192+00:00", "EventTime": "2024-05-21T12:40:02.977216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCEzj6I1EPK7HMza"], "accumulated_threat_level": 12.500000000000004, "timewindow": 109} +{"Format": "Json", "ID": "b99b3449-fe5a-4b1b-8bcb-09778c71d007", "DetectTime": "2024-05-21T12:40:02.977192+00:00", "EventTime": "2024-05-21T12:40:02.977216+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-05T12:12:48.847179+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2024/05/21 12:40:03.191420)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 109, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "793b38b5-f536-4da5-a4bc-8902b30a6d25", "DetectTime": "2024-05-21T12:40:03.203090+00:00", "EventTime": "2024-05-21T12:40:03.203109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.175.199.126"]}], "Attach": [{"Content": "Connection to unknown destination port 4258/UDP destination IP 190.175.199.126. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6mjQ341fW0uIcnv9"], "accumulated_threat_level": 0.8, "timewindow": 109} +{"Format": "IDEA0", "ID": "2a240b34-2d18-4f2f-86ff-5ed396045063", "DetectTime": "2024-05-21T12:40:03.253340+00:00", "EventTime": "2024-05-21T12:40:03.253363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChM0rI2Xk44PAXMykj"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "d276bc2f-9651-48ce-b5d4-30a8d590c09f", "DetectTime": "2024-05-21T12:40:03.288267+00:00", "EventTime": "2024-05-21T12:40:03.288287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zXf41PkKxykdrXy7"], "accumulated_threat_level": 1.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "64beebf6-d610-45f7-85b2-7f5c76178dae", "DetectTime": "2024-05-21T12:40:03.337027+00:00", "EventTime": "2024-05-21T12:40:03.337044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJtmU2RxbpjLICQPg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 109} +{"Format": "IDEA0", "ID": "14dfc2a6-80d0-404a-a765-ba160e13fd12", "DetectTime": "2024-05-21T12:40:03.375139+00:00", "EventTime": "2024-05-21T12:40:03.375160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsfcv2yqzRXKHnuje"], "accumulated_threat_level": 3.2, "timewindow": 109} +{"Format": "IDEA0", "ID": "8449c008-7db7-4e75-bc04-d80ede5116de", "DetectTime": "2024-05-21T12:40:03.408827+00:00", "EventTime": "2024-05-21T12:40:03.408849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUEmEh3BPNhPMSyFP2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "dbf010f0-bbe5-4e14-af92-04e232a6caf2", "DetectTime": "2024-05-21T12:40:03.445024+00:00", "EventTime": "2024-05-21T12:40:03.445044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csv8Ho1JfBLxA8toI"], "accumulated_threat_level": 4.0, "timewindow": 109} +{"Format": "IDEA0", "ID": "7cd6a59a-8429-49da-942a-f2e9332fc6c0", "DetectTime": "2024-05-21T12:40:03.596978+00:00", "EventTime": "2024-05-21T12:40:03.596999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8p4a210qeZfTgrwMj"], "accumulated_threat_level": 4.8, "timewindow": 109} +{"Format": "IDEA0", "ID": "0df60f50-0729-4865-9a96-ef1b46c7c46f", "DetectTime": "2024-05-21T12:40:03.608674+00:00", "EventTime": "2024-05-21T12:40:03.608695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNk9v11FBN2KcMDDa"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "6bf8fcc3-3473-4c0e-8171-d9720efa4e09", "DetectTime": "2024-05-21T12:40:03.644987+00:00", "EventTime": "2024-05-21T12:40:03.645007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQdw6O2djZbMYjsi52"], "accumulated_threat_level": 5.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "bf63964a-58cc-4366-8d5b-2897ce01de99", "DetectTime": "2024-05-21T12:40:03.675589+00:00", "EventTime": "2024-05-21T12:40:03.675612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MhGl3qi71nmU6onf", "Clnbum4fveHof85DPa", "CNq7pN1VK35OD3vuuk", "CwF95smdqzd1Xmbml"], "accumulated_threat_level": 6.1, "timewindow": 109} +{"Format": "IDEA0", "ID": "1fc5203f-88cd-4793-abfa-13d63ded73d2", "DetectTime": "2024-05-21T12:40:03.691730+00:00", "EventTime": "2024-05-21T12:40:03.691749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwnG51oPkCoQWav11"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 109} +{"Format": "IDEA0", "ID": "31fecdb0-3177-4d19-a21a-8d9c27a3d84c", "DetectTime": "2024-05-21T12:40:03.965480+00:00", "EventTime": "2024-05-21T12:40:03.965501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJdR82WGVIv06mnOh"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "39a4b6e7-4ae8-4255-a1a9-b5496c799871", "DetectTime": "2024-05-21T12:40:03.971639+00:00", "EventTime": "2024-05-21T12:40:03.971660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyb8ie4fwPFApo9i78"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "b5739405-2c40-4a5e-b20b-2b59e529a2d6", "DetectTime": "2024-05-21T12:40:03.977368+00:00", "EventTime": "2024-05-21T12:40:03.977387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzgXd4fnbd5MnheOa"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "388a6bee-2e38-451d-aaf2-2947d52aad50", "DetectTime": "2024-05-21T12:40:03.981773+00:00", "EventTime": "2024-05-21T12:40:03.981791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2V263zQKJrbPUwF2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "ebef95ad-c671-4936-84b3-2ea41b02453e", "DetectTime": "2024-05-21T12:40:04.023436+00:00", "EventTime": "2024-05-21T12:40:04.023457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeY2D424m7s1h7l6hd"], "accumulated_threat_level": 7.699999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "611a2a1f-965a-4c5d-982c-8c075130bee4", "DetectTime": "2024-05-21T12:40:04.033795+00:00", "EventTime": "2024-05-21T12:40:04.033817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYQSW1dPgWRZUEFt2"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "e0f4aa1c-115e-41ec-bf12-0a9e5143de63", "DetectTime": "2024-05-21T12:40:04.177953+00:00", "EventTime": "2024-05-21T12:40:04.177976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLYTBG37ycvXRbHWeg"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "3c20565e-f7bb-46ad-b1c6-7b348dd0890e", "DetectTime": "2024-05-21T12:40:04.187471+00:00", "EventTime": "2024-05-21T12:40:04.187491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV22qw3kk2JotwQ4Za"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "3c9a0c51-2d9f-4f32-8c79-8e98dea73f93", "DetectTime": "2024-05-21T12:40:04.215429+00:00", "EventTime": "2024-05-21T12:40:04.215447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGzDLL1r2GvGayG2Ub"], "accumulated_threat_level": 10.4, "timewindow": 106} +{"Format": "IDEA0", "ID": "a977b460-cc13-456a-bf9c-f390dfc679d7", "DetectTime": "2024-05-21T12:40:04.479129+00:00", "EventTime": "2024-05-21T12:40:04.479148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoxL44W0JfuSVTyTd"], "accumulated_threat_level": 8.5, "timewindow": 109} +{"Format": "IDEA0", "ID": "c4027fa1-1cc3-47d0-8991-70e744065fac", "DetectTime": "2024-05-21T12:40:04.535176+00:00", "EventTime": "2024-05-21T12:40:04.535197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqyIR1Qe7YswAYyn"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "2800bf3e-a8ff-4855-95c7-a685ab911de0", "DetectTime": "2024-05-21T12:40:04.549167+00:00", "EventTime": "2024-05-21T12:40:04.549189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCh0U2HwPuBPli0k9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "51d83819-0f04-40ff-97bc-ca88eb4a4685", "DetectTime": "2024-05-21T12:40:04.554388+00:00", "EventTime": "2024-05-21T12:40:04.554426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBccrxmgd9mg0V9rb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "22275452-481a-4240-b76a-21531afe4963", "DetectTime": "2024-05-21T12:40:04.653803+00:00", "EventTime": "2024-05-21T12:40:04.653827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0UBA2snD8rLElxp3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "a165d06f-ad60-4f19-953b-4eb92820333b", "DetectTime": "2024-05-21T12:40:04.673859+00:00", "EventTime": "2024-05-21T12:40:04.673880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy41h3cw07WksYRp1"], "accumulated_threat_level": 9.3, "timewindow": 109} +{"Format": "IDEA0", "ID": "787c383c-cf67-49c7-a3e3-074ae270aeef", "DetectTime": "2024-05-21T12:40:04.702657+00:00", "EventTime": "2024-05-21T12:40:04.702681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QFtJVvioKmX2SB5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "1ea5fb65-aa12-47b6-b9bd-f51479381777", "DetectTime": "2024-05-21T12:40:04.763724+00:00", "EventTime": "2024-05-21T12:40:04.763748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci3VNM30oQF1Wdz6wc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "68fc9219-6523-4b2b-b29c-c9ef665de743", "DetectTime": "2024-05-21T12:40:04.769160+00:00", "EventTime": "2024-05-21T12:40:04.769181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nouu1o9GT9zq60Yl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "baa43e52-0bb0-4200-b2ef-dc23d10ce05d", "DetectTime": "2024-05-21T12:40:05.042400+00:00", "EventTime": "2024-05-21T12:40:05.042438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZtf54zRt86hENQS5"], "accumulated_threat_level": 10.100000000000001, "timewindow": 109} +{"Format": "IDEA0", "ID": "567f6249-b854-413f-b626-01e5c1de3293", "DetectTime": "2024-05-21T12:40:05.047853+00:00", "EventTime": "2024-05-21T12:40:05.047874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2Jme1C3He8DiC5L2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "583648b1-1f36-4162-9b6c-dcb2c953775e", "DetectTime": "2024-05-21T12:40:05.099661+00:00", "EventTime": "2024-05-21T12:40:05.099684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLK1jG40D6nAPO4qfh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "4c998bdf-7165-41cc-bcfb-3e2952403708", "DetectTime": "2024-05-21T12:40:05.104744+00:00", "EventTime": "2024-05-21T12:40:05.104763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUmGm1whreVaPEkRc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "10947f42-a95b-4d81-8b64-ca43e2c2c11a", "DetectTime": "2024-05-21T12:40:05.167038+00:00", "EventTime": "2024-05-21T12:40:05.167061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcxpKn2AghdEcyZQE9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "e8987b90-5be8-4802-8f9c-f69ee7f383f3", "DetectTime": "2024-05-21T12:40:05.230041+00:00", "EventTime": "2024-05-21T12:40:05.230063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4U9ekGBR9vwXE5b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "8feb3e97-fa5a-4253-8616-a65d3f848dc5", "DetectTime": "2024-05-21T12:40:05.272558+00:00", "EventTime": "2024-05-21T12:40:05.272579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbVnL3fUo6OGbHLV3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "d1962a81-7020-4dbb-aa06-58009f530585", "DetectTime": "2024-05-21T12:40:05.314870+00:00", "EventTime": "2024-05-21T12:40:05.314891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBbLv3L5Gjr9NNUBc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "f4a81a48-cc60-4c0d-bfe6-9178fa418d3b", "DetectTime": "2024-05-21T12:40:05.530306+00:00", "EventTime": "2024-05-21T12:40:05.530329+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iubA0K6sp8Gl4v8"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "acde6ac6-2856-4d83-a979-6751c22b696d", "DetectTime": "2024-05-21T12:40:05.542823+00:00", "EventTime": "2024-05-21T12:40:05.542841+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iubA0K6sp8Gl4v8"], "accumulated_threat_level": 6.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "fee7da65-20db-4f89-9f5a-274b0660de1d", "DetectTime": "2024-05-21T12:40:05.557405+00:00", "EventTime": "2024-05-21T12:40:05.557425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXZwECueyvAGMuI0j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "364acefa-a21f-4ab0-a9fd-0bf63a5c91a4", "DetectTime": "2024-05-21T12:40:05.562531+00:00", "EventTime": "2024-05-21T12:40:05.562551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NUwA3985xKDgNPS6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "437cb333-1a6b-4c5e-b056-2fe006f65162", "DetectTime": "2024-05-21T12:40:05.585891+00:00", "EventTime": "2024-05-21T12:40:05.585911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ8dIl2a4THMSqdYA"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "a98d5cbf-5780-422c-be4d-58e473544769", "DetectTime": "2024-05-21T12:40:05.655342+00:00", "EventTime": "2024-05-21T12:40:05.655360+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfiHfr1O3zwSTzi3y8"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "3fa84da5-44b9-4d89-8445-266401efdc44", "DetectTime": "2024-05-21T12:40:05.668130+00:00", "EventTime": "2024-05-21T12:40:05.668152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5zmrb28oNlUwtVhOc"], "accumulated_threat_level": 10.900000000000002, "timewindow": 109} +{"Format": "IDEA0", "ID": "e6659661-2866-493e-a211-9273066eddd1", "DetectTime": "2024-05-21T12:40:05.681963+00:00", "EventTime": "2024-05-21T12:40:05.681985+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfiHfr1O3zwSTzi3y8"], "accumulated_threat_level": 7.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "dd017bbd-c0ba-479e-9eec-f90bff49136b", "DetectTime": "2024-05-21T12:40:05.695870+00:00", "EventTime": "2024-05-21T12:40:05.695892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzbdB2XoX02ow3BJ3"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "b279d758-857f-4580-9720-3922a4a2c764", "DetectTime": "2024-05-21T12:40:05.708850+00:00", "EventTime": "2024-05-21T12:40:05.708869+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzbdB2XoX02ow3BJ3"], "accumulated_threat_level": 7.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "3422bbc9-0ebf-4e54-a156-c393c10dac35", "DetectTime": "2024-05-21T12:40:05.720027+00:00", "EventTime": "2024-05-21T12:40:05.720046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u8qa2zMcn2ptf3Eg"], "accumulated_threat_level": 11.700000000000003, "timewindow": 109} +{"Format": "IDEA0", "ID": "0106c334-b16a-4ba5-bd1c-039ba149179e", "DetectTime": "2024-05-21T12:40:05.733982+00:00", "EventTime": "2024-05-21T12:40:05.734002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjPs3TFwYdLfb6V4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "9134121c-5e70-4198-8aca-efe632d17223", "DetectTime": "2024-05-21T12:40:05.769492+00:00", "EventTime": "2024-05-21T12:40:05.769513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHt3I2uqub2J8AKsk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "b0deba06-c909-445b-985b-3498fb1eb22a", "DetectTime": "2024-05-21T12:40:05.783001+00:00", "EventTime": "2024-05-21T12:40:05.783020+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwqeg3KuQk2QmhJNk"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "58b18541-8b27-456f-88d5-fbf665c5e81b", "DetectTime": "2024-05-21T12:40:05.795495+00:00", "EventTime": "2024-05-21T12:40:05.795515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwqeg3KuQk2QmhJNk"], "accumulated_threat_level": 8.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "2444536f-5af0-4604-8cd5-212d724ce69e", "DetectTime": "2024-05-21T12:40:05.813205+00:00", "EventTime": "2024-05-21T12:40:05.813225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxI5E3gDZH3iqfQFa"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "738c7c63-e44d-4634-ba93-0e90d90a0e3d", "DetectTime": "2024-05-21T12:40:05.825363+00:00", "EventTime": "2024-05-21T12:40:05.825382+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxI5E3gDZH3iqfQFa"], "accumulated_threat_level": 8.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "a3932077-44f3-47b2-bbe0-4fd11b68fb5e", "DetectTime": "2024-05-21T12:40:05.847951+00:00", "EventTime": "2024-05-21T12:40:05.847972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW537Z1bp7hALjMSi9"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "cf18d367-7d31-46e1-aae9-f462a43c6bfd", "DetectTime": "2024-05-21T12:40:05.859825+00:00", "EventTime": "2024-05-21T12:40:05.859844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW537Z1bp7hALjMSi9"], "accumulated_threat_level": 9.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "e9574a09-5e34-4e64-9554-0c70a293fb64", "DetectTime": "2024-05-21T12:40:05.888087+00:00", "EventTime": "2024-05-21T12:40:05.888108+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPiTVS2Xjkif4VGed7"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "2b77d296-4306-43a2-856a-bff97e473659", "DetectTime": "2024-05-21T12:40:05.900516+00:00", "EventTime": "2024-05-21T12:40:05.900534+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPiTVS2Xjkif4VGed7"], "accumulated_threat_level": 9.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "adee3620-89a0-4761-9680-49b5a17ad507", "DetectTime": "2024-05-21T12:40:05.927624+00:00", "EventTime": "2024-05-21T12:40:05.927643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLTiZ1GgiV4G5186"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "3e90606e-3714-46b6-9de3-2e82d74f5e8c", "DetectTime": "2024-05-21T12:40:05.941082+00:00", "EventTime": "2024-05-21T12:40:05.941105+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLTiZ1GgiV4G5186"], "accumulated_threat_level": 10.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "5e8102f3-c6fe-4f0d-8fc9-e4a5ee4f2edb", "DetectTime": "2024-05-21T12:40:05.968742+00:00", "EventTime": "2024-05-21T12:40:05.968762+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJ2U52cwIBvsN6mDa"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "47114b79-6a4f-48a5-a2ec-62e7962df425", "DetectTime": "2024-05-21T12:40:05.983718+00:00", "EventTime": "2024-05-21T12:40:05.983740+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJ2U52cwIBvsN6mDa"], "accumulated_threat_level": 10.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "4ccfba37-060f-4cd1-bff8-4d95b66a4464", "DetectTime": "2024-05-21T12:40:06.068014+00:00", "EventTime": "2024-05-21T12:40:06.068035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGe9GX2jQVmdgkOK29"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "7f13f330-bc12-4467-9641-a3ff101164b4", "DetectTime": "2024-05-21T12:40:06.074804+00:00", "EventTime": "2024-05-21T12:40:06.074824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM3ytXqPjRPvgLOU7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "c053fd71-a12d-40a4-baff-aa4c67e48883", "DetectTime": "2024-05-21T12:40:06.079813+00:00", "EventTime": "2024-05-21T12:40:06.079832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuISOM2eg32RaXqeXg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "51a75e18-e77a-497f-bea3-004e11511fe0", "DetectTime": "2024-05-21T12:40:06.084720+00:00", "EventTime": "2024-05-21T12:40:06.084738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4RF4wVZVrFzSOn"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "b6195727-6e69-463e-bbbe-ab1685e4d396", "DetectTime": "2024-05-21T12:40:06.089694+00:00", "EventTime": "2024-05-21T12:40:06.089712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmGqm22Ft1xJfOfO2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "ff01cad8-fef4-4338-85a2-e4a058d51bee", "DetectTime": "2024-05-21T12:40:06.094910+00:00", "EventTime": "2024-05-21T12:40:06.094930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16kTi1NKQUl6tMUyl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "e3caab9d-e562-4480-bc1d-b1a6ec233be7", "DetectTime": "2024-05-21T12:40:06.218637+00:00", "EventTime": "2024-05-21T12:40:06.218660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9qeE21QAjtbSVkKR"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "2c42a11d-59f2-4e45-adae-74ef5a7c1db9", "DetectTime": "2024-05-21T12:40:06.285256+00:00", "EventTime": "2024-05-21T12:40:06.285277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1RNB3su7dfA7xuHj"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "983f1b68-685b-4a78-8a00-2c1498ee381a", "DetectTime": "2024-05-21T12:40:06.298398+00:00", "EventTime": "2024-05-21T12:40:06.298439+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1RNB3su7dfA7xuHj"], "accumulated_threat_level": 11.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "26ac9d38-63ea-4efc-a5b9-d0b8f36c3f86", "DetectTime": "2024-05-21T12:40:06.338550+00:00", "EventTime": "2024-05-21T12:40:06.338571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRXTcw1PqOpfljih"], "accumulated_threat_level": 12.500000000000004, "timewindow": 109} +{"Format": "Json", "ID": "26ac9d38-63ea-4efc-a5b9-d0b8f36c3f86", "DetectTime": "2024-05-21T12:40:06.338550+00:00", "EventTime": "2024-05-21T12:40:06.338571+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "1970-01-05T12:43:40.087536+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2024/05/21 12:40:06.663890)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 109, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "8690f0f9-1f63-4e69-9226-ce52e36a14be", "DetectTime": "2024-05-21T12:40:06.668535+00:00", "EventTime": "2024-05-21T12:40:06.668556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4i2LU2Amml4199bFe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "272896e3-60e4-4f37-a12a-82e7a9410287", "DetectTime": "2024-05-21T12:40:06.680007+00:00", "EventTime": "2024-05-21T12:40:06.680028+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.208.123.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFAKFC335NVVwgg28b"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "bccbdad0-8b55-43e4-afb2-a4ef1f52c61d", "DetectTime": "2024-05-21T12:40:06.693536+00:00", "EventTime": "2024-05-21T12:40:06.693558+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFAKFC335NVVwgg28b"], "accumulated_threat_level": 11.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "a49753cb-7bbe-4fdf-96f6-f38b5ea2ad9d", "DetectTime": "2024-05-21T12:40:06.698784+00:00", "EventTime": "2024-05-21T12:40:06.698804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06DsmTb8ANmYzTPd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "77be78f3-9077-4953-9cd4-95421a78c44e", "DetectTime": "2024-05-21T12:40:06.703443+00:00", "EventTime": "2024-05-21T12:40:06.703463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnrrf1ZiaWTUBVcTc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "22836987-b02f-49b5-9acd-287de823499c", "DetectTime": "2024-05-21T12:40:06.707885+00:00", "EventTime": "2024-05-21T12:40:06.707902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CguRE2xaaTJMONzh3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "651382c0-a466-448c-9ae3-40057bb43c55", "DetectTime": "2024-05-21T12:40:06.712299+00:00", "EventTime": "2024-05-21T12:40:06.712316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZX1S3444Lwqu8Ja1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "462bab45-8abc-4ca0-b487-41b9531f74eb", "DetectTime": "2024-05-21T12:40:06.717420+00:00", "EventTime": "2024-05-21T12:40:06.717442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTqLam1PL80jpSk3Jh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "4c1a9e4f-8d81-4b42-adec-f3beed7700cd", "DetectTime": "2024-05-21T12:40:06.723149+00:00", "EventTime": "2024-05-21T12:40:06.723169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyUkfg1HrfDwra9L34"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "5e6de169-c3f6-45c8-94db-99233b3c9142", "DetectTime": "2024-05-21T12:40:06.750440+00:00", "EventTime": "2024-05-21T12:40:06.750458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvaex33g2rfXT6tED6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "bf5a84c9-6020-4223-b12f-ca0ea1f12a19", "DetectTime": "2024-05-21T12:40:06.765326+00:00", "EventTime": "2024-05-21T12:40:06.765353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMfnb26fmy4MBsG12"], "accumulated_threat_level": 0.8, "timewindow": 109} +{"Format": "IDEA0", "ID": "6d531624-4b73-4b79-9c0a-3bf60b7b9c0d", "DetectTime": "2024-05-21T12:40:06.901663+00:00", "EventTime": "2024-05-21T12:40:06.901683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjqpT2396KgXNofle"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "856c1b54-f559-4b1e-a29f-4dbe2168548b", "DetectTime": "2024-05-21T12:40:06.906600+00:00", "EventTime": "2024-05-21T12:40:06.906619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUhpx1bEZqmGPZ78k"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "639e5495-ee05-48ea-b968-ec4d688af2dd", "DetectTime": "2024-05-21T12:40:07.167514+00:00", "EventTime": "2024-05-21T12:40:07.167536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD20Sb28S8GSZvNroa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "921f8acd-8834-43cc-a954-22f557129237", "DetectTime": "2024-05-21T12:40:07.172779+00:00", "EventTime": "2024-05-21T12:40:07.172796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6NYB1f7hxmwCTYH1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "31b10985-7178-4ab1-bebc-da53adb73ed7", "DetectTime": "2024-05-21T12:40:07.284551+00:00", "EventTime": "2024-05-21T12:40:07.284570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOwab2h0LxQJQ3KHa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "5820d59a-d758-421a-8e14-d1c084ea78d9", "DetectTime": "2024-05-21T12:40:07.294549+00:00", "EventTime": "2024-05-21T12:40:07.294570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Eko33aAtPxAlyiVi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "5a7143b1-97d9-45d5-814c-ef07eedd5ff7", "DetectTime": "2024-05-21T12:40:07.300101+00:00", "EventTime": "2024-05-21T12:40:07.300121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C78UE3WRMPJ9ITYQb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "f5e7b338-0cae-4632-8dc3-b7e8450c4806", "DetectTime": "2024-05-21T12:40:07.312268+00:00", "EventTime": "2024-05-21T12:40:07.312304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32LjJAtJw4e90gU7"], "accumulated_threat_level": 1.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "92454450-f560-43db-974d-466c0a9b8c2b", "DetectTime": "2024-05-21T12:40:07.391189+00:00", "EventTime": "2024-05-21T12:40:07.391211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRW4f2HnHo8oFhBdl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "38804a17-dee7-4a1c-b08c-3f6ce9a7bad2", "DetectTime": "2024-05-21T12:40:07.417434+00:00", "EventTime": "2024-05-21T12:40:07.417456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPatp3LsXMbecgtX5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "cdf581ec-15d5-4625-8f6a-59519036cade", "DetectTime": "2024-05-21T12:40:07.680816+00:00", "EventTime": "2024-05-21T12:40:07.680837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpZvPSS2y0RJ7VZ5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "4b827374-6106-41ea-adb9-38bd2162e0cb", "DetectTime": "2024-05-21T12:40:07.685974+00:00", "EventTime": "2024-05-21T12:40:07.685997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGoU12XtIBWzedkli"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "b0e7845b-71a8-4070-8d6b-1d6a833df99a", "DetectTime": "2024-05-21T12:40:07.761712+00:00", "EventTime": "2024-05-21T12:40:07.761733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7WJYTGFcnSqkwe88"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 109} +{"Format": "IDEA0", "ID": "cd748958-0f0e-4297-be9e-c4c6cf2d8541", "DetectTime": "2024-05-21T12:40:07.791666+00:00", "EventTime": "2024-05-21T12:40:07.791687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCRTg364E2e72Mbal"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "f330c703-27e2-4901-a36e-c5c401d6ca42", "DetectTime": "2024-05-21T12:40:07.829568+00:00", "EventTime": "2024-05-21T12:40:07.829589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQi8L3aNe6sHwq9Kb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "1f9e2afa-e598-4847-9671-c2846209e22e", "DetectTime": "2024-05-21T12:40:07.865025+00:00", "EventTime": "2024-05-21T12:40:07.865045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CenXBo720cWrUnU34"], "accumulated_threat_level": 3.2, "timewindow": 109} +{"Format": "IDEA0", "ID": "c0fbef8d-fa03-4f40-801d-cf7aa69843e3", "DetectTime": "2024-05-21T12:40:07.897392+00:00", "EventTime": "2024-05-21T12:40:07.897413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziMbg3sA4lHP6mbg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "3ff5211a-8277-4708-8196-4dc5994553c3", "DetectTime": "2024-05-21T12:40:08.140971+00:00", "EventTime": "2024-05-21T12:40:08.140990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG5Dak1abueIBfwOd7"], "accumulated_threat_level": 4.0, "timewindow": 109} +{"Format": "IDEA0", "ID": "10d17734-c4a2-4918-987d-1da98f71eee8", "DetectTime": "2024-05-21T12:40:08.166232+00:00", "EventTime": "2024-05-21T12:40:08.166253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZGZA4fMggTAeJf7j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "5f7f6003-e0c3-4c1a-8b52-6e1fb09658f6", "DetectTime": "2024-05-21T12:40:08.215201+00:00", "EventTime": "2024-05-21T12:40:08.215222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQl7T3I4TYBI1yujb"], "accumulated_threat_level": 4.8, "timewindow": 109} +{"Format": "IDEA0", "ID": "d7a17105-4419-4b05-8d65-b765cc7d2cec", "DetectTime": "2024-05-21T12:40:08.263650+00:00", "EventTime": "2024-05-21T12:40:08.263670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTbvA2gfMpXLqPgH4"], "accumulated_threat_level": 5.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "9745a640-21b3-461d-957d-f7adf0fa739a", "DetectTime": "2024-05-21T12:40:08.302712+00:00", "EventTime": "2024-05-21T12:40:08.302735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9XoK21NV13bFXsj62"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "a15dcaa3-c21c-4bb5-ada9-f696472f1cc5", "DetectTime": "2024-05-21T12:40:08.349228+00:00", "EventTime": "2024-05-21T12:40:08.349247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCjL41V8LMqJIC9Gj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 109} +{"Format": "IDEA0", "ID": "baa02f20-2312-4cc7-a2b0-5d863dbcce71", "DetectTime": "2024-05-21T12:40:08.373305+00:00", "EventTime": "2024-05-21T12:40:08.373325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZqmUSbDhiHeuqxd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "31318276-18f2-4bba-a587-dd1e9d8539c0", "DetectTime": "2024-05-21T12:40:08.417262+00:00", "EventTime": "2024-05-21T12:40:08.417283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch7Iac1wRSayq9S2Gl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "2eef7ca0-50e9-4e09-9b92-3ecccb4b3399", "DetectTime": "2024-05-21T12:40:08.429294+00:00", "EventTime": "2024-05-21T12:40:08.429315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgvZu41WhcGTQgmbEj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "b88bd026-277e-4289-a9c7-d4f255cf6b03", "DetectTime": "2024-05-21T12:40:08.686086+00:00", "EventTime": "2024-05-21T12:40:08.686106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP17d74ulI4HH0Iaoc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "ae712972-91a9-4d06-9a36-467811d5a162", "DetectTime": "2024-05-21T12:40:08.732390+00:00", "EventTime": "2024-05-21T12:40:08.732410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnJMs2OoW62P10JLk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "84854eed-9e8b-4398-942e-d85809869e17", "DetectTime": "2024-05-21T12:40:08.778486+00:00", "EventTime": "2024-05-21T12:40:08.778504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKttKgZcbLaXSBhk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "9ac65fc4-c228-469e-a0c8-7ac6e17a765e", "DetectTime": "2024-05-21T12:40:08.817699+00:00", "EventTime": "2024-05-21T12:40:08.817719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQci4c4k3AyChPE0Wd"], "accumulated_threat_level": 9.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "2a11717d-bebe-44de-acc0-d40637b79fb7", "DetectTime": "2024-05-21T12:40:08.858377+00:00", "EventTime": "2024-05-21T12:40:08.858396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9kXs2m0ZfIrqqSH1"], "accumulated_threat_level": 10.4, "timewindow": 109} +{"Format": "IDEA0", "ID": "c32b4f53-4d97-488c-aa1c-383822a30c84", "DetectTime": "2024-05-21T12:40:08.892107+00:00", "EventTime": "2024-05-21T12:40:08.892128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgyGV28VYM8PGQ4Yj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "57f131b4-802e-45a3-8afc-a0355b8d78b2", "DetectTime": "2024-05-21T12:40:08.935391+00:00", "EventTime": "2024-05-21T12:40:08.935411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UHKrNGiwHtnb0Ud"], "accumulated_threat_level": 11.200000000000001, "timewindow": 109} +{"Format": "IDEA0", "ID": "e7feb4e1-20d5-4551-bd7c-d5acf4bd4957", "DetectTime": "2024-05-21T12:40:08.992463+00:00", "EventTime": "2024-05-21T12:40:08.992483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIAVtHQS2Rsc5e5l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 109} +{"Format": "Json", "ID": "e7feb4e1-20d5-4551-bd7c-d5acf4bd4957", "DetectTime": "2024-05-21T12:40:08.992463+00:00", "EventTime": "2024-05-21T12:40:08.992483+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "1970-01-05T12:44:02.627905+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 109. (real time 2024/05/21 12:40:09.178090)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 109, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e2737e7f-1aba-42ce-9613-f33b03e5e925", "DetectTime": "2024-05-21T12:40:09.226253+00:00", "EventTime": "2024-05-21T12:40:09.226274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMmgDuq1Y9wpJzBh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "f3e00321-1b31-4ed9-888b-7105d1b4257f", "DetectTime": "2024-05-21T12:40:09.231324+00:00", "EventTime": "2024-05-21T12:40:09.231344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyi3bG3eLHKZ3LPYac"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "f01aad8d-a3f2-4931-bc9f-59da2b694d8e", "DetectTime": "2024-05-21T12:40:09.294436+00:00", "EventTime": "2024-05-21T12:40:09.294454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgbmlz1jFWCdooAaa1"], "accumulated_threat_level": 0.8, "timewindow": 109} +{"Format": "IDEA0", "ID": "eb5e2d9f-f5b2-4b3c-890e-74d8f6da0198", "DetectTime": "2024-05-21T12:40:09.347033+00:00", "EventTime": "2024-05-21T12:40:09.347053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq2CbtwsesVFt5T4"], "accumulated_threat_level": 1.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "1438d8d3-6267-4fb6-8acc-7a5e96ce0d9e", "DetectTime": "2024-05-21T12:40:09.393211+00:00", "EventTime": "2024-05-21T12:40:09.393229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61NsE4r9b7Ii0cPxd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 109} +{"Format": "IDEA0", "ID": "f6ff9866-c54d-4e69-91fd-019fe03034db", "DetectTime": "2024-05-21T12:40:09.438892+00:00", "EventTime": "2024-05-21T12:40:09.438914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0klQp2hNrCIOwajc4"], "accumulated_threat_level": 3.2, "timewindow": 109} +{"Format": "IDEA0", "ID": "dc34c23e-040b-475c-ad84-d9722689c03f", "DetectTime": "2024-05-21T12:40:09.479165+00:00", "EventTime": "2024-05-21T12:40:09.479186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZfFy2v3tZ7nF8JU"], "accumulated_threat_level": 4.0, "timewindow": 109} +{"Format": "IDEA0", "ID": "c1110ce4-1156-4301-a5bf-429ad9c53667", "DetectTime": "2024-05-21T12:40:09.509839+00:00", "EventTime": "2024-05-21T12:40:09.509861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4vznL3KfPURYI4qXg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "1c4e745f-0d76-4ece-abe1-6a3fab7919c3", "DetectTime": "2024-05-21T12:40:09.547313+00:00", "EventTime": "2024-05-21T12:40:09.547331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxXsZu2wEA9qNr48ka"], "accumulated_threat_level": 4.8, "timewindow": 109} +{"Format": "IDEA0", "ID": "7e27396a-028b-45d7-8a1e-71f1716215a6", "DetectTime": "2024-05-21T12:40:09.568551+00:00", "EventTime": "2024-05-21T12:40:09.568571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyxff73XJgEQwWFLWi"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "062a110d-ad8d-4144-832b-968da9c30d78", "DetectTime": "2024-05-21T12:40:09.580655+00:00", "EventTime": "2024-05-21T12:40:09.580674+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyxff73XJgEQwWFLWi"], "accumulated_threat_level": 12.0, "timewindow": 26} +{"Format": "Json", "ID": "062a110d-ad8d-4144-832b-968da9c30d78", "DetectTime": "2024-05-21T12:40:09.580655+00:00", "EventTime": "2024-05-21T12:40:09.580674+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "1970-01-02T01:56:43.341857+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 26. (real time 2024/05/21 12:40:09.886212)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 26, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "59f12b93-b220-4ce9-9c00-87cb94b278e9", "DetectTime": "2024-05-21T12:40:09.916176+00:00", "EventTime": "2024-05-21T12:40:09.916194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbO9B3F5v41ppzTml"], "accumulated_threat_level": 5.6, "timewindow": 109} +{"Format": "IDEA0", "ID": "948a9de3-b39a-4258-a9ae-013a726e6f25", "DetectTime": "2024-05-21T12:40:09.929717+00:00", "EventTime": "2024-05-21T12:40:09.929738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq99QQ1jilSHxcdMh5"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "af57c97a-0451-4e8b-a44b-e67ab80774d0", "DetectTime": "2024-05-21T12:40:09.943518+00:00", "EventTime": "2024-05-21T12:40:09.943538+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq99QQ1jilSHxcdMh5"], "accumulated_threat_level": 0.5, "timewindow": 26} +{"Format": "IDEA0", "ID": "fcbfa4c8-b8b0-4993-b0c5-9aee72e7efcc", "DetectTime": "2024-05-21T12:40:09.956880+00:00", "EventTime": "2024-05-21T12:40:09.956900+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0DM23szs7NF8QYG7"], "accumulated_threat_level": 0, "timewindow": 26} +{"Format": "IDEA0", "ID": "f86370c8-8e01-43e3-ad7f-fa69515168d8", "DetectTime": "2024-05-21T12:40:09.969852+00:00", "EventTime": "2024-05-21T12:40:09.969871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0DM23szs7NF8QYG7"], "accumulated_threat_level": 1.0, "timewindow": 26} +{"Format": "IDEA0", "ID": "2558072b-4e3f-4d5f-883d-038bd35f5f5b", "DetectTime": "2024-05-21T12:40:09.982143+00:00", "EventTime": "2024-05-21T12:40:09.982164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKYRyR38z5GhbF3aL7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 109} +{"Format": "IDEA0", "ID": "01461098-6926-4244-9321-f9cda41dd4ae", "DetectTime": "2024-05-21T12:40:09.987692+00:00", "EventTime": "2024-05-21T12:40:09.987711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3kle1q7B1BvivtSc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "73327bca-83a7-4565-a020-2d7efe3c14f9", "DetectTime": "2024-05-21T12:40:09.992796+00:00", "EventTime": "2024-05-21T12:40:09.992815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiGx6A2jB7fxVp5Iwd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "b2da390e-b450-42f3-b887-22dbe7685d15", "DetectTime": "2024-05-21T12:40:10.036325+00:00", "EventTime": "2024-05-21T12:40:10.036344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd9z0a3Tj2OhQWyYx"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "aa483c41-f998-42e3-9fb6-29ef946e9b5c", "DetectTime": "2024-05-21T12:40:10.129845+00:00", "EventTime": "2024-05-21T12:40:10.129868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqmNZL1eYmXtVVDmQ3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 107} +{"Format": "IDEA0", "ID": "cc058802-9c32-431e-a40c-830aec889ba9", "DetectTime": "2024-05-21T12:40:10.182131+00:00", "EventTime": "2024-05-21T12:40:10.182157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPumo2ftDGOQxS087"], "accumulated_threat_level": 0.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "b1c67595-9d98-438d-9a2a-159683711597", "DetectTime": "2024-05-21T12:40:10.216368+00:00", "EventTime": "2024-05-21T12:40:10.216389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGmlC1PnT2k3up8s4"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "628c1297-0549-4de7-bc3c-99232e78df24", "DetectTime": "2024-05-21T12:40:10.260147+00:00", "EventTime": "2024-05-21T12:40:10.260164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5KFl23d5YLcYxbyp3"], "accumulated_threat_level": 1.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "c23ef210-2bba-46d4-8bb3-79caf7065d45", "DetectTime": "2024-05-21T12:40:10.278305+00:00", "EventTime": "2024-05-21T12:40:10.278327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwx55u1ahwXjH9sqkh"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "4ac4592d-b413-4d0e-bcd0-8bc0cfdb7136", "DetectTime": "2024-05-21T12:40:10.338443+00:00", "EventTime": "2024-05-21T12:40:10.338464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPSLbt3wFv5WA1Acy2"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "26e4ba80-d285-46d7-9e59-0710095741e9", "DetectTime": "2024-05-21T12:40:10.578090+00:00", "EventTime": "2024-05-21T12:40:10.578109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLul783DTBvDZ9Edl1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 110} +{"Format": "IDEA0", "ID": "2f87d9ce-fb07-4050-9405-de8a831b57ad", "DetectTime": "2024-05-21T12:40:10.602930+00:00", "EventTime": "2024-05-21T12:40:10.602950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDuFsP1pTW9YLp8qj6"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "7630e53f-7923-415c-8e06-0ded849a97cf", "DetectTime": "2024-05-21T12:40:10.608619+00:00", "EventTime": "2024-05-21T12:40:10.608639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uamG2svbEYqy2Zla"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "11f71351-6c99-477c-b50e-e88f06cc87d3", "DetectTime": "2024-05-21T12:40:10.678930+00:00", "EventTime": "2024-05-21T12:40:10.678952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzncl1E0y6d6cMyz2"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "703ce0b8-2b00-42e0-be65-ac4ffe99baf9", "DetectTime": "2024-05-21T12:40:10.691675+00:00", "EventTime": "2024-05-21T12:40:10.691697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrmTl3ejphEFjKIQ5"], "accumulated_threat_level": 3.2, "timewindow": 110} +{"Format": "IDEA0", "ID": "81299f14-064d-4c80-9f1e-edbd5bc6eb30", "DetectTime": "2024-05-21T12:40:10.747473+00:00", "EventTime": "2024-05-21T12:40:10.747494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXvkj2MHuUhOWSjs"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "fe12c54b-53e4-4ad9-ab5e-3f61fe6e350b", "DetectTime": "2024-05-21T12:40:10.794561+00:00", "EventTime": "2024-05-21T12:40:10.794579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgbciCtHPI4xYs5F7"], "accumulated_threat_level": 4.0, "timewindow": 110} +{"Format": "IDEA0", "ID": "54bfbed6-5114-4752-aef9-0202a5623052", "DetectTime": "2024-05-21T12:40:10.814615+00:00", "EventTime": "2024-05-21T12:40:10.814637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCG1eE1lq5b2XgLIC8"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "ffdb9522-99ea-4a15-81d9-303a7f99ccda", "DetectTime": "2024-05-21T12:40:10.852056+00:00", "EventTime": "2024-05-21T12:40:10.852078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPMpiUhA63hRGXV8"], "accumulated_threat_level": 4.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "1c36081f-4b75-4d8e-97bc-231128320b46", "DetectTime": "2024-05-21T12:40:10.881159+00:00", "EventTime": "2024-05-21T12:40:10.881180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyyzCOhMvLCvi0Sk"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "e6eeeecb-a0ff-4b6f-a83a-e2da71166685", "DetectTime": "2024-05-21T12:40:11.112462+00:00", "EventTime": "2024-05-21T12:40:11.112482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQvMAeGACr2dYYO8"], "accumulated_threat_level": 5.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "8363c1fc-f308-4b4e-b69f-6e175bf930dd", "DetectTime": "2024-05-21T12:40:11.145083+00:00", "EventTime": "2024-05-21T12:40:11.145105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7lpG5TpqN83IEq8"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "f7b260aa-8e49-4d35-9dcc-68d2a9950681", "DetectTime": "2024-05-21T12:40:11.189261+00:00", "EventTime": "2024-05-21T12:40:11.189283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcEQIuc3Gv65Fx65"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 110} +{"Format": "IDEA0", "ID": "aaf75e4f-62a5-4bc2-a11d-1d8d8b6a0c65", "DetectTime": "2024-05-21T12:40:11.344987+00:00", "EventTime": "2024-05-21T12:40:11.345006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQcTK1K7KuZnihVW6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "5c970d8f-2017-4933-90bf-702de28c0f73", "DetectTime": "2024-05-21T12:40:11.350533+00:00", "EventTime": "2024-05-21T12:40:11.350552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjSXu26zYWiiTeiUk"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "5b77aa85-edfd-4c9d-9a7e-4e6bf86a03af", "DetectTime": "2024-05-21T12:40:11.370574+00:00", "EventTime": "2024-05-21T12:40:11.370595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTO1D21LWdLiwRdkN1"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "b0255c47-9187-4a9b-a353-fbd1614013d3", "DetectTime": "2024-05-21T12:40:11.439619+00:00", "EventTime": "2024-05-21T12:40:11.439641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGBKhK3SDp9oGWX9x8"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "0ace9601-b66a-417c-9313-cb38e593c1cb", "DetectTime": "2024-05-21T12:40:11.477309+00:00", "EventTime": "2024-05-21T12:40:11.477328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6oNmm2X8yJbnQWJkg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "80924983-2b4b-419a-a6a8-4e294e32824d", "DetectTime": "2024-05-21T12:40:11.720567+00:00", "EventTime": "2024-05-21T12:40:11.720585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCp9yP12TP8e8JZHPa"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "58562a28-b381-4bc1-9d31-12fa570c4c55", "DetectTime": "2024-05-21T12:40:11.725636+00:00", "EventTime": "2024-05-21T12:40:11.725655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1tGk3zNmKDeOWDg5"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "74548488-d62d-457b-a74e-d74ed4e14abb", "DetectTime": "2024-05-21T12:40:11.790170+00:00", "EventTime": "2024-05-21T12:40:11.790189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6EXAQ1do2NHLO7P87"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "3fe6e7a9-418f-4f83-99c8-52039aff9192", "DetectTime": "2024-05-21T12:40:11.816968+00:00", "EventTime": "2024-05-21T12:40:11.816990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpu7YGx578pUQEpi3"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "b9565de0-c269-4f8b-9e55-6475165b2163", "DetectTime": "2024-05-21T12:40:11.870893+00:00", "EventTime": "2024-05-21T12:40:11.870932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpnP5AwP3A0QQevg"], "accumulated_threat_level": 9.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "773d1a63-9ddf-4867-8507-0dd3a8d7aadb", "DetectTime": "2024-05-21T12:40:11.906260+00:00", "EventTime": "2024-05-21T12:40:11.906282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBjNmGh3gRx5StS3"], "accumulated_threat_level": 10.4, "timewindow": 110} +{"Format": "IDEA0", "ID": "40980b8a-8dae-4d8b-a301-2039cb751f7c", "DetectTime": "2024-05-21T12:40:11.948102+00:00", "EventTime": "2024-05-21T12:40:11.948122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmYu91P5G9NPuuhY8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 110} +{"Format": "IDEA0", "ID": "7212f766-4954-49b7-8893-007956b0b6d2", "DetectTime": "2024-05-21T12:40:11.978057+00:00", "EventTime": "2024-05-21T12:40:11.978077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrEbzrRhlNxLWUM4"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "cd8b2a7d-5ec0-4124-87cb-12cb86d6d77e", "DetectTime": "2024-05-21T12:40:12.207238+00:00", "EventTime": "2024-05-21T12:40:12.207256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHj6DC42CcFOXnaimi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 110} +{"Format": "Json", "ID": "cd8b2a7d-5ec0-4124-87cb-12cb86d6d77e", "DetectTime": "2024-05-21T12:40:12.207238+00:00", "EventTime": "2024-05-21T12:40:12.207256+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-05T13:15:00.561151+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2024/05/21 12:40:12.642911)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 110, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7fcb3b48-6d95-4a3a-a38f-9aeaa94020dc", "DetectTime": "2024-05-21T12:40:12.654226+00:00", "EventTime": "2024-05-21T12:40:12.654250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNHZS2kc2Oe8QZVH5"], "accumulated_threat_level": 0.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "c66cc959-7454-442e-adae-96486038dfb2", "DetectTime": "2024-05-21T12:40:12.659626+00:00", "EventTime": "2024-05-21T12:40:12.659646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsybzeH7M8duoCdO9"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "27e14b9a-55d1-4685-b4c1-dc266ec47932", "DetectTime": "2024-05-21T12:40:12.791532+00:00", "EventTime": "2024-05-21T12:40:12.791555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrQ0uJqFtUoAOuXk"], "accumulated_threat_level": 1.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "518074e3-af13-44f3-aaf1-1566e8e18b09", "DetectTime": "2024-05-21T12:40:12.796714+00:00", "EventTime": "2024-05-21T12:40:12.796733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpOkG30oWaLzJwze1"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "25e02c75-32ef-4b47-8091-c0c5971ec026", "DetectTime": "2024-05-21T12:40:12.802245+00:00", "EventTime": "2024-05-21T12:40:12.802264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8eL8L3rHsd1NR02l2"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "68f2f084-6b06-44cd-b2a0-8d5fbdf41b6d", "DetectTime": "2024-05-21T12:40:12.813868+00:00", "EventTime": "2024-05-21T12:40:12.813896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBOG93rAYVyIk3FD7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 110} +{"Format": "IDEA0", "ID": "dbe78305-5f8a-478e-a29e-c1ebadb67dac", "DetectTime": "2024-05-21T12:40:12.819603+00:00", "EventTime": "2024-05-21T12:40:12.819624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzLIylB33XZJ8aJh"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "cd767903-dc14-411c-9b83-088cfa69c07a", "DetectTime": "2024-05-21T12:40:12.833187+00:00", "EventTime": "2024-05-21T12:40:12.833209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehtEe3K3gWaF7FhHc"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "d60fae8f-5074-4270-8f79-6b6bcaa580f0", "DetectTime": "2024-05-21T12:40:12.838295+00:00", "EventTime": "2024-05-21T12:40:12.838315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOTY910Cyw9ZzOdf1"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "1c85ae8f-296e-40fc-8f0b-55c5b72d7ca7", "DetectTime": "2024-05-21T12:40:12.851469+00:00", "EventTime": "2024-05-21T12:40:12.851506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0eW0o1j893QQWu0Ne"], "accumulated_threat_level": 3.2, "timewindow": 110} +{"Format": "IDEA0", "ID": "7da7b85c-155d-4ecc-8c4b-7b71218f5668", "DetectTime": "2024-05-21T12:40:12.857202+00:00", "EventTime": "2024-05-21T12:40:12.857223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtA7bt2CI777fdwqkj"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "6f1843ca-81d1-46fd-9cfb-e645e600f47a", "DetectTime": "2024-05-21T12:40:12.862132+00:00", "EventTime": "2024-05-21T12:40:12.862151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CncL93pZb2R8CqWS1"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "92abd739-e07f-450a-9fc6-84567df1e69f", "DetectTime": "2024-05-21T12:40:12.921868+00:00", "EventTime": "2024-05-21T12:40:12.921890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApuZolmKJ6KpG6Bj"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "f5123c77-9df8-4331-8e6e-e7a7facbe794", "DetectTime": "2024-05-21T12:40:12.941274+00:00", "EventTime": "2024-05-21T12:40:12.941303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfdlG48XnpZFzakQ7"], "accumulated_threat_level": 4.0, "timewindow": 110} +{"Format": "IDEA0", "ID": "2d7858da-5f66-441c-a717-a6bf76fb4102", "DetectTime": "2024-05-21T12:40:12.977875+00:00", "EventTime": "2024-05-21T12:40:12.977896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3Ihp1rfhopL2jBZc"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "8706ffa3-4deb-4d94-9a12-123bd928e5f6", "DetectTime": "2024-05-21T12:40:13.029046+00:00", "EventTime": "2024-05-21T12:40:13.029067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNRzPA3u7nseuG1xqf"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "8460ec4b-6c89-4873-a7e2-342ed13b6101", "DetectTime": "2024-05-21T12:40:13.070025+00:00", "EventTime": "2024-05-21T12:40:13.070051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccp3W64Z5cqvMHS2j"], "accumulated_threat_level": 4.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "cee8f78b-48b8-4b50-9f1d-8bba7b4ef11b", "DetectTime": "2024-05-21T12:40:13.075549+00:00", "EventTime": "2024-05-21T12:40:13.075569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkYDYz4X405okRVaS1"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "d47ecd28-cc40-462d-9a16-2a5f454b7c94", "DetectTime": "2024-05-21T12:40:13.331443+00:00", "EventTime": "2024-05-21T12:40:13.331463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKPMM1MvzzHXYs8P2"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "64657329-4ff6-45ef-b837-f928f5136bad", "DetectTime": "2024-05-21T12:40:13.395113+00:00", "EventTime": "2024-05-21T12:40:13.395190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExBZ22xQex9gtYPMb"], "accumulated_threat_level": 5.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "164d838c-dbcb-4e72-bbdf-bdfb17b4259d", "DetectTime": "2024-05-21T12:40:13.414238+00:00", "EventTime": "2024-05-21T12:40:13.414261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQeS7yN14YVrsZ3Re"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "2444712a-5de4-4059-83d5-8b757d76d257", "DetectTime": "2024-05-21T12:40:13.462528+00:00", "EventTime": "2024-05-21T12:40:13.462547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4btPw2iA80kDWXEPe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 110} +{"Format": "IDEA0", "ID": "91022639-042d-45fd-80a3-3cd34afd3c89", "DetectTime": "2024-05-21T12:40:13.514832+00:00", "EventTime": "2024-05-21T12:40:13.514852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82GIn4BmPn3cPUlX1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "17e6c73e-a4bc-41d4-b325-5d7fb910b20c", "DetectTime": "2024-05-21T12:40:13.536794+00:00", "EventTime": "2024-05-21T12:40:13.536817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRP0A83bTWdviNmTcj"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "a70cd86b-e5ef-419e-ab45-8be2ff82561d", "DetectTime": "2024-05-21T12:40:13.580913+00:00", "EventTime": "2024-05-21T12:40:13.580935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzysdG1alxDR6e3qch"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "c04a4db8-0b12-4ce6-996c-99e4f4cc09ac", "DetectTime": "2024-05-21T12:40:13.618635+00:00", "EventTime": "2024-05-21T12:40:13.618658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMQ5BoJSO15ILxn1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "d9600ac5-e84d-4687-bb01-3bb7fc46da2c", "DetectTime": "2024-05-21T12:40:13.648013+00:00", "EventTime": "2024-05-21T12:40:13.648036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9zJS3Ofchp5CxuOf"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "b9611b08-8a93-48dc-af86-2a1c93058fcf", "DetectTime": "2024-05-21T12:40:13.691315+00:00", "EventTime": "2024-05-21T12:40:13.691337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASz45pAbNUvL1R48"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "9453f856-9a78-4a7c-a28a-b4a506805324", "DetectTime": "2024-05-21T12:40:13.703607+00:00", "EventTime": "2024-05-21T12:40:13.703623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvcOv2MhPWSQqlNT3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "82cb6961-3401-4b86-b8c7-a2f7e31c118e", "DetectTime": "2024-05-21T12:40:13.967500+00:00", "EventTime": "2024-05-21T12:40:13.967520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChOEeJB4A92Fisov3"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "4cca13c8-c16f-4d16-a203-376a3f637438", "DetectTime": "2024-05-21T12:40:13.999802+00:00", "EventTime": "2024-05-21T12:40:13.999825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqLIY1O2N3Xpw2Uii"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "a1ff6142-e7dd-49fc-b0f2-4ca126f35525", "DetectTime": "2024-05-21T12:40:14.018825+00:00", "EventTime": "2024-05-21T12:40:14.018843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOZt01SRaT0aAnwXg"], "accumulated_threat_level": 9.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "2fa8c269-4cfb-45bd-ba06-b9c14aecc112", "DetectTime": "2024-05-21T12:40:14.072626+00:00", "EventTime": "2024-05-21T12:40:14.072657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEKMl1xKAmUlaxiLl"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "bea12a7a-8715-4077-8286-9e7afd8590b7", "DetectTime": "2024-05-21T12:40:14.112911+00:00", "EventTime": "2024-05-21T12:40:14.112931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMox42rl4AFSsseHh"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "00a18137-32d7-4e52-9054-efff5549d53d", "DetectTime": "2024-05-21T12:40:14.152619+00:00", "EventTime": "2024-05-21T12:40:14.152643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8D2dtsl2YIjJDvpf"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "497bc17a-77b7-4252-922f-529b2993a0b2", "DetectTime": "2024-05-21T12:40:14.164978+00:00", "EventTime": "2024-05-21T12:40:14.164995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9P2O2kWjjrqitrQ2"], "accumulated_threat_level": 10.4, "timewindow": 110} +{"Format": "IDEA0", "ID": "8d68223f-d013-4ad4-92e7-62eaaeb3367a", "DetectTime": "2024-05-21T12:40:14.228465+00:00", "EventTime": "2024-05-21T12:40:14.228485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiaxTN6XDInxlaZTb"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "47befae6-5bd9-446e-bad3-e341e3f8c939", "DetectTime": "2024-05-21T12:40:14.471590+00:00", "EventTime": "2024-05-21T12:40:14.471613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LdS44GPMgmDhHMjb"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "d3208f4a-00f3-4353-b044-837925e9e567", "DetectTime": "2024-05-21T12:40:14.528741+00:00", "EventTime": "2024-05-21T12:40:14.528763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjpKgn2eHuf5fjtuCi"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "3fe10c06-583d-4d87-8403-ce83c4f866ac", "DetectTime": "2024-05-21T12:40:14.535361+00:00", "EventTime": "2024-05-21T12:40:14.535380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZFN54LJuRYXu5x5g"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "a6487452-dd0b-4774-b4d2-b8fec12d0004", "DetectTime": "2024-05-21T12:40:14.539864+00:00", "EventTime": "2024-05-21T12:40:14.539883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbq05s4AxZIlBZmP88"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "bdc0228d-f571-4bcd-a11f-921f69b99c42", "DetectTime": "2024-05-21T12:40:14.598450+00:00", "EventTime": "2024-05-21T12:40:14.598472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5hyo1fqnu1oJCVsa"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "b7264eaa-a658-49bc-a075-2d5d67a60d4d", "DetectTime": "2024-05-21T12:40:14.672056+00:00", "EventTime": "2024-05-21T12:40:14.672077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIRtKc1FVhRYhWdDGf"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "00f34917-bbfd-40c3-a92c-c071799212cc", "DetectTime": "2024-05-21T12:40:14.714546+00:00", "EventTime": "2024-05-21T12:40:14.714568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjpqjr3TKXj29nStX5"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "39543875-7fca-47cc-b61f-8501f030a59c", "DetectTime": "2024-05-21T12:40:14.725923+00:00", "EventTime": "2024-05-21T12:40:14.725941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kl9HEnjjyGBK3U9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 110} +{"Format": "IDEA0", "ID": "8879dbd1-a1c4-410c-b51d-b54efe4bfa41", "DetectTime": "2024-05-21T12:40:14.968545+00:00", "EventTime": "2024-05-21T12:40:14.968565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCzyC13LyCoQxDT9i1"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "d66d1305-b77e-42b7-ab20-f0aadd05d309", "DetectTime": "2024-05-21T12:40:15.011483+00:00", "EventTime": "2024-05-21T12:40:15.011505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zhjC30MpieO1WPnh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 110} +{"Format": "Json", "ID": "d66d1305-b77e-42b7-ab20-f0aadd05d309", "DetectTime": "2024-05-21T12:40:15.011483+00:00", "EventTime": "2024-05-21T12:40:15.011505+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "1970-01-05T13:45:09.142786+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2024/05/21 12:40:15.183349)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 110, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2196ebea-04c4-4186-b695-4dc35f657391", "DetectTime": "2024-05-21T12:40:15.193877+00:00", "EventTime": "2024-05-21T12:40:15.193896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj22eC324T0JWpLdQj"], "accumulated_threat_level": 0.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "1ca8fd45-3fc7-4154-bb1f-8aca3fcf6beb", "DetectTime": "2024-05-21T12:40:15.199387+00:00", "EventTime": "2024-05-21T12:40:15.199412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6P1Jv4fhhhgf0svPk"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "86de6cc0-2f15-4c58-87bc-65a095c4b15f", "DetectTime": "2024-05-21T12:40:15.211273+00:00", "EventTime": "2024-05-21T12:40:15.211303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjN664sgPqCpuQGah"], "accumulated_threat_level": 1.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "b41b77db-054a-4f62-90ae-5957f5f6becf", "DetectTime": "2024-05-21T12:40:15.234667+00:00", "EventTime": "2024-05-21T12:40:15.234699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmxYY2doENMB1m9yj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 110} +{"Format": "IDEA0", "ID": "19b44b27-b8e9-497f-9af6-02b5c4080a00", "DetectTime": "2024-05-21T12:40:15.250731+00:00", "EventTime": "2024-05-21T12:40:15.250751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv5jlD2BPM3QyTDAUl"], "accumulated_threat_level": 3.2, "timewindow": 110} +{"Format": "IDEA0", "ID": "bbf416da-601d-49ef-9820-016f47ed3b66", "DetectTime": "2024-05-21T12:40:15.267715+00:00", "EventTime": "2024-05-21T12:40:15.267734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwlRC27wJ0Ijhy4Hk"], "accumulated_threat_level": 4.0, "timewindow": 110} +{"Format": "IDEA0", "ID": "4feb5037-ffab-4f3b-ae95-6f66dca2b979", "DetectTime": "2024-05-21T12:40:15.514434+00:00", "EventTime": "2024-05-21T12:40:15.514455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2G16G3LiyyiWmVsik"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "0edc2fe5-ff19-471e-8d2f-09dc56dcc644", "DetectTime": "2024-05-21T12:40:15.519317+00:00", "EventTime": "2024-05-21T12:40:15.519337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOqtp1szcfT0AuV6d"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "2cdff8f0-2aea-4a42-9fcd-2fa91993e814", "DetectTime": "2024-05-21T12:40:15.524461+00:00", "EventTime": "2024-05-21T12:40:15.524480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqbBf3SOIrG4sCCwa"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "260f4392-cd57-4329-87a0-3363d287f38e", "DetectTime": "2024-05-21T12:40:15.536146+00:00", "EventTime": "2024-05-21T12:40:15.536165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C27z5p3oqelJnNMSa7"], "accumulated_threat_level": 4.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "b72484f9-28b7-48ea-8c5c-f54c73e2629c", "DetectTime": "2024-05-21T12:40:15.661366+00:00", "EventTime": "2024-05-21T12:40:15.661388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd0lp22yY1JoYdlVH6"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "aee64f1f-4bd9-432a-bed8-ee51de0f5dba", "DetectTime": "2024-05-21T12:40:15.701877+00:00", "EventTime": "2024-05-21T12:40:15.701898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmyEWC2qXCwFm0qBD4"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "d337db59-516d-4e8f-baca-5c7d0a290df7", "DetectTime": "2024-05-21T12:40:15.706714+00:00", "EventTime": "2024-05-21T12:40:15.706735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCrjel4r21DIRL5Wld"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "114f965a-c9ee-417f-ab37-d69d7f5ccaf6", "DetectTime": "2024-05-21T12:40:15.772762+00:00", "EventTime": "2024-05-21T12:40:15.772793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsH0bw4f8Uq9ntTrz5"], "accumulated_threat_level": 5.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "bfbb2ecf-d1e7-41b2-9c89-1a886cccc0ec", "DetectTime": "2024-05-21T12:40:16.017658+00:00", "EventTime": "2024-05-21T12:40:16.017679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8Tsl4vGct1j5YqN4"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "b8076d5d-c16a-437a-aa96-c1b973e9e90d", "DetectTime": "2024-05-21T12:40:16.060650+00:00", "EventTime": "2024-05-21T12:40:16.060669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw9cT92Pok3kKR7oCj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 110} +{"Format": "IDEA0", "ID": "4e80ba6c-7ede-445d-bbd8-6a5ba76aa035", "DetectTime": "2024-05-21T12:40:16.089977+00:00", "EventTime": "2024-05-21T12:40:16.089999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwQhhG2nVa19kVBAg"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "280cba7f-5bd0-4a88-a7a2-ed5ab529a328", "DetectTime": "2024-05-21T12:40:16.132350+00:00", "EventTime": "2024-05-21T12:40:16.132369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMPdISOAVQ9c9Cj2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "3a8107fd-1ce4-41bb-b2c7-d7eba88f2baa", "DetectTime": "2024-05-21T12:40:16.175774+00:00", "EventTime": "2024-05-21T12:40:16.175797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrPZB5TMaDWzqzj3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "af0f3b04-cc6d-4928-9200-9db1e3a55af3", "DetectTime": "2024-05-21T12:40:16.212262+00:00", "EventTime": "2024-05-21T12:40:16.212282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXmQX1vwdh00UyS9"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "fbd01c49-d049-4b69-a761-db2b89e61e40", "DetectTime": "2024-05-21T12:40:16.255046+00:00", "EventTime": "2024-05-21T12:40:16.255066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNZ1j5bbcQSJbXdf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "58a4d35b-39f9-4ed3-81ca-d4e127982fdb", "DetectTime": "2024-05-21T12:40:16.298032+00:00", "EventTime": "2024-05-21T12:40:16.298052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COc19z46PaN0XoKdk1"], "accumulated_threat_level": 9.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "aad1c3bd-bdc3-4eb2-b884-83c4bc3a1f49", "DetectTime": "2024-05-21T12:40:16.340801+00:00", "EventTime": "2024-05-21T12:40:16.340820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuBoJ2beNslFEXUX"], "accumulated_threat_level": 10.4, "timewindow": 110} +{"Format": "IDEA0", "ID": "99c406e4-180e-4381-b9da-b90f14540b78", "DetectTime": "2024-05-21T12:40:16.384374+00:00", "EventTime": "2024-05-21T12:40:16.384392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CamLkk4OBBTDzRVFha"], "accumulated_threat_level": 11.200000000000001, "timewindow": 110} +{"Format": "IDEA0", "ID": "e17ff3af-a97c-4a3e-ac81-f9aa3eb94368", "DetectTime": "2024-05-21T12:40:16.429193+00:00", "EventTime": "2024-05-21T12:40:16.429213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPG2263YfDd8SfK5uk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 110} +{"Format": "Json", "ID": "e17ff3af-a97c-4a3e-ac81-f9aa3eb94368", "DetectTime": "2024-05-21T12:40:16.429193+00:00", "EventTime": "2024-05-21T12:40:16.429213+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-05T13:45:12.399482+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 110. (real time 2024/05/21 12:40:16.612156)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 110, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "61a7c52a-66f9-42dd-a1c5-ff3960b9f35d", "DetectTime": "2024-05-21T12:40:16.623912+00:00", "EventTime": "2024-05-21T12:40:16.623934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJxIOZqNkRI8TM32"], "accumulated_threat_level": 0.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "73d1e6ca-d333-4ec0-b776-1ee4fc382ae8", "DetectTime": "2024-05-21T12:40:16.699673+00:00", "EventTime": "2024-05-21T12:40:16.699694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDHIT54fBVjVhjtCm5"], "accumulated_threat_level": 0, "timewindow": 108} +{"Format": "IDEA0", "ID": "321d0575-3381-4c88-bd29-361294b94d3d", "DetectTime": "2024-05-21T12:40:16.735535+00:00", "EventTime": "2024-05-21T12:40:16.735559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgk62g2RiBo1C9Yy1f"], "accumulated_threat_level": 1.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "0de0e546-ff90-41e8-a680-1c04c072d746", "DetectTime": "2024-05-21T12:40:16.777354+00:00", "EventTime": "2024-05-21T12:40:16.777377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZoWt4PnEHCMPIIO2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "b8ecf868-9cc8-42fd-9bd4-a9c7183adb14", "DetectTime": "2024-05-21T12:40:16.822395+00:00", "EventTime": "2024-05-21T12:40:16.822425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBaFR1rn0EDTG6tgd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 110} +{"Format": "IDEA0", "ID": "11cfc7dd-6864-4489-a5ca-1c2a185e5251", "DetectTime": "2024-05-21T12:40:16.860146+00:00", "EventTime": "2024-05-21T12:40:16.860166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIA4bM33OFzBvF3EEd"], "accumulated_threat_level": 3.2, "timewindow": 110} +{"Format": "IDEA0", "ID": "167ce605-510b-40b3-8d84-3c9b9a199b64", "DetectTime": "2024-05-21T12:40:16.901519+00:00", "EventTime": "2024-05-21T12:40:16.901539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhSiQ1pSXg2sktPu9"], "accumulated_threat_level": 4.0, "timewindow": 110} +{"Format": "IDEA0", "ID": "380897b1-b619-4616-948b-2fa3fdc90557", "DetectTime": "2024-05-21T12:40:16.945559+00:00", "EventTime": "2024-05-21T12:40:16.945581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNev3C4YNLsIOY1aWb"], "accumulated_threat_level": 4.8, "timewindow": 110} +{"Format": "IDEA0", "ID": "b06cf4f8-1502-4ff0-abf7-f2b2fa2733c4", "DetectTime": "2024-05-21T12:40:16.991379+00:00", "EventTime": "2024-05-21T12:40:16.991398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClBWNo4LB1F3v90VBa"], "accumulated_threat_level": 5.6, "timewindow": 110} +{"Format": "IDEA0", "ID": "2aa15b1b-27c0-4bfe-956b-3564345604a6", "DetectTime": "2024-05-21T12:40:17.032570+00:00", "EventTime": "2024-05-21T12:40:17.032591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6OHfy4PGvUfaqmtv1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 110} +{"Format": "IDEA0", "ID": "c69a3fc6-72f0-466d-bcd4-aec6d17d5e83", "DetectTime": "2024-05-21T12:40:17.417529+00:00", "EventTime": "2024-05-21T12:40:17.417548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFYlD2DIU8m0enOqi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "ba64cadf-13f1-448d-ab90-46d4cb6d5ac9", "DetectTime": "2024-05-21T12:40:17.422277+00:00", "EventTime": "2024-05-21T12:40:17.422295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rXHG3TGztPYPAEu"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "aa34abd8-1b3c-41a4-a855-0553c764c600", "DetectTime": "2024-05-21T12:40:17.427111+00:00", "EventTime": "2024-05-21T12:40:17.427135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpaA2fb2aVFo5dWIj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "26a14d4d-6234-4d6a-b3d0-d99cc2496112", "DetectTime": "2024-05-21T12:40:17.432265+00:00", "EventTime": "2024-05-21T12:40:17.432285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAStxJ1ykYN8oH7Txg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "f3e0cd1f-9185-4cf8-974c-6ed6b50a0785", "DetectTime": "2024-05-21T12:40:17.437465+00:00", "EventTime": "2024-05-21T12:40:17.437485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyMejDeVVGcWoEfb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "5a4fa21d-eb23-4868-ba26-864f25852a0b", "DetectTime": "2024-05-21T12:40:17.507236+00:00", "EventTime": "2024-05-21T12:40:17.507259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHrMI2tcgHwIa7FF1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "62ac7762-d3ed-4384-a5ea-e65a86609ed1", "DetectTime": "2024-05-21T12:40:17.601994+00:00", "EventTime": "2024-05-21T12:40:17.602015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDAQ2E4wo8p3sGcmg5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "c7348371-588d-4473-8fcb-e6991cf94719", "DetectTime": "2024-05-21T12:40:17.643305+00:00", "EventTime": "2024-05-21T12:40:17.643324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6Pc03ANu2p8i0nR3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "10e26309-4656-4dbe-acf3-16e209fe07ee", "DetectTime": "2024-05-21T12:40:17.679079+00:00", "EventTime": "2024-05-21T12:40:17.679100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34HEJ3OpK1NEN1at"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "2898f4be-5793-4cb3-a144-9fb0cd494074", "DetectTime": "2024-05-21T12:40:17.912245+00:00", "EventTime": "2024-05-21T12:40:17.912268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmVQWJ1W3mrlo7kNFd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "a93912c4-0b8a-4d43-92d6-9bb6bef00db1", "DetectTime": "2024-05-21T12:40:18.012984+00:00", "EventTime": "2024-05-21T12:40:18.013005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJo51h1sqt65vq6pE5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "3657a7a8-df19-4f13-8555-e7e658d6159b", "DetectTime": "2024-05-21T12:40:18.025661+00:00", "EventTime": "2024-05-21T12:40:18.025682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLiDv30LcQOH4Zj0j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "5803308e-01e2-435f-81f8-3ac4bca13c57", "DetectTime": "2024-05-21T12:40:18.032287+00:00", "EventTime": "2024-05-21T12:40:18.032306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVPjob1YZLQQSOEmrh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "8e25528d-3ecd-413a-aa10-c5d0e45180ca", "DetectTime": "2024-05-21T12:40:18.036871+00:00", "EventTime": "2024-05-21T12:40:18.036890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDGVXNZ7t3g626t7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "602dca84-ee70-49c1-af4d-c44020d114cf", "DetectTime": "2024-05-21T12:40:18.041596+00:00", "EventTime": "2024-05-21T12:40:18.041620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRvRx3rxILyctqkx4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "fcebeecb-243f-4c28-9523-5587f9c60dd8", "DetectTime": "2024-05-21T12:40:18.047005+00:00", "EventTime": "2024-05-21T12:40:18.047028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9MPhpMvBtJKmBe8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "9ff37a2e-7a1d-40c5-94b1-a25b550a094f", "DetectTime": "2024-05-21T12:40:18.052388+00:00", "EventTime": "2024-05-21T12:40:18.052410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAMe9235n2UDgkYJy7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "1869093f-a8ad-48f1-a933-cee0b634c546", "DetectTime": "2024-05-21T12:40:18.057473+00:00", "EventTime": "2024-05-21T12:40:18.057493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnujS3RlK1ghnTGg4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "cc8d6ea6-6457-48a8-a2c3-944392e21a56", "DetectTime": "2024-05-21T12:40:18.144465+00:00", "EventTime": "2024-05-21T12:40:18.144488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57u2h15tUhW7avLgh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "e7a85fb4-daed-4511-869c-15082c8165ba", "DetectTime": "2024-05-21T12:40:18.538304+00:00", "EventTime": "2024-05-21T12:40:18.538326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCEzj6I1EPK7HMza"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "b8c64399-6fdf-4a16-82fb-5628042151bd", "DetectTime": "2024-05-21T12:40:18.584797+00:00", "EventTime": "2024-05-21T12:40:18.584817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zXf41PkKxykdrXy7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "a87d62fb-5e80-4c7d-a941-e52dc50a84da", "DetectTime": "2024-05-21T12:40:18.610221+00:00", "EventTime": "2024-05-21T12:40:18.610243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsfcv2yqzRXKHnuje"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "cd29dc44-1679-4bc8-ad82-d7fdedefefad", "DetectTime": "2024-05-21T12:40:18.629364+00:00", "EventTime": "2024-05-21T12:40:18.629385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6mjQ341fW0uIcnv9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "7f05a6cd-91c4-4a19-ad5b-04ec7e9d9737", "DetectTime": "2024-05-21T12:40:18.635285+00:00", "EventTime": "2024-05-21T12:40:18.635306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csv8Ho1JfBLxA8toI"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "7297caaa-3605-4ab3-9faa-eefa586f7139", "DetectTime": "2024-05-21T12:40:18.640178+00:00", "EventTime": "2024-05-21T12:40:18.640197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJtmU2RxbpjLICQPg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "8ae44bb0-2cfd-408c-a9ab-bf24276c68e8", "DetectTime": "2024-05-21T12:40:19.021209+00:00", "EventTime": "2024-05-21T12:40:19.021234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8p4a210qeZfTgrwMj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "6e9b80ef-057a-4e6b-99f9-2ebf787e0bd0", "DetectTime": "2024-05-21T12:40:19.029141+00:00", "EventTime": "2024-05-21T12:40:19.029160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwnG51oPkCoQWav11"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "d8deab64-7585-4991-9a0b-0044d2434651", "DetectTime": "2024-05-21T12:40:19.057561+00:00", "EventTime": "2024-05-21T12:40:19.057582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQdw6O2djZbMYjsi52"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "b19641ad-5862-43d9-8c0f-3fec492d2629", "DetectTime": "2024-05-21T12:40:19.141555+00:00", "EventTime": "2024-05-21T12:40:19.141582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CweXROhPMBdRCBGC3"], "accumulated_threat_level": 0.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "cc19cebc-9afe-4c93-a605-a7b6099f36d6", "DetectTime": "2024-05-21T12:40:19.186483+00:00", "EventTime": "2024-05-21T12:40:19.186511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7uH62Nv3Ml2g7r8a"], "accumulated_threat_level": 1.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "4c21e8c7-dda9-44bd-a0ae-ae6de7feb3e8", "DetectTime": "2024-05-21T12:40:19.222848+00:00", "EventTime": "2024-05-21T12:40:19.222869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeY2D424m7s1h7l6hd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "12736517-019f-44cf-a12c-8b431416bc44", "DetectTime": "2024-05-21T12:40:19.451416+00:00", "EventTime": "2024-05-21T12:40:19.451438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbN5Ow1PZ860b2dahd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 111} +{"Format": "IDEA0", "ID": "e36777a3-90bb-43ef-b426-27b069f4b839", "DetectTime": "2024-05-21T12:40:19.492815+00:00", "EventTime": "2024-05-21T12:40:19.492838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKJvl33mZFTn42zmj"], "accumulated_threat_level": 3.2, "timewindow": 111} +{"Format": "IDEA0", "ID": "ef3c765b-ce23-485b-979a-0fc0341ba00a", "DetectTime": "2024-05-21T12:40:19.547731+00:00", "EventTime": "2024-05-21T12:40:19.547749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7qBl16wro2J29dra"], "accumulated_threat_level": 4.0, "timewindow": 111} +{"Format": "IDEA0", "ID": "e4496e02-0b07-439d-ac68-188b80064147", "DetectTime": "2024-05-21T12:40:19.570934+00:00", "EventTime": "2024-05-21T12:40:19.570955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoxL44W0JfuSVTyTd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "d7094ac2-b0a9-4f88-8efe-0d87c805d682", "DetectTime": "2024-05-21T12:40:19.624318+00:00", "EventTime": "2024-05-21T12:40:19.624336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rKJW1dQNnvvJPmDe"], "accumulated_threat_level": 4.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "d830a58d-5c01-4240-92c2-07bb490a8662", "DetectTime": "2024-05-21T12:40:19.667464+00:00", "EventTime": "2024-05-21T12:40:19.667485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9LDA3Df9HFmoWdJ9"], "accumulated_threat_level": 5.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "43584443-50fd-4a0b-84e8-5501347a9d53", "DetectTime": "2024-05-21T12:40:19.710675+00:00", "EventTime": "2024-05-21T12:40:19.710698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8l7D4RxpcIS3bTIe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 111} +{"Format": "IDEA0", "ID": "816dca79-4dd1-4943-82ec-cfcef4f5d4f6", "DetectTime": "2024-05-21T12:40:19.752887+00:00", "EventTime": "2024-05-21T12:40:19.752908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggQfv2dPirO21hwcd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "840e6356-10cf-4f47-8076-136dde170917", "DetectTime": "2024-05-21T12:40:19.785993+00:00", "EventTime": "2024-05-21T12:40:19.786015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy41h3cw07WksYRp1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "68ea2b7a-43af-416b-b859-08ad4afd4f23", "DetectTime": "2024-05-21T12:40:19.823867+00:00", "EventTime": "2024-05-21T12:40:19.823887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF8FjVh8lod3F9e5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "4da77b28-73f6-4264-b609-3ba0ad834d89", "DetectTime": "2024-05-21T12:40:19.870973+00:00", "EventTime": "2024-05-21T12:40:19.870991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYL0S2MKBcLuM5mZe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "7627190c-8f26-4c9e-839a-3234dde5adcf", "DetectTime": "2024-05-21T12:40:20.098156+00:00", "EventTime": "2024-05-21T12:40:20.098180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0tQjv7hCG2PbfAh"], "accumulated_threat_level": 9.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "43c6367c-625b-4fec-a9cf-b20d6abc26eb", "DetectTime": "2024-05-21T12:40:20.147206+00:00", "EventTime": "2024-05-21T12:40:20.147226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNha3C1o9ElUIcRKsi"], "accumulated_threat_level": 10.4, "timewindow": 111} +{"Format": "IDEA0", "ID": "26e04667-e1ae-4df0-8cd3-726432d896d8", "DetectTime": "2024-05-21T12:40:20.167094+00:00", "EventTime": "2024-05-21T12:40:20.167116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZtf54zRt86hENQS5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "62a9ae89-04df-4e5d-a564-15ef1ca3e3a0", "DetectTime": "2024-05-21T12:40:20.223542+00:00", "EventTime": "2024-05-21T12:40:20.223573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0hlUm1Hrfbn6aPQJa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 111} +{"Format": "IDEA0", "ID": "af91c4c4-e482-4828-9c74-be3701e2bae3", "DetectTime": "2024-05-21T12:40:20.270206+00:00", "EventTime": "2024-05-21T12:40:20.270245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlEXa2IL7Ze2zZOWf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 111} +{"Format": "Json", "ID": "af91c4c4-e482-4828-9c74-be3701e2bae3", "DetectTime": "2024-05-21T12:40:20.270206+00:00", "EventTime": "2024-05-21T12:40:20.270245+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-05T14:15:54.252141+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2024/05/21 12:40:20.441993)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 111, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "03e9e752-feb5-46e1-882b-611200225578", "DetectTime": "2024-05-21T12:40:20.452455+00:00", "EventTime": "2024-05-21T12:40:20.452473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPd0b15PWWpDu0PAg"], "accumulated_threat_level": 0.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "8e579577-0453-4e7a-afcd-7c0288d6813d", "DetectTime": "2024-05-21T12:40:20.463054+00:00", "EventTime": "2024-05-21T12:40:20.463080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CChncn1epotYI6tDy3"], "accumulated_threat_level": 1.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "1a0afe36-f9af-476e-b892-906f1ae5c99f", "DetectTime": "2024-05-21T12:40:20.476764+00:00", "EventTime": "2024-05-21T12:40:20.476783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C91gpa45W3Tbdc70h5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 111} +{"Format": "IDEA0", "ID": "bd2f855e-d10c-4fec-81cc-18db8bcb2a0d", "DetectTime": "2024-05-21T12:40:20.523387+00:00", "EventTime": "2024-05-21T12:40:20.523408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bLg61Mxa5RkEBJYd"], "accumulated_threat_level": 3.2, "timewindow": 111} +{"Format": "IDEA0", "ID": "51e6597b-251a-4f6f-98eb-0cf5483a6021", "DetectTime": "2024-05-21T12:40:20.568579+00:00", "EventTime": "2024-05-21T12:40:20.568598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUdJB3DaGkrjTZYAj"], "accumulated_threat_level": 4.0, "timewindow": 111} +{"Format": "IDEA0", "ID": "c002e649-92bc-4a05-9104-afc627807daf", "DetectTime": "2024-05-21T12:40:20.803432+00:00", "EventTime": "2024-05-21T12:40:20.803453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5zmrb28oNlUwtVhOc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "03f85283-ec6e-4d79-9e86-57a018532b74", "DetectTime": "2024-05-21T12:40:20.808277+00:00", "EventTime": "2024-05-21T12:40:20.808297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u8qa2zMcn2ptf3Eg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "a457de2f-7afc-4164-ba5c-a615dc3b5575", "DetectTime": "2024-05-21T12:40:20.812745+00:00", "EventTime": "2024-05-21T12:40:20.812763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.207.22.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM6qNm1qSbgQjvUMad"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "043024e4-bd2b-4195-abfe-3c6bff62cb60", "DetectTime": "2024-05-21T12:40:20.868386+00:00", "EventTime": "2024-05-21T12:40:20.868406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6Ind1C1aT30gRu34"], "accumulated_threat_level": 4.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "9199437a-7c99-4eeb-b66e-da7560ef937f", "DetectTime": "2024-05-21T12:40:20.936251+00:00", "EventTime": "2024-05-21T12:40:20.936271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgMiPjULCrnzHWb7"], "accumulated_threat_level": 5.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "53b792ce-254b-4c7d-8381-a8780bb5f4f9", "DetectTime": "2024-05-21T12:40:20.981910+00:00", "EventTime": "2024-05-21T12:40:20.981944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBV763xU3QnAEUq48"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 111} +{"Format": "IDEA0", "ID": "189f9f9f-6bb0-4a17-b338-5e1c7e687418", "DetectTime": "2024-05-21T12:40:21.021346+00:00", "EventTime": "2024-05-21T12:40:21.021376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIai12ZkTaFdUfTQb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "1be38244-6645-427e-bb36-df1a0fa98473", "DetectTime": "2024-05-21T12:40:21.064822+00:00", "EventTime": "2024-05-21T12:40:21.064858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWx12wKm7hLcmgoQ4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "17c29ecf-e34c-4a5d-8d27-bee85dff2f30", "DetectTime": "2024-05-21T12:40:21.082835+00:00", "EventTime": "2024-05-21T12:40:21.082857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRS1Tt3C81gqoVQDbh", "CYOsjK2HsoRpBpq5Ui", "C6AHhr3OfoWPxcWXl2", "C0g4lP3uvv4vttN95g"], "accumulated_threat_level": 0.5, "timewindow": 112} +{"Format": "IDEA0", "ID": "08dfa9b6-a6a0-49e5-b14d-93f9dadde0a3", "DetectTime": "2024-05-21T12:40:21.114302+00:00", "EventTime": "2024-05-21T12:40:21.114320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hoPX2CK5On5mCbQ4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "4d7acd21-1dcb-4aaa-b028-c8fbca157fc1", "DetectTime": "2024-05-21T12:40:21.167458+00:00", "EventTime": "2024-05-21T12:40:21.167497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEet6tNnrMW3QNJ95"], "accumulated_threat_level": 9.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "fb3395e7-911f-4d3d-b3dc-62def96d3e77", "DetectTime": "2024-05-21T12:40:21.476757+00:00", "EventTime": "2024-05-21T12:40:21.476775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChxqtE4hW422fqE2a9"], "accumulated_threat_level": 10.4, "timewindow": 111} +{"Format": "IDEA0", "ID": "f9f74f29-e07e-43d7-9f25-79c5414c1d44", "DetectTime": "2024-05-21T12:40:21.516467+00:00", "EventTime": "2024-05-21T12:40:21.516487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0FDd44wev7N2AXV3a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 111} +{"Format": "IDEA0", "ID": "97158351-13d3-471b-9cd4-50d92042280f", "DetectTime": "2024-05-21T12:40:21.561251+00:00", "EventTime": "2024-05-21T12:40:21.561272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNMYZOGxG9mpttaf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 111} +{"Format": "Json", "ID": "97158351-13d3-471b-9cd4-50d92042280f", "DetectTime": "2024-05-21T12:40:21.561251+00:00", "EventTime": "2024-05-21T12:40:21.561272+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-05T14:46:13.182296+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2024/05/21 12:40:21.752830)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 111, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "433337f9-f694-4b04-8806-03a0a92ec8b2", "DetectTime": "2024-05-21T12:40:21.764874+00:00", "EventTime": "2024-05-21T12:40:21.764900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C42lbC4XAGf0xqow6e"], "accumulated_threat_level": 0.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "3b436d86-ea84-4068-b49e-5bf1d2ef2c1a", "DetectTime": "2024-05-21T12:40:21.770041+00:00", "EventTime": "2024-05-21T12:40:21.770062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRXTcw1PqOpfljih"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "41f6f5d1-fc07-47c1-9ad0-8ee9eed5f5cc", "DetectTime": "2024-05-21T12:40:21.789389+00:00", "EventTime": "2024-05-21T12:40:21.789421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLWSPo13Htdw9bxy33"], "accumulated_threat_level": 1.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "f224f8e7-c794-407e-9914-87deb56a942e", "DetectTime": "2024-05-21T12:40:21.813547+00:00", "EventTime": "2024-05-21T12:40:21.813583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg151j1MH4ZYSoph76"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 111} +{"Format": "IDEA0", "ID": "85335ba9-1481-40c8-92dd-b718b9aee911", "DetectTime": "2024-05-21T12:40:21.827627+00:00", "EventTime": "2024-05-21T12:40:21.827655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ViHfmKSTEs38QFk"], "accumulated_threat_level": 3.2, "timewindow": 111} +{"Format": "IDEA0", "ID": "d0e6cf33-a524-46b6-8c81-27f74d65b394", "DetectTime": "2024-05-21T12:40:21.839581+00:00", "EventTime": "2024-05-21T12:40:21.839622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHUmD23u2OMKtcx06"], "accumulated_threat_level": 4.0, "timewindow": 111} +{"Format": "IDEA0", "ID": "8958b2e0-3433-4853-8f4d-1b5144713d31", "DetectTime": "2024-05-21T12:40:22.065261+00:00", "EventTime": "2024-05-21T12:40:22.065284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRQVL9YhqPGYw3i3"], "accumulated_threat_level": 4.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "ac7aae59-3d44-46d2-bfde-f141b2e486c3", "DetectTime": "2024-05-21T12:40:22.113791+00:00", "EventTime": "2024-05-21T12:40:22.113823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Xc2s317EjlwYnS56"], "accumulated_threat_level": 5.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "eeba0150-505f-4055-b40e-add4d0307535", "DetectTime": "2024-05-21T12:40:22.153145+00:00", "EventTime": "2024-05-21T12:40:22.153183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuF5m53sPC6l8n7JS3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 111} +{"Format": "IDEA0", "ID": "aeee4f9b-da4f-4710-bff2-a80b139d7bf8", "DetectTime": "2024-05-21T12:40:22.187676+00:00", "EventTime": "2024-05-21T12:40:22.187698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMfnb26fmy4MBsG12"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "bdcd0dc8-78b5-4035-9160-59782fab9571", "DetectTime": "2024-05-21T12:40:22.227888+00:00", "EventTime": "2024-05-21T12:40:22.227922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYwda1600LjNqLVtg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "61160810-3328-49b8-ac70-8eeaaf4d13ee", "DetectTime": "2024-05-21T12:40:22.272527+00:00", "EventTime": "2024-05-21T12:40:22.272563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMr7SCxkiWuc8Ej4l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "674f9514-6e27-4e83-aeda-6939732ea117", "DetectTime": "2024-05-21T12:40:22.315907+00:00", "EventTime": "2024-05-21T12:40:22.315930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRhRI1vW4VQxoV6Yd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "70e7297a-d073-47b9-866d-867a012510be", "DetectTime": "2024-05-21T12:40:22.359425+00:00", "EventTime": "2024-05-21T12:40:22.359446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1q5t04vGqsyWvmMbb"], "accumulated_threat_level": 9.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "11587e4b-13b8-4437-adbf-4e11f8db6570", "DetectTime": "2024-05-21T12:40:22.592706+00:00", "EventTime": "2024-05-21T12:40:22.592727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaFco52gVuf03xYPq6"], "accumulated_threat_level": 10.4, "timewindow": 111} +{"Format": "IDEA0", "ID": "27e2a95a-0667-42ae-8f9e-3bb9d9908066", "DetectTime": "2024-05-21T12:40:22.637570+00:00", "EventTime": "2024-05-21T12:40:22.637599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGvzJ21oqzWhYoDmd4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 111} +{"Format": "IDEA0", "ID": "25221ce9-ba25-4488-a72d-beced321276e", "DetectTime": "2024-05-21T12:40:22.679370+00:00", "EventTime": "2024-05-21T12:40:22.679399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrHCa28Ga8n8HIWak"], "accumulated_threat_level": 12.000000000000002, "timewindow": 111} +{"Format": "Json", "ID": "25221ce9-ba25-4488-a72d-beced321276e", "DetectTime": "2024-05-21T12:40:22.679370+00:00", "EventTime": "2024-05-21T12:40:22.679399+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "1970-01-05T14:46:16.560054+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 111. (real time 2024/05/21 12:40:22.882256)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 111, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "28061dc8-156a-4179-8240-b94a6dce5ba9", "DetectTime": "2024-05-21T12:40:22.889291+00:00", "EventTime": "2024-05-21T12:40:22.889322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32LjJAtJw4e90gU7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "276e9cf5-0128-4bf8-a447-a84a00b02fe6", "DetectTime": "2024-05-21T12:40:22.911622+00:00", "EventTime": "2024-05-21T12:40:22.911656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEsF5VkQaCawnERYa"], "accumulated_threat_level": 0.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "63dc29b1-3400-48eb-9409-016068009a4f", "DetectTime": "2024-05-21T12:40:22.923473+00:00", "EventTime": "2024-05-21T12:40:22.923508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUa7VgMvYeW5mHGc"], "accumulated_threat_level": 1.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "00ad8551-10cd-4987-a1fa-0e25b02772a4", "DetectTime": "2024-05-21T12:40:22.929647+00:00", "EventTime": "2024-05-21T12:40:22.929670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7WJYTGFcnSqkwe88"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "f4380910-5795-4f55-86f2-553a29fc22b7", "DetectTime": "2024-05-21T12:40:22.941768+00:00", "EventTime": "2024-05-21T12:40:22.941799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQmX3G440XUVGaTiGl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 111} +{"Format": "IDEA0", "ID": "d724d7aa-3ed3-46cc-8981-8e81450f55fd", "DetectTime": "2024-05-21T12:40:23.085005+00:00", "EventTime": "2024-05-21T12:40:23.085030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CenXBo720cWrUnU34"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "390ea5ed-4c7a-449e-805e-c3f4b13c1f9d", "DetectTime": "2024-05-21T12:40:23.123810+00:00", "EventTime": "2024-05-21T12:40:23.123834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbHEGM6aMBJnFvJSl"], "accumulated_threat_level": 3.2, "timewindow": 111} +{"Format": "IDEA0", "ID": "70e90156-c8d5-4858-8978-2483d6f6f0a6", "DetectTime": "2024-05-21T12:40:23.166147+00:00", "EventTime": "2024-05-21T12:40:23.166172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrybC2JmnRCCBg1Rh"], "accumulated_threat_level": 4.0, "timewindow": 111} +{"Format": "IDEA0", "ID": "4c755410-cccd-4fbb-8180-1e40c7bf828d", "DetectTime": "2024-05-21T12:40:23.208947+00:00", "EventTime": "2024-05-21T12:40:23.208969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG5Dak1abueIBfwOd7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "8d4d3dc7-b565-4da7-827d-fc2ddb3f0a7e", "DetectTime": "2024-05-21T12:40:23.223383+00:00", "EventTime": "2024-05-21T12:40:23.223415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUiD74xLJWgJhC5Mc"], "accumulated_threat_level": 4.8, "timewindow": 111} +{"Format": "IDEA0", "ID": "8e08fa65-5ef6-411c-9296-129d99fc9818", "DetectTime": "2024-05-21T12:40:23.282232+00:00", "EventTime": "2024-05-21T12:40:23.282253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQl7T3I4TYBI1yujb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "605b907a-8368-42cf-8680-9dfd6736d137", "DetectTime": "2024-05-21T12:40:23.328527+00:00", "EventTime": "2024-05-21T12:40:23.328545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcnP83lix92cSQYYe"], "accumulated_threat_level": 5.6, "timewindow": 111} +{"Format": "IDEA0", "ID": "2463cfaa-4c92-4917-849d-05c72bf76ae7", "DetectTime": "2024-05-21T12:40:23.350625+00:00", "EventTime": "2024-05-21T12:40:23.350649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTbvA2gfMpXLqPgH4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "38600555-8430-4d2f-9e67-3b354ede0dc0", "DetectTime": "2024-05-21T12:40:23.500635+00:00", "EventTime": "2024-05-21T12:40:23.500657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCjL41V8LMqJIC9Gj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "0031de10-ae9f-4586-8f99-c8764675d0cc", "DetectTime": "2024-05-21T12:40:23.540902+00:00", "EventTime": "2024-05-21T12:40:23.540923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fJVSJ0vgQvZsp2a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 111} +{"Format": "IDEA0", "ID": "8d7dab8a-4c1d-498c-a985-e842ebd8f6fa", "DetectTime": "2024-05-21T12:40:23.589534+00:00", "EventTime": "2024-05-21T12:40:23.589554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURxUE4p0HvHXRIhe5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "acbb71b6-42b9-4970-b675-886e308df364", "DetectTime": "2024-05-21T12:40:23.627419+00:00", "EventTime": "2024-05-21T12:40:23.627440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFcq12YftgoXQkOvh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "00364dd0-8ff9-40a8-a616-e8bb96e4570e", "DetectTime": "2024-05-21T12:40:23.900606+00:00", "EventTime": "2024-05-21T12:40:23.900627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQci4c4k3AyChPE0Wd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "3a7e6d03-843d-43d1-8ffc-038a1128e223", "DetectTime": "2024-05-21T12:40:23.908861+00:00", "EventTime": "2024-05-21T12:40:23.908882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdnJMs2OoW62P10JLk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "e1dbc8b5-290f-4422-85e5-3298ee1cb586", "DetectTime": "2024-05-21T12:40:23.913529+00:00", "EventTime": "2024-05-21T12:40:23.913548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKttKgZcbLaXSBhk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "5bb58185-2465-401e-b5ed-f9bd85852ef3", "DetectTime": "2024-05-21T12:40:23.917932+00:00", "EventTime": "2024-05-21T12:40:23.917950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgvZu41WhcGTQgmbEj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "4b6ce55a-6842-4356-a384-e33b0d5fe568", "DetectTime": "2024-05-21T12:40:23.976058+00:00", "EventTime": "2024-05-21T12:40:23.976080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9kXs2m0ZfIrqqSH1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "8c649b1d-29a6-4133-bd94-32f38ec5fb50", "DetectTime": "2024-05-21T12:40:24.086869+00:00", "EventTime": "2024-05-21T12:40:24.086890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oEqJ3TK9g4TcBLX4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "f6e28500-8e3f-4608-ba54-3f640f6a7d7e", "DetectTime": "2024-05-21T12:40:24.115806+00:00", "EventTime": "2024-05-21T12:40:24.115833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UHKrNGiwHtnb0Ud"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "16e2fe75-45a2-4818-a2d3-15dd1d9aacf2", "DetectTime": "2024-05-21T12:40:24.194883+00:00", "EventTime": "2024-05-21T12:40:24.194904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT5Czl3lbpDWWpJQQb"], "accumulated_threat_level": 1.3, "timewindow": 112} +{"Format": "IDEA0", "ID": "9b8fb2f0-5be5-4802-9ded-af9aa1916f14", "DetectTime": "2024-05-21T12:40:24.495690+00:00", "EventTime": "2024-05-21T12:40:24.495712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgbmlz1jFWCdooAaa1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "6eb4e72c-dc69-48cb-9165-b571605416b5", "DetectTime": "2024-05-21T12:40:24.500797+00:00", "EventTime": "2024-05-21T12:40:24.500816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIAVtHQS2Rsc5e5l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "161b2343-b43d-4676-a5ed-0b46670da03d", "DetectTime": "2024-05-21T12:40:24.506470+00:00", "EventTime": "2024-05-21T12:40:24.506491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61NsE4r9b7Ii0cPxd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "5dc26c8d-b675-46db-8f93-0d2737b2ff86", "DetectTime": "2024-05-21T12:40:24.511541+00:00", "EventTime": "2024-05-21T12:40:24.511564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwc8kwwShe8KSi7eb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "026f521d-e7d4-4941-83f6-1162ffc28e0e", "DetectTime": "2024-05-21T12:40:24.568439+00:00", "EventTime": "2024-05-21T12:40:24.568460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0klQp2hNrCIOwajc4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "85fd083d-9603-48d6-ac3c-f5af0d5a0a71", "DetectTime": "2024-05-21T12:40:24.602653+00:00", "EventTime": "2024-05-21T12:40:24.602672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfpArA3z4KH5Ozpb09"], "accumulated_threat_level": 2.1, "timewindow": 112} +{"Format": "IDEA0", "ID": "aa70edd9-3ca6-4a62-adda-13ac4eaa773f", "DetectTime": "2024-05-21T12:40:24.613241+00:00", "EventTime": "2024-05-21T12:40:24.613260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq2CbtwsesVFt5T4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "fe85c2ce-4bc6-4998-8a91-a67138928e65", "DetectTime": "2024-05-21T12:40:24.753115+00:00", "EventTime": "2024-05-21T12:40:24.753137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZfFy2v3tZ7nF8JU"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "a09921f1-ac34-4b74-9be2-929821bfe53c", "DetectTime": "2024-05-21T12:40:24.785726+00:00", "EventTime": "2024-05-21T12:40:24.785749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxXsZu2wEA9qNr48ka"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "d3656fbe-dc52-4a8e-9227-08ace197d27c", "DetectTime": "2024-05-21T12:40:25.045116+00:00", "EventTime": "2024-05-21T12:40:25.045135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAZF8L1pkBUSmP4zg8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 112} +{"Format": "IDEA0", "ID": "7c720997-b7ec-4cdf-91ea-0604e4419eb9", "DetectTime": "2024-05-21T12:40:25.073467+00:00", "EventTime": "2024-05-21T12:40:25.073490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKYRyR38z5GhbF3aL7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "01f4aa87-ebda-48d5-b068-3325cb405a3a", "DetectTime": "2024-05-21T12:40:25.079902+00:00", "EventTime": "2024-05-21T12:40:25.079927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbO9B3F5v41ppzTml"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "55592fa2-be9e-4e74-91b5-9cc02573185f", "DetectTime": "2024-05-21T12:40:25.147221+00:00", "EventTime": "2024-05-21T12:40:25.147242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd9z0a3Tj2OhQWyYx"], "accumulated_threat_level": 7.199999999999999, "timewindow": 109} +{"Format": "IDEA0", "ID": "40995fed-220d-480e-bfd8-325f8fc0e2cb", "DetectTime": "2024-05-21T12:40:25.181903+00:00", "EventTime": "2024-05-21T12:40:25.181929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 9067/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJiEVj2A0izpHP23qj"], "accumulated_threat_level": 3.7, "timewindow": 112} +{"Format": "IDEA0", "ID": "4742cfd4-69ec-42eb-8676-5453a6fc801c", "DetectTime": "2024-05-21T12:40:25.205514+00:00", "EventTime": "2024-05-21T12:40:25.205531+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosKuj3Wywpb5iukaa"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c08ab354-6fa7-42dc-8be8-54defe6b22cb", "DetectTime": "2024-05-21T12:40:25.218028+00:00", "EventTime": "2024-05-21T12:40:25.218052+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CosKuj3Wywpb5iukaa"], "accumulated_threat_level": 8.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "b62d893b-db59-47c4-a096-bf6a5dba74d4", "DetectTime": "2024-05-21T12:40:25.223326+00:00", "EventTime": "2024-05-21T12:40:25.223346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.175.199.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYI3rgualYq7FP32"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "c3de52fc-5b6f-47eb-9079-c06a724f0e69", "DetectTime": "2024-05-21T12:40:25.356688+00:00", "EventTime": "2024-05-21T12:40:25.356711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH4Mc71iFwubS22jE1"], "accumulated_threat_level": 4.5, "timewindow": 112} +{"Format": "IDEA0", "ID": "65a87e44-bc45-49b2-984c-5cc977b17c04", "DetectTime": "2024-05-21T12:40:25.361846+00:00", "EventTime": "2024-05-21T12:40:25.361871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPumo2ftDGOQxS087"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "d59a6ad9-b739-4e08-93f3-b563aecd4c81", "DetectTime": "2024-05-21T12:40:25.393522+00:00", "EventTime": "2024-05-21T12:40:25.393543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5KFl23d5YLcYxbyp3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "def93ce6-5425-4f53-8e94-f484df2804c3", "DetectTime": "2024-05-21T12:40:25.637283+00:00", "EventTime": "2024-05-21T12:40:25.637304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLul783DTBvDZ9Edl1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "0a629604-7101-4faa-8efe-fc4c4aefe9f7", "DetectTime": "2024-05-21T12:40:25.678856+00:00", "EventTime": "2024-05-21T12:40:25.678874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqhVMR2w6K970irKV5"], "accumulated_threat_level": 5.3, "timewindow": 112} +{"Format": "IDEA0", "ID": "24afbda2-79a0-4236-aa8b-74c0bac68460", "DetectTime": "2024-05-21T12:40:25.722199+00:00", "EventTime": "2024-05-21T12:40:25.722217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2iI8T2yz11qcf3uA6"], "accumulated_threat_level": 6.1, "timewindow": 112} +{"Format": "IDEA0", "ID": "3948b7e2-fce3-426c-baf6-25513b3d1df7", "DetectTime": "2024-05-21T12:40:25.756595+00:00", "EventTime": "2024-05-21T12:40:25.756616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrmTl3ejphEFjKIQ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "bdc676dc-0895-4624-9826-fc96142e050a", "DetectTime": "2024-05-21T12:40:25.794762+00:00", "EventTime": "2024-05-21T12:40:25.794782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORQGZ3H6Yojbyl006"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "a01bbfa3-03ba-4feb-bc8b-07981be364e9", "DetectTime": "2024-05-21T12:40:25.842921+00:00", "EventTime": "2024-05-21T12:40:25.842942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgbciCtHPI4xYs5F7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "0488af98-d6fc-4dab-9e45-db4b3d0d6556", "DetectTime": "2024-05-21T12:40:25.882945+00:00", "EventTime": "2024-05-21T12:40:25.882967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1en8Dg42OQ0uuVdh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "e9cb4888-a616-4568-a579-dd810993c921", "DetectTime": "2024-05-21T12:40:25.920115+00:00", "EventTime": "2024-05-21T12:40:25.920136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPMpiUhA63hRGXV8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "87891f93-0c09-47af-90ec-e471cbae3a7e", "DetectTime": "2024-05-21T12:40:26.160395+00:00", "EventTime": "2024-05-21T12:40:26.160433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPVKbm4CTeuwCQe9o"], "accumulated_threat_level": 8.5, "timewindow": 112} +{"Format": "IDEA0", "ID": "414c4857-f847-41ce-ba97-67c1b44acf02", "DetectTime": "2024-05-21T12:40:26.182030+00:00", "EventTime": "2024-05-21T12:40:26.182048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQvMAeGACr2dYYO8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "55a1bb87-4432-40d8-b9a5-2d1acfa7e4cf", "DetectTime": "2024-05-21T12:40:26.227598+00:00", "EventTime": "2024-05-21T12:40:26.227618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcEQIuc3Gv65Fx65"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "7d092bf1-b06e-4c4c-8e8a-47de2491e7fe", "DetectTime": "2024-05-21T12:40:26.266176+00:00", "EventTime": "2024-05-21T12:40:26.266201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTTECC3LLqmsfHTi2k"], "accumulated_threat_level": 9.3, "timewindow": 112} +{"Format": "IDEA0", "ID": "10c66eb0-fecb-4693-9aeb-7780c153092f", "DetectTime": "2024-05-21T12:40:26.316694+00:00", "EventTime": "2024-05-21T12:40:26.316728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVWX2o1es7jHqAp26c"], "accumulated_threat_level": 10.100000000000001, "timewindow": 112} +{"Format": "IDEA0", "ID": "3a36b9c5-5dff-459d-a86f-13bbeecc19e0", "DetectTime": "2024-05-21T12:40:26.355873+00:00", "EventTime": "2024-05-21T12:40:26.355891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4jnE44k4SIPnw565"], "accumulated_threat_level": 10.900000000000002, "timewindow": 112} +{"Format": "IDEA0", "ID": "559921ce-3a5a-41c8-9ec2-1e373aec6e57", "DetectTime": "2024-05-21T12:40:26.399658+00:00", "EventTime": "2024-05-21T12:40:26.399679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8ict11dNTRkFfvP1"], "accumulated_threat_level": 11.700000000000003, "timewindow": 112} +{"Format": "IDEA0", "ID": "db8c6382-02c6-4b20-8dee-685a46befc06", "DetectTime": "2024-05-21T12:40:26.444598+00:00", "EventTime": "2024-05-21T12:40:26.444618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chim5RpWKqLQEeMF3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 112} +{"Format": "Json", "ID": "db8c6382-02c6-4b20-8dee-685a46befc06", "DetectTime": "2024-05-21T12:40:26.444598+00:00", "EventTime": "2024-05-21T12:40:26.444618+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-05T15:16:58.964270+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2024/05/21 12:40:26.655184)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 112, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "0ae83876-d217-4a74-a5a7-e8c723d70b5b", "DetectTime": "2024-05-21T12:40:26.667457+00:00", "EventTime": "2024-05-21T12:40:26.667482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQcTK1K7KuZnihVW6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "23a8ddd0-3c11-468c-9f96-6b921ec01a83", "DetectTime": "2024-05-21T12:40:26.717372+00:00", "EventTime": "2024-05-21T12:40:26.717391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcsEi2N2jcdU3YSy2"], "accumulated_threat_level": 0.8, "timewindow": 112} +{"Format": "IDEA0", "ID": "4f5c8099-7bd5-4b66-836a-9dd5c46d15c4", "DetectTime": "2024-05-21T12:40:26.751896+00:00", "EventTime": "2024-05-21T12:40:26.751918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6oNmm2X8yJbnQWJkg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "f8929195-d704-4cc1-951d-38b3dce2c8a7", "DetectTime": "2024-05-21T12:40:26.883459+00:00", "EventTime": "2024-05-21T12:40:26.883481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxgs14Ftd57wxV5Wk"], "accumulated_threat_level": 1.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "3b25f906-25d9-48ea-90f0-b75177256e29", "DetectTime": "2024-05-21T12:40:26.911071+00:00", "EventTime": "2024-05-21T12:40:26.911091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6EXAQ1do2NHLO7P87"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "c0a21c66-7413-4df2-b03b-4e0fa587b882", "DetectTime": "2024-05-21T12:40:26.962782+00:00", "EventTime": "2024-05-21T12:40:26.962804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpnP5AwP3A0QQevg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "a2abf0dd-e8b3-4203-a1a9-6b52111411db", "DetectTime": "2024-05-21T12:40:26.995658+00:00", "EventTime": "2024-05-21T12:40:26.995680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBjNmGh3gRx5StS3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "5d871d83-df5e-4e1b-9515-8f9857b06e34", "DetectTime": "2024-05-21T12:40:27.007242+00:00", "EventTime": "2024-05-21T12:40:27.007261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEFJe3KsPrCYb5fsa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 112} +{"Format": "IDEA0", "ID": "70897451-e0a7-49ff-9f55-3a402ea619b9", "DetectTime": "2024-05-21T12:40:27.064512+00:00", "EventTime": "2024-05-21T12:40:27.064535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmYu91P5G9NPuuhY8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "a764e089-614d-45fc-9118-dd37eb8aa8a1", "DetectTime": "2024-05-21T12:40:27.324055+00:00", "EventTime": "2024-05-21T12:40:27.324091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4SXX1giajavksGb"], "accumulated_threat_level": 3.2, "timewindow": 112} +{"Format": "IDEA0", "ID": "0234f0f0-61e9-48a6-8486-b5b0d16308a9", "DetectTime": "2024-05-21T12:40:27.329500+00:00", "EventTime": "2024-05-21T12:40:27.329519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHj6DC42CcFOXnaimi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "b2cf46c2-011d-4d92-870d-5931fdeabb29", "DetectTime": "2024-05-21T12:40:27.334176+00:00", "EventTime": "2024-05-21T12:40:27.334195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNHZS2kc2Oe8QZVH5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "013e0999-cc1c-441a-a815-8d61041d1b0a", "DetectTime": "2024-05-21T12:40:27.413528+00:00", "EventTime": "2024-05-21T12:40:27.413550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrQ0uJqFtUoAOuXk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "fa9c0f79-c7b8-4989-8bbc-b690d364f5dd", "DetectTime": "2024-05-21T12:40:27.450880+00:00", "EventTime": "2024-05-21T12:40:27.450905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIRPadVQcJcVarwI1"], "accumulated_threat_level": 4.0, "timewindow": 112} +{"Format": "IDEA0", "ID": "965f82b3-63d2-4d45-ba66-93310195a83c", "DetectTime": "2024-05-21T12:40:27.496157+00:00", "EventTime": "2024-05-21T12:40:27.496175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLl3x4e0jeJ5IYlj6"], "accumulated_threat_level": 4.8, "timewindow": 112} +{"Format": "IDEA0", "ID": "fc0e4d44-2feb-4bc2-a55c-272700940d88", "DetectTime": "2024-05-21T12:40:27.533659+00:00", "EventTime": "2024-05-21T12:40:27.533679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnHF112nJWY5Yrqxa"], "accumulated_threat_level": 5.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "92ca50e9-208d-4b2c-b49b-cbddda1166cf", "DetectTime": "2024-05-21T12:40:27.567444+00:00", "EventTime": "2024-05-21T12:40:27.567467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBOG93rAYVyIk3FD7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "7d2ddeb7-743c-4f92-a79f-aea171ae6f4c", "DetectTime": "2024-05-21T12:40:27.606015+00:00", "EventTime": "2024-05-21T12:40:27.606035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOuhf1c4DBRdBBgwa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "4cb57d64-3c52-42d4-8d67-0f98b8e5cfa9", "DetectTime": "2024-05-21T12:40:27.645634+00:00", "EventTime": "2024-05-21T12:40:27.645652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNRisf7kNjUzNZ3g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "930f894b-1e2b-46b5-b84d-5a8733c3b05d", "DetectTime": "2024-05-21T12:40:27.880339+00:00", "EventTime": "2024-05-21T12:40:27.880360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0eW0o1j893QQWu0Ne"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "cb38de5b-ee5b-4753-9934-3f29e0fc149a", "DetectTime": "2024-05-21T12:40:27.916533+00:00", "EventTime": "2024-05-21T12:40:27.916553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQiPi4VaOgVzCWHoj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "22ef6dda-9366-4d6e-8962-5696ea14cd85", "DetectTime": "2024-05-21T12:40:27.970130+00:00", "EventTime": "2024-05-21T12:40:27.970151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaOqM3aMuYY7jSe2d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "32a6803c-a54d-48b1-b9f3-bad3e9fd7735", "DetectTime": "2024-05-21T12:40:28.011124+00:00", "EventTime": "2024-05-21T12:40:28.011147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfdlG48XnpZFzakQ7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "f22eefa2-717c-4707-af90-450fa3a48676", "DetectTime": "2024-05-21T12:40:28.023142+00:00", "EventTime": "2024-05-21T12:40:28.023160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwsoKS3MKKn9kZ7Ni7"], "accumulated_threat_level": 9.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "feb39486-3106-4046-9dcc-eb3a959cfe8a", "DetectTime": "2024-05-21T12:40:28.205527+00:00", "EventTime": "2024-05-21T12:40:28.205572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwGHi5CBgyLM4BtZk"], "accumulated_threat_level": 10.4, "timewindow": 112} +{"Format": "IDEA0", "ID": "73414cda-d756-46ce-9ecf-68d279154669", "DetectTime": "2024-05-21T12:40:28.244488+00:00", "EventTime": "2024-05-21T12:40:28.244528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAaETC1xEeNJOLnrR7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 112} +{"Format": "IDEA0", "ID": "f39accdc-8535-4b91-8e55-e7342800323c", "DetectTime": "2024-05-21T12:40:28.355781+00:00", "EventTime": "2024-05-21T12:40:28.355803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccp3W64Z5cqvMHS2j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "1ecc1eea-e70a-48ef-b60e-f786da3bf56b", "DetectTime": "2024-05-21T12:40:28.395749+00:00", "EventTime": "2024-05-21T12:40:28.395780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpATqoexbV5r858i"], "accumulated_threat_level": 12.000000000000002, "timewindow": 112} +{"Format": "Json", "ID": "1ecc1eea-e70a-48ef-b60e-f786da3bf56b", "DetectTime": "2024-05-21T12:40:28.395749+00:00", "EventTime": "2024-05-21T12:40:28.395780+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "1970-01-05T15:47:31.604392+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2024/05/21 12:40:28.558709)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 112, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "90f35c8b-88ea-4c06-902c-1afe55a6ea89", "DetectTime": "2024-05-21T12:40:28.562911+00:00", "EventTime": "2024-05-21T12:40:28.562929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExBZ22xQex9gtYPMb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "c8b05e1b-0a32-4522-aa7a-f2e8b5c8149b", "DetectTime": "2024-05-21T12:40:28.702125+00:00", "EventTime": "2024-05-21T12:40:28.702147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUe9JI8p5Pxels2k3"], "accumulated_threat_level": 0.8, "timewindow": 112} +{"Format": "IDEA0", "ID": "f7e68bb1-779c-451a-b0e6-eaf6766232a7", "DetectTime": "2024-05-21T12:40:28.734866+00:00", "EventTime": "2024-05-21T12:40:28.734893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRMQ5BoJSO15ILxn1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "60bd278a-f137-4d04-87e6-74a01bd55c2e", "DetectTime": "2024-05-21T12:40:28.741228+00:00", "EventTime": "2024-05-21T12:40:28.741253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82GIn4BmPn3cPUlX1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "f0018ac7-7d40-4f45-87a2-644b32fe48c7", "DetectTime": "2024-05-21T12:40:28.746272+00:00", "EventTime": "2024-05-21T12:40:28.746293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4btPw2iA80kDWXEPe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "6d6db030-c78f-46f8-a709-c2a496612e06", "DetectTime": "2024-05-21T12:40:28.841786+00:00", "EventTime": "2024-05-21T12:40:28.841806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAod2u2wb2trIjy9Q"], "accumulated_threat_level": 1.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "63cce51b-fac9-41b6-8045-106dea54d132", "DetectTime": "2024-05-21T12:40:28.884876+00:00", "EventTime": "2024-05-21T12:40:28.884896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMoAc2K77RUj6QAOb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 112} +{"Format": "IDEA0", "ID": "bdb1a7ce-22c5-4608-94fe-e1934a322022", "DetectTime": "2024-05-21T12:40:28.929064+00:00", "EventTime": "2024-05-21T12:40:28.929083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWqsTRVJlPF1WSn9"], "accumulated_threat_level": 3.2, "timewindow": 112} +{"Format": "IDEA0", "ID": "c99b5a49-c9d1-4945-bf11-6322e89f9754", "DetectTime": "2024-05-21T12:40:28.967003+00:00", "EventTime": "2024-05-21T12:40:28.967024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvcOv2MhPWSQqlNT3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "4852b56a-7dac-4063-9e6d-f1e6387c3945", "DetectTime": "2024-05-21T12:40:29.002511+00:00", "EventTime": "2024-05-21T12:40:29.002531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8qiz2JkU8IaoybO1"], "accumulated_threat_level": 4.0, "timewindow": 112} +{"Format": "IDEA0", "ID": "7f4524f5-069d-4839-a812-57858bcc79b8", "DetectTime": "2024-05-21T12:40:29.248436+00:00", "EventTime": "2024-05-21T12:40:29.248457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOZt01SRaT0aAnwXg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "bddde9cb-3fbc-4192-bbfa-9d2e1c365de2", "DetectTime": "2024-05-21T12:40:29.254336+00:00", "EventTime": "2024-05-21T12:40:29.254359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9P2O2kWjjrqitrQ2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "cfe571c8-9ea2-4ff2-8197-2955f19f6b43", "DetectTime": "2024-05-21T12:40:29.267385+00:00", "EventTime": "2024-05-21T12:40:29.267421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mzVz3tTKNSzjv2T1"], "accumulated_threat_level": 4.8, "timewindow": 112} +{"Format": "IDEA0", "ID": "b482de62-3518-4c57-9094-36fc75d21787", "DetectTime": "2024-05-21T12:40:29.359056+00:00", "EventTime": "2024-05-21T12:40:29.359075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VmguSSUq2GevI91"], "accumulated_threat_level": 5.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "59770f8a-95c9-433e-80e1-cde86e29ed25", "DetectTime": "2024-05-21T12:40:29.406532+00:00", "EventTime": "2024-05-21T12:40:29.406551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzpE3Djvm8LqqySy3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "401513a3-7fc2-4a49-9aab-e83853d8fef1", "DetectTime": "2024-05-21T12:40:29.445951+00:00", "EventTime": "2024-05-21T12:40:29.445971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cesseu3d7EpY511H53"], "accumulated_threat_level": 7.199999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "5dc58800-8ba3-4f1b-9cfc-849c4a9e7038", "DetectTime": "2024-05-21T12:40:29.489135+00:00", "EventTime": "2024-05-21T12:40:29.489153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdzGJ2lVEvwa9rA4c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "b32aa8ba-ba78-4443-a86d-c33dcaf726d5", "DetectTime": "2024-05-21T12:40:29.535300+00:00", "EventTime": "2024-05-21T12:40:29.535319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQoV8Z1Jbj2acDnkzl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 112} +{"Format": "IDEA0", "ID": "11f793fb-ec82-485f-aff5-19fa4fb8a7e6", "DetectTime": "2024-05-21T12:40:29.579495+00:00", "EventTime": "2024-05-21T12:40:29.579515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxQSJ1iMj26kDNcIf"], "accumulated_threat_level": 9.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "faddfb91-9bd7-4c71-8b60-1d11710dd161", "DetectTime": "2024-05-21T12:40:29.849848+00:00", "EventTime": "2024-05-21T12:40:29.849866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOU6D1QcDhBIaqkjh"], "accumulated_threat_level": 10.4, "timewindow": 112} +{"Format": "IDEA0", "ID": "03ea7f9f-cbf0-4ce7-be0d-528f0d337acd", "DetectTime": "2024-05-21T12:40:29.894527+00:00", "EventTime": "2024-05-21T12:40:29.894547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yZN14Hg9ARN8WE74"], "accumulated_threat_level": 11.200000000000001, "timewindow": 112} +{"Format": "IDEA0", "ID": "23f2a80b-2419-400e-aa2a-b9af0ee2ed22", "DetectTime": "2024-05-21T12:40:29.937659+00:00", "EventTime": "2024-05-21T12:40:29.937680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWBH11krAG2szbZgi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 112} +{"Format": "Json", "ID": "23f2a80b-2419-400e-aa2a-b9af0ee2ed22", "DetectTime": "2024-05-21T12:40:29.937659+00:00", "EventTime": "2024-05-21T12:40:29.937680+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "1970-01-05T15:48:09.231682+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 112. (real time 2024/05/21 12:40:30.114164)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 112, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1b99189c-3119-41d3-864d-9f4b9649e309", "DetectTime": "2024-05-21T12:40:30.119660+00:00", "EventTime": "2024-05-21T12:40:30.119684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kl9HEnjjyGBK3U9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "8a78fd0a-8eaf-43c1-bd16-940ed14ef312", "DetectTime": "2024-05-21T12:40:30.131078+00:00", "EventTime": "2024-05-21T12:40:30.131098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCa8YZ2NRbkg5BSwVj"], "accumulated_threat_level": 0.8, "timewindow": 112} +{"Format": "IDEA0", "ID": "ca6d9795-3364-4708-90f4-e2a078ba1a94", "DetectTime": "2024-05-21T12:40:30.136099+00:00", "EventTime": "2024-05-21T12:40:30.136118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zhjC30MpieO1WPnh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "3e5dd9e6-a29c-4aef-976e-0f222a62d65f", "DetectTime": "2024-05-21T12:40:30.153873+00:00", "EventTime": "2024-05-21T12:40:30.153891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5m00r3XsRvz855rrh"], "accumulated_threat_level": 1.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "239a2f9d-54d6-4a26-aded-aaa9455fe30e", "DetectTime": "2024-05-21T12:40:30.346317+00:00", "EventTime": "2024-05-21T12:40:30.346343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj22eC324T0JWpLdQj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "67308846-8560-4cbc-ad8e-7db374a2f018", "DetectTime": "2024-05-21T12:40:30.351556+00:00", "EventTime": "2024-05-21T12:40:30.351575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjN664sgPqCpuQGah"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "b2524fc2-df9e-4ce8-844f-f43ac26baed6", "DetectTime": "2024-05-21T12:40:30.357274+00:00", "EventTime": "2024-05-21T12:40:30.357296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmxYY2doENMB1m9yj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "dec49332-84cb-47bf-8ac2-64a58083718c", "DetectTime": "2024-05-21T12:40:30.412312+00:00", "EventTime": "2024-05-21T12:40:30.412334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv5jlD2BPM3QyTDAUl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "58d01fd5-492e-4e4e-a268-1a1d7516fed8", "DetectTime": "2024-05-21T12:40:30.426734+00:00", "EventTime": "2024-05-21T12:40:30.426753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0cp9CEbgwpAYBE5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 112} +{"Format": "IDEA0", "ID": "d7b35668-0852-4663-9898-d9d32e6b6af5", "DetectTime": "2024-05-21T12:40:30.509397+00:00", "EventTime": "2024-05-21T12:40:30.509420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwlRC27wJ0Ijhy4Hk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "dcf3f39b-f4f8-4227-8855-d7be1a108c45", "DetectTime": "2024-05-21T12:40:30.547150+00:00", "EventTime": "2024-05-21T12:40:30.547169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0w9I93fq91x4Szdwe"], "accumulated_threat_level": 3.2, "timewindow": 112} +{"Format": "IDEA0", "ID": "51e920e5-9273-4da0-9df0-4cefa5e04b29", "DetectTime": "2024-05-21T12:40:30.593988+00:00", "EventTime": "2024-05-21T12:40:30.594007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cvIu1ZxZnh26aZLg"], "accumulated_threat_level": 4.0, "timewindow": 112} +{"Format": "IDEA0", "ID": "d59aa08c-b59d-4adc-83da-60e68ee3395e", "DetectTime": "2024-05-21T12:40:30.821984+00:00", "EventTime": "2024-05-21T12:40:30.822008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C27z5p3oqelJnNMSa7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "f638d8aa-fa43-4d50-bbe2-f3d901854193", "DetectTime": "2024-05-21T12:40:30.860344+00:00", "EventTime": "2024-05-21T12:40:30.860364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFmUq1TjLmt5bN5y6"], "accumulated_threat_level": 4.8, "timewindow": 112} +{"Format": "IDEA0", "ID": "b3f6fbbf-1416-43b5-8b03-dfae192fbbea", "DetectTime": "2024-05-21T12:40:30.905489+00:00", "EventTime": "2024-05-21T12:40:30.905515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOp1Y3IfUmpXETyg2"], "accumulated_threat_level": 5.6, "timewindow": 112} +{"Format": "IDEA0", "ID": "3e7596f0-0981-4d33-981d-28e819a6debb", "DetectTime": "2024-05-21T12:40:30.961451+00:00", "EventTime": "2024-05-21T12:40:30.961473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C99tY337ENAYGbQ90g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "cd1dc688-0917-438d-9a8d-6a6368dd6ad9", "DetectTime": "2024-05-21T12:40:31.027752+00:00", "EventTime": "2024-05-21T12:40:31.027773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsH0bw4f8Uq9ntTrz5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "e0e0f57d-6779-469c-8c9b-52e58a22e310", "DetectTime": "2024-05-21T12:40:31.096118+00:00", "EventTime": "2024-05-21T12:40:31.096137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxL1R02Npb6CDQ9nvk"], "accumulated_threat_level": 0.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "ff492158-ce79-4ca1-ac66-4a379e9c0d7e", "DetectTime": "2024-05-21T12:40:31.135997+00:00", "EventTime": "2024-05-21T12:40:31.136018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw9cT92Pok3kKR7oCj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "6a465854-99f6-4d95-8ffa-634990ff3732", "DetectTime": "2024-05-21T12:40:31.174120+00:00", "EventTime": "2024-05-21T12:40:31.174142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMPdISOAVQ9c9Cj2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "cc2ec4ef-bebc-4c06-8648-959344f6ce85", "DetectTime": "2024-05-21T12:40:31.188719+00:00", "EventTime": "2024-05-21T12:40:31.188738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.75.11.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0npw2u91g1JiHP52"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "40d0281f-d575-4f45-89a1-c6c8aca11d24", "DetectTime": "2024-05-21T12:40:31.201662+00:00", "EventTime": "2024-05-21T12:40:31.201685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.75.11.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.75.11.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0npw2u91g1JiHP52"], "accumulated_threat_level": 9.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "9d1d1c34-b24c-419e-8ef9-524ece645b6f", "DetectTime": "2024-05-21T12:40:31.434420+00:00", "EventTime": "2024-05-21T12:40:31.434447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJKcY3GYzByzdKMqj"], "accumulated_threat_level": 1.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "edd60c66-18b6-43b6-b89a-005804118089", "DetectTime": "2024-05-21T12:40:31.442546+00:00", "EventTime": "2024-05-21T12:40:31.442567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrPZB5TMaDWzqzj3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "2b0192cd-cec7-4501-9d37-39c456be21d9", "DetectTime": "2024-05-21T12:40:31.478032+00:00", "EventTime": "2024-05-21T12:40:31.478051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COc19z46PaN0XoKdk1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "16a8adc3-5fac-4ab1-ac07-975c631758bf", "DetectTime": "2024-05-21T12:40:31.482832+00:00", "EventTime": "2024-05-21T12:40:31.482851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNZ1j5bbcQSJbXdf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "d1e2bf9d-a486-442d-828d-72db4b4ea578", "DetectTime": "2024-05-21T12:40:31.509455+00:00", "EventTime": "2024-05-21T12:40:31.509478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuBoJ2beNslFEXUX"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "29638963-30f0-4312-8669-01f897620395", "DetectTime": "2024-05-21T12:40:31.577991+00:00", "EventTime": "2024-05-21T12:40:31.578011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CamLkk4OBBTDzRVFha"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "bcfb57c7-84de-4a24-8060-dba19cd72e46", "DetectTime": "2024-05-21T12:40:31.634799+00:00", "EventTime": "2024-05-21T12:40:31.634820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPG2263YfDd8SfK5uk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "e71ecb5a-65f9-47ba-8976-e36a699cb2eb", "DetectTime": "2024-05-21T12:40:31.683807+00:00", "EventTime": "2024-05-21T12:40:31.683827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnwLDgDhNC3NpYMb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 113} +{"Format": "IDEA0", "ID": "c126dc26-6dd3-4c4a-8a68-82270be2aea4", "DetectTime": "2024-05-21T12:40:31.707147+00:00", "EventTime": "2024-05-21T12:40:31.707169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJxIOZqNkRI8TM32"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "9ee9c064-bddc-4006-86e7-3edfec95ce0d", "DetectTime": "2024-05-21T12:40:31.744351+00:00", "EventTime": "2024-05-21T12:40:31.744372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDE7r38BUbIX8QFu5"], "accumulated_threat_level": 3.2, "timewindow": 113} +{"Format": "IDEA0", "ID": "15c34f98-b4b6-48a9-9113-2842b25f048e", "DetectTime": "2024-05-21T12:40:31.792727+00:00", "EventTime": "2024-05-21T12:40:31.792748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkhauSRGRDPZKG4e"], "accumulated_threat_level": 4.0, "timewindow": 113} +{"Format": "IDEA0", "ID": "defec5c2-6ee6-4919-ae42-5ef4b1f747e7", "DetectTime": "2024-05-21T12:40:31.797639+00:00", "EventTime": "2024-05-21T12:40:31.797658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgk62g2RiBo1C9Yy1f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "a0c9d234-6a8f-4f70-8ffc-0cabef359ea2", "DetectTime": "2024-05-21T12:40:32.100126+00:00", "EventTime": "2024-05-21T12:40:32.100157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIA4bM33OFzBvF3EEd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "c9bbc974-6cf9-4ee1-900c-b91f59c671b2", "DetectTime": "2024-05-21T12:40:32.105647+00:00", "EventTime": "2024-05-21T12:40:32.105667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBaFR1rn0EDTG6tgd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "7afd7925-151c-4378-912b-8a52331016cb", "DetectTime": "2024-05-21T12:40:32.110716+00:00", "EventTime": "2024-05-21T12:40:32.110737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNev3C4YNLsIOY1aWb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "167e282c-2a3d-4317-b064-267ffbf1000a", "DetectTime": "2024-05-21T12:40:32.115666+00:00", "EventTime": "2024-05-21T12:40:32.115685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClBWNo4LB1F3v90VBa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "1f16183b-9edd-4f7b-bfca-3b33e21cc615", "DetectTime": "2024-05-21T12:40:32.120612+00:00", "EventTime": "2024-05-21T12:40:32.120631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvhSiQ1pSXg2sktPu9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "c0f89ba5-c53a-451c-936b-90597363dcb3", "DetectTime": "2024-05-21T12:40:32.132627+00:00", "EventTime": "2024-05-21T12:40:32.132647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuFpJf1JfpmwcxFxC7"], "accumulated_threat_level": 4.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "f291d4aa-9a2a-4895-8705-1333546591bf", "DetectTime": "2024-05-21T12:40:32.294089+00:00", "EventTime": "2024-05-21T12:40:32.294109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6OHfy4PGvUfaqmtv1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "e8e4f13f-2527-4a64-9918-bf7c67bade8b", "DetectTime": "2024-05-21T12:40:32.330951+00:00", "EventTime": "2024-05-21T12:40:32.330973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsYg02jXsiyFytIud"], "accumulated_threat_level": 5.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "9f58f2f6-f85a-4eec-ac55-8ef05c5a0e87", "DetectTime": "2024-05-21T12:40:32.567085+00:00", "EventTime": "2024-05-21T12:40:32.567103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaHWq25m2ix1yuHhl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "ccc91cc4-9fa1-4c6f-bb96-eb8f78cb00c0", "DetectTime": "2024-05-21T12:40:32.605024+00:00", "EventTime": "2024-05-21T12:40:32.605045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFYlD2DIU8m0enOqi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "5a0ad44e-992e-4474-99f0-cdcf53d7bed2", "DetectTime": "2024-05-21T12:40:32.757641+00:00", "EventTime": "2024-05-21T12:40:32.757658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtMbu4mRrDr46m7Le"], "accumulated_threat_level": 7.199999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "ee4fd94a-ed4a-4b8c-8ea1-eafbfd1aff18", "DetectTime": "2024-05-21T12:40:32.784089+00:00", "EventTime": "2024-05-21T12:40:32.784109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6Pc03ANu2p8i0nR3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "26ddb0f4-94b2-4a52-8912-305b009d1ffe", "DetectTime": "2024-05-21T12:40:32.831012+00:00", "EventTime": "2024-05-21T12:40:32.831030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAWFM3qlBm5EqH436"], "accumulated_threat_level": 7.999999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "a5990184-28f8-4bf6-8470-a353b75b4be7", "DetectTime": "2024-05-21T12:40:32.881810+00:00", "EventTime": "2024-05-21T12:40:32.881838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwKw23RwIvcwybY4a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "f127a236-b524-4f3e-bca8-17eb71f27386", "DetectTime": "2024-05-21T12:40:32.923027+00:00", "EventTime": "2024-05-21T12:40:32.923048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMMdZyUfio30zud5h"], "accumulated_threat_level": 9.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "22de9e07-cc3d-4312-a4d0-7d8b0db3324d", "DetectTime": "2024-05-21T12:40:32.955949+00:00", "EventTime": "2024-05-21T12:40:32.955969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3zOh249A8roKQs0e"], "accumulated_threat_level": 10.4, "timewindow": 113} +{"Format": "IDEA0", "ID": "77da0d6f-318a-4a9a-b7af-5df0fba7c70a", "DetectTime": "2024-05-21T12:40:32.997235+00:00", "EventTime": "2024-05-21T12:40:32.997255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Civf4y4GqPJwnBvytc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 113} +{"Format": "IDEA0", "ID": "b0de85c8-b49f-4089-9112-7b93fb0075ce", "DetectTime": "2024-05-21T12:40:33.041730+00:00", "EventTime": "2024-05-21T12:40:33.041750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPwFi3oAO9D2qYFpl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 113} +{"Format": "Json", "ID": "b0de85c8-b49f-4089-9112-7b93fb0075ce", "DetectTime": "2024-05-21T12:40:33.041730+00:00", "EventTime": "2024-05-21T12:40:33.041750+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-05T16:19:00.450568+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2024/05/21 12:40:33.198795)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 113, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e6527e25-6a1d-4315-8375-d62db54bc321", "DetectTime": "2024-05-21T12:40:33.282420+00:00", "EventTime": "2024-05-21T12:40:33.282447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYFag4bM1dJSIR9a7"], "accumulated_threat_level": 0.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "9e9b4a05-7256-4faa-a524-ae2045955583", "DetectTime": "2024-05-21T12:40:33.328656+00:00", "EventTime": "2024-05-21T12:40:33.328687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKLXQ2sbXlkVDVJPe"], "accumulated_threat_level": 1.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "1ace92a3-9718-4eca-ac89-d6d04d75dcd5", "DetectTime": "2024-05-21T12:40:33.371359+00:00", "EventTime": "2024-05-21T12:40:33.371389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcaXvU2pD6acldVjn7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 113} +{"Format": "IDEA0", "ID": "fa713e9d-2175-4a8d-9748-c773b5493013", "DetectTime": "2024-05-21T12:40:33.407053+00:00", "EventTime": "2024-05-21T12:40:33.407072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzeblI1ec1pIQNEF5l", "CJcc2i2VJk7CqOIp8", "CKl1j74oI09dgQobc9", "Cf98jm3PRo3jh5K1R8"], "accumulated_threat_level": 0.5, "timewindow": 114} +{"Format": "IDEA0", "ID": "2b55cfc8-7a43-402f-86c5-d1a87d7f55ea", "DetectTime": "2024-05-21T12:40:33.420873+00:00", "EventTime": "2024-05-21T12:40:33.420902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrsM72hlBZ0PZW1oj"], "accumulated_threat_level": 3.2, "timewindow": 113} +{"Format": "IDEA0", "ID": "49675d77-ef5f-49e4-9ee2-5b0f12830bfc", "DetectTime": "2024-05-21T12:40:33.465770+00:00", "EventTime": "2024-05-21T12:40:33.465798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPGQ04DtO5zFiHGc7"], "accumulated_threat_level": 4.0, "timewindow": 113} +{"Format": "IDEA0", "ID": "95dd4644-7490-45f6-8e42-74c0c86decdb", "DetectTime": "2024-05-21T12:40:33.515323+00:00", "EventTime": "2024-05-21T12:40:33.515359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctgzo74BZoDvpUNZ93"], "accumulated_threat_level": 4.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "36aa94cd-4138-4c28-bf4b-6507a086d328", "DetectTime": "2024-05-21T12:40:33.541692+00:00", "EventTime": "2024-05-21T12:40:33.541713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLiDv30LcQOH4Zj0j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 110} +{"Format": "IDEA0", "ID": "e6fc15ce-2a23-412f-89fa-9019b66a9905", "DetectTime": "2024-05-21T12:40:33.583570+00:00", "EventTime": "2024-05-21T12:40:33.583590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM97Wp31eo71BUqqA8"], "accumulated_threat_level": 5.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "56cffc05-8ae9-41e4-a16a-8819c258191c", "DetectTime": "2024-05-21T12:40:33.626769+00:00", "EventTime": "2024-05-21T12:40:33.626801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKAr1d2HFuuOhbwRUj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "18c0cf32-6dab-4acf-9024-1fa0995f630a", "DetectTime": "2024-05-21T12:40:33.664869+00:00", "EventTime": "2024-05-21T12:40:33.664888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9w3Oa1Ix8wnaOXwFg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "0f1d7e66-d480-498f-8ca7-342ee1086921", "DetectTime": "2024-05-21T12:40:33.899505+00:00", "EventTime": "2024-05-21T12:40:33.899525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzpLFC1sNenKK8Vfoi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "762241d8-1e30-403b-8ae7-e9a53d542237", "DetectTime": "2024-05-21T12:40:33.939489+00:00", "EventTime": "2024-05-21T12:40:33.939508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtUtzX1bO69kOrmzf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "89fdf4f3-94d1-4dde-a0de-67e9625c6922", "DetectTime": "2024-05-21T12:40:33.982012+00:00", "EventTime": "2024-05-21T12:40:33.982031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTzlZ2jdAfw7sZ7t7"], "accumulated_threat_level": 9.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "4681202d-63a3-454b-b3e7-8f2ba743a8d3", "DetectTime": "2024-05-21T12:40:34.115343+00:00", "EventTime": "2024-05-21T12:40:34.115365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbed2r32ZEUTTgBkF"], "accumulated_threat_level": 10.4, "timewindow": 113} +{"Format": "IDEA0", "ID": "f91e62f5-417a-40e7-81fd-57823260d32e", "DetectTime": "2024-05-21T12:40:34.156587+00:00", "EventTime": "2024-05-21T12:40:34.156606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdbzJL15bWUcaESEej"], "accumulated_threat_level": 11.200000000000001, "timewindow": 113} +{"Format": "IDEA0", "ID": "9839291c-7ea8-441b-8f20-f3037fa0a591", "DetectTime": "2024-05-21T12:40:34.191217+00:00", "EventTime": "2024-05-21T12:40:34.191239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CweXROhPMBdRCBGC3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "7ca7b813-2732-4fbd-9e37-8faa689d4174", "DetectTime": "2024-05-21T12:40:34.243473+00:00", "EventTime": "2024-05-21T12:40:34.243502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrB9F3HfxQlgea9x"], "accumulated_threat_level": 12.000000000000002, "timewindow": 113} +{"Format": "Json", "ID": "7ca7b813-2732-4fbd-9e37-8faa689d4174", "DetectTime": "2024-05-21T12:40:34.243473+00:00", "EventTime": "2024-05-21T12:40:34.243502+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-05T16:49:10.992402+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2024/05/21 12:40:34.631559)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 113, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2aafc5eb-d02a-424b-a54a-a38d7368eb20", "DetectTime": "2024-05-21T12:40:34.635475+00:00", "EventTime": "2024-05-21T12:40:34.635493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7uH62Nv3Ml2g7r8a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "f36af41b-54f9-48a8-bfc9-f9689125834f", "DetectTime": "2024-05-21T12:40:34.647799+00:00", "EventTime": "2024-05-21T12:40:34.647821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMLQ1R3Q2toiJt6DG5"], "accumulated_threat_level": 0.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "30041866-c29a-427e-9456-46d48ac71b14", "DetectTime": "2024-05-21T12:40:34.673908+00:00", "EventTime": "2024-05-21T12:40:34.673929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKJvl33mZFTn42zmj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "99b59a1a-255f-4b7c-aa07-0d39d1d891fb", "DetectTime": "2024-05-21T12:40:34.679438+00:00", "EventTime": "2024-05-21T12:40:34.679483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7qBl16wro2J29dra"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "9d45b241-284b-4cc7-9500-04195ad18453", "DetectTime": "2024-05-21T12:40:34.685141+00:00", "EventTime": "2024-05-21T12:40:34.685163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClClZm35338skU7VWi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "cbbdf2cd-0ff1-4467-9976-05e87aed910f", "DetectTime": "2024-05-21T12:40:34.689804+00:00", "EventTime": "2024-05-21T12:40:34.689822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbN5Ow1PZ860b2dahd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "e2165d50-1231-49a9-8139-82736db76c70", "DetectTime": "2024-05-21T12:40:34.758534+00:00", "EventTime": "2024-05-21T12:40:34.758556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VKk3qs1fWicb2K7"], "accumulated_threat_level": 1.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "ae2f3e68-aed1-4a51-98cc-ad51f8ae3ac3", "DetectTime": "2024-05-21T12:40:34.828689+00:00", "EventTime": "2024-05-21T12:40:34.828710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rKJW1dQNnvvJPmDe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "af2a001e-7b63-4bc1-b402-a087b0574f74", "DetectTime": "2024-05-21T12:40:34.907821+00:00", "EventTime": "2024-05-21T12:40:34.907842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9LDA3Df9HFmoWdJ9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "a2e1c480-58d8-4eeb-bf87-9dc90ca0765d", "DetectTime": "2024-05-21T12:40:34.912769+00:00", "EventTime": "2024-05-21T12:40:34.912787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8l7D4RxpcIS3bTIe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "f25e7f1f-715f-4209-9b05-338ed3440958", "DetectTime": "2024-05-21T12:40:34.917175+00:00", "EventTime": "2024-05-21T12:40:34.917192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggQfv2dPirO21hwcd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "5f19669a-6206-402e-bb20-2de3103fb1cd", "DetectTime": "2024-05-21T12:40:35.205408+00:00", "EventTime": "2024-05-21T12:40:35.205428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF8FjVh8lod3F9e5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "c6403ea1-62a0-4a95-9318-c405d5da9bdb", "DetectTime": "2024-05-21T12:40:35.228606+00:00", "EventTime": "2024-05-21T12:40:35.228626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLNT43ciR8EDXPiae"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 113} +{"Format": "IDEA0", "ID": "8d204328-e4e1-427a-a72d-ee1e2640c1b1", "DetectTime": "2024-05-21T12:40:35.301787+00:00", "EventTime": "2024-05-21T12:40:35.301809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYL0S2MKBcLuM5mZe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "605e12d9-1221-4df4-9ba2-acf1ba14d4fb", "DetectTime": "2024-05-21T12:40:35.306801+00:00", "EventTime": "2024-05-21T12:40:35.306821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR0tQjv7hCG2PbfAh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "d30de91e-7037-4681-9c11-6a071b458605", "DetectTime": "2024-05-21T12:40:35.312822+00:00", "EventTime": "2024-05-21T12:40:35.312842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNha3C1o9ElUIcRKsi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "52ddb1a6-dd32-42a3-a14c-248249a6e9ca", "DetectTime": "2024-05-21T12:40:35.410132+00:00", "EventTime": "2024-05-21T12:40:35.410153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlEXa2IL7Ze2zZOWf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "270c2219-e8fa-4a65-96a2-aeeedc2ca161", "DetectTime": "2024-05-21T12:40:35.415397+00:00", "EventTime": "2024-05-21T12:40:35.415418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0hlUm1Hrfbn6aPQJa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "ca6faa10-e7a9-4f11-89e6-588c4d8289a8", "DetectTime": "2024-05-21T12:40:35.428104+00:00", "EventTime": "2024-05-21T12:40:35.428123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAs82f3PqRE33Z01D2"], "accumulated_threat_level": 3.2, "timewindow": 113} +{"Format": "IDEA0", "ID": "bdeb4960-4ff5-4b78-9e24-2ed74845c221", "DetectTime": "2024-05-21T12:40:35.700630+00:00", "EventTime": "2024-05-21T12:40:35.700652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPd0b15PWWpDu0PAg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "d644caf4-45a6-4237-ac53-0a83c56d5ad1", "DetectTime": "2024-05-21T12:40:35.825220+00:00", "EventTime": "2024-05-21T12:40:35.825241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bLg61Mxa5RkEBJYd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "b34d3192-696d-4ef9-af3b-9883a54fd9e7", "DetectTime": "2024-05-21T12:40:35.830420+00:00", "EventTime": "2024-05-21T12:40:35.830438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C91gpa45W3Tbdc70h5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "80c02782-3339-479b-af2a-557ee31eeea7", "DetectTime": "2024-05-21T12:40:35.840987+00:00", "EventTime": "2024-05-21T12:40:35.841007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CChncn1epotYI6tDy3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "0f6ffd71-ccf7-47b5-9da5-e30204eed724", "DetectTime": "2024-05-21T12:40:35.887960+00:00", "EventTime": "2024-05-21T12:40:35.887981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUdJB3DaGkrjTZYAj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "6e572e50-760e-47a0-ba4f-ebadd7f77ea1", "DetectTime": "2024-05-21T12:40:35.925364+00:00", "EventTime": "2024-05-21T12:40:35.925385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEKHJm1S0du6Bre4dg"], "accumulated_threat_level": 4.0, "timewindow": 113} +{"Format": "IDEA0", "ID": "ee7449d3-2dc6-4c4f-a7a8-e488c4b8d72e", "DetectTime": "2024-05-21T12:40:35.987566+00:00", "EventTime": "2024-05-21T12:40:35.987585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6Ind1C1aT30gRu34"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "8bfdc38b-5355-4575-aaef-1960bb6ed49f", "DetectTime": "2024-05-21T12:40:36.018648+00:00", "EventTime": "2024-05-21T12:40:36.018669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgMiPjULCrnzHWb7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "8c028252-52df-4c2c-9601-b2db79591bd7", "DetectTime": "2024-05-21T12:40:36.070130+00:00", "EventTime": "2024-05-21T12:40:36.070150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sxund3PrIwxml1d"], "accumulated_threat_level": 4.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "b0280279-0ec9-45f7-926d-82b0c31b86ff", "DetectTime": "2024-05-21T12:40:36.297990+00:00", "EventTime": "2024-05-21T12:40:36.298012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbBV763xU3QnAEUq48"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "044e6f11-7f5f-4724-98e2-183affe600ac", "DetectTime": "2024-05-21T12:40:36.347698+00:00", "EventTime": "2024-05-21T12:40:36.347721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIai12ZkTaFdUfTQb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "aa736361-c4e5-4dcb-af55-9ad31f722ccc", "DetectTime": "2024-05-21T12:40:36.354574+00:00", "EventTime": "2024-05-21T12:40:36.354596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hoPX2CK5On5mCbQ4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "7b9dfcb6-3bcf-4524-a714-450655531239", "DetectTime": "2024-05-21T12:40:36.397211+00:00", "EventTime": "2024-05-21T12:40:36.397233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWx12wKm7hLcmgoQ4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "49711d21-07d4-4325-aaf7-4ed5556bc94b", "DetectTime": "2024-05-21T12:40:36.456426+00:00", "EventTime": "2024-05-21T12:40:36.456457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLItY2R16mCUmoY5j"], "accumulated_threat_level": 5.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "32b98733-92a7-4199-97c7-395a94909d22", "DetectTime": "2024-05-21T12:40:36.486976+00:00", "EventTime": "2024-05-21T12:40:36.486998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEet6tNnrMW3QNJ95"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "4208e043-65cb-4f09-b6da-64388d7d597e", "DetectTime": "2024-05-21T12:40:36.543965+00:00", "EventTime": "2024-05-21T12:40:36.543999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzvFG62Xg9XTSkEgk4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "08c319c1-85fc-4e67-99aa-718058c0a16a", "DetectTime": "2024-05-21T12:40:36.549225+00:00", "EventTime": "2024-05-21T12:40:36.549244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChxqtE4hW422fqE2a9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "457330a3-82af-44dd-948d-f89608857363", "DetectTime": "2024-05-21T12:40:36.606197+00:00", "EventTime": "2024-05-21T12:40:36.606218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0FDd44wev7N2AXV3a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "0fbb3d6b-7b5b-41c4-b12e-909795baff9c", "DetectTime": "2024-05-21T12:40:36.616927+00:00", "EventTime": "2024-05-21T12:40:36.616948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxNMYZOGxG9mpttaf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "9df153ab-261a-4c6b-8551-29f1a11c74d2", "DetectTime": "2024-05-21T12:40:36.890736+00:00", "EventTime": "2024-05-21T12:40:36.890758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASjC51DkT21lws2C5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "8f226a30-89f0-4d64-aa57-170007cc3ec0", "DetectTime": "2024-05-21T12:40:36.956569+00:00", "EventTime": "2024-05-21T12:40:36.956591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLWSPo13Htdw9bxy33"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "acd10c2d-bc37-4ed4-9950-0e90ca9c77b3", "DetectTime": "2024-05-21T12:40:36.963336+00:00", "EventTime": "2024-05-21T12:40:36.963358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ViHfmKSTEs38QFk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "b3ea1800-4673-409c-a79f-9d771cc4a3d7", "DetectTime": "2024-05-21T12:40:36.968482+00:00", "EventTime": "2024-05-21T12:40:36.968503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C42lbC4XAGf0xqow6e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "95837f90-4b53-4037-b74b-16c30dce017f", "DetectTime": "2024-05-21T12:40:36.973843+00:00", "EventTime": "2024-05-21T12:40:36.973866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg151j1MH4ZYSoph76"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "0ecf83dd-9902-4bb4-ae4e-b1767c7616f0", "DetectTime": "2024-05-21T12:40:37.096413+00:00", "EventTime": "2024-05-21T12:40:37.096436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHUmD23u2OMKtcx06"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "f758733d-f25d-423d-9c98-8deba422b888", "DetectTime": "2024-05-21T12:40:37.107769+00:00", "EventTime": "2024-05-21T12:40:37.107789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZFHlM1JUeZdC4E8yb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "c8b70735-aac7-4c7c-a590-195bd7c91be6", "DetectTime": "2024-05-21T12:40:37.170297+00:00", "EventTime": "2024-05-21T12:40:37.170315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRQVL9YhqPGYw3i3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "85115623-56e2-480c-be08-e5dd8dfd6884", "DetectTime": "2024-05-21T12:40:37.209465+00:00", "EventTime": "2024-05-21T12:40:37.209485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Xc2s317EjlwYnS56"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "f635d5d6-51f3-4e2f-aa93-e82675a54b8f", "DetectTime": "2024-05-21T12:40:37.252248+00:00", "EventTime": "2024-05-21T12:40:37.252271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuF5m53sPC6l8n7JS3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "b4fd97ea-5278-4878-aba2-90b7febd11d4", "DetectTime": "2024-05-21T12:40:37.266603+00:00", "EventTime": "2024-05-21T12:40:37.266626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerTvmGVMCzmjaqyg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 113} +{"Format": "IDEA0", "ID": "23145946-2763-46c7-97dc-8fe1878d91b3", "DetectTime": "2024-05-21T12:40:37.351128+00:00", "EventTime": "2024-05-21T12:40:37.351156+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.208.123.138"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgMsW21Jok2CzxJNkh"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "5a96a2df-55bb-42fc-a7b2-4a55fe862bb2", "DetectTime": "2024-05-21T12:40:37.372413+00:00", "EventTime": "2024-05-21T12:40:37.372449+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.208.123.138"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.208.123.138 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgMsW21Jok2CzxJNkh"], "accumulated_threat_level": 9.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "163ba9cb-fc8c-42ca-811c-f45580ed133f", "DetectTime": "2024-05-21T12:40:37.527390+00:00", "EventTime": "2024-05-21T12:40:37.527409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpYwda1600LjNqLVtg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "9fce979f-b9aa-402a-84f7-c663595e1a24", "DetectTime": "2024-05-21T12:40:37.533038+00:00", "EventTime": "2024-05-21T12:40:37.533056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRhRI1vW4VQxoV6Yd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "83b6e181-63d9-4ef9-ab6e-2df9b913dc7b", "DetectTime": "2024-05-21T12:40:37.545858+00:00", "EventTime": "2024-05-21T12:40:37.545880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMr7SCxkiWuc8Ej4l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "6c3c6aa0-250d-4249-94f0-405cfb6267cd", "DetectTime": "2024-05-21T12:40:37.629022+00:00", "EventTime": "2024-05-21T12:40:37.629054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3xpE22QdG3fTKqI81"], "accumulated_threat_level": 9.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "b9f2a759-8ff9-456d-b103-a35600a7c6af", "DetectTime": "2024-05-21T12:40:37.677886+00:00", "EventTime": "2024-05-21T12:40:37.677907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaFco52gVuf03xYPq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "602d88c9-6c3f-474a-a620-215c4ec9e5c7", "DetectTime": "2024-05-21T12:40:37.682747+00:00", "EventTime": "2024-05-21T12:40:37.682768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1q5t04vGqsyWvmMbb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "5d2d6cff-18d5-4361-8e9f-10b585e7a624", "DetectTime": "2024-05-21T12:40:37.742804+00:00", "EventTime": "2024-05-21T12:40:37.742831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGvzJ21oqzWhYoDmd4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "bdc8f459-de4b-49d7-b742-d1517ff1a47f", "DetectTime": "2024-05-21T12:40:37.788207+00:00", "EventTime": "2024-05-21T12:40:37.788227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXcip1uqzxAuAQfZb"], "accumulated_threat_level": 10.4, "timewindow": 113} +{"Format": "IDEA0", "ID": "8dada11d-090d-4fd9-8a95-4c8b16ec0864", "DetectTime": "2024-05-21T12:40:37.819229+00:00", "EventTime": "2024-05-21T12:40:37.819249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrHCa28Ga8n8HIWak"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "947c7731-767d-4596-b1ea-b4f71ee8641a", "DetectTime": "2024-05-21T12:40:38.052319+00:00", "EventTime": "2024-05-21T12:40:38.052341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEsF5VkQaCawnERYa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "dc5217be-c8a8-4826-b4b6-a8f8da5309ab", "DetectTime": "2024-05-21T12:40:38.083047+00:00", "EventTime": "2024-05-21T12:40:38.083068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCUa7VgMvYeW5mHGc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "6d7b54ba-73e1-44db-8849-2903f211c443", "DetectTime": "2024-05-21T12:40:38.125082+00:00", "EventTime": "2024-05-21T12:40:38.125101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBLnI3cd8D5wxS7g6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 113} +{"Format": "IDEA0", "ID": "173207f8-d048-4c7d-a788-801bd65da71d", "DetectTime": "2024-05-21T12:40:38.162436+00:00", "EventTime": "2024-05-21T12:40:38.162458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQmX3G440XUVGaTiGl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "ff37ebb2-a8e0-416e-9f1a-bf4d9162bcb5", "DetectTime": "2024-05-21T12:40:38.203514+00:00", "EventTime": "2024-05-21T12:40:38.203537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbHEGM6aMBJnFvJSl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "f0284ad7-f609-42ac-9bde-5ccf14c95597", "DetectTime": "2024-05-21T12:40:38.260859+00:00", "EventTime": "2024-05-21T12:40:38.260881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCd30v4JK7BcB187Oi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 113} +{"Format": "Json", "ID": "f0284ad7-f609-42ac-9bde-5ccf14c95597", "DetectTime": "2024-05-21T12:40:38.260859+00:00", "EventTime": "2024-05-21T12:40:38.260881+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "1970-01-05T16:49:33.931189+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 113. (real time 2024/05/21 12:40:38.449733)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 113, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "058367c9-40ea-456b-9b56-cf63d4c0f5ab", "DetectTime": "2024-05-21T12:40:38.453831+00:00", "EventTime": "2024-05-21T12:40:38.453849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrybC2JmnRCCBg1Rh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "9cae2bff-69db-4d4e-84bd-84f5468f4aac", "DetectTime": "2024-05-21T12:40:38.458755+00:00", "EventTime": "2024-05-21T12:40:38.458780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUiD74xLJWgJhC5Mc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "055a9911-73d7-48d8-9bd3-272d7cbf9860", "DetectTime": "2024-05-21T12:40:38.471877+00:00", "EventTime": "2024-05-21T12:40:38.471905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqq3dbq99OAFyA92c"], "accumulated_threat_level": 0.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "4f214210-e22f-4292-afbb-fa1ca60916be", "DetectTime": "2024-05-21T12:40:38.613997+00:00", "EventTime": "2024-05-21T12:40:38.614017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fJVSJ0vgQvZsp2a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "6a9284c7-6442-40ca-b277-230ab480d6d2", "DetectTime": "2024-05-21T12:40:38.620510+00:00", "EventTime": "2024-05-21T12:40:38.620534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcnP83lix92cSQYYe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "374ea46e-a5af-4f27-b049-d8c51e9c97b8", "DetectTime": "2024-05-21T12:40:38.662427+00:00", "EventTime": "2024-05-21T12:40:38.662446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZgelwVdnuFJHPNT3"], "accumulated_threat_level": 1.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "c7d36145-8f25-4018-83e5-f6c0bc0c4b06", "DetectTime": "2024-05-21T12:40:38.715448+00:00", "EventTime": "2024-05-21T12:40:38.715469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURxUE4p0HvHXRIhe5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "11901809-5eed-4a5b-8112-181d436e61c0", "DetectTime": "2024-05-21T12:40:38.776967+00:00", "EventTime": "2024-05-21T12:40:38.776985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSiUGQoDOPN0QtG1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 113} +{"Format": "IDEA0", "ID": "649025fb-e090-4a6e-a44c-c370cdc071e8", "DetectTime": "2024-05-21T12:40:38.820859+00:00", "EventTime": "2024-05-21T12:40:38.820877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQWoc244fkHDBfAQ"], "accumulated_threat_level": 3.2, "timewindow": 113} +{"Format": "IDEA0", "ID": "708d0691-a453-46ff-ba7e-930d26a39fd0", "DetectTime": "2024-05-21T12:40:38.952735+00:00", "EventTime": "2024-05-21T12:40:38.952754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9QUe3S6VyD8o7KX1"], "accumulated_threat_level": 4.0, "timewindow": 113} +{"Format": "IDEA0", "ID": "8062fc4a-1c0d-44e8-a50b-94e5a9836d6f", "DetectTime": "2024-05-21T12:40:38.978714+00:00", "EventTime": "2024-05-21T12:40:38.978736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWFcq12YftgoXQkOvh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 111} +{"Format": "IDEA0", "ID": "65da719b-dc1b-46a4-8695-d74e58c3afaf", "DetectTime": "2024-05-21T12:40:39.225122+00:00", "EventTime": "2024-05-21T12:40:39.225141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx9vdB2KOjcUVeadU6"], "accumulated_threat_level": 4.8, "timewindow": 113} +{"Format": "IDEA0", "ID": "37c5bee9-e886-4e9b-b7d4-1abf728dabda", "DetectTime": "2024-05-21T12:40:39.272784+00:00", "EventTime": "2024-05-21T12:40:39.272802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0ocq3BEcW7sm0oZ2"], "accumulated_threat_level": 5.6, "timewindow": 113} +{"Format": "IDEA0", "ID": "29904dc9-c469-4a51-82be-de8f7510d8e1", "DetectTime": "2024-05-21T12:40:39.313661+00:00", "EventTime": "2024-05-21T12:40:39.313680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnC8a2eNVmAyuYAMi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "47f6ec67-70f0-44d3-93bc-10237c4ba0cc", "DetectTime": "2024-05-21T12:40:39.405593+00:00", "EventTime": "2024-05-21T12:40:39.405612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8x4v3FoOsLsBXcZj"], "accumulated_threat_level": 1.3, "timewindow": 114} +{"Format": "IDEA0", "ID": "1681d1b6-17ab-4ce7-808e-e22dcd0415cd", "DetectTime": "2024-05-21T12:40:39.461551+00:00", "EventTime": "2024-05-21T12:40:39.461568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImLELGodCOXcRRp8"], "accumulated_threat_level": 2.1, "timewindow": 114} +{"Format": "IDEA0", "ID": "ee7d0d96-714d-4e71-a1b8-125b10f7f5e7", "DetectTime": "2024-05-21T12:40:39.484813+00:00", "EventTime": "2024-05-21T12:40:39.484834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT5Czl3lbpDWWpJQQb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "fbba76e9-5fc4-45bf-b4f2-14375eee8787", "DetectTime": "2024-05-21T12:40:39.530290+00:00", "EventTime": "2024-05-21T12:40:39.530312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNgbP2KdIuyAXrCb1"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 114} +{"Format": "IDEA0", "ID": "1947039b-4724-4c1f-8e01-5f44f0042ab7", "DetectTime": "2024-05-21T12:40:39.581144+00:00", "EventTime": "2024-05-21T12:40:39.581164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUqaA1DKFChD3EQZj"], "accumulated_threat_level": 3.7, "timewindow": 114} +{"Format": "IDEA0", "ID": "0701e22b-ae42-44f8-aa83-f918229976e0", "DetectTime": "2024-05-21T12:40:39.835564+00:00", "EventTime": "2024-05-21T12:40:39.835582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfpArA3z4KH5Ozpb09"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "2d95d249-53e3-46df-812e-c52abe6c4ed4", "DetectTime": "2024-05-21T12:40:39.876225+00:00", "EventTime": "2024-05-21T12:40:39.876243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCuBJ5xs6loFkEmd"], "accumulated_threat_level": 4.5, "timewindow": 114} +{"Format": "IDEA0", "ID": "e7a6790d-7cf6-4b77-935d-6551ac7fec4e", "DetectTime": "2024-05-21T12:40:39.919344+00:00", "EventTime": "2024-05-21T12:40:39.919365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc6Zej3ycQkATjAbnf"], "accumulated_threat_level": 5.3, "timewindow": 114} +{"Format": "IDEA0", "ID": "5ef40569-3def-4130-824b-4e4a580fc82f", "DetectTime": "2024-05-21T12:40:39.963486+00:00", "EventTime": "2024-05-21T12:40:39.963508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpd2Is4ZUS5JJBJGw9"], "accumulated_threat_level": 6.1, "timewindow": 114} +{"Format": "IDEA0", "ID": "1298c72d-d8c2-4c8b-a429-5ae0664ee231", "DetectTime": "2024-05-21T12:40:40.008666+00:00", "EventTime": "2024-05-21T12:40:40.008685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ47G43pApyhUynE0j"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "662b8922-7e74-441d-ae16-cbf603e88b63", "DetectTime": "2024-05-21T12:40:40.052296+00:00", "EventTime": "2024-05-21T12:40:40.052317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKZ8s0f5NPGNwfP6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "2f823341-d5c1-41ad-bdba-040a69b688aa", "DetectTime": "2024-05-21T12:40:40.102174+00:00", "EventTime": "2024-05-21T12:40:40.102193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUuuU3cWcwa4gQPbi"], "accumulated_threat_level": 8.5, "timewindow": 114} +{"Format": "IDEA0", "ID": "980b87dd-f4cc-42b8-b4fb-97b2854c31aa", "DetectTime": "2024-05-21T12:40:40.107130+00:00", "EventTime": "2024-05-21T12:40:40.107151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAZF8L1pkBUSmP4zg8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "2d72aadd-c491-409f-b695-56fbdaee2ef3", "DetectTime": "2024-05-21T12:40:40.176202+00:00", "EventTime": "2024-05-21T12:40:40.176227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8ihV3UWlb5uvGnye"], "accumulated_threat_level": 9.3, "timewindow": 114} +{"Format": "IDEA0", "ID": "c7fe202f-8f9b-4458-9559-e3afee5e43fa", "DetectTime": "2024-05-21T12:40:40.215902+00:00", "EventTime": "2024-05-21T12:40:40.215926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsqEJduuSMxJHEY4"], "accumulated_threat_level": 10.100000000000001, "timewindow": 114} +{"Format": "IDEA0", "ID": "660e8499-d6ed-45a8-90ca-1ae249e72cbf", "DetectTime": "2024-05-21T12:40:40.258251+00:00", "EventTime": "2024-05-21T12:40:40.258279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJiEVj2A0izpHP23qj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "395ae054-d080-49e5-8f53-b7efbfc0ca14", "DetectTime": "2024-05-21T12:40:40.298295+00:00", "EventTime": "2024-05-21T12:40:40.298316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPfhd4wS4dpX3esbg"], "accumulated_threat_level": 10.900000000000002, "timewindow": 114} +{"Format": "IDEA0", "ID": "c5fbaa6b-9a99-4ad9-bcbe-2b64b2f48a2f", "DetectTime": "2024-05-21T12:40:40.534068+00:00", "EventTime": "2024-05-21T12:40:40.534087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH4Mc71iFwubS22jE1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "bacc4bec-f3f4-47c6-b471-609ecd73c45e", "DetectTime": "2024-05-21T12:40:40.573192+00:00", "EventTime": "2024-05-21T12:40:40.573226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs3qUw1XW8rkeS770g"], "accumulated_threat_level": 11.700000000000003, "timewindow": 114} +{"Format": "IDEA0", "ID": "5835b461-fdc2-4524-bec7-a84065c5d41f", "DetectTime": "2024-05-21T12:40:40.616026+00:00", "EventTime": "2024-05-21T12:40:40.616068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMbIN1b2fZQesgKk6"], "accumulated_threat_level": 12.500000000000004, "timewindow": 114} +{"Format": "Json", "ID": "5835b461-fdc2-4524-bec7-a84065c5d41f", "DetectTime": "2024-05-21T12:40:40.616026+00:00", "EventTime": "2024-05-21T12:40:40.616068+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-05T17:19:45.483449+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2024/05/21 12:40:40.892914)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 114, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "67d65c98-7d66-491c-909d-bf384dd91ced", "DetectTime": "2024-05-21T12:40:40.897536+00:00", "EventTime": "2024-05-21T12:40:40.897556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmbVeh4CYfCyYHMg67"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "63d2a23a-a6aa-4d76-803f-381ba9347e36", "DetectTime": "2024-05-21T12:40:40.902596+00:00", "EventTime": "2024-05-21T12:40:40.902618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqhVMR2w6K970irKV5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "5e5946e9-7f14-430c-a7de-5fd0f57a8cd6", "DetectTime": "2024-05-21T12:40:40.915035+00:00", "EventTime": "2024-05-21T12:40:40.915054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHY88S3inme0m9hz3a"], "accumulated_threat_level": 0.8, "timewindow": 114} +{"Format": "IDEA0", "ID": "73bbd57c-8100-4b74-9e6c-26b5c99f94cc", "DetectTime": "2024-05-21T12:40:40.919996+00:00", "EventTime": "2024-05-21T12:40:40.920015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2iI8T2yz11qcf3uA6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "b4552de6-ef80-4fc3-813e-e71fe2351feb", "DetectTime": "2024-05-21T12:40:40.924786+00:00", "EventTime": "2024-05-21T12:40:40.924803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORQGZ3H6Yojbyl006"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "47487d96-3107-4712-a038-f190999ba1e9", "DetectTime": "2024-05-21T12:40:40.936782+00:00", "EventTime": "2024-05-21T12:40:40.936801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHzIu2JdFQx6Ryg7g"], "accumulated_threat_level": 1.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "9470f2fa-39f7-40a0-9682-61f453c9ee3e", "DetectTime": "2024-05-21T12:40:41.155541+00:00", "EventTime": "2024-05-21T12:40:41.155562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1en8Dg42OQ0uuVdh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "e3c1fcd1-8762-4415-81aa-a1ee54aa9c58", "DetectTime": "2024-05-21T12:40:41.206883+00:00", "EventTime": "2024-05-21T12:40:41.206903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysBoa3OhmLqT4akLa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 114} +{"Format": "IDEA0", "ID": "64c959e7-3c3b-4f88-8c75-60d41751f4e5", "DetectTime": "2024-05-21T12:40:41.246571+00:00", "EventTime": "2024-05-21T12:40:41.246591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPVKbm4CTeuwCQe9o"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "d4006fb8-4f1f-463a-ad3a-b7668bbae061", "DetectTime": "2024-05-21T12:40:41.285270+00:00", "EventTime": "2024-05-21T12:40:41.285292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRiTm3ADkcnwZhjnk"], "accumulated_threat_level": 3.2, "timewindow": 114} +{"Format": "IDEA0", "ID": "411ecf2a-c4db-4eff-bd05-7fc803029d7a", "DetectTime": "2024-05-21T12:40:41.316665+00:00", "EventTime": "2024-05-21T12:40:41.316686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTTECC3LLqmsfHTi2k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "4f55397c-bd88-44ef-9d58-1ad50542f89e", "DetectTime": "2024-05-21T12:40:41.367838+00:00", "EventTime": "2024-05-21T12:40:41.367856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueVIu27EuoBp0Rvd"], "accumulated_threat_level": 4.0, "timewindow": 114} +{"Format": "IDEA0", "ID": "54f6ef2e-d5a3-46b6-bab1-2d59fb705020", "DetectTime": "2024-05-21T12:40:41.391363+00:00", "EventTime": "2024-05-21T12:40:41.391386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVWX2o1es7jHqAp26c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "f77824e5-c26f-4b8d-a90c-c58c3f94930b", "DetectTime": "2024-05-21T12:40:41.436744+00:00", "EventTime": "2024-05-21T12:40:41.436764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4jnE44k4SIPnw565"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "35c4f781-e5c3-4359-af87-21c473d313e8", "DetectTime": "2024-05-21T12:40:41.482018+00:00", "EventTime": "2024-05-21T12:40:41.482054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdCkp48ZAy5GsRjak"], "accumulated_threat_level": 4.8, "timewindow": 114} +{"Format": "IDEA0", "ID": "413530fb-0cfa-4b42-abdb-02159b6d3943", "DetectTime": "2024-05-21T12:40:41.487549+00:00", "EventTime": "2024-05-21T12:40:41.487572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8ict11dNTRkFfvP1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "a53cd261-3e9b-4227-b9d4-44f18fa66f1d", "DetectTime": "2024-05-21T12:40:41.743587+00:00", "EventTime": "2024-05-21T12:40:41.743610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chim5RpWKqLQEeMF3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "7cf0b7b4-3bd0-4170-98b7-e6f3e1acf324", "DetectTime": "2024-05-21T12:40:41.798640+00:00", "EventTime": "2024-05-21T12:40:41.798680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQC2tR2t8qpzMlguCb"], "accumulated_threat_level": 5.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "8b70fdfc-cf08-47b5-970b-e9fda5a90cd6", "DetectTime": "2024-05-21T12:40:41.816716+00:00", "EventTime": "2024-05-21T12:40:41.816742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcsEi2N2jcdU3YSy2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "92948cee-b6a4-44ad-baee-f400539bd1c3", "DetectTime": "2024-05-21T12:40:41.873617+00:00", "EventTime": "2024-05-21T12:40:41.873635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39ATm4PBvewDHZtJd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "c8fe23e4-5a90-48d8-8fca-9e73592ed39e", "DetectTime": "2024-05-21T12:40:41.912304+00:00", "EventTime": "2024-05-21T12:40:41.912325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb4ihqfuX31OOIiUe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "49036d99-b784-43df-9265-4dccd45b95fc", "DetectTime": "2024-05-21T12:40:41.946885+00:00", "EventTime": "2024-05-21T12:40:41.946906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxgs14Ftd57wxV5Wk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "9e2750ad-9979-479e-b51f-a1cfb3704a9d", "DetectTime": "2024-05-21T12:40:41.987345+00:00", "EventTime": "2024-05-21T12:40:41.987365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChosPA4CRyz4NlhVkb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "54523882-e28a-4793-964d-c9821bda8ac2", "DetectTime": "2024-05-21T12:40:42.128399+00:00", "EventTime": "2024-05-21T12:40:42.128416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfx69Z3VnzFUC6hI61"], "accumulated_threat_level": 8.799999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "a1f78b32-976a-4641-8be4-c8e5776c7552", "DetectTime": "2024-05-21T12:40:42.355195+00:00", "EventTime": "2024-05-21T12:40:42.355218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfEFJe3KsPrCYb5fsa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "fe23b0b0-179e-4c05-bdd8-5c39e290ed06", "DetectTime": "2024-05-21T12:40:42.411854+00:00", "EventTime": "2024-05-21T12:40:42.411875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK0LOD3f39BB2Fso73"], "accumulated_threat_level": 9.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "42940572-1c77-410b-aec7-8e38d600b803", "DetectTime": "2024-05-21T12:40:42.439599+00:00", "EventTime": "2024-05-21T12:40:42.439620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4SXX1giajavksGb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "307b782e-73ae-48db-a2be-ca2f4b44d241", "DetectTime": "2024-05-21T12:40:42.480885+00:00", "EventTime": "2024-05-21T12:40:42.480907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIRPadVQcJcVarwI1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "5c652a6c-ef93-46a1-a391-5cc795633cde", "DetectTime": "2024-05-21T12:40:42.531458+00:00", "EventTime": "2024-05-21T12:40:42.531480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTLl3x4e0jeJ5IYlj6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "39a75be2-9ff0-44c9-ac72-4eff35a9d246", "DetectTime": "2024-05-21T12:40:42.572315+00:00", "EventTime": "2024-05-21T12:40:42.572337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnHF112nJWY5Yrqxa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "b355382c-2a85-4e3e-9603-fdfa7d190833", "DetectTime": "2024-05-21T12:40:42.633332+00:00", "EventTime": "2024-05-21T12:40:42.633351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIUhi35ysCpBaWr01"], "accumulated_threat_level": 10.4, "timewindow": 114} +{"Format": "IDEA0", "ID": "831e5d2f-185f-46ba-9d2f-4902b298b4dc", "DetectTime": "2024-05-21T12:40:42.667420+00:00", "EventTime": "2024-05-21T12:40:42.667443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOuhf1c4DBRdBBgwa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "43475c70-3dfa-4483-b166-0fe480e4fc78", "DetectTime": "2024-05-21T12:40:42.930527+00:00", "EventTime": "2024-05-21T12:40:42.930545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKhZS39YsRJMzyR7b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 114} +{"Format": "IDEA0", "ID": "4b7b2ec4-99b7-4d0d-b51c-fdb48acb4dbc", "DetectTime": "2024-05-21T12:40:42.935256+00:00", "EventTime": "2024-05-21T12:40:42.935275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNRisf7kNjUzNZ3g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "f43ccbeb-63c2-4b5f-8008-66a8d104ff9d", "DetectTime": "2024-05-21T12:40:42.979253+00:00", "EventTime": "2024-05-21T12:40:42.979275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQiPi4VaOgVzCWHoj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "72d62254-d817-4244-af4b-7039793db85a", "DetectTime": "2024-05-21T12:40:43.033227+00:00", "EventTime": "2024-05-21T12:40:43.033246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrAeE14raEAiUY37k"], "accumulated_threat_level": 12.000000000000002, "timewindow": 114} +{"Format": "Json", "ID": "72d62254-d817-4244-af4b-7039793db85a", "DetectTime": "2024-05-21T12:40:43.033227+00:00", "EventTime": "2024-05-21T12:40:43.033246+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "1970-01-05T17:50:12.245942+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2024/05/21 12:40:43.196035)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 114, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8cd684ae-12e8-4595-9524-c7d9f9c4adef", "DetectTime": "2024-05-21T12:40:43.200793+00:00", "EventTime": "2024-05-21T12:40:43.200815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaOqM3aMuYY7jSe2d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "8ea5d808-0589-4b29-96d6-8a0a4f99ea5a", "DetectTime": "2024-05-21T12:40:43.206429+00:00", "EventTime": "2024-05-21T12:40:43.206447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwsoKS3MKKn9kZ7Ni7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "ba191d78-07e1-49d1-989b-3ee354e18a92", "DetectTime": "2024-05-21T12:40:43.218868+00:00", "EventTime": "2024-05-21T12:40:43.218887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwmxvq1rhRBeu0BAyb"], "accumulated_threat_level": 0.8, "timewindow": 114} +{"Format": "IDEA0", "ID": "c04759b5-a1ad-4a69-a236-42a3aca3b697", "DetectTime": "2024-05-21T12:40:43.230400+00:00", "EventTime": "2024-05-21T12:40:43.230434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWC1mu3cX31ZFKugyf"], "accumulated_threat_level": 1.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "cdc04f81-7d80-473d-987b-244a4053b3ac", "DetectTime": "2024-05-21T12:40:43.442493+00:00", "EventTime": "2024-05-21T12:40:43.442513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAaETC1xEeNJOLnrR7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "62ce6b16-9f4c-47fb-9ada-5a4334d98e33", "DetectTime": "2024-05-21T12:40:43.452016+00:00", "EventTime": "2024-05-21T12:40:43.452040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwGHi5CBgyLM4BtZk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "cbc79964-be09-4023-bbe1-4aee81924c7a", "DetectTime": "2024-05-21T12:40:43.464421+00:00", "EventTime": "2024-05-21T12:40:43.464440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezecI30ytyAykG5uf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 114} +{"Format": "IDEA0", "ID": "fb5f0285-aa28-4c6d-8528-0a090944c493", "DetectTime": "2024-05-21T12:40:43.469159+00:00", "EventTime": "2024-05-21T12:40:43.469177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpATqoexbV5r858i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "b93ba907-4e64-4af5-a474-7e44bfa86843", "DetectTime": "2024-05-21T12:40:43.494983+00:00", "EventTime": "2024-05-21T12:40:43.495002+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.242.78.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtOjm2vxujrdYsrvb"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "35ebc44d-34e6-4749-981b-a54957db7c52", "DetectTime": "2024-05-21T12:40:43.508382+00:00", "EventTime": "2024-05-21T12:40:43.508401+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.242.78.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.242.78.118 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: dsl-189-242-78-118-dyn.prod-infinitum.com.mx Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtOjm2vxujrdYsrvb"], "accumulated_threat_level": 10.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "b16f43f9-b498-4c03-addb-a1af546be3dd", "DetectTime": "2024-05-21T12:40:43.548997+00:00", "EventTime": "2024-05-21T12:40:43.549018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFU6E10LQfeaDxEC5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "c65e0bfe-6526-4a5d-846c-41e6de46650b", "DetectTime": "2024-05-21T12:40:43.564432+00:00", "EventTime": "2024-05-21T12:40:43.564455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAUwF2aeVDp7ljsi3"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "7a368e3a-18a0-4376-9dab-a88e1efbaaca", "DetectTime": "2024-05-21T12:40:43.577065+00:00", "EventTime": "2024-05-21T12:40:43.577084+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAUwF2aeVDp7ljsi3"], "accumulated_threat_level": 10.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "c65de503-45f0-4100-bbbf-9f02ee20af09", "DetectTime": "2024-05-21T12:40:43.622522+00:00", "EventTime": "2024-05-21T12:40:43.622543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7aPto1tAPVjGpuLN3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "dfb3ade6-d3bc-4639-8f59-d1a15df7807a", "DetectTime": "2024-05-21T12:40:43.681321+00:00", "EventTime": "2024-05-21T12:40:43.681353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Civ9Ol2y0mg2KBevlk"], "accumulated_threat_level": 3.2, "timewindow": 114} +{"Format": "IDEA0", "ID": "c9f8416f-a901-4580-9175-fe2a4abfe816", "DetectTime": "2024-05-21T12:40:43.727809+00:00", "EventTime": "2024-05-21T12:40:43.727848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKkDQkov4NfOmkjb"], "accumulated_threat_level": 4.0, "timewindow": 114} +{"Format": "IDEA0", "ID": "e0611b36-f4fb-4107-9382-fd5a731b69ff", "DetectTime": "2024-05-21T12:40:43.771817+00:00", "EventTime": "2024-05-21T12:40:43.771838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq9AjZ3Hdh0BjCy14c"], "accumulated_threat_level": 4.8, "timewindow": 114} +{"Format": "IDEA0", "ID": "b47f9a9f-3bf7-49f4-a290-c90b62013c36", "DetectTime": "2024-05-21T12:40:43.816111+00:00", "EventTime": "2024-05-21T12:40:43.816135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzU2x1plqF1Avxpsb"], "accumulated_threat_level": 5.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "d2d6a805-2c4f-4475-8cd4-e6a403c617ee", "DetectTime": "2024-05-21T12:40:43.828670+00:00", "EventTime": "2024-05-21T12:40:43.828689+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgJoI3YD5pXkTjej"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "cfa119a3-3480-4be5-be1f-c25a7fef5b69", "DetectTime": "2024-05-21T12:40:43.841853+00:00", "EventTime": "2024-05-21T12:40:43.841872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCgJoI3YD5pXkTjej"], "accumulated_threat_level": 11.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "8a7ebabc-3a5c-4e05-b404-109fa71d4a98", "DetectTime": "2024-05-21T12:40:43.850685+00:00", "EventTime": "2024-05-21T12:40:43.850704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUe9JI8p5Pxels2k3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "d4c4baee-4e92-4cd9-9eb5-3bcd98ebac3f", "DetectTime": "2024-05-21T12:40:43.996071+00:00", "EventTime": "2024-05-21T12:40:43.996093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGC8e4GeFJyauGVVd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "bbc6d8f8-f546-4a06-8f0a-8ff803db21de", "DetectTime": "2024-05-21T12:40:44.003862+00:00", "EventTime": "2024-05-21T12:40:44.003882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAod2u2wb2trIjy9Q"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "42adcfc1-2993-4cc8-b4a7-70504a812254", "DetectTime": "2024-05-21T12:40:44.254477+00:00", "EventTime": "2024-05-21T12:40:44.254499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWqsTRVJlPF1WSn9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "e643f206-a5cd-497e-b387-a7838351e24e", "DetectTime": "2024-05-21T12:40:44.259893+00:00", "EventTime": "2024-05-21T12:40:44.259912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMoAc2K77RUj6QAOb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "b031145e-4edd-4b7e-8464-00496337b3b6", "DetectTime": "2024-05-21T12:40:44.324199+00:00", "EventTime": "2024-05-21T12:40:44.324222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8qiz2JkU8IaoybO1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "f88fb4aa-1977-42f7-b3c2-756ecdba6593", "DetectTime": "2024-05-21T12:40:44.366857+00:00", "EventTime": "2024-05-21T12:40:44.366875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6uHCwwR7YdG70Wl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "a92998a5-2635-4df0-8b19-eedf95ac5d0c", "DetectTime": "2024-05-21T12:40:44.395266+00:00", "EventTime": "2024-05-21T12:40:44.395287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mzVz3tTKNSzjv2T1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "ddb3896f-2354-4de4-825c-3d563d053980", "DetectTime": "2024-05-21T12:40:44.438447+00:00", "EventTime": "2024-05-21T12:40:44.438468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VmguSSUq2GevI91"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "85a57bd3-245a-4810-b75f-c72f4a5a757f", "DetectTime": "2024-05-21T12:40:44.481731+00:00", "EventTime": "2024-05-21T12:40:44.481753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOGDr44MDboCA0MPa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "b2c92fcf-0ae8-4274-b9af-eb5ee4acc673", "DetectTime": "2024-05-21T12:40:44.486640+00:00", "EventTime": "2024-05-21T12:40:44.486660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzpE3Djvm8LqqySy3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "4f9843d9-50fc-45b6-b790-08c5bff1b259", "DetectTime": "2024-05-21T12:40:44.727888+00:00", "EventTime": "2024-05-21T12:40:44.727908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cesseu3d7EpY511H53"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "9c3e75bf-2004-48c9-92d0-2e8dd44de7f5", "DetectTime": "2024-05-21T12:40:44.772724+00:00", "EventTime": "2024-05-21T12:40:44.772746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdzGJ2lVEvwa9rA4c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "480d248f-409d-46e4-9811-b24951e0cc68", "DetectTime": "2024-05-21T12:40:44.785369+00:00", "EventTime": "2024-05-21T12:40:44.785390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eSTA4sSFXFnH6HD4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 114} +{"Format": "IDEA0", "ID": "4656a772-877b-494b-aec5-c40b593acef9", "DetectTime": "2024-05-21T12:40:44.790392+00:00", "EventTime": "2024-05-21T12:40:44.790425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQoV8Z1Jbj2acDnkzl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "a88c27cb-d542-4f5f-9c97-fe8987732669", "DetectTime": "2024-05-21T12:40:44.871346+00:00", "EventTime": "2024-05-21T12:40:44.871367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxQSJ1iMj26kDNcIf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "4fa0ab63-b53c-4b4b-955a-fd5b56d77ef9", "DetectTime": "2024-05-21T12:40:44.920191+00:00", "EventTime": "2024-05-21T12:40:44.920210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPqZb83z7q5cDdapge"], "accumulated_threat_level": 9.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "8b6820d9-5db6-4c3c-86d3-0052da7828b1", "DetectTime": "2024-05-21T12:40:44.925143+00:00", "EventTime": "2024-05-21T12:40:44.925161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOU6D1QcDhBIaqkjh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "b75677f7-a064-4fd7-ad2a-28ed61c5f936", "DetectTime": "2024-05-21T12:40:44.989932+00:00", "EventTime": "2024-05-21T12:40:44.989953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8yZN14Hg9ARN8WE74"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "31ea5e67-006d-4669-9203-9c92287ab401", "DetectTime": "2024-05-21T12:40:44.995212+00:00", "EventTime": "2024-05-21T12:40:44.995233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWBH11krAG2szbZgi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "f7e9663f-700e-45bc-94e8-027e65408413", "DetectTime": "2024-05-21T12:40:45.260140+00:00", "EventTime": "2024-05-21T12:40:45.260157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xwvR3lVl3xUZ0W8d"], "accumulated_threat_level": 10.4, "timewindow": 114} +{"Format": "IDEA0", "ID": "bb67e271-7081-4412-92bb-852056a993de", "DetectTime": "2024-05-21T12:40:45.295238+00:00", "EventTime": "2024-05-21T12:40:45.295260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCa8YZ2NRbkg5BSwVj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "f1ea68e7-4181-4a26-81c8-3be592fd03ee", "DetectTime": "2024-05-21T12:40:45.452865+00:00", "EventTime": "2024-05-21T12:40:45.452886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16qSQ1GUvIDtCqYn5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 114} +{"Format": "IDEA0", "ID": "7d4269df-f436-4b5a-8519-f2d73841ff8b", "DetectTime": "2024-05-21T12:40:45.458171+00:00", "EventTime": "2024-05-21T12:40:45.458190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5m00r3XsRvz855rrh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "35904b8b-6967-484a-83a0-cad01977dcac", "DetectTime": "2024-05-21T12:40:45.470364+00:00", "EventTime": "2024-05-21T12:40:45.470382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyPN81R6Ocry9uA1l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 114} +{"Format": "Json", "ID": "35904b8b-6967-484a-83a0-cad01977dcac", "DetectTime": "2024-05-21T12:40:45.470364+00:00", "EventTime": "2024-05-21T12:40:45.470382+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "1970-01-05T17:50:32.299509+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 114. (real time 2024/05/21 12:40:45.654238)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 114, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4148d7ba-e108-4ff1-8327-3fab392afab7", "DetectTime": "2024-05-21T12:40:45.664374+00:00", "EventTime": "2024-05-21T12:40:45.664392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7UeN2xt5M52AfAa9"], "accumulated_threat_level": 0.8, "timewindow": 114} +{"Format": "IDEA0", "ID": "634e69e7-d34c-4864-a1bf-fb57cb1debfa", "DetectTime": "2024-05-21T12:40:45.669109+00:00", "EventTime": "2024-05-21T12:40:45.669127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0cp9CEbgwpAYBE5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "27b1bd62-5cbc-43bf-b14c-09b19b3bef73", "DetectTime": "2024-05-21T12:40:45.673846+00:00", "EventTime": "2024-05-21T12:40:45.673864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0w9I93fq91x4Szdwe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "82f6a876-5d98-4529-9dc7-526699a0aef6", "DetectTime": "2024-05-21T12:40:45.686383+00:00", "EventTime": "2024-05-21T12:40:45.686401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JOgC2594n9ww7Zcf"], "accumulated_threat_level": 1.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "a10ca3de-df25-4708-a6ee-3f9581a910bb", "DetectTime": "2024-05-21T12:40:45.872411+00:00", "EventTime": "2024-05-21T12:40:45.872433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cvIu1ZxZnh26aZLg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "549243e2-30f7-42bb-b8af-ba2bcc042d36", "DetectTime": "2024-05-21T12:40:45.925418+00:00", "EventTime": "2024-05-21T12:40:45.925435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXAqB1G5LXK9mzBA2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 114} +{"Format": "IDEA0", "ID": "bdde2463-31ba-4661-9942-ad57105952c1", "DetectTime": "2024-05-21T12:40:45.931605+00:00", "EventTime": "2024-05-21T12:40:45.931630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFmUq1TjLmt5bN5y6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "34e420ce-ba76-4dd6-8ca0-22dd47053ab6", "DetectTime": "2024-05-21T12:40:45.983181+00:00", "EventTime": "2024-05-21T12:40:45.983203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOp1Y3IfUmpXETyg2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "4b90fcc2-b936-4a48-99d2-393e2ba904af", "DetectTime": "2024-05-21T12:40:46.030058+00:00", "EventTime": "2024-05-21T12:40:46.030080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co00VG3iW3mNvakNJ7"], "accumulated_threat_level": 3.2, "timewindow": 114} +{"Format": "IDEA0", "ID": "055fdb4b-daf5-4d1f-9314-72d6ac507a63", "DetectTime": "2024-05-21T12:40:46.034782+00:00", "EventTime": "2024-05-21T12:40:46.034799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C99tY337ENAYGbQ90g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 112} +{"Format": "IDEA0", "ID": "633bd7b8-b253-46df-98a6-9467b253e67b", "DetectTime": "2024-05-21T12:40:46.103173+00:00", "EventTime": "2024-05-21T12:40:46.103194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkissT1CjvamFRzLQj"], "accumulated_threat_level": 4.0, "timewindow": 114} +{"Format": "IDEA0", "ID": "6f176075-2363-41a9-a131-7412712a34bb", "DetectTime": "2024-05-21T12:40:46.157824+00:00", "EventTime": "2024-05-21T12:40:46.157842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cktl3F2xfHynewU3J9"], "accumulated_threat_level": 4.8, "timewindow": 114} +{"Format": "IDEA0", "ID": "fd4c0805-64a9-4ff8-b395-0e9ac2223a50", "DetectTime": "2024-05-21T12:40:46.162361+00:00", "EventTime": "2024-05-21T12:40:46.162379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxL1R02Npb6CDQ9nvk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "a7ce62ca-0cd8-4b85-8faa-0f8974b2f0f6", "DetectTime": "2024-05-21T12:40:46.416450+00:00", "EventTime": "2024-05-21T12:40:46.416476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0BqYa4SRznIgvDcJj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "08d973ef-797f-4be5-9ad5-50d91c95d006", "DetectTime": "2024-05-21T12:40:46.453922+00:00", "EventTime": "2024-05-21T12:40:46.453941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbLtb2N1d2yGMe1o6"], "accumulated_threat_level": 5.6, "timewindow": 114} +{"Format": "IDEA0", "ID": "8a8524a8-69b4-4529-a99d-bb7b5afa96d1", "DetectTime": "2024-05-21T12:40:46.497276+00:00", "EventTime": "2024-05-21T12:40:46.497295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGuoId359mBp03jCXh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "1ff9612c-b771-4c74-9e74-c438fef3ac2c", "DetectTime": "2024-05-21T12:40:46.583971+00:00", "EventTime": "2024-05-21T12:40:46.583992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJKcY3GYzByzdKMqj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "89b68ae6-8801-4d50-a539-57b25a70b079", "DetectTime": "2024-05-21T12:40:46.619907+00:00", "EventTime": "2024-05-21T12:40:46.619927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNtjL3l64c1FcdEN2"], "accumulated_threat_level": 0.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "396bbe72-ffd3-4fbb-b3eb-3deedf9196ac", "DetectTime": "2024-05-21T12:40:46.725073+00:00", "EventTime": "2024-05-21T12:40:46.725095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnwLDgDhNC3NpYMb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "a49b352b-4b6c-42e0-b180-19cf14775b5d", "DetectTime": "2024-05-21T12:40:46.759575+00:00", "EventTime": "2024-05-21T12:40:46.759593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEnVdv5QvNngKSL8"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "322468ef-d8af-412a-bcf6-0f53068d597e", "DetectTime": "2024-05-21T12:40:46.775054+00:00", "EventTime": "2024-05-21T12:40:46.775078+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEnVdv5QvNngKSL8"], "accumulated_threat_level": 11.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "b0b6f6c3-e0a2-40d4-ade7-1e92ea61d5e9", "DetectTime": "2024-05-21T12:40:46.798133+00:00", "EventTime": "2024-05-21T12:40:46.798151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUYtWuLSejhuSzr17"], "accumulated_threat_level": 1.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "b6b94a0d-0055-468f-9a29-0be99748ec5d", "DetectTime": "2024-05-21T12:40:46.810974+00:00", "EventTime": "2024-05-21T12:40:46.810994+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsTYg47h14z1njjq3"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "ac2e99e5-b09a-4f8d-a926-065b81da8e60", "DetectTime": "2024-05-21T12:40:46.824457+00:00", "EventTime": "2024-05-21T12:40:46.824475+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsTYg47h14z1njjq3"], "accumulated_threat_level": 12.0, "timewindow": 27} +{"Format": "Json", "ID": "ac2e99e5-b09a-4f8d-a926-065b81da8e60", "DetectTime": "2024-05-21T12:40:46.824457+00:00", "EventTime": "2024-05-21T12:40:46.824475+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "1970-01-02T02:28:56.890865+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2024/05/21 12:40:47.392569)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 27, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "2823e814-7b22-4f1f-aaf5-c8499a88237d", "DetectTime": "2024-05-21T12:40:47.405369+00:00", "EventTime": "2024-05-21T12:40:47.405386+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG1FQq48TUVUjMIQtj"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "3b92ee9d-86ad-41b9-a2fe-08210b4729d6", "DetectTime": "2024-05-21T12:40:47.418160+00:00", "EventTime": "2024-05-21T12:40:47.418179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG1FQq48TUVUjMIQtj"], "accumulated_threat_level": 0.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "7fe59777-957a-4c6b-b45d-11009a48b4ea", "DetectTime": "2024-05-21T12:40:47.431557+00:00", "EventTime": "2024-05-21T12:40:47.431576+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLkZDWXoJSNSSth5"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "582a838e-1559-40ee-b4fa-9fb250b5cfa6", "DetectTime": "2024-05-21T12:40:47.443708+00:00", "EventTime": "2024-05-21T12:40:47.443727+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLkZDWXoJSNSSth5"], "accumulated_threat_level": 1.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "7aff6c3d-310e-471c-8238-34938851687b", "DetectTime": "2024-05-21T12:40:47.456459+00:00", "EventTime": "2024-05-21T12:40:47.456477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAfmt3z3HM0AJcEOe"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "a0ba9c8a-886f-4e8d-9a9f-dd022609e140", "DetectTime": "2024-05-21T12:40:47.469271+00:00", "EventTime": "2024-05-21T12:40:47.469291+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAfmt3z3HM0AJcEOe"], "accumulated_threat_level": 1.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "bafffca8-acfe-4901-9524-8e4618110559", "DetectTime": "2024-05-21T12:40:47.481448+00:00", "EventTime": "2024-05-21T12:40:47.481466+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ltb81r5njRWNumk"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "ec955dd4-af8c-42bf-9aa9-eb6fef045634", "DetectTime": "2024-05-21T12:40:47.492719+00:00", "EventTime": "2024-05-21T12:40:47.492738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ltb81r5njRWNumk"], "accumulated_threat_level": 2.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "5b209a5a-309c-4d70-83cd-e0085007ef3f", "DetectTime": "2024-05-21T12:40:47.497452+00:00", "EventTime": "2024-05-21T12:40:47.497470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDE7r38BUbIX8QFu5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "5b60af22-c6b1-4f37-b3cf-b3c120b48354", "DetectTime": "2024-05-21T12:40:47.510491+00:00", "EventTime": "2024-05-21T12:40:47.510510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx427x1hsA2k5o1Pfc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 115} +{"Format": "IDEA0", "ID": "52bc9ec3-296a-434f-ae7b-c0eed44fdab6", "DetectTime": "2024-05-21T12:40:47.522842+00:00", "EventTime": "2024-05-21T12:40:47.522861+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYk1Vw45L2SGOx1tR5"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "be1c86ff-9991-4559-8ad4-d04e8e08d228", "DetectTime": "2024-05-21T12:40:47.534908+00:00", "EventTime": "2024-05-21T12:40:47.534926+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYk1Vw45L2SGOx1tR5"], "accumulated_threat_level": 2.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "f4866836-7f05-4c8c-8521-d824beac3206", "DetectTime": "2024-05-21T12:40:47.539452+00:00", "EventTime": "2024-05-21T12:40:47.539470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkhauSRGRDPZKG4e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "27ee04f1-c80d-4c9f-bd73-fba0617ae9d2", "DetectTime": "2024-05-21T12:40:47.549334+00:00", "EventTime": "2024-05-21T12:40:47.549352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66fXj42zaluBs48S"], "accumulated_threat_level": 3.2, "timewindow": 115} +{"Format": "IDEA0", "ID": "c7f104d3-a7c1-4088-99ad-40b4d4cd9a70", "DetectTime": "2024-05-21T12:40:47.561453+00:00", "EventTime": "2024-05-21T12:40:47.561471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKS2PmRaAg17uBm21"], "accumulated_threat_level": 4.0, "timewindow": 115} +{"Format": "IDEA0", "ID": "9662569a-e5d6-48c4-9ff3-b0cef2558dc4", "DetectTime": "2024-05-21T12:40:47.573335+00:00", "EventTime": "2024-05-21T12:40:47.573353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVy7rG1lQZV8fm7Qr3"], "accumulated_threat_level": 4.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "3d776902-c5de-432a-93df-af709e167fc6", "DetectTime": "2024-05-21T12:40:47.583814+00:00", "EventTime": "2024-05-21T12:40:47.583832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgsUpx26jpN8LDrkN5"], "accumulated_threat_level": 5.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "a855fa79-0640-45e9-a4bb-7711db4c0c6c", "DetectTime": "2024-05-21T12:40:47.595679+00:00", "EventTime": "2024-05-21T12:40:47.595698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rcP623RP6TNbTMOj"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "fd3b9516-398d-46da-8147-a176fbeaca60", "DetectTime": "2024-05-21T12:40:47.600722+00:00", "EventTime": "2024-05-21T12:40:47.600741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuFpJf1JfpmwcxFxC7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "d6ef0145-c63a-4134-9cd7-1a58e26cb05d", "DetectTime": "2024-05-21T12:40:47.614153+00:00", "EventTime": "2024-05-21T12:40:47.614173+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rcP623RP6TNbTMOj"], "accumulated_threat_level": 3.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "1a76f909-bef6-444c-8fcd-574cfebdae13", "DetectTime": "2024-05-21T12:40:47.628276+00:00", "EventTime": "2024-05-21T12:40:47.628296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPFah1xFlrirpnVk1"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "88fdfd0e-5dc0-4894-a1f2-e5c7b29cc5b0", "DetectTime": "2024-05-21T12:40:47.641686+00:00", "EventTime": "2024-05-21T12:40:47.641705+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPFah1xFlrirpnVk1"], "accumulated_threat_level": 3.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "46fcab9c-8031-4a86-89cf-769cf111b62e", "DetectTime": "2024-05-21T12:40:47.653593+00:00", "EventTime": "2024-05-21T12:40:47.653612+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["69.250.199.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.250.199.8 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnc0Ni8VJr7P0vuH9"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "5a80fefc-8e45-4c99-8987-7a8a67267ece", "DetectTime": "2024-05-21T12:40:47.666664+00:00", "EventTime": "2024-05-21T12:40:47.666685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["69.250.199.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.250.199.8 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnc0Ni8VJr7P0vuH9"], "accumulated_threat_level": 4.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "aae16cc0-40ec-443d-b3c2-8effd0728ee9", "DetectTime": "2024-05-21T12:40:47.678481+00:00", "EventTime": "2024-05-21T12:40:47.678499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6GWZd3VxTNTZyC5h8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 115} +{"Format": "IDEA0", "ID": "44b81a77-ce6d-4b06-8c2b-71281a7feef2", "DetectTime": "2024-05-21T12:40:47.692807+00:00", "EventTime": "2024-05-21T12:40:47.692824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["121.217.72.166"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 121.217.72.166 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64LFQ1G8lHl2ECLIh"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "db616b3e-6026-4a7c-8313-2de6c4efb0fa", "DetectTime": "2024-05-21T12:40:47.706906+00:00", "EventTime": "2024-05-21T12:40:47.706928+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["121.217.72.166"]}], "Attach": [{"Content": "connection to blacklisted IP: 121.217.72.166 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64LFQ1G8lHl2ECLIh"], "accumulated_threat_level": 4.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "d0f5411a-4a15-4eb9-9fc6-a84466c83eb8", "DetectTime": "2024-05-21T12:40:47.712606+00:00", "EventTime": "2024-05-21T12:40:47.712628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsYg02jXsiyFytIud"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "7f471f18-372a-44f3-a6be-2bd8d461ebae", "DetectTime": "2024-05-21T12:40:47.726685+00:00", "EventTime": "2024-05-21T12:40:47.726707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbW1mh3rAdrkrN0Fh2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "cc1b0529-b32f-48a9-b0c7-9d0ddc3867e5", "DetectTime": "2024-05-21T12:40:47.740327+00:00", "EventTime": "2024-05-21T12:40:47.740348+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.103.110.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.110.113 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50b7T38pxPaCDeSI"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "0e38da05-952f-4959-919f-7430e31e735c", "DetectTime": "2024-05-21T12:40:47.752362+00:00", "EventTime": "2024-05-21T12:40:47.752380+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.103.110.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.103.110.113 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50b7T38pxPaCDeSI"], "accumulated_threat_level": 5.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "94d8baa8-55c7-406a-9c25-98bf078f1132", "DetectTime": "2024-05-21T12:40:47.757598+00:00", "EventTime": "2024-05-21T12:40:47.757616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaHWq25m2ix1yuHhl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "0a8a215d-21ba-47e9-bb95-f0c47d1b089a", "DetectTime": "2024-05-21T12:40:47.769365+00:00", "EventTime": "2024-05-21T12:40:47.769384+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.117.66.104"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.117.66.104 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziKcn1het86HdtKNg"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c2de15d1-bd56-410e-8ebb-288a30f150a2", "DetectTime": "2024-05-21T12:40:47.782528+00:00", "EventTime": "2024-05-21T12:40:47.782548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.117.66.104"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.117.66.104 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CziKcn1het86HdtKNg"], "accumulated_threat_level": 5.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "6cae1881-1ad6-4c3f-b3e6-b378afbf701a", "DetectTime": "2024-05-21T12:40:47.793490+00:00", "EventTime": "2024-05-21T12:40:47.793508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhi3B3FUP1r02ftm3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "5d9ff542-9fc0-4e0d-b5f6-67cf21caf6b9", "DetectTime": "2024-05-21T12:40:47.809547+00:00", "EventTime": "2024-05-21T12:40:47.809564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4tjYtk9pXiMZZl1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "b52dd21d-ea60-4eeb-a959-e87a86eab9c9", "DetectTime": "2024-05-21T12:40:47.822791+00:00", "EventTime": "2024-05-21T12:40:47.822811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.156.122.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.156.122.62 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwYCV2NiH9oPI03Aa"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "09d4fba1-08f3-4513-b709-bf980c95dc30", "DetectTime": "2024-05-21T12:40:47.836883+00:00", "EventTime": "2024-05-21T12:40:47.836902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.156.122.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.156.122.62 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwYCV2NiH9oPI03Aa"], "accumulated_threat_level": 6.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "6b7f00b8-b0a4-4f46-90b0-ddb65f20b9a4", "DetectTime": "2024-05-21T12:40:47.848552+00:00", "EventTime": "2024-05-21T12:40:47.848571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceh1h93FPho3g5gcik"], "accumulated_threat_level": 9.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "6499a9a9-c091-4c14-9e89-31503ed2ea83", "DetectTime": "2024-05-21T12:40:47.861239+00:00", "EventTime": "2024-05-21T12:40:47.861256+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.235.76.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.235.76.4 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboBPd3kvazKleonZb"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "e14e640b-d289-47be-963a-719869c51289", "DetectTime": "2024-05-21T12:40:47.873979+00:00", "EventTime": "2024-05-21T12:40:47.873999+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.235.76.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.235.76.4 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboBPd3kvazKleonZb"], "accumulated_threat_level": 6.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "21bc8baf-9850-446a-9382-431627c5362d", "DetectTime": "2024-05-21T12:40:47.886073+00:00", "EventTime": "2024-05-21T12:40:47.886094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJqUH2DXth5uY5efh"], "accumulated_threat_level": 10.4, "timewindow": 115} +{"Format": "IDEA0", "ID": "3228370d-45eb-458c-8bc1-ceb45706196e", "DetectTime": "2024-05-21T12:40:47.891553+00:00", "EventTime": "2024-05-21T12:40:47.891572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtMbu4mRrDr46m7Le"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "516e8643-f7be-4222-b19f-2e0f16c5b993", "DetectTime": "2024-05-21T12:40:47.903911+00:00", "EventTime": "2024-05-21T12:40:47.903929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezqVq1deMSalTp85k"], "accumulated_threat_level": 11.200000000000001, "timewindow": 115} +{"Format": "IDEA0", "ID": "75aa2d04-b057-4df5-aed0-097c2d5fff69", "DetectTime": "2024-05-21T12:40:47.920760+00:00", "EventTime": "2024-05-21T12:40:47.920784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAWFM3qlBm5EqH436"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "bc9b386c-1432-4d0f-9af9-8e6a00f36457", "DetectTime": "2024-05-21T12:40:47.971567+00:00", "EventTime": "2024-05-21T12:40:47.971591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwKw23RwIvcwybY4a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "1ebf5542-8fd5-44a9-adc9-851952493a8c", "DetectTime": "2024-05-21T12:40:47.985764+00:00", "EventTime": "2024-05-21T12:40:47.985784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHXmw22SwpJIQ47D"], "accumulated_threat_level": 12.000000000000002, "timewindow": 115} +{"Format": "Json", "ID": "1ebf5542-8fd5-44a9-adc9-851952493a8c", "DetectTime": "2024-05-21T12:40:47.985764+00:00", "EventTime": "2024-05-21T12:40:47.985784+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "1970-01-05T18:21:14.973810+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2024/05/21 12:40:48.154058)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 115, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5c91d891-4144-4046-837e-a1e74bad976a", "DetectTime": "2024-05-21T12:40:48.167216+00:00", "EventTime": "2024-05-21T12:40:48.167238+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.147.182.182"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.147.182.182 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq3Wm1opQpWf4UWe7"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "e9581f72-ae64-4448-8ef3-352a241b8d12", "DetectTime": "2024-05-21T12:40:48.179029+00:00", "EventTime": "2024-05-21T12:40:48.179047+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.147.182.182"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.147.182.182 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq3Wm1opQpWf4UWe7"], "accumulated_threat_level": 7.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "4ac30945-29fa-4b9a-b89d-d3a6b603695f", "DetectTime": "2024-05-21T12:40:48.189710+00:00", "EventTime": "2024-05-21T12:40:48.189728+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.232.5.137"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ4UmecAV4WuTTQh"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "43376888-e45a-4937-985f-d14fe8cd4da2", "DetectTime": "2024-05-21T12:40:48.203931+00:00", "EventTime": "2024-05-21T12:40:48.203958+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ4UmecAV4WuTTQh"], "accumulated_threat_level": 7.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "ffbd30e7-aee8-41aa-b17a-70c29e771b0d", "DetectTime": "2024-05-21T12:40:48.209561+00:00", "EventTime": "2024-05-21T12:40:48.209581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMMdZyUfio30zud5h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "9d34164d-dc80-42e3-8ba0-7b40df094106", "DetectTime": "2024-05-21T12:40:48.236715+00:00", "EventTime": "2024-05-21T12:40:48.236738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.37.188.110"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.37.188.110 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU0ps18A3ZHEyoRb8"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "174a1e56-a163-4f39-847e-d58a034d73f6", "DetectTime": "2024-05-21T12:40:48.250470+00:00", "EventTime": "2024-05-21T12:40:48.250492+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.37.188.110"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.37.188.110 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQU0ps18A3ZHEyoRb8"], "accumulated_threat_level": 8.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "498b1e54-2339-4e3e-a84a-63767f4d848c", "DetectTime": "2024-05-21T12:40:48.295111+00:00", "EventTime": "2024-05-21T12:40:48.295135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3zOh249A8roKQs0e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "bdb0205f-a92d-410e-ba34-6ac13f6114bc", "DetectTime": "2024-05-21T12:40:48.300673+00:00", "EventTime": "2024-05-21T12:40:48.300692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Civf4y4GqPJwnBvytc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "1a6433d1-79ae-49ca-a274-290c6470d482", "DetectTime": "2024-05-21T12:40:48.305335+00:00", "EventTime": "2024-05-21T12:40:48.305355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPwFi3oAO9D2qYFpl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "83559997-857e-4a1f-b0ed-ed95f4d32f54", "DetectTime": "2024-05-21T12:40:48.335624+00:00", "EventTime": "2024-05-21T12:40:48.335646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["139.195.58.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.195.58.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuoHg3jqZ7ugdvcGe"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "68a1b2c8-f304-4324-b8f9-d8f3d8630bc7", "DetectTime": "2024-05-21T12:40:48.349052+00:00", "EventTime": "2024-05-21T12:40:48.349070+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["139.195.58.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.195.58.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuoHg3jqZ7ugdvcGe"], "accumulated_threat_level": 8.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "f8eb833c-d7c0-4b83-b3e5-e193a130227c", "DetectTime": "2024-05-21T12:40:48.363387+00:00", "EventTime": "2024-05-21T12:40:48.363416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLAD9ANlPVnmtBz6"], "accumulated_threat_level": 0.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "d3416357-6a40-4c0e-b20f-a330ec8e99b7", "DetectTime": "2024-05-21T12:40:48.397795+00:00", "EventTime": "2024-05-21T12:40:48.397814+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.178.233.253"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.178.233.253 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhQJo1JaYjwJfsmA"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "3052540c-253f-496d-b937-0d0e6e2421ba", "DetectTime": "2024-05-21T12:40:48.409949+00:00", "EventTime": "2024-05-21T12:40:48.409968+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.178.233.253"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.178.233.253 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhQJo1JaYjwJfsmA"], "accumulated_threat_level": 9.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "8de75fc5-aea4-4f48-9bba-347294aa505f", "DetectTime": "2024-05-21T12:40:48.444659+00:00", "EventTime": "2024-05-21T12:40:48.444679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYFag4bM1dJSIR9a7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "80dbdf60-054f-471c-a108-47eba75c0fdd", "DetectTime": "2024-05-21T12:40:48.450095+00:00", "EventTime": "2024-05-21T12:40:48.450114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKLXQ2sbXlkVDVJPe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "cebfeea7-2697-4b62-b30b-9b136bcfe01f", "DetectTime": "2024-05-21T12:40:48.515274+00:00", "EventTime": "2024-05-21T12:40:48.515296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcaXvU2pD6acldVjn7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "69970e50-113c-4587-a0d8-6093af3412ba", "DetectTime": "2024-05-21T12:40:48.530095+00:00", "EventTime": "2024-05-21T12:40:48.530113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtwbf2YNyy4VXrvs8"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "3af62e4b-71f6-4546-b39b-5da40e4fc9c4", "DetectTime": "2024-05-21T12:40:48.544672+00:00", "EventTime": "2024-05-21T12:40:48.544690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtwbf2YNyy4VXrvs8"], "accumulated_threat_level": 9.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "4e56f35a-c778-484c-aee9-4a2ed995e66b", "DetectTime": "2024-05-21T12:40:48.556936+00:00", "EventTime": "2024-05-21T12:40:48.556955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTquvx15d5lWsx9UP4"], "accumulated_threat_level": 1.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "4ce4b45f-9467-4365-bf51-c97dad21b8b9", "DetectTime": "2024-05-21T12:40:48.561890+00:00", "EventTime": "2024-05-21T12:40:48.561908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrsM72hlBZ0PZW1oj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "275cbf2d-3f4a-4198-9ede-c1c5e5ee7750", "DetectTime": "2024-05-21T12:40:48.643527+00:00", "EventTime": "2024-05-21T12:40:48.643547+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.33.151.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.33.151.168 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKpMA3c0En0HD8YR7"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "ae195e06-abce-4c5b-ad67-f22923141a61", "DetectTime": "2024-05-21T12:40:48.657124+00:00", "EventTime": "2024-05-21T12:40:48.657146+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.33.151.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.33.151.168 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKpMA3c0En0HD8YR7"], "accumulated_threat_level": 10.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "bfc33a2b-a943-4214-be9c-e9221760f678", "DetectTime": "2024-05-21T12:40:48.709676+00:00", "EventTime": "2024-05-21T12:40:48.709694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.104.81.106"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbgJW1bV2f0xqN7Aj"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "bee1973b-b334-489f-b000-75f18460d8d1", "DetectTime": "2024-05-21T12:40:48.721784+00:00", "EventTime": "2024-05-21T12:40:48.721803+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.104.81.106"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.104.81.106 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbgJW1bV2f0xqN7Aj"], "accumulated_threat_level": 10.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "daf289a5-1177-4320-a0dd-76d7bae74a4d", "DetectTime": "2024-05-21T12:40:48.769722+00:00", "EventTime": "2024-05-21T12:40:48.769741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleEkr3zIvyTfKif1a"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "4f5ba9cb-062b-44b6-821f-4f4f52c1818d", "DetectTime": "2024-05-21T12:40:48.783890+00:00", "EventTime": "2024-05-21T12:40:48.783911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleEkr3zIvyTfKif1a"], "accumulated_threat_level": 11.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "80823fb0-4c7c-415b-8a3a-86d1101a8d65", "DetectTime": "2024-05-21T12:40:48.844276+00:00", "EventTime": "2024-05-21T12:40:48.844298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPGQ04DtO5zFiHGc7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "2e7ffda1-940e-461c-a060-41174378f819", "DetectTime": "2024-05-21T12:40:48.908754+00:00", "EventTime": "2024-05-21T12:40:48.908774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctgzo74BZoDvpUNZ93"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "12f80112-fa23-4b9d-abc7-b4cc745a50e9", "DetectTime": "2024-05-21T12:40:48.913580+00:00", "EventTime": "2024-05-21T12:40:48.913600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM97Wp31eo71BUqqA8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "54c7b16e-8c72-4a26-9369-1bad13177c38", "DetectTime": "2024-05-21T12:40:48.975182+00:00", "EventTime": "2024-05-21T12:40:48.975203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKAr1d2HFuuOhbwRUj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "b40606ec-9db1-4cd3-9422-918541694369", "DetectTime": "2024-05-21T12:40:49.018625+00:00", "EventTime": "2024-05-21T12:40:49.018646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIG284zg5zeE7340g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 115} +{"Format": "IDEA0", "ID": "d43dff34-fb96-46ff-a33c-6356f9f53267", "DetectTime": "2024-05-21T12:40:49.023858+00:00", "EventTime": "2024-05-21T12:40:49.023878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9w3Oa1Ix8wnaOXwFg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "c984affe-0520-4883-b3e7-b6971c6dbbff", "DetectTime": "2024-05-21T12:40:49.066095+00:00", "EventTime": "2024-05-21T12:40:49.066117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["58.92.142.51"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 58.92.142.51 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbDNg1lpa6GKFuUJg"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "3346c7db-5dd8-4fd5-b085-5c692de82426", "DetectTime": "2024-05-21T12:40:49.080188+00:00", "EventTime": "2024-05-21T12:40:49.080211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["58.92.142.51"]}], "Attach": [{"Content": "connection to blacklisted IP: 58.92.142.51 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbDNg1lpa6GKFuUJg"], "accumulated_threat_level": 11.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "92701129-f880-4d87-8c6e-3fd9c4c3ed0f", "DetectTime": "2024-05-21T12:40:49.085355+00:00", "EventTime": "2024-05-21T12:40:49.085374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzpLFC1sNenKK8Vfoi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "e5bd38fc-96b2-4283-8697-2d447f03e1d4", "DetectTime": "2024-05-21T12:40:49.141581+00:00", "EventTime": "2024-05-21T12:40:49.141599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwZw7ykDB2rJLKZ3"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "4bdb4b4d-f9ad-45e8-8afc-ada73add4596", "DetectTime": "2024-05-21T12:40:49.153574+00:00", "EventTime": "2024-05-21T12:40:49.153593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwZw7ykDB2rJLKZ3"], "accumulated_threat_level": 12.0, "timewindow": 27} +{"Format": "Json", "ID": "4bdb4b4d-f9ad-45e8-8afc-ada73add4596", "DetectTime": "2024-05-21T12:40:49.153574+00:00", "EventTime": "2024-05-21T12:40:49.153593+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "1970-01-02T02:31:38.119325+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 27. (real time 2024/05/21 12:40:49.428381)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 27, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "60e1e057-df5e-4ef5-b5da-bc2afe880490", "DetectTime": "2024-05-21T12:40:49.439912+00:00", "EventTime": "2024-05-21T12:40:49.439930+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdcc63QzvYp98Qv8e"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "379299c4-67a3-4c71-b92c-15857b91ce6d", "DetectTime": "2024-05-21T12:40:49.453469+00:00", "EventTime": "2024-05-21T12:40:49.453490+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdcc63QzvYp98Qv8e"], "accumulated_threat_level": 0.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "dc061802-7e30-4350-ba17-ae931c410c85", "DetectTime": "2024-05-21T12:40:49.466218+00:00", "EventTime": "2024-05-21T12:40:49.466237+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.198.175.145"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.198.175.145 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQMI2Tcvhy8tHUda"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "5719bdb6-6fad-4412-b788-1583b2313470", "DetectTime": "2024-05-21T12:40:49.480179+00:00", "EventTime": "2024-05-21T12:40:49.480198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.198.175.145"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.198.175.145 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvQMI2Tcvhy8tHUda"], "accumulated_threat_level": 1.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "f84ada59-aec1-4769-948f-d45565345577", "DetectTime": "2024-05-21T12:40:49.492204+00:00", "EventTime": "2024-05-21T12:40:49.492227+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.7.104.86"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.7.104.86 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRUNc4WpgOFa7w9"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "5395b31c-c7ef-4591-92d8-dc01e054e0b0", "DetectTime": "2024-05-21T12:40:49.505378+00:00", "EventTime": "2024-05-21T12:40:49.505396+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.7.104.86"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.7.104.86 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRUNc4WpgOFa7w9"], "accumulated_threat_level": 1.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "9f611bb1-d934-4fb2-9b11-b20d3c42ebfc", "DetectTime": "2024-05-21T12:40:49.510643+00:00", "EventTime": "2024-05-21T12:40:49.510662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtUtzX1bO69kOrmzf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "ba6ab85f-e35c-4a34-aa92-8904300da679", "DetectTime": "2024-05-21T12:40:49.515648+00:00", "EventTime": "2024-05-21T12:40:49.515667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTzlZ2jdAfw7sZ7t7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "ebc904c1-e47f-4f97-bf50-68e74333c503", "DetectTime": "2024-05-21T12:40:49.520237+00:00", "EventTime": "2024-05-21T12:40:49.520257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbed2r32ZEUTTgBkF"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "e43f9a2d-2636-42c7-89f3-b48d0e57bef7", "DetectTime": "2024-05-21T12:40:49.526326+00:00", "EventTime": "2024-05-21T12:40:49.526347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrB9F3HfxQlgea9x"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "3d6a40a2-0fd3-4436-a755-b424b2b1fdcf", "DetectTime": "2024-05-21T12:40:49.537694+00:00", "EventTime": "2024-05-21T12:40:49.537713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nYLp2Dpu8lmmIuX"], "accumulated_threat_level": 3.2, "timewindow": 115} +{"Format": "IDEA0", "ID": "d8a45d32-97ec-4c4b-877d-757b48970146", "DetectTime": "2024-05-21T12:40:49.542116+00:00", "EventTime": "2024-05-21T12:40:49.542133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkLq53oreNPRDywve"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "390f67c8-59de-44c1-b9e2-f46c8dc7b259", "DetectTime": "2024-05-21T12:40:49.553271+00:00", "EventTime": "2024-05-21T12:40:49.553289+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.154.84.83"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.154.84.83 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4M0b4esTKrhJjN9c"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "ae50a654-c1b6-4269-9a62-69760a1ea38a", "DetectTime": "2024-05-21T12:40:49.566687+00:00", "EventTime": "2024-05-21T12:40:49.566706+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.154.84.83"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.154.84.83 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4M0b4esTKrhJjN9c"], "accumulated_threat_level": 2.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "34395615-117c-4339-bb58-4f910495443a", "DetectTime": "2024-05-21T12:40:49.579573+00:00", "EventTime": "2024-05-21T12:40:49.579591+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.97.35.111"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.97.35.111 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmjuP2BQCVCEvLI27"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c38c1160-a2a6-41b9-89c5-d3ae461df76a", "DetectTime": "2024-05-21T12:40:49.593068+00:00", "EventTime": "2024-05-21T12:40:49.593091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.97.35.111"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.97.35.111 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmjuP2BQCVCEvLI27"], "accumulated_threat_level": 2.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "b4ae2f1b-6c50-4b6c-9333-876234dabcf3", "DetectTime": "2024-05-21T12:40:49.597402+00:00", "EventTime": "2024-05-21T12:40:49.597419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdbzJL15bWUcaESEej"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "ab58c45a-737b-4c20-ac23-ddc4e9481b3d", "DetectTime": "2024-05-21T12:40:49.608392+00:00", "EventTime": "2024-05-21T12:40:49.608411+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT9Aa3F8YrIpM3IA8"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "193912a7-bb4d-4a96-a2e9-c9f561560358", "DetectTime": "2024-05-21T12:40:49.620606+00:00", "EventTime": "2024-05-21T12:40:49.620629+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTT9Aa3F8YrIpM3IA8"], "accumulated_threat_level": 3.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "09b6c0e3-8093-4fe3-8d1a-0579c957050a", "DetectTime": "2024-05-21T12:40:49.639334+00:00", "EventTime": "2024-05-21T12:40:49.639353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyTQw3sRfRDoj7UL6"], "accumulated_threat_level": 4.0, "timewindow": 115} +{"Format": "IDEA0", "ID": "56d9e472-dc76-4060-aee7-e0dec904e157", "DetectTime": "2024-05-21T12:40:49.653722+00:00", "EventTime": "2024-05-21T12:40:49.653739+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.42.171.118"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.42.171.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKKouBmw4XG4I25r"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c4672609-a705-44ca-950d-1594176d9612", "DetectTime": "2024-05-21T12:40:49.665464+00:00", "EventTime": "2024-05-21T12:40:49.665483+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.42.171.118"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.42.171.118 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKKouBmw4XG4I25r"], "accumulated_threat_level": 3.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "22b8dae8-ed18-4552-a801-cc80087e5982", "DetectTime": "2024-05-21T12:40:49.677251+00:00", "EventTime": "2024-05-21T12:40:49.677270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czp5rjQfDJiMWpAH9"], "accumulated_threat_level": 4.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "f4225f8c-af49-4582-a908-06693d28ce33", "DetectTime": "2024-05-21T12:40:49.686616+00:00", "EventTime": "2024-05-21T12:40:49.686635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMLQ1R3Q2toiJt6DG5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "52ea7870-a817-4419-b2bc-ac5d1834d520", "DetectTime": "2024-05-21T12:40:49.731908+00:00", "EventTime": "2024-05-21T12:40:49.731934+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.81.12.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.81.12.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3MH1ZvU2Ghe0Gzf"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "1ec1864d-f788-4e6e-a76b-a419462d9d6c", "DetectTime": "2024-05-21T12:40:49.745436+00:00", "EventTime": "2024-05-21T12:40:49.745455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.81.12.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.81.12.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3MH1ZvU2Ghe0Gzf"], "accumulated_threat_level": 4.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "4de98f3f-cd24-49d9-8ab7-248748cef54d", "DetectTime": "2024-05-21T12:40:49.959555+00:00", "EventTime": "2024-05-21T12:40:49.959575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1EagX15cVxSXtGu5e"], "accumulated_threat_level": 5.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "80be2616-161e-4ea3-9be7-dd731160b53d", "DetectTime": "2024-05-21T12:40:49.984458+00:00", "EventTime": "2024-05-21T12:40:49.984480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VKk3qs1fWicb2K7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "2ee00cd7-be98-4f81-812d-80a5f0f61490", "DetectTime": "2024-05-21T12:40:50.030749+00:00", "EventTime": "2024-05-21T12:40:50.030774+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["112.104.67.214"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.104.67.214 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjELyx1iNTycEltwwe"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "4aced153-f0cf-4afd-b83a-90aebf331dbc", "DetectTime": "2024-05-21T12:40:50.044719+00:00", "EventTime": "2024-05-21T12:40:50.044740+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["112.104.67.214"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.104.67.214 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjELyx1iNTycEltwwe"], "accumulated_threat_level": 4.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "7e3c1166-0bb8-4f7e-8bd9-27e1f3aa02af", "DetectTime": "2024-05-21T12:40:50.056564+00:00", "EventTime": "2024-05-21T12:40:50.056583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVLLJzYe8S7DxaYk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 115} +{"Format": "IDEA0", "ID": "f6d2bbae-3bea-4d69-a717-a693c69ec5e6", "DetectTime": "2024-05-21T12:40:50.089656+00:00", "EventTime": "2024-05-21T12:40:50.089677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKq10PO46xWF2y9j7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "5ff17e48-65a3-4197-853b-00b9f0fc70a5", "DetectTime": "2024-05-21T12:40:50.102997+00:00", "EventTime": "2024-05-21T12:40:50.103015+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.0.20.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.0.20.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLU5mi1YWVcE6PMyZ7"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "a406f83e-47cb-43cd-926b-b714eddc8d18", "DetectTime": "2024-05-21T12:40:50.116739+00:00", "EventTime": "2024-05-21T12:40:50.116764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.0.20.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.0.20.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLU5mi1YWVcE6PMyZ7"], "accumulated_threat_level": 5.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c445b2b3-d6a8-42e3-84d8-7bb7f13b9663", "DetectTime": "2024-05-21T12:40:50.138882+00:00", "EventTime": "2024-05-21T12:40:50.138901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdV63z2GfhdsoBmS11"], "accumulated_threat_level": 7.999999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "cb2194c4-df1a-4a13-941b-b2fdb610a356", "DetectTime": "2024-05-21T12:40:50.154938+00:00", "EventTime": "2024-05-21T12:40:50.154956+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJEBI3bZ7tGaw20g5"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "83cddbdf-e664-4acd-a6f8-fc2d42e0e26a", "DetectTime": "2024-05-21T12:40:50.167335+00:00", "EventTime": "2024-05-21T12:40:50.167354+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJEBI3bZ7tGaw20g5"], "accumulated_threat_level": 5.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "33404419-81a1-41f0-b025-5c2e72e20dfd", "DetectTime": "2024-05-21T12:40:50.210572+00:00", "EventTime": "2024-05-21T12:40:50.210592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaxnZg2i4XP98Nqwth"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "a617a712-7028-490b-8ab4-536a9cc606e0", "DetectTime": "2024-05-21T12:40:50.225156+00:00", "EventTime": "2024-05-21T12:40:50.225181+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaxnZg2i4XP98Nqwth"], "accumulated_threat_level": 6.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "13c1ab4b-ac91-4354-b4e4-f646db255b38", "DetectTime": "2024-05-21T12:40:50.237884+00:00", "EventTime": "2024-05-21T12:40:50.237904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFqWR1r72gJjbsTJd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "dfe31e30-7ced-4686-86b2-138a8fb356f6", "DetectTime": "2024-05-21T12:40:50.270015+00:00", "EventTime": "2024-05-21T12:40:50.270033+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["177.227.151.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.227.151.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVrGl1wmRVst5F6hd"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "c8672416-3d32-4c55-90e7-eb29cf0d12a5", "DetectTime": "2024-05-21T12:40:50.282800+00:00", "EventTime": "2024-05-21T12:40:50.282819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["177.227.151.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 177.227.151.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVrGl1wmRVst5F6hd"], "accumulated_threat_level": 6.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "2c5cda11-1fba-4e09-966f-981a75a22565", "DetectTime": "2024-05-21T12:40:50.311657+00:00", "EventTime": "2024-05-21T12:40:50.311674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9ADRym2qXcYGvm2"], "accumulated_threat_level": 9.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "d380f5c4-0f60-4d13-a735-60f27fe06b3c", "DetectTime": "2024-05-21T12:40:50.341900+00:00", "EventTime": "2024-05-21T12:40:50.341921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLNT43ciR8EDXPiae"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "d0c5e3e2-40a4-4ca0-b9d0-bf1298f63239", "DetectTime": "2024-05-21T12:40:50.356373+00:00", "EventTime": "2024-05-21T12:40:50.356393+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.8.2.27"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.8.2.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb94stB9yoOHqm4S4"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "a75400e2-6eea-4ea1-a12d-a129d12fa4bb", "DetectTime": "2024-05-21T12:40:50.369970+00:00", "EventTime": "2024-05-21T12:40:50.369991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.8.2.27"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.8.2.27 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb94stB9yoOHqm4S4"], "accumulated_threat_level": 7.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "28314e2c-adbb-43c3-ac12-ab4c73bb3805", "DetectTime": "2024-05-21T12:40:50.384043+00:00", "EventTime": "2024-05-21T12:40:50.384063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsT3uW2TMV6TDuKaXg"], "accumulated_threat_level": 10.4, "timewindow": 115} +{"Format": "IDEA0", "ID": "a7ecaa1b-afc3-49ff-a4da-121c15269063", "DetectTime": "2024-05-21T12:40:50.413875+00:00", "EventTime": "2024-05-21T12:40:50.413893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmM43tQlxJdgHq73"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "ee24ffaf-b7da-49cf-bb7f-e1f43a306220", "DetectTime": "2024-05-21T12:40:50.427114+00:00", "EventTime": "2024-05-21T12:40:50.427134+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgmM43tQlxJdgHq73"], "accumulated_threat_level": 7.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "4794cf8d-ad90-4ebc-941f-fc19313db322", "DetectTime": "2024-05-21T12:40:50.439415+00:00", "EventTime": "2024-05-21T12:40:50.439436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJW79H2pEp380I5kZj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 115} +{"Format": "IDEA0", "ID": "04b41950-7f0d-4087-b4ce-a2fdb99cde82", "DetectTime": "2024-05-21T12:40:50.453441+00:00", "EventTime": "2024-05-21T12:40:50.453459+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.233.116.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.233.116.80 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv5cBR1n4ZCNN6Xqs8"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "6efe2f24-148c-46c2-84e5-2f9e8e6a76e8", "DetectTime": "2024-05-21T12:40:50.464911+00:00", "EventTime": "2024-05-21T12:40:50.464930+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.233.116.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.233.116.80 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv5cBR1n4ZCNN6Xqs8"], "accumulated_threat_level": 8.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "3a195e8a-7433-4b01-87f0-a5578ee05ba6", "DetectTime": "2024-05-21T12:40:50.512503+00:00", "EventTime": "2024-05-21T12:40:50.512522+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.176.133.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYACk479e1eHLVlUh"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "e9ae3d23-6424-4970-9777-f75bfdd426e7", "DetectTime": "2024-05-21T12:40:50.525619+00:00", "EventTime": "2024-05-21T12:40:50.525643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.176.133.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYACk479e1eHLVlUh"], "accumulated_threat_level": 8.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "f331858d-beee-49c2-92dc-3cecae4ef014", "DetectTime": "2024-05-21T12:40:50.552425+00:00", "EventTime": "2024-05-21T12:40:50.552443+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSEhGr15kWyK7HXVh4"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "d3b957ed-e6f1-4e5a-b252-6e37aa1a7ce4", "DetectTime": "2024-05-21T12:40:50.565036+00:00", "EventTime": "2024-05-21T12:40:50.565056+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSEhGr15kWyK7HXVh4"], "accumulated_threat_level": 9.0, "timewindow": 27} +{"Format": "IDEA0", "ID": "ac299d56-2adc-4bf2-bf2f-7fe56b394d4f", "DetectTime": "2024-05-21T12:40:50.677956+00:00", "EventTime": "2024-05-21T12:40:50.677979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "Connection to unknown destination port 2848/UDP destination IP 24.112.233.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsMrw2XR5RaFdGSbh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 115} +{"Format": "Json", "ID": "ac299d56-2adc-4bf2-bf2f-7fe56b394d4f", "DetectTime": "2024-05-21T12:40:50.677956+00:00", "EventTime": "2024-05-21T12:40:50.677979+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["24.112.233.128"]}], "Attach": [{"Content": "1970-01-05T18:51:39.100442+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2024/05/21 12:40:51.186215)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 115, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8c3df093-098c-46ec-afea-ab49657f40b7", "DetectTime": "2024-05-21T12:40:51.202570+00:00", "EventTime": "2024-05-21T12:40:51.202587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["74.208.73.146"]}], "Attach": [{"Content": "Connection to unknown destination port 4587/UDP destination IP 74.208.73.146. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnH6O3zJzr6K40fK9"], "accumulated_threat_level": 0.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "6c71b44a-88f5-4fe4-8629-76b864dabd6d", "DetectTime": "2024-05-21T12:40:51.212744+00:00", "EventTime": "2024-05-21T12:40:51.212762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJRsB1j16QtrvjJ9d"], "accumulated_threat_level": 1.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "a67fa8b2-e56c-44a9-93ff-85e63791d71d", "DetectTime": "2024-05-21T12:40:51.223089+00:00", "EventTime": "2024-05-21T12:40:51.223107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.28.73.174"]}], "Attach": [{"Content": "Connection to unknown destination port 8564/UDP destination IP 75.28.73.174. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxcD017Fcx2pJlmjg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 115} +{"Format": "IDEA0", "ID": "418eb159-3165-4f06-9fe2-926e6b4a84d8", "DetectTime": "2024-05-21T12:40:51.235398+00:00", "EventTime": "2024-05-21T12:40:51.235420+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.245.135.238"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.245.135.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWzMV1fKz3npai2ze"], "accumulated_threat_level": 0, "timewindow": 27} +{"Format": "IDEA0", "ID": "5c033e6b-b221-42c2-9c78-e1245f8bbf7f", "DetectTime": "2024-05-21T12:40:51.248529+00:00", "EventTime": "2024-05-21T12:40:51.248547+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.245.135.238"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.245.135.238 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaWzMV1fKz3npai2ze"], "accumulated_threat_level": 9.5, "timewindow": 27} +{"Format": "IDEA0", "ID": "04dbf8ec-9696-465a-9869-7e41d7858023", "DetectTime": "2024-05-21T12:40:51.253556+00:00", "EventTime": "2024-05-21T12:40:51.253574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAs82f3PqRE33Z01D2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "1b858cd2-411a-4ea8-abbb-ffe17abe767d", "DetectTime": "2024-05-21T12:40:51.264476+00:00", "EventTime": "2024-05-21T12:40:51.264495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJtqr5a791QV6ry8"], "accumulated_threat_level": 3.2, "timewindow": 115} +{"Format": "IDEA0", "ID": "968c8d65-7f03-49b8-b1ad-70b2f43dd188", "DetectTime": "2024-05-21T12:40:51.276329+00:00", "EventTime": "2024-05-21T12:40:51.276346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.222.48.200"]}], "Attach": [{"Content": "Connection to unknown destination port 6099/UDP destination IP 107.222.48.200. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkJcZW9MvLdUPJod"], "accumulated_threat_level": 4.0, "timewindow": 115} +{"Format": "IDEA0", "ID": "32a614bb-5530-408a-ace7-fc5ec8c6a40f", "DetectTime": "2024-05-21T12:40:51.280820+00:00", "EventTime": "2024-05-21T12:40:51.280837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEKHJm1S0du6Bre4dg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "7ee9d6f5-2191-4393-8ee3-8daf593964af", "DetectTime": "2024-05-21T12:40:51.291467+00:00", "EventTime": "2024-05-21T12:40:51.291486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOYU11WLCU3mobqPj"], "accumulated_threat_level": 4.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "0f7b72ae-e39f-40e3-80a3-e88f26fb55c4", "DetectTime": "2024-05-21T12:40:51.356398+00:00", "EventTime": "2024-05-21T12:40:51.356420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8sxund3PrIwxml1d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "a2d3705a-24b8-48c9-9a13-ad853594c599", "DetectTime": "2024-05-21T12:40:51.393601+00:00", "EventTime": "2024-05-21T12:40:51.393620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.111.237.222"]}], "Attach": [{"Content": "Connection to unknown destination port 7154/UDP destination IP 99.111.237.222. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCaQK38PgMtjA9zFg"], "accumulated_threat_level": 5.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "ec1d5dd5-62a3-4dc5-95ad-8ffb1c815ce1", "DetectTime": "2024-05-21T12:40:51.436306+00:00", "EventTime": "2024-05-21T12:40:51.436325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM3yvO3S7AH5Ug08aa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 115} +{"Format": "IDEA0", "ID": "0c005ca2-e0ac-4c92-bb2d-c82ed9f110e4", "DetectTime": "2024-05-21T12:40:51.491810+00:00", "EventTime": "2024-05-21T12:40:51.491828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMeKJfEWpL7gZVpld"], "accumulated_threat_level": 7.199999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "38ab560b-a96c-40bf-8f31-0c15f6188a55", "DetectTime": "2024-05-21T12:40:51.513107+00:00", "EventTime": "2024-05-21T12:40:51.513128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLItY2R16mCUmoY5j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "b3774048-5810-4cbb-8ebb-f81696134a61", "DetectTime": "2024-05-21T12:40:51.552559+00:00", "EventTime": "2024-05-21T12:40:51.552578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFUkY2DdHrSbcZBnd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "1576f013-9ef1-4ea6-b3f1-5e317f8b1c55", "DetectTime": "2024-05-21T12:40:51.597117+00:00", "EventTime": "2024-05-21T12:40:51.597138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmqSei4ZTRG5wlfAq3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "d5aeb18f-0da0-47be-b907-c8cc8a46c66f", "DetectTime": "2024-05-21T12:40:51.637090+00:00", "EventTime": "2024-05-21T12:40:51.637111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzvFG62Xg9XTSkEgk4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "c179e920-2b28-44b7-84d1-b8610c686a71", "DetectTime": "2024-05-21T12:40:51.875083+00:00", "EventTime": "2024-05-21T12:40:51.875104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMeKECc6dpmJsWb7"], "accumulated_threat_level": 9.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "4ae26645-eb78-4649-b6d2-67145adccfb2", "DetectTime": "2024-05-21T12:40:51.921874+00:00", "EventTime": "2024-05-21T12:40:51.921893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUTHSFsylvdu8uYp8"], "accumulated_threat_level": 10.4, "timewindow": 115} +{"Format": "IDEA0", "ID": "a2560a00-aff0-4c88-817a-43710be7924b", "DetectTime": "2024-05-21T12:40:51.964801+00:00", "EventTime": "2024-05-21T12:40:51.964819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.138.163.107"]}], "Attach": [{"Content": "Connection to unknown destination port 3713/UDP destination IP 75.138.163.107. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4y4MK1iM63ux6xeXj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 115} +{"Format": "IDEA0", "ID": "f21426b2-c13b-472a-a610-6f0d8fdb03e6", "DetectTime": "2024-05-21T12:40:51.996794+00:00", "EventTime": "2024-05-21T12:40:51.996815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASjC51DkT21lws2C5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "b0b31d18-5466-4067-bab3-f9d07afc78d3", "DetectTime": "2024-05-21T12:40:52.041699+00:00", "EventTime": "2024-05-21T12:40:52.041717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqp7aa2aPFtLs7THra"], "accumulated_threat_level": 12.000000000000002, "timewindow": 115} +{"Format": "Json", "ID": "b0b31d18-5466-4067-bab3-f9d07afc78d3", "DetectTime": "2024-05-21T12:40:52.041699+00:00", "EventTime": "2024-05-21T12:40:52.041717+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-05T18:51:37.988239+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2024/05/21 12:40:52.249401)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 115, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1761f70a-1745-44a8-838a-602bc5801fda", "DetectTime": "2024-05-21T12:40:52.261114+00:00", "EventTime": "2024-05-21T12:40:52.261133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQt1s1yMbEIz3yG8l"], "accumulated_threat_level": 0.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "88c3de12-6494-4be4-8106-136fd38adbfb", "DetectTime": "2024-05-21T12:40:52.272277+00:00", "EventTime": "2024-05-21T12:40:52.272296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuS3JC4GRKXCxuCYn3"], "accumulated_threat_level": 1.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "854e08ee-6e2d-44e4-8fb6-327edd605bdd", "DetectTime": "2024-05-21T12:40:52.283667+00:00", "EventTime": "2024-05-21T12:40:52.283687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBoir4cXJQAo1f6s3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 115} +{"Format": "IDEA0", "ID": "f7f43146-6a0a-4f6e-b890-3e0e5e37ce02", "DetectTime": "2024-05-21T12:40:52.415922+00:00", "EventTime": "2024-05-21T12:40:52.415944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZFHlM1JUeZdC4E8yb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "417c0629-6b7f-4514-afa3-a0eaa2877ad3", "DetectTime": "2024-05-21T12:40:52.547002+00:00", "EventTime": "2024-05-21T12:40:52.547022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIuj402Uz5tIz4Grd"], "accumulated_threat_level": 3.2, "timewindow": 115} +{"Format": "IDEA0", "ID": "8c22b612-7406-493b-9e48-bc43510170bb", "DetectTime": "2024-05-21T12:40:52.571354+00:00", "EventTime": "2024-05-21T12:40:52.571377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CerTvmGVMCzmjaqyg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "6f635482-40b1-4310-becd-ce32f0f48ef6", "DetectTime": "2024-05-21T12:40:52.626770+00:00", "EventTime": "2024-05-21T12:40:52.626788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VpZd3caDjnk4UdIi"], "accumulated_threat_level": 4.0, "timewindow": 115} +{"Format": "IDEA0", "ID": "3f2295ce-dee8-494c-852e-27a0a4bc5366", "DetectTime": "2024-05-21T12:40:52.687106+00:00", "EventTime": "2024-05-21T12:40:52.687126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3xpE22QdG3fTKqI81"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "01710695-2093-41ce-97ff-3fc44fbbd01e", "DetectTime": "2024-05-21T12:40:52.742277+00:00", "EventTime": "2024-05-21T12:40:52.742298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5WW01ZXObXZiXw59"], "accumulated_threat_level": 4.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "2c2b8713-aa03-46ba-a69f-cd1e1f7f8fec", "DetectTime": "2024-05-21T12:40:52.846331+00:00", "EventTime": "2024-05-21T12:40:52.846351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXcip1uqzxAuAQfZb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "c69ebc8a-1904-407d-a1ad-2e4dbd2affb8", "DetectTime": "2024-05-21T12:40:52.939081+00:00", "EventTime": "2024-05-21T12:40:52.939099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbtE7g2wm3dbx0U3Ze"], "accumulated_threat_level": 5.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "2c0a3b35-2153-4171-ad9e-429dec80b1ed", "DetectTime": "2024-05-21T12:40:53.070246+00:00", "EventTime": "2024-05-21T12:40:53.070267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9khac4VMTIBCroe7a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 115} +{"Format": "IDEA0", "ID": "e58960d8-75e3-4305-bc17-2f14dc83e18c", "DetectTime": "2024-05-21T12:40:53.112857+00:00", "EventTime": "2024-05-21T12:40:53.112875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"]}], "Attach": [{"Content": "Connection to unknown destination port 12372/UDP destination IP 117.198.166.22. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmNzu4XVRoosQPod2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "1e972881-3022-4d60-94d3-a4c98bcfb1ed", "DetectTime": "2024-05-21T12:40:53.170721+00:00", "EventTime": "2024-05-21T12:40:53.170743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVojpp3UF7Cohit1Kd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "2d3422e1-6c9f-4a4e-8eab-bdf1fdeae57e", "DetectTime": "2024-05-21T12:40:53.202995+00:00", "EventTime": "2024-05-21T12:40:53.203014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBLnI3cd8D5wxS7g6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "def06560-5f23-4fd1-82f0-d4de6e1b8201", "DetectTime": "2024-05-21T12:40:53.438360+00:00", "EventTime": "2024-05-21T12:40:53.438380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.91.219"]}], "Attach": [{"Content": "Connection to unknown destination port 9329/UDP destination IP 41.201.91.219. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COY0wf2C0TegNI4OS7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "cf7d3f5e-c87f-4f6e-a789-c57b9c621240", "DetectTime": "2024-05-21T12:40:53.466188+00:00", "EventTime": "2024-05-21T12:40:53.466211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCd30v4JK7BcB187Oi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "26cb1c56-82c8-45a5-8771-245a32f394ec", "DetectTime": "2024-05-21T12:40:53.529625+00:00", "EventTime": "2024-05-21T12:40:53.529643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.5.194.234"]}], "Attach": [{"Content": "Connection to unknown destination port 7682/UDP destination IP 172.5.194.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb5Vix2GCxPgJxndJa"], "accumulated_threat_level": 9.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "93567061-16e2-44d3-927c-f7b77c5847f8", "DetectTime": "2024-05-21T12:40:53.562254+00:00", "EventTime": "2024-05-21T12:40:53.562273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jlZf41kS8cOZtNj2"], "accumulated_threat_level": 10.4, "timewindow": 115} +{"Format": "IDEA0", "ID": "6649726e-2cb9-4e4f-bc4d-42cee60bc2bd", "DetectTime": "2024-05-21T12:40:53.608011+00:00", "EventTime": "2024-05-21T12:40:53.608032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqq3dbq99OAFyA92c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "64b6c746-a147-4291-861c-68725011d2fe", "DetectTime": "2024-05-21T12:40:53.669304+00:00", "EventTime": "2024-05-21T12:40:53.669322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.7.114.218"]}], "Attach": [{"Content": "Connection to unknown destination port 12251/UDP destination IP 199.7.114.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzXbrD2NJooBlYp6n1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 115} +{"Format": "IDEA0", "ID": "511894de-f5b0-4abf-877c-807f3ed60c20", "DetectTime": "2024-05-21T12:40:53.736967+00:00", "EventTime": "2024-05-21T12:40:53.736988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZoys3JetdZdwTki8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 115} +{"Format": "Json", "ID": "511894de-f5b0-4abf-877c-807f3ed60c20", "DetectTime": "2024-05-21T12:40:53.736967+00:00", "EventTime": "2024-05-21T12:40:53.736988+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "1970-01-05T18:54:31.416496+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2024/05/21 12:40:53.957313)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 115, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "804ccadc-3ff3-43d0-9880-7fa2b3ca96dc", "DetectTime": "2024-05-21T12:40:53.961247+00:00", "EventTime": "2024-05-21T12:40:53.961264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZgelwVdnuFJHPNT3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "aaec699b-f4ff-4dc2-a6dd-12e1397863e9", "DetectTime": "2024-05-21T12:40:53.966039+00:00", "EventTime": "2024-05-21T12:40:53.966064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSiUGQoDOPN0QtG1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "7a05b7c4-1de3-4064-8a75-4c275355b318", "DetectTime": "2024-05-21T12:40:54.054729+00:00", "EventTime": "2024-05-21T12:40:54.054750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQWoc244fkHDBfAQ"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "5defcb07-a290-4a5f-b7e6-7032f7218199", "DetectTime": "2024-05-21T12:40:54.131431+00:00", "EventTime": "2024-05-21T12:40:54.131451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMod1R2M30FlY1hXCi"], "accumulated_threat_level": 0.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "541b1824-259b-4133-aac1-73c4081493d8", "DetectTime": "2024-05-21T12:40:54.200648+00:00", "EventTime": "2024-05-21T12:40:54.200665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CokeW83vRib4iIusQi"], "accumulated_threat_level": 1.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "696e3c2d-b876-4a97-aa76-11495dcac107", "DetectTime": "2024-05-21T12:40:54.235495+00:00", "EventTime": "2024-05-21T12:40:54.235518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9QUe3S6VyD8o7KX1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "4a0146e5-a596-47b6-9c4d-d565cf1567e0", "DetectTime": "2024-05-21T12:40:54.273991+00:00", "EventTime": "2024-05-21T12:40:54.274012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx9vdB2KOjcUVeadU6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "14b5f7b0-98a2-425e-88f2-0c01835f3f6e", "DetectTime": "2024-05-21T12:40:54.316617+00:00", "EventTime": "2024-05-21T12:40:54.316636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0ocq3BEcW7sm0oZ2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "724f37bf-9de7-4702-a08c-d53e4edb04f3", "DetectTime": "2024-05-21T12:40:54.363126+00:00", "EventTime": "2024-05-21T12:40:54.363146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBzimuHS0NDncvc6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 115} +{"Format": "IDEA0", "ID": "dfae2161-88fd-4e7f-8cda-8aaa11f02169", "DetectTime": "2024-05-21T12:40:54.368306+00:00", "EventTime": "2024-05-21T12:40:54.368325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnC8a2eNVmAyuYAMi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 113} +{"Format": "IDEA0", "ID": "f5d8b2e9-26b2-414d-80a0-ace66541e41b", "DetectTime": "2024-05-21T12:40:54.440223+00:00", "EventTime": "2024-05-21T12:40:54.440243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtLGml4KDyHGA8N6lb"], "accumulated_threat_level": 3.2, "timewindow": 115} +{"Format": "IDEA0", "ID": "637f0436-fff3-4ad5-9a91-859d778b6224", "DetectTime": "2024-05-21T12:40:54.677458+00:00", "EventTime": "2024-05-21T12:40:54.677493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8x4v3FoOsLsBXcZj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "230e445f-140c-4578-a95c-b9d99204e2bf", "DetectTime": "2024-05-21T12:40:54.726358+00:00", "EventTime": "2024-05-21T12:40:54.726385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNgbP2KdIuyAXrCb1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "88ee3ccf-c41b-41ee-9442-1ae932980b66", "DetectTime": "2024-05-21T12:40:54.732601+00:00", "EventTime": "2024-05-21T12:40:54.732619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImLELGodCOXcRRp8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "74f6fbb6-1c76-48dc-93c9-d3ce2089b556", "DetectTime": "2024-05-21T12:40:54.798120+00:00", "EventTime": "2024-05-21T12:40:54.798142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDT3Ta3dOPGMlS1Ndf"], "accumulated_threat_level": 4.0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a98ad258-caad-4bf6-b797-bcf055127a8c", "DetectTime": "2024-05-21T12:40:54.847616+00:00", "EventTime": "2024-05-21T12:40:54.847637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJuI6rakxq3inff3h"], "accumulated_threat_level": 4.8, "timewindow": 115} +{"Format": "IDEA0", "ID": "9235b7e5-4554-4797-9f36-b04cf4753eef", "DetectTime": "2024-05-21T12:40:54.871965+00:00", "EventTime": "2024-05-21T12:40:54.871985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUqaA1DKFChD3EQZj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "434f9d2c-0b70-43cc-94f9-caeeb5ef2b05", "DetectTime": "2024-05-21T12:40:54.914230+00:00", "EventTime": "2024-05-21T12:40:54.914253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCuBJ5xs6loFkEmd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "ba57c07d-5e99-4f60-8437-e6b7ce06ff95", "DetectTime": "2024-05-21T12:40:54.954599+00:00", "EventTime": "2024-05-21T12:40:54.954619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc6Zej3ycQkATjAbnf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "1370a8fd-f7dc-4885-843d-b54374d92cbc", "DetectTime": "2024-05-21T12:40:54.999224+00:00", "EventTime": "2024-05-21T12:40:54.999246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpd2Is4ZUS5JJBJGw9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "28512ee0-f000-4004-801a-fa48cfe47e22", "DetectTime": "2024-05-21T12:40:55.289797+00:00", "EventTime": "2024-05-21T12:40:55.289820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ47G43pApyhUynE0j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "ba17840d-8b39-453c-8e99-953164ff043f", "DetectTime": "2024-05-21T12:40:55.296348+00:00", "EventTime": "2024-05-21T12:40:55.296367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKZ8s0f5NPGNwfP6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "aa972350-3952-429e-a55c-8d3ee7d56334", "DetectTime": "2024-05-21T12:40:55.302106+00:00", "EventTime": "2024-05-21T12:40:55.302126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8ihV3UWlb5uvGnye"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "7180c45b-1f67-4058-8048-a196b74f1fc0", "DetectTime": "2024-05-21T12:40:55.308800+00:00", "EventTime": "2024-05-21T12:40:55.308822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUuuU3cWcwa4gQPbi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "60919f2e-561a-449f-92de-bc9f229537ab", "DetectTime": "2024-05-21T12:40:55.411444+00:00", "EventTime": "2024-05-21T12:40:55.411467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsqEJduuSMxJHEY4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "d27501bc-8bf3-483e-815b-fb9b49d62cd1", "DetectTime": "2024-05-21T12:40:55.537811+00:00", "EventTime": "2024-05-21T12:40:55.537832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPfhd4wS4dpX3esbg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "97306edc-d613-4015-8e6d-319493d09dbf", "DetectTime": "2024-05-21T12:40:55.607167+00:00", "EventTime": "2024-05-21T12:40:55.607186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs3qUw1XW8rkeS770g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "b4db0e60-c2b8-4065-9130-ad3e197b9281", "DetectTime": "2024-05-21T12:40:55.703920+00:00", "EventTime": "2024-05-21T12:40:55.703939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Hz0C2FJpt3O1j0Fa"], "accumulated_threat_level": 5.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "7bb17593-75d1-4a41-8f59-bea6a90295e6", "DetectTime": "2024-05-21T12:40:55.798283+00:00", "EventTime": "2024-05-21T12:40:55.798304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvytSA3vXIMu6YGpu7", "CWQ6Y93mSEAFDuXRA5", "CVNJQA4N59ptMmTSL7", "CtjZvubHrYnG5ubL1"], "accumulated_threat_level": 0.5, "timewindow": 116} +{"Format": "IDEA0", "ID": "d1a513ca-6007-43a4-bb91-c5b00b466ed7", "DetectTime": "2024-05-21T12:40:55.944972+00:00", "EventTime": "2024-05-21T12:40:55.944997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMbIN1b2fZQesgKk6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "ba8ff35e-23b4-4063-be4d-1d232e5c59dd", "DetectTime": "2024-05-21T12:40:55.950279+00:00", "EventTime": "2024-05-21T12:40:55.950298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHY88S3inme0m9hz3a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "92dd79b5-66b6-428c-949d-7b60ab57ee9a", "DetectTime": "2024-05-21T12:40:56.009909+00:00", "EventTime": "2024-05-21T12:40:56.009933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.50.155"]}], "Attach": [{"Content": "Connection to unknown destination port 6367/UDP destination IP 46.49.50.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhxiH2icvyPwzKEm7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 115} +{"Format": "IDEA0", "ID": "525b707b-c45e-44b5-84c7-c5a184de8096", "DetectTime": "2024-05-21T12:40:56.054527+00:00", "EventTime": "2024-05-21T12:40:56.054566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYe5AV2vfVgEwq32h2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "83c3e99d-2e01-438e-943d-a38c4110ff27", "DetectTime": "2024-05-21T12:40:56.136115+00:00", "EventTime": "2024-05-21T12:40:56.136135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJS1mEa5fl3YMJqj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "a7420ed7-a784-40a0-8cd8-cbe02a8ca2b0", "DetectTime": "2024-05-21T12:40:56.196672+00:00", "EventTime": "2024-05-21T12:40:56.196695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPRrg36faORFlDs54"], "accumulated_threat_level": 8.799999999999999, "timewindow": 115} +{"Format": "IDEA0", "ID": "de5da22c-949f-4580-8256-325729383ff1", "DetectTime": "2024-05-21T12:40:56.231615+00:00", "EventTime": "2024-05-21T12:40:56.231635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHzIu2JdFQx6Ryg7g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "0c9afb09-44ad-4769-97da-e11d6df1fee3", "DetectTime": "2024-05-21T12:40:56.272863+00:00", "EventTime": "2024-05-21T12:40:56.272882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysBoa3OhmLqT4akLa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "ad17ae2e-8276-4229-b01f-63949db9b949", "DetectTime": "2024-05-21T12:40:56.521221+00:00", "EventTime": "2024-05-21T12:40:56.521242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueVIu27EuoBp0Rvd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "048cd94d-e90e-4fa3-84b3-4b442be25298", "DetectTime": "2024-05-21T12:40:56.531983+00:00", "EventTime": "2024-05-21T12:40:56.532003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRiTm3ADkcnwZhjnk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "256c17a1-dace-4609-adb4-f184de9cb8cc", "DetectTime": "2024-05-21T12:40:56.701074+00:00", "EventTime": "2024-05-21T12:40:56.701093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clkx9J3o3PFzbn4Yu2"], "accumulated_threat_level": 9.6, "timewindow": 115} +{"Format": "IDEA0", "ID": "7e3201e0-f820-4bc1-bb61-eb09ac7e39c5", "DetectTime": "2024-05-21T12:40:56.751756+00:00", "EventTime": "2024-05-21T12:40:56.751779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdCkp48ZAy5GsRjak"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "a03c055a-aaf8-4147-8afa-13402be50d2d", "DetectTime": "2024-05-21T12:40:56.859503+00:00", "EventTime": "2024-05-21T12:40:56.859524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRCS04o3aE27mIcnb"], "accumulated_threat_level": 10.4, "timewindow": 115} +{"Format": "IDEA0", "ID": "fa642878-19e7-4c9a-985a-38032aac3c33", "DetectTime": "2024-05-21T12:40:56.897366+00:00", "EventTime": "2024-05-21T12:40:56.897387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQC2tR2t8qpzMlguCb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "30a0f033-c621-487e-ab42-5201f3df7221", "DetectTime": "2024-05-21T12:40:56.945914+00:00", "EventTime": "2024-05-21T12:40:56.945937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39ATm4PBvewDHZtJd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "ee8df817-d8bc-4bed-8256-12147af23018", "DetectTime": "2024-05-21T12:40:56.986604+00:00", "EventTime": "2024-05-21T12:40:56.986626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb4ihqfuX31OOIiUe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "b3ca5ef3-369e-488f-b17b-78f5acb91b42", "DetectTime": "2024-05-21T12:40:57.219531+00:00", "EventTime": "2024-05-21T12:40:57.219554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChosPA4CRyz4NlhVkb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "e2d46549-8dbb-4bd3-bf1f-99a272218cd6", "DetectTime": "2024-05-21T12:40:57.251773+00:00", "EventTime": "2024-05-21T12:40:57.251792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwNUJt4l0NJLMphPxj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 115} +{"Format": "IDEA0", "ID": "108abc10-e3e4-498a-b6dd-de5ca2fe04b2", "DetectTime": "2024-05-21T12:40:57.297227+00:00", "EventTime": "2024-05-21T12:40:57.297247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"]}], "Attach": [{"Content": "Connection to unknown destination port 9820/UDP destination IP 88.135.199.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRppSk2bdgoPPpoPi3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 115} +{"Format": "Json", "ID": "108abc10-e3e4-498a-b6dd-de5ca2fe04b2", "DetectTime": "2024-05-21T12:40:57.297227+00:00", "EventTime": "2024-05-21T12:40:57.297247+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"]}], "Attach": [{"Content": "1970-01-05T18:59:44.208816+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 115. (real time 2024/05/21 12:40:57.542337)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 115, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1915021d-e56e-4e82-b133-5fb9c4b77ec7", "DetectTime": "2024-05-21T12:40:57.546584+00:00", "EventTime": "2024-05-21T12:40:57.546602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfx69Z3VnzFUC6hI61"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "b80349b5-9e80-45bd-9230-22c73ad89fa4", "DetectTime": "2024-05-21T12:40:57.558713+00:00", "EventTime": "2024-05-21T12:40:57.558734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkUBDE4ciDdpkri2X5"], "accumulated_threat_level": 1.3, "timewindow": 116} +{"Format": "IDEA0", "ID": "e69393f7-8202-42b9-9986-b6b1fc310139", "DetectTime": "2024-05-21T12:40:57.564292+00:00", "EventTime": "2024-05-21T12:40:57.564310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK0LOD3f39BB2Fso73"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "c96e6d39-c451-4e09-9cc2-49434842ad4a", "DetectTime": "2024-05-21T12:40:57.575239+00:00", "EventTime": "2024-05-21T12:40:57.575257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.97.132"]}], "Attach": [{"Content": "Connection to unknown destination port 26707/UDP destination IP 85.75.97.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxk8GgVQiiVgKX5"], "accumulated_threat_level": 2.1, "timewindow": 116} +{"Format": "IDEA0", "ID": "53d47cc2-4910-451b-a57c-f75697603413", "DetectTime": "2024-05-21T12:40:57.586131+00:00", "EventTime": "2024-05-21T12:40:57.586149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ohhL2RkeSQmSI2D3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 116} +{"Format": "IDEA0", "ID": "2e2a7af3-43f8-4fb5-9b7c-761607718358", "DetectTime": "2024-05-21T12:40:57.675050+00:00", "EventTime": "2024-05-21T12:40:57.675071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIUhi35ysCpBaWr01"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "2c32c91c-732a-4c5e-bcdb-46765bac84b5", "DetectTime": "2024-05-21T12:40:57.737495+00:00", "EventTime": "2024-05-21T12:40:57.737516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"]}], "Attach": [{"Content": "Connection to unknown destination port 29927/UDP destination IP 187.233.248.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqHjZ347zrAcgDhDI7"], "accumulated_threat_level": 3.7, "timewindow": 116} +{"Format": "IDEA0", "ID": "d7aabf46-46c7-4292-9712-8d0b873a9b56", "DetectTime": "2024-05-21T12:40:57.997468+00:00", "EventTime": "2024-05-21T12:40:57.997489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKhZS39YsRJMzyR7b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "e113579d-7ba7-4e61-a693-724ba584f3fe", "DetectTime": "2024-05-21T12:40:58.104642+00:00", "EventTime": "2024-05-21T12:40:58.104664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrAeE14raEAiUY37k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "bbfa96ae-b1be-4529-bdda-f5ab688bdab2", "DetectTime": "2024-05-21T12:40:58.172182+00:00", "EventTime": "2024-05-21T12:40:58.172203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwmxvq1rhRBeu0BAyb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "b213870b-ff12-451b-86e4-db921ec2be9d", "DetectTime": "2024-05-21T12:40:58.212624+00:00", "EventTime": "2024-05-21T12:40:58.212641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRM7F4mNXmoKtjUNd"], "accumulated_threat_level": 4.5, "timewindow": 116} +{"Format": "IDEA0", "ID": "5913749d-3d90-412d-8abf-9d171977f4f1", "DetectTime": "2024-05-21T12:40:58.273474+00:00", "EventTime": "2024-05-21T12:40:58.273495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChECDr2YqNdbCqyH1j"], "accumulated_threat_level": 5.3, "timewindow": 116} +{"Format": "IDEA0", "ID": "07bbd761-53c8-4483-8630-4dc01ede624e", "DetectTime": "2024-05-21T12:40:58.328301+00:00", "EventTime": "2024-05-21T12:40:58.328325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.178.196.83"]}], "Attach": [{"Content": "Connection to unknown destination port 3712/UDP destination IP 5.178.196.83. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6lMrG1f8ZbmazVVR3"], "accumulated_threat_level": 6.1, "timewindow": 116} +{"Format": "IDEA0", "ID": "44ef6a8a-aec0-4d73-8efb-d90872a213f6", "DetectTime": "2024-05-21T12:40:58.393162+00:00", "EventTime": "2024-05-21T12:40:58.393180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CohFmo1WwfR05omd1c"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 116} +{"Format": "IDEA0", "ID": "638b8a09-4ea8-4f2b-938a-4da8c9680bf7", "DetectTime": "2024-05-21T12:40:58.428450+00:00", "EventTime": "2024-05-21T12:40:58.428470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWC1mu3cX31ZFKugyf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "abc8815f-68e3-4fd3-bcdc-861617004dc3", "DetectTime": "2024-05-21T12:40:58.620280+00:00", "EventTime": "2024-05-21T12:40:58.620301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cotpfm1Epon37aMcTd"], "accumulated_threat_level": 7.699999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "61fa7909-6f46-4aaf-aad3-bb9ab176ee0b", "DetectTime": "2024-05-21T12:40:58.655236+00:00", "EventTime": "2024-05-21T12:40:58.655256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezecI30ytyAykG5uf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "08c0c7fd-da9b-4b4b-85f3-719d3a34d15a", "DetectTime": "2024-05-21T12:40:58.704115+00:00", "EventTime": "2024-05-21T12:40:58.704133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C47sfouEKFPAI5yFf"], "accumulated_threat_level": 8.5, "timewindow": 116} +{"Format": "IDEA0", "ID": "961ec5fa-725d-4765-858f-5a5f8cd11fbc", "DetectTime": "2024-05-21T12:40:58.728953+00:00", "EventTime": "2024-05-21T12:40:58.728975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CopFDZSvylZlpDRm7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "88e9c0b8-6179-4283-bb37-58d5ceec2175", "DetectTime": "2024-05-21T12:40:58.970047+00:00", "EventTime": "2024-05-21T12:40:58.970068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Civ9Ol2y0mg2KBevlk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "79bcaf09-b8c2-4d7b-8f93-5c5d8c648223", "DetectTime": "2024-05-21T12:40:59.016687+00:00", "EventTime": "2024-05-21T12:40:59.016710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq9AjZ3Hdh0BjCy14c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "c3103e65-82ef-4df7-9336-7c16a230cf7f", "DetectTime": "2024-05-21T12:40:59.028471+00:00", "EventTime": "2024-05-21T12:40:59.028489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUuZX6D0gKI8Hlkj"], "accumulated_threat_level": 9.3, "timewindow": 116} +{"Format": "IDEA0", "ID": "c21d1edd-262a-49f7-8c16-75576d554082", "DetectTime": "2024-05-21T12:40:59.034070+00:00", "EventTime": "2024-05-21T12:40:59.034092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKkDQkov4NfOmkjb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "c0cb9b0c-485b-4045-b91c-c3ae7d5923e2", "DetectTime": "2024-05-21T12:40:59.039197+00:00", "EventTime": "2024-05-21T12:40:59.039214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzU2x1plqF1Avxpsb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "af0f2526-d2ce-4555-87e0-8dff3c315846", "DetectTime": "2024-05-21T12:40:59.180657+00:00", "EventTime": "2024-05-21T12:40:59.180679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKtHX1WjP5cpyBaDi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 116} +{"Format": "IDEA0", "ID": "72c8b471-777f-4d55-8bf9-9459ace4c146", "DetectTime": "2024-05-21T12:40:59.214682+00:00", "EventTime": "2024-05-21T12:40:59.214702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEB4rA232bxfgMIlla"], "accumulated_threat_level": 10.900000000000002, "timewindow": 116} +{"Format": "IDEA0", "ID": "564135e8-d450-4052-867a-1dbf9f576026", "DetectTime": "2024-05-21T12:40:59.281616+00:00", "EventTime": "2024-05-21T12:40:59.281638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjHkU2r8fKoj0eTQh"], "accumulated_threat_level": 11.700000000000003, "timewindow": 116} +{"Format": "IDEA0", "ID": "8d65555d-9056-4fa2-9b17-6180fec4199f", "DetectTime": "2024-05-21T12:40:59.296892+00:00", "EventTime": "2024-05-21T12:40:59.296913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGC8e4GeFJyauGVVd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "e17ec474-b963-4e9a-aeb4-daa300576b6d", "DetectTime": "2024-05-21T12:40:59.335336+00:00", "EventTime": "2024-05-21T12:40:59.335355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxWhny4Fb5qLPVVBW2"], "accumulated_threat_level": 12.500000000000004, "timewindow": 116} +{"Format": "Json", "ID": "e17ec474-b963-4e9a-aeb4-daa300576b6d", "DetectTime": "2024-05-21T12:40:59.335336+00:00", "EventTime": "2024-05-21T12:40:59.335355+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-05T19:32:49.275441+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2024/05/21 12:40:59.551808)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 116, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "d4a73d78-f080-4426-a7ba-e75c9f9340df", "DetectTime": "2024-05-21T12:40:59.563641+00:00", "EventTime": "2024-05-21T12:40:59.563664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zM0o4jFJAG0TUqA7"], "accumulated_threat_level": 0.8, "timewindow": 116} +{"Format": "IDEA0", "ID": "938a7b18-7ddd-44a0-a445-fcf0fcbb69f6", "DetectTime": "2024-05-21T12:40:59.601058+00:00", "EventTime": "2024-05-21T12:40:59.601078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6uHCwwR7YdG70Wl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "3157d34e-0b3f-4355-a80c-6874f5115855", "DetectTime": "2024-05-21T12:40:59.643230+00:00", "EventTime": "2024-05-21T12:40:59.643249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboCUK16uk2HdDc63j"], "accumulated_threat_level": 1.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "188407b5-b742-400a-8dc8-beb488695e1a", "DetectTime": "2024-05-21T12:40:59.682328+00:00", "EventTime": "2024-05-21T12:40:59.682348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMWqw46uFLoOT8eae"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 116} +{"Format": "IDEA0", "ID": "d71e4097-ff6b-4d18-b949-c55eca862693", "DetectTime": "2024-05-21T12:40:59.732474+00:00", "EventTime": "2024-05-21T12:40:59.732493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FRApuVo14bTzkDc"], "accumulated_threat_level": 3.2, "timewindow": 116} +{"Format": "IDEA0", "ID": "9b7845f0-4a98-4390-9eec-041e484ffda1", "DetectTime": "2024-05-21T12:40:59.766183+00:00", "EventTime": "2024-05-21T12:40:59.766204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOGDr44MDboCA0MPa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "6536f95e-3af0-40eb-96ef-45d258b17f52", "DetectTime": "2024-05-21T12:40:59.802934+00:00", "EventTime": "2024-05-21T12:40:59.802954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbPkc4Yda2NAIEgd9"], "accumulated_threat_level": 4.0, "timewindow": 116} +{"Format": "IDEA0", "ID": "d8b26b0b-7b50-4008-b6f8-ff013fd8b2b9", "DetectTime": "2024-05-21T12:40:59.847636+00:00", "EventTime": "2024-05-21T12:40:59.847655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXcVJn2QFg0CPNYZHg"], "accumulated_threat_level": 4.8, "timewindow": 116} +{"Format": "IDEA0", "ID": "3a2ed62c-93aa-45c1-9aae-08f4720c89de", "DetectTime": "2024-05-21T12:40:59.883245+00:00", "EventTime": "2024-05-21T12:40:59.883266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eSTA4sSFXFnH6HD4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "58690a16-6711-4e25-8ccd-4054f492d218", "DetectTime": "2024-05-21T12:40:59.926609+00:00", "EventTime": "2024-05-21T12:40:59.926629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdmLv31Zxwa9Ynikd"], "accumulated_threat_level": 5.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "e44f53db-f5bc-4790-bcfd-324d47f44513", "DetectTime": "2024-05-21T12:41:00.043174+00:00", "EventTime": "2024-05-21T12:41:00.043198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPqZb83z7q5cDdapge"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "64119f3d-3769-427e-95b8-e72321f6f63d", "DetectTime": "2024-05-21T12:41:00.277093+00:00", "EventTime": "2024-05-21T12:41:00.277116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRao42CRPpzh9J1sj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 116} +{"Format": "IDEA0", "ID": "7ae2d003-284d-45a8-8179-9e330bd4272b", "DetectTime": "2024-05-21T12:41:00.306295+00:00", "EventTime": "2024-05-21T12:41:00.306314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xwvR3lVl3xUZ0W8d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "f64df14a-da6d-452f-89f1-ae7fad314557", "DetectTime": "2024-05-21T12:41:00.347086+00:00", "EventTime": "2024-05-21T12:41:00.347105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgSkd4D5RKTx9N9A5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "5fbbaf07-66ca-4e6a-b610-17a7efd000a9", "DetectTime": "2024-05-21T12:41:00.399471+00:00", "EventTime": "2024-05-21T12:41:00.399490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQqhcH1F9KQgCdmIrl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "2699a327-657f-425f-8226-0de7f979539d", "DetectTime": "2024-05-21T12:41:00.434065+00:00", "EventTime": "2024-05-21T12:41:00.434086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaEQsE2tPEvJN3oRGf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "a3097641-08d1-42ee-8841-87f53bbf52a0", "DetectTime": "2024-05-21T12:41:00.468065+00:00", "EventTime": "2024-05-21T12:41:00.468090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16qSQ1GUvIDtCqYn5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "0dd2e031-fee0-445f-990c-081f3821c58d", "DetectTime": "2024-05-21T12:41:00.508736+00:00", "EventTime": "2024-05-21T12:41:00.508755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLH7n32844A9oEIbei"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "ae369ea4-23a3-4ddc-82f1-a87d6b9e6b07", "DetectTime": "2024-05-21T12:41:00.540974+00:00", "EventTime": "2024-05-21T12:41:00.540995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyPN81R6Ocry9uA1l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "b9a5fbef-12e2-458b-88a7-370fb89ad38d", "DetectTime": "2024-05-21T12:41:00.582317+00:00", "EventTime": "2024-05-21T12:41:00.582339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yUvZ1lKQ7lsCtPI1"], "accumulated_threat_level": 10.4, "timewindow": 116} +{"Format": "IDEA0", "ID": "94c1d67d-8d2a-42e1-a22b-a16dd99976a6", "DetectTime": "2024-05-21T12:41:00.815080+00:00", "EventTime": "2024-05-21T12:41:00.815102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7UeN2xt5M52AfAa9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "baee3df1-db65-4721-9195-c066540d85c9", "DetectTime": "2024-05-21T12:41:00.858864+00:00", "EventTime": "2024-05-21T12:41:00.858885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"]}], "Attach": [{"Content": "Connection to unknown destination port 12372/UDP destination IP 117.198.166.22. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0f0532wgO45t4uYfh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 116} +{"Format": "IDEA0", "ID": "831dd757-2d88-40b8-8b2f-5402e86afa93", "DetectTime": "2024-05-21T12:41:00.894889+00:00", "EventTime": "2024-05-21T12:41:00.894911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JOgC2594n9ww7Zcf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "93a7693d-d9ba-4dc5-9fa8-0ae02b7c8727", "DetectTime": "2024-05-21T12:41:00.935669+00:00", "EventTime": "2024-05-21T12:41:00.935690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNW6XA3eLVjvpslNA6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 116} +{"Format": "Json", "ID": "93a7693d-d9ba-4dc5-9fa8-0ae02b7c8727", "DetectTime": "2024-05-21T12:41:00.935669+00:00", "EventTime": "2024-05-21T12:41:00.935690+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"]}], "Attach": [{"Content": "1970-01-05T19:32:53.351031+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2024/05/21 12:41:01.110390)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 116, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fdde593f-fa21-481a-b0e6-4e81028c7555", "DetectTime": "2024-05-21T12:41:01.114548+00:00", "EventTime": "2024-05-21T12:41:01.114572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXAqB1G5LXK9mzBA2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "56c2a840-fd18-4186-b233-f24f6e1214a5", "DetectTime": "2024-05-21T12:41:01.126645+00:00", "EventTime": "2024-05-21T12:41:01.126666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["41.201.91.219"]}], "Attach": [{"Content": "Connection to unknown destination port 9329/UDP destination IP 41.201.91.219. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMMjX2VW8yL45OzCa"], "accumulated_threat_level": 0.8, "timewindow": 116} +{"Format": "IDEA0", "ID": "f00749d8-d3ed-49f2-a219-5e57dd782d0c", "DetectTime": "2024-05-21T12:41:01.137120+00:00", "EventTime": "2024-05-21T12:41:01.137139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.132.4.58"]}], "Attach": [{"Content": "Connection to unknown destination port 2921/UDP destination IP 79.132.4.58. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdca6a2464b1DcHpS9"], "accumulated_threat_level": 1.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "eff4164f-7d23-426a-a79c-8f426d1a13b7", "DetectTime": "2024-05-21T12:41:01.141991+00:00", "EventTime": "2024-05-21T12:41:01.142009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co00VG3iW3mNvakNJ7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "dbb2afba-ea3a-4dc1-917a-b24757cb011d", "DetectTime": "2024-05-21T12:41:01.164577+00:00", "EventTime": "2024-05-21T12:41:01.164597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLZhi2LuB2p7aYcKj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 116} +{"Format": "IDEA0", "ID": "0188487a-f0cd-49da-84a4-c313b8171939", "DetectTime": "2024-05-21T12:41:01.391884+00:00", "EventTime": "2024-05-21T12:41:01.391907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkissT1CjvamFRzLQj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "ec711bf4-800e-41e5-8082-9843fae24cd3", "DetectTime": "2024-05-21T12:41:01.441766+00:00", "EventTime": "2024-05-21T12:41:01.441788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cktl3F2xfHynewU3J9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "58153cc7-7813-45c5-875d-03c7f54199c9", "DetectTime": "2024-05-21T12:41:01.482925+00:00", "EventTime": "2024-05-21T12:41:01.482946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["199.7.114.218"]}], "Attach": [{"Content": "Connection to unknown destination port 12251/UDP destination IP 199.7.114.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYBdR34nN2KVnsCbg2"], "accumulated_threat_level": 3.2, "timewindow": 116} +{"Format": "IDEA0", "ID": "89d3014e-7e24-4a6d-b9b4-666e038953aa", "DetectTime": "2024-05-21T12:41:01.517784+00:00", "EventTime": "2024-05-21T12:41:01.517805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbLtb2N1d2yGMe1o6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "58ea96c0-1a4a-4be6-97fc-a34aedc5bfb9", "DetectTime": "2024-05-21T12:41:01.667183+00:00", "EventTime": "2024-05-21T12:41:01.667207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiQUf1GMJN4srguAe"], "accumulated_threat_level": 4.0, "timewindow": 116} +{"Format": "IDEA0", "ID": "5f5dfb64-95aa-461d-84eb-63c3b93490d0", "DetectTime": "2024-05-21T12:41:01.672197+00:00", "EventTime": "2024-05-21T12:41:01.672216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGuoId359mBp03jCXh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 114} +{"Format": "IDEA0", "ID": "66c0a476-197f-4330-9acb-7a64d82d30dd", "DetectTime": "2024-05-21T12:41:01.677440+00:00", "EventTime": "2024-05-21T12:41:01.677458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNtjL3l64c1FcdEN2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "ff4c4477-acc9-4d48-9747-013b8e1a5544", "DetectTime": "2024-05-21T12:41:01.721384+00:00", "EventTime": "2024-05-21T12:41:01.721406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Cecs3oF7BqNyt6sh"], "accumulated_threat_level": 4.8, "timewindow": 116} +{"Format": "IDEA0", "ID": "fe595382-33ab-4e15-bf17-78a2a81dc080", "DetectTime": "2024-05-21T12:41:01.946197+00:00", "EventTime": "2024-05-21T12:41:01.946218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpMMS1BIMJrh0JyBk"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "88bf26a2-097c-439e-aaee-aa1bbbd181bf", "DetectTime": "2024-05-21T12:41:01.989249+00:00", "EventTime": "2024-05-21T12:41:01.989278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBJzf6IBIWIuU2Cf"], "accumulated_threat_level": 5.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "1011d6ca-c5e2-450b-afc3-0a7352758050", "DetectTime": "2024-05-21T12:41:02.038489+00:00", "EventTime": "2024-05-21T12:41:02.038511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUYtWuLSejhuSzr17"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a5303ea1-ceea-4321-bad7-141ed86a8aea", "DetectTime": "2024-05-21T12:41:02.087151+00:00", "EventTime": "2024-05-21T12:41:02.087172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVNLP3Y9B1Ym8ne87"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 116} +{"Format": "IDEA0", "ID": "74456111-bb15-4abb-a145-45b898dbd222", "DetectTime": "2024-05-21T12:41:02.092333+00:00", "EventTime": "2024-05-21T12:41:02.092351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1Nmq2yZHlqnqqEl1"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "1d3a44df-c7e1-47ee-882d-1a67b812caa4", "DetectTime": "2024-05-21T12:41:02.155692+00:00", "EventTime": "2024-05-21T12:41:02.155713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx427x1hsA2k5o1Pfc"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "128f885d-15e6-4ca5-81ec-f1d741eeba44", "DetectTime": "2024-05-21T12:41:02.193938+00:00", "EventTime": "2024-05-21T12:41:02.193957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66fXj42zaluBs48S"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d7928364-6dea-4abb-aeee-aab53a1194c5", "DetectTime": "2024-05-21T12:41:02.237459+00:00", "EventTime": "2024-05-21T12:41:02.237481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK3BtF3vHmHJ6uCDBl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "1c47252c-81fe-4c09-97bf-973b79088d75", "DetectTime": "2024-05-21T12:41:02.477772+00:00", "EventTime": "2024-05-21T12:41:02.477796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKS2PmRaAg17uBm21"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "11a43a1d-475a-4226-8953-5218b5489ed5", "DetectTime": "2024-05-21T12:41:02.482863+00:00", "EventTime": "2024-05-21T12:41:02.482883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVy7rG1lQZV8fm7Qr3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "3ff37c99-68c7-4c1d-ac8e-691070e145ab", "DetectTime": "2024-05-21T12:41:02.488364+00:00", "EventTime": "2024-05-21T12:41:02.488384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgsUpx26jpN8LDrkN5"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c28f802f-aa66-4361-baea-fa58be01fb80", "DetectTime": "2024-05-21T12:41:02.575132+00:00", "EventTime": "2024-05-21T12:41:02.575153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHL0a2Lrt7tws9Wf5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "b7f83919-9972-4232-adbc-af9e798e3a3c", "DetectTime": "2024-05-21T12:41:02.587818+00:00", "EventTime": "2024-05-21T12:41:02.587839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZ8eQ1KQK4daeH5z2", "C7EEMG1DY2t6tM3nf9", "CfcQzm10t1WUNbM657", "CzUnOy2ZlstD4iqpX"], "accumulated_threat_level": 0.5, "timewindow": 117} +{"Format": "IDEA0", "ID": "52ba0589-6b79-4964-a86c-1d4c9a76eb34", "DetectTime": "2024-05-21T12:41:02.609364+00:00", "EventTime": "2024-05-21T12:41:02.609384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6GWZd3VxTNTZyC5h8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "8a7336ba-0f5a-4d8a-8b57-fcff3b30e9a9", "DetectTime": "2024-05-21T12:41:02.660236+00:00", "EventTime": "2024-05-21T12:41:02.660259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0o424xVxg50favc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "ec6002ac-e08a-4ae1-bf4f-07212fb87038", "DetectTime": "2024-05-21T12:41:02.684231+00:00", "EventTime": "2024-05-21T12:41:02.684254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbW1mh3rAdrkrN0Fh2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "f634d8d6-ea10-443c-8593-aff13c9b4856", "DetectTime": "2024-05-21T12:41:02.728124+00:00", "EventTime": "2024-05-21T12:41:02.728144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhi3B3FUP1r02ftm3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "890fa6e4-a27f-486a-9854-7b28fc2e6187", "DetectTime": "2024-05-21T12:41:02.765778+00:00", "EventTime": "2024-05-21T12:41:02.765799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMfI02aGoWxhDdOq1"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "8d1a494d-bd1f-4c9e-9af4-2e04d87854ad", "DetectTime": "2024-05-21T12:41:02.802556+00:00", "EventTime": "2024-05-21T12:41:02.802576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4tjYtk9pXiMZZl1"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "bd611662-0d42-4129-bc45-6a1ba93baa21", "DetectTime": "2024-05-21T12:41:02.846184+00:00", "EventTime": "2024-05-21T12:41:02.846206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceh1h93FPho3g5gcik"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "96845539-cf4a-4bf0-840d-c751585a8d45", "DetectTime": "2024-05-21T12:41:02.890761+00:00", "EventTime": "2024-05-21T12:41:02.890781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.50.155"]}], "Attach": [{"Content": "Connection to unknown destination port 6367/UDP destination IP 46.49.50.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMPVm1WXMaF3kGb3g"], "accumulated_threat_level": 10.4, "timewindow": 116} +{"Format": "IDEA0", "ID": "dfc37af0-1214-420e-8b2e-b90dd60733fb", "DetectTime": "2024-05-21T12:41:03.108452+00:00", "EventTime": "2024-05-21T12:41:03.108476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJqUH2DXth5uY5efh"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "34eacd1c-7a1f-4b20-b46b-489dc90ad6a1", "DetectTime": "2024-05-21T12:41:03.150559+00:00", "EventTime": "2024-05-21T12:41:03.150580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CezqVq1deMSalTp85k"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c23e2c5c-5a0c-4aad-b293-0a8017512b57", "DetectTime": "2024-05-21T12:41:03.191510+00:00", "EventTime": "2024-05-21T12:41:03.191528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jsF74sKLzhqkkw7l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 116} +{"Format": "IDEA0", "ID": "4994dc1c-cda1-4681-8575-48361915dbf9", "DetectTime": "2024-05-21T12:41:03.238551+00:00", "EventTime": "2024-05-21T12:41:03.238588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW1GM1JjFcs5ReGZ"], "accumulated_threat_level": 12.000000000000002, "timewindow": 116} +{"Format": "Json", "ID": "4994dc1c-cda1-4681-8575-48361915dbf9", "DetectTime": "2024-05-21T12:41:03.238551+00:00", "EventTime": "2024-05-21T12:41:03.238588+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"]}], "Attach": [{"Content": "1970-01-05T19:33:13.485054+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 116. (real time 2024/05/21 12:41:03.420458)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 116, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "27c6622f-4c8f-48ae-9e33-aa3d366297d6", "DetectTime": "2024-05-21T12:41:03.432753+00:00", "EventTime": "2024-05-21T12:41:03.432772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCGSYc1Mk1xxJHnAW1"], "accumulated_threat_level": 0.8, "timewindow": 116} +{"Format": "IDEA0", "ID": "7b3185ce-2741-41c3-aa6a-511f82c482a1", "DetectTime": "2024-05-21T12:41:03.438033+00:00", "EventTime": "2024-05-21T12:41:03.438056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHXmw22SwpJIQ47D"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "e617c965-7cee-4d7e-9deb-a42b2c5da869", "DetectTime": "2024-05-21T12:41:03.450123+00:00", "EventTime": "2024-05-21T12:41:03.450142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1sKgv5Leyk6iCe2"], "accumulated_threat_level": 1.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "32fb677e-9858-4bbc-92d9-8fef326cd4eb", "DetectTime": "2024-05-21T12:41:03.462779+00:00", "EventTime": "2024-05-21T12:41:03.462799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCE8I3F6qDuGptF5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 116} +{"Format": "IDEA0", "ID": "b95cbb79-abc3-4c1d-bded-a94493c9e848", "DetectTime": "2024-05-21T12:41:03.473420+00:00", "EventTime": "2024-05-21T12:41:03.473439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUGFCIVGqsIwXu9c"], "accumulated_threat_level": 3.2, "timewindow": 116} +{"Format": "IDEA0", "ID": "01d524de-60a3-4bde-9573-88d9d52817eb", "DetectTime": "2024-05-21T12:41:03.479229+00:00", "EventTime": "2024-05-21T12:41:03.479250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLAD9ANlPVnmtBz6"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "bc3127c4-90d0-499b-9c75-f1456e39940a", "DetectTime": "2024-05-21T12:41:03.739379+00:00", "EventTime": "2024-05-21T12:41:03.739398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.135.199.117"]}], "Attach": [{"Content": "Connection to unknown destination port 9820/UDP destination IP 88.135.199.117. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTh3w2Me6XhxeeHG8"], "accumulated_threat_level": 4.0, "timewindow": 116} +{"Format": "IDEA0", "ID": "1c90e885-eb9e-4e61-b2b0-7953e9ff6f8a", "DetectTime": "2024-05-21T12:41:03.782866+00:00", "EventTime": "2024-05-21T12:41:03.782885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFK8PdS2XzliVvmM1"], "accumulated_threat_level": 4.8, "timewindow": 116} +{"Format": "IDEA0", "ID": "2b56a220-609d-4baa-a3c1-88433e11fcef", "DetectTime": "2024-05-21T12:41:03.827906+00:00", "EventTime": "2024-05-21T12:41:03.827926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.75.97.132"]}], "Attach": [{"Content": "Connection to unknown destination port 26707/UDP destination IP 85.75.97.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCW3Mr2knyBqwlIOKc"], "accumulated_threat_level": 5.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "614883e5-8fdc-4db1-866b-22af4fb41658", "DetectTime": "2024-05-21T12:41:03.871389+00:00", "EventTime": "2024-05-21T12:41:03.871409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2mOCb1XVX8Y1S45Og"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 116} +{"Format": "IDEA0", "ID": "1641be1c-137e-4f1d-b102-cfbf6a2bbf54", "DetectTime": "2024-05-21T12:41:04.030924+00:00", "EventTime": "2024-05-21T12:41:04.030948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"]}], "Attach": [{"Content": "Connection to unknown destination port 29927/UDP destination IP 187.233.248.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIgvx2JnleHiq20qa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "1df86b51-273a-4862-8928-9faaa1a170c5", "DetectTime": "2024-05-21T12:41:04.036075+00:00", "EventTime": "2024-05-21T12:41:04.036094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTquvx15d5lWsx9UP4"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "29fb065a-a254-4a89-b3cc-b867a32b3862", "DetectTime": "2024-05-21T12:41:04.052225+00:00", "EventTime": "2024-05-21T12:41:04.052244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZcLn4gRLvFROkNe3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "79d637a8-2f37-4f7a-8f89-aab511feb9b4", "DetectTime": "2024-05-21T12:41:04.095750+00:00", "EventTime": "2024-05-21T12:41:04.095767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjtDv31u5PsnLFZ83"], "accumulated_threat_level": 8.799999999999999, "timewindow": 116} +{"Format": "IDEA0", "ID": "bff5c39f-277e-4c93-a573-88b5dd4de71c", "DetectTime": "2024-05-21T12:41:04.175516+00:00", "EventTime": "2024-05-21T12:41:04.175535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7b4K25cw4ZVo4Bc7"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "f8af040b-0c36-4dac-88e4-f3ca222650c1", "DetectTime": "2024-05-21T12:41:04.345548+00:00", "EventTime": "2024-05-21T12:41:04.345570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIG284zg5zeE7340g"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a8dec0e5-4c92-46b4-a98c-7765c64f8de0", "DetectTime": "2024-05-21T12:41:04.601686+00:00", "EventTime": "2024-05-21T12:41:04.601704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYVsjY3oiOlnIrePx9"], "accumulated_threat_level": 1.3, "timewindow": 117} +{"Format": "IDEA0", "ID": "18e53910-4783-4183-ad06-188ac90907bc", "DetectTime": "2024-05-21T12:41:04.624558+00:00", "EventTime": "2024-05-21T12:41:04.624580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2nYLp2Dpu8lmmIuX"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "2d2bfce9-abde-4800-addd-4fdbdabf515d", "DetectTime": "2024-05-21T12:41:04.679591+00:00", "EventTime": "2024-05-21T12:41:04.679611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6rXNP2rYN7kFZMj8c"], "accumulated_threat_level": 2.1, "timewindow": 117} +{"Format": "IDEA0", "ID": "6b71813e-6ced-40e6-826e-21aa7810f456", "DetectTime": "2024-05-21T12:41:04.702617+00:00", "EventTime": "2024-05-21T12:41:04.702635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyTQw3sRfRDoj7UL6"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "11ea26f0-7a57-4d0c-81ef-e6ecfe92024c", "DetectTime": "2024-05-21T12:41:04.745849+00:00", "EventTime": "2024-05-21T12:41:04.745870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czp5rjQfDJiMWpAH9"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "607d926a-6d3c-4df1-afbb-396101977f47", "DetectTime": "2024-05-21T12:41:04.782133+00:00", "EventTime": "2024-05-21T12:41:04.782155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9cI51JGcu7WWnRRd"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "391779a9-f18e-4e83-a6f1-2f2c3bba523e", "DetectTime": "2024-05-21T12:41:04.825266+00:00", "EventTime": "2024-05-21T12:41:04.825295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpRwWTaiJ7y9GrMb"], "accumulated_threat_level": 3.7, "timewindow": 117} +{"Format": "IDEA0", "ID": "de0e0875-dc3e-4ace-80c5-0df43b14a416", "DetectTime": "2024-05-21T12:41:04.878279+00:00", "EventTime": "2024-05-21T12:41:04.878297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD47WNqd18Jh7YB51"], "accumulated_threat_level": 4.5, "timewindow": 117} +{"Format": "IDEA0", "ID": "15e6e486-f6ab-4ecc-bbd5-586f4922577d", "DetectTime": "2024-05-21T12:41:04.926540+00:00", "EventTime": "2024-05-21T12:41:04.926560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLGgl3UCvJUQWb3Uc"], "accumulated_threat_level": 5.3, "timewindow": 117} +{"Format": "IDEA0", "ID": "315a2b26-534d-4c62-b805-d6084da8f176", "DetectTime": "2024-05-21T12:41:05.194235+00:00", "EventTime": "2024-05-21T12:41:05.194265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1EagX15cVxSXtGu5e"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "5119962f-19b7-40a1-84d3-36373e8c8f97", "DetectTime": "2024-05-21T12:41:05.238419+00:00", "EventTime": "2024-05-21T12:41:05.238448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKq10PO46xWF2y9j7"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "e510c1d2-1c86-4eb6-b5ed-d6318703a394", "DetectTime": "2024-05-21T12:41:05.253544+00:00", "EventTime": "2024-05-21T12:41:05.253564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8MJd3Oz2e7HcizV9"], "accumulated_threat_level": 6.1, "timewindow": 117} +{"Format": "IDEA0", "ID": "ec86efc6-48cc-43cc-ab38-2d67ef4c032b", "DetectTime": "2024-05-21T12:41:05.258465+00:00", "EventTime": "2024-05-21T12:41:05.258483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVLLJzYe8S7DxaYk"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c899a643-1471-4b28-b6a1-6f4e33741a49", "DetectTime": "2024-05-21T12:41:05.263226+00:00", "EventTime": "2024-05-21T12:41:05.263244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdV63z2GfhdsoBmS11"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "efd3374e-4469-4357-af38-83eea0971e63", "DetectTime": "2024-05-21T12:41:05.403841+00:00", "EventTime": "2024-05-21T12:41:05.403870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFqWR1r72gJjbsTJd"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "045828b4-a1b9-455d-a24b-3ddf82b71659", "DetectTime": "2024-05-21T12:41:05.409238+00:00", "EventTime": "2024-05-21T12:41:05.409259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvrJ03RD2guYfoSu9"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "10dc369e-6720-4fcb-99b0-7615983144b1", "DetectTime": "2024-05-21T12:41:05.414639+00:00", "EventTime": "2024-05-21T12:41:05.414670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9ADRym2qXcYGvm2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d218e14a-bd4f-4119-9feb-906202a70a31", "DetectTime": "2024-05-21T12:41:05.485755+00:00", "EventTime": "2024-05-21T12:41:05.485774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB5uJa1mnDmswVerY8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "c6f9801d-b1f8-4194-819e-83321b9dba5a", "DetectTime": "2024-05-21T12:41:05.745341+00:00", "EventTime": "2024-05-21T12:41:05.745361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsT3uW2TMV6TDuKaXg"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "ff99ee47-4960-46e2-b4d0-d40bcdb952ca", "DetectTime": "2024-05-21T12:41:05.755836+00:00", "EventTime": "2024-05-21T12:41:05.755858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJW79H2pEp380I5kZj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "bfdd2b01-f120-4fb3-8ae7-9791c92687f3", "DetectTime": "2024-05-21T12:41:05.760737+00:00", "EventTime": "2024-05-21T12:41:05.760755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.112.233.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsMrw2XR5RaFdGSbh"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "650a51d5-0e4c-4bea-8ca6-ebabd3dee06c", "DetectTime": "2024-05-21T12:41:05.793756+00:00", "EventTime": "2024-05-21T12:41:05.793777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjKV31BJ8PqVQy55h"], "accumulated_threat_level": 7.699999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "e384d3ba-c986-4abe-b18c-3b8bce0ceb20", "DetectTime": "2024-05-21T12:41:05.895685+00:00", "EventTime": "2024-05-21T12:41:05.895708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.208.73.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnH6O3zJzr6K40fK9"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "df9a37c2-a373-4c6f-882b-1a6beedcec68", "DetectTime": "2024-05-21T12:41:05.935891+00:00", "EventTime": "2024-05-21T12:41:05.935915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJRsB1j16QtrvjJ9d"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "4f0165b5-bf98-40ad-94ad-cef408234e69", "DetectTime": "2024-05-21T12:41:05.977395+00:00", "EventTime": "2024-05-21T12:41:05.977420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.28.73.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxcD017Fcx2pJlmjg"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "0636fb8d-ad20-44fa-83ab-0588f4659fc4", "DetectTime": "2024-05-21T12:41:06.018345+00:00", "EventTime": "2024-05-21T12:41:06.018366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9To7r4TjSSbmaq5Mc"], "accumulated_threat_level": 8.5, "timewindow": 117} +{"Format": "IDEA0", "ID": "8f6f133a-9b71-4509-abb8-de2b3e1e407b", "DetectTime": "2024-05-21T12:41:06.042919+00:00", "EventTime": "2024-05-21T12:41:06.042939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJtqr5a791QV6ry8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "0573cbf0-c4fd-4ed0-8700-34c7a7002973", "DetectTime": "2024-05-21T12:41:06.292911+00:00", "EventTime": "2024-05-21T12:41:06.292934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.222.48.200 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVkJcZW9MvLdUPJod"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "21b2950d-afd6-413c-93a3-c346ad6f9617", "DetectTime": "2024-05-21T12:41:06.335469+00:00", "EventTime": "2024-05-21T12:41:06.335491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl1q0a1rnnLjoXy6d9"], "accumulated_threat_level": 9.3, "timewindow": 117} +{"Format": "IDEA0", "ID": "a41a9c03-536e-4f85-8f71-937389f97cda", "DetectTime": "2024-05-21T12:41:06.364699+00:00", "EventTime": "2024-05-21T12:41:06.364719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOYU11WLCU3mobqPj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "28d110d3-cbbc-4ae7-9344-8e25399f99f5", "DetectTime": "2024-05-21T12:41:06.405799+00:00", "EventTime": "2024-05-21T12:41:06.405818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CToMNv3d8J6NXWUM8j"], "accumulated_threat_level": 10.100000000000001, "timewindow": 117} +{"Format": "IDEA0", "ID": "36b23305-0d7f-48b0-980b-eac5222be7aa", "DetectTime": "2024-05-21T12:41:06.439753+00:00", "EventTime": "2024-05-21T12:41:06.439774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.111.237.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCaQK38PgMtjA9zFg"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "784825f5-e2d3-4a23-861f-92c3eaeeddec", "DetectTime": "2024-05-21T12:41:06.487526+00:00", "EventTime": "2024-05-21T12:41:06.487543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9qr51gIsq6WTO6xl"], "accumulated_threat_level": 10.900000000000002, "timewindow": 117} +{"Format": "IDEA0", "ID": "584a7b33-ba9b-4fda-9fde-997d3918835a", "DetectTime": "2024-05-21T12:41:06.491988+00:00", "EventTime": "2024-05-21T12:41:06.492005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM3yvO3S7AH5Ug08aa"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "897f6bf1-66e7-4a5b-99f7-bf59614b47ee", "DetectTime": "2024-05-21T12:41:06.564012+00:00", "EventTime": "2024-05-21T12:41:06.564034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMeKJfEWpL7gZVpld"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "4bcacf7b-e103-44fd-acc0-d6fb308071d4", "DetectTime": "2024-05-21T12:41:06.759075+00:00", "EventTime": "2024-05-21T12:41:06.759099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Vpm9XY3xp8bv8ek", "C9zTmmXilLObURZkl", "C9RyDdbVFUTyO8lZk", "C98s7cZDgw5XgVQ01"], "accumulated_threat_level": 11.400000000000002, "timewindow": 117} +{"Format": "IDEA0", "ID": "d5a7918b-e861-4077-a2ec-9d0c96bee37e", "DetectTime": "2024-05-21T12:41:06.818317+00:00", "EventTime": "2024-05-21T12:41:06.818336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1tjxz3omhy4zUf6k2"], "accumulated_threat_level": 12.200000000000003, "timewindow": 117} +{"Format": "Json", "ID": "d5a7918b-e861-4077-a2ec-9d0c96bee37e", "DetectTime": "2024-05-21T12:41:06.818317+00:00", "EventTime": "2024-05-21T12:41:06.818336+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-05T20:04:25.409921+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2024/05/21 12:41:07.063922)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 117, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "6e1b651f-feec-4de5-a99b-3640f7277f9e", "DetectTime": "2024-05-21T12:41:07.068005+00:00", "EventTime": "2024-05-21T12:41:07.068024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmqSei4ZTRG5wlfAq3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "b2a0b786-73ca-4494-afd5-2ef11b0c3d64", "DetectTime": "2024-05-21T12:41:07.072699+00:00", "EventTime": "2024-05-21T12:41:07.072717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFUkY2DdHrSbcZBnd"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a71d084a-ba3b-467f-afb3-6bff17b92f69", "DetectTime": "2024-05-21T12:41:07.084700+00:00", "EventTime": "2024-05-21T12:41:07.084719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvpXpYN19NoxuDkOl"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "e7834eb8-33a8-4f3a-9b85-7d00d0caccc5", "DetectTime": "2024-05-21T12:41:07.089765+00:00", "EventTime": "2024-05-21T12:41:07.089783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMeKECc6dpmJsWb7"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "92ab5d5a-2f1e-404c-8fe8-3fa232c0b88e", "DetectTime": "2024-05-21T12:41:07.094489+00:00", "EventTime": "2024-05-21T12:41:07.094507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUTHSFsylvdu8uYp8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "1f003987-495b-4cf7-89f3-24ce2dcd5e07", "DetectTime": "2024-05-21T12:41:07.105105+00:00", "EventTime": "2024-05-21T12:41:07.105123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxDju3Y29fBJ7F4u2"], "accumulated_threat_level": 1.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "17fc841a-1146-4ec6-b003-471cac85395e", "DetectTime": "2024-05-21T12:41:07.109694+00:00", "EventTime": "2024-05-21T12:41:07.109712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.138.163.107 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4y4MK1iM63ux6xeXj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "de4a4fd4-8760-459f-a7d1-6c742454153f", "DetectTime": "2024-05-21T12:41:07.343161+00:00", "EventTime": "2024-05-21T12:41:07.343183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqp7aa2aPFtLs7THra"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "7f008dec-718f-4f35-86a4-165f5cfe7080", "DetectTime": "2024-05-21T12:41:07.352595+00:00", "EventTime": "2024-05-21T12:41:07.352616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuS3JC4GRKXCxuCYn3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "693a43bc-88c8-4089-acb5-963fdd24680a", "DetectTime": "2024-05-21T12:41:07.381775+00:00", "EventTime": "2024-05-21T12:41:07.381798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQt1s1yMbEIz3yG8l"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "8e9ff37b-eca6-48ba-986e-7155eac4bf44", "DetectTime": "2024-05-21T12:41:07.455614+00:00", "EventTime": "2024-05-21T12:41:07.455633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKElZp4eXD38mwywBc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "226c2665-5313-45c3-a596-3964e15b2fd0", "DetectTime": "2024-05-21T12:41:07.479901+00:00", "EventTime": "2024-05-21T12:41:07.479922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBoir4cXJQAo1f6s3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "595a33e1-09d4-40d3-80c6-8c446c18cf59", "DetectTime": "2024-05-21T12:41:07.547888+00:00", "EventTime": "2024-05-21T12:41:07.547908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COrwQmcCDjXGsuR39"], "accumulated_threat_level": 3.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "efaa97dc-d1c8-4a47-8bb9-c946170cbd16", "DetectTime": "2024-05-21T12:41:07.586188+00:00", "EventTime": "2024-05-21T12:41:07.586210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX0ZB1PN3fqMlZaf3"], "accumulated_threat_level": 4.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "7b11457a-c398-4421-a07c-8a5a9241b256", "DetectTime": "2024-05-21T12:41:07.619100+00:00", "EventTime": "2024-05-21T12:41:07.619121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIuj402Uz5tIz4Grd"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "536ed6c3-2f11-437e-bf5d-28953a321f2d", "DetectTime": "2024-05-21T12:41:07.665550+00:00", "EventTime": "2024-05-21T12:41:07.665571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["117.198.166.22"]}], "Attach": [{"Content": "Connection to unknown destination port 12372/UDP destination IP 117.198.166.22. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbBwL2jj0pWC2aNje"], "accumulated_threat_level": 4.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "6a6733c9-d69c-4b40-b703-ee7f0277ccf3", "DetectTime": "2024-05-21T12:41:07.707669+00:00", "EventTime": "2024-05-21T12:41:07.707691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VpZd3caDjnk4UdIi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "1940c9eb-2b37-482f-b635-9928c9bfc685", "DetectTime": "2024-05-21T12:41:07.750609+00:00", "EventTime": "2024-05-21T12:41:07.750636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.237.226.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CovRTlGlxrSrwCB57"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "2eb6c910-3fd9-4fa4-b63a-872acc020ba3", "DetectTime": "2024-05-21T12:41:07.755909+00:00", "EventTime": "2024-05-21T12:41:07.755929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3D13WGNWi2Zch6pf"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "b9544c03-2e08-4048-b884-a6a94daf655b", "DetectTime": "2024-05-21T12:41:08.061889+00:00", "EventTime": "2024-05-21T12:41:08.061909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF529BZNwbM1JiHh1"], "accumulated_threat_level": 5.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "09c2b2c7-0c1e-464f-896a-f30226c9f6cc", "DetectTime": "2024-05-21T12:41:08.067757+00:00", "EventTime": "2024-05-21T12:41:08.067776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.143.9.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqLTE34g33GDKfGdE2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "3f72e8fa-6e42-43a8-a141-455ed3ca65dc", "DetectTime": "2024-05-21T12:41:08.255046+00:00", "EventTime": "2024-05-21T12:41:08.255065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJWdMnI3qXyWfvIRf"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "f7bee4d4-bdc6-4cec-8271-4a7d245400c7", "DetectTime": "2024-05-21T12:41:08.267316+00:00", "EventTime": "2024-05-21T12:41:08.267338+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJWdMnI3qXyWfvIRf"], "accumulated_threat_level": 3.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "9e380511-ba3a-469d-91a9-d281cf17a2eb", "DetectTime": "2024-05-21T12:41:08.286095+00:00", "EventTime": "2024-05-21T12:41:08.286115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.234.251.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhSyj1EtwfvS3j9Bi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "f84a9850-8614-4cc4-91a0-d2b77578a5a1", "DetectTime": "2024-05-21T12:41:08.292002+00:00", "EventTime": "2024-05-21T12:41:08.292021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.14.171.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6V8CEnCAGDS8jWr"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "7c558d70-8d3d-452b-b377-81de9976721c", "DetectTime": "2024-05-21T12:41:08.297205+00:00", "EventTime": "2024-05-21T12:41:08.297225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.176.250.91 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nBxE2P3oPQKzXTk1"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d5d3b86d-00b0-47f1-bd2d-773aaae5f560", "DetectTime": "2024-05-21T12:41:08.301940+00:00", "EventTime": "2024-05-21T12:41:08.301958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 158.82.202.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYeGVrZCDusTG6t5"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "51b6e530-6a83-411e-ad4b-619db98f77ca", "DetectTime": "2024-05-21T12:41:08.307046+00:00", "EventTime": "2024-05-21T12:41:08.307064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.223.109.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCWCr5PWBQRj4Xf"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "f3f3f640-1055-461f-88f5-cf377052fe34", "DetectTime": "2024-05-21T12:41:08.311719+00:00", "EventTime": "2024-05-21T12:41:08.311737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.157.126.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCx8ygEneXEcYwp64"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a0f4ec10-674b-4688-b6c9-647300d18990", "DetectTime": "2024-05-21T12:41:08.317004+00:00", "EventTime": "2024-05-21T12:41:08.317023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.20.182.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcRX21vEKDZjeUKh6"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d8d6f264-30f6-4a20-9b8f-c69c45c4f03b", "DetectTime": "2024-05-21T12:41:08.322574+00:00", "EventTime": "2024-05-21T12:41:08.322592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.76.5.252 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyoyE3k797PuO1Rki"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c00f2fae-75d4-4f41-a5a9-7f8f0b75bea2", "DetectTime": "2024-05-21T12:41:08.327353+00:00", "EventTime": "2024-05-21T12:41:08.327371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.166.193.152 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRcP6D1hQo3FggZTeh"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "e0e4edb6-227f-4059-b9a1-9359f8997818", "DetectTime": "2024-05-21T12:41:08.332419+00:00", "EventTime": "2024-05-21T12:41:08.332440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.138.249.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMH9G4RdD1d3e5qje"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "dc9793e7-e5c3-4410-a37d-f6fecb187545", "DetectTime": "2024-05-21T12:41:08.338610+00:00", "EventTime": "2024-05-21T12:41:08.338630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.130.73.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBNKiKFZVSkOmeBl"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "1009b903-7557-4290-a6d4-6bf1379f5e84", "DetectTime": "2024-05-21T12:41:08.343265+00:00", "EventTime": "2024-05-21T12:41:08.343284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.228.154.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI29zx3IX3wTdWNMP4"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c23046f3-25c6-429c-a281-3bef7344dadd", "DetectTime": "2024-05-21T12:41:08.399841+00:00", "EventTime": "2024-05-21T12:41:08.399865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbtE7g2wm3dbx0U3Ze"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d4127331-32eb-43df-aca9-c8a0d4f2c932", "DetectTime": "2024-05-21T12:41:08.435641+00:00", "EventTime": "2024-05-21T12:41:08.435664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.132.120.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPYvcc3boN503LPxRf"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "60689bba-26a7-4815-b6a2-08e253b87c7a", "DetectTime": "2024-05-21T12:41:08.465987+00:00", "EventTime": "2024-05-21T12:41:08.466011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 207.47.88.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clq94z320I1Rq80T1f"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c39c7848-4a8c-402a-b06d-295d8e18bf96", "DetectTime": "2024-05-21T12:41:08.713397+00:00", "EventTime": "2024-05-21T12:41:08.713422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.175.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS5WW01ZXObXZiXw59"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d05e9d9e-537b-4860-802f-9872c92d45b1", "DetectTime": "2024-05-21T12:41:08.832227+00:00", "EventTime": "2024-05-21T12:41:08.832248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.157.234.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzEIne2YQYqrWBUIZ4"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "458f6752-30dd-4f40-9d18-15b3d0bcb17c", "DetectTime": "2024-05-21T12:41:09.427886+00:00", "EventTime": "2024-05-21T12:41:09.427907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9khac4VMTIBCroe7a"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "eae431fc-b0cc-4270-91d2-d1afac367dd8", "DetectTime": "2024-05-21T12:41:09.463122+00:00", "EventTime": "2024-05-21T12:41:09.463145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.74.153.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfybzd1mvPREyWIKTj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "3996717d-5b9c-463f-a9ee-65ebe6dde474", "DetectTime": "2024-05-21T12:41:09.474659+00:00", "EventTime": "2024-05-21T12:41:09.474677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRpRD3OhnGpaTLIE4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "1264105f-52ca-436e-87f2-824118ae36d1", "DetectTime": "2024-05-21T12:41:09.481637+00:00", "EventTime": "2024-05-21T12:41:09.481656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVojpp3UF7Cohit1Kd"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "db47616a-22d9-4227-9a84-21c8341d478e", "DetectTime": "2024-05-21T12:41:09.508237+00:00", "EventTime": "2024-05-21T12:41:09.508260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.166.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmNzu4XVRoosQPod2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "21969b64-5eba-417a-ae53-579bc5428eda", "DetectTime": "2024-05-21T12:41:09.568240+00:00", "EventTime": "2024-05-21T12:41:09.568263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.245.43.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVlrBu2VHd5zQzpst"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c654370a-a1d6-4482-9475-c86e4dc9f145", "DetectTime": "2024-05-21T12:41:09.698304+00:00", "EventTime": "2024-05-21T12:41:09.698330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZoys3JetdZdwTki8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "824a3ce3-5933-464b-a72d-06959ea97a52", "DetectTime": "2024-05-21T12:41:09.704401+00:00", "EventTime": "2024-05-21T12:41:09.704421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.5.194.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb5Vix2GCxPgJxndJa"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a6274eb1-3bc4-4a40-a78c-a98882509a2f", "DetectTime": "2024-05-21T12:41:09.709254+00:00", "EventTime": "2024-05-21T12:41:09.709273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.109.41.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOyc135JZKxCkbefc"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "fb75ec0b-04ed-4d1c-a035-85f3c6e8e940", "DetectTime": "2024-05-21T12:41:09.713877+00:00", "EventTime": "2024-05-21T12:41:09.713896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMod1R2M30FlY1hXCi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "9debe3d6-03a5-47c7-bd55-0fde2fddd1d4", "DetectTime": "2024-05-21T12:41:09.960083+00:00", "EventTime": "2024-05-21T12:41:09.960105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.147.74.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbhkg4ZLAZlqmz9rg"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "2cd9d9b9-691a-4281-89e7-4833a645dda7", "DetectTime": "2024-05-21T12:41:09.964908+00:00", "EventTime": "2024-05-21T12:41:09.964926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmwQ42xv0qEpTtm0k"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "da2a0e4a-7462-4147-b351-225eddb2c2e1", "DetectTime": "2024-05-21T12:41:10.030101+00:00", "EventTime": "2024-05-21T12:41:10.030123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.196.162.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9kA5T3h5982Jhfrpj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "8bbc67d2-f2eb-4155-a115-feefeae50ae4", "DetectTime": "2024-05-21T12:41:10.043839+00:00", "EventTime": "2024-05-21T12:41:10.043863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.141.12 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb33k84uNoh8t8VJ01"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "fdce64a3-26d7-4f20-a98c-b80249c14f09", "DetectTime": "2024-05-21T12:41:10.049240+00:00", "EventTime": "2024-05-21T12:41:10.049265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.201.91.219 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COY0wf2C0TegNI4OS7"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "6af77b2d-bc1b-4fac-a03e-31a3e3261cc7", "DetectTime": "2024-05-21T12:41:10.091764+00:00", "EventTime": "2024-05-21T12:41:10.091785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.7.114.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzXbrD2NJooBlYp6n1"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "997d5db1-e7d3-431c-b1a5-0aec7795ac77", "DetectTime": "2024-05-21T12:41:10.115751+00:00", "EventTime": "2024-05-21T12:41:10.115771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.20.232.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZhrFfesuoqUS1e"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "80c905b0-ae27-46bd-8fd9-f6d01c2308d2", "DetectTime": "2024-05-21T12:41:10.121046+00:00", "EventTime": "2024-05-21T12:41:10.121065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.45.240.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwLeT2WbOS0m6NzEd"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "088bc4e7-2fd8-46b4-ae98-d46e933bf202", "DetectTime": "2024-05-21T12:41:10.152694+00:00", "EventTime": "2024-05-21T12:41:10.152716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBzimuHS0NDncvc6"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "4446281c-475e-4ab1-8240-2ba0f0c81a08", "DetectTime": "2024-05-21T12:41:10.158002+00:00", "EventTime": "2024-05-21T12:41:10.158022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CokeW83vRib4iIusQi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "816ce814-2b85-48a9-967e-59f8fb9a7d4e", "DetectTime": "2024-05-21T12:41:10.162621+00:00", "EventTime": "2024-05-21T12:41:10.162639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.129.53.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4pwYo4gHeoT5FGbh5"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "e7bcef2b-6b68-4eb1-a4cc-f951cc149a01", "DetectTime": "2024-05-21T12:41:10.167287+00:00", "EventTime": "2024-05-21T12:41:10.167305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.45.221.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJNaa2rEh39dBJ7G2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "efdbee32-05c0-4028-9a04-43a9f1c934ab", "DetectTime": "2024-05-21T12:41:10.172321+00:00", "EventTime": "2024-05-21T12:41:10.172342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jlZf41kS8cOZtNj2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "17c0a1ec-a0fb-49e3-8e29-3847e23186d3", "DetectTime": "2024-05-21T12:41:10.678060+00:00", "EventTime": "2024-05-21T12:41:10.678081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.105.49.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5g57P1X8kp8s7gp1j"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "19050ccf-d3a5-4ac5-bb61-1b3af6c58b45", "DetectTime": "2024-05-21T12:41:10.977358+00:00", "EventTime": "2024-05-21T12:41:10.977393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.24.108.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXKSx3u5tdMVLvFFb"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "37c3c56f-850f-495a-99fd-5070f02f33b0", "DetectTime": "2024-05-21T12:41:11.172390+00:00", "EventTime": "2024-05-21T12:41:11.172411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09xAN22r2eOrKqhv9", "C79Lbu3Yl75snEswK5", "C6EYA84ptxMr4veZga", "CwotmQ12nJXN38Lkn8"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "f79ab284-6294-4a3d-86e1-0724de2fe3fb", "DetectTime": "2024-05-21T12:41:11.194381+00:00", "EventTime": "2024-05-21T12:41:11.194434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtLGml4KDyHGA8N6lb"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "ef09a3d4-90ac-4b5a-84ec-7318d7c301f3", "DetectTime": "2024-05-21T12:41:11.201230+00:00", "EventTime": "2024-05-21T12:41:11.201249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.146.14.21 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLd3ut1sWsONVrRNC3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "12ec31ec-da45-4663-a966-573a7ffbc3bd", "DetectTime": "2024-05-21T12:41:11.207259+00:00", "EventTime": "2024-05-21T12:41:11.207280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJuI6rakxq3inff3h"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "f1adea7b-3857-420a-a8ab-0474c9958403", "DetectTime": "2024-05-21T12:41:11.267012+00:00", "EventTime": "2024-05-21T12:41:11.267031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 23.24.76.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lNOo1icG9XKsuPGl"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "bb235680-dee0-4710-a24b-66f64b35327c", "DetectTime": "2024-05-21T12:41:11.281880+00:00", "EventTime": "2024-05-21T12:41:11.281902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.51.31 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM5GkAOIFU97l75fi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "6e1af93e-45ca-4f9b-825d-37c770d37d08", "DetectTime": "2024-05-21T12:41:11.300410+00:00", "EventTime": "2024-05-21T12:41:11.300432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.174.119.158 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzsUM2cHCDJDasL5i"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c92636f9-b1ae-40f2-8aa1-e816b7c17ac2", "DetectTime": "2024-05-21T12:41:11.314887+00:00", "EventTime": "2024-05-21T12:41:11.314908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIbRPPDzhO6dKSPQe"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "862accb2-6105-4c9a-b076-558d09025336", "DetectTime": "2024-05-21T12:41:11.356815+00:00", "EventTime": "2024-05-21T12:41:11.356837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.70.246.210 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVK5oL1AIulPlsIhRb"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "9036748a-bacb-439e-964e-28ff9e26723f", "DetectTime": "2024-05-21T12:41:11.363610+00:00", "EventTime": "2024-05-21T12:41:11.363628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.235.22.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDjOE3C8TtjG35Fx1"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "4250b9af-4ba2-4e49-81f7-5e2e5bf168db", "DetectTime": "2024-05-21T12:41:11.635884+00:00", "EventTime": "2024-05-21T12:41:11.635906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.34.76.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChxS7f3OYwON0Azqf8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "2a7c4854-3344-4f13-8f7c-548dc7046423", "DetectTime": "2024-05-21T12:41:11.641287+00:00", "EventTime": "2024-05-21T12:41:11.641309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.37.17.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxqaFC2uxLIqNSkzv6"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "27794bc7-824f-4d4e-bac6-b589b7ab2da8", "DetectTime": "2024-05-21T12:41:11.657967+00:00", "EventTime": "2024-05-21T12:41:11.657990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 207.170.238.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COi2OP26Pw1i2iWH47"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "e4763da5-793c-437e-826f-361702929ddc", "DetectTime": "2024-05-21T12:41:11.664157+00:00", "EventTime": "2024-05-21T12:41:11.664175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.97.28.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAQTF4nWXWjCWfudi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "eccce1c4-a024-40bf-b8bc-822bb3e23727", "DetectTime": "2024-05-21T12:41:11.670169+00:00", "EventTime": "2024-05-21T12:41:11.670187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.54.223.139 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXuSo2ixcFRJW3zGl"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "452da342-3933-4610-bb56-7321e498a0df", "DetectTime": "2024-05-21T12:41:11.678297+00:00", "EventTime": "2024-05-21T12:41:11.678318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDT3Ta3dOPGMlS1Ndf"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "0c17f56e-08be-468a-9ce2-f23aa34884c2", "DetectTime": "2024-05-21T12:41:11.710242+00:00", "EventTime": "2024-05-21T12:41:11.710265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 98.193.148.144 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG468o3UUPjrLpyq7i"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "465bc9f5-6f25-4c9a-ac66-0f9dfd2c5bce", "DetectTime": "2024-05-21T12:41:11.729734+00:00", "EventTime": "2024-05-21T12:41:11.729757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Hz0C2FJpt3O1j0Fa"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "36a7cac9-8212-448e-90f9-66ba6ecf84aa", "DetectTime": "2024-05-21T12:41:11.799536+00:00", "EventTime": "2024-05-21T12:41:11.799556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 220.245.237.118 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmlk9T1zaDUY14DoAi"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "5770296c-867a-4683-901f-712e37b6b142", "DetectTime": "2024-05-21T12:41:11.852069+00:00", "EventTime": "2024-05-21T12:41:11.852091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.78.165.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqRzlJCFFBNU2qc5"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "986e7345-72d5-448b-9e75-b38bc6d94718", "DetectTime": "2024-05-21T12:41:11.857394+00:00", "EventTime": "2024-05-21T12:41:11.857413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.208.48.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYnGt2pz3e3xFZI8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "06062b68-0a91-48d6-b0fc-3176d27bbacf", "DetectTime": "2024-05-21T12:41:11.862090+00:00", "EventTime": "2024-05-21T12:41:11.862108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.50.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhxiH2icvyPwzKEm7"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c2c447d0-fa83-4c17-ac2d-421b71d4e5d2", "DetectTime": "2024-05-21T12:41:11.879068+00:00", "EventTime": "2024-05-21T12:41:11.879089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.67.14.221 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXn3i2vgCoor1JNCh"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "e4fbcbd6-e039-4418-9cb3-29173d32db92", "DetectTime": "2024-05-21T12:41:11.968652+00:00", "EventTime": "2024-05-21T12:41:11.968674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.203.192.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAtqt2zIoRkKdVIxk"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "3c003a2b-6d92-429a-9b55-3878b5db32fd", "DetectTime": "2024-05-21T12:41:12.399562+00:00", "EventTime": "2024-05-21T12:41:12.399588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYe5AV2vfVgEwq32h2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a1745c37-949b-447c-a171-f1a18a00e665", "DetectTime": "2024-05-21T12:41:12.683136+00:00", "EventTime": "2024-05-21T12:41:12.683158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.80.99.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP6g9bSBbwCEs6Mcc"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "ab6fdd60-82da-4859-841f-3da1b7d0d826", "DetectTime": "2024-05-21T12:41:12.693975+00:00", "EventTime": "2024-05-21T12:41:12.693996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.115.172.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrXz3UerOjP5I2w"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "27446b99-edf4-4ce6-9fa7-febe8b7f61c0", "DetectTime": "2024-05-21T12:41:12.833638+00:00", "EventTime": "2024-05-21T12:41:12.833658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.150.59 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJS1mEa5fl3YMJqj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "76b8440c-d7ee-4338-9a19-0ea638dcb2d0", "DetectTime": "2024-05-21T12:41:12.865336+00:00", "EventTime": "2024-05-21T12:41:12.865357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPRrg36faORFlDs54"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "24728561-9929-4f56-b937-74914bf15787", "DetectTime": "2024-05-21T12:41:12.908172+00:00", "EventTime": "2024-05-21T12:41:12.908193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.95.62.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2PyP56cUoMp2Zu1"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "68119018-2e48-4d12-ba2d-58f2a1d6c823", "DetectTime": "2024-05-21T12:41:12.913611+00:00", "EventTime": "2024-05-21T12:41:12.913635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.29.147.203 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFwju0401UlTJmSowc"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "1f43584e-4541-4ded-a143-a17aa853452e", "DetectTime": "2024-05-21T12:41:12.944957+00:00", "EventTime": "2024-05-21T12:41:12.944979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.68.41.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZC931fMfXZ6Pjs4"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "7d6f5efc-7633-4260-9c7b-ed3f15730416", "DetectTime": "2024-05-21T12:41:13.079896+00:00", "EventTime": "2024-05-21T12:41:13.079919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.103.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwwMu3I7xCR6rZvAg"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "599c73c4-5006-4dc6-a175-6948e95c88f9", "DetectTime": "2024-05-21T12:41:13.319778+00:00", "EventTime": "2024-05-21T12:41:13.319798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.64.9.66 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK23aN2P1YgB1yzrv2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a65d5bf8-dd2c-4ce6-b770-0f9ab1a530fb", "DetectTime": "2024-05-21T12:41:13.416018+00:00", "EventTime": "2024-05-21T12:41:13.416039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.136.130.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFwNCf33yfeZHEDope"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "46d30d0d-4b47-4fb8-a018-1a5ed5ac9bbf", "DetectTime": "2024-05-21T12:41:13.503175+00:00", "EventTime": "2024-05-21T12:41:13.503195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgRREyG8wdJ6BlL95", "CGtq9Y3UZa7ZO4YiD8", "ClXDLx4er9yt65PcK7", "CP0NsJ3W6zRyptfV09"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "d808dc0d-591a-4e51-9f0e-86cd6dc4e59d", "DetectTime": "2024-05-21T12:41:13.508048+00:00", "EventTime": "2024-05-21T12:41:13.508066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.43.26.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtGARgpsosBhVpOre"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a047c5a0-c308-48d3-8efe-6573021e23c5", "DetectTime": "2024-05-21T12:41:13.512579+00:00", "EventTime": "2024-05-21T12:41:13.512597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.151.227.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYj20Z1GPR6cQOkYpb"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "4fca68c2-f6b6-4a2b-84d1-c274ac0adbac", "DetectTime": "2024-05-21T12:41:13.611560+00:00", "EventTime": "2024-05-21T12:41:13.611585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.130.241 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJe5RLpYuJlFv478d"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "14205796-4836-4af5-9a4d-432cafe433da", "DetectTime": "2024-05-21T12:41:13.618356+00:00", "EventTime": "2024-05-21T12:41:13.618379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.200.62.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4Y0g3nxLqNI8NcKl"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c56b8416-7ca4-4c6c-ba09-1aed55b00efa", "DetectTime": "2024-05-21T12:41:13.627959+00:00", "EventTime": "2024-05-21T12:41:13.627982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.135.199.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRppSk2bdgoPPpoPi3"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "d2da0daf-8eb2-4183-bd98-3d6b8e237a48", "DetectTime": "2024-05-21T12:41:13.670225+00:00", "EventTime": "2024-05-21T12:41:13.670246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.29.210.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJLkF2KRPMCbxHKQ"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "299438c4-fa37-44d8-b9df-d552d50c362b", "DetectTime": "2024-05-21T12:41:13.675806+00:00", "EventTime": "2024-05-21T12:41:13.675826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clkx9J3o3PFzbn4Yu2"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "c438de3e-733b-4692-aa60-9cec3106aba2", "DetectTime": "2024-05-21T12:41:13.881292+00:00", "EventTime": "2024-05-21T12:41:13.881314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.66.184.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVs8Rr4rjOCnKqlHe4"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "f0e046ec-fad3-4ae8-9a08-e49324c81448", "DetectTime": "2024-05-21T12:41:13.886463+00:00", "EventTime": "2024-05-21T12:41:13.886484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.185.46.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFiJB4KBxwbJR681k"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "fe7f4b1b-9405-44de-a068-6c69cdcefad4", "DetectTime": "2024-05-21T12:41:13.996288+00:00", "EventTime": "2024-05-21T12:41:13.996310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkUBDE4ciDdpkri2X5"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "8d185348-20a6-4bfc-8a6a-494f03e3964f", "DetectTime": "2024-05-21T12:41:14.049432+00:00", "EventTime": "2024-05-21T12:41:14.049453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.142.172.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKRmq4ngGsGSrtL7"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "bdb6bf2f-52e2-497b-b7c7-942408f09d12", "DetectTime": "2024-05-21T12:41:14.054653+00:00", "EventTime": "2024-05-21T12:41:14.054674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ohhL2RkeSQmSI2D3"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "490b4faa-805e-49a6-a577-5c9285436923", "DetectTime": "2024-05-21T12:41:14.171922+00:00", "EventTime": "2024-05-21T12:41:14.171943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.43.242.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXjQyj1DbyneXzs0qd"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "5f148563-b8c7-46f9-85a9-d9d2b3b60814", "DetectTime": "2024-05-21T12:41:14.199258+00:00", "EventTime": "2024-05-21T12:41:14.199280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRCS04o3aE27mIcnb"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "b397edcb-12e8-4eae-9d29-9c87848c2ad4", "DetectTime": "2024-05-21T12:41:14.401325+00:00", "EventTime": "2024-05-21T12:41:14.401348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5hgt36x5tzEkVdth"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "b3b61a8e-440e-4c50-8dc9-af1939c79895", "DetectTime": "2024-05-21T12:41:14.500838+00:00", "EventTime": "2024-05-21T12:41:14.500859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.200.204.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMYbm2qN86d1Va9M6"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "f686dece-4ae8-4d78-852d-709907416d2f", "DetectTime": "2024-05-21T12:41:14.506656+00:00", "EventTime": "2024-05-21T12:41:14.506681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 64.168.172.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4sEs1WSBbxV0EOc7"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "af89e5d4-254f-412a-b702-87895b46ec2a", "DetectTime": "2024-05-21T12:41:14.511528+00:00", "EventTime": "2024-05-21T12:41:14.511549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.166.170.48 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjijZ26pCQBRkQOX"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "49030493-2fa0-4b59-8f32-cf2c3d4e30ba", "DetectTime": "2024-05-21T12:41:14.570918+00:00", "EventTime": "2024-05-21T12:41:14.570939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.122.80.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTekG12kYzVS6ssua"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "73b20dea-6742-443f-ab0b-9319b51ef9b9", "DetectTime": "2024-05-21T12:41:14.623040+00:00", "EventTime": "2024-05-21T12:41:14.623061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.248.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqHjZ347zrAcgDhDI7"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "1e8df6d3-6a5a-4b01-b38c-bb6145d4fc90", "DetectTime": "2024-05-21T12:41:14.630389+00:00", "EventTime": "2024-05-21T12:41:14.630433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.167.175.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrvRC23NDEstuZinfh"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "23f5e59b-42c0-47e2-a3f1-4376cd1c3444", "DetectTime": "2024-05-21T12:41:14.638164+00:00", "EventTime": "2024-05-21T12:41:14.638183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.7.100.23 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hxHg2dxqxDheM1pk"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "8813981a-2dd3-4e20-a5e0-c5cc02509e83", "DetectTime": "2024-05-21T12:41:14.642820+00:00", "EventTime": "2024-05-21T12:41:14.642839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.3.80.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtsEU42eKFZOX97De8"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "a9ae60a0-373b-4363-9a52-678a5b3fbb12", "DetectTime": "2024-05-21T12:41:14.654471+00:00", "EventTime": "2024-05-21T12:41:14.654490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.5.179.11 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDG2fd2iS5y43ahIT5"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "e6021ee9-93ea-406c-aec4-942b105a43f5", "DetectTime": "2024-05-21T12:41:14.660844+00:00", "EventTime": "2024-05-21T12:41:14.660864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 62.212.62.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2JVK1Bk9moXUVG54"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "3dda5a01-d779-43bd-a725-cf5fb38c90a7", "DetectTime": "2024-05-21T12:41:14.665637+00:00", "EventTime": "2024-05-21T12:41:14.665656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.97.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxk8GgVQiiVgKX5"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "5ae8b041-4346-412f-aece-3eb2f620967a", "DetectTime": "2024-05-21T12:41:14.716322+00:00", "EventTime": "2024-05-21T12:41:14.716345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.91.81.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8uhlJ1RcT6XQG5eWc"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "4ec78adf-e850-46be-a5e2-5c0c48193129", "DetectTime": "2024-05-21T12:41:14.942071+00:00", "EventTime": "2024-05-21T12:41:14.942093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.105.247.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnZqzgQETDAI5nDl"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "c768bf37-0226-48ba-894a-b359b874b3d5", "DetectTime": "2024-05-21T12:41:14.947419+00:00", "EventTime": "2024-05-21T12:41:14.947438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.44.21.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFA7Yi4XNSpNoldbVk"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "12631760-8c18-4a75-960d-bb556980d1ac", "DetectTime": "2024-05-21T12:41:15.069876+00:00", "EventTime": "2024-05-21T12:41:15.069897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.92.77.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKq6V25UB1gIYSyt"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "430f55f7-b469-43aa-baa0-dd5174d92bdf", "DetectTime": "2024-05-21T12:41:15.104928+00:00", "EventTime": "2024-05-21T12:41:15.104948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 96.31.232.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHj46ljGaEyrhljY6"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "b289cc72-38f2-403a-9684-fa928b99cdf2", "DetectTime": "2024-05-21T12:41:15.110042+00:00", "EventTime": "2024-05-21T12:41:15.110066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwNUJt4l0NJLMphPxj"], "accumulated_threat_level": 0, "timewindow": 115} +{"Format": "IDEA0", "ID": "45d4cd2d-4470-4af8-8cd8-d607a178bc4f", "DetectTime": "2024-05-21T12:41:15.115716+00:00", "EventTime": "2024-05-21T12:41:15.115737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.153.227.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIy953ecgJTMuIBwe"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "0b7f1b4e-9d34-4227-b1c0-13e7afb5f4f1", "DetectTime": "2024-05-21T12:41:15.138195+00:00", "EventTime": "2024-05-21T12:41:15.138216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.132.10.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZ3EG4ZQB5W5ZQHc3"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "5a79ab88-e157-4cd1-8f80-747fa0aff61a", "DetectTime": "2024-05-21T12:41:15.143650+00:00", "EventTime": "2024-05-21T12:41:15.143670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.45.14.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChtzTwZ8QEp7Xha8a"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "201d29ba-81f8-4246-9933-c6afe1ff0f46", "DetectTime": "2024-05-21T12:41:15.162886+00:00", "EventTime": "2024-05-21T12:41:15.162906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.145.249.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX2wdk1R2LVvVEvfa7"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "e7c00bd6-2100-48ec-b65b-c1fd4672dfa4", "DetectTime": "2024-05-21T12:41:15.168126+00:00", "EventTime": "2024-05-21T12:41:15.168146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.131.58.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthikQ2DN03PoFtIF3"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "f7ae196a-25dc-48b0-bb79-457948136e19", "DetectTime": "2024-05-21T12:41:15.172928+00:00", "EventTime": "2024-05-21T12:41:15.172945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CohFmo1WwfR05omd1c"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "3cf815d3-3f4a-45eb-83ae-0ed274dbe35b", "DetectTime": "2024-05-21T12:41:15.442702+00:00", "EventTime": "2024-05-21T12:41:15.442724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.196.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6lMrG1f8ZbmazVVR3"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "c57306b3-1120-4d23-afb8-b9c6e38ffa02", "DetectTime": "2024-05-21T12:41:15.521036+00:00", "EventTime": "2024-05-21T12:41:15.521055+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxquEx2tSEs9uhQpZd"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "8f4372f4-3950-4346-a853-2f682e1c2964", "DetectTime": "2024-05-21T12:41:15.534034+00:00", "EventTime": "2024-05-21T12:41:15.534053+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxquEx2tSEs9uhQpZd"], "accumulated_threat_level": 4.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "2cd22e4d-c32c-4864-b444-c067651773eb", "DetectTime": "2024-05-21T12:41:15.602658+00:00", "EventTime": "2024-05-21T12:41:15.602679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.71.178.166 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Covhi6TgWLrcgX0C7"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "0e90b7ad-b4c1-45c0-afc2-209450db439c", "DetectTime": "2024-05-21T12:41:16.009518+00:00", "EventTime": "2024-05-21T12:41:16.009541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.238.172.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5IfJN2jAofnphctKi"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "7fa9a64a-8def-4ad9-a174-08beb85ecc00", "DetectTime": "2024-05-21T12:41:16.394283+00:00", "EventTime": "2024-05-21T12:41:16.394303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cotpfm1Epon37aMcTd"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "b018ea2e-51dc-4f55-b75e-456295cbe9f1", "DetectTime": "2024-05-21T12:41:16.445155+00:00", "EventTime": "2024-05-21T12:41:16.445178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.76.242.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C702Ll39CWiJfX6I8e"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "bd257b05-cac3-4622-b9bc-494edabfb91d", "DetectTime": "2024-05-21T12:41:16.465794+00:00", "EventTime": "2024-05-21T12:41:16.465815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.148.199.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPoHE3CukAobgqGae"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "bef12854-943a-4feb-a67d-2e8c3c37656a", "DetectTime": "2024-05-21T12:41:16.494217+00:00", "EventTime": "2024-05-21T12:41:16.494236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChECDr2YqNdbCqyH1j"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "dac7e5a1-0702-4529-a6b3-0153eabb9a18", "DetectTime": "2024-05-21T12:41:16.499447+00:00", "EventTime": "2024-05-21T12:41:16.499470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C47sfouEKFPAI5yFf"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "33a8b9ea-2d76-440c-8d40-e61f46dc8ec8", "DetectTime": "2024-05-21T12:41:16.552812+00:00", "EventTime": "2024-05-21T12:41:16.552833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRM7F4mNXmoKtjUNd"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "63cec4cb-85ac-4421-b33c-b5a610001585", "DetectTime": "2024-05-21T12:41:16.578727+00:00", "EventTime": "2024-05-21T12:41:16.578766+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHZV18HoJ58TzWE1"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "18057a2a-3974-4d7f-bbd7-5c0bc7f19e4c", "DetectTime": "2024-05-21T12:41:16.597234+00:00", "EventTime": "2024-05-21T12:41:16.597271+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHZV18HoJ58TzWE1"], "accumulated_threat_level": 4.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "04a97ed2-2cc6-4789-bf9c-5ec7b3a5dc4a", "DetectTime": "2024-05-21T12:41:16.746531+00:00", "EventTime": "2024-05-21T12:41:16.746554+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnbDt3OsjyZvXYAS6"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "c0411ddb-a20f-4a5a-a260-fa79b0b53ad1", "DetectTime": "2024-05-21T12:41:16.759979+00:00", "EventTime": "2024-05-21T12:41:16.760002+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXnbDt3OsjyZvXYAS6"], "accumulated_threat_level": 5.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "6bb2ce48-a2a2-4b02-9fca-babef702adcc", "DetectTime": "2024-05-21T12:41:16.896661+00:00", "EventTime": "2024-05-21T12:41:16.896683+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyhhph1Xom67irSYb"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "1990bb9b-f9ab-4ac7-bf79-8ee02a0ac05f", "DetectTime": "2024-05-21T12:41:16.911968+00:00", "EventTime": "2024-05-21T12:41:16.911997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyhhph1Xom67irSYb"], "accumulated_threat_level": 5.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "df707c4c-ab7d-4e9d-99c1-b287814f4e2d", "DetectTime": "2024-05-21T12:41:16.999639+00:00", "EventTime": "2024-05-21T12:41:16.999658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMWqw46uFLoOT8eae"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "aac9f7a4-1d16-4b90-b909-91e3a315f2b9", "DetectTime": "2024-05-21T12:41:17.035063+00:00", "EventTime": "2024-05-21T12:41:17.035085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUuZX6D0gKI8Hlkj"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "1bace83d-687d-4401-a9c7-2c6fa90bf23c", "DetectTime": "2024-05-21T12:41:17.101215+00:00", "EventTime": "2024-05-21T12:41:17.101244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zM0o4jFJAG0TUqA7"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "c47b9936-4c4f-4576-894a-f4c0580efc0f", "DetectTime": "2024-05-21T12:41:17.115677+00:00", "EventTime": "2024-05-21T12:41:17.115698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjHkU2r8fKoj0eTQh"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "004ed78e-750c-4438-87f4-af1a07348a69", "DetectTime": "2024-05-21T12:41:17.178388+00:00", "EventTime": "2024-05-21T12:41:17.178441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxWhny4Fb5qLPVVBW2"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "580d88ae-96ca-41b7-8510-d81bc1ac069f", "DetectTime": "2024-05-21T12:41:17.194882+00:00", "EventTime": "2024-05-21T12:41:17.194906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEB4rA232bxfgMIlla"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "6c95b489-2e6c-40ef-8943-18c1623c5974", "DetectTime": "2024-05-21T12:41:17.202716+00:00", "EventTime": "2024-05-21T12:41:17.202736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKtHX1WjP5cpyBaDi"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "d1fe59aa-0519-475e-8730-6104fafb45c4", "DetectTime": "2024-05-21T12:41:17.207217+00:00", "EventTime": "2024-05-21T12:41:17.207238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXcVJn2QFg0CPNYZHg"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "2f6022b5-e8de-4679-a1d6-2bbc4d825400", "DetectTime": "2024-05-21T12:41:17.247931+00:00", "EventTime": "2024-05-21T12:41:17.247951+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKwcz36wsBW5Xzmse"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "4ac78825-6de4-45e4-8f00-fa3092f4b922", "DetectTime": "2024-05-21T12:41:17.260534+00:00", "EventTime": "2024-05-21T12:41:17.260555+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKwcz36wsBW5Xzmse"], "accumulated_threat_level": 6.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "8ee67d7b-4a32-4418-9324-a6605a24eb0d", "DetectTime": "2024-05-21T12:41:17.265806+00:00", "EventTime": "2024-05-21T12:41:17.265826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FRApuVo14bTzkDc"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "e6a163d0-044d-450f-af40-d9a0ee3f12a0", "DetectTime": "2024-05-21T12:41:17.270551+00:00", "EventTime": "2024-05-21T12:41:17.270570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNW6XA3eLVjvpslNA6"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "b5d7b544-f68d-460e-a3cf-128e6b7e82bc", "DetectTime": "2024-05-21T12:41:17.295810+00:00", "EventTime": "2024-05-21T12:41:17.295830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboCUK16uk2HdDc63j"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "56534916-6262-4d62-acad-d56bdb2aab7f", "DetectTime": "2024-05-21T12:41:17.301222+00:00", "EventTime": "2024-05-21T12:41:17.301245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRao42CRPpzh9J1sj"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "33951565-385f-4dc2-a86f-9c53cfd48470", "DetectTime": "2024-05-21T12:41:17.306302+00:00", "EventTime": "2024-05-21T12:41:17.306321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2yUvZ1lKQ7lsCtPI1"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "e97c2253-de14-4dd7-9e7c-739ba4eb3300", "DetectTime": "2024-05-21T12:41:17.326320+00:00", "EventTime": "2024-05-21T12:41:17.326341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnczhp4CCO6eEdpfXj"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "346cc227-70e1-4dc0-b88b-7a2ca2e8d0fc", "DetectTime": "2024-05-21T12:41:17.339843+00:00", "EventTime": "2024-05-21T12:41:17.339861+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnczhp4CCO6eEdpfXj"], "accumulated_threat_level": 6.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "be1b531f-44ce-48b8-abd0-12a60c4eb75b", "DetectTime": "2024-05-21T12:41:17.366619+00:00", "EventTime": "2024-05-21T12:41:17.366637+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWpSV74H8ZGFBewne4"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "bea54170-8b18-4011-8261-43c5aa335739", "DetectTime": "2024-05-21T12:41:17.380802+00:00", "EventTime": "2024-05-21T12:41:17.380828+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWpSV74H8ZGFBewne4"], "accumulated_threat_level": 7.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "6c15cb56-9b31-4162-80de-6abda1bd00f4", "DetectTime": "2024-05-21T12:41:17.448782+00:00", "EventTime": "2024-05-21T12:41:17.448818+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXGrv1Ymx7XDbHpF3"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "0781f649-acb0-493e-a086-4ce44a0fbb25", "DetectTime": "2024-05-21T12:41:17.461324+00:00", "EventTime": "2024-05-21T12:41:17.461345+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXGrv1Ymx7XDbHpF3"], "accumulated_threat_level": 7.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "ce006382-3723-444e-87ac-71927cad8ce5", "DetectTime": "2024-05-21T12:41:17.643418+00:00", "EventTime": "2024-05-21T12:41:17.643455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaEQsE2tPEvJN3oRGf"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "737f6201-5bcf-4569-84ee-7d445f73cc25", "DetectTime": "2024-05-21T12:41:17.658096+00:00", "EventTime": "2024-05-21T12:41:17.658117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtdmLv31Zxwa9Ynikd"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "1e06c7f9-c1d0-439a-8a55-9a3c09bc092a", "DetectTime": "2024-05-21T12:41:17.677776+00:00", "EventTime": "2024-05-21T12:41:17.677799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.175.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLH7n32844A9oEIbei"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "6a5ec7e5-ab0a-4d4c-a52a-f708179e4994", "DetectTime": "2024-05-21T12:41:17.711666+00:00", "EventTime": "2024-05-21T12:41:17.711688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbPkc4Yda2NAIEgd9"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "72c74d9a-c938-4ba2-81c3-55c300a929f2", "DetectTime": "2024-05-21T12:41:17.735842+00:00", "EventTime": "2024-05-21T12:41:17.735864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.5.194.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyp9oFz4KeMAeZbRj"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "b007da1f-1eeb-4925-b9ff-86297b3dda8b", "DetectTime": "2024-05-21T12:41:17.754827+00:00", "EventTime": "2024-05-21T12:41:17.754848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.201.91.219 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMMjX2VW8yL45OzCa"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "2d06866b-026b-421c-922e-982d337ae2b0", "DetectTime": "2024-05-21T12:41:17.784504+00:00", "EventTime": "2024-05-21T12:41:17.784523+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWWjzU2yHVrvEwhAP"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "6533c6cf-ae22-4a7c-a184-c7cca559fc78", "DetectTime": "2024-05-21T12:41:17.799262+00:00", "EventTime": "2024-05-21T12:41:17.799289+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWWjzU2yHVrvEwhAP"], "accumulated_threat_level": 8.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "3ee219a1-04f1-4dab-bc1d-158972be71a6", "DetectTime": "2024-05-21T12:41:17.870135+00:00", "EventTime": "2024-05-21T12:41:17.870154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48HWF4iIHHlXPmyJd"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "ba770108-2c23-4131-876c-c4331620be21", "DetectTime": "2024-05-21T12:41:17.881741+00:00", "EventTime": "2024-05-21T12:41:17.881759+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48HWF4iIHHlXPmyJd"], "accumulated_threat_level": 8.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "1ba93ad4-0e70-4d99-8c14-0b81d74ae444", "DetectTime": "2024-05-21T12:41:17.928614+00:00", "EventTime": "2024-05-21T12:41:17.928632+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.117.66.104"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.117.66.104 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTGlt1J817IjKNvW"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "b67c9671-90d8-434d-9739-01df667b5cd6", "DetectTime": "2024-05-21T12:41:17.940458+00:00", "EventTime": "2024-05-21T12:41:17.940476+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.117.66.104"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.117.66.104 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTGlt1J817IjKNvW"], "accumulated_threat_level": 9.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "2c772187-f260-4684-a212-7ac4d633fa10", "DetectTime": "2024-05-21T12:41:17.968391+00:00", "EventTime": "2024-05-21T12:41:17.968410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.232.5.137"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKNEd349LLThRlSfg"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "cfb39edf-7f03-4e31-b00c-9a72913c2540", "DetectTime": "2024-05-21T12:41:17.980215+00:00", "EventTime": "2024-05-21T12:41:17.980233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKNEd349LLThRlSfg"], "accumulated_threat_level": 9.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "810cc46b-4860-4cab-ab9f-715223f9ad76", "DetectTime": "2024-05-21T12:41:18.017248+00:00", "EventTime": "2024-05-21T12:41:18.017269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.166.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0f0532wgO45t4uYfh"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "3296891f-2e5a-4721-812c-1a098499a8d8", "DetectTime": "2024-05-21T12:41:18.022229+00:00", "EventTime": "2024-05-21T12:41:18.022248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.7.114.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYBdR34nN2KVnsCbg2"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "e36c3bfe-ec57-4268-838e-849fca24e68e", "DetectTime": "2024-05-21T12:41:18.026827+00:00", "EventTime": "2024-05-21T12:41:18.026845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMgSkd4D5RKTx9N9A5"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "03a59c41-7198-4da6-9d12-c4b939130888", "DetectTime": "2024-05-21T12:41:18.070926+00:00", "EventTime": "2024-05-21T12:41:18.070949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLZhi2LuB2p7aYcKj"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "a3ed3647-a408-4b88-b394-0be4d1e3ec76", "DetectTime": "2024-05-21T12:41:18.263515+00:00", "EventTime": "2024-05-21T12:41:18.263538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQqhcH1F9KQgCdmIrl"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "a7b594c7-07b7-4dc3-9ada-2f095ee0313c", "DetectTime": "2024-05-21T12:41:18.285086+00:00", "EventTime": "2024-05-21T12:41:18.285108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiQUf1GMJN4srguAe"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "2379d3ca-e060-48b4-8888-60b967394a26", "DetectTime": "2024-05-21T12:41:18.289895+00:00", "EventTime": "2024-05-21T12:41:18.289913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdca6a2464b1DcHpS9"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "7588a6e5-ef43-42f3-a34f-0db5f8426646", "DetectTime": "2024-05-21T12:41:18.300970+00:00", "EventTime": "2024-05-21T12:41:18.300998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7DCXS1yP22mGlq9Ze"], "accumulated_threat_level": 8.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "156e48d4-408a-4c51-9eb4-0a6487ffa6b7", "DetectTime": "2024-05-21T12:41:18.654745+00:00", "EventTime": "2024-05-21T12:41:18.654764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Cecs3oF7BqNyt6sh"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "a76660f1-e015-442c-8124-a638cd75b4b3", "DetectTime": "2024-05-21T12:41:18.683437+00:00", "EventTime": "2024-05-21T12:41:18.683460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVNLP3Y9B1Ym8ne87"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "ce82a809-7b5f-4647-bb4b-c73d51c09eff", "DetectTime": "2024-05-21T12:41:18.769045+00:00", "EventTime": "2024-05-21T12:41:18.769066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBJzf6IBIWIuU2Cf"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "82c4d284-7407-410d-a7aa-064513cff6ba", "DetectTime": "2024-05-21T12:41:18.866227+00:00", "EventTime": "2024-05-21T12:41:18.866246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cql5HB3mWL5q6jLVf", "Cg9atQ3eqI0VKvsMI", "CZJCjuSDYzkH5eqbg", "CEBEWf2JlpP8dC8Kj1"], "accumulated_threat_level": 0.5, "timewindow": 118} +{"Format": "IDEA0", "ID": "5e62a5df-1d64-4e2b-88bb-48b1282115db", "DetectTime": "2024-05-21T12:41:19.128896+00:00", "EventTime": "2024-05-21T12:41:19.128918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHL0a2Lrt7tws9Wf5"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "02b3ef68-b8ff-4dc8-9f73-6cf4b76b6da4", "DetectTime": "2024-05-21T12:41:19.145561+00:00", "EventTime": "2024-05-21T12:41:19.145582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMfI02aGoWxhDdOq1"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "4f25d9b5-0f9a-484a-bb29-8cd1e56a4862", "DetectTime": "2024-05-21T12:41:19.164048+00:00", "EventTime": "2024-05-21T12:41:19.164069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK3BtF3vHmHJ6uCDBl"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "28e3debb-ea34-4048-a3fe-9e2582362f4c", "DetectTime": "2024-05-21T12:41:19.183293+00:00", "EventTime": "2024-05-21T12:41:19.183314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.150.59 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW1GM1JjFcs5ReGZ"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "3a6e92ba-64dd-432b-b673-8a9678323010", "DetectTime": "2024-05-21T12:41:19.188366+00:00", "EventTime": "2024-05-21T12:41:19.188390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jsF74sKLzhqkkw7l"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "68ba41cc-70de-4ae0-b34f-db6d5a661e20", "DetectTime": "2024-05-21T12:41:19.194300+00:00", "EventTime": "2024-05-21T12:41:19.194321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0o424xVxg50favc"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "154bb976-a325-4072-b1ac-89409eed0d3d", "DetectTime": "2024-05-21T12:41:19.201177+00:00", "EventTime": "2024-05-21T12:41:19.201201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSUGFCIVGqsIwXu9c"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "f9cc4e09-3798-4db1-b3be-8ae661b17481", "DetectTime": "2024-05-21T12:41:19.229334+00:00", "EventTime": "2024-05-21T12:41:19.229353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.50.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMPVm1WXMaF3kGb3g"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "512f83df-b87b-4efb-93a7-32540ffa7ea4", "DetectTime": "2024-05-21T12:41:19.250125+00:00", "EventTime": "2024-05-21T12:41:19.250144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCGSYc1Mk1xxJHnAW1"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "a61c350d-326e-4be5-83d6-19ee47ce30c7", "DetectTime": "2024-05-21T12:41:19.270796+00:00", "EventTime": "2024-05-21T12:41:19.270820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCE8I3F6qDuGptF5"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "101da010-f71e-4a09-8fb1-0b094cf00663", "DetectTime": "2024-05-21T12:41:19.584545+00:00", "EventTime": "2024-05-21T12:41:19.584579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbi0UTFkZRno1TPb"], "accumulated_threat_level": 9.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "f43b6462-1261-4d56-af6d-11ad1db239ed", "DetectTime": "2024-05-21T12:41:19.706113+00:00", "EventTime": "2024-05-21T12:41:19.706136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.248.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIgvx2JnleHiq20qa"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "7cab47db-eb98-49c8-abcc-1ce996f0c443", "DetectTime": "2024-05-21T12:41:19.840032+00:00", "EventTime": "2024-05-21T12:41:19.840051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.97.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCW3Mr2knyBqwlIOKc"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "08cb28e7-e0df-42eb-a7da-bd2b201d6922", "DetectTime": "2024-05-21T12:41:19.871464+00:00", "EventTime": "2024-05-21T12:41:19.871487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFK8PdS2XzliVvmM1"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "ede6818d-7ab4-4a9e-b57e-38679f10872b", "DetectTime": "2024-05-21T12:41:19.881197+00:00", "EventTime": "2024-05-21T12:41:19.881218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.135.199.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTh3w2Me6XhxeeHG8"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "d563016e-e06e-4989-83da-060fddc183af", "DetectTime": "2024-05-21T12:41:19.896537+00:00", "EventTime": "2024-05-21T12:41:19.896559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1sKgv5Leyk6iCe2"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "a57ad4e9-5c59-48a8-a651-86e360411f1d", "DetectTime": "2024-05-21T12:41:19.910770+00:00", "EventTime": "2024-05-21T12:41:19.910790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjtDv31u5PsnLFZ83"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "1a73a971-afd3-4156-b08e-948d5deede4f", "DetectTime": "2024-05-21T12:41:20.137366+00:00", "EventTime": "2024-05-21T12:41:20.137385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.196.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4Fcd2lfLhbMTvzxg"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "0f46e8ad-45cd-470c-90b0-b18ffa66d1ec", "DetectTime": "2024-05-21T12:41:20.154660+00:00", "EventTime": "2024-05-21T12:41:20.154683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZcLn4gRLvFROkNe3"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "76123532-dddb-4f01-911c-bc997ac2822f", "DetectTime": "2024-05-21T12:41:20.190216+00:00", "EventTime": "2024-05-21T12:41:20.190237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6rXNP2rYN7kFZMj8c"], "accumulated_threat_level": 9.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "fd7c44c6-08b4-46fc-a4d9-181a74d562fd", "DetectTime": "2024-05-21T12:41:20.213739+00:00", "EventTime": "2024-05-21T12:41:20.213760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.5.194.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCGj5X39snqAQrBvY4"], "accumulated_threat_level": 9.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "cab3abd3-f95b-4cc8-9212-7488855f36cb", "DetectTime": "2024-05-21T12:41:20.254268+00:00", "EventTime": "2024-05-21T12:41:20.254289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2mOCb1XVX8Y1S45Og"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "cba9be0e-5d64-4a3e-b86b-738497304b7c", "DetectTime": "2024-05-21T12:41:20.282671+00:00", "EventTime": "2024-05-21T12:41:20.282691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7b4K25cw4ZVo4Bc7"], "accumulated_threat_level": 9.6, "timewindow": 116} +{"Format": "IDEA0", "ID": "978ecb22-4efd-4b5a-b189-6c2c58f16f65", "DetectTime": "2024-05-21T12:41:20.302555+00:00", "EventTime": "2024-05-21T12:41:20.302574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYVsjY3oiOlnIrePx9"], "accumulated_threat_level": 9.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "550f8b9e-3a11-4b85-878c-07a20a4370fe", "DetectTime": "2024-05-21T12:41:20.310296+00:00", "EventTime": "2024-05-21T12:41:20.310316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.178.196.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxyuJ7AEUyRqvjSGh"], "accumulated_threat_level": 9.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "9dad3453-feed-43c5-b3ac-a432e0c15a97", "DetectTime": "2024-05-21T12:41:20.649666+00:00", "EventTime": "2024-05-21T12:41:20.649684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18SIh3fcRbwKtE8r5"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "bb9655fc-21b5-4aca-a3f9-62ec06316f4e", "DetectTime": "2024-05-21T12:41:20.729596+00:00", "EventTime": "2024-05-21T12:41:20.729620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgpRwWTaiJ7y9GrMb"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "fe521e0d-5498-4c83-9a92-0aeca5a67f32", "DetectTime": "2024-05-21T12:41:20.734497+00:00", "EventTime": "2024-05-21T12:41:20.734518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9cI51JGcu7WWnRRd"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "7a24d83a-4b9c-4970-bad6-426f4a95426c", "DetectTime": "2024-05-21T12:41:20.739252+00:00", "EventTime": "2024-05-21T12:41:20.739270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLGgl3UCvJUQWb3Uc"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "d521475e-48b7-4fd0-bc21-d844932021fc", "DetectTime": "2024-05-21T12:41:20.810084+00:00", "EventTime": "2024-05-21T12:41:20.810105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD47WNqd18Jh7YB51"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "49a2abc0-fa2d-470c-a567-46d16a7745a9", "DetectTime": "2024-05-21T12:41:21.082435+00:00", "EventTime": "2024-05-21T12:41:21.082456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8MJd3Oz2e7HcizV9"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "b1d4aa27-c75a-43a6-b717-f87b2ea49482", "DetectTime": "2024-05-21T12:41:21.087640+00:00", "EventTime": "2024-05-21T12:41:21.087657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB5uJa1mnDmswVerY8"], "accumulated_threat_level": 9.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "7a08de7e-7d05-4ee7-ab26-96e7e74ae9e8", "DetectTime": "2024-05-21T12:41:21.160010+00:00", "EventTime": "2024-05-21T12:41:21.160030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCubg33YJSqe3jQTAk"], "accumulated_threat_level": 10.600000000000001, "timewindow": 117} +{"Format": "IDEA0", "ID": "b5edaf54-49a4-4252-845d-9b3fb9bc54fb", "DetectTime": "2024-05-21T12:41:21.164970+00:00", "EventTime": "2024-05-21T12:41:21.164989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjKV31BJ8PqVQy55h"], "accumulated_threat_level": 10.600000000000001, "timewindow": 117} +{"Format": "IDEA0", "ID": "b1cd0d94-f045-4073-b272-848bfb816f99", "DetectTime": "2024-05-21T12:41:21.234725+00:00", "EventTime": "2024-05-21T12:41:21.234742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX3Ok3bPRuOCXJEs4"], "accumulated_threat_level": 11.400000000000002, "timewindow": 117} +{"Format": "IDEA0", "ID": "6acdc83b-deb3-4f3e-87cc-aee69bf05802", "DetectTime": "2024-05-21T12:41:21.278101+00:00", "EventTime": "2024-05-21T12:41:21.278120+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8JzB1zVwC7mTX6t"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "2788e664-fb26-4b33-aa9b-7fbc93bb5a49", "DetectTime": "2024-05-21T12:41:21.290465+00:00", "EventTime": "2024-05-21T12:41:21.290483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "Connection to unknown destination port 5824/UDP destination IP 188.129.163.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClnudF14wancJOMCOl"], "accumulated_threat_level": 12.200000000000003, "timewindow": 117} +{"Format": "Json", "ID": "2788e664-fb26-4b33-aa9b-7fbc93bb5a49", "DetectTime": "2024-05-21T12:41:21.290465+00:00", "EventTime": "2024-05-21T12:41:21.290483+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.129.163.108"]}], "Attach": [{"Content": "1970-01-05T20:05:22.480951+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2024/05/21 12:41:21.577081)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 117, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "a48bdc46-165c-45e8-8456-a82fa542971f", "DetectTime": "2024-05-21T12:41:21.590557+00:00", "EventTime": "2024-05-21T12:41:21.590585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ8JzB1zVwC7mTX6t"], "accumulated_threat_level": 10.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "08235f33-862d-4ba3-8b2c-95226170f425", "DetectTime": "2024-05-21T12:41:21.602554+00:00", "EventTime": "2024-05-21T12:41:21.602573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9To7r4TjSSbmaq5Mc"], "accumulated_threat_level": 0, "timewindow": 117} +{"Format": "IDEA0", "ID": "0515e71e-3fc1-4582-8cb3-278b25498004", "DetectTime": "2024-05-21T12:41:21.614385+00:00", "EventTime": "2024-05-21T12:41:21.614431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRr9lH2n8g1SNpCfO"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "dc74a7de-29e1-48ca-8f58-2f8d0fbcfcc4", "DetectTime": "2024-05-21T12:41:21.620034+00:00", "EventTime": "2024-05-21T12:41:21.620057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl1q0a1rnnLjoXy6d9"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "48687178-1440-41c9-8e26-a7735205b54c", "DetectTime": "2024-05-21T12:41:21.625421+00:00", "EventTime": "2024-05-21T12:41:21.625442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CToMNv3d8J6NXWUM8j"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "888974ff-3845-437f-863b-6bae3d1cb557", "DetectTime": "2024-05-21T12:41:21.673989+00:00", "EventTime": "2024-05-21T12:41:21.674012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9qr51gIsq6WTO6xl"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "ad35a280-8009-431e-bddc-32979beb8627", "DetectTime": "2024-05-21T12:41:21.712680+00:00", "EventTime": "2024-05-21T12:41:21.712710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pCpS2dA2WWhc0rag"], "accumulated_threat_level": 1.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "071cf0db-4ead-4244-840a-eb37044c6c5c", "DetectTime": "2024-05-21T12:41:21.758657+00:00", "EventTime": "2024-05-21T12:41:21.758691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChhldY2WGzWyFooXI4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "dfecdf59-dbc1-4ce9-ba2e-2a10e719fad2", "DetectTime": "2024-05-21T12:41:21.763737+00:00", "EventTime": "2024-05-21T12:41:21.763757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGVKUQ3ocbqPWAkNx6", "ClMkQ21nEN2Krk4eS6", "CLuFVpnfqOyeqrPc7", "CG1Vui1F3y7HzJUnJ5"], "accumulated_threat_level": 1.0, "timewindow": 118} +{"Format": "IDEA0", "ID": "963d5266-3f24-4f1e-93f6-562f3225818a", "DetectTime": "2024-05-21T12:41:22.001938+00:00", "EventTime": "2024-05-21T12:41:22.001958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvpXpYN19NoxuDkOl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "297364ef-5051-47c7-b8f9-c63427abad9e", "DetectTime": "2024-05-21T12:41:22.007141+00:00", "EventTime": "2024-05-21T12:41:22.007160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1tjxz3omhy4zUf6k2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "d8b2815c-36c5-43ed-b229-5f4100b7cf5d", "DetectTime": "2024-05-21T12:41:22.067753+00:00", "EventTime": "2024-05-21T12:41:22.067789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKJmF3NfToCTmiXBj"], "accumulated_threat_level": 3.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "900730f2-15d1-458a-85fd-17a48527f914", "DetectTime": "2024-05-21T12:41:22.101614+00:00", "EventTime": "2024-05-21T12:41:22.101637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuxDju3Y29fBJ7F4u2"], "accumulated_threat_level": 3.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "e3c9414e-e102-4930-9919-ecba9668dbe9", "DetectTime": "2024-05-21T12:41:22.153156+00:00", "EventTime": "2024-05-21T12:41:22.153186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhiir3ilnuPUCFnXc"], "accumulated_threat_level": 4.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "b422f984-87ac-4565-b708-bbf270a32a4e", "DetectTime": "2024-05-21T12:41:22.196338+00:00", "EventTime": "2024-05-21T12:41:22.196374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz1qYlJNGFqe3ak9c"], "accumulated_threat_level": 4.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "26e774a3-8cd3-4648-9fc6-d00ba514de98", "DetectTime": "2024-05-21T12:41:22.264646+00:00", "EventTime": "2024-05-21T12:41:22.264671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdndY2sxCZbqPLOXg"], "accumulated_threat_level": 5.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "1326e8e7-3f44-4988-acd4-14efa5463fa7", "DetectTime": "2024-05-21T12:41:22.328567+00:00", "EventTime": "2024-05-21T12:41:22.328592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3AaNP1C54wVQeSPp6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "70b69121-df82-46dd-acfc-968d7880f096", "DetectTime": "2024-05-21T12:41:22.551259+00:00", "EventTime": "2024-05-21T12:41:22.551280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKElZp4eXD38mwywBc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "5af69b44-fb5e-41e1-b7bc-3888edcd3bf0", "DetectTime": "2024-05-21T12:41:22.602956+00:00", "EventTime": "2024-05-21T12:41:22.602976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJvEsWMzat0g1dkl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "ef15c59f-6a9f-4068-bde8-d7eb5175bfbd", "DetectTime": "2024-05-21T12:41:22.607978+00:00", "EventTime": "2024-05-21T12:41:22.607996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COrwQmcCDjXGsuR39"], "accumulated_threat_level": 7.199999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "ea358149-e317-4ce7-8b9e-ea0c731b2ce7", "DetectTime": "2024-05-21T12:41:22.669879+00:00", "EventTime": "2024-05-21T12:41:22.669899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.175.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX0ZB1PN3fqMlZaf3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "a6494894-4cb8-4494-a034-18a21e5c98a9", "DetectTime": "2024-05-21T12:41:22.710609+00:00", "EventTime": "2024-05-21T12:41:22.710629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMmTD4751zvR4WnY8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "8fb10661-8f59-47cc-b398-a3f924b634be", "DetectTime": "2024-05-21T12:41:22.746008+00:00", "EventTime": "2024-05-21T12:41:22.746030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.166.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbBwL2jj0pWC2aNje"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "73f10ef6-928e-483e-85c5-18046582be44", "DetectTime": "2024-05-21T12:41:22.885666+00:00", "EventTime": "2024-05-21T12:41:22.885686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["187.233.248.248"]}], "Attach": [{"Content": "Connection to unknown destination port 29927/UDP destination IP 187.233.248.248. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXjvbyzJhE6ntKI"], "accumulated_threat_level": 8.799999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "1f7cb05f-0ebc-4fbf-8624-522ffb773ce0", "DetectTime": "2024-05-21T12:41:22.929463+00:00", "EventTime": "2024-05-21T12:41:22.929482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjZa42AlO60C6Cu77"], "accumulated_threat_level": 9.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "837693d0-c1bf-46e2-b3ab-110161dcdba5", "DetectTime": "2024-05-21T12:41:22.981628+00:00", "EventTime": "2024-05-21T12:41:22.981654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Lli31OmCu0jFIOea"], "accumulated_threat_level": 10.4, "timewindow": 117} +{"Format": "IDEA0", "ID": "542b8a9a-469e-4ba5-94d5-5a5cd907fbb3", "DetectTime": "2024-05-21T12:41:23.217201+00:00", "EventTime": "2024-05-21T12:41:23.217220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CovUB61dM2UNujs4Rk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 117} +{"Format": "IDEA0", "ID": "7df8e64f-1066-4ca3-9f08-0205335be0b4", "DetectTime": "2024-05-21T12:41:23.296039+00:00", "EventTime": "2024-05-21T12:41:23.296058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAlWR3GfW50oMqdq6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 117} +{"Format": "Json", "ID": "7df8e64f-1066-4ca3-9f08-0205335be0b4", "DetectTime": "2024-05-21T12:41:23.296039+00:00", "EventTime": "2024-05-21T12:41:23.296058+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "1970-01-05T20:20:49.211805+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2024/05/21 12:41:23.531709)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 117, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "717cba2b-cbd1-45d7-969d-8753d42bb051", "DetectTime": "2024-05-21T12:41:23.535458+00:00", "EventTime": "2024-05-21T12:41:23.535475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF529BZNwbM1JiHh1"], "accumulated_threat_level": 0, "timewindow": 117} +{"Format": "IDEA0", "ID": "eebcd569-3f76-409a-8bf6-1e066b1426ee", "DetectTime": "2024-05-21T12:41:23.700794+00:00", "EventTime": "2024-05-21T12:41:23.700812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce0tkt4msAsLBVbZ5g"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "24c847b7-ccb8-4f21-8983-0943b65e73e8", "DetectTime": "2024-05-21T12:41:23.735494+00:00", "EventTime": "2024-05-21T12:41:23.735515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cor58shA6erB825ai"], "accumulated_threat_level": 1.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "5319cc78-0580-4513-bd23-a26e7604e5ea", "DetectTime": "2024-05-21T12:41:23.785033+00:00", "EventTime": "2024-05-21T12:41:23.785054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CskuLl1zCjqdO1KU44"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "335623c6-22ff-4c1b-9ccf-baa14a721cd0", "DetectTime": "2024-05-21T12:41:23.823437+00:00", "EventTime": "2024-05-21T12:41:23.823456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6lrWJ4mAGeJfWCGj"], "accumulated_threat_level": 3.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "04fb212e-37f4-408a-9666-0aa353ae99b8", "DetectTime": "2024-05-21T12:41:24.081601+00:00", "EventTime": "2024-05-21T12:41:24.081619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wGVJ3Cd45JM8SfU8"], "accumulated_threat_level": 4.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "c29e92c2-5980-469d-9392-5ea92a2c6d52", "DetectTime": "2024-05-21T12:41:24.124478+00:00", "EventTime": "2024-05-21T12:41:24.124498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBW2Yi3JyiKj5LDpOl"], "accumulated_threat_level": 4.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "1dacb0cf-ef81-42a2-82e0-acb48b4a2c8e", "DetectTime": "2024-05-21T12:41:24.171923+00:00", "EventTime": "2024-05-21T12:41:24.171942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COOm1g1eerFg2lSzVl"], "accumulated_threat_level": 5.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "c35723f5-9318-4473-b9e9-b64a8e775e4c", "DetectTime": "2024-05-21T12:41:24.216373+00:00", "EventTime": "2024-05-21T12:41:24.216392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM3mvrfQhAUatbTJ7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "8a09de7c-b355-4e61-8bba-2967b66d19b3", "DetectTime": "2024-05-21T12:41:24.266101+00:00", "EventTime": "2024-05-21T12:41:24.266121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkBRK2VRpiZGD4xri"], "accumulated_threat_level": 7.199999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "d2bd1dd3-1ac0-400a-928e-f62c7b035089", "DetectTime": "2024-05-21T12:41:24.304312+00:00", "EventTime": "2024-05-21T12:41:24.304336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpMdj3mftyLhYqCp3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "31d4908e-5fb8-457a-b0b2-8a0f7daf8deb", "DetectTime": "2024-05-21T12:41:24.352105+00:00", "EventTime": "2024-05-21T12:41:24.352131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1zfStKo5liPJYea"], "accumulated_threat_level": 8.799999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "2eabe394-d0c2-4d17-bbc7-813f7c9bd41e", "DetectTime": "2024-05-21T12:41:24.607740+00:00", "EventTime": "2024-05-21T12:41:24.607761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4wKh1D0P3LpzaAd"], "accumulated_threat_level": 9.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "19ddb28a-4591-4fd6-bcc4-1b8fb8d3c6d2", "DetectTime": "2024-05-21T12:41:24.749290+00:00", "EventTime": "2024-05-21T12:41:24.749311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvHhaU3CnymjxQqwAb"], "accumulated_threat_level": 10.4, "timewindow": 117} +{"Format": "IDEA0", "ID": "b35ef151-53a4-46a9-9929-0e63ad9f11ac", "DetectTime": "2024-05-21T12:41:24.792079+00:00", "EventTime": "2024-05-21T12:41:24.792098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRN4i1ovUB1gQno11"], "accumulated_threat_level": 11.200000000000001, "timewindow": 117} +{"Format": "IDEA0", "ID": "4074914f-e963-4c73-a457-4c467b906b7d", "DetectTime": "2024-05-21T12:41:24.839362+00:00", "EventTime": "2024-05-21T12:41:24.839381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRA4W32Eumjk12Pm"], "accumulated_threat_level": 12.000000000000002, "timewindow": 117} +{"Format": "Json", "ID": "4074914f-e963-4c73-a457-4c467b906b7d", "DetectTime": "2024-05-21T12:41:24.839362+00:00", "EventTime": "2024-05-21T12:41:24.839381+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-05T20:38:11.612986+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2024/05/21 12:41:25.304806)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 117, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a4b28136-7ce9-4b08-bd05-97e69eed2673", "DetectTime": "2024-05-21T12:41:25.316272+00:00", "EventTime": "2024-05-21T12:41:25.316293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXcGAkZK8XwzG7Mi"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "f379bc2d-c688-436c-b8d9-95c01dd55b11", "DetectTime": "2024-05-21T12:41:25.327575+00:00", "EventTime": "2024-05-21T12:41:25.327596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.251.175.49"]}], "Attach": [{"Content": "Connection to unknown destination port 27014/UDP destination IP 180.251.175.49. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CirhNX1Yg1EhaxPaWa"], "accumulated_threat_level": 1.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "99bb17c7-64a7-47ac-af1e-1e7edb89e55d", "DetectTime": "2024-05-21T12:41:25.342651+00:00", "EventTime": "2024-05-21T12:41:25.342674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExJPOlLi1ARFeXr3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "99774370-cd1a-405c-b8a4-a556c742a27f", "DetectTime": "2024-05-21T12:41:25.353683+00:00", "EventTime": "2024-05-21T12:41:25.353702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ympk3bdevcEyfO6d"], "accumulated_threat_level": 3.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "dac9586c-9126-4100-b07f-0a2f8f272eaf", "DetectTime": "2024-05-21T12:41:25.363539+00:00", "EventTime": "2024-05-21T12:41:25.363557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaN5ZS1lw5nZ4kZuo6"], "accumulated_threat_level": 4.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "0675efe0-cfc7-4520-a9f7-16c98ce0abf9", "DetectTime": "2024-05-21T12:41:25.373615+00:00", "EventTime": "2024-05-21T12:41:25.373633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4ZRh1pgIXowcpppb"], "accumulated_threat_level": 4.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "6f98daca-65a8-4acb-9e5c-0bb07f78a1e0", "DetectTime": "2024-05-21T12:41:25.389478+00:00", "EventTime": "2024-05-21T12:41:25.389496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEvkQk29mpWRXXL5ae"], "accumulated_threat_level": 5.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "d6251894-3ba7-428c-9880-55edff04ebb5", "DetectTime": "2024-05-21T12:41:25.399657+00:00", "EventTime": "2024-05-21T12:41:25.399674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3qPCJ22LLV7W8nxUa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "43a35732-b08a-4bb0-98e6-1ff612aa3486", "DetectTime": "2024-05-21T12:41:25.476045+00:00", "EventTime": "2024-05-21T12:41:25.476065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7lZ9LNDkuY8L6Jth"], "accumulated_threat_level": 7.199999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "14f997e4-b833-470b-a9e2-e880ed4301f5", "DetectTime": "2024-05-21T12:41:25.528170+00:00", "EventTime": "2024-05-21T12:41:25.528202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpksLP1emFVSjp32ba"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "533b1070-b0e1-449b-85ef-179649162c8e", "DetectTime": "2024-05-21T12:41:25.551235+00:00", "EventTime": "2024-05-21T12:41:25.551257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRpRD3OhnGpaTLIE4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "992e18e2-3f60-4427-9100-75ad20ffd592", "DetectTime": "2024-05-21T12:41:25.616836+00:00", "EventTime": "2024-05-21T12:41:25.616857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgu9tl3Ru4mY5qiMV8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "0a0c3c70-cd82-4d08-bd19-4dbef3d17634", "DetectTime": "2024-05-21T12:41:25.660739+00:00", "EventTime": "2024-05-21T12:41:25.660756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOli62g1sFdVu930l"], "accumulated_threat_level": 9.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "ab070db7-f777-4de1-9fac-49388491e89a", "DetectTime": "2024-05-21T12:41:25.706300+00:00", "EventTime": "2024-05-21T12:41:25.706319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9TFAF1al0Acgfvt5i"], "accumulated_threat_level": 10.4, "timewindow": 117} +{"Format": "IDEA0", "ID": "98cf0fda-90ed-49d1-b458-30853084be7e", "DetectTime": "2024-05-21T12:41:25.751905+00:00", "EventTime": "2024-05-21T12:41:25.751927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.150.59"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/UDP destination IP 176.73.150.59. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85GaD3eTFr8qagsYg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 117} +{"Format": "IDEA0", "ID": "cbd30c2d-8c04-4dc7-b232-0a03967b0625", "DetectTime": "2024-05-21T12:41:25.795355+00:00", "EventTime": "2024-05-21T12:41:25.795379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7J7v24960R8lV7E1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 117} +{"Format": "Json", "ID": "cbd30c2d-8c04-4dc7-b232-0a03967b0625", "DetectTime": "2024-05-21T12:41:25.795355+00:00", "EventTime": "2024-05-21T12:41:25.795379+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "1970-01-05T20:38:54.191867+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 117. (real time 2024/05/21 12:41:26.133235)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 117, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5e3c82e6-7f5e-4222-899d-49e8f4d8654a", "DetectTime": "2024-05-21T12:41:26.167337+00:00", "EventTime": "2024-05-21T12:41:26.167363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7cn4seUEzlllKyR9"], "accumulated_threat_level": 0.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "dec9d220-8475-4863-b19a-5438d816bfcb", "DetectTime": "2024-05-21T12:41:26.179147+00:00", "EventTime": "2024-05-21T12:41:26.179166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJahHC3i3K2p3CDA12"], "accumulated_threat_level": 1.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "d0fc4738-77a4-4a5e-9ef0-ee2357fa62b1", "DetectTime": "2024-05-21T12:41:26.221531+00:00", "EventTime": "2024-05-21T12:41:26.221549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtkWWb1DYQZ9iBXTS4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "ab8382ee-b91c-4537-824c-9d8fbe8555b3", "DetectTime": "2024-05-21T12:41:26.245284+00:00", "EventTime": "2024-05-21T12:41:26.245304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu0UUtXvoaIogdo3c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 117} +{"Format": "IDEA0", "ID": "070451ff-3aaa-4289-985f-893d49dacba0", "DetectTime": "2024-05-21T12:41:26.300064+00:00", "EventTime": "2024-05-21T12:41:26.300082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C69kIa26Kpu6dyi2Vl"], "accumulated_threat_level": 3.2, "timewindow": 117} +{"Format": "IDEA0", "ID": "02cd941f-bc63-448f-98ae-22fa140991f2", "DetectTime": "2024-05-21T12:41:26.359602+00:00", "EventTime": "2024-05-21T12:41:26.359621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA15K13djqkUfeqnmf"], "accumulated_threat_level": 4.0, "timewindow": 117} +{"Format": "IDEA0", "ID": "710a1aad-f0b2-4f03-a928-6b020afc7719", "DetectTime": "2024-05-21T12:41:26.404585+00:00", "EventTime": "2024-05-21T12:41:26.404605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Stoe1CGSc1eVmZKc"], "accumulated_threat_level": 4.8, "timewindow": 117} +{"Format": "IDEA0", "ID": "a2bcfb7d-f834-4696-96a9-ce6baabd52f2", "DetectTime": "2024-05-21T12:41:26.450779+00:00", "EventTime": "2024-05-21T12:41:26.450796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkuyV2pAGqQZUNKM6"], "accumulated_threat_level": 5.6, "timewindow": 117} +{"Format": "IDEA0", "ID": "893743fb-236e-45cd-a031-8ff22d6fa451", "DetectTime": "2024-05-21T12:41:26.502575+00:00", "EventTime": "2024-05-21T12:41:26.502593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeaiQE4XY5rHEvvDNd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 117} +{"Format": "IDEA0", "ID": "d963f1f1-c876-48d0-9e41-1ab96970a77c", "DetectTime": "2024-05-21T12:41:26.542854+00:00", "EventTime": "2024-05-21T12:41:26.542872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqDEEoGPbhpf2ogml"], "accumulated_threat_level": 7.199999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "94fc4b5c-ee6d-431b-942e-0c813141ad19", "DetectTime": "2024-05-21T12:41:26.790264+00:00", "EventTime": "2024-05-21T12:41:26.790284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyd8bfE7w5ZSGLA7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "47eb12e6-1f3a-4a07-a106-41de1beda435", "DetectTime": "2024-05-21T12:41:26.888931+00:00", "EventTime": "2024-05-21T12:41:26.888953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVI9Yo2lHekBe7O42c", "Cb5iZe4Z7wAy4zW8Y7", "Cb7Kys3x6VxS2Xajn1", "CaCGa31Etrfi5vtRH2"], "accumulated_threat_level": 1.5, "timewindow": 118} +{"Format": "IDEA0", "ID": "cbec38dc-d6b6-487b-b88a-733d714cbce4", "DetectTime": "2024-05-21T12:41:26.913451+00:00", "EventTime": "2024-05-21T12:41:26.913478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.201.91.219 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czz1AnZSVZJjLXv2j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "31167422-402c-4e2d-b00c-a5215e261382", "DetectTime": "2024-05-21T12:41:27.069001+00:00", "EventTime": "2024-05-21T12:41:27.069020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COgMZCsqvFtFXpj2a"], "accumulated_threat_level": 2.3, "timewindow": 118} +{"Format": "IDEA0", "ID": "15bf8d63-9abd-448d-a2ab-3c7ddf1de8ab", "DetectTime": "2024-05-21T12:41:27.125896+00:00", "EventTime": "2024-05-21T12:41:27.125913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvfqPf3roF4kqkDYW5"], "accumulated_threat_level": 3.0999999999999996, "timewindow": 118} +{"Format": "IDEA0", "ID": "8fa93f5c-1d97-43cf-9574-d222a8aba3fb", "DetectTime": "2024-05-21T12:41:27.160043+00:00", "EventTime": "2024-05-21T12:41:27.160063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnijf1wz8XzkVcrv8"], "accumulated_threat_level": 3.8999999999999995, "timewindow": 118} +{"Format": "IDEA0", "ID": "faba8d78-67a5-439c-a137-ab96db52ccff", "DetectTime": "2024-05-21T12:41:27.207514+00:00", "EventTime": "2024-05-21T12:41:27.207532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVCZ52A3Wb3NQoKq5"], "accumulated_threat_level": 4.699999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ef8ac531-d7b7-4a76-baab-695d307c18a6", "DetectTime": "2024-05-21T12:41:27.257433+00:00", "EventTime": "2024-05-21T12:41:27.257452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7MAQa4XKS7MHDrata"], "accumulated_threat_level": 5.499999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "9f549fd5-3fb5-40d2-904d-5e5ccd18b96c", "DetectTime": "2024-05-21T12:41:27.300591+00:00", "EventTime": "2024-05-21T12:41:27.300610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI2YPr9090cJINPH8"], "accumulated_threat_level": 6.299999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "d9b1cc2e-2141-41a8-8a04-813e0ce78126", "DetectTime": "2024-05-21T12:41:27.380991+00:00", "EventTime": "2024-05-21T12:41:27.381011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zTtU29Sjc0plXrw7"], "accumulated_threat_level": 7.099999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c74f1ea2-56a4-4fae-8a5b-b448b94eb623", "DetectTime": "2024-05-21T12:41:27.617830+00:00", "EventTime": "2024-05-21T12:41:27.617852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbB4JDfPRZMOIo9e"], "accumulated_threat_level": 7.899999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "0bf7d30b-c660-4ddf-a4a5-7acdaf186236", "DetectTime": "2024-05-21T12:41:27.753409+00:00", "EventTime": "2024-05-21T12:41:27.753428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqn2zR2rdAVDniYRNc"], "accumulated_threat_level": 8.7, "timewindow": 118} +{"Format": "IDEA0", "ID": "0f564677-2acf-4e44-9283-7ee937d88473", "DetectTime": "2024-05-21T12:41:27.797049+00:00", "EventTime": "2024-05-21T12:41:27.797069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCyxl4vWr1erlaw9l"], "accumulated_threat_level": 9.5, "timewindow": 118} +{"Format": "IDEA0", "ID": "92bb1e38-7086-47db-b250-3ef5106812c2", "DetectTime": "2024-05-21T12:41:27.841452+00:00", "EventTime": "2024-05-21T12:41:27.841471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUBCzU2kFKgEd0DYE8"], "accumulated_threat_level": 10.3, "timewindow": 118} +{"Format": "IDEA0", "ID": "2c6cc39d-e917-4895-97a0-9ff52c98fff0", "DetectTime": "2024-05-21T12:41:27.889954+00:00", "EventTime": "2024-05-21T12:41:27.889972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCWA3e3Al6vBUYwSa5"], "accumulated_threat_level": 11.100000000000001, "timewindow": 118} +{"Format": "IDEA0", "ID": "b283fc60-7576-475b-9f04-01dcc2f72848", "DetectTime": "2024-05-21T12:41:27.968381+00:00", "EventTime": "2024-05-21T12:41:27.968408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJ8WM3kMKLokxiYZ4"], "accumulated_threat_level": 11.900000000000002, "timewindow": 118} +{"Format": "IDEA0", "ID": "456b754b-6ba6-44d9-a7ef-567cbcc28ff6", "DetectTime": "2024-05-21T12:41:28.014280+00:00", "EventTime": "2024-05-21T12:41:28.014300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKn4Zeseuv3xH8h98"], "accumulated_threat_level": 12.700000000000003, "timewindow": 118} +{"Format": "Json", "ID": "456b754b-6ba6-44d9-a7ef-567cbcc28ff6", "DetectTime": "2024-05-21T12:41:28.014280+00:00", "EventTime": "2024-05-21T12:41:28.014300+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "1970-01-05T21:10:49.239006+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2024/05/21 12:41:28.313738)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 118, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "04d11daa-7db0-40ae-9e52-92adbce16759", "DetectTime": "2024-05-21T12:41:28.325694+00:00", "EventTime": "2024-05-21T12:41:28.325720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6b0p1zfDOwUSWZ68"], "accumulated_threat_level": 0.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "75fbffb2-b253-41f4-bdda-1f6c13a6466d", "DetectTime": "2024-05-21T12:41:28.345482+00:00", "EventTime": "2024-05-21T12:41:28.345514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.244.90.42"]}], "Attach": [{"Content": "Connection to unknown destination port 13676/UDP destination IP 180.244.90.42. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIpDa1ECKK9hj7R3g"], "accumulated_threat_level": 1.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "a7538fae-c663-4c1d-96ec-e552bddeead0", "DetectTime": "2024-05-21T12:41:28.358517+00:00", "EventTime": "2024-05-21T12:41:28.358552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxIdF4Pl61y4tBWA7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 118} +{"Format": "IDEA0", "ID": "76f2468f-12d5-42eb-ac98-9f104a7d323f", "DetectTime": "2024-05-21T12:41:28.383609+00:00", "EventTime": "2024-05-21T12:41:28.383645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqC9U2Msdprk1bWZk"], "accumulated_threat_level": 3.2, "timewindow": 118} +{"Format": "IDEA0", "ID": "6d899dbe-94c5-49a6-b4c7-df38344c515f", "DetectTime": "2024-05-21T12:41:28.433811+00:00", "EventTime": "2024-05-21T12:41:28.433841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtiZQWefsh3dDG8a"], "accumulated_threat_level": 4.0, "timewindow": 118} +{"Format": "IDEA0", "ID": "684b151c-d746-47c5-be0c-bfc13529900f", "DetectTime": "2024-05-21T12:41:28.486792+00:00", "EventTime": "2024-05-21T12:41:28.486824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK66mr1dA23h8p9BY7"], "accumulated_threat_level": 4.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "9d77c0c3-4cf5-43ab-98d2-1118b10baf84", "DetectTime": "2024-05-21T12:41:28.557398+00:00", "EventTime": "2024-05-21T12:41:28.557426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["82.211.185.55"]}], "Attach": [{"Content": "Connection to unknown destination port 6210/UDP destination IP 82.211.185.55. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNI5D1oAPaf6EfC56"], "accumulated_threat_level": 5.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "0e86d191-ad93-4e91-8ac1-0ef1817bd0b8", "DetectTime": "2024-05-21T12:41:28.600139+00:00", "EventTime": "2024-05-21T12:41:28.600172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C01MDE2LttJJor3V68"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 118} +{"Format": "IDEA0", "ID": "c5cd3741-3597-4b67-9f2b-14bc14a01642", "DetectTime": "2024-05-21T12:41:28.647954+00:00", "EventTime": "2024-05-21T12:41:28.647996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVob3uZabjyQJ278"], "accumulated_threat_level": 7.199999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "a561256b-8d9c-4968-8391-f0190f7d4a2f", "DetectTime": "2024-05-21T12:41:28.903750+00:00", "EventTime": "2024-05-21T12:41:28.903781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6fOS2eegGlKd2hSi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "9ccb5a9b-6bc9-438b-8815-fb3bc749c2ad", "DetectTime": "2024-05-21T12:41:28.951594+00:00", "EventTime": "2024-05-21T12:41:28.951626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8faW1vyuPVeJkHH3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "8c44f672-db75-414f-bafb-09e863f6473a", "DetectTime": "2024-05-21T12:41:28.999934+00:00", "EventTime": "2024-05-21T12:41:28.999956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsULG284ZYCBqMHX6"], "accumulated_threat_level": 9.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "e8787faa-a60e-4043-bd09-342c4baae11c", "DetectTime": "2024-05-21T12:41:29.053500+00:00", "EventTime": "2024-05-21T12:41:29.053531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85yhA3apyHJEGIerj"], "accumulated_threat_level": 10.4, "timewindow": 118} +{"Format": "IDEA0", "ID": "a775294f-dc35-4c5f-873b-5b13e5cd1171", "DetectTime": "2024-05-21T12:41:29.101852+00:00", "EventTime": "2024-05-21T12:41:29.101876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvyjK3LG3UyT2sAx"], "accumulated_threat_level": 11.200000000000001, "timewindow": 118} +{"Format": "IDEA0", "ID": "b2a62c6d-7872-416c-901d-77fb1d5260b0", "DetectTime": "2024-05-21T12:41:29.158582+00:00", "EventTime": "2024-05-21T12:41:29.158617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKHvq4QPaPb7KOiyd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 118} +{"Format": "Json", "ID": "b2a62c6d-7872-416c-901d-77fb1d5260b0", "DetectTime": "2024-05-21T12:41:29.158582+00:00", "EventTime": "2024-05-21T12:41:29.158617+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "1970-01-05T21:11:46.014448+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2024/05/21 12:41:29.347439)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 118, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e4d887a1-8bf4-4283-8abb-31298affa67e", "DetectTime": "2024-05-21T12:41:29.423892+00:00", "EventTime": "2024-05-21T12:41:29.423910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdIopTw6iQCeiP67"], "accumulated_threat_level": 0.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "2ae3ced8-6ead-486c-bbb2-e627d571da38", "DetectTime": "2024-05-21T12:41:29.435197+00:00", "EventTime": "2024-05-21T12:41:29.435216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.75.176.98"]}], "Attach": [{"Content": "Connection to unknown destination port 14576/UDP destination IP 189.75.176.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA37gq1QNmAVrE1inl"], "accumulated_threat_level": 1.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "58de93d4-a284-4c90-9475-fbc3a774c286", "DetectTime": "2024-05-21T12:41:29.506783+00:00", "EventTime": "2024-05-21T12:41:29.506802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrW7Q62Ay12VIVi6Ie"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 118} +{"Format": "IDEA0", "ID": "0c7ce98c-b9ba-48dd-a43b-8976377ec9cf", "DetectTime": "2024-05-21T12:41:29.551871+00:00", "EventTime": "2024-05-21T12:41:29.551889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zU65RJzHRUpWQy8"], "accumulated_threat_level": 3.2, "timewindow": 118} +{"Format": "IDEA0", "ID": "fd560f58-be84-4f02-b943-6457651b1ff5", "DetectTime": "2024-05-21T12:41:29.597802+00:00", "EventTime": "2024-05-21T12:41:29.597832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrwILC4rj2VntYU2p2"], "accumulated_threat_level": 4.0, "timewindow": 118} +{"Format": "IDEA0", "ID": "4d54c2bd-aceb-47db-8725-61570bdea59d", "DetectTime": "2024-05-21T12:41:29.654439+00:00", "EventTime": "2024-05-21T12:41:29.654459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtQpZ3bRi2zFRuwGl"], "accumulated_threat_level": 4.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "e57c826f-bd4b-494f-9b80-c313b0388d75", "DetectTime": "2024-05-21T12:41:29.878093+00:00", "EventTime": "2024-05-21T12:41:29.878115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.161.181"]}], "Attach": [{"Content": "Connection to unknown destination port 4759/UDP destination IP 176.73.161.181. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8mcm1DbrH7yjMWqb"], "accumulated_threat_level": 5.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "df6be11e-80f5-49ef-bd0d-2b330358e345", "DetectTime": "2024-05-21T12:41:29.961301+00:00", "EventTime": "2024-05-21T12:41:29.961327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1yqz1zhXTfIWABO4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 118} +{"Format": "IDEA0", "ID": "a4350d20-e830-4f91-b326-adaa59c66b26", "DetectTime": "2024-05-21T12:41:30.004600+00:00", "EventTime": "2024-05-21T12:41:30.004619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2pwf3BUaU8FHvJke"], "accumulated_threat_level": 7.199999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "9d72b6c1-8d8d-4c0d-9976-91f1da914495", "DetectTime": "2024-05-21T12:41:30.048091+00:00", "EventTime": "2024-05-21T12:41:30.048110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCX0NQ3bTfxHy4Nrbj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "fd5ed4ed-34df-4583-afc7-477ebf8ead2f", "DetectTime": "2024-05-21T12:41:30.100954+00:00", "EventTime": "2024-05-21T12:41:30.100972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpCmv1fcRKi9dBgF8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "b8183531-6c69-47c7-b328-a60ca48f5acc", "DetectTime": "2024-05-21T12:41:30.332130+00:00", "EventTime": "2024-05-21T12:41:30.332151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.7.114.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8uM03Nozc0Nis1u4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "add7b1cf-7d23-4dc2-8756-a8aac7d263b1", "DetectTime": "2024-05-21T12:41:30.369850+00:00", "EventTime": "2024-05-21T12:41:30.369869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphI9cHSvi7caozzh"], "accumulated_threat_level": 9.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "18fef4c1-52ac-4aba-914c-f8bb9db757e1", "DetectTime": "2024-05-21T12:41:30.414422+00:00", "EventTime": "2024-05-21T12:41:30.414442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLguHb35KMjDiI1UA7"], "accumulated_threat_level": 10.4, "timewindow": 118} +{"Format": "IDEA0", "ID": "dd35a8a2-6342-47f8-b3c6-bd2cba102952", "DetectTime": "2024-05-21T12:41:30.464202+00:00", "EventTime": "2024-05-21T12:41:30.464222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpgr4V26sLUAHE1GH1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 118} +{"Format": "IDEA0", "ID": "c88afd17-1cb9-4989-add8-bed5f9e0c159", "DetectTime": "2024-05-21T12:41:30.501363+00:00", "EventTime": "2024-05-21T12:41:30.501383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakOH92XzTVHWaQKH"], "accumulated_threat_level": 12.000000000000002, "timewindow": 118} +{"Format": "Json", "ID": "c88afd17-1cb9-4989-add8-bed5f9e0c159", "DetectTime": "2024-05-21T12:41:30.501363+00:00", "EventTime": "2024-05-21T12:41:30.501383+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-05T21:43:00.356532+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2024/05/21 12:41:30.687024)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 118, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5a88e976-7102-4349-8064-5d8aeabb1236", "DetectTime": "2024-05-21T12:41:30.705244+00:00", "EventTime": "2024-05-21T12:41:30.705268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccvb6j2YzvIeBYG0Od"], "accumulated_threat_level": 0.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "af600b26-ed68-41cf-ae76-341ebb6c9a63", "DetectTime": "2024-05-21T12:41:30.717283+00:00", "EventTime": "2024-05-21T12:41:30.717302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csc5mK1j7kSKtp32Z1"], "accumulated_threat_level": 1.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "6b532748-a655-466a-a261-31b8d632692f", "DetectTime": "2024-05-21T12:41:30.729175+00:00", "EventTime": "2024-05-21T12:41:30.729194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPyYw1D1vde1ZqxE9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 118} +{"Format": "IDEA0", "ID": "c5ef4ef4-efbf-4e00-87ca-e2336eb2bfc7", "DetectTime": "2024-05-21T12:41:30.740527+00:00", "EventTime": "2024-05-21T12:41:30.740546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCa9J3rYSxIKsDkVl"], "accumulated_threat_level": 3.2, "timewindow": 118} +{"Format": "IDEA0", "ID": "b42731bb-3059-4eea-bcdd-1a421f8647ea", "DetectTime": "2024-05-21T12:41:30.758888+00:00", "EventTime": "2024-05-21T12:41:30.758915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5gid4bVwIfwWG25j"], "accumulated_threat_level": 4.0, "timewindow": 118} +{"Format": "IDEA0", "ID": "a837dc8a-4e1e-450d-a2c6-82ba09d25b93", "DetectTime": "2024-05-21T12:41:30.944885+00:00", "EventTime": "2024-05-21T12:41:30.944905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOXD4othk2WEGen6", "COzCiz2O1tGf5CcGna", "CmFZ3i13hypqanyDgi", "CljyjB2CtCnRstQmO3"], "accumulated_threat_level": 4.5, "timewindow": 118} +{"Format": "IDEA0", "ID": "32a6d77f-87db-455e-bb77-13a6af5ef9e9", "DetectTime": "2024-05-21T12:41:30.963720+00:00", "EventTime": "2024-05-21T12:41:30.963739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSAXQ5uDmAXSyYP"], "accumulated_threat_level": 5.3, "timewindow": 118} +{"Format": "IDEA0", "ID": "fd76d3bd-ef6d-4fb8-a9e2-b70a0d973dc4", "DetectTime": "2024-05-21T12:41:31.008682+00:00", "EventTime": "2024-05-21T12:41:31.008702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGfEpGLQP0Nx4Wy8"], "accumulated_threat_level": 6.1, "timewindow": 118} +{"Format": "IDEA0", "ID": "307f92eb-0eff-4aab-bf37-d8527333ccfb", "DetectTime": "2024-05-21T12:41:31.051573+00:00", "EventTime": "2024-05-21T12:41:31.051594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxckq1KIlp5Skz1dh"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 118} +{"Format": "IDEA0", "ID": "32264df2-2c50-4e57-a436-43ac19f7648b", "DetectTime": "2024-05-21T12:41:31.096715+00:00", "EventTime": "2024-05-21T12:41:31.096736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ6lbV3ap6oYKoV3ig"], "accumulated_threat_level": 7.699999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c7865413-dea6-4f4e-a20e-04b3449a959b", "DetectTime": "2024-05-21T12:41:31.178293+00:00", "EventTime": "2024-05-21T12:41:31.178314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bxjD9HeKNzGOCk"], "accumulated_threat_level": 8.5, "timewindow": 118} +{"Format": "IDEA0", "ID": "ee8d9d06-c7f7-4417-a030-9921e231582c", "DetectTime": "2024-05-21T12:41:31.222373+00:00", "EventTime": "2024-05-21T12:41:31.222391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5RJ1W9QEnwyBj0e"], "accumulated_threat_level": 9.3, "timewindow": 118} +{"Format": "IDEA0", "ID": "189fc63e-c6b6-4859-81d6-d49fa120f66e", "DetectTime": "2024-05-21T12:41:31.271267+00:00", "EventTime": "2024-05-21T12:41:31.271284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFHpp12eL0tOq7DuG"], "accumulated_threat_level": 10.100000000000001, "timewindow": 118} +{"Format": "IDEA0", "ID": "8a514c73-fb14-45e4-a233-01d1b5844e69", "DetectTime": "2024-05-21T12:41:31.310123+00:00", "EventTime": "2024-05-21T12:41:31.310142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5ez42HWDz3kfmkte"], "accumulated_threat_level": 10.900000000000002, "timewindow": 118} +{"Format": "IDEA0", "ID": "43187aa7-2f08-4595-842d-890f1bbcd99a", "DetectTime": "2024-05-21T12:41:31.635014+00:00", "EventTime": "2024-05-21T12:41:31.635034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckd4Ea1NxIsNuTG1pl"], "accumulated_threat_level": 11.700000000000003, "timewindow": 118} +{"Format": "IDEA0", "ID": "c8b1cc94-6c26-4cf1-bd1b-98ab13f74880", "DetectTime": "2024-05-21T12:41:31.691466+00:00", "EventTime": "2024-05-21T12:41:31.691485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34kBu4blgMO4GHMd"], "accumulated_threat_level": 12.500000000000004, "timewindow": 118} +{"Format": "Json", "ID": "c8b1cc94-6c26-4cf1-bd1b-98ab13f74880", "DetectTime": "2024-05-21T12:41:31.691466+00:00", "EventTime": "2024-05-21T12:41:31.691485+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "1970-01-05T21:43:38.147536+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 118. (real time 2024/05/21 12:41:31.963183)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 118, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "31e2f48d-d2f7-45d8-b372-1a75209b49e4", "DetectTime": "2024-05-21T12:41:31.973783+00:00", "EventTime": "2024-05-21T12:41:31.973804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGza8FXHyRu97wff"], "accumulated_threat_level": 0.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "0e090392-c968-40f3-be3a-999f45df559c", "DetectTime": "2024-05-21T12:41:31.985255+00:00", "EventTime": "2024-05-21T12:41:31.985273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNxpT1hHDxK9Va1gk"], "accumulated_threat_level": 1.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "e17931de-937d-4b20-9e28-d4d82dc13ec1", "DetectTime": "2024-05-21T12:41:32.016087+00:00", "EventTime": "2024-05-21T12:41:32.016110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4TLx44lODDFsV2Gd2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 118} +{"Format": "IDEA0", "ID": "133cebd8-ee70-4a11-b9b9-1542bb43cbab", "DetectTime": "2024-05-21T12:41:32.058297+00:00", "EventTime": "2024-05-21T12:41:32.058315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvRY9y1STRPTQf0Mn3"], "accumulated_threat_level": 3.2, "timewindow": 118} +{"Format": "IDEA0", "ID": "2da1c3bd-8a6e-4edd-ac15-844353c17bdb", "DetectTime": "2024-05-21T12:41:32.220062+00:00", "EventTime": "2024-05-21T12:41:32.220080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjoXD2FcR5uGgjOH"], "accumulated_threat_level": 4.0, "timewindow": 118} +{"Format": "IDEA0", "ID": "7f57c3e3-1bc1-47cb-b53d-9cc5787d2f90", "DetectTime": "2024-05-21T12:41:32.441798+00:00", "EventTime": "2024-05-21T12:41:32.441817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzibH1VMesb3Mrvwl"], "accumulated_threat_level": 4.8, "timewindow": 118} +{"Format": "IDEA0", "ID": "518ae9f5-1783-4f2a-a018-116466b0a1bb", "DetectTime": "2024-05-21T12:41:32.496536+00:00", "EventTime": "2024-05-21T12:41:32.496556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzeIV1mEYFPLw1XXh"], "accumulated_threat_level": 5.6, "timewindow": 118} +{"Format": "IDEA0", "ID": "507f193a-2a35-489e-a3e5-4f4991ec0fcb", "DetectTime": "2024-05-21T12:41:32.554776+00:00", "EventTime": "2024-05-21T12:41:32.554799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCKGDb4IlqWAV0i0ob"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 118} +{"Format": "IDEA0", "ID": "edf308b4-eecf-4010-a6b6-92dfb21d7d6f", "DetectTime": "2024-05-21T12:41:32.808896+00:00", "EventTime": "2024-05-21T12:41:32.808925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Ic1THavXOwuX6u6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c5055d13-4c1e-4ed4-b88c-bf56de2c231b", "DetectTime": "2024-05-21T12:41:32.873868+00:00", "EventTime": "2024-05-21T12:41:32.873889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl8v2h4jAPqqC3pfDa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "248b9b08-f45a-4426-8ac0-cf894864512c", "DetectTime": "2024-05-21T12:41:34.118077+00:00", "EventTime": "2024-05-21T12:41:34.118100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7DCXS1yP22mGlq9Ze"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "268b7472-821b-48b4-9804-93bf26e9f35c", "DetectTime": "2024-05-21T12:41:34.449131+00:00", "EventTime": "2024-05-21T12:41:34.449154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF5uJQ1QPK6b8Dz4Od", "CXR8VhzNCtmGkUjSd", "CsHf8ylUykGi0UQag", "CnibBz2KJOeByNrlE1"], "accumulated_threat_level": 0.5, "timewindow": 119} +{"Format": "IDEA0", "ID": "495b5575-f9e0-45b1-a4d8-3b889eddf517", "DetectTime": "2024-05-21T12:41:35.108641+00:00", "EventTime": "2024-05-21T12:41:35.108659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMLOV142e6x73XfBw9"], "accumulated_threat_level": 1.3, "timewindow": 119} +{"Format": "IDEA0", "ID": "fafd84f3-31d0-48d0-b4d7-05f8be447ac5", "DetectTime": "2024-05-21T12:41:35.142858+00:00", "EventTime": "2024-05-21T12:41:35.142877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbi0UTFkZRno1TPb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "95a06131-1017-400d-9ec9-554e3c8785c1", "DetectTime": "2024-05-21T12:41:35.184195+00:00", "EventTime": "2024-05-21T12:41:35.184214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbxvzt3jyKks5wykNe"], "accumulated_threat_level": 2.1, "timewindow": 119} +{"Format": "IDEA0", "ID": "1d7ca1e5-7722-4249-9fd2-baa2a0bca6fc", "DetectTime": "2024-05-21T12:41:35.244883+00:00", "EventTime": "2024-05-21T12:41:35.244904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSb5Wk4ko9hHxmOLu6"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "d4276435-a9d1-47c0-a56c-867eecb719cd", "DetectTime": "2024-05-21T12:41:35.281003+00:00", "EventTime": "2024-05-21T12:41:35.281023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIWw2M1jAhz5RhoeSc"], "accumulated_threat_level": 3.7, "timewindow": 119} +{"Format": "IDEA0", "ID": "f12e6f00-a02b-4ad6-aeed-0dc74bb606d0", "DetectTime": "2024-05-21T12:41:35.325385+00:00", "EventTime": "2024-05-21T12:41:35.325403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCv4VQ34azYIPjnXib"], "accumulated_threat_level": 4.5, "timewindow": 119} +{"Format": "IDEA0", "ID": "11b4ea5e-38b2-4bb1-b92c-93669a1742a9", "DetectTime": "2024-05-21T12:41:35.557455+00:00", "EventTime": "2024-05-21T12:41:35.557476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWP0povGoJ1cBv0d2"], "accumulated_threat_level": 5.3, "timewindow": 119} +{"Format": "IDEA0", "ID": "87b10eff-7cd9-4080-a76d-81abd4a09b40", "DetectTime": "2024-05-21T12:41:35.604538+00:00", "EventTime": "2024-05-21T12:41:35.604556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjR9s3sL6QO4g5mVh"], "accumulated_threat_level": 6.1, "timewindow": 119} +{"Format": "IDEA0", "ID": "0c23456c-f611-4551-a7ca-64753328b939", "DetectTime": "2024-05-21T12:41:35.650431+00:00", "EventTime": "2024-05-21T12:41:35.650449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChmSq74ipgHYl94l17"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 119} +{"Format": "IDEA0", "ID": "7d587c8a-4f74-4e66-83f1-88fffd949f2c", "DetectTime": "2024-05-21T12:41:35.698760+00:00", "EventTime": "2024-05-21T12:41:35.698782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGTj9P2dTHcyrhdkt3"], "accumulated_threat_level": 7.699999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "2280066b-5a1c-4256-9918-d8cabf9fdbab", "DetectTime": "2024-05-21T12:41:35.747942+00:00", "EventTime": "2024-05-21T12:41:35.747961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiEkK5BLkrLeTRUb"], "accumulated_threat_level": 8.5, "timewindow": 119} +{"Format": "IDEA0", "ID": "9c7a62c5-1ad0-4e4e-8537-07a8d681f33d", "DetectTime": "2024-05-21T12:41:35.788080+00:00", "EventTime": "2024-05-21T12:41:35.788097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJASCxkOj32Qfn3L5"], "accumulated_threat_level": 9.3, "timewindow": 119} +{"Format": "IDEA0", "ID": "b11c0861-bfa1-4dfb-bc46-b1aeb74e8535", "DetectTime": "2024-05-21T12:41:35.834366+00:00", "EventTime": "2024-05-21T12:41:35.834386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7EEglAF79mZRfnb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 119} +{"Format": "IDEA0", "ID": "cf690d36-a0a1-45b8-9b06-272a6b8beee2", "DetectTime": "2024-05-21T12:41:35.892899+00:00", "EventTime": "2024-05-21T12:41:35.892918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnomd2MFw9kKgECb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 119} +{"Format": "IDEA0", "ID": "3beadde3-9524-47d6-a6d3-f84916dded72", "DetectTime": "2024-05-21T12:41:35.935683+00:00", "EventTime": "2024-05-21T12:41:35.935704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifhPf3nlFIRqnQ8Ni"], "accumulated_threat_level": 11.700000000000003, "timewindow": 119} +{"Format": "IDEA0", "ID": "11f6d248-40d2-4ef0-93f6-79be26a01f58", "DetectTime": "2024-05-21T12:41:36.174740+00:00", "EventTime": "2024-05-21T12:41:36.174764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C18SIh3fcRbwKtE8r5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "ec270fd2-218c-4a45-af5e-3791e317b8e6", "DetectTime": "2024-05-21T12:41:36.220240+00:00", "EventTime": "2024-05-21T12:41:36.220268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUEBr4g0EVeiBrtf1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 119} +{"Format": "Json", "ID": "ec270fd2-218c-4a45-af5e-3791e317b8e6", "DetectTime": "2024-05-21T12:41:36.220240+00:00", "EventTime": "2024-05-21T12:41:36.220268+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-05T22:15:27.794553+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2024/05/21 12:41:36.429984)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 119, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "c8abbc1a-fdb0-42e2-b3a8-121532d2518e", "DetectTime": "2024-05-21T12:41:36.438128+00:00", "EventTime": "2024-05-21T12:41:36.438148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCubg33YJSqe3jQTAk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "0621bf43-b603-490b-a6b2-36fed67059e4", "DetectTime": "2024-05-21T12:41:36.449041+00:00", "EventTime": "2024-05-21T12:41:36.449058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8APNu4ZwibsD59YBf"], "accumulated_threat_level": 0.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "c6d52f7f-002b-4c5c-9afc-2e7eb0fd2050", "DetectTime": "2024-05-21T12:41:36.453505+00:00", "EventTime": "2024-05-21T12:41:36.453523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoX3Ok3bPRuOCXJEs4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "a41b708c-644b-4b56-b960-8d16150c196c", "DetectTime": "2024-05-21T12:41:36.463843+00:00", "EventTime": "2024-05-21T12:41:36.463861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviYeU1ymsf1R2CxFe"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "aee0dc54-4afc-4447-b65c-a5c939101225", "DetectTime": "2024-05-21T12:41:36.474319+00:00", "EventTime": "2024-05-21T12:41:36.474337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoOY24khyLv9UaqS7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "e325f7f7-9627-49ce-8848-37833e7f81f9", "DetectTime": "2024-05-21T12:41:36.612093+00:00", "EventTime": "2024-05-21T12:41:36.612111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcpjLx4a03zCHVxVrc"], "accumulated_threat_level": 3.2, "timewindow": 119} +{"Format": "IDEA0", "ID": "b36bea46-183d-4222-8391-73ffb59a5853", "DetectTime": "2024-05-21T12:41:36.772538+00:00", "EventTime": "2024-05-21T12:41:36.772560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRr9lH2n8g1SNpCfO"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "6c91d3a7-55b0-46fb-b361-f2e1a9dd9ac5", "DetectTime": "2024-05-21T12:41:36.778237+00:00", "EventTime": "2024-05-21T12:41:36.778255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClnudF14wancJOMCOl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "2ba6f091-5dba-4876-9fcf-cdeefba633dd", "DetectTime": "2024-05-21T12:41:36.788981+00:00", "EventTime": "2024-05-21T12:41:36.788999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU4VdN2hSNd4uU5tv"], "accumulated_threat_level": 4.0, "timewindow": 119} +{"Format": "IDEA0", "ID": "7791d699-be25-48d6-9be8-9f382ee513df", "DetectTime": "2024-05-21T12:41:36.794061+00:00", "EventTime": "2024-05-21T12:41:36.794079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pCpS2dA2WWhc0rag"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "7897c7f5-2244-4b2c-84ec-db8645f2c9ed", "DetectTime": "2024-05-21T12:41:36.922264+00:00", "EventTime": "2024-05-21T12:41:36.922285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEJJ72n1MBitgsMS"], "accumulated_threat_level": 4.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "beafb6b7-4064-4f66-bcd9-faabd3b75e13", "DetectTime": "2024-05-21T12:41:36.967792+00:00", "EventTime": "2024-05-21T12:41:36.967810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72DBX3QZgsP16fVX8"], "accumulated_threat_level": 5.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "4af26070-9dec-42e0-a03a-56674974bc9a", "DetectTime": "2024-05-21T12:41:37.004980+00:00", "EventTime": "2024-05-21T12:41:37.005001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChhldY2WGzWyFooXI4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "4ac0ab38-95d8-479d-b620-91ea85befac9", "DetectTime": "2024-05-21T12:41:37.044239+00:00", "EventTime": "2024-05-21T12:41:37.044260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36fNZ3m6hidtDpyfh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 119} +{"Format": "IDEA0", "ID": "b40cce68-8cad-40a4-9671-cc44aa969690", "DetectTime": "2024-05-21T12:41:37.089635+00:00", "EventTime": "2024-05-21T12:41:37.089653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipM6w4WYSA0qwWh2g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "7eb47982-6098-4704-90ca-9451a06757bd", "DetectTime": "2024-05-21T12:41:37.367328+00:00", "EventTime": "2024-05-21T12:41:37.367349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdndY2sxCZbqPLOXg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "99ccd6a1-46c9-4fe4-94ad-0d18525098c7", "DetectTime": "2024-05-21T12:41:37.374042+00:00", "EventTime": "2024-05-21T12:41:37.374062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.150.59 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKJmF3NfToCTmiXBj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "7c5e2457-a68d-4087-90fa-d3b9b651452d", "DetectTime": "2024-05-21T12:41:37.379523+00:00", "EventTime": "2024-05-21T12:41:37.379542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.135.199.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAGkYi3j1iuOPTO9y6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "71e9e579-deef-4b45-b658-d9474f091da4", "DetectTime": "2024-05-21T12:41:37.384413+00:00", "EventTime": "2024-05-21T12:41:37.384432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhiir3ilnuPUCFnXc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "533da60a-f020-4681-9da6-ae826e58e928", "DetectTime": "2024-05-21T12:41:37.389344+00:00", "EventTime": "2024-05-21T12:41:37.389365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz1qYlJNGFqe3ak9c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "47e1693c-8ee1-4499-9aaf-da7ecf19c7e2", "DetectTime": "2024-05-21T12:41:37.547195+00:00", "EventTime": "2024-05-21T12:41:37.547220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.50.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY0qm6hoq3DG2b3Rh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "b73b773e-d75c-4064-b84f-a012b86b7d1d", "DetectTime": "2024-05-21T12:41:37.559290+00:00", "EventTime": "2024-05-21T12:41:37.559310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnrSgD36HqIhWEFs7e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "16b228bc-a2d2-4df7-90aa-1efec6933989", "DetectTime": "2024-05-21T12:41:37.816874+00:00", "EventTime": "2024-05-21T12:41:37.816897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3AaNP1C54wVQeSPp6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "7e5305e9-7936-47c7-ae0f-7d84369444e0", "DetectTime": "2024-05-21T12:41:37.854958+00:00", "EventTime": "2024-05-21T12:41:37.854981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJvEsWMzat0g1dkl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "eb245e2b-afb4-49fc-9648-501703fda481", "DetectTime": "2024-05-21T12:41:37.860184+00:00", "EventTime": "2024-05-21T12:41:37.860204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COMmTD4751zvR4WnY8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "d683df16-cf5a-4aaf-be62-06b9fda3c99c", "DetectTime": "2024-05-21T12:41:37.897977+00:00", "EventTime": "2024-05-21T12:41:37.897999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdEGUZ3rHQXbUOk3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "03efe42b-7555-44bf-9886-0e275c5d78b1", "DetectTime": "2024-05-21T12:41:37.975063+00:00", "EventTime": "2024-05-21T12:41:37.975083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.248.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXjvbyzJhE6ntKI"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "600823fa-2ba6-4fe0-a627-aa9a6d37c0f2", "DetectTime": "2024-05-21T12:41:37.981038+00:00", "EventTime": "2024-05-21T12:41:37.981057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjZa42AlO60C6Cu77"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "9cbf71bc-b563-4b91-9431-cbc72dceb69f", "DetectTime": "2024-05-21T12:41:37.992058+00:00", "EventTime": "2024-05-21T12:41:37.992075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.184.175"]}], "Attach": [{"Content": "Connection to unknown destination port 15362/UDP destination IP 188.169.184.175. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJf0gvP8KiV1vrhw5"], "accumulated_threat_level": 9.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "0ae776e8-a1b6-4be7-bb5f-af1d17ae7444", "DetectTime": "2024-05-21T12:41:38.092383+00:00", "EventTime": "2024-05-21T12:41:38.092407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3tSv3i8hUvFmqJGc"], "accumulated_threat_level": 10.4, "timewindow": 119} +{"Format": "IDEA0", "ID": "84a328dc-0c46-453e-b065-1c94dddf17bb", "DetectTime": "2024-05-21T12:41:38.205189+00:00", "EventTime": "2024-05-21T12:41:38.205210+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetEPx4cetpiNpcOI9"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "bf330eae-326d-4166-af06-38e3669eb26e", "DetectTime": "2024-05-21T12:41:38.218875+00:00", "EventTime": "2024-05-21T12:41:38.218897+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetEPx4cetpiNpcOI9"], "accumulated_threat_level": 10.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "421f22f4-cf3f-4e1d-bb6e-9e5f8a77cdd2", "DetectTime": "2024-05-21T12:41:38.365167+00:00", "EventTime": "2024-05-21T12:41:38.365190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.97.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WLRX2lWoKh7FZz4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "f5b9626f-c161-4f7e-b2ae-05a9cf8fadfa", "DetectTime": "2024-05-21T12:41:38.371137+00:00", "EventTime": "2024-05-21T12:41:38.371159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwAlWR3GfW50oMqdq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "b941436b-3d0e-4154-973b-a79fcbed5d90", "DetectTime": "2024-05-21T12:41:38.376396+00:00", "EventTime": "2024-05-21T12:41:38.376417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CovUB61dM2UNujs4Rk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "555fd749-60fd-42d6-8bd0-32a25166d256", "DetectTime": "2024-05-21T12:41:38.388780+00:00", "EventTime": "2024-05-21T12:41:38.388798+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcgj74qccXWBxeaAf"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "26552ffd-3920-4a0b-bc52-5fbe37ad8f10", "DetectTime": "2024-05-21T12:41:38.401090+00:00", "EventTime": "2024-05-21T12:41:38.401109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcgj74qccXWBxeaAf"], "accumulated_threat_level": 11.2, "timewindow": 28} +{"Format": "IDEA0", "ID": "e56f12d3-1711-40ff-ba13-f168c69ae5d6", "DetectTime": "2024-05-21T12:41:38.409791+00:00", "EventTime": "2024-05-21T12:41:38.409814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Lli31OmCu0jFIOea"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "3192baa2-82cf-4e48-98d9-0ba18bc0a6ae", "DetectTime": "2024-05-21T12:41:38.445047+00:00", "EventTime": "2024-05-21T12:41:38.445067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOVEfghUWJPhONZj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 119} +{"Format": "IDEA0", "ID": "1ad2d49b-2e43-4c33-a2cb-9877d7b988b1", "DetectTime": "2024-05-21T12:41:38.478628+00:00", "EventTime": "2024-05-21T12:41:38.478645+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEk86x40tmBmbX9rb"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "c224c218-21ba-4830-9213-f1e7f1fd7cec", "DetectTime": "2024-05-21T12:41:38.490497+00:00", "EventTime": "2024-05-21T12:41:38.490515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEk86x40tmBmbX9rb"], "accumulated_threat_level": 11.7, "timewindow": 28} +{"Format": "IDEA0", "ID": "938a6a5e-c4b3-4bae-8695-04a417d8a746", "DetectTime": "2024-05-21T12:41:38.573154+00:00", "EventTime": "2024-05-21T12:41:38.573180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.132.4.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW3EN33WcZVf5l9B0l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "86cad96b-00ab-4856-9c0d-e866ed385a87", "DetectTime": "2024-05-21T12:41:38.578358+00:00", "EventTime": "2024-05-21T12:41:38.578377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.7.114.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadW1N2mGwENixzYy1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "556c977b-1d3f-45ce-8f7c-10b901771f52", "DetectTime": "2024-05-21T12:41:38.582969+00:00", "EventTime": "2024-05-21T12:41:38.582988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.201.91.219 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFIH0XqG34QkrRuza"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "ba550a4d-7f67-4bbe-81f0-8a70de9f7260", "DetectTime": "2024-05-21T12:41:38.631250+00:00", "EventTime": "2024-05-21T12:41:38.631271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "Connection to unknown destination port 1197/UDP destination IP 109.200.232.125. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTv71i1A1FiErIt0g6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 119} +{"Format": "Json", "ID": "ba550a4d-7f67-4bbe-81f0-8a70de9f7260", "DetectTime": "2024-05-21T12:41:38.631250+00:00", "EventTime": "2024-05-21T12:41:38.631271+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["109.200.232.125"]}], "Attach": [{"Content": "1970-01-05T22:15:32.600524+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2024/05/21 12:41:38.818906)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 119, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1d04f4fc-02ec-4372-a057-b7afee5bd13f", "DetectTime": "2024-05-21T12:41:38.829907+00:00", "EventTime": "2024-05-21T12:41:38.829925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.154.84.83"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.154.84.83 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAaDrWJ0FKqUMTIo5"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "caa5e8d7-c11f-408b-a86e-d449c4ef9646", "DetectTime": "2024-05-21T12:41:38.843469+00:00", "EventTime": "2024-05-21T12:41:38.843488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.154.84.83"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.154.84.83 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAaDrWJ0FKqUMTIo5"], "accumulated_threat_level": 12.2, "timewindow": 28} +{"Format": "Json", "ID": "caa5e8d7-c11f-408b-a86e-d449c4ef9646", "DetectTime": "2024-05-21T12:41:38.843469+00:00", "EventTime": "2024-05-21T12:41:38.843488+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.154.84.83"]}], "Attach": [{"Content": "1970-01-02T03:05:16.442459+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2024/05/21 12:41:39.525892)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 28, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "d19be551-1174-4ecb-952d-cb15cfff9278", "DetectTime": "2024-05-21T12:41:39.543805+00:00", "EventTime": "2024-05-21T12:41:39.543827+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZsMY1REQQLGkMg36"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "bb0eb9b0-b850-4ad1-be28-f21c9457bfb8", "DetectTime": "2024-05-21T12:41:39.557559+00:00", "EventTime": "2024-05-21T12:41:39.557577+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZsMY1REQQLGkMg36"], "accumulated_threat_level": 0.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "39838397-bdee-4d39-a5e0-4c07d7bf2322", "DetectTime": "2024-05-21T12:41:39.568241+00:00", "EventTime": "2024-05-21T12:41:39.568259+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFMl41RjurF6tAaai"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "fb1fde2b-4b50-4365-b01a-c31305f596cc", "DetectTime": "2024-05-21T12:41:39.580180+00:00", "EventTime": "2024-05-21T12:41:39.580201+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFMl41RjurF6tAaai"], "accumulated_threat_level": 1.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "bdc53ab7-f7d4-4f82-976a-def9b2631453", "DetectTime": "2024-05-21T12:41:39.593055+00:00", "EventTime": "2024-05-21T12:41:39.593074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.135.199.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJYTds4oAuBCwHreSh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "a7d0bca9-c5b1-4db4-9c21-1b4507969424", "DetectTime": "2024-05-21T12:41:39.597849+00:00", "EventTime": "2024-05-21T12:41:39.597868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.50.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT77lv18X9E4ibB8U4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "f08eba15-788c-412d-910b-5b8ccb7b282e", "DetectTime": "2024-05-21T12:41:39.602565+00:00", "EventTime": "2024-05-21T12:41:39.602584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CskuLl1zCjqdO1KU44"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "5b0d23a6-966f-4915-a593-c6cdf38486b8", "DetectTime": "2024-05-21T12:41:39.607239+00:00", "EventTime": "2024-05-21T12:41:39.607257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cor58shA6erB825ai"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "4137ed4a-f410-4f29-99b7-2c04994802f9", "DetectTime": "2024-05-21T12:41:39.612552+00:00", "EventTime": "2024-05-21T12:41:39.612570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce0tkt4msAsLBVbZ5g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "6f9ef0e2-9f33-4fd0-8436-03f2dbe614bf", "DetectTime": "2024-05-21T12:41:39.618607+00:00", "EventTime": "2024-05-21T12:41:39.618630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.75.97.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rxaa4sa1YVG8bQp2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "0847a8b7-ac7b-4c92-b8d4-32581d0d1c6f", "DetectTime": "2024-05-21T12:41:39.631224+00:00", "EventTime": "2024-05-21T12:41:39.631243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chzo9p4awpLoyeAOle"], "accumulated_threat_level": 0.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "4c12e887-2c1e-4b23-85dc-08f28e2acad9", "DetectTime": "2024-05-21T12:41:39.636147+00:00", "EventTime": "2024-05-21T12:41:39.636165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7wGVJ3Cd45JM8SfU8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "fa6f2600-36e2-4db1-917e-516f77f0f9df", "DetectTime": "2024-05-21T12:41:39.640908+00:00", "EventTime": "2024-05-21T12:41:39.640926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COOm1g1eerFg2lSzVl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "bcf07438-dd2a-4482-8d68-e818c7e70878", "DetectTime": "2024-05-21T12:41:39.645429+00:00", "EventTime": "2024-05-21T12:41:39.645447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6lrWJ4mAGeJfWCGj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "7d868813-d451-4186-8408-cf705091e425", "DetectTime": "2024-05-21T12:41:39.650361+00:00", "EventTime": "2024-05-21T12:41:39.650379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBW2Yi3JyiKj5LDpOl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "ec723a90-38e7-45b4-9876-6fb76e2d3eaf", "DetectTime": "2024-05-21T12:41:39.655082+00:00", "EventTime": "2024-05-21T12:41:39.655100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpMdj3mftyLhYqCp3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "82848639-e860-4a41-81fe-005c91d4a68e", "DetectTime": "2024-05-21T12:41:39.660970+00:00", "EventTime": "2024-05-21T12:41:39.660991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkBRK2VRpiZGD4xri"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "68456ccc-6e52-46ae-a186-8353ec706c82", "DetectTime": "2024-05-21T12:41:39.666152+00:00", "EventTime": "2024-05-21T12:41:39.666172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM3mvrfQhAUatbTJ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "f371e12e-55ca-492e-9746-ab7c1ac6958d", "DetectTime": "2024-05-21T12:41:39.773207+00:00", "EventTime": "2024-05-21T12:41:39.773233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmWClz0cdcqF941k"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "6d1b6134-cd3b-4eb2-b7d4-2f7324d5ab52", "DetectTime": "2024-05-21T12:41:39.778854+00:00", "EventTime": "2024-05-21T12:41:39.778877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1zfStKo5liPJYea"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "f25e8122-c6d9-447e-87e4-4560aef205d0", "DetectTime": "2024-05-21T12:41:39.988753+00:00", "EventTime": "2024-05-21T12:41:39.988781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4wKh1D0P3LpzaAd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "98932c93-016a-4fd7-bb1c-c807c5d2d8ac", "DetectTime": "2024-05-21T12:41:40.033465+00:00", "EventTime": "2024-05-21T12:41:40.033486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM9WEbLIT13UiZMCb", "CT4YPW8ZGpUV8ncW2", "Cv62oa1StLGDoEymp5", "CSYkEA17ERjGsnPk48"], "accumulated_threat_level": 2.1, "timewindow": 119} +{"Format": "IDEA0", "ID": "ce75d720-ea8b-4428-919c-7f5873e1a379", "DetectTime": "2024-05-21T12:41:40.119211+00:00", "EventTime": "2024-05-21T12:41:40.119234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcRA4W32Eumjk12Pm"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "b90d5a54-b15d-45d2-9f17-b090dc1bdc30", "DetectTime": "2024-05-21T12:41:40.130422+00:00", "EventTime": "2024-05-21T12:41:40.130442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvHhaU3CnymjxQqwAb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "5c3529be-5c03-486f-bc8b-207f11c43602", "DetectTime": "2024-05-21T12:41:40.135715+00:00", "EventTime": "2024-05-21T12:41:40.135734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExJPOlLi1ARFeXr3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "1cdeb732-8b7d-4fa2-82c2-8b63c1c3e226", "DetectTime": "2024-05-21T12:41:40.141022+00:00", "EventTime": "2024-05-21T12:41:40.141041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.175.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CirhNX1Yg1EhaxPaWa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "443d4525-19cd-44c4-a62d-959a3459210b", "DetectTime": "2024-05-21T12:41:40.146259+00:00", "EventTime": "2024-05-21T12:41:40.146278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXcGAkZK8XwzG7Mi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "7d767aac-608b-4bfd-8940-0020f7f4dc6f", "DetectTime": "2024-05-21T12:41:40.152622+00:00", "EventTime": "2024-05-21T12:41:40.152640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRN4i1ovUB1gQno11"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "be80cd4f-d434-4ad2-aced-c3ee11256a13", "DetectTime": "2024-05-21T12:41:40.532063+00:00", "EventTime": "2024-05-21T12:41:40.532084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ympk3bdevcEyfO6d"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "fcbfbbe4-fcb6-4177-b687-2758b3fff301", "DetectTime": "2024-05-21T12:41:40.562106+00:00", "EventTime": "2024-05-21T12:41:40.562126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.67.124.167"]}], "Attach": [{"Content": "Connection to unknown destination port 6761/TCP destination IP 85.67.124.167. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXILszPp3vZQCSSl"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "7475d15a-d19b-4ff2-815f-0de8e6d9a586", "DetectTime": "2024-05-21T12:41:40.567263+00:00", "EventTime": "2024-05-21T12:41:40.567281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaN5ZS1lw5nZ4kZuo6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "9df7acf4-d836-4787-be8e-1ea52a4fe42e", "DetectTime": "2024-05-21T12:41:40.597805+00:00", "EventTime": "2024-05-21T12:41:40.597826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4ZRh1pgIXowcpppb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "df612f2c-552a-4a06-b212-5aa85b7a394a", "DetectTime": "2024-05-21T12:41:40.725766+00:00", "EventTime": "2024-05-21T12:41:40.725787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7lZ9LNDkuY8L6Jth"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "1d69bfd6-586a-4ad4-a609-82db681078ff", "DetectTime": "2024-05-21T12:41:40.731724+00:00", "EventTime": "2024-05-21T12:41:40.731744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.166.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COvbkq1Fv383A8sYI2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "334482ae-a3f0-42dc-b277-af0387b96fd9", "DetectTime": "2024-05-21T12:41:40.737175+00:00", "EventTime": "2024-05-21T12:41:40.737193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEvkQk29mpWRXXL5ae"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "b099229e-cea3-492b-9596-d4d25a3201b7", "DetectTime": "2024-05-21T12:41:40.742780+00:00", "EventTime": "2024-05-21T12:41:40.742799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3qPCJ22LLV7W8nxUa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "4c34773d-0728-4f3b-bc8e-04eb09f185ba", "DetectTime": "2024-05-21T12:41:40.792186+00:00", "EventTime": "2024-05-21T12:41:40.792210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLtzx20WRL9KHMDLe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "0bb40870-67b5-4159-b212-4f885eed95d0", "DetectTime": "2024-05-21T12:41:41.094724+00:00", "EventTime": "2024-05-21T12:41:41.094747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpksLP1emFVSjp32ba"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "1d75ea19-1ba0-4cc5-a31a-da65df8dc346", "DetectTime": "2024-05-21T12:41:41.101326+00:00", "EventTime": "2024-05-21T12:41:41.101348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgu9tl3Ru4mY5qiMV8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "c0a6cc5e-58f8-42d3-b610-85515eb533af", "DetectTime": "2024-05-21T12:41:41.187812+00:00", "EventTime": "2024-05-21T12:41:41.187834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOli62g1sFdVu930l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "da869d2a-2379-4b24-9798-0a564d994ae6", "DetectTime": "2024-05-21T12:41:41.228752+00:00", "EventTime": "2024-05-21T12:41:41.228774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9TFAF1al0Acgfvt5i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "0234db7e-bae6-4051-9c37-0c56e046a3d1", "DetectTime": "2024-05-21T12:41:41.234863+00:00", "EventTime": "2024-05-21T12:41:41.234884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7J7v24960R8lV7E1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "4df4845a-be7e-4b0a-b40e-dd6608f572b3", "DetectTime": "2024-05-21T12:41:41.241151+00:00", "EventTime": "2024-05-21T12:41:41.241175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7cn4seUEzlllKyR9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "792713a0-51f1-434b-a485-1de9f1894cc2", "DetectTime": "2024-05-21T12:41:41.247053+00:00", "EventTime": "2024-05-21T12:41:41.247073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.150.59 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85GaD3eTFr8qagsYg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "c9579028-08e7-414a-a02b-0198a2658a62", "DetectTime": "2024-05-21T12:41:41.653642+00:00", "EventTime": "2024-05-21T12:41:41.653664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJahHC3i3K2p3CDA12"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "09d229dd-5efc-416e-a66f-18f368eacce2", "DetectTime": "2024-05-21T12:41:41.677391+00:00", "EventTime": "2024-05-21T12:41:41.677413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.248.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COXNnmXDXKrtCyFq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "b0c951fb-4f34-4368-9dc5-e94787c2f876", "DetectTime": "2024-05-21T12:41:41.708728+00:00", "EventTime": "2024-05-21T12:41:41.708751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA15K13djqkUfeqnmf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "f28c42ef-bfd7-46e0-852f-e6da79351fac", "DetectTime": "2024-05-21T12:41:41.714934+00:00", "EventTime": "2024-05-21T12:41:41.714954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkuyV2pAGqQZUNKM6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "cbf75a28-7477-44a3-8db0-4ef361d8567a", "DetectTime": "2024-05-21T12:41:41.720016+00:00", "EventTime": "2024-05-21T12:41:41.720036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Stoe1CGSc1eVmZKc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "0285a7cf-848e-4d72-a874-ba8a906203ad", "DetectTime": "2024-05-21T12:41:41.725082+00:00", "EventTime": "2024-05-21T12:41:41.725102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtkWWb1DYQZ9iBXTS4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "83b3cd35-17f3-408d-ab77-c7cd46411295", "DetectTime": "2024-05-21T12:41:41.748996+00:00", "EventTime": "2024-05-21T12:41:41.749021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeaiQE4XY5rHEvvDNd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "568d422b-4d1e-4e3b-b7c5-708e3cbaa4f9", "DetectTime": "2024-05-21T12:41:41.756775+00:00", "EventTime": "2024-05-21T12:41:41.756795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C69kIa26Kpu6dyi2Vl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "ba50276f-6d7c-4515-9c22-e4c5ad1b1ef7", "DetectTime": "2024-05-21T12:41:42.215669+00:00", "EventTime": "2024-05-21T12:41:42.215693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.129.163.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyfc6x2uAfhZhd3bR6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "55d33017-6e33-4062-b4b2-d8f0b4ef7710", "DetectTime": "2024-05-21T12:41:42.220483+00:00", "EventTime": "2024-05-21T12:41:42.220501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyd8bfE7w5ZSGLA7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "69f634df-55a4-4ce0-b249-536ff36b9877", "DetectTime": "2024-05-21T12:41:42.226202+00:00", "EventTime": "2024-05-21T12:41:42.226224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqDEEoGPbhpf2ogml"], "accumulated_threat_level": 7.999999999999999, "timewindow": 117} +{"Format": "IDEA0", "ID": "abc7fcaf-4373-4985-ba34-eb4cb43182a2", "DetectTime": "2024-05-21T12:41:42.231382+00:00", "EventTime": "2024-05-21T12:41:42.231402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 187.233.248.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8nGMU3T0VoB8nG6Th"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "57aa351e-b641-4f96-ab25-e4781d80cec6", "DetectTime": "2024-05-21T12:41:42.241768+00:00", "EventTime": "2024-05-21T12:41:42.241791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COgMZCsqvFtFXpj2a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "45e21236-c0af-457c-b6fb-6864143cb6b8", "DetectTime": "2024-05-21T12:41:42.262957+00:00", "EventTime": "2024-05-21T12:41:42.262974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.198.166.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQcO84OASHAPV0Yd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "eb69aa4c-7d75-4d0f-9b6c-51285913837f", "DetectTime": "2024-05-21T12:41:42.281465+00:00", "EventTime": "2024-05-21T12:41:42.281485+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7CWc4cBQpBJEYu67"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "3434a119-c5cd-4d55-ae89-8b59cfc2f090", "DetectTime": "2024-05-21T12:41:42.294729+00:00", "EventTime": "2024-05-21T12:41:42.294750+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7CWc4cBQpBJEYu67"], "accumulated_threat_level": 1.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "e10f22f4-09c5-45f3-aadc-719a18705db1", "DetectTime": "2024-05-21T12:41:42.407713+00:00", "EventTime": "2024-05-21T12:41:42.407733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvfqPf3roF4kqkDYW5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "61bb355b-1304-4eeb-b94c-08d3fc274b64", "DetectTime": "2024-05-21T12:41:42.420712+00:00", "EventTime": "2024-05-21T12:41:42.420732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxDD52r4XuAZSBRXe"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "e55a8233-9763-43c5-b23b-1bb59d5f33ea", "DetectTime": "2024-05-21T12:41:42.435043+00:00", "EventTime": "2024-05-21T12:41:42.435071+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwxDD52r4XuAZSBRXe"], "accumulated_threat_level": 2.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "5fa0f2fe-1966-4ad3-8982-5a0b879aff20", "DetectTime": "2024-05-21T12:41:42.453076+00:00", "EventTime": "2024-05-21T12:41:42.453094+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.176.133.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5keL14U1kvfk2MFLd"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "8fff3ef8-a5e2-4fbd-9c7b-1f5b1d51fcbb", "DetectTime": "2024-05-21T12:41:42.465521+00:00", "EventTime": "2024-05-21T12:41:42.465539+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.176.133.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5keL14U1kvfk2MFLd"], "accumulated_threat_level": 2.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "082fb07e-27e7-4d30-845e-9e62baaa95de", "DetectTime": "2024-05-21T12:41:42.470508+00:00", "EventTime": "2024-05-21T12:41:42.470526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnijf1wz8XzkVcrv8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c7247ad9-881e-453e-83d5-b2ae252afcc6", "DetectTime": "2024-05-21T12:41:42.494483+00:00", "EventTime": "2024-05-21T12:41:42.494500+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7znIK2gSDxDMJwmQ"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "e6cb4ffd-c14c-4ae6-9dd1-450b2499f136", "DetectTime": "2024-05-21T12:41:42.505766+00:00", "EventTime": "2024-05-21T12:41:42.505784+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7znIK2gSDxDMJwmQ"], "accumulated_threat_level": 3.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "4a6af2c1-602d-44e6-8430-fb10528e0779", "DetectTime": "2024-05-21T12:41:42.693096+00:00", "EventTime": "2024-05-21T12:41:42.693118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVCZ52A3Wb3NQoKq5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "98a6f222-c60f-4468-821e-c3be5e83fb83", "DetectTime": "2024-05-21T12:41:42.709026+00:00", "EventTime": "2024-05-21T12:41:42.709063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7MAQa4XKS7MHDrata"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "adf58c3d-4090-4605-b093-25fa1e0256c4", "DetectTime": "2024-05-21T12:41:42.768055+00:00", "EventTime": "2024-05-21T12:41:42.768078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7YPyO2UDwkJLPNQuj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c7eb41c6-5446-4f06-8958-fbfb0bc3480f", "DetectTime": "2024-05-21T12:41:42.806249+00:00", "EventTime": "2024-05-21T12:41:42.806270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI2YPr9090cJINPH8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "1d13ce02-db55-4a9f-907e-9b5d19881d75", "DetectTime": "2024-05-21T12:41:42.861949+00:00", "EventTime": "2024-05-21T12:41:42.861970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zTtU29Sjc0plXrw7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ed20d529-b1c7-4ff9-a246-9b106b1dd237", "DetectTime": "2024-05-21T12:41:42.908057+00:00", "EventTime": "2024-05-21T12:41:42.908078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbB4JDfPRZMOIo9e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "1dca5e70-f425-4fc5-b0d5-1ab39ffbf74a", "DetectTime": "2024-05-21T12:41:42.915240+00:00", "EventTime": "2024-05-21T12:41:42.915262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqn2zR2rdAVDniYRNc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "177b400b-177f-43f6-ae54-03e8a92c9069", "DetectTime": "2024-05-21T12:41:42.969276+00:00", "EventTime": "2024-05-21T12:41:42.969302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCyxl4vWr1erlaw9l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "7b2509ce-d406-4dd7-a823-6b5509316433", "DetectTime": "2024-05-21T12:41:43.309569+00:00", "EventTime": "2024-05-21T12:41:43.309590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUBCzU2kFKgEd0DYE8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "d122c124-60fa-417a-8c39-10bf4d27a63d", "DetectTime": "2024-05-21T12:41:43.321292+00:00", "EventTime": "2024-05-21T12:41:43.321311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTtcjNwVSGlvtOHY2"], "accumulated_threat_level": 3.7, "timewindow": 119} +{"Format": "IDEA0", "ID": "bef46052-7c17-48e0-91b0-375f48c65046", "DetectTime": "2024-05-21T12:41:43.326529+00:00", "EventTime": "2024-05-21T12:41:43.326548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCWA3e3Al6vBUYwSa5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "2e1556f5-a4bc-42a0-b545-d061bc042097", "DetectTime": "2024-05-21T12:41:43.331016+00:00", "EventTime": "2024-05-21T12:41:43.331034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.175.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKMb9489NZh1fn7th"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "6b6b6850-a1a2-46f4-b7ec-8b09183a40d3", "DetectTime": "2024-05-21T12:41:43.384741+00:00", "EventTime": "2024-05-21T12:41:43.384762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKn4Zeseuv3xH8h98"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "31c12e64-663b-4542-90a4-80d1a1e83b0d", "DetectTime": "2024-05-21T12:41:43.392332+00:00", "EventTime": "2024-05-21T12:41:43.392350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJ8WM3kMKLokxiYZ4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "7f331914-abc3-429f-8ff9-30cb2cf1c2c9", "DetectTime": "2024-05-21T12:41:43.755208+00:00", "EventTime": "2024-05-21T12:41:43.755227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6b0p1zfDOwUSWZ68"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "aa4af7d5-4f9a-405a-9992-da963a3b5abf", "DetectTime": "2024-05-21T12:41:43.819198+00:00", "EventTime": "2024-05-21T12:41:43.819217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIpDa1ECKK9hj7R3g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "fccb23a7-335b-4e35-9462-9c4b78230dab", "DetectTime": "2024-05-21T12:41:43.835411+00:00", "EventTime": "2024-05-21T12:41:43.835430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmNgrQnb24g49EA3"], "accumulated_threat_level": 4.5, "timewindow": 119} +{"Format": "IDEA0", "ID": "18179450-f66e-47ff-a748-8c74a5c23aca", "DetectTime": "2024-05-21T12:41:43.840204+00:00", "EventTime": "2024-05-21T12:41:43.840223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxIdF4Pl61y4tBWA7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "a9517abf-0c87-45d8-9e86-e8277c73a397", "DetectTime": "2024-05-21T12:41:43.844890+00:00", "EventTime": "2024-05-21T12:41:43.844909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqC9U2Msdprk1bWZk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ac85c1e8-e2c6-49c7-88ce-4b254b3ab1f3", "DetectTime": "2024-05-21T12:41:43.849953+00:00", "EventTime": "2024-05-21T12:41:43.849970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNI5D1oAPaf6EfC56"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "74594522-bb84-47b0-a085-40c6aca7de26", "DetectTime": "2024-05-21T12:41:43.864328+00:00", "EventTime": "2024-05-21T12:41:43.864350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtiZQWefsh3dDG8a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ec192a89-a198-4e66-bc82-05d413b29675", "DetectTime": "2024-05-21T12:41:43.870313+00:00", "EventTime": "2024-05-21T12:41:43.870331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg9LDt4mHb1hOvSKT7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c83622b2-1c01-472e-a5ee-b1d5d901176a", "DetectTime": "2024-05-21T12:41:43.968011+00:00", "EventTime": "2024-05-21T12:41:43.968032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK66mr1dA23h8p9BY7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "d967ae88-1057-48e6-9442-7cf6f1afdaf3", "DetectTime": "2024-05-21T12:41:44.046225+00:00", "EventTime": "2024-05-21T12:41:44.046247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C01MDE2LttJJor3V68"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c3d33c38-3d80-42f9-9f70-787e87e00b90", "DetectTime": "2024-05-21T12:41:44.379209+00:00", "EventTime": "2024-05-21T12:41:44.379230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6fOS2eegGlKd2hSi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "cc9eb072-620c-4c1a-af86-e60b918e932f", "DetectTime": "2024-05-21T12:41:44.389119+00:00", "EventTime": "2024-05-21T12:41:44.389139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.150.59 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcNbFA1c1ZMqMRYYB8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "8a8cc79a-c326-4a7a-ab0f-fe65146f8f6c", "DetectTime": "2024-05-21T12:41:44.393694+00:00", "EventTime": "2024-05-21T12:41:44.393713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8faW1vyuPVeJkHH3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "754552f9-2117-42d5-af03-f6e04bfaddde", "DetectTime": "2024-05-21T12:41:44.399819+00:00", "EventTime": "2024-05-21T12:41:44.399838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVob3uZabjyQJ278"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "dfdaecb2-e9d2-48d9-b8ec-936a684dfbf3", "DetectTime": "2024-05-21T12:41:44.411297+00:00", "EventTime": "2024-05-21T12:41:44.411320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVA382FGsrCbOsIMg"], "accumulated_threat_level": 5.3, "timewindow": 119} +{"Format": "IDEA0", "ID": "1dd4efba-e868-47c1-9eb4-d2f8070128d2", "DetectTime": "2024-05-21T12:41:44.454079+00:00", "EventTime": "2024-05-21T12:41:44.454101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCPMM1xO2yziiBRpj", "ClltxR1GjjgIpgzXe6", "Ce5Ivg3tR1H8964un1", "C5LWDx3LVffupRuwkl"], "accumulated_threat_level": 5.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "c23a339a-1ea6-4e1f-b117-559b41a46c05", "DetectTime": "2024-05-21T12:41:44.459648+00:00", "EventTime": "2024-05-21T12:41:44.459669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVdIopTw6iQCeiP67"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "352ebefe-7de0-4e60-8c6f-8baef84e6429", "DetectTime": "2024-05-21T12:41:44.471073+00:00", "EventTime": "2024-05-21T12:41:44.471094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKvyjK3LG3UyT2sAx"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "b1c6ce8e-0661-4636-9b51-23a9f5b83656", "DetectTime": "2024-05-21T12:41:44.504848+00:00", "EventTime": "2024-05-21T12:41:44.504871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKHvq4QPaPb7KOiyd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "d390de5c-a6c8-4fc3-bb63-e0411a05dc2b", "DetectTime": "2024-05-21T12:41:44.537551+00:00", "EventTime": "2024-05-21T12:41:44.537581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXsULG284ZYCBqMHX6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "9e5453be-0437-4d12-a494-0992697e3aec", "DetectTime": "2024-05-21T12:41:44.542889+00:00", "EventTime": "2024-05-21T12:41:44.542909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85yhA3apyHJEGIerj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "196edc4b-d406-41a1-87ad-7521173702c0", "DetectTime": "2024-05-21T12:41:44.547469+00:00", "EventTime": "2024-05-21T12:41:44.547487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLGNM120IPkfyraWak"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "88038de0-5199-4be2-8ae7-9520f75178e2", "DetectTime": "2024-05-21T12:41:45.015658+00:00", "EventTime": "2024-05-21T12:41:45.015680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZD6V21iddxihs1R7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "f424dd7b-f391-4c53-ad04-db64553281cb", "DetectTime": "2024-05-21T12:41:45.027656+00:00", "EventTime": "2024-05-21T12:41:45.027674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrW7Q62Ay12VIVi6Ie"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ffef9b5e-4185-4f72-a583-9f5d9292d8b8", "DetectTime": "2024-05-21T12:41:45.036536+00:00", "EventTime": "2024-05-21T12:41:45.036555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA37gq1QNmAVrE1inl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "4e9d3a53-aaa8-4790-8edb-f247b1b50f3c", "DetectTime": "2024-05-21T12:41:45.052543+00:00", "EventTime": "2024-05-21T12:41:45.052562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrwILC4rj2VntYU2p2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "63d55010-abcb-4533-8bd6-449594cf3903", "DetectTime": "2024-05-21T12:41:45.057413+00:00", "EventTime": "2024-05-21T12:41:45.057434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7zU65RJzHRUpWQy8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "6fcb5de7-f9bb-49f7-9a7f-e538c7986d6f", "DetectTime": "2024-05-21T12:41:45.076882+00:00", "EventTime": "2024-05-21T12:41:45.076903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.251.175.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZemvMXujZyYCmni1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ae4dd32a-bc66-4113-af4b-e5ac081755b8", "DetectTime": "2024-05-21T12:41:45.293454+00:00", "EventTime": "2024-05-21T12:41:45.293478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtQpZ3bRi2zFRuwGl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "343e245f-e1ee-47bd-80c0-ef07c9af165e", "DetectTime": "2024-05-21T12:41:45.298494+00:00", "EventTime": "2024-05-21T12:41:45.298519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.150.59 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYPo01n3hEobKmcL9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "f20ab7ba-2a67-484f-ad1b-387bf82f00a8", "DetectTime": "2024-05-21T12:41:45.311044+00:00", "EventTime": "2024-05-21T12:41:45.311063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBAgpqLdPyuNebFyj"], "accumulated_threat_level": 6.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "df89c2b6-34f3-46fe-bb5d-8ff894a3daed", "DetectTime": "2024-05-21T12:41:45.358124+00:00", "EventTime": "2024-05-21T12:41:45.358143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8mcm1DbrH7yjMWqb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "e8ef38b5-acd4-4cdb-95df-faa370de1b07", "DetectTime": "2024-05-21T12:41:45.363258+00:00", "EventTime": "2024-05-21T12:41:45.363277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx1yqz1zhXTfIWABO4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "5d05f5cf-0aa7-46a4-bc80-78bb8b58493e", "DetectTime": "2024-05-21T12:41:45.820079+00:00", "EventTime": "2024-05-21T12:41:45.820104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2pwf3BUaU8FHvJke"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "2c2579b3-761d-425a-b4e4-dca9ca65717c", "DetectTime": "2024-05-21T12:41:45.826293+00:00", "EventTime": "2024-05-21T12:41:45.826313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCX0NQ3bTfxHy4Nrbj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "752b16da-e21e-46b5-a965-5ba803b81cda", "DetectTime": "2024-05-21T12:41:45.954142+00:00", "EventTime": "2024-05-21T12:41:45.954165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpCmv1fcRKi9dBgF8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "adc655d6-b176-468c-88da-0a60263721ed", "DetectTime": "2024-05-21T12:41:45.982697+00:00", "EventTime": "2024-05-21T12:41:45.982718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKG8Gx1O65MS9vCPQ"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 119} +{"Format": "IDEA0", "ID": "9cd18711-4f75-4d8d-80d3-99f7e638592a", "DetectTime": "2024-05-21T12:41:45.987539+00:00", "EventTime": "2024-05-21T12:41:45.987556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLguHb35KMjDiI1UA7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "ec065d50-8a31-4c5f-a9b5-c9fd45713ff8", "DetectTime": "2024-05-21T12:41:45.992347+00:00", "EventTime": "2024-05-21T12:41:45.992365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakOH92XzTVHWaQKH"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "492f26ef-0075-4e2f-83c7-54c211864ef7", "DetectTime": "2024-05-21T12:41:45.997085+00:00", "EventTime": "2024-05-21T12:41:45.997103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxCa9J3rYSxIKsDkVl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "dfdfe6ca-4134-4a13-86ad-0d7ece92bcef", "DetectTime": "2024-05-21T12:41:46.001559+00:00", "EventTime": "2024-05-21T12:41:46.001577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPyYw1D1vde1ZqxE9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "8efe346b-30f8-4035-b882-afc0823a3d27", "DetectTime": "2024-05-21T12:41:46.006221+00:00", "EventTime": "2024-05-21T12:41:46.006239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphI9cHSvi7caozzh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "0e9e3acb-8b06-4f5f-8fa6-c270efd099da", "DetectTime": "2024-05-21T12:41:46.010849+00:00", "EventTime": "2024-05-21T12:41:46.010867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpgr4V26sLUAHE1GH1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "322604bb-766e-4d9a-bb3d-c15c88468c30", "DetectTime": "2024-05-21T12:41:46.343436+00:00", "EventTime": "2024-05-21T12:41:46.343462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csc5mK1j7kSKtp32Z1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "7924237e-078a-49d6-a9b8-dec0236c3e2f", "DetectTime": "2024-05-21T12:41:46.458321+00:00", "EventTime": "2024-05-21T12:41:46.458344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccvb6j2YzvIeBYG0Od"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "d5590d27-c72d-4a56-a3da-b3abaaf2af65", "DetectTime": "2024-05-21T12:41:46.586453+00:00", "EventTime": "2024-05-21T12:41:46.586478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5gid4bVwIfwWG25j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "be8c67b9-8acd-4b39-b8a8-b4742724cfa4", "DetectTime": "2024-05-21T12:41:46.600587+00:00", "EventTime": "2024-05-21T12:41:46.600606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFHpp12eL0tOq7DuG"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "3b330c8e-2eb8-4c28-b2bf-e8105beabc25", "DetectTime": "2024-05-21T12:41:46.607309+00:00", "EventTime": "2024-05-21T12:41:46.607332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxckq1KIlp5Skz1dh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "809250c5-43e4-4909-9ad8-df2f3edd4452", "DetectTime": "2024-05-21T12:41:46.612358+00:00", "EventTime": "2024-05-21T12:41:46.612377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bxjD9HeKNzGOCk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "6f138536-ebc7-4a20-b741-1584c01740f7", "DetectTime": "2024-05-21T12:41:46.617580+00:00", "EventTime": "2024-05-21T12:41:46.617598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ6lbV3ap6oYKoV3ig"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "1107541e-35e6-4169-a4b2-34edaa4a4e2a", "DetectTime": "2024-05-21T12:41:46.622062+00:00", "EventTime": "2024-05-21T12:41:46.622080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGfEpGLQP0Nx4Wy8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "1718a165-921f-4541-9f3a-ed8f29576a01", "DetectTime": "2024-05-21T12:41:46.626787+00:00", "EventTime": "2024-05-21T12:41:46.626805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5RJ1W9QEnwyBj0e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "57f1529c-b5d8-4c1e-a966-a0f1d115e120", "DetectTime": "2024-05-21T12:41:46.631457+00:00", "EventTime": "2024-05-21T12:41:46.631475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSAXQ5uDmAXSyYP"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "5cf39289-6dc0-4bc1-a3eb-50844dc2586c", "DetectTime": "2024-05-21T12:41:46.636088+00:00", "EventTime": "2024-05-21T12:41:46.636106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2gKcbEy0ASX099bc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "e9f2773b-d733-4583-ba20-637ad7956ec2", "DetectTime": "2024-05-21T12:41:46.851231+00:00", "EventTime": "2024-05-21T12:41:46.851254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5ez42HWDz3kfmkte"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "399026b4-f6e6-407c-b415-774df611fcf0", "DetectTime": "2024-05-21T12:41:46.886876+00:00", "EventTime": "2024-05-21T12:41:46.886898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClZVdj3lCysldok3Jc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "5fb5ab3b-08bb-445b-a523-f4b1c292dd3d", "DetectTime": "2024-05-21T12:41:47.366373+00:00", "EventTime": "2024-05-21T12:41:47.366395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckd4Ea1NxIsNuTG1pl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "b1e085b0-068e-49cb-8afd-b2e45d1102b7", "DetectTime": "2024-05-21T12:41:47.406252+00:00", "EventTime": "2024-05-21T12:41:47.406273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNxpT1hHDxK9Va1gk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "1f3172d4-dda4-4eae-9045-2ed24e7051e2", "DetectTime": "2024-05-21T12:41:47.425891+00:00", "EventTime": "2024-05-21T12:41:47.425914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGza8FXHyRu97wff"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "096538c6-c3ef-4562-bac9-17e3663534bb", "DetectTime": "2024-05-21T12:41:47.522554+00:00", "EventTime": "2024-05-21T12:41:47.522574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRMLH3zbhJ53ARHF4"], "accumulated_threat_level": 8.2, "timewindow": 119} +{"Format": "IDEA0", "ID": "e6c7d03a-5e08-4097-bec8-0c4f3da721eb", "DetectTime": "2024-05-21T12:41:47.527476+00:00", "EventTime": "2024-05-21T12:41:47.527495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34kBu4blgMO4GHMd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "c1d541a2-429e-49c0-af01-3a4045eb4412", "DetectTime": "2024-05-21T12:41:47.532561+00:00", "EventTime": "2024-05-21T12:41:47.532582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4TLx44lODDFsV2Gd2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "46bd9a45-e5e3-4bb4-8138-e1e0d7fa15ce", "DetectTime": "2024-05-21T12:41:47.747201+00:00", "EventTime": "2024-05-21T12:41:47.747219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfe2Yi42hG7BQ38Rqb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "cbb0c834-9daa-4e22-a9d4-c6b5b78dbf47", "DetectTime": "2024-05-21T12:41:47.787001+00:00", "EventTime": "2024-05-21T12:41:47.787023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvRY9y1STRPTQf0Mn3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "149d80ae-fe9d-485d-bbf6-8cc5aacb1026", "DetectTime": "2024-05-21T12:41:47.822708+00:00", "EventTime": "2024-05-21T12:41:47.822732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjoXD2FcR5uGgjOH"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "1a0d5e09-3325-4a4f-b23d-d1080fa36af7", "DetectTime": "2024-05-21T12:41:47.859085+00:00", "EventTime": "2024-05-21T12:41:47.859105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzibH1VMesb3Mrvwl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "66d638c0-f176-43a6-922a-a2536bb88b70", "DetectTime": "2024-05-21T12:41:47.932955+00:00", "EventTime": "2024-05-21T12:41:47.932978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzeIV1mEYFPLw1XXh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "00883bac-836b-47df-96ae-9dd0c09ca759", "DetectTime": "2024-05-21T12:41:47.940869+00:00", "EventTime": "2024-05-21T12:41:47.940890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCKGDb4IlqWAV0i0ob"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "e8cf4c51-503c-4331-8a64-64314b568092", "DetectTime": "2024-05-21T12:41:47.954142+00:00", "EventTime": "2024-05-21T12:41:47.954162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6TIE2YmDHjJaVhI1"], "accumulated_threat_level": 9.0, "timewindow": 119} +{"Format": "IDEA0", "ID": "fdaf3e06-6ce2-4379-8b11-ebd523398d20", "DetectTime": "2024-05-21T12:41:48.033674+00:00", "EventTime": "2024-05-21T12:41:48.033697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Ic1THavXOwuX6u6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "5a932a15-53be-493c-9634-05e76552a190", "DetectTime": "2024-05-21T12:41:48.251986+00:00", "EventTime": "2024-05-21T12:41:48.252007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl8v2h4jAPqqC3pfDa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 118} +{"Format": "IDEA0", "ID": "efcde328-275c-4a7c-a666-4bdf4ca67652", "DetectTime": "2024-05-21T12:41:48.297489+00:00", "EventTime": "2024-05-21T12:41:48.297511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQXKc3h4IKUczRGX7"], "accumulated_threat_level": 9.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "b7012422-900d-41a9-994c-e91d27a98936", "DetectTime": "2024-05-21T12:41:48.339857+00:00", "EventTime": "2024-05-21T12:41:48.339878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1OZ7157crVhHIR34"], "accumulated_threat_level": 10.600000000000001, "timewindow": 119} +{"Format": "IDEA0", "ID": "b29421d7-3e8e-4262-8fe3-57211300b5fa", "DetectTime": "2024-05-21T12:41:48.387252+00:00", "EventTime": "2024-05-21T12:41:48.387277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaJG43HhTHbQJlZEf"], "accumulated_threat_level": 11.400000000000002, "timewindow": 119} +{"Format": "IDEA0", "ID": "6903db06-48f2-46e5-80b3-1d50279503f8", "DetectTime": "2024-05-21T12:41:48.435926+00:00", "EventTime": "2024-05-21T12:41:48.435945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPX0DQ2CUDjeDs0oij"], "accumulated_threat_level": 12.200000000000003, "timewindow": 119} +{"Format": "Json", "ID": "6903db06-48f2-46e5-80b3-1d50279503f8", "DetectTime": "2024-05-21T12:41:48.435926+00:00", "EventTime": "2024-05-21T12:41:48.435945+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-05T22:46:23.841338+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2024/05/21 12:41:48.730502)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 119, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "a9304fe9-f8c4-4ff7-907c-b2db4f0369e6", "DetectTime": "2024-05-21T12:41:48.742738+00:00", "EventTime": "2024-05-21T12:41:48.742761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbRJ54BNCyNQlUGTf"], "accumulated_threat_level": 0.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "f9b843bf-7639-49f6-8511-05267cf3716e", "DetectTime": "2024-05-21T12:41:48.758086+00:00", "EventTime": "2024-05-21T12:41:48.758104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvZ7N3Wv7z8BWVPk3"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "4278303a-ad0b-4baf-97e6-1f5be1ac565c", "DetectTime": "2024-05-21T12:41:48.768793+00:00", "EventTime": "2024-05-21T12:41:48.768811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6C0gG1jd1WeRKiXP6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "b79b1bf3-fb55-4b4b-bf2c-b4ed6ce0d576", "DetectTime": "2024-05-21T12:41:48.779432+00:00", "EventTime": "2024-05-21T12:41:48.779450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceoyk31cQh83FuZiRe"], "accumulated_threat_level": 3.2, "timewindow": 119} +{"Format": "IDEA0", "ID": "e378e6c0-26b3-4dab-a67c-ca2bde753375", "DetectTime": "2024-05-21T12:41:48.882024+00:00", "EventTime": "2024-05-21T12:41:48.882044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4LgG282SmbIuKVM4"], "accumulated_threat_level": 4.0, "timewindow": 119} +{"Format": "IDEA0", "ID": "408740a3-8c0a-4d78-8053-6020e164b503", "DetectTime": "2024-05-21T12:41:48.926970+00:00", "EventTime": "2024-05-21T12:41:48.926991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VGXN2RCB5cthhlVh"], "accumulated_threat_level": 4.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "dc556f00-e3d3-4d5b-85c6-e8d56362549f", "DetectTime": "2024-05-21T12:41:48.974746+00:00", "EventTime": "2024-05-21T12:41:48.974770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRW574VByHNFJG4f"], "accumulated_threat_level": 5.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "ee49459b-8012-4929-b055-33168219d85e", "DetectTime": "2024-05-21T12:41:49.020953+00:00", "EventTime": "2024-05-21T12:41:49.020971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2dRc4bhDI93ZGKEe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 119} +{"Format": "IDEA0", "ID": "e4ca6615-6e39-403e-9450-4bf8bda6b58a", "DetectTime": "2024-05-21T12:41:49.162206+00:00", "EventTime": "2024-05-21T12:41:49.162227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cdTKClpdkkosQcd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "fa753c35-8a0c-4e13-a6f0-ca72b7e2cfb1", "DetectTime": "2024-05-21T12:41:49.211118+00:00", "EventTime": "2024-05-21T12:41:49.211136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NMSb4j1zZMYSgKwf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "cc7e43ca-8ef9-499d-ae8e-b4c665eb40cf", "DetectTime": "2024-05-21T12:41:49.249590+00:00", "EventTime": "2024-05-21T12:41:49.249614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.244.90.42 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7X9NW2gbXrXv5eYZ"], "accumulated_threat_level": 7.999999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "e295614a-1948-4cd7-8ef0-c0cc5eacefc6", "DetectTime": "2024-05-21T12:41:49.289881+00:00", "EventTime": "2024-05-21T12:41:49.289902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMbNu38qELAufDHEl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 119} +{"Format": "IDEA0", "ID": "341f468b-361b-483e-bbe6-85a84dfa18d4", "DetectTime": "2024-05-21T12:41:49.551095+00:00", "EventTime": "2024-05-21T12:41:49.551115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8Lsx2kX4FHWHigw4"], "accumulated_threat_level": 9.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "6e5b360e-ebef-408b-b073-7b9e7e371d5b", "DetectTime": "2024-05-21T12:41:49.658605+00:00", "EventTime": "2024-05-21T12:41:49.658626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaN5zn1fnqYCDNcCX2"], "accumulated_threat_level": 10.4, "timewindow": 119} +{"Format": "IDEA0", "ID": "343322f8-729a-4c83-a45d-31bea8f459ae", "DetectTime": "2024-05-21T12:41:49.702472+00:00", "EventTime": "2024-05-21T12:41:49.702492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMFfgli04CQtiti2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 119} +{"Format": "IDEA0", "ID": "e8712c22-b44e-4597-a836-38dd65863bd9", "DetectTime": "2024-05-21T12:41:49.785265+00:00", "EventTime": "2024-05-21T12:41:49.785283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDTnv2CRJZK6WKJM1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 119} +{"Format": "Json", "ID": "e8712c22-b44e-4597-a836-38dd65863bd9", "DetectTime": "2024-05-21T12:41:49.785265+00:00", "EventTime": "2024-05-21T12:41:49.785283+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "1970-01-05T22:47:34.442304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 119. (real time 2024/05/21 12:41:50.027955)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 119, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c580f1be-40ba-4db6-9a4a-60dde88bc0ef", "DetectTime": "2024-05-21T12:41:50.032075+00:00", "EventTime": "2024-05-21T12:41:50.032093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.185.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrNga43X3E1LvvCW2"], "accumulated_threat_level": 0, "timewindow": 119} +{"Format": "IDEA0", "ID": "72246f38-6b7e-4e18-a39b-fe72438fd7f8", "DetectTime": "2024-05-21T12:41:50.037753+00:00", "EventTime": "2024-05-21T12:41:50.037773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.75.176.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2sIN5I6YdGgrMFEd"], "accumulated_threat_level": 0, "timewindow": 119} +{"Format": "IDEA0", "ID": "8034c5ed-7e6a-40d9-9b53-92599aef0978", "DetectTime": "2024-05-21T12:41:50.053274+00:00", "EventTime": "2024-05-21T12:41:50.053295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHuAOh2TeNr5kFzrNh"], "accumulated_threat_level": 0.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "c038e092-2cdc-4e7d-9568-087fca703051", "DetectTime": "2024-05-21T12:41:50.059440+00:00", "EventTime": "2024-05-21T12:41:50.059459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cndkvo1uvTYdYMxuEk"], "accumulated_threat_level": 0.8, "timewindow": 119} +{"Format": "IDEA0", "ID": "81b31132-eca6-4898-9268-dff22cf73655", "DetectTime": "2024-05-21T12:41:50.071238+00:00", "EventTime": "2024-05-21T12:41:50.071257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Craz5020GbVCMWMP2k"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "fc0c8b5e-3db3-40c4-aa6d-5ffdb9982244", "DetectTime": "2024-05-21T12:41:50.077167+00:00", "EventTime": "2024-05-21T12:41:50.077186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtXpLlsqM9vyivvtl", "CpFYhQeUQAXBobPTe", "CzYT2H10llf6NgHhXj", "CwlKUW3Em4czjgUhh2"], "accumulated_threat_level": 0.5, "timewindow": 120} +{"Format": "IDEA0", "ID": "73b826f1-3924-4175-80dd-d7a1fd6228cf", "DetectTime": "2024-05-21T12:41:50.228435+00:00", "EventTime": "2024-05-21T12:41:50.228457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMLOV142e6x73XfBw9"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "3c64caea-7301-4d07-b962-04037bfefcca", "DetectTime": "2024-05-21T12:41:50.264999+00:00", "EventTime": "2024-05-21T12:41:50.265022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbxvzt3jyKks5wykNe"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "8c8694f7-7b87-4d4f-a2e6-84412fb4bf43", "DetectTime": "2024-05-21T12:41:50.325009+00:00", "EventTime": "2024-05-21T12:41:50.325034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSb5Wk4ko9hHxmOLu6"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "e18d7018-e47b-4767-a3ae-087c1ad1fea0", "DetectTime": "2024-05-21T12:41:50.361214+00:00", "EventTime": "2024-05-21T12:41:50.361235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIWw2M1jAhz5RhoeSc"], "accumulated_threat_level": 1.6, "timewindow": 119} +{"Format": "IDEA0", "ID": "53dd0ce4-37cf-40c7-8225-f633b17e2789", "DetectTime": "2024-05-21T12:41:50.455194+00:00", "EventTime": "2024-05-21T12:41:50.455218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jrEElGfoEhv33Td"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "5cfde99c-8581-44d4-9de4-f31c4a31d28f", "DetectTime": "2024-05-21T12:41:50.550122+00:00", "EventTime": "2024-05-21T12:41:50.550143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCv4VQ34azYIPjnXib"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "a917f9e2-d3f7-46e9-904f-e2a7b79caf5a", "DetectTime": "2024-05-21T12:41:50.594291+00:00", "EventTime": "2024-05-21T12:41:50.594313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWP0povGoJ1cBv0d2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "6b50e3a4-42aa-46dd-aec8-3fde2f695dea", "DetectTime": "2024-05-21T12:41:50.877289+00:00", "EventTime": "2024-05-21T12:41:50.877311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChmSq74ipgHYl94l17"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "cb86a749-ea05-4174-96d1-f7492bee51bb", "DetectTime": "2024-05-21T12:41:50.886783+00:00", "EventTime": "2024-05-21T12:41:50.886806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjR9s3sL6QO4g5mVh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "5e3b9d1c-245e-402c-a965-0bfd4223c2ec", "DetectTime": "2024-05-21T12:41:50.891907+00:00", "EventTime": "2024-05-21T12:41:50.891928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiEkK5BLkrLeTRUb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "d22d4130-1488-4b44-ac93-c4ec709043d0", "DetectTime": "2024-05-21T12:41:50.897491+00:00", "EventTime": "2024-05-21T12:41:50.897512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGTj9P2dTHcyrhdkt3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "8292a192-0551-4222-bb0f-4db50e8e3cb3", "DetectTime": "2024-05-21T12:41:50.901995+00:00", "EventTime": "2024-05-21T12:41:50.902013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJASCxkOj32Qfn3L5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "2afb2927-c8b5-4390-b046-66833b2063c2", "DetectTime": "2024-05-21T12:41:51.026769+00:00", "EventTime": "2024-05-21T12:41:51.026792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7EEglAF79mZRfnb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "3aac0219-0214-42d7-9f4f-82c14dd71d79", "DetectTime": "2024-05-21T12:41:51.092799+00:00", "EventTime": "2024-05-21T12:41:51.092818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnomd2MFw9kKgECb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "68aab38f-c357-4584-9a93-da8ee81364e6", "DetectTime": "2024-05-21T12:41:51.147035+00:00", "EventTime": "2024-05-21T12:41:51.147055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iNue45bsMLzSDxP4"], "accumulated_threat_level": 1.3, "timewindow": 120} +{"Format": "IDEA0", "ID": "ea96f57f-0b97-45c9-a7b1-bb40691409a4", "DetectTime": "2024-05-21T12:41:51.184331+00:00", "EventTime": "2024-05-21T12:41:51.184352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifhPf3nlFIRqnQ8Ni"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "656cd515-786e-43e1-b5cb-936d8a9c91dd", "DetectTime": "2024-05-21T12:41:51.462902+00:00", "EventTime": "2024-05-21T12:41:51.462926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C049Si4oKFaxR0rz3a"], "accumulated_threat_level": 2.1, "timewindow": 120} +{"Format": "IDEA0", "ID": "ed937c99-b91d-4d15-b515-9f6030477a00", "DetectTime": "2024-05-21T12:41:51.493897+00:00", "EventTime": "2024-05-21T12:41:51.493918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8APNu4ZwibsD59YBf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "e9a8db92-8b23-4b36-9583-a794d1107f94", "DetectTime": "2024-05-21T12:41:51.500347+00:00", "EventTime": "2024-05-21T12:41:51.500370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviYeU1ymsf1R2CxFe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "99010f94-7f5f-490b-aa1b-47dfc1780228", "DetectTime": "2024-05-21T12:41:51.507200+00:00", "EventTime": "2024-05-21T12:41:51.507238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHUEBr4g0EVeiBrtf1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "fd38df25-fb42-4e75-aeef-f354d22b22ed", "DetectTime": "2024-05-21T12:41:51.615003+00:00", "EventTime": "2024-05-21T12:41:51.615023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoOY24khyLv9UaqS7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "119550ca-0721-4425-aba7-6036c72ba879", "DetectTime": "2024-05-21T12:41:51.671900+00:00", "EventTime": "2024-05-21T12:41:51.671921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBoLCIbvM5pzsq8l"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 120} +{"Format": "IDEA0", "ID": "c0dfc582-50c8-4609-a89b-77b789da0523", "DetectTime": "2024-05-21T12:41:51.715823+00:00", "EventTime": "2024-05-21T12:41:51.715844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3rQyynUJV1UOUX5"], "accumulated_threat_level": 3.7, "timewindow": 120} +{"Format": "IDEA0", "ID": "cec71f29-7645-498f-8e21-4a5db91187bd", "DetectTime": "2024-05-21T12:41:51.768605+00:00", "EventTime": "2024-05-21T12:41:51.768625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvZGb1SrEbCj60MEc"], "accumulated_threat_level": 4.5, "timewindow": 120} +{"Format": "IDEA0", "ID": "7ed4c2f2-6554-498a-b818-b1768a3bedc9", "DetectTime": "2024-05-21T12:41:51.991234+00:00", "EventTime": "2024-05-21T12:41:51.991255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcpjLx4a03zCHVxVrc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "bd38cf34-2026-40bf-95c9-e086f8cd20ef", "DetectTime": "2024-05-21T12:41:52.056486+00:00", "EventTime": "2024-05-21T12:41:52.056510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU4VdN2hSNd4uU5tv"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "497eb2a8-e7a1-4401-85ef-d1087d1b7d8f", "DetectTime": "2024-05-21T12:41:52.061699+00:00", "EventTime": "2024-05-21T12:41:52.061719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEJJ72n1MBitgsMS"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "1d6d271c-190e-46fe-ab46-aab4ec89bcf9", "DetectTime": "2024-05-21T12:41:52.088709+00:00", "EventTime": "2024-05-21T12:41:52.088732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C72DBX3QZgsP16fVX8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "d0a71b50-4b42-4a00-9569-9c242f7a640c", "DetectTime": "2024-05-21T12:41:52.153249+00:00", "EventTime": "2024-05-21T12:41:52.153268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgVOUk3YggP1vLKVA3"], "accumulated_threat_level": 5.3, "timewindow": 120} +{"Format": "IDEA0", "ID": "f537a9d7-83b0-40b6-a1c8-65673d5f5276", "DetectTime": "2024-05-21T12:41:52.185839+00:00", "EventTime": "2024-05-21T12:41:52.185865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36fNZ3m6hidtDpyfh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "ec0d5d3a-9991-4d07-9563-812cd5711d08", "DetectTime": "2024-05-21T12:41:52.331024+00:00", "EventTime": "2024-05-21T12:41:52.331044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYO0gB3rAU53t4RORi"], "accumulated_threat_level": 6.1, "timewindow": 120} +{"Format": "IDEA0", "ID": "d319157f-97e6-4a45-a85b-0e3a1e6d301b", "DetectTime": "2024-05-21T12:41:52.367058+00:00", "EventTime": "2024-05-21T12:41:52.367080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipM6w4WYSA0qwWh2g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "a2babbc8-61e5-4b88-b431-0eccd27ae55d", "DetectTime": "2024-05-21T12:41:52.406113+00:00", "EventTime": "2024-05-21T12:41:52.406131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGPlnA4u7VKuJPUBbj"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 120} +{"Format": "IDEA0", "ID": "dc8e5ca8-999a-4a6b-b8f7-74365b9ecf15", "DetectTime": "2024-05-21T12:41:52.643542+00:00", "EventTime": "2024-05-21T12:41:52.643562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CytB9g4F1L2ctWZO56"], "accumulated_threat_level": 7.699999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "d9b888a0-716c-41eb-9814-7671937c6f57", "DetectTime": "2024-05-21T12:41:52.701579+00:00", "EventTime": "2024-05-21T12:41:52.701601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7NFH3dQSW4eioFAb"], "accumulated_threat_level": 8.5, "timewindow": 120} +{"Format": "IDEA0", "ID": "7f6e5787-0fcd-4460-bf3f-96f0bcef9eb3", "DetectTime": "2024-05-21T12:41:52.737738+00:00", "EventTime": "2024-05-21T12:41:52.737756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5e071K5UzSVwM6d6"], "accumulated_threat_level": 9.3, "timewindow": 120} +{"Format": "IDEA0", "ID": "3b2df3ab-d326-4cf4-9393-27a699dd3cdb", "DetectTime": "2024-05-21T12:41:52.782855+00:00", "EventTime": "2024-05-21T12:41:52.782877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzABPf2ANi9AsiI057"], "accumulated_threat_level": 10.100000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "1f09bf2c-cf4d-4238-a35c-2496dfe185be", "DetectTime": "2024-05-21T12:41:52.822497+00:00", "EventTime": "2024-05-21T12:41:52.822519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnrSgD36HqIhWEFs7e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "d8de0c8d-ab45-489b-9a22-2d569e9e05d5", "DetectTime": "2024-05-21T12:41:52.864431+00:00", "EventTime": "2024-05-21T12:41:52.864454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqnhU31lR1w1T6DWYc"], "accumulated_threat_level": 10.900000000000002, "timewindow": 120} +{"Format": "IDEA0", "ID": "998e4b18-941b-4fa9-9b27-3ef036575992", "DetectTime": "2024-05-21T12:41:52.911462+00:00", "EventTime": "2024-05-21T12:41:52.911481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1RZS2DF4uJGLTXQ"], "accumulated_threat_level": 11.700000000000003, "timewindow": 120} +{"Format": "IDEA0", "ID": "40b90c22-7faf-425f-b686-083d0b440d30", "DetectTime": "2024-05-21T12:41:52.954488+00:00", "EventTime": "2024-05-21T12:41:52.954507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuT8rs4MQhkS0ky90d"], "accumulated_threat_level": 12.500000000000004, "timewindow": 120} +{"Format": "Json", "ID": "40b90c22-7faf-425f-b686-083d0b440d30", "DetectTime": "2024-05-21T12:41:52.954488+00:00", "EventTime": "2024-05-21T12:41:52.954507+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-05T23:18:22.516900+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2024/05/21 12:41:53.162730)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 120, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "db4c3cf8-039e-461a-b4d3-7b6a53a93e7e", "DetectTime": "2024-05-21T12:41:53.168131+00:00", "EventTime": "2024-05-21T12:41:53.168155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdEGUZ3rHQXbUOk3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "75c45a90-2c0d-4215-810b-9742847ddc2c", "DetectTime": "2024-05-21T12:41:53.224142+00:00", "EventTime": "2024-05-21T12:41:53.224163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCO6JK11vyvrz6tCtf"], "accumulated_threat_level": 0.8, "timewindow": 120} +{"Format": "IDEA0", "ID": "eb426a36-dde4-49ac-9f24-022d5eb457a0", "DetectTime": "2024-05-21T12:41:53.243072+00:00", "EventTime": "2024-05-21T12:41:53.243096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJf0gvP8KiV1vrhw5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "c4c52bc3-4034-44ac-8119-1de8a6865ed8", "DetectTime": "2024-05-21T12:41:53.293328+00:00", "EventTime": "2024-05-21T12:41:53.293348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cercar1DJ0LSXvY3Ml"], "accumulated_threat_level": 1.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "392f62fb-e8fd-46b0-9997-a0dae7996346", "DetectTime": "2024-05-21T12:41:53.336889+00:00", "EventTime": "2024-05-21T12:41:53.336908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKonWr4qVtOEXo2Dqj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 120} +{"Format": "IDEA0", "ID": "6f6dd1af-b0dc-44e2-b15b-6140f92e4862", "DetectTime": "2024-05-21T12:41:53.369120+00:00", "EventTime": "2024-05-21T12:41:53.369144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3tSv3i8hUvFmqJGc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "06e724df-4304-4de9-ab78-515f7768b9aa", "DetectTime": "2024-05-21T12:41:53.409056+00:00", "EventTime": "2024-05-21T12:41:53.409074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFMA7s3NLczrI2RgD9"], "accumulated_threat_level": 3.2, "timewindow": 120} +{"Format": "IDEA0", "ID": "dcad0d47-2063-4993-a628-d5c411dea82c", "DetectTime": "2024-05-21T12:41:53.452375+00:00", "EventTime": "2024-05-21T12:41:53.452397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXprAbC82cwa3rhMd"], "accumulated_threat_level": 4.0, "timewindow": 120} +{"Format": "IDEA0", "ID": "d15b02c9-6ac7-49fb-91a6-dd41d4ba46e4", "DetectTime": "2024-05-21T12:41:53.499785+00:00", "EventTime": "2024-05-21T12:41:53.499807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDDHj2hnz6PYeX0Re"], "accumulated_threat_level": 4.8, "timewindow": 120} +{"Format": "IDEA0", "ID": "8a10a741-692d-4333-9506-72ab1b874e44", "DetectTime": "2024-05-21T12:41:53.549909+00:00", "EventTime": "2024-05-21T12:41:53.549931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppVQVXUNwGY4zqza"], "accumulated_threat_level": 5.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "9f62a589-8dc1-46c7-8504-62f0472578b9", "DetectTime": "2024-05-21T12:41:53.827519+00:00", "EventTime": "2024-05-21T12:41:53.827541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpOVEfghUWJPhONZj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "eed230b0-4377-4e2f-ba88-4880e4b84c7f", "DetectTime": "2024-05-21T12:41:53.869175+00:00", "EventTime": "2024-05-21T12:41:53.869194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj54GP1VhwkWbaAAx3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 120} +{"Format": "IDEA0", "ID": "8c0fd93a-c4bf-4bb9-99fd-6602e4db9617", "DetectTime": "2024-05-21T12:41:53.916718+00:00", "EventTime": "2024-05-21T12:41:53.916736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8LAas48J9HakYDLzl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "5136973a-e95d-40e9-8a9b-4b860fcbd2b3", "DetectTime": "2024-05-21T12:41:53.956207+00:00", "EventTime": "2024-05-21T12:41:53.956228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDCpDx1s6SnknDpjH"], "accumulated_threat_level": 7.999999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "4130fb57-8795-4302-a131-77d25969b561", "DetectTime": "2024-05-21T12:41:53.991270+00:00", "EventTime": "2024-05-21T12:41:53.991294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTv71i1A1FiErIt0g6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "bcf34890-f030-4a50-927d-1e329beaf0eb", "DetectTime": "2024-05-21T12:41:54.028744+00:00", "EventTime": "2024-05-21T12:41:54.028763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEOTK71lkSDvgJmtNk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "d0aa3eed-c24c-467c-8a00-7fa6b5246be1", "DetectTime": "2024-05-21T12:41:54.071208+00:00", "EventTime": "2024-05-21T12:41:54.071226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKl8j1lkTOQ2riwb7"], "accumulated_threat_level": 9.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "26c5438e-5087-4e05-b262-7af8ebc64e8c", "DetectTime": "2024-05-21T12:41:54.114859+00:00", "EventTime": "2024-05-21T12:41:54.114878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMCkpX1oIth230gi"], "accumulated_threat_level": 10.4, "timewindow": 120} +{"Format": "IDEA0", "ID": "87a2c6ad-30aa-4083-a921-fcbe86a65692", "DetectTime": "2024-05-21T12:41:54.347520+00:00", "EventTime": "2024-05-21T12:41:54.347541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zPFnrKYIW2aJzF"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "663d98fa-4fa2-42b5-ac9a-5e075d85801f", "DetectTime": "2024-05-21T12:41:54.397182+00:00", "EventTime": "2024-05-21T12:41:54.397206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "Connection to unknown destination port 6713/UDP destination IP 69.248.108.82. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXevU1RD7n3uApQwg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 120} +{"Format": "Json", "ID": "663d98fa-4fa2-42b5-ac9a-5e075d85801f", "DetectTime": "2024-05-21T12:41:54.397182+00:00", "EventTime": "2024-05-21T12:41:54.397206+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.248.108.82"]}], "Attach": [{"Content": "1970-01-05T23:18:26.238771+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2024/05/21 12:41:54.562568)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 120, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "21a9b5a4-cde6-44e9-b4cf-c251ec01000a", "DetectTime": "2024-05-21T12:41:54.573977+00:00", "EventTime": "2024-05-21T12:41:54.573995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgkFUc2mKbfr2XAvo3"], "accumulated_threat_level": 0.8, "timewindow": 120} +{"Format": "IDEA0", "ID": "9ffab713-0f8d-48b9-b73f-3d6b1f59ed6a", "DetectTime": "2024-05-21T12:41:54.578988+00:00", "EventTime": "2024-05-21T12:41:54.579006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chzo9p4awpLoyeAOle"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "cfffb60d-8599-4fd9-8526-a4cf1d2d63cb", "DetectTime": "2024-05-21T12:41:54.619244+00:00", "EventTime": "2024-05-21T12:41:54.619264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fQse4K1nvx2FUZT6"], "accumulated_threat_level": 1.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "b6139d49-8955-43fe-a273-9136f357d5e7", "DetectTime": "2024-05-21T12:41:54.663379+00:00", "EventTime": "2024-05-21T12:41:54.663397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxj5rw3ErUJN56CGmi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 120} +{"Format": "IDEA0", "ID": "31e79520-4d7f-4417-b364-854753317db9", "DetectTime": "2024-05-21T12:41:54.709432+00:00", "EventTime": "2024-05-21T12:41:54.709454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Gn6C3Cee4nXMGIpd"], "accumulated_threat_level": 3.2, "timewindow": 120} +{"Format": "IDEA0", "ID": "122d35cb-02fc-4916-8105-8568c5a674a9", "DetectTime": "2024-05-21T12:41:54.758818+00:00", "EventTime": "2024-05-21T12:41:54.758838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CceLZc2IvlPkMQ4xB4"], "accumulated_threat_level": 4.0, "timewindow": 120} +{"Format": "IDEA0", "ID": "b658ccac-a3aa-4bd6-a36b-49b6d163171b", "DetectTime": "2024-05-21T12:41:54.806450+00:00", "EventTime": "2024-05-21T12:41:54.806473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUx6AE30jybdUk5ODd"], "accumulated_threat_level": 4.8, "timewindow": 120} +{"Format": "IDEA0", "ID": "44c7ffc7-980f-4857-beb5-23b52acdee84", "DetectTime": "2024-05-21T12:41:55.033116+00:00", "EventTime": "2024-05-21T12:41:55.033140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNOby2QHTVyzbfxjj"], "accumulated_threat_level": 5.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "fe19877c-1578-4ef7-bcb4-9eaff767b15a", "DetectTime": "2024-05-21T12:41:55.079680+00:00", "EventTime": "2024-05-21T12:41:55.079703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdtn04KKbY1NDjPsj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 120} +{"Format": "IDEA0", "ID": "dcc99259-b9d0-403e-b51a-025a245312da", "DetectTime": "2024-05-21T12:41:55.126186+00:00", "EventTime": "2024-05-21T12:41:55.126207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmWClz0cdcqF941k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "e4de8600-8bb6-4e8d-986b-bb2470852416", "DetectTime": "2024-05-21T12:41:55.175473+00:00", "EventTime": "2024-05-21T12:41:55.175490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTdDn3sqFcRHiPFUd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "b6d2b067-b6c4-45a3-aeb0-1b03520345c4", "DetectTime": "2024-05-21T12:41:55.211405+00:00", "EventTime": "2024-05-21T12:41:55.211423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2lEt2FJx7FCuf0sh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "79256535-47bc-4818-bad8-0a77cadf3640", "DetectTime": "2024-05-21T12:41:55.257027+00:00", "EventTime": "2024-05-21T12:41:55.257052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hg743hXEf9ePGJ4b"], "accumulated_threat_level": 8.799999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "2af6dd3a-ef3e-4983-b878-c0e46ee2acd5", "DetectTime": "2024-05-21T12:41:55.301652+00:00", "EventTime": "2024-05-21T12:41:55.301670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGkpo36y3kpj68lE8"], "accumulated_threat_level": 9.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "9e23d4ee-1ee4-43b2-bac8-27ab4397160e", "DetectTime": "2024-05-21T12:41:55.528426+00:00", "EventTime": "2024-05-21T12:41:55.528458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2VNsGRoNSaE21y8"], "accumulated_threat_level": 10.4, "timewindow": 120} +{"Format": "IDEA0", "ID": "635fa51d-9713-4a4a-9aec-adc74aa69ede", "DetectTime": "2024-05-21T12:41:55.613606+00:00", "EventTime": "2024-05-21T12:41:55.613641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1ek526TJ6AClEbg9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "3f99a8dc-4a2e-4a92-8a34-95aca64f6e5c", "DetectTime": "2024-05-21T12:41:55.658937+00:00", "EventTime": "2024-05-21T12:41:55.658972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNC9krBfNLRjz3wb4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 120} +{"Format": "Json", "ID": "3f99a8dc-4a2e-4a92-8a34-95aca64f6e5c", "DetectTime": "2024-05-21T12:41:55.658937+00:00", "EventTime": "2024-05-21T12:41:55.658972+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-05T23:49:00.406404+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 120. (real time 2024/05/21 12:41:55.858443)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 120, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "82860b97-73e0-49f5-9bce-c8f50fed6e3b", "DetectTime": "2024-05-21T12:41:55.873758+00:00", "EventTime": "2024-05-21T12:41:55.873779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMRpp1DgR5AufOYih"], "accumulated_threat_level": 0.8, "timewindow": 120} +{"Format": "IDEA0", "ID": "1fa11eee-8ac3-4655-b5a0-aef7a66d2d37", "DetectTime": "2024-05-21T12:41:55.884864+00:00", "EventTime": "2024-05-21T12:41:55.884882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XQbX2ij5fsSQ3l28"], "accumulated_threat_level": 1.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "8faaceb8-0c5b-4a2d-8341-5ba8f0dc5426", "DetectTime": "2024-05-21T12:41:55.889875+00:00", "EventTime": "2024-05-21T12:41:55.889899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXILszPp3vZQCSSl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "af5f1657-79bb-44ca-88cd-d7690b89a643", "DetectTime": "2024-05-21T12:41:55.901536+00:00", "EventTime": "2024-05-21T12:41:55.901556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iHKl4gBwADeU0B32"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 120} +{"Format": "IDEA0", "ID": "dcba6e23-00bf-4c96-be87-bf47be6ad750", "DetectTime": "2024-05-21T12:41:55.912729+00:00", "EventTime": "2024-05-21T12:41:55.912748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrub24MIGSBO4aSYf"], "accumulated_threat_level": 3.2, "timewindow": 120} +{"Format": "IDEA0", "ID": "deab8bdf-fe48-46d2-bf92-8ce5b81e1849", "DetectTime": "2024-05-21T12:41:55.924237+00:00", "EventTime": "2024-05-21T12:41:55.924261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjsRKBSyqov9GbO1"], "accumulated_threat_level": 4.0, "timewindow": 120} +{"Format": "IDEA0", "ID": "65d735d8-e96b-4a71-85ab-e04c8e86afa3", "DetectTime": "2024-05-21T12:41:56.163151+00:00", "EventTime": "2024-05-21T12:41:56.163175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD0c26Rx4eNMAKQD6"], "accumulated_threat_level": 4.8, "timewindow": 120} +{"Format": "IDEA0", "ID": "f068df98-a54e-47c0-9041-1d1baba61409", "DetectTime": "2024-05-21T12:41:56.209893+00:00", "EventTime": "2024-05-21T12:41:56.209914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTUxB2qGieYcMzsai"], "accumulated_threat_level": 5.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "d0e781ce-64aa-47bf-9d83-ecc3cd2b25e7", "DetectTime": "2024-05-21T12:41:56.258090+00:00", "EventTime": "2024-05-21T12:41:56.258113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjwSE2Iv6DQHkqmq4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 120} +{"Format": "IDEA0", "ID": "a0ec02b4-42f8-4f93-a77f-6da82f161dca", "DetectTime": "2024-05-21T12:41:56.309496+00:00", "EventTime": "2024-05-21T12:41:56.309514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQsJhU2HadwMjXoFn1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "9f6f718a-e463-40d3-85e3-aac3b5468064", "DetectTime": "2024-05-21T12:41:56.349088+00:00", "EventTime": "2024-05-21T12:41:56.349109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["212.231.214.106"]}], "Attach": [{"Content": "Connection to unknown destination port 3015/UDP destination IP 212.231.214.106. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7fBaJxHOb7SghWl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "351db069-4b37-4b17-8ad0-9a89997de5e0", "DetectTime": "2024-05-21T12:41:56.394988+00:00", "EventTime": "2024-05-21T12:41:56.395006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiK0530b8CZ0UdJg9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 120} +{"Format": "IDEA0", "ID": "357d2224-92ce-4b6a-bbaf-3c09db5d221c", "DetectTime": "2024-05-21T12:41:56.440870+00:00", "EventTime": "2024-05-21T12:41:56.440891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMZto4DjUIRjPd8Sh"], "accumulated_threat_level": 9.6, "timewindow": 120} +{"Format": "IDEA0", "ID": "f218b16b-7a64-4024-962f-392d17d46a23", "DetectTime": "2024-05-21T12:41:56.499772+00:00", "EventTime": "2024-05-21T12:41:56.499803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWVxjgiYeN5Fw6LIl"], "accumulated_threat_level": 10.4, "timewindow": 120} +{"Format": "IDEA0", "ID": "13559687-09ea-474e-bfb8-6c02240bc112", "DetectTime": "2024-05-21T12:41:56.756042+00:00", "EventTime": "2024-05-21T12:41:56.756079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMW0i3vAkljG2XSf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "cfc7c8c5-d051-4c8f-b233-303da04ecf97", "DetectTime": "2024-05-21T12:41:56.916527+00:00", "EventTime": "2024-05-21T12:41:56.916548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphNtKOPm3in9ukOh"], "accumulated_threat_level": 0.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "229589a6-dbee-4d2f-965d-5fa4778266e9", "DetectTime": "2024-05-21T12:41:57.079437+00:00", "EventTime": "2024-05-21T12:41:57.079457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbt1C3KIEIxHL8uAd"], "accumulated_threat_level": 1.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "07e663dc-102f-4276-ab89-607fc0db7610", "DetectTime": "2024-05-21T12:41:57.137386+00:00", "EventTime": "2024-05-21T12:41:57.137403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQnUe2jPO7WvxRM65"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 121} +{"Format": "IDEA0", "ID": "1d39521d-32d1-44bb-acfc-1a27a1865c7b", "DetectTime": "2024-05-21T12:41:57.181942+00:00", "EventTime": "2024-05-21T12:41:57.181960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8bjl3zCbMBZ9cjA3"], "accumulated_threat_level": 3.2, "timewindow": 121} +{"Format": "IDEA0", "ID": "ed1ff19f-1a83-4713-bb73-81216d6e5d3b", "DetectTime": "2024-05-21T12:41:57.228763+00:00", "EventTime": "2024-05-21T12:41:57.228780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTb524wwrUgx3b99g"], "accumulated_threat_level": 4.0, "timewindow": 121} +{"Format": "IDEA0", "ID": "fb7fd520-fec2-4d2a-bab8-0c884abfe194", "DetectTime": "2024-05-21T12:41:57.277343+00:00", "EventTime": "2024-05-21T12:41:57.277364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzGmX2jVkXRCO2v5e"], "accumulated_threat_level": 4.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "595abede-e5a9-4239-baf7-33dc856ee925", "DetectTime": "2024-05-21T12:41:57.333660+00:00", "EventTime": "2024-05-21T12:41:57.333678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrZQz2WYcrKtn6H9d"], "accumulated_threat_level": 5.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "336c211a-42ed-4287-8726-675100a57dab", "DetectTime": "2024-05-21T12:41:57.367482+00:00", "EventTime": "2024-05-21T12:41:57.367501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKd0Me1yzXb6OPFUd5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 121} +{"Format": "IDEA0", "ID": "e85ef6c8-6735-44a5-b091-014cc613d2f0", "DetectTime": "2024-05-21T12:41:57.603412+00:00", "EventTime": "2024-05-21T12:41:57.603448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHt5Sh2gFvcgcIT0K4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "7fff10eb-73d3-4594-8c43-c60f27641d57", "DetectTime": "2024-05-21T12:41:57.649515+00:00", "EventTime": "2024-05-21T12:41:57.649551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3UqRF23LNuuY09snk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c49916ff-a1af-42ef-9311-cfeaba68dd46", "DetectTime": "2024-05-21T12:41:57.696594+00:00", "EventTime": "2024-05-21T12:41:57.696634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDa6e53N87Vuz26xL"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "b0a6b43f-865c-47c9-aeb0-632b0b0be34b", "DetectTime": "2024-05-21T12:41:57.747395+00:00", "EventTime": "2024-05-21T12:41:57.747427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrhH21XonGQD2ULv6"], "accumulated_threat_level": 9.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "6586a1b7-6dff-4a0a-955f-82b8a50bdc74", "DetectTime": "2024-05-21T12:41:57.785185+00:00", "EventTime": "2024-05-21T12:41:57.785206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.161.181 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiA3qb15iwcP0ZZ09h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "d0afeb3d-a4c7-475c-8080-1abb528008db", "DetectTime": "2024-05-21T12:41:57.823584+00:00", "EventTime": "2024-05-21T12:41:57.823615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQkwjT5RcIvDWi5"], "accumulated_threat_level": 10.4, "timewindow": 121} +{"Format": "IDEA0", "ID": "f7808cfb-ba36-4ce7-9887-896b67fa05ce", "DetectTime": "2024-05-21T12:41:57.872751+00:00", "EventTime": "2024-05-21T12:41:57.872782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8G4SFuC8YiNSHpDk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 121} +{"Format": "IDEA0", "ID": "565dc0d0-2638-4140-af5d-5d35bf096e7c", "DetectTime": "2024-05-21T12:41:57.919658+00:00", "EventTime": "2024-05-21T12:41:57.919680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUPKn11ZrnYO0IDDb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 121} +{"Format": "Json", "ID": "565dc0d0-2638-4140-af5d-5d35bf096e7c", "DetectTime": "2024-05-21T12:41:57.919658+00:00", "EventTime": "2024-05-21T12:41:57.919680+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-06T00:20:25.787207+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2024/05/21 12:41:58.075332)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 121, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "be29dd93-13c0-421d-aaa5-0c11cf669964", "DetectTime": "2024-05-21T12:41:58.088590+00:00", "EventTime": "2024-05-21T12:41:58.088607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WkAg2MCbBA9LIrW7"], "accumulated_threat_level": 0.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "2517cde7-ecea-4253-966c-5b72a14705b2", "DetectTime": "2024-05-21T12:41:58.204119+00:00", "EventTime": "2024-05-21T12:41:58.204142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCQhb1qNQrYePXVfd"], "accumulated_threat_level": 1.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "02ef8374-b909-4756-aaca-45efb4d830af", "DetectTime": "2024-05-21T12:41:58.268780+00:00", "EventTime": "2024-05-21T12:41:58.268811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAY262V8hlt0CAhjl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 121} +{"Format": "IDEA0", "ID": "da12dabf-0b5b-4e39-8adc-2f504a2d5cdd", "DetectTime": "2024-05-21T12:41:58.297411+00:00", "EventTime": "2024-05-21T12:41:58.297429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8Q7e4RV8woarcf3i"], "accumulated_threat_level": 3.2, "timewindow": 121} +{"Format": "IDEA0", "ID": "d3dcb412-58b8-4e1d-9fcc-33cbd14cbe09", "DetectTime": "2024-05-21T12:41:58.341960+00:00", "EventTime": "2024-05-21T12:41:58.341982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNYXT1ypzZ2Hd6RB7"], "accumulated_threat_level": 4.0, "timewindow": 121} +{"Format": "IDEA0", "ID": "7d6587a7-dbdd-4225-aef1-19bb0d9428af", "DetectTime": "2024-05-21T12:41:58.386522+00:00", "EventTime": "2024-05-21T12:41:58.386550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZOtHG3JIRX4zEOZVh"], "accumulated_threat_level": 4.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "2671774d-e0e2-4cd8-aa2b-b5d9ad738c65", "DetectTime": "2024-05-21T12:41:58.431595+00:00", "EventTime": "2024-05-21T12:41:58.431624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcbX01tntGEm8YO24"], "accumulated_threat_level": 5.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "77ecdeb5-3a12-4be4-878d-9e80d5011d30", "DetectTime": "2024-05-21T12:41:58.482403+00:00", "EventTime": "2024-05-21T12:41:58.482444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldNEG7aIgkCfkRI6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 121} +{"Format": "IDEA0", "ID": "04eb9266-c992-4ef6-b34b-5895e6b97b1c", "DetectTime": "2024-05-21T12:41:58.521237+00:00", "EventTime": "2024-05-21T12:41:58.521274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTtcjNwVSGlvtOHY2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "82a6aaed-580a-42f0-9e8e-6573a152873b", "DetectTime": "2024-05-21T12:41:58.567142+00:00", "EventTime": "2024-05-21T12:41:58.567188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTI8j4CmZgIS0n7p"], "accumulated_threat_level": 7.199999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c88520e5-03b9-4a62-b479-e1700fce329f", "DetectTime": "2024-05-21T12:41:58.682749+00:00", "EventTime": "2024-05-21T12:41:58.682768+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["181.117.66.104"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.117.66.104 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgkhl71KQas8lRLFnh"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "0fd5a8c3-8a9a-4365-88fd-19864a19dfee", "DetectTime": "2024-05-21T12:41:58.695169+00:00", "EventTime": "2024-05-21T12:41:58.695195+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["181.117.66.104"]}], "Attach": [{"Content": "connection to blacklisted IP: 181.117.66.104 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgkhl71KQas8lRLFnh"], "accumulated_threat_level": 3.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "2a9b7a89-bd55-401f-bc12-82660673deac", "DetectTime": "2024-05-21T12:41:58.812872+00:00", "EventTime": "2024-05-21T12:41:58.812890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWmPlO1oKrYOI1YH9", "CLqlHl2cTIzfvkXg0c", "CBwTnH1sglyFrB4fH8", "CwVRGu4CSVE9ugw5Qi"], "accumulated_threat_level": 7.699999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "8d64b9c7-97fc-4d49-be81-dbc4aec8fb9f", "DetectTime": "2024-05-21T12:41:58.835432+00:00", "EventTime": "2024-05-21T12:41:58.835451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPdkLKAECHzl9f2Fa"], "accumulated_threat_level": 8.5, "timewindow": 121} +{"Format": "IDEA0", "ID": "50370a0a-7a6a-41b9-bae3-b7d1d9e4b8ed", "DetectTime": "2024-05-21T12:41:58.889856+00:00", "EventTime": "2024-05-21T12:41:58.889880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN425P1JQkLgbg1lck"], "accumulated_threat_level": 9.3, "timewindow": 121} +{"Format": "IDEA0", "ID": "f8bfbff0-d3b5-49e0-95e7-de0d4a2b9b40", "DetectTime": "2024-05-21T12:41:58.934962+00:00", "EventTime": "2024-05-21T12:41:58.934989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90m4QoVUCjlG13hd"], "accumulated_threat_level": 10.100000000000001, "timewindow": 121} +{"Format": "IDEA0", "ID": "7e75cee5-ee46-4421-a54a-6463f5ad8af7", "DetectTime": "2024-05-21T12:41:58.982141+00:00", "EventTime": "2024-05-21T12:41:58.982168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7VMk42KSAXzWVri7"], "accumulated_threat_level": 10.900000000000002, "timewindow": 121} +{"Format": "IDEA0", "ID": "0b750cd6-cd30-418a-9ffa-c686476fe010", "DetectTime": "2024-05-21T12:41:59.030537+00:00", "EventTime": "2024-05-21T12:41:59.030572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuSfS3Zhr950mMIS4"], "accumulated_threat_level": 11.700000000000003, "timewindow": 121} +{"Format": "IDEA0", "ID": "2d5740e7-9e24-4eb8-817b-675266d41154", "DetectTime": "2024-05-21T12:41:59.288214+00:00", "EventTime": "2024-05-21T12:41:59.288236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmNgrQnb24g49EA3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "d0b88b45-c250-4b50-9071-8b6074e6790f", "DetectTime": "2024-05-21T12:41:59.964835+00:00", "EventTime": "2024-05-21T12:41:59.964861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVA382FGsrCbOsIMg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "4b323bce-e915-4336-a15a-90c97c669946", "DetectTime": "2024-05-21T12:42:00.268847+00:00", "EventTime": "2024-05-21T12:42:00.268868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VJlL33hwhqiy3nwg"], "accumulated_threat_level": 12.500000000000004, "timewindow": 121} +{"Format": "Json", "ID": "4b323bce-e915-4336-a15a-90c97c669946", "DetectTime": "2024-05-21T12:42:00.268847+00:00", "EventTime": "2024-05-21T12:42:00.268868+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-06T00:52:16.703140+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2024/05/21 12:42:00.466697)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 121, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "2dfa20e3-871c-4d36-93a9-ac9ccf22d40d", "DetectTime": "2024-05-21T12:42:00.494342+00:00", "EventTime": "2024-05-21T12:42:00.494366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cija5S2isDiIcz56oi"], "accumulated_threat_level": 0.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "ee02da93-c4c6-448b-9810-55591d614a8d", "DetectTime": "2024-05-21T12:42:00.541959+00:00", "EventTime": "2024-05-21T12:42:00.541981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTvld3ngXI52mMEt"], "accumulated_threat_level": 1.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "d57db652-7c9a-4b8c-857c-fd558e6e64da", "DetectTime": "2024-05-21T12:42:00.599470+00:00", "EventTime": "2024-05-21T12:42:00.599499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgJ4p1Sh59UucKRI"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 121} +{"Format": "IDEA0", "ID": "e47400e2-42ac-4d6e-8332-921104d2a460", "DetectTime": "2024-05-21T12:42:00.647005+00:00", "EventTime": "2024-05-21T12:42:00.647028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGPBe3rIS2aczrlT8"], "accumulated_threat_level": 3.2, "timewindow": 121} +{"Format": "IDEA0", "ID": "53d464d2-a516-4724-a44e-9657f9b98498", "DetectTime": "2024-05-21T12:42:00.847535+00:00", "EventTime": "2024-05-21T12:42:00.847559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBAgpqLdPyuNebFyj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "24c88660-b398-443a-af0c-6e9675852211", "DetectTime": "2024-05-21T12:42:00.887453+00:00", "EventTime": "2024-05-21T12:42:00.887473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0Ca34QqEnaLbEapc"], "accumulated_threat_level": 4.0, "timewindow": 121} +{"Format": "IDEA0", "ID": "67174a7d-88f6-41e7-84a8-e2d130d0acd2", "DetectTime": "2024-05-21T12:42:00.956887+00:00", "EventTime": "2024-05-21T12:42:00.956907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxnzAl2p364MWMgqld"], "accumulated_threat_level": 4.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "7a35d092-f220-4963-82a2-0c42bd16f87b", "DetectTime": "2024-05-21T12:42:01.003356+00:00", "EventTime": "2024-05-21T12:42:01.003379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeObdC4peyu9MHg2b6"], "accumulated_threat_level": 5.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "2a28e1b6-c4b7-4ea0-8f39-3f27972cef8f", "DetectTime": "2024-05-21T12:42:01.059182+00:00", "EventTime": "2024-05-21T12:42:01.059201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANAVdsleaeV1pavh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 121} +{"Format": "IDEA0", "ID": "90f368eb-7f60-4c73-8f3c-2cffc94485b3", "DetectTime": "2024-05-21T12:42:01.296829+00:00", "EventTime": "2024-05-21T12:42:01.296851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrTzk3AeIU3NLawe7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "fc070b6e-6aa4-4850-9b7a-7cd582798581", "DetectTime": "2024-05-21T12:42:01.341843+00:00", "EventTime": "2024-05-21T12:42:01.341866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.117.252.6"]}], "Attach": [{"Content": "Connection to unknown destination port 26750/UDP destination IP 2.117.252.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVuIWr3UVwSE8v4Tp4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "ce79a9f9-b8a3-4936-8f36-303c1e8b4b6c", "DetectTime": "2024-05-21T12:42:01.389272+00:00", "EventTime": "2024-05-21T12:42:01.389295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csne8y4bhV3iswHL1f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "89d580c9-4124-4a82-8456-07bc8045301a", "DetectTime": "2024-05-21T12:42:01.434250+00:00", "EventTime": "2024-05-21T12:42:01.434272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ypED274SijiZmbt9"], "accumulated_threat_level": 9.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "3cf3ad25-6ab0-4f1c-a681-e69774fb3ce4", "DetectTime": "2024-05-21T12:42:01.490428+00:00", "EventTime": "2024-05-21T12:42:01.490451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr26p41A3Pdz0A0k4"], "accumulated_threat_level": 10.4, "timewindow": 121} +{"Format": "IDEA0", "ID": "bb066974-8b75-43ee-b88f-e7093c2cc2ed", "DetectTime": "2024-05-21T12:42:01.535448+00:00", "EventTime": "2024-05-21T12:42:01.535470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKG8Gx1O65MS9vCPQ"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "b419fb57-fb18-4979-8a01-74cb20b6fc47", "DetectTime": "2024-05-21T12:42:01.575456+00:00", "EventTime": "2024-05-21T12:42:01.575476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEyr3i3iqKXc0Ehln9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 121} +{"Format": "IDEA0", "ID": "21b87a81-d64b-487a-a1b1-01938525f14c", "DetectTime": "2024-05-21T12:42:01.832195+00:00", "EventTime": "2024-05-21T12:42:01.832223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtaUO448qYZ8xW4u0k"], "accumulated_threat_level": 12.000000000000002, "timewindow": 121} +{"Format": "Json", "ID": "21b87a81-d64b-487a-a1b1-01938525f14c", "DetectTime": "2024-05-21T12:42:01.832195+00:00", "EventTime": "2024-05-21T12:42:01.832223+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "1970-01-06T00:51:48.144100+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 121. (real time 2024/05/21 12:42:02.031384)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 121, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "348c2964-7346-485a-8629-fac45c0c1911", "DetectTime": "2024-05-21T12:42:02.106943+00:00", "EventTime": "2024-05-21T12:42:02.106961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46N9Z19AODV3WDaNc"], "accumulated_threat_level": 0.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "b3aa0239-d272-48ac-ab01-ad5cd5ebadc8", "DetectTime": "2024-05-21T12:42:02.117687+00:00", "EventTime": "2024-05-21T12:42:02.117705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCtrap4Cyx2RO2C4qc"], "accumulated_threat_level": 1.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "3c1f64e3-a9fb-4da5-ac34-e75780aed627", "DetectTime": "2024-05-21T12:42:02.128452+00:00", "EventTime": "2024-05-21T12:42:02.128486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CArytZ1UkHNOYDON0e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 121} +{"Format": "IDEA0", "ID": "0580265f-1ce3-4282-8937-1e4d2ee9721a", "DetectTime": "2024-05-21T12:42:02.141088+00:00", "EventTime": "2024-05-21T12:42:02.141107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGDwY1Fa7UHwPKru7"], "accumulated_threat_level": 3.2, "timewindow": 121} +{"Format": "IDEA0", "ID": "3be2f4df-f8da-44c4-8b70-9b69e32eb3cd", "DetectTime": "2024-05-21T12:42:02.151990+00:00", "EventTime": "2024-05-21T12:42:02.152008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtIEy2eITgf38ymg5"], "accumulated_threat_level": 4.0, "timewindow": 121} +{"Format": "IDEA0", "ID": "a8c88508-9912-43cd-8e82-0861baaf4eeb", "DetectTime": "2024-05-21T12:42:02.207401+00:00", "EventTime": "2024-05-21T12:42:02.207421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWpXFLQ93jmX82Fzg"], "accumulated_threat_level": 4.8, "timewindow": 121} +{"Format": "IDEA0", "ID": "d001f84a-565f-412e-9e24-fbc618689739", "DetectTime": "2024-05-21T12:42:02.266011+00:00", "EventTime": "2024-05-21T12:42:02.266032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CekZxJ2ImSxuFkNUz1"], "accumulated_threat_level": 5.6, "timewindow": 121} +{"Format": "IDEA0", "ID": "d57aa90c-1056-4525-b894-5f2eaa3e3f4d", "DetectTime": "2024-05-21T12:42:02.325669+00:00", "EventTime": "2024-05-21T12:42:02.325689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCvfhi3xWSPqmPjQV8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 121} +{"Format": "IDEA0", "ID": "0da5dc32-f4c1-4ada-b9ee-3a30866f8788", "DetectTime": "2024-05-21T12:42:02.566953+00:00", "EventTime": "2024-05-21T12:42:02.566981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJImXR1wbYP1jRl9j9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "177531a6-9c69-4c71-9a35-961a9f326034", "DetectTime": "2024-05-21T12:42:02.612041+00:00", "EventTime": "2024-05-21T12:42:02.612068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEqZDBcxkKSbrZ7ic"], "accumulated_threat_level": 7.999999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "25a687e8-a607-450b-b28d-9323b801d1b1", "DetectTime": "2024-05-21T12:42:02.658125+00:00", "EventTime": "2024-05-21T12:42:02.658169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZ5eHqv4Rp8j6Cp"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "93d2f73e-144e-4e0a-838e-14f91978a5e4", "DetectTime": "2024-05-21T12:42:02.843112+00:00", "EventTime": "2024-05-21T12:42:02.843135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRMLH3zbhJ53ARHF4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "eefec1c2-a7a6-436d-aa54-a3bdc11d56af", "DetectTime": "2024-05-21T12:42:02.896418+00:00", "EventTime": "2024-05-21T12:42:02.896459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXz7nP2WYfgRzVo3Df"], "accumulated_threat_level": 0.8, "timewindow": 122} +{"Format": "IDEA0", "ID": "c552cbee-3410-43ec-b52f-c65579c6a409", "DetectTime": "2024-05-21T12:42:03.240703+00:00", "EventTime": "2024-05-21T12:42:03.240721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMGE2S3WWPKaJt32B6"], "accumulated_threat_level": 1.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "b7e21c94-0b9f-49b9-8474-2186fbb6bff0", "DetectTime": "2024-05-21T12:42:03.276479+00:00", "EventTime": "2024-05-21T12:42:03.276502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6TIE2YmDHjJaVhI1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "b0e56fd1-576b-4dde-96df-92e59911f730", "DetectTime": "2024-05-21T12:42:03.321345+00:00", "EventTime": "2024-05-21T12:42:03.321363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0h8fp4rHDss9Uwzgk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 122} +{"Format": "IDEA0", "ID": "b02208fd-37da-46ae-aef5-97c697c4745d", "DetectTime": "2024-05-21T12:42:03.599042+00:00", "EventTime": "2024-05-21T12:42:03.599061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPX0DQ2CUDjeDs0oij"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "f5f2985e-bf59-4e7b-b602-40fc2e7e7dcc", "DetectTime": "2024-05-21T12:42:03.605073+00:00", "EventTime": "2024-05-21T12:42:03.605093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbRJ54BNCyNQlUGTf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "9c07150e-ff61-45e5-ad89-63e2d48e85ef", "DetectTime": "2024-05-21T12:42:03.610910+00:00", "EventTime": "2024-05-21T12:42:03.610930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV1OZ7157crVhHIR34"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "1b6b6f2c-8e14-4339-9a30-50599c7c168e", "DetectTime": "2024-05-21T12:42:03.617080+00:00", "EventTime": "2024-05-21T12:42:03.617102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaJG43HhTHbQJlZEf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "603c17a3-c481-4a5b-a9bf-9c087f0a187e", "DetectTime": "2024-05-21T12:42:03.634403+00:00", "EventTime": "2024-05-21T12:42:03.634444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQXKc3h4IKUczRGX7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "2fc8b668-c00e-4f9c-aceb-25370a53eb98", "DetectTime": "2024-05-21T12:42:03.838240+00:00", "EventTime": "2024-05-21T12:42:03.838263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sckzbrngwBQ6qy2"], "accumulated_threat_level": 3.2, "timewindow": 122} +{"Format": "IDEA0", "ID": "7ec1b4ec-b48a-4560-9f80-481668c25262", "DetectTime": "2024-05-21T12:42:03.845526+00:00", "EventTime": "2024-05-21T12:42:03.845545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMvZ7N3Wv7z8BWVPk3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "eade6e85-c196-41d0-859b-1c416649f6c2", "DetectTime": "2024-05-21T12:42:03.850454+00:00", "EventTime": "2024-05-21T12:42:03.850474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6C0gG1jd1WeRKiXP6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "07804c07-64ba-4973-ad83-dbbc72c23554", "DetectTime": "2024-05-21T12:42:04.118005+00:00", "EventTime": "2024-05-21T12:42:04.118027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2dRc4bhDI93ZGKEe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "bd70b837-9313-4b3b-912c-a3fab4e2f8b0", "DetectTime": "2024-05-21T12:42:04.129788+00:00", "EventTime": "2024-05-21T12:42:04.129807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDkuytIVfANAXVhi"], "accumulated_threat_level": 4.0, "timewindow": 122} +{"Format": "IDEA0", "ID": "25b0e88a-caf5-4b88-929e-30311100efb6", "DetectTime": "2024-05-21T12:42:04.134754+00:00", "EventTime": "2024-05-21T12:42:04.134773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4LgG282SmbIuKVM4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "0a305933-afad-4323-ac1b-784b7334e9e1", "DetectTime": "2024-05-21T12:42:04.156341+00:00", "EventTime": "2024-05-21T12:42:04.156363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRW574VByHNFJG4f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "f57d97dc-5b66-4d3e-a6d9-c0432546fdf9", "DetectTime": "2024-05-21T12:42:04.162634+00:00", "EventTime": "2024-05-21T12:42:04.162660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceoyk31cQh83FuZiRe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "f7b7c2ab-bcf0-44f4-979e-1a0b427e7425", "DetectTime": "2024-05-21T12:42:04.222039+00:00", "EventTime": "2024-05-21T12:42:04.222062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VGXN2RCB5cthhlVh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "0806cb57-7c24-4e16-ad00-538e6aaa43a4", "DetectTime": "2024-05-21T12:42:04.344432+00:00", "EventTime": "2024-05-21T12:42:04.344455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cdTKClpdkkosQcd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "c0e1e9b2-5ab4-41c1-ac0a-3e668762f680", "DetectTime": "2024-05-21T12:42:04.359968+00:00", "EventTime": "2024-05-21T12:42:04.359988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzofrD35hDehB8jBfh"], "accumulated_threat_level": 4.8, "timewindow": 122} +{"Format": "IDEA0", "ID": "dd997aa7-0f22-42bc-b9b0-f93a9486235b", "DetectTime": "2024-05-21T12:42:04.364822+00:00", "EventTime": "2024-05-21T12:42:04.364840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NMSb4j1zZMYSgKwf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "04c79b1c-9e94-494e-af41-b88af59161c7", "DetectTime": "2024-05-21T12:42:04.665233+00:00", "EventTime": "2024-05-21T12:42:04.665255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMbNu38qELAufDHEl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "be1b1dba-0d90-401e-bc98-ab8af86ee3ec", "DetectTime": "2024-05-21T12:42:04.670795+00:00", "EventTime": "2024-05-21T12:42:04.670813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJulf48iF1bR6sbOl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "bfceee5b-1f07-44c3-a497-95b275b203d7", "DetectTime": "2024-05-21T12:42:04.687270+00:00", "EventTime": "2024-05-21T12:42:04.687301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz97mA2dlylagdNfie"], "accumulated_threat_level": 5.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "a87f73f8-f4b6-4b89-95b9-20ad125136d3", "DetectTime": "2024-05-21T12:42:04.692314+00:00", "EventTime": "2024-05-21T12:42:04.692333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWlo8S27v3CDNepgtb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "bbeb1bea-bdc7-439e-ae0f-bee68c79dd50", "DetectTime": "2024-05-21T12:42:04.709677+00:00", "EventTime": "2024-05-21T12:42:04.709699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8Lsx2kX4FHWHigw4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "1bc34e47-c120-42c3-8eb7-417ba4227749", "DetectTime": "2024-05-21T12:42:04.876535+00:00", "EventTime": "2024-05-21T12:42:04.876558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmAybg4HuMpSwL3d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "7d99d655-b9b7-4434-809e-5c72d2a5b9f0", "DetectTime": "2024-05-21T12:42:04.882376+00:00", "EventTime": "2024-05-21T12:42:04.882395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaN5zn1fnqYCDNcCX2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "03d54722-c8af-463b-adaf-d5afeabfa851", "DetectTime": "2024-05-21T12:42:04.887039+00:00", "EventTime": "2024-05-21T12:42:04.887058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMFfgli04CQtiti2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "84dcffc9-451b-4ac4-9503-e8c2517cadd3", "DetectTime": "2024-05-21T12:42:05.142848+00:00", "EventTime": "2024-05-21T12:42:05.142870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDTnv2CRJZK6WKJM1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "6e49d545-82d5-4435-a1ae-ba181a4e08b1", "DetectTime": "2024-05-21T12:42:05.164696+00:00", "EventTime": "2024-05-21T12:42:05.164718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb7WR2qCTDwPIOT47"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "5b376d25-1279-48dc-8a92-e9b46bc4a69f", "DetectTime": "2024-05-21T12:42:05.179503+00:00", "EventTime": "2024-05-21T12:42:05.179526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHz12r1295Z0Ygqjv2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 122} +{"Format": "IDEA0", "ID": "03cc2d92-75b6-4cb7-86ca-882e5de65661", "DetectTime": "2024-05-21T12:42:05.289771+00:00", "EventTime": "2024-05-21T12:42:05.289792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHuAOh2TeNr5kFzrNh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "b5639ef9-022f-4710-997b-20f210465f96", "DetectTime": "2024-05-21T12:42:05.324236+00:00", "EventTime": "2024-05-21T12:42:05.324257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Craz5020GbVCMWMP2k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "b81717e2-26a1-4bb3-a1e5-0c80b1ca553c", "DetectTime": "2024-05-21T12:42:05.374266+00:00", "EventTime": "2024-05-21T12:42:05.374284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhgNTzgUfgzhw9ei"], "accumulated_threat_level": 7.199999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "5e1a4166-da67-44c0-933f-abe6c94924df", "DetectTime": "2024-05-21T12:42:05.410518+00:00", "EventTime": "2024-05-21T12:42:05.410536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFW87E2iVQQsnvjDV8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "3e3e7599-f33a-47c9-9514-c2e334d1827e", "DetectTime": "2024-05-21T12:42:05.713712+00:00", "EventTime": "2024-05-21T12:42:05.713733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.67.124.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdT9R1vuaJBtJhXgg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "2ffc09a1-83ee-4d30-9f88-6fec07b70b0e", "DetectTime": "2024-05-21T12:42:05.743848+00:00", "EventTime": "2024-05-21T12:42:05.743871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.143.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLddSu37Mp4Ugdvo0a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "72574f3b-d1a0-4b0b-8014-5bf8ddeee4f3", "DetectTime": "2024-05-21T12:42:05.748865+00:00", "EventTime": "2024-05-21T12:42:05.748885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.211.141.181 AS: MAGTICOMAS Magticom, GE AS16010 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPMqd1fcuZotwklb5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "4d02b768-bfdd-43a2-94dd-a9d39aaf3fae", "DetectTime": "2024-05-21T12:42:05.759648+00:00", "EventTime": "2024-05-21T12:42:05.759666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgfd01uk1ODUUk0za"], "accumulated_threat_level": 8.799999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "407d1443-0b06-431d-a027-59d92bf581cd", "DetectTime": "2024-05-21T12:42:05.870964+00:00", "EventTime": "2024-05-21T12:42:05.870987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jrEElGfoEhv33Td"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 119} +{"Format": "IDEA0", "ID": "605abc15-1ba4-4486-9df7-f4a6efcad65f", "DetectTime": "2024-05-21T12:42:05.922113+00:00", "EventTime": "2024-05-21T12:42:05.922132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CydSui12gUuzoNZln"], "accumulated_threat_level": 9.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "505fc813-4995-42a6-9d59-1f3b2f7105f1", "DetectTime": "2024-05-21T12:42:05.967927+00:00", "EventTime": "2024-05-21T12:42:05.967961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cip5IL2UWNmCNvFCU4"], "accumulated_threat_level": 10.4, "timewindow": 122} +{"Format": "IDEA0", "ID": "757695b2-348c-4652-8164-ac4088b53a13", "DetectTime": "2024-05-21T12:42:06.013921+00:00", "EventTime": "2024-05-21T12:42:06.013941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXNwtLU8cR1r6HV4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 122} +{"Format": "IDEA0", "ID": "7883a4bf-1d84-4d21-8fde-b88ef5c2d9ea", "DetectTime": "2024-05-21T12:42:06.072561+00:00", "EventTime": "2024-05-21T12:42:06.072585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rT8s3zWcgxjs6Oh7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 122} +{"Format": "Json", "ID": "7883a4bf-1d84-4d21-8fde-b88ef5c2d9ea", "DetectTime": "2024-05-21T12:42:06.072561+00:00", "EventTime": "2024-05-21T12:42:06.072585+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-06T01:22:30.938874+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2024/05/21 12:42:06.447677)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 122, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4f0f5e81-f16a-46a6-bafd-c1a1fc405477", "DetectTime": "2024-05-21T12:42:06.452468+00:00", "EventTime": "2024-05-21T12:42:06.452491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWKA2r4IirrXl2LMu9", "CNMuF7A7cwc8tkDbl", "Cto3LZ1df6F4TMpjr8", "CgJuL92T0wGkJT6qx9"], "accumulated_threat_level": 0.5, "timewindow": 122} +{"Format": "IDEA0", "ID": "79869c19-47d1-4191-a9bb-8ad78e540410", "DetectTime": "2024-05-21T12:42:06.464499+00:00", "EventTime": "2024-05-21T12:42:06.464521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iNue45bsMLzSDxP4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "93ad053c-0e2a-403f-860e-29faab76b48a", "DetectTime": "2024-05-21T12:42:06.481300+00:00", "EventTime": "2024-05-21T12:42:06.481319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.199.165.214"]}], "Attach": [{"Content": "Connection to unknown destination port 9919/UDP destination IP 108.199.165.214. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHsqsz1tMoEDA683xg"], "accumulated_threat_level": 1.3, "timewindow": 122} +{"Format": "IDEA0", "ID": "4a215929-3999-4db6-9c08-2d089e3c3f18", "DetectTime": "2024-05-21T12:42:06.493547+00:00", "EventTime": "2024-05-21T12:42:06.493566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUETdJ2ypRqdgbAdO3"], "accumulated_threat_level": 2.1, "timewindow": 122} +{"Format": "IDEA0", "ID": "0515d135-fe47-4cf3-b007-a56ea54fa78d", "DetectTime": "2024-05-21T12:42:06.506332+00:00", "EventTime": "2024-05-21T12:42:06.506351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgik0vpmpyuQEO1d2"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 122} +{"Format": "IDEA0", "ID": "a3cfc725-a7e0-4684-b1c3-294cdc0e6991", "DetectTime": "2024-05-21T12:42:06.518203+00:00", "EventTime": "2024-05-21T12:42:06.518222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2vhl3EHcWgGO383i"], "accumulated_threat_level": 3.7, "timewindow": 122} +{"Format": "IDEA0", "ID": "c8576d64-4c10-4b0b-b8f4-9a084bf8eb62", "DetectTime": "2024-05-21T12:42:06.528468+00:00", "EventTime": "2024-05-21T12:42:06.528486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C049Si4oKFaxR0rz3a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "437f3652-1671-40c8-a321-402ab9ba1ba7", "DetectTime": "2024-05-21T12:42:06.553777+00:00", "EventTime": "2024-05-21T12:42:06.553796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX668r4xfK03AQzVwf"], "accumulated_threat_level": 4.5, "timewindow": 122} +{"Format": "IDEA0", "ID": "f233e5ac-be05-423f-a81a-bcbbcc918f57", "DetectTime": "2024-05-21T12:42:06.598992+00:00", "EventTime": "2024-05-21T12:42:06.599014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2W8o72QJoBDlvtdV1"], "accumulated_threat_level": 5.3, "timewindow": 122} +{"Format": "IDEA0", "ID": "c3a688c5-2364-4d46-bd5d-7583a30bcf03", "DetectTime": "2024-05-21T12:42:06.876188+00:00", "EventTime": "2024-05-21T12:42:06.876216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBoLCIbvM5pzsq8l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "0222c005-1289-43e3-9a37-2f77fcffa917", "DetectTime": "2024-05-21T12:42:06.882176+00:00", "EventTime": "2024-05-21T12:42:06.882199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf3rQyynUJV1UOUX5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "5478cca4-58fb-45d9-bc18-aef5db58d51f", "DetectTime": "2024-05-21T12:42:06.887645+00:00", "EventTime": "2024-05-21T12:42:06.887666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 109.200.232.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4tQr3d3yLJgBNyT4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "05fc26c7-c6cf-4ce6-bb90-d18630b3d8f2", "DetectTime": "2024-05-21T12:42:06.893380+00:00", "EventTime": "2024-05-21T12:42:06.893399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.184.175 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLFsK2dMOcY2R4uc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "52c61afe-d150-42d8-a661-db776bfacad7", "DetectTime": "2024-05-21T12:42:06.913472+00:00", "EventTime": "2024-05-21T12:42:06.913497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFT92t9nWmzHdd8C2"], "accumulated_threat_level": 6.1, "timewindow": 122} +{"Format": "IDEA0", "ID": "303d19f6-33a3-4c56-b453-65144ed48401", "DetectTime": "2024-05-21T12:42:07.057008+00:00", "EventTime": "2024-05-21T12:42:07.057031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvZGb1SrEbCj60MEc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "f82f7309-4a2b-43ea-b8da-84d90eb03925", "DetectTime": "2024-05-21T12:42:07.069817+00:00", "EventTime": "2024-05-21T12:42:07.069840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxnNf91i2E7DGfFtS1"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 122} +{"Format": "IDEA0", "ID": "749d5bdd-e521-46f6-9e9e-7601b48c971b", "DetectTime": "2024-05-21T12:42:07.139726+00:00", "EventTime": "2024-05-21T12:42:07.139765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYeGzT1bezkkrzl2"], "accumulated_threat_level": 7.699999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "6cb22250-6dc8-44e2-b4df-b3ed8e106e0a", "DetectTime": "2024-05-21T12:42:07.397763+00:00", "EventTime": "2024-05-21T12:42:07.397784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgVOUk3YggP1vLKVA3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "053a3647-f274-43a7-9517-1673f88064be", "DetectTime": "2024-05-21T12:42:07.402703+00:00", "EventTime": "2024-05-21T12:42:07.402723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYO0gB3rAU53t4RORi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "94934f18-0154-4506-a14a-36dd1f1c9162", "DetectTime": "2024-05-21T12:42:07.465186+00:00", "EventTime": "2024-05-21T12:42:07.465206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xpQb1sFijO8j0YFl"], "accumulated_threat_level": 8.5, "timewindow": 122} +{"Format": "IDEA0", "ID": "d07ee597-a833-40a5-a733-8a1a7726dcf0", "DetectTime": "2024-05-21T12:42:07.512122+00:00", "EventTime": "2024-05-21T12:42:07.512141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cskggr3SgjTGzjrSY3"], "accumulated_threat_level": 9.3, "timewindow": 122} +{"Format": "IDEA0", "ID": "e7c3d3b4-9f92-41f6-b7fa-2a0a9957aa45", "DetectTime": "2024-05-21T12:42:07.558243+00:00", "EventTime": "2024-05-21T12:42:07.558261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BgXr1nU8GrHgYfD5"], "accumulated_threat_level": 10.100000000000001, "timewindow": 122} +{"Format": "IDEA0", "ID": "84579286-5dcb-4016-a3b1-b5708c02b0fa", "DetectTime": "2024-05-21T12:42:07.606079+00:00", "EventTime": "2024-05-21T12:42:07.606098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcV7UbbqdjESNLW4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 122} +{"Format": "IDEA0", "ID": "a3a0f7b6-d850-47d8-80b8-110dcedec106", "DetectTime": "2024-05-21T12:42:07.644039+00:00", "EventTime": "2024-05-21T12:42:07.644060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGPlnA4u7VKuJPUBbj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "7738ca0c-fbbd-4f4f-b3a2-a4e6f7d796ac", "DetectTime": "2024-05-21T12:42:07.686947+00:00", "EventTime": "2024-05-21T12:42:07.686972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CytB9g4F1L2ctWZO56"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "b6fc181f-672b-4439-8649-d6eb74feb3bd", "DetectTime": "2024-05-21T12:42:07.969668+00:00", "EventTime": "2024-05-21T12:42:07.969687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7NFH3dQSW4eioFAb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "bf5d9f0b-2e84-4ae6-80f6-85de91be1807", "DetectTime": "2024-05-21T12:42:07.975422+00:00", "EventTime": "2024-05-21T12:42:07.975442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqnhU31lR1w1T6DWYc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "9c794092-da36-47b2-b8cc-0ecb66af66a8", "DetectTime": "2024-05-21T12:42:07.983400+00:00", "EventTime": "2024-05-21T12:42:07.983421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzABPf2ANi9AsiI057"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "886dd647-2dd9-4faa-8444-a8dcc6b0911d", "DetectTime": "2024-05-21T12:42:07.989846+00:00", "EventTime": "2024-05-21T12:42:07.989868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc5e071K5UzSVwM6d6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "2b6b6cec-4f34-4175-8311-ffd064617606", "DetectTime": "2024-05-21T12:42:08.016237+00:00", "EventTime": "2024-05-21T12:42:08.016259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1RZS2DF4uJGLTXQ"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "5977e399-e168-44cd-88d2-04cd585f2629", "DetectTime": "2024-05-21T12:42:08.150320+00:00", "EventTime": "2024-05-21T12:42:08.150343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CERamK2ljUrCQuGuN5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 122} +{"Format": "IDEA0", "ID": "4281a654-7e5b-439f-b0f9-3e4882d57366", "DetectTime": "2024-05-21T12:42:08.155634+00:00", "EventTime": "2024-05-21T12:42:08.155651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuT8rs4MQhkS0ky90d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "2079af06-0a76-4f19-8cee-d1f277d66371", "DetectTime": "2024-05-21T12:42:08.291013+00:00", "EventTime": "2024-05-21T12:42:08.291033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCO6JK11vyvrz6tCtf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "9059bc82-5614-4994-880d-c70517f9a891", "DetectTime": "2024-05-21T12:42:08.341189+00:00", "EventTime": "2024-05-21T12:42:08.341207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMI1k3Or92bqJ3Psc"], "accumulated_threat_level": 12.500000000000004, "timewindow": 122} +{"Format": "Json", "ID": "9059bc82-5614-4994-880d-c70517f9a891", "DetectTime": "2024-05-21T12:42:08.341189+00:00", "EventTime": "2024-05-21T12:42:08.341207+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "1970-01-06T01:53:13.701045+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2024/05/21 12:42:08.541887)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 122, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "9fea0be2-5ad5-4d1e-a81e-9c38302c52ca", "DetectTime": "2024-05-21T12:42:08.562971+00:00", "EventTime": "2024-05-21T12:42:08.562992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cercar1DJ0LSXvY3Ml"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "021caa43-e415-4705-9cbf-75984b4aeb6a", "DetectTime": "2024-05-21T12:42:08.636141+00:00", "EventTime": "2024-05-21T12:42:08.636165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDDHj2hnz6PYeX0Re"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "c4b833ac-c489-4387-85b6-a58302368a4f", "DetectTime": "2024-05-21T12:42:08.643934+00:00", "EventTime": "2024-05-21T12:42:08.643958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXprAbC82cwa3rhMd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "4a653e91-3a00-4229-ad38-4ca316afbef1", "DetectTime": "2024-05-21T12:42:08.649270+00:00", "EventTime": "2024-05-21T12:42:08.649288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFMA7s3NLczrI2RgD9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "068c05b7-ecb7-45d7-bd80-079fe2a8ff4e", "DetectTime": "2024-05-21T12:42:08.654303+00:00", "EventTime": "2024-05-21T12:42:08.654322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKonWr4qVtOEXo2Dqj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "ad36a32f-20e7-405c-aa8d-81cc6649cca9", "DetectTime": "2024-05-21T12:42:08.759260+00:00", "EventTime": "2024-05-21T12:42:08.759294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnhEnm3vI1zJNnrg8a"], "accumulated_threat_level": 0.8, "timewindow": 122} +{"Format": "IDEA0", "ID": "b654405f-1f7b-4a6a-bbf1-320a92000ae2", "DetectTime": "2024-05-21T12:42:08.821237+00:00", "EventTime": "2024-05-21T12:42:08.821274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTn5Ix2U2F70ApogBg"], "accumulated_threat_level": 1.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "b593cd41-2558-4e6d-9afa-c2ef44a9b78d", "DetectTime": "2024-05-21T12:42:08.855235+00:00", "EventTime": "2024-05-21T12:42:08.855258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppVQVXUNwGY4zqza"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "f978deea-bb77-485c-b3f9-0d971cb93964", "DetectTime": "2024-05-21T12:42:09.114719+00:00", "EventTime": "2024-05-21T12:42:09.114754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiZFN240bqRdwsFT1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 122} +{"Format": "IDEA0", "ID": "1dadec11-d1d3-4d73-bd17-0d6360c1c69e", "DetectTime": "2024-05-21T12:42:09.156079+00:00", "EventTime": "2024-05-21T12:42:09.156105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEOTK71lkSDvgJmtNk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "e8b26ef8-a848-4cac-a9ae-98a93870f05f", "DetectTime": "2024-05-21T12:42:09.168579+00:00", "EventTime": "2024-05-21T12:42:09.168603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDCpDx1s6SnknDpjH"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "27020c69-28f2-4b3b-a629-d804028384ab", "DetectTime": "2024-05-21T12:42:09.173789+00:00", "EventTime": "2024-05-21T12:42:09.173809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8LAas48J9HakYDLzl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "64d6c367-953b-447e-9c29-641b2d20dec9", "DetectTime": "2024-05-21T12:42:09.200271+00:00", "EventTime": "2024-05-21T12:42:09.200293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj54GP1VhwkWbaAAx3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "a469b155-65f0-4c42-8632-8f3ea0c8a5bb", "DetectTime": "2024-05-21T12:42:09.205446+00:00", "EventTime": "2024-05-21T12:42:09.205466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKl8j1lkTOQ2riwb7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "5f74e116-f3c2-4102-b6db-9a0d1d237766", "DetectTime": "2024-05-21T12:42:09.365375+00:00", "EventTime": "2024-05-21T12:42:09.365397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGj6944YjiGYrcnc5"], "accumulated_threat_level": 3.2, "timewindow": 122} +{"Format": "IDEA0", "ID": "b103d31d-f1db-4351-b796-5d5069b5c497", "DetectTime": "2024-05-21T12:42:09.395795+00:00", "EventTime": "2024-05-21T12:42:09.395817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjMCkpX1oIth230gi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "3cf915a8-2ca4-4e8c-a9fa-426ebf6ad65c", "DetectTime": "2024-05-21T12:42:09.638050+00:00", "EventTime": "2024-05-21T12:42:09.638070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6zPFnrKYIW2aJzF"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "024cc108-5466-43c8-a856-937188cbe84d", "DetectTime": "2024-05-21T12:42:09.702925+00:00", "EventTime": "2024-05-21T12:42:09.702944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFZhr3zOBZaKEw4zl"], "accumulated_threat_level": 4.0, "timewindow": 122} +{"Format": "IDEA0", "ID": "ae9a3025-e07e-4336-a5c4-9d10fc3284aa", "DetectTime": "2024-05-21T12:42:09.733891+00:00", "EventTime": "2024-05-21T12:42:09.733913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXevU1RD7n3uApQwg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "c70bdca6-325b-4837-bb71-456394959c70", "DetectTime": "2024-05-21T12:42:09.814901+00:00", "EventTime": "2024-05-21T12:42:09.814923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgkFUc2mKbfr2XAvo3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "d85d9669-640a-4368-bb55-8783d873be57", "DetectTime": "2024-05-21T12:42:09.825529+00:00", "EventTime": "2024-05-21T12:42:09.825552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fQse4K1nvx2FUZT6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "d81ebfc7-3b5b-4097-87ba-11e3e0e34bab", "DetectTime": "2024-05-21T12:42:09.887513+00:00", "EventTime": "2024-05-21T12:42:09.887535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxj5rw3ErUJN56CGmi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "f529fd59-341a-41df-a7e9-9097cf82eef4", "DetectTime": "2024-05-21T12:42:09.912543+00:00", "EventTime": "2024-05-21T12:42:09.912564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Gn6C3Cee4nXMGIpd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "9393311e-ddb2-406b-a0a4-fdedcd98b06d", "DetectTime": "2024-05-21T12:42:09.947780+00:00", "EventTime": "2024-05-21T12:42:09.947802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CceLZc2IvlPkMQ4xB4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "f1ee0668-82df-4a03-b5e6-cf5f0fb37e8e", "DetectTime": "2024-05-21T12:42:09.988097+00:00", "EventTime": "2024-05-21T12:42:09.988118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ZQvQ2dROjtKppYa3"], "accumulated_threat_level": 4.8, "timewindow": 122} +{"Format": "IDEA0", "ID": "b9c6b164-1549-4232-b35e-2f8ebc5ff62a", "DetectTime": "2024-05-21T12:42:10.306527+00:00", "EventTime": "2024-05-21T12:42:10.306548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTdDn3sqFcRHiPFUd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "fbfa34d4-04d7-4eea-969a-cad3819dafdc", "DetectTime": "2024-05-21T12:42:10.312391+00:00", "EventTime": "2024-05-21T12:42:10.312409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUx6AE30jybdUk5ODd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "0baba93b-68f9-4092-a7e3-d7ffc96554fa", "DetectTime": "2024-05-21T12:42:10.317618+00:00", "EventTime": "2024-05-21T12:42:10.317636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNOby2QHTVyzbfxjj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "07125976-f2d9-401a-a0a5-b9d797eea816", "DetectTime": "2024-05-21T12:42:10.322246+00:00", "EventTime": "2024-05-21T12:42:10.322264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP2lEt2FJx7FCuf0sh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "1321b230-6569-4fdc-81a0-1733aa43cf20", "DetectTime": "2024-05-21T12:42:10.326794+00:00", "EventTime": "2024-05-21T12:42:10.326812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdtn04KKbY1NDjPsj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "0147f627-79aa-4360-9b27-4dd100ef08b6", "DetectTime": "2024-05-21T12:42:10.472337+00:00", "EventTime": "2024-05-21T12:42:10.472358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hg743hXEf9ePGJ4b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "86474cdb-9f1c-485f-9041-dbb80b74fbad", "DetectTime": "2024-05-21T12:42:10.496175+00:00", "EventTime": "2024-05-21T12:42:10.496193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdUude22n2ih92y4Wf"], "accumulated_threat_level": 5.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "8e211dbd-bdb0-470d-810f-deb035f03507", "DetectTime": "2024-05-21T12:42:10.548100+00:00", "EventTime": "2024-05-21T12:42:10.548126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGkpo36y3kpj68lE8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "ad63ec8e-7e89-4dbd-94a4-d98f7b080e57", "DetectTime": "2024-05-21T12:42:10.828735+00:00", "EventTime": "2024-05-21T12:42:10.828754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm785F4qUcU9WqdWf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 122} +{"Format": "IDEA0", "ID": "91ad185d-5dd8-401f-8210-001b4b40f918", "DetectTime": "2024-05-21T12:42:10.839072+00:00", "EventTime": "2024-05-21T12:42:10.839095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNC9krBfNLRjz3wb4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "aae928e3-4e2d-41c2-b873-50534cf5c4ba", "DetectTime": "2024-05-21T12:42:10.851255+00:00", "EventTime": "2024-05-21T12:42:10.851276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMRpp1DgR5AufOYih"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "f335b8f1-33fe-47eb-abeb-5919cc85de4b", "DetectTime": "2024-05-21T12:42:10.872684+00:00", "EventTime": "2024-05-21T12:42:10.872707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2VNsGRoNSaE21y8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "ac575dd3-5901-44a3-aa88-b120a5f1e970", "DetectTime": "2024-05-21T12:42:10.879661+00:00", "EventTime": "2024-05-21T12:42:10.879680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNby02KsKKfXSmGRb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "1e70b2cf-d8c8-4600-816d-3c335c3a0775", "DetectTime": "2024-05-21T12:42:10.884763+00:00", "EventTime": "2024-05-21T12:42:10.884782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1ek526TJ6AClEbg9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "1298bbe4-f2e8-459e-b7c0-195845785347", "DetectTime": "2024-05-21T12:42:10.929561+00:00", "EventTime": "2024-05-21T12:42:10.929583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XQbX2ij5fsSQ3l28"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "6720c66c-b55c-4ec3-a48e-489050dcde9b", "DetectTime": "2024-05-21T12:42:11.085667+00:00", "EventTime": "2024-05-21T12:42:11.085688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iHKl4gBwADeU0B32"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "5aa3acff-6187-4bf4-ae54-c53b71f81c24", "DetectTime": "2024-05-21T12:42:11.306502+00:00", "EventTime": "2024-05-21T12:42:11.306524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrub24MIGSBO4aSYf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "cc33aa8d-6298-404b-9d73-56a67d407e2a", "DetectTime": "2024-05-21T12:42:11.323207+00:00", "EventTime": "2024-05-21T12:42:11.323228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ComNx2gDiu5dVYKzj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "a96a50e7-8074-46eb-b409-bbfaf78f1fec", "DetectTime": "2024-05-21T12:42:11.422797+00:00", "EventTime": "2024-05-21T12:42:11.422822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD0c26Rx4eNMAKQD6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "1bf819c2-e914-42d4-a095-1ffd2452bcf7", "DetectTime": "2024-05-21T12:42:11.427931+00:00", "EventTime": "2024-05-21T12:42:11.427951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTUxB2qGieYcMzsai"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "b0e0a193-aed4-4e95-b60e-148a4ad79cd7", "DetectTime": "2024-05-21T12:42:11.434015+00:00", "EventTime": "2024-05-21T12:42:11.434039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjsRKBSyqov9GbO1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "487e41b4-2003-4a41-925e-4586c6951ba0", "DetectTime": "2024-05-21T12:42:11.439256+00:00", "EventTime": "2024-05-21T12:42:11.439275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjwSE2Iv6DQHkqmq4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "62074a0e-daa0-4cfe-8866-52cf8cd34263", "DetectTime": "2024-05-21T12:42:11.568348+00:00", "EventTime": "2024-05-21T12:42:11.568369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQsJhU2HadwMjXoFn1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "dc7c12cc-a784-49ba-99c6-6d3a6f51f213", "DetectTime": "2024-05-21T12:42:11.582373+00:00", "EventTime": "2024-05-21T12:42:11.582396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C76Xak1TokDo5uCRt"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "cf82fceb-10a9-40b9-91cb-3a3f6b3fe6c4", "DetectTime": "2024-05-21T12:42:11.587648+00:00", "EventTime": "2024-05-21T12:42:11.587666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7fBaJxHOb7SghWl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "1368b4a5-6048-43c9-bfe5-529eaf2c2e28", "DetectTime": "2024-05-21T12:42:11.877470+00:00", "EventTime": "2024-05-21T12:42:11.877491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiK0530b8CZ0UdJg9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "8bd4483a-be6c-4247-a0b9-d1beb175a52a", "DetectTime": "2024-05-21T12:42:11.884609+00:00", "EventTime": "2024-05-21T12:42:11.884629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMZto4DjUIRjPd8Sh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "e8afce85-9a1e-4496-8593-9ac3f2883bb7", "DetectTime": "2024-05-21T12:42:11.953015+00:00", "EventTime": "2024-05-21T12:42:11.953037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsyeLx21fZiNS9Ixz9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "256e7105-20f3-4d4d-9b5c-6d981e2d3bfc", "DetectTime": "2024-05-21T12:42:11.995788+00:00", "EventTime": "2024-05-21T12:42:11.995809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWVxjgiYeN5Fw6LIl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "aa0a353e-a5c7-497a-8132-b7360b05758e", "DetectTime": "2024-05-21T12:42:12.069918+00:00", "EventTime": "2024-05-21T12:42:12.069948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpVx1YhSxCDU19p6d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "e4a03528-d187-489d-ab06-0af0de76300c", "DetectTime": "2024-05-21T12:42:12.082241+00:00", "EventTime": "2024-05-21T12:42:12.082263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2wqZC3RFzNfmHeVrf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "20124fae-75f3-4531-8b21-e59ef5858f99", "DetectTime": "2024-05-21T12:42:12.414892+00:00", "EventTime": "2024-05-21T12:42:12.414919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphNtKOPm3in9ukOh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "5666ec98-98ea-4306-b1c0-1360d7844b68", "DetectTime": "2024-05-21T12:42:12.436761+00:00", "EventTime": "2024-05-21T12:42:12.436785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMW0i3vAkljG2XSf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 120} +{"Format": "IDEA0", "ID": "0576e503-4776-475b-8224-c7535ac2d846", "DetectTime": "2024-05-21T12:42:12.547292+00:00", "EventTime": "2024-05-21T12:42:12.547315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbt1C3KIEIxHL8uAd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "e83c44b0-8821-4de9-af81-827165525683", "DetectTime": "2024-05-21T12:42:12.553460+00:00", "EventTime": "2024-05-21T12:42:12.553480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTb524wwrUgx3b99g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "e089e85d-bb52-49d8-98a1-80cc5ebc7cba", "DetectTime": "2024-05-21T12:42:12.560685+00:00", "EventTime": "2024-05-21T12:42:12.560709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzGmX2jVkXRCO2v5e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "8bc90211-1960-4bc0-8e58-97c2f7cb8f3c", "DetectTime": "2024-05-21T12:42:12.566267+00:00", "EventTime": "2024-05-21T12:42:12.566287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.248.108.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7IBKu1ikQqKeyrdC3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "f135b0dd-bf09-409b-8ac4-d8b83200f56b", "DetectTime": "2024-05-21T12:42:12.577786+00:00", "EventTime": "2024-05-21T12:42:12.577812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COAAwK2XXQwGUZUSOh"], "accumulated_threat_level": 9.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "29cb1f44-50ed-48cd-94e5-be20bcbc379c", "DetectTime": "2024-05-21T12:42:12.582846+00:00", "EventTime": "2024-05-21T12:42:12.582865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQnUe2jPO7WvxRM65"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "e8ad9b05-f2b3-479f-81a4-c0c9b2425741", "DetectTime": "2024-05-21T12:42:12.590855+00:00", "EventTime": "2024-05-21T12:42:12.590874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr8bjl3zCbMBZ9cjA3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "6120850f-fa79-466c-93c6-7bae5f178532", "DetectTime": "2024-05-21T12:42:12.596127+00:00", "EventTime": "2024-05-21T12:42:12.596146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrZQz2WYcrKtn6H9d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c1c5946c-18eb-4019-b5fd-fff3c7cdbdd9", "DetectTime": "2024-05-21T12:42:13.070164+00:00", "EventTime": "2024-05-21T12:42:13.070185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDa6e53N87Vuz26xL"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "cfbf8075-03d7-49ae-acb9-723f8ff2b179", "DetectTime": "2024-05-21T12:42:13.084347+00:00", "EventTime": "2024-05-21T12:42:13.084366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHt5Sh2gFvcgcIT0K4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "1a970878-3640-487f-a7fa-d029ab02d654", "DetectTime": "2024-05-21T12:42:13.089741+00:00", "EventTime": "2024-05-21T12:42:13.089760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKd0Me1yzXb6OPFUd5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "527414ae-a3cc-4d00-afa4-d5a162a422f8", "DetectTime": "2024-05-21T12:42:13.095557+00:00", "EventTime": "2024-05-21T12:42:13.095580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbrhH21XonGQD2ULv6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "bbc333ab-126f-4460-9cd4-3ae2cc0d9bf8", "DetectTime": "2024-05-21T12:42:13.100939+00:00", "EventTime": "2024-05-21T12:42:13.100963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8G4SFuC8YiNSHpDk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "050157e6-ae54-49a7-abdb-97463e50c6ec", "DetectTime": "2024-05-21T12:42:13.107084+00:00", "EventTime": "2024-05-21T12:42:13.107106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQkwjT5RcIvDWi5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "1571f40a-f2c2-4f4e-b33c-98248bbc9b6f", "DetectTime": "2024-05-21T12:42:13.133085+00:00", "EventTime": "2024-05-21T12:42:13.133106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3UqRF23LNuuY09snk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "a01bf1a7-6652-44a4-be1f-8403fdca37be", "DetectTime": "2024-05-21T12:42:13.148341+00:00", "EventTime": "2024-05-21T12:42:13.148364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUPKn11ZrnYO0IDDb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c6754ba5-c628-42a3-89ed-4409031823c6", "DetectTime": "2024-05-21T12:42:13.488104+00:00", "EventTime": "2024-05-21T12:42:13.488122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQALb2EkEKx3Oml09"], "accumulated_threat_level": 10.4, "timewindow": 122} +{"Format": "IDEA0", "ID": "e6768a42-ba1d-46b1-a44c-b327ee022f9a", "DetectTime": "2024-05-21T12:42:13.540803+00:00", "EventTime": "2024-05-21T12:42:13.540830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzdEIQZlRZ5QtKc1", "Ck2XRQpop121NrNVb", "CBNrWi3DdM0dd65QJ", "CQllTo4ZEliwOkKLt6"], "accumulated_threat_level": 0.5, "timewindow": 123} +{"Format": "IDEA0", "ID": "0c953745-f6b1-4ebc-904f-669778c52f05", "DetectTime": "2024-05-21T12:42:13.626595+00:00", "EventTime": "2024-05-21T12:42:13.626617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCQhb1qNQrYePXVfd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "0e643d23-4784-43e8-910e-b4cdeebc16f2", "DetectTime": "2024-05-21T12:42:13.637575+00:00", "EventTime": "2024-05-21T12:42:13.637596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0WkAg2MCbBA9LIrW7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "735851d5-6eec-4fc6-b3d6-6a63273f69f9", "DetectTime": "2024-05-21T12:42:13.643545+00:00", "EventTime": "2024-05-21T12:42:13.643566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZOtHG3JIRX4zEOZVh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "8c8bbbbd-4545-4a52-b719-d9f2c9f6ad39", "DetectTime": "2024-05-21T12:42:13.678907+00:00", "EventTime": "2024-05-21T12:42:13.678928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcbX01tntGEm8YO24"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c16af79f-652f-4801-89b3-363c4cd5b0b3", "DetectTime": "2024-05-21T12:42:13.684121+00:00", "EventTime": "2024-05-21T12:42:13.684143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8Q7e4RV8woarcf3i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "9c7aca5e-0de4-44ff-b6ee-db70b52ae772", "DetectTime": "2024-05-21T12:42:13.690138+00:00", "EventTime": "2024-05-21T12:42:13.690160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNYXT1ypzZ2Hd6RB7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "172ef3ed-e537-421e-a536-302892e0a348", "DetectTime": "2024-05-21T12:42:13.695731+00:00", "EventTime": "2024-05-21T12:42:13.695754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldNEG7aIgkCfkRI6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "5cdfb808-a4d1-4288-be2b-357de86188e2", "DetectTime": "2024-05-21T12:42:13.725952+00:00", "EventTime": "2024-05-21T12:42:13.725971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAY262V8hlt0CAhjl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "a92d903c-6286-4b20-ab8e-b65c48dcf043", "DetectTime": "2024-05-21T12:42:14.280739+00:00", "EventTime": "2024-05-21T12:42:14.280765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2EAv40abYe1Ru49e"], "accumulated_threat_level": 11.200000000000001, "timewindow": 122} +{"Format": "IDEA0", "ID": "7b980369-3ed2-42a9-b4da-1684daeb45cf", "DetectTime": "2024-05-21T12:42:14.285893+00:00", "EventTime": "2024-05-21T12:42:14.285911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN425P1JQkLgbg1lck"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "8afd5085-33d8-4f02-84ac-10f96995806d", "DetectTime": "2024-05-21T12:42:14.298154+00:00", "EventTime": "2024-05-21T12:42:14.298173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsPhzk4x0qYliyVui8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "1f6d81fe-01d5-41a1-9182-642b93f56281", "DetectTime": "2024-05-21T12:42:14.361731+00:00", "EventTime": "2024-05-21T12:42:14.361753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPdkLKAECHzl9f2Fa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "ec02269b-480a-4deb-8946-f42414eba0e2", "DetectTime": "2024-05-21T12:42:14.367714+00:00", "EventTime": "2024-05-21T12:42:14.367734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTI8j4CmZgIS0n7p"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "f73cc7fd-d0a1-4b8d-a122-1eb9f503ca87", "DetectTime": "2024-05-21T12:42:14.373064+00:00", "EventTime": "2024-05-21T12:42:14.373082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90m4QoVUCjlG13hd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "696bc148-a05c-41da-9edc-a7301d5bb8a4", "DetectTime": "2024-05-21T12:42:14.378447+00:00", "EventTime": "2024-05-21T12:42:14.378466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7VMk42KSAXzWVri7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "8be56b25-8a9e-40f0-8b6e-1bc34de19800", "DetectTime": "2024-05-21T12:42:14.762857+00:00", "EventTime": "2024-05-21T12:42:14.762881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuSfS3Zhr950mMIS4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "8df8fd2b-8bf3-4d95-9134-ebcb44eea876", "DetectTime": "2024-05-21T12:42:14.773654+00:00", "EventTime": "2024-05-21T12:42:14.773673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYi2V24bbpn2w3tPb2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 122} +{"Format": "Json", "ID": "8df8fd2b-8bf3-4d95-9134-ebcb44eea876", "DetectTime": "2024-05-21T12:42:14.773654+00:00", "EventTime": "2024-05-21T12:42:14.773673+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "1970-01-06T01:53:36.062040+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 122. (real time 2024/05/21 12:42:14.963970)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 122, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0b8bdeb8-41a0-4f40-9b4e-954877e0be59", "DetectTime": "2024-05-21T12:42:14.968532+00:00", "EventTime": "2024-05-21T12:42:14.968551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.231.214.106 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdW311g1RHMqDgAPf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "32670261-db67-444b-93d2-78d2de74c390", "DetectTime": "2024-05-21T12:42:14.980471+00:00", "EventTime": "2024-05-21T12:42:14.980491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDpEy3Whzz6cKYqf6"], "accumulated_threat_level": 0.8, "timewindow": 122} +{"Format": "IDEA0", "ID": "b2597c42-0147-467a-ade8-829ff9841d33", "DetectTime": "2024-05-21T12:42:14.991636+00:00", "EventTime": "2024-05-21T12:42:14.991654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbK1XzzNtbAtaqR9"], "accumulated_threat_level": 1.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "d5ae74d2-3880-43c9-b547-470d48611e53", "DetectTime": "2024-05-21T12:42:15.157667+00:00", "EventTime": "2024-05-21T12:42:15.157687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chxueq1LoRmbkUia6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 122} +{"Format": "IDEA0", "ID": "582e1a48-86dc-4645-809a-249cf2cd3236", "DetectTime": "2024-05-21T12:42:15.201359+00:00", "EventTime": "2024-05-21T12:42:15.201377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HGhc1NdZppeW53xj"], "accumulated_threat_level": 3.2, "timewindow": 122} +{"Format": "IDEA0", "ID": "96dae4aa-2926-472b-b05e-2692a7fbeee0", "DetectTime": "2024-05-21T12:42:15.249511+00:00", "EventTime": "2024-05-21T12:42:15.249531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["37.232.7.128"]}], "Attach": [{"Content": "Connection to unknown destination port 11186/UDP destination IP 37.232.7.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJYVG3D9VCz7tt806"], "accumulated_threat_level": 4.0, "timewindow": 122} +{"Format": "IDEA0", "ID": "5de8dfeb-6235-428b-986a-10a2c9213373", "DetectTime": "2024-05-21T12:42:15.302188+00:00", "EventTime": "2024-05-21T12:42:15.302206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crw1og3SQ4g0VXl9y9"], "accumulated_threat_level": 4.8, "timewindow": 122} +{"Format": "IDEA0", "ID": "8d04e297-b1c3-48b9-a122-85c7171740c8", "DetectTime": "2024-05-21T12:42:15.343713+00:00", "EventTime": "2024-05-21T12:42:15.343739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73RX54hJ6ZOjlSNW2"], "accumulated_threat_level": 5.6, "timewindow": 122} +{"Format": "IDEA0", "ID": "3400a333-795d-4713-bfc5-7f413c575a58", "DetectTime": "2024-05-21T12:42:15.390080+00:00", "EventTime": "2024-05-21T12:42:15.390105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkrTO16TjNUR2abQa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 122} +{"Format": "IDEA0", "ID": "a02b6132-3bb0-4d2c-80fa-8f6165231eb4", "DetectTime": "2024-05-21T12:42:15.437291+00:00", "EventTime": "2024-05-21T12:42:15.437314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3sVKK39tQrGSD0d89"], "accumulated_threat_level": 7.199999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "aea6963d-78d8-46e3-acfc-0c6b18857e06", "DetectTime": "2024-05-21T12:42:15.483482+00:00", "EventTime": "2024-05-21T12:42:15.483499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvtXi1z9p61DsAxn1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "899f8223-55a6-4575-ac83-2fed22c1ba89", "DetectTime": "2024-05-21T12:42:15.832161+00:00", "EventTime": "2024-05-21T12:42:15.832185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyTvld3ngXI52mMEt"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "20f26521-0cfc-476c-bcac-a56c5fdf3b60", "DetectTime": "2024-05-21T12:42:15.838028+00:00", "EventTime": "2024-05-21T12:42:15.838046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGPBe3rIS2aczrlT8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "3f460e08-a4f6-4bc8-967f-559be83ea4c7", "DetectTime": "2024-05-21T12:42:15.842636+00:00", "EventTime": "2024-05-21T12:42:15.842654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cija5S2isDiIcz56oi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "9372dfd1-cf5f-47a3-b7cc-3173f41a0eea", "DetectTime": "2024-05-21T12:42:15.847485+00:00", "EventTime": "2024-05-21T12:42:15.847505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAMlzM9cH9KDBTUd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "2db80f6a-bf67-4d10-b6a6-1ed2d7a8eb73", "DetectTime": "2024-05-21T12:42:15.900335+00:00", "EventTime": "2024-05-21T12:42:15.900358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VJlL33hwhqiy3nwg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "988b8cc2-a5c8-4235-bc46-12b495a4a645", "DetectTime": "2024-05-21T12:42:15.905970+00:00", "EventTime": "2024-05-21T12:42:15.905990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgJ4p1Sh59UucKRI"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "dbb4a064-f8ae-4517-9e01-945a3abf86c0", "DetectTime": "2024-05-21T12:42:16.055909+00:00", "EventTime": "2024-05-21T12:42:16.055930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxnzAl2p364MWMgqld"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "59c9ffaa-5e2a-44d1-bf67-1163e544f78b", "DetectTime": "2024-05-21T12:42:16.061767+00:00", "EventTime": "2024-05-21T12:42:16.061789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0Ca34QqEnaLbEapc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "7e31cc3e-9d75-466a-ac75-e8bd9d380ab9", "DetectTime": "2024-05-21T12:42:16.073646+00:00", "EventTime": "2024-05-21T12:42:16.073665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeObdC4peyu9MHg2b6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "a02e5239-19d9-4bd9-8837-e96e157e4df9", "DetectTime": "2024-05-21T12:42:16.364579+00:00", "EventTime": "2024-05-21T12:42:16.364599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANAVdsleaeV1pavh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "a05558e5-0479-4d10-b212-442d0a50b293", "DetectTime": "2024-05-21T12:42:16.369568+00:00", "EventTime": "2024-05-21T12:42:16.369588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDrTzk3AeIU3NLawe7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "70bd7015-0e83-4d0a-8bcf-99e938ef9bef", "DetectTime": "2024-05-21T12:42:16.437278+00:00", "EventTime": "2024-05-21T12:42:16.437297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TkjuT0FnMlOZqG2"], "accumulated_threat_level": 1.3, "timewindow": 123} +{"Format": "IDEA0", "ID": "5189f6a1-9764-4d44-b7c4-67f35eb96122", "DetectTime": "2024-05-21T12:42:16.475238+00:00", "EventTime": "2024-05-21T12:42:16.475257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVuIWr3UVwSE8v4Tp4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c581a8ca-e2eb-41f0-875a-4c5681d2d3da", "DetectTime": "2024-05-21T12:42:16.483175+00:00", "EventTime": "2024-05-21T12:42:16.483195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csne8y4bhV3iswHL1f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "fabc30c9-6ec3-4e0c-9f70-b844d578e17a", "DetectTime": "2024-05-21T12:42:16.549891+00:00", "EventTime": "2024-05-21T12:42:16.549913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ypED274SijiZmbt9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "9db7b8e6-b276-4690-8175-319a8a564372", "DetectTime": "2024-05-21T12:42:16.592871+00:00", "EventTime": "2024-05-21T12:42:16.592891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr26p41A3Pdz0A0k4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "f43dc4ea-acdb-45c3-9cbc-37344c2fd742", "DetectTime": "2024-05-21T12:42:16.681172+00:00", "EventTime": "2024-05-21T12:42:16.681189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavdFG38etQu4la1D6"], "accumulated_threat_level": 2.1, "timewindow": 123} +{"Format": "IDEA0", "ID": "ffe292d6-0316-4beb-9bc7-bd575c63e691", "DetectTime": "2024-05-21T12:42:16.945059+00:00", "EventTime": "2024-05-21T12:42:16.945086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtaUO448qYZ8xW4u0k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "7e78ddaa-b0f9-410a-bdc0-e8ef0453bc36", "DetectTime": "2024-05-21T12:42:16.950254+00:00", "EventTime": "2024-05-21T12:42:16.950277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46N9Z19AODV3WDaNc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "31ca7f8e-f71b-4bff-8f17-d54c9e615a9f", "DetectTime": "2024-05-21T12:42:16.955205+00:00", "EventTime": "2024-05-21T12:42:16.955224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEyr3i3iqKXc0Ehln9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "3c9e0aad-67c8-45b8-9867-400b510a0e23", "DetectTime": "2024-05-21T12:42:17.055187+00:00", "EventTime": "2024-05-21T12:42:17.055213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvIYc53gGHeoRzpoO3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 123} +{"Format": "IDEA0", "ID": "8ba7bb47-06f5-46b4-b426-d85e75f6bce9", "DetectTime": "2024-05-21T12:42:17.086964+00:00", "EventTime": "2024-05-21T12:42:17.086986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCtrap4Cyx2RO2C4qc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "e9768af8-f607-47d0-90cf-a64ce0fa1a4e", "DetectTime": "2024-05-21T12:42:17.122801+00:00", "EventTime": "2024-05-21T12:42:17.122832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CArytZ1UkHNOYDON0e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "521cc7bf-3b46-4ccf-ad1d-2bc2cec17b7d", "DetectTime": "2024-05-21T12:42:17.212716+00:00", "EventTime": "2024-05-21T12:42:17.212736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYG7R1HD6poiTxTEj"], "accumulated_threat_level": 3.7, "timewindow": 123} +{"Format": "IDEA0", "ID": "2e1df121-a057-411a-9bbe-10f72b2bf0bb", "DetectTime": "2024-05-21T12:42:17.218496+00:00", "EventTime": "2024-05-21T12:42:17.218516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGDwY1Fa7UHwPKru7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "6e14c989-d332-4d43-bc2c-99251ede3597", "DetectTime": "2024-05-21T12:42:17.242332+00:00", "EventTime": "2024-05-21T12:42:17.242352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctxq1124SJa1ohLfMl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "32184605-79ce-4514-90e6-e05686084dd7", "DetectTime": "2024-05-21T12:42:17.252623+00:00", "EventTime": "2024-05-21T12:42:17.252645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUtIEy2eITgf38ymg5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "6304466d-ed59-4caa-a2f1-5c7338456c20", "DetectTime": "2024-05-21T12:42:17.577751+00:00", "EventTime": "2024-05-21T12:42:17.577772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmf2SJ2VeS5U54S8ne"], "accumulated_threat_level": 4.5, "timewindow": 123} +{"Format": "IDEA0", "ID": "c4515d03-8809-42d4-8446-8f034e8b3410", "DetectTime": "2024-05-21T12:42:17.582469+00:00", "EventTime": "2024-05-21T12:42:17.582486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWpXFLQ93jmX82Fzg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "4f7ab012-52ef-49a4-9281-221d188baf94", "DetectTime": "2024-05-21T12:42:17.587051+00:00", "EventTime": "2024-05-21T12:42:17.587069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CekZxJ2ImSxuFkNUz1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "23d42b40-97cd-4716-b9c3-4096951c8696", "DetectTime": "2024-05-21T12:42:17.634479+00:00", "EventTime": "2024-05-21T12:42:17.634502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCvfhi3xWSPqmPjQV8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "51aca2e3-0f41-4b68-a874-329914d373c5", "DetectTime": "2024-05-21T12:42:17.734149+00:00", "EventTime": "2024-05-21T12:42:17.734172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEqZDBcxkKSbrZ7ic"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "3f5bf9f6-0fd0-43a4-8f78-fe5dc77e6111", "DetectTime": "2024-05-21T12:42:17.740336+00:00", "EventTime": "2024-05-21T12:42:17.740356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJImXR1wbYP1jRl9j9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "c0f8fe50-2081-4fcf-991f-0a0871d33e89", "DetectTime": "2024-05-21T12:42:17.751221+00:00", "EventTime": "2024-05-21T12:42:17.751241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C52ggx1qrEjGbx92yd"], "accumulated_threat_level": 5.3, "timewindow": 123} +{"Format": "IDEA0", "ID": "f92377d7-91b6-471b-94a6-4f2df29fb124", "DetectTime": "2024-05-21T12:42:17.797840+00:00", "EventTime": "2024-05-21T12:42:17.797863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZ5eHqv4Rp8j6Cp"], "accumulated_threat_level": 8.799999999999999, "timewindow": 121} +{"Format": "IDEA0", "ID": "60c2837a-7274-4c41-9090-ff4059ef8e98", "DetectTime": "2024-05-21T12:42:18.108069+00:00", "EventTime": "2024-05-21T12:42:18.108091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXz7nP2WYfgRzVo3Df"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "02edf3fe-7829-4fc1-8b04-0a320e20f0bd", "DetectTime": "2024-05-21T12:42:18.146136+00:00", "EventTime": "2024-05-21T12:42:18.146155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7YRszG8nCgMAcY2"], "accumulated_threat_level": 6.1, "timewindow": 123} +{"Format": "IDEA0", "ID": "997616f7-7589-4a79-9cbd-e3194560e27a", "DetectTime": "2024-05-21T12:42:18.195073+00:00", "EventTime": "2024-05-21T12:42:18.195092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4b3khZfF7hDODGLc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 123} +{"Format": "IDEA0", "ID": "cce02881-b063-40e6-a11b-a820c76102e4", "DetectTime": "2024-05-21T12:42:18.253213+00:00", "EventTime": "2024-05-21T12:42:18.253232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5gP78FG9vK91szh"], "accumulated_threat_level": 7.699999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "c74a8e91-e726-496f-9f28-58379e648307", "DetectTime": "2024-05-21T12:42:18.288818+00:00", "EventTime": "2024-05-21T12:42:18.288840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMGE2S3WWPKaJt32B6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "0aec3f0d-c233-46b3-ae51-d748df34ab84", "DetectTime": "2024-05-21T12:42:18.327512+00:00", "EventTime": "2024-05-21T12:42:18.327532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgeYor2KADxRJGJRXk"], "accumulated_threat_level": 8.5, "timewindow": 123} +{"Format": "IDEA0", "ID": "7842ddeb-5dcc-4fb9-bbfc-3755cbec3f91", "DetectTime": "2024-05-21T12:42:18.387297+00:00", "EventTime": "2024-05-21T12:42:18.387314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsKsf4guqlrPh2gGf"], "accumulated_threat_level": 9.3, "timewindow": 123} +{"Format": "IDEA0", "ID": "24aab892-2c96-4e9b-b41d-97c61cfe4e7f", "DetectTime": "2024-05-21T12:42:18.608094+00:00", "EventTime": "2024-05-21T12:42:18.608115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0h8fp4rHDss9Uwzgk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "0b1fbbe5-4e6c-4322-a61a-95c7f83544d5", "DetectTime": "2024-05-21T12:42:18.706857+00:00", "EventTime": "2024-05-21T12:42:18.706877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zMiP2LJ71tl23a8j"], "accumulated_threat_level": 10.100000000000001, "timewindow": 123} +{"Format": "IDEA0", "ID": "fa6b7b42-dff0-4ecc-85a2-333cfc3244f1", "DetectTime": "2024-05-21T12:42:18.754309+00:00", "EventTime": "2024-05-21T12:42:18.754327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7etIe3dwJNMTPFR9h"], "accumulated_threat_level": 10.900000000000002, "timewindow": 123} +{"Format": "IDEA0", "ID": "37bf86ff-a85b-4f3f-9fd0-673f5deb352f", "DetectTime": "2024-05-21T12:42:18.799234+00:00", "EventTime": "2024-05-21T12:42:18.799253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKp3NISiLflnQ3av3"], "accumulated_threat_level": 11.700000000000003, "timewindow": 123} +{"Format": "IDEA0", "ID": "f8069765-8cee-49d0-88d0-b83d9e8dc375", "DetectTime": "2024-05-21T12:42:18.845043+00:00", "EventTime": "2024-05-21T12:42:18.845061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gtVs1OJh9kHGiXh7"], "accumulated_threat_level": 12.500000000000004, "timewindow": 123} +{"Format": "Json", "ID": "f8069765-8cee-49d0-88d0-b83d9e8dc375", "DetectTime": "2024-05-21T12:42:18.845043+00:00", "EventTime": "2024-05-21T12:42:18.845061+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-06T02:24:22.815709+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2024/05/21 12:42:19.076415)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 123, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "5d420e4b-2372-4102-b8cd-5bf10bc27bfe", "DetectTime": "2024-05-21T12:42:19.081426+00:00", "EventTime": "2024-05-21T12:42:19.081448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9sckzbrngwBQ6qy2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "b721304e-b872-4921-ba00-77a5620e7e83", "DetectTime": "2024-05-21T12:42:19.092527+00:00", "EventTime": "2024-05-21T12:42:19.092546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVtSD3NDXfihW8ZN1"], "accumulated_threat_level": 0.8, "timewindow": 123} +{"Format": "IDEA0", "ID": "444e72a6-4583-4fd3-8df7-6d798eefb1a4", "DetectTime": "2024-05-21T12:42:19.102426+00:00", "EventTime": "2024-05-21T12:42:19.102445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuj76A24e6mJ6ODm24"], "accumulated_threat_level": 1.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "d6fd0985-57f5-4d75-bac4-ee72f6b0a290", "DetectTime": "2024-05-21T12:42:19.192532+00:00", "EventTime": "2024-05-21T12:42:19.192550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF77h31Wcri84uP5eh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 123} +{"Format": "IDEA0", "ID": "67571d29-968e-494b-bac7-d13bed054608", "DetectTime": "2024-05-21T12:42:19.249049+00:00", "EventTime": "2024-05-21T12:42:19.249068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYl9Ey2rIxHdIyWCj4"], "accumulated_threat_level": 3.2, "timewindow": 123} +{"Format": "IDEA0", "ID": "33c9a6c4-d2ce-41f6-93ba-90b6c22e2cd8", "DetectTime": "2024-05-21T12:42:19.279123+00:00", "EventTime": "2024-05-21T12:42:19.279144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDkuytIVfANAXVhi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "fd617e4e-25fa-4180-851d-95db6bc706a7", "DetectTime": "2024-05-21T12:42:19.324088+00:00", "EventTime": "2024-05-21T12:42:19.324107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEHGS1whwlmhHu7D7"], "accumulated_threat_level": 4.0, "timewindow": 123} +{"Format": "IDEA0", "ID": "4b051cf2-3bf2-41bf-876c-efbb6b0d6361", "DetectTime": "2024-05-21T12:42:19.369518+00:00", "EventTime": "2024-05-21T12:42:19.369542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnzg3u4oqtmRMJy707"], "accumulated_threat_level": 4.8, "timewindow": 123} +{"Format": "IDEA0", "ID": "05da1660-facc-48d0-8875-e745994173b5", "DetectTime": "2024-05-21T12:42:19.428960+00:00", "EventTime": "2024-05-21T12:42:19.428981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CajZ3t4XzmfXLlXQIf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "052ac434-7d82-4d1b-a43e-59618762e666", "DetectTime": "2024-05-21T12:42:19.477213+00:00", "EventTime": "2024-05-21T12:42:19.477232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgLhJ1zrAUUvFBSZf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 123} +{"Format": "IDEA0", "ID": "c0b3b510-3718-461c-9caf-731413ae6c0a", "DetectTime": "2024-05-21T12:42:19.519193+00:00", "EventTime": "2024-05-21T12:42:19.519215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVXOB12RCXMVwVBE9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "f05ed3dc-aa1d-4bbd-a28a-29ebfc65587c", "DetectTime": "2024-05-21T12:42:19.563089+00:00", "EventTime": "2024-05-21T12:42:19.563109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOMaQ1IlNzfpcs1Uj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "162795e4-e903-4fc4-98c5-0613dffee78d", "DetectTime": "2024-05-21T12:42:19.788556+00:00", "EventTime": "2024-05-21T12:42:19.788576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzofrD35hDehB8jBfh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "5615f0a6-b31d-45b9-9643-4f018f9cd8ae", "DetectTime": "2024-05-21T12:42:19.828564+00:00", "EventTime": "2024-05-21T12:42:19.828584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0jha4iHnw4Z3Cb2f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "e61f6965-22e2-4e94-a3e2-dcfbb581eaa9", "DetectTime": "2024-05-21T12:42:19.872106+00:00", "EventTime": "2024-05-21T12:42:19.872130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz97mA2dlylagdNfie"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "4638a19f-6e8e-4d64-b1ee-a0309b6882ce", "DetectTime": "2024-05-21T12:42:19.955479+00:00", "EventTime": "2024-05-21T12:42:19.955505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUTRQ1Q9DYmyEI9a2"], "accumulated_threat_level": 9.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "0a98a2b1-3073-4ca6-b7c3-0b61dbd9993a", "DetectTime": "2024-05-21T12:42:20.131904+00:00", "EventTime": "2024-05-21T12:42:20.131923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuydsq3bNPVqrV74m2"], "accumulated_threat_level": 10.4, "timewindow": 123} +{"Format": "IDEA0", "ID": "db70ca41-afc9-4907-ada9-bc6c9c31414b", "DetectTime": "2024-05-21T12:42:20.176652+00:00", "EventTime": "2024-05-21T12:42:20.176678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8zGV3NG2lhM0EEch"], "accumulated_threat_level": 11.200000000000001, "timewindow": 123} +{"Format": "IDEA0", "ID": "4647a053-3ebe-4f46-a5d6-00eed2bb1674", "DetectTime": "2024-05-21T12:42:20.223328+00:00", "EventTime": "2024-05-21T12:42:20.223352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKQn33hEDZmhpme42"], "accumulated_threat_level": 12.000000000000002, "timewindow": 123} +{"Format": "Json", "ID": "4647a053-3ebe-4f46-a5d6-00eed2bb1674", "DetectTime": "2024-05-21T12:42:20.223328+00:00", "EventTime": "2024-05-21T12:42:20.223352+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-06T02:55:17.918939+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2024/05/21 12:42:20.394715)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 123, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cb970018-750d-4dfe-9eae-3062931a9b31", "DetectTime": "2024-05-21T12:42:20.476312+00:00", "EventTime": "2024-05-21T12:42:20.476332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhgNTzgUfgzhw9ei"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "729411e0-1c46-46af-90a4-2f7c5183d2f4", "DetectTime": "2024-05-21T12:42:20.481659+00:00", "EventTime": "2024-05-21T12:42:20.481681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHz12r1295Z0Ygqjv2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "dfa59f89-4777-4b57-87c0-34aa5d845074", "DetectTime": "2024-05-21T12:42:20.543343+00:00", "EventTime": "2024-05-21T12:42:20.543365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C10N8k1ptspRmcw3Fl"], "accumulated_threat_level": 0.8, "timewindow": 123} +{"Format": "IDEA0", "ID": "5ea97ac2-9e44-445a-8b6f-4a5df2f22104", "DetectTime": "2024-05-21T12:42:20.591101+00:00", "EventTime": "2024-05-21T12:42:20.591125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBL064gkCL7uIjcfi"], "accumulated_threat_level": 1.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "b8ab2e2e-c54f-4d89-a250-fc3449ffd255", "DetectTime": "2024-05-21T12:42:20.631926+00:00", "EventTime": "2024-05-21T12:42:20.631948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZBBw1Pn4nHTEDBhc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 123} +{"Format": "IDEA0", "ID": "9d8171b8-ee1f-4eb0-8af0-47eb2cd0a833", "DetectTime": "2024-05-21T12:42:20.669730+00:00", "EventTime": "2024-05-21T12:42:20.669755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFW87E2iVQQsnvjDV8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "41eb31ac-c61a-457d-a1f3-cc4376a8acae", "DetectTime": "2024-05-21T12:42:20.713881+00:00", "EventTime": "2024-05-21T12:42:20.713902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXPx6ZATWhvwSIG6"], "accumulated_threat_level": 3.2, "timewindow": 123} +{"Format": "IDEA0", "ID": "5e3d9fab-cc92-4d3c-b540-49f46e61065f", "DetectTime": "2024-05-21T12:42:20.759658+00:00", "EventTime": "2024-05-21T12:42:20.759681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBP3ZlEcmMKRBxnMc"], "accumulated_threat_level": 4.0, "timewindow": 123} +{"Format": "IDEA0", "ID": "f3600dc3-ec8d-4d3f-81de-1f087c7cd53c", "DetectTime": "2024-05-21T12:42:20.803981+00:00", "EventTime": "2024-05-21T12:42:20.804003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsdSn2U9pYI0AzAX2"], "accumulated_threat_level": 4.8, "timewindow": 123} +{"Format": "IDEA0", "ID": "248ae495-e5d5-45e4-b18a-7e4268639143", "DetectTime": "2024-05-21T12:42:21.070363+00:00", "EventTime": "2024-05-21T12:42:21.070389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CydSui12gUuzoNZln"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "fa03105d-b0ae-4257-acc8-2720a01ce127", "DetectTime": "2024-05-21T12:42:21.084435+00:00", "EventTime": "2024-05-21T12:42:21.084456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmZ2cN3s0TKzGhswCc"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "be047f62-3aac-4a96-84f9-e63196fd6ba8", "DetectTime": "2024-05-21T12:42:21.089304+00:00", "EventTime": "2024-05-21T12:42:21.089322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgfd01uk1ODUUk0za"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "ef4077d9-7a38-4604-9a0c-8addd7b24348", "DetectTime": "2024-05-21T12:42:21.093699+00:00", "EventTime": "2024-05-21T12:42:21.093717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cip5IL2UWNmCNvFCU4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "04039944-af70-4da2-8652-e66e6913df00", "DetectTime": "2024-05-21T12:42:21.140744+00:00", "EventTime": "2024-05-21T12:42:21.140766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXNwtLU8cR1r6HV4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "9646eeb6-c64b-4ab6-8e07-5c96365faeb2", "DetectTime": "2024-05-21T12:42:21.245719+00:00", "EventTime": "2024-05-21T12:42:21.245737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA1KVl1vOhqgk4xF3c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "b16a2f56-7382-4816-964a-172afd53f4bd", "DetectTime": "2024-05-21T12:42:21.281242+00:00", "EventTime": "2024-05-21T12:42:21.281262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFOiL1bWotdKIBO29"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 123} +{"Format": "IDEA0", "ID": "ef8ca492-53d9-405f-ab2f-a8997623570e", "DetectTime": "2024-05-21T12:42:21.326679+00:00", "EventTime": "2024-05-21T12:42:21.326697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9m4BI1oAoK2P9DpSk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "d872d7a1-7957-4922-b0ec-09f3c2090071", "DetectTime": "2024-05-21T12:42:21.334294+00:00", "EventTime": "2024-05-21T12:42:21.334318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rT8s3zWcgxjs6Oh7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "4b301ff8-d424-45d4-aef2-b367dcc26561", "DetectTime": "2024-05-21T12:42:21.644488+00:00", "EventTime": "2024-05-21T12:42:21.644511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2vhl3EHcWgGO383i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "ff30dc4f-86d7-449f-bced-a858ea483bba", "DetectTime": "2024-05-21T12:42:21.651612+00:00", "EventTime": "2024-05-21T12:42:21.651633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHsqsz1tMoEDA683xg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "a382d7ce-ac80-479e-a57a-706c76b4c5c6", "DetectTime": "2024-05-21T12:42:21.656457+00:00", "EventTime": "2024-05-21T12:42:21.656477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX668r4xfK03AQzVwf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "0c8e82ea-f397-4cd3-9eb7-bb60f35e2759", "DetectTime": "2024-05-21T12:42:21.660980+00:00", "EventTime": "2024-05-21T12:42:21.660999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUETdJ2ypRqdgbAdO3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "a431e081-a777-4eb0-9c8a-55a557b75a51", "DetectTime": "2024-05-21T12:42:21.666585+00:00", "EventTime": "2024-05-21T12:42:21.666605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgik0vpmpyuQEO1d2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "d1cea7d8-f766-42cb-a8c3-d8323c99d88a", "DetectTime": "2024-05-21T12:42:21.734079+00:00", "EventTime": "2024-05-21T12:42:21.734097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1xhD2CaVJTYLt3hh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "b700eb18-e01e-429c-aa8c-111c9981b6e1", "DetectTime": "2024-05-21T12:42:21.863916+00:00", "EventTime": "2024-05-21T12:42:21.863937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8kLh2Z72gqkQ4CK2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 123} +{"Format": "IDEA0", "ID": "9a9be895-81af-41bf-9aff-afe90dffe970", "DetectTime": "2024-05-21T12:42:21.869381+00:00", "EventTime": "2024-05-21T12:42:21.869399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2W8o72QJoBDlvtdV1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "f9755efc-bd7f-412f-94b7-c4340c4f92f0", "DetectTime": "2024-05-21T12:42:22.125847+00:00", "EventTime": "2024-05-21T12:42:22.125870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFT92t9nWmzHdd8C2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "d0ab1eec-58c0-4c5e-9613-35f5319639a5", "DetectTime": "2024-05-21T12:42:22.160494+00:00", "EventTime": "2024-05-21T12:42:22.160524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxnNf91i2E7DGfFtS1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "bd31adf3-6c1c-4998-9c1f-75f5cac44365", "DetectTime": "2024-05-21T12:42:22.173322+00:00", "EventTime": "2024-05-21T12:42:22.173342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CknHha3wLKkz1ifu69"], "accumulated_threat_level": 9.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "895326aa-0f73-4cce-bf9f-36c6f0f59513", "DetectTime": "2024-05-21T12:42:22.244974+00:00", "EventTime": "2024-05-21T12:42:22.244995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbNtn1hkfU6YD7aMi"], "accumulated_threat_level": 10.4, "timewindow": 123} +{"Format": "IDEA0", "ID": "2dc9a0db-493d-47e0-98de-410694536570", "DetectTime": "2024-05-21T12:42:22.290750+00:00", "EventTime": "2024-05-21T12:42:22.290770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUhWKa4c9AMtq4Dqe9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 123} +{"Format": "IDEA0", "ID": "034a53d0-b6d6-40f4-994a-ca8d6770e775", "DetectTime": "2024-05-21T12:42:22.337024+00:00", "EventTime": "2024-05-21T12:42:22.337041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iAdh3X3utdCAePOa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 123} +{"Format": "Json", "ID": "034a53d0-b6d6-40f4-994a-ca8d6770e775", "DetectTime": "2024-05-21T12:42:22.337024+00:00", "EventTime": "2024-05-21T12:42:22.337041+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-06T02:55:22.945343+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 123. (real time 2024/05/21 12:42:22.505115)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 123, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ad199d86-1546-420c-aded-3cd7d9cec99a", "DetectTime": "2024-05-21T12:42:22.515362+00:00", "EventTime": "2024-05-21T12:42:22.515380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVChHorEHwD4bcIJ3"], "accumulated_threat_level": 0.8, "timewindow": 123} +{"Format": "IDEA0", "ID": "e04f356a-aff5-4d75-94e4-34595d865839", "DetectTime": "2024-05-21T12:42:22.640021+00:00", "EventTime": "2024-05-21T12:42:22.640042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BgXr1nU8GrHgYfD5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "4c6c7751-6a98-40aa-83c8-77d1531e6a04", "DetectTime": "2024-05-21T12:42:22.645042+00:00", "EventTime": "2024-05-21T12:42:22.645061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cskggr3SgjTGzjrSY3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "35658069-aa42-41f5-9841-440f6e7c12ba", "DetectTime": "2024-05-21T12:42:22.649797+00:00", "EventTime": "2024-05-21T12:42:22.649815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYeGzT1bezkkrzl2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "44e79394-7a6b-4069-b5a3-bd60bd2da16e", "DetectTime": "2024-05-21T12:42:22.654157+00:00", "EventTime": "2024-05-21T12:42:22.654175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xpQb1sFijO8j0YFl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "923e9722-c35a-4203-b91c-461811c4c350", "DetectTime": "2024-05-21T12:42:22.664639+00:00", "EventTime": "2024-05-21T12:42:22.664657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clcr4R1FWbVe90D5Li"], "accumulated_threat_level": 1.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "fec62ea7-13da-416b-a3e9-c33431fcd724", "DetectTime": "2024-05-21T12:42:22.816316+00:00", "EventTime": "2024-05-21T12:42:22.816341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcV7UbbqdjESNLW4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "6c4ae0c5-b2d9-4a7d-99fe-1a7cf3211f52", "DetectTime": "2024-05-21T12:42:22.860820+00:00", "EventTime": "2024-05-21T12:42:22.860839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTfrq395uPb6q8FRf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 123} +{"Format": "IDEA0", "ID": "8cea5aec-7d52-4c47-b664-7d7cf30f1db6", "DetectTime": "2024-05-21T12:42:23.007370+00:00", "EventTime": "2024-05-21T12:42:23.007396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR90n4YllJN8S11G"], "accumulated_threat_level": 3.2, "timewindow": 123} +{"Format": "IDEA0", "ID": "282ab4d0-6fa9-4227-a20e-a446e905c04e", "DetectTime": "2024-05-21T12:42:23.053976+00:00", "EventTime": "2024-05-21T12:42:23.053994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMcJlCKecxcmM8hc"], "accumulated_threat_level": 4.0, "timewindow": 123} +{"Format": "IDEA0", "ID": "63cf628c-752c-46f1-a608-ac7bf093117e", "DetectTime": "2024-05-21T12:42:23.359555+00:00", "EventTime": "2024-05-21T12:42:23.359576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.117.252.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtGhMc4HQFFCyHKr3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "16e23b66-6444-4367-a88b-1fe997efd669", "DetectTime": "2024-05-21T12:42:23.365042+00:00", "EventTime": "2024-05-21T12:42:23.365063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CERamK2ljUrCQuGuN5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "de2ac40e-58ac-49d7-a105-40af6dc2387d", "DetectTime": "2024-05-21T12:42:23.378886+00:00", "EventTime": "2024-05-21T12:42:23.378911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKHqa3Z2IQYMXriFi"], "accumulated_threat_level": 4.8, "timewindow": 123} +{"Format": "IDEA0", "ID": "911dca59-7eb2-424d-91d4-d07452fc34b3", "DetectTime": "2024-05-21T12:42:23.478143+00:00", "EventTime": "2024-05-21T12:42:23.478165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3b014Vz9BrfSaxXf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "98afefd4-2f3e-440f-a609-740ff8843465", "DetectTime": "2024-05-21T12:42:23.562361+00:00", "EventTime": "2024-05-21T12:42:23.562383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7WjqDQSf9DUwDL6"], "accumulated_threat_level": 0.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "d9ecb96e-472f-452e-9aab-659dfcd8c48b", "DetectTime": "2024-05-21T12:42:23.633476+00:00", "EventTime": "2024-05-21T12:42:23.633497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMI1k3Or92bqJ3Psc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "271cdb92-8649-4450-92ea-7a4261b904e0", "DetectTime": "2024-05-21T12:42:23.674807+00:00", "EventTime": "2024-05-21T12:42:23.674828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrALR32BQusHhQujAc"], "accumulated_threat_level": 1.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "7f3f14b9-1ad6-44ca-8211-e378dc474436", "DetectTime": "2024-05-21T12:42:23.925584+00:00", "EventTime": "2024-05-21T12:42:23.925605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTn5Ix2U2F70ApogBg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "c8a145f8-0844-4154-9eeb-53ab723de793", "DetectTime": "2024-05-21T12:42:23.930577+00:00", "EventTime": "2024-05-21T12:42:23.930595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnhEnm3vI1zJNnrg8a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "25f94a09-0356-4bc3-b5f0-06ae7f1cad31", "DetectTime": "2024-05-21T12:42:24.006598+00:00", "EventTime": "2024-05-21T12:42:24.006617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIhbZ36ubyxaGD1v3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 124} +{"Format": "IDEA0", "ID": "80c395b0-ffe7-4643-97dd-0e08b25f5420", "DetectTime": "2024-05-21T12:42:24.049377+00:00", "EventTime": "2024-05-21T12:42:24.049394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjJGXMH4Ekhms8rl"], "accumulated_threat_level": 3.2, "timewindow": 124} +{"Format": "IDEA0", "ID": "0207236e-5bbd-4904-9ecc-ad3a3cc4ed3f", "DetectTime": "2024-05-21T12:42:24.097280+00:00", "EventTime": "2024-05-21T12:42:24.097302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl12yN3TU3O3t3iV4l"], "accumulated_threat_level": 4.0, "timewindow": 124} +{"Format": "IDEA0", "ID": "e13eda09-f973-4c1d-8402-8a5ae0ddb9e3", "DetectTime": "2024-05-21T12:42:24.142386+00:00", "EventTime": "2024-05-21T12:42:24.142416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvOw44w0OrJ6zXqV5"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "ef14ed54-332b-4bc4-add2-268fe8342ad5", "DetectTime": "2024-05-21T12:42:24.193235+00:00", "EventTime": "2024-05-21T12:42:24.193254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7k0o1LRNllrpdst3"], "accumulated_threat_level": 5.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "74af86f0-7027-4ca5-b352-69246af70544", "DetectTime": "2024-05-21T12:42:24.199533+00:00", "EventTime": "2024-05-21T12:42:24.199567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiZFN240bqRdwsFT1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "aa6e8dde-d44f-438c-b838-abcba079f3ff", "DetectTime": "2024-05-21T12:42:24.350671+00:00", "EventTime": "2024-05-21T12:42:24.350690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.154.84.83"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.154.84.83 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUitc3nGZUjTJ7614"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "ce54c956-c985-45fa-9492-f8e4589352b1", "DetectTime": "2024-05-21T12:42:24.362725+00:00", "EventTime": "2024-05-21T12:42:24.362744+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.154.84.83"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.154.84.83 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUitc3nGZUjTJ7614"], "accumulated_threat_level": 4.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "424c99a6-dd27-4136-a391-9cc25db0572a", "DetectTime": "2024-05-21T12:42:24.470453+00:00", "EventTime": "2024-05-21T12:42:24.470478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGj6944YjiGYrcnc5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "f7c1ec22-a092-4747-9089-d3f2e37cf20f", "DetectTime": "2024-05-21T12:42:24.512231+00:00", "EventTime": "2024-05-21T12:42:24.512253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCF6hJ3EEszEL1dNp4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 124} +{"Format": "IDEA0", "ID": "24f1d5db-f24d-4fa0-9408-27f8de4e3109", "DetectTime": "2024-05-21T12:42:24.559884+00:00", "EventTime": "2024-05-21T12:42:24.559902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx5TU43hnEDxlJ2jTe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "66fbe6e6-bc48-43bf-9f42-1dfb87c43981", "DetectTime": "2024-05-21T12:42:24.608752+00:00", "EventTime": "2024-05-21T12:42:24.608771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2z3wy2xfb2BnvAla5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "e7da373b-439a-4bbf-b8e1-b4f4dcdf8036", "DetectTime": "2024-05-21T12:42:24.652874+00:00", "EventTime": "2024-05-21T12:42:24.652893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C999BH3qkEwlmAWju5"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "5d360a35-0158-4bb0-aef4-721a84ad8632", "DetectTime": "2024-05-21T12:42:24.664477+00:00", "EventTime": "2024-05-21T12:42:24.664500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWH4MZ2d0RLHaD0tWd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "ffd204b1-4c7f-4a88-b6f5-3617cc9c9a32", "DetectTime": "2024-05-21T12:42:24.675569+00:00", "EventTime": "2024-05-21T12:42:24.675588+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C999BH3qkEwlmAWju5"], "accumulated_threat_level": 4.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "776a11be-d592-4d86-b506-ef4c81355633", "DetectTime": "2024-05-21T12:42:24.689784+00:00", "EventTime": "2024-05-21T12:42:24.689804+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClARnq1I8PTTRu9qCc"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "8639d2fb-2582-4fcd-b289-99fa5b0e7dce", "DetectTime": "2024-05-21T12:42:24.703328+00:00", "EventTime": "2024-05-21T12:42:24.703347+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClARnq1I8PTTRu9qCc"], "accumulated_threat_level": 5.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "f3f38794-b710-4d38-bed5-c4c74cccb1f8", "DetectTime": "2024-05-21T12:42:24.715093+00:00", "EventTime": "2024-05-21T12:42:24.715111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PMN33J3b8Xkqppjf"], "accumulated_threat_level": 9.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "f142ab7c-8bc0-4439-914d-85172eb1d41a", "DetectTime": "2024-05-21T12:42:24.729117+00:00", "EventTime": "2024-05-21T12:42:24.729136+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQgwhLyWR57gE2EX8"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "5bf4cee7-2833-4200-afdd-d3cffeabe03a", "DetectTime": "2024-05-21T12:42:24.741901+00:00", "EventTime": "2024-05-21T12:42:24.741920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQgwhLyWR57gE2EX8"], "accumulated_threat_level": 5.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "52b29cc7-72e9-4421-81fb-1e4fcc115d26", "DetectTime": "2024-05-21T12:42:24.762583+00:00", "EventTime": "2024-05-21T12:42:24.762603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34kMV16QBJo9KioQ2"], "accumulated_threat_level": 10.4, "timewindow": 124} +{"Format": "IDEA0", "ID": "722a447b-bf51-429e-8cb4-b68b511bc054", "DetectTime": "2024-05-21T12:42:24.774305+00:00", "EventTime": "2024-05-21T12:42:24.774322+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8vLa4HBilFS6md1"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "fb10a12e-1ad9-4f26-a7fb-119d1079cba8", "DetectTime": "2024-05-21T12:42:24.786219+00:00", "EventTime": "2024-05-21T12:42:24.786238+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8vLa4HBilFS6md1"], "accumulated_threat_level": 6.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "0ad5d095-706d-4d15-afb8-ad67a9f0f4f7", "DetectTime": "2024-05-21T12:42:24.798331+00:00", "EventTime": "2024-05-21T12:42:24.798351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq599F2oGNSkZQ3Csh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 124} +{"Format": "IDEA0", "ID": "66a81493-97af-43b4-bdd6-44b2ac1f091a", "DetectTime": "2024-05-21T12:42:24.810876+00:00", "EventTime": "2024-05-21T12:42:24.810894+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3sWa38NHfv8RVImc"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "55857658-fb34-45b2-ae76-6cf0dd9fe4a8", "DetectTime": "2024-05-21T12:42:24.823359+00:00", "EventTime": "2024-05-21T12:42:24.823377+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3sWa38NHfv8RVImc"], "accumulated_threat_level": 6.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "bc1a7ec8-9e77-4cac-b697-b4f8a237a6e1", "DetectTime": "2024-05-21T12:42:24.838428+00:00", "EventTime": "2024-05-21T12:42:24.838450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFZhr3zOBZaKEw4zl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "71cceba0-ebd2-4a39-a26a-514d0d9d3fb4", "DetectTime": "2024-05-21T12:42:24.849330+00:00", "EventTime": "2024-05-21T12:42:24.849348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79diXFQkq1UPbY75"], "accumulated_threat_level": 12.000000000000002, "timewindow": 124} +{"Format": "Json", "ID": "71cceba0-ebd2-4a39-a26a-514d0d9d3fb4", "DetectTime": "2024-05-21T12:42:24.849330+00:00", "EventTime": "2024-05-21T12:42:24.849348+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-06T03:26:10.520608+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2024/05/21 12:42:24.993615)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 124, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9a82e212-57a4-4bf1-9a5a-0855a1324b90", "DetectTime": "2024-05-21T12:42:25.006626+00:00", "EventTime": "2024-05-21T12:42:25.006645+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1RlzjysiN9UsNK32"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "f50540a3-36c9-407d-a85e-046088bdd339", "DetectTime": "2024-05-21T12:42:25.020293+00:00", "EventTime": "2024-05-21T12:42:25.020314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1RlzjysiN9UsNK32"], "accumulated_threat_level": 7.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "b9fefc6c-125c-4737-ae6b-f36e6d94573d", "DetectTime": "2024-05-21T12:42:25.031759+00:00", "EventTime": "2024-05-21T12:42:25.031778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgVqO2NnivNpQV69k"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "030d7fb9-473b-4a4f-8dbb-1380e21678c4", "DetectTime": "2024-05-21T12:42:25.045076+00:00", "EventTime": "2024-05-21T12:42:25.045108+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgVqO2NnivNpQV69k"], "accumulated_threat_level": 7.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "874823c8-e09b-4fb4-a775-d03a79645a7f", "DetectTime": "2024-05-21T12:42:25.056657+00:00", "EventTime": "2024-05-21T12:42:25.056676+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjc8b3U68BPevf2rf"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "35a53340-31ae-434e-9f79-5fe35ca864f3", "DetectTime": "2024-05-21T12:42:25.068496+00:00", "EventTime": "2024-05-21T12:42:25.068516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjc8b3U68BPevf2rf"], "accumulated_threat_level": 8.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "4954c5bd-a3d8-45a4-a3a5-127b5506ce8b", "DetectTime": "2024-05-21T12:42:25.098602+00:00", "EventTime": "2024-05-21T12:42:25.098628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVf3P3GEUsBPyutnl"], "accumulated_threat_level": 0.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "2acd88a9-b986-48ea-9919-753fa219312e", "DetectTime": "2024-05-21T12:42:25.145147+00:00", "EventTime": "2024-05-21T12:42:25.145168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19exI1ICPV3g3Cx01"], "accumulated_threat_level": 1.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "a7eae761-e47d-4174-9dc7-1d4ee05c04bb", "DetectTime": "2024-05-21T12:42:25.191439+00:00", "EventTime": "2024-05-21T12:42:25.191463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCTD12I1KCAY47vR7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 124} +{"Format": "IDEA0", "ID": "f157b21b-68a8-421c-abd2-886e49550190", "DetectTime": "2024-05-21T12:42:25.209928+00:00", "EventTime": "2024-05-21T12:42:25.209954+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpNT03Ujr3aeUsXTi"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "36a4667c-2eb9-4b39-9b17-c9dce33725f8", "DetectTime": "2024-05-21T12:42:25.222741+00:00", "EventTime": "2024-05-21T12:42:25.222763+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpNT03Ujr3aeUsXTi"], "accumulated_threat_level": 8.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "462c846a-fa39-42e5-9da1-2a4dd8d81ba6", "DetectTime": "2024-05-21T12:42:25.241888+00:00", "EventTime": "2024-05-21T12:42:25.241906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Uxx03oNQaLluRoZ4"], "accumulated_threat_level": 3.2, "timewindow": 124} +{"Format": "IDEA0", "ID": "8486ab87-6d2c-4c5f-8d8b-81537bbf689f", "DetectTime": "2024-05-21T12:42:25.285012+00:00", "EventTime": "2024-05-21T12:42:25.285037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANF7ecq2PPzF2wP7"], "accumulated_threat_level": 4.0, "timewindow": 124} +{"Format": "IDEA0", "ID": "3949244a-6751-4317-9e9b-74bff741b6b1", "DetectTime": "2024-05-21T12:42:25.297345+00:00", "EventTime": "2024-05-21T12:42:25.297363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvox43DbKRjNOBBk9"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "5d77e764-6f88-4507-b5e0-4224e1457e14", "DetectTime": "2024-05-21T12:42:25.310827+00:00", "EventTime": "2024-05-21T12:42:25.310852+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvox43DbKRjNOBBk9"], "accumulated_threat_level": 9.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "9ca4442b-0293-4af1-b977-ecdb0336b554", "DetectTime": "2024-05-21T12:42:25.318557+00:00", "EventTime": "2024-05-21T12:42:25.318578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ZQvQ2dROjtKppYa3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "ccad88af-a51d-4742-a896-3a8fbbbdf351", "DetectTime": "2024-05-21T12:42:25.330241+00:00", "EventTime": "2024-05-21T12:42:25.330265+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRxT1A3eu2NhBoRzK5"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "8096969c-4a56-4381-a321-78ab2fb21de2", "DetectTime": "2024-05-21T12:42:25.341983+00:00", "EventTime": "2024-05-21T12:42:25.342005+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRxT1A3eu2NhBoRzK5"], "accumulated_threat_level": 9.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "db1c5b73-32bc-47ef-b9b2-ab04852c670b", "DetectTime": "2024-05-21T12:42:25.411716+00:00", "EventTime": "2024-05-21T12:42:25.411736+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMlcZQ1Tv9zwTz6HMj"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "3db39675-9980-456e-8e62-02abf401f95d", "DetectTime": "2024-05-21T12:42:25.424330+00:00", "EventTime": "2024-05-21T12:42:25.424349+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMlcZQ1Tv9zwTz6HMj"], "accumulated_threat_level": 10.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "76c2274d-21ba-4ad3-b15f-99c0382e5476", "DetectTime": "2024-05-21T12:42:25.575888+00:00", "EventTime": "2024-05-21T12:42:25.575910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr3orC1UA1QeIyfUsl"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "9f718457-2178-48dd-a1ea-c79b35f0285a", "DetectTime": "2024-05-21T12:42:25.602854+00:00", "EventTime": "2024-05-21T12:42:25.602876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdUude22n2ih92y4Wf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "f05d66d2-db52-4e31-afaa-59d0018c1f92", "DetectTime": "2024-05-21T12:42:25.652996+00:00", "EventTime": "2024-05-21T12:42:25.653016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHVA93wjC7fz3Qvzd"], "accumulated_threat_level": 5.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "f98c17f0-3354-4a1c-8bbb-82577c49c25d", "DetectTime": "2024-05-21T12:42:25.701466+00:00", "EventTime": "2024-05-21T12:42:25.701483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1LrLe4QIR6TRZzvyk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 124} +{"Format": "IDEA0", "ID": "e152e2cf-6597-4ec5-b281-1eff0f61dbba", "DetectTime": "2024-05-21T12:42:25.743595+00:00", "EventTime": "2024-05-21T12:42:25.743613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CprWQv2eEIXzQLwmM5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "a99ea45d-b717-4e63-9ddf-a2bdd3cc479b", "DetectTime": "2024-05-21T12:42:25.787919+00:00", "EventTime": "2024-05-21T12:42:25.787939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8dh3W24yyy7JZ9kp4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "4e4ff5e2-2bd1-4acb-954f-a1aa5d198923", "DetectTime": "2024-05-21T12:42:25.869477+00:00", "EventTime": "2024-05-21T12:42:25.869498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDOGw3gpoK88aZvjk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "ddd39000-7f78-43d7-8062-f2009a3cbddf", "DetectTime": "2024-05-21T12:42:25.928041+00:00", "EventTime": "2024-05-21T12:42:25.928061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmg8KI1bYGntjF4lv"], "accumulated_threat_level": 9.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "39c6900d-08e5-49f8-8bb9-d72654ebeecf", "DetectTime": "2024-05-21T12:42:25.974057+00:00", "EventTime": "2024-05-21T12:42:25.974076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUIDpCYqrVNchaEtk"], "accumulated_threat_level": 10.4, "timewindow": 124} +{"Format": "IDEA0", "ID": "fab451fb-93f9-413f-9dcc-166bab9b3a69", "DetectTime": "2024-05-21T12:42:26.193962+00:00", "EventTime": "2024-05-21T12:42:26.193996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm785F4qUcU9WqdWf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "7227f395-09ce-408b-b56c-aaeba9eebcb8", "DetectTime": "2024-05-21T12:42:26.235411+00:00", "EventTime": "2024-05-21T12:42:26.235431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd7V6gbixZYFWuCJg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 124} +{"Format": "IDEA0", "ID": "029c86cf-9cdd-4e6c-ad7b-7a1ea8d61649", "DetectTime": "2024-05-21T12:42:26.282037+00:00", "EventTime": "2024-05-21T12:42:26.282063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIH3pj2Ex8u2qdJWL5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 124} +{"Format": "Json", "ID": "029c86cf-9cdd-4e6c-ad7b-7a1ea8d61649", "DetectTime": "2024-05-21T12:42:26.282037+00:00", "EventTime": "2024-05-21T12:42:26.282063+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "1970-01-06T03:56:16.634450+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2024/05/21 12:42:26.442358)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 124, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f33e6c35-b724-4ae1-9881-ee2728fda006", "DetectTime": "2024-05-21T12:42:26.452659+00:00", "EventTime": "2024-05-21T12:42:26.452678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVO3JPZJKhXlr5Te"], "accumulated_threat_level": 0.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "e2b4dd89-d2f1-4c98-aae4-e8c590c7714f", "DetectTime": "2024-05-21T12:42:26.463357+00:00", "EventTime": "2024-05-21T12:42:26.463377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIW00q1GLMB7d7thv8"], "accumulated_threat_level": 1.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "992eeba5-883b-4b4e-b41b-895d20b74e85", "DetectTime": "2024-05-21T12:42:26.474279+00:00", "EventTime": "2024-05-21T12:42:26.474298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkupiB4afAK3YSjwS8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 124} +{"Format": "IDEA0", "ID": "b0ac98b9-0cac-4330-9051-915b91b0e096", "DetectTime": "2024-05-21T12:42:26.479147+00:00", "EventTime": "2024-05-21T12:42:26.479166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ComNx2gDiu5dVYKzj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "d5160843-94be-46fc-869e-0335af9044a3", "DetectTime": "2024-05-21T12:42:26.489627+00:00", "EventTime": "2024-05-21T12:42:26.489645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBln44BrSVzGgtYJ1"], "accumulated_threat_level": 3.2, "timewindow": 124} +{"Format": "IDEA0", "ID": "32ebdcd8-db8a-4e9d-a5d2-5d2a65bbcc37", "DetectTime": "2024-05-21T12:42:26.718207+00:00", "EventTime": "2024-05-21T12:42:26.718233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmabif4eHVyPNjw72"], "accumulated_threat_level": 4.0, "timewindow": 124} +{"Format": "IDEA0", "ID": "47395fb4-1a6b-4f69-b89f-317ebc7c470f", "DetectTime": "2024-05-21T12:42:26.764154+00:00", "EventTime": "2024-05-21T12:42:26.764174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQp75e1ffXcA09xaKg"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "3dcb69b5-f234-41b2-a6ba-fe3911703976", "DetectTime": "2024-05-21T12:42:26.806395+00:00", "EventTime": "2024-05-21T12:42:26.806434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSe0s72oRgOpTyND4"], "accumulated_threat_level": 5.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "0430ef50-6c17-419e-ba01-82ca175108c9", "DetectTime": "2024-05-21T12:42:26.915397+00:00", "EventTime": "2024-05-21T12:42:26.915417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C76Xak1TokDo5uCRt"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "c4579e88-9321-4e80-a179-c5f801592eeb", "DetectTime": "2024-05-21T12:42:26.954841+00:00", "EventTime": "2024-05-21T12:42:26.954863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSYkZl4EE2vHmYm1yk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 124} +{"Format": "IDEA0", "ID": "0e77f93a-4096-4980-bf50-e20b61343a59", "DetectTime": "2024-05-21T12:42:27.008281+00:00", "EventTime": "2024-05-21T12:42:27.008299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXxW84u4PLmrRCRA7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "5b5359ce-4023-4709-a7a8-27e8f0a0cd74", "DetectTime": "2024-05-21T12:42:27.042670+00:00", "EventTime": "2024-05-21T12:42:27.042697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLI5V1WQn7SjqMf14"], "accumulated_threat_level": 7.999999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "074677e3-84bb-4a4b-b49d-3c6d668d22ef", "DetectTime": "2024-05-21T12:42:27.087787+00:00", "EventTime": "2024-05-21T12:42:27.087811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPzqPc4TcqGPrv5HB"], "accumulated_threat_level": 8.799999999999999, "timewindow": 124} +{"Format": "IDEA0", "ID": "2d0819e5-ffe9-43a3-a5bc-7123b1f79e75", "DetectTime": "2024-05-21T12:42:27.134902+00:00", "EventTime": "2024-05-21T12:42:27.134924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9A2am15EKIFcyzDAl"], "accumulated_threat_level": 9.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "66efb494-2433-4b52-baf7-789961bbcd67", "DetectTime": "2024-05-21T12:42:27.376735+00:00", "EventTime": "2024-05-21T12:42:27.376766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4FHe2C8jZ4ET9sP9"], "accumulated_threat_level": 10.4, "timewindow": 124} +{"Format": "IDEA0", "ID": "65e2f0d0-3038-49b3-b78e-e1a9e200c1cf", "DetectTime": "2024-05-21T12:42:27.420639+00:00", "EventTime": "2024-05-21T12:42:27.420657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9dfWF2zr6sPn7ih57"], "accumulated_threat_level": 11.200000000000001, "timewindow": 124} +{"Format": "IDEA0", "ID": "4343af40-d869-444c-93d2-b505ce097704", "DetectTime": "2024-05-21T12:42:27.456957+00:00", "EventTime": "2024-05-21T12:42:27.456979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2wqZC3RFzNfmHeVrf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "8d380629-5792-4c59-950c-5e97c8d6b041", "DetectTime": "2024-05-21T12:42:27.494629+00:00", "EventTime": "2024-05-21T12:42:27.494650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvwVB1poUtlJjtwgl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 124} +{"Format": "Json", "ID": "8d380629-5792-4c59-950c-5e97c8d6b041", "DetectTime": "2024-05-21T12:42:27.494629+00:00", "EventTime": "2024-05-21T12:42:27.494650+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-06T03:56:20.477004+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 124. (real time 2024/05/21 12:42:27.926485)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 124, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4eb3b86a-111e-426b-a746-07ac042f9482", "DetectTime": "2024-05-21T12:42:27.936695+00:00", "EventTime": "2024-05-21T12:42:27.936714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRj8gh29nHj3WjOZfg"], "accumulated_threat_level": 0.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "4647d699-35a2-47ac-9ebe-de8fc16fbb37", "DetectTime": "2024-05-21T12:42:27.947076+00:00", "EventTime": "2024-05-21T12:42:27.947098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yWjh4eCoYRNwl3Ta"], "accumulated_threat_level": 1.6, "timewindow": 124} +{"Format": "IDEA0", "ID": "2dff147b-047b-4e44-87f6-a7862ac8cbc3", "DetectTime": "2024-05-21T12:42:27.957727+00:00", "EventTime": "2024-05-21T12:42:27.957745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDz1zO1ky8cjY70ZV6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 124} +{"Format": "IDEA0", "ID": "efbde6db-b8f7-47bb-a9dd-483348c1a76e", "DetectTime": "2024-05-21T12:42:27.973334+00:00", "EventTime": "2024-05-21T12:42:27.973354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRhVz3NEGB1SMSbBa"], "accumulated_threat_level": 3.2, "timewindow": 124} +{"Format": "IDEA0", "ID": "fcadb6f8-eecf-4630-9346-9fbd8ac02e3f", "DetectTime": "2024-05-21T12:42:27.985191+00:00", "EventTime": "2024-05-21T12:42:27.985212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CssJSM2hE321dnDB7c"], "accumulated_threat_level": 4.0, "timewindow": 124} +{"Format": "IDEA0", "ID": "a6918f5d-6ab2-4dcf-9cd8-39bad0f62138", "DetectTime": "2024-05-21T12:42:27.996570+00:00", "EventTime": "2024-05-21T12:42:27.996593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMIpvT2eB9RrZk8y91"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "d36c52eb-10a1-4270-be61-856a9348ac22", "DetectTime": "2024-05-21T12:42:28.062815+00:00", "EventTime": "2024-05-21T12:42:28.062837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COAAwK2XXQwGUZUSOh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "31052c93-7af4-44ba-87b4-7a59b0a1519e", "DetectTime": "2024-05-21T12:42:28.099808+00:00", "EventTime": "2024-05-21T12:42:28.099827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8R1q91zwP3Z6ocljc"], "accumulated_threat_level": 0.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "8662808e-d1e7-4f66-b00e-1cb2ca9fa76a", "DetectTime": "2024-05-21T12:42:28.145963+00:00", "EventTime": "2024-05-21T12:42:28.145985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6dmb3ri5WrK46Trh"], "accumulated_threat_level": 1.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "698c4b77-eac4-41f2-99f5-26be9b8a9bd3", "DetectTime": "2024-05-21T12:42:28.190747+00:00", "EventTime": "2024-05-21T12:42:28.190769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZJuqJ1kxA0YSCp4ef"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 125} +{"Format": "IDEA0", "ID": "0697e0bd-56b6-4e9c-9653-863030e1b589", "DetectTime": "2024-05-21T12:42:28.236424+00:00", "EventTime": "2024-05-21T12:42:28.236443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjM3o33v6aZKfKchc"], "accumulated_threat_level": 3.2, "timewindow": 125} +{"Format": "IDEA0", "ID": "56a179c1-4f19-445a-a500-59910b900881", "DetectTime": "2024-05-21T12:42:28.280993+00:00", "EventTime": "2024-05-21T12:42:28.281013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEBL5a2LMO76lzE67g"], "accumulated_threat_level": 4.0, "timewindow": 125} +{"Format": "IDEA0", "ID": "38771691-5d20-4057-b03d-cea8417edf87", "DetectTime": "2024-05-21T12:42:28.327195+00:00", "EventTime": "2024-05-21T12:42:28.327214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClHYmZ3o4JQiCAWN47"], "accumulated_threat_level": 4.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "2a4cc03b-31b6-42f9-be90-5a1a8aa4927d", "DetectTime": "2024-05-21T12:42:28.372849+00:00", "EventTime": "2024-05-21T12:42:28.372868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3zwDjKu8ndLf9M"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "d976c27b-945e-48cb-b447-e50895f299e3", "DetectTime": "2024-05-21T12:42:28.447533+00:00", "EventTime": "2024-05-21T12:42:28.447552+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxm8VA4qqjrrNPcG6"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "58a075f9-66a5-40e3-a435-a0c18a7d63aa", "DetectTime": "2024-05-21T12:42:28.459731+00:00", "EventTime": "2024-05-21T12:42:28.459750+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxm8VA4qqjrrNPcG6"], "accumulated_threat_level": 10.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "336360e5-c937-4d0b-9310-bbf46645dd92", "DetectTime": "2024-05-21T12:42:28.485994+00:00", "EventTime": "2024-05-21T12:42:28.486012+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.232.5.137"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWzhn2If8XS7FE8Tg"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "8bac2c6d-cf04-438e-aa97-ce083c053f12", "DetectTime": "2024-05-21T12:42:28.498111+00:00", "EventTime": "2024-05-21T12:42:28.498131+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWzhn2If8XS7FE8Tg"], "accumulated_threat_level": 11.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "53d05ccb-975b-42f9-98c8-faae10ffa05d", "DetectTime": "2024-05-21T12:42:28.547418+00:00", "EventTime": "2024-05-21T12:42:28.547441+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNh7m4BD2IAkxfUc6"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "5e6b66a8-3ad6-45d9-88d9-0ab0e4929ebb", "DetectTime": "2024-05-21T12:42:28.560775+00:00", "EventTime": "2024-05-21T12:42:28.560799+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNh7m4BD2IAkxfUc6"], "accumulated_threat_level": 11.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "96b27684-1d18-47b1-810d-63356a83b28c", "DetectTime": "2024-05-21T12:42:28.585459+00:00", "EventTime": "2024-05-21T12:42:28.585484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzRDc4E55ab5t5ADc"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "d28c204d-0392-4871-96f7-5c2f168c1482", "DetectTime": "2024-05-21T12:42:28.597931+00:00", "EventTime": "2024-05-21T12:42:28.597950+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzRDc4E55ab5t5ADc"], "accumulated_threat_level": 12.0, "timewindow": 28} +{"Format": "Json", "ID": "d28c204d-0392-4871-96f7-5c2f168c1482", "DetectTime": "2024-05-21T12:42:28.597931+00:00", "EventTime": "2024-05-21T12:42:28.597950+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "1970-01-02T03:38:14.340771+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 28. (real time 2024/05/21 12:42:28.981478)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 28, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "ae8847f9-d760-4a02-ac4e-24283a6db26b", "DetectTime": "2024-05-21T12:42:28.993466+00:00", "EventTime": "2024-05-21T12:42:28.993487+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIk9iA4XJZkDtvamz"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "fba46fdf-9435-4acc-8526-43cf3e871ebf", "DetectTime": "2024-05-21T12:42:29.004677+00:00", "EventTime": "2024-05-21T12:42:29.004701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC5DI53ZWfpjdZfeQg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 125} +{"Format": "IDEA0", "ID": "c9d2ac36-d8b8-468c-8125-0dac6ba374d6", "DetectTime": "2024-05-21T12:42:29.017514+00:00", "EventTime": "2024-05-21T12:42:29.017533+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIk9iA4XJZkDtvamz"], "accumulated_threat_level": 0.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "9c795372-b8e5-4405-b862-2e426221195e", "DetectTime": "2024-05-21T12:42:29.022978+00:00", "EventTime": "2024-05-21T12:42:29.022997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQALb2EkEKx3Oml09"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "0e447183-c814-43b9-b972-9c36839cae1a", "DetectTime": "2024-05-21T12:42:29.034300+00:00", "EventTime": "2024-05-21T12:42:29.034320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhvdW1uaaUI8rQgVl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "7a415066-fd6c-4c98-94eb-d85e45eb3ae2", "DetectTime": "2024-05-21T12:42:29.045393+00:00", "EventTime": "2024-05-21T12:42:29.045413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGpni4ZgDcxT3v56f"], "accumulated_threat_level": 7.999999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "681d8e56-0b08-4e68-99e0-6a2d773334c4", "DetectTime": "2024-05-21T12:42:29.062894+00:00", "EventTime": "2024-05-21T12:42:29.062922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDV1wyYxSh4OrI9g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "080b7c1f-915c-4857-a545-4f51583c4a8b", "DetectTime": "2024-05-21T12:42:29.075757+00:00", "EventTime": "2024-05-21T12:42:29.075776+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJUcT1dc4Dt1oLwp5"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "d3612b27-1259-4efb-8028-118ed1a0786e", "DetectTime": "2024-05-21T12:42:29.088989+00:00", "EventTime": "2024-05-21T12:42:29.089020+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJUcT1dc4Dt1oLwp5"], "accumulated_threat_level": 1.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "cb90527b-d19c-4c71-9dcd-6141ff5e07a9", "DetectTime": "2024-05-21T12:42:29.102048+00:00", "EventTime": "2024-05-21T12:42:29.102074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ42or3HieL7gumpGl"], "accumulated_threat_level": 9.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "5687c67e-e955-4cc3-85be-f3c3777d1903", "DetectTime": "2024-05-21T12:42:29.113418+00:00", "EventTime": "2024-05-21T12:42:29.113441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7wSjPJ2UMYxLzj9"], "accumulated_threat_level": 10.4, "timewindow": 125} +{"Format": "IDEA0", "ID": "64e78513-df46-4a38-992c-785db01a611f", "DetectTime": "2024-05-21T12:42:29.137010+00:00", "EventTime": "2024-05-21T12:42:29.137031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tMN52s26U1dj52Sj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 125} +{"Format": "IDEA0", "ID": "5cbd973c-5842-4fdd-b24f-3947bd527f77", "DetectTime": "2024-05-21T12:42:29.149145+00:00", "EventTime": "2024-05-21T12:42:29.149166+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.176.133.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWfbj4V5qsY0zrhke"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "6c9ab2df-3634-4ef2-9fff-53be927ce7e2", "DetectTime": "2024-05-21T12:42:29.280620+00:00", "EventTime": "2024-05-21T12:42:29.280638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.176.133.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWfbj4V5qsY0zrhke"], "accumulated_threat_level": 1.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "16232c6a-705f-466b-9524-8cdba01ccdb7", "DetectTime": "2024-05-21T12:42:29.293521+00:00", "EventTime": "2024-05-21T12:42:29.293540+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73FRJ1NRxF33DUPKh"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "757de2fb-2a66-445e-83d2-f37957e7f71a", "DetectTime": "2024-05-21T12:42:29.307328+00:00", "EventTime": "2024-05-21T12:42:29.307350+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73FRJ1NRxF33DUPKh"], "accumulated_threat_level": 2.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "fa331d31-b311-478f-893c-5cdf4c3957fb", "DetectTime": "2024-05-21T12:42:29.319194+00:00", "EventTime": "2024-05-21T12:42:29.319214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFDThF1BAT4RWLmZef"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "bc32688d-f0a6-4080-aeb8-43875a4b1fcb", "DetectTime": "2024-05-21T12:42:29.332313+00:00", "EventTime": "2024-05-21T12:42:29.332341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFDThF1BAT4RWLmZef"], "accumulated_threat_level": 2.5, "timewindow": 28} +{"Format": "IDEA0", "ID": "87ab3da7-a9b4-4cd5-983a-80cd65204214", "DetectTime": "2024-05-21T12:42:29.344700+00:00", "EventTime": "2024-05-21T12:42:29.344721+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBGXg4OZymdy6Cpa2"], "accumulated_threat_level": 0, "timewindow": 28} +{"Format": "IDEA0", "ID": "a67f6ce1-7daa-49e8-a78f-6e8f0ecd1e37", "DetectTime": "2024-05-21T12:42:29.357579+00:00", "EventTime": "2024-05-21T12:42:29.357601+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBGXg4OZymdy6Cpa2"], "accumulated_threat_level": 3.0, "timewindow": 28} +{"Format": "IDEA0", "ID": "ebf0722e-8273-4448-92ed-e9c6ddcad739", "DetectTime": "2024-05-21T12:42:29.362263+00:00", "EventTime": "2024-05-21T12:42:29.362280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgbR853MltFboYbaa6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "ab7012af-5bc7-444d-9bf5-7c47ed8de835", "DetectTime": "2024-05-21T12:42:29.372424+00:00", "EventTime": "2024-05-21T12:42:29.372445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVOW61DdINfEBpRu7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 125} +{"Format": "Json", "ID": "ab7012af-5bc7-444d-9bf5-7c47ed8de835", "DetectTime": "2024-05-21T12:42:29.372424+00:00", "EventTime": "2024-05-21T12:42:29.372445+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-06T04:26:35.718425+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2024/05/21 12:42:29.525573)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 125, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "10e634ec-079f-4778-926f-dabb00e3e679", "DetectTime": "2024-05-21T12:42:29.537506+00:00", "EventTime": "2024-05-21T12:42:29.537531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ID6NqBUGk2Q26ta"], "accumulated_threat_level": 0.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "cdc2e6de-aa1b-41e7-a52a-4fd10c0d83f7", "DetectTime": "2024-05-21T12:42:29.549240+00:00", "EventTime": "2024-05-21T12:42:29.549261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1jp92nd49chKE3Cc"], "accumulated_threat_level": 1.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "889df56c-593a-4c07-b2d1-25f573818a8e", "DetectTime": "2024-05-21T12:42:29.561398+00:00", "EventTime": "2024-05-21T12:42:29.561421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkfJh2jyQQ51RAOPl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 125} +{"Format": "IDEA0", "ID": "9e89fbce-4689-408c-82dc-0498ddce4ad3", "DetectTime": "2024-05-21T12:42:29.573237+00:00", "EventTime": "2024-05-21T12:42:29.573257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHAvlsHXvrpa6yK06"], "accumulated_threat_level": 3.2, "timewindow": 125} +{"Format": "IDEA0", "ID": "1509b9a6-d343-435b-8cd8-defe626d8e42", "DetectTime": "2024-05-21T12:42:29.585599+00:00", "EventTime": "2024-05-21T12:42:29.585622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaSbTn1kSXJMtvcJJ2"], "accumulated_threat_level": 4.0, "timewindow": 125} +{"Format": "IDEA0", "ID": "4141ab47-b906-4159-bd36-64a316a879fb", "DetectTime": "2024-05-21T12:42:29.607885+00:00", "EventTime": "2024-05-21T12:42:29.607915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsglBt2rUec2bfA5Ad"], "accumulated_threat_level": 4.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "51052631-4ee3-4b53-8713-718d9f269c6a", "DetectTime": "2024-05-21T12:42:29.654235+00:00", "EventTime": "2024-05-21T12:42:29.654268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2NYaOWrgp3EKf1l"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "8a10de0c-eaff-4521-b411-8de47c58092f", "DetectTime": "2024-05-21T12:42:29.892592+00:00", "EventTime": "2024-05-21T12:42:29.892620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2EAv40abYe1Ru49e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "5195f0e9-c530-4745-9242-9ebe98fd211f", "DetectTime": "2024-05-21T12:42:29.898130+00:00", "EventTime": "2024-05-21T12:42:29.898149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYi2V24bbpn2w3tPb2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "e333e41b-7719-4e24-8d6e-69992fbf13d5", "DetectTime": "2024-05-21T12:42:29.959753+00:00", "EventTime": "2024-05-21T12:42:29.959772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcyJpu4u0HtfjCsX9k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 125} +{"Format": "IDEA0", "ID": "a4eefab0-721f-44ce-b963-0b1b00614df0", "DetectTime": "2024-05-21T12:42:29.990207+00:00", "EventTime": "2024-05-21T12:42:29.990241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDpEy3Whzz6cKYqf6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "75893a3f-9602-414c-8e96-37bab63eecc6", "DetectTime": "2024-05-21T12:42:30.046361+00:00", "EventTime": "2024-05-21T12:42:30.046394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqnsS1hQTgKCMSTgf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "5f17a4dd-4f0f-45da-b23c-e3faf8ce3c55", "DetectTime": "2024-05-21T12:42:30.085338+00:00", "EventTime": "2024-05-21T12:42:30.085357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5YGnD2KUt3I8NHPrl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "38eb599f-4173-48f9-b45c-a8a9bf4b071a", "DetectTime": "2024-05-21T12:42:30.129673+00:00", "EventTime": "2024-05-21T12:42:30.129690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTk5M14tvDh1KEYqR9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "979ef9a7-ed91-4704-8c9a-355154f75e11", "DetectTime": "2024-05-21T12:42:30.401821+00:00", "EventTime": "2024-05-21T12:42:30.401846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chxueq1LoRmbkUia6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "2c7923ec-98b0-4301-b5d9-c3f364523d0a", "DetectTime": "2024-05-21T12:42:30.407349+00:00", "EventTime": "2024-05-21T12:42:30.407368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbK1XzzNtbAtaqR9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "0915c59c-5b33-4132-8af5-0a43424d3d2c", "DetectTime": "2024-05-21T12:42:30.413401+00:00", "EventTime": "2024-05-21T12:42:30.413420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8HGhc1NdZppeW53xj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "490ca1c6-1d0f-4946-add6-85074f24100b", "DetectTime": "2024-05-21T12:42:30.417979+00:00", "EventTime": "2024-05-21T12:42:30.417998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJYVG3D9VCz7tt806"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "c44cf6fb-012e-4334-8d97-f7ce28722d4d", "DetectTime": "2024-05-21T12:42:30.458290+00:00", "EventTime": "2024-05-21T12:42:30.458312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crw1og3SQ4g0VXl9y9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "c80d4c30-1923-4cf6-92c2-096ba7c7fa7b", "DetectTime": "2024-05-21T12:42:30.562203+00:00", "EventTime": "2024-05-21T12:42:30.562226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C73RX54hJ6ZOjlSNW2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "ab56d642-ad6a-4f63-b790-90350f594888", "DetectTime": "2024-05-21T12:42:30.639981+00:00", "EventTime": "2024-05-21T12:42:30.640004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkrTO16TjNUR2abQa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "196d2e77-e39b-4373-b4e4-df4250987857", "DetectTime": "2024-05-21T12:42:30.645368+00:00", "EventTime": "2024-05-21T12:42:30.645386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3sVKK39tQrGSD0d89"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "369764b1-38a3-4a0b-9f6e-e0e11672c8b4", "DetectTime": "2024-05-21T12:42:30.808619+00:00", "EventTime": "2024-05-21T12:42:30.808644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4nwE4D1r4L9eFYpb"], "accumulated_threat_level": 9.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "d4cb6fb1-8be4-4b71-a222-ac205ba52e7e", "DetectTime": "2024-05-21T12:42:31.040659+00:00", "EventTime": "2024-05-21T12:42:31.040680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvtXi1z9p61DsAxn1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 122} +{"Format": "IDEA0", "ID": "73bb9309-fcec-4274-8479-38c8bfa39899", "DetectTime": "2024-05-21T12:42:31.078265+00:00", "EventTime": "2024-05-21T12:42:31.078284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CglJV31WYFaRw8i4jb"], "accumulated_threat_level": 10.4, "timewindow": 125} +{"Format": "IDEA0", "ID": "9aa83090-7488-4704-86b0-876ee84b3fd8", "DetectTime": "2024-05-21T12:42:31.122393+00:00", "EventTime": "2024-05-21T12:42:31.122426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGfSL3PZCqKNj9uCa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 125} +{"Format": "IDEA0", "ID": "0de2f3d5-c780-4d44-a818-a67f0e36e460", "DetectTime": "2024-05-21T12:42:31.167733+00:00", "EventTime": "2024-05-21T12:42:31.167753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNMLk2WJXNjhrD373"], "accumulated_threat_level": 12.000000000000002, "timewindow": 125} +{"Format": "Json", "ID": "0de2f3d5-c780-4d44-a818-a67f0e36e460", "DetectTime": "2024-05-21T12:42:31.167733+00:00", "EventTime": "2024-05-21T12:42:31.167753+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-06T04:56:52.737855+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2024/05/21 12:42:31.346693)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 125, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2f92b067-3162-47f1-8839-77d233587a44", "DetectTime": "2024-05-21T12:42:31.357289+00:00", "EventTime": "2024-05-21T12:42:31.357307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdW0n1yr5rEQrowt6"], "accumulated_threat_level": 0.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "5162b537-a85e-4c85-a696-78ec9a630b9e", "DetectTime": "2024-05-21T12:42:31.368215+00:00", "EventTime": "2024-05-21T12:42:31.368234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzpHB2ooW8sDos6Zf"], "accumulated_threat_level": 1.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "023d7a50-25b7-4efc-aef5-d0c596e4b134", "DetectTime": "2024-05-21T12:42:31.379776+00:00", "EventTime": "2024-05-21T12:42:31.379797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg49xZeI2hyOYH5vl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 125} +{"Format": "IDEA0", "ID": "4a522f8a-108f-4749-b089-b6f958c04531", "DetectTime": "2024-05-21T12:42:31.391278+00:00", "EventTime": "2024-05-21T12:42:31.391297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgYJ03VXQV8S8Wq3d"], "accumulated_threat_level": 3.2, "timewindow": 125} +{"Format": "IDEA0", "ID": "19a9b31b-4450-42da-b63a-f164fd215d82", "DetectTime": "2024-05-21T12:42:31.643453+00:00", "EventTime": "2024-05-21T12:42:31.643478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVPpl16Wb3tA1c8ai"], "accumulated_threat_level": 4.0, "timewindow": 125} +{"Format": "IDEA0", "ID": "b551c475-3a37-44f7-8360-7a79f787ec08", "DetectTime": "2024-05-21T12:42:31.650649+00:00", "EventTime": "2024-05-21T12:42:31.650670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TkjuT0FnMlOZqG2"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "79d3615b-0161-4c8b-a9c2-663cf8bd644d", "DetectTime": "2024-05-21T12:42:31.711882+00:00", "EventTime": "2024-05-21T12:42:31.711904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.199.165.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb6tPq40y36tv7J4E4"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "25539f77-8baa-4055-882e-415c78bca66f", "DetectTime": "2024-05-21T12:42:31.748712+00:00", "EventTime": "2024-05-21T12:42:31.748732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RpFd4mJa20xiSRy3"], "accumulated_threat_level": 4.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "acb9c201-f46e-4236-8d57-9ed54a8ea5fb", "DetectTime": "2024-05-21T12:42:31.793527+00:00", "EventTime": "2024-05-21T12:42:31.793547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7O1rn2nSqYK3NdcOe"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "100d057e-756e-47f9-9397-7a5699a476d6", "DetectTime": "2024-05-21T12:42:31.837246+00:00", "EventTime": "2024-05-21T12:42:31.837283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EHjW327xdza5DYB"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 125} +{"Format": "IDEA0", "ID": "f3e6698e-30d0-4343-9cb9-7cc6005d8854", "DetectTime": "2024-05-21T12:42:31.881812+00:00", "EventTime": "2024-05-21T12:42:31.881835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6azW3dAztsawfh7e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "2d2402c5-a07c-4dc9-a5d1-144378e70205", "DetectTime": "2024-05-21T12:42:31.941613+00:00", "EventTime": "2024-05-21T12:42:31.941645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVfsYI19eNTWJe5eYa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "57306b6d-ab00-4e2d-87ac-4b3573df1d9b", "DetectTime": "2024-05-21T12:42:31.964836+00:00", "EventTime": "2024-05-21T12:42:31.964857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CavdFG38etQu4la1D6"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "7e4f11fa-c84c-49a0-802a-cd62d591c456", "DetectTime": "2024-05-21T12:42:32.299405+00:00", "EventTime": "2024-05-21T12:42:32.299427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoI19CZtFCHpbJk9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 125} +{"Format": "IDEA0", "ID": "cffc5691-c496-4b77-8401-80a2a798d1bf", "DetectTime": "2024-05-21T12:42:32.304786+00:00", "EventTime": "2024-05-21T12:42:32.304805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvIYc53gGHeoRzpoO3"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "62367b19-4f6d-48cf-a5ef-cf4bd00951ae", "DetectTime": "2024-05-21T12:42:32.366314+00:00", "EventTime": "2024-05-21T12:42:32.366335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYG7R1HD6poiTxTEj"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "63dd90da-710b-4af7-857a-b53d2efbd6dc", "DetectTime": "2024-05-21T12:42:32.411154+00:00", "EventTime": "2024-05-21T12:42:32.411173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipKzW224E10Aa0gua"], "accumulated_threat_level": 9.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "a7ffc648-bb80-4313-a14d-6348a121e59c", "DetectTime": "2024-05-21T12:42:32.458423+00:00", "EventTime": "2024-05-21T12:42:32.458441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPsCF1qrkbyTkNIbj"], "accumulated_threat_level": 10.4, "timewindow": 125} +{"Format": "IDEA0", "ID": "c40bcf7f-aff4-4bbf-8a10-dde380f51162", "DetectTime": "2024-05-21T12:42:32.508364+00:00", "EventTime": "2024-05-21T12:42:32.508382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYopF3FJdhT9uXcXl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 125} +{"Format": "IDEA0", "ID": "06659949-7e73-463f-9d48-9cffa03d61d7", "DetectTime": "2024-05-21T12:42:32.555361+00:00", "EventTime": "2024-05-21T12:42:32.555378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJXph3PCNM0O73uof"], "accumulated_threat_level": 12.000000000000002, "timewindow": 125} +{"Format": "Json", "ID": "06659949-7e73-463f-9d48-9cffa03d61d7", "DetectTime": "2024-05-21T12:42:32.555361+00:00", "EventTime": "2024-05-21T12:42:32.555378+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "1970-01-06T04:56:56.404065+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 125. (real time 2024/05/21 12:42:32.737711)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 125, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "163ba00f-7692-40c0-abcc-71a5788afe21", "DetectTime": "2024-05-21T12:42:32.749640+00:00", "EventTime": "2024-05-21T12:42:32.749671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.9.171.230"]}], "Attach": [{"Content": "Connection to unknown destination port 19873/UDP destination IP 190.9.171.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEkuib2bo4CIoIIfgd"], "accumulated_threat_level": 0.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "74f1e139-6530-4d50-a4c8-2203a1310c2d", "DetectTime": "2024-05-21T12:42:32.762391+00:00", "EventTime": "2024-05-21T12:42:32.762439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CstLVE4rSYiKRAB49i"], "accumulated_threat_level": 1.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "9bf355cf-c010-4a99-9ba0-c482b13af9bf", "DetectTime": "2024-05-21T12:42:32.900237+00:00", "EventTime": "2024-05-21T12:42:32.900258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmf2SJ2VeS5U54S8ne"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "b32f0211-18d4-4a69-a668-cd574be28733", "DetectTime": "2024-05-21T12:42:32.941132+00:00", "EventTime": "2024-05-21T12:42:32.941163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqmc2e3peW5Aq0oJnb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 125} +{"Format": "IDEA0", "ID": "71883889-71e0-4808-9813-32193bfedc39", "DetectTime": "2024-05-21T12:42:32.985733+00:00", "EventTime": "2024-05-21T12:42:32.985763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSPYdtJMU3AojsKg"], "accumulated_threat_level": 3.2, "timewindow": 125} +{"Format": "IDEA0", "ID": "759ccb3b-4c1e-4244-a58f-8419ce41ea06", "DetectTime": "2024-05-21T12:42:33.030725+00:00", "EventTime": "2024-05-21T12:42:33.030761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofXP021iAeD4CGiie"], "accumulated_threat_level": 4.0, "timewindow": 125} +{"Format": "IDEA0", "ID": "dd4c0500-0e33-46cc-afde-968eaf72b2f0", "DetectTime": "2024-05-21T12:42:33.069786+00:00", "EventTime": "2024-05-21T12:42:33.069806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C52ggx1qrEjGbx92yd"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "95b35391-c0f9-4b16-8102-cb14debff621", "DetectTime": "2024-05-21T12:42:33.114067+00:00", "EventTime": "2024-05-21T12:42:33.114085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb38J03ek32DgYBvZd"], "accumulated_threat_level": 4.8, "timewindow": 125} +{"Format": "IDEA0", "ID": "1d15ebc4-d27e-4dde-aba2-8fc83984ead8", "DetectTime": "2024-05-21T12:42:33.154451+00:00", "EventTime": "2024-05-21T12:42:33.154471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHooH2pJwpkKJbNlj"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "c4be40d0-4065-4e09-9378-e5b6653b3c72", "DetectTime": "2024-05-21T12:42:33.189253+00:00", "EventTime": "2024-05-21T12:42:33.189278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7YRszG8nCgMAcY2"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "ab8714de-8bed-4108-8e63-0fb9c5d9d780", "DetectTime": "2024-05-21T12:42:33.238109+00:00", "EventTime": "2024-05-21T12:42:33.238135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4b3khZfF7hDODGLc"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "06876abd-1792-4f71-a7fc-3d51214712be", "DetectTime": "2024-05-21T12:42:33.483637+00:00", "EventTime": "2024-05-21T12:42:33.483659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgeYor2KADxRJGJRXk"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "c7c9970a-0fbe-4380-b5a1-56e285974348", "DetectTime": "2024-05-21T12:42:33.488859+00:00", "EventTime": "2024-05-21T12:42:33.488879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5gP78FG9vK91szh"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "0db6d16b-c587-4c3c-815a-95b79da505da", "DetectTime": "2024-05-21T12:42:33.662626+00:00", "EventTime": "2024-05-21T12:42:33.662649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA7N794U4CiGZxHsX9"], "accumulated_threat_level": 0.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "caf3c514-a8d5-4792-aa72-0b81231b6255", "DetectTime": "2024-05-21T12:42:33.685899+00:00", "EventTime": "2024-05-21T12:42:33.685921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsKsf4guqlrPh2gGf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "58514362-27ce-4419-8baa-fd1c6e6eb5d2", "DetectTime": "2024-05-21T12:42:33.746095+00:00", "EventTime": "2024-05-21T12:42:33.746117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zMiP2LJ71tl23a8j"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "cb795412-47a1-4d7e-b257-4ad3d99c0203", "DetectTime": "2024-05-21T12:42:33.796121+00:00", "EventTime": "2024-05-21T12:42:33.796141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHjF24OTWRTw0Wpu3"], "accumulated_threat_level": 1.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "96ad4cd0-e651-4ce8-9dcc-93f513e61c1f", "DetectTime": "2024-05-21T12:42:33.832090+00:00", "EventTime": "2024-05-21T12:42:33.832111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7etIe3dwJNMTPFR9h"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "ca831a4d-c1ad-487c-ac8c-adcf06cfa1f2", "DetectTime": "2024-05-21T12:42:33.868074+00:00", "EventTime": "2024-05-21T12:42:33.868095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKp3NISiLflnQ3av3"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "2d13436e-2961-484c-9a68-ebe45557dbfa", "DetectTime": "2024-05-21T12:42:34.100693+00:00", "EventTime": "2024-05-21T12:42:34.100712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9JUC2wR83qwUvL2l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 126} +{"Format": "IDEA0", "ID": "4f4a7abc-168e-49b7-8373-56bbbec3b898", "DetectTime": "2024-05-21T12:42:34.141617+00:00", "EventTime": "2024-05-21T12:42:34.141638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gtVs1OJh9kHGiXh7"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "324ef319-4fac-4e00-a3f6-114dca6dd8d1", "DetectTime": "2024-05-21T12:42:34.146729+00:00", "EventTime": "2024-05-21T12:42:34.146749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVtSD3NDXfihW8ZN1"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "0381111d-5f64-4b3e-899f-16b9fb22371c", "DetectTime": "2024-05-21T12:42:34.211147+00:00", "EventTime": "2024-05-21T12:42:34.211167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAkL8D4fCwpb4ICB12"], "accumulated_threat_level": 3.2, "timewindow": 126} +{"Format": "IDEA0", "ID": "aa4d3cf5-47e9-4a59-8097-0d1fcb8dac05", "DetectTime": "2024-05-21T12:42:34.245162+00:00", "EventTime": "2024-05-21T12:42:34.245183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuj76A24e6mJ6ODm24"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "c3e9c785-baf7-4e97-a18f-6c479b3dbdbf", "DetectTime": "2024-05-21T12:42:34.286119+00:00", "EventTime": "2024-05-21T12:42:34.286142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF77h31Wcri84uP5eh"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "20b0388f-3b6b-4085-bf51-28bd39a234d2", "DetectTime": "2024-05-21T12:42:34.299580+00:00", "EventTime": "2024-05-21T12:42:34.299599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGcD4v1vcNkk28yx12"], "accumulated_threat_level": 4.0, "timewindow": 126} +{"Format": "IDEA0", "ID": "58257abc-f853-471a-a4e6-f6e6bb93c875", "DetectTime": "2024-05-21T12:42:34.356855+00:00", "EventTime": "2024-05-21T12:42:34.356875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYl9Ey2rIxHdIyWCj4"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "3587dc00-9802-4644-8a0a-b45322dc02e1", "DetectTime": "2024-05-21T12:42:34.400242+00:00", "EventTime": "2024-05-21T12:42:34.400262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEHGS1whwlmhHu7D7"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "a991792b-1b86-490b-8022-4bca03e54c71", "DetectTime": "2024-05-21T12:42:34.645183+00:00", "EventTime": "2024-05-21T12:42:34.645202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkAF9QTO521rjiSl"], "accumulated_threat_level": 4.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "01cfcacd-0854-48fd-9657-25e3f7461ff5", "DetectTime": "2024-05-21T12:42:34.653694+00:00", "EventTime": "2024-05-21T12:42:34.653713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnzg3u4oqtmRMJy707"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "6cc4e354-c46e-4df0-bda7-5d04e6372b6d", "DetectTime": "2024-05-21T12:42:34.696317+00:00", "EventTime": "2024-05-21T12:42:34.696340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVXOB12RCXMVwVBE9"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "d08d4aac-04a1-4ee1-924e-b16414351bb4", "DetectTime": "2024-05-21T12:42:34.729429+00:00", "EventTime": "2024-05-21T12:42:34.729452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgLhJ1zrAUUvFBSZf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "a497eeb2-2731-4526-9b42-f0eb63b9ed8b", "DetectTime": "2024-05-21T12:42:34.734636+00:00", "EventTime": "2024-05-21T12:42:34.734655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6bbHG2BG92CVG3ai7"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "6f694836-15a1-43e9-bda1-7f4d605ca024", "DetectTime": "2024-05-21T12:42:34.765022+00:00", "EventTime": "2024-05-21T12:42:34.765046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CajZ3t4XzmfXLlXQIf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "6479e618-a9f8-45db-bf9e-6d0e99200872", "DetectTime": "2024-05-21T12:42:34.872387+00:00", "EventTime": "2024-05-21T12:42:34.872408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ7WY1CsNqeBw92Mh"], "accumulated_threat_level": 5.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "d4db56d3-fc8d-40b3-91f5-b8338a5ca6df", "DetectTime": "2024-05-21T12:42:35.113440+00:00", "EventTime": "2024-05-21T12:42:35.113462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNOMaQ1IlNzfpcs1Uj"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "030b676f-24e6-4b0d-98a2-00bdbade1185", "DetectTime": "2024-05-21T12:42:35.158359+00:00", "EventTime": "2024-05-21T12:42:35.158381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0jha4iHnw4Z3Cb2f"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "01e87caf-9a9a-489a-96e9-7f324f293c17", "DetectTime": "2024-05-21T12:42:35.340408+00:00", "EventTime": "2024-05-21T12:42:35.340426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtofNG1dc822mWRhAe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 126} +{"Format": "IDEA0", "ID": "81629740-6200-426b-af74-012e0adb4dd1", "DetectTime": "2024-05-21T12:42:35.346796+00:00", "EventTime": "2024-05-21T12:42:35.346814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 37.232.7.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAQc1Yr36nlpJujRf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "c5c23c4a-42dd-494f-8eb8-c36c62fe11f1", "DetectTime": "2024-05-21T12:42:35.351243+00:00", "EventTime": "2024-05-21T12:42:35.351260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8zGV3NG2lhM0EEch"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "f7141d81-3b55-4146-8ab5-08918119ed88", "DetectTime": "2024-05-21T12:42:35.462578+00:00", "EventTime": "2024-05-21T12:42:35.462602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuydsq3bNPVqrV74m2"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "ac895e40-6095-4f3a-8054-f07d1da495ff", "DetectTime": "2024-05-21T12:42:35.468277+00:00", "EventTime": "2024-05-21T12:42:35.468298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWUTRQ1Q9DYmyEI9a2"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "9277e694-b3a8-4594-a1e5-a3c5dc0b0b39", "DetectTime": "2024-05-21T12:42:35.548070+00:00", "EventTime": "2024-05-21T12:42:35.548090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsveC3y5MZTSaPHT2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "9db93eb2-d875-40f5-8e61-f8ea0eb8841e", "DetectTime": "2024-05-21T12:42:35.739278+00:00", "EventTime": "2024-05-21T12:42:35.739301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKQn33hEDZmhpme42"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "ecedd868-4daf-43c3-983a-a8fc4da09327", "DetectTime": "2024-05-21T12:42:35.837535+00:00", "EventTime": "2024-05-21T12:42:35.837556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZBBw1Pn4nHTEDBhc"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "f5e4a229-1820-4b7c-a8d3-b667c6346f45", "DetectTime": "2024-05-21T12:42:35.842430+00:00", "EventTime": "2024-05-21T12:42:35.842449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBL064gkCL7uIjcfi"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "fbc978ae-e61f-49c7-b310-f831a1e2d9dc", "DetectTime": "2024-05-21T12:42:35.848829+00:00", "EventTime": "2024-05-21T12:42:35.848850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C10N8k1ptspRmcw3Fl"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "dd7c939e-2954-4642-b5ac-7d9a5bddd22f", "DetectTime": "2024-05-21T12:42:35.854042+00:00", "EventTime": "2024-05-21T12:42:35.854063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHXPx6ZATWhvwSIG6"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "4f6e1f3d-2295-415c-a818-941f9ec8b0f5", "DetectTime": "2024-05-21T12:42:35.915931+00:00", "EventTime": "2024-05-21T12:42:35.915952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyH4Op38YECFKBPkc8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "6ceaa37f-6673-4e7a-ae72-5c2287a41b74", "DetectTime": "2024-05-21T12:42:35.922626+00:00", "EventTime": "2024-05-21T12:42:35.922648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBP3ZlEcmMKRBxnMc"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "3f33ba67-9db6-4d06-9fa1-275eb83a012f", "DetectTime": "2024-05-21T12:42:36.052598+00:00", "EventTime": "2024-05-21T12:42:36.052623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3KTP2QGa3FJmhBLb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "8853b7c1-5ac4-4dd8-bc62-ba68ad7dd2dd", "DetectTime": "2024-05-21T12:42:36.058336+00:00", "EventTime": "2024-05-21T12:42:36.058356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsdSn2U9pYI0AzAX2"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "6d33cd98-6c49-47c8-8c69-1f68c49a8b7a", "DetectTime": "2024-05-21T12:42:36.335851+00:00", "EventTime": "2024-05-21T12:42:36.335875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmZ2cN3s0TKzGhswCc"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "63e7db0a-92e0-4ace-a2b3-8a1011f0c7f2", "DetectTime": "2024-05-21T12:42:36.340676+00:00", "EventTime": "2024-05-21T12:42:36.340695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUFOiL1bWotdKIBO29"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "5001d915-b908-4c5b-aa52-91a9f283ed06", "DetectTime": "2024-05-21T12:42:36.403804+00:00", "EventTime": "2024-05-21T12:42:36.403824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53tWA1siMW4AbFFik"], "accumulated_threat_level": 9.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "de1789ee-87e9-4b8d-a92c-77f47cead329", "DetectTime": "2024-05-21T12:42:36.446071+00:00", "EventTime": "2024-05-21T12:42:36.446089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CODPU144JYrZzIwUig"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "bcbfe32f-f8af-4470-b561-de756551e640", "DetectTime": "2024-05-21T12:42:36.502489+00:00", "EventTime": "2024-05-21T12:42:36.502506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UzT7RUJflOsU29g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 126} +{"Format": "IDEA0", "ID": "38c70478-47b2-4a33-b622-44490d90bc72", "DetectTime": "2024-05-21T12:42:36.542301+00:00", "EventTime": "2024-05-21T12:42:36.542319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNpBp44iq3vJWi5Kj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 126} +{"Format": "Json", "ID": "38c70478-47b2-4a33-b622-44490d90bc72", "DetectTime": "2024-05-21T12:42:36.542301+00:00", "EventTime": "2024-05-21T12:42:36.542319+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-06T05:27:16.929533+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2024/05/21 12:42:36.755345)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 126, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9ea6adf3-2fd8-4116-a3ce-c49c3fd29e0a", "DetectTime": "2024-05-21T12:42:36.759414+00:00", "EventTime": "2024-05-21T12:42:36.759432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9m4BI1oAoK2P9DpSk"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "07d046f1-1377-4b89-a93d-71058f811b6b", "DetectTime": "2024-05-21T12:42:36.919880+00:00", "EventTime": "2024-05-21T12:42:36.919900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9sZA3SmysnNK5mD"], "accumulated_threat_level": 0.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "fac262fb-0d7b-4b96-97f3-9490c91af531", "DetectTime": "2024-05-21T12:42:36.946242+00:00", "EventTime": "2024-05-21T12:42:36.946263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1xhD2CaVJTYLt3hh"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "45a0e8a6-15a3-49de-9832-5d85b4662e22", "DetectTime": "2024-05-21T12:42:36.997933+00:00", "EventTime": "2024-05-21T12:42:36.997961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs07sB3Tg0xusvaQUe"], "accumulated_threat_level": 1.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "37948f64-95f8-4f2a-812e-171fa69f2982", "DetectTime": "2024-05-21T12:42:37.044526+00:00", "EventTime": "2024-05-21T12:42:37.044554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwNPr4y5X18oOq3pc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 126} +{"Format": "IDEA0", "ID": "b607c4bd-1a1e-4d12-922c-dc2ed76d2855", "DetectTime": "2024-05-21T12:42:37.090699+00:00", "EventTime": "2024-05-21T12:42:37.090720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjV604wD7GdlSGGs4"], "accumulated_threat_level": 3.2, "timewindow": 126} +{"Format": "IDEA0", "ID": "09b07692-71de-4db5-9ced-0f986ed61c8d", "DetectTime": "2024-05-21T12:42:37.125557+00:00", "EventTime": "2024-05-21T12:42:37.125577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8kLh2Z72gqkQ4CK2"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "6cebd381-0cd7-429f-9563-2c54cdcc6ade", "DetectTime": "2024-05-21T12:42:37.177820+00:00", "EventTime": "2024-05-21T12:42:37.177840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IrSp1Q31r0BK6m3k"], "accumulated_threat_level": 4.0, "timewindow": 126} +{"Format": "IDEA0", "ID": "7fa99fd0-6676-4be7-875b-82626142e43e", "DetectTime": "2024-05-21T12:42:37.223652+00:00", "EventTime": "2024-05-21T12:42:37.223674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsLZi2GZ3RPjxzCO"], "accumulated_threat_level": 4.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "238e6482-5b66-4c5e-bf52-794a32a052bc", "DetectTime": "2024-05-21T12:42:37.282025+00:00", "EventTime": "2024-05-21T12:42:37.282046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKO5yTSmNf8Uyc49"], "accumulated_threat_level": 5.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "010f2977-bf6e-4bcc-8553-a02e9f1842a2", "DetectTime": "2024-05-21T12:42:37.512533+00:00", "EventTime": "2024-05-21T12:42:37.512553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CknHha3wLKkz1ifu69"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "3499f954-6c77-41fb-8131-a4d68dd25d2f", "DetectTime": "2024-05-21T12:42:37.563990+00:00", "EventTime": "2024-05-21T12:42:37.564012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfbNtn1hkfU6YD7aMi"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "83cbe925-e05f-4850-9dd8-db9161e234e1", "DetectTime": "2024-05-21T12:42:37.573493+00:00", "EventTime": "2024-05-21T12:42:37.573512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iAdh3X3utdCAePOa"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "f0840777-8af4-4659-a2da-86d8275b5362", "DetectTime": "2024-05-21T12:42:37.604461+00:00", "EventTime": "2024-05-21T12:42:37.604483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUhWKa4c9AMtq4Dqe9"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "5eb3e50c-12f9-41e8-938c-b80fd3f35978", "DetectTime": "2024-05-21T12:42:37.615541+00:00", "EventTime": "2024-05-21T12:42:37.615559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccm2fv4NPnlm8Jp7Pc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 126} +{"Format": "IDEA0", "ID": "d4ff98d8-3c58-4706-a7e5-f0014bc2eb40", "DetectTime": "2024-05-21T12:42:37.708951+00:00", "EventTime": "2024-05-21T12:42:37.708974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVChHorEHwD4bcIJ3"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "4bdd4d46-6240-4316-8783-16f33b527343", "DetectTime": "2024-05-21T12:42:37.756463+00:00", "EventTime": "2024-05-21T12:42:37.756483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCgsFNJgVp6IbaGe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "698b44f1-6aa2-4330-bae1-c82355323e12", "DetectTime": "2024-05-21T12:42:37.940636+00:00", "EventTime": "2024-05-21T12:42:37.940654+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.163.112.113"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59vCP1LR9FGZrUOOj"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "92b8ea38-25a4-4582-a15e-5ac556206eae", "DetectTime": "2024-05-21T12:42:37.953572+00:00", "EventTime": "2024-05-21T12:42:37.953591+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.163.112.113"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.163.112.113 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59vCP1LR9FGZrUOOj"], "accumulated_threat_level": 11.700000000000001, "timewindow": 29} +{"Format": "IDEA0", "ID": "b859379d-15fc-4bdb-af6f-59e34b3a31e1", "DetectTime": "2024-05-21T12:42:38.098101+00:00", "EventTime": "2024-05-21T12:42:38.098125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTfrq395uPb6q8FRf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "457a789b-e224-4b9f-8c67-b86d674a6424", "DetectTime": "2024-05-21T12:42:38.103292+00:00", "EventTime": "2024-05-21T12:42:38.103312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clcr4R1FWbVe90D5Li"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "3144e29b-e244-4c4f-871d-f3185930fa34", "DetectTime": "2024-05-21T12:42:38.131790+00:00", "EventTime": "2024-05-21T12:42:38.131815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtR90n4YllJN8S11G"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "b2a32eb2-47cb-45e3-a867-10982b7de703", "DetectTime": "2024-05-21T12:42:38.190566+00:00", "EventTime": "2024-05-21T12:42:38.190584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjtRn2dKIIHkFAfP"], "accumulated_threat_level": 7.999999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "48a07072-5c46-4c88-aeb9-f265bbacc88d", "DetectTime": "2024-05-21T12:42:38.298299+00:00", "EventTime": "2024-05-21T12:42:38.298318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJvp91VUubvPfus6l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "796bcdfe-763d-4a30-a6c9-039c10e53ce1", "DetectTime": "2024-05-21T12:42:38.337306+00:00", "EventTime": "2024-05-21T12:42:38.337327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMcJlCKecxcmM8hc"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "001b0690-0dc8-4ec8-8009-dfa4c3d2b57a", "DetectTime": "2024-05-21T12:42:38.428885+00:00", "EventTime": "2024-05-21T12:42:38.428907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKrPA2bZDofvGpFBa"], "accumulated_threat_level": 9.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "6f22cc95-8ef8-489c-a2f5-1ab253e3427a", "DetectTime": "2024-05-21T12:42:38.467400+00:00", "EventTime": "2024-05-21T12:42:38.467422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKHqa3Z2IQYMXriFi"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "2ea8bb0b-a89a-478f-b143-45097b77defc", "DetectTime": "2024-05-21T12:42:38.505840+00:00", "EventTime": "2024-05-21T12:42:38.505857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNfXv4lkEpc12jw8c"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "dc252e65-3e6d-48e5-9e85-1b63670a5836", "DetectTime": "2024-05-21T12:42:38.826049+00:00", "EventTime": "2024-05-21T12:42:38.826072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3b014Vz9BrfSaxXf"], "accumulated_threat_level": 5.6, "timewindow": 123} +{"Format": "IDEA0", "ID": "6290a725-041b-49c9-9a2a-25569993d278", "DetectTime": "2024-05-21T12:42:38.845481+00:00", "EventTime": "2024-05-21T12:42:38.845500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0lMI12MsXGZh7JiH4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 126} +{"Format": "IDEA0", "ID": "0d421e56-54b7-4474-9d08-60da2c9095e3", "DetectTime": "2024-05-21T12:42:38.905332+00:00", "EventTime": "2024-05-21T12:42:38.905364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7WjqDQSf9DUwDL6"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "e4ef9e51-8ca4-4c19-ab50-1f91101daf07", "DetectTime": "2024-05-21T12:42:38.950866+00:00", "EventTime": "2024-05-21T12:42:38.950889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrALR32BQusHhQujAc"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "09347fdb-cfbb-4438-803d-95f5a898787e", "DetectTime": "2024-05-21T12:42:38.992835+00:00", "EventTime": "2024-05-21T12:42:38.992856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXCrN225MNgjCvZFk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 126} +{"Format": "Json", "ID": "09347fdb-cfbb-4438-803d-95f5a898787e", "DetectTime": "2024-05-21T12:42:38.992835+00:00", "EventTime": "2024-05-21T12:42:38.992856+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-06T05:58:01.177882+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2024/05/21 12:42:39.153249)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 126, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "aa6633b2-03f6-4b48-9bc7-fc7941e56495", "DetectTime": "2024-05-21T12:42:39.158294+00:00", "EventTime": "2024-05-21T12:42:39.158311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1kyu4S0E7IEkbdq2"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "270ab600-c8bb-4fdf-865f-67988f8d8b43", "DetectTime": "2024-05-21T12:42:39.163080+00:00", "EventTime": "2024-05-21T12:42:39.163098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIhbZ36ubyxaGD1v3"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "db820bab-b73c-43e4-956d-bd0681520988", "DetectTime": "2024-05-21T12:42:39.173552+00:00", "EventTime": "2024-05-21T12:42:39.173570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZkqo2Mlj2MhzWFy5"], "accumulated_threat_level": 0.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "2d9a1e84-dace-4c9a-8cc5-602fe11d5681", "DetectTime": "2024-05-21T12:42:39.341003+00:00", "EventTime": "2024-05-21T12:42:39.341024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjJGXMH4Ekhms8rl"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "37fcb7d8-4e35-4356-8ed3-90f040ede6e1", "DetectTime": "2024-05-21T12:42:39.460396+00:00", "EventTime": "2024-05-21T12:42:39.460420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvOw44w0OrJ6zXqV5"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "a4c3db29-07c3-4c55-8f24-246003425f51", "DetectTime": "2024-05-21T12:42:39.477242+00:00", "EventTime": "2024-05-21T12:42:39.477264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHnMc1GGN13JYh48f"], "accumulated_threat_level": 1.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "dd7c02f7-4c1a-43a9-813a-a65df1ea7582", "DetectTime": "2024-05-21T12:42:39.481845+00:00", "EventTime": "2024-05-21T12:42:39.481862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl12yN3TU3O3t3iV4l"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "41fbd2f5-b96b-4cc1-a6d9-4c65a0c644d6", "DetectTime": "2024-05-21T12:42:39.572947+00:00", "EventTime": "2024-05-21T12:42:39.572969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7k0o1LRNllrpdst3"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "9a5399f8-7d26-4d9d-8afd-c870512f8fd4", "DetectTime": "2024-05-21T12:42:39.606181+00:00", "EventTime": "2024-05-21T12:42:39.606205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCF6hJ3EEszEL1dNp4"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "5dadffe9-4b8d-4caf-9560-43717de191d8", "DetectTime": "2024-05-21T12:42:39.655422+00:00", "EventTime": "2024-05-21T12:42:39.655443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSTwnLgLS5MJDkwh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 126} +{"Format": "IDEA0", "ID": "d5bda3e5-623a-4fcf-8598-d5739156eedd", "DetectTime": "2024-05-21T12:42:39.660516+00:00", "EventTime": "2024-05-21T12:42:39.660534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx5TU43hnEDxlJ2jTe"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "f0dd1a4f-273a-4d37-bf29-5ce089303f87", "DetectTime": "2024-05-21T12:42:39.694644+00:00", "EventTime": "2024-05-21T12:42:39.694664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2z3wy2xfb2BnvAla5"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "7aa0b065-80e1-4c0f-91a0-f8f6425319fd", "DetectTime": "2024-05-21T12:42:39.996283+00:00", "EventTime": "2024-05-21T12:42:39.996305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWH4MZ2d0RLHaD0tWd"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "ff5e471c-df3b-4c9b-b7b0-5090d8ed36eb", "DetectTime": "2024-05-21T12:42:40.019222+00:00", "EventTime": "2024-05-21T12:42:40.019242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31j7O145HG0oUGKAi"], "accumulated_threat_level": 3.2, "timewindow": 126} +{"Format": "IDEA0", "ID": "e8f0521b-a9aa-404e-86c0-3449c2d14a4d", "DetectTime": "2024-05-21T12:42:40.024544+00:00", "EventTime": "2024-05-21T12:42:40.024565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PMN33J3b8Xkqppjf"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "bbf7cee0-f7be-4365-9b1c-b9d904127496", "DetectTime": "2024-05-21T12:42:40.079232+00:00", "EventTime": "2024-05-21T12:42:40.079258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34kMV16QBJo9KioQ2"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "6edccb53-611e-42c2-a10a-639bb3582f1d", "DetectTime": "2024-05-21T12:42:40.119561+00:00", "EventTime": "2024-05-21T12:42:40.119582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq599F2oGNSkZQ3Csh"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "73582e48-1848-45cd-b2c4-c81b93229fd7", "DetectTime": "2024-05-21T12:42:40.210439+00:00", "EventTime": "2024-05-21T12:42:40.210460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79diXFQkq1UPbY75"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "6a0e536f-bdf1-41dd-b3cd-29dfe8560d85", "DetectTime": "2024-05-21T12:42:40.221798+00:00", "EventTime": "2024-05-21T12:42:40.221816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vOKu3V4rdlnjUT9d"], "accumulated_threat_level": 4.0, "timewindow": 126} +{"Format": "IDEA0", "ID": "df49ced5-bbde-4740-b474-8038ef78ff4f", "DetectTime": "2024-05-21T12:42:40.229567+00:00", "EventTime": "2024-05-21T12:42:40.229586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVf3P3GEUsBPyutnl"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "a6031be8-326e-4a63-abcc-af2824fd7e2e", "DetectTime": "2024-05-21T12:42:40.273938+00:00", "EventTime": "2024-05-21T12:42:40.273960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19exI1ICPV3g3Cx01"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "3dbdd9a6-b58f-453c-9c5b-b0e2695aa3f4", "DetectTime": "2024-05-21T12:42:40.597847+00:00", "EventTime": "2024-05-21T12:42:40.597871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCTD12I1KCAY47vR7"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "26603132-d9dc-4b75-a3bb-f5dc20cd5222", "DetectTime": "2024-05-21T12:42:40.603134+00:00", "EventTime": "2024-05-21T12:42:40.603154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Uxx03oNQaLluRoZ4"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "bf689300-ffeb-4c9e-8b60-51844c7d40ce", "DetectTime": "2024-05-21T12:42:40.607825+00:00", "EventTime": "2024-05-21T12:42:40.607843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANF7ecq2PPzF2wP7"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "d96c8da8-3487-4595-8d39-83e7c3cfd0ad", "DetectTime": "2024-05-21T12:42:40.638155+00:00", "EventTime": "2024-05-21T12:42:40.638175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXuZ14DtAZEYyvQi"], "accumulated_threat_level": 4.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "f5d1f6be-f7ee-463b-aed2-d94dd72907e4", "DetectTime": "2024-05-21T12:42:40.756503+00:00", "EventTime": "2024-05-21T12:42:40.756523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHVA93wjC7fz3Qvzd"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "342b15fa-0a20-43fb-bbef-f8d9ea5ebc40", "DetectTime": "2024-05-21T12:42:40.761746+00:00", "EventTime": "2024-05-21T12:42:40.761765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr3orC1UA1QeIyfUsl"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "7634662b-c458-4b36-b473-8d3b6b288ce5", "DetectTime": "2024-05-21T12:42:40.786115+00:00", "EventTime": "2024-05-21T12:42:40.786137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1LrLe4QIR6TRZzvyk"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "96a0dece-2e9a-4acc-9679-da35fce4fadb", "DetectTime": "2024-05-21T12:42:40.842346+00:00", "EventTime": "2024-05-21T12:42:40.842364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChSHfW13Ew8C0WCrn2"], "accumulated_threat_level": 5.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "6245945d-b5e2-45f0-91e3-b48e2aa5f350", "DetectTime": "2024-05-21T12:42:41.108507+00:00", "EventTime": "2024-05-21T12:42:41.108525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CprWQv2eEIXzQLwmM5"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "d991b8b1-20b2-4297-81d0-c53f81b35bec", "DetectTime": "2024-05-21T12:42:41.134323+00:00", "EventTime": "2024-05-21T12:42:41.134341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8dh3W24yyy7JZ9kp4"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "e149ad21-a069-4577-bf46-6cb6a525afed", "DetectTime": "2024-05-21T12:42:41.176336+00:00", "EventTime": "2024-05-21T12:42:41.176357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmg8KI1bYGntjF4lv"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "a0d50a26-554f-4db7-aa86-42ed753d516f", "DetectTime": "2024-05-21T12:42:41.289006+00:00", "EventTime": "2024-05-21T12:42:41.289026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6TiEz2bUcqXZecNji"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 126} +{"Format": "IDEA0", "ID": "d1cfa504-feca-4165-b764-2527091d0225", "DetectTime": "2024-05-21T12:42:41.293944+00:00", "EventTime": "2024-05-21T12:42:41.293963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDOGw3gpoK88aZvjk"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "265fa2cc-5cb4-4724-8653-c294b979ca04", "DetectTime": "2024-05-21T12:42:41.357639+00:00", "EventTime": "2024-05-21T12:42:41.357661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUIDpCYqrVNchaEtk"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "d5f0dd82-cea6-47f6-aafa-2d6fe9221777", "DetectTime": "2024-05-21T12:42:41.600653+00:00", "EventTime": "2024-05-21T12:42:41.600672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd7V6gbixZYFWuCJg"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "3eaa33e4-95ae-4ac6-bfe5-62a39070ded9", "DetectTime": "2024-05-21T12:42:41.651220+00:00", "EventTime": "2024-05-21T12:42:41.651239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIH3pj2Ex8u2qdJWL5"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "7b63de7c-6a41-498e-944e-dbed33fa6d2f", "DetectTime": "2024-05-21T12:42:41.656173+00:00", "EventTime": "2024-05-21T12:42:41.656194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVO3JPZJKhXlr5Te"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "44c4428c-e590-4bde-82ca-eb79c0519a95", "DetectTime": "2024-05-21T12:42:41.706444+00:00", "EventTime": "2024-05-21T12:42:41.706467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkupiB4afAK3YSjwS8"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "1b54e271-8fe8-4d51-ad2c-4e1b236b4023", "DetectTime": "2024-05-21T12:42:41.734276+00:00", "EventTime": "2024-05-21T12:42:41.734295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPS9M2UbeJzwYCmwj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "98c16214-e51f-4b9a-821a-37a1f27d53f8", "DetectTime": "2024-05-21T12:42:41.738947+00:00", "EventTime": "2024-05-21T12:42:41.738965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIW00q1GLMB7d7thv8"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "2a2bca44-97d3-4084-9cbc-64919e080fda", "DetectTime": "2024-05-21T12:42:41.846935+00:00", "EventTime": "2024-05-21T12:42:41.846956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBln44BrSVzGgtYJ1"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "9545a3bf-6c4d-48cf-8623-1297fa694ab7", "DetectTime": "2024-05-21T12:42:41.851768+00:00", "EventTime": "2024-05-21T12:42:41.851786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmabif4eHVyPNjw72"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "2de84a4e-1f90-4fe5-93ac-22b476df6901", "DetectTime": "2024-05-21T12:42:42.089508+00:00", "EventTime": "2024-05-21T12:42:42.089530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQp75e1ffXcA09xaKg"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "c00e3c7b-a05f-4421-85d5-953969708a83", "DetectTime": "2024-05-21T12:42:42.173880+00:00", "EventTime": "2024-05-21T12:42:42.173902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9CkL6vRBOb6FW3Y8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "55e92e60-5cc3-4c67-9321-60e4233f8e65", "DetectTime": "2024-05-21T12:42:42.222261+00:00", "EventTime": "2024-05-21T12:42:42.222283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSe0s72oRgOpTyND4"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "0ffa93ae-ab46-42f0-8197-303968c01e3d", "DetectTime": "2024-05-21T12:42:42.230729+00:00", "EventTime": "2024-05-21T12:42:42.230749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPzqPc4TcqGPrv5HB"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "eb719b64-478b-44e5-b57d-5a8bbeaa60e8", "DetectTime": "2024-05-21T12:42:42.238796+00:00", "EventTime": "2024-05-21T12:42:42.238817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSYkZl4EE2vHmYm1yk"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "873b5bde-5935-4a8e-81eb-146561b6b14b", "DetectTime": "2024-05-21T12:42:42.243661+00:00", "EventTime": "2024-05-21T12:42:42.243680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLI5V1WQn7SjqMf14"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "8253d322-ded7-4f58-8442-92db2b5549ee", "DetectTime": "2024-05-21T12:42:42.248036+00:00", "EventTime": "2024-05-21T12:42:42.248055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXxW84u4PLmrRCRA7"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "3875124f-8bbb-4766-8387-3970949131cd", "DetectTime": "2024-05-21T12:42:42.401471+00:00", "EventTime": "2024-05-21T12:42:42.401493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9A2am15EKIFcyzDAl"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "6b07afba-fd6c-42a5-8f78-b3e3713faf85", "DetectTime": "2024-05-21T12:42:42.443235+00:00", "EventTime": "2024-05-21T12:42:42.443256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.6.169.122"]}], "Attach": [{"Content": "Connection to unknown destination port 9099/UDP destination IP 68.6.169.122. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzuzVA7ewozGJi53"], "accumulated_threat_level": 8.799999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "c7db1838-6f0e-46f1-bcbb-a70b10e56efe", "DetectTime": "2024-05-21T12:42:42.677176+00:00", "EventTime": "2024-05-21T12:42:42.677197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4FHe2C8jZ4ET9sP9"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "3987bd54-4e7d-40a6-b038-82ef30f3aeb8", "DetectTime": "2024-05-21T12:42:42.746174+00:00", "EventTime": "2024-05-21T12:42:42.746195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvwVB1poUtlJjtwgl"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "eedbce92-016b-4170-a2b2-d19df77edd49", "DetectTime": "2024-05-21T12:42:42.751905+00:00", "EventTime": "2024-05-21T12:42:42.751928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDz1zO1ky8cjY70ZV6"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "e06eb966-b3dc-4a9f-80c1-3e4dfcf300b6", "DetectTime": "2024-05-21T12:42:42.757608+00:00", "EventTime": "2024-05-21T12:42:42.757628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRj8gh29nHj3WjOZfg"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "46ef9cdd-bad0-44b3-8422-31edc7ec2ad4", "DetectTime": "2024-05-21T12:42:42.762224+00:00", "EventTime": "2024-05-21T12:42:42.762241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9dfWF2zr6sPn7ih57"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "b21dd9f6-bdf9-4782-acc3-fabcc52c544a", "DetectTime": "2024-05-21T12:42:42.807560+00:00", "EventTime": "2024-05-21T12:42:42.807580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.139.191.162"]}], "Attach": [{"Content": "Connection to unknown destination port 7904/UDP destination IP 175.139.191.162. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbS72f2SLX4aKD5Rx2"], "accumulated_threat_level": 9.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "35bcbfb1-7183-40dc-8f2c-7b938e24d034", "DetectTime": "2024-05-21T12:42:42.812341+00:00", "EventTime": "2024-05-21T12:42:42.812359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yWjh4eCoYRNwl3Ta"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "30d2a298-b45f-4e99-89e9-1d7e6867cfe2", "DetectTime": "2024-05-21T12:42:42.964428+00:00", "EventTime": "2024-05-21T12:42:42.964449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRhVz3NEGB1SMSbBa"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "f229eba0-0047-4e1b-8696-af13937b413e", "DetectTime": "2024-05-21T12:42:43.206051+00:00", "EventTime": "2024-05-21T12:42:43.206073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CssJSM2hE321dnDB7c"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "117de396-a8b9-4b77-8728-e7174443e0ce", "DetectTime": "2024-05-21T12:42:43.248271+00:00", "EventTime": "2024-05-21T12:42:43.248291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGO4u4nLFxJFHZwRi"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "6f2e16e3-a1ca-4907-a204-97ce8e211a62", "DetectTime": "2024-05-21T12:42:43.300677+00:00", "EventTime": "2024-05-21T12:42:43.300707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMIpvT2eB9RrZk8y91"], "accumulated_threat_level": 4.8, "timewindow": 124} +{"Format": "IDEA0", "ID": "0688a2ce-c433-4d96-8ee0-03d82896aa56", "DetectTime": "2024-05-21T12:42:43.305594+00:00", "EventTime": "2024-05-21T12:42:43.305613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm6dmb3ri5WrK46Trh"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "173ea615-39f5-4e6f-958b-640c03f9a739", "DetectTime": "2024-05-21T12:42:43.451000+00:00", "EventTime": "2024-05-21T12:42:43.451030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZJuqJ1kxA0YSCp4ef"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "70a02789-adfc-4b83-abbe-ec956c2601be", "DetectTime": "2024-05-21T12:42:43.496436+00:00", "EventTime": "2024-05-21T12:42:43.496460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8R1q91zwP3Z6ocljc"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "5e257dc2-582d-4702-b463-df4b6156eed8", "DetectTime": "2024-05-21T12:42:43.501257+00:00", "EventTime": "2024-05-21T12:42:43.501275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbjM3o33v6aZKfKchc"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "e58993bc-2549-47e5-a2da-9a8cc14b6ebc", "DetectTime": "2024-05-21T12:42:43.505557+00:00", "EventTime": "2024-05-21T12:42:43.505574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEBL5a2LMO76lzE67g"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "296d34ee-d69b-4358-b39d-bd9667d4804f", "DetectTime": "2024-05-21T12:42:43.810750+00:00", "EventTime": "2024-05-21T12:42:43.810769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YCFi1tLBrYtUnmN5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 126} +{"Format": "IDEA0", "ID": "75cd8485-d00f-4623-b21e-98f5fb43a93f", "DetectTime": "2024-05-21T12:42:43.816232+00:00", "EventTime": "2024-05-21T12:42:43.816252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClHYmZ3o4JQiCAWN47"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "709a2c7d-e0ce-4d94-a1ab-c598fb7ccaa0", "DetectTime": "2024-05-21T12:42:43.905456+00:00", "EventTime": "2024-05-21T12:42:43.905477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGpni4ZgDcxT3v56f"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "f2135584-7b98-4b5c-b9dd-98f1a44d9a8e", "DetectTime": "2024-05-21T12:42:43.910440+00:00", "EventTime": "2024-05-21T12:42:43.910458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3zwDjKu8ndLf9M"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "bb9b66e4-f7a4-410a-9a45-8d539a6f5e5f", "DetectTime": "2024-05-21T12:42:43.916270+00:00", "EventTime": "2024-05-21T12:42:43.916288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC5DI53ZWfpjdZfeQg"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "59d2f847-3809-4702-9dd9-26ddcf23d8f7", "DetectTime": "2024-05-21T12:42:43.920904+00:00", "EventTime": "2024-05-21T12:42:43.920923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGhvdW1uaaUI8rQgVl"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "1858e6e1-97b6-4697-85f3-ecee42723942", "DetectTime": "2024-05-21T12:42:43.925468+00:00", "EventTime": "2024-05-21T12:42:43.925487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDV1wyYxSh4OrI9g"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "e01022af-4974-42d3-b3bd-f675b58b6bb6", "DetectTime": "2024-05-21T12:42:44.311086+00:00", "EventTime": "2024-05-21T12:42:44.311109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ42or3HieL7gumpGl"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "5e6f751a-0344-4aa5-af56-e6ba550d0b3e", "DetectTime": "2024-05-21T12:42:44.323481+00:00", "EventTime": "2024-05-21T12:42:44.323501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEhp42I5JrcDuFvUd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 126} +{"Format": "Json", "ID": "5e6f751a-0344-4aa5-af56-e6ba550d0b3e", "DetectTime": "2024-05-21T12:42:44.323481+00:00", "EventTime": "2024-05-21T12:42:44.323501+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-06T05:58:04.934944+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 126. (real time 2024/05/21 12:42:44.536153)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 126, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c79fb30e-6d3d-4b93-ad06-0021f31bdf80", "DetectTime": "2024-05-21T12:42:44.540276+00:00", "EventTime": "2024-05-21T12:42:44.540294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7wSjPJ2UMYxLzj9"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "69589362-9a6f-4142-a651-79e5743fba3c", "DetectTime": "2024-05-21T12:42:44.544728+00:00", "EventTime": "2024-05-21T12:42:44.544746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tMN52s26U1dj52Sj"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "947f4ad0-a8be-4fed-a8b1-68b6e6dd689e", "DetectTime": "2024-05-21T12:42:44.549143+00:00", "EventTime": "2024-05-21T12:42:44.549162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVOW61DdINfEBpRu7"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "b616939b-9112-4275-968a-263b270f20e2", "DetectTime": "2024-05-21T12:42:44.561761+00:00", "EventTime": "2024-05-21T12:42:44.561781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRh9qY3qnruJyPl1tc"], "accumulated_threat_level": 0.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "202a6b89-b01b-4e70-8889-b54cd0718c7e", "DetectTime": "2024-05-21T12:42:44.567340+00:00", "EventTime": "2024-05-21T12:42:44.567362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ID6NqBUGk2Q26ta"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "6bd5097f-ffe6-47f9-a13b-341567971847", "DetectTime": "2024-05-21T12:42:44.787442+00:00", "EventTime": "2024-05-21T12:42:44.787465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1jp92nd49chKE3Cc"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "a890300f-0273-44e7-901f-6c6dacf9f8ad", "DetectTime": "2024-05-21T12:42:44.824759+00:00", "EventTime": "2024-05-21T12:42:44.824780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPkfJh2jyQQ51RAOPl"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "b8fbd3ca-eb5c-4f15-8494-583578eca7a9", "DetectTime": "2024-05-21T12:42:44.857689+00:00", "EventTime": "2024-05-21T12:42:44.857711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaSbTn1kSXJMtvcJJ2"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "2e8f07a2-30d9-43fa-a101-e27819e4d5b7", "DetectTime": "2024-05-21T12:42:44.895240+00:00", "EventTime": "2024-05-21T12:42:44.895261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHAvlsHXvrpa6yK06"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "50143207-2f27-43b5-b89f-1ac4324c2ff2", "DetectTime": "2024-05-21T12:42:44.900157+00:00", "EventTime": "2024-05-21T12:42:44.900176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsglBt2rUec2bfA5Ad"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "bd79fdf2-d5de-40cd-9be5-51a016524cf5", "DetectTime": "2024-05-21T12:42:44.940386+00:00", "EventTime": "2024-05-21T12:42:44.940406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfNdWQSso1Pu5iq7"], "accumulated_threat_level": 1.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "3442f64d-75ee-4324-be20-e05b659cfe1f", "DetectTime": "2024-05-21T12:42:45.035769+00:00", "EventTime": "2024-05-21T12:42:45.035794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2NYaOWrgp3EKf1l"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "e3d1c9a7-bfcd-431c-8a31-9d77a0bdbb40", "DetectTime": "2024-05-21T12:42:45.071583+00:00", "EventTime": "2024-05-21T12:42:45.071605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcyJpu4u0HtfjCsX9k"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "9510aa5e-fa9c-4ffb-a680-2db138188dff", "DetectTime": "2024-05-21T12:42:45.336627+00:00", "EventTime": "2024-05-21T12:42:45.336647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb0KE87OrrCiNZrnb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 126} +{"Format": "IDEA0", "ID": "4df7e3d5-0d06-48f7-a097-d4f860a0b6cf", "DetectTime": "2024-05-21T12:42:45.341381+00:00", "EventTime": "2024-05-21T12:42:45.341400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwqnsS1hQTgKCMSTgf"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "434b76b6-3b6d-452c-96e3-ad6d1ec9f49c", "DetectTime": "2024-05-21T12:42:45.403057+00:00", "EventTime": "2024-05-21T12:42:45.403079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5YGnD2KUt3I8NHPrl"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "2b510f95-ad9f-482b-85e8-5f7d4b469adb", "DetectTime": "2024-05-21T12:42:45.445071+00:00", "EventTime": "2024-05-21T12:42:45.445091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTk5M14tvDh1KEYqR9"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "13dd8203-2180-401f-b70e-a601c74a4877", "DetectTime": "2024-05-21T12:42:45.485127+00:00", "EventTime": "2024-05-21T12:42:45.485146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTAom2wZVfbvBgoEk"], "accumulated_threat_level": 3.2, "timewindow": 126} +{"Format": "IDEA0", "ID": "7a812115-6078-4e8f-ab2c-f32e05b4aa01", "DetectTime": "2024-05-21T12:42:45.521418+00:00", "EventTime": "2024-05-21T12:42:45.521442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHKfg8FBFfeagV2l", "C9EzI12w4pNq6RkYhk", "CIEBfV17ez3ckrqJA2", "CsasWu4C3FDAmdSxVd"], "accumulated_threat_level": 0.5, "timewindow": 127} +{"Format": "IDEA0", "ID": "9600be52-71c8-40c9-ae49-e1542eb725ef", "DetectTime": "2024-05-21T12:42:45.531965+00:00", "EventTime": "2024-05-21T12:42:45.531983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzHh3m6mgcXkbiKd"], "accumulated_threat_level": 4.0, "timewindow": 126} +{"Format": "IDEA0", "ID": "461987aa-97ee-4aec-9b1f-109074c15879", "DetectTime": "2024-05-21T12:42:45.591065+00:00", "EventTime": "2024-05-21T12:42:45.591084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvYF1VI6BKKSwIr"], "accumulated_threat_level": 4.8, "timewindow": 126} +{"Format": "IDEA0", "ID": "8fc65cf6-e68e-40ca-9bff-7f54a96b82f9", "DetectTime": "2024-05-21T12:42:45.684923+00:00", "EventTime": "2024-05-21T12:42:45.684945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtYumuKRaLjaaum5"], "accumulated_threat_level": 5.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "d848a3b3-4202-4da4-9ad5-7847b969f69b", "DetectTime": "2024-05-21T12:42:45.934785+00:00", "EventTime": "2024-05-21T12:42:45.934805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CogiKM3HlgCxnXtQB3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 126} +{"Format": "IDEA0", "ID": "cdc5c5de-8a95-4226-96a3-fcc9b1a35851", "DetectTime": "2024-05-21T12:42:45.992379+00:00", "EventTime": "2024-05-21T12:42:45.992401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMfzPj3F1nF1rvzS09"], "accumulated_threat_level": 7.199999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "93d851e8-b258-47ac-957f-d91132ad7efc", "DetectTime": "2024-05-21T12:42:46.122355+00:00", "EventTime": "2024-05-21T12:42:46.122377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGFmt1xfqhF33Owg1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "b13c8d05-857c-4aca-a494-838ed292c27a", "DetectTime": "2024-05-21T12:42:46.130689+00:00", "EventTime": "2024-05-21T12:42:46.130710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4nwE4D1r4L9eFYpb"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "4c1489b6-abac-4e5f-ad11-46ce0ae50b02", "DetectTime": "2024-05-21T12:42:46.189503+00:00", "EventTime": "2024-05-21T12:42:46.189531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CglJV31WYFaRw8i4jb"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "43379ea4-f86f-4bbd-9eb4-b667fd90fdc9", "DetectTime": "2024-05-21T12:42:46.259316+00:00", "EventTime": "2024-05-21T12:42:46.259352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGfSL3PZCqKNj9uCa"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "462777da-ba2a-4bf7-8fd3-bdd4c654c08b", "DetectTime": "2024-05-21T12:42:46.264476+00:00", "EventTime": "2024-05-21T12:42:46.264496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNMLk2WJXNjhrD373"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "faa5faa6-2d7c-40b6-952a-8b29af5d3ec2", "DetectTime": "2024-05-21T12:42:46.334082+00:00", "EventTime": "2024-05-21T12:42:46.334106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdW0n1yr5rEQrowt6"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "9ddc7b5b-b852-4c8f-8ac4-7e381abc1cb2", "DetectTime": "2024-05-21T12:42:46.365921+00:00", "EventTime": "2024-05-21T12:42:46.365946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1IwW1jRs5J6qZR5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 126} +{"Format": "IDEA0", "ID": "c155655f-d56c-4aac-90a2-19bdc7ff0591", "DetectTime": "2024-05-21T12:42:46.381585+00:00", "EventTime": "2024-05-21T12:42:46.381609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzpHB2ooW8sDos6Zf"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "7805f80b-e740-40f7-846b-65b3bf5533dc", "DetectTime": "2024-05-21T12:42:46.596950+00:00", "EventTime": "2024-05-21T12:42:46.596971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg49xZeI2hyOYH5vl"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "22f7ad8a-0b13-4e2f-9d0b-09d1ef0bd04a", "DetectTime": "2024-05-21T12:42:46.669674+00:00", "EventTime": "2024-05-21T12:42:46.669696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgYJ03VXQV8S8Wq3d"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "dd8f51de-9cad-4262-b9e1-fde84beb2c30", "DetectTime": "2024-05-21T12:42:46.714624+00:00", "EventTime": "2024-05-21T12:42:46.714647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVPpl16Wb3tA1c8ai"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "3649445d-591a-4ccd-af6d-b6827f4c5269", "DetectTime": "2024-05-21T12:42:46.779913+00:00", "EventTime": "2024-05-21T12:42:46.779933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8h28DM0ZIr1D5Rh4"], "accumulated_threat_level": 9.6, "timewindow": 126} +{"Format": "IDEA0", "ID": "c03fe5e0-fded-42c7-9b00-872a63de7b8f", "DetectTime": "2024-05-21T12:42:46.813065+00:00", "EventTime": "2024-05-21T12:42:46.813086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RpFd4mJa20xiSRy3"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "8dabc0c6-715b-44cf-a206-da42c91707a1", "DetectTime": "2024-05-21T12:42:46.855871+00:00", "EventTime": "2024-05-21T12:42:46.855892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7O1rn2nSqYK3NdcOe"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "84bdd215-836d-454f-91bb-8f1f9bb2e325", "DetectTime": "2024-05-21T12:42:46.975425+00:00", "EventTime": "2024-05-21T12:42:46.975448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpdkT3hX0NwC0Ivwc"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "50fe6daa-af2a-48be-8d2f-92afbc288389", "DetectTime": "2024-05-21T12:42:47.215054+00:00", "EventTime": "2024-05-21T12:42:47.215074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6azW3dAztsawfh7e"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "5923d5e7-fdde-40e6-b53b-9a65a69225aa", "DetectTime": "2024-05-21T12:42:47.219914+00:00", "EventTime": "2024-05-21T12:42:47.219933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVfsYI19eNTWJe5eYa"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "59a6fdfd-e90d-4c78-a16b-0ff669260184", "DetectTime": "2024-05-21T12:42:47.224449+00:00", "EventTime": "2024-05-21T12:42:47.224467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EHjW327xdza5DYB"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "f071a4c1-29c0-4a6d-ae99-b345628bb6a5", "DetectTime": "2024-05-21T12:42:47.380020+00:00", "EventTime": "2024-05-21T12:42:47.380040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoI19CZtFCHpbJk9"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "2cba126a-7888-4cf6-b384-6f3137d98f3c", "DetectTime": "2024-05-21T12:42:47.450653+00:00", "EventTime": "2024-05-21T12:42:47.450675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipKzW224E10Aa0gua"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "97cefc42-d344-40a5-b17e-340576d70160", "DetectTime": "2024-05-21T12:42:47.507399+00:00", "EventTime": "2024-05-21T12:42:47.507419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"]}], "Attach": [{"Content": "Connection to unknown destination port 9683/UDP destination IP 122.214.58.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9ezx4RJVF2JfXrqg"], "accumulated_threat_level": 1.3, "timewindow": 127} +{"Format": "IDEA0", "ID": "7b236fef-6e0c-44ab-99be-02b88f38ca78", "DetectTime": "2024-05-21T12:42:47.512188+00:00", "EventTime": "2024-05-21T12:42:47.512207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwPsCF1qrkbyTkNIbj"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "8d139984-ac00-44ca-b8d1-7630626acd07", "DetectTime": "2024-05-21T12:42:47.572638+00:00", "EventTime": "2024-05-21T12:42:47.572660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYopF3FJdhT9uXcXl"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "c056fb55-7a5c-47ad-a2ca-9e19cf2c8f80", "DetectTime": "2024-05-21T12:42:47.832551+00:00", "EventTime": "2024-05-21T12:42:47.832576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJXph3PCNM0O73uof"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "b3fcbc9f-ac3c-49c8-929a-d621832e806a", "DetectTime": "2024-05-21T12:42:47.837647+00:00", "EventTime": "2024-05-21T12:42:47.837669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEkuib2bo4CIoIIfgd"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "4da59742-6289-45ca-8d60-1c944e5503e8", "DetectTime": "2024-05-21T12:42:47.907271+00:00", "EventTime": "2024-05-21T12:42:47.907292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CstLVE4rSYiKRAB49i"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "ef44a5e6-da6e-4112-9342-ec01fbc6a682", "DetectTime": "2024-05-21T12:42:47.949036+00:00", "EventTime": "2024-05-21T12:42:47.949056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CweEGqvRmLQWW1qxi"], "accumulated_threat_level": 2.1, "timewindow": 127} +{"Format": "IDEA0", "ID": "68dea4ea-b75f-4ead-aba3-6e595924d11f", "DetectTime": "2024-05-21T12:42:47.983611+00:00", "EventTime": "2024-05-21T12:42:47.983633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqmc2e3peW5Aq0oJnb"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "3007e362-26b0-4fd5-916d-4800a9189909", "DetectTime": "2024-05-21T12:42:48.022870+00:00", "EventTime": "2024-05-21T12:42:48.022891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSPYdtJMU3AojsKg"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "865ec137-1146-4b3f-b196-e2e037d59f49", "DetectTime": "2024-05-21T12:42:48.064482+00:00", "EventTime": "2024-05-21T12:42:48.064500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMLxO3cabhvVCsKt"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 127} +{"Format": "IDEA0", "ID": "381427e5-49f5-414b-bb22-c5daf2b0be5f", "DetectTime": "2024-05-21T12:42:48.100527+00:00", "EventTime": "2024-05-21T12:42:48.100548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofXP021iAeD4CGiie"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "676bfb0b-fdd5-4a06-a1f6-2b54d079579d", "DetectTime": "2024-05-21T12:42:48.356921+00:00", "EventTime": "2024-05-21T12:42:48.356952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpfmC93eZHbPc8GPOf"], "accumulated_threat_level": 3.7, "timewindow": 127} +{"Format": "IDEA0", "ID": "43ca79a0-d7d7-4afb-a80e-9d5e266d7958", "DetectTime": "2024-05-21T12:42:48.383765+00:00", "EventTime": "2024-05-21T12:42:48.383786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHooH2pJwpkKJbNlj"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "9b359b27-7d4f-4e51-a8d5-ebb47669d8cf", "DetectTime": "2024-05-21T12:42:48.388940+00:00", "EventTime": "2024-05-21T12:42:48.388961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb38J03ek32DgYBvZd"], "accumulated_threat_level": 5.6, "timewindow": 125} +{"Format": "IDEA0", "ID": "ad96b3d6-708d-4c0a-8d21-d74cb75ca053", "DetectTime": "2024-05-21T12:42:48.518555+00:00", "EventTime": "2024-05-21T12:42:48.518576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdUNGAUJrd8oVDXa"], "accumulated_threat_level": 4.5, "timewindow": 127} +{"Format": "IDEA0", "ID": "306a86a7-7b64-4156-a8e5-2c67ba4727a3", "DetectTime": "2024-05-21T12:42:48.755699+00:00", "EventTime": "2024-05-21T12:42:48.755718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA7N794U4CiGZxHsX9"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "8f30c366-4bb6-4961-a9a3-5b0d70507a46", "DetectTime": "2024-05-21T12:42:48.792424+00:00", "EventTime": "2024-05-21T12:42:48.792444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.249.237"]}], "Attach": [{"Content": "Connection to unknown destination port 13355/UDP destination IP 110.138.249.237. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCLKpYW2rOYJNQVk"], "accumulated_threat_level": 5.3, "timewindow": 127} +{"Format": "IDEA0", "ID": "94245cfd-2ba1-4f04-b068-1087769ed4c3", "DetectTime": "2024-05-21T12:42:48.839582+00:00", "EventTime": "2024-05-21T12:42:48.839602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHjF24OTWRTw0Wpu3"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "aeb1fc45-37a2-4bff-8eba-8c6e8dae5ecc", "DetectTime": "2024-05-21T12:42:49.127038+00:00", "EventTime": "2024-05-21T12:42:49.127061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.164.33.173"]}], "Attach": [{"Content": "Connection to unknown destination port 28478/UDP destination IP 125.164.33.173. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIvJL3HNIF6pzdUha"], "accumulated_threat_level": 6.1, "timewindow": 127} +{"Format": "IDEA0", "ID": "a9bf11d4-ce9b-49a9-bd2e-5e56a80efdf8", "DetectTime": "2024-05-21T12:42:49.161723+00:00", "EventTime": "2024-05-21T12:42:49.161744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9JUC2wR83qwUvL2l"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "ac8d3b11-106b-488f-ac7b-f64874f1c366", "DetectTime": "2024-05-21T12:42:49.411908+00:00", "EventTime": "2024-05-21T12:42:49.411933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAkL8D4fCwpb4ICB12"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "f117a9f8-6d78-490a-a232-781847e6f813", "DetectTime": "2024-05-21T12:42:49.416798+00:00", "EventTime": "2024-05-21T12:42:49.416817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGcD4v1vcNkk28yx12"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "d585bed5-7f06-4ca1-adf7-803b06c2ebb9", "DetectTime": "2024-05-21T12:42:49.485826+00:00", "EventTime": "2024-05-21T12:42:49.485847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAupzQ2gHvp87tcKHc"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "413ce044-865c-4105-8894-d574ebc7ef25", "DetectTime": "2024-05-21T12:42:49.592225+00:00", "EventTime": "2024-05-21T12:42:49.592243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hYc11UcSgk4QLNUi"], "accumulated_threat_level": 7.699999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "aaa03dfd-c064-4f28-9878-958890f904f0", "DetectTime": "2024-05-21T12:42:49.659377+00:00", "EventTime": "2024-05-21T12:42:49.659397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjJZSgPHShYS0O7i"], "accumulated_threat_level": 8.5, "timewindow": 127} +{"Format": "IDEA0", "ID": "0daa785b-9ec6-4fd6-8f58-dce2de72b6a6", "DetectTime": "2024-05-21T12:42:49.704612+00:00", "EventTime": "2024-05-21T12:42:49.704633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vdF6zi5pAog7IX3"], "accumulated_threat_level": 9.3, "timewindow": 127} +{"Format": "IDEA0", "ID": "e73bb22e-ad7e-4dd0-b609-0c2e8e07ab9a", "DetectTime": "2024-05-21T12:42:49.745438+00:00", "EventTime": "2024-05-21T12:42:49.745461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChkAF9QTO521rjiSl"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "a1080b16-8e11-4e7a-b3ca-0475364b3eb7", "DetectTime": "2024-05-21T12:42:49.821360+00:00", "EventTime": "2024-05-21T12:42:49.821378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQyWDiIcDjNGjc66"], "accumulated_threat_level": 10.100000000000001, "timewindow": 127} +{"Format": "IDEA0", "ID": "0bddc5c1-c5a5-4463-b186-cd8357d7313b", "DetectTime": "2024-05-21T12:42:50.006691+00:00", "EventTime": "2024-05-21T12:42:50.006709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yFSN1T87uI6HrxD5"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "d06fe5ea-6af6-4dff-ac61-66d848d2b87e", "DetectTime": "2024-05-21T12:42:50.019714+00:00", "EventTime": "2024-05-21T12:42:50.019734+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yFSN1T87uI6HrxD5"], "accumulated_threat_level": 12.200000000000001, "timewindow": 29} +{"Format": "Json", "ID": "d06fe5ea-6af6-4dff-ac61-66d848d2b87e", "DetectTime": "2024-05-21T12:42:50.019714+00:00", "EventTime": "2024-05-21T12:42:50.019734+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "1970-01-02T04:08:54.395315+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2024/05/21 12:42:50.536987)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000001, "timewindow": 29, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000001} +{"Format": "IDEA0", "ID": "7d24a8a2-34f1-4814-8fb5-a85eef600d20", "DetectTime": "2024-05-21T12:42:50.540898+00:00", "EventTime": "2024-05-21T12:42:50.540916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ7WY1CsNqeBw92Mh"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "7b197d0e-e5d6-4c0f-84c1-96af5bd6fb38", "DetectTime": "2024-05-21T12:42:50.551827+00:00", "EventTime": "2024-05-21T12:42:50.551845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7N8Lo1zHkZedihWla"], "accumulated_threat_level": 10.900000000000002, "timewindow": 127} +{"Format": "IDEA0", "ID": "02389373-c05f-473f-9dae-8ae4949f840d", "DetectTime": "2024-05-21T12:42:50.564524+00:00", "EventTime": "2024-05-21T12:42:50.564543+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhzZCh9Lxep4WNvg"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "5512fd2e-ca7b-464d-bd42-016ce56372e3", "DetectTime": "2024-05-21T12:42:50.577254+00:00", "EventTime": "2024-05-21T12:42:50.577277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhzZCh9Lxep4WNvg"], "accumulated_threat_level": 0.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "adc863df-b0bd-4c67-9f30-47aee482a78e", "DetectTime": "2024-05-21T12:42:50.588441+00:00", "EventTime": "2024-05-21T12:42:50.588459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61XBN1yWXp4QOYbZa"], "accumulated_threat_level": 11.700000000000003, "timewindow": 127} +{"Format": "IDEA0", "ID": "91dfb3d6-bc0c-4d2c-9b7a-dbb4fa780cec", "DetectTime": "2024-05-21T12:42:50.599548+00:00", "EventTime": "2024-05-21T12:42:50.599564+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jSaF4iNw5BZbTvwk"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "adb55953-c54c-4479-96eb-cec3c9f69fe4", "DetectTime": "2024-05-21T12:42:50.610015+00:00", "EventTime": "2024-05-21T12:42:50.610033+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jSaF4iNw5BZbTvwk"], "accumulated_threat_level": 1.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "db6044b4-290a-4e05-90bb-06a44ca73f0d", "DetectTime": "2024-05-21T12:42:50.620638+00:00", "EventTime": "2024-05-21T12:42:50.620656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.166.201"]}], "Attach": [{"Content": "Connection to unknown destination port 15739/UDP destination IP 181.64.166.201. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjwbp3ObwopIVyFnh"], "accumulated_threat_level": 12.500000000000004, "timewindow": 127} +{"Format": "Json", "ID": "db6044b4-290a-4e05-90bb-06a44ca73f0d", "DetectTime": "2024-05-21T12:42:50.620638+00:00", "EventTime": "2024-05-21T12:42:50.620656+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.64.166.201"]}], "Attach": [{"Content": "1970-01-06T06:06:40.621655+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2024/05/21 12:42:50.832558)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 127, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "a91b59bc-266f-4156-8fa9-778297da9acc", "DetectTime": "2024-05-21T12:42:50.836918+00:00", "EventTime": "2024-05-21T12:42:50.836946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtofNG1dc822mWRhAe"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "7ec9ef6b-d1cc-43e5-9b02-7730802c28de", "DetectTime": "2024-05-21T12:42:50.851773+00:00", "EventTime": "2024-05-21T12:42:50.851793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD1EDl2zb73AD49bJ7"], "accumulated_threat_level": 0.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "316ce938-f967-4315-b751-e0538270a7b7", "DetectTime": "2024-05-21T12:42:50.863004+00:00", "EventTime": "2024-05-21T12:42:50.863023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3V4O936lANokP6Nd5"], "accumulated_threat_level": 1.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "cc3b3287-0469-4ff4-9bc9-5ca5bf4e2155", "DetectTime": "2024-05-21T12:42:50.874129+00:00", "EventTime": "2024-05-21T12:42:50.874148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Six94Sbgpa10HoXk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 127} +{"Format": "IDEA0", "ID": "0abc8ced-b525-42eb-819e-20ff9aaf56dd", "DetectTime": "2024-05-21T12:42:50.878986+00:00", "EventTime": "2024-05-21T12:42:50.879004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbsveC3y5MZTSaPHT2"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "8c704709-c9a9-4a7c-992a-8b010146cfea", "DetectTime": "2024-05-21T12:42:51.074227+00:00", "EventTime": "2024-05-21T12:42:51.074248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyH4Op38YECFKBPkc8"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "0febbe20-3a5c-49de-93d4-30f7eab8f7b7", "DetectTime": "2024-05-21T12:42:51.161625+00:00", "EventTime": "2024-05-21T12:42:51.161646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8vZrC2sVDZeINoWI4"], "accumulated_threat_level": 3.2, "timewindow": 127} +{"Format": "IDEA0", "ID": "e019eebc-dce4-4a6f-98fd-dc9f9af17fb8", "DetectTime": "2024-05-21T12:42:51.279807+00:00", "EventTime": "2024-05-21T12:42:51.279828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Bl9QQ3Gs0lhiqsi"], "accumulated_threat_level": 4.0, "timewindow": 127} +{"Format": "IDEA0", "ID": "a4847bc2-539d-472f-952a-7097f4fa0703", "DetectTime": "2024-05-21T12:42:51.336091+00:00", "EventTime": "2024-05-21T12:42:51.336114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3KTP2QGa3FJmhBLb"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "488408b1-6e78-4396-8007-20e15584d265", "DetectTime": "2024-05-21T12:42:51.434641+00:00", "EventTime": "2024-05-21T12:42:51.434659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrqPs2yPnF3DdOBx2"], "accumulated_threat_level": 4.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "6b38b812-42c6-47a6-87ed-af93c34cd776", "DetectTime": "2024-05-21T12:42:51.467192+00:00", "EventTime": "2024-05-21T12:42:51.467213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53tWA1siMW4AbFFik"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "80e57048-7e6d-4664-ba2a-743a38b25d54", "DetectTime": "2024-05-21T12:42:51.506983+00:00", "EventTime": "2024-05-21T12:42:51.507003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CODPU144JYrZzIwUig"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "05b4392d-2ded-4f54-b2ce-df4e94308a14", "DetectTime": "2024-05-21T12:42:51.555468+00:00", "EventTime": "2024-05-21T12:42:51.555487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UzT7RUJflOsU29g"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "4baa7faa-dc47-47ea-b76a-0012040956a2", "DetectTime": "2024-05-21T12:42:51.658467+00:00", "EventTime": "2024-05-21T12:42:51.658488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjhu2ci6xGLjJzSfk"], "accumulated_threat_level": 5.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "9bd3a18b-ad93-4d0b-8274-7380a2e9a918", "DetectTime": "2024-05-21T12:42:51.894123+00:00", "EventTime": "2024-05-21T12:42:51.894144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNpBp44iq3vJWi5Kj"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "7deedd66-d907-4f9b-8889-064b7e8e761c", "DetectTime": "2024-05-21T12:42:52.024199+00:00", "EventTime": "2024-05-21T12:42:52.024228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvANzC4V6XvkDnFWdb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "d6637dc3-1203-4d85-beef-353875c05d07", "DetectTime": "2024-05-21T12:42:52.052946+00:00", "EventTime": "2024-05-21T12:42:52.052968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9sZA3SmysnNK5mD"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "8417197e-bb37-403b-9e9d-acce44fb1087", "DetectTime": "2024-05-21T12:42:52.068787+00:00", "EventTime": "2024-05-21T12:42:52.068808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMnJ9m3ERzwaHxWTCg", "C1GtA83DJNVqYm39Fe", "CuQgSL1VgzE7HbstKe", "CQ42x026pdDaSgWzaa"], "accumulated_threat_level": 0.5, "timewindow": 128} +{"Format": "IDEA0", "ID": "7709f4dc-3f74-4ade-a857-397cd3b2a1ad", "DetectTime": "2024-05-21T12:42:52.101652+00:00", "EventTime": "2024-05-21T12:42:52.101677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs07sB3Tg0xusvaQUe"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "e4e2bec9-2e3c-471e-a2c1-6e116ebba4a6", "DetectTime": "2024-05-21T12:42:52.139491+00:00", "EventTime": "2024-05-21T12:42:52.139514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwNPr4y5X18oOq3pc"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "f8e4ee37-b0b6-4f4b-99c3-71e8c7a58e57", "DetectTime": "2024-05-21T12:42:52.152060+00:00", "EventTime": "2024-05-21T12:42:52.152080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLs2Gk445HqmSohYA1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "3ee1b979-fb69-4c87-9fc5-d11fa3882867", "DetectTime": "2024-05-21T12:42:52.219832+00:00", "EventTime": "2024-05-21T12:42:52.219852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjV604wD7GdlSGGs4"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "8cdd8a98-ce02-46b9-9fff-d9ccd958df62", "DetectTime": "2024-05-21T12:42:52.268982+00:00", "EventTime": "2024-05-21T12:42:52.269006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgF2m1AE00EIRvKbg"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "c7a57429-c6e5-45aa-958c-efb5f08ba0eb", "DetectTime": "2024-05-21T12:42:52.274067+00:00", "EventTime": "2024-05-21T12:42:52.274086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IrSp1Q31r0BK6m3k"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "f7c0668c-56aa-4b58-a94f-705aa2b71947", "DetectTime": "2024-05-21T12:42:52.294752+00:00", "EventTime": "2024-05-21T12:42:52.294773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNK7F4GWhsu0ZBxTk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "43294d47-1d74-48c2-abe9-5b04b469e006", "DetectTime": "2024-05-21T12:42:52.551503+00:00", "EventTime": "2024-05-21T12:42:52.551526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsLZi2GZ3RPjxzCO"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "8d02c760-f82e-4aa5-80f2-b0a42fcab3f7", "DetectTime": "2024-05-21T12:42:52.597024+00:00", "EventTime": "2024-05-21T12:42:52.597045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpKO5yTSmNf8Uyc49"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "0dea2d2a-f1c0-4400-a89c-c9736dee43b6", "DetectTime": "2024-05-21T12:42:52.635560+00:00", "EventTime": "2024-05-21T12:42:52.635580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9N67q2mPAujdngXQl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "1c394804-41c6-4124-8dda-c8ec56c9e10a", "DetectTime": "2024-05-21T12:42:52.682636+00:00", "EventTime": "2024-05-21T12:42:52.682654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4G0538QdETEmTvWd"], "accumulated_threat_level": 9.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "1a256271-2c46-4c87-8ebf-97cc2326d14e", "DetectTime": "2024-05-21T12:42:52.720065+00:00", "EventTime": "2024-05-21T12:42:52.720087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccm2fv4NPnlm8Jp7Pc"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "36310029-7d70-4e36-b0fd-99a0abca330b", "DetectTime": "2024-05-21T12:42:52.758768+00:00", "EventTime": "2024-05-21T12:42:52.758786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBc1my3AijH2MbyKNh"], "accumulated_threat_level": 10.4, "timewindow": 127} +{"Format": "IDEA0", "ID": "4c505818-be30-435a-9166-c059e0b1e567", "DetectTime": "2024-05-21T12:42:52.804241+00:00", "EventTime": "2024-05-21T12:42:52.804260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgzp332qbyhR7L53Ik"], "accumulated_threat_level": 11.200000000000001, "timewindow": 127} +{"Format": "IDEA0", "ID": "2df0893d-9c01-4f15-82d8-85b55cfc9082", "DetectTime": "2024-05-21T12:42:53.043068+00:00", "EventTime": "2024-05-21T12:42:53.043086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRf6y1OpapyNfe9i5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 127} +{"Format": "Json", "ID": "2df0893d-9c01-4f15-82d8-85b55cfc9082", "DetectTime": "2024-05-21T12:42:53.043068+00:00", "EventTime": "2024-05-21T12:42:53.043086+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-06T06:40:13.344256+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2024/05/21 12:42:53.202817)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 127, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a8fa8e83-97a2-4a08-a4b9-e5c3c4ba90b5", "DetectTime": "2024-05-21T12:42:53.213489+00:00", "EventTime": "2024-05-21T12:42:53.213510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJuhWq3JfBbj1zEeMf"], "accumulated_threat_level": 0.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "6ba52c9a-353f-49c2-ba5b-455c30eca925", "DetectTime": "2024-05-21T12:42:53.218390+00:00", "EventTime": "2024-05-21T12:42:53.218421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCgsFNJgVp6IbaGe"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "31de1378-accf-480d-ad56-faf4fbd7e22d", "DetectTime": "2024-05-21T12:42:53.230598+00:00", "EventTime": "2024-05-21T12:42:53.230617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKwvzztqS55AYz91"], "accumulated_threat_level": 1.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "cced2414-2f40-48f5-b7e8-f0b1cdc4c3d1", "DetectTime": "2024-05-21T12:42:53.262161+00:00", "EventTime": "2024-05-21T12:42:53.262179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yfhhKK5ZMkHIXI2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 127} +{"Format": "IDEA0", "ID": "30fd0c2f-24e6-4096-83d2-e50408b6d5b7", "DetectTime": "2024-05-21T12:42:53.280293+00:00", "EventTime": "2024-05-21T12:42:53.280314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjtRn2dKIIHkFAfP"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "5c74f7a1-58ac-47dc-8484-b109a75ab419", "DetectTime": "2024-05-21T12:42:53.336888+00:00", "EventTime": "2024-05-21T12:42:53.336907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbolD2eLoIMHUkjqk"], "accumulated_threat_level": 3.2, "timewindow": 127} +{"Format": "IDEA0", "ID": "38f47c23-20fa-41b5-a3d9-829317d372ba", "DetectTime": "2024-05-21T12:42:53.440816+00:00", "EventTime": "2024-05-21T12:42:53.440839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJvp91VUubvPfus6l"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "a469ac96-3518-41ca-a9ce-47115bbb8dcc", "DetectTime": "2024-05-21T12:42:53.452172+00:00", "EventTime": "2024-05-21T12:42:53.452190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ8V2J09PCqWqfgf9"], "accumulated_threat_level": 4.0, "timewindow": 127} +{"Format": "IDEA0", "ID": "095efb70-3691-4840-af3f-37c78bd1a81f", "DetectTime": "2024-05-21T12:42:53.476820+00:00", "EventTime": "2024-05-21T12:42:53.476842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.9.171.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CslnzU1qrQtXgruawh"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "8c11e381-2bbd-4892-8375-d8b2d14cfddc", "DetectTime": "2024-05-21T12:42:53.728477+00:00", "EventTime": "2024-05-21T12:42:53.728500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKrPA2bZDofvGpFBa"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "a91abee5-86a4-4ae0-9eb4-eca578c7aae1", "DetectTime": "2024-05-21T12:42:53.775232+00:00", "EventTime": "2024-05-21T12:42:53.775250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDThyl3sJtNLmtYugi"], "accumulated_threat_level": 4.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "0922d703-34fa-462b-9862-f737f6dddf43", "DetectTime": "2024-05-21T12:42:53.804638+00:00", "EventTime": "2024-05-21T12:42:53.804660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNfXv4lkEpc12jw8c"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "024bdc46-1ce4-4d20-9673-631babf13785", "DetectTime": "2024-05-21T12:42:53.845293+00:00", "EventTime": "2024-05-21T12:42:53.845312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAi1rxnoyQReoZkk"], "accumulated_threat_level": 5.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "ad96d098-40ed-4c65-8002-7a89dc46d532", "DetectTime": "2024-05-21T12:42:53.971314+00:00", "EventTime": "2024-05-21T12:42:53.971337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0lMI12MsXGZh7JiH4"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "30f53b55-ea19-47b8-897e-703cae359b09", "DetectTime": "2024-05-21T12:42:54.012895+00:00", "EventTime": "2024-05-21T12:42:54.012914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RNCk1LXd0rGg275b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "c62115d0-c256-4468-b15c-eb462bf90651", "DetectTime": "2024-05-21T12:42:54.046253+00:00", "EventTime": "2024-05-21T12:42:54.046275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXCrN225MNgjCvZFk"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "faf2e2e4-790f-4c5d-bb44-afcef802dafd", "DetectTime": "2024-05-21T12:42:54.085455+00:00", "EventTime": "2024-05-21T12:42:54.085476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEgG43HfJOfy9iDSd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "a362eaf3-bfeb-43c3-9305-da12b2fb4b16", "DetectTime": "2024-05-21T12:42:54.344972+00:00", "EventTime": "2024-05-21T12:42:54.344994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7IglQ6pfH4oeeMW5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "ea01fae7-61e7-4024-b972-81104263afa3", "DetectTime": "2024-05-21T12:42:54.382304+00:00", "EventTime": "2024-05-21T12:42:54.382325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZkqo2Mlj2MhzWFy5"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "a10f4c19-b0fe-4e98-ad58-48f13fa9963a", "DetectTime": "2024-05-21T12:42:54.421678+00:00", "EventTime": "2024-05-21T12:42:54.421698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82e4oqHZyVctLlFf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "ee9e6aed-7820-40a4-86a3-9428a10e7b1d", "DetectTime": "2024-05-21T12:42:54.468085+00:00", "EventTime": "2024-05-21T12:42:54.468103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC3dYh1Kc66csdxBo1"], "accumulated_threat_level": 9.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "53c88ea4-f075-4ac3-98d3-536be08bd962", "DetectTime": "2024-05-21T12:42:54.515933+00:00", "EventTime": "2024-05-21T12:42:54.515952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFfO93owuNiSOVrt7"], "accumulated_threat_level": 10.4, "timewindow": 127} +{"Format": "IDEA0", "ID": "45114b00-8699-4489-9629-1fd6b07e51c0", "DetectTime": "2024-05-21T12:42:54.564535+00:00", "EventTime": "2024-05-21T12:42:54.564554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgbQl1KpX5fU0DI42"], "accumulated_threat_level": 11.200000000000001, "timewindow": 127} +{"Format": "IDEA0", "ID": "cbb5a4ec-ea00-4840-ae72-4fa74384e625", "DetectTime": "2024-05-21T12:42:54.602846+00:00", "EventTime": "2024-05-21T12:42:54.602867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHnMc1GGN13JYh48f"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "6e240b40-8609-4b2c-baa4-ad3fa39050d0", "DetectTime": "2024-05-21T12:42:54.639795+00:00", "EventTime": "2024-05-21T12:42:54.639814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkHE6Ro6P24yhno1j"], "accumulated_threat_level": 12.000000000000002, "timewindow": 127} +{"Format": "Json", "ID": "6e240b40-8609-4b2c-baa4-ad3fa39050d0", "DetectTime": "2024-05-21T12:42:54.639795+00:00", "EventTime": "2024-05-21T12:42:54.639814+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "1970-01-06T06:40:36.812710+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2024/05/21 12:42:54.827598)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 127, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "dd063e0c-dd57-46cc-82f4-30746639d421", "DetectTime": "2024-05-21T12:42:54.896151+00:00", "EventTime": "2024-05-21T12:42:54.896172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSTwnLgLS5MJDkwh"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "93a55828-58fc-4263-92e0-d168baebff6d", "DetectTime": "2024-05-21T12:42:54.935874+00:00", "EventTime": "2024-05-21T12:42:54.935893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsH8xI2Cdw2zfmT1a6"], "accumulated_threat_level": 0.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "e491e056-f25a-4583-abad-7cf2a1046744", "DetectTime": "2024-05-21T12:42:54.984589+00:00", "EventTime": "2024-05-21T12:42:54.984608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czlgr12lT4w0yoKvO7"], "accumulated_threat_level": 1.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "59ac95c0-e3fb-4b04-842e-93e711d35105", "DetectTime": "2024-05-21T12:42:55.031062+00:00", "EventTime": "2024-05-21T12:42:55.031082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz2mFa1rxlh8Vc2iu7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 127} +{"Format": "IDEA0", "ID": "24f34b4c-7022-4936-9157-8b805df2ae2b", "DetectTime": "2024-05-21T12:42:55.077665+00:00", "EventTime": "2024-05-21T12:42:55.077685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMYBY3axLeUryLEog"], "accumulated_threat_level": 3.2, "timewindow": 127} +{"Format": "IDEA0", "ID": "8ec4f912-0caf-4b53-9a79-0e23b29f90b7", "DetectTime": "2024-05-21T12:42:55.123046+00:00", "EventTime": "2024-05-21T12:42:55.123067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zBA1254h8GbW5ASe"], "accumulated_threat_level": 4.0, "timewindow": 127} +{"Format": "IDEA0", "ID": "d6d1687e-71fb-4aaa-8805-8117dacc898b", "DetectTime": "2024-05-21T12:42:55.165697+00:00", "EventTime": "2024-05-21T12:42:55.165718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31j7O145HG0oUGKAi"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "5ca68b47-70d2-4c4f-983e-fc36446c6eec", "DetectTime": "2024-05-21T12:42:55.243080+00:00", "EventTime": "2024-05-21T12:42:55.243107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIH0j4XKvM8wPE8zd"], "accumulated_threat_level": 4.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "46e0b23f-b559-49e3-9dfa-dacc28d98d8c", "DetectTime": "2024-05-21T12:42:55.485388+00:00", "EventTime": "2024-05-21T12:42:55.485419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE50ba3nrLsb092Sp2"], "accumulated_threat_level": 5.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "158411f8-6ac8-438a-830a-45e8d9c87d07", "DetectTime": "2024-05-21T12:42:55.532897+00:00", "EventTime": "2024-05-21T12:42:55.532924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDK0n3vkhr8iwPQ3d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "a278a215-ec30-421b-82f9-8a0ae50ae811", "DetectTime": "2024-05-21T12:42:55.575202+00:00", "EventTime": "2024-05-21T12:42:55.575231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIMve3RsETNJ7Vpjb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "f53dd110-7ba5-44ca-854b-91d7bbf345c6", "DetectTime": "2024-05-21T12:42:55.612060+00:00", "EventTime": "2024-05-21T12:42:55.612083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vOKu3V4rdlnjUT9d"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "2be4e3d2-fe55-4c94-951a-0cd4b9cca636", "DetectTime": "2024-05-21T12:42:55.651096+00:00", "EventTime": "2024-05-21T12:42:55.651116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["110.138.249.237"]}], "Attach": [{"Content": "Connection to unknown destination port 13355/UDP destination IP 110.138.249.237. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAySr33Sau9IdXZBMj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "2a0cf0cd-b3d8-4f77-98f4-9ac20724041c", "DetectTime": "2024-05-21T12:42:55.710998+00:00", "EventTime": "2024-05-21T12:42:55.711018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjdiM3whQqcYBmfkd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 127} +{"Format": "IDEA0", "ID": "da55697b-bf69-4da2-bfc2-3d6fbbaac21d", "DetectTime": "2024-05-21T12:42:55.746140+00:00", "EventTime": "2024-05-21T12:42:55.746161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXuZ14DtAZEYyvQi"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "30aa2a06-2ffa-441b-b46a-97a5486fcf56", "DetectTime": "2024-05-21T12:42:55.789183+00:00", "EventTime": "2024-05-21T12:42:55.789201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1dus3yAS1vcCbEB5"], "accumulated_threat_level": 9.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "105eee27-458b-4f77-93e5-7b74ab9df7a5", "DetectTime": "2024-05-21T12:42:55.833729+00:00", "EventTime": "2024-05-21T12:42:55.833750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4JhMh3vn1MXkiHHei"], "accumulated_threat_level": 10.4, "timewindow": 127} +{"Format": "IDEA0", "ID": "59054033-eb43-4874-8c3c-2ac9f99a0ec5", "DetectTime": "2024-05-21T12:42:56.058421+00:00", "EventTime": "2024-05-21T12:42:56.058440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOn2VA6F0yOxUkcj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 127} +{"Format": "IDEA0", "ID": "3391c241-065b-4553-a08f-fc6183fcf7c1", "DetectTime": "2024-05-21T12:42:56.111787+00:00", "EventTime": "2024-05-21T12:42:56.111812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblCbl1Mesubw9x0Dg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 127} +{"Format": "Json", "ID": "3391c241-065b-4553-a08f-fc6183fcf7c1", "DetectTime": "2024-05-21T12:42:56.111787+00:00", "EventTime": "2024-05-21T12:42:56.111812+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-06T06:41:19.903241+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 127. (real time 2024/05/21 12:42:56.336782)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 127, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a8323fa5-40a8-4c3e-8617-08d739ce2a0d", "DetectTime": "2024-05-21T12:42:56.341414+00:00", "EventTime": "2024-05-21T12:42:56.341433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChSHfW13Ew8C0WCrn2"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "eb34e64a-7f7f-4098-8fcb-ea2a0c401572", "DetectTime": "2024-05-21T12:42:56.353445+00:00", "EventTime": "2024-05-21T12:42:56.353469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwEuJ3SwUPKVr29sb"], "accumulated_threat_level": 0.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "19ed55c8-3781-419f-a1cc-13edb440def5", "DetectTime": "2024-05-21T12:42:56.365318+00:00", "EventTime": "2024-05-21T12:42:56.365337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cehetb3UnxYbQW2rNb"], "accumulated_threat_level": 1.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "1742d8f9-956e-42ea-a3b6-c41c7b404062", "DetectTime": "2024-05-21T12:42:56.377013+00:00", "EventTime": "2024-05-21T12:42:56.377031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67NcKnT58VheGhI8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 127} +{"Format": "IDEA0", "ID": "d13f2287-bebf-49f2-80fe-27758125a0d2", "DetectTime": "2024-05-21T12:42:56.391092+00:00", "EventTime": "2024-05-21T12:42:56.391118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUDUJ2zQ6D3KXmTDk"], "accumulated_threat_level": 3.2, "timewindow": 127} +{"Format": "IDEA0", "ID": "2b350765-0548-41da-84ed-eb32529d0e20", "DetectTime": "2024-05-21T12:42:56.579447+00:00", "EventTime": "2024-05-21T12:42:56.579484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALeoX1jAKcD2CYKi8"], "accumulated_threat_level": 4.0, "timewindow": 127} +{"Format": "IDEA0", "ID": "38131645-f727-47da-93d4-90312b325a67", "DetectTime": "2024-05-21T12:42:56.616507+00:00", "EventTime": "2024-05-21T12:42:56.616529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6TiEz2bUcqXZecNji"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "f053a6fa-0deb-4aba-9642-aca004ba45c8", "DetectTime": "2024-05-21T12:42:56.660700+00:00", "EventTime": "2024-05-21T12:42:56.660721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDz0bwsaTbUM1yL7"], "accumulated_threat_level": 4.8, "timewindow": 127} +{"Format": "IDEA0", "ID": "a0b78bcc-1afa-45df-936d-8137c3cffa95", "DetectTime": "2024-05-21T12:42:56.712761+00:00", "EventTime": "2024-05-21T12:42:56.712780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8rPlR2dA4HSCfMHbb"], "accumulated_threat_level": 5.6, "timewindow": 127} +{"Format": "IDEA0", "ID": "3448b4af-d3bd-4821-861c-59756ff8c961", "DetectTime": "2024-05-21T12:42:56.777132+00:00", "EventTime": "2024-05-21T12:42:56.777150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4Ju04RVK8p7sne68"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "10f1c264-bdce-4c09-9b9f-e55d4a466c07", "DetectTime": "2024-05-21T12:42:56.854718+00:00", "EventTime": "2024-05-21T12:42:56.854738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPS9M2UbeJzwYCmwj"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "cf74bf40-e442-44a5-bbf9-812c69397575", "DetectTime": "2024-05-21T12:42:56.955226+00:00", "EventTime": "2024-05-21T12:42:56.955244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPWxQy4d6ZQ9ezjWl"], "accumulated_threat_level": 1.3, "timewindow": 128} +{"Format": "IDEA0", "ID": "d6ffa705-c098-401c-b67c-d5e4655ba0ed", "DetectTime": "2024-05-21T12:42:57.002209+00:00", "EventTime": "2024-05-21T12:42:57.002228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["122.214.58.197"]}], "Attach": [{"Content": "Connection to unknown destination port 9683/UDP destination IP 122.214.58.197. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqErgSLW8eCj2rWFf"], "accumulated_threat_level": 2.1, "timewindow": 128} +{"Format": "IDEA0", "ID": "007ee014-df74-4424-a878-0dbf73911e80", "DetectTime": "2024-05-21T12:42:57.014591+00:00", "EventTime": "2024-05-21T12:42:57.014609+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzozF2geEEpKSkfic"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "f5a86a77-513f-424d-9eca-970425475fb8", "DetectTime": "2024-05-21T12:42:57.026919+00:00", "EventTime": "2024-05-21T12:42:57.026938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzozF2geEEpKSkfic"], "accumulated_threat_level": 1.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "91184eb8-7039-480a-aa43-51b462bd463a", "DetectTime": "2024-05-21T12:42:57.042623+00:00", "EventTime": "2024-05-21T12:42:57.042641+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDHel2ttoksI9EhEa"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "ae2ec4a3-7abe-4e85-98b1-bb165a60f5f4", "DetectTime": "2024-05-21T12:42:57.054317+00:00", "EventTime": "2024-05-21T12:42:57.054336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrDHel2ttoksI9EhEa"], "accumulated_threat_level": 2.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "3dc6cd6a-0662-4b50-a8f4-9b1ae7330fdc", "DetectTime": "2024-05-21T12:42:57.082719+00:00", "EventTime": "2024-05-21T12:42:57.082741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jbze2pj6Tz6iaVSj"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "2b61f874-8c83-4a63-863c-dcf80a585fa1", "DetectTime": "2024-05-21T12:42:57.095002+00:00", "EventTime": "2024-05-21T12:42:57.095021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jbze2pj6Tz6iaVSj"], "accumulated_threat_level": 2.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "b51c46d6-c084-4324-a5cc-769e85a5c5ee", "DetectTime": "2024-05-21T12:42:57.111991+00:00", "EventTime": "2024-05-21T12:42:57.112009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwPq82MC4MENNNTNf"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "a63f3211-9d3c-4d45-96d4-d17c8e8eedc9", "DetectTime": "2024-05-21T12:42:57.254725+00:00", "EventTime": "2024-05-21T12:42:57.254745+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqm0gkUDAcmTp7Cye"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "71f899df-c69f-4bf9-988e-f8cfcdf872e7", "DetectTime": "2024-05-21T12:42:57.267848+00:00", "EventTime": "2024-05-21T12:42:57.267882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqm0gkUDAcmTp7Cye"], "accumulated_threat_level": 3.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "b2e249d5-ee24-49f3-b4e9-44cc1108452b", "DetectTime": "2024-05-21T12:42:57.293558+00:00", "EventTime": "2024-05-21T12:42:57.293578+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQ9AF3AjCcXS0MFwh"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "6aa3d2cb-987d-4609-9f4b-2c3e1dd918d6", "DetectTime": "2024-05-21T12:42:57.306422+00:00", "EventTime": "2024-05-21T12:42:57.306446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzQ9AF3AjCcXS0MFwh"], "accumulated_threat_level": 3.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "fdb382e9-480b-407d-978e-f16650b7c2e5", "DetectTime": "2024-05-21T12:42:57.328090+00:00", "EventTime": "2024-05-21T12:42:57.328110+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csjvb1MWzYBPOPx0j"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "4029a853-9259-4372-9511-6e491a8b9a53", "DetectTime": "2024-05-21T12:42:57.342799+00:00", "EventTime": "2024-05-21T12:42:57.342829+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csjvb1MWzYBPOPx0j"], "accumulated_threat_level": 4.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "4aab6aaa-f776-4ca7-908d-9fa1fde8497a", "DetectTime": "2024-05-21T12:42:57.365800+00:00", "EventTime": "2024-05-21T12:42:57.365819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTdNJ2rp0wWYILagj"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "e87b6f26-ecb6-4422-a6d5-07cd0feadee8", "DetectTime": "2024-05-21T12:42:57.378212+00:00", "EventTime": "2024-05-21T12:42:57.378229+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTdNJ2rp0wWYILagj"], "accumulated_threat_level": 4.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "b5fc5860-7c24-487b-a020-a019063fd34e", "DetectTime": "2024-05-21T12:42:57.383018+00:00", "EventTime": "2024-05-21T12:42:57.383036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9CkL6vRBOb6FW3Y8"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "3e771b15-a9c0-4d81-8169-9320fa998f35", "DetectTime": "2024-05-21T12:42:57.425370+00:00", "EventTime": "2024-05-21T12:42:57.425391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Tl5x3FbbJZXnk08"], "accumulated_threat_level": 3.7, "timewindow": 128} +{"Format": "IDEA0", "ID": "0fd8b833-2103-4b94-bf49-edcb73e7538b", "DetectTime": "2024-05-21T12:42:57.477360+00:00", "EventTime": "2024-05-21T12:42:57.477379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkWB31cwYGz53Axpe"], "accumulated_threat_level": 4.5, "timewindow": 128} +{"Format": "IDEA0", "ID": "e3527cce-cc07-40b3-b744-6aafbfc74704", "DetectTime": "2024-05-21T12:42:57.527437+00:00", "EventTime": "2024-05-21T12:42:57.527468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1Exv2KPeirZB3TO6"], "accumulated_threat_level": 5.3, "timewindow": 128} +{"Format": "IDEA0", "ID": "c86040ca-31b4-405e-844e-9145af5bf79b", "DetectTime": "2024-05-21T12:42:57.576734+00:00", "EventTime": "2024-05-21T12:42:57.576769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKR87mlHUR3b714i2"], "accumulated_threat_level": 6.1, "timewindow": 128} +{"Format": "IDEA0", "ID": "ff31ae90-50ea-419d-abba-7fb6539be246", "DetectTime": "2024-05-21T12:42:57.616205+00:00", "EventTime": "2024-05-21T12:42:57.616225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdKR02yVUD9AVMIK6"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "bc07bc5b-f5c3-4091-81ce-f6e89632e488", "DetectTime": "2024-05-21T12:42:57.629862+00:00", "EventTime": "2024-05-21T12:42:57.629885+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdKR02yVUD9AVMIK6"], "accumulated_threat_level": 5.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "c00879aa-5ae4-4a47-8c9a-958372eb9ae5", "DetectTime": "2024-05-21T12:42:57.642847+00:00", "EventTime": "2024-05-21T12:42:57.642870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["105.228.46.98"]}], "Attach": [{"Content": "Connection to unknown destination port 1563/UDP destination IP 105.228.46.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBW6N28M7qWbglsAg"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 128} +{"Format": "IDEA0", "ID": "d0740a88-1cc9-4bd3-b413-7f7cae3baa94", "DetectTime": "2024-05-21T12:42:57.667494+00:00", "EventTime": "2024-05-21T12:42:57.667518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTLXz3FALzqLt27L5"], "accumulated_threat_level": 7.699999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "a6fc3509-d3c9-4cc6-92c2-dc5f362d6df0", "DetectTime": "2024-05-21T12:42:57.706298+00:00", "EventTime": "2024-05-21T12:42:57.706319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.6.169.122 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzuzVA7ewozGJi53"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "000c2eed-4ea1-47d3-ba19-262f4d198a74", "DetectTime": "2024-05-21T12:42:57.957842+00:00", "EventTime": "2024-05-21T12:42:57.957863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFfmoGRMw9z1MzEkf"], "accumulated_threat_level": 8.5, "timewindow": 128} +{"Format": "IDEA0", "ID": "9695ebb9-124e-484f-a423-b7877912b826", "DetectTime": "2024-05-21T12:42:57.992876+00:00", "EventTime": "2024-05-21T12:42:57.992897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.139.191.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbS72f2SLX4aKD5Rx2"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "e7869125-2f56-40d4-8afa-97babd39b512", "DetectTime": "2024-05-21T12:42:58.031740+00:00", "EventTime": "2024-05-21T12:42:58.031760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck36iG2ZweaaZrPYA7"], "accumulated_threat_level": 9.3, "timewindow": 128} +{"Format": "IDEA0", "ID": "bc12047f-c90c-4480-9f66-e35f984dcfc9", "DetectTime": "2024-05-21T12:42:58.077690+00:00", "EventTime": "2024-05-21T12:42:58.077708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXusaU2CFBx1CHHtLi"], "accumulated_threat_level": 10.100000000000001, "timewindow": 128} +{"Format": "IDEA0", "ID": "5b4d35f5-1a20-4735-9296-a7ef9943edfc", "DetectTime": "2024-05-21T12:42:58.122488+00:00", "EventTime": "2024-05-21T12:42:58.122508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5yxk4LvQXHH3Op8k"], "accumulated_threat_level": 10.900000000000002, "timewindow": 128} +{"Format": "IDEA0", "ID": "05a0c05c-9678-4d24-9cb9-25e862306c0a", "DetectTime": "2024-05-21T12:42:58.177699+00:00", "EventTime": "2024-05-21T12:42:58.177718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqPiS2MqMku43V7Pe"], "accumulated_threat_level": 11.700000000000003, "timewindow": 128} +{"Format": "IDEA0", "ID": "64ea879f-6491-478e-917a-425863140872", "DetectTime": "2024-05-21T12:42:58.217564+00:00", "EventTime": "2024-05-21T12:42:58.217583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvRbg4iWmcVC8UJb9"], "accumulated_threat_level": 12.500000000000004, "timewindow": 128} +{"Format": "Json", "ID": "64ea879f-6491-478e-917a-425863140872", "DetectTime": "2024-05-21T12:42:58.217564+00:00", "EventTime": "2024-05-21T12:42:58.217583+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-06T07:13:02.273434+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2024/05/21 12:42:58.461314)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 128, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "87a86828-9c30-4ab3-b49c-ca197e93ff6e", "DetectTime": "2024-05-21T12:42:58.472539+00:00", "EventTime": "2024-05-21T12:42:58.472563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrmQA3mxyiNWmBJ91"], "accumulated_threat_level": 0.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "20e3b1f3-18a3-472e-91e5-549dffa52412", "DetectTime": "2024-05-21T12:42:58.484330+00:00", "EventTime": "2024-05-21T12:42:58.484351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZfX0523kAugYvtaSe"], "accumulated_threat_level": 1.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "f861181e-2b53-4989-a32e-df2c0160a220", "DetectTime": "2024-05-21T12:42:58.540344+00:00", "EventTime": "2024-05-21T12:42:58.540366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdGO4u4nLFxJFHZwRi"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "7a6e62c2-bd91-4f61-a868-80a373cd4819", "DetectTime": "2024-05-21T12:42:58.578851+00:00", "EventTime": "2024-05-21T12:42:58.578871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDroEg1mQEGqa0Q1o"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "7c98c27e-84d5-45f3-ac8f-05274c3e303f", "DetectTime": "2024-05-21T12:42:58.623366+00:00", "EventTime": "2024-05-21T12:42:58.623387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnEjSh3zokx4j0PhI3"], "accumulated_threat_level": 3.2, "timewindow": 128} +{"Format": "IDEA0", "ID": "e2a8f374-ce2c-4613-9d67-4f8e1ae547a7", "DetectTime": "2024-05-21T12:42:58.666734+00:00", "EventTime": "2024-05-21T12:42:58.666755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja1Lf41szEge8iiFa"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "bf14cbf6-ab1b-45b8-b8da-7ecd615ecc46", "DetectTime": "2024-05-21T12:42:58.710010+00:00", "EventTime": "2024-05-21T12:42:58.710041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtNMR1zcZrzhjqiL3"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "7c9c52a1-b342-4713-975e-4dd10309b7a7", "DetectTime": "2024-05-21T12:42:58.739548+00:00", "EventTime": "2024-05-21T12:42:58.739568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTlEym4FaX1qI4HW49", "C3wCgK2cWX15HX2s4l", "CtZKj51t1ZIjIVMsH3", "C87UWp1OFXugouho17"], "accumulated_threat_level": 5.3, "timewindow": 128} +{"Format": "IDEA0", "ID": "0cfc8e94-5844-4aa6-a334-66681bfc442c", "DetectTime": "2024-05-21T12:42:58.758921+00:00", "EventTime": "2024-05-21T12:42:58.758942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvbl4L18QPWG55s093"], "accumulated_threat_level": 6.1, "timewindow": 128} +{"Format": "IDEA0", "ID": "9d5eaff5-5741-42a4-a429-5ef079c25096", "DetectTime": "2024-05-21T12:42:58.804694+00:00", "EventTime": "2024-05-21T12:42:58.804715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqEnA1IZXfUsRgM6d"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 128} +{"Format": "IDEA0", "ID": "f30eb3f8-2951-4bda-a58f-d26d7cf155e2", "DetectTime": "2024-05-21T12:42:58.848937+00:00", "EventTime": "2024-05-21T12:42:58.848957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBT4BuAfdrRNRTpe"], "accumulated_threat_level": 7.699999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "48e6a1bd-3070-4df9-82d1-3e5f05d9496e", "DetectTime": "2024-05-21T12:42:58.897526+00:00", "EventTime": "2024-05-21T12:42:58.897545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrVYy3A20d1V5bcKl"], "accumulated_threat_level": 8.5, "timewindow": 128} +{"Format": "IDEA0", "ID": "63b0f915-204d-42fb-ba1e-26a86399842f", "DetectTime": "2024-05-21T12:42:59.258015+00:00", "EventTime": "2024-05-21T12:42:59.258033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZpTB3ByLG61rhO29"], "accumulated_threat_level": 9.3, "timewindow": 128} +{"Format": "IDEA0", "ID": "db607451-14c4-4773-89ed-a9dd6a31fbb0", "DetectTime": "2024-05-21T12:42:59.279506+00:00", "EventTime": "2024-05-21T12:42:59.279525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YCFi1tLBrYtUnmN5"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "04695c87-1cc8-451e-b786-1f830504877e", "DetectTime": "2024-05-21T12:42:59.325955+00:00", "EventTime": "2024-05-21T12:42:59.325976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmydIS11qQYdZNNZnh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 128} +{"Format": "IDEA0", "ID": "cf1be72f-0d17-4258-8b3d-d55bdefb9ca2", "DetectTime": "2024-05-21T12:42:59.372531+00:00", "EventTime": "2024-05-21T12:42:59.372553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRmL8fxnTmDVBOZg"], "accumulated_threat_level": 10.900000000000002, "timewindow": 128} +{"Format": "IDEA0", "ID": "5bae98ce-d4ee-4117-8d46-0200b1a64121", "DetectTime": "2024-05-21T12:42:59.417234+00:00", "EventTime": "2024-05-21T12:42:59.417254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqxXu30ZPYq6WpTRi"], "accumulated_threat_level": 11.700000000000003, "timewindow": 128} +{"Format": "IDEA0", "ID": "f456b30c-9513-4ac6-b58a-749ff6e93ae7", "DetectTime": "2024-05-21T12:42:59.450869+00:00", "EventTime": "2024-05-21T12:42:59.450892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEhp42I5JrcDuFvUd"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "5339b032-6d84-4ed7-92f8-535fff0c00c1", "DetectTime": "2024-05-21T12:42:59.494940+00:00", "EventTime": "2024-05-21T12:42:59.494960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1rg04CqObfPrS9x8"], "accumulated_threat_level": 12.500000000000004, "timewindow": 128} +{"Format": "Json", "ID": "5339b032-6d84-4ed7-92f8-535fff0c00c1", "DetectTime": "2024-05-21T12:42:59.494940+00:00", "EventTime": "2024-05-21T12:42:59.494960+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "1970-01-06T07:13:06.949451+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2024/05/21 12:42:59.705927)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 128, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "71463977-f5c9-4fae-8d50-30e7285db838", "DetectTime": "2024-05-21T12:42:59.715069+00:00", "EventTime": "2024-05-21T12:42:59.715087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czqk9PrngFfFOWyWh"], "accumulated_threat_level": 0.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "ea615024-5126-43eb-a26e-180ff326b1f5", "DetectTime": "2024-05-21T12:42:59.728948+00:00", "EventTime": "2024-05-21T12:42:59.728970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhfNH20wXk3XRKdCe"], "accumulated_threat_level": 1.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "eae72935-8641-4c4c-9f8e-62c008e119e9", "DetectTime": "2024-05-21T12:42:59.827953+00:00", "EventTime": "2024-05-21T12:42:59.827970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxixjm1Mfzbwwsb5Nl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "8ee342fc-4df7-4081-9023-543d250cb7a5", "DetectTime": "2024-05-21T12:42:59.865297+00:00", "EventTime": "2024-05-21T12:42:59.865318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRh9qY3qnruJyPl1tc"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "0c28778c-c232-4164-85d5-38426bb5c41a", "DetectTime": "2024-05-21T12:42:59.908516+00:00", "EventTime": "2024-05-21T12:42:59.908538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTD5ga2YMIh5YSFiK"], "accumulated_threat_level": 3.2, "timewindow": 128} +{"Format": "IDEA0", "ID": "7598068d-20cd-4d29-b0de-c67d27ddb62d", "DetectTime": "2024-05-21T12:42:59.972670+00:00", "EventTime": "2024-05-21T12:42:59.972689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTIpV3JLxSZiuf2nc"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "1c9c4246-1f08-4024-97be-ae152f726410", "DetectTime": "2024-05-21T12:43:00.014245+00:00", "EventTime": "2024-05-21T12:43:00.014266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ymSq40i1H1Oy94Di"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "7f10d2ef-4edc-4925-8600-b35a1e8edf4f", "DetectTime": "2024-05-21T12:43:00.054211+00:00", "EventTime": "2024-05-21T12:43:00.054233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfNdWQSso1Pu5iq7"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "6b171d76-feed-4a2e-bb2c-e9ebea122a9c", "DetectTime": "2024-05-21T12:43:00.094195+00:00", "EventTime": "2024-05-21T12:43:00.094216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJ1Ar1IvYftFWY0B2"], "accumulated_threat_level": 5.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "76246d88-f644-418f-ac70-9d73358be02f", "DetectTime": "2024-05-21T12:43:00.136775+00:00", "EventTime": "2024-05-21T12:43:00.136795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLPcS3u4cd03L3vgl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 128} +{"Format": "IDEA0", "ID": "24f5d322-080a-4d2a-88e7-cc94c936fd9d", "DetectTime": "2024-05-21T12:43:00.372845+00:00", "EventTime": "2024-05-21T12:43:00.372882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39tlm1ldFx9E4Hsk1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "1c6eeaa7-8e19-40ba-b687-8eaa63767918", "DetectTime": "2024-05-21T12:43:00.423055+00:00", "EventTime": "2024-05-21T12:43:00.423092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMathd4SQdIkCG0yY8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "4fae5ad7-3afb-409c-ab39-8012c1bfca55", "DetectTime": "2024-05-21T12:43:00.444806+00:00", "EventTime": "2024-05-21T12:43:00.444827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb0KE87OrrCiNZrnb"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "7e955284-7cee-4eac-9f11-1f6fb9b64841", "DetectTime": "2024-05-21T12:43:00.499741+00:00", "EventTime": "2024-05-21T12:43:00.499774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBJ094Yng4biUt82e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "bcf5082c-a612-4083-836a-d5f7260a855a", "DetectTime": "2024-05-21T12:43:00.535246+00:00", "EventTime": "2024-05-21T12:43:00.535266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTAom2wZVfbvBgoEk"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "f8eb71ed-b543-4a84-9afd-23132c75526f", "DetectTime": "2024-05-21T12:43:00.581922+00:00", "EventTime": "2024-05-21T12:43:00.581956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYakj3cPlAClLiA2"], "accumulated_threat_level": 9.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "fd830451-83d4-4c3a-9b5c-3d463ae18ada", "DetectTime": "2024-05-21T12:43:00.619911+00:00", "EventTime": "2024-05-21T12:43:00.619935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzHh3m6mgcXkbiKd"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "b058e1fb-5330-4318-9eb5-903feeebf444", "DetectTime": "2024-05-21T12:43:00.629496+00:00", "EventTime": "2024-05-21T12:43:00.629516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.237.226.20 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHnGe4mddGPNKumra"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "a1eae897-3946-4c69-b5fa-4139eea2e8b3", "DetectTime": "2024-05-21T12:43:00.748710+00:00", "EventTime": "2024-05-21T12:43:00.748731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCDFr37V1cdKt1v74"], "accumulated_threat_level": 10.4, "timewindow": 128} +{"Format": "IDEA0", "ID": "128a9d65-6fbb-4f0c-b2dc-4a81455bc1ce", "DetectTime": "2024-05-21T12:43:00.754213+00:00", "EventTime": "2024-05-21T12:43:00.754235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvYF1VI6BKKSwIr"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "016a66eb-d179-491d-9e7c-35c9a06a0a69", "DetectTime": "2024-05-21T12:43:00.759746+00:00", "EventTime": "2024-05-21T12:43:00.759788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.53.147.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpPElr1NoYWl8IOEkf"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "01ae1343-6d68-4199-8012-ad8881ee3b2c", "DetectTime": "2024-05-21T12:43:01.018029+00:00", "EventTime": "2024-05-21T12:43:01.018052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.7.241.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuEA6x234yVd9bu5i7"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "5438ba90-936c-4014-9263-ed62c7fa16de", "DetectTime": "2024-05-21T12:43:01.049321+00:00", "EventTime": "2024-05-21T12:43:01.049343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.143.9.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CevJ6G30W6J2Ad95l7"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "335c1258-e974-44df-ace7-73fe54e9b537", "DetectTime": "2024-05-21T12:43:01.184292+00:00", "EventTime": "2024-05-21T12:43:01.184314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CogiKM3HlgCxnXtQB3"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "0baaf83a-7bbd-4b8b-9477-6eea825744ce", "DetectTime": "2024-05-21T12:43:01.190007+00:00", "EventTime": "2024-05-21T12:43:01.190027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtYumuKRaLjaaum5"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "cd0922fb-804a-4c98-a756-188c734d3db9", "DetectTime": "2024-05-21T12:43:01.195192+00:00", "EventTime": "2024-05-21T12:43:01.195629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccdro72m1WMnqcWxH8"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "6ece271b-bbb2-4239-b125-fbf79bf2f9c9", "DetectTime": "2024-05-21T12:43:01.200694+00:00", "EventTime": "2024-05-21T12:43:01.200713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.157.126.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjUDQ3bsUU5tIjYtk"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "6d738a67-bfff-4d9a-9bae-8b22b83c7643", "DetectTime": "2024-05-21T12:43:01.205513+00:00", "EventTime": "2024-05-21T12:43:01.205534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMfzPj3F1nF1rvzS09"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "3cea68cd-12dc-4569-b324-c6c31331687e", "DetectTime": "2024-05-21T12:43:01.586773+00:00", "EventTime": "2024-05-21T12:43:01.586812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5wIrz2f1kacSqhEtd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 128} +{"Format": "IDEA0", "ID": "ab289918-c81d-4810-a74e-bfe90fbbaf0e", "DetectTime": "2024-05-21T12:43:01.654668+00:00", "EventTime": "2024-05-21T12:43:01.654695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGFmt1xfqhF33Owg1"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "221abe99-1bd6-4430-bb21-e31a35a95012", "DetectTime": "2024-05-21T12:43:01.660637+00:00", "EventTime": "2024-05-21T12:43:01.660656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.88.11.18 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VP763ftoctjcR6p6"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "37770938-afda-4b72-8fd8-a568564428da", "DetectTime": "2024-05-21T12:43:01.732931+00:00", "EventTime": "2024-05-21T12:43:01.732953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1IwW1jRs5J6qZR5"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "7ba7e1c1-7c78-412a-8147-d6ee764cd5ed", "DetectTime": "2024-05-21T12:43:01.745895+00:00", "EventTime": "2024-05-21T12:43:01.745914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHDzzX3mDLSUEYrJrf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 128} +{"Format": "Json", "ID": "7ba7e1c1-7c78-412a-8147-d6ee764cd5ed", "DetectTime": "2024-05-21T12:43:01.745895+00:00", "EventTime": "2024-05-21T12:43:01.745914+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "1970-01-06T07:13:30.640395+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2024/05/21 12:43:02.126705)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 128, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2085fcde-b4cb-41f8-a882-ed4b27228119", "DetectTime": "2024-05-21T12:43:02.131197+00:00", "EventTime": "2024-05-21T12:43:02.131216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.130.73.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSMvQk2zIcpZNnP7A3"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "b8894222-40ca-4c4b-9490-3a70a69028a7", "DetectTime": "2024-05-21T12:43:02.135883+00:00", "EventTime": "2024-05-21T12:43:02.135906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.172.62.31 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBStCOYMh3oEi29c"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "dce00024-cc8b-49ac-81b7-9b265bcc3c0e", "DetectTime": "2024-05-21T12:43:02.141992+00:00", "EventTime": "2024-05-21T12:43:02.142013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.24.108.105 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHlZP3n0X1ahSzZa"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "48a5be1a-3509-4671-846f-717d39b8c776", "DetectTime": "2024-05-21T12:43:02.146539+00:00", "EventTime": "2024-05-21T12:43:02.146558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8h28DM0ZIr1D5Rh4"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "b55c7b3e-1288-41c6-a63b-1160e919d1c3", "DetectTime": "2024-05-21T12:43:02.158040+00:00", "EventTime": "2024-05-21T12:43:02.158058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUNQE3UpX6FDs0isb"], "accumulated_threat_level": 0.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "76f39a6c-2615-4091-8597-e42c88e4558f", "DetectTime": "2024-05-21T12:43:02.162767+00:00", "EventTime": "2024-05-21T12:43:02.162786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.60.76.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSK3P28o6B7GzNhv7"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "192cc917-d235-43fb-92ad-7a4cc19503ae", "DetectTime": "2024-05-21T12:43:02.276071+00:00", "EventTime": "2024-05-21T12:43:02.276092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpdkT3hX0NwC0Ivwc"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "c1f8e5ea-68c4-40bc-bc0f-764680cacf09", "DetectTime": "2024-05-21T12:43:02.330259+00:00", "EventTime": "2024-05-21T12:43:02.330276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQodt4tsvm6dNKA9"], "accumulated_threat_level": 1.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "954fbe26-cfb9-4351-9f29-a08e06248595", "DetectTime": "2024-05-21T12:43:02.356721+00:00", "EventTime": "2024-05-21T12:43:02.356744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.130.112.172 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIjlE1lzZ4GtX30e6"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "ff9b11de-6c4d-435b-9060-c0a7e4f4ac7b", "DetectTime": "2024-05-21T12:43:02.588123+00:00", "EventTime": "2024-05-21T12:43:02.588143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 124.120.24.167 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7Fe64KELat72NiTa"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "1fc09b9a-3e4d-4fb5-b9c6-44d5af7564e6", "DetectTime": "2024-05-21T12:43:02.619255+00:00", "EventTime": "2024-05-21T12:43:02.619278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.173.221.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiP2lI1FoglMDs1x2"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "de4f0a8f-4878-4a13-af77-b320cb62d0ac", "DetectTime": "2024-05-21T12:43:02.682281+00:00", "EventTime": "2024-05-21T12:43:02.682298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.37.144.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9WON1iHCri0Cv9Ic"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "62a9966e-c075-41f8-8217-cfa4a04a3bf7", "DetectTime": "2024-05-21T12:43:02.688026+00:00", "EventTime": "2024-05-21T12:43:02.688046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.128.195.71 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHIJD1qC57MWiuX88"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "fde78581-76f4-4acd-99c4-83d326eb8a2c", "DetectTime": "2024-05-21T12:43:02.692774+00:00", "EventTime": "2024-05-21T12:43:02.692793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.13.194.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkScCR292Ia6CKxCk3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "6ce4de5c-bf62-4b26-80e7-63642bfa928b", "DetectTime": "2024-05-21T12:43:02.698001+00:00", "EventTime": "2024-05-21T12:43:02.698022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.14.30.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CraUbuATIEA32qb5"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "0181d14f-f4ad-44b1-ad3b-96b1340fa63e", "DetectTime": "2024-05-21T12:43:02.704988+00:00", "EventTime": "2024-05-21T12:43:02.705007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.15.14.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxqTtT3t1Ap7G3tNve"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "92536863-6a26-432a-860d-6bba17135c7a", "DetectTime": "2024-05-21T12:43:02.733128+00:00", "EventTime": "2024-05-21T12:43:02.733150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.214.58.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9ezx4RJVF2JfXrqg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1c256eb9-cde4-4cf8-b6ab-8d2fd56dd38b", "DetectTime": "2024-05-21T12:43:02.811472+00:00", "EventTime": "2024-05-21T12:43:02.811493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.133.62.246 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPskT2HdwKw23u2hk"], "accumulated_threat_level": 10.4, "timewindow": 126} +{"Format": "IDEA0", "ID": "a9fec59c-9d74-437f-bd6c-8940e30b8a21", "DetectTime": "2024-05-21T12:43:03.220673+00:00", "EventTime": "2024-05-21T12:43:03.220696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 101.161.50.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkhOdI2BR8d2sXSaU7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "c79282e5-8c0a-41f1-8317-bfa90146d25a", "DetectTime": "2024-05-21T12:43:03.226562+00:00", "EventTime": "2024-05-21T12:43:03.226583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CweEGqvRmLQWW1qxi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "5c8f9621-67ce-46a3-a08e-13ae21acf27e", "DetectTime": "2024-05-21T12:43:03.231298+00:00", "EventTime": "2024-05-21T12:43:03.231318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.74.142.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVif17p7bvI7k28b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "6e69f807-c641-4054-83f6-8a092825e86c", "DetectTime": "2024-05-21T12:43:03.235870+00:00", "EventTime": "2024-05-21T12:43:03.235889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMLxO3cabhvVCsKt"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "d807e54b-d25c-480f-b6b3-25cbaf2c51eb", "DetectTime": "2024-05-21T12:43:03.241258+00:00", "EventTime": "2024-05-21T12:43:03.241280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.242.20.25 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Xza5940TYUCn476"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b586debf-172d-4c83-8688-f60d6c64cb2b", "DetectTime": "2024-05-21T12:43:03.699243+00:00", "EventTime": "2024-05-21T12:43:03.699265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 151.226.159.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgCKT37tcymMfalvd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ade3100f-7b39-494e-9540-0753675bc46c", "DetectTime": "2024-05-21T12:43:03.704370+00:00", "EventTime": "2024-05-21T12:43:03.704388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.231.42.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDGtibq8bU84ILSt5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "71992b73-45c0-434e-9e51-6d88554b1942", "DetectTime": "2024-05-21T12:43:03.723677+00:00", "EventTime": "2024-05-21T12:43:03.723699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdUNGAUJrd8oVDXa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b71d4766-da48-4e43-9032-43f157d876bd", "DetectTime": "2024-05-21T12:43:03.729755+00:00", "EventTime": "2024-05-21T12:43:03.729777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.20.156.222 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGlJoz1CTKHZsrWkpi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b35d3f5a-3ca4-496e-9f9b-6900c2f314ca", "DetectTime": "2024-05-21T12:43:03.734714+00:00", "EventTime": "2024-05-21T12:43:03.734732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpfmC93eZHbPc8GPOf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "72d3bbf2-f655-491d-8bf1-7c53acf19c5d", "DetectTime": "2024-05-21T12:43:03.739588+00:00", "EventTime": "2024-05-21T12:43:03.739607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.249.225.199 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3br8rRcR58mVg4qk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "a7f4b840-4481-4043-9a15-30025b58b057", "DetectTime": "2024-05-21T12:43:03.745795+00:00", "EventTime": "2024-05-21T12:43:03.745816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 162.198.54.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGWU71Hiw4KeEGPjd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "27fa3154-1d47-4a3e-9276-bc631984b94e", "DetectTime": "2024-05-21T12:43:03.750297+00:00", "EventTime": "2024-05-21T12:43:03.750315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 204.120.192.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfXZGEhppK5kiOSxc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b5661d33-f9cb-4e18-ad69-6a3fa52c8cc9", "DetectTime": "2024-05-21T12:43:03.928659+00:00", "EventTime": "2024-05-21T12:43:03.928678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.224.71.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxJvJENN40rUD4L55"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "29651d1d-8ff1-44a4-aada-abcbf84f0a09", "DetectTime": "2024-05-21T12:43:04.083526+00:00", "EventTime": "2024-05-21T12:43:04.083548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiT2NQ1wJpmtvUu5Be"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "2c8cb94b-2f72-4b4c-801a-abe6d835b616", "DetectTime": "2024-05-21T12:43:04.095543+00:00", "EventTime": "2024-05-21T12:43:04.095562+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiT2NQ1wJpmtvUu5Be"], "accumulated_threat_level": 5.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "53b0e6c1-ae1a-4d00-89d0-bdcb947a918a", "DetectTime": "2024-05-21T12:43:04.147233+00:00", "EventTime": "2024-05-21T12:43:04.147259+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpkmcJ1bo8uLsTpfg5"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "891d38ac-5090-4505-8cce-4acee58d26e6", "DetectTime": "2024-05-21T12:43:04.159963+00:00", "EventTime": "2024-05-21T12:43:04.159984+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpkmcJ1bo8uLsTpfg5"], "accumulated_threat_level": 6.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "e4405715-31b4-46b8-b93f-089cae8ae8a6", "DetectTime": "2024-05-21T12:43:04.184731+00:00", "EventTime": "2024-05-21T12:43:04.184749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUNfm2IRx4BB7osf9"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "e2bef56e-02bc-46a2-9dce-20e3947bea7c", "DetectTime": "2024-05-21T12:43:04.196686+00:00", "EventTime": "2024-05-21T12:43:04.196709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUNfm2IRx4BB7osf9"], "accumulated_threat_level": 6.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "2e2d2825-2be6-41c8-830b-6c948e4b9cb6", "DetectTime": "2024-05-21T12:43:04.221440+00:00", "EventTime": "2024-05-21T12:43:04.221461+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.232.5.137"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Boil46Fr04erCw5j"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "b7294122-0f2e-4106-b820-e26445aba25f", "DetectTime": "2024-05-21T12:43:04.235875+00:00", "EventTime": "2024-05-21T12:43:04.235904+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Boil46Fr04erCw5j"], "accumulated_threat_level": 7.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "d570962c-3399-4f3d-9db5-d0c9a82ee23f", "DetectTime": "2024-05-21T12:43:04.241475+00:00", "EventTime": "2024-05-21T12:43:04.241500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.166.169.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbhVdgJNfdk3Jr5Ca"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e7f0ab98-ee10-4297-85ff-af185f8aa8ee", "DetectTime": "2024-05-21T12:43:04.249760+00:00", "EventTime": "2024-05-21T12:43:04.249779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.254.242.62 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COztNa3eJ2GewpfUK9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "4561bf31-c6f6-4021-93f9-e64bb8d198f1", "DetectTime": "2024-05-21T12:43:04.282755+00:00", "EventTime": "2024-05-21T12:43:04.282778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyRyvLV8IaNiFdT"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "7e79b0c7-423a-4c27-8104-72c112573d2d", "DetectTime": "2024-05-21T12:43:04.295281+00:00", "EventTime": "2024-05-21T12:43:04.295321+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyRyvLV8IaNiFdT"], "accumulated_threat_level": 7.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "45be8e64-6422-4d3f-b861-e59bd951b1d4", "DetectTime": "2024-05-21T12:43:04.319575+00:00", "EventTime": "2024-05-21T12:43:04.319597+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.176.133.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbpi2u3dRE5DQzYTya"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "02ae4de0-e153-485f-a411-ef8c9a0d7c17", "DetectTime": "2024-05-21T12:43:04.333472+00:00", "EventTime": "2024-05-21T12:43:04.333507+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.176.133.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbpi2u3dRE5DQzYTya"], "accumulated_threat_level": 8.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "92b0e694-578e-4a3b-b089-f62182ddbdc3", "DetectTime": "2024-05-21T12:43:04.346093+00:00", "EventTime": "2024-05-21T12:43:04.346114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.235.93.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRYL74bDS55fP6mHb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "91cd23ac-cd93-4846-a0b3-b5ec34a98dcf", "DetectTime": "2024-05-21T12:43:04.462260+00:00", "EventTime": "2024-05-21T12:43:04.462299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvPlYu466krQAkaFr8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "d473a4ab-56d7-4c1b-b385-98f693cae5f0", "DetectTime": "2024-05-21T12:43:04.468120+00:00", "EventTime": "2024-05-21T12:43:04.468140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.174.252.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbWRil1tiNNqqcyTPd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "f1ca0b16-c7cf-444f-8a97-4b959de375d2", "DetectTime": "2024-05-21T12:43:04.516791+00:00", "EventTime": "2024-05-21T12:43:04.516812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.228.163.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8RQ3a2UF7TqqR0VO1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "75c4b1fa-924d-4ab6-886b-fd5ec40dc6aa", "DetectTime": "2024-05-21T12:43:04.609444+00:00", "EventTime": "2024-05-21T12:43:04.609470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.27.195.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHrqk71gDt1DmQByql"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "cd057432-2938-4798-9a0b-343772386dd5", "DetectTime": "2024-05-21T12:43:04.619048+00:00", "EventTime": "2024-05-21T12:43:04.619068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 67.217.130.83 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaeOemMsdpuiHtMJf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "41eaf8af-80c2-4a3e-94e6-e09636fdb32a", "DetectTime": "2024-05-21T12:43:04.624937+00:00", "EventTime": "2024-05-21T12:43:04.624962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.188.248.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9lR8e3Js3YTrpLpbh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e4f396fe-0351-4e54-bbc2-6785470bba9a", "DetectTime": "2024-05-21T12:43:04.661043+00:00", "EventTime": "2024-05-21T12:43:04.661069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 27.54.51.115 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrR90E2UuGCToyKa6d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "32c86a4a-0ea4-4e74-a766-ac252f4fdfde", "DetectTime": "2024-05-21T12:43:04.666469+00:00", "EventTime": "2024-05-21T12:43:04.666489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.249.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCLKpYW2rOYJNQVk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "c0f99f72-99f7-4367-9738-12705345577a", "DetectTime": "2024-05-21T12:43:04.672628+00:00", "EventTime": "2024-05-21T12:43:04.672654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.227.12.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtFke16cPu2c7FP37"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "dd94c2e3-db1c-49c0-96e1-56fd0881acee", "DetectTime": "2024-05-21T12:43:04.677959+00:00", "EventTime": "2024-05-21T12:43:04.677979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.136.130.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHRqv2hBtKY0khif2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "13649610-be48-4d8f-a3d0-4047426aa48a", "DetectTime": "2024-05-21T12:43:04.682605+00:00", "EventTime": "2024-05-21T12:43:04.682625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.66.184.240 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGmuCDnsvvFzOc8Qd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ae454693-6c43-4cb6-9f16-9e7ac0e41fb3", "DetectTime": "2024-05-21T12:43:04.687258+00:00", "EventTime": "2024-05-21T12:43:04.687277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.98.145.136 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFfycl4xmCxI3sKqEk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "2c6fd44f-580f-446e-9d9a-be9f1febad05", "DetectTime": "2024-05-21T12:43:04.711744+00:00", "EventTime": "2024-05-21T12:43:04.711780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.76.242.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWDyw1EK1Xyu42d6b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "443b4d4c-39f7-4c03-8c89-616480dc8fed", "DetectTime": "2024-05-21T12:43:04.717786+00:00", "EventTime": "2024-05-21T12:43:04.717806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.137.209.94 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3cplWQkqhKpA4na"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1b134252-1209-4df5-9b12-b852e5fc1f6f", "DetectTime": "2024-05-21T12:43:04.937259+00:00", "EventTime": "2024-05-21T12:43:04.937281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.96.72.60 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9rD83PpWY3TK9As5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ee1c7156-682f-47e9-95a0-9f28a3e65080", "DetectTime": "2024-05-21T12:43:04.944793+00:00", "EventTime": "2024-05-21T12:43:04.944812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.166.164.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYa2qB3y1vUywH51Pj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "fa5c85ff-8ecc-4eda-b831-f10739b1adba", "DetectTime": "2024-05-21T12:43:04.968162+00:00", "EventTime": "2024-05-21T12:43:04.968183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.225.238.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmwbyn14ZmOqQ4MOo5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "acce60d9-2fe5-4471-949e-3d5dfade0d91", "DetectTime": "2024-05-21T12:43:04.990649+00:00", "EventTime": "2024-05-21T12:43:04.990673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 213.98.108.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviAtp1bHacll8QvFj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "96d29bed-9335-4215-b64f-ed8f97edcb34", "DetectTime": "2024-05-21T12:43:04.995945+00:00", "EventTime": "2024-05-21T12:43:04.995965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.29.210.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwnZT2HqdVrMRL8e6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "bc32c16f-9b25-4b00-b25b-6ac093e8f9b3", "DetectTime": "2024-05-21T12:43:05.000654+00:00", "EventTime": "2024-05-21T12:43:05.000672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 195.208.48.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfz6Id4prqdLm0p3f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "8ab71a55-f361-4a6e-9e0a-6195f5b333cb", "DetectTime": "2024-05-21T12:43:05.038061+00:00", "EventTime": "2024-05-21T12:43:05.038084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.4.124.235 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDjl32BdGx0DOEKYe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3c8f2b93-e928-4ad3-9606-972d1aad2b82", "DetectTime": "2024-05-21T12:43:05.090044+00:00", "EventTime": "2024-05-21T12:43:05.090067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.164.33.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIvJL3HNIF6pzdUha"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "4f98cba2-1bc4-4157-b9d6-0f98158ce912", "DetectTime": "2024-05-21T12:43:05.470286+00:00", "EventTime": "2024-05-21T12:43:05.470308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8j9xO39rjzqU2pAFe", "CPLSpxw2WescHljZ8", "Cxd18G1JRYdWxx55o6", "ChYD8K3VBKjMHSVQHh"], "accumulated_threat_level": 0.5, "timewindow": 129} +{"Format": "IDEA0", "ID": "62c00d8f-811c-4d17-8eb8-dd9c242881dc", "DetectTime": "2024-05-21T12:43:06.040887+00:00", "EventTime": "2024-05-21T12:43:06.040909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.57.179.61 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRTA4cqzJzhTXr4b5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1e153d72-1bf5-46be-ab89-5b6ab00af7b8", "DetectTime": "2024-05-21T12:43:06.075388+00:00", "EventTime": "2024-05-21T12:43:06.075426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.103.206.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrpqNl1qYrEgRkZQwl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "23f3562a-e86b-43ae-be10-5d7cfdd2394e", "DetectTime": "2024-05-21T12:43:06.091295+00:00", "EventTime": "2024-05-21T12:43:06.091319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hYc11UcSgk4QLNUi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "a4ea9226-2eb2-42fb-ae0b-bcbf9d811da2", "DetectTime": "2024-05-21T12:43:06.096770+00:00", "EventTime": "2024-05-21T12:43:06.096789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.74.14.220 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVyy5n1GBqu5dJVKTf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3d442fa7-fd6f-4cb2-8575-94ae69060990", "DetectTime": "2024-05-21T12:43:06.310308+00:00", "EventTime": "2024-05-21T12:43:06.310329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAupzQ2gHvp87tcKHc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "df0e7d01-638c-4260-8d24-b5a157c375c1", "DetectTime": "2024-05-21T12:43:06.400087+00:00", "EventTime": "2024-05-21T12:43:06.400109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.20.182.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwRgL2t7zQcdW2iKc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "7336d3fb-4907-4d13-80be-12e38c791cd3", "DetectTime": "2024-05-21T12:43:06.638933+00:00", "EventTime": "2024-05-21T12:43:06.638955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJjJZSgPHShYS0O7i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3bab67d8-276e-4724-b666-031b59a4ec18", "DetectTime": "2024-05-21T12:43:06.662254+00:00", "EventTime": "2024-05-21T12:43:06.662273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQyWDiIcDjNGjc66"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "633546d9-de02-49ba-aed7-42879629187b", "DetectTime": "2024-05-21T12:43:06.675646+00:00", "EventTime": "2024-05-21T12:43:06.675665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.178.43.207 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoMNM2StfMdsS3bQe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "34b549a2-a61f-4976-8a19-96196ca68477", "DetectTime": "2024-05-21T12:43:06.744767+00:00", "EventTime": "2024-05-21T12:43:06.744790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vdF6zi5pAog7IX3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e5333173-528b-4267-a4ea-670a4363ee2f", "DetectTime": "2024-05-21T12:43:06.750281+00:00", "EventTime": "2024-05-21T12:43:06.750300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.100.74.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDKJrZ1X9kzkMTxZQk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "7f286ef2-d230-4623-8fc7-1eab9aaa8e86", "DetectTime": "2024-05-21T12:43:06.755090+00:00", "EventTime": "2024-05-21T12:43:06.755108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.91.153.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmDdi2EFsuxhwfap9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "05923d89-4e96-492b-8f58-224b7a35d11a", "DetectTime": "2024-05-21T12:43:06.763046+00:00", "EventTime": "2024-05-21T12:43:06.763070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.46.165.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKG7gg2ZD10LromsPb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "6e8da2cf-908d-4af2-af62-fb9277e4ced7", "DetectTime": "2024-05-21T12:43:06.768849+00:00", "EventTime": "2024-05-21T12:43:06.768871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.114.245.252 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXoiz1xahZVSkupdf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "4760c5f6-a5ff-4272-9448-3c55ffb57eda", "DetectTime": "2024-05-21T12:43:06.774594+00:00", "EventTime": "2024-05-21T12:43:06.774615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.91.101.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xnHq1QpxkQvQpHT1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "64ee0052-190b-4d81-ba25-c9359a3e677f", "DetectTime": "2024-05-21T12:43:06.816345+00:00", "EventTime": "2024-05-21T12:43:06.816368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.70.113 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuB6b71L8GJpcVc072"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3354b9c4-8d32-4f18-8d13-4d8446aa5a26", "DetectTime": "2024-05-21T12:43:06.849004+00:00", "EventTime": "2024-05-21T12:43:06.849023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 80.179.199.81 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0rcELq3MjjFIIBk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ab9f729a-65c4-4b4e-b494-7404bb70b64b", "DetectTime": "2024-05-21T12:43:06.903612+00:00", "EventTime": "2024-05-21T12:43:06.903643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 218.111.217.219 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDchtN1mnPoTDzRJii"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "bdcb9045-29e7-4b37-9919-26de61e6bd59", "DetectTime": "2024-05-21T12:43:06.932543+00:00", "EventTime": "2024-05-21T12:43:06.932562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.92.34.65 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkm1e229LQ0dAT5F6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "040fc105-130d-4a43-a725-51ba1f7d25c8", "DetectTime": "2024-05-21T12:43:06.965577+00:00", "EventTime": "2024-05-21T12:43:06.965604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.100.192.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbJCT2vXedko7Nx9k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ceb041fa-9cd3-41ac-aa03-3031daba9b98", "DetectTime": "2024-05-21T12:43:06.985078+00:00", "EventTime": "2024-05-21T12:43:06.985101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.114.0.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJ7s54DJuQxTCJ3hl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "9dbae41d-1242-462e-bc7d-9d1ee9eb4a47", "DetectTime": "2024-05-21T12:43:07.022448+00:00", "EventTime": "2024-05-21T12:43:07.022470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.230.228.174 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZwlr4KYHPlKrSjs1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "8ce41938-d671-4a28-9277-6f4be60278c3", "DetectTime": "2024-05-21T12:43:07.027278+00:00", "EventTime": "2024-05-21T12:43:07.027298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.44.21.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90QUK2xDORUgC8fhh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "6c37d2ce-7475-4746-952e-b83a83b14165", "DetectTime": "2024-05-21T12:43:07.031928+00:00", "EventTime": "2024-05-21T12:43:07.031946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.238.172.134 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUpLG74usJLpPathY4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "4072ff07-26ff-444d-8c12-a3ee1b7b88df", "DetectTime": "2024-05-21T12:43:07.039199+00:00", "EventTime": "2024-05-21T12:43:07.039219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 65.46.208.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4PLFpw8rZ62hXYk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "26c6f621-c1a4-4544-9b42-4bbbee1a79eb", "DetectTime": "2024-05-21T12:43:07.043932+00:00", "EventTime": "2024-05-21T12:43:07.043951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.165.149.239 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz3C8J3nYpAskzV7Pe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e71b0416-66f7-4bb0-a447-8693f9d91af2", "DetectTime": "2024-05-21T12:43:07.050641+00:00", "EventTime": "2024-05-21T12:43:07.050661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.107.16.215 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFo4fr1Z2GNz1YMl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "f2316a5c-c5d9-4217-9d8e-7d5c2df5d937", "DetectTime": "2024-05-21T12:43:07.055700+00:00", "EventTime": "2024-05-21T12:43:07.055720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.143.95.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2rg93xACuq7c0LPc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "46bb6481-e418-43c5-85a5-3cea1f7f5b8c", "DetectTime": "2024-05-21T12:43:07.060398+00:00", "EventTime": "2024-05-21T12:43:07.060416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.90.163.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc6fCu3HpsWJZ9KGBi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "cfd74e3d-c39b-47b4-913a-0fd3227d8c4f", "DetectTime": "2024-05-21T12:43:07.064758+00:00", "EventTime": "2024-05-21T12:43:07.064776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.64.166.201 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjwbp3ObwopIVyFnh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e0c7c87c-a1b3-465c-ba25-bd180678e3b6", "DetectTime": "2024-05-21T12:43:07.069767+00:00", "EventTime": "2024-05-21T12:43:07.069787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 212.131.201.146 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CimGF03oq7pIm71wse"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "721db47c-88b9-498c-a06f-cac2da4c0bb2", "DetectTime": "2024-05-21T12:43:07.074441+00:00", "EventTime": "2024-05-21T12:43:07.074462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 94.200.62.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJNLXX3eXZEHi5AVIj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "96037b7a-01ae-4e3e-92c3-6fab3a42fae4", "DetectTime": "2024-05-21T12:43:07.079255+00:00", "EventTime": "2024-05-21T12:43:07.079274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.111.232.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4Xpy1BCX80wdoVKh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "27fc50a2-1543-49a0-9047-982f430fa29d", "DetectTime": "2024-05-21T12:43:07.083663+00:00", "EventTime": "2024-05-21T12:43:07.083682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.76.117.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPlZ8qwrPWsve8pX3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ac705f4f-cb40-4d8f-bd2d-004d495939ed", "DetectTime": "2024-05-21T12:43:07.321260+00:00", "EventTime": "2024-05-21T12:43:07.321281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.12.235.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cZue9WV6dnWKaqa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "4c50bd2a-1799-4cfd-ac5f-c2e70ee446de", "DetectTime": "2024-05-21T12:43:07.326502+00:00", "EventTime": "2024-05-21T12:43:07.326523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61XBN1yWXp4QOYbZa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "9af363f4-cb8c-416e-bf99-ea65ef631730", "DetectTime": "2024-05-21T12:43:07.380443+00:00", "EventTime": "2024-05-21T12:43:07.380468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.172.120.192 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3DJTAhpZz8XRE748"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "9fdc793d-20bc-4230-bdf2-b85d6b0b33cc", "DetectTime": "2024-05-21T12:43:07.397879+00:00", "EventTime": "2024-05-21T12:43:07.397899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.163.69.33 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCCIn11qj4SOoFhVb9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b83f228c-a14f-4f5f-81c2-b963d8d69ea9", "DetectTime": "2024-05-21T12:43:07.417011+00:00", "EventTime": "2024-05-21T12:43:07.417035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.187.127.225 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLAj19Sn9lUkHnx3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "2330746c-dad0-46f2-9eed-5e17a6af54ac", "DetectTime": "2024-05-21T12:43:07.460005+00:00", "EventTime": "2024-05-21T12:43:07.460028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7N8Lo1zHkZedihWla"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "6aa88c26-769c-4a40-8e9a-c7d5c414edcc", "DetectTime": "2024-05-21T12:43:07.497110+00:00", "EventTime": "2024-05-21T12:43:07.497137+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAqWdm138jKU5ssQq2"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "e0b10bb5-a5c6-4a70-b2a2-365c64d0ee2d", "DetectTime": "2024-05-21T12:43:07.512810+00:00", "EventTime": "2024-05-21T12:43:07.512839+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAqWdm138jKU5ssQq2"], "accumulated_threat_level": 8.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "eee52a87-c97d-4e2b-b606-fff16b21fff2", "DetectTime": "2024-05-21T12:43:07.773405+00:00", "EventTime": "2024-05-21T12:43:07.773425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Six94Sbgpa10HoXk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "eb5dcb28-d53d-4fa1-bab2-493721b9ae8a", "DetectTime": "2024-05-21T12:43:07.936515+00:00", "EventTime": "2024-05-21T12:43:07.936537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.32.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zjwi3kEPanNKW0rj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1cef24e3-9966-4279-89aa-93bc770564c0", "DetectTime": "2024-05-21T12:43:08.000930+00:00", "EventTime": "2024-05-21T12:43:08.000952+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClaKJA3ypVipx0zTyg"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "1ae7a843-b294-4707-9ad4-682c5b2123a6", "DetectTime": "2024-05-21T12:43:08.016020+00:00", "EventTime": "2024-05-21T12:43:08.016050+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClaKJA3ypVipx0zTyg"], "accumulated_threat_level": 9.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "91a80d71-f111-4d57-bd7c-c957082a09c8", "DetectTime": "2024-05-21T12:43:08.026994+00:00", "EventTime": "2024-05-21T12:43:08.027015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3V4O936lANokP6Nd5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3df81ab7-ff78-4019-b2a7-ffd1e1ce0585", "DetectTime": "2024-05-21T12:43:08.046147+00:00", "EventTime": "2024-05-21T12:43:08.046170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.189.48.189 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoV44w2Py96npqj9ze"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e82ab623-763a-40ef-9b34-dcc743e88342", "DetectTime": "2024-05-21T12:43:08.416775+00:00", "EventTime": "2024-05-21T12:43:08.416800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0bgK71RtqlnINif09"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "cfb7b737-b990-48c1-b507-054681ef0e15", "DetectTime": "2024-05-21T12:43:08.430358+00:00", "EventTime": "2024-05-21T12:43:08.430383+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0bgK71RtqlnINif09"], "accumulated_threat_level": 9.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "0376761a-9d8c-4df9-ac2d-1d52a397ddbf", "DetectTime": "2024-05-21T12:43:08.452664+00:00", "EventTime": "2024-05-21T12:43:08.452686+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOkk24hHwgbqi6fxd"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "0771a00b-205f-4a85-9e67-c60702beecd9", "DetectTime": "2024-05-21T12:43:08.466673+00:00", "EventTime": "2024-05-21T12:43:08.466701+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPOkk24hHwgbqi6fxd"], "accumulated_threat_level": 10.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "806a9df1-9c5b-429c-b052-0df62f58869e", "DetectTime": "2024-05-21T12:43:09.478521+00:00", "EventTime": "2024-05-21T12:43:09.478540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 63.172.252.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccs7lE13PUNdET6lhj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "cb284a43-c872-4578-b030-38a4d7cbe7bf", "DetectTime": "2024-05-21T12:43:09.485059+00:00", "EventTime": "2024-05-21T12:43:09.485079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.160.131.3 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxb4Xb4EwGswog7Bba"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ca540912-6f46-47bf-9232-18342864e479", "DetectTime": "2024-05-21T12:43:09.491974+00:00", "EventTime": "2024-05-21T12:43:09.491998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 121.1.53.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnXliq3iQeFVEwuStl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "5d4c1c4c-3db3-40d9-8e45-7e374b5daa09", "DetectTime": "2024-05-21T12:43:09.916291+00:00", "EventTime": "2024-05-21T12:43:09.916314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.185.247.82 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6SZiq19k8uk9WvTX8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b5acc3d4-1397-4823-ba54-d261c4eb45a1", "DetectTime": "2024-05-21T12:43:09.964711+00:00", "EventTime": "2024-05-21T12:43:09.964733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD1EDl2zb73AD49bJ7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "5dfd66cc-c9c0-4b84-b16c-aee7f5e12b64", "DetectTime": "2024-05-21T12:43:10.002522+00:00", "EventTime": "2024-05-21T12:43:10.002543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfgF8k4hrPnnTwENN"], "accumulated_threat_level": 3.2, "timewindow": 128} +{"Format": "IDEA0", "ID": "7c4cf8dc-5c7c-4d89-85d6-5e5260bf94a4", "DetectTime": "2024-05-21T12:43:10.042313+00:00", "EventTime": "2024-05-21T12:43:10.042336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 178.91.41.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMv444pl6CPLvOcq7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b9017fba-4ce6-41f5-93e2-4b1f72c7ceb8", "DetectTime": "2024-05-21T12:43:10.057051+00:00", "EventTime": "2024-05-21T12:43:10.057072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8vZrC2sVDZeINoWI4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "357fd6f9-b0fc-4214-869a-056a1c8b62c9", "DetectTime": "2024-05-21T12:43:10.061903+00:00", "EventTime": "2024-05-21T12:43:10.061922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 193.248.160.37 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZRmW1toZYwpqsQ4j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "d8109104-b591-4563-9720-414a5276b83c", "DetectTime": "2024-05-21T12:43:10.066958+00:00", "EventTime": "2024-05-21T12:43:10.066978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.120.58 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuaylrW5YlpMoK28j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "a5369c0d-6b2c-456a-9a22-7baa5e770623", "DetectTime": "2024-05-21T12:43:10.071840+00:00", "EventTime": "2024-05-21T12:43:10.071860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.3.80.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CotGS79eprbCdDsj7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "0f44411a-1624-42ce-89f2-cb0a5a5174f8", "DetectTime": "2024-05-21T12:43:10.076653+00:00", "EventTime": "2024-05-21T12:43:10.076672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.98.103.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3kqjx2AX81aYSI3W4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "af3423b9-3de7-44db-aa7e-39829a18038b", "DetectTime": "2024-05-21T12:43:10.081708+00:00", "EventTime": "2024-05-21T12:43:10.081727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 201.184.233.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZ40Y1CUz9CanhAF2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "27d5288b-4a73-4e93-8556-3e09e47621ab", "DetectTime": "2024-05-21T12:43:10.089254+00:00", "EventTime": "2024-05-21T12:43:10.089275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.183.208.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hp8I23mFSbuH1XQd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "0d663abe-e7ba-4413-8858-15da1ffdfcde", "DetectTime": "2024-05-21T12:43:10.094346+00:00", "EventTime": "2024-05-21T12:43:10.094365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Bl9QQ3Gs0lhiqsi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3b2bf53e-7a48-4f39-a25d-ce9bc28ae0c2", "DetectTime": "2024-05-21T12:43:10.098968+00:00", "EventTime": "2024-05-21T12:43:10.098986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.22.206.204 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYivg3sNg9pR8iq5b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "59313bb8-c52a-4c7f-b0ad-442450e43e17", "DetectTime": "2024-05-21T12:43:10.103561+00:00", "EventTime": "2024-05-21T12:43:10.103579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLs2Gk445HqmSohYA1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1c517d23-ceb9-45fd-9eec-48c6697082d1", "DetectTime": "2024-05-21T12:43:10.108360+00:00", "EventTime": "2024-05-21T12:43:10.108378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBc1my3AijH2MbyKNh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "b2b11949-2804-4713-9356-8917f055fe9e", "DetectTime": "2024-05-21T12:43:10.132499+00:00", "EventTime": "2024-05-21T12:43:10.132522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsrqPs2yPnF3DdOBx2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "e272aa46-e44f-462b-be4c-83719ad5a9e5", "DetectTime": "2024-05-21T12:43:10.179784+00:00", "EventTime": "2024-05-21T12:43:10.179805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjhu2ci6xGLjJzSfk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "95e48e0e-c4db-4ae3-b73c-a337c792cc42", "DetectTime": "2024-05-21T12:43:10.288784+00:00", "EventTime": "2024-05-21T12:43:10.288805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4G0538QdETEmTvWd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "8e3954bd-64ab-461c-b3bc-5e62ff811239", "DetectTime": "2024-05-21T12:43:10.697918+00:00", "EventTime": "2024-05-21T12:43:10.697940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNK7F4GWhsu0ZBxTk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "ebd05ae3-ab51-44c9-8e57-ed1b352aff1d", "DetectTime": "2024-05-21T12:43:11.106506+00:00", "EventTime": "2024-05-21T12:43:11.106530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvANzC4V6XvkDnFWdb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "a2a253e1-fa2d-436e-9542-d5f056cd908b", "DetectTime": "2024-05-21T12:43:11.115068+00:00", "EventTime": "2024-05-21T12:43:11.115088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJuhWq3JfBbj1zEeMf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "5755ea23-797b-41f7-952c-36f8e77a0b37", "DetectTime": "2024-05-21T12:43:11.120895+00:00", "EventTime": "2024-05-21T12:43:11.120916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgzp332qbyhR7L53Ik"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "cfe8ce04-2942-427a-9596-a3090b6a13eb", "DetectTime": "2024-05-21T12:43:11.125568+00:00", "EventTime": "2024-05-21T12:43:11.125588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9N67q2mPAujdngXQl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "0e9f5783-cb28-4d0a-a8d3-b3506fdebca0", "DetectTime": "2024-05-21T12:43:11.130153+00:00", "EventTime": "2024-05-21T12:43:11.130172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRf6y1OpapyNfe9i5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "64864d65-4318-409b-8aaa-7a72e4cc9e26", "DetectTime": "2024-05-21T12:43:11.158629+00:00", "EventTime": "2024-05-21T12:43:11.158649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwqmrk3SrlGNF9WgG2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "8c8d4c07-e263-4133-ac6f-3b002c4dc3ba", "DetectTime": "2024-05-21T12:43:11.175824+00:00", "EventTime": "2024-05-21T12:43:11.175847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbolD2eLoIMHUkjqk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "5716f323-548c-4d28-950e-bd0ee33994ec", "DetectTime": "2024-05-21T12:43:11.201466+00:00", "EventTime": "2024-05-21T12:43:11.201488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yfhhKK5ZMkHIXI2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "fda869a1-60a2-4644-a8f9-6e9cea083f06", "DetectTime": "2024-05-21T12:43:11.218152+00:00", "EventTime": "2024-05-21T12:43:11.218170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3RNCk1LXd0rGg275b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "46f7db2d-dfa6-46e7-a4fe-6387b171d209", "DetectTime": "2024-05-21T12:43:11.224785+00:00", "EventTime": "2024-05-21T12:43:11.224805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKwvzztqS55AYz91"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1c3a6cf5-ec45-46c6-854d-e6c3368090a0", "DetectTime": "2024-05-21T12:43:11.231973+00:00", "EventTime": "2024-05-21T12:43:11.231993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAi1rxnoyQReoZkk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "049b3026-3dfb-4361-a76d-d31224fdddf4", "DetectTime": "2024-05-21T12:43:11.237395+00:00", "EventTime": "2024-05-21T12:43:11.237412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ8V2J09PCqWqfgf9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "553f3ed9-a1ee-453c-b7d4-c7e5c9ee8a28", "DetectTime": "2024-05-21T12:43:11.358852+00:00", "EventTime": "2024-05-21T12:43:11.358874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDThyl3sJtNLmtYugi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "f4118095-5f54-49c8-990d-1aa78aaf0906", "DetectTime": "2024-05-21T12:43:11.363833+00:00", "EventTime": "2024-05-21T12:43:11.363851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7IglQ6pfH4oeeMW5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "babe89aa-58bd-4ac6-a2e6-670bccdbbc0a", "DetectTime": "2024-05-21T12:43:11.389176+00:00", "EventTime": "2024-05-21T12:43:11.389198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAEgG43HfJOfy9iDSd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "9947c946-c958-4bac-ace9-fc9ed17e5691", "DetectTime": "2024-05-21T12:43:11.700885+00:00", "EventTime": "2024-05-21T12:43:11.700906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C82e4oqHZyVctLlFf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "939c27aa-b7df-44ba-af45-c78f6cacbfa2", "DetectTime": "2024-05-21T12:43:11.708390+00:00", "EventTime": "2024-05-21T12:43:11.708409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC3dYh1Kc66csdxBo1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "bd9a3613-ea28-47d8-879f-d025b216d36e", "DetectTime": "2024-05-21T12:43:11.780419+00:00", "EventTime": "2024-05-21T12:43:11.780442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCC34n3xfehxzpccB2", "CTJ3mk37aKGTE6Xac2", "CAfTQ939GYsCYYMEnc", "C359YU1NLUywOgmzAi"], "accumulated_threat_level": 1.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "2797c5e5-3a08-49de-8c2e-002676ce6bda", "DetectTime": "2024-05-21T12:43:11.847364+00:00", "EventTime": "2024-05-21T12:43:11.847387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkHE6Ro6P24yhno1j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "6aa0f83e-4419-40c0-8a26-4699f0c18797", "DetectTime": "2024-05-21T12:43:11.871511+00:00", "EventTime": "2024-05-21T12:43:11.871534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgbQl1KpX5fU0DI42"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "14cfb578-5663-4a2c-b6b9-568441e150b8", "DetectTime": "2024-05-21T12:43:11.947480+00:00", "EventTime": "2024-05-21T12:43:11.947501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFfO93owuNiSOVrt7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "8ee0fc1d-a205-48e1-b61b-0a592af74251", "DetectTime": "2024-05-21T12:43:12.261565+00:00", "EventTime": "2024-05-21T12:43:12.261586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsH8xI2Cdw2zfmT1a6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "cb625bb2-5fcd-4aed-bb4a-022819164ea0", "DetectTime": "2024-05-21T12:43:12.369101+00:00", "EventTime": "2024-05-21T12:43:12.369121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czlgr12lT4w0yoKvO7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "73e4b762-88bb-4612-aa84-07cc116b650d", "DetectTime": "2024-05-21T12:43:12.436436+00:00", "EventTime": "2024-05-21T12:43:12.436459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zBA1254h8GbW5ASe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "9cdc9be7-167b-482d-b72e-883c4aad3040", "DetectTime": "2024-05-21T12:43:12.480618+00:00", "EventTime": "2024-05-21T12:43:12.480639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.214.58.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMr8QD1U9iULumf3N7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "135151b5-222b-4884-9151-c80610643692", "DetectTime": "2024-05-21T12:43:12.485585+00:00", "EventTime": "2024-05-21T12:43:12.485605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz2mFa1rxlh8Vc2iu7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "f17bc0b1-982a-4d7c-8b03-35a23d1e054a", "DetectTime": "2024-05-21T12:43:12.492774+00:00", "EventTime": "2024-05-21T12:43:12.492792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMYBY3axLeUryLEog"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "84a037a8-fc72-491b-8d93-0223a75d185b", "DetectTime": "2024-05-21T12:43:12.801126+00:00", "EventTime": "2024-05-21T12:43:12.801146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIH0j4XKvM8wPE8zd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1067f126-6553-4e31-bc63-0a600cd25f5c", "DetectTime": "2024-05-21T12:43:12.867270+00:00", "EventTime": "2024-05-21T12:43:12.867293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDK0n3vkhr8iwPQ3d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "353bbea1-600c-4548-8011-bfa13099965a", "DetectTime": "2024-05-21T12:43:12.913961+00:00", "EventTime": "2024-05-21T12:43:12.913985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE50ba3nrLsb092Sp2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "4804f018-6d2c-4d5c-8fcc-4ee0f9af0128", "DetectTime": "2024-05-21T12:43:12.982819+00:00", "EventTime": "2024-05-21T12:43:12.982842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjdiM3whQqcYBmfkd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1f61893e-13d7-46b9-b21a-8077479221f6", "DetectTime": "2024-05-21T12:43:12.995527+00:00", "EventTime": "2024-05-21T12:43:12.995546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4JhMh3vn1MXkiHHei"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "0e7c2f4f-0348-4830-911c-1fb0b778d69d", "DetectTime": "2024-05-21T12:43:13.001735+00:00", "EventTime": "2024-05-21T12:43:13.001758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.249.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAySr33Sau9IdXZBMj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "8047574c-fbaf-4c23-bb4d-0384abf87702", "DetectTime": "2024-05-21T12:43:13.006578+00:00", "EventTime": "2024-05-21T12:43:13.006598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOn2VA6F0yOxUkcj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "c09373d4-32cd-4815-88de-813d41942b45", "DetectTime": "2024-05-21T12:43:13.041472+00:00", "EventTime": "2024-05-21T12:43:13.041494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.164.33.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwyq5219GkRmoKc0C2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "0c8bbe63-3158-4443-921d-9cd2755974e2", "DetectTime": "2024-05-21T12:43:13.046755+00:00", "EventTime": "2024-05-21T12:43:13.046776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIMve3RsETNJ7Vpjb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "1181ddd6-eb3c-4fc2-8b37-25a72b00cabd", "DetectTime": "2024-05-21T12:43:13.058882+00:00", "EventTime": "2024-05-21T12:43:13.058903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1dus3yAS1vcCbEB5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "838fb271-aeda-4e49-bd46-590a45da7d9f", "DetectTime": "2024-05-21T12:43:13.103458+00:00", "EventTime": "2024-05-21T12:43:13.103480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwEuJ3SwUPKVr29sb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "9517ae58-ffce-4573-b1c0-87c664afdcc0", "DetectTime": "2024-05-21T12:43:13.108999+00:00", "EventTime": "2024-05-21T12:43:13.109019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblCbl1Mesubw9x0Dg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3a56fb4f-bbca-4028-ab22-fdcdbf035693", "DetectTime": "2024-05-21T12:43:13.533198+00:00", "EventTime": "2024-05-21T12:43:13.533218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUDUJ2zQ6D3KXmTDk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "a2561c82-5e0f-4e53-b262-4e1a82ed072a", "DetectTime": "2024-05-21T12:43:13.883279+00:00", "EventTime": "2024-05-21T12:43:13.883300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67NcKnT58VheGhI8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "2c2a4691-fe78-4b4f-be22-c06f2b58fec6", "DetectTime": "2024-05-21T12:43:13.888520+00:00", "EventTime": "2024-05-21T12:43:13.888539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cehetb3UnxYbQW2rNb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "add367f6-bc0a-4629-b1dd-4d4ec9a41e45", "DetectTime": "2024-05-21T12:43:13.894648+00:00", "EventTime": "2024-05-21T12:43:13.894669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDz0bwsaTbUM1yL7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "43796d1e-aeb5-48b8-b4f4-438743758b5e", "DetectTime": "2024-05-21T12:43:13.899373+00:00", "EventTime": "2024-05-21T12:43:13.899391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.64.166.201 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZk42C2gJ0JNtnNFP3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "c77c07ab-fb3a-46df-b006-d0733de75a21", "DetectTime": "2024-05-21T12:43:13.954628+00:00", "EventTime": "2024-05-21T12:43:13.954649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALeoX1jAKcD2CYKi8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "3767cdfb-5138-40bc-aaad-c2cec4350b5e", "DetectTime": "2024-05-21T12:43:13.969867+00:00", "EventTime": "2024-05-21T12:43:13.969887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8rPlR2dA4HSCfMHbb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "eff6ab97-492b-4764-bcb7-0ac77e0bb9af", "DetectTime": "2024-05-21T12:43:14.007676+00:00", "EventTime": "2024-05-21T12:43:14.007697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4Ju04RVK8p7sne68"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 127} +{"Format": "IDEA0", "ID": "15380912-a49e-450b-beeb-0f71d3083794", "DetectTime": "2024-05-21T12:43:14.092790+00:00", "EventTime": "2024-05-21T12:43:14.092809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZZr43HsloJq9GeSb"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "c90dfa95-66cb-486f-81a4-e8c3ac6f29af", "DetectTime": "2024-05-21T12:43:14.123660+00:00", "EventTime": "2024-05-21T12:43:14.123684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.64.166.201 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44ZUQ3x1rjW5D1Gxa"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "787f3a0b-8e30-4c62-8bab-2d1b718d03e6", "DetectTime": "2024-05-21T12:43:14.493834+00:00", "EventTime": "2024-05-21T12:43:14.493853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPWxQy4d6ZQ9ezjWl"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "5a940149-e9f1-46ef-91eb-987e71e49ed2", "DetectTime": "2024-05-21T12:43:14.533326+00:00", "EventTime": "2024-05-21T12:43:14.533347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.164.33.173 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2IqW94yc1RbKq66vk"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "1bc4a170-f7c5-4c03-9bf8-e6dd3406d333", "DetectTime": "2024-05-21T12:43:14.541398+00:00", "EventTime": "2024-05-21T12:43:14.541418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.214.58.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqErgSLW8eCj2rWFf"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "4daaf9a4-ba51-48c7-903a-ac70585b1085", "DetectTime": "2024-05-21T12:43:14.594033+00:00", "EventTime": "2024-05-21T12:43:14.594054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBW6N28M7qWbglsAg"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "bea50165-cfbf-44bf-9b68-bb58c6358887", "DetectTime": "2024-05-21T12:43:14.599203+00:00", "EventTime": "2024-05-21T12:43:14.599226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwPq82MC4MENNNTNf"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "d2e237b2-bb12-4bcd-81dc-e29339deb68b", "DetectTime": "2024-05-21T12:43:14.604773+00:00", "EventTime": "2024-05-21T12:43:14.604792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJZ3w3iPYj4odC1c1"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "4873a829-2a47-4382-8600-098da1ea152e", "DetectTime": "2024-05-21T12:43:14.646244+00:00", "EventTime": "2024-05-21T12:43:14.646265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Tl5x3FbbJZXnk08"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "71b3c3d4-520b-4af6-9fa3-06836989bc18", "DetectTime": "2024-05-21T12:43:14.662865+00:00", "EventTime": "2024-05-21T12:43:14.662886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1Exv2KPeirZB3TO6"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "1e2d244b-5c48-4b3d-824e-18dc0890ed6c", "DetectTime": "2024-05-21T12:43:14.719992+00:00", "EventTime": "2024-05-21T12:43:14.720016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKR87mlHUR3b714i2"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "0cb4427d-dd7c-48e9-8af3-d8fc546066ce", "DetectTime": "2024-05-21T12:43:14.725040+00:00", "EventTime": "2024-05-21T12:43:14.725061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkWB31cwYGz53Axpe"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "85ec4589-3abf-4927-a4f7-db57e0baf55d", "DetectTime": "2024-05-21T12:43:14.729955+00:00", "EventTime": "2024-05-21T12:43:14.729973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTLXz3FALzqLt27L5"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "21da4dec-14c8-45f5-93dc-a615a0d1d914", "DetectTime": "2024-05-21T12:43:15.164594+00:00", "EventTime": "2024-05-21T12:43:15.164616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFfmoGRMw9z1MzEkf"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "89f4ba73-11c0-4c85-a6b4-48924f5485b0", "DetectTime": "2024-05-21T12:43:15.292891+00:00", "EventTime": "2024-05-21T12:43:15.292922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck36iG2ZweaaZrPYA7"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "59f3365a-5036-4c82-a5a6-f79d768b8654", "DetectTime": "2024-05-21T12:43:15.312432+00:00", "EventTime": "2024-05-21T12:43:15.312450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrmQA3mxyiNWmBJ91"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "4df3f299-2535-4e00-a4e4-513da0e03dbc", "DetectTime": "2024-05-21T12:43:15.343349+00:00", "EventTime": "2024-05-21T12:43:15.343376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXusaU2CFBx1CHHtLi"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "8a24d765-cd3d-4811-9c95-30ffccd38810", "DetectTime": "2024-05-21T12:43:15.349554+00:00", "EventTime": "2024-05-21T12:43:15.349575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqPiS2MqMku43V7Pe"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "3a921efa-a055-4e84-a4e9-ecbbdc864bdc", "DetectTime": "2024-05-21T12:43:15.385421+00:00", "EventTime": "2024-05-21T12:43:15.385440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqEnA1IZXfUsRgM6d"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "e8302239-c5fe-46eb-9fd2-dbe0306b1115", "DetectTime": "2024-05-21T12:43:15.390215+00:00", "EventTime": "2024-05-21T12:43:15.390235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5yxk4LvQXHH3Op8k"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "0c889a19-f98c-4316-9a92-b5b612d98f92", "DetectTime": "2024-05-21T12:43:15.395404+00:00", "EventTime": "2024-05-21T12:43:15.395422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnEjSh3zokx4j0PhI3"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "f4a1733f-f950-4aee-8b06-3a6fa5a1b78b", "DetectTime": "2024-05-21T12:43:15.400444+00:00", "EventTime": "2024-05-21T12:43:15.400462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvRbg4iWmcVC8UJb9"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "6b42f62c-a632-4dc1-9ffd-44fe1a318988", "DetectTime": "2024-05-21T12:43:15.405636+00:00", "EventTime": "2024-05-21T12:43:15.405654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdtNMR1zcZrzhjqiL3"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "32af3316-abdb-458c-99f2-c5968fd9f7d8", "DetectTime": "2024-05-21T12:43:15.410296+00:00", "EventTime": "2024-05-21T12:43:15.410314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBT4BuAfdrRNRTpe"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "ea68cb66-e1dc-4210-a29f-0a9e63e4eb9b", "DetectTime": "2024-05-21T12:43:15.417288+00:00", "EventTime": "2024-05-21T12:43:15.417306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDroEg1mQEGqa0Q1o"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "e69075ac-b2d3-420d-8d14-18ce216f7d45", "DetectTime": "2024-05-21T12:43:15.429845+00:00", "EventTime": "2024-05-21T12:43:15.429869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZfX0523kAugYvtaSe"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "41826ab2-a991-4969-a132-c47126a0e6e4", "DetectTime": "2024-05-21T12:43:15.737285+00:00", "EventTime": "2024-05-21T12:43:15.737307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvbl4L18QPWG55s093"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "cf4c77e5-ed8c-4afd-98ee-39ef0e3e2780", "DetectTime": "2024-05-21T12:43:15.742590+00:00", "EventTime": "2024-05-21T12:43:15.742611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja1Lf41szEge8iiFa"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "e93223a0-f8a3-41d3-8d12-4e14f3d445a4", "DetectTime": "2024-05-21T12:43:16.178483+00:00", "EventTime": "2024-05-21T12:43:16.178507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmydIS11qQYdZNNZnh"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "29cd544f-908b-4cab-83d8-0c66394db440", "DetectTime": "2024-05-21T12:43:16.303049+00:00", "EventTime": "2024-05-21T12:43:16.303069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRmL8fxnTmDVBOZg"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "9411029a-dccd-4d7c-87d2-e7845c8abffc", "DetectTime": "2024-05-21T12:43:16.321943+00:00", "EventTime": "2024-05-21T12:43:16.321965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqxXu30ZPYq6WpTRi"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "3ee7d5ec-7d31-4456-83b7-b5e2b212f72e", "DetectTime": "2024-05-21T12:43:16.332178+00:00", "EventTime": "2024-05-21T12:43:16.332200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrVYy3A20d1V5bcKl"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "6b3c5e0d-8c29-498b-a0f7-9f43f7ca5580", "DetectTime": "2024-05-21T12:43:16.336950+00:00", "EventTime": "2024-05-21T12:43:16.336970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZpTB3ByLG61rhO29"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "ac4adb64-0dc0-4d5a-8375-48b26e357faf", "DetectTime": "2024-05-21T12:43:16.342600+00:00", "EventTime": "2024-05-21T12:43:16.342622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1rg04CqObfPrS9x8"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "0e46bf73-85aa-4c80-835e-23a3a5338b05", "DetectTime": "2024-05-21T12:43:16.374103+00:00", "EventTime": "2024-05-21T12:43:16.374127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czqk9PrngFfFOWyWh"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "84ec011a-f5ab-4f6a-b434-9838de520966", "DetectTime": "2024-05-21T12:43:16.433100+00:00", "EventTime": "2024-05-21T12:43:16.433128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmhfNH20wXk3XRKdCe"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "f97c5ed2-3a01-433b-9e84-bc9e9a8a726f", "DetectTime": "2024-05-21T12:43:16.438760+00:00", "EventTime": "2024-05-21T12:43:16.438780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.249.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGLOil49jBUC8QzBa"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "d0f0f1ae-a264-4c41-923e-a2d5e6cb14d5", "DetectTime": "2024-05-21T12:43:16.691552+00:00", "EventTime": "2024-05-21T12:43:16.691575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiTIpV3JLxSZiuf2nc"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "742a8341-aceb-4132-be92-842d66fa9863", "DetectTime": "2024-05-21T12:43:16.697336+00:00", "EventTime": "2024-05-21T12:43:16.697358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxixjm1Mfzbwwsb5Nl"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "8280d467-ff92-4528-accf-634e0337e2ce", "DetectTime": "2024-05-21T12:43:16.726018+00:00", "EventTime": "2024-05-21T12:43:16.726039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTD5ga2YMIh5YSFiK"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "05e6171a-6bd9-41ab-aadb-bdb16ffec39d", "DetectTime": "2024-05-21T12:43:16.788650+00:00", "EventTime": "2024-05-21T12:43:16.788672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ymSq40i1H1Oy94Di"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "7343996b-d3c7-492b-8496-bcfad2fb7be9", "DetectTime": "2024-05-21T12:43:16.798868+00:00", "EventTime": "2024-05-21T12:43:16.798889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJ1Ar1IvYftFWY0B2"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "0b508acc-22d0-42e8-8779-da2550d4e225", "DetectTime": "2024-05-21T12:43:16.815585+00:00", "EventTime": "2024-05-21T12:43:16.815605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKNwG1xibLeNGPIK5"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "bfc49a6a-8852-45ac-8606-c6d734b9c131", "DetectTime": "2024-05-21T12:43:17.254538+00:00", "EventTime": "2024-05-21T12:43:17.254559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLPcS3u4cd03L3vgl"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "25ca26c4-6f32-49ef-b277-b358c45b1430", "DetectTime": "2024-05-21T12:43:17.293008+00:00", "EventTime": "2024-05-21T12:43:17.293031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBJ094Yng4biUt82e"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "0f5b7824-a8d3-443b-88af-82df34d36388", "DetectTime": "2024-05-21T12:43:17.300295+00:00", "EventTime": "2024-05-21T12:43:17.300316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYakj3cPlAClLiA2"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "f7a33812-2579-4567-b435-fc707de4b946", "DetectTime": "2024-05-21T12:43:17.305781+00:00", "EventTime": "2024-05-21T12:43:17.305801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39tlm1ldFx9E4Hsk1"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "adfd5834-c671-422b-822d-f87cfabb041a", "DetectTime": "2024-05-21T12:43:17.310777+00:00", "EventTime": "2024-05-21T12:43:17.310796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMathd4SQdIkCG0yY8"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "698a59e6-7fae-4751-a38a-e84370b17444", "DetectTime": "2024-05-21T12:43:17.356039+00:00", "EventTime": "2024-05-21T12:43:17.356061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCDFr37V1cdKt1v74"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "89e360a2-4b61-4118-9726-046fbf09b0bc", "DetectTime": "2024-05-21T12:43:17.705609+00:00", "EventTime": "2024-05-21T12:43:17.705630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5wIrz2f1kacSqhEtd"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "87fd9866-db09-4358-a3cc-ef0000fcc1dc", "DetectTime": "2024-05-21T12:43:17.749196+00:00", "EventTime": "2024-05-21T12:43:17.749219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUNQE3UpX6FDs0isb"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "eb19300f-98ea-4e85-b3ac-e2d98f794722", "DetectTime": "2024-05-21T12:43:17.760748+00:00", "EventTime": "2024-05-21T12:43:17.760766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHDzzX3mDLSUEYrJrf"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "f9cb861d-aade-4b29-9dc5-afe6ac71d667", "DetectTime": "2024-05-21T12:43:17.882036+00:00", "EventTime": "2024-05-21T12:43:17.882058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJA3u02gRgUvcyWsQ5"], "accumulated_threat_level": 5.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "f2c87aaf-958e-4069-b9ef-c44ef5a4d4a4", "DetectTime": "2024-05-21T12:43:17.934938+00:00", "EventTime": "2024-05-21T12:43:17.934957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy8cPm1VlqsEePoAU5", "CkL3nU265NnQ0ZgNY5", "C5ANbM2H2AtJ34j7Ha", "CnUlWruhEM0N4sbej"], "accumulated_threat_level": 0.5, "timewindow": 130} +{"Format": "IDEA0", "ID": "5a18b284-9c9d-4a44-919a-c2ff122b9237", "DetectTime": "2024-05-21T12:43:17.940611+00:00", "EventTime": "2024-05-21T12:43:17.940630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQodt4tsvm6dNKA9"], "accumulated_threat_level": 5.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "beec2b02-587e-452f-90c2-69998a0a2c18", "DetectTime": "2024-05-21T12:43:17.984331+00:00", "EventTime": "2024-05-21T12:43:17.984349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLG6ep2Le3B0Zg8Jz4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 128} +{"Format": "IDEA0", "ID": "d7fa7f10-b945-4605-a3c4-28c1b30d5af9", "DetectTime": "2024-05-21T12:43:18.035856+00:00", "EventTime": "2024-05-21T12:43:18.035874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NosH2LyR0N17jtyb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "84705708-cade-4097-9d65-3e0dbf27b077", "DetectTime": "2024-05-21T12:43:18.324528+00:00", "EventTime": "2024-05-21T12:43:18.324547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjhpX1UV9w5uGv5Wh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "d7fb7ee4-b791-47ee-9e80-f5f3baa2e98d", "DetectTime": "2024-05-21T12:43:18.465466+00:00", "EventTime": "2024-05-21T12:43:18.465487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMLehE6zhaZQGSWl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "56f40abd-6fb5-408d-9a6e-1ce3d2b3d83c", "DetectTime": "2024-05-21T12:43:18.523595+00:00", "EventTime": "2024-05-21T12:43:18.523614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJw6W2cZSpkVTkVU6"], "accumulated_threat_level": 9.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "a62116a1-3588-40cb-a36d-46597e3f8791", "DetectTime": "2024-05-21T12:43:18.570800+00:00", "EventTime": "2024-05-21T12:43:18.570822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuQsNf4LLB8jsA7yOf"], "accumulated_threat_level": 10.4, "timewindow": 128} +{"Format": "IDEA0", "ID": "7edf2857-66b7-4a3f-a0d5-b40cca0a83a7", "DetectTime": "2024-05-21T12:43:18.617539+00:00", "EventTime": "2024-05-21T12:43:18.617557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNTy04mQ3DHYctkm3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 128} +{"Format": "IDEA0", "ID": "932d8579-fc31-438d-857e-a3bfe18579f1", "DetectTime": "2024-05-21T12:43:18.659324+00:00", "EventTime": "2024-05-21T12:43:18.659354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6whSy2uOLDbO8s5pa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 128} +{"Format": "Json", "ID": "932d8579-fc31-438d-857e-a3bfe18579f1", "DetectTime": "2024-05-21T12:43:18.659324+00:00", "EventTime": "2024-05-21T12:43:18.659354+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-06T07:44:47.412486+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2024/05/21 12:43:18.992209)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 128, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3fdff836-0981-4c50-9f55-27d9c95fc09f", "DetectTime": "2024-05-21T12:43:19.015670+00:00", "EventTime": "2024-05-21T12:43:19.015720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd00ax1lX1oUs9htd"], "accumulated_threat_level": 0.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "9d8579f2-1648-4772-9509-06d47cedfabf", "DetectTime": "2024-05-21T12:43:19.028372+00:00", "EventTime": "2024-05-21T12:43:19.028401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEuGMX8CinFJsITb"], "accumulated_threat_level": 1.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "68b12130-5bfb-4b89-bae7-762ecf54b619", "DetectTime": "2024-05-21T12:43:19.046026+00:00", "EventTime": "2024-05-21T12:43:19.046061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YCEL2SvfUJ4QC92b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "951c23cb-588b-483a-9a7f-f8b2a20d8241", "DetectTime": "2024-05-21T12:43:19.092647+00:00", "EventTime": "2024-05-21T12:43:19.092668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF74dp3KstpwwkwD2c"], "accumulated_threat_level": 3.2, "timewindow": 128} +{"Format": "IDEA0", "ID": "3e289216-a78b-4057-ae66-7222085a342f", "DetectTime": "2024-05-21T12:43:19.141296+00:00", "EventTime": "2024-05-21T12:43:19.141314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5ylXe574i8Rguic"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "bfea7347-d3d0-4884-b0b6-5760d0b070f7", "DetectTime": "2024-05-21T12:43:19.189011+00:00", "EventTime": "2024-05-21T12:43:19.189033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLQY2zJR8YhssIL6"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "82467d98-fe66-4126-82f6-d6237496cd7f", "DetectTime": "2024-05-21T12:43:19.249808+00:00", "EventTime": "2024-05-21T12:43:19.249831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqDGTK3wSlMCmogmK4"], "accumulated_threat_level": 5.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "3f866d8c-ee32-4900-9cb6-6417e2c0b766", "DetectTime": "2024-05-21T12:43:19.284449+00:00", "EventTime": "2024-05-21T12:43:19.284469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.54.197.77"]}], "Attach": [{"Content": "Connection to unknown destination port 13102/UDP destination IP 92.54.197.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvoHCy3lmEZWI6auNh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 128} +{"Format": "IDEA0", "ID": "341fcadf-c2d2-4cb2-ab0a-635ef6ec5457", "DetectTime": "2024-05-21T12:43:19.337471+00:00", "EventTime": "2024-05-21T12:43:19.337491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxG6sd1LniiE7fvT48"], "accumulated_threat_level": 7.199999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "19eb0c21-059e-4541-9a46-9bb01981db3a", "DetectTime": "2024-05-21T12:43:19.386357+00:00", "EventTime": "2024-05-21T12:43:19.386377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.169.30.5"]}], "Attach": [{"Content": "Connection to unknown destination port 24770/UDP destination IP 188.169.30.5. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETvfQ1cVxijFXZFYi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "2c9a0737-2e42-4a7f-a228-8b2d9b320e8e", "DetectTime": "2024-05-21T12:43:19.678698+00:00", "EventTime": "2024-05-21T12:43:19.678725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdCu831scj3lsAhWha"], "accumulated_threat_level": 8.799999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "8c51344a-0da2-4f33-a0f2-7930d54549c6", "DetectTime": "2024-05-21T12:43:19.726079+00:00", "EventTime": "2024-05-21T12:43:19.726108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIfrq3qsVLJT9dLvd"], "accumulated_threat_level": 9.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "91481310-6944-4114-a54e-d46322ad0308", "DetectTime": "2024-05-21T12:43:19.774843+00:00", "EventTime": "2024-05-21T12:43:19.774863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTQbk1WNbmothqKHh"], "accumulated_threat_level": 10.4, "timewindow": 128} +{"Format": "IDEA0", "ID": "0b0345c7-5cd3-424f-b4e9-48771bb6fe7d", "DetectTime": "2024-05-21T12:43:19.822765+00:00", "EventTime": "2024-05-21T12:43:19.822788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8zFb18GhIFWdFYtd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 128} +{"Format": "IDEA0", "ID": "f1bc590a-8bda-4361-b3c7-4b8974bf9712", "DetectTime": "2024-05-21T12:43:19.868680+00:00", "EventTime": "2024-05-21T12:43:19.868698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7iWJx2CV5IhLuZiS5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 128} +{"Format": "Json", "ID": "f1bc590a-8bda-4361-b3c7-4b8974bf9712", "DetectTime": "2024-05-21T12:43:19.868680+00:00", "EventTime": "2024-05-21T12:43:19.868698+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "1970-01-06T07:44:51.109439+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2024/05/21 12:43:20.214233)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 128, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6c98aa82-84a8-4048-8afb-25988578f54e", "DetectTime": "2024-05-21T12:43:20.218506+00:00", "EventTime": "2024-05-21T12:43:20.218523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvPlYu466krQAkaFr8"], "accumulated_threat_level": 0, "timewindow": 128} +{"Format": "IDEA0", "ID": "5e8dc1d2-d09e-43b3-8dea-72da4b4f6e5f", "DetectTime": "2024-05-21T12:43:20.231246+00:00", "EventTime": "2024-05-21T12:43:20.231269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv367m3zFwYFIOcM56"], "accumulated_threat_level": 0.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "439d865a-fb8a-4f43-84c9-aab88e3c782e", "DetectTime": "2024-05-21T12:43:20.245648+00:00", "EventTime": "2024-05-21T12:43:20.245669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xSzR22JZB0as2O3l"], "accumulated_threat_level": 1.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "a0ccf999-58c2-4267-8af8-11db8ee6bef9", "DetectTime": "2024-05-21T12:43:20.257311+00:00", "EventTime": "2024-05-21T12:43:20.257330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfiXc21lVj7vtSvl75"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "ccf093eb-85f5-4ef8-a8c6-04b771fc08f9", "DetectTime": "2024-05-21T12:43:20.410642+00:00", "EventTime": "2024-05-21T12:43:20.410661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CACOqm1uzXCM3MLmp6"], "accumulated_threat_level": 3.2, "timewindow": 128} +{"Format": "IDEA0", "ID": "8f236e16-10b3-46d6-bf2c-e06dc0a91ad0", "DetectTime": "2024-05-21T12:43:20.455494+00:00", "EventTime": "2024-05-21T12:43:20.455514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYwzF2HNkvFGkaw86"], "accumulated_threat_level": 4.0, "timewindow": 128} +{"Format": "IDEA0", "ID": "544a56c8-f749-4c3a-9e2f-a08a0ba99680", "DetectTime": "2024-05-21T12:43:20.504345+00:00", "EventTime": "2024-05-21T12:43:20.504368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0Ut73ezpyPvuVVEi"], "accumulated_threat_level": 4.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "22fc7490-e26b-48c3-9cf6-39ebe7ef2eaf", "DetectTime": "2024-05-21T12:43:20.543991+00:00", "EventTime": "2024-05-21T12:43:20.544011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqR68S12aFw2CgYxXj"], "accumulated_threat_level": 5.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "13a643b2-7759-4240-b372-b9ec6823d9ad", "DetectTime": "2024-05-21T12:43:20.592799+00:00", "EventTime": "2024-05-21T12:43:20.592830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrH8s71Jm7fWYUMQB9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 128} +{"Format": "IDEA0", "ID": "b98edc35-80d4-42a4-9a4e-f3d467dda7b5", "DetectTime": "2024-05-21T12:43:20.642632+00:00", "EventTime": "2024-05-21T12:43:20.642653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7UL7B34Pb26DgVYye"], "accumulated_threat_level": 7.199999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "83fd08c3-fc05-4f06-befe-a6115e9eadb1", "DetectTime": "2024-05-21T12:43:20.689406+00:00", "EventTime": "2024-05-21T12:43:20.689424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2vy7X36VBc0igcP06"], "accumulated_threat_level": 7.999999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "e5066593-a961-4c6d-9805-3db8059a82cd", "DetectTime": "2024-05-21T12:43:20.730317+00:00", "EventTime": "2024-05-21T12:43:20.730342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 110.138.249.237 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV4FsjyXoxhlp49Ql"], "accumulated_threat_level": 7.999999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "2c28384e-af2b-472a-9d99-17e730cefec5", "DetectTime": "2024-05-21T12:43:20.771469+00:00", "EventTime": "2024-05-21T12:43:20.771493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IHV62mrKVslZK1rj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 128} +{"Format": "IDEA0", "ID": "e6272dc7-8e75-4985-9c70-cd7f8f951eec", "DetectTime": "2024-05-21T12:43:21.074175+00:00", "EventTime": "2024-05-21T12:43:21.074204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeOOr3f3Xychfwvce"], "accumulated_threat_level": 9.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "fa33b5cb-1cef-43e3-abb5-7b29cdf39390", "DetectTime": "2024-05-21T12:43:21.119230+00:00", "EventTime": "2024-05-21T12:43:21.119254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbs4er3IQ4YlDco7W4"], "accumulated_threat_level": 10.4, "timewindow": 128} +{"Format": "IDEA0", "ID": "292d9bc5-665c-4485-a116-c3dc3e31f5fc", "DetectTime": "2024-05-21T12:43:21.164972+00:00", "EventTime": "2024-05-21T12:43:21.164994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CElSru1nueFg5aatoc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 128} +{"Format": "IDEA0", "ID": "b53c0855-a47f-47d5-b921-10291ee98faf", "DetectTime": "2024-05-21T12:43:21.211460+00:00", "EventTime": "2024-05-21T12:43:21.211481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTG4q2F9rOZqhuDfa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 128} +{"Format": "Json", "ID": "b53c0855-a47f-47d5-b921-10291ee98faf", "DetectTime": "2024-05-21T12:43:21.211460+00:00", "EventTime": "2024-05-21T12:43:21.211481+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "1970-01-06T07:44:56.205162+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 128. (real time 2024/05/21 12:43:21.556818)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 128, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7ed6605e-0ea2-4a3a-a8bd-61db80a2be54", "DetectTime": "2024-05-21T12:43:21.626783+00:00", "EventTime": "2024-05-21T12:43:21.626803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch5yfpeuL2TSNIoC"], "accumulated_threat_level": 0.8, "timewindow": 128} +{"Format": "IDEA0", "ID": "670c01f5-506c-4093-a3de-8f9205bd1954", "DetectTime": "2024-05-21T12:43:21.638365+00:00", "EventTime": "2024-05-21T12:43:21.638383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXTHf2QdKq4S8Zhe1"], "accumulated_threat_level": 1.6, "timewindow": 128} +{"Format": "IDEA0", "ID": "516d9bac-b111-450d-b82b-1ae30c203cdc", "DetectTime": "2024-05-21T12:43:21.649650+00:00", "EventTime": "2024-05-21T12:43:21.649669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWCgz4MI1OHLFDLp3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "44d4373a-062d-421d-8ceb-15648eea127c", "DetectTime": "2024-05-21T12:43:21.682266+00:00", "EventTime": "2024-05-21T12:43:21.682288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgj1Js1srNUPGWMTMf"], "accumulated_threat_level": 1.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "47883d28-4566-43cb-9370-82e5a41c52b1", "DetectTime": "2024-05-21T12:43:21.958889+00:00", "EventTime": "2024-05-21T12:43:21.958909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqyRre2bT5OZ8D5u7d"], "accumulated_threat_level": 2.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "ac0ce9e2-ff8f-4338-aa69-a3502e447139", "DetectTime": "2024-05-21T12:43:22.005646+00:00", "EventTime": "2024-05-21T12:43:22.005671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl1MzPUveqfUmTnZf"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 129} +{"Format": "IDEA0", "ID": "8172826d-259a-4ce9-b733-12c1b92e983e", "DetectTime": "2024-05-21T12:43:22.057208+00:00", "EventTime": "2024-05-21T12:43:22.057228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnsEarwmvCQmfZvfe"], "accumulated_threat_level": 4.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "f5992f5d-6387-452f-8fca-7b96b6c84f52", "DetectTime": "2024-05-21T12:43:22.104369+00:00", "EventTime": "2024-05-21T12:43:22.104393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHpYJ21Fx3iJ9Qtya"], "accumulated_threat_level": 5.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "4b07ac1e-081a-4797-a744-f15aa5432074", "DetectTime": "2024-05-21T12:43:22.154239+00:00", "EventTime": "2024-05-21T12:43:22.154268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdt2H42tNgkWrNWtP6"], "accumulated_threat_level": 5.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "29680727-663b-4dda-8f63-1d019dd915f4", "DetectTime": "2024-05-21T12:43:22.201979+00:00", "EventTime": "2024-05-21T12:43:22.202000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6nwX3v4b1cqkKbBb"], "accumulated_threat_level": 6.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "3164a3cf-2ed4-4a90-bf88-bdf44de72f16", "DetectTime": "2024-05-21T12:43:22.252778+00:00", "EventTime": "2024-05-21T12:43:22.252798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT3a5J1VmoP48tytP1"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 129} +{"Format": "IDEA0", "ID": "502bc868-20ba-4059-a806-bdd5f73e52fa", "DetectTime": "2024-05-21T12:43:22.300741+00:00", "EventTime": "2024-05-21T12:43:22.300764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQyOk1DZbYSYtvNB"], "accumulated_threat_level": 8.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "1f6db03b-37b1-4b41-a70c-2aad15f3abf5", "DetectTime": "2024-05-21T12:43:22.351478+00:00", "EventTime": "2024-05-21T12:43:22.351496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORBbfLEEwk7xRun2"], "accumulated_threat_level": 9.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "d2604246-fc7f-4318-bde9-ab84cc99119a", "DetectTime": "2024-05-21T12:43:22.626892+00:00", "EventTime": "2024-05-21T12:43:22.626927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGjuwc4s86okZ9HP4g"], "accumulated_threat_level": 9.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "fbd44290-098b-4bd2-a972-cfc434944833", "DetectTime": "2024-05-21T12:43:22.672583+00:00", "EventTime": "2024-05-21T12:43:22.672615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHV0T3K2sSe6ADlif"], "accumulated_threat_level": 10.600000000000001, "timewindow": 129} +{"Format": "IDEA0", "ID": "cf76ce55-9fbe-4d2a-a8d4-05cbd0500803", "DetectTime": "2024-05-21T12:43:22.720439+00:00", "EventTime": "2024-05-21T12:43:22.720472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCakgy4VQpGb8NLXrj"], "accumulated_threat_level": 11.400000000000002, "timewindow": 129} +{"Format": "IDEA0", "ID": "4c8932ab-2843-41c7-bb53-f994f768ffe6", "DetectTime": "2024-05-21T12:43:22.767305+00:00", "EventTime": "2024-05-21T12:43:22.767341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZVKot4Tj3i5ZtqVm6"], "accumulated_threat_level": 12.200000000000003, "timewindow": 129} +{"Format": "Json", "ID": "4c8932ab-2843-41c7-bb53-f994f768ffe6", "DetectTime": "2024-05-21T12:43:22.767305+00:00", "EventTime": "2024-05-21T12:43:22.767341+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-06T08:15:59.445682+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2024/05/21 12:43:23.025526)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 129, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "af969b59-cbc2-45be-aa28-9f85cd29a355", "DetectTime": "2024-05-21T12:43:23.037418+00:00", "EventTime": "2024-05-21T12:43:23.037438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1PYQ1saXo0lKEZE1"], "accumulated_threat_level": 0.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "691c5fa8-60ea-4aa1-8dea-88342aa9cdc6", "DetectTime": "2024-05-21T12:43:23.048987+00:00", "EventTime": "2024-05-21T12:43:23.049006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C333Pf2FNdhdSW5yN5"], "accumulated_threat_level": 1.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c748ff7b-fc22-4d22-ba97-62c11215867b", "DetectTime": "2024-05-21T12:43:23.060209+00:00", "EventTime": "2024-05-21T12:43:23.060228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqMW041e6RF32biV1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 129} +{"Format": "IDEA0", "ID": "82155ab3-2f89-4ce1-a07b-5797920bafb9", "DetectTime": "2024-05-21T12:43:23.277450+00:00", "EventTime": "2024-05-21T12:43:23.277470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1XPG28N4soTF00Xd"], "accumulated_threat_level": 3.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "7e049164-68c4-4357-9bb7-b118c693e595", "DetectTime": "2024-05-21T12:43:23.334459+00:00", "EventTime": "2024-05-21T12:43:23.334481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTSF11fx13WbsIKPe"], "accumulated_threat_level": 4.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "7e051d30-f52c-42a1-8452-1f4082e65767", "DetectTime": "2024-05-21T12:43:23.411308+00:00", "EventTime": "2024-05-21T12:43:23.411329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBK4rE2ozPuV1zYxo5"], "accumulated_threat_level": 4.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "f40db8fd-a03a-4551-8051-eb91c3b015a4", "DetectTime": "2024-05-21T12:43:23.459242+00:00", "EventTime": "2024-05-21T12:43:23.459264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV2UhIly0MXoe6Kq5"], "accumulated_threat_level": 5.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "bdec7179-bd65-48a2-8b7f-9e5cdf3825a2", "DetectTime": "2024-05-21T12:43:23.508585+00:00", "EventTime": "2024-05-21T12:43:23.508606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yPxh4vYFiwGZdB97"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 129} +{"Format": "IDEA0", "ID": "e2f37143-3f91-4fb4-a291-7aa060330e30", "DetectTime": "2024-05-21T12:43:23.569939+00:00", "EventTime": "2024-05-21T12:43:23.569962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmmvl84a5R83vst4J7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "5620d4be-2d50-4b48-ad1c-19ae8098fd15", "DetectTime": "2024-05-21T12:43:23.616235+00:00", "EventTime": "2024-05-21T12:43:23.616255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtX6O3Ey0COI6lfSg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "8f300b0a-fd93-4fb2-a2ab-56d9d20c7bb2", "DetectTime": "2024-05-21T12:43:23.662758+00:00", "EventTime": "2024-05-21T12:43:23.662779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLKlf31Bvxnbzagfb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "9dbde32d-b06f-4d6d-ad41-f42f52459657", "DetectTime": "2024-05-21T12:43:23.708027+00:00", "EventTime": "2024-05-21T12:43:23.708048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvvkUS2RQhMznKHSk5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "edd91861-9ab4-4550-bca9-d32bde025d0c", "DetectTime": "2024-05-21T12:43:23.980267+00:00", "EventTime": "2024-05-21T12:43:23.980287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISF2YE0ZGe1u4yTf"], "accumulated_threat_level": 10.4, "timewindow": 129} +{"Format": "IDEA0", "ID": "ab86f41c-6889-4e32-ae06-bae4da0d9286", "DetectTime": "2024-05-21T12:43:24.022387+00:00", "EventTime": "2024-05-21T12:43:24.022428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhS2r3uLQsI2kKxj7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 129} +{"Format": "IDEA0", "ID": "8f0ecf18-f4b0-46a0-a8fe-befe8b6cbf0c", "DetectTime": "2024-05-21T12:43:24.066431+00:00", "EventTime": "2024-05-21T12:43:24.066451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPwgU70juPDHRXNi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 129} +{"Format": "Json", "ID": "8f0ecf18-f4b0-46a0-a8fe-befe8b6cbf0c", "DetectTime": "2024-05-21T12:43:24.066431+00:00", "EventTime": "2024-05-21T12:43:24.066451+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "1970-01-06T08:16:53.638488+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2024/05/21 12:43:24.256817)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 129, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "67220a94-3025-4c2f-be48-a185d8c6b1b2", "DetectTime": "2024-05-21T12:43:24.279127+00:00", "EventTime": "2024-05-21T12:43:24.279153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUprgWX89X1ma9tl"], "accumulated_threat_level": 0.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "29b09f23-1277-4115-85af-652d4ed7d4cc", "DetectTime": "2024-05-21T12:43:24.295642+00:00", "EventTime": "2024-05-21T12:43:24.295664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2M4A466JmxkLrlS8"], "accumulated_threat_level": 1.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "2d671ae2-379d-45b1-8090-0ac7e2c49582", "DetectTime": "2024-05-21T12:43:24.308209+00:00", "EventTime": "2024-05-21T12:43:24.308230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXUi22RxTJ4OUzDe5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 129} +{"Format": "IDEA0", "ID": "d7c7ca2b-1270-41eb-8168-159fb6ccfb5c", "DetectTime": "2024-05-21T12:43:24.319535+00:00", "EventTime": "2024-05-21T12:43:24.319556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4OILe2UFKH1DCfSPa"], "accumulated_threat_level": 3.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "61b6a335-100b-4dd2-a6b1-1370d16a16c0", "DetectTime": "2024-05-21T12:43:24.331718+00:00", "EventTime": "2024-05-21T12:43:24.331739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqctla3PQqnO9VwGdh"], "accumulated_threat_level": 4.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "88175216-a034-490a-a480-e0ea974a9c97", "DetectTime": "2024-05-21T12:43:24.578092+00:00", "EventTime": "2024-05-21T12:43:24.578116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7TQ420svtqcdFEId"], "accumulated_threat_level": 4.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "9d7ee84c-6ee9-4394-a236-b6aa7a45739a", "DetectTime": "2024-05-21T12:43:24.621467+00:00", "EventTime": "2024-05-21T12:43:24.621486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.142.75.253"]}], "Attach": [{"Content": "Connection to unknown destination port 12777/UDP destination IP 175.142.75.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBeJoZgy7AapO2HT4"], "accumulated_threat_level": 5.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "66045ddc-0bcb-40a0-8c66-801d5b8a9d66", "DetectTime": "2024-05-21T12:43:24.667069+00:00", "EventTime": "2024-05-21T12:43:24.667090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUSgk89NfM54HHFth"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 129} +{"Format": "IDEA0", "ID": "e0ef24f9-25f9-45c7-9bab-795585419d01", "DetectTime": "2024-05-21T12:43:24.711575+00:00", "EventTime": "2024-05-21T12:43:24.711594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQEYkkkqtr7eCUYj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "661e5fbc-5514-46b0-8a82-8662012044e5", "DetectTime": "2024-05-21T12:43:24.759140+00:00", "EventTime": "2024-05-21T12:43:24.759161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsuLok4gewZJaiPbU9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "96b289a2-d214-4fd6-99ce-48732f44fd06", "DetectTime": "2024-05-21T12:43:24.764209+00:00", "EventTime": "2024-05-21T12:43:24.764229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGls41S9XAGah5Kpl", "CsvsF4sCjIJYbTpua", "CFRZoF1hjBGCHFmzd2", "Co4wIu4dqXktq7xf0l"], "accumulated_threat_level": 1.0, "timewindow": 130} +{"Format": "IDEA0", "ID": "b457a746-071e-444e-9864-bb4bd249e6f3", "DetectTime": "2024-05-21T12:43:24.807897+00:00", "EventTime": "2024-05-21T12:43:24.807917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYKlF8zGK4LT7SYd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "7fbfdd48-eebf-4816-90e5-d2cf127f17e9", "DetectTime": "2024-05-21T12:43:24.856620+00:00", "EventTime": "2024-05-21T12:43:24.856648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWa7HQ3Vh1jG5cNof"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "ab270c73-0e3a-4b3d-8d52-153f6dec7d7b", "DetectTime": "2024-05-21T12:43:24.904195+00:00", "EventTime": "2024-05-21T12:43:24.904218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiosDDD43jwLudBO6"], "accumulated_threat_level": 10.4, "timewindow": 129} +{"Format": "IDEA0", "ID": "be4c6009-4f23-496b-aed9-d433e7c2b978", "DetectTime": "2024-05-21T12:43:24.935865+00:00", "EventTime": "2024-05-21T12:43:24.935887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.232.5.137"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIVnm1yqCR5YzJrwj"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "827513df-5a71-4a66-8cb5-35d14fc52431", "DetectTime": "2024-05-21T12:43:24.948282+00:00", "EventTime": "2024-05-21T12:43:24.948301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.232.5.137"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.232.5.137 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBIVnm1yqCR5YzJrwj"], "accumulated_threat_level": 10.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "cbb1c44b-67b3-4f76-a8eb-e6ed6bbba296", "DetectTime": "2024-05-21T12:43:25.053270+00:00", "EventTime": "2024-05-21T12:43:25.053294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35u994DgSFV5Jaiuc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 129} +{"Format": "IDEA0", "ID": "883b1307-b5f7-47d3-b9e3-043a4fe7cc0d", "DetectTime": "2024-05-21T12:43:25.318223+00:00", "EventTime": "2024-05-21T12:43:25.318247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHur53q7yhRmVoWki"], "accumulated_threat_level": 12.000000000000002, "timewindow": 129} +{"Format": "Json", "ID": "883b1307-b5f7-47d3-b9e3-043a4fe7cc0d", "DetectTime": "2024-05-21T12:43:25.318223+00:00", "EventTime": "2024-05-21T12:43:25.318247+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "1970-01-06T08:47:09.325494+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2024/05/21 12:43:25.513631)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 129, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f0251d83-89b8-401a-b3d0-e92eab2ff445", "DetectTime": "2024-05-21T12:43:25.524432+00:00", "EventTime": "2024-05-21T12:43:25.524451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKAli38RlCphdDWKd"], "accumulated_threat_level": 0.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "c562b75e-df11-4ced-9082-2d2f69e8c184", "DetectTime": "2024-05-21T12:43:25.537594+00:00", "EventTime": "2024-05-21T12:43:25.537615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNupx13DJDCcNpaAn8"], "accumulated_threat_level": 1.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "16488610-eb1d-421c-a533-679552eb4bb4", "DetectTime": "2024-05-21T12:43:25.554910+00:00", "EventTime": "2024-05-21T12:43:25.554928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiwyH3LDRTPdObBMk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 129} +{"Format": "IDEA0", "ID": "7f0065d8-0525-49e1-9d2f-a89db153c4bd", "DetectTime": "2024-05-21T12:43:25.565685+00:00", "EventTime": "2024-05-21T12:43:25.565704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNR4621AS46Gi4st5"], "accumulated_threat_level": 3.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "3a725073-d6c8-459f-b753-66d36a88efa3", "DetectTime": "2024-05-21T12:43:25.591730+00:00", "EventTime": "2024-05-21T12:43:25.591748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xvoUC9zRjK8vUE6"], "accumulated_threat_level": 4.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "9eb44b3c-f419-4eb9-91c2-e22a176b1640", "DetectTime": "2024-05-21T12:43:25.637213+00:00", "EventTime": "2024-05-21T12:43:25.637231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COR6ac17TvSAF1VXQc"], "accumulated_threat_level": 4.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "846fee73-a7a4-44e4-a8c9-83d2ad4d30a2", "DetectTime": "2024-05-21T12:43:25.683642+00:00", "EventTime": "2024-05-21T12:43:25.683663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYejQFZ488haeEhi"], "accumulated_threat_level": 5.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "8e178724-6f88-48ec-b79b-7848c14d2e79", "DetectTime": "2024-05-21T12:43:25.736520+00:00", "EventTime": "2024-05-21T12:43:25.736541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qsjiZdWelNxqgh5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 129} +{"Format": "IDEA0", "ID": "59d40e3c-e30f-46d1-802c-721f31b61afa", "DetectTime": "2024-05-21T12:43:26.071124+00:00", "EventTime": "2024-05-21T12:43:26.071148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFWOUftY6MN7MBAi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "116cb909-a037-4fc9-bb5c-2176ef41e690", "DetectTime": "2024-05-21T12:43:26.117910+00:00", "EventTime": "2024-05-21T12:43:26.117933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTngcl3f5jLCnteSQg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "7355e802-1154-40c5-9498-f3af48179718", "DetectTime": "2024-05-21T12:43:26.164178+00:00", "EventTime": "2024-05-21T12:43:26.164201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzskUV3QSAVJrudwie"], "accumulated_threat_level": 8.799999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "432fbd4a-e1a5-4f52-a126-c518c1d4e028", "DetectTime": "2024-05-21T12:43:26.215063+00:00", "EventTime": "2024-05-21T12:43:26.215084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KCJo3kJtYeUOOXLk"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "fcb67cae-1ac0-477a-8e54-99b537e6e863", "DetectTime": "2024-05-21T12:43:26.257395+00:00", "EventTime": "2024-05-21T12:43:26.257415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVeTD4JeZZrxwjG5k"], "accumulated_threat_level": 10.4, "timewindow": 129} +{"Format": "IDEA0", "ID": "30aed3a7-398f-43fd-9be6-6bd0fb135ab6", "DetectTime": "2024-05-21T12:43:26.308283+00:00", "EventTime": "2024-05-21T12:43:26.308306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct6LPI2hB1h4TIEFrc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 129} +{"Format": "IDEA0", "ID": "e2b97bf9-379f-486a-a7d4-e8a5e9a71a92", "DetectTime": "2024-05-21T12:43:26.352006+00:00", "EventTime": "2024-05-21T12:43:26.352027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqfNos0bbV5OaMFci"], "accumulated_threat_level": 12.000000000000002, "timewindow": 129} +{"Format": "Json", "ID": "e2b97bf9-379f-486a-a7d4-e8a5e9a71a92", "DetectTime": "2024-05-21T12:43:26.352006+00:00", "EventTime": "2024-05-21T12:43:26.352027+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-06T08:47:49.918338+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2024/05/21 12:43:26.589392)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 129, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6b0a5b07-2bc7-432b-8bbe-4f217cda0481", "DetectTime": "2024-05-21T12:43:26.625849+00:00", "EventTime": "2024-05-21T12:43:26.625880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0v9Fe1ASXw6v2of"], "accumulated_threat_level": 0.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "e081e2fb-a3d2-45ab-b92b-49998fc797ed", "DetectTime": "2024-05-21T12:43:26.638235+00:00", "EventTime": "2024-05-21T12:43:26.638257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFVYa4AWJI0Bc8Ygb"], "accumulated_threat_level": 1.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "22664639-32be-4807-9dff-f24a7f361e0f", "DetectTime": "2024-05-21T12:43:26.767179+00:00", "EventTime": "2024-05-21T12:43:26.767201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVubuuHC8vKzlrt79"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 129} +{"Format": "IDEA0", "ID": "65821d7e-7e85-454a-8167-032d22182525", "DetectTime": "2024-05-21T12:43:26.806630+00:00", "EventTime": "2024-05-21T12:43:26.806654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfgF8k4hrPnnTwENN"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "6427936c-6b25-41f3-b54c-50fe49fbcca9", "DetectTime": "2024-05-21T12:43:26.851039+00:00", "EventTime": "2024-05-21T12:43:26.851059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG3YZu79lzqXaEEOi"], "accumulated_threat_level": 3.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "a22ae13a-30c2-48f5-9df3-3c8d97137e00", "DetectTime": "2024-05-21T12:43:26.896655+00:00", "EventTime": "2024-05-21T12:43:26.896677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlST02jHtk2QLxLfg"], "accumulated_threat_level": 4.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "77a7e089-8e7d-47e8-a46c-347981b7172a", "DetectTime": "2024-05-21T12:43:26.942198+00:00", "EventTime": "2024-05-21T12:43:26.942218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuh88O24oWLG839Ynf"], "accumulated_threat_level": 4.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "ea17f1ef-2a6e-4367-b120-3adc600e4df5", "DetectTime": "2024-05-21T12:43:26.986030+00:00", "EventTime": "2024-05-21T12:43:26.986050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBFXhi7VrsDr1DGg"], "accumulated_threat_level": 5.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "830775b0-de77-4295-a3f9-38dfb849a49f", "DetectTime": "2024-05-21T12:43:27.033787+00:00", "EventTime": "2024-05-21T12:43:27.033813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9Mv9406tp3KI3fi7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 129} +{"Format": "IDEA0", "ID": "6b4d4613-6d9a-4e71-978e-efe15e56e4dd", "DetectTime": "2024-05-21T12:43:27.081600+00:00", "EventTime": "2024-05-21T12:43:27.081622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuUBY3UAR8c7EtOw"], "accumulated_threat_level": 7.199999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "abcb5412-5b0a-45cc-ae43-67850d53f74c", "DetectTime": "2024-05-21T12:43:27.369141+00:00", "EventTime": "2024-05-21T12:43:27.369162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZA1MU2Pbp53ycCfF3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "af50419e-9bbc-47dd-855f-a66ff1ba36f9", "DetectTime": "2024-05-21T12:43:27.415391+00:00", "EventTime": "2024-05-21T12:43:27.415414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJnjSl3H7larWq2t4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "db2e2f9f-601d-4de4-9fdc-81f120e3e091", "DetectTime": "2024-05-21T12:43:27.467548+00:00", "EventTime": "2024-05-21T12:43:27.467571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wkIW2gmEHI5tXsc8"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "55af0a77-717a-432d-a8fb-364ffb5e3e16", "DetectTime": "2024-05-21T12:43:27.514607+00:00", "EventTime": "2024-05-21T12:43:27.514634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQEtY3o3veOhm3Tsl"], "accumulated_threat_level": 10.4, "timewindow": 129} +{"Format": "IDEA0", "ID": "81e895d8-1cc6-4738-be5d-cce8df0ef996", "DetectTime": "2024-05-21T12:43:27.567318+00:00", "EventTime": "2024-05-21T12:43:27.567337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpT7735Asp2jSQu5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 129} +{"Format": "IDEA0", "ID": "7faad0a2-7670-4742-a550-8ed4d8e4e2f4", "DetectTime": "2024-05-21T12:43:27.610780+00:00", "EventTime": "2024-05-21T12:43:27.610799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoVhAT3djMyc8YiAMg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 129} +{"Format": "Json", "ID": "7faad0a2-7670-4742-a550-8ed4d8e4e2f4", "DetectTime": "2024-05-21T12:43:27.610780+00:00", "EventTime": "2024-05-21T12:43:27.610799+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "1970-01-06T08:47:54.434320+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 129. (real time 2024/05/21 12:43:28.082257)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 129, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "90f5afa1-88d9-47b7-8e64-c1494c2f4efd", "DetectTime": "2024-05-21T12:43:28.092811+00:00", "EventTime": "2024-05-21T12:43:28.092830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZOMx1EkvJhI3Eeo5"], "accumulated_threat_level": 0.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "2cbbb57e-b6e2-4991-a0bf-01c2b72a2622", "DetectTime": "2024-05-21T12:43:28.103910+00:00", "EventTime": "2024-05-21T12:43:28.103929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.166.194.69"]}], "Attach": [{"Content": "Connection to unknown destination port 10635/UDP destination IP 125.166.194.69. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4yt86xchc8x19EGb"], "accumulated_threat_level": 1.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "8612879a-5711-40ef-ad9e-556b8ba7b776", "DetectTime": "2024-05-21T12:43:28.114589+00:00", "EventTime": "2024-05-21T12:43:28.114608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvcsug36cG09U9y8u7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 129} +{"Format": "IDEA0", "ID": "bd7d178d-edf2-43ec-a202-60956a060c52", "DetectTime": "2024-05-21T12:43:28.119527+00:00", "EventTime": "2024-05-21T12:43:28.119545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.214.58.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C43h3KYE4dKP7t4pk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "23dfd074-680b-43c0-b03f-3a3f5787c9f8", "DetectTime": "2024-05-21T12:43:28.130192+00:00", "EventTime": "2024-05-21T12:43:28.130210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8Vkq2ZKp0fMqXvX9"], "accumulated_threat_level": 3.2, "timewindow": 129} +{"Format": "IDEA0", "ID": "f015ec76-692d-4814-85be-f644251fc297", "DetectTime": "2024-05-21T12:43:28.141234+00:00", "EventTime": "2024-05-21T12:43:28.141252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPD8llYIJiYQ8YyHi"], "accumulated_threat_level": 4.0, "timewindow": 129} +{"Format": "IDEA0", "ID": "81187493-cb38-4138-ad98-8c2745153fa7", "DetectTime": "2024-05-21T12:43:28.153659+00:00", "EventTime": "2024-05-21T12:43:28.153678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKPbx2NykKmaF37de"], "accumulated_threat_level": 4.8, "timewindow": 129} +{"Format": "IDEA0", "ID": "14a30bbc-5d76-4ddb-bf7a-0294e280886d", "DetectTime": "2024-05-21T12:43:28.284843+00:00", "EventTime": "2024-05-21T12:43:28.284862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRsB9c4mWs7NW2478e"], "accumulated_threat_level": 5.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c54684f2-cba8-4b79-9c38-c7c7966329f2", "DetectTime": "2024-05-21T12:43:28.334795+00:00", "EventTime": "2024-05-21T12:43:28.334831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTFrsagQ6uyWjaCrj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 129} +{"Format": "IDEA0", "ID": "21cd9e25-38a4-45ce-af96-bc5ec4f2b3d3", "DetectTime": "2024-05-21T12:43:28.381826+00:00", "EventTime": "2024-05-21T12:43:28.381849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["36.74.96.108"]}], "Attach": [{"Content": "Connection to unknown destination port 14433/UDP destination IP 36.74.96.108. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJB8K74rofLCPU5PO6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "4f044500-de7b-4af1-8f73-0178c73b2e1e", "DetectTime": "2024-05-21T12:43:28.554984+00:00", "EventTime": "2024-05-21T12:43:28.555020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce69pVBHrcuXcsgrg", "CuaRvC1bKO0mHpxtj7", "ChqONesm1i7FID7sd", "CbtEA24OlhwxXVTEo3"], "accumulated_threat_level": 1.5, "timewindow": 130} +{"Format": "IDEA0", "ID": "e02f4795-3f3b-4985-be2d-057dd228ebc5", "DetectTime": "2024-05-21T12:43:28.656826+00:00", "EventTime": "2024-05-21T12:43:28.656855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["186.95.34.99"]}], "Attach": [{"Content": "Connection to unknown destination port 2810/UDP destination IP 186.95.34.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQaJi2tkx2WAptEfl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "0f7c404a-020e-4658-a9ca-d5640df77c80", "DetectTime": "2024-05-21T12:43:28.705665+00:00", "EventTime": "2024-05-21T12:43:28.705698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3sd8D4Oft5Z2tkJ4g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 129} +{"Format": "IDEA0", "ID": "d9686816-663b-4265-92e9-2768e0458ff7", "DetectTime": "2024-05-21T12:43:28.753019+00:00", "EventTime": "2024-05-21T12:43:28.753054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVhOh3WugSsVWbOLk"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b4999e1c-419c-4f3e-96f8-e6987ee5d483", "DetectTime": "2024-05-21T12:43:28.951985+00:00", "EventTime": "2024-05-21T12:43:28.952022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMFDw3bhzQv4Oer3"], "accumulated_threat_level": 2.3, "timewindow": 130} +{"Format": "IDEA0", "ID": "a2499adc-029d-4de9-91fd-c9658c713280", "DetectTime": "2024-05-21T12:43:28.987093+00:00", "EventTime": "2024-05-21T12:43:28.987126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAzefuwOuhFBt5fc"], "accumulated_threat_level": 3.0999999999999996, "timewindow": 130} +{"Format": "IDEA0", "ID": "00566209-fd05-4681-8958-8e074ff9f602", "DetectTime": "2024-05-21T12:43:29.034434+00:00", "EventTime": "2024-05-21T12:43:29.034468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYFQu3eWDEfJI1tz2"], "accumulated_threat_level": 3.8999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "23166f3c-8eb3-4088-9f7d-74045f3667ad", "DetectTime": "2024-05-21T12:43:29.082655+00:00", "EventTime": "2024-05-21T12:43:29.082697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp6kzVeFm8Uuwocnf"], "accumulated_threat_level": 4.699999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "ffe07c11-56f3-4b07-9c6d-bc684ed50f4c", "DetectTime": "2024-05-21T12:43:29.130835+00:00", "EventTime": "2024-05-21T12:43:29.130870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXBegQN9ee6zR2Hc"], "accumulated_threat_level": 5.499999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "1c7ee282-2724-4486-a234-c8f81f41208b", "DetectTime": "2024-05-21T12:43:29.176462+00:00", "EventTime": "2024-05-21T12:43:29.176497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34740310pJ8ACyR82"], "accumulated_threat_level": 6.299999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "75d0e803-a773-44dd-bb6f-e986f050b7f3", "DetectTime": "2024-05-21T12:43:29.462042+00:00", "EventTime": "2024-05-21T12:43:29.462071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGIuHNFnhcA6rHbBh"], "accumulated_threat_level": 7.099999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "3d957853-1467-4e5e-a6cc-50b2ddacef65", "DetectTime": "2024-05-21T12:43:29.509254+00:00", "EventTime": "2024-05-21T12:43:29.509284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhI4U1Tksv6pfC4N6"], "accumulated_threat_level": 7.899999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "fa6491e3-bde2-47a4-8bf1-e8de81261e06", "DetectTime": "2024-05-21T12:43:29.558401+00:00", "EventTime": "2024-05-21T12:43:29.558433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQw83H5onHNnxH8"], "accumulated_threat_level": 8.7, "timewindow": 130} +{"Format": "IDEA0", "ID": "e6f92153-30be-4b61-be8e-114cad5f74aa", "DetectTime": "2024-05-21T12:43:29.705830+00:00", "EventTime": "2024-05-21T12:43:29.705853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGPRZY7WxGbACenn2"], "accumulated_threat_level": 9.5, "timewindow": 130} +{"Format": "IDEA0", "ID": "b1eac087-c9ae-4015-9210-94305460e8ae", "DetectTime": "2024-05-21T12:43:29.751402+00:00", "EventTime": "2024-05-21T12:43:29.751422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU3wPI1SlmOtrSEFpb"], "accumulated_threat_level": 10.3, "timewindow": 130} +{"Format": "IDEA0", "ID": "d14007fc-d00a-4a9c-9466-67b544fa7fd8", "DetectTime": "2024-05-21T12:43:29.795521+00:00", "EventTime": "2024-05-21T12:43:29.795542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkKp14e4NfqNDeA1k"], "accumulated_threat_level": 11.100000000000001, "timewindow": 130} +{"Format": "IDEA0", "ID": "49a5db5a-d704-4cf3-9f76-df969d381c40", "DetectTime": "2024-05-21T12:43:29.845840+00:00", "EventTime": "2024-05-21T12:43:29.845858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVU70t3qIihnB8Rxo6"], "accumulated_threat_level": 11.900000000000002, "timewindow": 130} +{"Format": "IDEA0", "ID": "012ece35-a8f4-4303-bfef-f444fd778e17", "DetectTime": "2024-05-21T12:43:29.887270+00:00", "EventTime": "2024-05-21T12:43:29.887298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWS0502OmuGE0WLz4d"], "accumulated_threat_level": 12.700000000000003, "timewindow": 130} +{"Format": "Json", "ID": "012ece35-a8f4-4303-bfef-f444fd778e17", "DetectTime": "2024-05-21T12:43:29.887270+00:00", "EventTime": "2024-05-21T12:43:29.887298+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "1970-01-06T09:19:07.478246+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2024/05/21 12:43:30.186015)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.700000000000003, "timewindow": 130, "profileid": "profile_10.0.2.19", "threat_level": 12.700000000000003} +{"Format": "IDEA0", "ID": "fd232937-d306-46cf-bc62-f081f9a01aab", "DetectTime": "2024-05-21T12:43:30.209274+00:00", "EventTime": "2024-05-21T12:43:30.209294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmWSxVw1b26M0TKg"], "accumulated_threat_level": 0.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "1232b966-8261-4292-b326-4f92ab2a4fd3", "DetectTime": "2024-05-21T12:43:30.222343+00:00", "EventTime": "2024-05-21T12:43:30.222362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA6ZOraan8ZT3ytU9"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "2eef5886-9569-4562-9e9c-3659b3d5d26f", "DetectTime": "2024-05-21T12:43:30.254581+00:00", "EventTime": "2024-05-21T12:43:30.254600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNihKA3URPUY43Bvzh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 130} +{"Format": "IDEA0", "ID": "f15ddb6b-faad-4b81-90fb-b2869beab74a", "DetectTime": "2024-05-21T12:43:30.302349+00:00", "EventTime": "2024-05-21T12:43:30.302367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggGC31h5Z9wVYdBg5"], "accumulated_threat_level": 3.2, "timewindow": 130} +{"Format": "IDEA0", "ID": "75438068-74fc-4d8b-8d43-e28f065dbb47", "DetectTime": "2024-05-21T12:43:30.357201+00:00", "EventTime": "2024-05-21T12:43:30.357220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yG3h3XNHx1LdAA7a"], "accumulated_threat_level": 4.0, "timewindow": 130} +{"Format": "IDEA0", "ID": "cf676d11-8530-4795-a38f-8d7761794810", "DetectTime": "2024-05-21T12:43:30.398184+00:00", "EventTime": "2024-05-21T12:43:30.398201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3zJ5BbqQGvgaLdyl"], "accumulated_threat_level": 4.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "38eb6e6d-44d4-4058-bf06-20c9a450a573", "DetectTime": "2024-05-21T12:43:30.445434+00:00", "EventTime": "2024-05-21T12:43:30.445453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVVrj2ScOMc5yzfMg"], "accumulated_threat_level": 5.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "63feffdc-d6be-4f99-9c24-33e28461f439", "DetectTime": "2024-05-21T12:43:30.491609+00:00", "EventTime": "2024-05-21T12:43:30.491630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Iqq91zO6cXb76zI7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "3072c254-e275-46d2-b1b0-8c2f834cc83f", "DetectTime": "2024-05-21T12:43:30.538500+00:00", "EventTime": "2024-05-21T12:43:30.538519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvBy742qIocaG1FA8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "630e1e53-85ad-4373-a1dd-09f666309120", "DetectTime": "2024-05-21T12:43:30.812478+00:00", "EventTime": "2024-05-21T12:43:30.812499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZZr43HsloJq9GeSb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "1086e329-f283-4358-a773-b6e27193fb41", "DetectTime": "2024-05-21T12:43:30.853399+00:00", "EventTime": "2024-05-21T12:43:30.853421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdgzrBn58sKJ0wU3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "c442a2b9-8e10-46a3-b8c4-793e65deb108", "DetectTime": "2024-05-21T12:43:30.900580+00:00", "EventTime": "2024-05-21T12:43:30.900600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["68.72.218.141"]}], "Attach": [{"Content": "Connection to unknown destination port 8624/UDP destination IP 68.72.218.141. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIS6bj1BInMTaVb804"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "d4d259c2-39c8-423b-8a49-32b7ffd07c19", "DetectTime": "2024-05-21T12:43:30.946173+00:00", "EventTime": "2024-05-21T12:43:30.946194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWc7iGg1uXoBeo3s7"], "accumulated_threat_level": 9.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "bd46e225-3c71-48bf-bf92-21658627a5ed", "DetectTime": "2024-05-21T12:43:30.991594+00:00", "EventTime": "2024-05-21T12:43:30.991616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NQx74VPPm3GvzWL1"], "accumulated_threat_level": 10.4, "timewindow": 130} +{"Format": "IDEA0", "ID": "83219e01-2566-4f04-b885-81e978bd5e56", "DetectTime": "2024-05-21T12:43:31.042031+00:00", "EventTime": "2024-05-21T12:43:31.042049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54Ffv1Q7nyAYpk4I3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 130} +{"Format": "IDEA0", "ID": "b55274f0-0ab2-44ba-805e-e61d0585b43a", "DetectTime": "2024-05-21T12:43:31.087425+00:00", "EventTime": "2024-05-21T12:43:31.087444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ0jre4cyWkk46B74b"], "accumulated_threat_level": 12.000000000000002, "timewindow": 130} +{"Format": "Json", "ID": "b55274f0-0ab2-44ba-805e-e61d0585b43a", "DetectTime": "2024-05-21T12:43:31.087425+00:00", "EventTime": "2024-05-21T12:43:31.087444+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "1970-01-06T09:19:12.802896+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2024/05/21 12:43:31.251724)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 130, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "208d536e-2b83-4b0a-8e3f-50edd5104734", "DetectTime": "2024-05-21T12:43:31.301563+00:00", "EventTime": "2024-05-21T12:43:31.301594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VmTx25GfK14bp6Gd"], "accumulated_threat_level": 0.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "a1843a44-b18d-4590-923c-73e8968ec7fc", "DetectTime": "2024-05-21T12:43:31.315044+00:00", "EventTime": "2024-05-21T12:43:31.315073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDVZGJh7DVwKyEOr5"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "24234911-1ba4-4dd0-9d99-a8dd586d8e61", "DetectTime": "2024-05-21T12:43:31.512954+00:00", "EventTime": "2024-05-21T12:43:31.512977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSOu02Y8gurGughY4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 130} +{"Format": "IDEA0", "ID": "f8d0d2a5-3087-4636-aea5-644ee0796f40", "DetectTime": "2024-05-21T12:43:31.560775+00:00", "EventTime": "2024-05-21T12:43:31.560794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJF4h1U2klFydLoeg"], "accumulated_threat_level": 3.2, "timewindow": 130} +{"Format": "IDEA0", "ID": "b8cdedc6-9715-4322-8b4a-412525e34bf3", "DetectTime": "2024-05-21T12:43:31.608016+00:00", "EventTime": "2024-05-21T12:43:31.608045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDClIC4D5bZFJkYcj3"], "accumulated_threat_level": 4.0, "timewindow": 130} +{"Format": "IDEA0", "ID": "f31fa33c-cac2-4ba0-8522-06988c29d9e8", "DetectTime": "2024-05-21T12:43:31.654630+00:00", "EventTime": "2024-05-21T12:43:31.654650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["180.241.169.218"]}], "Attach": [{"Content": "Connection to unknown destination port 13801/UDP destination IP 180.241.169.218. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkDNJs2schFToBWdjd"], "accumulated_threat_level": 4.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "ef990036-0d1b-4645-94f2-4d837c746274", "DetectTime": "2024-05-21T12:43:31.700916+00:00", "EventTime": "2024-05-21T12:43:31.700938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKg1d4qljNAc0n2I7"], "accumulated_threat_level": 5.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "a5a2b1b8-e3d0-4944-95d6-e1c21157ed27", "DetectTime": "2024-05-21T12:43:31.749964+00:00", "EventTime": "2024-05-21T12:43:31.749983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEDFP2qXq1qSGDXhk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "5afe89ce-f28a-484e-a768-76d1cf39df1e", "DetectTime": "2024-05-21T12:43:31.795861+00:00", "EventTime": "2024-05-21T12:43:31.795882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkrF9lkYhxoC2bV39"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "936a9884-fe8d-44ff-ad58-a14bcc595807", "DetectTime": "2024-05-21T12:43:31.869658+00:00", "EventTime": "2024-05-21T12:43:31.869681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfR3n02sJE4Neq3uxa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "f691f146-85ca-4bff-8d7b-c51d68643403", "DetectTime": "2024-05-21T12:43:31.927652+00:00", "EventTime": "2024-05-21T12:43:31.927671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIEi582GUd1LU3F9Tc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "384f1ed5-a089-4763-b0b8-8cf03ad24543", "DetectTime": "2024-05-21T12:43:32.427554+00:00", "EventTime": "2024-05-21T12:43:32.427573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxH5FW31mfsTL8I7F5"], "accumulated_threat_level": 9.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "4204eb8f-5c54-4e1d-878d-3845687182d4", "DetectTime": "2024-05-21T12:43:32.462852+00:00", "EventTime": "2024-05-21T12:43:32.462876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRgIB4ZqK0UcJWXSd"], "accumulated_threat_level": 10.4, "timewindow": 130} +{"Format": "IDEA0", "ID": "35de74dc-feb9-412b-a386-a1f1dae0c86d", "DetectTime": "2024-05-21T12:43:32.510020+00:00", "EventTime": "2024-05-21T12:43:32.510040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4KKtstFhY3EV99q7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 130} +{"Format": "IDEA0", "ID": "d3441c03-7ca5-4493-9d39-1145e4902819", "DetectTime": "2024-05-21T12:43:32.557590+00:00", "EventTime": "2024-05-21T12:43:32.557609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpygOh2Z6yRQccXfN9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 130} +{"Format": "Json", "ID": "d3441c03-7ca5-4493-9d39-1145e4902819", "DetectTime": "2024-05-21T12:43:32.557590+00:00", "EventTime": "2024-05-21T12:43:32.557609+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "1970-01-06T09:51:30.607730+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2024/05/21 12:43:32.825563)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 130, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "52df6b77-d60e-4751-91c7-b22b28b59b56", "DetectTime": "2024-05-21T12:43:32.838891+00:00", "EventTime": "2024-05-21T12:43:32.838912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvtw3w3SJs1Qntmw42"], "accumulated_threat_level": 0.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "ee7eb193-d537-47bc-8b3d-aa0653aad761", "DetectTime": "2024-05-21T12:43:32.858444+00:00", "EventTime": "2024-05-21T12:43:32.858463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifPeN1KMmj0QoEopb"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "169aa7b2-9a17-4019-9747-a8cacc6a5978", "DetectTime": "2024-05-21T12:43:32.864019+00:00", "EventTime": "2024-05-21T12:43:32.864038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaKNwG1xibLeNGPIK5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "7ebe8f7c-266e-4b86-a23d-2577f68761b7", "DetectTime": "2024-05-21T12:43:32.876697+00:00", "EventTime": "2024-05-21T12:43:32.876717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjwCB10fFFEHfYzP4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 130} +{"Format": "IDEA0", "ID": "2dbeeb1b-b8ad-444a-b41e-4c8ff6d09bd1", "DetectTime": "2024-05-21T12:43:32.888074+00:00", "EventTime": "2024-05-21T12:43:32.888093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaDr72MrJbVRQOwbk"], "accumulated_threat_level": 3.2, "timewindow": 130} +{"Format": "IDEA0", "ID": "440255d9-01e9-416d-88c7-be0d12ebfa7c", "DetectTime": "2024-05-21T12:43:33.112400+00:00", "EventTime": "2024-05-21T12:43:33.112420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJA3u02gRgUvcyWsQ5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "a6f7894c-302c-4566-b129-cca1f8f32104", "DetectTime": "2024-05-21T12:43:33.117707+00:00", "EventTime": "2024-05-21T12:43:33.117726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLG6ep2Le3B0Zg8Jz4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "d27d26ef-cdee-45df-a7b5-d2df0cf1388a", "DetectTime": "2024-05-21T12:43:33.186016+00:00", "EventTime": "2024-05-21T12:43:33.186035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ZCJw3EcqoMelAsa7"], "accumulated_threat_level": 4.0, "timewindow": 130} +{"Format": "IDEA0", "ID": "04bf0be9-06fa-4b5a-abf6-3e92e0d60e1c", "DetectTime": "2024-05-21T12:43:33.234146+00:00", "EventTime": "2024-05-21T12:43:33.234165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKEv03OrgflWLIoPf"], "accumulated_threat_level": 4.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "0d1bb978-42e8-418c-93c0-f0b475954702", "DetectTime": "2024-05-21T12:43:33.280639+00:00", "EventTime": "2024-05-21T12:43:33.280657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVRvM3UnfE7gaAye5"], "accumulated_threat_level": 5.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "8c3d2e32-2152-4970-bd56-f902c410666c", "DetectTime": "2024-05-21T12:43:33.315150+00:00", "EventTime": "2024-05-21T12:43:33.315172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NosH2LyR0N17jtyb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "4a77d620-4282-43a4-8fc8-50b1c8a04fcf", "DetectTime": "2024-05-21T12:43:33.352676+00:00", "EventTime": "2024-05-21T12:43:33.352696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4BzeA4UXrqbaoKQaf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "ecd783a7-9b22-46eb-8844-e453ee490b3c", "DetectTime": "2024-05-21T12:43:33.387842+00:00", "EventTime": "2024-05-21T12:43:33.387863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdjhpX1UV9w5uGv5Wh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "55af4e87-d98b-4fc6-a451-df8504f847d0", "DetectTime": "2024-05-21T12:43:33.432210+00:00", "EventTime": "2024-05-21T12:43:33.432228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzSfw632mpHZ2OLS0g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "dc8e7ec8-0f5e-48bd-ada8-ac3e914f45fa", "DetectTime": "2024-05-21T12:43:33.563468+00:00", "EventTime": "2024-05-21T12:43:33.563489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRPIg8TSmJRTFZs4", "Cm1ujb2msmYsrHVyBe", "C26tET2g4mccOnUux3", "Cd4C4o4YdCCsMdXjqk"], "accumulated_threat_level": 0.5, "timewindow": 131} +{"Format": "IDEA0", "ID": "e358a406-7a22-4cba-8393-fa6b7183931b", "DetectTime": "2024-05-21T12:43:33.740705+00:00", "EventTime": "2024-05-21T12:43:33.740726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMLehE6zhaZQGSWl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "5d4e9166-3f52-4462-8c8c-6e1213e58c5a", "DetectTime": "2024-05-21T12:43:33.747257+00:00", "EventTime": "2024-05-21T12:43:33.747276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcybIGuLBmNvukxrg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "b197bd04-2a3f-4fc1-b327-120417d7c5cc", "DetectTime": "2024-05-21T12:43:33.752122+00:00", "EventTime": "2024-05-21T12:43:33.752140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJw6W2cZSpkVTkVU6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "487d4d0c-0ecf-4e03-9026-cc613d0451ff", "DetectTime": "2024-05-21T12:43:33.757096+00:00", "EventTime": "2024-05-21T12:43:33.757114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuQsNf4LLB8jsA7yOf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "57c7b17e-f19c-45fd-9942-72def7795d45", "DetectTime": "2024-05-21T12:43:33.762026+00:00", "EventTime": "2024-05-21T12:43:33.762046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNTy04mQ3DHYctkm3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "afba974a-e70c-4552-ac42-dac668cb7119", "DetectTime": "2024-05-21T12:43:33.870790+00:00", "EventTime": "2024-05-21T12:43:33.870814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpNQiPMY4zV9M60uh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "6550fa89-e913-49a1-a346-37df28a81d37", "DetectTime": "2024-05-21T12:43:33.888256+00:00", "EventTime": "2024-05-21T12:43:33.888276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6whSy2uOLDbO8s5pa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "c71f28cb-a204-475e-9692-a3bc040dbe6e", "DetectTime": "2024-05-21T12:43:34.228554+00:00", "EventTime": "2024-05-21T12:43:34.228574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.176.133.96"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CikDho2IpguoVXp39b"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "36bc66f1-e0ec-41d2-a812-3b4df5d4dba8", "DetectTime": "2024-05-21T12:43:34.255420+00:00", "EventTime": "2024-05-21T12:43:34.255448+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.176.133.96"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.176.133.96 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CikDho2IpguoVXp39b"], "accumulated_threat_level": 11.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "989b5524-23d0-4ea3-8045-2b6d101db236", "DetectTime": "2024-05-21T12:43:34.279917+00:00", "EventTime": "2024-05-21T12:43:34.279937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd00ax1lX1oUs9htd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "9095e8ba-2eaa-42a7-9b0e-46d91d23224e", "DetectTime": "2024-05-21T12:43:34.361802+00:00", "EventTime": "2024-05-21T12:43:34.361829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWLQY2zJR8YhssIL6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "a6e7b991-6081-40e4-8a88-1077c946e56f", "DetectTime": "2024-05-21T12:43:34.368241+00:00", "EventTime": "2024-05-21T12:43:34.368262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEuGMX8CinFJsITb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "66bbc5c3-97e1-4259-af7f-249b9c780f3e", "DetectTime": "2024-05-21T12:43:34.375314+00:00", "EventTime": "2024-05-21T12:43:34.375336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YCEL2SvfUJ4QC92b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "cab8ffae-0179-46ef-8be4-84cec2fea117", "DetectTime": "2024-05-21T12:43:34.381048+00:00", "EventTime": "2024-05-21T12:43:34.381067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqDGTK3wSlMCmogmK4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "cb97ad99-8c7b-4e35-8f90-3502841913d7", "DetectTime": "2024-05-21T12:43:34.385996+00:00", "EventTime": "2024-05-21T12:43:34.386014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR5ylXe574i8Rguic"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "04b298f5-924c-4a06-a4e8-88029a597f30", "DetectTime": "2024-05-21T12:43:34.394926+00:00", "EventTime": "2024-05-21T12:43:34.394945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF74dp3KstpwwkwD2c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "90d59ec6-8a52-421e-93e6-1d53accdce8a", "DetectTime": "2024-05-21T12:43:34.411978+00:00", "EventTime": "2024-05-21T12:43:34.412003+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhaAl1RxOyHipvoY4"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "cba55aef-8f4b-4363-9fb0-35cdaf90e802", "DetectTime": "2024-05-21T12:43:34.426034+00:00", "EventTime": "2024-05-21T12:43:34.426065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhaAl1RxOyHipvoY4"], "accumulated_threat_level": 11.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "80b3fa27-b029-4956-a074-ee87d2bacdb4", "DetectTime": "2024-05-21T12:43:34.486827+00:00", "EventTime": "2024-05-21T12:43:34.486846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwtMf93KDZ7ywbD4Ia"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "74379d04-c8ed-4366-8009-0c21d2bc9eb6", "DetectTime": "2024-05-21T12:43:34.543659+00:00", "EventTime": "2024-05-21T12:43:34.543684+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsXff1A4i32WhMMmd"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "56cce797-79d1-4160-8434-097043b9303e", "DetectTime": "2024-05-21T12:43:34.556739+00:00", "EventTime": "2024-05-21T12:43:34.556760+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdsXff1A4i32WhMMmd"], "accumulated_threat_level": 12.0, "timewindow": 29} +{"Format": "Json", "ID": "56cce797-79d1-4160-8434-097043b9303e", "DetectTime": "2024-05-21T12:43:34.556739+00:00", "EventTime": "2024-05-21T12:43:34.556760+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "1970-01-02T04:41:43.435287+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 29. (real time 2024/05/21 12:43:34.828526)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 29, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "7ee28da1-3f97-4169-8533-0593bd4c836f", "DetectTime": "2024-05-21T12:43:34.841201+00:00", "EventTime": "2024-05-21T12:43:34.841221+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcz1V12DuDSmFWlyl"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "83e875ad-ada7-49fe-9f20-dd88461e5752", "DetectTime": "2024-05-21T12:43:34.855333+00:00", "EventTime": "2024-05-21T12:43:34.855367+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYcz1V12DuDSmFWlyl"], "accumulated_threat_level": 0.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "3a45641f-ed7a-4ba0-81a4-a3be8f31545e", "DetectTime": "2024-05-21T12:43:34.861148+00:00", "EventTime": "2024-05-21T12:43:34.861166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvoHCy3lmEZWI6auNh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "40b267d8-3f2b-4c73-a6ae-6795ffd00582", "DetectTime": "2024-05-21T12:43:34.875153+00:00", "EventTime": "2024-05-21T12:43:34.875175+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoeiJu1vLQyZcHz9B5"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "1fe78138-eb21-449d-adb9-d0a2d3c31e4e", "DetectTime": "2024-05-21T12:43:34.890630+00:00", "EventTime": "2024-05-21T12:43:34.890661+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoeiJu1vLQyZcHz9B5"], "accumulated_threat_level": 1.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "f1681403-1b2a-42c2-8a81-05a6d6ef7ef4", "DetectTime": "2024-05-21T12:43:34.904897+00:00", "EventTime": "2024-05-21T12:43:34.904916+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGya8O3cDmHzg9fSB2"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "87c5de5c-6360-4163-ade2-cc3c7883ffe8", "DetectTime": "2024-05-21T12:43:34.919558+00:00", "EventTime": "2024-05-21T12:43:34.919593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGya8O3cDmHzg9fSB2"], "accumulated_threat_level": 1.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "d347fd43-5ab0-434c-a093-92a9cbab8e65", "DetectTime": "2024-05-21T12:43:34.926600+00:00", "EventTime": "2024-05-21T12:43:34.926622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxG6sd1LniiE7fvT48"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "5c81145d-50ff-43b2-acc1-0889b7ddd34a", "DetectTime": "2024-05-21T12:43:34.940876+00:00", "EventTime": "2024-05-21T12:43:34.940898+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiBAXv3R9dDnzE4uRd"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "a485c333-8ded-4e5e-b276-3f60642a1db4", "DetectTime": "2024-05-21T12:43:34.954674+00:00", "EventTime": "2024-05-21T12:43:34.954693+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiBAXv3R9dDnzE4uRd"], "accumulated_threat_level": 2.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "f93091bf-1686-4a64-aba1-3f8baf1ae205", "DetectTime": "2024-05-21T12:43:34.960047+00:00", "EventTime": "2024-05-21T12:43:34.960066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIfrq3qsVLJT9dLvd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "7e0bc6a7-e077-4457-9b5b-eb8eaa7b7452", "DetectTime": "2024-05-21T12:43:34.964894+00:00", "EventTime": "2024-05-21T12:43:34.964912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdCu831scj3lsAhWha"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "d785de9c-286d-41ae-9b88-86f20340f679", "DetectTime": "2024-05-21T12:43:34.969454+00:00", "EventTime": "2024-05-21T12:43:34.969472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTQbk1WNbmothqKHh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "a6e8bc81-41c1-4d10-9e81-04b0df3caea3", "DetectTime": "2024-05-21T12:43:34.975140+00:00", "EventTime": "2024-05-21T12:43:34.975163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8zFb18GhIFWdFYtd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "4b0e7722-1453-461e-91cd-27cd92e525c7", "DetectTime": "2024-05-21T12:43:34.981327+00:00", "EventTime": "2024-05-21T12:43:34.981349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETvfQ1cVxijFXZFYi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "e73c7b86-ff12-44a6-9bf0-fda04b206c2a", "DetectTime": "2024-05-21T12:43:34.995051+00:00", "EventTime": "2024-05-21T12:43:34.995071+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFEt9tRz18TRysZa"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "128b8574-e508-4e4d-945b-8479e7bc57ad", "DetectTime": "2024-05-21T12:43:35.008366+00:00", "EventTime": "2024-05-21T12:43:35.008385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKFEt9tRz18TRysZa"], "accumulated_threat_level": 2.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "a248b84b-7db1-405d-9615-d0abccfa7526", "DetectTime": "2024-05-21T12:43:35.055977+00:00", "EventTime": "2024-05-21T12:43:35.056003+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNyDo52Hsq5vJudCO2"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "22864963-0c19-49ad-9094-81c8f3872c5c", "DetectTime": "2024-05-21T12:43:35.070831+00:00", "EventTime": "2024-05-21T12:43:35.070866+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNyDo52Hsq5vJudCO2"], "accumulated_threat_level": 3.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "6980e6fe-bc31-448c-84ea-04af6a15f3b6", "DetectTime": "2024-05-21T12:43:35.094289+00:00", "EventTime": "2024-05-21T12:43:35.094309+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszyXQ1ZaDEox5Fite"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "54ad0e24-4ea4-4845-82cc-69485be55bc3", "DetectTime": "2024-05-21T12:43:35.108164+00:00", "EventTime": "2024-05-21T12:43:35.108185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszyXQ1ZaDEox5Fite"], "accumulated_threat_level": 3.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "e26dd673-dc9f-4e63-99bf-99e39083dd88", "DetectTime": "2024-05-21T12:43:35.158994+00:00", "EventTime": "2024-05-21T12:43:35.159015+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEmjNv4UN3ANAonSLb"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "d78a105a-e799-45b2-8376-5786cc59dae9", "DetectTime": "2024-05-21T12:43:35.173377+00:00", "EventTime": "2024-05-21T12:43:35.173406+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEmjNv4UN3ANAonSLb"], "accumulated_threat_level": 4.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "5aa0533c-b61e-430e-b315-c34fe4e60e6e", "DetectTime": "2024-05-21T12:43:35.191565+00:00", "EventTime": "2024-05-21T12:43:35.191596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqhzno2NvQbeKmpjX5"], "accumulated_threat_level": 9.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "57dfeda2-ce47-4bad-b596-2aad65a8b18c", "DetectTime": "2024-05-21T12:43:35.199138+00:00", "EventTime": "2024-05-21T12:43:35.199161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7iWJx2CV5IhLuZiS5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "7051ada4-3206-441a-a961-99bbe99e0f73", "DetectTime": "2024-05-21T12:43:35.204318+00:00", "EventTime": "2024-05-21T12:43:35.204336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv367m3zFwYFIOcM56"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "c2b928a0-ce41-411b-9d4c-d30be03fc759", "DetectTime": "2024-05-21T12:43:35.209140+00:00", "EventTime": "2024-05-21T12:43:35.209158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xSzR22JZB0as2O3l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "337a4b86-65e0-411f-91ec-1ec87027d45e", "DetectTime": "2024-05-21T12:43:35.222885+00:00", "EventTime": "2024-05-21T12:43:35.222907+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPw9Ay23aOSCmHNLWa"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "0da91c4e-4720-46bd-b883-568b4c12d648", "DetectTime": "2024-05-21T12:43:35.237792+00:00", "EventTime": "2024-05-21T12:43:35.237818+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPw9Ay23aOSCmHNLWa"], "accumulated_threat_level": 4.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "922c369d-e3cf-482a-aac3-ce1ea3a9209c", "DetectTime": "2024-05-21T12:43:35.279696+00:00", "EventTime": "2024-05-21T12:43:35.279718+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cql3ON1TB2gGxukYBa"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "4b994154-6b6c-4faf-96c2-021e228817e2", "DetectTime": "2024-05-21T12:43:35.293356+00:00", "EventTime": "2024-05-21T12:43:35.293392+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cql3ON1TB2gGxukYBa"], "accumulated_threat_level": 5.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "f7c7df97-5085-4b41-a9db-8969d228de60", "DetectTime": "2024-05-21T12:43:35.341023+00:00", "EventTime": "2024-05-21T12:43:35.341044+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GLvk4u3mchcnZ4Sf"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "632fb8de-f6d3-4463-b667-7d8470043c09", "DetectTime": "2024-05-21T12:43:35.354568+00:00", "EventTime": "2024-05-21T12:43:35.354593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GLvk4u3mchcnZ4Sf"], "accumulated_threat_level": 5.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "f23613b4-134e-4f0d-a468-f451d163b589", "DetectTime": "2024-05-21T12:43:35.560725+00:00", "EventTime": "2024-05-21T12:43:35.560748+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ced60t4zOgtI6pobVg"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "e8063d73-1ec8-45b4-8565-5ece5ac3a467", "DetectTime": "2024-05-21T12:43:35.572950+00:00", "EventTime": "2024-05-21T12:43:35.572971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ced60t4zOgtI6pobVg"], "accumulated_threat_level": 6.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "21d5ada2-a62e-4ba8-a3d8-c48267d9b716", "DetectTime": "2024-05-21T12:43:35.590231+00:00", "EventTime": "2024-05-21T12:43:35.590254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyYwzF2HNkvFGkaw86"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "18dae62a-358d-4766-aa57-b7ace6aaf2b3", "DetectTime": "2024-05-21T12:43:35.598228+00:00", "EventTime": "2024-05-21T12:43:35.598249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CACOqm1uzXCM3MLmp6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "2637c97d-45db-40fb-a502-6c27527a457e", "DetectTime": "2024-05-21T12:43:35.606183+00:00", "EventTime": "2024-05-21T12:43:35.606203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfiXc21lVj7vtSvl75"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "118b7ba3-f71e-4785-8e07-73db4f435279", "DetectTime": "2024-05-21T12:43:35.617807+00:00", "EventTime": "2024-05-21T12:43:35.617824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct3mPy1mykqO3Ru6dl"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "38dfbeb5-f70d-435f-aa1a-141b433065b5", "DetectTime": "2024-05-21T12:43:35.629946+00:00", "EventTime": "2024-05-21T12:43:35.629966+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct3mPy1mykqO3Ru6dl"], "accumulated_threat_level": 6.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "373caeee-74ae-4ab8-9bcf-47816916bf1f", "DetectTime": "2024-05-21T12:43:35.641949+00:00", "EventTime": "2024-05-21T12:43:35.641967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZbs51WLNjXIvANu9"], "accumulated_threat_level": 10.4, "timewindow": 130} +{"Format": "IDEA0", "ID": "ea25e708-864e-4784-b7af-60735f4a7ac6", "DetectTime": "2024-05-21T12:43:35.655945+00:00", "EventTime": "2024-05-21T12:43:35.655963+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYPzZ2Br6OtsZ4nK9"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "7aa883db-c1ef-42af-a40c-41d415b67b9e", "DetectTime": "2024-05-21T12:43:35.667382+00:00", "EventTime": "2024-05-21T12:43:35.667401+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYPzZ2Br6OtsZ4nK9"], "accumulated_threat_level": 7.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "546f508c-0e55-434e-8700-66a83548ab78", "DetectTime": "2024-05-21T12:43:35.682781+00:00", "EventTime": "2024-05-21T12:43:35.682801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0Ut73ezpyPvuVVEi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "20f9af59-7ca2-4aea-acb3-aceb5f4c63b3", "DetectTime": "2024-05-21T12:43:35.695778+00:00", "EventTime": "2024-05-21T12:43:35.695801+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32uKc2fSt9ZgRwpHg"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "a30e7b75-22b8-4520-ae03-625cde27bbcc", "DetectTime": "2024-05-21T12:43:35.710480+00:00", "EventTime": "2024-05-21T12:43:35.710502+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32uKc2fSt9ZgRwpHg"], "accumulated_threat_level": 7.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "5ac0855a-6e03-45c0-a546-58e3794b6f44", "DetectTime": "2024-05-21T12:43:35.735513+00:00", "EventTime": "2024-05-21T12:43:35.735533+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWETZLWKMfOrQEFk"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "6400ce62-75a2-4171-bf24-6207f26f20db", "DetectTime": "2024-05-21T12:43:35.747456+00:00", "EventTime": "2024-05-21T12:43:35.747476+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWETZLWKMfOrQEFk"], "accumulated_threat_level": 8.0, "timewindow": 29} +{"Format": "IDEA0", "ID": "34789b0b-61d6-413e-aa64-3d678387a7ae", "DetectTime": "2024-05-21T12:43:35.766464+00:00", "EventTime": "2024-05-21T12:43:35.766487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqR68S12aFw2CgYxXj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "5acef87c-2af2-4695-b518-53e14c68a717", "DetectTime": "2024-05-21T12:43:35.777939+00:00", "EventTime": "2024-05-21T12:43:35.777957+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZD2l3b7Wse5yfBI8"], "accumulated_threat_level": 0, "timewindow": 29} +{"Format": "IDEA0", "ID": "abcec6aa-3b8d-4bb7-8017-02310ff89c02", "DetectTime": "2024-05-21T12:43:35.790919+00:00", "EventTime": "2024-05-21T12:43:35.790942+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZD2l3b7Wse5yfBI8"], "accumulated_threat_level": 8.5, "timewindow": 29} +{"Format": "IDEA0", "ID": "5825bbd0-f959-4e67-aa05-87083a6c07d4", "DetectTime": "2024-05-21T12:43:36.069373+00:00", "EventTime": "2024-05-21T12:43:36.069397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7UL7B34Pb26DgVYye"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "2d2694f7-c8d7-43f3-846a-298adb2d1b97", "DetectTime": "2024-05-21T12:43:36.075863+00:00", "EventTime": "2024-05-21T12:43:36.075881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrH8s71Jm7fWYUMQB9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "a6e29ff9-73e1-4466-9fac-cfbd685a0899", "DetectTime": "2024-05-21T12:43:36.123472+00:00", "EventTime": "2024-05-21T12:43:36.123500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2vy7X36VBc0igcP06"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "6833d76c-bf88-4559-a23e-30ee72253b24", "DetectTime": "2024-05-21T12:43:36.135322+00:00", "EventTime": "2024-05-21T12:43:36.135356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u5aj1fuD0QV2OHBi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 130} +{"Format": "IDEA0", "ID": "afcf4cb6-08ba-4ae3-bedb-0263a41620bb", "DetectTime": "2024-05-21T12:43:36.195190+00:00", "EventTime": "2024-05-21T12:43:36.195614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IHV62mrKVslZK1rj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "5b90da87-493d-47d9-ab3f-ec8e8eba2a5e", "DetectTime": "2024-05-21T12:43:36.273338+00:00", "EventTime": "2024-05-21T12:43:36.273361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeOOr3f3Xychfwvce"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "9bc2e616-93c3-4b67-b3b2-64f576cb6cd1", "DetectTime": "2024-05-21T12:43:36.286639+00:00", "EventTime": "2024-05-21T12:43:36.286660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbs4er3IQ4YlDco7W4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "bd9d1305-6f98-46a9-bf74-a53d09c6adfa", "DetectTime": "2024-05-21T12:43:36.567860+00:00", "EventTime": "2024-05-21T12:43:36.567883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CElSru1nueFg5aatoc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "31c6b49f-225d-43d2-884f-b6445b6c8cdd", "DetectTime": "2024-05-21T12:43:36.626905+00:00", "EventTime": "2024-05-21T12:43:36.626926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9l1u1jg2GPPgLGL5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 130} +{"Format": "Json", "ID": "31c6b49f-225d-43d2-884f-b6445b6c8cdd", "DetectTime": "2024-05-21T12:43:36.626905+00:00", "EventTime": "2024-05-21T12:43:36.626926+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "1970-01-06T09:51:34.585224+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2024/05/21 12:43:36.856491)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 130, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "491775d7-23d7-4b80-9602-0063dc1d34a6", "DetectTime": "2024-05-21T12:43:36.860760+00:00", "EventTime": "2024-05-21T12:43:36.860779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTG4q2F9rOZqhuDfa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "7f59bcf1-7203-4d02-afb0-d81162c21425", "DetectTime": "2024-05-21T12:43:36.868205+00:00", "EventTime": "2024-05-21T12:43:36.868236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 122.214.58.197 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRJ88fAZBCcJ9wd8"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "e0df03a8-6d87-4ddc-869b-3ee07b4921e4", "DetectTime": "2024-05-21T12:43:36.874182+00:00", "EventTime": "2024-05-21T12:43:36.874202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXTHf2QdKq4S8Zhe1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "80d88af1-c966-4744-ab35-87eee6c6f042", "DetectTime": "2024-05-21T12:43:36.879202+00:00", "EventTime": "2024-05-21T12:43:36.879221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch5yfpeuL2TSNIoC"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "a739cd7c-b02b-4de3-a862-5dc7f30cf17e", "DetectTime": "2024-05-21T12:43:36.883919+00:00", "EventTime": "2024-05-21T12:43:36.883937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 105.228.46.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZaFoX1Yen1sIPnm53"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "a5f620ec-7100-4d75-9df8-be6ab775f11f", "DetectTime": "2024-05-21T12:43:36.952175+00:00", "EventTime": "2024-05-21T12:43:36.952194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoiIr3u1Qg8HmaF1b"], "accumulated_threat_level": 0.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "78eb8363-f3fe-46cc-b016-3dfe3fccfc2c", "DetectTime": "2024-05-21T12:43:36.957804+00:00", "EventTime": "2024-05-21T12:43:36.957823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWCgz4MI1OHLFDLp3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 128} +{"Format": "IDEA0", "ID": "8b7e03db-8946-41eb-96e8-7f5a19603420", "DetectTime": "2024-05-21T12:43:37.310493+00:00", "EventTime": "2024-05-21T12:43:37.310517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdt2H42tNgkWrNWtP6"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "52edd248-bf56-4f5c-bdbe-67b729c83be6", "DetectTime": "2024-05-21T12:43:37.316913+00:00", "EventTime": "2024-05-21T12:43:37.316935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqyRre2bT5OZ8D5u7d"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "265aa0a0-00d5-464b-b988-8fe02c51c8a7", "DetectTime": "2024-05-21T12:43:37.321815+00:00", "EventTime": "2024-05-21T12:43:37.321834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnsEarwmvCQmfZvfe"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "84f84d14-8a23-4feb-990c-3a1285888e99", "DetectTime": "2024-05-21T12:43:37.326383+00:00", "EventTime": "2024-05-21T12:43:37.326403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgj1Js1srNUPGWMTMf"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "baa44766-85f1-4752-a791-1f065b92c73d", "DetectTime": "2024-05-21T12:43:37.424916+00:00", "EventTime": "2024-05-21T12:43:37.424947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOKx242g7SiC6fYli"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "95c5b443-3000-45a9-813b-6f24f10b4404", "DetectTime": "2024-05-21T12:43:37.430523+00:00", "EventTime": "2024-05-21T12:43:37.430545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6nwX3v4b1cqkKbBb"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "9281a898-0490-4b02-b88c-3e1edf05ed98", "DetectTime": "2024-05-21T12:43:37.466232+00:00", "EventTime": "2024-05-21T12:43:37.466252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl1MzPUveqfUmTnZf"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "39bd24e6-f17d-4c47-8e83-bef1afb6fd80", "DetectTime": "2024-05-21T12:43:37.737426+00:00", "EventTime": "2024-05-21T12:43:37.737452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHpYJ21Fx3iJ9Qtya"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "6a8b2666-3d7f-4a34-93c3-a66f8f18fe08", "DetectTime": "2024-05-21T12:43:37.858522+00:00", "EventTime": "2024-05-21T12:43:37.858546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT3a5J1VmoP48tytP1"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "78697d1b-8d94-4e05-a0cc-94a4f6dd932a", "DetectTime": "2024-05-21T12:43:37.871105+00:00", "EventTime": "2024-05-21T12:43:37.871124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCakgy4VQpGb8NLXrj"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "49edd899-c526-4af9-9513-8f3c8380b138", "DetectTime": "2024-05-21T12:43:37.903800+00:00", "EventTime": "2024-05-21T12:43:37.903821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGjuwc4s86okZ9HP4g"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "28c2bd59-eabd-4bc1-ab43-d72eb518e745", "DetectTime": "2024-05-21T12:43:37.941198+00:00", "EventTime": "2024-05-21T12:43:37.941220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHV0T3K2sSe6ADlif"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "6880e5e4-9f48-4014-956f-6026b22df2e4", "DetectTime": "2024-05-21T12:43:37.954187+00:00", "EventTime": "2024-05-21T12:43:37.954214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPT2Kr1xABx3sgvYG7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 130} +{"Format": "IDEA0", "ID": "770a478d-8d8f-4ad4-ba36-e2211f44b2e5", "DetectTime": "2024-05-21T12:43:37.959538+00:00", "EventTime": "2024-05-21T12:43:37.959557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQyOk1DZbYSYtvNB"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "25dafdd7-f1c9-408e-b8a3-3fb9ece3d795", "DetectTime": "2024-05-21T12:43:37.964331+00:00", "EventTime": "2024-05-21T12:43:37.964350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORBbfLEEwk7xRun2"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "8d47acde-bcbd-4856-b1ba-e2c73b755ef8", "DetectTime": "2024-05-21T12:43:38.376192+00:00", "EventTime": "2024-05-21T12:43:38.376215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1PYQ1saXo0lKEZE1"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "abb479a9-866d-418f-ba37-c8af1727bebb", "DetectTime": "2024-05-21T12:43:38.381824+00:00", "EventTime": "2024-05-21T12:43:38.381843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBa2W35O1U55fPK59"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "7868fc1f-0d82-45d4-8758-3e7498a9dcd1", "DetectTime": "2024-05-21T12:43:38.387713+00:00", "EventTime": "2024-05-21T12:43:38.387733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZVKot4Tj3i5ZtqVm6"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "8e8f7514-b581-4149-ab2a-d8d90009872b", "DetectTime": "2024-05-21T12:43:38.392465+00:00", "EventTime": "2024-05-21T12:43:38.392484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C333Pf2FNdhdSW5yN5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "fc37c558-7df2-4110-abea-497ee7fca529", "DetectTime": "2024-05-21T12:43:38.625914+00:00", "EventTime": "2024-05-21T12:43:38.625935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1XPG28N4soTF00Xd"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b7718177-2631-4dd1-afd2-e40d6a94caa8", "DetectTime": "2024-05-21T12:43:38.637533+00:00", "EventTime": "2024-05-21T12:43:38.637555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqMW041e6RF32biV1"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "7e8129b3-d510-4e95-8b77-c1b0e43372b1", "DetectTime": "2024-05-21T12:43:38.647353+00:00", "EventTime": "2024-05-21T12:43:38.647372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTSF11fx13WbsIKPe"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b41b99d8-e773-4084-a803-56f353759332", "DetectTime": "2024-05-21T12:43:38.652952+00:00", "EventTime": "2024-05-21T12:43:38.652971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJoN4312oxZT7f2U4"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "13fc4c0c-dd89-41ae-9d16-b7ea7e2555d9", "DetectTime": "2024-05-21T12:43:38.939604+00:00", "EventTime": "2024-05-21T12:43:38.939631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yPxh4vYFiwGZdB97"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "4508a613-7b2b-4065-8c9b-e50240827462", "DetectTime": "2024-05-21T12:43:38.947582+00:00", "EventTime": "2024-05-21T12:43:38.947604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBK4rE2ozPuV1zYxo5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "4d9ad862-126a-47b4-a7c6-90e8707aceea", "DetectTime": "2024-05-21T12:43:38.952513+00:00", "EventTime": "2024-05-21T12:43:38.952533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0VDy4XOla5Qunasc"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b3bf468e-dca3-486d-a663-ce86dc434fda", "DetectTime": "2024-05-21T12:43:38.972130+00:00", "EventTime": "2024-05-21T12:43:38.972152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV2UhIly0MXoe6Kq5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "9cf18f82-925a-4a24-8044-2ef630d67001", "DetectTime": "2024-05-21T12:43:39.181860+00:00", "EventTime": "2024-05-21T12:43:39.181881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmmvl84a5R83vst4J7"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "3774c0f3-fd1a-4968-92f1-e4aaf97ec8ba", "DetectTime": "2024-05-21T12:43:39.205085+00:00", "EventTime": "2024-05-21T12:43:39.205113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtX6O3Ey0COI6lfSg"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "43be068a-4fe8-4db9-a99e-c915b690aa3e", "DetectTime": "2024-05-21T12:43:39.250933+00:00", "EventTime": "2024-05-21T12:43:39.250954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISF2YE0ZGe1u4yTf"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "db86e649-7e43-441d-a81b-a4add301c1de", "DetectTime": "2024-05-21T12:43:39.525534+00:00", "EventTime": "2024-05-21T12:43:39.525554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLKlf31Bvxnbzagfb"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "edb250b3-7b50-4cc9-90d3-60c569fdbc48", "DetectTime": "2024-05-21T12:43:39.536015+00:00", "EventTime": "2024-05-21T12:43:39.536036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvvkUS2RQhMznKHSk5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "91674972-dd3c-4906-96b2-a7274183e732", "DetectTime": "2024-05-21T12:43:39.568752+00:00", "EventTime": "2024-05-21T12:43:39.568773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaUprgWX89X1ma9tl"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "ef238b6b-1549-477d-8eca-caf5fae9ddf7", "DetectTime": "2024-05-21T12:43:39.583906+00:00", "EventTime": "2024-05-21T12:43:39.583931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPwgU70juPDHRXNi"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "9a8dda99-7493-409f-ae46-6137ebfe9ca5", "DetectTime": "2024-05-21T12:43:39.637503+00:00", "EventTime": "2024-05-21T12:43:39.637526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhS2r3uLQsI2kKxj7"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "5210d073-ced5-4e59-bc86-37663790fcd3", "DetectTime": "2024-05-21T12:43:39.700364+00:00", "EventTime": "2024-05-21T12:43:39.700387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXUi22RxTJ4OUzDe5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "9b900d96-75b7-42d6-885f-f745cb712f0c", "DetectTime": "2024-05-21T12:43:39.738488+00:00", "EventTime": "2024-05-21T12:43:39.738511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2M4A466JmxkLrlS8"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "edfb9169-bd76-4d5e-85b2-da00100ec210", "DetectTime": "2024-05-21T12:43:39.745340+00:00", "EventTime": "2024-05-21T12:43:39.745361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4OILe2UFKH1DCfSPa"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "42104583-6c4e-4f0f-9977-c57ef96b4665", "DetectTime": "2024-05-21T12:43:39.867349+00:00", "EventTime": "2024-05-21T12:43:39.867371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C75o1fTnHQb2th0vk"], "accumulated_threat_level": 3.2, "timewindow": 130} +{"Format": "IDEA0", "ID": "e07e698f-57e2-4dac-89b1-9ced7d20bc6b", "DetectTime": "2024-05-21T12:43:39.873128+00:00", "EventTime": "2024-05-21T12:43:39.873147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqctla3PQqnO9VwGdh"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "e6a1a10f-f39d-4c52-8bc2-0b8ba37c24b0", "DetectTime": "2024-05-21T12:43:40.223675+00:00", "EventTime": "2024-05-21T12:43:40.223697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc7TQ420svtqcdFEId"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "aa0b4b0c-01ff-4273-870d-8ae598c3ef51", "DetectTime": "2024-05-21T12:43:40.228751+00:00", "EventTime": "2024-05-21T12:43:40.228771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUSgk89NfM54HHFth"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "12655bec-f307-47ed-97a2-e5a50eaa3041", "DetectTime": "2024-05-21T12:43:40.233710+00:00", "EventTime": "2024-05-21T12:43:40.233728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsuLok4gewZJaiPbU9"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "2a2e320d-19f7-4465-a354-8d8df4e4d939", "DetectTime": "2024-05-21T12:43:40.238400+00:00", "EventTime": "2024-05-21T12:43:40.238428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBeJoZgy7AapO2HT4"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "a642964d-e6b8-44d7-823a-74d9a70cd7a9", "DetectTime": "2024-05-21T12:43:40.259794+00:00", "EventTime": "2024-05-21T12:43:40.259815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQEYkkkqtr7eCUYj"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "26ef0376-44b8-41ac-bb21-ac478eaf036d", "DetectTime": "2024-05-21T12:43:40.264893+00:00", "EventTime": "2024-05-21T12:43:40.264912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYKlF8zGK4LT7SYd"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "4cf2b321-b888-425d-a8ac-8ea163e5f219", "DetectTime": "2024-05-21T12:43:40.355850+00:00", "EventTime": "2024-05-21T12:43:40.355873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiosDDD43jwLudBO6"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c3ba983e-69ad-42a4-9612-9e53dac83938", "DetectTime": "2024-05-21T12:43:40.408658+00:00", "EventTime": "2024-05-21T12:43:40.408680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWa7HQ3Vh1jG5cNof"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "32e1e23b-0084-460f-b7ec-ce8bf591a409", "DetectTime": "2024-05-21T12:43:40.920197+00:00", "EventTime": "2024-05-21T12:43:40.920216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRhTSg1ZpirX8FLS3h"], "accumulated_threat_level": 4.0, "timewindow": 130} +{"Format": "IDEA0", "ID": "0fe6229e-53ce-442b-9b8e-3ba3e948a019", "DetectTime": "2024-05-21T12:43:40.941068+00:00", "EventTime": "2024-05-21T12:43:40.941090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVKAli38RlCphdDWKd"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c63925b9-ced4-4792-9e73-849efb7128f4", "DetectTime": "2024-05-21T12:43:40.958691+00:00", "EventTime": "2024-05-21T12:43:40.958713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkiwyH3LDRTPdObBMk"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "60ee3b1f-8c58-4969-9ea9-3cda0d2d2e1d", "DetectTime": "2024-05-21T12:43:40.987508+00:00", "EventTime": "2024-05-21T12:43:40.987529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35u994DgSFV5Jaiuc"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "55bcd0ea-223d-4dd7-a41c-9d9e5cf9839a", "DetectTime": "2024-05-21T12:43:40.992946+00:00", "EventTime": "2024-05-21T12:43:40.992965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHur53q7yhRmVoWki"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c8ad547d-1652-4705-975b-04ca534746ac", "DetectTime": "2024-05-21T12:43:40.997846+00:00", "EventTime": "2024-05-21T12:43:40.997869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNupx13DJDCcNpaAn8"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "6a1bdbf3-4b31-4f2d-aace-6badaf7e2f96", "DetectTime": "2024-05-21T12:43:41.002689+00:00", "EventTime": "2024-05-21T12:43:41.002707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.54.197.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmzdc18RWpnO4zZ58"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "e9a166ad-a05b-49b4-be0b-2b59c36baaf8", "DetectTime": "2024-05-21T12:43:41.009625+00:00", "EventTime": "2024-05-21T12:43:41.009646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.30.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztnGB3gYBimZsGKp8"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "de992d3b-1304-470d-b1ad-53b4e876cbcf", "DetectTime": "2024-05-21T12:43:41.014250+00:00", "EventTime": "2024-05-21T12:43:41.014269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYejQFZ488haeEhi"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "a712cffa-6dc2-4fcb-ab47-bf8a32939b0f", "DetectTime": "2024-05-21T12:43:41.018840+00:00", "EventTime": "2024-05-21T12:43:41.018859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDNR4621AS46Gi4st5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "ba947528-3d5f-4ecb-bba7-10fa8c63db93", "DetectTime": "2024-05-21T12:43:41.023844+00:00", "EventTime": "2024-05-21T12:43:41.023873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xvoUC9zRjK8vUE6"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "bad64066-062a-4501-b009-8ee68f86c7e9", "DetectTime": "2024-05-21T12:43:41.035812+00:00", "EventTime": "2024-05-21T12:43:41.035834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COR6ac17TvSAF1VXQc"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "9cd89c1c-b509-497f-b8b1-22dff3eca974", "DetectTime": "2024-05-21T12:43:41.919596+00:00", "EventTime": "2024-05-21T12:43:41.919620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjsqBM3oA82h3rSCs"], "accumulated_threat_level": 4.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "88adda01-21dd-4fb1-b351-c324758a94aa", "DetectTime": "2024-05-21T12:43:41.932105+00:00", "EventTime": "2024-05-21T12:43:41.932126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8qsjiZdWelNxqgh5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "ab3413eb-3123-44e6-b4e5-5624bde585da", "DetectTime": "2024-05-21T12:43:41.939461+00:00", "EventTime": "2024-05-21T12:43:41.939481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2KCJo3kJtYeUOOXLk"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "aa0d305d-910d-44d2-a39c-1acd85058b7d", "DetectTime": "2024-05-21T12:43:41.948074+00:00", "EventTime": "2024-05-21T12:43:41.948096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzskUV3QSAVJrudwie"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "5f8f1285-330c-4191-b91b-6372a8d35d52", "DetectTime": "2024-05-21T12:43:41.953002+00:00", "EventTime": "2024-05-21T12:43:41.953021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTngcl3f5jLCnteSQg"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b9a0cf17-91da-4cbf-8759-8c1dbd547f87", "DetectTime": "2024-05-21T12:43:41.958221+00:00", "EventTime": "2024-05-21T12:43:41.958240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct6LPI2hB1h4TIEFrc"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "958e5c11-d3d6-47fb-b7df-3b81f6c27e0b", "DetectTime": "2024-05-21T12:43:41.963493+00:00", "EventTime": "2024-05-21T12:43:41.963515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVubuuHC8vKzlrt79"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "4a2c9a09-5862-461c-8dc3-552bdb6513f9", "DetectTime": "2024-05-21T12:43:41.968428+00:00", "EventTime": "2024-05-21T12:43:41.968448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtFWOUftY6MN7MBAi"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "eb234297-33da-488f-9a5b-c893694b83f8", "DetectTime": "2024-05-21T12:43:41.974177+00:00", "EventTime": "2024-05-21T12:43:41.974198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFVYa4AWJI0Bc8Ygb"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "44f032b5-f062-4d97-b7ad-e8f0d6126de2", "DetectTime": "2024-05-21T12:43:42.000653+00:00", "EventTime": "2024-05-21T12:43:42.000675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqfNos0bbV5OaMFci"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "8e1096fb-998d-40ff-9bcf-0782aab3f91f", "DetectTime": "2024-05-21T12:43:42.065401+00:00", "EventTime": "2024-05-21T12:43:42.065426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVeTD4JeZZrxwjG5k"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "1a149ca9-01f6-4cbd-b088-bf94ccea9435", "DetectTime": "2024-05-21T12:43:42.135660+00:00", "EventTime": "2024-05-21T12:43:42.135684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0v9Fe1ASXw6v2of"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "bc60f1ec-94cc-4a65-ac50-207b1304420e", "DetectTime": "2024-05-21T12:43:42.653335+00:00", "EventTime": "2024-05-21T12:43:42.653358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG3YZu79lzqXaEEOi"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "d5c9c07c-ab88-41ff-ba2c-48bb6b0166ab", "DetectTime": "2024-05-21T12:43:42.693294+00:00", "EventTime": "2024-05-21T12:43:42.693315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuh88O24oWLG839Ynf"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "3b17106b-a37e-4e62-aae3-265fe383dcb2", "DetectTime": "2024-05-21T12:43:42.699209+00:00", "EventTime": "2024-05-21T12:43:42.699231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlST02jHtk2QLxLfg"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "45d47feb-ddcd-4c94-bd21-65994c83cc62", "DetectTime": "2024-05-21T12:43:42.760548+00:00", "EventTime": "2024-05-21T12:43:42.760566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsb4S3kt8hadtnZ9h"], "accumulated_threat_level": 5.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "8ca7441a-9aa2-4f93-ab11-4e505f0cd1be", "DetectTime": "2024-05-21T12:43:42.996355+00:00", "EventTime": "2024-05-21T12:43:42.996377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9Mv9406tp3KI3fi7"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c18f0ce5-6af9-4cfc-bfb3-d6b4e467b086", "DetectTime": "2024-05-21T12:43:43.057613+00:00", "EventTime": "2024-05-21T12:43:43.057634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuUBY3UAR8c7EtOw"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "1711d135-5e85-4d97-851e-f14b2499bb58", "DetectTime": "2024-05-21T12:43:43.063320+00:00", "EventTime": "2024-05-21T12:43:43.063340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wkIW2gmEHI5tXsc8"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "14f89625-34fc-4561-bed4-53ac156e796d", "DetectTime": "2024-05-21T12:43:43.068004+00:00", "EventTime": "2024-05-21T12:43:43.068022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQEtY3o3veOhm3Tsl"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "88641cab-ec45-4ac6-9173-f0e065c06f60", "DetectTime": "2024-05-21T12:43:43.072908+00:00", "EventTime": "2024-05-21T12:43:43.072927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBFXhi7VrsDr1DGg"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b0869171-356b-4e3d-ad51-ced59e6223d2", "DetectTime": "2024-05-21T12:43:43.106721+00:00", "EventTime": "2024-05-21T12:43:43.106745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpT7735Asp2jSQu5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "59814576-7d42-474f-b229-def9f8c48073", "DetectTime": "2024-05-21T12:43:43.112335+00:00", "EventTime": "2024-05-21T12:43:43.112356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZA1MU2Pbp53ycCfF3"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "09a6a67a-f548-4aa2-b791-79c2b40b3a7a", "DetectTime": "2024-05-21T12:43:43.168901+00:00", "EventTime": "2024-05-21T12:43:43.168923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJnjSl3H7larWq2t4"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "baff6ea3-a568-4451-88eb-ba2329258b04", "DetectTime": "2024-05-21T12:43:43.530271+00:00", "EventTime": "2024-05-21T12:43:43.530293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoVhAT3djMyc8YiAMg"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "74d7a148-8eee-4a58-a18e-446a6e0596fb", "DetectTime": "2024-05-21T12:43:43.716167+00:00", "EventTime": "2024-05-21T12:43:43.716189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZOMx1EkvJhI3Eeo5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "e84b1ac8-766c-4f59-a1c4-549858110ce6", "DetectTime": "2024-05-21T12:43:43.722495+00:00", "EventTime": "2024-05-21T12:43:43.722514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvcsug36cG09U9y8u7"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "8cc06774-11bb-4435-9c2e-2072337d5aed", "DetectTime": "2024-05-21T12:43:43.727304+00:00", "EventTime": "2024-05-21T12:43:43.727324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CborE92A2uAr3xD0R5"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "c7019d65-e414-48cc-b268-495ab7acc869", "DetectTime": "2024-05-21T12:43:43.736664+00:00", "EventTime": "2024-05-21T12:43:43.736684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8Vkq2ZKp0fMqXvX9"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "81b88bbc-a434-4d20-b50d-fd9cc04c69d4", "DetectTime": "2024-05-21T12:43:43.741616+00:00", "EventTime": "2024-05-21T12:43:43.741636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4yt86xchc8x19EGb"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "1c709214-9940-4dbf-ac34-10c229a99999", "DetectTime": "2024-05-21T12:43:43.779630+00:00", "EventTime": "2024-05-21T12:43:43.779654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRsB9c4mWs7NW2478e"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "ca385cdb-51b2-4096-8ba4-d7a5e142c20d", "DetectTime": "2024-05-21T12:43:43.812493+00:00", "EventTime": "2024-05-21T12:43:43.812513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPD8llYIJiYQ8YyHi"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "a9aa606c-602b-430e-92a0-f49b9a4cc72d", "DetectTime": "2024-05-21T12:43:43.818326+00:00", "EventTime": "2024-05-21T12:43:43.818348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTFrsagQ6uyWjaCrj"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "5adf17ad-c652-4cfe-88c2-73d908096763", "DetectTime": "2024-05-21T12:43:44.062969+00:00", "EventTime": "2024-05-21T12:43:44.062990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKPbx2NykKmaF37de"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "e9d087fd-6887-45bc-b61d-34291934f60a", "DetectTime": "2024-05-21T12:43:44.216223+00:00", "EventTime": "2024-05-21T12:43:44.216246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJB8K74rofLCPU5PO6"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "b09802c4-e8c4-499a-b9da-a6afd6ac3e10", "DetectTime": "2024-05-21T12:43:44.222384+00:00", "EventTime": "2024-05-21T12:43:44.222420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnQaJi2tkx2WAptEfl"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "777fca1e-51c1-4911-91a6-aed1b9364713", "DetectTime": "2024-05-21T12:43:44.283094+00:00", "EventTime": "2024-05-21T12:43:44.283114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwuwKUK3BLYf4Zr4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "6fbcbf90-90e3-4cf1-884b-ba3685c28b7c", "DetectTime": "2024-05-21T12:43:44.327533+00:00", "EventTime": "2024-05-21T12:43:44.327562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3sd8D4Oft5Z2tkJ4g"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "2b514546-c88f-4c6b-b01e-dbca4b5e447f", "DetectTime": "2024-05-21T12:43:44.702979+00:00", "EventTime": "2024-05-21T12:43:44.702997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXAzefuwOuhFBt5fc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "d5e8296e-c2b8-4c64-a0f1-24157eb49dad", "DetectTime": "2024-05-21T12:43:44.780034+00:00", "EventTime": "2024-05-21T12:43:44.780057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.142.75.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx8H9l4IgpZ3lvIg2d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "f342696a-0510-453f-b455-5e88571be0f9", "DetectTime": "2024-05-21T12:43:44.804875+00:00", "EventTime": "2024-05-21T12:43:44.804895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYFQu3eWDEfJI1tz2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "ef75e5d3-e5fa-49da-b622-d4042e8fe5a9", "DetectTime": "2024-05-21T12:43:44.812920+00:00", "EventTime": "2024-05-21T12:43:44.812939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQXBegQN9ee6zR2Hc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "2ce6a370-aa27-4ab5-a5c1-edcca18d1271", "DetectTime": "2024-05-21T12:43:44.817667+00:00", "EventTime": "2024-05-21T12:43:44.817686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp6kzVeFm8Uuwocnf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "0e38b314-6c27-4807-83dd-77389d5ef85f", "DetectTime": "2024-05-21T12:43:44.864326+00:00", "EventTime": "2024-05-21T12:43:44.864347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMFDw3bhzQv4Oer3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "00b5f7f2-280b-4483-9b21-e7b26aac0330", "DetectTime": "2024-05-21T12:43:45.004468+00:00", "EventTime": "2024-05-21T12:43:45.004490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhI4U1Tksv6pfC4N6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "bfcceec3-8bc8-47d5-9c85-01549ee9b129", "DetectTime": "2024-05-21T12:43:45.009817+00:00", "EventTime": "2024-05-21T12:43:45.009837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C34740310pJ8ACyR82"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "a4fc6292-54d7-410a-bcc0-822da8524f0f", "DetectTime": "2024-05-21T12:43:45.015298+00:00", "EventTime": "2024-05-21T12:43:45.015319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGIuHNFnhcA6rHbBh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 130} +{"Format": "IDEA0", "ID": "ade9117a-fc54-4fe8-89e4-a3d2a13bdfb8", "DetectTime": "2024-05-21T12:43:45.369921+00:00", "EventTime": "2024-05-21T12:43:45.369941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAeDy4nQK2mdqmW7d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "aecb4f9f-4246-4cc0-89b0-055d0e29e31e", "DetectTime": "2024-05-21T12:43:45.387704+00:00", "EventTime": "2024-05-21T12:43:45.387726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvQw83H5onHNnxH8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "34ce9a4b-4d42-46e9-8bb0-a1665c2134e1", "DetectTime": "2024-05-21T12:43:45.392929+00:00", "EventTime": "2024-05-21T12:43:45.392949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeVhOh3WugSsVWbOLk"], "accumulated_threat_level": 9.6, "timewindow": 129} +{"Format": "IDEA0", "ID": "0afae396-1861-451e-a63a-5d61650d1a3f", "DetectTime": "2024-05-21T12:43:45.397567+00:00", "EventTime": "2024-05-21T12:43:45.397584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU3wPI1SlmOtrSEFpb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "1c3fb6ec-1843-4e70-8cfa-40507a8b3634", "DetectTime": "2024-05-21T12:43:45.509428+00:00", "EventTime": "2024-05-21T12:43:45.509449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGPRZY7WxGbACenn2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "91fe2811-d93f-41c5-b656-eae7f83eafde", "DetectTime": "2024-05-21T12:43:45.845049+00:00", "EventTime": "2024-05-21T12:43:45.845070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkKp14e4NfqNDeA1k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "2a7c6895-bbf7-41ca-b5e9-87060954bad8", "DetectTime": "2024-05-21T12:43:45.854600+00:00", "EventTime": "2024-05-21T12:43:45.854619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmWSxVw1b26M0TKg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "4e0bbd82-e1f6-48e0-8a78-461fb69afbe2", "DetectTime": "2024-05-21T12:43:45.878759+00:00", "EventTime": "2024-05-21T12:43:45.878780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVU70t3qIihnB8Rxo6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "8c6cb683-a0a2-4485-86f6-b0401dcc8d07", "DetectTime": "2024-05-21T12:43:45.884191+00:00", "EventTime": "2024-05-21T12:43:45.884210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA6ZOraan8ZT3ytU9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "221a61c0-1019-444a-b1e3-72d1e7a902be", "DetectTime": "2024-05-21T12:43:45.888825+00:00", "EventTime": "2024-05-21T12:43:45.888843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWS0502OmuGE0WLz4d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "c1308913-bb40-4a89-9a1c-e9391a941eaf", "DetectTime": "2024-05-21T12:43:45.930797+00:00", "EventTime": "2024-05-21T12:43:45.930820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNihKA3URPUY43Bvzh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "4a98157c-e0db-4186-a425-7abe7b8cad6c", "DetectTime": "2024-05-21T12:43:46.025129+00:00", "EventTime": "2024-05-21T12:43:46.025152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggGC31h5Z9wVYdBg5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "f79a75e7-3af8-4a0e-9e79-f393c973e89c", "DetectTime": "2024-05-21T12:43:46.125785+00:00", "EventTime": "2024-05-21T12:43:46.125807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yG3h3XNHx1LdAA7a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "1624da3b-7ab1-465a-8546-1dd9825a5ddd", "DetectTime": "2024-05-21T12:43:46.193395+00:00", "EventTime": "2024-05-21T12:43:46.193417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVVrj2ScOMc5yzfMg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "d62937f3-43d6-4e88-a2f3-36c80df7ea6e", "DetectTime": "2024-05-21T12:43:46.206607+00:00", "EventTime": "2024-05-21T12:43:46.206629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvBy742qIocaG1FA8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "4e2d9cc3-672e-4181-9199-2ba31bb8a003", "DetectTime": "2024-05-21T12:43:46.467585+00:00", "EventTime": "2024-05-21T12:43:46.467609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3zJ5BbqQGvgaLdyl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "b7346925-98f9-4fcb-ae23-6d54b3aa0f01", "DetectTime": "2024-05-21T12:43:46.472714+00:00", "EventTime": "2024-05-21T12:43:46.472733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdgzrBn58sKJ0wU3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "66d2dca8-5c04-46dc-943e-7558f913c685", "DetectTime": "2024-05-21T12:43:46.477350+00:00", "EventTime": "2024-05-21T12:43:46.477370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Iqq91zO6cXb76zI7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "927cdbe7-dc0e-4541-84e2-84e5912c768f", "DetectTime": "2024-05-21T12:43:46.690109+00:00", "EventTime": "2024-05-21T12:43:46.690132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1NQx74VPPm3GvzWL1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "0a5aefa9-5940-44ab-9477-42d7f61cbea1", "DetectTime": "2024-05-21T12:43:46.714713+00:00", "EventTime": "2024-05-21T12:43:46.714735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIxOT42P9CE2E6sTve"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "2d43a33f-2d0d-4484-ae37-86b03c6c540e", "DetectTime": "2024-05-21T12:43:46.720977+00:00", "EventTime": "2024-05-21T12:43:46.720995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54Ffv1Q7nyAYpk4I3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "5f53f40d-c698-4c5d-a6d6-58cce5f5a3e2", "DetectTime": "2024-05-21T12:43:46.725946+00:00", "EventTime": "2024-05-21T12:43:46.725977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIS6bj1BInMTaVb804"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "2357cf7a-8a8e-402c-bc0f-48e8be67d6d1", "DetectTime": "2024-05-21T12:43:46.731810+00:00", "EventTime": "2024-05-21T12:43:46.731830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ0jre4cyWkk46B74b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "ec2d1e7a-6721-494a-9224-58ba079da407", "DetectTime": "2024-05-21T12:43:46.736800+00:00", "EventTime": "2024-05-21T12:43:46.736821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VmTx25GfK14bp6Gd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "b98aeb29-97da-4c72-8346-8c00e8d82317", "DetectTime": "2024-05-21T12:43:46.741363+00:00", "EventTime": "2024-05-21T12:43:46.741381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWc7iGg1uXoBeo3s7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "42714799-ad9c-4846-b957-9cef4bdafab7", "DetectTime": "2024-05-21T12:43:46.745893+00:00", "EventTime": "2024-05-21T12:43:46.745911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSOu02Y8gurGughY4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "4f7e02ea-b865-4aa5-94e6-55f2880c7370", "DetectTime": "2024-05-21T12:43:46.750312+00:00", "EventTime": "2024-05-21T12:43:46.750330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDVZGJh7DVwKyEOr5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "812b78de-9e44-45ee-9946-0ef5de07c684", "DetectTime": "2024-05-21T12:43:46.755022+00:00", "EventTime": "2024-05-21T12:43:46.755039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyHzjP3VtqceKaEByg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "94758be1-8398-4c4f-89ce-7869f4eb7bd2", "DetectTime": "2024-05-21T12:43:47.123636+00:00", "EventTime": "2024-05-21T12:43:47.123659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDClIC4D5bZFJkYcj3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "58f1539a-60f7-4769-8dc5-00f666c8062e", "DetectTime": "2024-05-21T12:43:47.452898+00:00", "EventTime": "2024-05-21T12:43:47.452921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJF4h1U2klFydLoeg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "9d14ebfd-59dc-4e0b-9af6-7267f55b4c6c", "DetectTime": "2024-05-21T12:43:47.589320+00:00", "EventTime": "2024-05-21T12:43:47.589340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkDNJs2schFToBWdjd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "f3d357a4-5df0-4b78-b661-2c4a873eb1ed", "DetectTime": "2024-05-21T12:43:47.716758+00:00", "EventTime": "2024-05-21T12:43:47.716779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfR3n02sJE4Neq3uxa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "f0119b80-d5f6-4576-99d4-c04d1dc6a7da", "DetectTime": "2024-05-21T12:43:47.751647+00:00", "EventTime": "2024-05-21T12:43:47.751668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkrF9lkYhxoC2bV39"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "2011fc87-9707-4667-a8a7-ae9123b4cee6", "DetectTime": "2024-05-21T12:43:47.785745+00:00", "EventTime": "2024-05-21T12:43:47.785765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKg1d4qljNAc0n2I7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "62655bf1-bce5-44c9-a309-7b238dcd1b00", "DetectTime": "2024-05-21T12:43:47.798148+00:00", "EventTime": "2024-05-21T12:43:47.798168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEDFP2qXq1qSGDXhk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "d9ffc955-0479-4b39-bab9-f4c01c1ab489", "DetectTime": "2024-05-21T12:43:47.813715+00:00", "EventTime": "2024-05-21T12:43:47.813736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxy99uAK849pzDXjd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "3353f0ad-6312-4bc4-9049-38391daf1ebb", "DetectTime": "2024-05-21T12:43:47.821390+00:00", "EventTime": "2024-05-21T12:43:47.821411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCmua25DL60q3Dohf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "5268b34f-1314-486b-9a23-159e40b866c7", "DetectTime": "2024-05-21T12:43:47.877585+00:00", "EventTime": "2024-05-21T12:43:47.877604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6OHpL3alULd1dmNh8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "15e87676-32cf-486f-985d-dee61e4a52e1", "DetectTime": "2024-05-21T12:43:48.146721+00:00", "EventTime": "2024-05-21T12:43:48.146743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 186.95.34.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCiKraIpdhyGrjqc9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "4dd1e7fe-fe27-4634-b2b3-d5460dfcb959", "DetectTime": "2024-05-21T12:43:48.208824+00:00", "EventTime": "2024-05-21T12:43:48.208845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.166.194.69 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpWGBw2LmVTECHFmRg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "211bc33b-be96-41d5-a735-f4a9cc82d1e7", "DetectTime": "2024-05-21T12:43:48.228818+00:00", "EventTime": "2024-05-21T12:43:48.228838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 36.74.96.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTdXSoWF0ra0Ndqyg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "cce7349b-3e52-4d87-b263-5c76abe5131b", "DetectTime": "2024-05-21T12:43:48.246865+00:00", "EventTime": "2024-05-21T12:43:48.246885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxH5FW31mfsTL8I7F5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "97ee3120-cf50-4187-903b-311c1e79b129", "DetectTime": "2024-05-21T12:43:48.281397+00:00", "EventTime": "2024-05-21T12:43:48.281417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4KKtstFhY3EV99q7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "f2927deb-2398-4f41-ac63-1ff6b47d5667", "DetectTime": "2024-05-21T12:43:48.295373+00:00", "EventTime": "2024-05-21T12:43:48.295395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVRgIB4ZqK0UcJWXSd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "fd247a56-fd74-48ab-86d7-62dac7c4fdaf", "DetectTime": "2024-05-21T12:43:48.770452+00:00", "EventTime": "2024-05-21T12:43:48.770475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvtw3w3SJs1Qntmw42"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "8bf68383-848b-4b7e-b1e8-d819273a135e", "DetectTime": "2024-05-21T12:43:48.823786+00:00", "EventTime": "2024-05-21T12:43:48.823808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpygOh2Z6yRQccXfN9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "24a7b80b-5319-407f-a16f-3e159282ba2d", "DetectTime": "2024-05-21T12:43:48.828734+00:00", "EventTime": "2024-05-21T12:43:48.828752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifPeN1KMmj0QoEopb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "b8bd031a-fcfa-4c28-98ba-915b7ea44998", "DetectTime": "2024-05-21T12:43:48.846606+00:00", "EventTime": "2024-05-21T12:43:48.846628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIEi582GUd1LU3F9Tc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "bf62c414-1b35-4fd2-a088-92730d5605d8", "DetectTime": "2024-05-21T12:43:48.870618+00:00", "EventTime": "2024-05-21T12:43:48.870640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaDr72MrJbVRQOwbk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "5041660a-914e-433c-b8cb-69dbf24ffc19", "DetectTime": "2024-05-21T12:43:48.875939+00:00", "EventTime": "2024-05-21T12:43:48.875958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjwCB10fFFEHfYzP4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "3a5a97b2-ee1d-431f-a835-4d373fec90fd", "DetectTime": "2024-05-21T12:43:48.946269+00:00", "EventTime": "2024-05-21T12:43:48.946290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKEv03OrgflWLIoPf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "1f8e8ad7-b6cc-4375-8e58-633172d4143f", "DetectTime": "2024-05-21T12:43:49.266353+00:00", "EventTime": "2024-05-21T12:43:49.266375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVRvM3UnfE7gaAye5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "4cb560c1-43b1-4113-af32-b58ee8ece723", "DetectTime": "2024-05-21T12:43:49.331806+00:00", "EventTime": "2024-05-21T12:43:49.331828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ZCJw3EcqoMelAsa7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "9636f0b2-838f-4a73-8560-119672148999", "DetectTime": "2024-05-21T12:43:49.368907+00:00", "EventTime": "2024-05-21T12:43:49.368930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4BzeA4UXrqbaoKQaf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "ab83812f-8818-4249-8ddc-b99ac2a76768", "DetectTime": "2024-05-21T12:43:49.416566+00:00", "EventTime": "2024-05-21T12:43:49.416589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzSfw632mpHZ2OLS0g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 130} +{"Format": "IDEA0", "ID": "c992a44b-1fe9-4872-a95a-4fa064315179", "DetectTime": "2024-05-21T12:43:49.428994+00:00", "EventTime": "2024-05-21T12:43:49.429017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsS8hYH3uFkRMy87"], "accumulated_threat_level": 9.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "bfcbb949-42f9-47ed-bc65-c0e3774464b7", "DetectTime": "2024-05-21T12:43:49.543115+00:00", "EventTime": "2024-05-21T12:43:49.543137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpNQiPMY4zV9M60uh"], "accumulated_threat_level": 9.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "eed693fc-e1f9-48a0-a91e-54318f060c89", "DetectTime": "2024-05-21T12:43:49.816918+00:00", "EventTime": "2024-05-21T12:43:49.816946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fyB54CHavKEJuuAk"], "accumulated_threat_level": 10.4, "timewindow": 130} +{"Format": "IDEA0", "ID": "f344f9c9-b901-4adf-b726-60e829b81fc9", "DetectTime": "2024-05-21T12:43:49.863618+00:00", "EventTime": "2024-05-21T12:43:49.863637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2AWHEanrjX3yQS5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 130} +{"Format": "IDEA0", "ID": "857a5c85-3ee3-4f94-8700-a7ac233bcd1d", "DetectTime": "2024-05-21T12:43:49.914362+00:00", "EventTime": "2024-05-21T12:43:49.914382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COIIPAzMVHKtvVil"], "accumulated_threat_level": 12.000000000000002, "timewindow": 130} +{"Format": "Json", "ID": "857a5c85-3ee3-4f94-8700-a7ac233bcd1d", "DetectTime": "2024-05-21T12:43:49.914362+00:00", "EventTime": "2024-05-21T12:43:49.914382+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-06T09:52:29.827424+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 130. (real time 2024/05/21 12:43:50.304107)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 130, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "22d8539e-165a-4f17-88a7-d165fac48b22", "DetectTime": "2024-05-21T12:43:50.309227+00:00", "EventTime": "2024-05-21T12:43:50.309250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwtMf93KDZ7ywbD4Ia"], "accumulated_threat_level": 0, "timewindow": 130} +{"Format": "IDEA0", "ID": "74d47911-b189-468a-bd2a-cf7b4287b7a0", "DetectTime": "2024-05-21T12:43:50.321416+00:00", "EventTime": "2024-05-21T12:43:50.321434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY1J12a6hyQoVMDAd"], "accumulated_threat_level": 0.8, "timewindow": 130} +{"Format": "IDEA0", "ID": "2f931774-99e0-4802-a5a4-56bbd6bb414f", "DetectTime": "2024-05-21T12:43:50.332503+00:00", "EventTime": "2024-05-21T12:43:50.332521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyhN94qeMfKhax3y5"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "466ecc6a-cbe0-45f1-bbb7-042aaef61fc4", "DetectTime": "2024-05-21T12:43:50.345634+00:00", "EventTime": "2024-05-21T12:43:50.345654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3V6691XD6TkzGhdt1"], "accumulated_threat_level": 1.3, "timewindow": 131} +{"Format": "IDEA0", "ID": "6eee23cb-678f-4988-9179-aaeab2f18d91", "DetectTime": "2024-05-21T12:43:50.357373+00:00", "EventTime": "2024-05-21T12:43:50.357391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lxj234Vn8EVu8N3j"], "accumulated_threat_level": 2.1, "timewindow": 131} +{"Format": "IDEA0", "ID": "15d92bb8-d143-4309-87a3-431d5f9c470c", "DetectTime": "2024-05-21T12:43:50.378310+00:00", "EventTime": "2024-05-21T12:43:50.378328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWudGs39UizmGxlTtl"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 131} +{"Format": "IDEA0", "ID": "ace1de99-d0e3-4033-91b7-9285dbdb2421", "DetectTime": "2024-05-21T12:43:50.610322+00:00", "EventTime": "2024-05-21T12:43:50.610344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqhzno2NvQbeKmpjX5"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "025dbe24-f35b-4e4c-9bbc-be4017fac505", "DetectTime": "2024-05-21T12:43:50.650493+00:00", "EventTime": "2024-05-21T12:43:50.650514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbFRSe1kcTZvpq6RZa"], "accumulated_threat_level": 3.7, "timewindow": 131} +{"Format": "IDEA0", "ID": "b6febe8b-abac-4a21-a113-b9cd6cc2dea8", "DetectTime": "2024-05-21T12:43:50.699098+00:00", "EventTime": "2024-05-21T12:43:50.699119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxjzD4PxmiG9SrJI3"], "accumulated_threat_level": 4.5, "timewindow": 131} +{"Format": "IDEA0", "ID": "88c79067-a2b7-4b33-9dee-b6d7755fa219", "DetectTime": "2024-05-21T12:43:50.748851+00:00", "EventTime": "2024-05-21T12:43:50.748871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwvipR3stGrEy8egYj"], "accumulated_threat_level": 5.3, "timewindow": 131} +{"Format": "IDEA0", "ID": "9a504200-8fb7-4b09-b6f0-f7b9e7b1d504", "DetectTime": "2024-05-21T12:43:50.796400+00:00", "EventTime": "2024-05-21T12:43:50.796418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkryDC1BhkRoXXP4G7"], "accumulated_threat_level": 6.1, "timewindow": 131} +{"Format": "IDEA0", "ID": "2b7deec4-999c-40e6-a066-39c118b5b089", "DetectTime": "2024-05-21T12:43:50.842033+00:00", "EventTime": "2024-05-21T12:43:50.842051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdEWkm3K3X5rJZyHT7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 131} +{"Format": "IDEA0", "ID": "bb16e1a0-28f0-4bad-84ef-7fbbcffc9ef2", "DetectTime": "2024-05-21T12:43:50.889440+00:00", "EventTime": "2024-05-21T12:43:50.889460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsFI3zHtONLAFNha"], "accumulated_threat_level": 7.699999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "c5549627-ffd1-4bcf-9453-87df8a177137", "DetectTime": "2024-05-21T12:43:50.935408+00:00", "EventTime": "2024-05-21T12:43:50.935429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPkYK2b3ff9vApvYh"], "accumulated_threat_level": 8.5, "timewindow": 131} +{"Format": "IDEA0", "ID": "3ad73ed2-a910-471c-b286-5094abb42b9d", "DetectTime": "2024-05-21T12:43:50.970592+00:00", "EventTime": "2024-05-21T12:43:50.970611+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNy0rYwqMbvgWlt6"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "25ea0db0-7b9f-4de8-afc2-7e2b7f07226d", "DetectTime": "2024-05-21T12:43:50.982831+00:00", "EventTime": "2024-05-21T12:43:50.982849+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNy0rYwqMbvgWlt6"], "accumulated_threat_level": 3.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "893605f9-c4e4-4c46-bb49-da9c31484cc0", "DetectTime": "2024-05-21T12:43:51.190452+00:00", "EventTime": "2024-05-21T12:43:51.190476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZbs51WLNjXIvANu9"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "bfd6c497-2a2e-4b87-8904-7f78c16eb451", "DetectTime": "2024-05-21T12:43:51.249297+00:00", "EventTime": "2024-05-21T12:43:51.249319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKGFK3EVTcT31UZO9"], "accumulated_threat_level": 9.3, "timewindow": 131} +{"Format": "IDEA0", "ID": "022dbdd6-a101-4d5b-ab5d-ba5133f2c30b", "DetectTime": "2024-05-21T12:43:51.277044+00:00", "EventTime": "2024-05-21T12:43:51.277065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4u5aj1fuD0QV2OHBi"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "38ef19ff-526c-40a3-8b4d-03c245b46f3e", "DetectTime": "2024-05-21T12:43:51.320445+00:00", "EventTime": "2024-05-21T12:43:51.320467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6NabL3YI4xN2KO1"], "accumulated_threat_level": 10.100000000000001, "timewindow": 131} +{"Format": "IDEA0", "ID": "aac3e114-4d42-44e7-a919-e4dca2c0eb3e", "DetectTime": "2024-05-21T12:43:51.367241+00:00", "EventTime": "2024-05-21T12:43:51.367261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7Upx4YUI3sc1pEik"], "accumulated_threat_level": 10.900000000000002, "timewindow": 131} +{"Format": "IDEA0", "ID": "9b2b6af4-8ae3-43cc-8624-97bd98b37ee7", "DetectTime": "2024-05-21T12:43:51.415226+00:00", "EventTime": "2024-05-21T12:43:51.415245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeOpSn2n8FqB00vwM5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 131} +{"Format": "IDEA0", "ID": "67611de1-d734-485f-9e1e-bc977af5a103", "DetectTime": "2024-05-21T12:43:51.461528+00:00", "EventTime": "2024-05-21T12:43:51.461546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALG8L3SWxLXr1MoCb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 131} +{"Format": "Json", "ID": "67611de1-d734-485f-9e1e-bc977af5a103", "DetectTime": "2024-05-21T12:43:51.461528+00:00", "EventTime": "2024-05-21T12:43:51.461546+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-06T10:24:09.485565+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2024/05/21 12:43:51.645178)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 131, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "63e97520-aaff-4da4-a9f0-445b11891edf", "DetectTime": "2024-05-21T12:43:51.657034+00:00", "EventTime": "2024-05-21T12:43:51.657054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3yXng1QqXmHdutI96"], "accumulated_threat_level": 0.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "eb5af1ec-9742-4f01-b263-1eaffabf052b", "DetectTime": "2024-05-21T12:43:51.668654+00:00", "EventTime": "2024-05-21T12:43:51.668673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiMAoJ179bfFuP4K82"], "accumulated_threat_level": 1.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "926813e6-d85d-47d9-bcd1-e55f2aea119b", "DetectTime": "2024-05-21T12:43:51.835380+00:00", "EventTime": "2024-05-21T12:43:51.835403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9l1u1jg2GPPgLGL5"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "17a35054-c7ea-4551-88da-70464605eca9", "DetectTime": "2024-05-21T12:43:51.877258+00:00", "EventTime": "2024-05-21T12:43:51.877280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHB7RI1J5LX1Yk3kB6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 131} +{"Format": "IDEA0", "ID": "94089d11-85ac-4684-8cd3-129cea0cefff", "DetectTime": "2024-05-21T12:43:51.929513+00:00", "EventTime": "2024-05-21T12:43:51.929531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQuCes133ASe6Lhx66"], "accumulated_threat_level": 3.2, "timewindow": 131} +{"Format": "IDEA0", "ID": "2b54081b-0a7f-49b0-8250-7985b51d16ba", "DetectTime": "2024-05-21T12:43:51.971758+00:00", "EventTime": "2024-05-21T12:43:51.971777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY6hdpaxBRGXi22p3"], "accumulated_threat_level": 4.0, "timewindow": 131} +{"Format": "IDEA0", "ID": "197c7374-561c-4618-a21c-a9cac3ee7b5d", "DetectTime": "2024-05-21T12:43:52.017936+00:00", "EventTime": "2024-05-21T12:43:52.017957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFoed2lfubAEFEn3a"], "accumulated_threat_level": 4.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "fa8ca731-60b5-437b-86ea-7beecde9b2cd", "DetectTime": "2024-05-21T12:43:52.066936+00:00", "EventTime": "2024-05-21T12:43:52.066959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eXRU1kxe8ai2CPB9"], "accumulated_threat_level": 5.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "8ba61090-c8a4-497e-97aa-4abd6970c2a0", "DetectTime": "2024-05-21T12:43:52.113697+00:00", "EventTime": "2024-05-21T12:43:52.113716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWizLJ3vBqYYL37rP9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 131} +{"Format": "IDEA0", "ID": "081370b8-cf83-4dce-96c6-e4f71d2b039a", "DetectTime": "2024-05-21T12:43:52.160663+00:00", "EventTime": "2024-05-21T12:43:52.160682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Ur2O3nFz9MKMF9J"], "accumulated_threat_level": 7.199999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "e03f04c2-048b-469f-9780-2c98603a5f14", "DetectTime": "2024-05-21T12:43:52.207944+00:00", "EventTime": "2024-05-21T12:43:52.207963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQSUi4u2aerS4Mna"], "accumulated_threat_level": 7.999999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "2e6f6dd7-dd21-4b1d-8c3e-dfa1dd52953c", "DetectTime": "2024-05-21T12:43:52.514766+00:00", "EventTime": "2024-05-21T12:43:52.514787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFoiIr3u1Qg8HmaF1b"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "a4079627-9ccd-401d-ad63-89e76304c78c", "DetectTime": "2024-05-21T12:43:52.558773+00:00", "EventTime": "2024-05-21T12:43:52.558798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.206.109.47"]}], "Attach": [{"Content": "Connection to unknown destination port 18496/UDP destination IP 223.206.109.47. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctawv73fZGHLaxLMig"], "accumulated_threat_level": 8.799999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "3c771195-8c44-4bb1-85f9-363e8b810ab6", "DetectTime": "2024-05-21T12:43:52.606567+00:00", "EventTime": "2024-05-21T12:43:52.606586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy3fN1Uaic06GQCD2"], "accumulated_threat_level": 9.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "e74707b6-4642-4baa-9696-dae423856509", "DetectTime": "2024-05-21T12:43:52.655228+00:00", "EventTime": "2024-05-21T12:43:52.655248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8KT71XoeUy8tuPV1"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "14596930-3f98-4ae5-8c1d-d8d0443e9de9", "DetectTime": "2024-05-21T12:43:52.702942+00:00", "EventTime": "2024-05-21T12:43:52.702960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbOu4y3tV0FtB1F5Db"], "accumulated_threat_level": 11.200000000000001, "timewindow": 131} +{"Format": "IDEA0", "ID": "ccfbb39c-8b82-470b-b750-35020b5a1a64", "DetectTime": "2024-05-21T12:43:52.750461+00:00", "EventTime": "2024-05-21T12:43:52.750479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMcCLS1tIXDfE2t8W1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 131} +{"Format": "Json", "ID": "ccfbb39c-8b82-470b-b750-35020b5a1a64", "DetectTime": "2024-05-21T12:43:52.750461+00:00", "EventTime": "2024-05-21T12:43:52.750479+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "1970-01-06T10:24:14.651621+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2024/05/21 12:43:53.132897)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 131, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d02f438b-a7b0-432c-a101-113ac29a28dd", "DetectTime": "2024-05-21T12:43:53.145159+00:00", "EventTime": "2024-05-21T12:43:53.145183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmyMJF4rgGYddjS3T"], "accumulated_threat_level": 0.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "a84f54b9-25ec-4aad-8f15-eab3560c53ef", "DetectTime": "2024-05-21T12:43:53.156694+00:00", "EventTime": "2024-05-21T12:43:53.156716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZLTl3KActkCEJoCb"], "accumulated_threat_level": 1.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "06b3dbd0-1300-4f82-9770-a6bd68a577cb", "DetectTime": "2024-05-21T12:43:53.169621+00:00", "EventTime": "2024-05-21T12:43:53.169643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOKx242g7SiC6fYli"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "5f0e851b-760f-489e-ba58-0288cf6dc7f8", "DetectTime": "2024-05-21T12:43:53.182748+00:00", "EventTime": "2024-05-21T12:43:53.182767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvydha3v6c4un4Aq02"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 131} +{"Format": "IDEA0", "ID": "30c6a739-6604-46c9-9479-58fd98e657f8", "DetectTime": "2024-05-21T12:43:53.214549+00:00", "EventTime": "2024-05-21T12:43:53.214571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3URijDbLs7UPLwSj"], "accumulated_threat_level": 3.2, "timewindow": 131} +{"Format": "IDEA0", "ID": "bac2432d-6340-4a44-a682-de59c65c8e27", "DetectTime": "2024-05-21T12:43:53.271481+00:00", "EventTime": "2024-05-21T12:43:53.271499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJdRhs46ZqOqCNf5Ck"], "accumulated_threat_level": 4.0, "timewindow": 131} +{"Format": "IDEA0", "ID": "9e4f8518-868d-45c3-9123-fd92c40f94f1", "DetectTime": "2024-05-21T12:43:53.317360+00:00", "EventTime": "2024-05-21T12:43:53.317380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDJ7A1Xv3XvC9QmVj"], "accumulated_threat_level": 4.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "101b73f5-5016-4385-b0ea-6fa300f8d229", "DetectTime": "2024-05-21T12:43:53.364611+00:00", "EventTime": "2024-05-21T12:43:53.364630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8nB3w2H31WlIxyyEb"], "accumulated_threat_level": 5.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "8169058c-d834-45d1-a217-f7a93c9d7f6c", "DetectTime": "2024-05-21T12:43:53.406065+00:00", "EventTime": "2024-05-21T12:43:53.406086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPT2Kr1xABx3sgvYG7"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "134b38af-9791-4481-a89d-d38f1d63ca39", "DetectTime": "2024-05-21T12:43:53.487919+00:00", "EventTime": "2024-05-21T12:43:53.487939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllHQV385n5PiufSKg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 131} +{"Format": "IDEA0", "ID": "0e9ae282-dc0f-4df4-9773-df254eefcd65", "DetectTime": "2024-05-21T12:43:53.560002+00:00", "EventTime": "2024-05-21T12:43:53.560022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWCDqN1OgThmOLCAqg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "12204ebd-94d2-474f-8cbe-49b0cd22b415", "DetectTime": "2024-05-21T12:43:53.894996+00:00", "EventTime": "2024-05-21T12:43:53.895017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJp7xE3ItbdVGYYSYk"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "928bf7ec-5709-4b68-8425-27924d6d293e", "DetectTime": "2024-05-21T12:43:53.937335+00:00", "EventTime": "2024-05-21T12:43:53.937353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8nNApQ18W3DpBrwk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "d54b6323-43b4-4aaf-a65f-fd2fb651aef9", "DetectTime": "2024-05-21T12:43:53.983959+00:00", "EventTime": "2024-05-21T12:43:53.983976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMngBk241VrRaNaib9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "fbf37185-5a37-4684-bca1-c5520cac943f", "DetectTime": "2024-05-21T12:43:54.039402+00:00", "EventTime": "2024-05-21T12:43:54.039420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgjMcZ1izXfZk5tcP8"], "accumulated_threat_level": 9.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "2f71a13e-e396-441a-8e03-97801aa30a41", "DetectTime": "2024-05-21T12:43:54.076496+00:00", "EventTime": "2024-05-21T12:43:54.076515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMgZU3OvIV1slqE21"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "0fd5232c-928d-4035-9e8a-8db9c03aabcb", "DetectTime": "2024-05-21T12:43:54.122362+00:00", "EventTime": "2024-05-21T12:43:54.122383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMGe42j2Heaf9xE4i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 131} +{"Format": "IDEA0", "ID": "933e06f2-daab-4cdd-8024-d8e4d492de6e", "DetectTime": "2024-05-21T12:43:54.172766+00:00", "EventTime": "2024-05-21T12:43:54.172789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNUwJFBVexIMuyvcl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 131} +{"Format": "Json", "ID": "933e06f2-daab-4cdd-8024-d8e4d492de6e", "DetectTime": "2024-05-21T12:43:54.172766+00:00", "EventTime": "2024-05-21T12:43:54.172789+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-06T10:54:35.985510+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2024/05/21 12:43:54.352937)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 131, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a6feeaa0-7d59-4e92-8146-ebe699380352", "DetectTime": "2024-05-21T12:43:54.366495+00:00", "EventTime": "2024-05-21T12:43:54.366527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xbdnMS5xePyEWWa"], "accumulated_threat_level": 0.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "34711275-7673-409b-b770-beb9a91eddda", "DetectTime": "2024-05-21T12:43:54.371533+00:00", "EventTime": "2024-05-21T12:43:54.371552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfKvj12rqE6qiYMj4"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "2939a50c-f69c-4e3c-8aea-7eb9db8abc90", "DetectTime": "2024-05-21T12:43:54.533037+00:00", "EventTime": "2024-05-21T12:43:54.533060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjPrUw1hwttNsmP8Tc"], "accumulated_threat_level": 1.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "5d94c91d-ea1a-4e90-b30f-f95532ee343d", "DetectTime": "2024-05-21T12:43:54.583481+00:00", "EventTime": "2024-05-21T12:43:54.583507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7psAr2rjY2GisZRv8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 131} +{"Format": "IDEA0", "ID": "9d03b310-5ada-4c64-82ec-54d56cad53e9", "DetectTime": "2024-05-21T12:43:54.632732+00:00", "EventTime": "2024-05-21T12:43:54.632751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleLV31x2m3vzSNBoc"], "accumulated_threat_level": 3.2, "timewindow": 131} +{"Format": "IDEA0", "ID": "2720d842-8b13-4575-ac0b-0a8c12bde001", "DetectTime": "2024-05-21T12:43:54.680395+00:00", "EventTime": "2024-05-21T12:43:54.680415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAG1p6GObUHwDCLl"], "accumulated_threat_level": 4.0, "timewindow": 131} +{"Format": "IDEA0", "ID": "cb8bb06b-2c22-4cad-8d5e-2c85b1d67791", "DetectTime": "2024-05-21T12:43:54.728962+00:00", "EventTime": "2024-05-21T12:43:54.728982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRx2X2dGNuF4XYqR6"], "accumulated_threat_level": 4.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "edda05d7-f978-44d4-9312-f4b4dc4bfda5", "DetectTime": "2024-05-21T12:43:54.776110+00:00", "EventTime": "2024-05-21T12:43:54.776129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6IM413JkfEV4toak"], "accumulated_threat_level": 5.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "433d6bf2-4a4b-4bcb-9680-ac87e21217f2", "DetectTime": "2024-05-21T12:43:54.822302+00:00", "EventTime": "2024-05-21T12:43:54.822321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbCcQ2Zk4no1YeCva"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 131} +{"Format": "IDEA0", "ID": "ba8ea20a-283b-4044-b10b-baae0049be59", "DetectTime": "2024-05-21T12:43:54.868927+00:00", "EventTime": "2024-05-21T12:43:54.868945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUUThL1SfaFlW94vL"], "accumulated_threat_level": 7.199999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "aa59fa92-9df0-4eed-a10c-5703ccfd68b5", "DetectTime": "2024-05-21T12:43:54.916452+00:00", "EventTime": "2024-05-21T12:43:54.916471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYLk1r1VnpedHCO"], "accumulated_threat_level": 7.999999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "d28cc1dd-22ed-4337-bfcd-84339ff762c4", "DetectTime": "2024-05-21T12:43:55.189614+00:00", "EventTime": "2024-05-21T12:43:55.189634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRvvM2xjfsn6Yg3ji"], "accumulated_threat_level": 8.799999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "f2071fec-20cf-454c-b521-06117daf14cb", "DetectTime": "2024-05-21T12:43:55.233428+00:00", "EventTime": "2024-05-21T12:43:55.233448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpfkmSoRlvGM3BoG2"], "accumulated_threat_level": 9.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "d212c7ce-e3aa-428a-9231-af93faf6bded", "DetectTime": "2024-05-21T12:43:55.384855+00:00", "EventTime": "2024-05-21T12:43:55.384884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUpL21h6UbXy1erW2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "e173b68c-8ff4-45d8-bcd2-774c1e8e0a48", "DetectTime": "2024-05-21T12:43:55.399079+00:00", "EventTime": "2024-05-21T12:43:55.399102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C75o1fTnHQb2th0vk"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "1bbf8669-a848-4298-9c35-73c0a0e32fd3", "DetectTime": "2024-05-21T12:43:55.441725+00:00", "EventTime": "2024-05-21T12:43:55.441746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8JON1kDnl9m5RXRh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 131} +{"Format": "IDEA0", "ID": "6a83c0eb-5865-4788-b9b3-df606cc61729", "DetectTime": "2024-05-21T12:43:55.487585+00:00", "EventTime": "2024-05-21T12:43:55.487624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E9vJ2gmU3pmd5938"], "accumulated_threat_level": 12.000000000000002, "timewindow": 131} +{"Format": "Json", "ID": "6a83c0eb-5865-4788-b9b3-df606cc61729", "DetectTime": "2024-05-21T12:43:55.487585+00:00", "EventTime": "2024-05-21T12:43:55.487624+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-06T10:54:39.176333+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 131. (real time 2024/05/21 12:43:55.702814)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 131, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "553a4508-05bc-4acd-8db0-9fae4717349a", "DetectTime": "2024-05-21T12:43:55.715780+00:00", "EventTime": "2024-05-21T12:43:55.715803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUujd4D3rPryj9LMi"], "accumulated_threat_level": 0.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "39bf9850-433a-4b2b-893a-8e1bd20a5a9f", "DetectTime": "2024-05-21T12:43:55.728612+00:00", "EventTime": "2024-05-21T12:43:55.728632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YJR04vUg4FRMVTp"], "accumulated_threat_level": 1.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "a631f8f8-7c62-4f87-9e1c-a1342693f059", "DetectTime": "2024-05-21T12:43:55.869361+00:00", "EventTime": "2024-05-21T12:43:55.869380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cumpnp21qYkMZoYncg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 131} +{"Format": "IDEA0", "ID": "843da297-d88b-4ac7-9b65-51d69e00aaac", "DetectTime": "2024-05-21T12:43:55.916171+00:00", "EventTime": "2024-05-21T12:43:55.916190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEUA6j2TY2IENs8nsg"], "accumulated_threat_level": 3.2, "timewindow": 131} +{"Format": "IDEA0", "ID": "69e673ee-4f56-490c-b401-7bd750f0af08", "DetectTime": "2024-05-21T12:43:55.961579+00:00", "EventTime": "2024-05-21T12:43:55.961600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4eOwe34pWOq9jt0S2"], "accumulated_threat_level": 4.0, "timewindow": 131} +{"Format": "IDEA0", "ID": "632efb19-dc0f-4c38-9360-b68fe194733e", "DetectTime": "2024-05-21T12:43:56.006943+00:00", "EventTime": "2024-05-21T12:43:56.006962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJSnf13fXtUKqc187"], "accumulated_threat_level": 4.8, "timewindow": 131} +{"Format": "IDEA0", "ID": "fbfc6749-d410-4b42-961f-9f47ec8bec61", "DetectTime": "2024-05-21T12:43:56.039781+00:00", "EventTime": "2024-05-21T12:43:56.039802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRhTSg1ZpirX8FLS3h"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "7605886e-ead9-40ec-a138-9808f6076198", "DetectTime": "2024-05-21T12:43:56.079432+00:00", "EventTime": "2024-05-21T12:43:56.079456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkBDF4dRwPJ7Sr0xi"], "accumulated_threat_level": 5.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "750cc5bf-5988-44fd-a7f7-b1e1dd1f5d2c", "DetectTime": "2024-05-21T12:43:56.122390+00:00", "EventTime": "2024-05-21T12:43:56.122426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6Gbk19BTkAjKVyEg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 131} +{"Format": "IDEA0", "ID": "a375ea60-2ea8-4b95-b736-2d5a26075d4a", "DetectTime": "2024-05-21T12:43:56.166873+00:00", "EventTime": "2024-05-21T12:43:56.166893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkEtvuhzCDJrgvAg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "cebd0ec7-feaa-4a6f-85e7-bfb9e16bd805", "DetectTime": "2024-05-21T12:43:56.213026+00:00", "EventTime": "2024-05-21T12:43:56.213045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzqud4v3ZDkb71sxf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "035acf3a-630e-42d1-a8d6-69540c387c3d", "DetectTime": "2024-05-21T12:43:56.478368+00:00", "EventTime": "2024-05-21T12:43:56.478387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIj6TF4wDa4AM3mjhe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 131} +{"Format": "IDEA0", "ID": "5fc751df-35cb-4113-b9ac-4841bf5e5055", "DetectTime": "2024-05-21T12:43:56.526794+00:00", "EventTime": "2024-05-21T12:43:56.526813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuP4EItMcS5SMYZSj"], "accumulated_threat_level": 9.6, "timewindow": 131} +{"Format": "IDEA0", "ID": "95bf6664-f6b3-4b47-8a7f-fce861b42d14", "DetectTime": "2024-05-21T12:43:56.570836+00:00", "EventTime": "2024-05-21T12:43:56.570855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGoj61KgFla0iinwg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "5b3f778d-14b3-4d49-a7c0-0547f9f58dbc", "DetectTime": "2024-05-21T12:43:56.667688+00:00", "EventTime": "2024-05-21T12:43:56.667723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGeYabfAKRX2Gd9f"], "accumulated_threat_level": 0.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "9d2b1087-994e-4743-847f-2e2b674a00bd", "DetectTime": "2024-05-21T12:43:56.691259+00:00", "EventTime": "2024-05-21T12:43:56.691279+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0eIl4HUrpzx34dD4"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "d4638ed1-2a54-42ec-8058-41acd6581cfa", "DetectTime": "2024-05-21T12:43:56.705511+00:00", "EventTime": "2024-05-21T12:43:56.705530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0eIl4HUrpzx34dD4"], "accumulated_threat_level": 4.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "6d2ea506-917c-40b0-9f76-f9df2e4d0131", "DetectTime": "2024-05-21T12:43:56.726484+00:00", "EventTime": "2024-05-21T12:43:56.726503+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2mUzS15h0iXAErkHe"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "ad3e247d-39b8-4400-b6d5-15f3180830c6", "DetectTime": "2024-05-21T12:43:56.740192+00:00", "EventTime": "2024-05-21T12:43:56.740226+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2mUzS15h0iXAErkHe"], "accumulated_threat_level": 4.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "a204bc8c-9671-4547-b2c2-f25e827ea371", "DetectTime": "2024-05-21T12:43:56.779299+00:00", "EventTime": "2024-05-21T12:43:56.779317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetCC14lae4Vh6pugb"], "accumulated_threat_level": 1.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "a07b5a7e-f883-465c-b50d-1241d667b616", "DetectTime": "2024-05-21T12:43:56.817373+00:00", "EventTime": "2024-05-21T12:43:56.817392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNfeb1NHGQ6hgeQB5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 132} +{"Format": "IDEA0", "ID": "b79ae19c-20a2-4459-97c8-5c561fb6ad25", "DetectTime": "2024-05-21T12:43:56.864614+00:00", "EventTime": "2024-05-21T12:43:56.864635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4FNsBUMZPxRdHwe"], "accumulated_threat_level": 3.2, "timewindow": 132} +{"Format": "IDEA0", "ID": "50403435-e83e-492a-8318-261c91d9b100", "DetectTime": "2024-05-21T12:43:56.910855+00:00", "EventTime": "2024-05-21T12:43:56.910873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFvp44jehHKu4j15k"], "accumulated_threat_level": 4.0, "timewindow": 132} +{"Format": "IDEA0", "ID": "e5ff9b1c-df5f-49d0-b83c-805fd823c413", "DetectTime": "2024-05-21T12:43:56.959686+00:00", "EventTime": "2024-05-21T12:43:56.959706+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3cjo3hQTGlXu2DIa"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "7bbdffb6-a1c2-4c18-a6a0-cc3d30f5b16d", "DetectTime": "2024-05-21T12:43:56.973489+00:00", "EventTime": "2024-05-21T12:43:56.973508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgyCa14Iijw8NDHph"], "accumulated_threat_level": 4.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "c1a312ce-dced-4706-93c0-cf64cf8be548", "DetectTime": "2024-05-21T12:43:56.987618+00:00", "EventTime": "2024-05-21T12:43:56.987637+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3cjo3hQTGlXu2DIa"], "accumulated_threat_level": 5.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "1cd5e57e-eb4c-4baa-987c-b1d05eb94a8e", "DetectTime": "2024-05-21T12:43:57.001507+00:00", "EventTime": "2024-05-21T12:43:57.001525+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuDaAkhKRLDzrHN3"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "75e16d70-a3be-4d49-b463-0f88c259edcb", "DetectTime": "2024-05-21T12:43:57.015392+00:00", "EventTime": "2024-05-21T12:43:57.015410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuDaAkhKRLDzrHN3"], "accumulated_threat_level": 5.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "ae93dbb3-e06c-4903-9b51-701d7bd70a04", "DetectTime": "2024-05-21T12:43:57.062776+00:00", "EventTime": "2024-05-21T12:43:57.062795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95Glb2F8cTPbnNubb"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "6ff4c005-dadb-416f-ab35-c718e56e6eb5", "DetectTime": "2024-05-21T12:43:57.076274+00:00", "EventTime": "2024-05-21T12:43:57.076292+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C95Glb2F8cTPbnNubb"], "accumulated_threat_level": 6.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "6d81c9f8-1b41-478f-895e-d8afa19a1317", "DetectTime": "2024-05-21T12:43:57.246666+00:00", "EventTime": "2024-05-21T12:43:57.246686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgxovt2HhAJCoXL7Pe"], "accumulated_threat_level": 5.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "47d8d65b-2f43-4742-a5b1-5662a6471036", "DetectTime": "2024-05-21T12:43:57.288741+00:00", "EventTime": "2024-05-21T12:43:57.288760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzwD5b2VFgZEEx9QLk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 132} +{"Format": "IDEA0", "ID": "88e6dd05-1e54-4c60-9c8c-0ff5cdf39455", "DetectTime": "2024-05-21T12:43:57.336491+00:00", "EventTime": "2024-05-21T12:43:57.336517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRJUMR84Z2YnViZ8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "4fb1f7a5-5131-4608-a75e-15ad62b76835", "DetectTime": "2024-05-21T12:43:57.383986+00:00", "EventTime": "2024-05-21T12:43:57.384005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDWxgy2BIwDYOynq9h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "d49b9973-d4cc-49a9-9871-58555f03befa", "DetectTime": "2024-05-21T12:43:57.434291+00:00", "EventTime": "2024-05-21T12:43:57.434312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKpH1H2VUom1bR0bQ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "90722306-56ca-4de7-ad75-5ff7345cdb27", "DetectTime": "2024-05-21T12:43:57.477905+00:00", "EventTime": "2024-05-21T12:43:57.477923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKHMSJ2u4PvgNBBSh6"], "accumulated_threat_level": 9.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "ee12cb80-b95d-4648-9145-e78eac831db5", "DetectTime": "2024-05-21T12:43:57.525863+00:00", "EventTime": "2024-05-21T12:43:57.525883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeBgWqtYhNXGqm8b"], "accumulated_threat_level": 10.4, "timewindow": 132} +{"Format": "IDEA0", "ID": "bf1dba60-a414-42a5-998e-d542384c426a", "DetectTime": "2024-05-21T12:43:57.575197+00:00", "EventTime": "2024-05-21T12:43:57.575216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMpCNd3VqN1pLgKHI"], "accumulated_threat_level": 11.200000000000001, "timewindow": 132} +{"Format": "IDEA0", "ID": "cf3a934a-076f-4b03-b04a-43dedca125da", "DetectTime": "2024-05-21T12:43:57.851291+00:00", "EventTime": "2024-05-21T12:43:57.851314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjsqBM3oA82h3rSCs"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "f92ba3ea-b695-4dda-8bff-bff23027b247", "DetectTime": "2024-05-21T12:43:57.892421+00:00", "EventTime": "2024-05-21T12:43:57.892443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUHjiM3m0gDl8LZOa3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 132} +{"Format": "Json", "ID": "f92ba3ea-b695-4dda-8bff-bff23027b247", "DetectTime": "2024-05-21T12:43:57.892421+00:00", "EventTime": "2024-05-21T12:43:57.892443+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-06T11:25:56.990801+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2024/05/21 12:43:58.090947)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 132, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1619a8de-c3f5-42a9-8b1c-fe7fc69f513d", "DetectTime": "2024-05-21T12:43:58.102124+00:00", "EventTime": "2024-05-21T12:43:58.102142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZQbC4kgVDgXkUUng"], "accumulated_threat_level": 0.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "16cac8ed-49a3-4dd3-86a1-1da2f7d95a10", "DetectTime": "2024-05-21T12:43:58.117412+00:00", "EventTime": "2024-05-21T12:43:58.117430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnM2UOXeIF8w2tch"], "accumulated_threat_level": 1.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "ee5066b6-61c8-4d87-a648-ee7ca37cd8de", "DetectTime": "2024-05-21T12:43:58.130623+00:00", "EventTime": "2024-05-21T12:43:58.130642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpzfU3dt6p0hiR1Aj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 132} +{"Format": "IDEA0", "ID": "80aea0e1-7074-4416-bed9-12ccd1d361e7", "DetectTime": "2024-05-21T12:43:58.141652+00:00", "EventTime": "2024-05-21T12:43:58.141671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYidf2oHcDNKBarCl"], "accumulated_threat_level": 3.2, "timewindow": 132} +{"Format": "IDEA0", "ID": "76a1f39f-81c8-4954-9a99-195623c85bb5", "DetectTime": "2024-05-21T12:43:58.146314+00:00", "EventTime": "2024-05-21T12:43:58.146332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiHktx2qGpjXNNSkv1", "ChdSA61n1rJRcElIU5", "C6MOj11okTVxMuFff4", "C7m0Yw1KMqQx9tgiP"], "accumulated_threat_level": 0.5, "timewindow": 134} +{"Format": "IDEA0", "ID": "429b90f6-1724-4b12-83a6-a06789f6fea7", "DetectTime": "2024-05-21T12:43:58.158697+00:00", "EventTime": "2024-05-21T12:43:58.158715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVaRrP2OVjazK7Uh6h"], "accumulated_threat_level": 4.0, "timewindow": 132} +{"Format": "IDEA0", "ID": "8ffe10ba-968e-4c40-90e4-a307251b84ca", "DetectTime": "2024-05-21T12:43:58.175934+00:00", "EventTime": "2024-05-21T12:43:58.175953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHH2j1HjilewwNfbd"], "accumulated_threat_level": 4.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "adabf048-7735-4797-a0b4-76e6f3fb0496", "DetectTime": "2024-05-21T12:43:58.470298+00:00", "EventTime": "2024-05-21T12:43:58.470319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnLmS156p7PTs1dJ9"], "accumulated_threat_level": 5.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "574e30e6-55f6-4155-bf75-677c57e55e81", "DetectTime": "2024-05-21T12:43:58.515770+00:00", "EventTime": "2024-05-21T12:43:58.515790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNIIiz4GNbrnBd4c8l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 132} +{"Format": "IDEA0", "ID": "4e05a6d9-f53b-4faf-a215-9700cb08dff1", "DetectTime": "2024-05-21T12:43:58.563103+00:00", "EventTime": "2024-05-21T12:43:58.563122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfcxCP2Eb09Vxp7aN8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "cea482d9-797a-4325-ba64-d876c5afe77b", "DetectTime": "2024-05-21T12:43:58.701814+00:00", "EventTime": "2024-05-21T12:43:58.701834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKmAroXswXo4lbMl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "f1c83e5f-d494-4eb9-b917-2876bb90e382", "DetectTime": "2024-05-21T12:43:58.713704+00:00", "EventTime": "2024-05-21T12:43:58.713725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsb4S3kt8hadtnZ9h"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "afcd1d91-d6e7-44aa-96b7-713d3cd516bb", "DetectTime": "2024-05-21T12:43:58.756756+00:00", "EventTime": "2024-05-21T12:43:58.756775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csyo6GQKrjOw3pXN4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "0235abdd-8974-42ea-99a1-56a373696d50", "DetectTime": "2024-05-21T12:43:58.804133+00:00", "EventTime": "2024-05-21T12:43:58.804151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQ4MG1cR3upx2mb6a"], "accumulated_threat_level": 9.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "6eae663b-4d80-426d-8245-d8716210fd1b", "DetectTime": "2024-05-21T12:43:58.849951+00:00", "EventTime": "2024-05-21T12:43:58.849970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQcN0gO5Ch0cUMHn8"], "accumulated_threat_level": 10.4, "timewindow": 132} +{"Format": "IDEA0", "ID": "944c765c-9752-4805-ace1-aacbd9ad0592", "DetectTime": "2024-05-21T12:43:58.899877+00:00", "EventTime": "2024-05-21T12:43:58.899897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTih0C3naWdnuxKKP7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 132} +{"Format": "IDEA0", "ID": "ee2d7272-9e88-47cd-abae-3f00c0f9b656", "DetectTime": "2024-05-21T12:43:59.175937+00:00", "EventTime": "2024-05-21T12:43:59.175958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clc3oT2338me4aXmqi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 132} +{"Format": "Json", "ID": "ee2d7272-9e88-47cd-abae-3f00c0f9b656", "DetectTime": "2024-05-21T12:43:59.175937+00:00", "EventTime": "2024-05-21T12:43:59.175958+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "1970-01-06T11:26:01.835506+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2024/05/21 12:43:59.349068)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 132, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "793a25c7-335e-4592-b58f-daf044b0cb5c", "DetectTime": "2024-05-21T12:43:59.359900+00:00", "EventTime": "2024-05-21T12:43:59.359918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNJaDWBTGE4fKsZ"], "accumulated_threat_level": 0.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "ba23f0f8-5db8-40a1-aa2f-539a17677947", "DetectTime": "2024-05-21T12:43:59.371685+00:00", "EventTime": "2024-05-21T12:43:59.371704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0kX03o1rDl4b6W0e"], "accumulated_threat_level": 1.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "26790a5d-4aec-4f5d-b036-cd2715eb651b", "DetectTime": "2024-05-21T12:43:59.385010+00:00", "EventTime": "2024-05-21T12:43:59.385028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcGQs4wVkGmoM6Z0c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 132} +{"Format": "IDEA0", "ID": "6db7246f-f176-4a8a-acb4-fcc72302006b", "DetectTime": "2024-05-21T12:43:59.396011+00:00", "EventTime": "2024-05-21T12:43:59.396029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnKl8F4TAjiAR5EKj9"], "accumulated_threat_level": 3.2, "timewindow": 132} +{"Format": "IDEA0", "ID": "1b2902b8-00e8-492d-860c-681f019763a0", "DetectTime": "2024-05-21T12:43:59.407965+00:00", "EventTime": "2024-05-21T12:43:59.407984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csku9CFXCliZQcM3j"], "accumulated_threat_level": 4.0, "timewindow": 132} +{"Format": "IDEA0", "ID": "fe712801-aff8-497a-8b0c-013dfdea1906", "DetectTime": "2024-05-21T12:43:59.459027+00:00", "EventTime": "2024-05-21T12:43:59.459047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKBni2Meu4Yy0tST9"], "accumulated_threat_level": 4.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "034f8a9a-fb10-498c-956c-8e80be889285", "DetectTime": "2024-05-21T12:43:59.541609+00:00", "EventTime": "2024-05-21T12:43:59.541629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Lf0N38ulqiMgjchj"], "accumulated_threat_level": 5.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "621bd2ca-e164-4a35-bd2b-18ea7043b93b", "DetectTime": "2024-05-21T12:43:59.810852+00:00", "EventTime": "2024-05-21T12:43:59.810874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNwuwKUK3BLYf4Zr4"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "0660c856-d48b-4981-a49c-086a2a98616a", "DetectTime": "2024-05-21T12:43:59.878389+00:00", "EventTime": "2024-05-21T12:43:59.878425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXtrUC2U8EnRPjXS"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 132} +{"Format": "IDEA0", "ID": "5805ffab-682c-4d9f-93c4-ca8d2422732c", "DetectTime": "2024-05-21T12:43:59.928126+00:00", "EventTime": "2024-05-21T12:43:59.928147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNyySh1vdpjBQTxHTd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "14455fe9-eb04-4d81-8612-89956d67f556", "DetectTime": "2024-05-21T12:43:59.988693+00:00", "EventTime": "2024-05-21T12:43:59.988712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFkhxx4M3GVKGKYgW6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "e5f6a6ad-b0ba-45ab-bd29-b2261a9a09d6", "DetectTime": "2024-05-21T12:44:00.105626+00:00", "EventTime": "2024-05-21T12:44:00.105650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UqTy41hdsFv1B5xf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "bc701342-d213-4812-ad2e-fb023ef0a68e", "DetectTime": "2024-05-21T12:44:00.155408+00:00", "EventTime": "2024-05-21T12:44:00.155428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZMN62e5RiyxxDZwa"], "accumulated_threat_level": 9.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "fba75e7f-29e2-4107-b746-a907965e5a07", "DetectTime": "2024-05-21T12:44:00.203713+00:00", "EventTime": "2024-05-21T12:44:00.203734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22qiD4kidmqJgP1cf"], "accumulated_threat_level": 10.4, "timewindow": 132} +{"Format": "IDEA0", "ID": "e55b03bb-9980-46bf-8c3b-2bee163dd953", "DetectTime": "2024-05-21T12:44:00.258488+00:00", "EventTime": "2024-05-21T12:44:00.258507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRNJk47rWSUgGA7T2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 132} +{"Format": "IDEA0", "ID": "f7cb0611-00bd-4d52-8bc8-ac09ea9a1ca8", "DetectTime": "2024-05-21T12:44:00.306713+00:00", "EventTime": "2024-05-21T12:44:00.306732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBpDz3srSBpX3jihl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 132} +{"Format": "Json", "ID": "f7cb0611-00bd-4d52-8bc8-ac09ea9a1ca8", "DetectTime": "2024-05-21T12:44:00.306713+00:00", "EventTime": "2024-05-21T12:44:00.306732+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-06T11:56:36.674738+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2024/05/21 12:44:00.498094)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 132, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ad4858d0-6804-4d59-8fd7-3b59f0e2774d", "DetectTime": "2024-05-21T12:44:00.595005+00:00", "EventTime": "2024-05-21T12:44:00.595024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClBY9i4xPy0gwzU9F5"], "accumulated_threat_level": 0.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "ee5b5daf-174e-43dd-a52f-bde1ba7bc45a", "DetectTime": "2024-05-21T12:44:00.643866+00:00", "EventTime": "2024-05-21T12:44:00.643884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CixvYb1fR3wlMhcoQ9"], "accumulated_threat_level": 1.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "552e129b-7b54-4c00-bec6-4155c8db9c8b", "DetectTime": "2024-05-21T12:44:00.688517+00:00", "EventTime": "2024-05-21T12:44:00.688536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxDpAaNGyGzlDjNQf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 132} +{"Format": "IDEA0", "ID": "ae806041-41f5-4a23-80dd-4563fb2abebd", "DetectTime": "2024-05-21T12:44:00.732913+00:00", "EventTime": "2024-05-21T12:44:00.732933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjnURNH5HidWxuSl"], "accumulated_threat_level": 3.2, "timewindow": 132} +{"Format": "IDEA0", "ID": "f10b8e78-fcd2-4395-a16e-9ceb6a3ae386", "DetectTime": "2024-05-21T12:44:00.777737+00:00", "EventTime": "2024-05-21T12:44:00.777768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzWSLpdosxTbQz9h"], "accumulated_threat_level": 4.0, "timewindow": 132} +{"Format": "IDEA0", "ID": "2bd207f3-156a-44ea-ae26-7bfa9ae18946", "DetectTime": "2024-05-21T12:44:00.822209+00:00", "EventTime": "2024-05-21T12:44:00.822231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKWIP2L4dgtb1vq95"], "accumulated_threat_level": 4.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "8680d83e-906e-47b4-8393-cde9081bfb89", "DetectTime": "2024-05-21T12:44:00.875087+00:00", "EventTime": "2024-05-21T12:44:00.875118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLDTt1xz45FW22pcd"], "accumulated_threat_level": 5.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "1a838e1f-9df8-44f7-8bf8-0a78fffb1f15", "DetectTime": "2024-05-21T12:44:00.921338+00:00", "EventTime": "2024-05-21T12:44:00.921359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLpm02I5SWyCJTF79"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 132} +{"Format": "IDEA0", "ID": "bf26cdfb-96a3-4764-b4db-449364391a6a", "DetectTime": "2024-05-21T12:44:01.183285+00:00", "EventTime": "2024-05-21T12:44:01.183307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAeDy4nQK2mdqmW7d"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "cc83ee05-c833-40a0-9767-03968bca06e7", "DetectTime": "2024-05-21T12:44:01.243625+00:00", "EventTime": "2024-05-21T12:44:01.243644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuvVs535xLfJvTn7Bb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ae151d12-e79f-44d9-b34d-2d0ee767b989", "DetectTime": "2024-05-21T12:44:01.265196+00:00", "EventTime": "2024-05-21T12:44:01.265216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNmMAA4XcCtD5eexL7"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "c943cdf5-9f1d-4844-956f-5e4a7bef4658", "DetectTime": "2024-05-21T12:44:01.315649+00:00", "EventTime": "2024-05-21T12:44:01.315672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMjN7qCbt8GNVSg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "dca4b834-3547-42fc-bcd6-2deb39ff87e9", "DetectTime": "2024-05-21T12:44:01.360885+00:00", "EventTime": "2024-05-21T12:44:01.360904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7CU953FC21sOPRc43"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ef00fb29-21ec-4ed1-b8ed-282d2b8d7a01", "DetectTime": "2024-05-21T12:44:01.407593+00:00", "EventTime": "2024-05-21T12:44:01.407614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLuTh1hNltsQZfAIg"], "accumulated_threat_level": 9.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "4583ce8d-a99f-4330-a4d7-3378bf7a9f7e", "DetectTime": "2024-05-21T12:44:01.451500+00:00", "EventTime": "2024-05-21T12:44:01.451519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTAwk74TadVW57TUj5"], "accumulated_threat_level": 10.4, "timewindow": 132} +{"Format": "IDEA0", "ID": "31b63680-adce-49c8-bdb6-93c429c04bd5", "DetectTime": "2024-05-21T12:44:01.584385+00:00", "EventTime": "2024-05-21T12:44:01.584406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVYmPy4OoGVRlsH8Ol"], "accumulated_threat_level": 11.200000000000001, "timewindow": 132} +{"Format": "IDEA0", "ID": "e20c6024-7c8d-4f5c-a61c-fa1b966d05a2", "DetectTime": "2024-05-21T12:44:01.852531+00:00", "EventTime": "2024-05-21T12:44:01.852553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnLa5U2HpdMvolP7ml"], "accumulated_threat_level": 12.000000000000002, "timewindow": 132} +{"Format": "Json", "ID": "e20c6024-7c8d-4f5c-a61c-fa1b966d05a2", "DetectTime": "2024-05-21T12:44:01.852531+00:00", "EventTime": "2024-05-21T12:44:01.852553+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-06T11:56:56.679761+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 132. (real time 2024/05/21 12:44:02.084392)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 132, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cd79016a-0f10-4928-b467-4c82330da7f8", "DetectTime": "2024-05-21T12:44:02.095598+00:00", "EventTime": "2024-05-21T12:44:02.095616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYSCygOONnDVm5eok"], "accumulated_threat_level": 0.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "639013bb-080d-46f9-83d7-aa2718463275", "DetectTime": "2024-05-21T12:44:02.110995+00:00", "EventTime": "2024-05-21T12:44:02.111016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9NxUn3r53Un6PYOta"], "accumulated_threat_level": 1.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "30e40153-6543-424c-8114-c3a7f9789798", "DetectTime": "2024-05-21T12:44:02.122330+00:00", "EventTime": "2024-05-21T12:44:02.122348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40iow4FU4q6VFxl7f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 132} +{"Format": "IDEA0", "ID": "46739048-1cfb-4dad-927b-0fcd23711f56", "DetectTime": "2024-05-21T12:44:02.132941+00:00", "EventTime": "2024-05-21T12:44:02.132959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLreAa4im2gOU4JeTh"], "accumulated_threat_level": 3.2, "timewindow": 132} +{"Format": "IDEA0", "ID": "b2d3ad20-82c4-4bb8-affb-1d7059ea7372", "DetectTime": "2024-05-21T12:44:02.144492+00:00", "EventTime": "2024-05-21T12:44:02.144511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQ6qY35mjVx2eD9x9"], "accumulated_threat_level": 4.0, "timewindow": 132} +{"Format": "IDEA0", "ID": "d2b04081-5fee-42d7-94b1-18a611a5a8c1", "DetectTime": "2024-05-21T12:44:02.156465+00:00", "EventTime": "2024-05-21T12:44:02.156484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzxcZ1yEjn3HF2DRk"], "accumulated_threat_level": 4.8, "timewindow": 132} +{"Format": "IDEA0", "ID": "d6824394-f1f2-40fa-ad14-1e29508d2ba9", "DetectTime": "2024-05-21T12:44:02.179108+00:00", "EventTime": "2024-05-21T12:44:02.179127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBTvr13wSPgBMV1L7"], "accumulated_threat_level": 5.6, "timewindow": 132} +{"Format": "IDEA0", "ID": "58e15e25-044a-4427-9ffa-9392cc5339d5", "DetectTime": "2024-05-21T12:44:02.459252+00:00", "EventTime": "2024-05-21T12:44:02.459272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19A521WOtRDSFpfvj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 132} +{"Format": "IDEA0", "ID": "857c58e1-92e9-447f-bc32-479cba96dff8", "DetectTime": "2024-05-21T12:44:02.505089+00:00", "EventTime": "2024-05-21T12:44:02.505110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caxlm7262R7v7nT7p4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "8ba1e822-0720-43e4-b5b9-4b4501c1ae06", "DetectTime": "2024-05-21T12:44:02.549579+00:00", "EventTime": "2024-05-21T12:44:02.549601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Eif71IMWbsXoynDe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "f98d6ba3-ab88-4579-879d-42d3d226db11", "DetectTime": "2024-05-21T12:44:02.650895+00:00", "EventTime": "2024-05-21T12:44:02.650915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNVQus4NjpzvWdSrIi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "d20478f7-a625-4a67-9173-2a39fb81362f", "DetectTime": "2024-05-21T12:44:02.685293+00:00", "EventTime": "2024-05-21T12:44:02.685314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIxOT42P9CE2E6sTve"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "5bd06e05-0680-43ef-80fa-713368b31192", "DetectTime": "2024-05-21T12:44:02.774404+00:00", "EventTime": "2024-05-21T12:44:02.774437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHas11THQP3fdtJG3"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "9bd6080c-086e-4c0b-90c5-02a8446fe0c2", "DetectTime": "2024-05-21T12:44:02.833383+00:00", "EventTime": "2024-05-21T12:44:02.833400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmxvV2yvrNtNAtDCk"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "0a1056cc-2bd1-4a33-9fb1-5d3c1c162dd8", "DetectTime": "2024-05-21T12:44:02.891691+00:00", "EventTime": "2024-05-21T12:44:02.891709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrw5K18WnWnTtIBK2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 133} +{"Format": "IDEA0", "ID": "e1e93afa-4167-43fa-b284-e91420f162e6", "DetectTime": "2024-05-21T12:44:03.162747+00:00", "EventTime": "2024-05-21T12:44:03.162781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfe4if2IpVoXuuSq4g"], "accumulated_threat_level": 3.2, "timewindow": 133} +{"Format": "IDEA0", "ID": "c400590d-cb95-482f-9220-8af7095deaaf", "DetectTime": "2024-05-21T12:44:03.211373+00:00", "EventTime": "2024-05-21T12:44:03.211402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrRo9Q6RhqRjEdMWk"], "accumulated_threat_level": 4.0, "timewindow": 133} +{"Format": "IDEA0", "ID": "da92c9d3-b1b0-43d5-b7cd-8e231d859bbe", "DetectTime": "2024-05-21T12:44:03.260835+00:00", "EventTime": "2024-05-21T12:44:03.260874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48BCz1Y415QIcUxKh"], "accumulated_threat_level": 4.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "df4c28db-42c2-4d46-b69f-c3611de3cffa", "DetectTime": "2024-05-21T12:44:03.308448+00:00", "EventTime": "2024-05-21T12:44:03.308482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qy5J3IQI5qTFZCO9"], "accumulated_threat_level": 5.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "fea244d4-cd69-4201-9050-ce8ad87f31d2", "DetectTime": "2024-05-21T12:44:03.354382+00:00", "EventTime": "2024-05-21T12:44:03.354428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQcHiJ3OyTxiVfxpsk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 133} +{"Format": "IDEA0", "ID": "ca51882a-c482-4376-a9d0-7507e7277342", "DetectTime": "2024-05-21T12:44:03.402038+00:00", "EventTime": "2024-05-21T12:44:03.402057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdgFTKpJMnqFteYtb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "57e9b2cb-41e2-47b9-9f99-6391af0a7304", "DetectTime": "2024-05-21T12:44:03.674220+00:00", "EventTime": "2024-05-21T12:44:03.674241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2tx1IAcsxbDU1og"], "accumulated_threat_level": 7.999999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "57061448-6beb-4113-8751-ccd50a096046", "DetectTime": "2024-05-21T12:44:03.709102+00:00", "EventTime": "2024-05-21T12:44:03.709122+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZeLp34gtJUFjgsGf"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "6c9dde80-ad2a-48ae-ba95-015e988906a2", "DetectTime": "2024-05-21T12:44:03.724289+00:00", "EventTime": "2024-05-21T12:44:03.724310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZeLp34gtJUFjgsGf"], "accumulated_threat_level": 6.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "a247b48d-515c-4566-bb98-8584712eddd2", "DetectTime": "2024-05-21T12:44:03.736355+00:00", "EventTime": "2024-05-21T12:44:03.736391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1TL9b3h8rgFpqaYGa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "6609f9af-d77a-47d8-96d9-0c0479df702d", "DetectTime": "2024-05-21T12:44:03.768419+00:00", "EventTime": "2024-05-21T12:44:03.768443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtfkR33f2Lsx94SFl"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "6ffc20b6-537c-4a92-85a3-3416bb8c5b68", "DetectTime": "2024-05-21T12:44:03.814568+00:00", "EventTime": "2024-05-21T12:44:03.814598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHryqAh2b4QJ7kQb7"], "accumulated_threat_level": 10.4, "timewindow": 133} +{"Format": "IDEA0", "ID": "b45dee05-886d-4553-b85b-ec0e6f67cf03", "DetectTime": "2024-05-21T12:44:03.861947+00:00", "EventTime": "2024-05-21T12:44:03.861975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRB8q38wy05izpmgk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "66681d3c-8216-46e2-8dfc-68aa956980f6", "DetectTime": "2024-05-21T12:44:03.896027+00:00", "EventTime": "2024-05-21T12:44:03.896049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6OHpL3alULd1dmNh8"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "789d6935-1258-42cf-8eed-32ad4e9fe774", "DetectTime": "2024-05-21T12:44:03.930572+00:00", "EventTime": "2024-05-21T12:44:03.930596+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9gkN2RY52OIJLo22"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "876b4022-c712-4112-bd8e-42132515ea4c", "DetectTime": "2024-05-21T12:44:03.945798+00:00", "EventTime": "2024-05-21T12:44:03.945833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9gkN2RY52OIJLo22"], "accumulated_threat_level": 7.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "8424c94f-e0ae-4a0e-b67c-df51b50f0aa8", "DetectTime": "2024-05-21T12:44:03.959292+00:00", "EventTime": "2024-05-21T12:44:03.959324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzQZk2kSlVtaHK5Ua"], "accumulated_threat_level": 12.000000000000002, "timewindow": 133} +{"Format": "Json", "ID": "8424c94f-e0ae-4a0e-b67c-df51b50f0aa8", "DetectTime": "2024-05-21T12:44:03.959292+00:00", "EventTime": "2024-05-21T12:44:03.959324+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-06T12:27:06.755929+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2024/05/21 12:44:04.322837)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 133, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "625655fd-02f4-4aa0-bcfb-0cdb7aa41c14", "DetectTime": "2024-05-21T12:44:04.335013+00:00", "EventTime": "2024-05-21T12:44:04.335032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr9XTa52RQI8Md8j"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "714f3446-403a-4bc2-a4b9-47b8657e36c4", "DetectTime": "2024-05-21T12:44:04.347517+00:00", "EventTime": "2024-05-21T12:44:04.347535+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNgi42Xj6JdeS87kh"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "3da6384f-fb5c-43ab-a2b6-35c224f862da", "DetectTime": "2024-05-21T12:44:04.359730+00:00", "EventTime": "2024-05-21T12:44:04.359748+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqNgi42Xj6JdeS87kh"], "accumulated_threat_level": 7.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "45c0d702-94f8-495c-b619-74f8feb30afd", "DetectTime": "2024-05-21T12:44:04.374464+00:00", "EventTime": "2024-05-21T12:44:04.374483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUqenl1uGeCmProq17"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "4a4e861c-6f8f-49db-aa2e-3b21684da88c", "DetectTime": "2024-05-21T12:44:04.385682+00:00", "EventTime": "2024-05-21T12:44:04.385699+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPakr4Fx5INm0ZiL8"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "adac8f84-b6be-44e6-81df-4599a73ee72f", "DetectTime": "2024-05-21T12:44:04.397599+00:00", "EventTime": "2024-05-21T12:44:04.397617+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkPakr4Fx5INm0ZiL8"], "accumulated_threat_level": 8.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "1800b6f3-5e1d-4272-9bf3-513e6b603a61", "DetectTime": "2024-05-21T12:44:04.410457+00:00", "EventTime": "2024-05-21T12:44:04.410476+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crr6xC4mazDMaKz15c"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "d6c5df63-1f01-4022-860d-fe33b414149f", "DetectTime": "2024-05-21T12:44:04.423773+00:00", "EventTime": "2024-05-21T12:44:04.423791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crr6xC4mazDMaKz15c"], "accumulated_threat_level": 8.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "f4c98a90-14c9-4ff8-bb2c-4ec5deb81a00", "DetectTime": "2024-05-21T12:44:04.440456+00:00", "EventTime": "2024-05-21T12:44:04.440473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQW2PEW5LlqbP45T5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 133} +{"Format": "IDEA0", "ID": "0772cf6f-5283-439e-a7b8-22ec7fd899e4", "DetectTime": "2024-05-21T12:44:04.450667+00:00", "EventTime": "2024-05-21T12:44:04.450686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Courzb4ti2Y55qGKJ1"], "accumulated_threat_level": 3.2, "timewindow": 133} +{"Format": "IDEA0", "ID": "febee8ee-0ae7-4f3b-b8b4-4bce366ff366", "DetectTime": "2024-05-21T12:44:04.461538+00:00", "EventTime": "2024-05-21T12:44:04.461556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coqjqb3pcwMBzymEV1"], "accumulated_threat_level": 4.0, "timewindow": 133} +{"Format": "IDEA0", "ID": "ea806df7-3721-4b9d-ac16-fbe96fe4357d", "DetectTime": "2024-05-21T12:44:04.466265+00:00", "EventTime": "2024-05-21T12:44:04.466283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFItz1C8tTCfhuZG1", "CWNYFy1HniXisteLca", "C4vdpF4Q5bqdCD5QIj", "CyYVdCn6wSt0yGiv6"], "accumulated_threat_level": 0.5, "timewindow": 135} +{"Format": "IDEA0", "ID": "bc3582a6-7c06-4b8f-a434-83bf960ccc00", "DetectTime": "2024-05-21T12:44:04.476828+00:00", "EventTime": "2024-05-21T12:44:04.476845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Y94c2d5ezmC6GHu"], "accumulated_threat_level": 4.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "5e803f5a-47b5-489c-b745-2cc78fdfc5e7", "DetectTime": "2024-05-21T12:44:04.502044+00:00", "EventTime": "2024-05-21T12:44:04.502069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs56FXwSXW5QARBwe"], "accumulated_threat_level": 5.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "7c7dea4d-bc94-4441-b5f4-148a3fdb0e99", "DetectTime": "2024-05-21T12:44:04.518274+00:00", "EventTime": "2024-05-21T12:44:04.518295+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COK2vF2eyJaI8Q0Dua"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "c8f3b38c-42ad-4ab4-bd40-46d7be7dafd8", "DetectTime": "2024-05-21T12:44:04.531551+00:00", "EventTime": "2024-05-21T12:44:04.531570+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COK2vF2eyJaI8Q0Dua"], "accumulated_threat_level": 9.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "47f6e75b-2c8e-47c5-aa8d-9ab2d534be28", "DetectTime": "2024-05-21T12:44:04.545516+00:00", "EventTime": "2024-05-21T12:44:04.545536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEgue2NCAB3GFlK1k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 133} +{"Format": "IDEA0", "ID": "eaea86b8-2733-4cd5-97cc-4409ec256da0", "DetectTime": "2024-05-21T12:44:04.579464+00:00", "EventTime": "2024-05-21T12:44:04.579482+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrlwW12nlxnJ34SB0f"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "0c15edb6-b48f-4c5a-b55a-510b3576a69e", "DetectTime": "2024-05-21T12:44:04.593770+00:00", "EventTime": "2024-05-21T12:44:04.593791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrlwW12nlxnJ34SB0f"], "accumulated_threat_level": 9.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "90d6d460-4966-4f1b-8f15-2caaee52d0e1", "DetectTime": "2024-05-21T12:44:04.599560+00:00", "EventTime": "2024-05-21T12:44:04.599580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsS8hYH3uFkRMy87"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "20fa78e0-eace-4510-98c2-3f7f849a270b", "DetectTime": "2024-05-21T12:44:04.631263+00:00", "EventTime": "2024-05-21T12:44:04.631283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7lpL649b0MKyH7TAf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "32f31bfa-dd4c-4afb-aee1-c1e6e0d93ca1", "DetectTime": "2024-05-21T12:44:04.839576+00:00", "EventTime": "2024-05-21T12:44:04.839594+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipvnVPmNbjr5cOHk"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "a82dfc79-0713-4a9c-9cc7-1de242c0bd8e", "DetectTime": "2024-05-21T12:44:04.852115+00:00", "EventTime": "2024-05-21T12:44:04.852133+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipvnVPmNbjr5cOHk"], "accumulated_threat_level": 10.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "6f8d4209-9836-4a2d-8aff-62201044b613", "DetectTime": "2024-05-21T12:44:04.995746+00:00", "EventTime": "2024-05-21T12:44:04.995767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COIIPAzMVHKtvVil"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "f26bf99f-75c8-420e-9d57-43e12fe6b274", "DetectTime": "2024-05-21T12:44:05.002448+00:00", "EventTime": "2024-05-21T12:44:05.002467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2AWHEanrjX3yQS5"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "7ebce4fd-aa8a-4d5f-9c8d-592f6d972852", "DetectTime": "2024-05-21T12:44:05.007706+00:00", "EventTime": "2024-05-21T12:44:05.007726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2fyB54CHavKEJuuAk"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "e73acbe7-bc1a-496e-9f87-27e2a4152830", "DetectTime": "2024-05-21T12:44:05.105215+00:00", "EventTime": "2024-05-21T12:44:05.105237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEBWG2XDnIKa8jabh"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "8fc2da87-57f8-4d44-af5d-1541587299fc", "DetectTime": "2024-05-21T12:44:05.119225+00:00", "EventTime": "2024-05-21T12:44:05.119245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHq9HYA3FosSCDoeb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "5de02e4f-3554-4917-96d9-f8e7b2fbf223", "DetectTime": "2024-05-21T12:44:05.190623+00:00", "EventTime": "2024-05-21T12:44:05.190644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmY1J12a6hyQoVMDAd"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "f5a7497a-184c-459d-8c75-5cbcbd353e0c", "DetectTime": "2024-05-21T12:44:05.205479+00:00", "EventTime": "2024-05-21T12:44:05.205505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyhN94qeMfKhax3y5"], "accumulated_threat_level": 1.6, "timewindow": 130} +{"Format": "IDEA0", "ID": "d2bd5743-70d9-4543-a1f9-8c628e12f61b", "DetectTime": "2024-05-21T12:44:05.367039+00:00", "EventTime": "2024-05-21T12:44:05.367060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tn3a2vZPgJQAT8Mg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "765f6927-80b6-4115-863c-e7edf5f81abd", "DetectTime": "2024-05-21T12:44:05.642817+00:00", "EventTime": "2024-05-21T12:44:05.642839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3V6691XD6TkzGhdt1"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "03bad000-d5b1-47fc-85b4-31a382e34ac7", "DetectTime": "2024-05-21T12:44:05.649120+00:00", "EventTime": "2024-05-21T12:44:05.649140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.72.218.141 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn7tNA4uU1DSSzf0M2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "8ee102d8-9b19-4b00-a658-877e88a36b02", "DetectTime": "2024-05-21T12:44:05.654578+00:00", "EventTime": "2024-05-21T12:44:05.654596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lxj234Vn8EVu8N3j"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "01de138c-e949-4ca8-b753-54f23556cf31", "DetectTime": "2024-05-21T12:44:05.704613+00:00", "EventTime": "2024-05-21T12:44:05.704635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.241.169.218 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKwpg2m39NQkl0QEl"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "320e4220-1078-4161-a1d5-6c3cfd9555e7", "DetectTime": "2024-05-21T12:44:05.710168+00:00", "EventTime": "2024-05-21T12:44:05.710186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTsTZ1EoWfqr7hHp2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "55ed97bc-304d-43e0-9b14-10aaa4d34ad3", "DetectTime": "2024-05-21T12:44:05.849456+00:00", "EventTime": "2024-05-21T12:44:05.849476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWudGs39UizmGxlTtl"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "d3888c1e-56b5-473e-a644-9cffcd11d010", "DetectTime": "2024-05-21T12:44:05.872866+00:00", "EventTime": "2024-05-21T12:44:05.872887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWCk0AuTjpXYUxbm1"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "8a31ce54-a9b9-4e09-8b0b-0cd722ba1172", "DetectTime": "2024-05-21T12:44:05.899581+00:00", "EventTime": "2024-05-21T12:44:05.899602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbFRSe1kcTZvpq6RZa"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "ee454f29-6261-4fa9-99b5-e2388b34c4b4", "DetectTime": "2024-05-21T12:44:05.904387+00:00", "EventTime": "2024-05-21T12:44:05.904407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxjzD4PxmiG9SrJI3"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "057a3f47-0031-4f15-9ea1-b1e77a2b254c", "DetectTime": "2024-05-21T12:44:06.234333+00:00", "EventTime": "2024-05-21T12:44:06.234353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkryDC1BhkRoXXP4G7"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "1bca0fc1-8fb7-445b-8b3f-b7a6a9cffeab", "DetectTime": "2024-05-21T12:44:06.271079+00:00", "EventTime": "2024-05-21T12:44:06.271111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwvipR3stGrEy8egYj"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "ccc760d4-1643-48a3-983e-7aafc1285d9a", "DetectTime": "2024-05-21T12:44:06.363675+00:00", "EventTime": "2024-05-21T12:44:06.363695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdEWkm3K3X5rJZyHT7"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "e1491ea5-029f-4435-8280-6a0f41333a9f", "DetectTime": "2024-05-21T12:44:06.368477+00:00", "EventTime": "2024-05-21T12:44:06.368496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsFI3zHtONLAFNha"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "30a3c971-708b-49e7-a8d3-1e51d0190980", "DetectTime": "2024-05-21T12:44:06.377466+00:00", "EventTime": "2024-05-21T12:44:06.377484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPkYK2b3ff9vApvYh"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "48482ba0-a1c7-4505-b654-e2e764a71aa6", "DetectTime": "2024-05-21T12:44:06.411022+00:00", "EventTime": "2024-05-21T12:44:06.411045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKGFK3EVTcT31UZO9"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "06c8d82b-188b-4b78-be13-29e9e4317752", "DetectTime": "2024-05-21T12:44:06.449443+00:00", "EventTime": "2024-05-21T12:44:06.449462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdapSh1uaoNCWzumva"], "accumulated_threat_level": 10.4, "timewindow": 133} +{"Format": "IDEA0", "ID": "088a887c-247e-4a8e-b80b-188a4c973289", "DetectTime": "2024-05-21T12:44:06.486707+00:00", "EventTime": "2024-05-21T12:44:06.486726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6NabL3YI4xN2KO1"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "ef789e9c-f7d5-48f9-abd3-64bf27205fdb", "DetectTime": "2024-05-21T12:44:06.829123+00:00", "EventTime": "2024-05-21T12:44:06.829143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG7Upx4YUI3sc1pEik"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "53a2dd6e-4662-4f10-845c-822120cfeb4b", "DetectTime": "2024-05-21T12:44:06.834030+00:00", "EventTime": "2024-05-21T12:44:06.834048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeOpSn2n8FqB00vwM5"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "e6a2cf4b-43d2-43e3-bbf5-fa47b0d4b9d0", "DetectTime": "2024-05-21T12:44:06.906054+00:00", "EventTime": "2024-05-21T12:44:06.906078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3yXng1QqXmHdutI96"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "c4f55f06-ef8e-4c21-84a9-0ae374f71407", "DetectTime": "2024-05-21T12:44:06.912008+00:00", "EventTime": "2024-05-21T12:44:06.912029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALG8L3SWxLXr1MoCb"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "572a5b5e-fecd-4c77-b126-c92b8cdf4fcd", "DetectTime": "2024-05-21T12:44:06.954971+00:00", "EventTime": "2024-05-21T12:44:06.954994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTV8svg2SM8E9hqf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "d9ab8d91-a15a-46ab-92b1-ccb4aca2f86c", "DetectTime": "2024-05-21T12:44:06.996835+00:00", "EventTime": "2024-05-21T12:44:06.996857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiMAoJ179bfFuP4K82"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "d5f4b97c-5e3f-4efb-8a9a-4d1f547dd25a", "DetectTime": "2024-05-21T12:44:07.210495+00:00", "EventTime": "2024-05-21T12:44:07.210518+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["76.191.140.101"], "Type": ["CC"], "Port": [3854], "Proto": ["TCP"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "C&C channel, destination IP: 76.191.140.101 port: 3854/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTwSY6Y9coiyFCud"], "accumulated_threat_level": 0.524, "timewindow": 134} +{"Format": "IDEA0", "ID": "d35a1dfa-242e-4535-a146-b44c4ca38611", "DetectTime": "2024-05-21T12:44:07.262395+00:00", "EventTime": "2024-05-21T12:44:07.262431+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["76.191.140.101"], "Type": ["CC"]}, {"IP4": ["76.191.140.101"], "Type": ["CC"], "Port": [3854], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 76.191.140.101 port: 3854/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTwSY6Y9coiyFCud"], "accumulated_threat_level": 0, "timewindow": 134} +{"Format": "IDEA0", "ID": "585d0b5e-d33e-4c55-8125-c1cc17f70e3b", "DetectTime": "2024-05-21T12:44:07.299478+00:00", "EventTime": "2024-05-21T12:44:07.299496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHB7RI1J5LX1Yk3kB6"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "44d1ad6f-663c-43f5-9fce-877358b955a0", "DetectTime": "2024-05-21T12:44:07.325082+00:00", "EventTime": "2024-05-21T12:44:07.325102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQuCes133ASe6Lhx66"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "4035f61d-07d5-4f21-8673-ca65918ab494", "DetectTime": "2024-05-21T12:44:07.371363+00:00", "EventTime": "2024-05-21T12:44:07.371383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY6hdpaxBRGXi22p3"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "ef9c200d-c6d6-40ff-8989-e2da5004bb9a", "DetectTime": "2024-05-21T12:44:07.389670+00:00", "EventTime": "2024-05-21T12:44:07.389690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETn6y4ryCnUvdld12"], "accumulated_threat_level": 12.000000000000002, "timewindow": 133} +{"Format": "Json", "ID": "ef9c200d-c6d6-40ff-8989-e2da5004bb9a", "DetectTime": "2024-05-21T12:44:07.389670+00:00", "EventTime": "2024-05-21T12:44:07.389690+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "1970-01-06T12:27:11.011583+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2024/05/21 12:44:07.564000)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 133, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e752755b-bb3f-4378-a478-dfbc547bb981", "DetectTime": "2024-05-21T12:44:07.568210+00:00", "EventTime": "2024-05-21T12:44:07.568227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWizLJ3vBqYYL37rP9"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "82614190-6a99-4385-bc01-7b8d369175dc", "DetectTime": "2024-05-21T12:44:07.572834+00:00", "EventTime": "2024-05-21T12:44:07.572852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFoed2lfubAEFEn3a"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "74be5aa3-8d46-4f36-8cc2-8e944add08c4", "DetectTime": "2024-05-21T12:44:07.577314+00:00", "EventTime": "2024-05-21T12:44:07.577332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Ur2O3nFz9MKMF9J"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "70c064e6-d840-4a0c-855a-e15b349623a6", "DetectTime": "2024-05-21T12:44:07.581853+00:00", "EventTime": "2024-05-21T12:44:07.581871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3eXRU1kxe8ai2CPB9"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "8e1ee8ce-20f4-4f81-b9f3-860e4ddb44a5", "DetectTime": "2024-05-21T12:44:07.926837+00:00", "EventTime": "2024-05-21T12:44:07.926864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaHi2h4vJdqNVuo3zg"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "9c9334b8-39e0-4ebe-9a3a-0fa16924ed91", "DetectTime": "2024-05-21T12:44:07.933344+00:00", "EventTime": "2024-05-21T12:44:07.933362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbOu4y3tV0FtB1F5Db"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "076a4896-0e19-4bb4-96c3-545acb050f31", "DetectTime": "2024-05-21T12:44:07.937899+00:00", "EventTime": "2024-05-21T12:44:07.937917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy3fN1Uaic06GQCD2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "f661f1d3-172e-4313-94ea-a6056f79a234", "DetectTime": "2024-05-21T12:44:07.942265+00:00", "EventTime": "2024-05-21T12:44:07.942283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQSUi4u2aerS4Mna"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "585e84d4-9031-4d21-98f8-765c5ab05472", "DetectTime": "2024-05-21T12:44:07.946754+00:00", "EventTime": "2024-05-21T12:44:07.946772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmyMJF4rgGYddjS3T"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "85704693-f57a-424d-9b82-c55af190e7a1", "DetectTime": "2024-05-21T12:44:07.951148+00:00", "EventTime": "2024-05-21T12:44:07.951166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctawv73fZGHLaxLMig"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "4cce5121-c434-48a4-b895-fabb224995a8", "DetectTime": "2024-05-21T12:44:07.955659+00:00", "EventTime": "2024-05-21T12:44:07.955676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8KT71XoeUy8tuPV1"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "2763f0cf-2b23-48aa-a527-cfd237f8723d", "DetectTime": "2024-05-21T12:44:07.960301+00:00", "EventTime": "2024-05-21T12:44:07.960319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMcCLS1tIXDfE2t8W1"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "716a8f9e-4e76-45ac-b518-6ac59ba15b08", "DetectTime": "2024-05-21T12:44:08.220055+00:00", "EventTime": "2024-05-21T12:44:08.220077+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPs7GT18aMhkF4GoS2"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "8574ad59-5055-421d-be0f-3c8e1854e512", "DetectTime": "2024-05-21T12:44:08.240615+00:00", "EventTime": "2024-05-21T12:44:08.240647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPs7GT18aMhkF4GoS2"], "accumulated_threat_level": 10.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "bb9bf17e-c3ef-40ed-90c9-dcf49b36ddec", "DetectTime": "2024-05-21T12:44:08.332332+00:00", "EventTime": "2024-05-21T12:44:08.332353+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBZQBIefyraHUsaa"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "ad86ee8e-1f06-435e-9678-17a966128b1b", "DetectTime": "2024-05-21T12:44:08.346148+00:00", "EventTime": "2024-05-21T12:44:08.346178+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBZQBIefyraHUsaa"], "accumulated_threat_level": 11.2, "timewindow": 30} +{"Format": "IDEA0", "ID": "5c771cea-2bf7-4acf-a324-d4450f984ed2", "DetectTime": "2024-05-21T12:44:08.367988+00:00", "EventTime": "2024-05-21T12:44:08.368009+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7coyL172zbrnUqBai"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "f5577bde-a91d-4af6-b57f-f208645dc3e6", "DetectTime": "2024-05-21T12:44:08.381691+00:00", "EventTime": "2024-05-21T12:44:08.381720+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7coyL172zbrnUqBai"], "accumulated_threat_level": 11.7, "timewindow": 30} +{"Format": "IDEA0", "ID": "0742bab8-ff3f-4861-8676-7b1c66086285", "DetectTime": "2024-05-21T12:44:08.405842+00:00", "EventTime": "2024-05-21T12:44:08.405864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch85Ap4DT9Io90LvPi"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "c690a6bd-7a94-447b-af0a-bdf0c66ac3ac", "DetectTime": "2024-05-21T12:44:08.419276+00:00", "EventTime": "2024-05-21T12:44:08.419305+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch85Ap4DT9Io90LvPi"], "accumulated_threat_level": 12.2, "timewindow": 30} +{"Format": "Json", "ID": "c690a6bd-7a94-447b-af0a-bdf0c66ac3ac", "DetectTime": "2024-05-21T12:44:08.419276+00:00", "EventTime": "2024-05-21T12:44:08.419305+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "1970-01-02T05:14:08.414559+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 30. (real time 2024/05/21 12:44:08.785814)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 30, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "a0163f3a-0797-41e1-adaa-bd9d2dad36c8", "DetectTime": "2024-05-21T12:44:08.795511+00:00", "EventTime": "2024-05-21T12:44:08.795529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZLTl3KActkCEJoCb"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "cde44c2b-b3de-4dbe-b733-82360426191a", "DetectTime": "2024-05-21T12:44:08.800331+00:00", "EventTime": "2024-05-21T12:44:08.800350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8nB3w2H31WlIxyyEb"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "cd57c33e-b56c-4156-aa0e-35c26f5d2830", "DetectTime": "2024-05-21T12:44:08.913376+00:00", "EventTime": "2024-05-21T12:44:08.913398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci887q3jpgSCYl8HO9"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "4c238194-24b8-4ccc-97b3-82378ac83a1e", "DetectTime": "2024-05-21T12:44:08.918698+00:00", "EventTime": "2024-05-21T12:44:08.918719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3URijDbLs7UPLwSj"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "2a2db1e4-3be4-404a-9d65-dea5bc9142d6", "DetectTime": "2024-05-21T12:44:08.923566+00:00", "EventTime": "2024-05-21T12:44:08.923585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDJ7A1Xv3XvC9QmVj"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "12fcd99c-ef50-4f9c-8d9e-bf6a3f44f09e", "DetectTime": "2024-05-21T12:44:08.928078+00:00", "EventTime": "2024-05-21T12:44:08.928096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvydha3v6c4un4Aq02"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "e1a27197-8efe-4e3a-bab3-52952e9326b7", "DetectTime": "2024-05-21T12:44:08.932726+00:00", "EventTime": "2024-05-21T12:44:08.932744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJdRhs46ZqOqCNf5Ck"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "c2652b04-42fd-4cb7-88d9-bec01e691024", "DetectTime": "2024-05-21T12:44:08.944788+00:00", "EventTime": "2024-05-21T12:44:08.944808+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMf8p6182YjYNXb6r4"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "ae731b0f-06e9-46e9-bc90-f28441b11d58", "DetectTime": "2024-05-21T12:44:08.956947+00:00", "EventTime": "2024-05-21T12:44:08.956967+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMf8p6182YjYNXb6r4"], "accumulated_threat_level": 0.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "63e7595b-bbdb-4788-96e0-4ce702bd0590", "DetectTime": "2024-05-21T12:44:09.100138+00:00", "EventTime": "2024-05-21T12:44:09.100160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllHQV385n5PiufSKg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "132cb029-7679-4c03-8ddd-675193d491ff", "DetectTime": "2024-05-21T12:44:09.172258+00:00", "EventTime": "2024-05-21T12:44:09.172277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWCDqN1OgThmOLCAqg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "3b3cfa70-3818-4c12-b523-4671d0210a0b", "DetectTime": "2024-05-21T12:44:09.189154+00:00", "EventTime": "2024-05-21T12:44:09.189176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMngBk241VrRaNaib9"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "6fe42d86-44fe-48f7-b20b-750f2acef364", "DetectTime": "2024-05-21T12:44:09.198400+00:00", "EventTime": "2024-05-21T12:44:09.198444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgjMcZ1izXfZk5tcP8"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "fec83621-4f21-4166-88b1-f6320c7b8553", "DetectTime": "2024-05-21T12:44:09.266909+00:00", "EventTime": "2024-05-21T12:44:09.266927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMgZU3OvIV1slqE21"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "a2eb0621-d76b-441d-8fcb-cc0591a687bd", "DetectTime": "2024-05-21T12:44:09.273207+00:00", "EventTime": "2024-05-21T12:44:09.273229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8nNApQ18W3DpBrwk"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "126259fb-b9ce-4960-a5a4-6a9e34379340", "DetectTime": "2024-05-21T12:44:09.322540+00:00", "EventTime": "2024-05-21T12:44:09.322568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COtMoU2OM7Y4lmQQU8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 133} +{"Format": "IDEA0", "ID": "dd78fdc0-db15-4521-92e5-d1024318f0ca", "DetectTime": "2024-05-21T12:44:09.327606+00:00", "EventTime": "2024-05-21T12:44:09.327625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMGe42j2Heaf9xE4i"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "d8e4fb09-bb05-4f25-9588-83ed145a6b79", "DetectTime": "2024-05-21T12:44:09.703001+00:00", "EventTime": "2024-05-21T12:44:09.703023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNUwJFBVexIMuyvcl"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "78b2b37e-ef06-465a-ba99-58f5877ee7fd", "DetectTime": "2024-05-21T12:44:09.729281+00:00", "EventTime": "2024-05-21T12:44:09.729302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0xbdnMS5xePyEWWa"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "ae9ddbb4-f80e-45f4-8534-9580bd62d42b", "DetectTime": "2024-05-21T12:44:09.770619+00:00", "EventTime": "2024-05-21T12:44:09.770658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7psAr2rjY2GisZRv8"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "c55ba4d6-6295-47ec-9acf-eb390f817826", "DetectTime": "2024-05-21T12:44:09.789975+00:00", "EventTime": "2024-05-21T12:44:09.789996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjPrUw1hwttNsmP8Tc"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "66b06526-d56a-4fc3-afd6-033411af8253", "DetectTime": "2024-05-21T12:44:09.818776+00:00", "EventTime": "2024-05-21T12:44:09.818797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CleLV31x2m3vzSNBoc"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "bcee3fe9-aefb-4aa1-8ef0-ce401fa9fb2e", "DetectTime": "2024-05-21T12:44:09.831945+00:00", "EventTime": "2024-05-21T12:44:09.831971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZ3uc338FmlyD3WP2"], "accumulated_threat_level": 3.2, "timewindow": 133} +{"Format": "IDEA0", "ID": "140d87d3-27d9-4cd9-9435-791a83f9f6d2", "DetectTime": "2024-05-21T12:44:09.836809+00:00", "EventTime": "2024-05-21T12:44:09.836827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAG1p6GObUHwDCLl"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "3dcaa764-7933-4290-95e6-864ce95f49c1", "DetectTime": "2024-05-21T12:44:09.878831+00:00", "EventTime": "2024-05-21T12:44:09.878852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH3i9w3gyTA1XDxeg8", "CGw9Kv23wHxNNN8672", "CUVX4v3k7lTSsEwWRi", "CtbjY93kK49nPs9wYc"], "accumulated_threat_level": 1.0, "timewindow": 135} +{"Format": "IDEA0", "ID": "5faefbdd-0a6e-4edb-add9-323fd603322a", "DetectTime": "2024-05-21T12:44:09.898500+00:00", "EventTime": "2024-05-21T12:44:09.898525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuRx2X2dGNuF4XYqR6"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "99c9f3da-d021-4c6d-9edd-91f4845d7958", "DetectTime": "2024-05-21T12:44:10.221340+00:00", "EventTime": "2024-05-21T12:44:10.221363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6IM413JkfEV4toak"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "a75689ad-c348-46ff-812c-8b6f3a02c191", "DetectTime": "2024-05-21T12:44:10.369871+00:00", "EventTime": "2024-05-21T12:44:10.369897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbCcQ2Zk4no1YeCva"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "ddd73055-45cb-459c-9077-ff5a5a19b42c", "DetectTime": "2024-05-21T12:44:10.379600+00:00", "EventTime": "2024-05-21T12:44:10.379620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUUThL1SfaFlW94vL"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "843add65-1b6d-4623-9ba7-e511170c4677", "DetectTime": "2024-05-21T12:44:10.398701+00:00", "EventTime": "2024-05-21T12:44:10.398724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpfkmSoRlvGM3BoG2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "a2254bc3-9627-4d08-b8ce-42da0772db3d", "DetectTime": "2024-05-21T12:44:10.416468+00:00", "EventTime": "2024-05-21T12:44:10.416493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaRvvM2xjfsn6Yg3ji"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "9985ab47-f6ac-491e-973a-7386023de814", "DetectTime": "2024-05-21T12:44:10.421460+00:00", "EventTime": "2024-05-21T12:44:10.421480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYLk1r1VnpedHCO"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "bcfdbada-43e8-475d-8a8e-7a9e80e70b58", "DetectTime": "2024-05-21T12:44:10.793745+00:00", "EventTime": "2024-05-21T12:44:10.793763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QshV1iCYBhtURAp1"], "accumulated_threat_level": 4.0, "timewindow": 133} +{"Format": "IDEA0", "ID": "3743d372-2648-4dd2-bd72-d3423997ba08", "DetectTime": "2024-05-21T12:44:10.849565+00:00", "EventTime": "2024-05-21T12:44:10.849586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUpL21h6UbXy1erW2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "9624c731-39b3-4e8a-a275-03d85d57596f", "DetectTime": "2024-05-21T12:44:10.856264+00:00", "EventTime": "2024-05-21T12:44:10.856286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUujd4D3rPryj9LMi"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "03ea1950-ab44-4666-9a08-583bbeab97d5", "DetectTime": "2024-05-21T12:44:10.861723+00:00", "EventTime": "2024-05-21T12:44:10.861743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WoTGSZKmWOEfTTi"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "3e467e86-f362-4ca7-b827-040d2bcbca93", "DetectTime": "2024-05-21T12:44:10.866886+00:00", "EventTime": "2024-05-21T12:44:10.866906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8JON1kDnl9m5RXRh"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "1110cb5e-3c36-4e6d-89f0-17ff2499d67e", "DetectTime": "2024-05-21T12:44:10.935728+00:00", "EventTime": "2024-05-21T12:44:10.935747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2E9vJ2gmU3pmd5938"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "8c3f3c7e-6db7-4ac5-be75-d23da08e10f0", "DetectTime": "2024-05-21T12:44:11.049167+00:00", "EventTime": "2024-05-21T12:44:11.049188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YJR04vUg4FRMVTp"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "c7a4bffa-5f49-4a14-82d6-87cfd8c62abd", "DetectTime": "2024-05-21T12:44:11.066062+00:00", "EventTime": "2024-05-21T12:44:11.066084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQmYri932HVRTNvl"], "accumulated_threat_level": 4.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "b0f8c403-1de1-4a43-a55f-1259a30a87dd", "DetectTime": "2024-05-21T12:44:11.322507+00:00", "EventTime": "2024-05-21T12:44:11.322525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEUA6j2TY2IENs8nsg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "f10d1d6e-5eea-42b5-b352-61abedab8b4e", "DetectTime": "2024-05-21T12:44:11.357200+00:00", "EventTime": "2024-05-21T12:44:11.357217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cumpnp21qYkMZoYncg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "4e58a656-d33a-46db-ad9e-01904a3c9e1e", "DetectTime": "2024-05-21T12:44:11.411639+00:00", "EventTime": "2024-05-21T12:44:11.411665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJSnf13fXtUKqc187"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "daa8a3db-5328-41c5-8b57-725b432923b0", "DetectTime": "2024-05-21T12:44:11.416830+00:00", "EventTime": "2024-05-21T12:44:11.416851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4eOwe34pWOq9jt0S2"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "55683c49-b575-4ac9-8369-4f1ff103eb49", "DetectTime": "2024-05-21T12:44:11.491895+00:00", "EventTime": "2024-05-21T12:44:11.491920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COkBDF4dRwPJ7Sr0xi"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "3a533c71-98a8-4bff-9d57-2dceed3742f2", "DetectTime": "2024-05-21T12:44:11.497744+00:00", "EventTime": "2024-05-21T12:44:11.497771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkEtvuhzCDJrgvAg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "07cb27d9-71f8-4eda-a2b2-8aebb9fef143", "DetectTime": "2024-05-21T12:44:11.563104+00:00", "EventTime": "2024-05-21T12:44:11.563125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6Gbk19BTkAjKVyEg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "755b3756-bbe3-4468-990b-da68bac3e34a", "DetectTime": "2024-05-21T12:44:11.872012+00:00", "EventTime": "2024-05-21T12:44:11.872033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUzqud4v3ZDkb71sxf"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "377dacf8-37ce-45ae-904a-e148f4ff86f3", "DetectTime": "2024-05-21T12:44:11.876902+00:00", "EventTime": "2024-05-21T12:44:11.876920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIj6TF4wDa4AM3mjhe"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "5e87976c-167a-467c-b75f-14e2ccac8a52", "DetectTime": "2024-05-21T12:44:11.990481+00:00", "EventTime": "2024-05-21T12:44:11.990503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGoj61KgFla0iinwg"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "e2a68f4c-6a76-40f5-96bb-3446b29c77b5", "DetectTime": "2024-05-21T12:44:12.033350+00:00", "EventTime": "2024-05-21T12:44:12.033372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuP4EItMcS5SMYZSj"], "accumulated_threat_level": 10.4, "timewindow": 131} +{"Format": "IDEA0", "ID": "55140ee7-dee1-4f88-8d8d-301b3cf41651", "DetectTime": "2024-05-21T12:44:12.038782+00:00", "EventTime": "2024-05-21T12:44:12.038801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNfeb1NHGQ6hgeQB5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "7fe75377-180d-4c50-9e7b-3af46cc5d934", "DetectTime": "2024-05-21T12:44:12.072816+00:00", "EventTime": "2024-05-21T12:44:12.072837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.206.109.47 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6f6J3MFEHJkS7cSj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "9fc67dc7-bdd3-40ee-a255-3dc6a270e236", "DetectTime": "2024-05-21T12:44:12.197900+00:00", "EventTime": "2024-05-21T12:44:12.197919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8zMZ29SBcPedB583"], "accumulated_threat_level": 5.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "fa7309db-067d-4f24-a302-75d7672facfd", "DetectTime": "2024-05-21T12:44:12.210027+00:00", "EventTime": "2024-05-21T12:44:12.210053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetCC14lae4Vh6pugb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "d0a6acb3-74a8-4c3f-ae40-2ace71cb9656", "DetectTime": "2024-05-21T12:44:12.215698+00:00", "EventTime": "2024-05-21T12:44:12.215719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4FNsBUMZPxRdHwe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "e2293de7-b677-4eaa-8682-75417ef8019e", "DetectTime": "2024-05-21T12:44:12.220562+00:00", "EventTime": "2024-05-21T12:44:12.220583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChFvp44jehHKu4j15k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "11f4a20b-3cc9-4acb-a694-402e6e7c469a", "DetectTime": "2024-05-21T12:44:12.571342+00:00", "EventTime": "2024-05-21T12:44:12.571364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQGeYabfAKRX2Gd9f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "82548d39-a758-45c2-bc41-a02ef400d7ec", "DetectTime": "2024-05-21T12:44:12.704487+00:00", "EventTime": "2024-05-21T12:44:12.704508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgxovt2HhAJCoXL7Pe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "44333d24-0929-4df6-ab5f-0830f5e5bea1", "DetectTime": "2024-05-21T12:44:12.712069+00:00", "EventTime": "2024-05-21T12:44:12.712089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRJUMR84Z2YnViZ8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "3ec380c2-b3ae-4fed-8dd2-7cb2b47a689b", "DetectTime": "2024-05-21T12:44:12.717030+00:00", "EventTime": "2024-05-21T12:44:12.717050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzwD5b2VFgZEEx9QLk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "e4a2aef1-8df3-4e24-94a7-e347f69f96e9", "DetectTime": "2024-05-21T12:44:12.721646+00:00", "EventTime": "2024-05-21T12:44:12.721665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEgyCa14Iijw8NDHph"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "3c3ef955-e968-40e6-9dd6-d28bdb495fa8", "DetectTime": "2024-05-21T12:44:12.727591+00:00", "EventTime": "2024-05-21T12:44:12.727611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKHMSJ2u4PvgNBBSh6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "a2713e7e-cc56-49ac-b912-42a3ccc086ef", "DetectTime": "2024-05-21T12:44:12.732485+00:00", "EventTime": "2024-05-21T12:44:12.732505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKeBgWqtYhNXGqm8b"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ddf32faf-d1a1-4afc-b0db-e6ffb1b8a501", "DetectTime": "2024-05-21T12:44:12.737191+00:00", "EventTime": "2024-05-21T12:44:12.737210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKpH1H2VUom1bR0bQ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "9eb3e87f-ce5b-4047-91f6-b2bcce21e08c", "DetectTime": "2024-05-21T12:44:12.741657+00:00", "EventTime": "2024-05-21T12:44:12.741676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDWxgy2BIwDYOynq9h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "96078745-dca9-47c2-919a-d17b9c46b619", "DetectTime": "2024-05-21T12:44:13.166437+00:00", "EventTime": "2024-05-21T12:44:13.166456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfOZj4009lwsNS1Sl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 133} +{"Format": "IDEA0", "ID": "46b7f454-4e4a-4fb0-9c83-9640ff85ebf6", "DetectTime": "2024-05-21T12:44:13.324700+00:00", "EventTime": "2024-05-21T12:44:13.324722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZQbC4kgVDgXkUUng"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "7611aa40-cc68-423f-a0fa-337bdfe58915", "DetectTime": "2024-05-21T12:44:13.337229+00:00", "EventTime": "2024-05-21T12:44:13.337250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUHjiM3m0gDl8LZOa3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "7c6b313c-40d2-4bb3-8ab9-9c9db899a518", "DetectTime": "2024-05-21T12:44:13.342897+00:00", "EventTime": "2024-05-21T12:44:13.342918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYidf2oHcDNKBarCl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "f94557ad-89f4-4f25-8b15-a5ae84e32e61", "DetectTime": "2024-05-21T12:44:13.347885+00:00", "EventTime": "2024-05-21T12:44:13.347905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVaRrP2OVjazK7Uh6h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "afa7c5ce-2344-49e3-9e95-b083cdfae2c1", "DetectTime": "2024-05-21T12:44:13.352528+00:00", "EventTime": "2024-05-21T12:44:13.352546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMpCNd3VqN1pLgKHI"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "4d7ad1e4-211b-46d9-bd31-1899a9305137", "DetectTime": "2024-05-21T12:44:13.376328+00:00", "EventTime": "2024-05-21T12:44:13.376349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnM2UOXeIF8w2tch"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "416705fd-b55d-429a-9857-b85ab4160e98", "DetectTime": "2024-05-21T12:44:13.381655+00:00", "EventTime": "2024-05-21T12:44:13.381675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpzfU3dt6p0hiR1Aj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "b154669f-1bc5-4807-bfd9-8a566592ca34", "DetectTime": "2024-05-21T12:44:13.813325+00:00", "EventTime": "2024-05-21T12:44:13.813347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGShA8BcjypUcXy9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "1f94ceb1-0230-44f7-872e-2e386c47fd35", "DetectTime": "2024-05-21T12:44:13.879354+00:00", "EventTime": "2024-05-21T12:44:13.879373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFnLmS156p7PTs1dJ9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "6f05058f-de46-4f4c-9845-20102279b8e6", "DetectTime": "2024-05-21T12:44:13.908325+00:00", "EventTime": "2024-05-21T12:44:13.908347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNIIiz4GNbrnBd4c8l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "83e8b690-84da-4eb4-9c89-5018e6df87c4", "DetectTime": "2024-05-21T12:44:13.924807+00:00", "EventTime": "2024-05-21T12:44:13.924828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrKmAroXswXo4lbMl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "3b6a3ed0-ae69-4baf-be19-1ab174ce90d4", "DetectTime": "2024-05-21T12:44:13.931733+00:00", "EventTime": "2024-05-21T12:44:13.931756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfcxCP2Eb09Vxp7aN8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "a2e6219c-3f78-4246-ba5f-77bd53e1d52d", "DetectTime": "2024-05-21T12:44:13.936587+00:00", "EventTime": "2024-05-21T12:44:13.936608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHH2j1HjilewwNfbd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "d826bf27-8b1f-41cd-830d-bce0613a0880", "DetectTime": "2024-05-21T12:44:13.941874+00:00", "EventTime": "2024-05-21T12:44:13.941894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csyo6GQKrjOw3pXN4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "cdd4e291-22c5-44b1-bcd0-52ae9a81c5ce", "DetectTime": "2024-05-21T12:44:14.191149+00:00", "EventTime": "2024-05-21T12:44:14.191174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQ4MG1cR3upx2mb6a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "5cc14757-bbf3-4b9f-a8c3-996805b59c04", "DetectTime": "2024-05-21T12:44:14.330619+00:00", "EventTime": "2024-05-21T12:44:14.330642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQcN0gO5Ch0cUMHn8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "9f40539c-868b-409d-9eae-20a8fd0106b5", "DetectTime": "2024-05-21T12:44:14.683319+00:00", "EventTime": "2024-05-21T12:44:14.683340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTih0C3naWdnuxKKP7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "6ceef3db-c0b5-49c0-91c9-17074ca17b53", "DetectTime": "2024-05-21T12:44:14.697442+00:00", "EventTime": "2024-05-21T12:44:14.697470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7DBJj6nuq0EzLAV2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "3d8fd52b-ca7f-47c2-b112-38a046f4de8d", "DetectTime": "2024-05-21T12:44:14.704648+00:00", "EventTime": "2024-05-21T12:44:14.704668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0kX03o1rDl4b6W0e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ebc2be21-d3cc-4436-b24f-83d45b6cc7d7", "DetectTime": "2024-05-21T12:44:14.709800+00:00", "EventTime": "2024-05-21T12:44:14.709821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNJaDWBTGE4fKsZ"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "b1d22aa8-c594-4bb3-987d-5278dd6f25f1", "DetectTime": "2024-05-21T12:44:14.714550+00:00", "EventTime": "2024-05-21T12:44:14.714570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clc3oT2338me4aXmqi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "21cbb1a2-ea47-49de-9228-b1fb43c91c48", "DetectTime": "2024-05-21T12:44:14.828084+00:00", "EventTime": "2024-05-21T12:44:14.828108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcGQs4wVkGmoM6Z0c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "7848f808-84e9-404d-873a-d18a8af95de5", "DetectTime": "2024-05-21T12:44:14.899617+00:00", "EventTime": "2024-05-21T12:44:14.899637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnKl8F4TAjiAR5EKj9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "bfd24c6b-6869-48aa-bf40-4cffbecadf6a", "DetectTime": "2024-05-21T12:44:14.904901+00:00", "EventTime": "2024-05-21T12:44:14.904919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csku9CFXCliZQcM3j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ad612211-9ca3-4012-908e-22fc227bea4e", "DetectTime": "2024-05-21T12:44:14.948901+00:00", "EventTime": "2024-05-21T12:44:14.948934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJKBni2Meu4Yy0tST9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "eeeabc1c-7d63-4b3b-9147-74c3a8acb0c5", "DetectTime": "2024-05-21T12:44:15.406823+00:00", "EventTime": "2024-05-21T12:44:15.406841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI8zso46j6gV3Qscoe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "c9d334e2-bece-4ffd-9858-e604c09a3db3", "DetectTime": "2024-05-21T12:44:15.442370+00:00", "EventTime": "2024-05-21T12:44:15.442390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFkhxx4M3GVKGKYgW6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "fdd5db69-6830-4b86-9757-3f47303f2539", "DetectTime": "2024-05-21T12:44:15.478918+00:00", "EventTime": "2024-05-21T12:44:15.478938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22qiD4kidmqJgP1cf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "f00ef2a8-51b2-419a-9945-a7b790ec4c81", "DetectTime": "2024-05-21T12:44:15.484043+00:00", "EventTime": "2024-05-21T12:44:15.484061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNyySh1vdpjBQTxHTd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ffaaf0a9-beed-4361-bce3-02d632778880", "DetectTime": "2024-05-21T12:44:15.488887+00:00", "EventTime": "2024-05-21T12:44:15.488905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UqTy41hdsFv1B5xf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "37f93daf-7a5a-4a5d-a2cc-5c088104a20a", "DetectTime": "2024-05-21T12:44:15.493280+00:00", "EventTime": "2024-05-21T12:44:15.493297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRNJk47rWSUgGA7T2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "739b7c90-47f9-4338-8912-d3978d1a3319", "DetectTime": "2024-05-21T12:44:15.497614+00:00", "EventTime": "2024-05-21T12:44:15.497632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcZMN62e5RiyxxDZwa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "e325f38d-8e5e-44e4-800b-a00a21b3f274", "DetectTime": "2024-05-21T12:44:15.502800+00:00", "EventTime": "2024-05-21T12:44:15.502821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXtrUC2U8EnRPjXS"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "37a10373-56e6-4316-be93-3910d53bf8d6", "DetectTime": "2024-05-21T12:44:15.594739+00:00", "EventTime": "2024-05-21T12:44:15.594762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Lf0N38ulqiMgjchj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "0362cb1e-e09b-4b8e-9c7a-d14d424c8a8f", "DetectTime": "2024-05-21T12:44:16.072156+00:00", "EventTime": "2024-05-21T12:44:16.072180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxSJbncdQBAgddAc"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "f9b5c740-7d46-4261-8f10-fc72413138dd", "DetectTime": "2024-05-21T12:44:16.085185+00:00", "EventTime": "2024-05-21T12:44:16.085205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOKKJmO33QRQjgg6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "b81f2dc7-67e7-4164-a465-618915139a07", "DetectTime": "2024-05-21T12:44:16.119519+00:00", "EventTime": "2024-05-21T12:44:16.119538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLDTt1xz45FW22pcd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "6ae33424-797c-42a2-94af-687171106ed9", "DetectTime": "2024-05-21T12:44:16.124364+00:00", "EventTime": "2024-05-21T12:44:16.124383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CixvYb1fR3wlMhcoQ9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "b2def9c3-2580-4fd4-8dc1-a0751fae25ac", "DetectTime": "2024-05-21T12:44:16.133758+00:00", "EventTime": "2024-05-21T12:44:16.133782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjnURNH5HidWxuSl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "a3ffb0ab-2d83-4935-9b19-8cd20978f8e8", "DetectTime": "2024-05-21T12:44:16.139259+00:00", "EventTime": "2024-05-21T12:44:16.139277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrzWSLpdosxTbQz9h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "af8c1ca5-3c87-440e-9de0-28c40fb99cde", "DetectTime": "2024-05-21T12:44:16.143653+00:00", "EventTime": "2024-05-21T12:44:16.143671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxDpAaNGyGzlDjNQf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "211e5d58-41af-44f4-b6b6-af03905447d0", "DetectTime": "2024-05-21T12:44:16.148079+00:00", "EventTime": "2024-05-21T12:44:16.148097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKWIP2L4dgtb1vq95"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "76cc60cd-6c9a-423f-a246-9803c16dc79a", "DetectTime": "2024-05-21T12:44:16.458946+00:00", "EventTime": "2024-05-21T12:44:16.458970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBpDz3srSBpX3jihl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "43d7b50b-e131-40a1-a75e-e22fd94099f0", "DetectTime": "2024-05-21T12:44:16.518176+00:00", "EventTime": "2024-05-21T12:44:16.518200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClBY9i4xPy0gwzU9F5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "78134366-7f20-415e-ac76-d3f1cd191e48", "DetectTime": "2024-05-21T12:44:16.789959+00:00", "EventTime": "2024-05-21T12:44:16.789979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCHI4o11s44sWHCv26"], "accumulated_threat_level": 10.4, "timewindow": 133} +{"Format": "IDEA0", "ID": "7620131a-46d8-46fa-a171-d4834dc3dbe7", "DetectTime": "2024-05-21T12:44:16.798779+00:00", "EventTime": "2024-05-21T12:44:16.798796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTAwk74TadVW57TUj5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "d6786099-93f5-4ad8-b0c3-08aea714e195", "DetectTime": "2024-05-21T12:44:16.803549+00:00", "EventTime": "2024-05-21T12:44:16.803568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLpm02I5SWyCJTF79"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "a1123cca-f9f0-491e-8edd-acb22762c33f", "DetectTime": "2024-05-21T12:44:16.808455+00:00", "EventTime": "2024-05-21T12:44:16.808477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLuTh1hNltsQZfAIg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "b88b5e84-8f86-48ac-a524-bf9fc1a95a8b", "DetectTime": "2024-05-21T12:44:16.813570+00:00", "EventTime": "2024-05-21T12:44:16.813591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuvVs535xLfJvTn7Bb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ec043034-c3ca-4699-a7f8-da29da3f929a", "DetectTime": "2024-05-21T12:44:17.082175+00:00", "EventTime": "2024-05-21T12:44:17.082199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMjN7qCbt8GNVSg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "f049fcca-7e7b-48e8-9f35-e7dc163d1e92", "DetectTime": "2024-05-21T12:44:17.152300+00:00", "EventTime": "2024-05-21T12:44:17.152321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7CU953FC21sOPRc43"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "82ebc807-ba4a-4e6c-97e6-2006313081a3", "DetectTime": "2024-05-21T12:44:17.364251+00:00", "EventTime": "2024-05-21T12:44:17.364275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnLa5U2HpdMvolP7ml"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "9da356c7-c226-4f06-9bbb-da5da23dc565", "DetectTime": "2024-05-21T12:44:17.370103+00:00", "EventTime": "2024-05-21T12:44:17.370123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQ6qY35mjVx2eD9x9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "73c19ea2-9418-4bed-81be-4a00c69647c4", "DetectTime": "2024-05-21T12:44:17.375465+00:00", "EventTime": "2024-05-21T12:44:17.375486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9NxUn3r53Un6PYOta"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "535ae3e8-6fae-4c07-84dd-123484dc8fca", "DetectTime": "2024-05-21T12:44:17.382755+00:00", "EventTime": "2024-05-21T12:44:17.382774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLreAa4im2gOU4JeTh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "fd16c8a7-bac2-41ba-b7f0-3cfeb7d15b26", "DetectTime": "2024-05-21T12:44:17.388210+00:00", "EventTime": "2024-05-21T12:44:17.388230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVYmPy4OoGVRlsH8Ol"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "e62de1a1-01a6-4629-a972-c843134d6dbb", "DetectTime": "2024-05-21T12:44:17.394086+00:00", "EventTime": "2024-05-21T12:44:17.394105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40iow4FU4q6VFxl7f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "8311fe54-e81c-48c9-84d6-da9ad50a85ef", "DetectTime": "2024-05-21T12:44:17.409127+00:00", "EventTime": "2024-05-21T12:44:17.409144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR8v31qMrSxsHw4fb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "4154bd14-e1dd-4ca8-982e-052d7182cc95", "DetectTime": "2024-05-21T12:44:17.413615+00:00", "EventTime": "2024-05-21T12:44:17.413632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYSCygOONnDVm5eok"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "c8854bf6-39a5-4bb2-8b8a-7a6ae69d49c6", "DetectTime": "2024-05-21T12:44:17.737878+00:00", "EventTime": "2024-05-21T12:44:17.737902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzxcZ1yEjn3HF2DRk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "88d965e3-6dc1-4a5f-b6bf-0e1f0892586b", "DetectTime": "2024-05-21T12:44:18.386923+00:00", "EventTime": "2024-05-21T12:44:18.386945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCmxvV2yvrNtNAtDCk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "0b2efcaf-fdc0-4659-b5e8-beca526a0e34", "DetectTime": "2024-05-21T12:44:18.410676+00:00", "EventTime": "2024-05-21T12:44:18.410698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuBTvr13wSPgBMV1L7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "531f9f6c-f2f2-4d12-ab82-c2857f4fb28e", "DetectTime": "2024-05-21T12:44:18.415451+00:00", "EventTime": "2024-05-21T12:44:18.415471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caxlm7262R7v7nT7p4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "088ad923-a520-4b71-a290-597008b33b75", "DetectTime": "2024-05-21T12:44:18.419889+00:00", "EventTime": "2024-05-21T12:44:18.419909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Eif71IMWbsXoynDe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "ac296387-bed5-4651-b863-2ee9fcdb4328", "DetectTime": "2024-05-21T12:44:18.424991+00:00", "EventTime": "2024-05-21T12:44:18.425010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNVQus4NjpzvWdSrIi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "e3670bb9-cf16-4506-b13a-aa5214d106a1", "DetectTime": "2024-05-21T12:44:18.439098+00:00", "EventTime": "2024-05-21T12:44:18.439120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19A521WOtRDSFpfvj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 132} +{"Format": "IDEA0", "ID": "be97de7d-df99-4e66-92ab-277c77a08a31", "DetectTime": "2024-05-21T12:44:18.445037+00:00", "EventTime": "2024-05-21T12:44:18.445057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrRo9Q6RhqRjEdMWk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "fb25292c-47f6-4f18-a3f4-2e980e68ee0f", "DetectTime": "2024-05-21T12:44:18.521817+00:00", "EventTime": "2024-05-21T12:44:18.521840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfe4if2IpVoXuuSq4g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "75d1ae7f-1575-4a11-bbae-008d02ed8402", "DetectTime": "2024-05-21T12:44:18.574805+00:00", "EventTime": "2024-05-21T12:44:18.574827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMrw5K18WnWnTtIBK2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "6602bafb-fda8-4fdc-ae22-218f2c735858", "DetectTime": "2024-05-21T12:44:18.586898+00:00", "EventTime": "2024-05-21T12:44:18.586920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdTZAb1k7moZNbRmsf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 133} +{"Format": "Json", "ID": "6602bafb-fda8-4fdc-ae22-218f2c735858", "DetectTime": "2024-05-21T12:44:18.586898+00:00", "EventTime": "2024-05-21T12:44:18.586920+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "1970-01-06T12:57:44.910210+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2024/05/21 12:44:18.775387)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 133, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c710d26b-d72f-4ae0-9a38-288da2507af7", "DetectTime": "2024-05-21T12:44:18.932047+00:00", "EventTime": "2024-05-21T12:44:18.932068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qy5J3IQI5qTFZCO9"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "dc4d3afd-8ec0-427b-b16f-4c6ed0aa5698", "DetectTime": "2024-05-21T12:44:18.990525+00:00", "EventTime": "2024-05-21T12:44:18.990546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48BCz1Y415QIcUxKh"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "64e79100-acc9-4f05-a270-0b4a77e617d1", "DetectTime": "2024-05-21T12:44:19.117656+00:00", "EventTime": "2024-05-21T12:44:19.117677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHas11THQP3fdtJG3"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "006fd1cc-2927-435b-b207-ca22cd2fae5c", "DetectTime": "2024-05-21T12:44:19.180463+00:00", "EventTime": "2024-05-21T12:44:19.180487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQcHiJ3OyTxiVfxpsk"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "8a8383a2-5645-444b-9751-fe1ae9b0af10", "DetectTime": "2024-05-21T12:44:19.477577+00:00", "EventTime": "2024-05-21T12:44:19.477600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtfkR33f2Lsx94SFl"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "a2cd5227-3a84-4ec2-b23a-609b2337f14c", "DetectTime": "2024-05-21T12:44:19.482790+00:00", "EventTime": "2024-05-21T12:44:19.482810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdgFTKpJMnqFteYtb"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "bc22f855-3577-49b3-bf6a-82689259d977", "DetectTime": "2024-05-21T12:44:19.521935+00:00", "EventTime": "2024-05-21T12:44:19.521956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1TL9b3h8rgFpqaYGa"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "6ea685fd-e4e6-478d-a46c-ea62c141a79e", "DetectTime": "2024-05-21T12:44:19.534369+00:00", "EventTime": "2024-05-21T12:44:19.534389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHryqAh2b4QJ7kQb7"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "af4fcc35-e3bf-4136-a678-a5f4ecca7fd6", "DetectTime": "2024-05-21T12:44:19.539166+00:00", "EventTime": "2024-05-21T12:44:19.539184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr9XTa52RQI8Md8j"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "b3e68a51-af92-4add-a699-6854bdf8f794", "DetectTime": "2024-05-21T12:44:19.543592+00:00", "EventTime": "2024-05-21T12:44:19.543611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2tx1IAcsxbDU1og"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "0d5ec80d-9423-48b6-9269-09fa7f5f2159", "DetectTime": "2024-05-21T12:44:19.762793+00:00", "EventTime": "2024-05-21T12:44:19.762819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzQZk2kSlVtaHK5Ua"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "4801a3e9-13d4-4362-aedb-c5664de1f0c2", "DetectTime": "2024-05-21T12:44:19.770684+00:00", "EventTime": "2024-05-21T12:44:19.770713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRB8q38wy05izpmgk"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "d057592c-833d-44b8-868f-0ecac96ee329", "DetectTime": "2024-05-21T12:44:20.013384+00:00", "EventTime": "2024-05-21T12:44:20.013413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcqeC3Y5OZ0VeFAyl"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "5ca9a67e-ef8d-48d8-a7ab-683955d58892", "DetectTime": "2024-05-21T12:44:20.073664+00:00", "EventTime": "2024-05-21T12:44:20.073685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQW2PEW5LlqbP45T5"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "e83090d4-b23e-487a-962d-d15a99b49cae", "DetectTime": "2024-05-21T12:44:20.102022+00:00", "EventTime": "2024-05-21T12:44:20.102043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUqenl1uGeCmProq17"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "4941b983-728a-49d2-8afb-29e90887b85b", "DetectTime": "2024-05-21T12:44:20.115417+00:00", "EventTime": "2024-05-21T12:44:20.115438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Courzb4ti2Y55qGKJ1"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "2f347f6e-0f5f-4229-bb0e-26272f1cbc5e", "DetectTime": "2024-05-21T12:44:20.121310+00:00", "EventTime": "2024-05-21T12:44:20.121332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEgue2NCAB3GFlK1k"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "735b2c6f-23cb-4beb-85f1-2a52991cb0e8", "DetectTime": "2024-05-21T12:44:20.126322+00:00", "EventTime": "2024-05-21T12:44:20.126341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coqjqb3pcwMBzymEV1"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "cf403657-f3c9-4fab-8199-0d72dbeb1466", "DetectTime": "2024-05-21T12:44:20.130996+00:00", "EventTime": "2024-05-21T12:44:20.131014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Y94c2d5ezmC6GHu"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "099fe5b2-4239-487b-b123-7849036761f1", "DetectTime": "2024-05-21T12:44:20.195655+00:00", "EventTime": "2024-05-21T12:44:20.195677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs56FXwSXW5QARBwe"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "5cba1b45-4aa4-4ad7-a2b3-56ea4388fd56", "DetectTime": "2024-05-21T12:44:20.606216+00:00", "EventTime": "2024-05-21T12:44:20.606234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7lpL649b0MKyH7TAf"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "c712c609-d397-4f44-bb5a-bcf2700127e1", "DetectTime": "2024-05-21T12:44:20.619569+00:00", "EventTime": "2024-05-21T12:44:20.619592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxTQ53LVw2GUyH6o6"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "af8c7d6e-0a4e-461d-bcff-b619200d3329", "DetectTime": "2024-05-21T12:44:20.678500+00:00", "EventTime": "2024-05-21T12:44:20.678522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHq9HYA3FosSCDoeb"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "bb3d2024-bb90-46d0-bec4-b692a3fa6477", "DetectTime": "2024-05-21T12:44:20.727632+00:00", "EventTime": "2024-05-21T12:44:20.727654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8tn3a2vZPgJQAT8Mg"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "7c469323-8d88-41b4-b5a5-b623fc6339e9", "DetectTime": "2024-05-21T12:44:20.768190+00:00", "EventTime": "2024-05-21T12:44:20.768209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVtto226FuGqPu6dob"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 133} +{"Format": "IDEA0", "ID": "b4b6f972-2023-47e0-a55a-86bb030db1ab", "DetectTime": "2024-05-21T12:44:20.816231+00:00", "EventTime": "2024-05-21T12:44:20.816249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMeBi11lUKHyyO24zh"], "accumulated_threat_level": 3.2, "timewindow": 133} +{"Format": "IDEA0", "ID": "2b871c67-6e3c-452e-9d0c-fc464e857504", "DetectTime": "2024-05-21T12:44:21.100951+00:00", "EventTime": "2024-05-21T12:44:21.100970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtZiQUSay5GxIFM1"], "accumulated_threat_level": 4.0, "timewindow": 133} +{"Format": "IDEA0", "ID": "d03fcdc2-2d0b-4ca4-9834-8be75e0e8aae", "DetectTime": "2024-05-21T12:44:21.152232+00:00", "EventTime": "2024-05-21T12:44:21.152249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79cri36phEkWF7Qy5"], "accumulated_threat_level": 4.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "824224a1-afa0-4d32-8c74-4c6e15b7615a", "DetectTime": "2024-05-21T12:44:21.196737+00:00", "EventTime": "2024-05-21T12:44:21.196759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8QX8i3asgK7USjtn4"], "accumulated_threat_level": 5.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "94fa3ffb-5f82-4d2a-8bf7-6da3e9d92821", "DetectTime": "2024-05-21T12:44:21.243686+00:00", "EventTime": "2024-05-21T12:44:21.243706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3RYM159dzOyO0Da3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 133} +{"Format": "IDEA0", "ID": "dd79b622-a286-4fbd-8777-6945a1fae5eb", "DetectTime": "2024-05-21T12:44:21.292050+00:00", "EventTime": "2024-05-21T12:44:21.292070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CODGq9026JpsJAEni"], "accumulated_threat_level": 7.199999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "450f877e-fad7-4864-8980-54164ea4d39e", "DetectTime": "2024-05-21T12:44:21.323454+00:00", "EventTime": "2024-05-21T12:44:21.323475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWCk0AuTjpXYUxbm1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "434bf706-60b2-4ff9-963d-e8f07bf731f4", "DetectTime": "2024-05-21T12:44:21.373875+00:00", "EventTime": "2024-05-21T12:44:21.373894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1UK51LKYNa2BH1O3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "231c905a-4f22-44bf-8113-9f87ef61920a", "DetectTime": "2024-05-21T12:44:21.418633+00:00", "EventTime": "2024-05-21T12:44:21.418653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cozu3e3t5Sf50p3Yg1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "67ccc59e-a958-4923-92a9-1c5373aee596", "DetectTime": "2024-05-21T12:44:21.464417+00:00", "EventTime": "2024-05-21T12:44:21.464435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ajkU2k7MzfPcDuFg"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "7fa3eaf9-0dde-4f64-82b5-11e7df988e1c", "DetectTime": "2024-05-21T12:44:21.736795+00:00", "EventTime": "2024-05-21T12:44:21.736817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEemB10ES97P8fCQ6"], "accumulated_threat_level": 10.4, "timewindow": 133} +{"Format": "IDEA0", "ID": "2bc3cf86-468a-40d8-acd3-5ab3896c5aa8", "DetectTime": "2024-05-21T12:44:21.784232+00:00", "EventTime": "2024-05-21T12:44:21.784252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0FJr3LeWXrxOOXmg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 133} +{"Format": "IDEA0", "ID": "1038fdad-0b48-4951-b32b-b215d7f87651", "DetectTime": "2024-05-21T12:44:21.836917+00:00", "EventTime": "2024-05-21T12:44:21.836936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWIh028JMIOTRTTMg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 133} +{"Format": "Json", "ID": "1038fdad-0b48-4951-b32b-b215d7f87651", "DetectTime": "2024-05-21T12:44:21.836917+00:00", "EventTime": "2024-05-21T12:44:21.836936+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "1970-01-06T12:57:48.591999+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 133. (real time 2024/05/21 12:44:22.090227)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 133, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "244a2824-674b-4201-a991-ff2941b6a379", "DetectTime": "2024-05-21T12:44:22.094991+00:00", "EventTime": "2024-05-21T12:44:22.095014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdapSh1uaoNCWzumva"], "accumulated_threat_level": 0, "timewindow": 133} +{"Format": "IDEA0", "ID": "60ab430e-d2ff-40e5-abf6-b255f618608b", "DetectTime": "2024-05-21T12:44:22.108340+00:00", "EventTime": "2024-05-21T12:44:22.108363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDcyKm2X1QyHMFegA"], "accumulated_threat_level": 0.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "46d18a3b-2fa9-4f61-8698-dfe8d8c4ed17", "DetectTime": "2024-05-21T12:44:22.121303+00:00", "EventTime": "2024-05-21T12:44:22.121322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9Ki04TXvemHxKHJ6"], "accumulated_threat_level": 1.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "9cdd2a88-4d4d-4159-8198-68e68530b777", "DetectTime": "2024-05-21T12:44:22.134982+00:00", "EventTime": "2024-05-21T12:44:22.135001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2CSETtg7laq7A29"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 133} +{"Format": "IDEA0", "ID": "9012df3d-8c9a-41ea-a906-99e78fddbbad", "DetectTime": "2024-05-21T12:44:22.253070+00:00", "EventTime": "2024-05-21T12:44:22.253088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeTV8svg2SM8E9hqf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 133} +{"Format": "IDEA0", "ID": "1db51955-3213-4979-8acf-a590932fedba", "DetectTime": "2024-05-21T12:44:22.369754+00:00", "EventTime": "2024-05-21T12:44:22.369773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA1eRE27kYNpKXnGXe"], "accumulated_threat_level": 3.2, "timewindow": 133} +{"Format": "IDEA0", "ID": "97e1c80f-72e9-4b03-8c0b-05395736208e", "DetectTime": "2024-05-21T12:44:22.375103+00:00", "EventTime": "2024-05-21T12:44:22.375121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CajNta2SW5atRUzpyf", "CB0Idi1SS41AKHRQq7", "CR89t3kdTbVZHpeX", "CZjOhH1HLLkaZXTXGk"], "accumulated_threat_level": 0.5, "timewindow": 137} +{"Format": "IDEA0", "ID": "f05f2a89-3e45-4e52-859d-0e5753eb1f61", "DetectTime": "2024-05-21T12:44:22.421487+00:00", "EventTime": "2024-05-21T12:44:22.421505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzh6S17lcO8pz1zEe"], "accumulated_threat_level": 4.0, "timewindow": 133} +{"Format": "IDEA0", "ID": "a6b2ab41-678e-4480-8d2f-d59162db31d9", "DetectTime": "2024-05-21T12:44:22.470528+00:00", "EventTime": "2024-05-21T12:44:22.470551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc6znB19KrSXcMf0u3"], "accumulated_threat_level": 4.8, "timewindow": 133} +{"Format": "IDEA0", "ID": "7387d599-7251-433d-a54e-0735eaef5a2d", "DetectTime": "2024-05-21T12:44:22.515966+00:00", "EventTime": "2024-05-21T12:44:22.515985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTD1MM1RKKleSeWJ2h"], "accumulated_threat_level": 5.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "33405eaf-0e59-4acb-83f3-635dc10df3d6", "DetectTime": "2024-05-21T12:44:22.561263+00:00", "EventTime": "2024-05-21T12:44:22.561283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKhIF3mk1YNhSUhkk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 133} +{"Format": "IDEA0", "ID": "8bc72ee7-0efc-4b09-b9ad-716af22c4559", "DetectTime": "2024-05-21T12:44:22.611724+00:00", "EventTime": "2024-05-21T12:44:22.611750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4yD2d1Wb0S4c67Ei8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "d951dbef-20d1-4794-8927-ab21ed6ea059", "DetectTime": "2024-05-21T12:44:22.866714+00:00", "EventTime": "2024-05-21T12:44:22.866733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEa80GrQIqYcyjG82"], "accumulated_threat_level": 7.999999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "a44cb2ae-f8e9-44e4-9941-b71a7860e40e", "DetectTime": "2024-05-21T12:44:22.901898+00:00", "EventTime": "2024-05-21T12:44:22.901923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETn6y4ryCnUvdld12"], "accumulated_threat_level": 7.999999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "4d611802-3796-4b3a-b68b-3c3bfcd9fdba", "DetectTime": "2024-05-21T12:44:22.945662+00:00", "EventTime": "2024-05-21T12:44:22.945682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["125.167.115.164"]}], "Attach": [{"Content": "Connection to unknown destination port 16478/UDP destination IP 125.167.115.164. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf9ury30QLyH82AOd2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 133} +{"Format": "IDEA0", "ID": "bd52343b-2015-4fe7-825c-7f559227d569", "DetectTime": "2024-05-21T12:44:23.005130+00:00", "EventTime": "2024-05-21T12:44:23.005153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYTcL1wSoYwiuHIE"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "2accc497-5281-405d-96c6-92f5affc42d6", "DetectTime": "2024-05-21T12:44:23.084645+00:00", "EventTime": "2024-05-21T12:44:23.084665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxRCv3lNWGi6Puho9"], "accumulated_threat_level": 1.324, "timewindow": 134} +{"Format": "IDEA0", "ID": "7e1802b9-8228-4687-b710-44c5dba2f872", "DetectTime": "2024-05-21T12:44:23.169047+00:00", "EventTime": "2024-05-21T12:44:23.169068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaS1Mr1zBjan5OX9B5"], "accumulated_threat_level": 2.124, "timewindow": 134} +{"Format": "IDEA0", "ID": "599004b4-af59-484b-a355-d6c83cfe0795", "DetectTime": "2024-05-21T12:44:23.228980+00:00", "EventTime": "2024-05-21T12:44:23.228998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGptoE4RAp9ob5nAf4"], "accumulated_threat_level": 2.9240000000000004, "timewindow": 134} +{"Format": "IDEA0", "ID": "fcd2d436-9c64-4269-9e64-af39f5447534", "DetectTime": "2024-05-21T12:44:23.268083+00:00", "EventTime": "2024-05-21T12:44:23.268104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLK9499xJ5aTGrMai"], "accumulated_threat_level": 3.724, "timewindow": 134} +{"Format": "IDEA0", "ID": "958b3db7-a1d5-44d0-9da4-1428c36ddd07", "DetectTime": "2024-05-21T12:44:23.313926+00:00", "EventTime": "2024-05-21T12:44:23.313945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckg6ik3jVRAic9H1u9"], "accumulated_threat_level": 4.524, "timewindow": 134} +{"Format": "IDEA0", "ID": "21080dbf-0d15-4fb1-9c9e-dcc6cd7d40ca", "DetectTime": "2024-05-21T12:44:23.565039+00:00", "EventTime": "2024-05-21T12:44:23.565064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaHi2h4vJdqNVuo3zg"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "f23de475-f1ac-4824-b7f2-e194f47bdea9", "DetectTime": "2024-05-21T12:44:23.605702+00:00", "EventTime": "2024-05-21T12:44:23.605736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDJ3A64bjonz9Bak"], "accumulated_threat_level": 5.324, "timewindow": 134} +{"Format": "IDEA0", "ID": "a0954921-dc3c-4a4b-a798-c2e9ee63b87b", "DetectTime": "2024-05-21T12:44:23.654096+00:00", "EventTime": "2024-05-21T12:44:23.654134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66txOZcrampm5013"], "accumulated_threat_level": 6.124, "timewindow": 134} +{"Format": "IDEA0", "ID": "a5c77f2a-30db-4fe3-af90-a260098e71ac", "DetectTime": "2024-05-21T12:44:23.703274+00:00", "EventTime": "2024-05-21T12:44:23.703307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiKUn1FIGrgtJpZN8"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 134} +{"Format": "IDEA0", "ID": "0997019d-8aa4-44f0-9ad6-19270a2c6971", "DetectTime": "2024-05-21T12:44:23.748527+00:00", "EventTime": "2024-05-21T12:44:23.748559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9NozTH9oyPRlFtS9"], "accumulated_threat_level": 7.723999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "df1201a0-9a43-47d8-ab4a-6f138bbdc98e", "DetectTime": "2024-05-21T12:44:23.794401+00:00", "EventTime": "2024-05-21T12:44:23.794452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWn8w4AeZf3EUERSc"], "accumulated_threat_level": 8.524, "timewindow": 134} +{"Format": "IDEA0", "ID": "de4d1b9b-6018-45df-8817-e6a7e5ceaa51", "DetectTime": "2024-05-21T12:44:23.844013+00:00", "EventTime": "2024-05-21T12:44:23.844054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9j2h6R3TLM2e9Z3"], "accumulated_threat_level": 9.324, "timewindow": 134} +{"Format": "IDEA0", "ID": "db07604a-7301-4537-858e-8ad2286ef70a", "DetectTime": "2024-05-21T12:44:23.894140+00:00", "EventTime": "2024-05-21T12:44:23.894163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgXu2t4BTjxlH5NGt9"], "accumulated_threat_level": 10.124, "timewindow": 134} +{"Format": "IDEA0", "ID": "56c151d9-5e70-4f3f-9ae5-6c7e60ade489", "DetectTime": "2024-05-21T12:44:23.950455+00:00", "EventTime": "2024-05-21T12:44:23.950472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cge1Yq3nsVWs0sPx8d"], "accumulated_threat_level": 10.924000000000001, "timewindow": 134} +{"Format": "IDEA0", "ID": "9251dfcb-ade8-4a57-b1d6-67c64b2d20f5", "DetectTime": "2024-05-21T12:44:24.098125+00:00", "EventTime": "2024-05-21T12:44:24.098143+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1NO74rI7zgfVGq25"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "51eb88e0-d0ef-4f9f-b4c2-5f37c7ae394d", "DetectTime": "2024-05-21T12:44:24.111894+00:00", "EventTime": "2024-05-21T12:44:24.111916+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1NO74rI7zgfVGq25"], "accumulated_threat_level": 1.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "54dad28b-1b87-4b5e-ac37-ead5ced4dcaa", "DetectTime": "2024-05-21T12:44:24.135962+00:00", "EventTime": "2024-05-21T12:44:24.135982+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.102.120.85"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuyDOL1zgeevQD7ZG5"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "8153a412-f251-456e-b596-f4355f98274b", "DetectTime": "2024-05-21T12:44:24.147866+00:00", "EventTime": "2024-05-21T12:44:24.147885+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.102.120.85"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.102.120.85 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuyDOL1zgeevQD7ZG5"], "accumulated_threat_level": 1.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "5e92cd8f-9ab0-4f6e-93c0-c308427a84d2", "DetectTime": "2024-05-21T12:44:24.303002+00:00", "EventTime": "2024-05-21T12:44:24.303023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci887q3jpgSCYl8HO9"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "d0e343cd-84cc-4931-821c-942e35b9d3c9", "DetectTime": "2024-05-21T12:44:24.345511+00:00", "EventTime": "2024-05-21T12:44:24.345529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmofwk3sGQ5wTbfEA4"], "accumulated_threat_level": 11.724000000000002, "timewindow": 134} +{"Format": "IDEA0", "ID": "7bcfb444-19ed-404f-8345-3ee4047f559f", "DetectTime": "2024-05-21T12:44:24.392338+00:00", "EventTime": "2024-05-21T12:44:24.392356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoPqn286lvidG23n1"], "accumulated_threat_level": 12.524000000000003, "timewindow": 134} +{"Format": "Json", "ID": "7bcfb444-19ed-404f-8345-3ee4047f559f", "DetectTime": "2024-05-21T12:44:24.392338+00:00", "EventTime": "2024-05-21T12:44:24.392356+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-06T13:28:16.567203+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2024/05/21 12:44:24.605869)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 134, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "8597cb2e-ccc2-4e5b-a299-8be639147cda", "DetectTime": "2024-05-21T12:44:24.619223+00:00", "EventTime": "2024-05-21T12:44:24.619251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6lW42qwTOaLG23e8"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "0d378e88-1e12-449f-bb08-d91ab03dc83d", "DetectTime": "2024-05-21T12:44:24.632101+00:00", "EventTime": "2024-05-21T12:44:24.632133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1lik19cDI8ytyTCl"], "accumulated_threat_level": 1.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "7f00620e-3e06-4a67-aa62-3a0a360977ea", "DetectTime": "2024-05-21T12:44:24.644168+00:00", "EventTime": "2024-05-21T12:44:24.644204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrqMn38DlKit1Xy4d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 134} +{"Format": "IDEA0", "ID": "c21f13ef-2992-44af-9b2c-1af620f3a2d4", "DetectTime": "2024-05-21T12:44:24.656375+00:00", "EventTime": "2024-05-21T12:44:24.656409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDL30y4cQOXgERuYqc"], "accumulated_threat_level": 3.2, "timewindow": 134} +{"Format": "IDEA0", "ID": "d430f723-818a-4bd9-980d-f28dfe2e6d6f", "DetectTime": "2024-05-21T12:44:24.852508+00:00", "EventTime": "2024-05-21T12:44:24.852533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COtMoU2OM7Y4lmQQU8"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "cfa352fa-8ae7-41e4-b206-3df1945087f0", "DetectTime": "2024-05-21T12:44:24.897181+00:00", "EventTime": "2024-05-21T12:44:24.897201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF74iy3ttYBbmTsCO8"], "accumulated_threat_level": 4.0, "timewindow": 134} +{"Format": "IDEA0", "ID": "280d56d3-30ff-4cae-9bbc-d31a4200df45", "DetectTime": "2024-05-21T12:44:24.946256+00:00", "EventTime": "2024-05-21T12:44:24.946274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1QxuSAy9YBQTY8k"], "accumulated_threat_level": 4.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "246a2dd0-ffb1-4211-a144-8bdbf87d9355", "DetectTime": "2024-05-21T12:44:24.994990+00:00", "EventTime": "2024-05-21T12:44:24.995008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYl8PHIwgnPYB7rcj"], "accumulated_threat_level": 5.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "bbb7af69-327f-4a17-904e-98a57984ce4b", "DetectTime": "2024-05-21T12:44:25.043682+00:00", "EventTime": "2024-05-21T12:44:25.043716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35Xzb1SQFYHyPDvQ9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 134} +{"Format": "IDEA0", "ID": "c9ca0a85-9fd8-4789-9a6b-644a4d8d9dc2", "DetectTime": "2024-05-21T12:44:25.103206+00:00", "EventTime": "2024-05-21T12:44:25.103229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COft6Y2Dkg4K0w9gZb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "40288fa1-2597-477a-9b16-4fcd6cbddd14", "DetectTime": "2024-05-21T12:44:25.151273+00:00", "EventTime": "2024-05-21T12:44:25.151294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChuJiP1T7QP8bX0pge"], "accumulated_threat_level": 7.999999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "703c65c6-0492-4b3a-8e42-06795cee4a7f", "DetectTime": "2024-05-21T12:44:25.420211+00:00", "EventTime": "2024-05-21T12:44:25.420234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZ3uc338FmlyD3WP2"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "189c2d9f-d000-4cd6-895a-b1f56f7927c4", "DetectTime": "2024-05-21T12:44:25.462714+00:00", "EventTime": "2024-05-21T12:44:25.462734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCB9sd42VQNcS2vMC2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "34190d44-204a-487c-a4b9-a869c3aead63", "DetectTime": "2024-05-21T12:44:25.509956+00:00", "EventTime": "2024-05-21T12:44:25.509980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUx8SL3DzKoJijFjKf"], "accumulated_threat_level": 9.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "f25336fc-ef2d-47a6-87bb-059db492b15b", "DetectTime": "2024-05-21T12:44:25.669313+00:00", "EventTime": "2024-05-21T12:44:25.669348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1I0tu1OEFBLhDGPCa"], "accumulated_threat_level": 10.4, "timewindow": 134} +{"Format": "IDEA0", "ID": "f3c9f8f4-91d5-40f6-9798-e08a155907f7", "DetectTime": "2024-05-21T12:44:25.693837+00:00", "EventTime": "2024-05-21T12:44:25.693865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.103.236.242"]}], "Attach": [{"Content": "Connection to unknown destination port 1625/UDP destination IP 99.103.236.242. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuemmn1He1oLBnic09"], "accumulated_threat_level": 11.200000000000001, "timewindow": 134} +{"Format": "IDEA0", "ID": "0a2b1207-27ef-41a1-b184-4cee256bbc77", "DetectTime": "2024-05-21T12:44:25.741557+00:00", "EventTime": "2024-05-21T12:44:25.741586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "Connection to unknown destination port 5473/UDP destination IP 123.237.162.38. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzhWm9Jpr5Cos3Hrf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 134} +{"Format": "Json", "ID": "0a2b1207-27ef-41a1-b184-4cee256bbc77", "DetectTime": "2024-05-21T12:44:25.741557+00:00", "EventTime": "2024-05-21T12:44:25.741586+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["123.237.162.38"]}], "Attach": [{"Content": "1970-01-06T13:28:24.027985+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2024/05/21 12:44:25.908778)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 134, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c7da0065-a986-4030-b87e-ebbb01c3389f", "DetectTime": "2024-05-21T12:44:25.920562+00:00", "EventTime": "2024-05-21T12:44:25.920584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIjVp1vMA4XfJ3W3c"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "53c0e23f-9efc-4092-963e-188afd20f0d9", "DetectTime": "2024-05-21T12:44:25.931416+00:00", "EventTime": "2024-05-21T12:44:25.931434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.254.66.253"]}], "Attach": [{"Content": "Connection to unknown destination port 18973/UDP destination IP 88.254.66.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cng72y4skhi2BOWcg"], "accumulated_threat_level": 1.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "71ad91bd-9611-493c-a698-ca3eb2e931e1", "DetectTime": "2024-05-21T12:44:25.936261+00:00", "EventTime": "2024-05-21T12:44:25.936279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QshV1iCYBhtURAp1"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "0d678544-6df7-4493-98ac-5d6bec196952", "DetectTime": "2024-05-21T12:44:26.144168+00:00", "EventTime": "2024-05-21T12:44:26.144186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mlic2LbrAFi8NpDe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 134} +{"Format": "IDEA0", "ID": "e36b3e9b-8517-43bd-a285-f5919bd9cf0f", "DetectTime": "2024-05-21T12:44:26.192938+00:00", "EventTime": "2024-05-21T12:44:26.192955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7KmPX1NBxyLbQyh9c"], "accumulated_threat_level": 3.2, "timewindow": 134} +{"Format": "IDEA0", "ID": "d6e4f55d-85c5-4f46-9ed4-ac89372e71e4", "DetectTime": "2024-05-21T12:44:26.248298+00:00", "EventTime": "2024-05-21T12:44:26.248318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBlpJ2QMrsvYvBN3i"], "accumulated_threat_level": 4.0, "timewindow": 134} +{"Format": "IDEA0", "ID": "a466f914-df32-4430-9ec3-99faeba92894", "DetectTime": "2024-05-21T12:44:26.346661+00:00", "EventTime": "2024-05-21T12:44:26.346681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsBpj37oJebMr9Mce"], "accumulated_threat_level": 4.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "1e77f38b-4cc1-418b-92b3-76f03c8b4e19", "DetectTime": "2024-05-21T12:44:26.444514+00:00", "EventTime": "2024-05-21T12:44:26.444536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQmYri932HVRTNvl"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "9d47d4c5-7f26-4777-b03c-cdf115b46d4b", "DetectTime": "2024-05-21T12:44:26.512803+00:00", "EventTime": "2024-05-21T12:44:26.512824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ8Lo2mMhhlmR5rD5"], "accumulated_threat_level": 5.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "6277b40e-d6c7-46a0-97c2-396bef1ee317", "DetectTime": "2024-05-21T12:44:26.560797+00:00", "EventTime": "2024-05-21T12:44:26.560816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBqdE2jOTrBLeXhr5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 134} +{"Format": "IDEA0", "ID": "fb5897e6-f899-4c74-9665-64a5d17badfd", "DetectTime": "2024-05-21T12:44:26.658141+00:00", "EventTime": "2024-05-21T12:44:26.658161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3hCC41NUFyNLwFLg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "a76e0823-211f-460d-a65a-c0f58627751d", "DetectTime": "2024-05-21T12:44:26.704795+00:00", "EventTime": "2024-05-21T12:44:26.704814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvc2ie2ovHQkxYJFdd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "3cd3d21c-dbd3-4a56-ae64-17dac5680e36", "DetectTime": "2024-05-21T12:44:26.969136+00:00", "EventTime": "2024-05-21T12:44:26.969154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2pNKm2WxWbTn82Tog"], "accumulated_threat_level": 8.799999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "1b33bb1c-5fcd-43b5-aaf3-68315369c3dd", "DetectTime": "2024-05-21T12:44:27.017079+00:00", "EventTime": "2024-05-21T12:44:27.017099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjx5w1INIqrX4JB06"], "accumulated_threat_level": 9.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "357b7bbb-651c-440f-97f1-882c32217a03", "DetectTime": "2024-05-21T12:44:27.064163+00:00", "EventTime": "2024-05-21T12:44:27.064186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsWK432Yq3LV7xcDe"], "accumulated_threat_level": 10.4, "timewindow": 134} +{"Format": "IDEA0", "ID": "1efd2dab-d027-4da6-8990-7c504f169f18", "DetectTime": "2024-05-21T12:44:27.078034+00:00", "EventTime": "2024-05-21T12:44:27.078053+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["221.127.137.33"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzT9Tggik8s2jbOc3"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "4c998838-8a6c-4fa0-9b5e-5d7780f7243e", "DetectTime": "2024-05-21T12:44:27.090306+00:00", "EventTime": "2024-05-21T12:44:27.090325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["221.127.137.33"]}], "Attach": [{"Content": "connection to blacklisted IP: 221.127.137.33 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzT9Tggik8s2jbOc3"], "accumulated_threat_level": 2.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "d539c0de-8938-4c86-b05c-e4ee587b8b57", "DetectTime": "2024-05-21T12:44:27.207880+00:00", "EventTime": "2024-05-21T12:44:27.207908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFky39Y8ZxnjsHkz"], "accumulated_threat_level": 11.200000000000001, "timewindow": 134} +{"Format": "IDEA0", "ID": "46960733-2eec-4302-962b-7abb41f4b0f8", "DetectTime": "2024-05-21T12:44:27.261238+00:00", "EventTime": "2024-05-21T12:44:27.261256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8trJJxrqZPcIbY2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 134} +{"Format": "Json", "ID": "46960733-2eec-4302-962b-7abb41f4b0f8", "DetectTime": "2024-05-21T12:44:27.261238+00:00", "EventTime": "2024-05-21T12:44:27.261256+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-06T13:59:37.583292+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2024/05/21 12:44:27.664324)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 134, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b5ee4b02-e130-457d-84aa-f7beaed52439", "DetectTime": "2024-05-21T12:44:27.676167+00:00", "EventTime": "2024-05-21T12:44:27.676194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Kfp41AbnoYzIpm63"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "699a5a71-0aab-4147-a543-a4c2e8ef5782", "DetectTime": "2024-05-21T12:44:27.688402+00:00", "EventTime": "2024-05-21T12:44:27.688425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLqAv3qcwQ9YlLiT5"], "accumulated_threat_level": 1.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "41c45c9a-fc4a-4013-af1d-f9d2bdf5ba65", "DetectTime": "2024-05-21T12:44:27.708849+00:00", "EventTime": "2024-05-21T12:44:27.708882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBZ2J1QyF6hrQMn2a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 134} +{"Format": "IDEA0", "ID": "26b66c59-b7f0-4a42-8dbe-907ae47fea69", "DetectTime": "2024-05-21T12:44:27.728204+00:00", "EventTime": "2024-05-21T12:44:27.728235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YFCF261WXr4Qz4G5"], "accumulated_threat_level": 3.2, "timewindow": 134} +{"Format": "IDEA0", "ID": "92609567-9cc2-43d7-a1e7-c8827b76316b", "DetectTime": "2024-05-21T12:44:27.734155+00:00", "EventTime": "2024-05-21T12:44:27.734174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8zMZ29SBcPedB583"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "0ada276d-69ec-4e7c-80b9-e5c606cb085b", "DetectTime": "2024-05-21T12:44:27.786000+00:00", "EventTime": "2024-05-21T12:44:27.786034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQB52j47Vms8xHtlD5"], "accumulated_threat_level": 4.0, "timewindow": 134} +{"Format": "IDEA0", "ID": "822af24f-f6bd-4647-bc2f-6cd99f010a95", "DetectTime": "2024-05-21T12:44:27.819576+00:00", "EventTime": "2024-05-21T12:44:27.819598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgd74S3b58LVG0Pvwa", "CCpp5p4SZlGFpward9", "Cc60JjuwC2KXh2KFa", "CFNeAK2a0BnFRU2TXc"], "accumulated_threat_level": 1.0, "timewindow": 137} +{"Format": "IDEA0", "ID": "8c4c203b-517e-44f1-a25c-c81281572f26", "DetectTime": "2024-05-21T12:44:27.835487+00:00", "EventTime": "2024-05-21T12:44:27.835505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIm1zH2rWotx5JI1"], "accumulated_threat_level": 4.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "b0f0a0ef-835c-4b20-919c-02eff2e55612", "DetectTime": "2024-05-21T12:44:27.885791+00:00", "EventTime": "2024-05-21T12:44:27.885811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fbCP3WK1ZR86Nev6"], "accumulated_threat_level": 5.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "89f5853c-7e6d-404c-9dc9-2b976a6a9e21", "DetectTime": "2024-05-21T12:44:27.972934+00:00", "EventTime": "2024-05-21T12:44:27.972955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61K4Q1sXSz8T6kKD6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 134} +{"Format": "IDEA0", "ID": "ba891e9e-5359-40e4-9b24-aafe4097f9b3", "DetectTime": "2024-05-21T12:44:28.267194+00:00", "EventTime": "2024-05-21T12:44:28.267215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzhzYl1DPQyLJJFN83"], "accumulated_threat_level": 7.199999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "cb2faa8d-9fc1-46d7-a20e-b80e17897f75", "DetectTime": "2024-05-21T12:44:28.315083+00:00", "EventTime": "2024-05-21T12:44:28.315118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH8h1R20eFsY8dBiTk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "1f310cff-190f-4864-a087-0c5343f77649", "DetectTime": "2024-05-21T12:44:28.350532+00:00", "EventTime": "2024-05-21T12:44:28.350553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTfOZj4009lwsNS1Sl"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "4479bb5c-e4ea-4a6e-9605-8cd45fc086ef", "DetectTime": "2024-05-21T12:44:28.397279+00:00", "EventTime": "2024-05-21T12:44:28.397300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8B1MF2FfPqxk6NJb7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 134} +{"Format": "IDEA0", "ID": "11966a3a-ef0e-413f-98cc-1cdf0a84f362", "DetectTime": "2024-05-21T12:44:28.444826+00:00", "EventTime": "2024-05-21T12:44:28.444845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhgR8213R2Vjlgsk4"], "accumulated_threat_level": 9.6, "timewindow": 134} +{"Format": "IDEA0", "ID": "3064c37a-5663-4c1c-92b6-9601564f3d0c", "DetectTime": "2024-05-21T12:44:28.502099+00:00", "EventTime": "2024-05-21T12:44:28.502119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CejCJY1xpdmVJSHvm9"], "accumulated_threat_level": 10.4, "timewindow": 134} +{"Format": "IDEA0", "ID": "00e61a62-e807-4016-b67c-8e8e625d31e5", "DetectTime": "2024-05-21T12:44:28.548111+00:00", "EventTime": "2024-05-21T12:44:28.548132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjDjY30gYXYgiU5Jh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 134} +{"Format": "IDEA0", "ID": "3b1d3c21-4bb0-465c-8cb9-53ccf9f86a77", "DetectTime": "2024-05-21T12:44:28.603809+00:00", "EventTime": "2024-05-21T12:44:28.603828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreiQ01XmwvzA1eG5h"], "accumulated_threat_level": 12.000000000000002, "timewindow": 134} +{"Format": "Json", "ID": "3b1d3c21-4bb0-465c-8cb9-53ccf9f86a77", "DetectTime": "2024-05-21T12:44:28.603809+00:00", "EventTime": "2024-05-21T12:44:28.603828+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-06T13:59:57.869007+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 134. (real time 2024/05/21 12:44:28.830001)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 134, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8cbb259c-6f21-439e-9b1b-5870a2fe2a7a", "DetectTime": "2024-05-21T12:44:28.879985+00:00", "EventTime": "2024-05-21T12:44:28.880015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxKU8C4op81LUbmYA4"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "aa547100-8a03-4e37-9c66-ad0b516e382e", "DetectTime": "2024-05-21T12:44:29.023053+00:00", "EventTime": "2024-05-21T12:44:29.023075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHXIR3EmZEnWdf4e3"], "accumulated_threat_level": 1.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "f700c954-876c-4ec1-86f4-8b773504fb7b", "DetectTime": "2024-05-21T12:44:29.071565+00:00", "EventTime": "2024-05-21T12:44:29.071583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgTe534P0Vt8ai9z22"], "accumulated_threat_level": 2.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "bf770782-5349-4bc0-ace4-ae2ba4981a74", "DetectTime": "2024-05-21T12:44:29.120225+00:00", "EventTime": "2024-05-21T12:44:29.120247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRo481DwOnqaGqRKj"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 135} +{"Format": "IDEA0", "ID": "0f86febe-cd58-49ae-818d-546e28ff19c8", "DetectTime": "2024-05-21T12:44:29.168272+00:00", "EventTime": "2024-05-21T12:44:29.168291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnzlPO3MCttAD5Onw8"], "accumulated_threat_level": 4.2, "timewindow": 135} +{"Format": "IDEA0", "ID": "26753176-2b66-42e1-9ab9-d8b0dcfd2069", "DetectTime": "2024-05-21T12:44:29.206235+00:00", "EventTime": "2024-05-21T12:44:29.206257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGShA8BcjypUcXy9"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "7810df03-22c4-4248-9ecb-6a101fe20402", "DetectTime": "2024-05-21T12:44:29.285660+00:00", "EventTime": "2024-05-21T12:44:29.285680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40hf628LoBkwTvmu8"], "accumulated_threat_level": 5.0, "timewindow": 135} +{"Format": "IDEA0", "ID": "1a3d0755-bbd7-4b69-ac2a-cb05b50cad7f", "DetectTime": "2024-05-21T12:44:29.436195+00:00", "EventTime": "2024-05-21T12:44:29.436214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04Tf32QdECOEafsd7"], "accumulated_threat_level": 5.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "313e1c47-642c-4e2c-a0a0-4efc938cb571", "DetectTime": "2024-05-21T12:44:29.471692+00:00", "EventTime": "2024-05-21T12:44:29.471712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYb021qkRvieKAFa8"], "accumulated_threat_level": 6.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "e401da65-3b8c-4a6c-b2c5-cbb15ecc09bf", "DetectTime": "2024-05-21T12:44:29.569042+00:00", "EventTime": "2024-05-21T12:44:29.569061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdXGL72ZHpo3MV0jod"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "ab445b6f-b86a-4a1e-ab51-c7df718ade41", "DetectTime": "2024-05-21T12:44:29.839405+00:00", "EventTime": "2024-05-21T12:44:29.839425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSWdDXojVN1FRi8a"], "accumulated_threat_level": 8.2, "timewindow": 135} +{"Format": "IDEA0", "ID": "be5bda9d-8b10-42dd-8e2e-c419ec1ae6df", "DetectTime": "2024-05-21T12:44:29.886797+00:00", "EventTime": "2024-05-21T12:44:29.886815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgniCzJGkrx1eYNGh"], "accumulated_threat_level": 9.0, "timewindow": 135} +{"Format": "IDEA0", "ID": "f0bc02ad-16d7-4cac-b7cb-b99158d5a291", "DetectTime": "2024-05-21T12:44:29.923296+00:00", "EventTime": "2024-05-21T12:44:29.923316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7DBJj6nuq0EzLAV2"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "c72a125c-e8b7-4796-b759-aacdd0ee036b", "DetectTime": "2024-05-21T12:44:29.967261+00:00", "EventTime": "2024-05-21T12:44:29.967278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C60v0z2yMnc1tZnXui"], "accumulated_threat_level": 9.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "e112a512-d33e-48f7-a06f-b9758e5b8870", "DetectTime": "2024-05-21T12:44:30.012646+00:00", "EventTime": "2024-05-21T12:44:30.012665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRB1bG23HdcUc0SFU"], "accumulated_threat_level": 10.600000000000001, "timewindow": 135} +{"Format": "IDEA0", "ID": "aec21944-8e15-4bf7-9ec6-80a4ca452a62", "DetectTime": "2024-05-21T12:44:30.060235+00:00", "EventTime": "2024-05-21T12:44:30.060257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWgqq1KC2iTEAcQo6"], "accumulated_threat_level": 11.400000000000002, "timewindow": 135} +{"Format": "IDEA0", "ID": "6e89c3a0-fca4-4769-a39f-cf06684a0481", "DetectTime": "2024-05-21T12:44:30.111651+00:00", "EventTime": "2024-05-21T12:44:30.111678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthEEL2A3vLsMT9LRb"], "accumulated_threat_level": 12.200000000000003, "timewindow": 135} +{"Format": "Json", "ID": "6e89c3a0-fca4-4769-a39f-cf06684a0481", "DetectTime": "2024-05-21T12:44:30.111651+00:00", "EventTime": "2024-05-21T12:44:30.111678+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-06T14:32:19.060971+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 135. (real time 2024/05/21 12:44:30.381961)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 135, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "00d6fcf6-7279-4688-a7e7-472f30530efc", "DetectTime": "2024-05-21T12:44:30.407834+00:00", "EventTime": "2024-05-21T12:44:30.407853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbCBvn1e9wHSdY9Eaj"], "accumulated_threat_level": 0.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "40fbcc1a-01dc-4b0c-b152-e1bdd6a8e486", "DetectTime": "2024-05-21T12:44:30.453698+00:00", "EventTime": "2024-05-21T12:44:30.453718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LZ1X3m1JfgrLCprf"], "accumulated_threat_level": 1.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "c1352f5c-c1de-4f78-8971-02ffa67350f0", "DetectTime": "2024-05-21T12:44:30.507960+00:00", "EventTime": "2024-05-21T12:44:30.507992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2TquM28H01uPNzIS7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 135} +{"Format": "IDEA0", "ID": "d671ab24-e2d9-4093-bb0b-5c718d6b61d6", "DetectTime": "2024-05-21T12:44:30.550270+00:00", "EventTime": "2024-05-21T12:44:30.550289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvFnI14CS82hZvbza3"], "accumulated_threat_level": 3.2, "timewindow": 135} +{"Format": "IDEA0", "ID": "9e43f7bf-b62b-47b8-aff4-92e323290ce8", "DetectTime": "2024-05-21T12:44:30.596848+00:00", "EventTime": "2024-05-21T12:44:30.596870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI8zso46j6gV3Qscoe"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "eae8cad7-ec05-4d43-ac63-85b1b3005d37", "DetectTime": "2024-05-21T12:44:30.719190+00:00", "EventTime": "2024-05-21T12:44:30.719213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3mUQQ3QmNmwwboDH4"], "accumulated_threat_level": 4.0, "timewindow": 135} +{"Format": "IDEA0", "ID": "51827189-7757-4247-8ef3-ba11b9f4286b", "DetectTime": "2024-05-21T12:44:30.770933+00:00", "EventTime": "2024-05-21T12:44:30.770954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CozPNJip1CVuPGwm2"], "accumulated_threat_level": 4.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "6860bb23-247e-4976-b222-8db208236db0", "DetectTime": "2024-05-21T12:44:31.038557+00:00", "EventTime": "2024-05-21T12:44:31.038575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEFRl2ToZQZjbxJx3"], "accumulated_threat_level": 5.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "fa6fa47b-f553-4517-9364-2020f8d79883", "DetectTime": "2024-05-21T12:44:31.083496+00:00", "EventTime": "2024-05-21T12:44:31.083516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKHHvc3A7In82Smia1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "949bd18b-9063-429a-8cdb-9bee3b47b669", "DetectTime": "2024-05-21T12:44:31.128056+00:00", "EventTime": "2024-05-21T12:44:31.128076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEh5JT3GnQWAuE01O1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 135} +{"Format": "IDEA0", "ID": "2daa29a9-ae6b-422e-84b0-ec5287d359d0", "DetectTime": "2024-05-21T12:44:31.175891+00:00", "EventTime": "2024-05-21T12:44:31.175911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmmYe1gEfmrsDQPmg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 135} +{"Format": "IDEA0", "ID": "6c469de2-dfbc-48bb-aee7-f1e178872b0f", "DetectTime": "2024-05-21T12:44:31.223424+00:00", "EventTime": "2024-05-21T12:44:31.223462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWGRL2tLQErAqe0O4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 135} +{"Format": "IDEA0", "ID": "aca0d195-2484-41e9-9825-5ab20ad4084a", "DetectTime": "2024-05-21T12:44:31.274599+00:00", "EventTime": "2024-05-21T12:44:31.274620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgrfgL2Wyz1Uk3LXj8"], "accumulated_threat_level": 9.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "fa74a9c2-6366-43be-869e-0c6f80b7dbaa", "DetectTime": "2024-05-21T12:44:31.319486+00:00", "EventTime": "2024-05-21T12:44:31.319506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChEE2h4S2LlCaPy4ck"], "accumulated_threat_level": 10.4, "timewindow": 135} +{"Format": "IDEA0", "ID": "dbc332cc-b2cc-4c0d-871d-e2a11085531f", "DetectTime": "2024-05-21T12:44:31.365369+00:00", "EventTime": "2024-05-21T12:44:31.365387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBXr432AN4doKiJW4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 135} +{"Format": "IDEA0", "ID": "2fbc099f-c811-473a-bc66-5eef8dca1d81", "DetectTime": "2024-05-21T12:44:31.415676+00:00", "EventTime": "2024-05-21T12:44:31.415694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvJkN3DHM429duGGf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 135} +{"Format": "Json", "ID": "2fbc099f-c811-473a-bc66-5eef8dca1d81", "DetectTime": "2024-05-21T12:44:31.415676+00:00", "EventTime": "2024-05-21T12:44:31.415694+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "1970-01-06T14:32:22.468091+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 135. (real time 2024/05/21 12:44:31.606875)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 135, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8c4c82d2-f0ab-4a68-9762-6f83318dc435", "DetectTime": "2024-05-21T12:44:31.676954+00:00", "EventTime": "2024-05-21T12:44:31.676976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxSJbncdQBAgddAc"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "192cace4-9103-46f8-9233-520a26fd7b23", "DetectTime": "2024-05-21T12:44:31.718140+00:00", "EventTime": "2024-05-21T12:44:31.718161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9An48O05KrusqQNe"], "accumulated_threat_level": 0.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "8c156d2e-455d-45a3-96f8-93f3ee25ba99", "DetectTime": "2024-05-21T12:44:31.763865+00:00", "EventTime": "2024-05-21T12:44:31.763884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKY4Ro3XjXtvvuX6ig"], "accumulated_threat_level": 1.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "383859dd-d8c6-40d8-8975-094a395a8e1c", "DetectTime": "2024-05-21T12:44:31.808956+00:00", "EventTime": "2024-05-21T12:44:31.808975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9nBc4Rj7jPgzRQjk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 135} +{"Format": "IDEA0", "ID": "e34f2292-fc43-4f07-aefa-f565e8587d56", "DetectTime": "2024-05-21T12:44:31.854639+00:00", "EventTime": "2024-05-21T12:44:31.854658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRTsx2aGV4k0hclA6"], "accumulated_threat_level": 3.2, "timewindow": 135} +{"Format": "IDEA0", "ID": "4ddd0dcc-c0bd-44b6-888a-ccd2007b78b5", "DetectTime": "2024-05-21T12:44:31.904991+00:00", "EventTime": "2024-05-21T12:44:31.905013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBLt53y3sdWTqf6mj"], "accumulated_threat_level": 4.0, "timewindow": 135} +{"Format": "IDEA0", "ID": "421a21dc-edf1-4085-bf0f-1957d750863b", "DetectTime": "2024-05-21T12:44:31.955394+00:00", "EventTime": "2024-05-21T12:44:31.955413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cisl3X2oajw0Dv80c9"], "accumulated_threat_level": 4.8, "timewindow": 135} +{"Format": "IDEA0", "ID": "f500f9e0-9306-49b5-8f8d-16b536130d2b", "DetectTime": "2024-05-21T12:44:32.001007+00:00", "EventTime": "2024-05-21T12:44:32.001026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Nl7g4ygbZOXNB6U9"], "accumulated_threat_level": 5.6, "timewindow": 135} +{"Format": "IDEA0", "ID": "b40e928d-f9d9-4594-83f0-2dede280aff2", "DetectTime": "2024-05-21T12:44:32.163152+00:00", "EventTime": "2024-05-21T12:44:32.163172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cciqt3pG8WlqzLsa7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "3fd6cbfe-9fb4-48e3-ad94-f1ad2e765383", "DetectTime": "2024-05-21T12:44:32.447241+00:00", "EventTime": "2024-05-21T12:44:32.447263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCHI4o11s44sWHCv26"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "fa03bc3a-3e29-4a5c-b909-77a85861a621", "DetectTime": "2024-05-21T12:44:32.570348+00:00", "EventTime": "2024-05-21T12:44:32.570367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JLuN2b8F77vkkhB6"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "f5ccc9b2-abd6-4481-afb4-8f2d036a8920", "DetectTime": "2024-05-21T12:44:32.617653+00:00", "EventTime": "2024-05-21T12:44:32.617677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDlbDiNq4VkoMJ4el"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "8202e267-d279-4dca-9cdb-f066b9e3fd08", "DetectTime": "2024-05-21T12:44:32.664621+00:00", "EventTime": "2024-05-21T12:44:32.664640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhHa73Rzgf3gnoEX2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "51481a68-4c93-4d7a-80d1-b2cbfac883b5", "DetectTime": "2024-05-21T12:44:32.723397+00:00", "EventTime": "2024-05-21T12:44:32.723416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKBwi423qNO9g6D9D3"], "accumulated_threat_level": 3.2, "timewindow": 136} +{"Format": "IDEA0", "ID": "f1ae29c3-5e2e-4763-bf89-7f5755ece417", "DetectTime": "2024-05-21T12:44:32.770235+00:00", "EventTime": "2024-05-21T12:44:32.770255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa9sR13BSDGLN3bUi"], "accumulated_threat_level": 4.0, "timewindow": 136} +{"Format": "IDEA0", "ID": "59576d7e-fa54-490e-b2ba-67ffc1efda00", "DetectTime": "2024-05-21T12:44:32.819890+00:00", "EventTime": "2024-05-21T12:44:32.819910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemNXP112nOdDpoe5j"], "accumulated_threat_level": 4.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "88525e25-b49d-4c81-8d71-c9e7c824d11c", "DetectTime": "2024-05-21T12:44:33.097629+00:00", "EventTime": "2024-05-21T12:44:33.097651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gybQ2Z4S9Bvb9l71"], "accumulated_threat_level": 5.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "1dde8ccc-df5d-4950-83fe-21f5c95eaff3", "DetectTime": "2024-05-21T12:44:33.159088+00:00", "EventTime": "2024-05-21T12:44:33.159106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbHYR5iEviQlESdd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 136} +{"Format": "IDEA0", "ID": "d8dd87ac-886e-4431-b5f5-89b2f9c75b63", "DetectTime": "2024-05-21T12:44:33.210884+00:00", "EventTime": "2024-05-21T12:44:33.210911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COd74GCcSof9YeO8g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "76fbda99-2006-4467-8d06-7216669f995d", "DetectTime": "2024-05-21T12:44:33.285011+00:00", "EventTime": "2024-05-21T12:44:33.285031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLOfXxJ5AQEowtH4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "b7d71733-228f-46fd-8df1-111537efab13", "DetectTime": "2024-05-21T12:44:33.335134+00:00", "EventTime": "2024-05-21T12:44:33.335153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC3W3d38OUBnFgRPP3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "7a4bfe7a-d110-4d6e-b24e-07f0fa55a974", "DetectTime": "2024-05-21T12:44:33.377772+00:00", "EventTime": "2024-05-21T12:44:33.377794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQklNP3KwWnoPtUgri"], "accumulated_threat_level": 9.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "1a9820d6-b036-42e1-92d9-ac7a0b77680b", "DetectTime": "2024-05-21T12:44:33.416733+00:00", "EventTime": "2024-05-21T12:44:33.416755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR8v31qMrSxsHw4fb"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "0eabd3fc-60f9-42cf-9d2f-c1b13e4f9cea", "DetectTime": "2024-05-21T12:44:33.688413+00:00", "EventTime": "2024-05-21T12:44:33.688431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbdoy3SHvNjcfJ1yd"], "accumulated_threat_level": 10.4, "timewindow": 136} +{"Format": "IDEA0", "ID": "07d20173-0fdb-4565-a869-28790384d28c", "DetectTime": "2024-05-21T12:44:33.743627+00:00", "EventTime": "2024-05-21T12:44:33.743647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyKEVw4EayUS9suer4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 136} +{"Format": "IDEA0", "ID": "833e05ad-96a4-467d-940a-1d19b2e655aa", "DetectTime": "2024-05-21T12:44:33.790703+00:00", "EventTime": "2024-05-21T12:44:33.790721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COJOgb1j4I0zRWnQt7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 136} +{"Format": "Json", "ID": "833e05ad-96a4-467d-940a-1d19b2e655aa", "DetectTime": "2024-05-21T12:44:33.790703+00:00", "EventTime": "2024-05-21T12:44:33.790721+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-06T15:03:02.986439+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2024/05/21 12:44:33.955675)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 136, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4e2d43b9-e7a7-4f64-b095-6db18316de08", "DetectTime": "2024-05-21T12:44:33.966661+00:00", "EventTime": "2024-05-21T12:44:33.966681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD923nIpGnsz9zope"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "4ea03bac-6510-4189-85d1-511437ab579e", "DetectTime": "2024-05-21T12:44:33.978804+00:00", "EventTime": "2024-05-21T12:44:33.978825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Z51k4LTU0bko4L2i"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "9a154ec5-0fce-42b5-b5f8-607adc139a94", "DetectTime": "2024-05-21T12:44:34.018901+00:00", "EventTime": "2024-05-21T12:44:34.018920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqz354UpnQGP64nbk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "e9ac3202-35ce-4d8b-a7c4-a8452e89c3a2", "DetectTime": "2024-05-21T12:44:34.065051+00:00", "EventTime": "2024-05-21T12:44:34.065074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2NaiY3MCYDbOBeRyk"], "accumulated_threat_level": 3.2, "timewindow": 136} +{"Format": "IDEA0", "ID": "3f5c48ff-2b31-483d-bc59-896c9461b257", "DetectTime": "2024-05-21T12:44:34.114027+00:00", "EventTime": "2024-05-21T12:44:34.114044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6TGq22W3jY0MAH5h"], "accumulated_threat_level": 4.0, "timewindow": 136} +{"Format": "IDEA0", "ID": "f2f63703-c783-40e6-81a8-729b061cd913", "DetectTime": "2024-05-21T12:44:34.159428+00:00", "EventTime": "2024-05-21T12:44:34.159448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT4HX23uGPDsVne5rh"], "accumulated_threat_level": 4.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "de3938a2-b73b-4376-872f-f3b7d5a67d14", "DetectTime": "2024-05-21T12:44:34.454232+00:00", "EventTime": "2024-05-21T12:44:34.454256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJQWL3rseVqjMpc4"], "accumulated_threat_level": 5.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "4144ae4e-c898-4eb0-bb43-3ca000c09b6e", "DetectTime": "2024-05-21T12:44:34.492397+00:00", "EventTime": "2024-05-21T12:44:34.492422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdTZAb1k7moZNbRmsf"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "8e266b42-9d9f-438c-9b47-d557234b4df0", "DetectTime": "2024-05-21T12:44:34.540556+00:00", "EventTime": "2024-05-21T12:44:34.540579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmAXoV3inrDmntOca9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 136} +{"Format": "IDEA0", "ID": "96ec0db6-0abc-4de9-b3fc-9e7f300fd277", "DetectTime": "2024-05-21T12:44:34.591444+00:00", "EventTime": "2024-05-21T12:44:34.591466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMRlB1VXUEXdTsc1f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "e67164c4-4704-4fea-9921-03dfab1e3489", "DetectTime": "2024-05-21T12:44:34.639590+00:00", "EventTime": "2024-05-21T12:44:34.639609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CinjUb35i1ejJITZ5b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "84ae374a-e074-4180-bb92-cee4acf8f6ad", "DetectTime": "2024-05-21T12:44:34.692060+00:00", "EventTime": "2024-05-21T12:44:34.692081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSg90M1uEca1dNq3pj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "43b522c1-b5d5-49ec-98be-361db54647cb", "DetectTime": "2024-05-21T12:44:34.754047+00:00", "EventTime": "2024-05-21T12:44:34.754069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHSZTR1hpzpouyuhCa"], "accumulated_threat_level": 9.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "97a71120-6539-46fa-a2f4-1fb588fac184", "DetectTime": "2024-05-21T12:44:34.802177+00:00", "EventTime": "2024-05-21T12:44:34.802197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1XLxa4ynZNgkl3qf9"], "accumulated_threat_level": 10.4, "timewindow": 136} +{"Format": "IDEA0", "ID": "43a50aab-4e4a-467c-a6f1-d09e479f02fe", "DetectTime": "2024-05-21T12:44:34.849522+00:00", "EventTime": "2024-05-21T12:44:34.849543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2fuP2LyIHOFc0vYa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 136} +{"Format": "IDEA0", "ID": "cbc5a7d6-f84c-4ba7-9707-f45e119a3302", "DetectTime": "2024-05-21T12:44:35.167197+00:00", "EventTime": "2024-05-21T12:44:35.167216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb7WP3GxvGwsNZc7f"], "accumulated_threat_level": 12.000000000000002, "timewindow": 136} +{"Format": "Json", "ID": "cbc5a7d6-f84c-4ba7-9707-f45e119a3302", "DetectTime": "2024-05-21T12:44:35.167197+00:00", "EventTime": "2024-05-21T12:44:35.167216+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-06T15:23:55.613934+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2024/05/21 12:44:35.344499)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 136, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "94428dc9-3c47-40e8-baab-55273284ebc8", "DetectTime": "2024-05-21T12:44:35.350112+00:00", "EventTime": "2024-05-21T12:44:35.350136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcqeC3Y5OZ0VeFAyl"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "e0849950-40e8-45cf-b376-9df1db70918f", "DetectTime": "2024-05-21T12:44:35.446310+00:00", "EventTime": "2024-05-21T12:44:35.446329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1142/TCP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0SmT33RK4FNTaOh8"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "1ca5dab7-746f-49d3-b8c9-4a566f2fefce", "DetectTime": "2024-05-21T12:44:35.468326+00:00", "EventTime": "2024-05-21T12:44:35.468344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEIkBOe2U0sVGL9l"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "8af376ec-1418-4a67-944b-fa9e30293400", "DetectTime": "2024-05-21T12:44:35.480072+00:00", "EventTime": "2024-05-21T12:44:35.480091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 1877/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6OXmM1AMDd0dditJj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "1a4b8d3e-73ce-48e8-a147-df55a81aeb60", "DetectTime": "2024-05-21T12:44:35.490951+00:00", "EventTime": "2024-05-21T12:44:35.490970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyPdvC2gLYipZ9rEVj"], "accumulated_threat_level": 3.2, "timewindow": 136} +{"Format": "IDEA0", "ID": "5aa90a39-3ba1-4258-8940-d7342350da52", "DetectTime": "2024-05-21T12:44:35.516219+00:00", "EventTime": "2024-05-21T12:44:35.516238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpg59g27ygsWsK93"], "accumulated_threat_level": 4.0, "timewindow": 136} +{"Format": "IDEA0", "ID": "e8665e5f-7457-4c55-a9d8-12d042f5904f", "DetectTime": "2024-05-21T12:44:35.777870+00:00", "EventTime": "2024-05-21T12:44:35.777888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxTQ53LVw2GUyH6o6"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "87a2f022-9248-4bfe-8ff5-d2956b843067", "DetectTime": "2024-05-21T12:44:35.827091+00:00", "EventTime": "2024-05-21T12:44:35.827112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktkGl3JgjshXRJtbk"], "accumulated_threat_level": 4.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "d053cd1b-281a-4b40-8c93-1bea02b27ea8", "DetectTime": "2024-05-21T12:44:35.851883+00:00", "EventTime": "2024-05-21T12:44:35.851904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVtto226FuGqPu6dob"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "983b9cc5-8efb-4a88-8ce8-027f192a85d7", "DetectTime": "2024-05-21T12:44:35.908499+00:00", "EventTime": "2024-05-21T12:44:35.908517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbiP1bCYzbj0MJD6"], "accumulated_threat_level": 5.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "230c79cf-6425-4a6a-ba70-693c68c77c91", "DetectTime": "2024-05-21T12:44:35.956160+00:00", "EventTime": "2024-05-21T12:44:35.956178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCh6n1PRn42a4g8dj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 136} +{"Format": "IDEA0", "ID": "00b479a3-5f66-4f02-a608-3184504df2de", "DetectTime": "2024-05-21T12:44:36.003321+00:00", "EventTime": "2024-05-21T12:44:36.003341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXtMC3StU1oY639i3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "363b8388-9fdd-4210-aab5-c130eb13f1f3", "DetectTime": "2024-05-21T12:44:36.053546+00:00", "EventTime": "2024-05-21T12:44:36.053568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBrBj3JkM4MTscsIg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "e770874f-cb10-415d-ac2e-971667c0fd3c", "DetectTime": "2024-05-21T12:44:36.364479+00:00", "EventTime": "2024-05-21T12:44:36.364502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3RYM159dzOyO0Da3"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "b0b67d72-0c9a-4adf-8f9b-47ca0085e7f5", "DetectTime": "2024-05-21T12:44:36.369576+00:00", "EventTime": "2024-05-21T12:44:36.369595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMeBi11lUKHyyO24zh"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "6699950a-76e7-48e2-b8fc-bc209a7a3aef", "DetectTime": "2024-05-21T12:44:36.395542+00:00", "EventTime": "2024-05-21T12:44:36.395564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgtZiQUSay5GxIFM1"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "9789ccf3-8b77-4f1f-b8b6-594ea82783e8", "DetectTime": "2024-05-21T12:44:36.421405+00:00", "EventTime": "2024-05-21T12:44:36.421427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYKbooqE1L23AKm9", "CjkheT32yH0vbPwMfc", "CFDbVj3oHTlsGiW1b", "CqR5sf3E1o0xKGJVig"], "accumulated_threat_level": 0.5, "timewindow": 138} +{"Format": "IDEA0", "ID": "aac34dc4-86bc-46a4-aa09-11a68f823e60", "DetectTime": "2024-05-21T12:44:36.427018+00:00", "EventTime": "2024-05-21T12:44:36.427038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79cri36phEkWF7Qy5"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "12d299be-22f2-432a-ba8c-34e0453077ac", "DetectTime": "2024-05-21T12:44:36.432786+00:00", "EventTime": "2024-05-21T12:44:36.432805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8QX8i3asgK7USjtn4"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "3aa809c6-4491-40c0-a5bf-51cdad523f8a", "DetectTime": "2024-05-21T12:44:36.437214+00:00", "EventTime": "2024-05-21T12:44:36.437232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CODGq9026JpsJAEni"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "9afd5b35-6ee3-4379-863a-e82bd805bc11", "DetectTime": "2024-05-21T12:44:36.463923+00:00", "EventTime": "2024-05-21T12:44:36.463943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcVr12kSotpHUN7zl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "13e6ab62-8fc8-4e75-8493-1d1b4094a0c3", "DetectTime": "2024-05-21T12:44:36.813931+00:00", "EventTime": "2024-05-21T12:44:36.813953+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BwrW1Mlr4vTYZem"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "e0fa5450-6b52-4b85-9fb7-b382cd82663b", "DetectTime": "2024-05-21T12:44:36.828926+00:00", "EventTime": "2024-05-21T12:44:36.828945+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BwrW1Mlr4vTYZem"], "accumulated_threat_level": 2.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "8051d817-ce97-49c1-bc38-674c46a264f6", "DetectTime": "2024-05-21T12:44:36.858151+00:00", "EventTime": "2024-05-21T12:44:36.858170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxWaGzZOlzAkuGRL1"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "b3492ee6-05ac-4fc4-ae0f-8c7c46db7d8d", "DetectTime": "2024-05-21T12:44:36.872242+00:00", "EventTime": "2024-05-21T12:44:36.872261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxWaGzZOlzAkuGRL1"], "accumulated_threat_level": 3.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "82a1d4e0-b030-43d0-93c2-b8a0563b7ed7", "DetectTime": "2024-05-21T12:44:36.896291+00:00", "EventTime": "2024-05-21T12:44:36.896311+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE5HT1ocrCWgR3Qt"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "228bb7d6-c1af-4013-8bfe-e81f84ea3e60", "DetectTime": "2024-05-21T12:44:36.901724+00:00", "EventTime": "2024-05-21T12:44:36.901743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1UK51LKYNa2BH1O3"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "77e27fd1-a2c0-4d3a-b558-2b1ba601c238", "DetectTime": "2024-05-21T12:44:36.932990+00:00", "EventTime": "2024-05-21T12:44:36.933016+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE5HT1ocrCWgR3Qt"], "accumulated_threat_level": 3.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "1c9a7fee-5f76-47f5-9176-10ac02674f27", "DetectTime": "2024-05-21T12:44:36.938684+00:00", "EventTime": "2024-05-21T12:44:36.938702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cozu3e3t5Sf50p3Yg1"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "e8aed598-3530-4191-8fe7-490ae43721ce", "DetectTime": "2024-05-21T12:44:36.953649+00:00", "EventTime": "2024-05-21T12:44:36.953677+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoLvE3mwZ4z8c9qE9"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "d4326459-e425-440f-ae17-37f92782218e", "DetectTime": "2024-05-21T12:44:36.967128+00:00", "EventTime": "2024-05-21T12:44:36.967151+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoLvE3mwZ4z8c9qE9"], "accumulated_threat_level": 4.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "7c59c9d6-ca1b-46bc-ab52-2dc3d731e5cb", "DetectTime": "2024-05-21T12:44:36.973216+00:00", "EventTime": "2024-05-21T12:44:36.973236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0FJr3LeWXrxOOXmg"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "044c55ba-10a5-4246-b69e-608c07dd6a11", "DetectTime": "2024-05-21T12:44:36.990169+00:00", "EventTime": "2024-05-21T12:44:36.990191+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9GTtmpIeQf7teid"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "eb5522f0-6f1e-4e9c-8660-fdc2ecbfabcb", "DetectTime": "2024-05-21T12:44:37.004711+00:00", "EventTime": "2024-05-21T12:44:37.004731+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9GTtmpIeQf7teid"], "accumulated_threat_level": 4.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "4373fdfd-0704-4488-85d9-549eb928c33c", "DetectTime": "2024-05-21T12:44:37.009827+00:00", "EventTime": "2024-05-21T12:44:37.009845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEemB10ES97P8fCQ6"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "266d4268-a67e-48f3-b5b4-6920b9b4a29c", "DetectTime": "2024-05-21T12:44:37.015702+00:00", "EventTime": "2024-05-21T12:44:37.015726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ajkU2k7MzfPcDuFg"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "2cde1495-1954-45ec-babd-dd168369efdf", "DetectTime": "2024-05-21T12:44:37.034499+00:00", "EventTime": "2024-05-21T12:44:37.034533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCi3uw4scjrmtOc2Bk"], "accumulated_threat_level": 9.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "c27392e8-d419-42f1-b558-e54d72ad32c3", "DetectTime": "2024-05-21T12:44:37.151313+00:00", "EventTime": "2024-05-21T12:44:37.151342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWIh028JMIOTRTTMg"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "7672efd8-a5b6-4a44-b230-974e9fed6679", "DetectTime": "2024-05-21T12:44:37.200335+00:00", "EventTime": "2024-05-21T12:44:37.200358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDcyKm2X1QyHMFegA"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "46bab84b-ba90-4789-b99e-6c6567d27600", "DetectTime": "2024-05-21T12:44:37.205396+00:00", "EventTime": "2024-05-21T12:44:37.205415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9Ki04TXvemHxKHJ6"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "1e76ad4c-6372-4511-af9e-0b678f0dbd9a", "DetectTime": "2024-05-21T12:44:37.353770+00:00", "EventTime": "2024-05-21T12:44:37.353790+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0f9p451VEcNvSqt6"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "75808d11-b0d2-4e5e-bde6-03417f4b8b02", "DetectTime": "2024-05-21T12:44:37.367146+00:00", "EventTime": "2024-05-21T12:44:37.367167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0f9p451VEcNvSqt6"], "accumulated_threat_level": 5.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "8d4df7b1-82c7-4188-b860-d267d2f481b6", "DetectTime": "2024-05-21T12:44:37.394529+00:00", "EventTime": "2024-05-21T12:44:37.394556+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJ6pU20NLqT2DJrVh"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "5d79757f-8330-4fd1-aee0-55e82447f0ba", "DetectTime": "2024-05-21T12:44:37.408706+00:00", "EventTime": "2024-05-21T12:44:37.408727+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJ6pU20NLqT2DJrVh"], "accumulated_threat_level": 5.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "e1d5ed70-14f1-4c22-aa29-3247b1d88672", "DetectTime": "2024-05-21T12:44:37.577546+00:00", "EventTime": "2024-05-21T12:44:37.577567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbktb3udy1PXCdcdi"], "accumulated_threat_level": 10.4, "timewindow": 136} +{"Format": "IDEA0", "ID": "5aa167e9-29b5-459c-a3c4-86332ac829e9", "DetectTime": "2024-05-21T12:44:37.586311+00:00", "EventTime": "2024-05-21T12:44:37.586331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc6znB19KrSXcMf0u3"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "34f3b04d-53d6-47d8-bf3a-00ffaa757426", "DetectTime": "2024-05-21T12:44:37.591345+00:00", "EventTime": "2024-05-21T12:44:37.591363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTD1MM1RKKleSeWJ2h"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "fcdea501-1429-403b-954b-49c75b3cb1a4", "DetectTime": "2024-05-21T12:44:37.627727+00:00", "EventTime": "2024-05-21T12:44:37.627749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHzh6S17lcO8pz1zEe"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "38347d65-3ef1-4538-8651-a02ee522faec", "DetectTime": "2024-05-21T12:44:37.668401+00:00", "EventTime": "2024-05-21T12:44:37.668424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2CSETtg7laq7A29"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "912a068a-45d4-415a-a419-ddcdbd1cf68f", "DetectTime": "2024-05-21T12:44:37.683992+00:00", "EventTime": "2024-05-21T12:44:37.684014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA1eRE27kYNpKXnGXe"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "689fd532-da39-4b06-94f7-dda1e79fe47e", "DetectTime": "2024-05-21T12:44:37.816980+00:00", "EventTime": "2024-05-21T12:44:37.817001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuKhIF3mk1YNhSUhkk"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "6f647308-2ff0-4770-8a77-b70fd1cff8a5", "DetectTime": "2024-05-21T12:44:38.109377+00:00", "EventTime": "2024-05-21T12:44:38.109399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQnERI2zrWgxmJgz3a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 136} +{"Format": "IDEA0", "ID": "89b6a364-d70f-4f4b-be58-252ab518d168", "DetectTime": "2024-05-21T12:44:38.118153+00:00", "EventTime": "2024-05-21T12:44:38.118174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4yD2d1Wb0S4c67Ei8"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "d870d5bb-99b5-44c8-8eab-b5ff0d718be2", "DetectTime": "2024-05-21T12:44:38.151620+00:00", "EventTime": "2024-05-21T12:44:38.151641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEa80GrQIqYcyjG82"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "064fb8cc-360b-4d92-9356-acce53ccdd0d", "DetectTime": "2024-05-21T12:44:38.157204+00:00", "EventTime": "2024-05-21T12:44:38.157225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYTcL1wSoYwiuHIE"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "b22fe147-2863-4d6b-8bb7-5788f072b37b", "DetectTime": "2024-05-21T12:44:38.200663+00:00", "EventTime": "2024-05-21T12:44:38.200684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf9ury30QLyH82AOd2"], "accumulated_threat_level": 9.6, "timewindow": 133} +{"Format": "IDEA0", "ID": "62644fe9-4bf1-4f82-9365-04b9e547f696", "DetectTime": "2024-05-21T12:44:38.408567+00:00", "EventTime": "2024-05-21T12:44:38.408586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ52vV2BP5QgtkA9md"], "accumulated_threat_level": 12.000000000000002, "timewindow": 136} +{"Format": "Json", "ID": "62644fe9-4bf1-4f82-9365-04b9e547f696", "DetectTime": "2024-05-21T12:44:38.408567+00:00", "EventTime": "2024-05-21T12:44:38.408586+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-06T15:33:39.221691+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2024/05/21 12:44:38.645121)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 136, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0818f5cc-1a8a-4385-a98f-6389c5999423", "DetectTime": "2024-05-21T12:44:38.649345+00:00", "EventTime": "2024-05-21T12:44:38.649363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxRCv3lNWGi6Puho9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "9e553051-6608-47d1-bf49-1af233ae1d74", "DetectTime": "2024-05-21T12:44:38.653996+00:00", "EventTime": "2024-05-21T12:44:38.654014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLK9499xJ5aTGrMai"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "676ed423-018f-4ada-8678-4b99c4894104", "DetectTime": "2024-05-21T12:44:38.658508+00:00", "EventTime": "2024-05-21T12:44:38.658526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaS1Mr1zBjan5OX9B5"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "93a559ae-b680-4119-9610-94895e1f88a6", "DetectTime": "2024-05-21T12:44:38.662830+00:00", "EventTime": "2024-05-21T12:44:38.662848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGptoE4RAp9ob5nAf4"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "c374db94-05a3-48bb-b551-80e037ef52b3", "DetectTime": "2024-05-21T12:44:38.881508+00:00", "EventTime": "2024-05-21T12:44:38.881529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzneSe4QzWotnfmhE3"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "add42d50-8a18-452e-ba3d-f98e9bb213cc", "DetectTime": "2024-05-21T12:44:38.886652+00:00", "EventTime": "2024-05-21T12:44:38.886671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDJ3A64bjonz9Bak"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "d05d80f8-4e1e-40dc-898d-8d59cb8e0b3b", "DetectTime": "2024-05-21T12:44:38.891540+00:00", "EventTime": "2024-05-21T12:44:38.891559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66txOZcrampm5013"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "9b085c30-884c-4393-8e04-eae1c15ff8fc", "DetectTime": "2024-05-21T12:44:38.896444+00:00", "EventTime": "2024-05-21T12:44:38.896463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9NozTH9oyPRlFtS9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "902305f0-7395-45c9-810c-02348af058ee", "DetectTime": "2024-05-21T12:44:38.916172+00:00", "EventTime": "2024-05-21T12:44:38.916193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckg6ik3jVRAic9H1u9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "b0627c0a-e24f-43ec-b519-0a60aa83946b", "DetectTime": "2024-05-21T12:44:38.930873+00:00", "EventTime": "2024-05-21T12:44:38.930895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiKUn1FIGrgtJpZN8"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "7c0f6d8a-9598-4cfc-bb72-03e78372ab0e", "DetectTime": "2024-05-21T12:44:39.283378+00:00", "EventTime": "2024-05-21T12:44:39.283402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWn8w4AeZf3EUERSc"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "b4eef721-1bfd-4257-a0f8-68ddc6236ca3", "DetectTime": "2024-05-21T12:44:39.414575+00:00", "EventTime": "2024-05-21T12:44:39.414594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF9j2h6R3TLM2e9Z3"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "87babf7e-19c8-4dd9-a4b0-46ffd052eebe", "DetectTime": "2024-05-21T12:44:39.422342+00:00", "EventTime": "2024-05-21T12:44:39.422360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgXu2t4BTjxlH5NGt9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "2b0f9012-1487-4f56-9633-aab1da4665d4", "DetectTime": "2024-05-21T12:44:39.440181+00:00", "EventTime": "2024-05-21T12:44:39.440201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvac32HxrT9H1iv2k"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "fd3e8e82-eeb6-4f03-907f-6677e0e5137b", "DetectTime": "2024-05-21T12:44:39.486069+00:00", "EventTime": "2024-05-21T12:44:39.486092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cge1Yq3nsVWs0sPx8d"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "87dd906f-32f2-4337-b8ee-9b46eb5d7d6d", "DetectTime": "2024-05-21T12:44:39.491382+00:00", "EventTime": "2024-05-21T12:44:39.491401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmofwk3sGQ5wTbfEA4"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "67177c21-34d0-4a66-932a-27af675542c2", "DetectTime": "2024-05-21T12:44:39.841371+00:00", "EventTime": "2024-05-21T12:44:39.841395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoPqn286lvidG23n1"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "71ad9ebd-dcee-4d5c-9224-a9ae7b73bd54", "DetectTime": "2024-05-21T12:44:39.858537+00:00", "EventTime": "2024-05-21T12:44:39.858557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6lW42qwTOaLG23e8"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "8f39b05b-4bc7-4e8d-b0c9-3a5582dadc2d", "DetectTime": "2024-05-21T12:44:39.937098+00:00", "EventTime": "2024-05-21T12:44:39.937121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrqMn38DlKit1Xy4d"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "d5c7a619-1075-4815-8fa3-b7073c979489", "DetectTime": "2024-05-21T12:44:39.950458+00:00", "EventTime": "2024-05-21T12:44:39.950487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRisPv7RyWLuByHwc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "608b349e-adc6-4e38-95cc-df38f1d5799f", "DetectTime": "2024-05-21T12:44:39.955887+00:00", "EventTime": "2024-05-21T12:44:39.955909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1lik19cDI8ytyTCl"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "da759c21-b615-4268-a6e7-d4c138a9fffa", "DetectTime": "2024-05-21T12:44:39.976769+00:00", "EventTime": "2024-05-21T12:44:39.976788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDL30y4cQOXgERuYqc"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "f9e1a318-5151-4e81-8fdb-793175b567ab", "DetectTime": "2024-05-21T12:44:40.106637+00:00", "EventTime": "2024-05-21T12:44:40.106662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF74iy3ttYBbmTsCO8"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "d4e3f49f-4950-4f64-b689-28f5cefcc05f", "DetectTime": "2024-05-21T12:44:40.112039+00:00", "EventTime": "2024-05-21T12:44:40.112059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1QxuSAy9YBQTY8k"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "cb5a3ea3-6454-4eec-bedc-aadd2a14e199", "DetectTime": "2024-05-21T12:44:40.401529+00:00", "EventTime": "2024-05-21T12:44:40.401552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYl8PHIwgnPYB7rcj"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "a7e9f16f-d4e0-450d-979d-cbc89fe5fc35", "DetectTime": "2024-05-21T12:44:40.429215+00:00", "EventTime": "2024-05-21T12:44:40.429238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehIXk3EFd3koCzCo4"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "dffb691d-abb9-4da0-a1d4-806af00bd2e2", "DetectTime": "2024-05-21T12:44:40.441366+00:00", "EventTime": "2024-05-21T12:44:40.441387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pkh74oEth4cZHvCf"], "accumulated_threat_level": 3.2, "timewindow": 136} +{"Format": "IDEA0", "ID": "4dc8ce72-d206-4e63-97ee-062acd9cfea4", "DetectTime": "2024-05-21T12:44:40.446516+00:00", "EventTime": "2024-05-21T12:44:40.446533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35Xzb1SQFYHyPDvQ9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "00399aa4-c033-49c2-9a60-4221c57a4030", "DetectTime": "2024-05-21T12:44:40.585074+00:00", "EventTime": "2024-05-21T12:44:40.585096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COft6Y2Dkg4K0w9gZb"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "68fb4ba3-af0c-4ecc-b397-e64122701997", "DetectTime": "2024-05-21T12:44:40.648828+00:00", "EventTime": "2024-05-21T12:44:40.648849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChuJiP1T7QP8bX0pge"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "ff7afe8e-1f12-4507-81db-2ce3a9a14d76", "DetectTime": "2024-05-21T12:44:40.690364+00:00", "EventTime": "2024-05-21T12:44:40.690390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUx8SL3DzKoJijFjKf"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "63a12443-0b20-4962-911b-b08dc14156ad", "DetectTime": "2024-05-21T12:44:40.696510+00:00", "EventTime": "2024-05-21T12:44:40.696533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCB9sd42VQNcS2vMC2"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "e087943e-9447-4978-aecb-3ee1b6160ed6", "DetectTime": "2024-05-21T12:44:40.710331+00:00", "EventTime": "2024-05-21T12:44:40.710351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkipSW1Wel5B2v2pi6"], "accumulated_threat_level": 4.0, "timewindow": 136} +{"Format": "IDEA0", "ID": "a7067a38-e8ff-4359-b309-623e831609f5", "DetectTime": "2024-05-21T12:44:41.078186+00:00", "EventTime": "2024-05-21T12:44:41.078211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIjVp1vMA4XfJ3W3c"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "9127fcaa-d899-40d3-a3f9-2fd14eaf9dcb", "DetectTime": "2024-05-21T12:44:41.083182+00:00", "EventTime": "2024-05-21T12:44:41.083202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1I0tu1OEFBLhDGPCa"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "a1d7ab7e-0c03-4134-83eb-46ca6dfc2a23", "DetectTime": "2024-05-21T12:44:41.087919+00:00", "EventTime": "2024-05-21T12:44:41.087937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cng72y4skhi2BOWcg"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "84535e09-eece-4d95-8e0f-8141ecc7ad1b", "DetectTime": "2024-05-21T12:44:41.092372+00:00", "EventTime": "2024-05-21T12:44:41.092390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzhWm9Jpr5Cos3Hrf"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "8808e7be-acdc-4e1b-b533-d875e37999a1", "DetectTime": "2024-05-21T12:44:41.128072+00:00", "EventTime": "2024-05-21T12:44:41.128095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuemmn1He1oLBnic09"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "e5527a63-fe13-40b1-aae4-7f167b439f0f", "DetectTime": "2024-05-21T12:44:41.243924+00:00", "EventTime": "2024-05-21T12:44:41.243942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAuXnYFEJqj0C9ol"], "accumulated_threat_level": 4.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "6f1fb612-661b-49ea-89c7-b2717f892f04", "DetectTime": "2024-05-21T12:44:41.556224+00:00", "EventTime": "2024-05-21T12:44:41.556248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctk0ek2kxwMgbh40d9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "1bb03415-45e4-41ed-8245-076423c868f2", "DetectTime": "2024-05-21T12:44:41.572268+00:00", "EventTime": "2024-05-21T12:44:41.572289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4mlic2LbrAFi8NpDe"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "f4553adc-84b6-43a0-ac63-085abe723e20", "DetectTime": "2024-05-21T12:44:41.576990+00:00", "EventTime": "2024-05-21T12:44:41.577009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7KmPX1NBxyLbQyh9c"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "48159f3b-e672-4c3f-b271-ce8e20c6753c", "DetectTime": "2024-05-21T12:44:41.728107+00:00", "EventTime": "2024-05-21T12:44:41.728131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 125.167.115.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNSQsE2Icz7R7JbLM1"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "769bef0f-bdfa-42a8-b650-398dfeea45f3", "DetectTime": "2024-05-21T12:44:41.769258+00:00", "EventTime": "2024-05-21T12:44:41.769280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBlpJ2QMrsvYvBN3i"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "24aa89ad-6292-4a0a-ac52-e715ff9dfd71", "DetectTime": "2024-05-21T12:44:41.784283+00:00", "EventTime": "2024-05-21T12:44:41.784304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvYPJC21oHY9wPaRDl"], "accumulated_threat_level": 5.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "f3017823-7276-4cc4-9971-f0dfb66b03cf", "DetectTime": "2024-05-21T12:44:41.863360+00:00", "EventTime": "2024-05-21T12:44:41.863382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsBpj37oJebMr9Mce"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "ffe76fc0-8908-4ace-9725-034d36d16798", "DetectTime": "2024-05-21T12:44:41.869557+00:00", "EventTime": "2024-05-21T12:44:41.869585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfZ8Lo2mMhhlmR5rD5"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "c67ffd63-538b-4b7f-9649-b38768dc43de", "DetectTime": "2024-05-21T12:44:41.905734+00:00", "EventTime": "2024-05-21T12:44:41.905756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Xpl53FCMq7eIvj9l"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "4a29f132-d112-4874-b695-a645e3c592f3", "DetectTime": "2024-05-21T12:44:42.231042+00:00", "EventTime": "2024-05-21T12:44:42.231064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBqdE2jOTrBLeXhr5"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "cc294e13-ca24-48c1-8164-da366a375e89", "DetectTime": "2024-05-21T12:44:42.262538+00:00", "EventTime": "2024-05-21T12:44:42.262563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3hCC41NUFyNLwFLg"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "1cdc1b10-95ab-44b3-8a65-5906e98cdb93", "DetectTime": "2024-05-21T12:44:42.366639+00:00", "EventTime": "2024-05-21T12:44:42.366660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSzv93gSHxRapROCa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 136} +{"Format": "IDEA0", "ID": "1fcebc49-de71-4fff-9668-0cfbec6effa2", "DetectTime": "2024-05-21T12:44:42.372480+00:00", "EventTime": "2024-05-21T12:44:42.372498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsWK432Yq3LV7xcDe"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "c086c58c-15f3-4182-b71f-366d9576de40", "DetectTime": "2024-05-21T12:44:42.376898+00:00", "EventTime": "2024-05-21T12:44:42.376917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvc2ie2ovHQkxYJFdd"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "b30e5180-a6ec-4d53-b8ff-e9137fced256", "DetectTime": "2024-05-21T12:44:42.381283+00:00", "EventTime": "2024-05-21T12:44:42.381301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFky39Y8ZxnjsHkz"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "aab6423e-6494-42af-b7a2-93d292405440", "DetectTime": "2024-05-21T12:44:42.386901+00:00", "EventTime": "2024-05-21T12:44:42.386921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjx5w1INIqrX4JB06"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "9af7e014-0554-4fcc-bb9e-582ea508729a", "DetectTime": "2024-05-21T12:44:42.391463+00:00", "EventTime": "2024-05-21T12:44:42.391482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2pNKm2WxWbTn82Tog"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "dd8ec3cb-35d6-4a4b-a645-55aa08771d1a", "DetectTime": "2024-05-21T12:44:42.776945+00:00", "EventTime": "2024-05-21T12:44:42.776967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8trJJxrqZPcIbY2"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "811edccf-318f-4d95-8ae7-23255f5dfbb3", "DetectTime": "2024-05-21T12:44:42.832567+00:00", "EventTime": "2024-05-21T12:44:42.832591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Kfp41AbnoYzIpm63"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "bde2c704-f301-468a-8434-918297790177", "DetectTime": "2024-05-21T12:44:42.912390+00:00", "EventTime": "2024-05-21T12:44:42.912413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeLqAv3qcwQ9YlLiT5"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "feaa7e70-5acd-46b3-9a86-05495c0131c0", "DetectTime": "2024-05-21T12:44:42.917482+00:00", "EventTime": "2024-05-21T12:44:42.917501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBZ2J1QyF6hrQMn2a"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "0fcfe49b-8a10-466e-ade0-6bf4d85ff3e9", "DetectTime": "2024-05-21T12:44:42.934421+00:00", "EventTime": "2024-05-21T12:44:42.934443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQB52j47Vms8xHtlD5"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "83225420-2f00-4018-bc25-934ff6942b33", "DetectTime": "2024-05-21T12:44:42.947794+00:00", "EventTime": "2024-05-21T12:44:42.947818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRdS428UVf3YTPDx3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "f1f235cb-e7b3-4653-bf14-35a491ca4daa", "DetectTime": "2024-05-21T12:44:43.013228+00:00", "EventTime": "2024-05-21T12:44:43.013250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YFCF261WXr4Qz4G5"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "2fc766ab-968e-48a0-a269-4b3cb9f83735", "DetectTime": "2024-05-21T12:44:43.345045+00:00", "EventTime": "2024-05-21T12:44:43.345069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIm1zH2rWotx5JI1"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "35a7d7b8-e53a-4d6a-b42d-834aa2e5d69f", "DetectTime": "2024-05-21T12:44:43.350886+00:00", "EventTime": "2024-05-21T12:44:43.350905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fbCP3WK1ZR86Nev6"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "f4f96872-02e5-4b05-a592-b856fed261f8", "DetectTime": "2024-05-21T12:44:43.356123+00:00", "EventTime": "2024-05-21T12:44:43.356142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUSkzW3IhhUTqqhPCg"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "4b6b967b-2a39-47ba-893c-a0dee757aaa3", "DetectTime": "2024-05-21T12:44:43.475242+00:00", "EventTime": "2024-05-21T12:44:43.475265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61K4Q1sXSz8T6kKD6"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "108c7b5a-e2c8-408e-9b99-f6b9746b5925", "DetectTime": "2024-05-21T12:44:43.481266+00:00", "EventTime": "2024-05-21T12:44:43.481285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzhzYl1DPQyLJJFN83"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "b3917355-7706-4343-8b6e-7f2f33c4a2f6", "DetectTime": "2024-05-21T12:44:43.493101+00:00", "EventTime": "2024-05-21T12:44:43.493120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdh0CB1PLxsukVkNQj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "9ffeb4db-644a-4bc3-8751-ed79791fa1f0", "DetectTime": "2024-05-21T12:44:43.520689+00:00", "EventTime": "2024-05-21T12:44:43.520709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-87-6-122-34.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGOkN2Xek3L9frEX9"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "36bdb55d-3a78-46e4-87f8-0960df6af87f", "DetectTime": "2024-05-21T12:44:43.532645+00:00", "EventTime": "2024-05-21T12:44:43.532664+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-87-6-122-34.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWGOkN2Xek3L9frEX9"], "accumulated_threat_level": 6.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "e134af6d-c3e5-4b01-9f09-0d132b599138", "DetectTime": "2024-05-21T12:44:43.559594+00:00", "EventTime": "2024-05-21T12:44:43.559612+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxej57c3EiRdqODo"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "5b063d4d-e4f6-416f-a005-eaf46b815b4b", "DetectTime": "2024-05-21T12:44:43.573792+00:00", "EventTime": "2024-05-21T12:44:43.573825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxej57c3EiRdqODo"], "accumulated_threat_level": 6.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "aeed395b-0e52-4a4d-86a8-a8dd36b57113", "DetectTime": "2024-05-21T12:44:43.599888+00:00", "EventTime": "2024-05-21T12:44:43.599907+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYz4grN0CL7l90Oi"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "292dec67-4c4e-4588-ba73-bfa5246af020", "DetectTime": "2024-05-21T12:44:43.614298+00:00", "EventTime": "2024-05-21T12:44:43.614324+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYz4grN0CL7l90Oi"], "accumulated_threat_level": 7.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "de4a62b1-f53d-4b17-9332-1458e1d66cf7", "DetectTime": "2024-05-21T12:44:43.726186+00:00", "EventTime": "2024-05-21T12:44:43.726205+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31Rdu3hmvviJdZ4ng"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "02e4414c-5e77-42ce-909f-5cdf0bf3f7ec", "DetectTime": "2024-05-21T12:44:43.739374+00:00", "EventTime": "2024-05-21T12:44:43.739397+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31Rdu3hmvviJdZ4ng"], "accumulated_threat_level": 7.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "c4349b02-4cbe-4f91-8a62-bef2763eddf6", "DetectTime": "2024-05-21T12:44:43.789941+00:00", "EventTime": "2024-05-21T12:44:43.789965+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZ8t1219uNboY2Jn7"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "d3b2201e-8310-4d89-8d00-d9fee15287a6", "DetectTime": "2024-05-21T12:44:43.805913+00:00", "EventTime": "2024-05-21T12:44:43.805940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdZ8t1219uNboY2Jn7"], "accumulated_threat_level": 8.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "44e2ae24-ce24-4369-9425-50ed346d4129", "DetectTime": "2024-05-21T12:44:43.833463+00:00", "EventTime": "2024-05-21T12:44:43.833487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH8h1R20eFsY8dBiTk"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "e47c206d-1641-4ac1-ad88-8b99346ff70f", "DetectTime": "2024-05-21T12:44:43.882858+00:00", "EventTime": "2024-05-21T12:44:43.882880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8B1MF2FfPqxk6NJb7"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "a46cc855-d272-49fd-9272-7a5c318495db", "DetectTime": "2024-05-21T12:44:43.963604+00:00", "EventTime": "2024-05-21T12:44:43.963632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEhgR8213R2Vjlgsk4"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "c3178f5e-2c59-426c-9be0-36052d52a547", "DetectTime": "2024-05-21T12:44:43.995105+00:00", "EventTime": "2024-05-21T12:44:43.995127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTwSY6Y9coiyFCud"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "6b693fb4-54c8-4221-a890-71e6a1f6ba69", "DetectTime": "2024-05-21T12:44:44.005389+00:00", "EventTime": "2024-05-21T12:44:44.005413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CejCJY1xpdmVJSHvm9"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "8a3af67f-d8e1-4ee6-a658-6a2d57e76cc0", "DetectTime": "2024-05-21T12:44:44.010553+00:00", "EventTime": "2024-05-21T12:44:44.010576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjDjY30gYXYgiU5Jh"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "1c7fca3d-c3fa-4e7c-83ef-78b2acbc0bfb", "DetectTime": "2024-05-21T12:44:44.025206+00:00", "EventTime": "2024-05-21T12:44:44.025234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreiQ01XmwvzA1eG5h"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "5ea5f88c-7bb0-4933-b4e9-ee184c2b2601", "DetectTime": "2024-05-21T12:44:44.060013+00:00", "EventTime": "2024-05-21T12:44:44.060033+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWUCo2WMcZfZAB9mi"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "2697a3e5-49dc-460f-8dd8-3a33c9e1c7a6", "DetectTime": "2024-05-21T12:44:44.065036+00:00", "EventTime": "2024-05-21T12:44:44.065054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxKU8C4op81LUbmYA4"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "bd284696-0acc-436f-b5d5-02a7d6eb5133", "DetectTime": "2024-05-21T12:44:44.079699+00:00", "EventTime": "2024-05-21T12:44:44.079727+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGWUCo2WMcZfZAB9mi"], "accumulated_threat_level": 8.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "f3b18cea-0a98-4cf0-8e85-09157e656b35", "DetectTime": "2024-05-21T12:44:44.102970+00:00", "EventTime": "2024-05-21T12:44:44.102991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJc9FC1cvDxapLg6Ih"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "10ecef93-84e3-4a9d-b0b7-e34100da6764", "DetectTime": "2024-05-21T12:44:44.115965+00:00", "EventTime": "2024-05-21T12:44:44.115986+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJc9FC1cvDxapLg6Ih"], "accumulated_threat_level": 9.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "cd92b3dc-913c-4fd1-bc71-66f73607fe39", "DetectTime": "2024-05-21T12:44:44.137902+00:00", "EventTime": "2024-05-21T12:44:44.137936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfpY1p2RuNaHf5HA4d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 136} +{"Format": "IDEA0", "ID": "3074402f-0850-45c5-a0e5-d1771d4bc711", "DetectTime": "2024-05-21T12:44:44.152426+00:00", "EventTime": "2024-05-21T12:44:44.152446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MgV325ZLkhHaJMJl"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "99e366aa-a331-4303-bcf2-e0c33c12b1eb", "DetectTime": "2024-05-21T12:44:44.166610+00:00", "EventTime": "2024-05-21T12:44:44.166630+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MgV325ZLkhHaJMJl"], "accumulated_threat_level": 9.5, "timewindow": 30} +{"Format": "IDEA0", "ID": "e0dc4dc0-aab4-4a4e-9a01-2bba7502c310", "DetectTime": "2024-05-21T12:44:44.187663+00:00", "EventTime": "2024-05-21T12:44:44.187687+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COmBlC4F6Ek77WpnWk"], "accumulated_threat_level": 0, "timewindow": 30} +{"Format": "IDEA0", "ID": "5e92e63d-9787-4283-81a8-ab1232912834", "DetectTime": "2024-05-21T12:44:44.202632+00:00", "EventTime": "2024-05-21T12:44:44.202663+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COmBlC4F6Ek77WpnWk"], "accumulated_threat_level": 10.0, "timewindow": 30} +{"Format": "IDEA0", "ID": "463b999c-f812-4356-aa21-ad3d16525202", "DetectTime": "2024-05-21T12:44:44.469168+00:00", "EventTime": "2024-05-21T12:44:44.469189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTUM3Hc54iKbIL1kc"], "accumulated_threat_level": 0.8, "timewindow": 134} +{"Format": "IDEA0", "ID": "9c309179-cff1-4373-a2fd-9239c12cb951", "DetectTime": "2024-05-21T12:44:44.527128+00:00", "EventTime": "2024-05-21T12:44:44.527152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiBkzd4Pj26ImBBKud"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "72930d90-d9da-441b-a6ba-82b876f3b8f4", "DetectTime": "2024-05-21T12:44:44.618745+00:00", "EventTime": "2024-05-21T12:44:44.618766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5BBXF34OYeT5cLZi7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "86056796-ac3d-40a0-861e-008fffcb6f4a", "DetectTime": "2024-05-21T12:44:44.718562+00:00", "EventTime": "2024-05-21T12:44:44.718582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRo481DwOnqaGqRKj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "b977adec-8de0-45c2-af51-7e4292c649cd", "DetectTime": "2024-05-21T12:44:44.725938+00:00", "EventTime": "2024-05-21T12:44:44.725957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHXIR3EmZEnWdf4e3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "93e3527e-3a1d-42e0-a488-bd1261172ec0", "DetectTime": "2024-05-21T12:44:44.790994+00:00", "EventTime": "2024-05-21T12:44:44.791016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnzlPO3MCttAD5Onw8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "8da0f793-5417-4d24-b00b-9b1e8357f8f9", "DetectTime": "2024-05-21T12:44:44.797255+00:00", "EventTime": "2024-05-21T12:44:44.797277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgTe534P0Vt8ai9z22"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "8919ef49-0084-4919-95cf-c99b6bf01b1b", "DetectTime": "2024-05-21T12:44:44.802551+00:00", "EventTime": "2024-05-21T12:44:44.802571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.254.66.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51lwb1GRGyD65h774"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "00a5faae-4843-47d5-8d55-011bf30a0601", "DetectTime": "2024-05-21T12:44:44.807113+00:00", "EventTime": "2024-05-21T12:44:44.807132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.103.236.242 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cafw7RZL9luergfEh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "24ec3d6f-527f-480d-8fd9-ed010fe7f585", "DetectTime": "2024-05-21T12:44:44.839759+00:00", "EventTime": "2024-05-21T12:44:44.839779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pG3s1OKqCkGIhoPl"], "accumulated_threat_level": 9.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "58db7c51-2006-4cfb-8a22-9f9cbc3e8086", "DetectTime": "2024-05-21T12:44:44.849584+00:00", "EventTime": "2024-05-21T12:44:44.849604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04Tf32QdECOEafsd7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "ebbefca4-317e-4a97-b570-efc5a0489b69", "DetectTime": "2024-05-21T12:44:45.168167+00:00", "EventTime": "2024-05-21T12:44:45.168189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHYb021qkRvieKAFa8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "e70ba81d-962b-4bf8-9ce2-3ba2032840bf", "DetectTime": "2024-05-21T12:44:45.190045+00:00", "EventTime": "2024-05-21T12:44:45.190065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40hf628LoBkwTvmu8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "8e73d73f-553a-48f7-b04f-3e4989aecf32", "DetectTime": "2024-05-21T12:44:45.216993+00:00", "EventTime": "2024-05-21T12:44:45.217016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 123.237.162.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawFED2t3OrR4O6w1i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "7a12e276-41e9-42ac-ab62-bcb6e19e3fa2", "DetectTime": "2024-05-21T12:44:45.628363+00:00", "EventTime": "2024-05-21T12:44:45.628385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdXGL72ZHpo3MV0jod"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "ae8f74de-45e3-4e3d-94bd-87ce57f00913", "DetectTime": "2024-05-21T12:44:45.737835+00:00", "EventTime": "2024-05-21T12:44:45.737856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRB1bG23HdcUc0SFU"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "2d3f4237-a20b-46cc-adea-8c8cb2f15207", "DetectTime": "2024-05-21T12:44:45.751096+00:00", "EventTime": "2024-05-21T12:44:45.751118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXIWal3I7Xs2DhBA61"], "accumulated_threat_level": 10.4, "timewindow": 136} +{"Format": "IDEA0", "ID": "bbaea584-8d67-4c9b-a9aa-81a2e6973be7", "DetectTime": "2024-05-21T12:44:45.757697+00:00", "EventTime": "2024-05-21T12:44:45.757716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgniCzJGkrx1eYNGh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "389e826c-4d73-4676-87cd-ffd85823f174", "DetectTime": "2024-05-21T12:44:45.762376+00:00", "EventTime": "2024-05-21T12:44:45.762395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C60v0z2yMnc1tZnXui"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "3b2e649a-fa0b-47dd-ac76-a7bc272c88b1", "DetectTime": "2024-05-21T12:44:45.767675+00:00", "EventTime": "2024-05-21T12:44:45.767693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSWdDXojVN1FRi8a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "f1c7e5a4-d420-4d57-89af-614985ed6444", "DetectTime": "2024-05-21T12:44:45.772285+00:00", "EventTime": "2024-05-21T12:44:45.772303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvFnI14CS82hZvbza3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "b5f6d457-4b92-4fb7-bafa-1295f92e6929", "DetectTime": "2024-05-21T12:44:45.825348+00:00", "EventTime": "2024-05-21T12:44:45.825368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LZ1X3m1JfgrLCprf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "fd0fc42a-af8b-4e50-bd92-a939e8777ea2", "DetectTime": "2024-05-21T12:44:45.864377+00:00", "EventTime": "2024-05-21T12:44:45.864401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWgqq1KC2iTEAcQo6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "9ebd00cf-3747-4e43-93df-c1200bf52b37", "DetectTime": "2024-05-21T12:44:45.878620+00:00", "EventTime": "2024-05-21T12:44:45.878637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2TquM28H01uPNzIS7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "8394be86-7ab3-4090-b9f1-cf4f5760d46f", "DetectTime": "2024-05-21T12:44:45.897449+00:00", "EventTime": "2024-05-21T12:44:45.897470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthEEL2A3vLsMT9LRb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "2a306559-2b45-47b8-9096-7d3cfa5d82a7", "DetectTime": "2024-05-21T12:44:45.903057+00:00", "EventTime": "2024-05-21T12:44:45.903081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtO1C83YhC7MlAToki"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "8f6cef11-6467-4cf4-82c7-7be1fa8a261c", "DetectTime": "2024-05-21T12:44:46.309351+00:00", "EventTime": "2024-05-21T12:44:46.309370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbCBvn1e9wHSdY9Eaj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "d07ab3f0-adec-4c0b-9301-dc1d7d904dde", "DetectTime": "2024-05-21T12:44:46.632100+00:00", "EventTime": "2024-05-21T12:44:46.632123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3mUQQ3QmNmwwboDH4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "261c1178-cfff-4cf7-adb0-e3b66ba48947", "DetectTime": "2024-05-21T12:44:46.678423+00:00", "EventTime": "2024-05-21T12:44:46.678447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWGRL2tLQErAqe0O4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "87a0ee05-732f-44de-85d1-8662e04810f1", "DetectTime": "2024-05-21T12:44:46.690606+00:00", "EventTime": "2024-05-21T12:44:46.690627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJXzk3kAxJXpVJakj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 136} +{"Format": "IDEA0", "ID": "73b9fe00-fe57-40de-b1a3-8c8b7f6df4af", "DetectTime": "2024-05-21T12:44:46.695998+00:00", "EventTime": "2024-05-21T12:44:46.696020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgEFRl2ToZQZjbxJx3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "67e0390c-3eb8-430d-90e4-44e3d4c22eb9", "DetectTime": "2024-05-21T12:44:46.710145+00:00", "EventTime": "2024-05-21T12:44:46.710165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChEE2h4S2LlCaPy4ck"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "c909d247-99e6-44b5-aff9-55e44e8cfcd6", "DetectTime": "2024-05-21T12:44:46.723925+00:00", "EventTime": "2024-05-21T12:44:46.723947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKHHvc3A7In82Smia1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "39a9ad36-d63a-4bf6-b9b1-64902d7f1d55", "DetectTime": "2024-05-21T12:44:46.728629+00:00", "EventTime": "2024-05-21T12:44:46.728648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEh5JT3GnQWAuE01O1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "f5dc1f40-df2a-438d-8e43-e6c38ea9a477", "DetectTime": "2024-05-21T12:44:46.733326+00:00", "EventTime": "2024-05-21T12:44:46.733345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnmmYe1gEfmrsDQPmg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "44f30fc7-dc43-493d-9b53-21bc7f6f8572", "DetectTime": "2024-05-21T12:44:46.788285+00:00", "EventTime": "2024-05-21T12:44:46.788305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgrfgL2Wyz1Uk3LXj8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "36fd252b-ee2d-40d6-8ccd-cbcc899f5da3", "DetectTime": "2024-05-21T12:44:46.795721+00:00", "EventTime": "2024-05-21T12:44:46.795741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CozPNJip1CVuPGwm2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "9124c267-7c8e-4431-b432-428e6c5890ff", "DetectTime": "2024-05-21T12:44:46.800568+00:00", "EventTime": "2024-05-21T12:44:46.800587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBXr432AN4doKiJW4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "b1d105b2-7c63-4d73-b7c5-d3e46ee40d4e", "DetectTime": "2024-05-21T12:44:47.349210+00:00", "EventTime": "2024-05-21T12:44:47.349230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9An48O05KrusqQNe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "6a02118b-09c2-4142-ae66-1f6bcd6f0d6e", "DetectTime": "2024-05-21T12:44:47.358558+00:00", "EventTime": "2024-05-21T12:44:47.358577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBLt53y3sdWTqf6mj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "9eb28189-2a09-4646-904c-f1996e0e1d46", "DetectTime": "2024-05-21T12:44:47.369979+00:00", "EventTime": "2024-05-21T12:44:47.369999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzM9yXOfnn217yZcd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 136} +{"Format": "Json", "ID": "9eb28189-2a09-4646-904c-f1996e0e1d46", "DetectTime": "2024-05-21T12:44:47.369979+00:00", "EventTime": "2024-05-21T12:44:47.369999+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-06T15:33:43.279114+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 136. (real time 2024/05/21 12:44:47.599688)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 136, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "935c11dc-0241-4d33-971f-0cfd3d416b74", "DetectTime": "2024-05-21T12:44:47.603347+00:00", "EventTime": "2024-05-21T12:44:47.603364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvJkN3DHM429duGGf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "1d809a81-b40b-4be7-9e5b-57e33b6416ad", "DetectTime": "2024-05-21T12:44:47.608245+00:00", "EventTime": "2024-05-21T12:44:47.608263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKY4Ro3XjXtvvuX6ig"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "f830ec6f-5f0d-4691-970c-a8a65245a94c", "DetectTime": "2024-05-21T12:44:47.612617+00:00", "EventTime": "2024-05-21T12:44:47.612635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRTsx2aGV4k0hclA6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "931e9789-cb49-4ec5-a46b-64533b1d6894", "DetectTime": "2024-05-21T12:44:47.616988+00:00", "EventTime": "2024-05-21T12:44:47.617006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Nl7g4ygbZOXNB6U9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "b2d3e535-8ce3-44ed-be4f-25e1d3906da4", "DetectTime": "2024-05-21T12:44:47.621380+00:00", "EventTime": "2024-05-21T12:44:47.621397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cisl3X2oajw0Dv80c9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "61aa4a45-fbb0-48e2-9c0c-69f17200f51c", "DetectTime": "2024-05-21T12:44:47.686050+00:00", "EventTime": "2024-05-21T12:44:47.686075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9nBc4Rj7jPgzRQjk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "50e38ebf-8a16-4743-ba40-6348b1405f3c", "DetectTime": "2024-05-21T12:44:48.001464+00:00", "EventTime": "2024-05-21T12:44:48.001487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDlbDiNq4VkoMJ4el"], "accumulated_threat_level": 0, "timewindow": 136} +{"Format": "IDEA0", "ID": "fd75b953-5905-42a7-8ffc-483f3f9b0563", "DetectTime": "2024-05-21T12:44:48.044182+00:00", "EventTime": "2024-05-21T12:44:48.044212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CinhF94iexoZMiFRN4"], "accumulated_threat_level": 0, "timewindow": 136} +{"Format": "IDEA0", "ID": "7b9f9820-530f-404e-b788-5dfd3e99bf5c", "DetectTime": "2024-05-21T12:44:48.050149+00:00", "EventTime": "2024-05-21T12:44:48.050168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JLuN2b8F77vkkhB6"], "accumulated_threat_level": 0, "timewindow": 136} +{"Format": "IDEA0", "ID": "dfac9175-be48-4185-a34b-b57e2940dcb3", "DetectTime": "2024-05-21T12:44:48.061522+00:00", "EventTime": "2024-05-21T12:44:48.061541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5Z9G2hstFBOdSy7c"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "4b08cbab-2cd6-4d9e-b8e8-fdcad7507621", "DetectTime": "2024-05-21T12:44:48.066308+00:00", "EventTime": "2024-05-21T12:44:48.066327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKBwi423qNO9g6D9D3"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "16fb11b0-de84-42ad-9254-8ae62f1fa6dc", "DetectTime": "2024-05-21T12:44:48.072041+00:00", "EventTime": "2024-05-21T12:44:48.072065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdhHa73Rzgf3gnoEX2"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "9d730ca6-b0d6-4d8a-a469-d6d15abd1919", "DetectTime": "2024-05-21T12:44:48.317888+00:00", "EventTime": "2024-05-21T12:44:48.317909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7SKI1RiOPzDlqLx"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "b5c6d580-6410-435d-b633-5a8704c1bfdc", "DetectTime": "2024-05-21T12:44:48.355166+00:00", "EventTime": "2024-05-21T12:44:48.355185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa9sR13BSDGLN3bUi"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "fa6e42d0-0680-4ada-8d6c-5f831a050213", "DetectTime": "2024-05-21T12:44:48.360137+00:00", "EventTime": "2024-05-21T12:44:48.360155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cciqt3pG8WlqzLsa7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 135} +{"Format": "IDEA0", "ID": "f8a09294-6f21-401c-8267-2edd22a9fd24", "DetectTime": "2024-05-21T12:44:48.869818+00:00", "EventTime": "2024-05-21T12:44:48.869839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CemNXP112nOdDpoe5j"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "bf536a05-1de2-4bae-aefe-9e7598278e7d", "DetectTime": "2024-05-21T12:44:48.879082+00:00", "EventTime": "2024-05-21T12:44:48.879105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COd74GCcSof9YeO8g"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "a6ed206e-cdc0-4ee6-82ee-8f1b61ee919f", "DetectTime": "2024-05-21T12:44:48.884421+00:00", "EventTime": "2024-05-21T12:44:48.884442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7gybQ2Z4S9Bvb9l71"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "5a024ce6-14b0-46b2-8c1e-8512016223ce", "DetectTime": "2024-05-21T12:44:48.896601+00:00", "EventTime": "2024-05-21T12:44:48.896625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzLOfXxJ5AQEowtH4"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "c64ca2b2-4ca4-4bef-b070-e894905bb682", "DetectTime": "2024-05-21T12:44:48.902208+00:00", "EventTime": "2024-05-21T12:44:48.902227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwD0f3de7whnHjhPf"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "cc19aafe-0ceb-427d-868a-3cafebec0b37", "DetectTime": "2024-05-21T12:44:48.935231+00:00", "EventTime": "2024-05-21T12:44:48.935252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC3W3d38OUBnFgRPP3"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "04b392a4-23a1-4d1b-8661-c2163944c26a", "DetectTime": "2024-05-21T12:44:48.940372+00:00", "EventTime": "2024-05-21T12:44:48.940390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwbHYR5iEviQlESdd"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "9f966406-712b-42ed-a893-8f7f0e6d4e13", "DetectTime": "2024-05-21T12:44:49.066613+00:00", "EventTime": "2024-05-21T12:44:49.066635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQklNP3KwWnoPtUgri"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "b00f7170-6fec-49d6-b79c-5337e6be93f9", "DetectTime": "2024-05-21T12:44:49.082038+00:00", "EventTime": "2024-05-21T12:44:49.082059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COJOgb1j4I0zRWnQt7"], "accumulated_threat_level": 0.8, "timewindow": 136} +{"Format": "IDEA0", "ID": "bd16fddc-7fe6-451f-87c6-267032842958", "DetectTime": "2024-05-21T12:44:49.094182+00:00", "EventTime": "2024-05-21T12:44:49.094201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfjMmX39ADwU0jEdj"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "aa5de769-3cbe-4e97-8868-d8a71c64b140", "DetectTime": "2024-05-21T12:44:49.099569+00:00", "EventTime": "2024-05-21T12:44:49.099590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTbdoy3SHvNjcfJ1yd"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "845899d5-3616-4d32-a7fd-aa6f0b5a85e4", "DetectTime": "2024-05-21T12:44:49.481937+00:00", "EventTime": "2024-05-21T12:44:49.481959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyKEVw4EayUS9suer4"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "08f115a5-a7b1-4243-90bb-24699ee04536", "DetectTime": "2024-05-21T12:44:49.547341+00:00", "EventTime": "2024-05-21T12:44:49.547363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD923nIpGnsz9zope"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "7c753466-a45b-4502-b7a3-188e42b163a9", "DetectTime": "2024-05-21T12:44:49.552768+00:00", "EventTime": "2024-05-21T12:44:49.552787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Z51k4LTU0bko4L2i"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "6392a3b6-3208-48c4-beeb-c9fac6116089", "DetectTime": "2024-05-21T12:44:49.607853+00:00", "EventTime": "2024-05-21T12:44:49.607874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqz354UpnQGP64nbk"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "f8d05eae-9e29-43e4-9cff-67f7e2f3f331", "DetectTime": "2024-05-21T12:44:49.834460+00:00", "EventTime": "2024-05-21T12:44:49.834482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU6TGq22W3jY0MAH5h"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "6c175826-68ea-49de-a10e-5d4dcc01b146", "DetectTime": "2024-05-21T12:44:49.844365+00:00", "EventTime": "2024-05-21T12:44:49.844385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJQWL3rseVqjMpc4"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "94480afb-53b9-4fb7-85bf-be3c15fbb874", "DetectTime": "2024-05-21T12:44:49.873211+00:00", "EventTime": "2024-05-21T12:44:49.873233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2NaiY3MCYDbOBeRyk"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "749f78e1-36d4-4f7e-a43c-59dbab7edf6b", "DetectTime": "2024-05-21T12:44:50.004000+00:00", "EventTime": "2024-05-21T12:44:50.004021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT4HX23uGPDsVne5rh"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "52eebab3-8e64-41b7-af50-d00f1855ee7c", "DetectTime": "2024-05-21T12:44:50.064443+00:00", "EventTime": "2024-05-21T12:44:50.064463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHSZTR1hpzpouyuhCa"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "bfa6198a-566e-45e1-917e-9bf53f024365", "DetectTime": "2024-05-21T12:44:50.093692+00:00", "EventTime": "2024-05-21T12:44:50.093715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSg90M1uEca1dNq3pj"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "0dc99ad9-451a-4c25-ade4-e5db73944a67", "DetectTime": "2024-05-21T12:44:50.104436+00:00", "EventTime": "2024-05-21T12:44:50.104456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CinjUb35i1ejJITZ5b"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "3e4e3279-4171-4791-b89c-ed75cc7fabf8", "DetectTime": "2024-05-21T12:44:50.109524+00:00", "EventTime": "2024-05-21T12:44:50.109544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdMRlB1VXUEXdTsc1f"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "61127633-e008-44c1-acd4-2b7a1805ef98", "DetectTime": "2024-05-21T12:44:50.340425+00:00", "EventTime": "2024-05-21T12:44:50.340447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmAXoV3inrDmntOca9"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "33e2f52d-ba97-4aa5-8a3a-b5f407217584", "DetectTime": "2024-05-21T12:44:50.368976+00:00", "EventTime": "2024-05-21T12:44:50.368997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1XLxa4ynZNgkl3qf9"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "9a69904f-0ec5-4b1b-a3d4-2f13a2fc9e93", "DetectTime": "2024-05-21T12:44:50.602471+00:00", "EventTime": "2024-05-21T12:44:50.602493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0SmT33RK4FNTaOh8"], "accumulated_threat_level": 1.6, "timewindow": 136} +{"Format": "IDEA0", "ID": "d56a16c8-40d1-447c-a406-d24284b0c912", "DetectTime": "2024-05-21T12:44:50.616940+00:00", "EventTime": "2024-05-21T12:44:50.616959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzIj3W2qTqvv4HsQ4e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "f14d48a9-8e16-4f92-bab3-7b4ec5f674c5", "DetectTime": "2024-05-21T12:44:50.630569+00:00", "EventTime": "2024-05-21T12:44:50.630590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2fuP2LyIHOFc0vYa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "dc6cf72d-dddf-4e15-a0c4-ca19c1123923", "DetectTime": "2024-05-21T12:44:50.636382+00:00", "EventTime": "2024-05-21T12:44:50.636405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEIkBOe2U0sVGL9l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "78e9192f-c0e7-4724-af9f-9879f9626437", "DetectTime": "2024-05-21T12:44:50.672238+00:00", "EventTime": "2024-05-21T12:44:50.672259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6OXmM1AMDd0dditJj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "ec23e4e7-9646-4b3c-a8ae-b775ad67b874", "DetectTime": "2024-05-21T12:44:51.039934+00:00", "EventTime": "2024-05-21T12:44:51.039957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyPdvC2gLYipZ9rEVj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "738bbcaa-3abc-490f-86f8-48e9cc5d0a0e", "DetectTime": "2024-05-21T12:44:51.102723+00:00", "EventTime": "2024-05-21T12:44:51.102744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb7WP3GxvGwsNZc7f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "97baef2e-72d2-4d89-a238-82a6803592b3", "DetectTime": "2024-05-21T12:44:51.151996+00:00", "EventTime": "2024-05-21T12:44:51.152019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVXtMC3StU1oY639i3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "1288ce86-73de-44bc-aafe-73038f7218e9", "DetectTime": "2024-05-21T12:44:51.157804+00:00", "EventTime": "2024-05-21T12:44:51.157829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbiP1bCYzbj0MJD6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "9ad41b94-63d1-4f75-bc48-0c58e3ef7b01", "DetectTime": "2024-05-21T12:44:51.162785+00:00", "EventTime": "2024-05-21T12:44:51.162803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpg59g27ygsWsK93"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "7e3e45dd-c487-4122-8edc-900b9f07d3df", "DetectTime": "2024-05-21T12:44:51.193453+00:00", "EventTime": "2024-05-21T12:44:51.193479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCh6n1PRn42a4g8dj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "4d11caeb-6724-4e8a-8895-37047f448635", "DetectTime": "2024-05-21T12:44:51.226656+00:00", "EventTime": "2024-05-21T12:44:51.226679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktkGl3JgjshXRJtbk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "8122c703-738f-4746-9e00-f7fb8c0039d7", "DetectTime": "2024-05-21T12:44:51.568084+00:00", "EventTime": "2024-05-21T12:44:51.568105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQBrBj3JkM4MTscsIg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "575067b2-983a-45cb-9b64-d6c33865a1fc", "DetectTime": "2024-05-21T12:44:51.670203+00:00", "EventTime": "2024-05-21T12:44:51.670221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFOHpl3aIEE6CzSxSf"], "accumulated_threat_level": 1.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "ad2431e8-8805-43ac-b33f-be2709f84497", "DetectTime": "2024-05-21T12:44:51.720016+00:00", "EventTime": "2024-05-21T12:44:51.720038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthMH22gJjlv0khmJe"], "accumulated_threat_level": 2.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "ae3f5235-b682-4c93-ba6c-fe0f5005bfa9", "DetectTime": "2024-05-21T12:44:51.768589+00:00", "EventTime": "2024-05-21T12:44:51.768608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKtiJ3GTau6qDqQC2"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 137} +{"Format": "IDEA0", "ID": "b0f4abd5-b083-4a50-81a4-598228ebd2ae", "DetectTime": "2024-05-21T12:44:51.815273+00:00", "EventTime": "2024-05-21T12:44:51.815291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbxJp2OHTydTXX5X5"], "accumulated_threat_level": 4.2, "timewindow": 137} +{"Format": "IDEA0", "ID": "992ce66f-e884-42c4-a2d9-243515d5429d", "DetectTime": "2024-05-21T12:44:51.867012+00:00", "EventTime": "2024-05-21T12:44:51.867031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDkxW2O3unP4y4pyb"], "accumulated_threat_level": 5.0, "timewindow": 137} +{"Format": "IDEA0", "ID": "d366c24a-bfb0-418c-b39d-81abbd907860", "DetectTime": "2024-05-21T12:44:51.904376+00:00", "EventTime": "2024-05-21T12:44:51.904398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcVr12kSotpHUN7zl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "00f4e8f9-efd6-4633-92b7-b76e59844e04", "DetectTime": "2024-05-21T12:44:52.173673+00:00", "EventTime": "2024-05-21T12:44:52.173699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCi3uw4scjrmtOc2Bk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "0a3f7fdf-6f0a-4fd1-8998-33bce6c6fc3f", "DetectTime": "2024-05-21T12:44:52.213138+00:00", "EventTime": "2024-05-21T12:44:52.213157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDM9te2ddlMz7PXbd"], "accumulated_threat_level": 5.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "06e70781-0909-4669-9056-4ce529ef9c11", "DetectTime": "2024-05-21T12:44:52.271163+00:00", "EventTime": "2024-05-21T12:44:52.271180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqZrm2QRicp8vwQR9"], "accumulated_threat_level": 6.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "cea892ec-3aa0-4276-838b-cd11d56f27ec", "DetectTime": "2024-05-21T12:44:52.321025+00:00", "EventTime": "2024-05-21T12:44:52.321048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPijyj1o5bbU1yAMjl"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 137} +{"Format": "IDEA0", "ID": "28df22b4-1b91-4d12-908a-0b3fd00b0c06", "DetectTime": "2024-05-21T12:44:52.368956+00:00", "EventTime": "2024-05-21T12:44:52.368977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlGJz4YjHqKoeGgdc"], "accumulated_threat_level": 8.2, "timewindow": 137} +{"Format": "IDEA0", "ID": "d3fa22e2-f2f1-4e1e-80a0-feadf0d8122a", "DetectTime": "2024-05-21T12:44:52.416444+00:00", "EventTime": "2024-05-21T12:44:52.416463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccpxro3aWmHLi6ruUi"], "accumulated_threat_level": 9.0, "timewindow": 137} +{"Format": "IDEA0", "ID": "c382b1bf-acc1-42bb-a3dd-ff24948e6507", "DetectTime": "2024-05-21T12:44:52.466128+00:00", "EventTime": "2024-05-21T12:44:52.466150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIejS2SRsrOt3AR8i"], "accumulated_threat_level": 9.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "8edc372b-af0e-4312-8059-3980ed2a7138", "DetectTime": "2024-05-21T12:44:52.517648+00:00", "EventTime": "2024-05-21T12:44:52.517668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvWaC2sGIB0zLqOl6"], "accumulated_threat_level": 10.600000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "70b3418c-d60f-4244-9689-c334db9f60c2", "DetectTime": "2024-05-21T12:44:52.792925+00:00", "EventTime": "2024-05-21T12:44:52.792947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbktb3udy1PXCdcdi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "73853fea-f345-41af-90d1-a16fa3e031f2", "DetectTime": "2024-05-21T12:44:52.835289+00:00", "EventTime": "2024-05-21T12:44:52.835310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdA1Z34lm6aQFkTd7"], "accumulated_threat_level": 11.400000000000002, "timewindow": 137} +{"Format": "IDEA0", "ID": "92837168-b191-48e2-937f-867608ae323b", "DetectTime": "2024-05-21T12:44:52.882047+00:00", "EventTime": "2024-05-21T12:44:52.882065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtXKbxAk41Futxel"], "accumulated_threat_level": 12.200000000000003, "timewindow": 137} +{"Format": "Json", "ID": "92837168-b191-48e2-937f-867608ae323b", "DetectTime": "2024-05-21T12:44:52.882047+00:00", "EventTime": "2024-05-21T12:44:52.882065+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "1970-01-06T16:04:45.798420+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2024/05/21 12:44:53.375302)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 137, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "89ff8910-f787-45e5-aad1-06597e0bbb2a", "DetectTime": "2024-05-21T12:44:53.388407+00:00", "EventTime": "2024-05-21T12:44:53.388429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYeAU713XIruu7yH8"], "accumulated_threat_level": 0.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "ba72b671-f3f4-4139-8227-e146ca68645b", "DetectTime": "2024-05-21T12:44:53.400538+00:00", "EventTime": "2024-05-21T12:44:53.400556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["216.38.35.229"]}], "Attach": [{"Content": "Connection to unknown destination port 2990/UDP destination IP 216.38.35.229. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iOxW2gmyvc52QFHk"], "accumulated_threat_level": 1.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "44514eb9-3d83-43c7-aca2-a5037b081386", "DetectTime": "2024-05-21T12:44:53.411283+00:00", "EventTime": "2024-05-21T12:44:53.411301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zvT74j8JVKNq7KXc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 137} +{"Format": "IDEA0", "ID": "c1c4b54b-2e8f-4be3-bfab-1de3eee9fc1e", "DetectTime": "2024-05-21T12:44:53.421726+00:00", "EventTime": "2024-05-21T12:44:53.421744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTVXW3YYJljhMoCJh"], "accumulated_threat_level": 3.2, "timewindow": 137} +{"Format": "IDEA0", "ID": "5c8c612e-ea41-4d8e-b54b-bc77d6a41f7e", "DetectTime": "2024-05-21T12:44:53.432012+00:00", "EventTime": "2024-05-21T12:44:53.432030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcApoc4HWx6BsdYtgl"], "accumulated_threat_level": 4.0, "timewindow": 137} +{"Format": "IDEA0", "ID": "93dbde10-7820-42a1-8c29-53fb235fe87a", "DetectTime": "2024-05-21T12:44:53.436598+00:00", "EventTime": "2024-05-21T12:44:53.436616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQnERI2zrWgxmJgz3a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "f8c3c5a5-9315-4144-ab31-71a06097892b", "DetectTime": "2024-05-21T12:44:53.451471+00:00", "EventTime": "2024-05-21T12:44:53.451491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZaEgO1OEhPL0LTwuh"], "accumulated_threat_level": 4.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "867bcd1e-caf8-4067-a38d-4ab10316e159", "DetectTime": "2024-05-21T12:44:53.495092+00:00", "EventTime": "2024-05-21T12:44:53.495121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWMOZC2q1VEBWXnBlc"], "accumulated_threat_level": 5.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "2579d8e3-c63b-4c8c-bd57-ce8ffd5eabaf", "DetectTime": "2024-05-21T12:44:53.572088+00:00", "EventTime": "2024-05-21T12:44:53.572117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPbv97nfxlfE8TCh3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 137} +{"Format": "IDEA0", "ID": "f2f0aca4-6224-439c-b188-ce6a94f4674d", "DetectTime": "2024-05-21T12:44:53.585265+00:00", "EventTime": "2024-05-21T12:44:53.585292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZWYr3qBrrbuHqB4b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "fa561f5e-8944-48c0-bab5-8439ced04882", "DetectTime": "2024-05-21T12:44:53.633911+00:00", "EventTime": "2024-05-21T12:44:53.633944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOVXv3SZEHHgC7MPe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "1fe62ee4-eb97-480d-8fdf-47c0f5732838", "DetectTime": "2024-05-21T12:44:53.682344+00:00", "EventTime": "2024-05-21T12:44:53.682378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKPXHEAFMpJopt5Ub"], "accumulated_threat_level": 8.799999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "9e91e71d-8639-486b-82b6-1da62470e203", "DetectTime": "2024-05-21T12:44:54.021800+00:00", "EventTime": "2024-05-21T12:44:54.021822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ52vV2BP5QgtkA9md"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "1f02dfce-cd34-440c-8e63-7d70e4f7ca83", "DetectTime": "2024-05-21T12:44:54.064011+00:00", "EventTime": "2024-05-21T12:44:54.064035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCbf4N2ezpTJ61I05c"], "accumulated_threat_level": 9.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "cf4b8cd2-4811-4a2f-8c12-d34653283812", "DetectTime": "2024-05-21T12:44:54.109430+00:00", "EventTime": "2024-05-21T12:44:54.109448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cczp01YZoOTtApcwl"], "accumulated_threat_level": 10.4, "timewindow": 137} +{"Format": "IDEA0", "ID": "c2f9396f-b4c4-49f7-9e91-3b9e1ab29c7a", "DetectTime": "2024-05-21T12:44:54.154938+00:00", "EventTime": "2024-05-21T12:44:54.154961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLJ49sn37gyVXwS2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "417efcf9-8aca-4a52-86db-46225ed40440", "DetectTime": "2024-05-21T12:44:54.200227+00:00", "EventTime": "2024-05-21T12:44:54.200246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5YB21QTqD6ik7oU2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 137} +{"Format": "Json", "ID": "417efcf9-8aca-4a52-86db-46225ed40440", "DetectTime": "2024-05-21T12:44:54.200227+00:00", "EventTime": "2024-05-21T12:44:54.200246+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-06T16:04:49.919550+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2024/05/21 12:44:54.365482)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 137, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2c4f1655-c803-4fee-aa2d-63b9d7054a2d", "DetectTime": "2024-05-21T12:44:54.376461+00:00", "EventTime": "2024-05-21T12:44:54.376480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CskhVB4m6iyftpqVi5"], "accumulated_threat_level": 0.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "0da7524c-f1b4-404f-bd1a-b92a197ef516", "DetectTime": "2024-05-21T12:44:54.381492+00:00", "EventTime": "2024-05-21T12:44:54.381510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzneSe4QzWotnfmhE3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "5895987a-a204-4146-9d6a-f1e357210e02", "DetectTime": "2024-05-21T12:44:54.518583+00:00", "EventTime": "2024-05-21T12:44:54.518601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4B1gO2djusLe0CMM4"], "accumulated_threat_level": 1.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "70b16772-3670-4091-b936-464ea9ac9c25", "DetectTime": "2024-05-21T12:44:54.563361+00:00", "EventTime": "2024-05-21T12:44:54.563381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxourbyWgvjGZNCV8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 137} +{"Format": "IDEA0", "ID": "4c12a8b9-1f93-41f5-b6d6-8b6c9dc8b24b", "DetectTime": "2024-05-21T12:44:54.828106+00:00", "EventTime": "2024-05-21T12:44:54.828127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0LC439IsIx77LH1f"], "accumulated_threat_level": 3.2, "timewindow": 137} +{"Format": "IDEA0", "ID": "19181152-d409-482d-bcdc-06da8abf35ad", "DetectTime": "2024-05-21T12:44:54.866625+00:00", "EventTime": "2024-05-21T12:44:54.866645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvac32HxrT9H1iv2k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "a96454b4-7cf0-4b79-bc35-920399977ab8", "DetectTime": "2024-05-21T12:44:54.910982+00:00", "EventTime": "2024-05-21T12:44:54.911001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwVmx2jTa2RpDdkH6"], "accumulated_threat_level": 4.0, "timewindow": 137} +{"Format": "IDEA0", "ID": "601e7adf-fc4d-4d8e-a0e2-70d5c0104c40", "DetectTime": "2024-05-21T12:44:54.960393+00:00", "EventTime": "2024-05-21T12:44:54.960413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clsobm3jFublWLO7o5"], "accumulated_threat_level": 4.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "2c61e331-ea1c-403f-b53c-61c23915adac", "DetectTime": "2024-05-21T12:44:55.017029+00:00", "EventTime": "2024-05-21T12:44:55.017047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvwkj6xct1k5xeOi"], "accumulated_threat_level": 5.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "2852f52e-e493-4c2a-9a51-bf4f66cddafb", "DetectTime": "2024-05-21T12:44:55.060151+00:00", "EventTime": "2024-05-21T12:44:55.060172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCatfb1PKeqOThUEOj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 137} +{"Format": "IDEA0", "ID": "4ee6d4e3-6ce2-4c03-83ef-b098f2e393e7", "DetectTime": "2024-05-21T12:44:55.115849+00:00", "EventTime": "2024-05-21T12:44:55.115879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeG7GJYykGSeDFAV9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "9eb7517e-ca2e-4d2a-95e7-917df648d88f", "DetectTime": "2024-05-21T12:44:55.362826+00:00", "EventTime": "2024-05-21T12:44:55.362849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRisPv7RyWLuByHwc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "2cc171b3-b29c-4971-ae42-f578f38b8b76", "DetectTime": "2024-05-21T12:44:55.446184+00:00", "EventTime": "2024-05-21T12:44:55.446204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBBdRd1cLwSiYUqOg6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "d97709af-3a93-4a0c-b0bd-54ca4895fe5a", "DetectTime": "2024-05-21T12:44:55.492473+00:00", "EventTime": "2024-05-21T12:44:55.492493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chqb0b177bJorijS49"], "accumulated_threat_level": 8.799999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "2cfb5582-9846-42f6-81ba-d0325ab56edc", "DetectTime": "2024-05-21T12:44:55.540661+00:00", "EventTime": "2024-05-21T12:44:55.540681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnRbN22ymeWub0Ye3"], "accumulated_threat_level": 9.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "faccc03e-f5a8-48ad-99ea-4e5a339f0cdb", "DetectTime": "2024-05-21T12:44:55.585996+00:00", "EventTime": "2024-05-21T12:44:55.586015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jFw2L0TqF93r0Vk"], "accumulated_threat_level": 10.4, "timewindow": 137} +{"Format": "IDEA0", "ID": "fea00bb5-4800-43d8-a062-2a4a85463a96", "DetectTime": "2024-05-21T12:44:55.634826+00:00", "EventTime": "2024-05-21T12:44:55.634848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDUEE4DUyINeEoduj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "5f12ce7f-ff60-4287-b646-e740e1fa31ab", "DetectTime": "2024-05-21T12:44:55.672289+00:00", "EventTime": "2024-05-21T12:44:55.672309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pkh74oEth4cZHvCf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "cdaf0d79-c34f-421c-86a7-dafcf6bebb06", "DetectTime": "2024-05-21T12:44:55.898354+00:00", "EventTime": "2024-05-21T12:44:55.898374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cob4pj49jyee4AN1l3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 137} +{"Format": "Json", "ID": "cdaf0d79-c34f-421c-86a7-dafcf6bebb06", "DetectTime": "2024-05-21T12:44:55.898354+00:00", "EventTime": "2024-05-21T12:44:55.898374+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-06T16:35:50.199251+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 137. (real time 2024/05/21 12:44:56.089674)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 137, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "95fd3982-069a-4448-86b9-c40101e07c0c", "DetectTime": "2024-05-21T12:44:56.099997+00:00", "EventTime": "2024-05-21T12:44:56.100016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJNAJeHJhzgXbyS8"], "accumulated_threat_level": 0.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "d742a153-93b2-4edb-953d-e49f67592a80", "DetectTime": "2024-05-21T12:44:56.112458+00:00", "EventTime": "2024-05-21T12:44:56.112479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwR8m2kJHAAMMZpf8"], "accumulated_threat_level": 1.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "f8e077b3-8590-4bf4-a8b3-dcb5db887d17", "DetectTime": "2024-05-21T12:44:56.123970+00:00", "EventTime": "2024-05-21T12:44:56.123990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJcqtWmoNUOxAhmg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 137} +{"Format": "IDEA0", "ID": "3a925877-17f3-4114-86cc-7a29f85efb8b", "DetectTime": "2024-05-21T12:44:56.129160+00:00", "EventTime": "2024-05-21T12:44:56.129178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkipSW1Wel5B2v2pi6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "b55a297c-54d3-446f-abe9-6c708d1b3d43", "DetectTime": "2024-05-21T12:44:56.141881+00:00", "EventTime": "2024-05-21T12:44:56.141902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK88Bq4sLv2BrkwhGd"], "accumulated_threat_level": 3.2, "timewindow": 137} +{"Format": "IDEA0", "ID": "058ced5b-f882-42d0-ac25-8b48ce92d36d", "DetectTime": "2024-05-21T12:44:56.175415+00:00", "EventTime": "2024-05-21T12:44:56.175434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnucpP3TcmnTkD8hV7"], "accumulated_threat_level": 4.0, "timewindow": 137} +{"Format": "IDEA0", "ID": "2a281330-8363-426e-934c-8d3b3bbe235a", "DetectTime": "2024-05-21T12:44:56.224419+00:00", "EventTime": "2024-05-21T12:44:56.224439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRaQY2Qpmy3XTBMng"], "accumulated_threat_level": 4.8, "timewindow": 137} +{"Format": "IDEA0", "ID": "8a646636-ff59-4764-a63f-45d3a68285fd", "DetectTime": "2024-05-21T12:44:56.272931+00:00", "EventTime": "2024-05-21T12:44:56.272955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDorYzEdSrZPO92Aj"], "accumulated_threat_level": 5.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "b3c1e5e5-1eb8-4ff4-bdfb-da05c64d2fe0", "DetectTime": "2024-05-21T12:44:56.547451+00:00", "EventTime": "2024-05-21T12:44:56.547472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgiUNdSeVAEMNhFk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 137} +{"Format": "IDEA0", "ID": "f52e35e7-b1eb-43d4-89a8-389cc13e3986", "DetectTime": "2024-05-21T12:44:56.585675+00:00", "EventTime": "2024-05-21T12:44:56.585701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAAuXnYFEJqj0C9ol"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "34d3bc2b-5bf8-461e-b27f-0ccad0a7e1d9", "DetectTime": "2024-05-21T12:44:56.626503+00:00", "EventTime": "2024-05-21T12:44:56.626523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1k1xcM5wBd7S8rHg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "ea785162-76a0-4562-8544-a37637c0c32c", "DetectTime": "2024-05-21T12:44:56.670274+00:00", "EventTime": "2024-05-21T12:44:56.670293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJlg32C5hbKW6Gc4a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "41707e0a-2e00-44ea-b4b9-b10ed84aedcf", "DetectTime": "2024-05-21T12:44:56.804927+00:00", "EventTime": "2024-05-21T12:44:56.804947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMd8SR1p5SComBJQff"], "accumulated_threat_level": 8.799999999999999, "timewindow": 137} +{"Format": "IDEA0", "ID": "7ce73869-bcb4-401e-8918-47992350fc8b", "DetectTime": "2024-05-21T12:44:56.852191+00:00", "EventTime": "2024-05-21T12:44:56.852210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2ObE14RE6Pxc0CEg"], "accumulated_threat_level": 9.6, "timewindow": 137} +{"Format": "IDEA0", "ID": "e191aedc-6565-4931-b62a-bcb43235fe5c", "DetectTime": "2024-05-21T12:44:56.901523+00:00", "EventTime": "2024-05-21T12:44:56.901542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsclp1itghHIw7t12"], "accumulated_threat_level": 10.4, "timewindow": 137} +{"Format": "IDEA0", "ID": "6324144f-85df-42e1-805d-f1bca1670d96", "DetectTime": "2024-05-21T12:44:56.973339+00:00", "EventTime": "2024-05-21T12:44:56.973357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci774t4zhWH0YYT5Fg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "540c28e1-94cf-4460-a969-5f6f53f81e77", "DetectTime": "2024-05-21T12:44:57.106921+00:00", "EventTime": "2024-05-21T12:44:57.106939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch68Vz1BU0ErkFdWej"], "accumulated_threat_level": 1.3, "timewindow": 138} +{"Format": "IDEA0", "ID": "cfc69630-3bcc-4779-a0c8-e8ce8b957f4f", "DetectTime": "2024-05-21T12:44:57.359208+00:00", "EventTime": "2024-05-21T12:44:57.359229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvYPJC21oHY9wPaRDl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "0e9b86cd-91a4-4ddf-b131-35f8594fe554", "DetectTime": "2024-05-21T12:44:57.412503+00:00", "EventTime": "2024-05-21T12:44:57.412525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5OExODyMSBz6UfRk"], "accumulated_threat_level": 2.1, "timewindow": 138} +{"Format": "IDEA0", "ID": "15679eab-e223-49fd-9bf5-ac64b51e5cdf", "DetectTime": "2024-05-21T12:44:57.456056+00:00", "EventTime": "2024-05-21T12:44:57.456073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceqlxk43KpAzTyxHn5"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 138} +{"Format": "IDEA0", "ID": "ee926c88-3b57-4298-9cd4-eaab044d9024", "DetectTime": "2024-05-21T12:44:57.504581+00:00", "EventTime": "2024-05-21T12:44:57.504599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDO7z1cc7G4nI7DL9"], "accumulated_threat_level": 3.7, "timewindow": 138} +{"Format": "IDEA0", "ID": "a3bddd82-dda5-444d-89e2-28bed5fb6560", "DetectTime": "2024-05-21T12:44:57.550053+00:00", "EventTime": "2024-05-21T12:44:57.550071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdMaZ1GIW9omkPMz3"], "accumulated_threat_level": 4.5, "timewindow": 138} +{"Format": "IDEA0", "ID": "543c7874-66c6-47b4-8569-448cea1e64be", "DetectTime": "2024-05-21T12:44:57.601923+00:00", "EventTime": "2024-05-21T12:44:57.601943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a2nS3O6GrTtivxq2"], "accumulated_threat_level": 5.3, "timewindow": 138} +{"Format": "IDEA0", "ID": "a9a4df58-3167-4e4f-b4e6-ee80591766f9", "DetectTime": "2024-05-21T12:44:57.643347+00:00", "EventTime": "2024-05-21T12:44:57.643371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eZCtyCEpEA2xjk4"], "accumulated_threat_level": 6.1, "timewindow": 138} +{"Format": "IDEA0", "ID": "bf766f91-182f-4299-bea8-a70ad27f7fdc", "DetectTime": "2024-05-21T12:44:57.910769+00:00", "EventTime": "2024-05-21T12:44:57.910789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkSzv93gSHxRapROCa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "bf1c374c-ad0c-49b9-a0be-b43616707e48", "DetectTime": "2024-05-21T12:44:57.956831+00:00", "EventTime": "2024-05-21T12:44:57.956854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC19h81ZY0SqAw2ruk"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 138} +{"Format": "IDEA0", "ID": "46385e1d-9860-4a66-b91c-029d5936e094", "DetectTime": "2024-05-21T12:44:58.001687+00:00", "EventTime": "2024-05-21T12:44:58.001709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgzDXv1zFJNrj96XF8"], "accumulated_threat_level": 7.699999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "49554a8b-147e-41d9-8d98-8df08ccb3304", "DetectTime": "2024-05-21T12:44:58.050167+00:00", "EventTime": "2024-05-21T12:44:58.050189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNCXOBGc1hltavaf"], "accumulated_threat_level": 8.5, "timewindow": 138} +{"Format": "IDEA0", "ID": "687b94d1-166f-42ad-916b-b86a3766ccb8", "DetectTime": "2024-05-21T12:44:58.189412+00:00", "EventTime": "2024-05-21T12:44:58.189430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNhn11dQbdskdgRh1"], "accumulated_threat_level": 9.3, "timewindow": 138} +{"Format": "IDEA0", "ID": "249d270c-1fcc-4633-985d-9f00c8c4161b", "DetectTime": "2024-05-21T12:44:58.248382+00:00", "EventTime": "2024-05-21T12:44:58.248401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXtEN1RQkQpM8Yzii"], "accumulated_threat_level": 10.100000000000001, "timewindow": 138} +{"Format": "IDEA0", "ID": "086618e7-1c8e-4359-b286-302162728a61", "DetectTime": "2024-05-21T12:44:58.296145+00:00", "EventTime": "2024-05-21T12:44:58.296163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvw6v2DQe7pgel2Q4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 138} +{"Format": "IDEA0", "ID": "648a1455-0bba-42e2-b441-1d378d6a4ced", "DetectTime": "2024-05-21T12:44:58.553292+00:00", "EventTime": "2024-05-21T12:44:58.553314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRdS428UVf3YTPDx3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "53c250f8-9b24-4837-b178-92392f84a767", "DetectTime": "2024-05-21T12:44:58.596948+00:00", "EventTime": "2024-05-21T12:44:58.596967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE2w5l4JoTjIqxdE7c"], "accumulated_threat_level": 11.700000000000003, "timewindow": 138} +{"Format": "IDEA0", "ID": "2ade89f1-afbf-4790-ad7d-8edac8b9f792", "DetectTime": "2024-05-21T12:44:58.644120+00:00", "EventTime": "2024-05-21T12:44:58.644139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4xUj1Ce4XZXSakA3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 138} +{"Format": "Json", "ID": "2ade89f1-afbf-4790-ad7d-8edac8b9f792", "DetectTime": "2024-05-21T12:44:58.644120+00:00", "EventTime": "2024-05-21T12:44:58.644139+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-06T17:06:57.451115+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2024/05/21 12:44:58.862576)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 138, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "149de59a-ef71-4923-bf0b-8aa43dad0f3c", "DetectTime": "2024-05-21T12:44:58.872838+00:00", "EventTime": "2024-05-21T12:44:58.872857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CooaJ01YY5tjnE2f57"], "accumulated_threat_level": 0.8, "timewindow": 138} +{"Format": "IDEA0", "ID": "af1869a2-fda4-4581-b14f-b77d180dce9d", "DetectTime": "2024-05-21T12:44:58.883103+00:00", "EventTime": "2024-05-21T12:44:58.883121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJv38y42WdLxRGxQ25"], "accumulated_threat_level": 1.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "af311b47-e9d6-4914-a2ee-4b04f362359c", "DetectTime": "2024-05-21T12:44:58.893106+00:00", "EventTime": "2024-05-21T12:44:58.893124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YveFCexYh6OQEah"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 138} +{"Format": "IDEA0", "ID": "06ddf91f-f24b-4c25-af82-86289e731987", "DetectTime": "2024-05-21T12:44:58.903099+00:00", "EventTime": "2024-05-21T12:44:58.903117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFUz711Ap0NnvMzV4"], "accumulated_threat_level": 3.2, "timewindow": 138} +{"Format": "IDEA0", "ID": "9a9f76a0-9278-4ce7-8712-3442c421eb3d", "DetectTime": "2024-05-21T12:44:58.914303+00:00", "EventTime": "2024-05-21T12:44:58.914325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYaASx4OzXMJEkHZ8f"], "accumulated_threat_level": 4.0, "timewindow": 138} +{"Format": "IDEA0", "ID": "6e166a7b-a3b4-4dd1-88b1-0028753f15bb", "DetectTime": "2024-05-21T12:44:58.953621+00:00", "EventTime": "2024-05-21T12:44:58.953639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CITvZ83XsbuiHrGbJ1"], "accumulated_threat_level": 4.8, "timewindow": 138} +{"Format": "IDEA0", "ID": "d18ecf5e-e2bf-45ee-87ab-6635dab36960", "DetectTime": "2024-05-21T12:44:59.207122+00:00", "EventTime": "2024-05-21T12:44:59.207144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdh0CB1PLxsukVkNQj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "e0168767-72c1-475b-b237-d38b6fb5e4e6", "DetectTime": "2024-05-21T12:44:59.249044+00:00", "EventTime": "2024-05-21T12:44:59.249062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZqBOO35i9Dzk6yNJj"], "accumulated_threat_level": 5.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "61b5a9c5-322e-4127-bab2-eb69e0492cdb", "DetectTime": "2024-05-21T12:44:59.296585+00:00", "EventTime": "2024-05-21T12:44:59.296604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZBKy4pbInlDv9c2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 138} +{"Format": "IDEA0", "ID": "01391540-56a1-4ac7-9b3d-abc600d05303", "DetectTime": "2024-05-21T12:44:59.349110+00:00", "EventTime": "2024-05-21T12:44:59.349132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2GULpkxJmjilW1Cb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "2cbe0420-79b0-4504-a7b2-febd1a86e1d1", "DetectTime": "2024-05-21T12:44:59.400756+00:00", "EventTime": "2024-05-21T12:44:59.400778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD0jhX3CeihzEcVeP7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "16e0f19c-005c-43e0-9776-3955e9741f8f", "DetectTime": "2024-05-21T12:44:59.542097+00:00", "EventTime": "2024-05-21T12:44:59.542120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjcr0180qIw1fonfb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "0263848a-b6d9-4d6b-b597-8dc04277083d", "DetectTime": "2024-05-21T12:44:59.591043+00:00", "EventTime": "2024-05-21T12:44:59.591065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyU8s66lSbli93Uq2"], "accumulated_threat_level": 9.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "c6a790cf-d335-4113-9111-5937c785aa27", "DetectTime": "2024-05-21T12:44:59.678024+00:00", "EventTime": "2024-05-21T12:44:59.678044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNEWts22AGrHzYOIFe"], "accumulated_threat_level": 10.4, "timewindow": 138} +{"Format": "IDEA0", "ID": "84b9bee5-0027-46a7-9150-b33e00f87e23", "DetectTime": "2024-05-21T12:44:59.712007+00:00", "EventTime": "2024-05-21T12:44:59.712030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfpY1p2RuNaHf5HA4d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "b6559edb-7fc3-4508-95c9-adf426d07eec", "DetectTime": "2024-05-21T12:45:00.030990+00:00", "EventTime": "2024-05-21T12:45:00.031015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzqITC410SzGXgYze9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 138} +{"Format": "IDEA0", "ID": "92555af1-b85d-4ee7-8e35-34e9b2a66ec7", "DetectTime": "2024-05-21T12:45:00.079544+00:00", "EventTime": "2024-05-21T12:45:00.079563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5keaY1TtEidvjxsL4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 138} +{"Format": "Json", "ID": "92555af1-b85d-4ee7-8e35-34e9b2a66ec7", "DetectTime": "2024-05-21T12:45:00.079544+00:00", "EventTime": "2024-05-21T12:45:00.079563+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-06T17:37:34.644090+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2024/05/21 12:45:00.246495)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 138, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "17e4230b-6a8a-4855-a835-91156b2e8440", "DetectTime": "2024-05-21T12:45:00.260159+00:00", "EventTime": "2024-05-21T12:45:00.260183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8itP2oYhvqwkre73"], "accumulated_threat_level": 0.8, "timewindow": 138} +{"Format": "IDEA0", "ID": "63fedda3-c4e3-443c-b9c1-c6d446305f3d", "DetectTime": "2024-05-21T12:45:00.271072+00:00", "EventTime": "2024-05-21T12:45:00.271091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKUez2m4wK6kWlY1k"], "accumulated_threat_level": 1.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "5ecd141b-6f60-4ce8-8802-f157cec01158", "DetectTime": "2024-05-21T12:45:00.284790+00:00", "EventTime": "2024-05-21T12:45:00.284810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLG2AgEFjiVg9Ira"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 138} +{"Format": "IDEA0", "ID": "7bbf1ec2-0caf-4e1d-a814-2edf05c43d9d", "DetectTime": "2024-05-21T12:45:00.297601+00:00", "EventTime": "2024-05-21T12:45:00.297620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7OrqD26f3cAcJyWk9"], "accumulated_threat_level": 3.2, "timewindow": 138} +{"Format": "IDEA0", "ID": "9cc070ef-f219-4de6-9093-bb10f74455c6", "DetectTime": "2024-05-21T12:45:00.328412+00:00", "EventTime": "2024-05-21T12:45:00.328431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHa2Yc2fOSKSsX9RBb"], "accumulated_threat_level": 4.0, "timewindow": 138} +{"Format": "IDEA0", "ID": "ef5219d9-32eb-4699-88ca-42e5b7c0a60a", "DetectTime": "2024-05-21T12:45:00.591312+00:00", "EventTime": "2024-05-21T12:45:00.591331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYxHzT3qiTT0VTE7f1"], "accumulated_threat_level": 4.8, "timewindow": 138} +{"Format": "IDEA0", "ID": "583dc95c-b69c-4e54-acd7-d28e95f7f0b3", "DetectTime": "2024-05-21T12:45:00.649730+00:00", "EventTime": "2024-05-21T12:45:00.649748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMcNJ3NiafcAiW8Cb"], "accumulated_threat_level": 5.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "8f2a8f33-d22b-410e-98f0-91a62597244b", "DetectTime": "2024-05-21T12:45:00.675051+00:00", "EventTime": "2024-05-21T12:45:00.675072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pG3s1OKqCkGIhoPl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "0096cb09-1d26-491c-aee9-b83f7915b711", "DetectTime": "2024-05-21T12:45:00.724836+00:00", "EventTime": "2024-05-21T12:45:00.724855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf7s145N969U53NI8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 138} +{"Format": "IDEA0", "ID": "e8fde486-d4b7-4811-b2ec-712186cb8ca5", "DetectTime": "2024-05-21T12:45:00.770860+00:00", "EventTime": "2024-05-21T12:45:00.770881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja7Gl2h4QYUmWpX3l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "823b0499-18e2-43a3-b147-7a5354268f9f", "DetectTime": "2024-05-21T12:45:00.813123+00:00", "EventTime": "2024-05-21T12:45:00.813142+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. AS: INTERNET-SOLUTIONS, ZA AS20011 rDNS: 196-210-104-179.ftth.web.africa Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbmDE44Hsfw7NisL1"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "228edab2-6a98-4d90-9479-f1fc8675dcfc", "DetectTime": "2024-05-21T12:45:00.827333+00:00", "EventTime": "2024-05-21T12:45:00.827352+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. AS: INTERNET-SOLUTIONS, ZA AS20011 rDNS: 196-210-104-179.ftth.web.africa Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbmDE44Hsfw7NisL1"], "accumulated_threat_level": 8.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "83b20161-2f63-474b-a5bf-735932a5d565", "DetectTime": "2024-05-21T12:45:00.843941+00:00", "EventTime": "2024-05-21T12:45:00.843961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP60iKWdgIFY0b5ml"], "accumulated_threat_level": 7.999999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "d2992f93-b9bc-48a4-8498-73a724c02c7b", "DetectTime": "2024-05-21T12:45:00.855265+00:00", "EventTime": "2024-05-21T12:45:00.855283+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.40.169.168"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjeL1Pu1SZfkS7g7"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d9149394-c9a9-4cb8-a365-0336f51a0a56", "DetectTime": "2024-05-21T12:45:00.866427+00:00", "EventTime": "2024-05-21T12:45:00.866446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.40.169.168"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.40.169.168 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjeL1Pu1SZfkS7g7"], "accumulated_threat_level": 9.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "dcc7dbc6-4040-4947-8d2b-40c707cc57ce", "DetectTime": "2024-05-21T12:45:00.991365+00:00", "EventTime": "2024-05-21T12:45:00.991401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C69nsT2S0bBMiUgXQ9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "99c48f6e-9192-4288-868c-617b4756bd1f", "DetectTime": "2024-05-21T12:45:01.167119+00:00", "EventTime": "2024-05-21T12:45:01.167144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9rTzX2HfsNcL5xL63"], "accumulated_threat_level": 9.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "b7bda453-0ed2-4f38-869d-923ba1f66cf2", "DetectTime": "2024-05-21T12:45:01.215072+00:00", "EventTime": "2024-05-21T12:45:01.215093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcWc3l1key1mWAgLBb"], "accumulated_threat_level": 10.4, "timewindow": 138} +{"Format": "IDEA0", "ID": "9b4cf6be-3663-4c36-af99-b84452a4dd56", "DetectTime": "2024-05-21T12:45:01.262573+00:00", "EventTime": "2024-05-21T12:45:01.262592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPILns456rOfYbVXHg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 138} +{"Format": "IDEA0", "ID": "db6fd7df-74c0-4943-8fa3-3e60f1495abb", "DetectTime": "2024-05-21T12:45:01.309274+00:00", "EventTime": "2024-05-21T12:45:01.309293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hQm6jn3XQGPnuQ6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 138} +{"Format": "Json", "ID": "db6fd7df-74c0-4943-8fa3-3e60f1495abb", "DetectTime": "2024-05-21T12:45:01.309274+00:00", "EventTime": "2024-05-21T12:45:01.309293+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-06T17:37:58.408941+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 138. (real time 2024/05/21 12:45:01.518054)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 138, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8ed00955-764a-41b2-9f8e-7db4ac70aeaf", "DetectTime": "2024-05-21T12:45:01.522856+00:00", "EventTime": "2024-05-21T12:45:01.522877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXIWal3I7Xs2DhBA61"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "898fcd6c-0488-4386-8491-696a2d8cffb1", "DetectTime": "2024-05-21T12:45:01.535541+00:00", "EventTime": "2024-05-21T12:45:01.535564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnPbz44C9yx8BFFQh"], "accumulated_threat_level": 0.8, "timewindow": 138} +{"Format": "IDEA0", "ID": "1812a76c-4a49-42c3-82f6-b45dbecca6f2", "DetectTime": "2024-05-21T12:45:01.547517+00:00", "EventTime": "2024-05-21T12:45:01.547536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPz0gH2hfjNv4PKCY8"], "accumulated_threat_level": 1.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "e706e617-796e-49f0-9db8-7a584190fedb", "DetectTime": "2024-05-21T12:45:01.558755+00:00", "EventTime": "2024-05-21T12:45:01.558773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFJ1Y3YiXfggN6qgl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 138} +{"Format": "IDEA0", "ID": "986051ce-7e0e-43ff-989e-bfd2d8516c61", "DetectTime": "2024-05-21T12:45:01.570316+00:00", "EventTime": "2024-05-21T12:45:01.570334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYdES2OJwvSQbgPB4"], "accumulated_threat_level": 3.2, "timewindow": 138} +{"Format": "IDEA0", "ID": "f1757ad7-db9a-42a5-917a-d1430d436a9a", "DetectTime": "2024-05-21T12:45:01.794488+00:00", "EventTime": "2024-05-21T12:45:01.794508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFR2Wf1Ar27VAEyDy6"], "accumulated_threat_level": 4.0, "timewindow": 138} +{"Format": "IDEA0", "ID": "451a25ba-f227-4a66-b8fd-0b697f9e3ea2", "DetectTime": "2024-05-21T12:45:01.839690+00:00", "EventTime": "2024-05-21T12:45:01.839710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7VvAhlhpXT6EVRoj"], "accumulated_threat_level": 4.8, "timewindow": 138} +{"Format": "IDEA0", "ID": "f7949751-094a-46a4-b9dd-9b5533d398a2", "DetectTime": "2024-05-21T12:45:01.888190+00:00", "EventTime": "2024-05-21T12:45:01.888209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuutpL2ixVpNTRta"], "accumulated_threat_level": 5.6, "timewindow": 138} +{"Format": "IDEA0", "ID": "807c866d-f10c-4957-b1e7-c26de0278a25", "DetectTime": "2024-05-21T12:45:01.937676+00:00", "EventTime": "2024-05-21T12:45:01.937695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CManjJ1g9af8i5NUMg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 138} +{"Format": "IDEA0", "ID": "b201871c-a5c8-4d93-a1c4-33e22128c1b4", "DetectTime": "2024-05-21T12:45:01.985101+00:00", "EventTime": "2024-05-21T12:45:01.985121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzMyI3KjvTZiGEQgb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "1f200a7f-4d76-4536-9a37-27149105fdc0", "DetectTime": "2024-05-21T12:45:02.032460+00:00", "EventTime": "2024-05-21T12:45:02.032483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFAPrUtRbp5rqv4l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "b4727c66-3d84-4de3-9478-3d269c4ff7d1", "DetectTime": "2024-05-21T12:45:02.101193+00:00", "EventTime": "2024-05-21T12:45:02.101210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwWCYsN00lFAT6m6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "d0213399-eb2b-46e2-8f43-39ca82ccb4f9", "DetectTime": "2024-05-21T12:45:02.207961+00:00", "EventTime": "2024-05-21T12:45:02.208002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUFVx36BeYrmbIFg7"], "accumulated_threat_level": 0.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "5933b5e2-69b7-4c04-b7fa-0f8b90fcd19f", "DetectTime": "2024-05-21T12:45:02.239624+00:00", "EventTime": "2024-05-21T12:45:02.239645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJXzk3kAxJXpVJakj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "ed81ec31-6c9f-4f9f-b51c-3bcba6ca613b", "DetectTime": "2024-05-21T12:45:02.455931+00:00", "EventTime": "2024-05-21T12:45:02.455950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKa3l4M2qZw05zDj5"], "accumulated_threat_level": 1.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "616df569-aa07-4de0-a377-a40f71d115a4", "DetectTime": "2024-05-21T12:45:02.505978+00:00", "EventTime": "2024-05-21T12:45:02.505997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPQKi4qYAbx9UJ9z3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 139} +{"Format": "IDEA0", "ID": "e842f75c-a0df-48c4-bcea-b40abccb814a", "DetectTime": "2024-05-21T12:45:02.557432+00:00", "EventTime": "2024-05-21T12:45:02.557452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfeO4b30YRLiGl1iJi"], "accumulated_threat_level": 3.2, "timewindow": 139} +{"Format": "IDEA0", "ID": "398cfa5a-3ba4-482e-be8e-74c6c75d2325", "DetectTime": "2024-05-21T12:45:02.602979+00:00", "EventTime": "2024-05-21T12:45:02.602998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEE76P2WTXeASRkslc"], "accumulated_threat_level": 4.0, "timewindow": 139} +{"Format": "IDEA0", "ID": "58445236-f883-4297-a57f-8ee3287179f6", "DetectTime": "2024-05-21T12:45:02.651155+00:00", "EventTime": "2024-05-21T12:45:02.651175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfjGoZOnzX6f9nPo5"], "accumulated_threat_level": 4.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "31aa2747-a22d-4b4e-ae5f-56d6e5729968", "DetectTime": "2024-05-21T12:45:02.699005+00:00", "EventTime": "2024-05-21T12:45:02.699023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigZJgemGpvHeGdd2"], "accumulated_threat_level": 5.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "3c29a770-cbb7-4f08-8a8f-a3c4af2237fb", "DetectTime": "2024-05-21T12:45:02.754117+00:00", "EventTime": "2024-05-21T12:45:02.754134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUbkeB3baXtBg2udRa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 139} +{"Format": "IDEA0", "ID": "d78c7929-04a6-4731-aae3-8d3e6de538d9", "DetectTime": "2024-05-21T12:45:02.988080+00:00", "EventTime": "2024-05-21T12:45:02.988103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzM9yXOfnn217yZcd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "254d5a73-e1d1-4ba0-b238-b3a4ce4fcf31", "DetectTime": "2024-05-21T12:45:03.029083+00:00", "EventTime": "2024-05-21T12:45:03.029104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CESoRz28O8so9pPdy"], "accumulated_threat_level": 7.199999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "a1be1bad-57c0-44bc-b93a-3a2a2da514bf", "DetectTime": "2024-05-21T12:45:03.075518+00:00", "EventTime": "2024-05-21T12:45:03.075537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqL5uX3g6FJ3NQ0Njl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "db828d32-e31f-4dde-a96a-c1c64fc1c0cb", "DetectTime": "2024-05-21T12:45:03.119665+00:00", "EventTime": "2024-05-21T12:45:03.119683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxNP24nduKG1FfEX2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "e44b9390-3d0e-42ad-9d1e-9ef7756e88b8", "DetectTime": "2024-05-21T12:45:03.171117+00:00", "EventTime": "2024-05-21T12:45:03.171147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeCms3czsLLUeuGvk"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "dfdee7e2-fd6b-4205-8373-f84435e08a04", "DetectTime": "2024-05-21T12:45:03.219621+00:00", "EventTime": "2024-05-21T12:45:03.219660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZ63e46R9HxKb9e4i"], "accumulated_threat_level": 10.4, "timewindow": 139} +{"Format": "IDEA0", "ID": "86290774-1cb0-479a-a6e6-ef93b8438cde", "DetectTime": "2024-05-21T12:45:03.273174+00:00", "EventTime": "2024-05-21T12:45:03.273192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CESiXG2heEfVFZSvPb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 139} +{"Format": "IDEA0", "ID": "0bf0860f-7a93-425c-97e6-ca6374c0fac5", "DetectTime": "2024-05-21T12:45:03.535106+00:00", "EventTime": "2024-05-21T12:45:03.535125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cixaag6Tl0xzH6Fl6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 139} +{"Format": "Json", "ID": "0bf0860f-7a93-425c-97e6-ca6374c0fac5", "DetectTime": "2024-05-21T12:45:03.535106+00:00", "EventTime": "2024-05-21T12:45:03.535125+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "1970-01-06T18:08:28.836904+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2024/05/21 12:45:03.707741)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 139, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4cfb6db0-f482-4acb-a624-ec4510726cab", "DetectTime": "2024-05-21T12:45:03.721318+00:00", "EventTime": "2024-05-21T12:45:03.721340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMmaq2XKzkhLU8sJ6"], "accumulated_threat_level": 0.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "a65e5874-0661-4278-bc00-288dc4deeca7", "DetectTime": "2024-05-21T12:45:03.732703+00:00", "EventTime": "2024-05-21T12:45:03.732722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhVjp3gliy7uYYIs6"], "accumulated_threat_level": 1.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "8eb0f7c9-d85e-47aa-88b2-a1e2161d54de", "DetectTime": "2024-05-21T12:45:03.768078+00:00", "EventTime": "2024-05-21T12:45:03.768101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYGvF3bZUtnzTJI83"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 139} +{"Format": "IDEA0", "ID": "988b5547-22ee-4dbd-b114-ba1a11d7fc06", "DetectTime": "2024-05-21T12:45:03.817919+00:00", "EventTime": "2024-05-21T12:45:03.817939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53nSO2cdXwf98YAh4"], "accumulated_threat_level": 3.2, "timewindow": 139} +{"Format": "IDEA0", "ID": "a3ee8417-a782-404b-a6f4-bc9557ffc150", "DetectTime": "2024-05-21T12:45:03.868351+00:00", "EventTime": "2024-05-21T12:45:03.868370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1bia2vNsXyqUb7O8"], "accumulated_threat_level": 4.0, "timewindow": 139} +{"Format": "IDEA0", "ID": "c9d9db83-6f50-49fe-9240-3d3496d20259", "DetectTime": "2024-05-21T12:45:03.907631+00:00", "EventTime": "2024-05-21T12:45:03.907653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5Z9G2hstFBOdSy7c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "db22f38d-9fc9-42f3-911b-6b28d7763f37", "DetectTime": "2024-05-21T12:45:03.950331+00:00", "EventTime": "2024-05-21T12:45:03.950351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQ04T1Ms4DH5rLB4b"], "accumulated_threat_level": 4.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "5d145639-2bc4-4a1e-931f-a02fa6d6b4a8", "DetectTime": "2024-05-21T12:45:03.999196+00:00", "EventTime": "2024-05-21T12:45:03.999216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVDZJ2Knt0uhHOES6"], "accumulated_threat_level": 5.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "c103e0bd-8e2f-43e3-91ff-662718abe36c", "DetectTime": "2024-05-21T12:45:04.301203+00:00", "EventTime": "2024-05-21T12:45:04.301222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj8wAv29yR9zBzzv5j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 139} +{"Format": "IDEA0", "ID": "4adb2adb-0017-4859-8f2f-5b818dba34a4", "DetectTime": "2024-05-21T12:45:04.351538+00:00", "EventTime": "2024-05-21T12:45:04.351559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzbTC2peD3HjNDdC5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "dc366fc3-d814-4ee3-9da6-788795c2bd73", "DetectTime": "2024-05-21T12:45:04.398304+00:00", "EventTime": "2024-05-21T12:45:04.398322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShwHA2bKKh3Ai4Gfb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "44e6823c-9535-4244-8a4e-da65e9840d95", "DetectTime": "2024-05-21T12:45:04.446771+00:00", "EventTime": "2024-05-21T12:45:04.446790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXh32f1wc1hVbMxCIl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "b0370c78-bcc2-4995-af37-2ba9dfa5535c", "DetectTime": "2024-05-21T12:45:04.494182+00:00", "EventTime": "2024-05-21T12:45:04.494200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNd4d1UwxYRDVfVa"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "f5989f69-80cc-4784-8bae-a8e743973305", "DetectTime": "2024-05-21T12:45:04.570210+00:00", "EventTime": "2024-05-21T12:45:04.570232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClP49uj9Du9lL8xZa"], "accumulated_threat_level": 10.4, "timewindow": 139} +{"Format": "IDEA0", "ID": "5beeeba1-160c-4cf5-b5eb-842571ebfeec", "DetectTime": "2024-05-21T12:45:04.812603+00:00", "EventTime": "2024-05-21T12:45:04.812626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfjMmX39ADwU0jEdj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "a7e68499-5fba-4919-946b-657bce5a5bb5", "DetectTime": "2024-05-21T12:45:04.826753+00:00", "EventTime": "2024-05-21T12:45:04.826778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ3gf91QyN9zhWxwPj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 139} +{"Format": "IDEA0", "ID": "c0b274fd-0bf2-4222-9873-81eab73d782a", "DetectTime": "2024-05-21T12:45:04.837729+00:00", "EventTime": "2024-05-21T12:45:04.837747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGUkP3e2EP7yTCXq4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 139} +{"Format": "Json", "ID": "c0b274fd-0bf2-4222-9873-81eab73d782a", "DetectTime": "2024-05-21T12:45:04.837729+00:00", "EventTime": "2024-05-21T12:45:04.837747+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-06T18:39:06.638310+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2024/05/21 12:45:05.003991)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 139, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5d8532b6-3632-42f0-9122-c7ea2cf8364f", "DetectTime": "2024-05-21T12:45:05.078001+00:00", "EventTime": "2024-05-21T12:45:05.078024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLew842uxqGRXAVZh"], "accumulated_threat_level": 0.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "8ce5b26d-48e8-4f56-9ab2-c1b4f15a9541", "DetectTime": "2024-05-21T12:45:05.099887+00:00", "EventTime": "2024-05-21T12:45:05.099909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduojkfsFfJacMNH6"], "accumulated_threat_level": 1.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "421b92dd-5fbd-4c68-bcd6-a407118c8cef", "DetectTime": "2024-05-21T12:45:05.148546+00:00", "EventTime": "2024-05-21T12:45:05.148566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLppm12A7ynhrX18Sl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 139} +{"Format": "IDEA0", "ID": "928163ed-bca7-4f46-a790-94ad57a5eaed", "DetectTime": "2024-05-21T12:45:05.198272+00:00", "EventTime": "2024-05-21T12:45:05.198295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA9EY82XwhFq2pSLDd"], "accumulated_threat_level": 3.2, "timewindow": 139} +{"Format": "IDEA0", "ID": "cee7c922-9caf-4bd4-b49a-24e4265cf05e", "DetectTime": "2024-05-21T12:45:05.249253+00:00", "EventTime": "2024-05-21T12:45:05.249275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUkH1123AvA5M1CTe9"], "accumulated_threat_level": 4.0, "timewindow": 139} +{"Format": "IDEA0", "ID": "21d844e0-11bc-4746-b164-8336d40e63e3", "DetectTime": "2024-05-21T12:45:05.296568+00:00", "EventTime": "2024-05-21T12:45:05.296588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPz7d2Afe9wprIDK7"], "accumulated_threat_level": 4.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "b8cbb226-3f26-4850-8a70-0ecba80bb7e8", "DetectTime": "2024-05-21T12:45:05.360408+00:00", "EventTime": "2024-05-21T12:45:05.360431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CzD0366S1pTDpYs6"], "accumulated_threat_level": 5.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "6c89e3e3-d905-4613-9197-51f1d6be3f28", "DetectTime": "2024-05-21T12:45:05.622616+00:00", "EventTime": "2024-05-21T12:45:05.622636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsRR115gENcoPQxe8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 139} +{"Format": "IDEA0", "ID": "2243e6e2-fc0e-4ddb-a5f4-79b3fdf09953", "DetectTime": "2024-05-21T12:45:05.672298+00:00", "EventTime": "2024-05-21T12:45:05.672317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCwxdpGsUjEC5ouS3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "c6d368cc-e014-4e74-9623-ba543a50c2b9", "DetectTime": "2024-05-21T12:45:05.720672+00:00", "EventTime": "2024-05-21T12:45:05.720693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4K5gm1G4GOlmBqBj5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "a71325f6-9b7b-422f-8945-65958bc85162", "DetectTime": "2024-05-21T12:45:05.767287+00:00", "EventTime": "2024-05-21T12:45:05.767306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0mthmz6oH8egDr9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "71da2504-3e5a-401f-a502-a89c3b9c5d54", "DetectTime": "2024-05-21T12:45:05.822968+00:00", "EventTime": "2024-05-21T12:45:05.822990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNw8bu1BZZ4ldVBnma"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "35270a26-9238-494d-9fb8-63284b36f08c", "DetectTime": "2024-05-21T12:45:05.862869+00:00", "EventTime": "2024-05-21T12:45:05.862891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrL8n2zEoE9CXkNjb"], "accumulated_threat_level": 10.4, "timewindow": 139} +{"Format": "IDEA0", "ID": "f675f4ad-6f0b-467b-899f-494861f4ad68", "DetectTime": "2024-05-21T12:45:05.916472+00:00", "EventTime": "2024-05-21T12:45:05.916490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJrCx4FIhy6lJ95bc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 139} +{"Format": "IDEA0", "ID": "b5faa40b-6a11-4d1f-b01b-6c951845604c", "DetectTime": "2024-05-21T12:45:06.259535+00:00", "EventTime": "2024-05-21T12:45:06.259555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czm8Xw25cBTOMOCiRf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 139} +{"Format": "Json", "ID": "b5faa40b-6a11-4d1f-b01b-6c951845604c", "DetectTime": "2024-05-21T12:45:06.259535+00:00", "EventTime": "2024-05-21T12:45:06.259555+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-06T18:39:10.615268+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 139. (real time 2024/05/21 12:45:06.460535)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 139, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5d655dc6-4739-4038-977e-1c7c68d248eb", "DetectTime": "2024-05-21T12:45:06.464508+00:00", "EventTime": "2024-05-21T12:45:06.464526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzIj3W2qTqvv4HsQ4e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 136} +{"Format": "IDEA0", "ID": "db56b8f5-d43d-4e32-8cd8-ab4bb0c64b8a", "DetectTime": "2024-05-21T12:45:06.475988+00:00", "EventTime": "2024-05-21T12:45:06.476008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAri6ZCAimtUWUEd9"], "accumulated_threat_level": 0.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "ae823364-999b-4dbf-9e86-94c3ef553a10", "DetectTime": "2024-05-21T12:45:06.488053+00:00", "EventTime": "2024-05-21T12:45:06.488080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpY92u3S9eLr5H0Iwl"], "accumulated_threat_level": 1.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5ecada1b-9b06-4048-8be8-356acb249d1d", "DetectTime": "2024-05-21T12:45:06.503245+00:00", "EventTime": "2024-05-21T12:45:06.503266+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. AS: AMAZON-AES, US AS14618 rDNS: ec2-98-80-247-223.compute-1.amazonaws.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwASSj3oeVKimE8RT3"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "33def53a-e298-4889-987c-e1fb8ac1e369", "DetectTime": "2024-05-21T12:45:06.517105+00:00", "EventTime": "2024-05-21T12:45:06.517128+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. AS: AMAZON-AES, US AS14618 rDNS: ec2-98-80-247-223.compute-1.amazonaws.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwASSj3oeVKimE8RT3"], "accumulated_threat_level": 9.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "2d18a828-d003-441b-b73b-2db93fa6f593", "DetectTime": "2024-05-21T12:45:06.528089+00:00", "EventTime": "2024-05-21T12:45:06.528107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppiAX2me1OIp8t0kl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 139} +{"Format": "IDEA0", "ID": "a5864bfa-6732-49ab-8527-95328f29a79d", "DetectTime": "2024-05-21T12:45:06.538929+00:00", "EventTime": "2024-05-21T12:45:06.538951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF6Pg4YfooNr3h2I8"], "accumulated_threat_level": 3.2, "timewindow": 139} +{"Format": "IDEA0", "ID": "1dbb0904-ddcf-48e3-ab0e-ce7cf0da06e9", "DetectTime": "2024-05-21T12:45:06.550379+00:00", "EventTime": "2024-05-21T12:45:06.550397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcD2n1agxl5smRMt"], "accumulated_threat_level": 4.0, "timewindow": 139} +{"Format": "IDEA0", "ID": "36c86a6d-9365-4880-badc-d75a47baba04", "DetectTime": "2024-05-21T12:45:06.570364+00:00", "EventTime": "2024-05-21T12:45:06.570387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzhnH91Cop3FyXGBNj"], "accumulated_threat_level": 4.8, "timewindow": 139} +{"Format": "IDEA0", "ID": "78ff0ed9-5536-4407-b7fd-0000cf8879b1", "DetectTime": "2024-05-21T12:45:06.618336+00:00", "EventTime": "2024-05-21T12:45:06.618356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ12h34C9KRcRhb3y9"], "accumulated_threat_level": 5.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "b1afca88-ffd6-4d43-b274-eecc4f006978", "DetectTime": "2024-05-21T12:45:06.674825+00:00", "EventTime": "2024-05-21T12:45:06.674844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4jdU2egQDmMr2ll7"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "02d5f389-17eb-4e8a-bb39-b7145839943a", "DetectTime": "2024-05-21T12:45:06.687978+00:00", "EventTime": "2024-05-21T12:45:06.687996+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4jdU2egQDmMr2ll7"], "accumulated_threat_level": 10.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a0757b8e-82ea-4a34-a52e-ec81a4d1d4e6", "DetectTime": "2024-05-21T12:45:06.741468+00:00", "EventTime": "2024-05-21T12:45:06.741487+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAOQliyy2NvabL9h"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "86f30bc9-a6c2-4e2e-8fb1-d07ad2a01935", "DetectTime": "2024-05-21T12:45:06.755482+00:00", "EventTime": "2024-05-21T12:45:06.755503+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuAOQliyy2NvabL9h"], "accumulated_threat_level": 10.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "e89985c4-cd47-4dd5-9936-757bb83178cb", "DetectTime": "2024-05-21T12:45:06.775923+00:00", "EventTime": "2024-05-21T12:45:06.775941+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JTGW3EqfXet5jZ2c"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "1b54559e-74db-478a-a378-850fb8a0ad6d", "DetectTime": "2024-05-21T12:45:06.790351+00:00", "EventTime": "2024-05-21T12:45:06.790374+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3JTGW3EqfXet5jZ2c"], "accumulated_threat_level": 11.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9bdbef8b-cb30-4911-af72-b54fbf92706b", "DetectTime": "2024-05-21T12:45:06.814919+00:00", "EventTime": "2024-05-21T12:45:06.814938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeln33tdGuGQxdI4d"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bc85d156-060f-4156-922c-2c61679facd9", "DetectTime": "2024-05-21T12:45:06.828136+00:00", "EventTime": "2024-05-21T12:45:06.828156+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeln33tdGuGQxdI4d"], "accumulated_threat_level": 11.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "19fdf8a7-07a4-4a64-b1f7-1288a730c4d4", "DetectTime": "2024-05-21T12:45:06.952689+00:00", "EventTime": "2024-05-21T12:45:06.952710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbxJp2OHTydTXX5X5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "7b1c95bd-6e1a-4d0a-8ba6-42b9452881d9", "DetectTime": "2024-05-21T12:45:06.958134+00:00", "EventTime": "2024-05-21T12:45:06.958153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthMH22gJjlv0khmJe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "e52ebcfe-7ea6-4099-95e3-9755e658c98e", "DetectTime": "2024-05-21T12:45:06.976524+00:00", "EventTime": "2024-05-21T12:45:06.976549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwpGo4L4Jubrq2LH9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 139} +{"Format": "IDEA0", "ID": "ad8c6cd2-ffe2-489e-8a2e-4a1ebc6ec643", "DetectTime": "2024-05-21T12:45:06.981926+00:00", "EventTime": "2024-05-21T12:45:06.981946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuWEFK1ss6IXCZHVCd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "18be9e3a-a1ee-4d5e-b93d-6c5cc13801cb", "DetectTime": "2024-05-21T12:45:06.987222+00:00", "EventTime": "2024-05-21T12:45:06.987242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFOHpl3aIEE6CzSxSf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "7075b91e-66a4-4f9a-a7d4-b09c3c4b5d59", "DetectTime": "2024-05-21T12:45:06.991990+00:00", "EventTime": "2024-05-21T12:45:06.992008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKtiJ3GTau6qDqQC2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "0a150925-b980-4e53-b7c5-477aaa900c2d", "DetectTime": "2024-05-21T12:45:07.074476+00:00", "EventTime": "2024-05-21T12:45:07.074497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDkxW2O3unP4y4pyb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "519d8ab5-12e5-48e5-adc6-4680ca97aeac", "DetectTime": "2024-05-21T12:45:07.143828+00:00", "EventTime": "2024-05-21T12:45:07.143847+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. AS: ACS-INTERNET, US AS27364 rDNS: dynamic-acs-24-239-58-25.zoominternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpleDD4d9IfSWZLC75"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a62b2a93-c42a-43a9-aa54-1609c3f3e507", "DetectTime": "2024-05-21T12:45:07.156883+00:00", "EventTime": "2024-05-21T12:45:07.156902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. AS: ACS-INTERNET, US AS27364 rDNS: dynamic-acs-24-239-58-25.zoominternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpleDD4d9IfSWZLC75"], "accumulated_threat_level": 12.0, "timewindow": 31} +{"Format": "Json", "ID": "a62b2a93-c42a-43a9-aa54-1609c3f3e507", "DetectTime": "2024-05-21T12:45:07.156883+00:00", "EventTime": "2024-05-21T12:45:07.156902+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "1970-01-02T06:16:43.401039+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:45:08.255354)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "e3950a84-7b90-4af9-98c8-c0074607cbb9", "DetectTime": "2024-05-21T12:45:08.269258+00:00", "EventTime": "2024-05-21T12:45:08.269277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFE9Is4yoAzhJE4aw"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9827bcdd-1401-415a-a2e1-f9e24e3b6ccf", "DetectTime": "2024-05-21T12:45:08.282814+00:00", "EventTime": "2024-05-21T12:45:08.282832+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFE9Is4yoAzhJE4aw"], "accumulated_threat_level": 0.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "aa9ce1ab-696f-491f-a65d-ddc188de5a71", "DetectTime": "2024-05-21T12:45:08.288137+00:00", "EventTime": "2024-05-21T12:45:08.288155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAM2I3DEs43nE2Fv7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "a35c7ec1-5a42-4025-b88a-1c0396c932b1", "DetectTime": "2024-05-21T12:45:08.300285+00:00", "EventTime": "2024-05-21T12:45:08.300306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAw7kJ0w6R989Tb3"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bd59bacb-4daf-4859-94b1-92c9c593988e", "DetectTime": "2024-05-21T12:45:08.314683+00:00", "EventTime": "2024-05-21T12:45:08.314705+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAw7kJ0w6R989Tb3"], "accumulated_threat_level": 1.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "444b14e2-2e1f-463f-be29-659e31596092", "DetectTime": "2024-05-21T12:45:08.328407+00:00", "EventTime": "2024-05-21T12:45:08.328427+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzpH6twmbm7OLg7f"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "74b447de-f92d-45e6-9e62-31b0db7e9a20", "DetectTime": "2024-05-21T12:45:08.345459+00:00", "EventTime": "2024-05-21T12:45:08.345493+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzpH6twmbm7OLg7f"], "accumulated_threat_level": 1.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "ecbbcced-ea4f-4719-b410-c2740cf1a17e", "DetectTime": "2024-05-21T12:45:08.366811+00:00", "EventTime": "2024-05-21T12:45:08.366832+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-87-6-122-34.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJMlr2EVHzObcgEfj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "e316e115-2d83-43d4-bf27-8d8e69652185", "DetectTime": "2024-05-21T12:45:08.382199+00:00", "EventTime": "2024-05-21T12:45:08.382232+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-87-6-122-34.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJMlr2EVHzObcgEfj"], "accumulated_threat_level": 2.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "6b9c6b9c-be7a-4a17-90b2-af75b5ddb7f4", "DetectTime": "2024-05-21T12:45:08.394579+00:00", "EventTime": "2024-05-21T12:45:08.394611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigV8e2b1k4qk04394"], "accumulated_threat_level": 7.199999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "36cd590f-29f7-4227-a49c-74d48e5dc0c9", "DetectTime": "2024-05-21T12:45:08.400036+00:00", "EventTime": "2024-05-21T12:45:08.400055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqZrm2QRicp8vwQR9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "01bad363-2815-488e-9934-582f4992df19", "DetectTime": "2024-05-21T12:45:08.404979+00:00", "EventTime": "2024-05-21T12:45:08.404999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlGJz4YjHqKoeGgdc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "45b90245-18e8-4be5-988d-dba074022255", "DetectTime": "2024-05-21T12:45:08.409338+00:00", "EventTime": "2024-05-21T12:45:08.409356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccpxro3aWmHLi6ruUi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "2f911609-5562-4029-8eca-2c12011c4d6c", "DetectTime": "2024-05-21T12:45:08.414319+00:00", "EventTime": "2024-05-21T12:45:08.414339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDM9te2ddlMz7PXbd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "80aa421a-8e1d-4f83-a940-1fe1e800d47d", "DetectTime": "2024-05-21T12:45:08.420439+00:00", "EventTime": "2024-05-21T12:45:08.420458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIejS2SRsrOt3AR8i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "044308e3-ea19-43c2-8c57-00136ea9999a", "DetectTime": "2024-05-21T12:45:08.425423+00:00", "EventTime": "2024-05-21T12:45:08.425442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPijyj1o5bbU1yAMjl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "735b0fc9-5053-41f7-99bb-a55a1e67f2f3", "DetectTime": "2024-05-21T12:45:08.440129+00:00", "EventTime": "2024-05-21T12:45:08.440150+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJGCh4eKTbVngb5yf"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "39083660-d7e6-4c75-96b6-62fd18ea2a53", "DetectTime": "2024-05-21T12:45:08.455695+00:00", "EventTime": "2024-05-21T12:45:08.455731+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJGCh4eKTbVngb5yf"], "accumulated_threat_level": 2.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "acbfa3d2-0de6-49fd-8533-6e9047675a56", "DetectTime": "2024-05-21T12:45:08.468643+00:00", "EventTime": "2024-05-21T12:45:08.468664+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUt0F71heffHOHD184"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "237ffe37-45a8-47ab-9814-143c89ef3aed", "DetectTime": "2024-05-21T12:45:08.482081+00:00", "EventTime": "2024-05-21T12:45:08.482116+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUt0F71heffHOHD184"], "accumulated_threat_level": 3.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "ec4f9a75-6d27-47c8-b39e-2cb9176344ff", "DetectTime": "2024-05-21T12:45:08.495311+00:00", "EventTime": "2024-05-21T12:45:08.495330+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvnLu4vVu1Hopokda"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "6ecff73b-71db-4cc8-8729-403277be330b", "DetectTime": "2024-05-21T12:45:08.508692+00:00", "EventTime": "2024-05-21T12:45:08.508727+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvnLu4vVu1Hopokda"], "accumulated_threat_level": 3.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "8957b7bb-de40-4a73-9947-8bf6512f4076", "DetectTime": "2024-05-21T12:45:08.521750+00:00", "EventTime": "2024-05-21T12:45:08.521771+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEOta4Ei8DGQSZXve"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "810dc561-f044-45c9-abaa-d7974ed90514", "DetectTime": "2024-05-21T12:45:08.538377+00:00", "EventTime": "2024-05-21T12:45:08.538436+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEOta4Ei8DGQSZXve"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "66e27bb6-6c5a-49b3-9c12-975ab6a92c17", "DetectTime": "2024-05-21T12:45:08.553224+00:00", "EventTime": "2024-05-21T12:45:08.553257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqnDWs4CK2L6y2Sx1b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "413dccd1-8498-4c13-b90e-2dc0288aaa86", "DetectTime": "2024-05-21T12:45:08.559051+00:00", "EventTime": "2024-05-21T12:45:08.559073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdA1Z34lm6aQFkTd7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "39cd81cd-5104-4f93-8596-fdac2ca3a6fb", "DetectTime": "2024-05-21T12:45:08.564777+00:00", "EventTime": "2024-05-21T12:45:08.564798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYeAU713XIruu7yH8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "bfbfae72-88f3-481f-9b07-5bfa7f66de3b", "DetectTime": "2024-05-21T12:45:08.569888+00:00", "EventTime": "2024-05-21T12:45:08.569906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtXKbxAk41Futxel"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "d98b0344-8939-4f5b-b535-a0aa2e86a2a7", "DetectTime": "2024-05-21T12:45:08.574577+00:00", "EventTime": "2024-05-21T12:45:08.574595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvWaC2sGIB0zLqOl6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "b0b2b41d-bca8-4126-bbf5-22e0c8e4630d", "DetectTime": "2024-05-21T12:45:08.579174+00:00", "EventTime": "2024-05-21T12:45:08.579192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iOxW2gmyvc52QFHk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "06856a32-0b7b-44ac-a0bc-eb9b842f7299", "DetectTime": "2024-05-21T12:45:08.583844+00:00", "EventTime": "2024-05-21T12:45:08.583863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTVXW3YYJljhMoCJh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "b53587c6-8423-454a-95a8-fb6c3fec3a01", "DetectTime": "2024-05-21T12:45:08.589092+00:00", "EventTime": "2024-05-21T12:45:08.589113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0zvT74j8JVKNq7KXc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "3daa9803-e770-4267-8dbf-7f60acbdb4d1", "DetectTime": "2024-05-21T12:45:08.711753+00:00", "EventTime": "2024-05-21T12:45:08.711773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7s84N317aOrF9FU4i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 139} +{"Format": "IDEA0", "ID": "d5d1a1e8-1ec2-49fd-8f59-3f3018169d9c", "DetectTime": "2024-05-21T12:45:08.784042+00:00", "EventTime": "2024-05-21T12:45:08.784062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcApoc4HWx6BsdYtgl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "20c2dbd7-c938-4b0a-8d5b-67201919467d", "DetectTime": "2024-05-21T12:45:08.790664+00:00", "EventTime": "2024-05-21T12:45:08.790686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZaEgO1OEhPL0LTwuh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "a94c9b03-968b-41cf-aabe-eaed4dd17cba", "DetectTime": "2024-05-21T12:45:08.797113+00:00", "EventTime": "2024-05-21T12:45:08.797134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZWYr3qBrrbuHqB4b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "4eacfbdf-e3dc-406a-aa58-69c8abee2d56", "DetectTime": "2024-05-21T12:45:08.802360+00:00", "EventTime": "2024-05-21T12:45:08.802378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOVXv3SZEHHgC7MPe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "d030f399-1eff-4802-812b-c4a2dee2819b", "DetectTime": "2024-05-21T12:45:08.807275+00:00", "EventTime": "2024-05-21T12:45:08.807293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPbv97nfxlfE8TCh3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "38df13af-af64-47e0-b268-c041e3f3c1bd", "DetectTime": "2024-05-21T12:45:08.847498+00:00", "EventTime": "2024-05-21T12:45:08.847522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWMOZC2q1VEBWXnBlc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "6cf84f74-5e9f-4711-9560-20b5b12f1a1c", "DetectTime": "2024-05-21T12:45:09.026421+00:00", "EventTime": "2024-05-21T12:45:09.026443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKPXHEAFMpJopt5Ub"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "854bdeb9-6460-4e4d-b163-96315cde3bd0", "DetectTime": "2024-05-21T12:45:09.192848+00:00", "EventTime": "2024-05-21T12:45:09.192872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkXrr23m4bSryuMWs2", "Cy1YKx4UMBK8YXZe6g", "COScA61AW1MCk0PJ87", "Cf6K8O39kwJPGZFANd"], "accumulated_threat_level": 0.5, "timewindow": 143} +{"Format": "IDEA0", "ID": "10f50910-076e-4abc-83b1-51834c85adae", "DetectTime": "2024-05-21T12:45:09.271907+00:00", "EventTime": "2024-05-21T12:45:09.271933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crw6Ht4TZdZ6iKJsJg"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "cbe84a50-2e78-4448-be39-7b37fa723fd2", "DetectTime": "2024-05-21T12:45:09.314295+00:00", "EventTime": "2024-05-21T12:45:09.314315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCbf4N2ezpTJ61I05c"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "f90afdbf-831f-4515-a2f9-84b15213b441", "DetectTime": "2024-05-21T12:45:09.320028+00:00", "EventTime": "2024-05-21T12:45:09.320048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cczp01YZoOTtApcwl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "47006df6-2c3c-4916-9448-1792ef2dbf92", "DetectTime": "2024-05-21T12:45:09.324821+00:00", "EventTime": "2024-05-21T12:45:09.324841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5YB21QTqD6ik7oU2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "0f33e2a0-0864-42ce-92fe-c0527c51f0df", "DetectTime": "2024-05-21T12:45:09.330084+00:00", "EventTime": "2024-05-21T12:45:09.330105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLJ49sn37gyVXwS2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "eebdc88e-af44-4a0e-912f-0d1c3b1821da", "DetectTime": "2024-05-21T12:45:09.678753+00:00", "EventTime": "2024-05-21T12:45:09.678781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CklD1Pgl45utViB4"], "accumulated_threat_level": 0.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "62774833-90e3-470c-a343-d6d5c3c51c3b", "DetectTime": "2024-05-21T12:45:09.684396+00:00", "EventTime": "2024-05-21T12:45:09.684417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CskhVB4m6iyftpqVi5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "445727e8-a39b-4550-8e00-1db37053a5eb", "DetectTime": "2024-05-21T12:45:09.689435+00:00", "EventTime": "2024-05-21T12:45:09.689453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKaMZ43WHYpFKG1qM3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "e4078b1c-2589-428b-9e12-bcea5b6681a5", "DetectTime": "2024-05-21T12:45:09.694203+00:00", "EventTime": "2024-05-21T12:45:09.694222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmF0Mp4B0Sd7rboOd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "d1f6e481-5337-47b3-96ce-410e3bfb737e", "DetectTime": "2024-05-21T12:45:09.723046+00:00", "EventTime": "2024-05-21T12:45:09.723073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4B1gO2djusLe0CMM4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "4d940640-fc4a-4222-82a4-76f9964a8fa9", "DetectTime": "2024-05-21T12:45:09.952318+00:00", "EventTime": "2024-05-21T12:45:09.952341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFzcnq1CdCKxOOtLF1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "6cc43420-4bb8-4664-bb9e-d5ec27c05eba", "DetectTime": "2024-05-21T12:45:10.131803+00:00", "EventTime": "2024-05-21T12:45:10.131827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs0LC439IsIx77LH1f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "329ebcb2-c32c-400f-8ed1-6e53a4ef1a0a", "DetectTime": "2024-05-21T12:45:10.138835+00:00", "EventTime": "2024-05-21T12:45:10.138857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxourbyWgvjGZNCV8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "4c1d1d81-12d2-4789-9216-c4e15bc86c7c", "DetectTime": "2024-05-21T12:45:10.174363+00:00", "EventTime": "2024-05-21T12:45:10.174388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIwVmx2jTa2RpDdkH6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "b69cded1-4e11-49ee-a507-789f14f7317c", "DetectTime": "2024-05-21T12:45:10.224680+00:00", "EventTime": "2024-05-21T12:45:10.224707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap0mc1GFDMD2Lca0f"], "accumulated_threat_level": 1.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "11f3c155-20f7-468f-af6e-848ca32f4c5e", "DetectTime": "2024-05-21T12:45:10.229927+00:00", "EventTime": "2024-05-21T12:45:10.229946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clsobm3jFublWLO7o5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "af77318d-a258-473e-8393-29bd01ddd6a8", "DetectTime": "2024-05-21T12:45:10.245632+00:00", "EventTime": "2024-05-21T12:45:10.245651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCatfb1PKeqOThUEOj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "31047400-4aa3-4702-bc6c-133c4b62cfbb", "DetectTime": "2024-05-21T12:45:10.267517+00:00", "EventTime": "2024-05-21T12:45:10.267537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvwkj6xct1k5xeOi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "165fbc68-a640-423c-8c8e-eb09734e3013", "DetectTime": "2024-05-21T12:45:10.636159+00:00", "EventTime": "2024-05-21T12:45:10.636182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBBdRd1cLwSiYUqOg6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "2ae9406d-104c-4b86-a1c4-cbc29913e0a1", "DetectTime": "2024-05-21T12:45:10.690308+00:00", "EventTime": "2024-05-21T12:45:10.690332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeG7GJYykGSeDFAV9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "9db78724-c25f-4bda-a9f3-06e0ec1154ed", "DetectTime": "2024-05-21T12:45:10.695867+00:00", "EventTime": "2024-05-21T12:45:10.695885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCnRbN22ymeWub0Ye3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "44710ff6-663b-4ad8-92af-917029c76c91", "DetectTime": "2024-05-21T12:45:10.700612+00:00", "EventTime": "2024-05-21T12:45:10.700631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chqb0b177bJorijS49"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "00347a36-76b4-4404-8638-2bc795257dfe", "DetectTime": "2024-05-21T12:45:10.721278+00:00", "EventTime": "2024-05-21T12:45:10.721318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cep8631w0R05C0oEYe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 140} +{"Format": "IDEA0", "ID": "79449482-0327-436d-8684-d7d1d30e1d01", "DetectTime": "2024-05-21T12:45:10.726595+00:00", "EventTime": "2024-05-21T12:45:10.726615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jFw2L0TqF93r0Vk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "3fe31dc6-ed76-4c88-8a7c-326e5c497c5b", "DetectTime": "2024-05-21T12:45:11.126093+00:00", "EventTime": "2024-05-21T12:45:11.126117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEPkQ1SqX0gVXzLe9"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9050f8fd-e16b-46f8-9c33-ae911cbf6270", "DetectTime": "2024-05-21T12:45:11.140174+00:00", "EventTime": "2024-05-21T12:45:11.140197+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEPkQ1SqX0gVXzLe9"], "accumulated_threat_level": 4.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "9940b26f-1443-42bd-b8d5-d58cbbf10689", "DetectTime": "2024-05-21T12:45:11.145687+00:00", "EventTime": "2024-05-21T12:45:11.145708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDUEE4DUyINeEoduj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "14ee3587-1522-42e0-838b-a49a9694440b", "DetectTime": "2024-05-21T12:45:11.162026+00:00", "EventTime": "2024-05-21T12:45:11.162047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJNAJeHJhzgXbyS8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "79601248-b108-4207-ac62-c4024148c8ec", "DetectTime": "2024-05-21T12:45:11.201753+00:00", "EventTime": "2024-05-21T12:45:11.201771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cob4pj49jyee4AN1l3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "7dece7e2-23a1-4f05-8bac-a04ef0919ded", "DetectTime": "2024-05-21T12:45:11.225786+00:00", "EventTime": "2024-05-21T12:45:11.225810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwR8m2kJHAAMMZpf8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "053c4e50-dc88-4a4f-8023-eeb4ad8765ba", "DetectTime": "2024-05-21T12:45:11.256833+00:00", "EventTime": "2024-05-21T12:45:11.256854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGAhX2kJx2dslB1H9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "6e9dbb7d-20a1-4d08-a1f4-ebc9e1a33a83", "DetectTime": "2024-05-21T12:45:11.267680+00:00", "EventTime": "2024-05-21T12:45:11.267701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDJcqtWmoNUOxAhmg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "c2cf8903-f2be-465e-8a00-d5bd5c079e41", "DetectTime": "2024-05-21T12:45:11.386835+00:00", "EventTime": "2024-05-21T12:45:11.386856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39DmU4cYEorxDfvl"], "accumulated_threat_level": 3.2, "timewindow": 140} +{"Format": "IDEA0", "ID": "037e4b7a-eebf-4b1b-b0fa-f5665d17a07d", "DetectTime": "2024-05-21T12:45:11.624891+00:00", "EventTime": "2024-05-21T12:45:11.624911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK88Bq4sLv2BrkwhGd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "88780996-4ba1-446f-be30-bcc77258e05b", "DetectTime": "2024-05-21T12:45:11.726158+00:00", "EventTime": "2024-05-21T12:45:11.726178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnucpP3TcmnTkD8hV7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "ec97e88a-cf2b-4ac4-9e83-310d336e39c6", "DetectTime": "2024-05-21T12:45:11.737791+00:00", "EventTime": "2024-05-21T12:45:11.737811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgiUNdSeVAEMNhFk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "82f3e076-2bf5-4c7a-be33-7f83e616c81a", "DetectTime": "2024-05-21T12:45:11.742549+00:00", "EventTime": "2024-05-21T12:45:11.742568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRaQY2Qpmy3XTBMng"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "ba390ac8-c84f-42c3-bda5-bafe0f4f10b5", "DetectTime": "2024-05-21T12:45:11.773474+00:00", "EventTime": "2024-05-21T12:45:11.773494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDorYzEdSrZPO92Aj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "85bb0845-16e0-4e31-8382-c861ef4f9f30", "DetectTime": "2024-05-21T12:45:11.883575+00:00", "EventTime": "2024-05-21T12:45:11.883597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1k1xcM5wBd7S8rHg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "724435ba-6536-4720-97c6-ae0b569885dc", "DetectTime": "2024-05-21T12:45:11.926633+00:00", "EventTime": "2024-05-21T12:45:11.926651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl3Bjn6qzQw28rm8g"], "accumulated_threat_level": 4.0, "timewindow": 140} +{"Format": "IDEA0", "ID": "1e6b3b92-2fa8-4dc6-b42e-7722423f9143", "DetectTime": "2024-05-21T12:45:12.219312+00:00", "EventTime": "2024-05-21T12:45:12.219333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMd8SR1p5SComBJQff"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "71718208-0c8a-4f81-88d7-5f9e60be3f48", "DetectTime": "2024-05-21T12:45:12.224399+00:00", "EventTime": "2024-05-21T12:45:12.224423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsJlg32C5hbKW6Gc4a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "90fd8d5d-d6ea-4d7e-b94f-9a294a74e41e", "DetectTime": "2024-05-21T12:45:12.266822+00:00", "EventTime": "2024-05-21T12:45:12.266840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2ObE14RE6Pxc0CEg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "4ad5ca4c-3459-4633-a4a6-2a9104475109", "DetectTime": "2024-05-21T12:45:12.350651+00:00", "EventTime": "2024-05-21T12:45:12.350677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsclp1itghHIw7t12"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "e17e8b76-c972-4344-bf43-64349307c7f5", "DetectTime": "2024-05-21T12:45:12.482569+00:00", "EventTime": "2024-05-21T12:45:12.482588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CknmKa3NHAY836y9x2"], "accumulated_threat_level": 4.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "47ca848b-7365-4643-834d-7323c882f9c0", "DetectTime": "2024-05-21T12:45:12.504809+00:00", "EventTime": "2024-05-21T12:45:12.504831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci774t4zhWH0YYT5Fg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 137} +{"Format": "IDEA0", "ID": "0da83e1f-23a6-4e8e-9a96-6846148f2af3", "DetectTime": "2024-05-21T12:45:12.547017+00:00", "EventTime": "2024-05-21T12:45:12.547038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.38.35.229 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0jofi35KJwJXY57Uf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "46cde697-f007-42a5-9875-5b05874eabf7", "DetectTime": "2024-05-21T12:45:12.553553+00:00", "EventTime": "2024-05-21T12:45:12.553582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch68Vz1BU0ErkFdWej"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "bc553995-71e7-4639-97bb-494b1dcc3214", "DetectTime": "2024-05-21T12:45:12.597902+00:00", "EventTime": "2024-05-21T12:45:12.597925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5OExODyMSBz6UfRk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "9679c2c6-b000-4f94-92a2-aead3cda5368", "DetectTime": "2024-05-21T12:45:12.633688+00:00", "EventTime": "2024-05-21T12:45:12.633714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceqlxk43KpAzTyxHn5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "7b0ad59f-8105-4e75-8ae2-bbdec7af1e75", "DetectTime": "2024-05-21T12:45:12.985280+00:00", "EventTime": "2024-05-21T12:45:12.985298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDO7z1cc7G4nI7DL9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "9002828a-ae49-4ca0-82ff-7feb9c8b37c0", "DetectTime": "2024-05-21T12:45:13.002588+00:00", "EventTime": "2024-05-21T12:45:13.002610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJHMW5124S5D0U7VD5"], "accumulated_threat_level": 5.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "9eb6921c-2338-4469-b7d3-9df6f37ba814", "DetectTime": "2024-05-21T12:45:13.007471+00:00", "EventTime": "2024-05-21T12:45:13.007490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdMaZ1GIW9omkPMz3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "41ff117d-be41-4509-96f8-bf1f93f55420", "DetectTime": "2024-05-21T12:45:13.119857+00:00", "EventTime": "2024-05-21T12:45:13.119877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1a2nS3O6GrTtivxq2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "b7ec372b-936a-4627-9266-bf6edb13be4c", "DetectTime": "2024-05-21T12:45:13.125781+00:00", "EventTime": "2024-05-21T12:45:13.125802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eZCtyCEpEA2xjk4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "8356108a-e47c-46bd-bab5-9e7d8a44142b", "DetectTime": "2024-05-21T12:45:13.135752+00:00", "EventTime": "2024-05-21T12:45:13.135772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC19h81ZY0SqAw2ruk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "125da1b4-2b2c-443d-a290-bf61df3b892a", "DetectTime": "2024-05-21T12:45:13.461940+00:00", "EventTime": "2024-05-21T12:45:13.461961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgzDXv1zFJNrj96XF8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "e92152db-b65e-42de-899e-b957408e2d00", "DetectTime": "2024-05-21T12:45:13.522644+00:00", "EventTime": "2024-05-21T12:45:13.522666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmJGLLQyMgwo7lT9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 140} +{"Format": "IDEA0", "ID": "f133fd23-1af2-4f0a-9316-14c576e44c40", "DetectTime": "2024-05-21T12:45:13.538784+00:00", "EventTime": "2024-05-21T12:45:13.538805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNCXOBGc1hltavaf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "9f74031b-5fb4-48ce-9bfa-7c134303d99f", "DetectTime": "2024-05-21T12:45:13.613307+00:00", "EventTime": "2024-05-21T12:45:13.613330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXtEN1RQkQpM8Yzii"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "64628fea-cc32-4ae6-8926-06f78a63ab47", "DetectTime": "2024-05-21T12:45:13.618422+00:00", "EventTime": "2024-05-21T12:45:13.618445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNhn11dQbdskdgRh1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "f11c500a-d2db-4fad-a404-5e6a5498edac", "DetectTime": "2024-05-21T12:45:13.696432+00:00", "EventTime": "2024-05-21T12:45:13.696452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvw6v2DQe7pgel2Q4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "19d23ddf-c5f3-4d6c-a45e-6cc85eb8615d", "DetectTime": "2024-05-21T12:45:13.727451+00:00", "EventTime": "2024-05-21T12:45:13.727473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsWGx18rIH03mh44"], "accumulated_threat_level": 7.199999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "0078c769-79b1-4f46-a713-4fd0db92f499", "DetectTime": "2024-05-21T12:45:13.747325+00:00", "EventTime": "2024-05-21T12:45:13.747347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4xUj1Ce4XZXSakA3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "6e111f44-ea44-4849-8591-602a01e63cb0", "DetectTime": "2024-05-21T12:45:14.050766+00:00", "EventTime": "2024-05-21T12:45:14.050791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE2w5l4JoTjIqxdE7c"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "219c5af2-c459-4b09-8ef0-2f52fb0287fd", "DetectTime": "2024-05-21T12:45:14.123181+00:00", "EventTime": "2024-05-21T12:45:14.123205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4FdfvYIjwO7QZph"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "677b0fde-873b-4dae-a11c-f1088e2c082d", "DetectTime": "2024-05-21T12:45:14.131429+00:00", "EventTime": "2024-05-21T12:45:14.131450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYaASx4OzXMJEkHZ8f"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "dd011346-0722-4654-87aa-1b7732ada316", "DetectTime": "2024-05-21T12:45:14.138215+00:00", "EventTime": "2024-05-21T12:45:14.138234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YveFCexYh6OQEah"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "81499775-9109-4a2e-9e03-295342959f41", "DetectTime": "2024-05-21T12:45:14.142996+00:00", "EventTime": "2024-05-21T12:45:14.143015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CooaJ01YY5tjnE2f57"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "b695d040-d00e-45ba-8110-b40539f873ea", "DetectTime": "2024-05-21T12:45:14.147687+00:00", "EventTime": "2024-05-21T12:45:14.147705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFUz711Ap0NnvMzV4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "b9f42f95-df07-404b-9cda-aa929883669f", "DetectTime": "2024-05-21T12:45:14.153061+00:00", "EventTime": "2024-05-21T12:45:14.153082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJv38y42WdLxRGxQ25"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "77a5b5c8-e5f1-4454-bbbd-96f7c00fac58", "DetectTime": "2024-05-21T12:45:14.165949+00:00", "EventTime": "2024-05-21T12:45:14.165973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcpkOr4ul1SZpBbOI9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "17cc0fd3-18f4-49a9-a4df-7eec0ed7987a", "DetectTime": "2024-05-21T12:45:14.675225+00:00", "EventTime": "2024-05-21T12:45:14.675244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CITvZ83XsbuiHrGbJ1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "6a40ce6b-4642-41c3-8ebf-7bfcc51ff40b", "DetectTime": "2024-05-21T12:45:14.680868+00:00", "EventTime": "2024-05-21T12:45:14.680887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZqBOO35i9Dzk6yNJj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "d49607e5-b319-4deb-a002-f3389797cc03", "DetectTime": "2024-05-21T12:45:14.686894+00:00", "EventTime": "2024-05-21T12:45:14.686915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2GULpkxJmjilW1Cb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "36e4b951-bdd0-4176-ad68-21139176ac08", "DetectTime": "2024-05-21T12:45:14.691913+00:00", "EventTime": "2024-05-21T12:45:14.691933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZBKy4pbInlDv9c2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "3eb25544-9b7b-4fd3-9750-123b7b18fa36", "DetectTime": "2024-05-21T12:45:14.697906+00:00", "EventTime": "2024-05-21T12:45:14.697927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD0jhX3CeihzEcVeP7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "8c47ff4c-45b0-4c9e-8efc-ae5eccc0e0ed", "DetectTime": "2024-05-21T12:45:15.038114+00:00", "EventTime": "2024-05-21T12:45:15.038132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKjcr0180qIw1fonfb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "d069ba67-8369-4839-9e26-642db832f64e", "DetectTime": "2024-05-21T12:45:15.061561+00:00", "EventTime": "2024-05-21T12:45:15.061584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyU8s66lSbli93Uq2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "230b59ee-4748-4f19-a4b4-c38d32bf6471", "DetectTime": "2024-05-21T12:45:15.074689+00:00", "EventTime": "2024-05-21T12:45:15.074708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMDxteGJHYYoMCad"], "accumulated_threat_level": 8.799999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "8d97fef1-e292-4e08-b14e-02b835b29b92", "DetectTime": "2024-05-21T12:45:15.254056+00:00", "EventTime": "2024-05-21T12:45:15.254077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzqITC410SzGXgYze9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "e9d7931c-e489-454d-b8f1-b07fda7801b5", "DetectTime": "2024-05-21T12:45:15.292108+00:00", "EventTime": "2024-05-21T12:45:15.292131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCWltk16cQkL76ny5h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "365ed926-d02c-4b5a-90fb-3879e594c978", "DetectTime": "2024-05-21T12:45:15.300525+00:00", "EventTime": "2024-05-21T12:45:15.300544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5keaY1TtEidvjxsL4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "e3ca5d86-2e8d-49ba-9344-90ff408be19e", "DetectTime": "2024-05-21T12:45:15.347236+00:00", "EventTime": "2024-05-21T12:45:15.347258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8itP2oYhvqwkre73"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "82ab5db7-6563-4bea-9ad2-a17bfbf00ff8", "DetectTime": "2024-05-21T12:45:15.380815+00:00", "EventTime": "2024-05-21T12:45:15.380839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNEWts22AGrHzYOIFe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "353e8101-4431-440a-a0b5-51ce443b0141", "DetectTime": "2024-05-21T12:45:15.645335+00:00", "EventTime": "2024-05-21T12:45:15.645356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClKUez2m4wK6kWlY1k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "19ffbb58-395c-4331-b0ed-8d694ca552fe", "DetectTime": "2024-05-21T12:45:15.673261+00:00", "EventTime": "2024-05-21T12:45:15.673280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJtdX2GFrdIQRybEf"], "accumulated_threat_level": 9.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "c7a58c05-d85c-4f60-8c57-5cd7824585f4", "DetectTime": "2024-05-21T12:45:15.817416+00:00", "EventTime": "2024-05-21T12:45:15.817455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLG2AgEFjiVg9Ira"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "1a59c33d-57d5-4df7-ab69-b119f111ffb6", "DetectTime": "2024-05-21T12:45:15.839105+00:00", "EventTime": "2024-05-21T12:45:15.839128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7OrqD26f3cAcJyWk9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "90c96b49-5eb7-4d04-99f6-8dab119bc5e1", "DetectTime": "2024-05-21T12:45:15.928917+00:00", "EventTime": "2024-05-21T12:45:15.928939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHa2Yc2fOSKSsX9RBb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "62904a8a-e861-4663-8241-e9196653f976", "DetectTime": "2024-05-21T12:45:15.936680+00:00", "EventTime": "2024-05-21T12:45:15.936700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMcNJ3NiafcAiW8Cb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "4595d59e-3815-4b26-95cd-e325f6a8995c", "DetectTime": "2024-05-21T12:45:15.941976+00:00", "EventTime": "2024-05-21T12:45:15.941995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYxHzT3qiTT0VTE7f1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "480eb13c-4078-4242-9446-4288ee71c78e", "DetectTime": "2024-05-21T12:45:15.948611+00:00", "EventTime": "2024-05-21T12:45:15.948632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cja7Gl2h4QYUmWpX3l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "20d4cfe3-75c5-49c2-8767-f66ca4a28b53", "DetectTime": "2024-05-21T12:45:15.953535+00:00", "EventTime": "2024-05-21T12:45:15.953555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRf7s145N969U53NI8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "8c1bd152-ad4e-4d4d-ba13-cc597d8cc16e", "DetectTime": "2024-05-21T12:45:16.283562+00:00", "EventTime": "2024-05-21T12:45:16.283583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkUUa4AiSJjY9l1ra"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "fd16a9fa-59b2-45d2-94f7-f3339c717310", "DetectTime": "2024-05-21T12:45:16.289681+00:00", "EventTime": "2024-05-21T12:45:16.289701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP60iKWdgIFY0b5ml"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "fcb8a54e-9093-40a8-909f-6ebf989fa673", "DetectTime": "2024-05-21T12:45:16.471473+00:00", "EventTime": "2024-05-21T12:45:16.471495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9rTzX2HfsNcL5xL63"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "61bab6a7-2dcd-4896-abd0-4727d449d67f", "DetectTime": "2024-05-21T12:45:16.477064+00:00", "EventTime": "2024-05-21T12:45:16.477082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcWc3l1key1mWAgLBb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "9497c9d3-64d2-41b5-932d-e58a0870fdab", "DetectTime": "2024-05-21T12:45:16.482013+00:00", "EventTime": "2024-05-21T12:45:16.482033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C69nsT2S0bBMiUgXQ9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "45134355-a3dd-4fac-a52a-4b1a362c4daf", "DetectTime": "2024-05-21T12:45:16.487274+00:00", "EventTime": "2024-05-21T12:45:16.487293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPILns456rOfYbVXHg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "f1bda769-dada-45ab-94c4-55cfcf17e5c4", "DetectTime": "2024-05-21T12:45:16.492605+00:00", "EventTime": "2024-05-21T12:45:16.492625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYnPbz44C9yx8BFFQh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "62be4713-20ba-4879-863c-d28826f1cfc8", "DetectTime": "2024-05-21T12:45:16.815275+00:00", "EventTime": "2024-05-21T12:45:16.815295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwCMHWkzOhUVXkl2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 140} +{"Format": "IDEA0", "ID": "8f707615-190e-408d-9786-f1a6a74e9799", "DetectTime": "2024-05-21T12:45:16.820756+00:00", "EventTime": "2024-05-21T12:45:16.820775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7hQm6jn3XQGPnuQ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "8c6f4973-cfff-4b1e-b76f-d95574335fee", "DetectTime": "2024-05-21T12:45:16.889032+00:00", "EventTime": "2024-05-21T12:45:16.889054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPz0gH2hfjNv4PKCY8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "b7933a22-7e4f-4027-9438-7d3abb1ebe38", "DetectTime": "2024-05-21T12:45:17.108328+00:00", "EventTime": "2024-05-21T12:45:17.108349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYdES2OJwvSQbgPB4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "b076c102-5c24-451c-abdf-7d60c4a73833", "DetectTime": "2024-05-21T12:45:17.125699+00:00", "EventTime": "2024-05-21T12:45:17.125720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COFJ1Y3YiXfggN6qgl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "a105381d-c107-423d-9a8c-fca9f355384d", "DetectTime": "2024-05-21T12:45:17.130948+00:00", "EventTime": "2024-05-21T12:45:17.130966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzMyI3KjvTZiGEQgb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "5d1e38b8-43b4-4851-bf0f-e2b39167a0d2", "DetectTime": "2024-05-21T12:45:17.406474+00:00", "EventTime": "2024-05-21T12:45:17.406496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7VvAhlhpXT6EVRoj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "def46a8f-f013-4cb5-b550-344fce6df516", "DetectTime": "2024-05-21T12:45:17.412982+00:00", "EventTime": "2024-05-21T12:45:17.413001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFR2Wf1Ar27VAEyDy6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "d2754bda-f846-4711-8f69-9b7ec8e7a4ce", "DetectTime": "2024-05-21T12:45:17.417627+00:00", "EventTime": "2024-05-21T12:45:17.417646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFAPrUtRbp5rqv4l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "bf1e91b5-9d98-4e83-bb10-c18636d06d91", "DetectTime": "2024-05-21T12:45:17.432634+00:00", "EventTime": "2024-05-21T12:45:17.432652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqv0W22v8vNEgDNdE7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 140} +{"Format": "Json", "ID": "bf1e91b5-9d98-4e83-bb10-c18636d06d91", "DetectTime": "2024-05-21T12:45:17.432634+00:00", "EventTime": "2024-05-21T12:45:17.432652+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-06T19:09:37.151473+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2024/05/21 12:45:17.593650)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 140, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0a237938-1e59-4dbe-9fe0-747360d4ef79", "DetectTime": "2024-05-21T12:45:17.598842+00:00", "EventTime": "2024-05-21T12:45:17.598864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuutpL2ixVpNTRta"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "74c97f8f-fa30-4e38-9ec5-c3416aa12282", "DetectTime": "2024-05-21T12:45:17.604472+00:00", "EventTime": "2024-05-21T12:45:17.604492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CManjJ1g9af8i5NUMg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "2ccd1776-46f8-45b0-bca9-f4f8b212cca1", "DetectTime": "2024-05-21T12:45:17.885335+00:00", "EventTime": "2024-05-21T12:45:17.885356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZUFVx36BeYrmbIFg7"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "11dc8bef-c5c8-4426-a13f-8717e459c520", "DetectTime": "2024-05-21T12:45:18.023841+00:00", "EventTime": "2024-05-21T12:45:18.023866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPQKi4qYAbx9UJ9z3"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "2478c53e-0a8a-4473-b617-04445cd35676", "DetectTime": "2024-05-21T12:45:18.028843+00:00", "EventTime": "2024-05-21T12:45:18.028862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKa3l4M2qZw05zDj5"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "70440487-4144-41c5-b38c-ac687d7feae8", "DetectTime": "2024-05-21T12:45:18.080638+00:00", "EventTime": "2024-05-21T12:45:18.080660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfeO4b30YRLiGl1iJi"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "7f20845a-ea64-4ccd-953c-0702a508d5bf", "DetectTime": "2024-05-21T12:45:18.125250+00:00", "EventTime": "2024-05-21T12:45:18.125270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigZJgemGpvHeGdd2"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "c5d47ce2-35a8-4a32-87ef-aec134ace654", "DetectTime": "2024-05-21T12:45:18.130539+00:00", "EventTime": "2024-05-21T12:45:18.130559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEE76P2WTXeASRkslc"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "3ab7cd3d-7524-4de8-bf90-e25a7be696f5", "DetectTime": "2024-05-21T12:45:18.135183+00:00", "EventTime": "2024-05-21T12:45:18.135201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfjGoZOnzX6f9nPo5"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "a9c443b3-49a7-4c03-9dbc-fce435f3d1c3", "DetectTime": "2024-05-21T12:45:18.139686+00:00", "EventTime": "2024-05-21T12:45:18.139704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwWCYsN00lFAT6m6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 138} +{"Format": "IDEA0", "ID": "f30294c8-cd63-41ee-98f6-486a7a00ec28", "DetectTime": "2024-05-21T12:45:18.184293+00:00", "EventTime": "2024-05-21T12:45:18.184311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzMM2Aupm3m6ThsT3"], "accumulated_threat_level": 0.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "c0026bbb-998f-48b5-969c-3b91259116a3", "DetectTime": "2024-05-21T12:45:18.216564+00:00", "EventTime": "2024-05-21T12:45:18.216592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUbkeB3baXtBg2udRa"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "21123a5c-40ee-45a2-bd55-0f239130c935", "DetectTime": "2024-05-21T12:45:18.593217+00:00", "EventTime": "2024-05-21T12:45:18.593239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CESoRz28O8so9pPdy"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "56dfcc17-85d2-421b-a6f5-4276edcf6493", "DetectTime": "2024-05-21T12:45:18.627679+00:00", "EventTime": "2024-05-21T12:45:18.627702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqL5uX3g6FJ3NQ0Njl"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "4e7a4c8d-2ea3-4864-a2be-11b65ce44261", "DetectTime": "2024-05-21T12:45:18.728950+00:00", "EventTime": "2024-05-21T12:45:18.728973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxNP24nduKG1FfEX2"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "d6f3c369-e3f0-4454-b80f-6e15d2abd22f", "DetectTime": "2024-05-21T12:45:18.744605+00:00", "EventTime": "2024-05-21T12:45:18.744628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZ63e46R9HxKb9e4i"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "4905d05d-fb43-4f88-b91f-070df4285bc9", "DetectTime": "2024-05-21T12:45:18.752108+00:00", "EventTime": "2024-05-21T12:45:18.752127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CESiXG2heEfVFZSvPb"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "0008441c-b33b-4034-928b-a63de5156428", "DetectTime": "2024-05-21T12:45:18.757288+00:00", "EventTime": "2024-05-21T12:45:18.757308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMmaq2XKzkhLU8sJ6"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "1ae1e148-3f70-4ab3-b824-cad6609c7ba1", "DetectTime": "2024-05-21T12:45:18.790506+00:00", "EventTime": "2024-05-21T12:45:18.790527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeCms3czsLLUeuGvk"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5fe47136-7a59-4f80-a327-fec379d981e9", "DetectTime": "2024-05-21T12:45:18.795506+00:00", "EventTime": "2024-05-21T12:45:18.795525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cixaag6Tl0xzH6Fl6"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "aeda4189-0b66-4be1-b222-c64796a84768", "DetectTime": "2024-05-21T12:45:19.136333+00:00", "EventTime": "2024-05-21T12:45:19.136353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKbdry2QFreYwgcWEl"], "accumulated_threat_level": 1.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "4a413096-77c8-4706-81c9-2d749f51ce1e", "DetectTime": "2024-05-21T12:45:19.216071+00:00", "EventTime": "2024-05-21T12:45:19.216094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxhVjp3gliy7uYYIs6"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "bd6509a0-db26-47e9-a41b-d5376da79686", "DetectTime": "2024-05-21T12:45:19.299552+00:00", "EventTime": "2024-05-21T12:45:19.299575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYGvF3bZUtnzTJI83"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "ff50dde0-07c6-4e1f-9335-12dfa4aa831f", "DetectTime": "2024-05-21T12:45:19.306928+00:00", "EventTime": "2024-05-21T12:45:19.306948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1bia2vNsXyqUb7O8"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "1fb43398-e650-44b7-b3b7-2c398cf07894", "DetectTime": "2024-05-21T12:45:19.313785+00:00", "EventTime": "2024-05-21T12:45:19.313804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQ04T1Ms4DH5rLB4b"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "97bebf61-82b3-4547-9428-7f10db9e145d", "DetectTime": "2024-05-21T12:45:19.318511+00:00", "EventTime": "2024-05-21T12:45:19.318530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C53nSO2cdXwf98YAh4"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "83e6025b-eb9f-4f35-9130-bf45b80f0228", "DetectTime": "2024-05-21T12:45:19.673769+00:00", "EventTime": "2024-05-21T12:45:19.673792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVDZJ2Knt0uhHOES6"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "4c865224-f905-4676-8b0f-c810e5656f52", "DetectTime": "2024-05-21T12:45:19.689541+00:00", "EventTime": "2024-05-21T12:45:19.689565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZq0G3Ep3Rf8qLR0h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 140} +{"Format": "IDEA0", "ID": "562129dd-df04-4551-b469-a9e23e46dce3", "DetectTime": "2024-05-21T12:45:19.694748+00:00", "EventTime": "2024-05-21T12:45:19.694768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0yep1AIsd2NlW4G7"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "6caea419-9473-4e30-b37e-5419a3d5a733", "DetectTime": "2024-05-21T12:45:19.826091+00:00", "EventTime": "2024-05-21T12:45:19.826115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj8wAv29yR9zBzzv5j"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "8d250819-c1bd-49c7-ba87-c78523af2fd8", "DetectTime": "2024-05-21T12:45:19.860527+00:00", "EventTime": "2024-05-21T12:45:19.860550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXh32f1wc1hVbMxCIl"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "c15aa2ce-e442-4a2f-b56e-df8964a7ffff", "DetectTime": "2024-05-21T12:45:19.894449+00:00", "EventTime": "2024-05-21T12:45:19.894470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsNd4d1UwxYRDVfVa"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5f03df20-9490-4c72-8ada-a3ee118daf46", "DetectTime": "2024-05-21T12:45:20.147341+00:00", "EventTime": "2024-05-21T12:45:20.147362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuzbTC2peD3HjNDdC5"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "f0ca8672-9c6d-48f8-97ef-9033f9ba0b22", "DetectTime": "2024-05-21T12:45:20.226968+00:00", "EventTime": "2024-05-21T12:45:20.226988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czw0183O1W6IZiaAG"], "accumulated_threat_level": 3.2, "timewindow": 140} +{"Format": "IDEA0", "ID": "26ee1c32-bcf7-468f-8090-29d8ec9dafcc", "DetectTime": "2024-05-21T12:45:20.239065+00:00", "EventTime": "2024-05-21T12:45:20.239098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CShwHA2bKKh3Ai4Gfb"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "98e67ce4-d2c1-4293-926c-5b5a1e28bd70", "DetectTime": "2024-05-21T12:45:20.275196+00:00", "EventTime": "2024-05-21T12:45:20.275218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ3gf91QyN9zhWxwPj"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "b6b47cbb-4270-404e-af5c-537be379181c", "DetectTime": "2024-05-21T12:45:20.400398+00:00", "EventTime": "2024-05-21T12:45:20.400419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduojkfsFfJacMNH6"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "dd0c68c9-dc77-4b6a-8deb-24af54b5a089", "DetectTime": "2024-05-21T12:45:20.425812+00:00", "EventTime": "2024-05-21T12:45:20.425834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClP49uj9Du9lL8xZa"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "b2188243-5533-4883-ae06-bba8ce305e54", "DetectTime": "2024-05-21T12:45:20.432446+00:00", "EventTime": "2024-05-21T12:45:20.432466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLppm12A7ynhrX18Sl"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5ae7c2ac-a29c-4df2-8fa3-3a50336dc61a", "DetectTime": "2024-05-21T12:45:20.437890+00:00", "EventTime": "2024-05-21T12:45:20.437910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjLew842uxqGRXAVZh"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "f631ca46-ec0a-4cdd-a59e-9383025c8e81", "DetectTime": "2024-05-21T12:45:20.442958+00:00", "EventTime": "2024-05-21T12:45:20.442978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGUkP3e2EP7yTCXq4"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "a3fe3b95-33d0-45bc-9157-3334ee3c6331", "DetectTime": "2024-05-21T12:45:20.851367+00:00", "EventTime": "2024-05-21T12:45:20.851389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtPz7d2Afe9wprIDK7"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "9f107837-c805-4844-9019-cdcd8a5cb28c", "DetectTime": "2024-05-21T12:45:20.857349+00:00", "EventTime": "2024-05-21T12:45:20.857370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA9EY82XwhFq2pSLDd"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "c6993b3e-a233-4c58-ba97-6463cf092a31", "DetectTime": "2024-05-21T12:45:20.862328+00:00", "EventTime": "2024-05-21T12:45:20.862348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUkH1123AvA5M1CTe9"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "dca57e96-c556-4152-b67a-2787cf3b6ca9", "DetectTime": "2024-05-21T12:45:20.999207+00:00", "EventTime": "2024-05-21T12:45:20.999226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcask3n1EkzinfVe"], "accumulated_threat_level": 4.0, "timewindow": 140} +{"Format": "IDEA0", "ID": "c1cc52e5-8bed-4404-aa20-50ea01a78013", "DetectTime": "2024-05-21T12:45:21.010345+00:00", "EventTime": "2024-05-21T12:45:21.010366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4K5gm1G4GOlmBqBj5"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "6fcdb80c-0afb-464f-a84f-6fe0968f0699", "DetectTime": "2024-05-21T12:45:21.031783+00:00", "EventTime": "2024-05-21T12:45:21.031805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsRR115gENcoPQxe8"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "237f824e-c352-431b-917e-6cd5548ac3bb", "DetectTime": "2024-05-21T12:45:21.046286+00:00", "EventTime": "2024-05-21T12:45:21.046307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CzD0366S1pTDpYs6"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "b174d202-4042-48e4-a84f-f92b952ceac3", "DetectTime": "2024-05-21T12:45:21.051412+00:00", "EventTime": "2024-05-21T12:45:21.051433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNw8bu1BZZ4ldVBnma"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5e75e3f3-d4fa-4d24-803a-d64201657689", "DetectTime": "2024-05-21T12:45:21.072984+00:00", "EventTime": "2024-05-21T12:45:21.073006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0mthmz6oH8egDr9"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "44a1d686-cd5d-4a6a-b8b8-38a9ace119eb", "DetectTime": "2024-05-21T12:45:21.325883+00:00", "EventTime": "2024-05-21T12:45:21.325917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCwxdpGsUjEC5ouS3"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "55509291-fb5a-42d1-bec4-c05fe4c0786a", "DetectTime": "2024-05-21T12:45:21.584963+00:00", "EventTime": "2024-05-21T12:45:21.584983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf67KO1SwIuuc5XxYb"], "accumulated_threat_level": 4.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "2ae9b527-fce9-4d37-82f2-53e2bef9786f", "DetectTime": "2024-05-21T12:45:21.608602+00:00", "EventTime": "2024-05-21T12:45:21.608621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrL8n2zEoE9CXkNjb"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "7bb52724-87c0-44ca-aaf3-920be9817b88", "DetectTime": "2024-05-21T12:45:21.659930+00:00", "EventTime": "2024-05-21T12:45:21.659953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDF6Pg4YfooNr3h2I8"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "ea8b6831-f66c-4383-a4aa-c2f1dda97d5b", "DetectTime": "2024-05-21T12:45:21.665361+00:00", "EventTime": "2024-05-21T12:45:21.665381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czm8Xw25cBTOMOCiRf"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5dc204ef-047a-4108-aed5-1f888b870ff8", "DetectTime": "2024-05-21T12:45:21.670160+00:00", "EventTime": "2024-05-21T12:45:21.670179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpY92u3S9eLr5H0Iwl"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "66615214-ce59-4162-875e-ed36be6d14dd", "DetectTime": "2024-05-21T12:45:21.674611+00:00", "EventTime": "2024-05-21T12:45:21.674629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAri6ZCAimtUWUEd9"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "dbca5214-7a36-418d-91d8-34be5fb243ce", "DetectTime": "2024-05-21T12:45:21.910471+00:00", "EventTime": "2024-05-21T12:45:21.910490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcD2n1agxl5smRMt"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "6b737b28-4973-471a-b826-13a3263dc3b4", "DetectTime": "2024-05-21T12:45:21.929845+00:00", "EventTime": "2024-05-21T12:45:21.929866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CppiAX2me1OIp8t0kl"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "83f25628-d547-44d6-a0e4-bf9dc4983af0", "DetectTime": "2024-05-21T12:45:21.997696+00:00", "EventTime": "2024-05-21T12:45:21.997718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJrCx4FIhy6lJ95bc"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "5773eae1-bc77-489b-9fdc-30d2a7c243c5", "DetectTime": "2024-05-21T12:45:22.040355+00:00", "EventTime": "2024-05-21T12:45:22.040375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzhnH91Cop3FyXGBNj"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "af07a9bf-7b2d-4f4c-a41a-47d1498ce05f", "DetectTime": "2024-05-21T12:45:22.436418+00:00", "EventTime": "2024-05-21T12:45:22.436440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ12h34C9KRcRhb3y9"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "d89965fb-239f-41a0-bb0f-2f96557c3362", "DetectTime": "2024-05-21T12:45:22.447877+00:00", "EventTime": "2024-05-21T12:45:22.447896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1snj71U7oK1NfR5wh"], "accumulated_threat_level": 5.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "3d6730d4-dbde-4063-9b18-36656b116813", "DetectTime": "2024-05-21T12:45:22.502009+00:00", "EventTime": "2024-05-21T12:45:22.502030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwpGo4L4Jubrq2LH9"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "234fc92a-a0c7-4f6c-93bc-352ffa7a1286", "DetectTime": "2024-05-21T12:45:22.552625+00:00", "EventTime": "2024-05-21T12:45:22.552645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPELm02CGQU5YjRaXd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 140} +{"Format": "IDEA0", "ID": "f83acaf6-3c89-48c2-816b-0ded751e9db2", "DetectTime": "2024-05-21T12:45:22.598338+00:00", "EventTime": "2024-05-21T12:45:22.598357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cne0nRlbiznt9RZ1l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "b7877bd5-8481-44dc-8003-0f22ac2301d2", "DetectTime": "2024-05-21T12:45:22.659998+00:00", "EventTime": "2024-05-21T12:45:22.660019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dxXy1JmATGLRZ8Uc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "c36b3bf0-5cf9-4719-86d3-50f671af2838", "DetectTime": "2024-05-21T12:45:22.967738+00:00", "EventTime": "2024-05-21T12:45:22.967765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CigV8e2b1k4qk04394"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "f9ac90a3-9a20-43d1-bb6d-e44b323f0c8f", "DetectTime": "2024-05-21T12:45:23.008549+00:00", "EventTime": "2024-05-21T12:45:23.008569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czhcop1QUfB8qEa0db"], "accumulated_threat_level": 8.799999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "08bb42af-f66b-4ab2-b2af-b6c8faf52287", "DetectTime": "2024-05-21T12:45:23.055437+00:00", "EventTime": "2024-05-21T12:45:23.055459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CagpLB3gn9SLOL2rh7"], "accumulated_threat_level": 9.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "e0046357-6d8b-4818-9133-e831afcec76c", "DetectTime": "2024-05-21T12:45:23.104025+00:00", "EventTime": "2024-05-21T12:45:23.104046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVl5fm44NqeS5K8zph"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "797a3847-a090-47fb-93be-d106b4a4d16e", "DetectTime": "2024-05-21T12:45:23.253721+00:00", "EventTime": "2024-05-21T12:45:23.253742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClI7gS2gK6xKeCPvve"], "accumulated_threat_level": 11.200000000000001, "timewindow": 140} +{"Format": "IDEA0", "ID": "53094af3-195f-4f83-bb95-55bb59462286", "DetectTime": "2024-05-21T12:45:23.285248+00:00", "EventTime": "2024-05-21T12:45:23.285271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqnDWs4CK2L6y2Sx1b"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "1c453c91-90e6-4887-88c7-2e7213253827", "DetectTime": "2024-05-21T12:45:23.368536+00:00", "EventTime": "2024-05-21T12:45:23.368559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOPBE4tSAEKesypn7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 140} +{"Format": "Json", "ID": "1c453c91-90e6-4887-88c7-2e7213253827", "DetectTime": "2024-05-21T12:45:23.368536+00:00", "EventTime": "2024-05-21T12:45:23.368559+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-06T19:40:12.702654+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2024/05/21 12:45:23.543260)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 140, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7826e058-0a51-469e-b6e5-c4aa71527daa", "DetectTime": "2024-05-21T12:45:23.555307+00:00", "EventTime": "2024-05-21T12:45:23.555328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvacgk2xCOKSeOmN82"], "accumulated_threat_level": 0.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "5a2cb02e-aaed-4933-808b-58afef52fcc2", "DetectTime": "2024-05-21T12:45:23.566553+00:00", "EventTime": "2024-05-21T12:45:23.566573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU43Tp344SVJDdX8sk"], "accumulated_threat_level": 1.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "801eb97f-7adb-49d5-bac3-922ae9e6b0db", "DetectTime": "2024-05-21T12:45:23.745951+00:00", "EventTime": "2024-05-21T12:45:23.745972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uzbP38ecAzoe9Qd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 140} +{"Format": "IDEA0", "ID": "ff6268d2-9be0-407f-802b-5d312ef7e36e", "DetectTime": "2024-05-21T12:45:23.791445+00:00", "EventTime": "2024-05-21T12:45:23.791464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuiMWA4gEmslO3ha8h"], "accumulated_threat_level": 3.2, "timewindow": 140} +{"Format": "IDEA0", "ID": "85870eb1-6269-45a3-ad44-3d416092a757", "DetectTime": "2024-05-21T12:45:23.829004+00:00", "EventTime": "2024-05-21T12:45:23.829027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7s84N317aOrF9FU4i"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "df2397b2-cc9d-4d21-bff6-df367e5afde6", "DetectTime": "2024-05-21T12:45:23.870229+00:00", "EventTime": "2024-05-21T12:45:23.870248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyPsa3wEiu1eELkR9"], "accumulated_threat_level": 4.0, "timewindow": 140} +{"Format": "IDEA0", "ID": "ac2e5262-05b3-415c-a633-3ba210b47de9", "DetectTime": "2024-05-21T12:45:23.916842+00:00", "EventTime": "2024-05-21T12:45:23.916863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8gst3gRXADHDx4Db"], "accumulated_threat_level": 4.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "3607f102-6721-4b13-a5f5-e7daa584e07d", "DetectTime": "2024-05-21T12:45:23.965436+00:00", "EventTime": "2024-05-21T12:45:23.965455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkSvq27WwtarFNryd"], "accumulated_threat_level": 5.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "34b3f4ac-fe7f-4c67-920e-9d0652de6a1e", "DetectTime": "2024-05-21T12:45:24.014808+00:00", "EventTime": "2024-05-21T12:45:24.014826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZKaP1JNYeWajhO2b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 140} +{"Format": "IDEA0", "ID": "27fa412b-ea40-4813-b48d-4964737b4078", "DetectTime": "2024-05-21T12:45:24.070859+00:00", "EventTime": "2024-05-21T12:45:24.070880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3izOl4pU8X1Cv3Hle"], "accumulated_threat_level": 7.199999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "3e7aae81-ad7f-4916-a33a-48708da508bf", "DetectTime": "2024-05-21T12:45:24.107844+00:00", "EventTime": "2024-05-21T12:45:24.107862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZw54C2J62h9QdtFm3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "78f91eb8-c4c2-4826-918a-dff5c2ad8cf4", "DetectTime": "2024-05-21T12:45:24.434674+00:00", "EventTime": "2024-05-21T12:45:24.434694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClpxFj37anmgXR1YSk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "ae95e108-0076-40f1-b291-b534cfbd5ee4", "DetectTime": "2024-05-21T12:45:24.440639+00:00", "EventTime": "2024-05-21T12:45:24.440660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crw6Ht4TZdZ6iKJsJg"], "accumulated_threat_level": 9.6, "timewindow": 139} +{"Format": "IDEA0", "ID": "cdbe8c81-3904-41fc-aff3-9c244ce245d0", "DetectTime": "2024-05-21T12:45:24.603845+00:00", "EventTime": "2024-05-21T12:45:24.603868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ecZG2ygnSA6S4Ie4"], "accumulated_threat_level": 9.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "ca5fa180-e755-4151-901c-74f8290efb4a", "DetectTime": "2024-05-21T12:45:24.623891+00:00", "EventTime": "2024-05-21T12:45:24.623911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmJtA4cvBI5TwKN18"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "6c8c18aa-3ea9-4838-b766-9ccda317115a", "DetectTime": "2024-05-21T12:45:24.672119+00:00", "EventTime": "2024-05-21T12:45:24.672137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7dpV3wJiY6GCIKR9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 140} +{"Format": "IDEA0", "ID": "8cc93a97-407d-4b61-a886-d835613adf15", "DetectTime": "2024-05-21T12:45:24.727939+00:00", "EventTime": "2024-05-21T12:45:24.727958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP84dN2nsgkkiSUgl4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 140} +{"Format": "Json", "ID": "8cc93a97-407d-4b61-a886-d835613adf15", "DetectTime": "2024-05-21T12:45:24.727939+00:00", "EventTime": "2024-05-21T12:45:24.727958+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-06T19:40:19.346879+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 140. (real time 2024/05/21 12:45:24.934299)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 140, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a8a09b60-a89d-4c83-a8e0-c0b599789043", "DetectTime": "2024-05-21T12:45:24.947466+00:00", "EventTime": "2024-05-21T12:45:24.947487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGWPMd2Ziv9vAFKi"], "accumulated_threat_level": 0.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "1d6ed4f3-3e81-4ba1-a102-aade12efd812", "DetectTime": "2024-05-21T12:45:25.037838+00:00", "EventTime": "2024-05-21T12:45:25.037856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPq3d1lZ2nJGgEva"], "accumulated_threat_level": 1.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "36975af4-1829-44f5-890c-ac1e88bda14c", "DetectTime": "2024-05-21T12:45:25.078617+00:00", "EventTime": "2024-05-21T12:45:25.078640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5CklD1Pgl45utViB4"], "accumulated_threat_level": 1.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "23bafca1-b0a5-4837-9855-b3ebb0889986", "DetectTime": "2024-05-21T12:45:25.123332+00:00", "EventTime": "2024-05-21T12:45:25.123354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgwoKGfW40WY7BQ3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 140} +{"Format": "IDEA0", "ID": "5cc983d1-ee58-4b10-9635-d2983d767838", "DetectTime": "2024-05-21T12:45:25.167197+00:00", "EventTime": "2024-05-21T12:45:25.167222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJzKm2DqkGGRpRim3"], "accumulated_threat_level": 3.2, "timewindow": 140} +{"Format": "IDEA0", "ID": "7264443d-6eb7-456a-b1e8-278d214bd4fe", "DetectTime": "2024-05-21T12:45:25.211174+00:00", "EventTime": "2024-05-21T12:45:25.211193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNvS81eIPxUS2PiBi"], "accumulated_threat_level": 4.0, "timewindow": 140} +{"Format": "IDEA0", "ID": "e33c958b-cbfc-4d00-ba01-d9764b894a27", "DetectTime": "2024-05-21T12:45:25.257513+00:00", "EventTime": "2024-05-21T12:45:25.257534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LGSbqVyMpa3C4Hg"], "accumulated_threat_level": 4.8, "timewindow": 140} +{"Format": "IDEA0", "ID": "07249183-b772-44c9-9f9f-d2c64916ecf1", "DetectTime": "2024-05-21T12:45:25.302293+00:00", "EventTime": "2024-05-21T12:45:25.302311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVD1URGyInkw2gZk"], "accumulated_threat_level": 5.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "f1242e86-ef50-4afc-9ceb-cddc6b7be817", "DetectTime": "2024-05-21T12:45:25.562588+00:00", "EventTime": "2024-05-21T12:45:25.562610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40PLWtIaRMhYdSs3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 140} +{"Format": "IDEA0", "ID": "9336f4c1-c666-4d1b-b8d3-c097ba1c7d06", "DetectTime": "2024-05-21T12:45:25.610144+00:00", "EventTime": "2024-05-21T12:45:25.610168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDCvIa4OHMyJxtp0Q3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "d5fb1a56-5d06-450d-bea6-ba98c796409a", "DetectTime": "2024-05-21T12:45:25.646447+00:00", "EventTime": "2024-05-21T12:45:25.646468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cap0mc1GFDMD2Lca0f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "a45af9b1-b993-4d86-b709-fefef64454f2", "DetectTime": "2024-05-21T12:45:25.688310+00:00", "EventTime": "2024-05-21T12:45:25.688331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmLhy2QmZeEZXFB11"], "accumulated_threat_level": 7.999999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "1f16c190-9f6e-446c-a59b-fd3ac9dc2206", "DetectTime": "2024-05-21T12:45:25.742644+00:00", "EventTime": "2024-05-21T12:45:25.742666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOOZC37xB8GXHgkY5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 140} +{"Format": "IDEA0", "ID": "84f92d27-7b78-4319-b44e-549f8a552fb3", "DetectTime": "2024-05-21T12:45:25.792136+00:00", "EventTime": "2024-05-21T12:45:25.792159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnIEFNzZe3fFWOI9"], "accumulated_threat_level": 9.6, "timewindow": 140} +{"Format": "IDEA0", "ID": "e8f70a25-9250-43b4-8677-1fcc028b5348", "DetectTime": "2024-05-21T12:45:25.866627+00:00", "EventTime": "2024-05-21T12:45:25.866648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jevY3rp0BzMISXFg"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "79a6f286-39ed-4baf-ae8c-cbf009a02f65", "DetectTime": "2024-05-21T12:45:25.918033+00:00", "EventTime": "2024-05-21T12:45:25.918051+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.161.209.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdO2z3Tx1u7WH8jdd"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "89f25236-1bcc-400a-bcad-030e83dcd03b", "DetectTime": "2024-05-21T12:45:25.932126+00:00", "EventTime": "2024-05-21T12:45:25.932148+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.161.209.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.161.209.67 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-north-dynamic-067.209.161.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdO2z3Tx1u7WH8jdd"], "accumulated_threat_level": 5.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c7633f7f-98d0-400f-ade3-6e33f2e1543a", "DetectTime": "2024-05-21T12:45:25.945248+00:00", "EventTime": "2024-05-21T12:45:25.945267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeMQVb27gMs6PSJOQf"], "accumulated_threat_level": 0.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "8c7d2797-79e7-494f-991a-7d34fb6279dc", "DetectTime": "2024-05-21T12:45:25.957046+00:00", "EventTime": "2024-05-21T12:45:25.957067+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.167.168.6"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMCfB1Y4LNbGWemJk"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "19055e52-800c-44f2-bbbf-ba3e5332b56d", "DetectTime": "2024-05-21T12:45:25.969597+00:00", "EventTime": "2024-05-21T12:45:25.969615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.167.168.6"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.167.168.6 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClMCfB1Y4LNbGWemJk"], "accumulated_threat_level": 5.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "eb8e1fc8-dbdf-46ae-aebf-030ba3bb9cb5", "DetectTime": "2024-05-21T12:45:26.082995+00:00", "EventTime": "2024-05-21T12:45:26.083018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAuzCPzl1aDKNBY8"], "accumulated_threat_level": 1.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "c5a5fe48-a1ad-4248-8810-545817d0eaca", "DetectTime": "2024-05-21T12:45:26.245046+00:00", "EventTime": "2024-05-21T12:45:26.245068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cep8631w0R05C0oEYe"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "83d04c6b-979b-4d4e-82da-645b46562d27", "DetectTime": "2024-05-21T12:45:26.287704+00:00", "EventTime": "2024-05-21T12:45:26.287724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPBvE3F7Xj8SuQgP7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 141} +{"Format": "IDEA0", "ID": "17099f45-05ce-4cc7-b74d-6fc793b888b3", "DetectTime": "2024-05-21T12:45:26.339358+00:00", "EventTime": "2024-05-21T12:45:26.339380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxfisR3n3JqiCQOFqb"], "accumulated_threat_level": 3.2, "timewindow": 141} +{"Format": "IDEA0", "ID": "880742ba-53fd-4a08-8a86-78cd36f6117c", "DetectTime": "2024-05-21T12:45:26.386638+00:00", "EventTime": "2024-05-21T12:45:26.386659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMf10uE65uYetIMF9"], "accumulated_threat_level": 4.0, "timewindow": 141} +{"Format": "IDEA0", "ID": "c5225027-139e-4c34-8e22-9bdec9a81f9c", "DetectTime": "2024-05-21T12:45:26.436000+00:00", "EventTime": "2024-05-21T12:45:26.436020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgrPf9448krDb85N0k"], "accumulated_threat_level": 4.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "6c76ee1d-f30c-448e-8a22-c80234944ffc", "DetectTime": "2024-05-21T12:45:26.486440+00:00", "EventTime": "2024-05-21T12:45:26.486461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C23c2s2Iv8T80nj6kh"], "accumulated_threat_level": 5.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "e31809c7-1827-460f-a028-9e2c63a254a8", "DetectTime": "2024-05-21T12:45:26.537152+00:00", "EventTime": "2024-05-21T12:45:26.537172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvzSBUEKXcY4qHbna"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 141} +{"Format": "IDEA0", "ID": "38b94b43-61b5-4231-aff1-bfe01c39073a", "DetectTime": "2024-05-21T12:45:26.585055+00:00", "EventTime": "2024-05-21T12:45:26.585073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWouw4erDej6KOvt4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "bbd695d2-2f6c-48f5-9a72-7830161bdaa9", "DetectTime": "2024-05-21T12:45:26.633679+00:00", "EventTime": "2024-05-21T12:45:26.633698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNNCHC2R9lO58E7Tw6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "2aa521b1-9df1-43b4-b0e9-289b2f89c664", "DetectTime": "2024-05-21T12:45:26.879739+00:00", "EventTime": "2024-05-21T12:45:26.879760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C39DmU4cYEorxDfvl"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "6834f3cf-53f4-491e-b457-00c70ec48bcd", "DetectTime": "2024-05-21T12:45:26.937206+00:00", "EventTime": "2024-05-21T12:45:26.937224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgVJGj1FrQ3IHpZTi3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "cf756bf0-d256-4557-83f9-a857cf1255b6", "DetectTime": "2024-05-21T12:45:26.971224+00:00", "EventTime": "2024-05-21T12:45:26.971244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9oJo2VzRkHEp7d3f"], "accumulated_threat_level": 9.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "e96c3e6f-877d-4211-980e-52936b6224e4", "DetectTime": "2024-05-21T12:45:27.017699+00:00", "EventTime": "2024-05-21T12:45:27.017718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5WY3q24vup8UcMfJ8"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "9473fcc8-d44f-4217-9c1b-f0274aa47888", "DetectTime": "2024-05-21T12:45:27.064941+00:00", "EventTime": "2024-05-21T12:45:27.064961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCpSe4zQy7Ug8M5Bb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 141} +{"Format": "IDEA0", "ID": "418a18fd-e48e-481d-a7e5-aebca07a16eb", "DetectTime": "2024-05-21T12:45:27.110094+00:00", "EventTime": "2024-05-21T12:45:27.110112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV3p0bWmeoBLBTfG8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 141} +{"Format": "Json", "ID": "418a18fd-e48e-481d-a7e5-aebca07a16eb", "DetectTime": "2024-05-21T12:45:27.110094+00:00", "EventTime": "2024-05-21T12:45:27.110112+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-06T20:10:34.679154+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2024/05/21 12:45:27.281532)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 141, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d8ac57c9-3397-4bf8-97ae-9f62b1b27a84", "DetectTime": "2024-05-21T12:45:27.303065+00:00", "EventTime": "2024-05-21T12:45:27.303099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbib8Q2tfNRZAZKZoj"], "accumulated_threat_level": 0.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "afe93669-f8c6-4581-b942-3d5f9762dbd1", "DetectTime": "2024-05-21T12:45:27.446996+00:00", "EventTime": "2024-05-21T12:45:27.447027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl3Bjn6qzQw28rm8g"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "8d9be7b8-13da-4189-a910-058676e5b1ce", "DetectTime": "2024-05-21T12:45:27.492999+00:00", "EventTime": "2024-05-21T12:45:27.493036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWI6c3D3mbu7F2iE"], "accumulated_threat_level": 1.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "69b598d2-919d-4148-9f80-a71ef2b1573a", "DetectTime": "2024-05-21T12:45:27.519156+00:00", "EventTime": "2024-05-21T12:45:27.519174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjIoA37rvrr37MKdg", "CyjHgq8Ojmm3aiEXk", "CfPkR63JSsyVtvqLY", "CoYCur4At4lkLOxde7"], "accumulated_threat_level": 0.5, "timewindow": 146} +{"Format": "IDEA0", "ID": "9041ac25-6e44-4e4b-8463-a15edd734f4f", "DetectTime": "2024-05-21T12:45:27.538692+00:00", "EventTime": "2024-05-21T12:45:27.538731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlR7F47rvmyiwnpeh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 141} +{"Format": "IDEA0", "ID": "c1da236c-90c9-44be-883a-5c31092884e0", "DetectTime": "2024-05-21T12:45:27.585445+00:00", "EventTime": "2024-05-21T12:45:27.585479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDRmb4vtrqEVCRFE4"], "accumulated_threat_level": 3.2, "timewindow": 141} +{"Format": "IDEA0", "ID": "2440a115-c56c-4fc3-a4a0-23cd1fe9ef78", "DetectTime": "2024-05-21T12:45:27.623718+00:00", "EventTime": "2024-05-21T12:45:27.623737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CknmKa3NHAY836y9x2"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "f5e0ba97-fa12-4293-af33-e6ec52289285", "DetectTime": "2024-05-21T12:45:27.665871+00:00", "EventTime": "2024-05-21T12:45:27.665908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRD77QGm3ICQ0eqOe"], "accumulated_threat_level": 4.0, "timewindow": 141} +{"Format": "IDEA0", "ID": "bca57576-6a89-4939-a59c-19b66747ccc6", "DetectTime": "2024-05-21T12:45:27.715589+00:00", "EventTime": "2024-05-21T12:45:27.715626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfE514XDKEf00I2Ic"], "accumulated_threat_level": 4.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "9eafef2a-c8eb-4c97-9b32-0893da525e73", "DetectTime": "2024-05-21T12:45:27.937271+00:00", "EventTime": "2024-05-21T12:45:27.937295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cptd3k1gABmoFobqzh"], "accumulated_threat_level": 5.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "d5ca8689-87b5-4f7d-a7f1-81dd5fd159d2", "DetectTime": "2024-05-21T12:45:27.982622+00:00", "EventTime": "2024-05-21T12:45:27.982648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRW1k1UokAo98jpq6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 141} +{"Format": "IDEA0", "ID": "240183fc-69aa-4589-8511-ecfc7b57f3fb", "DetectTime": "2024-05-21T12:45:28.029233+00:00", "EventTime": "2024-05-21T12:45:28.029257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvLz418LPXRB21al"], "accumulated_threat_level": 7.199999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "5f853570-a9cb-42f3-9237-ff8fe98d4089", "DetectTime": "2024-05-21T12:45:28.076311+00:00", "EventTime": "2024-05-21T12:45:28.076331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmpnqc2dPod0VuBh47"], "accumulated_threat_level": 7.999999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "e4c82b40-1942-4dea-aac5-c1e7d3d04153", "DetectTime": "2024-05-21T12:45:28.125995+00:00", "EventTime": "2024-05-21T12:45:28.126023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQNto4r2S5Q28mkji"], "accumulated_threat_level": 8.799999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "551967a4-cb0e-4681-9884-dd6b249a2239", "DetectTime": "2024-05-21T12:45:28.160057+00:00", "EventTime": "2024-05-21T12:45:28.160079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJHMW5124S5D0U7VD5"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "fbdb08d2-9ecb-47e1-9558-07bf9ed9c6a0", "DetectTime": "2024-05-21T12:45:28.201532+00:00", "EventTime": "2024-05-21T12:45:28.201550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbHWM2aktipsz2bm5"], "accumulated_threat_level": 9.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "44f55c95-c415-4b0c-9289-9cf83354bf31", "DetectTime": "2024-05-21T12:45:28.249597+00:00", "EventTime": "2024-05-21T12:45:28.249618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYjIV2W1E2mStIj7f"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "72b4c5b9-9125-476b-a7f6-0839567ebab9", "DetectTime": "2024-05-21T12:45:28.320956+00:00", "EventTime": "2024-05-21T12:45:28.320976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSLDO1jpcXBatPXfi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 141} +{"Format": "IDEA0", "ID": "3178d217-9ebf-45e0-ac21-4074840786c1", "DetectTime": "2024-05-21T12:45:28.615995+00:00", "EventTime": "2024-05-21T12:45:28.616017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE19UC1XyHJzZVCuF3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 141} +{"Format": "Json", "ID": "3178d217-9ebf-45e0-ac21-4074840786c1", "DetectTime": "2024-05-21T12:45:28.615995+00:00", "EventTime": "2024-05-21T12:45:28.616017+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-06T20:41:02.059364+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2024/05/21 12:45:29.012664)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 141, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7df9559d-0f81-493e-8ad4-747a769c07a3", "DetectTime": "2024-05-21T12:45:29.017722+00:00", "EventTime": "2024-05-21T12:45:29.017743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmJGLLQyMgwo7lT9"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "550a629d-7096-4952-9350-e5f71f6209a6", "DetectTime": "2024-05-21T12:45:29.029146+00:00", "EventTime": "2024-05-21T12:45:29.029166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXwZS21MT1q4xytr5"], "accumulated_threat_level": 0.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "91b21ba8-4774-4ed2-be37-83ece1fa88c7", "DetectTime": "2024-05-21T12:45:29.039396+00:00", "EventTime": "2024-05-21T12:45:29.039414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ht2X3gOTwVhCmVCa"], "accumulated_threat_level": 1.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "8bd7d4b4-39c6-423e-ab76-33aeb2ed0928", "DetectTime": "2024-05-21T12:45:29.050485+00:00", "EventTime": "2024-05-21T12:45:29.050525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKbmb2pfpfuZCMT0a"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 141} +{"Format": "IDEA0", "ID": "8b31ba60-1cf6-43b5-aa04-9eb173ac52e2", "DetectTime": "2024-05-21T12:45:29.063308+00:00", "EventTime": "2024-05-21T12:45:29.063329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUd2M1MMmSFoaoET2"], "accumulated_threat_level": 3.2, "timewindow": 141} +{"Format": "IDEA0", "ID": "21e498c9-6210-444f-a1d9-6fb4137c1cce", "DetectTime": "2024-05-21T12:45:29.074099+00:00", "EventTime": "2024-05-21T12:45:29.074119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXAts2Fms5UiMX32d"], "accumulated_threat_level": 4.0, "timewindow": 141} +{"Format": "IDEA0", "ID": "1ddd938b-a399-4f58-aba7-3b1143e2faba", "DetectTime": "2024-05-21T12:45:29.085774+00:00", "EventTime": "2024-05-21T12:45:29.085813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjsEm4T04oJkGO277"], "accumulated_threat_level": 4.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "7fb62f0d-a05e-4147-b62f-8bd34336bed2", "DetectTime": "2024-05-21T12:45:29.098046+00:00", "EventTime": "2024-05-21T12:45:29.098086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRRlTuhkfidWjr97"], "accumulated_threat_level": 5.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "5b9a6169-666a-45b0-994c-398e205ff10d", "DetectTime": "2024-05-21T12:45:29.190037+00:00", "EventTime": "2024-05-21T12:45:29.190057+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.156.174.151"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0H9lc3Fr0xmmuEZzg"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "332b3191-9dfe-4381-ad90-5d1a780373bd", "DetectTime": "2024-05-21T12:45:29.204796+00:00", "EventTime": "2024-05-21T12:45:29.204824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.156.174.151"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.156.174.151 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0H9lc3Fr0xmmuEZzg"], "accumulated_threat_level": 6.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "add86574-e435-470b-9704-8f86057dbd9a", "DetectTime": "2024-05-21T12:45:29.216265+00:00", "EventTime": "2024-05-21T12:45:29.216285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsWGx18rIH03mh44"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "a195335f-23a8-4c86-a44b-4c2e3b93dd9e", "DetectTime": "2024-05-21T12:45:29.253983+00:00", "EventTime": "2024-05-21T12:45:29.254019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CydEPk4ZuvljRJh8C4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 141} +{"Format": "IDEA0", "ID": "92352017-f149-45be-a91d-24791dd8ffa5", "DetectTime": "2024-05-21T12:45:29.303426+00:00", "EventTime": "2024-05-21T12:45:29.303465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxoyWQ1mFLb8YO7AJj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "3df0d1e7-dc97-44f0-bfbd-3d0cd928ac77", "DetectTime": "2024-05-21T12:45:29.354258+00:00", "EventTime": "2024-05-21T12:45:29.354299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9TMT15ipQXYbq0l2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "dabd4412-5b19-4d97-a428-a85127e3258e", "DetectTime": "2024-05-21T12:45:29.411299+00:00", "EventTime": "2024-05-21T12:45:29.411341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtdLn1p2Fr1K4e3Ve"], "accumulated_threat_level": 8.799999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "f9ed31eb-8a77-431b-bf7a-d2389ec6e19b", "DetectTime": "2024-05-21T12:45:29.446675+00:00", "EventTime": "2024-05-21T12:45:29.446715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTZCa2ABuVTn9fGth"], "accumulated_threat_level": 9.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "9d1f4d2d-52e8-4cc4-8ace-f7be6db17c35", "DetectTime": "2024-05-21T12:45:29.497026+00:00", "EventTime": "2024-05-21T12:45:29.497050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3C1L2zJesHIwWYXg"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "66984c4d-9f22-4da8-851f-393ca513e401", "DetectTime": "2024-05-21T12:45:29.575728+00:00", "EventTime": "2024-05-21T12:45:29.575748+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["87.6.122.34"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-87-6-122-34.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrHK34hSASHVPofV7"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "103a21ba-1a0a-4d16-b061-58bb3c9cbd71", "DetectTime": "2024-05-21T12:45:29.591194+00:00", "EventTime": "2024-05-21T12:45:29.591217+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["87.6.122.34"]}], "Attach": [{"Content": "connection to blacklisted IP: 87.6.122.34 from 10.0.2.19. AS: ASN-IBSNAZ, IT AS3269 rDNS: host-87-6-122-34.retail.telecomitalia.it Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrHK34hSASHVPofV7"], "accumulated_threat_level": 6.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "0eb0e710-88b4-4931-bc47-aba24e9d6b52", "DetectTime": "2024-05-21T12:45:29.771540+00:00", "EventTime": "2024-05-21T12:45:29.771561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcpkOr4ul1SZpBbOI9"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "e7e0e5ca-04bb-4299-bb5c-b5547457b5ac", "DetectTime": "2024-05-21T12:45:29.811580+00:00", "EventTime": "2024-05-21T12:45:29.811602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiFdMy3NrGu33oZLzl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 141} +{"Format": "IDEA0", "ID": "a3476fc3-1ca8-491c-ad42-b02d46c9b29d", "DetectTime": "2024-05-21T12:45:29.858163+00:00", "EventTime": "2024-05-21T12:45:29.858182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zxFl4D2R6mGv3uti"], "accumulated_threat_level": 12.000000000000002, "timewindow": 141} +{"Format": "Json", "ID": "a3476fc3-1ca8-491c-ad42-b02d46c9b29d", "DetectTime": "2024-05-21T12:45:29.858163+00:00", "EventTime": "2024-05-21T12:45:29.858182+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-06T20:41:06.552002+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 141. (real time 2024/05/21 12:45:30.049644)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 141, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e4ac82c0-fa11-40a6-a92a-1bf7f0005c0e", "DetectTime": "2024-05-21T12:45:30.061095+00:00", "EventTime": "2024-05-21T12:45:30.061113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.152.193.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgg2qHMrjoQuiOzPj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "883e70b2-e3fe-47c3-ac2c-54ed5b0a50d1", "DetectTime": "2024-05-21T12:45:30.072838+00:00", "EventTime": "2024-05-21T12:45:30.072856+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.152.193.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.152.193.223 from 10.0.2.19. AS: CORPORACION NACIONAL DE TELECOMUNICACIONES - CNT EP, EC AS28006 rDNS: 223.193.152.190.static.anycast.cnt-grms.ec Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgg2qHMrjoQuiOzPj"], "accumulated_threat_level": 7.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "3a586001-a4f1-4025-89d0-eec544222db4", "DetectTime": "2024-05-21T12:45:30.083463+00:00", "EventTime": "2024-05-21T12:45:30.083481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMqJ5AmznUqUl70Jj"], "accumulated_threat_level": 0.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "abb71701-76f8-4d68-ac92-b0ebb5dc1d5d", "DetectTime": "2024-05-21T12:45:30.098404+00:00", "EventTime": "2024-05-21T12:45:30.098433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cexi2I1S5adIJkekv7"], "accumulated_threat_level": 1.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "2fda72f2-5e93-412f-adc8-a860b286f94c", "DetectTime": "2024-05-21T12:45:30.108858+00:00", "EventTime": "2024-05-21T12:45:30.108876+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.238.0"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9dmB4BCib5vyGtUe"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "61475449-12e5-4d6e-a4e5-ee37f6f92947", "DetectTime": "2024-05-21T12:45:30.120666+00:00", "EventTime": "2024-05-21T12:45:30.120685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.238.0"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.238.0 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9dmB4BCib5vyGtUe"], "accumulated_threat_level": 7.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "7665e037-39f7-4cf6-897b-368aad2bc1fb", "DetectTime": "2024-05-21T12:45:30.132749+00:00", "EventTime": "2024-05-21T12:45:30.132767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTxYw3kCO9P82vUC7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 141} +{"Format": "IDEA0", "ID": "47aa76ab-a4c6-479d-bd49-3a97f099232e", "DetectTime": "2024-05-21T12:45:30.143437+00:00", "EventTime": "2024-05-21T12:45:30.143454+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.79.75.84"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPTZKl3HwFMBdrci36"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d7817f1e-ecb1-43bd-95f7-d6c51211324d", "DetectTime": "2024-05-21T12:45:30.155153+00:00", "EventTime": "2024-05-21T12:45:30.155170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.79.75.84"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.79.75.84 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPTZKl3HwFMBdrci36"], "accumulated_threat_level": 8.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "4e33843f-b4c5-4d1c-8676-524b4aafd0b6", "DetectTime": "2024-05-21T12:45:30.170907+00:00", "EventTime": "2024-05-21T12:45:30.170960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBwHJ1mdfKeCCPTb"], "accumulated_threat_level": 3.2, "timewindow": 141} +{"Format": "IDEA0", "ID": "8011a854-b517-4b4f-9beb-909d65a39a1e", "DetectTime": "2024-05-21T12:45:30.188102+00:00", "EventTime": "2024-05-21T12:45:30.188127+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.150.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMovEJ2rH0OyrD6Hpj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "8e45f098-fae2-4530-bc35-ecbde9c3bc6c", "DetectTime": "2024-05-21T12:45:30.202327+00:00", "EventTime": "2024-05-21T12:45:30.202346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.150.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.150.49 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMovEJ2rH0OyrD6Hpj"], "accumulated_threat_level": 8.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "a8b76268-0db6-4743-b55f-c98e5e2cb569", "DetectTime": "2024-05-21T12:45:30.215216+00:00", "EventTime": "2024-05-21T12:45:30.215234+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.80.247.223"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. AS: AMAZON-AES, US AS14618 rDNS: ec2-98-80-247-223.compute-1.amazonaws.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv615M11lthZC0bkt5"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9c2d0eed-af68-41eb-9b58-2caaad9f7eb3", "DetectTime": "2024-05-21T12:45:30.227596+00:00", "EventTime": "2024-05-21T12:45:30.227614+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.80.247.223"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.80.247.223 from 10.0.2.19. AS: AMAZON-AES, US AS14618 rDNS: ec2-98-80-247-223.compute-1.amazonaws.com Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv615M11lthZC0bkt5"], "accumulated_threat_level": 9.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "b6daf4c2-a594-4af7-ba4f-f45f42634204", "DetectTime": "2024-05-21T12:45:30.241142+00:00", "EventTime": "2024-05-21T12:45:30.241161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["196.210.104.179"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. AS: INTERNET-SOLUTIONS, ZA AS20011 rDNS: 196-210-104-179.ftth.web.africa Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbT9UUAkHV9sEIjj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "fb521b54-a4d6-4ad5-84da-3ebd019e076f", "DetectTime": "2024-05-21T12:45:30.255369+00:00", "EventTime": "2024-05-21T12:45:30.255390+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["196.210.104.179"]}], "Attach": [{"Content": "connection to blacklisted IP: 196.210.104.179 from 10.0.2.19. AS: INTERNET-SOLUTIONS, ZA AS20011 rDNS: 196-210-104-179.ftth.web.africa Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbT9UUAkHV9sEIjj"], "accumulated_threat_level": 9.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "352de530-8014-4cff-8625-1bdbe99f8f89", "DetectTime": "2024-05-21T12:45:30.268217+00:00", "EventTime": "2024-05-21T12:45:30.268234+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.104.77.164"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwkftD3MdYRMWYZhdb"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a0e46ffd-ae52-4799-a26e-5417aa40a388", "DetectTime": "2024-05-21T12:45:30.281193+00:00", "EventTime": "2024-05-21T12:45:30.281211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.104.77.164"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.104.77.164 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 rDNS: host-95-104-77-164.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwkftD3MdYRMWYZhdb"], "accumulated_threat_level": 10.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d21736b4-7ba5-4537-afae-6354383d9ccc", "DetectTime": "2024-05-21T12:45:30.295635+00:00", "EventTime": "2024-05-21T12:45:30.295656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMDxteGJHYYoMCad"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "f5ef4a47-b2a3-4bb4-b7f9-acd0083abcde", "DetectTime": "2024-05-21T12:45:30.336887+00:00", "EventTime": "2024-05-21T12:45:30.336907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Fz9u1pDb46CZl7m2"], "accumulated_threat_level": 4.0, "timewindow": 141} +{"Format": "IDEA0", "ID": "4e2860d8-ff9a-4504-aca6-63fe090c03d1", "DetectTime": "2024-05-21T12:45:30.385877+00:00", "EventTime": "2024-05-21T12:45:30.385896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQXXF4chwLIvtri1e"], "accumulated_threat_level": 4.8, "timewindow": 141} +{"Format": "IDEA0", "ID": "c2bf3ac7-6018-445a-ac98-50528c1360ca", "DetectTime": "2024-05-21T12:45:30.435097+00:00", "EventTime": "2024-05-21T12:45:30.435131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXogi24ayqiLexBX4"], "accumulated_threat_level": 5.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "a0d3948f-6642-4eee-8820-6e88a0f8fd96", "DetectTime": "2024-05-21T12:45:30.481046+00:00", "EventTime": "2024-05-21T12:45:30.481065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL1EOX37jJoKbI8Fvh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 141} +{"Format": "IDEA0", "ID": "cbd98038-1996-4fae-be46-ffa9117c0836", "DetectTime": "2024-05-21T12:45:30.527829+00:00", "EventTime": "2024-05-21T12:45:30.527854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIpy942qM7e0uRP1c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "fad15b76-1487-4968-9d58-271bd4b8b675", "DetectTime": "2024-05-21T12:45:30.541235+00:00", "EventTime": "2024-05-21T12:45:30.541255+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.26.189.165"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9eDD4XhvbITKUlZi"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "fbce6620-21ca-4aff-b3cf-0b3ab449383b", "DetectTime": "2024-05-21T12:45:30.556279+00:00", "EventTime": "2024-05-21T12:45:30.556305+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.26.189.165"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.26.189.165 from 10.0.2.19. AS: TPNET, PL AS5617 rDNS: ard165.neoplus.adsl.tpnet.pl Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9eDD4XhvbITKUlZi"], "accumulated_threat_level": 10.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "99134cc0-4c1c-4065-9c6d-60c01d4d610a", "DetectTime": "2024-05-21T12:45:30.574652+00:00", "EventTime": "2024-05-21T12:45:30.574674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheSw42nAq1NYV3BCa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "e3f2cb8f-11f4-4359-a6c7-e9ea69a1d4a8", "DetectTime": "2024-05-21T12:45:30.587727+00:00", "EventTime": "2024-05-21T12:45:30.587748+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.37.198.197"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqCVS1vtDpwo4dhRj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bf2f3f35-dfca-4288-9dfc-9f2aa84c1b55", "DetectTime": "2024-05-21T12:45:30.600442+00:00", "EventTime": "2024-05-21T12:45:30.600461+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.37.198.197"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.37.198.197 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-37-198-197.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqCVS1vtDpwo4dhRj"], "accumulated_threat_level": 11.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "32dbd215-d66c-4351-a3bd-19634512def1", "DetectTime": "2024-05-21T12:45:30.623652+00:00", "EventTime": "2024-05-21T12:45:30.623669+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.239.58.25"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. AS: ACS-INTERNET, US AS27364 rDNS: dynamic-acs-24-239-58-25.zoominternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheByO11NxH2FMIhTc"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "10d97162-0579-47b7-b78b-048c27ec55aa", "DetectTime": "2024-05-21T12:45:30.634564+00:00", "EventTime": "2024-05-21T12:45:30.634586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3rl54LxidkRppWXi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 141} +{"Format": "IDEA0", "ID": "5fc898ca-3c66-4439-ab45-afef7506fa9f", "DetectTime": "2024-05-21T12:45:30.648357+00:00", "EventTime": "2024-05-21T12:45:30.648377+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.239.58.25"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.239.58.25 from 10.0.2.19. AS: ACS-INTERNET, US AS27364 rDNS: dynamic-acs-24-239-58-25.zoominternet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheByO11NxH2FMIhTc"], "accumulated_threat_level": 11.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "67d9d429-7470-40ab-a129-db4bfbed7db6", "DetectTime": "2024-05-21T12:45:30.668759+00:00", "EventTime": "2024-05-21T12:45:30.668778+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["200.75.115.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8O1jRazrJ310NT3l"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "76126bc9-02ec-43b9-bcf9-98b1369b7a46", "DetectTime": "2024-05-21T12:45:30.683307+00:00", "EventTime": "2024-05-21T12:45:30.683334+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 200.75.115.103 from 10.0.2.19. AS: Corporacion Telemic C.A., VE AS21826 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8O1jRazrJ310NT3l"], "accumulated_threat_level": 12.0, "timewindow": 31} +{"Format": "Json", "ID": "76126bc9-02ec-43b9-bcf9-98b1369b7a46", "DetectTime": "2024-05-21T12:45:30.683307+00:00", "EventTime": "2024-05-21T12:45:30.683334+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["200.75.115.103"]}], "Attach": [{"Content": "1970-01-02T06:48:25.300587+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:45:31.238706)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "07b2d374-ee7f-4eac-8b58-a22b3208f0b3", "DetectTime": "2024-05-21T12:45:31.250782+00:00", "EventTime": "2024-05-21T12:45:31.250809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDxwV1a1UfiZq248d"], "accumulated_threat_level": 9.6, "timewindow": 141} +{"Format": "IDEA0", "ID": "a526adf2-06c5-4950-a688-e514e1d8b843", "DetectTime": "2024-05-21T12:45:31.265660+00:00", "EventTime": "2024-05-21T12:45:31.265681+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.75.9.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSeLi4T3uv5lpCv3l"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9f36aa6c-b224-48cf-b84b-49669e7681db", "DetectTime": "2024-05-21T12:45:31.280758+00:00", "EventTime": "2024-05-21T12:45:31.280779+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.75.9.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.75.9.50 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-110995.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSeLi4T3uv5lpCv3l"], "accumulated_threat_level": 0.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "dcb006b7-1476-45d3-ab6d-138738948401", "DetectTime": "2024-05-21T12:45:31.293286+00:00", "EventTime": "2024-05-21T12:45:31.293306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.246.172.98"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.246.172.98 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTWvg1bUW22LFXsJb"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "03794fe9-7635-4568-b47e-93ccc5878f5d", "DetectTime": "2024-05-21T12:45:31.306466+00:00", "EventTime": "2024-05-21T12:45:31.306487+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.246.172.98"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.246.172.98 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFTWvg1bUW22LFXsJb"], "accumulated_threat_level": 1.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "8aa4fe4b-aa21-4a6d-b238-392a0e83384d", "DetectTime": "2024-05-21T12:45:31.311461+00:00", "EventTime": "2024-05-21T12:45:31.311480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJtdX2GFrdIQRybEf"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "931559f4-1a4c-4b50-bdb0-e1c6832cef5a", "DetectTime": "2024-05-21T12:45:31.324888+00:00", "EventTime": "2024-05-21T12:45:31.324909+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.96.97.217"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.96.97.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwduv1GNr2UuP6kSe"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "4dec9212-ecd4-4e30-8e49-737a62904e49", "DetectTime": "2024-05-21T12:45:31.338014+00:00", "EventTime": "2024-05-21T12:45:31.338036+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.96.97.217"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.96.97.217 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwduv1GNr2UuP6kSe"], "accumulated_threat_level": 1.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "b79a540e-7667-406b-9673-39e8e1f361e3", "DetectTime": "2024-05-21T12:45:31.351049+00:00", "EventTime": "2024-05-21T12:45:31.351070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9G1na3rLnBwzdtgH6"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "1a529e97-d0be-4ea1-9162-2e80c74a67da", "DetectTime": "2024-05-21T12:45:31.370047+00:00", "EventTime": "2024-05-21T12:45:31.370079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9Bdu29MkCAp59Dw1"], "accumulated_threat_level": 0.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "5eba0809-49d2-43d7-83e9-7e350f0f4e7d", "DetectTime": "2024-05-21T12:45:31.382896+00:00", "EventTime": "2024-05-21T12:45:31.382926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMRufs4SMwLwqNCHLg"], "accumulated_threat_level": 1.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "87b9dc8b-fe7f-43ba-9ad2-87bb6ca1e3da", "DetectTime": "2024-05-21T12:45:31.395096+00:00", "EventTime": "2024-05-21T12:45:31.395130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct5wfQaV8tEdQF4I1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 142} +{"Format": "IDEA0", "ID": "9724226d-38bd-4e2c-a5c4-e990d347cc15", "DetectTime": "2024-05-21T12:45:31.407435+00:00", "EventTime": "2024-05-21T12:45:31.407467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvGUSoWf9hoYafph"], "accumulated_threat_level": 3.2, "timewindow": 142} +{"Format": "IDEA0", "ID": "f41727db-f571-423d-bfbc-84187add8273", "DetectTime": "2024-05-21T12:45:31.427923+00:00", "EventTime": "2024-05-21T12:45:31.427956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIG3Gd2w2JoJGg5nX1"], "accumulated_threat_level": 4.0, "timewindow": 142} +{"Format": "IDEA0", "ID": "3711bcfd-2508-4c9a-984c-026a3b4c4489", "DetectTime": "2024-05-21T12:45:31.440431+00:00", "EventTime": "2024-05-21T12:45:31.440461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7WKXj2Bu1kILszH54"], "accumulated_threat_level": 4.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "e94d2c3a-3ff8-4db2-b395-96c40a098fae", "DetectTime": "2024-05-21T12:45:31.452032+00:00", "EventTime": "2024-05-21T12:45:31.452063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2kisOCWAjA5pSmPb"], "accumulated_threat_level": 5.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "409d0538-c437-4601-be60-12ef4217637f", "DetectTime": "2024-05-21T12:45:31.607020+00:00", "EventTime": "2024-05-21T12:45:31.607040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkUUa4AiSJjY9l1ra"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "49699f82-116c-43b1-8d41-8f78da05f7b8", "DetectTime": "2024-05-21T12:45:31.650078+00:00", "EventTime": "2024-05-21T12:45:31.650113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHFeh27yK2zMvlBal"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 142} +{"Format": "IDEA0", "ID": "61b8f006-3264-4696-9979-766a786cf37d", "DetectTime": "2024-05-21T12:45:31.696741+00:00", "EventTime": "2024-05-21T12:45:31.696766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYNQdHTZpgUQFEDk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "140946da-ad6a-46e3-9eab-a4cc83f75cb4", "DetectTime": "2024-05-21T12:45:31.752178+00:00", "EventTime": "2024-05-21T12:45:31.752196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx37oY2MkEJVBnBtDb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "951c9c1b-79e3-45c2-b593-d62e0d495f9e", "DetectTime": "2024-05-21T12:45:31.764672+00:00", "EventTime": "2024-05-21T12:45:31.764694+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.105.251.166"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.105.251.166 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMyN51nFX9ZiuwRQ6"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bbcbe1f0-1705-46c6-a629-b11b4c5ae383", "DetectTime": "2024-05-21T12:45:31.778611+00:00", "EventTime": "2024-05-21T12:45:31.778639+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.105.251.166"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.105.251.166 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMyN51nFX9ZiuwRQ6"], "accumulated_threat_level": 2.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "6711db8a-b297-48bf-90cd-0d3582349e9c", "DetectTime": "2024-05-21T12:45:31.790720+00:00", "EventTime": "2024-05-21T12:45:31.790741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cit7wE2n9otMK8NnOl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "aeed98b1-be8a-4955-ad15-af49ec7feb2e", "DetectTime": "2024-05-21T12:45:31.811195+00:00", "EventTime": "2024-05-21T12:45:31.811216+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["219.134.33.26"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 219.134.33.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkbIvN1RvX716zcIg3"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "18545a74-eb2c-4103-864e-7349f99a1284", "DetectTime": "2024-05-21T12:45:31.825052+00:00", "EventTime": "2024-05-21T12:45:31.825081+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["219.134.33.26"]}], "Attach": [{"Content": "connection to blacklisted IP: 219.134.33.26 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkbIvN1RvX716zcIg3"], "accumulated_threat_level": 2.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "2b216aba-0b7e-40e9-a8cc-3b479f9cac68", "DetectTime": "2024-05-21T12:45:31.840190+00:00", "EventTime": "2024-05-21T12:45:31.840216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ0lSD4ICY7ITQlrj2"], "accumulated_threat_level": 9.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "2f8354d3-701d-496b-9ef7-7f7bd3a5ddde", "DetectTime": "2024-05-21T12:45:31.868416+00:00", "EventTime": "2024-05-21T12:45:31.868437+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["2.133.83.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.133.83.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9p7q3dJYQhLWwYz4"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "be391dd5-d0b3-41f9-897f-fea620000b5b", "DetectTime": "2024-05-21T12:45:31.882396+00:00", "EventTime": "2024-05-21T12:45:31.882431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["2.133.83.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 2.133.83.119 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9p7q3dJYQhLWwYz4"], "accumulated_threat_level": 3.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c0d79416-c8a3-46f2-bd12-c97c2f167cb2", "DetectTime": "2024-05-21T12:45:31.895100+00:00", "EventTime": "2024-05-21T12:45:31.895129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB4oQs1eheDllvQxJi"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "68558b39-77a2-42b5-9b7f-deb1569ebd99", "DetectTime": "2024-05-21T12:45:31.955061+00:00", "EventTime": "2024-05-21T12:45:31.955083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.162.43.171"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.162.43.171 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdpErF1IqkJwhybAof"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "ceeddb1f-be9b-44c0-a2e2-87fc73dc43f9", "DetectTime": "2024-05-21T12:45:31.970040+00:00", "EventTime": "2024-05-21T12:45:31.970063+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.162.43.171"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.162.43.171 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdpErF1IqkJwhybAof"], "accumulated_threat_level": 3.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "74c34699-28cf-4274-b3e1-1d2640116031", "DetectTime": "2024-05-21T12:45:32.062552+00:00", "EventTime": "2024-05-21T12:45:32.062573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.25.1.180"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.25.1.180 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cue23q1jftPYevrZd"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "4053f75a-e158-4aa7-ac68-d627c95713aa", "DetectTime": "2024-05-21T12:45:32.076627+00:00", "EventTime": "2024-05-21T12:45:32.076651+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.25.1.180"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.25.1.180 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cue23q1jftPYevrZd"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "88260c12-77c5-41ac-a0e4-b480b52f4d95", "DetectTime": "2024-05-21T12:45:32.113393+00:00", "EventTime": "2024-05-21T12:45:32.113419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cix3WLOGFTkr4XWa1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 142} +{"Format": "IDEA0", "ID": "7a63a523-1967-41f6-a2dd-4bb85250dfa4", "DetectTime": "2024-05-21T12:45:32.138725+00:00", "EventTime": "2024-05-21T12:45:32.138745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwCMHWkzOhUVXkl2"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "2b9365ce-87b1-4834-93cf-a1b18343c4d4", "DetectTime": "2024-05-21T12:45:32.192302+00:00", "EventTime": "2024-05-21T12:45:32.192330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHui626QQg1YqwJt5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 142} +{"Format": "Json", "ID": "2b9365ce-87b1-4834-93cf-a1b18343c4d4", "DetectTime": "2024-05-21T12:45:32.192302+00:00", "EventTime": "2024-05-21T12:45:32.192330+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-06T21:11:43.172715+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2024/05/21 12:45:32.356729)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 142, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "52086a91-a72c-423d-866a-41f17c193dd8", "DetectTime": "2024-05-21T12:45:32.371098+00:00", "EventTime": "2024-05-21T12:45:32.371116+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["72.215.7.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 72.215.7.62 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDf1B32cmEpxR4S0t8"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "ac803146-8305-441c-95b9-3a5f4b889458", "DetectTime": "2024-05-21T12:45:32.384891+00:00", "EventTime": "2024-05-21T12:45:32.384914+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["72.215.7.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 72.215.7.62 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDf1B32cmEpxR4S0t8"], "accumulated_threat_level": 4.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "9bd26a53-dbf4-449d-971a-2d41c92a0f68", "DetectTime": "2024-05-21T12:45:32.399204+00:00", "EventTime": "2024-05-21T12:45:32.399227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7c1eDdpbyaJxaNMa"], "accumulated_threat_level": 0.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "113259ad-ba80-4274-896e-770be8ae1f4a", "DetectTime": "2024-05-21T12:45:32.412456+00:00", "EventTime": "2024-05-21T12:45:32.412477+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.214.216.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.214.216.239 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCwrA2VFx3M8VG101"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c7449c35-be5b-4b89-be57-6a9cc6832cbf", "DetectTime": "2024-05-21T12:45:32.425294+00:00", "EventTime": "2024-05-21T12:45:32.425314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.214.216.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.214.216.239 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCwrA2VFx3M8VG101"], "accumulated_threat_level": 5.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "cc035c47-a4f4-47b2-a2f3-ebf1f1a7fc36", "DetectTime": "2024-05-21T12:45:32.437963+00:00", "EventTime": "2024-05-21T12:45:32.437985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJpDrB7vup0EWX8ua"], "accumulated_threat_level": 1.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "f357c6cd-e0fd-4e41-9b5c-9cef2ae96a92", "DetectTime": "2024-05-21T12:45:32.451390+00:00", "EventTime": "2024-05-21T12:45:32.451414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjxe7i3vReZtOAQRZ8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 142} +{"Format": "IDEA0", "ID": "f41b1453-7fa9-4349-9444-1077fba2bc26", "DetectTime": "2024-05-21T12:45:32.468423+00:00", "EventTime": "2024-05-21T12:45:32.468444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFpLL2bCl5b3mqKef"], "accumulated_threat_level": 3.2, "timewindow": 142} +{"Format": "IDEA0", "ID": "2d095143-1aa6-4151-9475-0c393ded6faf", "DetectTime": "2024-05-21T12:45:32.481021+00:00", "EventTime": "2024-05-21T12:45:32.481043+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.49.66.149"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.49.66.149 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7G1k4Jf2zF31IOq"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "8eb7dab8-b074-4aa7-b220-82e65998ea6e", "DetectTime": "2024-05-21T12:45:32.493324+00:00", "EventTime": "2024-05-21T12:45:32.493344+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.49.66.149"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.49.66.149 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7G1k4Jf2zF31IOq"], "accumulated_threat_level": 5.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "9c310430-32c1-4182-83cb-fc4323917fe6", "DetectTime": "2024-05-21T12:45:32.634886+00:00", "EventTime": "2024-05-21T12:45:32.634905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfkQ02mOOQgzGgUxc"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "6e9e9e62-048d-4f64-821b-87d636cfbe43", "DetectTime": "2024-05-21T12:45:32.649006+00:00", "EventTime": "2024-05-21T12:45:32.649026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfkQ02mOOQgzGgUxc"], "accumulated_threat_level": 6.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "2923462f-ebe0-417d-b179-3456fbeba080", "DetectTime": "2024-05-21T12:45:32.676558+00:00", "EventTime": "2024-05-21T12:45:32.676578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmAb03i8nCla3BDEe"], "accumulated_threat_level": 4.0, "timewindow": 142} +{"Format": "IDEA0", "ID": "ae631c9e-b370-447a-9eab-67212c884db6", "DetectTime": "2024-05-21T12:45:32.724676+00:00", "EventTime": "2024-05-21T12:45:32.724699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmXuE21ozdBUFoEw5"], "accumulated_threat_level": 4.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "1b7314f4-874b-4460-87be-4d458d04ab40", "DetectTime": "2024-05-21T12:45:32.775426+00:00", "EventTime": "2024-05-21T12:45:32.775447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq0ym1YUa02xJSNW6"], "accumulated_threat_level": 5.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "0a6eadfb-cc0b-458b-8562-0c45fdae4d4f", "DetectTime": "2024-05-21T12:45:32.825419+00:00", "EventTime": "2024-05-21T12:45:32.825442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNERP42K3bcjvwnGFl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 142} +{"Format": "IDEA0", "ID": "4aadbbf5-7655-4d60-8784-af2f2e4e51f8", "DetectTime": "2024-05-21T12:45:32.874344+00:00", "EventTime": "2024-05-21T12:45:32.874363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtELFH3VHKwmK4g4bd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "1ec2dbc1-6ddc-46e5-8a88-bbf4b458428b", "DetectTime": "2024-05-21T12:45:32.922683+00:00", "EventTime": "2024-05-21T12:45:32.922706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CARvL74REHjOtVVzhf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "bee30395-cbaf-4d2d-a1d1-a60444567fb7", "DetectTime": "2024-05-21T12:45:32.973080+00:00", "EventTime": "2024-05-21T12:45:32.973103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CscLAb1LVEoSuvOsC5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "42020c90-ddeb-4369-a125-5816cd38eeaa", "DetectTime": "2024-05-21T12:45:32.985084+00:00", "EventTime": "2024-05-21T12:45:32.985102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjz3nf4B7FuyRPYm6e"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "8f10c418-c513-4ff9-9c3e-0253bb97f8ab", "DetectTime": "2024-05-21T12:45:32.999769+00:00", "EventTime": "2024-05-21T12:45:32.999803+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjz3nf4B7FuyRPYm6e"], "accumulated_threat_level": 6.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "0f3ff670-0681-452f-b3e1-e8538257f774", "DetectTime": "2024-05-21T12:45:33.010564+00:00", "EventTime": "2024-05-21T12:45:33.010583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqv0W22v8vNEgDNdE7"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "a56e8bcf-f3f7-48d7-aa85-d09f1ed8e2a5", "DetectTime": "2024-05-21T12:45:33.047723+00:00", "EventTime": "2024-05-21T12:45:33.047742+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.226.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjuk243OElONcUzbd"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "2e2e825c-24ba-40b3-94ed-6127bdc72d0d", "DetectTime": "2024-05-21T12:45:33.060116+00:00", "EventTime": "2024-05-21T12:45:33.060141+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjuk243OElONcUzbd"], "accumulated_threat_level": 7.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9d5575e3-444d-462b-b676-e5f9a55ac6de", "DetectTime": "2024-05-21T12:45:33.071653+00:00", "EventTime": "2024-05-21T12:45:33.071672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwW4V6Pm4UxKvCbN2"], "accumulated_threat_level": 9.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "1e6b0eb9-ef91-4896-ba85-672dded76533", "DetectTime": "2024-05-21T12:45:33.157775+00:00", "EventTime": "2024-05-21T12:45:33.157795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EtHL2H6OAxyY27Qj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "f6525090-bf73-4635-99d4-7ca6a9a59a90", "DetectTime": "2024-05-21T12:45:33.172475+00:00", "EventTime": "2024-05-21T12:45:33.172506+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8EtHL2H6OAxyY27Qj"], "accumulated_threat_level": 7.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "788befaf-7637-4a94-bd26-2316c0ccdb72", "DetectTime": "2024-05-21T12:45:33.220587+00:00", "EventTime": "2024-05-21T12:45:33.220608+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.248.7.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnSVA1HHcrFWfq2Jj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "612df2ce-2d3f-4e15-9fb2-7db933af8b9a", "DetectTime": "2024-05-21T12:45:33.248944+00:00", "EventTime": "2024-05-21T12:45:33.248983+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNnSVA1HHcrFWfq2Jj"], "accumulated_threat_level": 8.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c25fa7ba-a505-4663-8936-0e076fa0aeb5", "DetectTime": "2024-05-21T12:45:33.314622+00:00", "EventTime": "2024-05-21T12:45:33.314644+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnKQa3rWF33zxgXZc"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "5df8f414-6517-4df3-96e2-c17eb44ecf66", "DetectTime": "2024-05-21T12:45:33.327776+00:00", "EventTime": "2024-05-21T12:45:33.327799+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnKQa3rWF33zxgXZc"], "accumulated_threat_level": 8.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "7fdbf571-97bc-4819-9b5c-276135c85ea0", "DetectTime": "2024-05-21T12:45:33.342962+00:00", "EventTime": "2024-05-21T12:45:33.342984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXQ2aarkObIsHOFh"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "7972dddf-2ea2-4494-a20d-9ef4ea1eb86a", "DetectTime": "2024-05-21T12:45:33.382619+00:00", "EventTime": "2024-05-21T12:45:33.382640+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.207.189.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.207.189.134 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkxUh4Ujm6jSXVnW5"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "937a301d-e175-49b7-89fc-34d836bead59", "DetectTime": "2024-05-21T12:45:33.395724+00:00", "EventTime": "2024-05-21T12:45:33.395749+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.207.189.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.207.189.134 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkxUh4Ujm6jSXVnW5"], "accumulated_threat_level": 9.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "1daada56-9b86-43c8-93b4-0059e6c8d0d2", "DetectTime": "2024-05-21T12:45:33.407738+00:00", "EventTime": "2024-05-21T12:45:33.407758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyGQf3tdreERIBUrb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 142} +{"Format": "IDEA0", "ID": "5d01d855-f4b8-4bfa-8321-c20537a629ee", "DetectTime": "2024-05-21T12:45:33.441034+00:00", "EventTime": "2024-05-21T12:45:33.441059+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD5Lf1pYmDo9UdxF6"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "e96e4418-4702-478b-8af3-68eb37f661d4", "DetectTime": "2024-05-21T12:45:33.455424+00:00", "EventTime": "2024-05-21T12:45:33.455449+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD5Lf1pYmDo9UdxF6"], "accumulated_threat_level": 9.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "d398bd91-ee45-43b5-abd1-353e8c98bd4f", "DetectTime": "2024-05-21T12:45:33.488144+00:00", "EventTime": "2024-05-21T12:45:33.488164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrNrsn2ARGm9sNpXWf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 142} +{"Format": "Json", "ID": "d398bd91-ee45-43b5-abd1-353e8c98bd4f", "DetectTime": "2024-05-21T12:45:33.488144+00:00", "EventTime": "2024-05-21T12:45:33.488164+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "1970-01-06T21:42:17.463905+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2024/05/21 12:45:33.661190)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 142, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3a557e6b-2727-4589-9701-637f950c7d01", "DetectTime": "2024-05-21T12:45:33.672658+00:00", "EventTime": "2024-05-21T12:45:33.672676+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrzSX3pwOY64Nhxg2"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "13825ae9-b4ef-423c-8a60-e843c4bdb81b", "DetectTime": "2024-05-21T12:45:33.685397+00:00", "EventTime": "2024-05-21T12:45:33.685416+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrzSX3pwOY64Nhxg2"], "accumulated_threat_level": 10.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "442be4b7-6c23-4b0d-9a0c-360206b3e036", "DetectTime": "2024-05-21T12:45:33.698754+00:00", "EventTime": "2024-05-21T12:45:33.698774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHEtr3yWdqjtxGdod"], "accumulated_threat_level": 0.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "565c3a2c-64bb-4c1d-9549-8626e3b24dcc", "DetectTime": "2024-05-21T12:45:33.711122+00:00", "EventTime": "2024-05-21T12:45:33.711140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["219.74.86.94"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 219.74.86.94 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXouZ1xd68kLZZJHd"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "937fc595-97ef-4ff5-8b82-2029f4050567", "DetectTime": "2024-05-21T12:45:33.723448+00:00", "EventTime": "2024-05-21T12:45:33.723473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZfrin3paVqI6J0fo8"], "accumulated_threat_level": 1.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "caaef2e5-27ef-4aaf-af8a-d999db61034d", "DetectTime": "2024-05-21T12:45:33.737283+00:00", "EventTime": "2024-05-21T12:45:33.737304+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["219.74.86.94"]}], "Attach": [{"Content": "connection to blacklisted IP: 219.74.86.94 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXouZ1xd68kLZZJHd"], "accumulated_threat_level": 10.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "222e1a7b-cc25-4245-b4bc-1f0039341657", "DetectTime": "2024-05-21T12:45:33.750471+00:00", "EventTime": "2024-05-21T12:45:33.750493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgXPg31LbDI7W41Cd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 142} +{"Format": "IDEA0", "ID": "08594a28-9f1f-4d26-8cc7-20832d1acbae", "DetectTime": "2024-05-21T12:45:33.764120+00:00", "EventTime": "2024-05-21T12:45:33.764140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Shsp2sSm6ClQGNT1"], "accumulated_threat_level": 3.2, "timewindow": 142} +{"Format": "IDEA0", "ID": "1b209c7d-8bc7-45b2-876c-8d3fb95d44fb", "DetectTime": "2024-05-21T12:45:33.769745+00:00", "EventTime": "2024-05-21T12:45:33.769768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzMM2Aupm3m6ThsT3"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "a88fcc9c-58f4-4062-a07c-19705523b157", "DetectTime": "2024-05-21T12:45:33.795454+00:00", "EventTime": "2024-05-21T12:45:33.795475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCeX11O9a8pUvoaY6"], "accumulated_threat_level": 4.0, "timewindow": 142} +{"Format": "IDEA0", "ID": "a722acc4-a6f3-4d6e-aadd-b453b8152805", "DetectTime": "2024-05-21T12:45:33.920724+00:00", "EventTime": "2024-05-21T12:45:33.920742+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["14.97.134.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 14.97.134.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24KsX16S0CX220MRi"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "8f57f424-d3c9-460e-87f8-d3055d684b88", "DetectTime": "2024-05-21T12:45:33.933707+00:00", "EventTime": "2024-05-21T12:45:33.933729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["14.97.134.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 14.97.134.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24KsX16S0CX220MRi"], "accumulated_threat_level": 11.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "b4a076cf-5aa0-413f-930f-5eea2bebc120", "DetectTime": "2024-05-21T12:45:33.983281+00:00", "EventTime": "2024-05-21T12:45:33.983301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["182.64.162.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 182.64.162.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8XdG23aaiZnG64Hf"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "70224462-d9b5-4e52-90ce-c0f5e1867f47", "DetectTime": "2024-05-21T12:45:33.996403+00:00", "EventTime": "2024-05-21T12:45:33.996426+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["182.64.162.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 182.64.162.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8XdG23aaiZnG64Hf"], "accumulated_threat_level": 11.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "dd8d2424-4860-4c4f-ad8a-b548d6e0391a", "DetectTime": "2024-05-21T12:45:34.028306+00:00", "EventTime": "2024-05-21T12:45:34.028325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6INfp12vgQDNZpwwg"], "accumulated_threat_level": 4.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "e5e53cc8-485c-4046-b351-6713d98d817f", "DetectTime": "2024-05-21T12:45:34.044309+00:00", "EventTime": "2024-05-21T12:45:34.044334+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUuHVI3lydYWolU423"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "7639c7f4-5941-4a42-b26f-14c725bfd727", "DetectTime": "2024-05-21T12:45:34.057030+00:00", "EventTime": "2024-05-21T12:45:34.057049+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUuHVI3lydYWolU423"], "accumulated_threat_level": 12.0, "timewindow": 31} +{"Format": "Json", "ID": "7639c7f4-5941-4a42-b26f-14c725bfd727", "DetectTime": "2024-05-21T12:45:34.057030+00:00", "EventTime": "2024-05-21T12:45:34.057049+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "1970-01-02T06:52:16.993533+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:45:34.652655)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "637dab44-d63f-41a0-8de9-5f28f23896a4", "DetectTime": "2024-05-21T12:45:34.673788+00:00", "EventTime": "2024-05-21T12:45:34.673808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5lso3oJNVrblYFF2"], "accumulated_threat_level": 5.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "6d688a56-4cd5-40e7-96d0-f534f77c89f0", "DetectTime": "2024-05-21T12:45:34.685559+00:00", "EventTime": "2024-05-21T12:45:34.685578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfss8H3iKAsnzRHmVl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 142} +{"Format": "IDEA0", "ID": "f398bc67-1648-4201-ba97-1f4042042847", "DetectTime": "2024-05-21T12:45:34.708347+00:00", "EventTime": "2024-05-21T12:45:34.708367+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.143.38.124"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.143.38.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41sJ12jPhXFYFloIk"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "8b549dc2-cc71-4a31-837b-78b222140cce", "DetectTime": "2024-05-21T12:45:34.723008+00:00", "EventTime": "2024-05-21T12:45:34.723041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.143.38.124"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.143.38.124 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41sJ12jPhXFYFloIk"], "accumulated_threat_level": 0.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "b46f838e-0337-4945-82df-638e0347c335", "DetectTime": "2024-05-21T12:45:34.735524+00:00", "EventTime": "2024-05-21T12:45:34.735545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDmv5yUZCZwQCosxf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "b608c834-6c6b-4977-9fee-084385501bed", "DetectTime": "2024-05-21T12:45:34.750666+00:00", "EventTime": "2024-05-21T12:45:34.750686+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUN82S50XHa9ye4j"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "52473115-5233-4704-8c11-97c692447f54", "DetectTime": "2024-05-21T12:45:34.764197+00:00", "EventTime": "2024-05-21T12:45:34.764222+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUN82S50XHa9ye4j"], "accumulated_threat_level": 1.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "6aa4ed3d-4172-421a-9905-fa9a7f567740", "DetectTime": "2024-05-21T12:45:34.779101+00:00", "EventTime": "2024-05-21T12:45:34.779125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZ4o52sDaKYWH1vqb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "4471205a-8db1-41d4-b270-bf2a1a4e6554", "DetectTime": "2024-05-21T12:45:34.791352+00:00", "EventTime": "2024-05-21T12:45:34.791377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2v9O1fqMdNDvZTvf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "da85345b-f3b0-4ac4-b6f2-5f2000194a8d", "DetectTime": "2024-05-21T12:45:34.797685+00:00", "EventTime": "2024-05-21T12:45:34.797706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKbdry2QFreYwgcWEl"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "a23778de-8417-43a5-9c76-0795c1ba3943", "DetectTime": "2024-05-21T12:45:34.811323+00:00", "EventTime": "2024-05-21T12:45:34.811340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["139.0.116.21"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.0.116.21 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxcBfU1rLCKW8QzInb"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "1e890ed7-f299-4d9b-ae2f-3c3487980371", "DetectTime": "2024-05-21T12:45:34.827140+00:00", "EventTime": "2024-05-21T12:45:34.827165+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.0.116.21 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxcBfU1rLCKW8QzInb"], "accumulated_threat_level": 1.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "cc48780c-c64a-4c57-ab23-fb4d71b0bd4a", "DetectTime": "2024-05-21T12:45:34.839126+00:00", "EventTime": "2024-05-21T12:45:34.839146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9eaZKu8d8wMiTv4"], "accumulated_threat_level": 9.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "91f05d7b-ed67-4e90-96ec-9bed9170cf27", "DetectTime": "2024-05-21T12:45:34.851477+00:00", "EventTime": "2024-05-21T12:45:34.851499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHBHj4FAN8kDKOqo2"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "0dd2ab26-95a8-427b-8bc5-e7e7ce464808", "DetectTime": "2024-05-21T12:45:34.866366+00:00", "EventTime": "2024-05-21T12:45:34.866387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.25.99.82"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.25.99.82 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJg9q3QZC1sGtMY93"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "18819e53-2b66-4d53-b958-5537de50fe00", "DetectTime": "2024-05-21T12:45:34.879548+00:00", "EventTime": "2024-05-21T12:45:34.879574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.25.99.82"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.25.99.82 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJg9q3QZC1sGtMY93"], "accumulated_threat_level": 2.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "0a25d2ea-5c23-4125-9370-b5d897b476f4", "DetectTime": "2024-05-21T12:45:34.892166+00:00", "EventTime": "2024-05-21T12:45:34.892193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA0CxH2zRaBPJiYuOc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 142} +{"Format": "IDEA0", "ID": "9f9a2549-45fc-43b7-97d7-fc62cfd5ac38", "DetectTime": "2024-05-21T12:45:34.906356+00:00", "EventTime": "2024-05-21T12:45:34.906381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkzuYY2xWhkoCpQihd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 142} +{"Format": "Json", "ID": "9f9a2549-45fc-43b7-97d7-fc62cfd5ac38", "DetectTime": "2024-05-21T12:45:34.906356+00:00", "EventTime": "2024-05-21T12:45:34.906381+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-06T21:42:22.333413+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 142. (real time 2024/05/21 12:45:35.329699)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 142, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3907278f-a109-4c37-847f-889a205e6353", "DetectTime": "2024-05-21T12:45:35.340098+00:00", "EventTime": "2024-05-21T12:45:35.340116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfaFCD2EMJ1u71y0ed"], "accumulated_threat_level": 0.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "954e7380-ce20-4d01-ab8d-b2df091a26a1", "DetectTime": "2024-05-21T12:45:35.352266+00:00", "EventTime": "2024-05-21T12:45:35.352284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9PSI1ylqxcmhkq24"], "accumulated_threat_level": 1.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "d4a978ca-bbe0-4fdf-ae53-bead7a0331dc", "DetectTime": "2024-05-21T12:45:35.358389+00:00", "EventTime": "2024-05-21T12:45:35.358427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZq0G3Ep3Rf8qLR0h"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "b314c7b5-c4de-4a81-ae37-8580752fa321", "DetectTime": "2024-05-21T12:45:35.370662+00:00", "EventTime": "2024-05-21T12:45:35.370680+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEe1S1C3yNFgcPoWh"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "cf18aded-2cc6-4ed4-936c-d5ab42903724", "DetectTime": "2024-05-21T12:45:35.384670+00:00", "EventTime": "2024-05-21T12:45:35.384696+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEe1S1C3yNFgcPoWh"], "accumulated_threat_level": 2.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "755ee052-4041-4d50-8175-19e7b15ca395", "DetectTime": "2024-05-21T12:45:35.396540+00:00", "EventTime": "2024-05-21T12:45:35.396558+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrgy52ypwNh5cmJB"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "babe0f94-0e8d-4521-bb2a-afceb9e561d5", "DetectTime": "2024-05-21T12:45:35.407942+00:00", "EventTime": "2024-05-21T12:45:35.407962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYrgy52ypwNh5cmJB"], "accumulated_threat_level": 3.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bcfabd9c-bfe4-49f4-a940-46b7b53967b4", "DetectTime": "2024-05-21T12:45:35.419069+00:00", "EventTime": "2024-05-21T12:45:35.419088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnij9e1H1QQlWVSgOg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 142} +{"Format": "IDEA0", "ID": "f9447e3f-e883-4bb2-98c2-8f8387ff4816", "DetectTime": "2024-05-21T12:45:35.430716+00:00", "EventTime": "2024-05-21T12:45:35.430734+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iUUR2hlCtCQjz5dj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "e314db47-4834-490b-8cbc-118fb2da581c", "DetectTime": "2024-05-21T12:45:35.443212+00:00", "EventTime": "2024-05-21T12:45:35.443233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iUUR2hlCtCQjz5dj"], "accumulated_threat_level": 3.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "04f805f9-6e3a-403b-a8a5-0de79859a310", "DetectTime": "2024-05-21T12:45:35.455525+00:00", "EventTime": "2024-05-21T12:45:35.455544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPbbT295YAyIgcbwk"], "accumulated_threat_level": 3.2, "timewindow": 142} +{"Format": "IDEA0", "ID": "e7d444cc-77d7-48fa-a269-cdc6d6da341b", "DetectTime": "2024-05-21T12:45:35.472092+00:00", "EventTime": "2024-05-21T12:45:35.472109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.253.163.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.253.163.131 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3YtN16bht4HgzLn5"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "88065932-6614-4a91-99bf-54b85bcf6891", "DetectTime": "2024-05-21T12:45:35.483879+00:00", "EventTime": "2024-05-21T12:45:35.483899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.253.163.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.253.163.131 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3YtN16bht4HgzLn5"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "4ecf47e1-30e4-4a42-8245-4a1a064b1606", "DetectTime": "2024-05-21T12:45:35.500104+00:00", "EventTime": "2024-05-21T12:45:35.500126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChD0Kd40pPKUBDqjqd"], "accumulated_threat_level": 4.0, "timewindow": 142} +{"Format": "IDEA0", "ID": "01acdb7f-21fd-4617-b4bf-2099c35aad40", "DetectTime": "2024-05-21T12:45:35.511844+00:00", "EventTime": "2024-05-21T12:45:35.511865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTr3n1AfzQwz4K45l"], "accumulated_threat_level": 4.8, "timewindow": 142} +{"Format": "IDEA0", "ID": "3194f27e-ba60-4375-8a4a-81d881bb922a", "DetectTime": "2024-05-21T12:45:35.522655+00:00", "EventTime": "2024-05-21T12:45:35.522674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsxhID1C3wAGCqqPD2"], "accumulated_threat_level": 5.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "97cab429-66b9-4c48-8113-c6bf42949b53", "DetectTime": "2024-05-21T12:45:35.527241+00:00", "EventTime": "2024-05-21T12:45:35.527260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czw0183O1W6IZiaAG"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "c164e2aa-5486-4370-a45d-2d84df1f3caa", "DetectTime": "2024-05-21T12:45:35.538318+00:00", "EventTime": "2024-05-21T12:45:35.538336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDlUAi1eNPOANNrjhh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 142} +{"Format": "IDEA0", "ID": "1603082b-6714-442e-8c04-524ea4d2a399", "DetectTime": "2024-05-21T12:45:35.549736+00:00", "EventTime": "2024-05-21T12:45:35.549756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHIQHI9oDYBbMYSfc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "83a260bd-0d38-4166-8dff-75dc63e2e656", "DetectTime": "2024-05-21T12:45:35.594645+00:00", "EventTime": "2024-05-21T12:45:35.594663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAVEs8zccSZjoZ44"], "accumulated_threat_level": 7.999999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "32e43f93-1ad4-4c64-ae8a-44ab412d4415", "DetectTime": "2024-05-21T12:45:35.717920+00:00", "EventTime": "2024-05-21T12:45:35.717939+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJrQAv4Ih2kH0yeu41"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a0591362-a505-48b9-adf0-cf91b560e9c5", "DetectTime": "2024-05-21T12:45:35.731522+00:00", "EventTime": "2024-05-21T12:45:35.731545+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJrQAv4Ih2kH0yeu41"], "accumulated_threat_level": 4.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "dcae72f6-7ea0-4482-92e1-77c831cea0ef", "DetectTime": "2024-05-21T12:45:35.819156+00:00", "EventTime": "2024-05-21T12:45:35.819176+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.218.243.51"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.218.243.51 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjsHd5jQcx9Dpjv2"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "f04219c7-6d4c-4e35-b930-437469ba7893", "DetectTime": "2024-05-21T12:45:35.832003+00:00", "EventTime": "2024-05-21T12:45:35.832023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.218.243.51"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.218.243.51 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCjsHd5jQcx9Dpjv2"], "accumulated_threat_level": 5.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "aec07983-c5f2-49dd-9bd9-610e8ba6cd34", "DetectTime": "2024-05-21T12:45:35.881884+00:00", "EventTime": "2024-05-21T12:45:35.881902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYdhn1y2S9B7sC46h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 142} +{"Format": "IDEA0", "ID": "dc662e33-132a-4079-8818-b51c7822854e", "DetectTime": "2024-05-21T12:45:35.903720+00:00", "EventTime": "2024-05-21T12:45:35.903740+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.161.231.103"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.161.231.103 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GHJ94cJoM7OdDiZ8"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "979e700c-daa5-45cb-b63c-682bb5af8b4e", "DetectTime": "2024-05-21T12:45:35.916304+00:00", "EventTime": "2024-05-21T12:45:35.916323+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.161.231.103"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.161.231.103 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0GHJ94cJoM7OdDiZ8"], "accumulated_threat_level": 5.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "a6825e63-d817-4e8d-8439-cfa8f3ceea7d", "DetectTime": "2024-05-21T12:45:35.929821+00:00", "EventTime": "2024-05-21T12:45:35.929843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjpexj2xMFsH86PHch"], "accumulated_threat_level": 9.6, "timewindow": 142} +{"Format": "IDEA0", "ID": "e3e1816b-6030-4461-9abc-c4964355d0b0", "DetectTime": "2024-05-21T12:45:35.998221+00:00", "EventTime": "2024-05-21T12:45:35.998241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5DNlH1BAdnHpcLGsf"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "081c384d-5a08-4d1b-9d5c-5d8cc52f8988", "DetectTime": "2024-05-21T12:45:36.085022+00:00", "EventTime": "2024-05-21T12:45:36.085041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRO1D17AhzQpQqbBj"], "accumulated_threat_level": 1.3, "timewindow": 143} +{"Format": "IDEA0", "ID": "f155b6c8-03d0-4987-9186-490371631d55", "DetectTime": "2024-05-21T12:45:36.136520+00:00", "EventTime": "2024-05-21T12:45:36.136541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHeOn24MXaT1iv1p5"], "accumulated_threat_level": 2.1, "timewindow": 143} +{"Format": "IDEA0", "ID": "90718991-079e-4e9b-a9b4-69f50722a046", "DetectTime": "2024-05-21T12:45:36.186083+00:00", "EventTime": "2024-05-21T12:45:36.186110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpEZK39fC5MO9rw1b"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "668c4c37-0b70-4703-8e20-c0afa20011d4", "DetectTime": "2024-05-21T12:45:36.201423+00:00", "EventTime": "2024-05-21T12:45:36.201445+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjHeII3ZQStj6g5CF4"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c7b8698b-6aaf-4364-8e45-44ae2477f033", "DetectTime": "2024-05-21T12:45:36.214763+00:00", "EventTime": "2024-05-21T12:45:36.214783+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjHeII3ZQStj6g5CF4"], "accumulated_threat_level": 6.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "fcd94547-e873-4e31-9f72-4b6236b3557e", "DetectTime": "2024-05-21T12:45:36.242446+00:00", "EventTime": "2024-05-21T12:45:36.242470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqGH44w7lMJE99Oj"], "accumulated_threat_level": 3.7, "timewindow": 143} +{"Format": "IDEA0", "ID": "1a750728-a611-42ce-8d71-451f71af3aa7", "DetectTime": "2024-05-21T12:45:36.270438+00:00", "EventTime": "2024-05-21T12:45:36.270460+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8D2o2JREVoF1A6tf"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "74230a98-5710-42a8-a6df-a742c233e994", "DetectTime": "2024-05-21T12:45:36.283396+00:00", "EventTime": "2024-05-21T12:45:36.283416+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw8D2o2JREVoF1A6tf"], "accumulated_threat_level": 6.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "29ea4530-020f-4beb-9074-46793867e84a", "DetectTime": "2024-05-21T12:45:36.293959+00:00", "EventTime": "2024-05-21T12:45:36.293977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdVRTv1XWUEDxINi05"], "accumulated_threat_level": 4.5, "timewindow": 143} +{"Format": "IDEA0", "ID": "6bb90000-36e2-4edf-b392-fe8e38788203", "DetectTime": "2024-05-21T12:45:36.343848+00:00", "EventTime": "2024-05-21T12:45:36.343869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvvUB1WbGt2l6izV6"], "accumulated_threat_level": 5.3, "timewindow": 143} +{"Format": "IDEA0", "ID": "a1e2015c-671c-443f-9e3e-2002eeb0d4e1", "DetectTime": "2024-05-21T12:45:36.358746+00:00", "EventTime": "2024-05-21T12:45:36.358765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYLQ51z4rrrVpnYai"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "08fa600d-2c07-4e6f-9377-b6904ad03d49", "DetectTime": "2024-05-21T12:45:36.372358+00:00", "EventTime": "2024-05-21T12:45:36.372378+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiYLQ51z4rrrVpnYai"], "accumulated_threat_level": 7.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "2e19c948-ee1c-41d9-b081-8212a8d523c3", "DetectTime": "2024-05-21T12:45:36.453748+00:00", "EventTime": "2024-05-21T12:45:36.453765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.205.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIJ172bshhbi1OaOg"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "6b290982-0370-4a55-8c80-1dea2988220e", "DetectTime": "2024-05-21T12:45:36.466916+00:00", "EventTime": "2024-05-21T12:45:36.466938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.205.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIJ172bshhbi1OaOg"], "accumulated_threat_level": 7.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "755706cf-5652-42b0-9e2a-c31d980fc8fe", "DetectTime": "2024-05-21T12:45:36.519625+00:00", "EventTime": "2024-05-21T12:45:36.519649+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnxjF12P0mw6DDOe3"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "5ae074ac-61f6-494f-91a8-e5aee1ea610c", "DetectTime": "2024-05-21T12:45:36.533922+00:00", "EventTime": "2024-05-21T12:45:36.533946+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnxjF12P0mw6DDOe3"], "accumulated_threat_level": 8.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9cc61889-ed1d-4bee-8bc8-c93f3078db14", "DetectTime": "2024-05-21T12:45:36.605950+00:00", "EventTime": "2024-05-21T12:45:36.605968+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeKex1WCTMXHTfY1b"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "41810116-dd81-4c2d-8f76-97b41a572f87", "DetectTime": "2024-05-21T12:45:36.619699+00:00", "EventTime": "2024-05-21T12:45:36.619730+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdeKex1WCTMXHTfY1b"], "accumulated_threat_level": 8.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "bbe1bc39-dd54-4468-8363-616c7ebe2dd6", "DetectTime": "2024-05-21T12:45:36.643176+00:00", "EventTime": "2024-05-21T12:45:36.643198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcask3n1EkzinfVe"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "63c7d411-abe6-4326-8cba-a24819503b22", "DetectTime": "2024-05-21T12:45:36.673397+00:00", "EventTime": "2024-05-21T12:45:36.673423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDLewa4YBVtJQolQQ2"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a1d871a8-98f9-4c29-9bda-d2193869be62", "DetectTime": "2024-05-21T12:45:36.687152+00:00", "EventTime": "2024-05-21T12:45:36.687172+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDLewa4YBVtJQolQQ2"], "accumulated_threat_level": 9.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d2a6bdca-40a9-4b39-a12a-9caa526ba7e1", "DetectTime": "2024-05-21T12:45:36.698467+00:00", "EventTime": "2024-05-21T12:45:36.698484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdeg3M1WxYsVwHTWcb"], "accumulated_threat_level": 6.1, "timewindow": 143} +{"Format": "IDEA0", "ID": "5a6e9642-5e36-496e-a5a4-399e06b7fe83", "DetectTime": "2024-05-21T12:45:36.738056+00:00", "EventTime": "2024-05-21T12:45:36.738074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79XDbEWxkYzoEc8"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "e0504202-c17e-42c4-9863-fe0f9e7d669d", "DetectTime": "2024-05-21T12:45:36.759375+00:00", "EventTime": "2024-05-21T12:45:36.759394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2Zks5O9HLI3Oope"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 143} +{"Format": "IDEA0", "ID": "6e5d7232-c24e-4899-9163-a220ceeef3d3", "DetectTime": "2024-05-21T12:45:36.771607+00:00", "EventTime": "2024-05-21T12:45:36.771625+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C79XDbEWxkYzoEc8"], "accumulated_threat_level": 9.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "f6483fcb-1176-4d72-8cda-e9a268d956a7", "DetectTime": "2024-05-21T12:45:36.788000+00:00", "EventTime": "2024-05-21T12:45:36.788024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfQfbdDSaTIdpeFCj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "ac98c93c-4ce5-4840-8738-c9adc9745e3f", "DetectTime": "2024-05-21T12:45:36.823591+00:00", "EventTime": "2024-05-21T12:45:36.823612+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.129.124.228"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.129.124.228 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvXjUM1oFqg3J8CTK8"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "01a595bb-cdeb-4706-92e6-f0152d13cc8f", "DetectTime": "2024-05-21T12:45:36.836307+00:00", "EventTime": "2024-05-21T12:45:36.836327+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.129.124.228"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.129.124.228 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvXjUM1oFqg3J8CTK8"], "accumulated_threat_level": 10.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "293daa77-4993-40dc-930f-0db407ff6ff6", "DetectTime": "2024-05-21T12:45:36.847688+00:00", "EventTime": "2024-05-21T12:45:36.847710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dIuH1iUdHELx1GP8"], "accumulated_threat_level": 8.5, "timewindow": 143} +{"Format": "IDEA0", "ID": "ec3f7f8e-603c-4ba3-a5cb-0921d9fa282a", "DetectTime": "2024-05-21T12:45:36.884893+00:00", "EventTime": "2024-05-21T12:45:36.884914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8FvusqRHamXnHoh"], "accumulated_threat_level": 9.3, "timewindow": 143} +{"Format": "IDEA0", "ID": "e61b69ef-c97f-4105-89e7-b5ef458161f6", "DetectTime": "2024-05-21T12:45:36.935324+00:00", "EventTime": "2024-05-21T12:45:36.935344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdFlf4t1V9H2E1Wsh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 143} +{"Format": "IDEA0", "ID": "7f88cd3a-da94-42ac-8bec-1158aed7c626", "DetectTime": "2024-05-21T12:45:37.149500+00:00", "EventTime": "2024-05-21T12:45:37.149516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.235.174.22"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.235.174.22 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3Qco3q6krGGVq6C3"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d35f315b-89cd-4821-844b-1576092216ea", "DetectTime": "2024-05-21T12:45:37.162016+00:00", "EventTime": "2024-05-21T12:45:37.162038+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.235.174.22"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.235.174.22 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc3Qco3q6krGGVq6C3"], "accumulated_threat_level": 10.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "8c09cec4-d384-4226-aedc-6ae69a3ce224", "DetectTime": "2024-05-21T12:45:37.210969+00:00", "EventTime": "2024-05-21T12:45:37.210987+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBNJ7333PekbIl7Sa6"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "61f7592b-5d7a-424e-a221-bc94954b8297", "DetectTime": "2024-05-21T12:45:37.224794+00:00", "EventTime": "2024-05-21T12:45:37.224821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBNJ7333PekbIl7Sa6"], "accumulated_threat_level": 11.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "f7204c58-1729-4dec-a8ef-16ea6ca469be", "DetectTime": "2024-05-21T12:45:37.231400+00:00", "EventTime": "2024-05-21T12:45:37.231420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf67KO1SwIuuc5XxYb"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "9f82a554-89eb-4523-ba5a-9371533b1f00", "DetectTime": "2024-05-21T12:45:37.263061+00:00", "EventTime": "2024-05-21T12:45:37.263080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMYYt1qqSLmX6VEPe"], "accumulated_threat_level": 10.900000000000002, "timewindow": 143} +{"Format": "IDEA0", "ID": "9650efc2-e781-4aa1-a9a2-f70872531b8e", "DetectTime": "2024-05-21T12:45:37.300248+00:00", "EventTime": "2024-05-21T12:45:37.300271+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.62.204.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.62.204.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrok13busnINKzFwh"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "566d38cd-23ef-4164-8a50-9bfa7f256434", "DetectTime": "2024-05-21T12:45:37.313258+00:00", "EventTime": "2024-05-21T12:45:37.313281+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.62.204.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.62.204.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUrok13busnINKzFwh"], "accumulated_threat_level": 11.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "7c2c9e98-2b6d-4937-9bed-56449ac5b215", "DetectTime": "2024-05-21T12:45:37.324462+00:00", "EventTime": "2024-05-21T12:45:37.324480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPw4NHiY9GBGSvOd"], "accumulated_threat_level": 11.700000000000003, "timewindow": 143} +{"Format": "IDEA0", "ID": "7b5f931e-b4fb-474e-90ef-204dadd3a25b", "DetectTime": "2024-05-21T12:45:37.358449+00:00", "EventTime": "2024-05-21T12:45:37.358469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEKtWg47PyZNh46CWf"], "accumulated_threat_level": 12.500000000000004, "timewindow": 143} +{"Format": "Json", "ID": "7b5f931e-b4fb-474e-90ef-204dadd3a25b", "DetectTime": "2024-05-21T12:45:37.358449+00:00", "EventTime": "2024-05-21T12:45:37.358469+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-06T22:12:58.797323+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2024/05/21 12:45:37.574289)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 143, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "e9244937-5022-4fc5-8e98-863eb8c33b7a", "DetectTime": "2024-05-21T12:45:37.586927+00:00", "EventTime": "2024-05-21T12:45:37.586946+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.42.213"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.42.213 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpnkW2ajnB7RBUPa2"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "e2d3c631-ec59-4c3e-9972-42e52b2bf8aa", "DetectTime": "2024-05-21T12:45:37.600146+00:00", "EventTime": "2024-05-21T12:45:37.600167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.42.213"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.42.213 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpnkW2ajnB7RBUPa2"], "accumulated_threat_level": 12.0, "timewindow": 31} +{"Format": "Json", "ID": "e2d3c631-ec59-4c3e-9972-42e52b2bf8aa", "DetectTime": "2024-05-21T12:45:37.600146+00:00", "EventTime": "2024-05-21T12:45:37.600167+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.42.213"]}], "Attach": [{"Content": "1970-01-02T06:54:30.234790+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:45:38.211918)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "dcd2371c-ee5b-4447-b50c-1aa03803c91e", "DetectTime": "2024-05-21T12:45:38.225729+00:00", "EventTime": "2024-05-21T12:45:38.225758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPGtEY2DFFCMdVpOP"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "5dfabdca-b339-41b3-850a-a7b6813beaca", "DetectTime": "2024-05-21T12:45:38.239772+00:00", "EventTime": "2024-05-21T12:45:38.239792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.170.98.24"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.170.98.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7B6561DVVwzhY2Mh"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "2e842988-5d8a-45ac-9f7b-3767cf58d51e", "DetectTime": "2024-05-21T12:45:38.251532+00:00", "EventTime": "2024-05-21T12:45:38.251550+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.170.98.24"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.170.98.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7B6561DVVwzhY2Mh"], "accumulated_threat_level": 0.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "5d962947-7a80-4eb2-808f-c9d4f278c53e", "DetectTime": "2024-05-21T12:45:38.264732+00:00", "EventTime": "2024-05-21T12:45:38.264755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cde7yC4wbvoAl2wPke"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "c56ceb4c-4e14-4714-9a92-174ccce757eb", "DetectTime": "2024-05-21T12:45:38.277065+00:00", "EventTime": "2024-05-21T12:45:38.277085+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.98.123.224"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.98.123.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthVej24Lh9Uzun6ka"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "f5390873-9479-437e-8cb4-e2a83219fba6", "DetectTime": "2024-05-21T12:45:38.289891+00:00", "EventTime": "2024-05-21T12:45:38.289923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.98.123.224"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.98.123.224 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CthVej24Lh9Uzun6ka"], "accumulated_threat_level": 1.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "7e94ad55-bfce-4056-82ed-f6066b953975", "DetectTime": "2024-05-21T12:45:38.302122+00:00", "EventTime": "2024-05-21T12:45:38.302141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYaVs4zs7Ao8g1Uvd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "4b0794ac-441e-4cb4-933f-3fe06fb19d39", "DetectTime": "2024-05-21T12:45:38.313968+00:00", "EventTime": "2024-05-21T12:45:38.313987+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.183.131.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.183.131.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSKzmewbvjxfbEv3"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bc34ee99-6fb5-40a2-b213-ab14d8903ce7", "DetectTime": "2024-05-21T12:45:38.328221+00:00", "EventTime": "2024-05-21T12:45:38.328240+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.183.131.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.183.131.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSKzmewbvjxfbEv3"], "accumulated_threat_level": 1.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "004a81d8-2d24-4e70-9b4e-5791c1d3eb3e", "DetectTime": "2024-05-21T12:45:38.333018+00:00", "EventTime": "2024-05-21T12:45:38.333035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1FNWl4fE4WFND8ndf", "C9zoWYqJlD4Qhh2W6", "CrMKI04Ix73DDDkKHc", "CQJLjA3a0QnM0TpSPl"], "accumulated_threat_level": 0.5, "timewindow": 148} +{"Format": "IDEA0", "ID": "7658f43f-e020-44a1-ba51-f6d9ec14b467", "DetectTime": "2024-05-21T12:45:38.349776+00:00", "EventTime": "2024-05-21T12:45:38.349794+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.27.131.77"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.27.131.77 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4NcabCQEuj0JOWi"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "43b7fb37-53c6-4c1b-a376-0fcaacf0562b", "DetectTime": "2024-05-21T12:45:38.362904+00:00", "EventTime": "2024-05-21T12:45:38.362932+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.27.131.77"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.27.131.77 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4NcabCQEuj0JOWi"], "accumulated_threat_level": 2.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "3e295f50-0b78-4b30-8cce-d8105b6719b4", "DetectTime": "2024-05-21T12:45:38.367740+00:00", "EventTime": "2024-05-21T12:45:38.367757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPELm02CGQU5YjRaXd"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "642879d7-4042-4073-aaef-e229cff1bb63", "DetectTime": "2024-05-21T12:45:38.372454+00:00", "EventTime": "2024-05-21T12:45:38.372473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cne0nRlbiznt9RZ1l"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "e2f619c9-fbf1-4f2d-a388-834e1df965d6", "DetectTime": "2024-05-21T12:45:38.376896+00:00", "EventTime": "2024-05-21T12:45:38.376913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1snj71U7oK1NfR5wh"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "ba8d7af1-f35e-41fe-8053-d0e5a4b4119f", "DetectTime": "2024-05-21T12:45:38.395186+00:00", "EventTime": "2024-05-21T12:45:38.395204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iAb035VM4FfSzjib"], "accumulated_threat_level": 3.2, "timewindow": 143} +{"Format": "IDEA0", "ID": "469daea1-4e66-472e-add4-ed82543ed668", "DetectTime": "2024-05-21T12:45:38.406446+00:00", "EventTime": "2024-05-21T12:45:38.406464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4iv3t1IC7qOhXTmnl"], "accumulated_threat_level": 4.0, "timewindow": 143} +{"Format": "IDEA0", "ID": "dcc09941-908c-41d3-98e1-6942ceaac6e0", "DetectTime": "2024-05-21T12:45:38.411356+00:00", "EventTime": "2024-05-21T12:45:38.411374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dxXy1JmATGLRZ8Uc"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "53ac6ebe-13d4-484b-b6d5-5ce69019015d", "DetectTime": "2024-05-21T12:45:38.424628+00:00", "EventTime": "2024-05-21T12:45:38.424650+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBaxQD48hpCrTjAwo1"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "941046e1-eba6-4deb-814d-3c311e115a9c", "DetectTime": "2024-05-21T12:45:38.441343+00:00", "EventTime": "2024-05-21T12:45:38.441362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcP83h1Ft3VNKnPy7j"], "accumulated_threat_level": 4.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "baf4f68a-4671-4de5-bb94-3e986d3b6114", "DetectTime": "2024-05-21T12:45:38.454607+00:00", "EventTime": "2024-05-21T12:45:38.454627+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBaxQD48hpCrTjAwo1"], "accumulated_threat_level": 2.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "700a07e8-da44-4ff8-b519-1408e2f575e9", "DetectTime": "2024-05-21T12:45:38.460015+00:00", "EventTime": "2024-05-21T12:45:38.460042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czhcop1QUfB8qEa0db"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "b2f6a05e-88c3-4528-83e5-7f846faff32f", "DetectTime": "2024-05-21T12:45:38.465352+00:00", "EventTime": "2024-05-21T12:45:38.465373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CagpLB3gn9SLOL2rh7"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "b09e78da-f313-40cf-a81f-cb43eb70f375", "DetectTime": "2024-05-21T12:45:38.477150+00:00", "EventTime": "2024-05-21T12:45:38.477167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["112.134.193.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.134.193.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOxL8eFO4kPRwb36"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "523d89ab-ab5a-40f4-9cc5-51ac88238072", "DetectTime": "2024-05-21T12:45:38.490634+00:00", "EventTime": "2024-05-21T12:45:38.490656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["112.134.193.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.134.193.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOxL8eFO4kPRwb36"], "accumulated_threat_level": 3.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d004d767-e04c-45b6-a6cd-daf83ac28ebf", "DetectTime": "2024-05-21T12:45:38.506998+00:00", "EventTime": "2024-05-21T12:45:38.507024+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.193.78.226"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.193.78.226 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxmQJ20CPcKsAJRqf"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "1da1911d-a832-4c13-b933-ec6351aefa14", "DetectTime": "2024-05-21T12:45:38.521850+00:00", "EventTime": "2024-05-21T12:45:38.521883+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.193.78.226"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.193.78.226 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxmQJ20CPcKsAJRqf"], "accumulated_threat_level": 3.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "78d4f78c-9342-4433-8368-a32668988b56", "DetectTime": "2024-05-21T12:45:38.534235+00:00", "EventTime": "2024-05-21T12:45:38.534273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQPSC1I0iLPhXtRM5"], "accumulated_threat_level": 5.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "1aac9ca3-9a98-4c4b-97c6-3be3d1cd634c", "DetectTime": "2024-05-21T12:45:38.539677+00:00", "EventTime": "2024-05-21T12:45:38.539696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVl5fm44NqeS5K8zph"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "7a1233ab-e40f-429d-9a66-d8e5f8adcf3d", "DetectTime": "2024-05-21T12:45:38.552398+00:00", "EventTime": "2024-05-21T12:45:38.552418+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.132.82"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.132.82 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu3VTu4a36lFos1d1"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c7a3a524-265d-45b3-bde6-e9e8d0994b12", "DetectTime": "2024-05-21T12:45:38.566805+00:00", "EventTime": "2024-05-21T12:45:38.566837+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.132.82"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.132.82 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu3VTu4a36lFos1d1"], "accumulated_threat_level": 4.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "bbf42f71-5a8d-4d34-902d-83311bab2f76", "DetectTime": "2024-05-21T12:45:38.605654+00:00", "EventTime": "2024-05-21T12:45:38.605675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvacgk2xCOKSeOmN82"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "2fbbe702-e2b9-42c4-97bb-335126dbdcef", "DetectTime": "2024-05-21T12:45:38.610713+00:00", "EventTime": "2024-05-21T12:45:38.610735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCOPBE4tSAEKesypn7"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "fc791087-672f-4766-b6f6-1fde06d26412", "DetectTime": "2024-05-21T12:45:38.642569+00:00", "EventTime": "2024-05-21T12:45:38.642592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.121.10.87"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.121.10.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrL2KFGyvOT8gLgb6"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "3a045caf-d55e-4e62-b474-d4a6fbb43008", "DetectTime": "2024-05-21T12:45:38.656834+00:00", "EventTime": "2024-05-21T12:45:38.656861+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.121.10.87"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.121.10.87 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrL2KFGyvOT8gLgb6"], "accumulated_threat_level": 4.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "3680bb4e-a3fa-4687-a03a-5367b1bec58f", "DetectTime": "2024-05-21T12:45:38.663148+00:00", "EventTime": "2024-05-21T12:45:38.663179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClI7gS2gK6xKeCPvve"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "f919bbd7-7bd3-45f1-a1e0-ffd44702eb5c", "DetectTime": "2024-05-21T12:45:38.710051+00:00", "EventTime": "2024-05-21T12:45:38.710074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClDOz23N83JnwCYjm1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 143} +{"Format": "IDEA0", "ID": "bcf3d394-822d-4e94-a815-fd0052f8f466", "DetectTime": "2024-05-21T12:45:38.752580+00:00", "EventTime": "2024-05-21T12:45:38.752602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.192.94.172"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.192.94.172 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCfVL1gT53GeckVFj"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "e4f5f818-e4ad-435d-b0d6-b891a4ae677f", "DetectTime": "2024-05-21T12:45:38.757747+00:00", "EventTime": "2024-05-21T12:45:38.757765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU43Tp344SVJDdX8sk"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "024892d4-2f90-4261-8874-9018b6344061", "DetectTime": "2024-05-21T12:45:38.772384+00:00", "EventTime": "2024-05-21T12:45:38.772410+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.192.94.172"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.192.94.172 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCfVL1gT53GeckVFj"], "accumulated_threat_level": 5.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "0bdba3de-eb96-4a89-9b54-b772724f8feb", "DetectTime": "2024-05-21T12:45:38.794912+00:00", "EventTime": "2024-05-21T12:45:38.794933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NWHT0856HhCVhT4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "8d0f88b5-f956-44be-8011-3ec7f1d587d4", "DetectTime": "2024-05-21T12:45:38.834582+00:00", "EventTime": "2024-05-21T12:45:38.834600+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptTbn4Gml6ckkbEx8"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "087adf7f-0d0e-460d-ab70-d1e8ae0c88a9", "DetectTime": "2024-05-21T12:45:38.846652+00:00", "EventTime": "2024-05-21T12:45:38.846671+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CptTbn4Gml6ckkbEx8"], "accumulated_threat_level": 5.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "aff54796-f782-473c-84eb-224058e1c1a4", "DetectTime": "2024-05-21T12:45:38.895824+00:00", "EventTime": "2024-05-21T12:45:38.895842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctw99O30bHfF8mfvL1"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "25979cfa-fa64-4b18-bbb5-9274d0da6e28", "DetectTime": "2024-05-21T12:45:38.908091+00:00", "EventTime": "2024-05-21T12:45:38.908111+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctw99O30bHfF8mfvL1"], "accumulated_threat_level": 6.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "4b6f52b3-f9e7-41d3-b3ef-bfa15662bedd", "DetectTime": "2024-05-21T12:45:39.008544+00:00", "EventTime": "2024-05-21T12:45:39.008567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uzbP38ecAzoe9Qd"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "f8864667-2ce3-44b6-8e1c-2bdee2428d62", "DetectTime": "2024-05-21T12:45:39.078106+00:00", "EventTime": "2024-05-21T12:45:39.078126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChyPsa3wEiu1eELkR9"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "1f937dd6-845e-4d19-a6c8-e3a9d13a24f3", "DetectTime": "2024-05-21T12:45:39.083425+00:00", "EventTime": "2024-05-21T12:45:39.083446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8gst3gRXADHDx4Db"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "6f743d69-eadc-491a-a5a2-6b56cb21606c", "DetectTime": "2024-05-21T12:45:39.089057+00:00", "EventTime": "2024-05-21T12:45:39.089079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkSvq27WwtarFNryd"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "32cfae18-1418-478c-bb30-189fc3682831", "DetectTime": "2024-05-21T12:45:39.093995+00:00", "EventTime": "2024-05-21T12:45:39.094014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuiMWA4gEmslO3ha8h"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "b0c48676-6935-464c-a6b1-5fe685b22116", "DetectTime": "2024-05-21T12:45:39.174350+00:00", "EventTime": "2024-05-21T12:45:39.174376+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["106.51.157.142"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 106.51.157.142 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRQDH39mKbJbt7w5"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "484fc917-13b2-4cd4-9e49-b5b92b75c9a6", "DetectTime": "2024-05-21T12:45:39.187448+00:00", "EventTime": "2024-05-21T12:45:39.187474+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["106.51.157.142"]}], "Attach": [{"Content": "connection to blacklisted IP: 106.51.157.142 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKRQDH39mKbJbt7w5"], "accumulated_threat_level": 6.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "d367860d-b5ef-4960-8cdb-e88172ae185c", "DetectTime": "2024-05-21T12:45:39.229204+00:00", "EventTime": "2024-05-21T12:45:39.229224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGlykn2jLWAApCYTq5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "07c79492-541b-4eb0-9d65-8df88cccb89c", "DetectTime": "2024-05-21T12:45:39.246093+00:00", "EventTime": "2024-05-21T12:45:39.246112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["49.145.81.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.145.81.144 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpvfsz4XZDJizwBvSk"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "94190fb2-e14e-47f3-85eb-5bada5573942", "DetectTime": "2024-05-21T12:45:39.251591+00:00", "EventTime": "2024-05-21T12:45:39.251611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZKaP1JNYeWajhO2b"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "ccb821d7-4a5c-4f3b-9857-9f464103e3cd", "DetectTime": "2024-05-21T12:45:39.266137+00:00", "EventTime": "2024-05-21T12:45:39.266172+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["49.145.81.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 49.145.81.144 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpvfsz4XZDJizwBvSk"], "accumulated_threat_level": 7.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "48a407cc-e020-4dca-b0e9-f4c38019bbfb", "DetectTime": "2024-05-21T12:45:39.273634+00:00", "EventTime": "2024-05-21T12:45:39.273654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3izOl4pU8X1Cv3Hle"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "d0c0ac06-4e90-4690-9235-fb5c4759bd1b", "DetectTime": "2024-05-21T12:45:39.326746+00:00", "EventTime": "2024-05-21T12:45:39.326765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["77.22.218.43"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 77.22.218.43 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwJo615KDHcBDaeRk"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a53809d3-411e-4ca6-b9b4-cf1e13996bec", "DetectTime": "2024-05-21T12:45:39.340770+00:00", "EventTime": "2024-05-21T12:45:39.340801+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["77.22.218.43"]}], "Attach": [{"Content": "connection to blacklisted IP: 77.22.218.43 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgwJo615KDHcBDaeRk"], "accumulated_threat_level": 7.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "a65f47ae-e3e6-4d00-b1e9-277c7f13b623", "DetectTime": "2024-05-21T12:45:39.408133+00:00", "EventTime": "2024-05-21T12:45:39.408154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["69.142.65.193"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.142.65.193 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ2lh9tg7icV9SE22"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "7b7d5149-ee69-4205-ad14-a732d2c8edf5", "DetectTime": "2024-05-21T12:45:39.422311+00:00", "EventTime": "2024-05-21T12:45:39.422338+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["69.142.65.193"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.142.65.193 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ2lh9tg7icV9SE22"], "accumulated_threat_level": 8.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "10a5c50e-3a72-446f-b848-36f792ec4e85", "DetectTime": "2024-05-21T12:45:39.515289+00:00", "EventTime": "2024-05-21T12:45:39.515310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["89.229.23.220"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.229.23.220 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RAb42q45djQQ6pIb"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "2eaa7816-c4f4-46f8-ba53-db466661a05b", "DetectTime": "2024-05-21T12:45:39.529911+00:00", "EventTime": "2024-05-21T12:45:39.529935+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["89.229.23.220"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.229.23.220 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RAb42q45djQQ6pIb"], "accumulated_threat_level": 8.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "cf6ebad1-f807-4e95-b54e-e3781d5083fa", "DetectTime": "2024-05-21T12:45:39.582960+00:00", "EventTime": "2024-05-21T12:45:39.582981+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwN8s1KlKwbwF4tk5"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "153e786b-2863-4740-9500-3417c0564d88", "DetectTime": "2024-05-21T12:45:39.596991+00:00", "EventTime": "2024-05-21T12:45:39.597017+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwN8s1KlKwbwF4tk5"], "accumulated_threat_level": 9.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "d9478a37-a973-4c63-b61b-5a7ddbb3aa46", "DetectTime": "2024-05-21T12:45:39.653606+00:00", "EventTime": "2024-05-21T12:45:39.653629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZw54C2J62h9QdtFm3"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "d1b1857f-606f-4cf8-b7b4-0f48ec26933b", "DetectTime": "2024-05-21T12:45:39.658396+00:00", "EventTime": "2024-05-21T12:45:39.658433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ecZG2ygnSA6S4Ie4"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "dee62074-d894-4d6d-9108-3bf9c86aa8b2", "DetectTime": "2024-05-21T12:45:39.671790+00:00", "EventTime": "2024-05-21T12:45:39.671813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CteBXLvmBLsX5Zm1g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "af4b41d4-0b25-4cb7-8915-1f2b8904e747", "DetectTime": "2024-05-21T12:45:39.677015+00:00", "EventTime": "2024-05-21T12:45:39.677036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClpxFj37anmgXR1YSk"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "f8740cee-0977-4c52-9f59-65816f2c88a4", "DetectTime": "2024-05-21T12:45:39.690766+00:00", "EventTime": "2024-05-21T12:45:39.690786+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["119.160.175.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 119.160.175.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7p3dG4rFW3yucjMTd"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "14abb214-ae7c-4bfc-b6fc-538c56ffe48a", "DetectTime": "2024-05-21T12:45:39.705417+00:00", "EventTime": "2024-05-21T12:45:39.705440+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["119.160.175.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 119.160.175.150 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7p3dG4rFW3yucjMTd"], "accumulated_threat_level": 9.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "21445555-4d95-4b82-815a-470683fc008d", "DetectTime": "2024-05-21T12:45:39.822064+00:00", "EventTime": "2024-05-21T12:45:39.822085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRmJtA4cvBI5TwKN18"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "574a476b-7411-4ac4-aab5-4b47f656abb7", "DetectTime": "2024-05-21T12:45:39.860677+00:00", "EventTime": "2024-05-21T12:45:39.860712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP84dN2nsgkkiSUgl4"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "9c02c7cc-0392-4522-a236-0f06d04aeef0", "DetectTime": "2024-05-21T12:45:39.865910+00:00", "EventTime": "2024-05-21T12:45:39.865932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7dpV3wJiY6GCIKR9"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "39532bdc-9a45-435f-8162-5202b0b5ab47", "DetectTime": "2024-05-21T12:45:39.941257+00:00", "EventTime": "2024-05-21T12:45:39.941278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3I6U2y2HKk6Mulfc"], "accumulated_threat_level": 9.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "04af6508-8ae0-448b-a94e-7e604a5f72c5", "DetectTime": "2024-05-21T12:45:40.106025+00:00", "EventTime": "2024-05-21T12:45:40.106043+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.77.4.212"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.77.4.212 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN73c14qgwDI5DWTg2"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9caa4a8c-1aa3-422d-867a-d395d3e06999", "DetectTime": "2024-05-21T12:45:40.120342+00:00", "EventTime": "2024-05-21T12:45:40.120364+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.77.4.212"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.77.4.212 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN73c14qgwDI5DWTg2"], "accumulated_threat_level": 10.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "70bb9b81-c189-4a3c-bc77-4052b1fbf6a1", "DetectTime": "2024-05-21T12:45:40.169975+00:00", "EventTime": "2024-05-21T12:45:40.169992+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["219.91.186.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 219.91.186.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTW1UpNG29Jh0Rda"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "c26b2251-893b-4948-838b-9913f8381e13", "DetectTime": "2024-05-21T12:45:40.181373+00:00", "EventTime": "2024-05-21T12:45:40.181392+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["219.91.186.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 219.91.186.20 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTW1UpNG29Jh0Rda"], "accumulated_threat_level": 10.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "7ba438d3-9db3-4244-b42d-3a5e43cb22ea", "DetectTime": "2024-05-21T12:45:40.186193+00:00", "EventTime": "2024-05-21T12:45:40.186211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGWPMd2Ziv9vAFKi"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "6e31adc7-0c1e-4a39-bf8d-9a896440acc0", "DetectTime": "2024-05-21T12:45:40.192388+00:00", "EventTime": "2024-05-21T12:45:40.192407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPq3d1lZ2nJGgEva"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "8039d34d-cc98-484a-bdbe-f2651e01d54e", "DetectTime": "2024-05-21T12:45:40.206088+00:00", "EventTime": "2024-05-21T12:45:40.206107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.101.238.77"]}], "Attach": [{"Content": "Connection to unknown destination port 5571/UDP destination IP 50.101.238.77. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C985ZT1mMLJCwFJHfj"], "accumulated_threat_level": 10.4, "timewindow": 143} +{"Format": "IDEA0", "ID": "97cd97a0-7dfe-4aec-9875-12c69f7469a4", "DetectTime": "2024-05-21T12:45:40.211281+00:00", "EventTime": "2024-05-21T12:45:40.211300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgwoKGfW40WY7BQ3"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "a71f1db5-d75c-4b81-9749-76a1f6d21911", "DetectTime": "2024-05-21T12:45:40.231322+00:00", "EventTime": "2024-05-21T12:45:40.231341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.245.191.3"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.245.191.3 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zRRRqCh8m0DKan1"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "b8ff6879-3da6-421b-8cf4-30ec9c18d128", "DetectTime": "2024-05-21T12:45:40.245161+00:00", "EventTime": "2024-05-21T12:45:40.245180+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.245.191.3"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.245.191.3 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zRRRqCh8m0DKan1"], "accumulated_threat_level": 11.0, "timewindow": 31} +{"Format": "IDEA0", "ID": "a490d476-eef4-4508-91a7-41312d395059", "DetectTime": "2024-05-21T12:45:40.306563+00:00", "EventTime": "2024-05-21T12:45:40.306582+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.56.147.241"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.56.147.241 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtNF214NdrFMQz8ZUk"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "da2f5ee6-9fb8-490e-8a5c-63d7078a865b", "DetectTime": "2024-05-21T12:45:40.320444+00:00", "EventTime": "2024-05-21T12:45:40.320471+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.56.147.241"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.56.147.241 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtNF214NdrFMQz8ZUk"], "accumulated_threat_level": 11.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "d8a6aff0-7aaa-4116-baf7-443bdc0dee14", "DetectTime": "2024-05-21T12:45:40.344984+00:00", "EventTime": "2024-05-21T12:45:40.345005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNvS81eIPxUS2PiBi"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "dafbbc0f-e534-405a-a9c3-95e15bf7d401", "DetectTime": "2024-05-21T12:45:40.350528+00:00", "EventTime": "2024-05-21T12:45:40.350549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJzKm2DqkGGRpRim3"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "b1618fc7-8265-4779-8d04-1d76b202eda0", "DetectTime": "2024-05-21T12:45:40.378444+00:00", "EventTime": "2024-05-21T12:45:40.378464+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.176.246.218"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.176.246.218 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1s8Vi1c7H4CBKSZd"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "585c96d3-18d9-4695-ae69-4c7998a8fe68", "DetectTime": "2024-05-21T12:45:40.392713+00:00", "EventTime": "2024-05-21T12:45:40.392732+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.176.246.218"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.176.246.218 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1s8Vi1c7H4CBKSZd"], "accumulated_threat_level": 12.0, "timewindow": 31} +{"Format": "Json", "ID": "585c96d3-18d9-4695-ae69-4c7998a8fe68", "DetectTime": "2024-05-21T12:45:40.392713+00:00", "EventTime": "2024-05-21T12:45:40.392732+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.176.246.218"]}], "Attach": [{"Content": "1970-01-02T06:57:14.230390+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 31. (real time 2024/05/21 12:45:41.102554)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 31, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "e86e17bd-cb53-4a59-bf27-de4c54f15737", "DetectTime": "2024-05-21T12:45:41.115954+00:00", "EventTime": "2024-05-21T12:45:41.115974+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["119.131.229.120"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 119.131.229.120 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgwLT1jUVdDe5sSLf"], "accumulated_threat_level": 0, "timewindow": 31} +{"Format": "IDEA0", "ID": "9937deed-1559-4165-a7cb-fa13c8159f91", "DetectTime": "2024-05-21T12:45:41.129737+00:00", "EventTime": "2024-05-21T12:45:41.129759+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["119.131.229.120"]}], "Attach": [{"Content": "connection to blacklisted IP: 119.131.229.120 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgwLT1jUVdDe5sSLf"], "accumulated_threat_level": 0.5, "timewindow": 31} +{"Format": "IDEA0", "ID": "e571ffae-8610-4d69-b740-11f28648a6da", "DetectTime": "2024-05-21T12:45:41.135903+00:00", "EventTime": "2024-05-21T12:45:41.135924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4LGSbqVyMpa3C4Hg"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "6cdf0f6f-3bf6-4aec-aedb-f49b1a7ed49f", "DetectTime": "2024-05-21T12:45:41.148553+00:00", "EventTime": "2024-05-21T12:45:41.148571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5o8zzVuhBdSoV63"], "accumulated_threat_level": 11.200000000000001, "timewindow": 143} +{"Format": "IDEA0", "ID": "a1a931ce-1746-4b1c-83f0-295f04ffe4cb", "DetectTime": "2024-05-21T12:45:41.153559+00:00", "EventTime": "2024-05-21T12:45:41.153577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmLhy2QmZeEZXFB11"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "7c8b1659-fed7-42bb-ad49-71b8f7216bf8", "DetectTime": "2024-05-21T12:45:41.158299+00:00", "EventTime": "2024-05-21T12:45:41.158317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDCvIa4OHMyJxtp0Q3"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "0a748a81-07b5-43e0-9045-724f9f225b34", "DetectTime": "2024-05-21T12:45:41.162996+00:00", "EventTime": "2024-05-21T12:45:41.163014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40PLWtIaRMhYdSs3"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "e17d1092-5127-42bf-b043-9fe1dbe3cd19", "DetectTime": "2024-05-21T12:45:41.167740+00:00", "EventTime": "2024-05-21T12:45:41.167758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVD1URGyInkw2gZk"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "89a1bc3d-a680-405b-9f04-4b1ce8abfb9b", "DetectTime": "2024-05-21T12:45:41.172446+00:00", "EventTime": "2024-05-21T12:45:41.172464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOOZC37xB8GXHgkY5"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "174865c4-dd94-4cd3-b245-41c314ea8601", "DetectTime": "2024-05-21T12:45:41.254029+00:00", "EventTime": "2024-05-21T12:45:41.254050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnIEFNzZe3fFWOI9"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "8f83a1bb-b05f-4113-9f79-701c09037ca3", "DetectTime": "2024-05-21T12:45:41.338211+00:00", "EventTime": "2024-05-21T12:45:41.338233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeMQVb27gMs6PSJOQf"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "54209467-75e9-4f1e-bf58-fa87a6cb3b96", "DetectTime": "2024-05-21T12:45:41.348406+00:00", "EventTime": "2024-05-21T12:45:41.348426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jevY3rp0BzMISXFg"], "accumulated_threat_level": 10.4, "timewindow": 140} +{"Format": "IDEA0", "ID": "83dee000-9383-479d-80c9-ab08f369c810", "DetectTime": "2024-05-21T12:45:41.430339+00:00", "EventTime": "2024-05-21T12:45:41.430360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsAuzCPzl1aDKNBY8"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "628d7f11-00a1-434e-9e89-95c5ab893efe", "DetectTime": "2024-05-21T12:45:41.436672+00:00", "EventTime": "2024-05-21T12:45:41.436691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPBvE3F7Xj8SuQgP7"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "0512023a-9c4a-4de7-8a58-11369e80f271", "DetectTime": "2024-05-21T12:45:41.520585+00:00", "EventTime": "2024-05-21T12:45:41.520606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxfisR3n3JqiCQOFqb"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "33a906cb-8212-4e99-9a40-b7bec3a0cd95", "DetectTime": "2024-05-21T12:45:41.526593+00:00", "EventTime": "2024-05-21T12:45:41.526613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMf10uE65uYetIMF9"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "2c6d32a8-ddbf-410e-b8ed-73f53eb82316", "DetectTime": "2024-05-21T12:45:41.821801+00:00", "EventTime": "2024-05-21T12:45:41.821823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgrPf9448krDb85N0k"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "b592eb4d-3f4b-43be-b766-54ab3f046811", "DetectTime": "2024-05-21T12:45:41.872512+00:00", "EventTime": "2024-05-21T12:45:41.872538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C23c2s2Iv8T80nj6kh"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "43a357dd-0eb0-4d26-87c6-fecafa5cf61b", "DetectTime": "2024-05-21T12:45:41.926491+00:00", "EventTime": "2024-05-21T12:45:41.926513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDfEM1qsyEVvLptfd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 143} +{"Format": "Json", "ID": "43a357dd-0eb0-4d26-87c6-fecafa5cf61b", "DetectTime": "2024-05-21T12:45:41.926491+00:00", "EventTime": "2024-05-21T12:45:41.926513+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-06T22:43:11.116513+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2024/05/21 12:45:42.098643)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 143, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f0552fab-71b5-496e-9c9b-c9c9c987fb34", "DetectTime": "2024-05-21T12:45:42.102867+00:00", "EventTime": "2024-05-21T12:45:42.102886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvzSBUEKXcY4qHbna"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "6c04f20c-4ebf-49bc-bc24-459ecb3787c1", "DetectTime": "2024-05-21T12:45:42.107625+00:00", "EventTime": "2024-05-21T12:45:42.107643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWouw4erDej6KOvt4"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "da1d9a99-524c-460e-9f65-fa481463f246", "DetectTime": "2024-05-21T12:45:42.112348+00:00", "EventTime": "2024-05-21T12:45:42.112366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNNCHC2R9lO58E7Tw6"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "4c7edbc8-56c3-410f-b4df-d1d649581218", "DetectTime": "2024-05-21T12:45:42.174504+00:00", "EventTime": "2024-05-21T12:45:42.174525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgGdp33TkeUV219uVk"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "8362ebff-1bba-425e-9b67-60f2bec15380", "DetectTime": "2024-05-21T12:45:42.180868+00:00", "EventTime": "2024-05-21T12:45:42.180886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCpSe4zQy7Ug8M5Bb"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "d160a580-99d1-48c4-a33e-dbb1cece2b48", "DetectTime": "2024-05-21T12:45:42.185304+00:00", "EventTime": "2024-05-21T12:45:42.185322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgVJGj1FrQ3IHpZTi3"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "4e68b93b-8e72-4d03-96a3-b5e757ff9d6a", "DetectTime": "2024-05-21T12:45:42.189984+00:00", "EventTime": "2024-05-21T12:45:42.190004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5WY3q24vup8UcMfJ8"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "11443c13-5063-4bf9-ade4-a6b7993fe07b", "DetectTime": "2024-05-21T12:45:42.194862+00:00", "EventTime": "2024-05-21T12:45:42.194883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9oJo2VzRkHEp7d3f"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "3b0276c5-0b06-4b2d-bbca-c607ae085c1e", "DetectTime": "2024-05-21T12:45:42.521968+00:00", "EventTime": "2024-05-21T12:45:42.521993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV3p0bWmeoBLBTfG8"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "2f2571ed-bfdd-4b44-946a-0608db20b996", "DetectTime": "2024-05-21T12:45:42.653041+00:00", "EventTime": "2024-05-21T12:45:42.653061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbib8Q2tfNRZAZKZoj"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "ff631922-d6a6-4148-8b90-6e65615dcd8d", "DetectTime": "2024-05-21T12:45:42.665728+00:00", "EventTime": "2024-05-21T12:45:42.665749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWI6c3D3mbu7F2iE"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "b57e827f-9a1e-460c-be54-a0f498553d25", "DetectTime": "2024-05-21T12:45:42.670559+00:00", "EventTime": "2024-05-21T12:45:42.670578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqlR7F47rvmyiwnpeh"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "6ed23db7-32ee-4072-8f71-f638baca9820", "DetectTime": "2024-05-21T12:45:42.990803+00:00", "EventTime": "2024-05-21T12:45:42.990827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGDRmb4vtrqEVCRFE4"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "6fe2ca80-4de0-4f6b-a8d5-a5cb80f55d48", "DetectTime": "2024-05-21T12:45:43.007085+00:00", "EventTime": "2024-05-21T12:45:43.007105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrfLpMLbqN2swjtS5"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "e9ac960b-9671-4f53-aa05-f0fd019db34c", "DetectTime": "2024-05-21T12:45:43.075199+00:00", "EventTime": "2024-05-21T12:45:43.075220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRD77QGm3ICQ0eqOe"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "8fb71610-14e9-45d8-8b57-269e95d47583", "DetectTime": "2024-05-21T12:45:43.139837+00:00", "EventTime": "2024-05-21T12:45:43.139859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYfE514XDKEf00I2Ic"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "46b23a73-310c-47ff-a136-4abc8b4624a7", "DetectTime": "2024-05-21T12:45:43.152210+00:00", "EventTime": "2024-05-21T12:45:43.152234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cptd3k1gABmoFobqzh"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "0748fe49-c588-4cbb-b9c2-4210ef8796ee", "DetectTime": "2024-05-21T12:45:43.186640+00:00", "EventTime": "2024-05-21T12:45:43.186662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvLz418LPXRB21al"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "8a5bd6ea-43de-4202-97b8-787f5f975eb6", "DetectTime": "2024-05-21T12:45:43.222921+00:00", "EventTime": "2024-05-21T12:45:43.222946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRW1k1UokAo98jpq6"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "f0bf861c-6622-43ee-a01e-58ca0cd8d8f3", "DetectTime": "2024-05-21T12:45:43.243933+00:00", "EventTime": "2024-05-21T12:45:43.243951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFItgx4i1CCrAHVp07"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "6cd238b6-31ed-4b60-90ee-cd81b81e1dae", "DetectTime": "2024-05-21T12:45:43.271552+00:00", "EventTime": "2024-05-21T12:45:43.271575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmpnqc2dPod0VuBh47"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "7cc4bbb2-c8f9-4a88-9021-33081ee82c39", "DetectTime": "2024-05-21T12:45:43.573290+00:00", "EventTime": "2024-05-21T12:45:43.573310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQNto4r2S5Q28mkji"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "ac5c119c-bd51-4f03-8d6e-6cbbcc21b4a4", "DetectTime": "2024-05-21T12:45:43.747893+00:00", "EventTime": "2024-05-21T12:45:43.747916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbHWM2aktipsz2bm5"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "18fc33ab-fe6f-43c1-9b13-ea9e592aab72", "DetectTime": "2024-05-21T12:45:43.754198+00:00", "EventTime": "2024-05-21T12:45:43.754219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcYjIV2W1E2mStIj7f"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "044afaf8-d24d-4ecb-b8b4-8858b97fbc14", "DetectTime": "2024-05-21T12:45:43.785122+00:00", "EventTime": "2024-05-21T12:45:43.785141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQ7cb1WGMUDWMmP1"], "accumulated_threat_level": 3.2, "timewindow": 143} +{"Format": "IDEA0", "ID": "3cdba3d9-6693-4ea9-a6f9-18da6afd81f4", "DetectTime": "2024-05-21T12:45:43.924838+00:00", "EventTime": "2024-05-21T12:45:43.924860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE19UC1XyHJzZVCuF3"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "0f9991c1-6e25-4843-adee-906bf5d07edd", "DetectTime": "2024-05-21T12:45:43.931979+00:00", "EventTime": "2024-05-21T12:45:43.932000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSLDO1jpcXBatPXfi"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "60b66ef7-fab1-4c4f-95bd-8f84c6b77a45", "DetectTime": "2024-05-21T12:45:43.937199+00:00", "EventTime": "2024-05-21T12:45:43.937220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDXwZS21MT1q4xytr5"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "8ae96e52-afbe-487f-a5b7-51925f748ebb", "DetectTime": "2024-05-21T12:45:44.246040+00:00", "EventTime": "2024-05-21T12:45:44.246061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ht2X3gOTwVhCmVCa"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "0329e230-9d4c-43ca-85a4-713ca8c0fbbb", "DetectTime": "2024-05-21T12:45:44.299007+00:00", "EventTime": "2024-05-21T12:45:44.299028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfKbmb2pfpfuZCMT0a"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "baf70e09-d568-4b97-914e-261cdd39f074", "DetectTime": "2024-05-21T12:45:44.304398+00:00", "EventTime": "2024-05-21T12:45:44.304417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXAts2Fms5UiMX32d"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "cdd1da28-b5bc-4a78-943f-3cd9112ba3fb", "DetectTime": "2024-05-21T12:45:44.309195+00:00", "EventTime": "2024-05-21T12:45:44.309213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUd2M1MMmSFoaoET2"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "0d9c1b90-4abc-42ed-9ac2-af1bfd017d42", "DetectTime": "2024-05-21T12:45:44.359880+00:00", "EventTime": "2024-05-21T12:45:44.359903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1lda4LwPe0lIk0rj"], "accumulated_threat_level": 4.0, "timewindow": 143} +{"Format": "IDEA0", "ID": "e14c0cbf-d89b-4531-adaa-9ccd4f4a4582", "DetectTime": "2024-05-21T12:45:44.462432+00:00", "EventTime": "2024-05-21T12:45:44.462455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjsEm4T04oJkGO277"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "807a59d5-c901-48e1-b733-c7e659fa5229", "DetectTime": "2024-05-21T12:45:44.469331+00:00", "EventTime": "2024-05-21T12:45:44.469355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CydEPk4ZuvljRJh8C4"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "09c3e49d-4143-450d-b480-0786120bed8c", "DetectTime": "2024-05-21T12:45:44.474759+00:00", "EventTime": "2024-05-21T12:45:44.474778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRRlTuhkfidWjr97"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "87b566e4-54c9-4ae5-a431-edd5b6b33856", "DetectTime": "2024-05-21T12:45:44.844236+00:00", "EventTime": "2024-05-21T12:45:44.844259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxoyWQ1mFLb8YO7AJj"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "93c20fe6-1b0e-4e6c-9ba2-121a83e6b6fd", "DetectTime": "2024-05-21T12:45:44.936590+00:00", "EventTime": "2024-05-21T12:45:44.936613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce9TMT15ipQXYbq0l2"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "db91f4e4-2bce-4df7-b58b-2cbcfb5f8006", "DetectTime": "2024-05-21T12:45:44.942046+00:00", "EventTime": "2024-05-21T12:45:44.942066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYtdLn1p2Fr1K4e3Ve"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "6f3ddb13-d4e8-4877-956b-9bdd07c78cc4", "DetectTime": "2024-05-21T12:45:44.950025+00:00", "EventTime": "2024-05-21T12:45:44.950044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTZCa2ABuVTn9fGth"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "fb8c7be5-e941-4fb1-aadc-899c978b4eee", "DetectTime": "2024-05-21T12:45:45.054159+00:00", "EventTime": "2024-05-21T12:45:45.054180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3C1L2zJesHIwWYXg"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "07fbc816-2bc4-435e-816c-6ee046e5f226", "DetectTime": "2024-05-21T12:45:45.171358+00:00", "EventTime": "2024-05-21T12:45:45.171381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKi5qF157raNp0jwwh"], "accumulated_threat_level": 4.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "c10c7392-70e6-4b7e-a819-8f9127f06e25", "DetectTime": "2024-05-21T12:45:45.176512+00:00", "EventTime": "2024-05-21T12:45:45.176531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1zxFl4D2R6mGv3uti"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "8b5fba73-cef0-4c12-88f0-41fc74deaa8e", "DetectTime": "2024-05-21T12:45:45.355307+00:00", "EventTime": "2024-05-21T12:45:45.355330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiFdMy3NrGu33oZLzl"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "61847f12-30e0-46b6-922a-8065dfef701b", "DetectTime": "2024-05-21T12:45:45.444875+00:00", "EventTime": "2024-05-21T12:45:45.444897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMqJ5AmznUqUl70Jj"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "10fda1fc-9cc5-49eb-be62-2a72e68f1dbc", "DetectTime": "2024-05-21T12:45:45.466600+00:00", "EventTime": "2024-05-21T12:45:45.466623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cexi2I1S5adIJkekv7"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "fdf0fe13-7ce7-43ca-a1a2-80e3c96c0cf6", "DetectTime": "2024-05-21T12:45:45.497983+00:00", "EventTime": "2024-05-21T12:45:45.498004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTxYw3kCO9P82vUC7"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "3cfcd413-8791-42fb-943d-f09449ab906c", "DetectTime": "2024-05-21T12:45:45.564163+00:00", "EventTime": "2024-05-21T12:45:45.564185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdBwHJ1mdfKeCCPTb"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "58ae8512-d6c8-413a-a34a-6ff46412ae5d", "DetectTime": "2024-05-21T12:45:45.904980+00:00", "EventTime": "2024-05-21T12:45:45.905004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMPcmB2lHn1t40Alqi"], "accumulated_threat_level": 5.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "72cfebb4-6e0f-43d9-a699-ad50a2034a80", "DetectTime": "2024-05-21T12:45:45.910242+00:00", "EventTime": "2024-05-21T12:45:45.910262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQXXF4chwLIvtri1e"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "0d196060-b046-4c1a-801b-b5fb02dc9e74", "DetectTime": "2024-05-21T12:45:45.916803+00:00", "EventTime": "2024-05-21T12:45:45.916821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Fz9u1pDb46CZl7m2"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "5e62dcf8-305c-4f2a-8ecc-49d9370f970c", "DetectTime": "2024-05-21T12:45:45.922183+00:00", "EventTime": "2024-05-21T12:45:45.922202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL1EOX37jJoKbI8Fvh"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "2e65191d-1fea-40fe-afe7-0bf651174645", "DetectTime": "2024-05-21T12:45:45.926784+00:00", "EventTime": "2024-05-21T12:45:45.926802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXogi24ayqiLexBX4"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "378fbaaa-1a9c-4c0b-971d-655779104ef5", "DetectTime": "2024-05-21T12:45:46.054470+00:00", "EventTime": "2024-05-21T12:45:46.054496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIpy942qM7e0uRP1c"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "780d9bd0-0e35-47b1-b66e-cc4559daae9d", "DetectTime": "2024-05-21T12:45:46.098166+00:00", "EventTime": "2024-05-21T12:45:46.098193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheSw42nAq1NYV3BCa"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "6d314364-84b9-4660-8ccc-798a3ab7e63a", "DetectTime": "2024-05-21T12:45:46.126771+00:00", "EventTime": "2024-05-21T12:45:46.126794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3rl54LxidkRppWXi"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "817eabe8-4057-43ba-9c0e-2ac3ca036fb9", "DetectTime": "2024-05-21T12:45:46.566058+00:00", "EventTime": "2024-05-21T12:45:46.566081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9Bdu29MkCAp59Dw1"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "33403a7a-6462-4aac-bae8-809a9cd473f0", "DetectTime": "2024-05-21T12:45:46.578073+00:00", "EventTime": "2024-05-21T12:45:46.578093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ZGwn1FFyRSuAb9M1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 143} +{"Format": "IDEA0", "ID": "e1ef8eb6-ee95-4a78-93fe-df6c549915b3", "DetectTime": "2024-05-21T12:45:46.583444+00:00", "EventTime": "2024-05-21T12:45:46.583463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDxwV1a1UfiZq248d"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "73110c42-f078-44f8-8aa9-ad3ed6428f85", "DetectTime": "2024-05-21T12:45:46.669716+00:00", "EventTime": "2024-05-21T12:45:46.669739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvGUSoWf9hoYafph"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "123819d3-db88-49da-b284-9ca8415470a9", "DetectTime": "2024-05-21T12:45:46.687491+00:00", "EventTime": "2024-05-21T12:45:46.687512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9G1na3rLnBwzdtgH6"], "accumulated_threat_level": 10.4, "timewindow": 141} +{"Format": "IDEA0", "ID": "48690303-677f-4cf0-bf56-48151bf70b52", "DetectTime": "2024-05-21T12:45:46.696201+00:00", "EventTime": "2024-05-21T12:45:46.696226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMRufs4SMwLwqNCHLg"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "98fb8e17-66c7-4f93-bd60-73e8cca284ce", "DetectTime": "2024-05-21T12:45:46.701654+00:00", "EventTime": "2024-05-21T12:45:46.701676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIG3Gd2w2JoJGg5nX1"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "ef01b2ad-7d1d-46d8-b81c-e0d773657a3e", "DetectTime": "2024-05-21T12:45:46.707215+00:00", "EventTime": "2024-05-21T12:45:46.707237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct5wfQaV8tEdQF4I1"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "f6b65ca5-56d1-4ade-a25c-2fa5fd389fc1", "DetectTime": "2024-05-21T12:45:46.712483+00:00", "EventTime": "2024-05-21T12:45:46.712504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7WKXj2Bu1kILszH54"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "1ac3a302-d2da-4a01-ba2f-e5db376819e7", "DetectTime": "2024-05-21T12:45:47.229357+00:00", "EventTime": "2024-05-21T12:45:47.229381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHFeh27yK2zMvlBal"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "d234ddf4-5410-498f-905e-0c8c80093311", "DetectTime": "2024-05-21T12:45:47.235311+00:00", "EventTime": "2024-05-21T12:45:47.235331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ0lSD4ICY7ITQlrj2"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "017ecd28-4c67-48d7-abe2-eebc90f807b2", "DetectTime": "2024-05-21T12:45:47.243621+00:00", "EventTime": "2024-05-21T12:45:47.243641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2kisOCWAjA5pSmPb"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "358a5592-0026-4a3b-8c9b-92b8ac1f02a4", "DetectTime": "2024-05-21T12:45:47.249058+00:00", "EventTime": "2024-05-21T12:45:47.249078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cit7wE2n9otMK8NnOl"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "ae9a0feb-4695-4391-8b83-19fda66472c2", "DetectTime": "2024-05-21T12:45:47.253820+00:00", "EventTime": "2024-05-21T12:45:47.253839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx37oY2MkEJVBnBtDb"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "bc144921-5660-4a6a-8bbc-bfd084eb9689", "DetectTime": "2024-05-21T12:45:47.258227+00:00", "EventTime": "2024-05-21T12:45:47.258246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYNQdHTZpgUQFEDk"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "0aa0b7bc-e367-4836-bbc9-92a0d432313f", "DetectTime": "2024-05-21T12:45:47.271241+00:00", "EventTime": "2024-05-21T12:45:47.271260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jHA84gZwenxTVeKd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "dfa46daf-4e8a-44ba-80b7-7d70e8f9ccec", "DetectTime": "2024-05-21T12:45:47.601214+00:00", "EventTime": "2024-05-21T12:45:47.601235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cix3WLOGFTkr4XWa1"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "9a962b0e-1ca9-4c80-9c1a-53493e698e6e", "DetectTime": "2024-05-21T12:45:47.607935+00:00", "EventTime": "2024-05-21T12:45:47.607955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB4oQs1eheDllvQxJi"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "294f4720-c17f-495e-9827-1c4fc56d753b", "DetectTime": "2024-05-21T12:45:47.772914+00:00", "EventTime": "2024-05-21T12:45:47.772938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjxe7i3vReZtOAQRZ8"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "bf3d782a-c390-4d9d-a8f9-9d833c9ce9c9", "DetectTime": "2024-05-21T12:45:47.778082+00:00", "EventTime": "2024-05-21T12:45:47.778102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHui626QQg1YqwJt5"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "d520e499-e119-4b0c-908f-184fc33ed453", "DetectTime": "2024-05-21T12:45:47.813566+00:00", "EventTime": "2024-05-21T12:45:47.813587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7c1eDdpbyaJxaNMa"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "813b19e9-ef2a-4e15-9824-bb8c701c834e", "DetectTime": "2024-05-21T12:45:48.040142+00:00", "EventTime": "2024-05-21T12:45:48.040165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJpDrB7vup0EWX8ua"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "948d4f25-23c4-4ebd-b42b-d9dbe1db8f08", "DetectTime": "2024-05-21T12:45:48.137222+00:00", "EventTime": "2024-05-21T12:45:48.137243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFpLL2bCl5b3mqKef"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "581f7a04-d744-4350-a263-949ad5c2540c", "DetectTime": "2024-05-21T12:45:48.153572+00:00", "EventTime": "2024-05-21T12:45:48.153592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmAb03i8nCla3BDEe"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "37c00422-c4b3-44e8-b4dc-5f86e730759f", "DetectTime": "2024-05-21T12:45:48.158936+00:00", "EventTime": "2024-05-21T12:45:48.158956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmXuE21ozdBUFoEw5"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "e5184769-62cc-4d7b-8cc3-f0c0e8c4318f", "DetectTime": "2024-05-21T12:45:48.200136+00:00", "EventTime": "2024-05-21T12:45:48.200157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CscLAb1LVEoSuvOsC5"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "e94ca6dc-7ef9-4d93-8179-fcc3e4bd7553", "DetectTime": "2024-05-21T12:45:48.205769+00:00", "EventTime": "2024-05-21T12:45:48.205788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq0ym1YUa02xJSNW6"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "8d1a5625-f7ae-4715-aeaa-eb17866fef39", "DetectTime": "2024-05-21T12:45:48.252936+00:00", "EventTime": "2024-05-21T12:45:48.252957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNERP42K3bcjvwnGFl"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "5f13520d-1ea8-4468-9de8-781480d9b633", "DetectTime": "2024-05-21T12:45:48.257721+00:00", "EventTime": "2024-05-21T12:45:48.257740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtELFH3VHKwmK4g4bd"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "44c262e9-4659-40a8-bc83-0993c2c4ae41", "DetectTime": "2024-05-21T12:45:48.281244+00:00", "EventTime": "2024-05-21T12:45:48.281265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CARvL74REHjOtVVzhf"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "b6c5acbc-c2cd-4411-95e7-e0ea78b9eccc", "DetectTime": "2024-05-21T12:45:48.316135+00:00", "EventTime": "2024-05-21T12:45:48.316153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWdCQol6p15kYwSk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "371d914f-a6bf-42cf-b7a0-c0b79dcaf161", "DetectTime": "2024-05-21T12:45:48.728477+00:00", "EventTime": "2024-05-21T12:45:48.728495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXQ2aarkObIsHOFh"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "585460eb-c809-4933-b4e0-2c21c69aea52", "DetectTime": "2024-05-21T12:45:48.734147+00:00", "EventTime": "2024-05-21T12:45:48.734165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrNrsn2ARGm9sNpXWf"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "f2d11174-b8cb-4f8f-a434-80fa64d07c2f", "DetectTime": "2024-05-21T12:45:48.739274+00:00", "EventTime": "2024-05-21T12:45:48.739292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHEtr3yWdqjtxGdod"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "abee7ec0-f08b-41b4-bcf0-d5af51bfa46c", "DetectTime": "2024-05-21T12:45:48.765432+00:00", "EventTime": "2024-05-21T12:45:48.765452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwW4V6Pm4UxKvCbN2"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "b077c1c3-676e-4fd3-9bc2-82063c10904a", "DetectTime": "2024-05-21T12:45:48.858944+00:00", "EventTime": "2024-05-21T12:45:48.858963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJHgI3KN1dSTlMTEd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "370c8480-33a0-413c-b9b6-713973f116a0", "DetectTime": "2024-05-21T12:45:49.134181+00:00", "EventTime": "2024-05-21T12:45:49.134204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZfrin3paVqI6J0fo8"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "652eac77-2033-40bb-b8f8-fdb85e34ea2b", "DetectTime": "2024-05-21T12:45:49.141787+00:00", "EventTime": "2024-05-21T12:45:49.141806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyGQf3tdreERIBUrb"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "79b57a22-3a23-4e1b-823a-3b0468f3594b", "DetectTime": "2024-05-21T12:45:49.146572+00:00", "EventTime": "2024-05-21T12:45:49.146595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgXPg31LbDI7W41Cd"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "d07827db-d756-486b-b881-9148eb5e90e6", "DetectTime": "2024-05-21T12:45:49.309864+00:00", "EventTime": "2024-05-21T12:45:49.309883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Shsp2sSm6ClQGNT1"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "f0bb3929-d730-46d4-98c5-7705d4ddf1a2", "DetectTime": "2024-05-21T12:45:49.330591+00:00", "EventTime": "2024-05-21T12:45:49.330613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5lso3oJNVrblYFF2"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "1f8b5cde-7b6d-4d70-9789-3cb112b8dfb5", "DetectTime": "2024-05-21T12:45:49.375021+00:00", "EventTime": "2024-05-21T12:45:49.375046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCeX11O9a8pUvoaY6"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "0c61167b-cbb0-471e-8553-b779347f0491", "DetectTime": "2024-05-21T12:45:49.381239+00:00", "EventTime": "2024-05-21T12:45:49.381260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6INfp12vgQDNZpwwg"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "ce6ace9f-3961-48c0-ae78-dabe13ded41c", "DetectTime": "2024-05-21T12:45:49.416104+00:00", "EventTime": "2024-05-21T12:45:49.416125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfss8H3iKAsnzRHmVl"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "d347a11b-2599-4f11-b517-e6b21531c1ef", "DetectTime": "2024-05-21T12:45:49.706504+00:00", "EventTime": "2024-05-21T12:45:49.706527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDmv5yUZCZwQCosxf"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "60e3f813-45a3-4cda-a2a3-e154831e5a91", "DetectTime": "2024-05-21T12:45:49.711556+00:00", "EventTime": "2024-05-21T12:45:49.711577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2v9O1fqMdNDvZTvf"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "ed2e1e48-f2bd-48c6-998e-cecebb181e68", "DetectTime": "2024-05-21T12:45:49.716155+00:00", "EventTime": "2024-05-21T12:45:49.716174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZ4o52sDaKYWH1vqb"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "84256e5e-0b28-42ad-bc58-c97a0f58324a", "DetectTime": "2024-05-21T12:45:49.880859+00:00", "EventTime": "2024-05-21T12:45:49.880879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy32H3NaMQCQhS33e"], "accumulated_threat_level": 9.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "89613f75-efcb-4837-90e2-77b8e6d5139a", "DetectTime": "2024-05-21T12:45:49.889627+00:00", "EventTime": "2024-05-21T12:45:49.889647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9eaZKu8d8wMiTv4"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "fadad916-f01e-4ed1-85b1-65664e2fe0ce", "DetectTime": "2024-05-21T12:45:49.894188+00:00", "EventTime": "2024-05-21T12:45:49.894211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkzuYY2xWhkoCpQihd"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "886effdc-2bdc-41e0-851d-7fe40874ee61", "DetectTime": "2024-05-21T12:45:49.917695+00:00", "EventTime": "2024-05-21T12:45:49.917715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHBHj4FAN8kDKOqo2"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "82b1528c-e029-4340-bbcc-4db6851a33ee", "DetectTime": "2024-05-21T12:45:49.926990+00:00", "EventTime": "2024-05-21T12:45:49.927010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA0CxH2zRaBPJiYuOc"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "1361c5b9-c890-4699-9a49-aeb16bf75116", "DetectTime": "2024-05-21T12:45:49.995662+00:00", "EventTime": "2024-05-21T12:45:49.995684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfaFCD2EMJ1u71y0ed"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "930c058f-4c5a-455e-9e15-0290ea5be616", "DetectTime": "2024-05-21T12:45:50.303292+00:00", "EventTime": "2024-05-21T12:45:50.303317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9PSI1ylqxcmhkq24"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "a79d78f2-3093-425b-babc-85a9960f7b44", "DetectTime": "2024-05-21T12:45:50.315713+00:00", "EventTime": "2024-05-21T12:45:50.315735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8w9yp4lIqTJil0Hpf"], "accumulated_threat_level": 10.4, "timewindow": 143} +{"Format": "IDEA0", "ID": "a1d4410d-332c-4488-aa55-abd7356439db", "DetectTime": "2024-05-21T12:45:50.371515+00:00", "EventTime": "2024-05-21T12:45:50.371539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnij9e1H1QQlWVSgOg"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "4a902b12-94c2-4c8d-95a1-c7447323539d", "DetectTime": "2024-05-21T12:45:50.377325+00:00", "EventTime": "2024-05-21T12:45:50.377344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPbbT295YAyIgcbwk"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "a668becc-12e7-4355-bd36-ba0d230ac864", "DetectTime": "2024-05-21T12:45:50.483015+00:00", "EventTime": "2024-05-21T12:45:50.483035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChD0Kd40pPKUBDqjqd"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "520c8a0b-b842-4327-a2ad-e2f50e60daba", "DetectTime": "2024-05-21T12:45:50.495320+00:00", "EventTime": "2024-05-21T12:45:50.495339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Wa171T4swHy17jmk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 143} +{"Format": "IDEA0", "ID": "ce6ecfa3-bbbd-4bc5-a53e-e6a4dad50f1a", "DetectTime": "2024-05-21T12:45:50.500005+00:00", "EventTime": "2024-05-21T12:45:50.500024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClTr3n1AfzQwz4K45l"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "dd8272bd-d349-4fac-9131-08531e848c7f", "DetectTime": "2024-05-21T12:45:50.530529+00:00", "EventTime": "2024-05-21T12:45:50.530551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsxhID1C3wAGCqqPD2"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "b9e50462-f3b8-4a04-b5f8-07bcbcc5496a", "DetectTime": "2024-05-21T12:45:50.819957+00:00", "EventTime": "2024-05-21T12:45:50.819981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDlUAi1eNPOANNrjhh"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "622d9f0f-3b1f-4f38-855b-949ee0dd6d68", "DetectTime": "2024-05-21T12:45:50.859413+00:00", "EventTime": "2024-05-21T12:45:50.859435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHIQHI9oDYBbMYSfc"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "ea4506ef-639c-49c8-beaa-892c9b7d7fe5", "DetectTime": "2024-05-21T12:45:50.985847+00:00", "EventTime": "2024-05-21T12:45:50.985866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7Ekw4QKIAFEAVXd9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 143} +{"Format": "Json", "ID": "ea4506ef-639c-49c8-beaa-892c9b7d7fe5", "DetectTime": "2024-05-21T12:45:50.985847+00:00", "EventTime": "2024-05-21T12:45:50.985866+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-06T22:43:15.026271+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 143. (real time 2024/05/21 12:45:51.166313)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 143, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "19aeba2b-0cb9-4680-a0c3-44d768b50aa8", "DetectTime": "2024-05-21T12:45:51.171035+00:00", "EventTime": "2024-05-21T12:45:51.171059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfAVEs8zccSZjoZ44"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "c47f24c9-c07a-4f1c-be91-6ed291f95e7f", "DetectTime": "2024-05-21T12:45:51.176146+00:00", "EventTime": "2024-05-21T12:45:51.176166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYdhn1y2S9B7sC46h"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "6bccccc3-fc20-42db-bbc5-592c03f82946", "DetectTime": "2024-05-21T12:45:51.181116+00:00", "EventTime": "2024-05-21T12:45:51.181135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjpexj2xMFsH86PHch"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "b254c007-5b6d-4c43-bae0-933ea3327a5a", "DetectTime": "2024-05-21T12:45:51.471232+00:00", "EventTime": "2024-05-21T12:45:51.471253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpEZK39fC5MO9rw1b"], "accumulated_threat_level": 0, "timewindow": 143} +{"Format": "IDEA0", "ID": "f0322e55-6e0a-4dcd-82be-b7da12c405a5", "DetectTime": "2024-05-21T12:45:51.476437+00:00", "EventTime": "2024-05-21T12:45:51.476458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdVRTv1XWUEDxINi05"], "accumulated_threat_level": 0, "timewindow": 143} +{"Format": "IDEA0", "ID": "9abbbb25-d6b2-4c12-8766-f41776dba31e", "DetectTime": "2024-05-21T12:45:51.484901+00:00", "EventTime": "2024-05-21T12:45:51.484921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHeOn24MXaT1iv1p5"], "accumulated_threat_level": 0, "timewindow": 143} +{"Format": "IDEA0", "ID": "41d9a903-207b-407f-a045-bfede52ef7be", "DetectTime": "2024-05-21T12:45:51.489793+00:00", "EventTime": "2024-05-21T12:45:51.489812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqGH44w7lMJE99Oj"], "accumulated_threat_level": 0, "timewindow": 143} +{"Format": "IDEA0", "ID": "bbffdad7-1efe-4ae6-9801-a03efd50ebd8", "DetectTime": "2024-05-21T12:45:51.550613+00:00", "EventTime": "2024-05-21T12:45:51.550635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5DNlH1BAdnHpcLGsf"], "accumulated_threat_level": 10.4, "timewindow": 142} +{"Format": "IDEA0", "ID": "976025cf-e4c7-4895-8bba-101157f26021", "DetectTime": "2024-05-21T12:45:51.591568+00:00", "EventTime": "2024-05-21T12:45:51.591589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDRO1D17AhzQpQqbBj"], "accumulated_threat_level": 0, "timewindow": 143} +{"Format": "IDEA0", "ID": "f95d70be-49cb-4abb-b55c-8a8392b098e6", "DetectTime": "2024-05-21T12:45:51.631978+00:00", "EventTime": "2024-05-21T12:45:51.631998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTKREHE8WqswVYw9"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "836cfbb5-8ef6-4932-b608-946f9dde9249", "DetectTime": "2024-05-21T12:45:52.012176+00:00", "EventTime": "2024-05-21T12:45:52.012202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvvUB1WbGt2l6izV6"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "f8809ca4-e9a1-446a-850c-5ab85410e2b1", "DetectTime": "2024-05-21T12:45:52.027343+00:00", "EventTime": "2024-05-21T12:45:52.027365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2Zks5O9HLI3Oope"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "c78430f3-6370-49c1-aa02-870856d53f2b", "DetectTime": "2024-05-21T12:45:52.032196+00:00", "EventTime": "2024-05-21T12:45:52.032215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfQfbdDSaTIdpeFCj"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "3a7bef48-214a-44e8-a6bd-4563dc37375d", "DetectTime": "2024-05-21T12:45:52.037104+00:00", "EventTime": "2024-05-21T12:45:52.037133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8FvusqRHamXnHoh"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "65309968-cf37-48ed-be63-97707e636e3e", "DetectTime": "2024-05-21T12:45:52.043085+00:00", "EventTime": "2024-05-21T12:45:52.043109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdeg3M1WxYsVwHTWcb"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "66ec93ce-7561-4181-bff0-9c52363d5343", "DetectTime": "2024-05-21T12:45:52.048111+00:00", "EventTime": "2024-05-21T12:45:52.048128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dIuH1iUdHELx1GP8"], "accumulated_threat_level": 0.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "2129fd21-1fbc-47e6-aed6-b900a321555b", "DetectTime": "2024-05-21T12:45:52.519419+00:00", "EventTime": "2024-05-21T12:45:52.519444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yTil1ZbxL1sn1YVa"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "76370fda-ced7-4d85-a7f5-5b93fe8591f9", "DetectTime": "2024-05-21T12:45:52.576259+00:00", "EventTime": "2024-05-21T12:45:52.576283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPw4NHiY9GBGSvOd"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "4ea27c4b-814b-43f1-82af-7c72cf870fa2", "DetectTime": "2024-05-21T12:45:52.586425+00:00", "EventTime": "2024-05-21T12:45:52.586445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEKtWg47PyZNh46CWf"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "98f63677-222d-4135-bf8e-115d51d401a4", "DetectTime": "2024-05-21T12:45:52.592764+00:00", "EventTime": "2024-05-21T12:45:52.592784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYdFlf4t1V9H2E1Wsh"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "b3139c62-7376-4ab2-8416-8cefa1017859", "DetectTime": "2024-05-21T12:45:52.597320+00:00", "EventTime": "2024-05-21T12:45:52.597340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMYYt1qqSLmX6VEPe"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "75dad86b-2298-4af1-8be8-70fc2182a63b", "DetectTime": "2024-05-21T12:45:52.602537+00:00", "EventTime": "2024-05-21T12:45:52.602557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPGtEY2DFFCMdVpOP"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "f8bd44e5-3a39-46a9-91db-e3c55440ab40", "DetectTime": "2024-05-21T12:45:52.626775+00:00", "EventTime": "2024-05-21T12:45:52.626799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cde7yC4wbvoAl2wPke"], "accumulated_threat_level": 1.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "6666ae9b-0f5c-42c9-97a1-881ca46a6be5", "DetectTime": "2024-05-21T12:45:53.063179+00:00", "EventTime": "2024-05-21T12:45:53.063204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjCaV28SH2WkGwzUf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "145cb49c-d6ac-4ad7-b5f7-78c1ca957fc0", "DetectTime": "2024-05-21T12:45:53.114548+00:00", "EventTime": "2024-05-21T12:45:53.114576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYaVs4zs7Ao8g1Uvd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "53d89a13-afc2-46fb-a734-117d34b4b992", "DetectTime": "2024-05-21T12:45:53.120108+00:00", "EventTime": "2024-05-21T12:45:53.120128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4iv3t1IC7qOhXTmnl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "22000dd1-8671-4de8-889e-31a8fdb5f091", "DetectTime": "2024-05-21T12:45:53.149576+00:00", "EventTime": "2024-05-21T12:45:53.149599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5iAb035VM4FfSzjib"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 143} +{"Format": "IDEA0", "ID": "2cac6405-8fa6-4cd2-a55e-a4a6def0ec97", "DetectTime": "2024-05-21T12:45:53.244788+00:00", "EventTime": "2024-05-21T12:45:53.244807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcnPNr7375PM0yJE2"], "accumulated_threat_level": 3.2, "timewindow": 143} +{"Format": "IDEA0", "ID": "9d5a059a-94a2-48ca-8d8f-8a3fad484061", "DetectTime": "2024-05-21T12:45:53.262681+00:00", "EventTime": "2024-05-21T12:45:53.262703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcP83h1Ft3VNKnPy7j"], "accumulated_threat_level": 3.2, "timewindow": 143} +{"Format": "IDEA0", "ID": "86828e4f-095e-4d21-b410-ef4f23bb1001", "DetectTime": "2024-05-21T12:45:53.333482+00:00", "EventTime": "2024-05-21T12:45:53.333501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwhaa21GIlEkjNHRk"], "accumulated_threat_level": 4.0, "timewindow": 143} +{"Format": "IDEA0", "ID": "d6d1ceef-0ad1-4280-8a92-857c0aaaa0b9", "DetectTime": "2024-05-21T12:45:53.381927+00:00", "EventTime": "2024-05-21T12:45:53.381948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviqlNtoLw9zC3mO4"], "accumulated_threat_level": 4.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "c8403b60-6c84-4b71-b34f-f0894ece2609", "DetectTime": "2024-05-21T12:45:53.664111+00:00", "EventTime": "2024-05-21T12:45:53.664130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQPSC1I0iLPhXtRM5"], "accumulated_threat_level": 4.8, "timewindow": 143} +{"Format": "IDEA0", "ID": "1e6a8bc1-cae4-45e6-a55a-5176e91c0e46", "DetectTime": "2024-05-21T12:45:53.774747+00:00", "EventTime": "2024-05-21T12:45:53.774767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CojD2SsRjn4c8Nezc"], "accumulated_threat_level": 5.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "c10f5025-89e6-403c-9494-d26b5a0c9307", "DetectTime": "2024-05-21T12:45:53.804371+00:00", "EventTime": "2024-05-21T12:45:53.804392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClDOz23N83JnwCYjm1"], "accumulated_threat_level": 5.6, "timewindow": 143} +{"Format": "IDEA0", "ID": "cf9aa656-1ed4-40dd-9f50-9214674f1a63", "DetectTime": "2024-05-21T12:45:53.859745+00:00", "EventTime": "2024-05-21T12:45:53.859764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrERiio1JCwvzUr3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 143} +{"Format": "IDEA0", "ID": "68b381d1-f205-40a4-b00a-b0001560a977", "DetectTime": "2024-05-21T12:45:53.909654+00:00", "EventTime": "2024-05-21T12:45:53.909673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqVkx1ew7HYAoT3Ui"], "accumulated_threat_level": 7.199999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "95257b1d-998c-4404-93d0-4d3eb7071fb5", "DetectTime": "2024-05-21T12:45:54.000255+00:00", "EventTime": "2024-05-21T12:45:54.000275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQr2ef22BYISKzdwG4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "978f6b4e-a442-45d1-9c29-359dbabf6e97", "DetectTime": "2024-05-21T12:45:54.075623+00:00", "EventTime": "2024-05-21T12:45:54.075646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NWHT0856HhCVhT4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "5f7b8baf-c6fe-49da-a4a8-5403f773174e", "DetectTime": "2024-05-21T12:45:54.142749+00:00", "EventTime": "2024-05-21T12:45:54.142771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4MtyhNpg2tUvGl4"], "accumulated_threat_level": 0.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "d3caf2fa-bafd-471c-a2f0-dddb17e94122", "DetectTime": "2024-05-21T12:45:54.409434+00:00", "EventTime": "2024-05-21T12:45:54.409453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXipkZ1QXUQ3uUHWJf"], "accumulated_threat_level": 1.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "9cd38388-0dd4-4da7-852c-7e41d7b4df96", "DetectTime": "2024-05-21T12:45:54.468057+00:00", "EventTime": "2024-05-21T12:45:54.468074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WlIJCjAMhFxIFO9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 144} +{"Format": "IDEA0", "ID": "f66a0961-5ca5-434b-bccf-66d6c2ca31c8", "DetectTime": "2024-05-21T12:45:54.517561+00:00", "EventTime": "2024-05-21T12:45:54.517579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct1ccw2sCfrRGuXiqb"], "accumulated_threat_level": 3.2, "timewindow": 144} +{"Format": "IDEA0", "ID": "a320a968-e06d-42de-a594-53ec5ca2e803", "DetectTime": "2024-05-21T12:45:54.565851+00:00", "EventTime": "2024-05-21T12:45:54.565876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbALXongzpbIVS6Cc"], "accumulated_threat_level": 4.0, "timewindow": 144} +{"Format": "IDEA0", "ID": "6adcda92-e4d6-41e3-9fb5-08279ca05041", "DetectTime": "2024-05-21T12:45:54.613534+00:00", "EventTime": "2024-05-21T12:45:54.613559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYxhoV3kDdJ2XYeB8k"], "accumulated_threat_level": 4.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "057162c4-ca92-4e50-baaf-625f6f707966", "DetectTime": "2024-05-21T12:45:54.653648+00:00", "EventTime": "2024-05-21T12:45:54.653670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGlykn2jLWAApCYTq5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "4275db2b-49f8-4aba-86ce-2f879ff8584f", "DetectTime": "2024-05-21T12:45:54.700951+00:00", "EventTime": "2024-05-21T12:45:54.700975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaX7AB646fi1wlfKf"], "accumulated_threat_level": 5.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "45449eda-a13c-48a0-9059-01e5b2c18a91", "DetectTime": "2024-05-21T12:45:54.752346+00:00", "EventTime": "2024-05-21T12:45:54.752366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqMhe1THolPEUzqie"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 144} +{"Format": "IDEA0", "ID": "569e2d48-ae0d-4103-b694-9e6d835206d5", "DetectTime": "2024-05-21T12:45:55.006935+00:00", "EventTime": "2024-05-21T12:45:55.006959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CteBXLvmBLsX5Zm1g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "31e95837-04a7-4b3b-96c6-30d9e672817c", "DetectTime": "2024-05-21T12:45:55.051717+00:00", "EventTime": "2024-05-21T12:45:55.051741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISZwwb5vHh6Irf0d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "b113d8e5-3319-4e3a-8385-f6dba6106cf2", "DetectTime": "2024-05-21T12:45:55.109416+00:00", "EventTime": "2024-05-21T12:45:55.109434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxXTv3lp362FLopl5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "7b80dbf8-018c-4450-a03c-7ab21ab4cd8d", "DetectTime": "2024-05-21T12:45:55.150890+00:00", "EventTime": "2024-05-21T12:45:55.150914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs7meU2sIqdJj5eY77"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "da63c887-30ff-4588-b303-dcc55f9287e1", "DetectTime": "2024-05-21T12:45:55.188118+00:00", "EventTime": "2024-05-21T12:45:55.188139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb3I6U2y2HKk6Mulfc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "811b368e-3ddf-4e4b-8286-6e64640cb0c3", "DetectTime": "2024-05-21T12:45:55.208242+00:00", "EventTime": "2024-05-21T12:45:55.208263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hX733DD3Q8dboQml"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "b9d1ad71-b699-442a-a54e-59bb63dbb529", "DetectTime": "2024-05-21T12:45:55.221286+00:00", "EventTime": "2024-05-21T12:45:55.221307+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9hX733DD3Q8dboQml"], "accumulated_threat_level": 2.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "bd01aeeb-0a4e-41d9-8647-a3de8c246b31", "DetectTime": "2024-05-21T12:45:55.345860+00:00", "EventTime": "2024-05-21T12:45:55.345883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqIH32HOa17T0RQii"], "accumulated_threat_level": 9.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "31885627-d46e-4f8e-8210-3d123d591257", "DetectTime": "2024-05-21T12:45:55.356212+00:00", "EventTime": "2024-05-21T12:45:55.356234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C985ZT1mMLJCwFJHfj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "820a2cd5-33bd-4658-9bc6-7b56aca63456", "DetectTime": "2024-05-21T12:45:55.398269+00:00", "EventTime": "2024-05-21T12:45:55.398287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWY4Yv4BbmAbZ5oQ65"], "accumulated_threat_level": 10.4, "timewindow": 144} +{"Format": "IDEA0", "ID": "cd4727de-7f1d-4b9d-93d6-9492438d3295", "DetectTime": "2024-05-21T12:45:55.683681+00:00", "EventTime": "2024-05-21T12:45:55.683699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBcvbyRu25Kzt5H5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 144} +{"Format": "IDEA0", "ID": "68395ae4-1efd-4291-ac47-a3bef9d4d675", "DetectTime": "2024-05-21T12:45:55.727426+00:00", "EventTime": "2024-05-21T12:45:55.727445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBOMK25bbFEHiF3H8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 144} +{"Format": "Json", "ID": "68395ae4-1efd-4291-ac47-a3bef9d4d675", "DetectTime": "2024-05-21T12:45:55.727426+00:00", "EventTime": "2024-05-21T12:45:55.727445+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "1970-01-06T23:15:00.953357+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2024/05/21 12:45:55.904485)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 144, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "710117bf-0318-4075-bca4-259ef437e2c1", "DetectTime": "2024-05-21T12:45:55.915470+00:00", "EventTime": "2024-05-21T12:45:55.915492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVhPq2cOqITGjd3P5"], "accumulated_threat_level": 0.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "d306daf1-a584-4cde-9d27-0021abd0ae6d", "DetectTime": "2024-05-21T12:45:55.927774+00:00", "EventTime": "2024-05-21T12:45:55.927792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50fta2A3trDN0eGOi"], "accumulated_threat_level": 1.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "9a957fa1-acd7-4cc1-ae2a-5845f5c30ece", "DetectTime": "2024-05-21T12:45:55.932743+00:00", "EventTime": "2024-05-21T12:45:55.932761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5o8zzVuhBdSoV63"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "8d6ff265-c2d4-426c-9414-77b5a7d56456", "DetectTime": "2024-05-21T12:45:55.960522+00:00", "EventTime": "2024-05-21T12:45:55.960542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LQjF3wLt1NG1KJv7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 144} +{"Format": "IDEA0", "ID": "412f2cee-fe6c-43b6-868d-415818c801b5", "DetectTime": "2024-05-21T12:45:56.012428+00:00", "EventTime": "2024-05-21T12:45:56.012446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPE8thD4FuyIiD8Z9"], "accumulated_threat_level": 3.2, "timewindow": 144} +{"Format": "IDEA0", "ID": "d78778e8-7ecb-40e6-9bf1-cb471a9f50d5", "DetectTime": "2024-05-21T12:45:56.056558+00:00", "EventTime": "2024-05-21T12:45:56.056578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3P9Z3Ikoein0oGs2"], "accumulated_threat_level": 4.0, "timewindow": 144} +{"Format": "IDEA0", "ID": "4d4796cc-e3b1-4bc8-8327-d10e50d91c6d", "DetectTime": "2024-05-21T12:45:56.326553+00:00", "EventTime": "2024-05-21T12:45:56.326574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfB6hA26MgiZT29Zk6"], "accumulated_threat_level": 4.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "549c9bf1-fd43-4835-ad20-8950ab4c5cb8", "DetectTime": "2024-05-21T12:45:56.369363+00:00", "EventTime": "2024-05-21T12:45:56.369384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX3YHHTvjVMESj1P9"], "accumulated_threat_level": 5.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "c62a1ba3-39a6-4d1c-bf48-97f6639b50c1", "DetectTime": "2024-05-21T12:45:56.414797+00:00", "EventTime": "2024-05-21T12:45:56.414819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rDUr2sRIyjhAA2Ql"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 144} +{"Format": "IDEA0", "ID": "de173087-7027-4089-8e58-ed7debb282d5", "DetectTime": "2024-05-21T12:45:56.462924+00:00", "EventTime": "2024-05-21T12:45:56.462943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hYs13TYTrnUhDUK"], "accumulated_threat_level": 7.199999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "e1e9c890-865e-449d-9274-12eefeb2a977", "DetectTime": "2024-05-21T12:45:56.512155+00:00", "EventTime": "2024-05-21T12:45:56.512177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jpqF2xgtZLasxkl9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "cbdb3857-6aee-44be-9000-569b78057fa5", "DetectTime": "2024-05-21T12:45:56.559459+00:00", "EventTime": "2024-05-21T12:45:56.559479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw94583i3JDVmaZ2x2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "6c5b1322-82c3-494e-acd8-ed4cf7643e4a", "DetectTime": "2024-05-21T12:45:56.708221+00:00", "EventTime": "2024-05-21T12:45:56.708240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyyiE63jJmZ4zHO9t3"], "accumulated_threat_level": 9.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "b8f79bc0-9ef5-4f3a-a0e8-4d0afe8f845e", "DetectTime": "2024-05-21T12:45:56.856787+00:00", "EventTime": "2024-05-21T12:45:56.856812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8Z164VJZTYrmJNNl"], "accumulated_threat_level": 10.4, "timewindow": 144} +{"Format": "IDEA0", "ID": "3aaf1d63-8b66-4122-b8fd-4a8e08e9f7da", "DetectTime": "2024-05-21T12:45:56.940541+00:00", "EventTime": "2024-05-21T12:45:56.940561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ7JvC1CSheSYJo6Jj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 144} +{"Format": "IDEA0", "ID": "461cd41d-536b-4090-bbc3-9bfe5b880dfb", "DetectTime": "2024-05-21T12:45:56.989434+00:00", "EventTime": "2024-05-21T12:45:56.989453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C542Ip3MrOPzfgpy0a"], "accumulated_threat_level": 12.000000000000002, "timewindow": 144} +{"Format": "Json", "ID": "461cd41d-536b-4090-bbc3-9bfe5b880dfb", "DetectTime": "2024-05-21T12:45:56.989434+00:00", "EventTime": "2024-05-21T12:45:56.989453+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "1970-01-06T23:45:16.880503+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2024/05/21 12:45:57.153550)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 144, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7120fe01-d3f2-4039-bfb8-7089c4b9c671", "DetectTime": "2024-05-21T12:45:57.164724+00:00", "EventTime": "2024-05-21T12:45:57.164742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4j0HnoM7PuDgaZT7"], "accumulated_threat_level": 0.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "5859b5c2-38d9-40a3-82d2-4645b7e0303d", "DetectTime": "2024-05-21T12:45:57.170297+00:00", "EventTime": "2024-05-21T12:45:57.170315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDfEM1qsyEVvLptfd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "3988623f-1e02-4dba-bf42-695d13f399e6", "DetectTime": "2024-05-21T12:45:57.187694+00:00", "EventTime": "2024-05-21T12:45:57.187716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19OLn3ha0CZ56mMMe"], "accumulated_threat_level": 1.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "56ed2c46-76a2-4900-a281-7898d2df2172", "DetectTime": "2024-05-21T12:45:57.200066+00:00", "EventTime": "2024-05-21T12:45:57.200086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQtE11VUYM7ZUJ3zi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 144} +{"Format": "IDEA0", "ID": "252b926f-32e3-4c61-9b39-15f96a733a5c", "DetectTime": "2024-05-21T12:45:57.458212+00:00", "EventTime": "2024-05-21T12:45:57.458233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKVgOL75oEo0HGP5"], "accumulated_threat_level": 3.2, "timewindow": 144} +{"Format": "IDEA0", "ID": "f0c6d4da-38e8-4f84-bf5f-c2e574295d1b", "DetectTime": "2024-05-21T12:45:57.506443+00:00", "EventTime": "2024-05-21T12:45:57.506469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFXOzws16ZiydWRf"], "accumulated_threat_level": 4.0, "timewindow": 144} +{"Format": "IDEA0", "ID": "71827b06-78a4-4005-ac71-97ec2f04ebd0", "DetectTime": "2024-05-21T12:45:57.552026+00:00", "EventTime": "2024-05-21T12:45:57.552048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2krVP3uSKXAAj71Le"], "accumulated_threat_level": 4.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "68b46463-25f0-44d9-989d-d8d45ceb89f7", "DetectTime": "2024-05-21T12:45:57.599013+00:00", "EventTime": "2024-05-21T12:45:57.599032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7JT83aoy82ju7yqg"], "accumulated_threat_level": 5.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "d78b1447-b81b-441b-b828-16a3adc87751", "DetectTime": "2024-05-21T12:45:57.655163+00:00", "EventTime": "2024-05-21T12:45:57.655182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQMtNbcqWpFfNDSe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 144} +{"Format": "IDEA0", "ID": "91556c9a-d791-4fab-994b-a23c58d4daaa", "DetectTime": "2024-05-21T12:45:57.678891+00:00", "EventTime": "2024-05-21T12:45:57.678914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgGdp33TkeUV219uVk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "fb385cf0-4d5f-4c59-a2cc-eee03ce7fdcc", "DetectTime": "2024-05-21T12:45:57.726319+00:00", "EventTime": "2024-05-21T12:45:57.726338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvu7q726NAmzLHUoZk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "ee7e1bc2-e86c-4235-b2a8-df32f81d5bcd", "DetectTime": "2024-05-21T12:45:57.773625+00:00", "EventTime": "2024-05-21T12:45:57.773643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVHHP3BeKGtJ5KsQ5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "ca0f444f-5d89-436f-97b5-e4cc49b4b8a9", "DetectTime": "2024-05-21T12:45:57.818641+00:00", "EventTime": "2024-05-21T12:45:57.818661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7v74r4nwL5y3TZXwk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "820b656e-3f01-4e48-8a4d-c47d671af58c", "DetectTime": "2024-05-21T12:45:57.986211+00:00", "EventTime": "2024-05-21T12:45:57.986229+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJxjq4vf0fEbSfRBf"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "d0b47ff9-84c0-425c-b0d6-50f3b4d446aa", "DetectTime": "2024-05-21T12:45:57.998248+00:00", "EventTime": "2024-05-21T12:45:57.998267+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJxjq4vf0fEbSfRBf"], "accumulated_threat_level": 2.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "1114472d-9d05-4cad-af56-1b588ec6f066", "DetectTime": "2024-05-21T12:45:58.131400+00:00", "EventTime": "2024-05-21T12:45:58.131419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEi6sx15vMXoL73xq8"], "accumulated_threat_level": 9.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "2900d2c3-d8d8-4142-8e72-b071d9840c2c", "DetectTime": "2024-05-21T12:45:58.169442+00:00", "EventTime": "2024-05-21T12:45:58.169467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrfLpMLbqN2swjtS5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "51312580-4aeb-412d-ab73-2916f47e967c", "DetectTime": "2024-05-21T12:45:58.210554+00:00", "EventTime": "2024-05-21T12:45:58.210574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzOYm1eBf6rN6L9Th"], "accumulated_threat_level": 10.4, "timewindow": 144} +{"Format": "IDEA0", "ID": "900f5a9e-195c-4460-9e6d-5c5e19d77eb5", "DetectTime": "2024-05-21T12:45:58.259760+00:00", "EventTime": "2024-05-21T12:45:58.259801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMlAz1nnTvQKChDTj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 144} +{"Format": "IDEA0", "ID": "0b1758b2-267b-47c9-91eb-ac74467d4fdc", "DetectTime": "2024-05-21T12:45:58.309083+00:00", "EventTime": "2024-05-21T12:45:58.309103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiT0e32t8Bfq6ZlWh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 144} +{"Format": "Json", "ID": "0b1758b2-267b-47c9-91eb-ac74467d4fdc", "DetectTime": "2024-05-21T12:45:58.309083+00:00", "EventTime": "2024-05-21T12:45:58.309103+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "1970-01-06T23:45:20.599143+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 144. (real time 2024/05/21 12:45:58.739599)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 144, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "73481dd3-489a-46c5-b7be-144d141452f9", "DetectTime": "2024-05-21T12:45:58.749912+00:00", "EventTime": "2024-05-21T12:45:58.749933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLP2M1jIvsZASCTsd"], "accumulated_threat_level": 0.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "40f9eabf-5265-45fd-b9a3-d7438fb9c70b", "DetectTime": "2024-05-21T12:45:58.767126+00:00", "EventTime": "2024-05-21T12:45:58.767146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyHPI3NtfcbGkHtBl"], "accumulated_threat_level": 1.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "db83c949-674a-4c20-9e0b-32880908d218", "DetectTime": "2024-05-21T12:45:58.771966+00:00", "EventTime": "2024-05-21T12:45:58.771984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2pTr1g7u4aCehP21", "CObM8c4SKqvUs6k0s8", "CulO351QUkhZ0lPva3", "CCDUlRp1r21w6KN02"], "accumulated_threat_level": 0.5, "timewindow": 151} +{"Format": "IDEA0", "ID": "7a1bf058-cc65-4f1b-86bc-fbf4e047febe", "DetectTime": "2024-05-21T12:45:58.783417+00:00", "EventTime": "2024-05-21T12:45:58.783437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFItgx4i1CCrAHVp07"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "548419d9-0bcb-41a7-b728-cc2379ffabc1", "DetectTime": "2024-05-21T12:45:58.795010+00:00", "EventTime": "2024-05-21T12:45:58.795028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSiFD22BYUksNYFoh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 144} +{"Format": "IDEA0", "ID": "fa0ec421-83b1-4acf-9d48-e22f2de79110", "DetectTime": "2024-05-21T12:45:58.807319+00:00", "EventTime": "2024-05-21T12:45:58.807337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtQdEp41fDN09uJvje"], "accumulated_threat_level": 3.2, "timewindow": 144} +{"Format": "IDEA0", "ID": "20539fd9-9427-499a-824e-10c186ec73ad", "DetectTime": "2024-05-21T12:45:58.826980+00:00", "EventTime": "2024-05-21T12:45:58.826999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrGKQx3HyYJtpzW2Sd"], "accumulated_threat_level": 4.0, "timewindow": 144} +{"Format": "IDEA0", "ID": "afe23e9e-7b8c-4c95-80ee-db7d5ca8d636", "DetectTime": "2024-05-21T12:45:58.879783+00:00", "EventTime": "2024-05-21T12:45:58.879810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C13xzZ2B8oy6roGgy"], "accumulated_threat_level": 4.8, "timewindow": 144} +{"Format": "IDEA0", "ID": "b26b1589-062c-4bef-aea4-805c1bdd24d8", "DetectTime": "2024-05-21T12:45:58.925668+00:00", "EventTime": "2024-05-21T12:45:58.925704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreXJI2JQZQQKoMyKe"], "accumulated_threat_level": 5.6, "timewindow": 144} +{"Format": "IDEA0", "ID": "488d377c-8fa4-4846-9226-bdb16f764365", "DetectTime": "2024-05-21T12:45:58.965816+00:00", "EventTime": "2024-05-21T12:45:58.965835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQ7cb1WGMUDWMmP1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "29477d1a-e23e-4fbe-a27e-103412f8c0cc", "DetectTime": "2024-05-21T12:45:59.240587+00:00", "EventTime": "2024-05-21T12:45:59.240630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8ag34a3MBVRj6VB4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 144} +{"Format": "IDEA0", "ID": "bc9a9da7-f121-4a09-ab1c-7c36702ecbe6", "DetectTime": "2024-05-21T12:45:59.291662+00:00", "EventTime": "2024-05-21T12:45:59.291681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIL0Ra2ToC6Rn09HEa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "f05082af-4eff-4224-b540-bd4f83845193", "DetectTime": "2024-05-21T12:45:59.342996+00:00", "EventTime": "2024-05-21T12:45:59.343019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1mKF11JUner5xN8g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "ec23b9d6-ceda-444b-bcde-c60070610ea2", "DetectTime": "2024-05-21T12:45:59.406278+00:00", "EventTime": "2024-05-21T12:45:59.406298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHS0Pb1Ay9f3A3gxVa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "148c833f-5de7-466f-ac07-c6eab93b2bc3", "DetectTime": "2024-05-21T12:45:59.491022+00:00", "EventTime": "2024-05-21T12:45:59.491040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zA6tvSGqKNM7qva"], "accumulated_threat_level": 0.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "baef31a0-828c-4ed5-8ae4-eede285c0df2", "DetectTime": "2024-05-21T12:45:59.536954+00:00", "EventTime": "2024-05-21T12:45:59.536973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyNcmXD9csqugrWa"], "accumulated_threat_level": 1.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "e3292770-ba78-48e4-9bb1-491c6f7c7b2a", "DetectTime": "2024-05-21T12:45:59.584928+00:00", "EventTime": "2024-05-21T12:45:59.584949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMrPe3FsE4CJSo8c7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 145} +{"Format": "IDEA0", "ID": "81bf1745-31d3-4fe5-827b-45b824852e0d", "DetectTime": "2024-05-21T12:45:59.631967+00:00", "EventTime": "2024-05-21T12:45:59.631985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQi9Nz3PG8mjFgyfmc"], "accumulated_threat_level": 3.2, "timewindow": 145} +{"Format": "IDEA0", "ID": "8fa9687a-3fa3-429c-9255-e5a8407323a0", "DetectTime": "2024-05-21T12:45:59.772637+00:00", "EventTime": "2024-05-21T12:45:59.772660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPSjW12UkH8MnrE0t7"], "accumulated_threat_level": 4.0, "timewindow": 145} +{"Format": "IDEA0", "ID": "ee2dc987-4b45-490b-88ed-5ce1f633ab64", "DetectTime": "2024-05-21T12:46:00.040761+00:00", "EventTime": "2024-05-21T12:46:00.040783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1lda4LwPe0lIk0rj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "1e081d5a-45b5-43a7-bc36-e5dfab441f7a", "DetectTime": "2024-05-21T12:46:00.085015+00:00", "EventTime": "2024-05-21T12:46:00.085034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxXJGvZDjkvJFJV4"], "accumulated_threat_level": 4.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "af8b5109-10f4-43d8-849f-5b6d84518af6", "DetectTime": "2024-05-21T12:46:00.134541+00:00", "EventTime": "2024-05-21T12:46:00.134565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwpCQe3cYQVpOR2NU6"], "accumulated_threat_level": 5.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "0f7edd95-76db-478b-bf07-dba5c88f1035", "DetectTime": "2024-05-21T12:46:00.184949+00:00", "EventTime": "2024-05-21T12:46:00.184974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMDq2w2bD1fCiup6pi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 145} +{"Format": "IDEA0", "ID": "a3eeaac3-86da-45ba-8e87-acc7a8d53e04", "DetectTime": "2024-05-21T12:46:00.239568+00:00", "EventTime": "2024-05-21T12:46:00.239604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4lwD24hSr20gWo2ph"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "ba67841f-0594-468b-9c6b-6de941507dd2", "DetectTime": "2024-05-21T12:46:00.301162+00:00", "EventTime": "2024-05-21T12:46:00.301180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8MsF22RXEIcRlnLma"], "accumulated_threat_level": 7.999999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "f885e3fe-fdbf-432c-a13f-2dfe5fa59b18", "DetectTime": "2024-05-21T12:46:00.339149+00:00", "EventTime": "2024-05-21T12:46:00.339167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdaqkS3QqHnJtVDWFh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "955c384e-04df-4724-bbca-23ac6c90ebed", "DetectTime": "2024-05-21T12:46:00.387059+00:00", "EventTime": "2024-05-21T12:46:00.387089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChsQib19xoEQHTnZYb"], "accumulated_threat_level": 9.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "dbadb865-5996-4fe5-99d8-fa93748fab64", "DetectTime": "2024-05-21T12:46:00.435491+00:00", "EventTime": "2024-05-21T12:46:00.435509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnnSFY2hnQhgJMMHk3"], "accumulated_threat_level": 10.4, "timewindow": 145} +{"Format": "IDEA0", "ID": "6c16f790-ab77-49bc-b37f-64f7d21ed780", "DetectTime": "2024-05-21T12:46:00.689927+00:00", "EventTime": "2024-05-21T12:46:00.689951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKi5qF157raNp0jwwh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "95d0197a-1a9f-4507-ba15-ca0b5e98931c", "DetectTime": "2024-05-21T12:46:00.743711+00:00", "EventTime": "2024-05-21T12:46:00.743742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CckyGm3cUntg2R3MHa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 145} +{"Format": "IDEA0", "ID": "4c81fef6-33dc-4c06-99b0-51a5f17c2432", "DetectTime": "2024-05-21T12:46:00.783886+00:00", "EventTime": "2024-05-21T12:46:00.783904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Jok34HCfDt45He9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 145} +{"Format": "Json", "ID": "4c81fef6-33dc-4c06-99b0-51a5f17c2432", "DetectTime": "2024-05-21T12:46:00.783886+00:00", "EventTime": "2024-05-21T12:46:00.783904+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-07T00:15:31.782261+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2024/05/21 12:46:00.948000)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 145, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c1c65bdf-dafc-4c47-9494-920762a9d112", "DetectTime": "2024-05-21T12:46:00.958042+00:00", "EventTime": "2024-05-21T12:46:00.958061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIcno64RUqtJY0vtIk"], "accumulated_threat_level": 0.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "3530611e-88e0-4584-8ab6-6192a6f1a784", "DetectTime": "2024-05-21T12:46:00.973123+00:00", "EventTime": "2024-05-21T12:46:00.973140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsQP41SNw9XvXUjS5"], "accumulated_threat_level": 1.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "80804705-6ad7-40ce-a75a-af8575eedd04", "DetectTime": "2024-05-21T12:46:00.985317+00:00", "EventTime": "2024-05-21T12:46:00.985335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJjBh4MGAyvU8q2xa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 145} +{"Format": "IDEA0", "ID": "23f19c07-b203-4563-8086-ef3783cf59b9", "DetectTime": "2024-05-21T12:46:00.998330+00:00", "EventTime": "2024-05-21T12:46:00.998349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqAUIX1TeZX2KoQmDe"], "accumulated_threat_level": 3.2, "timewindow": 145} +{"Format": "IDEA0", "ID": "3673de66-81f1-4742-bae1-faa8d378aa49", "DetectTime": "2024-05-21T12:46:01.241841+00:00", "EventTime": "2024-05-21T12:46:01.241869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMPcmB2lHn1t40Alqi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "28f3e7a6-0021-4b19-8586-5662e1f2c2d9", "DetectTime": "2024-05-21T12:46:01.282935+00:00", "EventTime": "2024-05-21T12:46:01.282968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyPQVw61osequnKh3"], "accumulated_threat_level": 4.0, "timewindow": 145} +{"Format": "IDEA0", "ID": "057dd87a-ae24-41c7-9323-bb853df8c540", "DetectTime": "2024-05-21T12:46:01.327685+00:00", "EventTime": "2024-05-21T12:46:01.327707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOVAJ28MXl2G28Ofk"], "accumulated_threat_level": 4.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "bf0751de-1f8d-4c7a-8b6d-61066530a781", "DetectTime": "2024-05-21T12:46:01.373754+00:00", "EventTime": "2024-05-21T12:46:01.373773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Xnt343PA52DqnT27"], "accumulated_threat_level": 5.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "fdf9e1ff-a25d-4174-bd59-d37859511518", "DetectTime": "2024-05-21T12:46:01.421660+00:00", "EventTime": "2024-05-21T12:46:01.421679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Uwxh1tKtqxJEuHc6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 145} +{"Format": "IDEA0", "ID": "fe6af990-c2a4-471b-b81c-ee6cd6fba046", "DetectTime": "2024-05-21T12:46:01.471010+00:00", "EventTime": "2024-05-21T12:46:01.471029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnujlan68AjzyJPO5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "d0b898b8-223f-4b91-9d73-4720db50ccc0", "DetectTime": "2024-05-21T12:46:01.517299+00:00", "EventTime": "2024-05-21T12:46:01.517318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeA6eB3r7vGS2wjzNh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "3ae220f4-b4de-481d-9a01-e5fc62c0a90a", "DetectTime": "2024-05-21T12:46:01.785609+00:00", "EventTime": "2024-05-21T12:46:01.785631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMhsux2kb4eFMNecm9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "6c98d416-a44b-446f-8621-aa569b2cd3d7", "DetectTime": "2024-05-21T12:46:01.832471+00:00", "EventTime": "2024-05-21T12:46:01.832488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqHKPn5p7DRbqP9l"], "accumulated_threat_level": 9.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "2fd0a2f3-b153-4756-b8c3-4faf580da181", "DetectTime": "2024-05-21T12:46:01.892546+00:00", "EventTime": "2024-05-21T12:46:01.892565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCG6lH3CUtgGzQWRB6"], "accumulated_threat_level": 10.4, "timewindow": 145} +{"Format": "IDEA0", "ID": "8020d84d-e6c9-41a4-8154-99b2cdefca41", "DetectTime": "2024-05-21T12:46:02.026345+00:00", "EventTime": "2024-05-21T12:46:02.026372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaozCk1rkDnYGS6Hei"], "accumulated_threat_level": 11.200000000000001, "timewindow": 145} +{"Format": "IDEA0", "ID": "8214734d-d33e-4ae8-beac-1c239ffab24e", "DetectTime": "2024-05-21T12:46:02.071498+00:00", "EventTime": "2024-05-21T12:46:02.071536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPaIu18IMWNOyF2i4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 145} +{"Format": "Json", "ID": "8214734d-d33e-4ae8-beac-1c239ffab24e", "DetectTime": "2024-05-21T12:46:02.071498+00:00", "EventTime": "2024-05-21T12:46:02.071536+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-07T00:46:03.321833+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2024/05/21 12:46:02.241574)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 145, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "108ccc2f-2cec-4c9b-b6e4-8c701e62302c", "DetectTime": "2024-05-21T12:46:02.259940+00:00", "EventTime": "2024-05-21T12:46:02.259967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxrIrPVrzRpfE4zm4"], "accumulated_threat_level": 0.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "04498996-e34f-41e9-9661-91f0acb93b35", "DetectTime": "2024-05-21T12:46:02.265301+00:00", "EventTime": "2024-05-21T12:46:02.265321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ZGwn1FFyRSuAb9M1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "97374222-eaeb-4b15-9610-f34dce97c6aa", "DetectTime": "2024-05-21T12:46:02.277959+00:00", "EventTime": "2024-05-21T12:46:02.277997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtkfD3awqFhM0uKf2"], "accumulated_threat_level": 1.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "4365a353-a966-41db-8174-fc9dbbfac74e", "DetectTime": "2024-05-21T12:46:02.290538+00:00", "EventTime": "2024-05-21T12:46:02.290578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9stWr153hSBo2gXIj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 145} +{"Format": "IDEA0", "ID": "9f84227f-85aa-46e7-8c1f-11ce6a789f3a", "DetectTime": "2024-05-21T12:46:02.498330+00:00", "EventTime": "2024-05-21T12:46:02.498350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxttTGIqFPnxDMq3"], "accumulated_threat_level": 3.2, "timewindow": 145} +{"Format": "IDEA0", "ID": "15fd3562-6a86-4bc5-8885-035392f2f14d", "DetectTime": "2024-05-21T12:46:02.533696+00:00", "EventTime": "2024-05-21T12:46:02.533719+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.226.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHGy6nZlxMUSOfA8"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "89484b3a-a37e-4916-9238-08ebab72ea06", "DetectTime": "2024-05-21T12:46:02.546174+00:00", "EventTime": "2024-05-21T12:46:02.546194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGHGy6nZlxMUSOfA8"], "accumulated_threat_level": 3.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "494cf0da-3e54-4f86-9ba6-86401840d785", "DetectTime": "2024-05-21T12:46:02.557561+00:00", "EventTime": "2024-05-21T12:46:02.557580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChV0Wa29OotUd8vzD2"], "accumulated_threat_level": 4.0, "timewindow": 145} +{"Format": "IDEA0", "ID": "48c08732-7493-4505-809c-b4e0ad314181", "DetectTime": "2024-05-21T12:46:02.607488+00:00", "EventTime": "2024-05-21T12:46:02.607506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDqMX2wDaLBGYl20e"], "accumulated_threat_level": 4.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "0280d863-1aac-4987-82f0-7b789e8d05b6", "DetectTime": "2024-05-21T12:46:02.664510+00:00", "EventTime": "2024-05-21T12:46:02.664528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0SuD2xRnU0s1eUZi"], "accumulated_threat_level": 5.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "22b8a27b-6101-42c9-8149-001353cbf90c", "DetectTime": "2024-05-21T12:46:02.701162+00:00", "EventTime": "2024-05-21T12:46:02.701181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5kJPo3u5cOLoJWrPa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 145} +{"Format": "IDEA0", "ID": "99ca192a-9f6e-4f7c-8ca2-5ca6a404bd5a", "DetectTime": "2024-05-21T12:46:02.763855+00:00", "EventTime": "2024-05-21T12:46:02.763875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLwTU34lcJb59L4sl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "200fbfe0-62c0-4188-9fae-c1262a5630c2", "DetectTime": "2024-05-21T12:46:02.794664+00:00", "EventTime": "2024-05-21T12:46:02.794688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jHA84gZwenxTVeKd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "ad08d47e-38df-4616-8041-f1058e91f36e", "DetectTime": "2024-05-21T12:46:02.843675+00:00", "EventTime": "2024-05-21T12:46:02.843694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ytuF4DC7m05LJpw7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "c465ccf4-1af9-4763-8abd-f1dc2e68c4cf", "DetectTime": "2024-05-21T12:46:02.894149+00:00", "EventTime": "2024-05-21T12:46:02.894169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqJqeb3WVcNpiFhzoe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "34b8016b-36ed-469b-bdc6-11a0c2601502", "DetectTime": "2024-05-21T12:46:03.160497+00:00", "EventTime": "2024-05-21T12:46:03.160518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ujqJ13ntehJCnhml"], "accumulated_threat_level": 9.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "f80d0e01-9039-4484-9168-a556cc34116c", "DetectTime": "2024-05-21T12:46:03.210395+00:00", "EventTime": "2024-05-21T12:46:03.210436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5yPQy1h3996R3cA04"], "accumulated_threat_level": 10.4, "timewindow": 145} +{"Format": "IDEA0", "ID": "92d48729-6ea8-48b4-b7e2-6cabb13e1f88", "DetectTime": "2024-05-21T12:46:03.261023+00:00", "EventTime": "2024-05-21T12:46:03.261041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF3om3bwkddRA3Eul"], "accumulated_threat_level": 11.200000000000001, "timewindow": 145} +{"Format": "IDEA0", "ID": "0fda4455-6c40-40ce-b8f9-5fedeaadadc2", "DetectTime": "2024-05-21T12:46:03.311831+00:00", "EventTime": "2024-05-21T12:46:03.311854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxplhY1m93KTcNL8sc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 145} +{"Format": "Json", "ID": "0fda4455-6c40-40ce-b8f9-5fedeaadadc2", "DetectTime": "2024-05-21T12:46:03.311831+00:00", "EventTime": "2024-05-21T12:46:03.311854+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-07T00:46:40.406944+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 145. (real time 2024/05/21 12:46:03.536591)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 145, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b9b265f0-de12-4f75-a50f-ccaf6c053649", "DetectTime": "2024-05-21T12:46:03.547355+00:00", "EventTime": "2024-05-21T12:46:03.547374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4YBF3sO8WxfCOBf7"], "accumulated_threat_level": 0.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "e290d5d4-05e0-4f3f-adac-3cfb9da2e7f9", "DetectTime": "2024-05-21T12:46:03.558499+00:00", "EventTime": "2024-05-21T12:46:03.558518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKXfxl3Kme17dn8iPh"], "accumulated_threat_level": 1.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "df60f44b-1932-4a2d-bb97-650b4bc675ac", "DetectTime": "2024-05-21T12:46:03.570085+00:00", "EventTime": "2024-05-21T12:46:03.570104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CynXwx4K5u9kBaQFb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 145} +{"Format": "IDEA0", "ID": "3a08c9a1-7c9c-40c9-ac84-f826f5e01ac1", "DetectTime": "2024-05-21T12:46:03.626586+00:00", "EventTime": "2024-05-21T12:46:03.626605+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TefB3XQEOw72l20k"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "4fa7d619-7fd9-4304-a253-52cd0ba43fe9", "DetectTime": "2024-05-21T12:46:03.641770+00:00", "EventTime": "2024-05-21T12:46:03.641801+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7TefB3XQEOw72l20k"], "accumulated_threat_level": 3.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "8b6aa85d-fa9c-484c-9647-d1717e718df8", "DetectTime": "2024-05-21T12:46:03.728948+00:00", "EventTime": "2024-05-21T12:46:03.728969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWdCQol6p15kYwSk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "bfe625f4-fced-41bb-9927-ec823317827e", "DetectTime": "2024-05-21T12:46:03.771122+00:00", "EventTime": "2024-05-21T12:46:03.771142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHYiL2D4rXX26itrg"], "accumulated_threat_level": 3.2, "timewindow": 145} +{"Format": "IDEA0", "ID": "a98458f9-2ed5-443d-ad2c-363d4ac8c318", "DetectTime": "2024-05-21T12:46:03.819877+00:00", "EventTime": "2024-05-21T12:46:03.819896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJacV1P3s6xn4LqGb"], "accumulated_threat_level": 4.0, "timewindow": 145} +{"Format": "IDEA0", "ID": "2788e12e-70e4-48c2-aabf-59c47f2c85c2", "DetectTime": "2024-05-21T12:46:03.871158+00:00", "EventTime": "2024-05-21T12:46:03.871177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9Vlj3WWrA6To9G0f"], "accumulated_threat_level": 4.8, "timewindow": 145} +{"Format": "IDEA0", "ID": "94766eff-c428-4c80-acd6-e0fdaf8b409d", "DetectTime": "2024-05-21T12:46:03.920068+00:00", "EventTime": "2024-05-21T12:46:03.920089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7eFd3SBG9itLq09d"], "accumulated_threat_level": 5.6, "timewindow": 145} +{"Format": "IDEA0", "ID": "b17359a2-908b-4c9b-88c7-0f64e22038b5", "DetectTime": "2024-05-21T12:46:03.967369+00:00", "EventTime": "2024-05-21T12:46:03.967387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJWKJQ2S5YGhIaCiG3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 145} +{"Format": "IDEA0", "ID": "45e9c1c8-8db1-4781-8e1a-f82fd9e2d7ff", "DetectTime": "2024-05-21T12:46:04.026870+00:00", "EventTime": "2024-05-21T12:46:04.026888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CujVS3takmziGBIvl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "756c5f11-a955-49cb-88aa-8f18becd7967", "DetectTime": "2024-05-21T12:46:04.264896+00:00", "EventTime": "2024-05-21T12:46:04.264919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.248.7.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdLn016HcazN1Dfgb"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "85f28353-917f-4cc9-b153-139f7e79f236", "DetectTime": "2024-05-21T12:46:04.277317+00:00", "EventTime": "2024-05-21T12:46:04.277336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdLn016HcazN1Dfgb"], "accumulated_threat_level": 4.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "290c6956-a98c-451e-8164-9e164e3ab53e", "DetectTime": "2024-05-21T12:46:04.306930+00:00", "EventTime": "2024-05-21T12:46:04.306949+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfmph4LEEqVPzKWR2"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "908b4b81-4b34-4dab-a96b-cd5a598ee6eb", "DetectTime": "2024-05-21T12:46:04.321734+00:00", "EventTime": "2024-05-21T12:46:04.321765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfmph4LEEqVPzKWR2"], "accumulated_threat_level": 4.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "f424a7d6-590c-414b-ac32-754994beb2ea", "DetectTime": "2024-05-21T12:46:04.335349+00:00", "EventTime": "2024-05-21T12:46:04.335379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["89.165.72.230"]}], "Attach": [{"Content": "Connection to unknown destination port 8354/UDP destination IP 89.165.72.230. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoTJAm45xL9bMnwcfk"], "accumulated_threat_level": 1.3, "timewindow": 146} +{"Format": "IDEA0", "ID": "d1bf6807-1f81-4f2d-a209-0161409747c0", "DetectTime": "2024-05-21T12:46:04.368250+00:00", "EventTime": "2024-05-21T12:46:04.368271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJHgI3KN1dSTlMTEd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "ef3c22f1-4996-46a6-aa2f-6602a1cfa1d2", "DetectTime": "2024-05-21T12:46:04.380498+00:00", "EventTime": "2024-05-21T12:46:04.380516+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoCAxx3MpwQkFM47D5"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "94704771-eef0-4809-b724-b59bf48ad10f", "DetectTime": "2024-05-21T12:46:04.392699+00:00", "EventTime": "2024-05-21T12:46:04.392718+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoCAxx3MpwQkFM47D5"], "accumulated_threat_level": 5.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "bdef38d4-fbbd-4cdd-baa2-42819c2b2043", "DetectTime": "2024-05-21T12:46:04.411504+00:00", "EventTime": "2024-05-21T12:46:04.411540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxpxTPQdZXV3mnX0l"], "accumulated_threat_level": 2.1, "timewindow": 146} +{"Format": "IDEA0", "ID": "7eabb6c8-93a3-47af-a7bf-07e3a740b446", "DetectTime": "2024-05-21T12:46:04.426279+00:00", "EventTime": "2024-05-21T12:46:04.426299+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3F1I61rJ7a25zOu45"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "fdc393f4-74aa-4f3f-b904-61cedae2c756", "DetectTime": "2024-05-21T12:46:04.441648+00:00", "EventTime": "2024-05-21T12:46:04.441670+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3F1I61rJ7a25zOu45"], "accumulated_threat_level": 5.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "6cfae050-c423-446d-ad8b-f195ff75fded", "DetectTime": "2024-05-21T12:46:04.463628+00:00", "EventTime": "2024-05-21T12:46:04.463647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEyy723juTvJXGMHd"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 146} +{"Format": "IDEA0", "ID": "1b1371ae-c759-4907-b1d6-04d6d3c948b0", "DetectTime": "2024-05-21T12:46:04.488964+00:00", "EventTime": "2024-05-21T12:46:04.488982+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIB5y4SEBlJuf4OL2"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "a1a1072b-8318-4219-9aca-53e653288c66", "DetectTime": "2024-05-21T12:46:04.502871+00:00", "EventTime": "2024-05-21T12:46:04.502895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsIB5y4SEBlJuf4OL2"], "accumulated_threat_level": 6.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "d1f33922-261c-4899-8276-724a2d39ab2f", "DetectTime": "2024-05-21T12:46:04.518790+00:00", "EventTime": "2024-05-21T12:46:04.518822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCNxW3PPmVSTvuRmh"], "accumulated_threat_level": 3.7, "timewindow": 146} +{"Format": "IDEA0", "ID": "015c0c1b-9dd6-4ae4-9eff-16e865772863", "DetectTime": "2024-05-21T12:46:04.536738+00:00", "EventTime": "2024-05-21T12:46:04.536758+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbrbw4nKFUFb5qY13"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "bbffa08f-bae1-40c9-ad1f-bba169766120", "DetectTime": "2024-05-21T12:46:04.549409+00:00", "EventTime": "2024-05-21T12:46:04.549427+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAbrbw4nKFUFb5qY13"], "accumulated_threat_level": 6.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "025c2ffc-5549-4bf2-a869-36db596515dd", "DetectTime": "2024-05-21T12:46:04.570833+00:00", "EventTime": "2024-05-21T12:46:04.570852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5yUdW2x1ixRm9ohIi"], "accumulated_threat_level": 4.5, "timewindow": 146} +{"Format": "IDEA0", "ID": "0bb39072-48f4-4be9-8273-eaf4c5699e25", "DetectTime": "2024-05-21T12:46:04.582951+00:00", "EventTime": "2024-05-21T12:46:04.582971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["139.0.116.21"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.0.116.21 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17uei2YFBAlaHKwd3"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "3cbf349a-555d-4255-abb2-ee3e328c8ed0", "DetectTime": "2024-05-21T12:46:04.597218+00:00", "EventTime": "2024-05-21T12:46:04.597259+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.0.116.21 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17uei2YFBAlaHKwd3"], "accumulated_threat_level": 7.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "2d135f99-e1c7-4e17-856c-88f6281c77cd", "DetectTime": "2024-05-21T12:46:04.722468+00:00", "EventTime": "2024-05-21T12:46:04.722492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE7dP2RoYcWs87DQ6"], "accumulated_threat_level": 5.3, "timewindow": 146} +{"Format": "IDEA0", "ID": "fb65b65f-2ece-407d-95d1-4087fe752323", "DetectTime": "2024-05-21T12:46:04.768174+00:00", "EventTime": "2024-05-21T12:46:04.768194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjpZD33rQvJnt5D2a"], "accumulated_threat_level": 6.1, "timewindow": 146} +{"Format": "IDEA0", "ID": "b752dee9-4410-439b-9511-2080b0e07515", "DetectTime": "2024-05-21T12:46:04.814492+00:00", "EventTime": "2024-05-21T12:46:04.814515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci71Sh2ukRr0G8Dmq2"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 146} +{"Format": "IDEA0", "ID": "313edc4e-79ee-482f-8b97-120d6430a71c", "DetectTime": "2024-05-21T12:46:05.073145+00:00", "EventTime": "2024-05-21T12:46:05.073172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy32H3NaMQCQhS33e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "90406530-ab70-4b25-a2dd-88a1f9a4cb5a", "DetectTime": "2024-05-21T12:46:05.118918+00:00", "EventTime": "2024-05-21T12:46:05.118949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3EV4C1KEQCBqaiE7k"], "accumulated_threat_level": 7.699999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "879c620e-cedc-4785-bcef-e0868e79e9fa", "DetectTime": "2024-05-21T12:46:05.166737+00:00", "EventTime": "2024-05-21T12:46:05.166764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1oAdb3Pjawt5UJUc"], "accumulated_threat_level": 8.5, "timewindow": 146} +{"Format": "IDEA0", "ID": "9e01609e-4b15-4f4d-a459-5d017483e52f", "DetectTime": "2024-05-21T12:46:05.212598+00:00", "EventTime": "2024-05-21T12:46:05.212618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56G3YIQHaB8uZ7nl"], "accumulated_threat_level": 9.3, "timewindow": 146} +{"Format": "IDEA0", "ID": "368075b2-d19c-424d-84a5-7d34c43073eb", "DetectTime": "2024-05-21T12:46:05.286376+00:00", "EventTime": "2024-05-21T12:46:05.286429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CECFPj3Xn3Mb1aVLUg"], "accumulated_threat_level": 10.100000000000001, "timewindow": 146} +{"Format": "IDEA0", "ID": "ce4ac72a-ef43-4773-b1a8-ff3ecfe5cc7d", "DetectTime": "2024-05-21T12:46:05.324830+00:00", "EventTime": "2024-05-21T12:46:05.324867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXw1LI1ub2fnYy52P6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 146} +{"Format": "IDEA0", "ID": "55984faa-b4da-4fda-88b8-19201ee103e3", "DetectTime": "2024-05-21T12:46:05.379644+00:00", "EventTime": "2024-05-21T12:46:05.379664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWNYs4ASxHOrOQ113"], "accumulated_threat_level": 11.700000000000003, "timewindow": 146} +{"Format": "IDEA0", "ID": "2d6d3f14-bcf5-41cc-8fdc-deadfbad6f97", "DetectTime": "2024-05-21T12:46:05.433057+00:00", "EventTime": "2024-05-21T12:46:05.433075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYhIm3gwzFHbUEdA"], "accumulated_threat_level": 12.500000000000004, "timewindow": 146} +{"Format": "Json", "ID": "2d6d3f14-bcf5-41cc-8fdc-deadfbad6f97", "DetectTime": "2024-05-21T12:46:05.433057+00:00", "EventTime": "2024-05-21T12:46:05.433075+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-07T01:17:07.343651+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2024/05/21 12:46:05.644443)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 146, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "d4b3f64d-13c7-4613-935e-3f6bc55a3833", "DetectTime": "2024-05-21T12:46:05.648653+00:00", "EventTime": "2024-05-21T12:46:05.648673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8w9yp4lIqTJil0Hpf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "1261004b-4920-4f69-acfd-8cdd44601f63", "DetectTime": "2024-05-21T12:46:05.726721+00:00", "EventTime": "2024-05-21T12:46:05.726741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycniA4payk84OyA69"], "accumulated_threat_level": 0.8, "timewindow": 146} +{"Format": "IDEA0", "ID": "8027dcf3-36a7-475b-9fd2-c2b1e07efd1c", "DetectTime": "2024-05-21T12:46:05.774380+00:00", "EventTime": "2024-05-21T12:46:05.774401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TMfE4xKG9PRH1rKc"], "accumulated_threat_level": 1.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "92dda577-9a44-4407-a963-3a1434124081", "DetectTime": "2024-05-21T12:46:05.826227+00:00", "EventTime": "2024-05-21T12:46:05.826251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvl8fj34M3oFfycgIa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 146} +{"Format": "IDEA0", "ID": "814cb5ba-ffd5-4e91-87a2-27097f94b4f6", "DetectTime": "2024-05-21T12:46:05.857215+00:00", "EventTime": "2024-05-21T12:46:05.857237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Wa171T4swHy17jmk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "ceed77dd-90be-4e53-adc5-72ae960a4925", "DetectTime": "2024-05-21T12:46:05.913121+00:00", "EventTime": "2024-05-21T12:46:05.913140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW2ix1DhWMytaGqP1"], "accumulated_threat_level": 3.2, "timewindow": 146} +{"Format": "IDEA0", "ID": "c6d0852b-d189-43fd-9ee1-2b396f9c5c6d", "DetectTime": "2024-05-21T12:46:05.962568+00:00", "EventTime": "2024-05-21T12:46:05.962598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2GzXKHlYuV0PaYij"], "accumulated_threat_level": 4.0, "timewindow": 146} +{"Format": "IDEA0", "ID": "83c2443e-3dc7-4ff5-97bb-2d8789bfc452", "DetectTime": "2024-05-21T12:46:06.105993+00:00", "EventTime": "2024-05-21T12:46:06.106030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwBIF4pC28Fbkh3Zj"], "accumulated_threat_level": 4.8, "timewindow": 146} +{"Format": "IDEA0", "ID": "8c522559-4c23-40ed-aa31-2262c2e94984", "DetectTime": "2024-05-21T12:46:06.380542+00:00", "EventTime": "2024-05-21T12:46:06.380563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7Ekw4QKIAFEAVXd9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "be199923-1cea-4f66-983d-505f3fa57ef5", "DetectTime": "2024-05-21T12:46:06.424695+00:00", "EventTime": "2024-05-21T12:46:06.424717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwmCq1ROjOE8G9Sy7"], "accumulated_threat_level": 5.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "f93f4f3c-298c-4e45-b768-4cfc2bdf1022", "DetectTime": "2024-05-21T12:46:06.461669+00:00", "EventTime": "2024-05-21T12:46:06.461692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czi4cg3VNsSQMjU4ef"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "bdf78f38-6662-4f2a-a96c-eee8a1cfb59d", "DetectTime": "2024-05-21T12:46:06.504916+00:00", "EventTime": "2024-05-21T12:46:06.504936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8a1wM2aDDtcxTTakd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 146} +{"Format": "IDEA0", "ID": "ba6b99e6-8efa-4bec-a286-304c7a19ff79", "DetectTime": "2024-05-21T12:46:06.554389+00:00", "EventTime": "2024-05-21T12:46:06.554427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6xfW3EAxxP9hrEzd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "b1366ee3-223b-4e24-b4dc-35f6df31f691", "DetectTime": "2024-05-21T12:46:06.602894+00:00", "EventTime": "2024-05-21T12:46:06.602914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2Lqt3dslWQF3d5mi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "d2e78052-3afc-4ac7-9fe6-0f21af8dba0a", "DetectTime": "2024-05-21T12:46:06.651993+00:00", "EventTime": "2024-05-21T12:46:06.652015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZshj4IsHOFTPAko"], "accumulated_threat_level": 8.799999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "83f5c3d8-ad58-4045-a9d1-551b1dd2141a", "DetectTime": "2024-05-21T12:46:06.937201+00:00", "EventTime": "2024-05-21T12:46:06.937221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2RSj1inV3VgsyBf6"], "accumulated_threat_level": 9.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "bbd9f77e-2337-47ed-8680-6e38b25ce56e", "DetectTime": "2024-05-21T12:46:06.999399+00:00", "EventTime": "2024-05-21T12:46:06.999419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxoR9x1yZnnmiTOijk"], "accumulated_threat_level": 10.4, "timewindow": 146} +{"Format": "IDEA0", "ID": "d0cfc43f-40f4-41dc-951a-a32d05af7e5b", "DetectTime": "2024-05-21T12:46:07.034897+00:00", "EventTime": "2024-05-21T12:46:07.034920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzTKREHE8WqswVYw9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "bda2a61e-81bb-4c99-aedd-bed23e87b94e", "DetectTime": "2024-05-21T12:46:07.176852+00:00", "EventTime": "2024-05-21T12:46:07.176875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGXyK2KWhKtqn1aKd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 146} +{"Format": "IDEA0", "ID": "6b498930-483c-4671-83dd-cc2e55df7d87", "DetectTime": "2024-05-21T12:46:07.228395+00:00", "EventTime": "2024-05-21T12:46:07.228414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDk2l2TT9EQRtoS13"], "accumulated_threat_level": 12.000000000000002, "timewindow": 146} +{"Format": "Json", "ID": "6b498930-483c-4671-83dd-cc2e55df7d87", "DetectTime": "2024-05-21T12:46:07.228395+00:00", "EventTime": "2024-05-21T12:46:07.228414+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "1970-01-07T01:47:41.432825+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2024/05/21 12:46:07.402288)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 146, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0575ea3a-ad1f-4505-a6d9-4f9ad183b67c", "DetectTime": "2024-05-21T12:46:07.464183+00:00", "EventTime": "2024-05-21T12:46:07.464206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyu764CdhIZzIlix8"], "accumulated_threat_level": 0.8, "timewindow": 146} +{"Format": "IDEA0", "ID": "f41a9386-8009-4dd7-ae25-b1179774ba5d", "DetectTime": "2024-05-21T12:46:07.477645+00:00", "EventTime": "2024-05-21T12:46:07.477664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2rVEb3oaxWhAQWsC5"], "accumulated_threat_level": 1.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "ca2e39db-f6bf-4409-9e0d-930613df44a5", "DetectTime": "2024-05-21T12:46:07.490888+00:00", "EventTime": "2024-05-21T12:46:07.490910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XZm6xJ1a28l2Rh2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 146} +{"Format": "IDEA0", "ID": "33d82ac8-52d9-4fac-896a-6697498075f2", "DetectTime": "2024-05-21T12:46:07.521306+00:00", "EventTime": "2024-05-21T12:46:07.521327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wd7A3jGujJ2coSM1"], "accumulated_threat_level": 3.2, "timewindow": 146} +{"Format": "IDEA0", "ID": "5dd98f87-7312-4dff-bb2a-551687c86563", "DetectTime": "2024-05-21T12:46:07.788981+00:00", "EventTime": "2024-05-21T12:46:07.789003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1yTil1ZbxL1sn1YVa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "5ba912e8-f401-48ed-9a77-d447cd9a27a0", "DetectTime": "2024-05-21T12:46:07.832507+00:00", "EventTime": "2024-05-21T12:46:07.832527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx108d3Zjh07KjB3df"], "accumulated_threat_level": 4.0, "timewindow": 146} +{"Format": "IDEA0", "ID": "560f500f-914b-40dd-9455-0dcb72dbaa72", "DetectTime": "2024-05-21T12:46:07.881121+00:00", "EventTime": "2024-05-21T12:46:07.881141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJ7Yn1LCo7AGWCzl7"], "accumulated_threat_level": 4.8, "timewindow": 146} +{"Format": "IDEA0", "ID": "39a2ffd9-f3ae-4035-8a7e-4dc9c33383fc", "DetectTime": "2024-05-21T12:46:07.932721+00:00", "EventTime": "2024-05-21T12:46:07.932749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwsoSO63RYWgT41Fh"], "accumulated_threat_level": 5.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "95252e73-0c6c-4d11-9595-a9204f20cc5a", "DetectTime": "2024-05-21T12:46:07.983166+00:00", "EventTime": "2024-05-21T12:46:07.983187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40KVj494Dvhjr2Ykb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 146} +{"Format": "IDEA0", "ID": "8b7f28a4-e5d2-448b-8222-bc6b705ef6b1", "DetectTime": "2024-05-21T12:46:08.032435+00:00", "EventTime": "2024-05-21T12:46:08.032453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCwHH1t2wowmuDxv4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "cb8c4733-a266-44fe-904a-049b15c1cbea", "DetectTime": "2024-05-21T12:46:08.091084+00:00", "EventTime": "2024-05-21T12:46:08.091102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjt6eK2YrPBhDZwuk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "82298c21-c7e7-498c-8392-d88bb62ae367", "DetectTime": "2024-05-21T12:46:08.139577+00:00", "EventTime": "2024-05-21T12:46:08.139596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBp3j4PLmwRcw2L9j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "0fbf8492-6928-4941-98bd-dd732bff8123", "DetectTime": "2024-05-21T12:46:08.173348+00:00", "EventTime": "2024-05-21T12:46:08.173369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjCaV28SH2WkGwzUf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "1027b1bf-937f-4751-877f-fe683d84833f", "DetectTime": "2024-05-21T12:46:08.479755+00:00", "EventTime": "2024-05-21T12:46:08.479775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCXRm3YVg95HgvDG7"], "accumulated_threat_level": 9.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "976e4e9a-9749-4f63-b404-451e2b6ff095", "DetectTime": "2024-05-21T12:46:08.484712+00:00", "EventTime": "2024-05-21T12:46:08.484730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcnPNr7375PM0yJE2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "d967074b-3fef-43c2-b805-549fe1bd9460", "DetectTime": "2024-05-21T12:46:08.489559+00:00", "EventTime": "2024-05-21T12:46:08.489577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6r4y2TyecMc9r6ub"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "fde55133-ed76-4151-8e80-ceebbfdc95dd", "DetectTime": "2024-05-21T12:46:08.513065+00:00", "EventTime": "2024-05-21T12:46:08.513087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwhaa21GIlEkjNHRk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "c493f9de-221b-418f-82e1-350fc4d4136f", "DetectTime": "2024-05-21T12:46:08.638339+00:00", "EventTime": "2024-05-21T12:46:08.638358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfyejh17Wcbretywf3"], "accumulated_threat_level": 10.4, "timewindow": 146} +{"Format": "IDEA0", "ID": "aa9f006a-9c6b-4457-8c3d-44b0710ebc49", "DetectTime": "2024-05-21T12:46:08.679157+00:00", "EventTime": "2024-05-21T12:46:08.679179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CviqlNtoLw9zC3mO4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "4ffbedc6-cff7-48d1-b275-6dc5891c2e4f", "DetectTime": "2024-05-21T12:46:08.726393+00:00", "EventTime": "2024-05-21T12:46:08.726425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAC8I3qDOOLzOjLO"], "accumulated_threat_level": 11.200000000000001, "timewindow": 146} +{"Format": "IDEA0", "ID": "9475c4b0-cd62-4ee9-ba0d-7fefbac38cab", "DetectTime": "2024-05-21T12:46:09.008398+00:00", "EventTime": "2024-05-21T12:46:09.008419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBIqo2EEM7nYZIXB"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "ac3660b3-68c6-4cc4-ab57-38bbf2f868d6", "DetectTime": "2024-05-21T12:46:09.015778+00:00", "EventTime": "2024-05-21T12:46:09.015798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrERiio1JCwvzUr3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "432a0e20-dd07-4bb3-bc0c-44aafce1fde1", "DetectTime": "2024-05-21T12:46:09.020656+00:00", "EventTime": "2024-05-21T12:46:09.020675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqVkx1ew7HYAoT3Ui"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "eb512809-35cb-4a6e-ade4-2a4f0d9cc006", "DetectTime": "2024-05-21T12:46:09.032710+00:00", "EventTime": "2024-05-21T12:46:09.032731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CojD2SsRjn4c8Nezc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "b1a24e3d-e4bb-415c-b6b6-5fb1fc1c7e06", "DetectTime": "2024-05-21T12:46:09.061928+00:00", "EventTime": "2024-05-21T12:46:09.061946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVz9mh4igLX5mtaeo1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 146} +{"Format": "Json", "ID": "b1a24e3d-e4bb-415c-b6b6-5fb1fc1c7e06", "DetectTime": "2024-05-21T12:46:09.061928+00:00", "EventTime": "2024-05-21T12:46:09.061946+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-07T01:48:02.908040+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 146. (real time 2024/05/21 12:46:09.282718)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 146, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9fc71960-4a91-4d9b-85bc-ea094594abb9", "DetectTime": "2024-05-21T12:46:09.287168+00:00", "EventTime": "2024-05-21T12:46:09.287187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQr2ef22BYISKzdwG4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 143} +{"Format": "IDEA0", "ID": "2285c3a0-1ef3-4037-a4ae-ddcb47dc6515", "DetectTime": "2024-05-21T12:46:09.300837+00:00", "EventTime": "2024-05-21T12:46:09.300856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSlln18LrSBwZBDBh"], "accumulated_threat_level": 0.8, "timewindow": 146} +{"Format": "IDEA0", "ID": "550df5b4-827d-432a-a9ce-70a14cf433d7", "DetectTime": "2024-05-21T12:46:09.351764+00:00", "EventTime": "2024-05-21T12:46:09.351782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChulnW1Q7Kok2LrxF7"], "accumulated_threat_level": 1.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "99ade890-b706-4a79-81f2-f833fdfa83bf", "DetectTime": "2024-05-21T12:46:09.663592+00:00", "EventTime": "2024-05-21T12:46:09.663627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.101.238.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChopTwfXAgZbX508j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "b668ac6f-df40-4a19-95ca-d43bee3c6f33", "DetectTime": "2024-05-21T12:46:09.670719+00:00", "EventTime": "2024-05-21T12:46:09.670744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu4MtyhNpg2tUvGl4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "c206b355-e8ea-4cdf-b04b-af1a2068c4cb", "DetectTime": "2024-05-21T12:46:09.676873+00:00", "EventTime": "2024-05-21T12:46:09.676894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXipkZ1QXUQ3uUHWJf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "8994040c-9615-4490-a437-164c2eac5237", "DetectTime": "2024-05-21T12:46:09.681734+00:00", "EventTime": "2024-05-21T12:46:09.681755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct1ccw2sCfrRGuXiqb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "94a5a68c-bcda-4ade-a2da-879fcf632020", "DetectTime": "2024-05-21T12:46:09.686472+00:00", "EventTime": "2024-05-21T12:46:09.686492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbALXongzpbIVS6Cc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "8390d924-03a8-431e-94ba-805c1412d192", "DetectTime": "2024-05-21T12:46:09.692652+00:00", "EventTime": "2024-05-21T12:46:09.692671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WlIJCjAMhFxIFO9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "05ef1067-63ad-4336-9c13-e707b19b54b8", "DetectTime": "2024-05-21T12:46:09.752582+00:00", "EventTime": "2024-05-21T12:46:09.752604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzITdk1vroxHWOJ3K7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 146} +{"Format": "IDEA0", "ID": "cfd32500-1f59-43ef-b1ab-468df562dd6c", "DetectTime": "2024-05-21T12:46:09.804507+00:00", "EventTime": "2024-05-21T12:46:09.804530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYxhoV3kDdJ2XYeB8k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "58703b20-8ac6-4706-81b3-69ff8bf5125c", "DetectTime": "2024-05-21T12:46:10.237860+00:00", "EventTime": "2024-05-21T12:46:10.237881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaX7AB646fi1wlfKf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "d28414ab-45e7-4a01-9b43-a92ea5494829", "DetectTime": "2024-05-21T12:46:10.250842+00:00", "EventTime": "2024-05-21T12:46:10.250865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqMhe1THolPEUzqie"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "e561ebdf-1a03-4d21-a4dc-b9d4b7b095a0", "DetectTime": "2024-05-21T12:46:10.257095+00:00", "EventTime": "2024-05-21T12:46:10.257115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxXTv3lp362FLopl5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "87f5e791-cad3-460f-be87-b3593d3d24de", "DetectTime": "2024-05-21T12:46:10.261801+00:00", "EventTime": "2024-05-21T12:46:10.261819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CISZwwb5vHh6Irf0d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "484e4b29-d8c9-4ad5-bf29-e518981b730b", "DetectTime": "2024-05-21T12:46:10.273756+00:00", "EventTime": "2024-05-21T12:46:10.273775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQR0zA1v7trXGV5Z1a"], "accumulated_threat_level": 3.2, "timewindow": 146} +{"Format": "IDEA0", "ID": "78937ac3-0ae8-428d-a46f-ec91dedcd555", "DetectTime": "2024-05-21T12:46:10.297872+00:00", "EventTime": "2024-05-21T12:46:10.297894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs7meU2sIqdJj5eY77"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "35d5751d-56cd-4721-9f17-24f790bb8067", "DetectTime": "2024-05-21T12:46:10.458267+00:00", "EventTime": "2024-05-21T12:46:10.458291+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKfK54sNIJhOllwKc"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "c32731e4-aee7-4d5f-bf89-f0e8d8fa4215", "DetectTime": "2024-05-21T12:46:10.473573+00:00", "EventTime": "2024-05-21T12:46:10.473592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKfK54sNIJhOllwKc"], "accumulated_threat_level": 7.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "2af4abd8-d226-4c04-95f8-81cf9baffdae", "DetectTime": "2024-05-21T12:46:10.695919+00:00", "EventTime": "2024-05-21T12:46:10.695938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3r2cC19oWT5kuxTIf"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "c66cfae5-ed30-4d91-8640-0b9036491966", "DetectTime": "2024-05-21T12:46:10.708339+00:00", "EventTime": "2024-05-21T12:46:10.708359+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3r2cC19oWT5kuxTIf"], "accumulated_threat_level": 8.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "59d6c59b-2960-4d65-a666-1bf98612949f", "DetectTime": "2024-05-21T12:46:10.735389+00:00", "EventTime": "2024-05-21T12:46:10.735411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqIH32HOa17T0RQii"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "ba256dd4-7a97-4062-a747-e74835304f57", "DetectTime": "2024-05-21T12:46:10.750326+00:00", "EventTime": "2024-05-21T12:46:10.750344+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLlP56IZU6HsPP1e"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "2332abcf-042d-4412-bb44-bd846959a786", "DetectTime": "2024-05-21T12:46:10.755502+00:00", "EventTime": "2024-05-21T12:46:10.755522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWY4Yv4BbmAbZ5oQ65"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "06b5a8d6-85d4-421d-b29d-b338c75808d4", "DetectTime": "2024-05-21T12:46:10.767707+00:00", "EventTime": "2024-05-21T12:46:10.767726+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLlP56IZU6HsPP1e"], "accumulated_threat_level": 8.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "6cbee724-8fab-44af-bfde-0799ed96e42d", "DetectTime": "2024-05-21T12:46:10.780370+00:00", "EventTime": "2024-05-21T12:46:10.780391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBcvbyRu25Kzt5H5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "4d10e9ff-9300-496e-911f-f7ccf26b2920", "DetectTime": "2024-05-21T12:46:10.794164+00:00", "EventTime": "2024-05-21T12:46:10.794184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX0kK54iTevDXmCe1b"], "accumulated_threat_level": 4.0, "timewindow": 146} +{"Format": "IDEA0", "ID": "972df912-4c04-405c-9793-b73cc0ad6564", "DetectTime": "2024-05-21T12:46:10.806549+00:00", "EventTime": "2024-05-21T12:46:10.806567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.253.163.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.253.163.131 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwKqkFgl3NKiC8Pk"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "e019a2a2-36fb-4982-9669-94ebbffd874b", "DetectTime": "2024-05-21T12:46:10.819388+00:00", "EventTime": "2024-05-21T12:46:10.819411+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.253.163.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.253.163.131 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwKqkFgl3NKiC8Pk"], "accumulated_threat_level": 9.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "bdb347f0-90b5-4604-abe8-e431735e996b", "DetectTime": "2024-05-21T12:46:10.950313+00:00", "EventTime": "2024-05-21T12:46:10.950333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBOMK25bbFEHiF3H8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "56ec791c-53ce-47b0-8a4b-f3b6c8e0f378", "DetectTime": "2024-05-21T12:46:10.955992+00:00", "EventTime": "2024-05-21T12:46:10.956013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C50fta2A3trDN0eGOi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "7762a818-d4ce-4101-adcc-897b54a8e141", "DetectTime": "2024-05-21T12:46:10.990347+00:00", "EventTime": "2024-05-21T12:46:10.990371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXVhPq2cOqITGjd3P5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "ffd8939e-7ac9-4b7a-9e9f-62a4ff065740", "DetectTime": "2024-05-21T12:46:11.072799+00:00", "EventTime": "2024-05-21T12:46:11.072818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQAnb4tUE9gJcVbg"], "accumulated_threat_level": 4.8, "timewindow": 146} +{"Format": "IDEA0", "ID": "f8f1c80d-a39c-4bd2-8502-e1ee48aa4ca2", "DetectTime": "2024-05-21T12:46:11.118364+00:00", "EventTime": "2024-05-21T12:46:11.118385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2LQjF3wLt1NG1KJv7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "2efc3cbc-dbe3-47cd-8f2b-e824d8a14301", "DetectTime": "2024-05-21T12:46:11.382979+00:00", "EventTime": "2024-05-21T12:46:11.383003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPE8thD4FuyIiD8Z9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "5969a855-f55a-45db-a3c3-5254260430bc", "DetectTime": "2024-05-21T12:46:11.447748+00:00", "EventTime": "2024-05-21T12:46:11.447767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTb1R2QIMu9T4nIQc"], "accumulated_threat_level": 5.6, "timewindow": 146} +{"Format": "IDEA0", "ID": "c3bd2b60-5592-4926-a1c3-ca06532ee9c4", "DetectTime": "2024-05-21T12:46:11.452628+00:00", "EventTime": "2024-05-21T12:46:11.452645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3P9Z3Ikoein0oGs2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "0c54af1e-f587-4594-9a33-3158c6899992", "DetectTime": "2024-05-21T12:46:11.457204+00:00", "EventTime": "2024-05-21T12:46:11.457222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfB6hA26MgiZT29Zk6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "fab9ad16-f639-473a-9f22-3ba9475d7fce", "DetectTime": "2024-05-21T12:46:11.522628+00:00", "EventTime": "2024-05-21T12:46:11.522648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX3YHHTvjVMESj1P9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "efd09d98-761c-4d98-a7b7-b3187dda8f6d", "DetectTime": "2024-05-21T12:46:11.570355+00:00", "EventTime": "2024-05-21T12:46:11.570376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rDUr2sRIyjhAA2Ql"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "42301195-5ae4-4aa0-b705-e6d654c71990", "DetectTime": "2024-05-21T12:46:11.654449+00:00", "EventTime": "2024-05-21T12:46:11.654471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hYs13TYTrnUhDUK"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "d05722fb-3469-48eb-a580-84b99a9c9908", "DetectTime": "2024-05-21T12:46:11.666609+00:00", "EventTime": "2024-05-21T12:46:11.666628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLkQv2jD3E0j8pn38"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 146} +{"Format": "IDEA0", "ID": "cc59901f-52ce-4d25-b7b9-599ece257d66", "DetectTime": "2024-05-21T12:46:11.671481+00:00", "EventTime": "2024-05-21T12:46:11.671498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jpqF2xgtZLasxkl9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "65ca373c-1425-4e94-8ce2-c3be85a680d8", "DetectTime": "2024-05-21T12:46:11.697731+00:00", "EventTime": "2024-05-21T12:46:11.697753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw94583i3JDVmaZ2x2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "ba2ff656-6bc6-4efa-9c15-8bcc640c9074", "DetectTime": "2024-05-21T12:46:12.125771+00:00", "EventTime": "2024-05-21T12:46:12.125792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyyiE63jJmZ4zHO9t3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "0dfb5b5c-8efe-4a8e-a543-dbf4e4dcb508", "DetectTime": "2024-05-21T12:46:12.136415+00:00", "EventTime": "2024-05-21T12:46:12.136435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ7JvC1CSheSYJo6Jj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "5cc7a3d2-ecc6-43c4-b10d-d6042b4a5688", "DetectTime": "2024-05-21T12:46:12.226102+00:00", "EventTime": "2024-05-21T12:46:12.226123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4j0HnoM7PuDgaZT7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "4d64b0c5-b1a9-4bb4-bfac-f712f5eeffb6", "DetectTime": "2024-05-21T12:46:12.232760+00:00", "EventTime": "2024-05-21T12:46:12.232779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8Z164VJZTYrmJNNl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "524d0528-a515-4fe5-aa4c-2e20b25427dd", "DetectTime": "2024-05-21T12:46:12.328864+00:00", "EventTime": "2024-05-21T12:46:12.328884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgGtno44sIfEMpIr27"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "3f86af9a-b205-44c2-aab3-5cd2ad889584", "DetectTime": "2024-05-21T12:46:12.334049+00:00", "EventTime": "2024-05-21T12:46:12.334068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C542Ip3MrOPzfgpy0a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "db27651b-7d66-4b26-93e8-b18162a5cf6f", "DetectTime": "2024-05-21T12:46:12.644503+00:00", "EventTime": "2024-05-21T12:46:12.644525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19OLn3ha0CZ56mMMe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "945cc4cd-ff4c-4faf-bd83-7022849c8a4a", "DetectTime": "2024-05-21T12:46:12.684283+00:00", "EventTime": "2024-05-21T12:46:12.684305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKVgOL75oEo0HGP5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "6785d881-ab3f-4ec8-8f1a-81f6874b5eda", "DetectTime": "2024-05-21T12:46:12.692268+00:00", "EventTime": "2024-05-21T12:46:12.692287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFXOzws16ZiydWRf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "174b2954-6895-42d8-9047-d9b2f2355c4a", "DetectTime": "2024-05-21T12:46:12.699798+00:00", "EventTime": "2024-05-21T12:46:12.699820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqQtE11VUYM7ZUJ3zi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "532947e6-3a7f-4028-a10e-5c3f1920e9fd", "DetectTime": "2024-05-21T12:46:12.705346+00:00", "EventTime": "2024-05-21T12:46:12.705369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2krVP3uSKXAAj71Le"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "a81d3099-a8d7-4bc0-a8c7-774bba06cfd5", "DetectTime": "2024-05-21T12:46:12.840683+00:00", "EventTime": "2024-05-21T12:46:12.840705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF7JT83aoy82ju7yqg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "1d1618ee-0c0e-4034-a62c-4ff95ba82316", "DetectTime": "2024-05-21T12:46:12.933312+00:00", "EventTime": "2024-05-21T12:46:12.933334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQMtNbcqWpFfNDSe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "62a51f2f-3bd4-4c3b-a1a5-e667e25b606a", "DetectTime": "2024-05-21T12:46:12.965018+00:00", "EventTime": "2024-05-21T12:46:12.965039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVHHP3BeKGtJ5KsQ5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "d635ed16-9b6b-4b99-8138-846d4a0351a5", "DetectTime": "2024-05-21T12:46:12.970316+00:00", "EventTime": "2024-05-21T12:46:12.970334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvu7q726NAmzLHUoZk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "19b0ea6d-0f39-4d80-a0d3-5af24107029b", "DetectTime": "2024-05-21T12:46:13.295145+00:00", "EventTime": "2024-05-21T12:46:13.295166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzOYm1eBf6rN6L9Th"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "e8496ce0-d2f6-49ca-844a-dc9c0cceef6f", "DetectTime": "2024-05-21T12:46:13.300576+00:00", "EventTime": "2024-05-21T12:46:13.300598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEi6sx15vMXoL73xq8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "6bee6233-52a2-4ff7-bdc5-8c6f74c968b4", "DetectTime": "2024-05-21T12:46:13.305127+00:00", "EventTime": "2024-05-21T12:46:13.305146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7v74r4nwL5y3TZXwk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "68c7fd04-9ddf-484a-8d08-01fd58ec7c12", "DetectTime": "2024-05-21T12:46:13.410980+00:00", "EventTime": "2024-05-21T12:46:13.411007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMlAz1nnTvQKChDTj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "f1c82cd5-653f-45d2-bd67-7306d61774f0", "DetectTime": "2024-05-21T12:46:13.477437+00:00", "EventTime": "2024-05-21T12:46:13.477457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COV7VNyg1CX2dcGW8"], "accumulated_threat_level": 0.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "10b3a301-cc66-4f79-bb74-cd43d96ab938", "DetectTime": "2024-05-21T12:46:13.483276+00:00", "EventTime": "2024-05-21T12:46:13.483296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaiT0e32t8Bfq6ZlWh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "9b151b35-086c-45b7-8dda-4333c9cff3bb", "DetectTime": "2024-05-21T12:46:13.488604+00:00", "EventTime": "2024-05-21T12:46:13.488622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLP2M1jIvsZASCTsd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "aa976747-aa91-40fc-8024-8d3edd4b5287", "DetectTime": "2024-05-21T12:46:13.599830+00:00", "EventTime": "2024-05-21T12:46:13.599854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEL33e1JoIOy4BIQXc"], "accumulated_threat_level": 1.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "aa8d1b66-c37a-42df-9e36-846682403303", "DetectTime": "2024-05-21T12:46:13.929579+00:00", "EventTime": "2024-05-21T12:46:13.929601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtQdEp41fDN09uJvje"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "d3cf4725-bde3-4442-8f2d-c472c13e5a1c", "DetectTime": "2024-05-21T12:46:13.934094+00:00", "EventTime": "2024-05-21T12:46:13.934111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyHPI3NtfcbGkHtBl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "eb85b5b1-4b9e-43d2-86a6-d8cb5ec4a0f3", "DetectTime": "2024-05-21T12:46:13.939052+00:00", "EventTime": "2024-05-21T12:46:13.939070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrGKQx3HyYJtpzW2Sd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "0e48b297-96af-4c59-b36a-78b5cea28d37", "DetectTime": "2024-05-21T12:46:13.943415+00:00", "EventTime": "2024-05-21T12:46:13.943433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSiFD22BYUksNYFoh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "28217d2d-ee47-46e8-9fec-1decdb14f409", "DetectTime": "2024-05-21T12:46:13.955728+00:00", "EventTime": "2024-05-21T12:46:13.955749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HQ7l4L6yOirNJP5f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 147} +{"Format": "IDEA0", "ID": "be75f8d0-3d7f-425d-a515-054b59f38755", "DetectTime": "2024-05-21T12:46:14.107264+00:00", "EventTime": "2024-05-21T12:46:14.107289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C13xzZ2B8oy6roGgy"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "1e4331b4-125a-497a-a457-cc959e6bbc5f", "DetectTime": "2024-05-21T12:46:14.150614+00:00", "EventTime": "2024-05-21T12:46:14.150636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreXJI2JQZQQKoMyKe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "511f9efb-ba15-47cc-b535-b3b23efa80c2", "DetectTime": "2024-05-21T12:46:14.451159+00:00", "EventTime": "2024-05-21T12:46:14.451178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDAkt3qaR168IFjx5"], "accumulated_threat_level": 3.2, "timewindow": 147} +{"Format": "IDEA0", "ID": "1742aa41-097f-4b0a-bc87-c96878bd4dce", "DetectTime": "2024-05-21T12:46:14.465603+00:00", "EventTime": "2024-05-21T12:46:14.465623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIL0Ra2ToC6Rn09HEa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "69ece64d-d3c5-4cbe-9410-dd3b3af02852", "DetectTime": "2024-05-21T12:46:14.472798+00:00", "EventTime": "2024-05-21T12:46:14.472819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8ag34a3MBVRj6VB4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "74e327df-7ab8-4fd6-ae5c-274037f1f811", "DetectTime": "2024-05-21T12:46:14.520774+00:00", "EventTime": "2024-05-21T12:46:14.520796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH1mKF11JUner5xN8g"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "c787b071-87d8-414c-8228-16b0bcbc4488", "DetectTime": "2024-05-21T12:46:14.690716+00:00", "EventTime": "2024-05-21T12:46:14.690738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHS0Pb1Ay9f3A3gxVa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 144} +{"Format": "IDEA0", "ID": "79d391ff-ad13-40cd-8503-c2eb4d0eca01", "DetectTime": "2024-05-21T12:46:14.705772+00:00", "EventTime": "2024-05-21T12:46:14.705795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cutbw32c0vwzYQYp2"], "accumulated_threat_level": 4.0, "timewindow": 147} +{"Format": "IDEA0", "ID": "e46925fe-4742-47a4-a9c3-b543d58b949c", "DetectTime": "2024-05-21T12:46:14.711405+00:00", "EventTime": "2024-05-21T12:46:14.711424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9zA6tvSGqKNM7qva"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "9956f92e-5b6a-41d5-9eaf-280cdd76fb83", "DetectTime": "2024-05-21T12:46:14.717195+00:00", "EventTime": "2024-05-21T12:46:14.717213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMrPe3FsE4CJSo8c7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "929d933e-b9d9-40ed-bc99-2a4db52ce0b9", "DetectTime": "2024-05-21T12:46:14.721654+00:00", "EventTime": "2024-05-21T12:46:14.721672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyNcmXD9csqugrWa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "a8b2207f-d5f3-4d3d-a79e-ff65d46ba58d", "DetectTime": "2024-05-21T12:46:15.086667+00:00", "EventTime": "2024-05-21T12:46:15.086688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQi9Nz3PG8mjFgyfmc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "2e736a12-1d8b-4173-a31c-9592921aa2ab", "DetectTime": "2024-05-21T12:46:15.211742+00:00", "EventTime": "2024-05-21T12:46:15.211766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPSjW12UkH8MnrE0t7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "d112ea8b-b610-43b0-84ee-6558c9263722", "DetectTime": "2024-05-21T12:46:15.217214+00:00", "EventTime": "2024-05-21T12:46:15.217237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxXJGvZDjkvJFJV4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "92dee8f4-77da-4782-8a99-7c9f1a0377e0", "DetectTime": "2024-05-21T12:46:15.222946+00:00", "EventTime": "2024-05-21T12:46:15.222968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwpCQe3cYQVpOR2NU6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "0d696e10-8a47-4666-8025-58ce1139da0c", "DetectTime": "2024-05-21T12:46:15.257020+00:00", "EventTime": "2024-05-21T12:46:15.257042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClAEvT2og4ZVtoRTV2"], "accumulated_threat_level": 4.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "718a6e28-2ea3-41de-b924-1ae75f2e7cb1", "DetectTime": "2024-05-21T12:46:15.628630+00:00", "EventTime": "2024-05-21T12:46:15.628654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMDq2w2bD1fCiup6pi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "07bc6c02-4bef-4184-9a9b-b4c60bc089b3", "DetectTime": "2024-05-21T12:46:15.633629+00:00", "EventTime": "2024-05-21T12:46:15.633648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4lwD24hSr20gWo2ph"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "ba87968e-31af-48bd-8b62-94dccd9f7043", "DetectTime": "2024-05-21T12:46:15.639550+00:00", "EventTime": "2024-05-21T12:46:15.639569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8MsF22RXEIcRlnLma"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "dcd0001c-73b8-4c5a-99d2-0d66d4839491", "DetectTime": "2024-05-21T12:46:15.759399+00:00", "EventTime": "2024-05-21T12:46:15.759423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdaqkS3QqHnJtVDWFh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "1d9ae222-a830-408d-9ef1-d2edf39e02ed", "DetectTime": "2024-05-21T12:46:15.765245+00:00", "EventTime": "2024-05-21T12:46:15.765264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChsQib19xoEQHTnZYb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "82443211-3f7f-4796-9938-c02896cae3e2", "DetectTime": "2024-05-21T12:46:15.777429+00:00", "EventTime": "2024-05-21T12:46:15.777451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFiEq2fQcCtJddkmg"], "accumulated_threat_level": 5.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "880af68a-e66b-4d39-8275-9f1ae8d26257", "DetectTime": "2024-05-21T12:46:15.842167+00:00", "EventTime": "2024-05-21T12:46:15.842189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnnSFY2hnQhgJMMHk3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "2f25da6a-9e7c-4f00-88f8-32c1751d1e5d", "DetectTime": "2024-05-21T12:46:15.943285+00:00", "EventTime": "2024-05-21T12:46:15.943307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CckyGm3cUntg2R3MHa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "c2319faf-e39d-44f2-89df-b1dfaabf7b8d", "DetectTime": "2024-05-21T12:46:15.951911+00:00", "EventTime": "2024-05-21T12:46:15.951931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca2Jok34HCfDt45He9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "8f362448-12ab-4e8f-8e2f-d7d1a3678c79", "DetectTime": "2024-05-21T12:46:16.211125+00:00", "EventTime": "2024-05-21T12:46:16.211148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIcno64RUqtJY0vtIk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "bd4d94d2-7969-49f8-920f-b7f9a1faa6f7", "DetectTime": "2024-05-21T12:46:16.266941+00:00", "EventTime": "2024-05-21T12:46:16.266967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz89kOWbXxS23JYYh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "b12ed691-90a7-4215-a721-9a1efd61c446", "DetectTime": "2024-05-21T12:46:16.271963+00:00", "EventTime": "2024-05-21T12:46:16.271981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsQP41SNw9XvXUjS5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "6c7eb212-508e-4270-9f61-9a73532d41b9", "DetectTime": "2024-05-21T12:46:16.387829+00:00", "EventTime": "2024-05-21T12:46:16.387851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeJjBh4MGAyvU8q2xa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "57e792d8-6f8f-425a-89b9-cf1c46eccdf9", "DetectTime": "2024-05-21T12:46:16.393951+00:00", "EventTime": "2024-05-21T12:46:16.393975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqAUIX1TeZX2KoQmDe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "881832d2-dbe2-487b-8b4f-2d896d0518fc", "DetectTime": "2024-05-21T12:46:16.492508+00:00", "EventTime": "2024-05-21T12:46:16.492533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyPQVw61osequnKh3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "062236fd-b187-4d44-985e-369033c52ba6", "DetectTime": "2024-05-21T12:46:16.497813+00:00", "EventTime": "2024-05-21T12:46:16.497832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOVAJ28MXl2G28Ofk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "48caa597-3b42-4ac2-950b-34f83fdbf410", "DetectTime": "2024-05-21T12:46:16.547243+00:00", "EventTime": "2024-05-21T12:46:16.547261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ExKE3jlpqIg1xKrk"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "645c3ea4-18b8-42e5-a2c2-85cd07a8e6ba", "DetectTime": "2024-05-21T12:46:16.558852+00:00", "EventTime": "2024-05-21T12:46:16.558871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ExKE3jlpqIg1xKrk"], "accumulated_threat_level": 9.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "24c86742-e1cf-40a3-b9c5-d0091c0c22bf", "DetectTime": "2024-05-21T12:46:16.635771+00:00", "EventTime": "2024-05-21T12:46:16.635790+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz0Oep1RvgkZjKybc2"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "91b47c8e-ac19-4ccd-a3ee-1808866b348a", "DetectTime": "2024-05-21T12:46:16.646904+00:00", "EventTime": "2024-05-21T12:46:16.646921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz0Oep1RvgkZjKybc2"], "accumulated_threat_level": 10.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "56d1aff9-02d0-4228-9670-12172a784819", "DetectTime": "2024-05-21T12:46:16.704452+00:00", "EventTime": "2024-05-21T12:46:16.704471+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAH6IqJcBxAjnnrG8"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "3ec6ced2-7254-4eb0-ac14-11618a7ebf31", "DetectTime": "2024-05-21T12:46:16.717533+00:00", "EventTime": "2024-05-21T12:46:16.717552+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAH6IqJcBxAjnnrG8"], "accumulated_threat_level": 10.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "2dad3dc0-c414-453b-82b6-89e6ebf41054", "DetectTime": "2024-05-21T12:46:16.746042+00:00", "EventTime": "2024-05-21T12:46:16.746060+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBsIn1EFjxcU79Z5d"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "2674e6f7-8c56-4a54-bed1-497002faab74", "DetectTime": "2024-05-21T12:46:16.761785+00:00", "EventTime": "2024-05-21T12:46:16.761805+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBsIn1EFjxcU79Z5d"], "accumulated_threat_level": 11.1, "timewindow": 32} +{"Format": "IDEA0", "ID": "2493234a-ffb1-4ee1-a065-c1cbe49a5f14", "DetectTime": "2024-05-21T12:46:16.773666+00:00", "EventTime": "2024-05-21T12:46:16.773687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.187.41.194"]}], "Attach": [{"Content": "Connection to unknown destination port 9753/UDP destination IP 76.187.41.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CenZecQIkvxBxp6fd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "97417597-6171-4778-815c-34c40de3deba", "DetectTime": "2024-05-21T12:46:16.778646+00:00", "EventTime": "2024-05-21T12:46:16.778664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Xnt343PA52DqnT27"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "6a4ea500-bbb5-40f7-838e-c7aec4fd4ef2", "DetectTime": "2024-05-21T12:46:16.863651+00:00", "EventTime": "2024-05-21T12:46:16.863672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Uwxh1tKtqxJEuHc6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "d1e31017-3881-4aad-8902-8a69c92cb7ea", "DetectTime": "2024-05-21T12:46:16.910170+00:00", "EventTime": "2024-05-21T12:46:16.910192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnujlan68AjzyJPO5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "4b14aa53-1da4-4a3c-aa41-850a469fd8a2", "DetectTime": "2024-05-21T12:46:17.006173+00:00", "EventTime": "2024-05-21T12:46:17.006198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeA6eB3r7vGS2wjzNh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "dbd0a64d-2ba4-4251-8051-01b8efe496f6", "DetectTime": "2024-05-21T12:46:17.012018+00:00", "EventTime": "2024-05-21T12:46:17.012037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMhsux2kb4eFMNecm9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "81d366fe-ec42-4a4e-96b5-ea7d94fd8bf1", "DetectTime": "2024-05-21T12:46:17.034394+00:00", "EventTime": "2024-05-21T12:46:17.034445+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.205.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfTg91gy4o11TjtIk"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "e0f6d6e9-4025-4b00-b802-3f2ef6576cc4", "DetectTime": "2024-05-21T12:46:17.047170+00:00", "EventTime": "2024-05-21T12:46:17.047189+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.205.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfTg91gy4o11TjtIk"], "accumulated_threat_level": 11.6, "timewindow": 32} +{"Format": "IDEA0", "ID": "6f757ca3-ebe0-47af-9680-34c4054b1750", "DetectTime": "2024-05-21T12:46:17.077862+00:00", "EventTime": "2024-05-21T12:46:17.077882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85zTL38L9QMIYuPM"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "a0e22c93-bf51-4a8b-8cf5-a2603770db35", "DetectTime": "2024-05-21T12:46:17.092282+00:00", "EventTime": "2024-05-21T12:46:17.092306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85zTL38L9QMIYuPM"], "accumulated_threat_level": 12.1, "timewindow": 32} +{"Format": "Json", "ID": "a0e22c93-bf51-4a8b-8cf5-a2603770db35", "DetectTime": "2024-05-21T12:46:17.092282+00:00", "EventTime": "2024-05-21T12:46:17.092306+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "1970-01-02T07:28:54.619533+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 32. (real time 2024/05/21 12:46:17.608767)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 32, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "a29f8b5b-52af-401e-8411-2833b9609ec3", "DetectTime": "2024-05-21T12:46:17.620498+00:00", "EventTime": "2024-05-21T12:46:17.620521+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedJjj4t8pSzoCUUMg"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "35efaa7c-930c-4683-bc5c-c18c06571141", "DetectTime": "2024-05-21T12:46:17.636902+00:00", "EventTime": "2024-05-21T12:46:17.636928+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedJjj4t8pSzoCUUMg"], "accumulated_threat_level": 0.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "a531d2ba-c616-42d8-805f-ccd821f601a4", "DetectTime": "2024-05-21T12:46:17.649424+00:00", "EventTime": "2024-05-21T12:46:17.649443+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3mpu2H4f5b0xT1Ph"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "e281d98d-3909-42ad-8372-e8af8e5df39c", "DetectTime": "2024-05-21T12:46:17.776722+00:00", "EventTime": "2024-05-21T12:46:17.776752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3mpu2H4f5b0xT1Ph"], "accumulated_threat_level": 1.0, "timewindow": 32} +{"Format": "IDEA0", "ID": "e9452fbe-d6db-4230-bd64-b43f7a245552", "DetectTime": "2024-05-21T12:46:17.790303+00:00", "EventTime": "2024-05-21T12:46:17.790324+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdgUU43FFF6t9z0zb5"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "92ffe4c5-f3f9-4add-ac8b-4350e165cf17", "DetectTime": "2024-05-21T12:46:17.802895+00:00", "EventTime": "2024-05-21T12:46:17.802914+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdgUU43FFF6t9z0zb5"], "accumulated_threat_level": 1.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "b42eff19-4884-479d-8b6b-5981eb8551e1", "DetectTime": "2024-05-21T12:46:17.814815+00:00", "EventTime": "2024-05-21T12:46:17.814840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs21q3RqbTkBcUd01"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "f8456410-118f-45a5-bb99-83e88a388233", "DetectTime": "2024-05-21T12:46:17.828176+00:00", "EventTime": "2024-05-21T12:46:17.828194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs21q3RqbTkBcUd01"], "accumulated_threat_level": 2.0, "timewindow": 32} +{"Format": "IDEA0", "ID": "86ce316d-b3b0-43ee-9dd7-b875d7965ee9", "DetectTime": "2024-05-21T12:46:17.839465+00:00", "EventTime": "2024-05-21T12:46:17.839483+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.170.98.24"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.170.98.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBY4y1u0x8qXkyJni"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "261990f3-90f6-4c93-b5d2-6a39b949e474", "DetectTime": "2024-05-21T12:46:17.852227+00:00", "EventTime": "2024-05-21T12:46:17.852247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.170.98.24"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.170.98.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBY4y1u0x8qXkyJni"], "accumulated_threat_level": 2.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "365f79b4-7ae5-46e5-a050-a15ed0e762fc", "DetectTime": "2024-05-21T12:46:17.863697+00:00", "EventTime": "2024-05-21T12:46:17.863716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVCpk42YZIYd0ZyFN"], "accumulated_threat_level": 7.999999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "5e0c6037-dc7c-4d1a-b4c9-28735d888619", "DetectTime": "2024-05-21T12:46:17.868614+00:00", "EventTime": "2024-05-21T12:46:17.868632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqHKPn5p7DRbqP9l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "068f8c1f-3266-4220-b593-0525e69041b7", "DetectTime": "2024-05-21T12:46:17.873034+00:00", "EventTime": "2024-05-21T12:46:17.873052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxrIrPVrzRpfE4zm4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "259693a5-d357-4f52-a183-57dcdda3f457", "DetectTime": "2024-05-21T12:46:17.877511+00:00", "EventTime": "2024-05-21T12:46:17.877529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCG6lH3CUtgGzQWRB6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "655c7ba7-c6fa-420f-830a-942adab39fb2", "DetectTime": "2024-05-21T12:46:17.882438+00:00", "EventTime": "2024-05-21T12:46:17.882458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaozCk1rkDnYGS6Hei"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "46df9071-afa4-4527-b703-6e4452f91f25", "DetectTime": "2024-05-21T12:46:17.887274+00:00", "EventTime": "2024-05-21T12:46:17.887292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPaIu18IMWNOyF2i4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "24a7d89c-e71f-4a4f-91f3-f9c8d149fd8a", "DetectTime": "2024-05-21T12:46:17.892457+00:00", "EventTime": "2024-05-21T12:46:17.892477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cstm194WnwE6t9kq7g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "fc494cc9-2b55-486c-93b5-a147db88efc4", "DetectTime": "2024-05-21T12:46:17.897543+00:00", "EventTime": "2024-05-21T12:46:17.897567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtkfD3awqFhM0uKf2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "f785266c-eb5f-4f97-adfb-a8e3628823c3", "DetectTime": "2024-05-21T12:46:17.911889+00:00", "EventTime": "2024-05-21T12:46:17.911907+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyFsY3Vyy9IKvyNJ7"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "9e7e0c62-a472-4d5b-a5a8-93f3b343137f", "DetectTime": "2024-05-21T12:46:17.924904+00:00", "EventTime": "2024-05-21T12:46:17.924923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyFsY3Vyy9IKvyNJ7"], "accumulated_threat_level": 3.0, "timewindow": 32} +{"Format": "IDEA0", "ID": "93e00ec4-4881-4946-92f1-5a8c7ebaa1c6", "DetectTime": "2024-05-21T12:46:17.936154+00:00", "EventTime": "2024-05-21T12:46:17.936172+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["112.134.193.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.134.193.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjZLxb4MhOWDIJVnIh"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "78727a23-ea1f-4dd6-b5b9-ae6757f09d88", "DetectTime": "2024-05-21T12:46:17.947562+00:00", "EventTime": "2024-05-21T12:46:17.947582+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["112.134.193.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.134.193.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjZLxb4MhOWDIJVnIh"], "accumulated_threat_level": 3.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "e363cdcc-eeba-444d-a5a5-d01199db81a1", "DetectTime": "2024-05-21T12:46:18.005463+00:00", "EventTime": "2024-05-21T12:46:18.005486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9stWr153hSBo2gXIj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "b9f61380-89ab-4f8c-a940-8631382206da", "DetectTime": "2024-05-21T12:46:18.052059+00:00", "EventTime": "2024-05-21T12:46:18.052080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8pDC3Q2oRZTNceb6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "af110630-2c9a-4251-86f2-dd03de6ce7bc", "DetectTime": "2024-05-21T12:46:18.075206+00:00", "EventTime": "2024-05-21T12:46:18.075225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJxttTGIqFPnxDMq3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "692bbf3a-ffb7-4409-97d0-2af2ea9879d2", "DetectTime": "2024-05-21T12:46:18.174247+00:00", "EventTime": "2024-05-21T12:46:18.174268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXC78c4x4aKa0mela3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "454d79a8-7ece-4046-9aba-69cb32044c3f", "DetectTime": "2024-05-21T12:46:18.187126+00:00", "EventTime": "2024-05-21T12:46:18.187147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDqMX2wDaLBGYl20e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "bf946bf9-5859-4418-a863-b803dca1806d", "DetectTime": "2024-05-21T12:46:18.202887+00:00", "EventTime": "2024-05-21T12:46:18.202905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0SuD2xRnU0s1eUZi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "83379e72-9d20-4ec6-814e-050c1138fb50", "DetectTime": "2024-05-21T12:46:18.210156+00:00", "EventTime": "2024-05-21T12:46:18.210176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5kJPo3u5cOLoJWrPa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "c8be0185-43f2-4828-9358-41c0ee2a1130", "DetectTime": "2024-05-21T12:46:18.216674+00:00", "EventTime": "2024-05-21T12:46:18.216693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ytuF4DC7m05LJpw7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "f9a3091a-9e55-4ad5-9831-4fdfb253a70a", "DetectTime": "2024-05-21T12:46:18.222920+00:00", "EventTime": "2024-05-21T12:46:18.222939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChV0Wa29OotUd8vzD2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "37d86aca-7c49-42ba-bd81-43a7f86e5872", "DetectTime": "2024-05-21T12:46:18.227751+00:00", "EventTime": "2024-05-21T12:46:18.227770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSLwTU34lcJb59L4sl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "21a8c1ff-0995-4b71-b81c-ca35555f4c18", "DetectTime": "2024-05-21T12:46:18.666674+00:00", "EventTime": "2024-05-21T12:46:18.666696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqJqeb3WVcNpiFhzoe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "13205f3b-40c2-463e-a1da-ef52a4abb627", "DetectTime": "2024-05-21T12:46:18.678888+00:00", "EventTime": "2024-05-21T12:46:18.678907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYcav2dUHeQZgXvq3"], "accumulated_threat_level": 9.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "af00cb50-cf7e-4f96-84bf-854300142c83", "DetectTime": "2024-05-21T12:46:18.697993+00:00", "EventTime": "2024-05-21T12:46:18.698016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ujqJ13ntehJCnhml"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "b3299af5-f1a7-467f-8f5c-f8043c7504b8", "DetectTime": "2024-05-21T12:46:18.945587+00:00", "EventTime": "2024-05-21T12:46:18.945609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF3om3bwkddRA3Eul"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "bcdd2412-8b1a-4eed-9830-aef14468dfd9", "DetectTime": "2024-05-21T12:46:18.965550+00:00", "EventTime": "2024-05-21T12:46:18.965569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5yPQy1h3996R3cA04"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "733567ee-4b60-4163-83f8-b24aff52de80", "DetectTime": "2024-05-21T12:46:18.974983+00:00", "EventTime": "2024-05-21T12:46:18.975002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKXfxl3Kme17dn8iPh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "596581be-6bf4-47c9-8c79-4b4de57454cb", "DetectTime": "2024-05-21T12:46:18.981418+00:00", "EventTime": "2024-05-21T12:46:18.981437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxplhY1m93KTcNL8sc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "1ba725cb-6cb2-4227-a5f7-b8fba860c02f", "DetectTime": "2024-05-21T12:46:19.028005+00:00", "EventTime": "2024-05-21T12:46:19.028025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn4YBF3sO8WxfCOBf7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "83dc4d81-4067-4911-9612-93c5a19ea22a", "DetectTime": "2024-05-21T12:46:19.346311+00:00", "EventTime": "2024-05-21T12:46:19.346331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbsrn37COVW1a8vSc"], "accumulated_threat_level": 10.4, "timewindow": 147} +{"Format": "IDEA0", "ID": "4d4ccd63-49e5-4cf1-b0ba-e01b673d34c3", "DetectTime": "2024-05-21T12:46:19.351648+00:00", "EventTime": "2024-05-21T12:46:19.351667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CynXwx4K5u9kBaQFb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "6045bfbb-ce93-4d72-9321-3e69ac25fee8", "DetectTime": "2024-05-21T12:46:19.356784+00:00", "EventTime": "2024-05-21T12:46:19.356809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9Vlj3WWrA6To9G0f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "c690ff02-a78b-4206-8798-65a041bc9d72", "DetectTime": "2024-05-21T12:46:19.364114+00:00", "EventTime": "2024-05-21T12:46:19.364134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJacV1P3s6xn4LqGb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "0548aafc-7389-4423-9401-4b4125f08805", "DetectTime": "2024-05-21T12:46:19.369435+00:00", "EventTime": "2024-05-21T12:46:19.369454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJWKJQ2S5YGhIaCiG3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "87d37906-b4e7-40cb-bf35-94cd759977cb", "DetectTime": "2024-05-21T12:46:19.374016+00:00", "EventTime": "2024-05-21T12:46:19.374034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7eFd3SBG9itLq09d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "f24d7040-4c9e-447d-af42-3070e4edf3fb", "DetectTime": "2024-05-21T12:46:19.378383+00:00", "EventTime": "2024-05-21T12:46:19.378401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHYiL2D4rXX26itrg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "d19b7ccd-814c-4b21-b111-59643ed7b3a3", "DetectTime": "2024-05-21T12:46:19.908751+00:00", "EventTime": "2024-05-21T12:46:19.908774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CujVS3takmziGBIvl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 145} +{"Format": "IDEA0", "ID": "fa01a67a-440d-4927-b291-9411f17d35da", "DetectTime": "2024-05-21T12:46:19.921588+00:00", "EventTime": "2024-05-21T12:46:19.921611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoTJAm45xL9bMnwcfk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "393bff94-df3e-4f76-9690-ecd93ad5f77e", "DetectTime": "2024-05-21T12:46:19.927687+00:00", "EventTime": "2024-05-21T12:46:19.927706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCNxW3PPmVSTvuRmh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "0830c214-c5e9-4b7c-b324-b695580bfaf8", "DetectTime": "2024-05-21T12:46:20.173078+00:00", "EventTime": "2024-05-21T12:46:20.173113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiEyy723juTvJXGMHd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "2b3db988-41f6-43a6-9a11-6d340af51a29", "DetectTime": "2024-05-21T12:46:20.209474+00:00", "EventTime": "2024-05-21T12:46:20.209492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSPfT1KF4UpZHPJIh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 147} +{"Format": "IDEA0", "ID": "4f1a80cf-1fa5-45db-9f94-e88e56555cbe", "DetectTime": "2024-05-21T12:46:20.214449+00:00", "EventTime": "2024-05-21T12:46:20.214465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLE7dP2RoYcWs87DQ6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "59e8731e-f20d-42df-958a-a3e0767ffa5d", "DetectTime": "2024-05-21T12:46:20.219185+00:00", "EventTime": "2024-05-21T12:46:20.219203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjpZD33rQvJnt5D2a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "feab6f9a-3b6a-4a85-8b21-b346cff2de6d", "DetectTime": "2024-05-21T12:46:20.223826+00:00", "EventTime": "2024-05-21T12:46:20.223843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxpxTPQdZXV3mnX0l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "bf5e546e-37c7-4966-88bb-3735ef2a4a48", "DetectTime": "2024-05-21T12:46:20.229461+00:00", "EventTime": "2024-05-21T12:46:20.229479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5yUdW2x1ixRm9ohIi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "f949cefa-9738-4c66-a50c-dfbbc591de6f", "DetectTime": "2024-05-21T12:46:20.415321+00:00", "EventTime": "2024-05-21T12:46:20.415340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr6IEp3ddGKjYtbfxc", "CQHuc3Npk9we7m7hc", "C27u4nMOwedkroUAj", "C1rNfl1XO2HzfdFpyf"], "accumulated_threat_level": 0.5, "timewindow": 153} +{"Format": "IDEA0", "ID": "8ae403fc-4e4a-4d27-9288-3fe5e10f15b1", "DetectTime": "2024-05-21T12:46:20.804408+00:00", "EventTime": "2024-05-21T12:46:20.804429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci71Sh2ukRr0G8Dmq2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "435ba08d-2cc5-42e5-b421-816c0ff375a4", "DetectTime": "2024-05-21T12:46:20.826139+00:00", "EventTime": "2024-05-21T12:46:20.826160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1oAdb3Pjawt5UJUc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "80a999cb-a9d3-480d-93ac-ae694f22227c", "DetectTime": "2024-05-21T12:46:20.831772+00:00", "EventTime": "2024-05-21T12:46:20.831793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3EV4C1KEQCBqaiE7k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "34264805-f05f-4893-8366-8497100b3961", "DetectTime": "2024-05-21T12:46:20.836417+00:00", "EventTime": "2024-05-21T12:46:20.836435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56G3YIQHaB8uZ7nl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "952de835-24c5-490b-81b8-eaa12da09eec", "DetectTime": "2024-05-21T12:46:20.874801+00:00", "EventTime": "2024-05-21T12:46:20.874835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQWNYs4ASxHOrOQ113"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "e898dfe0-fb0b-403b-bd88-61bdee5a2d40", "DetectTime": "2024-05-21T12:46:20.882503+00:00", "EventTime": "2024-05-21T12:46:20.882525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CECFPj3Xn3Mb1aVLUg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "54b341a6-b1a9-4757-a445-308b0612c0d5", "DetectTime": "2024-05-21T12:46:20.920114+00:00", "EventTime": "2024-05-21T12:46:20.920135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXw1LI1ub2fnYy52P6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "da36f2c7-d9d4-45a8-b814-b2b85950c341", "DetectTime": "2024-05-21T12:46:20.956044+00:00", "EventTime": "2024-05-21T12:46:20.956065+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdxytp2ksLS1VnZMLd"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "19028955-d2a1-46f2-a633-644cc0cb35b6", "DetectTime": "2024-05-21T12:46:20.969701+00:00", "EventTime": "2024-05-21T12:46:20.969722+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdxytp2ksLS1VnZMLd"], "accumulated_threat_level": 4.0, "timewindow": 32} +{"Format": "IDEA0", "ID": "c31dd1aa-1d3b-4cc1-94a4-4a22574fe37f", "DetectTime": "2024-05-21T12:46:20.974525+00:00", "EventTime": "2024-05-21T12:46:20.974543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYhIm3gwzFHbUEdA"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "5b139adb-d9b2-4fa9-8155-c5b00b702268", "DetectTime": "2024-05-21T12:46:21.001571+00:00", "EventTime": "2024-05-21T12:46:21.001590+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7NXk2yZFOlqHZmh3"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "7889f18f-b2a8-4e3e-b8dc-d5d97c918d3c", "DetectTime": "2024-05-21T12:46:21.013221+00:00", "EventTime": "2024-05-21T12:46:21.013239+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl7NXk2yZFOlqHZmh3"], "accumulated_threat_level": 4.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "8cd32fd1-0b48-4cdf-862a-d03a5c782f93", "DetectTime": "2024-05-21T12:46:21.046152+00:00", "EventTime": "2024-05-21T12:46:21.046182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWsQ9fLC1SRKNsm81"], "accumulated_threat_level": 12.000000000000002, "timewindow": 147} +{"Format": "Json", "ID": "8cd32fd1-0b48-4cdf-862a-d03a5c782f93", "DetectTime": "2024-05-21T12:46:21.046152+00:00", "EventTime": "2024-05-21T12:46:21.046182+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-07T02:18:53.177905+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2024/05/21 12:46:21.216950)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 147, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3bd4e759-94fc-46dd-9159-6d3f001495ec", "DetectTime": "2024-05-21T12:46:21.221853+00:00", "EventTime": "2024-05-21T12:46:21.221871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycniA4payk84OyA69"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "8473f5e2-d9af-4eac-808e-83726dba0fb8", "DetectTime": "2024-05-21T12:46:21.234638+00:00", "EventTime": "2024-05-21T12:46:21.234657+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5NRs4ZrIbXughys1"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "efb18b79-4f66-4324-a64a-25e41da103b2", "DetectTime": "2024-05-21T12:46:21.247135+00:00", "EventTime": "2024-05-21T12:46:21.247154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5NRs4ZrIbXughys1"], "accumulated_threat_level": 5.0, "timewindow": 32} +{"Format": "IDEA0", "ID": "0a07be6f-6e1b-42af-90bc-ff3f76c1f95d", "DetectTime": "2024-05-21T12:46:21.313365+00:00", "EventTime": "2024-05-21T12:46:21.313384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TMfE4xKG9PRH1rKc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "f3168aa3-7aca-4b57-abe7-bf97d9fc29dd", "DetectTime": "2024-05-21T12:46:21.528363+00:00", "EventTime": "2024-05-21T12:46:21.528386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvl8fj34M3oFfycgIa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "1d2b8642-31fc-46c8-9f2f-58ee921f423f", "DetectTime": "2024-05-21T12:46:21.542764+00:00", "EventTime": "2024-05-21T12:46:21.542786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW2ix1DhWMytaGqP1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "ddd0fd13-4e9b-421e-871d-8d012b5344db", "DetectTime": "2024-05-21T12:46:21.830021+00:00", "EventTime": "2024-05-21T12:46:21.830042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2GzXKHlYuV0PaYij"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "e4e8377a-a103-45c3-878c-57b81d77fe2e", "DetectTime": "2024-05-21T12:46:21.877105+00:00", "EventTime": "2024-05-21T12:46:21.877131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtwmCq1ROjOE8G9Sy7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "2bf620e9-49dd-41c7-9df3-632832ad1d5f", "DetectTime": "2024-05-21T12:46:21.883998+00:00", "EventTime": "2024-05-21T12:46:21.884017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwBIF4pC28Fbkh3Zj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "33247d1a-2ddb-4d36-81e1-38c31b00da30", "DetectTime": "2024-05-21T12:46:21.896170+00:00", "EventTime": "2024-05-21T12:46:21.896190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxzzA2OhEATIVJY9a"], "accumulated_threat_level": 0.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "777daffc-0788-4bb4-8a5b-bcb88c1327f1", "DetectTime": "2024-05-21T12:46:21.922111+00:00", "EventTime": "2024-05-21T12:46:21.922133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8a1wM2aDDtcxTTakd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "6ccefea7-3ddd-4666-9ba8-e900e390cd3b", "DetectTime": "2024-05-21T12:46:21.982856+00:00", "EventTime": "2024-05-21T12:46:21.982878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6xfW3EAxxP9hrEzd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "bc5bed2a-5362-4405-af88-3854d8e8d2b8", "DetectTime": "2024-05-21T12:46:22.006758+00:00", "EventTime": "2024-05-21T12:46:22.006779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA2Lqt3dslWQF3d5mi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "efcf5bdc-06c1-4848-9103-81b2cb7451e4", "DetectTime": "2024-05-21T12:46:22.425015+00:00", "EventTime": "2024-05-21T12:46:22.425038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct2RSj1inV3VgsyBf6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "e501b343-0b7c-492f-a49d-f2c2525064e5", "DetectTime": "2024-05-21T12:46:22.440141+00:00", "EventTime": "2024-05-21T12:46:22.440163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCZshj4IsHOFTPAko"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "143614f5-a962-4e45-a4ef-1f25013c0d5e", "DetectTime": "2024-05-21T12:46:22.463877+00:00", "EventTime": "2024-05-21T12:46:22.463895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGXyK2KWhKtqn1aKd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "3d61c779-f9ce-4522-9ffb-e5d7dd66fd3c", "DetectTime": "2024-05-21T12:46:22.470525+00:00", "EventTime": "2024-05-21T12:46:22.470544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyu764CdhIZzIlix8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "4caf7cd1-e664-421f-8ee1-24151a398dcc", "DetectTime": "2024-05-21T12:46:22.482596+00:00", "EventTime": "2024-05-21T12:46:22.482615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QXW9pc6o2HgTvK1"], "accumulated_threat_level": 1.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "d8152d9a-156a-4890-9f28-ff5e3cd7527c", "DetectTime": "2024-05-21T12:46:22.503572+00:00", "EventTime": "2024-05-21T12:46:22.503593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDQdxr2ea0yIykVQu2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "c2670be6-10c9-43f5-9b44-053da3c351c4", "DetectTime": "2024-05-21T12:46:22.541459+00:00", "EventTime": "2024-05-21T12:46:22.541487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDk2l2TT9EQRtoS13"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "07315d20-f816-4a9e-ad86-55365a0beca2", "DetectTime": "2024-05-21T12:46:22.546692+00:00", "EventTime": "2024-05-21T12:46:22.546710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2rVEb3oaxWhAQWsC5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "2c7fe3f4-7578-4ca7-960b-72f72344b805", "DetectTime": "2024-05-21T12:46:22.572856+00:00", "EventTime": "2024-05-21T12:46:22.572877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxoR9x1yZnnmiTOijk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "bbf2cda6-7cbb-4cd3-8c1a-5a2345a10a99", "DetectTime": "2024-05-21T12:46:23.129581+00:00", "EventTime": "2024-05-21T12:46:23.129601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6XZm6xJ1a28l2Rh2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "526d2f4f-7119-48ab-8efc-e0a963d80bca", "DetectTime": "2024-05-21T12:46:23.137861+00:00", "EventTime": "2024-05-21T12:46:23.137886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx108d3Zjh07KjB3df"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "8d77a970-a99c-4ff1-9c74-feed8411f988", "DetectTime": "2024-05-21T12:46:23.153079+00:00", "EventTime": "2024-05-21T12:46:23.153101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCwHH1t2wowmuDxv4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "a141e880-88fe-4107-a8a5-70889a42bf96", "DetectTime": "2024-05-21T12:46:23.158195+00:00", "EventTime": "2024-05-21T12:46:23.158215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0wd7A3jGujJ2coSM1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "9ae36f20-2fb4-4ce1-8c38-81f5c78d5134", "DetectTime": "2024-05-21T12:46:23.182557+00:00", "EventTime": "2024-05-21T12:46:23.182582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIJRp2BDFEEAkVgz1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 147} +{"Format": "IDEA0", "ID": "30d6b9f8-fc60-446a-94c8-a49f3f885913", "DetectTime": "2024-05-21T12:46:23.193397+00:00", "EventTime": "2024-05-21T12:46:23.193419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C40KVj494Dvhjr2Ykb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "d8df25fa-adce-4bbc-80ba-a6661198e4b3", "DetectTime": "2024-05-21T12:46:23.201113+00:00", "EventTime": "2024-05-21T12:46:23.201133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJ7Yn1LCo7AGWCzl7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "d73cca16-f3aa-4074-9979-b3edadd70999", "DetectTime": "2024-05-21T12:46:23.258435+00:00", "EventTime": "2024-05-21T12:46:23.258457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CESQChZOKjCahKPca"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "f5735790-122f-46b4-b867-7a97752e0f96", "DetectTime": "2024-05-21T12:46:23.289268+00:00", "EventTime": "2024-05-21T12:46:23.289290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwsoSO63RYWgT41Fh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "994907c6-cbaa-4cc9-a82b-ae49caaa80d3", "DetectTime": "2024-05-21T12:46:23.699102+00:00", "EventTime": "2024-05-21T12:46:23.699125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjt6eK2YrPBhDZwuk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "917a7e2a-a45e-4dc3-ae8f-34a2ca4f0caa", "DetectTime": "2024-05-21T12:46:23.742075+00:00", "EventTime": "2024-05-21T12:46:23.742096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDBp3j4PLmwRcw2L9j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "a2d972b2-0ee4-4e95-b8a1-310af6b5eb67", "DetectTime": "2024-05-21T12:46:23.791205+00:00", "EventTime": "2024-05-21T12:46:23.791225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCXRm3YVg95HgvDG7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "d9c71cd5-39ad-4f13-9984-241e99cbc830", "DetectTime": "2024-05-21T12:46:23.831337+00:00", "EventTime": "2024-05-21T12:46:23.831365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBfzK1qfwo7qskwc2"], "accumulated_threat_level": 3.2, "timewindow": 147} +{"Format": "IDEA0", "ID": "b6877cc6-0f84-47ec-90ca-d2b8fc5298ea", "DetectTime": "2024-05-21T12:46:23.838843+00:00", "EventTime": "2024-05-21T12:46:23.838863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfyejh17Wcbretywf3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "4698d0c2-7025-4ae1-8a3f-15d19094a267", "DetectTime": "2024-05-21T12:46:24.179368+00:00", "EventTime": "2024-05-21T12:46:24.179390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAC8I3qDOOLzOjLO"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "ddbcd8d4-fae1-4dad-80b6-9b38e61329e0", "DetectTime": "2024-05-21T12:46:24.228569+00:00", "EventTime": "2024-05-21T12:46:24.228590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5RA93SQaRd8DSSIg"], "accumulated_threat_level": 4.0, "timewindow": 147} +{"Format": "IDEA0", "ID": "45db2d67-d05c-459c-8d29-8b0f515abafe", "DetectTime": "2024-05-21T12:46:24.268872+00:00", "EventTime": "2024-05-21T12:46:24.268893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVz9mh4igLX5mtaeo1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "8355250b-fb02-4e4f-87a7-c66134224afc", "DetectTime": "2024-05-21T12:46:24.315509+00:00", "EventTime": "2024-05-21T12:46:24.315530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCbGV3MD3JSknPA4l"], "accumulated_threat_level": 4.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "598727cc-a755-43cf-94d8-c0ea7c05f6dc", "DetectTime": "2024-05-21T12:46:24.353595+00:00", "EventTime": "2024-05-21T12:46:24.353616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSlln18LrSBwZBDBh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "37c07071-08b8-4572-8260-b9762f161b2a", "DetectTime": "2024-05-21T12:46:24.394223+00:00", "EventTime": "2024-05-21T12:46:24.394242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBRyq2DyJjMwaAdc1"], "accumulated_threat_level": 5.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "b35031d9-015e-45a9-ba92-48490a8c2318", "DetectTime": "2024-05-21T12:46:24.439806+00:00", "EventTime": "2024-05-21T12:46:24.439826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu7w5K3ucsmMt1OXxl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "ef9c1e69-cac5-45dc-9f09-c12488e2610f", "DetectTime": "2024-05-21T12:46:24.692791+00:00", "EventTime": "2024-05-21T12:46:24.692811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChulnW1Q7Kok2LrxF7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "5b806915-589b-4540-bfde-66bae9d325dd", "DetectTime": "2024-05-21T12:46:24.735273+00:00", "EventTime": "2024-05-21T12:46:24.735293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZO9Ta4Ztz44GVIja9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "62eb6848-622b-445f-a494-595ef58e1d8d", "DetectTime": "2024-05-21T12:46:24.788469+00:00", "EventTime": "2024-05-21T12:46:24.788490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4K142SiArlxJRWY4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "ca6a47ba-ec33-4f74-a95f-629240bd910f", "DetectTime": "2024-05-21T12:46:24.842720+00:00", "EventTime": "2024-05-21T12:46:24.842739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLP2D1N3rfuI1SYbi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "6238f805-d181-4250-94d5-a71cb574c707", "DetectTime": "2024-05-21T12:46:24.902109+00:00", "EventTime": "2024-05-21T12:46:24.902138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPsZm1kJBFiaT8xAc"], "accumulated_threat_level": 9.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "ee4d2539-088b-48df-a799-dac65e7f3023", "DetectTime": "2024-05-21T12:46:24.962356+00:00", "EventTime": "2024-05-21T12:46:24.962377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduSNDcWBYLLi1hXa", "CUQAn93z1BNNyVIcha", "CPEaPYRRt8VJNNNVg", "CP4olm2fHeotxbswFh"], "accumulated_threat_level": 1.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "8a0ab4f3-cfa1-4ee1-a9ac-d8837cdee9d7", "DetectTime": "2024-05-21T12:46:25.027794+00:00", "EventTime": "2024-05-21T12:46:25.027829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMtzVBoQvWGl9jNng"], "accumulated_threat_level": 10.4, "timewindow": 147} +{"Format": "IDEA0", "ID": "485faec1-be5a-4b46-91e5-b49d46c61b7f", "DetectTime": "2024-05-21T12:46:25.069559+00:00", "EventTime": "2024-05-21T12:46:25.069577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKn122YlsGj9cTuR5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 147} +{"Format": "IDEA0", "ID": "07dd9506-1747-4c30-81f7-f87788f31702", "DetectTime": "2024-05-21T12:46:25.121168+00:00", "EventTime": "2024-05-21T12:46:25.121187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuHey1uaOd4X4RpI2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 147} +{"Format": "Json", "ID": "07dd9506-1747-4c30-81f7-f87788f31702", "DetectTime": "2024-05-21T12:46:25.121168+00:00", "EventTime": "2024-05-21T12:46:25.121187+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "1970-01-07T02:49:16.842691+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2024/05/21 12:46:25.293775)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 147, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "29577f86-fb1e-4b25-be1b-04f97999e05d", "DetectTime": "2024-05-21T12:46:25.404420+00:00", "EventTime": "2024-05-21T12:46:25.404442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzITdk1vroxHWOJ3K7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "e7b07d6f-27dc-4219-89dd-1b4eca2bab26", "DetectTime": "2024-05-21T12:46:25.452335+00:00", "EventTime": "2024-05-21T12:46:25.452355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIA2Ki1Kus4jHwZNp"], "accumulated_threat_level": 0.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "c6af21a3-154a-4ee2-bb78-6e6c6c62b00f", "DetectTime": "2024-05-21T12:46:25.499296+00:00", "EventTime": "2024-05-21T12:46:25.499320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvkfIH1As2fmAJEQ78"], "accumulated_threat_level": 1.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "9bac5abe-a856-4343-9454-951706ed6df1", "DetectTime": "2024-05-21T12:46:25.548976+00:00", "EventTime": "2024-05-21T12:46:25.548997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyil4l1iXyEnnO5clf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 147} +{"Format": "IDEA0", "ID": "1e65b3d8-2ade-401a-abed-ce0113d3becf", "DetectTime": "2024-05-21T12:46:25.615435+00:00", "EventTime": "2024-05-21T12:46:25.615484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALAPLlDDoUnMEUYf"], "accumulated_threat_level": 3.2, "timewindow": 147} +{"Format": "IDEA0", "ID": "7b02b38b-50e0-4b53-b7c6-114d81acf2fc", "DetectTime": "2024-05-21T12:46:25.661160+00:00", "EventTime": "2024-05-21T12:46:25.661179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJwWjVtNNGB24MJ4"], "accumulated_threat_level": 4.0, "timewindow": 147} +{"Format": "IDEA0", "ID": "eb55e72e-a6b7-4572-bcf0-8a34f3b2fefe", "DetectTime": "2024-05-21T12:46:25.712014+00:00", "EventTime": "2024-05-21T12:46:25.712033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDugjK1hhaaPWDer4c"], "accumulated_threat_level": 4.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "d0b7635f-be6d-4c8d-afe8-32532e4e20ff", "DetectTime": "2024-05-21T12:46:25.958851+00:00", "EventTime": "2024-05-21T12:46:25.958875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQR0zA1v7trXGV5Z1a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "cbdf3464-912e-462a-89c3-4a2857c45cb3", "DetectTime": "2024-05-21T12:46:25.964333+00:00", "EventTime": "2024-05-21T12:46:25.964351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX0kK54iTevDXmCe1b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "77b7522e-314f-4ea7-913d-06f2055f253c", "DetectTime": "2024-05-21T12:46:25.975883+00:00", "EventTime": "2024-05-21T12:46:25.975902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIarn1ofUfaIN3omj"], "accumulated_threat_level": 5.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "bd006225-0ab3-4cd0-96f2-1d105ed6203d", "DetectTime": "2024-05-21T12:46:26.177719+00:00", "EventTime": "2024-05-21T12:46:26.177738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3btv2uJew9QvINc2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "f85900d6-a9cf-4182-9175-590bb8592d85", "DetectTime": "2024-05-21T12:46:26.203443+00:00", "EventTime": "2024-05-21T12:46:26.203463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxQAnb4tUE9gJcVbg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "aff95ea1-b5f4-487a-a5bc-0d7ea44d207e", "DetectTime": "2024-05-21T12:46:26.265582+00:00", "EventTime": "2024-05-21T12:46:26.265604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUcqbXZn3BGQeSK7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "5c8a87ff-10ed-405e-8679-54336d12fd53", "DetectTime": "2024-05-21T12:46:26.539953+00:00", "EventTime": "2024-05-21T12:46:26.539971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHxkM1KXUaQblAUrd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "9e18b37f-2035-4be5-b818-00f7f0720f89", "DetectTime": "2024-05-21T12:46:26.585152+00:00", "EventTime": "2024-05-21T12:46:26.585170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakF592tQxyVXww2O3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 147} +{"Format": "IDEA0", "ID": "2b4453bd-5ff9-41da-9eaa-5ccd78b68205", "DetectTime": "2024-05-21T12:46:26.611921+00:00", "EventTime": "2024-05-21T12:46:26.611944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTb1R2QIMu9T4nIQc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "babc5643-131f-4d3f-a1eb-a1fd8f1efd7a", "DetectTime": "2024-05-21T12:46:26.667510+00:00", "EventTime": "2024-05-21T12:46:26.667528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oFlr1MvJjpS4qxX6"], "accumulated_threat_level": 9.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "f0250fb2-9b59-41ab-845b-40ef77467994", "DetectTime": "2024-05-21T12:46:26.720008+00:00", "EventTime": "2024-05-21T12:46:26.720031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAN1Qu3GAZWw4ocGW6"], "accumulated_threat_level": 10.4, "timewindow": 147} +{"Format": "IDEA0", "ID": "359ef19d-ee97-4779-9aa9-e3c6956b4b9d", "DetectTime": "2024-05-21T12:46:26.769623+00:00", "EventTime": "2024-05-21T12:46:26.769643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4fB1G2N8VictMpkck"], "accumulated_threat_level": 11.200000000000001, "timewindow": 147} +{"Format": "IDEA0", "ID": "f2826a73-c4bb-42d3-a236-7fdf414df571", "DetectTime": "2024-05-21T12:46:26.815700+00:00", "EventTime": "2024-05-21T12:46:26.815719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CId8Bg1FjGOykWlLrl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 147} +{"Format": "Json", "ID": "f2826a73-c4bb-42d3-a236-7fdf414df571", "DetectTime": "2024-05-21T12:46:26.815700+00:00", "EventTime": "2024-05-21T12:46:26.815719+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "1970-01-07T02:49:37.184693+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 147. (real time 2024/05/21 12:46:27.020820)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 147, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "713104fc-9a32-47e6-a884-27084e0e8e34", "DetectTime": "2024-05-21T12:46:27.034596+00:00", "EventTime": "2024-05-21T12:46:27.034622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbW303I4eHuyM3K78"], "accumulated_threat_level": 0.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "81446285-5172-48ff-8102-233757dad956", "DetectTime": "2024-05-21T12:46:27.047775+00:00", "EventTime": "2024-05-21T12:46:27.047796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeIKqAF5xngLyNSfd"], "accumulated_threat_level": 1.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "ba590ab8-a319-4307-8cb0-193100231454", "DetectTime": "2024-05-21T12:46:27.181172+00:00", "EventTime": "2024-05-21T12:46:27.181194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLkQv2jD3E0j8pn38"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "ed9369b1-25be-4b84-a49f-d2afc7145b53", "DetectTime": "2024-05-21T12:46:27.230671+00:00", "EventTime": "2024-05-21T12:46:27.230692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPVKzB3tJU9eHtai92"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 147} +{"Format": "IDEA0", "ID": "435af71e-f22f-4a08-9d93-acf25798f301", "DetectTime": "2024-05-21T12:46:27.277726+00:00", "EventTime": "2024-05-21T12:46:27.277745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnevhi4WqXjj5N7Qn1"], "accumulated_threat_level": 3.2, "timewindow": 147} +{"Format": "IDEA0", "ID": "173c846a-177a-488c-a006-b9202cd6ee58", "DetectTime": "2024-05-21T12:46:27.326314+00:00", "EventTime": "2024-05-21T12:46:27.326333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutRlpTRmStxYAWla"], "accumulated_threat_level": 4.0, "timewindow": 147} +{"Format": "IDEA0", "ID": "caebf7fe-077f-4099-8545-746fe0884a8d", "DetectTime": "2024-05-21T12:46:27.371804+00:00", "EventTime": "2024-05-21T12:46:27.371825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7tafa1upy1FNx6la5"], "accumulated_threat_level": 4.8, "timewindow": 147} +{"Format": "IDEA0", "ID": "4029e847-d82a-4cdb-9ef3-206395b28f31", "DetectTime": "2024-05-21T12:46:27.417780+00:00", "EventTime": "2024-05-21T12:46:27.417801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6VxO3df2KuBkJK28"], "accumulated_threat_level": 5.6, "timewindow": 147} +{"Format": "IDEA0", "ID": "7ffff1ca-f928-4ac4-9c32-9826a69c0db1", "DetectTime": "2024-05-21T12:46:27.474930+00:00", "EventTime": "2024-05-21T12:46:27.474948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5j2Gh3wTZR4eklxC9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "10d599b7-3576-4f6d-a6a4-bf1559888bea", "DetectTime": "2024-05-21T12:46:27.638847+00:00", "EventTime": "2024-05-21T12:46:27.638865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHFQf73fe65a6gmeuf"], "accumulated_threat_level": 1.3, "timewindow": 148} +{"Format": "IDEA0", "ID": "9dda749a-cffb-4f9c-8429-305599fd3d5a", "DetectTime": "2024-05-21T12:46:28.008736+00:00", "EventTime": "2024-05-21T12:46:28.008758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2h0I14Xi14pqofn3"], "accumulated_threat_level": 2.1, "timewindow": 148} +{"Format": "IDEA0", "ID": "bc3c8f35-8b31-4632-9aca-ef7c73d89628", "DetectTime": "2024-05-21T12:46:28.034367+00:00", "EventTime": "2024-05-21T12:46:28.034390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgGtno44sIfEMpIr27"], "accumulated_threat_level": 7.199999999999999, "timewindow": 146} +{"Format": "IDEA0", "ID": "525ed998-d959-4cf7-9c44-13bd100184d2", "DetectTime": "2024-05-21T12:46:28.093566+00:00", "EventTime": "2024-05-21T12:46:28.093589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQzbq1vQC2Cb25HQk"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 148} +{"Format": "IDEA0", "ID": "9ad6b793-f81e-4d69-864c-e8282a856f91", "DetectTime": "2024-05-21T12:46:28.143241+00:00", "EventTime": "2024-05-21T12:46:28.143261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoI1Eh4yp5HKPU8RJf"], "accumulated_threat_level": 3.7, "timewindow": 148} +{"Format": "IDEA0", "ID": "12546a78-0a10-4107-a21e-984fc6701a18", "DetectTime": "2024-05-21T12:46:28.198062+00:00", "EventTime": "2024-05-21T12:46:28.198080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD04l53V6EYoXRi4U7"], "accumulated_threat_level": 4.5, "timewindow": 148} +{"Format": "IDEA0", "ID": "992891ee-5931-4a08-9b5f-6c3eae251c68", "DetectTime": "2024-05-21T12:46:28.257877+00:00", "EventTime": "2024-05-21T12:46:28.257898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3yPm4vHN3HoLN9Ui"], "accumulated_threat_level": 5.3, "timewindow": 148} +{"Format": "IDEA0", "ID": "cb4abc34-2f67-4ea8-b204-653cac8ea341", "DetectTime": "2024-05-21T12:46:28.307390+00:00", "EventTime": "2024-05-21T12:46:28.307411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuyDpo1uVI4k0SZIZ6"], "accumulated_threat_level": 6.1, "timewindow": 148} +{"Format": "IDEA0", "ID": "00ea8909-b4a8-4f5c-9311-27164f373a3f", "DetectTime": "2024-05-21T12:46:28.357136+00:00", "EventTime": "2024-05-21T12:46:28.357154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pNpd1yoyjVOJRZJk"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 148} +{"Format": "IDEA0", "ID": "20410c71-6185-41c8-9567-4ec946b1fc7d", "DetectTime": "2024-05-21T12:46:28.643385+00:00", "EventTime": "2024-05-21T12:46:28.643408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3HDjw8YGdLdv1tE2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "657ab786-d5b1-4808-bcb9-a47d1e0df00e", "DetectTime": "2024-05-21T12:46:28.676382+00:00", "EventTime": "2024-05-21T12:46:28.676403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COV7VNyg1CX2dcGW8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "eda7ef83-cfb1-45ac-aef2-304a7c596c6f", "DetectTime": "2024-05-21T12:46:28.719142+00:00", "EventTime": "2024-05-21T12:46:28.719162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoqcg2jLNInccWQ0d"], "accumulated_threat_level": 7.699999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "5f5b1d4f-df99-4d22-87a3-fdae52293529", "DetectTime": "2024-05-21T12:46:28.768698+00:00", "EventTime": "2024-05-21T12:46:28.768720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3HHUpEwE93dMeT"], "accumulated_threat_level": 8.5, "timewindow": 148} +{"Format": "IDEA0", "ID": "e20f2701-db0b-4fcd-a8b6-5efe039b8011", "DetectTime": "2024-05-21T12:46:28.813567+00:00", "EventTime": "2024-05-21T12:46:28.813585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VI2aNGQljWfeljl"], "accumulated_threat_level": 9.3, "timewindow": 148} +{"Format": "IDEA0", "ID": "0e9a6979-6802-4164-8cad-16d633f9cd87", "DetectTime": "2024-05-21T12:46:28.866128+00:00", "EventTime": "2024-05-21T12:46:28.866150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWbvX25kSFURvNWQ3"], "accumulated_threat_level": 10.100000000000001, "timewindow": 148} +{"Format": "IDEA0", "ID": "f87fe83c-7465-4f22-9535-8f4498145a03", "DetectTime": "2024-05-21T12:46:28.922653+00:00", "EventTime": "2024-05-21T12:46:28.922671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYtLv3CFULfBzhq9g"], "accumulated_threat_level": 10.900000000000002, "timewindow": 148} +{"Format": "IDEA0", "ID": "bc2b3ca3-57db-4c5e-9a46-1072a264213b", "DetectTime": "2024-05-21T12:46:28.948450+00:00", "EventTime": "2024-05-21T12:46:28.948472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEL33e1JoIOy4BIQXc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "9445c2c9-8fd8-424e-b090-a2c2a6da02de", "DetectTime": "2024-05-21T12:46:29.217934+00:00", "EventTime": "2024-05-21T12:46:29.217957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HQ7l4L6yOirNJP5f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "1e71a7c8-d560-4857-8732-0f2a842a668b", "DetectTime": "2024-05-21T12:46:29.268522+00:00", "EventTime": "2024-05-21T12:46:29.268541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnexqd3Cy7MEOibbDb"], "accumulated_threat_level": 11.700000000000003, "timewindow": 148} +{"Format": "IDEA0", "ID": "ed272935-703f-4b13-8f5e-f718384fc930", "DetectTime": "2024-05-21T12:46:29.404348+00:00", "EventTime": "2024-05-21T12:46:29.404367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj19tx3O3mbogqQFLi"], "accumulated_threat_level": 12.500000000000004, "timewindow": 148} +{"Format": "Json", "ID": "ed272935-703f-4b13-8f5e-f718384fc930", "DetectTime": "2024-05-21T12:46:29.404348+00:00", "EventTime": "2024-05-21T12:46:29.404367+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-07T03:20:31.281089+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2024/05/21 12:46:29.619433)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 148, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "b798f62e-189d-4aef-a77e-fec35ad05bb2", "DetectTime": "2024-05-21T12:46:29.631260+00:00", "EventTime": "2024-05-21T12:46:29.631278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedGZFGjE0XmfjhOb"], "accumulated_threat_level": 0.8, "timewindow": 148} +{"Format": "IDEA0", "ID": "1319b052-567f-45f2-8682-e76b219fb5ca", "DetectTime": "2024-05-21T12:46:29.649553+00:00", "EventTime": "2024-05-21T12:46:29.649572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ivMI3hm9LR6PvQAe"], "accumulated_threat_level": 1.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "994ca46c-6218-41b5-aa9a-3b59467fc11b", "DetectTime": "2024-05-21T12:46:29.661000+00:00", "EventTime": "2024-05-21T12:46:29.661025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjXfkf2N62MiWqHrl4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 148} +{"Format": "IDEA0", "ID": "86aee40c-862b-45ae-b9d3-3b274148bcdf", "DetectTime": "2024-05-21T12:46:29.674724+00:00", "EventTime": "2024-05-21T12:46:29.674743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQt3qv3ePWKEU0oMW1"], "accumulated_threat_level": 3.2, "timewindow": 148} +{"Format": "IDEA0", "ID": "a1ae8f74-d174-43e3-b7e6-f9a7b7f59240", "DetectTime": "2024-05-21T12:46:29.679940+00:00", "EventTime": "2024-05-21T12:46:29.679958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDAkt3qaR168IFjx5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "8a084ecd-02d2-48ce-95c3-b34e53934ec9", "DetectTime": "2024-05-21T12:46:29.862086+00:00", "EventTime": "2024-05-21T12:46:29.862109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEndC1k4pWAFUaQJb", "Cr3eej4VQ2IyKZZcl7", "CexNzZ2HpXeBmfLt83", "CkyT653ecrdhBmpPw2"], "accumulated_threat_level": 1.5, "timewindow": 153} +{"Format": "IDEA0", "ID": "8dbf1f06-5a38-4da4-a491-f1f822da1553", "DetectTime": "2024-05-21T12:46:29.903330+00:00", "EventTime": "2024-05-21T12:46:29.903349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSzKWc4OsbA2pP6pda"], "accumulated_threat_level": 4.0, "timewindow": 148} +{"Format": "IDEA0", "ID": "612936ba-116b-4aa8-8edd-a87d51a96be1", "DetectTime": "2024-05-21T12:46:29.959454+00:00", "EventTime": "2024-05-21T12:46:29.959475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54J042NKLs3Ht2cR9"], "accumulated_threat_level": 4.8, "timewindow": 148} +{"Format": "IDEA0", "ID": "aeca95fc-69e5-4961-9aac-35addde5ea51", "DetectTime": "2024-05-21T12:46:30.009758+00:00", "EventTime": "2024-05-21T12:46:30.009782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVtZxPqV3UXynW9ri"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "5060d99b-1b3b-4fd2-9b70-e9299b1d5e80", "DetectTime": "2024-05-21T12:46:30.055933+00:00", "EventTime": "2024-05-21T12:46:30.055954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtf3Z3VFwNvrMcJ95"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 148} +{"Format": "IDEA0", "ID": "698ac4ed-3b78-468f-b5c8-905b84142c7b", "DetectTime": "2024-05-21T12:46:30.103717+00:00", "EventTime": "2024-05-21T12:46:30.103736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPTOvg8Vo1t4Eskk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "088d8caa-434a-463e-97bf-adc69ad42246", "DetectTime": "2024-05-21T12:46:30.148969+00:00", "EventTime": "2024-05-21T12:46:30.148989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnTTn4jp76VPj0kPd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "72cc4933-748c-4446-b3a1-3925a3831231", "DetectTime": "2024-05-21T12:46:30.196090+00:00", "EventTime": "2024-05-21T12:46:30.196111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwKWI1JEq0W8kn0kc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "51f55eae-70fe-41bd-84c8-d1c67077e316", "DetectTime": "2024-05-21T12:46:30.461891+00:00", "EventTime": "2024-05-21T12:46:30.461915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cutbw32c0vwzYQYp2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "0b7da31c-a0a5-4e2a-af89-eaf8a7cf41fd", "DetectTime": "2024-05-21T12:46:30.552446+00:00", "EventTime": "2024-05-21T12:46:30.552464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFkr02G2DwMKTgzqh"], "accumulated_threat_level": 9.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "f1da65fb-b238-471c-bb9d-e17e23a301cc", "DetectTime": "2024-05-21T12:46:30.603898+00:00", "EventTime": "2024-05-21T12:46:30.603932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHcDdsBDihlqVXf9"], "accumulated_threat_level": 10.4, "timewindow": 148} +{"Format": "IDEA0", "ID": "d4235ade-134e-4af4-90f8-95759357230e", "DetectTime": "2024-05-21T12:46:30.656043+00:00", "EventTime": "2024-05-21T12:46:30.656063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP0di5350hshe8PGOe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 148} +{"Format": "IDEA0", "ID": "13c571ba-05b8-457d-845c-6a86a4e7184c", "DetectTime": "2024-05-21T12:46:30.661673+00:00", "EventTime": "2024-05-21T12:46:30.661691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClAEvT2og4ZVtoRTV2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "301502fd-e992-405c-93bf-a8a3bf6b73b0", "DetectTime": "2024-05-21T12:46:30.761552+00:00", "EventTime": "2024-05-21T12:46:30.761575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwy13GfPvQayIsZN5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 148} +{"Format": "Json", "ID": "301502fd-e992-405c-93bf-a8a3bf6b73b0", "DetectTime": "2024-05-21T12:46:30.761552+00:00", "EventTime": "2024-05-21T12:46:30.761575+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "1970-01-07T03:51:04.024370+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2024/05/21 12:46:30.938318)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 148, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7e320a4f-d3d2-4ce8-91cf-0dabe16b88dd", "DetectTime": "2024-05-21T12:46:30.948644+00:00", "EventTime": "2024-05-21T12:46:30.948662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRncg3FPlFX1R2nyc"], "accumulated_threat_level": 0.8, "timewindow": 148} +{"Format": "IDEA0", "ID": "285ab12e-2cef-4b52-b879-61e5d543d77e", "DetectTime": "2024-05-21T12:46:30.960344+00:00", "EventTime": "2024-05-21T12:46:30.960362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduPJn2TJrREksREr1"], "accumulated_threat_level": 1.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "086370d3-b3c2-4fe4-a0c8-b12e9957e196", "DetectTime": "2024-05-21T12:46:30.965228+00:00", "EventTime": "2024-05-21T12:46:30.965246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFiEq2fQcCtJddkmg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "db44199f-27b4-45ab-ba9a-d96d3cb2f6d1", "DetectTime": "2024-05-21T12:46:31.162747+00:00", "EventTime": "2024-05-21T12:46:31.162766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7qrbX31tgyQ02urCf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 148} +{"Format": "IDEA0", "ID": "0c420110-221b-4ae9-98e3-22685a17cc77", "DetectTime": "2024-05-21T12:46:31.217892+00:00", "EventTime": "2024-05-21T12:46:31.217914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4uk14h64HPQPJLKc"], "accumulated_threat_level": 3.2, "timewindow": 148} +{"Format": "IDEA0", "ID": "641f1042-3f62-425e-ae4b-9bc78c3ca2f8", "DetectTime": "2024-05-21T12:46:31.272170+00:00", "EventTime": "2024-05-21T12:46:31.272190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEyab3Ie4zv9EdIW8"], "accumulated_threat_level": 4.0, "timewindow": 148} +{"Format": "IDEA0", "ID": "eb914cfa-7d13-4838-bca0-304e40b3a1f0", "DetectTime": "2024-05-21T12:46:31.321132+00:00", "EventTime": "2024-05-21T12:46:31.321150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGdnc2RGKPLlO88Rf"], "accumulated_threat_level": 4.8, "timewindow": 148} +{"Format": "IDEA0", "ID": "80767dd8-7ae1-48ad-a57c-47f5f09c1e12", "DetectTime": "2024-05-21T12:46:31.370996+00:00", "EventTime": "2024-05-21T12:46:31.371014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAk664VSw0dbVy7f"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "36b8b45d-86de-4d85-a7a7-d8b9296e72e2", "DetectTime": "2024-05-21T12:46:31.404776+00:00", "EventTime": "2024-05-21T12:46:31.404797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz89kOWbXxS23JYYh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "3bb67468-d377-4ff3-a146-631251bace5b", "DetectTime": "2024-05-21T12:46:31.449514+00:00", "EventTime": "2024-05-21T12:46:31.449534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilLEo1HwDijxK5T92"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 148} +{"Format": "IDEA0", "ID": "0c6c6af1-6785-40cf-bea8-23e0c8653cd4", "DetectTime": "2024-05-21T12:46:31.726033+00:00", "EventTime": "2024-05-21T12:46:31.726051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrvte4yUPd8kDsLk5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "9901c6b1-f39a-466f-9d94-0190ed1660f2", "DetectTime": "2024-05-21T12:46:31.766203+00:00", "EventTime": "2024-05-21T12:46:31.766221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBq2c3oZjOzoM2YPk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "9aec08d3-1765-4257-8ff4-f25fc15df8c7", "DetectTime": "2024-05-21T12:46:31.815231+00:00", "EventTime": "2024-05-21T12:46:31.815251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTGnZz1DBviLNkSba"], "accumulated_threat_level": 8.799999999999999, "timewindow": 148} +{"Format": "IDEA0", "ID": "7a253eab-d321-4af0-98cf-42261c37145e", "DetectTime": "2024-05-21T12:46:31.866181+00:00", "EventTime": "2024-05-21T12:46:31.866200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuowDH1rLcHKhMLNi"], "accumulated_threat_level": 9.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "a287d7f1-6d13-400a-a457-8c4a13baeaa7", "DetectTime": "2024-05-21T12:46:31.915613+00:00", "EventTime": "2024-05-21T12:46:31.915632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZifrbbxNu6DdhI06"], "accumulated_threat_level": 10.4, "timewindow": 148} +{"Format": "IDEA0", "ID": "e74888a5-8b7e-4753-823b-23eeebf99c28", "DetectTime": "2024-05-21T12:46:31.947610+00:00", "EventTime": "2024-05-21T12:46:31.947633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CenZecQIkvxBxp6fd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "94d88bec-f150-4d56-b459-098a36a4f68c", "DetectTime": "2024-05-21T12:46:31.996242+00:00", "EventTime": "2024-05-21T12:46:31.996261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBXx62nUS4vtF9Xea"], "accumulated_threat_level": 11.200000000000001, "timewindow": 148} +{"Format": "IDEA0", "ID": "66dc58e9-e123-4801-8aa7-1ce92a11b272", "DetectTime": "2024-05-21T12:46:32.277212+00:00", "EventTime": "2024-05-21T12:46:32.277233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKLoA3NiE6TDyqXFb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 148} +{"Format": "Json", "ID": "66dc58e9-e123-4801-8aa7-1ce92a11b272", "DetectTime": "2024-05-21T12:46:32.277212+00:00", "EventTime": "2024-05-21T12:46:32.277233+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "1970-01-07T03:51:07.967213+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 148. (real time 2024/05/21 12:46:32.465615)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 148, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9a8fab3d-2ad0-40a3-823a-b74c4a5171f4", "DetectTime": "2024-05-21T12:46:32.515778+00:00", "EventTime": "2024-05-21T12:46:32.515797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMvi5ZkUraAwlBWf"], "accumulated_threat_level": 0.8, "timewindow": 148} +{"Format": "IDEA0", "ID": "6fbfa3b6-ecbc-4d6a-aeed-85117107e19d", "DetectTime": "2024-05-21T12:46:32.529943+00:00", "EventTime": "2024-05-21T12:46:32.529965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CPSa1vswVp7UzHT7"], "accumulated_threat_level": 1.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "273a4fcf-c250-498d-89e8-7a2671ae58a8", "DetectTime": "2024-05-21T12:46:32.542066+00:00", "EventTime": "2024-05-21T12:46:32.542084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwU7D3yKbi83Niijd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 148} +{"Format": "IDEA0", "ID": "363dce10-c088-4c17-b14b-65851ef221fa", "DetectTime": "2024-05-21T12:46:32.547072+00:00", "EventTime": "2024-05-21T12:46:32.547090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVCpk42YZIYd0ZyFN"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "641ada16-6eed-476a-8d9e-f2f9fdca81a1", "DetectTime": "2024-05-21T12:46:32.566653+00:00", "EventTime": "2024-05-21T12:46:32.566671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9PCez13aFhZ6ZSpS9"], "accumulated_threat_level": 3.2, "timewindow": 148} +{"Format": "IDEA0", "ID": "30e43972-8f19-49df-a16d-0b2a5e0631f0", "DetectTime": "2024-05-21T12:46:32.616032+00:00", "EventTime": "2024-05-21T12:46:32.616053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxa8di2rGycDrqKlPh"], "accumulated_threat_level": 4.0, "timewindow": 148} +{"Format": "IDEA0", "ID": "d7d78ae8-6fab-4e7b-b7e7-72ed80870eea", "DetectTime": "2024-05-21T12:46:32.620639+00:00", "EventTime": "2024-05-21T12:46:32.620656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C80jC41RsdUMrxx4Ej", "C93M3pN4ZnymTk4da", "CEOv053WsmaKTFxXBc", "CeGxB13QeGRMd55ah"], "accumulated_threat_level": 2.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "1388d3be-9914-435a-82f4-4a0d9f84e93a", "DetectTime": "2024-05-21T12:46:32.665020+00:00", "EventTime": "2024-05-21T12:46:32.665039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbUzX2dUDhgkYqbZ3"], "accumulated_threat_level": 4.8, "timewindow": 148} +{"Format": "IDEA0", "ID": "a7a38b95-00df-4150-8513-52d0c245b46d", "DetectTime": "2024-05-21T12:46:32.717372+00:00", "EventTime": "2024-05-21T12:46:32.717392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOfPH1hKWoYD9Rusj"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "2b55ddbf-94a1-4252-a78a-98f81b4fe4b4", "DetectTime": "2024-05-21T12:46:33.123805+00:00", "EventTime": "2024-05-21T12:46:33.123823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFF4i2ePqZ3dSM6a8"], "accumulated_threat_level": 0.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "09d80f6c-ece5-41ce-9677-148ad4181702", "DetectTime": "2024-05-21T12:46:33.164244+00:00", "EventTime": "2024-05-21T12:46:33.164266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRS2E4IgtTJJ61Y6c"], "accumulated_threat_level": 1.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "4f0b5437-0bba-4a6d-8431-7ab49c48ef32", "DetectTime": "2024-05-21T12:46:33.216806+00:00", "EventTime": "2024-05-21T12:46:33.216826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoURSW19ZycDO1XjK5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 149} +{"Format": "IDEA0", "ID": "23516614-3c1b-4219-8aa1-e666712be058", "DetectTime": "2024-05-21T12:46:33.261648+00:00", "EventTime": "2024-05-21T12:46:33.261668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8pDC3Q2oRZTNceb6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "965f5e18-e3fd-4900-8e92-0d54fc6846aa", "DetectTime": "2024-05-21T12:46:33.315629+00:00", "EventTime": "2024-05-21T12:46:33.315648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd7CFs4d3BjbP3w2A4"], "accumulated_threat_level": 3.2, "timewindow": 149} +{"Format": "IDEA0", "ID": "e31b2948-1327-42b6-ab17-eb7156147442", "DetectTime": "2024-05-21T12:46:33.361464+00:00", "EventTime": "2024-05-21T12:46:33.361485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA47GYzhKf2g8pZTg"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "9411daca-e21f-41af-9e0c-9caac47a8b06", "DetectTime": "2024-05-21T12:46:33.411678+00:00", "EventTime": "2024-05-21T12:46:33.411698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YVy9uUNZ6iJU61j"], "accumulated_threat_level": 4.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "7d150243-fc83-4cc7-bf85-40d04aa864ff", "DetectTime": "2024-05-21T12:46:33.462297+00:00", "EventTime": "2024-05-21T12:46:33.462315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrxB73BDYWkcB6JKg"], "accumulated_threat_level": 5.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "f5915b19-5032-4ff9-ace7-3613c3732286", "DetectTime": "2024-05-21T12:46:33.511722+00:00", "EventTime": "2024-05-21T12:46:33.511740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDpShu2dZiY7nc0zZb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 149} +{"Format": "IDEA0", "ID": "1c8e3ae3-522a-4b33-b53c-b9221a55a938", "DetectTime": "2024-05-21T12:46:33.800266+00:00", "EventTime": "2024-05-21T12:46:33.800289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFTIzky0vnWpe6El"], "accumulated_threat_level": 7.199999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "74e10dca-3695-49ed-95cb-631b671db51a", "DetectTime": "2024-05-21T12:46:33.852376+00:00", "EventTime": "2024-05-21T12:46:33.852396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mbqb1zVbDcIx5Fh6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "d3f1a9a2-df45-4f5c-a5ce-c6f4b8612fcf", "DetectTime": "2024-05-21T12:46:33.910118+00:00", "EventTime": "2024-05-21T12:46:33.910137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS3L8P2w6roJspPvFj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "db8dba57-ac7c-4520-8630-a9888eaa7282", "DetectTime": "2024-05-21T12:46:33.966290+00:00", "EventTime": "2024-05-21T12:46:33.966316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdUeD134wLDTBGZqg"], "accumulated_threat_level": 9.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "512c4351-4aa5-4a42-b826-0f0c1503a905", "DetectTime": "2024-05-21T12:46:34.020514+00:00", "EventTime": "2024-05-21T12:46:34.020535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cygejq3dgYEPGYPUfk"], "accumulated_threat_level": 10.4, "timewindow": 149} +{"Format": "IDEA0", "ID": "69d74891-1627-4aff-8860-8a562dc204c5", "DetectTime": "2024-05-21T12:46:34.072156+00:00", "EventTime": "2024-05-21T12:46:34.072175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUkrze3TwdbXcLdCp4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 149} +{"Format": "IDEA0", "ID": "34286650-9893-4fb6-bbc6-85ed7c61ac13", "DetectTime": "2024-05-21T12:46:34.120070+00:00", "EventTime": "2024-05-21T12:46:34.120097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeYcav2dUHeQZgXvq3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "32e14bee-6a25-40c5-91db-80a6b06c32fa", "DetectTime": "2024-05-21T12:46:34.140163+00:00", "EventTime": "2024-05-21T12:46:34.140181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDiajS2PTSgHM79Cjl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 149} +{"Format": "Json", "ID": "32e14bee-6a25-40c5-91db-80a6b06c32fa", "DetectTime": "2024-05-21T12:46:34.140163+00:00", "EventTime": "2024-05-21T12:46:34.140181+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-07T04:22:12.976253+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2024/05/21 12:46:34.395059)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 149, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "14df4450-5c92-4d67-b12b-d5b071aa6d20", "DetectTime": "2024-05-21T12:46:34.410302+00:00", "EventTime": "2024-05-21T12:46:34.410322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDxn445IxjNo66pk9"], "accumulated_threat_level": 0.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "0c301d00-11d7-4780-abfa-77c33a36e12a", "DetectTime": "2024-05-21T12:46:34.568733+00:00", "EventTime": "2024-05-21T12:46:34.568756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjYRxW1NTncJEb14D2"], "accumulated_threat_level": 1.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "6534c639-e3c3-4caf-80fc-2742f53e217a", "DetectTime": "2024-05-21T12:46:34.614933+00:00", "EventTime": "2024-05-21T12:46:34.614955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vEZv1qkO46SZDBR1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 149} +{"Format": "IDEA0", "ID": "53d005f5-89d8-42d3-8f7b-2e1402f9faa7", "DetectTime": "2024-05-21T12:46:34.659755+00:00", "EventTime": "2024-05-21T12:46:34.659775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOKy51TLWlOZjoZi2"], "accumulated_threat_level": 3.2, "timewindow": 149} +{"Format": "IDEA0", "ID": "ce7fdedd-ec3f-4de1-8d0d-c6e83a35c636", "DetectTime": "2024-05-21T12:46:34.706702+00:00", "EventTime": "2024-05-21T12:46:34.706722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIVhh3ndjURc7B0Tl"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "2f3e03de-9611-4784-88a9-d0bc506e220f", "DetectTime": "2024-05-21T12:46:34.753183+00:00", "EventTime": "2024-05-21T12:46:34.753209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cx902ctQeUZYwYg7"], "accumulated_threat_level": 4.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "3db4b644-4e9d-448e-9316-fd96014dcc93", "DetectTime": "2024-05-21T12:46:34.803234+00:00", "EventTime": "2024-05-21T12:46:34.803255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVMGbjbZkmdf7UOk"], "accumulated_threat_level": 5.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "c1f0d27d-98d7-4331-bce3-16ec1459ce66", "DetectTime": "2024-05-21T12:46:34.849379+00:00", "EventTime": "2024-05-21T12:46:34.849398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzSGZV0IExRxVP8X1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 149} +{"Format": "IDEA0", "ID": "6c50a84b-71cb-4181-8bb6-617ce617f7bf", "DetectTime": "2024-05-21T12:46:34.902226+00:00", "EventTime": "2024-05-21T12:46:34.902252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYbsrn37COVW1a8vSc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "6f48a6a6-68c1-406a-9ce2-805d7d8e2e9b", "DetectTime": "2024-05-21T12:46:35.162109+00:00", "EventTime": "2024-05-21T12:46:35.162140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7VngR2SNwD58zUFUb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "fa794ad2-b566-46f7-bc4e-212747c35c7e", "DetectTime": "2024-05-21T12:46:35.272693+00:00", "EventTime": "2024-05-21T12:46:35.272718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgzR4s2jV6IiHx8Vik"], "accumulated_threat_level": 7.999999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "34c8f309-cc6f-44e7-bf6d-26cc000cfa96", "DetectTime": "2024-05-21T12:46:35.314216+00:00", "EventTime": "2024-05-21T12:46:35.314234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkXBpk16JP4uPURdC9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "686c7a7a-13f5-4e1a-9083-6ef409e43817", "DetectTime": "2024-05-21T12:46:35.358849+00:00", "EventTime": "2024-05-21T12:46:35.358867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4NGl28TXDk5BMER7"], "accumulated_threat_level": 9.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "6a4665a4-ce22-41f5-872d-8ed71e7d4b47", "DetectTime": "2024-05-21T12:46:35.415442+00:00", "EventTime": "2024-05-21T12:46:35.415461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz4P1n1iCcqhhfjNF4"], "accumulated_threat_level": 10.4, "timewindow": 149} +{"Format": "IDEA0", "ID": "35c31952-ac92-41c1-b040-12409036e801", "DetectTime": "2024-05-21T12:46:35.451806+00:00", "EventTime": "2024-05-21T12:46:35.451828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5Tj54oaVXdpaLCv9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 149} +{"Format": "IDEA0", "ID": "af25c786-5189-4b1a-a839-3d8820b988d8", "DetectTime": "2024-05-21T12:46:35.497558+00:00", "EventTime": "2024-05-21T12:46:35.497579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYn3am1zr7unQKULl7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 149} +{"Format": "Json", "ID": "af25c786-5189-4b1a-a839-3d8820b988d8", "DetectTime": "2024-05-21T12:46:35.497558+00:00", "EventTime": "2024-05-21T12:46:35.497579+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "1970-01-07T04:52:30.017383+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2024/05/21 12:46:35.901752)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 149, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3a2bc9ec-a43e-46fa-b4a9-60cbc78d4773", "DetectTime": "2024-05-21T12:46:35.914511+00:00", "EventTime": "2024-05-21T12:46:35.914534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClCsNc2FtJsAZmnTdl"], "accumulated_threat_level": 0.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "9103d759-76c2-47e9-b0a4-ed62f7a48d65", "DetectTime": "2024-05-21T12:46:35.925791+00:00", "EventTime": "2024-05-21T12:46:35.925810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8caKW3OECQK9BJ2Wb"], "accumulated_threat_level": 1.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "4dc68f4e-b0a0-4f07-8833-3a1116ecf10d", "DetectTime": "2024-05-21T12:46:35.930534+00:00", "EventTime": "2024-05-21T12:46:35.930552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSPfT1KF4UpZHPJIh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "b7a357ac-4b73-44f0-a7e0-98096d131960", "DetectTime": "2024-05-21T12:46:35.940957+00:00", "EventTime": "2024-05-21T12:46:35.940975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK3yJt4LXDg9JzucKh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 149} +{"Format": "IDEA0", "ID": "2d49e849-1dfb-4000-af5c-7a3883d22b42", "DetectTime": "2024-05-21T12:46:35.957787+00:00", "EventTime": "2024-05-21T12:46:35.957808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbIB84BYuz88Ma0id"], "accumulated_threat_level": 3.2, "timewindow": 149} +{"Format": "IDEA0", "ID": "2f5b924e-de2a-4ac6-a75e-a094bfdbc191", "DetectTime": "2024-05-21T12:46:36.004990+00:00", "EventTime": "2024-05-21T12:46:36.005011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETmw33L5aJ33nPiY7"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "e55c7188-6f99-4ac2-9aa2-c3bbf35f8b51", "DetectTime": "2024-05-21T12:46:36.052346+00:00", "EventTime": "2024-05-21T12:46:36.052365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2smc3W7GHRR4bzml"], "accumulated_threat_level": 4.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "59d89c16-d2c1-4bbe-bfae-8dcae56799fa", "DetectTime": "2024-05-21T12:46:36.100868+00:00", "EventTime": "2024-05-21T12:46:36.100887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzVyD38fCevFbrFNi"], "accumulated_threat_level": 5.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "dbd68037-2113-44f2-ab23-dda953866c78", "DetectTime": "2024-05-21T12:46:36.141254+00:00", "EventTime": "2024-05-21T12:46:36.141279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3c2Z8lLrP4KQYvf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 149} +{"Format": "IDEA0", "ID": "c3becc8b-afe0-45e0-973a-9efad0b6d929", "DetectTime": "2024-05-21T12:46:36.190569+00:00", "EventTime": "2024-05-21T12:46:36.190594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1UCf4dJXW3N6MMC"], "accumulated_threat_level": 7.199999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "e95b178b-60f3-4969-80a8-01934cbdb87d", "DetectTime": "2024-05-21T12:46:36.241190+00:00", "EventTime": "2024-05-21T12:46:36.241211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUqMW1D318P7Lmeaj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "2aa5f916-df41-4f21-a3b1-7e9a62635d4b", "DetectTime": "2024-05-21T12:46:36.457960+00:00", "EventTime": "2024-05-21T12:46:36.457978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FafWTSB1BUy6Xrc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 149} +{"Format": "IDEA0", "ID": "53fc8222-407c-479c-be69-60219eaf5783", "DetectTime": "2024-05-21T12:46:36.505643+00:00", "EventTime": "2024-05-21T12:46:36.505665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Oho2ceetexXDSxl"], "accumulated_threat_level": 9.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "1dd28d78-95f2-4cc0-8d11-fdb9ee8a0ad7", "DetectTime": "2024-05-21T12:46:36.551750+00:00", "EventTime": "2024-05-21T12:46:36.551770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8rzwr4vbrlD8TWrA6"], "accumulated_threat_level": 10.4, "timewindow": 149} +{"Format": "IDEA0", "ID": "440ac9bf-d53b-439d-8f3f-3db05487bf04", "DetectTime": "2024-05-21T12:46:36.586343+00:00", "EventTime": "2024-05-21T12:46:36.586364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWsQ9fLC1SRKNsm81"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "bcc325ae-ea62-47c2-9d3f-e1513650bf7b", "DetectTime": "2024-05-21T12:46:36.626641+00:00", "EventTime": "2024-05-21T12:46:36.626690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU2hn4awRMQyyw2wa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 149} +{"Format": "IDEA0", "ID": "c5e13ba5-0d64-4095-bddd-296ed33a5d39", "DetectTime": "2024-05-21T12:46:36.672138+00:00", "EventTime": "2024-05-21T12:46:36.672158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyDEC4fckINlL4283"], "accumulated_threat_level": 12.000000000000002, "timewindow": 149} +{"Format": "Json", "ID": "c5e13ba5-0d64-4095-bddd-296ed33a5d39", "DetectTime": "2024-05-21T12:46:36.672138+00:00", "EventTime": "2024-05-21T12:46:36.672158+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-07T04:52:34.702672+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 149. (real time 2024/05/21 12:46:36.873765)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 149, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ed8490f1-a82d-4d76-981d-a72ef55c0671", "DetectTime": "2024-05-21T12:46:36.885443+00:00", "EventTime": "2024-05-21T12:46:36.885462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1AxvublGQcETCXi"], "accumulated_threat_level": 0.8, "timewindow": 149} +{"Format": "IDEA0", "ID": "93dbf6b3-7a57-45ac-9578-980e7a3ef001", "DetectTime": "2024-05-21T12:46:36.895295+00:00", "EventTime": "2024-05-21T12:46:36.895312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqf9jH3ClVfyQNmjUa"], "accumulated_threat_level": 1.6, "timewindow": 149} +{"Format": "IDEA0", "ID": "8b4b5ec7-80a2-43aa-8247-6376a4c26b42", "DetectTime": "2024-05-21T12:46:36.905061+00:00", "EventTime": "2024-05-21T12:46:36.905079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cawdt43EgeELJPJux1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 149} +{"Format": "IDEA0", "ID": "d0f3c2c9-5ae1-492f-a445-6f5c3d7dd852", "DetectTime": "2024-05-21T12:46:37.076931+00:00", "EventTime": "2024-05-21T12:46:37.076951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDBG53KiJUPuq1d82"], "accumulated_threat_level": 3.2, "timewindow": 149} +{"Format": "IDEA0", "ID": "c1c03949-9e7c-4c75-9879-6688f16f38b3", "DetectTime": "2024-05-21T12:46:37.125441+00:00", "EventTime": "2024-05-21T12:46:37.125462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSz6k1xH9ued3AY95"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "0015739b-9044-4a08-a462-05c562c06401", "DetectTime": "2024-05-21T12:46:37.222257+00:00", "EventTime": "2024-05-21T12:46:37.222278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS4vjB10IiuMv7xY71"], "accumulated_threat_level": 0.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "4f3abdda-7e7d-4119-bff0-7f5c2221d663", "DetectTime": "2024-05-21T12:46:37.268430+00:00", "EventTime": "2024-05-21T12:46:37.268456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNAflu2Eoo1V4RHK27"], "accumulated_threat_level": 1.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "9702916b-d99b-467f-bd9e-027526553be6", "DetectTime": "2024-05-21T12:46:37.315772+00:00", "EventTime": "2024-05-21T12:46:37.315795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXrpcA4MJeeyWBRju7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 150} +{"Format": "IDEA0", "ID": "d4787291-8a4b-431d-89fe-2040deb30790", "DetectTime": "2024-05-21T12:46:37.370848+00:00", "EventTime": "2024-05-21T12:46:37.370867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSXcA14hwuwjQW6Ei"], "accumulated_threat_level": 3.2, "timewindow": 150} +{"Format": "IDEA0", "ID": "682ec938-6509-489b-b214-c4dcf3e4fd6b", "DetectTime": "2024-05-21T12:46:37.396177+00:00", "EventTime": "2024-05-21T12:46:37.396198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxzzA2OhEATIVJY9a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "e3749e70-4cea-440f-8726-9c8c19c05082", "DetectTime": "2024-05-21T12:46:37.436310+00:00", "EventTime": "2024-05-21T12:46:37.436327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNmk434M5OOqeN2LXb"], "accumulated_threat_level": 4.0, "timewindow": 150} +{"Format": "IDEA0", "ID": "89089bbe-43aa-42a1-8a3e-ca85c530563b", "DetectTime": "2024-05-21T12:46:37.483344+00:00", "EventTime": "2024-05-21T12:46:37.483366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C317NWYWhLvWF1Qp5"], "accumulated_threat_level": 4.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "514e0616-beff-48e8-bd71-c46a5cf5bb51", "DetectTime": "2024-05-21T12:46:37.557347+00:00", "EventTime": "2024-05-21T12:46:37.557381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["139.0.116.21"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.0.116.21 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19crN1JluklSWnv5j"], "accumulated_threat_level": 0, "timewindow": 32} +{"Format": "IDEA0", "ID": "c285ac52-4a2e-4e43-bc53-fe3a8a356db4", "DetectTime": "2024-05-21T12:46:37.575864+00:00", "EventTime": "2024-05-21T12:46:37.575885+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["139.0.116.21"]}], "Attach": [{"Content": "connection to blacklisted IP: 139.0.116.21 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19crN1JluklSWnv5j"], "accumulated_threat_level": 5.5, "timewindow": 32} +{"Format": "IDEA0", "ID": "21d3330e-ca8e-4e27-9eff-4677e6c672fa", "DetectTime": "2024-05-21T12:46:37.674274+00:00", "EventTime": "2024-05-21T12:46:37.674292+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.253.163.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.253.163.131 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmx0iO3UPePVAHsDTb"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "1cea3eb5-20d8-423e-bbc7-5afa7554a2f1", "DetectTime": "2024-05-21T12:46:37.686321+00:00", "EventTime": "2024-05-21T12:46:37.686340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.253.163.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.253.163.131 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmx0iO3UPePVAHsDTb"], "accumulated_threat_level": 1.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "bd320af8-2d8a-4837-8797-da5f9538510c", "DetectTime": "2024-05-21T12:46:37.843576+00:00", "EventTime": "2024-05-21T12:46:37.843598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD3I4q2ZJYOjC5qxqb"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "4cf5bbfb-2c51-4a5d-887e-5336304846fe", "DetectTime": "2024-05-21T12:46:37.864171+00:00", "EventTime": "2024-05-21T12:46:37.864191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXz1E12qjF7DsbtNa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 150} +{"Format": "IDEA0", "ID": "4d965873-5bcd-4112-ad1b-2b41493c928b", "DetectTime": "2024-05-21T12:46:37.911562+00:00", "EventTime": "2024-05-21T12:46:37.911581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQsTDA4PTq7qbaRbOg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "26f0bd32-ff2d-4894-b3dd-319c960ba760", "DetectTime": "2024-05-21T12:46:37.958531+00:00", "EventTime": "2024-05-21T12:46:37.958549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvfpdv0IgHjtHcQ"], "accumulated_threat_level": 7.999999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "d03be68a-f662-4e02-ae23-e4c7e8703093", "DetectTime": "2024-05-21T12:46:38.004164+00:00", "EventTime": "2024-05-21T12:46:38.004181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjguC33HXnLgF3xfhk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "489e08f5-c2c0-4260-becf-c57f42790a4b", "DetectTime": "2024-05-21T12:46:38.049818+00:00", "EventTime": "2024-05-21T12:46:38.049837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CABNB01XNenfdJslY3"], "accumulated_threat_level": 9.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "07c0e4f9-7983-4119-814a-3c5ef8c9bbba", "DetectTime": "2024-05-21T12:46:38.085397+00:00", "EventTime": "2024-05-21T12:46:38.085420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QXW9pc6o2HgTvK1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "24917103-47fe-4d65-bab7-ddfee9f56fc0", "DetectTime": "2024-05-21T12:46:38.128983+00:00", "EventTime": "2024-05-21T12:46:38.129002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzopC92Rq5CHolmkEl"], "accumulated_threat_level": 10.4, "timewindow": 150} +{"Format": "IDEA0", "ID": "6a6afa7a-4ec5-447d-9a79-a52061c1d32f", "DetectTime": "2024-05-21T12:46:38.170092+00:00", "EventTime": "2024-05-21T12:46:38.170117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckpfgz1kWhsN4rbtV5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 150} +{"Format": "IDEA0", "ID": "a4734d17-7397-4ebb-8037-ab1091fa46e6", "DetectTime": "2024-05-21T12:46:38.407758+00:00", "EventTime": "2024-05-21T12:46:38.407779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CucMMr4eZpcT5Rkzbf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 150} +{"Format": "Json", "ID": "a4734d17-7397-4ebb-8037-ab1091fa46e6", "DetectTime": "2024-05-21T12:46:38.407758+00:00", "EventTime": "2024-05-21T12:46:38.407779+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-07T05:22:58.841860+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2024/05/21 12:46:38.591416)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 150, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1b18beab-0d25-4b99-9224-1dd597a7102d", "DetectTime": "2024-05-21T12:46:38.603240+00:00", "EventTime": "2024-05-21T12:46:38.603259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHJ5615l1HnygjnJ6"], "accumulated_threat_level": 0.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "28cbdba1-445f-4f27-b3e6-7bc63a0f4885", "DetectTime": "2024-05-21T12:46:38.615865+00:00", "EventTime": "2024-05-21T12:46:38.615883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C012qr1rzseUgzavpa"], "accumulated_threat_level": 1.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "65483fea-d38f-4d56-9d97-91f8547064c4", "DetectTime": "2024-05-21T12:46:38.626230+00:00", "EventTime": "2024-05-21T12:46:38.626248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzVmb3nwrysGdM9ob"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 150} +{"Format": "IDEA0", "ID": "85fe1672-b9af-481e-aa0d-01b34585ca95", "DetectTime": "2024-05-21T12:46:38.636817+00:00", "EventTime": "2024-05-21T12:46:38.636834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgmUZ3nKbgcTH6f99"], "accumulated_threat_level": 3.2, "timewindow": 150} +{"Format": "IDEA0", "ID": "1cc750c6-cd8e-430f-b5be-2806a5b262d8", "DetectTime": "2024-05-21T12:46:38.647137+00:00", "EventTime": "2024-05-21T12:46:38.647155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZheB53ilcANjpdoEe"], "accumulated_threat_level": 4.0, "timewindow": 150} +{"Format": "IDEA0", "ID": "ca7f6aa2-4319-4a20-b1ec-16bc8dbdeff2", "DetectTime": "2024-05-21T12:46:38.686371+00:00", "EventTime": "2024-05-21T12:46:38.686392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZHBee3tkLpPfcr108"], "accumulated_threat_level": 4.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "8fe0bdb2-5ed9-4801-b461-fcc59721f1f1", "DetectTime": "2024-05-21T12:46:38.736051+00:00", "EventTime": "2024-05-21T12:46:38.736069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpWNp2fGBryxoojec"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "6b26c337-2c46-49d8-a920-cd3ca5fc672a", "DetectTime": "2024-05-21T12:46:38.772581+00:00", "EventTime": "2024-05-21T12:46:38.772602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRIJRp2BDFEEAkVgz1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "4e486652-5c5d-421e-88a5-574c687dd27c", "DetectTime": "2024-05-21T12:46:38.984143+00:00", "EventTime": "2024-05-21T12:46:38.984161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYFr44N358WRZGFy6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 150} +{"Format": "IDEA0", "ID": "3529850c-b031-4df5-958f-14c6d499e16d", "DetectTime": "2024-05-21T12:46:39.029127+00:00", "EventTime": "2024-05-21T12:46:39.029146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmy0014qlaziGiHUH1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "059730cb-3d66-48ba-859f-30798576f0fd", "DetectTime": "2024-05-21T12:46:39.074680+00:00", "EventTime": "2024-05-21T12:46:39.074701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE1yu2XzwaWlY566c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "1db7572a-30c0-41b1-957c-b2d6a4aacc07", "DetectTime": "2024-05-21T12:46:39.128236+00:00", "EventTime": "2024-05-21T12:46:39.128256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiJuB4uHILctmU2L7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "d4489504-aec3-407d-8432-12c267abbd82", "DetectTime": "2024-05-21T12:46:39.273861+00:00", "EventTime": "2024-05-21T12:46:39.273884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjBfzK1qfwo7qskwc2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "ea80ee82-c24d-4300-8526-04378f65d4b1", "DetectTime": "2024-05-21T12:46:39.311917+00:00", "EventTime": "2024-05-21T12:46:39.311937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ5RA93SQaRd8DSSIg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "4cc74bea-cbfc-47cd-ab07-599633c453f1", "DetectTime": "2024-05-21T12:46:39.361164+00:00", "EventTime": "2024-05-21T12:46:39.361187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCbGV3MD3JSknPA4l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "81cdf56d-d4c2-458f-a213-ee2246cb6b1c", "DetectTime": "2024-05-21T12:46:39.419403+00:00", "EventTime": "2024-05-21T12:46:39.419425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO9WHu1QIWlJDQjAB7"], "accumulated_threat_level": 9.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "c629607e-c9ab-46d4-9804-6b8659bbf6ea", "DetectTime": "2024-05-21T12:46:39.457525+00:00", "EventTime": "2024-05-21T12:46:39.457547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBRyq2DyJjMwaAdc1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "19cd9e62-e624-461a-9e7e-567ed63a4ccf", "DetectTime": "2024-05-21T12:46:39.677084+00:00", "EventTime": "2024-05-21T12:46:39.677102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9P4vjFcOb2xTnS9"], "accumulated_threat_level": 10.4, "timewindow": 150} +{"Format": "IDEA0", "ID": "5c486efe-9fbe-431c-8006-ba6485a54b69", "DetectTime": "2024-05-21T12:46:39.705407+00:00", "EventTime": "2024-05-21T12:46:39.705429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu7w5K3ucsmMt1OXxl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "3aca62b9-0cb6-4396-8b3f-8f84974831d3", "DetectTime": "2024-05-21T12:46:39.745545+00:00", "EventTime": "2024-05-21T12:46:39.745566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4NiXahNntPdKXP7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 150} +{"Format": "IDEA0", "ID": "4c41b8cb-7a36-465b-8fcf-328777bf3bd1", "DetectTime": "2024-05-21T12:46:39.783022+00:00", "EventTime": "2024-05-21T12:46:39.783044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZO9Ta4Ztz44GVIja9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "4cfb4850-c22d-42a8-bdf4-ddf22791c9c2", "DetectTime": "2024-05-21T12:46:39.823782+00:00", "EventTime": "2024-05-21T12:46:39.823800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcakSw16kcwLHidNCb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 150} +{"Format": "Json", "ID": "4cfb4850-c22d-42a8-bdf4-ddf22791c9c2", "DetectTime": "2024-05-21T12:46:39.823782+00:00", "EventTime": "2024-05-21T12:46:39.823800+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "1970-01-07T05:53:29.276799+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2024/05/21 12:46:40.012877)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 150, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d9b3eb1d-7706-4a12-87de-94e07381b00f", "DetectTime": "2024-05-21T12:46:40.016858+00:00", "EventTime": "2024-05-21T12:46:40.016876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4K142SiArlxJRWY4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "39bd2bd8-4f76-49d4-9fe3-30a7fc9d4621", "DetectTime": "2024-05-21T12:46:40.029152+00:00", "EventTime": "2024-05-21T12:46:40.029172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0RHfx3LdSfh8c0LN9"], "accumulated_threat_level": 0.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "d61e2f4e-55db-422f-9afb-a3d7c4d85788", "DetectTime": "2024-05-21T12:46:40.129563+00:00", "EventTime": "2024-05-21T12:46:40.129585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLP2D1N3rfuI1SYbi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "bb2d3604-16ee-4914-bfa1-4e0bc35c5f7b", "DetectTime": "2024-05-21T12:46:40.265092+00:00", "EventTime": "2024-05-21T12:46:40.265114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKn122YlsGj9cTuR5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "329dd853-c29c-4986-a117-232b7cf6f1f8", "DetectTime": "2024-05-21T12:46:40.276961+00:00", "EventTime": "2024-05-21T12:46:40.276979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chxovx1Hhj7cRjxTwl"], "accumulated_threat_level": 1.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "cb8dd461-ae06-41e7-b080-081207376e45", "DetectTime": "2024-05-21T12:46:40.281616+00:00", "EventTime": "2024-05-21T12:46:40.281634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMtzVBoQvWGl9jNng"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "3a92c652-4166-499c-bba5-529a240a220c", "DetectTime": "2024-05-21T12:46:40.300661+00:00", "EventTime": "2024-05-21T12:46:40.300684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPsZm1kJBFiaT8xAc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "1de78f59-5d73-4d49-ac37-1db63ac507f6", "DetectTime": "2024-05-21T12:46:40.414440+00:00", "EventTime": "2024-05-21T12:46:40.414461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAuHey1uaOd4X4RpI2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "3c985eeb-d11d-4988-a3c0-0e233725bee6", "DetectTime": "2024-05-21T12:46:40.427104+00:00", "EventTime": "2024-05-21T12:46:40.427126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JEweYmy8E27DOg6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 150} +{"Format": "IDEA0", "ID": "128a3189-636d-4019-8ab2-7731b1007aec", "DetectTime": "2024-05-21T12:46:40.490736+00:00", "EventTime": "2024-05-21T12:46:40.490757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIA2Ki1Kus4jHwZNp"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "7dd87d2f-1b1c-4f4c-abbd-c09e400a6e0a", "DetectTime": "2024-05-21T12:46:40.710027+00:00", "EventTime": "2024-05-21T12:46:40.710048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqTLRXjS9lCCHih"], "accumulated_threat_level": 3.2, "timewindow": 150} +{"Format": "IDEA0", "ID": "d817906d-afa5-40ca-b1db-962b06ef13f8", "DetectTime": "2024-05-21T12:46:40.768537+00:00", "EventTime": "2024-05-21T12:46:40.768558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeorZH15dc0f8Z7mO5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "6bbf1a42-9db0-41f9-a961-1983ca769fce", "DetectTime": "2024-05-21T12:46:40.773357+00:00", "EventTime": "2024-05-21T12:46:40.773376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CALAPLlDDoUnMEUYf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "71585d12-e8ba-4162-86d7-675716953804", "DetectTime": "2024-05-21T12:46:40.778722+00:00", "EventTime": "2024-05-21T12:46:40.778740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyil4l1iXyEnnO5clf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "99475de8-10a3-4c56-98d0-e881ac9e6926", "DetectTime": "2024-05-21T12:46:40.783834+00:00", "EventTime": "2024-05-21T12:46:40.783851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCJwWjVtNNGB24MJ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "d2fb9678-80f5-491c-bfac-68add8f273b2", "DetectTime": "2024-05-21T12:46:40.788366+00:00", "EventTime": "2024-05-21T12:46:40.788384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvkfIH1As2fmAJEQ78"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "18e94086-6945-4600-9f2d-063d3f4ba176", "DetectTime": "2024-05-21T12:46:40.958081+00:00", "EventTime": "2024-05-21T12:46:40.958100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrMEg1tFKw4JFOMI7"], "accumulated_threat_level": 4.0, "timewindow": 150} +{"Format": "IDEA0", "ID": "f646f977-1212-4dc6-a582-1aa99d38d744", "DetectTime": "2024-05-21T12:46:40.991498+00:00", "EventTime": "2024-05-21T12:46:40.991521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDugjK1hhaaPWDer4c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "b1e046df-d12d-4918-b9f7-caf0dca9eef4", "DetectTime": "2024-05-21T12:46:41.256907+00:00", "EventTime": "2024-05-21T12:46:41.256934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBq1gq35mMD0njwjC6"], "accumulated_threat_level": 4.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "4e36bfae-9943-42dd-8bf6-0717da36cdf1", "DetectTime": "2024-05-21T12:46:41.262169+00:00", "EventTime": "2024-05-21T12:46:41.262188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIarn1ofUfaIN3omj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "5032de08-f6f5-4c96-92a2-de801d793fb2", "DetectTime": "2024-05-21T12:46:41.318424+00:00", "EventTime": "2024-05-21T12:46:41.318443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3btv2uJew9QvINc2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "93d736af-1845-4927-bf86-b769502f882d", "DetectTime": "2024-05-21T12:46:41.373457+00:00", "EventTime": "2024-05-21T12:46:41.373487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWy7I1AfaXKFYSNUh"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "9ee026f2-90cd-4441-9d42-080daa612973", "DetectTime": "2024-05-21T12:46:41.420312+00:00", "EventTime": "2024-05-21T12:46:41.420332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNeRdL3Omo9bdDlM57"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 150} +{"Format": "IDEA0", "ID": "b8198541-f948-4f02-8a90-d05bc42034e1", "DetectTime": "2024-05-21T12:46:41.475227+00:00", "EventTime": "2024-05-21T12:46:41.475244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHSRar2avsfTIQ1x63"], "accumulated_threat_level": 7.199999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "fa1520f1-22b7-44ff-bfff-73eb1957b8d5", "DetectTime": "2024-05-21T12:46:41.517033+00:00", "EventTime": "2024-05-21T12:46:41.517050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9u2vS2SZvZvPHLGai"], "accumulated_threat_level": 7.999999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "4ef66a3e-604c-4a61-bfa5-15283a4fd583", "DetectTime": "2024-05-21T12:46:41.806376+00:00", "EventTime": "2024-05-21T12:46:41.806393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakF592tQxyVXww2O3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "ab34bc9d-7c85-4337-a005-66fe8484a39d", "DetectTime": "2024-05-21T12:46:41.820073+00:00", "EventTime": "2024-05-21T12:46:41.820096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oFlr1MvJjpS4qxX6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "ec1ab300-a9bc-4946-bc33-aac9c6d61320", "DetectTime": "2024-05-21T12:46:41.826963+00:00", "EventTime": "2024-05-21T12:46:41.826985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAN1Qu3GAZWw4ocGW6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "56293ece-b514-4223-8cea-115b96136a64", "DetectTime": "2024-05-21T12:46:41.831837+00:00", "EventTime": "2024-05-21T12:46:41.831855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsUcqbXZn3BGQeSK7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "7486a37f-c058-4435-a212-c01c51375e4b", "DetectTime": "2024-05-21T12:46:41.836514+00:00", "EventTime": "2024-05-21T12:46:41.836531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHxkM1KXUaQblAUrd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "520c789a-63e0-41d2-9599-6144a7dd27a2", "DetectTime": "2024-05-21T12:46:41.849897+00:00", "EventTime": "2024-05-21T12:46:41.849918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7ZAe4iB2enN8bOL"], "accumulated_threat_level": 8.799999999999999, "timewindow": 150} +{"Format": "IDEA0", "ID": "c268983f-7d62-44f8-897f-09605552d14d", "DetectTime": "2024-05-21T12:46:41.918223+00:00", "EventTime": "2024-05-21T12:46:41.918245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4fB1G2N8VictMpkck"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "e694504c-d31c-42a7-8862-167b8993dd14", "DetectTime": "2024-05-21T12:46:42.349760+00:00", "EventTime": "2024-05-21T12:46:42.349780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbW303I4eHuyM3K78"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "b7a79e93-1ba0-4724-9684-2c5d97b846ed", "DetectTime": "2024-05-21T12:46:42.417617+00:00", "EventTime": "2024-05-21T12:46:42.417638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CId8Bg1FjGOykWlLrl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "836089ec-210f-4179-8bd2-e9fc163b21a1", "DetectTime": "2024-05-21T12:46:42.422799+00:00", "EventTime": "2024-05-21T12:46:42.422817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeIKqAF5xngLyNSfd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "ef613128-400e-4d08-b21c-0e77f865c0aa", "DetectTime": "2024-05-21T12:46:42.427790+00:00", "EventTime": "2024-05-21T12:46:42.427809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnevhi4WqXjj5N7Qn1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "344426f9-81e9-4ef4-b152-25dce6789ee9", "DetectTime": "2024-05-21T12:46:42.433385+00:00", "EventTime": "2024-05-21T12:46:42.433403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPVKzB3tJU9eHtai92"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "be337b13-ba39-4cf9-b6b9-5ca323fc5364", "DetectTime": "2024-05-21T12:46:42.503524+00:00", "EventTime": "2024-05-21T12:46:42.503548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutRlpTRmStxYAWla"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "edddebf7-5e0e-48c6-9a6c-85a4ce303a49", "DetectTime": "2024-05-21T12:46:42.548638+00:00", "EventTime": "2024-05-21T12:46:42.548658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRsTur1OOg0sw2xd11"], "accumulated_threat_level": 9.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "fa6a49f3-2a0b-42a7-b3fb-8807f2ed6903", "DetectTime": "2024-05-21T12:46:42.632504+00:00", "EventTime": "2024-05-21T12:46:42.632524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7tafa1upy1FNx6la5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "5988b332-81eb-45b2-8f73-7c7400c1f9c4", "DetectTime": "2024-05-21T12:46:42.974556+00:00", "EventTime": "2024-05-21T12:46:42.974576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6VxO3df2KuBkJK28"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "78205539-9643-4d2d-abb4-ab4665709528", "DetectTime": "2024-05-21T12:46:43.005087+00:00", "EventTime": "2024-05-21T12:46:43.005109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.187.41.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJKLg3hi5PPuBQmne"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "1d69a627-e346-4d87-a0e8-8218902620a0", "DetectTime": "2024-05-21T12:46:43.063240+00:00", "EventTime": "2024-05-21T12:46:43.063261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5j2Gh3wTZR4eklxC9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 147} +{"Format": "IDEA0", "ID": "ee38247d-c4ab-4d73-8e7f-94adb15eae09", "DetectTime": "2024-05-21T12:46:43.107496+00:00", "EventTime": "2024-05-21T12:46:43.107517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbmv4O2yzy3pxfNRml"], "accumulated_threat_level": 10.4, "timewindow": 150} +{"Format": "IDEA0", "ID": "ca32cf17-4434-4d4e-a18e-a7cd2e074577", "DetectTime": "2024-05-21T12:46:43.112180+00:00", "EventTime": "2024-05-21T12:46:43.112198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHFQf73fe65a6gmeuf"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "7323a82a-3bda-4915-a964-671c5f434c3f", "DetectTime": "2024-05-21T12:46:43.222922+00:00", "EventTime": "2024-05-21T12:46:43.222944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG2h0I14Xi14pqofn3"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "8ad66719-9b31-42f5-b130-2bed5137bb7a", "DetectTime": "2024-05-21T12:46:43.237123+00:00", "EventTime": "2024-05-21T12:46:43.237148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQzbq1vQC2Cb25HQk"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "2df3e7b6-b691-46b8-8839-0bfaab485c98", "DetectTime": "2024-05-21T12:46:43.504452+00:00", "EventTime": "2024-05-21T12:46:43.504473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoI1Eh4yp5HKPU8RJf"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "ec5b86f4-46c1-4bf3-848d-58d7fbf3c848", "DetectTime": "2024-05-21T12:46:43.553631+00:00", "EventTime": "2024-05-21T12:46:43.553648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJatFflRzxOHqmN7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 150} +{"Format": "IDEA0", "ID": "fc41be5b-93d0-4e42-bd10-e2d8d3286639", "DetectTime": "2024-05-21T12:46:43.642695+00:00", "EventTime": "2024-05-21T12:46:43.642717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuyDpo1uVI4k0SZIZ6"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "19286dc1-8f48-492f-8f77-5d531220a820", "DetectTime": "2024-05-21T12:46:43.649918+00:00", "EventTime": "2024-05-21T12:46:43.649939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD04l53V6EYoXRi4U7"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "cc27af50-1c05-4190-b57e-d8eaf56fa2ae", "DetectTime": "2024-05-21T12:46:43.658746+00:00", "EventTime": "2024-05-21T12:46:43.658769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3yPm4vHN3HoLN9Ui"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "903cc51d-47cb-4345-86a0-0a551b69f9ed", "DetectTime": "2024-05-21T12:46:43.674039+00:00", "EventTime": "2024-05-21T12:46:43.674060+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehNZk208TACF9COA1"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "82b09f1b-bbd7-432a-a483-194edcdcdbf0", "DetectTime": "2024-05-21T12:46:43.689340+00:00", "EventTime": "2024-05-21T12:46:43.689363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CehNZk208TACF9COA1"], "accumulated_threat_level": 1.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0da44041-9f81-4f15-a92b-fe6c1ca2be0c", "DetectTime": "2024-05-21T12:46:43.765624+00:00", "EventTime": "2024-05-21T12:46:43.765645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pNpd1yoyjVOJRZJk"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "bce6637d-b6fa-4cdd-8085-2e640ecdb3b8", "DetectTime": "2024-05-21T12:46:43.780512+00:00", "EventTime": "2024-05-21T12:46:43.780531+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.170.98.24"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.170.98.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLikf92ubVDBjXMAcg"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "9502d989-9738-46bb-9e48-55f6beff514f", "DetectTime": "2024-05-21T12:46:43.794783+00:00", "EventTime": "2024-05-21T12:46:43.794802+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.170.98.24"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.170.98.24 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLikf92ubVDBjXMAcg"], "accumulated_threat_level": 2.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "c0aa3b22-0e67-480b-9048-e82db9850b26", "DetectTime": "2024-05-21T12:46:43.806474+00:00", "EventTime": "2024-05-21T12:46:43.806493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMQTU1ISEs4SqWqP9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 150} +{"Format": "Json", "ID": "c0aa3b22-0e67-480b-9048-e82db9850b26", "DetectTime": "2024-05-21T12:46:43.806474+00:00", "EventTime": "2024-05-21T12:46:43.806493+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "1970-01-07T05:53:33.559967+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 150. (real time 2024/05/21 12:46:44.012295)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 150, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "95f7ada8-5249-439a-90af-f8221fadb85d", "DetectTime": "2024-05-21T12:46:44.038150+00:00", "EventTime": "2024-05-21T12:46:44.038172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDOxG2kmQMG10MPEb", "C8Y7xX1n8GWD4XpV35", "CO4gE91dRDO8Qy80oc", "CaYMft19YQrFoZ3Epb"], "accumulated_threat_level": 0.5, "timewindow": 154} +{"Format": "IDEA0", "ID": "95efba98-bd7a-48dd-8e75-498705137a56", "DetectTime": "2024-05-21T12:46:44.142700+00:00", "EventTime": "2024-05-21T12:46:44.142725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoqcg2jLNInccWQ0d"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "ded812d4-4bfe-49a8-85a2-579e70f8440d", "DetectTime": "2024-05-21T12:46:44.220110+00:00", "EventTime": "2024-05-21T12:46:44.220131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3HHUpEwE93dMeT"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "9029ff27-da3b-4c9e-a0e1-af9c696d786e", "DetectTime": "2024-05-21T12:46:44.234709+00:00", "EventTime": "2024-05-21T12:46:44.234729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyWbvX25kSFURvNWQ3"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "61ba4a58-5735-47aa-a2df-8f4c4f07c3e8", "DetectTime": "2024-05-21T12:46:44.293339+00:00", "EventTime": "2024-05-21T12:46:44.293360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VI2aNGQljWfeljl"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "c7882d45-1876-4ec2-994a-c808554e32c9", "DetectTime": "2024-05-21T12:46:44.308109+00:00", "EventTime": "2024-05-21T12:46:44.308129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYtLv3CFULfBzhq9g"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "e139bfce-6ebe-4cf8-916f-f0de049c0f08", "DetectTime": "2024-05-21T12:46:44.339697+00:00", "EventTime": "2024-05-21T12:46:44.339717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqVDP2QkpFdCCvpBk"], "accumulated_threat_level": 0.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "7396ed14-323e-4444-ac96-114d6c68fcd8", "DetectTime": "2024-05-21T12:46:44.463727+00:00", "EventTime": "2024-05-21T12:46:44.463752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnexqd3Cy7MEOibbDb"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "fb2be2cc-72f6-4602-b2e1-7fe3d1099a45", "DetectTime": "2024-05-21T12:46:44.481457+00:00", "EventTime": "2024-05-21T12:46:44.481481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj19tx3O3mbogqQFLi"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "2fe4e0ff-bd96-424d-a329-4d446d5e642c", "DetectTime": "2024-05-21T12:46:44.513552+00:00", "EventTime": "2024-05-21T12:46:44.513574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvV1LaaWN6eZUOX8"], "accumulated_threat_level": 1.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "e1a14f77-d36d-41de-920a-23bba971f517", "DetectTime": "2024-05-21T12:46:44.818893+00:00", "EventTime": "2024-05-21T12:46:44.818916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedGZFGjE0XmfjhOb"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "ff348b55-27b4-4e00-92e8-603a9795530b", "DetectTime": "2024-05-21T12:46:44.824908+00:00", "EventTime": "2024-05-21T12:46:44.824932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQt3qv3ePWKEU0oMW1"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "2ffdd239-d750-4467-b160-71b76dbbf89e", "DetectTime": "2024-05-21T12:46:44.829950+00:00", "EventTime": "2024-05-21T12:46:44.829971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ivMI3hm9LR6PvQAe"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "c65e1984-556a-47f6-a7e9-06f345a10dc4", "DetectTime": "2024-05-21T12:46:44.858921+00:00", "EventTime": "2024-05-21T12:46:44.858945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjXfkf2N62MiWqHrl4"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "42582057-d87d-4843-a86d-d5120deaa588", "DetectTime": "2024-05-21T12:46:44.871336+00:00", "EventTime": "2024-05-21T12:46:44.871356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYAVaabRwjMPYoZg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 150} +{"Format": "IDEA0", "ID": "40353460-8372-4c1a-bc81-c7c81ce5ce5f", "DetectTime": "2024-05-21T12:46:45.005434+00:00", "EventTime": "2024-05-21T12:46:45.005454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSzKWc4OsbA2pP6pda"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "48e6ed2d-f74b-4ec6-9d2d-4b38bcce688c", "DetectTime": "2024-05-21T12:46:45.010317+00:00", "EventTime": "2024-05-21T12:46:45.010336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54J042NKLs3Ht2cR9"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "e1470956-2e3e-4bbd-99d7-54bdd11ea85c", "DetectTime": "2024-05-21T12:46:45.337163+00:00", "EventTime": "2024-05-21T12:46:45.337188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHs7gYIs5kw1q370f"], "accumulated_threat_level": 3.2, "timewindow": 150} +{"Format": "IDEA0", "ID": "a545dd22-0a88-44a6-9aca-c28ddb189d08", "DetectTime": "2024-05-21T12:46:45.387208+00:00", "EventTime": "2024-05-21T12:46:45.387228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPTOvg8Vo1t4Eskk"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "cfb3446f-ca7a-4061-ad3b-4b1198a732dd", "DetectTime": "2024-05-21T12:46:45.393124+00:00", "EventTime": "2024-05-21T12:46:45.393146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnTTn4jp76VPj0kPd"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "e650413c-c3c9-4ede-a95f-ec3cef1c4dbc", "DetectTime": "2024-05-21T12:46:45.398198+00:00", "EventTime": "2024-05-21T12:46:45.398217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVtZxPqV3UXynW9ri"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "002d767e-9e74-4ce2-be3a-b56155666bbe", "DetectTime": "2024-05-21T12:46:45.404488+00:00", "EventTime": "2024-05-21T12:46:45.404506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtf3Z3VFwNvrMcJ95"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "f4f87250-3452-4f0a-9b6b-79a3a5742550", "DetectTime": "2024-05-21T12:46:45.656889+00:00", "EventTime": "2024-05-21T12:46:45.656910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTkIuwGfqsDXLGCii"], "accumulated_threat_level": 4.0, "timewindow": 150} +{"Format": "IDEA0", "ID": "77f84cdb-1995-4a90-8984-479ba6be0f3e", "DetectTime": "2024-05-21T12:46:45.967466+00:00", "EventTime": "2024-05-21T12:46:45.967485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFkr02G2DwMKTgzqh"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "55c7cf53-1836-47f7-9087-8a57628c43b4", "DetectTime": "2024-05-21T12:46:45.972294+00:00", "EventTime": "2024-05-21T12:46:45.972311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHcDdsBDihlqVXf9"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "2ae8e02c-9413-4c33-9dba-1ab134d688ce", "DetectTime": "2024-05-21T12:46:46.083678+00:00", "EventTime": "2024-05-21T12:46:46.083701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUwKWI1JEq0W8kn0kc"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "8155d1fb-c68b-4a2d-8aad-2ef6c3e5a5c4", "DetectTime": "2024-05-21T12:46:46.089449+00:00", "EventTime": "2024-05-21T12:46:46.089469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRncg3FPlFX1R2nyc"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "c59484b6-85ef-4220-99af-6e69fed85aed", "DetectTime": "2024-05-21T12:46:46.094018+00:00", "EventTime": "2024-05-21T12:46:46.094036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP0di5350hshe8PGOe"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "c7fa8bd8-2557-4451-9f95-8bb29520ec70", "DetectTime": "2024-05-21T12:46:46.099347+00:00", "EventTime": "2024-05-21T12:46:46.099365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduPJn2TJrREksREr1"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "cb363c39-e145-4170-8057-a324fafa9000", "DetectTime": "2024-05-21T12:46:46.162834+00:00", "EventTime": "2024-05-21T12:46:46.162861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwy13GfPvQayIsZN5"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "e5ed6ae2-2666-4c3b-b109-9086aed4a037", "DetectTime": "2024-05-21T12:46:46.175069+00:00", "EventTime": "2024-05-21T12:46:46.175089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXf9o5ptJtU9aGAk"], "accumulated_threat_level": 4.8, "timewindow": 150} +{"Format": "IDEA0", "ID": "47e23022-06ce-4815-9be1-f881beb1230a", "DetectTime": "2024-05-21T12:46:46.559440+00:00", "EventTime": "2024-05-21T12:46:46.559468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4uk14h64HPQPJLKc"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "df98a606-0598-47fe-834b-96bb7bc67823", "DetectTime": "2024-05-21T12:46:46.565461+00:00", "EventTime": "2024-05-21T12:46:46.565483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7qrbX31tgyQ02urCf"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "7d8473a7-ef6f-41c2-9e36-92905162c732", "DetectTime": "2024-05-21T12:46:46.570072+00:00", "EventTime": "2024-05-21T12:46:46.570091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWEyab3Ie4zv9EdIW8"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "4d8fac26-3082-4b87-ac2e-67fe9c1a93a6", "DetectTime": "2024-05-21T12:46:46.574503+00:00", "EventTime": "2024-05-21T12:46:46.574522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeGdnc2RGKPLlO88Rf"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "6eb4f060-93f9-4d7e-8c74-b775891b05bd", "DetectTime": "2024-05-21T12:46:46.634331+00:00", "EventTime": "2024-05-21T12:46:46.634352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAk664VSw0dbVy7f"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "9f956c22-f9ee-410c-b7bf-e344cc948169", "DetectTime": "2024-05-21T12:46:46.710868+00:00", "EventTime": "2024-05-21T12:46:46.710888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx9lrizMrGpbC3wvh"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "94166e11-9074-4e70-9d8e-1876eddd042c", "DetectTime": "2024-05-21T12:46:47.053316+00:00", "EventTime": "2024-05-21T12:46:47.053337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTGnZz1DBviLNkSba"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "97deb384-589c-40af-a5c3-1473354017a8", "DetectTime": "2024-05-21T12:46:47.058752+00:00", "EventTime": "2024-05-21T12:46:47.058772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBq2c3oZjOzoM2YPk"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "12e50c48-c3ff-459c-90fe-8843d603dbc8", "DetectTime": "2024-05-21T12:46:47.064444+00:00", "EventTime": "2024-05-21T12:46:47.064463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilLEo1HwDijxK5T92"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "5938f620-a2e5-46dd-8abc-5cfdb550f6b0", "DetectTime": "2024-05-21T12:46:47.069369+00:00", "EventTime": "2024-05-21T12:46:47.069393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrvte4yUPd8kDsLk5"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "04b7fc89-ed3d-411f-889e-113f84b8ac8d", "DetectTime": "2024-05-21T12:46:47.074741+00:00", "EventTime": "2024-05-21T12:46:47.074763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZifrbbxNu6DdhI06"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "08a98237-c5a8-4dfe-9970-2a0b9741ec6c", "DetectTime": "2024-05-21T12:46:47.099491+00:00", "EventTime": "2024-05-21T12:46:47.099513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuowDH1rLcHKhMLNi"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "36f317ce-22cc-4ea3-a531-84f2d838b7c2", "DetectTime": "2024-05-21T12:46:47.574290+00:00", "EventTime": "2024-05-21T12:46:47.574311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKLoA3NiE6TDyqXFb"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "f71fe7c7-f558-4908-91b8-a95512eab0f7", "DetectTime": "2024-05-21T12:46:47.582228+00:00", "EventTime": "2024-05-21T12:46:47.582247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQwU7D3yKbi83Niijd"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "24364eef-3731-4214-b4e6-c4bb3ebf1eac", "DetectTime": "2024-05-21T12:46:47.586873+00:00", "EventTime": "2024-05-21T12:46:47.586892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBXx62nUS4vtF9Xea"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "b1430a42-6e03-4e79-8942-f1cbafcd7e0c", "DetectTime": "2024-05-21T12:46:47.591716+00:00", "EventTime": "2024-05-21T12:46:47.591736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMvi5ZkUraAwlBWf"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "25d7edad-c153-40a6-961c-3dd6adb4f172", "DetectTime": "2024-05-21T12:46:47.598338+00:00", "EventTime": "2024-05-21T12:46:47.598355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CPSa1vswVp7UzHT7"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "121268db-9329-48f5-a50f-d408495b0c85", "DetectTime": "2024-05-21T12:46:47.792306+00:00", "EventTime": "2024-05-21T12:46:47.792330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9PCez13aFhZ6ZSpS9"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "af15d4ea-d1b7-417d-912f-ee0b7a1aa883", "DetectTime": "2024-05-21T12:46:47.797492+00:00", "EventTime": "2024-05-21T12:46:47.797512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbUzX2dUDhgkYqbZ3"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "95c891a5-e607-4313-a350-19a578542a06", "DetectTime": "2024-05-21T12:46:47.802682+00:00", "EventTime": "2024-05-21T12:46:47.802707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxa8di2rGycDrqKlPh"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "dfa91752-ca32-437f-b717-378e926f8d23", "DetectTime": "2024-05-21T12:46:48.112611+00:00", "EventTime": "2024-05-21T12:46:48.112635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBBTwB020vcyUna"], "accumulated_threat_level": 1.3, "timewindow": 151} +{"Format": "IDEA0", "ID": "a768d341-1657-4240-b723-eb178194e5f0", "DetectTime": "2024-05-21T12:46:48.196500+00:00", "EventTime": "2024-05-21T12:46:48.196525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOfPH1hKWoYD9Rusj"], "accumulated_threat_level": 5.6, "timewindow": 148} +{"Format": "IDEA0", "ID": "da25d4e5-8aa8-42ca-925c-9f43d97b20e5", "DetectTime": "2024-05-21T12:46:48.202499+00:00", "EventTime": "2024-05-21T12:46:48.202520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbuS8j2bpP1hKewvp5"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "9133b4c5-c97f-4e91-8e8b-88454ee89dac", "DetectTime": "2024-05-21T12:46:48.272381+00:00", "EventTime": "2024-05-21T12:46:48.272400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFF4i2ePqZ3dSM6a8"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "219e4435-c989-4f40-861d-2b73b63e5b31", "DetectTime": "2024-05-21T12:46:48.295793+00:00", "EventTime": "2024-05-21T12:46:48.295822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq3xtD1lcV3GDyuVQa"], "accumulated_threat_level": 2.1, "timewindow": 151} +{"Format": "IDEA0", "ID": "4dae04f9-c412-411a-8a75-70dc32615f00", "DetectTime": "2024-05-21T12:46:48.300807+00:00", "EventTime": "2024-05-21T12:46:48.300827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRS2E4IgtTJJ61Y6c"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "9aefc5d0-eaf3-480a-ac1a-eca477e2113c", "DetectTime": "2024-05-21T12:46:48.622195+00:00", "EventTime": "2024-05-21T12:46:48.622215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoURSW19ZycDO1XjK5"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "5f7a56f8-5537-4580-980e-50d78b5d9f86", "DetectTime": "2024-05-21T12:46:48.641587+00:00", "EventTime": "2024-05-21T12:46:48.641607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwoo682r71KmPizvtb"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "d4fb9477-0977-4dbc-b8cb-ada6fbca8aad", "DetectTime": "2024-05-21T12:46:48.742452+00:00", "EventTime": "2024-05-21T12:46:48.742472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA47GYzhKf2g8pZTg"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "95ede12b-c256-4834-987f-66a90b678141", "DetectTime": "2024-05-21T12:46:48.749817+00:00", "EventTime": "2024-05-21T12:46:48.749845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YVy9uUNZ6iJU61j"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "b1f32829-e3b4-4cc7-8d92-c91c2607cf94", "DetectTime": "2024-05-21T12:46:48.754899+00:00", "EventTime": "2024-05-21T12:46:48.754918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmrxB73BDYWkcB6JKg"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "67826101-e771-4c73-929d-e04ec5aa9c1a", "DetectTime": "2024-05-21T12:46:48.759574+00:00", "EventTime": "2024-05-21T12:46:48.759592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd7CFs4d3BjbP3w2A4"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "c8b8708b-b64d-447c-ac45-6b16976a1bea", "DetectTime": "2024-05-21T12:46:48.770097+00:00", "EventTime": "2024-05-21T12:46:48.770115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pL0k3kvVQqhX7J1b"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 151} +{"Format": "IDEA0", "ID": "798f43df-90d4-45e4-807a-4b31ec143db9", "DetectTime": "2024-05-21T12:46:49.210154+00:00", "EventTime": "2024-05-21T12:46:49.210177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUkrze3TwdbXcLdCp4"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "7112d720-e219-46ef-9a9d-8abf220ed73f", "DetectTime": "2024-05-21T12:46:49.217038+00:00", "EventTime": "2024-05-21T12:46:49.217063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdUeD134wLDTBGZqg"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "70ab475a-ce91-4935-8306-a2e7647d53a5", "DetectTime": "2024-05-21T12:46:49.222901+00:00", "EventTime": "2024-05-21T12:46:49.222922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDpShu2dZiY7nc0zZb"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "23dc4b7b-2919-4cc5-b4dc-675314d272bf", "DetectTime": "2024-05-21T12:46:49.228021+00:00", "EventTime": "2024-05-21T12:46:49.228040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS3L8P2w6roJspPvFj"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "e994907b-7e9b-4edd-9cf0-6e5650f184c3", "DetectTime": "2024-05-21T12:46:49.233017+00:00", "EventTime": "2024-05-21T12:46:49.233036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFTIzky0vnWpe6El"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "59c9220c-cbff-4c5c-9cd8-e724b2157e15", "DetectTime": "2024-05-21T12:46:49.237912+00:00", "EventTime": "2024-05-21T12:46:49.237930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mbqb1zVbDcIx5Fh6"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "775a2d17-3d1d-459f-b379-4a2c7b247c23", "DetectTime": "2024-05-21T12:46:49.243102+00:00", "EventTime": "2024-05-21T12:46:49.243136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cygejq3dgYEPGYPUfk"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "34e6108d-fbc4-48b4-a40e-9b14335fac18", "DetectTime": "2024-05-21T12:46:49.320876+00:00", "EventTime": "2024-05-21T12:46:49.320901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgLLK2cEJ7xW3Hdy4"], "accumulated_threat_level": 3.7, "timewindow": 151} +{"Format": "IDEA0", "ID": "da916862-9dd3-4237-8368-919a7fd168a9", "DetectTime": "2024-05-21T12:46:49.552591+00:00", "EventTime": "2024-05-21T12:46:49.552616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cku3hD4tYlf7X1ZQrl", "CUS8dj3nUMN9zXuXzd", "CLZuih4csgfFh641mh", "CKMXyV2gAnelvWRZx6"], "accumulated_threat_level": 0.5, "timewindow": 155} +{"Format": "IDEA0", "ID": "66847371-41d4-4e7d-bcbf-b02c899059be", "DetectTime": "2024-05-21T12:46:49.711393+00:00", "EventTime": "2024-05-21T12:46:49.711414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDiajS2PTSgHM79Cjl"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "f7148d4f-55cd-4911-b1f2-a93dbed2229b", "DetectTime": "2024-05-21T12:46:49.721494+00:00", "EventTime": "2024-05-21T12:46:49.721513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYDxn445IxjNo66pk9"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "11511d49-577a-4fcd-8bd5-116c706d3b31", "DetectTime": "2024-05-21T12:46:49.740923+00:00", "EventTime": "2024-05-21T12:46:49.740945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjYRxW1NTncJEb14D2"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "03633a2b-9170-47a6-a3de-b43f9b64a7d6", "DetectTime": "2024-05-21T12:46:49.766257+00:00", "EventTime": "2024-05-21T12:46:49.766281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOKy51TLWlOZjoZi2"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "7cee9b27-9c16-4465-b65c-ee8238d62874", "DetectTime": "2024-05-21T12:46:49.779388+00:00", "EventTime": "2024-05-21T12:46:49.779407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Et2o2Wl8ggPDpENc"], "accumulated_threat_level": 4.5, "timewindow": 151} +{"Format": "IDEA0", "ID": "2889719b-b12c-46e5-87af-04a3d1f4e820", "DetectTime": "2024-05-21T12:46:49.783996+00:00", "EventTime": "2024-05-21T12:46:49.784013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9vEZv1qkO46SZDBR1"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "be559895-15ab-4004-a0c9-1143f8e29e55", "DetectTime": "2024-05-21T12:46:50.202070+00:00", "EventTime": "2024-05-21T12:46:50.202094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcIVhh3ndjURc7B0Tl"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "3a3a783b-bd27-412a-970a-bc9e7745ac20", "DetectTime": "2024-05-21T12:46:50.265216+00:00", "EventTime": "2024-05-21T12:46:50.265236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cx902ctQeUZYwYg7"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "9f328e73-0bed-4a10-addd-5f34949e6a30", "DetectTime": "2024-05-21T12:46:50.270902+00:00", "EventTime": "2024-05-21T12:46:50.270921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVMGbjbZkmdf7UOk"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "d88af4b0-b557-4f75-8253-37f6526fbf62", "DetectTime": "2024-05-21T12:46:50.276374+00:00", "EventTime": "2024-05-21T12:46:50.276393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzSGZV0IExRxVP8X1"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "d9b5028b-d47d-4893-87fb-52c12aab5456", "DetectTime": "2024-05-21T12:46:50.371957+00:00", "EventTime": "2024-05-21T12:46:50.371993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["188.54.61.128"]}], "Attach": [{"Content": "Connection to unknown destination port 10047/UDP destination IP 188.54.61.128. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04uSp2aQtLKBWerPj"], "accumulated_threat_level": 5.3, "timewindow": 151} +{"Format": "IDEA0", "ID": "05d07cda-048a-4efa-a329-529454a988af", "DetectTime": "2024-05-21T12:46:50.512708+00:00", "EventTime": "2024-05-21T12:46:50.512731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7VngR2SNwD58zUFUb"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "353a4eb3-c29d-4928-ba56-721f5d7f12e1", "DetectTime": "2024-05-21T12:46:50.518242+00:00", "EventTime": "2024-05-21T12:46:50.518263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgzR4s2jV6IiHx8Vik"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "b7ecad17-7f4b-4475-ae69-2b7510603d94", "DetectTime": "2024-05-21T12:46:50.528794+00:00", "EventTime": "2024-05-21T12:46:50.528815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4NGl28TXDk5BMER7"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "f7a4ace4-0b03-4357-a2ab-dfb5051e15cd", "DetectTime": "2024-05-21T12:46:50.680468+00:00", "EventTime": "2024-05-21T12:46:50.680486+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["112.134.193.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.134.193.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbc10Y1ManNrz6mNAa"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "3b46808a-809b-4aa8-8c93-0fefa20335dd", "DetectTime": "2024-05-21T12:46:50.692530+00:00", "EventTime": "2024-05-21T12:46:50.692549+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["112.134.193.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.134.193.60 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbc10Y1ManNrz6mNAa"], "accumulated_threat_level": 2.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "9506dd8b-cc15-44d5-ad9b-cfbe915fa4c7", "DetectTime": "2024-05-21T12:46:50.788798+00:00", "EventTime": "2024-05-21T12:46:50.788821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkXBpk16JP4uPURdC9"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "68dcd5d5-c2f4-48ec-8a66-e7d82b623881", "DetectTime": "2024-05-21T12:46:50.821860+00:00", "EventTime": "2024-05-21T12:46:50.821882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz4P1n1iCcqhhfjNF4"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "71627596-dec9-44ce-849a-ebe50789a3f1", "DetectTime": "2024-05-21T12:46:50.885775+00:00", "EventTime": "2024-05-21T12:46:50.885798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD5Tj54oaVXdpaLCv9"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "8841dd1d-d0da-4e87-a9e4-6ce8582fcdf3", "DetectTime": "2024-05-21T12:46:50.958351+00:00", "EventTime": "2024-05-21T12:46:50.958371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGSRO1Cistuyw9yp"], "accumulated_threat_level": 6.1, "timewindow": 151} +{"Format": "IDEA0", "ID": "3c60b84c-fb3c-4b85-9b88-769561c96c86", "DetectTime": "2024-05-21T12:46:51.046239+00:00", "EventTime": "2024-05-21T12:46:51.046260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYn3am1zr7unQKULl7"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "aa9b9ce7-35d2-418a-a155-83bb420e89be", "DetectTime": "2024-05-21T12:46:51.052219+00:00", "EventTime": "2024-05-21T12:46:51.052240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClCsNc2FtJsAZmnTdl"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "1e898950-37e0-4881-ba89-1009991632a9", "DetectTime": "2024-05-21T12:46:51.094432+00:00", "EventTime": "2024-05-21T12:46:51.094458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK3yJt4LXDg9JzucKh"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "1d238c74-4340-4f86-a9b6-0cd29199dfc0", "DetectTime": "2024-05-21T12:46:51.103458+00:00", "EventTime": "2024-05-21T12:46:51.103481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8caKW3OECQK9BJ2Wb"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "ebeb4f30-662e-4a97-8cc9-e67146724486", "DetectTime": "2024-05-21T12:46:51.138152+00:00", "EventTime": "2024-05-21T12:46:51.138170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CitWyU3F88WMeePTXl"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "021ce3f6-a084-48d2-a55e-8d7793e066dc", "DetectTime": "2024-05-21T12:46:51.151009+00:00", "EventTime": "2024-05-21T12:46:51.151029+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CitWyU3F88WMeePTXl"], "accumulated_threat_level": 3.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "d82280df-f75f-4492-95ef-0009f35e6761", "DetectTime": "2024-05-21T12:46:51.205540+00:00", "EventTime": "2024-05-21T12:46:51.205560+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBFVo3hN6Yox56Bbd"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "739314ab-ae1e-4b81-bfa0-a6e142f84418", "DetectTime": "2024-05-21T12:46:51.217908+00:00", "EventTime": "2024-05-21T12:46:51.217927+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBFVo3hN6Yox56Bbd"], "accumulated_threat_level": 3.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "298e73a4-d363-4703-99f9-8ffda4d488e5", "DetectTime": "2024-05-21T12:46:51.251220+00:00", "EventTime": "2024-05-21T12:46:51.251243+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.226.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYufm61d4tRnv9SLLb"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "3d4da32d-8c2f-4ba4-be9d-d7b2000f90b2", "DetectTime": "2024-05-21T12:46:51.265675+00:00", "EventTime": "2024-05-21T12:46:51.265697+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYufm61d4tRnv9SLLb"], "accumulated_threat_level": 4.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "6c9310e4-6fe3-4793-9b10-6811aecf5b66", "DetectTime": "2024-05-21T12:46:51.293387+00:00", "EventTime": "2024-05-21T12:46:51.293405+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.248.7.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcS4Ly1slvELQSTHIk"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "a49909db-d1da-4969-ac8d-22362d2054e7", "DetectTime": "2024-05-21T12:46:51.305728+00:00", "EventTime": "2024-05-21T12:46:51.305747+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcS4Ly1slvELQSTHIk"], "accumulated_threat_level": 4.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "12d55101-3291-44d3-b77c-110d4986c16c", "DetectTime": "2024-05-21T12:46:51.337261+00:00", "EventTime": "2024-05-21T12:46:51.337281+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoozY3TYlDHR73Icf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "1db1e42e-c848-4d35-9f29-2d3802e3a4dc", "DetectTime": "2024-05-21T12:46:51.350015+00:00", "EventTime": "2024-05-21T12:46:51.350037+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoozY3TYlDHR73Icf"], "accumulated_threat_level": 5.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "ef35a8ac-0def-4475-98a1-cebe0feaff45", "DetectTime": "2024-05-21T12:46:51.403731+00:00", "EventTime": "2024-05-21T12:46:51.403753+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7qBY23x46ZUdjfil"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "7936044d-a292-440f-9acf-f2daf353d4a1", "DetectTime": "2024-05-21T12:46:51.420271+00:00", "EventTime": "2024-05-21T12:46:51.420310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7qBY23x46ZUdjfil"], "accumulated_threat_level": 5.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "f6e5b2c7-5761-4b3d-b54b-1fd0169da258", "DetectTime": "2024-05-21T12:46:51.443037+00:00", "EventTime": "2024-05-21T12:46:51.443060+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8yUQ1pkt8H7YuiT2"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "178d97df-c0aa-40b3-b75d-38578ca2fb63", "DetectTime": "2024-05-21T12:46:51.457066+00:00", "EventTime": "2024-05-21T12:46:51.457102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8yUQ1pkt8H7YuiT2"], "accumulated_threat_level": 6.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "d6011480-0598-4340-8e89-111b68ff0ddf", "DetectTime": "2024-05-21T12:46:51.486676+00:00", "EventTime": "2024-05-21T12:46:51.486702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJbIB84BYuz88Ma0id"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "b67b16ff-dbc6-410b-88fa-4c4b9e337531", "DetectTime": "2024-05-21T12:46:51.507166+00:00", "EventTime": "2024-05-21T12:46:51.507186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzDSsW1fjyVqJUabBb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 151} +{"Format": "IDEA0", "ID": "44ba0f20-d2fe-4c17-bc72-49c37478d1b3", "DetectTime": "2024-05-21T12:46:51.527508+00:00", "EventTime": "2024-05-21T12:46:51.527532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2smc3W7GHRR4bzml"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "ba176549-8d6c-432a-a1a2-73ca686556be", "DetectTime": "2024-05-21T12:46:51.549856+00:00", "EventTime": "2024-05-21T12:46:51.549878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETmw33L5aJ33nPiY7"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "068f5ab4-ea53-4249-bb6d-b781b2ddf609", "DetectTime": "2024-05-21T12:46:51.571474+00:00", "EventTime": "2024-05-21T12:46:51.571495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzVyD38fCevFbrFNi"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "5a5517fa-e341-4b34-a6d3-71e98cd20b13", "DetectTime": "2024-05-21T12:46:51.701498+00:00", "EventTime": "2024-05-21T12:46:51.701521+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0OvdWhYDDIiTLxb"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "9f8e28a8-6694-4a8a-a6c5-87cddb1c6b4c", "DetectTime": "2024-05-21T12:46:51.713506+00:00", "EventTime": "2024-05-21T12:46:51.713525+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0OvdWhYDDIiTLxb"], "accumulated_threat_level": 6.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "2dae9649-321a-44e7-b2d1-4bdec80bdf02", "DetectTime": "2024-05-21T12:46:51.718482+00:00", "EventTime": "2024-05-21T12:46:51.718500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1UCf4dJXW3N6MMC"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "1a1f5607-6de8-4881-b452-6c208d32449e", "DetectTime": "2024-05-21T12:46:51.769709+00:00", "EventTime": "2024-05-21T12:46:51.769729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHxCp175potDt8LK6"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "d4cbc879-92f8-4003-a236-3db95b091cd7", "DetectTime": "2024-05-21T12:46:51.781595+00:00", "EventTime": "2024-05-21T12:46:51.781615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHxCp175potDt8LK6"], "accumulated_threat_level": 7.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "441d1f98-6296-4e9c-8a90-38b814a07896", "DetectTime": "2024-05-21T12:46:51.809825+00:00", "EventTime": "2024-05-21T12:46:51.809844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ESSsUtAROKwuw6d"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "e31467f8-6a65-49ac-8abe-bf890d85fad6", "DetectTime": "2024-05-21T12:46:51.823404+00:00", "EventTime": "2024-05-21T12:46:51.823427+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ESSsUtAROKwuw6d"], "accumulated_threat_level": 7.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "2dd4724e-4141-47b1-909c-a3f3881b4a83", "DetectTime": "2024-05-21T12:46:51.850073+00:00", "EventTime": "2024-05-21T12:46:51.850091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5vfW1vDy2vpaDrS6"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "a2d5e446-e69d-484b-9dca-8156dee5a879", "DetectTime": "2024-05-21T12:46:51.862844+00:00", "EventTime": "2024-05-21T12:46:51.862864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA5vfW1vDy2vpaDrS6"], "accumulated_threat_level": 8.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "4422867f-2773-4b89-bed5-8eb1c42318eb", "DetectTime": "2024-05-21T12:46:51.891420+00:00", "EventTime": "2024-05-21T12:46:51.891443+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQ5Hm4CbHSrHf8Bk5"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "1bac7d43-e076-4c27-9594-076da298e58d", "DetectTime": "2024-05-21T12:46:51.906240+00:00", "EventTime": "2024-05-21T12:46:51.906261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQ5Hm4CbHSrHf8Bk5"], "accumulated_threat_level": 8.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "52010dbd-eb22-4603-add0-a2a6d5921796", "DetectTime": "2024-05-21T12:46:51.935418+00:00", "EventTime": "2024-05-21T12:46:51.935439+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cztoeb1wVeF4UXl9w4"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "1127a620-65b2-4e68-926b-71fb49c5fa87", "DetectTime": "2024-05-21T12:46:51.947718+00:00", "EventTime": "2024-05-21T12:46:51.947738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cztoeb1wVeF4UXl9w4"], "accumulated_threat_level": 9.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "4db7d4b1-5d9b-45b3-87d6-c38e405067aa", "DetectTime": "2024-05-21T12:46:51.952674+00:00", "EventTime": "2024-05-21T12:46:51.952692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FafWTSB1BUy6Xrc"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "ea93ac28-5588-4b0b-99c0-e77fb0de5903", "DetectTime": "2024-05-21T12:46:51.957316+00:00", "EventTime": "2024-05-21T12:46:51.957335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3c2Z8lLrP4KQYvf"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "234de02f-b5f3-43ac-a49b-4991b1c7174e", "DetectTime": "2024-05-21T12:46:51.964177+00:00", "EventTime": "2024-05-21T12:46:51.964196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoUqMW1D318P7Lmeaj"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "f8a3a515-0b37-4153-ab68-9c72d70e3193", "DetectTime": "2024-05-21T12:46:51.978931+00:00", "EventTime": "2024-05-21T12:46:51.978958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7Oho2ceetexXDSxl"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "88cda0ea-9c10-40b4-bbb9-3ff8b2fcacd2", "DetectTime": "2024-05-21T12:46:52.157745+00:00", "EventTime": "2024-05-21T12:46:52.157764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwU98s3VuNCF8qHvRf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "3d430db0-122d-4559-aa7e-af3886974014", "DetectTime": "2024-05-21T12:46:52.170238+00:00", "EventTime": "2024-05-21T12:46:52.170257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpfYiDQz88vLef94"], "accumulated_threat_level": 7.699999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "a65d2ab7-e973-40c4-b4da-a4f7071e380b", "DetectTime": "2024-05-21T12:46:52.183291+00:00", "EventTime": "2024-05-21T12:46:52.183314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwU98s3VuNCF8qHvRf"], "accumulated_threat_level": 9.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "78f26519-8beb-4339-b111-43e4d604ff0c", "DetectTime": "2024-05-21T12:46:52.188546+00:00", "EventTime": "2024-05-21T12:46:52.188570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8rzwr4vbrlD8TWrA6"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "b6835e50-84af-4ec4-88b7-9a17301bb9c6", "DetectTime": "2024-05-21T12:46:52.193861+00:00", "EventTime": "2024-05-21T12:46:52.193879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU2hn4awRMQyyw2wa"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "75c5c577-ee8b-4ffb-9f2a-01f37d2363ef", "DetectTime": "2024-05-21T12:46:52.225814+00:00", "EventTime": "2024-05-21T12:46:52.225833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPpza3F2w2ZuBRve"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0aa59dcb-1460-4762-b881-d11d8b715cc2", "DetectTime": "2024-05-21T12:46:52.230615+00:00", "EventTime": "2024-05-21T12:46:52.230642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyDEC4fckINlL4283"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "9c2cef61-2e0d-448a-8f40-b2df2ff01fbb", "DetectTime": "2024-05-21T12:46:52.244965+00:00", "EventTime": "2024-05-21T12:46:52.244986+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdPpza3F2w2ZuBRve"], "accumulated_threat_level": 10.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "4be25a06-fd93-4e26-9234-85b179447b1a", "DetectTime": "2024-05-21T12:46:52.268404+00:00", "EventTime": "2024-05-21T12:46:52.268424+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.205.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGk2WsuWzcBVAXPl"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "53488c7d-fd34-47e7-ab05-50af73361d6c", "DetectTime": "2024-05-21T12:46:52.281247+00:00", "EventTime": "2024-05-21T12:46:52.281268+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.205.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGk2WsuWzcBVAXPl"], "accumulated_threat_level": 10.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "9b9f9429-7945-4329-a1ef-470553f4edb1", "DetectTime": "2024-05-21T12:46:52.285862+00:00", "EventTime": "2024-05-21T12:46:52.285880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF1AxvublGQcETCXi"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "0cbc6379-c9ae-488a-8ca5-41d9c19fbd13", "DetectTime": "2024-05-21T12:46:52.482598+00:00", "EventTime": "2024-05-21T12:46:52.482619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqf9jH3ClVfyQNmjUa"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "fbdc74cb-6db6-4285-bf54-e6b5ac1ada42", "DetectTime": "2024-05-21T12:46:52.566818+00:00", "EventTime": "2024-05-21T12:46:52.566843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cawdt43EgeELJPJux1"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "4e341733-e629-441c-8635-fc5fe074c8dd", "DetectTime": "2024-05-21T12:46:52.573331+00:00", "EventTime": "2024-05-21T12:46:52.573354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDBG53KiJUPuq1d82"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "9e730e54-32b8-4b20-9e0d-8a20d4a19978", "DetectTime": "2024-05-21T12:46:52.768194+00:00", "EventTime": "2024-05-21T12:46:52.768217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNAflu2Eoo1V4RHK27"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "6b000613-236c-4bb2-9e7c-a592c4d3dba5", "DetectTime": "2024-05-21T12:46:52.833102+00:00", "EventTime": "2024-05-21T12:46:52.833123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS4vjB10IiuMv7xY71"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1ced80af-902d-44d5-8ef9-83188474e050", "DetectTime": "2024-05-21T12:46:52.839285+00:00", "EventTime": "2024-05-21T12:46:52.839305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXrpcA4MJeeyWBRju7"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "99050ebc-a036-4f27-ad08-a883d5a7a9c4", "DetectTime": "2024-05-21T12:46:52.843871+00:00", "EventTime": "2024-05-21T12:46:52.843890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSXcA14hwuwjQW6Ei"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "ff75f97d-b90a-4658-b5bd-fee74b617145", "DetectTime": "2024-05-21T12:46:52.855876+00:00", "EventTime": "2024-05-21T12:46:52.855894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxrQ6Vuhdk1Z4p3c"], "accumulated_threat_level": 8.5, "timewindow": 151} +{"Format": "IDEA0", "ID": "8006fb24-c659-4d00-b284-efb03417681b", "DetectTime": "2024-05-21T12:46:52.860693+00:00", "EventTime": "2024-05-21T12:46:52.860710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNmk434M5OOqeN2LXb"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "de249d5f-1ccc-4870-9282-0edc9dc54e50", "DetectTime": "2024-05-21T12:46:53.057534+00:00", "EventTime": "2024-05-21T12:46:53.057556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSz6k1xH9ued3AY95"], "accumulated_threat_level": 4.0, "timewindow": 149} +{"Format": "IDEA0", "ID": "6637dcf9-24d2-4d82-845f-6d9af71a55ab", "DetectTime": "2024-05-21T12:46:53.217420+00:00", "EventTime": "2024-05-21T12:46:53.217443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C317NWYWhLvWF1Qp5"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "3fcc3a28-d4a5-486c-982d-0cfb09695512", "DetectTime": "2024-05-21T12:46:53.338246+00:00", "EventTime": "2024-05-21T12:46:53.338267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjguC33HXnLgF3xfhk"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "c88f91ff-dcc5-49f2-9c7f-302ca5b8c9f7", "DetectTime": "2024-05-21T12:46:53.350860+00:00", "EventTime": "2024-05-21T12:46:53.350882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiXz1E12qjF7DsbtNa"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "c14b62a8-2444-4c13-b466-15f1d98a2053", "DetectTime": "2024-05-21T12:46:53.355624+00:00", "EventTime": "2024-05-21T12:46:53.355642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQsTDA4PTq7qbaRbOg"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "62fd3aac-de1e-460f-9fed-05e9b4beb2a2", "DetectTime": "2024-05-21T12:46:53.582159+00:00", "EventTime": "2024-05-21T12:46:53.582180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvfpdv0IgHjtHcQ"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "de6cfb76-df2e-4ff5-a10b-c9eb372d9d2b", "DetectTime": "2024-05-21T12:46:53.612258+00:00", "EventTime": "2024-05-21T12:46:53.612279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CABNB01XNenfdJslY3"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1e6288ac-1e25-4db7-9f88-7d53b392f2c7", "DetectTime": "2024-05-21T12:46:53.617249+00:00", "EventTime": "2024-05-21T12:46:53.617269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD3I4q2ZJYOjC5qxqb"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "5d67f169-edf9-4e50-93b4-071dc7444d2f", "DetectTime": "2024-05-21T12:46:53.664192+00:00", "EventTime": "2024-05-21T12:46:53.664214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzopC92Rq5CHolmkEl"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "7c941553-5279-4508-9706-43f886ebc48c", "DetectTime": "2024-05-21T12:46:53.837766+00:00", "EventTime": "2024-05-21T12:46:53.837786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmU4F1E1L7y9To0C7"], "accumulated_threat_level": 9.3, "timewindow": 151} +{"Format": "IDEA0", "ID": "af84a1f1-1fcc-4bdd-bbaf-59bae51929f9", "DetectTime": "2024-05-21T12:46:54.171380+00:00", "EventTime": "2024-05-21T12:46:54.171406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfzVmb3nwrysGdM9ob"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "27006810-5dec-48bf-b5cb-d8c9c4472472", "DetectTime": "2024-05-21T12:46:54.177323+00:00", "EventTime": "2024-05-21T12:46:54.177343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CucMMr4eZpcT5Rkzbf"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1920aeab-3866-4e06-b8d5-bc735e170e8f", "DetectTime": "2024-05-21T12:46:54.227675+00:00", "EventTime": "2024-05-21T12:46:54.227696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgmUZ3nKbgcTH6f99"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "7aff41e7-7167-48c3-8084-610e846762af", "DetectTime": "2024-05-21T12:46:54.233535+00:00", "EventTime": "2024-05-21T12:46:54.233554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C012qr1rzseUgzavpa"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "329df65c-976d-4c82-83b8-6f8f14d3ef9c", "DetectTime": "2024-05-21T12:46:54.318459+00:00", "EventTime": "2024-05-21T12:46:54.318483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHJ5615l1HnygjnJ6"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "876adab4-58af-4f5a-be9c-25b21890df8c", "DetectTime": "2024-05-21T12:46:54.323927+00:00", "EventTime": "2024-05-21T12:46:54.323948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckpfgz1kWhsN4rbtV5"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "5bcaf088-30c0-4d05-9a91-4d39c96a101c", "DetectTime": "2024-05-21T12:46:54.330373+00:00", "EventTime": "2024-05-21T12:46:54.330393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZHBee3tkLpPfcr108"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "ad7e7428-712c-4fb7-a4a5-fe44e278000d", "DetectTime": "2024-05-21T12:46:54.373396+00:00", "EventTime": "2024-05-21T12:46:54.373420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZheB53ilcANjpdoEe"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "c3935c1e-d3a6-4528-8816-7ca0f9809260", "DetectTime": "2024-05-21T12:46:54.391191+00:00", "EventTime": "2024-05-21T12:46:54.391212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpWNp2fGBryxoojec"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "3f0c2e1c-97cc-4f7b-bfc7-da7bf68e716e", "DetectTime": "2024-05-21T12:46:54.426886+00:00", "EventTime": "2024-05-21T12:46:54.426910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYFr44N358WRZGFy6"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "26baf718-0d8c-4a79-9e4c-d399640a2b80", "DetectTime": "2024-05-21T12:46:54.458348+00:00", "EventTime": "2024-05-21T12:46:54.458372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE1yu2XzwaWlY566c"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "23c022f2-37d0-497a-898c-033a9a295431", "DetectTime": "2024-05-21T12:46:54.790839+00:00", "EventTime": "2024-05-21T12:46:54.790860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmy0014qlaziGiHUH1"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "2933c991-5acd-450a-a003-0eaaf3a0bfa0", "DetectTime": "2024-05-21T12:46:54.881422+00:00", "EventTime": "2024-05-21T12:46:54.881441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cywf2s4TNEw6oQR0Wh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 151} +{"Format": "IDEA0", "ID": "30126d5e-b673-4228-a6fe-bf883f85130c", "DetectTime": "2024-05-21T12:46:55.217101+00:00", "EventTime": "2024-05-21T12:46:55.217120+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9pxqO3c3ls8AF0C3l"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0c5e6f74-ba79-4d89-afa1-dc80fed51c6d", "DetectTime": "2024-05-21T12:46:55.229372+00:00", "EventTime": "2024-05-21T12:46:55.229391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9pxqO3c3ls8AF0C3l"], "accumulated_threat_level": 11.3, "timewindow": 33} +{"Format": "IDEA0", "ID": "9de1dd86-d62c-4298-a27d-4271684bcbe7", "DetectTime": "2024-05-21T12:46:55.235483+00:00", "EventTime": "2024-05-21T12:46:55.235522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO9WHu1QIWlJDQjAB7"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "a0ce3285-00e9-458d-b408-8d530e7a88d9", "DetectTime": "2024-05-21T12:46:55.262259+00:00", "EventTime": "2024-05-21T12:46:55.262281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4NiXahNntPdKXP7"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "b4905a6a-9128-4466-909e-74327bcdcbb8", "DetectTime": "2024-05-21T12:46:55.267795+00:00", "EventTime": "2024-05-21T12:46:55.267815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiJuB4uHILctmU2L7"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "ebde3007-6a16-493c-8f24-cd809d96dba9", "DetectTime": "2024-05-21T12:46:55.287849+00:00", "EventTime": "2024-05-21T12:46:55.287869+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsvgc4zx9813Penv"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "227e88e6-392c-4b20-b67a-2571b2eaa6f6", "DetectTime": "2024-05-21T12:46:55.300896+00:00", "EventTime": "2024-05-21T12:46:55.300915+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsvgc4zx9813Penv"], "accumulated_threat_level": 11.8, "timewindow": 33} +{"Format": "IDEA0", "ID": "0bec1ea0-1ccc-4e9e-8b08-c8744dabe628", "DetectTime": "2024-05-21T12:46:55.311072+00:00", "EventTime": "2024-05-21T12:46:55.311107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcakSw16kcwLHidNCb"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1cd30019-f913-4536-a3d0-55cb6531dc20", "DetectTime": "2024-05-21T12:46:55.346337+00:00", "EventTime": "2024-05-21T12:46:55.346358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9P4vjFcOb2xTnS9"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "6943d794-8574-4768-bb54-37612c3cb855", "DetectTime": "2024-05-21T12:46:55.358688+00:00", "EventTime": "2024-05-21T12:46:55.358706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0RHfx3LdSfh8c0LN9"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "d13c95e8-ad80-4664-b23b-f063f9cb90d1", "DetectTime": "2024-05-21T12:46:55.408082+00:00", "EventTime": "2024-05-21T12:46:55.408114+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDn2n22WWoyFZxQiaf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "e7111240-2a1b-4dc9-b114-2e53445561a7", "DetectTime": "2024-05-21T12:46:55.421599+00:00", "EventTime": "2024-05-21T12:46:55.421619+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDn2n22WWoyFZxQiaf"], "accumulated_threat_level": 12.3, "timewindow": 33} +{"Format": "Json", "ID": "e7111240-2a1b-4dc9-b114-2e53445561a7", "DetectTime": "2024-05-21T12:46:55.421599+00:00", "EventTime": "2024-05-21T12:46:55.421619+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "1970-01-02T08:01:49.395219+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:46:55.861080)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.3, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.3} +{"Format": "IDEA0", "ID": "cda825e6-8cde-4e7a-b009-191b79edcf11", "DetectTime": "2024-05-21T12:46:55.875033+00:00", "EventTime": "2024-05-21T12:46:55.875050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTm9G31L12x9zyyJof"], "accumulated_threat_level": 10.900000000000002, "timewindow": 151} +{"Format": "IDEA0", "ID": "86df961e-748a-4783-8a37-29af1c22a97b", "DetectTime": "2024-05-21T12:46:55.888001+00:00", "EventTime": "2024-05-21T12:46:55.888021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ93Yu3WjnUAXmaGbg"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "dd8ae520-f704-4c13-9776-964fe28c5b21", "DetectTime": "2024-05-21T12:46:55.900858+00:00", "EventTime": "2024-05-21T12:46:55.900878+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ93Yu3WjnUAXmaGbg"], "accumulated_threat_level": 0.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "8d207184-9832-456d-b129-3e961b3a6bf3", "DetectTime": "2024-05-21T12:46:55.911837+00:00", "EventTime": "2024-05-21T12:46:55.911856+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YPApmPX7IZF9FA3"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "ad006753-a431-4af4-83fa-be106640a8fe", "DetectTime": "2024-05-21T12:46:55.924905+00:00", "EventTime": "2024-05-21T12:46:55.924926+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YPApmPX7IZF9FA3"], "accumulated_threat_level": 1.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "7a9037f1-8d82-45d1-981d-bb74c6def7ed", "DetectTime": "2024-05-21T12:46:55.937602+00:00", "EventTime": "2024-05-21T12:46:55.937623+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW3OL0rOyUyob40e"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "487156fd-d81a-4d19-ba44-0b927880b816", "DetectTime": "2024-05-21T12:46:55.952932+00:00", "EventTime": "2024-05-21T12:46:55.952961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COW3OL0rOyUyob40e"], "accumulated_threat_level": 1.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "46bbd2c8-651b-4ab9-9fb3-2c236ae72336", "DetectTime": "2024-05-21T12:46:55.957984+00:00", "EventTime": "2024-05-21T12:46:55.958004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chxovx1Hhj7cRjxTwl"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1f363505-5634-4aef-bd24-c78577a2fd2b", "DetectTime": "2024-05-21T12:46:55.971614+00:00", "EventTime": "2024-05-21T12:46:55.971635+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctqz793Wvl6hCOIPtf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "5100c2dc-28c7-4d4d-adc8-6ab7a7495833", "DetectTime": "2024-05-21T12:46:55.976602+00:00", "EventTime": "2024-05-21T12:46:55.976620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JEweYmy8E27DOg6"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "43ad6218-562e-4e9f-897a-0d563368e369", "DetectTime": "2024-05-21T12:46:55.989360+00:00", "EventTime": "2024-05-21T12:46:55.989380+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctqz793Wvl6hCOIPtf"], "accumulated_threat_level": 2.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "1a74496f-2657-4636-ad25-3b38830c4698", "DetectTime": "2024-05-21T12:46:55.996121+00:00", "EventTime": "2024-05-21T12:46:55.996141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqTLRXjS9lCCHih"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "605d5a17-cb05-4fc4-bb8d-4e88956f7a92", "DetectTime": "2024-05-21T12:46:56.008797+00:00", "EventTime": "2024-05-21T12:46:56.008816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdqBTqqCjHmVJsYpj"], "accumulated_threat_level": 11.700000000000003, "timewindow": 151} +{"Format": "IDEA0", "ID": "6b5ccd91-549f-410c-84ef-c093e971c4ab", "DetectTime": "2024-05-21T12:46:56.022005+00:00", "EventTime": "2024-05-21T12:46:56.022026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUVnXe3PAGprLsoOXj"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "e1afe3d9-a70a-4406-8d52-6ec39d5e1c97", "DetectTime": "2024-05-21T12:46:56.034903+00:00", "EventTime": "2024-05-21T12:46:56.034921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUVnXe3PAGprLsoOXj"], "accumulated_threat_level": 2.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "76780dd3-52b5-4f5f-a887-1b8a60f93c30", "DetectTime": "2024-05-21T12:46:56.046534+00:00", "EventTime": "2024-05-21T12:46:56.046551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBwgC3N0Y5IpNahid"], "accumulated_threat_level": 12.500000000000004, "timewindow": 151} +{"Format": "Json", "ID": "76780dd3-52b5-4f5f-a887-1b8a60f93c30", "DetectTime": "2024-05-21T12:46:56.046534+00:00", "EventTime": "2024-05-21T12:46:56.046551+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-07T06:23:39.989150+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2024/05/21 12:46:56.263797)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 151, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "eea37e6b-6b28-4a1d-a96b-4af472be4ad2", "DetectTime": "2024-05-21T12:46:56.334958+00:00", "EventTime": "2024-05-21T12:46:56.334976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0mWb4twywJEi5RXf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "31484275-9dd8-4d8d-a09a-03fc30bc4609", "DetectTime": "2024-05-21T12:46:56.347868+00:00", "EventTime": "2024-05-21T12:46:56.347887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy0mWb4twywJEi5RXf"], "accumulated_threat_level": 3.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0eed6d0c-102b-4ffd-9da1-aac3d2ccb4fd", "DetectTime": "2024-05-21T12:46:56.353365+00:00", "EventTime": "2024-05-21T12:46:56.353382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTrMEg1tFKw4JFOMI7"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "08f4ce2b-c2f8-4f6f-9bd0-38f990ae8d54", "DetectTime": "2024-05-21T12:46:56.365936+00:00", "EventTime": "2024-05-21T12:46:56.365954+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaoOwn1lUG17CgNTZb"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0a2c1090-2cfd-49ac-b7a8-e05976294fa0", "DetectTime": "2024-05-21T12:46:56.379225+00:00", "EventTime": "2024-05-21T12:46:56.379246+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaoOwn1lUG17CgNTZb"], "accumulated_threat_level": 3.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "ef499fa9-777a-4253-b9cf-bad5047b915b", "DetectTime": "2024-05-21T12:46:56.391460+00:00", "EventTime": "2024-05-21T12:46:56.391480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuprl4wTI4VtYy05a"], "accumulated_threat_level": 0.8, "timewindow": 151} +{"Format": "IDEA0", "ID": "f029e2dc-8f7a-460f-8520-e805edbe331b", "DetectTime": "2024-05-21T12:46:56.405125+00:00", "EventTime": "2024-05-21T12:46:56.405145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVotN83HZ1NgZEa0o3"], "accumulated_threat_level": 1.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "d95e47b8-78aa-458c-9139-4bfe4a6696de", "DetectTime": "2024-05-21T12:46:56.410396+00:00", "EventTime": "2024-05-21T12:46:56.410426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBq1gq35mMD0njwjC6"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "01dbcd49-e1df-4dab-af82-3dd2b724a375", "DetectTime": "2024-05-21T12:46:56.444320+00:00", "EventTime": "2024-05-21T12:46:56.444340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMDRczxIjhnUPiu93"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 151} +{"Format": "IDEA0", "ID": "baa85866-b62b-41ec-b683-a13a3cc50451", "DetectTime": "2024-05-21T12:46:56.449776+00:00", "EventTime": "2024-05-21T12:46:56.449795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzWy7I1AfaXKFYSNUh"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "57bdae49-804e-4a0b-9d9b-f7c9ada0f061", "DetectTime": "2024-05-21T12:46:56.538619+00:00", "EventTime": "2024-05-21T12:46:56.538640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNeRdL3Omo9bdDlM57"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "5d9e1ef5-8353-4a57-be16-f7852ad8f521", "DetectTime": "2024-05-21T12:46:56.543605+00:00", "EventTime": "2024-05-21T12:46:56.543624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHSRar2avsfTIQ1x63"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "40693ab0-9209-47db-89a6-7b3005e8e3f7", "DetectTime": "2024-05-21T12:46:56.613872+00:00", "EventTime": "2024-05-21T12:46:56.613898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.176.144.253"]}], "Attach": [{"Content": "Connection to unknown destination port 7296/UDP destination IP 175.176.144.253. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Pe7p2zBgb9fzW7G2"], "accumulated_threat_level": 3.2, "timewindow": 151} +{"Format": "IDEA0", "ID": "5a210352-14e9-4a54-a528-fb0199b17d8c", "DetectTime": "2024-05-21T12:46:56.883557+00:00", "EventTime": "2024-05-21T12:46:56.883579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9u2vS2SZvZvPHLGai"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1b38df8c-c49f-4d9d-a882-fe9149daf9b2", "DetectTime": "2024-05-21T12:46:56.926356+00:00", "EventTime": "2024-05-21T12:46:56.926376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co8QdS1i1Ww75yl0Fd"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "93eff7a2-e46d-4dde-8ffc-cab3e14d0ef8", "DetectTime": "2024-05-21T12:46:56.972964+00:00", "EventTime": "2024-05-21T12:46:56.972984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYgSy2O7L4ZQJT9U1"], "accumulated_threat_level": 4.8, "timewindow": 151} +{"Format": "IDEA0", "ID": "c964c22e-ff87-4dc2-8326-50507e231b84", "DetectTime": "2024-05-21T12:46:57.024572+00:00", "EventTime": "2024-05-21T12:46:57.024591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhhSV37seKnGWQBp"], "accumulated_threat_level": 5.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "9efd1879-f58b-4842-81b2-68dcb1d13979", "DetectTime": "2024-05-21T12:46:57.073684+00:00", "EventTime": "2024-05-21T12:46:57.073704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYaObj4v72nIjGZNJ3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 151} +{"Format": "IDEA0", "ID": "0d23e685-04f3-4b77-86f1-36c5d53432a8", "DetectTime": "2024-05-21T12:46:57.124086+00:00", "EventTime": "2024-05-21T12:46:57.124107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFkWxl2DHudOqlvFv4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "5811f0cb-21ef-4d9f-9dfd-5a7c1fc5ced0", "DetectTime": "2024-05-21T12:46:57.177192+00:00", "EventTime": "2024-05-21T12:46:57.177212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyDx71spqECXBn8y7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "378d967d-2cbf-412f-aa28-4ecb33223be5", "DetectTime": "2024-05-21T12:46:57.230013+00:00", "EventTime": "2024-05-21T12:46:57.230037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGN9w4BI70ELL3609"], "accumulated_threat_level": 8.799999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "471f5cfa-d640-404c-902d-a8d3edbc0947", "DetectTime": "2024-05-21T12:46:57.494292+00:00", "EventTime": "2024-05-21T12:46:57.494313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7ZAe4iB2enN8bOL"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "e921a6ff-6b12-482e-891f-a6f7058a1964", "DetectTime": "2024-05-21T12:46:57.731523+00:00", "EventTime": "2024-05-21T12:46:57.731544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL6rYQ21oeqwo6I76c"], "accumulated_threat_level": 9.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "df04a8b5-5e49-4f10-a0ba-3235421f37e3", "DetectTime": "2024-05-21T12:46:57.791659+00:00", "EventTime": "2024-05-21T12:46:57.791678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYwdp2gvoK1uIW661"], "accumulated_threat_level": 10.4, "timewindow": 151} +{"Format": "IDEA0", "ID": "8ba08ae4-964f-4a41-ab42-7a6db6335a4f", "DetectTime": "2024-05-21T12:46:57.831137+00:00", "EventTime": "2024-05-21T12:46:57.831158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOiTt1z8MDlOi0Hbi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 151} +{"Format": "IDEA0", "ID": "3d9f4852-4217-4fc9-ae56-e68fd9b5cb49", "DetectTime": "2024-05-21T12:46:57.877870+00:00", "EventTime": "2024-05-21T12:46:57.877889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGqEa4Q9i9CN4brpi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 151} +{"Format": "Json", "ID": "3d9f4852-4217-4fc9-ae56-e68fd9b5cb49", "DetectTime": "2024-05-21T12:46:57.877870+00:00", "EventTime": "2024-05-21T12:46:57.877889+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "1970-01-07T06:54:19.361719+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2024/05/21 12:46:58.369202)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 151, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e4c11d79-011e-4d9d-97a8-255abcbc3fdc", "DetectTime": "2024-05-21T12:46:58.381112+00:00", "EventTime": "2024-05-21T12:46:58.381136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4vYVykwoD3lcUol"], "accumulated_threat_level": 0.8, "timewindow": 151} +{"Format": "IDEA0", "ID": "59271d36-6daf-432d-9130-8d06c66ba0df", "DetectTime": "2024-05-21T12:46:58.385979+00:00", "EventTime": "2024-05-21T12:46:58.385999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRsTur1OOg0sw2xd11"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "abb2c612-d884-4767-98c0-5b814f6626df", "DetectTime": "2024-05-21T12:46:58.397536+00:00", "EventTime": "2024-05-21T12:46:58.397567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyY22L3XRaNayFchO"], "accumulated_threat_level": 1.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "ec1fd0ee-52e2-410c-91b5-39b203b275b5", "DetectTime": "2024-05-21T12:46:58.402902+00:00", "EventTime": "2024-05-21T12:46:58.402922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbmv4O2yzy3pxfNRml"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "a9b2112b-d928-41ee-bf02-bed918c84e65", "DetectTime": "2024-05-21T12:46:58.415426+00:00", "EventTime": "2024-05-21T12:46:58.415469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJ4hf1v6IKeVxzA69"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 151} +{"Format": "IDEA0", "ID": "790f7310-321c-45e2-bb1f-ac24fdb79a04", "DetectTime": "2024-05-21T12:46:58.427708+00:00", "EventTime": "2024-05-21T12:46:58.427740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPe5eQ2rTd4urIPv0b"], "accumulated_threat_level": 3.2, "timewindow": 151} +{"Format": "IDEA0", "ID": "a6d04d71-aa1c-43b5-b51f-d40a32a79073", "DetectTime": "2024-05-21T12:46:58.454386+00:00", "EventTime": "2024-05-21T12:46:58.454432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXUV11YuWyCyTk6q7"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "9e30a827-52ba-4e62-bbca-fb016a8f6fd4", "DetectTime": "2024-05-21T12:46:58.502154+00:00", "EventTime": "2024-05-21T12:46:58.502185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQx49T1gqwF2pebLKk"], "accumulated_threat_level": 4.8, "timewindow": 151} +{"Format": "IDEA0", "ID": "999b2b54-28dd-4ae3-926f-7da02861e81c", "DetectTime": "2024-05-21T12:46:58.553575+00:00", "EventTime": "2024-05-21T12:46:58.553608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24TOv33fcu5WGMDoa"], "accumulated_threat_level": 5.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "8231d5fc-b0eb-4474-ae43-9b16406a035f", "DetectTime": "2024-05-21T12:46:58.811700+00:00", "EventTime": "2024-05-21T12:46:58.811721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJatFflRzxOHqmN7"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "d3c714ff-b922-472f-ad45-c504d8e3ebc1", "DetectTime": "2024-05-21T12:46:58.855825+00:00", "EventTime": "2024-05-21T12:46:58.855842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ8xJ14pNVVIk5a9B7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 151} +{"Format": "IDEA0", "ID": "fab6d969-f811-4686-83cc-eab7bf4b45ec", "DetectTime": "2024-05-21T12:46:58.898315+00:00", "EventTime": "2024-05-21T12:46:58.898335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbOrdK4aaqnv5TSe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "17ee13f9-72e0-419d-a9f8-b6d422f1f5c1", "DetectTime": "2024-05-21T12:46:58.948812+00:00", "EventTime": "2024-05-21T12:46:58.948830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFu5Ac2VRQ0Dmp7US9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "6cda3c0d-7382-4a5e-83af-8a05371dee67", "DetectTime": "2024-05-21T12:46:59.009107+00:00", "EventTime": "2024-05-21T12:46:59.009126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7QysT3SzZHP9DxXe1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 151} +{"Format": "IDEA0", "ID": "648d87df-ea51-44ee-8779-6e566d41e492", "DetectTime": "2024-05-21T12:46:59.041646+00:00", "EventTime": "2024-05-21T12:46:59.041666+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.64.205.60"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXZvM24sys428M4pa"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "552c76ce-bc38-4fc8-b392-79da6e0c48fc", "DetectTime": "2024-05-21T12:46:59.055351+00:00", "EventTime": "2024-05-21T12:46:59.055371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.64.205.60"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.64.205.60 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXZvM24sys428M4pa"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "d22c7b48-ede8-4fb4-b9b5-685a59904d75", "DetectTime": "2024-05-21T12:46:59.068163+00:00", "EventTime": "2024-05-21T12:46:59.068182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEw9Vo1XkplAZVHwAa"], "accumulated_threat_level": 9.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "44bba1d2-39e3-4e0c-abce-483d166de63f", "DetectTime": "2024-05-21T12:46:59.187325+00:00", "EventTime": "2024-05-21T12:46:59.187345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZAeC52E8XUtZZkLLa"], "accumulated_threat_level": 10.4, "timewindow": 151} +{"Format": "IDEA0", "ID": "082b4c3c-15b6-430c-b626-21aaab271a64", "DetectTime": "2024-05-21T12:46:59.227337+00:00", "EventTime": "2024-05-21T12:46:59.227359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMQTU1ISEs4SqWqP9"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "5bde76cd-5097-4846-bbdc-dcda628aa850", "DetectTime": "2024-05-21T12:46:59.508173+00:00", "EventTime": "2024-05-21T12:46:59.508192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqVDP2QkpFdCCvpBk"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "0a96c40f-a8b2-4144-aa34-e0513e5d504b", "DetectTime": "2024-05-21T12:46:59.553485+00:00", "EventTime": "2024-05-21T12:46:59.553505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8ovV1ADwN99fKa44"], "accumulated_threat_level": 11.200000000000001, "timewindow": 151} +{"Format": "IDEA0", "ID": "eb3b4974-d72d-4d7f-8b26-dc182dc6f19a", "DetectTime": "2024-05-21T12:46:59.607242+00:00", "EventTime": "2024-05-21T12:46:59.607263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdicvl48qFyefWjlvb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 151} +{"Format": "Json", "ID": "eb3b4974-d72d-4d7f-8b26-dc182dc6f19a", "DetectTime": "2024-05-21T12:46:59.607242+00:00", "EventTime": "2024-05-21T12:46:59.607263+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "1970-01-07T06:54:55.457650+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 151. (real time 2024/05/21 12:46:59.810870)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 151, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0c49e66c-c712-430c-bb09-b9e62ff80816", "DetectTime": "2024-05-21T12:46:59.820871+00:00", "EventTime": "2024-05-21T12:46:59.820889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkgZsx1N88HEHkNINl"], "accumulated_threat_level": 0.8, "timewindow": 151} +{"Format": "IDEA0", "ID": "ccb2a67f-0395-47a2-a35f-c6f877c5ee3b", "DetectTime": "2024-05-21T12:46:59.831654+00:00", "EventTime": "2024-05-21T12:46:59.831672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpeEMT3zo8N859n83d"], "accumulated_threat_level": 1.6, "timewindow": 151} +{"Format": "IDEA0", "ID": "f3428e25-88f1-48bb-b261-35a6cb2bcf9d", "DetectTime": "2024-05-21T12:46:59.843873+00:00", "EventTime": "2024-05-21T12:46:59.843894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DwzO2WfTJnCLovh7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 151} +{"Format": "IDEA0", "ID": "69064c16-acb7-4bb2-a62f-ae58aa11bf04", "DetectTime": "2024-05-21T12:46:59.854819+00:00", "EventTime": "2024-05-21T12:46:59.854837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsAFn1Ybeecgsehbe"], "accumulated_threat_level": 3.2, "timewindow": 151} +{"Format": "IDEA0", "ID": "a2a18007-262a-4fdd-b51a-16e4911a4c4b", "DetectTime": "2024-05-21T12:47:00.086797+00:00", "EventTime": "2024-05-21T12:47:00.086818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvV1LaaWN6eZUOX8"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "170d0947-c5a8-4c08-9760-d27fd10f6a4a", "DetectTime": "2024-05-21T12:47:00.091889+00:00", "EventTime": "2024-05-21T12:47:00.091908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYAVaabRwjMPYoZg"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "c30171b7-b7eb-41cc-bdf1-bd7c91f4508f", "DetectTime": "2024-05-21T12:47:00.170494+00:00", "EventTime": "2024-05-21T12:47:00.170513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwZaY1QspZbbH3Am8"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "6b8e2248-9844-45e4-b9f2-2f2c51726033", "DetectTime": "2024-05-21T12:47:00.317538+00:00", "EventTime": "2024-05-21T12:47:00.317556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRAnr2e10IeKBtmJ5"], "accumulated_threat_level": 0.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "e0d699ed-d6f2-41c6-8c28-3e4108100db7", "DetectTime": "2024-05-21T12:47:00.392316+00:00", "EventTime": "2024-05-21T12:47:00.392337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9pYY3kHD7MmwsiL"], "accumulated_threat_level": 1.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "d6c51e35-7f69-452e-89c4-4456d195b7f4", "DetectTime": "2024-05-21T12:47:00.431472+00:00", "EventTime": "2024-05-21T12:47:00.431493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHs7gYIs5kw1q370f"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "eb60a897-aaac-42fc-b2d3-bab8cc78797d", "DetectTime": "2024-05-21T12:47:00.473620+00:00", "EventTime": "2024-05-21T12:47:00.473639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGz5os2CYBrgooiu27"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 152} +{"Format": "IDEA0", "ID": "157952c2-c5b5-479b-a26c-e1c7c5d5c833", "DetectTime": "2024-05-21T12:47:00.845919+00:00", "EventTime": "2024-05-21T12:47:00.845937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["223.17.69.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8575/UDP destination IP 223.17.69.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJC1Cx10pENqtQvfM1"], "accumulated_threat_level": 3.2, "timewindow": 152} +{"Format": "IDEA0", "ID": "27cf44c0-f5c4-4a07-8703-ba8da23dfcd0", "DetectTime": "2024-05-21T12:47:00.896523+00:00", "EventTime": "2024-05-21T12:47:00.896546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["31.43.102.110"]}], "Attach": [{"Content": "Connection to unknown destination port 8272/UDP destination IP 31.43.102.110. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWWEP1jRxruqi7SIe"], "accumulated_threat_level": 4.0, "timewindow": 152} +{"Format": "IDEA0", "ID": "da567e2c-916d-4e2e-9d26-a1a7974de2ef", "DetectTime": "2024-05-21T12:47:00.954127+00:00", "EventTime": "2024-05-21T12:47:00.954145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRRKDj92LCYGAtbg"], "accumulated_threat_level": 4.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "05ed55e7-668b-4038-a0cf-ba48ae77ddca", "DetectTime": "2024-05-21T12:47:00.989859+00:00", "EventTime": "2024-05-21T12:47:00.989876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdvh835pxd3kInqXi"], "accumulated_threat_level": 5.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "3e9da25a-31f9-4a53-865a-717cf333a170", "DetectTime": "2024-05-21T12:47:01.025536+00:00", "EventTime": "2024-05-21T12:47:01.025557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTkIuwGfqsDXLGCii"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "1c91ac3a-1c3a-4ae8-a24d-1dce638ceb3b", "DetectTime": "2024-05-21T12:47:01.066752+00:00", "EventTime": "2024-05-21T12:47:01.066770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaDAh3iW4SFaZ9ia9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 152} +{"Format": "IDEA0", "ID": "8d04bae8-b2ee-4f43-9443-1cfaf13cb0ab", "DetectTime": "2024-05-21T12:47:01.112611+00:00", "EventTime": "2024-05-21T12:47:01.112630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["85.107.40.140"]}], "Attach": [{"Content": "Connection to unknown destination port 6049/UDP destination IP 85.107.40.140. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHGq12O2SqtNLCE78"], "accumulated_threat_level": 7.199999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0dd05469-7ae7-4930-9c28-7e696aa4a31f", "DetectTime": "2024-05-21T12:47:01.163001+00:00", "EventTime": "2024-05-21T12:47:01.163027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["92.98.14.8"]}], "Attach": [{"Content": "Connection to unknown destination port 6553/UDP destination IP 92.98.14.8. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7jSs18Yl8lSQ3nv7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "72839602-deea-40a5-851b-a3f51c774bd8", "DetectTime": "2024-05-21T12:47:01.436211+00:00", "EventTime": "2024-05-21T12:47:01.436231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYben2jtLzWHEfVO2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "53d19fb8-10ef-4f8a-9237-de928c4bd52e", "DetectTime": "2024-05-21T12:47:01.484289+00:00", "EventTime": "2024-05-21T12:47:01.484309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6Al21qXP6dksPGj7"], "accumulated_threat_level": 9.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "9ed11b38-cf4c-41b1-9275-a9ca3fe947e4", "DetectTime": "2024-05-21T12:47:01.535477+00:00", "EventTime": "2024-05-21T12:47:01.535498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHZab4dlji8JZL44f"], "accumulated_threat_level": 10.4, "timewindow": 152} +{"Format": "IDEA0", "ID": "d41afc26-ed35-48e3-b11c-7cf41f949e31", "DetectTime": "2024-05-21T12:47:01.570950+00:00", "EventTime": "2024-05-21T12:47:01.570972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXf9o5ptJtU9aGAk"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "b4121c90-53bf-4816-a349-292a0a425403", "DetectTime": "2024-05-21T12:47:01.613164+00:00", "EventTime": "2024-05-21T12:47:01.613193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcGScX1OuOFFQFQRQk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 152} +{"Format": "IDEA0", "ID": "3a64a5d3-7d54-4516-9f81-357764d5e7e0", "DetectTime": "2024-05-21T12:47:01.664788+00:00", "EventTime": "2024-05-21T12:47:01.664820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsEFBq1khVTq9jKlXa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 152} +{"Format": "Json", "ID": "3a64a5d3-7d54-4516-9f81-357764d5e7e0", "DetectTime": "2024-05-21T12:47:01.664788+00:00", "EventTime": "2024-05-21T12:47:01.664820+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-07T07:25:34.236807+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2024/05/21 12:47:01.827320)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 152, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "df652169-4fac-4fcc-b042-b0488c4189d1", "DetectTime": "2024-05-21T12:47:01.838697+00:00", "EventTime": "2024-05-21T12:47:01.838720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKlcd3pQysWVK1Vff"], "accumulated_threat_level": 0.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "0d6c90f9-bee7-474f-ac0d-afdfe3797ad4", "DetectTime": "2024-05-21T12:47:01.850365+00:00", "EventTime": "2024-05-21T12:47:01.850384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCo0542UwA7j0oNUQ7"], "accumulated_threat_level": 1.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "d82e9d1f-4b82-4b6f-bcd3-b9ce55dcdff9", "DetectTime": "2024-05-21T12:47:02.025633+00:00", "EventTime": "2024-05-21T12:47:02.025651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C29HaBDnIr1l8Gt8k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 152} +{"Format": "IDEA0", "ID": "d8b4e0a7-9f6b-4762-8e20-95580be16194", "DetectTime": "2024-05-21T12:47:02.080915+00:00", "EventTime": "2024-05-21T12:47:02.080936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWySvM3yY49CcMq1Yb"], "accumulated_threat_level": 3.2, "timewindow": 152} +{"Format": "IDEA0", "ID": "07d94c74-2178-4af3-af25-6a9a50da8ca5", "DetectTime": "2024-05-21T12:47:02.136981+00:00", "EventTime": "2024-05-21T12:47:02.137000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ79ZO1zICBf8zgnle"], "accumulated_threat_level": 4.0, "timewindow": 152} +{"Format": "IDEA0", "ID": "70023ef1-0a1c-44ab-855c-e6486cf706ee", "DetectTime": "2024-05-21T12:47:02.189758+00:00", "EventTime": "2024-05-21T12:47:02.189787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIFh34FuRFCsSUc0l"], "accumulated_threat_level": 4.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "e992b20c-4678-4f78-84ea-bb0d18b1980f", "DetectTime": "2024-05-21T12:47:02.304434+00:00", "EventTime": "2024-05-21T12:47:02.304452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpX1tgLy8kvT6mVQ3"], "accumulated_threat_level": 5.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "0830a646-8553-4edd-a5f4-9b6926440605", "DetectTime": "2024-05-21T12:47:02.309586+00:00", "EventTime": "2024-05-21T12:47:02.309604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx9lrizMrGpbC3wvh"], "accumulated_threat_level": 5.6, "timewindow": 150} +{"Format": "IDEA0", "ID": "84fd2520-245f-4baf-8812-3690e9327db6", "DetectTime": "2024-05-21T12:47:02.384933+00:00", "EventTime": "2024-05-21T12:47:02.384952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZSUJ3ZIlQZrQyuek"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 152} +{"Format": "IDEA0", "ID": "99f95ce2-ae47-44a3-affb-2e3cf8586473", "DetectTime": "2024-05-21T12:47:02.537650+00:00", "EventTime": "2024-05-21T12:47:02.537672+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMI8Z3IaLgoDl7n6f"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "c7eee183-4ac3-4055-ac5f-8c18d99b87f0", "DetectTime": "2024-05-21T12:47:02.552611+00:00", "EventTime": "2024-05-21T12:47:02.552655+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMI8Z3IaLgoDl7n6f"], "accumulated_threat_level": 4.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "ad14b1d8-72ed-49ba-90d9-2ea24417e71c", "DetectTime": "2024-05-21T12:47:02.674115+00:00", "EventTime": "2024-05-21T12:47:02.674154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSCmS2JSU1VGC54He"], "accumulated_threat_level": 7.199999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9e681a10-6ab4-4cf9-a0a6-33b9a66ab2ee", "DetectTime": "2024-05-21T12:47:02.729415+00:00", "EventTime": "2024-05-21T12:47:02.729454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["79.20.148.198"]}], "Attach": [{"Content": "Connection to unknown destination port 6975/UDP destination IP 79.20.148.198. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqyaH3AGGHiFNiVp7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "92c57391-59a8-4858-be2e-19b6c251641f", "DetectTime": "2024-05-21T12:47:02.850346+00:00", "EventTime": "2024-05-21T12:47:02.850368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqf204BbXjPApwxpj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "88ef02ce-8962-47e5-8d28-88f50c518b6d", "DetectTime": "2024-05-21T12:47:02.897973+00:00", "EventTime": "2024-05-21T12:47:02.897996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnfnkqD2LWS1tWXW9"], "accumulated_threat_level": 9.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "cd52e967-0c83-4add-a26c-51c6eac74e26", "DetectTime": "2024-05-21T12:47:02.957893+00:00", "EventTime": "2024-05-21T12:47:02.957913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcsVqZ1QAejKB3epDi"], "accumulated_threat_level": 10.4, "timewindow": 152} +{"Format": "IDEA0", "ID": "d5f748ff-714a-46a7-a516-0c408020f057", "DetectTime": "2024-05-21T12:47:02.995547+00:00", "EventTime": "2024-05-21T12:47:02.995567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clqhi81P6FwnBSiJXa"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "20340cee-3ea9-4486-8475-dd7cbe927f51", "DetectTime": "2024-05-21T12:47:03.007972+00:00", "EventTime": "2024-05-21T12:47:03.007995+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clqhi81P6FwnBSiJXa"], "accumulated_threat_level": 5.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "e684a1cb-76e0-499e-a0e5-0a4657a60a33", "DetectTime": "2024-05-21T12:47:03.056952+00:00", "EventTime": "2024-05-21T12:47:03.056978+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czbrng13ZzNk5oSCNh"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "1d80c401-dff7-478a-bee0-219f84a7e477", "DetectTime": "2024-05-21T12:47:03.070009+00:00", "EventTime": "2024-05-21T12:47:03.070028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4P7112XSYTgEDKw42"], "accumulated_threat_level": 11.200000000000001, "timewindow": 152} +{"Format": "IDEA0", "ID": "aa6f6612-769b-4033-bd87-50244b9251dd", "DetectTime": "2024-05-21T12:47:03.084235+00:00", "EventTime": "2024-05-21T12:47:03.084254+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czbrng13ZzNk5oSCNh"], "accumulated_threat_level": 5.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "2298abc5-b49a-4f71-b21a-0172aa37315f", "DetectTime": "2024-05-21T12:47:03.123054+00:00", "EventTime": "2024-05-21T12:47:03.123077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.17.251.64"]}], "Attach": [{"Content": "Connection to unknown destination port 5248/UDP destination IP 87.17.251.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCCZ44IQCHzVIynC3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 152} +{"Format": "Json", "ID": "2298abc5-b49a-4f71-b21a-0172aa37315f", "DetectTime": "2024-05-21T12:47:03.123054+00:00", "EventTime": "2024-05-21T12:47:03.123077+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["87.17.251.64"]}], "Attach": [{"Content": "1970-01-07T07:27:13.520816+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2024/05/21 12:47:03.286857)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 152, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "221f4e36-7034-4b0e-8871-6b565a56d031", "DetectTime": "2024-05-21T12:47:03.299182+00:00", "EventTime": "2024-05-21T12:47:03.299203+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.226.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl39l82TY2vzZRUuyb"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "2e038793-978c-408d-9955-5ddd72b2fb2a", "DetectTime": "2024-05-21T12:47:03.311886+00:00", "EventTime": "2024-05-21T12:47:03.311905+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl39l82TY2vzZRUuyb"], "accumulated_threat_level": 6.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "b994d7a4-5b08-4e8d-875e-28340db260ff", "DetectTime": "2024-05-21T12:47:03.324419+00:00", "EventTime": "2024-05-21T12:47:03.324437+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.248.7.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5JubFw5q4nR1REAf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0ede9a70-596b-4396-8790-ae9a0502296f", "DetectTime": "2024-05-21T12:47:03.336878+00:00", "EventTime": "2024-05-21T12:47:03.336897+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5JubFw5q4nR1REAf"], "accumulated_threat_level": 6.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "385b1fe6-aa2f-4a09-bed3-bf6b89d50f6c", "DetectTime": "2024-05-21T12:47:03.349455+00:00", "EventTime": "2024-05-21T12:47:03.349478+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdZf637jLlG0W1SGg"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "02832de8-c071-4c2d-8e1b-8a50419cf8ca", "DetectTime": "2024-05-21T12:47:03.363669+00:00", "EventTime": "2024-05-21T12:47:03.363688+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdZf637jLlG0W1SGg"], "accumulated_threat_level": 7.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "9358cfd9-5723-48c0-a3b7-883b31b47742", "DetectTime": "2024-05-21T12:47:03.379175+00:00", "EventTime": "2024-05-21T12:47:03.379194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Agnn11xztdcZ9Njc"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "5a7cffc1-7cd3-4c25-87fa-7970551bb37a", "DetectTime": "2024-05-21T12:47:03.394067+00:00", "EventTime": "2024-05-21T12:47:03.394087+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Agnn11xztdcZ9Njc"], "accumulated_threat_level": 7.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "f1395747-721e-4605-a7b6-4d56cbbf0232", "DetectTime": "2024-05-21T12:47:03.406997+00:00", "EventTime": "2024-05-21T12:47:03.407016+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF8d31GKy7V2bw5t2"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "76ae5c2f-9061-4754-b89c-c40f4973de96", "DetectTime": "2024-05-21T12:47:03.421665+00:00", "EventTime": "2024-05-21T12:47:03.421688+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVF8d31GKy7V2bw5t2"], "accumulated_threat_level": 8.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "d3876096-f5fa-4f46-88bc-7c0594035d55", "DetectTime": "2024-05-21T12:47:03.427564+00:00", "EventTime": "2024-05-21T12:47:03.427582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBBTwB020vcyUna"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "05975a92-6be6-42d7-960f-91b004828807", "DetectTime": "2024-05-21T12:47:03.477108+00:00", "EventTime": "2024-05-21T12:47:03.477127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQG3E186CDq81i3Og"], "accumulated_threat_level": 0.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "944a2140-2c8d-4782-a200-6bc7e457426a", "DetectTime": "2024-05-21T12:47:03.580181+00:00", "EventTime": "2024-05-21T12:47:03.580201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQdCY1QrFfIIk64Pd"], "accumulated_threat_level": 1.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "0ff446bf-9159-4adb-b529-841f954e474d", "DetectTime": "2024-05-21T12:47:03.593147+00:00", "EventTime": "2024-05-21T12:47:03.593165+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfyTA43V1MUMvLmAc"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "70cbe573-f64a-4a2a-8829-f7168156dd14", "DetectTime": "2024-05-21T12:47:03.606686+00:00", "EventTime": "2024-05-21T12:47:03.606707+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyfyTA43V1MUMvLmAc"], "accumulated_threat_level": 8.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "9cb88364-18d4-4761-bd75-54f98f44d9d6", "DetectTime": "2024-05-21T12:47:03.624583+00:00", "EventTime": "2024-05-21T12:47:03.624602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsAts2iVBeuzTpRx8"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "c0ee6ae1-8615-4593-9f37-42162ee41d22", "DetectTime": "2024-05-21T12:47:03.640144+00:00", "EventTime": "2024-05-21T12:47:03.640164+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLsAts2iVBeuzTpRx8"], "accumulated_threat_level": 9.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "234e4cf5-67b5-40a7-bb46-fd3dd589ae48", "DetectTime": "2024-05-21T12:47:03.649023+00:00", "EventTime": "2024-05-21T12:47:03.649063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq3xtD1lcV3GDyuVQa"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ab333a9f-5491-45a0-b68f-b8a50a01fc5f", "DetectTime": "2024-05-21T12:47:03.673772+00:00", "EventTime": "2024-05-21T12:47:03.673792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0EU63sqAznwktoLi"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "ea484cd8-f701-4f3d-8e4f-75c9c4f53cb4", "DetectTime": "2024-05-21T12:47:03.688255+00:00", "EventTime": "2024-05-21T12:47:03.688278+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0EU63sqAznwktoLi"], "accumulated_threat_level": 9.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "f5ecb5a5-8039-49c7-b735-fa0eed42b7ce", "DetectTime": "2024-05-21T12:47:03.721194+00:00", "EventTime": "2024-05-21T12:47:03.721223+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQMVH1NRfmYSQ5Bc3"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "fb3777c5-9c5c-4b01-9067-03a5f65cff3d", "DetectTime": "2024-05-21T12:47:03.735813+00:00", "EventTime": "2024-05-21T12:47:03.735844+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgQMVH1NRfmYSQ5Bc3"], "accumulated_threat_level": 10.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0b40f316-1975-4edf-b14c-ee41065db783", "DetectTime": "2024-05-21T12:47:03.750638+00:00", "EventTime": "2024-05-21T12:47:03.750666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 3691/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9lXJ1ZmYNjwN7aQ7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 152} +{"Format": "IDEA0", "ID": "9edd5a45-bc87-4094-9e48-f9c5af7f374b", "DetectTime": "2024-05-21T12:47:03.770676+00:00", "EventTime": "2024-05-21T12:47:03.770698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZWcc2J2kMWg93Akd"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "febfd417-dd2f-4e90-8857-76b1b3f9ec34", "DetectTime": "2024-05-21T12:47:03.785098+00:00", "EventTime": "2024-05-21T12:47:03.785117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZWcc2J2kMWg93Akd"], "accumulated_threat_level": 10.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "fd505e58-28ce-439f-a393-4358f2c1a3e1", "DetectTime": "2024-05-21T12:47:03.809144+00:00", "EventTime": "2024-05-21T12:47:03.809164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gtxK2i4hBakYgNw4"], "accumulated_threat_level": 3.2, "timewindow": 152} +{"Format": "IDEA0", "ID": "88ef5ed8-29cc-4576-ad80-ca83c70cd8ff", "DetectTime": "2024-05-21T12:47:03.825955+00:00", "EventTime": "2024-05-21T12:47:03.825979+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6cb81lUgOo0hxFKj"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "9ef6ffcb-59fa-4ffc-bb79-83dc957d909d", "DetectTime": "2024-05-21T12:47:03.841711+00:00", "EventTime": "2024-05-21T12:47:03.841742+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6cb81lUgOo0hxFKj"], "accumulated_threat_level": 11.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "4bcfe384-9065-471d-b8c3-c39ec5e531c3", "DetectTime": "2024-05-21T12:47:03.869135+00:00", "EventTime": "2024-05-21T12:47:03.869153+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICnrq2b3S4vO8Md2e"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "49cf4dcc-b04e-4f5e-9ef9-f6165b19ea5b", "DetectTime": "2024-05-21T12:47:03.881648+00:00", "EventTime": "2024-05-21T12:47:03.881669+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICnrq2b3S4vO8Md2e"], "accumulated_threat_level": 11.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "9bbe12fc-b8a5-471e-bf39-e02ef133f537", "DetectTime": "2024-05-21T12:47:03.928334+00:00", "EventTime": "2024-05-21T12:47:03.928354+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZpfQi3JMXjFrkjlee"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "c2d5fd35-094b-4ec7-905b-807ff40a3cf7", "DetectTime": "2024-05-21T12:47:03.942117+00:00", "EventTime": "2024-05-21T12:47:03.942137+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZpfQi3JMXjFrkjlee"], "accumulated_threat_level": 12.0, "timewindow": 33} +{"Format": "Json", "ID": "c2d5fd35-094b-4ec7-905b-807ff40a3cf7", "DetectTime": "2024-05-21T12:47:03.942117+00:00", "EventTime": "2024-05-21T12:47:03.942137+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "1970-01-02T08:32:32.129417+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 33. (real time 2024/05/21 12:47:04.371434)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 33, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "6d0a58f8-d3a9-4292-a8e5-bf00584df7a7", "DetectTime": "2024-05-21T12:47:04.383608+00:00", "EventTime": "2024-05-21T12:47:04.383630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cw7W3hdGsorW7CR4"], "accumulated_threat_level": 4.0, "timewindow": 152} +{"Format": "IDEA0", "ID": "d6f30e91-720f-41c9-8174-2bba89dbbaa0", "DetectTime": "2024-05-21T12:47:04.395367+00:00", "EventTime": "2024-05-21T12:47:04.395386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr23yh2C1gBUdwGb13"], "accumulated_threat_level": 4.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "61ba8dd8-6fdd-4ae5-8e31-8e40d2944646", "DetectTime": "2024-05-21T12:47:04.408641+00:00", "EventTime": "2024-05-21T12:47:04.408660+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkiBj4HenLCX4lUr4"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "2747706c-f7ee-4c28-9240-127ab5d2384c", "DetectTime": "2024-05-21T12:47:04.421549+00:00", "EventTime": "2024-05-21T12:47:04.421568+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkiBj4HenLCX4lUr4"], "accumulated_threat_level": 0.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "bb4df905-b98f-404b-bd4f-0433649aef4c", "DetectTime": "2024-05-21T12:47:04.434076+00:00", "EventTime": "2024-05-21T12:47:04.434094+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHQ1y1cT91Uv3gu2f"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "a3e88849-5320-4cbb-acf9-0f2a09447b44", "DetectTime": "2024-05-21T12:47:04.447343+00:00", "EventTime": "2024-05-21T12:47:04.447371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHQ1y1cT91Uv3gu2f"], "accumulated_threat_level": 1.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "63f240dd-b44c-4b50-aa2a-9a6bb54c601a", "DetectTime": "2024-05-21T12:47:04.452781+00:00", "EventTime": "2024-05-21T12:47:04.452801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pL0k3kvVQqhX7J1b"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ab41ff7d-23b0-40b0-b261-2e13f0cd16da", "DetectTime": "2024-05-21T12:47:04.466024+00:00", "EventTime": "2024-05-21T12:47:04.466045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpAI01mSEEafPVg4"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "2a9ea431-b88a-4317-907a-39c3430026a4", "DetectTime": "2024-05-21T12:47:04.480467+00:00", "EventTime": "2024-05-21T12:47:04.480488+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChpAI01mSEEafPVg4"], "accumulated_threat_level": 1.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "eb4ea85d-e634-421e-a1a2-7e1abe0f92b2", "DetectTime": "2024-05-21T12:47:04.493390+00:00", "EventTime": "2024-05-21T12:47:04.493411+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJsSHag4UWLWoU43"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "b3bd76bf-2571-401b-bcb6-1448157ad920", "DetectTime": "2024-05-21T12:47:04.507287+00:00", "EventTime": "2024-05-21T12:47:04.507320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGJsSHag4UWLWoU43"], "accumulated_threat_level": 2.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "021f56b2-b5a6-4d46-9906-8ec283edfca2", "DetectTime": "2024-05-21T12:47:04.521197+00:00", "EventTime": "2024-05-21T12:47:04.521220+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF63II3rz8hnaYMMOe"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "7c12dad7-2cd8-4346-8812-77b0f487a8cc", "DetectTime": "2024-05-21T12:47:04.535809+00:00", "EventTime": "2024-05-21T12:47:04.535846+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF63II3rz8hnaYMMOe"], "accumulated_threat_level": 2.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "ca7c74b2-8172-4ff4-88d1-8fca1800b29c", "DetectTime": "2024-05-21T12:47:04.549527+00:00", "EventTime": "2024-05-21T12:47:04.549546+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lQBU2KLiamBq8umf"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "38257604-ee4d-4a75-9c4b-5dea0864e397", "DetectTime": "2024-05-21T12:47:04.563366+00:00", "EventTime": "2024-05-21T12:47:04.563398+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lQBU2KLiamBq8umf"], "accumulated_threat_level": 3.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "9e06f139-4356-425a-9187-0b9e082c73ac", "DetectTime": "2024-05-21T12:47:04.576110+00:00", "EventTime": "2024-05-21T12:47:04.576140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rV3G1ymHRbvBe9se"], "accumulated_threat_level": 5.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "dca93bf1-4dea-40e2-9dc7-0738c506c8f5", "DetectTime": "2024-05-21T12:47:04.589723+00:00", "EventTime": "2024-05-21T12:47:04.589742+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAN2n2M4jBlqRr7ij"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "49c198ec-a2f8-4028-b9e9-2f147b3250d3", "DetectTime": "2024-05-21T12:47:04.604559+00:00", "EventTime": "2024-05-21T12:47:04.604585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEAN2n2M4jBlqRr7ij"], "accumulated_threat_level": 3.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "2788dd9a-f13a-4e92-b344-aae8903bac37", "DetectTime": "2024-05-21T12:47:04.618054+00:00", "EventTime": "2024-05-21T12:47:04.618083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7QPo2HW9RQMBLvB1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 152} +{"Format": "IDEA0", "ID": "3160d470-96bf-42cb-a586-e6a31ab3dbf6", "DetectTime": "2024-05-21T12:47:04.730090+00:00", "EventTime": "2024-05-21T12:47:04.730111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgLLK2cEJ7xW3Hdy4"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "54dd8cb6-5d70-4d20-8455-d669f1987477", "DetectTime": "2024-05-21T12:47:04.791576+00:00", "EventTime": "2024-05-21T12:47:04.791613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeV6c3xhirG1ooY52"], "accumulated_threat_level": 7.199999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "ca6dfe02-1cd7-44d9-a304-6fc0709b84f9", "DetectTime": "2024-05-21T12:47:04.898555+00:00", "EventTime": "2024-05-21T12:47:04.898573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy18Qo18tAYd9jL8al"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "c2ec2c3d-02ca-4620-be24-7fe3d68c0d93", "DetectTime": "2024-05-21T12:47:04.910255+00:00", "EventTime": "2024-05-21T12:47:04.910274+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy18Qo18tAYd9jL8al"], "accumulated_threat_level": 4.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "0c54a671-bbaa-4e36-a28c-bc6ca4ca1aea", "DetectTime": "2024-05-21T12:47:04.925598+00:00", "EventTime": "2024-05-21T12:47:04.925617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.227.70.250"]}], "Attach": [{"Content": "Connection to unknown destination port 2299/UDP destination IP 108.227.70.250. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjspXl2vxoeAI8INq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "99cd345e-4643-42dd-bf39-cf954abedfe8", "DetectTime": "2024-05-21T12:47:04.964134+00:00", "EventTime": "2024-05-21T12:47:04.964154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8akN1DndIytQpGw5"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "6e2906ed-d29e-48fd-98b3-f014abf6e700", "DetectTime": "2024-05-21T12:47:04.977506+00:00", "EventTime": "2024-05-21T12:47:04.977525+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8akN1DndIytQpGw5"], "accumulated_threat_level": 4.5, "timewindow": 33} +{"Format": "IDEA0", "ID": "85b4223c-b1e7-40c9-9965-b60abc097041", "DetectTime": "2024-05-21T12:47:05.055318+00:00", "EventTime": "2024-05-21T12:47:05.055339+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpzDi3GLq44yurZxa"], "accumulated_threat_level": 0, "timewindow": 33} +{"Format": "IDEA0", "ID": "77c93403-6ebb-4de2-a088-b0ca776c02ee", "DetectTime": "2024-05-21T12:47:05.068766+00:00", "EventTime": "2024-05-21T12:47:05.068789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpzDi3GLq44yurZxa"], "accumulated_threat_level": 5.0, "timewindow": 33} +{"Format": "IDEA0", "ID": "4b92b4ef-a3ec-4835-a511-41e2230e9cf8", "DetectTime": "2024-05-21T12:47:05.291225+00:00", "EventTime": "2024-05-21T12:47:05.291247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Et2o2Wl8ggPDpENc"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "96e53628-5a7f-488e-924c-aebd248b670e", "DetectTime": "2024-05-21T12:47:05.494285+00:00", "EventTime": "2024-05-21T12:47:05.494322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfXU3pJXRnGcsZzRf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "deedb067-71ab-4455-b493-8bb3db37a180", "DetectTime": "2024-05-21T12:47:05.539488+00:00", "EventTime": "2024-05-21T12:47:05.539510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04uSp2aQtLKBWerPj"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "7f6eb054-d9db-4d54-a386-747d32e9c177", "DetectTime": "2024-05-21T12:47:05.580510+00:00", "EventTime": "2024-05-21T12:47:05.580535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCLm14bvxVG85KT8d"], "accumulated_threat_level": 9.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "3f69aa26-5fce-46a4-8ee8-1709d7670c2c", "DetectTime": "2024-05-21T12:47:05.694806+00:00", "EventTime": "2024-05-21T12:47:05.694835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6ie83EZwuoiU6N12"], "accumulated_threat_level": 10.4, "timewindow": 152} +{"Format": "IDEA0", "ID": "450e19fc-5ea3-4486-9584-f2963f719940", "DetectTime": "2024-05-21T12:47:05.794569+00:00", "EventTime": "2024-05-21T12:47:05.794601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9KKIt3FIBIzjpw4Ok"], "accumulated_threat_level": 11.200000000000001, "timewindow": 152} +{"Format": "IDEA0", "ID": "de4ef800-85c4-4130-bdb2-4c5057557562", "DetectTime": "2024-05-21T12:47:05.869202+00:00", "EventTime": "2024-05-21T12:47:05.869241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrpSE3YxZMfL45Sij"], "accumulated_threat_level": 12.000000000000002, "timewindow": 152} +{"Format": "Json", "ID": "de4ef800-85c4-4130-bdb2-4c5057557562", "DetectTime": "2024-05-21T12:47:05.869202+00:00", "EventTime": "2024-05-21T12:47:05.869241+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "1970-01-07T07:34:11.922851+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 152. (real time 2024/05/21 12:47:06.050164)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 152, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5bccb65c-d49c-4207-8eb6-c276bbb3efb8", "DetectTime": "2024-05-21T12:47:06.064147+00:00", "EventTime": "2024-05-21T12:47:06.064179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOBW5YEZ8X4pwYm5"], "accumulated_threat_level": 0.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "8635ddc6-83ff-4161-8e76-e094a59c7f86", "DetectTime": "2024-05-21T12:47:06.228469+00:00", "EventTime": "2024-05-21T12:47:06.228490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGSRO1Cistuyw9yp"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "d56d9c1e-0831-4dea-ad10-7a147ebe51cb", "DetectTime": "2024-05-21T12:47:06.283556+00:00", "EventTime": "2024-05-21T12:47:06.283575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxtIU1ujNsstoy1bd"], "accumulated_threat_level": 1.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "4e3a82ea-b951-4c22-abfb-c56841875c01", "DetectTime": "2024-05-21T12:47:06.331760+00:00", "EventTime": "2024-05-21T12:47:06.331780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zL5a3B1rQX3etgec"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 152} +{"Format": "IDEA0", "ID": "223158d7-43e8-46eb-a09d-e4ad5c9404bc", "DetectTime": "2024-05-21T12:47:06.389437+00:00", "EventTime": "2024-05-21T12:47:06.389458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["181.135.143.64"]}], "Attach": [{"Content": "Connection to unknown destination port 1943/UDP destination IP 181.135.143.64. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdUCcK34EhTktnEnG9"], "accumulated_threat_level": 3.2, "timewindow": 152} +{"Format": "IDEA0", "ID": "4fe0eff5-9dbb-44d9-9d14-e667b136f721", "DetectTime": "2024-05-21T12:47:06.434129+00:00", "EventTime": "2024-05-21T12:47:06.434149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouyRtqKZJ4s5jzEh"], "accumulated_threat_level": 4.0, "timewindow": 152} +{"Format": "IDEA0", "ID": "cc002508-5a4d-4a45-b780-b05065705408", "DetectTime": "2024-05-21T12:47:06.483894+00:00", "EventTime": "2024-05-21T12:47:06.483933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MQCC1QbH42zqk0fe"], "accumulated_threat_level": 4.8, "timewindow": 152} +{"Format": "IDEA0", "ID": "75c672ae-262b-4eca-9f73-c1d7de624833", "DetectTime": "2024-05-21T12:47:06.536687+00:00", "EventTime": "2024-05-21T12:47:06.536723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdG1R31z8P4oalkg5"], "accumulated_threat_level": 5.6, "timewindow": 152} +{"Format": "IDEA0", "ID": "277d35b5-2dcb-4c74-a7d6-e34aceae6cdc", "DetectTime": "2024-05-21T12:47:06.786759+00:00", "EventTime": "2024-05-21T12:47:06.786781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzDSsW1fjyVqJUabBb"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "6395f2ce-dd9a-4ad8-b946-b20b05f4846d", "DetectTime": "2024-05-21T12:47:06.858125+00:00", "EventTime": "2024-05-21T12:47:06.858159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16uv714iRsJfWp677"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 152} +{"Format": "IDEA0", "ID": "ca1c1285-5dc9-4dfc-ad7c-b27b40e08189", "DetectTime": "2024-05-21T12:47:06.908299+00:00", "EventTime": "2024-05-21T12:47:06.908317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZWvq3rBLJ0Pl444j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9dde7f00-d36f-4711-940f-20bd8db3e42c", "DetectTime": "2024-05-21T12:47:07.208626+00:00", "EventTime": "2024-05-21T12:47:07.208649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUnSt43KqiZPbTY0e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "50a6bba5-8a88-454d-8813-a747f4fdee01", "DetectTime": "2024-05-21T12:47:07.327297+00:00", "EventTime": "2024-05-21T12:47:07.327317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Sz0e3nWwA1Z2yt6b"], "accumulated_threat_level": 2.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "67546474-2f46-400e-93e8-176659256872", "DetectTime": "2024-05-21T12:47:07.376507+00:00", "EventTime": "2024-05-21T12:47:07.376525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnnDOx27ukFBLFUPF7"], "accumulated_threat_level": 3.5999999999999996, "timewindow": 153} +{"Format": "IDEA0", "ID": "32989c1d-c096-4870-9dbd-e8192abe9b54", "DetectTime": "2024-05-21T12:47:07.439489+00:00", "EventTime": "2024-05-21T12:47:07.439508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdNCR30qK5XKkdHpa"], "accumulated_threat_level": 4.3999999999999995, "timewindow": 153} +{"Format": "IDEA0", "ID": "cbb69af6-7161-4286-a3e5-e5082fcca1ad", "DetectTime": "2024-05-21T12:47:07.693976+00:00", "EventTime": "2024-05-21T12:47:07.693998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpfYiDQz88vLef94"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "044d2f89-d833-431a-8202-9fcd79754929", "DetectTime": "2024-05-21T12:47:07.735846+00:00", "EventTime": "2024-05-21T12:47:07.735863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIFdao2QK2kzu2tA14"], "accumulated_threat_level": 5.199999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "c1afadb3-c8d7-42f6-b5d2-eba861916617", "DetectTime": "2024-05-21T12:47:07.782003+00:00", "EventTime": "2024-05-21T12:47:07.782022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CushbK2HQe0ExHI2Qe"], "accumulated_threat_level": 5.999999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "aeefb85f-c507-4638-b3d5-eadcb9bb3892", "DetectTime": "2024-05-21T12:47:07.868256+00:00", "EventTime": "2024-05-21T12:47:07.868292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPb8HTg8pB82CrP9"], "accumulated_threat_level": 6.799999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "2dad65dc-81e9-4287-abc7-a5fc2dc6908b", "DetectTime": "2024-05-21T12:47:07.914065+00:00", "EventTime": "2024-05-21T12:47:07.914085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmcMj23ZzC21GRKs6"], "accumulated_threat_level": 7.599999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "f4367bf3-497e-4d83-8b05-5e16f326aab0", "DetectTime": "2024-05-21T12:47:07.965214+00:00", "EventTime": "2024-05-21T12:47:07.965233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnKEhL1lwbuFlWZj25"], "accumulated_threat_level": 8.399999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "34dc97d5-0e8f-44af-a85c-dfa484037986", "DetectTime": "2024-05-21T12:47:08.090637+00:00", "EventTime": "2024-05-21T12:47:08.090657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfeRik46IeFsGLAnWf"], "accumulated_threat_level": 9.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "432877aa-90f5-45e7-9c26-b5f9e0d87313", "DetectTime": "2024-05-21T12:47:08.140706+00:00", "EventTime": "2024-05-21T12:47:08.140727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMwAW37oFaZofI41f"], "accumulated_threat_level": 10.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "7821355a-2654-4738-afbc-14f5340e6999", "DetectTime": "2024-05-21T12:47:08.403926+00:00", "EventTime": "2024-05-21T12:47:08.403947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxrQ6Vuhdk1Z4p3c"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "861f8cdd-205a-4659-8074-f962dc93e994", "DetectTime": "2024-05-21T12:47:08.451114+00:00", "EventTime": "2024-05-21T12:47:08.451134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci61Q7ncVmMKxOM7k"], "accumulated_threat_level": 10.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "bae3e4e4-132f-476d-b4b7-6cdad1342ee4", "DetectTime": "2024-05-21T12:47:08.502273+00:00", "EventTime": "2024-05-21T12:47:08.502292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDw5603qXj6hdG3Bpl"], "accumulated_threat_level": 11.600000000000001, "timewindow": 153} +{"Format": "IDEA0", "ID": "83df291f-18d9-4f16-81ff-ab99a38db1f7", "DetectTime": "2024-05-21T12:47:08.555879+00:00", "EventTime": "2024-05-21T12:47:08.555898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cso6T61zSssoioWpxd"], "accumulated_threat_level": 12.400000000000002, "timewindow": 153} +{"Format": "Json", "ID": "83df291f-18d9-4f16-81ff-ab99a38db1f7", "DetectTime": "2024-05-21T12:47:08.555879+00:00", "EventTime": "2024-05-21T12:47:08.555898+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-07T08:07:55.158468+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2024/05/21 12:47:08.910262)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.400000000000002, "timewindow": 153, "profileid": "profile_10.0.2.19", "threat_level": 12.400000000000002} +{"Format": "IDEA0", "ID": "9b3fc31f-23a6-4758-9367-7207549b1bd7", "DetectTime": "2024-05-21T12:47:08.922062+00:00", "EventTime": "2024-05-21T12:47:08.922084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEEqe4hn0MuHuSB12"], "accumulated_threat_level": 0.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "0ac99be1-4c7b-463b-9e26-e74f40c74e2d", "DetectTime": "2024-05-21T12:47:08.933521+00:00", "EventTime": "2024-05-21T12:47:08.933540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6dNU21KW7nq7kpkuh"], "accumulated_threat_level": 1.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "836ef4cf-77e7-4a7c-a746-cae7ac57da3b", "DetectTime": "2024-05-21T12:47:08.945218+00:00", "EventTime": "2024-05-21T12:47:08.945237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckk1bt2sk9MlIvDv0h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 153} +{"Format": "IDEA0", "ID": "f266426d-171a-462c-a777-f83c6d4f1d0e", "DetectTime": "2024-05-21T12:47:08.956813+00:00", "EventTime": "2024-05-21T12:47:08.956832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGLpywzHHaw5d7WV9"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "e34759b4-59ab-4776-b8b8-5155085eae34", "DetectTime": "2024-05-21T12:47:09.103014+00:00", "EventTime": "2024-05-21T12:47:09.103036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqGLn18wE0S6nx5b8"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "23970cc8-5529-47b9-85c1-bb4489adcf6e", "DetectTime": "2024-05-21T12:47:09.153477+00:00", "EventTime": "2024-05-21T12:47:09.153497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFuHOG2rnvBfzMt6Pd"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "b882329a-ab0d-412f-856a-c7c20a5944bc", "DetectTime": "2024-05-21T12:47:09.203495+00:00", "EventTime": "2024-05-21T12:47:09.203517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FZPSgoKrOkNlZn1"], "accumulated_threat_level": 5.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "7fd8f597-31c7-4154-9c24-abacb39e5190", "DetectTime": "2024-05-21T12:47:09.253408+00:00", "EventTime": "2024-05-21T12:47:09.253428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTb612V2cMcyhEgsc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 153} +{"Format": "IDEA0", "ID": "9b370b3c-7691-48e6-8164-ffeb59132298", "DetectTime": "2024-05-21T12:47:09.304237+00:00", "EventTime": "2024-05-21T12:47:09.304259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdwYkFBO4VcSCbbC1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "06c0f8f2-a235-46da-be07-a1164651d48d", "DetectTime": "2024-05-21T12:47:09.386161+00:00", "EventTime": "2024-05-21T12:47:09.386184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjmU4F1E1L7y9To0C7"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "6cac0ee4-2758-493f-9809-041f2347e5c3", "DetectTime": "2024-05-21T12:47:09.429979+00:00", "EventTime": "2024-05-21T12:47:09.430000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNh9R3y1kRtJVZ5G3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "719b3af3-ffca-4090-8273-6eea211e3624", "DetectTime": "2024-05-21T12:47:09.742265+00:00", "EventTime": "2024-05-21T12:47:09.742287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSiRo53OfAU2FdCOd9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "017862f9-5c3f-4635-b0c6-a9d50259af53", "DetectTime": "2024-05-21T12:47:09.780464+00:00", "EventTime": "2024-05-21T12:47:09.780484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.250.218.50"]}], "Attach": [{"Content": "Connection to unknown destination port 3691/UDP destination IP 69.250.218.50. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQZKA2vQGt9Jozhja"], "accumulated_threat_level": 9.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "728bc171-b884-4992-8549-a5020cafb566", "DetectTime": "2024-05-21T12:47:09.830564+00:00", "EventTime": "2024-05-21T12:47:09.830583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZSqi3cDciakAwZJh"], "accumulated_threat_level": 10.4, "timewindow": 153} +{"Format": "IDEA0", "ID": "5ded25e0-09f8-4c88-aef8-afdb186818b2", "DetectTime": "2024-05-21T12:47:09.879953+00:00", "EventTime": "2024-05-21T12:47:09.879972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLjjS1fH36Q1XU6b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 153} +{"Format": "IDEA0", "ID": "b3147048-dfe9-482d-bb7d-92cf7e796ca0", "DetectTime": "2024-05-21T12:47:09.945642+00:00", "EventTime": "2024-05-21T12:47:09.945661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmF6CTrxALqZ7nErl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 153} +{"Format": "Json", "ID": "b3147048-dfe9-482d-bb7d-92cf7e796ca0", "DetectTime": "2024-05-21T12:47:09.945642+00:00", "EventTime": "2024-05-21T12:47:09.945661+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-07T08:08:56.865721+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2024/05/21 12:47:10.310381)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 153, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d93abac8-1604-4fc8-a44c-1e68a47d9606", "DetectTime": "2024-05-21T12:47:10.320271+00:00", "EventTime": "2024-05-21T12:47:10.320290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgun91TDn5vjc1vf2"], "accumulated_threat_level": 0.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "fcb2d1ae-23fe-4e27-b4c0-18a54a07c8cf", "DetectTime": "2024-05-21T12:47:10.331693+00:00", "EventTime": "2024-05-21T12:47:10.331715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgAXP3zENM3ij2Bzk"], "accumulated_threat_level": 1.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "1de51459-f62c-4682-9a98-1eb9a0e60e92", "DetectTime": "2024-05-21T12:47:10.347525+00:00", "EventTime": "2024-05-21T12:47:10.347543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg3fpG150C3rhvVJn2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 153} +{"Format": "IDEA0", "ID": "8d0f6728-0f81-4d99-8391-af402133e0d4", "DetectTime": "2024-05-21T12:47:10.390808+00:00", "EventTime": "2024-05-21T12:47:10.390831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cywf2s4TNEw6oQR0Wh"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "cf57e295-9aa6-4983-a908-4ef6a1360dbb", "DetectTime": "2024-05-21T12:47:10.433834+00:00", "EventTime": "2024-05-21T12:47:10.433854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csr2Q91RDbopu8eXa1"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "b46f6dd9-ac72-4eb5-9f7e-14010806c03e", "DetectTime": "2024-05-21T12:47:10.480526+00:00", "EventTime": "2024-05-21T12:47:10.480545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9kbp1mWCSRzvWZwl"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "70b54d78-1393-4264-8239-a1f6ad6a4432", "DetectTime": "2024-05-21T12:47:10.524304+00:00", "EventTime": "2024-05-21T12:47:10.524323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEZ9t1dTPbUqUAw13"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "f37a8fcf-86ea-460e-9d4e-9e83b41f8f8a", "DetectTime": "2024-05-21T12:47:10.576212+00:00", "EventTime": "2024-05-21T12:47:10.576233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMXvQ2gShUBYWfEf4"], "accumulated_threat_level": 5.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "45b61b58-4441-43dd-a986-9361a6ef5f50", "DetectTime": "2024-05-21T12:47:10.623766+00:00", "EventTime": "2024-05-21T12:47:10.623788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvDTS2H9IOqUyPZ98"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 153} +{"Format": "IDEA0", "ID": "687a35b6-d249-4435-9798-b58e66981750", "DetectTime": "2024-05-21T12:47:10.672324+00:00", "EventTime": "2024-05-21T12:47:10.672344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRFWQ2nkVruZ9Yyqb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "562a2b71-2eea-4bf0-9c07-185a8c36f048", "DetectTime": "2024-05-21T12:47:10.718206+00:00", "EventTime": "2024-05-21T12:47:10.718227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwNX51Ny9tbh5Y1j6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "a7888077-be98-401d-a662-8ed6a824d4a9", "DetectTime": "2024-05-21T12:47:10.989252+00:00", "EventTime": "2024-05-21T12:47:10.989275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTm9G31L12x9zyyJof"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "00d51bee-2c26-43af-a823-aa3404dd80ee", "DetectTime": "2024-05-21T12:47:10.995897+00:00", "EventTime": "2024-05-21T12:47:10.995917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdqBTqqCjHmVJsYpj"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "7009ef21-9c2b-4dd1-907e-c6e00ce7abe8", "DetectTime": "2024-05-21T12:47:11.109565+00:00", "EventTime": "2024-05-21T12:47:11.109585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpydZM3dvVpgAaHttj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "2bd5a435-296c-4e94-91e7-f0cf9e00083c", "DetectTime": "2024-05-21T12:47:11.144164+00:00", "EventTime": "2024-05-21T12:47:11.144185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtBwgC3N0Y5IpNahid"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "d1c834c4-af53-457f-8b46-287bda51ab2e", "DetectTime": "2024-05-21T12:47:11.190756+00:00", "EventTime": "2024-05-21T12:47:11.190777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuprl4wTI4VtYy05a"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "a29f2f38-2617-4c39-9ee8-ba5f72fbf867", "DetectTime": "2024-05-21T12:47:11.243382+00:00", "EventTime": "2024-05-21T12:47:11.243401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpo1w84bKsevVZZr4j"], "accumulated_threat_level": 9.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "221e938f-4b23-4a4c-b34c-983b3c4a132b", "DetectTime": "2024-05-21T12:47:11.294789+00:00", "EventTime": "2024-05-21T12:47:11.294808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeoCk1105FZXnzoKwb"], "accumulated_threat_level": 10.4, "timewindow": 153} +{"Format": "IDEA0", "ID": "3def70e2-87e2-4e2d-beb2-2cea1b89fb2e", "DetectTime": "2024-05-21T12:47:11.593451+00:00", "EventTime": "2024-05-21T12:47:11.593477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVotN83HZ1NgZEa0o3"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "d61375fa-2882-4130-9720-e525a64e570e", "DetectTime": "2024-05-21T12:47:11.598623+00:00", "EventTime": "2024-05-21T12:47:11.598642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMDRczxIjhnUPiu93"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ce63b61d-cdbe-4be8-a141-8aca1a997153", "DetectTime": "2024-05-21T12:47:11.676061+00:00", "EventTime": "2024-05-21T12:47:11.676079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpcB648LE4PEwL6Y1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 153} +{"Format": "IDEA0", "ID": "c823b635-7e5d-42b7-b7da-27cdb273dc89", "DetectTime": "2024-05-21T12:47:11.733564+00:00", "EventTime": "2024-05-21T12:47:11.733588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgeCuq4xppaVQoPSgb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 153} +{"Format": "Json", "ID": "c823b635-7e5d-42b7-b7da-27cdb273dc89", "DetectTime": "2024-05-21T12:47:11.733564+00:00", "EventTime": "2024-05-21T12:47:11.733588+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "1970-01-07T08:09:52.968958+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2024/05/21 12:47:11.920546)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 153, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b58ea156-002b-404c-8080-e9dc94ccffdf", "DetectTime": "2024-05-21T12:47:11.932026+00:00", "EventTime": "2024-05-21T12:47:11.932044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1n2bF4bI1EWjkYwW3"], "accumulated_threat_level": 0.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "57ea8963-f452-4efb-a5a8-877c8127ded0", "DetectTime": "2024-05-21T12:47:11.936578+00:00", "EventTime": "2024-05-21T12:47:11.936595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Pe7p2zBgb9fzW7G2"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "cfcf0778-964e-4c9f-8f5c-387142a0a90a", "DetectTime": "2024-05-21T12:47:11.965067+00:00", "EventTime": "2024-05-21T12:47:11.965091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co8QdS1i1Ww75yl0Fd"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "bc198613-8f1e-4f21-8a60-819702e8b6f6", "DetectTime": "2024-05-21T12:47:12.015280+00:00", "EventTime": "2024-05-21T12:47:12.015302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWYgSy2O7L4ZQJT9U1"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "6049025a-09dd-4a3c-8c1a-e94e3850b718", "DetectTime": "2024-05-21T12:47:12.310352+00:00", "EventTime": "2024-05-21T12:47:12.310376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYaObj4v72nIjGZNJ3"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "9ee83908-2174-434e-8497-fba467ee277f", "DetectTime": "2024-05-21T12:47:12.316239+00:00", "EventTime": "2024-05-21T12:47:12.316259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyDx71spqECXBn8y7"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ec061234-38a6-4e23-86e5-c6378737cc78", "DetectTime": "2024-05-21T12:47:12.321690+00:00", "EventTime": "2024-05-21T12:47:12.321708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVhhSV37seKnGWQBp"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ec992053-500e-495a-b4e9-88b8e6eec9ee", "DetectTime": "2024-05-21T12:47:12.326155+00:00", "EventTime": "2024-05-21T12:47:12.326173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFkWxl2DHudOqlvFv4"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "8cb6543b-b8c1-48b9-8dd4-05a6bb401a20", "DetectTime": "2024-05-21T12:47:12.477733+00:00", "EventTime": "2024-05-21T12:47:12.477755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ALHa2rVunJ7YTaQi"], "accumulated_threat_level": 1.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "e27f48d0-e77e-45e1-88f1-ed38bcf688d7", "DetectTime": "2024-05-21T12:47:12.575231+00:00", "EventTime": "2024-05-21T12:47:12.575256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGN9w4BI70ELL3609"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ec2bdfd6-2f6c-4020-8994-18b7ef795982", "DetectTime": "2024-05-21T12:47:12.669922+00:00", "EventTime": "2024-05-21T12:47:12.669940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICMLdnv7KRCl2GD8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 153} +{"Format": "IDEA0", "ID": "cf65f53f-f03e-49fc-a2b8-905e4ecc4b86", "DetectTime": "2024-05-21T12:47:12.990024+00:00", "EventTime": "2024-05-21T12:47:12.990046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOiTt1z8MDlOi0Hbi"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "4b10f828-8830-422e-b1e7-a9085c48249c", "DetectTime": "2024-05-21T12:47:12.996247+00:00", "EventTime": "2024-05-21T12:47:12.996267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYwdp2gvoK1uIW661"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "caa76c0a-f1d3-4ada-a655-960d2766c78a", "DetectTime": "2024-05-21T12:47:13.003599+00:00", "EventTime": "2024-05-21T12:47:13.003628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL6rYQ21oeqwo6I76c"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "a0059376-dde4-4c00-aac8-39ccc410654c", "DetectTime": "2024-05-21T12:47:13.009056+00:00", "EventTime": "2024-05-21T12:47:13.009076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGqEa4Q9i9CN4brpi"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "0dda3dcd-7057-4b06-aafe-f1235ddc892e", "DetectTime": "2024-05-21T12:47:13.092982+00:00", "EventTime": "2024-05-21T12:47:13.093004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4vYVykwoD3lcUol"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "8f595c2b-9294-4f66-b3d0-235ff6e841c8", "DetectTime": "2024-05-21T12:47:13.151902+00:00", "EventTime": "2024-05-21T12:47:13.151924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7R9dH3kG17s6YCYMk"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "b53e7838-359f-4f5a-b03f-c49689d9f6c0", "DetectTime": "2024-05-21T12:47:13.290607+00:00", "EventTime": "2024-05-21T12:47:13.290627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCfF3U1A4en3vfTBV7"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "ec423c4a-cc22-4697-939a-a5c981f483f8", "DetectTime": "2024-05-21T12:47:13.326560+00:00", "EventTime": "2024-05-21T12:47:13.326582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyY22L3XRaNayFchO"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "3252a842-3859-43ef-bcf0-92f5d4b4a4de", "DetectTime": "2024-05-21T12:47:13.629033+00:00", "EventTime": "2024-05-21T12:47:13.629056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuJ9Ju5Z2hKAhvlL8"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "fdfd0686-4e44-4490-a666-2f981bd53fed", "DetectTime": "2024-05-21T12:47:13.665435+00:00", "EventTime": "2024-05-21T12:47:13.665461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQx49T1gqwF2pebLKk"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "68443ea3-1f5e-4596-877d-b78333fed554", "DetectTime": "2024-05-21T12:47:13.670719+00:00", "EventTime": "2024-05-21T12:47:13.670739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJ4hf1v6IKeVxzA69"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "001e20ce-1251-4042-a9fb-a4c87332f573", "DetectTime": "2024-05-21T12:47:13.675312+00:00", "EventTime": "2024-05-21T12:47:13.675330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXUV11YuWyCyTk6q7"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "bb43b174-c3bb-44a2-a5a6-d1d5409f22f3", "DetectTime": "2024-05-21T12:47:13.680902+00:00", "EventTime": "2024-05-21T12:47:13.680920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPe5eQ2rTd4urIPv0b"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "019f8017-1a2c-46bc-a178-c9aadde44e09", "DetectTime": "2024-05-21T12:47:13.824381+00:00", "EventTime": "2024-05-21T12:47:13.824400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOCvT2RWGLycub2G8"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "e24c8c61-1cae-4d10-8038-d8d782168e89", "DetectTime": "2024-05-21T12:47:13.847607+00:00", "EventTime": "2024-05-21T12:47:13.847628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C24TOv33fcu5WGMDoa"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "ce7e0fc1-bb63-414c-8f62-15b4d76fbe41", "DetectTime": "2024-05-21T12:47:13.928887+00:00", "EventTime": "2024-05-21T12:47:13.928906+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXcmB2fxuWqvYvpe9"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "aaec2ab5-2ba0-4e4c-8cad-c3114c66fe7b", "DetectTime": "2024-05-21T12:47:13.941632+00:00", "EventTime": "2024-05-21T12:47:13.941651+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbXcmB2fxuWqvYvpe9"], "accumulated_threat_level": 8.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "b0a22af5-aae9-48e6-9f09-a97f7404ee56", "DetectTime": "2024-05-21T12:47:14.033029+00:00", "EventTime": "2024-05-21T12:47:14.033048+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCznF4gtygOJozjyd"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "774d4e5a-c4fc-494f-b98b-d2ddb727780b", "DetectTime": "2024-05-21T12:47:14.045729+00:00", "EventTime": "2024-05-21T12:47:14.045750+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCznF4gtygOJozjyd"], "accumulated_threat_level": 9.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "fce18209-571b-4f18-adfc-d2eb04d17999", "DetectTime": "2024-05-21T12:47:14.113066+00:00", "EventTime": "2024-05-21T12:47:14.113089+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6lWi3NsK1zAhIy6i"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "fdbafefe-9450-438c-b3d9-25bab21705f4", "DetectTime": "2024-05-21T12:47:14.128751+00:00", "EventTime": "2024-05-21T12:47:14.128770+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci6lWi3NsK1zAhIy6i"], "accumulated_threat_level": 9.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "48642b9b-bea5-4b27-8212-977e73016d3f", "DetectTime": "2024-05-21T12:47:14.152691+00:00", "EventTime": "2024-05-21T12:47:14.152715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7QysT3SzZHP9DxXe1"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "748b6f7c-43f9-432b-a28f-1d645c365be0", "DetectTime": "2024-05-21T12:47:14.158797+00:00", "EventTime": "2024-05-21T12:47:14.158818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbOrdK4aaqnv5TSe"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "5195543b-01d3-467f-8a83-ec75d08baf47", "DetectTime": "2024-05-21T12:47:14.164031+00:00", "EventTime": "2024-05-21T12:47:14.164049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFu5Ac2VRQ0Dmp7US9"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "41ea8815-f64f-48cb-a1a4-7768ebafc496", "DetectTime": "2024-05-21T12:47:14.176131+00:00", "EventTime": "2024-05-21T12:47:14.176153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLGWzI3RvalqvILIn"], "accumulated_threat_level": 5.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "894a6d00-3487-4f14-a79b-0a2eb2d02006", "DetectTime": "2024-05-21T12:47:14.188880+00:00", "EventTime": "2024-05-21T12:47:14.188899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.226.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoW1Fw1rJI719Qf3pi"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "7c00636e-a9a7-4f88-a377-237de574fa2b", "DetectTime": "2024-05-21T12:47:14.202666+00:00", "EventTime": "2024-05-21T12:47:14.202691+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoW1Fw1rJI719Qf3pi"], "accumulated_threat_level": 10.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "7724aae1-a383-4292-b955-776539460438", "DetectTime": "2024-05-21T12:47:14.207930+00:00", "EventTime": "2024-05-21T12:47:14.207952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ8xJ14pNVVIk5a9B7"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "c8e8fe66-8df1-421b-a37a-4a2df3e1a66f", "DetectTime": "2024-05-21T12:47:14.372722+00:00", "EventTime": "2024-05-21T12:47:14.372743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZAeC52E8XUtZZkLLa"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "8f400440-8687-4e3d-a4c6-e16416918837", "DetectTime": "2024-05-21T12:47:14.378451+00:00", "EventTime": "2024-05-21T12:47:14.378470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEw9Vo1XkplAZVHwAa"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "309ea972-4b4e-4aa6-9fc0-a45dcfae7935", "DetectTime": "2024-05-21T12:47:14.616713+00:00", "EventTime": "2024-05-21T12:47:14.616734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B0h22PEuIAYk9tbf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 153} +{"Format": "IDEA0", "ID": "a979adbf-ae0a-4458-b7f1-a3f058ef7188", "DetectTime": "2024-05-21T12:47:14.663659+00:00", "EventTime": "2024-05-21T12:47:14.663689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvaYTN37DIjYasniLd"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "482360f3-3a61-4326-9e0b-35de7d0e4e7a", "DetectTime": "2024-05-21T12:47:14.669220+00:00", "EventTime": "2024-05-21T12:47:14.669243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8ovV1ADwN99fKa44"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "5956548f-05d4-4b60-9ee3-62ca4e2febdf", "DetectTime": "2024-05-21T12:47:14.743263+00:00", "EventTime": "2024-05-21T12:47:14.743284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdicvl48qFyefWjlvb"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "8a1090f4-1a2f-436a-a287-499e1541f565", "DetectTime": "2024-05-21T12:47:14.760131+00:00", "EventTime": "2024-05-21T12:47:14.760151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf908l1thwxoxEsyWd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "ed72ae3c-3897-4b13-963a-7a2ff94327c7", "DetectTime": "2024-05-21T12:47:14.792408+00:00", "EventTime": "2024-05-21T12:47:14.792428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkgZsx1N88HEHkNINl"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "e062fdcd-a4b7-4bfe-ae21-7ee0aaba939a", "DetectTime": "2024-05-21T12:47:14.875723+00:00", "EventTime": "2024-05-21T12:47:14.875746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpeEMT3zo8N859n83d"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "8ba87f2b-6412-4efc-b73a-392f9716c957", "DetectTime": "2024-05-21T12:47:15.163598+00:00", "EventTime": "2024-05-21T12:47:15.163619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8DwzO2WfTJnCLovh7"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "045f7ac3-ecea-421a-8859-9216a2506307", "DetectTime": "2024-05-21T12:47:15.216646+00:00", "EventTime": "2024-05-21T12:47:15.216667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7eap1QFtxucYP0Gi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "aa901fc5-22e4-4485-88f4-13e5d02dd4b4", "DetectTime": "2024-05-21T12:47:15.280331+00:00", "EventTime": "2024-05-21T12:47:15.280353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsAFn1Ybeecgsehbe"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "0c0c2215-80cd-4fdd-8930-417178149b82", "DetectTime": "2024-05-21T12:47:15.362322+00:00", "EventTime": "2024-05-21T12:47:15.362344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwZaY1QspZbbH3Am8"], "accumulated_threat_level": 4.0, "timewindow": 151} +{"Format": "IDEA0", "ID": "472d90d5-7854-430e-9947-3b79b4665780", "DetectTime": "2024-05-21T12:47:15.413171+00:00", "EventTime": "2024-05-21T12:47:15.413189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfF3bs3PZft9Xh97"], "accumulated_threat_level": 8.799999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "af2ff8a4-aea9-421a-aebd-43d7113e5d93", "DetectTime": "2024-05-21T12:47:15.495928+00:00", "EventTime": "2024-05-21T12:47:15.495950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.54.61.128 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Xumu2UtoYob5DHkc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "777cae39-fb11-4552-853a-97f7af24ca7d", "DetectTime": "2024-05-21T12:47:15.572339+00:00", "EventTime": "2024-05-21T12:47:15.572362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.176.144.253 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboE9Pxyjq8jYoLP2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "d1400f94-8338-4356-b1fc-683d96036cf1", "DetectTime": "2024-05-21T12:47:15.578152+00:00", "EventTime": "2024-05-21T12:47:15.578174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPRAnr2e10IeKBtmJ5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "affe5393-d4ee-4999-8bca-1a57e0c3ed49", "DetectTime": "2024-05-21T12:47:15.583485+00:00", "EventTime": "2024-05-21T12:47:15.583510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9pYY3kHD7MmwsiL"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "35dfe6c8-6b43-416d-b093-b5c532480bf1", "DetectTime": "2024-05-21T12:47:15.932058+00:00", "EventTime": "2024-05-21T12:47:15.932080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGz5os2CYBrgooiu27"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "084bf1b9-040c-4749-b6f9-57258d2a39b1", "DetectTime": "2024-05-21T12:47:15.941788+00:00", "EventTime": "2024-05-21T12:47:15.941807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 223.17.69.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJC1Cx10pENqtQvfM1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "4d58fc3f-80da-4a94-8704-7f9abe44b3fe", "DetectTime": "2024-05-21T12:47:15.985784+00:00", "EventTime": "2024-05-21T12:47:15.985803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.43.102.110 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNWWEP1jRxruqi7SIe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "7056eed8-966d-4226-b349-67a2267904b7", "DetectTime": "2024-05-21T12:47:16.034559+00:00", "EventTime": "2024-05-21T12:47:16.034577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVPiSd2ef3IhaMpuxj"], "accumulated_threat_level": 9.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "640b9996-c062-4898-b803-81edb6791512", "DetectTime": "2024-05-21T12:47:16.127147+00:00", "EventTime": "2024-05-21T12:47:16.127171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtRRKDj92LCYGAtbg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "94ce3386-78e6-423b-8c6e-1fac63e8e211", "DetectTime": "2024-05-21T12:47:16.136187+00:00", "EventTime": "2024-05-21T12:47:16.136207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdvh835pxd3kInqXi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2eb5ff3e-b513-43b8-9c1e-641a334c0896", "DetectTime": "2024-05-21T12:47:16.456315+00:00", "EventTime": "2024-05-21T12:47:16.456337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTaDAh3iW4SFaZ9ia9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "6725d5d1-aeb5-4de4-a754-aee3404cb4aa", "DetectTime": "2024-05-21T12:47:16.489337+00:00", "EventTime": "2024-05-21T12:47:16.489358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccvsox1xNmW0bmzhQ4"], "accumulated_threat_level": 10.4, "timewindow": 153} +{"Format": "IDEA0", "ID": "2bab9054-02b9-4f9d-a25e-8c01315d76bc", "DetectTime": "2024-05-21T12:47:16.516307+00:00", "EventTime": "2024-05-21T12:47:16.516331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHGq12O2SqtNLCE78"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0d1e857e-1554-4c83-8778-696a3a4bbe58", "DetectTime": "2024-05-21T12:47:16.521604+00:00", "EventTime": "2024-05-21T12:47:16.521626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 92.98.14.8 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7jSs18Yl8lSQ3nv7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a0491429-faef-41a3-9c5a-b445204efb40", "DetectTime": "2024-05-21T12:47:16.608180+00:00", "EventTime": "2024-05-21T12:47:16.608202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYben2jtLzWHEfVO2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "98fdd1ff-5485-4bf8-a24f-584b284e2702", "DetectTime": "2024-05-21T12:47:16.658031+00:00", "EventTime": "2024-05-21T12:47:16.658051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6Al21qXP6dksPGj7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9549750c-d31e-4e17-8c8a-147c01fe0a71", "DetectTime": "2024-05-21T12:47:16.740060+00:00", "EventTime": "2024-05-21T12:47:16.740084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHZab4dlji8JZL44f"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2a4e59e7-5ae3-4945-8551-6ebb7115e02c", "DetectTime": "2024-05-21T12:47:16.749689+00:00", "EventTime": "2024-05-21T12:47:16.749709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcGScX1OuOFFQFQRQk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "6181f07e-d79b-4003-b0b8-f4e8bfc1e604", "DetectTime": "2024-05-21T12:47:17.082228+00:00", "EventTime": "2024-05-21T12:47:17.082247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csuh3n0JMGpwcfLrc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 153} +{"Format": "IDEA0", "ID": "a909eae5-1c9f-4267-8c2c-4d6463c4e6bb", "DetectTime": "2024-05-21T12:47:17.087297+00:00", "EventTime": "2024-05-21T12:47:17.087316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKlcd3pQysWVK1Vff"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "01a617fd-53d0-441e-8c27-7cbe963b7d27", "DetectTime": "2024-05-21T12:47:17.091888+00:00", "EventTime": "2024-05-21T12:47:17.091906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsEFBq1khVTq9jKlXa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "1519b851-5ecb-4b33-8daa-d44294c10132", "DetectTime": "2024-05-21T12:47:17.158195+00:00", "EventTime": "2024-05-21T12:47:17.158214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCo0542UwA7j0oNUQ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "5624bfb2-090f-406d-8909-637264932c11", "DetectTime": "2024-05-21T12:47:17.208896+00:00", "EventTime": "2024-05-21T12:47:17.208923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C29HaBDnIr1l8Gt8k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "997fbcb7-5b12-48cf-90e5-4d3dbb7f3c5b", "DetectTime": "2024-05-21T12:47:17.296651+00:00", "EventTime": "2024-05-21T12:47:17.296673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWySvM3yY49CcMq1Yb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "26235d72-82ca-4613-9429-ba925b91fad0", "DetectTime": "2024-05-21T12:47:17.344449+00:00", "EventTime": "2024-05-21T12:47:17.344472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ79ZO1zICBf8zgnle"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "31147f18-5495-4947-97ba-932e57969300", "DetectTime": "2024-05-21T12:47:17.356884+00:00", "EventTime": "2024-05-21T12:47:17.356905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2avUU3q0qUisGIgA5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 153} +{"Format": "Json", "ID": "31147f18-5495-4947-97ba-932e57969300", "DetectTime": "2024-05-21T12:47:17.356884+00:00", "EventTime": "2024-05-21T12:47:17.356905+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-07T08:41:55.838490+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2024/05/21 12:47:17.590737)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 153, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "83351925-2171-483a-8113-c814095ab0e7", "DetectTime": "2024-05-21T12:47:17.618065+00:00", "EventTime": "2024-05-21T12:47:17.618088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIFh34FuRFCsSUc0l"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "c4d71324-d46d-4592-8132-5486afbd403f", "DetectTime": "2024-05-21T12:47:17.668292+00:00", "EventTime": "2024-05-21T12:47:17.668317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIgCUu4wDZ5awX8Kvl", "CMUV4I2FQCzIbNLRE1", "CcRfAe36q02c77Egr3", "CsfG5Y3hNuzXQdXIHe"], "accumulated_threat_level": 0.5, "timewindow": 158} +{"Format": "IDEA0", "ID": "639eb368-e127-4e3e-a68f-294f6dc0323a", "DetectTime": "2024-05-21T12:47:17.694050+00:00", "EventTime": "2024-05-21T12:47:17.694069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpX1tgLy8kvT6mVQ3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "42ae1daf-0795-45ea-83eb-c1e05db1b809", "DetectTime": "2024-05-21T12:47:17.699608+00:00", "EventTime": "2024-05-21T12:47:17.699626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZSUJ3ZIlQZrQyuek"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "ae5ffaf2-d965-4d3b-bda2-858a86d99876", "DetectTime": "2024-05-21T12:47:17.776178+00:00", "EventTime": "2024-05-21T12:47:17.776196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WT6n3XcjhsFMMbHl"], "accumulated_threat_level": 0.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "50399896-2806-4903-9114-57a85272deee", "DetectTime": "2024-05-21T12:47:17.820350+00:00", "EventTime": "2024-05-21T12:47:17.820371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSCmS2JSU1VGC54He"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "42d0a48d-0c9b-4450-8d3a-6fac75307408", "DetectTime": "2024-05-21T12:47:17.860345+00:00", "EventTime": "2024-05-21T12:47:17.860366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.20.148.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHqyaH3AGGHiFNiVp7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "616b9bb6-1565-499a-a02d-71e6eff2f2b2", "DetectTime": "2024-05-21T12:47:17.912163+00:00", "EventTime": "2024-05-21T12:47:17.912195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.39.67.168 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuX5Fd1MWhWWucH3E2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "3fcdd00e-e3ce-4bb2-be27-7b5745d0bfa3", "DetectTime": "2024-05-21T12:47:17.917427+00:00", "EventTime": "2024-05-21T12:47:17.917447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.145.164.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrtTIY3TfLMnsra8vh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "e0bc56c5-4d3d-4966-862c-533d2df7e330", "DetectTime": "2024-05-21T12:47:18.170511+00:00", "EventTime": "2024-05-21T12:47:18.170550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 159.213.140.53 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfH1ug4cVo0fcRJtvg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "b217d821-02a4-4d66-822c-654bc14054ee", "DetectTime": "2024-05-21T12:47:18.178322+00:00", "EventTime": "2024-05-21T12:47:18.178346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.143.9.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C97l4025TPtPit1R72"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "22154746-ca15-42bb-8a43-84052cc15d4f", "DetectTime": "2024-05-21T12:47:18.190394+00:00", "EventTime": "2024-05-21T12:47:18.190423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIgUMVGoeEcJAkjj"], "accumulated_threat_level": 1.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "061d2b31-6a9d-43f5-b50e-f34b81fa6b29", "DetectTime": "2024-05-21T12:47:18.344243+00:00", "EventTime": "2024-05-21T12:47:18.344265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.92.163.74 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4RHGX3mcec2GREn2e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "5367626a-186b-45ca-821e-ea13988852d3", "DetectTime": "2024-05-21T12:47:18.451037+00:00", "EventTime": "2024-05-21T12:47:18.451058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqf204BbXjPApwxpj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "1c5e6720-5d45-487f-bcf3-53547b6b6f5a", "DetectTime": "2024-05-21T12:47:18.503786+00:00", "EventTime": "2024-05-21T12:47:18.503808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.7.66.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQO3F62ZnVl8R5RWJ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "49ae4663-73d0-41f7-8753-6ff0f3a0db98", "DetectTime": "2024-05-21T12:47:18.511071+00:00", "EventTime": "2024-05-21T12:47:18.511092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 117.216.210.52 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyomX34M7svHolDZa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "4e7c93b8-ba8b-476a-bd0a-6008272e4566", "DetectTime": "2024-05-21T12:47:18.515861+00:00", "EventTime": "2024-05-21T12:47:18.515880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.78.12.24 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHPMo1YHu620z4RW2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0b16ea22-1ef3-400b-87a4-94babf1ecfb8", "DetectTime": "2024-05-21T12:47:18.524229+00:00", "EventTime": "2024-05-21T12:47:18.524251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 23.24.76.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnF4Bw4Iqp8CbVYsYf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "82da1cfb-37b9-48bb-803b-538fa770f612", "DetectTime": "2024-05-21T12:47:18.528869+00:00", "EventTime": "2024-05-21T12:47:18.528888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4P7112XSYTgEDKw42"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a9082307-c25b-42c6-8c65-8079a07fec65", "DetectTime": "2024-05-21T12:47:18.533428+00:00", "EventTime": "2024-05-21T12:47:18.533446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.49.17.214 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcCQqv3fLB5hkEZVMe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2ae88d54-52ad-4da7-88e6-bc41bafbd811", "DetectTime": "2024-05-21T12:47:18.786231+00:00", "EventTime": "2024-05-21T12:47:18.786253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.157.126.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ3xurBzP1HOFS1t7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "94995530-0f00-4b7e-a727-b71854331b49", "DetectTime": "2024-05-21T12:47:18.852414+00:00", "EventTime": "2024-05-21T12:47:18.852437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcsVqZ1QAejKB3epDi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "d0dd2424-c1c6-49d9-8f92-5ccc2d7e982d", "DetectTime": "2024-05-21T12:47:18.942457+00:00", "EventTime": "2024-05-21T12:47:18.942477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnfnkqD2LWS1tWXW9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f952d7e5-85dd-4619-bb73-cc87e2820339", "DetectTime": "2024-05-21T12:47:19.362801+00:00", "EventTime": "2024-05-21T12:47:19.362826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.17.251.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCCZ44IQCHzVIynC3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2b818a8b-6a16-4012-9943-7c1aac9953b9", "DetectTime": "2024-05-21T12:47:19.476250+00:00", "EventTime": "2024-05-21T12:47:19.476270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14sm54ISQJ945rlb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 153} +{"Format": "IDEA0", "ID": "8bea0e13-5308-4b1d-9f52-3d8af6259fb0", "DetectTime": "2024-05-21T12:47:19.530696+00:00", "EventTime": "2024-05-21T12:47:19.530717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.244.46.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5VM5tCM7H7hCmJRe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f35e4aa2-5f53-4640-9b6f-706e908d89b9", "DetectTime": "2024-05-21T12:47:19.536635+00:00", "EventTime": "2024-05-21T12:47:19.536656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.2.71.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUYkIJVlhpCvjVck"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "27be6414-5f92-45af-891c-d2d9473c2e0b", "DetectTime": "2024-05-21T12:47:19.547164+00:00", "EventTime": "2024-05-21T12:47:19.547184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.89.251.57 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDiNqQ31XMBrJJaZX9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "dfa2e7b5-30a4-4dc8-ba86-1e6eea62edaf", "DetectTime": "2024-05-21T12:47:19.578315+00:00", "EventTime": "2024-05-21T12:47:19.578337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQG3E186CDq81i3Og"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "5b07681d-5e4c-4bad-b761-152224da404a", "DetectTime": "2024-05-21T12:47:19.608769+00:00", "EventTime": "2024-05-21T12:47:19.608788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.87.217.145 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COTW9Z3hgUFK3kPhWh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2bb93e67-cfb4-473c-9306-3b06aebbeb36", "DetectTime": "2024-05-21T12:47:19.648650+00:00", "EventTime": "2024-05-21T12:47:19.648683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 140.247.230.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9M6IS3UrxFJz7cK8g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "18e15783-19fa-4ad5-b89a-48e810bfeed4", "DetectTime": "2024-05-21T12:47:19.907123+00:00", "EventTime": "2024-05-21T12:47:19.907144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 194.90.217.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CERP7B4BanvNB8vWx2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9114a360-75e7-4a63-acde-538bb5bc7b0f", "DetectTime": "2024-05-21T12:47:19.949127+00:00", "EventTime": "2024-05-21T12:47:19.949153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5gtxK2i4hBakYgNw4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "3d95a57a-9b06-4027-88cb-ec84d8b5c167", "DetectTime": "2024-05-21T12:47:19.955317+00:00", "EventTime": "2024-05-21T12:47:19.955338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.127.220.186 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsDhn72KuOrh8t6Qb6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "cac50a96-1aae-4e59-934f-06cb087f0e4b", "DetectTime": "2024-05-21T12:47:19.961358+00:00", "EventTime": "2024-05-21T12:47:19.961378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9lXJ1ZmYNjwN7aQ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "4ac02bc4-1442-49c0-b593-79791cf59d24", "DetectTime": "2024-05-21T12:47:19.986618+00:00", "EventTime": "2024-05-21T12:47:19.986641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cw7W3hdGsorW7CR4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "25f2c996-262a-4d17-907b-9bc233079fb3", "DetectTime": "2024-05-21T12:47:19.991874+00:00", "EventTime": "2024-05-21T12:47:19.991894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.0.232.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLafQ3p1NKuhiM4G1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "c06dfd24-8bbc-4e91-aa8f-a54bd009c869", "DetectTime": "2024-05-21T12:47:19.996863+00:00", "EventTime": "2024-05-21T12:47:19.996882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.23.121.108 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdEME440UjziA7Prka"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "e59a2360-a469-4f6e-bd29-4e65e44c63e4", "DetectTime": "2024-05-21T12:47:20.146157+00:00", "EventTime": "2024-05-21T12:47:20.146181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 207.250.82.102 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcUDbB15amDv85Gg6e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0d9ef5c4-093d-489f-b378-fbdfd6b6ed7b", "DetectTime": "2024-05-21T12:47:20.186348+00:00", "EventTime": "2024-05-21T12:47:20.186369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.181.179.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C358EA2S0WxlFQYK5b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "65060e96-28a4-4a14-9b6b-0c4785202283", "DetectTime": "2024-05-21T12:47:20.202101+00:00", "EventTime": "2024-05-21T12:47:20.202125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.167.102.135 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2m1vM2MqWs7s7S5i8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9b42e456-2ef7-421e-a24d-27f8469dc4e0", "DetectTime": "2024-05-21T12:47:20.293841+00:00", "EventTime": "2024-05-21T12:47:20.293863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.141.117.232 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzFi922Lp3sYUsXehg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "ff8dbfdb-aade-4f4c-8268-72f1015ea834", "DetectTime": "2024-05-21T12:47:20.630182+00:00", "EventTime": "2024-05-21T12:47:20.630204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr23yh2C1gBUdwGb13"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "98c23678-698f-43a3-9f5c-b62da0e3be58", "DetectTime": "2024-05-21T12:47:20.650870+00:00", "EventTime": "2024-05-21T12:47:20.650892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 118.21.140.162 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcTPci2Px1QeI4pfCj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "74844940-aabc-4464-a4ca-4fc9f65cd048", "DetectTime": "2024-05-21T12:47:20.692105+00:00", "EventTime": "2024-05-21T12:47:20.692126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 162.202.76.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMPX3dyAWwqgnbDrb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "adcaf855-11c1-4673-bfd1-4f76f5460a2b", "DetectTime": "2024-05-21T12:47:20.741719+00:00", "EventTime": "2024-05-21T12:47:20.741742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.98.52.56 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYvA6l4w9RlLBaruUh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "b6648512-bc94-4029-99b7-58b9fb3a6ebc", "DetectTime": "2024-05-21T12:47:20.753887+00:00", "EventTime": "2024-05-21T12:47:20.753913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.130.73.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUdsAw2tJnjZYQmsMh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "067e4a5f-e93a-41a3-9123-97a28b1b83d2", "DetectTime": "2024-05-21T12:47:20.782868+00:00", "EventTime": "2024-05-21T12:47:20.782889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.237.171.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9R4YEvlymmNXTGf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "7d2c3cb6-faa8-42ef-a27f-085f7787e1b8", "DetectTime": "2024-05-21T12:47:21.067896+00:00", "EventTime": "2024-05-21T12:47:21.067921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.248.7.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCpKu2Ec61akLdKHk"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "5e0cf022-329a-4f79-9e8b-a6add7cabf03", "DetectTime": "2024-05-21T12:47:21.081629+00:00", "EventTime": "2024-05-21T12:47:21.081654+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCpKu2Ec61akLdKHk"], "accumulated_threat_level": 10.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "7984681b-3bfc-4cb9-bf06-bd032537ed1f", "DetectTime": "2024-05-21T12:47:21.086548+00:00", "EventTime": "2024-05-21T12:47:21.086567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.19.159.160 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKOzep3rO2UlkkbvTa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "ca772fbc-ec39-45fd-a524-fa463fdd93ec", "DetectTime": "2024-05-21T12:47:21.115675+00:00", "EventTime": "2024-05-21T12:47:21.115700+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBe8n8civT511eEd9"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "d6ba36eb-cf46-45d9-a2dd-b50c78b6dc3c", "DetectTime": "2024-05-21T12:47:21.121717+00:00", "EventTime": "2024-05-21T12:47:21.121740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 77.209.71.84 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiBPTs26ieWlErxV8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "cfe3e503-bc0f-4c3f-961a-24ce5c6846be", "DetectTime": "2024-05-21T12:47:21.136382+00:00", "EventTime": "2024-05-21T12:47:21.136418+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBe8n8civT511eEd9"], "accumulated_threat_level": 11.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "ca269fb6-0dc0-4ef2-b46a-e0a3b881d5ed", "DetectTime": "2024-05-21T12:47:21.141553+00:00", "EventTime": "2024-05-21T12:47:21.141574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.13.164.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQdCY1QrFfIIk64Pd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "396097f9-9c60-4a6d-83c4-ca79bead32ab", "DetectTime": "2024-05-21T12:47:21.147178+00:00", "EventTime": "2024-05-21T12:47:21.147198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7QPo2HW9RQMBLvB1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "752d91f2-f30a-49ab-90a6-564cfdf99cd2", "DetectTime": "2024-05-21T12:47:21.160091+00:00", "EventTime": "2024-05-21T12:47:21.160113+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMtkG1A9kyY73L2J"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "0c7a1c0c-d68d-479a-b929-2ca6a475ca54", "DetectTime": "2024-05-21T12:47:21.174098+00:00", "EventTime": "2024-05-21T12:47:21.174120+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMtkG1A9kyY73L2J"], "accumulated_threat_level": 11.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "e787ae78-98ae-4fcc-a4e9-a74722a87bb7", "DetectTime": "2024-05-21T12:47:21.180442+00:00", "EventTime": "2024-05-21T12:47:21.180463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.28.24.185 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaXbRqEJcdI5aAyZi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "16be5f17-cbdf-49cd-8374-5c9409d70ee1", "DetectTime": "2024-05-21T12:47:21.194949+00:00", "EventTime": "2024-05-21T12:47:21.194972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPT0p31SoRAikg0l94"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "0a48698a-bb7a-4ce4-84b5-ec6274101cbc", "DetectTime": "2024-05-21T12:47:21.209354+00:00", "EventTime": "2024-05-21T12:47:21.209392+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPT0p31SoRAikg0l94"], "accumulated_threat_level": 12.0, "timewindow": 34} +{"Format": "Json", "ID": "0a48698a-bb7a-4ce4-84b5-ec6274101cbc", "DetectTime": "2024-05-21T12:47:21.209354+00:00", "EventTime": "2024-05-21T12:47:21.209392+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "1970-01-02T09:03:20.426037+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:47:21.726950)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "8a7b40b0-fb7e-42c8-bacd-f38c35a76044", "DetectTime": "2024-05-21T12:47:21.733112+00:00", "EventTime": "2024-05-21T12:47:21.733137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 203.206.220.184 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ECJw3ToZERnyqzG2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a778ae80-3b4c-49ed-ba4f-e76893d90954", "DetectTime": "2024-05-21T12:47:21.738378+00:00", "EventTime": "2024-05-21T12:47:21.738397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 180.190.211.236 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeqgAr4s0PyrdWRkC"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "7454aff1-68bf-473c-8b7c-c8537da12afd", "DetectTime": "2024-05-21T12:47:21.753764+00:00", "EventTime": "2024-05-21T12:47:21.753787+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsCNR2gaNa3QxC4te"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "9b6154ac-dcba-4516-994d-927bc9c32f1a", "DetectTime": "2024-05-21T12:47:21.766924+00:00", "EventTime": "2024-05-21T12:47:21.766971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsCNR2gaNa3QxC4te"], "accumulated_threat_level": 0.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "912b54f8-8d1f-4239-b808-65e322d76d91", "DetectTime": "2024-05-21T12:47:21.780106+00:00", "EventTime": "2024-05-21T12:47:21.780125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApPPu33ePVhZLjWD3"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "20ce2933-e25e-4db0-aac2-c278e21a8286", "DetectTime": "2024-05-21T12:47:21.793262+00:00", "EventTime": "2024-05-21T12:47:21.793285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CApPPu33ePVhZLjWD3"], "accumulated_threat_level": 1.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "58599591-4b43-4022-82f2-d56223c16536", "DetectTime": "2024-05-21T12:47:21.798534+00:00", "EventTime": "2024-05-21T12:47:21.798556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.75.48.164 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CACedi382CS4Is7xY6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9db60482-9ce3-4076-b999-a3c315453a42", "DetectTime": "2024-05-21T12:47:21.803510+00:00", "EventTime": "2024-05-21T12:47:21.803531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.190.132.228 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5ymS1rIgOXxd2n6k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9354eb52-7249-404d-8db6-045d9273bb34", "DetectTime": "2024-05-21T12:47:21.808424+00:00", "EventTime": "2024-05-21T12:47:21.808443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.14.124.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBZG24z1aJcPWGQaf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "37f7d08b-976d-40e7-bfd1-3c9f7a741d7f", "DetectTime": "2024-05-21T12:47:21.814155+00:00", "EventTime": "2024-05-21T12:47:21.814175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeV6c3xhirG1ooY52"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "93fa7205-7f85-42a3-912c-94c59d68b028", "DetectTime": "2024-05-21T12:47:21.827254+00:00", "EventTime": "2024-05-21T12:47:21.827274+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3N5n3I6ecbTX2Qjb"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "f55f2be8-c691-420e-a4e8-e0eb8b59238b", "DetectTime": "2024-05-21T12:47:21.841425+00:00", "EventTime": "2024-05-21T12:47:21.841446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm3N5n3I6ecbTX2Qjb"], "accumulated_threat_level": 1.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "7da90a88-3c5d-4c3c-9401-3a662514ddba", "DetectTime": "2024-05-21T12:47:21.855410+00:00", "EventTime": "2024-05-21T12:47:21.855429+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaeA54HwN3YwpgtS3"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "6170a0d6-f3de-4fe7-ba1f-87c4faf96c1b", "DetectTime": "2024-05-21T12:47:21.870203+00:00", "EventTime": "2024-05-21T12:47:21.870233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaeA54HwN3YwpgtS3"], "accumulated_threat_level": 2.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "dc833af3-457c-46c6-bd6f-06c924f3a47a", "DetectTime": "2024-05-21T12:47:21.885269+00:00", "EventTime": "2024-05-21T12:47:21.885290+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXFrl3sc339MLVoMe"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "80e36060-3d9f-4fa2-b01e-0152932131a3", "DetectTime": "2024-05-21T12:47:21.899020+00:00", "EventTime": "2024-05-21T12:47:21.899056+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXFrl3sc339MLVoMe"], "accumulated_threat_level": 2.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "8b02028c-c9f6-4862-a898-1007061f8003", "DetectTime": "2024-05-21T12:47:21.913132+00:00", "EventTime": "2024-05-21T12:47:21.913153+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkQXc0N95zYcZ7sa"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "441d105f-7d12-4051-b67d-67a40f71f42f", "DetectTime": "2024-05-21T12:47:21.931130+00:00", "EventTime": "2024-05-21T12:47:21.931165+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkQXc0N95zYcZ7sa"], "accumulated_threat_level": 3.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "fa1acbdc-93a0-449e-a77b-3821c09b9edc", "DetectTime": "2024-05-21T12:47:21.937157+00:00", "EventTime": "2024-05-21T12:47:21.937177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.221.7.245 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJ9xs2VK0xTwsKp24"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a5ca9fe2-8ef1-48e2-abed-fc21cc4ad264", "DetectTime": "2024-05-21T12:47:21.950810+00:00", "EventTime": "2024-05-21T12:47:21.950833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9X52JqKrJWhc9J8"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "05d0eea3-a4b2-4b75-9621-fc19f36dbb9a", "DetectTime": "2024-05-21T12:47:21.965501+00:00", "EventTime": "2024-05-21T12:47:21.965542+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9X52JqKrJWhc9J8"], "accumulated_threat_level": 3.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "05fc663c-fd10-43f8-9971-2ef84921eb40", "DetectTime": "2024-05-21T12:47:21.979794+00:00", "EventTime": "2024-05-21T12:47:21.979813+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQSkP12jWRwkUpjz1"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "b5eefcbc-5aa5-47aa-95d3-875a52f09697", "DetectTime": "2024-05-21T12:47:21.993127+00:00", "EventTime": "2024-05-21T12:47:21.993159+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQSkP12jWRwkUpjz1"], "accumulated_threat_level": 4.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "4a21754a-4f35-4da1-b4b2-130c5c41f8e8", "DetectTime": "2024-05-21T12:47:22.006632+00:00", "EventTime": "2024-05-21T12:47:22.006651+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMS0x4KTQ5SWIJaNl"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "fc62d03d-1c66-464b-85d3-c1894c34b954", "DetectTime": "2024-05-21T12:47:22.019568+00:00", "EventTime": "2024-05-21T12:47:22.019587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEMS0x4KTQ5SWIJaNl"], "accumulated_threat_level": 4.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "65207924-45ad-4178-9e93-eab73630e6cd", "DetectTime": "2024-05-21T12:47:22.024567+00:00", "EventTime": "2024-05-21T12:47:22.024585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 199.195.224.76 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoGuM23QflVJDaq51d"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "c5ce25de-cea2-45bf-aece-66bfa1d621d2", "DetectTime": "2024-05-21T12:47:22.030034+00:00", "EventTime": "2024-05-21T12:47:22.030055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 188.169.55.26 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8KIP2WMb4Fo6Jzog"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "035955f9-89ff-434f-ac82-206da72d2bdf", "DetectTime": "2024-05-21T12:47:22.043465+00:00", "EventTime": "2024-05-21T12:47:22.043485+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxBt5Qqd9nTe7Ngj"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "b4bc1a8d-3ffd-40b9-80ac-50424429c712", "DetectTime": "2024-05-21T12:47:22.057974+00:00", "EventTime": "2024-05-21T12:47:22.058001+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxBt5Qqd9nTe7Ngj"], "accumulated_threat_level": 5.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "0db787ab-3d7a-4b7d-af2f-b7c6ed6c44d0", "DetectTime": "2024-05-21T12:47:22.063637+00:00", "EventTime": "2024-05-21T12:47:22.063656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.13.239.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldkVCQC4uW7ERhr5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "4994ab10-3443-44fa-aef8-28cc09e6a132", "DetectTime": "2024-05-21T12:47:22.076546+00:00", "EventTime": "2024-05-21T12:47:22.076566+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVYrT3tuHGB5Qo59a"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "aaa768f8-5015-4008-9b6d-72a126654898", "DetectTime": "2024-05-21T12:47:22.081958+00:00", "EventTime": "2024-05-21T12:47:22.081979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.186.85.117 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5W59USAHotYSjgti"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "ebcbfe36-1249-49fc-8567-49dff03beee0", "DetectTime": "2024-05-21T12:47:22.096207+00:00", "EventTime": "2024-05-21T12:47:22.096230+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiVYrT3tuHGB5Qo59a"], "accumulated_threat_level": 5.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "0bfb5c4b-eb0c-4dd0-9c26-14f9d51eee82", "DetectTime": "2024-05-21T12:47:22.101841+00:00", "EventTime": "2024-05-21T12:47:22.101861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.231.149.46 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0a9ro2bAjQ6kYzEkl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "001e0dea-43cc-44b4-89da-79c651cae548", "DetectTime": "2024-05-21T12:47:22.106590+00:00", "EventTime": "2024-05-21T12:47:22.106609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 204.120.192.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54KMvcVXqLIMCKEj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "d9c420d7-4f19-4768-87e5-821e225ed2fd", "DetectTime": "2024-05-21T12:47:22.111415+00:00", "EventTime": "2024-05-21T12:47:22.111438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 150.101.100.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFAbnDXJryLkaJyi9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "fd438839-b079-469e-a3c9-890ad5e2938a", "DetectTime": "2024-05-21T12:47:22.116584+00:00", "EventTime": "2024-05-21T12:47:22.116604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.224.214.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C96y9Z2A4bvEgd2H48"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f46afb27-1047-4aa9-9430-7f1c4739568c", "DetectTime": "2024-05-21T12:47:22.131086+00:00", "EventTime": "2024-05-21T12:47:22.131109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1EH13Irhp3TMtCH5"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "8beea665-bca1-4d2a-98f2-eccb13320220", "DetectTime": "2024-05-21T12:47:22.145614+00:00", "EventTime": "2024-05-21T12:47:22.145638+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1EH13Irhp3TMtCH5"], "accumulated_threat_level": 6.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "64314249-b084-4e1a-b33e-3367bfd5febe", "DetectTime": "2024-05-21T12:47:22.368549+00:00", "EventTime": "2024-05-21T12:47:22.368566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.193.16.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJAnez1pYiVbpx3EQl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "65859d68-07b1-4fc0-a6ef-ec773dbfc87c", "DetectTime": "2024-05-21T12:47:22.375802+00:00", "EventTime": "2024-05-21T12:47:22.375821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 24.162.222.216 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLb4f42qZhAdNN1Jrb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "414b683f-2116-4c3e-a558-0c16aca4dbfb", "DetectTime": "2024-05-21T12:47:22.410715+00:00", "EventTime": "2024-05-21T12:47:22.410735+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKLkHB2Al0zUeOOqQg"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "1df7d5f8-3586-468b-99c0-f3c2a384bf0e", "DetectTime": "2024-05-21T12:47:22.423901+00:00", "EventTime": "2024-05-21T12:47:22.423933+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKLkHB2Al0zUeOOqQg"], "accumulated_threat_level": 6.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "509e2ee5-bd63-4818-9647-27ad35b4c7cd", "DetectTime": "2024-05-21T12:47:22.451830+00:00", "EventTime": "2024-05-21T12:47:22.451852+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1kEV2RiW8siCVvP8"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "265b1e59-4429-4f76-917b-06cbca7b85a3", "DetectTime": "2024-05-21T12:47:22.464529+00:00", "EventTime": "2024-05-21T12:47:22.464548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1kEV2RiW8siCVvP8"], "accumulated_threat_level": 7.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "8c46e45a-eb76-4e51-a5cc-5d2075d7660a", "DetectTime": "2024-05-21T12:47:22.469952+00:00", "EventTime": "2024-05-21T12:47:22.469972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rV3G1ymHRbvBe9se"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "61c4c8d2-2df2-4b55-a3f3-f8170897c519", "DetectTime": "2024-05-21T12:47:22.483307+00:00", "EventTime": "2024-05-21T12:47:22.483326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7o7GnVij4qu9tE7"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "deeeccfc-9674-4852-a12d-2c7bb007768b", "DetectTime": "2024-05-21T12:47:22.489068+00:00", "EventTime": "2024-05-21T12:47:22.489088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.143.90.138 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTYFW82epLtgxUmMxg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f8fdb4c9-30f1-42e2-8944-ea1b9c6c0cc4", "DetectTime": "2024-05-21T12:47:22.502718+00:00", "EventTime": "2024-05-21T12:47:22.502738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61cBGGbQLmoKUMAb"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "28fd154d-c90a-492e-b384-7854fe6477d9", "DetectTime": "2024-05-21T12:47:22.517681+00:00", "EventTime": "2024-05-21T12:47:22.517731+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61cBGGbQLmoKUMAb"], "accumulated_threat_level": 7.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "8039d346-2921-482e-a792-9ba108cd16a7", "DetectTime": "2024-05-21T12:47:22.607263+00:00", "EventTime": "2024-05-21T12:47:22.607282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ziOn2A1OXITR3MMh"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "42ccee77-8142-411d-8675-6c18bd8a58ee", "DetectTime": "2024-05-21T12:47:22.622842+00:00", "EventTime": "2024-05-21T12:47:22.622879+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ziOn2A1OXITR3MMh"], "accumulated_threat_level": 8.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "95181797-1b0b-4c74-8251-7b2088b439b0", "DetectTime": "2024-05-21T12:47:22.628625+00:00", "EventTime": "2024-05-21T12:47:22.628642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCLm14bvxVG85KT8d"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9574497c-d03a-4280-aa23-32d732b9fa7b", "DetectTime": "2024-05-21T12:47:22.768409+00:00", "EventTime": "2024-05-21T12:47:22.768429+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpSuD1nhYCbLZakv4"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "3cc7b279-3602-4fa9-b671-83aa90bb60aa", "DetectTime": "2024-05-21T12:47:22.783691+00:00", "EventTime": "2024-05-21T12:47:22.783735+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpSuD1nhYCbLZakv4"], "accumulated_threat_level": 8.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "215dba82-993a-461b-8002-687bdafd7cb0", "DetectTime": "2024-05-21T12:47:22.958219+00:00", "EventTime": "2024-05-21T12:47:22.958243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.213.173.163 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEa3S92Gfdzq8cZVr6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a3b22535-861b-46ab-8e47-06d7f36dddb1", "DetectTime": "2024-05-21T12:47:22.977769+00:00", "EventTime": "2024-05-21T12:47:22.977794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjspXl2vxoeAI8INq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "74e244b1-83ca-4dbe-8ba7-6e0deb9b1829", "DetectTime": "2024-05-21T12:47:23.052486+00:00", "EventTime": "2024-05-21T12:47:23.052509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.91.151.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWkMk4ahfxBBlZata"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "c0645edc-5e38-46ea-a2af-5ef14ebe76af", "DetectTime": "2024-05-21T12:47:23.502396+00:00", "EventTime": "2024-05-21T12:47:23.502443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.47.79 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR82gJ2cbFwIl65kBd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "6ad98e08-0958-4e8e-a639-e9fffb728c81", "DetectTime": "2024-05-21T12:47:23.508209+00:00", "EventTime": "2024-05-21T12:47:23.508229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.142.65.193 IP seen in blacklist: PBL ISP Maintained, spamhaus. threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsnIya5DzQFC6Dlq6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "53a8cc70-7c3b-4308-8a34-e0dca7e054c8", "DetectTime": "2024-05-21T12:47:23.559047+00:00", "EventTime": "2024-05-21T12:47:23.559069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.236.250.104 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVvGracYRof6foD1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "3d964a47-0730-4904-94f5-a6ac32a4f748", "DetectTime": "2024-05-21T12:47:23.649734+00:00", "EventTime": "2024-05-21T12:47:23.649758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.110.137.93 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LkLv3KtASMeE8JL3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a7c44da1-8ccb-457e-9866-1d27ff2fac60", "DetectTime": "2024-05-21T12:47:23.679569+00:00", "EventTime": "2024-05-21T12:47:23.679594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.107.189.85 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNI2Gs1yePVNG6dD34"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0d663531-b5bf-431c-94e9-70e7b7379850", "DetectTime": "2024-05-21T12:47:23.711631+00:00", "EventTime": "2024-05-21T12:47:23.711654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 72.213.189.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwdKTUVRrbvBM8Sl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f86a2c32-8177-4bce-89f1-c4f66a1168df", "DetectTime": "2024-05-21T12:47:23.734049+00:00", "EventTime": "2024-05-21T12:47:23.734070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 219.74.118.238 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaOXvP23ebt6gGnbhd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "7c920696-c4c5-474c-92fb-6898fad4ae10", "DetectTime": "2024-05-21T12:47:23.739057+00:00", "EventTime": "2024-05-21T12:47:23.739076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwrpSE3YxZMfL45Sij"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "82028b48-e53d-4c8f-b401-6821457659e2", "DetectTime": "2024-05-21T12:47:23.766204+00:00", "EventTime": "2024-05-21T12:47:23.766223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co6ie83EZwuoiU6N12"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "37c1ccef-665d-4961-9d8b-9e8625a3a245", "DetectTime": "2024-05-21T12:47:23.774296+00:00", "EventTime": "2024-05-21T12:47:23.774316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 95.253.112.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPSoi3jFMXTgohVYe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "743a2fec-3a7c-4dc6-a3a6-e82bc0d056ee", "DetectTime": "2024-05-21T12:47:24.015062+00:00", "EventTime": "2024-05-21T12:47:24.015083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 216.14.48.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COocYj2YWuFlllblN2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "8282ab87-e333-48ef-80a6-a7a9c34f84fe", "DetectTime": "2024-05-21T12:47:24.082936+00:00", "EventTime": "2024-05-21T12:47:24.082979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.88.177.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd16Xa2cPdZVyDTA5c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0bdfce04-8946-405b-8301-97412ed182b2", "DetectTime": "2024-05-21T12:47:24.099999+00:00", "EventTime": "2024-05-21T12:47:24.100020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.50.48.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmGvZTUHz8AQPFPf6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f4f118da-f625-4586-a2ce-9ec79fe234cd", "DetectTime": "2024-05-21T12:47:24.121893+00:00", "EventTime": "2024-05-21T12:47:24.121913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 184.75.95.70 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0Axm3JhZ9LgODGh1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2fbe7347-8b28-4610-a1c3-4f21ea7a00eb", "DetectTime": "2024-05-21T12:47:24.127922+00:00", "EventTime": "2024-05-21T12:47:24.127944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfXU3pJXRnGcsZzRf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "fa1481df-451b-4396-a30d-cea50de38e52", "DetectTime": "2024-05-21T12:47:24.156633+00:00", "EventTime": "2024-05-21T12:47:24.156657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 27.253.110.22 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCfSUH2JEcrjcIxrfb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "8832dbeb-71a9-492f-b3ea-6b3583f4c63a", "DetectTime": "2024-05-21T12:47:24.163252+00:00", "EventTime": "2024-05-21T12:47:24.163272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 74.124.111.49 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgaOcZ1uFnyMsgvAh6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "dd7451f0-79ea-4306-a009-88ee0225bc2a", "DetectTime": "2024-05-21T12:47:24.187865+00:00", "EventTime": "2024-05-21T12:47:24.187886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.113.64.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1PoFO1J7HuLJysyo3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "ccd1274f-5447-44e7-8b8e-a430c6b041cc", "DetectTime": "2024-05-21T12:47:24.214830+00:00", "EventTime": "2024-05-21T12:47:24.214854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.163.123.111 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtnNjH2VrD7Lza47t8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "b69f775a-4254-4ebc-ae33-034395e68282", "DetectTime": "2024-05-21T12:47:24.220146+00:00", "EventTime": "2024-05-21T12:47:24.220167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.64.105.130 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLpYHwzMkpCr88MUe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "3c7899e1-1105-40a3-872b-f789503c4886", "DetectTime": "2024-05-21T12:47:24.251426+00:00", "EventTime": "2024-05-21T12:47:24.251468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.56.204.248 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpwGo3x1hefmgDDP"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "887c115f-54d9-45aa-b6f3-a7bf8b5ad4a0", "DetectTime": "2024-05-21T12:47:24.575354+00:00", "EventTime": "2024-05-21T12:47:24.575373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.144.241.54 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGYVwc2joy4TQ5usKi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9ac6aef0-1a0a-42dd-ad69-ae1be3bf295e", "DetectTime": "2024-05-21T12:47:24.583478+00:00", "EventTime": "2024-05-21T12:47:24.583500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.201.208.1 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMQDcKtaedr30dHnb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f10ade53-1f22-45d5-9f78-1c27553aeb52", "DetectTime": "2024-05-21T12:47:24.589243+00:00", "EventTime": "2024-05-21T12:47:24.589261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.37.144.9 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHIPH3Ksc3cZsDYQ"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "1f602875-6b5c-46d1-9c70-6eef45176992", "DetectTime": "2024-05-21T12:47:24.594044+00:00", "EventTime": "2024-05-21T12:47:24.594063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 112.210.111.73 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clbv0G4ukv7USuG4al"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9b477c10-c7c7-4b1e-8bad-d6a18561d11a", "DetectTime": "2024-05-21T12:47:24.770289+00:00", "EventTime": "2024-05-21T12:47:24.770315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouyRtqKZJ4s5jzEh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "2ef8f1bd-6e22-436f-997b-915a7fd6300b", "DetectTime": "2024-05-21T12:47:24.842089+00:00", "EventTime": "2024-05-21T12:47:24.842109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zL5a3B1rQX3etgec"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "25389f92-48be-4b93-8a2c-d1aa5908d79f", "DetectTime": "2024-05-21T12:47:25.102787+00:00", "EventTime": "2024-05-21T12:47:25.102806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtOBW5YEZ8X4pwYm5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "4bcacc41-b8f1-4274-a393-4d12f0cb17eb", "DetectTime": "2024-05-21T12:47:25.150127+00:00", "EventTime": "2024-05-21T12:47:25.150152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.135.143.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdUCcK34EhTktnEnG9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "41291a9a-e326-4d7d-a58d-738795601415", "DetectTime": "2024-05-21T12:47:25.196851+00:00", "EventTime": "2024-05-21T12:47:25.196885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.117.241.68 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMhmmw2jBol3XOoJr2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "1d99aac4-a652-43aa-afd3-32887e973354", "DetectTime": "2024-05-21T12:47:25.212690+00:00", "EventTime": "2024-05-21T12:47:25.212714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.73.35.55 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVWm1Y127EDI7ViCMc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "4bbc40b1-cbd9-418e-9a01-7ea309c8be4d", "DetectTime": "2024-05-21T12:47:25.234974+00:00", "EventTime": "2024-05-21T12:47:25.234996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 202.130.129.114 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHiY7r2rQeN0ojKxj2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9e95936f-5db1-4cab-964c-3f7b8b71f97b", "DetectTime": "2024-05-21T12:47:25.240960+00:00", "EventTime": "2024-05-21T12:47:25.240979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 31.146.145.5 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqz05e3pyuGd63n2Ae"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "35006c10-f031-4b24-b87e-455332a8b194", "DetectTime": "2024-05-21T12:47:25.259988+00:00", "EventTime": "2024-05-21T12:47:25.260008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.202.161.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxtIU1ujNsstoy1bd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "66f64e93-60f2-4b2b-a78a-e1a150eb667b", "DetectTime": "2024-05-21T12:47:25.598974+00:00", "EventTime": "2024-05-21T12:47:25.599002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdG1R31z8P4oalkg5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "44eb4dc8-30d1-43fb-b639-8e8cb24d6ec1", "DetectTime": "2024-05-21T12:47:25.717027+00:00", "EventTime": "2024-05-21T12:47:25.717050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 68.114.245.252 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm1M2m2q9q1l4wlIli"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "1fac0adf-60e1-4f83-ab85-6a8682488435", "DetectTime": "2024-05-21T12:47:25.735504+00:00", "EventTime": "2024-05-21T12:47:25.735531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.168.177.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COmBJFn3JdWVtWRyi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "8b5d6e93-5835-48e2-8725-96b6f23cbea8", "DetectTime": "2024-05-21T12:47:25.748592+00:00", "EventTime": "2024-05-21T12:47:25.748617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 182.1.58.126 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CysH0T3UK7x8ygQ1Pb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "f866a9e0-eb8b-4b9c-b587-8f649d499d83", "DetectTime": "2024-05-21T12:47:25.912396+00:00", "EventTime": "2024-05-21T12:47:25.912413+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUF3Va4WzqSd8YslE4"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "b3db7abb-2a1a-4a2f-ac37-57b135f71244", "DetectTime": "2024-05-21T12:47:25.924405+00:00", "EventTime": "2024-05-21T12:47:25.924424+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUF3Va4WzqSd8YslE4"], "accumulated_threat_level": 9.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "99f820cb-f77b-4cd5-b03e-17492cd55988", "DetectTime": "2024-05-21T12:47:26.067301+00:00", "EventTime": "2024-05-21T12:47:26.067327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChMwAW37oFaZofI41f"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "90ab4bc1-9295-47f4-bbad-4029dc686e64", "DetectTime": "2024-05-21T12:47:26.099157+00:00", "EventTime": "2024-05-21T12:47:26.099183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPb8HTg8pB82CrP9"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "0c3eb4f7-6aad-4afd-b374-20b72a4e09c0", "DetectTime": "2024-05-21T12:47:26.104457+00:00", "EventTime": "2024-05-21T12:47:26.104476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.15.14.142 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJNYO422Qr8zt2wqQ1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "405ed1d1-e221-49a3-af66-d1714a2a1374", "DetectTime": "2024-05-21T12:47:26.124643+00:00", "EventTime": "2024-05-21T12:47:26.124664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 200.60.76.38 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvLRZC2eoemAE1Z5F6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0c8691f3-f2ff-4b97-966d-c76ec9af4594", "DetectTime": "2024-05-21T12:47:26.140052+00:00", "EventTime": "2024-05-21T12:47:26.140072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnnDOx27ukFBLFUPF7"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "72fcbd1b-89b8-49e8-afea-f20877815f57", "DetectTime": "2024-05-21T12:47:26.145664+00:00", "EventTime": "2024-05-21T12:47:26.145685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 82.91.101.29 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNRb7Q33cxu8rBkrni"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "75aeeda5-c01a-4833-b7c3-43d0e3e5f1f5", "DetectTime": "2024-05-21T12:47:26.198069+00:00", "EventTime": "2024-05-21T12:47:26.198092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 41.135.177.131 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVyubVELrMVZYqhe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "e94b4b4e-d026-49ff-b305-27c0ba3b9d5e", "DetectTime": "2024-05-21T12:47:26.247913+00:00", "EventTime": "2024-05-21T12:47:26.247935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.232.141.226 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPt7LE4y45ZfHTxRTg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "360f5375-db48-4203-b08e-bf9919e1bf07", "DetectTime": "2024-05-21T12:47:26.258034+00:00", "EventTime": "2024-05-21T12:47:26.258053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9KKIt3FIBIzjpw4Ok"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "e2f0be5c-33e1-410c-89c8-75c47b85a679", "DetectTime": "2024-05-21T12:47:26.270689+00:00", "EventTime": "2024-05-21T12:47:26.270718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MQCC1QbH42zqk0fe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "5b698630-82ba-469e-81f5-a65c09e9c708", "DetectTime": "2024-05-21T12:47:26.330389+00:00", "EventTime": "2024-05-21T12:47:26.330425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.165.79.77 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrVl0y7Hbiitj2kt6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "95fe103f-1962-4869-8176-4a71afa98079", "DetectTime": "2024-05-21T12:47:26.335442+00:00", "EventTime": "2024-05-21T12:47:26.335460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.154.58.45 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpVCi4vJiSHCGefv5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "7987676d-193c-41ec-ae88-3890fb10ebf7", "DetectTime": "2024-05-21T12:47:26.400302+00:00", "EventTime": "2024-05-21T12:47:26.400323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvZWvq3rBLJ0Pl444j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "0a1bd7ca-c743-4ccd-ad8e-e6e816788892", "DetectTime": "2024-05-21T12:47:26.713825+00:00", "EventTime": "2024-05-21T12:47:26.713850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C16uv714iRsJfWp677"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "bdb7a4c3-5b95-4c61-ae67-a6c239409d19", "DetectTime": "2024-05-21T12:47:26.754043+00:00", "EventTime": "2024-05-21T12:47:26.754065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyURaD4pCOPv567MI7"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "f1357b84-2fc0-428e-bdaa-063df39e277d", "DetectTime": "2024-05-21T12:47:26.761346+00:00", "EventTime": "2024-05-21T12:47:26.761365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.74.153.34 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXzaD62ILzkF9qr4M2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "5a693a4a-98df-4319-a809-96de793de913", "DetectTime": "2024-05-21T12:47:26.767525+00:00", "EventTime": "2024-05-21T12:47:26.767548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdNCR30qK5XKkdHpa"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "dbf090b0-7d43-47e9-aa56-3f099e52f39c", "DetectTime": "2024-05-21T12:47:26.868682+00:00", "EventTime": "2024-05-21T12:47:26.868707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.29.210.40 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoXa623bGIjRiS5Vm4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "6bad2cba-dfe4-4ee2-ad6c-ad09c09b24f0", "DetectTime": "2024-05-21T12:47:26.873619+00:00", "EventTime": "2024-05-21T12:47:26.873639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Sz0e3nWwA1Z2yt6b"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "fa8e1d42-8235-4def-bda4-2fb6ff47fc63", "DetectTime": "2024-05-21T12:47:26.881703+00:00", "EventTime": "2024-05-21T12:47:26.881723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 174.7.220.125 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNxNgu4ArZEzaxJLX6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "9b3e1818-56d4-4f23-9876-e4c50e7de4b5", "DetectTime": "2024-05-21T12:47:26.886709+00:00", "EventTime": "2024-05-21T12:47:26.886730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 83.27.183.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBkeZ2J2omF12IYv6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "af32bff9-3536-402c-ba94-d24241cffc13", "DetectTime": "2024-05-21T12:47:27.805869+00:00", "EventTime": "2024-05-21T12:47:27.805892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDw5603qXj6hdG3Bpl"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "6b0a35ac-b9c5-43ee-9131-2b256a40c748", "DetectTime": "2024-05-21T12:47:27.851602+00:00", "EventTime": "2024-05-21T12:47:27.851622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CushbK2HQe0ExHI2Qe"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "bea7103d-1998-45ff-b14c-648c3fb49854", "DetectTime": "2024-05-21T12:47:27.909365+00:00", "EventTime": "2024-05-21T12:47:27.909390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3M1931dKpwAvlvkMh", "CMnut11ramAHOCLxf6", "C2V5e23xNilGqS3cF7", "CFHMME30kEqefFPy7d"], "accumulated_threat_level": 0.5, "timewindow": 159} +{"Format": "IDEA0", "ID": "2e250621-1683-4447-82b9-f884f6ff11bb", "DetectTime": "2024-05-21T12:47:27.914585+00:00", "EventTime": "2024-05-21T12:47:27.914605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 89.165.72.230 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjFkIe1pGEiUSFCEsf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "77d21eae-6cc8-491f-9e29-67d76b25fe69", "DetectTime": "2024-05-21T12:47:27.926102+00:00", "EventTime": "2024-05-21T12:47:27.926126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfeRik46IeFsGLAnWf"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "4719b515-ae77-4e07-ba58-5fafe93a6d0b", "DetectTime": "2024-05-21T12:47:27.955835+00:00", "EventTime": "2024-05-21T12:47:27.955856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.20.148.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS6lZZ1IVQMYuYiAfk"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "d776897a-15eb-4cf8-a6a1-83e2020404a4", "DetectTime": "2024-05-21T12:47:27.988726+00:00", "EventTime": "2024-05-21T12:47:27.988747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFuHOG2rnvBfzMt6Pd"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "28beb387-606f-4604-8d2c-005abe7b81a0", "DetectTime": "2024-05-21T12:47:28.287551+00:00", "EventTime": "2024-05-21T12:47:28.287573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnKEhL1lwbuFlWZj25"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "63ebef2c-767d-4f61-8ace-4693d52cd323", "DetectTime": "2024-05-21T12:47:28.304993+00:00", "EventTime": "2024-05-21T12:47:28.305015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPmcMj23ZzC21GRKs6"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "db7acee0-eaa3-4428-83c5-61f68d755d24", "DetectTime": "2024-05-21T12:47:28.424500+00:00", "EventTime": "2024-05-21T12:47:28.424524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckk1bt2sk9MlIvDv0h"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "b7f76955-60d0-4604-829a-774089b84fab", "DetectTime": "2024-05-21T12:47:28.429876+00:00", "EventTime": "2024-05-21T12:47:28.429895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIFdao2QK2kzu2tA14"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "ae265ecc-fb01-48a9-8415-087c1b1442c4", "DetectTime": "2024-05-21T12:47:28.496893+00:00", "EventTime": "2024-05-21T12:47:28.496915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.232.254.72 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cztg2mfby0UmQ4zQc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "a72b3c9f-1cc3-4d0a-8e0a-4fb308e212ed", "DetectTime": "2024-05-21T12:47:28.503032+00:00", "EventTime": "2024-05-21T12:47:28.503059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci61Q7ncVmMKxOM7k"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "77428aca-e9a6-43fd-a13f-6ca7ee4c799a", "DetectTime": "2024-05-21T12:47:28.781593+00:00", "EventTime": "2024-05-21T12:47:28.781615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9FZPSgoKrOkNlZn1"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "9dcfe0d1-ce3d-47f4-ae9d-0c8f51848140", "DetectTime": "2024-05-21T12:47:28.848625+00:00", "EventTime": "2024-05-21T12:47:28.848649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdwYkFBO4VcSCbbC1"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "79bc16a9-b62f-4604-a088-dd7237ed5d9e", "DetectTime": "2024-05-21T12:47:28.908607+00:00", "EventTime": "2024-05-21T12:47:28.908625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGLpywzHHaw5d7WV9"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "48c47832-9b3b-4541-bc2e-79cc35c722a9", "DetectTime": "2024-05-21T12:47:28.967240+00:00", "EventTime": "2024-05-21T12:47:28.967264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQZKA2vQGt9Jozhja"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "0ce393a5-5d09-4039-b399-1c786cd65ca2", "DetectTime": "2024-05-21T12:47:28.975779+00:00", "EventTime": "2024-05-21T12:47:28.975799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqGLn18wE0S6nx5b8"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "45aeab4e-61a1-42f4-84ca-1aab5bce8b46", "DetectTime": "2024-05-21T12:47:28.990257+00:00", "EventTime": "2024-05-21T12:47:28.990279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6dNU21KW7nq7kpkuh"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "751f122d-d535-4036-9f0c-d1260d20148a", "DetectTime": "2024-05-21T12:47:28.995768+00:00", "EventTime": "2024-05-21T12:47:28.995790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiJBtw4ciNYxPxIvx7"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "119e2394-699b-42a9-b55a-eee10e26f800", "DetectTime": "2024-05-21T12:47:29.000734+00:00", "EventTime": "2024-05-21T12:47:29.000754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cso6T61zSssoioWpxd"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "bc300e99-1b15-4cd6-a711-519f39784535", "DetectTime": "2024-05-21T12:47:29.006137+00:00", "EventTime": "2024-05-21T12:47:29.006154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.17.251.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35qRm2Lmw6jTX4aw8"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "00011623-9c70-4338-913b-bddb154e571e", "DetectTime": "2024-05-21T12:47:29.045968+00:00", "EventTime": "2024-05-21T12:47:29.045991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg3fpG150C3rhvVJn2"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "143ea938-aec8-437e-96c5-69f0526f0a99", "DetectTime": "2024-05-21T12:47:29.051056+00:00", "EventTime": "2024-05-21T12:47:29.051080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHNh9R3y1kRtJVZ5G3"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "833723d5-9ce9-4a36-87b8-ffb67b46edab", "DetectTime": "2024-05-21T12:47:29.356486+00:00", "EventTime": "2024-05-21T12:47:29.356511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEEqe4hn0MuHuSB12"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "f63705ef-b397-4450-8df2-53c8b1a8cbfa", "DetectTime": "2024-05-21T12:47:29.402603+00:00", "EventTime": "2024-05-21T12:47:29.402625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBTb612V2cMcyhEgsc"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "f52d236f-17c5-440f-b87e-7953f8118c39", "DetectTime": "2024-05-21T12:47:29.467357+00:00", "EventTime": "2024-05-21T12:47:29.467381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfUnSt43KqiZPbTY0e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 152} +{"Format": "IDEA0", "ID": "8a53f2e0-777e-4093-9cc5-449e2eca6411", "DetectTime": "2024-05-21T12:47:29.544968+00:00", "EventTime": "2024-05-21T12:47:29.544991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9ZSqi3cDciakAwZJh"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "604f4452-18dd-486d-9689-4d2b98d768f8", "DetectTime": "2024-05-21T12:47:29.550046+00:00", "EventTime": "2024-05-21T12:47:29.550066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.202.161.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRFWQ2nkVruZ9Yyqb"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "2ae0e69c-f918-4129-8f1f-f6963ea980b8", "DetectTime": "2024-05-21T12:47:29.914238+00:00", "EventTime": "2024-05-21T12:47:29.914265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.13.164.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSiRo53OfAU2FdCOd9"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "d53261f6-04f3-48df-ae16-97b2be98db61", "DetectTime": "2024-05-21T12:47:30.027208+00:00", "EventTime": "2024-05-21T12:47:30.027230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmF6CTrxALqZ7nErl"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "5742a7e2-efd5-4d3f-ae53-a50d1ab453d2", "DetectTime": "2024-05-21T12:47:30.036945+00:00", "EventTime": "2024-05-21T12:47:30.036964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvDTS2H9IOqUyPZ98"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "3052869e-da03-4906-a63d-e9b81b2f0a3c", "DetectTime": "2024-05-21T12:47:30.350317+00:00", "EventTime": "2024-05-21T12:47:30.350341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEZ9t1dTPbUqUAw13"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "345ac474-15a0-4566-9d06-9acc6005260c", "DetectTime": "2024-05-21T12:47:30.358901+00:00", "EventTime": "2024-05-21T12:47:30.358930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuLjjS1fH36Q1XU6b"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "3ac09f67-8233-4401-b0cd-f132c2375619", "DetectTime": "2024-05-21T12:47:30.477468+00:00", "EventTime": "2024-05-21T12:47:30.477489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjS7d4c92YnVEZcB7"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "65070565-6b3f-458c-a1ef-65fd2b46e2cc", "DetectTime": "2024-05-21T12:47:30.482626+00:00", "EventTime": "2024-05-21T12:47:30.482645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpcB648LE4PEwL6Y1"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "ea3b7204-dcc4-4828-b9f6-1833a06a66f0", "DetectTime": "2024-05-21T12:47:30.533863+00:00", "EventTime": "2024-05-21T12:47:30.533888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csr2Q91RDbopu8eXa1"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "ea021f8b-22ec-4e81-928e-c2989b84c5d9", "DetectTime": "2024-05-21T12:47:30.615153+00:00", "EventTime": "2024-05-21T12:47:30.615184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpydZM3dvVpgAaHttj"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "e69e03c9-6b12-42b5-b9d3-452729679071", "DetectTime": "2024-05-21T12:47:30.978234+00:00", "EventTime": "2024-05-21T12:47:30.978255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpo1w84bKsevVZZr4j"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "86170c8f-f592-47e7-a5c6-8e7afcde0c14", "DetectTime": "2024-05-21T12:47:31.001127+00:00", "EventTime": "2024-05-21T12:47:31.001149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.135.143.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQMyv2hqe6zUMlJAh"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "10b7194e-3738-41c4-b7c9-99fde2d7294d", "DetectTime": "2024-05-21T12:47:31.013728+00:00", "EventTime": "2024-05-21T12:47:31.013749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMXvQ2gShUBYWfEf4"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "9a9840e7-c213-4dbe-9538-687197e375f3", "DetectTime": "2024-05-21T12:47:31.044257+00:00", "EventTime": "2024-05-21T12:47:31.044292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPVI63lvKTOpB32zf"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "7b54d7fe-0360-47ed-9fcd-9f2881d217b1", "DetectTime": "2024-05-21T12:47:31.049626+00:00", "EventTime": "2024-05-21T12:47:31.049646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwNX51Ny9tbh5Y1j6"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "680bad27-e5f4-4308-adf8-9d9596637657", "DetectTime": "2024-05-21T12:47:31.056631+00:00", "EventTime": "2024-05-21T12:47:31.056650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgun91TDn5vjc1vf2"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "1ffe08fa-1ef8-4343-819a-47a30604bd24", "DetectTime": "2024-05-21T12:47:31.061379+00:00", "EventTime": "2024-05-21T12:47:31.061398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgAXP3zENM3ij2Bzk"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "3ffce663-ef3a-4e9a-91a8-54c41d4e6aca", "DetectTime": "2024-05-21T12:47:31.100855+00:00", "EventTime": "2024-05-21T12:47:31.100876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9kbp1mWCSRzvWZwl"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "dbd7f4f5-e147-4a83-92d4-765f08e021ff", "DetectTime": "2024-05-21T12:47:31.139371+00:00", "EventTime": "2024-05-21T12:47:31.139392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCfF3U1A4en3vfTBV7"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "e36fe497-0416-4738-9ee8-099eabde338d", "DetectTime": "2024-05-21T12:47:31.225512+00:00", "EventTime": "2024-05-21T12:47:31.225534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CICMLdnv7KRCl2GD8"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "f65c41cc-5494-4f0e-a492-931d3908c153", "DetectTime": "2024-05-21T12:47:31.603705+00:00", "EventTime": "2024-05-21T12:47:31.603729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 85.107.40.140 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6Adr30uulCvMHJ2i"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "a243e70b-16bd-4563-b505-997c5adddc79", "DetectTime": "2024-05-21T12:47:31.637593+00:00", "EventTime": "2024-05-21T12:47:31.637614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU5BxM1mdYDER77Sdg"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "63632136-0a5c-45d0-b1a3-26f76028ee10", "DetectTime": "2024-05-21T12:47:31.929767+00:00", "EventTime": "2024-05-21T12:47:31.929791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ALHa2rVunJ7YTaQi"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "01c074b6-bf90-4ee3-bfc0-ea0580879c75", "DetectTime": "2024-05-21T12:47:32.131565+00:00", "EventTime": "2024-05-21T12:47:32.131584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgeCuq4xppaVQoPSgb"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "017a6dcb-5b0e-4c5f-8d86-7187bc5284fa", "DetectTime": "2024-05-21T12:47:32.445035+00:00", "EventTime": "2024-05-21T12:47:32.445058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuJ9Ju5Z2hKAhvlL8"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "e5f996a2-687e-4d1d-b3a8-02d0d83b1e99", "DetectTime": "2024-05-21T12:47:32.450259+00:00", "EventTime": "2024-05-21T12:47:32.450281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeoCk1105FZXnzoKwb"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "c062acf2-e2ef-4a95-968a-58679378d3b9", "DetectTime": "2024-05-21T12:47:32.502702+00:00", "EventTime": "2024-05-21T12:47:32.502721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 181.135.143.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFhaqz2AylrgGPD1"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "391c30b7-03c6-43e1-af1e-c70d8afc005f", "DetectTime": "2024-05-21T12:47:32.508053+00:00", "EventTime": "2024-05-21T12:47:32.508077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 87.17.251.64 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClnRSRkzkAV6s3q3"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "30841710-3a00-4bc2-85c1-cff913651618", "DetectTime": "2024-05-21T12:47:32.642743+00:00", "EventTime": "2024-05-21T12:47:32.642770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9B0h22PEuIAYk9tbf"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "5755099b-6712-4703-ac64-1907fde130fd", "DetectTime": "2024-05-21T12:47:32.663796+00:00", "EventTime": "2024-05-21T12:47:32.663818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.227.70.250 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7utg3LYgl4qsuuDh"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "e2d7f8c2-22b4-4f45-bb14-08c7fd3c69d0", "DetectTime": "2024-05-21T12:47:32.961578+00:00", "EventTime": "2024-05-21T12:47:32.961600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdOCvT2RWGLycub2G8"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "275df11b-a832-44a3-954c-f9699b4684e8", "DetectTime": "2024-05-21T12:47:33.087797+00:00", "EventTime": "2024-05-21T12:47:33.087821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7eap1QFtxucYP0Gi"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "06426556-46d6-47ac-86fd-dfff98304edc", "DetectTime": "2024-05-21T12:47:33.451047+00:00", "EventTime": "2024-05-21T12:47:33.451070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 79.20.148.198 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAhSz1UiTXNMs8dcl"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "5d2db599-cbff-481d-b158-7bb0875d97dc", "DetectTime": "2024-05-21T12:47:33.460944+00:00", "EventTime": "2024-05-21T12:47:33.460965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLGWzI3RvalqvILIn"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "9faf0718-6129-4e12-919f-5fefc837865d", "DetectTime": "2024-05-21T12:47:33.642922+00:00", "EventTime": "2024-05-21T12:47:33.642954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1n2bF4bI1EWjkYwW3"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "30c7dcaa-ece6-44de-991a-a5636ea65d98", "DetectTime": "2024-05-21T12:47:33.867103+00:00", "EventTime": "2024-05-21T12:47:33.867123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf908l1thwxoxEsyWd"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "917817fe-561c-43d6-9b99-c4a27936a032", "DetectTime": "2024-05-21T12:47:33.878336+00:00", "EventTime": "2024-05-21T12:47:33.878361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChUIgQ2xD48ruOcFug"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "8e8eb031-dca0-49f9-a883-dff3dc992677", "DetectTime": "2024-05-21T12:47:33.888458+00:00", "EventTime": "2024-05-21T12:47:33.888479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csuh3n0JMGpwcfLrc"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "28fc89ad-297e-430f-ab69-9736fffb5c7a", "DetectTime": "2024-05-21T12:47:33.903536+00:00", "EventTime": "2024-05-21T12:47:33.903559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.13.164.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfF3bs3PZft9Xh97"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "ba92f756-411c-4010-9398-0a9d84d31deb", "DetectTime": "2024-05-21T12:47:33.920999+00:00", "EventTime": "2024-05-21T12:47:33.921023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccvsox1xNmW0bmzhQ4"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "eed344d8-5dc3-4b41-9fd0-639b5d9e9736", "DetectTime": "2024-05-21T12:47:33.926745+00:00", "EventTime": "2024-05-21T12:47:33.926767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVPiSd2ef3IhaMpuxj"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "926e95cb-3990-4b0f-9bc2-04157eecd1f4", "DetectTime": "2024-05-21T12:47:34.445037+00:00", "EventTime": "2024-05-21T12:47:34.445059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrHJLB3KpOXaNn45ii"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "d137a607-8d91-4ced-b34c-320f77cd73c1", "DetectTime": "2024-05-21T12:47:34.451991+00:00", "EventTime": "2024-05-21T12:47:34.452022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2avUU3q0qUisGIgA5"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "df5d1df2-bc60-4aef-978a-d4e2aec173dc", "DetectTime": "2024-05-21T12:47:34.464563+00:00", "EventTime": "2024-05-21T12:47:34.464583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLiavDFJEtNvwKW3"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "0676b262-e643-454d-8e64-309534f242ac", "DetectTime": "2024-05-21T12:47:34.469611+00:00", "EventTime": "2024-05-21T12:47:34.469628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WT6n3XcjhsFMMbHl"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "5fd0fb69-88e1-4db0-bceb-9c7b20c97c8d", "DetectTime": "2024-05-21T12:47:34.497986+00:00", "EventTime": "2024-05-21T12:47:34.498009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtIgUMVGoeEcJAkjj"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "87264dbe-2683-494b-a906-9f4b8539c21f", "DetectTime": "2024-05-21T12:47:34.809755+00:00", "EventTime": "2024-05-21T12:47:34.809773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8kbo3Bq1S614tyY"], "accumulated_threat_level": 5.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "a939bbbe-b4bc-4d81-81b4-49b6108cf230", "DetectTime": "2024-05-21T12:47:34.864938+00:00", "EventTime": "2024-05-21T12:47:34.864959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUAyZ3Nxfw6N6cVAf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 153} +{"Format": "IDEA0", "ID": "1e808859-1c35-4817-8ab6-27bc53696baf", "DetectTime": "2024-05-21T12:47:34.910113+00:00", "EventTime": "2024-05-21T12:47:34.910132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchaPv2iVZkIV54IB2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "f5e80925-4452-4ea5-9abb-bf025f613f53", "DetectTime": "2024-05-21T12:47:34.956068+00:00", "EventTime": "2024-05-21T12:47:34.956086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nKqQTu78SWWNMCl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "c4d704f7-cb53-4c2f-9be3-12b1320b529d", "DetectTime": "2024-05-21T12:47:35.005581+00:00", "EventTime": "2024-05-21T12:47:35.005610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA83dbQ7Nxijyknm3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "b7d2f66c-897f-4d50-9883-a8417e256fa1", "DetectTime": "2024-05-21T12:47:35.054009+00:00", "EventTime": "2024-05-21T12:47:35.054030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSyZgplpos5w6xf7l"], "accumulated_threat_level": 9.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "50afe168-9f3c-4a97-b2d5-16675d468f57", "DetectTime": "2024-05-21T12:47:35.315512+00:00", "EventTime": "2024-05-21T12:47:35.315532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14sm54ISQJ945rlb"], "accumulated_threat_level": 9.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "0ef440a7-3274-4bef-a168-c0e967cf0ea8", "DetectTime": "2024-05-21T12:47:35.364650+00:00", "EventTime": "2024-05-21T12:47:35.364668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Celp5G3BTeBCWFqSP4"], "accumulated_threat_level": 10.4, "timewindow": 153} +{"Format": "IDEA0", "ID": "c0b9793f-88db-481c-8c08-5d4d3cc5e926", "DetectTime": "2024-05-21T12:47:35.426086+00:00", "EventTime": "2024-05-21T12:47:35.426107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs32B12pJpEIDanyrd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 153} +{"Format": "IDEA0", "ID": "5c54adb5-dd32-4a73-b71e-94db6e4c756a", "DetectTime": "2024-05-21T12:47:35.462953+00:00", "EventTime": "2024-05-21T12:47:35.462973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBqSq1MuNC3N9nYD7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 153} +{"Format": "Json", "ID": "5c54adb5-dd32-4a73-b71e-94db6e4c756a", "DetectTime": "2024-05-21T12:47:35.462953+00:00", "EventTime": "2024-05-21T12:47:35.462973+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-07T08:41:59.513544+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2024/05/21 12:47:36.012602)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 153, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "809048c1-b8ac-4606-a2b9-abc337b9b8ad", "DetectTime": "2024-05-21T12:47:36.024685+00:00", "EventTime": "2024-05-21T12:47:36.024715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKJdk3fDz5ju63d14"], "accumulated_threat_level": 0.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "52366a57-db14-49d1-99be-24ac08729d1d", "DetectTime": "2024-05-21T12:47:36.037220+00:00", "EventTime": "2024-05-21T12:47:36.037255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyQzUs4DFGOai3Wzc4"], "accumulated_threat_level": 1.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "d5f16aa4-b2f9-4193-83f6-31f8c7d06975", "DetectTime": "2024-05-21T12:47:36.048848+00:00", "EventTime": "2024-05-21T12:47:36.048880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBzikV19QF3MoMc0ei"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 153} +{"Format": "IDEA0", "ID": "ae100f1f-3354-4ca5-b2b9-ed10ad4baf1a", "DetectTime": "2024-05-21T12:47:36.063015+00:00", "EventTime": "2024-05-21T12:47:36.063049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzR513hSYZDAKhBne"], "accumulated_threat_level": 3.2, "timewindow": 153} +{"Format": "IDEA0", "ID": "d81569cb-d33d-457e-bde8-f1c8ef1f752e", "DetectTime": "2024-05-21T12:47:36.079361+00:00", "EventTime": "2024-05-21T12:47:36.079393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8GcCsGH9yz3gw2be"], "accumulated_threat_level": 4.0, "timewindow": 153} +{"Format": "IDEA0", "ID": "dc470d1e-1741-4816-9010-6b55272aa168", "DetectTime": "2024-05-21T12:47:36.093746+00:00", "EventTime": "2024-05-21T12:47:36.093785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfFDFU18JXfbFrQFZ6"], "accumulated_threat_level": 4.8, "timewindow": 153} +{"Format": "IDEA0", "ID": "34b767fd-db02-4145-a22b-0ab4f0080f64", "DetectTime": "2024-05-21T12:47:36.139973+00:00", "EventTime": "2024-05-21T12:47:36.140005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUxs4B2yNzWgzAtWX9"], "accumulated_threat_level": 5.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "8c79393b-fba7-4f46-b724-db86fd22302e", "DetectTime": "2024-05-21T12:47:36.185341+00:00", "EventTime": "2024-05-21T12:47:36.185373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzNkD2NKBXSQpXFa6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 153} +{"Format": "IDEA0", "ID": "8cfce406-ccd3-41b3-90f2-b4b258d06cc1", "DetectTime": "2024-05-21T12:47:36.253775+00:00", "EventTime": "2024-05-21T12:47:36.253802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7MGX3btZs8c0msil"], "accumulated_threat_level": 7.199999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "56820537-5a8a-41be-af83-46faa5bf8ca8", "DetectTime": "2024-05-21T12:47:36.285642+00:00", "EventTime": "2024-05-21T12:47:36.285668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWRmi1KyEal84Ma94"], "accumulated_threat_level": 7.999999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "f5da968f-8ecd-467c-85fa-22d6eb5e17f8", "DetectTime": "2024-05-21T12:47:36.331045+00:00", "EventTime": "2024-05-21T12:47:36.331067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIdog3OHWSzIB1unc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 153} +{"Format": "IDEA0", "ID": "31f644e5-1096-4920-b4f1-15a201cb6b6c", "DetectTime": "2024-05-21T12:47:36.617481+00:00", "EventTime": "2024-05-21T12:47:36.617502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY2yLw3Uk7py0wywbb"], "accumulated_threat_level": 9.6, "timewindow": 153} +{"Format": "IDEA0", "ID": "71f82f30-a424-4aed-a0f6-466935bf839b", "DetectTime": "2024-05-21T12:47:36.668526+00:00", "EventTime": "2024-05-21T12:47:36.668555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26Cmg4R1ctOGKiy9g"], "accumulated_threat_level": 10.4, "timewindow": 153} +{"Format": "IDEA0", "ID": "c869bee1-c361-497d-a9a3-a8e5111c5c51", "DetectTime": "2024-05-21T12:47:36.718205+00:00", "EventTime": "2024-05-21T12:47:36.718230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1rYW2Uoo87zKO6Wi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 153} +{"Format": "IDEA0", "ID": "0da8bc43-4950-4c50-9dd1-c2d68d5ccf50", "DetectTime": "2024-05-21T12:47:36.792184+00:00", "EventTime": "2024-05-21T12:47:36.792203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzvQh72EQZmbqgwfo2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 153} +{"Format": "Json", "ID": "0da8bc43-4950-4c50-9dd1-c2d68d5ccf50", "DetectTime": "2024-05-21T12:47:36.792184+00:00", "EventTime": "2024-05-21T12:47:36.792203+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-07T08:55:50.378744+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 153. (real time 2024/05/21 12:47:37.194836)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 153, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5e9fe474-6dea-420d-9849-8a1c17f613a9", "DetectTime": "2024-05-21T12:47:37.287314+00:00", "EventTime": "2024-05-21T12:47:37.287338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCmMc36ccVwsy2x2j"], "accumulated_threat_level": 1.3, "timewindow": 154} +{"Format": "IDEA0", "ID": "215068c4-6fa8-4b34-892e-bdbfc3a75a13", "DetectTime": "2024-05-21T12:47:37.298221+00:00", "EventTime": "2024-05-21T12:47:37.298240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co824o4hAi22iNBww6"], "accumulated_threat_level": 2.1, "timewindow": 154} +{"Format": "IDEA0", "ID": "be58a8b9-0799-4a37-a716-e3843a295aac", "DetectTime": "2024-05-21T12:47:37.309371+00:00", "EventTime": "2024-05-21T12:47:37.309390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cka0Ij3lwBEGNy1zP8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 154} +{"Format": "IDEA0", "ID": "3b17b0eb-6c28-4d6b-aec5-48815de84853", "DetectTime": "2024-05-21T12:47:37.319992+00:00", "EventTime": "2024-05-21T12:47:37.320010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoG4s33bfukRFpIdd2"], "accumulated_threat_level": 3.7, "timewindow": 154} +{"Format": "IDEA0", "ID": "6cf5c87f-de8b-4744-b9cb-5d58a6bf40a9", "DetectTime": "2024-05-21T12:47:37.377870+00:00", "EventTime": "2024-05-21T12:47:37.377889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3bo1I1WMpCzPp2uql"], "accumulated_threat_level": 4.5, "timewindow": 154} +{"Format": "IDEA0", "ID": "1ac5ea72-cb4b-4650-a46c-5a2c0970befd", "DetectTime": "2024-05-21T12:47:37.429081+00:00", "EventTime": "2024-05-21T12:47:37.429103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct8XmN19K7ca62HkAi"], "accumulated_threat_level": 5.3, "timewindow": 154} +{"Format": "IDEA0", "ID": "58d73b4c-f46f-476c-9de0-3ce8ced9552b", "DetectTime": "2024-05-21T12:47:37.479962+00:00", "EventTime": "2024-05-21T12:47:37.479981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmSjo4lGSWg7kGnLa"], "accumulated_threat_level": 6.1, "timewindow": 154} +{"Format": "IDEA0", "ID": "79812e9b-a72a-4601-b7e1-3df44024570d", "DetectTime": "2024-05-21T12:47:37.533757+00:00", "EventTime": "2024-05-21T12:47:37.533785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRhT4Tvo9xeHxR7f"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 154} +{"Format": "IDEA0", "ID": "a3eba05e-60ad-46d8-b7a0-90ed253bea2f", "DetectTime": "2024-05-21T12:47:37.544499+00:00", "EventTime": "2024-05-21T12:47:37.544517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKdgvJ3JAd59ml1r1l", "CoRtin2h1gg9zVfu73", "CGH1c02X51jTzRbChc", "C1YzdC268RK10xDIg5"], "accumulated_threat_level": 0.5, "timewindow": 160} +{"Format": "IDEA0", "ID": "cde7180e-5b9b-45d0-9cce-3a4497450696", "DetectTime": "2024-05-21T12:47:37.582042+00:00", "EventTime": "2024-05-21T12:47:37.582064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhzZw23A5jI0dKyR"], "accumulated_threat_level": 7.699999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "5b200a23-237d-45e0-9ded-68d3a1958c0c", "DetectTime": "2024-05-21T12:47:37.629043+00:00", "EventTime": "2024-05-21T12:47:37.629065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuv8ek2Z0tG88Xhzkh"], "accumulated_threat_level": 8.5, "timewindow": 154} +{"Format": "IDEA0", "ID": "8c882654-0208-4153-a39c-b592737aa5b9", "DetectTime": "2024-05-21T12:47:37.922725+00:00", "EventTime": "2024-05-21T12:47:37.922743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["172.13.164.195"]}], "Attach": [{"Content": "Connection to unknown destination port 6491/UDP destination IP 172.13.164.195. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COY0jr3yQjSw2XEy6c"], "accumulated_threat_level": 9.3, "timewindow": 154} +{"Format": "IDEA0", "ID": "4630728f-db88-4e02-b049-546a1a47b2fd", "DetectTime": "2024-05-21T12:47:37.964688+00:00", "EventTime": "2024-05-21T12:47:37.964725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsupHRDkThIkVtgbb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 154} +{"Format": "IDEA0", "ID": "3d2ea581-735f-4072-8098-1b3af81bcff4", "DetectTime": "2024-05-21T12:47:38.017397+00:00", "EventTime": "2024-05-21T12:47:38.017435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKVLqvlpncZXoKE5"], "accumulated_threat_level": 10.900000000000002, "timewindow": 154} +{"Format": "IDEA0", "ID": "dab45801-73ae-4671-99cf-8d50e4cf1e29", "DetectTime": "2024-05-21T12:47:38.072233+00:00", "EventTime": "2024-05-21T12:47:38.072269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs41rH3gwKfhgdfVzc"], "accumulated_threat_level": 11.700000000000003, "timewindow": 154} +{"Format": "IDEA0", "ID": "346b1a07-95fb-4ba6-b1be-de6f17698fea", "DetectTime": "2024-05-21T12:47:38.116801+00:00", "EventTime": "2024-05-21T12:47:38.116835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDHcA4fp4JccGoirl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 154} +{"Format": "Json", "ID": "346b1a07-95fb-4ba6-b1be-de6f17698fea", "DetectTime": "2024-05-21T12:47:38.116801+00:00", "EventTime": "2024-05-21T12:47:38.116835+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-07T09:12:55.495386+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2024/05/21 12:47:38.350857)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 154, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "8e4b2739-2a29-449f-b05a-8dfd30fc5961", "DetectTime": "2024-05-21T12:47:38.362203+00:00", "EventTime": "2024-05-21T12:47:38.362222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMg0g3F3BfRSNW1T3"], "accumulated_threat_level": 0.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "bb8bc5cf-fb02-4199-b402-916c1ae096ac", "DetectTime": "2024-05-21T12:47:38.373489+00:00", "EventTime": "2024-05-21T12:47:38.373508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CismdD21IFl0DL8sZi"], "accumulated_threat_level": 1.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "3e66287f-b074-405a-aa10-ad2da738ca70", "DetectTime": "2024-05-21T12:47:38.385706+00:00", "EventTime": "2024-05-21T12:47:38.385725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCROu1UjfWKQDDOO7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 154} +{"Format": "IDEA0", "ID": "0e9af0d7-4a7a-47bd-b34d-d844cd3aa440", "DetectTime": "2024-05-21T12:47:38.550835+00:00", "EventTime": "2024-05-21T12:47:38.550856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0JXFyhCp99kEtFj"], "accumulated_threat_level": 3.2, "timewindow": 154} +{"Format": "IDEA0", "ID": "2862cf97-51b3-445e-90ef-daddea078a2c", "DetectTime": "2024-05-21T12:47:38.599960+00:00", "EventTime": "2024-05-21T12:47:38.599981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3V7V2cFHFc0Z4w6b"], "accumulated_threat_level": 4.0, "timewindow": 154} +{"Format": "IDEA0", "ID": "7f705d76-e6ac-4986-b4c8-4ad6085597ee", "DetectTime": "2024-05-21T12:47:38.652467+00:00", "EventTime": "2024-05-21T12:47:38.652488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtgTdoyNGL2CE6gQj"], "accumulated_threat_level": 4.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "5b821a05-5553-49fa-8967-8fbb20ba96ff", "DetectTime": "2024-05-21T12:47:38.701857+00:00", "EventTime": "2024-05-21T12:47:38.701877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["5.202.161.209"]}], "Attach": [{"Content": "Connection to unknown destination port 11614/UDP destination IP 5.202.161.209. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR3x5A3CxFAAtv2Cvg"], "accumulated_threat_level": 5.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "1528df15-3744-4eac-9354-30737c331ca4", "DetectTime": "2024-05-21T12:47:38.755052+00:00", "EventTime": "2024-05-21T12:47:38.755073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CijWE32EIuSwcbkZp6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 154} +{"Format": "IDEA0", "ID": "c036ef1e-c9c5-46a3-885e-52d72edfdac4", "DetectTime": "2024-05-21T12:47:38.807521+00:00", "EventTime": "2024-05-21T12:47:38.807539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYUoM3VCmn1xKvw1c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "3b6f9139-e3f0-4689-9c7f-65efe635ea8a", "DetectTime": "2024-05-21T12:47:38.861770+00:00", "EventTime": "2024-05-21T12:47:38.861790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8OuAwURSpICP8r5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "1bc434dd-fb25-4199-9e47-f12c7f331bb9", "DetectTime": "2024-05-21T12:47:39.159447+00:00", "EventTime": "2024-05-21T12:47:39.159482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8prp2u5eyy5hG1Jd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "c9e4dc4d-0726-4035-b36e-89cd4117a073", "DetectTime": "2024-05-21T12:47:39.213549+00:00", "EventTime": "2024-05-21T12:47:39.213568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu0sHm34ZlohKYpNn5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "cba68d69-f0db-48f7-9195-08ddd92ac8b0", "DetectTime": "2024-05-21T12:47:39.257185+00:00", "EventTime": "2024-05-21T12:47:39.257206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI4K11nzkPvlOZgce"], "accumulated_threat_level": 10.4, "timewindow": 154} +{"Format": "IDEA0", "ID": "988181af-6376-4072-8b21-60f15f3dc526", "DetectTime": "2024-05-21T12:47:39.312047+00:00", "EventTime": "2024-05-21T12:47:39.312065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["107.214.174.97"]}], "Attach": [{"Content": "Connection to unknown destination port 6448/UDP destination IP 107.214.174.97. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct5SBk4XRsGILqXtfb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 154} +{"Format": "IDEA0", "ID": "0dfab714-d922-4977-abe1-44eaf2b979bb", "DetectTime": "2024-05-21T12:47:39.359593+00:00", "EventTime": "2024-05-21T12:47:39.359614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci90c9jUGOaHsMh8c"], "accumulated_threat_level": 12.000000000000002, "timewindow": 154} +{"Format": "Json", "ID": "0dfab714-d922-4977-abe1-44eaf2b979bb", "DetectTime": "2024-05-21T12:47:39.359593+00:00", "EventTime": "2024-05-21T12:47:39.359614+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-07T09:12:59.518558+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2024/05/21 12:47:39.763978)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 154, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6a7701bc-7ae0-49a6-9d29-6858048fd642", "DetectTime": "2024-05-21T12:47:39.778021+00:00", "EventTime": "2024-05-21T12:47:39.778052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbGXeE3WBM5RtuwF34"], "accumulated_threat_level": 0.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "26210fa0-7997-434c-bca1-4c69f21d155a", "DetectTime": "2024-05-21T12:47:39.790949+00:00", "EventTime": "2024-05-21T12:47:39.790968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAApj3yeKHYqTfqy8"], "accumulated_threat_level": 1.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "6d2339b8-3b9b-4530-be07-c16643a21ac6", "DetectTime": "2024-05-21T12:47:39.802336+00:00", "EventTime": "2024-05-21T12:47:39.802356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1FKE3dR9xpZU0sUa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 154} +{"Format": "IDEA0", "ID": "8b10444a-edf2-4ea7-8fd0-5900146513e1", "DetectTime": "2024-05-21T12:47:39.815229+00:00", "EventTime": "2024-05-21T12:47:39.815250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZp6614p3HKSDleR82"], "accumulated_threat_level": 3.2, "timewindow": 154} +{"Format": "IDEA0", "ID": "d4bfe89e-f726-437b-a767-e67e7437d013", "DetectTime": "2024-05-21T12:47:39.866042+00:00", "EventTime": "2024-05-21T12:47:39.866059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C28EcI3p1F9raq1Ogg"], "accumulated_threat_level": 4.0, "timewindow": 154} +{"Format": "IDEA0", "ID": "e9030e1b-cfea-49d5-8b1b-921f7947522b", "DetectTime": "2024-05-21T12:47:39.911804+00:00", "EventTime": "2024-05-21T12:47:39.911824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFi4wu1VWt61q0OXxj"], "accumulated_threat_level": 4.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "b4b04358-8614-48ef-87e0-8db73c002983", "DetectTime": "2024-05-21T12:47:39.962178+00:00", "EventTime": "2024-05-21T12:47:39.962198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxZtvwn0AD0tnlJkh"], "accumulated_threat_level": 5.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "7e830855-699d-4478-b2f1-92c429ba0459", "DetectTime": "2024-05-21T12:47:40.010851+00:00", "EventTime": "2024-05-21T12:47:40.010873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C98x3A5dxKc4SvkS8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 154} +{"Format": "IDEA0", "ID": "9b8ca6cd-9e36-4b17-8a9b-d6f61364f4c9", "DetectTime": "2024-05-21T12:47:40.064086+00:00", "EventTime": "2024-05-21T12:47:40.064105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClL01g10cIDtIMJysk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "419b12b5-4f76-4da3-b564-82029a87183a", "DetectTime": "2024-05-21T12:47:40.117678+00:00", "EventTime": "2024-05-21T12:47:40.117696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHsKqI1yqJtQ88kMG9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "fb5238dd-d6c0-4e52-8e57-6ba3e7602708", "DetectTime": "2024-05-21T12:47:40.406294+00:00", "EventTime": "2024-05-21T12:47:40.406313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ICPr4N8wPFsuKBwj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "fabc2eec-55e6-4997-a1ca-d97c97326ff6", "DetectTime": "2024-05-21T12:47:40.452420+00:00", "EventTime": "2024-05-21T12:47:40.452439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7nns22rKivL74MUk"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "11b95f13-c019-4c4c-9cc2-5035aa5fb856", "DetectTime": "2024-05-21T12:47:40.594564+00:00", "EventTime": "2024-05-21T12:47:40.594587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBiyIe8z9jp6ZqxKl"], "accumulated_threat_level": 10.4, "timewindow": 154} +{"Format": "IDEA0", "ID": "1b988394-0390-4e7c-93e9-6b9d339092c2", "DetectTime": "2024-05-21T12:47:40.617096+00:00", "EventTime": "2024-05-21T12:47:40.617115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUPux3oZ7luz291n8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 154} +{"Format": "IDEA0", "ID": "b2484e5f-38d1-4d0a-8aa2-20ab0756da82", "DetectTime": "2024-05-21T12:47:40.691702+00:00", "EventTime": "2024-05-21T12:47:40.691723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPReuT1bAAUovFbF96"], "accumulated_threat_level": 12.000000000000002, "timewindow": 154} +{"Format": "Json", "ID": "b2484e5f-38d1-4d0a-8aa2-20ab0756da82", "DetectTime": "2024-05-21T12:47:40.691702+00:00", "EventTime": "2024-05-21T12:47:40.691723+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-07T09:25:51.047947+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2024/05/21 12:47:40.934066)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 154, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2cf17443-c334-4afa-9486-50832ddc9cdb", "DetectTime": "2024-05-21T12:47:40.946214+00:00", "EventTime": "2024-05-21T12:47:40.946235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsCytqqH7mJ4QUhi"], "accumulated_threat_level": 0.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "584e45b7-0975-4dc4-991a-faf1caeee1ca", "DetectTime": "2024-05-21T12:47:40.958247+00:00", "EventTime": "2024-05-21T12:47:40.958268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHbi52aHPUqh4yIn1"], "accumulated_threat_level": 1.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "4cffc987-5d29-40f9-8b32-fabb48deee5b", "DetectTime": "2024-05-21T12:47:41.158731+00:00", "EventTime": "2024-05-21T12:47:41.158756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPP1Ay1njNZZBdE89j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 154} +{"Format": "IDEA0", "ID": "b610f83c-8918-4951-b8aa-c39bd75c94f6", "DetectTime": "2024-05-21T12:47:41.208653+00:00", "EventTime": "2024-05-21T12:47:41.208671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPx2gi109Z3wn4KUS5"], "accumulated_threat_level": 3.2, "timewindow": 154} +{"Format": "IDEA0", "ID": "e13aea31-9813-4974-a6c8-6e7dcf518da6", "DetectTime": "2024-05-21T12:47:41.256343+00:00", "EventTime": "2024-05-21T12:47:41.256361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYrn9QBgDz9xUQp4"], "accumulated_threat_level": 4.0, "timewindow": 154} +{"Format": "IDEA0", "ID": "81e485b9-5f23-4ceb-a834-9de6aaef89bd", "DetectTime": "2024-05-21T12:47:41.309031+00:00", "EventTime": "2024-05-21T12:47:41.309050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKvQd3qOQzyH1cnLd"], "accumulated_threat_level": 4.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "0645c550-b42b-4cb3-a9ee-3f4baf0a3db7", "DetectTime": "2024-05-21T12:47:41.359813+00:00", "EventTime": "2024-05-21T12:47:41.359832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBhLa19LbJzlYO1b5"], "accumulated_threat_level": 5.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f8ad9b59-4d41-45b4-a1df-3b0f51f9c0d3", "DetectTime": "2024-05-21T12:47:41.408587+00:00", "EventTime": "2024-05-21T12:47:41.408610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSosc23tu2m7nk3Y63"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 154} +{"Format": "IDEA0", "ID": "c09f79bc-e3d7-4a30-ad53-ff2a0a05203e", "DetectTime": "2024-05-21T12:47:41.457103+00:00", "EventTime": "2024-05-21T12:47:41.457124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr3R8FD40YfY4Ohp8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "14068617-1738-44c5-b4da-ceda0ad0f42e", "DetectTime": "2024-05-21T12:47:41.732593+00:00", "EventTime": "2024-05-21T12:47:41.732612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc10V9DVgJXSFJCad"], "accumulated_threat_level": 7.999999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "71fe36e2-a17d-480e-9963-0ce541de3e06", "DetectTime": "2024-05-21T12:47:41.834939+00:00", "EventTime": "2024-05-21T12:47:41.834958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZTMd3DjvYNvCmFQc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "4956d4a3-8355-49c9-99de-b218fa0ab7f2", "DetectTime": "2024-05-21T12:47:41.860646+00:00", "EventTime": "2024-05-21T12:47:41.860667+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.248.7.167"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKGJN1EbyVFsQrnh1"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "3d27c790-0bec-4c87-913d-c0022e39b4b3", "DetectTime": "2024-05-21T12:47:41.872753+00:00", "EventTime": "2024-05-21T12:47:41.872771+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.248.7.167"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.248.7.167 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKGJN1EbyVFsQrnh1"], "accumulated_threat_level": 9.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "036d6e99-aac1-4f25-b53e-13e53291527a", "DetectTime": "2024-05-21T12:47:41.884762+00:00", "EventTime": "2024-05-21T12:47:41.884781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg5tSa4AnVwCDzHa5e"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "47add125-75f1-4718-ab8a-42a9821e8888", "DetectTime": "2024-05-21T12:47:41.932530+00:00", "EventTime": "2024-05-21T12:47:41.932547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUiLp1wnbu9WrDMx4"], "accumulated_threat_level": 10.4, "timewindow": 154} +{"Format": "IDEA0", "ID": "0245f346-7c62-42f1-95c1-90ee6e1ce876", "DetectTime": "2024-05-21T12:47:41.984411+00:00", "EventTime": "2024-05-21T12:47:41.984429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5bPZ26Q5LSqVb6id"], "accumulated_threat_level": 11.200000000000001, "timewindow": 154} +{"Format": "IDEA0", "ID": "e5e1d168-7d4a-44a8-a509-e7d518238021", "DetectTime": "2024-05-21T12:47:42.030188+00:00", "EventTime": "2024-05-21T12:47:42.030209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMY8yn3jUoMNWwm6ia"], "accumulated_threat_level": 12.000000000000002, "timewindow": 154} +{"Format": "Json", "ID": "e5e1d168-7d4a-44a8-a509-e7d518238021", "DetectTime": "2024-05-21T12:47:42.030188+00:00", "EventTime": "2024-05-21T12:47:42.030209+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-07T09:43:42.197992+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2024/05/21 12:47:42.282571)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 154, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3e367fa7-6d4d-4c20-9cd6-b7bc190c916b", "DetectTime": "2024-05-21T12:47:42.293474+00:00", "EventTime": "2024-05-21T12:47:42.293493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1tdm3ZpFE4ou2fL6"], "accumulated_threat_level": 0.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "7bb875cc-d86d-4c16-b991-1db19cf50921", "DetectTime": "2024-05-21T12:47:42.306290+00:00", "EventTime": "2024-05-21T12:47:42.306309+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.172.226.250"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKACm4wimmcHdXyxb"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "6e5346b9-611c-49aa-8d41-26392cb98812", "DetectTime": "2024-05-21T12:47:42.319541+00:00", "EventTime": "2024-05-21T12:47:42.319567+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.172.226.250"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.172.226.250 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKACm4wimmcHdXyxb"], "accumulated_threat_level": 10.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "7c0294c3-bffb-4599-8aa4-1eaeab33f59d", "DetectTime": "2024-05-21T12:47:42.333731+00:00", "EventTime": "2024-05-21T12:47:42.333751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHqCf2vhq5XLZeKI5"], "accumulated_threat_level": 1.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "73c2e80c-acc6-481d-89b5-44963e40f23b", "DetectTime": "2024-05-21T12:47:42.546680+00:00", "EventTime": "2024-05-21T12:47:42.546698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBZ862wmplc4iMVHf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 154} +{"Format": "IDEA0", "ID": "a597acea-e531-4db6-88a1-adb76ecf475e", "DetectTime": "2024-05-21T12:47:42.592575+00:00", "EventTime": "2024-05-21T12:47:42.592597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCBgDr4x54CJ16BBcf"], "accumulated_threat_level": 3.2, "timewindow": 154} +{"Format": "IDEA0", "ID": "0f1cdb6b-dd60-4f2a-a368-8a72e43b55bc", "DetectTime": "2024-05-21T12:47:42.639248+00:00", "EventTime": "2024-05-21T12:47:42.639269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAsRK3mKzcJkiswBh"], "accumulated_threat_level": 4.0, "timewindow": 154} +{"Format": "IDEA0", "ID": "7882bce6-2509-4ca9-a925-1f03faf6995c", "DetectTime": "2024-05-21T12:47:42.704077+00:00", "EventTime": "2024-05-21T12:47:42.704097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoKuZ3Uc4dXXSEqG4"], "accumulated_threat_level": 4.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "1e6a5071-42f7-44e5-8fda-a643eb826d55", "DetectTime": "2024-05-21T12:47:42.755626+00:00", "EventTime": "2024-05-21T12:47:42.755645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJhCM4nriGRIK969"], "accumulated_threat_level": 5.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "0368be92-a35d-4572-b2cd-130df968ceca", "DetectTime": "2024-05-21T12:47:42.805503+00:00", "EventTime": "2024-05-21T12:47:42.805522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9omz3WwyGnA9eWp5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 154} +{"Format": "IDEA0", "ID": "7869433b-259c-4a3e-9d28-fbf46a134fd2", "DetectTime": "2024-05-21T12:47:42.858653+00:00", "EventTime": "2024-05-21T12:47:42.858674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfU47giuxQJWsL61g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "428bdce5-fb72-4e36-809c-83ef57cdf3dc", "DetectTime": "2024-05-21T12:47:42.914394+00:00", "EventTime": "2024-05-21T12:47:42.914427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEaAmt1sTHzRiSORqh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "dd5a73cc-3bb5-45b9-9f3c-fa42b310800e", "DetectTime": "2024-05-21T12:47:43.175869+00:00", "EventTime": "2024-05-21T12:47:43.175892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7o7GnVij4qu9tE7"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "bbe50fd7-84fc-4e11-9e18-b26ff665af4f", "DetectTime": "2024-05-21T12:47:43.229143+00:00", "EventTime": "2024-05-21T12:47:43.229160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpVtd012ElM0POist9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "f7cb6e30-696c-4e67-8702-6804bb05e2c7", "DetectTime": "2024-05-21T12:47:43.281962+00:00", "EventTime": "2024-05-21T12:47:43.281985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59vyz3RBPwYdLG2Gf"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "08fde6b2-fb2f-4f50-897c-bcc7a7644080", "DetectTime": "2024-05-21T12:47:43.330289+00:00", "EventTime": "2024-05-21T12:47:43.330313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEG4ssLLwx2FcJ2c5"], "accumulated_threat_level": 10.4, "timewindow": 154} +{"Format": "IDEA0", "ID": "81a8d056-1b74-42e8-aa74-cf3d49d6b59f", "DetectTime": "2024-05-21T12:47:43.379602+00:00", "EventTime": "2024-05-21T12:47:43.379622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8AvW38EyK9Ibvwsd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 154} +{"Format": "IDEA0", "ID": "ff747af5-df6c-4598-95ca-27b98ee59fbb", "DetectTime": "2024-05-21T12:47:43.430201+00:00", "EventTime": "2024-05-21T12:47:43.430232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJocA5WZVfVxj9X9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 154} +{"Format": "Json", "ID": "ff747af5-df6c-4598-95ca-27b98ee59fbb", "DetectTime": "2024-05-21T12:47:43.430201+00:00", "EventTime": "2024-05-21T12:47:43.430232+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T09:44:21.321296+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 154. (real time 2024/05/21 12:47:43.692386)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 154, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0f720a25-66ed-48e9-b830-605a45d0950b", "DetectTime": "2024-05-21T12:47:43.705540+00:00", "EventTime": "2024-05-21T12:47:43.705571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YvxF1vOkjXzrlXzh"], "accumulated_threat_level": 0.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "9647b471-f1d5-46d5-80ff-165e3ab0877b", "DetectTime": "2024-05-21T12:47:43.753120+00:00", "EventTime": "2024-05-21T12:47:43.753145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTBKRhs1XkUwyGKIj"], "accumulated_threat_level": 1.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "9ea631d2-617a-4f0f-bee4-79ff5177b6d5", "DetectTime": "2024-05-21T12:47:43.796482+00:00", "EventTime": "2024-05-21T12:47:43.796503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjfsQ311SHUnKY8I1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 154} +{"Format": "IDEA0", "ID": "7f88ee66-c4fc-4dd5-9e7d-d9beb4f0e6ce", "DetectTime": "2024-05-21T12:47:43.850476+00:00", "EventTime": "2024-05-21T12:47:43.850494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLxch2ChXskEm77B9"], "accumulated_threat_level": 3.2, "timewindow": 154} +{"Format": "IDEA0", "ID": "3175574f-6456-419a-be1c-b5b4d504e478", "DetectTime": "2024-05-21T12:47:43.898387+00:00", "EventTime": "2024-05-21T12:47:43.898423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxU2A2KRZaHxXpjqc"], "accumulated_threat_level": 4.0, "timewindow": 154} +{"Format": "IDEA0", "ID": "3709ea05-733d-4e43-b0b5-075342f457e4", "DetectTime": "2024-05-21T12:47:43.946389+00:00", "EventTime": "2024-05-21T12:47:43.946435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjhok2jiFeEFfAeZk"], "accumulated_threat_level": 4.8, "timewindow": 154} +{"Format": "IDEA0", "ID": "579b6039-a198-4bdc-b28e-8316424f2c98", "DetectTime": "2024-05-21T12:47:43.996133+00:00", "EventTime": "2024-05-21T12:47:43.996159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ffHV1cC8YnxU5mDe"], "accumulated_threat_level": 5.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "3257dee8-ab06-4a59-9bef-7d56fce56481", "DetectTime": "2024-05-21T12:47:44.043249+00:00", "EventTime": "2024-05-21T12:47:44.043268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1m704ftxci1aS6u9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 154} +{"Format": "IDEA0", "ID": "2144beb0-f738-4eed-83f1-fc0d68e768ee", "DetectTime": "2024-05-21T12:47:44.270691+00:00", "EventTime": "2024-05-21T12:47:44.270715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBA043JpCjFDjbco9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "6cb0ca94-379b-4f6b-8240-ac3d9b46e558", "DetectTime": "2024-05-21T12:47:44.318671+00:00", "EventTime": "2024-05-21T12:47:44.318705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjOms7tbHYbBRvg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "022cd824-8615-43fb-af29-9f6f5cfd9583", "DetectTime": "2024-05-21T12:47:44.369840+00:00", "EventTime": "2024-05-21T12:47:44.369859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CocEKO1wOixoDSvCuj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 154} +{"Format": "IDEA0", "ID": "e765da2a-afbf-4453-9ade-8947ed6dbeb1", "DetectTime": "2024-05-21T12:47:44.430286+00:00", "EventTime": "2024-05-21T12:47:44.430305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTDiq1KcDtjPUYSqk"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "653bdf5f-f48a-4ddc-bf1b-221e257eefe9", "DetectTime": "2024-05-21T12:47:44.656617+00:00", "EventTime": "2024-05-21T12:47:44.656638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX2Dd7j9qg7w7ZLGc"], "accumulated_threat_level": 1.3, "timewindow": 155} +{"Format": "IDEA0", "ID": "c52de2f1-4a98-41a0-b8c1-93663be59f84", "DetectTime": "2024-05-21T12:47:44.706192+00:00", "EventTime": "2024-05-21T12:47:44.706213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNxP8s4dE6tsN91d9f"], "accumulated_threat_level": 2.1, "timewindow": 155} +{"Format": "IDEA0", "ID": "bf2b54e9-15dd-409f-83fa-7db993cc71eb", "DetectTime": "2024-05-21T12:47:44.756147+00:00", "EventTime": "2024-05-21T12:47:44.756171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1PQI1MJjjm7Wm9kh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 155} +{"Format": "IDEA0", "ID": "d3777c61-2523-4ab7-afb1-67c137de8bb1", "DetectTime": "2024-05-21T12:47:44.805604+00:00", "EventTime": "2024-05-21T12:47:44.805624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoLh0F2HKNEyqX6nw5"], "accumulated_threat_level": 3.7, "timewindow": 155} +{"Format": "IDEA0", "ID": "9f42ea9b-c66e-450c-9dde-195fd746fef7", "DetectTime": "2024-05-21T12:47:45.069698+00:00", "EventTime": "2024-05-21T12:47:45.069717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfnVB3vxTSQqQUQeg"], "accumulated_threat_level": 4.5, "timewindow": 155} +{"Format": "IDEA0", "ID": "1817c28b-2812-4387-b54b-b2939561a892", "DetectTime": "2024-05-21T12:47:45.120246+00:00", "EventTime": "2024-05-21T12:47:45.120274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0NLS3ZeAprNtdSsc"], "accumulated_threat_level": 5.3, "timewindow": 155} +{"Format": "IDEA0", "ID": "c5426584-6cdd-4e83-b770-87f2e84d694b", "DetectTime": "2024-05-21T12:47:45.277174+00:00", "EventTime": "2024-05-21T12:47:45.277206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6WjgR1fcwcLNE30H2"], "accumulated_threat_level": 6.1, "timewindow": 155} +{"Format": "IDEA0", "ID": "b2884269-03fe-4828-b34a-f668c51fc6ce", "DetectTime": "2024-05-21T12:47:45.300171+00:00", "EventTime": "2024-05-21T12:47:45.300199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ75yKXPyOtAkXPXb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 155} +{"Format": "IDEA0", "ID": "2e52d441-ad4a-4870-a274-6eca018aed76", "DetectTime": "2024-05-21T12:47:45.362863+00:00", "EventTime": "2024-05-21T12:47:45.362884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UtEMrfxOrQixKgi"], "accumulated_threat_level": 7.699999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "52916a80-2e22-431b-8287-73d1f1688ec5", "DetectTime": "2024-05-21T12:47:45.411814+00:00", "EventTime": "2024-05-21T12:47:45.411833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAm1l2uB42CVXE8h"], "accumulated_threat_level": 8.5, "timewindow": 155} +{"Format": "IDEA0", "ID": "18374c82-3212-4529-8fde-17e8a7c18f07", "DetectTime": "2024-05-21T12:47:45.694620+00:00", "EventTime": "2024-05-21T12:47:45.694642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ESar4GLndlr9ziO4"], "accumulated_threat_level": 9.3, "timewindow": 155} +{"Format": "IDEA0", "ID": "9d0226f4-065f-4a8e-8dd7-7758a5798872", "DetectTime": "2024-05-21T12:47:45.746663+00:00", "EventTime": "2024-05-21T12:47:45.746681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C75K5C3djsBnfDjqde"], "accumulated_threat_level": 10.100000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "479f6b55-cd06-4929-a42b-290b6884e031", "DetectTime": "2024-05-21T12:47:45.794084+00:00", "EventTime": "2024-05-21T12:47:45.794104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iRB842BjtaEPgILl"], "accumulated_threat_level": 10.900000000000002, "timewindow": 155} +{"Format": "IDEA0", "ID": "d2929b0a-dbe8-484f-b095-e5cd2c943b1a", "DetectTime": "2024-05-21T12:47:45.843742+00:00", "EventTime": "2024-05-21T12:47:45.843760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41T4n3p360liyovbc"], "accumulated_threat_level": 11.700000000000003, "timewindow": 155} +{"Format": "IDEA0", "ID": "a428ca58-419c-4ca4-b72a-fcd91cf620f2", "DetectTime": "2024-05-21T12:47:45.886148+00:00", "EventTime": "2024-05-21T12:47:45.886168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zFqY2Jd8WximoVSb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 155} +{"Format": "Json", "ID": "a428ca58-419c-4ca4-b72a-fcd91cf620f2", "DetectTime": "2024-05-21T12:47:45.886148+00:00", "EventTime": "2024-05-21T12:47:45.886168+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-07T10:15:58.417807+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2024/05/21 12:47:46.105657)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 155, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "9a4ddcd5-3ef8-4287-b45b-08a3a9207292", "DetectTime": "2024-05-21T12:47:46.117506+00:00", "EventTime": "2024-05-21T12:47:46.117528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheeUa3J1ORC0f6no1"], "accumulated_threat_level": 0.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "91407437-3095-41b7-9143-97c397b4ec10", "DetectTime": "2024-05-21T12:47:46.130936+00:00", "EventTime": "2024-05-21T12:47:46.130954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr4JSlKfvlqX2cVb"], "accumulated_threat_level": 1.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "539d56b9-1a95-4429-a1af-037ccaebb134", "DetectTime": "2024-05-21T12:47:46.141999+00:00", "EventTime": "2024-05-21T12:47:46.142017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qbu9Xq9iIzh2uq9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 155} +{"Format": "IDEA0", "ID": "1ce75810-a6b1-429f-9672-8dccc46b1f87", "DetectTime": "2024-05-21T12:47:46.299699+00:00", "EventTime": "2024-05-21T12:47:46.299719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqCB7ZtfKg5mlaMa"], "accumulated_threat_level": 3.2, "timewindow": 155} +{"Format": "IDEA0", "ID": "59ae49aa-08f1-4721-acd7-611e99672b78", "DetectTime": "2024-05-21T12:47:46.346229+00:00", "EventTime": "2024-05-21T12:47:46.346252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJSI0l4bn7cPIY0jTb"], "accumulated_threat_level": 4.0, "timewindow": 155} +{"Format": "IDEA0", "ID": "449378ce-a3e4-4062-9c3b-6663744ba6b5", "DetectTime": "2024-05-21T12:47:46.394507+00:00", "EventTime": "2024-05-21T12:47:46.394528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRYma2JGmpHB3wd99"], "accumulated_threat_level": 4.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "7dbd60b5-77ee-4cd5-b134-f0892ef8bc08", "DetectTime": "2024-05-21T12:47:46.447297+00:00", "EventTime": "2024-05-21T12:47:46.447318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFk4CjI8cDCWoH061"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "a3b24a64-b17d-4d14-a350-ee20ea069138", "DetectTime": "2024-05-21T12:47:46.524904+00:00", "EventTime": "2024-05-21T12:47:46.524925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcis29HEkz7ZPKVh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 155} +{"Format": "IDEA0", "ID": "d775c5af-69f6-4ae3-964d-74890cf63488", "DetectTime": "2024-05-21T12:47:46.566247+00:00", "EventTime": "2024-05-21T12:47:46.566267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmPypd3iAitf1XQYCj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "0ca3217b-280e-4d35-a01e-7105dd4387d5", "DetectTime": "2024-05-21T12:47:46.697619+00:00", "EventTime": "2024-05-21T12:47:46.697642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHHNg4MVepo3cJXsd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "94a2bb81-54c4-4f9c-a4d1-f012518475e9", "DetectTime": "2024-05-21T12:47:47.022631+00:00", "EventTime": "2024-05-21T12:47:47.022651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoJee1rORaxUedCb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "8d57c4f5-df97-48d3-8ea2-01016b0efcc4", "DetectTime": "2024-05-21T12:47:47.070185+00:00", "EventTime": "2024-05-21T12:47:47.070204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31NJ62MZlXtAD4jC1"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "20865fc8-e1dc-434b-8314-f8abfeb8d932", "DetectTime": "2024-05-21T12:47:47.118390+00:00", "EventTime": "2024-05-21T12:47:47.118442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWfhs3xBvcniF9bOl"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "815feaff-85ef-4d97-8e4a-fa53c60652c5", "DetectTime": "2024-05-21T12:47:47.169138+00:00", "EventTime": "2024-05-21T12:47:47.169174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN4Jb2MQn2ti2XBke"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "5f8e7dd9-8409-418c-a041-6734f3e3533a", "DetectTime": "2024-05-21T12:47:47.218897+00:00", "EventTime": "2024-05-21T12:47:47.218930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhKNb6em9lxKdvbk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 155} +{"Format": "Json", "ID": "5f8e7dd9-8409-418c-a041-6734f3e3533a", "DetectTime": "2024-05-21T12:47:47.218897+00:00", "EventTime": "2024-05-21T12:47:47.218930+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T10:16:02.023990+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2024/05/21 12:47:47.387828)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 155, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1a9360d5-9ba6-4e6f-a4a3-6030879f3565", "DetectTime": "2024-05-21T12:47:47.399855+00:00", "EventTime": "2024-05-21T12:47:47.399885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfinYF1vExpAnBuC6"], "accumulated_threat_level": 0.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "b582f7c5-7cbc-4583-9b55-bd33ca4e0f5d", "DetectTime": "2024-05-21T12:47:47.412900+00:00", "EventTime": "2024-05-21T12:47:47.412935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsaRE3oZchhWjiOk"], "accumulated_threat_level": 1.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "eafaa77c-b6ca-4cd5-817f-1d977ba4ac70", "DetectTime": "2024-05-21T12:47:47.425300+00:00", "EventTime": "2024-05-21T12:47:47.425333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgy3f3rOL4Ga7gFz3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 155} +{"Format": "IDEA0", "ID": "852aae80-ba63-474d-b8c2-a22dc24c47a0", "DetectTime": "2024-05-21T12:47:47.633837+00:00", "EventTime": "2024-05-21T12:47:47.633876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRX66dmvzoKLK2HI2"], "accumulated_threat_level": 3.2, "timewindow": 155} +{"Format": "IDEA0", "ID": "3421b868-1859-4dbf-90a6-34b44ae88f01", "DetectTime": "2024-05-21T12:47:47.682655+00:00", "EventTime": "2024-05-21T12:47:47.682690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9Hzp2mZYIDRESO1h"], "accumulated_threat_level": 4.0, "timewindow": 155} +{"Format": "IDEA0", "ID": "ca34ebd2-a206-4b09-8281-70137d2ebdd0", "DetectTime": "2024-05-21T12:47:47.739800+00:00", "EventTime": "2024-05-21T12:47:47.739836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmuCr82jvtFLmOISJc"], "accumulated_threat_level": 4.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "570e4761-7061-465f-8638-4292b9c2b34f", "DetectTime": "2024-05-21T12:47:47.792338+00:00", "EventTime": "2024-05-21T12:47:47.792373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyTJZ11W9cTmjTd0i"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "fa2e18bc-ed9c-466f-acfe-5975b205b41f", "DetectTime": "2024-05-21T12:47:47.840854+00:00", "EventTime": "2024-05-21T12:47:47.840888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfq2yR2B9ePkC2yEC6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 155} +{"Format": "IDEA0", "ID": "2f7ef1ef-8fd4-4c7a-b58e-560111275e8c", "DetectTime": "2024-05-21T12:47:47.891125+00:00", "EventTime": "2024-05-21T12:47:47.891157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVC9G02uR8KsyBZfQ5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "0002fdf2-92b7-48b4-967e-270d6cbc4194", "DetectTime": "2024-05-21T12:47:47.942784+00:00", "EventTime": "2024-05-21T12:47:47.942822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOvAF4jWY2qFPKA3b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "3898ebce-c870-477b-b681-5180dd2b661b", "DetectTime": "2024-05-21T12:47:48.046116+00:00", "EventTime": "2024-05-21T12:47:48.046137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFMvgCZ8LUopO1muk", "CG5lEA3UorbZIo6n1e", "CDtXAz1zxBLtAP9nyi", "Ckj4S712r7JPrevf9"], "accumulated_threat_level": 0.5, "timewindow": 161} +{"Format": "IDEA0", "ID": "247a3487-7ec9-491c-87ac-7023c9e6031d", "DetectTime": "2024-05-21T12:47:48.227791+00:00", "EventTime": "2024-05-21T12:47:48.227811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClL8Ji25BvMxnj95oi"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "38738c9b-9632-4f81-99d0-7928893fbd14", "DetectTime": "2024-05-21T12:47:48.249651+00:00", "EventTime": "2024-05-21T12:47:48.249673+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClL8Ji25BvMxnj95oi"], "accumulated_threat_level": 10.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "9b6dfd1d-0313-4ee6-b117-4bfa99288292", "DetectTime": "2024-05-21T12:47:48.268414+00:00", "EventTime": "2024-05-21T12:47:48.268435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9zqc3FrPINeCLG0e"], "accumulated_threat_level": 8.799999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "ffc173da-833b-4b48-a1b7-bddff08d94b7", "DetectTime": "2024-05-21T12:47:48.351917+00:00", "EventTime": "2024-05-21T12:47:48.351937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtyOF2LGd3sNqiRjl"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "523b1ad8-f8a3-4365-9f97-67fcf1aaf32b", "DetectTime": "2024-05-21T12:47:48.406048+00:00", "EventTime": "2024-05-21T12:47:48.406069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxmNsx3N9DbTipmjTc"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "a0cbe58c-1d9a-43e9-9e4d-e48ff62114fa", "DetectTime": "2024-05-21T12:47:48.443327+00:00", "EventTime": "2024-05-21T12:47:48.443347+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCfVp38hA7GTfq5Wa"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "0c5a70d7-f5ca-4464-8803-daff0f93849e", "DetectTime": "2024-05-21T12:47:48.457092+00:00", "EventTime": "2024-05-21T12:47:48.457111+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCfVp38hA7GTfq5Wa"], "accumulated_threat_level": 11.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "31830faa-4f37-4b9f-9c6a-618d96a88278", "DetectTime": "2024-05-21T12:47:48.469301+00:00", "EventTime": "2024-05-21T12:47:48.469321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXrCuN3uNtNmUwBPg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "0f71951f-e62f-40ac-8909-d0e65923cf94", "DetectTime": "2024-05-21T12:47:48.508613+00:00", "EventTime": "2024-05-21T12:47:48.508632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bsM14qrIBjAUy8E3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 155} +{"Format": "Json", "ID": "0f71951f-e62f-40ac-8909-d0e65923cf94", "DetectTime": "2024-05-21T12:47:48.508613+00:00", "EventTime": "2024-05-21T12:47:48.508632+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-07T10:46:38.420470+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2024/05/21 12:47:48.715809)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 155, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c4f7b1b9-6639-44f5-8c03-2cf470919709", "DetectTime": "2024-05-21T12:47:48.727713+00:00", "EventTime": "2024-05-21T12:47:48.727732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5MHxac7zFaZcj6v3"], "accumulated_threat_level": 0.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "75cc549f-147c-41a9-8080-15a4c19466de", "DetectTime": "2024-05-21T12:47:48.739832+00:00", "EventTime": "2024-05-21T12:47:48.739851+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXRsXk2kkBmAT09Ui3"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "343b3094-94b0-45b3-b0c9-937c0f059091", "DetectTime": "2024-05-21T12:47:48.751591+00:00", "EventTime": "2024-05-21T12:47:48.751608+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXRsXk2kkBmAT09Ui3"], "accumulated_threat_level": 11.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "2a5192e2-15b5-48c5-bd8b-6dcf6a22409b", "DetectTime": "2024-05-21T12:47:48.762171+00:00", "EventTime": "2024-05-21T12:47:48.762189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPdJI3YbTO4j7m6A4"], "accumulated_threat_level": 1.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "386f35fb-200b-473d-9dbc-6b0fe03ee681", "DetectTime": "2024-05-21T12:47:48.773415+00:00", "EventTime": "2024-05-21T12:47:48.773433+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02uUy3yhuTEyx0Rt4"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "4c05ad19-488a-44a0-a77b-df356409f8fe", "DetectTime": "2024-05-21T12:47:48.785495+00:00", "EventTime": "2024-05-21T12:47:48.785513+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C02uUy3yhuTEyx0Rt4"], "accumulated_threat_level": 12.0, "timewindow": 34} +{"Format": "Json", "ID": "4c05ad19-488a-44a0-a77b-df356409f8fe", "DetectTime": "2024-05-21T12:47:48.785495+00:00", "EventTime": "2024-05-21T12:47:48.785513+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "1970-01-02T09:34:38.198614+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 34. (real time 2024/05/21 12:47:49.167436)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 34, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "b3060b75-e921-4f3f-b8ba-dbe45bbdc131", "DetectTime": "2024-05-21T12:47:49.179407+00:00", "EventTime": "2024-05-21T12:47:49.179425+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIjJdf42gjHRZBdBN7"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "21f75541-ea47-481e-bb73-fe4deed96ee7", "DetectTime": "2024-05-21T12:47:49.192077+00:00", "EventTime": "2024-05-21T12:47:49.192098+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIjJdf42gjHRZBdBN7"], "accumulated_threat_level": 0.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "92ec3bc0-0b89-4f83-bcc5-282bc1c25190", "DetectTime": "2024-05-21T12:47:49.205593+00:00", "EventTime": "2024-05-21T12:47:49.205614+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mBow2UWNZ3CtHjn9"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "4267ea76-bc09-428d-a9b0-aaf9a34f1411", "DetectTime": "2024-05-21T12:47:49.219674+00:00", "EventTime": "2024-05-21T12:47:49.219698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mBow2UWNZ3CtHjn9"], "accumulated_threat_level": 1.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "01ace0f3-f573-4ba7-bb5e-94007b94ddb1", "DetectTime": "2024-05-21T12:47:49.230433+00:00", "EventTime": "2024-05-21T12:47:49.230452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHPVI63lvKTOpB32zf"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "8c394846-b992-4096-a7c0-f0fa560ac439", "DetectTime": "2024-05-21T12:47:49.252712+00:00", "EventTime": "2024-05-21T12:47:49.252730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTZ0m3u2FMTcrepxb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 155} +{"Format": "IDEA0", "ID": "058b639e-05ca-4ea7-8361-34acc9a03ae7", "DetectTime": "2024-05-21T12:47:49.263540+00:00", "EventTime": "2024-05-21T12:47:49.263559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpNomU24StB3b8YVv3"], "accumulated_threat_level": 3.2, "timewindow": 155} +{"Format": "IDEA0", "ID": "3465b3b7-d669-4c86-ae15-88a501c7ff24", "DetectTime": "2024-05-21T12:47:49.275480+00:00", "EventTime": "2024-05-21T12:47:49.275498+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE83HE1Uge5YJNYmGj"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "b6eedcc8-f315-4e0c-a5a9-e5f58a5d38ec", "DetectTime": "2024-05-21T12:47:49.290382+00:00", "EventTime": "2024-05-21T12:47:49.290422+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE83HE1Uge5YJNYmGj"], "accumulated_threat_level": 1.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "c379c017-3a4b-4d32-ab11-c0520006606b", "DetectTime": "2024-05-21T12:47:49.311239+00:00", "EventTime": "2024-05-21T12:47:49.311273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuUpn52l9myMz9t4e6"], "accumulated_threat_level": 4.0, "timewindow": 155} +{"Format": "IDEA0", "ID": "a282b5e1-41c1-4441-a1f1-c3f12489460f", "DetectTime": "2024-05-21T12:47:49.324535+00:00", "EventTime": "2024-05-21T12:47:49.324572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxS6m27HsXkku0Cgd"], "accumulated_threat_level": 4.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "39c16573-e529-437a-b1b4-edcb5e0f2c85", "DetectTime": "2024-05-21T12:47:49.337787+00:00", "EventTime": "2024-05-21T12:47:49.337823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6E7s4hfC8CYBP575"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "8bb9cd0d-74e6-425f-9a68-c449c6ccb8d3", "DetectTime": "2024-05-21T12:47:49.350608+00:00", "EventTime": "2024-05-21T12:47:49.350641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoRW7F49yMCgaoHEuc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 155} +{"Format": "IDEA0", "ID": "3dd2ff66-30d4-40a4-acf4-f0674a5e4819", "DetectTime": "2024-05-21T12:47:49.364395+00:00", "EventTime": "2024-05-21T12:47:49.364416+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35LKo3PiZsXfp5BTb"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "6b11c029-54fd-449b-b246-e80afefd5164", "DetectTime": "2024-05-21T12:47:49.378857+00:00", "EventTime": "2024-05-21T12:47:49.378878+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35LKo3PiZsXfp5BTb"], "accumulated_threat_level": 2.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "a0b484f7-41e8-4f30-b598-1fadf569d195", "DetectTime": "2024-05-21T12:47:49.390994+00:00", "EventTime": "2024-05-21T12:47:49.391016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7lqU2wUUAPOSS5K5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "e37afb7a-b0ae-46a4-bd5e-0b36f058ac85", "DetectTime": "2024-05-21T12:47:49.403546+00:00", "EventTime": "2024-05-21T12:47:49.403565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyVSgJt65gKtfJA6"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "f87b6e02-91d3-4189-ab62-14e1ecf1d760", "DetectTime": "2024-05-21T12:47:49.415723+00:00", "EventTime": "2024-05-21T12:47:49.415743+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyVSgJt65gKtfJA6"], "accumulated_threat_level": 2.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "e59b4723-f7b6-4e68-b922-e764e4fea5fe", "DetectTime": "2024-05-21T12:47:49.429355+00:00", "EventTime": "2024-05-21T12:47:49.429387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJPVSLBnTXxHBjX7"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "2840be16-83f0-4cd2-a2d9-5c84b43c4268", "DetectTime": "2024-05-21T12:47:49.442582+00:00", "EventTime": "2024-05-21T12:47:49.442606+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJPVSLBnTXxHBjX7"], "accumulated_threat_level": 3.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "56baa75b-177e-4435-bcec-935613c29280", "DetectTime": "2024-05-21T12:47:49.454699+00:00", "EventTime": "2024-05-21T12:47:49.454718+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlQK21OdpdF3bFNSh"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "56adfa35-037b-4b11-8161-d17227003a67", "DetectTime": "2024-05-21T12:47:49.466841+00:00", "EventTime": "2024-05-21T12:47:49.466860+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZlQK21OdpdF3bFNSh"], "accumulated_threat_level": 3.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "cf342904-23f4-418c-b7b5-cfa661687d21", "DetectTime": "2024-05-21T12:47:49.518323+00:00", "EventTime": "2024-05-21T12:47:49.518343+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySLqt32VaYyvlJgt9"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "1c717672-8c07-4a6a-b9a9-dd950dad2acc", "DetectTime": "2024-05-21T12:47:49.532059+00:00", "EventTime": "2024-05-21T12:47:49.532077+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CySLqt32VaYyvlJgt9"], "accumulated_threat_level": 4.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "a373b8cb-7ef0-44fe-bba3-9e3a7f39664d", "DetectTime": "2024-05-21T12:47:49.608572+00:00", "EventTime": "2024-05-21T12:47:49.608592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqMSHrkwo08GqKg7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "198e46d4-d12f-42a8-b6fe-e9f8f4cc6d60", "DetectTime": "2024-05-21T12:47:49.620804+00:00", "EventTime": "2024-05-21T12:47:49.620823+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZkFh2KLJIuVul957"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "af0f7f8c-defa-4603-ac33-27f45e16d80d", "DetectTime": "2024-05-21T12:47:49.633803+00:00", "EventTime": "2024-05-21T12:47:49.633824+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeZkFh2KLJIuVul957"], "accumulated_threat_level": 4.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "109f950f-2cff-4cc2-840e-c75e9260d9e4", "DetectTime": "2024-05-21T12:47:49.660174+00:00", "EventTime": "2024-05-21T12:47:49.660193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVk93r46WutoLeBYtb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "541a83a0-c12b-420b-95e6-837677780120", "DetectTime": "2024-05-21T12:47:49.706379+00:00", "EventTime": "2024-05-21T12:47:49.706399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4xdB1Rhj4EJkaMuj"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "e9d7cda1-d9ce-4063-a9dd-e2f4766b24d5", "DetectTime": "2024-05-21T12:47:49.722148+00:00", "EventTime": "2024-05-21T12:47:49.722171+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM4xdB1Rhj4EJkaMuj"], "accumulated_threat_level": 5.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "48ac618b-e548-4b8c-bca8-8b89eb316de3", "DetectTime": "2024-05-21T12:47:49.739785+00:00", "EventTime": "2024-05-21T12:47:49.739803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1c7xk1QINUjqJVlYe"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "6291153d-8e6e-4b8f-8d1f-133136a894ba", "DetectTime": "2024-05-21T12:47:49.775296+00:00", "EventTime": "2024-05-21T12:47:49.775316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CprlO22V86suUWGDI5"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "0e0b4ac2-6fae-4089-a283-5cb8f31edb01", "DetectTime": "2024-05-21T12:47:49.820848+00:00", "EventTime": "2024-05-21T12:47:49.820868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkLiavDFJEtNvwKW3"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "1c3c626f-0985-409c-8ef1-fbee210711ac", "DetectTime": "2024-05-21T12:47:49.872003+00:00", "EventTime": "2024-05-21T12:47:49.872024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHMDh3J9N56MGqpRb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "b53c329f-393d-4d29-bd09-f4dd62a6c5c5", "DetectTime": "2024-05-21T12:47:49.912591+00:00", "EventTime": "2024-05-21T12:47:49.912617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.202.161.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8kbo3Bq1S614tyY"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "fe698c99-2d40-4e18-a577-3e1d711562dc", "DetectTime": "2024-05-21T12:47:49.972376+00:00", "EventTime": "2024-05-21T12:47:49.972400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAUAyZ3Nxfw6N6cVAf"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "baac1c4d-43aa-43f5-b0f1-6cd6b17b6334", "DetectTime": "2024-05-21T12:47:50.016092+00:00", "EventTime": "2024-05-21T12:47:50.016112+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfQxE15YNdTqAcHW3"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "ae4aa8fe-e388-464a-b233-8aa9dc664290", "DetectTime": "2024-05-21T12:47:50.029945+00:00", "EventTime": "2024-05-21T12:47:50.029976+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfQxE15YNdTqAcHW3"], "accumulated_threat_level": 5.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "598a0489-86ea-47f0-85c1-381f0572f2c0", "DetectTime": "2024-05-21T12:47:50.161657+00:00", "EventTime": "2024-05-21T12:47:50.161682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJlRnpJT7mVD7BWa"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "018aa68d-4959-441b-b44a-047c9209e55f", "DetectTime": "2024-05-21T12:47:50.176180+00:00", "EventTime": "2024-05-21T12:47:50.176205+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJlRnpJT7mVD7BWa"], "accumulated_threat_level": 6.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "4da7dfed-63b9-4908-bf6d-111ece664d2e", "DetectTime": "2024-05-21T12:47:50.196721+00:00", "EventTime": "2024-05-21T12:47:50.196744+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNpbch6VGCVvmzLl"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "f16bf3c7-492f-45ee-99f8-cd8f5c957263", "DetectTime": "2024-05-21T12:47:50.211479+00:00", "EventTime": "2024-05-21T12:47:50.211515+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNpbch6VGCVvmzLl"], "accumulated_threat_level": 6.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "cf049d85-51be-4663-a9fe-381a4ae5a4b0", "DetectTime": "2024-05-21T12:47:50.241188+00:00", "EventTime": "2024-05-21T12:47:50.241210+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLemXL22vD8lwSFRX7"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "72300c99-bf27-47da-b3f3-8ed3305aeba3", "DetectTime": "2024-05-21T12:47:50.254367+00:00", "EventTime": "2024-05-21T12:47:50.254388+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLemXL22vD8lwSFRX7"], "accumulated_threat_level": 7.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "50278ed8-95c9-491a-b943-d600dcc86335", "DetectTime": "2024-05-21T12:47:50.261372+00:00", "EventTime": "2024-05-21T12:47:50.261392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchaPv2iVZkIV54IB2"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "f1943b8c-cfc2-4b9b-bc0f-d03c6be32bf7", "DetectTime": "2024-05-21T12:47:50.274356+00:00", "EventTime": "2024-05-21T12:47:50.274376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qybm2ynxia5BekD2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 155} +{"Format": "Json", "ID": "f1943b8c-cfc2-4b9b-bc0f-d03c6be32bf7", "DetectTime": "2024-05-21T12:47:50.274356+00:00", "EventTime": "2024-05-21T12:47:50.274376+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "1970-01-07T10:46:57.227589+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2024/05/21 12:47:50.709059)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 155, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ab3c4e3b-449f-4880-b630-84f49f01f419", "DetectTime": "2024-05-21T12:47:50.721101+00:00", "EventTime": "2024-05-21T12:47:50.721119+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuMCfA4ZVR6jd8kcJl"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "136ef1e9-1ae2-4f8c-aaad-c573ea44c533", "DetectTime": "2024-05-21T12:47:50.735068+00:00", "EventTime": "2024-05-21T12:47:50.735088+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuMCfA4ZVR6jd8kcJl"], "accumulated_threat_level": 7.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "ecf16ac4-699b-4cd2-8ff4-5d4ef8e20144", "DetectTime": "2024-05-21T12:47:50.740120+00:00", "EventTime": "2024-05-21T12:47:50.740137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA83dbQ7Nxijyknm3"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "bd385cc7-e75c-458c-b945-0eb02c636a23", "DetectTime": "2024-05-21T12:47:50.744907+00:00", "EventTime": "2024-05-21T12:47:50.744924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6nKqQTu78SWWNMCl"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "cb85458d-a6b5-4cbf-bdb3-96fb101d1f24", "DetectTime": "2024-05-21T12:47:50.749632+00:00", "EventTime": "2024-05-21T12:47:50.749650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSyZgplpos5w6xf7l"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "523a3e90-d023-413e-b038-cee2d2f174f9", "DetectTime": "2024-05-21T12:47:50.754453+00:00", "EventTime": "2024-05-21T12:47:50.754471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Celp5G3BTeBCWFqSP4"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "7379e5b7-ed1a-4882-aa68-e4b8759714f6", "DetectTime": "2024-05-21T12:47:50.772583+00:00", "EventTime": "2024-05-21T12:47:50.772602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUz6wv1YK40pjxdoMh"], "accumulated_threat_level": 0.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "3834bf7f-b9ce-46f6-a2a6-715cdf71cf87", "DetectTime": "2024-05-21T12:47:50.778118+00:00", "EventTime": "2024-05-21T12:47:50.778138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs32B12pJpEIDanyrd"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "8bf4309c-bf7e-4e53-9e76-654031d4ff36", "DetectTime": "2024-05-21T12:47:51.071726+00:00", "EventTime": "2024-05-21T12:47:51.071744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyQzUs4DFGOai3Wzc4"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "e8b00194-d4c5-4acf-b9c2-c48532830099", "DetectTime": "2024-05-21T12:47:51.076236+00:00", "EventTime": "2024-05-21T12:47:51.076254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSBqSq1MuNC3N9nYD7"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "1ad8b715-6464-463b-8f9f-8d2853252454", "DetectTime": "2024-05-21T12:47:51.189076+00:00", "EventTime": "2024-05-21T12:47:51.189097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBzikV19QF3MoMc0ei"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "8d94186c-7904-436b-b8b5-78ff02810044", "DetectTime": "2024-05-21T12:47:51.206765+00:00", "EventTime": "2024-05-21T12:47:51.206786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKJdk3fDz5ju63d14"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "a37956ae-c4f3-4904-bb45-2c8409e6dfbe", "DetectTime": "2024-05-21T12:47:51.245057+00:00", "EventTime": "2024-05-21T12:47:51.245079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyzR513hSYZDAKhBne"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "706827a3-819f-48a8-8c77-4179f4fb77a5", "DetectTime": "2024-05-21T12:47:51.271415+00:00", "EventTime": "2024-05-21T12:47:51.271434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKK0RK1NrZ9GLcIkNd"], "accumulated_threat_level": 1.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "070f2b9b-8935-4a3b-b516-62c13c3c48ba", "DetectTime": "2024-05-21T12:47:51.624172+00:00", "EventTime": "2024-05-21T12:47:51.624200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUxs4B2yNzWgzAtWX9"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "0f022322-ef5a-4413-a388-844d3f66e3e9", "DetectTime": "2024-05-21T12:47:51.629972+00:00", "EventTime": "2024-05-21T12:47:51.629994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8GcCsGH9yz3gw2be"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "556e2f1e-e9c3-4d1d-9fe7-8032d9a9edb2", "DetectTime": "2024-05-21T12:47:51.635422+00:00", "EventTime": "2024-05-21T12:47:51.635441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfFDFU18JXfbFrQFZ6"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "58c2d7ba-d541-453d-bfb4-799b97561e7d", "DetectTime": "2024-05-21T12:47:51.675371+00:00", "EventTime": "2024-05-21T12:47:51.675394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzNkD2NKBXSQpXFa6"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "849f5c17-b22a-4f2f-8f5f-c680c397cede", "DetectTime": "2024-05-21T12:47:51.723593+00:00", "EventTime": "2024-05-21T12:47:51.723614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX7MGX3btZs8c0msil"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "d7fc69ba-543a-4ea7-a866-9c52055ec6a2", "DetectTime": "2024-05-21T12:47:51.764377+00:00", "EventTime": "2024-05-21T12:47:51.764399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWRmi1KyEal84Ma94"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "3672c071-6a13-4edc-b0d8-f758de05a3f8", "DetectTime": "2024-05-21T12:47:51.809376+00:00", "EventTime": "2024-05-21T12:47:51.809399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIdog3OHWSzIB1unc"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "d16bdf6d-cd61-4ca2-973b-3f73cdd3c9f5", "DetectTime": "2024-05-21T12:47:51.899025+00:00", "EventTime": "2024-05-21T12:47:51.899047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXxAJ23m5hD9jSEvh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 155} +{"Format": "IDEA0", "ID": "ace9b467-cd9b-451d-9569-cba28f01c38a", "DetectTime": "2024-05-21T12:47:52.229877+00:00", "EventTime": "2024-05-21T12:47:52.229897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY2yLw3Uk7py0wywbb"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "82182948-c232-4c04-8715-17f0f04cc29d", "DetectTime": "2024-05-21T12:47:52.279748+00:00", "EventTime": "2024-05-21T12:47:52.279770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1rYW2Uoo87zKO6Wi"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "52c4fa1f-a3c1-4d44-a15a-5659a8864eb7", "DetectTime": "2024-05-21T12:47:52.341638+00:00", "EventTime": "2024-05-21T12:47:52.341659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C26Cmg4R1ctOGKiy9g"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "5911e085-93f7-4e66-b8c2-4667985f4f23", "DetectTime": "2024-05-21T12:47:52.422069+00:00", "EventTime": "2024-05-21T12:47:52.422089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCmMc36ccVwsy2x2j"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "23eb3d91-4e52-4658-852a-eacfdcb8a393", "DetectTime": "2024-05-21T12:47:52.426815+00:00", "EventTime": "2024-05-21T12:47:52.426835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.250.218.50 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0XSc2S030LYNry7c"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "a2618e78-d677-4ba4-ae2c-0e7ab4fefcfd", "DetectTime": "2024-05-21T12:47:52.431491+00:00", "EventTime": "2024-05-21T12:47:52.431510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cka0Ij3lwBEGNy1zP8"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f29b0316-0fd1-478e-aeca-e30936260a8e", "DetectTime": "2024-05-21T12:47:52.471083+00:00", "EventTime": "2024-05-21T12:47:52.471104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzvQh72EQZmbqgwfo2"], "accumulated_threat_level": 0, "timewindow": 153} +{"Format": "IDEA0", "ID": "acaf5705-01c0-4168-ab84-099d4fd976c3", "DetectTime": "2024-05-21T12:47:52.555640+00:00", "EventTime": "2024-05-21T12:47:52.555664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co824o4hAi22iNBww6"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "c7f4e2da-9607-4ec5-b44b-cd2a2ddc5d37", "DetectTime": "2024-05-21T12:47:52.910387+00:00", "EventTime": "2024-05-21T12:47:52.910426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoG4s33bfukRFpIdd2"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "364c812b-a78d-4ef0-aaa8-ca93c3060d88", "DetectTime": "2024-05-21T12:47:52.963371+00:00", "EventTime": "2024-05-21T12:47:52.963389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C15snt4BzJDjfxphH2"], "accumulated_threat_level": 3.2, "timewindow": 155} +{"Format": "IDEA0", "ID": "48c07520-d61a-4f7c-8cb5-7884c5a42e2d", "DetectTime": "2024-05-21T12:47:52.968671+00:00", "EventTime": "2024-05-21T12:47:52.968689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct8XmN19K7ca62HkAi"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "d00f18dd-c53f-449a-b666-8342634e2889", "DetectTime": "2024-05-21T12:47:52.973827+00:00", "EventTime": "2024-05-21T12:47:52.973845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3bo1I1WMpCzPp2uql"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "c2f572da-bc93-48a7-abd9-623b7c86dac0", "DetectTime": "2024-05-21T12:47:53.037269+00:00", "EventTime": "2024-05-21T12:47:53.037290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRhT4Tvo9xeHxR7f"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "b4e81980-847a-4b13-86c2-f23f40529d72", "DetectTime": "2024-05-21T12:47:53.042304+00:00", "EventTime": "2024-05-21T12:47:53.042325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmSjo4lGSWg7kGnLa"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "6986d1a4-b06e-4617-a838-7184788a7548", "DetectTime": "2024-05-21T12:47:53.152660+00:00", "EventTime": "2024-05-21T12:47:53.152679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuv8ek2Z0tG88Xhzkh"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "6e71d88e-2f88-49d9-bd93-b313267817fa", "DetectTime": "2024-05-21T12:47:53.157315+00:00", "EventTime": "2024-05-21T12:47:53.157333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfhzZw23A5jI0dKyR"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "c70a5d24-5157-4000-b1e4-2a805577eaa2", "DetectTime": "2024-05-21T12:47:53.210562+00:00", "EventTime": "2024-05-21T12:47:53.210586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.13.164.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COY0jr3yQjSw2XEy6c"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "a572c123-7de8-48c2-bbbb-85c23746dea9", "DetectTime": "2024-05-21T12:47:53.462327+00:00", "EventTime": "2024-05-21T12:47:53.462347+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLmYZU2XN7i3wWZg"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "bb03d368-2dae-4279-a307-2015029bcaee", "DetectTime": "2024-05-21T12:47:53.474762+00:00", "EventTime": "2024-05-21T12:47:53.474781+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVLmYZU2XN7i3wWZg"], "accumulated_threat_level": 8.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "b61afeda-8423-453b-b856-796f5b119885", "DetectTime": "2024-05-21T12:47:53.570816+00:00", "EventTime": "2024-05-21T12:47:53.570838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsupHRDkThIkVtgbb"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "a483b84d-c978-4e1f-8c3c-7fdd78bfcf70", "DetectTime": "2024-05-21T12:47:53.626815+00:00", "EventTime": "2024-05-21T12:47:53.626835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chkqrw1d0SVzvyfHrk"], "accumulated_threat_level": 4.0, "timewindow": 155} +{"Format": "IDEA0", "ID": "4d713585-3dd0-4335-aff8-a7c56f824c9b", "DetectTime": "2024-05-21T12:47:53.670918+00:00", "EventTime": "2024-05-21T12:47:53.670941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKVLqvlpncZXoKE5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "339d4601-df28-4480-9056-6a7a6e4c025d", "DetectTime": "2024-05-21T12:47:53.684248+00:00", "EventTime": "2024-05-21T12:47:53.684269+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIQye2AqiQUMKjVj8"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "582d1c2b-f6d2-40b2-8e65-16f867e863d6", "DetectTime": "2024-05-21T12:47:53.689679+00:00", "EventTime": "2024-05-21T12:47:53.689698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDHcA4fp4JccGoirl"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "5403966c-2884-4dcf-8f0d-2f0faa717b6c", "DetectTime": "2024-05-21T12:47:53.704287+00:00", "EventTime": "2024-05-21T12:47:53.704315+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgIQye2AqiQUMKjVj8"], "accumulated_threat_level": 8.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "1af1565f-cc39-4746-bf7f-0e4c86c971af", "DetectTime": "2024-05-21T12:47:53.727788+00:00", "EventTime": "2024-05-21T12:47:53.727808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrCROu1UjfWKQDDOO7"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "d976e88c-a7b7-42e6-a1f7-a33f45235367", "DetectTime": "2024-05-21T12:47:53.732821+00:00", "EventTime": "2024-05-21T12:47:53.732839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs41rH3gwKfhgdfVzc"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "b9bb7c38-fbf8-497e-9207-b5c66d6394a7", "DetectTime": "2024-05-21T12:47:53.738351+00:00", "EventTime": "2024-05-21T12:47:53.738369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMg0g3F3BfRSNW1T3"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "17580689-dcf6-4b08-a554-24730d3d2f99", "DetectTime": "2024-05-21T12:47:53.777443+00:00", "EventTime": "2024-05-21T12:47:53.777464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CismdD21IFl0DL8sZi"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "8fcca0c2-1fe3-4cb3-8581-3746f4c37263", "DetectTime": "2024-05-21T12:47:53.821587+00:00", "EventTime": "2024-05-21T12:47:53.821608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0JXFyhCp99kEtFj"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "25bf3cf9-e612-4d54-bade-d1cac7d53b4a", "DetectTime": "2024-05-21T12:47:54.013695+00:00", "EventTime": "2024-05-21T12:47:54.013714+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgUkz63shbdQXVRAQ7"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "491d21e9-a898-4973-884e-aedff26b3307", "DetectTime": "2024-05-21T12:47:54.026696+00:00", "EventTime": "2024-05-21T12:47:54.026721+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgUkz63shbdQXVRAQ7"], "accumulated_threat_level": 9.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "b7afe5c1-173a-4bef-9287-a937b5346738", "DetectTime": "2024-05-21T12:47:54.056829+00:00", "EventTime": "2024-05-21T12:47:54.056848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2WGsX2cgwypva07Nh"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "be50f8c4-0619-4c16-8281-a81ea933a6f9", "DetectTime": "2024-05-21T12:47:54.070111+00:00", "EventTime": "2024-05-21T12:47:54.070134+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2WGsX2cgwypva07Nh"], "accumulated_threat_level": 9.5, "timewindow": 34} +{"Format": "IDEA0", "ID": "5466aa95-8ebd-4cc9-a9b1-fcd1674feae3", "DetectTime": "2024-05-21T12:47:54.096721+00:00", "EventTime": "2024-05-21T12:47:54.096738+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqbBi41OwZIpmNUb"], "accumulated_threat_level": 0, "timewindow": 34} +{"Format": "IDEA0", "ID": "8b968dac-63df-4947-ab29-34f795dd781e", "DetectTime": "2024-05-21T12:47:54.108317+00:00", "EventTime": "2024-05-21T12:47:54.108336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqbBi41OwZIpmNUb"], "accumulated_threat_level": 10.0, "timewindow": 34} +{"Format": "IDEA0", "ID": "eb85be90-0648-442a-9c15-a0a94f0e9505", "DetectTime": "2024-05-21T12:47:54.224305+00:00", "EventTime": "2024-05-21T12:47:54.224328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.202.161.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR3x5A3CxFAAtv2Cvg"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "136e44a4-53d7-4afc-9363-8a966728b615", "DetectTime": "2024-05-21T12:47:54.232147+00:00", "EventTime": "2024-05-21T12:47:54.232168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY3V7V2cFHFc0Z4w6b"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "e57a08e4-bce9-420a-b87c-867c33b0ea09", "DetectTime": "2024-05-21T12:47:54.237375+00:00", "EventTime": "2024-05-21T12:47:54.237395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtgTdoyNGL2CE6gQj"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "d66b787b-3d75-4751-8aff-1e723f461d63", "DetectTime": "2024-05-21T12:47:54.293828+00:00", "EventTime": "2024-05-21T12:47:54.293847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C898s42dq5IOg82074"], "accumulated_threat_level": 4.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "449a32db-26be-410b-94eb-b8766aeee50c", "DetectTime": "2024-05-21T12:47:54.305386+00:00", "EventTime": "2024-05-21T12:47:54.305406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CijWE32EIuSwcbkZp6"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "dc0c2454-bb8e-4fce-a178-552869507c0d", "DetectTime": "2024-05-21T12:47:54.517348+00:00", "EventTime": "2024-05-21T12:47:54.517369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYUoM3VCmn1xKvw1c"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "b3511a2c-a1ba-4bb1-aa05-65441ef3eda9", "DetectTime": "2024-05-21T12:47:54.539077+00:00", "EventTime": "2024-05-21T12:47:54.539099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8OuAwURSpICP8r5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "70a3b212-f18c-40da-952e-d0fde09cc364", "DetectTime": "2024-05-21T12:47:54.632408+00:00", "EventTime": "2024-05-21T12:47:54.632437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8prp2u5eyy5hG1Jd"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f57e5738-2bca-4fbd-ab00-5bcb493798c4", "DetectTime": "2024-05-21T12:47:54.850579+00:00", "EventTime": "2024-05-21T12:47:54.850600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu0sHm34ZlohKYpNn5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "bd76fb81-0757-4eff-b5a5-744fe43874c5", "DetectTime": "2024-05-21T12:47:54.898120+00:00", "EventTime": "2024-05-21T12:47:54.898141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI4K11nzkPvlOZgce"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "9dd8b878-fd4f-4a88-845c-19e4e871a59a", "DetectTime": "2024-05-21T12:47:54.903273+00:00", "EventTime": "2024-05-21T12:47:54.903294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct5SBk4XRsGILqXtfb"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "d850f8fd-f666-4a46-88c6-32447337ee1d", "DetectTime": "2024-05-21T12:47:55.293704+00:00", "EventTime": "2024-05-21T12:47:55.293728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZp6614p3HKSDleR82"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "3e501eba-f835-47d6-a1d7-7a8e7d954a59", "DetectTime": "2024-05-21T12:47:55.308759+00:00", "EventTime": "2024-05-21T12:47:55.308786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2lJOwBTWB8U5GnR6"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "cef0e446-59e3-4ed7-b3a3-05e7589b3b54", "DetectTime": "2024-05-21T12:47:55.344218+00:00", "EventTime": "2024-05-21T12:47:55.344239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeAApj3yeKHYqTfqy8"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "eee48689-93d8-439c-ab5e-ef024bde7f02", "DetectTime": "2024-05-21T12:47:55.357111+00:00", "EventTime": "2024-05-21T12:47:55.357131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbGXeE3WBM5RtuwF34"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "6ad8b0ba-70dd-4777-95bf-d8aa71494f6e", "DetectTime": "2024-05-21T12:47:55.369546+00:00", "EventTime": "2024-05-21T12:47:55.369569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM1FKE3dR9xpZU0sUa"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "e5323abc-6157-4b18-a1c6-dac4b55ba177", "DetectTime": "2024-05-21T12:47:55.374897+00:00", "EventTime": "2024-05-21T12:47:55.374916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci90c9jUGOaHsMh8c"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "8a6262b1-89b1-4c41-b503-c644426a5f22", "DetectTime": "2024-05-21T12:47:55.496890+00:00", "EventTime": "2024-05-21T12:47:55.496911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFi4wu1VWt61q0OXxj"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "8eed2328-eb65-42bc-b417-9a504b0e5283", "DetectTime": "2024-05-21T12:47:55.852517+00:00", "EventTime": "2024-05-21T12:47:55.852541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxZtvwn0AD0tnlJkh"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f5c0c9cd-5540-4cdd-8bd9-45fc22b61b64", "DetectTime": "2024-05-21T12:47:55.858462+00:00", "EventTime": "2024-05-21T12:47:55.858484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClL01g10cIDtIMJysk"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "bbaf5055-770d-4d39-ac35-ec9358158492", "DetectTime": "2024-05-21T12:47:55.865001+00:00", "EventTime": "2024-05-21T12:47:55.865023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C98x3A5dxKc4SvkS8"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "a72e2cc0-55c7-45cc-8df9-de29051ba0fd", "DetectTime": "2024-05-21T12:47:55.891990+00:00", "EventTime": "2024-05-21T12:47:55.892012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C28EcI3p1F9raq1Ogg"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "06fb7dfe-c458-47a2-9c55-d4282ac01ebf", "DetectTime": "2024-05-21T12:47:56.072388+00:00", "EventTime": "2024-05-21T12:47:56.072411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7nns22rKivL74MUk"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "68ebcf0f-c2f9-4d71-9a03-93c9a1b3a722", "DetectTime": "2024-05-21T12:47:56.077396+00:00", "EventTime": "2024-05-21T12:47:56.077415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHsKqI1yqJtQ88kMG9"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "11ff8587-a2ce-48fa-afb9-ceb7565ebc1b", "DetectTime": "2024-05-21T12:47:56.085274+00:00", "EventTime": "2024-05-21T12:47:56.085294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ICPr4N8wPFsuKBwj"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "3064f915-ba7f-4236-90e0-ceb08914e27e", "DetectTime": "2024-05-21T12:47:56.099189+00:00", "EventTime": "2024-05-21T12:47:56.099211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CByiUJ1UzHwqyppXvj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 155} +{"Format": "IDEA0", "ID": "9568efd1-0b86-4837-83bc-f7dbdcf7c8ec", "DetectTime": "2024-05-21T12:47:56.104293+00:00", "EventTime": "2024-05-21T12:47:56.104312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUPux3oZ7luz291n8"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "2d0eb967-1133-49bc-b514-33a6bd42cea2", "DetectTime": "2024-05-21T12:47:56.194575+00:00", "EventTime": "2024-05-21T12:47:56.194597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBiyIe8z9jp6ZqxKl"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "50f663f2-8ff9-49ce-aac5-e3788d49e625", "DetectTime": "2024-05-21T12:47:56.497262+00:00", "EventTime": "2024-05-21T12:47:56.497284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsCytqqH7mJ4QUhi"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "2d816402-9f01-49d8-bc34-8db8d4106811", "DetectTime": "2024-05-21T12:47:56.639695+00:00", "EventTime": "2024-05-21T12:47:56.639717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPReuT1bAAUovFbF96"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "5f2ab007-e470-44ed-9577-a23a9184b820", "DetectTime": "2024-05-21T12:47:56.683607+00:00", "EventTime": "2024-05-21T12:47:56.683628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPP1Ay1njNZZBdE89j"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "0310e1b5-514e-497b-8e61-e32e933cea47", "DetectTime": "2024-05-21T12:47:56.735534+00:00", "EventTime": "2024-05-21T12:47:56.735557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwHbi52aHPUqh4yIn1"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "35185394-c641-478e-9354-e35d26f42d14", "DetectTime": "2024-05-21T12:47:56.742958+00:00", "EventTime": "2024-05-21T12:47:56.742978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSosc23tu2m7nk3Y63"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "6fca64d6-a7c8-496f-86c7-47bf53b8bc38", "DetectTime": "2024-05-21T12:47:56.755396+00:00", "EventTime": "2024-05-21T12:47:56.755416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKXdw4f1aL6IYgeYe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "bc5b0d4d-54d7-447f-a8c3-9282688bc8a1", "DetectTime": "2024-05-21T12:47:56.761649+00:00", "EventTime": "2024-05-21T12:47:56.761670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYrn9QBgDz9xUQp4"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "97da6e28-4d2e-48d2-9587-ca36e674d735", "DetectTime": "2024-05-21T12:47:56.766396+00:00", "EventTime": "2024-05-21T12:47:56.766426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPx2gi109Z3wn4KUS5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "bbe593c7-605d-4b30-a56e-c2eae03b2ddf", "DetectTime": "2024-05-21T12:47:56.823260+00:00", "EventTime": "2024-05-21T12:47:56.823281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBhLa19LbJzlYO1b5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "90c01c05-8f07-4668-8dc2-e8239e714811", "DetectTime": "2024-05-21T12:47:56.829739+00:00", "EventTime": "2024-05-21T12:47:56.829758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQKvQd3qOQzyH1cnLd"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "db7a89b0-58c3-493a-87c5-ba9e73003303", "DetectTime": "2024-05-21T12:47:57.345023+00:00", "EventTime": "2024-05-21T12:47:57.345044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc10V9DVgJXSFJCad"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "25f9c02d-79af-48d8-88bf-90548e50b494", "DetectTime": "2024-05-21T12:47:57.368262+00:00", "EventTime": "2024-05-21T12:47:57.368282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr3R8FD40YfY4Ohp8"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "28c6aade-9a27-44a6-92fc-aaf94ce0e07f", "DetectTime": "2024-05-21T12:47:57.621513+00:00", "EventTime": "2024-05-21T12:47:57.621532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU1tdm3ZpFE4ou2fL6"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "06a7dbdf-8f25-45bd-afe3-c31faa26b156", "DetectTime": "2024-05-21T12:47:57.627023+00:00", "EventTime": "2024-05-21T12:47:57.627043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg5tSa4AnVwCDzHa5e"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "e364911d-ee43-4e9d-89bb-cbdf585eb0fa", "DetectTime": "2024-05-21T12:47:57.631486+00:00", "EventTime": "2024-05-21T12:47:57.631503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.13.164.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9M1CV1pqW8nvKmvh6"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "408c3313-ac18-4c6a-a157-9b7dff70e66f", "DetectTime": "2024-05-21T12:47:57.635933+00:00", "EventTime": "2024-05-21T12:47:57.635952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUiLp1wnbu9WrDMx4"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "8b146dfa-c2b0-424d-b12f-0b7e4a1e1c09", "DetectTime": "2024-05-21T12:47:57.640492+00:00", "EventTime": "2024-05-21T12:47:57.640509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZTMd3DjvYNvCmFQc"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f93477f2-0a26-4869-a321-2efe52f2472d", "DetectTime": "2024-05-21T12:47:57.652664+00:00", "EventTime": "2024-05-21T12:47:57.652686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCAbKw12nV5kCyLgI8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "25852798-083d-4dc9-81c0-0b4b00fefa55", "DetectTime": "2024-05-21T12:47:57.668813+00:00", "EventTime": "2024-05-21T12:47:57.668835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5bPZ26Q5LSqVb6id"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "d088e07f-4daf-40f5-8e45-fc048333f3ed", "DetectTime": "2024-05-21T12:47:57.676215+00:00", "EventTime": "2024-05-21T12:47:57.676235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMY8yn3jUoMNWwm6ia"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "5a9e2661-df29-4b5b-a90b-c3973adcd1c8", "DetectTime": "2024-05-21T12:47:58.182441+00:00", "EventTime": "2024-05-21T12:47:58.182462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCBgDr4x54CJ16BBcf"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "1115b5d3-fb2c-4e9c-b68d-4248397e1801", "DetectTime": "2024-05-21T12:47:58.226527+00:00", "EventTime": "2024-05-21T12:47:58.226549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBZ862wmplc4iMVHf"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "9a19f539-b12a-407f-bc34-0c5202216684", "DetectTime": "2024-05-21T12:47:58.246008+00:00", "EventTime": "2024-05-21T12:47:58.246026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHqCf2vhq5XLZeKI5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "0261bf53-fdc5-4acd-a662-d2cfe068cb00", "DetectTime": "2024-05-21T12:47:58.272776+00:00", "EventTime": "2024-05-21T12:47:58.272797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMAsRK3mKzcJkiswBh"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "5774b0fa-70a0-4b95-a1c0-7f08d1b4e3fc", "DetectTime": "2024-05-21T12:47:58.310471+00:00", "EventTime": "2024-05-21T12:47:58.310493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.202.161.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8R6jo13hVAaXQIQK5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "d48bcb61-4cac-4da6-8efb-b20e415fa794", "DetectTime": "2024-05-21T12:47:58.339499+00:00", "EventTime": "2024-05-21T12:47:58.339521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzJhCM4nriGRIK969"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "9563eb9b-238e-4692-b33b-8a8eedb5fd52", "DetectTime": "2024-05-21T12:47:58.423011+00:00", "EventTime": "2024-05-21T12:47:58.423035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfU47giuxQJWsL61g"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "80d7b8e0-0a15-407d-9736-14c18bde2e69", "DetectTime": "2024-05-21T12:47:58.448516+00:00", "EventTime": "2024-05-21T12:47:58.448538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEaAmt1sTHzRiSORqh"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f84797bc-27ae-4783-9886-b1d5821e3509", "DetectTime": "2024-05-21T12:47:58.454240+00:00", "EventTime": "2024-05-21T12:47:58.454264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9omz3WwyGnA9eWp5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f75f33eb-ed57-49a3-8d46-4cd86e94dab7", "DetectTime": "2024-05-21T12:47:58.466781+00:00", "EventTime": "2024-05-21T12:47:58.466801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1exKM1mVOseO80op8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 155} +{"Format": "IDEA0", "ID": "e789cb80-b59f-4f63-93b7-326e350fa222", "DetectTime": "2024-05-21T12:47:58.820060+00:00", "EventTime": "2024-05-21T12:47:58.820084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co1QL83pIptYHDAn3"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "8ac24773-945d-4912-b7d4-668eb7e067e6", "DetectTime": "2024-05-21T12:47:58.948272+00:00", "EventTime": "2024-05-21T12:47:58.948298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoKuZ3Uc4dXXSEqG4"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "a0d59b0a-028c-43ab-b626-a5c291242ad4", "DetectTime": "2024-05-21T12:47:58.965795+00:00", "EventTime": "2024-05-21T12:47:58.965827+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpVtd012ElM0POist9"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "f574cb67-78f5-458c-a8aa-3fb8d0235bc5", "DetectTime": "2024-05-21T12:47:59.316957+00:00", "EventTime": "2024-05-21T12:47:59.316980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce8AvW38EyK9Ibvwsd"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "2b7204e2-d351-40a7-b7c7-1a6500073b7b", "DetectTime": "2024-05-21T12:47:59.388690+00:00", "EventTime": "2024-05-21T12:47:59.388712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YvxF1vOkjXzrlXzh"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "52611974-976c-401a-b8fc-c59dcf471c02", "DetectTime": "2024-05-21T12:47:59.451258+00:00", "EventTime": "2024-05-21T12:47:59.451280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJocA5WZVfVxj9X9"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "b5969bf3-4386-4c7e-a4e7-81e4cdca1f27", "DetectTime": "2024-05-21T12:47:59.470582+00:00", "EventTime": "2024-05-21T12:47:59.470605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTBKRhs1XkUwyGKIj"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "965c7827-cb5b-487c-b6cf-01a4798053b2", "DetectTime": "2024-05-21T12:47:59.503076+00:00", "EventTime": "2024-05-21T12:47:59.503100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjfsQ311SHUnKY8I1"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "fed8293b-004a-44eb-b99c-eecc7d0d7fb0", "DetectTime": "2024-05-21T12:47:59.569900+00:00", "EventTime": "2024-05-21T12:47:59.569919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZ1NJ0swqFa7PCu3"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "3870c89e-0729-4095-9bff-d04f1f509f58", "DetectTime": "2024-05-21T12:47:59.583011+00:00", "EventTime": "2024-05-21T12:47:59.583032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEG4ssLLwx2FcJ2c5"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "922b504a-586d-4922-8362-ab2fa553c167", "DetectTime": "2024-05-21T12:47:59.588581+00:00", "EventTime": "2024-05-21T12:47:59.588602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ffHV1cC8YnxU5mDe"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "3825f451-4074-440b-97c1-1c0a67a4d745", "DetectTime": "2024-05-21T12:47:59.624569+00:00", "EventTime": "2024-05-21T12:47:59.624593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChLxch2ChXskEm77B9"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "48d9ac99-bb8d-45e2-b77e-0ea4ff293555", "DetectTime": "2024-05-21T12:47:59.639859+00:00", "EventTime": "2024-05-21T12:47:59.639881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxU2A2KRZaHxXpjqc"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "cbffa7e7-63fb-4b98-b3ca-997c86b70e3e", "DetectTime": "2024-05-21T12:47:59.671946+00:00", "EventTime": "2024-05-21T12:47:59.671970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C59vyz3RBPwYdLG2Gf"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "b7b87707-fe35-492f-8ff5-22a08f9d79b6", "DetectTime": "2024-05-21T12:47:59.933080+00:00", "EventTime": "2024-05-21T12:47:59.933102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjhok2jiFeEFfAeZk"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "ad6138f9-2851-40fd-ad4e-e1252b0c6a69", "DetectTime": "2024-05-21T12:48:00.008479+00:00", "EventTime": "2024-05-21T12:48:00.008500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJBA043JpCjFDjbco9"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "02782813-1d41-4127-a25e-8cdc62307a8b", "DetectTime": "2024-05-21T12:48:00.471114+00:00", "EventTime": "2024-05-21T12:48:00.471135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1m704ftxci1aS6u9"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "21297d06-2440-4362-ad64-9c0d181b0727", "DetectTime": "2024-05-21T12:48:00.587977+00:00", "EventTime": "2024-05-21T12:48:00.587998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjOms7tbHYbBRvg"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "213c9fac-96d1-416e-9858-f9d1f2006715", "DetectTime": "2024-05-21T12:48:00.652150+00:00", "EventTime": "2024-05-21T12:48:00.652176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX2Dd7j9qg7w7ZLGc"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "3c35855b-9194-45f0-91c7-97ef6bd948b3", "DetectTime": "2024-05-21T12:48:00.659949+00:00", "EventTime": "2024-05-21T12:48:00.659968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CocEKO1wOixoDSvCuj"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "3e9ac45e-7725-46dc-8b90-e61dd55803c6", "DetectTime": "2024-05-21T12:48:00.708592+00:00", "EventTime": "2024-05-21T12:48:00.708614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 5.202.161.209 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyBXh1u0bBm3WnDL5"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "54e68393-6ec2-437f-8868-f48a85003546", "DetectTime": "2024-05-21T12:48:00.714208+00:00", "EventTime": "2024-05-21T12:48:00.714230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 172.13.164.195 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1vHTL2ZLZoK3VbUI9"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "b75a185d-4a59-492b-a8f8-cf5c82d6413e", "DetectTime": "2024-05-21T12:48:00.722088+00:00", "EventTime": "2024-05-21T12:48:00.722111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB1PQI1MJjjm7Wm9kh"], "accumulated_threat_level": 9.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "0ebfd761-359e-4d6c-a1ae-198e6c58c6e2", "DetectTime": "2024-05-21T12:48:00.773503+00:00", "EventTime": "2024-05-21T12:48:00.773524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFAcd1q0Ep7uw2vZf"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "838273c5-7939-4ef1-9177-9688cbb2db5d", "DetectTime": "2024-05-21T12:48:00.779248+00:00", "EventTime": "2024-05-21T12:48:00.779267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf0NLS3ZeAprNtdSsc"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "e7cf289f-ac34-420e-93b1-9b646b817594", "DetectTime": "2024-05-21T12:48:00.784775+00:00", "EventTime": "2024-05-21T12:48:00.784798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTDiq1KcDtjPUYSqk"], "accumulated_threat_level": 9.6, "timewindow": 154} +{"Format": "IDEA0", "ID": "8c60d570-3276-4d48-9e1d-328213d18d5d", "DetectTime": "2024-05-21T12:48:00.790119+00:00", "EventTime": "2024-05-21T12:48:00.790140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 107.214.174.97 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0qbnl4lENC1Gx6pr1"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "fffb2ff4-8dbe-439f-9f3c-728949a82b2c", "DetectTime": "2024-05-21T12:48:00.794742+00:00", "EventTime": "2024-05-21T12:48:00.794760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoLh0F2HKNEyqX6nw5"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "5697f520-32bf-4d87-93d7-6a2b86d81e18", "DetectTime": "2024-05-21T12:48:00.799262+00:00", "EventTime": "2024-05-21T12:48:00.799280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6WjgR1fcwcLNE30H2"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "c4d2451f-ed8e-40dd-ba5b-61034a4c6f7b", "DetectTime": "2024-05-21T12:48:00.803827+00:00", "EventTime": "2024-05-21T12:48:00.803845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ75yKXPyOtAkXPXb"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "780821f0-b717-4d95-9710-9780b6412e75", "DetectTime": "2024-05-21T12:48:01.091411+00:00", "EventTime": "2024-05-21T12:48:01.091434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNxP8s4dE6tsN91d9f"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "e5c4124a-ca17-4c79-9c0b-9bd76f755fed", "DetectTime": "2024-05-21T12:48:01.201264+00:00", "EventTime": "2024-05-21T12:48:01.201286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwfnVB3vxTSQqQUQeg"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "d2f9412b-1ae6-439a-a362-b16a5b65bbe3", "DetectTime": "2024-05-21T12:48:01.252312+00:00", "EventTime": "2024-05-21T12:48:01.252335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1pqy4Mg4SsVj8NCg"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "42316078-060a-41dc-b6e7-dd3245f285da", "DetectTime": "2024-05-21T12:48:01.256931+00:00", "EventTime": "2024-05-21T12:48:01.256949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UtEMrfxOrQixKgi"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "6a068844-2a1c-4bbf-b651-18b1373b7519", "DetectTime": "2024-05-21T12:48:01.813273+00:00", "EventTime": "2024-05-21T12:48:01.813294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ESar4GLndlr9ziO4"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "7683bb6d-ed44-4061-904a-d76073bbe477", "DetectTime": "2024-05-21T12:48:01.921503+00:00", "EventTime": "2024-05-21T12:48:01.921525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaAm1l2uB42CVXE8h"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "f7df1f5d-5eb2-43aa-b719-5bc127f39874", "DetectTime": "2024-05-21T12:48:01.926453+00:00", "EventTime": "2024-05-21T12:48:01.926473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C75K5C3djsBnfDjqde"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "16aef51a-b6fc-457d-8fc3-295e52277dac", "DetectTime": "2024-05-21T12:48:02.183912+00:00", "EventTime": "2024-05-21T12:48:02.183935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr4JSlKfvlqX2cVb"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "6f375922-2f91-4e31-94db-ff5676a035a1", "DetectTime": "2024-05-21T12:48:02.217261+00:00", "EventTime": "2024-05-21T12:48:02.217284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqCB7ZtfKg5mlaMa"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "5ae2775a-22d1-48b8-92ad-ce2b26f64f79", "DetectTime": "2024-05-21T12:48:02.223083+00:00", "EventTime": "2024-05-21T12:48:02.223103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iRB842BjtaEPgILl"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "affdfe96-c627-4d73-af06-2d7a4d7fb6d7", "DetectTime": "2024-05-21T12:48:02.227813+00:00", "EventTime": "2024-05-21T12:48:02.227836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheeUa3J1ORC0f6no1"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "bbc0f886-5ea6-4444-a381-0cc4192df1c5", "DetectTime": "2024-05-21T12:48:02.251020+00:00", "EventTime": "2024-05-21T12:48:02.251049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRYma2JGmpHB3wd99"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "3c2743ef-94b6-4106-a825-f7668a957505", "DetectTime": "2024-05-21T12:48:02.257046+00:00", "EventTime": "2024-05-21T12:48:02.257068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4zFqY2Jd8WximoVSb"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "b2383692-19e7-4a4a-904c-6086ce7e7bd7", "DetectTime": "2024-05-21T12:48:02.294459+00:00", "EventTime": "2024-05-21T12:48:02.294483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJSI0l4bn7cPIY0jTb"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "a8cebd7b-b27c-46d5-8d5b-41048ad9a610", "DetectTime": "2024-05-21T12:48:02.299893+00:00", "EventTime": "2024-05-21T12:48:02.299912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41T4n3p360liyovbc"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "833bfe36-47e9-4d6e-a7cb-08c757b7ed53", "DetectTime": "2024-05-21T12:48:02.305313+00:00", "EventTime": "2024-05-21T12:48:02.305332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qbu9Xq9iIzh2uq9"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "d95cab8e-3646-4a40-aba3-ff2335ef31d4", "DetectTime": "2024-05-21T12:48:02.349376+00:00", "EventTime": "2024-05-21T12:48:02.349398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFk4CjI8cDCWoH061"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "11a56216-25c6-4ef2-bff0-1c05b97e3ae5", "DetectTime": "2024-05-21T12:48:02.848992+00:00", "EventTime": "2024-05-21T12:48:02.849015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmPypd3iAitf1XQYCj"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "4d3d0ead-5105-4d53-b20b-5139e982269a", "DetectTime": "2024-05-21T12:48:02.915524+00:00", "EventTime": "2024-05-21T12:48:02.915547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLcis29HEkz7ZPKVh"], "accumulated_threat_level": 10.4, "timewindow": 155} +{"Format": "IDEA0", "ID": "92f5cc46-d379-479c-980b-d7e1ac75abc4", "DetectTime": "2024-05-21T12:48:03.008905+00:00", "EventTime": "2024-05-21T12:48:03.008929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8cfEr4VuoTMs2aPn"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "70e3e23b-8d96-4897-96b1-b2f127904967", "DetectTime": "2024-05-21T12:48:03.135584+00:00", "EventTime": "2024-05-21T12:48:03.135606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmN4Jb2MQn2ti2XBke"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "7830addd-2b74-428f-b180-8bed309c4538", "DetectTime": "2024-05-21T12:48:03.266594+00:00", "EventTime": "2024-05-21T12:48:03.266615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhKNb6em9lxKdvbk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "1ae88109-7c0f-41dd-9481-a0c8b5a8dd81", "DetectTime": "2024-05-21T12:48:03.271816+00:00", "EventTime": "2024-05-21T12:48:03.271837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHHNg4MVepo3cJXsd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "3ea4619d-6d09-43ce-8312-9167fbe61d14", "DetectTime": "2024-05-21T12:48:03.276603+00:00", "EventTime": "2024-05-21T12:48:03.276622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfinYF1vExpAnBuC6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "5448ddc3-711d-48c8-bc53-3d6129c80337", "DetectTime": "2024-05-21T12:48:03.562668+00:00", "EventTime": "2024-05-21T12:48:03.562691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz9Hzp2mZYIDRESO1h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "fe1822d4-eec5-4178-8143-2b7a329ac0b6", "DetectTime": "2024-05-21T12:48:03.585547+00:00", "EventTime": "2024-05-21T12:48:03.585568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoJee1rORaxUedCb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "90a57ada-6b6b-4627-88e7-697132765ac1", "DetectTime": "2024-05-21T12:48:03.611663+00:00", "EventTime": "2024-05-21T12:48:03.611684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsaRE3oZchhWjiOk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "ea5a66a9-e24d-4e5c-91b3-af2bb31be168", "DetectTime": "2024-05-21T12:48:03.616990+00:00", "EventTime": "2024-05-21T12:48:03.617008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31NJ62MZlXtAD4jC1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "14f06606-4067-47da-833d-72e30f37f279", "DetectTime": "2024-05-21T12:48:03.637356+00:00", "EventTime": "2024-05-21T12:48:03.637379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRX66dmvzoKLK2HI2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "b4d1c495-732b-498a-bcc4-151a3e405e51", "DetectTime": "2024-05-21T12:48:03.669187+00:00", "EventTime": "2024-05-21T12:48:03.669208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyTJZ11W9cTmjTd0i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "8e0471a1-9b90-4f87-a86a-119777d81a88", "DetectTime": "2024-05-21T12:48:03.710225+00:00", "EventTime": "2024-05-21T12:48:03.710245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfq2yR2B9ePkC2yEC6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "e38097ea-2540-460b-b6e8-d3e2143d3379", "DetectTime": "2024-05-21T12:48:03.734636+00:00", "EventTime": "2024-05-21T12:48:03.734660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRgy3f3rOL4Ga7gFz3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "4ed2109c-f7f8-4bfb-9bd4-6a6b7e4cf595", "DetectTime": "2024-05-21T12:48:03.739505+00:00", "EventTime": "2024-05-21T12:48:03.739525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmuCr82jvtFLmOISJc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "ceff7150-27a5-4e33-b026-572ca90900b6", "DetectTime": "2024-05-21T12:48:03.770596+00:00", "EventTime": "2024-05-21T12:48:03.770620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVC9G02uR8KsyBZfQ5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "3a6ae22a-ad54-4fd3-b420-4a162ac6cf59", "DetectTime": "2024-05-21T12:48:03.776284+00:00", "EventTime": "2024-05-21T12:48:03.776305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWfhs3xBvcniF9bOl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "282394cb-94ad-44d5-9084-d006c38a750e", "DetectTime": "2024-05-21T12:48:04.616763+00:00", "EventTime": "2024-05-21T12:48:04.616787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOvAF4jWY2qFPKA3b"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "9f5dc7b1-64eb-4c81-9f75-8e68baebf566", "DetectTime": "2024-05-21T12:48:04.698354+00:00", "EventTime": "2024-05-21T12:48:04.698376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtyOF2LGd3sNqiRjl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "714f8289-4d29-4869-8686-b531d020a466", "DetectTime": "2024-05-21T12:48:04.783128+00:00", "EventTime": "2024-05-21T12:48:04.783161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxmNsx3N9DbTipmjTc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "7969c264-b830-4e1a-bfb5-b7e1c575f226", "DetectTime": "2024-05-21T12:48:04.793415+00:00", "EventTime": "2024-05-21T12:48:04.793436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXrCuN3uNtNmUwBPg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "b9d197fd-901e-4a32-9362-3c0af73966fe", "DetectTime": "2024-05-21T12:48:04.801118+00:00", "EventTime": "2024-05-21T12:48:04.801139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bsM14qrIBjAUy8E3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "10e3cd93-4d90-4b42-abe3-621fb06ac49e", "DetectTime": "2024-05-21T12:48:04.862892+00:00", "EventTime": "2024-05-21T12:48:04.862914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5MHxac7zFaZcj6v3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "285d6c87-d871-485e-8e50-89d3772ac45e", "DetectTime": "2024-05-21T12:48:04.868506+00:00", "EventTime": "2024-05-21T12:48:04.868525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClPdJI3YbTO4j7m6A4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 155} +{"Format": "IDEA0", "ID": "6106b4d6-8611-4722-b1d8-7cc79b33903f", "DetectTime": "2024-05-21T12:48:04.885994+00:00", "EventTime": "2024-05-21T12:48:04.886013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJJWG1bUGF6U6qYd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 155} +{"Format": "Json", "ID": "6106b4d6-8611-4722-b1d8-7cc79b33903f", "DetectTime": "2024-05-21T12:48:04.885994+00:00", "EventTime": "2024-05-21T12:48:04.886013+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-07T10:47:01.255546+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 155. (real time 2024/05/21 12:48:05.283986)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 155, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fce0b1c4-7898-4579-a5e0-676b6c788efb", "DetectTime": "2024-05-21T12:48:05.288854+00:00", "EventTime": "2024-05-21T12:48:05.288877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSuShI1avGuG7a6YS6"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "d89500eb-7100-4583-9057-f7e160f1ccd0", "DetectTime": "2024-05-21T12:48:05.293760+00:00", "EventTime": "2024-05-21T12:48:05.293779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVTZ0m3u2FMTcrepxb"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "d865a9c5-20df-4a75-867a-e3ed7b8defc8", "DetectTime": "2024-05-21T12:48:05.299754+00:00", "EventTime": "2024-05-21T12:48:05.299774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuUpn52l9myMz9t4e6"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "9da7b6a3-93f6-402a-87f3-a0e3f7f74c49", "DetectTime": "2024-05-21T12:48:05.304713+00:00", "EventTime": "2024-05-21T12:48:05.304734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxS6m27HsXkku0Cgd"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "db88e28b-3e82-48d6-836e-b4be0c97a0fd", "DetectTime": "2024-05-21T12:48:05.310475+00:00", "EventTime": "2024-05-21T12:48:05.310494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpNomU24StB3b8YVv3"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "a6964b5e-8781-4f07-b3ba-ae9ff8a6531a", "DetectTime": "2024-05-21T12:48:05.315150+00:00", "EventTime": "2024-05-21T12:48:05.315168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoRW7F49yMCgaoHEuc"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "a4defaf1-ff5e-4587-86c8-02901cce1f25", "DetectTime": "2024-05-21T12:48:05.321129+00:00", "EventTime": "2024-05-21T12:48:05.321147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ6E7s4hfC8CYBP575"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "211805b6-cae2-4499-b931-16e44f64ac59", "DetectTime": "2024-05-21T12:48:05.333900+00:00", "EventTime": "2024-05-21T12:48:05.333921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck9zqc3FrPINeCLG0e"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "47e7e491-ce95-4d61-b013-4d7b38291016", "DetectTime": "2024-05-21T12:48:05.713365+00:00", "EventTime": "2024-05-21T12:48:05.713409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkqMSHrkwo08GqKg7"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "9cb6a918-bbbc-4b8e-a5c0-a335e99219f8", "DetectTime": "2024-05-21T12:48:05.724172+00:00", "EventTime": "2024-05-21T12:48:05.724193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVk93r46WutoLeBYtb"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "f94356c6-aa38-4f7a-970b-f8ebab726b1b", "DetectTime": "2024-05-21T12:48:05.812448+00:00", "EventTime": "2024-05-21T12:48:05.812471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CprlO22V86suUWGDI5"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "7ab7512a-4e67-4f99-a1b4-34fc7755a35c", "DetectTime": "2024-05-21T12:48:05.835446+00:00", "EventTime": "2024-05-21T12:48:05.835471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca7lqU2wUUAPOSS5K5"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "b86b34b8-ccd5-48db-86d4-371cc60c6e1b", "DetectTime": "2024-05-21T12:48:06.209736+00:00", "EventTime": "2024-05-21T12:48:06.209757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1c7xk1QINUjqJVlYe"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "263af06d-c99b-46e3-ab6a-ae81aa3b5c7b", "DetectTime": "2024-05-21T12:48:06.290701+00:00", "EventTime": "2024-05-21T12:48:06.290723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHMDh3J9N56MGqpRb"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "3f47624f-7c28-454d-aba8-6f5c9d71c9c4", "DetectTime": "2024-05-21T12:48:06.327172+00:00", "EventTime": "2024-05-21T12:48:06.327194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qybm2ynxia5BekD2"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "758d6291-ee13-430c-b4f8-a00376c0608f", "DetectTime": "2024-05-21T12:48:06.394772+00:00", "EventTime": "2024-05-21T12:48:06.394800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUz6wv1YK40pjxdoMh"], "accumulated_threat_level": 0, "timewindow": 155} +{"Format": "IDEA0", "ID": "df8c83ff-24e4-472c-956a-5eddf5d9199c", "DetectTime": "2024-05-21T12:48:06.407437+00:00", "EventTime": "2024-05-21T12:48:06.407457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Esnw2w2tT5eQUZ1d"], "accumulated_threat_level": 0.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "87d05ed9-2d0b-4618-a57a-37986a50b61b", "DetectTime": "2024-05-21T12:48:06.708286+00:00", "EventTime": "2024-05-21T12:48:06.708308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKK0RK1NrZ9GLcIkNd"], "accumulated_threat_level": 0.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "9f4f037a-b527-45dd-b79c-da1110300375", "DetectTime": "2024-05-21T12:48:06.754789+00:00", "EventTime": "2024-05-21T12:48:06.754809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctTZQ2BRdtQG7tONh"], "accumulated_threat_level": 1.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "d795c380-65c5-4692-9f03-022e8c590885", "DetectTime": "2024-05-21T12:48:06.804843+00:00", "EventTime": "2024-05-21T12:48:06.804863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CozJXb4OLedzonvMVd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 155} +{"Format": "IDEA0", "ID": "2c27a207-1991-4d82-adfd-4743c5eca3ff", "DetectTime": "2024-05-21T12:48:06.855809+00:00", "EventTime": "2024-05-21T12:48:06.855830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEs8u3az11N7XhnRb"], "accumulated_threat_level": 3.2, "timewindow": 155} +{"Format": "IDEA0", "ID": "1b523179-a818-41d6-bcd2-70095a9737df", "DetectTime": "2024-05-21T12:48:06.911606+00:00", "EventTime": "2024-05-21T12:48:06.911628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvnPVg4cX94dgnhLxd"], "accumulated_threat_level": 4.0, "timewindow": 155} +{"Format": "IDEA0", "ID": "bbfc0798-02c5-4b86-898e-adf46dd6dc0e", "DetectTime": "2024-05-21T12:48:06.967522+00:00", "EventTime": "2024-05-21T12:48:06.967541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOMfI3F1KmU2oC7h"], "accumulated_threat_level": 4.8, "timewindow": 155} +{"Format": "IDEA0", "ID": "17ffc747-56df-41de-970b-83d1d51afdc6", "DetectTime": "2024-05-21T12:48:07.042310+00:00", "EventTime": "2024-05-21T12:48:07.042332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFwEU3Tu8OWqAXL3h"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "770127ea-0084-424c-84ef-7fdbe0e8cfce", "DetectTime": "2024-05-21T12:48:07.387248+00:00", "EventTime": "2024-05-21T12:48:07.387280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgvC4t4ikJAwZXBoW5"], "accumulated_threat_level": 0.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "59b987ad-53d6-4b07-9319-2c390bcf59dd", "DetectTime": "2024-05-21T12:48:07.423235+00:00", "EventTime": "2024-05-21T12:48:07.423257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXxAJ23m5hD9jSEvh"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "98ca64ab-390a-4dd6-8aa1-d18444a00356", "DetectTime": "2024-05-21T12:48:07.471680+00:00", "EventTime": "2024-05-21T12:48:07.471707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7e353eYKomfFcuz6"], "accumulated_threat_level": 1.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "e742070b-1add-4e09-9ed8-fb7b930b98a5", "DetectTime": "2024-05-21T12:48:07.535053+00:00", "EventTime": "2024-05-21T12:48:07.535086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGK4ZF1Kl1E6ljv9g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 156} +{"Format": "IDEA0", "ID": "dd6b18fe-00a4-4d04-a246-8a0c549867b0", "DetectTime": "2024-05-21T12:48:07.587116+00:00", "EventTime": "2024-05-21T12:48:07.587153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7AGUA1stcd0K0FBO4"], "accumulated_threat_level": 3.2, "timewindow": 156} +{"Format": "IDEA0", "ID": "f39b7da7-2042-49f8-bf44-b7ebb6412da6", "DetectTime": "2024-05-21T12:48:07.639564+00:00", "EventTime": "2024-05-21T12:48:07.639604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpJ3z4wMEch4NgoEb"], "accumulated_threat_level": 4.0, "timewindow": 156} +{"Format": "IDEA0", "ID": "587b5a44-a6db-4a19-b6f8-334723f02c82", "DetectTime": "2024-05-21T12:48:07.690858+00:00", "EventTime": "2024-05-21T12:48:07.690891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0SqKY1oLRSu8hGQpg"], "accumulated_threat_level": 4.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "14ac3fe2-fd1d-4383-908c-57cff17ce65a", "DetectTime": "2024-05-21T12:48:07.742006+00:00", "EventTime": "2024-05-21T12:48:07.742027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Conjo73tb3n17b5Rja"], "accumulated_threat_level": 5.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "c31b8f4a-689d-4f64-80d7-859dd34d49d3", "DetectTime": "2024-05-21T12:48:08.004163+00:00", "EventTime": "2024-05-21T12:48:08.004181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSIXK7yIAO8tN0H7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "aeb6a66a-319b-4550-ad40-93ce8467b741", "DetectTime": "2024-05-21T12:48:08.053349+00:00", "EventTime": "2024-05-21T12:48:08.053368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzuMM1hprfH4v1bal"], "accumulated_threat_level": 7.199999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "579b3325-49e0-4f2a-abb3-2a3f26636715", "DetectTime": "2024-05-21T12:48:08.102946+00:00", "EventTime": "2024-05-21T12:48:08.102964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjm0Y34mDX790IBjlg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "a897bf27-49b0-4ba5-996e-30ef81c17710", "DetectTime": "2024-05-21T12:48:08.156143+00:00", "EventTime": "2024-05-21T12:48:08.156164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZlWq4fTJaIeibwSl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "cf08c2b8-9e67-4d58-b946-6c4b97cea7cb", "DetectTime": "2024-05-21T12:48:08.201824+00:00", "EventTime": "2024-05-21T12:48:08.201842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C15snt4BzJDjfxphH2"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "5faf948d-e891-4789-9e63-975c22f5894f", "DetectTime": "2024-05-21T12:48:08.249317+00:00", "EventTime": "2024-05-21T12:48:08.249335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9EG82xnjlPTHc26a"], "accumulated_threat_level": 9.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "2c58a25b-0cbe-447f-bde8-c1fa84505ff1", "DetectTime": "2024-05-21T12:48:08.295258+00:00", "EventTime": "2024-05-21T12:48:08.295278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNULR1guwf0twmHG2"], "accumulated_threat_level": 10.4, "timewindow": 156} +{"Format": "IDEA0", "ID": "45000df2-8625-4cf0-bfdd-e1a6c307a379", "DetectTime": "2024-05-21T12:48:08.350468+00:00", "EventTime": "2024-05-21T12:48:08.350490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEuBZg3MveesPvvR4d", "CjvV3h1bqf6bIUdngh", "Cdflyh2W2HVBsqCjz8", "CYeId04GzJIKbWbG5b"], "accumulated_threat_level": 0.5, "timewindow": 163} +{"Format": "IDEA0", "ID": "c9349858-dd47-4d3f-a3dc-ddd60bf085bf", "DetectTime": "2024-05-21T12:48:08.516750+00:00", "EventTime": "2024-05-21T12:48:08.516785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["31.192.63.18"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTlpbe4A0zRd183Arh"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "8505967c-3795-4ef5-b440-2f15f863a52c", "DetectTime": "2024-05-21T12:48:08.531225+00:00", "EventTime": "2024-05-21T12:48:08.531261+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["31.192.63.18"]}], "Attach": [{"Content": "connection to blacklisted IP: 31.192.63.18 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTlpbe4A0zRd183Arh"], "accumulated_threat_level": 1.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "1c6b356d-adbf-4a26-b251-a20b6f2cfb27", "DetectTime": "2024-05-21T12:48:08.677742+00:00", "EventTime": "2024-05-21T12:48:08.677777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDagzi4hEa6lwULQAl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 156} +{"Format": "IDEA0", "ID": "9e5cf6a3-81e3-4de1-9479-dd93d4e5945c", "DetectTime": "2024-05-21T12:48:08.721617+00:00", "EventTime": "2024-05-21T12:48:08.721645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaG4zb3gB1YELi3IF7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 156} +{"Format": "Json", "ID": "9e5cf6a3-81e3-4de1-9479-dd93d4e5945c", "DetectTime": "2024-05-21T12:48:08.721617+00:00", "EventTime": "2024-05-21T12:48:08.721645+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-07T11:17:54.582473+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2024/05/21 12:48:08.882606)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 156, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b2c8ee1d-7b79-46a2-8229-48aa29de12f3", "DetectTime": "2024-05-21T12:48:08.893711+00:00", "EventTime": "2024-05-21T12:48:08.893729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcuV3QGOC6HHngR6"], "accumulated_threat_level": 0.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "fc04773a-ba6b-47c0-af51-caacd66866a7", "DetectTime": "2024-05-21T12:48:08.898234+00:00", "EventTime": "2024-05-21T12:48:08.898251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chkqrw1d0SVzvyfHrk"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "b133866f-b919-442d-a60b-874de02ca8af", "DetectTime": "2024-05-21T12:48:08.908226+00:00", "EventTime": "2024-05-21T12:48:08.908244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD4pXD3BbRtNuk09zf"], "accumulated_threat_level": 1.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "bff270de-c684-4076-b057-4a82f61b6bfa", "DetectTime": "2024-05-21T12:48:08.919586+00:00", "EventTime": "2024-05-21T12:48:08.919604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMXBB2T9qr2VNAsn4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 156} +{"Format": "IDEA0", "ID": "ba57dbe1-938f-48d5-b360-6db1f814caf7", "DetectTime": "2024-05-21T12:48:08.948581+00:00", "EventTime": "2024-05-21T12:48:08.948600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJoeW3akIqmfoOJ02"], "accumulated_threat_level": 3.2, "timewindow": 156} +{"Format": "IDEA0", "ID": "1ecac14e-588b-4cb7-9275-e97f4064b21e", "DetectTime": "2024-05-21T12:48:09.220509+00:00", "EventTime": "2024-05-21T12:48:09.220526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrISSg1TYkcSgouxOg"], "accumulated_threat_level": 4.0, "timewindow": 156} +{"Format": "IDEA0", "ID": "71827fa1-a679-4ebf-9a0b-ead8f66b7622", "DetectTime": "2024-05-21T12:48:09.285263+00:00", "EventTime": "2024-05-21T12:48:09.285285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnrysx3rWecgy3OUch"], "accumulated_threat_level": 4.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "78d8e657-bebe-4ec4-b4e2-ef5404bac739", "DetectTime": "2024-05-21T12:48:09.326762+00:00", "EventTime": "2024-05-21T12:48:09.326798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkEoR3mKIvf4TPDHa"], "accumulated_threat_level": 5.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "60b48b21-05b8-47f7-b5f4-d504a3de95ff", "DetectTime": "2024-05-21T12:48:09.383914+00:00", "EventTime": "2024-05-21T12:48:09.383952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cza3g74l8mv9rESB38"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "a98e95f6-56dd-40c2-89fb-1241bf9847bd", "DetectTime": "2024-05-21T12:48:09.426669+00:00", "EventTime": "2024-05-21T12:48:09.426707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyEt72Ep1NCR6EOb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "8f48d1d9-0536-4af3-a750-d25f3982a20c", "DetectTime": "2024-05-21T12:48:09.479848+00:00", "EventTime": "2024-05-21T12:48:09.479884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASIAY8zQp4O8NjEh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "746cc14f-04fe-4eda-ab77-5c33304423d7", "DetectTime": "2024-05-21T12:48:09.531563+00:00", "EventTime": "2024-05-21T12:48:09.531591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CByFjl3a4j0RzHEkr5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "9f386ad0-3901-4987-8ed2-fbfd4f955d5c", "DetectTime": "2024-05-21T12:48:09.581160+00:00", "EventTime": "2024-05-21T12:48:09.581196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Z7hBt8p2EDY7Lb1"], "accumulated_threat_level": 9.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "211ef68b-9812-439f-a74e-beec9189570c", "DetectTime": "2024-05-21T12:48:09.852904+00:00", "EventTime": "2024-05-21T12:48:09.852926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C898s42dq5IOg82074"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "4b646f99-85ce-4776-95f3-0b84f65ac03f", "DetectTime": "2024-05-21T12:48:09.898651+00:00", "EventTime": "2024-05-21T12:48:09.898670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbUddsGU1JfZZN3c6"], "accumulated_threat_level": 10.4, "timewindow": 156} +{"Format": "IDEA0", "ID": "b572b885-76aa-4c89-9588-23d162e12d2b", "DetectTime": "2024-05-21T12:48:09.950143+00:00", "EventTime": "2024-05-21T12:48:09.950164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ28CC3FEzbw4ceQ4j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 156} +{"Format": "IDEA0", "ID": "51bc0fcf-b8af-4519-aaef-8bbb16305aa4", "DetectTime": "2024-05-21T12:48:09.995859+00:00", "EventTime": "2024-05-21T12:48:09.995880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzcZkq2mP7AOGuQfI4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 156} +{"Format": "Json", "ID": "51bc0fcf-b8af-4519-aaef-8bbb16305aa4", "DetectTime": "2024-05-21T12:48:09.995859+00:00", "EventTime": "2024-05-21T12:48:09.995880+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T11:17:58.691165+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2024/05/21 12:48:10.158299)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 156, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bd1c6dfc-59d8-4ff3-b172-330d1f778651", "DetectTime": "2024-05-21T12:48:10.170375+00:00", "EventTime": "2024-05-21T12:48:10.170417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfE4Xz20WzIfqnet"], "accumulated_threat_level": 0.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "5ac0d26e-6b8d-4004-9366-a6dfa00dcd6c", "DetectTime": "2024-05-21T12:48:10.185079+00:00", "EventTime": "2024-05-21T12:48:10.185111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUb4gn3Dt5kjoizQkd"], "accumulated_threat_level": 1.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "5ed3dbbf-db75-47c6-9451-290880ab6724", "DetectTime": "2024-05-21T12:48:10.364632+00:00", "EventTime": "2024-05-21T12:48:10.364666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl3bsl2ovskdcctx4l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 156} +{"Format": "IDEA0", "ID": "1c4d2f85-91c4-4cc6-879f-2d1cfa9bc141", "DetectTime": "2024-05-21T12:48:10.417774+00:00", "EventTime": "2024-05-21T12:48:10.417810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEo2632jQJ923ht2W2"], "accumulated_threat_level": 3.2, "timewindow": 156} +{"Format": "IDEA0", "ID": "6fed43a4-351c-4341-b527-b72614385a70", "DetectTime": "2024-05-21T12:48:10.465728+00:00", "EventTime": "2024-05-21T12:48:10.465764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjrKMc1I6KAUxo1jHc"], "accumulated_threat_level": 4.0, "timewindow": 156} +{"Format": "IDEA0", "ID": "b244f489-4d7c-46d2-ad09-813a7cffc089", "DetectTime": "2024-05-21T12:48:10.514082+00:00", "EventTime": "2024-05-21T12:48:10.514117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9v5329hOxcW7p6E8"], "accumulated_threat_level": 4.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "894b5935-2a2f-479c-ad83-f516d87ca45c", "DetectTime": "2024-05-21T12:48:10.566712+00:00", "EventTime": "2024-05-21T12:48:10.566743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6npa4VRFz8qAodn4"], "accumulated_threat_level": 5.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "7d86fb9f-c904-4adc-a031-032555e76908", "DetectTime": "2024-05-21T12:48:10.607908+00:00", "EventTime": "2024-05-21T12:48:10.607930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2lJOwBTWB8U5GnR6"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "76623308-5187-4f7d-871d-1ea5b2d01a3e", "DetectTime": "2024-05-21T12:48:10.654510+00:00", "EventTime": "2024-05-21T12:48:10.654545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILduB9ZI5g5yqnAd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "745b6cce-a050-4590-8f0e-e26f11ac26d0", "DetectTime": "2024-05-21T12:48:10.708226+00:00", "EventTime": "2024-05-21T12:48:10.708268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7poYy18lwONCObwpd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "eab3f2f3-3a6a-468d-aa24-a0f9ab11b1e3", "DetectTime": "2024-05-21T12:48:10.989345+00:00", "EventTime": "2024-05-21T12:48:10.989365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CikiMG3VSglG9k4Agf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "e80eafed-8c0a-4541-b801-ab776a83eaaf", "DetectTime": "2024-05-21T12:48:11.051631+00:00", "EventTime": "2024-05-21T12:48:11.051652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0IM41Sze7ZO2r3k6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "b79f3137-ef42-476e-b8c3-db30447d664c", "DetectTime": "2024-05-21T12:48:11.138219+00:00", "EventTime": "2024-05-21T12:48:11.138238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXobI3pmyy3cf9J13"], "accumulated_threat_level": 9.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "032809bf-a763-4cfa-b17b-6ce0144b92d8", "DetectTime": "2024-05-21T12:48:11.187658+00:00", "EventTime": "2024-05-21T12:48:11.187678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COoKs04yZgAYMA3fm7"], "accumulated_threat_level": 10.4, "timewindow": 156} +{"Format": "IDEA0", "ID": "fc03b286-99ab-4587-bfcf-bcee5b245c8e", "DetectTime": "2024-05-21T12:48:11.238796+00:00", "EventTime": "2024-05-21T12:48:11.238815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy2gn2UMOBvq4hUYi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 156} +{"Format": "IDEA0", "ID": "f3fd5475-3f37-46d3-891b-55c4de6e094a", "DetectTime": "2024-05-21T12:48:11.289996+00:00", "EventTime": "2024-05-21T12:48:11.290014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHo3Uv2Tbgr27F0EQb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 156} +{"Format": "Json", "ID": "f3fd5475-3f37-46d3-891b-55c4de6e094a", "DetectTime": "2024-05-21T12:48:11.289996+00:00", "EventTime": "2024-05-21T12:48:11.290014+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-07T11:48:16.714475+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2024/05/21 12:48:11.485987)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 156, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cc15afd9-af45-4b1c-91bb-e815455b1974", "DetectTime": "2024-05-21T12:48:11.498121+00:00", "EventTime": "2024-05-21T12:48:11.498154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgleM2TLXKtJ8GYZ9"], "accumulated_threat_level": 0.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "4063c209-d5b2-4d69-accb-c8f4065e8086", "DetectTime": "2024-05-21T12:48:11.628949+00:00", "EventTime": "2024-05-21T12:48:11.628983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmAdPnyEyGGGnfGJe"], "accumulated_threat_level": 1.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "aa18794f-cb51-471f-89f5-964f06e46140", "DetectTime": "2024-05-21T12:48:11.801874+00:00", "EventTime": "2024-05-21T12:48:11.801898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcJT0H1hROCQ4GRgZ2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 156} +{"Format": "IDEA0", "ID": "6c941213-f089-44da-9d34-79de2e01e279", "DetectTime": "2024-05-21T12:48:11.866672+00:00", "EventTime": "2024-05-21T12:48:11.866693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CByiUJ1UzHwqyppXvj"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "f5b982d5-d818-4841-83a6-0e38f7e88aa7", "DetectTime": "2024-05-21T12:48:11.918545+00:00", "EventTime": "2024-05-21T12:48:11.918570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7pwOPiNqirjIuta"], "accumulated_threat_level": 3.2, "timewindow": 156} +{"Format": "IDEA0", "ID": "2e4c2f60-11f0-4058-8373-d756f606aa8d", "DetectTime": "2024-05-21T12:48:11.968112+00:00", "EventTime": "2024-05-21T12:48:11.968142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhQR02Q4pKZctLkTc"], "accumulated_threat_level": 4.0, "timewindow": 156} +{"Format": "IDEA0", "ID": "a7f38f97-47da-4300-a939-acaef2c361c6", "DetectTime": "2024-05-21T12:48:12.018030+00:00", "EventTime": "2024-05-21T12:48:12.018050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUtOT2qhvYLpOF8r3"], "accumulated_threat_level": 4.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "7fae8891-7193-4f6f-96d0-9cebb3976377", "DetectTime": "2024-05-21T12:48:12.067643+00:00", "EventTime": "2024-05-21T12:48:12.067666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cihd5C2nfDmdCLcdbe"], "accumulated_threat_level": 5.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "62ad1460-254e-411f-839e-c2b4622f3f61", "DetectTime": "2024-05-21T12:48:12.411307+00:00", "EventTime": "2024-05-21T12:48:12.411327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtKXdw4f1aL6IYgeYe"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "e05c1379-50af-4663-be06-34f0bee6cc90", "DetectTime": "2024-05-21T12:48:12.423366+00:00", "EventTime": "2024-05-21T12:48:12.423392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYvKX1EWuYM63aTmc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "896d538d-0163-4224-92ec-18ae9d703af4", "DetectTime": "2024-05-21T12:48:12.499843+00:00", "EventTime": "2024-05-21T12:48:12.499875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTHc6A2Am39WeF2uc8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "9bbe065b-f302-4c88-8306-42ba0d507302", "DetectTime": "2024-05-21T12:48:12.549099+00:00", "EventTime": "2024-05-21T12:48:12.549134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0piS2IeVLj4xwKaj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "1ef929c1-e3ac-4fcd-9400-f885e913720a", "DetectTime": "2024-05-21T12:48:12.603969+00:00", "EventTime": "2024-05-21T12:48:12.603998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnM0tl35g9e84LT7ml"], "accumulated_threat_level": 8.799999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "008fdf3c-db22-44ab-a0b5-3219e11cd08b", "DetectTime": "2024-05-21T12:48:12.650101+00:00", "EventTime": "2024-05-21T12:48:12.650142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cinm6q1WaUy331HZyg"], "accumulated_threat_level": 9.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "c7319c80-51e3-4607-8252-563585f35bb7", "DetectTime": "2024-05-21T12:48:12.698624+00:00", "EventTime": "2024-05-21T12:48:12.698658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHIY9339NsKvmOWG2"], "accumulated_threat_level": 10.4, "timewindow": 156} +{"Format": "IDEA0", "ID": "1685f1bc-09dd-4949-9dd3-824f7ab2f432", "DetectTime": "2024-05-21T12:48:12.748391+00:00", "EventTime": "2024-05-21T12:48:12.748422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CukoAX1TMbNLyHNFzk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 156} +{"Format": "IDEA0", "ID": "fb39f86d-47c0-412c-aea7-85162796c7f5", "DetectTime": "2024-05-21T12:48:13.019942+00:00", "EventTime": "2024-05-21T12:48:13.019965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OPam1MiZ14ucga8l"], "accumulated_threat_level": 12.000000000000002, "timewindow": 156} +{"Format": "Json", "ID": "fb39f86d-47c0-412c-aea7-85162796c7f5", "DetectTime": "2024-05-21T12:48:13.019942+00:00", "EventTime": "2024-05-21T12:48:13.019965+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-07T11:48:20.308308+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2024/05/21 12:48:13.300693)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 156, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "68b61f1c-8f31-454b-8e7b-4e5b8c284a04", "DetectTime": "2024-05-21T12:48:13.312036+00:00", "EventTime": "2024-05-21T12:48:13.312071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1NDs1fekRRTWa1f"], "accumulated_threat_level": 0.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "c41c5abc-59b3-4617-8f27-01feb0b68342", "DetectTime": "2024-05-21T12:48:13.317527+00:00", "EventTime": "2024-05-21T12:48:13.317548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCAbKw12nV5kCyLgI8"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "8524a35e-cb09-4d43-b893-b7092710d380", "DetectTime": "2024-05-21T12:48:13.329158+00:00", "EventTime": "2024-05-21T12:48:13.329184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PfHC4qy6OfgvJOyj"], "accumulated_threat_level": 1.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "ba0fcf4c-8097-4e00-a9e0-b544cd9f4658", "DetectTime": "2024-05-21T12:48:13.347912+00:00", "EventTime": "2024-05-21T12:48:13.347951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NmWryrnZhtZN1we"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 156} +{"Format": "IDEA0", "ID": "a7f232c3-9ece-401c-992d-8335c4a49f11", "DetectTime": "2024-05-21T12:48:13.362895+00:00", "EventTime": "2024-05-21T12:48:13.362920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkuMIH2j2fzYoXDc7g"], "accumulated_threat_level": 3.2, "timewindow": 156} +{"Format": "IDEA0", "ID": "9eca477a-2ba6-4637-a64e-839d822614d3", "DetectTime": "2024-05-21T12:48:13.395640+00:00", "EventTime": "2024-05-21T12:48:13.395675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkQpR3JjyzY9Kzvx4"], "accumulated_threat_level": 4.0, "timewindow": 156} +{"Format": "IDEA0", "ID": "acc7d4cf-d634-40bd-a831-453608c499a3", "DetectTime": "2024-05-21T12:48:13.679156+00:00", "EventTime": "2024-05-21T12:48:13.679199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZh0A4B0MvZWHkap2"], "accumulated_threat_level": 4.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "a795d299-1b0a-4bef-8c66-b6502dd9d828", "DetectTime": "2024-05-21T12:48:13.741522+00:00", "EventTime": "2024-05-21T12:48:13.741557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQio0g4NIw77lDbOia"], "accumulated_threat_level": 5.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "caeda399-798d-4b66-8824-e009befba85e", "DetectTime": "2024-05-21T12:48:13.785098+00:00", "EventTime": "2024-05-21T12:48:13.785135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxL3ZP11pRhRt2TWwe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "bdacd99f-9fa5-47e7-b2a9-397fb6a2f308", "DetectTime": "2024-05-21T12:48:13.838175+00:00", "EventTime": "2024-05-21T12:48:13.838212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwmAf73XKYUJPU5jS9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "51b4a8fd-0d9d-4e9c-bb06-042d86e3b952", "DetectTime": "2024-05-21T12:48:13.889193+00:00", "EventTime": "2024-05-21T12:48:13.889227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7pp6m4ifH0AkPWvvg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "2ee3300e-1281-48fa-bd9a-da286d5988d8", "DetectTime": "2024-05-21T12:48:13.940601+00:00", "EventTime": "2024-05-21T12:48:13.940635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxp9s33WBtq3jY9yB"], "accumulated_threat_level": 8.799999999999999, "timewindow": 156} +{"Format": "IDEA0", "ID": "67077f10-dbc5-45ac-8de1-41aaa719069e", "DetectTime": "2024-05-21T12:48:13.990166+00:00", "EventTime": "2024-05-21T12:48:13.990202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvesjNXfK3E8RpvBj"], "accumulated_threat_level": 9.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "ff46224e-0afe-4315-af41-5eb064b1eae8", "DetectTime": "2024-05-21T12:48:14.270231+00:00", "EventTime": "2024-05-21T12:48:14.270253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjt6Ah2Mo0DJ5Qt204"], "accumulated_threat_level": 10.4, "timewindow": 156} +{"Format": "IDEA0", "ID": "01e4176a-59b8-4509-980c-33958ed5ba81", "DetectTime": "2024-05-21T12:48:14.325727+00:00", "EventTime": "2024-05-21T12:48:14.325746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2hbn3Pd4GHE3XAu3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 156} +{"Format": "IDEA0", "ID": "fc02b04b-c811-41b7-b4ca-b58d141dcd03", "DetectTime": "2024-05-21T12:48:14.360596+00:00", "EventTime": "2024-05-21T12:48:14.360620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1exKM1mVOseO80op8"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "39f4fcfa-0612-4559-af03-5b466fc83afb", "DetectTime": "2024-05-21T12:48:14.407985+00:00", "EventTime": "2024-05-21T12:48:14.408011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4qbc2d1xeFm7Dhtf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 156} +{"Format": "Json", "ID": "39f4fcfa-0612-4559-af03-5b466fc83afb", "DetectTime": "2024-05-21T12:48:14.407985+00:00", "EventTime": "2024-05-21T12:48:14.408011+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-07T11:48:24.213914+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 156. (real time 2024/05/21 12:48:14.653135)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 156, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e2ec92f0-73e6-42a0-a4c6-f48f1449f7aa", "DetectTime": "2024-05-21T12:48:14.665450+00:00", "EventTime": "2024-05-21T12:48:14.665481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7LHWN13EDZ5Yjctc3"], "accumulated_threat_level": 0.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "ada5e7a1-79d8-4e06-96a0-f761b8b2ada3", "DetectTime": "2024-05-21T12:48:14.679089+00:00", "EventTime": "2024-05-21T12:48:14.679124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJEAyIBcv0sou2Ug"], "accumulated_threat_level": 1.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "c1699b78-14ec-45a7-b13b-e16f87c773c2", "DetectTime": "2024-05-21T12:48:14.691047+00:00", "EventTime": "2024-05-21T12:48:14.691076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Zpsz3ghqjRC6yIce"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 156} +{"Format": "IDEA0", "ID": "1833c238-1999-47e3-b4a8-78df8ac9d944", "DetectTime": "2024-05-21T12:48:14.704909+00:00", "EventTime": "2024-05-21T12:48:14.704941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8YOV2Jpdj6O9MF7g"], "accumulated_threat_level": 3.2, "timewindow": 156} +{"Format": "IDEA0", "ID": "b40bfbde-ce0d-4d33-92bc-33c005f0392a", "DetectTime": "2024-05-21T12:48:14.819590+00:00", "EventTime": "2024-05-21T12:48:14.819622+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PAKj3cDN0mzSVoj6"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "16c36887-04b8-4d3c-b394-72e1f6f72fe8", "DetectTime": "2024-05-21T12:48:14.833365+00:00", "EventTime": "2024-05-21T12:48:14.833390+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PAKj3cDN0mzSVoj6"], "accumulated_threat_level": 1.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "4ba213b8-383a-4972-8ad0-2c842d0158b2", "DetectTime": "2024-05-21T12:48:14.888705+00:00", "EventTime": "2024-05-21T12:48:14.888737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzkJO3QcQpUJwk8Wh"], "accumulated_threat_level": 4.0, "timewindow": 156} +{"Format": "IDEA0", "ID": "8e170155-27dd-4729-ae92-0af32c65c632", "DetectTime": "2024-05-21T12:48:14.941333+00:00", "EventTime": "2024-05-21T12:48:14.941371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCgHq2wO6GyGYOFI5"], "accumulated_threat_level": 4.8, "timewindow": 156} +{"Format": "IDEA0", "ID": "123565e4-1dbe-445f-a6d5-0189003cdcca", "DetectTime": "2024-05-21T12:48:14.990514+00:00", "EventTime": "2024-05-21T12:48:14.990548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4lbeF3DAhFrn8NpVc"], "accumulated_threat_level": 5.6, "timewindow": 156} +{"Format": "IDEA0", "ID": "9f19e456-42e4-481b-86de-26e0223d41b3", "DetectTime": "2024-05-21T12:48:15.056170+00:00", "EventTime": "2024-05-21T12:48:15.056206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct8GHs4bi3E31SnDql"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "2291c3aa-4a2a-463b-acb2-fd01d0341455", "DetectTime": "2024-05-21T12:48:15.141103+00:00", "EventTime": "2024-05-21T12:48:15.141132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWDss3hZii3F0TGsk"], "accumulated_threat_level": 0.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "5fdd8b0e-8831-408d-815d-7029073357db", "DetectTime": "2024-05-21T12:48:15.189516+00:00", "EventTime": "2024-05-21T12:48:15.189540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRX18s1VF2lrKzioEe"], "accumulated_threat_level": 1.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "36cf0397-cc45-4cf6-8a39-24f41ee44348", "DetectTime": "2024-05-21T12:48:15.240832+00:00", "EventTime": "2024-05-21T12:48:15.240855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFPg6n3A5zaDcwiIRj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 157} +{"Format": "IDEA0", "ID": "1f4401e9-8eab-4787-a814-1729bc92c353", "DetectTime": "2024-05-21T12:48:15.281721+00:00", "EventTime": "2024-05-21T12:48:15.281740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtH9ok3KaPPwLqKq3c"], "accumulated_threat_level": 3.2, "timewindow": 157} +{"Format": "IDEA0", "ID": "2fb746cb-25ce-4d2e-9912-969dd902c073", "DetectTime": "2024-05-21T12:48:15.551993+00:00", "EventTime": "2024-05-21T12:48:15.552013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CruSwC4bs5B8cixi9d"], "accumulated_threat_level": 4.0, "timewindow": 157} +{"Format": "IDEA0", "ID": "f46b99fa-bed5-4c90-87e8-80b356103396", "DetectTime": "2024-05-21T12:48:15.590730+00:00", "EventTime": "2024-05-21T12:48:15.590752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZ1NJ0swqFa7PCu3"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "8919aa74-f244-4b24-b1d1-55e4b29c0528", "DetectTime": "2024-05-21T12:48:15.634448+00:00", "EventTime": "2024-05-21T12:48:15.634467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZT2h4YgYVjDUIyBb"], "accumulated_threat_level": 4.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "8bb1e911-ab23-4f3a-88f3-2e717ba5c17c", "DetectTime": "2024-05-21T12:48:15.684971+00:00", "EventTime": "2024-05-21T12:48:15.684991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cck7RKZIBLG2OYss2"], "accumulated_threat_level": 5.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "9c4b40c0-367f-4ca6-9c59-7e279808d82d", "DetectTime": "2024-05-21T12:48:15.737572+00:00", "EventTime": "2024-05-21T12:48:15.737590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFeKSm2Pb7XnHfKJz4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "e0a9a924-8961-494c-a031-7f3b4c0b0464", "DetectTime": "2024-05-21T12:48:15.783962+00:00", "EventTime": "2024-05-21T12:48:15.783980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGoFyp1xC990farqw7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "a1183517-e8a4-44b9-be72-1ac58284e5f8", "DetectTime": "2024-05-21T12:48:15.831499+00:00", "EventTime": "2024-05-21T12:48:15.831517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiaIt71lb25pyLwf69"], "accumulated_threat_level": 7.999999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "7715fcf8-a073-44a6-b5a0-de92c093c346", "DetectTime": "2024-05-21T12:48:16.178851+00:00", "EventTime": "2024-05-21T12:48:16.178871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDnQTD2ePBtgjYJ4X2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "ea2ecdd4-b425-4978-9374-45e533855321", "DetectTime": "2024-05-21T12:48:16.229709+00:00", "EventTime": "2024-05-21T12:48:16.229741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFGx3QkHkCj3SLel"], "accumulated_threat_level": 9.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "9f5f23dc-7a7e-45d1-89c4-9a4c5d3588b2", "DetectTime": "2024-05-21T12:48:16.283850+00:00", "EventTime": "2024-05-21T12:48:16.283870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C083Eh4z03VcbIC702"], "accumulated_threat_level": 10.4, "timewindow": 157} +{"Format": "IDEA0", "ID": "6cccf078-12ab-48e7-a221-2a0c2072a877", "DetectTime": "2024-05-21T12:48:16.331836+00:00", "EventTime": "2024-05-21T12:48:16.331853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdXAAQ3jvA8iEUT411"], "accumulated_threat_level": 11.200000000000001, "timewindow": 157} +{"Format": "IDEA0", "ID": "80cd96b4-c915-4622-81d9-953b1e517e23", "DetectTime": "2024-05-21T12:48:16.381843+00:00", "EventTime": "2024-05-21T12:48:16.381862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgzz8IST3Me6OMch"], "accumulated_threat_level": 12.000000000000002, "timewindow": 157} +{"Format": "Json", "ID": "80cd96b4-c915-4622-81d9-953b1e517e23", "DetectTime": "2024-05-21T12:48:16.381843+00:00", "EventTime": "2024-05-21T12:48:16.381862+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-07T12:18:39.243707+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2024/05/21 12:48:16.760233)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 157, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c0105e65-ed11-4640-ab99-01d0463d725a", "DetectTime": "2024-05-21T12:48:16.772466+00:00", "EventTime": "2024-05-21T12:48:16.772485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDL2VmXpQHrHO40L6"], "accumulated_threat_level": 0.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "4a2f22eb-af93-4d2b-a6f1-960958d9e73d", "DetectTime": "2024-05-21T12:48:16.792396+00:00", "EventTime": "2024-05-21T12:48:16.792425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7sK63jH9JFzi9jTe"], "accumulated_threat_level": 1.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "f3636971-c01e-4999-a652-8927bf291ae9", "DetectTime": "2024-05-21T12:48:16.806648+00:00", "EventTime": "2024-05-21T12:48:16.806676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctb58WyXvdoLR7LZi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 157} +{"Format": "IDEA0", "ID": "2ddf5789-70e1-4beb-bd4d-0e0d35720a49", "DetectTime": "2024-05-21T12:48:16.812137+00:00", "EventTime": "2024-05-21T12:48:16.812157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFAcd1q0Ep7uw2vZf"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "8025b2e6-b3d6-46da-b8a0-7b4181aa4b00", "DetectTime": "2024-05-21T12:48:16.883566+00:00", "EventTime": "2024-05-21T12:48:16.883601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsfQK2zCSPfekc4Yg"], "accumulated_threat_level": 3.2, "timewindow": 157} +{"Format": "IDEA0", "ID": "43bbeac9-d05f-447b-a809-f71326be0c80", "DetectTime": "2024-05-21T12:48:16.934742+00:00", "EventTime": "2024-05-21T12:48:16.934771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRUnf3wfucccsMRX3"], "accumulated_threat_level": 4.0, "timewindow": 157} +{"Format": "IDEA0", "ID": "cf215999-6c7f-4ec7-98db-74f1d0c063e4", "DetectTime": "2024-05-21T12:48:16.984106+00:00", "EventTime": "2024-05-21T12:48:16.984135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CufPmD4sDxZLGfhiy1"], "accumulated_threat_level": 4.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "719c7696-a9e1-4d52-b997-b81f6da138a0", "DetectTime": "2024-05-21T12:48:17.036990+00:00", "EventTime": "2024-05-21T12:48:17.037024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChD40I32GEhUPnkgd9"], "accumulated_threat_level": 5.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "7109aba9-52bf-4125-8aed-92ac7b430002", "DetectTime": "2024-05-21T12:48:17.087364+00:00", "EventTime": "2024-05-21T12:48:17.087402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIVie4RGnLeB1Pgvj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "acc2133e-5291-47da-9be3-e86efd201d38", "DetectTime": "2024-05-21T12:48:17.142925+00:00", "EventTime": "2024-05-21T12:48:17.142964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldEiE2QGykVWtj1wj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "67d246f2-1933-4971-9407-3e5dbf3ae66a", "DetectTime": "2024-05-21T12:48:17.419858+00:00", "EventTime": "2024-05-21T12:48:17.419878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKk9k64d8srA0y8ro2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "887d599f-34d6-4f5c-bb33-2fb3d1dd2efd", "DetectTime": "2024-05-21T12:48:17.559567+00:00", "EventTime": "2024-05-21T12:48:17.559590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOWE644qZFNc2rrw9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "03a9bbc4-4112-4f83-8e2d-32a5c92a2c45", "DetectTime": "2024-05-21T12:48:17.581758+00:00", "EventTime": "2024-05-21T12:48:17.581782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiKbuu3f7xpwneqbla"], "accumulated_threat_level": 9.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "a4a2e64d-eb27-4b62-bb16-036cdab59fde", "DetectTime": "2024-05-21T12:48:17.641860+00:00", "EventTime": "2024-05-21T12:48:17.641877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcaksM3gljZqJc1dPi"], "accumulated_threat_level": 10.4, "timewindow": 157} +{"Format": "IDEA0", "ID": "2472f3ae-bcef-49be-b164-e3f54faf8ede", "DetectTime": "2024-05-21T12:48:17.680830+00:00", "EventTime": "2024-05-21T12:48:17.680849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWTlupT2nWu4VCD1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 157} +{"Format": "IDEA0", "ID": "09e4a79c-7367-4962-9b9e-b52bea9f42c4", "DetectTime": "2024-05-21T12:48:17.735415+00:00", "EventTime": "2024-05-21T12:48:17.735435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDW9q24e94jb1iugM8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 157} +{"Format": "Json", "ID": "09e4a79c-7367-4962-9b9e-b52bea9f42c4", "DetectTime": "2024-05-21T12:48:17.735415+00:00", "EventTime": "2024-05-21T12:48:17.735435+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-07T12:18:42.851642+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2024/05/21 12:48:17.957162)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 157, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cb44155c-49d7-414a-85af-f67e8344a286", "DetectTime": "2024-05-21T12:48:18.016772+00:00", "EventTime": "2024-05-21T12:48:18.016790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTFr4g43JaqASxaEQ4"], "accumulated_threat_level": 0.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "41436ce1-d4e9-4d04-ac4a-afba5be64207", "DetectTime": "2024-05-21T12:48:18.067947+00:00", "EventTime": "2024-05-21T12:48:18.067970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsvDf1XnAmcIoynk6"], "accumulated_threat_level": 1.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "556e7b27-4837-4457-9dd2-100f51572290", "DetectTime": "2024-05-21T12:48:18.122508+00:00", "EventTime": "2024-05-21T12:48:18.122525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0h32B2QwkHaBjGAbh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 157} +{"Format": "IDEA0", "ID": "7d64b178-f59c-4ce0-81e0-f20b52866697", "DetectTime": "2024-05-21T12:48:18.165564+00:00", "EventTime": "2024-05-21T12:48:18.165582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ947A3DwQSJEyL8z7"], "accumulated_threat_level": 3.2, "timewindow": 157} +{"Format": "IDEA0", "ID": "99f50e3c-ce85-4d49-b8fe-b0b6738b38f7", "DetectTime": "2024-05-21T12:48:18.210756+00:00", "EventTime": "2024-05-21T12:48:18.210775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUiuLA3ix8ghmi9N0a"], "accumulated_threat_level": 4.0, "timewindow": 157} +{"Format": "IDEA0", "ID": "7f4cd009-f401-46ff-99ee-36328846f840", "DetectTime": "2024-05-21T12:48:18.257254+00:00", "EventTime": "2024-05-21T12:48:18.257277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIECNU3jL2X9pCr1Gg"], "accumulated_threat_level": 4.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "2fb6da46-596d-4470-b7a1-ffd81ec390fd", "DetectTime": "2024-05-21T12:48:18.308369+00:00", "EventTime": "2024-05-21T12:48:18.308400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfM9mhYMc9mXK0N4"], "accumulated_threat_level": 5.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "b79603b2-2acf-4b1b-8d41-b9697ed8c288", "DetectTime": "2024-05-21T12:48:18.356223+00:00", "EventTime": "2024-05-21T12:48:18.356243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuq5Iy2rOIWKTpGX2l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "e4d8a672-eea0-4fe1-b8bc-fb9b7314cc39", "DetectTime": "2024-05-21T12:48:18.626175+00:00", "EventTime": "2024-05-21T12:48:18.626195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzF3sS3uBCXy0HTM7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "7d4fd24b-2b7d-4bd8-b36f-e5468d254d32", "DetectTime": "2024-05-21T12:48:18.679147+00:00", "EventTime": "2024-05-21T12:48:18.679169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kNWy2PkA0viQ6tX3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "b5baa24c-47bc-49b4-a640-7a1030cc7c27", "DetectTime": "2024-05-21T12:48:18.733055+00:00", "EventTime": "2024-05-21T12:48:18.733075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6js3X24GbB5SsgD1l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "0a4aa7ef-8589-41ba-9e89-068ab21adb1e", "DetectTime": "2024-05-21T12:48:18.797849+00:00", "EventTime": "2024-05-21T12:48:18.797868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbmrz4G0cAZS6pJEc"], "accumulated_threat_level": 9.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "6e088de0-065a-4c4b-a54c-ff7b431ee2ab", "DetectTime": "2024-05-21T12:48:18.989259+00:00", "EventTime": "2024-05-21T12:48:18.989279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTZl0O2ei9GPgLhSH3"], "accumulated_threat_level": 10.4, "timewindow": 157} +{"Format": "IDEA0", "ID": "3e3e3481-ea1e-4d7d-a942-3097e5a91465", "DetectTime": "2024-05-21T12:48:19.040306+00:00", "EventTime": "2024-05-21T12:48:19.040324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvUymy4TenLdA0fze"], "accumulated_threat_level": 11.200000000000001, "timewindow": 157} +{"Format": "IDEA0", "ID": "b00e707d-3734-4dcf-8b2e-6941384dff35", "DetectTime": "2024-05-21T12:48:19.092479+00:00", "EventTime": "2024-05-21T12:48:19.092498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwZyr171fjRtrBnUa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 157} +{"Format": "Json", "ID": "b00e707d-3734-4dcf-8b2e-6941384dff35", "DetectTime": "2024-05-21T12:48:19.092479+00:00", "EventTime": "2024-05-21T12:48:19.092498+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "1970-01-07T12:48:56.755616+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2024/05/21 12:48:19.309842)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 157, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6cb858cb-da0c-4263-94fb-ccba76a6956f", "DetectTime": "2024-05-21T12:48:19.362016+00:00", "EventTime": "2024-05-21T12:48:19.362039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8cfEr4VuoTMs2aPn"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "379b0c05-2c07-4ada-8f57-9082a7e2f2e1", "DetectTime": "2024-05-21T12:48:19.404984+00:00", "EventTime": "2024-05-21T12:48:19.405005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwbB61p7xsegGsnDh"], "accumulated_threat_level": 0.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "4dab552d-d375-4755-a63b-16abd0fef4ea", "DetectTime": "2024-05-21T12:48:19.454205+00:00", "EventTime": "2024-05-21T12:48:19.454223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrE0Tu4wa7GfhtkW3h"], "accumulated_threat_level": 1.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "a9889cb1-e192-4578-aca6-a03424f8d88e", "DetectTime": "2024-05-21T12:48:19.502827+00:00", "EventTime": "2024-05-21T12:48:19.502853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJdTcl4BbUCgu5A5He"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 157} +{"Format": "IDEA0", "ID": "c3684a8f-8116-4d01-965d-aa360438a318", "DetectTime": "2024-05-21T12:48:19.555340+00:00", "EventTime": "2024-05-21T12:48:19.555360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeCsj4RanyxOaNTlk"], "accumulated_threat_level": 3.2, "timewindow": 157} +{"Format": "IDEA0", "ID": "52395cc9-2708-411e-9e1e-3d938405a3ad", "DetectTime": "2024-05-21T12:48:19.607359+00:00", "EventTime": "2024-05-21T12:48:19.607381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnL8tE1iNnMI8cbgNh"], "accumulated_threat_level": 4.0, "timewindow": 157} +{"Format": "IDEA0", "ID": "19c77ea2-9e50-4673-bddc-14785361e894", "DetectTime": "2024-05-21T12:48:19.671211+00:00", "EventTime": "2024-05-21T12:48:19.671231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl2stw1hSKNddUcpWh"], "accumulated_threat_level": 4.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "a9b5f377-0146-4ac7-a61a-9b0075f13904", "DetectTime": "2024-05-21T12:48:19.722145+00:00", "EventTime": "2024-05-21T12:48:19.722164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOam5GRi57d3yhU6"], "accumulated_threat_level": 5.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "048a7e89-bd93-413c-89d0-a03fb6213a31", "DetectTime": "2024-05-21T12:48:19.976226+00:00", "EventTime": "2024-05-21T12:48:19.976246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNn1e1O8ybgVpK4ye"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "bee13ac1-3266-4a0c-bcf7-b774a719ff7d", "DetectTime": "2024-05-21T12:48:20.026337+00:00", "EventTime": "2024-05-21T12:48:20.026357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZwd8k4yOIe1rPBVqj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "14abcaca-48e9-4f72-acf1-06de1e2bce49", "DetectTime": "2024-05-21T12:48:20.079841+00:00", "EventTime": "2024-05-21T12:48:20.079859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsAVo1TE3YSC0lR4a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "7ed8e564-8f9b-44af-8cbf-259c441b66a5", "DetectTime": "2024-05-21T12:48:20.125557+00:00", "EventTime": "2024-05-21T12:48:20.125578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd9jDrJAtiMv2DrI1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "e25acf2d-d001-4eef-bf9a-513d82de1ff3", "DetectTime": "2024-05-21T12:48:20.174884+00:00", "EventTime": "2024-05-21T12:48:20.174905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzboJ81TPzRYu9PSIk"], "accumulated_threat_level": 9.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "af9c716c-cdcb-4356-8760-a05a6a9b9c9a", "DetectTime": "2024-05-21T12:48:20.249711+00:00", "EventTime": "2024-05-21T12:48:20.249750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmQr341PHLjtXsYBf"], "accumulated_threat_level": 10.4, "timewindow": 157} +{"Format": "IDEA0", "ID": "fa5b3c42-66f7-418b-aee9-44e4f71dadf0", "DetectTime": "2024-05-21T12:48:20.272555+00:00", "EventTime": "2024-05-21T12:48:20.272578+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMmMzV1XGwGQh9jAm9"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "861869f3-0fb7-4f88-99db-202116a1eb6b", "DetectTime": "2024-05-21T12:48:20.286262+00:00", "EventTime": "2024-05-21T12:48:20.286282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMmMzV1XGwGQh9jAm9"], "accumulated_threat_level": 2.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "81b03c13-ac09-465d-be4c-04e34cc95130", "DetectTime": "2024-05-21T12:48:20.300330+00:00", "EventTime": "2024-05-21T12:48:20.300350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1nFY3qn4hkDq1FL9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 157} +{"Format": "IDEA0", "ID": "333bb550-dd8e-4c3f-9979-8de9c168c83e", "DetectTime": "2024-05-21T12:48:20.373136+00:00", "EventTime": "2024-05-21T12:48:20.373157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpI2NT2fnQVSjgImF3"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "d7ad0361-b83c-4c5d-81c4-912f181579f6", "DetectTime": "2024-05-21T12:48:20.388602+00:00", "EventTime": "2024-05-21T12:48:20.388624+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpI2NT2fnQVSjgImF3"], "accumulated_threat_level": 2.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "e9360b57-98a0-45a8-8adf-9b667255f35c", "DetectTime": "2024-05-21T12:48:20.571792+00:00", "EventTime": "2024-05-21T12:48:20.571819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuIiJr3w4ZGO8dBR74"], "accumulated_threat_level": 12.000000000000002, "timewindow": 157} +{"Format": "Json", "ID": "e9360b57-98a0-45a8-8adf-9b667255f35c", "DetectTime": "2024-05-21T12:48:20.571792+00:00", "EventTime": "2024-05-21T12:48:20.571819+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "1970-01-07T12:49:21.256876+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2024/05/21 12:48:20.871828)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 157, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "59e3725c-41f6-4082-b682-ab3711a829ba", "DetectTime": "2024-05-21T12:48:20.883777+00:00", "EventTime": "2024-05-21T12:48:20.883795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Vlo3ZZBNvwskEA8"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "c1b703c8-22fb-456d-a5ce-e97664fa0779", "DetectTime": "2024-05-21T12:48:20.897254+00:00", "EventTime": "2024-05-21T12:48:20.897276+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN8Vlo3ZZBNvwskEA8"], "accumulated_threat_level": 3.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "872d4fd4-e1f9-4e79-8f40-8eeb16f8a850", "DetectTime": "2024-05-21T12:48:20.909359+00:00", "EventTime": "2024-05-21T12:48:20.909376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9ZK9WRbzvxFvQr7"], "accumulated_threat_level": 0.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "e2514802-a89e-4c33-a796-1c4e329dcc08", "DetectTime": "2024-05-21T12:48:20.923416+00:00", "EventTime": "2024-05-21T12:48:20.923435+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoU7UO2Hxloia28pX5"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "540e70c4-a063-4fb8-b14f-efe5acd17b28", "DetectTime": "2024-05-21T12:48:20.937398+00:00", "EventTime": "2024-05-21T12:48:20.937424+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoU7UO2Hxloia28pX5"], "accumulated_threat_level": 3.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "a3973ebc-de3f-4838-8481-6c85ca50d2fc", "DetectTime": "2024-05-21T12:48:20.950871+00:00", "EventTime": "2024-05-21T12:48:20.950890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd65HsLl2uGXoXg18"], "accumulated_threat_level": 1.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "39af37cb-2359-4052-bb5a-91fd39768a96", "DetectTime": "2024-05-21T12:48:20.962940+00:00", "EventTime": "2024-05-21T12:48:20.962959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPByp3OiUv0IV7Bte"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 157} +{"Format": "IDEA0", "ID": "09f2bfb7-a637-4e78-8344-3c73af06f4f3", "DetectTime": "2024-05-21T12:48:20.975825+00:00", "EventTime": "2024-05-21T12:48:20.975843+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1V9F1X6y55uhSiah"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "c64ac32c-e5e7-4eca-8bca-feea7f83ac55", "DetectTime": "2024-05-21T12:48:20.989194+00:00", "EventTime": "2024-05-21T12:48:20.989214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1V9F1X6y55uhSiah"], "accumulated_threat_level": 4.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "a30f8827-36f8-4d4a-8fa6-622a1c431d4a", "DetectTime": "2024-05-21T12:48:21.008642+00:00", "EventTime": "2024-05-21T12:48:21.008663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5Epq3XN7R4MQmtS1"], "accumulated_threat_level": 3.2, "timewindow": 157} +{"Format": "IDEA0", "ID": "2f91b7ce-4e53-4762-b524-7a779957481b", "DetectTime": "2024-05-21T12:48:21.023484+00:00", "EventTime": "2024-05-21T12:48:21.023505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwMqq2mJYP9oJVJ16"], "accumulated_threat_level": 4.0, "timewindow": 157} +{"Format": "IDEA0", "ID": "a1efb483-643f-4c9e-84b3-16c20557f762", "DetectTime": "2024-05-21T12:48:21.036048+00:00", "EventTime": "2024-05-21T12:48:21.036067+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35ac346sPUE8qPjfe"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "5acb861d-61f8-4b55-96b6-36a1247fec2a", "DetectTime": "2024-05-21T12:48:21.050063+00:00", "EventTime": "2024-05-21T12:48:21.050084+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35ac346sPUE8qPjfe"], "accumulated_threat_level": 4.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "5bb8ea77-ed9d-482a-afd5-ef15e8109595", "DetectTime": "2024-05-21T12:48:21.063319+00:00", "EventTime": "2024-05-21T12:48:21.063341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRPVA3NWqrV1F3GBk"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "6fa0fdec-7477-4851-959b-bf77027ab6cd", "DetectTime": "2024-05-21T12:48:21.075990+00:00", "EventTime": "2024-05-21T12:48:21.076009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.164.123.17"]}], "Attach": [{"Content": "Connection to unknown destination port 10492/UDP destination IP 78.164.123.17. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHof7r4mvhPHkUpDwe"], "accumulated_threat_level": 4.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "b7b03b3e-d91d-465f-a145-59c54ed7f266", "DetectTime": "2024-05-21T12:48:21.089930+00:00", "EventTime": "2024-05-21T12:48:21.089950+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRPVA3NWqrV1F3GBk"], "accumulated_threat_level": 5.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "164e5972-d4ca-4583-9410-045b15d9dfc2", "DetectTime": "2024-05-21T12:48:21.103180+00:00", "EventTime": "2024-05-21T12:48:21.103199+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Vq9ilIL3iCe1O37"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "d31df859-aec8-4fe8-b63f-ed12770f1a5a", "DetectTime": "2024-05-21T12:48:21.118616+00:00", "EventTime": "2024-05-21T12:48:21.118647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Vq9ilIL3iCe1O37"], "accumulated_threat_level": 5.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "8f9eef96-194e-4c18-850f-9d46de965b06", "DetectTime": "2024-05-21T12:48:21.132858+00:00", "EventTime": "2024-05-21T12:48:21.132881+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdTo52b7Mu4x5DtJg"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "749b73b2-818c-4baf-bc11-1fe95a1168f2", "DetectTime": "2024-05-21T12:48:21.147413+00:00", "EventTime": "2024-05-21T12:48:21.147451+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdTo52b7Mu4x5DtJg"], "accumulated_threat_level": 6.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "1e0272a4-1901-4e37-826f-9befcf791837", "DetectTime": "2024-05-21T12:48:21.216742+00:00", "EventTime": "2024-05-21T12:48:21.216780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0rtbPpOoucvyAw6"], "accumulated_threat_level": 5.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "35bbd442-75ce-4a10-89da-46d92a041ddf", "DetectTime": "2024-05-21T12:48:21.271593+00:00", "EventTime": "2024-05-21T12:48:21.271615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4bKeb0QwB9QjKC39"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "8660545a-085f-455e-9f89-83a4f092c65c", "DetectTime": "2024-05-21T12:48:21.310693+00:00", "EventTime": "2024-05-21T12:48:21.310713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjeXCVaxBAYOh8KN6"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "a49b17eb-b890-407d-8bc2-1afeec68ae30", "DetectTime": "2024-05-21T12:48:21.323742+00:00", "EventTime": "2024-05-21T12:48:21.323765+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjeXCVaxBAYOh8KN6"], "accumulated_threat_level": 6.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "1d3e33db-6283-4642-9c8b-20dcb12500e6", "DetectTime": "2024-05-21T12:48:21.328975+00:00", "EventTime": "2024-05-21T12:48:21.328997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFJJWG1bUGF6U6qYd"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "5c384b0b-86db-46ce-9b41-e2111171d459", "DetectTime": "2024-05-21T12:48:21.349100+00:00", "EventTime": "2024-05-21T12:48:21.349122+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckpt2x2hRWpha9XXqj"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "d1e96cef-d8f1-40b6-9b82-d49b00f219e4", "DetectTime": "2024-05-21T12:48:21.362174+00:00", "EventTime": "2024-05-21T12:48:21.362202+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckpt2x2hRWpha9XXqj"], "accumulated_threat_level": 7.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "abca7703-4d11-4d00-8564-9b90d4795114", "DetectTime": "2024-05-21T12:48:21.374757+00:00", "EventTime": "2024-05-21T12:48:21.374777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnGgE2S5LIJvLtw51"], "accumulated_threat_level": 7.199999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "afad322a-9161-4567-acb6-93ab653d391d", "DetectTime": "2024-05-21T12:48:21.415676+00:00", "EventTime": "2024-05-21T12:48:21.415694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv16WS1rbNdPFQpJwk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "85432aad-1ae7-4480-bc7c-c51a6e182330", "DetectTime": "2024-05-21T12:48:21.442314+00:00", "EventTime": "2024-05-21T12:48:21.442335+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMI5g2CtYaEQIiGCg"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "628ce0a8-d53c-405c-bd96-9e203c2f8122", "DetectTime": "2024-05-21T12:48:21.458114+00:00", "EventTime": "2024-05-21T12:48:21.458155+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLMI5g2CtYaEQIiGCg"], "accumulated_threat_level": 7.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "fd7a83e9-7c3a-4824-8050-fe2408ee95ff", "DetectTime": "2024-05-21T12:48:21.472632+00:00", "EventTime": "2024-05-21T12:48:21.472679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHErE2i99EOHcaLlg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 157} +{"Format": "IDEA0", "ID": "a63569b3-7edb-45e2-9dbc-2b8a7bc7f5ff", "DetectTime": "2024-05-21T12:48:21.487919+00:00", "EventTime": "2024-05-21T12:48:21.487938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBmubU7q6CluhHmL9"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "75cb9051-6e41-4d08-9eda-e369f8633470", "DetectTime": "2024-05-21T12:48:21.500848+00:00", "EventTime": "2024-05-21T12:48:21.500870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBmubU7q6CluhHmL9"], "accumulated_threat_level": 8.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "4c681d56-895a-4d55-b074-72685d247e6f", "DetectTime": "2024-05-21T12:48:21.512707+00:00", "EventTime": "2024-05-21T12:48:21.512744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU07ps3KYBoI03Y5W8"], "accumulated_threat_level": 9.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "db506c1b-ffe8-4b81-aedf-a05b6cbe4227", "DetectTime": "2024-05-21T12:48:21.525294+00:00", "EventTime": "2024-05-21T12:48:21.525314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9YXfFzRIGcQBswi"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "d1d9cf15-10f2-4b78-a16d-aaab44f7f093", "DetectTime": "2024-05-21T12:48:21.538572+00:00", "EventTime": "2024-05-21T12:48:21.538610+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca9YXfFzRIGcQBswi"], "accumulated_threat_level": 8.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "c26c8086-3d91-4016-8b3c-3570c894e476", "DetectTime": "2024-05-21T12:48:21.564967+00:00", "EventTime": "2024-05-21T12:48:21.564999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmAcxy24CTedpRmC5c"], "accumulated_threat_level": 10.4, "timewindow": 157} +{"Format": "IDEA0", "ID": "2f11f722-a9e7-4983-b184-526ff647f70d", "DetectTime": "2024-05-21T12:48:21.614069+00:00", "EventTime": "2024-05-21T12:48:21.614087+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKcHK3sKWpBGq3Qxk"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "bdb0c9ea-6e35-4cb8-9cf4-1414af7917dc", "DetectTime": "2024-05-21T12:48:21.628366+00:00", "EventTime": "2024-05-21T12:48:21.628391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COKcHK3sKWpBGq3Qxk"], "accumulated_threat_level": 9.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "9ac89032-8ecc-40f3-9362-9ecccabbc726", "DetectTime": "2024-05-21T12:48:21.653776+00:00", "EventTime": "2024-05-21T12:48:21.653797+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcNh11Fjm1PyGN8uk"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "1521244a-e64c-4027-895d-df9219ee9a30", "DetectTime": "2024-05-21T12:48:21.668906+00:00", "EventTime": "2024-05-21T12:48:21.668939+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcNh11Fjm1PyGN8uk"], "accumulated_threat_level": 9.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "79801376-eefb-4c33-bf75-4de7fbb8021d", "DetectTime": "2024-05-21T12:48:21.852200+00:00", "EventTime": "2024-05-21T12:48:21.852225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Esnw2w2tT5eQUZ1d"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "6245d3ca-ab52-4b8b-b850-469a27b1ecfb", "DetectTime": "2024-05-21T12:48:21.857541+00:00", "EventTime": "2024-05-21T12:48:21.857560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CctTZQ2BRdtQG7tONh"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "6da76dd5-7800-4de0-846d-d697ab210d2b", "DetectTime": "2024-05-21T12:48:21.940274+00:00", "EventTime": "2024-05-21T12:48:21.940312+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMG1Oh19EY4HXhC8xl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 157} +{"Format": "IDEA0", "ID": "d368c7e3-8db2-4df3-ba6a-f6c064163a7a", "DetectTime": "2024-05-21T12:48:21.946220+00:00", "EventTime": "2024-05-21T12:48:21.946242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CozJXb4OLedzonvMVd"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "d63ccd72-b2e9-4913-9a2c-0f6bc1c98033", "DetectTime": "2024-05-21T12:48:21.972669+00:00", "EventTime": "2024-05-21T12:48:21.972690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqB4T2sZIgKC7AMg9"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "0006a443-d6cc-422a-8d82-9c7857dadf4b", "DetectTime": "2024-05-21T12:48:21.986474+00:00", "EventTime": "2024-05-21T12:48:21.986510+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqB4T2sZIgKC7AMg9"], "accumulated_threat_level": 10.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "60c059d6-f4f9-49cb-bee2-ae76a68bd095", "DetectTime": "2024-05-21T12:48:22.013166+00:00", "EventTime": "2024-05-21T12:48:22.013189+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4IPf4Y4sBsj49y8j"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "50186fbd-b461-4d95-acae-94ce6ff11aad", "DetectTime": "2024-05-21T12:48:22.026620+00:00", "EventTime": "2024-05-21T12:48:22.026657+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq4IPf4Y4sBsj49y8j"], "accumulated_threat_level": 10.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "3116a03f-664b-49b1-a63f-7842b1ef5f99", "DetectTime": "2024-05-21T12:48:22.033114+00:00", "EventTime": "2024-05-21T12:48:22.033138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEs8u3az11N7XhnRb"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "c7dc4a70-f0c5-49aa-9cb4-f893711913f4", "DetectTime": "2024-05-21T12:48:22.159065+00:00", "EventTime": "2024-05-21T12:48:22.159095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbzLxvkerjoWVKX1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 157} +{"Format": "Json", "ID": "c7dc4a70-f0c5-49aa-9cb4-f893711913f4", "DetectTime": "2024-05-21T12:48:22.159065+00:00", "EventTime": "2024-05-21T12:48:22.159095+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-07T12:49:25.599491+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 157. (real time 2024/05/21 12:48:22.388111)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 157, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ba9949a7-1bf1-4f99-ad7d-0d96b03f1c8a", "DetectTime": "2024-05-21T12:48:22.392178+00:00", "EventTime": "2024-05-21T12:48:22.392195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvnPVg4cX94dgnhLxd"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "3125b900-0239-4828-911a-95f628dbc89a", "DetectTime": "2024-05-21T12:48:22.396804+00:00", "EventTime": "2024-05-21T12:48:22.396822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOMfI3F1KmU2oC7h"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "466c12a3-9f15-49be-8907-2cf89773a662", "DetectTime": "2024-05-21T12:48:22.556849+00:00", "EventTime": "2024-05-21T12:48:22.556872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgvC4t4ikJAwZXBoW5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "7b508daf-5db1-4042-a690-fe0b396596e6", "DetectTime": "2024-05-21T12:48:22.574985+00:00", "EventTime": "2024-05-21T12:48:22.575019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWyBi4E9OOy4CKbzj"], "accumulated_threat_level": 0.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "793d51ac-e08f-472b-9474-46fc8e890110", "DetectTime": "2024-05-21T12:48:22.611078+00:00", "EventTime": "2024-05-21T12:48:22.611101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFwEU3Tu8OWqAXL3h"], "accumulated_threat_level": 5.6, "timewindow": 155} +{"Format": "IDEA0", "ID": "d43238b2-283a-4eeb-b4f8-8b05926238ce", "DetectTime": "2024-05-21T12:48:22.616214+00:00", "EventTime": "2024-05-21T12:48:22.616232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7e353eYKomfFcuz6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "9b0564ff-fa7a-4b84-8734-214db638aa99", "DetectTime": "2024-05-21T12:48:22.704263+00:00", "EventTime": "2024-05-21T12:48:22.704286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CumEbF2EecfeIBmzr8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "a386d572-69e4-4623-97c4-37c3518403d4", "DetectTime": "2024-05-21T12:48:22.778594+00:00", "EventTime": "2024-05-21T12:48:22.778617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGK4ZF1Kl1E6ljv9g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "40017ae6-2944-4c91-9505-eca7f18e3b86", "DetectTime": "2024-05-21T12:48:22.833150+00:00", "EventTime": "2024-05-21T12:48:22.833176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7AGUA1stcd0K0FBO4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0e51ae90-54fa-43f0-a288-ddc4c4001a1f", "DetectTime": "2024-05-21T12:48:22.847375+00:00", "EventTime": "2024-05-21T12:48:22.847412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQjeS16XhG2ckhdmh"], "accumulated_threat_level": 1.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "f35413d6-e4f8-4267-b345-6ff7ec156c08", "DetectTime": "2024-05-21T12:48:22.853287+00:00", "EventTime": "2024-05-21T12:48:22.853308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0SqKY1oLRSu8hGQpg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "648dcd43-6432-4ddd-a90e-dbb884343472", "DetectTime": "2024-05-21T12:48:23.095763+00:00", "EventTime": "2024-05-21T12:48:23.095792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpJ3z4wMEch4NgoEb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "1eb4df67-33dd-4ea5-9ddc-3707f554c745", "DetectTime": "2024-05-21T12:48:23.248682+00:00", "EventTime": "2024-05-21T12:48:23.248702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNzuMM1hprfH4v1bal"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "3bec0f78-a879-4d9f-801c-8addc2bdc994", "DetectTime": "2024-05-21T12:48:23.279567+00:00", "EventTime": "2024-05-21T12:48:23.279589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzoK0qo0EebTwSsj3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 157} +{"Format": "IDEA0", "ID": "701b617e-ef87-4716-b07d-d979531af63e", "DetectTime": "2024-05-21T12:48:23.284554+00:00", "EventTime": "2024-05-21T12:48:23.284571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeSIXK7yIAO8tN0H7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "ae466019-67e5-4f9d-add6-ba42548659ee", "DetectTime": "2024-05-21T12:48:23.317699+00:00", "EventTime": "2024-05-21T12:48:23.317720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Conjo73tb3n17b5Rja"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "e23f011d-2370-4a15-93d5-c0aad50c5998", "DetectTime": "2024-05-21T12:48:23.322564+00:00", "EventTime": "2024-05-21T12:48:23.322581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjm0Y34mDX790IBjlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "9cd2b5de-136b-40d5-a835-32b0e2ea6b3c", "DetectTime": "2024-05-21T12:48:23.327108+00:00", "EventTime": "2024-05-21T12:48:23.327126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwZlWq4fTJaIeibwSl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "9f66892c-e265-4a79-8b9a-78300514deaf", "DetectTime": "2024-05-21T12:48:23.708726+00:00", "EventTime": "2024-05-21T12:48:23.708747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ9EG82xnjlPTHc26a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "ff14cdfb-9a34-4d65-936f-3e6d7d824572", "DetectTime": "2024-05-21T12:48:23.776771+00:00", "EventTime": "2024-05-21T12:48:23.776802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSZAY22p4X7jx9Yrc"], "accumulated_threat_level": 3.2, "timewindow": 157} +{"Format": "IDEA0", "ID": "9ecb8b95-6c7c-48de-ae3e-e2dc1e6f8688", "DetectTime": "2024-05-21T12:48:23.782273+00:00", "EventTime": "2024-05-21T12:48:23.782294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNULR1guwf0twmHG2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "65ae974d-ba9d-49de-8448-939df7ee70bf", "DetectTime": "2024-05-21T12:48:23.787089+00:00", "EventTime": "2024-05-21T12:48:23.787107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDagzi4hEa6lwULQAl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "59e3f913-61fe-4510-b9eb-5f3ec53aded4", "DetectTime": "2024-05-21T12:48:23.880896+00:00", "EventTime": "2024-05-21T12:48:23.880915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaG4zb3gB1YELi3IF7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "5cc07186-1bd6-49a5-b0d6-dd47586d525e", "DetectTime": "2024-05-21T12:48:24.166667+00:00", "EventTime": "2024-05-21T12:48:24.166687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrcuV3QGOC6HHngR6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "a1b8961c-a3f7-4aac-a8b7-798d2d1d1d24", "DetectTime": "2024-05-21T12:48:24.183028+00:00", "EventTime": "2024-05-21T12:48:24.183048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqpEq4fX9fZzquwjh"], "accumulated_threat_level": 4.0, "timewindow": 157} +{"Format": "IDEA0", "ID": "7879746b-cadf-4cb5-9e6c-77ce8c79adaf", "DetectTime": "2024-05-21T12:48:24.187941+00:00", "EventTime": "2024-05-21T12:48:24.187958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD4pXD3BbRtNuk09zf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "b25a2eb6-aa9b-49ec-bc17-a3bbbcfc3e83", "DetectTime": "2024-05-21T12:48:24.282857+00:00", "EventTime": "2024-05-21T12:48:24.282881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMXBB2T9qr2VNAsn4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0d9b198a-e6ae-4f23-93e2-cf142daef29f", "DetectTime": "2024-05-21T12:48:24.347615+00:00", "EventTime": "2024-05-21T12:48:24.347637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJoeW3akIqmfoOJ02"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "3207e828-6a16-4b8a-b0ba-9699bfc4437d", "DetectTime": "2024-05-21T12:48:24.364480+00:00", "EventTime": "2024-05-21T12:48:24.364505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrISSg1TYkcSgouxOg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "2f5c660e-ff5e-4d21-8220-5d99d40adf02", "DetectTime": "2024-05-21T12:48:24.377269+00:00", "EventTime": "2024-05-21T12:48:24.377290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6ylq4TJN4TEfpXi6"], "accumulated_threat_level": 4.8, "timewindow": 157} +{"Format": "IDEA0", "ID": "eeca4f23-6fec-4b4a-a8f9-11addb1dbb36", "DetectTime": "2024-05-21T12:48:24.470340+00:00", "EventTime": "2024-05-21T12:48:24.470363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnrysx3rWecgy3OUch"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "224c2c49-006b-4c47-a399-0e43745c220b", "DetectTime": "2024-05-21T12:48:24.750965+00:00", "EventTime": "2024-05-21T12:48:24.750986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBkEoR3mKIvf4TPDHa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "ee053f18-2a67-44fd-b2e1-06e54ed2665a", "DetectTime": "2024-05-21T12:48:24.821450+00:00", "EventTime": "2024-05-21T12:48:24.821471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZyEt72Ep1NCR6EOb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "50dc40eb-c99a-4427-982e-41c069972036", "DetectTime": "2024-05-21T12:48:24.836839+00:00", "EventTime": "2024-05-21T12:48:24.836858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cza3g74l8mv9rESB38"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "20a7f51b-53ad-4acf-8658-ac3e1628d38d", "DetectTime": "2024-05-21T12:48:24.918305+00:00", "EventTime": "2024-05-21T12:48:24.918325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.177.101.124"]}], "Attach": [{"Content": "Connection to unknown destination port 8150/UDP destination IP 189.177.101.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg2yM54WVaEN6BB567"], "accumulated_threat_level": 5.6, "timewindow": 157} +{"Format": "IDEA0", "ID": "e08cdc3c-b593-4bcb-b03a-8c77c1c8098f", "DetectTime": "2024-05-21T12:48:25.090324+00:00", "EventTime": "2024-05-21T12:48:25.090344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CByFjl3a4j0RzHEkr5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "2e78b1c1-edd0-47ff-b576-194624dda738", "DetectTime": "2024-05-21T12:48:25.098151+00:00", "EventTime": "2024-05-21T12:48:25.098172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CASIAY8zQp4O8NjEh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "f6abe378-40f8-4127-b22a-4383c04f1728", "DetectTime": "2024-05-21T12:48:25.105389+00:00", "EventTime": "2024-05-21T12:48:25.105412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Z7hBt8p2EDY7Lb1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "55c2907f-5dac-4b5f-97cc-3e1440fa4d1d", "DetectTime": "2024-05-21T12:48:25.149969+00:00", "EventTime": "2024-05-21T12:48:25.149989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbUddsGU1JfZZN3c6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "2b4fe2f4-1f01-4de9-94b3-8f526425e1b1", "DetectTime": "2024-05-21T12:48:25.156365+00:00", "EventTime": "2024-05-21T12:48:25.156385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ28CC3FEzbw4ceQ4j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "8ae04a4b-8ad2-4099-8592-00c8727619d9", "DetectTime": "2024-05-21T12:48:25.161505+00:00", "EventTime": "2024-05-21T12:48:25.161524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzcZkq2mP7AOGuQfI4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "2da9e235-6746-4540-952e-8ec66d709185", "DetectTime": "2024-05-21T12:48:25.184057+00:00", "EventTime": "2024-05-21T12:48:25.184075+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyHu4P3iy4kTkaUS8"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "c2aca4ea-4ad4-4100-8486-72663d003fe1", "DetectTime": "2024-05-21T12:48:25.196811+00:00", "EventTime": "2024-05-21T12:48:25.196829+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyHu4P3iy4kTkaUS8"], "accumulated_threat_level": 11.3, "timewindow": 35} +{"Format": "IDEA0", "ID": "0f16315e-b1e4-487f-b15d-32b3e61c0588", "DetectTime": "2024-05-21T12:48:25.332480+00:00", "EventTime": "2024-05-21T12:48:25.332499+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoGlY17iVjL0dIv68"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "52c6e78d-36b8-4c85-8cef-83ef9a09a690", "DetectTime": "2024-05-21T12:48:25.345609+00:00", "EventTime": "2024-05-21T12:48:25.345630+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyoGlY17iVjL0dIv68"], "accumulated_threat_level": 11.8, "timewindow": 35} +{"Format": "IDEA0", "ID": "30b30862-01d5-4213-a8a5-fd6b30af0411", "DetectTime": "2024-05-21T12:48:25.377664+00:00", "EventTime": "2024-05-21T12:48:25.377684+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvoof1PuyXNUy4rl8"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "89c105ec-f683-4aa7-8d21-405609229da5", "DetectTime": "2024-05-21T12:48:25.390562+00:00", "EventTime": "2024-05-21T12:48:25.390581+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLvoof1PuyXNUy4rl8"], "accumulated_threat_level": 12.3, "timewindow": 35} +{"Format": "Json", "ID": "89c105ec-f683-4aa7-8d21-405609229da5", "DetectTime": "2024-05-21T12:48:25.390562+00:00", "EventTime": "2024-05-21T12:48:25.390581+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "1970-01-02T10:06:52.478492+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:48:25.843222)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.3, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.3} +{"Format": "IDEA0", "ID": "3c6576b2-4f5e-4b03-957c-46390229dbac", "DetectTime": "2024-05-21T12:48:25.855151+00:00", "EventTime": "2024-05-21T12:48:25.855171+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZUhQ1iKt7goi959a"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "5572913e-c84e-4ecb-84fb-fe909fae6340", "DetectTime": "2024-05-21T12:48:25.869519+00:00", "EventTime": "2024-05-21T12:48:25.869555+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZUhQ1iKt7goi959a"], "accumulated_threat_level": 0.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "33afe3d8-7a79-4c56-893f-04a02484b9b3", "DetectTime": "2024-05-21T12:48:25.875494+00:00", "EventTime": "2024-05-21T12:48:25.875515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfE4Xz20WzIfqnet"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "3603d1cd-3de6-4df0-b90b-70cab5e892e9", "DetectTime": "2024-05-21T12:48:25.888647+00:00", "EventTime": "2024-05-21T12:48:25.888682+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmm7mP2NTcFaWCTA5f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "a204cff0-c343-45b5-ad10-9f4a96b29d75", "DetectTime": "2024-05-21T12:48:25.894923+00:00", "EventTime": "2024-05-21T12:48:25.894954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEo2632jQJ923ht2W2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "787be944-ddfc-4c81-8d6d-83105cff888d", "DetectTime": "2024-05-21T12:48:25.969591+00:00", "EventTime": "2024-05-21T12:48:25.969614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6npa4VRFz8qAodn4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0cc667e0-9985-4199-9fc5-1a226f60fa79", "DetectTime": "2024-05-21T12:48:25.974694+00:00", "EventTime": "2024-05-21T12:48:25.974713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUb4gn3Dt5kjoizQkd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "58e31c14-1d08-4223-a73d-b8d34453478c", "DetectTime": "2024-05-21T12:48:25.979552+00:00", "EventTime": "2024-05-21T12:48:25.979570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl3bsl2ovskdcctx4l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "bd2637f8-8b4c-4377-a2de-6c2532ea296e", "DetectTime": "2024-05-21T12:48:25.986304+00:00", "EventTime": "2024-05-21T12:48:25.986322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9v5329hOxcW7p6E8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "6f6621ef-7469-4b40-8346-f77647444408", "DetectTime": "2024-05-21T12:48:25.995258+00:00", "EventTime": "2024-05-21T12:48:25.995278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjrKMc1I6KAUxo1jHc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "d38c8d52-dc5f-4779-b4b7-e10c1fe777ac", "DetectTime": "2024-05-21T12:48:26.050803+00:00", "EventTime": "2024-05-21T12:48:26.050822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILduB9ZI5g5yqnAd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "1dc79ac8-4975-4997-ab26-6a286da41a78", "DetectTime": "2024-05-21T12:48:26.305315+00:00", "EventTime": "2024-05-21T12:48:26.305337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7poYy18lwONCObwpd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "b9b53d94-56eb-49cf-87de-3e793109c025", "DetectTime": "2024-05-21T12:48:26.322376+00:00", "EventTime": "2024-05-21T12:48:26.322399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CikiMG3VSglG9k4Agf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "708d1368-a1e7-461f-816d-27927e1d4ae3", "DetectTime": "2024-05-21T12:48:26.327983+00:00", "EventTime": "2024-05-21T12:48:26.328004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNXobI3pmyy3cf9J13"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "bc74c901-c11f-4fee-902a-629dad37da22", "DetectTime": "2024-05-21T12:48:26.651870+00:00", "EventTime": "2024-05-21T12:48:26.651893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF0IM41Sze7ZO2r3k6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "99453f1e-0313-4e56-8039-e80f90bc7e21", "DetectTime": "2024-05-21T12:48:26.659404+00:00", "EventTime": "2024-05-21T12:48:26.659426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COoKs04yZgAYMA3fm7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "674393dd-b8e2-41bf-8f37-c5d09ab93e87", "DetectTime": "2024-05-21T12:48:26.664483+00:00", "EventTime": "2024-05-21T12:48:26.664502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy2gn2UMOBvq4hUYi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "1d952fb6-84e9-4099-ab5b-ae130abfe125", "DetectTime": "2024-05-21T12:48:26.782264+00:00", "EventTime": "2024-05-21T12:48:26.782286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHo3Uv2Tbgr27F0EQb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0b2a0dc2-ae46-4c28-99c5-d619bb894b50", "DetectTime": "2024-05-21T12:48:26.787423+00:00", "EventTime": "2024-05-21T12:48:26.787443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHgleM2TLXKtJ8GYZ9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "3fc2eb5c-5e7b-421b-910e-72521ce391c5", "DetectTime": "2024-05-21T12:48:27.136695+00:00", "EventTime": "2024-05-21T12:48:27.136721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmAdPnyEyGGGnfGJe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "6c94cff9-abe2-46bf-a4f5-c719e2654b54", "DetectTime": "2024-05-21T12:48:27.154931+00:00", "EventTime": "2024-05-21T12:48:27.154956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7pwOPiNqirjIuta"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0da0752c-eda2-4603-ac0f-2c26f670453c", "DetectTime": "2024-05-21T12:48:27.190232+00:00", "EventTime": "2024-05-21T12:48:27.190259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClUtOT2qhvYLpOF8r3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "29bc5db1-9ecb-4a90-b5c9-48c0689ee6d1", "DetectTime": "2024-05-21T12:48:27.196275+00:00", "EventTime": "2024-05-21T12:48:27.196297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhQR02Q4pKZctLkTc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "96aadc45-0a29-44d8-8210-fcb7f7a3b4e7", "DetectTime": "2024-05-21T12:48:27.203445+00:00", "EventTime": "2024-05-21T12:48:27.203465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcJT0H1hROCQ4GRgZ2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "b7d6d364-4fcf-41e6-8ddd-2831c86c125e", "DetectTime": "2024-05-21T12:48:27.345538+00:00", "EventTime": "2024-05-21T12:48:27.345557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgjIo33GydRB9QAmd"], "accumulated_threat_level": 1.3, "timewindow": 158} +{"Format": "IDEA0", "ID": "dc9bfaa7-2752-4bd0-a28d-a9a1102dd980", "DetectTime": "2024-05-21T12:48:27.643550+00:00", "EventTime": "2024-05-21T12:48:27.643572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cihd5C2nfDmdCLcdbe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "8fbc951a-8204-4b49-adf4-5ec9b0d0e469", "DetectTime": "2024-05-21T12:48:27.649224+00:00", "EventTime": "2024-05-21T12:48:27.649244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO0piS2IeVLj4xwKaj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "e35893e3-b68a-414a-8eb6-f7b162f847b9", "DetectTime": "2024-05-21T12:48:27.654818+00:00", "EventTime": "2024-05-21T12:48:27.654839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTHc6A2Am39WeF2uc8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "66fc5e4a-13a8-4b33-95fa-6fa5c39a0557", "DetectTime": "2024-05-21T12:48:27.660253+00:00", "EventTime": "2024-05-21T12:48:27.660273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYvKX1EWuYM63aTmc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0f29ee37-0611-4d95-88a4-bf9e8963f14a", "DetectTime": "2024-05-21T12:48:27.672526+00:00", "EventTime": "2024-05-21T12:48:27.672546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFPg516zCmQVkrvV"], "accumulated_threat_level": 2.1, "timewindow": 158} +{"Format": "IDEA0", "ID": "a635dc27-daad-46b3-9d00-6c6ecd7195ff", "DetectTime": "2024-05-21T12:48:27.859390+00:00", "EventTime": "2024-05-21T12:48:27.859413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnM0tl35g9e84LT7ml"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "fcf7937e-00b8-4aa2-a529-b8dedca07876", "DetectTime": "2024-05-21T12:48:27.912019+00:00", "EventTime": "2024-05-21T12:48:27.912040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cinm6q1WaUy331HZyg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0821d592-07c6-45cd-be8a-c105a12e1ae6", "DetectTime": "2024-05-21T12:48:27.917035+00:00", "EventTime": "2024-05-21T12:48:27.917053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHIY9339NsKvmOWG2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "67a22df9-3c1a-4f9e-8a4b-5b45df61975f", "DetectTime": "2024-05-21T12:48:28.254599+00:00", "EventTime": "2024-05-21T12:48:28.254617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6M9521Yuu8UT2wGV3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 158} +{"Format": "IDEA0", "ID": "18bfd799-d54a-4431-bb2a-adb5da43c209", "DetectTime": "2024-05-21T12:48:28.300725+00:00", "EventTime": "2024-05-21T12:48:28.300747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv1NDs1fekRRTWa1f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "581c3e3f-7196-4e8a-94c1-1417443dcd6f", "DetectTime": "2024-05-21T12:48:28.311019+00:00", "EventTime": "2024-05-21T12:48:28.311039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1OPam1MiZ14ucga8l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "058e8577-dd5e-4393-b5ac-c5544bde830b", "DetectTime": "2024-05-21T12:48:28.316305+00:00", "EventTime": "2024-05-21T12:48:28.316324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CukoAX1TMbNLyHNFzk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "cbafe8d9-5dba-451f-bc62-82995a6dd356", "DetectTime": "2024-05-21T12:48:28.455953+00:00", "EventTime": "2024-05-21T12:48:28.455978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PfHC4qy6OfgvJOyj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "9f409e84-b0d5-423d-a3a6-2cea1946318c", "DetectTime": "2024-05-21T12:48:28.471230+00:00", "EventTime": "2024-05-21T12:48:28.471248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHpvaG2lFwBIOmFLwi"], "accumulated_threat_level": 3.7, "timewindow": 158} +{"Format": "IDEA0", "ID": "f28eacb8-0ec0-4f07-97a9-20a528600b9c", "DetectTime": "2024-05-21T12:48:28.506809+00:00", "EventTime": "2024-05-21T12:48:28.506830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3NmWryrnZhtZN1we"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "d83a3c39-84cc-4ac1-840e-67f1ffbb7fc7", "DetectTime": "2024-05-21T12:48:28.511939+00:00", "EventTime": "2024-05-21T12:48:28.511959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkuMIH2j2fzYoXDc7g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "a5a72260-c216-4cf9-8671-391b80755880", "DetectTime": "2024-05-21T12:48:28.988409+00:00", "EventTime": "2024-05-21T12:48:28.988432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxL3ZP11pRhRt2TWwe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "8bfbea12-ca40-4055-844a-cc4baca53758", "DetectTime": "2024-05-21T12:48:29.001938+00:00", "EventTime": "2024-05-21T12:48:29.001959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcbV033cd16VUmFIj"], "accumulated_threat_level": 4.5, "timewindow": 158} +{"Format": "IDEA0", "ID": "e678dccd-33b4-48be-90af-9a53994f5b8a", "DetectTime": "2024-05-21T12:48:29.007507+00:00", "EventTime": "2024-05-21T12:48:29.007526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQio0g4NIw77lDbOia"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "eb5d0dcc-a525-4918-a913-2207b32c783a", "DetectTime": "2024-05-21T12:48:29.049129+00:00", "EventTime": "2024-05-21T12:48:29.049150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7pp6m4ifH0AkPWvvg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "05b401ff-acd2-407e-903a-eab3a71bbe65", "DetectTime": "2024-05-21T12:48:29.089178+00:00", "EventTime": "2024-05-21T12:48:29.089200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwmAf73XKYUJPU5jS9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "ff0dc509-f0a7-487b-83ee-7b2cfdd55203", "DetectTime": "2024-05-21T12:48:29.104997+00:00", "EventTime": "2024-05-21T12:48:29.105020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRkQpR3JjyzY9Kzvx4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "0dedc9fa-1120-42c2-9ae7-7b04b731cee9", "DetectTime": "2024-05-21T12:48:29.151991+00:00", "EventTime": "2024-05-21T12:48:29.152013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZh0A4B0MvZWHkap2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "904af85d-d9a0-4587-aec1-0d8d55cd28f5", "DetectTime": "2024-05-21T12:48:29.588349+00:00", "EventTime": "2024-05-21T12:48:29.588371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxp9s33WBtq3jY9yB"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "f7f36699-7b76-438d-8f9a-47871db1783b", "DetectTime": "2024-05-21T12:48:29.619741+00:00", "EventTime": "2024-05-21T12:48:29.619763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvesjNXfK3E8RpvBj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "e2c47a9b-5c08-42ae-aa30-8f6de60359c1", "DetectTime": "2024-05-21T12:48:29.681045+00:00", "EventTime": "2024-05-21T12:48:29.681067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CATB5u29AnBom66rLi"], "accumulated_threat_level": 5.3, "timewindow": 158} +{"Format": "IDEA0", "ID": "1dbb17e4-5e2e-4afa-8a8d-9b43f210637c", "DetectTime": "2024-05-21T12:48:29.686263+00:00", "EventTime": "2024-05-21T12:48:29.686282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjt6Ah2Mo0DJ5Qt204"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "bf526a22-57bf-4cff-92d0-d1ea92d20f8c", "DetectTime": "2024-05-21T12:48:29.690789+00:00", "EventTime": "2024-05-21T12:48:29.690807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2hbn3Pd4GHE3XAu3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "07abc281-af83-4ba3-adeb-5d4d5c635ee5", "DetectTime": "2024-05-21T12:48:29.698835+00:00", "EventTime": "2024-05-21T12:48:29.698857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4qbc2d1xeFm7Dhtf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "96554c84-a202-4dd3-b59c-4ae725c2ea42", "DetectTime": "2024-05-21T12:48:29.763346+00:00", "EventTime": "2024-05-21T12:48:29.763367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjJEAyIBcv0sou2Ug"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "fc730c24-039b-45e8-9e91-2c3bcac38f09", "DetectTime": "2024-05-21T12:48:29.768580+00:00", "EventTime": "2024-05-21T12:48:29.768599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7LHWN13EDZ5Yjctc3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "5390f79c-0a35-41c6-acdc-7edcc9402c4e", "DetectTime": "2024-05-21T12:48:30.097272+00:00", "EventTime": "2024-05-21T12:48:30.097295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Zpsz3ghqjRC6yIce"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "5539859a-174a-4880-b61c-2f012dbbb47b", "DetectTime": "2024-05-21T12:48:30.335359+00:00", "EventTime": "2024-05-21T12:48:30.335378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYx7Wg2uWjednrJax"], "accumulated_threat_level": 6.1, "timewindow": 158} +{"Format": "IDEA0", "ID": "a3f72f35-7156-4801-839e-2547d9574fb1", "DetectTime": "2024-05-21T12:48:30.341763+00:00", "EventTime": "2024-05-21T12:48:30.341782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzkJO3QcQpUJwk8Wh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "75ebf924-07fa-4f1d-923e-4172d4672809", "DetectTime": "2024-05-21T12:48:30.365246+00:00", "EventTime": "2024-05-21T12:48:30.365265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4lbeF3DAhFrn8NpVc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "f12bb310-94d7-4582-8bcd-6bb6b7c4d92d", "DetectTime": "2024-05-21T12:48:30.378504+00:00", "EventTime": "2024-05-21T12:48:30.378525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuCgHq2wO6GyGYOFI5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "365f94ff-924d-40b1-a42a-393bfc680a78", "DetectTime": "2024-05-21T12:48:30.397749+00:00", "EventTime": "2024-05-21T12:48:30.397769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8YOV2Jpdj6O9MF7g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "41ecf5a2-75b1-4b8d-a28c-e2d292694658", "DetectTime": "2024-05-21T12:48:30.460965+00:00", "EventTime": "2024-05-21T12:48:30.460989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoWDss3hZii3F0TGsk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "198e2366-278a-4c11-b8ef-84aa27584403", "DetectTime": "2024-05-21T12:48:30.821311+00:00", "EventTime": "2024-05-21T12:48:30.821332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRX18s1VF2lrKzioEe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "3d8faf35-3c4e-4088-b161-06928d5369ad", "DetectTime": "2024-05-21T12:48:30.826302+00:00", "EventTime": "2024-05-21T12:48:30.826322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFPg6n3A5zaDcwiIRj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "dc774f59-34b6-4614-939c-ad9b8b49a86d", "DetectTime": "2024-05-21T12:48:30.839508+00:00", "EventTime": "2024-05-21T12:48:30.839529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct8GHs4bi3E31SnDql"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 156} +{"Format": "IDEA0", "ID": "600fab00-8918-4cb0-b32c-ea49a67806c1", "DetectTime": "2024-05-21T12:48:31.043303+00:00", "EventTime": "2024-05-21T12:48:31.043326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtH9ok3KaPPwLqKq3c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "511725a1-c0d0-45c7-b211-137fddde9e91", "DetectTime": "2024-05-21T12:48:31.056714+00:00", "EventTime": "2024-05-21T12:48:31.056736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBpCy3Jgdg1DuiVGk"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 158} +{"Format": "IDEA0", "ID": "6433c594-d4db-4663-ac6d-c31f5c3bc35c", "DetectTime": "2024-05-21T12:48:31.062013+00:00", "EventTime": "2024-05-21T12:48:31.062032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZT2h4YgYVjDUIyBb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "d5ed69fb-25f3-4dd2-b504-7dc962f91e51", "DetectTime": "2024-05-21T12:48:31.068768+00:00", "EventTime": "2024-05-21T12:48:31.068788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CruSwC4bs5B8cixi9d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "7500985c-f830-4e1b-95cc-afa9f4b5a481", "DetectTime": "2024-05-21T12:48:31.074267+00:00", "EventTime": "2024-05-21T12:48:31.074286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFeKSm2Pb7XnHfKJz4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "bd8199cb-9375-49ff-81f4-66c28cd51153", "DetectTime": "2024-05-21T12:48:31.079460+00:00", "EventTime": "2024-05-21T12:48:31.079483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGoFyp1xC990farqw7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "756c1116-669a-48e2-a701-033df9b8d773", "DetectTime": "2024-05-21T12:48:31.084661+00:00", "EventTime": "2024-05-21T12:48:31.084679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cck7RKZIBLG2OYss2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "b1ffe313-b1c4-4ea0-ba2f-3d810bd78b55", "DetectTime": "2024-05-21T12:48:31.606282+00:00", "EventTime": "2024-05-21T12:48:31.606303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUAeM3iD7KQIfC8og"], "accumulated_threat_level": 7.699999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "554a88f6-e1e6-4215-a027-3be9a683f888", "DetectTime": "2024-05-21T12:48:31.620760+00:00", "EventTime": "2024-05-21T12:48:31.620781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgzz8IST3Me6OMch"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "3aae4854-72ed-4510-925a-0513a2daefb9", "DetectTime": "2024-05-21T12:48:31.637619+00:00", "EventTime": "2024-05-21T12:48:31.637640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFGx3QkHkCj3SLel"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "ac32acc5-784f-428d-8a89-7d791806054f", "DetectTime": "2024-05-21T12:48:31.657113+00:00", "EventTime": "2024-05-21T12:48:31.657137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiaIt71lb25pyLwf69"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "a1207013-1b32-4561-b281-10d09959c17e", "DetectTime": "2024-05-21T12:48:31.666392+00:00", "EventTime": "2024-05-21T12:48:31.666434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDL2VmXpQHrHO40L6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "6e223bbb-addd-4072-8e21-d055a6a59ec0", "DetectTime": "2024-05-21T12:48:31.671687+00:00", "EventTime": "2024-05-21T12:48:31.671706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C083Eh4z03VcbIC702"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "e1d23d2a-9904-4a29-8985-b191aaea5025", "DetectTime": "2024-05-21T12:48:31.966575+00:00", "EventTime": "2024-05-21T12:48:31.966597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDnQTD2ePBtgjYJ4X2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "e97ed62e-44d6-4530-9ab2-e8138d09f172", "DetectTime": "2024-05-21T12:48:31.978450+00:00", "EventTime": "2024-05-21T12:48:31.978469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdXAAQ3jvA8iEUT411"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "5f9dbe58-d7ee-4c39-94bb-4ebd2b40c22b", "DetectTime": "2024-05-21T12:48:32.486051+00:00", "EventTime": "2024-05-21T12:48:32.486074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRUnf3wfucccsMRX3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "240628c2-fd0a-4592-a953-33c43af46259", "DetectTime": "2024-05-21T12:48:32.508404+00:00", "EventTime": "2024-05-21T12:48:32.508424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLqMQ2DMOLQQ5RRLh"], "accumulated_threat_level": 8.5, "timewindow": 158} +{"Format": "IDEA0", "ID": "e7a18ed2-b764-45bf-86cb-9e57ac278520", "DetectTime": "2024-05-21T12:48:32.513741+00:00", "EventTime": "2024-05-21T12:48:32.513759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctb58WyXvdoLR7LZi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "26fcaf29-32ed-45f7-a56d-f8935d20dfc9", "DetectTime": "2024-05-21T12:48:32.541805+00:00", "EventTime": "2024-05-21T12:48:32.541825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsfQK2zCSPfekc4Yg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "6c62720f-06d5-451d-a2a3-500a318b2d72", "DetectTime": "2024-05-21T12:48:32.560960+00:00", "EventTime": "2024-05-21T12:48:32.560981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7sK63jH9JFzi9jTe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "b3c2b039-7ad8-4bf3-8cd2-50991782b116", "DetectTime": "2024-05-21T12:48:32.764049+00:00", "EventTime": "2024-05-21T12:48:32.764070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CufPmD4sDxZLGfhiy1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "727cb998-3f2a-47cd-aed4-49dd2792255a", "DetectTime": "2024-05-21T12:48:32.818257+00:00", "EventTime": "2024-05-21T12:48:32.818276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CldEiE2QGykVWtj1wj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "e38c44d3-31ce-4110-838b-fd084243402e", "DetectTime": "2024-05-21T12:48:32.867265+00:00", "EventTime": "2024-05-21T12:48:32.867288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKk9k64d8srA0y8ro2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "9a61f8bb-8de0-4dd4-a47c-76786b3aa501", "DetectTime": "2024-05-21T12:48:32.922218+00:00", "EventTime": "2024-05-21T12:48:32.922239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChD40I32GEhUPnkgd9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "9dac30c7-6723-4df3-a448-94b42b1a84f0", "DetectTime": "2024-05-21T12:48:32.927389+00:00", "EventTime": "2024-05-21T12:48:32.927408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrOWE644qZFNc2rrw9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "1e0e33db-2c0d-47ba-8d7d-1629c50b33cf", "DetectTime": "2024-05-21T12:48:32.931918+00:00", "EventTime": "2024-05-21T12:48:32.931936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdIVie4RGnLeB1Pgvj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "6f1c02f2-a7af-492f-b65d-6dfa178b9ef3", "DetectTime": "2024-05-21T12:48:33.326427+00:00", "EventTime": "2024-05-21T12:48:33.326448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcaksM3gljZqJc1dPi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "78e8006f-a786-4891-bff7-700aba6a5f53", "DetectTime": "2024-05-21T12:48:33.331447+00:00", "EventTime": "2024-05-21T12:48:33.331467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiKbuu3f7xpwneqbla"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "9cc5f476-5e8d-4377-8b53-c458b398a5da", "DetectTime": "2024-05-21T12:48:33.376472+00:00", "EventTime": "2024-05-21T12:48:33.376494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJAPx3wIY5TAmMYw2"], "accumulated_threat_level": 9.3, "timewindow": 158} +{"Format": "IDEA0", "ID": "5565630c-db0f-4133-af2f-41b60cdb882a", "DetectTime": "2024-05-21T12:48:33.403287+00:00", "EventTime": "2024-05-21T12:48:33.403308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWTlupT2nWu4VCD1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "0475b872-26ad-4f58-b03e-e3ebccfc979f", "DetectTime": "2024-05-21T12:48:33.794396+00:00", "EventTime": "2024-05-21T12:48:33.794430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ947A3DwQSJEyL8z7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "37683914-d227-49ef-90f1-acaa6166801f", "DetectTime": "2024-05-21T12:48:33.799941+00:00", "EventTime": "2024-05-21T12:48:33.799962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTFr4g43JaqASxaEQ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "f9577717-a332-4419-a6fa-920bcacc5c5b", "DetectTime": "2024-05-21T12:48:33.805393+00:00", "EventTime": "2024-05-21T12:48:33.805410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsvDf1XnAmcIoynk6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "36e22900-6140-4470-aca6-4a0aa7d8e32f", "DetectTime": "2024-05-21T12:48:33.813358+00:00", "EventTime": "2024-05-21T12:48:33.813378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0h32B2QwkHaBjGAbh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "67926336-f4c0-44df-9512-4a4d5bf0c062", "DetectTime": "2024-05-21T12:48:33.819041+00:00", "EventTime": "2024-05-21T12:48:33.819059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIECNU3jL2X9pCr1Gg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "d01ebdf7-9805-46c4-a8a6-d002d34a2a65", "DetectTime": "2024-05-21T12:48:33.823761+00:00", "EventTime": "2024-05-21T12:48:33.823779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUiuLA3ix8ghmi9N0a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "16443f00-fc6b-412f-885a-dd1f418c1a05", "DetectTime": "2024-05-21T12:48:33.828534+00:00", "EventTime": "2024-05-21T12:48:33.828552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDW9q24e94jb1iugM8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "eacb0864-9fc2-4333-afe2-21b41816f255", "DetectTime": "2024-05-21T12:48:33.833794+00:00", "EventTime": "2024-05-21T12:48:33.833812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfM9mhYMc9mXK0N4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "06fa34a2-eab5-4126-835d-4b0ec145658b", "DetectTime": "2024-05-21T12:48:34.327605+00:00", "EventTime": "2024-05-21T12:48:34.327629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8kNWy2PkA0viQ6tX3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "e4f6be44-c9d1-4b4f-9488-e8b917a6b847", "DetectTime": "2024-05-21T12:48:34.334972+00:00", "EventTime": "2024-05-21T12:48:34.334992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6js3X24GbB5SsgD1l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "97d9cb1b-a2e2-4109-8498-85aa613818d2", "DetectTime": "2024-05-21T12:48:34.433481+00:00", "EventTime": "2024-05-21T12:48:34.433500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccsb3L3W8lFhjx3vgd"], "accumulated_threat_level": 10.100000000000001, "timewindow": 158} +{"Format": "IDEA0", "ID": "2b53643c-dd00-4564-b31d-019053e99632", "DetectTime": "2024-05-21T12:48:34.438328+00:00", "EventTime": "2024-05-21T12:48:34.438346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzF3sS3uBCXy0HTM7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "d36f8ed0-880a-404a-bcdc-240b57743a66", "DetectTime": "2024-05-21T12:48:34.442950+00:00", "EventTime": "2024-05-21T12:48:34.442968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuq5Iy2rOIWKTpGX2l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "043cc729-678f-43d9-9ac2-ce7357571764", "DetectTime": "2024-05-21T12:48:34.853905+00:00", "EventTime": "2024-05-21T12:48:34.853924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTZl0O2ei9GPgLhSH3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "c9f0f7ef-ef84-4c6d-abce-b0c664b36671", "DetectTime": "2024-05-21T12:48:34.871191+00:00", "EventTime": "2024-05-21T12:48:34.871214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvUymy4TenLdA0fze"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "07af206a-c419-4a0d-89ab-5a4ddd8d314d", "DetectTime": "2024-05-21T12:48:34.893290+00:00", "EventTime": "2024-05-21T12:48:34.893311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwZyr171fjRtrBnUa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "62f10e5e-a04a-4d82-ab58-c4f812571892", "DetectTime": "2024-05-21T12:48:34.941007+00:00", "EventTime": "2024-05-21T12:48:34.941029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDvxq4Mr3BANwOTZ9"], "accumulated_threat_level": 10.900000000000002, "timewindow": 158} +{"Format": "IDEA0", "ID": "cc5389c3-3049-4787-8723-9c131877c7fa", "DetectTime": "2024-05-21T12:48:34.983917+00:00", "EventTime": "2024-05-21T12:48:34.983939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFbmrz4G0cAZS6pJEc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "077eec95-3e07-4606-87a9-9ae0cad50beb", "DetectTime": "2024-05-21T12:48:34.990689+00:00", "EventTime": "2024-05-21T12:48:34.990709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqwbB61p7xsegGsnDh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "71d290e3-5d82-4d8d-9ae7-18b2ccdfccd4", "DetectTime": "2024-05-21T12:48:34.996188+00:00", "EventTime": "2024-05-21T12:48:34.996210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXeCsj4RanyxOaNTlk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "86e25472-7e67-4d90-95bc-5cdf6a7d3ffc", "DetectTime": "2024-05-21T12:48:35.001232+00:00", "EventTime": "2024-05-21T12:48:35.001250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnL8tE1iNnMI8cbgNh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "a36daab7-29ad-4525-b3c1-852acabaf262", "DetectTime": "2024-05-21T12:48:35.005811+00:00", "EventTime": "2024-05-21T12:48:35.005829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl2stw1hSKNddUcpWh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "7c0c9f19-c2ba-4a0e-97a3-a9a77ef99819", "DetectTime": "2024-05-21T12:48:35.010492+00:00", "EventTime": "2024-05-21T12:48:35.010510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJdTcl4BbUCgu5A5He"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "3413acb4-c2a4-4f85-a866-f9c75fd3e837", "DetectTime": "2024-05-21T12:48:35.375631+00:00", "EventTime": "2024-05-21T12:48:35.375653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrE0Tu4wa7GfhtkW3h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "3141ac93-305c-45f7-9012-16b65c758092", "DetectTime": "2024-05-21T12:48:35.654133+00:00", "EventTime": "2024-05-21T12:48:35.654157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsAVo1TE3YSC0lR4a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "248ff4cf-8d8b-4388-8e85-c81edd15eea2", "DetectTime": "2024-05-21T12:48:35.664283+00:00", "EventTime": "2024-05-21T12:48:35.664304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgOam5GRi57d3yhU6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "cb4fc881-a057-41ca-a795-e679fd5c61c5", "DetectTime": "2024-05-21T12:48:35.669615+00:00", "EventTime": "2024-05-21T12:48:35.669634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZwd8k4yOIe1rPBVqj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "2296d31a-a109-45bb-b51e-644658c34c9b", "DetectTime": "2024-05-21T12:48:35.675464+00:00", "EventTime": "2024-05-21T12:48:35.675483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd9jDrJAtiMv2DrI1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "f768f4cc-4c2d-4e14-9069-0950b9c0de1a", "DetectTime": "2024-05-21T12:48:35.680291+00:00", "EventTime": "2024-05-21T12:48:35.680309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmQr341PHLjtXsYBf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "6739b5cf-3384-489c-982f-e43599062c87", "DetectTime": "2024-05-21T12:48:35.685458+00:00", "EventTime": "2024-05-21T12:48:35.685476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Bx0k3VobQhrXGruk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "43ecb4b3-9f8e-44b9-ac12-32a47bcca8f4", "DetectTime": "2024-05-21T12:48:35.690526+00:00", "EventTime": "2024-05-21T12:48:35.690544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTNn1e1O8ybgVpK4ye"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "fce80fe1-2f13-4e73-9f9f-6f68a528d6a0", "DetectTime": "2024-05-21T12:48:35.696058+00:00", "EventTime": "2024-05-21T12:48:35.696085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzboJ81TPzRYu9PSIk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "d607b23a-c344-491f-bcc8-cf20c1b31014", "DetectTime": "2024-05-21T12:48:36.174434+00:00", "EventTime": "2024-05-21T12:48:36.174454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci7F3A49cOU2rZ5mla"], "accumulated_threat_level": 11.700000000000003, "timewindow": 158} +{"Format": "IDEA0", "ID": "9f66b95c-9be0-48a0-8867-e64b08941530", "DetectTime": "2024-05-21T12:48:36.205200+00:00", "EventTime": "2024-05-21T12:48:36.205221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1nFY3qn4hkDq1FL9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "50816cd6-c5ca-4cf8-abab-ed1f1ba6fe2c", "DetectTime": "2024-05-21T12:48:36.211650+00:00", "EventTime": "2024-05-21T12:48:36.211749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuIiJr3w4ZGO8dBR74"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "1a918453-f0aa-4c01-b096-dd3b8d4b8fdc", "DetectTime": "2024-05-21T12:48:36.478451+00:00", "EventTime": "2024-05-21T12:48:36.478472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY9ZK9WRbzvxFvQr7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "31a2eb7d-e59b-43dd-957e-15deeecd0ae3", "DetectTime": "2024-05-21T12:48:36.712508+00:00", "EventTime": "2024-05-21T12:48:36.712529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5Epq3XN7R4MQmtS1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "3decd72c-38f5-4a24-81b7-3370b405b962", "DetectTime": "2024-05-21T12:48:36.759635+00:00", "EventTime": "2024-05-21T12:48:36.759660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnGgE2S5LIJvLtw51"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "ca5fd3bb-fb69-440b-a810-3495debf61ec", "DetectTime": "2024-05-21T12:48:36.784179+00:00", "EventTime": "2024-05-21T12:48:36.784200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHof7r4mvhPHkUpDwe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "9e0a0b36-2961-4d96-9e91-b0a89f616fc5", "DetectTime": "2024-05-21T12:48:36.790718+00:00", "EventTime": "2024-05-21T12:48:36.790741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd65HsLl2uGXoXg18"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "48f1dfab-34c7-4914-a957-ea889828fdd2", "DetectTime": "2024-05-21T12:48:36.795879+00:00", "EventTime": "2024-05-21T12:48:36.795899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBwMqq2mJYP9oJVJ16"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "a1b3b1ff-1946-45dd-839b-3c4de24b5015", "DetectTime": "2024-05-21T12:48:36.816861+00:00", "EventTime": "2024-05-21T12:48:36.816881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4bKeb0QwB9QjKC39"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "c84e14ca-6227-4d5f-9396-e3005b1db070", "DetectTime": "2024-05-21T12:48:36.915772+00:00", "EventTime": "2024-05-21T12:48:36.915795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv16WS1rbNdPFQpJwk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "c424304d-4730-420e-b848-fac28de5a314", "DetectTime": "2024-05-21T12:48:37.149988+00:00", "EventTime": "2024-05-21T12:48:37.150009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHErE2i99EOHcaLlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "711f85da-7b8d-4502-9766-1a60bb5df8cd", "DetectTime": "2024-05-21T12:48:37.191911+00:00", "EventTime": "2024-05-21T12:48:37.191932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPByp3OiUv0IV7Bte"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "800d15f5-686f-4330-b2d9-cb15a8d5db39", "DetectTime": "2024-05-21T12:48:37.270996+00:00", "EventTime": "2024-05-21T12:48:37.271018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU07ps3KYBoI03Y5W8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "8a0d2f94-b123-4fde-a06a-fa5677af7b0a", "DetectTime": "2024-05-21T12:48:37.363864+00:00", "EventTime": "2024-05-21T12:48:37.363884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelKs515kTv2mTkF7b"], "accumulated_threat_level": 12.500000000000004, "timewindow": 158} +{"Format": "Json", "ID": "8a0d2f94-b123-4fde-a06a-fa5677af7b0a", "DetectTime": "2024-05-21T12:48:37.363864+00:00", "EventTime": "2024-05-21T12:48:37.363884+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-07T13:19:42.043163+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2024/05/21 12:48:37.565961)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 158, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "3fa5bfe5-4495-4336-9bef-35388d10fe3b", "DetectTime": "2024-05-21T12:48:37.714684+00:00", "EventTime": "2024-05-21T12:48:37.714706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW0rtbPpOoucvyAw6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "8dce5d57-ccea-463b-b464-ddb4f04bb136", "DetectTime": "2024-05-21T12:48:37.724803+00:00", "EventTime": "2024-05-21T12:48:37.724822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmAcxy24CTedpRmC5c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "499eacee-9389-4e55-9c7a-7611fe123175", "DetectTime": "2024-05-21T12:48:37.766894+00:00", "EventTime": "2024-05-21T12:48:37.766916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMG1Oh19EY4HXhC8xl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "c38fb437-c8f5-4132-8b62-5695c94e6e71", "DetectTime": "2024-05-21T12:48:37.846828+00:00", "EventTime": "2024-05-21T12:48:37.846851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbzLxvkerjoWVKX1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "ef7c4d38-b1f1-4a32-a36a-144d53c9db4c", "DetectTime": "2024-05-21T12:48:37.864793+00:00", "EventTime": "2024-05-21T12:48:37.864812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzGiaEGOSngRV5PTj"], "accumulated_threat_level": 0.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "f7056cb0-78b7-4375-81c9-39fc2ac36ac9", "DetectTime": "2024-05-21T12:48:37.926316+00:00", "EventTime": "2024-05-21T12:48:37.926336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdWyBi4E9OOy4CKbzj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "43a89fe3-9009-4df3-a337-33c6c336c62a", "DetectTime": "2024-05-21T12:48:38.195789+00:00", "EventTime": "2024-05-21T12:48:38.195811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTQjeS16XhG2ckhdmh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "848e092f-3da7-4694-bbb4-69b0859e03c5", "DetectTime": "2024-05-21T12:48:38.236387+00:00", "EventTime": "2024-05-21T12:48:38.236408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRGMV1aL6oPQlWJzb"], "accumulated_threat_level": 1.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "b71ea19c-7a08-453f-9a32-471620ba1dc3", "DetectTime": "2024-05-21T12:48:38.286180+00:00", "EventTime": "2024-05-21T12:48:38.286201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyDK8b1hfWrp8kLhib"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 158} +{"Format": "IDEA0", "ID": "e90296ca-7afa-4d95-a4d5-c66f322b79f0", "DetectTime": "2024-05-21T12:48:38.333003+00:00", "EventTime": "2024-05-21T12:48:38.333023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lrq3dcgQVLpxeH"], "accumulated_threat_level": 3.2, "timewindow": 158} +{"Format": "IDEA0", "ID": "84a3216b-73bc-4da3-8bd7-bdeebdc9f2a3", "DetectTime": "2024-05-21T12:48:38.382670+00:00", "EventTime": "2024-05-21T12:48:38.382689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1uiF27VCfyWF1QH7"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "74a879f4-2108-4fe1-aeb7-7ea5bccee825", "DetectTime": "2024-05-21T12:48:38.430284+00:00", "EventTime": "2024-05-21T12:48:38.430303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGB8QG3joUuvFcnPic"], "accumulated_threat_level": 4.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "b983b419-ede7-4f79-aaf4-e8f9e2e92d94", "DetectTime": "2024-05-21T12:48:38.479551+00:00", "EventTime": "2024-05-21T12:48:38.479572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chzdt74cOzanRE6ghb"], "accumulated_threat_level": 5.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "ef98e6ae-8f40-40ba-a8d3-7f87d5cedb39", "DetectTime": "2024-05-21T12:48:38.531256+00:00", "EventTime": "2024-05-21T12:48:38.531282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNecyo2rlYXBppDYEf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 158} +{"Format": "IDEA0", "ID": "4f6f74c9-24a6-43b4-9a92-6fe6b68432d1", "DetectTime": "2024-05-21T12:48:38.804394+00:00", "EventTime": "2024-05-21T12:48:38.804415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzoK0qo0EebTwSsj3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "532fe8ec-5dff-41dd-ad5d-b32ebce00984", "DetectTime": "2024-05-21T12:48:38.853118+00:00", "EventTime": "2024-05-21T12:48:38.853137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqYdvf271XgCKjQ6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "a0b53de9-c188-413f-9844-44e947ff6ba7", "DetectTime": "2024-05-21T12:48:38.893217+00:00", "EventTime": "2024-05-21T12:48:38.893238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSZAY22p4X7jx9Yrc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "611ec2fa-a488-40ba-8ee7-e41255072b7a", "DetectTime": "2024-05-21T12:48:38.950583+00:00", "EventTime": "2024-05-21T12:48:38.950611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdM6353sCk1aYpew92"], "accumulated_threat_level": 7.999999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "0d29f2c8-da20-4354-8ce5-2dd21c601a54", "DetectTime": "2024-05-21T12:48:38.991068+00:00", "EventTime": "2024-05-21T12:48:38.991089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClwlXD137jdN2F4Dhe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "2bd81376-2b2d-48a1-b828-bb4b22ca8e68", "DetectTime": "2024-05-21T12:48:39.049935+00:00", "EventTime": "2024-05-21T12:48:39.049953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbaaIVhM11beB4S27"], "accumulated_threat_level": 9.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "34f222be-154e-4857-8536-1799636b4e45", "DetectTime": "2024-05-21T12:48:39.103240+00:00", "EventTime": "2024-05-21T12:48:39.103261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8Tn81AFMh52KHKj2"], "accumulated_threat_level": 10.4, "timewindow": 158} +{"Format": "IDEA0", "ID": "13e3bba4-1aa1-4c48-8def-fd1f9b2da461", "DetectTime": "2024-05-21T12:48:39.362168+00:00", "EventTime": "2024-05-21T12:48:39.362190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuqpEq4fX9fZzquwjh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "07852096-e8fc-47df-8f3a-91b2ad58042e", "DetectTime": "2024-05-21T12:48:39.409190+00:00", "EventTime": "2024-05-21T12:48:39.409224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFNlW1L7OdN7MaBJ1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 158} +{"Format": "IDEA0", "ID": "f77b15ac-d95a-4945-a493-7046783c9af7", "DetectTime": "2024-05-21T12:48:39.458997+00:00", "EventTime": "2024-05-21T12:48:39.459016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiI4602k10uUTzSzld"], "accumulated_threat_level": 12.000000000000002, "timewindow": 158} +{"Format": "Json", "ID": "f77b15ac-d95a-4945-a493-7046783c9af7", "DetectTime": "2024-05-21T12:48:39.458997+00:00", "EventTime": "2024-05-21T12:48:39.459016+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T13:20:02.083363+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2024/05/21 12:48:39.825642)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 158, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9b147596-8f85-43f1-b340-cd30d4333621", "DetectTime": "2024-05-21T12:48:39.835318+00:00", "EventTime": "2024-05-21T12:48:39.835336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfVK5dnUxFax07E9"], "accumulated_threat_level": 0.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "79f62b52-d6e3-41f2-b3fc-c3f3e51ea333", "DetectTime": "2024-05-21T12:48:39.849708+00:00", "EventTime": "2024-05-21T12:48:39.849725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWG5UgCagYBOcNzf"], "accumulated_threat_level": 1.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "947d1226-9ca5-4d9b-9664-b39e7bfdd620", "DetectTime": "2024-05-21T12:48:39.861155+00:00", "EventTime": "2024-05-21T12:48:39.861191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcxrnusoqF7EfGsc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 158} +{"Format": "IDEA0", "ID": "f715bb21-759c-4f5a-9937-a44be9be4f9f", "DetectTime": "2024-05-21T12:48:39.873325+00:00", "EventTime": "2024-05-21T12:48:39.873357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvmxO26G4w1fRwEGf"], "accumulated_threat_level": 3.2, "timewindow": 158} +{"Format": "IDEA0", "ID": "5d06f1cc-cd9f-4565-b41e-2d6fe0f6ba62", "DetectTime": "2024-05-21T12:48:39.935521+00:00", "EventTime": "2024-05-21T12:48:39.935555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6ylq4TJN4TEfpXi6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "50d428c1-43ee-4ab4-8d3f-1a69ade5acef", "DetectTime": "2024-05-21T12:48:39.981521+00:00", "EventTime": "2024-05-21T12:48:39.981541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COl3TI3GaqSs2ZOZHd"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "62be6a61-8492-401d-8fd4-dc5148ac446c", "DetectTime": "2024-05-21T12:48:40.030888+00:00", "EventTime": "2024-05-21T12:48:40.030908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIImGU1jXQpsSTqrT"], "accumulated_threat_level": 4.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "cf17be61-e50b-4609-849a-624fab52dbc0", "DetectTime": "2024-05-21T12:48:40.077679+00:00", "EventTime": "2024-05-21T12:48:40.077700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfXGOC1i2ruTwK54Kk"], "accumulated_threat_level": 5.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "cdeec39b-22e5-4994-a09b-b9ecebbc3a95", "DetectTime": "2024-05-21T12:48:40.120160+00:00", "EventTime": "2024-05-21T12:48:40.120182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg2yM54WVaEN6BB567"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "36f7d3fb-b7ba-43ac-a8a8-9bdd9b995de1", "DetectTime": "2024-05-21T12:48:40.168526+00:00", "EventTime": "2024-05-21T12:48:40.168545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiDy6w3CB4QdGMC2Fc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 158} +{"Format": "IDEA0", "ID": "a40e4571-60d5-4d58-af14-b7486d427949", "DetectTime": "2024-05-21T12:48:40.317416+00:00", "EventTime": "2024-05-21T12:48:40.317435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSZT7231uI2l7dP61"], "accumulated_threat_level": 7.199999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "3ce56583-0b52-487d-ae65-77ed1e06ad7c", "DetectTime": "2024-05-21T12:48:40.406948+00:00", "EventTime": "2024-05-21T12:48:40.406968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoByJ3wG4NrmUwjX6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "f7760756-db16-436a-aebc-638fbf0c1ea3", "DetectTime": "2024-05-21T12:48:40.777467+00:00", "EventTime": "2024-05-21T12:48:40.777491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmm7mP2NTcFaWCTA5f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 157} +{"Format": "IDEA0", "ID": "77d7e132-06b2-43de-ba06-86d34b6c7ed4", "DetectTime": "2024-05-21T12:48:40.900665+00:00", "EventTime": "2024-05-21T12:48:40.900685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmPsal3KbmR8W5Tp7k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "4d246a93-539d-459d-9769-5e302848f275", "DetectTime": "2024-05-21T12:48:40.950161+00:00", "EventTime": "2024-05-21T12:48:40.950180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXZLH19chW3Dl49a5"], "accumulated_threat_level": 9.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "2027c9ed-ad4b-4d8f-aeda-aa2dcc4fd38a", "DetectTime": "2024-05-21T12:48:40.999849+00:00", "EventTime": "2024-05-21T12:48:40.999869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crlhhs2phlcHo8tL0j"], "accumulated_threat_level": 10.4, "timewindow": 158} +{"Format": "IDEA0", "ID": "cb969971-dc27-457e-8f80-6d206697ff2b", "DetectTime": "2024-05-21T12:48:41.048986+00:00", "EventTime": "2024-05-21T12:48:41.049004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKTYQl4f8kBvDH7bt8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 158} +{"Format": "IDEA0", "ID": "7d88c543-5f12-4a4e-91d7-3a589d0d7688", "DetectTime": "2024-05-21T12:48:41.100669+00:00", "EventTime": "2024-05-21T12:48:41.100689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7CrG3qo1wRGs87rc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 158} +{"Format": "Json", "ID": "7d88c543-5f12-4a4e-91d7-3a589d0d7688", "DetectTime": "2024-05-21T12:48:41.100669+00:00", "EventTime": "2024-05-21T12:48:41.100689+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-07T13:51:12.092518+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2024/05/21 12:48:41.302618)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 158, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bd6bb97d-f3f0-4ea3-b654-377fd6a498b2", "DetectTime": "2024-05-21T12:48:41.385283+00:00", "EventTime": "2024-05-21T12:48:41.385305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmMlJvFxb3ptgUx6"], "accumulated_threat_level": 0.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "2e416ac2-86de-4cb6-a466-8f8912851efd", "DetectTime": "2024-05-21T12:48:41.433466+00:00", "EventTime": "2024-05-21T12:48:41.433485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQQHL3hxYZe0NHjul"], "accumulated_threat_level": 1.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "bad284fa-0b11-4060-8536-965a848cb7af", "DetectTime": "2024-05-21T12:48:41.487587+00:00", "EventTime": "2024-05-21T12:48:41.487605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblxJ12h7Q7xq0XuO2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 158} +{"Format": "IDEA0", "ID": "7377f6bf-00cb-404f-a713-43dc26a27caa", "DetectTime": "2024-05-21T12:48:41.537329+00:00", "EventTime": "2024-05-21T12:48:41.537350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW8zEdIlasr1TKrg"], "accumulated_threat_level": 3.2, "timewindow": 158} +{"Format": "IDEA0", "ID": "16bbcd54-054b-4778-9dc3-0f698b296841", "DetectTime": "2024-05-21T12:48:41.682325+00:00", "EventTime": "2024-05-21T12:48:41.682345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJOkc39u3PiTQB1o6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "451bcb3b-98d4-4e5d-89d4-34d0fa1c9588", "DetectTime": "2024-05-21T12:48:41.706398+00:00", "EventTime": "2024-05-21T12:48:41.706438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRyj0EQb1CuChPXej"], "accumulated_threat_level": 4.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "10e6b5e4-068a-49a4-96bc-91e602878b5b", "DetectTime": "2024-05-21T12:48:41.756368+00:00", "EventTime": "2024-05-21T12:48:41.756388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNoDjC4Vu8iRzYJWv3"], "accumulated_threat_level": 5.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "a871ccc9-d08c-4866-8f36-54550eba8474", "DetectTime": "2024-05-21T12:48:41.807704+00:00", "EventTime": "2024-05-21T12:48:41.807726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYEfN1e7qhfX8B67g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 158} +{"Format": "IDEA0", "ID": "98c1d535-c3e1-468f-bcdf-457618db143c", "DetectTime": "2024-05-21T12:48:42.081356+00:00", "EventTime": "2024-05-21T12:48:42.081381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKTKd3ftpT5eeaJ24"], "accumulated_threat_level": 7.199999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "48074a2f-546a-4dc1-bc8b-5d5357d4db0f", "DetectTime": "2024-05-21T12:48:42.130911+00:00", "EventTime": "2024-05-21T12:48:42.130933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDPjm1PegCx35wJuk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "f46bdf15-824f-4222-8e9d-8e4465b76087", "DetectTime": "2024-05-21T12:48:42.185997+00:00", "EventTime": "2024-05-21T12:48:42.186019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSphX3tVlQHsKLsMj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "c3258e03-b50b-44b9-a397-05b1792c5f66", "DetectTime": "2024-05-21T12:48:42.259115+00:00", "EventTime": "2024-05-21T12:48:42.259133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44Isf2RId31qxIqZ2"], "accumulated_threat_level": 9.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "baa1e7ce-97cb-4daa-a0b6-5cdde1e67e53", "DetectTime": "2024-05-21T12:48:42.287470+00:00", "EventTime": "2024-05-21T12:48:42.287491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG3uts2GBShSI19Vi"], "accumulated_threat_level": 10.4, "timewindow": 158} +{"Format": "IDEA0", "ID": "67c43a51-87a9-494e-a2b6-dafec2cc12fa", "DetectTime": "2024-05-21T12:48:42.333818+00:00", "EventTime": "2024-05-21T12:48:42.333836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPkLHFQ67GxO0WIi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 158} +{"Format": "IDEA0", "ID": "7f173c32-d324-4a46-9bc1-ce5551a9f740", "DetectTime": "2024-05-21T12:48:42.390529+00:00", "EventTime": "2024-05-21T12:48:42.390550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUu1ne1lXHhN68yxp2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 158} +{"Format": "Json", "ID": "7f173c32-d324-4a46-9bc1-ce5551a9f740", "DetectTime": "2024-05-21T12:48:42.390529+00:00", "EventTime": "2024-05-21T12:48:42.390550+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-07T13:51:20.976880+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2024/05/21 12:48:42.614742)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 158, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0a8e4e10-2e38-465c-bb4f-51dd01d8769b", "DetectTime": "2024-05-21T12:48:42.644566+00:00", "EventTime": "2024-05-21T12:48:42.644587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgjIo33GydRB9QAmd"], "accumulated_threat_level": 0, "timewindow": 158} +{"Format": "IDEA0", "ID": "abd8d077-320d-4931-865d-b6991bd8a323", "DetectTime": "2024-05-21T12:48:42.692853+00:00", "EventTime": "2024-05-21T12:48:42.692876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUrxR3BSAcST37tBj"], "accumulated_threat_level": 0.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "9a489fe4-692d-4113-84f5-bfad0f40e893", "DetectTime": "2024-05-21T12:48:42.747951+00:00", "EventTime": "2024-05-21T12:48:42.747972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHw3ok41gB6ei0cJuj"], "accumulated_threat_level": 1.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "3cdc9dd3-1d3d-48b1-95b3-70f7bb974dec", "DetectTime": "2024-05-21T12:48:42.804555+00:00", "EventTime": "2024-05-21T12:48:42.804574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNu6tAJsErBrUWlfj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 158} +{"Format": "IDEA0", "ID": "6afadef0-0fee-4e2b-81de-3f13fd8c1f5f", "DetectTime": "2024-05-21T12:48:42.847719+00:00", "EventTime": "2024-05-21T12:48:42.847738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoD1TL1HeNPGWMvcfl"], "accumulated_threat_level": 3.2, "timewindow": 158} +{"Format": "IDEA0", "ID": "52744c64-3222-4035-999e-d27bbea3b880", "DetectTime": "2024-05-21T12:48:42.886536+00:00", "EventTime": "2024-05-21T12:48:42.886558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFPg516zCmQVkrvV"], "accumulated_threat_level": 3.2, "timewindow": 158} +{"Format": "IDEA0", "ID": "894e1c47-8884-41d5-ae65-ba89296f14a2", "DetectTime": "2024-05-21T12:48:42.938123+00:00", "EventTime": "2024-05-21T12:48:42.938147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch5R7l1OFXb4hYVDT"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "fc8d9102-b112-45ee-9201-0fb178830bec", "DetectTime": "2024-05-21T12:48:43.219540+00:00", "EventTime": "2024-05-21T12:48:43.219563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHFoE2TlgUk7TV2e1"], "accumulated_threat_level": 4.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "1e194517-a023-4c0f-b0f9-aea2bfb846ef", "DetectTime": "2024-05-21T12:48:43.366552+00:00", "EventTime": "2024-05-21T12:48:43.366575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLAZG1WfhdzWqBIa6"], "accumulated_threat_level": 5.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "babbe69f-7b47-4f7f-824e-4cf293adddb1", "DetectTime": "2024-05-21T12:48:43.378719+00:00", "EventTime": "2024-05-21T12:48:43.378737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6M9521Yuu8UT2wGV3"], "accumulated_threat_level": 5.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "35609c9d-8e77-489b-971e-90ecb605254f", "DetectTime": "2024-05-21T12:48:43.428760+00:00", "EventTime": "2024-05-21T12:48:43.428787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.109.245.154"]}], "Attach": [{"Content": "Connection to unknown destination port 1024/UDP destination IP 93.109.245.154. AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cey9Bqgbu2ta1CmWf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 158} +{"Format": "IDEA0", "ID": "5e431d6b-9969-4a70-8c5e-a88562308d36", "DetectTime": "2024-05-21T12:48:43.476970+00:00", "EventTime": "2024-05-21T12:48:43.476991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsF8hJ199lykZGo919"], "accumulated_threat_level": 7.199999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "c59c4b9b-e91d-431b-a366-f85e03dd18cd", "DetectTime": "2024-05-21T12:48:43.526999+00:00", "EventTime": "2024-05-21T12:48:43.527017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihMrq1CTJnzx3HtI7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "21f093b2-1cd0-4870-b2c5-96353d97cfdf", "DetectTime": "2024-05-21T12:48:43.570186+00:00", "EventTime": "2024-05-21T12:48:43.570206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNB7Yr33rBnuWPxFD1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 158} +{"Format": "IDEA0", "ID": "709642c3-20e4-4dd1-bd1d-5eac4b6b747e", "DetectTime": "2024-05-21T12:48:43.617366+00:00", "EventTime": "2024-05-21T12:48:43.617389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nReZ284YLQ5ifPs"], "accumulated_threat_level": 9.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "d3e47e42-b2e3-4f83-80b2-072e3c35ff05", "DetectTime": "2024-05-21T12:48:43.871216+00:00", "EventTime": "2024-05-21T12:48:43.871243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHpvaG2lFwBIOmFLwi"], "accumulated_threat_level": 9.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "e2d75a22-538e-47a2-9866-fe54a955c642", "DetectTime": "2024-05-21T12:48:43.914854+00:00", "EventTime": "2024-05-21T12:48:43.914888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.189.57.28"]}], "Attach": [{"Content": "Connection to unknown destination port 8989/UDP destination IP 90.189.57.28. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEAwsX7UPJbJpA8d"], "accumulated_threat_level": 10.4, "timewindow": 158} +{"Format": "IDEA0", "ID": "72e8f938-d084-40f2-97cb-741d5ee73f16", "DetectTime": "2024-05-21T12:48:43.964486+00:00", "EventTime": "2024-05-21T12:48:43.964526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfwx5f1397wP1Y5vgh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 158} +{"Format": "IDEA0", "ID": "2fc2fff3-cf3e-4088-92b7-ac52eb02fd5e", "DetectTime": "2024-05-21T12:48:44.009984+00:00", "EventTime": "2024-05-21T12:48:44.010005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcqpi1JSEagyEn5Cj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 158} +{"Format": "Json", "ID": "2fc2fff3-cf3e-4088-92b7-ac52eb02fd5e", "DetectTime": "2024-05-21T12:48:44.009984+00:00", "EventTime": "2024-05-21T12:48:44.010005+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-07T13:51:24.329438+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 158. (real time 2024/05/21 12:48:44.253477)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 158, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "adb112f4-ab4d-499b-93dc-f543db100b63", "DetectTime": "2024-05-21T12:48:44.265841+00:00", "EventTime": "2024-05-21T12:48:44.265862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNvWG54kTpTbVXvH6"], "accumulated_threat_level": 0.8, "timewindow": 158} +{"Format": "IDEA0", "ID": "1ca57da1-1f03-4e12-be2d-505abc81a82f", "DetectTime": "2024-05-21T12:48:44.276749+00:00", "EventTime": "2024-05-21T12:48:44.276776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXr6gZ333DRlogiSxj"], "accumulated_threat_level": 1.6, "timewindow": 158} +{"Format": "IDEA0", "ID": "a7279b8e-558a-4cf3-b4ba-9b4c43c38f2f", "DetectTime": "2024-05-21T12:48:44.288140+00:00", "EventTime": "2024-05-21T12:48:44.288159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqWDL72X8245UiLsT3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 158} +{"Format": "IDEA0", "ID": "e09e6162-06ee-4c1f-9cd0-e2d35f767d87", "DetectTime": "2024-05-21T12:48:44.401991+00:00", "EventTime": "2024-05-21T12:48:44.402017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeiFFO3PwLijc6LYvi"], "accumulated_threat_level": 3.2, "timewindow": 158} +{"Format": "IDEA0", "ID": "39688512-a84f-45f6-8e6b-12ab37bab685", "DetectTime": "2024-05-21T12:48:44.452505+00:00", "EventTime": "2024-05-21T12:48:44.452535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClmH8F4tEQ6cDLdkW3"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "45a601b3-7266-4e76-9a91-36087b1937ad", "DetectTime": "2024-05-21T12:48:44.509090+00:00", "EventTime": "2024-05-21T12:48:44.509114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcbV033cd16VUmFIj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "83fe267d-3acf-45c4-a58f-0052aadfdda2", "DetectTime": "2024-05-21T12:48:44.626640+00:00", "EventTime": "2024-05-21T12:48:44.626660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqU9317KoULgmQub8"], "accumulated_threat_level": 1.3, "timewindow": 159} +{"Format": "IDEA0", "ID": "2773a08c-0647-4e00-b841-6219b46b30e2", "DetectTime": "2024-05-21T12:48:44.765179+00:00", "EventTime": "2024-05-21T12:48:44.765202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQMBz37wo5rqdks9a"], "accumulated_threat_level": 2.1, "timewindow": 159} +{"Format": "IDEA0", "ID": "6b50b295-8b0f-4c23-a0d5-00415e9928eb", "DetectTime": "2024-05-21T12:48:44.814234+00:00", "EventTime": "2024-05-21T12:48:44.814257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cSl14lYuroNU2UYa"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 159} +{"Format": "IDEA0", "ID": "138923ac-afa4-4403-b697-a48e4f43c0ec", "DetectTime": "2024-05-21T12:48:44.861599+00:00", "EventTime": "2024-05-21T12:48:44.861631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9glm4rohVUCaICy4"], "accumulated_threat_level": 3.7, "timewindow": 159} +{"Format": "IDEA0", "ID": "f777bb13-678b-4623-805b-328c060b19ea", "DetectTime": "2024-05-21T12:48:45.114499+00:00", "EventTime": "2024-05-21T12:48:45.114519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSIWZFpVnIF8liVSd"], "accumulated_threat_level": 4.5, "timewindow": 159} +{"Format": "IDEA0", "ID": "d8afe6f6-dc2b-4bb5-b2ca-eb47f7861670", "DetectTime": "2024-05-21T12:48:45.153193+00:00", "EventTime": "2024-05-21T12:48:45.153214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CATB5u29AnBom66rLi"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "026423cb-9918-4837-8281-a2fdfc0255df", "DetectTime": "2024-05-21T12:48:45.196655+00:00", "EventTime": "2024-05-21T12:48:45.196676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckzpuo3yi0JJ36ZMdc"], "accumulated_threat_level": 5.3, "timewindow": 159} +{"Format": "IDEA0", "ID": "14f3b66e-83f4-4c75-87c7-d28dbac7f29c", "DetectTime": "2024-05-21T12:48:45.247058+00:00", "EventTime": "2024-05-21T12:48:45.247076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrglhY2zdRx287ti82"], "accumulated_threat_level": 6.1, "timewindow": 159} +{"Format": "IDEA0", "ID": "784d5adb-64d3-47f4-b6d9-4ef655872d52", "DetectTime": "2024-05-21T12:48:45.297066+00:00", "EventTime": "2024-05-21T12:48:45.297090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXlqF027x7G1xzy6qf"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 159} +{"Format": "IDEA0", "ID": "97efe284-31d3-4e1a-b70c-fee6f2b5dbba", "DetectTime": "2024-05-21T12:48:45.346466+00:00", "EventTime": "2024-05-21T12:48:45.346484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEL0Db4AtYbfsQz9Th"], "accumulated_threat_level": 7.699999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "7ffa1434-f5ac-4747-b0df-8f17d42d55b3", "DetectTime": "2024-05-21T12:48:45.394608+00:00", "EventTime": "2024-05-21T12:48:45.394625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv87KwgDmnmFJgz"], "accumulated_threat_level": 8.5, "timewindow": 159} +{"Format": "IDEA0", "ID": "97a2e49b-a1de-4003-8865-766596451d4b", "DetectTime": "2024-05-21T12:48:45.442699+00:00", "EventTime": "2024-05-21T12:48:45.442721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIz64p22gDofm27ii1"], "accumulated_threat_level": 9.3, "timewindow": 159} +{"Format": "IDEA0", "ID": "238c5e64-521e-4d54-b43e-806bfc5eafb5", "DetectTime": "2024-05-21T12:48:45.705554+00:00", "EventTime": "2024-05-21T12:48:45.705572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2srp4JKZ35VSXNVl"], "accumulated_threat_level": 10.100000000000001, "timewindow": 159} +{"Format": "IDEA0", "ID": "e2a4d425-fea8-4cbc-a4b7-f50750137ce2", "DetectTime": "2024-05-21T12:48:45.752107+00:00", "EventTime": "2024-05-21T12:48:45.752130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct62cW3ePUIQQchRR6"], "accumulated_threat_level": 10.900000000000002, "timewindow": 159} +{"Format": "IDEA0", "ID": "6584eaa3-659b-459f-9b92-cf237c58295a", "DetectTime": "2024-05-21T12:48:45.798611+00:00", "EventTime": "2024-05-21T12:48:45.798629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl4f114r1fytK9yqD5"], "accumulated_threat_level": 11.700000000000003, "timewindow": 159} +{"Format": "IDEA0", "ID": "8e6a04c1-0dbb-4c7a-a91d-f27d70a02d5b", "DetectTime": "2024-05-21T12:48:45.835679+00:00", "EventTime": "2024-05-21T12:48:45.835701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYx7Wg2uWjednrJax"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "4936d392-0747-4956-a2ad-32a97df64e96", "DetectTime": "2024-05-21T12:48:45.877702+00:00", "EventTime": "2024-05-21T12:48:45.877740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFjwF1NVff7dmOcp4"], "accumulated_threat_level": 12.500000000000004, "timewindow": 159} +{"Format": "Json", "ID": "4936d392-0747-4956-a2ad-32a97df64e96", "DetectTime": "2024-05-21T12:48:45.877702+00:00", "EventTime": "2024-05-21T12:48:45.877740+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "1970-01-07T14:22:02.361315+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2024/05/21 12:48:46.085543)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 159, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "09012e40-c09a-4f9d-a3a1-7e5d89abe5b0", "DetectTime": "2024-05-21T12:48:46.099385+00:00", "EventTime": "2024-05-21T12:48:46.099404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdYLsI2wqBIdoQOIvl"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "7eadcde3-7da0-4747-9c8d-bc25a725c502", "DetectTime": "2024-05-21T12:48:46.114630+00:00", "EventTime": "2024-05-21T12:48:46.114679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdm36CjGRKsKIZYA4"], "accumulated_threat_level": 1.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "b9cb3da6-5ea1-471e-8d5a-2ce72f8e0c90", "DetectTime": "2024-05-21T12:48:46.127262+00:00", "EventTime": "2024-05-21T12:48:46.127286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctkuio4pb9QfpeF4Ea"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 159} +{"Format": "IDEA0", "ID": "8ddf38ab-09dd-41a9-b013-52b806f27e34", "DetectTime": "2024-05-21T12:48:46.208699+00:00", "EventTime": "2024-05-21T12:48:46.208719+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.246.90.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMXmv2ycexNVRU0gl"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "b0dcea07-e30b-4092-903b-6b1bafccf2a9", "DetectTime": "2024-05-21T12:48:46.222210+00:00", "EventTime": "2024-05-21T12:48:46.222229+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.246.90.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.246.90.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMXmv2ycexNVRU0gl"], "accumulated_threat_level": 1.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "ae7f1073-ad84-42a2-98f6-830d4c7d14a2", "DetectTime": "2024-05-21T12:48:46.246649+00:00", "EventTime": "2024-05-21T12:48:46.246680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIE9f1S4UYp3nMbSg"], "accumulated_threat_level": 3.2, "timewindow": 159} +{"Format": "IDEA0", "ID": "8745388b-bbe3-453b-976b-9428dbfd62dd", "DetectTime": "2024-05-21T12:48:46.260434+00:00", "EventTime": "2024-05-21T12:48:46.260455+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["60.48.67.41"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgRykrPWKRq5iSi"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "6023610d-49e1-4a95-bbe1-37037fab0414", "DetectTime": "2024-05-21T12:48:46.275206+00:00", "EventTime": "2024-05-21T12:48:46.275239+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["60.48.67.41"]}], "Attach": [{"Content": "connection to blacklisted IP: 60.48.67.41 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgRykrPWKRq5iSi"], "accumulated_threat_level": 1.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "5c93867d-4124-4165-a411-8b7b5e8989c0", "DetectTime": "2024-05-21T12:48:46.294674+00:00", "EventTime": "2024-05-21T12:48:46.294709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEQZt1jAYKUQZp0Td"], "accumulated_threat_level": 4.0, "timewindow": 159} +{"Format": "IDEA0", "ID": "1e0e1ccc-09b5-44e6-8d2e-32852be32905", "DetectTime": "2024-05-21T12:48:46.350844+00:00", "EventTime": "2024-05-21T12:48:46.350874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3shND3rtV4Ns9UwQ5"], "accumulated_threat_level": 4.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "fabf062e-0f13-486a-b49c-8af7fbfe4773", "DetectTime": "2024-05-21T12:48:46.392505+00:00", "EventTime": "2024-05-21T12:48:46.392533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQoY8x4ChXNuhL8v78"], "accumulated_threat_level": 5.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "c96999ef-5c69-4285-b0be-15c7722f9ed0", "DetectTime": "2024-05-21T12:48:46.445566+00:00", "EventTime": "2024-05-21T12:48:46.445599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C912mC7MvE6axab8e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 159} +{"Format": "IDEA0", "ID": "bde51b42-b12c-419b-9a2f-44d93457b1ee", "DetectTime": "2024-05-21T12:48:46.497695+00:00", "EventTime": "2024-05-21T12:48:46.497728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMqkvp3KsVv280XVHc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "b2650405-280a-442f-adae-2316dda75e45", "DetectTime": "2024-05-21T12:48:46.512283+00:00", "EventTime": "2024-05-21T12:48:46.512302+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVP4K38CmrPKD70F2"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "33b07aa3-3f44-46a1-8fe9-ac5657507b05", "DetectTime": "2024-05-21T12:48:46.530977+00:00", "EventTime": "2024-05-21T12:48:46.531012+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnVP4K38CmrPKD70F2"], "accumulated_threat_level": 2.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "30680ea2-56fa-49bb-9277-0b57bfde9a52", "DetectTime": "2024-05-21T12:48:46.548433+00:00", "EventTime": "2024-05-21T12:48:46.548468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbXTu4DRJzC931vN1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "2db6cfbd-6173-44d6-a603-a41913bf5bc2", "DetectTime": "2024-05-21T12:48:46.663349+00:00", "EventTime": "2024-05-21T12:48:46.663370+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8DaYdOdQhDchmUb"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "5856e52d-155e-4ceb-b135-c26cb648d17e", "DetectTime": "2024-05-21T12:48:46.679652+00:00", "EventTime": "2024-05-21T12:48:46.679683+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8DaYdOdQhDchmUb"], "accumulated_threat_level": 2.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "b88a252f-d3ce-4bfa-8134-768905deefb4", "DetectTime": "2024-05-21T12:48:46.707131+00:00", "EventTime": "2024-05-21T12:48:46.707156+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAG0454AtwfHk6kPh7"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "c69fe72f-fd21-401a-83e4-a9c732a4d463", "DetectTime": "2024-05-21T12:48:46.724671+00:00", "EventTime": "2024-05-21T12:48:46.724702+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAG0454AtwfHk6kPh7"], "accumulated_threat_level": 3.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "5ba239e3-4f3a-4c85-874a-a2ef1f603579", "DetectTime": "2024-05-21T12:48:46.745544+00:00", "EventTime": "2024-05-21T12:48:46.745564+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvo1Icm885tVJO2G2"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "394475dc-6fe6-496e-b6c0-451285cb9465", "DetectTime": "2024-05-21T12:48:46.759896+00:00", "EventTime": "2024-05-21T12:48:46.759925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvo1Icm885tVJO2G2"], "accumulated_threat_level": 3.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "b1865100-2399-4ebc-9751-f7199e2d064e", "DetectTime": "2024-05-21T12:48:46.785875+00:00", "EventTime": "2024-05-21T12:48:46.785895+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGsGbZ2wh23lo9Kkrh"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "f86129d9-a5eb-423e-b358-f0a77632c05c", "DetectTime": "2024-05-21T12:48:46.799930+00:00", "EventTime": "2024-05-21T12:48:46.799953+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGsGbZ2wh23lo9Kkrh"], "accumulated_threat_level": 4.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "940ec184-857d-4fc0-aa0e-09630d6a1ea8", "DetectTime": "2024-05-21T12:48:46.817001+00:00", "EventTime": "2024-05-21T12:48:46.817025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBpCy3Jgdg1DuiVGk"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "97ae204d-cdfd-44dc-a64a-63c2ef045c50", "DetectTime": "2024-05-21T12:48:46.832407+00:00", "EventTime": "2024-05-21T12:48:46.832433+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74LiW7HgXOByc1V"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "0b7f7bcd-74d6-4c9b-9bcb-383adb79bf61", "DetectTime": "2024-05-21T12:48:46.847317+00:00", "EventTime": "2024-05-21T12:48:46.847338+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74LiW7HgXOByc1V"], "accumulated_threat_level": 4.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "e8d01a18-8a8b-4ed4-9976-8fc322d7f7d7", "DetectTime": "2024-05-21T12:48:46.869556+00:00", "EventTime": "2024-05-21T12:48:46.869591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFf044kRkctBXpB31"], "accumulated_threat_level": 8.799999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "070140aa-c2e7-4805-b3c6-138b051a553f", "DetectTime": "2024-05-21T12:48:46.912267+00:00", "EventTime": "2024-05-21T12:48:46.912288+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVdoE49uAzQiCj944"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "82377ae9-7966-4075-85d9-0b8df1bb2eb9", "DetectTime": "2024-05-21T12:48:46.926085+00:00", "EventTime": "2024-05-21T12:48:46.926118+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVdoE49uAzQiCj944"], "accumulated_threat_level": 5.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "9c95cb30-b690-4581-92e0-bbbfd012e309", "DetectTime": "2024-05-21T12:48:46.950383+00:00", "EventTime": "2024-05-21T12:48:46.950457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGA4AbdIVrdbF0wa"], "accumulated_threat_level": 9.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "0ac4c440-227e-4b20-8118-27bc0e6cb14f", "DetectTime": "2024-05-21T12:48:46.979459+00:00", "EventTime": "2024-05-21T12:48:46.979491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8irltJRFno4FeM9"], "accumulated_threat_level": 10.4, "timewindow": 159} +{"Format": "IDEA0", "ID": "1ad083b0-b406-452d-8ac3-3acdf1b9c5c4", "DetectTime": "2024-05-21T12:48:47.017480+00:00", "EventTime": "2024-05-21T12:48:47.017504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUAeM3iD7KQIfC8og"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "5be62440-ef92-4d07-ab94-5f10b4faf025", "DetectTime": "2024-05-21T12:48:47.065097+00:00", "EventTime": "2024-05-21T12:48:47.065133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtJxFm1YkKBBm6F3n5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 159} +{"Format": "IDEA0", "ID": "eba6f91a-47f0-40fe-b450-635655faab97", "DetectTime": "2024-05-21T12:48:47.125132+00:00", "EventTime": "2024-05-21T12:48:47.125150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4WWfma3YyiV572"], "accumulated_threat_level": 12.000000000000002, "timewindow": 159} +{"Format": "Json", "ID": "eba6f91a-47f0-40fe-b450-635655faab97", "DetectTime": "2024-05-21T12:48:47.125132+00:00", "EventTime": "2024-05-21T12:48:47.125150+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-07T14:22:40.982832+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2024/05/21 12:48:47.290211)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 159, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ee1a7bda-4638-44c9-b3df-d00358bb9373", "DetectTime": "2024-05-21T12:48:47.309229+00:00", "EventTime": "2024-05-21T12:48:47.309249+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHrg12ZMJiuboiWKd"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "0acfd9e6-17a4-43e7-ae55-0ae940aab041", "DetectTime": "2024-05-21T12:48:47.322883+00:00", "EventTime": "2024-05-21T12:48:47.322906+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpHrg12ZMJiuboiWKd"], "accumulated_threat_level": 5.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "365b9853-52f2-4101-a474-c9968c0defcc", "DetectTime": "2024-05-21T12:48:47.420380+00:00", "EventTime": "2024-05-21T12:48:47.420415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRr0mUQMEWRo7Lj2"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "97df6dbf-bf6d-4bec-bf28-ebe667a5767b", "DetectTime": "2024-05-21T12:48:47.466058+00:00", "EventTime": "2024-05-21T12:48:47.466091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRHDRsEuZUPfJRR1"], "accumulated_threat_level": 1.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "ec1da8f0-7db5-4e49-98e8-e5aa8b820b55", "DetectTime": "2024-05-21T12:48:47.512050+00:00", "EventTime": "2024-05-21T12:48:47.512084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CghYn049Ulpkt4f3ze"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 159} +{"Format": "IDEA0", "ID": "3e702713-10ae-4fd7-b664-c1af9b890d07", "DetectTime": "2024-05-21T12:48:47.559062+00:00", "EventTime": "2024-05-21T12:48:47.559090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LPng2gnk47D8rEAd"], "accumulated_threat_level": 3.2, "timewindow": 159} +{"Format": "IDEA0", "ID": "fd9972b0-0c14-4042-a959-8e8b4dd8da10", "DetectTime": "2024-05-21T12:48:47.605591+00:00", "EventTime": "2024-05-21T12:48:47.605617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqHqy1dD36jda6Ylf"], "accumulated_threat_level": 4.0, "timewindow": 159} +{"Format": "IDEA0", "ID": "0b745fc1-22cb-48ce-bd5a-bb1c9a88e3dc", "DetectTime": "2024-05-21T12:48:47.651292+00:00", "EventTime": "2024-05-21T12:48:47.651323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswM1ckwZq4u2GP4h"], "accumulated_threat_level": 4.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "7c0a72d1-b9d7-4c5b-81d4-0716ec423afb", "DetectTime": "2024-05-21T12:48:47.699129+00:00", "EventTime": "2024-05-21T12:48:47.699165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0h1g3mvPm2LeXJdh"], "accumulated_threat_level": 5.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "bd42de4b-4c0f-4637-826d-b2147d835a2f", "DetectTime": "2024-05-21T12:48:47.745249+00:00", "EventTime": "2024-05-21T12:48:47.745283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZoNQcxaLALk2hzd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 159} +{"Format": "IDEA0", "ID": "60640e67-9875-4290-a978-59bcdbbabb00", "DetectTime": "2024-05-21T12:48:47.988462+00:00", "EventTime": "2024-05-21T12:48:47.988483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLqMQ2DMOLQQ5RRLh"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "abc334df-246a-492e-8b12-04259ea77e8b", "DetectTime": "2024-05-21T12:48:48.157471+00:00", "EventTime": "2024-05-21T12:48:48.157499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfB8vy4rUCc3oNYhQa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "0f82088f-2750-4789-94e7-7178e4189e1c", "DetectTime": "2024-05-21T12:48:48.205987+00:00", "EventTime": "2024-05-21T12:48:48.206015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCtvB4k9UHDfN5Vg8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "10a831e8-f575-43d1-9431-e061a70c854f", "DetectTime": "2024-05-21T12:48:48.256426+00:00", "EventTime": "2024-05-21T12:48:48.256458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1h5oTCJ9h0psqnz3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "490661d0-e19e-4165-a284-b050128cfd13", "DetectTime": "2024-05-21T12:48:48.306494+00:00", "EventTime": "2024-05-21T12:48:48.306528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoVnF4xWSphQqnvv9"], "accumulated_threat_level": 9.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "da043b4f-8da4-4d1e-9fda-7d84121b8837", "DetectTime": "2024-05-21T12:48:48.354347+00:00", "EventTime": "2024-05-21T12:48:48.354385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQkEi2b2vgbSMnSNi"], "accumulated_threat_level": 10.4, "timewindow": 159} +{"Format": "IDEA0", "ID": "67fa8270-7d0f-4cdc-ae9c-a100763b1f42", "DetectTime": "2024-05-21T12:48:48.573640+00:00", "EventTime": "2024-05-21T12:48:48.573668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["176.73.199.176"]}], "Attach": [{"Content": "Connection to unknown destination port 3735/UDP destination IP 176.73.199.176. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClvFVs4CGyl9yGc44j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 159} +{"Format": "IDEA0", "ID": "75d44120-09dd-4d55-b8a3-d3a5ed55025e", "DetectTime": "2024-05-21T12:48:48.709651+00:00", "EventTime": "2024-05-21T12:48:48.709679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjinzh4Bx2FRb55iz3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 159} +{"Format": "Json", "ID": "75d44120-09dd-4d55-b8a3-d3a5ed55025e", "DetectTime": "2024-05-21T12:48:48.709651+00:00", "EventTime": "2024-05-21T12:48:48.709679+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-07T14:53:25.700053+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2024/05/21 12:48:49.096640)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 159, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0460a32f-25a0-45ce-a1f4-7b93f22204fe", "DetectTime": "2024-05-21T12:48:49.108723+00:00", "EventTime": "2024-05-21T12:48:49.108752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuFmgr4gI5aBXT4A42"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "b2e14a1d-f0a7-4742-b33d-0c331e27ff6b", "DetectTime": "2024-05-21T12:48:49.120684+00:00", "EventTime": "2024-05-21T12:48:49.120705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClNdma3nG8ODLdUoef"], "accumulated_threat_level": 1.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "9dde4676-d564-4b89-9488-b0788c6b8bb9", "DetectTime": "2024-05-21T12:48:49.125513+00:00", "EventTime": "2024-05-21T12:48:49.125532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSJAPx3wIY5TAmMYw2"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "46f2a875-e1c6-4803-941e-5213704e9579", "DetectTime": "2024-05-21T12:48:49.137007+00:00", "EventTime": "2024-05-21T12:48:49.137028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzPuuc4aAqq1yi7Gff"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 159} +{"Format": "IDEA0", "ID": "fb14007a-3960-4a5a-a703-451441ecc7ae", "DetectTime": "2024-05-21T12:48:49.149790+00:00", "EventTime": "2024-05-21T12:48:49.149811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVUIT3cLfBKJcTdb6"], "accumulated_threat_level": 3.2, "timewindow": 159} +{"Format": "IDEA0", "ID": "2589d701-fe9e-49ed-90f6-883ddcb6298d", "DetectTime": "2024-05-21T12:48:49.162455+00:00", "EventTime": "2024-05-21T12:48:49.162476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3XzW1rcZHkkYcqM7"], "accumulated_threat_level": 4.0, "timewindow": 159} +{"Format": "IDEA0", "ID": "b3b66afa-14eb-4125-b1ae-c57d3df83e8a", "DetectTime": "2024-05-21T12:48:49.200405+00:00", "EventTime": "2024-05-21T12:48:49.200441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGQWh27KjhbcPKTb9"], "accumulated_threat_level": 4.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d59a90e1-c83c-4335-bba1-f61e27b7c024", "DetectTime": "2024-05-21T12:48:49.252063+00:00", "EventTime": "2024-05-21T12:48:49.252103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVEx03F7vzwROtDG6"], "accumulated_threat_level": 5.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "7637e891-a3c5-45e1-8e5e-d77b786b51df", "DetectTime": "2024-05-21T12:48:49.300409+00:00", "EventTime": "2024-05-21T12:48:49.300430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbLqJ1tieE8FuRQhc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 159} +{"Format": "IDEA0", "ID": "bc076047-1efe-443c-acc3-dbc0f57cf117", "DetectTime": "2024-05-21T12:48:49.356880+00:00", "EventTime": "2024-05-21T12:48:49.356909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hkbN3uG4zHq7sS1c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "80bbe298-5a1a-490e-b70b-8855e0c70cc9", "DetectTime": "2024-05-21T12:48:49.397783+00:00", "EventTime": "2024-05-21T12:48:49.397804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceq8HN3NlU0622gBs2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "07d38a74-f906-4ae3-b66c-17d2e277ff17", "DetectTime": "2024-05-21T12:48:49.452674+00:00", "EventTime": "2024-05-21T12:48:49.452692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVFpt1uaYmx7N1iCk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "84cedd2e-4814-4bf4-b959-155278186b4c", "DetectTime": "2024-05-21T12:48:49.500189+00:00", "EventTime": "2024-05-21T12:48:49.500213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFVBd3UNMeNnUpSFa"], "accumulated_threat_level": 9.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "c9de5fc6-2cd5-431d-b414-44fc85453ba1", "DetectTime": "2024-05-21T12:48:49.696435+00:00", "EventTime": "2024-05-21T12:48:49.696468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JXOFW2Mo2k2Ncaf", "Ct88Xn3h9npglIPOM1", "CRmKVk1PgCjDN4HOC2", "CWjlvL3EWhztfhSmy"], "accumulated_threat_level": 0.5, "timewindow": 169} +{"Format": "IDEA0", "ID": "cd1cd094-92f3-4200-aa57-14366bc80844", "DetectTime": "2024-05-21T12:48:49.778109+00:00", "EventTime": "2024-05-21T12:48:49.778129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJTb749LVk1dskcl7"], "accumulated_threat_level": 10.4, "timewindow": 159} +{"Format": "IDEA0", "ID": "88f98cf9-3151-4c8e-b6eb-46b6cc74d96f", "DetectTime": "2024-05-21T12:48:49.832444+00:00", "EventTime": "2024-05-21T12:48:49.832463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxfFO3MxoJXwIpjCe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 159} +{"Format": "IDEA0", "ID": "afe25d5f-6ecf-4ede-a76f-36c282bb8f05", "DetectTime": "2024-05-21T12:48:49.870636+00:00", "EventTime": "2024-05-21T12:48:49.870656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccsb3L3W8lFhjx3vgd"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "d4b71074-cabe-457c-97cd-3d8a392f6f1a", "DetectTime": "2024-05-21T12:48:49.922736+00:00", "EventTime": "2024-05-21T12:48:49.922760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4BIir8O47lK3icf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 159} +{"Format": "Json", "ID": "d4b71074-cabe-457c-97cd-3d8a392f6f1a", "DetectTime": "2024-05-21T12:48:49.922736+00:00", "EventTime": "2024-05-21T12:48:49.922760+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "1970-01-07T14:53:29.252134+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2024/05/21 12:48:50.150059)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 159, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0c855c87-784f-4daa-aa1e-4a7bb4a50518", "DetectTime": "2024-05-21T12:48:50.170042+00:00", "EventTime": "2024-05-21T12:48:50.170080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy1Si3tlURPHeFdq"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "7b815104-f99d-4908-b6d1-371872fa7a70", "DetectTime": "2024-05-21T12:48:50.183751+00:00", "EventTime": "2024-05-21T12:48:50.183789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrESP3KY7E9ihtd5l"], "accumulated_threat_level": 1.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "265b6478-b3b8-4619-86c3-044814637256", "DetectTime": "2024-05-21T12:48:50.197917+00:00", "EventTime": "2024-05-21T12:48:50.197951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgeRu1joiDQ4BpCRh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 159} +{"Format": "IDEA0", "ID": "e592f7ba-8908-431d-bf4f-06b6c629c12d", "DetectTime": "2024-05-21T12:48:50.221099+00:00", "EventTime": "2024-05-21T12:48:50.221136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLzZq2lMiTq3KrbVj"], "accumulated_threat_level": 3.2, "timewindow": 159} +{"Format": "IDEA0", "ID": "4730d76c-4569-429a-b166-3edf089b0cf2", "DetectTime": "2024-05-21T12:48:50.242943+00:00", "EventTime": "2024-05-21T12:48:50.242985+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPf6K1Oz5mEJbUdDc"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "654557d3-f00d-4068-99ab-5affe6119d4d", "DetectTime": "2024-05-21T12:48:50.257018+00:00", "EventTime": "2024-05-21T12:48:50.257054+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbPf6K1Oz5mEJbUdDc"], "accumulated_threat_level": 6.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "bc61b490-80e8-495c-a7ce-7a5b3e3d95fc", "DetectTime": "2024-05-21T12:48:50.271676+00:00", "EventTime": "2024-05-21T12:48:50.271702+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyauiR2nrC0bQ5QG89"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "e86c8dba-66c2-42e4-849c-b0da39904916", "DetectTime": "2024-05-21T12:48:50.285263+00:00", "EventTime": "2024-05-21T12:48:50.285294+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyauiR2nrC0bQ5QG89"], "accumulated_threat_level": 6.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "4632c647-9df8-4ea8-a0e7-ac7a715ff39c", "DetectTime": "2024-05-21T12:48:50.299385+00:00", "EventTime": "2024-05-21T12:48:50.299407+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjvbrjZjkZ97BrC1g"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "98d2ac22-0bb1-424b-8546-12cec4a05ff9", "DetectTime": "2024-05-21T12:48:50.313644+00:00", "EventTime": "2024-05-21T12:48:50.313682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjvbrjZjkZ97BrC1g"], "accumulated_threat_level": 7.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "4acc26fb-2c8d-477c-bde9-eae571491c16", "DetectTime": "2024-05-21T12:48:50.327076+00:00", "EventTime": "2024-05-21T12:48:50.327106+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1R6e4vZK6zDXR2jk"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "baa08739-1914-4078-bb55-398c6e4f66fa", "DetectTime": "2024-05-21T12:48:50.341085+00:00", "EventTime": "2024-05-21T12:48:50.341110+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1R6e4vZK6zDXR2jk"], "accumulated_threat_level": 7.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "c794128b-76a0-4cf8-a8ed-81b9b97e22a2", "DetectTime": "2024-05-21T12:48:50.353380+00:00", "EventTime": "2024-05-21T12:48:50.353399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VX3gZZYDwfMxog"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "bae2a729-a783-40fe-94c8-73f9d31c4490", "DetectTime": "2024-05-21T12:48:50.367829+00:00", "EventTime": "2024-05-21T12:48:50.367872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1VX3gZZYDwfMxog"], "accumulated_threat_level": 8.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "3125a9fd-198f-4f3f-9c56-52ffcc0b3299", "DetectTime": "2024-05-21T12:48:50.382856+00:00", "EventTime": "2024-05-21T12:48:50.382884+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfja9ZfMG8WzG3rce"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "05337730-07f6-4f83-8027-b9b0a73762d6", "DetectTime": "2024-05-21T12:48:50.396381+00:00", "EventTime": "2024-05-21T12:48:50.396402+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfja9ZfMG8WzG3rce"], "accumulated_threat_level": 8.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "ee788732-b78a-4637-b869-53b5a7b12aa7", "DetectTime": "2024-05-21T12:48:50.411671+00:00", "EventTime": "2024-05-21T12:48:50.411699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcjyltXveXeDASt4"], "accumulated_threat_level": 4.0, "timewindow": 159} +{"Format": "IDEA0", "ID": "aca09ee4-8de0-4a9e-a3d4-07f8bea81295", "DetectTime": "2024-05-21T12:48:50.464569+00:00", "EventTime": "2024-05-21T12:48:50.464605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8NU83ks0iJ9ZPFu3"], "accumulated_threat_level": 4.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "4cdb09d2-3a15-4bb2-b7ad-595821ed431e", "DetectTime": "2024-05-21T12:48:50.523836+00:00", "EventTime": "2024-05-21T12:48:50.523870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyE3A4sMbUt4u7KEg"], "accumulated_threat_level": 5.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "a5b58df6-e81a-4302-8b58-acb8e2c88389", "DetectTime": "2024-05-21T12:48:50.571311+00:00", "EventTime": "2024-05-21T12:48:50.571350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ZOzq1lZBZCdGlR13"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 159} +{"Format": "IDEA0", "ID": "4187da8a-a65c-4375-81ab-1da1d377b489", "DetectTime": "2024-05-21T12:48:50.602916+00:00", "EventTime": "2024-05-21T12:48:50.602938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLg6i4A775hiQ5rt9"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "663a82df-c4e8-4463-8657-e61f55ddcb45", "DetectTime": "2024-05-21T12:48:50.616883+00:00", "EventTime": "2024-05-21T12:48:50.616918+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyLg6i4A775hiQ5rt9"], "accumulated_threat_level": 9.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "f42d0c8e-a537-4b1a-bf39-4b090a906154", "DetectTime": "2024-05-21T12:48:50.630998+00:00", "EventTime": "2024-05-21T12:48:50.631036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE60gD4DX2PYXu63Sj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "4e431126-7f4d-4d03-bea1-a7be69080c75", "DetectTime": "2024-05-21T12:48:50.661390+00:00", "EventTime": "2024-05-21T12:48:50.661409+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbENoW10dnYhJWiYZf"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "204af16e-e2ec-457e-988e-f68fb4142f37", "DetectTime": "2024-05-21T12:48:50.675463+00:00", "EventTime": "2024-05-21T12:48:50.675496+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbENoW10dnYhJWiYZf"], "accumulated_threat_level": 9.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "abc5436f-139a-472d-a8b7-6c98cfa931d0", "DetectTime": "2024-05-21T12:48:50.680746+00:00", "EventTime": "2024-05-21T12:48:50.680765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvDvxq4Mr3BANwOTZ9"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "60e3c2f3-c2f5-4482-89f4-81128f4d6eab", "DetectTime": "2024-05-21T12:48:50.709086+00:00", "EventTime": "2024-05-21T12:48:50.709113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrEm0r20yDzmemWzL"], "accumulated_threat_level": 7.999999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "1484d5fa-fd08-416d-aa43-33b07cb5428d", "DetectTime": "2024-05-21T12:48:50.724331+00:00", "EventTime": "2024-05-21T12:48:50.724352+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGbqJXvy3gHSVA3j"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "0dae1af2-ffb5-4cc0-a4bd-10cba87a5a21", "DetectTime": "2024-05-21T12:48:50.737888+00:00", "EventTime": "2024-05-21T12:48:50.737911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGbqJXvy3gHSVA3j"], "accumulated_threat_level": 10.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "a544ef67-2294-4ab5-a4fc-44e9888f4686", "DetectTime": "2024-05-21T12:48:50.789111+00:00", "EventTime": "2024-05-21T12:48:50.789132+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMALi4FKxPxvnkQTb"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "379f5ea9-bfed-41b5-8bd7-f12ec9267877", "DetectTime": "2024-05-21T12:48:50.802755+00:00", "EventTime": "2024-05-21T12:48:50.802785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMALi4FKxPxvnkQTb"], "accumulated_threat_level": 10.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "9eb5a035-daa3-4e3c-9354-83655e613f35", "DetectTime": "2024-05-21T12:48:50.874833+00:00", "EventTime": "2024-05-21T12:48:50.874854+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEjx67IZFSC8ibYd"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "feed00ea-064f-4406-b8b1-8831a0d5b5ac", "DetectTime": "2024-05-21T12:48:50.888903+00:00", "EventTime": "2024-05-21T12:48:50.888945+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEjx67IZFSC8ibYd"], "accumulated_threat_level": 11.0, "timewindow": 35} +{"Format": "IDEA0", "ID": "d2d4e990-1819-4af8-86c7-5614a8e773ed", "DetectTime": "2024-05-21T12:48:50.981309+00:00", "EventTime": "2024-05-21T12:48:50.981339+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6aKS52FXe1OT0IeY1"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "1c6727bc-7a9e-4af2-bd5b-0af4404c83a3", "DetectTime": "2024-05-21T12:48:50.996172+00:00", "EventTime": "2024-05-21T12:48:50.996200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCrxH1SOH1LU7Csz1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 159} +{"Format": "IDEA0", "ID": "e49b1157-a69a-4563-8c6b-26520532c0cf", "DetectTime": "2024-05-21T12:48:51.010086+00:00", "EventTime": "2024-05-21T12:48:51.010107+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6aKS52FXe1OT0IeY1"], "accumulated_threat_level": 11.5, "timewindow": 35} +{"Format": "IDEA0", "ID": "f833f590-532c-419c-91e6-ad09dd2982e0", "DetectTime": "2024-05-21T12:48:51.033491+00:00", "EventTime": "2024-05-21T12:48:51.033510+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBbI18vNho8oaYV9"], "accumulated_threat_level": 0, "timewindow": 35} +{"Format": "IDEA0", "ID": "98d24b11-752e-42f0-92b4-2ec2dcdde917", "DetectTime": "2024-05-21T12:48:51.044372+00:00", "EventTime": "2024-05-21T12:48:51.044389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ81Vc4qso2X0PmMOi"], "accumulated_threat_level": 9.6, "timewindow": 159} +{"Format": "IDEA0", "ID": "2643db5d-c25b-4510-a32b-741d7492c35f", "DetectTime": "2024-05-21T12:48:51.060596+00:00", "EventTime": "2024-05-21T12:48:51.060628+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBbI18vNho8oaYV9"], "accumulated_threat_level": 12.0, "timewindow": 35} +{"Format": "Json", "ID": "2643db5d-c25b-4510-a32b-741d7492c35f", "DetectTime": "2024-05-21T12:48:51.060596+00:00", "EventTime": "2024-05-21T12:48:51.060628+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "1970-01-02T10:38:14.896758+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 35. (real time 2024/05/21 12:48:51.432062)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 35, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "3dd00ddc-919c-49e8-8b5c-4e666ac6b008", "DetectTime": "2024-05-21T12:48:51.442553+00:00", "EventTime": "2024-05-21T12:48:51.442572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzEyXmLP802RKMAk"], "accumulated_threat_level": 10.4, "timewindow": 159} +{"Format": "IDEA0", "ID": "13aa9f7c-c3d3-4ff7-a569-85c1da6d99e2", "DetectTime": "2024-05-21T12:48:51.453670+00:00", "EventTime": "2024-05-21T12:48:51.453688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csm9Kh32YPRz4kUWn8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 159} +{"Format": "IDEA0", "ID": "fa9a810f-6c19-4296-a880-95425db0907f", "DetectTime": "2024-05-21T12:48:51.464440+00:00", "EventTime": "2024-05-21T12:48:51.464458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdbbA4UNrZI54Ri1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 159} +{"Format": "Json", "ID": "fa9a810f-6c19-4296-a880-95425db0907f", "DetectTime": "2024-05-21T12:48:51.464440+00:00", "EventTime": "2024-05-21T12:48:51.464458+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-07T14:53:32.663644+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 159. (real time 2024/05/21 12:48:51.728554)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 159, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "28c4e75f-7be9-44a8-ac23-0d2f886157ed", "DetectTime": "2024-05-21T12:48:51.743849+00:00", "EventTime": "2024-05-21T12:48:51.743873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCM9Zk92q6J3GwrEc"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "58fdd82a-99b6-4e17-a97e-1226436de4a8", "DetectTime": "2024-05-21T12:48:51.755002+00:00", "EventTime": "2024-05-21T12:48:51.755021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxZgw3xkEe6hGiqBf"], "accumulated_threat_level": 1.3, "timewindow": 160} +{"Format": "IDEA0", "ID": "a3fe9123-1e98-48ea-ab6a-befe08fe5785", "DetectTime": "2024-05-21T12:48:51.759976+00:00", "EventTime": "2024-05-21T12:48:51.759994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci7F3A49cOU2rZ5mla"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "c865a764-6655-4ba0-bd2b-11fddbcb2e11", "DetectTime": "2024-05-21T12:48:51.789711+00:00", "EventTime": "2024-05-21T12:48:51.789730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO2mpw4ho8klw9XcRk"], "accumulated_threat_level": 2.1, "timewindow": 160} +{"Format": "IDEA0", "ID": "2a970e6d-9105-4f19-b7d1-82120209ab02", "DetectTime": "2024-05-21T12:48:51.840049+00:00", "EventTime": "2024-05-21T12:48:51.840070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlQfF22GBxfaBUTNd"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 160} +{"Format": "IDEA0", "ID": "8d461a82-e0e7-4c00-8f4a-5bac0991785d", "DetectTime": "2024-05-21T12:48:51.905528+00:00", "EventTime": "2024-05-21T12:48:51.905547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkGSP2sVNuXQj8j03"], "accumulated_threat_level": 3.7, "timewindow": 160} +{"Format": "IDEA0", "ID": "4920b520-be9b-4b4e-9e9f-5ee2724a0907", "DetectTime": "2024-05-21T12:48:51.957784+00:00", "EventTime": "2024-05-21T12:48:51.957804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9rDrmMngbP4BG9p2"], "accumulated_threat_level": 4.5, "timewindow": 160} +{"Format": "IDEA0", "ID": "361020de-f12b-4660-a47b-75d2bc4ac980", "DetectTime": "2024-05-21T12:48:52.008549+00:00", "EventTime": "2024-05-21T12:48:52.008568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4oMh01F8HWUqMCGue"], "accumulated_threat_level": 5.3, "timewindow": 160} +{"Format": "IDEA0", "ID": "91c33966-7959-472c-969e-caa83070fdef", "DetectTime": "2024-05-21T12:48:52.061054+00:00", "EventTime": "2024-05-21T12:48:52.061076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csb5Ju4uNp1m2enlsf"], "accumulated_threat_level": 6.1, "timewindow": 160} +{"Format": "IDEA0", "ID": "4a174d05-9c27-42f9-b9a6-257f52804e2e", "DetectTime": "2024-05-21T12:48:52.113724+00:00", "EventTime": "2024-05-21T12:48:52.113747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDqRsoDiFN2VuLJ4"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "8103c213-6a99-4b98-96fe-40853ee843f1", "DetectTime": "2024-05-21T12:48:52.390360+00:00", "EventTime": "2024-05-21T12:48:52.390381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hwEq3tMohYWyU0Zf"], "accumulated_threat_level": 7.699999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "ccf2afd3-e001-4a24-91bd-170b751586e1", "DetectTime": "2024-05-21T12:48:52.438640+00:00", "EventTime": "2024-05-21T12:48:52.438661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ComMcX3ggtkKYJn4G"], "accumulated_threat_level": 8.5, "timewindow": 160} +{"Format": "IDEA0", "ID": "936004a4-63ae-4ca2-b257-b355e42547b4", "DetectTime": "2024-05-21T12:48:52.489340+00:00", "EventTime": "2024-05-21T12:48:52.489360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKeUf4XS0HidrxVu4"], "accumulated_threat_level": 9.3, "timewindow": 160} +{"Format": "IDEA0", "ID": "d1258ae0-f3f2-45c9-8a47-e9932d5a178a", "DetectTime": "2024-05-21T12:48:52.539929+00:00", "EventTime": "2024-05-21T12:48:52.539953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPNXjz9hxfNqREAj"], "accumulated_threat_level": 10.100000000000001, "timewindow": 160} +{"Format": "IDEA0", "ID": "3c975d8e-1c9e-484d-b1eb-3efcfeb12a50", "DetectTime": "2024-05-21T12:48:52.591306+00:00", "EventTime": "2024-05-21T12:48:52.591325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrMp1BkCORzRoZkf"], "accumulated_threat_level": 10.900000000000002, "timewindow": 160} +{"Format": "IDEA0", "ID": "af5c3348-456f-4572-888f-64c1970ae110", "DetectTime": "2024-05-21T12:48:52.644134+00:00", "EventTime": "2024-05-21T12:48:52.644154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZOwh1mabSM8XMwXl"], "accumulated_threat_level": 11.700000000000003, "timewindow": 160} +{"Format": "IDEA0", "ID": "eb36188e-316e-4e95-9cbc-2a6396b63f73", "DetectTime": "2024-05-21T12:48:52.775575+00:00", "EventTime": "2024-05-21T12:48:52.775598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CelKs515kTv2mTkF7b"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "e52a43b6-bb38-49d7-ae01-cd277dbd814a", "DetectTime": "2024-05-21T12:48:52.819029+00:00", "EventTime": "2024-05-21T12:48:52.819068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWaYGqzuu7y61Jnqb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 160} +{"Format": "Json", "ID": "e52a43b6-bb38-49d7-ae01-cd277dbd814a", "DetectTime": "2024-05-21T12:48:52.819029+00:00", "EventTime": "2024-05-21T12:48:52.819068+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "1970-01-07T15:24:24.530063+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2024/05/21 12:48:53.025564)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 160, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "25734abc-8921-418b-97b4-8bd5e0a97ff1", "DetectTime": "2024-05-21T12:48:53.078501+00:00", "EventTime": "2024-05-21T12:48:53.078532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyT0JI2qjEnTFqxF3i"], "accumulated_threat_level": 0.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "800ecab1-57f2-4b1b-8274-368ce6da39d3", "DetectTime": "2024-05-21T12:48:53.129195+00:00", "EventTime": "2024-05-21T12:48:53.129233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmVeC7rn931QkrOg"], "accumulated_threat_level": 1.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "a99fc5de-caa9-461f-8b27-b484c9f85a3b", "DetectTime": "2024-05-21T12:48:53.173957+00:00", "EventTime": "2024-05-21T12:48:53.173995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI44hn2FsiJ6cUU3li"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 160} +{"Format": "IDEA0", "ID": "7db39955-b4f9-4f57-930b-7eb60f68ea4e", "DetectTime": "2024-05-21T12:48:53.226489+00:00", "EventTime": "2024-05-21T12:48:53.226514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzGiaEGOSngRV5PTj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "1be4fecd-1fe1-4a93-b9a2-f15e85f5e5d1", "DetectTime": "2024-05-21T12:48:53.271926+00:00", "EventTime": "2024-05-21T12:48:53.271945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["190.204.35.137"]}], "Attach": [{"Content": "Connection to unknown destination port 9661/UDP destination IP 190.204.35.137. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Wc1wMirBMkla6th"], "accumulated_threat_level": 3.2, "timewindow": 160} +{"Format": "IDEA0", "ID": "06d66d85-c0b7-443e-9df6-0eaf5d8ab31c", "DetectTime": "2024-05-21T12:48:53.313054+00:00", "EventTime": "2024-05-21T12:48:53.313075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRGMV1aL6oPQlWJzb"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "ba4672f0-1849-4fe9-92d9-7ce4a57ec5ab", "DetectTime": "2024-05-21T12:48:53.372469+00:00", "EventTime": "2024-05-21T12:48:53.372497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnuWWGbdhr8UeExR2"], "accumulated_threat_level": 4.0, "timewindow": 160} +{"Format": "IDEA0", "ID": "32a46ce1-2b26-4e17-aa93-6c264f536219", "DetectTime": "2024-05-21T12:48:53.377751+00:00", "EventTime": "2024-05-21T12:48:53.377773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyDK8b1hfWrp8kLhib"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "3808321c-c3c5-4181-8e62-f78629a04f65", "DetectTime": "2024-05-21T12:48:53.728136+00:00", "EventTime": "2024-05-21T12:48:53.728162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1lrq3dcgQVLpxeH"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "60a2bfd0-cbbe-4b2f-95d3-0466eb062d61", "DetectTime": "2024-05-21T12:48:53.737023+00:00", "EventTime": "2024-05-21T12:48:53.737046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGB8QG3joUuvFcnPic"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "1e78cd0c-9626-4a5c-ba55-d76630e9d484", "DetectTime": "2024-05-21T12:48:53.741837+00:00", "EventTime": "2024-05-21T12:48:53.741858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR1uiF27VCfyWF1QH7"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "aa1d1ff7-cb56-427f-a419-d18fb8a068f3", "DetectTime": "2024-05-21T12:48:53.831198+00:00", "EventTime": "2024-05-21T12:48:53.831227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SndlaQKYPoHQTz9"], "accumulated_threat_level": 4.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "7be13890-4832-4bee-a186-9420b688c689", "DetectTime": "2024-05-21T12:48:53.934511+00:00", "EventTime": "2024-05-21T12:48:53.934532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chzdt74cOzanRE6ghb"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "49c2f911-73bc-4852-810e-f6ca0fa8ef78", "DetectTime": "2024-05-21T12:48:53.946002+00:00", "EventTime": "2024-05-21T12:48:53.946022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNecyo2rlYXBppDYEf"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "ef513356-b1b6-4fb8-9d1b-7973c4fd4c59", "DetectTime": "2024-05-21T12:48:53.981589+00:00", "EventTime": "2024-05-21T12:48:53.981608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqYdvf271XgCKjQ6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "6f4d8d0e-22be-4b22-b463-fe5045595528", "DetectTime": "2024-05-21T12:48:54.344005+00:00", "EventTime": "2024-05-21T12:48:54.344024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTurCW2dglYLiwaI65"], "accumulated_threat_level": 5.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "7872eb8a-f778-472a-831c-4ab7c498c564", "DetectTime": "2024-05-21T12:48:54.349940+00:00", "EventTime": "2024-05-21T12:48:54.349963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOqVPuFYw9DRJvW6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "b09391f1-a806-4c8b-9126-27c015855c12", "DetectTime": "2024-05-21T12:48:54.383776+00:00", "EventTime": "2024-05-21T12:48:54.383798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClwlXD137jdN2F4Dhe"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "bab2c051-b697-4ecc-9d09-1b1427524747", "DetectTime": "2024-05-21T12:48:54.390969+00:00", "EventTime": "2024-05-21T12:48:54.390987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdM6353sCk1aYpew92"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "f6956a9e-1c03-4706-8597-8b3f42cc12b5", "DetectTime": "2024-05-21T12:48:54.396380+00:00", "EventTime": "2024-05-21T12:48:54.396400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbaaIVhM11beB4S27"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "bee68261-caf1-4494-9836-5fae98d7a496", "DetectTime": "2024-05-21T12:48:54.658199+00:00", "EventTime": "2024-05-21T12:48:54.658217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwlSC4H4UKkIDsOW4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "b820ff43-615b-462c-af64-272181c7aef8", "DetectTime": "2024-05-21T12:48:54.663009+00:00", "EventTime": "2024-05-21T12:48:54.663027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiI4602k10uUTzSzld"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "8f09fbd2-32a0-419c-808d-ec4a0ea6bfa5", "DetectTime": "2024-05-21T12:48:54.667536+00:00", "EventTime": "2024-05-21T12:48:54.667554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8Tn81AFMh52KHKj2"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "49afd8da-ad77-490e-bd02-5815be7ef9b8", "DetectTime": "2024-05-21T12:48:54.671991+00:00", "EventTime": "2024-05-21T12:48:54.672009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrFNlW1L7OdN7MaBJ1"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "b477bf9c-4d74-4c46-9fb3-4774edb751b3", "DetectTime": "2024-05-21T12:48:54.948898+00:00", "EventTime": "2024-05-21T12:48:54.948922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfVK5dnUxFax07E9"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "4516ad97-b800-4706-9486-6a918d5b0676", "DetectTime": "2024-05-21T12:48:54.971670+00:00", "EventTime": "2024-05-21T12:48:54.971694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWG5UgCagYBOcNzf"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "f5cd31c8-a333-41a9-8eee-10c33167e344", "DetectTime": "2024-05-21T12:48:55.026126+00:00", "EventTime": "2024-05-21T12:48:55.026149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcxrnusoqF7EfGsc"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "b8fbb7fd-5844-4a12-8d23-b4b7c1c5e92a", "DetectTime": "2024-05-21T12:48:55.159503+00:00", "EventTime": "2024-05-21T12:48:55.159527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkvmxO26G4w1fRwEGf"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "35f15083-131c-4752-ab4f-ff2dd135e40b", "DetectTime": "2024-05-21T12:48:55.176942+00:00", "EventTime": "2024-05-21T12:48:55.176964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COl3TI3GaqSs2ZOZHd"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "8526055d-d02a-45fc-8bd1-c8efca9dc0ea", "DetectTime": "2024-05-21T12:48:55.188650+00:00", "EventTime": "2024-05-21T12:48:55.188670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["171.97.1.132"]}], "Attach": [{"Content": "Connection to unknown destination port 15517/UDP destination IP 171.97.1.132. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cas4AxYJzVLfcU7p5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "ffd5ef5b-eecf-4b0a-9e2f-356c719fa3c4", "DetectTime": "2024-05-21T12:48:55.216115+00:00", "EventTime": "2024-05-21T12:48:55.216136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIImGU1jXQpsSTqrT"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "3e44e5de-a456-4a3c-960d-7cf8fc82ccd4", "DetectTime": "2024-05-21T12:48:55.517157+00:00", "EventTime": "2024-05-21T12:48:55.517182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfXGOC1i2ruTwK54Kk"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "0402feda-6c81-4bca-a697-50b74920b9bb", "DetectTime": "2024-05-21T12:48:55.640197+00:00", "EventTime": "2024-05-21T12:48:55.640218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiDy6w3CB4QdGMC2Fc"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "acc33799-8464-423a-83fe-a18bf9d7222a", "DetectTime": "2024-05-21T12:48:55.645316+00:00", "EventTime": "2024-05-21T12:48:55.645336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKSZT7231uI2l7dP61"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "fff8ea6a-8b37-4893-ae10-f99500722afd", "DetectTime": "2024-05-21T12:48:55.672546+00:00", "EventTime": "2024-05-21T12:48:55.672569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfIJiE4qorErcfAnBj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "9b27415a-31f8-43d2-bba5-8fe4df0feab0", "DetectTime": "2024-05-21T12:48:55.786234+00:00", "EventTime": "2024-05-21T12:48:55.786257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd9kxS2cesOxOF3kqh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "362e31ba-2ae7-47ed-9a0c-b4a4122279d9", "DetectTime": "2024-05-21T12:48:56.063708+00:00", "EventTime": "2024-05-21T12:48:56.063728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoByJ3wG4NrmUwjX6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "363d0442-97c9-4728-b410-169810027ba6", "DetectTime": "2024-05-21T12:48:56.076097+00:00", "EventTime": "2024-05-21T12:48:56.076117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.177.101.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvLblL13YVqWxSV1bh"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "a0149671-7c97-4405-b27c-546833c7e2fd", "DetectTime": "2024-05-21T12:48:56.083034+00:00", "EventTime": "2024-05-21T12:48:56.083054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXZLH19chW3Dl49a5"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "91f038c2-ffa0-4c03-afb9-8f460f90d61c", "DetectTime": "2024-05-21T12:48:56.088362+00:00", "EventTime": "2024-05-21T12:48:56.088384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmPsal3KbmR8W5Tp7k"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "d4368b00-6d30-47eb-81ca-51812abeb52b", "DetectTime": "2024-05-21T12:48:56.119932+00:00", "EventTime": "2024-05-21T12:48:56.119950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crlhhs2phlcHo8tL0j"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "930dd631-e1a0-48d8-bdc3-65070d98f9f3", "DetectTime": "2024-05-21T12:48:56.138419+00:00", "EventTime": "2024-05-21T12:48:56.138442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.164.123.17 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKhMai4DGYqBwlw0Zj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "6aedff77-64c0-4ad8-8c1a-57d3945754d4", "DetectTime": "2024-05-21T12:48:56.316395+00:00", "EventTime": "2024-05-21T12:48:56.316414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMGeVL3uitD8bx1DEj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "f9fbc957-1954-48ee-a470-b7931def7970", "DetectTime": "2024-05-21T12:48:56.320979+00:00", "EventTime": "2024-05-21T12:48:56.320997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKTYQl4f8kBvDH7bt8"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "505af401-ee4e-447d-a352-5442b60cd90d", "DetectTime": "2024-05-21T12:48:56.638101+00:00", "EventTime": "2024-05-21T12:48:56.638122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmMlJvFxb3ptgUx6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "f8a3f6fa-dacf-4302-8491-24e53bdd9b9c", "DetectTime": "2024-05-21T12:48:56.643741+00:00", "EventTime": "2024-05-21T12:48:56.643759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW8zEdIlasr1TKrg"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "2ff79e7b-420e-4ce6-b45f-106fc70f1cab", "DetectTime": "2024-05-21T12:48:56.648529+00:00", "EventTime": "2024-05-21T12:48:56.648547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQQHL3hxYZe0NHjul"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "a50bbf92-95c2-4afb-a200-c313dd69e8f8", "DetectTime": "2024-05-21T12:48:56.653183+00:00", "EventTime": "2024-05-21T12:48:56.653202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7CrG3qo1wRGs87rc"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "6d0f00ea-89ad-4111-a2ea-e8c284b6b393", "DetectTime": "2024-05-21T12:48:56.677544+00:00", "EventTime": "2024-05-21T12:48:56.677563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblxJ12h7Q7xq0XuO2"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "1d365fc3-f866-4c01-af0e-1041cdbe8c16", "DetectTime": "2024-05-21T12:48:56.726964+00:00", "EventTime": "2024-05-21T12:48:56.726985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6pHO2kavyJvEyCLb"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "efd1bc15-b992-41b7-b5e6-92437e6acdce", "DetectTime": "2024-05-21T12:48:56.885441+00:00", "EventTime": "2024-05-21T12:48:56.885462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJOkc39u3PiTQB1o6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "b8327389-25ce-4a4f-bfdd-fe23f21b7739", "DetectTime": "2024-05-21T12:48:56.891357+00:00", "EventTime": "2024-05-21T12:48:56.891377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRyj0EQb1CuChPXej"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "1a175320-ccd7-423d-9b36-92e46bf8d2cd", "DetectTime": "2024-05-21T12:48:57.105265+00:00", "EventTime": "2024-05-21T12:48:57.105288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNoDjC4Vu8iRzYJWv3"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "474e9fe6-412c-47b0-8fe4-55fa03281eeb", "DetectTime": "2024-05-21T12:48:57.182913+00:00", "EventTime": "2024-05-21T12:48:57.182932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFiOh04zD6RWaMfq9e"], "accumulated_threat_level": 10.4, "timewindow": 160} +{"Format": "IDEA0", "ID": "eb022f72-a1d8-4e34-b00e-b173d94cabac", "DetectTime": "2024-05-21T12:48:57.227453+00:00", "EventTime": "2024-05-21T12:48:57.227474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKTKd3ftpT5eeaJ24"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "b9021107-0f02-414d-8b6a-9c9c3015bd19", "DetectTime": "2024-05-21T12:48:57.234728+00:00", "EventTime": "2024-05-21T12:48:57.234752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYEfN1e7qhfX8B67g"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "f40863bb-327f-4946-ba66-ecab8e8bdb89", "DetectTime": "2024-05-21T12:48:57.249784+00:00", "EventTime": "2024-05-21T12:48:57.249806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDPjm1PegCx35wJuk"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "a64eb585-dd2d-4a81-aa69-48cb4f1f7efc", "DetectTime": "2024-05-21T12:48:57.339390+00:00", "EventTime": "2024-05-21T12:48:57.339413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRSphX3tVlQHsKLsMj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "b0dca26c-5c86-46bb-997a-49b3979c7f3b", "DetectTime": "2024-05-21T12:48:57.646092+00:00", "EventTime": "2024-05-21T12:48:57.646114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qBNs3UUwYLPxKTf4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 160} +{"Format": "IDEA0", "ID": "94d8e6f7-549e-44c3-bd45-b25e552fa1ea", "DetectTime": "2024-05-21T12:48:57.651915+00:00", "EventTime": "2024-05-21T12:48:57.651934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C44Isf2RId31qxIqZ2"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "81d13672-a38d-4359-a6da-1e324faee38f", "DetectTime": "2024-05-21T12:48:57.680471+00:00", "EventTime": "2024-05-21T12:48:57.680491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuPkLHFQ67GxO0WIi"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "7cde1b48-7f38-4dba-ac2c-26664d5dc1e4", "DetectTime": "2024-05-21T12:48:57.733179+00:00", "EventTime": "2024-05-21T12:48:57.733201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG3uts2GBShSI19Vi"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "9b9e890d-f743-479b-984a-212470e8c96a", "DetectTime": "2024-05-21T12:48:57.892246+00:00", "EventTime": "2024-05-21T12:48:57.892265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8Psi2mmzu6CRemz2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 160} +{"Format": "Json", "ID": "9b9e890d-f743-479b-984a-212470e8c96a", "DetectTime": "2024-05-21T12:48:57.892246+00:00", "EventTime": "2024-05-21T12:48:57.892265+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T15:24:28.243477+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2024/05/21 12:48:58.064920)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 160, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "86755ae6-f9d0-45a0-b1e0-892dd7cfd540", "DetectTime": "2024-05-21T12:48:58.069552+00:00", "EventTime": "2024-05-21T12:48:58.069573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQUrxR3BSAcST37tBj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "5e597867-0e67-40b0-8604-0cfb4304b8ec", "DetectTime": "2024-05-21T12:48:58.074557+00:00", "EventTime": "2024-05-21T12:48:58.074575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHw3ok41gB6ei0cJuj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "66d5a1d5-c9ee-4547-850b-68ac7954349f", "DetectTime": "2024-05-21T12:48:58.079297+00:00", "EventTime": "2024-05-21T12:48:58.079315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUu1ne1lXHhN68yxp2"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "0ac6fcfd-0b56-435c-8c63-d6415a8ca192", "DetectTime": "2024-05-21T12:48:58.257118+00:00", "EventTime": "2024-05-21T12:48:58.257140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNu6tAJsErBrUWlfj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "c012738b-8494-4a53-bf29-779d438cfb30", "DetectTime": "2024-05-21T12:48:58.309572+00:00", "EventTime": "2024-05-21T12:48:58.309598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoD1TL1HeNPGWMvcfl"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "0a4126e0-25b4-4640-a737-fd53bdc2332d", "DetectTime": "2024-05-21T12:48:58.513758+00:00", "EventTime": "2024-05-21T12:48:58.513780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch5R7l1OFXb4hYVDT"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "8a8f7672-d468-41a2-a15c-81b159de3a12", "DetectTime": "2024-05-21T12:48:58.519065+00:00", "EventTime": "2024-05-21T12:48:58.519091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeHFoE2TlgUk7TV2e1"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "67097b59-88d7-4774-82e4-a6106637d559", "DetectTime": "2024-05-21T12:48:58.543942+00:00", "EventTime": "2024-05-21T12:48:58.543965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfN103lXQgGnUzkx3"], "accumulated_threat_level": 0.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "6a468d68-39bd-4767-8076-bcc2b9d7e082", "DetectTime": "2024-05-21T12:48:58.700783+00:00", "EventTime": "2024-05-21T12:48:58.700806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHLAZG1WfhdzWqBIa6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "df8bd6b5-7cbf-46f1-9226-b965f1e1d626", "DetectTime": "2024-05-21T12:48:58.720039+00:00", "EventTime": "2024-05-21T12:48:58.720060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cey9Bqgbu2ta1CmWf"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "5e5f24b0-3d39-4f5e-9a8b-98c07a817161", "DetectTime": "2024-05-21T12:48:58.725311+00:00", "EventTime": "2024-05-21T12:48:58.725334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsF8hJ199lykZGo919"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "4aee0721-f2df-40d2-a99c-813e382abb73", "DetectTime": "2024-05-21T12:48:58.765090+00:00", "EventTime": "2024-05-21T12:48:58.765113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihMrq1CTJnzx3HtI7"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "56f6aa2c-daa7-4c70-9740-f9f5178276a5", "DetectTime": "2024-05-21T12:48:59.111994+00:00", "EventTime": "2024-05-21T12:48:59.112019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNB7Yr33rBnuWPxFD1"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "ac328845-15e1-485e-b51f-09150403a2d8", "DetectTime": "2024-05-21T12:48:59.142200+00:00", "EventTime": "2024-05-21T12:48:59.142218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxda81tP6OdvjfOHa"], "accumulated_threat_level": 1.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "6e928737-c2ed-48e3-aa64-9d2259cbccc0", "DetectTime": "2024-05-21T12:48:59.146855+00:00", "EventTime": "2024-05-21T12:48:59.146878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfwx5f1397wP1Y5vgh"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "6aa2fa41-ad93-48b8-954f-be87b780f955", "DetectTime": "2024-05-21T12:48:59.189981+00:00", "EventTime": "2024-05-21T12:48:59.190008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nReZ284YLQ5ifPs"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "e06b2e39-dc78-4e41-813d-bb9a0b657bd6", "DetectTime": "2024-05-21T12:48:59.211856+00:00", "EventTime": "2024-05-21T12:48:59.211880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcqpi1JSEagyEn5Cj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "dbe288ab-9d7d-49fa-8436-606b887e6d0e", "DetectTime": "2024-05-21T12:48:59.227583+00:00", "EventTime": "2024-05-21T12:48:59.227610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEAwsX7UPJbJpA8d"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "6dd4f2b3-7a40-4aea-8a38-f15e25491831", "DetectTime": "2024-05-21T12:48:59.249858+00:00", "EventTime": "2024-05-21T12:48:59.249880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNvWG54kTpTbVXvH6"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "69ca80eb-1600-4a4b-8098-f1ba9c5a2fd3", "DetectTime": "2024-05-21T12:48:59.575526+00:00", "EventTime": "2024-05-21T12:48:59.575547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXr6gZ333DRlogiSxj"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "a1f92b90-b1d0-4f28-9b0c-d4b5bc424171", "DetectTime": "2024-05-21T12:48:59.738172+00:00", "EventTime": "2024-05-21T12:48:59.738191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZQTR11wdJbqebn5b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 160} +{"Format": "IDEA0", "ID": "8472b717-c327-4494-b650-d0e5b97f0473", "DetectTime": "2024-05-21T12:48:59.743993+00:00", "EventTime": "2024-05-21T12:48:59.744013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeiFFO3PwLijc6LYvi"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "fcb87b25-4310-4a70-9538-a68cbc031335", "DetectTime": "2024-05-21T12:48:59.748812+00:00", "EventTime": "2024-05-21T12:48:59.748830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqWDL72X8245UiLsT3"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "87b8de9c-3e6a-46d2-a3a3-233fb6dc74c0", "DetectTime": "2024-05-21T12:48:59.776952+00:00", "EventTime": "2024-05-21T12:48:59.776975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClmH8F4tEQ6cDLdkW3"], "accumulated_threat_level": 4.0, "timewindow": 158} +{"Format": "IDEA0", "ID": "23fc686c-33cc-4066-9ac6-c1d1e1ebf2ed", "DetectTime": "2024-05-21T12:49:00.075464+00:00", "EventTime": "2024-05-21T12:49:00.075488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqU9317KoULgmQub8"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d3a26e3e-0f61-4c1a-9a3f-6c4755b8d9c1", "DetectTime": "2024-05-21T12:49:00.184251+00:00", "EventTime": "2024-05-21T12:49:00.184274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5cSl14lYuroNU2UYa"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "b7088d9a-7aad-4556-892f-e39481ed1246", "DetectTime": "2024-05-21T12:49:00.190167+00:00", "EventTime": "2024-05-21T12:49:00.190190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQQMBz37wo5rqdks9a"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "fc640604-83f3-47c3-b14b-3e4e8257bd6f", "DetectTime": "2024-05-21T12:49:00.205936+00:00", "EventTime": "2024-05-21T12:49:00.205959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPVvNn3kjLZiYRWwEe"], "accumulated_threat_level": 3.2, "timewindow": 160} +{"Format": "IDEA0", "ID": "95d02f33-a4d1-49d6-acb7-5d2ec8bd1ea6", "DetectTime": "2024-05-21T12:49:00.231169+00:00", "EventTime": "2024-05-21T12:49:00.231190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9glm4rohVUCaICy4"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "dff182ed-281a-4579-9d7b-db148eacdb96", "DetectTime": "2024-05-21T12:49:00.268218+00:00", "EventTime": "2024-05-21T12:49:00.268240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSIWZFpVnIF8liVSd"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d2d3cff2-4661-42e1-90c7-d40a9e1fe73e", "DetectTime": "2024-05-21T12:49:00.659571+00:00", "EventTime": "2024-05-21T12:49:00.659595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckzpuo3yi0JJ36ZMdc"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "daa329f6-df60-49cb-b1a7-5d6942409417", "DetectTime": "2024-05-21T12:49:00.666987+00:00", "EventTime": "2024-05-21T12:49:00.667025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrglhY2zdRx287ti82"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "2ed8dac8-1a9d-4b38-aeac-3696d12590c3", "DetectTime": "2024-05-21T12:49:00.672768+00:00", "EventTime": "2024-05-21T12:49:00.672790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXlqF027x7G1xzy6qf"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d2aa596d-5ef6-4df8-8ba7-c8d3b5db6aca", "DetectTime": "2024-05-21T12:49:00.683873+00:00", "EventTime": "2024-05-21T12:49:00.683891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQdg3a1ksm3PRUf6Dk"], "accumulated_threat_level": 4.0, "timewindow": 160} +{"Format": "IDEA0", "ID": "43f2ea28-da0f-424d-b2ac-79c9014ccfc3", "DetectTime": "2024-05-21T12:49:00.688619+00:00", "EventTime": "2024-05-21T12:49:00.688637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv87KwgDmnmFJgz"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "1cbcceb9-7184-4347-b013-532499c10433", "DetectTime": "2024-05-21T12:49:00.811956+00:00", "EventTime": "2024-05-21T12:49:00.811977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEL0Db4AtYbfsQz9Th"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "5d714e5f-465e-47eb-8b19-18c0e95179fc", "DetectTime": "2024-05-21T12:49:00.927753+00:00", "EventTime": "2024-05-21T12:49:00.927774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct62cW3ePUIQQchRR6"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "f524517d-96cf-41fc-a568-9c3be48fc07d", "DetectTime": "2024-05-21T12:49:00.934134+00:00", "EventTime": "2024-05-21T12:49:00.934154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIz64p22gDofm27ii1"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "1ccc8501-8c06-4ca5-aa09-aeae49410272", "DetectTime": "2024-05-21T12:49:00.940096+00:00", "EventTime": "2024-05-21T12:49:00.940116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW2srp4JKZ35VSXNVl"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d9c69749-a123-4399-80fa-1330d9b8f183", "DetectTime": "2024-05-21T12:49:00.944770+00:00", "EventTime": "2024-05-21T12:49:00.944789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl4f114r1fytK9yqD5"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d5c2c9cd-3794-42a3-a34d-85664fb576d1", "DetectTime": "2024-05-21T12:49:01.284268+00:00", "EventTime": "2024-05-21T12:49:01.284290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP31F83vQh1XkoFpuj"], "accumulated_threat_level": 4.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "ee05b0cb-f909-4257-815a-4c45241897bd", "DetectTime": "2024-05-21T12:49:01.294932+00:00", "EventTime": "2024-05-21T12:49:01.294953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFjwF1NVff7dmOcp4"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "917e6d52-a125-4999-bee4-d43064242a2f", "DetectTime": "2024-05-21T12:49:01.466304+00:00", "EventTime": "2024-05-21T12:49:01.466326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdm36CjGRKsKIZYA4"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "0e3da802-2def-4a2b-a0c5-7377110d2f77", "DetectTime": "2024-05-21T12:49:01.473040+00:00", "EventTime": "2024-05-21T12:49:01.473060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctkuio4pb9QfpeF4Ea"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "231c6905-10e3-48ed-b542-ddaaa5524f8c", "DetectTime": "2024-05-21T12:49:01.477785+00:00", "EventTime": "2024-05-21T12:49:01.477804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdYLsI2wqBIdoQOIvl"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "63316a86-66e9-442b-894e-293f403d115e", "DetectTime": "2024-05-21T12:49:01.497282+00:00", "EventTime": "2024-05-21T12:49:01.497306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPIE9f1S4UYp3nMbSg"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "e3bcce72-7e45-470d-b9d1-716494c97c6c", "DetectTime": "2024-05-21T12:49:01.503846+00:00", "EventTime": "2024-05-21T12:49:01.503866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3shND3rtV4Ns9UwQ5"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "e0908eb6-836c-4fd1-b760-a9ffa055d8c3", "DetectTime": "2024-05-21T12:49:01.928455+00:00", "EventTime": "2024-05-21T12:49:01.928482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQoY8x4ChXNuhL8v78"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "e1ab6d38-69a8-4abd-a7ca-96b890291230", "DetectTime": "2024-05-21T12:49:01.989881+00:00", "EventTime": "2024-05-21T12:49:01.989900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGpqgVCMayY5kFke"], "accumulated_threat_level": 5.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "df211c77-e0b8-4b4e-abb6-9dc43ccfe73d", "DetectTime": "2024-05-21T12:49:01.995342+00:00", "EventTime": "2024-05-21T12:49:01.995362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEQZt1jAYKUQZp0Td"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "fd07a02e-23ec-429c-a5ca-2056898106e0", "DetectTime": "2024-05-21T12:49:02.016990+00:00", "EventTime": "2024-05-21T12:49:02.017012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C912mC7MvE6axab8e"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "8d3460be-1713-4023-8d1a-fdb140bafbde", "DetectTime": "2024-05-21T12:49:02.142918+00:00", "EventTime": "2024-05-21T12:49:02.142939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFf044kRkctBXpB31"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "69bf22e9-4b5c-4432-8d74-4401817938e7", "DetectTime": "2024-05-21T12:49:02.449321+00:00", "EventTime": "2024-05-21T12:49:02.449344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbXTu4DRJzC931vN1"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "c17acf2c-e410-4a34-ba89-e7227ba210f9", "DetectTime": "2024-05-21T12:49:02.466310+00:00", "EventTime": "2024-05-21T12:49:02.466331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMqkvp3KsVv280XVHc"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "da49d46b-3eb9-4a65-8a95-b608b6d9b6ee", "DetectTime": "2024-05-21T12:49:02.635826+00:00", "EventTime": "2024-05-21T12:49:02.635849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGA4AbdIVrdbF0wa"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "a5e41316-14c3-413b-af5e-ff9de43b039f", "DetectTime": "2024-05-21T12:49:02.664054+00:00", "EventTime": "2024-05-21T12:49:02.664075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8irltJRFno4FeM9"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "60d96957-209e-42d5-8480-d852043be1de", "DetectTime": "2024-05-21T12:49:02.725161+00:00", "EventTime": "2024-05-21T12:49:02.725185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtJxFm1YkKBBm6F3n5"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "a374aa35-3ed6-4446-bdea-b0c1d03d320c", "DetectTime": "2024-05-21T12:49:02.730134+00:00", "EventTime": "2024-05-21T12:49:02.730153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4WWfma3YyiV572"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "2eeffca2-bf08-42c3-b564-0be068b811f2", "DetectTime": "2024-05-21T12:49:02.735121+00:00", "EventTime": "2024-05-21T12:49:02.735140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClB5g62x2avwuvWGX"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "2bd9a31d-1a3d-4fa6-b168-602ddb1de18c", "DetectTime": "2024-05-21T12:49:02.783137+00:00", "EventTime": "2024-05-21T12:49:02.783160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjbe9x1QC29W4gK9Vb"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "22f62df5-3874-4596-ae79-e2c0b78cb578", "DetectTime": "2024-05-21T12:49:02.796626+00:00", "EventTime": "2024-05-21T12:49:02.796647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQRHDRsEuZUPfJRR1"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "8d4d85b0-0721-447d-aeb0-6c0080012d39", "DetectTime": "2024-05-21T12:49:02.802613+00:00", "EventTime": "2024-05-21T12:49:02.802633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRr0mUQMEWRo7Lj2"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "c94a1448-6523-4848-bd73-3c302f58da03", "DetectTime": "2024-05-21T12:49:03.045529+00:00", "EventTime": "2024-05-21T12:49:03.045551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CghYn049Ulpkt4f3ze"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "b4e87049-2d78-40bc-b53d-e25791c9394f", "DetectTime": "2024-05-21T12:49:03.197572+00:00", "EventTime": "2024-05-21T12:49:03.197594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqHqy1dD36jda6Ylf"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "6de84916-13e2-4b10-9c44-4f501e7c565e", "DetectTime": "2024-05-21T12:49:03.546308+00:00", "EventTime": "2024-05-21T12:49:03.546332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck0h1g3mvPm2LeXJdh"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "70b6fed5-3b7e-44d1-b397-fd66d2cef851", "DetectTime": "2024-05-21T12:49:03.566516+00:00", "EventTime": "2024-05-21T12:49:03.566541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CswM1ckwZq4u2GP4h"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "f4efa55c-fc6f-427f-8c4e-94df826c6fc8", "DetectTime": "2024-05-21T12:49:03.572303+00:00", "EventTime": "2024-05-21T12:49:03.572325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LPng2gnk47D8rEAd"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "343b6428-b2eb-4db6-8260-80d616aa7521", "DetectTime": "2024-05-21T12:49:03.893984+00:00", "EventTime": "2024-05-21T12:49:03.894006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.189.57.28 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5tDjbiThk264Gyga"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "61d0f934-97cb-4409-b3b0-d181458baef3", "DetectTime": "2024-05-21T12:49:03.908261+00:00", "EventTime": "2024-05-21T12:49:03.908283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1h5oTCJ9h0psqnz3"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "0a18f1e2-4525-4d13-8920-85ef36bace31", "DetectTime": "2024-05-21T12:49:03.914016+00:00", "EventTime": "2024-05-21T12:49:03.914035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCtvB4k9UHDfN5Vg8"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d81f82d3-bf80-4864-b991-3afd103385bd", "DetectTime": "2024-05-21T12:49:03.919971+00:00", "EventTime": "2024-05-21T12:49:03.919989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfB8vy4rUCc3oNYhQa"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "5d78a282-a56a-45e8-b798-a215383bfeb5", "DetectTime": "2024-05-21T12:49:03.925400+00:00", "EventTime": "2024-05-21T12:49:03.925422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKoVnF4xWSphQqnvv9"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "97dfac84-a054-4829-abab-c8d883e30d67", "DetectTime": "2024-05-21T12:49:03.954188+00:00", "EventTime": "2024-05-21T12:49:03.954208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQkEi2b2vgbSMnSNi"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "9fb00c20-e7e3-422a-974a-b689fc63cd23", "DetectTime": "2024-05-21T12:49:04.370751+00:00", "EventTime": "2024-05-21T12:49:04.370771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClvFVs4CGyl9yGc44j"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "371bfbe0-6acb-4bab-ba32-0f761533385a", "DetectTime": "2024-05-21T12:49:04.376057+00:00", "EventTime": "2024-05-21T12:49:04.376076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjinzh4Bx2FRb55iz3"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "46a8e364-178f-414e-9867-6b4a72a44cbb", "DetectTime": "2024-05-21T12:49:04.429981+00:00", "EventTime": "2024-05-21T12:49:04.430002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZoNQcxaLALk2hzd"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "fcc2a2e7-52b7-4b91-a098-bc627a9c7836", "DetectTime": "2024-05-21T12:49:04.445164+00:00", "EventTime": "2024-05-21T12:49:04.445186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.109.245.154 AS: CYTA-NETWORK Internet Services, CY AS6866 rDNS: 93-245-154.netrun.cytanet.com.cy threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6YpqvnVjACKRAssj"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "97b23fc0-cc63-4eb1-888a-242dcbf59e4b", "DetectTime": "2024-05-21T12:49:04.473376+00:00", "EventTime": "2024-05-21T12:49:04.473397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClNdma3nG8ODLdUoef"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "a2b0583b-ec0d-4e27-b4ea-8cbe4c865de8", "DetectTime": "2024-05-21T12:49:04.493489+00:00", "EventTime": "2024-05-21T12:49:04.493511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuFmgr4gI5aBXT4A42"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d77ff7f5-2037-4d35-abc7-5c159fcc0b9a", "DetectTime": "2024-05-21T12:49:04.948192+00:00", "EventTime": "2024-05-21T12:49:04.948213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3XzW1rcZHkkYcqM7"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "b52c0b61-1061-4ee2-8f95-8be316d1fb50", "DetectTime": "2024-05-21T12:49:05.054333+00:00", "EventTime": "2024-05-21T12:49:05.054354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVGQWh27KjhbcPKTb9"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "1e56ce98-d940-4e24-8291-70bd65dae82f", "DetectTime": "2024-05-21T12:49:05.063486+00:00", "EventTime": "2024-05-21T12:49:05.063507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1hkbN3uG4zHq7sS1c"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "f6e36713-418e-4062-bde6-142424dfd120", "DetectTime": "2024-05-21T12:49:05.070201+00:00", "EventTime": "2024-05-21T12:49:05.070222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjVEx03F7vzwROtDG6"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "d846f135-0767-40ad-a911-877a88114c38", "DetectTime": "2024-05-21T12:49:05.080914+00:00", "EventTime": "2024-05-21T12:49:05.080935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzPuuc4aAqq1yi7Gff"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "18f34284-1c7e-463b-9907-4b655206144d", "DetectTime": "2024-05-21T12:49:05.086145+00:00", "EventTime": "2024-05-21T12:49:05.086166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVUIT3cLfBKJcTdb6"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "dc10ca9b-1c98-487b-a107-26318b478ea9", "DetectTime": "2024-05-21T12:49:05.092364+00:00", "EventTime": "2024-05-21T12:49:05.092385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzbLqJ1tieE8FuRQhc"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "83661432-6480-4b76-966b-b9ec792a5fe3", "DetectTime": "2024-05-21T12:49:05.529542+00:00", "EventTime": "2024-05-21T12:49:05.529565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVFpt1uaYmx7N1iCk"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "c1c5035d-1cfc-416f-9888-31a6b2eb3a00", "DetectTime": "2024-05-21T12:49:05.580655+00:00", "EventTime": "2024-05-21T12:49:05.580676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJTb749LVk1dskcl7"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "1d55384f-5418-451d-b198-d10d387bcdb7", "DetectTime": "2024-05-21T12:49:05.615383+00:00", "EventTime": "2024-05-21T12:49:05.615405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQFVBd3UNMeNnUpSFa"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "5b670892-1683-4605-a631-dcdb5d23949a", "DetectTime": "2024-05-21T12:49:05.648292+00:00", "EventTime": "2024-05-21T12:49:05.648313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrESP3KY7E9ihtd5l"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "79665b2d-0182-4d58-9bed-d8bb8b4cf63d", "DetectTime": "2024-05-21T12:49:05.669340+00:00", "EventTime": "2024-05-21T12:49:05.669360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxfFO3MxoJXwIpjCe"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "cb116c97-4634-4e42-8f77-a5e56ff8a0fd", "DetectTime": "2024-05-21T12:49:05.674166+00:00", "EventTime": "2024-05-21T12:49:05.674186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4BIir8O47lK3icf"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "f1effdef-9c49-4639-8574-4092a4a56411", "DetectTime": "2024-05-21T12:49:05.724103+00:00", "EventTime": "2024-05-21T12:49:05.724124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceq8HN3NlU0622gBs2"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "5aad5b17-f587-4313-9aa5-9d7591b3e08f", "DetectTime": "2024-05-21T12:49:06.128766+00:00", "EventTime": "2024-05-21T12:49:06.128787+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["124.194.94.131"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qYVs1HQ7e1ll3zVf"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "10f057e3-58bb-4f43-a812-d0b8e7aa5ae0", "DetectTime": "2024-05-21T12:49:06.142361+00:00", "EventTime": "2024-05-21T12:49:06.142395+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["124.194.94.131"]}], "Attach": [{"Content": "connection to blacklisted IP: 124.194.94.131 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qYVs1HQ7e1ll3zVf"], "accumulated_threat_level": 7.699999999999999, "timewindow": 36} +{"Format": "IDEA0", "ID": "f0f515e1-001a-422f-85ed-27d8c83a57b8", "DetectTime": "2024-05-21T12:49:06.148218+00:00", "EventTime": "2024-05-21T12:49:06.148271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy1Si3tlURPHeFdq"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "5fc0a195-037e-4b75-96a9-83d950ae8fe8", "DetectTime": "2024-05-21T12:49:06.179243+00:00", "EventTime": "2024-05-21T12:49:06.179265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyE3A4sMbUt4u7KEg"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "ef8c74d9-04f1-4783-9d70-a5995dbaec35", "DetectTime": "2024-05-21T12:49:06.184604+00:00", "EventTime": "2024-05-21T12:49:06.184626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU8NU83ks0iJ9ZPFu3"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "00b06cf9-357e-41c2-ad05-dec782e48e6d", "DetectTime": "2024-05-21T12:49:06.192164+00:00", "EventTime": "2024-05-21T12:49:06.192187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLzZq2lMiTq3KrbVj"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "ba92ecc8-e1c7-4d8e-9c43-8e5ad1d2d290", "DetectTime": "2024-05-21T12:49:06.198183+00:00", "EventTime": "2024-05-21T12:49:06.198205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmgeRu1joiDQ4BpCRh"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "24f5b66c-faa0-4926-b63d-28e54deba4af", "DetectTime": "2024-05-21T12:49:06.215015+00:00", "EventTime": "2024-05-21T12:49:06.215036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ZOzq1lZBZCdGlR13"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "0b6c4ba4-8699-4e3e-90a1-a717a54a5442", "DetectTime": "2024-05-21T12:49:06.243668+00:00", "EventTime": "2024-05-21T12:49:06.243691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcjyltXveXeDASt4"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "1fc84e4b-e323-4769-98bd-8d8872b17a97", "DetectTime": "2024-05-21T12:49:06.360524+00:00", "EventTime": "2024-05-21T12:49:06.360547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE60gD4DX2PYXu63Sj"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "7d5692f6-e3b9-41b8-b0d4-b966d4bdf038", "DetectTime": "2024-05-21T12:49:06.755580+00:00", "EventTime": "2024-05-21T12:49:06.755603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCrxH1SOH1LU7Csz1"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "bdc60e45-7996-4fd0-8890-0ccc9d92e274", "DetectTime": "2024-05-21T12:49:06.760698+00:00", "EventTime": "2024-05-21T12:49:06.760717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrEm0r20yDzmemWzL"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "f3e9df4c-739f-4000-b803-6fd86f4227ed", "DetectTime": "2024-05-21T12:49:06.765473+00:00", "EventTime": "2024-05-21T12:49:06.765492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzEyXmLP802RKMAk"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "24944abf-5d95-4ede-a8d7-d86768975de8", "DetectTime": "2024-05-21T12:49:06.777183+00:00", "EventTime": "2024-05-21T12:49:06.777208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ81Vc4qso2X0PmMOi"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "554a9a70-4618-43cd-af49-bc759ab775d9", "DetectTime": "2024-05-21T12:49:07.186059+00:00", "EventTime": "2024-05-21T12:49:07.186082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGdbbA4UNrZI54Ri1"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "b219d34b-5b37-4f18-ad5f-9023810f22df", "DetectTime": "2024-05-21T12:49:07.230933+00:00", "EventTime": "2024-05-21T12:49:07.230956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csm9Kh32YPRz4kUWn8"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "8d037110-ecea-4181-9d78-bbf4671747df", "DetectTime": "2024-05-21T12:49:07.322963+00:00", "EventTime": "2024-05-21T12:49:07.322986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXxZgw3xkEe6hGiqBf"], "accumulated_threat_level": 5.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "52362d2b-2444-447c-8371-7e32ce5d0938", "DetectTime": "2024-05-21T12:49:07.344970+00:00", "EventTime": "2024-05-21T12:49:07.344988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYzAh3CKBglYNWXKf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "7742a1b9-5b5c-4ac7-8cdd-f5279857b9bb", "DetectTime": "2024-05-21T12:49:07.392053+00:00", "EventTime": "2024-05-21T12:49:07.392075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlQfF22GBxfaBUTNd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "662dc571-b7ec-4bee-80ac-0ebc7cb56014", "DetectTime": "2024-05-21T12:49:07.397847+00:00", "EventTime": "2024-05-21T12:49:07.397868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCM9Zk92q6J3GwrEc"], "accumulated_threat_level": 0.8, "timewindow": 159} +{"Format": "IDEA0", "ID": "e615e242-0fff-4117-bee6-b26af416794e", "DetectTime": "2024-05-21T12:49:07.428594+00:00", "EventTime": "2024-05-21T12:49:07.428616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7Wzy10QFvcNn48Z6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "7dda4916-3a49-454d-b899-1e8893006da0", "DetectTime": "2024-05-21T12:49:07.470272+00:00", "EventTime": "2024-05-21T12:49:07.470294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9rDrmMngbP4BG9p2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "f8aa41ae-74ef-4c29-b935-f592dd0be110", "DetectTime": "2024-05-21T12:49:07.475255+00:00", "EventTime": "2024-05-21T12:49:07.475274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csb5Ju4uNp1m2enlsf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "b0fd9d83-e166-4f68-9ed8-25f32312b06e", "DetectTime": "2024-05-21T12:49:07.480257+00:00", "EventTime": "2024-05-21T12:49:07.480277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4oMh01F8HWUqMCGue"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "35ada592-5b2d-42b9-9844-202bffcc435b", "DetectTime": "2024-05-21T12:49:07.485404+00:00", "EventTime": "2024-05-21T12:49:07.485424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO2mpw4ho8klw9XcRk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "f4df93e0-34e4-4fb1-9366-518e9057779f", "DetectTime": "2024-05-21T12:49:07.798173+00:00", "EventTime": "2024-05-21T12:49:07.798194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGkGSP2sVNuXQj8j03"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "c66233f8-3991-41da-8a78-ffa63284e08f", "DetectTime": "2024-05-21T12:49:08.285174+00:00", "EventTime": "2024-05-21T12:49:08.285198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ComMcX3ggtkKYJn4G"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "6c87c8eb-7475-46d9-965a-d119df71afe5", "DetectTime": "2024-05-21T12:49:08.290037+00:00", "EventTime": "2024-05-21T12:49:08.290056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaDqRsoDiFN2VuLJ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "03b1f0b5-599d-42f2-876c-4fe06d937544", "DetectTime": "2024-05-21T12:49:08.306373+00:00", "EventTime": "2024-05-21T12:49:08.306395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKeUf4XS0HidrxVu4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "f7527ddd-6494-4815-854c-9fffcb51a541", "DetectTime": "2024-05-21T12:49:08.335460+00:00", "EventTime": "2024-05-21T12:49:08.335482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyIf54NQkJAw0JhXk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "af049dfb-a042-4f71-9e74-a00631d219f2", "DetectTime": "2024-05-21T12:49:08.340293+00:00", "EventTime": "2024-05-21T12:49:08.340311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hwEq3tMohYWyU0Zf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "16762e71-d36b-455b-9924-7e9f17f8576d", "DetectTime": "2024-05-21T12:49:08.345625+00:00", "EventTime": "2024-05-21T12:49:08.345647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZOwh1mabSM8XMwXl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "e1d4136c-113e-425e-bd63-ad70fb10acba", "DetectTime": "2024-05-21T12:49:08.350421+00:00", "EventTime": "2024-05-21T12:49:08.350441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPNXjz9hxfNqREAj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "34fa3671-c45f-4d4e-ac21-a3f85697705c", "DetectTime": "2024-05-21T12:49:08.567029+00:00", "EventTime": "2024-05-21T12:49:08.567054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmVeC7rn931QkrOg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "bc7ba0d9-83f6-48b4-8940-17f9943ab43d", "DetectTime": "2024-05-21T12:49:08.948371+00:00", "EventTime": "2024-05-21T12:49:08.948394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWaYGqzuu7y61Jnqb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "52523a30-57be-4723-9aa2-2fae4ad4a0de", "DetectTime": "2024-05-21T12:49:08.982936+00:00", "EventTime": "2024-05-21T12:49:08.982959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI44hn2FsiJ6cUU3li"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "e4f6e73e-44fb-4c14-8074-f7c3a05f36ad", "DetectTime": "2024-05-21T12:49:08.991412+00:00", "EventTime": "2024-05-21T12:49:08.991433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Wc1wMirBMkla6th"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "e4983eec-50ea-47a8-ad85-e2c8aabc0a1c", "DetectTime": "2024-05-21T12:49:08.997275+00:00", "EventTime": "2024-05-21T12:49:08.997295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcrMp1BkCORzRoZkf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "832bc19a-e402-4f87-a5eb-59ff4bd4982e", "DetectTime": "2024-05-21T12:49:09.076286+00:00", "EventTime": "2024-05-21T12:49:09.076306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyT0JI2qjEnTFqxF3i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "66e13d21-f335-4223-bd1b-4620bad9fc0c", "DetectTime": "2024-05-21T12:49:09.188424+00:00", "EventTime": "2024-05-21T12:49:09.188446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnuWWGbdhr8UeExR2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "0cf4cded-ca6a-4efb-8cf4-e69140c5daf6", "DetectTime": "2024-05-21T12:49:09.203611+00:00", "EventTime": "2024-05-21T12:49:09.203634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsvy12IB9iGUwyT88"], "accumulated_threat_level": 7.999999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "5469f0fd-e6b7-42e3-8a59-dd3cc2bd69dc", "DetectTime": "2024-05-21T12:49:09.435952+00:00", "EventTime": "2024-05-21T12:49:09.435973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8SndlaQKYPoHQTz9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "d73a5e77-d344-4642-a4c2-f7b9390eccae", "DetectTime": "2024-05-21T12:49:09.521156+00:00", "EventTime": "2024-05-21T12:49:09.521180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTurCW2dglYLiwaI65"], "accumulated_threat_level": 7.999999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "ae67630a-fc0c-47af-bbf1-2dfaf666d4d5", "DetectTime": "2024-05-21T12:49:09.563794+00:00", "EventTime": "2024-05-21T12:49:09.563814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.197.43.156"]}], "Attach": [{"Content": "Connection to unknown destination port 2982/UDP destination IP 71.197.43.156. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUn5eD1Op35VoPm35a"], "accumulated_threat_level": 8.799999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "4eefb0cf-239b-4bc7-91d5-00eb3911d43d", "DetectTime": "2024-05-21T12:49:09.617434+00:00", "EventTime": "2024-05-21T12:49:09.617458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtBLg4KHEV1cMZoWk"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "6e44ea66-a0dc-47f4-a1f7-c78bb6b29109", "DetectTime": "2024-05-21T12:49:09.668524+00:00", "EventTime": "2024-05-21T12:49:09.668544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX78xc1Z0zXPsdktsj"], "accumulated_threat_level": 10.4, "timewindow": 160} +{"Format": "IDEA0", "ID": "2c190d15-13a6-4bf2-9b3a-2e98404b2889", "DetectTime": "2024-05-21T12:49:09.949561+00:00", "EventTime": "2024-05-21T12:49:09.949583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRhPZ1mkfBSBo8nDg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 160} +{"Format": "IDEA0", "ID": "909cced5-731d-4f7a-8a35-ff04012fd78d", "DetectTime": "2024-05-21T12:49:09.999127+00:00", "EventTime": "2024-05-21T12:49:09.999147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpUpIfzBw2Pre9Ti"], "accumulated_threat_level": 12.000000000000002, "timewindow": 160} +{"Format": "Json", "ID": "909cced5-731d-4f7a-8a35-ff04012fd78d", "DetectTime": "2024-05-21T12:49:09.999127+00:00", "EventTime": "2024-05-21T12:49:09.999147+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-07T15:55:01.751704+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2024/05/21 12:49:10.238809)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 160, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d1d3bceb-7355-47ec-a04f-8f59ea2fb153", "DetectTime": "2024-05-21T12:49:10.252016+00:00", "EventTime": "2024-05-21T12:49:10.252036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKYsPyr1SEYocSDl"], "accumulated_threat_level": 0.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "539a7a75-3ad8-4dd8-bad6-24b7a6682242", "DetectTime": "2024-05-21T12:49:10.257116+00:00", "EventTime": "2024-05-21T12:49:10.257134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRwlSC4H4UKkIDsOW4"], "accumulated_threat_level": 0.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "e923818f-1168-4755-9bd1-4956fc96c447", "DetectTime": "2024-05-21T12:49:10.270097+00:00", "EventTime": "2024-05-21T12:49:10.270119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXjASl31KznWlC18dl"], "accumulated_threat_level": 1.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "2049c307-dc16-4643-8405-ad3f5f09de96", "DetectTime": "2024-05-21T12:49:10.281785+00:00", "EventTime": "2024-05-21T12:49:10.281805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFAOZ2Jl0UZQpOJ03"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 160} +{"Format": "IDEA0", "ID": "7476d658-77ca-4c39-a619-ec09c95ee745", "DetectTime": "2024-05-21T12:49:10.293655+00:00", "EventTime": "2024-05-21T12:49:10.293675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vmw54g2inxNsfyw1"], "accumulated_threat_level": 3.2, "timewindow": 160} +{"Format": "IDEA0", "ID": "0dd0cbfa-0de3-4bb5-a6bb-cec9ec431fb0", "DetectTime": "2024-05-21T12:49:10.306015+00:00", "EventTime": "2024-05-21T12:49:10.306037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJHyB2XQKVc7tEFmd"], "accumulated_threat_level": 4.0, "timewindow": 160} +{"Format": "IDEA0", "ID": "1832c746-c35c-41a1-bbff-af4e618b3150", "DetectTime": "2024-05-21T12:49:10.585450+00:00", "EventTime": "2024-05-21T12:49:10.585470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0Raz1TdKPkO3KLh1"], "accumulated_threat_level": 4.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "e76e3746-2192-4d1a-b386-bec3878a0d32", "DetectTime": "2024-05-21T12:49:10.723076+00:00", "EventTime": "2024-05-21T12:49:10.723096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cas4AxYJzVLfcU7p5"], "accumulated_threat_level": 4.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "b90cdaa5-220f-4700-828b-cff7f4b50605", "DetectTime": "2024-05-21T12:49:10.773409+00:00", "EventTime": "2024-05-21T12:49:10.773429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5vRa1XT5e0jgdKf1"], "accumulated_threat_level": 5.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "53def80d-ad3c-4953-999c-9b9afa90fed4", "DetectTime": "2024-05-21T12:49:10.825582+00:00", "EventTime": "2024-05-21T12:49:10.825601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHG7A0vI0NnC9qcl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "7b324d5a-083a-4e65-9b21-31e152214122", "DetectTime": "2024-05-21T12:49:10.879593+00:00", "EventTime": "2024-05-21T12:49:10.879611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvKqb4C0zqKPQpse6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "aedc3f70-b69f-4f55-ac3e-ac02beb563cb", "DetectTime": "2024-05-21T12:49:10.924140+00:00", "EventTime": "2024-05-21T12:49:10.924161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5z0Pp1kak3iwmJyij"], "accumulated_threat_level": 7.999999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "0b5c797d-2895-4b29-99e5-984a70b35655", "DetectTime": "2024-05-21T12:49:10.992836+00:00", "EventTime": "2024-05-21T12:49:10.992854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgPBtt3BWcsofhocVc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "226b3200-b16d-48f5-887b-3f59527b9e3a", "DetectTime": "2024-05-21T12:49:11.238419+00:00", "EventTime": "2024-05-21T12:49:11.238443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd9kxS2cesOxOF3kqh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "0d36b6f9-389c-480c-8fbe-1fe006783df6", "DetectTime": "2024-05-21T12:49:11.294942+00:00", "EventTime": "2024-05-21T12:49:11.294960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT3Y1auwKXJnHRHFa"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "e3dadcce-2ba3-43ed-b0d2-29cfa7766349", "DetectTime": "2024-05-21T12:49:11.337576+00:00", "EventTime": "2024-05-21T12:49:11.337594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdT4A4YiGrmNlGs0g"], "accumulated_threat_level": 10.4, "timewindow": 160} +{"Format": "IDEA0", "ID": "8dbc66e5-e9b1-40f7-9ed8-f30fc13f81b6", "DetectTime": "2024-05-21T12:49:11.386705+00:00", "EventTime": "2024-05-21T12:49:11.386723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CElWzXSF2puWEkJtk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 160} +{"Format": "IDEA0", "ID": "31ed6d35-3190-43c4-8e81-9bb50992a563", "DetectTime": "2024-05-21T12:49:11.434935+00:00", "EventTime": "2024-05-21T12:49:11.434955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLuCekN3mAMLt7gj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 160} +{"Format": "Json", "ID": "31ed6d35-3190-43c4-8e81-9bb50992a563", "DetectTime": "2024-05-21T12:49:11.434935+00:00", "EventTime": "2024-05-21T12:49:11.434955+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-07T15:55:23.990909+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 160. (real time 2024/05/21 12:49:11.741417)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 160, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "eb80eb2c-aa3e-4de6-a1a9-dcc29f70e515", "DetectTime": "2024-05-21T12:49:11.753273+00:00", "EventTime": "2024-05-21T12:49:11.753295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8WZ13Yzf74beN0pb"], "accumulated_threat_level": 0.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "3fa29bfa-6a64-45ff-86f2-ec1fb8fa55de", "DetectTime": "2024-05-21T12:49:11.770367+00:00", "EventTime": "2024-05-21T12:49:11.770387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiMEA4rizpVb2Ybqc"], "accumulated_threat_level": 1.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "eeb6dcee-91f7-453d-b85d-0863b51a046d", "DetectTime": "2024-05-21T12:49:11.845390+00:00", "EventTime": "2024-05-21T12:49:11.845413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMGeVL3uitD8bx1DEj"], "accumulated_threat_level": 1.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "caaa2c16-1a17-427e-b7c9-6ad9cfde1b76", "DetectTime": "2024-05-21T12:49:11.889538+00:00", "EventTime": "2024-05-21T12:49:11.889557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLeoXYOqFjoUkAaf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 160} +{"Format": "IDEA0", "ID": "96353d72-c6ed-49ef-bf1e-60978e016e3c", "DetectTime": "2024-05-21T12:49:11.930721+00:00", "EventTime": "2024-05-21T12:49:11.930742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK6pHO2kavyJvEyCLb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 160} +{"Format": "IDEA0", "ID": "dc14dca1-1412-48cc-a7f5-bd970e60d9bc", "DetectTime": "2024-05-21T12:49:11.979193+00:00", "EventTime": "2024-05-21T12:49:11.979211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yFM44FIc2S935gu3"], "accumulated_threat_level": 3.2, "timewindow": 160} +{"Format": "IDEA0", "ID": "97fb9f31-2539-416f-b7e6-eed255ce22aa", "DetectTime": "2024-05-21T12:49:12.025170+00:00", "EventTime": "2024-05-21T12:49:12.025191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNrTd2sQRfU17fZg7"], "accumulated_threat_level": 4.0, "timewindow": 160} +{"Format": "IDEA0", "ID": "497ae9b8-ceed-4761-872c-84d61a39d4c1", "DetectTime": "2024-05-21T12:49:12.074208+00:00", "EventTime": "2024-05-21T12:49:12.074228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YR026EErefx1m1i"], "accumulated_threat_level": 4.8, "timewindow": 160} +{"Format": "IDEA0", "ID": "904749a4-8b43-4f70-bb36-7d75e9e8e555", "DetectTime": "2024-05-21T12:49:12.120686+00:00", "EventTime": "2024-05-21T12:49:12.120706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV0CQ64QtTTO4jds7d"], "accumulated_threat_level": 5.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "dcb80658-70ea-4db7-812c-f55d49bc051a", "DetectTime": "2024-05-21T12:49:12.169797+00:00", "EventTime": "2024-05-21T12:49:12.169817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB8w6r2eEfGEwQ81Wh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "689e0a0c-5ba1-47dc-b7b1-eccf81285f3d", "DetectTime": "2024-05-21T12:49:12.389333+00:00", "EventTime": "2024-05-21T12:49:12.389355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFiOh04zD6RWaMfq9e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 160} +{"Format": "IDEA0", "ID": "06f047c4-b043-44d9-879b-2f40ca5d7f22", "DetectTime": "2024-05-21T12:49:12.438152+00:00", "EventTime": "2024-05-21T12:49:12.438171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfP2zDClRUVuXchc9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "77603f36-f1f9-4f5e-83ae-8c13746b2ed9", "DetectTime": "2024-05-21T12:49:12.489081+00:00", "EventTime": "2024-05-21T12:49:12.489101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIXk7J2jvCl7Dgo6s3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "a3b5c72d-6d49-47f9-9524-d8f190c0d593", "DetectTime": "2024-05-21T12:49:12.536073+00:00", "EventTime": "2024-05-21T12:49:12.536091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSNXU3n9zXKS8BREl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 160} +{"Format": "IDEA0", "ID": "4a9f7d66-810c-4528-b6d5-2c5fbadefdec", "DetectTime": "2024-05-21T12:49:12.556728+00:00", "EventTime": "2024-05-21T12:49:12.556746+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4yXxVdCHzsDPJwf"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "d456caa0-9647-42da-9ea7-af6fb88e16d9", "DetectTime": "2024-05-21T12:49:12.569109+00:00", "EventTime": "2024-05-21T12:49:12.569128+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci4yXxVdCHzsDPJwf"], "accumulated_threat_level": 8.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "cc328387-9195-4b85-88c3-8f5570f8869d", "DetectTime": "2024-05-21T12:49:12.590338+00:00", "EventTime": "2024-05-21T12:49:12.590358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67RDp2OaJETt81Cq6"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "eef7215f-a09b-4c57-877e-8a943e1c2d36", "DetectTime": "2024-05-21T12:49:12.697365+00:00", "EventTime": "2024-05-21T12:49:12.697387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFUgA40FXPd8c2Pq3"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "913fe54a-1552-4f11-a94b-415b6bf92bed", "DetectTime": "2024-05-21T12:49:12.714473+00:00", "EventTime": "2024-05-21T12:49:12.714495+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgFUgA40FXPd8c2Pq3"], "accumulated_threat_level": 8.7, "timewindow": 36} +{"Format": "IDEA0", "ID": "e0e25378-c7f3-42b8-830a-2c37f1308188", "DetectTime": "2024-05-21T12:49:12.727695+00:00", "EventTime": "2024-05-21T12:49:12.727714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C258ik4vAGriT15Xj2"], "accumulated_threat_level": 1.3, "timewindow": 161} +{"Format": "IDEA0", "ID": "f2438ae0-7023-4bca-8794-db9dd97936ea", "DetectTime": "2024-05-21T12:49:12.743281+00:00", "EventTime": "2024-05-21T12:49:12.743301+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPCrq2RvBVxD9yrre"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "141cd0d7-18dd-4e68-9ad5-523c57b6f5be", "DetectTime": "2024-05-21T12:49:12.757019+00:00", "EventTime": "2024-05-21T12:49:12.757037+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPCrq2RvBVxD9yrre"], "accumulated_threat_level": 9.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "e5679c3a-3aea-4a0e-8f34-73f4b2399c2f", "DetectTime": "2024-05-21T12:49:12.884106+00:00", "EventTime": "2024-05-21T12:49:12.884125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkxHs0UrZZVTH5Le"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "296aee97-f307-472e-9f3c-e2b8e7fd602f", "DetectTime": "2024-05-21T12:49:12.897821+00:00", "EventTime": "2024-05-21T12:49:12.897847+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNkxHs0UrZZVTH5Le"], "accumulated_threat_level": 9.7, "timewindow": 36} +{"Format": "IDEA0", "ID": "62602682-a85d-4183-abbf-09dbe46cbe44", "DetectTime": "2024-05-21T12:49:12.984150+00:00", "EventTime": "2024-05-21T12:49:12.984171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qBNs3UUwYLPxKTf4"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "b9809db0-1163-4a03-a15f-9389bb0812e7", "DetectTime": "2024-05-21T12:49:13.023021+00:00", "EventTime": "2024-05-21T12:49:13.023041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3ZmIEFIqxlGMuy7"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "40ea5be4-29bc-4a63-a7de-2d0d571c9f9a", "DetectTime": "2024-05-21T12:49:13.036185+00:00", "EventTime": "2024-05-21T12:49:13.036205+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3ZmIEFIqxlGMuy7"], "accumulated_threat_level": 10.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "1a2ae2c1-2163-44f0-b41d-4e3a7585f159", "DetectTime": "2024-05-21T12:49:13.065214+00:00", "EventTime": "2024-05-21T12:49:13.065233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LOX31GzaZPjZMIF1"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "78ef6ec6-6ccc-462c-b9bc-1b3912b2b8bd", "DetectTime": "2024-05-21T12:49:13.078855+00:00", "EventTime": "2024-05-21T12:49:13.078878+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5LOX31GzaZPjZMIF1"], "accumulated_threat_level": 10.7, "timewindow": 36} +{"Format": "IDEA0", "ID": "99dca4cd-a667-4dba-8c89-6568d03dad0a", "DetectTime": "2024-05-21T12:49:13.105258+00:00", "EventTime": "2024-05-21T12:49:13.105279+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6Rnv4r2spX2lmf0d"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "76b043e2-70af-44b4-b8c2-fb683f3c43d3", "DetectTime": "2024-05-21T12:49:13.119009+00:00", "EventTime": "2024-05-21T12:49:13.119027+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX6Rnv4r2spX2lmf0d"], "accumulated_threat_level": 11.2, "timewindow": 36} +{"Format": "IDEA0", "ID": "34c41e01-4f8f-44a8-8d38-bc2816a08806", "DetectTime": "2024-05-21T12:49:13.131173+00:00", "EventTime": "2024-05-21T12:49:13.131191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRtt41M1IgWYIPS4h"], "accumulated_threat_level": 2.1, "timewindow": 161} +{"Format": "IDEA0", "ID": "ef91a7d3-85b2-48ad-8b3e-609e0e92e2da", "DetectTime": "2024-05-21T12:49:13.164179+00:00", "EventTime": "2024-05-21T12:49:13.164202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQqxJMQYh9MxCBVF3"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 161} +{"Format": "IDEA0", "ID": "476123a4-e874-4707-a418-27327597d94b", "DetectTime": "2024-05-21T12:49:13.215286+00:00", "EventTime": "2024-05-21T12:49:13.215305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzvSBu10lDL6YX2w13"], "accumulated_threat_level": 3.7, "timewindow": 161} +{"Format": "IDEA0", "ID": "a97b7c4f-396a-47ea-bcc8-291a453f2bcc", "DetectTime": "2024-05-21T12:49:13.247725+00:00", "EventTime": "2024-05-21T12:49:13.247743+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblDpe4HROKgczuUcc"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "93befa14-75aa-4e47-b736-c9f6383933f9", "DetectTime": "2024-05-21T12:49:13.261115+00:00", "EventTime": "2024-05-21T12:49:13.261134+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblDpe4HROKgczuUcc"], "accumulated_threat_level": 11.7, "timewindow": 36} +{"Format": "IDEA0", "ID": "dc7c53b0-20cc-4624-b66d-d213a32e1980", "DetectTime": "2024-05-21T12:49:13.272855+00:00", "EventTime": "2024-05-21T12:49:13.272874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7vh7eLT0jPTfNw2"], "accumulated_threat_level": 4.5, "timewindow": 161} +{"Format": "IDEA0", "ID": "de8d2c41-18dc-44db-9d33-6e2f2a3fdc50", "DetectTime": "2024-05-21T12:49:13.331167+00:00", "EventTime": "2024-05-21T12:49:13.331186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU7QK1tT058gDFHV4"], "accumulated_threat_level": 5.3, "timewindow": 161} +{"Format": "IDEA0", "ID": "73540455-8b49-4351-9a40-0d24e6176d01", "DetectTime": "2024-05-21T12:49:13.363419+00:00", "EventTime": "2024-05-21T12:49:13.363441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG8Psi2mmzu6CRemz2"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "f37cd147-b79e-4f39-9a0f-68ca32d8d8cf", "DetectTime": "2024-05-21T12:49:13.421778+00:00", "EventTime": "2024-05-21T12:49:13.421797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZyhY3tPk7vCFwoWd"], "accumulated_threat_level": 6.1, "timewindow": 161} +{"Format": "IDEA0", "ID": "bf361fe1-864d-482c-91d7-b0eb6a4ede16", "DetectTime": "2024-05-21T12:49:13.501519+00:00", "EventTime": "2024-05-21T12:49:13.501538+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbzrjo23p8h7e7S1ec"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "95d7be7d-cad9-41e9-9cb4-b48a5178419f", "DetectTime": "2024-05-21T12:49:13.514135+00:00", "EventTime": "2024-05-21T12:49:13.514154+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbzrjo23p8h7e7S1ec"], "accumulated_threat_level": 12.2, "timewindow": 36} +{"Format": "Json", "ID": "95d7be7d-cad9-41e9-9cb4-b48a5178419f", "DetectTime": "2024-05-21T12:49:13.514135+00:00", "EventTime": "2024-05-21T12:49:13.514154+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "1970-01-02T11:09:13.371244+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2024/05/21 12:49:14.163335)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.2, "timewindow": 36, "profileid": "profile_10.0.2.19", "threat_level": 12.2} +{"Format": "IDEA0", "ID": "f28c22e7-f532-4093-bf65-2cb12fc7fa20", "DetectTime": "2024-05-21T12:49:14.177108+00:00", "EventTime": "2024-05-21T12:49:14.177128+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clw6UX9CkzCynlghh"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "7e6a294b-eb35-4e00-973b-65d41b23fb4a", "DetectTime": "2024-05-21T12:49:14.189862+00:00", "EventTime": "2024-05-21T12:49:14.189882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clw6UX9CkzCynlghh"], "accumulated_threat_level": 0.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "6b26c3ab-17d2-45f2-aee7-f146fa34fee4", "DetectTime": "2024-05-21T12:49:14.203287+00:00", "EventTime": "2024-05-21T12:49:14.203305+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipiBa2xh54TTH5gCk"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "952c5726-3232-4064-8787-bb771e5fa41d", "DetectTime": "2024-05-21T12:49:14.215995+00:00", "EventTime": "2024-05-21T12:49:14.216016+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipiBa2xh54TTH5gCk"], "accumulated_threat_level": 1.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "53be0d28-aaf2-49ae-aafd-e051606267c7", "DetectTime": "2024-05-21T12:49:14.227266+00:00", "EventTime": "2024-05-21T12:49:14.227284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C20hms111SHhNvpm8f"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "ec790a34-6480-41eb-a787-562fa75e5e6e", "DetectTime": "2024-05-21T12:49:14.232274+00:00", "EventTime": "2024-05-21T12:49:14.232292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfN103lXQgGnUzkx3"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "06a45877-f448-4c1d-8471-2679b6248d32", "DetectTime": "2024-05-21T12:49:14.251018+00:00", "EventTime": "2024-05-21T12:49:14.251041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1KaqL2AUyQj7YPYch"], "accumulated_threat_level": 7.699999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "f23e3639-d8b5-4805-aef6-f9bc9413704b", "DetectTime": "2024-05-21T12:49:14.264928+00:00", "EventTime": "2024-05-21T12:49:14.264945+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7k1S24c5zXa9jiLa"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "8c7889ad-0602-45c8-9cc3-78bd816c608e", "DetectTime": "2024-05-21T12:49:14.277516+00:00", "EventTime": "2024-05-21T12:49:14.277535+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm7k1S24c5zXa9jiLa"], "accumulated_threat_level": 1.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "d0950230-090d-4c46-bddc-4e0a5ba0df3f", "DetectTime": "2024-05-21T12:49:14.290555+00:00", "EventTime": "2024-05-21T12:49:14.290582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzOst3VO5hWJkU96l"], "accumulated_threat_level": 8.5, "timewindow": 161} +{"Format": "IDEA0", "ID": "3d2a24ad-d687-4c44-acdf-f9c0ab1aa441", "DetectTime": "2024-05-21T12:49:14.303770+00:00", "EventTime": "2024-05-21T12:49:14.303789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0dhv24Eclk2Ub44h"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "9e4aca6b-160d-4aba-9db5-b5d8ef0f97d4", "DetectTime": "2024-05-21T12:49:14.317291+00:00", "EventTime": "2024-05-21T12:49:14.317311+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0dhv24Eclk2Ub44h"], "accumulated_threat_level": 2.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "4364eb70-177f-40cb-b6ce-e05a5a084668", "DetectTime": "2024-05-21T12:49:14.328844+00:00", "EventTime": "2024-05-21T12:49:14.328862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmCdU30wnPDViBLXe"], "accumulated_threat_level": 9.3, "timewindow": 161} +{"Format": "IDEA0", "ID": "cf64dc2c-e4e7-43c9-a390-c71dbd90e19f", "DetectTime": "2024-05-21T12:49:14.340533+00:00", "EventTime": "2024-05-21T12:49:14.340555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaZdum1mMW1nUe3h56"], "accumulated_threat_level": 10.100000000000001, "timewindow": 161} +{"Format": "IDEA0", "ID": "81659280-6230-451f-b3de-5fc3c155e127", "DetectTime": "2024-05-21T12:49:14.352903+00:00", "EventTime": "2024-05-21T12:49:14.352922+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTR74r1u9u1hmzS9z7"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "277f4599-a735-4ba6-b5d0-b2d87a25f8a2", "DetectTime": "2024-05-21T12:49:14.365904+00:00", "EventTime": "2024-05-21T12:49:14.365925+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTR74r1u9u1hmzS9z7"], "accumulated_threat_level": 2.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "a87e29df-a9e8-4df4-a4e8-1f127949ea1d", "DetectTime": "2024-05-21T12:49:14.379699+00:00", "EventTime": "2024-05-21T12:49:14.379718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8S9c63GMGVxLIYpKj"], "accumulated_threat_level": 10.900000000000002, "timewindow": 161} +{"Format": "IDEA0", "ID": "9142c7f0-6cef-40f6-9b1c-a20061f1076d", "DetectTime": "2024-05-21T12:49:14.393520+00:00", "EventTime": "2024-05-21T12:49:14.393538+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNxQE4cSz8J1Xfsi4"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "9516b98b-41bb-4317-b807-af1a7c259771", "DetectTime": "2024-05-21T12:49:14.408394+00:00", "EventTime": "2024-05-21T12:49:14.408413+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNxQE4cSz8J1Xfsi4"], "accumulated_threat_level": 3.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "9ebcf33a-8947-476a-887b-0b7515fe6580", "DetectTime": "2024-05-21T12:49:14.425338+00:00", "EventTime": "2024-05-21T12:49:14.425356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSoCHGSexnznwLBp8"], "accumulated_threat_level": 11.700000000000003, "timewindow": 161} +{"Format": "IDEA0", "ID": "adc3cb43-92cf-4d0f-add4-474f033298e5", "DetectTime": "2024-05-21T12:49:14.439379+00:00", "EventTime": "2024-05-21T12:49:14.439400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1D2061xbApBMwAR2b"], "accumulated_threat_level": 12.500000000000004, "timewindow": 161} +{"Format": "Json", "ID": "adc3cb43-92cf-4d0f-add4-474f033298e5", "DetectTime": "2024-05-21T12:49:14.439379+00:00", "EventTime": "2024-05-21T12:49:14.439400+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-07T16:26:51.723666+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2024/05/21 12:49:14.674455)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 161, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "996028a6-700d-4f0d-b4c3-d720ce328960", "DetectTime": "2024-05-21T12:49:14.685837+00:00", "EventTime": "2024-05-21T12:49:14.685859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceu2Ls1DjL3rYnxhM3"], "accumulated_threat_level": 0.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "ef5fa4cd-dcf2-42c4-ba9f-e5a99616b9dc", "DetectTime": "2024-05-21T12:49:14.700456+00:00", "EventTime": "2024-05-21T12:49:14.700478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvoYoF4CJUHorHai"], "accumulated_threat_level": 1.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "97530b6a-c68b-46b4-8183-204ccb44fc6e", "DetectTime": "2024-05-21T12:49:14.713250+00:00", "EventTime": "2024-05-21T12:49:14.713268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn6rtKR1LnlzkG1wg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 161} +{"Format": "IDEA0", "ID": "53186ef3-10cb-4e4d-98cf-b590865093a2", "DetectTime": "2024-05-21T12:49:14.718069+00:00", "EventTime": "2024-05-21T12:49:14.718089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxda81tP6OdvjfOHa"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "2ce97016-2625-4dce-8c3b-fbc4cedd4cc4", "DetectTime": "2024-05-21T12:49:14.730735+00:00", "EventTime": "2024-05-21T12:49:14.730755+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIilDL1LeqJpnwO59"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "655e0f18-b305-4bcb-9a59-47bed8b32797", "DetectTime": "2024-05-21T12:49:14.745330+00:00", "EventTime": "2024-05-21T12:49:14.745351+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIilDL1LeqJpnwO59"], "accumulated_threat_level": 3.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "260597ad-f5ed-44ed-892f-fbc919aa8da9", "DetectTime": "2024-05-21T12:49:14.759742+00:00", "EventTime": "2024-05-21T12:49:14.759765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxggWVsKYJXdLfr3"], "accumulated_threat_level": 3.2, "timewindow": 161} +{"Format": "IDEA0", "ID": "f256c305-9e11-4fcd-876c-2f1ace873136", "DetectTime": "2024-05-21T12:49:14.774083+00:00", "EventTime": "2024-05-21T12:49:14.774103+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfwSU2jdNuMH7kFA2"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "d113ba44-9fb7-45ea-9bb3-6864a1bf37bd", "DetectTime": "2024-05-21T12:49:14.785838+00:00", "EventTime": "2024-05-21T12:49:14.785855+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHfwSU2jdNuMH7kFA2"], "accumulated_threat_level": 4.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "98f87d16-387b-46d4-8683-26eeedf5fa58", "DetectTime": "2024-05-21T12:49:14.923757+00:00", "EventTime": "2024-05-21T12:49:14.923779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWuGlduv5BpaHCK33"], "accumulated_threat_level": 4.0, "timewindow": 161} +{"Format": "IDEA0", "ID": "a3ebd2d9-69a1-4824-b627-7e51ca897289", "DetectTime": "2024-05-21T12:49:14.967356+00:00", "EventTime": "2024-05-21T12:49:14.967375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDoLJqywTdHIwDv1"], "accumulated_threat_level": 4.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "0d7c8fef-ed13-4350-8eff-c7e4ae12a41f", "DetectTime": "2024-05-21T12:49:15.012409+00:00", "EventTime": "2024-05-21T12:49:15.012428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch5T1jEqIQqEWovca"], "accumulated_threat_level": 5.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "adb82740-ac94-4067-92f6-30928fd49ed9", "DetectTime": "2024-05-21T12:49:15.038149+00:00", "EventTime": "2024-05-21T12:49:15.038167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycFef2CkykpD4L32"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "0d4a02b0-136f-4f2a-9ee7-09abdc2d5aec", "DetectTime": "2024-05-21T12:49:15.050401+00:00", "EventTime": "2024-05-21T12:49:15.050432+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycFef2CkykpD4L32"], "accumulated_threat_level": 4.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "4740bb6d-14df-4e28-a50b-2723e80889b5", "DetectTime": "2024-05-21T12:49:15.063153+00:00", "EventTime": "2024-05-21T12:49:15.063172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7SQv3teTFxuPzfk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "42c34f67-c7aa-4f73-ab8c-8e6ce1261b6d", "DetectTime": "2024-05-21T12:49:15.112368+00:00", "EventTime": "2024-05-21T12:49:15.112389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbwVi1AfVejUL5xn3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "e68d226c-5c96-43be-bf39-b1a8314e8b62", "DetectTime": "2024-05-21T12:49:15.145881+00:00", "EventTime": "2024-05-21T12:49:15.145901+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUyn829f128EvqTde"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "c70e09d9-668b-406f-972c-0a9e25f39f4d", "DetectTime": "2024-05-21T12:49:15.158871+00:00", "EventTime": "2024-05-21T12:49:15.158890+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXUyn829f128EvqTde"], "accumulated_threat_level": 5.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "b5d19246-4bfc-42f5-906f-3e5b0666ea9e", "DetectTime": "2024-05-21T12:49:15.164621+00:00", "EventTime": "2024-05-21T12:49:15.164641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRZQTR11wdJbqebn5b"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "2a1e26e2-e8b3-4bea-93f7-884e9907b30f", "DetectTime": "2024-05-21T12:49:15.189171+00:00", "EventTime": "2024-05-21T12:49:15.189190+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNexNWjz6NPJQQej"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "d01638f4-dc35-4ab2-89b9-75737dcb289d", "DetectTime": "2024-05-21T12:49:15.204497+00:00", "EventTime": "2024-05-21T12:49:15.204520+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbNexNWjz6NPJQQej"], "accumulated_threat_level": 5.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "adcc2875-3898-4fe6-a8f4-0e10757f6645", "DetectTime": "2024-05-21T12:49:15.222383+00:00", "EventTime": "2024-05-21T12:49:15.222428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTBdi1i0xp42VeIb6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "af66a9f1-6bf0-4e81-becb-60b6678f6933", "DetectTime": "2024-05-21T12:49:15.351802+00:00", "EventTime": "2024-05-21T12:49:15.351820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHr4i3frxqUsMA8f8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "ec28823b-45d7-485a-b3f4-f5482ef8f830", "DetectTime": "2024-05-21T12:49:15.624910+00:00", "EventTime": "2024-05-21T12:49:15.624929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVgnqF4IWbyvnBBuu4"], "accumulated_threat_level": 9.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "cffbf6ad-07e2-4ecf-9d6b-6e644ba928f2", "DetectTime": "2024-05-21T12:49:15.667517+00:00", "EventTime": "2024-05-21T12:49:15.667539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPVvNn3kjLZiYRWwEe"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "822e61e7-2666-494b-a269-bd8579a2e6e9", "DetectTime": "2024-05-21T12:49:15.713206+00:00", "EventTime": "2024-05-21T12:49:15.713224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgvmyd2rygYVwCwszc"], "accumulated_threat_level": 10.4, "timewindow": 161} +{"Format": "IDEA0", "ID": "af0ed3fe-d42a-4f5e-9cd6-f64a4a12592c", "DetectTime": "2024-05-21T12:49:15.768500+00:00", "EventTime": "2024-05-21T12:49:15.768523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqxLj4300aEyJCf6Ek"], "accumulated_threat_level": 11.200000000000001, "timewindow": 161} +{"Format": "IDEA0", "ID": "91598904-12d1-4f1f-b37c-457f24394a1b", "DetectTime": "2024-05-21T12:49:15.818499+00:00", "EventTime": "2024-05-21T12:49:15.818518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19is1ZTOIeAWuetc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 161} +{"Format": "Json", "ID": "91598904-12d1-4f1f-b37c-457f24394a1b", "DetectTime": "2024-05-21T12:49:15.818499+00:00", "EventTime": "2024-05-21T12:49:15.818518+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-07T16:26:55.198839+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2024/05/21 12:49:15.981221)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 161, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2f37fed4-595d-4327-88e5-1edc42e22911", "DetectTime": "2024-05-21T12:49:15.993270+00:00", "EventTime": "2024-05-21T12:49:15.993288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCGmz2Vyr5LgikxSi"], "accumulated_threat_level": 0.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "95965283-74f5-415c-9a3b-af1bafd37939", "DetectTime": "2024-05-21T12:49:15.998223+00:00", "EventTime": "2024-05-21T12:49:15.998240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQdg3a1ksm3PRUf6Dk"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "00df1ac1-51b5-4b85-aee2-46f0c1973304", "DetectTime": "2024-05-21T12:49:16.172089+00:00", "EventTime": "2024-05-21T12:49:16.172114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUbE3j1w1wjN1BXvak"], "accumulated_threat_level": 1.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "221749f6-7c02-4f0d-86b6-4a6a356c81fa", "DetectTime": "2024-05-21T12:49:16.218601+00:00", "EventTime": "2024-05-21T12:49:16.218638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZf0v02IcBu4jEo1C9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 161} +{"Format": "IDEA0", "ID": "fdbd979d-ca58-42af-af59-1204962471a2", "DetectTime": "2024-05-21T12:49:16.265849+00:00", "EventTime": "2024-05-21T12:49:16.265882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmLQcOvsvyT1PMa4"], "accumulated_threat_level": 3.2, "timewindow": 161} +{"Format": "IDEA0", "ID": "e8bc86c5-5275-49b1-8c29-1b70c7409279", "DetectTime": "2024-05-21T12:49:16.368080+00:00", "EventTime": "2024-05-21T12:49:16.368101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtO8kw4ao7Uh1ZRT8g"], "accumulated_threat_level": 4.0, "timewindow": 161} +{"Format": "IDEA0", "ID": "7aa7bc25-02aa-46eb-84b6-bc63f02591bb", "DetectTime": "2024-05-21T12:49:16.457039+00:00", "EventTime": "2024-05-21T12:49:16.457059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVt7U62acgghkjX2rl"], "accumulated_threat_level": 4.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "1ef929fb-e0e6-4b7c-82bd-fbd4b2c61a48", "DetectTime": "2024-05-21T12:49:16.497196+00:00", "EventTime": "2024-05-21T12:49:16.497217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP31F83vQh1XkoFpuj"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "98d61f98-c801-4f4f-967a-eca232be8cf3", "DetectTime": "2024-05-21T12:49:16.546220+00:00", "EventTime": "2024-05-21T12:49:16.546239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ2fUU1Lay7a226jYk"], "accumulated_threat_level": 5.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "a3b33fe8-d075-4752-985d-3b5c78dc1e44", "DetectTime": "2024-05-21T12:49:16.854607+00:00", "EventTime": "2024-05-21T12:49:16.854626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHRoC4XKpn9W8Bdg2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "6d92a99f-4de4-4472-8a39-ccc442eb1ae0", "DetectTime": "2024-05-21T12:49:16.906371+00:00", "EventTime": "2024-05-21T12:49:16.906391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgN1BN3sfw1DqtSBdj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "4627249d-f6ae-4df5-9dba-54b15a8b6077", "DetectTime": "2024-05-21T12:49:16.957361+00:00", "EventTime": "2024-05-21T12:49:16.957384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cebndva93fhkQ3pJ5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "7fe32d11-da60-46fd-85de-05ab8dda20b4", "DetectTime": "2024-05-21T12:49:17.007369+00:00", "EventTime": "2024-05-21T12:49:17.007386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQbRinJJn9UXOol1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "f732e07d-7f19-445e-ab93-670ee47ebded", "DetectTime": "2024-05-21T12:49:17.066197+00:00", "EventTime": "2024-05-21T12:49:17.066217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qgJS3mfHMuCoIbKg"], "accumulated_threat_level": 9.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "b3745486-ce37-448b-86fe-7338e66b05a1", "DetectTime": "2024-05-21T12:49:17.107815+00:00", "EventTime": "2024-05-21T12:49:17.107836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVMAbnG2ybzjI28Uk"], "accumulated_threat_level": 10.4, "timewindow": 161} +{"Format": "IDEA0", "ID": "6e7dfd9a-30f6-406d-b502-f6b803373064", "DetectTime": "2024-05-21T12:49:17.160461+00:00", "EventTime": "2024-05-21T12:49:17.160479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmp2gg1wsvMSCEAbwf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 161} +{"Format": "IDEA0", "ID": "2e137d7c-abe8-4aa9-b783-752eee06abd4", "DetectTime": "2024-05-21T12:49:17.211056+00:00", "EventTime": "2024-05-21T12:49:17.211074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CioLVo1DersIwzOTij"], "accumulated_threat_level": 12.000000000000002, "timewindow": 161} +{"Format": "Json", "ID": "2e137d7c-abe8-4aa9-b783-752eee06abd4", "DetectTime": "2024-05-21T12:49:17.211056+00:00", "EventTime": "2024-05-21T12:49:17.211074+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "1970-01-07T16:57:23.642143+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2024/05/21 12:49:17.419328)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 161, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "42697041-7d16-44a1-b125-559431a13e0a", "DetectTime": "2024-05-21T12:49:17.499423+00:00", "EventTime": "2024-05-21T12:49:17.499444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzwbA1owRM8J9nus7"], "accumulated_threat_level": 0.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "9257b57f-0ba0-4069-8d9e-b13db0bedfbf", "DetectTime": "2024-05-21T12:49:17.543742+00:00", "EventTime": "2024-05-21T12:49:17.543762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQZ6Lt4PcXD0udNK9g"], "accumulated_threat_level": 1.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "bbacc252-4062-4be4-a474-b0c7b9929e34", "DetectTime": "2024-05-21T12:49:17.655605+00:00", "EventTime": "2024-05-21T12:49:17.655627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8hamC3AbEKqDmrwjh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 161} +{"Format": "IDEA0", "ID": "457f5fa8-f155-4fa0-8bbd-9b68ab2fa4c8", "DetectTime": "2024-05-21T12:49:17.660896+00:00", "EventTime": "2024-05-21T12:49:17.660914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGpqgVCMayY5kFke"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "8e9b57d3-083d-4f73-a541-9123c634b80c", "DetectTime": "2024-05-21T12:49:17.745051+00:00", "EventTime": "2024-05-21T12:49:17.745072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ktwE4CZvEbjsh9B4"], "accumulated_threat_level": 3.2, "timewindow": 161} +{"Format": "IDEA0", "ID": "a19c9197-792e-4de2-a86e-e68c3415df24", "DetectTime": "2024-05-21T12:49:17.794111+00:00", "EventTime": "2024-05-21T12:49:17.794138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdBejjaZGdEF2MDg"], "accumulated_threat_level": 4.0, "timewindow": 161} +{"Format": "IDEA0", "ID": "6589b66e-dfee-44f2-b42d-ef7f5c6233f0", "DetectTime": "2024-05-21T12:49:17.846003+00:00", "EventTime": "2024-05-21T12:49:17.846021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawGW52wuP9yhmyGwd"], "accumulated_threat_level": 4.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "d45e9bf8-10aa-4cbd-a1df-9363bc08883f", "DetectTime": "2024-05-21T12:49:17.896364+00:00", "EventTime": "2024-05-21T12:49:17.896386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJoEvpqlAi5EUVoc"], "accumulated_threat_level": 5.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "3adf06a2-9699-4deb-a85f-8b55d13b564c", "DetectTime": "2024-05-21T12:49:18.179263+00:00", "EventTime": "2024-05-21T12:49:18.179282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu3ZANhY2BamK3zfe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "c9044446-805d-4977-acef-b23bc2ae53f2", "DetectTime": "2024-05-21T12:49:18.219782+00:00", "EventTime": "2024-05-21T12:49:18.219802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLXcs94aEngwy7Ceqe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "0d0aa9b1-3db2-4248-a936-6825459081ad", "DetectTime": "2024-05-21T12:49:18.368244+00:00", "EventTime": "2024-05-21T12:49:18.368263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Em8xZNi8QEe8kRd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "04736d86-740c-43a4-b720-1667ff2ad2a8", "DetectTime": "2024-05-21T12:49:18.418456+00:00", "EventTime": "2024-05-21T12:49:18.418474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrhW21pl0xZGsFdwl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 161} +{"Format": "IDEA0", "ID": "35458e59-ac1b-4fd5-8c5e-e163c182a07b", "DetectTime": "2024-05-21T12:49:18.478101+00:00", "EventTime": "2024-05-21T12:49:18.478119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGb1W2yZin98piNxj"], "accumulated_threat_level": 9.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "c7b0bda5-8308-49a9-96fb-9090538722e8", "DetectTime": "2024-05-21T12:49:18.519461+00:00", "EventTime": "2024-05-21T12:49:18.519480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJGnA2ppho8W0tc0c"], "accumulated_threat_level": 10.4, "timewindow": 161} +{"Format": "IDEA0", "ID": "5df6d0b6-4055-412b-9666-c6d3e705f562", "DetectTime": "2024-05-21T12:49:18.570239+00:00", "EventTime": "2024-05-21T12:49:18.570258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjPHL1QjCI7efDZN9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 161} +{"Format": "IDEA0", "ID": "7d554a1a-56c9-434b-9def-0995ab7fae85", "DetectTime": "2024-05-21T12:49:18.845109+00:00", "EventTime": "2024-05-21T12:49:18.845128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiB8sJsM4Th8PDrZ1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 161} +{"Format": "Json", "ID": "7d554a1a-56c9-434b-9def-0995ab7fae85", "DetectTime": "2024-05-21T12:49:18.845109+00:00", "EventTime": "2024-05-21T12:49:18.845128+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-07T16:57:26.980335+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 161. (real time 2024/05/21 12:49:19.055709)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 161, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "53994d88-c2d7-4de0-a11d-42c120f83c28", "DetectTime": "2024-05-21T12:49:19.066113+00:00", "EventTime": "2024-05-21T12:49:19.066132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3cy62BPBU8PrJCc8"], "accumulated_threat_level": 0.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "188bdc82-4cc2-4ab4-931c-43c479d0f262", "DetectTime": "2024-05-21T12:49:19.077006+00:00", "EventTime": "2024-05-21T12:49:19.077026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6IuG276mcCM4Lf4c"], "accumulated_threat_level": 1.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "78b091e1-66b4-499c-b6cb-def271709d10", "DetectTime": "2024-05-21T12:49:19.088539+00:00", "EventTime": "2024-05-21T12:49:19.088559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYWN712ul5Enihfcg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 161} +{"Format": "IDEA0", "ID": "2200226e-e7e2-4f4c-a973-e033bef8a992", "DetectTime": "2024-05-21T12:49:19.101100+00:00", "EventTime": "2024-05-21T12:49:19.101119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cunxgm2uUZsyBZpX6f"], "accumulated_threat_level": 3.2, "timewindow": 161} +{"Format": "IDEA0", "ID": "744f76a0-72ef-4626-be11-574c36d58463", "DetectTime": "2024-05-21T12:49:19.114572+00:00", "EventTime": "2024-05-21T12:49:19.114591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cegvyh2nP0HQQarrMf"], "accumulated_threat_level": 4.0, "timewindow": 161} +{"Format": "IDEA0", "ID": "c6c53dea-b4a9-4c9f-8cf7-5a254ad2503c", "DetectTime": "2024-05-21T12:49:19.144411+00:00", "EventTime": "2024-05-21T12:49:19.144430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXp6fvEOiszJRF08"], "accumulated_threat_level": 4.8, "timewindow": 161} +{"Format": "IDEA0", "ID": "28b3d267-5dfc-49d9-adfb-b4651d870a1f", "DetectTime": "2024-05-21T12:49:19.416481+00:00", "EventTime": "2024-05-21T12:49:19.416502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftpYP2JqSL83EgM52"], "accumulated_threat_level": 5.6, "timewindow": 161} +{"Format": "IDEA0", "ID": "70abc59c-c028-4911-8cd0-2100a7f7f535", "DetectTime": "2024-05-21T12:49:19.465714+00:00", "EventTime": "2024-05-21T12:49:19.465733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3gtP2JAnndc1YPQj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "e5de59a3-d4db-44c0-8e0e-8b52a44a3bc5", "DetectTime": "2024-05-21T12:49:19.564853+00:00", "EventTime": "2024-05-21T12:49:19.564871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJ89L3lchAMN9MJB1"], "accumulated_threat_level": 0.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "10fd6d1a-d462-462f-943a-3677ccac90ad", "DetectTime": "2024-05-21T12:49:19.723222+00:00", "EventTime": "2024-05-21T12:49:19.723241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtqAn46ZghTj62Hs5"], "accumulated_threat_level": 1.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "6b7d2c2b-66b2-48c2-b0bc-eb154bf5fc1f", "DetectTime": "2024-05-21T12:49:19.746159+00:00", "EventTime": "2024-05-21T12:49:19.746188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu80pThAlWT61VEGj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 162} +{"Format": "IDEA0", "ID": "2291619a-b71a-4384-b7c1-21934a01d25d", "DetectTime": "2024-05-21T12:49:19.797776+00:00", "EventTime": "2024-05-21T12:49:19.797810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrvglyuPoERL2Qlg"], "accumulated_threat_level": 3.2, "timewindow": 162} +{"Format": "IDEA0", "ID": "c8654029-1e1f-4dc1-aae0-e46a4083dd64", "DetectTime": "2024-05-21T12:49:19.849185+00:00", "EventTime": "2024-05-21T12:49:19.849218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSB4f2GUNDVWyc4Dc"], "accumulated_threat_level": 4.0, "timewindow": 162} +{"Format": "IDEA0", "ID": "457eca77-2dd4-40e6-93af-2d4358e04442", "DetectTime": "2024-05-21T12:49:19.900445+00:00", "EventTime": "2024-05-21T12:49:19.900465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhxCt3Lgvi1GRyNec"], "accumulated_threat_level": 4.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "84d72535-41b8-47ce-b138-501a6699df13", "DetectTime": "2024-05-21T12:49:20.178323+00:00", "EventTime": "2024-05-21T12:49:20.178345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVlY3MzE3F91olh8"], "accumulated_threat_level": 5.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "d7c2ec56-ca27-4e2d-b163-806dec8e3382", "DetectTime": "2024-05-21T12:49:20.228769+00:00", "EventTime": "2024-05-21T12:49:20.228789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Lh1TgBoYyEGnXv8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "90225dfe-dcea-41d9-b1fe-3d723c679d69", "DetectTime": "2024-05-21T12:49:20.278252+00:00", "EventTime": "2024-05-21T12:49:20.278274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSwCH18OXwbI5rgvh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "49525ab8-d036-4ca0-b7d9-f0c54646b45d", "DetectTime": "2024-05-21T12:49:20.332651+00:00", "EventTime": "2024-05-21T12:49:20.332674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWT0o7gCV3M6xiIe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "1770793a-60fd-435f-8c48-e5caab7be8ee", "DetectTime": "2024-05-21T12:49:20.382965+00:00", "EventTime": "2024-05-21T12:49:20.382985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUioxKmeCPbDdfTl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "a557839a-be18-4eb2-9b53-70c115295dd5", "DetectTime": "2024-05-21T12:49:20.434561+00:00", "EventTime": "2024-05-21T12:49:20.434580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZBa94GknQ5KTSaH"], "accumulated_threat_level": 9.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "5dff8411-c654-4589-8898-d9c22b95e05c", "DetectTime": "2024-05-21T12:49:20.706551+00:00", "EventTime": "2024-05-21T12:49:20.706572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLUjwg417ilpzcZvrj"], "accumulated_threat_level": 10.4, "timewindow": 162} +{"Format": "IDEA0", "ID": "6265908c-b506-4490-95b0-4b65ea6fa50a", "DetectTime": "2024-05-21T12:49:20.757358+00:00", "EventTime": "2024-05-21T12:49:20.757376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5fPAq2hJfp2LqKgU8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 162} +{"Format": "IDEA0", "ID": "2dbe1ac1-0316-4cba-bf44-fd1d75b5e490", "DetectTime": "2024-05-21T12:49:20.810004+00:00", "EventTime": "2024-05-21T12:49:20.810026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPAiiJ3DoPpb8Celea"], "accumulated_threat_level": 12.000000000000002, "timewindow": 162} +{"Format": "Json", "ID": "2dbe1ac1-0316-4cba-bf44-fd1d75b5e490", "DetectTime": "2024-05-21T12:49:20.810004+00:00", "EventTime": "2024-05-21T12:49:20.810026+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-07T17:27:59.912171+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2024/05/21 12:49:20.970609)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 162, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "47e3cb41-3c66-4f7c-b5e6-a91aa024e351", "DetectTime": "2024-05-21T12:49:20.982439+00:00", "EventTime": "2024-05-21T12:49:20.982457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVWq82vnapWTbq7je"], "accumulated_threat_level": 0.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "15a499ba-1e34-487d-a0e0-05a67036594c", "DetectTime": "2024-05-21T12:49:20.995326+00:00", "EventTime": "2024-05-21T12:49:20.995346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzSY82eDYxpTv3lyj"], "accumulated_threat_level": 1.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "34dbadd4-6e2e-41ff-b9d2-4df49742d9a4", "DetectTime": "2024-05-21T12:49:21.007529+00:00", "EventTime": "2024-05-21T12:49:21.007549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CViiio2DmF8igcSBTc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 162} +{"Format": "IDEA0", "ID": "fd788237-002d-4ddb-9dac-695ee79c7e56", "DetectTime": "2024-05-21T12:49:21.026248+00:00", "EventTime": "2024-05-21T12:49:21.026266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjzOxn46xcOvXg2Jpd"], "accumulated_threat_level": 3.2, "timewindow": 162} +{"Format": "IDEA0", "ID": "037f1021-4283-471a-8df0-764d603c8ace", "DetectTime": "2024-05-21T12:49:21.178845+00:00", "EventTime": "2024-05-21T12:49:21.178870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PTLx102Xa7A56Jz7"], "accumulated_threat_level": 4.0, "timewindow": 162} +{"Format": "IDEA0", "ID": "fd7f10c8-ac82-477e-ab58-19dcbf737584", "DetectTime": "2024-05-21T12:49:21.462731+00:00", "EventTime": "2024-05-21T12:49:21.462753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 176.73.199.176 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4fKUf3PowbgCmlWRb"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "bc073944-0910-4249-aafa-d0044a748b4c", "DetectTime": "2024-05-21T12:49:21.522177+00:00", "EventTime": "2024-05-21T12:49:21.522194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdyoKx9eNgU7Mffh"], "accumulated_threat_level": 4.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "697480f5-d7df-41c6-956d-ace9808140d2", "DetectTime": "2024-05-21T12:49:21.563823+00:00", "EventTime": "2024-05-21T12:49:21.563847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJspbdUaTLX7zPmI8"], "accumulated_threat_level": 5.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "e854f275-0987-4dbf-afe4-0d78605c3c89", "DetectTime": "2024-05-21T12:49:21.613246+00:00", "EventTime": "2024-05-21T12:49:21.613263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5myT6yoIYuKMn855"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "e8976a9e-ed5a-46f4-b599-5fee4f42cc80", "DetectTime": "2024-05-21T12:49:21.663404+00:00", "EventTime": "2024-05-21T12:49:21.663424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdfpqiBzncTBFK2i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "21ea7488-7909-4239-9e17-b56de5c3ca5b", "DetectTime": "2024-05-21T12:49:21.716216+00:00", "EventTime": "2024-05-21T12:49:21.716238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CygOtu3orBy2WRLEmj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "076cda15-719f-4739-ba86-64d5b979ca26", "DetectTime": "2024-05-21T12:49:21.774702+00:00", "EventTime": "2024-05-21T12:49:21.774723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdQFLO3fslU8inqGOk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "e6c142fa-664f-4c95-81a7-552b07ea7a4f", "DetectTime": "2024-05-21T12:49:22.049517+00:00", "EventTime": "2024-05-21T12:49:22.049544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83zGdJH3kf4ZUfaf"], "accumulated_threat_level": 9.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "a4b260b6-ea07-43e0-bd1a-f457218d2122", "DetectTime": "2024-05-21T12:49:22.097985+00:00", "EventTime": "2024-05-21T12:49:22.098007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClF0WW1qyKIBGucIn1"], "accumulated_threat_level": 10.4, "timewindow": 162} +{"Format": "IDEA0", "ID": "0d6704d0-0f7d-4670-a4b1-c759f10acb1b", "DetectTime": "2024-05-21T12:49:22.148403+00:00", "EventTime": "2024-05-21T12:49:22.148421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNebKG2J0PPTo2yVM2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 162} +{"Format": "IDEA0", "ID": "2e864488-014a-4a61-ab11-fe024261f63f", "DetectTime": "2024-05-21T12:49:22.200764+00:00", "EventTime": "2024-05-21T12:49:22.200782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C43WNO2X1DIRjpwJ42"], "accumulated_threat_level": 12.000000000000002, "timewindow": 162} +{"Format": "Json", "ID": "2e864488-014a-4a61-ab11-fe024261f63f", "DetectTime": "2024-05-21T12:49:22.200764+00:00", "EventTime": "2024-05-21T12:49:22.200782+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-07T17:28:03.167112+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2024/05/21 12:49:22.381403)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 162, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5bf71452-6207-422c-ad42-e181f3846d8b", "DetectTime": "2024-05-21T12:49:22.392485+00:00", "EventTime": "2024-05-21T12:49:22.392504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCehM1rvaxjGbDo4c"], "accumulated_threat_level": 0.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "3822f171-b060-4da7-8fd3-0277f6a57cd6", "DetectTime": "2024-05-21T12:49:22.404494+00:00", "EventTime": "2024-05-21T12:49:22.404513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csqzwz1bRS5NOnjuO8"], "accumulated_threat_level": 1.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "2d2785e0-bd78-4b18-bee3-b4a0a72d0e07", "DetectTime": "2024-05-21T12:49:22.416453+00:00", "EventTime": "2024-05-21T12:49:22.416472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtz7348jIKJcIxr7c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 162} +{"Format": "IDEA0", "ID": "40faee73-1631-4f4f-afd3-94167487eb96", "DetectTime": "2024-05-21T12:49:22.427839+00:00", "EventTime": "2024-05-21T12:49:22.427858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuD4zB2ACJK9stnY95"], "accumulated_threat_level": 3.2, "timewindow": 162} +{"Format": "IDEA0", "ID": "a61d2968-1221-434f-9b83-fe27d26d8a14", "DetectTime": "2024-05-21T12:49:22.723280+00:00", "EventTime": "2024-05-21T12:49:22.723299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56s7W27tBULT1x5Ik"], "accumulated_threat_level": 4.0, "timewindow": 162} +{"Format": "IDEA0", "ID": "3c652ab9-e2a5-4356-830c-e08f5604bf3a", "DetectTime": "2024-05-21T12:49:22.788071+00:00", "EventTime": "2024-05-21T12:49:22.788091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZxj232jzl6MjoyUk"], "accumulated_threat_level": 4.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "8e6f521a-6734-4c54-9e78-7bfb7a218726", "DetectTime": "2024-05-21T12:49:22.820524+00:00", "EventTime": "2024-05-21T12:49:22.820548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfYzAh3CKBglYNWXKf"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "4b32184e-ed9d-4161-848c-f5d0e0f0eda4", "DetectTime": "2024-05-21T12:49:22.881424+00:00", "EventTime": "2024-05-21T12:49:22.881444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcSXpm1dBloYg1fqh8"], "accumulated_threat_level": 5.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "ae3879b2-aa66-4c93-8838-b7e621478100", "DetectTime": "2024-05-21T12:49:22.931097+00:00", "EventTime": "2024-05-21T12:49:22.931115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWbgw4xulFlM1yPNb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "7f520c3d-4de8-4746-abb2-da21737f8614", "DetectTime": "2024-05-21T12:49:22.981774+00:00", "EventTime": "2024-05-21T12:49:22.981793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCdaZv3338xfIwrn9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "2d7d28bc-ce1f-4839-b597-8762cfcc8807", "DetectTime": "2024-05-21T12:49:23.030466+00:00", "EventTime": "2024-05-21T12:49:23.030489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHush1epA8ahnZSXf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "e9ec8ae6-c956-483f-9a31-a81c9c728049", "DetectTime": "2024-05-21T12:49:23.299544+00:00", "EventTime": "2024-05-21T12:49:23.299562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92GUf2zSgYm1Dz13k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "c78fe621-e9c2-48e9-b32f-8ffb66137cb0", "DetectTime": "2024-05-21T12:49:23.347073+00:00", "EventTime": "2024-05-21T12:49:23.347093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4QZl3PCDsVHSu7K5"], "accumulated_threat_level": 9.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "d3525a3e-2a4d-46c4-b7f9-3defbd093619", "DetectTime": "2024-05-21T12:49:23.398711+00:00", "EventTime": "2024-05-21T12:49:23.398729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLSgMS1VB7PmCQv6Zc"], "accumulated_threat_level": 10.4, "timewindow": 162} +{"Format": "IDEA0", "ID": "603eb560-0ce1-428b-ba07-65c4338dec78", "DetectTime": "2024-05-21T12:49:23.451133+00:00", "EventTime": "2024-05-21T12:49:23.451153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCJ8O18JHAlJYBq41"], "accumulated_threat_level": 11.200000000000001, "timewindow": 162} +{"Format": "IDEA0", "ID": "f82b7d2b-fe74-451f-90d1-eccf6d67f47a", "DetectTime": "2024-05-21T12:49:23.503248+00:00", "EventTime": "2024-05-21T12:49:23.503267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6tIol4wVpPHn5NGdc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 162} +{"Format": "Json", "ID": "f82b7d2b-fe74-451f-90d1-eccf6d67f47a", "DetectTime": "2024-05-21T12:49:23.503248+00:00", "EventTime": "2024-05-21T12:49:23.503267+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-07T17:58:14.649031+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2024/05/21 12:49:23.690478)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 162, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c29f1de1-0c71-486c-b430-298f8b7930a0", "DetectTime": "2024-05-21T12:49:23.703529+00:00", "EventTime": "2024-05-21T12:49:23.703552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSvYg41QbDZfOCgzw8"], "accumulated_threat_level": 0.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "472a5e0c-0000-4b5e-b48f-659fcd5916af", "DetectTime": "2024-05-21T12:49:23.717371+00:00", "EventTime": "2024-05-21T12:49:23.717395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCiQk3nvN8YolrxV4"], "accumulated_threat_level": 1.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "84de7b6e-8bf4-4f06-b909-ab96ebf7a51a", "DetectTime": "2024-05-21T12:49:23.889748+00:00", "EventTime": "2024-05-21T12:49:23.889768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCRLn3jmScXh7FO03"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 162} +{"Format": "IDEA0", "ID": "2ff97889-4ba1-4c5d-ad4a-0fb8e46bfa94", "DetectTime": "2024-05-21T12:49:24.048102+00:00", "EventTime": "2024-05-21T12:49:24.048122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKIhGEtUlxZ7OZDi"], "accumulated_threat_level": 3.2, "timewindow": 162} +{"Format": "IDEA0", "ID": "01855760-1c9b-4ab4-8bd7-a72c5370e185", "DetectTime": "2024-05-21T12:49:24.080184+00:00", "EventTime": "2024-05-21T12:49:24.080206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyIf54NQkJAw0JhXk"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "a8c2f8b6-d0d4-4886-989f-4fd852ae881b", "DetectTime": "2024-05-21T12:49:24.141732+00:00", "EventTime": "2024-05-21T12:49:24.141753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFaHE3JJoXEK3DOhg"], "accumulated_threat_level": 4.0, "timewindow": 162} +{"Format": "IDEA0", "ID": "28dbe2f4-43a5-4fd4-8498-97c037faa1d6", "DetectTime": "2024-05-21T12:49:24.199541+00:00", "EventTime": "2024-05-21T12:49:24.199564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUGpyN3mWig066kaUb"], "accumulated_threat_level": 4.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "e2354b57-0c65-4902-a7ec-7362b87393d2", "DetectTime": "2024-05-21T12:49:24.257101+00:00", "EventTime": "2024-05-21T12:49:24.257123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UwhW3yTSC6P7dMv5"], "accumulated_threat_level": 5.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "fc2623b7-89b1-4e52-8b34-bf6bcba0b1cf", "DetectTime": "2024-05-21T12:49:24.316554+00:00", "EventTime": "2024-05-21T12:49:24.316572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9e9f3o4OdENqRyVd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "83531ee1-b0f5-4e34-b90f-73efbee9b32c", "DetectTime": "2024-05-21T12:49:24.363581+00:00", "EventTime": "2024-05-21T12:49:24.363600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfEQAZQu0YH431A5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "ac7a66bc-1a87-4913-877c-7700d0cbf204", "DetectTime": "2024-05-21T12:49:24.640170+00:00", "EventTime": "2024-05-21T12:49:24.640191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUn5eD1Op35VoPm35a"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "e5b8c7c4-0cc1-4ad3-8578-65ccb0f0827f", "DetectTime": "2024-05-21T12:49:24.676244+00:00", "EventTime": "2024-05-21T12:49:24.676266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsvy12IB9iGUwyT88"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "e7d1eb88-0bcf-43a5-a082-76577113a537", "DetectTime": "2024-05-21T12:49:24.736958+00:00", "EventTime": "2024-05-21T12:49:24.736976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2ShJ69T5Sy7Ncf4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "014a82f0-bc55-4c73-a09d-e50bf4cadd7f", "DetectTime": "2024-05-21T12:49:24.766277+00:00", "EventTime": "2024-05-21T12:49:24.766300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtBLg4KHEV1cMZoWk"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "b157ef57-abfd-4d92-ba57-7f9c475df5bd", "DetectTime": "2024-05-21T12:49:24.819960+00:00", "EventTime": "2024-05-21T12:49:24.819978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxr95G2LAMSnro8lkg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 162} +{"Format": "IDEA0", "ID": "2e63d6b6-7dff-4c16-ac61-d3bdf7593c44", "DetectTime": "2024-05-21T12:49:24.869765+00:00", "EventTime": "2024-05-21T12:49:24.869784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSXUA3QzrEZccVkk3"], "accumulated_threat_level": 9.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "628c9112-4a2b-4a09-92b3-03524938d256", "DetectTime": "2024-05-21T12:49:24.928579+00:00", "EventTime": "2024-05-21T12:49:24.928597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5uaT2IIOPK4QjBl6"], "accumulated_threat_level": 10.4, "timewindow": 162} +{"Format": "IDEA0", "ID": "ff7088ad-a85d-4559-9b17-8646d25eac25", "DetectTime": "2024-05-21T12:49:24.959660+00:00", "EventTime": "2024-05-21T12:49:24.959681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX78xc1Z0zXPsdktsj"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "9b2e13d9-4fc3-46c4-966f-4d35db1e1ec0", "DetectTime": "2024-05-21T12:49:25.263613+00:00", "EventTime": "2024-05-21T12:49:25.263635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaxWCS1VIc82fuls2c"], "accumulated_threat_level": 11.200000000000001, "timewindow": 162} +{"Format": "IDEA0", "ID": "10a1d5fe-1c2f-4737-8cc7-e6729f4a6728", "DetectTime": "2024-05-21T12:49:25.270181+00:00", "EventTime": "2024-05-21T12:49:25.270200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLKYsPyr1SEYocSDl"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "389d7292-c4c0-455c-b5e2-d472a308e95e", "DetectTime": "2024-05-21T12:49:25.274935+00:00", "EventTime": "2024-05-21T12:49:25.274954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSRhPZ1mkfBSBo8nDg"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "cef1d412-5781-49d9-bc99-6e9fd4f78fce", "DetectTime": "2024-05-21T12:49:25.279450+00:00", "EventTime": "2024-05-21T12:49:25.279468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpUpIfzBw2Pre9Ti"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "b0e01f20-d7fc-43db-9818-e92e3d852f33", "DetectTime": "2024-05-21T12:49:25.284962+00:00", "EventTime": "2024-05-21T12:49:25.284981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXjASl31KznWlC18dl"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "6284d314-27f8-49c7-93ca-e5a2a598126f", "DetectTime": "2024-05-21T12:49:25.349451+00:00", "EventTime": "2024-05-21T12:49:25.349472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoFAOZ2Jl0UZQpOJ03"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "cd0b1c73-d911-4ae3-a8cb-46ba1eb98d86", "DetectTime": "2024-05-21T12:49:25.536511+00:00", "EventTime": "2024-05-21T12:49:25.536536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4bSc1SjsqodG2wBe"], "accumulated_threat_level": 12.000000000000002, "timewindow": 162} +{"Format": "Json", "ID": "cd0b1c73-d911-4ae3-a8cb-46ba1eb98d86", "DetectTime": "2024-05-21T12:49:25.536511+00:00", "EventTime": "2024-05-21T12:49:25.536536+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-07T17:58:26.854806+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 162. (real time 2024/05/21 12:49:25.950146)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 162, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8c5bef81-6ea5-49f6-832f-5b96d3833dc4", "DetectTime": "2024-05-21T12:49:25.954163+00:00", "EventTime": "2024-05-21T12:49:25.954181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vmw54g2inxNsfyw1"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "c4d78687-eb4f-4cbc-87b1-9cdbafeaf7f1", "DetectTime": "2024-05-21T12:49:25.985518+00:00", "EventTime": "2024-05-21T12:49:25.985543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJHyB2XQKVc7tEFmd"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "9afe76bf-90e9-48a1-9bb7-3c19537fd3cd", "DetectTime": "2024-05-21T12:49:26.013715+00:00", "EventTime": "2024-05-21T12:49:26.013734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMfq2MVeaRyOtC8i"], "accumulated_threat_level": 0.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "8b33cb92-35a0-4522-aa33-e196ba100a17", "DetectTime": "2024-05-21T12:49:26.051809+00:00", "EventTime": "2024-05-21T12:49:26.051832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPHG7A0vI0NnC9qcl"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "f9441faf-50ea-404f-90c1-a9644506318a", "DetectTime": "2024-05-21T12:49:26.162585+00:00", "EventTime": "2024-05-21T12:49:26.162606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0Raz1TdKPkO3KLh1"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "8a895879-ce7c-4599-ac4c-d7d41e1e404b", "DetectTime": "2024-05-21T12:49:26.169013+00:00", "EventTime": "2024-05-21T12:49:26.169032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd5vRa1XT5e0jgdKf1"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "7b5f0092-a7d7-4bd5-a411-183ce4a3d434", "DetectTime": "2024-05-21T12:49:26.173782+00:00", "EventTime": "2024-05-21T12:49:26.173800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvKqb4C0zqKPQpse6"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "4bf12bdc-95e7-4ad8-b2a9-85390995b568", "DetectTime": "2024-05-21T12:49:26.178381+00:00", "EventTime": "2024-05-21T12:49:26.178399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5z0Pp1kak3iwmJyij"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "8f7950ae-3f37-450f-af6a-f010cc84dd21", "DetectTime": "2024-05-21T12:49:26.202740+00:00", "EventTime": "2024-05-21T12:49:26.202762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNL1lM19mqu0kRJJmi"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "ccad6bad-d8ec-4f74-b349-2710e100542c", "DetectTime": "2024-05-21T12:49:26.648555+00:00", "EventTime": "2024-05-21T12:49:26.648576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1XwUq2Dt79bsrG2Qi"], "accumulated_threat_level": 1.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "190fa89e-d711-4482-a60f-bad0e62c3eb2", "DetectTime": "2024-05-21T12:49:26.710588+00:00", "EventTime": "2024-05-21T12:49:26.710611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8vdiXpQV4sEseP7"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "7a8ec4e3-77db-41b7-8970-348a46c59c16", "DetectTime": "2024-05-21T12:49:26.734432+00:00", "EventTime": "2024-05-21T12:49:26.734454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgPBtt3BWcsofhocVc"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "d7be1f59-57b9-4631-ae22-b897bb4eacd7", "DetectTime": "2024-05-21T12:49:26.739388+00:00", "EventTime": "2024-05-21T12:49:26.739408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLuCekN3mAMLt7gj"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "83342bbb-f7cf-4f86-a623-e9b868fe9dae", "DetectTime": "2024-05-21T12:49:26.747290+00:00", "EventTime": "2024-05-21T12:49:26.747311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CElWzXSF2puWEkJtk"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "8a40245e-5089-47a7-927b-fbb7383ddf65", "DetectTime": "2024-05-21T12:49:26.783662+00:00", "EventTime": "2024-05-21T12:49:26.783688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT3Y1auwKXJnHRHFa"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "51910c2d-d629-43ec-a8dc-adcd60d1f23f", "DetectTime": "2024-05-21T12:49:26.814803+00:00", "EventTime": "2024-05-21T12:49:26.814826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSdT4A4YiGrmNlGs0g"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "78ef5c7f-e6ec-4ea0-8f45-fcd3be601bd8", "DetectTime": "2024-05-21T12:49:27.218766+00:00", "EventTime": "2024-05-21T12:49:27.218786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8WZ13Yzf74beN0pb"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "69549eed-e0b5-4cc3-b7f5-57a2602b0774", "DetectTime": "2024-05-21T12:49:27.286625+00:00", "EventTime": "2024-05-21T12:49:27.286645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKH6b11vNzySdEydEh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 162} +{"Format": "IDEA0", "ID": "676f9941-dd7d-4c5d-87a0-f66575857c5f", "DetectTime": "2024-05-21T12:49:27.298440+00:00", "EventTime": "2024-05-21T12:49:27.298459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiMEA4rizpVb2Ybqc"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "de874e9d-cd68-43f5-a0bc-f958b7f218fa", "DetectTime": "2024-05-21T12:49:27.377769+00:00", "EventTime": "2024-05-21T12:49:27.377793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV0CQ64QtTTO4jds7d"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "6883b3c5-2db8-44c1-ace9-0f55cb13d2a3", "DetectTime": "2024-05-21T12:49:27.384469+00:00", "EventTime": "2024-05-21T12:49:27.384488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNrTd2sQRfU17fZg7"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "be7a04e8-6df1-40b0-bbb8-cb9c34114aac", "DetectTime": "2024-05-21T12:49:27.388922+00:00", "EventTime": "2024-05-21T12:49:27.388940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yFM44FIc2S935gu3"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "49398916-c94d-4522-bb80-6b22b0242464", "DetectTime": "2024-05-21T12:49:27.393526+00:00", "EventTime": "2024-05-21T12:49:27.393544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YR026EErefx1m1i"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "d380ead3-b69c-41d4-814a-38ea272f8775", "DetectTime": "2024-05-21T12:49:27.398400+00:00", "EventTime": "2024-05-21T12:49:27.398429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLeoXYOqFjoUkAaf"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "71ad1def-fdea-4cef-83ef-59c44c941372", "DetectTime": "2024-05-21T12:49:27.875220+00:00", "EventTime": "2024-05-21T12:49:27.875238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCyeM1lzI2tSfRSB3"], "accumulated_threat_level": 3.2, "timewindow": 162} +{"Format": "IDEA0", "ID": "5d4028cf-6b68-4769-8611-3ab86819333d", "DetectTime": "2024-05-21T12:49:27.879920+00:00", "EventTime": "2024-05-21T12:49:27.879938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB8w6r2eEfGEwQ81Wh"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "36b15222-4e59-450d-8fd2-2837ec11b7ac", "DetectTime": "2024-05-21T12:49:27.884410+00:00", "EventTime": "2024-05-21T12:49:27.884427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C67RDp2OaJETt81Cq6"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "eb388af1-30f6-4a4d-8cc7-cb9542610278", "DetectTime": "2024-05-21T12:49:27.915871+00:00", "EventTime": "2024-05-21T12:49:27.915896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIXk7J2jvCl7Dgo6s3"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "5ace0799-8c84-44f6-925e-55c7a7509414", "DetectTime": "2024-05-21T12:49:27.951794+00:00", "EventTime": "2024-05-21T12:49:27.951817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfP2zDClRUVuXchc9"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "57cec7e6-257c-404c-bc18-2cafd8f1db26", "DetectTime": "2024-05-21T12:49:28.159459+00:00", "EventTime": "2024-05-21T12:49:28.159482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMSNXU3n9zXKS8BREl"], "accumulated_threat_level": 9.6, "timewindow": 160} +{"Format": "IDEA0", "ID": "08fa5aa3-6ad4-4227-8a31-05afc3509ff3", "DetectTime": "2024-05-21T12:49:28.369221+00:00", "EventTime": "2024-05-21T12:49:28.369257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGvwi24psFstYYhipl"], "accumulated_threat_level": 4.0, "timewindow": 162} +{"Format": "IDEA0", "ID": "5c4b05a0-845b-40bb-b087-7a12b6f37770", "DetectTime": "2024-05-21T12:49:28.384593+00:00", "EventTime": "2024-05-21T12:49:28.384614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQqxJMQYh9MxCBVF3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "0f8160e8-59e6-4863-9bd1-ae91ef4634a8", "DetectTime": "2024-05-21T12:49:28.390498+00:00", "EventTime": "2024-05-21T12:49:28.390519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 171.97.1.132 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCbUYZ2abBofO33Dta"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "2f032c66-d8f5-4d69-8d36-39e50f8c69bf", "DetectTime": "2024-05-21T12:49:28.454933+00:00", "EventTime": "2024-05-21T12:49:28.454970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzvSBu10lDL6YX2w13"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "450992f4-c2f7-45d9-ad12-eee66fda8f05", "DetectTime": "2024-05-21T12:49:28.460600+00:00", "EventTime": "2024-05-21T12:49:28.460620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 190.204.35.137 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtfZ3X06Dolu0n3Yc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "1cd2cdc3-e9ae-479d-9fdb-d50b32588350", "DetectTime": "2024-05-21T12:49:28.465695+00:00", "EventTime": "2024-05-21T12:49:28.465715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRtt41M1IgWYIPS4h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "61d438f5-5fb2-464f-9924-418836a7085e", "DetectTime": "2024-05-21T12:49:28.861477+00:00", "EventTime": "2024-05-21T12:49:28.861498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS7vh7eLT0jPTfNw2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "b027f427-4c0e-4946-af27-6d378f936087", "DetectTime": "2024-05-21T12:49:28.867413+00:00", "EventTime": "2024-05-21T12:49:28.867433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C258ik4vAGriT15Xj2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "25e89e54-3bc3-421c-9ce0-671049627dc5", "DetectTime": "2024-05-21T12:49:28.970723+00:00", "EventTime": "2024-05-21T12:49:28.970746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbU7QK1tT058gDFHV4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "ef19a8df-c600-4d54-bce5-1f9c530782c4", "DetectTime": "2024-05-21T12:49:28.989079+00:00", "EventTime": "2024-05-21T12:49:28.989100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvlEn3TPADMXKc3Aj"], "accumulated_threat_level": 4.8, "timewindow": 162} +{"Format": "IDEA0", "ID": "83f5c8f8-7bec-4758-af67-a2a8dcb87c19", "DetectTime": "2024-05-21T12:49:29.001556+00:00", "EventTime": "2024-05-21T12:49:29.001575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZyhY3tPk7vCFwoWd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "1ce93ac0-3bc8-4de2-9b89-7ee1c961302f", "DetectTime": "2024-05-21T12:49:29.016609+00:00", "EventTime": "2024-05-21T12:49:29.016629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1KaqL2AUyQj7YPYch"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "c71c2b1e-b10c-4da2-b84a-7597a3bff9ca", "DetectTime": "2024-05-21T12:49:29.083996+00:00", "EventTime": "2024-05-21T12:49:29.084020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ConbOL1ybSPxlLuKE"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "c906a214-dd16-4219-862a-5966f0d8fd7e", "DetectTime": "2024-05-21T12:49:29.090467+00:00", "EventTime": "2024-05-21T12:49:29.090485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C20hms111SHhNvpm8f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "b14e2a8c-f8df-41be-a475-3b1b686c0e70", "DetectTime": "2024-05-21T12:49:29.173386+00:00", "EventTime": "2024-05-21T12:49:29.173407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLmCdU30wnPDViBLXe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "2cf6ccea-d7a0-4f28-8717-a9505a873c36", "DetectTime": "2024-05-21T12:49:29.409942+00:00", "EventTime": "2024-05-21T12:49:29.409964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJzOst3VO5hWJkU96l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "e6d7ea1b-c9c5-4016-a1ce-71d5015d40ae", "DetectTime": "2024-05-21T12:49:29.601108+00:00", "EventTime": "2024-05-21T12:49:29.601130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaZdum1mMW1nUe3h56"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "09657eca-b3cd-4665-8030-38565135f972", "DetectTime": "2024-05-21T12:49:29.654385+00:00", "EventTime": "2024-05-21T12:49:29.654419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSoCHGSexnznwLBp8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "00ee8fc2-52fa-485f-8d54-7d10687c1480", "DetectTime": "2024-05-21T12:49:29.659611+00:00", "EventTime": "2024-05-21T12:49:29.659630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8S9c63GMGVxLIYpKj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "9caf3c2f-b551-400a-878d-44dc10197dfd", "DetectTime": "2024-05-21T12:49:29.747746+00:00", "EventTime": "2024-05-21T12:49:29.747767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceu2Ls1DjL3rYnxhM3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "674f3f16-f48a-4c33-958b-233c566f21aa", "DetectTime": "2024-05-21T12:49:29.777257+00:00", "EventTime": "2024-05-21T12:49:29.777275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vtZM3CWMatJUSNL9"], "accumulated_threat_level": 5.6, "timewindow": 162} +{"Format": "IDEA0", "ID": "a49cde6b-a483-4048-8df9-1c8b93a09fd9", "DetectTime": "2024-05-21T12:49:29.847182+00:00", "EventTime": "2024-05-21T12:49:29.847204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn6rtKR1LnlzkG1wg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "8b8f5a53-0637-4862-a7d2-d6a83e99d508", "DetectTime": "2024-05-21T12:49:30.065404+00:00", "EventTime": "2024-05-21T12:49:30.065424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1D2061xbApBMwAR2b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "4817d4d2-45ad-407f-bb56-28e7814cf7b0", "DetectTime": "2024-05-21T12:49:30.224679+00:00", "EventTime": "2024-05-21T12:49:30.224702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqvoYoF4CJUHorHai"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "137340e9-271c-4642-b744-4d40083e563a", "DetectTime": "2024-05-21T12:49:30.326162+00:00", "EventTime": "2024-05-21T12:49:30.326184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq7SQv3teTFxuPzfk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "8633b96d-8421-4a28-a839-808c8ffe658a", "DetectTime": "2024-05-21T12:49:30.333438+00:00", "EventTime": "2024-05-21T12:49:30.333462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch5T1jEqIQqEWovca"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "b55708a4-8adc-4351-b24a-776ef45ab4de", "DetectTime": "2024-05-21T12:49:30.337990+00:00", "EventTime": "2024-05-21T12:49:30.338007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpDoLJqywTdHIwDv1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "0c53ec50-bfa1-4c0b-96a6-06058b328714", "DetectTime": "2024-05-21T12:49:30.342507+00:00", "EventTime": "2024-05-21T12:49:30.342525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWuGlduv5BpaHCK33"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "b76154e0-8407-4cf0-b0b8-b8dfb49a1e71", "DetectTime": "2024-05-21T12:49:30.346949+00:00", "EventTime": "2024-05-21T12:49:30.346967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVbwVi1AfVejUL5xn3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "de6d0173-9a97-4aa8-bc7e-4f46f114b9d3", "DetectTime": "2024-05-21T12:49:30.386160+00:00", "EventTime": "2024-05-21T12:49:30.386181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxggWVsKYJXdLfr3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "276eac1e-371f-454f-8e49-75105e648b51", "DetectTime": "2024-05-21T12:49:30.428751+00:00", "EventTime": "2024-05-21T12:49:30.428772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7wGx13YexGF1uAq2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "60e5d731-7068-416c-9b25-61622de9fa27", "DetectTime": "2024-05-21T12:49:30.687991+00:00", "EventTime": "2024-05-21T12:49:30.688014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCwZr1dxzFEgCiVWf", "Cd9oet3A4H7aNsMaBg", "CvLpo23ZSt9NsRx3Cc", "C9bPSj4qvZvo22ap6a"], "accumulated_threat_level": 0.5, "timewindow": 175} +{"Format": "IDEA0", "ID": "778061a6-cb51-47a3-81e8-78dfd0fdcb1a", "DetectTime": "2024-05-21T12:49:30.830797+00:00", "EventTime": "2024-05-21T12:49:30.830818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChTBdi1i0xp42VeIb6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "571c4c09-1054-4d05-83d9-0c06128a5f82", "DetectTime": "2024-05-21T12:49:30.898121+00:00", "EventTime": "2024-05-21T12:49:30.898142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVgnqF4IWbyvnBBuu4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "9904779a-3699-49e3-9a24-601f29297a74", "DetectTime": "2024-05-21T12:49:30.912297+00:00", "EventTime": "2024-05-21T12:49:30.912318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgvmyd2rygYVwCwszc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "61219a73-7fc4-4ee2-8bfd-5e7cd8a294cb", "DetectTime": "2024-05-21T12:49:30.927966+00:00", "EventTime": "2024-05-21T12:49:30.927989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzHr4i3frxqUsMA8f8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "c26ae50a-636f-46f3-a2c2-328466fc24b3", "DetectTime": "2024-05-21T12:49:30.979466+00:00", "EventTime": "2024-05-21T12:49:30.979489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqxLj4300aEyJCf6Ek"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "25cb2bed-8988-40a6-85e7-23c39d36d675", "DetectTime": "2024-05-21T12:49:31.009495+00:00", "EventTime": "2024-05-21T12:49:31.009517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C19is1ZTOIeAWuetc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "474c0226-6f14-419a-a5ad-6758f4c98d0e", "DetectTime": "2024-05-21T12:49:31.308380+00:00", "EventTime": "2024-05-21T12:49:31.308402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCGmz2Vyr5LgikxSi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "006c4416-85a1-4480-b841-97d4d70f2d05", "DetectTime": "2024-05-21T12:49:31.477122+00:00", "EventTime": "2024-05-21T12:49:31.477157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywjOR2lgzXCj4DpTj"], "accumulated_threat_level": 1.3, "timewindow": 163} +{"Format": "IDEA0", "ID": "e8f7b1de-a487-4ab8-bfe2-dd180e228981", "DetectTime": "2024-05-21T12:49:31.503298+00:00", "EventTime": "2024-05-21T12:49:31.503317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZf0v02IcBu4jEo1C9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "f046ab34-3b8e-4a5d-86ff-448699915303", "DetectTime": "2024-05-21T12:49:31.520286+00:00", "EventTime": "2024-05-21T12:49:31.520305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUbE3j1w1wjN1BXvak"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "d7e99dc1-bb91-4bfa-a50d-02e5db0ad1a5", "DetectTime": "2024-05-21T12:49:31.551479+00:00", "EventTime": "2024-05-21T12:49:31.551502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkmLQcOvsvyT1PMa4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "14a15336-cca0-487c-8c50-50b1d28d66c7", "DetectTime": "2024-05-21T12:49:31.632944+00:00", "EventTime": "2024-05-21T12:49:31.632963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.197.43.156 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBBAr29Oh55oPqqag"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "93b69acf-8a81-4b3f-b167-a5833f15e741", "DetectTime": "2024-05-21T12:49:31.987304+00:00", "EventTime": "2024-05-21T12:49:31.987324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVt7U62acgghkjX2rl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "e4fba8a8-0119-4faf-99b2-71ae50a869c6", "DetectTime": "2024-05-21T12:49:31.993720+00:00", "EventTime": "2024-05-21T12:49:31.993738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtO8kw4ao7Uh1ZRT8g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "7ebc9540-f664-4b12-b552-2ac437744fbe", "DetectTime": "2024-05-21T12:49:32.125649+00:00", "EventTime": "2024-05-21T12:49:32.125670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgN1BN3sfw1DqtSBdj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "4ddf6038-9d1e-4feb-97b4-ef490879c56d", "DetectTime": "2024-05-21T12:49:32.131527+00:00", "EventTime": "2024-05-21T12:49:32.131547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHRoC4XKpn9W8Bdg2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "8859cd59-c4ca-4e09-968c-bb254186b27d", "DetectTime": "2024-05-21T12:49:32.136691+00:00", "EventTime": "2024-05-21T12:49:32.136710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ2fUU1Lay7a226jYk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "92923a6e-e90a-4dbd-a401-cd8d9f91da81", "DetectTime": "2024-05-21T12:49:32.153155+00:00", "EventTime": "2024-05-21T12:49:32.153174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF37vO3OroB1Az4Az6"], "accumulated_threat_level": 2.1, "timewindow": 163} +{"Format": "IDEA0", "ID": "413f0f22-e09e-4071-b315-b432a9c2c52d", "DetectTime": "2024-05-21T12:49:32.222588+00:00", "EventTime": "2024-05-21T12:49:32.222608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cebndva93fhkQ3pJ5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "f9b139d6-022b-41cb-8a53-946863c04fcb", "DetectTime": "2024-05-21T12:49:32.306789+00:00", "EventTime": "2024-05-21T12:49:32.306814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQbRinJJn9UXOol1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "98fb53f9-5766-49ae-ae00-acce9577fc50", "DetectTime": "2024-05-21T12:49:32.319579+00:00", "EventTime": "2024-05-21T12:49:32.319600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6qgJS3mfHMuCoIbKg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "578f5708-e902-4d6d-be89-a180a1aaa315", "DetectTime": "2024-05-21T12:49:32.670109+00:00", "EventTime": "2024-05-21T12:49:32.670130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVMAbnG2ybzjI28Uk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "3639498b-63d4-4b30-953e-bfdcd123410d", "DetectTime": "2024-05-21T12:49:32.676766+00:00", "EventTime": "2024-05-21T12:49:32.676787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmp2gg1wsvMSCEAbwf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "d9b01b0d-c99d-4122-a595-38f89e45c454", "DetectTime": "2024-05-21T12:49:32.717838+00:00", "EventTime": "2024-05-21T12:49:32.717862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmzwbA1owRM8J9nus7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "21936160-4865-49b7-ba57-646533f70b0d", "DetectTime": "2024-05-21T12:49:32.731204+00:00", "EventTime": "2024-05-21T12:49:32.731222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLjK6XkyDv9IMio5"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 163} +{"Format": "IDEA0", "ID": "1a66161e-c0e8-4eec-99da-0dae785e5f43", "DetectTime": "2024-05-21T12:49:32.736121+00:00", "EventTime": "2024-05-21T12:49:32.736139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CioLVo1DersIwzOTij"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "b59b8109-625d-4490-a8f2-a097040aad9a", "DetectTime": "2024-05-21T12:49:32.765889+00:00", "EventTime": "2024-05-21T12:49:32.765911+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["223.205.53.114"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4DWu3YllmyNdKRYf"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "8ac6f0be-05e6-4286-9404-fdbdaf52783f", "DetectTime": "2024-05-21T12:49:32.778204+00:00", "EventTime": "2024-05-21T12:49:32.778224+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["223.205.53.114"]}], "Attach": [{"Content": "connection to blacklisted IP: 223.205.53.114 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4DWu3YllmyNdKRYf"], "accumulated_threat_level": 6.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "7a316679-1855-45a3-877e-0301eb6d01e6", "DetectTime": "2024-05-21T12:49:32.794911+00:00", "EventTime": "2024-05-21T12:49:32.794932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQZ6Lt4PcXD0udNK9g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "1eef6983-f746-4bf1-beb4-a20937375280", "DetectTime": "2024-05-21T12:49:32.806681+00:00", "EventTime": "2024-05-21T12:49:32.806699+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["110.138.15.81"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COPP8z4h5AqebT2ZEe"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "2cf19a07-3f3f-48d7-aeaa-2a2f34423d18", "DetectTime": "2024-05-21T12:49:32.818844+00:00", "EventTime": "2024-05-21T12:49:32.818867+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["110.138.15.81"]}], "Attach": [{"Content": "connection to blacklisted IP: 110.138.15.81 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COPP8z4h5AqebT2ZEe"], "accumulated_threat_level": 6.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "99cb83fe-edad-43e7-a4b3-fe87fb0312d0", "DetectTime": "2024-05-21T12:49:33.276925+00:00", "EventTime": "2024-05-21T12:49:33.276947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8hamC3AbEKqDmrwjh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "6d788703-50e7-482f-aa1e-f411bb8bf5b2", "DetectTime": "2024-05-21T12:49:33.282613+00:00", "EventTime": "2024-05-21T12:49:33.282633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdBejjaZGdEF2MDg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "bf9b46e7-1605-4a8a-bf63-3af6dc79e5df", "DetectTime": "2024-05-21T12:49:33.388147+00:00", "EventTime": "2024-05-21T12:49:33.388165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHr1bQ11JzrsOkdJh8"], "accumulated_threat_level": 3.7, "timewindow": 163} +{"Format": "IDEA0", "ID": "e2b89f9e-2a42-4eaa-b12f-bfdd4de3be8b", "DetectTime": "2024-05-21T12:49:33.423814+00:00", "EventTime": "2024-05-21T12:49:33.423835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ktwE4CZvEbjsh9B4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "6678444f-90a7-4b04-b8ad-c3c69d7a2a7f", "DetectTime": "2024-05-21T12:49:33.435827+00:00", "EventTime": "2024-05-21T12:49:33.435847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJoEvpqlAi5EUVoc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "28a31e46-3388-4ece-bad9-8a02ae3aac3c", "DetectTime": "2024-05-21T12:49:33.447369+00:00", "EventTime": "2024-05-21T12:49:33.447388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu3ZANhY2BamK3zfe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "24fd374d-82f5-4e4f-89f9-2b9c30f6b72a", "DetectTime": "2024-05-21T12:49:33.830006+00:00", "EventTime": "2024-05-21T12:49:33.830027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CawGW52wuP9yhmyGwd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "b1a07324-3dc7-401c-bc94-ee432666f775", "DetectTime": "2024-05-21T12:49:33.875380+00:00", "EventTime": "2024-05-21T12:49:33.875410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLXcs94aEngwy7Ceqe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "41e4de04-b3b3-48af-80e2-6cc5be8fa7d5", "DetectTime": "2024-05-21T12:49:33.910618+00:00", "EventTime": "2024-05-21T12:49:33.910640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Em8xZNi8QEe8kRd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "6c537fed-993e-4b1a-81c5-6024a339fc4d", "DetectTime": "2024-05-21T12:49:33.965264+00:00", "EventTime": "2024-05-21T12:49:33.965283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKrhW21pl0xZGsFdwl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "6c201a5e-8225-4449-b3f5-2495c1ff94a1", "DetectTime": "2024-05-21T12:49:34.004303+00:00", "EventTime": "2024-05-21T12:49:34.004324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkpbEF30wKEGD6N1Z7"], "accumulated_threat_level": 4.5, "timewindow": 163} +{"Format": "IDEA0", "ID": "afec75a3-2cee-4fc3-913b-80794935688a", "DetectTime": "2024-05-21T12:49:34.009542+00:00", "EventTime": "2024-05-21T12:49:34.009560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGb1W2yZin98piNxj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "8b1b3656-4d1c-470a-8c0c-3e00aa4054a1", "DetectTime": "2024-05-21T12:49:34.014798+00:00", "EventTime": "2024-05-21T12:49:34.014817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMJGnA2ppho8W0tc0c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "89de7c06-98fd-4b6a-aa86-842cc04fe31c", "DetectTime": "2024-05-21T12:49:34.019862+00:00", "EventTime": "2024-05-21T12:49:34.019879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjPHL1QjCI7efDZN9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "a9b6a54c-6c0c-4cb3-8b66-d8c197829fcf", "DetectTime": "2024-05-21T12:49:34.062653+00:00", "EventTime": "2024-05-21T12:49:34.062672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiB8sJsM4Th8PDrZ1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "5b921e37-ae5a-4def-8157-33b763deedcf", "DetectTime": "2024-05-21T12:49:34.459887+00:00", "EventTime": "2024-05-21T12:49:34.459910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF6IuG276mcCM4Lf4c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "d91d2f06-47c8-48ea-9441-7fbc08ad25cf", "DetectTime": "2024-05-21T12:49:34.464843+00:00", "EventTime": "2024-05-21T12:49:34.464863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3cy62BPBU8PrJCc8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "918f4ce8-1ac2-45cd-bd2a-72dcea0c8ed5", "DetectTime": "2024-05-21T12:49:34.524095+00:00", "EventTime": "2024-05-21T12:49:34.524119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYWN712ul5Enihfcg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "ccf4bff1-4bb2-4383-bbd6-2f3f8b8c34e3", "DetectTime": "2024-05-21T12:49:34.563332+00:00", "EventTime": "2024-05-21T12:49:34.563353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cunxgm2uUZsyBZpX6f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "56260eb4-4b62-4aff-84fc-a7d90ab22393", "DetectTime": "2024-05-21T12:49:34.568448+00:00", "EventTime": "2024-05-21T12:49:34.568466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cegvyh2nP0HQQarrMf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "931c7298-b70a-448f-bcc3-4b8c75e03c4b", "DetectTime": "2024-05-21T12:49:34.573011+00:00", "EventTime": "2024-05-21T12:49:34.573029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXp6fvEOiszJRF08"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "e4ba5120-02b5-4b56-8759-5df0f3e0af05", "DetectTime": "2024-05-21T12:49:34.944578+00:00", "EventTime": "2024-05-21T12:49:34.944597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co5RuC64v9NtwDKfa"], "accumulated_threat_level": 5.3, "timewindow": 163} +{"Format": "IDEA0", "ID": "8f3a9845-5395-4489-a3aa-d2905adcbd1b", "DetectTime": "2024-05-21T12:49:34.949359+00:00", "EventTime": "2024-05-21T12:49:34.949376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CftpYP2JqSL83EgM52"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "dfa953c9-ff5d-4d54-b049-81598ecbf1ab", "DetectTime": "2024-05-21T12:49:35.108348+00:00", "EventTime": "2024-05-21T12:49:35.108367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu80pThAlWT61VEGj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "ae6d5e2a-7933-4736-abda-59e7cd58b4fb", "DetectTime": "2024-05-21T12:49:35.144829+00:00", "EventTime": "2024-05-21T12:49:35.144850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3gtP2JAnndc1YPQj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 161} +{"Format": "IDEA0", "ID": "79ae3c55-eb41-4b5f-9308-2c1f02d91295", "DetectTime": "2024-05-21T12:49:35.150037+00:00", "EventTime": "2024-05-21T12:49:35.150054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtqAn46ZghTj62Hs5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "6ee73094-7675-45ac-ac0b-d3f576962703", "DetectTime": "2024-05-21T12:49:35.155291+00:00", "EventTime": "2024-05-21T12:49:35.155309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrvglyuPoERL2Qlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "d48d9919-ebcd-4e7b-944b-01c6cca87ac8", "DetectTime": "2024-05-21T12:49:35.159982+00:00", "EventTime": "2024-05-21T12:49:35.160000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSB4f2GUNDVWyc4Dc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "17887116-c17e-4868-bc82-d763949b7fdf", "DetectTime": "2024-05-21T12:49:35.528604+00:00", "EventTime": "2024-05-21T12:49:35.528624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJ89L3lchAMN9MJB1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "483be9f3-997f-4299-bbe8-e55b7bb9d353", "DetectTime": "2024-05-21T12:49:35.562795+00:00", "EventTime": "2024-05-21T12:49:35.562815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRBl22wqz3ZNSdkq3"], "accumulated_threat_level": 6.1, "timewindow": 163} +{"Format": "IDEA0", "ID": "db16b083-b207-434c-86a0-39b682152f58", "DetectTime": "2024-05-21T12:49:35.678328+00:00", "EventTime": "2024-05-21T12:49:35.678348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUioxKmeCPbDdfTl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "4fa4ff28-b833-4c14-a776-a60e9e7b4e18", "DetectTime": "2024-05-21T12:49:35.684572+00:00", "EventTime": "2024-05-21T12:49:35.684591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhxCt3Lgvi1GRyNec"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "0a8ec1e1-7ebd-4685-9690-211be5ac4c62", "DetectTime": "2024-05-21T12:49:35.689630+00:00", "EventTime": "2024-05-21T12:49:35.689649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClVlY3MzE3F91olh8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "700dd4e0-da11-4dfd-8c45-b7f998b78e4a", "DetectTime": "2024-05-21T12:49:35.694466+00:00", "EventTime": "2024-05-21T12:49:35.694490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWT0o7gCV3M6xiIe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "cc467df2-c60b-4f86-9aa5-8834b8e51601", "DetectTime": "2024-05-21T12:49:35.700279+00:00", "EventTime": "2024-05-21T12:49:35.700301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfSwCH18OXwbI5rgvh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "ebbdfd4b-262b-4180-95e1-f112e40ca16d", "DetectTime": "2024-05-21T12:49:35.722189+00:00", "EventTime": "2024-05-21T12:49:35.722211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Lh1TgBoYyEGnXv8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "691a6644-4142-4fde-93a7-42b7146b5ffd", "DetectTime": "2024-05-21T12:49:36.272109+00:00", "EventTime": "2024-05-21T12:49:36.272129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtVA21kxGZwr1soof"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 163} +{"Format": "IDEA0", "ID": "e9636e29-e310-4c74-b667-922cf62ce055", "DetectTime": "2024-05-21T12:49:36.327655+00:00", "EventTime": "2024-05-21T12:49:36.327676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CViiio2DmF8igcSBTc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "be052401-6045-4aea-8260-e201a6e2f8ef", "DetectTime": "2024-05-21T12:49:36.332461+00:00", "EventTime": "2024-05-21T12:49:36.332478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZBa94GknQ5KTSaH"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "8693b90c-8661-4477-bd2c-c81e6da1fe58", "DetectTime": "2024-05-21T12:49:36.339244+00:00", "EventTime": "2024-05-21T12:49:36.339262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfVWq82vnapWTbq7je"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "24926027-4f53-453f-9101-11d1c7311052", "DetectTime": "2024-05-21T12:49:36.365056+00:00", "EventTime": "2024-05-21T12:49:36.365076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5fPAq2hJfp2LqKgU8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "9ee035ec-0773-47b5-9c40-c6106fdfb72f", "DetectTime": "2024-05-21T12:49:36.393509+00:00", "EventTime": "2024-05-21T12:49:36.393531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPAiiJ3DoPpb8Celea"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "4e0b1d85-b6d5-41ff-aa6c-016fee06417b", "DetectTime": "2024-05-21T12:49:36.777104+00:00", "EventTime": "2024-05-21T12:49:36.777123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjzOxn46xcOvXg2Jpd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "6223892b-214a-422c-9010-36742f221e50", "DetectTime": "2024-05-21T12:49:36.847972+00:00", "EventTime": "2024-05-21T12:49:36.847991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf74DQ3esvZYbyuvug"], "accumulated_threat_level": 7.699999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "636c0452-4750-4251-97ba-cf28f2f4e7fb", "DetectTime": "2024-05-21T12:49:36.873663+00:00", "EventTime": "2024-05-21T12:49:36.873683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzSY82eDYxpTv3lyj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "e5f13817-0caa-4786-9718-db187271849c", "DetectTime": "2024-05-21T12:49:36.931723+00:00", "EventTime": "2024-05-21T12:49:36.931745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLUjwg417ilpzcZvrj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "8e8c82cc-abf8-4d7f-b53d-354f244b47c8", "DetectTime": "2024-05-21T12:49:37.011959+00:00", "EventTime": "2024-05-21T12:49:37.011980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5myT6yoIYuKMn855"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "b1c6c362-42c2-4ffc-8682-91573ee32aad", "DetectTime": "2024-05-21T12:49:37.016873+00:00", "EventTime": "2024-05-21T12:49:37.016896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PTLx102Xa7A56Jz7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "4232b601-13a5-4505-b921-ebaf6258a046", "DetectTime": "2024-05-21T12:49:37.055003+00:00", "EventTime": "2024-05-21T12:49:37.055026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgdyoKx9eNgU7Mffh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "54b5bc82-ab6b-4c26-b099-281d3e8e8738", "DetectTime": "2024-05-21T12:49:37.287700+00:00", "EventTime": "2024-05-21T12:49:37.287720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJspbdUaTLX7zPmI8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "184ca42b-433d-49e2-8bb1-bc2692c5f4cc", "DetectTime": "2024-05-21T12:49:37.307881+00:00", "EventTime": "2024-05-21T12:49:37.307903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CygOtu3orBy2WRLEmj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "76fd87d0-cbd2-48e7-af39-bc8fc26ed838", "DetectTime": "2024-05-21T12:49:37.315341+00:00", "EventTime": "2024-05-21T12:49:37.315361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdfpqiBzncTBFK2i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "7e3d5c40-3730-43e2-9fc3-14bc5bd4e2d7", "DetectTime": "2024-05-21T12:49:37.571162+00:00", "EventTime": "2024-05-21T12:49:37.571183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNebKG2J0PPTo2yVM2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "62143198-5f74-4f48-88b0-d37b23645498", "DetectTime": "2024-05-21T12:49:37.585098+00:00", "EventTime": "2024-05-21T12:49:37.585116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXlMh2vgKjsdKSXXc"], "accumulated_threat_level": 8.5, "timewindow": 163} +{"Format": "IDEA0", "ID": "154041a6-7653-41be-aa1f-87d1aa6909f0", "DetectTime": "2024-05-21T12:49:37.589667+00:00", "EventTime": "2024-05-21T12:49:37.589684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCehM1rvaxjGbDo4c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "30bd9033-d564-4245-a589-ec9d3de7daef", "DetectTime": "2024-05-21T12:49:37.594479+00:00", "EventTime": "2024-05-21T12:49:37.594497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C83zGdJH3kf4ZUfaf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "9c6fd372-acba-4783-a9cf-423b6bc69225", "DetectTime": "2024-05-21T12:49:37.599150+00:00", "EventTime": "2024-05-21T12:49:37.599169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csqzwz1bRS5NOnjuO8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "0eb49f91-126f-458f-a64e-a2fb98dba951", "DetectTime": "2024-05-21T12:49:37.604082+00:00", "EventTime": "2024-05-21T12:49:37.604099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C43WNO2X1DIRjpwJ42"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "83f10643-713b-4ba4-9d74-c8dd04a6c4d2", "DetectTime": "2024-05-21T12:49:37.833596+00:00", "EventTime": "2024-05-21T12:49:37.833618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClF0WW1qyKIBGucIn1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "167b4915-c3d1-4981-a57d-d62fbfca9181", "DetectTime": "2024-05-21T12:49:37.878015+00:00", "EventTime": "2024-05-21T12:49:37.878036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdQFLO3fslU8inqGOk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "72a57f1e-60cc-467a-a1d5-905f0ed952dd", "DetectTime": "2024-05-21T12:49:37.882705+00:00", "EventTime": "2024-05-21T12:49:37.882724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtz7348jIKJcIxr7c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "23285bad-cfb5-42d5-9dc6-557d0eeb48bc", "DetectTime": "2024-05-21T12:49:38.472340+00:00", "EventTime": "2024-05-21T12:49:38.472362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuD4zB2ACJK9stnY95"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "1522caca-bb7a-454f-a5a0-e8123f79cc61", "DetectTime": "2024-05-21T12:49:38.480020+00:00", "EventTime": "2024-05-21T12:49:38.480039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcSXpm1dBloYg1fqh8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "d6fad53a-a58f-49ce-9bb8-d862ab8df059", "DetectTime": "2024-05-21T12:49:38.487181+00:00", "EventTime": "2024-05-21T12:49:38.487201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZxj232jzl6MjoyUk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "a3465e4a-8ec7-45de-8250-bf7d2293f264", "DetectTime": "2024-05-21T12:49:38.564131+00:00", "EventTime": "2024-05-21T12:49:38.564154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWbgw4xulFlM1yPNb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "113119fd-7e2a-40c8-b623-3b75c4de3b5a", "DetectTime": "2024-05-21T12:49:38.570001+00:00", "EventTime": "2024-05-21T12:49:38.570020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHush1epA8ahnZSXf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "f12f6b7d-586f-4a79-bb78-b27cd04e406e", "DetectTime": "2024-05-21T12:49:38.574809+00:00", "EventTime": "2024-05-21T12:49:38.574832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4QZl3PCDsVHSu7K5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "642afc68-61e7-4f53-8d29-491b302c2a01", "DetectTime": "2024-05-21T12:49:38.587180+00:00", "EventTime": "2024-05-21T12:49:38.587200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClQckV3gJ7XAwrgBhi"], "accumulated_threat_level": 9.3, "timewindow": 163} +{"Format": "IDEA0", "ID": "c219bda3-e481-4f89-8144-876afb2fb050", "DetectTime": "2024-05-21T12:49:38.594427+00:00", "EventTime": "2024-05-21T12:49:38.594447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCdaZv3338xfIwrn9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "8891162b-4a8f-4f42-acae-ea608c19a3cf", "DetectTime": "2024-05-21T12:49:38.623159+00:00", "EventTime": "2024-05-21T12:49:38.623183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLSgMS1VB7PmCQv6Zc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "88da6453-5611-47c0-be71-05c4cfa8d308", "DetectTime": "2024-05-21T12:49:38.668802+00:00", "EventTime": "2024-05-21T12:49:38.668820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92GUf2zSgYm1Dz13k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "4da029d5-d1dd-45f0-8d6a-b2ea3c8328e5", "DetectTime": "2024-05-21T12:49:39.033429+00:00", "EventTime": "2024-05-21T12:49:39.033456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56s7W27tBULT1x5Ik"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "7ae01d6c-b859-4596-a66b-0f3e534ef2a0", "DetectTime": "2024-05-21T12:49:39.098537+00:00", "EventTime": "2024-05-21T12:49:39.098557+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["125.161.71.4"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmOCg2fWNKlbi7pwa"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "0ade03ba-ffbe-461c-a3c9-fdfd22aa02d7", "DetectTime": "2024-05-21T12:49:39.111606+00:00", "EventTime": "2024-05-21T12:49:39.111627+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["125.161.71.4"]}], "Attach": [{"Content": "connection to blacklisted IP: 125.161.71.4 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrmOCg2fWNKlbi7pwa"], "accumulated_threat_level": 7.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "fee97b65-6441-4a25-bcb3-b48b9c9f923b", "DetectTime": "2024-05-21T12:49:39.123426+00:00", "EventTime": "2024-05-21T12:49:39.123445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSCJ8O18JHAlJYBq41"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "31f3be39-00cd-44a3-a73c-431a287f86b7", "DetectTime": "2024-05-21T12:49:39.134043+00:00", "EventTime": "2024-05-21T12:49:39.134062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSvYg41QbDZfOCgzw8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "b480da73-0ec3-4ecb-9325-e8464d6bdef8", "DetectTime": "2024-05-21T12:49:39.305265+00:00", "EventTime": "2024-05-21T12:49:39.305282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvzmSc15FOTU9MQEa4"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "1e99db63-cdfa-4fff-a702-2eb6e02206ec", "DetectTime": "2024-05-21T12:49:39.318904+00:00", "EventTime": "2024-05-21T12:49:39.318923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvzmSc15FOTU9MQEa4"], "accumulated_threat_level": 7.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "95044eb3-c72e-4649-acf3-ca8ef74ce351", "DetectTime": "2024-05-21T12:49:39.406392+00:00", "EventTime": "2024-05-21T12:49:39.406425+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpONl18KqpQj3I78k"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "6979f01a-f480-4dfd-b987-29e1f830f88c", "DetectTime": "2024-05-21T12:49:39.418973+00:00", "EventTime": "2024-05-21T12:49:39.418991+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpONl18KqpQj3I78k"], "accumulated_threat_level": 8.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "71188177-c429-43d1-a926-81dac56a8ac6", "DetectTime": "2024-05-21T12:49:39.505106+00:00", "EventTime": "2024-05-21T12:49:39.505125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1W1C1o5R2NQ6GCvl"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "e480c559-e973-4bd0-81f5-19e34952902f", "DetectTime": "2024-05-21T12:49:39.518380+00:00", "EventTime": "2024-05-21T12:49:39.518416+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1W1C1o5R2NQ6GCvl"], "accumulated_threat_level": 8.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "5c2edf67-4703-44b7-a80b-774d96c6ed91", "DetectTime": "2024-05-21T12:49:39.523875+00:00", "EventTime": "2024-05-21T12:49:39.523897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6tIol4wVpPHn5NGdc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "cee36d53-6e04-48d2-8b23-3e8db7076cc7", "DetectTime": "2024-05-21T12:49:39.544274+00:00", "EventTime": "2024-05-21T12:49:39.544292+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZ8Vt30O5efqiYOqb"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "4967c81e-8b58-448f-b38b-309b513b3967", "DetectTime": "2024-05-21T12:49:39.556820+00:00", "EventTime": "2024-05-21T12:49:39.556838+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSZ8Vt30O5efqiYOqb"], "accumulated_threat_level": 9.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "91f293a7-3593-463c-b1fa-0d97060e4919", "DetectTime": "2024-05-21T12:49:39.580944+00:00", "EventTime": "2024-05-21T12:49:39.580962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKd0w4ioNk09ukOVb"], "accumulated_threat_level": 10.100000000000001, "timewindow": 163} +{"Format": "IDEA0", "ID": "3c0e7dc8-fa79-4318-8939-976d4a4fb88d", "DetectTime": "2024-05-21T12:49:39.594120+00:00", "EventTime": "2024-05-21T12:49:39.594140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2egA2itIRvxUlha3"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "15619e0c-9e85-4f71-ab37-796d9cd9c9ed", "DetectTime": "2024-05-21T12:49:39.608986+00:00", "EventTime": "2024-05-21T12:49:39.609022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd2egA2itIRvxUlha3"], "accumulated_threat_level": 9.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "1084c5ac-db1a-42bd-a94d-a6ec1ec4f069", "DetectTime": "2024-05-21T12:49:39.614848+00:00", "EventTime": "2024-05-21T12:49:39.614869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKCRLn3jmScXh7FO03"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "485394e0-40f9-480f-910d-b75cb5a438aa", "DetectTime": "2024-05-21T12:49:39.652510+00:00", "EventTime": "2024-05-21T12:49:39.652531+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnwVz2p8JpZ4lMi4a"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "9a32f9b2-575d-4349-ac09-b4d97cc268b8", "DetectTime": "2024-05-21T12:49:39.666244+00:00", "EventTime": "2024-05-21T12:49:39.666275+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnwVz2p8JpZ4lMi4a"], "accumulated_threat_level": 10.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "f2408547-cb47-4682-9340-8c221a9410e7", "DetectTime": "2024-05-21T12:49:39.715799+00:00", "EventTime": "2024-05-21T12:49:39.715821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZCiQk3nvN8YolrxV4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "12b275e9-c958-48d4-b35f-f12783f3d33e", "DetectTime": "2024-05-21T12:49:39.755973+00:00", "EventTime": "2024-05-21T12:49:39.755995+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxpepDhs2dZZEYiz9"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "e95c7243-1638-4a49-a2b7-04f1c48e870c", "DetectTime": "2024-05-21T12:49:39.769487+00:00", "EventTime": "2024-05-21T12:49:39.769512+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxpepDhs2dZZEYiz9"], "accumulated_threat_level": 10.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "d90508e1-75ff-42ea-b7df-75860385aab0", "DetectTime": "2024-05-21T12:49:39.774648+00:00", "EventTime": "2024-05-21T12:49:39.774669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUGpyN3mWig066kaUb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "2aefc021-bc18-43eb-a434-56ec72b1b788", "DetectTime": "2024-05-21T12:49:39.780017+00:00", "EventTime": "2024-05-21T12:49:39.780039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFaHE3JJoXEK3DOhg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "eee1b3c9-3476-48f4-8590-70252290abd1", "DetectTime": "2024-05-21T12:49:39.785539+00:00", "EventTime": "2024-05-21T12:49:39.785558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9e9f3o4OdENqRyVd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "2494fa96-c503-4472-a023-6aeafc0ab04e", "DetectTime": "2024-05-21T12:49:39.830391+00:00", "EventTime": "2024-05-21T12:49:39.830430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4UwhW3yTSC6P7dMv5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "dde895aa-ccee-4f10-bf32-59149a7acb79", "DetectTime": "2024-05-21T12:49:40.231523+00:00", "EventTime": "2024-05-21T12:49:40.231543+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92yhn3X7kuecRfr6j"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "a1c872f1-10a5-4153-9d92-47db9a2e47bb", "DetectTime": "2024-05-21T12:49:40.247917+00:00", "EventTime": "2024-05-21T12:49:40.247937+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92yhn3X7kuecRfr6j"], "accumulated_threat_level": 11.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "da68a678-e607-4386-8a64-0bc46307a969", "DetectTime": "2024-05-21T12:49:40.252905+00:00", "EventTime": "2024-05-21T12:49:40.252922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfEQAZQu0YH431A5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "a8777e77-fbc7-4736-abab-0d018c085658", "DetectTime": "2024-05-21T12:49:40.261494+00:00", "EventTime": "2024-05-21T12:49:40.261517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkKIhGEtUlxZ7OZDi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "c0f54d46-f0c4-49bf-9159-af9ecdd09c46", "DetectTime": "2024-05-21T12:49:40.275053+00:00", "EventTime": "2024-05-21T12:49:40.275074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwHstMpw5s4a6PCi"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "feae55c2-9340-45bd-b6cd-203b9dd8f33a", "DetectTime": "2024-05-21T12:49:40.288822+00:00", "EventTime": "2024-05-21T12:49:40.288842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChwHstMpw5s4a6PCi"], "accumulated_threat_level": 11.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "fe43a9f3-e383-438d-9808-3cc19fc67f86", "DetectTime": "2024-05-21T12:49:40.293598+00:00", "EventTime": "2024-05-21T12:49:40.293616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2ShJ69T5Sy7Ncf4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "bb427f2a-ed42-4e46-ad63-c164199be2d6", "DetectTime": "2024-05-21T12:49:40.305611+00:00", "EventTime": "2024-05-21T12:49:40.305628+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0YJb6C9waK6kRxj"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "268b4721-1fa7-4184-9504-99625192e4b2", "DetectTime": "2024-05-21T12:49:40.317867+00:00", "EventTime": "2024-05-21T12:49:40.317893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH0YJb6C9waK6kRxj"], "accumulated_threat_level": 12.0, "timewindow": 36} +{"Format": "Json", "ID": "268b4721-1fa7-4184-9504-99625192e4b2", "DetectTime": "2024-05-21T12:49:40.317867+00:00", "EventTime": "2024-05-21T12:49:40.317893+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "1970-01-02T11:41:12.907794+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 36. (real time 2024/05/21 12:49:40.658835)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 36, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "012baac9-27b7-40a9-96e9-922ae452dc1e", "DetectTime": "2024-05-21T12:49:40.671572+00:00", "EventTime": "2024-05-21T12:49:40.671602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5JJ020bs8V7n5wKe"], "accumulated_threat_level": 10.900000000000002, "timewindow": 163} +{"Format": "IDEA0", "ID": "21333f6c-1b73-45ff-a120-662bf093c7fd", "DetectTime": "2024-05-21T12:49:40.676627+00:00", "EventTime": "2024-05-21T12:49:40.676646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5uaT2IIOPK4QjBl6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "4d6253e0-670e-43cb-a1a6-69fbcb73c7b7", "DetectTime": "2024-05-21T12:49:40.681098+00:00", "EventTime": "2024-05-21T12:49:40.681116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxr95G2LAMSnro8lkg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "8f92b8dc-5af2-466d-a07c-25d8bc5abafc", "DetectTime": "2024-05-21T12:49:40.686203+00:00", "EventTime": "2024-05-21T12:49:40.686224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSXUA3QzrEZccVkk3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "0821ee74-0eb8-425b-84fd-b65a95d6ac54", "DetectTime": "2024-05-21T12:49:40.699264+00:00", "EventTime": "2024-05-21T12:49:40.699285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OLJr22v03D28f9Sk"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "01e7f0ce-8bbb-4902-b4b7-1198a416e358", "DetectTime": "2024-05-21T12:49:40.713204+00:00", "EventTime": "2024-05-21T12:49:40.713242+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OLJr22v03D28f9Sk"], "accumulated_threat_level": 0.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "7ca68d05-a7f0-458f-9c7f-af59309f3d26", "DetectTime": "2024-05-21T12:49:40.726331+00:00", "EventTime": "2024-05-21T12:49:40.726353+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPA3B3ALhjEe3KW3i"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "b04f524e-3d8d-4c6e-8c71-0fc2450d6b17", "DetectTime": "2024-05-21T12:49:40.740434+00:00", "EventTime": "2024-05-21T12:49:40.740471+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIPA3B3ALhjEe3KW3i"], "accumulated_threat_level": 1.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "9f76331f-0366-46df-8db0-cdc70e9f840c", "DetectTime": "2024-05-21T12:49:40.753948+00:00", "EventTime": "2024-05-21T12:49:40.753967+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcToRC2ByEjynFWOBb"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "2ec44e17-e650-41f0-ae03-de1f9679b711", "DetectTime": "2024-05-21T12:49:40.770448+00:00", "EventTime": "2024-05-21T12:49:40.770485+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcToRC2ByEjynFWOBb"], "accumulated_threat_level": 1.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "e99eb74b-e69e-4e54-bc7c-a274cfaca110", "DetectTime": "2024-05-21T12:49:40.784417+00:00", "EventTime": "2024-05-21T12:49:40.784440+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9R7Ta2hXfXRzaobo4"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "b0084af7-bae2-4f6b-a3b1-5912b6db5405", "DetectTime": "2024-05-21T12:49:40.798483+00:00", "EventTime": "2024-05-21T12:49:40.798518+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9R7Ta2hXfXRzaobo4"], "accumulated_threat_level": 2.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "5298665c-37fd-4cea-ba3b-4a86c9753dde", "DetectTime": "2024-05-21T12:49:40.812151+00:00", "EventTime": "2024-05-21T12:49:40.812173+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSjZwsVjx0OQBI5f"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "fd967619-63b1-4872-a21d-60efe1ce3c27", "DetectTime": "2024-05-21T12:49:40.826918+00:00", "EventTime": "2024-05-21T12:49:40.826954+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnSjZwsVjx0OQBI5f"], "accumulated_threat_level": 2.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "073fdab2-0b0e-4c66-a455-138c8f67739d", "DetectTime": "2024-05-21T12:49:40.832783+00:00", "EventTime": "2024-05-21T12:49:40.832804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaxWCS1VIc82fuls2c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "2a97d3a5-643c-4034-a40e-b5679b0915c3", "DetectTime": "2024-05-21T12:49:40.845881+00:00", "EventTime": "2024-05-21T12:49:40.845915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6r3o1BEx1Bed0mv"], "accumulated_threat_level": 11.700000000000003, "timewindow": 163} +{"Format": "IDEA0", "ID": "df150c50-fa89-452c-a68d-4eed78c19f1a", "DetectTime": "2024-05-21T12:49:40.866353+00:00", "EventTime": "2024-05-21T12:49:40.866388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtqQoD1SJHJJxV5gl3"], "accumulated_threat_level": 12.500000000000004, "timewindow": 163} +{"Format": "Json", "ID": "df150c50-fa89-452c-a68d-4eed78c19f1a", "DetectTime": "2024-05-21T12:49:40.866353+00:00", "EventTime": "2024-05-21T12:49:40.866388+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-07T18:28:37.419858+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2024/05/21 12:49:41.081881)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 163, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "7bb482fc-0a4f-4e26-8c6b-4d01b920babb", "DetectTime": "2024-05-21T12:49:41.086065+00:00", "EventTime": "2024-05-21T12:49:41.086083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4bSc1SjsqodG2wBe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "132bb888-9d26-4c03-8334-854a52be3806", "DetectTime": "2024-05-21T12:49:41.099390+00:00", "EventTime": "2024-05-21T12:49:41.099416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8lUzz3IALENKg7Ylb"], "accumulated_threat_level": 0.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "aced9bea-3968-45d4-a8bc-e6484f03fd0e", "DetectTime": "2024-05-21T12:49:41.115008+00:00", "EventTime": "2024-05-21T12:49:41.115027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtJoTdejF7hN0SpN9"], "accumulated_threat_level": 1.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "1b7ac6e2-aa41-477c-872b-8d75018c2437", "DetectTime": "2024-05-21T12:49:41.342029+00:00", "EventTime": "2024-05-21T12:49:41.342051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMfq2MVeaRyOtC8i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "e01372e0-0395-4206-a9c3-1f1bf5ce3c32", "DetectTime": "2024-05-21T12:49:41.387416+00:00", "EventTime": "2024-05-21T12:49:41.387439+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsCUkiqirFaRiu8bf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 163} +{"Format": "IDEA0", "ID": "28a5d127-2635-47ea-b734-c26c876e1600", "DetectTime": "2024-05-21T12:49:41.440305+00:00", "EventTime": "2024-05-21T12:49:41.440339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co278a2jeYDFbwYnIa"], "accumulated_threat_level": 3.2, "timewindow": 163} +{"Format": "IDEA0", "ID": "8224a7d9-09e8-40ce-9a09-a25eaaea8091", "DetectTime": "2024-05-21T12:49:41.485350+00:00", "EventTime": "2024-05-21T12:49:41.485390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyzZr4SDMNUKuWm48"], "accumulated_threat_level": 4.0, "timewindow": 163} +{"Format": "IDEA0", "ID": "18f4fa0b-95f3-4e5c-afd8-062a310f449b", "DetectTime": "2024-05-21T12:49:41.548263+00:00", "EventTime": "2024-05-21T12:49:41.548303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXu11f4pPHgQMdmYvd"], "accumulated_threat_level": 4.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "f9a8225f-641e-400d-acce-1c493f3ffcb2", "DetectTime": "2024-05-21T12:49:41.596330+00:00", "EventTime": "2024-05-21T12:49:41.596361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COIfKS3noo1714bGj1"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "dcbbda0c-c80c-4fbd-935f-3a935d521155", "DetectTime": "2024-05-21T12:49:41.641735+00:00", "EventTime": "2024-05-21T12:49:41.641772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4ALp1DjbSySIBNY9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 163} +{"Format": "IDEA0", "ID": "3811cc16-b33a-4634-94b8-bcc2828272cd", "DetectTime": "2024-05-21T12:49:41.902485+00:00", "EventTime": "2024-05-21T12:49:41.902508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1XwUq2Dt79bsrG2Qi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "f444e15e-bf36-4619-ae7d-5d5108390d1f", "DetectTime": "2024-05-21T12:49:41.947265+00:00", "EventTime": "2024-05-21T12:49:41.947295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXqL04ATLlZmbrHn"], "accumulated_threat_level": 7.199999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "fca6a08b-6c87-4501-99d4-4518e18fb780", "DetectTime": "2024-05-21T12:49:41.997059+00:00", "EventTime": "2024-05-21T12:49:41.997089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpLaRy1RlCaRntYHUb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "efc730df-2de2-4ad9-a15d-c4233e5f641e", "DetectTime": "2024-05-21T12:49:42.049996+00:00", "EventTime": "2024-05-21T12:49:42.050029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIWhc3TJjMcddTkVc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "0e3ca692-70b5-4887-a8e5-5ad6db8dae36", "DetectTime": "2024-05-21T12:49:42.101540+00:00", "EventTime": "2024-05-21T12:49:42.101580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmiX0p2YUOLidk4uX3"], "accumulated_threat_level": 9.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "03383ee9-4df4-4a48-b5ec-45bb4ee0f679", "DetectTime": "2024-05-21T12:49:42.152326+00:00", "EventTime": "2024-05-21T12:49:42.152348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0M0K1hBSx1tDzuS5"], "accumulated_threat_level": 10.4, "timewindow": 163} +{"Format": "IDEA0", "ID": "943c2c84-eb48-48a3-bebe-49732791d751", "DetectTime": "2024-05-21T12:49:42.205585+00:00", "EventTime": "2024-05-21T12:49:42.205604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYelqImv9nqNyCa6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 163} +{"Format": "IDEA0", "ID": "b749a9f0-c31d-4e18-a3f0-63ee8625e1c1", "DetectTime": "2024-05-21T12:49:42.257063+00:00", "EventTime": "2024-05-21T12:49:42.257081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfazQ1CdMbAhFjuQd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 163} +{"Format": "Json", "ID": "b749a9f0-c31d-4e18-a3f0-63ee8625e1c1", "DetectTime": "2024-05-21T12:49:42.257063+00:00", "EventTime": "2024-05-21T12:49:42.257081+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-07T18:28:40.698816+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2024/05/21 12:49:42.517808)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 163, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fe908965-ad20-4469-a85c-40a290ea1ef7", "DetectTime": "2024-05-21T12:49:42.522091+00:00", "EventTime": "2024-05-21T12:49:42.522109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKH6b11vNzySdEydEh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "b84a5a20-bc7a-47d4-805a-68f0c651db29", "DetectTime": "2024-05-21T12:49:42.551808+00:00", "EventTime": "2024-05-21T12:49:42.551842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6RMA1Fj2Gh2lfNWj"], "accumulated_threat_level": 0.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "203299e7-e005-416e-bdb0-87fd810e8a4d", "DetectTime": "2024-05-21T12:49:42.603188+00:00", "EventTime": "2024-05-21T12:49:42.603221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuRVHajc2EuL3s4i"], "accumulated_threat_level": 1.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "25d8dcca-2685-4c16-aa7f-cb99f9cd2515", "DetectTime": "2024-05-21T12:49:42.654115+00:00", "EventTime": "2024-05-21T12:49:42.654151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcLaHm2VC1HWAaA67h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 163} +{"Format": "IDEA0", "ID": "abd0b050-20bb-401a-93a0-180dffad861e", "DetectTime": "2024-05-21T12:49:42.702201+00:00", "EventTime": "2024-05-21T12:49:42.702234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84lrK1nnrV97yNtk5"], "accumulated_threat_level": 3.2, "timewindow": 163} +{"Format": "IDEA0", "ID": "45577a60-692c-49db-8a6a-412e70ef15ca", "DetectTime": "2024-05-21T12:49:42.802728+00:00", "EventTime": "2024-05-21T12:49:42.802761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmf1G94hBORsPWINPd"], "accumulated_threat_level": 4.0, "timewindow": 163} +{"Format": "IDEA0", "ID": "df927dc5-8e90-40de-a726-8b0f3663c64b", "DetectTime": "2024-05-21T12:49:42.898525+00:00", "EventTime": "2024-05-21T12:49:42.898565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgtpnKn9ZqmkVH4g"], "accumulated_threat_level": 4.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "d401bf44-009b-4d28-b18c-d3c30410236e", "DetectTime": "2024-05-21T12:49:42.942128+00:00", "EventTime": "2024-05-21T12:49:42.942165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMMg04IzeD6htvLld"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "13d7d03d-faac-4bdd-acf3-0b2d2ef73fbb", "DetectTime": "2024-05-21T12:49:43.199142+00:00", "EventTime": "2024-05-21T12:49:43.199164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCyeM1lzI2tSfRSB3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "f5e6318d-1959-46b6-b605-735a49d944b9", "DetectTime": "2024-05-21T12:49:43.246599+00:00", "EventTime": "2024-05-21T12:49:43.246620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZl9u35OiuAKF9r84"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 163} +{"Format": "IDEA0", "ID": "3d6b74b9-9cc4-4621-aad0-197039de7242", "DetectTime": "2024-05-21T12:49:43.291340+00:00", "EventTime": "2024-05-21T12:49:43.291362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsA2r618z4ZxNbxRHk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "bc60b669-6dd6-4e74-abce-a57ec7d0a74b", "DetectTime": "2024-05-21T12:49:43.340591+00:00", "EventTime": "2024-05-21T12:49:43.340611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CluWUh4xEbivENEXW3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "d64446e3-6ae7-4574-b20a-da0254f11f04", "DetectTime": "2024-05-21T12:49:43.391326+00:00", "EventTime": "2024-05-21T12:49:43.391347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfycQT0mHiGydm0cd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "9d62a8e9-fb8a-4cba-aff7-d62ab79ab199", "DetectTime": "2024-05-21T12:49:43.439596+00:00", "EventTime": "2024-05-21T12:49:43.439617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtJoP35kilW9k0hnj"], "accumulated_threat_level": 9.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "99366c88-a32c-4097-842f-04cec20412df", "DetectTime": "2024-05-21T12:49:43.468155+00:00", "EventTime": "2024-05-21T12:49:43.468178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKpUL62Ca2GECtpQi8", "CxxbTB2ZqNM2BAyboa", "CZyMQi2TSrSsIMMvRg", "Chr3Dj4nSda4280GWf"], "accumulated_threat_level": 0.5, "timewindow": 176} +{"Format": "IDEA0", "ID": "25e5363a-8ee4-4657-90d7-65fa807c5edb", "DetectTime": "2024-05-21T12:49:43.508955+00:00", "EventTime": "2024-05-21T12:49:43.508991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNu9p74eiHKL4dhDbl"], "accumulated_threat_level": 10.4, "timewindow": 163} +{"Format": "IDEA0", "ID": "69513916-aae7-4104-a252-1890d3ebd2c4", "DetectTime": "2024-05-21T12:49:43.565105+00:00", "EventTime": "2024-05-21T12:49:43.565146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8dFpvX5kLjFeUYJl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 163} +{"Format": "IDEA0", "ID": "c7113db2-1ec2-45ea-8f67-b3e064abba6f", "DetectTime": "2024-05-21T12:49:43.860899+00:00", "EventTime": "2024-05-21T12:49:43.860932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COuUll1K8Wu5G9JGjj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 163} +{"Format": "Json", "ID": "c7113db2-1ec2-45ea-8f67-b3e064abba6f", "DetectTime": "2024-05-21T12:49:43.860899+00:00", "EventTime": "2024-05-21T12:49:43.860932+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "1970-01-07T18:59:19.709534+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2024/05/21 12:49:44.055419)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 163, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b65ebf6c-832b-4e07-aa73-77cfa2e534c3", "DetectTime": "2024-05-21T12:49:44.060409+00:00", "EventTime": "2024-05-21T12:49:44.060434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGvwi24psFstYYhipl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "d59e4de9-a610-4a7c-9f61-3bed65c19741", "DetectTime": "2024-05-21T12:49:44.080749+00:00", "EventTime": "2024-05-21T12:49:44.080780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPAOO1WJGALhKDWJ9"], "accumulated_threat_level": 0.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "f2a64c20-a62d-406e-9b60-983222231820", "DetectTime": "2024-05-21T12:49:44.094652+00:00", "EventTime": "2024-05-21T12:49:44.094679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHHET1nRUPcvx9JO6"], "accumulated_threat_level": 1.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "9f39ae00-0063-4c40-b19b-9cc7802840d2", "DetectTime": "2024-05-21T12:49:44.107026+00:00", "EventTime": "2024-05-21T12:49:44.107048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0slsC3BvYVgScdz47"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 163} +{"Format": "IDEA0", "ID": "5f95dad0-880f-4aa6-a4dc-1a3de59ea9f4", "DetectTime": "2024-05-21T12:49:44.119182+00:00", "EventTime": "2024-05-21T12:49:44.119208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwQot1C5ysKQKm43e"], "accumulated_threat_level": 3.2, "timewindow": 163} +{"Format": "IDEA0", "ID": "5368a7cf-5a9c-42e3-b816-fca1076985f9", "DetectTime": "2024-05-21T12:49:44.151977+00:00", "EventTime": "2024-05-21T12:49:44.151996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiUqRLHuvTXSSje5"], "accumulated_threat_level": 4.0, "timewindow": 163} +{"Format": "IDEA0", "ID": "9cc50274-5465-41d3-b01f-18de3673be9c", "DetectTime": "2024-05-21T12:49:44.170772+00:00", "EventTime": "2024-05-21T12:49:44.170791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs1yI3V58uL1hxwS8"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "b00e3d49-6f8e-43af-a69b-25175a7fb4b3", "DetectTime": "2024-05-21T12:49:44.182556+00:00", "EventTime": "2024-05-21T12:49:44.182577+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxs1yI3V58uL1hxwS8"], "accumulated_threat_level": 3.0, "timewindow": 36} +{"Format": "IDEA0", "ID": "d81295d9-a31a-4aa3-9780-9cc7075a4809", "DetectTime": "2024-05-21T12:49:44.204378+00:00", "EventTime": "2024-05-21T12:49:44.204398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLgosP3Ayl9D5f1Al"], "accumulated_threat_level": 4.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "be3d06ac-f0b0-4a87-9e70-a79f7c2fc79f", "DetectTime": "2024-05-21T12:49:44.343539+00:00", "EventTime": "2024-05-21T12:49:44.343558+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImHTA4QYBDV45dSN3"], "accumulated_threat_level": 0, "timewindow": 36} +{"Format": "IDEA0", "ID": "c9135877-7dee-418e-a537-846f03d765e7", "DetectTime": "2024-05-21T12:49:44.355411+00:00", "EventTime": "2024-05-21T12:49:44.355429+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CImHTA4QYBDV45dSN3"], "accumulated_threat_level": 3.5, "timewindow": 36} +{"Format": "IDEA0", "ID": "e0e0b937-0465-4c65-b687-8b21d7b2bf3f", "DetectTime": "2024-05-21T12:49:44.485633+00:00", "EventTime": "2024-05-21T12:49:44.485672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg5u2e4V41cTfPoPU9"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "488680af-3d76-4d69-8fd8-344e0c9394c4", "DetectTime": "2024-05-21T12:49:44.522197+00:00", "EventTime": "2024-05-21T12:49:44.522220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvlEn3TPADMXKc3Aj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "5cf43965-c55c-4178-854a-4ea14aa6150c", "DetectTime": "2024-05-21T12:49:44.658106+00:00", "EventTime": "2024-05-21T12:49:44.658141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEefkt3oWAK7mFR3F2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 163} +{"Format": "IDEA0", "ID": "d855e7de-6f35-4bec-ba63-97d7dff9773d", "DetectTime": "2024-05-21T12:49:44.684825+00:00", "EventTime": "2024-05-21T12:49:44.684862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ2luN2yihF3xHfvBi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "21b95636-e6a0-46ca-8d79-6b8333a9e81b", "DetectTime": "2024-05-21T12:49:44.737412+00:00", "EventTime": "2024-05-21T12:49:44.737447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzwE3iXtKfQ82p1j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "28cd5ec7-3904-4993-88a8-d59e13b99131", "DetectTime": "2024-05-21T12:49:44.801203+00:00", "EventTime": "2024-05-21T12:49:44.801243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1FSiPgiu5vuJfj9j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 163} +{"Format": "IDEA0", "ID": "aa8ac47d-ee2d-4e62-8a29-c79fda948190", "DetectTime": "2024-05-21T12:49:44.844645+00:00", "EventTime": "2024-05-21T12:49:44.844675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpCJOc2lKbs6krLSBe"], "accumulated_threat_level": 9.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "e30eb8fa-b6e1-4002-83f0-b9974335052c", "DetectTime": "2024-05-21T12:49:44.892628+00:00", "EventTime": "2024-05-21T12:49:44.892661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CHH51qKUs0YEZcLc"], "accumulated_threat_level": 10.4, "timewindow": 163} +{"Format": "IDEA0", "ID": "6d7cb07c-36e3-47ab-8beb-51adf4e3caff", "DetectTime": "2024-05-21T12:49:45.163424+00:00", "EventTime": "2024-05-21T12:49:45.163446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDReWD2U8tq2VKLng2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 163} +{"Format": "IDEA0", "ID": "d2bc01c3-a418-4920-b0bb-f560e5f1baea", "DetectTime": "2024-05-21T12:49:45.215873+00:00", "EventTime": "2024-05-21T12:49:45.215895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSb6wk4VXu73WKwAEd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 163} +{"Format": "Json", "ID": "d2bc01c3-a418-4920-b0bb-f560e5f1baea", "DetectTime": "2024-05-21T12:49:45.215873+00:00", "EventTime": "2024-05-21T12:49:45.215895+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T18:59:23.284539+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 163. (real time 2024/05/21 12:49:45.441987)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 163, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4c67de88-c758-4649-95d9-a54851549d49", "DetectTime": "2024-05-21T12:49:45.446200+00:00", "EventTime": "2024-05-21T12:49:45.446219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vtZM3CWMatJUSNL9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "d8f750dd-283c-4bf6-8f9a-e7dc0351007b", "DetectTime": "2024-05-21T12:49:45.456786+00:00", "EventTime": "2024-05-21T12:49:45.456805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CViojQ1W2mUtqr8bgf"], "accumulated_threat_level": 0.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "85101e40-3759-47ff-a699-e40c4b9c1117", "DetectTime": "2024-05-21T12:49:45.467686+00:00", "EventTime": "2024-05-21T12:49:45.467720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjEKqH2AKIEJdyMmg"], "accumulated_threat_level": 1.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "379132ff-14f4-4e41-9b2a-d8771109441a", "DetectTime": "2024-05-21T12:49:45.481733+00:00", "EventTime": "2024-05-21T12:49:45.481764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwa7o2DO3bTUd1OVe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 163} +{"Format": "IDEA0", "ID": "0d87a44c-b422-4783-a778-965d8905b00e", "DetectTime": "2024-05-21T12:49:45.494967+00:00", "EventTime": "2024-05-21T12:49:45.494990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CejI62nx2hiBO3Rb3"], "accumulated_threat_level": 3.2, "timewindow": 163} +{"Format": "IDEA0", "ID": "9c04b156-646a-45e3-9f8f-9c6e1dd73190", "DetectTime": "2024-05-21T12:49:45.525939+00:00", "EventTime": "2024-05-21T12:49:45.525979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLr4692NZRGhFXYL72"], "accumulated_threat_level": 4.0, "timewindow": 163} +{"Format": "IDEA0", "ID": "7775ae0b-a642-4869-b155-638ff9f59733", "DetectTime": "2024-05-21T12:49:45.810186+00:00", "EventTime": "2024-05-21T12:49:45.810216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COL88O2Tj8U7Pe3qTj"], "accumulated_threat_level": 4.8, "timewindow": 163} +{"Format": "IDEA0", "ID": "175b44c2-005c-4ffd-bbaf-8375687b638b", "DetectTime": "2024-05-21T12:49:45.863192+00:00", "EventTime": "2024-05-21T12:49:45.863223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQEE5k2qp0Ho3ZWej1"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "c71c1bb1-38cb-45ce-9b57-03612be28fa3", "DetectTime": "2024-05-21T12:49:45.903489+00:00", "EventTime": "2024-05-21T12:49:45.903510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7wGx13YexGF1uAq2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 162} +{"Format": "IDEA0", "ID": "b331095e-e38e-4f71-a93b-68d1a97ee507", "DetectTime": "2024-05-21T12:49:45.991785+00:00", "EventTime": "2024-05-21T12:49:45.991825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAOrq14b51Xlk9sF8"], "accumulated_threat_level": 0.8, "timewindow": 164} +{"Format": "IDEA0", "ID": "9015611d-56ed-4862-945b-3dd5988b0d67", "DetectTime": "2024-05-21T12:49:46.148318+00:00", "EventTime": "2024-05-21T12:49:46.148350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjgc2hEIlAJyaX2k"], "accumulated_threat_level": 1.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "aa731c44-90b3-4267-b703-8b52f026d6af", "DetectTime": "2024-05-21T12:49:46.168168+00:00", "EventTime": "2024-05-21T12:49:46.168187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPA3Ph1RzrlPygWzOa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 164} +{"Format": "IDEA0", "ID": "c0ca6ba8-c977-4d3c-b584-4e972d3cf1af", "DetectTime": "2024-05-21T12:49:46.220663+00:00", "EventTime": "2024-05-21T12:49:46.220683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH3AHL1WDjJkDbXO3"], "accumulated_threat_level": 3.2, "timewindow": 164} +{"Format": "IDEA0", "ID": "961f971b-ddff-4d20-b85e-580051e82b5b", "DetectTime": "2024-05-21T12:49:46.273967+00:00", "EventTime": "2024-05-21T12:49:46.273988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgNZna4Kl8Mslj3cSj"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "beedf0ed-4ccf-472f-942c-83391bee4d11", "DetectTime": "2024-05-21T12:49:46.551316+00:00", "EventTime": "2024-05-21T12:49:46.551354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbEOHA2Dx8ClmmUEff"], "accumulated_threat_level": 4.8, "timewindow": 164} +{"Format": "IDEA0", "ID": "b8b00aff-5d7b-419e-82ac-f63c72ad7482", "DetectTime": "2024-05-21T12:49:46.605322+00:00", "EventTime": "2024-05-21T12:49:46.605357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8Mwt3D8yLk6382e"], "accumulated_threat_level": 5.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "6691b10d-52f5-4f80-84dd-f1cf9a4dc6f2", "DetectTime": "2024-05-21T12:49:46.658769+00:00", "EventTime": "2024-05-21T12:49:46.658805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPRGh1mOSYYeRbZ9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 164} +{"Format": "IDEA0", "ID": "a427e33b-4221-4b95-8346-8aa244e3d9d2", "DetectTime": "2024-05-21T12:49:46.710053+00:00", "EventTime": "2024-05-21T12:49:46.710088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeL5k42HO6yUVMVyD"], "accumulated_threat_level": 7.199999999999999, "timewindow": 164} +{"Format": "IDEA0", "ID": "066d8e7b-35c9-4b6d-bea5-62838de61f88", "DetectTime": "2024-05-21T12:49:46.762184+00:00", "EventTime": "2024-05-21T12:49:46.762216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtcKs4LuzhHFOiiXc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 164} +{"Format": "IDEA0", "ID": "b667cbae-d637-4c38-9d84-f22fbb8ea225", "DetectTime": "2024-05-21T12:49:46.811412+00:00", "EventTime": "2024-05-21T12:49:46.811442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj421l2q5jOijucjtg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 164} +{"Format": "IDEA0", "ID": "b4cf2445-54b0-49f6-bc5e-0f7e9adf025e", "DetectTime": "2024-05-21T12:49:46.863535+00:00", "EventTime": "2024-05-21T12:49:46.863564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqD6OUkMcGdiNh4Ai"], "accumulated_threat_level": 9.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "2b4dd6f3-aa29-44c0-b23e-d1964d428a69", "DetectTime": "2024-05-21T12:49:46.918296+00:00", "EventTime": "2024-05-21T12:49:46.918331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COCS472b9x4pSrSWx9"], "accumulated_threat_level": 10.4, "timewindow": 164} +{"Format": "IDEA0", "ID": "96ec9648-1436-4972-998f-36a7dbac8ce0", "DetectTime": "2024-05-21T12:49:47.280529+00:00", "EventTime": "2024-05-21T12:49:47.280548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiAaB45MmtI2H3K0f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 164} +{"Format": "IDEA0", "ID": "d7309061-2073-491c-b978-f4a622082bbd", "DetectTime": "2024-05-21T12:49:47.285595+00:00", "EventTime": "2024-05-21T12:49:47.285614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywjOR2lgzXCj4DpTj"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "c5a017dd-3b67-4654-bd4d-679ce3878aa4", "DetectTime": "2024-05-21T12:49:47.363502+00:00", "EventTime": "2024-05-21T12:49:47.363523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLGKW14dMVXNEijUk1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 164} +{"Format": "Json", "ID": "c5a017dd-3b67-4654-bd4d-679ce3878aa4", "DetectTime": "2024-05-21T12:49:47.363502+00:00", "EventTime": "2024-05-21T12:49:47.363523+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-07T19:29:58.505322+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 164. (real time 2024/05/21 12:49:47.543906)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 164, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3a079226-7295-497d-ad73-f5d97be5d001", "DetectTime": "2024-05-21T12:49:47.559181+00:00", "EventTime": "2024-05-21T12:49:47.559201+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7xM6TzyEcjffB88"], "accumulated_threat_level": 0.8, "timewindow": 164} +{"Format": "IDEA0", "ID": "944e325c-f5e4-4796-8604-ced11328675b", "DetectTime": "2024-05-21T12:49:47.576223+00:00", "EventTime": "2024-05-21T12:49:47.576254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMiTPA4uXENpVuwAh6"], "accumulated_threat_level": 1.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "1701e086-ebd9-4822-a91c-2b3bad335730", "DetectTime": "2024-05-21T12:49:47.587900+00:00", "EventTime": "2024-05-21T12:49:47.587926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck2qrT2xK0puEEitna"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 164} +{"Format": "IDEA0", "ID": "39bf157e-01f9-4dd5-b449-035a178a28b6", "DetectTime": "2024-05-21T12:49:47.600057+00:00", "EventTime": "2024-05-21T12:49:47.600089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZxXi4flxQzNEExIh"], "accumulated_threat_level": 3.2, "timewindow": 164} +{"Format": "IDEA0", "ID": "fd6451a4-0beb-4e8a-ada4-c9651c5ee87e", "DetectTime": "2024-05-21T12:49:47.614456+00:00", "EventTime": "2024-05-21T12:49:47.614478+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.68.135.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm3auEVzQvVH7Mmb"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "1a1df049-d100-460e-838f-51a4b4d2cc63", "DetectTime": "2024-05-21T12:49:47.629852+00:00", "EventTime": "2024-05-21T12:49:47.629890+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.68.135.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.68.135.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm3auEVzQvVH7Mmb"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "641e3434-dc3e-47d0-9fd2-c0736ac648bc", "DetectTime": "2024-05-21T12:49:47.838980+00:00", "EventTime": "2024-05-21T12:49:47.839002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF37vO3OroB1Az4Az6"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "57958872-03d7-4581-a6bc-787d600526df", "DetectTime": "2024-05-21T12:49:47.892460+00:00", "EventTime": "2024-05-21T12:49:47.892492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35Qfy1cGJQ0wjdJMc"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "a6ffe39f-ba1c-43b9-83b7-91e7ace0ae3b", "DetectTime": "2024-05-21T12:49:47.934044+00:00", "EventTime": "2024-05-21T12:49:47.934066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9rVu2j8axF5UWL62"], "accumulated_threat_level": 4.8, "timewindow": 164} +{"Format": "IDEA0", "ID": "3e98e313-58a5-40bb-ac1e-469f47df2937", "DetectTime": "2024-05-21T12:49:47.989339+00:00", "EventTime": "2024-05-21T12:49:47.989356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3APE61ZuG6k1ua4p8"], "accumulated_threat_level": 5.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "8f9ddb9c-c62b-4a6a-bc12-11281598e859", "DetectTime": "2024-05-21T12:49:48.033348+00:00", "EventTime": "2024-05-21T12:49:48.033368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC78znCuXgzcO9Xt9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 164} +{"Format": "IDEA0", "ID": "d1a72464-f114-428c-b698-4f5477db11f3", "DetectTime": "2024-05-21T12:49:48.084345+00:00", "EventTime": "2024-05-21T12:49:48.084366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBSz84JLJmk9ZwQi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 164} +{"Format": "IDEA0", "ID": "9d09bd74-9cee-4d88-aedb-2f900ac52a7b", "DetectTime": "2024-05-21T12:49:48.138123+00:00", "EventTime": "2024-05-21T12:49:48.138141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2k711hxZJMW9H0Ya"], "accumulated_threat_level": 7.999999999999999, "timewindow": 164} +{"Format": "IDEA0", "ID": "55f14e3a-3712-4a27-bb4d-c2346f156d54", "DetectTime": "2024-05-21T12:49:48.203749+00:00", "EventTime": "2024-05-21T12:49:48.203771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKK3RZ3Fae7aQAFyYl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 164} +{"Format": "IDEA0", "ID": "376e2d38-6390-48f4-9d81-019a8532b27c", "DetectTime": "2024-05-21T12:49:48.464056+00:00", "EventTime": "2024-05-21T12:49:48.464079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNLjK6XkyDv9IMio5"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "94718482-c1cb-4dfb-9f02-f2ce74de3a7d", "DetectTime": "2024-05-21T12:49:48.512493+00:00", "EventTime": "2024-05-21T12:49:48.512512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Q1j4264ykP1sw8l7"], "accumulated_threat_level": 9.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "5f7d1714-293e-4e84-95ca-0572c9953602", "DetectTime": "2024-05-21T12:49:48.562199+00:00", "EventTime": "2024-05-21T12:49:48.562219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnemP02Kk3ESikZmr2"], "accumulated_threat_level": 10.4, "timewindow": 164} +{"Format": "IDEA0", "ID": "f961af6c-8c5c-47e5-bdb8-ff94822ab037", "DetectTime": "2024-05-21T12:49:48.613551+00:00", "EventTime": "2024-05-21T12:49:48.613569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaVSL3kz6gnOGAFvh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 164} +{"Format": "IDEA0", "ID": "28990e72-c606-4c94-a77e-9ee006b18e56", "DetectTime": "2024-05-21T12:49:48.666440+00:00", "EventTime": "2024-05-21T12:49:48.666460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct99061psQbJMpZ7jh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 164} +{"Format": "Json", "ID": "28990e72-c606-4c94-a77e-9ee006b18e56", "DetectTime": "2024-05-21T12:49:48.666440+00:00", "EventTime": "2024-05-21T12:49:48.666460+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-07T19:30:02.134518+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 164. (real time 2024/05/21 12:49:49.043705)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 164, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d198660e-be07-4c85-b02a-3aca11fe5841", "DetectTime": "2024-05-21T12:49:49.054434+00:00", "EventTime": "2024-05-21T12:49:49.054452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CabkUk1O58fXSYRI3l"], "accumulated_threat_level": 0.8, "timewindow": 164} +{"Format": "IDEA0", "ID": "e8b4650c-fd88-44e5-b148-0f2710ad418f", "DetectTime": "2024-05-21T12:49:49.066701+00:00", "EventTime": "2024-05-21T12:49:49.066720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVMzv20dYv4GOBBsd"], "accumulated_threat_level": 1.6, "timewindow": 164} +{"Format": "IDEA0", "ID": "62c38455-3fa2-4062-8793-ae71d6735c9b", "DetectTime": "2024-05-21T12:49:49.071240+00:00", "EventTime": "2024-05-21T12:49:49.071257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHr1bQ11JzrsOkdJh8"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "7feab1ee-d787-4b45-91ba-d8838f25bd2e", "DetectTime": "2024-05-21T12:49:49.083707+00:00", "EventTime": "2024-05-21T12:49:49.083726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpNGBu27xdaJxLJPD7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 164} +{"Format": "IDEA0", "ID": "e358e73c-da74-4042-a796-5e0f3fff2646", "DetectTime": "2024-05-21T12:49:49.229580+00:00", "EventTime": "2024-05-21T12:49:49.229599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW3ffK2vad1zohbh4e"], "accumulated_threat_level": 3.2, "timewindow": 164} +{"Format": "IDEA0", "ID": "5315cdcd-e6f7-4ac8-b412-6aec81fba397", "DetectTime": "2024-05-21T12:49:49.317713+00:00", "EventTime": "2024-05-21T12:49:49.317732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnweLu1KkZ89bjeKld"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "b2cda7c0-82c6-46a0-b70d-a42bbfc5fc39", "DetectTime": "2024-05-21T12:49:49.381310+00:00", "EventTime": "2024-05-21T12:49:49.381330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kz2n1bcOTBlQhm6"], "accumulated_threat_level": 0.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "c584fff2-6a5f-4351-94f8-c2485503acb1", "DetectTime": "2024-05-21T12:49:49.432885+00:00", "EventTime": "2024-05-21T12:49:49.432903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbi7a4flfTJXivRBh"], "accumulated_threat_level": 1.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "e3e7b527-b9ac-4dad-8255-7cf10f3141c7", "DetectTime": "2024-05-21T12:49:49.487082+00:00", "EventTime": "2024-05-21T12:49:49.487100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9aVI3swSyaVaJZN5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 165} +{"Format": "IDEA0", "ID": "f0ba8175-04b7-4c11-af8c-0f0853abbb95", "DetectTime": "2024-05-21T12:49:49.759416+00:00", "EventTime": "2024-05-21T12:49:49.759437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkpbEF30wKEGD6N1Z7"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "0f539782-fed0-4631-925c-7b7ad81d226c", "DetectTime": "2024-05-21T12:49:49.803104+00:00", "EventTime": "2024-05-21T12:49:49.803137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCBojL2TQO4Zg8Vk42"], "accumulated_threat_level": 3.2, "timewindow": 165} +{"Format": "IDEA0", "ID": "22480f92-a3eb-42b2-9421-fb20fb23357c", "DetectTime": "2024-05-21T12:49:49.850499+00:00", "EventTime": "2024-05-21T12:49:49.850526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZnxk3AQHtXw0BZd9"], "accumulated_threat_level": 4.0, "timewindow": 165} +{"Format": "IDEA0", "ID": "78c427a0-e858-4c87-9554-977785ba6dfb", "DetectTime": "2024-05-21T12:49:49.903265+00:00", "EventTime": "2024-05-21T12:49:49.903297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbbLK93ZRzDPwDtwkc"], "accumulated_threat_level": 4.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "30941e58-989b-4364-820a-df2b1617e846", "DetectTime": "2024-05-21T12:49:49.953120+00:00", "EventTime": "2024-05-21T12:49:49.953165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZqss28LT8cQqx3Ek"], "accumulated_threat_level": 5.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "1173b3a4-2676-4c48-940e-3a4d60e20b99", "DetectTime": "2024-05-21T12:49:50.005446+00:00", "EventTime": "2024-05-21T12:49:50.005482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakwFga1VfTc10qOe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "fa7b2ea7-6e13-44d2-90a0-0604303745cb", "DetectTime": "2024-05-21T12:49:50.056102+00:00", "EventTime": "2024-05-21T12:49:50.056122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg3yXc2r3Sp8erQ4E7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "3866176a-52bd-438b-9cb7-120d2a353aaf", "DetectTime": "2024-05-21T12:49:50.281280+00:00", "EventTime": "2024-05-21T12:49:50.281301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co5RuC64v9NtwDKfa"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "6b35f23e-6aaf-4a88-be00-75d1d19d5410", "DetectTime": "2024-05-21T12:49:50.326573+00:00", "EventTime": "2024-05-21T12:49:50.326591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhhqp20l7QeVPmOQe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "c1d86764-ed50-400c-9761-45e33a96488f", "DetectTime": "2024-05-21T12:49:50.372687+00:00", "EventTime": "2024-05-21T12:49:50.372706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMYKF4T8tMunmgk1k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "901811f0-c2df-4591-abd6-9679486c1480", "DetectTime": "2024-05-21T12:49:50.419928+00:00", "EventTime": "2024-05-21T12:49:50.419949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxZVwP1OabkFQrvjc7"], "accumulated_threat_level": 9.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "8319f6ca-6448-4a0d-a310-784ba9517e7a", "DetectTime": "2024-05-21T12:49:50.475674+00:00", "EventTime": "2024-05-21T12:49:50.475693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRFrE4WQmvwVijTJh"], "accumulated_threat_level": 10.4, "timewindow": 165} +{"Format": "IDEA0", "ID": "62b1b6a1-da2d-44a4-b38f-d4d460059a57", "DetectTime": "2024-05-21T12:49:50.532965+00:00", "EventTime": "2024-05-21T12:49:50.532985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rvWE4TcNsqa04E89"], "accumulated_threat_level": 11.200000000000001, "timewindow": 165} +{"Format": "IDEA0", "ID": "0615d235-e771-4b12-a73d-11c01afa63d2", "DetectTime": "2024-05-21T12:49:50.581557+00:00", "EventTime": "2024-05-21T12:49:50.581576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqojRcSFPbwWH3EH5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 165} +{"Format": "Json", "ID": "0615d235-e771-4b12-a73d-11c01afa63d2", "DetectTime": "2024-05-21T12:49:50.581557+00:00", "EventTime": "2024-05-21T12:49:50.581576+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-07T20:00:20.562937+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2024/05/21 12:49:50.757931)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 165, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8f81f2bf-4d85-4d4e-8cca-b1eec642d0df", "DetectTime": "2024-05-21T12:49:50.773596+00:00", "EventTime": "2024-05-21T12:49:50.773613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGas0Z2XSKGVjk1gck"], "accumulated_threat_level": 0.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "fd506bbe-86df-4360-bb07-bcacdbc44780", "DetectTime": "2024-05-21T12:49:50.786770+00:00", "EventTime": "2024-05-21T12:49:50.786789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VEuL2hCLAKdgUCFc"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "bccd67a8-8c35-409b-a55e-09681afa4c89", "DetectTime": "2024-05-21T12:49:50.801250+00:00", "EventTime": "2024-05-21T12:49:50.801268+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VEuL2hCLAKdgUCFc"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "a02cf218-7217-4319-b62e-efa1be34c3c4", "DetectTime": "2024-05-21T12:49:50.880695+00:00", "EventTime": "2024-05-21T12:49:50.880713+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfOPu424Pd1shC3B1"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "31c62a88-0c34-4e38-8bea-ed229e667482", "DetectTime": "2024-05-21T12:49:50.894372+00:00", "EventTime": "2024-05-21T12:49:50.894395+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfOPu424Pd1shC3B1"], "accumulated_threat_level": 7.8999999999999995, "timewindow": 37} +{"Format": "IDEA0", "ID": "b2d93b35-30c8-4f75-8203-d9133bcf9c56", "DetectTime": "2024-05-21T12:49:50.899912+00:00", "EventTime": "2024-05-21T12:49:50.899933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCRBl22wqz3ZNSdkq3"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "a135f312-1a54-417d-9eea-19f8a0a70447", "DetectTime": "2024-05-21T12:49:50.927819+00:00", "EventTime": "2024-05-21T12:49:50.927842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNGh2I3MMNgsGcnrF9"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "71591aa3-cd9e-493c-aeb6-ffe69aee1e36", "DetectTime": "2024-05-21T12:49:50.944049+00:00", "EventTime": "2024-05-21T12:49:50.944086+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNGh2I3MMNgsGcnrF9"], "accumulated_threat_level": 8.399999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "435ca76b-d6d4-4919-835c-8afa8a6f9437", "DetectTime": "2024-05-21T12:49:50.956839+00:00", "EventTime": "2024-05-21T12:49:50.956866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7sfQ3oeGRqOJp8hj"], "accumulated_threat_level": 1.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "1e76dad3-850a-47c1-8537-9f4f17d28ca6", "DetectTime": "2024-05-21T12:49:50.970933+00:00", "EventTime": "2024-05-21T12:49:50.970961+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDH2hS32bACsvDqoOh"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "caef65bb-c132-4b24-bae3-7dddee2dc63b", "DetectTime": "2024-05-21T12:49:50.985939+00:00", "EventTime": "2024-05-21T12:49:50.985963+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDH2hS32bACsvDqoOh"], "accumulated_threat_level": 8.899999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "afbd9f28-ed79-47b3-bfe3-c4601365f868", "DetectTime": "2024-05-21T12:49:50.997908+00:00", "EventTime": "2024-05-21T12:49:50.997933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGxor13CSSgfPcVPwe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 165} +{"Format": "IDEA0", "ID": "d3326cd9-9904-4e8d-9351-1649e5a18ee7", "DetectTime": "2024-05-21T12:49:51.051182+00:00", "EventTime": "2024-05-21T12:49:51.051216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnwvL2G4jA9dNvP49"], "accumulated_threat_level": 3.2, "timewindow": 165} +{"Format": "IDEA0", "ID": "440a5849-a241-4bdb-ad67-2daa1f36495d", "DetectTime": "2024-05-21T12:49:51.066741+00:00", "EventTime": "2024-05-21T12:49:51.066763+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILg4E3AzxXJgqaYlg"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "48d0ec8e-9dbb-4b87-b6e9-79e8628f0911", "DetectTime": "2024-05-21T12:49:51.080984+00:00", "EventTime": "2024-05-21T12:49:51.081004+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILg4E3AzxXJgqaYlg"], "accumulated_threat_level": 9.399999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "f4b44ddd-8503-4b90-bea0-ce3ad12190f8", "DetectTime": "2024-05-21T12:49:51.093541+00:00", "EventTime": "2024-05-21T12:49:51.093568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChDfvvb3qMZQdrU7k"], "accumulated_threat_level": 4.0, "timewindow": 165} +{"Format": "IDEA0", "ID": "71b90a2d-b735-4e8b-b001-3466a48467f7", "DetectTime": "2024-05-21T12:49:51.140652+00:00", "EventTime": "2024-05-21T12:49:51.140680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2UqerdbKVO29QdCi"], "accumulated_threat_level": 4.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "b590671e-068b-4372-baaf-c3fb4bc085f3", "DetectTime": "2024-05-21T12:49:51.193447+00:00", "EventTime": "2024-05-21T12:49:51.193481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmEVu4Uv73QSydfja"], "accumulated_threat_level": 5.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "2f61aebc-c90f-4372-a145-415b5ff7d131", "DetectTime": "2024-05-21T12:49:51.312437+00:00", "EventTime": "2024-05-21T12:49:51.312457+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDWXH3VkXSi87SCZ6"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "0893e47b-481d-4613-abab-0f199880c0c6", "DetectTime": "2024-05-21T12:49:51.324844+00:00", "EventTime": "2024-05-21T12:49:51.324864+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVDWXH3VkXSi87SCZ6"], "accumulated_threat_level": 9.899999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "b45c43e3-dd1c-4eec-9780-d245f07ea721", "DetectTime": "2024-05-21T12:49:51.412353+00:00", "EventTime": "2024-05-21T12:49:51.412371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5ARY6byFeX1iMT4"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "1aec7a8c-028f-4aa8-8c09-c20ce216bffd", "DetectTime": "2024-05-21T12:49:51.426248+00:00", "EventTime": "2024-05-21T12:49:51.426266+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ5ARY6byFeX1iMT4"], "accumulated_threat_level": 10.399999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "39dd48e4-c415-4fc4-b0ff-ec17f5160641", "DetectTime": "2024-05-21T12:49:51.446919+00:00", "EventTime": "2024-05-21T12:49:51.446941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPtVA21kxGZwr1soof"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "44949309-2063-40f5-a1cd-5f2b131c11c7", "DetectTime": "2024-05-21T12:49:51.498488+00:00", "EventTime": "2024-05-21T12:49:51.498507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMNND2KLCVOwOr9nd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "39c7b822-25e4-4483-ba08-efd63aad818a", "DetectTime": "2024-05-21T12:49:51.512737+00:00", "EventTime": "2024-05-21T12:49:51.512756+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVfE3VZNT2RxEgu9"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "9554d767-7322-4efe-ae9f-c3f94db52fd8", "DetectTime": "2024-05-21T12:49:51.526052+00:00", "EventTime": "2024-05-21T12:49:51.526070+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9nVfE3VZNT2RxEgu9"], "accumulated_threat_level": 10.899999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "64989d84-6356-45bf-951a-7a285ed449a7", "DetectTime": "2024-05-21T12:49:51.545655+00:00", "EventTime": "2024-05-21T12:49:51.545674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qyaC1BsishmsxMxh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "949e1af5-cb26-49b2-9562-e8313b436ad0", "DetectTime": "2024-05-21T12:49:51.609040+00:00", "EventTime": "2024-05-21T12:49:51.609060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJF9Z127PpIpY9gz8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "e56b6336-df42-4247-956d-03771e8cd581", "DetectTime": "2024-05-21T12:49:51.624139+00:00", "EventTime": "2024-05-21T12:49:51.624158+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COdapF2KI3A2DmWCd1"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "d12a4bb7-af35-4d75-8a39-12792f822e25", "DetectTime": "2024-05-21T12:49:51.638473+00:00", "EventTime": "2024-05-21T12:49:51.638498+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COdapF2KI3A2DmWCd1"], "accumulated_threat_level": 11.399999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "7986326c-7979-4feb-91a0-7f87bd9f8581", "DetectTime": "2024-05-21T12:49:51.653844+00:00", "EventTime": "2024-05-21T12:49:51.653880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS71vn3fJpKNS0PKai"], "accumulated_threat_level": 8.799999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "2b96ba21-01f1-4398-9af3-e074fd6c4038", "DetectTime": "2024-05-21T12:49:51.667291+00:00", "EventTime": "2024-05-21T12:49:51.667311+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYw3CVhlLm2JesFi"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "5665c7e0-b867-4f29-b5a0-727cc4deb7f9", "DetectTime": "2024-05-21T12:49:51.682288+00:00", "EventTime": "2024-05-21T12:49:51.682323+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYw3CVhlLm2JesFi"], "accumulated_threat_level": 11.899999999999999, "timewindow": 37} +{"Format": "IDEA0", "ID": "a6c49671-ac43-4656-aaa6-1e13714e6081", "DetectTime": "2024-05-21T12:49:51.711599+00:00", "EventTime": "2024-05-21T12:49:51.711638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2f6M34rpW51HPua9"], "accumulated_threat_level": 9.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "004667ea-5e26-405d-b228-1cf16b6c3869", "DetectTime": "2024-05-21T12:49:51.759723+00:00", "EventTime": "2024-05-21T12:49:51.759744+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb2Rd1ihmo4zDIx1h"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "dfbd8183-d699-4100-9bb8-2f1aa686439d", "DetectTime": "2024-05-21T12:49:51.774319+00:00", "EventTime": "2024-05-21T12:49:51.774358+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIb2Rd1ihmo4zDIx1h"], "accumulated_threat_level": 12.399999999999999, "timewindow": 37} +{"Format": "Json", "ID": "dfbd8183-d699-4100-9bb8-2f1aa686439d", "DetectTime": "2024-05-21T12:49:51.774319+00:00", "EventTime": "2024-05-21T12:49:51.774358+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "1970-01-02T12:12:05.584740+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 37. (real time 2024/05/21 12:49:52.146041)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.399999999999999, "timewindow": 37, "profileid": "profile_10.0.2.19", "threat_level": 12.399999999999999} +{"Format": "IDEA0", "ID": "5e72f3dc-10b1-4083-9641-757ae9091204", "DetectTime": "2024-05-21T12:49:52.157962+00:00", "EventTime": "2024-05-21T12:49:52.157999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvkEQX91mTea3iJ"], "accumulated_threat_level": 10.4, "timewindow": 165} +{"Format": "IDEA0", "ID": "d5b53280-1b85-4e5f-afd0-39c56bac38d8", "DetectTime": "2024-05-21T12:49:52.171519+00:00", "EventTime": "2024-05-21T12:49:52.171540+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDp2l1Ihg4nMNWnY1"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "9536676d-eab7-4838-9ffc-dbf9288399ab", "DetectTime": "2024-05-21T12:49:52.184829+00:00", "EventTime": "2024-05-21T12:49:52.184857+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbDp2l1Ihg4nMNWnY1"], "accumulated_threat_level": 0.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "6e5f6db4-a89f-43fd-9264-1c44ec161f9f", "DetectTime": "2024-05-21T12:49:52.196651+00:00", "EventTime": "2024-05-21T12:49:52.196674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQuja45wYASsmDfP3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 165} +{"Format": "IDEA0", "ID": "b583eff0-c1cc-4985-9348-44ccb0ba07d2", "DetectTime": "2024-05-21T12:49:52.209277+00:00", "EventTime": "2024-05-21T12:49:52.209297+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaB6ZR3F1cmBQkgCx7"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "13e595e9-d173-4b89-a5c1-a4aa3db77a2b", "DetectTime": "2024-05-21T12:49:52.221262+00:00", "EventTime": "2024-05-21T12:49:52.221293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVq2x92ZaKMAtgq7c3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 165} +{"Format": "Json", "ID": "13e595e9-d173-4b89-a5c1-a4aa3db77a2b", "DetectTime": "2024-05-21T12:49:52.221262+00:00", "EventTime": "2024-05-21T12:49:52.221293+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-07T20:00:23.941549+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2024/05/21 12:49:52.406266)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 165, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7278fe4f-7e49-422b-aa68-da19273854bd", "DetectTime": "2024-05-21T12:49:52.419512+00:00", "EventTime": "2024-05-21T12:49:52.419531+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaB6ZR3F1cmBQkgCx7"], "accumulated_threat_level": 1.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "fc216c9a-5c4c-4ed7-be67-2ef2ae90b41f", "DetectTime": "2024-05-21T12:49:52.432150+00:00", "EventTime": "2024-05-21T12:49:52.432168+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CThX1I3F19dsey8J23"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "c7f1a13c-9448-4c5c-94ed-0922d8522d97", "DetectTime": "2024-05-21T12:49:52.444735+00:00", "EventTime": "2024-05-21T12:49:52.444754+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CThX1I3F19dsey8J23"], "accumulated_threat_level": 1.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "d33291fc-2946-4a7b-85b7-21eeabfc1847", "DetectTime": "2024-05-21T12:49:52.457041+00:00", "EventTime": "2024-05-21T12:49:52.457060+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVriPhneT1rga9w7"], "accumulated_threat_level": 0.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "a0a5ddb6-fd48-48bb-9bee-450a4c3f719f", "DetectTime": "2024-05-21T12:49:52.469886+00:00", "EventTime": "2024-05-21T12:49:52.469904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3UKrD3FsVozrapiBj"], "accumulated_threat_level": 1.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "3c158b75-53e4-44e9-a7fc-19ee69f56ec6", "DetectTime": "2024-05-21T12:49:52.481646+00:00", "EventTime": "2024-05-21T12:49:52.481665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmqlng2VNmpeZcx08g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 165} +{"Format": "IDEA0", "ID": "b0d982da-d317-4abf-befe-4a5f44b29107", "DetectTime": "2024-05-21T12:49:52.500363+00:00", "EventTime": "2024-05-21T12:49:52.500382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfezULQbEUY85gikj"], "accumulated_threat_level": 3.2, "timewindow": 165} +{"Format": "IDEA0", "ID": "94141bd3-2e64-46dc-86ef-468e184c7e82", "DetectTime": "2024-05-21T12:49:52.505568+00:00", "EventTime": "2024-05-21T12:49:52.505586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf74DQ3esvZYbyuvug"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "19fc7ca4-66df-483c-9a64-6adc2b117761", "DetectTime": "2024-05-21T12:49:52.554960+00:00", "EventTime": "2024-05-21T12:49:52.554981+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKWzUa1Vxnxfeos593"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "93ece724-0312-4d49-b1d3-09205d6f9562", "DetectTime": "2024-05-21T12:49:52.569309+00:00", "EventTime": "2024-05-21T12:49:52.569344+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKWzUa1Vxnxfeos593"], "accumulated_threat_level": 2.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "8800702b-e5c1-49e6-9e04-f2dbc603b491", "DetectTime": "2024-05-21T12:49:52.699951+00:00", "EventTime": "2024-05-21T12:49:52.699987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEv3P1snOugwYXYX4"], "accumulated_threat_level": 4.0, "timewindow": 165} +{"Format": "IDEA0", "ID": "6063e5f6-96d1-4e1b-a458-4be2dc997dd9", "DetectTime": "2024-05-21T12:49:52.712770+00:00", "EventTime": "2024-05-21T12:49:52.712790+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnmy73SLFku0ImDC5"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "3874f888-6a9e-46e2-b4a8-9ec2d982ed41", "DetectTime": "2024-05-21T12:49:52.726348+00:00", "EventTime": "2024-05-21T12:49:52.726380+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnmy73SLFku0ImDC5"], "accumulated_threat_level": 2.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "4b287c27-cb13-4787-9cb9-ef2bc51a5760", "DetectTime": "2024-05-21T12:49:52.753417+00:00", "EventTime": "2024-05-21T12:49:52.753451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF32rk26pdGKcB9l67"], "accumulated_threat_level": 4.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "8ae96bcb-6ef3-490e-a690-76e39d42c0fc", "DetectTime": "2024-05-21T12:49:52.801602+00:00", "EventTime": "2024-05-21T12:49:52.801628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdYZL2hzESc9MgD"], "accumulated_threat_level": 5.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "dc595d52-85a5-4c57-8f41-8025dc2708d3", "DetectTime": "2024-05-21T12:49:52.816731+00:00", "EventTime": "2024-05-21T12:49:52.816752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FCaW2QN3G4197gRe"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "dcd7b72b-e2b1-4d3d-920a-3daf8ef5195d", "DetectTime": "2024-05-21T12:49:52.832040+00:00", "EventTime": "2024-05-21T12:49:52.832073+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8FCaW2QN3G4197gRe"], "accumulated_threat_level": 3.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "d97dd2ea-eb69-44c7-b383-95e716cd6fa3", "DetectTime": "2024-05-21T12:49:52.855695+00:00", "EventTime": "2024-05-21T12:49:52.855723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0z4R1AMaG0sQQnMg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "311f8ee6-493a-4b8a-8eab-09def804cc76", "DetectTime": "2024-05-21T12:49:52.870386+00:00", "EventTime": "2024-05-21T12:49:52.870423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3wVP2gAb3kruDZua"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "e87629e7-b031-4067-9b03-2bb509987662", "DetectTime": "2024-05-21T12:49:52.885827+00:00", "EventTime": "2024-05-21T12:49:52.885859+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3wVP2gAb3kruDZua"], "accumulated_threat_level": 3.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "c114cc2f-471b-4113-8d42-7ebcc739d8fa", "DetectTime": "2024-05-21T12:49:52.902505+00:00", "EventTime": "2024-05-21T12:49:52.902526+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIl8gx3mp8KBo1Nn0j"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "58705e07-2616-4678-ba79-2db9ce003816", "DetectTime": "2024-05-21T12:49:52.917699+00:00", "EventTime": "2024-05-21T12:49:52.917729+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIl8gx3mp8KBo1Nn0j"], "accumulated_threat_level": 4.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "2395f491-d557-427a-805e-2869a8f7369c", "DetectTime": "2024-05-21T12:49:52.930596+00:00", "EventTime": "2024-05-21T12:49:52.930621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9r4DU9R5eNG4Lw6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "f08cb76f-89ba-4262-a5d4-f6c3319b7258", "DetectTime": "2024-05-21T12:49:52.956636+00:00", "EventTime": "2024-05-21T12:49:52.956659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Carvmr4zLtzEEd1Qn4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "76cda900-1af5-4e29-adf0-823490abcc0a", "DetectTime": "2024-05-21T12:49:53.010118+00:00", "EventTime": "2024-05-21T12:49:53.010146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWLUE2XSJ3zj9KrSd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "5a462048-e276-4dd2-aa46-68c8791bb445", "DetectTime": "2024-05-21T12:49:53.199104+00:00", "EventTime": "2024-05-21T12:49:53.199126+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHneM1WYwxiNyrXfc"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "c2c486c4-05d4-4984-8e4b-efa1cf8095cf", "DetectTime": "2024-05-21T12:49:53.212953+00:00", "EventTime": "2024-05-21T12:49:53.212971+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnHneM1WYwxiNyrXfc"], "accumulated_threat_level": 4.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "e3c1cd10-f0a7-4856-b93d-80463b81f971", "DetectTime": "2024-05-21T12:49:53.238847+00:00", "EventTime": "2024-05-21T12:49:53.238887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcJ4sIsRCjTc7OSl"], "accumulated_threat_level": 9.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "e4b5685d-e3cb-454a-9de1-19881cac7f94", "DetectTime": "2024-05-21T12:49:53.250871+00:00", "EventTime": "2024-05-21T12:49:53.250890+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyygohHMSt55uz0j"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "2d4eef01-d95b-4f04-bc23-bb0c5d9eabb8", "DetectTime": "2024-05-21T12:49:53.263445+00:00", "EventTime": "2024-05-21T12:49:53.263465+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKyygohHMSt55uz0j"], "accumulated_threat_level": 5.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "393954ad-341f-46a1-ae16-085781a9f1a4", "DetectTime": "2024-05-21T12:49:53.284530+00:00", "EventTime": "2024-05-21T12:49:53.284547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJfkw3ayFazPM2S75"], "accumulated_threat_level": 10.4, "timewindow": 165} +{"Format": "IDEA0", "ID": "47cb1e1e-c826-4df4-981e-dc4dce7e1d5f", "DetectTime": "2024-05-21T12:49:53.299521+00:00", "EventTime": "2024-05-21T12:49:53.299540+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cvV83luQMGId8QA5"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "027a3c84-54fe-41c8-b0ed-f9c27c5db6ec", "DetectTime": "2024-05-21T12:49:53.315053+00:00", "EventTime": "2024-05-21T12:49:53.315072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4cvV83luQMGId8QA5"], "accumulated_threat_level": 5.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "072b75b0-4675-4cf6-adb7-87c780faba00", "DetectTime": "2024-05-21T12:49:53.338637+00:00", "EventTime": "2024-05-21T12:49:53.338657+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjDC21vPL37iFY6Vl"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "26f7bc7f-9557-4471-a1fc-a6f3b10e538a", "DetectTime": "2024-05-21T12:49:53.351473+00:00", "EventTime": "2024-05-21T12:49:53.351493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTmssZc1sM3iIWkf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 165} +{"Format": "IDEA0", "ID": "79895875-ea6f-40f6-9808-dd53f65506b8", "DetectTime": "2024-05-21T12:49:53.367815+00:00", "EventTime": "2024-05-21T12:49:53.367835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjDC21vPL37iFY6Vl"], "accumulated_threat_level": 6.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "5c0b5bb1-d17f-4fab-9b43-4f5509c81979", "DetectTime": "2024-05-21T12:49:53.388732+00:00", "EventTime": "2024-05-21T12:49:53.388751+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRdeq4S306ENse0nd"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "b39cc81f-912a-4018-9108-106dbcb43fcb", "DetectTime": "2024-05-21T12:49:53.402725+00:00", "EventTime": "2024-05-21T12:49:53.402744+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdRdeq4S306ENse0nd"], "accumulated_threat_level": 6.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "dd266bfb-514f-4e36-9f81-f4a9416c0d34", "DetectTime": "2024-05-21T12:49:53.415275+00:00", "EventTime": "2024-05-21T12:49:53.415296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQBn43V7GwJ96Fkc6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 165} +{"Format": "Json", "ID": "dd266bfb-514f-4e36-9f81-f4a9416c0d34", "DetectTime": "2024-05-21T12:49:53.415275+00:00", "EventTime": "2024-05-21T12:49:53.415296+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "1970-01-07T20:30:40.244123+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2024/05/21 12:49:53.616167)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 165, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a7107e59-c5ef-454f-9d66-05c3cfaccf89", "DetectTime": "2024-05-21T12:49:53.630052+00:00", "EventTime": "2024-05-21T12:49:53.630072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwFWT3gt6mgIvOcE5"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "46b62086-2019-498d-afdc-2f13b4d8c0b5", "DetectTime": "2024-05-21T12:49:53.644903+00:00", "EventTime": "2024-05-21T12:49:53.644930+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwFWT3gt6mgIvOcE5"], "accumulated_threat_level": 7.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "43250d27-0857-4566-961b-5d51bb9ff8a3", "DetectTime": "2024-05-21T12:49:53.650440+00:00", "EventTime": "2024-05-21T12:49:53.650460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRXlMh2vgKjsdKSXXc"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "d04b7147-c163-4a80-bbb1-1b98bb5c3950", "DetectTime": "2024-05-21T12:49:53.664277+00:00", "EventTime": "2024-05-21T12:49:53.664299+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87JhQ14r837HlBPz8"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "a8716dfd-5248-40ae-907f-734e9a5e84fe", "DetectTime": "2024-05-21T12:49:53.678475+00:00", "EventTime": "2024-05-21T12:49:53.678512+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87JhQ14r837HlBPz8"], "accumulated_threat_level": 7.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "0fe5c67f-7146-4a6b-82f5-1c9513992606", "DetectTime": "2024-05-21T12:49:53.692009+00:00", "EventTime": "2024-05-21T12:49:53.692035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czypas3qA1fQ3faHe"], "accumulated_threat_level": 0.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "38f69bbf-f4aa-4a54-983b-7f11bf00b008", "DetectTime": "2024-05-21T12:49:53.705764+00:00", "EventTime": "2024-05-21T12:49:53.705793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjsd81whnRVgfjuT2"], "accumulated_threat_level": 1.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "d5184315-a897-43dc-8cb7-88991c5eea05", "DetectTime": "2024-05-21T12:49:53.734478+00:00", "EventTime": "2024-05-21T12:49:53.734499+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme5wA4ijwyQUw7ejl"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "3c028b3c-3f78-43d7-976d-e6d15c206ac0", "DetectTime": "2024-05-21T12:49:53.748667+00:00", "EventTime": "2024-05-21T12:49:53.748691+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cme5wA4ijwyQUw7ejl"], "accumulated_threat_level": 8.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "ce217bbf-1520-438a-8eba-efd1f8db4abe", "DetectTime": "2024-05-21T12:49:53.763291+00:00", "EventTime": "2024-05-21T12:49:53.763316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDbLg1hBO7S9E3BJ4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 165} +{"Format": "IDEA0", "ID": "81d61c59-ac07-411b-ab79-57ff62a6f696", "DetectTime": "2024-05-21T12:49:53.776187+00:00", "EventTime": "2024-05-21T12:49:53.776208+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEj0j16WYnN8xNOy4"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "82e657ca-b0b8-4bf6-bf48-35d185931843", "DetectTime": "2024-05-21T12:49:53.789907+00:00", "EventTime": "2024-05-21T12:49:53.789940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEj0j16WYnN8xNOy4"], "accumulated_threat_level": 8.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "d4d0d74a-13c8-439e-b127-636cdf16bfa3", "DetectTime": "2024-05-21T12:49:53.810766+00:00", "EventTime": "2024-05-21T12:49:53.810791+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnU6xA2OfUy0GpVwM3"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "3e81c386-1edf-444a-8a3e-0106e71bb916", "DetectTime": "2024-05-21T12:49:53.826006+00:00", "EventTime": "2024-05-21T12:49:53.826035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdL7IH3va8xkdJTos5"], "accumulated_threat_level": 3.2, "timewindow": 165} +{"Format": "IDEA0", "ID": "634109be-cb88-4d62-87ca-f0db5e80db0f", "DetectTime": "2024-05-21T12:49:53.841011+00:00", "EventTime": "2024-05-21T12:49:53.841045+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnU6xA2OfUy0GpVwM3"], "accumulated_threat_level": 9.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "5f57c313-027e-40fa-a056-1efb01d5546c", "DetectTime": "2024-05-21T12:49:53.868179+00:00", "EventTime": "2024-05-21T12:49:53.868214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bgjF4BzT1qErZbR9"], "accumulated_threat_level": 4.0, "timewindow": 165} +{"Format": "IDEA0", "ID": "f775a3fe-4f0d-481d-97c9-07e42aae0179", "DetectTime": "2024-05-21T12:49:53.881568+00:00", "EventTime": "2024-05-21T12:49:53.881588+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDscxT3B3bxr9uRTMh"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "c9649aeb-fb37-4a5b-9e95-1e5bc1238c95", "DetectTime": "2024-05-21T12:49:53.896246+00:00", "EventTime": "2024-05-21T12:49:53.896273+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDscxT3B3bxr9uRTMh"], "accumulated_threat_level": 9.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "5cdcb95b-277c-4447-8d20-362ff2708dc9", "DetectTime": "2024-05-21T12:49:53.914399+00:00", "EventTime": "2024-05-21T12:49:53.914450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWzhp2XOhMt3W4rC3"], "accumulated_threat_level": 4.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "4f9cdc3b-cc47-4113-82e8-e5c9dacb3002", "DetectTime": "2024-05-21T12:49:53.927675+00:00", "EventTime": "2024-05-21T12:49:53.927696+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDsD7638zBz75rrjU2"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "03f5d9bc-7f05-4618-a9ae-3d42a7c4b598", "DetectTime": "2024-05-21T12:49:53.941929+00:00", "EventTime": "2024-05-21T12:49:53.941959+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDsD7638zBz75rrjU2"], "accumulated_threat_level": 10.0, "timewindow": 37} +{"Format": "IDEA0", "ID": "ae867fa2-c771-4bbd-9344-13a36a02103c", "DetectTime": "2024-05-21T12:49:53.967064+00:00", "EventTime": "2024-05-21T12:49:53.967101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJErWXBMkLRRXbPAg"], "accumulated_threat_level": 5.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "f610a959-170f-437f-8d56-0063c432b123", "DetectTime": "2024-05-21T12:49:53.980077+00:00", "EventTime": "2024-05-21T12:49:53.980097+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAVJK1fJtUPKIxyga"], "accumulated_threat_level": 0, "timewindow": 37} +{"Format": "IDEA0", "ID": "fe681091-364c-4842-a0e3-0e307b9360eb", "DetectTime": "2024-05-21T12:49:53.993949+00:00", "EventTime": "2024-05-21T12:49:53.993987+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAVJK1fJtUPKIxyga"], "accumulated_threat_level": 10.5, "timewindow": 37} +{"Format": "IDEA0", "ID": "aa642cfb-b5e6-4a56-a6ca-b5913a2a7f61", "DetectTime": "2024-05-21T12:49:54.109674+00:00", "EventTime": "2024-05-21T12:49:54.109711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["46.49.109.30"]}], "Attach": [{"Content": "Connection to unknown destination port 8649/UDP destination IP 46.49.109.30. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhCN322F14QcvxKaf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "b627db98-9f05-4994-89aa-303416ced4f6", "DetectTime": "2024-05-21T12:49:54.138473+00:00", "EventTime": "2024-05-21T12:49:54.138507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSAN24pA3Y1lkAqXf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "0d158bbe-58a6-49d1-a393-bde816861981", "DetectTime": "2024-05-21T12:49:54.374198+00:00", "EventTime": "2024-05-21T12:49:54.374219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClQckV3gJ7XAwrgBhi"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "58df9de4-c6fe-4729-ba29-a6f62076ea96", "DetectTime": "2024-05-21T12:49:54.425214+00:00", "EventTime": "2024-05-21T12:49:54.425232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdYptj6e5JZb8pt1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "ddd6ca48-7084-4cb1-917a-fc9421b93390", "DetectTime": "2024-05-21T12:49:54.469370+00:00", "EventTime": "2024-05-21T12:49:54.469388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzD6pr1jnP0u7shAWc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 165} +{"Format": "IDEA0", "ID": "0182c386-3e75-4b41-afcc-36071ad749a0", "DetectTime": "2024-05-21T12:49:54.520673+00:00", "EventTime": "2024-05-21T12:49:54.520692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRkrv1LeE7M9Tb1f3"], "accumulated_threat_level": 9.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "dbe08261-29f3-4e1c-8612-62c28211429e", "DetectTime": "2024-05-21T12:49:54.571475+00:00", "EventTime": "2024-05-21T12:49:54.571494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRiZN27DfanFc5Tz3"], "accumulated_threat_level": 10.4, "timewindow": 165} +{"Format": "IDEA0", "ID": "70e527cc-ebb7-4e98-a3c1-e6043a7d02c2", "DetectTime": "2024-05-21T12:49:54.635378+00:00", "EventTime": "2024-05-21T12:49:54.635396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiOHC4Mx0rxLjKJH4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 165} +{"Format": "IDEA0", "ID": "a8bdb7c4-383c-44a2-a2dd-0622ff36d6e7", "DetectTime": "2024-05-21T12:49:54.679146+00:00", "EventTime": "2024-05-21T12:49:54.679166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuAIl222wmXNq3Tx8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 165} +{"Format": "Json", "ID": "a8bdb7c4-383c-44a2-a2dd-0622ff36d6e7", "DetectTime": "2024-05-21T12:49:54.679146+00:00", "EventTime": "2024-05-21T12:49:54.679166+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-07T20:30:43.975042+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 165. (real time 2024/05/21 12:49:55.003746)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 165, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "619e9eca-7b03-49fa-966d-11c682e703ba", "DetectTime": "2024-05-21T12:49:55.007964+00:00", "EventTime": "2024-05-21T12:49:55.007983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeKd0w4ioNk09ukOVb"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "bad87697-d757-4e7a-9f6f-3222f8b7dd81", "DetectTime": "2024-05-21T12:49:55.019780+00:00", "EventTime": "2024-05-21T12:49:55.019811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0PtVn1jEGxIEynvVc"], "accumulated_threat_level": 0.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "7f46ed08-df41-4b7f-9d52-6c50fff87b15", "DetectTime": "2024-05-21T12:49:55.066689+00:00", "EventTime": "2024-05-21T12:49:55.066718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C07cpRFppjVPNpWEi"], "accumulated_threat_level": 1.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "4aff7f1e-b135-46ad-8a4e-36abd526d7bf", "DetectTime": "2024-05-21T12:49:55.115051+00:00", "EventTime": "2024-05-21T12:49:55.115076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzwGh19eV3G0HCPG7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 165} +{"Format": "IDEA0", "ID": "a7aad70b-f4f4-4a20-9e25-5ea0fa8c9972", "DetectTime": "2024-05-21T12:49:55.160870+00:00", "EventTime": "2024-05-21T12:49:55.160902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3aLGk2ZgG6rhAEFJg"], "accumulated_threat_level": 3.2, "timewindow": 165} +{"Format": "IDEA0", "ID": "d906b61d-4523-405e-a600-9f1059a8e294", "DetectTime": "2024-05-21T12:49:55.208915+00:00", "EventTime": "2024-05-21T12:49:55.208950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4K1241Z1VKw0KtK3"], "accumulated_threat_level": 4.0, "timewindow": 165} +{"Format": "IDEA0", "ID": "eb265021-6f95-4fea-8d8c-8de65d6deb2d", "DetectTime": "2024-05-21T12:49:55.260048+00:00", "EventTime": "2024-05-21T12:49:55.260085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czg6E42L8h4Onk3qi6"], "accumulated_threat_level": 4.8, "timewindow": 165} +{"Format": "IDEA0", "ID": "cef2eabb-9a6a-4263-8c61-2b991fac0d1e", "DetectTime": "2024-05-21T12:49:55.532712+00:00", "EventTime": "2024-05-21T12:49:55.532734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdieTU1D9EZH1CrhCg"], "accumulated_threat_level": 5.6, "timewindow": 165} +{"Format": "IDEA0", "ID": "4765c667-a1fc-46a5-bd80-8990d4796f53", "DetectTime": "2024-05-21T12:49:55.618363+00:00", "EventTime": "2024-05-21T12:49:55.618393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBY351y4Wz0dfpsg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "92bbb9be-56a3-447f-ae95-bc6bfec6efd7", "DetectTime": "2024-05-21T12:49:55.707900+00:00", "EventTime": "2024-05-21T12:49:55.707936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12CHZ3g3BivTEfUp7"], "accumulated_threat_level": 0.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f5819005-acfd-4510-8814-53dab97256b6", "DetectTime": "2024-05-21T12:49:55.762937+00:00", "EventTime": "2024-05-21T12:49:55.762970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCF544PJEyFUea0P9"], "accumulated_threat_level": 1.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "b7d82a1b-f8e2-452e-a8a4-1ab0cd95845a", "DetectTime": "2024-05-21T12:49:55.882975+00:00", "EventTime": "2024-05-21T12:49:55.883001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEis92p9p4RW47Hu6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 166} +{"Format": "IDEA0", "ID": "9dfd7f90-f882-45dc-99b2-a494159f7d65", "DetectTime": "2024-05-21T12:49:55.887801+00:00", "EventTime": "2024-05-21T12:49:55.887818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5JJ020bs8V7n5wKe"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "df03a6d4-ceb0-4e3f-8c9c-95b84b12748c", "DetectTime": "2024-05-21T12:49:55.968150+00:00", "EventTime": "2024-05-21T12:49:55.968171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC6r3o1BEx1Bed0mv"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "f4f20942-7e50-4d8d-98c5-7af6acdf1ca9", "DetectTime": "2024-05-21T12:49:56.368246+00:00", "EventTime": "2024-05-21T12:49:56.368276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CltLXynpLQoCTq3qb"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "1c5fd3dd-e7a9-4c23-8b80-2bbc56d59dba", "DetectTime": "2024-05-21T12:49:56.373329+00:00", "EventTime": "2024-05-21T12:49:56.373349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtqQoD1SJHJJxV5gl3"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "bbd0a9d1-84a7-4c2a-b2c7-3221819db6c0", "DetectTime": "2024-05-21T12:49:56.429630+00:00", "EventTime": "2024-05-21T12:49:56.429652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1BMkm4kEjMv0I2L2", "CSj6aq20srlYFCX8j7", "CLf7g53RT9kpok9BBi", "CVRUcy4Aw3gVuMr108"], "accumulated_threat_level": 0.5, "timewindow": 178} +{"Format": "IDEA0", "ID": "4ce37cd7-f2db-40fa-9c42-c8b8097ae1be", "DetectTime": "2024-05-21T12:49:56.513626+00:00", "EventTime": "2024-05-21T12:49:56.513647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtJoTdejF7hN0SpN9"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "ad7c0c1c-18a1-4d27-a0b0-cd6f5c44dadd", "DetectTime": "2024-05-21T12:49:56.520829+00:00", "EventTime": "2024-05-21T12:49:56.520850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8lUzz3IALENKg7Ylb"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "59407c68-caa9-4794-88d4-9a102585f74d", "DetectTime": "2024-05-21T12:49:56.526748+00:00", "EventTime": "2024-05-21T12:49:56.526770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsCUkiqirFaRiu8bf"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "a5ad61ef-3ae4-4b88-b92d-b5bf71e1698e", "DetectTime": "2024-05-21T12:49:56.606607+00:00", "EventTime": "2024-05-21T12:49:56.606629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co278a2jeYDFbwYnIa"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "38a30150-efac-4ab6-bbfd-bf59e1693d5b", "DetectTime": "2024-05-21T12:49:56.707767+00:00", "EventTime": "2024-05-21T12:49:56.707797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTUw14PeScT6Daql1"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "a564c370-f961-4e72-9b54-90833eee65a4", "DetectTime": "2024-05-21T12:49:56.973863+00:00", "EventTime": "2024-05-21T12:49:56.973885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGyzZr4SDMNUKuWm48"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "e957c975-d25b-4539-97aa-864c5f45d864", "DetectTime": "2024-05-21T12:49:57.001716+00:00", "EventTime": "2024-05-21T12:49:57.001746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXu11f4pPHgQMdmYvd"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "1ccfb67a-69e3-4b26-82d5-f1ea353f2ff4", "DetectTime": "2024-05-21T12:49:57.011788+00:00", "EventTime": "2024-05-21T12:49:57.011809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COIfKS3noo1714bGj1"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "18ccff7c-dd20-4157-b813-a226917bde83", "DetectTime": "2024-05-21T12:49:57.138342+00:00", "EventTime": "2024-05-21T12:49:57.138363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy4ALp1DjbSySIBNY9"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "203dae0e-bdcf-4e31-b780-977c07411137", "DetectTime": "2024-05-21T12:49:57.171157+00:00", "EventTime": "2024-05-21T12:49:57.171187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDrY51iYBwUD8omV5"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "4a1a46c0-20a9-44e9-b8c5-a4da7906a3ce", "DetectTime": "2024-05-21T12:49:57.176244+00:00", "EventTime": "2024-05-21T12:49:57.176262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpLaRy1RlCaRntYHUb"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "7647203a-fe2c-471d-87c6-6cf92679a420", "DetectTime": "2024-05-21T12:49:57.208437+00:00", "EventTime": "2024-05-21T12:49:57.208457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXqL04ATLlZmbrHn"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "5a98c875-afb5-4649-8110-b95f6e7f3e77", "DetectTime": "2024-05-21T12:49:57.574949+00:00", "EventTime": "2024-05-21T12:49:57.574969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmiX0p2YUOLidk4uX3"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "94c9830e-d90c-4dd3-a59b-02c614110ea5", "DetectTime": "2024-05-21T12:49:57.579907+00:00", "EventTime": "2024-05-21T12:49:57.579926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLIWhc3TJjMcddTkVc"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "634dc72d-4c76-452c-a3cc-8a4982a3ebb4", "DetectTime": "2024-05-21T12:49:57.637497+00:00", "EventTime": "2024-05-21T12:49:57.637518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYelqImv9nqNyCa6"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "21c27f47-5cc3-4278-938f-2f409737e22a", "DetectTime": "2024-05-21T12:49:57.659602+00:00", "EventTime": "2024-05-21T12:49:57.659621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0M0K1hBSx1tDzuS5"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "53c7c02e-2477-4014-ba3e-399f55b23434", "DetectTime": "2024-05-21T12:49:57.666110+00:00", "EventTime": "2024-05-21T12:49:57.666129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfazQ1CdMbAhFjuQd"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "6cc6846e-b886-42c3-90d7-564ea374af4a", "DetectTime": "2024-05-21T12:49:57.676884+00:00", "EventTime": "2024-05-21T12:49:57.676902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck8lfF1VHOVBFy5HO8"], "accumulated_threat_level": 5.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "778c18e0-fa5c-4663-878a-bdc6caf0c967", "DetectTime": "2024-05-21T12:49:57.832943+00:00", "EventTime": "2024-05-21T12:49:57.832961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjuRVHajc2EuL3s4i"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "e0af69e9-1826-4339-bba5-4092f3d7a17b", "DetectTime": "2024-05-21T12:49:57.838214+00:00", "EventTime": "2024-05-21T12:49:57.838234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6RMA1Fj2Gh2lfNWj"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "c9930d3f-e36d-4248-8cfd-e5c32b36cffa", "DetectTime": "2024-05-21T12:49:58.158227+00:00", "EventTime": "2024-05-21T12:49:58.158251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcLaHm2VC1HWAaA67h"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "187fd026-9930-4d79-b795-27a82c4f7d52", "DetectTime": "2024-05-21T12:49:58.181222+00:00", "EventTime": "2024-05-21T12:49:58.181244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C84lrK1nnrV97yNtk5"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "8cb72150-0413-4555-96ff-175a3111d2e1", "DetectTime": "2024-05-21T12:49:58.337223+00:00", "EventTime": "2024-05-21T12:49:58.337244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlK1P2PbbAVn9Q6C2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 166} +{"Format": "IDEA0", "ID": "f7e00cb7-157a-46a1-86e3-fc2b40fcfa90", "DetectTime": "2024-05-21T12:49:58.349277+00:00", "EventTime": "2024-05-21T12:49:58.349298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMMg04IzeD6htvLld"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "e7614fb9-d5e9-4b49-a566-0613facfe675", "DetectTime": "2024-05-21T12:49:58.353990+00:00", "EventTime": "2024-05-21T12:49:58.354009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXgtpnKn9ZqmkVH4g"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "2826884d-c327-418c-9e2f-37820f4848a9", "DetectTime": "2024-05-21T12:49:58.358686+00:00", "EventTime": "2024-05-21T12:49:58.358704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmf1G94hBORsPWINPd"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "94f60ca7-4e49-46bf-a42f-71d3aa6af8f9", "DetectTime": "2024-05-21T12:49:58.719346+00:00", "EventTime": "2024-05-21T12:49:58.719369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsA2r618z4ZxNbxRHk"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "e04f0302-38cc-45b8-9044-3b1dbf89159f", "DetectTime": "2024-05-21T12:49:58.746157+00:00", "EventTime": "2024-05-21T12:49:58.746181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZl9u35OiuAKF9r84"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "c6fc8a83-79f1-41f2-9bc9-b947f48a600b", "DetectTime": "2024-05-21T12:49:58.861412+00:00", "EventTime": "2024-05-21T12:49:58.861436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CluWUh4xEbivENEXW3"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "afaa29e1-3570-4ed5-8f36-15a62f782d6e", "DetectTime": "2024-05-21T12:49:58.880117+00:00", "EventTime": "2024-05-21T12:49:58.880139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccscf02dMWCRpyXbok"], "accumulated_threat_level": 7.199999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "67d6a18c-cb0b-4f85-9c0d-eb77c1c369de", "DetectTime": "2024-05-21T12:49:58.885451+00:00", "EventTime": "2024-05-21T12:49:58.885473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNu9p74eiHKL4dhDbl"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "d81fb86d-cc19-421b-8022-21a744e03987", "DetectTime": "2024-05-21T12:49:58.890225+00:00", "EventTime": "2024-05-21T12:49:58.890244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGaqD1dtKFIliK3F5"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "20602b02-c735-4818-898c-81e2bed4286f", "DetectTime": "2024-05-21T12:49:58.895792+00:00", "EventTime": "2024-05-21T12:49:58.895811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfycQT0mHiGydm0cd"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "90875687-6236-4637-ba6d-bbcd0e3562b0", "DetectTime": "2024-05-21T12:49:58.901099+00:00", "EventTime": "2024-05-21T12:49:58.901117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtJoP35kilW9k0hnj"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "2cd3a44a-d30a-4cd1-bd44-281ff26f7126", "DetectTime": "2024-05-21T12:49:59.374502+00:00", "EventTime": "2024-05-21T12:49:59.374523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8dFpvX5kLjFeUYJl"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "8b976734-a927-457c-b2db-995b5b5fb1d8", "DetectTime": "2024-05-21T12:49:59.498542+00:00", "EventTime": "2024-05-21T12:49:59.498563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COuUll1K8Wu5G9JGjj"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "30644897-9ab9-45a2-8704-46366f2862be", "DetectTime": "2024-05-21T12:49:59.643893+00:00", "EventTime": "2024-05-21T12:49:59.643910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HBOS2cZgGQ7ogHSl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "38730712-415a-4e4f-9b81-44ed3b2d313f", "DetectTime": "2024-05-21T12:49:59.653835+00:00", "EventTime": "2024-05-21T12:49:59.653856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0slsC3BvYVgScdz47"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "801ea805-bb0d-4a2d-8107-c8eb42f2a1e1", "DetectTime": "2024-05-21T12:49:59.720960+00:00", "EventTime": "2024-05-21T12:49:59.720979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COiUqRLHuvTXSSje5"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "d1b0ddb9-3ba7-4dcc-96b7-ff6d10500338", "DetectTime": "2024-05-21T12:50:00.056211+00:00", "EventTime": "2024-05-21T12:50:00.056232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiwQot1C5ysKQKm43e"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "f7a63b1d-f8a4-4e04-809f-1f6844361968", "DetectTime": "2024-05-21T12:50:00.061534+00:00", "EventTime": "2024-05-21T12:50:00.061552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVHHET1nRUPcvx9JO6"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "60773491-b524-4e46-8ff5-a31600635561", "DetectTime": "2024-05-21T12:50:00.090536+00:00", "EventTime": "2024-05-21T12:50:00.090562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLgosP3Ayl9D5f1Al"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "f2d22120-ece6-4b71-8e13-b09cc1c3b643", "DetectTime": "2024-05-21T12:50:00.095869+00:00", "EventTime": "2024-05-21T12:50:00.095889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg5u2e4V41cTfPoPU9"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "dd413bed-53cb-4e80-adba-2a07d8db2035", "DetectTime": "2024-05-21T12:50:00.155536+00:00", "EventTime": "2024-05-21T12:50:00.155559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYPAOO1WJGALhKDWJ9"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "72ade734-8039-49ca-af85-41eb5a699afc", "DetectTime": "2024-05-21T12:50:00.334942+00:00", "EventTime": "2024-05-21T12:50:00.334967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ2luN2yihF3xHfvBi"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "26d7c9d5-e90e-4446-909e-db9e2f2a0487", "DetectTime": "2024-05-21T12:50:00.340449+00:00", "EventTime": "2024-05-21T12:50:00.340468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEefkt3oWAK7mFR3F2"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "3304b50d-045f-49af-9b63-37f509357003", "DetectTime": "2024-05-21T12:50:00.361832+00:00", "EventTime": "2024-05-21T12:50:00.361855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1FSiPgiu5vuJfj9j"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "922df035-a93f-4732-8105-5d681985f15d", "DetectTime": "2024-05-21T12:50:00.609946+00:00", "EventTime": "2024-05-21T12:50:00.609965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWuHZI3k6GZw2QVCd5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "a77704f3-c411-400a-977b-8f12b6aa9f24", "DetectTime": "2024-05-21T12:50:00.628586+00:00", "EventTime": "2024-05-21T12:50:00.628610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CHH51qKUs0YEZcLc"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "7578f09b-2aed-4771-9dfd-1b2b30d648a9", "DetectTime": "2024-05-21T12:50:00.635112+00:00", "EventTime": "2024-05-21T12:50:00.635135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzwE3iXtKfQ82p1j"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "61a7f4e8-d328-4135-9936-0aa228066235", "DetectTime": "2024-05-21T12:50:00.640117+00:00", "EventTime": "2024-05-21T12:50:00.640137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpCJOc2lKbs6krLSBe"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "00126e06-3f91-483c-be8a-e354f81bdf89", "DetectTime": "2024-05-21T12:50:00.754321+00:00", "EventTime": "2024-05-21T12:50:00.754344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDReWD2U8tq2VKLng2"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "37086c70-75f3-4728-8313-08597346674c", "DetectTime": "2024-05-21T12:50:01.187320+00:00", "EventTime": "2024-05-21T12:50:01.187342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSb6wk4VXu73WKwAEd"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "e53bb4eb-f6ee-4f62-bcab-5954ab57a1b1", "DetectTime": "2024-05-21T12:50:01.229671+00:00", "EventTime": "2024-05-21T12:50:01.229693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVwa7o2DO3bTUd1OVe"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "fe22f1ee-9583-482c-855b-d0342f77ea96", "DetectTime": "2024-05-21T12:50:01.251226+00:00", "EventTime": "2024-05-21T12:50:01.251247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjEKqH2AKIEJdyMmg"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "f8248ccc-6356-4ff1-a8ba-b6893e46b0e5", "DetectTime": "2024-05-21T12:50:01.316583+00:00", "EventTime": "2024-05-21T12:50:01.316607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CejI62nx2hiBO3Rb3"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "1a9f5c62-2641-4de5-99d8-a033baadcc17", "DetectTime": "2024-05-21T12:50:01.410284+00:00", "EventTime": "2024-05-21T12:50:01.410316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CViojQ1W2mUtqr8bgf"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "ceccccbd-09c4-402e-98ea-c21d9b5b2cde", "DetectTime": "2024-05-21T12:50:01.416428+00:00", "EventTime": "2024-05-21T12:50:01.416449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQEE5k2qp0Ho3ZWej1"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "dd5d916a-e5cb-4f76-8139-121419c786bf", "DetectTime": "2024-05-21T12:50:01.421547+00:00", "EventTime": "2024-05-21T12:50:01.421566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLr4692NZRGhFXYL72"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "04c6cafd-33dd-4e77-85e9-25b2b44e09ce", "DetectTime": "2024-05-21T12:50:01.468539+00:00", "EventTime": "2024-05-21T12:50:01.468558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2t65y1uZtXTfBDwd5"], "accumulated_threat_level": 9.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "4937e9f2-3483-4c8e-9b47-d3c820079fad", "DetectTime": "2024-05-21T12:50:01.494652+00:00", "EventTime": "2024-05-21T12:50:01.494672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPA3Ph1RzrlPygWzOa"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "be175555-dbba-4f48-8591-5b2a1c3548f4", "DetectTime": "2024-05-21T12:50:01.844253+00:00", "EventTime": "2024-05-21T12:50:01.844277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COL88O2Tj8U7Pe3qTj"], "accumulated_threat_level": 5.6, "timewindow": 163} +{"Format": "IDEA0", "ID": "abad0681-2595-4204-ad20-51fa98cb7945", "DetectTime": "2024-05-21T12:50:01.906741+00:00", "EventTime": "2024-05-21T12:50:01.906763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDjgc2hEIlAJyaX2k"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "46a4d442-057d-46e6-9a38-02417034f071", "DetectTime": "2024-05-21T12:50:01.914075+00:00", "EventTime": "2024-05-21T12:50:01.914095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH3AHL1WDjJkDbXO3"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "be435bf8-9fe4-4478-9f5b-8e7edeb244c7", "DetectTime": "2024-05-21T12:50:01.988157+00:00", "EventTime": "2024-05-21T12:50:01.988178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvAOrq14b51Xlk9sF8"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "449fb5a4-e0a2-4df2-ab82-9e3a4275253c", "DetectTime": "2024-05-21T12:50:02.366444+00:00", "EventTime": "2024-05-21T12:50:02.366463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN51lM1XzjHWDJ4ab9", "CoCTsQ2epfNEnwwG67", "CL9N762Ae1bVxsUQ3l", "C9wVoj3v405lbATKEc"], "accumulated_threat_level": 1.0, "timewindow": 178} +{"Format": "IDEA0", "ID": "5b60f419-7aef-4b80-9662-18891c33c435", "DetectTime": "2024-05-21T12:50:02.447506+00:00", "EventTime": "2024-05-21T12:50:02.447529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbEOHA2Dx8ClmmUEff"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "d301867d-e73a-4922-8c60-39ff4e589fc5", "DetectTime": "2024-05-21T12:50:02.485775+00:00", "EventTime": "2024-05-21T12:50:02.485799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJPRGh1mOSYYeRbZ9"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "a561fe9f-f2f8-4259-96da-a17bfeda7731", "DetectTime": "2024-05-21T12:50:02.516652+00:00", "EventTime": "2024-05-21T12:50:02.516674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS8Mwt3D8yLk6382e"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "16e9daea-c621-4262-9436-33a60027f34a", "DetectTime": "2024-05-21T12:50:02.536315+00:00", "EventTime": "2024-05-21T12:50:02.536336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgNZna4Kl8Mslj3cSj"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "12a26f7a-109f-42ad-8f57-173707989cdc", "DetectTime": "2024-05-21T12:50:02.541581+00:00", "EventTime": "2024-05-21T12:50:02.541601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeL5k42HO6yUVMVyD"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "d2312c57-d72a-48ef-9bfa-1551f2e61fde", "DetectTime": "2024-05-21T12:50:02.602902+00:00", "EventTime": "2024-05-21T12:50:02.602933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEtcKs4LuzhHFOiiXc"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "1a7ae298-af4a-4809-bef7-d278c43cddcf", "DetectTime": "2024-05-21T12:50:02.618835+00:00", "EventTime": "2024-05-21T12:50:02.618856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcgVs16egh5anelO4"], "accumulated_threat_level": 10.4, "timewindow": 166} +{"Format": "IDEA0", "ID": "dc6bef7f-8b46-420a-8201-9e60abc607dd", "DetectTime": "2024-05-21T12:50:02.693598+00:00", "EventTime": "2024-05-21T12:50:02.693617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COCS472b9x4pSrSWx9"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "783b8688-e98e-4cc5-9563-14ffbf68f7b2", "DetectTime": "2024-05-21T12:50:02.700149+00:00", "EventTime": "2024-05-21T12:50:02.700168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqD6OUkMcGdiNh4Ai"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "b9eb8a11-ceb1-4702-a10f-6880e40209fb", "DetectTime": "2024-05-21T12:50:03.129014+00:00", "EventTime": "2024-05-21T12:50:03.129035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj421l2q5jOijucjtg"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "dbdf3d53-68db-40d0-95a1-7b6978cb2065", "DetectTime": "2024-05-21T12:50:03.181006+00:00", "EventTime": "2024-05-21T12:50:03.181027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLGKW14dMVXNEijUk1"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "b5935564-3de3-4740-bc73-528d34c6d11a", "DetectTime": "2024-05-21T12:50:03.250007+00:00", "EventTime": "2024-05-21T12:50:03.250029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck2qrT2xK0puEEitna"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "6f76af56-5bdb-49f2-a2ca-d681f4b8dc32", "DetectTime": "2024-05-21T12:50:03.329104+00:00", "EventTime": "2024-05-21T12:50:03.329127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMiTPA4uXENpVuwAh6"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "f3b9c1e4-4fb1-43f9-8b72-8b27b2318c1e", "DetectTime": "2024-05-21T12:50:03.389436+00:00", "EventTime": "2024-05-21T12:50:03.389457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEiAaB45MmtI2H3K0f"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "ec8a41e0-a11a-4a86-abbb-4669f4848086", "DetectTime": "2024-05-21T12:50:03.435839+00:00", "EventTime": "2024-05-21T12:50:03.435860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7xM6TzyEcjffB88"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "4c28e88f-279e-4ccc-a4a0-0c2a338c6993", "DetectTime": "2024-05-21T12:50:03.762339+00:00", "EventTime": "2024-05-21T12:50:03.762360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZxXi4flxQzNEExIh"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "3b960c26-b6f6-4bfc-a6f9-d6c8c993c88f", "DetectTime": "2024-05-21T12:50:03.816110+00:00", "EventTime": "2024-05-21T12:50:03.816130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35Qfy1cGJQ0wjdJMc"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "92b20ace-2253-46c0-8dc0-a0dad2508c6b", "DetectTime": "2024-05-21T12:50:03.846316+00:00", "EventTime": "2024-05-21T12:50:03.846337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC78znCuXgzcO9Xt9"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "7de179b4-0bd6-42d8-985e-348bd659a8a5", "DetectTime": "2024-05-21T12:50:03.876792+00:00", "EventTime": "2024-05-21T12:50:03.876812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpBSz84JLJmk9ZwQi"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "cb358ce0-b4d9-4f2c-96dc-2ada7d891b82", "DetectTime": "2024-05-21T12:50:03.884123+00:00", "EventTime": "2024-05-21T12:50:03.884143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR2k711hxZJMW9H0Ya"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "e155d704-ec60-4d3f-89fd-fb6f22a66d9f", "DetectTime": "2024-05-21T12:50:03.898236+00:00", "EventTime": "2024-05-21T12:50:03.898254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8aEQB4EiynNhucTH8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 166} +{"Format": "IDEA0", "ID": "35188270-d660-4ff1-80ac-8cbc4ee8b42b", "DetectTime": "2024-05-21T12:50:03.903020+00:00", "EventTime": "2024-05-21T12:50:03.903038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3APE61ZuG6k1ua4p8"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "047646f1-22c6-4e81-8dc2-90f3db49a8ce", "DetectTime": "2024-05-21T12:50:04.021494+00:00", "EventTime": "2024-05-21T12:50:04.021517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9rVu2j8axF5UWL62"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "cd268540-816b-454b-8d36-175b99aaab13", "DetectTime": "2024-05-21T12:50:04.332648+00:00", "EventTime": "2024-05-21T12:50:04.332668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CabkUk1O58fXSYRI3l"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "75c670ae-69cd-491e-90cd-f3d283b96c54", "DetectTime": "2024-05-21T12:50:04.337527+00:00", "EventTime": "2024-05-21T12:50:04.337547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKK3RZ3Fae7aQAFyYl"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "d0d1dd67-a8a4-473f-8460-def5a355d6f2", "DetectTime": "2024-05-21T12:50:04.347816+00:00", "EventTime": "2024-05-21T12:50:04.347836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnemP02Kk3ESikZmr2"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "9e2a4baa-276c-4a5f-b61b-416ecf1427ca", "DetectTime": "2024-05-21T12:50:04.352597+00:00", "EventTime": "2024-05-21T12:50:04.352616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct99061psQbJMpZ7jh"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "02abd858-20f6-4bb3-89a7-1acaa2b84434", "DetectTime": "2024-05-21T12:50:04.383235+00:00", "EventTime": "2024-05-21T12:50:04.383261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Q1j4264ykP1sw8l7"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "c76b2a95-358c-493d-8f2f-1c1047777cff", "DetectTime": "2024-05-21T12:50:04.447240+00:00", "EventTime": "2024-05-21T12:50:04.447261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaVSL3kz6gnOGAFvh"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "06b5cf03-3ce7-40f4-b1b7-5b11f0e7f09c", "DetectTime": "2024-05-21T12:50:04.953473+00:00", "EventTime": "2024-05-21T12:50:04.953493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW3ffK2vad1zohbh4e"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "0bc150d9-a419-47e7-b9c6-ffebfc9a407a", "DetectTime": "2024-05-21T12:50:04.975659+00:00", "EventTime": "2024-05-21T12:50:04.975680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpNGBu27xdaJxLJPD7"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "8764b3c7-2694-450a-9a6a-c23d7c572a52", "DetectTime": "2024-05-21T12:50:04.992413+00:00", "EventTime": "2024-05-21T12:50:04.992435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVMzv20dYv4GOBBsd"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "1cd1c601-49a0-47af-b14c-81f0d573ac8a", "DetectTime": "2024-05-21T12:50:04.999789+00:00", "EventTime": "2024-05-21T12:50:04.999810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kz2n1bcOTBlQhm6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "6c862a99-33c4-43e3-a743-6a059a886867", "DetectTime": "2024-05-21T12:50:05.375767+00:00", "EventTime": "2024-05-21T12:50:05.375789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9aVI3swSyaVaJZN5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "3c5e9094-a58a-43ec-bea3-cfb08b5ff748", "DetectTime": "2024-05-21T12:50:05.388674+00:00", "EventTime": "2024-05-21T12:50:05.388691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwzDpZ2XYHjbDIesHa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 166} +{"Format": "Json", "ID": "3c5e9094-a58a-43ec-bea3-cfb08b5ff748", "DetectTime": "2024-05-21T12:50:05.388674+00:00", "EventTime": "2024-05-21T12:50:05.388691+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "1970-01-07T21:00:52.710517+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2024/05/21 12:50:05.804021)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 166, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c3927153-2a04-4214-8468-c53a7264efb0", "DetectTime": "2024-05-21T12:50:05.808407+00:00", "EventTime": "2024-05-21T12:50:05.808426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRbi7a4flfTJXivRBh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "9b0bcdb3-e643-43ca-8e75-87afe9ddb10b", "DetectTime": "2024-05-21T12:50:05.813346+00:00", "EventTime": "2024-05-21T12:50:05.813364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCBojL2TQO4Zg8Vk42"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "3f7d5b0b-7c4a-4671-ac8a-fdfc00f3e2ae", "DetectTime": "2024-05-21T12:50:05.817823+00:00", "EventTime": "2024-05-21T12:50:05.817841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLZnxk3AQHtXw0BZd9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "1f689fa5-566e-4dd6-8a73-fb368328f919", "DetectTime": "2024-05-21T12:50:05.822216+00:00", "EventTime": "2024-05-21T12:50:05.822233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnweLu1KkZ89bjeKld"], "accumulated_threat_level": 4.0, "timewindow": 164} +{"Format": "IDEA0", "ID": "63d5897e-e1b3-4187-b027-860f93d38cac", "DetectTime": "2024-05-21T12:50:05.826850+00:00", "EventTime": "2024-05-21T12:50:05.826868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbbLK93ZRzDPwDtwkc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "2c8d6b01-f33a-4c54-af0f-6145883d75aa", "DetectTime": "2024-05-21T12:50:05.976131+00:00", "EventTime": "2024-05-21T12:50:05.976153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZqss28LT8cQqx3Ek"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "3b9b4240-ed31-46ee-9096-adb283184c00", "DetectTime": "2024-05-21T12:50:05.981573+00:00", "EventTime": "2024-05-21T12:50:05.981591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COhhqp20l7QeVPmOQe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "ea0aee92-1231-4770-9a1f-6721c0582f09", "DetectTime": "2024-05-21T12:50:05.986212+00:00", "EventTime": "2024-05-21T12:50:05.986230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg3yXc2r3Sp8erQ4E7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "071ca5ca-9b15-4ae4-9bf8-486a916e8c41", "DetectTime": "2024-05-21T12:50:06.039925+00:00", "EventTime": "2024-05-21T12:50:06.039947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakwFga1VfTc10qOe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "e808bfd0-a7f9-493d-b2b1-d908fa1e791d", "DetectTime": "2024-05-21T12:50:06.098985+00:00", "EventTime": "2024-05-21T12:50:06.099008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxZVwP1OabkFQrvjc7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "32f51a8e-be7a-4dfc-8f00-fa473b1802cb", "DetectTime": "2024-05-21T12:50:06.533803+00:00", "EventTime": "2024-05-21T12:50:06.533825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRFrE4WQmvwVijTJh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "21b1e2e5-19d8-49ab-a209-afb62bcedce6", "DetectTime": "2024-05-21T12:50:06.585850+00:00", "EventTime": "2024-05-21T12:50:06.585870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1owO2RCHBu26aez2"], "accumulated_threat_level": 0.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "54369b1f-a1aa-484a-91c0-8af89c65846b", "DetectTime": "2024-05-21T12:50:06.737959+00:00", "EventTime": "2024-05-21T12:50:06.737980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGas0Z2XSKGVjk1gck"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "1db75894-20ce-4a45-8659-aba1c51ed4c3", "DetectTime": "2024-05-21T12:50:06.854934+00:00", "EventTime": "2024-05-21T12:50:06.854955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMYKF4T8tMunmgk1k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "a0962820-f5ef-4342-80d9-ae8ab3ca2fd6", "DetectTime": "2024-05-21T12:50:06.870590+00:00", "EventTime": "2024-05-21T12:50:06.870612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7sfQ3oeGRqOJp8hj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "02f4834f-007a-4686-82f8-808eb09c7346", "DetectTime": "2024-05-21T12:50:06.892471+00:00", "EventTime": "2024-05-21T12:50:06.892494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGxor13CSSgfPcVPwe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "46125235-994b-4716-b8f3-73cfd69db597", "DetectTime": "2024-05-21T12:50:06.914699+00:00", "EventTime": "2024-05-21T12:50:06.914722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChDfvvb3qMZQdrU7k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "dd135562-6148-404b-a5d0-9ef8ecd44961", "DetectTime": "2024-05-21T12:50:06.920957+00:00", "EventTime": "2024-05-21T12:50:06.920977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnwvL2G4jA9dNvP49"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "7cd3e772-7a87-43a9-b5ac-b4e99558282d", "DetectTime": "2024-05-21T12:50:06.926691+00:00", "EventTime": "2024-05-21T12:50:06.926712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rvWE4TcNsqa04E89"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "f685060f-2f1b-47f6-b0c7-34bbcb9cff1c", "DetectTime": "2024-05-21T12:50:06.932528+00:00", "EventTime": "2024-05-21T12:50:06.932550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqojRcSFPbwWH3EH5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "8a611739-04f0-4a13-9c4c-fa712d237f29", "DetectTime": "2024-05-21T12:50:06.937232+00:00", "EventTime": "2024-05-21T12:50:06.937251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2UqerdbKVO29QdCi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "70ddfc8d-c7f2-4d30-9865-37d9412d5296", "DetectTime": "2024-05-21T12:50:06.942419+00:00", "EventTime": "2024-05-21T12:50:06.942441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJMNND2KLCVOwOr9nd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "e1a4248a-3f15-4677-a9c1-c035c2bef978", "DetectTime": "2024-05-21T12:50:06.947520+00:00", "EventTime": "2024-05-21T12:50:06.947542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKmEVu4Uv73QSydfja"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "67e3757b-8ba7-4449-8134-de525dcd794c", "DetectTime": "2024-05-21T12:50:06.979351+00:00", "EventTime": "2024-05-21T12:50:06.979373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qyaC1BsishmsxMxh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "7366d86a-6dda-49ed-883c-735eb270f795", "DetectTime": "2024-05-21T12:50:07.005627+00:00", "EventTime": "2024-05-21T12:50:07.005650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRJF9Z127PpIpY9gz8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "59f0d3b9-7372-47c1-ae47-ff57dc3c25a3", "DetectTime": "2024-05-21T12:50:07.261526+00:00", "EventTime": "2024-05-21T12:50:07.261547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS71vn3fJpKNS0PKai"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "c54a6708-fea9-4df8-b295-c85992fa811e", "DetectTime": "2024-05-21T12:50:07.721770+00:00", "EventTime": "2024-05-21T12:50:07.721812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc2f6M34rpW51HPua9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "21388e3b-59fe-47cf-9ee4-cfae003d6a61", "DetectTime": "2024-05-21T12:50:07.867610+00:00", "EventTime": "2024-05-21T12:50:07.867630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs43mV31LuuD4B1TMh"], "accumulated_threat_level": 1.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "2cb370d9-d270-4bfe-acd3-242b86dc9932", "DetectTime": "2024-05-21T12:50:08.032807+00:00", "EventTime": "2024-05-21T12:50:08.032829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEv3P1snOugwYXYX4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "cc2fdc32-8390-4470-8173-74657ffc35e6", "DetectTime": "2024-05-21T12:50:08.039846+00:00", "EventTime": "2024-05-21T12:50:08.039865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvkEQX91mTea3iJ"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "4f46f301-b07a-42f2-8ad5-39372542d534", "DetectTime": "2024-05-21T12:50:08.044456+00:00", "EventTime": "2024-05-21T12:50:08.044475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGQuja45wYASsmDfP3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "2fe2e50f-511e-4b6e-ad1e-7df42f1fa080", "DetectTime": "2024-05-21T12:50:08.054858+00:00", "EventTime": "2024-05-21T12:50:08.054881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3UKrD3FsVozrapiBj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "d7616d23-92e2-43c1-8ad5-0f7551dd693f", "DetectTime": "2024-05-21T12:50:08.059945+00:00", "EventTime": "2024-05-21T12:50:08.059963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmqlng2VNmpeZcx08g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "e8d4531e-2aa6-4d9e-b3f6-c1f13090dae4", "DetectTime": "2024-05-21T12:50:08.068750+00:00", "EventTime": "2024-05-21T12:50:08.068771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF32rk26pdGKcB9l67"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "ba4b18c5-97fa-4da5-8c46-04759a79d258", "DetectTime": "2024-05-21T12:50:08.092198+00:00", "EventTime": "2024-05-21T12:50:08.092219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVriPhneT1rga9w7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "be91429f-f5ff-4cde-a582-ef1dda0102b5", "DetectTime": "2024-05-21T12:50:08.155996+00:00", "EventTime": "2024-05-21T12:50:08.156014+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZGRl1IV8LItD00Y2"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "0cce8905-4beb-41a6-9d66-07b06d06a27f", "DetectTime": "2024-05-21T12:50:08.169960+00:00", "EventTime": "2024-05-21T12:50:08.169979+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZGRl1IV8LItD00Y2"], "accumulated_threat_level": 11.700000000000001, "timewindow": 38} +{"Format": "IDEA0", "ID": "e4e35b07-9e8c-4a34-833b-300e88da3b56", "DetectTime": "2024-05-21T12:50:08.347372+00:00", "EventTime": "2024-05-21T12:50:08.347396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVq2x92ZaKMAtgq7c3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "c61341c3-d980-4e46-b2d3-9d637e3fe233", "DetectTime": "2024-05-21T12:50:08.509213+00:00", "EventTime": "2024-05-21T12:50:08.509234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChdYZL2hzESc9MgD"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "4a3b7bbf-1d23-4ee9-b4c3-fe7adcdc8517", "DetectTime": "2024-05-21T12:50:08.549806+00:00", "EventTime": "2024-05-21T12:50:08.549826+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuDcx1fxVJL8S0hPc"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "305aeb91-eaa2-454e-bdf0-b877c44cf83d", "DetectTime": "2024-05-21T12:50:08.564031+00:00", "EventTime": "2024-05-21T12:50:08.564050+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzuDcx1fxVJL8S0hPc"], "accumulated_threat_level": 12.200000000000001, "timewindow": 38} +{"Format": "Json", "ID": "305aeb91-eaa2-454e-bdf0-b877c44cf83d", "DetectTime": "2024-05-21T12:50:08.564031+00:00", "EventTime": "2024-05-21T12:50:08.564050+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "1970-01-02T13:12:49.738420+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2024/05/21 12:50:08.999581)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000001, "timewindow": 38, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000001} +{"Format": "IDEA0", "ID": "22189f58-eb6a-4dda-94e4-478da69688e8", "DetectTime": "2024-05-21T12:50:09.006739+00:00", "EventTime": "2024-05-21T12:50:09.006759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU9r4DU9R5eNG4Lw6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "c50b60be-7abf-47ab-a313-3282886b95f4", "DetectTime": "2024-05-21T12:50:09.011444+00:00", "EventTime": "2024-05-21T12:50:09.011464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0z4R1AMaG0sQQnMg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "c29c8b4d-b0b2-47a8-b581-b2879f9edfeb", "DetectTime": "2024-05-21T12:50:09.016209+00:00", "EventTime": "2024-05-21T12:50:09.016229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfezULQbEUY85gikj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "f6720c21-af67-49e4-9fc4-91cd96a2a93d", "DetectTime": "2024-05-21T12:50:09.029104+00:00", "EventTime": "2024-05-21T12:50:09.029129+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbnm0m12MV48ENy7Di"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "55557855-8222-411e-b279-fbdfc3f541e3", "DetectTime": "2024-05-21T12:50:09.042674+00:00", "EventTime": "2024-05-21T12:50:09.042698+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbnm0m12MV48ENy7Di"], "accumulated_threat_level": 0.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "fbc4ec7a-ad3c-4418-b364-6afce4561482", "DetectTime": "2024-05-21T12:50:09.048059+00:00", "EventTime": "2024-05-21T12:50:09.048077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Carvmr4zLtzEEd1Qn4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "0fa740c9-2a23-48af-af03-40da5b1b4a7e", "DetectTime": "2024-05-21T12:50:09.062009+00:00", "EventTime": "2024-05-21T12:50:09.062032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QCfw43M4hyImLnkj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 166} +{"Format": "IDEA0", "ID": "52c2cde6-f313-4340-9c84-5828473224da", "DetectTime": "2024-05-21T12:50:09.067264+00:00", "EventTime": "2024-05-21T12:50:09.067285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUJfkw3ayFazPM2S75"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "3cc7e3c6-b650-479c-9272-6bdb41724efc", "DetectTime": "2024-05-21T12:50:09.151770+00:00", "EventTime": "2024-05-21T12:50:09.151796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcJ4sIsRCjTc7OSl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "66eed148-2a2f-4982-8575-532abe5c3d02", "DetectTime": "2024-05-21T12:50:09.157361+00:00", "EventTime": "2024-05-21T12:50:09.157381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrQBn43V7GwJ96Fkc6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "3d793c47-31d0-4040-a8cd-7304700d8626", "DetectTime": "2024-05-21T12:50:09.236022+00:00", "EventTime": "2024-05-21T12:50:09.236043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRWLUE2XSJ3zj9KrSd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "da0bc5ca-c1d7-42c1-9be2-7d903afc3a7a", "DetectTime": "2024-05-21T12:50:09.241253+00:00", "EventTime": "2024-05-21T12:50:09.241273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfTmssZc1sM3iIWkf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "e987ee8c-046f-4e43-b630-863be89da988", "DetectTime": "2024-05-21T12:50:09.546072+00:00", "EventTime": "2024-05-21T12:50:09.546099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czypas3qA1fQ3faHe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "dd8eb4c1-0449-40e4-840c-659b60cf4689", "DetectTime": "2024-05-21T12:50:09.656976+00:00", "EventTime": "2024-05-21T12:50:09.657000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWzhp2XOhMt3W4rC3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "9c9386db-e239-4f5d-8928-d71fdac25562", "DetectTime": "2024-05-21T12:50:09.708277+00:00", "EventTime": "2024-05-21T12:50:09.708301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJErWXBMkLRRXbPAg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "65c4deda-8dfa-4ebb-8d27-a2497237c56e", "DetectTime": "2024-05-21T12:50:09.834553+00:00", "EventTime": "2024-05-21T12:50:09.834575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9bgjF4BzT1qErZbR9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "5451132a-f23c-4c1a-a19d-09bf94aef109", "DetectTime": "2024-05-21T12:50:10.040564+00:00", "EventTime": "2024-05-21T12:50:10.040587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhCN322F14QcvxKaf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "ee3a5b0e-f018-41f4-acb9-22cfa4a6b0ec", "DetectTime": "2024-05-21T12:50:10.138305+00:00", "EventTime": "2024-05-21T12:50:10.138325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBjsd81whnRVgfjuT2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "69a18a8b-a181-4ed3-8af4-c54e1c2eb926", "DetectTime": "2024-05-21T12:50:10.154281+00:00", "EventTime": "2024-05-21T12:50:10.154302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSAN24pA3Y1lkAqXf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "47a91abd-2343-4848-aa19-776af582bfcf", "DetectTime": "2024-05-21T12:50:10.214546+00:00", "EventTime": "2024-05-21T12:50:10.214567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdL7IH3va8xkdJTos5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "42a90e94-a281-42aa-8af4-9e21877288fe", "DetectTime": "2024-05-21T12:50:10.242038+00:00", "EventTime": "2024-05-21T12:50:10.242064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRkrv1LeE7M9Tb1f3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "676ecbc4-c314-47fa-9780-728f04aec962", "DetectTime": "2024-05-21T12:50:10.266395+00:00", "EventTime": "2024-05-21T12:50:10.266448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzD6pr1jnP0u7shAWc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "b7f3ac18-063b-4e16-8a15-354cb27fadcd", "DetectTime": "2024-05-21T12:50:10.317697+00:00", "EventTime": "2024-05-21T12:50:10.317718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRDbLg1hBO7S9E3BJ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "56e2213c-7cc0-486e-996d-1aeb991f8ad8", "DetectTime": "2024-05-21T12:50:10.336568+00:00", "EventTime": "2024-05-21T12:50:10.336589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmdYptj6e5JZb8pt1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "2b4b3bf8-61d4-4c42-bed7-4787580c3976", "DetectTime": "2024-05-21T12:50:10.357123+00:00", "EventTime": "2024-05-21T12:50:10.357148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTW4UD2flDcOTF64Q9"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "0898c8dd-ea11-4930-a30d-8a37565d3e1c", "DetectTime": "2024-05-21T12:50:10.607113+00:00", "EventTime": "2024-05-21T12:50:10.607134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiOHC4Mx0rxLjKJH4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "5e318dee-daa0-4b20-840c-82792c46a64c", "DetectTime": "2024-05-21T12:50:10.667677+00:00", "EventTime": "2024-05-21T12:50:10.667700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRuAIl222wmXNq3Tx8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "85f44a82-f4fc-4fcb-b7f9-66750af8e3bb", "DetectTime": "2024-05-21T12:50:10.776669+00:00", "EventTime": "2024-05-21T12:50:10.776692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0PtVn1jEGxIEynvVc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "a4b9a9a7-b41b-4b83-932b-429988206efb", "DetectTime": "2024-05-21T12:50:10.781937+00:00", "EventTime": "2024-05-21T12:50:10.781957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRRiZN27DfanFc5Tz3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "d1ad0f25-bcd5-4c17-a909-9f276baf0c76", "DetectTime": "2024-05-21T12:50:10.787756+00:00", "EventTime": "2024-05-21T12:50:10.787779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAzwGh19eV3G0HCPG7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "bda1bd3d-4e33-4421-8362-88ed6c448512", "DetectTime": "2024-05-21T12:50:10.870228+00:00", "EventTime": "2024-05-21T12:50:10.870247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3aLGk2ZgG6rhAEFJg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "190eb0fa-ad3f-471d-b267-c2a4819f4cbf", "DetectTime": "2024-05-21T12:50:10.879828+00:00", "EventTime": "2024-05-21T12:50:10.879848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C07cpRFppjVPNpWEi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "213cbee7-a368-43e3-b128-cbd9afedac48", "DetectTime": "2024-05-21T12:50:11.304303+00:00", "EventTime": "2024-05-21T12:50:11.304327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr4K1241Z1VKw0KtK3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "78e775e4-4fec-4f76-85d4-f5d7ebeaed32", "DetectTime": "2024-05-21T12:50:11.341967+00:00", "EventTime": "2024-05-21T12:50:11.341990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdieTU1D9EZH1CrhCg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "9db68f6f-d607-443d-873d-f0b28d5365a0", "DetectTime": "2024-05-21T12:50:11.371684+00:00", "EventTime": "2024-05-21T12:50:11.371708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czg6E42L8h4Onk3qi6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "49403306-5ea6-4f98-a714-1158879cb872", "DetectTime": "2024-05-21T12:50:11.376648+00:00", "EventTime": "2024-05-21T12:50:11.376669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12CHZ3g3BivTEfUp7"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "bd1e01fd-5c7a-4c65-9f90-8268b49d23c3", "DetectTime": "2024-05-21T12:50:11.669320+00:00", "EventTime": "2024-05-21T12:50:11.669343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkCF544PJEyFUea0P9"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "ed8bf50d-6fd5-4221-8b1d-873252caf32f", "DetectTime": "2024-05-21T12:50:11.740330+00:00", "EventTime": "2024-05-21T12:50:11.740366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvo8c2Nj1zyRzGqpk"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "fb3b1e5a-79c1-40ef-aa21-34304d5c92c7", "DetectTime": "2024-05-21T12:50:11.817122+00:00", "EventTime": "2024-05-21T12:50:11.817142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEis92p9p4RW47Hu6"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "5029c381-c830-4878-8946-5ce6830d6336", "DetectTime": "2024-05-21T12:50:11.854632+00:00", "EventTime": "2024-05-21T12:50:11.854662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzBY351y4Wz0dfpsg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 165} +{"Format": "IDEA0", "ID": "cd10151c-4740-4f9e-8a7d-ebf7bad39a50", "DetectTime": "2024-05-21T12:50:12.097497+00:00", "EventTime": "2024-05-21T12:50:12.097519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CltLXynpLQoCTq3qb"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "e3e5ef5e-3672-45ee-bfac-52f864486942", "DetectTime": "2024-05-21T12:50:12.175355+00:00", "EventTime": "2024-05-21T12:50:12.175376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaTUw14PeScT6Daql1"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "8aa64237-e75d-4e85-9ee8-284494f2b8ba", "DetectTime": "2024-05-21T12:50:12.191651+00:00", "EventTime": "2024-05-21T12:50:12.191669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chs2L64nd6nQ8tVQb3"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "d21a0f80-bda6-454f-8f0a-9906237b29ec", "DetectTime": "2024-05-21T12:50:12.272506+00:00", "EventTime": "2024-05-21T12:50:12.272524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH78xC1pyoXCewInwj"], "accumulated_threat_level": 5.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "154a7303-3053-4a2f-8271-22c04c41039e", "DetectTime": "2024-05-21T12:50:12.316868+00:00", "EventTime": "2024-05-21T12:50:12.316887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR17Wm34KXsuiG0fKb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 166} +{"Format": "IDEA0", "ID": "cd49cfbb-aa43-495c-b7b5-e8a5490fad56", "DetectTime": "2024-05-21T12:50:12.375568+00:00", "EventTime": "2024-05-21T12:50:12.375586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9DQ12HYuT4AfplZ"], "accumulated_threat_level": 7.199999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "5f369c27-b8ac-4a0d-bc24-0310191477ae", "DetectTime": "2024-05-21T12:50:12.627462+00:00", "EventTime": "2024-05-21T12:50:12.627484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDrY51iYBwUD8omV5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "a084324e-f489-4f2c-b36e-5f2ca1cfad88", "DetectTime": "2024-05-21T12:50:12.677898+00:00", "EventTime": "2024-05-21T12:50:12.677921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Yyj12iMCGpSaWEh9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "d07351fe-e950-4ec8-8575-193ae92f2d39", "DetectTime": "2024-05-21T12:50:12.731389+00:00", "EventTime": "2024-05-21T12:50:12.731410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE7Vg417XNKP6MrmGe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "c26aaf49-33d3-4fcb-b22e-7a15ed9e0861", "DetectTime": "2024-05-21T12:50:12.781511+00:00", "EventTime": "2024-05-21T12:50:12.781530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C27KTK5yOoNcSXj73"], "accumulated_threat_level": 9.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "e4e32424-97bf-42cf-b84c-140021365194", "DetectTime": "2024-05-21T12:50:12.839907+00:00", "EventTime": "2024-05-21T12:50:12.839930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJWRA3iwRvlrP95z2"], "accumulated_threat_level": 10.4, "timewindow": 166} +{"Format": "IDEA0", "ID": "7d5b57a9-da4c-4332-acfe-b0a265975615", "DetectTime": "2024-05-21T12:50:12.891505+00:00", "EventTime": "2024-05-21T12:50:12.891524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORppRFdWhoB8aEek"], "accumulated_threat_level": 11.200000000000001, "timewindow": 166} +{"Format": "IDEA0", "ID": "a8147b63-6651-4ab1-a2e8-df771b97b4c9", "DetectTime": "2024-05-21T12:50:12.941821+00:00", "EventTime": "2024-05-21T12:50:12.941841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChzuVz1crvt8r1EeF5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 166} +{"Format": "Json", "ID": "a8147b63-6651-4ab1-a2e8-df771b97b4c9", "DetectTime": "2024-05-21T12:50:12.941821+00:00", "EventTime": "2024-05-21T12:50:12.941841+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-07T21:01:14.139698+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2024/05/21 12:50:13.114956)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 166, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9145bb02-8728-45bd-9c50-a85cdfb32ba4", "DetectTime": "2024-05-21T12:50:13.213615+00:00", "EventTime": "2024-05-21T12:50:13.213639+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck8lfF1VHOVBFy5HO8"], "accumulated_threat_level": 0, "timewindow": 166} +{"Format": "IDEA0", "ID": "932e17c0-99f4-4163-b054-6f0ffb50b8b9", "DetectTime": "2024-05-21T12:50:13.258555+00:00", "EventTime": "2024-05-21T12:50:13.258575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9Dqt4gn6ixgjDrj2"], "accumulated_threat_level": 0.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "76dce4f3-49e4-4f06-a262-512966f51aaa", "DetectTime": "2024-05-21T12:50:13.309638+00:00", "EventTime": "2024-05-21T12:50:13.309656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAVqT3Sh2FnLBO5m9"], "accumulated_threat_level": 1.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "91e2568b-2873-48ed-88a0-f04353776f04", "DetectTime": "2024-05-21T12:50:13.403574+00:00", "EventTime": "2024-05-21T12:50:13.403597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYzQhA2Pz9lL0TLigc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 166} +{"Format": "IDEA0", "ID": "ac49119c-04c9-476b-8259-5248537edce1", "DetectTime": "2024-05-21T12:50:13.512066+00:00", "EventTime": "2024-05-21T12:50:13.512085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoSOun3lTHUjrAL80d"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "b402c31a-f9a4-415f-8144-d06670c66cb2", "DetectTime": "2024-05-21T12:50:13.560506+00:00", "EventTime": "2024-05-21T12:50:13.560526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8QYJ339cqYOtHp05j"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "bab37d31-1cee-459c-b9b7-0aa75924e3ee", "DetectTime": "2024-05-21T12:50:13.850068+00:00", "EventTime": "2024-05-21T12:50:13.850089+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIlK1P2PbbAVn9Q6C2"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "9f92efe7-0a37-444c-94f8-a5f01d0be61a", "DetectTime": "2024-05-21T12:50:13.898465+00:00", "EventTime": "2024-05-21T12:50:13.898486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFw0S3AKMmvfIskh9"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "61a15ec9-53c3-44a5-a8be-a38e1d52bc45", "DetectTime": "2024-05-21T12:50:13.949381+00:00", "EventTime": "2024-05-21T12:50:13.949399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqomY2dBK8pUdOp8a"], "accumulated_threat_level": 5.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "0c2849fa-0d08-4959-9e9a-9516fd613063", "DetectTime": "2024-05-21T12:50:14.005195+00:00", "EventTime": "2024-05-21T12:50:14.005213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7S1I24Zcbw6wkSRt9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 166} +{"Format": "IDEA0", "ID": "c3da2f26-70e2-43bb-8bc1-16a864d850b9", "DetectTime": "2024-05-21T12:50:14.059809+00:00", "EventTime": "2024-05-21T12:50:14.059829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCz60u2hx5vJkGfhVh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "2a4f1430-7d17-4fca-a98c-27a933e21aae", "DetectTime": "2024-05-21T12:50:14.115236+00:00", "EventTime": "2024-05-21T12:50:14.115255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ki5Z16vC5zJsBQph"], "accumulated_threat_level": 7.999999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "c3cf53a9-2c05-414e-9906-8a526af0a4f0", "DetectTime": "2024-05-21T12:50:14.168039+00:00", "EventTime": "2024-05-21T12:50:14.168057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7nsW1hGmpY9mspdi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "c9cbf373-7b67-41f8-9f8f-4254ad3e72cf", "DetectTime": "2024-05-21T12:50:14.457229+00:00", "EventTime": "2024-05-21T12:50:14.457249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccscf02dMWCRpyXbok"], "accumulated_threat_level": 8.799999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "4cfd3da8-d584-4f0f-bac4-b868133e787f", "DetectTime": "2024-05-21T12:50:14.506953+00:00", "EventTime": "2024-05-21T12:50:14.506970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEBL3242Edd8NIMerf"], "accumulated_threat_level": 9.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "1aa339a6-c6a7-4190-84db-a9467fbfcb9a", "DetectTime": "2024-05-21T12:50:14.560974+00:00", "EventTime": "2024-05-21T12:50:14.560994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpWqJdt0gNHJDJHe"], "accumulated_threat_level": 10.4, "timewindow": 166} +{"Format": "IDEA0", "ID": "3dcc8ce9-43a0-4fd3-bee4-ecccef53cacc", "DetectTime": "2024-05-21T12:50:14.613512+00:00", "EventTime": "2024-05-21T12:50:14.613534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wZ983U8AbiMdxVP3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 166} +{"Format": "IDEA0", "ID": "344472f3-ad66-44f6-a5b9-eedc62df533e", "DetectTime": "2024-05-21T12:50:14.665581+00:00", "EventTime": "2024-05-21T12:50:14.665600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrZjH11BolnNcd7Vhb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 166} +{"Format": "Json", "ID": "344472f3-ad66-44f6-a5b9-eedc62df533e", "DetectTime": "2024-05-21T12:50:14.665581+00:00", "EventTime": "2024-05-21T12:50:14.665600+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-07T21:31:54.433476+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2024/05/21 12:50:14.864968)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 166, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ea3fb56e-8e8a-4870-b8a4-66bc6bc8a452", "DetectTime": "2024-05-21T12:50:14.878277+00:00", "EventTime": "2024-05-21T12:50:14.878310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuSQFR1nquU1LATI14"], "accumulated_threat_level": 0.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "958d7de5-ce2d-43b6-97eb-38c78d3a643f", "DetectTime": "2024-05-21T12:50:14.896574+00:00", "EventTime": "2024-05-21T12:50:14.896597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7d4GGVttNVacZGf"], "accumulated_threat_level": 1.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "74c27204-a3b1-4a1b-8f5e-6c5550795743", "DetectTime": "2024-05-21T12:50:14.909050+00:00", "EventTime": "2024-05-21T12:50:14.909071+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW265lWKOtMykfBR7"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "13d69516-a30d-47d9-a86d-30e40fcabd80", "DetectTime": "2024-05-21T12:50:14.922361+00:00", "EventTime": "2024-05-21T12:50:14.922385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW265lWKOtMykfBR7"], "accumulated_threat_level": 1.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "a8873f07-482d-43fa-be2f-88939a9d965c", "DetectTime": "2024-05-21T12:50:14.934864+00:00", "EventTime": "2024-05-21T12:50:14.934882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJU5CsimxSGuegDl"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "e4ccc375-f719-403a-be7e-b68ae7ddab62", "DetectTime": "2024-05-21T12:50:14.947912+00:00", "EventTime": "2024-05-21T12:50:14.947930+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJU5CsimxSGuegDl"], "accumulated_threat_level": 1.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "688cb6a1-1831-4a91-bdb2-4d67f2e1ad22", "DetectTime": "2024-05-21T12:50:14.959681+00:00", "EventTime": "2024-05-21T12:50:14.959699+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilOKp3uieivZTqys3"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "dcd21fa2-6acd-436d-b8ad-1d735686a511", "DetectTime": "2024-05-21T12:50:14.973462+00:00", "EventTime": "2024-05-21T12:50:14.973481+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CilOKp3uieivZTqys3"], "accumulated_threat_level": 2.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "566fe8e7-d74a-42e3-af4c-319ccd446ec4", "DetectTime": "2024-05-21T12:50:14.986083+00:00", "EventTime": "2024-05-21T12:50:14.986101+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOwxz3i5oPA0PKtj"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "1a5f1871-8c6f-4156-96d3-bc335331d1eb", "DetectTime": "2024-05-21T12:50:14.999075+00:00", "EventTime": "2024-05-21T12:50:14.999093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDOwxz3i5oPA0PKtj"], "accumulated_threat_level": 2.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "b7c7cae4-0305-464c-918b-43beb01c2ef3", "DetectTime": "2024-05-21T12:50:15.038266+00:00", "EventTime": "2024-05-21T12:50:15.038287+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChHChfUs8HlyheSm"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "300edea3-5d43-4e7a-996e-54ab095b2e8b", "DetectTime": "2024-05-21T12:50:15.052805+00:00", "EventTime": "2024-05-21T12:50:15.052827+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChHChfUs8HlyheSm"], "accumulated_threat_level": 3.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "571eccb7-541d-4395-a108-a74a0f3e7917", "DetectTime": "2024-05-21T12:50:15.063538+00:00", "EventTime": "2024-05-21T12:50:15.063556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YG0i21RXZSReK3mh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 166} +{"Format": "IDEA0", "ID": "77803bd9-16ba-4629-843d-aa9a4f95582d", "DetectTime": "2024-05-21T12:50:15.105075+00:00", "EventTime": "2024-05-21T12:50:15.105094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBNc8jXlCnNp9LB5"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "78d93ee8-3f0f-40c4-976b-00ed3cd48ea8", "DetectTime": "2024-05-21T12:50:15.146715+00:00", "EventTime": "2024-05-21T12:50:15.146736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6HBOS2cZgGQ7ogHSl"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "75a7f519-1a6c-4d91-90a4-f9c515c10a45", "DetectTime": "2024-05-21T12:50:15.196448+00:00", "EventTime": "2024-05-21T12:50:15.196471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEDoUstq5TWmYjjg"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "62e30a5f-e793-4882-8e73-e9e924d9b2a2", "DetectTime": "2024-05-21T12:50:15.325816+00:00", "EventTime": "2024-05-21T12:50:15.325836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6GK9kJ9oXUp5123"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f416df11-549d-4cd5-a915-b452e22d21c5", "DetectTime": "2024-05-21T12:50:15.386779+00:00", "EventTime": "2024-05-21T12:50:15.386797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUNIFVjVOx24nf35"], "accumulated_threat_level": 5.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "10a3c34e-8eed-4d46-973d-68a5b8661bf5", "DetectTime": "2024-05-21T12:50:15.439722+00:00", "EventTime": "2024-05-21T12:50:15.439739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoT513Tb1gSXNbzC5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 166} +{"Format": "IDEA0", "ID": "b4b0d4f0-1669-4a68-85ba-1a6c94b46153", "DetectTime": "2024-05-21T12:50:15.717575+00:00", "EventTime": "2024-05-21T12:50:15.717598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjxE71aXxDXvo9Rb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "db375b1d-f126-4fb5-ac8a-4a6a969f4b64", "DetectTime": "2024-05-21T12:50:15.768041+00:00", "EventTime": "2024-05-21T12:50:15.768072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUeEd32PU6AyFyF23"], "accumulated_threat_level": 7.999999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "ba84cee2-3fc6-4812-b285-7f86488806c9", "DetectTime": "2024-05-21T12:50:15.821714+00:00", "EventTime": "2024-05-21T12:50:15.821742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLe8mNaSAVnHXdWc8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 166} +{"Format": "IDEA0", "ID": "c3aca748-a38f-4ce6-826a-84f8bfeec1af", "DetectTime": "2024-05-21T12:50:15.882959+00:00", "EventTime": "2024-05-21T12:50:15.882993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkHkche5DpG7vtF72"], "accumulated_threat_level": 9.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "231ec410-df7e-4cfc-ad5e-65cef2cca6d8", "DetectTime": "2024-05-21T12:50:15.922124+00:00", "EventTime": "2024-05-21T12:50:15.922143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLT8BmBBzvSoA041"], "accumulated_threat_level": 10.4, "timewindow": 166} +{"Format": "IDEA0", "ID": "ee5b97e1-97cf-455d-a1c5-0c4d966712ad", "DetectTime": "2024-05-21T12:50:15.971317+00:00", "EventTime": "2024-05-21T12:50:15.971336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pgBXnLoS2sEKsV4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 166} +{"Format": "IDEA0", "ID": "5ab6a83a-d726-4efe-855e-a4c589cd3149", "DetectTime": "2024-05-21T12:50:16.022825+00:00", "EventTime": "2024-05-21T12:50:16.022847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6woZ3KDiqjFfCwQ3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 166} +{"Format": "Json", "ID": "5ab6a83a-d726-4efe-855e-a4c589cd3149", "DetectTime": "2024-05-21T12:50:16.022825+00:00", "EventTime": "2024-05-21T12:50:16.022847+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-07T21:31:57.966105+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 166. (real time 2024/05/21 12:50:16.254867)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 166, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "19eea1c5-a1bc-4c97-bc16-143bd273981b", "DetectTime": "2024-05-21T12:50:16.368908+00:00", "EventTime": "2024-05-21T12:50:16.368935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBrTv23bnBN2iKWQo7"], "accumulated_threat_level": 0.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "17ab01f3-3afc-4bd7-964a-64d67e93bd2b", "DetectTime": "2024-05-21T12:50:16.374382+00:00", "EventTime": "2024-05-21T12:50:16.374417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWuHZI3k6GZw2QVCd5"], "accumulated_threat_level": 0.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "504201f2-5dc4-4f47-878e-c3698335e973", "DetectTime": "2024-05-21T12:50:16.453787+00:00", "EventTime": "2024-05-21T12:50:16.453812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKHKN1XPuYOTtXKQd"], "accumulated_threat_level": 1.6, "timewindow": 166} +{"Format": "IDEA0", "ID": "af011a75-e173-4d80-ad36-75d57b3447b0", "DetectTime": "2024-05-21T12:50:16.504917+00:00", "EventTime": "2024-05-21T12:50:16.504937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEWnF4Tl1B1SCOfBh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 166} +{"Format": "IDEA0", "ID": "c30a62d3-3183-4346-84db-7e9700fecae4", "DetectTime": "2024-05-21T12:50:16.555098+00:00", "EventTime": "2024-05-21T12:50:16.555120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBk9mh42GxnkiryKH2"], "accumulated_threat_level": 3.2, "timewindow": 166} +{"Format": "IDEA0", "ID": "9e0e2d5d-5bbe-4703-a524-998aaef56bb8", "DetectTime": "2024-05-21T12:50:16.680428+00:00", "EventTime": "2024-05-21T12:50:16.680452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Qxe44x8M07KIz4Jc"], "accumulated_threat_level": 4.0, "timewindow": 166} +{"Format": "IDEA0", "ID": "e8d3c64c-dc28-48f9-a20e-cfb7d6c4208a", "DetectTime": "2024-05-21T12:50:16.768592+00:00", "EventTime": "2024-05-21T12:50:16.768613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9CXSF4QqUwpfsuTW6"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "29863848-5f62-4e04-9747-67f4b1606248", "DetectTime": "2024-05-21T12:50:17.003895+00:00", "EventTime": "2024-05-21T12:50:17.003914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKb39u2Uli38EGMyQ3"], "accumulated_threat_level": 0.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "50c9f038-67d9-4df6-be7d-1e3ec078dfe7", "DetectTime": "2024-05-21T12:50:17.056983+00:00", "EventTime": "2024-05-21T12:50:17.057014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMN19C3kmg3uQW3Qvb"], "accumulated_threat_level": 1.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "53f4bec5-7112-4011-bbae-cb9222c25825", "DetectTime": "2024-05-21T12:50:17.107964+00:00", "EventTime": "2024-05-21T12:50:17.107983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS4zJd3ZKyVQcAuQE8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 167} +{"Format": "IDEA0", "ID": "b271894a-b729-4a94-a5fa-6449cecc840b", "DetectTime": "2024-05-21T12:50:17.159056+00:00", "EventTime": "2024-05-21T12:50:17.159075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4j13N3ChsGXAmOWYk"], "accumulated_threat_level": 3.2, "timewindow": 167} +{"Format": "IDEA0", "ID": "3fd90456-8ba8-40b2-9d5a-f93e59bb2390", "DetectTime": "2024-05-21T12:50:17.209865+00:00", "EventTime": "2024-05-21T12:50:17.209883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJgZ63nZcRjMJxE43"], "accumulated_threat_level": 4.0, "timewindow": 167} +{"Format": "IDEA0", "ID": "118e96f4-661a-4de0-9977-fc7cf898fed4", "DetectTime": "2024-05-21T12:50:17.258984+00:00", "EventTime": "2024-05-21T12:50:17.259005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCpFw4vyRGNL5F6De"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "36fdaab3-65aa-4229-a561-9521b5bccc9d", "DetectTime": "2024-05-21T12:50:17.307458+00:00", "EventTime": "2024-05-21T12:50:17.307478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csehtc4sTnIzmY6E6"], "accumulated_threat_level": 5.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "750a2fee-b616-4cda-9cb5-bd5ef91605a9", "DetectTime": "2024-05-21T12:50:17.589729+00:00", "EventTime": "2024-05-21T12:50:17.589751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chll0l4KF7SB8ynCPd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 167} +{"Format": "IDEA0", "ID": "1f9553a0-b7f5-4e24-9229-4405a4cb16b7", "DetectTime": "2024-05-21T12:50:17.594825+00:00", "EventTime": "2024-05-21T12:50:17.594843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2t65y1uZtXTfBDwd5"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "8f80f6d8-aede-4b2e-8800-dd8b29c71097", "DetectTime": "2024-05-21T12:50:17.674026+00:00", "EventTime": "2024-05-21T12:50:17.674045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvimv2lDKhSez5iE3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "ac039b56-37ac-40b6-9072-e3f36d6284f3", "DetectTime": "2024-05-21T12:50:17.725856+00:00", "EventTime": "2024-05-21T12:50:17.725875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCogKCW2myvq0Dyi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "b2b542f3-84da-4fd6-ab6a-87acfd9c5988", "DetectTime": "2024-05-21T12:50:17.772965+00:00", "EventTime": "2024-05-21T12:50:17.772997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA9Bj2xZL374Rs4pd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "fd9e301c-5518-4df9-a750-ca78bbef664b", "DetectTime": "2024-05-21T12:50:17.825500+00:00", "EventTime": "2024-05-21T12:50:17.825534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzPJo9n3JNlQUVZU1"], "accumulated_threat_level": 9.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "66784ac9-8cbc-424c-a6ff-b0a6f7f932b8", "DetectTime": "2024-05-21T12:50:17.875416+00:00", "EventTime": "2024-05-21T12:50:17.875441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZVb5i28Mz35n6Cfc5"], "accumulated_threat_level": 10.4, "timewindow": 167} +{"Format": "IDEA0", "ID": "49d56c67-b9f1-493d-a0d6-f579270e318e", "DetectTime": "2024-05-21T12:50:18.100739+00:00", "EventTime": "2024-05-21T12:50:18.100758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipzrM1MyegUZ7drS"], "accumulated_threat_level": 11.200000000000001, "timewindow": 167} +{"Format": "IDEA0", "ID": "4d663137-b5dd-4405-b713-62a07cf1390f", "DetectTime": "2024-05-21T12:50:18.151216+00:00", "EventTime": "2024-05-21T12:50:18.151233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU598m3decCA281xcl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 167} +{"Format": "Json", "ID": "4d663137-b5dd-4405-b713-62a07cf1390f", "DetectTime": "2024-05-21T12:50:18.151216+00:00", "EventTime": "2024-05-21T12:50:18.151233+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-07T22:02:17.007093+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2024/05/21 12:50:18.315065)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 167, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e2050960-d35c-4062-b4ed-b564b0715cf0", "DetectTime": "2024-05-21T12:50:18.325770+00:00", "EventTime": "2024-05-21T12:50:18.325789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTj8Hq2IibrV07tlHi"], "accumulated_threat_level": 0.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "9ad3a5c6-c948-4ec2-a75e-9027618e37de", "DetectTime": "2024-05-21T12:50:18.336802+00:00", "EventTime": "2024-05-21T12:50:18.336819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7UvpQ3MMb5akpOaRj"], "accumulated_threat_level": 1.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "adae59b6-5d29-4ab6-8460-ae008ef0728a", "DetectTime": "2024-05-21T12:50:18.346984+00:00", "EventTime": "2024-05-21T12:50:18.347002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZjrOiidfn8cDcOb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 167} +{"Format": "IDEA0", "ID": "3420f555-ad64-4894-93d1-68e49d1c6f34", "DetectTime": "2024-05-21T12:50:18.363194+00:00", "EventTime": "2024-05-21T12:50:18.363211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj1C2P1FvdYECjlgI4"], "accumulated_threat_level": 3.2, "timewindow": 167} +{"Format": "IDEA0", "ID": "cc92a85a-7cb4-4229-9b51-69aa5e90f012", "DetectTime": "2024-05-21T12:50:18.455418+00:00", "EventTime": "2024-05-21T12:50:18.455437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxTRx372G99lIElcd"], "accumulated_threat_level": 4.0, "timewindow": 167} +{"Format": "IDEA0", "ID": "64ed151c-5795-4c5c-8ef1-2a191f5e15ae", "DetectTime": "2024-05-21T12:50:18.460606+00:00", "EventTime": "2024-05-21T12:50:18.460631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJcgVs16egh5anelO4"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "42e2844b-bc52-457d-a3f4-680fb291434d", "DetectTime": "2024-05-21T12:50:18.741344+00:00", "EventTime": "2024-05-21T12:50:18.741368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVCN4f3SVagmDNiLQe"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "c08ee243-c830-4241-8b56-dfddbc6222e9", "DetectTime": "2024-05-21T12:50:18.798913+00:00", "EventTime": "2024-05-21T12:50:18.798953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4y9K3klR9ebmvMx2"], "accumulated_threat_level": 5.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "fbe9383e-bef6-48ed-93b2-048fbe4ad5ee", "DetectTime": "2024-05-21T12:50:18.837573+00:00", "EventTime": "2024-05-21T12:50:18.837613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBu0B2u1NQxd67evf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 167} +{"Format": "IDEA0", "ID": "c838951b-2f68-4f07-9f56-9550326d8eb4", "DetectTime": "2024-05-21T12:50:18.889696+00:00", "EventTime": "2024-05-21T12:50:18.889736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNSvUf44DYd8SvI1ag"], "accumulated_threat_level": 7.199999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "77e037fa-476b-41c8-ab83-f0dd589df1a3", "DetectTime": "2024-05-21T12:50:18.938279+00:00", "EventTime": "2024-05-21T12:50:18.938317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2b6SR5xhvyvl4ay2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "c845134e-8a3a-439d-a06c-a77a83295012", "DetectTime": "2024-05-21T12:50:18.987680+00:00", "EventTime": "2024-05-21T12:50:18.987718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChnzH34ClnoZT0ckdg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "5fa4f1a8-6895-44de-b469-410e9cf490e7", "DetectTime": "2024-05-21T12:50:19.212326+00:00", "EventTime": "2024-05-21T12:50:19.212351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV8wd53f08eW7p15Cb"], "accumulated_threat_level": 9.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "60719584-058e-4fb5-88a5-a7c78c6430ac", "DetectTime": "2024-05-21T12:50:19.263409+00:00", "EventTime": "2024-05-21T12:50:19.263429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtQwle4Nwmjewc49Y8"], "accumulated_threat_level": 10.4, "timewindow": 167} +{"Format": "IDEA0", "ID": "396ccfcd-1454-4968-b2f7-1fca554a6ca3", "DetectTime": "2024-05-21T12:50:19.315195+00:00", "EventTime": "2024-05-21T12:50:19.315213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2R2xN1XEcsq3HL2L6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 167} +{"Format": "IDEA0", "ID": "0cd92deb-63b2-4dad-b469-9474790260df", "DetectTime": "2024-05-21T12:50:19.369757+00:00", "EventTime": "2024-05-21T12:50:19.369779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90JXM28RSdCMmUUBa"], "accumulated_threat_level": 12.000000000000002, "timewindow": 167} +{"Format": "Json", "ID": "0cd92deb-63b2-4dad-b469-9474790260df", "DetectTime": "2024-05-21T12:50:19.369757+00:00", "EventTime": "2024-05-21T12:50:19.369779+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-07T22:02:21.933806+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2024/05/21 12:50:19.546938)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 167, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "59cd518a-dbc4-40d3-b331-754f87769850", "DetectTime": "2024-05-21T12:50:19.559094+00:00", "EventTime": "2024-05-21T12:50:19.559113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfAuT2drv5BJXOPX1"], "accumulated_threat_level": 0.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "cc57c98e-675c-4692-a6de-6cf79b5d5f0e", "DetectTime": "2024-05-21T12:50:19.575953+00:00", "EventTime": "2024-05-21T12:50:19.575972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6q33vS2R9Y67yn"], "accumulated_threat_level": 1.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "a79cd24f-be71-4b8e-ac54-daea0cc8cf82", "DetectTime": "2024-05-21T12:50:19.659714+00:00", "EventTime": "2024-05-21T12:50:19.659733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VZia4Xy6cdqyiRR1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 167} +{"Format": "IDEA0", "ID": "934ac7d8-2d64-4026-9ccc-5494432e8c12", "DetectTime": "2024-05-21T12:50:19.931459+00:00", "EventTime": "2024-05-21T12:50:19.931482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8aEQB4EiynNhucTH8"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "460fbd89-5819-497e-843a-0a2876655569", "DetectTime": "2024-05-21T12:50:19.988877+00:00", "EventTime": "2024-05-21T12:50:19.988898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8Hqt3CxPoV2M92C3"], "accumulated_threat_level": 3.2, "timewindow": 167} +{"Format": "IDEA0", "ID": "27c735e4-8826-4f0e-be1f-ce5c7ba00636", "DetectTime": "2024-05-21T12:50:20.040193+00:00", "EventTime": "2024-05-21T12:50:20.040216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8lZr2azp2d3DfXxd"], "accumulated_threat_level": 4.0, "timewindow": 167} +{"Format": "IDEA0", "ID": "30698244-324b-4c1f-b541-689b42650cc3", "DetectTime": "2024-05-21T12:50:20.094668+00:00", "EventTime": "2024-05-21T12:50:20.094694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xL5I0QbktwpQqp6"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "ae8d04bf-8dc6-4d1d-b41b-e0018bd2ba7e", "DetectTime": "2024-05-21T12:50:20.148485+00:00", "EventTime": "2024-05-21T12:50:20.148507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVu4A1g2aceI4Hk0f"], "accumulated_threat_level": 5.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "40dcb4ee-6b31-4dcc-a681-00d90162cee7", "DetectTime": "2024-05-21T12:50:20.204822+00:00", "EventTime": "2024-05-21T12:50:20.204856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfVY4aTHujVQaJh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 167} +{"Format": "IDEA0", "ID": "c1dd74b1-3c80-4e0e-8278-9ec3832785a3", "DetectTime": "2024-05-21T12:50:20.257049+00:00", "EventTime": "2024-05-21T12:50:20.257072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0SUYj36AVBBRVocC1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "445616f8-189b-4eb1-838d-c17123e4e4d0", "DetectTime": "2024-05-21T12:50:20.536827+00:00", "EventTime": "2024-05-21T12:50:20.536851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GNig4E0zlksGA6Rg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "8faee900-21b7-4b03-b149-78a74f9e7687", "DetectTime": "2024-05-21T12:50:20.589557+00:00", "EventTime": "2024-05-21T12:50:20.589586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBzFRt3da8VDcKG6p2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "b8967cd9-ec88-4af3-8061-b856d4fedad8", "DetectTime": "2024-05-21T12:50:20.641157+00:00", "EventTime": "2024-05-21T12:50:20.641178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmcxd1137PWQ1otE9g"], "accumulated_threat_level": 9.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "77947793-aaf7-418c-bcc5-6a8095064898", "DetectTime": "2024-05-21T12:50:20.694237+00:00", "EventTime": "2024-05-21T12:50:20.694256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcU23b2Efdnw8dS5ua"], "accumulated_threat_level": 10.4, "timewindow": 167} +{"Format": "IDEA0", "ID": "9387c2c7-3a4c-46c4-9f91-13cde67c827a", "DetectTime": "2024-05-21T12:50:20.753457+00:00", "EventTime": "2024-05-21T12:50:20.753478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORg06RIOEZ2lTa9i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 167} +{"Format": "IDEA0", "ID": "386d6bd1-7bdf-4ba5-a6e8-173b59fe684b", "DetectTime": "2024-05-21T12:50:20.806952+00:00", "EventTime": "2024-05-21T12:50:20.806976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSwiQ3n0xwqlVOX1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 167} +{"Format": "Json", "ID": "386d6bd1-7bdf-4ba5-a6e8-173b59fe684b", "DetectTime": "2024-05-21T12:50:20.806952+00:00", "EventTime": "2024-05-21T12:50:20.806976+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-07T22:32:40.316057+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2024/05/21 12:50:20.994109)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 167, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e2b598f3-5d27-49ad-b323-74ceecbb3c6e", "DetectTime": "2024-05-21T12:50:21.010291+00:00", "EventTime": "2024-05-21T12:50:21.010310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87QGl3dBLiuI7tffj"], "accumulated_threat_level": 0.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "8a59e006-6cb6-4151-a62c-2721e192c5c7", "DetectTime": "2024-05-21T12:50:21.023196+00:00", "EventTime": "2024-05-21T12:50:21.023215+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d1mq4yPaPlVJdh43"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "3252f92b-1c3b-438d-9f5d-b7e90a97d0a3", "DetectTime": "2024-05-21T12:50:21.037734+00:00", "EventTime": "2024-05-21T12:50:21.037752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d1mq4yPaPlVJdh43"], "accumulated_threat_level": 3.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "4a27fd49-8c88-4716-84c9-94f127d3466d", "DetectTime": "2024-05-21T12:50:21.050170+00:00", "EventTime": "2024-05-21T12:50:21.050187+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkVjuA3z9crdvxfAi4"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "16261e3c-fd8f-411e-aa5c-e31e86833345", "DetectTime": "2024-05-21T12:50:21.063830+00:00", "EventTime": "2024-05-21T12:50:21.063853+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkVjuA3z9crdvxfAi4"], "accumulated_threat_level": 4.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "cb2c811f-aa94-4c97-9433-fdd4f8cc5140", "DetectTime": "2024-05-21T12:50:21.077675+00:00", "EventTime": "2024-05-21T12:50:21.077693+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYT4vbO1BmQFDaDU5"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "86086796-70de-4706-9397-ab40c06b02c1", "DetectTime": "2024-05-21T12:50:21.093352+00:00", "EventTime": "2024-05-21T12:50:21.093391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYT4vbO1BmQFDaDU5"], "accumulated_threat_level": 4.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "58414c69-57a0-4989-b303-1c45cdc6cc98", "DetectTime": "2024-05-21T12:50:21.124526+00:00", "EventTime": "2024-05-21T12:50:21.124546+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1nlyOQgXPvXbI4"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "bedb0019-9956-4e3e-8514-d7380f0adaef", "DetectTime": "2024-05-21T12:50:21.138001+00:00", "EventTime": "2024-05-21T12:50:21.138021+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1nlyOQgXPvXbI4"], "accumulated_threat_level": 5.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "a093fd6b-2e03-4569-a5c1-9eeac611d58f", "DetectTime": "2024-05-21T12:50:21.143140+00:00", "EventTime": "2024-05-21T12:50:21.143158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwzDpZ2XYHjbDIesHa"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "1171f066-fa59-4f12-a517-1d1547a97793", "DetectTime": "2024-05-21T12:50:21.181607+00:00", "EventTime": "2024-05-21T12:50:21.181634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tcfB2WWRigfIOSmc"], "accumulated_threat_level": 1.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "d3062692-a484-43ad-8b5c-a8ff93647837", "DetectTime": "2024-05-21T12:50:21.229131+00:00", "EventTime": "2024-05-21T12:50:21.229151+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybRbZ3anN9xFlF87f"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "da95ce48-b984-46e1-a6c0-3e8bb05fee87", "DetectTime": "2024-05-21T12:50:21.245043+00:00", "EventTime": "2024-05-21T12:50:21.245066+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CybRbZ3anN9xFlF87f"], "accumulated_threat_level": 5.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "2db9745d-4570-45aa-94cd-94c3a5eedca7", "DetectTime": "2024-05-21T12:50:21.262702+00:00", "EventTime": "2024-05-21T12:50:21.262726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJW2N1JhGzhqHFlIf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 167} +{"Format": "IDEA0", "ID": "8d26a08c-8574-45bb-b5ad-1d3021230112", "DetectTime": "2024-05-21T12:50:21.296283+00:00", "EventTime": "2024-05-21T12:50:21.296305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhDp7399jVDrs5DTl"], "accumulated_threat_level": 3.2, "timewindow": 167} +{"Format": "IDEA0", "ID": "6650bb60-50f0-4d9e-bffa-767b06dd6a4f", "DetectTime": "2024-05-21T12:50:21.348057+00:00", "EventTime": "2024-05-21T12:50:21.348082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1R9tF5YDrrdNLpqa"], "accumulated_threat_level": 4.0, "timewindow": 167} +{"Format": "IDEA0", "ID": "e02047c3-12e6-4f4f-aab2-ae9e68d929c8", "DetectTime": "2024-05-21T12:50:21.369008+00:00", "EventTime": "2024-05-21T12:50:21.369030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNTJb4kdap1i3DT3a"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "0cd1b240-f44c-43cb-854c-f901da8b6af1", "DetectTime": "2024-05-21T12:50:21.384573+00:00", "EventTime": "2024-05-21T12:50:21.384598+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNTJb4kdap1i3DT3a"], "accumulated_threat_level": 6.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "79c21ec9-2611-4dae-b3ff-e6d91ca0f23d", "DetectTime": "2024-05-21T12:50:21.410154+00:00", "EventTime": "2024-05-21T12:50:21.410172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQlxh1osm5pqpOluj"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "c67e241a-680f-4024-9753-d11a21d59051", "DetectTime": "2024-05-21T12:50:21.456024+00:00", "EventTime": "2024-05-21T12:50:21.456043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBOrgN2KnJgs4GpKld"], "accumulated_threat_level": 5.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "8e1642d3-1a3f-442b-8707-21039fcd71f1", "DetectTime": "2024-05-21T12:50:21.502578+00:00", "EventTime": "2024-05-21T12:50:21.502597+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eAHI1I7QCiESuVS6"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "c281714d-21ea-43c8-afab-1e530094e6d8", "DetectTime": "2024-05-21T12:50:21.515902+00:00", "EventTime": "2024-05-21T12:50:21.515923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1eAHI1I7QCiESuVS6"], "accumulated_threat_level": 6.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "702886ca-e0a4-4bbb-8efb-6bb86cea9407", "DetectTime": "2024-05-21T12:50:21.762828+00:00", "EventTime": "2024-05-21T12:50:21.762846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cootou2pEDngAcbG52"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 167} +{"Format": "IDEA0", "ID": "6e72caad-ef40-48d5-975b-076df6b4d340", "DetectTime": "2024-05-21T12:50:21.796526+00:00", "EventTime": "2024-05-21T12:50:21.796550+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROyRyWVEoFHDL226"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "ab2becb9-886c-4bcc-a264-6d80e3af508c", "DetectTime": "2024-05-21T12:50:21.810282+00:00", "EventTime": "2024-05-21T12:50:21.810316+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROyRyWVEoFHDL226"], "accumulated_threat_level": 7.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "1f95d4e8-3f5a-499e-9da6-9176622d82f8", "DetectTime": "2024-05-21T12:50:21.822348+00:00", "EventTime": "2024-05-21T12:50:21.822381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv9I7610U4uGBIwsw6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "ed266083-21b3-4243-8ae1-ea969173a396", "DetectTime": "2024-05-21T12:50:21.949373+00:00", "EventTime": "2024-05-21T12:50:21.949399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn1owO2RCHBu26aez2"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "169bb24a-4115-49c6-beeb-30a90c76bc3e", "DetectTime": "2024-05-21T12:50:22.000805+00:00", "EventTime": "2024-05-21T12:50:22.000826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAiTiHoOUXiRW8NAb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "fd7082ce-a853-41a6-9ac7-d8e3af45ad3d", "DetectTime": "2024-05-21T12:50:22.047235+00:00", "EventTime": "2024-05-21T12:50:22.047254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcYCo2mFA1mX1zqD4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 167} +{"Format": "IDEA0", "ID": "f2787c00-e4b8-40dc-a79f-c04aad6d7982", "DetectTime": "2024-05-21T12:50:22.100441+00:00", "EventTime": "2024-05-21T12:50:22.100462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUES6X2gJCzokv1391"], "accumulated_threat_level": 9.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "2f89c9d9-7bb3-46c5-b841-053571fa65db", "DetectTime": "2024-05-21T12:50:22.152881+00:00", "EventTime": "2024-05-21T12:50:22.152901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAV44o1TtE01bxseC"], "accumulated_threat_level": 10.4, "timewindow": 167} +{"Format": "IDEA0", "ID": "39dbfc2e-b205-44da-99a6-097070110bc2", "DetectTime": "2024-05-21T12:50:22.455402+00:00", "EventTime": "2024-05-21T12:50:22.455423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnrrYC4wyrqEayMY52"], "accumulated_threat_level": 11.200000000000001, "timewindow": 167} +{"Format": "IDEA0", "ID": "de5ce75f-7ee9-4e32-a29a-2cc0663acb45", "DetectTime": "2024-05-21T12:50:22.512923+00:00", "EventTime": "2024-05-21T12:50:22.512943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSN8p1Xlxk34OH02b"], "accumulated_threat_level": 12.000000000000002, "timewindow": 167} +{"Format": "Json", "ID": "de5ce75f-7ee9-4e32-a29a-2cc0663acb45", "DetectTime": "2024-05-21T12:50:22.512923+00:00", "EventTime": "2024-05-21T12:50:22.512943+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-07T22:32:43.711543+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 167. (real time 2024/05/21 12:50:22.956614)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 167, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cba894f1-e502-403c-a784-fec3755a2faf", "DetectTime": "2024-05-21T12:50:22.968789+00:00", "EventTime": "2024-05-21T12:50:22.968807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAN4y16PL7hfXmsW9"], "accumulated_threat_level": 0.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "b3b03ec6-d1e7-489d-9729-721b0485b199", "DetectTime": "2024-05-21T12:50:22.980123+00:00", "EventTime": "2024-05-21T12:50:22.980143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cCd41RtKz2trNsy2"], "accumulated_threat_level": 1.6, "timewindow": 167} +{"Format": "IDEA0", "ID": "cc2bd7f4-e700-44e2-989d-692d3b7554c7", "DetectTime": "2024-05-21T12:50:22.992089+00:00", "EventTime": "2024-05-21T12:50:22.992107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGTb17FqCCj2uJp1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 167} +{"Format": "IDEA0", "ID": "2cd77e5e-d141-4c92-a5bb-62fe897617fc", "DetectTime": "2024-05-21T12:50:23.004262+00:00", "EventTime": "2024-05-21T12:50:23.004283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZVAVn43ru5vEvyok5"], "accumulated_threat_level": 3.2, "timewindow": 167} +{"Format": "IDEA0", "ID": "7e34d7d5-2b9f-4653-8f7d-ebf84a1733e5", "DetectTime": "2024-05-21T12:50:23.016985+00:00", "EventTime": "2024-05-21T12:50:23.017007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNrcLo2lVkQtuvjXg6"], "accumulated_threat_level": 4.0, "timewindow": 167} +{"Format": "IDEA0", "ID": "0b58718e-a020-41a9-9a83-93e33ea0f6fe", "DetectTime": "2024-05-21T12:50:23.089533+00:00", "EventTime": "2024-05-21T12:50:23.089551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfYh33g0TuEfcpxzf"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "105099e3-f479-4c37-853b-3e46358a8f4e", "DetectTime": "2024-05-21T12:50:23.176169+00:00", "EventTime": "2024-05-21T12:50:23.176190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cug2JJ16rbfcJykCrg"], "accumulated_threat_level": 0.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "7b594e89-1a41-4063-accc-01eb1744716a", "DetectTime": "2024-05-21T12:50:23.227010+00:00", "EventTime": "2024-05-21T12:50:23.227030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJmks27qD4LhIwIu5"], "accumulated_threat_level": 1.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "f890d6bf-4837-407a-afa9-8629de0e60fb", "DetectTime": "2024-05-21T12:50:23.278211+00:00", "EventTime": "2024-05-21T12:50:23.278229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9U0U1VfyfcM9k6s1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 168} +{"Format": "IDEA0", "ID": "b5a971cb-add0-4917-9841-b9400ef09fcf", "DetectTime": "2024-05-21T12:50:23.330992+00:00", "EventTime": "2024-05-21T12:50:23.331012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjnHl3LYCj3RcvjLj"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "223ceafb-5020-4798-818a-ac7ddd746eea", "DetectTime": "2024-05-21T12:50:23.372782+00:00", "EventTime": "2024-05-21T12:50:23.372801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs43mV31LuuD4B1TMh"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "2011aebc-8492-4c5e-9602-6f5f26f2161a", "DetectTime": "2024-05-21T12:50:23.495107+00:00", "EventTime": "2024-05-21T12:50:23.495128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cediin11ZchqiDfFN1"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "62dbb03b-964b-43e3-9bf3-1f246189b2c8", "DetectTime": "2024-05-21T12:50:23.774167+00:00", "EventTime": "2024-05-21T12:50:23.774187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clyb602POo1dB0UXbk"], "accumulated_threat_level": 4.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "40ad8008-1e0f-4e9b-8916-6b5af5f423c9", "DetectTime": "2024-05-21T12:50:23.821385+00:00", "EventTime": "2024-05-21T12:50:23.821402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qpL74Qu3FFw6p0A3"], "accumulated_threat_level": 5.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "acdc45bc-8b06-4a0a-bdea-7042a4b3fb1a", "DetectTime": "2024-05-21T12:50:23.869168+00:00", "EventTime": "2024-05-21T12:50:23.869189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvYRQ33YD27T8Bro7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 168} +{"Format": "IDEA0", "ID": "df4cae19-fe9b-4cbf-8441-ef71f0d98182", "DetectTime": "2024-05-21T12:50:23.916236+00:00", "EventTime": "2024-05-21T12:50:23.916254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cku4XxldGDKotossl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "8259668c-6743-45de-a605-b604a10f273e", "DetectTime": "2024-05-21T12:50:23.969681+00:00", "EventTime": "2024-05-21T12:50:23.969700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7KdrF4l1nOxur2b11"], "accumulated_threat_level": 7.999999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "5e2a5509-9f0b-476b-a297-e91438b6e6ae", "DetectTime": "2024-05-21T12:50:24.025887+00:00", "EventTime": "2024-05-21T12:50:24.025906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbCsTj2NHnaUrMvngk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "2920147e-d1d9-4acd-a5ef-97d7a96fba92", "DetectTime": "2024-05-21T12:50:24.071980+00:00", "EventTime": "2024-05-21T12:50:24.071999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZqb23kkOfoOuqjDk"], "accumulated_threat_level": 9.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "ecb60fc5-c45f-4a17-b7f5-04a7e0aca8f2", "DetectTime": "2024-05-21T12:50:24.367196+00:00", "EventTime": "2024-05-21T12:50:24.367217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7azsFblYS7XH9Cba"], "accumulated_threat_level": 10.4, "timewindow": 168} +{"Format": "IDEA0", "ID": "fad85da2-827e-43fa-af0d-bf4eb2554871", "DetectTime": "2024-05-21T12:50:24.415027+00:00", "EventTime": "2024-05-21T12:50:24.415046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKb7EV24uzQrkyzhFa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 168} +{"Format": "IDEA0", "ID": "006e79c9-e4c0-42ff-bce7-4dbc6ab1fe38", "DetectTime": "2024-05-21T12:50:24.462922+00:00", "EventTime": "2024-05-21T12:50:24.462943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZP2A2HE7RyI4tLRc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 168} +{"Format": "Json", "ID": "006e79c9-e4c0-42ff-bce7-4dbc6ab1fe38", "DetectTime": "2024-05-21T12:50:24.462922+00:00", "EventTime": "2024-05-21T12:50:24.462943+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-07T23:02:51.313694+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2024/05/21 12:50:24.639806)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 168, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "431ac622-fb4d-4434-b5b0-4d714aab514d", "DetectTime": "2024-05-21T12:50:24.653422+00:00", "EventTime": "2024-05-21T12:50:24.653444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZFiEv39h1KMh2N7eb"], "accumulated_threat_level": 0.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "7d4d3bb7-7681-47bd-aa7c-a96ee829b7cb", "DetectTime": "2024-05-21T12:50:24.667098+00:00", "EventTime": "2024-05-21T12:50:24.667117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoSWlO3F2Hq8MYUNR1"], "accumulated_threat_level": 1.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "21bcc53b-483d-4ce0-a6a7-667a5c701f71", "DetectTime": "2024-05-21T12:50:24.678883+00:00", "EventTime": "2024-05-21T12:50:24.678903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QCfw43M4hyImLnkj"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "ce9ef84a-cc0a-4633-b3fa-c66f257f57a5", "DetectTime": "2024-05-21T12:50:24.696431+00:00", "EventTime": "2024-05-21T12:50:24.696453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOkLY3VcInqvNqVA7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 168} +{"Format": "IDEA0", "ID": "416c56b2-6e21-4ea1-ab1e-5e093bca583a", "DetectTime": "2024-05-21T12:50:24.955615+00:00", "EventTime": "2024-05-21T12:50:24.955636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUm191oL61sCFlNBd"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "e74cd692-2f4d-4ccc-a744-0a77041bc254", "DetectTime": "2024-05-21T12:50:25.011996+00:00", "EventTime": "2024-05-21T12:50:25.012013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0frcM3GtkczpfenYj"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "ce3ac8dd-99b6-4da2-9851-62bbf5e13b67", "DetectTime": "2024-05-21T12:50:25.054899+00:00", "EventTime": "2024-05-21T12:50:25.054921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5IKvo4NwTadE3GjZ2"], "accumulated_threat_level": 4.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "e98289ad-e1d6-437a-8424-b916b8329638", "DetectTime": "2024-05-21T12:50:25.104308+00:00", "EventTime": "2024-05-21T12:50:25.104329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClsutA3LjdLaUDunyd"], "accumulated_threat_level": 5.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "6a0f2998-977e-45a6-a3ca-f1a6661b5328", "DetectTime": "2024-05-21T12:50:25.140021+00:00", "EventTime": "2024-05-21T12:50:25.140041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnRxk34jBsoArHOoOl"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "6ce0dd9d-1c77-4de1-a146-361934c45105", "DetectTime": "2024-05-21T12:50:25.303604+00:00", "EventTime": "2024-05-21T12:50:25.303633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiLx9NcUGqHglIvj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 168} +{"Format": "IDEA0", "ID": "71ad7dd5-1bc1-4eba-8eeb-f1e0c4a4db19", "DetectTime": "2024-05-21T12:50:25.329415+00:00", "EventTime": "2024-05-21T12:50:25.329436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoT8TK3g6PU6OdZ4Kh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "b03c2bbe-b621-4fe2-ab04-7aa3155a2f61", "DetectTime": "2024-05-21T12:50:25.551198+00:00", "EventTime": "2024-05-21T12:50:25.551215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYIzkn1Bvtwssh8Yy6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "2e19821c-3dd0-4182-be8c-4f9bad905070", "DetectTime": "2024-05-21T12:50:25.600123+00:00", "EventTime": "2024-05-21T12:50:25.600143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ4gx03ZCdIasW18yj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "ba3ed039-56b1-4a7f-9206-80d10457c78d", "DetectTime": "2024-05-21T12:50:25.650242+00:00", "EventTime": "2024-05-21T12:50:25.650262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYQaa39cAt8Odfc06"], "accumulated_threat_level": 9.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "03fc616e-cbc1-4f2e-9e12-da68628d09a3", "DetectTime": "2024-05-21T12:50:25.718868+00:00", "EventTime": "2024-05-21T12:50:25.718886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56PHG2MOZItGZzDYf"], "accumulated_threat_level": 10.4, "timewindow": 168} +{"Format": "IDEA0", "ID": "fb4d9520-8895-4359-82ab-15977e99b913", "DetectTime": "2024-05-21T12:50:25.769365+00:00", "EventTime": "2024-05-21T12:50:25.769382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwulV7kmYNMuyNCi9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 168} +{"Format": "IDEA0", "ID": "3ec55488-149e-4fd2-86bc-82804f40686f", "DetectTime": "2024-05-21T12:50:25.818988+00:00", "EventTime": "2024-05-21T12:50:25.819010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COzyxN2LhZ6ZveMGZ7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 168} +{"Format": "Json", "ID": "3ec55488-149e-4fd2-86bc-82804f40686f", "DetectTime": "2024-05-21T12:50:25.818988+00:00", "EventTime": "2024-05-21T12:50:25.819010+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-07T23:03:10.540154+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2024/05/21 12:50:25.989799)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 168, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "47721973-9180-4d0e-b527-85f62cd0b825", "DetectTime": "2024-05-21T12:50:26.001381+00:00", "EventTime": "2024-05-21T12:50:26.001412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB0NfQ3hvH2QMxwtXg"], "accumulated_threat_level": 0.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "270b7e81-48fc-4c19-b508-ea583b2365bc", "DetectTime": "2024-05-21T12:50:26.126463+00:00", "EventTime": "2024-05-21T12:50:26.126498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5re7s41JU2Zj1cae7"], "accumulated_threat_level": 1.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "b342dbe3-0e2a-4a34-9add-0b521fdd2711", "DetectTime": "2024-05-21T12:50:26.166253+00:00", "EventTime": "2024-05-21T12:50:26.166278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTW4UD2flDcOTF64Q9"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "875915ba-82c2-43ca-b993-0a6a49e6e9ef", "DetectTime": "2024-05-21T12:50:26.224152+00:00", "EventTime": "2024-05-21T12:50:26.224192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAbQk3eQfViTIFkkd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 168} +{"Format": "IDEA0", "ID": "bd13d232-d5c2-49dc-ad53-dfb6cfe256a1", "DetectTime": "2024-05-21T12:50:26.279455+00:00", "EventTime": "2024-05-21T12:50:26.279476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvrkL3LrGzrrqEtCd"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "788d1d06-6c5a-435f-8ab9-23398e8b3990", "DetectTime": "2024-05-21T12:50:26.323184+00:00", "EventTime": "2024-05-21T12:50:26.323207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWgNt1FhofaY7bO52"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "e9183780-7f48-4eda-9a59-bf742ef71cf9", "DetectTime": "2024-05-21T12:50:26.373527+00:00", "EventTime": "2024-05-21T12:50:26.373546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktWvlyZsBMSNkY7i"], "accumulated_threat_level": 4.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "c1edddd7-6a87-4d5f-a987-7575889b2d08", "DetectTime": "2024-05-21T12:50:26.428417+00:00", "EventTime": "2024-05-21T12:50:26.428438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7phto1JZWgQPsbcj7"], "accumulated_threat_level": 5.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "6e0cece7-cd78-410f-ab57-fe7fbc337708", "DetectTime": "2024-05-21T12:50:26.704224+00:00", "EventTime": "2024-05-21T12:50:26.704243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAJiA3AdC8l8hemm7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 168} +{"Format": "IDEA0", "ID": "0188ed9f-0e66-42fd-aed1-d440017fd6c1", "DetectTime": "2024-05-21T12:50:26.752804+00:00", "EventTime": "2024-05-21T12:50:26.752824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCH3xS3Bs3f6vDE3Si"], "accumulated_threat_level": 7.199999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "5c1adfc7-3fc7-43f4-9027-48b4be318513", "DetectTime": "2024-05-21T12:50:26.802700+00:00", "EventTime": "2024-05-21T12:50:26.802719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNa5M1qdlajgmWHs2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "60f86ec0-e255-4113-b372-0ba53e148c43", "DetectTime": "2024-05-21T12:50:26.853991+00:00", "EventTime": "2024-05-21T12:50:26.854026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNC9F41rKekbkOybC"], "accumulated_threat_level": 8.799999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "39cfb676-7231-432e-96cb-3dd4897be8e0", "DetectTime": "2024-05-21T12:50:26.901644+00:00", "EventTime": "2024-05-21T12:50:26.901680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74a8GQ9BX6oGDOC9"], "accumulated_threat_level": 9.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "1248de20-8c18-4418-b35c-508189044070", "DetectTime": "2024-05-21T12:50:26.954099+00:00", "EventTime": "2024-05-21T12:50:26.954132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct309m3I4eXgb2emP4"], "accumulated_threat_level": 10.4, "timewindow": 168} +{"Format": "IDEA0", "ID": "6138882f-effd-4caa-bc24-8daeab4dbc64", "DetectTime": "2024-05-21T12:50:26.997975+00:00", "EventTime": "2024-05-21T12:50:26.998008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZDIU1Nl7dmGRxHF6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 168} +{"Format": "IDEA0", "ID": "31dae107-1e83-4909-84a7-991d99e5db7e", "DetectTime": "2024-05-21T12:50:27.207849+00:00", "EventTime": "2024-05-21T12:50:27.207872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIvo8c2Nj1zyRzGqpk"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "59ad5e66-70c4-4ede-a954-1620efbe974d", "DetectTime": "2024-05-21T12:50:27.256035+00:00", "EventTime": "2024-05-21T12:50:27.256054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9Qcj4Ne0r60dT7a4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 168} +{"Format": "Json", "ID": "59ad5e66-70c4-4ede-a954-1620efbe974d", "DetectTime": "2024-05-21T12:50:27.256035+00:00", "EventTime": "2024-05-21T12:50:27.256054+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "1970-01-07T23:33:28.409714+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2024/05/21 12:50:27.442692)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 168, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b4e59bd7-6534-44dc-bb1f-d095a93ffed2", "DetectTime": "2024-05-21T12:50:27.447271+00:00", "EventTime": "2024-05-21T12:50:27.447295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chs2L64nd6nQ8tVQb3"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "4420fa43-d28e-4347-817d-5742e31b35c9", "DetectTime": "2024-05-21T12:50:27.452512+00:00", "EventTime": "2024-05-21T12:50:27.452535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH78xC1pyoXCewInwj"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f50d4fc7-b65c-49e8-ae58-bcc0da868847", "DetectTime": "2024-05-21T12:50:27.465296+00:00", "EventTime": "2024-05-21T12:50:27.465314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphgLF1bpGJDv2f8Af"], "accumulated_threat_level": 0.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "1eb47cc5-dcc5-4da7-8063-38e93d1d2cef", "DetectTime": "2024-05-21T12:50:27.469809+00:00", "EventTime": "2024-05-21T12:50:27.469826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR17Wm34KXsuiG0fKb"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "080b042b-45ba-4e76-b619-247816ffdcbd", "DetectTime": "2024-05-21T12:50:27.481204+00:00", "EventTime": "2024-05-21T12:50:27.481221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdlKPtKhHfNFY44O2"], "accumulated_threat_level": 1.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "603a3be5-bb98-453f-942d-26143104eb7b", "DetectTime": "2024-05-21T12:50:27.768703+00:00", "EventTime": "2024-05-21T12:50:27.768725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Yyj12iMCGpSaWEh9"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "e83a3a7e-c0bc-4375-a208-b69cd4c30d02", "DetectTime": "2024-05-21T12:50:27.774197+00:00", "EventTime": "2024-05-21T12:50:27.774218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9DQ12HYuT4AfplZ"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "2bacb725-aba2-47c0-8c11-2f3ae725593e", "DetectTime": "2024-05-21T12:50:27.860086+00:00", "EventTime": "2024-05-21T12:50:27.860107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJubkqgtPGk8hutUc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 168} +{"Format": "IDEA0", "ID": "e385695a-44d4-4d93-a5c9-dacd758820e0", "DetectTime": "2024-05-21T12:50:27.864964+00:00", "EventTime": "2024-05-21T12:50:27.864982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE7Vg417XNKP6MrmGe"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "614ec04b-3df8-42a0-943c-0e38f85383f9", "DetectTime": "2024-05-21T12:50:27.936577+00:00", "EventTime": "2024-05-21T12:50:27.936599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C27KTK5yOoNcSXj73"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "73c557cf-980a-49a7-af32-b4217534d2cc", "DetectTime": "2024-05-21T12:50:27.996071+00:00", "EventTime": "2024-05-21T12:50:27.996091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnJWRA3iwRvlrP95z2"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "43fb0b4f-5d0f-454e-af1f-abfce41e16e0", "DetectTime": "2024-05-21T12:50:28.001059+00:00", "EventTime": "2024-05-21T12:50:28.001078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORppRFdWhoB8aEek"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "755fe2af-455e-48d1-8f98-16ac7d82ce7e", "DetectTime": "2024-05-21T12:50:28.017914+00:00", "EventTime": "2024-05-21T12:50:28.017939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCulQ1U1KjldMxU95"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "33f573c7-19b5-479a-a175-44db7d4893a2", "DetectTime": "2024-05-21T12:50:28.363306+00:00", "EventTime": "2024-05-21T12:50:28.363327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9Dqt4gn6ixgjDrj2"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "0fe7966c-7139-4103-9db4-64d5c1b01118", "DetectTime": "2024-05-21T12:50:28.368150+00:00", "EventTime": "2024-05-21T12:50:28.368169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChzuVz1crvt8r1EeF5"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "291d00cd-31f6-475d-80eb-f758c104d35a", "DetectTime": "2024-05-21T12:50:28.404189+00:00", "EventTime": "2024-05-21T12:50:28.404213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAVqT3Sh2FnLBO5m9"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "50cba202-b707-4b7c-8083-a5d9fde5fcb6", "DetectTime": "2024-05-21T12:50:28.423822+00:00", "EventTime": "2024-05-21T12:50:28.423840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUlgYVm6e4MKQNBXk"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "5bb7bed1-2a24-4881-833d-dd81948b138a", "DetectTime": "2024-05-21T12:50:28.613472+00:00", "EventTime": "2024-05-21T12:50:28.613495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 46.49.109.30 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cox1p64OzkAKIoOj8e"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "c684a026-e2ce-44c4-ada7-76da3a06e26d", "DetectTime": "2024-05-21T12:50:28.621157+00:00", "EventTime": "2024-05-21T12:50:28.621176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoSOun3lTHUjrAL80d"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "5be4dc9e-37c5-45d5-9d63-edd07efea51c", "DetectTime": "2024-05-21T12:50:28.633393+00:00", "EventTime": "2024-05-21T12:50:28.633413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZc7AN1vlBStdZBp4g"], "accumulated_threat_level": 4.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "913a11d9-9ced-4909-8c59-3cdfb92d3a50", "DetectTime": "2024-05-21T12:50:28.638525+00:00", "EventTime": "2024-05-21T12:50:28.638543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYzQhA2Pz9lL0TLigc"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "b92f2c44-9105-4c5e-a998-29ba690d8c7f", "DetectTime": "2024-05-21T12:50:29.021083+00:00", "EventTime": "2024-05-21T12:50:29.021103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8QYJ339cqYOtHp05j"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "cf5ebdd3-797f-4a7d-b854-a381f629920b", "DetectTime": "2024-05-21T12:50:29.026758+00:00", "EventTime": "2024-05-21T12:50:29.026779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFw0S3AKMmvfIskh9"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "455b9077-d020-41c0-bd48-87bf237ba540", "DetectTime": "2024-05-21T12:50:29.065584+00:00", "EventTime": "2024-05-21T12:50:29.065605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqqomY2dBK8pUdOp8a"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f1b5b388-146e-408b-8e08-6d807e0f993c", "DetectTime": "2024-05-21T12:50:29.155049+00:00", "EventTime": "2024-05-21T12:50:29.155066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsJxt2pnElASULuxf"], "accumulated_threat_level": 5.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "b828c721-a193-43f2-b580-ed010b3b23b8", "DetectTime": "2024-05-21T12:50:29.189160+00:00", "EventTime": "2024-05-21T12:50:29.189185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7S1I24Zcbw6wkSRt9"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "92e4e7bf-4fde-4d95-937a-00941bcc2b55", "DetectTime": "2024-05-21T12:50:29.202400+00:00", "EventTime": "2024-05-21T12:50:29.202436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCz60u2hx5vJkGfhVh"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "7bacf560-8dba-4d7a-82ba-103bcb7b9f0b", "DetectTime": "2024-05-21T12:50:29.497577+00:00", "EventTime": "2024-05-21T12:50:29.497601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ki5Z16vC5zJsBQph"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "71478c6c-d855-4dd2-aa04-426d9522795a", "DetectTime": "2024-05-21T12:50:29.601550+00:00", "EventTime": "2024-05-21T12:50:29.601571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaE3L1Tixbnq8SVxl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 168} +{"Format": "IDEA0", "ID": "68f7c99d-12d4-4c4c-8e98-8e9568551ab4", "DetectTime": "2024-05-21T12:50:29.620613+00:00", "EventTime": "2024-05-21T12:50:29.620635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEBL3242Edd8NIMerf"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "8d656870-58b3-408b-a9ef-c1e824e2fe2f", "DetectTime": "2024-05-21T12:50:29.657843+00:00", "EventTime": "2024-05-21T12:50:29.657864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7nsW1hGmpY9mspdi"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "323aa4f9-3af5-4d65-92ae-57ed89606e48", "DetectTime": "2024-05-21T12:50:29.901064+00:00", "EventTime": "2024-05-21T12:50:29.901082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPdjZm1PiDrF7npzVi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "29db19e6-4657-4072-b519-97e7b28c15e3", "DetectTime": "2024-05-21T12:50:29.905792+00:00", "EventTime": "2024-05-21T12:50:29.905809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEpWqJdt0gNHJDJHe"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "bea65ee8-7bf5-4e24-9ecc-4b840c04f31a", "DetectTime": "2024-05-21T12:50:29.924416+00:00", "EventTime": "2024-05-21T12:50:29.924436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrZjH11BolnNcd7Vhb"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "0b066c82-b62f-4e5b-a9a3-3f676617b5db", "DetectTime": "2024-05-21T12:50:30.335447+00:00", "EventTime": "2024-05-21T12:50:30.335470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wZ983U8AbiMdxVP3"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "65c10055-a481-4c72-8675-44446970e513", "DetectTime": "2024-05-21T12:50:30.353396+00:00", "EventTime": "2024-05-21T12:50:30.353417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuSQFR1nquU1LATI14"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "34e94ae6-44f1-43a5-9114-080c9fe8c130", "DetectTime": "2024-05-21T12:50:30.396264+00:00", "EventTime": "2024-05-21T12:50:30.396286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8YG0i21RXZSReK3mh"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "4733294e-c6e7-457f-bf10-166735b8eeec", "DetectTime": "2024-05-21T12:50:30.405465+00:00", "EventTime": "2024-05-21T12:50:30.405485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEDoUstq5TWmYjjg"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "17180a85-fc39-4d03-974d-1de33bda9246", "DetectTime": "2024-05-21T12:50:30.437913+00:00", "EventTime": "2024-05-21T12:50:30.437935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmBNc8jXlCnNp9LB5"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f78bddac-404f-4d38-a8b2-ba7094f5827d", "DetectTime": "2024-05-21T12:50:30.443115+00:00", "EventTime": "2024-05-21T12:50:30.443136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD7d4GGVttNVacZGf"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "edce9eb8-6440-4916-90b5-36f71dc74962", "DetectTime": "2024-05-21T12:50:30.522947+00:00", "EventTime": "2024-05-21T12:50:30.522968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WnCR2qih9Vwxy9t4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "d9965ea5-6816-4b5b-aa34-70c4bde8dac3", "DetectTime": "2024-05-21T12:50:30.844841+00:00", "EventTime": "2024-05-21T12:50:30.844863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl6GK9kJ9oXUp5123"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "563c724c-0f21-480a-9f17-8b57fd0427a4", "DetectTime": "2024-05-21T12:50:30.901501+00:00", "EventTime": "2024-05-21T12:50:30.901523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUNIFVjVOx24nf35"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "97e3b536-8d52-430b-a745-33d2ef3d6180", "DetectTime": "2024-05-21T12:50:31.023421+00:00", "EventTime": "2024-05-21T12:50:31.023445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUeEd32PU6AyFyF23"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "552e7b00-5380-47be-8af6-581193708d3b", "DetectTime": "2024-05-21T12:50:31.028719+00:00", "EventTime": "2024-05-21T12:50:31.028739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjxE71aXxDXvo9Rb"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "e3e9a346-5feb-44dc-b015-8ba524b1a3ee", "DetectTime": "2024-05-21T12:50:31.105910+00:00", "EventTime": "2024-05-21T12:50:31.105934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLe8mNaSAVnHXdWc8"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "ec076396-3581-4a17-a446-67cdd07be2ed", "DetectTime": "2024-05-21T12:50:31.115464+00:00", "EventTime": "2024-05-21T12:50:31.115484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoT513Tb1gSXNbzC5"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f50bb873-08c0-483c-9cf8-26532e2c6cd1", "DetectTime": "2024-05-21T12:50:31.130163+00:00", "EventTime": "2024-05-21T12:50:31.130184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chw9BS33beU1GjP6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 168} +{"Format": "IDEA0", "ID": "f419b207-e9ff-4ac3-800d-87f8037cf7fe", "DetectTime": "2024-05-21T12:50:31.139784+00:00", "EventTime": "2024-05-21T12:50:31.139802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrLT8BmBBzvSoA041"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "45c2aff7-d25d-47b7-9068-96a1bef6a68f", "DetectTime": "2024-05-21T12:50:31.158378+00:00", "EventTime": "2024-05-21T12:50:31.158398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkHkche5DpG7vtF72"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "54771881-fdb9-400a-9a15-70ebaba9b4dd", "DetectTime": "2024-05-21T12:50:31.437934+00:00", "EventTime": "2024-05-21T12:50:31.437953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3pgBXnLoS2sEKsV4"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "84763611-0d7e-4ec0-9ab3-72fea3371e35", "DetectTime": "2024-05-21T12:50:31.605965+00:00", "EventTime": "2024-05-21T12:50:31.605987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd6woZ3KDiqjFfCwQ3"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "dd3cf2f6-b79a-4817-967d-3428c4cd9c16", "DetectTime": "2024-05-21T12:50:31.616994+00:00", "EventTime": "2024-05-21T12:50:31.617015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBrTv23bnBN2iKWQo7"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "fc54249a-c13f-4144-bdfc-e1227e1204af", "DetectTime": "2024-05-21T12:50:31.621857+00:00", "EventTime": "2024-05-21T12:50:31.621877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKHKN1XPuYOTtXKQd"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "f350d6d3-b519-476b-8b3c-b3d9765389bb", "DetectTime": "2024-05-21T12:50:31.938828+00:00", "EventTime": "2024-05-21T12:50:31.938848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHEWnF4Tl1B1SCOfBh"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "9ad5e368-39b4-47da-be5f-25c2652737a8", "DetectTime": "2024-05-21T12:50:31.962093+00:00", "EventTime": "2024-05-21T12:50:31.962114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWUUqttEC1b9F89h"], "accumulated_threat_level": 9.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "4a4b8800-c59c-497e-914d-e1df5a613df6", "DetectTime": "2024-05-21T12:50:32.125388+00:00", "EventTime": "2024-05-21T12:50:32.125409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBk9mh42GxnkiryKH2"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "51f7d7f0-0a18-4682-9474-292ad7cfaf9b", "DetectTime": "2024-05-21T12:50:32.130651+00:00", "EventTime": "2024-05-21T12:50:32.130681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Qxe44x8M07KIz4Jc"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "5c2af84c-0203-4b18-b47e-02c4ad4a4460", "DetectTime": "2024-05-21T12:50:32.267958+00:00", "EventTime": "2024-05-21T12:50:32.267977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSzLwD0qYBpqttmw8"], "accumulated_threat_level": 10.4, "timewindow": 168} +{"Format": "IDEA0", "ID": "48bb999d-8959-484f-81f5-4446ebddd8e7", "DetectTime": "2024-05-21T12:50:32.273008+00:00", "EventTime": "2024-05-21T12:50:32.273027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9CXSF4QqUwpfsuTW6"], "accumulated_threat_level": 4.8, "timewindow": 166} +{"Format": "IDEA0", "ID": "555100c3-e97c-4f20-b32a-568a18bdad09", "DetectTime": "2024-05-21T12:50:32.278761+00:00", "EventTime": "2024-05-21T12:50:32.278780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMN19C3kmg3uQW3Qvb"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "46890178-237c-41b0-a0cf-bf4af84e2162", "DetectTime": "2024-05-21T12:50:32.314702+00:00", "EventTime": "2024-05-21T12:50:32.314723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKb39u2Uli38EGMyQ3"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "4d62bcd6-4343-416d-913b-f76b79627770", "DetectTime": "2024-05-21T12:50:32.517578+00:00", "EventTime": "2024-05-21T12:50:32.517602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS4zJd3ZKyVQcAuQE8"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "7d89593d-de84-4df3-a3c7-082811d82388", "DetectTime": "2024-05-21T12:50:32.565588+00:00", "EventTime": "2024-05-21T12:50:32.565618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJgZ63nZcRjMJxE43"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "cf35bbca-b931-4370-96ba-3a1ccfc4e1e6", "DetectTime": "2024-05-21T12:50:32.610989+00:00", "EventTime": "2024-05-21T12:50:32.611009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4j13N3ChsGXAmOWYk"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "f5752aff-682f-4973-a5ab-836c4804e0d9", "DetectTime": "2024-05-21T12:50:32.763636+00:00", "EventTime": "2024-05-21T12:50:32.763656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZsaKS3XpvuyjXioIb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 168} +{"Format": "IDEA0", "ID": "90d4e805-57bd-4e06-812a-f29ec998ed88", "DetectTime": "2024-05-21T12:50:32.769714+00:00", "EventTime": "2024-05-21T12:50:32.769733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csehtc4sTnIzmY6E6"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "b2bf463b-2f07-4d2e-9def-acc02db99c7a", "DetectTime": "2024-05-21T12:50:32.822529+00:00", "EventTime": "2024-05-21T12:50:32.822552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLCpFw4vyRGNL5F6De"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "fa11c437-4b36-490d-b03e-8f299c79c69d", "DetectTime": "2024-05-21T12:50:33.079761+00:00", "EventTime": "2024-05-21T12:50:33.079783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chll0l4KF7SB8ynCPd"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "79a124ae-de24-4317-8a46-33c134f4d72f", "DetectTime": "2024-05-21T12:50:33.107091+00:00", "EventTime": "2024-05-21T12:50:33.107112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvimv2lDKhSez5iE3"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "db1a389a-a762-4f6a-a200-c9424adb522b", "DetectTime": "2024-05-21T12:50:33.398665+00:00", "EventTime": "2024-05-21T12:50:33.398688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzPJo9n3JNlQUVZU1"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "e587855d-6485-42ce-9d5f-8efc6e4feab4", "DetectTime": "2024-05-21T12:50:33.406929+00:00", "EventTime": "2024-05-21T12:50:33.406949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipzrM1MyegUZ7drS"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "be408d16-1d7d-4583-8fa8-9fcaee63549c", "DetectTime": "2024-05-21T12:50:33.417454+00:00", "EventTime": "2024-05-21T12:50:33.417474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCogKCW2myvq0Dyi"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "93ba93be-c3d2-4254-a346-9f26c5eb4954", "DetectTime": "2024-05-21T12:50:33.434441+00:00", "EventTime": "2024-05-21T12:50:33.434464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU598m3decCA281xcl"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "352e5201-b20f-45e6-ae88-19cc48f5321f", "DetectTime": "2024-05-21T12:50:33.446391+00:00", "EventTime": "2024-05-21T12:50:33.446444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZjjbM6zb6z436xba"], "accumulated_threat_level": 12.000000000000002, "timewindow": 168} +{"Format": "Json", "ID": "352e5201-b20f-45e6-ae88-19cc48f5321f", "DetectTime": "2024-05-21T12:50:33.446391+00:00", "EventTime": "2024-05-21T12:50:33.446444+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-07T23:33:31.757330+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 168. (real time 2024/05/21 12:50:33.651533)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 168, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0603ef53-b1e0-43ca-9fa1-311f0d92c9c2", "DetectTime": "2024-05-21T12:50:33.655699+00:00", "EventTime": "2024-05-21T12:50:33.655720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTj8Hq2IibrV07tlHi"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "24f96366-d4d6-4b28-97d1-4c256e64a62d", "DetectTime": "2024-05-21T12:50:33.915954+00:00", "EventTime": "2024-05-21T12:50:33.915976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZjrOiidfn8cDcOb"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "61ae6cae-bcc7-4e79-9e97-4a0d7657a14d", "DetectTime": "2024-05-21T12:50:33.962866+00:00", "EventTime": "2024-05-21T12:50:33.962885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA9Bj2xZL374Rs4pd"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "9ed79c4c-d880-4a7c-91db-2241c318ce27", "DetectTime": "2024-05-21T12:50:33.990366+00:00", "EventTime": "2024-05-21T12:50:33.990386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7UvpQ3MMb5akpOaRj"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "f7247d57-75fe-4537-8d2a-7992f52fda91", "DetectTime": "2024-05-21T12:50:34.119176+00:00", "EventTime": "2024-05-21T12:50:34.119202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZVb5i28Mz35n6Cfc5"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "4e35ace1-53c6-4692-802e-7df550b3b7b0", "DetectTime": "2024-05-21T12:50:34.137201+00:00", "EventTime": "2024-05-21T12:50:34.137223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj1C2P1FvdYECjlgI4"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "73c303ce-c607-4546-8c52-2748003fb470", "DetectTime": "2024-05-21T12:50:34.524058+00:00", "EventTime": "2024-05-21T12:50:34.524085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfBu0B2u1NQxd67evf"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "edf9d57a-84b0-42f5-87c4-268da6ab1451", "DetectTime": "2024-05-21T12:50:34.529357+00:00", "EventTime": "2024-05-21T12:50:34.529382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNSvUf44DYd8SvI1ag"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "5b0098b8-8c3b-489d-9418-327b0c506065", "DetectTime": "2024-05-21T12:50:34.535038+00:00", "EventTime": "2024-05-21T12:50:34.535058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVCN4f3SVagmDNiLQe"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "8e001b80-08f5-41d8-a8f8-05a4464bee8e", "DetectTime": "2024-05-21T12:50:34.542133+00:00", "EventTime": "2024-05-21T12:50:34.542153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMxTRx372G99lIElcd"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "3df99592-8815-4e84-8d56-9e23e322cf7a", "DetectTime": "2024-05-21T12:50:34.557606+00:00", "EventTime": "2024-05-21T12:50:34.557626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF4y9K3klR9ebmvMx2"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "d7669e09-1d2e-4a20-b977-f4982fb2b7ec", "DetectTime": "2024-05-21T12:50:34.562457+00:00", "EventTime": "2024-05-21T12:50:34.562477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2b6SR5xhvyvl4ay2"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "a1c4fa3f-1714-4658-96f4-87b7ce613b6c", "DetectTime": "2024-05-21T12:50:34.622167+00:00", "EventTime": "2024-05-21T12:50:34.622189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClN1TH1WQjFRdgpAE7"], "accumulated_threat_level": 0.8, "timewindow": 168} +{"Format": "IDEA0", "ID": "0fc45249-1d28-440e-bf33-00bf02082c31", "DetectTime": "2024-05-21T12:50:34.694265+00:00", "EventTime": "2024-05-21T12:50:34.694286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90JXM28RSdCMmUUBa"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "b8c70b93-2dc0-4eb6-9b2b-3c5cca86f0ab", "DetectTime": "2024-05-21T12:50:34.741404+00:00", "EventTime": "2024-05-21T12:50:34.741424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtQwle4Nwmjewc49Y8"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "3e34d027-43ea-4bb3-aa7f-b8af177df116", "DetectTime": "2024-05-21T12:50:35.029453+00:00", "EventTime": "2024-05-21T12:50:35.029475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2R2xN1XEcsq3HL2L6"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "c597f275-f5b2-45a4-805a-dd906821829e", "DetectTime": "2024-05-21T12:50:35.055231+00:00", "EventTime": "2024-05-21T12:50:35.055253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV8wd53f08eW7p15Cb"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "7ea4d041-badf-4dca-8258-5f0cbe809b2b", "DetectTime": "2024-05-21T12:50:35.061109+00:00", "EventTime": "2024-05-21T12:50:35.061127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChnzH34ClnoZT0ckdg"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "6a94c84c-9fa9-4bba-af92-8eb0ba9a43c4", "DetectTime": "2024-05-21T12:50:35.297423+00:00", "EventTime": "2024-05-21T12:50:35.297447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz6q33vS2R9Y67yn"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "f853cb67-2965-4130-b18c-280e9afef81a", "DetectTime": "2024-05-21T12:50:35.302881+00:00", "EventTime": "2024-05-21T12:50:35.302900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfAuT2drv5BJXOPX1"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "f30fd8e0-caab-4e86-b089-d130a8cfd467", "DetectTime": "2024-05-21T12:50:35.724277+00:00", "EventTime": "2024-05-21T12:50:35.724300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF8Hqt3CxPoV2M92C3"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "ca694770-7d9d-4d29-964d-9d533d14e5d4", "DetectTime": "2024-05-21T12:50:35.729396+00:00", "EventTime": "2024-05-21T12:50:35.729416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xL5I0QbktwpQqp6"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "0eb0a09d-8bbd-472b-b9c4-fbc7c13af4e7", "DetectTime": "2024-05-21T12:50:35.780452+00:00", "EventTime": "2024-05-21T12:50:35.780473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE8lZr2azp2d3DfXxd"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "9d939758-ef61-4994-8b1e-9c5f2fc4ae2b", "DetectTime": "2024-05-21T12:50:35.818506+00:00", "EventTime": "2024-05-21T12:50:35.818529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfVY4aTHujVQaJh"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "b92e55a5-508f-4683-84d6-5d40c6ce95b5", "DetectTime": "2024-05-21T12:50:35.823849+00:00", "EventTime": "2024-05-21T12:50:35.823869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVu4A1g2aceI4Hk0f"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "596e01ed-bd35-4267-a22b-1e4ce9d53984", "DetectTime": "2024-05-21T12:50:35.882064+00:00", "EventTime": "2024-05-21T12:50:35.882086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPB8I1sCzNStvtubl"], "accumulated_threat_level": 1.6, "timewindow": 168} +{"Format": "IDEA0", "ID": "8d84d5db-5877-47a3-927e-6bad4288249a", "DetectTime": "2024-05-21T12:50:35.900015+00:00", "EventTime": "2024-05-21T12:50:35.900035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VZia4Xy6cdqyiRR1"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "d287dcd9-78e6-4afa-a3e7-06feb1447899", "DetectTime": "2024-05-21T12:50:36.188937+00:00", "EventTime": "2024-05-21T12:50:36.188959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBzFRt3da8VDcKG6p2"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "117f05cc-ee7a-4603-987c-13f641c9f694", "DetectTime": "2024-05-21T12:50:36.196007+00:00", "EventTime": "2024-05-21T12:50:36.196029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GNig4E0zlksGA6Rg"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "687a593b-be32-4e9f-8981-56aa4ce25520", "DetectTime": "2024-05-21T12:50:36.348771+00:00", "EventTime": "2024-05-21T12:50:36.348795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmcxd1137PWQ1otE9g"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "27d8ca42-0253-4f7a-aadd-ea352c3ae571", "DetectTime": "2024-05-21T12:50:36.428825+00:00", "EventTime": "2024-05-21T12:50:36.428848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0SUYj36AVBBRVocC1"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "edda5020-0b26-423e-9403-2849dea2870e", "DetectTime": "2024-05-21T12:50:36.557651+00:00", "EventTime": "2024-05-21T12:50:36.557670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpSwiQ3n0xwqlVOX1"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "d5b1256c-da72-49f5-83c5-ad04f21c4bde", "DetectTime": "2024-05-21T12:50:37.006252+00:00", "EventTime": "2024-05-21T12:50:37.006272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcU23b2Efdnw8dS5ua"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "da84e675-e06f-4769-858e-1f1d3c22f9ed", "DetectTime": "2024-05-21T12:50:37.011801+00:00", "EventTime": "2024-05-21T12:50:37.011822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C87QGl3dBLiuI7tffj"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "1a15e1bc-c10c-455c-bd6b-cc4d5345eede", "DetectTime": "2024-05-21T12:50:37.016705+00:00", "EventTime": "2024-05-21T12:50:37.016725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0tcfB2WWRigfIOSmc"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "1bcc164b-0696-4814-a49d-02a9d5e98485", "DetectTime": "2024-05-21T12:50:37.043263+00:00", "EventTime": "2024-05-21T12:50:37.043286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwhDp7399jVDrs5DTl"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "6c0f9ba0-6467-48da-a318-a12d0e65e213", "DetectTime": "2024-05-21T12:50:37.048476+00:00", "EventTime": "2024-05-21T12:50:37.048498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1R9tF5YDrrdNLpqa"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "2a7dd936-1a34-4ba6-b753-4633ab7c00e9", "DetectTime": "2024-05-21T12:50:37.159015+00:00", "EventTime": "2024-05-21T12:50:37.159036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQlxh1osm5pqpOluj"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "5bcc4812-d655-4d18-9a14-09d178f3fde7", "DetectTime": "2024-05-21T12:50:37.174239+00:00", "EventTime": "2024-05-21T12:50:37.174259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CORg06RIOEZ2lTa9i"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "f168ee47-90aa-43a2-96c0-4aab2cfa00c9", "DetectTime": "2024-05-21T12:50:37.279050+00:00", "EventTime": "2024-05-21T12:50:37.279083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZOV9f42oEePRlHu8g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 168} +{"Format": "IDEA0", "ID": "1225badf-018e-47ef-b0ab-a7e7c5291657", "DetectTime": "2024-05-21T12:50:37.593808+00:00", "EventTime": "2024-05-21T12:50:37.593829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv9I7610U4uGBIwsw6"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "487d31c7-e77f-489f-9542-fb1b85d33b80", "DetectTime": "2024-05-21T12:50:37.599220+00:00", "EventTime": "2024-05-21T12:50:37.599241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLJW2N1JhGzhqHFlIf"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "c03186ae-f0e3-4309-a116-35afe5385045", "DetectTime": "2024-05-21T12:50:37.607495+00:00", "EventTime": "2024-05-21T12:50:37.607516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAiTiHoOUXiRW8NAb"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "58385134-d2e8-414c-adc6-1983732dc3c7", "DetectTime": "2024-05-21T12:50:37.612260+00:00", "EventTime": "2024-05-21T12:50:37.612280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBOrgN2KnJgs4GpKld"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "8a6e0313-8c69-49ef-99c1-ff85929be156", "DetectTime": "2024-05-21T12:50:37.629352+00:00", "EventTime": "2024-05-21T12:50:37.629376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPxDW2aYQ4n2wiey9", "CDLni32E6wljC5vzog", "CbmZKr2zKCUzMccz05", "CaJLByrIR5zjoMra2"], "accumulated_threat_level": 0.5, "timewindow": 183} +{"Format": "IDEA0", "ID": "b0d5a13b-3d01-445e-8a2e-2bdf6c1f72b6", "DetectTime": "2024-05-21T12:50:37.661701+00:00", "EventTime": "2024-05-21T12:50:37.661726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cootou2pEDngAcbG52"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "3f609368-a54b-4073-930a-3262489d1e82", "DetectTime": "2024-05-21T12:50:37.720770+00:00", "EventTime": "2024-05-21T12:50:37.720793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUES6X2gJCzokv1391"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "686a6505-b0bb-41cd-96c0-a6cdd06a468b", "DetectTime": "2024-05-21T12:50:37.754679+00:00", "EventTime": "2024-05-21T12:50:37.754701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcYCo2mFA1mX1zqD4"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "e514eda1-a1fe-48d9-ba33-30f5ae6fbb8c", "DetectTime": "2024-05-21T12:50:38.154819+00:00", "EventTime": "2024-05-21T12:50:38.154840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAN4y16PL7hfXmsW9"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "0b7d06e1-3cbc-470c-a277-738ec995344d", "DetectTime": "2024-05-21T12:50:38.163368+00:00", "EventTime": "2024-05-21T12:50:38.163387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtSN8p1Xlxk34OH02b"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "dec0e7de-4cee-4274-ac88-5beccd63952d", "DetectTime": "2024-05-21T12:50:38.168120+00:00", "EventTime": "2024-05-21T12:50:38.168139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAV44o1TtE01bxseC"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "772a49a2-b60e-4e7c-926d-a89e86df7d77", "DetectTime": "2024-05-21T12:50:38.272310+00:00", "EventTime": "2024-05-21T12:50:38.272332+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnrrYC4wyrqEayMY52"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "0b43d5c7-c5e5-43e9-af2d-6cb20687685e", "DetectTime": "2024-05-21T12:50:38.284784+00:00", "EventTime": "2024-05-21T12:50:38.284803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnfxu1iaV407WBFe5"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "a7e46061-126f-42b1-bc60-6d885ab79fa5", "DetectTime": "2024-05-21T12:50:38.289892+00:00", "EventTime": "2024-05-21T12:50:38.289911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3cCd41RtKz2trNsy2"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "c5f1e70c-ca3b-49d9-9105-1a24c907a812", "DetectTime": "2024-05-21T12:50:38.579185+00:00", "EventTime": "2024-05-21T12:50:38.579206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGTb17FqCCj2uJp1"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "61af4774-4769-4155-8db7-33cc1b413bac", "DetectTime": "2024-05-21T12:50:38.660228+00:00", "EventTime": "2024-05-21T12:50:38.660250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNrcLo2lVkQtuvjXg6"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "a54ef665-46fd-4401-8667-2eb59d15fa53", "DetectTime": "2024-05-21T12:50:38.716598+00:00", "EventTime": "2024-05-21T12:50:38.716620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZVAVn43ru5vEvyok5"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "894b9c54-3255-47d0-bb7e-58a7ffa6eb23", "DetectTime": "2024-05-21T12:50:38.886523+00:00", "EventTime": "2024-05-21T12:50:38.886544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJmks27qD4LhIwIu5"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "8f25e40a-1290-4b09-9335-19b1b89aa148", "DetectTime": "2024-05-21T12:50:38.891555+00:00", "EventTime": "2024-05-21T12:50:38.891573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cug2JJ16rbfcJykCrg"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "44476dd3-4c11-4d0c-a960-7ce31b78f1e7", "DetectTime": "2024-05-21T12:50:38.911187+00:00", "EventTime": "2024-05-21T12:50:38.911207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co9U0U1VfyfcM9k6s1"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "ae3e1957-72ee-454c-a7e4-f079bda482be", "DetectTime": "2024-05-21T12:50:38.917021+00:00", "EventTime": "2024-05-21T12:50:38.917038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQfYh33g0TuEfcpxzf"], "accumulated_threat_level": 4.8, "timewindow": 167} +{"Format": "IDEA0", "ID": "bf05f6f6-1a7d-405c-a67d-5a7b10c74a6f", "DetectTime": "2024-05-21T12:50:38.921865+00:00", "EventTime": "2024-05-21T12:50:38.921883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHjnHl3LYCj3RcvjLj"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "10d4dccf-88b1-426d-bf5d-c3a9cb79c8ad", "DetectTime": "2024-05-21T12:50:39.224470+00:00", "EventTime": "2024-05-21T12:50:39.224493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clyb602POo1dB0UXbk"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "785a966d-122f-467d-a6bd-8c39da8e0302", "DetectTime": "2024-05-21T12:50:39.334034+00:00", "EventTime": "2024-05-21T12:50:39.334052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qpL74Qu3FFw6p0A3"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "92192ff0-4964-49ef-a8b9-b0d67e22043a", "DetectTime": "2024-05-21T12:50:39.339349+00:00", "EventTime": "2024-05-21T12:50:39.339368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cediin11ZchqiDfFN1"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "374eec08-2a35-4dcf-80ac-16ce17931b34", "DetectTime": "2024-05-21T12:50:39.358441+00:00", "EventTime": "2024-05-21T12:50:39.358463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvYRQ33YD27T8Bro7"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "27afc9e1-1868-459f-b6b5-3209d9537f4b", "DetectTime": "2024-05-21T12:50:39.393279+00:00", "EventTime": "2024-05-21T12:50:39.393300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cku4XxldGDKotossl"], "accumulated_threat_level": 3.2, "timewindow": 168} +{"Format": "IDEA0", "ID": "20efeecf-2ea3-45fd-8169-82d169bffbeb", "DetectTime": "2024-05-21T12:50:39.409043+00:00", "EventTime": "2024-05-21T12:50:39.409063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsjjW2VL3aGg9SLT8"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "384da5da-5b1d-4f60-95c0-29e852b575eb", "DetectTime": "2024-05-21T12:50:39.720587+00:00", "EventTime": "2024-05-21T12:50:39.720606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7KdrF4l1nOxur2b11"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "589d8e35-e80a-4367-84c1-c99d51af5315", "DetectTime": "2024-05-21T12:50:39.868276+00:00", "EventTime": "2024-05-21T12:50:39.868296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZqb23kkOfoOuqjDk"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "d93e20fb-00b4-47b8-b976-507506dd8d25", "DetectTime": "2024-05-21T12:50:39.906563+00:00", "EventTime": "2024-05-21T12:50:39.906587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbCsTj2NHnaUrMvngk"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "b69479bf-c946-4594-ac45-3e652f1dc501", "DetectTime": "2024-05-21T12:50:40.133693+00:00", "EventTime": "2024-05-21T12:50:40.133711+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["118.161.192.162"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBsv9s2H7jnq1mj03k"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "8f725b79-8280-4caf-83cd-74cfc2a5703c", "DetectTime": "2024-05-21T12:50:40.147458+00:00", "EventTime": "2024-05-21T12:50:40.147480+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["118.161.192.162"]}], "Attach": [{"Content": "connection to blacklisted IP: 118.161.192.162 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 118-161-192-162.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBsv9s2H7jnq1mj03k"], "accumulated_threat_level": 7.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "231c2c40-5600-45e6-bbe1-926d9701ef3c", "DetectTime": "2024-05-21T12:50:40.304201+00:00", "EventTime": "2024-05-21T12:50:40.304222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoSWlO3F2Hq8MYUNR1"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "ff638f30-c19e-4baa-87f4-9bf6cc1bb506", "DetectTime": "2024-05-21T12:50:40.341979+00:00", "EventTime": "2024-05-21T12:50:40.342000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZFiEv39h1KMh2N7eb"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "018f72c4-9632-4dde-8796-e1617b032088", "DetectTime": "2024-05-21T12:50:40.549404+00:00", "EventTime": "2024-05-21T12:50:40.549425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcOkLY3VcInqvNqVA7"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "86ac5564-5a30-4495-93db-961225c3374d", "DetectTime": "2024-05-21T12:50:40.570814+00:00", "EventTime": "2024-05-21T12:50:40.570835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKb7EV24uzQrkyzhFa"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "5e78ddf1-4637-41f4-843e-2c10a40f8d72", "DetectTime": "2024-05-21T12:50:40.577938+00:00", "EventTime": "2024-05-21T12:50:40.577957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZP2A2HE7RyI4tLRc"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "cddf077b-560b-420e-ac05-c1f7aa4e3851", "DetectTime": "2024-05-21T12:50:40.583241+00:00", "EventTime": "2024-05-21T12:50:40.583260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7azsFblYS7XH9Cba"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "822c2fee-355b-4be3-abbd-38eefd396562", "DetectTime": "2024-05-21T12:50:40.589828+00:00", "EventTime": "2024-05-21T12:50:40.589849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUm191oL61sCFlNBd"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "29385127-5b57-42cb-a16f-7ef483ec13fe", "DetectTime": "2024-05-21T12:50:40.636808+00:00", "EventTime": "2024-05-21T12:50:40.636828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0frcM3GtkczpfenYj"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "5ef03fe1-fafc-41dd-8e8e-a0a108616127", "DetectTime": "2024-05-21T12:50:40.990873+00:00", "EventTime": "2024-05-21T12:50:40.990894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTi8XCUY1ehJyOz6d"], "accumulated_threat_level": 1.3, "timewindow": 169} +{"Format": "IDEA0", "ID": "d8b47dda-b905-4200-b774-a1eda385c614", "DetectTime": "2024-05-21T12:50:41.009161+00:00", "EventTime": "2024-05-21T12:50:41.009180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiLx9NcUGqHglIvj"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "c210bd4b-e354-4bd1-a028-0aae2061e7f6", "DetectTime": "2024-05-21T12:50:41.023234+00:00", "EventTime": "2024-05-21T12:50:41.023253+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClsutA3LjdLaUDunyd"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "8584e67f-405a-45bd-9ef7-bfa77097ad25", "DetectTime": "2024-05-21T12:50:41.050447+00:00", "EventTime": "2024-05-21T12:50:41.050472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5IKvo4NwTadE3GjZ2"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "337c4b25-063b-416d-b074-580ea83b4b96", "DetectTime": "2024-05-21T12:50:41.189163+00:00", "EventTime": "2024-05-21T12:50:41.189188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoT8TK3g6PU6OdZ4Kh"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "09ece1b8-6672-4481-91d9-f0c48031e37c", "DetectTime": "2024-05-21T12:50:41.276231+00:00", "EventTime": "2024-05-21T12:50:41.276251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYIzkn1Bvtwssh8Yy6"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "5279fa95-4fac-46c2-b0ce-97201fda027e", "DetectTime": "2024-05-21T12:50:41.315559+00:00", "EventTime": "2024-05-21T12:50:41.315581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwulV7kmYNMuyNCi9"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "b4cc93ce-0c64-448a-aca8-a4418a83157a", "DetectTime": "2024-05-21T12:50:41.642624+00:00", "EventTime": "2024-05-21T12:50:41.642647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ4gx03ZCdIasW18yj"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "ea8b51ba-43c1-4f72-8189-8cb33f537288", "DetectTime": "2024-05-21T12:50:41.647364+00:00", "EventTime": "2024-05-21T12:50:41.647382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwJoqG1eKAx42CIbYa"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "c7ca5c50-ec85-44e8-ab71-c261ab1f63bc", "DetectTime": "2024-05-21T12:50:41.653990+00:00", "EventTime": "2024-05-21T12:50:41.654011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COzyxN2LhZ6ZveMGZ7"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "e92d291d-1736-4cbf-b41f-a264b1011e83", "DetectTime": "2024-05-21T12:50:41.752043+00:00", "EventTime": "2024-05-21T12:50:41.752069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C56PHG2MOZItGZzDYf"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "e97b9358-066d-4b7b-8bf0-97022fe1a7eb", "DetectTime": "2024-05-21T12:50:41.757235+00:00", "EventTime": "2024-05-21T12:50:41.757255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNYQaa39cAt8Odfc06"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "15c24216-827b-4387-a62f-0b5543fe4fa8", "DetectTime": "2024-05-21T12:50:41.888964+00:00", "EventTime": "2024-05-21T12:50:41.888989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClAjoR2HLP5ysk5Ic5"], "accumulated_threat_level": 2.1, "timewindow": 169} +{"Format": "IDEA0", "ID": "deadcaec-60cf-4495-b827-3fa675134e0c", "DetectTime": "2024-05-21T12:50:42.205951+00:00", "EventTime": "2024-05-21T12:50:42.205972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB0NfQ3hvH2QMxwtXg"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "539c6740-00d7-4899-adae-8d9d6ce3f114", "DetectTime": "2024-05-21T12:50:42.218323+00:00", "EventTime": "2024-05-21T12:50:42.218344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcAbQk3eQfViTIFkkd"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "cf64f4f5-859f-4334-8408-eb509e8ba1eb", "DetectTime": "2024-05-21T12:50:42.228630+00:00", "EventTime": "2024-05-21T12:50:42.228664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTvrkL3LrGzrrqEtCd"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "57dc6da2-c3cf-43ac-aca9-0592a67564d2", "DetectTime": "2024-05-21T12:50:42.242180+00:00", "EventTime": "2024-05-21T12:50:42.242215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7phto1JZWgQPsbcj7"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "16149d52-97e4-42b5-8901-ee0efcc0e8b7", "DetectTime": "2024-05-21T12:50:42.255289+00:00", "EventTime": "2024-05-21T12:50:42.255313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUWgNt1FhofaY7bO52"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "8b8e656f-2d89-4690-a6ae-0809c1f81403", "DetectTime": "2024-05-21T12:50:42.327645+00:00", "EventTime": "2024-05-21T12:50:42.327667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktWvlyZsBMSNkY7i"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "db5a6897-ea10-4ecc-b51b-ae574165c0d5", "DetectTime": "2024-05-21T12:50:42.363690+00:00", "EventTime": "2024-05-21T12:50:42.363711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5re7s41JU2Zj1cae7"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "7e1126ae-2115-4c26-b8f2-b6876fb8159e", "DetectTime": "2024-05-21T12:50:42.519802+00:00", "EventTime": "2024-05-21T12:50:42.519822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVAJiA3AdC8l8hemm7"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "70615132-9f32-4a36-8921-c8637ca38df2", "DetectTime": "2024-05-21T12:50:42.771411+00:00", "EventTime": "2024-05-21T12:50:42.771434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyNa5M1qdlajgmWHs2"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "96223e29-f1b0-429e-9217-6117a911da3f", "DetectTime": "2024-05-21T12:50:42.778268+00:00", "EventTime": "2024-05-21T12:50:42.778289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNC9F41rKekbkOybC"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "848155b2-b287-484f-83bc-949d60d6b725", "DetectTime": "2024-05-21T12:50:42.785640+00:00", "EventTime": "2024-05-21T12:50:42.785663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZDIU1Nl7dmGRxHF6"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "35c147c0-12c8-4970-842d-7116f4b47cf5", "DetectTime": "2024-05-21T12:50:42.790596+00:00", "EventTime": "2024-05-21T12:50:42.790617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct309m3I4eXgb2emP4"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "4a76f2ab-1ac5-4c2a-8be7-b59a96c09de3", "DetectTime": "2024-05-21T12:50:42.795282+00:00", "EventTime": "2024-05-21T12:50:42.795300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCH3xS3Bs3f6vDE3Si"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "337c127e-4417-4fce-834b-42a542543994", "DetectTime": "2024-05-21T12:50:42.800524+00:00", "EventTime": "2024-05-21T12:50:42.800544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C74a8GQ9BX6oGDOC9"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "1825ed1d-3f0b-401e-965d-8b41261d8763", "DetectTime": "2024-05-21T12:50:43.312689+00:00", "EventTime": "2024-05-21T12:50:43.312711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCerd29ky4H5Hgitj"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 169} +{"Format": "IDEA0", "ID": "f1345544-5dab-4284-b42f-9fb4d833b655", "DetectTime": "2024-05-21T12:50:43.394032+00:00", "EventTime": "2024-05-21T12:50:43.394051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9Qcj4Ne0r60dT7a4"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "d5270677-e1c7-4b33-9808-b0cb1a51c80d", "DetectTime": "2024-05-21T12:50:43.599042+00:00", "EventTime": "2024-05-21T12:50:43.599065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CphgLF1bpGJDv2f8Af"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "55f5bd83-862f-42b4-ae66-231fe17cb038", "DetectTime": "2024-05-21T12:50:43.672294+00:00", "EventTime": "2024-05-21T12:50:43.672315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJubkqgtPGk8hutUc"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "ad395f2d-85b2-46e2-80da-0f33e3b1125a", "DetectTime": "2024-05-21T12:50:43.678390+00:00", "EventTime": "2024-05-21T12:50:43.678424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdlKPtKhHfNFY44O2"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "186c6d5e-0467-46c1-83ba-d2f5f39c8957", "DetectTime": "2024-05-21T12:50:43.824505+00:00", "EventTime": "2024-05-21T12:50:43.824527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7o2N1ZLBH5XDHVn9"], "accumulated_threat_level": 3.7, "timewindow": 169} +{"Format": "IDEA0", "ID": "baab99d7-4c03-4aff-863a-7e6804283e14", "DetectTime": "2024-05-21T12:50:43.831519+00:00", "EventTime": "2024-05-21T12:50:43.831540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiCulQ1U1KjldMxU95"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "48918100-a332-464f-accb-0f404167145f", "DetectTime": "2024-05-21T12:50:44.000818+00:00", "EventTime": "2024-05-21T12:50:44.000840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUlgYVm6e4MKQNBXk"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "538cdddb-c349-49a0-84c0-9f4fe9e83011", "DetectTime": "2024-05-21T12:50:44.098373+00:00", "EventTime": "2024-05-21T12:50:44.098391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZc7AN1vlBStdZBp4g"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "cba9bc27-3522-4c1b-b4e6-5daa30a7bbf1", "DetectTime": "2024-05-21T12:50:44.141361+00:00", "EventTime": "2024-05-21T12:50:44.141383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtDQ41LjMhtKmdGW7"], "accumulated_threat_level": 4.5, "timewindow": 169} +{"Format": "IDEA0", "ID": "d383d052-3b43-4f9c-b25f-1c0e1c5c7c03", "DetectTime": "2024-05-21T12:50:44.200175+00:00", "EventTime": "2024-05-21T12:50:44.200202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66vXl1ywPS0wLEy06"], "accumulated_threat_level": 5.3, "timewindow": 169} +{"Format": "IDEA0", "ID": "8605bd76-f8c9-421c-8018-56b04f816361", "DetectTime": "2024-05-21T12:50:44.254898+00:00", "EventTime": "2024-05-21T12:50:44.254919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvsJxt2pnElASULuxf"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "e8f7d6ed-397a-4947-9ff2-2e333cf6d556", "DetectTime": "2024-05-21T12:50:44.551740+00:00", "EventTime": "2024-05-21T12:50:44.551763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmUaH1Jt1yg1W6d4"], "accumulated_threat_level": 6.1, "timewindow": 169} +{"Format": "IDEA0", "ID": "f852c3b5-b36c-4d39-b1de-3c5c62a55f3f", "DetectTime": "2024-05-21T12:50:44.600263+00:00", "EventTime": "2024-05-21T12:50:44.600280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgwj9e1RdCOUmMevzj"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 169} +{"Format": "IDEA0", "ID": "06ec7c44-ab85-48d0-a87d-13f5a7c7a190", "DetectTime": "2024-05-21T12:50:44.653062+00:00", "EventTime": "2024-05-21T12:50:44.653081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04ndR25NDIAg4Q7yj"], "accumulated_threat_level": 7.699999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "f14c21c4-b214-4a10-847b-3ae71f45a0d5", "DetectTime": "2024-05-21T12:50:44.704981+00:00", "EventTime": "2024-05-21T12:50:44.705003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUpIn2PfES7V5BF5g"], "accumulated_threat_level": 8.5, "timewindow": 169} +{"Format": "IDEA0", "ID": "5d62ccb8-5903-4801-b9d5-6f48a83f684e", "DetectTime": "2024-05-21T12:50:44.744502+00:00", "EventTime": "2024-05-21T12:50:44.744525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFaE3L1Tixbnq8SVxl"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "0bda3c9f-1f24-4082-9cf4-959b5c7f2135", "DetectTime": "2024-05-21T12:50:44.796841+00:00", "EventTime": "2024-05-21T12:50:44.796860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMPonA46moKbq9ApA2"], "accumulated_threat_level": 9.3, "timewindow": 169} +{"Format": "IDEA0", "ID": "c5133aaa-ca02-426e-91d3-9c9578293996", "DetectTime": "2024-05-21T12:50:44.848722+00:00", "EventTime": "2024-05-21T12:50:44.848740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKBFU3k1LtTNoWr99"], "accumulated_threat_level": 10.100000000000001, "timewindow": 169} +{"Format": "IDEA0", "ID": "e85678d4-1160-4fc2-8613-0ceac5a3ec51", "DetectTime": "2024-05-21T12:50:45.190833+00:00", "EventTime": "2024-05-21T12:50:45.190862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFriBw2DAnS2RjeZgj"], "accumulated_threat_level": 10.900000000000002, "timewindow": 169} +{"Format": "IDEA0", "ID": "015cf5ed-44ed-44ef-bb62-b895475e52a8", "DetectTime": "2024-05-21T12:50:45.245458+00:00", "EventTime": "2024-05-21T12:50:45.245479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVn1P2dn2vxrYuncd"], "accumulated_threat_level": 11.700000000000003, "timewindow": 169} +{"Format": "IDEA0", "ID": "59eae16c-7a3f-4f14-95fb-24c3a5541885", "DetectTime": "2024-05-21T12:50:45.290205+00:00", "EventTime": "2024-05-21T12:50:45.290238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyExH23RVNlt38ULnb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 169} +{"Format": "Json", "ID": "59eae16c-7a3f-4f14-95fb-24c3a5541885", "DetectTime": "2024-05-21T12:50:45.290205+00:00", "EventTime": "2024-05-21T12:50:45.290238+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T00:04:18.233778+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2024/05/21 12:50:45.524877)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 169, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "45e389dc-3eaf-486c-a747-9ec34515ef29", "DetectTime": "2024-05-21T12:50:45.545108+00:00", "EventTime": "2024-05-21T12:50:45.545145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHRNYxtZVkCWAmIJ5"], "accumulated_threat_level": 0.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "bb5efbdc-c6ee-4e93-9e28-be4c0cc1c401", "DetectTime": "2024-05-21T12:50:45.550801+00:00", "EventTime": "2024-05-21T12:50:45.550821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPdjZm1PiDrF7npzVi"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "9663c172-ea0a-444c-b4e6-9b9479bca8b4", "DetectTime": "2024-05-21T12:50:45.565419+00:00", "EventTime": "2024-05-21T12:50:45.565456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4HJgY2Z6d9fyP1Qki"], "accumulated_threat_level": 1.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "3b90cc62-0a1e-4e4c-8a17-cc0e0146b17b", "DetectTime": "2024-05-21T12:50:45.583546+00:00", "EventTime": "2024-05-21T12:50:45.583578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PXMY3LtzKDjXQ578"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 169} +{"Format": "IDEA0", "ID": "e9b1580a-f72c-4395-a00a-9eb3b9ab4716", "DetectTime": "2024-05-21T12:50:45.779965+00:00", "EventTime": "2024-05-21T12:50:45.779986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg9SGj2QFxCHSghny4"], "accumulated_threat_level": 3.2, "timewindow": 169} +{"Format": "IDEA0", "ID": "f1f026ad-676e-48b1-9ba5-65f457d529f9", "DetectTime": "2024-05-21T12:50:45.830158+00:00", "EventTime": "2024-05-21T12:50:45.830180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ecjk1KmToOypcrcl"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "ad1d8413-550b-4fb9-9de4-dfc4d97b036b", "DetectTime": "2024-05-21T12:50:45.882499+00:00", "EventTime": "2024-05-21T12:50:45.882517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf6XEDo02KiMOcsSe"], "accumulated_threat_level": 4.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "1f618183-2855-47e7-b27f-d560752397bd", "DetectTime": "2024-05-21T12:50:45.939709+00:00", "EventTime": "2024-05-21T12:50:45.939729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKT83O63CDQfgsVHk"], "accumulated_threat_level": 5.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "23ad2618-540c-4d4f-89db-5d9711369801", "DetectTime": "2024-05-21T12:50:45.971367+00:00", "EventTime": "2024-05-21T12:50:45.971388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3WnCR2qih9Vwxy9t4"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "b2279b59-9368-4091-aa9c-713d1b9a93bf", "DetectTime": "2024-05-21T12:50:46.016578+00:00", "EventTime": "2024-05-21T12:50:46.016615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0e064VK4nVSgN0tj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 169} +{"Format": "IDEA0", "ID": "c70a4eab-94b2-413c-884c-81e339b500eb", "DetectTime": "2024-05-21T12:50:46.067071+00:00", "EventTime": "2024-05-21T12:50:46.067105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDQ4t49b3QiKNrvoh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "fab31aff-2f7a-49bc-8efc-7a1b6f792941", "DetectTime": "2024-05-21T12:50:46.332019+00:00", "EventTime": "2024-05-21T12:50:46.332043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuGenz4znEjWJIkh73"], "accumulated_threat_level": 7.999999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "1252a54f-e94f-4fdb-a3de-99b9ae4084ce", "DetectTime": "2024-05-21T12:50:46.385552+00:00", "EventTime": "2024-05-21T12:50:46.385571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDriJB1yHgzxQYrRsh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "cd9c0e62-d311-4259-9809-78d244cd7cbd", "DetectTime": "2024-05-21T12:50:46.432453+00:00", "EventTime": "2024-05-21T12:50:46.432473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnyub53ytUxuu2cpfa"], "accumulated_threat_level": 9.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "c13e6e61-9793-4e2e-a1d1-767211d45848", "DetectTime": "2024-05-21T12:50:46.481666+00:00", "EventTime": "2024-05-21T12:50:46.481688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJDIC2C5AaSYRS1A1"], "accumulated_threat_level": 10.4, "timewindow": 169} +{"Format": "IDEA0", "ID": "fd235d42-8562-4b19-9e99-bb1d9d0e13b9", "DetectTime": "2024-05-21T12:50:46.531059+00:00", "EventTime": "2024-05-21T12:50:46.531078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv3YsPltFyTx9KzIj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 169} +{"Format": "IDEA0", "ID": "4badc6f0-77a2-4a73-bac1-83b92e0cefbc", "DetectTime": "2024-05-21T12:50:46.581781+00:00", "EventTime": "2024-05-21T12:50:46.581800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEVbTWdKKrSe3qqj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 169} +{"Format": "Json", "ID": "4badc6f0-77a2-4a73-bac1-83b92e0cefbc", "DetectTime": "2024-05-21T12:50:46.581781+00:00", "EventTime": "2024-05-21T12:50:46.581800+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T00:04:26.525304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2024/05/21 12:50:46.984067)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 169, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "087828f6-c95c-432a-9b3d-b4491d3c472b", "DetectTime": "2024-05-21T12:50:46.988298+00:00", "EventTime": "2024-05-21T12:50:46.988317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chw9BS33beU1GjP6"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "29abe5e5-b048-47ec-b1b7-78120c6f804c", "DetectTime": "2024-05-21T12:50:47.002851+00:00", "EventTime": "2024-05-21T12:50:47.002871+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["1.162.239.239"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nY3z3rXe5c3rMr5h"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "a0ca7ec9-6b0b-46e6-a9f0-c1ea44b9b1f7", "DetectTime": "2024-05-21T12:50:47.015217+00:00", "EventTime": "2024-05-21T12:50:47.015237+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["1.162.239.239"]}], "Attach": [{"Content": "connection to blacklisted IP: 1.162.239.239 from 10.0.2.19. AS: HINET Data Communication Business Group, TW AS3462 rDNS: 1-162-239-239.dynamic-ip.hinet.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4nY3z3rXe5c3rMr5h"], "accumulated_threat_level": 8.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "6fc8cb0e-a422-4ea8-b3db-d890b720e633", "DetectTime": "2024-05-21T12:50:47.028669+00:00", "EventTime": "2024-05-21T12:50:47.028702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQOdk1XsW8FkhQgR3"], "accumulated_threat_level": 0.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "db63f5f6-3621-4076-9468-735b6dda9711", "DetectTime": "2024-05-21T12:50:47.041558+00:00", "EventTime": "2024-05-21T12:50:47.041594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKPrX14YlPApnQu1j"], "accumulated_threat_level": 1.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "c7b06183-7c93-4f2b-b049-3e53bb87998b", "DetectTime": "2024-05-21T12:50:47.055755+00:00", "EventTime": "2024-05-21T12:50:47.055789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaYHVoB9Htrv30el"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 169} +{"Format": "IDEA0", "ID": "b39b03d4-c19f-4c6e-a3fd-1336668883f4", "DetectTime": "2024-05-21T12:50:47.125992+00:00", "EventTime": "2024-05-21T12:50:47.126014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjWUUqttEC1b9F89h"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "97e15684-fcfe-4c26-9a20-d142fbf27a35", "DetectTime": "2024-05-21T12:50:47.170392+00:00", "EventTime": "2024-05-21T12:50:47.170444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co5k3Z3F8grbyI0rd3"], "accumulated_threat_level": 3.2, "timewindow": 169} +{"Format": "IDEA0", "ID": "48002b15-34fa-4b09-9a0b-99a18440275e", "DetectTime": "2024-05-21T12:50:47.228173+00:00", "EventTime": "2024-05-21T12:50:47.228210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh6zb3iFzjfMRzELk"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "63ae4fcc-dd00-4236-8bee-fbe5ce8520cc", "DetectTime": "2024-05-21T12:50:47.280801+00:00", "EventTime": "2024-05-21T12:50:47.280836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLT1kB1uQzM1MMkS8f"], "accumulated_threat_level": 4.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "26fb1bf3-0615-4a2e-a7fe-1cc9b56415a0", "DetectTime": "2024-05-21T12:50:47.544787+00:00", "EventTime": "2024-05-21T12:50:47.544813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CibUQa4mj1zba3lCvf"], "accumulated_threat_level": 5.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "b4879307-f97f-477b-886d-601cd55c69dc", "DetectTime": "2024-05-21T12:50:47.585898+00:00", "EventTime": "2024-05-21T12:50:47.585920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSzLwD0qYBpqttmw8"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "8a6cfa4d-09b5-464a-b289-8365e59bf695", "DetectTime": "2024-05-21T12:50:47.632083+00:00", "EventTime": "2024-05-21T12:50:47.632119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CULqWWO1DpTl4zCp6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 169} +{"Format": "IDEA0", "ID": "b2f6b060-aa6b-4e40-9ddd-66f51a93beb5", "DetectTime": "2024-05-21T12:50:47.682760+00:00", "EventTime": "2024-05-21T12:50:47.682795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBaNhby9OM4EXuCd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "1f80d35d-bad8-4d57-98bd-b4b2db8ff09f", "DetectTime": "2024-05-21T12:50:47.737852+00:00", "EventTime": "2024-05-21T12:50:47.737873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLaZi11ZoRtlNaWyOc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "a53bcd41-56c0-4bf5-8f91-3ffaf812f764", "DetectTime": "2024-05-21T12:50:47.786507+00:00", "EventTime": "2024-05-21T12:50:47.786525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAP6o3RIbiwFacsM6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "11e4aca8-a1a0-4c32-b6f6-8f911f7767c7", "DetectTime": "2024-05-21T12:50:47.839550+00:00", "EventTime": "2024-05-21T12:50:47.839571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4gZLf49jlwINT3Y8i"], "accumulated_threat_level": 9.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "525e50bf-0481-461c-9e8e-1672958f9082", "DetectTime": "2024-05-21T12:50:48.192402+00:00", "EventTime": "2024-05-21T12:50:48.192436+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj1cVm4sQvfEk0jK0g"], "accumulated_threat_level": 10.4, "timewindow": 169} +{"Format": "IDEA0", "ID": "cbc7f133-b298-44fa-b809-5717273700a9", "DetectTime": "2024-05-21T12:50:48.201548+00:00", "EventTime": "2024-05-21T12:50:48.201571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZsaKS3XpvuyjXioIb"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "96c07ac9-63f6-4deb-9f47-5298c5ed6902", "DetectTime": "2024-05-21T12:50:48.253308+00:00", "EventTime": "2024-05-21T12:50:48.253343+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbQHV3ZCS4drSGvgg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 169} +{"Format": "IDEA0", "ID": "327117bf-7ce3-4f7b-b610-7891571d6acf", "DetectTime": "2024-05-21T12:50:48.300111+00:00", "EventTime": "2024-05-21T12:50:48.300147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUdDRy3ETKqdxezgFk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 169} +{"Format": "Json", "ID": "327117bf-7ce3-4f7b-b610-7891571d6acf", "DetectTime": "2024-05-21T12:50:48.300111+00:00", "EventTime": "2024-05-21T12:50:48.300147+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T00:34:41.587891+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2024/05/21 12:50:48.510040)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 169, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b3761dfd-4fb6-413d-ade0-9075c5409c4e", "DetectTime": "2024-05-21T12:50:48.522950+00:00", "EventTime": "2024-05-21T12:50:48.522982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDAMJ1neOStNro4If"], "accumulated_threat_level": 0.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "5dd71b33-817f-49d3-995d-b8a4976493e2", "DetectTime": "2024-05-21T12:50:48.535043+00:00", "EventTime": "2024-05-21T12:50:48.535077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXALucFyHFuZ3kXYf"], "accumulated_threat_level": 1.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "0ced9d02-df4f-4028-b287-e7d023dedb7b", "DetectTime": "2024-05-21T12:50:48.548044+00:00", "EventTime": "2024-05-21T12:50:48.548077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte8Zv1QdZX5Uzsvb4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 169} +{"Format": "IDEA0", "ID": "8b9dfbfa-0244-4435-8235-a9aabd3a3719", "DetectTime": "2024-05-21T12:50:48.729059+00:00", "EventTime": "2024-05-21T12:50:48.729098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYc48R1LLy1ybZM11c"], "accumulated_threat_level": 3.2, "timewindow": 169} +{"Format": "IDEA0", "ID": "c69a5485-efc3-43b3-801a-516286081d7f", "DetectTime": "2024-05-21T12:50:48.782479+00:00", "EventTime": "2024-05-21T12:50:48.782499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwg7kU3ELc9XTGSx06"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "471ab7bf-e4ff-4d69-9169-a7b239ecfad2", "DetectTime": "2024-05-21T12:50:48.836163+00:00", "EventTime": "2024-05-21T12:50:48.836182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7FDY1O6sjcGqoiQh"], "accumulated_threat_level": 4.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "9f93b3d7-680a-43d7-930a-2027a06426a2", "DetectTime": "2024-05-21T12:50:48.880348+00:00", "EventTime": "2024-05-21T12:50:48.880370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSWRfY1m4rWjTxfhba"], "accumulated_threat_level": 5.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "77081128-dbdb-4973-bde9-c4ae8a152c5e", "DetectTime": "2024-05-21T12:50:48.943626+00:00", "EventTime": "2024-05-21T12:50:48.943645+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQUYp1kqV4T8pqOr6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 169} +{"Format": "IDEA0", "ID": "5feab531-2ff6-4929-881b-abc79221f5a4", "DetectTime": "2024-05-21T12:50:48.996245+00:00", "EventTime": "2024-05-21T12:50:48.996268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1hJg4uFwOaybj4Mg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "4dccf414-9be5-4610-853c-1f0293ab9061", "DetectTime": "2024-05-21T12:50:49.046523+00:00", "EventTime": "2024-05-21T12:50:49.046543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTv7x2lSqIWKBVR4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "c6426f94-a2f6-4b47-a836-b638a3e2db50", "DetectTime": "2024-05-21T12:50:49.297300+00:00", "EventTime": "2024-05-21T12:50:49.297323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZjjbM6zb6z436xba"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "78b2d107-df3a-4641-b36a-31216ffe3c0e", "DetectTime": "2024-05-21T12:50:49.348711+00:00", "EventTime": "2024-05-21T12:50:49.348730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGejPv27eLarZe1jjg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 169} +{"Format": "IDEA0", "ID": "1ed0ae6f-e1fe-4b4d-8972-74826e1d31be", "DetectTime": "2024-05-21T12:50:49.355194+00:00", "EventTime": "2024-05-21T12:50:49.355213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRGo9F4adqMVC9Wj8e", "CctBZ04YwaTF1E9GSl", "Ck8G0G4c2VlDBIfgc9", "CvvmEI1U8AR33fq8Nd"], "accumulated_threat_level": 0.5, "timewindow": 185} +{"Format": "IDEA0", "ID": "94213643-7bc4-4938-81dc-acdca645bb92", "DetectTime": "2024-05-21T12:50:49.405161+00:00", "EventTime": "2024-05-21T12:50:49.405181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMK4Jv3Ehl6zwsk5X2"], "accumulated_threat_level": 9.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "f8320ec6-a035-42fb-aa18-0a94dee02834", "DetectTime": "2024-05-21T12:50:49.466895+00:00", "EventTime": "2024-05-21T12:50:49.466913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANWoG4qHIuayNO8mb"], "accumulated_threat_level": 10.4, "timewindow": 169} +{"Format": "IDEA0", "ID": "f3e862b3-3861-4027-be76-510b98a872c2", "DetectTime": "2024-05-21T12:50:49.509816+00:00", "EventTime": "2024-05-21T12:50:49.509834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY96zJ2IS4RnUqfMub"], "accumulated_threat_level": 11.200000000000001, "timewindow": 169} +{"Format": "IDEA0", "ID": "6493c2a8-e4a6-412a-b2ac-ae1f577519e3", "DetectTime": "2024-05-21T12:50:49.564520+00:00", "EventTime": "2024-05-21T12:50:49.564552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTw3Fv2L4coLHjdaOl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 169} +{"Format": "Json", "ID": "6493c2a8-e4a6-412a-b2ac-ae1f577519e3", "DetectTime": "2024-05-21T12:50:49.564520+00:00", "EventTime": "2024-05-21T12:50:49.564552+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "1970-01-08T00:35:01.295968+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 169. (real time 2024/05/21 12:50:49.834477)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 169, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "84f2384c-d5d4-459d-9e50-8e8199c84d06", "DetectTime": "2024-05-21T12:50:49.844763+00:00", "EventTime": "2024-05-21T12:50:49.844781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCflcF26pOSrWLH0of"], "accumulated_threat_level": 0.8, "timewindow": 169} +{"Format": "IDEA0", "ID": "94326567-c94a-4e2d-bb89-d60666694c78", "DetectTime": "2024-05-21T12:50:49.872982+00:00", "EventTime": "2024-05-21T12:50:49.873004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHpYu18FL6HKd159k"], "accumulated_threat_level": 1.6, "timewindow": 169} +{"Format": "IDEA0", "ID": "b0422703-34f8-481e-b788-9258324f8a99", "DetectTime": "2024-05-21T12:50:49.923942+00:00", "EventTime": "2024-05-21T12:50:49.923961+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGiojE2sWlgcft999"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 169} +{"Format": "IDEA0", "ID": "50b7e0c2-ad4c-47a3-8c12-a4ac5d73f7cd", "DetectTime": "2024-05-21T12:50:49.974806+00:00", "EventTime": "2024-05-21T12:50:49.974824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKafZ3ypLzdHrS9Sh"], "accumulated_threat_level": 3.2, "timewindow": 169} +{"Format": "IDEA0", "ID": "89858df2-2b0e-4361-a77a-d6bc18d10ea7", "DetectTime": "2024-05-21T12:50:50.061891+00:00", "EventTime": "2024-05-21T12:50:50.061911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jGXV2yzDpaln1lY"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "891c7864-8b36-48e0-ab85-faf0b74e3266", "DetectTime": "2024-05-21T12:50:50.126182+00:00", "EventTime": "2024-05-21T12:50:50.126212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCs4gq4M1oot0L3K23"], "accumulated_threat_level": 0.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "a313794c-77e1-4c37-80c5-54d26b2a81e6", "DetectTime": "2024-05-21T12:50:50.175665+00:00", "EventTime": "2024-05-21T12:50:50.175695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COmNdD3VikghFvayt8"], "accumulated_threat_level": 1.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "e41ef405-2aa4-4b22-8abd-5a723d3c9511", "DetectTime": "2024-05-21T12:50:50.225206+00:00", "EventTime": "2024-05-21T12:50:50.225237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIjSM2OAXPVWdE12f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 170} +{"Format": "IDEA0", "ID": "a6dcc29b-6c58-49ba-935b-8dcb344589c8", "DetectTime": "2024-05-21T12:50:50.466473+00:00", "EventTime": "2024-05-21T12:50:50.466492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsMuJLUEEELsAlnKd"], "accumulated_threat_level": 3.2, "timewindow": 170} +{"Format": "IDEA0", "ID": "c2aac736-c689-4d4f-abba-12cadb7a20eb", "DetectTime": "2024-05-21T12:50:50.518898+00:00", "EventTime": "2024-05-21T12:50:50.518920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxJdM13Msj8FC4Wa3"], "accumulated_threat_level": 4.0, "timewindow": 170} +{"Format": "IDEA0", "ID": "bc15b8cb-002c-4614-8f62-d4346c6d7595", "DetectTime": "2024-05-21T12:50:50.571882+00:00", "EventTime": "2024-05-21T12:50:50.571902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeeuHa34ORR5yuiEoj"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "da30342f-4405-418d-a2ea-727c5898c064", "DetectTime": "2024-05-21T12:50:50.615467+00:00", "EventTime": "2024-05-21T12:50:50.615488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClN1TH1WQjFRdgpAE7"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "0b192d09-2d8b-4a66-8cb7-470b51357c89", "DetectTime": "2024-05-21T12:50:50.656506+00:00", "EventTime": "2024-05-21T12:50:50.656524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueVtG1ujFF87GTDYj"], "accumulated_threat_level": 5.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "453b3f10-e88d-4ade-9a05-adb37eed9372", "DetectTime": "2024-05-21T12:50:50.709467+00:00", "EventTime": "2024-05-21T12:50:50.709485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwBrqFytdxtmrfYAa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 170} +{"Format": "IDEA0", "ID": "7d431068-fe83-4878-ae71-a3053a176271", "DetectTime": "2024-05-21T12:50:50.762155+00:00", "EventTime": "2024-05-21T12:50:50.762176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV8VAD2GE8JpQmCMLg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "4d3ea5c8-875f-441a-9107-628ff5740b43", "DetectTime": "2024-05-21T12:50:50.990023+00:00", "EventTime": "2024-05-21T12:50:50.990047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAnraL3DyIsDtJTbH9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "0f7da506-3cf4-4346-ab79-c83212d2944c", "DetectTime": "2024-05-21T12:50:51.038211+00:00", "EventTime": "2024-05-21T12:50:51.038230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C481WT2pzk8GM494Jf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "116ad69b-0b21-45da-ad69-9edc5b1bcc73", "DetectTime": "2024-05-21T12:50:51.096405+00:00", "EventTime": "2024-05-21T12:50:51.096434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1uaE2Cbg5Q1WBLE9"], "accumulated_threat_level": 9.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "f65f38ea-f309-4dab-8d0a-753a1575f41e", "DetectTime": "2024-05-21T12:50:51.141479+00:00", "EventTime": "2024-05-21T12:50:51.141544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzYVP1ubiPYRXeGag"], "accumulated_threat_level": 10.4, "timewindow": 170} +{"Format": "IDEA0", "ID": "0eaddfdd-60bf-499a-ac2c-eb51f999a130", "DetectTime": "2024-05-21T12:50:51.196542+00:00", "EventTime": "2024-05-21T12:50:51.196576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9eEE14OdXCJgT7SAi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 170} +{"Format": "IDEA0", "ID": "ca720264-b923-427b-92ee-ed754f78279f", "DetectTime": "2024-05-21T12:50:51.263178+00:00", "EventTime": "2024-05-21T12:50:51.263199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CohM9H1ABRrY8M9Ywk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 170} +{"Format": "Json", "ID": "ca720264-b923-427b-92ee-ed754f78279f", "DetectTime": "2024-05-21T12:50:51.263178+00:00", "EventTime": "2024-05-21T12:50:51.263199+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T01:05:27.475074+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2024/05/21 12:50:51.445036)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 170, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a87f3828-be4b-439d-bce4-ff632e507b3a", "DetectTime": "2024-05-21T12:50:51.456994+00:00", "EventTime": "2024-05-21T12:50:51.457020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNAgq9dlAtHvm3Xb"], "accumulated_threat_level": 0.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "eea928fb-8cf1-4e63-b034-555d7592066d", "DetectTime": "2024-05-21T12:50:51.583262+00:00", "EventTime": "2024-05-21T12:50:51.583301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTCJtY34S1vybhmj9d"], "accumulated_threat_level": 1.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "e83f4a89-4963-45ed-bfb5-51f9b3f07b71", "DetectTime": "2024-05-21T12:50:51.726241+00:00", "EventTime": "2024-05-21T12:50:51.726261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9UjlP1GEbUO6drH6b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 170} +{"Format": "IDEA0", "ID": "db5a87a6-a6a3-402a-ace4-4282548cf7a1", "DetectTime": "2024-05-21T12:50:51.757884+00:00", "EventTime": "2024-05-21T12:50:51.757909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRPB8I1sCzNStvtubl"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "35c3f00c-9de6-4103-921a-d44c73971183", "DetectTime": "2024-05-21T12:50:51.823563+00:00", "EventTime": "2024-05-21T12:50:51.823596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jlvL2QZN7dVfv4X9"], "accumulated_threat_level": 3.2, "timewindow": 170} +{"Format": "IDEA0", "ID": "8f2a867d-db8b-4343-9d20-7147829a3c58", "DetectTime": "2024-05-21T12:50:51.872066+00:00", "EventTime": "2024-05-21T12:50:51.872085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32xyp2qGWiXdFhWA1"], "accumulated_threat_level": 4.0, "timewindow": 170} +{"Format": "IDEA0", "ID": "5fff6d50-15fd-4eb7-a9d8-a180f7d921a0", "DetectTime": "2024-05-21T12:50:51.923387+00:00", "EventTime": "2024-05-21T12:50:51.923410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpB8rllSmitQ1BW9"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "a075933b-208a-40d2-b0b9-b1780e3e364e", "DetectTime": "2024-05-21T12:50:51.974607+00:00", "EventTime": "2024-05-21T12:50:51.974626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJwlrsn7QauxlwQg"], "accumulated_threat_level": 5.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "69835ff1-95b5-48a6-8be0-0c46f0168435", "DetectTime": "2024-05-21T12:50:52.247278+00:00", "EventTime": "2024-05-21T12:50:52.247314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXqRV1APD0gJ1dleb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 170} +{"Format": "IDEA0", "ID": "3ce64bab-c93c-4366-9b9f-c09deb14317f", "DetectTime": "2024-05-21T12:50:52.291830+00:00", "EventTime": "2024-05-21T12:50:52.291863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf6WX52Rv6yYViDyW3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "613e0793-9106-4b12-b1b4-4c5102851ff1", "DetectTime": "2024-05-21T12:50:52.341875+00:00", "EventTime": "2024-05-21T12:50:52.341905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWTXb1fpEANikxNGa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "096b0293-1329-46e3-85fb-d9b68abbe6d5", "DetectTime": "2024-05-21T12:50:52.404156+00:00", "EventTime": "2024-05-21T12:50:52.404186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJceq2P474XPH3sjj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "97318703-4689-4756-81a6-c86b645ab537", "DetectTime": "2024-05-21T12:50:52.443007+00:00", "EventTime": "2024-05-21T12:50:52.443043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjJGj2f073uuJd9s2"], "accumulated_threat_level": 9.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "d3b96bba-10d2-4edb-b00a-b9975eb7f98b", "DetectTime": "2024-05-21T12:50:52.496336+00:00", "EventTime": "2024-05-21T12:50:52.496371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4GNzabgfdMKe8xId"], "accumulated_threat_level": 10.4, "timewindow": 170} +{"Format": "IDEA0", "ID": "d6359978-79e0-4624-9ccf-84ea13b0161b", "DetectTime": "2024-05-21T12:50:52.547971+00:00", "EventTime": "2024-05-21T12:50:52.548014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COEGCz28n0wzAk10e5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 170} +{"Format": "IDEA0", "ID": "2a62811f-de3b-4273-acd3-67e8625c2382", "DetectTime": "2024-05-21T12:50:52.822057+00:00", "EventTime": "2024-05-21T12:50:52.822085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Wyek2ApMGPU8jeel"], "accumulated_threat_level": 12.000000000000002, "timewindow": 170} +{"Format": "Json", "ID": "2a62811f-de3b-4273-acd3-67e8625c2382", "DetectTime": "2024-05-21T12:50:52.822057+00:00", "EventTime": "2024-05-21T12:50:52.822085+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-08T01:05:31.183570+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2024/05/21 12:50:52.993523)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 170, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "53e59e6f-ff72-4616-80f3-d2c35e394b84", "DetectTime": "2024-05-21T12:50:53.003929+00:00", "EventTime": "2024-05-21T12:50:53.003947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBiS5P9RxcXrTvPD2"], "accumulated_threat_level": 0.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fe7b7a15-5c95-42a8-9677-de52ee2b5d07", "DetectTime": "2024-05-21T12:50:53.014831+00:00", "EventTime": "2024-05-21T12:50:53.014850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPqGf61PNmVWNl0qN9"], "accumulated_threat_level": 1.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "cbc2345d-c6c8-4317-b2b6-fd6c4bd13b2d", "DetectTime": "2024-05-21T12:50:53.027903+00:00", "EventTime": "2024-05-21T12:50:53.027923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CII7Bn2SeqAa1tZLc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 170} +{"Format": "IDEA0", "ID": "90c88afc-c970-4fa0-a342-d642d46373a8", "DetectTime": "2024-05-21T12:50:53.073142+00:00", "EventTime": "2024-05-21T12:50:53.073160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9wkkv4SwHVcbVyXH5"], "accumulated_threat_level": 3.2, "timewindow": 170} +{"Format": "IDEA0", "ID": "32632afb-dac4-4693-82fd-d308c8ae0f75", "DetectTime": "2024-05-21T12:50:53.078904+00:00", "EventTime": "2024-05-21T12:50:53.078924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZOV9f42oEePRlHu8g"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "ae41da2d-d548-440d-8a2c-d9866c7ce5d4", "DetectTime": "2024-05-21T12:50:53.159207+00:00", "EventTime": "2024-05-21T12:50:53.159242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPM2Lv1TQN0Y27Plza"], "accumulated_threat_level": 4.0, "timewindow": 170} +{"Format": "IDEA0", "ID": "abc544bd-47d4-4343-a6ed-673f51b35cce", "DetectTime": "2024-05-21T12:50:53.444729+00:00", "EventTime": "2024-05-21T12:50:53.444749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uhNx1BoDTXcjwx63"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "03fd04c0-69eb-42c0-99fd-00d8090078f8", "DetectTime": "2024-05-21T12:50:53.495968+00:00", "EventTime": "2024-05-21T12:50:53.495987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvHwPm3Advvh6MJWpb"], "accumulated_threat_level": 5.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "1e174231-9ad7-42d7-9729-f8847a49a4a0", "DetectTime": "2024-05-21T12:50:53.531606+00:00", "EventTime": "2024-05-21T12:50:53.531625+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["117.223.129.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7cUHE6W7QnwCMC"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "12cc7732-3772-467d-9886-3644cc4071f2", "DetectTime": "2024-05-21T12:50:53.547613+00:00", "EventTime": "2024-05-21T12:50:53.547642+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["117.223.129.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 117.223.129.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7cUHE6W7QnwCMC"], "accumulated_threat_level": 8.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "a422c3ab-f90c-444e-81c1-6c3ad8be0490", "DetectTime": "2024-05-21T12:50:53.560833+00:00", "EventTime": "2024-05-21T12:50:53.560856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8PbYL1VWVIVy7lZTj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 170} +{"Format": "IDEA0", "ID": "1c24629a-ac04-4ebc-b20b-84eaefc7995d", "DetectTime": "2024-05-21T12:50:53.605335+00:00", "EventTime": "2024-05-21T12:50:53.605373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRj1u4Z6moK3HEW08"], "accumulated_threat_level": 7.199999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "5761c07c-88bd-44e5-bde5-aaa9c108f7e5", "DetectTime": "2024-05-21T12:50:53.658216+00:00", "EventTime": "2024-05-21T12:50:53.658251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6APFu2sVZkWrMS7Wh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "63d4c5ef-b258-4a51-be64-301889d65546", "DetectTime": "2024-05-21T12:50:53.712022+00:00", "EventTime": "2024-05-21T12:50:53.712058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkUtd54tb3eIzMym05"], "accumulated_threat_level": 8.799999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "af6936aa-ed63-4801-b37f-596b43675b83", "DetectTime": "2024-05-21T12:50:53.753165+00:00", "EventTime": "2024-05-21T12:50:53.753189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSnfxu1iaV407WBFe5"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "88011eba-c164-4785-8163-2d0752db1563", "DetectTime": "2024-05-21T12:50:53.885464+00:00", "EventTime": "2024-05-21T12:50:53.885483+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRCl7SMPz3IhXfb3"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "d156729d-759b-45f2-b72b-1019271dbe23", "DetectTime": "2024-05-21T12:50:53.899514+00:00", "EventTime": "2024-05-21T12:50:53.899534+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRCl7SMPz3IhXfb3"], "accumulated_threat_level": 9.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "b3e40689-ed86-41c2-8be2-52af5e970a4b", "DetectTime": "2024-05-21T12:50:53.924119+00:00", "EventTime": "2024-05-21T12:50:53.924137+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIn0o4n4dS6m7Dxa5"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "8f41da12-5e05-425d-a1ca-668535b5069f", "DetectTime": "2024-05-21T12:50:53.938550+00:00", "EventTime": "2024-05-21T12:50:53.938569+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpIn0o4n4dS6m7Dxa5"], "accumulated_threat_level": 9.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "26355fb8-e539-4635-b581-f8ce29bac1fa", "DetectTime": "2024-05-21T12:50:53.966086+00:00", "EventTime": "2024-05-21T12:50:53.966104+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvrNp9snH2naGC8i"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "edd2b2c1-dba9-4787-b0f1-fb36358b0ad4", "DetectTime": "2024-05-21T12:50:53.981471+00:00", "EventTime": "2024-05-21T12:50:53.981492+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRvrNp9snH2naGC8i"], "accumulated_threat_level": 10.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "85a0a147-8702-430c-8d05-90064c3f2795", "DetectTime": "2024-05-21T12:50:53.996923+00:00", "EventTime": "2024-05-21T12:50:53.996942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4gVpv1cgzfdxPn3Wl"], "accumulated_threat_level": 9.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "6843bb20-eec9-45cc-9f95-c744846087e4", "DetectTime": "2024-05-21T12:50:54.050873+00:00", "EventTime": "2024-05-21T12:50:54.050898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKePV32vB4tl5NQ9V2"], "accumulated_threat_level": 10.4, "timewindow": 170} +{"Format": "IDEA0", "ID": "95e12256-ceeb-4397-8ab5-2dbdb52c72f6", "DetectTime": "2024-05-21T12:50:54.106486+00:00", "EventTime": "2024-05-21T12:50:54.106507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZmU3a4ma7ynP1IV4l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 170} +{"Format": "IDEA0", "ID": "b446a740-93c5-4dda-bd96-663b201db2f9", "DetectTime": "2024-05-21T12:50:54.164875+00:00", "EventTime": "2024-05-21T12:50:54.164898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSbKMC32JDari1gxk2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 170} +{"Format": "Json", "ID": "b446a740-93c5-4dda-bd96-663b201db2f9", "DetectTime": "2024-05-21T12:50:54.164875+00:00", "EventTime": "2024-05-21T12:50:54.164898+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T01:35:50.480177+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2024/05/21 12:50:54.408005)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 170, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f38d7743-01a5-48e2-a7f7-23576a89f612", "DetectTime": "2024-05-21T12:50:54.423173+00:00", "EventTime": "2024-05-21T12:50:54.423192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxEpZ831o8YPRAtzfc"], "accumulated_threat_level": 0.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "3fcc2be4-8680-4e70-8b18-f9ce003c0add", "DetectTime": "2024-05-21T12:50:54.434312+00:00", "EventTime": "2024-05-21T12:50:54.434331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDYmhOa5uNRiLON4"], "accumulated_threat_level": 1.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "716359da-de9d-412d-ac8e-aae9ef62ba61", "DetectTime": "2024-05-21T12:50:54.447423+00:00", "EventTime": "2024-05-21T12:50:54.447441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvQkb4ziEtvmsc19"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 170} +{"Format": "IDEA0", "ID": "f1a0933a-699a-40c7-be8d-d5963d784444", "DetectTime": "2024-05-21T12:50:54.459671+00:00", "EventTime": "2024-05-21T12:50:54.459690+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKXzK3Hj1858CL57b"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "2707677f-3ac6-4e24-bdd8-69753898de6f", "DetectTime": "2024-05-21T12:50:54.475375+00:00", "EventTime": "2024-05-21T12:50:54.475396+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvKXzK3Hj1858CL57b"], "accumulated_threat_level": 10.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "4414d70e-4612-4805-a3e8-6f3d69d9bd1d", "DetectTime": "2024-05-21T12:50:54.580631+00:00", "EventTime": "2024-05-21T12:50:54.580650+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClI2f53aiF6cM41vvd"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "b3fac9db-d61e-41e3-a26e-c25d03f6b75c", "DetectTime": "2024-05-21T12:50:54.593932+00:00", "EventTime": "2024-05-21T12:50:54.593952+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClI2f53aiF6cM41vvd"], "accumulated_threat_level": 11.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "980fee03-9aa9-48b1-8993-8d288f355735", "DetectTime": "2024-05-21T12:50:54.750891+00:00", "EventTime": "2024-05-21T12:50:54.750912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COeL415XQcs2uWMT4"], "accumulated_threat_level": 3.2, "timewindow": 170} +{"Format": "IDEA0", "ID": "b905ce6e-01c6-4710-98b1-053982b3c5da", "DetectTime": "2024-05-21T12:50:54.807101+00:00", "EventTime": "2024-05-21T12:50:54.807118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgDuz1HCE4V4nqcT1"], "accumulated_threat_level": 4.0, "timewindow": 170} +{"Format": "IDEA0", "ID": "0f52b467-086d-458c-8b13-2b3cceda4848", "DetectTime": "2024-05-21T12:50:54.853414+00:00", "EventTime": "2024-05-21T12:50:54.853431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnqiuO3iHoENFky2C4"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "86c3b963-1ad0-4ca0-a79e-94a222c89d54", "DetectTime": "2024-05-21T12:50:54.904080+00:00", "EventTime": "2024-05-21T12:50:54.904097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbJRi2DCGTfpK8jm8"], "accumulated_threat_level": 5.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "67501112-7345-4fc0-baef-221a6c86a20e", "DetectTime": "2024-05-21T12:50:54.954144+00:00", "EventTime": "2024-05-21T12:50:54.954171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVd9e4qhSBkgCdfkj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 170} +{"Format": "IDEA0", "ID": "f01c1592-74ac-4747-9fbe-a8ee86fd9275", "DetectTime": "2024-05-21T12:50:55.015497+00:00", "EventTime": "2024-05-21T12:50:55.015520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBL2UqaV823nC4gb8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "77767c81-83c7-4df5-a568-bd1b3b1e7d72", "DetectTime": "2024-05-21T12:50:55.057858+00:00", "EventTime": "2024-05-21T12:50:55.057879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmJWT32TkAMjztq74"], "accumulated_threat_level": 7.999999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "a38cda35-a001-450f-aa5b-9a658d5ab890", "DetectTime": "2024-05-21T12:50:55.379625+00:00", "EventTime": "2024-05-21T12:50:55.379646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cao6aT3Mr6cGJ5QPVi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 170} +{"Format": "IDEA0", "ID": "07d56d3e-0032-443a-b429-e98046895f9f", "DetectTime": "2024-05-21T12:50:55.384732+00:00", "EventTime": "2024-05-21T12:50:55.384750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsjjW2VL3aGg9SLT8"], "accumulated_threat_level": 4.0, "timewindow": 168} +{"Format": "IDEA0", "ID": "eddf2323-9451-42da-8eba-7ac515706657", "DetectTime": "2024-05-21T12:50:55.460937+00:00", "EventTime": "2024-05-21T12:50:55.460957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipIop3Hs6r60BOk7h"], "accumulated_threat_level": 9.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "b4a41d2b-d055-452f-b5e7-ebfcc1655f4d", "DetectTime": "2024-05-21T12:50:55.512521+00:00", "EventTime": "2024-05-21T12:50:55.512542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtrdHq24uNmFKRAPMf"], "accumulated_threat_level": 10.4, "timewindow": 170} +{"Format": "IDEA0", "ID": "9a6ce3ae-0848-4b8c-b3f0-9d006404ce2f", "DetectTime": "2024-05-21T12:50:55.572501+00:00", "EventTime": "2024-05-21T12:50:55.572519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CARtbw138pkwSHKj37"], "accumulated_threat_level": 11.200000000000001, "timewindow": 170} +{"Format": "IDEA0", "ID": "345fef7a-2e08-4798-bb25-f90d5a6ad610", "DetectTime": "2024-05-21T12:50:55.613195+00:00", "EventTime": "2024-05-21T12:50:55.613215+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcp013TQo0SAcmQG1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 170} +{"Format": "Json", "ID": "345fef7a-2e08-4798-bb25-f90d5a6ad610", "DetectTime": "2024-05-21T12:50:55.613195+00:00", "EventTime": "2024-05-21T12:50:55.613215+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-08T01:35:53.964567+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 170. (real time 2024/05/21 12:50:55.831550)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 170, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d6701a9f-be47-4b77-bbc3-c3ddba2c2ec8", "DetectTime": "2024-05-21T12:50:55.842043+00:00", "EventTime": "2024-05-21T12:50:55.842062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21Vx5466zTyANcbT3"], "accumulated_threat_level": 0.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "c2d46b59-dc1f-49a4-9097-15a13d61e80e", "DetectTime": "2024-05-21T12:50:55.943274+00:00", "EventTime": "2024-05-21T12:50:55.943297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOInA4ewNoPDsKAvb"], "accumulated_threat_level": 1.6, "timewindow": 170} +{"Format": "IDEA0", "ID": "278ae5be-a70a-46e0-a1bc-9f99e9d2a3c1", "DetectTime": "2024-05-21T12:50:55.997730+00:00", "EventTime": "2024-05-21T12:50:55.997755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cI1s2gWILYDBFAt1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 170} +{"Format": "IDEA0", "ID": "95ca4933-f38c-4ef2-a85c-f95e98b75fbc", "DetectTime": "2024-05-21T12:50:56.155329+00:00", "EventTime": "2024-05-21T12:50:56.155348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnu9e7luEgGLyEcx7"], "accumulated_threat_level": 3.2, "timewindow": 170} +{"Format": "IDEA0", "ID": "2279022b-943c-4d4a-9809-3e65e23f71fa", "DetectTime": "2024-05-21T12:50:56.204730+00:00", "EventTime": "2024-05-21T12:50:56.204751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrk7sdiQ8TguQY2"], "accumulated_threat_level": 4.0, "timewindow": 170} +{"Format": "IDEA0", "ID": "4b847552-788e-4bc3-bbbd-cf105e5df846", "DetectTime": "2024-05-21T12:50:56.290167+00:00", "EventTime": "2024-05-21T12:50:56.290188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UnDs2Zlsbfss6x8e"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "7c2c276e-978b-4525-82d3-7a13843b96e3", "DetectTime": "2024-05-21T12:50:56.342514+00:00", "EventTime": "2024-05-21T12:50:56.342534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTi8XCUY1ehJyOz6d"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "ef24c45c-77d7-4343-b2ea-7fcd6e06ac0d", "DetectTime": "2024-05-21T12:50:56.401693+00:00", "EventTime": "2024-05-21T12:50:56.401712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGxVmBR6KduJrKe1"], "accumulated_threat_level": 0.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "92689c8d-dc6f-421b-bb30-711123ba4b88", "DetectTime": "2024-05-21T12:50:56.681014+00:00", "EventTime": "2024-05-21T12:50:56.681031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7y5x4kj3UtGN68pk"], "accumulated_threat_level": 1.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "42e785d9-7ceb-48c9-bd62-ee497d96e94b", "DetectTime": "2024-05-21T12:50:56.733219+00:00", "EventTime": "2024-05-21T12:50:56.733238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcqyPg3Hgx6gKq4XI"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 171} +{"Format": "IDEA0", "ID": "92e2d98e-59eb-45c7-a434-c4ebae19b22c", "DetectTime": "2024-05-21T12:50:56.784981+00:00", "EventTime": "2024-05-21T12:50:56.785000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtJEp396y2M58wYa2"], "accumulated_threat_level": 3.2, "timewindow": 171} +{"Format": "IDEA0", "ID": "c8e8d5d1-11f4-4fd7-a98a-165f70b04a06", "DetectTime": "2024-05-21T12:50:56.831989+00:00", "EventTime": "2024-05-21T12:50:56.832010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvPBr1cj16UYtwZS5"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "95089d3a-f0e1-4f4e-ac96-58962ce34c91", "DetectTime": "2024-05-21T12:50:56.884157+00:00", "EventTime": "2024-05-21T12:50:56.884180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfr07Y1S2x3qjroGHj"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "fdc5a003-eb13-449d-bbeb-39b776a5f2be", "DetectTime": "2024-05-21T12:50:56.934913+00:00", "EventTime": "2024-05-21T12:50:56.934933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp6nUn1vgKURk73PIg"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "0eb199e2-39bb-43b2-823a-75823b132349", "DetectTime": "2024-05-21T12:50:56.986829+00:00", "EventTime": "2024-05-21T12:50:56.986847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdSWf2DeszMq3cFM1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "e99c01ad-d4ca-4388-97c8-655bb75985d1", "DetectTime": "2024-05-21T12:50:57.268563+00:00", "EventTime": "2024-05-21T12:50:57.268582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHpv9oBglxbZ0Ycig"], "accumulated_threat_level": 7.199999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "24ef59be-dd1f-4235-ac2a-afdd27d64309", "DetectTime": "2024-05-21T12:50:57.318581+00:00", "EventTime": "2024-05-21T12:50:57.318604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSXyrC27VO6aSUoPd6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "ae03f6f1-9600-416b-a8c0-d9126099b4d6", "DetectTime": "2024-05-21T12:50:57.374125+00:00", "EventTime": "2024-05-21T12:50:57.374145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYK3lW37GV9ovccQFb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "d232cedb-94f3-4e17-a5ed-837c7594fe56", "DetectTime": "2024-05-21T12:50:57.427561+00:00", "EventTime": "2024-05-21T12:50:57.427579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cll9sl1MveYJ2kwVEc"], "accumulated_threat_level": 9.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "b2c44d5d-9f9c-45cf-9d46-4900b23f0461", "DetectTime": "2024-05-21T12:50:57.442674+00:00", "EventTime": "2024-05-21T12:50:57.442701+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFZLi3U9hTCpvgzr2"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "e64e4680-6b6e-4cfa-ba2a-8ba911014156", "DetectTime": "2024-05-21T12:50:57.457075+00:00", "EventTime": "2024-05-21T12:50:57.457093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdFZLi3U9hTCpvgzr2"], "accumulated_threat_level": 11.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "c264394b-637d-40f7-a858-38250dc9fe97", "DetectTime": "2024-05-21T12:50:57.481887+00:00", "EventTime": "2024-05-21T12:50:57.481906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnuRyUiWMy8bbufi"], "accumulated_threat_level": 10.4, "timewindow": 171} +{"Format": "IDEA0", "ID": "7a248b69-bdd1-42d5-8247-1b02cb2e0c71", "DetectTime": "2024-05-21T12:50:57.523176+00:00", "EventTime": "2024-05-21T12:50:57.523200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClAjoR2HLP5ysk5Ic5"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "46f1270d-e726-4169-a393-c3d4d6152b73", "DetectTime": "2024-05-21T12:50:57.565964+00:00", "EventTime": "2024-05-21T12:50:57.565985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5Voz2K6TXOSbM343"], "accumulated_threat_level": 11.200000000000001, "timewindow": 171} +{"Format": "IDEA0", "ID": "3c969401-965d-4030-aaac-7960a4be4065", "DetectTime": "2024-05-21T12:50:57.713422+00:00", "EventTime": "2024-05-21T12:50:57.713440+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQIITvs33zF9oBDg"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "53da36fb-2189-45e3-9cd6-e6a494da367c", "DetectTime": "2024-05-21T12:50:57.729901+00:00", "EventTime": "2024-05-21T12:50:57.729921+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKQIITvs33zF9oBDg"], "accumulated_threat_level": 12.0, "timewindow": 38} +{"Format": "Json", "ID": "53da36fb-2189-45e3-9cd6-e6a494da367c", "DetectTime": "2024-05-21T12:50:57.729901+00:00", "EventTime": "2024-05-21T12:50:57.729921+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "1970-01-02T13:45:49.274010+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 38. (real time 2024/05/21 12:50:58.214745)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 38, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "9a9b631c-758c-4e61-b5e9-74863c3ad92c", "DetectTime": "2024-05-21T12:50:58.226682+00:00", "EventTime": "2024-05-21T12:50:58.226704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEck962BVDcBphryQc"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "19f4eace-4d26-4a53-ae00-54482b365221", "DetectTime": "2024-05-21T12:50:58.242887+00:00", "EventTime": "2024-05-21T12:50:58.242912+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEck962BVDcBphryQc"], "accumulated_threat_level": 0.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "ff8699a0-c1d8-4281-920f-0e2dc63c6ab7", "DetectTime": "2024-05-21T12:50:58.256397+00:00", "EventTime": "2024-05-21T12:50:58.256415+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUegw2j7IQa28y9N"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "658a03b9-340c-4273-b676-e8367d67002c", "DetectTime": "2024-05-21T12:50:58.269980+00:00", "EventTime": "2024-05-21T12:50:58.270000+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUegw2j7IQa28y9N"], "accumulated_threat_level": 1.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "f88ab909-f542-4950-ab81-c9b24a9def1d", "DetectTime": "2024-05-21T12:50:58.282665+00:00", "EventTime": "2024-05-21T12:50:58.282682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjwtYM1CqORNh8jtea"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "b2b85d80-d0a3-4c45-b9d5-d951bac325cd", "DetectTime": "2024-05-21T12:50:58.297097+00:00", "EventTime": "2024-05-21T12:50:58.297118+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjwtYM1CqORNh8jtea"], "accumulated_threat_level": 1.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "4d407d45-40d3-4787-a2cc-8095062af264", "DetectTime": "2024-05-21T12:50:58.309690+00:00", "EventTime": "2024-05-21T12:50:58.309710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crfttz1JCwZUlDlUck"], "accumulated_threat_level": 12.000000000000002, "timewindow": 171} +{"Format": "Json", "ID": "4d407d45-40d3-4787-a2cc-8095062af264", "DetectTime": "2024-05-21T12:50:58.309690+00:00", "EventTime": "2024-05-21T12:50:58.309710+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-08T02:06:39.002149+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2024/05/21 12:50:58.488725)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 171, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4a4cc544-7827-4ab9-b3ca-bd1834bb0cc1", "DetectTime": "2024-05-21T12:50:58.500776+00:00", "EventTime": "2024-05-21T12:50:58.500795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkygYm4ji70hUe7s72"], "accumulated_threat_level": 0.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "52a2e7a8-7340-46f0-8328-7bd6d05eded1", "DetectTime": "2024-05-21T12:50:58.518029+00:00", "EventTime": "2024-05-21T12:50:58.518047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcO8Uh2EdzOijZqJ81"], "accumulated_threat_level": 1.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "d2ad5bcd-ccc0-404c-b146-e382b4ed6103", "DetectTime": "2024-05-21T12:50:58.529382+00:00", "EventTime": "2024-05-21T12:50:58.529401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9wQYi2aLBpS7OwUN"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 171} +{"Format": "IDEA0", "ID": "a03447b0-715b-4c2f-b959-0ba2f688457d", "DetectTime": "2024-05-21T12:50:58.541670+00:00", "EventTime": "2024-05-21T12:50:58.541690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG28i11zouk1CC0NQk"], "accumulated_threat_level": 3.2, "timewindow": 171} +{"Format": "IDEA0", "ID": "30eca684-dbc7-4022-944d-158daef9ad70", "DetectTime": "2024-05-21T12:50:58.553837+00:00", "EventTime": "2024-05-21T12:50:58.553855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chlt674SJwwUqszwH3"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "7264193e-64e5-4884-93b3-c4caaa4006a9", "DetectTime": "2024-05-21T12:50:58.567018+00:00", "EventTime": "2024-05-21T12:50:58.567042+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nHpbsMfyLYfwzre"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "14edc772-8fb9-4f4c-88cc-6d028b5fd601", "DetectTime": "2024-05-21T12:50:58.581236+00:00", "EventTime": "2024-05-21T12:50:58.581256+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nHpbsMfyLYfwzre"], "accumulated_threat_level": 2.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "a2e52598-674a-4809-b596-683fbf1ee4b2", "DetectTime": "2024-05-21T12:50:58.597523+00:00", "EventTime": "2024-05-21T12:50:58.597546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnBYZ2XDn3yZneZ8"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "964baa9b-f296-499d-a54f-d27295b4777c", "DetectTime": "2024-05-21T12:50:58.612374+00:00", "EventTime": "2024-05-21T12:50:58.612391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN3aT328cyXO1yOJJj"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "5b805885-4cbd-4cd3-8ac9-5e9c3f1f8be4", "DetectTime": "2024-05-21T12:50:58.627962+00:00", "EventTime": "2024-05-21T12:50:58.627986+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN3aT328cyXO1yOJJj"], "accumulated_threat_level": 2.5, "timewindow": 38} +{"Format": "IDEA0", "ID": "6ac2b0e1-55f0-494a-ba04-bfadaacb822f", "DetectTime": "2024-05-21T12:50:58.640943+00:00", "EventTime": "2024-05-21T12:50:58.640965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRABUb23rchtJopHHj"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "ff4640b9-b3f5-4993-88d1-889d4243cfde", "DetectTime": "2024-05-21T12:50:58.653712+00:00", "EventTime": "2024-05-21T12:50:58.653739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCYn0U12BZYQVeaWj8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "d43d048a-1c50-4f9a-accc-a7a5c19efc42", "DetectTime": "2024-05-21T12:50:58.659108+00:00", "EventTime": "2024-05-21T12:50:58.659127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCerd29ky4H5Hgitj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "f79b154b-b257-46c9-acdd-b74a33fc420e", "DetectTime": "2024-05-21T12:50:58.672459+00:00", "EventTime": "2024-05-21T12:50:58.672480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiWc51RbnkWTwqe4f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "1e1d3663-7b5f-4936-93fd-c70f731bf28a", "DetectTime": "2024-05-21T12:50:58.684962+00:00", "EventTime": "2024-05-21T12:50:58.684980+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyW2UEmM6nnhi51x6"], "accumulated_threat_level": 0, "timewindow": 38} +{"Format": "IDEA0", "ID": "4837ae46-5804-4acc-9390-4002cb00b3d8", "DetectTime": "2024-05-21T12:50:58.698765+00:00", "EventTime": "2024-05-21T12:50:58.698789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyW2UEmM6nnhi51x6"], "accumulated_threat_level": 3.0, "timewindow": 38} +{"Format": "IDEA0", "ID": "81b07a7e-1e06-4ef7-9f9a-120f3eb522be", "DetectTime": "2024-05-21T12:50:58.715882+00:00", "EventTime": "2024-05-21T12:50:58.715901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFYVi9PoaowYG4F9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "e237c2fc-0d07-47e3-82bf-ff73a1d99d27", "DetectTime": "2024-05-21T12:50:58.750015+00:00", "EventTime": "2024-05-21T12:50:58.750034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch3StVrKbs7rDcCR"], "accumulated_threat_level": 8.799999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "e877000b-aeb9-4c88-918d-b2f1bba0cd9c", "DetectTime": "2024-05-21T12:50:58.789840+00:00", "EventTime": "2024-05-21T12:50:58.789858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsnhz36T1V9vVHXbk"], "accumulated_threat_level": 9.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "00ea2485-8a3b-4000-b2c1-29ede58bfdb2", "DetectTime": "2024-05-21T12:50:59.056580+00:00", "EventTime": "2024-05-21T12:50:59.056602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuhwF13Zkucre4jRyk"], "accumulated_threat_level": 10.4, "timewindow": 171} +{"Format": "IDEA0", "ID": "d48d95de-d097-4818-9231-c47cfdfeaf5b", "DetectTime": "2024-05-21T12:50:59.105055+00:00", "EventTime": "2024-05-21T12:50:59.105076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7o2N1ZLBH5XDHVn9"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "c59a14c0-9f0e-47ed-9736-a6aedde714f8", "DetectTime": "2024-05-21T12:50:59.147790+00:00", "EventTime": "2024-05-21T12:50:59.147811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNp3j1BT7KPlDAsVl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 171} +{"Format": "IDEA0", "ID": "5d7a11c1-3768-4714-b721-957f36010d8b", "DetectTime": "2024-05-21T12:50:59.187471+00:00", "EventTime": "2024-05-21T12:50:59.187495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtDQ41LjMhtKmdGW7"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "1c9b6ca7-c909-4aa0-80ff-bcb1e64597f2", "DetectTime": "2024-05-21T12:50:59.242658+00:00", "EventTime": "2024-05-21T12:50:59.242684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWksgAeNeiU6fF0uf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 171} +{"Format": "Json", "ID": "1c9b6ca7-c909-4aa0-80ff-bcb1e64597f2", "DetectTime": "2024-05-21T12:50:59.242658+00:00", "EventTime": "2024-05-21T12:50:59.242684+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T02:06:42.742957+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2024/05/21 12:50:59.409681)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 171, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a5b599f1-5c61-4645-aced-3bfc829c3bf0", "DetectTime": "2024-05-21T12:50:59.413951+00:00", "EventTime": "2024-05-21T12:50:59.413969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C66vXl1ywPS0wLEy06"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "93e31b5e-3a9c-4799-9869-dc87c6b3f01c", "DetectTime": "2024-05-21T12:50:59.426834+00:00", "EventTime": "2024-05-21T12:50:59.426866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccg2YT3bKKWrEWDO6"], "accumulated_threat_level": 0.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "02f6663a-15d4-44ae-a7c7-68e304dd9e81", "DetectTime": "2024-05-21T12:50:59.593449+00:00", "EventTime": "2024-05-21T12:50:59.593472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmUaH1Jt1yg1W6d4"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "607484fe-1d0a-43da-82de-ed1c79ac20f3", "DetectTime": "2024-05-21T12:50:59.606158+00:00", "EventTime": "2024-05-21T12:50:59.606180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cif7V46VZ3wd8uR0f"], "accumulated_threat_level": 1.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "9d7ab1d3-0caa-4e5e-b63d-359d429e68ca", "DetectTime": "2024-05-21T12:50:59.675438+00:00", "EventTime": "2024-05-21T12:50:59.675459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgwj9e1RdCOUmMevzj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "65a32e4b-28d8-4fba-8063-5404fd6597f5", "DetectTime": "2024-05-21T12:50:59.723471+00:00", "EventTime": "2024-05-21T12:50:59.723489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04ndR25NDIAg4Q7yj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "76789c2a-1d34-43b0-8cf6-dc5fba9d7bf0", "DetectTime": "2024-05-21T12:50:59.770132+00:00", "EventTime": "2024-05-21T12:50:59.770153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUpIn2PfES7V5BF5g"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "042d82d7-7798-424c-97f5-3c8b2fc00a7c", "DetectTime": "2024-05-21T12:50:59.817110+00:00", "EventTime": "2024-05-21T12:50:59.817140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJkns4uElSAz65ZAa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 171} +{"Format": "IDEA0", "ID": "72d96a16-1235-479d-ae83-bc59bdebf72c", "DetectTime": "2024-05-21T12:50:59.858602+00:00", "EventTime": "2024-05-21T12:50:59.858622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMPonA46moKbq9ApA2"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "0f702e15-8fbb-4634-902f-ac7831696ffd", "DetectTime": "2024-05-21T12:51:00.104888+00:00", "EventTime": "2024-05-21T12:51:00.104909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRKBFU3k1LtTNoWr99"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "78dab1e1-056e-4e4c-9094-29b475e10e5b", "DetectTime": "2024-05-21T12:51:00.185644+00:00", "EventTime": "2024-05-21T12:51:00.185664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dGtD167KTE3mZKf"], "accumulated_threat_level": 3.2, "timewindow": 171} +{"Format": "IDEA0", "ID": "9e70f94c-8651-4701-aa3b-6c389b8dbe2a", "DetectTime": "2024-05-21T12:51:00.246092+00:00", "EventTime": "2024-05-21T12:51:00.246122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFriBw2DAnS2RjeZgj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "e349919f-c4c2-4e78-9c3c-7f5d589e08a4", "DetectTime": "2024-05-21T12:51:00.289684+00:00", "EventTime": "2024-05-21T12:51:00.289704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZfqs43QXCqGrVon6"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "cd8293f2-0eda-4d8b-9a23-5ac788184038", "DetectTime": "2024-05-21T12:51:00.476290+00:00", "EventTime": "2024-05-21T12:51:00.476317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVn1P2dn2vxrYuncd"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "497fc588-9969-41c8-a7ae-cf0e4c659025", "DetectTime": "2024-05-21T12:51:00.502397+00:00", "EventTime": "2024-05-21T12:51:00.502455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcvHQ2okvs4rPmFdi"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "b82aecc4-8112-4752-a331-6ad9a0af7961", "DetectTime": "2024-05-21T12:51:00.531578+00:00", "EventTime": "2024-05-21T12:51:00.531599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHRNYxtZVkCWAmIJ5"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "6645fe02-f95b-483e-b26a-00ed732b9295", "DetectTime": "2024-05-21T12:51:00.537103+00:00", "EventTime": "2024-05-21T12:51:00.537123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyExH23RVNlt38ULnb"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "6dcfb98e-68b7-4979-9d43-ed465da1370a", "DetectTime": "2024-05-21T12:51:00.962366+00:00", "EventTime": "2024-05-21T12:51:00.962389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg9SGj2QFxCHSghny4"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "2c568587-ea33-4151-8a12-c1a6f45c80ce", "DetectTime": "2024-05-21T12:51:00.969335+00:00", "EventTime": "2024-05-21T12:51:00.969356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ecjk1KmToOypcrcl"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "3b3ec0be-bf56-497f-aa2f-14d980187191", "DetectTime": "2024-05-21T12:51:00.975767+00:00", "EventTime": "2024-05-21T12:51:00.975790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4HJgY2Z6d9fyP1Qki"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "9ccb6893-3ad1-4dc6-ba90-7dfb9b96737a", "DetectTime": "2024-05-21T12:51:00.980723+00:00", "EventTime": "2024-05-21T12:51:00.980742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5PXMY3LtzKDjXQ578"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "98e03424-10e9-4450-abbb-7cc0338a2060", "DetectTime": "2024-05-21T12:51:01.082886+00:00", "EventTime": "2024-05-21T12:51:01.082907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf6XEDo02KiMOcsSe"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "2a94b546-86e3-4803-8891-96da1e34efc6", "DetectTime": "2024-05-21T12:51:01.143388+00:00", "EventTime": "2024-05-21T12:51:01.143407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u3yX1HG5jI0v1Wjg"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "694b4807-540d-4bb0-984b-0b0d109f5160", "DetectTime": "2024-05-21T12:51:01.429983+00:00", "EventTime": "2024-05-21T12:51:01.430002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKT83O63CDQfgsVHk"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "6861811d-bd52-428d-8f1c-37fc498ddedc", "DetectTime": "2024-05-21T12:51:01.435037+00:00", "EventTime": "2024-05-21T12:51:01.435056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca0e064VK4nVSgN0tj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "777592f8-58c4-4a41-bad8-a7e76603b5e7", "DetectTime": "2024-05-21T12:51:01.541368+00:00", "EventTime": "2024-05-21T12:51:01.541389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDQ4t49b3QiKNrvoh"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "2586cc87-7548-4b26-ae2c-0575a5e0d02a", "DetectTime": "2024-05-21T12:51:01.555462+00:00", "EventTime": "2024-05-21T12:51:01.555487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQkd411z9hVJnrYy4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "4ca774b8-1319-45c4-a23b-d7bedbe3b8a2", "DetectTime": "2024-05-21T12:51:01.560742+00:00", "EventTime": "2024-05-21T12:51:01.560762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuGenz4znEjWJIkh73"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "09015c04-a961-49a3-a822-3a308cc3b0d5", "DetectTime": "2024-05-21T12:51:01.565603+00:00", "EventTime": "2024-05-21T12:51:01.565624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDriJB1yHgzxQYrRsh"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "4ced49c8-450a-4a44-846b-ef1f45ed42c7", "DetectTime": "2024-05-21T12:51:01.598324+00:00", "EventTime": "2024-05-21T12:51:01.598349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJDIC2C5AaSYRS1A1"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "c76f54be-d145-442f-aede-7f1474fc43c9", "DetectTime": "2024-05-21T12:51:01.714368+00:00", "EventTime": "2024-05-21T12:51:01.714391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnyub53ytUxuu2cpfa"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "b84a6724-9e16-4cfb-87ab-3a62dec09062", "DetectTime": "2024-05-21T12:51:01.947772+00:00", "EventTime": "2024-05-21T12:51:01.947792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2z15a3CKWKuZ8e0Xa"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "98c735c1-ff8d-47f1-b55b-cdb29da720e3", "DetectTime": "2024-05-21T12:51:01.961353+00:00", "EventTime": "2024-05-21T12:51:01.961371+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2z15a3CKWKuZ8e0Xa"], "accumulated_threat_level": 10.9, "timewindow": 39} +{"Format": "IDEA0", "ID": "bc2c3f2b-0e69-4829-ad6b-bf049c6c3a36", "DetectTime": "2024-05-21T12:51:02.024300+00:00", "EventTime": "2024-05-21T12:51:02.024319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv3YsPltFyTx9KzIj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "eb433d5e-28eb-48ee-b8c7-c9bd329e51bf", "DetectTime": "2024-05-21T12:51:02.045255+00:00", "EventTime": "2024-05-21T12:51:02.045274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvLGl91Tn8EuF7XMpa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "4ed92899-291c-4750-8d2c-e105d6f387c3", "DetectTime": "2024-05-21T12:51:02.050720+00:00", "EventTime": "2024-05-21T12:51:02.050740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiQOdk1XsW8FkhQgR3"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "d6fc8bb6-7a2b-412e-8d65-92e9cc9bf984", "DetectTime": "2024-05-21T12:51:02.055385+00:00", "EventTime": "2024-05-21T12:51:02.055403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMEVbTWdKKrSe3qqj"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "851aba04-15df-45a8-b0b1-9761d716656b", "DetectTime": "2024-05-21T12:51:02.155742+00:00", "EventTime": "2024-05-21T12:51:02.155759+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6Bhw44OV0oKgYPI7"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "d4fc842f-c274-4557-8e02-058fee74a180", "DetectTime": "2024-05-21T12:51:02.168879+00:00", "EventTime": "2024-05-21T12:51:02.168897+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6Bhw44OV0oKgYPI7"], "accumulated_threat_level": 11.4, "timewindow": 39} +{"Format": "IDEA0", "ID": "1c014d65-0ea7-4fd2-90f3-f1d9ba548fa1", "DetectTime": "2024-05-21T12:51:02.173551+00:00", "EventTime": "2024-05-21T12:51:02.173569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqKPrX14YlPApnQu1j"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "2612f9d6-b7e5-45ba-a174-96bde90a2200", "DetectTime": "2024-05-21T12:51:02.207338+00:00", "EventTime": "2024-05-21T12:51:02.207365+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDg1A1DncIcoiAhI2"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "a5dafb0c-1195-4b96-a6ba-b19cff8f94b3", "DetectTime": "2024-05-21T12:51:02.222323+00:00", "EventTime": "2024-05-21T12:51:02.222348+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPDg1A1DncIcoiAhI2"], "accumulated_threat_level": 11.9, "timewindow": 39} +{"Format": "IDEA0", "ID": "c47b3846-ef93-4f35-a1a9-51d08f940aeb", "DetectTime": "2024-05-21T12:51:02.270790+00:00", "EventTime": "2024-05-21T12:51:02.270836+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJQc02J9pqWUGF2O3"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "71a95930-e518-426f-8171-8def8f2522a4", "DetectTime": "2024-05-21T12:51:02.286055+00:00", "EventTime": "2024-05-21T12:51:02.286087+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJQc02J9pqWUGF2O3"], "accumulated_threat_level": 12.4, "timewindow": 39} +{"Format": "Json", "ID": "71a95930-e518-426f-8171-8def8f2522a4", "DetectTime": "2024-05-21T12:51:02.286055+00:00", "EventTime": "2024-05-21T12:51:02.286087+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "1970-01-02T14:15:52.381779+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 39. (real time 2024/05/21 12:51:02.638277)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.4, "timewindow": 39, "profileid": "profile_10.0.2.19", "threat_level": 12.4} +{"Format": "IDEA0", "ID": "5e33b725-575a-4df6-8e44-bdd0f185c299", "DetectTime": "2024-05-21T12:51:02.642885+00:00", "EventTime": "2024-05-21T12:51:02.642905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaYHVoB9Htrv30el"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "dc8fd1f9-0ba3-4a0b-b92b-6b57bd45d256", "DetectTime": "2024-05-21T12:51:02.648393+00:00", "EventTime": "2024-05-21T12:51:02.648411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co5k3Z3F8grbyI0rd3"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "bdadcb1d-9fb6-4347-b85b-f6439bf379be", "DetectTime": "2024-05-21T12:51:02.652825+00:00", "EventTime": "2024-05-21T12:51:02.652843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh6zb3iFzjfMRzELk"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "80f15212-24c0-405c-adad-6dc3fb94aa27", "DetectTime": "2024-05-21T12:51:02.664775+00:00", "EventTime": "2024-05-21T12:51:02.664800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChcoCDmONwaPfyIQ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "51bdaa94-e11b-4bbe-9e57-8fa1d0f77c9f", "DetectTime": "2024-05-21T12:51:02.759907+00:00", "EventTime": "2024-05-21T12:51:02.759930+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLT1kB1uQzM1MMkS8f"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "dab89dbf-7d2e-4f55-8cc4-157184f9ee1d", "DetectTime": "2024-05-21T12:51:02.765337+00:00", "EventTime": "2024-05-21T12:51:02.765356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CibUQa4mj1zba3lCvf"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "8dd915c9-2b73-4319-8251-e23b2ddb8c12", "DetectTime": "2024-05-21T12:51:02.770099+00:00", "EventTime": "2024-05-21T12:51:02.770117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CULqWWO1DpTl4zCp6"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "a98e7434-f71a-4d82-94e3-a7713426de8f", "DetectTime": "2024-05-21T12:51:02.777711+00:00", "EventTime": "2024-05-21T12:51:02.777730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnBaNhby9OM4EXuCd"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "1753ebae-6134-4c59-8026-0c2f95c3a448", "DetectTime": "2024-05-21T12:51:02.870362+00:00", "EventTime": "2024-05-21T12:51:02.870386+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2U9SE4XFr8dNtGLD6"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "be4adfcc-c0e6-4ed4-ba10-7d98553cff97", "DetectTime": "2024-05-21T12:51:02.887682+00:00", "EventTime": "2024-05-21T12:51:02.887711+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2U9SE4XFr8dNtGLD6"], "accumulated_threat_level": 0.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "711cdcc0-59c4-4be3-99c1-704c6c8970f8", "DetectTime": "2024-05-21T12:51:03.003901+00:00", "EventTime": "2024-05-21T12:51:03.003922+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzSUa36jsMIrXQ6lc"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "72617c0c-2468-4d45-80ba-a674fc899b00", "DetectTime": "2024-05-21T12:51:03.019034+00:00", "EventTime": "2024-05-21T12:51:03.019061+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZzSUa36jsMIrXQ6lc"], "accumulated_threat_level": 1.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "49613ba7-e4ad-44e6-8e41-b0a0760e0db1", "DetectTime": "2024-05-21T12:51:03.191710+00:00", "EventTime": "2024-05-21T12:51:03.191741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY600s3Yppa6Klpkd5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "4e2ea292-ea2d-4ee8-91a8-55c8e56f362e", "DetectTime": "2024-05-21T12:51:03.325109+00:00", "EventTime": "2024-05-21T12:51:03.325132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAP6o3RIbiwFacsM6"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "efe3a57d-d77d-43e5-9498-ff75908d1e2e", "DetectTime": "2024-05-21T12:51:03.336106+00:00", "EventTime": "2024-05-21T12:51:03.336129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLaZi11ZoRtlNaWyOc"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "140cfa94-ab9d-4650-8ce2-340ee3d130f7", "DetectTime": "2024-05-21T12:51:03.341352+00:00", "EventTime": "2024-05-21T12:51:03.341371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4gZLf49jlwINT3Y8i"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "8f19e798-b56c-4c03-85c7-9356dd37331c", "DetectTime": "2024-05-21T12:51:03.392783+00:00", "EventTime": "2024-05-21T12:51:03.392806+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtbQHV3ZCS4drSGvgg"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "9156bf53-3b57-44b1-bc48-8a06da09b8a4", "DetectTime": "2024-05-21T12:51:03.426442+00:00", "EventTime": "2024-05-21T12:51:03.426466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj1cVm4sQvfEk0jK0g"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "5d83f3c8-be4d-4de1-9ca3-b30d9f8941d2", "DetectTime": "2024-05-21T12:51:03.589454+00:00", "EventTime": "2024-05-21T12:51:03.589487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COHeZc1UolHLpCuaS9"], "accumulated_threat_level": 9.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "438b1817-f29c-49eb-a8fe-508ec5514738", "DetectTime": "2024-05-21T12:51:03.935429+00:00", "EventTime": "2024-05-21T12:51:03.935448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXALucFyHFuZ3kXYf"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "79cc05c0-5703-4ee5-a71e-14c3f10e49ff", "DetectTime": "2024-05-21T12:51:03.940145+00:00", "EventTime": "2024-05-21T12:51:03.940161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUdDRy3ETKqdxezgFk"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "8244f70a-bbbe-4f42-a954-69b7a7beb5c1", "DetectTime": "2024-05-21T12:51:04.046919+00:00", "EventTime": "2024-05-21T12:51:04.046941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYc48R1LLy1ybZM11c"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "caedb8ca-c7e7-4662-9721-61fdcd32366d", "DetectTime": "2024-05-21T12:51:04.087150+00:00", "EventTime": "2024-05-21T12:51:04.087170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDAMJ1neOStNro4If"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "a5a76ca9-dc2f-4e72-b3f7-6c25b503229a", "DetectTime": "2024-05-21T12:51:04.121649+00:00", "EventTime": "2024-05-21T12:51:04.121668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7FDY1O6sjcGqoiQh"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "d714ee4b-e04a-4fcf-84ed-0f9273545ae2", "DetectTime": "2024-05-21T12:51:04.127439+00:00", "EventTime": "2024-05-21T12:51:04.127460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte8Zv1QdZX5Uzsvb4"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "d21c542d-c68e-43a0-9b29-53c7afea9fae", "DetectTime": "2024-05-21T12:51:04.174674+00:00", "EventTime": "2024-05-21T12:51:04.174697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSWRfY1m4rWjTxfhba"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "e67cb898-914b-46bf-b5c6-9e6a523af597", "DetectTime": "2024-05-21T12:51:04.226423+00:00", "EventTime": "2024-05-21T12:51:04.226445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNdNT28mj0jD6NX79"], "accumulated_threat_level": 10.4, "timewindow": 171} +{"Format": "IDEA0", "ID": "9f6c9369-ff69-4957-a88d-1d135735e454", "DetectTime": "2024-05-21T12:51:04.231366+00:00", "EventTime": "2024-05-21T12:51:04.231384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZ4b51hJ9PHJVhNrl"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "d20db678-b82b-42b4-8654-878cf74f4104", "DetectTime": "2024-05-21T12:51:04.597006+00:00", "EventTime": "2024-05-21T12:51:04.597026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRQUYp1kqV4T8pqOr6"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "9370da10-de59-412a-a977-3fb56ebc0d53", "DetectTime": "2024-05-21T12:51:04.601839+00:00", "EventTime": "2024-05-21T12:51:04.601858+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca1hJg4uFwOaybj4Mg"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "206b3c4a-e1e2-4703-b742-33ec51039613", "DetectTime": "2024-05-21T12:51:04.694783+00:00", "EventTime": "2024-05-21T12:51:04.694802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwg7kU3ELc9XTGSx06"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "af337b7b-5beb-4fd7-bdfc-4396afd4e900", "DetectTime": "2024-05-21T12:51:04.822435+00:00", "EventTime": "2024-05-21T12:51:04.822457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMK4Jv3Ehl6zwsk5X2"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "c8826060-f112-483c-9931-47cab3663b08", "DetectTime": "2024-05-21T12:51:04.833005+00:00", "EventTime": "2024-05-21T12:51:04.833034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGejPv27eLarZe1jjg"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "5a74bbe1-3e7d-40d8-be00-33db2ee91c18", "DetectTime": "2024-05-21T12:51:04.838658+00:00", "EventTime": "2024-05-21T12:51:04.838679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY96zJ2IS4RnUqfMub"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "7801b39e-77ba-41ae-a83a-270bc3157814", "DetectTime": "2024-05-21T12:51:05.099969+00:00", "EventTime": "2024-05-21T12:51:05.099992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzaUlp2xf1E9aMS6pj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 171} +{"Format": "IDEA0", "ID": "b0654e1d-d2f5-4bcc-b5b3-0e27617edfbd", "DetectTime": "2024-05-21T12:51:05.110206+00:00", "EventTime": "2024-05-21T12:51:05.110238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANWoG4qHIuayNO8mb"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "1e844ee7-c9b5-4a36-a809-91d65e4ca99d", "DetectTime": "2024-05-21T12:51:05.128603+00:00", "EventTime": "2024-05-21T12:51:05.128629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTv7x2lSqIWKBVR4"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "3a1d93db-7b41-49ce-a534-f54422807fb3", "DetectTime": "2024-05-21T12:51:05.176068+00:00", "EventTime": "2024-05-21T12:51:05.176087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTw3Fv2L4coLHjdaOl"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "ad35b2bf-1e23-4220-8854-7e9517540d21", "DetectTime": "2024-05-21T12:51:05.390654+00:00", "EventTime": "2024-05-21T12:51:05.390677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCflcF26pOSrWLH0of"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "1058db32-8ad3-417a-9b16-6c5635843742", "DetectTime": "2024-05-21T12:51:05.423276+00:00", "EventTime": "2024-05-21T12:51:05.423298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgKafZ3ypLzdHrS9Sh"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "bff63811-c8f0-466a-ac1a-c2cb6fdf53be", "DetectTime": "2024-05-21T12:51:05.434244+00:00", "EventTime": "2024-05-21T12:51:05.434265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHpYu18FL6HKd159k"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "cb371553-44d7-4238-898f-9e879d8b49f1", "DetectTime": "2024-05-21T12:51:05.438989+00:00", "EventTime": "2024-05-21T12:51:05.439009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGiojE2sWlgcft999"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "fd9050bb-aad1-4705-bb5b-cf4fe02302cc", "DetectTime": "2024-05-21T12:51:05.676296+00:00", "EventTime": "2024-05-21T12:51:05.676329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCs4gq4M1oot0L3K23"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "f9b73252-b763-495a-a874-3f51bcbc2b23", "DetectTime": "2024-05-21T12:51:05.905479+00:00", "EventTime": "2024-05-21T12:51:05.905500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEqzCN9O5AtCTj2Ug"], "accumulated_threat_level": 12.000000000000002, "timewindow": 171} +{"Format": "Json", "ID": "f9b73252-b763-495a-a874-3f51bcbc2b23", "DetectTime": "2024-05-21T12:51:05.905479+00:00", "EventTime": "2024-05-21T12:51:05.905500+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "1970-01-08T02:37:02.408907+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2024/05/21 12:51:06.107442)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 171, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "066a704e-a61a-41cb-aee1-f9bc81d2eab0", "DetectTime": "2024-05-21T12:51:06.111242+00:00", "EventTime": "2024-05-21T12:51:06.111260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COmNdD3VikghFvayt8"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "a3e9f8b3-0e49-458c-9f08-166bcdc2215e", "DetectTime": "2024-05-21T12:51:06.115663+00:00", "EventTime": "2024-05-21T12:51:06.115680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2jGXV2yzDpaln1lY"], "accumulated_threat_level": 4.0, "timewindow": 169} +{"Format": "IDEA0", "ID": "846df68b-0211-40e4-a20f-b739c3cc5728", "DetectTime": "2024-05-21T12:51:06.137719+00:00", "EventTime": "2024-05-21T12:51:06.137741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjuF91ZJvAsHpy0f"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "243fcf6b-6af2-47e7-8c71-89929b013836", "DetectTime": "2024-05-21T12:51:06.152459+00:00", "EventTime": "2024-05-21T12:51:06.152484+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjuF91ZJvAsHpy0f"], "accumulated_threat_level": 1.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "548bb7dc-ad18-4e28-84fb-acda5a9485a2", "DetectTime": "2024-05-21T12:51:06.186942+00:00", "EventTime": "2024-05-21T12:51:06.186967+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmohRZT69xjhKSWFi"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "9abb56aa-a7b8-4c4d-85f4-d367dcb2f44d", "DetectTime": "2024-05-21T12:51:06.205573+00:00", "EventTime": "2024-05-21T12:51:06.205594+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmohRZT69xjhKSWFi"], "accumulated_threat_level": 2.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "c389bee1-d9ff-4ac0-a313-de45e31efb19", "DetectTime": "2024-05-21T12:51:06.233537+00:00", "EventTime": "2024-05-21T12:51:06.233560+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROPYmF9Z1JS8XFi4"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "238eb85f-5857-4e1f-8408-b25ef1a54cb3", "DetectTime": "2024-05-21T12:51:06.248063+00:00", "EventTime": "2024-05-21T12:51:06.248086+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CROPYmF9Z1JS8XFi4"], "accumulated_threat_level": 2.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "52ded6d0-b92f-4a9a-a27d-ed8d781e27c9", "DetectTime": "2024-05-21T12:51:06.257394+00:00", "EventTime": "2024-05-21T12:51:06.257415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIjSM2OAXPVWdE12f"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "e1a93863-cddb-4759-9e9b-ae5e8c54a048", "DetectTime": "2024-05-21T12:51:06.275853+00:00", "EventTime": "2024-05-21T12:51:06.275872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQk45i4tQSpGnQZmna"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "f55d7394-7354-4410-ba23-7aa3d99ecbe7", "DetectTime": "2024-05-21T12:51:06.286628+00:00", "EventTime": "2024-05-21T12:51:06.286649+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwBrqFytdxtmrfYAa"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "f66745c1-6fc4-460d-8304-99d893e3cbce", "DetectTime": "2024-05-21T12:51:06.299666+00:00", "EventTime": "2024-05-21T12:51:06.299685+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQk45i4tQSpGnQZmna"], "accumulated_threat_level": 3.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "16e8f63d-ea47-4e19-a543-bfb1dc803950", "DetectTime": "2024-05-21T12:51:06.317782+00:00", "EventTime": "2024-05-21T12:51:06.317800+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnq9z4dkPfXw9zRfh"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "9974cbea-2fc5-433c-9890-db4bf932f2f4", "DetectTime": "2024-05-21T12:51:06.333252+00:00", "EventTime": "2024-05-21T12:51:06.333285+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clnq9z4dkPfXw9zRfh"], "accumulated_threat_level": 3.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "1e7491de-6f31-4e8f-b73b-7c16fb68d4b6", "DetectTime": "2024-05-21T12:51:06.340004+00:00", "EventTime": "2024-05-21T12:51:06.340024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxJdM13Msj8FC4Wa3"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "b5529e0f-2127-4a84-ad19-cb1bebed508c", "DetectTime": "2024-05-21T12:51:06.380964+00:00", "EventTime": "2024-05-21T12:51:06.380988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CueVtG1ujFF87GTDYj"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fa357ebf-9603-43e3-b747-fb75ebeab687", "DetectTime": "2024-05-21T12:51:06.386655+00:00", "EventTime": "2024-05-21T12:51:06.386674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeeuHa34ORR5yuiEoj"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "6a8a87b9-c333-4fcd-b46b-66c9ed58c25d", "DetectTime": "2024-05-21T12:51:06.393097+00:00", "EventTime": "2024-05-21T12:51:06.393125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsMuJLUEEELsAlnKd"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fc2ff85f-abee-4f53-8a5f-827c55ca0c8e", "DetectTime": "2024-05-21T12:51:06.593988+00:00", "EventTime": "2024-05-21T12:51:06.594008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C481WT2pzk8GM494Jf"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "cd6c2c26-a870-4de8-93ba-56f2ffc49fc5", "DetectTime": "2024-05-21T12:51:06.774403+00:00", "EventTime": "2024-05-21T12:51:06.774443+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xGIF4KWAI8SW5I1g"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "6db3a02d-2724-4469-b850-08839f3ef346", "DetectTime": "2024-05-21T12:51:06.788656+00:00", "EventTime": "2024-05-21T12:51:06.788687+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6xGIF4KWAI8SW5I1g"], "accumulated_threat_level": 4.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "e7f16346-4f3f-4314-8c1a-1bbef9c4cd58", "DetectTime": "2024-05-21T12:51:06.915506+00:00", "EventTime": "2024-05-21T12:51:06.915526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAnraL3DyIsDtJTbH9"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "417092dc-97c6-4f00-80d2-d943f5006549", "DetectTime": "2024-05-21T12:51:06.942084+00:00", "EventTime": "2024-05-21T12:51:06.942107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1uaE2Cbg5Q1WBLE9"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fa9498f8-8e42-4768-82b0-455973c99410", "DetectTime": "2024-05-21T12:51:07.021235+00:00", "EventTime": "2024-05-21T12:51:07.021255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9NPx4IL1k7tnQrWe"], "accumulated_threat_level": 0.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "2021cd06-43fc-44b8-be52-37745fdfcb11", "DetectTime": "2024-05-21T12:51:07.037829+00:00", "EventTime": "2024-05-21T12:51:07.037851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLzYVP1ubiPYRXeGag"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "278ef6ef-0c36-4451-acf7-e43e7edbd038", "DetectTime": "2024-05-21T12:51:07.138825+00:00", "EventTime": "2024-05-21T12:51:07.138850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmdvr2UKLHDJVLeX1"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "257af099-51f4-49b8-bc28-8ba429f632c8", "DetectTime": "2024-05-21T12:51:07.153103+00:00", "EventTime": "2024-05-21T12:51:07.153125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmdvr2UKLHDJVLeX1"], "accumulated_threat_level": 4.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "7b21f86d-f3b1-4e75-a0a1-b7ed75e9b623", "DetectTime": "2024-05-21T12:51:07.158399+00:00", "EventTime": "2024-05-21T12:51:07.158431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9eEE14OdXCJgT7SAi"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "bd6b152b-bba9-462b-937b-bb84fc900a4d", "DetectTime": "2024-05-21T12:51:07.163740+00:00", "EventTime": "2024-05-21T12:51:07.163760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV8VAD2GE8JpQmCMLg"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "53be359f-c5a5-4cbf-b323-692f3dde5afd", "DetectTime": "2024-05-21T12:51:07.231818+00:00", "EventTime": "2024-05-21T12:51:07.231839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTCJtY34S1vybhmj9d"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "7bb4a353-80a1-4eb4-b874-b58c6a79bd59", "DetectTime": "2024-05-21T12:51:07.274089+00:00", "EventTime": "2024-05-21T12:51:07.274111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmNAgq9dlAtHvm3Xb"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "39e22ec8-e0f6-4713-ba54-f3d3b2d555ed", "DetectTime": "2024-05-21T12:51:07.293152+00:00", "EventTime": "2024-05-21T12:51:07.293174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32xyp2qGWiXdFhWA1"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "e9be8330-f497-475a-8d56-39c002e35610", "DetectTime": "2024-05-21T12:51:07.601971+00:00", "EventTime": "2024-05-21T12:51:07.601994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpB8rllSmitQ1BW9"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "24d26a99-07cc-4f28-8257-52b254aa0894", "DetectTime": "2024-05-21T12:51:07.611694+00:00", "EventTime": "2024-05-21T12:51:07.611713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CohM9H1ABRrY8M9Ywk"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fc8b2085-85cd-4026-8fd4-2694ec1b87f3", "DetectTime": "2024-05-21T12:51:07.631050+00:00", "EventTime": "2024-05-21T12:51:07.631072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9UjlP1GEbUO6drH6b"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "668c49fe-ce0a-4fe0-aa73-43b5d2d10529", "DetectTime": "2024-05-21T12:51:07.860442+00:00", "EventTime": "2024-05-21T12:51:07.860463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jlvL2QZN7dVfv4X9"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "9ce49fb5-6444-4ba1-bc52-5eb9a4402291", "DetectTime": "2024-05-21T12:51:08.148060+00:00", "EventTime": "2024-05-21T12:51:08.148081+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHJwlrsn7QauxlwQg"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fe76ea61-b6df-4384-bf00-8f500b6c8773", "DetectTime": "2024-05-21T12:51:08.152931+00:00", "EventTime": "2024-05-21T12:51:08.152950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXXqRV1APD0gJ1dleb"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "b8763226-4b69-4ab9-a5b5-a07d1ad47ac3", "DetectTime": "2024-05-21T12:51:08.213404+00:00", "EventTime": "2024-05-21T12:51:08.213426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJceq2P474XPH3sjj"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "2ddd745c-f3a4-44bc-92ba-5ba5dfaa8e7f", "DetectTime": "2024-05-21T12:51:08.223113+00:00", "EventTime": "2024-05-21T12:51:08.223134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWjJGj2f073uuJd9s2"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "dc6c1eca-78f4-417c-b430-dc8bbc3da3f5", "DetectTime": "2024-05-21T12:51:08.235279+00:00", "EventTime": "2024-05-21T12:51:08.235301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOso11PdwhtxTptl"], "accumulated_threat_level": 1.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "538394ae-eef8-4da3-9344-b2cea099f231", "DetectTime": "2024-05-21T12:51:08.251794+00:00", "EventTime": "2024-05-21T12:51:08.251816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4GNzabgfdMKe8xId"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "7f92e859-9cc8-4b3c-b085-68fb355691c1", "DetectTime": "2024-05-21T12:51:08.315003+00:00", "EventTime": "2024-05-21T12:51:08.315024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf6WX52Rv6yYViDyW3"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "c16dcfab-00a8-4de3-b05d-b571b9f8e9c4", "DetectTime": "2024-05-21T12:51:08.339437+00:00", "EventTime": "2024-05-21T12:51:08.339466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWTXb1fpEANikxNGa"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "30b2b908-31ce-4d53-a989-50c6f16cf364", "DetectTime": "2024-05-21T12:51:08.459247+00:00", "EventTime": "2024-05-21T12:51:08.459270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COEGCz28n0wzAk10e5"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "eadbf159-8498-4ce4-ad0a-abd7151879e1", "DetectTime": "2024-05-21T12:51:08.756438+00:00", "EventTime": "2024-05-21T12:51:08.756459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Wyek2ApMGPU8jeel"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "2a6961cb-fed9-4541-b1d1-c8aecba0f5b6", "DetectTime": "2024-05-21T12:51:08.761624+00:00", "EventTime": "2024-05-21T12:51:08.761646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBiS5P9RxcXrTvPD2"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "1d3328cc-9b6b-4335-9fe2-4493504d2e74", "DetectTime": "2024-05-21T12:51:08.766543+00:00", "EventTime": "2024-05-21T12:51:08.766563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPqGf61PNmVWNl0qN9"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "079e8839-7920-43ae-9f56-3383a9ef8dc7", "DetectTime": "2024-05-21T12:51:08.859608+00:00", "EventTime": "2024-05-21T12:51:08.859629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9wkkv4SwHVcbVyXH5"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "097b5533-1581-49eb-84f2-51564fc3eb08", "DetectTime": "2024-05-21T12:51:09.369191+00:00", "EventTime": "2024-05-21T12:51:09.369212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkUtd54tb3eIzMym05"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "f6f065c8-0363-464a-91e5-7038bfa6a020", "DetectTime": "2024-05-21T12:51:09.376822+00:00", "EventTime": "2024-05-21T12:51:09.376843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvHwPm3Advvh6MJWpb"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "0374bba9-1636-41f7-84bf-b5e9acd56242", "DetectTime": "2024-05-21T12:51:09.383181+00:00", "EventTime": "2024-05-21T12:51:09.383205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRj1u4Z6moK3HEW08"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "d51d7517-51d5-4267-8722-a0678dfa0787", "DetectTime": "2024-05-21T12:51:09.389315+00:00", "EventTime": "2024-05-21T12:51:09.389337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uhNx1BoDTXcjwx63"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "e0eff0ea-0ce9-4cb5-b4c0-cf513f8adeed", "DetectTime": "2024-05-21T12:51:09.394747+00:00", "EventTime": "2024-05-21T12:51:09.394767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPM2Lv1TQN0Y27Plza"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "a580846b-13d7-422c-b30f-0bf94d2519d4", "DetectTime": "2024-05-21T12:51:09.399716+00:00", "EventTime": "2024-05-21T12:51:09.399736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6APFu2sVZkWrMS7Wh"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "ee73ce05-92c8-4c62-b112-b9d3a914980b", "DetectTime": "2024-05-21T12:51:09.422287+00:00", "EventTime": "2024-05-21T12:51:09.422310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8PbYL1VWVIVy7lZTj"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "540526c5-2500-443a-aadb-adb8bc093a53", "DetectTime": "2024-05-21T12:51:09.593167+00:00", "EventTime": "2024-05-21T12:51:09.593189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKePV32vB4tl5NQ9V2"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "5f449f0e-84e0-4dda-8a28-b3043b4ec3de", "DetectTime": "2024-05-21T12:51:09.609608+00:00", "EventTime": "2024-05-21T12:51:09.609630+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Pfwc3gzUmrbLpIId"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 171} +{"Format": "IDEA0", "ID": "78ea089e-acff-4279-b48a-24460064b335", "DetectTime": "2024-05-21T12:51:09.837930+00:00", "EventTime": "2024-05-21T12:51:09.837956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CII7Bn2SeqAa1tZLc"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "a9c9a353-8eb6-418d-8720-5af90d871391", "DetectTime": "2024-05-21T12:51:09.898147+00:00", "EventTime": "2024-05-21T12:51:09.898179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4gVpv1cgzfdxPn3Wl"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "59027079-99bb-4d42-985c-55d00f3d7cd8", "DetectTime": "2024-05-21T12:51:09.939622+00:00", "EventTime": "2024-05-21T12:51:09.939644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZmU3a4ma7ynP1IV4l"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "f352e389-b64f-43cc-99e1-6413de0c3ae8", "DetectTime": "2024-05-21T12:51:10.027643+00:00", "EventTime": "2024-05-21T12:51:10.027663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxEpZ831o8YPRAtzfc"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "7db24612-60dc-4aee-9f11-23c8e9ca0213", "DetectTime": "2024-05-21T12:51:10.435624+00:00", "EventTime": "2024-05-21T12:51:10.435644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSbKMC32JDari1gxk2"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "3416c6bf-378f-450b-a55a-1fd6e7981be1", "DetectTime": "2024-05-21T12:51:10.574226+00:00", "EventTime": "2024-05-21T12:51:10.574255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDYmhOa5uNRiLON4"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "b630b24f-87af-4c41-a4e7-f6985d2191bd", "DetectTime": "2024-05-21T12:51:10.602734+00:00", "EventTime": "2024-05-21T12:51:10.602755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COeL415XQcs2uWMT4"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "4631a54e-b757-47d0-9c82-7d7fc50a8338", "DetectTime": "2024-05-21T12:51:10.607575+00:00", "EventTime": "2024-05-21T12:51:10.607594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjgDuz1HCE4V4nqcT1"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "e8e5cd08-679c-4c05-afc4-91e0215a8b9d", "DetectTime": "2024-05-21T12:51:10.670306+00:00", "EventTime": "2024-05-21T12:51:10.670329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHbJRi2DCGTfpK8jm8"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "2f43d312-55bf-489c-965a-47c051cf1660", "DetectTime": "2024-05-21T12:51:10.714244+00:00", "EventTime": "2024-05-21T12:51:10.714265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcVd9e4qhSBkgCdfkj"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "fecc7391-5e96-4e5c-acca-31332153bd65", "DetectTime": "2024-05-21T12:51:10.737676+00:00", "EventTime": "2024-05-21T12:51:10.737694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfFk93pKPuYmTtNOf"], "accumulated_threat_level": 3.2, "timewindow": 171} +{"Format": "IDEA0", "ID": "c8c601ed-b57d-4b5c-a7d1-ab24b477aced", "DetectTime": "2024-05-21T12:51:10.742524+00:00", "EventTime": "2024-05-21T12:51:10.742547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnqiuO3iHoENFky2C4"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "eed81bb5-c6b7-4bee-9b4e-f474371ae7fb", "DetectTime": "2024-05-21T12:51:11.064375+00:00", "EventTime": "2024-05-21T12:51:11.064396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAmJWT32TkAMjztq74"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "8dcdf406-6c7b-43b9-85dd-044fd1219b97", "DetectTime": "2024-05-21T12:51:11.092330+00:00", "EventTime": "2024-05-21T12:51:11.092350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtrdHq24uNmFKRAPMf"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "b2c81f28-c3b1-498a-b46e-f2a72ed1fcae", "DetectTime": "2024-05-21T12:51:11.097067+00:00", "EventTime": "2024-05-21T12:51:11.097086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipIop3Hs6r60BOk7h"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "14fd8e3e-7ad9-4a0c-9709-8dc372fe9e02", "DetectTime": "2024-05-21T12:51:11.128969+00:00", "EventTime": "2024-05-21T12:51:11.128992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cao6aT3Mr6cGJ5QPVi"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "304cfa23-1326-400f-848b-af58ab11582c", "DetectTime": "2024-05-21T12:51:11.311693+00:00", "EventTime": "2024-05-21T12:51:11.311718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBL2UqaV823nC4gb8"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "1f001f3f-7a20-45ad-b906-933971480030", "DetectTime": "2024-05-21T12:51:11.637894+00:00", "EventTime": "2024-05-21T12:51:11.637916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CARtbw138pkwSHKj37"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "9beacf94-ca8f-42e1-bf6a-d8b18a410b21", "DetectTime": "2024-05-21T12:51:11.647224+00:00", "EventTime": "2024-05-21T12:51:11.647247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWvQkb4ziEtvmsc19"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "ebe309fc-671b-49b1-a5d1-365a6de75a77", "DetectTime": "2024-05-21T12:51:11.656904+00:00", "EventTime": "2024-05-21T12:51:11.656925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcp013TQo0SAcmQG1"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "9aece338-cc97-4329-9121-156051aee4a7", "DetectTime": "2024-05-21T12:51:11.782475+00:00", "EventTime": "2024-05-21T12:51:11.782497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOInA4ewNoPDsKAvb"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "5fa9c74e-bd40-4142-8253-ec9a83be3e08", "DetectTime": "2024-05-21T12:51:11.787594+00:00", "EventTime": "2024-05-21T12:51:11.787612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnu9e7luEgGLyEcx7"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "14aa45db-3e3d-4434-9dc4-55e54053da99", "DetectTime": "2024-05-21T12:51:11.807591+00:00", "EventTime": "2024-05-21T12:51:11.807611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C21Vx5466zTyANcbT3"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "39c2f415-4879-417a-873d-b92431e571ef", "DetectTime": "2024-05-21T12:51:11.812493+00:00", "EventTime": "2024-05-21T12:51:11.812512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cI1s2gWILYDBFAt1"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "50ee97e4-2aa5-43df-a5d7-c8dbeb3c343b", "DetectTime": "2024-05-21T12:51:12.137759+00:00", "EventTime": "2024-05-21T12:51:12.137780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrk7sdiQ8TguQY2"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "44b82183-4cc3-459c-9f7c-e8392d720c53", "DetectTime": "2024-05-21T12:51:12.214633+00:00", "EventTime": "2024-05-21T12:51:12.214657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7tUiN3XtnAlaB250a"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "c902b909-9648-4f10-878b-aa3617f295a2", "DetectTime": "2024-05-21T12:51:12.321228+00:00", "EventTime": "2024-05-21T12:51:12.321249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGxVmBR6KduJrKe1"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "ddea8fd3-23fb-4f35-a2b0-65ad9bf41416", "DetectTime": "2024-05-21T12:51:12.629713+00:00", "EventTime": "2024-05-21T12:51:12.629735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK7y5x4kj3UtGN68pk"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "60d97455-9472-4099-8d7d-2b04d7c36d0c", "DetectTime": "2024-05-21T12:51:12.642432+00:00", "EventTime": "2024-05-21T12:51:12.642453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKtJEp396y2M58wYa2"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "891adbaa-37b2-4ad1-8f63-9a1ede5a1e2d", "DetectTime": "2024-05-21T12:51:12.659822+00:00", "EventTime": "2024-05-21T12:51:12.659844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcqyPg3Hgx6gKq4XI"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "9e59bc2d-98d5-4ceb-b9e7-cc4b9b5eaa31", "DetectTime": "2024-05-21T12:51:12.664958+00:00", "EventTime": "2024-05-21T12:51:12.664977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyvPBr1cj16UYtwZS5"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "3fd0aaab-9943-46c7-9f1a-fb149056475a", "DetectTime": "2024-05-21T12:51:12.709270+00:00", "EventTime": "2024-05-21T12:51:12.709292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp6nUn1vgKURk73PIg"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "9d142f5f-fbc6-4799-b463-1aaffa49585a", "DetectTime": "2024-05-21T12:51:12.831991+00:00", "EventTime": "2024-05-21T12:51:12.832012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1UnDs2Zlsbfss6x8e"], "accumulated_threat_level": 4.8, "timewindow": 170} +{"Format": "IDEA0", "ID": "7ef0365b-5ac2-41d4-87ee-49ac1b562416", "DetectTime": "2024-05-21T12:51:12.897273+00:00", "EventTime": "2024-05-21T12:51:12.897294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdSWf2DeszMq3cFM1"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "21c11eaf-1e1c-4956-81cc-8ade2ccd02d1", "DetectTime": "2024-05-21T12:51:12.928074+00:00", "EventTime": "2024-05-21T12:51:12.928096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYK3lW37GV9ovccQFb"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "8205ca35-43c5-470a-9622-98f8ca8590ac", "DetectTime": "2024-05-21T12:51:12.933610+00:00", "EventTime": "2024-05-21T12:51:12.933629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfr07Y1S2x3qjroGHj"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "ff74c9a2-3114-4dda-9331-0993129bfaaf", "DetectTime": "2024-05-21T12:51:12.940440+00:00", "EventTime": "2024-05-21T12:51:12.940459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cll9sl1MveYJ2kwVEc"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "95eec23c-64f3-439c-a861-4d2d035db5cc", "DetectTime": "2024-05-21T12:51:13.229014+00:00", "EventTime": "2024-05-21T12:51:13.229038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHpv9oBglxbZ0Ycig"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "995c31d6-3d7b-47cd-b6ac-c22932bfc1a0", "DetectTime": "2024-05-21T12:51:13.294148+00:00", "EventTime": "2024-05-21T12:51:13.294167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvz9Ub3jg2W39ltsR8"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "88e0ff83-8615-4132-9711-ff3ecc009732", "DetectTime": "2024-05-21T12:51:13.299079+00:00", "EventTime": "2024-05-21T12:51:13.299102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnuRyUiWMy8bbufi"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "91de8da8-9e4b-42cd-afcc-9e906028b5b0", "DetectTime": "2024-05-21T12:51:13.766810+00:00", "EventTime": "2024-05-21T12:51:13.766833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mH4gyDVhfoSoNLl"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "b5f5a8c8-090c-4b86-930a-7d5896491a44", "DetectTime": "2024-05-21T12:51:13.779379+00:00", "EventTime": "2024-05-21T12:51:13.779399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mH4gyDVhfoSoNLl"], "accumulated_threat_level": 5.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "3d6e978b-44ac-46ce-b59e-a2bd0363f7cd", "DetectTime": "2024-05-21T12:51:13.819833+00:00", "EventTime": "2024-05-21T12:51:13.819854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSXyrC27VO6aSUoPd6"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "aad1228c-ce93-41b6-9e7b-048ef91b017a", "DetectTime": "2024-05-21T12:51:13.847432+00:00", "EventTime": "2024-05-21T12:51:13.847453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca5Voz2K6TXOSbM343"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "c16150ef-0912-4ee6-bcbe-647b66100142", "DetectTime": "2024-05-21T12:51:13.869607+00:00", "EventTime": "2024-05-21T12:51:13.869628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crfttz1JCwZUlDlUck"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "33ab738d-e13e-4843-98b6-a6ee3e698cb4", "DetectTime": "2024-05-21T12:51:13.903698+00:00", "EventTime": "2024-05-21T12:51:13.903717+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTITHZgZjKQO0uBAa"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "e17f328b-155c-4ac0-8347-646e91253b59", "DetectTime": "2024-05-21T12:51:13.917935+00:00", "EventTime": "2024-05-21T12:51:13.917953+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTITHZgZjKQO0uBAa"], "accumulated_threat_level": 5.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "80d013b5-5600-41a5-b328-d54c2acd9380", "DetectTime": "2024-05-21T12:51:13.933077+00:00", "EventTime": "2024-05-21T12:51:13.933097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chlt674SJwwUqszwH3"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "04e8f0a6-8380-4dc5-bf1d-a44a34d0c5fc", "DetectTime": "2024-05-21T12:51:13.946955+00:00", "EventTime": "2024-05-21T12:51:13.946973+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5jRD3vyoW6Imkfzd"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "be928f97-9380-4ddf-8ffb-cdc73055e196", "DetectTime": "2024-05-21T12:51:13.961004+00:00", "EventTime": "2024-05-21T12:51:13.961022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy5jRD3vyoW6Imkfzd"], "accumulated_threat_level": 6.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "c6651c58-a663-47bd-aef0-8a7abe348872", "DetectTime": "2024-05-21T12:51:13.982271+00:00", "EventTime": "2024-05-21T12:51:13.982293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG28i11zouk1CC0NQk"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "2caaf2de-ad9a-4bd6-8070-0b7c88720ffe", "DetectTime": "2024-05-21T12:51:14.039947+00:00", "EventTime": "2024-05-21T12:51:14.039968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9wQYi2aLBpS7OwUN"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "4879ccfb-e9d0-4aa3-9b42-f94710f58d22", "DetectTime": "2024-05-21T12:51:14.046896+00:00", "EventTime": "2024-05-21T12:51:14.046920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcO8Uh2EdzOijZqJ81"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "14034134-1a82-4d39-b3f5-a3eda7278cc2", "DetectTime": "2024-05-21T12:51:14.142247+00:00", "EventTime": "2024-05-21T12:51:14.142268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRABUb23rchtJopHHj"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "382fcbb6-7b8b-4c5d-aec6-09fdaff2231e", "DetectTime": "2024-05-21T12:51:14.161897+00:00", "EventTime": "2024-05-21T12:51:14.161920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFYVi9PoaowYG4F9"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "8f69363b-1458-4bcc-9584-2536c5088f27", "DetectTime": "2024-05-21T12:51:14.182023+00:00", "EventTime": "2024-05-21T12:51:14.182044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCYn0U12BZYQVeaWj8"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "d3d2a14c-3411-4175-b10e-6a6caa951c9c", "DetectTime": "2024-05-21T12:51:14.207464+00:00", "EventTime": "2024-05-21T12:51:14.207482+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfooJ3VJBN14aAapb"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "883e0410-055a-43a4-bb88-849224343b10", "DetectTime": "2024-05-21T12:51:14.222013+00:00", "EventTime": "2024-05-21T12:51:14.222033+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBfooJ3VJBN14aAapb"], "accumulated_threat_level": 6.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "6386d0eb-3a3b-4595-bd9a-9f0d5347bc1c", "DetectTime": "2024-05-21T12:51:14.330160+00:00", "EventTime": "2024-05-21T12:51:14.330178+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFkOB1QBtb4jK54Bg"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "5f63dc4e-c90e-4ee3-baaa-2cdd9d916390", "DetectTime": "2024-05-21T12:51:14.343191+00:00", "EventTime": "2024-05-21T12:51:14.343211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeFkOB1QBtb4jK54Bg"], "accumulated_threat_level": 7.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "abdb5be2-24cf-4774-8d1d-238180efbe6e", "DetectTime": "2024-05-21T12:51:14.431995+00:00", "EventTime": "2024-05-21T12:51:14.432021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiWc51RbnkWTwqe4f"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "160d38e0-feb3-4477-8a77-1a807ee6b4ed", "DetectTime": "2024-05-21T12:51:14.518196+00:00", "EventTime": "2024-05-21T12:51:14.518218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch3StVrKbs7rDcCR"], "accumulated_threat_level": 4.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "66c85619-67d9-4ba8-b00f-10f084ba8a80", "DetectTime": "2024-05-21T12:51:14.541532+00:00", "EventTime": "2024-05-21T12:51:14.541551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvvia64y6sw0W4gayj"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "1dede5e8-78f4-4203-88ae-ed52931e7695", "DetectTime": "2024-05-21T12:51:14.732407+00:00", "EventTime": "2024-05-21T12:51:14.732425+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDPew73yLJIBoOhUAi"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "f11eb19c-aeaa-4c43-a5cb-73676c33168a", "DetectTime": "2024-05-21T12:51:14.745599+00:00", "EventTime": "2024-05-21T12:51:14.745622+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDPew73yLJIBoOhUAi"], "accumulated_threat_level": 7.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "2c26c4d5-e168-4f52-b038-f7a9965bcced", "DetectTime": "2024-05-21T12:51:14.855908+00:00", "EventTime": "2024-05-21T12:51:14.855927+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5cGR2hN2QGmA8VAd"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "30743e91-6c8a-46b3-b38d-f7b0e34a5201", "DetectTime": "2024-05-21T12:51:14.868881+00:00", "EventTime": "2024-05-21T12:51:14.868902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5cGR2hN2QGmA8VAd"], "accumulated_threat_level": 8.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "f76b7cb1-50a0-4d4b-9831-d49839208c01", "DetectTime": "2024-05-21T12:51:14.897259+00:00", "EventTime": "2024-05-21T12:51:14.897277+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccw3nC4UPSQtDBoFr2"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "420227b8-49ba-4ac8-bc2b-0b01e15cf612", "DetectTime": "2024-05-21T12:51:14.912010+00:00", "EventTime": "2024-05-21T12:51:14.912034+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccw3nC4UPSQtDBoFr2"], "accumulated_threat_level": 8.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "c9b6b338-2257-4ab2-9628-afaae3882dc7", "DetectTime": "2024-05-21T12:51:14.941141+00:00", "EventTime": "2024-05-21T12:51:14.941166+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMZWe2Rniif33poCe"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "1b7ae6f2-afdd-45c2-846a-37fe9a8be298", "DetectTime": "2024-05-21T12:51:14.954512+00:00", "EventTime": "2024-05-21T12:51:14.954530+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMZWe2Rniif33poCe"], "accumulated_threat_level": 9.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "cd4307bc-50f7-4c03-ae9b-f50df3e71471", "DetectTime": "2024-05-21T12:51:14.967007+00:00", "EventTime": "2024-05-21T12:51:14.967030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkygYm4ji70hUe7s72"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "8c919a4c-c958-4e5f-b6ca-4cea1f451417", "DetectTime": "2024-05-21T12:51:14.980252+00:00", "EventTime": "2024-05-21T12:51:14.980271+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbA8G1G0Pg5zOeyNd"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "4aa922c9-07b6-441d-a22e-6e5070f26345", "DetectTime": "2024-05-21T12:51:14.996457+00:00", "EventTime": "2024-05-21T12:51:14.996483+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbA8G1G0Pg5zOeyNd"], "accumulated_threat_level": 9.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "d825b6f1-ea76-4a1b-8650-c23112f16877", "DetectTime": "2024-05-21T12:51:15.004698+00:00", "EventTime": "2024-05-21T12:51:15.004723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsnhz36T1V9vVHXbk"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "5d82b1d7-9c64-4bc5-b1ef-75719c083a08", "DetectTime": "2024-05-21T12:51:15.011658+00:00", "EventTime": "2024-05-21T12:51:15.011680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWksgAeNeiU6fF0uf"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "fbd75018-f898-45b7-b1a6-ab49f74b28bf", "DetectTime": "2024-05-21T12:51:15.028254+00:00", "EventTime": "2024-05-21T12:51:15.028283+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwD41p1chGbMPdkfE4"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "419c1b5b-6060-46f7-930b-70ab824a6806", "DetectTime": "2024-05-21T12:51:15.043150+00:00", "EventTime": "2024-05-21T12:51:15.043179+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwD41p1chGbMPdkfE4"], "accumulated_threat_level": 10.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "465e1719-1197-4835-8477-b79a95b15903", "DetectTime": "2024-05-21T12:51:15.049044+00:00", "EventTime": "2024-05-21T12:51:15.049063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuhwF13Zkucre4jRyk"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "ab9a8242-ebca-4605-a926-840e8210c9ab", "DetectTime": "2024-05-21T12:51:15.075786+00:00", "EventTime": "2024-05-21T12:51:15.075807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNp3j1BT7KPlDAsVl"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "4225df6f-b61a-4634-853f-a6883c36e6ea", "DetectTime": "2024-05-21T12:51:15.184259+00:00", "EventTime": "2024-05-21T12:51:15.184280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwnBYZ2XDn3yZneZ8"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "707f1f4e-26ba-4fa9-a129-ce724c4acd57", "DetectTime": "2024-05-21T12:51:15.189774+00:00", "EventTime": "2024-05-21T12:51:15.189795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccg2YT3bKKWrEWDO6"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "78ed0991-06a3-4da4-aec8-2c79694efd62", "DetectTime": "2024-05-21T12:51:15.299226+00:00", "EventTime": "2024-05-21T12:51:15.299248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cif7V46VZ3wd8uR0f"], "accumulated_threat_level": 5.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "6e44712a-7717-4097-83a9-cfd1cff767c8", "DetectTime": "2024-05-21T12:51:15.469607+00:00", "EventTime": "2024-05-21T12:51:15.469624+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQM142SaJNYkt48ci"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "432f9e5d-4d64-48e0-9433-78d955b49f33", "DetectTime": "2024-05-21T12:51:15.482658+00:00", "EventTime": "2024-05-21T12:51:15.482706+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpQM142SaJNYkt48ci"], "accumulated_threat_level": 10.5, "timewindow": 39} +{"Format": "IDEA0", "ID": "3aee9d09-0c94-4a9d-ae37-76e2fd39c033", "DetectTime": "2024-05-21T12:51:15.645284+00:00", "EventTime": "2024-05-21T12:51:15.645303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0eXlZ1C7Vecob9L1k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "d8cc115a-4e93-47ca-afe6-c3646ecc888a", "DetectTime": "2024-05-21T12:51:15.745898+00:00", "EventTime": "2024-05-21T12:51:15.745919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJkns4uElSAz65ZAa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "fb8d723f-67b9-49b9-bc96-93140faae9c3", "DetectTime": "2024-05-21T12:51:15.752060+00:00", "EventTime": "2024-05-21T12:51:15.752079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0dGtD167KTE3mZKf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "c4d1fa5f-28c6-49ea-a85e-fccb09421502", "DetectTime": "2024-05-21T12:51:15.780662+00:00", "EventTime": "2024-05-21T12:51:15.780685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBZfqs43QXCqGrVon6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 171} +{"Format": "IDEA0", "ID": "5786452b-f6c8-4946-97c6-e1c2cd9334fd", "DetectTime": "2024-05-21T12:51:15.852776+00:00", "EventTime": "2024-05-21T12:51:15.852795+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAm9j4zQuuXyMaATf"], "accumulated_threat_level": 0, "timewindow": 39} +{"Format": "IDEA0", "ID": "b34ad4c7-ec06-48c8-be53-ac456d94aaef", "DetectTime": "2024-05-21T12:51:15.866551+00:00", "EventTime": "2024-05-21T12:51:15.866572+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdAm9j4zQuuXyMaATf"], "accumulated_threat_level": 11.0, "timewindow": 39} +{"Format": "IDEA0", "ID": "7fc382fc-4381-4818-af52-b3fb12681e53", "DetectTime": "2024-05-21T12:51:16.205282+00:00", "EventTime": "2024-05-21T12:51:16.205302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csklj926Sx6OnzOiM6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "1641ed2f-c669-4e2c-a562-385c2ab4cf91", "DetectTime": "2024-05-21T12:51:16.252582+00:00", "EventTime": "2024-05-21T12:51:16.252603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfNYBWpGJPyMFkfYh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "65642d34-f050-441f-83d0-2ba9aa59d35f", "DetectTime": "2024-05-21T12:51:16.257411+00:00", "EventTime": "2024-05-21T12:51:16.257430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqcvHQ2okvs4rPmFdi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "9eaaef9f-c957-4687-9bc2-3daa16a692d1", "DetectTime": "2024-05-21T12:51:16.340221+00:00", "EventTime": "2024-05-21T12:51:16.340241+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1aROR1fNnj6cWDTh1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "c841d581-dd69-4ee3-90ac-6a5b45bdea8e", "DetectTime": "2024-05-21T12:51:16.391484+00:00", "EventTime": "2024-05-21T12:51:16.391503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMyT24CuupljKOTD"], "accumulated_threat_level": 8.799999999999999, "timewindow": 171} +{"Format": "IDEA0", "ID": "5492f77a-641b-4cab-800e-7fbcae889b0a", "DetectTime": "2024-05-21T12:51:16.443759+00:00", "EventTime": "2024-05-21T12:51:16.443778+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQw9W923eeCdWMeIhk"], "accumulated_threat_level": 9.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "6e6c824d-691b-498e-9b18-494ed307f69c", "DetectTime": "2024-05-21T12:51:16.475887+00:00", "EventTime": "2024-05-21T12:51:16.475908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u3yX1HG5jI0v1Wjg"], "accumulated_threat_level": 9.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "914c6dcd-4eba-434b-8a38-4492750a5ef3", "DetectTime": "2024-05-21T12:51:16.771579+00:00", "EventTime": "2024-05-21T12:51:16.771599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ZeTsSAVgWBFwbpg"], "accumulated_threat_level": 10.4, "timewindow": 171} +{"Format": "IDEA0", "ID": "1c972b29-5003-423b-9abb-530389a3b8cd", "DetectTime": "2024-05-21T12:51:16.790047+00:00", "EventTime": "2024-05-21T12:51:16.790070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoQkd411z9hVJnrYy4"], "accumulated_threat_level": 10.4, "timewindow": 171} +{"Format": "IDEA0", "ID": "95e7430b-7672-44aa-b2cb-92a50dce3ea2", "DetectTime": "2024-05-21T12:51:16.851104+00:00", "EventTime": "2024-05-21T12:51:16.851123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chy2VU12DuACifuZdl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 171} +{"Format": "IDEA0", "ID": "c1080de6-13ca-4b10-ac0b-e29c56589de9", "DetectTime": "2024-05-21T12:51:16.898591+00:00", "EventTime": "2024-05-21T12:51:16.898612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8flT3ThOQXL5DJah"], "accumulated_threat_level": 12.000000000000002, "timewindow": 171} +{"Format": "Json", "ID": "c1080de6-13ca-4b10-ac0b-e29c56589de9", "DetectTime": "2024-05-21T12:51:16.898591+00:00", "EventTime": "2024-05-21T12:51:16.898612+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T02:37:06.206207+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 171. (real time 2024/05/21 12:51:17.177443)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 171, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "af8f4bdc-d28b-4cc2-a057-b7c1bfa0a582", "DetectTime": "2024-05-21T12:51:17.195649+00:00", "EventTime": "2024-05-21T12:51:17.195668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMcGE3iUMHAjEQam6"], "accumulated_threat_level": 0.8, "timewindow": 171} +{"Format": "IDEA0", "ID": "0352c2fb-eb6c-41dc-bbc4-2f6c53a92bde", "DetectTime": "2024-05-21T12:51:17.207567+00:00", "EventTime": "2024-05-21T12:51:17.207589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHmc21hQ47gEqIAak"], "accumulated_threat_level": 1.6, "timewindow": 171} +{"Format": "IDEA0", "ID": "a479ffff-f232-4432-aec0-a304af737ab6", "DetectTime": "2024-05-21T12:51:17.219479+00:00", "EventTime": "2024-05-21T12:51:17.219499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcE4Ny1UvRgZphLir6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 171} +{"Format": "IDEA0", "ID": "e3d01173-e796-4991-8b3b-668811e0e156", "DetectTime": "2024-05-21T12:51:17.306317+00:00", "EventTime": "2024-05-21T12:51:17.306339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvLGl91Tn8EuF7XMpa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 171} +{"Format": "IDEA0", "ID": "ae3a899c-e68e-489d-9b73-79965cc389b2", "DetectTime": "2024-05-21T12:51:17.354334+00:00", "EventTime": "2024-05-21T12:51:17.354354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6BrQF1fj8aDGrSJr4"], "accumulated_threat_level": 3.2, "timewindow": 171} +{"Format": "IDEA0", "ID": "e6afdad1-5b73-41e2-9200-f0eb22991393", "DetectTime": "2024-05-21T12:51:17.429641+00:00", "EventTime": "2024-05-21T12:51:17.429662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjyrXk4NjLM1SoW2kk"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "8fef6b53-78cf-450b-b8c8-0a8d807bf89d", "DetectTime": "2024-05-21T12:51:17.448720+00:00", "EventTime": "2024-05-21T12:51:17.448740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLkdZM9TRJpPZd5Xa", "Calulu3ZC5x74wnByl", "CBXXly2gnu9EOdOmfl", "CsOszS11lRmg06iIC7"], "accumulated_threat_level": 0.5, "timewindow": 189} +{"Format": "IDEA0", "ID": "fbd4153d-6a57-4c16-82af-a215db34367c", "DetectTime": "2024-05-21T12:51:17.504880+00:00", "EventTime": "2024-05-21T12:51:17.504898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpwDKd2Uo62Pza4tt1"], "accumulated_threat_level": 0.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "c5897305-76e4-4456-9222-b748f507bad8", "DetectTime": "2024-05-21T12:51:17.558950+00:00", "EventTime": "2024-05-21T12:51:17.558970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwNnx82y6uWRp6FfA9"], "accumulated_threat_level": 1.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "f2614b3d-1f25-43eb-9802-cbd32e40ccf1", "DetectTime": "2024-05-21T12:51:17.608592+00:00", "EventTime": "2024-05-21T12:51:17.608610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cad4x92WRC1jUlmLSd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 172} +{"Format": "IDEA0", "ID": "065ace0a-e939-4603-85ee-adf0349ac612", "DetectTime": "2024-05-21T12:51:17.768721+00:00", "EventTime": "2024-05-21T12:51:17.768740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfcsWJ1DbM6Vioggdb"], "accumulated_threat_level": 3.2, "timewindow": 172} +{"Format": "IDEA0", "ID": "7428e152-be37-43b0-83eb-af77b2df44c5", "DetectTime": "2024-05-21T12:51:18.012589+00:00", "EventTime": "2024-05-21T12:51:18.012613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChcoCDmONwaPfyIQ7"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "100708d9-145a-463b-a1e9-e3c17cb9822f", "DetectTime": "2024-05-21T12:51:18.073106+00:00", "EventTime": "2024-05-21T12:51:18.073125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64a8d12f5TLxLZCQg"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "07d8a7de-da72-4e85-abbb-d5c4f8537751", "DetectTime": "2024-05-21T12:51:18.124346+00:00", "EventTime": "2024-05-21T12:51:18.124365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJSx5o1X9JE3cyIL1"], "accumulated_threat_level": 4.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "edebb54b-354f-4a23-a4be-f9f00bfef6a3", "DetectTime": "2024-05-21T12:51:18.176442+00:00", "EventTime": "2024-05-21T12:51:18.176460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C89KoE1zjAQU8wF9C8"], "accumulated_threat_level": 5.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "e338dadc-e403-4f93-bee1-784213ea858d", "DetectTime": "2024-05-21T12:51:18.230127+00:00", "EventTime": "2024-05-21T12:51:18.230147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh4Q12BKzuM8x33Ce"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 172} +{"Format": "IDEA0", "ID": "b748e280-5a43-4bed-8fd7-131333f7ea42", "DetectTime": "2024-05-21T12:51:18.280573+00:00", "EventTime": "2024-05-21T12:51:18.280593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvTMaO1aONpfVSkVbf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "c94741a1-1b96-45ed-a627-b57942933e94", "DetectTime": "2024-05-21T12:51:18.332079+00:00", "EventTime": "2024-05-21T12:51:18.332096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rz7w2Jb1bYWRjm1h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "f2632e45-1234-4c9d-907e-44077f9e9a94", "DetectTime": "2024-05-21T12:51:18.547044+00:00", "EventTime": "2024-05-21T12:51:18.547073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY600s3Yppa6Klpkd5"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "2d56ce18-df70-47b7-85bd-3577b280ea54", "DetectTime": "2024-05-21T12:51:18.596669+00:00", "EventTime": "2024-05-21T12:51:18.596690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkH7Z2X1GeDq47vZ6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "7b4a880e-0ecc-4e76-a828-c89ce9a5e48b", "DetectTime": "2024-05-21T12:51:18.641472+00:00", "EventTime": "2024-05-21T12:51:18.641490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co80HF2zPZ1NVsOBi2"], "accumulated_threat_level": 9.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "ce56aa7e-ef19-4f3c-b688-a536227c1af1", "DetectTime": "2024-05-21T12:51:18.692916+00:00", "EventTime": "2024-05-21T12:51:18.692934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LxjZSPT2mLQ9i04"], "accumulated_threat_level": 10.4, "timewindow": 172} +{"Format": "IDEA0", "ID": "291b474b-41fb-44e9-95a1-4e0fd18ca792", "DetectTime": "2024-05-21T12:51:18.744766+00:00", "EventTime": "2024-05-21T12:51:18.744785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNkR12V55ir3d7Vr8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 172} +{"Format": "IDEA0", "ID": "25721e8a-41bf-412a-9499-30aa15d01a09", "DetectTime": "2024-05-21T12:51:18.795323+00:00", "EventTime": "2024-05-21T12:51:18.795342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FEYs1EWXIyBT9tef"], "accumulated_threat_level": 12.000000000000002, "timewindow": 172} +{"Format": "Json", "ID": "25721e8a-41bf-412a-9499-30aa15d01a09", "DetectTime": "2024-05-21T12:51:18.795323+00:00", "EventTime": "2024-05-21T12:51:18.795342+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-08T03:07:33.945386+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2024/05/21 12:51:18.953051)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 172, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "73b4423c-8f78-42bb-8a85-f18ec351ff3d", "DetectTime": "2024-05-21T12:51:18.966057+00:00", "EventTime": "2024-05-21T12:51:18.966093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ciq94rcJLpNX24t9"], "accumulated_threat_level": 0.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "a8a7e5d9-d4fd-4567-83ec-8b4cf3d00196", "DetectTime": "2024-05-21T12:51:19.151055+00:00", "EventTime": "2024-05-21T12:51:19.151093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbI3Te4CRGkgqDaikd"], "accumulated_threat_level": 1.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "3f861479-b152-4627-9c41-5d1e90e74048", "DetectTime": "2024-05-21T12:51:19.156849+00:00", "EventTime": "2024-05-21T12:51:19.156871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COHeZc1UolHLpCuaS9"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "2dc808ae-4e8e-43f5-a4dc-12353f3020bf", "DetectTime": "2024-05-21T12:51:19.226339+00:00", "EventTime": "2024-05-21T12:51:19.226358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6mwwDlzKz6E8Buk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 172} +{"Format": "IDEA0", "ID": "599f9afb-a385-480e-8d5a-47d36ea1ecfe", "DetectTime": "2024-05-21T12:51:19.279335+00:00", "EventTime": "2024-05-21T12:51:19.279356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cen0x2A84DBOEF5f"], "accumulated_threat_level": 3.2, "timewindow": 172} +{"Format": "IDEA0", "ID": "b3666fa3-7c9c-473b-a77e-15c964112974", "DetectTime": "2024-05-21T12:51:19.325980+00:00", "EventTime": "2024-05-21T12:51:19.326001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtrDXKEPbleXCYlh"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "29d37bda-0724-4bda-b0ab-5c45f38fa6ec", "DetectTime": "2024-05-21T12:51:19.378582+00:00", "EventTime": "2024-05-21T12:51:19.378604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvC6o2qozGeACHoH1"], "accumulated_threat_level": 4.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "f9b53ea7-470b-4a5a-94a8-9db092290a30", "DetectTime": "2024-05-21T12:51:19.430870+00:00", "EventTime": "2024-05-21T12:51:19.430893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAY4c1Nv2LBmr2JK5"], "accumulated_threat_level": 5.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "8654b1e4-205b-4ab0-80a6-457f43d769c6", "DetectTime": "2024-05-21T12:51:19.492091+00:00", "EventTime": "2024-05-21T12:51:19.492117+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2Z8sT9bZoOLMIK8"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "92a650c7-cb60-4816-8907-6803f011af9c", "DetectTime": "2024-05-21T12:51:19.506619+00:00", "EventTime": "2024-05-21T12:51:19.506645+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf2Z8sT9bZoOLMIK8"], "accumulated_threat_level": 8.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "f1f68b58-078e-4034-95af-ef93ddd273c5", "DetectTime": "2024-05-21T12:51:19.544619+00:00", "EventTime": "2024-05-21T12:51:19.544643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cryw0d3kRNL4Fgglb6"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "e6809908-39be-49a8-a5a1-32fae8cd968b", "DetectTime": "2024-05-21T12:51:19.557895+00:00", "EventTime": "2024-05-21T12:51:19.557916+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cryw0d3kRNL4Fgglb6"], "accumulated_threat_level": 9.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "23f0d901-93ae-4d2d-a641-d674a9e832ae", "DetectTime": "2024-05-21T12:51:19.664581+00:00", "EventTime": "2024-05-21T12:51:19.664608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZsNM3U4dHvOSqVmj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 172} +{"Format": "IDEA0", "ID": "022f0f67-28c3-4dce-97a7-2317fc8a6ef8", "DetectTime": "2024-05-21T12:51:19.677813+00:00", "EventTime": "2024-05-21T12:51:19.677835+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR40tv1nApHNxfc9Md"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "705ad586-e786-4b52-940f-5a9e0166ab7d", "DetectTime": "2024-05-21T12:51:19.692396+00:00", "EventTime": "2024-05-21T12:51:19.692419+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR40tv1nApHNxfc9Md"], "accumulated_threat_level": 9.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "5d82f22a-af6a-40bc-b928-17cf717425c1", "DetectTime": "2024-05-21T12:51:19.708930+00:00", "EventTime": "2024-05-21T12:51:19.708952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AHZM303rimCb73me"], "accumulated_threat_level": 7.199999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "30e07dd7-134e-4193-a3c5-dd4aa4ac773f", "DetectTime": "2024-05-21T12:51:19.767539+00:00", "EventTime": "2024-05-21T12:51:19.767562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDzx7lwoTI2ebVLLj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "b6308693-071c-4f1f-b727-7496fea7de1f", "DetectTime": "2024-05-21T12:51:19.773373+00:00", "EventTime": "2024-05-21T12:51:19.773397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNdNT28mj0jD6NX79"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "564b5d53-408c-4816-a401-2fb6b1f7ef82", "DetectTime": "2024-05-21T12:51:19.798306+00:00", "EventTime": "2024-05-21T12:51:19.798325+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEbCAwkaclpCTQH"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "cfb64cc7-6ab0-471b-a5cd-b9e15e0f5a42", "DetectTime": "2024-05-21T12:51:19.813624+00:00", "EventTime": "2024-05-21T12:51:19.813656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEbCAwkaclpCTQH"], "accumulated_threat_level": 10.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "94be8941-748a-4b4d-b6b8-d1f50cc9f658", "DetectTime": "2024-05-21T12:51:19.947099+00:00", "EventTime": "2024-05-21T12:51:19.947124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymgPLtNxgxKodK8i"], "accumulated_threat_level": 8.799999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "d90fc3c9-615f-46c5-a741-382d5af08a9e", "DetectTime": "2024-05-21T12:51:19.986441+00:00", "EventTime": "2024-05-21T12:51:19.986464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWirzi4OuYE8aCprGd"], "accumulated_threat_level": 9.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "d4390198-b241-4e3c-8356-e42dbbff8991", "DetectTime": "2024-05-21T12:51:20.036626+00:00", "EventTime": "2024-05-21T12:51:20.036647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGU6ON1sRjRJ4Wu5bg"], "accumulated_threat_level": 10.4, "timewindow": 172} +{"Format": "IDEA0", "ID": "8b4bbec0-80ed-4379-a63c-ae7f4764517b", "DetectTime": "2024-05-21T12:51:20.264215+00:00", "EventTime": "2024-05-21T12:51:20.264235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZK5w4pnNY8jvB8H8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 172} +{"Format": "IDEA0", "ID": "6d6134f1-bc88-41f6-a082-47f99102f021", "DetectTime": "2024-05-21T12:51:20.313128+00:00", "EventTime": "2024-05-21T12:51:20.313149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyaNYO1soRI1owngS2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 172} +{"Format": "Json", "ID": "6d6134f1-bc88-41f6-a082-47f99102f021", "DetectTime": "2024-05-21T12:51:20.313128+00:00", "EventTime": "2024-05-21T12:51:20.313149+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-08T03:07:37.432976+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2024/05/21 12:51:20.646149)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 172, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "46293d07-40ec-4bbc-9c64-7a3d3d81cd7b", "DetectTime": "2024-05-21T12:51:20.656889+00:00", "EventTime": "2024-05-21T12:51:20.656907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VT5r2KpkcxqhALua"], "accumulated_threat_level": 0.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "617ddcd4-0cdd-471d-9250-6dd4f20dd016", "DetectTime": "2024-05-21T12:51:20.667687+00:00", "EventTime": "2024-05-21T12:51:20.667705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb6Krd2aXU2lp6f0Ab"], "accumulated_threat_level": 1.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "fd7b0887-4e3a-4d7f-b7cc-280d8911f021", "DetectTime": "2024-05-21T12:51:20.672368+00:00", "EventTime": "2024-05-21T12:51:20.672385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzaUlp2xf1E9aMS6pj"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "7d0647b7-e882-4fdf-a980-ee14c0a3a978", "DetectTime": "2024-05-21T12:51:20.684020+00:00", "EventTime": "2024-05-21T12:51:20.684037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyf7W04LpC5JDHwES8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 172} +{"Format": "IDEA0", "ID": "a2bb0273-488b-45a3-98f9-856c62c5a5c4", "DetectTime": "2024-05-21T12:51:20.694642+00:00", "EventTime": "2024-05-21T12:51:20.694660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYehM3TRoBtSHTdph"], "accumulated_threat_level": 3.2, "timewindow": 172} +{"Format": "IDEA0", "ID": "bf546400-6929-4b63-92ba-92c955ea94a4", "DetectTime": "2024-05-21T12:51:20.933681+00:00", "EventTime": "2024-05-21T12:51:20.933702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdXxPTIgPvWDFIe5"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "37273031-d467-40f5-9d80-afe048ce8be3", "DetectTime": "2024-05-21T12:51:20.987596+00:00", "EventTime": "2024-05-21T12:51:20.987619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9uIh3MulctBsRzO5"], "accumulated_threat_level": 4.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "158d4ed5-99c1-474a-80cf-b7bfe8a3268e", "DetectTime": "2024-05-21T12:51:21.038274+00:00", "EventTime": "2024-05-21T12:51:21.038295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZRCO2djRAHmxqVd9"], "accumulated_threat_level": 5.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "4d44b653-5c2a-4e7f-a8db-adf8ff132af7", "DetectTime": "2024-05-21T12:51:21.091350+00:00", "EventTime": "2024-05-21T12:51:21.091370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBNQiA1vBHUj0YY5V"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 172} +{"Format": "IDEA0", "ID": "fbc234ba-0eba-4256-bfa0-b9e9015be696", "DetectTime": "2024-05-21T12:51:21.141888+00:00", "EventTime": "2024-05-21T12:51:21.141912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8z8f3qgWmPn6cT13"], "accumulated_threat_level": 7.199999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "cede851c-7013-4afc-a15d-a052507c1323", "DetectTime": "2024-05-21T12:51:21.196908+00:00", "EventTime": "2024-05-21T12:51:21.196939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGRwrMWqwryKdPNE3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "d8818a96-7ad7-4038-b0a1-49bf75b5e671", "DetectTime": "2024-05-21T12:51:21.252182+00:00", "EventTime": "2024-05-21T12:51:21.252202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COpHH4rp8xYw0Uzuc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "3203020c-3ae3-452c-a20e-95ac7fa0c29f", "DetectTime": "2024-05-21T12:51:21.512555+00:00", "EventTime": "2024-05-21T12:51:21.512578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEqzCN9O5AtCTj2Ug"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "82b5a553-7903-427a-9e59-bbeeef0cbe9e", "DetectTime": "2024-05-21T12:51:21.561889+00:00", "EventTime": "2024-05-21T12:51:21.561935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ZK6X34mBh3xrV4zc"], "accumulated_threat_level": 9.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "d7fce2c3-f510-42e2-bf55-d5300d75233a", "DetectTime": "2024-05-21T12:51:21.615762+00:00", "EventTime": "2024-05-21T12:51:21.615780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8FpO3zCx1Vrf5rBh"], "accumulated_threat_level": 10.4, "timewindow": 172} +{"Format": "IDEA0", "ID": "b992f331-63ad-4f5a-bf4c-75b3ff63cf1f", "DetectTime": "2024-05-21T12:51:21.663612+00:00", "EventTime": "2024-05-21T12:51:21.663631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDrJI1z5pXqMkbeM9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 172} +{"Format": "IDEA0", "ID": "51ac5b7c-fa23-491b-859e-bf9749ca4a44", "DetectTime": "2024-05-21T12:51:21.720211+00:00", "EventTime": "2024-05-21T12:51:21.720248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtdX94aEXFPRzS1t8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 172} +{"Format": "Json", "ID": "51ac5b7c-fa23-491b-859e-bf9749ca4a44", "DetectTime": "2024-05-21T12:51:21.720211+00:00", "EventTime": "2024-05-21T12:51:21.720248+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "1970-01-08T03:38:26.256572+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2024/05/21 12:51:21.917566)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 172, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2246e2a9-289d-41b2-a5fa-8812db88da8e", "DetectTime": "2024-05-21T12:51:21.933027+00:00", "EventTime": "2024-05-21T12:51:21.933061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAnujt1Mgiq0PWYjNg"], "accumulated_threat_level": 0.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "eeadb97b-f394-4845-9778-2b9bd881ed7b", "DetectTime": "2024-05-21T12:51:21.945458+00:00", "EventTime": "2024-05-21T12:51:21.945493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZ0Vr2NxrmadUzVSa"], "accumulated_threat_level": 1.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "ec7d32c0-ddd1-47e2-8915-8bed8d63e238", "DetectTime": "2024-05-21T12:51:22.101293+00:00", "EventTime": "2024-05-21T12:51:22.101326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFb6th4VwbcWqAhHyk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 172} +{"Format": "IDEA0", "ID": "b51a223c-5589-48f1-9119-ebdce8a7605f", "DetectTime": "2024-05-21T12:51:22.158521+00:00", "EventTime": "2024-05-21T12:51:22.158559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpTz84bnpgtOM6vc1"], "accumulated_threat_level": 3.2, "timewindow": 172} +{"Format": "IDEA0", "ID": "ad362b56-eeec-4d55-8f18-52eca213b78a", "DetectTime": "2024-05-21T12:51:22.205176+00:00", "EventTime": "2024-05-21T12:51:22.205211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Zg9B6fSzQXe03Yb"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "acfeb6d8-604b-494d-8884-686f22923144", "DetectTime": "2024-05-21T12:51:22.263200+00:00", "EventTime": "2024-05-21T12:51:22.263234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crvjim1O3OszoH0Fu6"], "accumulated_threat_level": 4.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "4903010a-eb1a-40ae-8f96-c92384f550a7", "DetectTime": "2024-05-21T12:51:22.313802+00:00", "EventTime": "2024-05-21T12:51:22.313831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBWdY3e30OztDetf4"], "accumulated_threat_level": 5.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "e70c98f6-0eeb-43ab-a829-bc525a313e39", "DetectTime": "2024-05-21T12:51:22.366472+00:00", "EventTime": "2024-05-21T12:51:22.366507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP0QZL2MjW8XAv4L28"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 172} +{"Format": "IDEA0", "ID": "057d92b8-6bae-474f-a5b9-2862e23e7382", "DetectTime": "2024-05-21T12:51:22.420489+00:00", "EventTime": "2024-05-21T12:51:22.420526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvFKgi40djnSNPm2C1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "7af901fe-91e6-4005-b386-46b0ae0b6eb0", "DetectTime": "2024-05-21T12:51:22.685140+00:00", "EventTime": "2024-05-21T12:51:22.685175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcaX346yUj705Xrt9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "57861cfc-5bcf-461c-8660-65b64ce5eda6", "DetectTime": "2024-05-21T12:51:22.744411+00:00", "EventTime": "2024-05-21T12:51:22.744447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mNT3jrOA9O0IEGc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 172} +{"Format": "IDEA0", "ID": "8ce3d59d-0509-427d-af9a-231432736222", "DetectTime": "2024-05-21T12:51:22.799932+00:00", "EventTime": "2024-05-21T12:51:22.799968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPcn3N2mWf5aVpEPj6"], "accumulated_threat_level": 9.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "87cda5f2-f384-41fe-9d07-ba00ec53b060", "DetectTime": "2024-05-21T12:51:22.868176+00:00", "EventTime": "2024-05-21T12:51:22.868219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchjNy4jDuHeqhn0o5"], "accumulated_threat_level": 10.4, "timewindow": 172} +{"Format": "IDEA0", "ID": "d29d3875-f51d-4373-9fa0-c1a8be110823", "DetectTime": "2024-05-21T12:51:22.874258+00:00", "EventTime": "2024-05-21T12:51:22.874283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG9NPx4IL1k7tnQrWe"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "dda33e45-9bb9-44bd-b51d-e8ef6b86904f", "DetectTime": "2024-05-21T12:51:22.947707+00:00", "EventTime": "2024-05-21T12:51:22.947741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CddYoZ1oOcmVsonw53"], "accumulated_threat_level": 11.200000000000001, "timewindow": 172} +{"Format": "IDEA0", "ID": "4ca31ab1-b618-4443-bc7d-c0199e28b3cb", "DetectTime": "2024-05-21T12:51:22.997994+00:00", "EventTime": "2024-05-21T12:51:22.998031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDMlD213jgS82htGl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 172} +{"Format": "Json", "ID": "4ca31ab1-b618-4443-bc7d-c0199e28b3cb", "DetectTime": "2024-05-21T12:51:22.997994+00:00", "EventTime": "2024-05-21T12:51:22.998031+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T03:38:29.845107+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 172. (real time 2024/05/21 12:51:23.216154)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 172, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b7d35f6b-4d78-47b7-afbd-d8362c4ac755", "DetectTime": "2024-05-21T12:51:23.230000+00:00", "EventTime": "2024-05-21T12:51:23.230022+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjIzM1jqvnmNymfVk"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "577c031b-2cc8-4034-aeca-d9e1a7ca0706", "DetectTime": "2024-05-21T12:51:23.245874+00:00", "EventTime": "2024-05-21T12:51:23.245902+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjIzM1jqvnmNymfVk"], "accumulated_threat_level": 10.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "4cc0c82d-a32f-41d1-97df-f639fa8f7e00", "DetectTime": "2024-05-21T12:51:23.260788+00:00", "EventTime": "2024-05-21T12:51:23.260812+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3858C33DpioC8JzH8"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "257678f2-fb71-4330-bfda-3b9558809781", "DetectTime": "2024-05-21T12:51:23.275030+00:00", "EventTime": "2024-05-21T12:51:23.275062+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3858C33DpioC8JzH8"], "accumulated_threat_level": 11.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "a62225bd-ba01-4a7d-9125-d3156050ecbf", "DetectTime": "2024-05-21T12:51:23.288326+00:00", "EventTime": "2024-05-21T12:51:23.288353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CprsyFPHh9sDUWB44"], "accumulated_threat_level": 0.8, "timewindow": 172} +{"Format": "IDEA0", "ID": "57775c09-aa89-49e4-a331-23917c808374", "DetectTime": "2024-05-21T12:51:23.328291+00:00", "EventTime": "2024-05-21T12:51:23.328327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csw1OjFk51J84SZE7"], "accumulated_threat_level": 1.6, "timewindow": 172} +{"Format": "IDEA0", "ID": "0ab28e4a-152d-40c4-b165-fb8a6e91744b", "DetectTime": "2024-05-21T12:51:23.380902+00:00", "EventTime": "2024-05-21T12:51:23.380938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadEmUfRatTZSDKL3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 172} +{"Format": "IDEA0", "ID": "12eba252-56dd-4f7e-8150-69a99f8a9881", "DetectTime": "2024-05-21T12:51:23.432740+00:00", "EventTime": "2024-05-21T12:51:23.432775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9X0wn4EeZPrjTm4Qe"], "accumulated_threat_level": 3.2, "timewindow": 172} +{"Format": "IDEA0", "ID": "9c443afa-aa57-4f47-b369-84252d53fa8c", "DetectTime": "2024-05-21T12:51:23.521655+00:00", "EventTime": "2024-05-21T12:51:23.521688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcyNh3EyZ910KbGo"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "509faa0c-a9c9-421f-9a79-a8a788f75572", "DetectTime": "2024-05-21T12:51:23.554920+00:00", "EventTime": "2024-05-21T12:51:23.554940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wQAr3ng6v15wjIC5"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "7133640d-2d60-42f5-bb16-d2e67d95bb13", "DetectTime": "2024-05-21T12:51:23.569788+00:00", "EventTime": "2024-05-21T12:51:23.569815+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wQAr3ng6v15wjIC5"], "accumulated_threat_level": 11.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "dd753bc3-9edc-4536-b9be-ef70ef368808", "DetectTime": "2024-05-21T12:51:23.587262+00:00", "EventTime": "2024-05-21T12:51:23.587295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUMDU375IIcevBdl"], "accumulated_threat_level": 0.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "0c1f49d7-2a05-4fa8-a7fd-e2a5fc87b75c", "DetectTime": "2024-05-21T12:51:23.602007+00:00", "EventTime": "2024-05-21T12:51:23.602026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQDdH6kZ4sVscse1"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "b7963caf-e2b3-48ff-98b3-fff28d2ace83", "DetectTime": "2024-05-21T12:51:23.617547+00:00", "EventTime": "2024-05-21T12:51:23.617584+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeQDdH6kZ4sVscse1"], "accumulated_threat_level": 12.0, "timewindow": 40} +{"Format": "Json", "ID": "b7963caf-e2b3-48ff-98b3-fff28d2ace83", "DetectTime": "2024-05-21T12:51:23.617547+00:00", "EventTime": "2024-05-21T12:51:23.617584+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "1970-01-02T15:17:38.533940+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 40. (real time 2024/05/21 12:51:23.941119)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 40, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "2c2d85bd-7ee6-4bfb-87d0-55f93413c316", "DetectTime": "2024-05-21T12:51:23.955020+00:00", "EventTime": "2024-05-21T12:51:23.955043+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEVkz2tILGk73Jtq8"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "93b0f50e-31b8-4bba-b2e2-994cc4b79906", "DetectTime": "2024-05-21T12:51:23.970833+00:00", "EventTime": "2024-05-21T12:51:23.970865+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEVkz2tILGk73Jtq8"], "accumulated_threat_level": 0.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "8270c3df-9a06-48b4-a9ce-621d3e47a74b", "DetectTime": "2024-05-21T12:51:23.983102+00:00", "EventTime": "2024-05-21T12:51:23.983132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkqkA3ynvh0L5QIce"], "accumulated_threat_level": 1.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "a12cab22-15ca-4e1b-90dc-7e9f6d1de77a", "DetectTime": "2024-05-21T12:51:23.996831+00:00", "EventTime": "2024-05-21T12:51:23.996851+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChGYJN1l7q1oTZSnKf"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "fe948623-954e-4bcc-83ce-9707999ad378", "DetectTime": "2024-05-21T12:51:24.011685+00:00", "EventTime": "2024-05-21T12:51:24.011718+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChGYJN1l7q1oTZSnKf"], "accumulated_threat_level": 1.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "02c678c4-e632-40a6-8a78-a5a6098cbad5", "DetectTime": "2024-05-21T12:51:24.025214+00:00", "EventTime": "2024-05-21T12:51:24.025233+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9MJmyZq6qi6LxNb"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "603b3c44-4ed8-47f6-b830-34a60f9972e1", "DetectTime": "2024-05-21T12:51:24.039360+00:00", "EventTime": "2024-05-21T12:51:24.039399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC9MJmyZq6qi6LxNb"], "accumulated_threat_level": 1.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "6672e207-6062-4200-af12-7d7cbda96ede", "DetectTime": "2024-05-21T12:51:24.045765+00:00", "EventTime": "2024-05-21T12:51:24.045789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIOso11PdwhtxTptl"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "b7a0e346-20f9-4661-a88a-62aa50a49828", "DetectTime": "2024-05-21T12:51:24.057290+00:00", "EventTime": "2024-05-21T12:51:24.057316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YbzDk04JfnwQVM8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 173} +{"Format": "IDEA0", "ID": "1060fce9-ffb3-4fea-b591-f98db137ef04", "DetectTime": "2024-05-21T12:51:24.070763+00:00", "EventTime": "2024-05-21T12:51:24.070793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4kmg4ijhwW7cjT69"], "accumulated_threat_level": 3.2, "timewindow": 173} +{"Format": "IDEA0", "ID": "0454c3f1-3f1d-46d6-9af9-ed637a1f78b0", "DetectTime": "2024-05-21T12:51:24.083006+00:00", "EventTime": "2024-05-21T12:51:24.083039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmoXqwxHVwo4iMed"], "accumulated_threat_level": 4.0, "timewindow": 173} +{"Format": "IDEA0", "ID": "cddcffb7-5593-4e3d-81d7-580b37879935", "DetectTime": "2024-05-21T12:51:24.133508+00:00", "EventTime": "2024-05-21T12:51:24.133543+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3SmhHDDxuzg5yX4g"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "3737a39e-a2e8-48ec-88a6-5ad72fab4404", "DetectTime": "2024-05-21T12:51:24.180805+00:00", "EventTime": "2024-05-21T12:51:24.180825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhs5F497Qpbxc4dr2"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "c20c3dbe-8d7c-4581-8428-948b862706b5", "DetectTime": "2024-05-21T12:51:24.192902+00:00", "EventTime": "2024-05-21T12:51:24.192931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJCR4ic3fdD629Pc"], "accumulated_threat_level": 5.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "cef8d0f6-bf69-495c-9f7c-90c75ae2b4ea", "DetectTime": "2024-05-21T12:51:24.208985+00:00", "EventTime": "2024-05-21T12:51:24.209024+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAhs5F497Qpbxc4dr2"], "accumulated_threat_level": 2.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "45198b85-cc3f-4e37-84dd-230b4e8529dd", "DetectTime": "2024-05-21T12:51:24.240720+00:00", "EventTime": "2024-05-21T12:51:24.240739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSbrAP1KXD85tAHaHd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 173} +{"Format": "IDEA0", "ID": "393ab7f5-6df2-4188-8d02-0509435c0908", "DetectTime": "2024-05-21T12:51:24.286908+00:00", "EventTime": "2024-05-21T12:51:24.286929+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZ8lB3klYC09Upcpl"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "0a670144-3492-4836-9ad1-d09d535a10fa", "DetectTime": "2024-05-21T12:51:24.301940+00:00", "EventTime": "2024-05-21T12:51:24.301972+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZ8lB3klYC09Upcpl"], "accumulated_threat_level": 2.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "753b8a47-da4b-451d-b4a3-55b3708e66ea", "DetectTime": "2024-05-21T12:51:24.502880+00:00", "EventTime": "2024-05-21T12:51:24.502918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chyspr3Qe6yBtNQzFi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "9187cc2b-9313-42ba-90a7-912e97506376", "DetectTime": "2024-05-21T12:51:24.554470+00:00", "EventTime": "2024-05-21T12:51:24.554497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSYsnI1Du6zNAiaTj7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "79300e84-839c-4c47-9f10-55792d830c33", "DetectTime": "2024-05-21T12:51:24.614911+00:00", "EventTime": "2024-05-21T12:51:24.614945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfy2zn2gRbVjXZGxK5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "87eedfec-2231-4fd0-8e8c-4358dada85dc", "DetectTime": "2024-05-21T12:51:24.660251+00:00", "EventTime": "2024-05-21T12:51:24.660275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvF9JA3DpvpeFdV7C7"], "accumulated_threat_level": 9.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "0c66b162-2e3c-4a24-91cb-5ab2a59f0a4e", "DetectTime": "2024-05-21T12:51:24.795319+00:00", "EventTime": "2024-05-21T12:51:24.795337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBnHEowGOdoJAGV5"], "accumulated_threat_level": 10.4, "timewindow": 173} +{"Format": "IDEA0", "ID": "b73be6f2-18ca-4ed0-aa6e-3e101fb18858", "DetectTime": "2024-05-21T12:51:24.841823+00:00", "EventTime": "2024-05-21T12:51:24.841842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZ10C1UIp2hm2KLq3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 173} +{"Format": "IDEA0", "ID": "34fbc141-4d5a-457a-9d67-391c9f547d76", "DetectTime": "2024-05-21T12:51:24.894890+00:00", "EventTime": "2024-05-21T12:51:24.894912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cso9Y91TsokyE2PsYh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 173} +{"Format": "Json", "ID": "34fbc141-4d5a-457a-9d67-391c9f547d76", "DetectTime": "2024-05-21T12:51:24.894890+00:00", "EventTime": "2024-05-21T12:51:24.894912+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-08T04:08:47.239969+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2024/05/21 12:51:25.078556)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 173, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "29449cf2-6048-4913-9e32-6d40a6ccb02b", "DetectTime": "2024-05-21T12:51:25.160829+00:00", "EventTime": "2024-05-21T12:51:25.160848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkazAm1jj1kgAM6SY2"], "accumulated_threat_level": 0.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "bc8fb4c6-bdda-49fe-8e3b-d44d797ccf24", "DetectTime": "2024-05-21T12:51:25.215701+00:00", "EventTime": "2024-05-21T12:51:25.215720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCezU1ZuYffKRSep3"], "accumulated_threat_level": 1.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "041ad1ad-fbd7-4e2f-8b1d-1c26ca926648", "DetectTime": "2024-05-21T12:51:25.261583+00:00", "EventTime": "2024-05-21T12:51:25.261602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7axjm0L92RihL86"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 173} +{"Format": "IDEA0", "ID": "279c27dc-c1d9-4473-ae1e-765d5543908f", "DetectTime": "2024-05-21T12:51:25.307078+00:00", "EventTime": "2024-05-21T12:51:25.307098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUIll9vWeKBKg5X8c"], "accumulated_threat_level": 3.2, "timewindow": 173} +{"Format": "IDEA0", "ID": "613be6f4-08f9-409c-af19-d5cc3c091bcc", "DetectTime": "2024-05-21T12:51:25.355732+00:00", "EventTime": "2024-05-21T12:51:25.355751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHK3O2pUK88AWhcm5"], "accumulated_threat_level": 4.0, "timewindow": 173} +{"Format": "IDEA0", "ID": "9b785f50-c369-4504-b3fc-07a18844665e", "DetectTime": "2024-05-21T12:51:25.405176+00:00", "EventTime": "2024-05-21T12:51:25.405198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPQGH1WEWkS0vAy12"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "571e54a0-8f45-4f6f-808f-c6f3cad1327c", "DetectTime": "2024-05-21T12:51:25.460061+00:00", "EventTime": "2024-05-21T12:51:25.460083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsunI3uQe1jWU82ch"], "accumulated_threat_level": 5.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "94c18a53-7bdc-4832-95a4-59faec6494c6", "DetectTime": "2024-05-21T12:51:25.780607+00:00", "EventTime": "2024-05-21T12:51:25.780631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGge7mubZQL12dnj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 173} +{"Format": "IDEA0", "ID": "ac2097b1-e0d8-442e-98a9-70055da57933", "DetectTime": "2024-05-21T12:51:25.786347+00:00", "EventTime": "2024-05-21T12:51:25.786368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Pfwc3gzUmrbLpIId"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "828cf342-0004-4985-a4f3-e24767553a7c", "DetectTime": "2024-05-21T12:51:25.874057+00:00", "EventTime": "2024-05-21T12:51:25.874079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cny0wg4IE3QmzPru7g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "e7a0eeba-e617-4fa2-8218-f1b53ecce842", "DetectTime": "2024-05-21T12:51:25.930703+00:00", "EventTime": "2024-05-21T12:51:25.930728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEKgXW2BdzV1JwfNs1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "ba6cd4c5-0f9c-4e18-ad99-26e74a8f9331", "DetectTime": "2024-05-21T12:51:25.991687+00:00", "EventTime": "2024-05-21T12:51:25.991711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvb44VlNTrEfXwgl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "334c15f0-4fc3-49ad-a6fa-a0a0fa3b8d11", "DetectTime": "2024-05-21T12:51:26.141857+00:00", "EventTime": "2024-05-21T12:51:26.141880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOamP2FtcxkfYv0B1"], "accumulated_threat_level": 9.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "7487844a-92c3-4b7a-81f8-69de076a2c71", "DetectTime": "2024-05-21T12:51:26.164154+00:00", "EventTime": "2024-05-21T12:51:26.164174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7Ujo2Fbsb6o9TMFl"], "accumulated_threat_level": 10.4, "timewindow": 173} +{"Format": "IDEA0", "ID": "696670bf-2ba5-477b-ae07-c6ce00bfdeba", "DetectTime": "2024-05-21T12:51:26.461169+00:00", "EventTime": "2024-05-21T12:51:26.461190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzksMQ3sbHErMpQETk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 173} +{"Format": "IDEA0", "ID": "c35bc088-ef21-48ca-9560-79cba033aa7c", "DetectTime": "2024-05-21T12:51:26.512425+00:00", "EventTime": "2024-05-21T12:51:26.512444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIywd81bkAnUpOwrjg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 173} +{"Format": "Json", "ID": "c35bc088-ef21-48ca-9560-79cba033aa7c", "DetectTime": "2024-05-21T12:51:26.512425+00:00", "EventTime": "2024-05-21T12:51:26.512444+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-08T04:08:50.832342+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2024/05/21 12:51:26.701079)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 173, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "854d7f7c-b671-4fc4-9c91-e191012f1fb2", "DetectTime": "2024-05-21T12:51:26.714222+00:00", "EventTime": "2024-05-21T12:51:26.714245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpt7U51KpRyoS6pxMa"], "accumulated_threat_level": 0.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "e2f834ae-db2e-45df-93e1-83db1930f4ee", "DetectTime": "2024-05-21T12:51:26.726271+00:00", "EventTime": "2024-05-21T12:51:26.726291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpfrhp113u2jDexopi"], "accumulated_threat_level": 1.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "5655e906-83c7-439f-81cc-4a95dc3f6b0a", "DetectTime": "2024-05-21T12:51:26.731364+00:00", "EventTime": "2024-05-21T12:51:26.731383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXfFk93pKPuYmTtNOf"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "3422310f-18ec-4e3d-b585-9e52b2958ed8", "DetectTime": "2024-05-21T12:51:26.755051+00:00", "EventTime": "2024-05-21T12:51:26.755068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEdqY2hcUtwmbHjq6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 173} +{"Format": "IDEA0", "ID": "ccc5e12f-1eaf-4342-a93e-3558d3adafec", "DetectTime": "2024-05-21T12:51:26.829138+00:00", "EventTime": "2024-05-21T12:51:26.829159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzQk22KfW3bMVYuH2"], "accumulated_threat_level": 3.2, "timewindow": 173} +{"Format": "IDEA0", "ID": "5ee83206-2faf-4a56-9dca-0bf48eb75df9", "DetectTime": "2024-05-21T12:51:27.101886+00:00", "EventTime": "2024-05-21T12:51:27.101906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCQKfr1YRRHyd3qkT3"], "accumulated_threat_level": 4.0, "timewindow": 173} +{"Format": "IDEA0", "ID": "f31deba9-ad78-47ce-b07c-9ab18a596929", "DetectTime": "2024-05-21T12:51:27.152886+00:00", "EventTime": "2024-05-21T12:51:27.152906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN1Xsg39NIk2YTzpyk"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "cbd9a350-5d3c-4c9b-8c8a-a08d9efd0a2e", "DetectTime": "2024-05-21T12:51:27.206804+00:00", "EventTime": "2024-05-21T12:51:27.206823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4XYloah14oFGVqg"], "accumulated_threat_level": 5.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "50288d73-93be-4ecc-985e-91014c6a710c", "DetectTime": "2024-05-21T12:51:27.259676+00:00", "EventTime": "2024-05-21T12:51:27.259696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKNxk39uvIeMyDHbj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 173} +{"Format": "IDEA0", "ID": "00793e6c-5af4-4776-81f4-cc83f2ab6e24", "DetectTime": "2024-05-21T12:51:27.313984+00:00", "EventTime": "2024-05-21T12:51:27.314005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIII883HqDLTx5ITO9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "91cc322b-4781-43ff-aae8-384d9daa0081", "DetectTime": "2024-05-21T12:51:27.367634+00:00", "EventTime": "2024-05-21T12:51:27.367653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsMeMc1whNJeDpNAD9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "39b9c73f-a7ad-4b61-913d-815522c06426", "DetectTime": "2024-05-21T12:51:27.419943+00:00", "EventTime": "2024-05-21T12:51:27.419966+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C27jc64DRPzdAEGpHf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "2d44af49-da3a-4c5c-a439-ffac37ff9255", "DetectTime": "2024-05-21T12:51:27.774799+00:00", "EventTime": "2024-05-21T12:51:27.774824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7tUiN3XtnAlaB250a"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "c63d3b62-dc93-4dec-aecd-1d2d27802224", "DetectTime": "2024-05-21T12:51:27.820106+00:00", "EventTime": "2024-05-21T12:51:27.820132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9PPp2vUo4nGR5OK"], "accumulated_threat_level": 9.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "391752d7-91c3-48a5-8fdb-275ff075bc3b", "DetectTime": "2024-05-21T12:51:27.873743+00:00", "EventTime": "2024-05-21T12:51:27.873761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8eFwH2kap6mV7EUQd"], "accumulated_threat_level": 10.4, "timewindow": 173} +{"Format": "IDEA0", "ID": "face5c90-79d5-4847-9d62-a0b844af1277", "DetectTime": "2024-05-21T12:51:27.925223+00:00", "EventTime": "2024-05-21T12:51:27.925243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYcLc3J1hFwgC9Gkb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 173} +{"Format": "IDEA0", "ID": "bb20e1a8-46a3-4edb-8d58-3b3e9c1e0131", "DetectTime": "2024-05-21T12:51:27.977415+00:00", "EventTime": "2024-05-21T12:51:27.977435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDg8yC1Ci5YK5DSr57"], "accumulated_threat_level": 12.000000000000002, "timewindow": 173} +{"Format": "Json", "ID": "bb20e1a8-46a3-4edb-8d58-3b3e9c1e0131", "DetectTime": "2024-05-21T12:51:27.977415+00:00", "EventTime": "2024-05-21T12:51:27.977435+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-08T04:39:13.661619+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2024/05/21 12:51:28.455665)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 173, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "325e162d-afce-4c92-a525-81670a82ed0a", "DetectTime": "2024-05-21T12:51:28.467705+00:00", "EventTime": "2024-05-21T12:51:28.467726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZ9At1jyFHhBjcMNc"], "accumulated_threat_level": 0.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "eb56a64b-2b68-4e73-849d-4460dae01cc1", "DetectTime": "2024-05-21T12:51:28.479056+00:00", "EventTime": "2024-05-21T12:51:28.479074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVggaesVBSN2B23Ih"], "accumulated_threat_level": 1.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "5efe8fdf-1f57-4368-94f3-3e6f50ab61f2", "DetectTime": "2024-05-21T12:51:28.500597+00:00", "EventTime": "2024-05-21T12:51:28.500615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm623UtfOFKzthSLl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 173} +{"Format": "IDEA0", "ID": "06ce0ac3-b007-4355-935b-fdd285d6f893", "DetectTime": "2024-05-21T12:51:28.513554+00:00", "EventTime": "2024-05-21T12:51:28.513575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8uNF4yZMMygQZqYl"], "accumulated_threat_level": 3.2, "timewindow": 173} +{"Format": "IDEA0", "ID": "3356353e-2679-4e71-822a-4ed9fb19051a", "DetectTime": "2024-05-21T12:51:28.531473+00:00", "EventTime": "2024-05-21T12:51:28.531492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDdUB2FEo5GvNulqd"], "accumulated_threat_level": 4.0, "timewindow": 173} +{"Format": "IDEA0", "ID": "3c51a635-176c-4559-869d-ee4fc74fbbb4", "DetectTime": "2024-05-21T12:51:28.545103+00:00", "EventTime": "2024-05-21T12:51:28.545122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGImtBQ7NV6NKtT4"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "200d1d39-695d-4861-a7d0-87e03b5f963c", "DetectTime": "2024-05-21T12:51:28.564756+00:00", "EventTime": "2024-05-21T12:51:28.564776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWPmBu3AOrrP9YUu49"], "accumulated_threat_level": 5.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "52ef5cda-9ac4-4103-99b8-4f24036d9560", "DetectTime": "2024-05-21T12:51:28.617171+00:00", "EventTime": "2024-05-21T12:51:28.617191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMImq2nvJ1PrfG3Gg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 173} +{"Format": "IDEA0", "ID": "ea948216-269c-4a87-a917-e249d39d32e2", "DetectTime": "2024-05-21T12:51:28.667846+00:00", "EventTime": "2024-05-21T12:51:28.667864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK3qnk3q6STfjRIIfi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "fa4cd822-e73c-447e-962e-f50e193b0e88", "DetectTime": "2024-05-21T12:51:28.946057+00:00", "EventTime": "2024-05-21T12:51:28.946080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb0QLy2LNNRk9O9JL7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "272b1535-f9f6-44c0-96bd-ae1fa9021164", "DetectTime": "2024-05-21T12:51:28.998842+00:00", "EventTime": "2024-05-21T12:51:28.998863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcM2ba2rluQyMblo1b"], "accumulated_threat_level": 8.799999999999999, "timewindow": 173} +{"Format": "IDEA0", "ID": "701c1a27-531d-49ee-aa34-eb6ca22c6817", "DetectTime": "2024-05-21T12:51:29.214424+00:00", "EventTime": "2024-05-21T12:51:29.214446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXaoL25qJhidfVYFj"], "accumulated_threat_level": 9.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "f9dffeef-b04d-4589-a190-7b2ec7ac84f4", "DetectTime": "2024-05-21T12:51:29.220490+00:00", "EventTime": "2024-05-21T12:51:29.220509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvz9Ub3jg2W39ltsR8"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "50a798e9-cfbf-4410-bf81-a7e184f63c12", "DetectTime": "2024-05-21T12:51:29.306629+00:00", "EventTime": "2024-05-21T12:51:29.306648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKH2p39Q2hTIC1Jtk"], "accumulated_threat_level": 10.4, "timewindow": 173} +{"Format": "IDEA0", "ID": "2d0e9bc2-9b3c-484e-9a64-fb6ce3d0180f", "DetectTime": "2024-05-21T12:51:29.364098+00:00", "EventTime": "2024-05-21T12:51:29.364117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOVS7u9yllY8k7W1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 173} +{"Format": "IDEA0", "ID": "3fe30e4b-bc5b-4092-ae3f-0aeb86c43de7", "DetectTime": "2024-05-21T12:51:29.408842+00:00", "EventTime": "2024-05-21T12:51:29.408868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5oda49lMJrtgMc02"], "accumulated_threat_level": 12.000000000000002, "timewindow": 173} +{"Format": "Json", "ID": "3fe30e4b-bc5b-4092-ae3f-0aeb86c43de7", "DetectTime": "2024-05-21T12:51:29.408842+00:00", "EventTime": "2024-05-21T12:51:29.408868+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-08T04:39:17.231692+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 173. (real time 2024/05/21 12:51:29.655014)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 173, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "621c8ea8-c7fb-4948-bbb6-f904f88b0ed6", "DetectTime": "2024-05-21T12:51:29.685625+00:00", "EventTime": "2024-05-21T12:51:29.685647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6sZFiHJPoGplDylb"], "accumulated_threat_level": 0.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "08af36df-0712-423b-b25d-b6f78baaf000", "DetectTime": "2024-05-21T12:51:29.740103+00:00", "EventTime": "2024-05-21T12:51:29.740122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSsbi2ks135pr0xGe"], "accumulated_threat_level": 1.6, "timewindow": 173} +{"Format": "IDEA0", "ID": "cb40e29c-200c-44f8-a2be-51126a515b89", "DetectTime": "2024-05-21T12:51:29.792114+00:00", "EventTime": "2024-05-21T12:51:29.792134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9TmHs1MrnuBqZkaHd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 173} +{"Format": "IDEA0", "ID": "324a0e82-fe5a-4197-9d23-ef203892a710", "DetectTime": "2024-05-21T12:51:29.844155+00:00", "EventTime": "2024-05-21T12:51:29.844177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rP3e4RfYxdR1a3H6"], "accumulated_threat_level": 3.2, "timewindow": 173} +{"Format": "IDEA0", "ID": "7f7dec5a-f219-4bff-a1af-3a1e362e9936", "DetectTime": "2024-05-21T12:51:29.895170+00:00", "EventTime": "2024-05-21T12:51:29.895190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3X7Oojgk9WSgISa"], "accumulated_threat_level": 4.0, "timewindow": 173} +{"Format": "IDEA0", "ID": "d1a4bf06-a4f0-4f64-85af-bc1a12e17a64", "DetectTime": "2024-05-21T12:51:29.975054+00:00", "EventTime": "2024-05-21T12:51:29.975075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENZXM10uRcmepZUX6"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "ed7bfe53-43cf-4075-8741-f40cb60773d0", "DetectTime": "2024-05-21T12:51:30.049572+00:00", "EventTime": "2024-05-21T12:51:30.049593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5lxj39wybpQdvj28"], "accumulated_threat_level": 0.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "25763249-6909-4746-a03a-4898cc5bd11d", "DetectTime": "2024-05-21T12:51:30.309591+00:00", "EventTime": "2024-05-21T12:51:30.309612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvvia64y6sw0W4gayj"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "4210e9de-3332-45d4-9ad1-bfee29dc4fd7", "DetectTime": "2024-05-21T12:51:30.354861+00:00", "EventTime": "2024-05-21T12:51:30.354896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOkRe25rJl8g06mld"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "6f084063-77e5-4ba0-ab32-8a9440794f96", "DetectTime": "2024-05-21T12:51:30.404391+00:00", "EventTime": "2024-05-21T12:51:30.404424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2cUXjkHlBmQqcZi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "434b9d5b-44f5-4d5b-beac-3b8977ec2d37", "DetectTime": "2024-05-21T12:51:30.453541+00:00", "EventTime": "2024-05-21T12:51:30.453574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSmcyy1CgpPPhv8jSl"], "accumulated_threat_level": 3.2, "timewindow": 174} +{"Format": "IDEA0", "ID": "287b2bf7-b943-42f3-9b5e-2279b3fe62f5", "DetectTime": "2024-05-21T12:51:30.604988+00:00", "EventTime": "2024-05-21T12:51:30.605009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjSdU723AKRqKyG3vj"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "2a3ffd27-509f-4301-aa06-39c8b5747b0f", "DetectTime": "2024-05-21T12:51:30.656284+00:00", "EventTime": "2024-05-21T12:51:30.656305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI10301RNUp7bE6Vl8"], "accumulated_threat_level": 4.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "57016e14-d5de-4f43-8e2f-feb8645b7bde", "DetectTime": "2024-05-21T12:51:30.708464+00:00", "EventTime": "2024-05-21T12:51:30.708488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSWXnI3CPQxgCKThQc"], "accumulated_threat_level": 5.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "76f76a47-860e-4a35-a883-9093cf5340d3", "DetectTime": "2024-05-21T12:51:30.999606+00:00", "EventTime": "2024-05-21T12:51:30.999629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0eXlZ1C7Vecob9L1k"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "a3a202b9-6020-4d4f-959b-bb1e3a79bd78", "DetectTime": "2024-05-21T12:51:31.051857+00:00", "EventTime": "2024-05-21T12:51:31.051881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RczA1p4RTYbwoeXi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 174} +{"Format": "IDEA0", "ID": "b4401beb-b30a-41d2-9308-383c5dabc7a2", "DetectTime": "2024-05-21T12:51:31.104714+00:00", "EventTime": "2024-05-21T12:51:31.104735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDewE33NzkCTzMwPte"], "accumulated_threat_level": 7.199999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "5cd9c954-3fae-4a1c-a304-ab8354d3f984", "DetectTime": "2024-05-21T12:51:31.159388+00:00", "EventTime": "2024-05-21T12:51:31.159407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Z2Hn28pzyUq2jiy1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "de30879a-cb53-4ab0-9cc1-6ac52df403be", "DetectTime": "2024-05-21T12:51:31.211685+00:00", "EventTime": "2024-05-21T12:51:31.211710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRI9FFfAtENujTp4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "db0abf24-399c-46b8-8c14-612e54c4db7b", "DetectTime": "2024-05-21T12:51:31.263265+00:00", "EventTime": "2024-05-21T12:51:31.263301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxt2C6Cljj98zsm88"], "accumulated_threat_level": 9.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "ae4e03b7-1da5-447b-b2f9-ae2cfd00d9a7", "DetectTime": "2024-05-21T12:51:31.304612+00:00", "EventTime": "2024-05-21T12:51:31.304634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csklj926Sx6OnzOiM6"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "2aa4bfb9-c053-4ddd-8b9b-956f03560032", "DetectTime": "2024-05-21T12:51:31.588756+00:00", "EventTime": "2024-05-21T12:51:31.588777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIbkhv3FbJbilhFp6i"], "accumulated_threat_level": 10.4, "timewindow": 174} +{"Format": "IDEA0", "ID": "2af3f337-c926-4dec-991f-9e78eaae8801", "DetectTime": "2024-05-21T12:51:31.639169+00:00", "EventTime": "2024-05-21T12:51:31.639190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMyT24CuupljKOTD"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "9545d2c5-5715-47ec-bdf5-93653e274bc3", "DetectTime": "2024-05-21T12:51:31.645147+00:00", "EventTime": "2024-05-21T12:51:31.645167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1aROR1fNnj6cWDTh1"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "284a95a7-3e63-4170-880b-2806eeafa5d6", "DetectTime": "2024-05-21T12:51:31.651250+00:00", "EventTime": "2024-05-21T12:51:31.651270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQw9W923eeCdWMeIhk"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "7a37219e-58b2-45ef-aa45-348e9ad2bf40", "DetectTime": "2024-05-21T12:51:31.767282+00:00", "EventTime": "2024-05-21T12:51:31.767300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblRz03KIy6IAfQA94"], "accumulated_threat_level": 11.200000000000001, "timewindow": 174} +{"Format": "IDEA0", "ID": "21f390b0-ca35-45cb-be31-4b3507e304c3", "DetectTime": "2024-05-21T12:51:31.823344+00:00", "EventTime": "2024-05-21T12:51:31.823362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwRxC2bfRwFJCqGs8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 174} +{"Format": "Json", "ID": "21f390b0-ca35-45cb-be31-4b3507e304c3", "DetectTime": "2024-05-21T12:51:31.823344+00:00", "EventTime": "2024-05-21T12:51:31.823362+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-08T05:09:36.386059+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2024/05/21 12:51:31.999256)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 174, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0d6d529d-d970-4022-8f32-c570aa794778", "DetectTime": "2024-05-21T12:51:32.003984+00:00", "EventTime": "2024-05-21T12:51:32.004005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1ZeTsSAVgWBFwbpg"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "64f0571d-e14f-4b62-bf07-db76108eb755", "DetectTime": "2024-05-21T12:51:32.136033+00:00", "EventTime": "2024-05-21T12:51:32.136055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLisW19CzROZFjOY2"], "accumulated_threat_level": 0.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "a95eae18-7dc7-4404-9dea-7b8b653fbcb5", "DetectTime": "2024-05-21T12:51:32.142336+00:00", "EventTime": "2024-05-21T12:51:32.142356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chy2VU12DuACifuZdl"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "4b2cb7de-578f-41da-8b4d-9208ae39679c", "DetectTime": "2024-05-21T12:51:32.147102+00:00", "EventTime": "2024-05-21T12:51:32.147121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUMcGE3iUMHAjEQam6"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "740d33ab-bd35-4f65-99d0-1d4c9bd297cb", "DetectTime": "2024-05-21T12:51:32.152020+00:00", "EventTime": "2024-05-21T12:51:32.152038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf8flT3ThOQXL5DJah"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "52c39f2d-738c-4418-9124-0de7b8d0c011", "DetectTime": "2024-05-21T12:51:32.188212+00:00", "EventTime": "2024-05-21T12:51:32.188233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXHmc21hQ47gEqIAak"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "df872c94-1030-4253-8962-99f91fd01ed5", "DetectTime": "2024-05-21T12:51:32.347387+00:00", "EventTime": "2024-05-21T12:51:32.347405+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COrKz43EWsK18aiTB5"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "54bafc2e-0220-43bb-8bd8-a7a35535d578", "DetectTime": "2024-05-21T12:51:32.369869+00:00", "EventTime": "2024-05-21T12:51:32.369895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcE4Ny1UvRgZphLir6"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "d22b9530-21e2-4f1b-a505-0f0c4fb2bb1a", "DetectTime": "2024-05-21T12:51:32.702144+00:00", "EventTime": "2024-05-21T12:51:32.702171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwNnx82y6uWRp6FfA9"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "a593e2a1-22c4-4150-85e6-a492ee351ea7", "DetectTime": "2024-05-21T12:51:32.719449+00:00", "EventTime": "2024-05-21T12:51:32.719469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTxJL3X3FCWL6YvLh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "d80cfb9f-c772-4aac-9c83-8cce7b6f515f", "DetectTime": "2024-05-21T12:51:32.724766+00:00", "EventTime": "2024-05-21T12:51:32.724785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpwDKd2Uo62Pza4tt1"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "58ba2010-2cc5-49da-a465-1c0519f70c4a", "DetectTime": "2024-05-21T12:51:32.740177+00:00", "EventTime": "2024-05-21T12:51:32.740204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6BrQF1fj8aDGrSJr4"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "96eaab5c-3586-476b-a881-1f1105e8ac16", "DetectTime": "2024-05-21T12:51:32.855584+00:00", "EventTime": "2024-05-21T12:51:32.855605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cad4x92WRC1jUlmLSd"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "7e651867-f53d-49ce-9128-371d8613f9d1", "DetectTime": "2024-05-21T12:51:32.896955+00:00", "EventTime": "2024-05-21T12:51:32.896977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjyrXk4NjLM1SoW2kk"], "accumulated_threat_level": 4.0, "timewindow": 171} +{"Format": "IDEA0", "ID": "649c309d-9079-4c66-896e-10d4fe93d857", "DetectTime": "2024-05-21T12:51:33.216999+00:00", "EventTime": "2024-05-21T12:51:33.217022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceg9L144ezf6T9ZXvg"], "accumulated_threat_level": 3.2, "timewindow": 174} +{"Format": "IDEA0", "ID": "6144f98b-21c8-4e99-9ed4-7bd428eb90c4", "DetectTime": "2024-05-21T12:51:33.222130+00:00", "EventTime": "2024-05-21T12:51:33.222148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfcsWJ1DbM6Vioggdb"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "63106520-9dfb-473f-923a-e0a41a20e8bb", "DetectTime": "2024-05-21T12:51:33.229218+00:00", "EventTime": "2024-05-21T12:51:33.229237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C64a8d12f5TLxLZCQg"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "e68a2d1f-d3d6-49b1-82f5-953beb8652b3", "DetectTime": "2024-05-21T12:51:33.233855+00:00", "EventTime": "2024-05-21T12:51:33.233874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJSx5o1X9JE3cyIL1"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "f881740d-effa-421c-8a0a-6b592460f78b", "DetectTime": "2024-05-21T12:51:33.393815+00:00", "EventTime": "2024-05-21T12:51:33.393837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C89KoE1zjAQU8wF9C8"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "15a73582-0b8f-4278-a74d-40e2d4ff04ac", "DetectTime": "2024-05-21T12:51:33.415780+00:00", "EventTime": "2024-05-21T12:51:33.415802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDh4Q12BKzuM8x33Ce"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "0f1c2018-a992-4fc7-8445-344ad7d73c8e", "DetectTime": "2024-05-21T12:51:33.435799+00:00", "EventTime": "2024-05-21T12:51:33.435828+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["42.119.49.245"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpHps2xeTeo6fYtF8"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "e5fb1ccc-61c1-4643-a89c-db70c54d8ed7", "DetectTime": "2024-05-21T12:51:33.453548+00:00", "EventTime": "2024-05-21T12:51:33.453572+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["42.119.49.245"]}], "Attach": [{"Content": "connection to blacklisted IP: 42.119.49.245 from 10.0.2.19. AS: FPT-AS-AP FPT Telecom Company, VN AS18403 Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpHps2xeTeo6fYtF8"], "accumulated_threat_level": 3.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "0499b0af-b579-48c0-a179-95f7dc582806", "DetectTime": "2024-05-21T12:51:33.460073+00:00", "EventTime": "2024-05-21T12:51:33.460092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvTMaO1aONpfVSkVbf"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "f61225f2-de5f-44c0-ae25-0b2acc112bdc", "DetectTime": "2024-05-21T12:51:33.472075+00:00", "EventTime": "2024-05-21T12:51:33.472093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvSh6n25Gi9ZbuoKti"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "9348d473-9914-4ba8-a7c4-07ab9353abad", "DetectTime": "2024-05-21T12:51:33.648485+00:00", "EventTime": "2024-05-21T12:51:33.648502+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C29S8G4htfdxcphEW7"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "9f297fda-7936-4578-9814-a8c59160293b", "DetectTime": "2024-05-21T12:51:33.661342+00:00", "EventTime": "2024-05-21T12:51:33.661361+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C29S8G4htfdxcphEW7"], "accumulated_threat_level": 3.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "b513a4ad-409a-4fde-8894-79cdd9334c24", "DetectTime": "2024-05-21T12:51:33.859777+00:00", "EventTime": "2024-05-21T12:51:33.859800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkH7Z2X1GeDq47vZ6"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "04747889-e90e-488c-b46a-9c06c252e248", "DetectTime": "2024-05-21T12:51:33.911052+00:00", "EventTime": "2024-05-21T12:51:33.911076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LxjZSPT2mLQ9i04"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "7d8e8c70-d6bc-4856-8fdd-1d4b12916bc8", "DetectTime": "2024-05-21T12:51:33.916106+00:00", "EventTime": "2024-05-21T12:51:33.916126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co80HF2zPZ1NVsOBi2"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "c399d37d-5d58-41b8-a6e8-8d165d7b737b", "DetectTime": "2024-05-21T12:51:33.931858+00:00", "EventTime": "2024-05-21T12:51:33.931881+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtsNAC4oXaHFHMYmeb"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "27ba7b3f-d6d2-422c-978a-34014ef9e9d7", "DetectTime": "2024-05-21T12:51:33.948596+00:00", "EventTime": "2024-05-21T12:51:33.948616+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtsNAC4oXaHFHMYmeb"], "accumulated_threat_level": 4.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "f214132c-6784-4025-b577-351b45b5dcc9", "DetectTime": "2024-05-21T12:51:33.955045+00:00", "EventTime": "2024-05-21T12:51:33.955064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaNkR12V55ir3d7Vr8"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "6fa7f0c3-4fe8-4882-9a4e-1c2aef4a6bed", "DetectTime": "2024-05-21T12:51:33.963471+00:00", "EventTime": "2024-05-21T12:51:33.963495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rz7w2Jb1bYWRjm1h"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "7b707bcf-000e-4467-b2dc-66ea3a33edeb", "DetectTime": "2024-05-21T12:51:33.979533+00:00", "EventTime": "2024-05-21T12:51:33.979561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBTW63A0bOQJNsVmh"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "1607bd00-5a22-4248-95ad-966d748d4637", "DetectTime": "2024-05-21T12:51:33.996102+00:00", "EventTime": "2024-05-21T12:51:33.996132+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPBTW63A0bOQJNsVmh"], "accumulated_threat_level": 4.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "222b1c0b-7cd5-4e6d-a48c-4f71dcb89dd8", "DetectTime": "2024-05-21T12:51:34.035458+00:00", "EventTime": "2024-05-21T12:51:34.035481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Pyu34JkO6apqd21g"], "accumulated_threat_level": 4.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "1ef1a2d0-74a7-4bd6-b568-0b6366dc1f8f", "DetectTime": "2024-05-21T12:51:34.064615+00:00", "EventTime": "2024-05-21T12:51:34.064646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FEYs1EWXIyBT9tef"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "245bc7d1-8dab-425e-abcb-a3d809fb6e0c", "DetectTime": "2024-05-21T12:51:34.539271+00:00", "EventTime": "2024-05-21T12:51:34.539292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6mwwDlzKz6E8Buk"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "eae2a00e-9aaf-4525-8165-c6af2fcd3ab7", "DetectTime": "2024-05-21T12:51:34.544417+00:00", "EventTime": "2024-05-21T12:51:34.544438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbI3Te4CRGkgqDaikd"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "c4188cb1-79b5-4a65-bd00-1c1a349a9801", "DetectTime": "2024-05-21T12:51:34.600723+00:00", "EventTime": "2024-05-21T12:51:34.600744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDtrDXKEPbleXCYlh"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "6f9a5b6a-85c7-48fb-987a-6158ab76d34c", "DetectTime": "2024-05-21T12:51:34.645179+00:00", "EventTime": "2024-05-21T12:51:34.645198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDvC6o2qozGeACHoH1"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "e71eaf03-b0b1-454c-9103-614ebd5b5e6f", "DetectTime": "2024-05-21T12:51:34.659452+00:00", "EventTime": "2024-05-21T12:51:34.659472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7l4q4R8vFSWx4vf5"], "accumulated_threat_level": 5.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "9c574e6c-4c6b-4848-a526-e9f785ae21b6", "DetectTime": "2024-05-21T12:51:34.784399+00:00", "EventTime": "2024-05-21T12:51:34.784422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ciq94rcJLpNX24t9"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "0f23c9c3-29c8-4294-8dfb-8b21a15c9164", "DetectTime": "2024-05-21T12:51:35.062803+00:00", "EventTime": "2024-05-21T12:51:35.062824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cen0x2A84DBOEF5f"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "f9f7bbf5-8b83-4e51-87f5-7449cd933321", "DetectTime": "2024-05-21T12:51:35.191491+00:00", "EventTime": "2024-05-21T12:51:35.191512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAY4c1Nv2LBmr2JK5"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "e1e54de8-12f4-437d-bc53-b8c7b15e7773", "DetectTime": "2024-05-21T12:51:35.197479+00:00", "EventTime": "2024-05-21T12:51:35.197497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuZsNM3U4dHvOSqVmj"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "4c526ed9-f34c-49a7-9cdc-5ed7ecca3656", "DetectTime": "2024-05-21T12:51:35.206842+00:00", "EventTime": "2024-05-21T12:51:35.206863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDzx7lwoTI2ebVLLj"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "c2e2f73d-7b7c-4267-8955-170e43b2eac3", "DetectTime": "2024-05-21T12:51:35.241939+00:00", "EventTime": "2024-05-21T12:51:35.241960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AHZM303rimCb73me"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "e38b6454-596b-4bc6-8594-8cccdebcdcf1", "DetectTime": "2024-05-21T12:51:35.251058+00:00", "EventTime": "2024-05-21T12:51:35.251078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWirzi4OuYE8aCprGd"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "c9541891-2ecb-4ae3-b153-ef80787b3790", "DetectTime": "2024-05-21T12:51:35.284316+00:00", "EventTime": "2024-05-21T12:51:35.284338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymgPLtNxgxKodK8i"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "72a52d6b-907c-4db0-835c-e08f05eebfa4", "DetectTime": "2024-05-21T12:51:35.339329+00:00", "EventTime": "2024-05-21T12:51:35.339350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKTeuVakBSMP831ah"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 174} +{"Format": "IDEA0", "ID": "ea02347c-e899-4e1d-89be-6d0fbb60f854", "DetectTime": "2024-05-21T12:51:35.766291+00:00", "EventTime": "2024-05-21T12:51:35.766313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGU6ON1sRjRJ4Wu5bg"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "a240030f-9b47-4b5a-9f2f-d6548b3767a0", "DetectTime": "2024-05-21T12:51:35.787592+00:00", "EventTime": "2024-05-21T12:51:35.787613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZK5w4pnNY8jvB8H8"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "05113c18-af72-4e1c-a21b-22c387ce7ee3", "DetectTime": "2024-05-21T12:51:35.820127+00:00", "EventTime": "2024-05-21T12:51:35.820148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyaNYO1soRI1owngS2"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "bff404c8-6e28-45a3-ba3f-19f24d9ee14f", "DetectTime": "2024-05-21T12:51:35.835805+00:00", "EventTime": "2024-05-21T12:51:35.835828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4VT5r2KpkcxqhALua"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "82e57b22-1404-4fa3-b522-67e4e5794ae8", "DetectTime": "2024-05-21T12:51:35.853362+00:00", "EventTime": "2024-05-21T12:51:35.853386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb6Krd2aXU2lp6f0Ab"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "6335715d-9860-4566-b9ed-9f33e7e076fb", "DetectTime": "2024-05-21T12:51:35.877241+00:00", "EventTime": "2024-05-21T12:51:35.877261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChqEnvXe7GQDj2SSj"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "4b5043b5-0cbd-43bd-9e96-0d4a57e9b991", "DetectTime": "2024-05-21T12:51:36.295921+00:00", "EventTime": "2024-05-21T12:51:36.295945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyf7W04LpC5JDHwES8"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "258f890d-a3ab-4c5c-83ed-f3a19b74662c", "DetectTime": "2024-05-21T12:51:36.307440+00:00", "EventTime": "2024-05-21T12:51:36.307462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl0JIG1BPC2q6tDqyc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "2759cc6d-71f8-47f3-8336-74bd3642d4e7", "DetectTime": "2024-05-21T12:51:36.459361+00:00", "EventTime": "2024-05-21T12:51:36.459382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZRCO2djRAHmxqVd9"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "2f9b3f4f-0503-4821-81b6-64db2acca686", "DetectTime": "2024-05-21T12:51:36.470605+00:00", "EventTime": "2024-05-21T12:51:36.470638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8z8f3qgWmPn6cT13"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "46570603-ffd7-4e94-8963-a4464821b82e", "DetectTime": "2024-05-21T12:51:36.476171+00:00", "EventTime": "2024-05-21T12:51:36.476190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp9uIh3MulctBsRzO5"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "e57cc700-3278-4fd0-9f1b-f5e807c0a992", "DetectTime": "2024-05-21T12:51:36.481497+00:00", "EventTime": "2024-05-21T12:51:36.481515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkdXxPTIgPvWDFIe5"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "f598b484-8907-4b11-9a7b-be6fac04e1d5", "DetectTime": "2024-05-21T12:51:36.486148+00:00", "EventTime": "2024-05-21T12:51:36.486166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBNQiA1vBHUj0YY5V"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "7f85b156-c388-4c51-a39e-1cc5cc6c68f0", "DetectTime": "2024-05-21T12:51:36.490961+00:00", "EventTime": "2024-05-21T12:51:36.490979+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGRwrMWqwryKdPNE3"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "4e485a5c-4af7-4e02-ac9e-460b2ec74418", "DetectTime": "2024-05-21T12:51:36.496162+00:00", "EventTime": "2024-05-21T12:51:36.496185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYehM3TRoBtSHTdph"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "88aaaf04-a903-442c-94b6-a9355e18fef6", "DetectTime": "2024-05-21T12:51:37.008028+00:00", "EventTime": "2024-05-21T12:51:37.008046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAOmLK1CSxD8S2V4wg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "80bc0483-3c99-4a6f-b2d4-b827c4846732", "DetectTime": "2024-05-21T12:51:37.066481+00:00", "EventTime": "2024-05-21T12:51:37.066501+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmlxxwdfAg9WVkoQ9"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "6074b62e-c775-4ea6-b792-c66f0b831a65", "DetectTime": "2024-05-21T12:51:37.083262+00:00", "EventTime": "2024-05-21T12:51:37.083296+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmlxxwdfAg9WVkoQ9"], "accumulated_threat_level": 5.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "f1089c94-9988-4595-839a-42b64519b909", "DetectTime": "2024-05-21T12:51:37.127121+00:00", "EventTime": "2024-05-21T12:51:37.127140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDrJI1z5pXqMkbeM9"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "58f872b7-acb7-40d4-8214-c80c6d0987f8", "DetectTime": "2024-05-21T12:51:37.137204+00:00", "EventTime": "2024-05-21T12:51:37.137223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch8FpO3zCx1Vrf5rBh"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "2bbc1257-3b9c-40c3-b5c7-95e9d1e1ff58", "DetectTime": "2024-05-21T12:51:37.143449+00:00", "EventTime": "2024-05-21T12:51:37.143470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COpHH4rp8xYw0Uzuc"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "559a7337-f651-4476-9d69-61f2732af8bb", "DetectTime": "2024-05-21T12:51:37.148297+00:00", "EventTime": "2024-05-21T12:51:37.148316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGtdX94aEXFPRzS1t8"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "bb295bf2-9d87-4e53-8c41-c72e0b15fe19", "DetectTime": "2024-05-21T12:51:37.153740+00:00", "EventTime": "2024-05-21T12:51:37.153759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAnujt1Mgiq0PWYjNg"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "df044144-f43c-4c5c-bc5e-af0507cab68a", "DetectTime": "2024-05-21T12:51:37.282089+00:00", "EventTime": "2024-05-21T12:51:37.282107+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXwZ03cznfZKuGzD6"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "ad9e7a95-9de8-4ca1-b72c-76c59b2b64d5", "DetectTime": "2024-05-21T12:51:37.298275+00:00", "EventTime": "2024-05-21T12:51:37.298300+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeXwZ03cznfZKuGzD6"], "accumulated_threat_level": 5.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "2eeffdcc-12aa-4625-b0b5-16d496c942f4", "DetectTime": "2024-05-21T12:51:37.410823+00:00", "EventTime": "2024-05-21T12:51:37.410842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJtGoX3jjJOiXTCO73"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "432c7c6d-b4d1-4937-854d-010b8fffe70e", "DetectTime": "2024-05-21T12:51:37.424108+00:00", "EventTime": "2024-05-21T12:51:37.424125+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJtGoX3jjJOiXTCO73"], "accumulated_threat_level": 6.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "2ed7bde8-f234-4520-9a9b-3723dab755e9", "DetectTime": "2024-05-21T12:51:37.524349+00:00", "EventTime": "2024-05-21T12:51:37.524371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ZK6X34mBh3xrV4zc"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "ec866bd4-ba77-4bbe-97a2-df12492d13f8", "DetectTime": "2024-05-21T12:51:37.638091+00:00", "EventTime": "2024-05-21T12:51:37.638113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZ0Vr2NxrmadUzVSa"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "de21b064-7b20-4217-b7e8-5aa586cedb8d", "DetectTime": "2024-05-21T12:51:37.664054+00:00", "EventTime": "2024-05-21T12:51:37.664074+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fzfw2eqYRjAaSk59"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "bee6a3bb-1074-4668-8fc4-d6d4294ce390", "DetectTime": "2024-05-21T12:51:37.678915+00:00", "EventTime": "2024-05-21T12:51:37.678937+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fzfw2eqYRjAaSk59"], "accumulated_threat_level": 6.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "91aa53a1-6c21-4aea-a59c-d122ce61663b", "DetectTime": "2024-05-21T12:51:37.705259+00:00", "EventTime": "2024-05-21T12:51:37.705284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crnimx3GFlzKVgpIni"], "accumulated_threat_level": 8.799999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "3154e587-f85e-4c22-8134-c6c4fe5073b4", "DetectTime": "2024-05-21T12:51:37.720432+00:00", "EventTime": "2024-05-21T12:51:37.720454+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWZkl53a7Nhuqihuj4"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "7bdf97c2-2d19-458c-8ff1-8bec5777a51e", "DetectTime": "2024-05-21T12:51:37.734845+00:00", "EventTime": "2024-05-21T12:51:37.734867+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWZkl53a7Nhuqihuj4"], "accumulated_threat_level": 7.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "70d0b2c8-5d1b-4d98-a98e-00e9bd3c2d3f", "DetectTime": "2024-05-21T12:51:37.752871+00:00", "EventTime": "2024-05-21T12:51:37.752892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq4DT30KdQDKsrSQg"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "d6c13e42-749a-4d5f-8d54-8814e6d56a0c", "DetectTime": "2024-05-21T12:51:37.769182+00:00", "EventTime": "2024-05-21T12:51:37.769211+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJq4DT30KdQDKsrSQg"], "accumulated_threat_level": 7.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "9d3c281d-2d71-4413-99e8-0f5b0f3c183d", "DetectTime": "2024-05-21T12:51:37.796655+00:00", "EventTime": "2024-05-21T12:51:37.796680+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKnTo1OuBtSYIAvdj"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "bca9e50a-5564-4f1b-a907-c07b16a2bd79", "DetectTime": "2024-05-21T12:51:37.813272+00:00", "EventTime": "2024-05-21T12:51:37.813306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoKnTo1OuBtSYIAvdj"], "accumulated_threat_level": 8.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "73d82ddd-77a7-4440-95a8-907bd0b2d8d9", "DetectTime": "2024-05-21T12:51:37.818914+00:00", "EventTime": "2024-05-21T12:51:37.818936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpTz84bnpgtOM6vc1"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "baf151ed-aff9-4631-82de-91a8415382bf", "DetectTime": "2024-05-21T12:51:38.167076+00:00", "EventTime": "2024-05-21T12:51:38.167098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crvjim1O3OszoH0Fu6"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "17f5badf-353c-40b7-847f-ed65f619e31b", "DetectTime": "2024-05-21T12:51:38.176245+00:00", "EventTime": "2024-05-21T12:51:38.176264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Zg9B6fSzQXe03Yb"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "610254ee-f93c-4786-8961-269c18c5deac", "DetectTime": "2024-05-21T12:51:38.196095+00:00", "EventTime": "2024-05-21T12:51:38.196122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP0QZL2MjW8XAv4L28"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "edd219d5-5eaf-4159-8c7c-2fca923b7441", "DetectTime": "2024-05-21T12:51:38.239859+00:00", "EventTime": "2024-05-21T12:51:38.239878+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWm7m71rVLg8LhG0yl"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "f708decf-f081-4825-923a-ea6e3efad5d9", "DetectTime": "2024-05-21T12:51:38.253821+00:00", "EventTime": "2024-05-21T12:51:38.253840+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWm7m71rVLg8LhG0yl"], "accumulated_threat_level": 8.5, "timewindow": 40} +{"Format": "IDEA0", "ID": "e01e12cf-6087-461c-a0c5-2f3d15009773", "DetectTime": "2024-05-21T12:51:38.280237+00:00", "EventTime": "2024-05-21T12:51:38.280255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFb6th4VwbcWqAhHyk"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "ec5ee41b-8589-440b-a1aa-8ebc7ac73bd6", "DetectTime": "2024-05-21T12:51:38.286677+00:00", "EventTime": "2024-05-21T12:51:38.286695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvFKgi40djnSNPm2C1"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "8a178ee2-05bb-478b-b2ce-0df9a21beead", "DetectTime": "2024-05-21T12:51:38.301756+00:00", "EventTime": "2024-05-21T12:51:38.301776+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90b763UY6pwBYwGjd"], "accumulated_threat_level": 0, "timewindow": 40} +{"Format": "IDEA0", "ID": "1f30c93a-048c-41f0-be21-036e9c3a4a93", "DetectTime": "2024-05-21T12:51:38.315461+00:00", "EventTime": "2024-05-21T12:51:38.315479+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90b763UY6pwBYwGjd"], "accumulated_threat_level": 9.0, "timewindow": 40} +{"Format": "IDEA0", "ID": "971fd6da-fb77-4a0e-8fc4-b916b4efc352", "DetectTime": "2024-05-21T12:51:38.329952+00:00", "EventTime": "2024-05-21T12:51:38.329972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTcaX346yUj705Xrt9"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "072725f0-6d71-49a9-99d5-76993bb64fc2", "DetectTime": "2024-05-21T12:51:38.334689+00:00", "EventTime": "2024-05-21T12:51:38.334708+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxBWdY3e30OztDetf4"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "7311c6bc-2226-42d5-99a3-d448e5ce4493", "DetectTime": "2024-05-21T12:51:38.419381+00:00", "EventTime": "2024-05-21T12:51:38.419404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CddYoZ1oOcmVsonw53"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "880c8ba1-60d0-42d3-9d2d-69585bce11f8", "DetectTime": "2024-05-21T12:51:38.426865+00:00", "EventTime": "2024-05-21T12:51:38.426885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6mNT3jrOA9O0IEGc"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "686ee367-b31e-4a3a-9d2f-d8c310473c51", "DetectTime": "2024-05-21T12:51:38.712460+00:00", "EventTime": "2024-05-21T12:51:38.712478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPcn3N2mWf5aVpEPj6"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "e9d82d20-f0a7-4abb-ae4a-f2aac5be5dab", "DetectTime": "2024-05-21T12:51:38.787660+00:00", "EventTime": "2024-05-21T12:51:38.787678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXKej2fX9vqllHhRi"], "accumulated_threat_level": 9.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "e580bbb2-e341-42f2-a9d5-357c7384dfa6", "DetectTime": "2024-05-21T12:51:38.829011+00:00", "EventTime": "2024-05-21T12:51:38.829030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchjNy4jDuHeqhn0o5"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "2b327002-bf44-4e97-92d1-2614bd228e06", "DetectTime": "2024-05-21T12:51:38.951922+00:00", "EventTime": "2024-05-21T12:51:38.951943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoDMlD213jgS82htGl"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "d07f97d6-0cc8-4666-933e-f8bce36f354c", "DetectTime": "2024-05-21T12:51:39.059123+00:00", "EventTime": "2024-05-21T12:51:39.059146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CprsyFPHh9sDUWB44"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "de05c291-86f7-4f98-9037-ad6f77601ee6", "DetectTime": "2024-05-21T12:51:39.065605+00:00", "EventTime": "2024-05-21T12:51:39.065626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csw1OjFk51J84SZE7"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "53c102fb-0b60-4efb-954f-6e5c109d4f0a", "DetectTime": "2024-05-21T12:51:39.080965+00:00", "EventTime": "2024-05-21T12:51:39.080986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9X0wn4EeZPrjTm4Qe"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "abddfaff-2e89-4f6e-ae86-c1a14500fece", "DetectTime": "2024-05-21T12:51:39.086312+00:00", "EventTime": "2024-05-21T12:51:39.086333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUMDU375IIcevBdl"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "a771c92c-2483-44a6-8c20-c0e8863804de", "DetectTime": "2024-05-21T12:51:39.091422+00:00", "EventTime": "2024-05-21T12:51:39.091452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadEmUfRatTZSDKL3"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "076881c0-6d3d-4a80-a266-37a889407533", "DetectTime": "2024-05-21T12:51:39.611233+00:00", "EventTime": "2024-05-21T12:51:39.611263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClcyNh3EyZ910KbGo"], "accumulated_threat_level": 4.0, "timewindow": 172} +{"Format": "IDEA0", "ID": "04a44321-7c94-4cde-982e-794155528e4f", "DetectTime": "2024-05-21T12:51:39.618009+00:00", "EventTime": "2024-05-21T12:51:39.618028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkqkA3ynvh0L5QIce"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "0cbb47ac-f4f1-42d1-89f8-ede8345a62ec", "DetectTime": "2024-05-21T12:51:39.658606+00:00", "EventTime": "2024-05-21T12:51:39.658628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp4kmg4ijhwW7cjT69"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "55d0495f-9aa3-4dad-81d1-f71e11745d6b", "DetectTime": "2024-05-21T12:51:39.931162+00:00", "EventTime": "2024-05-21T12:51:39.931183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmoXqwxHVwo4iMed"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "d12c3ca4-84a3-4c74-a062-59d71cc5da03", "DetectTime": "2024-05-21T12:51:39.948394+00:00", "EventTime": "2024-05-21T12:51:39.948414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9YbzDk04JfnwQVM8"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "27bf355a-731d-41af-b62a-3255b51f2d82", "DetectTime": "2024-05-21T12:51:39.991743+00:00", "EventTime": "2024-05-21T12:51:39.991767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSbrAP1KXD85tAHaHd"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "1f9ba513-c1ea-42bc-89a7-01a2ca1a9576", "DetectTime": "2024-05-21T12:51:40.040726+00:00", "EventTime": "2024-05-21T12:51:40.040752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvQsr1MCTZ70Zlt3k"], "accumulated_threat_level": 10.4, "timewindow": 174} +{"Format": "IDEA0", "ID": "b63e2e8b-e3eb-4958-b5e1-08673acf6430", "DetectTime": "2024-05-21T12:51:40.045851+00:00", "EventTime": "2024-05-21T12:51:40.045872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3SmhHDDxuzg5yX4g"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "efa49fc7-4376-4044-944e-9e80698a123a", "DetectTime": "2024-05-21T12:51:40.053701+00:00", "EventTime": "2024-05-21T12:51:40.053719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAJCR4ic3fdD629Pc"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "f4a98e09-aa27-495f-8902-4afc02269424", "DetectTime": "2024-05-21T12:51:40.398749+00:00", "EventTime": "2024-05-21T12:51:40.398771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chyspr3Qe6yBtNQzFi"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "155f0ad3-df36-4c43-8ec2-6cece830c01e", "DetectTime": "2024-05-21T12:51:40.512323+00:00", "EventTime": "2024-05-21T12:51:40.512344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvF9JA3DpvpeFdV7C7"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "574cef68-8db0-4f8f-8ee9-0300e6c3ded7", "DetectTime": "2024-05-21T12:51:40.626084+00:00", "EventTime": "2024-05-21T12:51:40.626104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbZ10C1UIp2hm2KLq3"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "cb3b9db0-f856-4a99-9e6c-4060073ca330", "DetectTime": "2024-05-21T12:51:40.636140+00:00", "EventTime": "2024-05-21T12:51:40.636162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfy2zn2gRbVjXZGxK5"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "55d0abba-429f-496c-8d3b-6b6a2aadcfcd", "DetectTime": "2024-05-21T12:51:40.674006+00:00", "EventTime": "2024-05-21T12:51:40.674027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSYsnI1Du6zNAiaTj7"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "3e68f5bc-7401-43d3-903c-2b47ce415e4b", "DetectTime": "2024-05-21T12:51:40.700286+00:00", "EventTime": "2024-05-21T12:51:40.700308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgBnHEowGOdoJAGV5"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "473cfc78-bd4a-4cd2-a63f-dfd66f1a546b", "DetectTime": "2024-05-21T12:51:41.089331+00:00", "EventTime": "2024-05-21T12:51:41.089357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNHK3O2pUK88AWhcm5"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "c3eab930-f679-4e06-aec9-3fa1d27be540", "DetectTime": "2024-05-21T12:51:41.138280+00:00", "EventTime": "2024-05-21T12:51:41.138301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUPQGH1WEWkS0vAy12"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "9f321b6e-5d85-4cb1-ac5e-8639657dc8ea", "DetectTime": "2024-05-21T12:51:41.143582+00:00", "EventTime": "2024-05-21T12:51:41.143600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cso9Y91TsokyE2PsYh"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "564b07a9-92f3-4a5d-8d9b-0fbacd58384a", "DetectTime": "2024-05-21T12:51:41.148192+00:00", "EventTime": "2024-05-21T12:51:41.148210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUIll9vWeKBKg5X8c"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "d66ab9c3-bd5a-4db6-91bd-84d500f08b89", "DetectTime": "2024-05-21T12:51:41.178532+00:00", "EventTime": "2024-05-21T12:51:41.178553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCezU1ZuYffKRSep3"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "c57a0026-9988-411b-a119-0f36d4136abb", "DetectTime": "2024-05-21T12:51:41.240045+00:00", "EventTime": "2024-05-21T12:51:41.240066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czfo8Kiq3nSOGGVLb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 174} +{"Format": "IDEA0", "ID": "2438300c-6e8a-4e25-bfc1-06b4c9c48dc4", "DetectTime": "2024-05-21T12:51:41.594255+00:00", "EventTime": "2024-05-21T12:51:41.594278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz7axjm0L92RihL86"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "ded876b7-d4f5-4dac-8104-7f8226994fe5", "DetectTime": "2024-05-21T12:51:41.611796+00:00", "EventTime": "2024-05-21T12:51:41.611818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkazAm1jj1kgAM6SY2"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "cf70a8e5-55a3-4d5f-8bb6-1b61c907fc6d", "DetectTime": "2024-05-21T12:51:41.634148+00:00", "EventTime": "2024-05-21T12:51:41.634171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYsunI3uQe1jWU82ch"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "37484c88-0820-4f98-9289-3c5ad843d4c3", "DetectTime": "2024-05-21T12:51:41.689226+00:00", "EventTime": "2024-05-21T12:51:41.689245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvb44VlNTrEfXwgl"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "ba17d2cf-b7a8-45f4-8de3-37d601e27454", "DetectTime": "2024-05-21T12:51:41.695690+00:00", "EventTime": "2024-05-21T12:51:41.695714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEKgXW2BdzV1JwfNs1"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "8ad19f11-a10c-42af-9eb2-cd5693d88041", "DetectTime": "2024-05-21T12:51:41.712642+00:00", "EventTime": "2024-05-21T12:51:41.712664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHGge7mubZQL12dnj"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "310910c0-7876-454b-8ddb-f7cde53e73cf", "DetectTime": "2024-05-21T12:51:41.813792+00:00", "EventTime": "2024-05-21T12:51:41.813815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOamP2FtcxkfYv0B1"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "a5fd343f-e779-4382-bb50-7101464d8e8b", "DetectTime": "2024-05-21T12:51:41.823985+00:00", "EventTime": "2024-05-21T12:51:41.824006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cny0wg4IE3QmzPru7g"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "85dd58e2-3e8a-416f-9d6f-44fc1922e635", "DetectTime": "2024-05-21T12:51:41.862703+00:00", "EventTime": "2024-05-21T12:51:41.862726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzksMQ3sbHErMpQETk"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "d6dfdd49-977d-47e2-96da-c2b3da038e02", "DetectTime": "2024-05-21T12:51:42.085183+00:00", "EventTime": "2024-05-21T12:51:42.085203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpt7U51KpRyoS6pxMa"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "133bab4a-c8fd-4ce0-a833-3da06c59fa95", "DetectTime": "2024-05-21T12:51:42.271307+00:00", "EventTime": "2024-05-21T12:51:42.271330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7Ujo2Fbsb6o9TMFl"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "18b96588-ba4d-4253-b624-d72b7af740b7", "DetectTime": "2024-05-21T12:51:42.278739+00:00", "EventTime": "2024-05-21T12:51:42.278760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpfrhp113u2jDexopi"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "2f866257-2613-41e4-bc7f-0f8dcd6d92a9", "DetectTime": "2024-05-21T12:51:42.376430+00:00", "EventTime": "2024-05-21T12:51:42.376452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIywd81bkAnUpOwrjg"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "6a7afdf7-61d0-4958-b9a8-b3d333ee3ac5", "DetectTime": "2024-05-21T12:51:42.388723+00:00", "EventTime": "2024-05-21T12:51:42.388744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6hIBaTg0Ntec6Aj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 174} +{"Format": "Json", "ID": "6a7afdf7-61d0-4958-b9a8-b3d333ee3ac5", "DetectTime": "2024-05-21T12:51:42.388723+00:00", "EventTime": "2024-05-21T12:51:42.388744+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-08T05:09:39.877166+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2024/05/21 12:51:42.561965)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 174, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fa3169e8-a073-4731-9340-a7df96f70f35", "DetectTime": "2024-05-21T12:51:42.681562+00:00", "EventTime": "2024-05-21T12:51:42.681588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN1Xsg39NIk2YTzpyk"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "64577620-f147-44e4-b908-c1b16b2900a3", "DetectTime": "2024-05-21T12:51:42.686484+00:00", "EventTime": "2024-05-21T12:51:42.686503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWzQk22KfW3bMVYuH2"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "893840d1-fcac-4569-bfbf-c47dae933454", "DetectTime": "2024-05-21T12:51:42.764485+00:00", "EventTime": "2024-05-21T12:51:42.764509+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj4XYloah14oFGVqg"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "adae59a4-c3d7-4730-af40-71f003332b8b", "DetectTime": "2024-05-21T12:51:42.771944+00:00", "EventTime": "2024-05-21T12:51:42.771965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCQKfr1YRRHyd3qkT3"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "3fc80528-d5e9-4db6-bff8-36b2e628c314", "DetectTime": "2024-05-21T12:51:42.884210+00:00", "EventTime": "2024-05-21T12:51:42.884231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIII883HqDLTx5ITO9"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "9a111eba-b426-44d6-b179-6d55c071da2f", "DetectTime": "2024-05-21T12:51:42.889374+00:00", "EventTime": "2024-05-21T12:51:42.889393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeEdqY2hcUtwmbHjq6"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "d341d80e-bacf-4acb-9e61-a5d06eb165ba", "DetectTime": "2024-05-21T12:51:43.156928+00:00", "EventTime": "2024-05-21T12:51:43.156952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKNxk39uvIeMyDHbj"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "565c970b-3286-41eb-b303-9a5e80d8cb33", "DetectTime": "2024-05-21T12:51:43.165316+00:00", "EventTime": "2024-05-21T12:51:43.165335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsMeMc1whNJeDpNAD9"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "0ff8f89c-9bea-4561-b4ea-31be9b8027d3", "DetectTime": "2024-05-21T12:51:43.423834+00:00", "EventTime": "2024-05-21T12:51:43.423854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C27jc64DRPzdAEGpHf"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "8686f13d-a377-4574-9cba-e6b5cbaf781f", "DetectTime": "2024-05-21T12:51:43.428774+00:00", "EventTime": "2024-05-21T12:51:43.428794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtZ9At1jyFHhBjcMNc"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "98cfdfb9-6144-47d0-babe-0f1eed314756", "DetectTime": "2024-05-21T12:51:43.464183+00:00", "EventTime": "2024-05-21T12:51:43.464205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYcLc3J1hFwgC9Gkb"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "340a181b-4e21-400b-a39b-658d60f9a263", "DetectTime": "2024-05-21T12:51:43.469071+00:00", "EventTime": "2024-05-21T12:51:43.469090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ9PPp2vUo4nGR5OK"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "d1013f19-5078-4761-8b03-3a07c7ae4a0e", "DetectTime": "2024-05-21T12:51:43.475537+00:00", "EventTime": "2024-05-21T12:51:43.475557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDg8yC1Ci5YK5DSr57"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "59bd827b-6eac-4568-88ca-8c395b53e8bd", "DetectTime": "2024-05-21T12:51:43.862477+00:00", "EventTime": "2024-05-21T12:51:43.862498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CssWfD4RDvdsZitT32"], "accumulated_threat_level": 0.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "05e7d119-1de0-4448-a059-af386a43cd38", "DetectTime": "2024-05-21T12:51:43.915437+00:00", "EventTime": "2024-05-21T12:51:43.915463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8eFwH2kap6mV7EUQd"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "51df6a77-6328-441d-a9f2-5c8863d34d56", "DetectTime": "2024-05-21T12:51:43.934772+00:00", "EventTime": "2024-05-21T12:51:43.934796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVggaesVBSN2B23Ih"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "03f2c752-c567-441f-b8ac-a6bf35503feb", "DetectTime": "2024-05-21T12:51:44.012075+00:00", "EventTime": "2024-05-21T12:51:44.012097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm623UtfOFKzthSLl"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "9646cfb8-73a2-424b-a0ad-7697ce7c78d4", "DetectTime": "2024-05-21T12:51:44.416912+00:00", "EventTime": "2024-05-21T12:51:44.416934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCMImq2nvJ1PrfG3Gg"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "f05821dc-2eba-4990-88c9-1b2d5a24c175", "DetectTime": "2024-05-21T12:51:44.466154+00:00", "EventTime": "2024-05-21T12:51:44.466178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDdUB2FEo5GvNulqd"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "1b10f8c1-14e2-4be9-9a51-0bb4d74f0f63", "DetectTime": "2024-05-21T12:51:44.473951+00:00", "EventTime": "2024-05-21T12:51:44.473972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWPmBu3AOrrP9YUu49"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "c1d9e9ea-af5f-42b8-8274-78faa13d98ff", "DetectTime": "2024-05-21T12:51:44.499028+00:00", "EventTime": "2024-05-21T12:51:44.499050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm8uNF4yZMMygQZqYl"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "717fffd5-7061-4dc8-b991-3de91498d0c3", "DetectTime": "2024-05-21T12:51:44.569918+00:00", "EventTime": "2024-05-21T12:51:44.569938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcQYJFexSErbQVwh", "CKeo2B29Wwo5vzjLXk", "CsBjOj4faKxwYozwAf", "CqxE2c2M6ZGGBYdMh1"], "accumulated_threat_level": 0.5, "timewindow": 193} +{"Format": "IDEA0", "ID": "7007fccb-92b4-4de5-a337-0542a0b193a6", "DetectTime": "2024-05-21T12:51:44.605817+00:00", "EventTime": "2024-05-21T12:51:44.605838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK3qnk3q6STfjRIIfi"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "ef7fa5b2-8ca8-4ef8-92c1-9c95cbd537a7", "DetectTime": "2024-05-21T12:51:44.710186+00:00", "EventTime": "2024-05-21T12:51:44.710207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb0QLy2LNNRk9O9JL7"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "eb2f3c30-9448-4b22-87bc-687f26e23e36", "DetectTime": "2024-05-21T12:51:44.768005+00:00", "EventTime": "2024-05-21T12:51:44.768030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGImtBQ7NV6NKtT4"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "44b3fa90-17b5-43b2-866e-696954b780d3", "DetectTime": "2024-05-21T12:51:44.782560+00:00", "EventTime": "2024-05-21T12:51:44.782583+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcM2ba2rluQyMblo1b"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "1dda31c4-63ec-4bda-b074-c012419a867f", "DetectTime": "2024-05-21T12:51:44.789256+00:00", "EventTime": "2024-05-21T12:51:44.789277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXaoL25qJhidfVYFj"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "8ad53eaf-12ad-4775-be43-b334d75b21f9", "DetectTime": "2024-05-21T12:51:44.794000+00:00", "EventTime": "2024-05-21T12:51:44.794018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZKH2p39Q2hTIC1Jtk"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "0cc4e7bc-d4ef-4197-bb49-2ec7f71600b4", "DetectTime": "2024-05-21T12:51:44.798762+00:00", "EventTime": "2024-05-21T12:51:44.798780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJOVS7u9yllY8k7W1"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "8d949320-1db6-4f38-90e6-f473fa596719", "DetectTime": "2024-05-21T12:51:45.061275+00:00", "EventTime": "2024-05-21T12:51:45.061317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct1r5q1dcCaxKBvgG7"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "1f0f2d1f-a3e5-480f-bdd0-f57bde0c3159", "DetectTime": "2024-05-21T12:51:45.126831+00:00", "EventTime": "2024-05-21T12:51:45.126853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5oda49lMJrtgMc02"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "0747ab93-6f32-438c-a971-1b87a6e0a944", "DetectTime": "2024-05-21T12:51:45.326164+00:00", "EventTime": "2024-05-21T12:51:45.326185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6sZFiHJPoGplDylb"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "cee7fcb7-b863-4e78-8f68-7d546b362ee9", "DetectTime": "2024-05-21T12:51:45.664247+00:00", "EventTime": "2024-05-21T12:51:45.664271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSsbi2ks135pr0xGe"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "f85494fa-37e8-4873-bc25-b6a13d87f73b", "DetectTime": "2024-05-21T12:51:45.692153+00:00", "EventTime": "2024-05-21T12:51:45.692176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3X7Oojgk9WSgISa"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "bc888715-7ae8-4b75-94fc-0cd561948112", "DetectTime": "2024-05-21T12:51:45.703141+00:00", "EventTime": "2024-05-21T12:51:45.703164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9TmHs1MrnuBqZkaHd"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "5c408d94-fe05-454e-b8c7-bef0362c9a44", "DetectTime": "2024-05-21T12:51:45.708500+00:00", "EventTime": "2024-05-21T12:51:45.708525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7rP3e4RfYxdR1a3H6"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "2f622486-3add-4ba2-9587-4a525654e32b", "DetectTime": "2024-05-21T12:51:45.804364+00:00", "EventTime": "2024-05-21T12:51:45.804387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV5lxj39wybpQdvj28"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "6afe8ebc-8fb6-4fc8-b103-d49bb4306eb3", "DetectTime": "2024-05-21T12:51:45.847448+00:00", "EventTime": "2024-05-21T12:51:45.847471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENZXM10uRcmepZUX6"], "accumulated_threat_level": 4.8, "timewindow": 173} +{"Format": "IDEA0", "ID": "c64fe38f-479a-4dd7-a3bb-80a551a08cc2", "DetectTime": "2024-05-21T12:51:45.889857+00:00", "EventTime": "2024-05-21T12:51:45.889879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx2cUXjkHlBmQqcZi"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "4bc176c3-5312-4318-8e0f-b8ec216cb0d8", "DetectTime": "2024-05-21T12:51:45.897945+00:00", "EventTime": "2024-05-21T12:51:45.897967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQOkRe25rJl8g06mld"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "7c5798c2-0be8-4092-b111-16296f993e4a", "DetectTime": "2024-05-21T12:51:45.903065+00:00", "EventTime": "2024-05-21T12:51:45.903087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSmcyy1CgpPPhv8jSl"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "7f1d44a4-0291-44d4-b5ad-ed5f5ee2a1a7", "DetectTime": "2024-05-21T12:51:45.933929+00:00", "EventTime": "2024-05-21T12:51:45.933949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjSdU723AKRqKyG3vj"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "479886b6-eae1-4b58-b7b9-d5f7c08947fe", "DetectTime": "2024-05-21T12:51:46.260597+00:00", "EventTime": "2024-05-21T12:51:46.260618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI10301RNUp7bE6Vl8"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "7f506dbe-5847-4b7c-8e93-2faa7153ef54", "DetectTime": "2024-05-21T12:51:46.373345+00:00", "EventTime": "2024-05-21T12:51:46.373364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIIpR29UfAi6RK7yc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "779eccf4-ad22-4c0b-b7ce-215256ab7225", "DetectTime": "2024-05-21T12:51:46.740765+00:00", "EventTime": "2024-05-21T12:51:46.740789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDewE33NzkCTzMwPte"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "8a46960a-8037-4d05-9333-daeb6825a2bb", "DetectTime": "2024-05-21T12:51:46.745817+00:00", "EventTime": "2024-05-21T12:51:46.745837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9RczA1p4RTYbwoeXi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "5dbaf841-7568-448e-9d12-5cb7c06d4b7c", "DetectTime": "2024-05-21T12:51:46.750870+00:00", "EventTime": "2024-05-21T12:51:46.750894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSWXnI3CPQxgCKThQc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "6268d640-69dd-48b5-9ce8-7f55d6818c95", "DetectTime": "2024-05-21T12:51:46.788306+00:00", "EventTime": "2024-05-21T12:51:46.788330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqRI9FFfAtENujTp4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "7cd6597a-fba8-4f42-8da6-4b0dfbc9a73a", "DetectTime": "2024-05-21T12:51:46.795182+00:00", "EventTime": "2024-05-21T12:51:46.795205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxt2C6Cljj98zsm88"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "997b99f1-ce8d-42f9-a950-65e5d2e20017", "DetectTime": "2024-05-21T12:51:46.981026+00:00", "EventTime": "2024-05-21T12:51:46.981045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIbkhv3FbJbilhFp6i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "9c8153dc-da91-4982-8ac1-efe8dba8a7d4", "DetectTime": "2024-05-21T12:51:46.995339+00:00", "EventTime": "2024-05-21T12:51:46.995359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3Z2Hn28pzyUq2jiy1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "a013cd74-3953-45ad-8970-038982b4918e", "DetectTime": "2024-05-21T12:51:47.303830+00:00", "EventTime": "2024-05-21T12:51:47.303855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwRxC2bfRwFJCqGs8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "640ca529-eb91-46b4-b1d8-cd09caa69878", "DetectTime": "2024-05-21T12:51:47.315561+00:00", "EventTime": "2024-05-21T12:51:47.315584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblRz03KIy6IAfQA94"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "f9f827b7-f4d1-422e-b53a-2c413d5aada7", "DetectTime": "2024-05-21T12:51:47.479426+00:00", "EventTime": "2024-05-21T12:51:47.479448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbLisW19CzROZFjOY2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "3f4f6207-54f0-47af-8779-09db462107d5", "DetectTime": "2024-05-21T12:51:47.484755+00:00", "EventTime": "2024-05-21T12:51:47.484775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COrKz43EWsK18aiTB5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "4f696852-42af-4de3-9092-5c0cfd0b7ca1", "DetectTime": "2024-05-21T12:51:47.671578+00:00", "EventTime": "2024-05-21T12:51:47.671599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckp2cjip3sfnTw6ue"], "accumulated_threat_level": 3.2, "timewindow": 174} +{"Format": "IDEA0", "ID": "a4d65583-7bcf-4474-ba54-c5842bc278e9", "DetectTime": "2024-05-21T12:51:47.699723+00:00", "EventTime": "2024-05-21T12:51:47.699780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmjG5imZteqDhPuIe"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "7869e824-354f-4de3-8d0c-96d54f3c2a7f", "DetectTime": "2024-05-21T12:51:47.752574+00:00", "EventTime": "2024-05-21T12:51:47.752593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvziGY2GbMZkDTZgAg"], "accumulated_threat_level": 4.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "3d611e32-839b-49b3-9df0-3c96545dd4a9", "DetectTime": "2024-05-21T12:51:48.079369+00:00", "EventTime": "2024-05-21T12:51:48.079392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d7743pOgAo3n1sWj"], "accumulated_threat_level": 5.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "be3f5d6f-c9da-4744-be62-211291f4c7cb", "DetectTime": "2024-05-21T12:51:48.085021+00:00", "EventTime": "2024-05-21T12:51:48.085040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqTxJL3X3FCWL6YvLh"], "accumulated_threat_level": 5.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "cace4536-eaea-40fa-aaa9-dfe46424aea3", "DetectTime": "2024-05-21T12:51:48.173718+00:00", "EventTime": "2024-05-21T12:51:48.173739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmAz240ptNKKAhaw4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 174} +{"Format": "IDEA0", "ID": "3c2470d5-a7a6-4d2b-8680-4356ac3b597f", "DetectTime": "2024-05-21T12:51:48.229396+00:00", "EventTime": "2024-05-21T12:51:48.229417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEd42D2beNz1wtAJfb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "4cce5608-79ff-44ce-befb-ebfbf373f502", "DetectTime": "2024-05-21T12:51:48.284722+00:00", "EventTime": "2024-05-21T12:51:48.284741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfqDX3jOUBoWhOfk5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "7b8ae9b1-d50c-4776-aa5d-99a2aa97b467", "DetectTime": "2024-05-21T12:51:48.336446+00:00", "EventTime": "2024-05-21T12:51:48.336468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hv8O2qvn7Iosod21"], "accumulated_threat_level": 8.799999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "4391837d-769e-4fab-b956-4ec21fe464bd", "DetectTime": "2024-05-21T12:51:48.375497+00:00", "EventTime": "2024-05-21T12:51:48.375521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceg9L144ezf6T9ZXvg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "3f872631-2324-4442-833a-83b23d582940", "DetectTime": "2024-05-21T12:51:48.642951+00:00", "EventTime": "2024-05-21T12:51:48.642971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywZTd4NYvTHShoKQk"], "accumulated_threat_level": 9.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "9074055f-a1d6-475e-95af-e48efbcb8908", "DetectTime": "2024-05-21T12:51:48.697802+00:00", "EventTime": "2024-05-21T12:51:48.697821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBsTcv2QwXBI4VJjNj"], "accumulated_threat_level": 10.4, "timewindow": 174} +{"Format": "IDEA0", "ID": "94d76e0e-a66a-4f99-8aba-b7a5ce5493a5", "DetectTime": "2024-05-21T12:51:48.752393+00:00", "EventTime": "2024-05-21T12:51:48.752416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClK6iT207Zaf2DtdVf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 174} +{"Format": "IDEA0", "ID": "e1ea5ebd-f152-49bd-b0dc-4f3e13a0433d", "DetectTime": "2024-05-21T12:51:48.805742+00:00", "EventTime": "2024-05-21T12:51:48.805763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWZDsn3vwJTtdvO8o4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 174} +{"Format": "Json", "ID": "e1ea5ebd-f152-49bd-b0dc-4f3e13a0433d", "DetectTime": "2024-05-21T12:51:48.805742+00:00", "EventTime": "2024-05-21T12:51:48.805763+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-08T05:40:06.860787+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2024/05/21 12:51:49.038328)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 174, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2fb68140-bac3-40c8-a8d5-431acfba946e", "DetectTime": "2024-05-21T12:51:49.048732+00:00", "EventTime": "2024-05-21T12:51:49.048751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvSh6n25Gi9ZbuoKti"], "accumulated_threat_level": 0, "timewindow": 174} +{"Format": "IDEA0", "ID": "7bafaf33-1645-49dc-aec9-77bea2a7b627", "DetectTime": "2024-05-21T12:51:49.066380+00:00", "EventTime": "2024-05-21T12:51:49.066401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa6t9284jXTfXr6zb"], "accumulated_threat_level": 0.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "2c3e11fb-f598-40a4-993b-e6abcef689ea", "DetectTime": "2024-05-21T12:51:49.078048+00:00", "EventTime": "2024-05-21T12:51:49.078068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtGmpN1sQ7TWwOC065"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "0870148d-83c2-4199-af0a-9bc0f7dcec53", "DetectTime": "2024-05-21T12:51:49.276996+00:00", "EventTime": "2024-05-21T12:51:49.277016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbaRP3TnDeoQ6OH67"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "849f22a4-2772-48d9-9646-665dea76766e", "DetectTime": "2024-05-21T12:51:49.332757+00:00", "EventTime": "2024-05-21T12:51:49.332776+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnNmwygiDUroGMt1"], "accumulated_threat_level": 3.2, "timewindow": 174} +{"Format": "IDEA0", "ID": "e5fd7c9f-eac2-44de-a26a-0e47dd52526c", "DetectTime": "2024-05-21T12:51:49.381970+00:00", "EventTime": "2024-05-21T12:51:49.381988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ638LMilZ7JwfYj7"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "a48b2a74-07af-43ae-ac32-6f3d8d490488", "DetectTime": "2024-05-21T12:51:49.432203+00:00", "EventTime": "2024-05-21T12:51:49.432222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw74Kl4h9ghBJEF3Wi"], "accumulated_threat_level": 4.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "12e5d72a-037b-4b85-90ff-284537877817", "DetectTime": "2024-05-21T12:51:49.474392+00:00", "EventTime": "2024-05-21T12:51:49.474435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Pyu34JkO6apqd21g"], "accumulated_threat_level": 4.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "379834e7-0246-4a7c-b70c-7605dc90a58b", "DetectTime": "2024-05-21T12:51:49.519841+00:00", "EventTime": "2024-05-21T12:51:49.519860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaA9eK1kgkLuxVZps6"], "accumulated_threat_level": 5.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "86d35aed-7deb-47f9-9765-44ad98baae20", "DetectTime": "2024-05-21T12:51:49.574243+00:00", "EventTime": "2024-05-21T12:51:49.574260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXS4pJ1i6aPzkVieb5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 174} +{"Format": "IDEA0", "ID": "28c8ab9b-73be-46d6-9c34-bb4793fe6c3f", "DetectTime": "2024-05-21T12:51:49.844246+00:00", "EventTime": "2024-05-21T12:51:49.844264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFr2cc4G5MONhXW0Ph"], "accumulated_threat_level": 7.199999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "5d03de02-ac64-452d-9772-2c0521136102", "DetectTime": "2024-05-21T12:51:49.896940+00:00", "EventTime": "2024-05-21T12:51:49.896957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcCYr917Rz8NxeI5Q6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "cf1cae62-06fb-47d3-81e9-d0fc3fcc1f97", "DetectTime": "2024-05-21T12:51:49.946655+00:00", "EventTime": "2024-05-21T12:51:49.946690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjeEr3niUdSopdBeb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 174} +{"Format": "IDEA0", "ID": "03fbfeeb-e8e4-45e3-be41-5ef0d5f9b7bf", "DetectTime": "2024-05-21T12:51:49.998301+00:00", "EventTime": "2024-05-21T12:51:49.998334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztRqG2boEzH47lgA2"], "accumulated_threat_level": 9.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "df29f929-543f-480c-8cc9-578b0f2e6841", "DetectTime": "2024-05-21T12:51:50.061799+00:00", "EventTime": "2024-05-21T12:51:50.061837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxtuA2OpJGDCuGwXl"], "accumulated_threat_level": 10.4, "timewindow": 174} +{"Format": "IDEA0", "ID": "7a2b4000-1d21-4159-a237-3ef486a00de8", "DetectTime": "2024-05-21T12:51:50.103688+00:00", "EventTime": "2024-05-21T12:51:50.103718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0n9jPMgEJRGapLj7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 174} +{"Format": "IDEA0", "ID": "466b1b7f-0396-402f-aa1a-59011320e9cb", "DetectTime": "2024-05-21T12:51:50.145238+00:00", "EventTime": "2024-05-21T12:51:50.145259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7l4q4R8vFSWx4vf5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 174} +{"Format": "IDEA0", "ID": "d0886dd3-bede-4a1e-99cf-94408fd0de42", "DetectTime": "2024-05-21T12:51:50.427716+00:00", "EventTime": "2024-05-21T12:51:50.427736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSRcc3rhO7dOkuPRl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 174} +{"Format": "Json", "ID": "d0886dd3-bede-4a1e-99cf-94408fd0de42", "DetectTime": "2024-05-21T12:51:50.427716+00:00", "EventTime": "2024-05-21T12:51:50.427736+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T05:40:26.858139+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 174. (real time 2024/05/21 12:51:50.708910)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 174, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "494d925b-4e80-434f-a533-71a253993cda", "DetectTime": "2024-05-21T12:51:50.719976+00:00", "EventTime": "2024-05-21T12:51:50.719995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVmQRU2CvVNIknbu7c"], "accumulated_threat_level": 0.8, "timewindow": 174} +{"Format": "IDEA0", "ID": "ab779d3e-5d3d-4024-9e77-57e3fd047b69", "DetectTime": "2024-05-21T12:51:50.731193+00:00", "EventTime": "2024-05-21T12:51:50.731212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjnqzJ0GibFhSCh6"], "accumulated_threat_level": 1.6, "timewindow": 174} +{"Format": "IDEA0", "ID": "9b0365b7-247b-4178-b308-48811180b212", "DetectTime": "2024-05-21T12:51:50.741672+00:00", "EventTime": "2024-05-21T12:51:50.741690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG4CvU1qd1CaL9PKI6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 174} +{"Format": "IDEA0", "ID": "f30c2f93-a596-4cb4-b07d-7c0d0bd1e342", "DetectTime": "2024-05-21T12:51:50.751618+00:00", "EventTime": "2024-05-21T12:51:50.751636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTl313DAGrw0xcSp2"], "accumulated_threat_level": 3.2, "timewindow": 174} +{"Format": "IDEA0", "ID": "7ad3dda1-e51f-45ae-9e01-2e2c1b4d0cc1", "DetectTime": "2024-05-21T12:51:50.762829+00:00", "EventTime": "2024-05-21T12:51:50.762846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVp9T10UrVXMjBrq6"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "5bcf8bec-a00c-4644-aad0-a1cdabfcf194", "DetectTime": "2024-05-21T12:51:50.877662+00:00", "EventTime": "2024-05-21T12:51:50.877681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKTeuVakBSMP831ah"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "5ea29168-c4e9-4b86-b24c-ed0e7e76f1d3", "DetectTime": "2024-05-21T12:51:51.143183+00:00", "EventTime": "2024-05-21T12:51:51.143204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTiqSF1BeqsQq5aiy7"], "accumulated_threat_level": 1.3, "timewindow": 175} +{"Format": "IDEA0", "ID": "5dcc0584-c41c-4a58-bd67-3a24b79f60d2", "DetectTime": "2024-05-21T12:51:51.190378+00:00", "EventTime": "2024-05-21T12:51:51.190398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["93.195.196.119"]}], "Attach": [{"Content": "Connection to unknown destination port 6283/UDP destination IP 93.195.196.119. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJRJmh30A9S07UfVF8"], "accumulated_threat_level": 2.1, "timewindow": 175} +{"Format": "IDEA0", "ID": "fff19869-e2a3-4739-a152-7278e5803a6e", "DetectTime": "2024-05-21T12:51:51.247177+00:00", "EventTime": "2024-05-21T12:51:51.247196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mGN9kq9cmuX9q9l"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "83a362a5-06f5-4afe-a93f-13f70f65178e", "DetectTime": "2024-05-21T12:51:51.296629+00:00", "EventTime": "2024-05-21T12:51:51.296654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxYpF22hV8U44CgZk"], "accumulated_threat_level": 3.7, "timewindow": 175} +{"Format": "IDEA0", "ID": "79972faf-9e58-4cf2-84d9-c82adb685e58", "DetectTime": "2024-05-21T12:51:51.348516+00:00", "EventTime": "2024-05-21T12:51:51.348537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COzOgb11VyU3R2vpme"], "accumulated_threat_level": 4.5, "timewindow": 175} +{"Format": "IDEA0", "ID": "53a9b24a-f4ba-40ac-8076-dc8452d66db8", "DetectTime": "2024-05-21T12:51:51.398874+00:00", "EventTime": "2024-05-21T12:51:51.398893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7f1fAZhU6owcRQh"], "accumulated_threat_level": 5.3, "timewindow": 175} +{"Format": "IDEA0", "ID": "847320df-adbd-4857-a1bc-10c249ee17b0", "DetectTime": "2024-05-21T12:51:51.450232+00:00", "EventTime": "2024-05-21T12:51:51.450252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtNESW1ac7QJsdEQla"], "accumulated_threat_level": 6.1, "timewindow": 175} +{"Format": "IDEA0", "ID": "b0143088-be14-461e-b83a-5224e05ebb37", "DetectTime": "2024-05-21T12:51:51.698553+00:00", "EventTime": "2024-05-21T12:51:51.698576+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl0JIG1BPC2q6tDqyc"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "0a3fd0ab-19ad-44cd-83a7-aed99fc98fde", "DetectTime": "2024-05-21T12:51:51.738597+00:00", "EventTime": "2024-05-21T12:51:51.738615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDkeV3x4LwwvS827j"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 175} +{"Format": "IDEA0", "ID": "4de9fb05-6639-4449-b6dd-c70f58b5f449", "DetectTime": "2024-05-21T12:51:51.787000+00:00", "EventTime": "2024-05-21T12:51:51.787017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeEmt40aDXRiikNs1"], "accumulated_threat_level": 7.699999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "6d8312e5-1daa-4a69-aeb1-0f21ef2dd67a", "DetectTime": "2024-05-21T12:51:51.836258+00:00", "EventTime": "2024-05-21T12:51:51.836279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheVAiejStb1GK1v1"], "accumulated_threat_level": 8.5, "timewindow": 175} +{"Format": "IDEA0", "ID": "341f6a75-d1d7-4151-99a3-8cb96d32ba36", "DetectTime": "2024-05-21T12:51:51.899021+00:00", "EventTime": "2024-05-21T12:51:51.899039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGSyF100dvAicvth6"], "accumulated_threat_level": 9.3, "timewindow": 175} +{"Format": "IDEA0", "ID": "16cc87c2-b40c-4a4f-84b7-f9813d72cba9", "DetectTime": "2024-05-21T12:51:51.951886+00:00", "EventTime": "2024-05-21T12:51:51.951907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILNNU38hva3XDw7og"], "accumulated_threat_level": 10.100000000000001, "timewindow": 175} +{"Format": "IDEA0", "ID": "5b7632e6-a8b2-4b65-80f3-32b659c9401f", "DetectTime": "2024-05-21T12:51:51.995481+00:00", "EventTime": "2024-05-21T12:51:51.995500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOEhH2LyQ0LLXXV3h"], "accumulated_threat_level": 10.900000000000002, "timewindow": 175} +{"Format": "IDEA0", "ID": "ae8b2021-021a-4db6-8871-3667d4b5df2c", "DetectTime": "2024-05-21T12:51:52.335210+00:00", "EventTime": "2024-05-21T12:51:52.335234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAOmLK1CSxD8S2V4wg"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "66fb95e9-346d-4fae-8d13-18926fee139b", "DetectTime": "2024-05-21T12:51:52.379724+00:00", "EventTime": "2024-05-21T12:51:52.379744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqrk771x8EZ5JNPKMg"], "accumulated_threat_level": 11.700000000000003, "timewindow": 175} +{"Format": "IDEA0", "ID": "2855ba43-bfa0-4287-bdf8-06e848b79e5a", "DetectTime": "2024-05-21T12:51:52.431611+00:00", "EventTime": "2024-05-21T12:51:52.431629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPCfr61PxS9UTHvbE1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 175} +{"Format": "Json", "ID": "2855ba43-bfa0-4287-bdf8-06e848b79e5a", "DetectTime": "2024-05-21T12:51:52.431611+00:00", "EventTime": "2024-05-21T12:51:52.431629+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "1970-01-08T06:10:42.011069+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2024/05/21 12:51:52.642327)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 175, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "b82123ab-862b-472a-b8a3-050bed05dc35", "DetectTime": "2024-05-21T12:51:52.653593+00:00", "EventTime": "2024-05-21T12:51:52.653611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQivT3aYJ6eL6v1bi"], "accumulated_threat_level": 0.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "d7ecbc04-4d41-45af-ad91-4bafee718bcb", "DetectTime": "2024-05-21T12:51:52.669548+00:00", "EventTime": "2024-05-21T12:51:52.669565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSYiD8FsLWGLr5ql"], "accumulated_threat_level": 1.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "2394b1ad-777f-432e-9096-d6128e8677d2", "DetectTime": "2024-05-21T12:51:52.682367+00:00", "EventTime": "2024-05-21T12:51:52.682397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJWJ44ktzx37m91Ag"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "64a5e678-9cdb-4633-b651-d18f5a0e2559", "DetectTime": "2024-05-21T12:51:52.694043+00:00", "EventTime": "2024-05-21T12:51:52.694061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRe2sr3PeYT2XdaF9g"], "accumulated_threat_level": 3.2, "timewindow": 175} +{"Format": "IDEA0", "ID": "283e8199-1737-465b-8a90-fc028d2e0ba8", "DetectTime": "2024-05-21T12:51:52.924594+00:00", "EventTime": "2024-05-21T12:51:52.924616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRnsx53EbnVuLTJqRl"], "accumulated_threat_level": 4.0, "timewindow": 175} +{"Format": "IDEA0", "ID": "eadb7e04-2c54-4478-9566-be1b91cce359", "DetectTime": "2024-05-21T12:51:52.977974+00:00", "EventTime": "2024-05-21T12:51:52.978008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnGdLX2SbQI1j5mle"], "accumulated_threat_level": 4.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "212ad118-d7cd-43cd-a48e-a0b3b5117348", "DetectTime": "2024-05-21T12:51:53.028736+00:00", "EventTime": "2024-05-21T12:51:53.028768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVuJwk1tQJM1ce75kg"], "accumulated_threat_level": 5.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "817ac32c-0669-43ce-bceb-ec9dd6b6d6fe", "DetectTime": "2024-05-21T12:51:53.079077+00:00", "EventTime": "2024-05-21T12:51:53.079103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgj6KR1TzQCEIYB3fe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 175} +{"Format": "IDEA0", "ID": "090e7e8d-9289-44da-aa54-4bf744af7e46", "DetectTime": "2024-05-21T12:51:53.138574+00:00", "EventTime": "2024-05-21T12:51:53.138614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpMsr36DMdVB7X2ib"], "accumulated_threat_level": 7.199999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "63cbd1b7-a075-4ac0-beda-46523e356466", "DetectTime": "2024-05-21T12:51:53.188197+00:00", "EventTime": "2024-05-21T12:51:53.188233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4oNo3If9mlbXWMGc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "106990e2-53fd-422b-a94d-9190bb74ffe4", "DetectTime": "2024-05-21T12:51:53.260013+00:00", "EventTime": "2024-05-21T12:51:53.260044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKMG6Mz3Wc0sEcOEc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "08a8d548-5e53-46d4-8368-3d88294015cd", "DetectTime": "2024-05-21T12:51:53.552263+00:00", "EventTime": "2024-05-21T12:51:53.552287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crnimx3GFlzKVgpIni"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "0466009a-babc-4bd2-af1b-32b3c11d291d", "DetectTime": "2024-05-21T12:51:53.600431+00:00", "EventTime": "2024-05-21T12:51:53.600454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPaysi3RJZXCCP0Tp9"], "accumulated_threat_level": 9.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "a261473d-b665-48c5-92f8-790c5c11b839", "DetectTime": "2024-05-21T12:51:53.651870+00:00", "EventTime": "2024-05-21T12:51:53.651889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Fwws2YXz9BfzpN3h"], "accumulated_threat_level": 10.4, "timewindow": 175} +{"Format": "IDEA0", "ID": "761e6b33-93d7-4527-b145-5bbb276be33c", "DetectTime": "2024-05-21T12:51:53.704186+00:00", "EventTime": "2024-05-21T12:51:53.704208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp919m4VZMcFLGhMmg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 175} +{"Format": "IDEA0", "ID": "dfd59f85-2887-4337-b02c-8b11c734cd80", "DetectTime": "2024-05-21T12:51:53.754029+00:00", "EventTime": "2024-05-21T12:51:53.754050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4WAl4vgINBhNo4O2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 175} +{"Format": "Json", "ID": "dfd59f85-2887-4337-b02c-8b11c734cd80", "DetectTime": "2024-05-21T12:51:53.754029+00:00", "EventTime": "2024-05-21T12:51:53.754050+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-08T06:10:45.441221+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2024/05/21 12:51:54.182807)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 175, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ff049252-68af-436a-958b-323d4d3e1b16", "DetectTime": "2024-05-21T12:51:54.194496+00:00", "EventTime": "2024-05-21T12:51:54.194520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRi9yx2UlmFv7Obmy5"], "accumulated_threat_level": 0.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "79a95070-29e9-4c15-85b2-493085561dee", "DetectTime": "2024-05-21T12:51:54.210464+00:00", "EventTime": "2024-05-21T12:51:54.210486+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmbfZ1U7nHztIygh4"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "30c60eaf-42aa-4f1e-9307-02249f7cee6d", "DetectTime": "2024-05-21T12:51:54.224580+00:00", "EventTime": "2024-05-21T12:51:54.224599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzmbfZ1U7nHztIygh4"], "accumulated_threat_level": 4.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "edf3eaa4-70d3-4e59-9bb8-158fca609cd5", "DetectTime": "2024-05-21T12:51:54.236499+00:00", "EventTime": "2024-05-21T12:51:54.236521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIqjsCKDOOshW3pc"], "accumulated_threat_level": 1.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "9d3fe047-9b0f-42a2-abb6-bf416b4b819b", "DetectTime": "2024-05-21T12:51:54.251747+00:00", "EventTime": "2024-05-21T12:51:54.251766+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUThVKdzhkXD5aLj2"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "7a456771-190c-4837-83e8-861806e789ee", "DetectTime": "2024-05-21T12:51:54.264241+00:00", "EventTime": "2024-05-21T12:51:54.264260+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUThVKdzhkXD5aLj2"], "accumulated_threat_level": 5.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "3a82ce00-f4a1-48e6-8672-5c1260d5f81f", "DetectTime": "2024-05-21T12:51:54.277823+00:00", "EventTime": "2024-05-21T12:51:54.277842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUfkCe3lQWoJ2Pims"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "1a5af7ea-67a1-4adb-95e3-eb1eda6018b7", "DetectTime": "2024-05-21T12:51:54.292135+00:00", "EventTime": "2024-05-21T12:51:54.292156+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUfkCe3lQWoJ2Pims"], "accumulated_threat_level": 5.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "14dfd343-402e-4741-9e22-21fa4b4651ff", "DetectTime": "2024-05-21T12:51:54.306589+00:00", "EventTime": "2024-05-21T12:51:54.306607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSvKBk4hQpKJ75bT0e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "e68f056e-f72a-4989-ae35-d570c0624107", "DetectTime": "2024-05-21T12:51:54.317086+00:00", "EventTime": "2024-05-21T12:51:54.317105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcMVDh1OTvOuw8msB1"], "accumulated_threat_level": 3.2, "timewindow": 175} +{"Format": "IDEA0", "ID": "d070466e-9bab-4efb-937e-211b4c71a8e0", "DetectTime": "2024-05-21T12:51:54.421386+00:00", "EventTime": "2024-05-21T12:51:54.421405+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhjQz19el3Hvd1vN1"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "be521e18-87dc-458c-845f-4f23cf561852", "DetectTime": "2024-05-21T12:51:54.437680+00:00", "EventTime": "2024-05-21T12:51:54.437701+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhjQz19el3Hvd1vN1"], "accumulated_threat_level": 6.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "c98d9a07-82f5-46ff-b577-90c84a3106bd", "DetectTime": "2024-05-21T12:51:54.449765+00:00", "EventTime": "2024-05-21T12:51:54.449788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0jcx3lb1iDsYGeQb"], "accumulated_threat_level": 4.0, "timewindow": 175} +{"Format": "IDEA0", "ID": "8731405b-c204-4af0-9fb8-00e3f62e39a2", "DetectTime": "2024-05-21T12:51:54.481261+00:00", "EventTime": "2024-05-21T12:51:54.481281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHOaY04wNE6qeg8H5i"], "accumulated_threat_level": 4.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "d6f33465-5904-4c93-8d62-e8df060e0013", "DetectTime": "2024-05-21T12:51:54.524024+00:00", "EventTime": "2024-05-21T12:51:54.524047+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZXKej2fX9vqllHhRi"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "27786203-eea9-4a2e-bae2-8b562d291dbe", "DetectTime": "2024-05-21T12:51:54.575058+00:00", "EventTime": "2024-05-21T12:51:54.575080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEsJc1nl1mNgVbpk"], "accumulated_threat_level": 5.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "f525b8f3-16e9-4c2b-b9dc-a63fbc78bfee", "DetectTime": "2024-05-21T12:51:54.629908+00:00", "EventTime": "2024-05-21T12:51:54.629931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj9iBu1NGgnPsUXd08"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 175} +{"Format": "IDEA0", "ID": "d8741abc-c84c-4f8d-94c5-ce044570f994", "DetectTime": "2024-05-21T12:51:54.644422+00:00", "EventTime": "2024-05-21T12:51:54.644445+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clvhwc1xvimzHY5fmi"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "39de420f-730e-4aac-8637-5bd09c1ef87b", "DetectTime": "2024-05-21T12:51:54.659557+00:00", "EventTime": "2024-05-21T12:51:54.659585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clvhwc1xvimzHY5fmi"], "accumulated_threat_level": 6.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "0905b8d5-e7b4-4562-9cbf-539f8f669898", "DetectTime": "2024-05-21T12:51:54.759758+00:00", "EventTime": "2024-05-21T12:51:54.759776+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHhMq31JXeytOCH04"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "f1e07566-8af7-4c3a-b6fd-42dd771f2d78", "DetectTime": "2024-05-21T12:51:54.773916+00:00", "EventTime": "2024-05-21T12:51:54.773937+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcHhMq31JXeytOCH04"], "accumulated_threat_level": 7.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "b4f974a7-7a97-4779-9227-3b725b992e3f", "DetectTime": "2024-05-21T12:51:54.806599+00:00", "EventTime": "2024-05-21T12:51:54.806621+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaCLaN3YslST4DMbIc"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "469bbfa6-a449-4b2b-a7b7-42514b13df9e", "DetectTime": "2024-05-21T12:51:54.821999+00:00", "EventTime": "2024-05-21T12:51:54.822026+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaCLaN3YslST4DMbIc"], "accumulated_threat_level": 7.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "c1461ddf-82c4-4c60-bfdf-e810f31f7515", "DetectTime": "2024-05-21T12:51:54.860006+00:00", "EventTime": "2024-05-21T12:51:54.860028+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8Isn3Nd3AUU9YMcd"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "5e0339a7-0991-4a6b-bc72-1375a235e8c1", "DetectTime": "2024-05-21T12:51:54.875310+00:00", "EventTime": "2024-05-21T12:51:54.875333+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8Isn3Nd3AUU9YMcd"], "accumulated_threat_level": 8.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "02a05fb0-11d4-4a6a-9ddc-55faed3aaf1c", "DetectTime": "2024-05-21T12:51:54.924268+00:00", "EventTime": "2024-05-21T12:51:54.924293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHaPhk4WWESlqDWWJ9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "e99a858f-314a-413b-bdca-6d2145743b28", "DetectTime": "2024-05-21T12:51:54.977377+00:00", "EventTime": "2024-05-21T12:51:54.977399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpX3qu2InjakhcAgw4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "95bf667e-6a6d-4303-98c8-0e3291149a5d", "DetectTime": "2024-05-21T12:51:55.033334+00:00", "EventTime": "2024-05-21T12:51:55.033358+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFFjvG1ZHVgCXhm4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "f14cdac7-a2f0-4238-9b72-86a178525ef3", "DetectTime": "2024-05-21T12:51:55.084120+00:00", "EventTime": "2024-05-21T12:51:55.084154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXzDuv4JrvAKqIcs8i"], "accumulated_threat_level": 9.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "7781124b-343b-487e-b5ef-4efa024fd946", "DetectTime": "2024-05-21T12:51:55.109873+00:00", "EventTime": "2024-05-21T12:51:55.109893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55VId19d8LPUBQ0U1"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "241462e7-6b1d-4ed9-939c-8764be2c3cd5", "DetectTime": "2024-05-21T12:51:55.123566+00:00", "EventTime": "2024-05-21T12:51:55.123587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55VId19d8LPUBQ0U1"], "accumulated_threat_level": 8.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "87605cd8-85a5-41e0-8e6c-0b29282b5b2a", "DetectTime": "2024-05-21T12:51:55.137391+00:00", "EventTime": "2024-05-21T12:51:55.137418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp6zOy4LjMHzvqLreb"], "accumulated_threat_level": 10.4, "timewindow": 175} +{"Format": "IDEA0", "ID": "2af67385-9825-49a7-97e7-ee6cc322351c", "DetectTime": "2024-05-21T12:51:55.151902+00:00", "EventTime": "2024-05-21T12:51:55.151923+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETWfd3rNtjcI6sVFa"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "fa62e502-f78b-4da4-95dd-afe90232dc99", "DetectTime": "2024-05-21T12:51:55.166195+00:00", "EventTime": "2024-05-21T12:51:55.166227+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETWfd3rNtjcI6sVFa"], "accumulated_threat_level": 9.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "6e962809-1f09-4dad-be93-d996bf479d30", "DetectTime": "2024-05-21T12:51:55.191631+00:00", "EventTime": "2024-05-21T12:51:55.191665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RuJf1bzw9l8K9rki"], "accumulated_threat_level": 11.200000000000001, "timewindow": 175} +{"Format": "IDEA0", "ID": "190b361b-b499-4d9e-ba67-ffc793dd5a98", "DetectTime": "2024-05-21T12:51:55.246396+00:00", "EventTime": "2024-05-21T12:51:55.246454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJlr03lftZxdqvPl7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 175} +{"Format": "Json", "ID": "190b361b-b499-4d9e-ba67-ffc793dd5a98", "DetectTime": "2024-05-21T12:51:55.246396+00:00", "EventTime": "2024-05-21T12:51:55.246454+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "1970-01-08T06:42:07.294803+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2024/05/21 12:51:55.446722)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 175, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bfd85138-5120-4e94-9714-91666918679a", "DetectTime": "2024-05-21T12:51:55.460120+00:00", "EventTime": "2024-05-21T12:51:55.460140+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR2XR2NSmEuhPJOTe"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "a6af97a1-ad49-40ee-8e4b-bb135fb52dbe", "DetectTime": "2024-05-21T12:51:55.474470+00:00", "EventTime": "2024-05-21T12:51:55.474494+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpR2XR2NSmEuhPJOTe"], "accumulated_threat_level": 9.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "cb7ff6b9-c489-4cc2-94f3-54f5b57a7bf0", "DetectTime": "2024-05-21T12:51:55.487693+00:00", "EventTime": "2024-05-21T12:51:55.487712+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZs4Wy4MwRr4z8aY61"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "9ab0906f-cf2b-4753-9c3d-0bd14d25e5f9", "DetectTime": "2024-05-21T12:51:55.502554+00:00", "EventTime": "2024-05-21T12:51:55.502573+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZs4Wy4MwRr4z8aY61"], "accumulated_threat_level": 10.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "c6361810-7015-422c-ba04-a8fbdc79c231", "DetectTime": "2024-05-21T12:51:55.546751+00:00", "EventTime": "2024-05-21T12:51:55.546772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLNcx1HQFC85DbdQf"], "accumulated_threat_level": 0.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "19ae5d3f-1b0f-483d-87e3-560051724f91", "DetectTime": "2024-05-21T12:51:55.669608+00:00", "EventTime": "2024-05-21T12:51:55.669628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcY3Nn3Zhs286aGgL"], "accumulated_threat_level": 1.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "8cb77dfa-a9e6-4cc0-8828-70955a1c5b80", "DetectTime": "2024-05-21T12:51:55.712567+00:00", "EventTime": "2024-05-21T12:51:55.712590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChvQsr1MCTZ70Zlt3k"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "0940071b-0074-4c55-9055-e882544a3837", "DetectTime": "2024-05-21T12:51:55.753880+00:00", "EventTime": "2024-05-21T12:51:55.753899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9EtX2IbniqFl5BFk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "50fbee87-44aa-458e-88af-40008a48c366", "DetectTime": "2024-05-21T12:51:55.808554+00:00", "EventTime": "2024-05-21T12:51:55.808573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7joypYm62ekWsG3"], "accumulated_threat_level": 3.2, "timewindow": 175} +{"Format": "IDEA0", "ID": "d9c11139-e3e3-4239-a585-55727a2435a8", "DetectTime": "2024-05-21T12:51:55.863573+00:00", "EventTime": "2024-05-21T12:51:55.863605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2dbKb3WDFuoThhgZ5"], "accumulated_threat_level": 4.0, "timewindow": 175} +{"Format": "IDEA0", "ID": "4a95071e-6e39-4321-aa49-bf9796d416e4", "DetectTime": "2024-05-21T12:51:55.907970+00:00", "EventTime": "2024-05-21T12:51:55.908002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ3bOA4wOHcyny5Mmg"], "accumulated_threat_level": 4.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "74bb209e-ef76-4a7d-b718-631d2bafa776", "DetectTime": "2024-05-21T12:51:56.136786+00:00", "EventTime": "2024-05-21T12:51:56.136804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5wFbC26HU9wi6pkX5"], "accumulated_threat_level": 5.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "5ae89952-266d-4daf-a41e-804a96af986d", "DetectTime": "2024-05-21T12:51:56.184125+00:00", "EventTime": "2024-05-21T12:51:56.184143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6slB3IXLc1tQMZY5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 175} +{"Format": "IDEA0", "ID": "8b1886d2-1d53-43c6-ae78-1531ff038f3e", "DetectTime": "2024-05-21T12:51:56.240918+00:00", "EventTime": "2024-05-21T12:51:56.240937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccd74UnxKETx9aZzj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "859e8326-dd7b-437a-a6a5-88a2c30ff615", "DetectTime": "2024-05-21T12:51:56.285356+00:00", "EventTime": "2024-05-21T12:51:56.285385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaXt1m2ZDtnZ02cf26"], "accumulated_threat_level": 7.999999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "0e6a1ff7-d17d-4344-8f8f-f7e5a1d60b37", "DetectTime": "2024-05-21T12:51:56.335347+00:00", "EventTime": "2024-05-21T12:51:56.335365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ComAOEy7uFc3Iomlh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 175} +{"Format": "IDEA0", "ID": "03564bb1-7db8-4ae2-bc5a-d09d8ac10146", "DetectTime": "2024-05-21T12:51:56.387349+00:00", "EventTime": "2024-05-21T12:51:56.387368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4ZFH1Sn8Raw9oFl9"], "accumulated_threat_level": 9.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "5c3e63e1-affe-4f2a-98a6-ac5fa334fddd", "DetectTime": "2024-05-21T12:51:56.449391+00:00", "EventTime": "2024-05-21T12:51:56.449409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COTTH34WZDVwSwnZyj"], "accumulated_threat_level": 10.4, "timewindow": 175} +{"Format": "IDEA0", "ID": "3119b3f5-163b-4750-9daa-285f23d60965", "DetectTime": "2024-05-21T12:51:56.717204+00:00", "EventTime": "2024-05-21T12:51:56.717228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgxmCIctu3NVzG2i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 175} +{"Format": "IDEA0", "ID": "eb3cd4ad-edd2-4b4f-b34d-85df41d81f17", "DetectTime": "2024-05-21T12:51:56.768894+00:00", "EventTime": "2024-05-21T12:51:56.768918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czfo8Kiq3nSOGGVLb"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "56e4eba8-b3f5-46a0-a500-4f1bfa7523cd", "DetectTime": "2024-05-21T12:51:56.782747+00:00", "EventTime": "2024-05-21T12:51:56.782772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5rqU2GdUBcXReEh9"], "accumulated_threat_level": 12.000000000000002, "timewindow": 175} +{"Format": "Json", "ID": "56e4eba8-b3f5-46a0-a500-4f1bfa7523cd", "DetectTime": "2024-05-21T12:51:56.782747+00:00", "EventTime": "2024-05-21T12:51:56.782772+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-08T06:42:10.866839+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 175. (real time 2024/05/21 12:51:57.000924)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 175, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "6038abaa-8158-4099-a7a6-a38ba35f6901", "DetectTime": "2024-05-21T12:51:57.012081+00:00", "EventTime": "2024-05-21T12:51:57.012101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYxLM3L8x46pGhLRk"], "accumulated_threat_level": 0.8, "timewindow": 175} +{"Format": "IDEA0", "ID": "6a09dea1-d1db-44a4-b716-daaaeb1ec003", "DetectTime": "2024-05-21T12:51:57.024471+00:00", "EventTime": "2024-05-21T12:51:57.024491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVmQAK2gMoGe3nIJF5"], "accumulated_threat_level": 1.6, "timewindow": 175} +{"Format": "IDEA0", "ID": "11c9d19d-871c-4b2b-a761-9d0d4d86347a", "DetectTime": "2024-05-21T12:51:57.036032+00:00", "EventTime": "2024-05-21T12:51:57.036049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6i1ZidXAqOaGh56"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "0689d55b-aa51-4bc9-92ec-2d5f310b2518", "DetectTime": "2024-05-21T12:51:57.204716+00:00", "EventTime": "2024-05-21T12:51:57.204738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbcqoy4PJgdaGAKAJb"], "accumulated_threat_level": 1.3, "timewindow": 176} +{"Format": "IDEA0", "ID": "a5695476-50a1-4883-a23d-4a74f7bbd605", "DetectTime": "2024-05-21T12:51:57.476538+00:00", "EventTime": "2024-05-21T12:51:57.476561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnM9N2pC8oWinGo08"], "accumulated_threat_level": 2.1, "timewindow": 176} +{"Format": "IDEA0", "ID": "298adb76-b175-41ea-bcb1-8bba199c951f", "DetectTime": "2024-05-21T12:51:57.529390+00:00", "EventTime": "2024-05-21T12:51:57.529414+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkbemmx0qv5IDbp8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 176} +{"Format": "IDEA0", "ID": "5c39f6d3-cf08-47f9-ac69-df938ead4417", "DetectTime": "2024-05-21T12:51:57.582616+00:00", "EventTime": "2024-05-21T12:51:57.582637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04g154k9roixGsJM4"], "accumulated_threat_level": 3.7, "timewindow": 176} +{"Format": "IDEA0", "ID": "e6e496b1-057d-4b95-9e93-4ee02002b64c", "DetectTime": "2024-05-21T12:51:57.635566+00:00", "EventTime": "2024-05-21T12:51:57.635585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvQqLMytnWkHEgB"], "accumulated_threat_level": 4.5, "timewindow": 176} +{"Format": "IDEA0", "ID": "d9444384-9c99-4d63-9123-bff7a00fffa9", "DetectTime": "2024-05-21T12:51:57.685423+00:00", "EventTime": "2024-05-21T12:51:57.685443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf5knyPp0TlAhYOEa"], "accumulated_threat_level": 5.3, "timewindow": 176} +{"Format": "IDEA0", "ID": "dbc429b0-23de-460e-a383-af1bbf87a75b", "DetectTime": "2024-05-21T12:51:57.739045+00:00", "EventTime": "2024-05-21T12:51:57.739065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBnrk18dAUoJfY5vc"], "accumulated_threat_level": 6.1, "timewindow": 176} +{"Format": "IDEA0", "ID": "c4b964bf-d8f3-487f-98d8-b410e9983fbb", "DetectTime": "2024-05-21T12:51:57.792073+00:00", "EventTime": "2024-05-21T12:51:57.792098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEqtWd1Ud1SA0IKX1g"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 176} +{"Format": "IDEA0", "ID": "bcaebbb4-db19-49e6-8008-2fb4ab0742cd", "DetectTime": "2024-05-21T12:51:58.054035+00:00", "EventTime": "2024-05-21T12:51:58.054055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXRLp3ah95njrB2x3"], "accumulated_threat_level": 7.699999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "319bf0be-87a5-4387-9793-f96bf9f4ea42", "DetectTime": "2024-05-21T12:51:58.106054+00:00", "EventTime": "2024-05-21T12:51:58.106071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiaXc4NovUuZlvM04"], "accumulated_threat_level": 8.5, "timewindow": 176} +{"Format": "IDEA0", "ID": "91631fb2-6b72-42cb-8a12-9ac5a9eef44a", "DetectTime": "2024-05-21T12:51:58.159845+00:00", "EventTime": "2024-05-21T12:51:58.159865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyEaHn1ZJLPitcmRXa"], "accumulated_threat_level": 9.3, "timewindow": 176} +{"Format": "IDEA0", "ID": "15f8d9e4-288a-415c-8d43-6d74bb91f712", "DetectTime": "2024-05-21T12:51:58.210849+00:00", "EventTime": "2024-05-21T12:51:58.210876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHOMe821T1Jaz9E62d"], "accumulated_threat_level": 10.100000000000001, "timewindow": 176} +{"Format": "IDEA0", "ID": "b8b95532-9280-4472-a102-c0478f03b172", "DetectTime": "2024-05-21T12:51:58.255740+00:00", "EventTime": "2024-05-21T12:51:58.255765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6hIBaTg0Ntec6Aj"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "9830f625-c040-4dc2-9536-6d95647c080b", "DetectTime": "2024-05-21T12:51:58.307379+00:00", "EventTime": "2024-05-21T12:51:58.307399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChxfSk3PgMqP7MGgb4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 176} +{"Format": "IDEA0", "ID": "dd10bab5-3f0f-49bc-9912-8361c4145130", "DetectTime": "2024-05-21T12:51:58.365000+00:00", "EventTime": "2024-05-21T12:51:58.365025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Bqce2e7waMyKkry2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 176} +{"Format": "IDEA0", "ID": "a2c13fa1-2ad2-433b-a595-784d23296cfc", "DetectTime": "2024-05-21T12:51:58.619144+00:00", "EventTime": "2024-05-21T12:51:58.619165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpScl1UPWV4wGjUQl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 176} +{"Format": "Json", "ID": "a2c13fa1-2ad2-433b-a595-784d23296cfc", "DetectTime": "2024-05-21T12:51:58.619144+00:00", "EventTime": "2024-05-21T12:51:58.619165+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T07:12:51.813174+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2024/05/21 12:51:58.831896)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 176, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "e1ab0536-8981-40e3-935d-87fd808caf7f", "DetectTime": "2024-05-21T12:51:58.867476+00:00", "EventTime": "2024-05-21T12:51:58.867504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI8VW01KpHQU46FAHf"], "accumulated_threat_level": 0.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "7ff7ab0f-5914-471a-9957-a9422807a7d7", "DetectTime": "2024-05-21T12:51:58.880480+00:00", "EventTime": "2024-05-21T12:51:58.880514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAUg32IzTqr52YpA1"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "2506d8cf-fffd-407c-98b6-71477c616018", "DetectTime": "2024-05-21T12:51:58.895154+00:00", "EventTime": "2024-05-21T12:51:58.895190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C088ZD3g5JiXdMdNC4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 176} +{"Format": "IDEA0", "ID": "a974dd8f-12cf-4256-873a-2e21a0955749", "DetectTime": "2024-05-21T12:51:58.935092+00:00", "EventTime": "2024-05-21T12:51:58.935112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0aZoa2qstHu9n7REf"], "accumulated_threat_level": 3.2, "timewindow": 176} +{"Format": "IDEA0", "ID": "fee5c14a-4cb7-4069-975e-7030eb47db53", "DetectTime": "2024-05-21T12:51:58.984492+00:00", "EventTime": "2024-05-21T12:51:58.984510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CccvQP3mQ1eVItmgN2"], "accumulated_threat_level": 4.0, "timewindow": 176} +{"Format": "IDEA0", "ID": "0bb1b066-483c-4980-b0a0-a04f094fe024", "DetectTime": "2024-05-21T12:51:59.035466+00:00", "EventTime": "2024-05-21T12:51:59.035485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdvFd1nHR3TSeShw6"], "accumulated_threat_level": 4.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "9a161f95-75e1-4e1a-842c-375a11ec5109", "DetectTime": "2024-05-21T12:51:59.308105+00:00", "EventTime": "2024-05-21T12:51:59.308137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEc1sdoU5xpJswD8"], "accumulated_threat_level": 5.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "11a799f2-9722-470f-bbb7-8a872e0ee9ba", "DetectTime": "2024-05-21T12:51:59.357961+00:00", "EventTime": "2024-05-21T12:51:59.357996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8CFpYhwuaKSM8b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 176} +{"Format": "IDEA0", "ID": "0ad5dc55-3f95-4efd-acc7-822289dcb0b0", "DetectTime": "2024-05-21T12:51:59.409692+00:00", "EventTime": "2024-05-21T12:51:59.409732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CalU292nQcY23Ej2Lk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "8b689d9b-98b3-438b-a4f9-679fb6295818", "DetectTime": "2024-05-21T12:51:59.459302+00:00", "EventTime": "2024-05-21T12:51:59.459324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjIRd48YGgxmA3Vg5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "f111b202-4fda-42b6-9212-407ee650c434", "DetectTime": "2024-05-21T12:51:59.511895+00:00", "EventTime": "2024-05-21T12:51:59.511915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYXQ71vyQlv2Wtql3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "57a5b783-8850-4b16-be7d-083f0c5edcd7", "DetectTime": "2024-05-21T12:51:59.553660+00:00", "EventTime": "2024-05-21T12:51:59.553679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CssWfD4RDvdsZitT32"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "1dbbcb11-5274-428b-9eae-0b52ccf51f83", "DetectTime": "2024-05-21T12:51:59.610978+00:00", "EventTime": "2024-05-21T12:51:59.610995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ImM64vxvzi9z28V2"], "accumulated_threat_level": 9.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "4e2ef0ed-3d9f-4a03-bb46-6682e46475af", "DetectTime": "2024-05-21T12:51:59.884925+00:00", "EventTime": "2024-05-21T12:51:59.884946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqV7L1isfAzwAetRk"], "accumulated_threat_level": 10.4, "timewindow": 176} +{"Format": "IDEA0", "ID": "5a6a9d78-2fea-408a-a5f1-ce8507c4cf82", "DetectTime": "2024-05-21T12:51:59.932383+00:00", "EventTime": "2024-05-21T12:51:59.932403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbIdZE4kscCQECDr6j"], "accumulated_threat_level": 11.200000000000001, "timewindow": 176} +{"Format": "IDEA0", "ID": "7bd54e80-bcf3-4b4c-9b51-7a36de50aec3", "DetectTime": "2024-05-21T12:51:59.984249+00:00", "EventTime": "2024-05-21T12:51:59.984272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1EZze1ng4tjmbHO52"], "accumulated_threat_level": 12.000000000000002, "timewindow": 176} +{"Format": "Json", "ID": "7bd54e80-bcf3-4b4c-9b51-7a36de50aec3", "DetectTime": "2024-05-21T12:51:59.984249+00:00", "EventTime": "2024-05-21T12:51:59.984272+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-08T07:12:54.942003+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2024/05/21 12:52:00.160416)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 176, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2a4c2952-275c-4f97-8ab8-37e029c27554", "DetectTime": "2024-05-21T12:52:00.172089+00:00", "EventTime": "2024-05-21T12:52:00.172119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKa8gg1neafHa2JO6a"], "accumulated_threat_level": 0.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "b58903fb-24f4-47b3-a59e-9ef50563a7a0", "DetectTime": "2024-05-21T12:52:00.184894+00:00", "EventTime": "2024-05-21T12:52:00.184924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr73a4FXDuAL3s8ql"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "2fe0e3f9-f0de-4b05-922d-987e97717161", "DetectTime": "2024-05-21T12:52:00.248338+00:00", "EventTime": "2024-05-21T12:52:00.248380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRy3MM3GIN5DU6riU"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 176} +{"Format": "IDEA0", "ID": "9d62b164-fe34-488b-b353-12c568dee63d", "DetectTime": "2024-05-21T12:52:00.384760+00:00", "EventTime": "2024-05-21T12:52:00.384783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBDWn1igbSuK7Ph15"], "accumulated_threat_level": 3.2, "timewindow": 176} +{"Format": "IDEA0", "ID": "271551fe-253f-4352-baca-dc6cd28a88a2", "DetectTime": "2024-05-21T12:52:00.657475+00:00", "EventTime": "2024-05-21T12:52:00.657497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct1r5q1dcCaxKBvgG7"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "4e711cd6-bebf-413b-b3d3-ad3e2c5c9eb1", "DetectTime": "2024-05-21T12:52:00.706696+00:00", "EventTime": "2024-05-21T12:52:00.706717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpRyapJjcN8YsoO"], "accumulated_threat_level": 4.0, "timewindow": 176} +{"Format": "IDEA0", "ID": "7816ed99-ef9a-4d2c-8889-35e7831dcc33", "DetectTime": "2024-05-21T12:52:00.757107+00:00", "EventTime": "2024-05-21T12:52:00.757126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25zJ02qcxyVqT7Tti"], "accumulated_threat_level": 4.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "ca4cc2d8-57e8-49d9-9528-c77d1ad0f7fa", "DetectTime": "2024-05-21T12:52:00.809183+00:00", "EventTime": "2024-05-21T12:52:00.809204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7rSo2VwDqSjySRId"], "accumulated_threat_level": 5.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "e7b148b5-d822-46ff-9cd0-be617aa65934", "DetectTime": "2024-05-21T12:52:00.861115+00:00", "EventTime": "2024-05-21T12:52:00.861137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegWgh3F4DbX6g0QA2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 176} +{"Format": "IDEA0", "ID": "a2843c99-1878-4410-8390-328a7d312151", "DetectTime": "2024-05-21T12:52:00.913278+00:00", "EventTime": "2024-05-21T12:52:00.913299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4gz2b1Sphhn5hF3xc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "116678a9-f84d-4b25-b773-2132eddb531b", "DetectTime": "2024-05-21T12:52:00.965318+00:00", "EventTime": "2024-05-21T12:52:00.965337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqLxC4fwxiaWPab39"], "accumulated_threat_level": 7.999999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "95e04334-814a-4b82-8176-bf9c50e31ac0", "DetectTime": "2024-05-21T12:52:01.246356+00:00", "EventTime": "2024-05-21T12:52:01.246380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHPxt3mrZtF8hRMNe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "3b29a7f4-4c19-4ab3-99ae-272d5496f28c", "DetectTime": "2024-05-21T12:52:01.287693+00:00", "EventTime": "2024-05-21T12:52:01.287711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnR0N1UUJk4HzamSb"], "accumulated_threat_level": 9.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "22043247-3b96-49f4-b426-b50651dbd8a9", "DetectTime": "2024-05-21T12:52:01.337858+00:00", "EventTime": "2024-05-21T12:52:01.337877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjPY92EtAIsTvKOG"], "accumulated_threat_level": 10.4, "timewindow": 176} +{"Format": "IDEA0", "ID": "3a52086b-026a-420c-92af-d945b91a9045", "DetectTime": "2024-05-21T12:52:01.383986+00:00", "EventTime": "2024-05-21T12:52:01.384007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXVCa3meETrFtBIQ4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 176} +{"Format": "IDEA0", "ID": "7ab2d545-7c1c-41ab-a7e2-3e044f85e31e", "DetectTime": "2024-05-21T12:52:01.433654+00:00", "EventTime": "2024-05-21T12:52:01.433678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSqPp3ujXllQygLSf"], "accumulated_threat_level": 12.000000000000002, "timewindow": 176} +{"Format": "Json", "ID": "7ab2d545-7c1c-41ab-a7e2-3e044f85e31e", "DetectTime": "2024-05-21T12:52:01.433654+00:00", "EventTime": "2024-05-21T12:52:01.433678+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T07:43:29.486553+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2024/05/21 12:52:01.627372)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 176, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c6cad8c2-ef6c-4023-96b8-3b1bbce49344", "DetectTime": "2024-05-21T12:52:01.639666+00:00", "EventTime": "2024-05-21T12:52:01.639694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CceWrr1C8Vb6I7vks"], "accumulated_threat_level": 0.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "313c4078-c344-4bd7-a6d5-ebb1b375682a", "DetectTime": "2024-05-21T12:52:01.656486+00:00", "EventTime": "2024-05-21T12:52:01.656505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1PIrAfBLAnnfyNMa"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "258d64ec-2a77-4680-9ed1-330a0c19d85c", "DetectTime": "2024-05-21T12:52:01.916623+00:00", "EventTime": "2024-05-21T12:52:01.916646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkSyi3OL6EabEpTNc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 176} +{"Format": "IDEA0", "ID": "3e702e79-81e8-453b-a863-f73229ef7803", "DetectTime": "2024-05-21T12:52:01.921954+00:00", "EventTime": "2024-05-21T12:52:01.921974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIIpR29UfAi6RK7yc"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "b9b3bdf6-81aa-42d2-ba34-d980392c8995", "DetectTime": "2024-05-21T12:52:02.020501+00:00", "EventTime": "2024-05-21T12:52:02.020521+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNdDhs2SC6ysvVoZVa"], "accumulated_threat_level": 3.2, "timewindow": 176} +{"Format": "IDEA0", "ID": "167bdb0b-a7b1-4c08-a25e-9caf2b2c3b90", "DetectTime": "2024-05-21T12:52:02.070097+00:00", "EventTime": "2024-05-21T12:52:02.070118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE57JE1YCsatHBkIzh"], "accumulated_threat_level": 4.0, "timewindow": 176} +{"Format": "IDEA0", "ID": "62c9c953-5174-46df-aa60-ce2e6b96ece8", "DetectTime": "2024-05-21T12:52:02.127839+00:00", "EventTime": "2024-05-21T12:52:02.127857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2XqlF198FEukl2Tmg"], "accumulated_threat_level": 4.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "9338a10d-7fb2-49c2-98af-1bb802d3a90d", "DetectTime": "2024-05-21T12:52:02.173335+00:00", "EventTime": "2024-05-21T12:52:02.173356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqJru03oSSaoC79agh"], "accumulated_threat_level": 5.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "4cee89bc-e854-46a2-b7fe-774867554dec", "DetectTime": "2024-05-21T12:52:02.229188+00:00", "EventTime": "2024-05-21T12:52:02.229211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyp3ZJ2RtyDK0X1RA6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 176} +{"Format": "IDEA0", "ID": "554c2ead-3919-49f1-b6ec-11786f896bd0", "DetectTime": "2024-05-21T12:52:02.505398+00:00", "EventTime": "2024-05-21T12:52:02.505419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQn3ee4bfOcI2883i7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "375daf1e-5de2-41d5-8e58-60b8c73796ad", "DetectTime": "2024-05-21T12:52:02.552516+00:00", "EventTime": "2024-05-21T12:52:02.552539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEDqI3dDWMAZCPzT4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "6fd2cc34-2b31-4d1b-b8e6-e4e409c260c9", "DetectTime": "2024-05-21T12:52:02.602174+00:00", "EventTime": "2024-05-21T12:52:02.602199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxacrZ1QHrLB6CyORf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 176} +{"Format": "IDEA0", "ID": "32567049-441f-41d1-bf9a-dc35ca1efd66", "DetectTime": "2024-05-21T12:52:02.652701+00:00", "EventTime": "2024-05-21T12:52:02.652723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgC5Ej4u88b58oDQ69"], "accumulated_threat_level": 9.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "aa9e00be-a8a9-4195-a339-695243a6cce0", "DetectTime": "2024-05-21T12:52:02.693556+00:00", "EventTime": "2024-05-21T12:52:02.693581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckp2cjip3sfnTw6ue"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "f18e8466-2a52-420f-9f1f-b1ba37b6d45d", "DetectTime": "2024-05-21T12:52:02.752313+00:00", "EventTime": "2024-05-21T12:52:02.752335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmjG5imZteqDhPuIe"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "ba2782c2-7c98-4a5c-a053-84dc551af11f", "DetectTime": "2024-05-21T12:52:02.796220+00:00", "EventTime": "2024-05-21T12:52:02.796240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg8pEHMxSu5QkHor9"], "accumulated_threat_level": 10.4, "timewindow": 176} +{"Format": "IDEA0", "ID": "e6da09b7-5839-4ef9-ba88-dd15a7839da7", "DetectTime": "2024-05-21T12:52:03.056257+00:00", "EventTime": "2024-05-21T12:52:03.056278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvziGY2GbMZkDTZgAg"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "51198342-1b9b-43c3-a7e9-b6027d7086fd", "DetectTime": "2024-05-21T12:52:03.214105+00:00", "EventTime": "2024-05-21T12:52:03.214131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAlNmJmuIASob2aa9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 176} +{"Format": "IDEA0", "ID": "14fea1f0-eaf8-43a8-8a35-24d1f54b2450", "DetectTime": "2024-05-21T12:52:03.234022+00:00", "EventTime": "2024-05-21T12:52:03.234044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFmAz240ptNKKAhaw4"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "cd976942-e54e-4113-ac59-201b3082a73f", "DetectTime": "2024-05-21T12:52:03.239409+00:00", "EventTime": "2024-05-21T12:52:03.239429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9d7743pOgAo3n1sWj"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "acafd5f5-dc45-437f-9758-7932e89e0b39", "DetectTime": "2024-05-21T12:52:03.319133+00:00", "EventTime": "2024-05-21T12:52:03.319155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwI24j1QyzDItNP0P8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 176} +{"Format": "Json", "ID": "acafd5f5-dc45-437f-9758-7932e89e0b39", "DetectTime": "2024-05-21T12:52:03.319133+00:00", "EventTime": "2024-05-21T12:52:03.319155+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-08T07:44:06.113809+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 176. (real time 2024/05/21 12:52:03.739543)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 176, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "781d545a-2018-4abe-83c5-bcfa6e7837ba", "DetectTime": "2024-05-21T12:52:03.743693+00:00", "EventTime": "2024-05-21T12:52:03.743710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEd42D2beNz1wtAJfb"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "5bd6af20-51a2-4d48-8fa1-29ddb6a59b04", "DetectTime": "2024-05-21T12:52:03.748219+00:00", "EventTime": "2024-05-21T12:52:03.748237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEfqDX3jOUBoWhOfk5"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "2888a17c-2995-4adc-bacd-8ddbad42ba73", "DetectTime": "2024-05-21T12:52:03.752751+00:00", "EventTime": "2024-05-21T12:52:03.752769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6hv8O2qvn7Iosod21"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "7fdf313e-0f95-4b17-b14e-ce058e225ea2", "DetectTime": "2024-05-21T12:52:03.764166+00:00", "EventTime": "2024-05-21T12:52:03.764192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CADlS932sMgEK8MPTj"], "accumulated_threat_level": 0.8, "timewindow": 176} +{"Format": "IDEA0", "ID": "31868fca-5234-4d20-8af8-129c25f05e60", "DetectTime": "2024-05-21T12:52:03.770268+00:00", "EventTime": "2024-05-21T12:52:03.770291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywZTd4NYvTHShoKQk"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "a7d935d1-2b71-429b-8f23-c5d62b400534", "DetectTime": "2024-05-21T12:52:03.904004+00:00", "EventTime": "2024-05-21T12:52:03.904029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClK6iT207Zaf2DtdVf"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "4a7444de-065e-43b8-820a-bef372050932", "DetectTime": "2024-05-21T12:52:03.909078+00:00", "EventTime": "2024-05-21T12:52:03.909098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWZDsn3vwJTtdvO8o4"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "e7acf8fa-22d8-4dd3-970e-dd87a49403d9", "DetectTime": "2024-05-21T12:52:03.942922+00:00", "EventTime": "2024-05-21T12:52:03.942945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBsTcv2QwXBI4VJjNj"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "8eb25980-50e8-4f65-89f7-8801b3ee3f9d", "DetectTime": "2024-05-21T12:52:04.047254+00:00", "EventTime": "2024-05-21T12:52:04.047277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Coa6t9284jXTfXr6zb"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "a59f847e-9df4-4aa6-a1af-07903ead416f", "DetectTime": "2024-05-21T12:52:04.052515+00:00", "EventTime": "2024-05-21T12:52:04.052535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3gru1StNmBxQI7Wh"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "36260f1d-e8ab-40b4-8287-b12fb2a657a7", "DetectTime": "2024-05-21T12:52:04.320925+00:00", "EventTime": "2024-05-21T12:52:04.320944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrP2U3lFfPSpMXX7c"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "2a43a9b8-fb20-493d-9feb-ea9334177d11", "DetectTime": "2024-05-21T12:52:04.456764+00:00", "EventTime": "2024-05-21T12:52:04.456784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtGmpN1sQ7TWwOC065"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "a866bc74-e2d8-49ae-b611-cbe17a32f8ee", "DetectTime": "2024-05-21T12:52:04.551749+00:00", "EventTime": "2024-05-21T12:52:04.551771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnNmwygiDUroGMt1"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "8883f42c-1237-4f13-82e4-8bba543c15ba", "DetectTime": "2024-05-21T12:52:04.655456+00:00", "EventTime": "2024-05-21T12:52:04.655478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLbaRP3TnDeoQ6OH67"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "9345af6b-36b4-4e4e-8781-fdad12acc4cb", "DetectTime": "2024-05-21T12:52:04.738217+00:00", "EventTime": "2024-05-21T12:52:04.738240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaA9eK1kgkLuxVZps6"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "1e1af921-3570-4eb2-a6c8-47fe86c0e776", "DetectTime": "2024-05-21T12:52:04.743454+00:00", "EventTime": "2024-05-21T12:52:04.743473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw74Kl4h9ghBJEF3Wi"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "04a839b9-b631-4748-b781-3018137b303e", "DetectTime": "2024-05-21T12:52:04.748022+00:00", "EventTime": "2024-05-21T12:52:04.748041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ638LMilZ7JwfYj7"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "079393ce-bdc1-4dc8-82fe-75866afe157f", "DetectTime": "2024-05-21T12:52:05.148408+00:00", "EventTime": "2024-05-21T12:52:05.148427+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLYHn4cDgjtEHsDo2"], "accumulated_threat_level": 0.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "2f95cf14-5032-4380-9ac7-caf728d2e230", "DetectTime": "2024-05-21T12:52:05.157140+00:00", "EventTime": "2024-05-21T12:52:05.157160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXS4pJ1i6aPzkVieb5"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "7ed1ea66-9d26-410e-b15d-e348485f9f5e", "DetectTime": "2024-05-21T12:52:05.164005+00:00", "EventTime": "2024-05-21T12:52:05.164025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcCYr917Rz8NxeI5Q6"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "87c87a84-c20b-448a-b693-c9c597f56137", "DetectTime": "2024-05-21T12:52:05.169244+00:00", "EventTime": "2024-05-21T12:52:05.169263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjeEr3niUdSopdBeb"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "914e341e-7d01-4be0-b283-32d45901bd30", "DetectTime": "2024-05-21T12:52:05.174138+00:00", "EventTime": "2024-05-21T12:52:05.174157+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFr2cc4G5MONhXW0Ph"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "bf046a61-1521-49ff-95d4-4612f6efe084", "DetectTime": "2024-05-21T12:52:05.181236+00:00", "EventTime": "2024-05-21T12:52:05.181257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztRqG2boEzH47lgA2"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "8f9a9cf0-73b7-4a46-9a8f-7888a89c2c84", "DetectTime": "2024-05-21T12:52:05.207133+00:00", "EventTime": "2024-05-21T12:52:05.207158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAxtuA2OpJGDCuGwXl"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "1f9b95ca-e52e-4818-a838-c0de7c52fe32", "DetectTime": "2024-05-21T12:52:05.668132+00:00", "EventTime": "2024-05-21T12:52:05.668151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb2kS236VKfbMK0qIc", "CZvEf9hiB6VjOahTd", "C12axw2pnW02uBU3D1", "C30XyxwcJWXO6HAxa"], "accumulated_threat_level": 0.5, "timewindow": 196} +{"Format": "IDEA0", "ID": "5b0bc39f-d597-4fdf-9e15-d312b13cc97c", "DetectTime": "2024-05-21T12:52:05.685770+00:00", "EventTime": "2024-05-21T12:52:05.685790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0n9jPMgEJRGapLj7"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "54b1bd53-cbba-4c6d-9525-045d746aeace", "DetectTime": "2024-05-21T12:52:05.718859+00:00", "EventTime": "2024-05-21T12:52:05.718882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG4CvU1qd1CaL9PKI6"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "b3939c78-4c7c-40a4-aee4-e7605901bf21", "DetectTime": "2024-05-21T12:52:05.783306+00:00", "EventTime": "2024-05-21T12:52:05.783325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXqMJK1mKb8Tar0pz2"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "7e0fa1ea-9357-4267-9cf3-6a5179c9198e", "DetectTime": "2024-05-21T12:52:05.788140+00:00", "EventTime": "2024-05-21T12:52:05.788158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiSRcc3rhO7dOkuPRl"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "663fbb00-2161-4122-9b3c-8d9e83c71826", "DetectTime": "2024-05-21T12:52:05.792847+00:00", "EventTime": "2024-05-21T12:52:05.792866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVmQRU2CvVNIknbu7c"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "16d2c6ec-102e-48b8-9f3f-1c459467b2ed", "DetectTime": "2024-05-21T12:52:05.797432+00:00", "EventTime": "2024-05-21T12:52:05.797451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVjnqzJ0GibFhSCh6"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "ae008261-c607-405b-b2f6-d9159c8b46ba", "DetectTime": "2024-05-21T12:52:05.832629+00:00", "EventTime": "2024-05-21T12:52:05.832653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTl313DAGrw0xcSp2"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "49184dd8-62ff-4cd4-add0-c026542fa803", "DetectTime": "2024-05-21T12:52:06.368094+00:00", "EventTime": "2024-05-21T12:52:06.368116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJRJmh30A9S07UfVF8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "76a2ed55-6e29-43dc-96d1-e30aed5c45d9", "DetectTime": "2024-05-21T12:52:06.378756+00:00", "EventTime": "2024-05-21T12:52:06.378779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVp9T10UrVXMjBrq6"], "accumulated_threat_level": 4.0, "timewindow": 174} +{"Format": "IDEA0", "ID": "a247b6d9-0265-4dbf-a33f-3dcf4e73391d", "DetectTime": "2024-05-21T12:52:06.393577+00:00", "EventTime": "2024-05-21T12:52:06.393610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtoYpn2Is96HxOZ7X6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 177} +{"Format": "IDEA0", "ID": "e9578078-26bb-4a01-99c8-5028298d8734", "DetectTime": "2024-05-21T12:52:06.402090+00:00", "EventTime": "2024-05-21T12:52:06.402114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9mGN9kq9cmuX9q9l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "1e82f84e-1e5e-4d5e-99c6-ad82b6348d93", "DetectTime": "2024-05-21T12:52:06.427597+00:00", "EventTime": "2024-05-21T12:52:06.427620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTiqSF1BeqsQq5aiy7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "61c7bf93-4ee2-430d-a0b5-d7c7e3fd9d4a", "DetectTime": "2024-05-21T12:52:06.551302+00:00", "EventTime": "2024-05-21T12:52:06.551327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkxYpF22hV8U44CgZk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "ee89a20c-2d96-42c2-8d57-0fd65b0d6ce2", "DetectTime": "2024-05-21T12:52:06.792807+00:00", "EventTime": "2024-05-21T12:52:06.792830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COzOgb11VyU3R2vpme"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "1a323754-a9ca-4c32-9c82-34bfa89bf9db", "DetectTime": "2024-05-21T12:52:06.824734+00:00", "EventTime": "2024-05-21T12:52:06.824754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7f1fAZhU6owcRQh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "09df4548-594b-421d-a643-fa5be8488d82", "DetectTime": "2024-05-21T12:52:06.879527+00:00", "EventTime": "2024-05-21T12:52:06.879550+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnr3gf1ZAbHNEfWzJ7"], "accumulated_threat_level": 3.2, "timewindow": 177} +{"Format": "IDEA0", "ID": "42786306-f030-4a26-93dc-dd1ae243f93e", "DetectTime": "2024-05-21T12:52:06.918121+00:00", "EventTime": "2024-05-21T12:52:06.918142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtNESW1ac7QJsdEQla"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "7ae61939-e06b-441d-87d3-3fc3fea311c5", "DetectTime": "2024-05-21T12:52:06.969224+00:00", "EventTime": "2024-05-21T12:52:06.969244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAeEmt40aDXRiikNs1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "85c70b53-118c-460e-a8e0-d14890c25e5a", "DetectTime": "2024-05-21T12:52:06.980889+00:00", "EventTime": "2024-05-21T12:52:06.980908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSDkeV3x4LwwvS827j"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "0d571586-96cf-4fa3-a3d6-b3ec58299479", "DetectTime": "2024-05-21T12:52:07.379589+00:00", "EventTime": "2024-05-21T12:52:07.379607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CheVAiejStb1GK1v1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "f8b48265-ed44-43fe-b532-356c07ae3c31", "DetectTime": "2024-05-21T12:52:07.394420+00:00", "EventTime": "2024-05-21T12:52:07.394441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSGSyF100dvAicvth6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "a0f2006c-e4b1-4889-8a68-9d5c4203bdd7", "DetectTime": "2024-05-21T12:52:07.435830+00:00", "EventTime": "2024-05-21T12:52:07.435848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COPJpQ3ILHodxHfBJk"], "accumulated_threat_level": 4.0, "timewindow": 177} +{"Format": "IDEA0", "ID": "4fa1f765-fd4d-4184-abf5-e606b85f96bf", "DetectTime": "2024-05-21T12:52:07.517697+00:00", "EventTime": "2024-05-21T12:52:07.517718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzOEhH2LyQ0LLXXV3h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "2907bbe3-e75f-4a67-b533-8644954f9e70", "DetectTime": "2024-05-21T12:52:07.523006+00:00", "EventTime": "2024-05-21T12:52:07.523024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CILNNU38hva3XDw7og"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "9d1f1d8a-2e72-49fa-870c-6e4a462df9be", "DetectTime": "2024-05-21T12:52:07.669315+00:00", "EventTime": "2024-05-21T12:52:07.669339+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqrk771x8EZ5JNPKMg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "38b88b77-efb3-48a6-a4de-c39df3bce2dc", "DetectTime": "2024-05-21T12:52:07.679749+00:00", "EventTime": "2024-05-21T12:52:07.679768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPCfr61PxS9UTHvbE1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "38ad92dc-1958-4cd2-a0b5-a1e101054296", "DetectTime": "2024-05-21T12:52:08.084003+00:00", "EventTime": "2024-05-21T12:52:08.084026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgSYiD8FsLWGLr5ql"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "282fd164-30b4-4899-be88-c547bcb97144", "DetectTime": "2024-05-21T12:52:08.107681+00:00", "EventTime": "2024-05-21T12:52:08.107701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbi7Y63AyX2FSD0R6j"], "accumulated_threat_level": 4.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "b09e88a7-f26c-4844-8687-ecd2d28e0e75", "DetectTime": "2024-05-21T12:52:08.194002+00:00", "EventTime": "2024-05-21T12:52:08.194027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQivT3aYJ6eL6v1bi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "5fba7c8b-34b5-4e6a-aad5-40b4ecb98b9e", "DetectTime": "2024-05-21T12:52:08.243579+00:00", "EventTime": "2024-05-21T12:52:08.243602+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkNy73hzdMlRtbJEj"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "5b654d81-3340-4377-b83c-4af7622bf4a7", "DetectTime": "2024-05-21T12:52:08.257397+00:00", "EventTime": "2024-05-21T12:52:08.257420+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkNy73hzdMlRtbJEj"], "accumulated_threat_level": 10.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "8475b523-c008-4810-b5fb-3e54b36c2710", "DetectTime": "2024-05-21T12:52:08.262968+00:00", "EventTime": "2024-05-21T12:52:08.262988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRe2sr3PeYT2XdaF9g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "a9874875-387d-43dc-bd98-588a91110591", "DetectTime": "2024-05-21T12:52:08.290354+00:00", "EventTime": "2024-05-21T12:52:08.290375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnGdLX2SbQI1j5mle"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "5f92f2fd-d045-452a-9471-bb59158b3ec1", "DetectTime": "2024-05-21T12:52:08.295355+00:00", "EventTime": "2024-05-21T12:52:08.295374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRnsx53EbnVuLTJqRl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "58074c68-e963-4982-8b40-5a74e69cceec", "DetectTime": "2024-05-21T12:52:08.328576+00:00", "EventTime": "2024-05-21T12:52:08.328597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVuJwk1tQJM1ce75kg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "2ddef496-a5b7-48fe-b253-79c14d14640e", "DetectTime": "2024-05-21T12:52:08.374661+00:00", "EventTime": "2024-05-21T12:52:08.374683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClJWJ44ktzx37m91Ag"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "a101947d-24f6-4836-9e15-4799e37268aa", "DetectTime": "2024-05-21T12:52:08.421323+00:00", "EventTime": "2024-05-21T12:52:08.421346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRpMsr36DMdVB7X2ib"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "9f9ab2c6-3db4-4ed3-aa0e-6580a107a3e9", "DetectTime": "2024-05-21T12:52:08.435967+00:00", "EventTime": "2024-05-21T12:52:08.435985+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VNUV1iFSu10L1OQi"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "6437b2fc-3198-4e5a-983d-6a8a2fb3d0d7", "DetectTime": "2024-05-21T12:52:08.448618+00:00", "EventTime": "2024-05-21T12:52:08.448637+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2VNUV1iFSu10L1OQi"], "accumulated_threat_level": 11.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "19cb4e53-fd69-4527-b87f-3b0871841c55", "DetectTime": "2024-05-21T12:52:08.475627+00:00", "EventTime": "2024-05-21T12:52:08.475647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYNRFYWabKsNoVk"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "3209acbe-e4bb-40f4-8a86-d6331573605f", "DetectTime": "2024-05-21T12:52:08.488260+00:00", "EventTime": "2024-05-21T12:52:08.488279+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYNRFYWabKsNoVk"], "accumulated_threat_level": 11.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "11ab9e2d-561c-4758-b3a0-3bbb23658c40", "DetectTime": "2024-05-21T12:52:08.685660+00:00", "EventTime": "2024-05-21T12:52:08.685721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgj6KR1TzQCEIYB3fe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "b7ef7761-2246-40d7-912f-fbf0ab3f4a28", "DetectTime": "2024-05-21T12:52:08.769023+00:00", "EventTime": "2024-05-21T12:52:08.769044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYIjz4kGyqTSsU29j"], "accumulated_threat_level": 5.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "f42d60bd-9910-4440-bd2b-687342d91063", "DetectTime": "2024-05-21T12:52:08.838381+00:00", "EventTime": "2024-05-21T12:52:08.838403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ4oNo3If9mlbXWMGc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "6e166288-de9d-46f7-9e86-9c7af54fd4c7", "DetectTime": "2024-05-21T12:52:08.958021+00:00", "EventTime": "2024-05-21T12:52:08.958042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPaysi3RJZXCCP0Tp9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "80fc3d8c-5803-4eab-be2d-9018d225299f", "DetectTime": "2024-05-21T12:52:08.963885+00:00", "EventTime": "2024-05-21T12:52:08.963906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKMG6Mz3Wc0sEcOEc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "f96f9dc5-72f9-40d5-9aeb-c17fc9ae5284", "DetectTime": "2024-05-21T12:52:08.969883+00:00", "EventTime": "2024-05-21T12:52:08.969904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Fwws2YXz9BfzpN3h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "d8da861e-0d21-4cb6-9463-d58a38d50a10", "DetectTime": "2024-05-21T12:52:08.975356+00:00", "EventTime": "2024-05-21T12:52:08.975373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp919m4VZMcFLGhMmg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "de5b88c1-e59c-4c4d-b110-4a413dff423d", "DetectTime": "2024-05-21T12:52:08.979840+00:00", "EventTime": "2024-05-21T12:52:08.979860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRi9yx2UlmFv7Obmy5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "bf5a1d3d-8cea-4571-93f1-0df35ee06e68", "DetectTime": "2024-05-21T12:52:08.985118+00:00", "EventTime": "2024-05-21T12:52:08.985137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4WAl4vgINBhNo4O2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "8f238a2d-8512-4ed3-aed1-fa80b004b7d2", "DetectTime": "2024-05-21T12:52:09.273838+00:00", "EventTime": "2024-05-21T12:52:09.273859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWuXob1cFS9lPdhXQ8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "3d063c54-ac56-4cd1-8912-77d1fa04612e", "DetectTime": "2024-05-21T12:52:09.624644+00:00", "EventTime": "2024-05-21T12:52:09.624697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSvKBk4hQpKJ75bT0e"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "8a4e12a5-2245-4d2f-9dbc-049e0d6b48a7", "DetectTime": "2024-05-21T12:52:09.643100+00:00", "EventTime": "2024-05-21T12:52:09.643120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpGLf32p4kOkOFDB26"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "6de7edb9-23eb-4638-80de-0735d44cbab3", "DetectTime": "2024-05-21T12:52:09.650375+00:00", "EventTime": "2024-05-21T12:52:09.650395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DWJv1dCdNVVXL93d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "f1f126af-3824-49c4-bd98-d0d439e81f86", "DetectTime": "2024-05-21T12:52:09.664306+00:00", "EventTime": "2024-05-21T12:52:09.664324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugqVJ2BnKWKOyak3c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 177} +{"Format": "IDEA0", "ID": "c204caae-4b31-44e1-9d00-79f72d09a133", "DetectTime": "2024-05-21T12:52:09.669149+00:00", "EventTime": "2024-05-21T12:52:09.669165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcMVDh1OTvOuw8msB1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "cdc583e2-799d-4b87-bafe-6ddcbf24a9d4", "DetectTime": "2024-05-21T12:52:09.934012+00:00", "EventTime": "2024-05-21T12:52:09.934043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqSUCc2QZO6IrB002"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "d41f939c-2f0e-4985-89b0-f84c3a9c03d0", "DetectTime": "2024-05-21T12:52:09.946044+00:00", "EventTime": "2024-05-21T12:52:09.946064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8KJUg3e0whMthRa63"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "34a94927-48e3-4427-b0f2-4a636e244088", "DetectTime": "2024-05-21T12:52:09.951474+00:00", "EventTime": "2024-05-21T12:52:09.951493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRoK4N1e4ACYRwqQi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "5392836b-9936-462c-a14d-3f581de01e7a", "DetectTime": "2024-05-21T12:52:09.956218+00:00", "EventTime": "2024-05-21T12:52:09.956237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct0jcx3lb1iDsYGeQb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "37d2e4a9-a2d3-46ed-afd8-89390b7c5ce9", "DetectTime": "2024-05-21T12:52:10.048673+00:00", "EventTime": "2024-05-21T12:52:10.048697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHOaY04wNE6qeg8H5i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "7fed747b-7776-4948-8984-0a25abb5d331", "DetectTime": "2024-05-21T12:52:10.121547+00:00", "EventTime": "2024-05-21T12:52:10.121570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIqjsCKDOOshW3pc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "502bb143-6ea8-4263-b81d-633c5d0edf1d", "DetectTime": "2024-05-21T12:52:10.625128+00:00", "EventTime": "2024-05-21T12:52:10.625153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkEsJc1nl1mNgVbpk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "64106792-8df9-461a-8d92-d52fd3fb4687", "DetectTime": "2024-05-21T12:52:10.705641+00:00", "EventTime": "2024-05-21T12:52:10.705664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj9iBu1NGgnPsUXd08"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "f2c8872c-6d8c-4c27-baf2-6af08950f56b", "DetectTime": "2024-05-21T12:52:10.724181+00:00", "EventTime": "2024-05-21T12:52:10.724202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHaPhk4WWESlqDWWJ9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "a6c8744e-9ad5-4751-bff6-41e15a7c3cf4", "DetectTime": "2024-05-21T12:52:10.740670+00:00", "EventTime": "2024-05-21T12:52:10.740699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C715Mo4TE5PO6XdNB"], "accumulated_threat_level": 7.199999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "1fe30707-ba9a-4b52-abf5-860d99c69c07", "DetectTime": "2024-05-21T12:52:10.747247+00:00", "EventTime": "2024-05-21T12:52:10.747267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpX3qu2InjakhcAgw4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "01f26b48-aa52-4ee8-a1f8-93e91a8cd31d", "DetectTime": "2024-05-21T12:52:10.752448+00:00", "EventTime": "2024-05-21T12:52:10.752466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXzDuv4JrvAKqIcs8i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "93d5feb4-fd8d-4136-a9b9-0ab48ea7703a", "DetectTime": "2024-05-21T12:52:11.103276+00:00", "EventTime": "2024-05-21T12:52:11.103297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJJlr03lftZxdqvPl7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "68a43552-3721-4927-bca5-eed6f441d28e", "DetectTime": "2024-05-21T12:52:11.160531+00:00", "EventTime": "2024-05-21T12:52:11.160552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClFFjvG1ZHVgCXhm4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "0f5a70d5-1e41-47b2-bd54-1c97db3764d1", "DetectTime": "2024-05-21T12:52:11.305643+00:00", "EventTime": "2024-05-21T12:52:11.305666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RuJf1bzw9l8K9rki"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "f0a681a3-7792-472f-873c-ca542376aa06", "DetectTime": "2024-05-21T12:52:11.357509+00:00", "EventTime": "2024-05-21T12:52:11.357531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLNcx1HQFC85DbdQf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "162824c7-b96b-4af7-96da-6b91d23e5338", "DetectTime": "2024-05-21T12:52:11.594493+00:00", "EventTime": "2024-05-21T12:52:11.594529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp6zOy4LjMHzvqLreb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "a9e282dd-22ba-4367-915b-dcb7734dbc35", "DetectTime": "2024-05-21T12:52:11.678892+00:00", "EventTime": "2024-05-21T12:52:11.678914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcY3Nn3Zhs286aGgL"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "928e2557-5985-47bd-a25a-3600025dc476", "DetectTime": "2024-05-21T12:52:11.707020+00:00", "EventTime": "2024-05-21T12:52:11.707041+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdhplw4jJR4HMpcdO3"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "d875b451-7c45-45bc-8cd8-129002463003", "DetectTime": "2024-05-21T12:52:11.722134+00:00", "EventTime": "2024-05-21T12:52:11.722156+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdhplw4jJR4HMpcdO3"], "accumulated_threat_level": 12.0, "timewindow": 41} +{"Format": "Json", "ID": "d875b451-7c45-45bc-8cd8-129002463003", "DetectTime": "2024-05-21T12:52:11.722134+00:00", "EventTime": "2024-05-21T12:52:11.722156+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "1970-01-02T16:50:36.397180+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 41. (real time 2024/05/21 12:52:12.025519)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 41, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "3d03e9dc-1d54-44fb-a959-7cadf8c5e126", "DetectTime": "2024-05-21T12:52:12.030179+00:00", "EventTime": "2024-05-21T12:52:12.030196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2dbKb3WDFuoThhgZ5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "0d90c003-afd2-4249-aa17-fe6ad5dd9ce8", "DetectTime": "2024-05-21T12:52:12.034859+00:00", "EventTime": "2024-05-21T12:52:12.034879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9EtX2IbniqFl5BFk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "77727dd2-a916-4a2a-b7e9-b556b89d84a4", "DetectTime": "2024-05-21T12:52:12.048302+00:00", "EventTime": "2024-05-21T12:52:12.048320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cBy33LpnrpUlMPJd"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "19da9a65-b4e7-4495-a7da-403676ef03e5", "DetectTime": "2024-05-21T12:52:12.062820+00:00", "EventTime": "2024-05-21T12:52:12.062843+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0cBy33LpnrpUlMPJd"], "accumulated_threat_level": 0.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "d5c7614c-7fea-4974-8a01-a5e01b828385", "DetectTime": "2024-05-21T12:52:12.068245+00:00", "EventTime": "2024-05-21T12:52:12.068266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5wFbC26HU9wi6pkX5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "aa4668f4-ceb2-4082-88bf-5a00897e4b00", "DetectTime": "2024-05-21T12:52:12.073781+00:00", "EventTime": "2024-05-21T12:52:12.073800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ3bOA4wOHcyny5Mmg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "747b5576-61c5-47a0-bc94-3b81275430f6", "DetectTime": "2024-05-21T12:52:12.078442+00:00", "EventTime": "2024-05-21T12:52:12.078460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccd74UnxKETx9aZzj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "1938e899-6851-49f2-aae1-c1e29136d557", "DetectTime": "2024-05-21T12:52:12.089406+00:00", "EventTime": "2024-05-21T12:52:12.089425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdS7en4hodXcAEo8u5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "4d4f0590-24ec-44e2-80b8-89bc1f1e98ab", "DetectTime": "2024-05-21T12:52:12.102115+00:00", "EventTime": "2024-05-21T12:52:12.102133+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYSzS3Sqf7tWm6en"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "2c26fce1-0f28-46fa-ba8b-a2e5073c2b9e", "DetectTime": "2024-05-21T12:52:12.114976+00:00", "EventTime": "2024-05-21T12:52:12.115000+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaYSzS3Sqf7tWm6en"], "accumulated_threat_level": 1.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "d1a5e698-3880-4022-bba6-78ed92212008", "DetectTime": "2024-05-21T12:52:12.128669+00:00", "EventTime": "2024-05-21T12:52:12.128703+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MtcF2vYnR3Uzaiw8"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "256f3576-01f7-437e-8e9f-ca47d424d3eb", "DetectTime": "2024-05-21T12:52:12.144804+00:00", "EventTime": "2024-05-21T12:52:12.144841+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0MtcF2vYnR3Uzaiw8"], "accumulated_threat_level": 1.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "44b97a0e-0c55-4876-b3d6-ba89b73509b5", "DetectTime": "2024-05-21T12:52:12.159977+00:00", "EventTime": "2024-05-21T12:52:12.159997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwZR24hkW8OCzLl23"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "83e00783-0993-4244-91cd-c318c1cbdebc", "DetectTime": "2024-05-21T12:52:12.175799+00:00", "EventTime": "2024-05-21T12:52:12.175833+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwZR24hkW8OCzLl23"], "accumulated_threat_level": 2.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "50a71603-be83-4f76-83b7-8b4cf01becbf", "DetectTime": "2024-05-21T12:52:12.191565+00:00", "EventTime": "2024-05-21T12:52:12.191587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9WAh4GA050THZvW3"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "862e8dcc-6b0c-4218-9366-d52f7140dc14", "DetectTime": "2024-05-21T12:52:12.208246+00:00", "EventTime": "2024-05-21T12:52:12.208283+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9WAh4GA050THZvW3"], "accumulated_threat_level": 2.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "2dd660b3-27f4-4f93-ab32-29e90844335a", "DetectTime": "2024-05-21T12:52:12.223242+00:00", "EventTime": "2024-05-21T12:52:12.223263+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFatpl2KGFuyVTihm1"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "a644e665-9f96-43fd-a27a-6cbc4e00ef8a", "DetectTime": "2024-05-21T12:52:12.249320+00:00", "EventTime": "2024-05-21T12:52:12.249346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFatpl2KGFuyVTihm1"], "accumulated_threat_level": 3.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "5ad6ade3-c239-48dc-8b30-3c1511720755", "DetectTime": "2024-05-21T12:52:12.254579+00:00", "EventTime": "2024-05-21T12:52:12.254598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct4ZFH1Sn8Raw9oFl9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "39879c0b-7c4e-4bf2-994c-d12da3b0c9ae", "DetectTime": "2024-05-21T12:52:12.269818+00:00", "EventTime": "2024-05-21T12:52:12.269838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaXt1m2ZDtnZ02cf26"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "dbc41910-d970-4ffe-90a8-aebb27fd817e", "DetectTime": "2024-05-21T12:52:12.298467+00:00", "EventTime": "2024-05-21T12:52:12.298495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ComAOEy7uFc3Iomlh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "cd1c420e-0f1a-49d8-a979-aa6dcb440a71", "DetectTime": "2024-05-21T12:52:12.303822+00:00", "EventTime": "2024-05-21T12:52:12.303843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6slB3IXLc1tQMZY5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "27519ae6-ffb7-49e2-8433-014f092db44d", "DetectTime": "2024-05-21T12:52:12.320444+00:00", "EventTime": "2024-05-21T12:52:12.320465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7joypYm62ekWsG3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "e97174df-7952-45c7-8c7e-62763e73f598", "DetectTime": "2024-05-21T12:52:12.325441+00:00", "EventTime": "2024-05-21T12:52:12.325461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgxmCIctu3NVzG2i"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "bd3e2ac7-c5b8-4203-9b5b-eb85076ab957", "DetectTime": "2024-05-21T12:52:12.387061+00:00", "EventTime": "2024-05-21T12:52:12.387081+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgoCeo309buBcuP7Qi"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "17f4acc2-6e32-4e11-886c-5c4316a2d16f", "DetectTime": "2024-05-21T12:52:12.401093+00:00", "EventTime": "2024-05-21T12:52:12.401114+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgoCeo309buBcuP7Qi"], "accumulated_threat_level": 3.5, "timewindow": 41} +{"Format": "IDEA0", "ID": "ca5c5d34-cb75-4869-b9ed-e9ebe31b8a68", "DetectTime": "2024-05-21T12:52:12.426685+00:00", "EventTime": "2024-05-21T12:52:12.426704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHc7t3NoKGWyquys7"], "accumulated_threat_level": 0, "timewindow": 41} +{"Format": "IDEA0", "ID": "f8689c4e-c442-4bee-86ee-b3e636a442b0", "DetectTime": "2024-05-21T12:52:12.441191+00:00", "EventTime": "2024-05-21T12:52:12.441220+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBHc7t3NoKGWyquys7"], "accumulated_threat_level": 4.0, "timewindow": 41} +{"Format": "IDEA0", "ID": "a3c8b61f-3641-497b-9d85-a5316d793974", "DetectTime": "2024-05-21T12:52:12.847280+00:00", "EventTime": "2024-05-21T12:52:12.847302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COTTH34WZDVwSwnZyj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "ee45b64d-5030-4a2f-a073-f801e808ffa4", "DetectTime": "2024-05-21T12:52:12.913444+00:00", "EventTime": "2024-05-21T12:52:12.913468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5rqU2GdUBcXReEh9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "63bc2d88-90ac-459b-88d9-936f9dfe6967", "DetectTime": "2024-05-21T12:52:13.024494+00:00", "EventTime": "2024-05-21T12:52:13.024516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 93.195.196.119 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwBwA1X7KSjDCH9Yd"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "2be0f46b-7678-4f95-b1e6-37a1d5525014", "DetectTime": "2024-05-21T12:52:13.073071+00:00", "EventTime": "2024-05-21T12:52:13.073092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVmQAK2gMoGe3nIJF5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "0d120a8a-370d-4d95-accb-73c827e11e99", "DetectTime": "2024-05-21T12:52:13.123316+00:00", "EventTime": "2024-05-21T12:52:13.123336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDYxLM3L8x46pGhLRk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "d3187d78-6bf4-4225-b605-ea8744f8b82e", "DetectTime": "2024-05-21T12:52:13.136266+00:00", "EventTime": "2024-05-21T12:52:13.136288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C04g154k9roixGsJM4"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "d6baa113-3346-4a76-bb2b-72b603786b04", "DetectTime": "2024-05-21T12:52:13.149710+00:00", "EventTime": "2024-05-21T12:52:13.149737+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTabVN2bzkNXLRXARh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "f309fc6a-26f3-4b7f-847c-a8d2adc60b2c", "DetectTime": "2024-05-21T12:52:13.155577+00:00", "EventTime": "2024-05-21T12:52:13.155597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf5knyPp0TlAhYOEa"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "1a5fbd43-bfcb-4a07-8084-7af3fe93fe08", "DetectTime": "2024-05-21T12:52:13.188926+00:00", "EventTime": "2024-05-21T12:52:13.188946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnM9N2pC8oWinGo08"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "780779d3-906b-4348-8291-b8f93e31d1c1", "DetectTime": "2024-05-21T12:52:13.194260+00:00", "EventTime": "2024-05-21T12:52:13.194281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvQqLMytnWkHEgB"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "16caf4f1-ec4d-457b-8cee-99775e50bf9c", "DetectTime": "2024-05-21T12:52:13.200854+00:00", "EventTime": "2024-05-21T12:52:13.200875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHBnrk18dAUoJfY5vc"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "4ba6710c-d67b-405e-ad27-f3e7a3f52889", "DetectTime": "2024-05-21T12:52:13.206292+00:00", "EventTime": "2024-05-21T12:52:13.206314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbcqoy4PJgdaGAKAJb"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "94f557e7-d8c8-4dbb-ad01-939b890bf39e", "DetectTime": "2024-05-21T12:52:13.211523+00:00", "EventTime": "2024-05-21T12:52:13.211541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu6i1ZidXAqOaGh56"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 175} +{"Format": "IDEA0", "ID": "53badf84-182e-4c2b-90bd-66ef762001fc", "DetectTime": "2024-05-21T12:52:13.216424+00:00", "EventTime": "2024-05-21T12:52:13.216445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDkbemmx0qv5IDbp8"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "8a727c3f-40f2-4769-bea0-214fb6a31b86", "DetectTime": "2024-05-21T12:52:13.419121+00:00", "EventTime": "2024-05-21T12:52:13.419142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEqtWd1Ud1SA0IKX1g"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "df6591d5-30d9-4dca-bc98-eb92988905d1", "DetectTime": "2024-05-21T12:52:14.071653+00:00", "EventTime": "2024-05-21T12:52:14.071672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMXRLp3ah95njrB2x3"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "926aad93-226b-458d-b8c2-c5657411d28a", "DetectTime": "2024-05-21T12:52:14.107050+00:00", "EventTime": "2024-05-21T12:52:14.107071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyEaHn1ZJLPitcmRXa"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "40bf5fc7-c366-45aa-996d-8787108fd387", "DetectTime": "2024-05-21T12:52:14.131638+00:00", "EventTime": "2024-05-21T12:52:14.131658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXiaXc4NovUuZlvM04"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "ed87aa0d-f3cf-4424-b5f9-46c825c7ae42", "DetectTime": "2024-05-21T12:52:14.254859+00:00", "EventTime": "2024-05-21T12:52:14.254883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Bqce2e7waMyKkry2"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "a259d876-55e1-4eb8-bd32-114f172425dd", "DetectTime": "2024-05-21T12:52:14.287652+00:00", "EventTime": "2024-05-21T12:52:14.287674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChxfSk3PgMqP7MGgb4"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "337fa570-aae4-4d0d-803b-91a261204bab", "DetectTime": "2024-05-21T12:52:14.558523+00:00", "EventTime": "2024-05-21T12:52:14.558557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfCoP2Qwgdlg8M9ek"], "accumulated_threat_level": 9.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "dde9f1fe-53bc-413f-8436-32c7bfd932c9", "DetectTime": "2024-05-21T12:52:14.596767+00:00", "EventTime": "2024-05-21T12:52:14.596792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0aZoa2qstHu9n7REf"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "a2e7a8ef-4102-407a-b0bf-551a7a095c57", "DetectTime": "2024-05-21T12:52:14.624579+00:00", "EventTime": "2024-05-21T12:52:14.624600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CccvQP3mQ1eVItmgN2"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "f7959a4d-0c2a-4215-b200-37a5c4af5507", "DetectTime": "2024-05-21T12:52:14.650335+00:00", "EventTime": "2024-05-21T12:52:14.650356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAUg32IzTqr52YpA1"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "d4198ee2-12de-4f85-8668-b110c56b9323", "DetectTime": "2024-05-21T12:52:14.755493+00:00", "EventTime": "2024-05-21T12:52:14.755512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI8VW01KpHQU46FAHf"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "da45739e-75e6-4571-b28f-1b7490e8ed9e", "DetectTime": "2024-05-21T12:52:15.119235+00:00", "EventTime": "2024-05-21T12:52:15.119259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpScl1UPWV4wGjUQl"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "b63be668-f6aa-4a63-ad09-b5061df259ae", "DetectTime": "2024-05-21T12:52:15.191461+00:00", "EventTime": "2024-05-21T12:52:15.191484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHOMe821T1Jaz9E62d"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "8be7b032-dc90-4506-ae07-cf44acdcadc8", "DetectTime": "2024-05-21T12:52:15.197662+00:00", "EventTime": "2024-05-21T12:52:15.197684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C088ZD3g5JiXdMdNC4"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "71946aaa-b687-46aa-a176-9bf5a5912020", "DetectTime": "2024-05-21T12:52:15.216327+00:00", "EventTime": "2024-05-21T12:52:15.216349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwdvFd1nHR3TSeShw6"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "1246e3d9-29fd-46ca-894f-1b4f16e1b061", "DetectTime": "2024-05-21T12:52:15.222500+00:00", "EventTime": "2024-05-21T12:52:15.222520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CalU292nQcY23Ej2Lk"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "19e3508b-e5e5-40c5-9ad4-4f2aff2a1fdf", "DetectTime": "2024-05-21T12:52:15.227142+00:00", "EventTime": "2024-05-21T12:52:15.227160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX8CFpYhwuaKSM8b"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "1d51b818-291d-4647-800f-d4d6091abd01", "DetectTime": "2024-05-21T12:52:15.298854+00:00", "EventTime": "2024-05-21T12:52:15.298876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIYXQ71vyQlv2Wtql3"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "5943d793-aa05-4dba-b75b-382e5ebd4dd3", "DetectTime": "2024-05-21T12:52:15.303823+00:00", "EventTime": "2024-05-21T12:52:15.303845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyjIRd48YGgxmA3Vg5"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "88c3cf92-dc34-4bd4-a1f0-417167c62336", "DetectTime": "2024-05-21T12:52:15.308470+00:00", "EventTime": "2024-05-21T12:52:15.308489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvEc1sdoU5xpJswD8"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "51d5cc0c-9453-43b3-afe2-d3abc66fa266", "DetectTime": "2024-05-21T12:52:15.717953+00:00", "EventTime": "2024-05-21T12:52:15.717971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctlh4b4aU20PkMVsk1"], "accumulated_threat_level": 10.4, "timewindow": 177} +{"Format": "IDEA0", "ID": "0f323aa1-0608-4adc-8fb5-d767541b31b0", "DetectTime": "2024-05-21T12:52:15.872973+00:00", "EventTime": "2024-05-21T12:52:15.872995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbIdZE4kscCQECDr6j"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "7917bddf-0b4d-4eee-b04a-45a6805e6954", "DetectTime": "2024-05-21T12:52:15.878355+00:00", "EventTime": "2024-05-21T12:52:15.878375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ImM64vxvzi9z28V2"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "55f8589c-4a61-43d3-93f2-0840ec28ec07", "DetectTime": "2024-05-21T12:52:15.883267+00:00", "EventTime": "2024-05-21T12:52:15.883290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKa8gg1neafHa2JO6a"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "feed503c-3cbc-4322-a3b9-5ec39e6d4063", "DetectTime": "2024-05-21T12:52:15.906363+00:00", "EventTime": "2024-05-21T12:52:15.906387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.171.27.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTgQb4UT5H5bxb0s5"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "eb9c59f4-9bb9-4474-a530-f21a89f13f12", "DetectTime": "2024-05-21T12:52:15.922390+00:00", "EventTime": "2024-05-21T12:52:15.922462+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.171.27.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.171.27.14 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 201.171.27.14.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpTgQb4UT5H5bxb0s5"], "accumulated_threat_level": 1.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "56a2d043-4867-433f-90d3-b74bbf313ff7", "DetectTime": "2024-05-21T12:52:16.141729+00:00", "EventTime": "2024-05-21T12:52:16.141752+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1EZze1ng4tjmbHO52"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "d6ff6faa-abd5-4093-aafc-931cbfa20ccf", "DetectTime": "2024-05-21T12:52:16.147422+00:00", "EventTime": "2024-05-21T12:52:16.147442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqV7L1isfAzwAetRk"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "6d6855a0-d530-4daf-9bde-d593dac42012", "DetectTime": "2024-05-21T12:52:16.232833+00:00", "EventTime": "2024-05-21T12:52:16.232855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRy3MM3GIN5DU6riU"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "f779156e-0718-4ec7-8f5f-d6ccbd71b9df", "DetectTime": "2024-05-21T12:52:16.439539+00:00", "EventTime": "2024-05-21T12:52:16.439560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFBDWn1igbSuK7Ph15"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "8e4d459d-3527-4e7f-9d97-2d6bc4ad80e6", "DetectTime": "2024-05-21T12:52:16.485228+00:00", "EventTime": "2024-05-21T12:52:16.485249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clr73a4FXDuAL3s8ql"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "530776ff-e77b-4fcb-989e-b88c6bbd8cde", "DetectTime": "2024-05-21T12:52:16.490590+00:00", "EventTime": "2024-05-21T12:52:16.490611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4gz2b1Sphhn5hF3xc"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "380c7585-bd66-4d3e-b8b8-23e301fe8fd3", "DetectTime": "2024-05-21T12:52:16.516512+00:00", "EventTime": "2024-05-21T12:52:16.516533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7rSo2VwDqSjySRId"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "f16a8e69-6a55-4240-81ce-12257a6b90c4", "DetectTime": "2024-05-21T12:52:16.522257+00:00", "EventTime": "2024-05-21T12:52:16.522278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTpRyapJjcN8YsoO"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "cdde30c0-3081-4aa1-937e-85e9b05b46cf", "DetectTime": "2024-05-21T12:52:16.530125+00:00", "EventTime": "2024-05-21T12:52:16.530145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C25zJ02qcxyVqT7Tti"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "0c9798f3-3134-4369-b79f-4452d1c8d5da", "DetectTime": "2024-05-21T12:52:16.541878+00:00", "EventTime": "2024-05-21T12:52:16.541898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CegWgh3F4DbX6g0QA2"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "c2f38237-fd77-4073-a5db-c62036489426", "DetectTime": "2024-05-21T12:52:16.858709+00:00", "EventTime": "2024-05-21T12:52:16.858728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4PKa840HQ1u05UJO7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 177} +{"Format": "IDEA0", "ID": "d788f419-8027-4c19-8da0-f4dfa8076e76", "DetectTime": "2024-05-21T12:52:16.919168+00:00", "EventTime": "2024-05-21T12:52:16.919194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqLxC4fwxiaWPab39"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "86882929-551b-4a7b-82f3-c2c3ec2b0f9f", "DetectTime": "2024-05-21T12:52:17.305858+00:00", "EventTime": "2024-05-21T12:52:17.305882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsHPxt3mrZtF8hRMNe"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "79af691f-abea-48b0-a621-b08df71f1713", "DetectTime": "2024-05-21T12:52:17.376264+00:00", "EventTime": "2024-05-21T12:52:17.376285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFjPY92EtAIsTvKOG"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "6b5b0425-67e5-4cef-87a4-c9623a1e4b1c", "DetectTime": "2024-05-21T12:52:17.400205+00:00", "EventTime": "2024-05-21T12:52:17.400226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTXVCa3meETrFtBIQ4"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "8da18d84-7836-4070-85c4-1c8266277c7b", "DetectTime": "2024-05-21T12:52:17.468179+00:00", "EventTime": "2024-05-21T12:52:17.468203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CceWrr1C8Vb6I7vks"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "b0997795-1611-4def-8aa9-a9b2407e8562", "DetectTime": "2024-05-21T12:52:17.473502+00:00", "EventTime": "2024-05-21T12:52:17.473522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnR0N1UUJk4HzamSb"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "56e18d4a-4f89-4e43-873f-4d7258c0d607", "DetectTime": "2024-05-21T12:52:17.980520+00:00", "EventTime": "2024-05-21T12:52:17.980540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmSqPp3ujXllQygLSf"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "85a8ebcb-1a04-4264-8647-4f720afdf1cf", "DetectTime": "2024-05-21T12:52:17.997630+00:00", "EventTime": "2024-05-21T12:52:17.997652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE57JE1YCsatHBkIzh"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "b7125e96-abe5-4b87-a48d-9c9fbb8df2a3", "DetectTime": "2024-05-21T12:52:18.023240+00:00", "EventTime": "2024-05-21T12:52:18.023260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqJru03oSSaoC79agh"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "cc825ccb-4a24-4408-a4a2-944644ad9579", "DetectTime": "2024-05-21T12:52:18.028263+00:00", "EventTime": "2024-05-21T12:52:18.028283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1PIrAfBLAnnfyNMa"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "406dde94-0ade-439e-879f-100004b83c48", "DetectTime": "2024-05-21T12:52:18.033028+00:00", "EventTime": "2024-05-21T12:52:18.033046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQkSyi3OL6EabEpTNc"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "4ec9306d-0d86-4bbf-8c2e-deaf15932038", "DetectTime": "2024-05-21T12:52:18.136723+00:00", "EventTime": "2024-05-21T12:52:18.136745+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2XqlF198FEukl2Tmg"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "60a4004d-b0fd-463e-9f72-12798a2ef57a", "DetectTime": "2024-05-21T12:52:18.160669+00:00", "EventTime": "2024-05-21T12:52:18.160688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGVtea2y6YYkMi6SWc"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "269f4b29-2c78-4655-b46a-3c6e5eec4d74", "DetectTime": "2024-05-21T12:52:18.166427+00:00", "EventTime": "2024-05-21T12:52:18.166448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTEDqI3dDWMAZCPzT4"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "326cd289-abd4-41d4-94dc-5dc5921d552f", "DetectTime": "2024-05-21T12:52:18.170978+00:00", "EventTime": "2024-05-21T12:52:18.170996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQn3ee4bfOcI2883i7"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "f049cf5a-a3b5-419b-bd11-b68d4d701df4", "DetectTime": "2024-05-21T12:52:18.243100+00:00", "EventTime": "2024-05-21T12:52:18.243123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyp3ZJ2RtyDK0X1RA6"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "2401406d-cf8e-4667-8802-0361f343dc88", "DetectTime": "2024-05-21T12:52:18.257389+00:00", "EventTime": "2024-05-21T12:52:18.257410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Nd7y4W4ea3CQIzye"], "accumulated_threat_level": 12.000000000000002, "timewindow": 177} +{"Format": "Json", "ID": "2401406d-cf8e-4667-8802-0361f343dc88", "DetectTime": "2024-05-21T12:52:18.257389+00:00", "EventTime": "2024-05-21T12:52:18.257410+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T08:14:51.302161+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2024/05/21 12:52:18.430730)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 177, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "38c17c02-5647-44e0-a230-e8ad01889a90", "DetectTime": "2024-05-21T12:52:18.543184+00:00", "EventTime": "2024-05-21T12:52:18.543204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxacrZ1QHrLB6CyORf"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "d4eaf561-6ea1-4038-bf97-0e8f8cde2786", "DetectTime": "2024-05-21T12:52:18.643681+00:00", "EventTime": "2024-05-21T12:52:18.643702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQVdjMFnSiR4T92a2"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "452c9729-e363-43f6-8c4f-c83825e9b02b", "DetectTime": "2024-05-21T12:52:18.715462+00:00", "EventTime": "2024-05-21T12:52:18.715484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgC5Ej4u88b58oDQ69"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "b803ab60-2aab-4a6f-9dea-6d2419753430", "DetectTime": "2024-05-21T12:52:18.730345+00:00", "EventTime": "2024-05-21T12:52:18.730368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNdDhs2SC6ysvVoZVa"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "84bb2c66-7e40-4d2e-8697-8d75c656aca1", "DetectTime": "2024-05-21T12:52:18.993191+00:00", "EventTime": "2024-05-21T12:52:18.993212+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHXQk4XhszO1Grg5f"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "1d4f25ad-7852-41fe-9fc2-3ab7bc458445", "DetectTime": "2024-05-21T12:52:19.001881+00:00", "EventTime": "2024-05-21T12:52:19.001909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg8pEHMxSu5QkHor9"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "5f9bfde7-fdcc-4347-81a5-426d1f2cb84e", "DetectTime": "2024-05-21T12:52:19.017651+00:00", "EventTime": "2024-05-21T12:52:19.017671+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgHXQk4XhszO1Grg5f"], "accumulated_threat_level": 1.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "eaf8770f-d5aa-4d2d-b691-65126b69b2b3", "DetectTime": "2024-05-21T12:52:19.188471+00:00", "EventTime": "2024-05-21T12:52:19.188491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwI24j1QyzDItNP0P8"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "8dd692c9-3ce7-4d12-a885-60c7d2ec1470", "DetectTime": "2024-05-21T12:52:19.193825+00:00", "EventTime": "2024-05-21T12:52:19.193845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAlNmJmuIASob2aa9"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "0ff4b7e9-1c6a-4a94-90bd-490b169a4cab", "DetectTime": "2024-05-21T12:52:19.237057+00:00", "EventTime": "2024-05-21T12:52:19.237079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CADlS932sMgEK8MPTj"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "5e72fa49-4c01-4b6c-b4c1-bef0fb8b4af6", "DetectTime": "2024-05-21T12:52:19.372008+00:00", "EventTime": "2024-05-21T12:52:19.372028+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCsgL3kBTdeATk1Q8"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c27a8b1e-dcc5-4786-ac86-596ea24deca1", "DetectTime": "2024-05-21T12:52:19.386612+00:00", "EventTime": "2024-05-21T12:52:19.386641+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmCsgL3kBTdeATk1Q8"], "accumulated_threat_level": 2.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "712c597e-6a8b-413a-86dc-c14a838a9184", "DetectTime": "2024-05-21T12:52:19.416622+00:00", "EventTime": "2024-05-21T12:52:19.416643+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chpd4T1iciAg7byRRk"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "b6925412-34d9-478c-93bb-fc340a1b2a41", "DetectTime": "2024-05-21T12:52:19.431600+00:00", "EventTime": "2024-05-21T12:52:19.431626+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chpd4T1iciAg7byRRk"], "accumulated_threat_level": 2.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b507d948-4e40-4b31-a977-0533c8bca4b7", "DetectTime": "2024-05-21T12:52:19.492663+00:00", "EventTime": "2024-05-21T12:52:19.492692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61b0d19uEnCIBVFdj"], "accumulated_threat_level": 0.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "cb3e94bb-6190-40fb-91b4-d66755c265ab", "DetectTime": "2024-05-21T12:52:19.536170+00:00", "EventTime": "2024-05-21T12:52:19.536191+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46Cbd2eO3wzebIk4k"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "e3a5f682-7aa2-4176-85b4-a3d7628ea0d7", "DetectTime": "2024-05-21T12:52:19.549848+00:00", "EventTime": "2024-05-21T12:52:19.549872+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46Cbd2eO3wzebIk4k"], "accumulated_threat_level": 3.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "23ef3443-a257-4223-96e7-0ca1f79d6026", "DetectTime": "2024-05-21T12:52:19.631170+00:00", "EventTime": "2024-05-21T12:52:19.631192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfrP2U3lFfPSpMXX7c"], "accumulated_threat_level": 1.6, "timewindow": 176} +{"Format": "IDEA0", "ID": "f75dffc0-9973-4803-98c2-00e0ec3b985c", "DetectTime": "2024-05-21T12:52:19.683973+00:00", "EventTime": "2024-05-21T12:52:19.684008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPECav1Imp2SsCw6Qa"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "0499668e-dc2e-4652-850c-5765a1bd5703", "DetectTime": "2024-05-21T12:52:19.740373+00:00", "EventTime": "2024-05-21T12:52:19.740406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9tsz1UYPRVWtshZe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 177} +{"Format": "IDEA0", "ID": "3f8264c8-d8e5-48ea-9063-d82b9ffa1bf8", "DetectTime": "2024-05-21T12:52:19.786567+00:00", "EventTime": "2024-05-21T12:52:19.786597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVWE426rNXCFIfwT5"], "accumulated_threat_level": 3.2, "timewindow": 177} +{"Format": "IDEA0", "ID": "de251c8d-608b-4799-aef3-c601af6a92a3", "DetectTime": "2024-05-21T12:52:19.831393+00:00", "EventTime": "2024-05-21T12:52:19.831416+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTDSY1G0kRQSSsZhc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "6a5dc22b-f809-49f9-bd74-23442d30039f", "DetectTime": "2024-05-21T12:52:19.847350+00:00", "EventTime": "2024-05-21T12:52:19.847384+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSTDSY1G0kRQSSsZhc"], "accumulated_threat_level": 3.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "1b206f97-91a2-4b95-a218-a0e94640dc41", "DetectTime": "2024-05-21T12:52:19.861375+00:00", "EventTime": "2024-05-21T12:52:19.861401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4iXPJ2CbcN2KmiED2"], "accumulated_threat_level": 4.0, "timewindow": 177} +{"Format": "IDEA0", "ID": "12e40697-66f0-41a2-9c8d-40b0ccb376ff", "DetectTime": "2024-05-21T12:52:19.876821+00:00", "EventTime": "2024-05-21T12:52:19.876842+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.35.49"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gCQ64kP1u4O0Xva4"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "7bff6ad3-899d-4997-bfc3-ca73fa135404", "DetectTime": "2024-05-21T12:52:19.893263+00:00", "EventTime": "2024-05-21T12:52:19.893298+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.35.49"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.35.49 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-379699.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9gCQ64kP1u4O0Xva4"], "accumulated_threat_level": 4.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "823b0ac0-570c-4a58-ad13-5d2a49e67626", "DetectTime": "2024-05-21T12:52:19.911938+00:00", "EventTime": "2024-05-21T12:52:19.911958+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.69.172.54"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyORI14W0h9gYW1Dp"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "9e370692-131d-41d5-a801-d4b29fcf9a17", "DetectTime": "2024-05-21T12:52:19.928177+00:00", "EventTime": "2024-05-21T12:52:19.928212+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.69.172.54"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.69.172.54 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: ppp-94-69-172-54.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyORI14W0h9gYW1Dp"], "accumulated_threat_level": 4.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "7105fae4-9c76-4ffe-bf3b-db5004f9d56a", "DetectTime": "2024-05-21T12:52:19.952777+00:00", "EventTime": "2024-05-21T12:52:19.952798+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6po1d2bRfYNHGHO8e"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "0b043003-2408-447d-9643-94b76681ed6b", "DetectTime": "2024-05-21T12:52:19.968025+00:00", "EventTime": "2024-05-21T12:52:19.968057+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6po1d2bRfYNHGHO8e"], "accumulated_threat_level": 5.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "39c6d377-f5a8-48dd-a50c-3d27b2f6e51a", "DetectTime": "2024-05-21T12:52:19.993357+00:00", "EventTime": "2024-05-21T12:52:19.993381+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2BCxh2bxBw7Zp9"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "23b03b21-7648-48cd-b1aa-f148601a3f8b", "DetectTime": "2024-05-21T12:52:20.007342+00:00", "EventTime": "2024-05-21T12:52:20.007361+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2BCxh2bxBw7Zp9"], "accumulated_threat_level": 5.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "208c89d2-55a4-43b6-b1d4-26debce79057", "DetectTime": "2024-05-21T12:52:20.113633+00:00", "EventTime": "2024-05-21T12:52:20.113650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6H3km2PLPWnAkKC7a"], "accumulated_threat_level": 4.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "2512f4bf-b4e1-4a2d-8736-e0b94191fc01", "DetectTime": "2024-05-21T12:52:20.158571+00:00", "EventTime": "2024-05-21T12:52:20.158589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0FjZk4NCo5lDaoz76"], "accumulated_threat_level": 5.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "b9a9a360-9540-4ddc-b8be-cec73712cb64", "DetectTime": "2024-05-21T12:52:20.204367+00:00", "EventTime": "2024-05-21T12:52:20.204388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8FXE3sFSNyJBm62g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 177} +{"Format": "IDEA0", "ID": "0270f6dc-0aaa-4e6b-9600-f488a1ee8776", "DetectTime": "2024-05-21T12:52:20.258842+00:00", "EventTime": "2024-05-21T12:52:20.258876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cTZM0NBCo7UHo13"], "accumulated_threat_level": 7.199999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "caa2db84-3ae1-4552-8a1a-e8b2c7257bba", "DetectTime": "2024-05-21T12:52:20.309849+00:00", "EventTime": "2024-05-21T12:52:20.309869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJd904Ze1894h6KRc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "bd08a8fc-1aac-43ba-9f48-2a6cec80b1eb", "DetectTime": "2024-05-21T12:52:20.347689+00:00", "EventTime": "2024-05-21T12:52:20.347708+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarF932G0dT78drUBb"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "fb048833-b701-43a8-a50a-5aa2ef85177f", "DetectTime": "2024-05-21T12:52:20.361755+00:00", "EventTime": "2024-05-21T12:52:20.361788+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarF932G0dT78drUBb"], "accumulated_threat_level": 6.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "cfa482ea-5cc8-42f3-abee-f1c73a1e83a3", "DetectTime": "2024-05-21T12:52:20.377991+00:00", "EventTime": "2024-05-21T12:52:20.378026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5NlT2Y4z6tnrZmac"], "accumulated_threat_level": 8.799999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "1bba0e39-6542-492f-95c3-767c86268d16", "DetectTime": "2024-05-21T12:52:20.395347+00:00", "EventTime": "2024-05-21T12:52:20.395368+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.91.3.102"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4D5JE1MY58UwL5kFl"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "df323a9e-9378-4adf-8188-163a9447076f", "DetectTime": "2024-05-21T12:52:20.410821+00:00", "EventTime": "2024-05-21T12:52:20.410857+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.91.3.102"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.91.3.102 from 10.0.2.19. AS: BHN-33363, US AS33363 rDNS: syn-184-091-003-102.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4D5JE1MY58UwL5kFl"], "accumulated_threat_level": 6.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c1bef825-b1a3-4152-89a9-53280c1a874c", "DetectTime": "2024-05-21T12:52:20.665233+00:00", "EventTime": "2024-05-21T12:52:20.665269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV4nqF4ZIlmPHtSba"], "accumulated_threat_level": 9.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "a58f4ebc-8cdc-4a52-a80e-4be11ee2ce69", "DetectTime": "2024-05-21T12:52:20.708459+00:00", "EventTime": "2024-05-21T12:52:20.708482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZLYHn4cDgjtEHsDo2"], "accumulated_threat_level": 9.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "e14afd05-827c-4247-90cd-d4abee302fec", "DetectTime": "2024-05-21T12:52:20.758507+00:00", "EventTime": "2024-05-21T12:52:20.758542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYrRi2sFabG1p1Xta"], "accumulated_threat_level": 10.4, "timewindow": 177} +{"Format": "IDEA0", "ID": "6c75f4d8-edeb-4e91-8829-ca0fac7b8dfd", "DetectTime": "2024-05-21T12:52:20.809931+00:00", "EventTime": "2024-05-21T12:52:20.809964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3LzEZg5Vse4VACl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 177} +{"Format": "IDEA0", "ID": "0b464005-b237-48c7-bf2e-d628cb39b33e", "DetectTime": "2024-05-21T12:52:20.832658+00:00", "EventTime": "2024-05-21T12:52:20.832695+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oopm24T5Xyiyh2ne"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d5641b29-8945-4d23-a682-fa8c7b8be197", "DetectTime": "2024-05-21T12:52:20.845978+00:00", "EventTime": "2024-05-21T12:52:20.846010+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oopm24T5Xyiyh2ne"], "accumulated_threat_level": 7.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "6ea57729-f5c0-441b-9a72-a416c6beaa58", "DetectTime": "2024-05-21T12:52:20.865473+00:00", "EventTime": "2024-05-21T12:52:20.865501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjF7lZ1iUoSusjSmQ8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 177} +{"Format": "Json", "ID": "6ea57729-f5c0-441b-9a72-a416c6beaa58", "DetectTime": "2024-05-21T12:52:20.865473+00:00", "EventTime": "2024-05-21T12:52:20.865501+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-08T08:14:56.048581+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2024/05/21 12:52:21.064167)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 177, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0ebd9a8b-59fb-4fb1-8897-7563aa1c6367", "DetectTime": "2024-05-21T12:52:21.079177+00:00", "EventTime": "2024-05-21T12:52:21.079204+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.49.45.200"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.49.45.200 from 10.0.2.19. AS: SAUDINETSTC-AS, SA AS25019 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyNxUscrzyoAw4E6"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c6e4a90f-1d7c-4458-af20-4e26ca49379e", "DetectTime": "2024-05-21T12:52:21.093085+00:00", "EventTime": "2024-05-21T12:52:21.093103+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.49.45.200"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.49.45.200 from 10.0.2.19. AS: SAUDINETSTC-AS, SA AS25019 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyNxUscrzyoAw4E6"], "accumulated_threat_level": 7.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "b5ef5385-8faf-4a16-b0fe-99cf80740784", "DetectTime": "2024-05-21T12:52:21.104854+00:00", "EventTime": "2024-05-21T12:52:21.104874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsMhMi3tyRNP29loIg"], "accumulated_threat_level": 0.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "884fd9f5-2c1b-432a-867d-fcf7e7442d54", "DetectTime": "2024-05-21T12:52:21.115615+00:00", "EventTime": "2024-05-21T12:52:21.115633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["113.108.254.151"]}], "Attach": [{"Content": "Connection to unknown destination port 7824/UDP destination IP 113.108.254.151. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLEA3v144Gg5POlHC6"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "97b2ac41-ab03-4ece-8a27-6437d60b81b3", "DetectTime": "2024-05-21T12:52:21.152805+00:00", "EventTime": "2024-05-21T12:52:21.152825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.192.26.126"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.192.26.126 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6POH1UeufmpcizN1"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "0df5f054-52d8-4edc-a58a-b3287cb46b87", "DetectTime": "2024-05-21T12:52:21.164567+00:00", "EventTime": "2024-05-21T12:52:21.164587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.192.26.126"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.192.26.126 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6POH1UeufmpcizN1"], "accumulated_threat_level": 8.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "3b0389b0-3e4d-4e9c-9bfd-459508358791", "DetectTime": "2024-05-21T12:52:21.274561+00:00", "EventTime": "2024-05-21T12:52:21.274579+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.2.30.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.2.30.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4CdC1qVVFqPZ8SN8"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "f51319c5-a02d-41f7-920b-04cc60960ba3", "DetectTime": "2024-05-21T12:52:21.288195+00:00", "EventTime": "2024-05-21T12:52:21.288218+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.2.30.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.2.30.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK4CdC1qVVFqPZ8SN8"], "accumulated_threat_level": 8.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "c0738584-413c-437b-af5d-707e038f42ac", "DetectTime": "2024-05-21T12:52:21.346148+00:00", "EventTime": "2024-05-21T12:52:21.346171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXqMJK1mKb8Tar0pz2"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "74b2dd01-b48b-41ef-ac10-11a0b85cda0e", "DetectTime": "2024-05-21T12:52:21.391364+00:00", "EventTime": "2024-05-21T12:52:21.391385+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.51.90.119"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.51.90.119 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDdUg3fF7Cj6Jw6Lb"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "89c1c212-d718-4adf-bc43-e124090fffc8", "DetectTime": "2024-05-21T12:52:21.404150+00:00", "EventTime": "2024-05-21T12:52:21.404174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPyQww2Fp4P2e0RCL9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 177} +{"Format": "IDEA0", "ID": "fa18cb81-1dea-478b-92d9-f94a4241a294", "DetectTime": "2024-05-21T12:52:21.417651+00:00", "EventTime": "2024-05-21T12:52:21.417679+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.51.90.119"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.51.90.119 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLDdUg3fF7Cj6Jw6Lb"], "accumulated_threat_level": 9.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "8485a11c-39ba-4535-968e-e7cfaef9d433", "DetectTime": "2024-05-21T12:52:21.454843+00:00", "EventTime": "2024-05-21T12:52:21.454875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNILv28kYibWvKK2c"], "accumulated_threat_level": 3.2, "timewindow": 177} +{"Format": "IDEA0", "ID": "5a0c08e5-e449-4cd6-855c-8d8bc787cc84", "DetectTime": "2024-05-21T12:52:21.507004+00:00", "EventTime": "2024-05-21T12:52:21.507034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqjM653OiibrrBbtli"], "accumulated_threat_level": 4.0, "timewindow": 177} +{"Format": "IDEA0", "ID": "95270bc0-db4c-4852-8a0c-de3081c4beea", "DetectTime": "2024-05-21T12:52:21.519263+00:00", "EventTime": "2024-05-21T12:52:21.519282+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.223.188.71"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.223.188.71 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4dSTz2kliLsl4sqAl"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c5858040-bbe1-4f7d-9907-689ec2c8857e", "DetectTime": "2024-05-21T12:52:21.533452+00:00", "EventTime": "2024-05-21T12:52:21.533490+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.223.188.71"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.223.188.71 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4dSTz2kliLsl4sqAl"], "accumulated_threat_level": 9.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "bbfa7aaa-1488-4252-9585-a46300d69a02", "DetectTime": "2024-05-21T12:52:21.559317+00:00", "EventTime": "2024-05-21T12:52:21.559355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsbSL3U57t5rrTwI4"], "accumulated_threat_level": 4.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "c7b0500b-c643-44b0-8648-b6b4682f3c2b", "DetectTime": "2024-05-21T12:52:21.599594+00:00", "EventTime": "2024-05-21T12:52:21.599615+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.45.73.57"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.45.73.57 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpdhK03PoGhuwFfbRh"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "7d384040-f326-42a2-aada-6a3e57e1b197", "DetectTime": "2024-05-21T12:52:21.613189+00:00", "EventTime": "2024-05-21T12:52:21.613214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.45.73.57"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.45.73.57 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpdhK03PoGhuwFfbRh"], "accumulated_threat_level": 10.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "156e60f7-4859-40ee-9818-1870489a8fff", "DetectTime": "2024-05-21T12:52:21.626432+00:00", "EventTime": "2024-05-21T12:52:21.626450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1G7Re2gGf044uM1i"], "accumulated_threat_level": 5.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "fe779b16-7bcb-4c4f-a197-dd10cdc1c416", "DetectTime": "2024-05-21T12:52:21.659659+00:00", "EventTime": "2024-05-21T12:52:21.659677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTqjn1UrXYTpYoObf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 177} +{"Format": "IDEA0", "ID": "8502f3b3-8428-43a5-b351-9f20500cc0f6", "DetectTime": "2024-05-21T12:52:21.900434+00:00", "EventTime": "2024-05-21T12:52:21.900452+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["108.18.101.127"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 108.18.101.127 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Y8Nx16CKdqZwgHt4"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "09137f53-a60c-4974-9d90-a6b2970e6613", "DetectTime": "2024-05-21T12:52:21.921486+00:00", "EventTime": "2024-05-21T12:52:21.921506+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["108.18.101.127"]}], "Attach": [{"Content": "connection to blacklisted IP: 108.18.101.127 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Y8Nx16CKdqZwgHt4"], "accumulated_threat_level": 10.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "8fa94259-4118-4b19-837e-5f67f41578f4", "DetectTime": "2024-05-21T12:52:21.947757+00:00", "EventTime": "2024-05-21T12:52:21.947780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtoYpn2Is96HxOZ7X6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 177} +{"Format": "IDEA0", "ID": "cd301176-e292-4339-aa40-263bc123b943", "DetectTime": "2024-05-21T12:52:22.000344+00:00", "EventTime": "2024-05-21T12:52:22.000362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJrJvf1uVFqFYPJu48"], "accumulated_threat_level": 7.199999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "8f9b8120-73a6-48cf-be85-cd8f42c9e5dc", "DetectTime": "2024-05-21T12:52:22.031232+00:00", "EventTime": "2024-05-21T12:52:22.031256+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["74.132.172.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.132.172.233 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKbLc41lLklET687Ph"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "ee314897-c746-4d15-a1a9-6fadc4a2ecbe", "DetectTime": "2024-05-21T12:52:22.052159+00:00", "EventTime": "2024-05-21T12:52:22.052194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["74.132.172.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 74.132.172.233 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKbLc41lLklET687Ph"], "accumulated_threat_level": 11.3, "timewindow": 42} +{"Format": "IDEA0", "ID": "c137819c-c58d-4f7c-81b4-07b58123a1ee", "DetectTime": "2024-05-21T12:52:22.065393+00:00", "EventTime": "2024-05-21T12:52:22.065413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBXB9n2gamyD9UkIyf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "4c1a9b01-6b9e-4c0e-8716-4be6060c2294", "DetectTime": "2024-05-21T12:52:22.109845+00:00", "EventTime": "2024-05-21T12:52:22.109868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRF2PybmEixN1Gznc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "73720220-f0b2-47c0-a6b5-9e46e820bb0a", "DetectTime": "2024-05-21T12:52:22.155828+00:00", "EventTime": "2024-05-21T12:52:22.155846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF3mXu3wCh40QrmHn"], "accumulated_threat_level": 9.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "d01cf783-1ae6-4664-b1dc-d06f452713d1", "DetectTime": "2024-05-21T12:52:22.205174+00:00", "EventTime": "2024-05-21T12:52:22.205193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpSdkvG2LHzKzfZ3"], "accumulated_threat_level": 10.4, "timewindow": 177} +{"Format": "IDEA0", "ID": "57f0aca4-9fef-4e4b-aba9-88e400f7ae0e", "DetectTime": "2024-05-21T12:52:22.239327+00:00", "EventTime": "2024-05-21T12:52:22.239346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["68.107.159.117"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.107.159.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xKiY2rXhEaPA1GTi"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "ba679372-739c-4f6c-986c-6ebcfb46b7f6", "DetectTime": "2024-05-21T12:52:22.253917+00:00", "EventTime": "2024-05-21T12:52:22.253938+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["68.107.159.117"]}], "Attach": [{"Content": "connection to blacklisted IP: 68.107.159.117 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xKiY2rXhEaPA1GTi"], "accumulated_threat_level": 11.8, "timewindow": 42} +{"Format": "IDEA0", "ID": "be71b002-36c4-4ac2-9d85-67ebe0b56d5c", "DetectTime": "2024-05-21T12:52:22.271281+00:00", "EventTime": "2024-05-21T12:52:22.271305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCKGUP3Utb71HHkbpb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 177} +{"Format": "IDEA0", "ID": "ad2b6759-523d-4c9c-8742-bb578193e1c0", "DetectTime": "2024-05-21T12:52:22.450862+00:00", "EventTime": "2024-05-21T12:52:22.450882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["184.42.7.227"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.42.7.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPM5K1zUS9M2JP0g"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "4324c9a5-cb68-4187-bebf-23c3055d78be", "DetectTime": "2024-05-21T12:52:22.464922+00:00", "EventTime": "2024-05-21T12:52:22.464941+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.42.7.227"]}], "Attach": [{"Content": "connection to blacklisted IP: 184.42.7.227 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXPM5K1zUS9M2JP0g"], "accumulated_threat_level": 12.3, "timewindow": 42} +{"Format": "Json", "ID": "4324c9a5-cb68-4187-bebf-23c3055d78be", "DetectTime": "2024-05-21T12:52:22.464922+00:00", "EventTime": "2024-05-21T12:52:22.464941+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["184.42.7.227"]}], "Attach": [{"Content": "1970-01-02T17:22:38.487176+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:52:23.466214)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.3, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.3} +{"Format": "IDEA0", "ID": "8d352a88-c537-4a70-b68b-729c63ff942d", "DetectTime": "2024-05-21T12:52:23.470385+00:00", "EventTime": "2024-05-21T12:52:23.470402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnr3gf1ZAbHNEfWzJ7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 177} +{"Format": "IDEA0", "ID": "a896bff7-38cc-4533-b136-14d3eff64b01", "DetectTime": "2024-05-21T12:52:23.484030+00:00", "EventTime": "2024-05-21T12:52:23.484066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoW1WS1fDuKqiU0qdl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 177} +{"Format": "Json", "ID": "a896bff7-38cc-4533-b136-14d3eff64b01", "DetectTime": "2024-05-21T12:52:23.484030+00:00", "EventTime": "2024-05-21T12:52:23.484066+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-08T08:45:29.726285+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2024/05/21 12:52:23.717270)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 177, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "0374faba-b8b4-474b-b1cb-eb3a8ab228e4", "DetectTime": "2024-05-21T12:52:23.731184+00:00", "EventTime": "2024-05-21T12:52:23.731217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgndfk4UqROrqNISR9"], "accumulated_threat_level": 0.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "59c9b468-56ad-4659-a5da-74ed52c453f1", "DetectTime": "2024-05-21T12:52:23.744787+00:00", "EventTime": "2024-05-21T12:52:23.744811+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["213.57.245.155"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 213.57.245.155 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBf20D2XYffXCGFIRe"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "52038a80-acae-4dfb-b56a-948d7f998f66", "DetectTime": "2024-05-21T12:52:23.758637+00:00", "EventTime": "2024-05-21T12:52:23.758664+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["213.57.245.155"]}], "Attach": [{"Content": "connection to blacklisted IP: 213.57.245.155 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBf20D2XYffXCGFIRe"], "accumulated_threat_level": 0.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "29437c17-81f3-47ed-8024-d432bdf20b3c", "DetectTime": "2024-05-21T12:52:23.770586+00:00", "EventTime": "2024-05-21T12:52:23.770612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9qQ4331vlETFvXOl"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "129c1e3e-cac2-4a39-8119-63265ecd9ba9", "DetectTime": "2024-05-21T12:52:23.775987+00:00", "EventTime": "2024-05-21T12:52:23.776006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COPJpQ3ILHodxHfBJk"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "1d0c4239-9ace-4848-b3a6-e51feb2a89a0", "DetectTime": "2024-05-21T12:52:23.794079+00:00", "EventTime": "2024-05-21T12:52:23.794107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN2vWW3RmMcSUiRYec"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 177} +{"Format": "IDEA0", "ID": "b144af28-fd9c-4107-87e5-5205b7bd9e02", "DetectTime": "2024-05-21T12:52:23.807193+00:00", "EventTime": "2024-05-21T12:52:23.807214+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwv26Y15WBA1N1R4yk"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "b4544476-7b24-444f-8be7-256acb46e8e0", "DetectTime": "2024-05-21T12:52:23.820787+00:00", "EventTime": "2024-05-21T12:52:23.820822+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwv26Y15WBA1N1R4yk"], "accumulated_threat_level": 1.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "84232571-b0e1-4d22-8db9-a9333eac9339", "DetectTime": "2024-05-21T12:52:23.840215+00:00", "EventTime": "2024-05-21T12:52:23.840245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIipX1w1ishF77Qul"], "accumulated_threat_level": 3.2, "timewindow": 177} +{"Format": "IDEA0", "ID": "3de4dba6-2be7-4102-b207-57bd4dbe9f62", "DetectTime": "2024-05-21T12:52:23.853253+00:00", "EventTime": "2024-05-21T12:52:23.853272+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3eGUO4Lj1mbmuLg"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "a7fafcd2-7993-4f62-9c8a-302b699bf0cb", "DetectTime": "2024-05-21T12:52:23.867344+00:00", "EventTime": "2024-05-21T12:52:23.867383+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co3eGUO4Lj1mbmuLg"], "accumulated_threat_level": 1.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "25dcbed9-2824-48fc-9640-5030798a1f76", "DetectTime": "2024-05-21T12:52:23.884571+00:00", "EventTime": "2024-05-21T12:52:23.884607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2DPOK1Vsm3jdttQVc"], "accumulated_threat_level": 4.0, "timewindow": 177} +{"Format": "IDEA0", "ID": "c6d8ba11-7af7-40fd-9bac-6c5292516724", "DetectTime": "2024-05-21T12:52:23.898642+00:00", "EventTime": "2024-05-21T12:52:23.898668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwiWNQ1FNRoo2L3nT"], "accumulated_threat_level": 4.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "bfc780fd-f28b-4df9-9136-523a0b475745", "DetectTime": "2024-05-21T12:52:23.911983+00:00", "EventTime": "2024-05-21T12:52:23.912007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBUse4LzzLWIRcvp9"], "accumulated_threat_level": 5.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "4e6e8752-986f-417a-b3e3-be5f0ccf3015", "DetectTime": "2024-05-21T12:52:23.926197+00:00", "EventTime": "2024-05-21T12:52:23.926233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFc77Wd0A1sUoEFbh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 177} +{"Format": "IDEA0", "ID": "c7abd33d-3b36-4116-ae23-5a327acfc16c", "DetectTime": "2024-05-21T12:52:23.939881+00:00", "EventTime": "2024-05-21T12:52:23.939912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJM2ig4d4SiWnsUT0i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "b895622c-b952-4ba9-aa7d-f8503af0050a", "DetectTime": "2024-05-21T12:52:23.945134+00:00", "EventTime": "2024-05-21T12:52:23.945156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbi7Y63AyX2FSD0R6j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "584ab3bb-6c82-4ae8-9d14-99255e592343", "DetectTime": "2024-05-21T12:52:23.959471+00:00", "EventTime": "2024-05-21T12:52:23.959499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkO2wk1UNuAFi17E7h"], "accumulated_threat_level": 7.999999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "b6fc67fa-760a-43fb-b76e-cbfcda831b68", "DetectTime": "2024-05-21T12:52:23.971950+00:00", "EventTime": "2024-05-21T12:52:23.971969+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.151.56.116"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4uQfA90BwTJFUzh"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "44ae6057-0f3b-494a-90ee-ec0250537445", "DetectTime": "2024-05-21T12:52:23.985221+00:00", "EventTime": "2024-05-21T12:52:23.985255+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4uQfA90BwTJFUzh"], "accumulated_threat_level": 2.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "4006c846-d67e-4e39-8db5-f0c6342d01b7", "DetectTime": "2024-05-21T12:52:23.998555+00:00", "EventTime": "2024-05-21T12:52:23.998590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoVrHx1mDHYkGkhcBa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 177} +{"Format": "IDEA0", "ID": "bcba8984-7e3d-4b2a-8c65-00ade0157892", "DetectTime": "2024-05-21T12:52:24.012331+00:00", "EventTime": "2024-05-21T12:52:24.012351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnxMwM2G2hVcdXbSNj"], "accumulated_threat_level": 9.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "6876e6f9-5844-4de2-8b3a-be33e7dcde9c", "DetectTime": "2024-05-21T12:52:24.023187+00:00", "EventTime": "2024-05-21T12:52:24.023205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1yLZ2OOFjMEpdpog"], "accumulated_threat_level": 10.4, "timewindow": 177} +{"Format": "IDEA0", "ID": "3da1b6e6-2287-423c-8d18-29278ae102a3", "DetectTime": "2024-05-21T12:52:24.033715+00:00", "EventTime": "2024-05-21T12:52:24.033736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXJPD2gIp9gxG9HEi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 177} +{"Format": "IDEA0", "ID": "3fbe43be-d497-4055-a69e-344c541e0f59", "DetectTime": "2024-05-21T12:52:24.054922+00:00", "EventTime": "2024-05-21T12:52:24.054939+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["142.59.178.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 142.59.178.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qm1s3HYkeRJekLFc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c6b40ae5-6f8e-4c15-b9c2-21cc72750a28", "DetectTime": "2024-05-21T12:52:24.076836+00:00", "EventTime": "2024-05-21T12:52:24.076874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["142.59.178.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 142.59.178.147 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qm1s3HYkeRJekLFc"], "accumulated_threat_level": 2.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "16e815e2-b4de-4263-a630-71fdea34251e", "DetectTime": "2024-05-21T12:52:24.090241+00:00", "EventTime": "2024-05-21T12:52:24.090277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmYol4jdp6UKeHrrg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 177} +{"Format": "Json", "ID": "16e815e2-b4de-4263-a630-71fdea34251e", "DetectTime": "2024-05-21T12:52:24.090241+00:00", "EventTime": "2024-05-21T12:52:24.090277+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T08:45:34.569422+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 177. (real time 2024/05/21 12:52:24.592468)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 177, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d0000de8-f2a9-4058-9f68-fc053438dc47", "DetectTime": "2024-05-21T12:52:24.604941+00:00", "EventTime": "2024-05-21T12:52:24.604971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCCmp4g65uZ6NN6w2"], "accumulated_threat_level": 0.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "09ce3fc3-1aae-498b-a9d2-ca9a9fe4ff6c", "DetectTime": "2024-05-21T12:52:24.617561+00:00", "EventTime": "2024-05-21T12:52:24.617581+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.110.19.20"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.110.19.20 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd81eOIjq3Y0WteF6"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "f5797ac8-bd22-47da-8ef3-458978c32613", "DetectTime": "2024-05-21T12:52:24.631165+00:00", "EventTime": "2024-05-21T12:52:24.631190+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.110.19.20"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.110.19.20 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd81eOIjq3Y0WteF6"], "accumulated_threat_level": 3.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "3abc90be-2df6-4b79-800c-576696b98cb7", "DetectTime": "2024-05-21T12:52:24.637305+00:00", "EventTime": "2024-05-21T12:52:24.637326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsYIjz4kGyqTSsU29j"], "accumulated_threat_level": 0.8, "timewindow": 177} +{"Format": "IDEA0", "ID": "655a41a7-0b02-4d7b-80d6-7f42a48f8906", "DetectTime": "2024-05-21T12:52:24.650097+00:00", "EventTime": "2024-05-21T12:52:24.650116+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["175.139.190.82"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 175.139.190.82 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxODu2PAT9cGGHlTl"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "800d755f-809a-44eb-8747-b3ef522d511d", "DetectTime": "2024-05-21T12:52:24.663720+00:00", "EventTime": "2024-05-21T12:52:24.663745+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["175.139.190.82"]}], "Attach": [{"Content": "connection to blacklisted IP: 175.139.190.82 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdxODu2PAT9cGGHlTl"], "accumulated_threat_level": 3.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "0eb42fc5-7b51-45d3-ba74-0c79a9c7baae", "DetectTime": "2024-05-21T12:52:24.676895+00:00", "EventTime": "2024-05-21T12:52:24.676929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1fysI1FY4KHUwd5eb"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "6687cfae-7b6f-4e86-8697-aaf2766992b4", "DetectTime": "2024-05-21T12:52:24.689433+00:00", "EventTime": "2024-05-21T12:52:24.689453+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.229.13.232"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.229.13.232 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Q70B3VlbBPGjuWvh"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "62097e5f-91f4-45ad-a37f-605acc1e553c", "DetectTime": "2024-05-21T12:52:24.703701+00:00", "EventTime": "2024-05-21T12:52:24.703736+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.229.13.232"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.229.13.232 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0Q70B3VlbBPGjuWvh"], "accumulated_threat_level": 4.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "b50b7038-0171-4057-86f3-59cb4a852ce9", "DetectTime": "2024-05-21T12:52:24.728162+00:00", "EventTime": "2024-05-21T12:52:24.728196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvbez3eEVp2YEMHnb"], "accumulated_threat_level": 1.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "3770e36c-d790-4b61-ab46-59ea32822406", "DetectTime": "2024-05-21T12:52:24.733541+00:00", "EventTime": "2024-05-21T12:52:24.733559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv035O2HilQH6hBYS8"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "e2ced23b-1221-4ce1-95e5-d9bdd5efdcb0", "DetectTime": "2024-05-21T12:52:24.744949+00:00", "EventTime": "2024-05-21T12:52:24.744981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZfchg2y3aYwGkglze"], "accumulated_threat_level": 2.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "ff306dcd-2e15-46c4-857d-3d8fc564beaf", "DetectTime": "2024-05-21T12:52:24.757726+00:00", "EventTime": "2024-05-21T12:52:24.757758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIo9z9sUosObN6ms8"], "accumulated_threat_level": 3.4000000000000004, "timewindow": 178} +{"Format": "IDEA0", "ID": "b3dc37e3-39bb-4ed0-bec1-a85610b86a9b", "DetectTime": "2024-05-21T12:52:24.769063+00:00", "EventTime": "2024-05-21T12:52:24.769091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3GKW1O0yySLm0Ulf"], "accumulated_threat_level": 4.2, "timewindow": 178} +{"Format": "IDEA0", "ID": "fe6a60cb-7ea9-4f1a-8104-a1380d0e8768", "DetectTime": "2024-05-21T12:52:24.781764+00:00", "EventTime": "2024-05-21T12:52:24.781788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COug6g26zepddJSmTh"], "accumulated_threat_level": 5.0, "timewindow": 178} +{"Format": "IDEA0", "ID": "4940f77c-4720-46bc-9896-c976a89e2134", "DetectTime": "2024-05-21T12:52:24.795487+00:00", "EventTime": "2024-05-21T12:52:24.795508+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["69.111.78.121"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.111.78.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46e3y4VqcrPZ4xzcj"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "a837986a-348a-4b26-8fc0-67b1690ce656", "DetectTime": "2024-05-21T12:52:24.810473+00:00", "EventTime": "2024-05-21T12:52:24.810510+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["69.111.78.121"]}], "Attach": [{"Content": "connection to blacklisted IP: 69.111.78.121 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C46e3y4VqcrPZ4xzcj"], "accumulated_threat_level": 4.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "3da9da53-b565-4edf-af3b-3c0643b0c350", "DetectTime": "2024-05-21T12:52:24.925433+00:00", "EventTime": "2024-05-21T12:52:24.925453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnA3Nr43hZXDsoXlJc"], "accumulated_threat_level": 5.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "17587028-ccb1-4576-ac5e-c6801da0dab2", "DetectTime": "2024-05-21T12:52:24.975639+00:00", "EventTime": "2024-05-21T12:52:24.975658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCE4dx2lto6ekaRAz7"], "accumulated_threat_level": 6.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "63a9f175-e525-4f95-bc12-d18f8cdffb51", "DetectTime": "2024-05-21T12:52:25.016572+00:00", "EventTime": "2024-05-21T12:52:25.016592+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYiPh2nMmhGwBPvX5"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "2a4ad5d3-6868-46ca-bf64-99f18f2e0020", "DetectTime": "2024-05-21T12:52:25.028798+00:00", "EventTime": "2024-05-21T12:52:25.028817+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYiPh2nMmhGwBPvX5"], "accumulated_threat_level": 5.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d8d7afe4-071e-45d1-9728-f36419dc5d24", "DetectTime": "2024-05-21T12:52:25.040391+00:00", "EventTime": "2024-05-21T12:52:25.040409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIarxJ283D6wkNWda"], "accumulated_threat_level": 7.3999999999999995, "timewindow": 178} +{"Format": "IDEA0", "ID": "98570d65-1fa5-46ad-b9dd-9baf8038ccdf", "DetectTime": "2024-05-21T12:52:25.076977+00:00", "EventTime": "2024-05-21T12:52:25.077006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEOFXC4TMucCdtma6d"], "accumulated_threat_level": 8.2, "timewindow": 178} +{"Format": "IDEA0", "ID": "fc1b6411-50a3-448d-ba1e-66b4fdb3730a", "DetectTime": "2024-05-21T12:52:25.125501+00:00", "EventTime": "2024-05-21T12:52:25.125526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJovuf1cNFf7DrKv58"], "accumulated_threat_level": 9.0, "timewindow": 178} +{"Format": "IDEA0", "ID": "5bf037f9-b846-477d-b0f2-b9dfcb28eb24", "DetectTime": "2024-05-21T12:52:25.174799+00:00", "EventTime": "2024-05-21T12:52:25.174825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1YAl3VIeA6WJf5p7"], "accumulated_threat_level": 9.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "4ebea998-bcde-4607-b6c8-0ae50e29dd60", "DetectTime": "2024-05-21T12:52:25.224900+00:00", "EventTime": "2024-05-21T12:52:25.224919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFBDT2ANx4KrIbjW9"], "accumulated_threat_level": 10.600000000000001, "timewindow": 178} +{"Format": "IDEA0", "ID": "c041d8c7-757f-4034-99ae-e782465ea850", "DetectTime": "2024-05-21T12:52:25.318769+00:00", "EventTime": "2024-05-21T12:52:25.318789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.74.200.86"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0Jom3yKlQEGl6Duj"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "736b09cd-c7a6-4ad9-98b5-a7060db9c174", "DetectTime": "2024-05-21T12:52:25.332224+00:00", "EventTime": "2024-05-21T12:52:25.332247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0Jom3yKlQEGl6Duj"], "accumulated_threat_level": 5.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "a9502658-f3ba-46ab-aff0-eb594f6bebe8", "DetectTime": "2024-05-21T12:52:25.449693+00:00", "EventTime": "2024-05-21T12:52:25.449712+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbt47NXlg3B8C63j"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "9255fd78-c0cc-4c6d-adea-2a092a782759", "DetectTime": "2024-05-21T12:52:25.463493+00:00", "EventTime": "2024-05-21T12:52:25.463518+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbt47NXlg3B8C63j"], "accumulated_threat_level": 6.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "62fc9dd8-b999-427a-916f-75a9197e42e7", "DetectTime": "2024-05-21T12:52:25.477054+00:00", "EventTime": "2024-05-21T12:52:25.477085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCK2jV3PHyjRjvZUIg"], "accumulated_threat_level": 11.400000000000002, "timewindow": 178} +{"Format": "IDEA0", "ID": "5059c87a-3801-482b-a5a4-5a95de6a9989", "DetectTime": "2024-05-21T12:52:25.512895+00:00", "EventTime": "2024-05-21T12:52:25.512923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FF4A1OyDY9cM44Pg"], "accumulated_threat_level": 12.200000000000003, "timewindow": 178} +{"Format": "Json", "ID": "5059c87a-3801-482b-a5a4-5a95de6a9989", "DetectTime": "2024-05-21T12:52:25.512895+00:00", "EventTime": "2024-05-21T12:52:25.512923+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T09:16:24.909628+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2024/05/21 12:52:25.781491)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.200000000000003, "timewindow": 178, "profileid": "profile_10.0.2.19", "threat_level": 12.200000000000003} +{"Format": "IDEA0", "ID": "110c2cce-4005-4e10-856f-b8c149fcc1f2", "DetectTime": "2024-05-21T12:52:25.785697+00:00", "EventTime": "2024-05-21T12:52:25.785716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugqVJ2BnKWKOyak3c"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "eb6c833f-b253-40a7-9bb2-63d991fcf44f", "DetectTime": "2024-05-21T12:52:25.805571+00:00", "EventTime": "2024-05-21T12:52:25.805613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9HD2P21WZ998MM3ti"], "accumulated_threat_level": 0.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "d1b019e5-58ea-4ac6-a408-86894aee0831", "DetectTime": "2024-05-21T12:52:25.823052+00:00", "EventTime": "2024-05-21T12:52:25.823082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEd6HruAIt4PMceb"], "accumulated_threat_level": 1.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "7d39c591-6074-4560-ad81-fee06e95607a", "DetectTime": "2024-05-21T12:52:25.837835+00:00", "EventTime": "2024-05-21T12:52:25.837871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DJ9o4yzkK8TWVQXk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 178} +{"Format": "IDEA0", "ID": "a295f8ff-52af-45e2-b6d5-6ec90f6f6627", "DetectTime": "2024-05-21T12:52:25.850978+00:00", "EventTime": "2024-05-21T12:52:25.850998+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.184.128.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.184.128.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFChoK2ckUeyKYF6Ih"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "982a74f8-77de-443f-874a-0a349e78473f", "DetectTime": "2024-05-21T12:52:25.865161+00:00", "EventTime": "2024-05-21T12:52:25.865198+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.184.128.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.184.128.160 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFChoK2ckUeyKYF6Ih"], "accumulated_threat_level": 6.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "e014935e-de57-49a9-b116-1bc7d69da1e6", "DetectTime": "2024-05-21T12:52:25.879728+00:00", "EventTime": "2024-05-21T12:52:25.879765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6v6NhzRR4b9oSxe1"], "accumulated_threat_level": 3.2, "timewindow": 178} +{"Format": "IDEA0", "ID": "bdf94e51-613e-4a74-aebf-348e0497ea16", "DetectTime": "2024-05-21T12:52:25.904991+00:00", "EventTime": "2024-05-21T12:52:25.905013+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["172.190.23.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.23.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGq4jZ3v8FxUTZ3Cfb"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d7dfc83e-ea8f-4f5b-bc6c-acdcd127ae3e", "DetectTime": "2024-05-21T12:52:25.931537+00:00", "EventTime": "2024-05-21T12:52:25.931571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.23.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGq4jZ3v8FxUTZ3Cfb"], "accumulated_threat_level": 7.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "a111f6b6-c995-4694-aa6d-a3ceb3f21d2b", "DetectTime": "2024-05-21T12:52:25.946072+00:00", "EventTime": "2024-05-21T12:52:25.946091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.207.189.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.207.189.134 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-207-189-134.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cenr9q2gx0NfcyBZVd"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "fc82613b-be4b-43f7-8580-d584414787c5", "DetectTime": "2024-05-21T12:52:25.960910+00:00", "EventTime": "2024-05-21T12:52:25.960934+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.207.189.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.207.189.134 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-207-189-134.dyn.dsl.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cenr9q2gx0NfcyBZVd"], "accumulated_threat_level": 7.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "e5ee0a04-8d25-4697-8b78-95eca258e49c", "DetectTime": "2024-05-21T12:52:26.007046+00:00", "EventTime": "2024-05-21T12:52:26.007067+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.15.22.31"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.15.22.31 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2y0fLuTByzxHBkXc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "31d1aca2-37ad-4099-b7f9-862852af9142", "DetectTime": "2024-05-21T12:52:26.019626+00:00", "EventTime": "2024-05-21T12:52:26.019647+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.15.22.31"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.15.22.31 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2y0fLuTByzxHBkXc"], "accumulated_threat_level": 8.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "b0f1af5d-0e74-4202-a58e-2e30948d885f", "DetectTime": "2024-05-21T12:52:26.034965+00:00", "EventTime": "2024-05-21T12:52:26.034985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Sdyt373xGMlAS1Nj"], "accumulated_threat_level": 4.0, "timewindow": 178} +{"Format": "IDEA0", "ID": "40cec9ad-9a4e-4af4-8f78-8d8695a476b4", "DetectTime": "2024-05-21T12:52:26.073319+00:00", "EventTime": "2024-05-21T12:52:26.073338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXt193zilsk5wfZZ"], "accumulated_threat_level": 4.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "f6ec5313-92fe-4d51-89e6-701b1ab30a34", "DetectTime": "2024-05-21T12:52:26.126312+00:00", "EventTime": "2024-05-21T12:52:26.126331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQI9Aj3JVoX6vzfMuh"], "accumulated_threat_level": 5.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "bc7e574a-ea9d-4987-ae79-9037b7db719b", "DetectTime": "2024-05-21T12:52:26.138142+00:00", "EventTime": "2024-05-21T12:52:26.138161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["95.15.173.122"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.15.173.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXTp732YSDV8Mj7Wa"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "1b829a5c-c914-4e3a-bcba-b53a0bcf13e6", "DetectTime": "2024-05-21T12:52:26.150617+00:00", "EventTime": "2024-05-21T12:52:26.150636+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["95.15.173.122"]}], "Attach": [{"Content": "connection to blacklisted IP: 95.15.173.122 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsXTp732YSDV8Mj7Wa"], "accumulated_threat_level": 8.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "47f1cfd4-5e7f-437c-91f9-a068405674a0", "DetectTime": "2024-05-21T12:52:26.176219+00:00", "EventTime": "2024-05-21T12:52:26.176239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfmvn2dDcbIR8r36d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 178} +{"Format": "IDEA0", "ID": "ac37b02a-73cc-4d19-a54b-e2663ae27031", "DetectTime": "2024-05-21T12:52:26.230885+00:00", "EventTime": "2024-05-21T12:52:26.230906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjeBFqsictjMtHodi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "b2a0c8f4-beb9-4bff-be53-d985ad936c67", "DetectTime": "2024-05-21T12:52:26.280187+00:00", "EventTime": "2024-05-21T12:52:26.280207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COWu3k3PrZtkijcKEg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "f85870c8-3915-418b-8fc8-2e8c2bf76fa7", "DetectTime": "2024-05-21T12:52:26.334280+00:00", "EventTime": "2024-05-21T12:52:26.334306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEIeUT2eTwozmqlalk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "6713507d-551e-4d4c-9106-87fc916e3973", "DetectTime": "2024-05-21T12:52:26.487081+00:00", "EventTime": "2024-05-21T12:52:26.487102+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.168.104.77"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.168.104.77 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmWp82Cg5NTyfvzSe"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "ed713fa4-e680-4b62-add0-5ef5b3b10c32", "DetectTime": "2024-05-21T12:52:26.501030+00:00", "EventTime": "2024-05-21T12:52:26.501066+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.168.104.77"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.168.104.77 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdmWp82Cg5NTyfvzSe"], "accumulated_threat_level": 9.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c77b9a88-b3cc-4ae5-b7a9-1b1ef9486225", "DetectTime": "2024-05-21T12:52:26.617838+00:00", "EventTime": "2024-05-21T12:52:26.617878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKxFnk1hA5vWY0oh21"], "accumulated_threat_level": 9.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "a622c343-d73f-467c-b512-f2b889d73573", "DetectTime": "2024-05-21T12:52:26.669547+00:00", "EventTime": "2024-05-21T12:52:26.669584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cimbrg1kHf6m2mAEu"], "accumulated_threat_level": 10.4, "timewindow": 178} +{"Format": "IDEA0", "ID": "72f8fd85-45e7-488d-8184-62185c22463f", "DetectTime": "2024-05-21T12:52:26.709132+00:00", "EventTime": "2024-05-21T12:52:26.709153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C715Mo4TE5PO6XdNB"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "0ccaa700-99b1-426f-b042-570def15c4f3", "DetectTime": "2024-05-21T12:52:26.755021+00:00", "EventTime": "2024-05-21T12:52:26.755053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cohn0b3t0FP945gAnf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 178} +{"Format": "IDEA0", "ID": "025616ee-5527-4a54-bd28-7ef045fa68f0", "DetectTime": "2024-05-21T12:52:26.791705+00:00", "EventTime": "2024-05-21T12:52:26.791726+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.54.229.42"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.54.229.42 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctb7KgeYeM1AWlqDc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d91808d7-e2fc-486f-b72e-4347bc0bdb3f", "DetectTime": "2024-05-21T12:52:26.805761+00:00", "EventTime": "2024-05-21T12:52:26.805792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.54.229.42"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.54.229.42 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctb7KgeYeM1AWlqDc"], "accumulated_threat_level": 9.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "0bedf1a6-b585-4678-9546-91578e6e57a1", "DetectTime": "2024-05-21T12:52:26.817795+00:00", "EventTime": "2024-05-21T12:52:26.817828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHvYcb1LNCcAljta4j"], "accumulated_threat_level": 12.000000000000002, "timewindow": 178} +{"Format": "Json", "ID": "0bedf1a6-b585-4678-9546-91578e6e57a1", "DetectTime": "2024-05-21T12:52:26.817795+00:00", "EventTime": "2024-05-21T12:52:26.817828+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-08T09:16:28.173078+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2024/05/21 12:52:26.985849)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 178, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "332a9395-2429-494e-90bb-2ccac40bc0e4", "DetectTime": "2024-05-21T12:52:26.999228+00:00", "EventTime": "2024-05-21T12:52:26.999254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQyGc19DXQl3kCg43"], "accumulated_threat_level": 0.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "cd092947-cbd6-4e48-92db-5a18e5fa6965", "DetectTime": "2024-05-21T12:52:27.013345+00:00", "EventTime": "2024-05-21T12:52:27.013366+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.174.70.176"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.174.70.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsXOP3KOd1fgCOYHg"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "e671723b-814e-4aed-a7a5-4b8f2891c9ad", "DetectTime": "2024-05-21T12:52:27.025089+00:00", "EventTime": "2024-05-21T12:52:27.025106+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.174.70.176"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.174.70.176 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxsXOP3KOd1fgCOYHg"], "accumulated_threat_level": 10.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "9e72ea8e-a310-466d-96d7-282394e2529f", "DetectTime": "2024-05-21T12:52:27.034937+00:00", "EventTime": "2024-05-21T12:52:27.034956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xDfx36JVsO8N5xlj"], "accumulated_threat_level": 1.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "ccef6c0e-8db0-4b29-9e75-ab4579f5bbf4", "DetectTime": "2024-05-21T12:52:27.047834+00:00", "EventTime": "2024-05-21T12:52:27.047853+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.97.55"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIviAN3deSphYUQ9Z2"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "61d66472-32ed-45e0-8659-74e496cd6cb3", "DetectTime": "2024-05-21T12:52:27.060996+00:00", "EventTime": "2024-05-21T12:52:27.061017+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIviAN3deSphYUQ9Z2"], "accumulated_threat_level": 10.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "813cbb1f-6bf6-45b0-9dcb-ff672abc1658", "DetectTime": "2024-05-21T12:52:27.184342+00:00", "EventTime": "2024-05-21T12:52:27.184360+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.68.58.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.58.134 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5VFW1kOMR8q4aZml"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "93598c09-51e5-4cd8-bf58-9932d1a6a7a2", "DetectTime": "2024-05-21T12:52:27.196377+00:00", "EventTime": "2024-05-21T12:52:27.196399+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.68.58.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.68.58.134 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5VFW1kOMR8q4aZml"], "accumulated_threat_level": 11.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "08377ea6-672d-4b6c-a6fa-40aa003c436f", "DetectTime": "2024-05-21T12:52:27.317059+00:00", "EventTime": "2024-05-21T12:52:27.317082+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48rbo4zhUHhFS2s57"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "980d19eb-d3a7-4fdf-a8b9-f50cf1c6f124", "DetectTime": "2024-05-21T12:52:27.330678+00:00", "EventTime": "2024-05-21T12:52:27.330704+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C48rbo4zhUHhFS2s57"], "accumulated_threat_level": 11.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "db0c3489-4a76-42ca-adc7-78af435754fe", "DetectTime": "2024-05-21T12:52:27.353354+00:00", "EventTime": "2024-05-21T12:52:27.353394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7lpu4jqb3R8Ir0Qi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 178} +{"Format": "IDEA0", "ID": "9badb878-7327-4880-b9ba-c2869c0d7516", "DetectTime": "2024-05-21T12:52:27.400552+00:00", "EventTime": "2024-05-21T12:52:27.400582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22ewCMRZxzcmFkQ5"], "accumulated_threat_level": 3.2, "timewindow": 178} +{"Format": "IDEA0", "ID": "fd36a652-a23f-4925-a03d-217143bbed77", "DetectTime": "2024-05-21T12:52:27.448345+00:00", "EventTime": "2024-05-21T12:52:27.448372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvlNEHM9nnUE5dHg5"], "accumulated_threat_level": 4.0, "timewindow": 178} +{"Format": "IDEA0", "ID": "961ce142-44db-41fa-84ca-1496c88e03af", "DetectTime": "2024-05-21T12:52:27.462040+00:00", "EventTime": "2024-05-21T12:52:27.462061+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["212.76.103.170"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 212.76.103.170 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDTTY3qJK2pHisoK1"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "f35c377b-08af-4aaf-81b3-b6127d2e8c12", "DetectTime": "2024-05-21T12:52:27.476129+00:00", "EventTime": "2024-05-21T12:52:27.476157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["212.76.103.170"]}], "Attach": [{"Content": "connection to blacklisted IP: 212.76.103.170 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwDTTY3qJK2pHisoK1"], "accumulated_threat_level": 12.0, "timewindow": 42} +{"Format": "Json", "ID": "f35c377b-08af-4aaf-81b3-b6127d2e8c12", "DetectTime": "2024-05-21T12:52:27.476129+00:00", "EventTime": "2024-05-21T12:52:27.476157+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["212.76.103.170"]}], "Attach": [{"Content": "1970-01-02T17:25:46.763807+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:52:27.964552)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "faf1a9d7-f091-491c-8275-10ca09bdd756", "DetectTime": "2024-05-21T12:52:27.980080+00:00", "EventTime": "2024-05-21T12:52:27.980101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7oCT150vfDJN7oni"], "accumulated_threat_level": 4.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "fb513ba2-5b5a-417d-9633-8b77af922f6e", "DetectTime": "2024-05-21T12:52:27.993499+00:00", "EventTime": "2024-05-21T12:52:27.993519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE9Iy4VfNcCecf0l1"], "accumulated_threat_level": 5.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "9282bf82-e20c-45c1-8b31-b29b82b9ef5e", "DetectTime": "2024-05-21T12:52:28.007538+00:00", "EventTime": "2024-05-21T12:52:28.007557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjfFkH9juMoiIZF3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 178} +{"Format": "IDEA0", "ID": "bb124d4c-7741-4eca-b55d-a681586ba8a9", "DetectTime": "2024-05-21T12:52:28.019364+00:00", "EventTime": "2024-05-21T12:52:28.019383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmZl7Q1CCzcp1nsrJ1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "034800a8-5454-4937-a9a8-30fc49e08a27", "DetectTime": "2024-05-21T12:52:28.031837+00:00", "EventTime": "2024-05-21T12:52:28.031861+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.32.95.225"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.32.95.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpCKD2M2YFiyNu21b"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "37bdf1b6-174d-4611-af39-0c621f9cfca7", "DetectTime": "2024-05-21T12:52:28.048866+00:00", "EventTime": "2024-05-21T12:52:28.048887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.32.95.225"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.32.95.225 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSpCKD2M2YFiyNu21b"], "accumulated_threat_level": 0.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "95859a45-f180-4ae5-b2c9-b9e114125a03", "DetectTime": "2024-05-21T12:52:28.053916+00:00", "EventTime": "2024-05-21T12:52:28.053934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdS7en4hodXcAEo8u5"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "28423f4e-7a58-4b5d-b536-438887662df8", "DetectTime": "2024-05-21T12:52:28.067353+00:00", "EventTime": "2024-05-21T12:52:28.067373+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.108.40.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSAmT36jfOpwH8hj5"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "67417872-d7e0-4f37-b8fc-2a3448ec1b4b", "DetectTime": "2024-05-21T12:52:28.081382+00:00", "EventTime": "2024-05-21T12:52:28.081406+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSAmT36jfOpwH8hj5"], "accumulated_threat_level": 1.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "81820994-e431-44d7-acb3-97df6ad17626", "DetectTime": "2024-05-21T12:52:28.096092+00:00", "EventTime": "2024-05-21T12:52:28.096118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfdIQ1h34bOU5btPe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "256f4699-6643-4f49-9e68-b55213fedf0d", "DetectTime": "2024-05-21T12:52:28.109999+00:00", "EventTime": "2024-05-21T12:52:28.110019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrydDp47sr3S7npFEa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "fe601b88-298f-4365-9c44-a5ae49867c31", "DetectTime": "2024-05-21T12:52:28.122949+00:00", "EventTime": "2024-05-21T12:52:28.122969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3yHvE2kxF1jgPIM9d"], "accumulated_threat_level": 9.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "bc815880-7821-4369-b4e7-5f959caa22da", "DetectTime": "2024-05-21T12:52:28.136473+00:00", "EventTime": "2024-05-21T12:52:28.136491+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["83.204.139.14"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.204.139.14 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbjUg3kxKB4N72Qy"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "5d721b54-1dc1-463a-bf73-ff9f8197083b", "DetectTime": "2024-05-21T12:52:28.149696+00:00", "EventTime": "2024-05-21T12:52:28.149716+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["83.204.139.14"]}], "Attach": [{"Content": "connection to blacklisted IP: 83.204.139.14 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbjUg3kxKB4N72Qy"], "accumulated_threat_level": 1.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "c7e276e9-d9ce-4e28-b37c-4f74e8f6ff3f", "DetectTime": "2024-05-21T12:52:28.163674+00:00", "EventTime": "2024-05-21T12:52:28.163693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbf724cBfg7Hu1byc"], "accumulated_threat_level": 10.4, "timewindow": 178} +{"Format": "IDEA0", "ID": "0ba9b553-4bda-43f2-8dc0-d0a39af7c55f", "DetectTime": "2024-05-21T12:52:28.204691+00:00", "EventTime": "2024-05-21T12:52:28.204710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crs8Rx2jsiWoqW3Rn6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 178} +{"Format": "IDEA0", "ID": "737d2c1e-dc26-4ef0-b73f-9d031942c07a", "DetectTime": "2024-05-21T12:52:28.253799+00:00", "EventTime": "2024-05-21T12:52:28.253819+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.61.86.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZa0qZpVj6v0JKmc8"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c2a75c80-745c-43e8-823a-7a834e3ea805", "DetectTime": "2024-05-21T12:52:28.271957+00:00", "EventTime": "2024-05-21T12:52:28.271975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPF8JR2izyJZDsH9c4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 178} +{"Format": "Json", "ID": "c2a75c80-745c-43e8-823a-7a834e3ea805", "DetectTime": "2024-05-21T12:52:28.271957+00:00", "EventTime": "2024-05-21T12:52:28.271975+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "1970-01-08T09:47:41.318060+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2024/05/21 12:52:28.458030)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 178, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "31a170a6-6c36-4814-8b6b-93becab58d21", "DetectTime": "2024-05-21T12:52:28.469074+00:00", "EventTime": "2024-05-21T12:52:28.469093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZa0qZpVj6v0JKmc8"], "accumulated_threat_level": 2.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "8a808b6c-0d94-4629-a26f-2b1dc3cb9bd1", "DetectTime": "2024-05-21T12:52:28.530168+00:00", "EventTime": "2024-05-21T12:52:28.530187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVrlOtTotDRZoQpU2"], "accumulated_threat_level": 0.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "51ef8b6d-e491-4caf-969a-25a11beeef5f", "DetectTime": "2024-05-21T12:52:28.583019+00:00", "EventTime": "2024-05-21T12:52:28.583038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzfGvPuHNxMFOVY"], "accumulated_threat_level": 1.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "326e3427-2bbb-431c-99ca-e6b256d5ccf2", "DetectTime": "2024-05-21T12:52:28.630538+00:00", "EventTime": "2024-05-21T12:52:28.630558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkLO71PdBNFkEIgSf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 178} +{"Format": "IDEA0", "ID": "314d4b81-2b1c-4e3a-a94c-c20d3fad06fa", "DetectTime": "2024-05-21T12:52:28.682348+00:00", "EventTime": "2024-05-21T12:52:28.682370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu7JWL1fipx8UoOIe8"], "accumulated_threat_level": 3.2, "timewindow": 178} +{"Format": "IDEA0", "ID": "3b8a2ee9-74ed-443f-83a8-fb0aa131fa37", "DetectTime": "2024-05-21T12:52:28.735127+00:00", "EventTime": "2024-05-21T12:52:28.735145+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.134.25.43"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.134.25.43 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIIVde2mG0yYQG9nQ7"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "ce50fb9a-aace-4e19-b6ac-1f368a6533a0", "DetectTime": "2024-05-21T12:52:28.749833+00:00", "EventTime": "2024-05-21T12:52:28.749854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENNEj12XvAij44Xlc"], "accumulated_threat_level": 4.0, "timewindow": 178} +{"Format": "IDEA0", "ID": "3d77edd8-0317-4f17-bc86-ca9bcf3dab5d", "DetectTime": "2024-05-21T12:52:28.765351+00:00", "EventTime": "2024-05-21T12:52:28.765377+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.134.25.43"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.134.25.43 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIIVde2mG0yYQG9nQ7"], "accumulated_threat_level": 2.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "4e056d37-44a7-48a1-b418-dfd63aab19b6", "DetectTime": "2024-05-21T12:52:28.795180+00:00", "EventTime": "2024-05-21T12:52:28.795198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsugK20Unz2tROJHh"], "accumulated_threat_level": 4.8, "timewindow": 178} +{"Format": "IDEA0", "ID": "0712acf2-a128-493e-ac44-732757e1e123", "DetectTime": "2024-05-21T12:52:28.848692+00:00", "EventTime": "2024-05-21T12:52:28.848711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyrC7l4UxyuQTX53kf"], "accumulated_threat_level": 5.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "3c1e0d7a-30a7-430a-abce-5d7c7960928a", "DetectTime": "2024-05-21T12:52:28.883013+00:00", "EventTime": "2024-05-21T12:52:28.883033+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["201.240.108.7"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.240.108.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: XBL CBL Data, PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUK8TcVLBqSNXFc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "061fd937-8fa5-4e1a-a5a6-37bfc80e1347", "DetectTime": "2024-05-21T12:52:28.898733+00:00", "EventTime": "2024-05-21T12:52:28.898754+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["201.240.108.7"]}], "Attach": [{"Content": "connection to blacklisted IP: 201.240.108.7 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: XBL CBL Data, PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUsUK8TcVLBqSNXFc"], "accumulated_threat_level": 3.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d32fd669-7722-45bd-8afc-b4e5f32316dc", "DetectTime": "2024-05-21T12:52:29.113641+00:00", "EventTime": "2024-05-21T12:52:29.113662+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.134.36.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.134.36.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJerfG2HWwCeoxILZ"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "20fd35bf-9761-4077-8a61-e0bda24ee7ee", "DetectTime": "2024-05-21T12:52:29.128282+00:00", "EventTime": "2024-05-21T12:52:29.128302+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.134.36.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.134.36.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJerfG2HWwCeoxILZ"], "accumulated_threat_level": 3.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "16af0506-66c5-4ee7-ac52-40424044adbc", "DetectTime": "2024-05-21T12:52:29.134045+00:00", "EventTime": "2024-05-21T12:52:29.134065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTabVN2bzkNXLRXARh"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "91dff94b-a96e-46a6-97c3-914b21f4c642", "DetectTime": "2024-05-21T12:52:29.186240+00:00", "EventTime": "2024-05-21T12:52:29.186259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3An5UWOtavHaf7M4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 178} +{"Format": "IDEA0", "ID": "69614068-5284-45a3-99da-eaa1d4585536", "DetectTime": "2024-05-21T12:52:29.247292+00:00", "EventTime": "2024-05-21T12:52:29.247314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz2QoG1F5U8Dn7S4P2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "68545f9f-ba52-4ac4-836e-92a17e9c0319", "DetectTime": "2024-05-21T12:52:29.300306+00:00", "EventTime": "2024-05-21T12:52:29.300327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPV8r93XBhNfLx7vw1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "4f225e45-acd4-4ac8-85d1-17308439212a", "DetectTime": "2024-05-21T12:52:29.358037+00:00", "EventTime": "2024-05-21T12:52:29.358056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CryCKl4w3JnGBTHlXk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 178} +{"Format": "IDEA0", "ID": "5dffd22f-436d-4813-a5e9-fa6877d3f592", "DetectTime": "2024-05-21T12:52:29.411198+00:00", "EventTime": "2024-05-21T12:52:29.411220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Ew9A4G7mr2KjETjj"], "accumulated_threat_level": 9.6, "timewindow": 178} +{"Format": "IDEA0", "ID": "dc10f97d-22ea-4930-8fb9-aaf6a232fec9", "DetectTime": "2024-05-21T12:52:29.467432+00:00", "EventTime": "2024-05-21T12:52:29.467452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEieJ1ZIkKvYG53Yf"], "accumulated_threat_level": 10.4, "timewindow": 178} +{"Format": "IDEA0", "ID": "69ee12be-3f1a-4333-b306-5f52d56a5867", "DetectTime": "2024-05-21T12:52:29.723069+00:00", "EventTime": "2024-05-21T12:52:29.723091+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.143.72.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.143.72.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlOtBVA93ODcOPQk"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "92ae52e6-9921-4e40-a9ff-0cc8df582d13", "DetectTime": "2024-05-21T12:52:29.736073+00:00", "EventTime": "2024-05-21T12:52:29.736093+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.143.72.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.143.72.15 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlOtBVA93ODcOPQk"], "accumulated_threat_level": 4.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "accde8c3-4570-454f-b248-232686309a82", "DetectTime": "2024-05-21T12:52:29.748275+00:00", "EventTime": "2024-05-21T12:52:29.748295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSbyxO2owWL3evva03"], "accumulated_threat_level": 11.200000000000001, "timewindow": 178} +{"Format": "IDEA0", "ID": "4154811c-e0bc-484c-b25e-35964bd95835", "DetectTime": "2024-05-21T12:52:29.795648+00:00", "EventTime": "2024-05-21T12:52:29.795666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRnbg6nQJsPzFo2ji"], "accumulated_threat_level": 12.000000000000002, "timewindow": 178} +{"Format": "Json", "ID": "4154811c-e0bc-484c-b25e-35964bd95835", "DetectTime": "2024-05-21T12:52:29.795648+00:00", "EventTime": "2024-05-21T12:52:29.795666+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T09:58:34.193692+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 178. (real time 2024/05/21 12:52:30.022989)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 178, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c936c24c-6048-4c56-bb85-c36972ca2021", "DetectTime": "2024-05-21T12:52:30.036316+00:00", "EventTime": "2024-05-21T12:52:30.036336+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWh2Crd2aQ6na9XH7"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "7486cad5-a544-45ef-9108-b5c10297bfba", "DetectTime": "2024-05-21T12:52:30.050343+00:00", "EventTime": "2024-05-21T12:52:30.050363+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWh2Crd2aQ6na9XH7"], "accumulated_threat_level": 4.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "939a61fb-348a-4308-9cb3-b6a8df0166be", "DetectTime": "2024-05-21T12:52:30.063388+00:00", "EventTime": "2024-05-21T12:52:30.063408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhlgr3EZk2QjJml66"], "accumulated_threat_level": 0.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "1d8e7e61-54d3-49f8-a09f-d0725b9d2b1d", "DetectTime": "2024-05-21T12:52:30.074758+00:00", "EventTime": "2024-05-21T12:52:30.074786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB4hUNdzynvkMm5Pe"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "e95b3dbb-cede-4a30-8874-7c7ca5141930", "DetectTime": "2024-05-21T12:52:30.088025+00:00", "EventTime": "2024-05-21T12:52:30.088045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnuGsVnOCRSLzo724"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 179} +{"Format": "IDEA0", "ID": "8a1be55f-0f5d-4f69-9d28-b9bf4ff56b46", "DetectTime": "2024-05-21T12:52:30.110922+00:00", "EventTime": "2024-05-21T12:52:30.110940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdkpS3S0A4q3hFTx6"], "accumulated_threat_level": 3.2, "timewindow": 179} +{"Format": "IDEA0", "ID": "5b91bb1b-c1ba-4112-8c8f-bf1175137ddb", "DetectTime": "2024-05-21T12:52:30.123514+00:00", "EventTime": "2024-05-21T12:52:30.123533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cku5tN2NA5slzN9EZj"], "accumulated_threat_level": 4.0, "timewindow": 179} +{"Format": "IDEA0", "ID": "4a22f7b3-4069-46bd-a80c-8be481abcea7", "DetectTime": "2024-05-21T12:52:30.407811+00:00", "EventTime": "2024-05-21T12:52:30.407834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkfCoP2Qwgdlg8M9ek"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "b975665e-b05e-4a2f-ab57-4e546eaf068d", "DetectTime": "2024-05-21T12:52:30.420565+00:00", "EventTime": "2024-05-21T12:52:30.420586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYtQ42kmZyXwjDp4d"], "accumulated_threat_level": 4.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "709eabb9-58ec-41a8-9ae7-3e52282ce572", "DetectTime": "2024-05-21T12:52:30.434134+00:00", "EventTime": "2024-05-21T12:52:30.434152+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.62.100.247"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.62.100.247 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cznsij22kKKbuJskhh"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "9b4171d4-3315-4c75-b4ed-8a466e4ca893", "DetectTime": "2024-05-21T12:52:30.448962+00:00", "EventTime": "2024-05-21T12:52:30.448984+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.62.100.247"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.62.100.247 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cznsij22kKKbuJskhh"], "accumulated_threat_level": 5.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c3aecd4d-2bc9-44bf-97c8-fda110ccd78a", "DetectTime": "2024-05-21T12:52:30.500286+00:00", "EventTime": "2024-05-21T12:52:30.500305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6qWK1au3xKxkuMXh"], "accumulated_threat_level": 5.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "0d3e2650-e2b8-4326-bc47-472dfd30b06d", "DetectTime": "2024-05-21T12:52:30.554606+00:00", "EventTime": "2024-05-21T12:52:30.554628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvxA2VeSxBPptUKs5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 179} +{"Format": "IDEA0", "ID": "f411d1bf-b108-4c28-a122-9ef71b89919a", "DetectTime": "2024-05-21T12:52:30.567715+00:00", "EventTime": "2024-05-21T12:52:30.567733+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.139.188.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadUSH3i5lAcNa53J6"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "55dbd9a4-0167-4fec-9b00-ae2983b5118f", "DetectTime": "2024-05-21T12:52:30.582699+00:00", "EventTime": "2024-05-21T12:52:30.582721+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadUSH3i5lAcNa53J6"], "accumulated_threat_level": 5.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "fb62442c-cfc9-4fa5-a5af-69d298b0a91c", "DetectTime": "2024-05-21T12:52:30.608583+00:00", "EventTime": "2024-05-21T12:52:30.608604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYlbAz1U6jfkZq6Vb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "09bc4f0f-7fe1-446e-908e-9f890b2ba647", "DetectTime": "2024-05-21T12:52:30.658570+00:00", "EventTime": "2024-05-21T12:52:30.658589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgYnalQBdAotOwJd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "cba46df5-7cbf-4bf9-be63-de15e2dfa4c9", "DetectTime": "2024-05-21T12:52:30.694015+00:00", "EventTime": "2024-05-21T12:52:30.694038+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["62.178.136.244"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.178.136.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCNrRmCyAD21UNl4"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "1bcf238c-3040-4c78-951f-61a7b4473839", "DetectTime": "2024-05-21T12:52:30.709735+00:00", "EventTime": "2024-05-21T12:52:30.709756+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["62.178.136.244"]}], "Attach": [{"Content": "connection to blacklisted IP: 62.178.136.244 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjCNrRmCyAD21UNl4"], "accumulated_threat_level": 6.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d4a9ff88-9fa8-40e9-b786-5208d98577ad", "DetectTime": "2024-05-21T12:52:30.723241+00:00", "EventTime": "2024-05-21T12:52:30.723259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdhJI3hLmboA3Oqkh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "b07586c0-8a8e-4824-aa42-9150e30dbbef", "DetectTime": "2024-05-21T12:52:30.897248+00:00", "EventTime": "2024-05-21T12:52:30.897265+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["151.95.174.120"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.95.174.120 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYX2SK2o3hMLn20AC"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "9f1f0885-488f-464f-8688-8f10938f2204", "DetectTime": "2024-05-21T12:52:30.911273+00:00", "EventTime": "2024-05-21T12:52:30.911295+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["151.95.174.120"]}], "Attach": [{"Content": "connection to blacklisted IP: 151.95.174.120 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYX2SK2o3hMLn20AC"], "accumulated_threat_level": 6.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "4e7b8499-76b9-4cea-a3ab-97fdd5ce3330", "DetectTime": "2024-05-21T12:52:30.993089+00:00", "EventTime": "2024-05-21T12:52:30.993108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClIGevBL6vnW9NAD9"], "accumulated_threat_level": 9.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "6085d90a-43d9-4be1-aaf7-a79a5471426d", "DetectTime": "2024-05-21T12:52:31.040842+00:00", "EventTime": "2024-05-21T12:52:31.040860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyn741tI8Y14uOci5"], "accumulated_threat_level": 10.4, "timewindow": 179} +{"Format": "IDEA0", "ID": "0d38d238-63e1-4541-ada3-fa1ffb5c1c78", "DetectTime": "2024-05-21T12:52:31.054690+00:00", "EventTime": "2024-05-21T12:52:31.054710+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.132.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.132.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIL8w2DuNGG1bBKQ8"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "fe89d232-9d73-41a6-a7be-9437c8011932", "DetectTime": "2024-05-21T12:52:31.069216+00:00", "EventTime": "2024-05-21T12:52:31.069240+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.132.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.132.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDIL8w2DuNGG1bBKQ8"], "accumulated_threat_level": 7.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "4bf27c38-9a41-4769-918c-eeb4ca36b129", "DetectTime": "2024-05-21T12:52:31.096301+00:00", "EventTime": "2024-05-21T12:52:31.096321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMpnS1cxVXLz2hK1d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 179} +{"Format": "IDEA0", "ID": "6c66dc18-8ff3-4129-bb4b-7ba753eefb6a", "DetectTime": "2024-05-21T12:52:31.150255+00:00", "EventTime": "2024-05-21T12:52:31.150277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDp7u82GhbemwammM"], "accumulated_threat_level": 12.000000000000002, "timewindow": 179} +{"Format": "Json", "ID": "6c66dc18-8ff3-4129-bb4b-7ba753eefb6a", "DetectTime": "2024-05-21T12:52:31.150255+00:00", "EventTime": "2024-05-21T12:52:31.150277+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-08T10:18:08.098841+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2024/05/21 12:52:31.548562)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 179, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "bc6334c6-dd2a-4106-bca9-e3dd7553b290", "DetectTime": "2024-05-21T12:52:31.563897+00:00", "EventTime": "2024-05-21T12:52:31.563914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0tJt3gpnhh9hdvG7"], "accumulated_threat_level": 0.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "792e9483-110e-437e-ba61-60d02caf73c3", "DetectTime": "2024-05-21T12:52:31.580635+00:00", "EventTime": "2024-05-21T12:52:31.580654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvVaf1D3QD4lNc855"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "821983bd-3dcd-4a96-bcaf-f19bab3e086a", "DetectTime": "2024-05-21T12:52:31.585598+00:00", "EventTime": "2024-05-21T12:52:31.585616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctlh4b4aU20PkMVsk1"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "0341ab57-677e-4dbc-80a6-f8cb28370b52", "DetectTime": "2024-05-21T12:52:31.597410+00:00", "EventTime": "2024-05-21T12:52:31.597428+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["89.38.247.71"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.38.247.71 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAF3m2KWksQ2ymgHc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "7dcb4a73-98a0-499d-968a-51106e917d27", "DetectTime": "2024-05-21T12:52:31.609237+00:00", "EventTime": "2024-05-21T12:52:31.609255+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["89.38.247.71"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.38.247.71 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAF3m2KWksQ2ymgHc"], "accumulated_threat_level": 7.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "e79c40c7-f81c-48ee-8bb1-dc357c704962", "DetectTime": "2024-05-21T12:52:31.626059+00:00", "EventTime": "2024-05-21T12:52:31.626084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbOyV832S4ZsgLzgs5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 179} +{"Format": "IDEA0", "ID": "7ca26e5a-8f08-4be0-8b6a-37d24c211331", "DetectTime": "2024-05-21T12:52:31.637593+00:00", "EventTime": "2024-05-21T12:52:31.637618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSsLaGCMmV1VpmbWd"], "accumulated_threat_level": 3.2, "timewindow": 179} +{"Format": "IDEA0", "ID": "9d5e1cfc-eab8-4202-ac1e-0306094a6cf1", "DetectTime": "2024-05-21T12:52:31.651077+00:00", "EventTime": "2024-05-21T12:52:31.651098+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.54.0.76"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.54.0.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmRUhC1xOHNtDeQpBf"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c5cc1a33-07e1-46c1-8e25-be2f56cff9a2", "DetectTime": "2024-05-21T12:52:31.665937+00:00", "EventTime": "2024-05-21T12:52:31.665970+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.54.0.76"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.54.0.76 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmRUhC1xOHNtDeQpBf"], "accumulated_threat_level": 8.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "0d2bbd78-abd6-48d6-a7ad-e25e7724b228", "DetectTime": "2024-05-21T12:52:31.686397+00:00", "EventTime": "2024-05-21T12:52:31.686437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqy2Yi41wcTGK9woai"], "accumulated_threat_level": 4.0, "timewindow": 179} +{"Format": "IDEA0", "ID": "e2db370d-18b4-4569-848a-8542246ec579", "DetectTime": "2024-05-21T12:52:31.737832+00:00", "EventTime": "2024-05-21T12:52:31.737873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5aQw3mgaZNCm42x1"], "accumulated_threat_level": 4.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "d0a5daad-a291-470b-bb56-09768f568ee2", "DetectTime": "2024-05-21T12:52:31.790831+00:00", "EventTime": "2024-05-21T12:52:31.790873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNS1I13Sd6pL2uAcbh"], "accumulated_threat_level": 5.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "9f22bae7-1b46-4f2e-abc1-3c869d937b6c", "DetectTime": "2024-05-21T12:52:31.804154+00:00", "EventTime": "2024-05-21T12:52:31.804178+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.14.232.12"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.14.232.12 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cekq8LZlYdAQO8dIj"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "e11918b2-9a18-4df0-9eee-85ec005a3508", "DetectTime": "2024-05-21T12:52:31.818032+00:00", "EventTime": "2024-05-21T12:52:31.818067+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.14.232.12"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.14.232.12 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cekq8LZlYdAQO8dIj"], "accumulated_threat_level": 8.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "7783f2c8-0aa7-4ed2-a636-518d0d17b873", "DetectTime": "2024-05-21T12:52:31.842959+00:00", "EventTime": "2024-05-21T12:52:31.843002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHgljKrP9jAJ5F9k"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 179} +{"Format": "IDEA0", "ID": "9293bb56-8482-4544-808e-dd63f62ce0fc", "DetectTime": "2024-05-21T12:52:31.900929+00:00", "EventTime": "2024-05-21T12:52:31.900969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTF9xoYVQReTiKYa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "77380b89-9fd3-4b35-b176-d2911aab15e5", "DetectTime": "2024-05-21T12:52:32.093523+00:00", "EventTime": "2024-05-21T12:52:32.093542+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["88.229.208.221"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.229.208.221 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsgRCsxI9FcpSCGl"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "da54638e-1020-43a0-a766-cafdca786e17", "DetectTime": "2024-05-21T12:52:32.106165+00:00", "EventTime": "2024-05-21T12:52:32.106185+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["88.229.208.221"]}], "Attach": [{"Content": "connection to blacklisted IP: 88.229.208.221 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqsgRCsxI9FcpSCGl"], "accumulated_threat_level": 9.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "d1ccea1b-254f-458c-bea3-0b8871e63a16", "DetectTime": "2024-05-21T12:52:32.155854+00:00", "EventTime": "2024-05-21T12:52:32.155872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYrp711dL1mM2xjS1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "63acad89-b7e6-4cea-adfb-31c4a103cdaf", "DetectTime": "2024-05-21T12:52:32.204498+00:00", "EventTime": "2024-05-21T12:52:32.204517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeQkb2q6xRVAaTUm7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "1067b662-714c-442d-b764-cb7d956b18e0", "DetectTime": "2024-05-21T12:52:32.256233+00:00", "EventTime": "2024-05-21T12:52:32.256252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUeX8c1vidxVA1Pm6g"], "accumulated_threat_level": 9.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "db7769a6-62d8-4cab-b9aa-802c68705469", "DetectTime": "2024-05-21T12:52:32.289853+00:00", "EventTime": "2024-05-21T12:52:32.289870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["82.57.12.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.57.12.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJToj1N9njIXpxeq1"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "361c6ef7-852e-4676-9f23-774c9bec93ce", "DetectTime": "2024-05-21T12:52:32.301582+00:00", "EventTime": "2024-05-21T12:52:32.301601+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["82.57.12.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 82.57.12.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJToj1N9njIXpxeq1"], "accumulated_threat_level": 9.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "73aa239c-99db-4628-b5b5-bb0b60875292", "DetectTime": "2024-05-21T12:52:32.312840+00:00", "EventTime": "2024-05-21T12:52:32.312859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoNxO2tpc8rQiEzZ1"], "accumulated_threat_level": 10.4, "timewindow": 179} +{"Format": "IDEA0", "ID": "453161b0-98ae-4e8a-8bcb-ec884b18b9d8", "DetectTime": "2024-05-21T12:52:32.331645+00:00", "EventTime": "2024-05-21T12:52:32.331663+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["119.160.175.150"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 119.160.175.150 from 10.0.2.19. AS: UNN-BN Unified National Networks, BN AS10094 rDNS: 150-175.adsl.static.espeed.com.bn Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1aHl4ti1wV5x0s4i"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "6ac7933a-a7e1-41e7-b9cf-16533f14313d", "DetectTime": "2024-05-21T12:52:32.347147+00:00", "EventTime": "2024-05-21T12:52:32.347167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["119.160.175.150"]}], "Attach": [{"Content": "connection to blacklisted IP: 119.160.175.150 from 10.0.2.19. AS: UNN-BN Unified National Networks, BN AS10094 rDNS: 150-175.adsl.static.espeed.com.bn Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck1aHl4ti1wV5x0s4i"], "accumulated_threat_level": 10.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "9b4b3aa1-92ed-4ded-9e46-a0fda0c940e1", "DetectTime": "2024-05-21T12:52:32.361954+00:00", "EventTime": "2024-05-21T12:52:32.361990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWBGN1SBeja1YaUkb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 179} +{"Format": "IDEA0", "ID": "759b2e2d-1e85-4588-857e-190b087535bd", "DetectTime": "2024-05-21T12:52:32.412665+00:00", "EventTime": "2024-05-21T12:52:32.412702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYIQz4hQMAGJMvmG6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 179} +{"Format": "Json", "ID": "759b2e2d-1e85-4588-857e-190b087535bd", "DetectTime": "2024-05-21T12:52:32.412665+00:00", "EventTime": "2024-05-21T12:52:32.412702+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-08T10:18:11.510479+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2024/05/21 12:52:32.601388)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 179, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "868bc7cd-7313-4dba-9952-33b2a50f2cfb", "DetectTime": "2024-05-21T12:52:32.613777+00:00", "EventTime": "2024-05-21T12:52:32.613797+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.110.162.193"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.110.162.193 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQgU4M3uUsv24gAT0c"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "4f7fba3f-7186-4c9b-82b9-7950bf02b897", "DetectTime": "2024-05-21T12:52:32.627875+00:00", "EventTime": "2024-05-21T12:52:32.627914+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.110.162.193"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.110.162.193 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQgU4M3uUsv24gAT0c"], "accumulated_threat_level": 10.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "fdf790cd-bba3-43bd-bbd2-c6d91d92aad7", "DetectTime": "2024-05-21T12:52:32.641209+00:00", "EventTime": "2024-05-21T12:52:32.641250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWN8iBzQmzzgupKi"], "accumulated_threat_level": 0.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "226be2d1-7e19-4351-9101-1010ecabd1bc", "DetectTime": "2024-05-21T12:52:32.746427+00:00", "EventTime": "2024-05-21T12:52:32.746455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NO732FOhsLfjMJQf"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "b829a651-34ec-49fd-af83-0f6f82f42327", "DetectTime": "2024-05-21T12:52:32.796437+00:00", "EventTime": "2024-05-21T12:52:32.796470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZd2tz3JlLFb8Kbp99"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 179} +{"Format": "IDEA0", "ID": "479467a5-68be-4762-8783-e7c15af155f2", "DetectTime": "2024-05-21T12:52:32.819762+00:00", "EventTime": "2024-05-21T12:52:32.819783+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.101.27.15"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.101.27.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNz5wi1xMHAVQyNEoi"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "165eafc4-e6bc-4633-ba8f-c7792ce05f39", "DetectTime": "2024-05-21T12:52:32.833203+00:00", "EventTime": "2024-05-21T12:52:32.833231+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.101.27.15"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.101.27.15 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNz5wi1xMHAVQyNEoi"], "accumulated_threat_level": 11.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c37385ea-3ca7-4b29-af00-392ad90cc7cf", "DetectTime": "2024-05-21T12:52:32.851483+00:00", "EventTime": "2024-05-21T12:52:32.851516+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLM9q2WDexZNSVrGb"], "accumulated_threat_level": 3.2, "timewindow": 179} +{"Format": "IDEA0", "ID": "62015107-31e8-479a-97f2-1512dd78d7cb", "DetectTime": "2024-05-21T12:52:32.898315+00:00", "EventTime": "2024-05-21T12:52:32.898353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9jW3R3HebI8LHqG2"], "accumulated_threat_level": 4.0, "timewindow": 179} +{"Format": "IDEA0", "ID": "9c4c2537-2eeb-4182-a568-6f81a18c6ad9", "DetectTime": "2024-05-21T12:52:32.912942+00:00", "EventTime": "2024-05-21T12:52:32.912962+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.151.117.97"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.151.117.97 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgN0B7eiLcVBEFUrh"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "59a7ce04-68be-4918-9a88-c5d5f373de34", "DetectTime": "2024-05-21T12:52:32.926717+00:00", "EventTime": "2024-05-21T12:52:32.926741+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.151.117.97"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.151.117.97 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgN0B7eiLcVBEFUrh"], "accumulated_threat_level": 11.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "8a322ae2-ee52-451b-a54e-88b622bb3b0e", "DetectTime": "2024-05-21T12:52:32.938943+00:00", "EventTime": "2024-05-21T12:52:32.938965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4PKa840HQ1u05UJO7"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "705c2c98-9940-4452-85de-b7d6874a4fb8", "DetectTime": "2024-05-21T12:52:32.954649+00:00", "EventTime": "2024-05-21T12:52:32.954674+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["98.193.78.226"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.193.78.226 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-98-193-78-226.hsd1.il.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiCfy3d4hx1jMdz52"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "043e8cdd-e3b8-498c-b891-d8a20033cb84", "DetectTime": "2024-05-21T12:52:32.971231+00:00", "EventTime": "2024-05-21T12:52:32.971266+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.193.78.226"]}], "Attach": [{"Content": "connection to blacklisted IP: 98.193.78.226 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-98-193-78-226.hsd1.il.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZiCfy3d4hx1jMdz52"], "accumulated_threat_level": 12.0, "timewindow": 42} +{"Format": "Json", "ID": "043e8cdd-e3b8-498c-b891-d8a20033cb84", "DetectTime": "2024-05-21T12:52:32.971231+00:00", "EventTime": "2024-05-21T12:52:32.971266+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["98.193.78.226"]}], "Attach": [{"Content": "1970-01-02T17:29:50.322830+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 42. (real time 2024/05/21 12:52:33.438904)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 42, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "7941d7cd-03b3-4876-b12a-cc30689cbb77", "DetectTime": "2024-05-21T12:52:33.451690+00:00", "EventTime": "2024-05-21T12:52:33.451719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctsk0j3dZPPNI7Ugoi"], "accumulated_threat_level": 4.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "847be504-7219-45bb-8901-b839d42bd9f4", "DetectTime": "2024-05-21T12:52:33.476320+00:00", "EventTime": "2024-05-21T12:52:33.476351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1Cma38PRyGyPlqk7"], "accumulated_threat_level": 5.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "4952590c-daa8-40c3-a241-bb43d25d17e5", "DetectTime": "2024-05-21T12:52:33.489827+00:00", "EventTime": "2024-05-21T12:52:33.489848+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["89.65.185.173"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.65.185.173 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyowNA3GFhbMGXmE14"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "8369e97d-0e35-48c1-9dfe-22aeae73b4a4", "DetectTime": "2024-05-21T12:52:33.504741+00:00", "EventTime": "2024-05-21T12:52:33.504771+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["89.65.185.173"]}], "Attach": [{"Content": "connection to blacklisted IP: 89.65.185.173 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyowNA3GFhbMGXmE14"], "accumulated_threat_level": 0.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "e069caae-ffcf-45db-beef-8df8ef187004", "DetectTime": "2024-05-21T12:52:33.517991+00:00", "EventTime": "2024-05-21T12:52:33.518013+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.73.4.190"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.73.4.190 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRe2x1h9S6aTR6us1"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "19cde404-d7e6-44ed-9f05-edfced5caeff", "DetectTime": "2024-05-21T12:52:33.533154+00:00", "EventTime": "2024-05-21T12:52:33.533175+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.73.4.190"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.73.4.190 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRe2x1h9S6aTR6us1"], "accumulated_threat_level": 1.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "24da5cd1-d216-42c2-826f-d9c643d8bf1a", "DetectTime": "2024-05-21T12:52:33.544655+00:00", "EventTime": "2024-05-21T12:52:33.544676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4i9U63qcFdfltpiu7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 179} +{"Format": "IDEA0", "ID": "0a3c2566-86e6-40fa-bce2-6c77d582ffeb", "DetectTime": "2024-05-21T12:52:33.558418+00:00", "EventTime": "2024-05-21T12:52:33.558440+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.72.219.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAh0Kko4RyFKqi8Jb"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "39e33786-0092-4992-b70c-94ff029e0003", "DetectTime": "2024-05-21T12:52:33.572241+00:00", "EventTime": "2024-05-21T12:52:33.572264+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAh0Kko4RyFKqi8Jb"], "accumulated_threat_level": 1.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "0e3a00a4-24ce-4191-9826-7131a077d2c9", "DetectTime": "2024-05-21T12:52:33.585273+00:00", "EventTime": "2024-05-21T12:52:33.585297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLgfnb1qUbOGTFbDr2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "a3fb7fbe-b56c-4bf5-8291-cc4b046c8aea", "DetectTime": "2024-05-21T12:52:33.599299+00:00", "EventTime": "2024-05-21T12:52:33.599329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqPAGqgVG2XCSnO7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "168771b0-8e81-42b3-aed0-874054a524f6", "DetectTime": "2024-05-21T12:52:33.614005+00:00", "EventTime": "2024-05-21T12:52:33.614025+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["188.195.133.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.195.133.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzvqG2E32hjhiu6oc"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "acb4e1ac-1896-4b52-b04a-7fd9d9eada88", "DetectTime": "2024-05-21T12:52:33.629804+00:00", "EventTime": "2024-05-21T12:52:33.629830+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["188.195.133.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 188.195.133.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClzvqG2E32hjhiu6oc"], "accumulated_threat_level": 2.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "cc93cbaa-016f-4c96-a365-4f1b621ae206", "DetectTime": "2024-05-21T12:52:33.644482+00:00", "EventTime": "2024-05-21T12:52:33.644510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTKKO32UpMmA2Wn133"], "accumulated_threat_level": 8.799999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "a7e2c60d-9cfe-4b72-967d-6dd745430bc0", "DetectTime": "2024-05-21T12:52:33.658347+00:00", "EventTime": "2024-05-21T12:52:33.658374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDr3V42pWEYfj2bCU5"], "accumulated_threat_level": 9.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "05135583-202f-4414-8809-d04392b0e013", "DetectTime": "2024-05-21T12:52:33.671753+00:00", "EventTime": "2024-05-21T12:52:33.671780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIyb9z214Nwokk3aG9"], "accumulated_threat_level": 10.4, "timewindow": 179} +{"Format": "IDEA0", "ID": "924d1637-0789-4356-89be-bc9fb86aaa47", "DetectTime": "2024-05-21T12:52:33.684552+00:00", "EventTime": "2024-05-21T12:52:33.684575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3B261xAXgUlq1dBj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 179} +{"Format": "IDEA0", "ID": "fa284fc3-e157-4295-ad75-2be296958c8e", "DetectTime": "2024-05-21T12:52:33.761804+00:00", "EventTime": "2024-05-21T12:52:33.761826+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["84.228.253.216"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.228.253.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85mi230ZfanOrtfg1"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "066d68ad-d120-45b0-831d-ed19e7401cd4", "DetectTime": "2024-05-21T12:52:33.776006+00:00", "EventTime": "2024-05-21T12:52:33.776046+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["84.228.253.216"]}], "Attach": [{"Content": "connection to blacklisted IP: 84.228.253.216 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C85mi230ZfanOrtfg1"], "accumulated_threat_level": 2.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "060de85a-2fcf-4402-8d7c-c0bec8fab3bd", "DetectTime": "2024-05-21T12:52:33.890544+00:00", "EventTime": "2024-05-21T12:52:33.890565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.254.84.17"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEpou1hQO0fC2P35c"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "47d831b9-bd4f-46d3-bf49-607c5a38cbc9", "DetectTime": "2024-05-21T12:52:33.905702+00:00", "EventTime": "2024-05-21T12:52:33.905735+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEpou1hQO0fC2P35c"], "accumulated_threat_level": 3.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "ddb93038-3116-47c6-b8bf-17686b3294b0", "DetectTime": "2024-05-21T12:52:33.920852+00:00", "EventTime": "2024-05-21T12:52:33.920886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCglJJ1wNaOhmaeVwd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 179} +{"Format": "Json", "ID": "ddb93038-3116-47c6-b8bf-17686b3294b0", "DetectTime": "2024-05-21T12:52:33.920852+00:00", "EventTime": "2024-05-21T12:52:33.920886+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T10:48:19.759972+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2024/05/21 12:52:34.110594)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 179, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c9c15612-1eaf-4b2f-adba-5e531e7466e8", "DetectTime": "2024-05-21T12:52:34.123959+00:00", "EventTime": "2024-05-21T12:52:34.123978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jbbDzCdh6MM7vLj"], "accumulated_threat_level": 0.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "d75f0599-f7ac-4f2f-97ff-6c615b586fbb", "DetectTime": "2024-05-21T12:52:34.140991+00:00", "EventTime": "2024-05-21T12:52:34.141008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoCqG22NmEWyCO27f5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "e5780114-e4ff-4c8f-805c-6481027587c3", "DetectTime": "2024-05-21T12:52:34.155442+00:00", "EventTime": "2024-05-21T12:52:34.155460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVFea3h0kzlorfSi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 179} +{"Format": "IDEA0", "ID": "ff41f0d7-dcdc-49eb-8252-fc345c9484d9", "DetectTime": "2024-05-21T12:52:34.166956+00:00", "EventTime": "2024-05-21T12:52:34.166974+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.218.94.160"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.218.94.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9XX5ha8nxGMaDja"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "42e0dacc-84fb-4e27-baa0-55b090713a57", "DetectTime": "2024-05-21T12:52:34.178207+00:00", "EventTime": "2024-05-21T12:52:34.178225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.218.94.160"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.218.94.160 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9XX5ha8nxGMaDja"], "accumulated_threat_level": 3.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "9aafa138-a155-40f2-a349-c5d808ee9ed8", "DetectTime": "2024-05-21T12:52:34.192938+00:00", "EventTime": "2024-05-21T12:52:34.192957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtrRAZbwbGMqbq1ih"], "accumulated_threat_level": 3.2, "timewindow": 179} +{"Format": "IDEA0", "ID": "33afc0e7-632e-46b0-a460-8874effdf8c4", "DetectTime": "2024-05-21T12:52:34.206147+00:00", "EventTime": "2024-05-21T12:52:34.206165+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.140.158.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA974A35GHteQa1Kge"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "e123ba73-519c-41b6-828d-cf79d20363e2", "DetectTime": "2024-05-21T12:52:34.219143+00:00", "EventTime": "2024-05-21T12:52:34.219162+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA974A35GHteQa1Kge"], "accumulated_threat_level": 4.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "99f694c4-8276-4220-8a35-f195d1c0afcf", "DetectTime": "2024-05-21T12:52:34.230638+00:00", "EventTime": "2024-05-21T12:52:34.230657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLroE83dAmwAZkEdR5"], "accumulated_threat_level": 4.0, "timewindow": 179} +{"Format": "IDEA0", "ID": "bac257cd-9efc-411a-bc7e-34d2e9a0c04a", "DetectTime": "2024-05-21T12:52:34.237397+00:00", "EventTime": "2024-05-21T12:52:34.237418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Nd7y4W4ea3CQIzye"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "4d02eed0-ec43-4f42-81ef-1d9d89558d34", "DetectTime": "2024-05-21T12:52:34.475660+00:00", "EventTime": "2024-05-21T12:52:34.475681+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["112.210.35.208"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.210.35.208 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnoB32bJI8aPpPZxk"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "569f6e99-de26-4fa2-b8cf-2e6b1bb18bd3", "DetectTime": "2024-05-21T12:52:34.493113+00:00", "EventTime": "2024-05-21T12:52:34.493147+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["112.210.35.208"]}], "Attach": [{"Content": "connection to blacklisted IP: 112.210.35.208 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWnoB32bJI8aPpPZxk"], "accumulated_threat_level": 4.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "533a6921-de65-4fd6-92b2-0204bd82d153", "DetectTime": "2024-05-21T12:52:34.507099+00:00", "EventTime": "2024-05-21T12:52:34.507136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKRr32KAUFWTgIcF5"], "accumulated_threat_level": 4.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "8492336b-3933-48f0-9cdd-e44a00fe3e63", "DetectTime": "2024-05-21T12:52:34.552776+00:00", "EventTime": "2024-05-21T12:52:34.552814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMi4s1jK49iHTCH23"], "accumulated_threat_level": 5.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "caa14739-5e8d-4fa3-9eaf-d22b12049a52", "DetectTime": "2024-05-21T12:52:34.594644+00:00", "EventTime": "2024-05-21T12:52:34.594667+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.70.165.37"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.70.165.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL5Kln4q4KgkAoHOe6"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "c4d7c4e5-3eb1-46c3-b168-e6af2d695a92", "DetectTime": "2024-05-21T12:52:34.609639+00:00", "EventTime": "2024-05-21T12:52:34.609673+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.70.165.37"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.70.165.37 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL5Kln4q4KgkAoHOe6"], "accumulated_threat_level": 5.0, "timewindow": 42} +{"Format": "IDEA0", "ID": "1b125149-02bd-4e6e-af10-833da339cffc", "DetectTime": "2024-05-21T12:52:34.623971+00:00", "EventTime": "2024-05-21T12:52:34.624006+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPj6TJED5oAxZLM2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 179} +{"Format": "IDEA0", "ID": "24096b18-b278-4bd2-abe9-000f86f679f6", "DetectTime": "2024-05-21T12:52:34.636672+00:00", "EventTime": "2024-05-21T12:52:34.636696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61b0d19uEnCIBVFdj"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "81816080-7d6e-4352-9857-838f0c01783a", "DetectTime": "2024-05-21T12:52:34.683524+00:00", "EventTime": "2024-05-21T12:52:34.683560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3AwUmgma4J18WPBe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "ebfd653a-e9f7-4d67-951b-d762688bccbb", "DetectTime": "2024-05-21T12:52:34.713588+00:00", "EventTime": "2024-05-21T12:52:34.713609+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["75.185.232.67"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 75.185.232.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBlls2tMJBpeY3Ty2"], "accumulated_threat_level": 0, "timewindow": 42} +{"Format": "IDEA0", "ID": "f424fddc-a9f2-4089-8a5d-2c229c1182af", "DetectTime": "2024-05-21T12:52:34.727903+00:00", "EventTime": "2024-05-21T12:52:34.727934+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["75.185.232.67"]}], "Attach": [{"Content": "connection to blacklisted IP: 75.185.232.67 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBlls2tMJBpeY3Ty2"], "accumulated_threat_level": 5.5, "timewindow": 42} +{"Format": "IDEA0", "ID": "88e498c3-cbea-4009-bf2c-6d752605576a", "DetectTime": "2024-05-21T12:52:34.733706+00:00", "EventTime": "2024-05-21T12:52:34.733727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPECav1Imp2SsCw6Qa"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "3b7ab336-8172-41ca-85ac-740031e27903", "DetectTime": "2024-05-21T12:52:34.782441+00:00", "EventTime": "2024-05-21T12:52:34.782471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1PfaTF3qf9zP6m3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "49896a6f-d77c-46a9-9016-981a54335a79", "DetectTime": "2024-05-21T12:52:35.051598+00:00", "EventTime": "2024-05-21T12:52:35.051618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci9tsz1UYPRVWtshZe"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "587c92b2-48e6-4e2b-92bd-10a494e87675", "DetectTime": "2024-05-21T12:52:35.105658+00:00", "EventTime": "2024-05-21T12:52:35.105680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEVWE426rNXCFIfwT5"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "62694c12-db9e-4d20-8af8-335ee5300fca", "DetectTime": "2024-05-21T12:52:35.119541+00:00", "EventTime": "2024-05-21T12:52:35.119564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCGzH31WwS9d6Sgq9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 179} +{"Format": "IDEA0", "ID": "1ae7c8d7-f397-45fd-bc80-e7646037d592", "DetectTime": "2024-05-21T12:52:35.148862+00:00", "EventTime": "2024-05-21T12:52:35.148884+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4iXPJ2CbcN2KmiED2"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "e6ef011c-9c3a-4cef-a007-74736893b0e8", "DetectTime": "2024-05-21T12:52:35.296816+00:00", "EventTime": "2024-05-21T12:52:35.296838+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6H3km2PLPWnAkKC7a"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "278bc808-8978-4334-8eba-deb1a67b0cc8", "DetectTime": "2024-05-21T12:52:35.336938+00:00", "EventTime": "2024-05-21T12:52:35.336958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEZaFSq5b4N7oJzc"], "accumulated_threat_level": 9.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "395a5ac7-b59e-4f09-9850-a7de4b39d263", "DetectTime": "2024-05-21T12:52:35.379137+00:00", "EventTime": "2024-05-21T12:52:35.379165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc8FXE3sFSNyJBm62g"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "e08151b5-cd2d-4759-adae-86f3adfff2b4", "DetectTime": "2024-05-21T12:52:35.387940+00:00", "EventTime": "2024-05-21T12:52:35.387959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0FjZk4NCo5lDaoz76"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "5129a5a1-6092-4b77-b858-1526a4e2d7df", "DetectTime": "2024-05-21T12:52:35.677976+00:00", "EventTime": "2024-05-21T12:52:35.678001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cTZM0NBCo7UHo13"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "98692d30-9eeb-415c-afd8-30a5e6a1688b", "DetectTime": "2024-05-21T12:52:35.732360+00:00", "EventTime": "2024-05-21T12:52:35.732383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPJd904Ze1894h6KRc"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "a137d90f-bcf2-4b47-92ef-f12c6217ab44", "DetectTime": "2024-05-21T12:52:35.743400+00:00", "EventTime": "2024-05-21T12:52:35.743420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5NlT2Y4z6tnrZmac"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "1895cef7-f8ba-4057-8b87-b78ec462fd86", "DetectTime": "2024-05-21T12:52:35.789289+00:00", "EventTime": "2024-05-21T12:52:35.789323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTCjMH1vh56kgeDnX5"], "accumulated_threat_level": 10.4, "timewindow": 179} +{"Format": "IDEA0", "ID": "feda8064-5ecc-4944-9986-2037c478197c", "DetectTime": "2024-05-21T12:52:35.794399+00:00", "EventTime": "2024-05-21T12:52:35.794435+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV4nqF4ZIlmPHtSba"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "f9f38017-5d47-40bc-bce7-9b268a9d6a36", "DetectTime": "2024-05-21T12:52:35.912935+00:00", "EventTime": "2024-05-21T12:52:35.912958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAYrRi2sFabG1p1Xta"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "9549779a-ff61-4d95-a79a-399f3a857d81", "DetectTime": "2024-05-21T12:52:35.917823+00:00", "EventTime": "2024-05-21T12:52:35.917843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3LzEZg5Vse4VACl"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "1b44bbc1-5c71-49a5-8105-6ebbaccc17d2", "DetectTime": "2024-05-21T12:52:36.190206+00:00", "EventTime": "2024-05-21T12:52:36.190226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CalTSG1FB6GSKkCUwk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 179} +{"Format": "IDEA0", "ID": "8a676957-8e3a-421e-9d62-3e53f345698c", "DetectTime": "2024-05-21T12:52:36.209118+00:00", "EventTime": "2024-05-21T12:52:36.209142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjF7lZ1iUoSusjSmQ8"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "f8e3755b-1f84-423e-ba85-e61f0c18217f", "DetectTime": "2024-05-21T12:52:36.358955+00:00", "EventTime": "2024-05-21T12:52:36.358975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsMhMi3tyRNP29loIg"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "cb197975-9dbe-48cd-8299-7b25735cc934", "DetectTime": "2024-05-21T12:52:36.372349+00:00", "EventTime": "2024-05-21T12:52:36.372382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6u1l3LM9NKyqf6R2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 179} +{"Format": "Json", "ID": "cb197975-9dbe-48cd-8299-7b25735cc934", "DetectTime": "2024-05-21T12:52:36.372349+00:00", "EventTime": "2024-05-21T12:52:36.372382+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-08T10:48:25.267234+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 179. (real time 2024/05/21 12:52:36.607336)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 179, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a0e73bfd-591b-4bdc-9d8e-5a2f264999a4", "DetectTime": "2024-05-21T12:52:36.611400+00:00", "EventTime": "2024-05-21T12:52:36.611419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLEA3v144Gg5POlHC6"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "4d97929d-d3ec-4fe4-8b63-adc9da61cc34", "DetectTime": "2024-05-21T12:52:36.616176+00:00", "EventTime": "2024-05-21T12:52:36.616194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPyQww2Fp4P2e0RCL9"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "11a00104-4cd2-41be-86e3-08f45c1ed565", "DetectTime": "2024-05-21T12:52:36.620675+00:00", "EventTime": "2024-05-21T12:52:36.620694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYLaz9bO9CtdO7Hd"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "43d7bfdc-0e9e-4b7d-bb7c-815746a1976b", "DetectTime": "2024-05-21T12:52:36.634845+00:00", "EventTime": "2024-05-21T12:52:36.634870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvelVi2BFESlGYuw74"], "accumulated_threat_level": 0.8, "timewindow": 179} +{"Format": "IDEA0", "ID": "3d165594-9716-44f6-9fd3-ff9920d74159", "DetectTime": "2024-05-21T12:52:36.795200+00:00", "EventTime": "2024-05-21T12:52:36.795227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNILv28kYibWvKK2c"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "51f969c1-89d8-4d08-b4e3-548db2beffb3", "DetectTime": "2024-05-21T12:52:36.940282+00:00", "EventTime": "2024-05-21T12:52:36.940307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqjM653OiibrrBbtli"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "d71ccfa4-9d57-4b91-83ff-43523968fcd4", "DetectTime": "2024-05-21T12:52:36.945589+00:00", "EventTime": "2024-05-21T12:52:36.945607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COsbSL3U57t5rrTwI4"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "6379b047-4e91-489c-8730-8bc54cbe7238", "DetectTime": "2024-05-21T12:52:36.950149+00:00", "EventTime": "2024-05-21T12:52:36.950167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1G7Re2gGf044uM1i"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "1ca0e80d-56e1-4bf1-99d0-1df0c3b55316", "DetectTime": "2024-05-21T12:52:37.312270+00:00", "EventTime": "2024-05-21T12:52:37.312290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbwpp6qXtgqF0tqL4"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "b82e3172-fedf-4c91-9c2f-5423088d3aaf", "DetectTime": "2024-05-21T12:52:37.337752+00:00", "EventTime": "2024-05-21T12:52:37.337772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWTqjn1UrXYTpYoObf"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "ae782f03-7454-4821-a30b-e9f71c5ea187", "DetectTime": "2024-05-21T12:52:37.355006+00:00", "EventTime": "2024-05-21T12:52:37.355027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBXB9n2gamyD9UkIyf"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "6fa6c4c3-f348-44da-8676-bc8e08e8f32a", "DetectTime": "2024-05-21T12:52:37.360887+00:00", "EventTime": "2024-05-21T12:52:37.360907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpSdkvG2LHzKzfZ3"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "cb5841ba-cf21-42b1-ac9d-601f697968cf", "DetectTime": "2024-05-21T12:52:37.366191+00:00", "EventTime": "2024-05-21T12:52:37.366210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJrJvf1uVFqFYPJu48"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "f440df41-2b25-4157-aacc-8bf2572a4b55", "DetectTime": "2024-05-21T12:52:37.370792+00:00", "EventTime": "2024-05-21T12:52:37.370810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF3mXu3wCh40QrmHn"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "bc95502e-a71f-4f45-b5c0-7e00b22d4fac", "DetectTime": "2024-05-21T12:52:37.376133+00:00", "EventTime": "2024-05-21T12:52:37.376168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRF2PybmEixN1Gznc"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "3e98541e-bb1e-48aa-ae5d-86ebb3c8f29e", "DetectTime": "2024-05-21T12:52:37.963512+00:00", "EventTime": "2024-05-21T12:52:37.963536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct9qQ4331vlETFvXOl"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "6507889a-fdae-4144-8124-f4a4c584498a", "DetectTime": "2024-05-21T12:52:37.990881+00:00", "EventTime": "2024-05-21T12:52:37.990905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoW1WS1fDuKqiU0qdl"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "a1d586e8-2ec3-4949-b5f0-bdc57a39c961", "DetectTime": "2024-05-21T12:52:37.998956+00:00", "EventTime": "2024-05-21T12:52:37.998978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN2vWW3RmMcSUiRYec"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "47d6dc4e-3119-4940-9a01-3b18adaed807", "DetectTime": "2024-05-21T12:52:38.034102+00:00", "EventTime": "2024-05-21T12:52:38.034134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCKGUP3Utb71HHkbpb"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "68741932-13ac-4c41-8484-a118670f67c1", "DetectTime": "2024-05-21T12:52:38.066508+00:00", "EventTime": "2024-05-21T12:52:38.066533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgndfk4UqROrqNISR9"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "8d1d36c4-56c0-4e49-8ad7-1d56b9722e4e", "DetectTime": "2024-05-21T12:52:38.214419+00:00", "EventTime": "2024-05-21T12:52:38.214445+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyIipX1w1ishF77Qul"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "80eec617-a39b-4056-8458-9edb987d0ac5", "DetectTime": "2024-05-21T12:52:38.455017+00:00", "EventTime": "2024-05-21T12:52:38.455038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2DPOK1Vsm3jdttQVc"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "4e75ef14-d6aa-4f8f-a6f3-6f0e9c1c06c8", "DetectTime": "2024-05-21T12:52:38.479641+00:00", "EventTime": "2024-05-21T12:52:38.479662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwiWNQ1FNRoo2L3nT"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "a1db7507-858e-42c1-a54d-0182955c4ed9", "DetectTime": "2024-05-21T12:52:38.547301+00:00", "EventTime": "2024-05-21T12:52:38.547335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CITa4Y2nbuGqScTDeh"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "a63c9dfc-c91a-48aa-9583-56313c49e803", "DetectTime": "2024-05-21T12:52:38.670242+00:00", "EventTime": "2024-05-21T12:52:38.670264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJM2ig4d4SiWnsUT0i"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "d3c933a6-8d42-4312-b4a3-3b120f5e0336", "DetectTime": "2024-05-21T12:52:38.724550+00:00", "EventTime": "2024-05-21T12:52:38.724570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqBUse4LzzLWIRcvp9"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "0a5b4a51-fbef-4e03-a53a-5cc1d43f5bc0", "DetectTime": "2024-05-21T12:52:38.732761+00:00", "EventTime": "2024-05-21T12:52:38.732784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFc77Wd0A1sUoEFbh"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "158a595c-126d-46c8-a8de-fa8c6a221642", "DetectTime": "2024-05-21T12:52:38.756881+00:00", "EventTime": "2024-05-21T12:52:38.756903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkO2wk1UNuAFi17E7h"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "0fe8924a-1957-45f3-bacd-171cd6835815", "DetectTime": "2024-05-21T12:52:39.045620+00:00", "EventTime": "2024-05-21T12:52:39.045652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFCTv4eSUqdfvbpi7"], "accumulated_threat_level": 1.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "5f586787-b1ab-4d0e-a9a3-e486fbe79507", "DetectTime": "2024-05-21T12:52:39.051515+00:00", "EventTime": "2024-05-21T12:52:39.051536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoVrHx1mDHYkGkhcBa"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "be1b3401-6c03-4bce-a5a4-8025545037ca", "DetectTime": "2024-05-21T12:52:39.176132+00:00", "EventTime": "2024-05-21T12:52:39.176154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnxMwM2G2hVcdXbSNj"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "7c77e616-c12d-426b-a123-687973f08f88", "DetectTime": "2024-05-21T12:52:39.181710+00:00", "EventTime": "2024-05-21T12:52:39.181729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCCmp4g65uZ6NN6w2"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "f857bd3b-971a-4813-ae53-e01542ef0dbe", "DetectTime": "2024-05-21T12:52:39.187684+00:00", "EventTime": "2024-05-21T12:52:39.187704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXJPD2gIp9gxG9HEi"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "0e6a9993-002f-4a3b-969f-b85ef9803955", "DetectTime": "2024-05-21T12:52:39.192663+00:00", "EventTime": "2024-05-21T12:52:39.192688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1yLZ2OOFjMEpdpog"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "d4901835-3be8-4ffc-8e64-4df8ede70a0f", "DetectTime": "2024-05-21T12:52:39.207867+00:00", "EventTime": "2024-05-21T12:52:39.207890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmYol4jdp6UKeHrrg"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "ece11e6d-5cab-445c-a333-825ca09692c3", "DetectTime": "2024-05-21T12:52:39.613780+00:00", "EventTime": "2024-05-21T12:52:39.613804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXJxi42g5E9hJhzGb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 180} +{"Format": "IDEA0", "ID": "04647754-cbcb-4eaa-9555-9452b396d0ae", "DetectTime": "2024-05-21T12:52:39.702167+00:00", "EventTime": "2024-05-21T12:52:39.702190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZfchg2y3aYwGkglze"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "c2ecc425-8f7e-4ed0-95f0-8c73f3245fae", "DetectTime": "2024-05-21T12:52:39.788699+00:00", "EventTime": "2024-05-21T12:52:39.788719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuVrUX2q3COLTFZh06"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "a82037e3-4909-43b5-af20-de016db673a0", "DetectTime": "2024-05-21T12:52:39.794220+00:00", "EventTime": "2024-05-21T12:52:39.794239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQarR3iYYWZIMmSgh"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "4f4279ee-9fe6-43e6-a8b2-d024a92abaea", "DetectTime": "2024-05-21T12:52:39.825028+00:00", "EventTime": "2024-05-21T12:52:39.825050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvbez3eEVp2YEMHnb"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "698335c5-2220-43db-a865-f73c9b7d6e69", "DetectTime": "2024-05-21T12:52:39.849335+00:00", "EventTime": "2024-05-21T12:52:39.849357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIo9z9sUosObN6ms8"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "fd3220c9-a9d1-4eb6-90cc-4afe1b6e170f", "DetectTime": "2024-05-21T12:52:39.853382+00:00", "EventTime": "2024-05-21T12:52:39.853402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI3GKW1O0yySLm0Ulf"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "35f3694c-e466-4399-a8cf-a64feeafe4a6", "DetectTime": "2024-05-21T12:52:40.148140+00:00", "EventTime": "2024-05-21T12:52:40.148161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1fysI1FY4KHUwd5eb"], "accumulated_threat_level": 1.6, "timewindow": 177} +{"Format": "IDEA0", "ID": "954b12f9-3bc0-4e29-b9f8-1685f2a46047", "DetectTime": "2024-05-21T12:52:40.300780+00:00", "EventTime": "2024-05-21T12:52:40.300801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTnGsxMnvDO19qvp"], "accumulated_threat_level": 3.2, "timewindow": 180} +{"Format": "IDEA0", "ID": "d31ddcb9-6c84-48c5-8fe4-a80b21b89ce3", "DetectTime": "2024-05-21T12:52:40.330942+00:00", "EventTime": "2024-05-21T12:52:40.330962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEOFXC4TMucCdtma6d"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "39831a5d-f952-48e8-8351-dc7c0a0d1a5e", "DetectTime": "2024-05-21T12:52:40.336651+00:00", "EventTime": "2024-05-21T12:52:40.336670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCE4dx2lto6ekaRAz7"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "7ae6336a-ac21-42ce-86ae-b3fa4a6ae47a", "DetectTime": "2024-05-21T12:52:40.377128+00:00", "EventTime": "2024-05-21T12:52:40.377151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnA3Nr43hZXDsoXlJc"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "4e48253c-2e21-48b9-a7d8-f276ff45e464", "DetectTime": "2024-05-21T12:52:40.382236+00:00", "EventTime": "2024-05-21T12:52:40.382255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIarxJ283D6wkNWda"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "5e6131fe-6252-4aaa-ba4f-e79e546f19c3", "DetectTime": "2024-05-21T12:52:40.387144+00:00", "EventTime": "2024-05-21T12:52:40.387162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COug6g26zepddJSmTh"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "7aa91028-c5f1-41f3-9a3d-647361def104", "DetectTime": "2024-05-21T12:52:40.411161+00:00", "EventTime": "2024-05-21T12:52:40.411185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb1YAl3VIeA6WJf5p7"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "364ada46-e21c-4ad2-b920-071d3c91b22e", "DetectTime": "2024-05-21T12:52:40.423919+00:00", "EventTime": "2024-05-21T12:52:40.423941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJovuf1cNFf7DrKv58"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "164db620-4739-4167-945c-e18fd4f2922f", "DetectTime": "2024-05-21T12:52:40.956350+00:00", "EventTime": "2024-05-21T12:52:40.956370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2p2o4RkNP4X4oSe4"], "accumulated_threat_level": 4.0, "timewindow": 180} +{"Format": "IDEA0", "ID": "e4d0fc1d-77c0-4583-ad95-bf8bdc2262cd", "DetectTime": "2024-05-21T12:52:41.030513+00:00", "EventTime": "2024-05-21T12:52:41.030537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCK2jV3PHyjRjvZUIg"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "af3c1ab3-75c9-4b7d-94ae-3f2633556488", "DetectTime": "2024-05-21T12:52:41.036699+00:00", "EventTime": "2024-05-21T12:52:41.036718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4DJ9o4yzkK8TWVQXk"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "d7bed9e8-9e20-4795-8777-0792fabf4d9f", "DetectTime": "2024-05-21T12:52:41.086558+00:00", "EventTime": "2024-05-21T12:52:41.086581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClEd6HruAIt4PMceb"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "823bbfe2-ebe2-4a89-87bd-ccf51fd2514b", "DetectTime": "2024-05-21T12:52:41.354144+00:00", "EventTime": "2024-05-21T12:52:41.354166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkFBDT2ANx4KrIbjW9"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "3f1bf9f3-73fe-4fc5-a52e-b92b1928054f", "DetectTime": "2024-05-21T12:52:41.368535+00:00", "EventTime": "2024-05-21T12:52:41.368557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9HD2P21WZ998MM3ti"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "e76b560e-8eeb-4fee-bb7d-cd927f8c6a95", "DetectTime": "2024-05-21T12:52:41.466018+00:00", "EventTime": "2024-05-21T12:52:41.466040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FF4A1OyDY9cM44Pg"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "9cf41f63-384c-4146-bb86-a7a62f0968b1", "DetectTime": "2024-05-21T12:52:41.649838+00:00", "EventTime": "2024-05-21T12:52:41.649861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6v6NhzRR4b9oSxe1"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "340dfefb-c2aa-4846-870f-947a82d86336", "DetectTime": "2024-05-21T12:52:41.666659+00:00", "EventTime": "2024-05-21T12:52:41.666681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfmvn2dDcbIR8r36d"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "8e48e1ce-3261-4c54-ba5e-a42d0aaf91fd", "DetectTime": "2024-05-21T12:52:41.671842+00:00", "EventTime": "2024-05-21T12:52:41.671864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COWu3k3PrZtkijcKEg"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "8479b1f8-3dc5-4258-903d-63690543a075", "DetectTime": "2024-05-21T12:52:41.676457+00:00", "EventTime": "2024-05-21T12:52:41.676475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXt193zilsk5wfZZ"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "7613c879-0121-40ea-a476-e6fbc7a98d7c", "DetectTime": "2024-05-21T12:52:41.703355+00:00", "EventTime": "2024-05-21T12:52:41.703377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjeBFqsictjMtHodi"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "38379449-c7a7-4b3d-aa88-7a9ac51f26f1", "DetectTime": "2024-05-21T12:52:41.721373+00:00", "EventTime": "2024-05-21T12:52:41.721394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Sdyt373xGMlAS1Nj"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "33956143-5df1-44f8-9bc2-90fade6b9f98", "DetectTime": "2024-05-21T12:52:42.191674+00:00", "EventTime": "2024-05-21T12:52:42.191692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEuJ5h1wVCubpazjE9"], "accumulated_threat_level": 4.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "ce234c00-3066-48cc-b1d3-e508c9b29111", "DetectTime": "2024-05-21T12:52:42.196918+00:00", "EventTime": "2024-05-21T12:52:42.196940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKxFnk1hA5vWY0oh21"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "b726127f-c764-4ef6-954b-580bd5af8402", "DetectTime": "2024-05-21T12:52:42.203015+00:00", "EventTime": "2024-05-21T12:52:42.203037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQI9Aj3JVoX6vzfMuh"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "2617ae21-738d-424d-97d6-3a2ba1345e63", "DetectTime": "2024-05-21T12:52:42.208767+00:00", "EventTime": "2024-05-21T12:52:42.208787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEIeUT2eTwozmqlalk"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "ed0a76ff-6cd1-43a0-851e-6aeb81b56957", "DetectTime": "2024-05-21T12:52:42.243414+00:00", "EventTime": "2024-05-21T12:52:42.243434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cimbrg1kHf6m2mAEu"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "f0b88ab4-e06f-4405-86b3-624aad7238fc", "DetectTime": "2024-05-21T12:52:42.621911+00:00", "EventTime": "2024-05-21T12:52:42.621932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHvYcb1LNCcAljta4j"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "a25067ba-0575-4062-9d9a-d3e488914c28", "DetectTime": "2024-05-21T12:52:42.773223+00:00", "EventTime": "2024-05-21T12:52:42.773246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cohn0b3t0FP945gAnf"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "ae6dae0a-5406-4208-a2ee-2aaa1066aa5e", "DetectTime": "2024-05-21T12:52:42.818052+00:00", "EventTime": "2024-05-21T12:52:42.818073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy7lpu4jqb3R8Ir0Qi"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "0bf7104a-4491-4bc8-acc3-4e0d68583713", "DetectTime": "2024-05-21T12:52:42.833288+00:00", "EventTime": "2024-05-21T12:52:42.833314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 113.108.254.151 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6vvvb21SDOdlw5Sa8"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "3b2d6318-4a0a-40b0-a956-f4faf8b835cf", "DetectTime": "2024-05-21T12:52:42.839322+00:00", "EventTime": "2024-05-21T12:52:42.839342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbQyGc19DXQl3kCg43"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "658e5522-3000-4ac2-b354-258855a48436", "DetectTime": "2024-05-21T12:52:42.844126+00:00", "EventTime": "2024-05-21T12:52:42.844144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xDfx36JVsO8N5xlj"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "6428c583-cf47-4e6a-b7fe-c47ba9b735fe", "DetectTime": "2024-05-21T12:52:42.849775+00:00", "EventTime": "2024-05-21T12:52:42.849793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL79Xk1tUs6c2sx00b"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "b28ca1c6-323d-41c0-ae7c-6536404e76b7", "DetectTime": "2024-05-21T12:52:42.864069+00:00", "EventTime": "2024-05-21T12:52:42.864091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvfrN64BJjLvgBrjk3"], "accumulated_threat_level": 5.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "96c48d38-3af4-4653-8843-d77bf9aff6ac", "DetectTime": "2024-05-21T12:52:42.872689+00:00", "EventTime": "2024-05-21T12:52:42.872715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22ewCMRZxzcmFkQ5"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "42b98991-1e41-441e-8449-facd58e75206", "DetectTime": "2024-05-21T12:52:42.878271+00:00", "EventTime": "2024-05-21T12:52:42.878295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7oCT150vfDJN7oni"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "c58c69ba-8a0b-47a8-a6e3-196f8824cc19", "DetectTime": "2024-05-21T12:52:42.883562+00:00", "EventTime": "2024-05-21T12:52:42.883582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvlNEHM9nnUE5dHg5"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "8ebf0ba3-d52e-4913-84c9-eb161ef8d66e", "DetectTime": "2024-05-21T12:52:42.894056+00:00", "EventTime": "2024-05-21T12:52:42.894076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE9Iy4VfNcCecf0l1"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "51b386b5-b100-41af-bb71-7d18951641e0", "DetectTime": "2024-05-21T12:52:43.335693+00:00", "EventTime": "2024-05-21T12:52:43.335717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPjfFkH9juMoiIZF3"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "d6fd143a-4e01-4371-b05b-98b5d7ed93a6", "DetectTime": "2024-05-21T12:52:43.885835+00:00", "EventTime": "2024-05-21T12:52:43.885856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmZl7Q1CCzcp1nsrJ1"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "3f630438-f9cf-4f14-9bad-b858f8051357", "DetectTime": "2024-05-21T12:52:43.898085+00:00", "EventTime": "2024-05-21T12:52:43.898108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYgEe19glyz9pRJv3"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "c0b1e9c3-b069-4900-9285-ff46755056ba", "DetectTime": "2024-05-21T12:52:43.917600+00:00", "EventTime": "2024-05-21T12:52:43.917621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3yHvE2kxF1jgPIM9d"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "5509dabc-8676-4877-a140-16b6f7796709", "DetectTime": "2024-05-21T12:52:43.937746+00:00", "EventTime": "2024-05-21T12:52:43.937766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrydDp47sr3S7npFEa"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "4dc3a63d-ae83-4d65-b53b-a5e1a2d3a774", "DetectTime": "2024-05-21T12:52:43.942490+00:00", "EventTime": "2024-05-21T12:52:43.942510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVrlOtTotDRZoQpU2"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "131123ca-d402-4d57-8c16-dcf51d136d47", "DetectTime": "2024-05-21T12:52:43.947213+00:00", "EventTime": "2024-05-21T12:52:43.947231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzfGvPuHNxMFOVY"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "bcab31ed-1109-46f9-83d9-29edb0a0e2b6", "DetectTime": "2024-05-21T12:52:43.955229+00:00", "EventTime": "2024-05-21T12:52:43.955254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPF8JR2izyJZDsH9c4"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "0f0cd1f8-c1bd-4b35-8fab-1323d3654c15", "DetectTime": "2024-05-21T12:52:43.999632+00:00", "EventTime": "2024-05-21T12:52:43.999655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdkLO71PdBNFkEIgSf"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "29f740ae-f6e9-4373-98c1-106e435d4f5e", "DetectTime": "2024-05-21T12:52:44.012040+00:00", "EventTime": "2024-05-21T12:52:44.012064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMRrl1tSKqFY67cu4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 180} +{"Format": "IDEA0", "ID": "75d91087-434a-44fe-9283-c6a5b8067ae4", "DetectTime": "2024-05-21T12:52:44.020864+00:00", "EventTime": "2024-05-21T12:52:44.020885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu7JWL1fipx8UoOIe8"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "651c81d7-8f7e-4d5a-b6f7-458a3874375b", "DetectTime": "2024-05-21T12:52:44.105209+00:00", "EventTime": "2024-05-21T12:52:44.105228+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGjlAn2fzntWRRGw24"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "c25190ec-fdbf-4b3b-abc3-05e66a5c4c5c", "DetectTime": "2024-05-21T12:52:44.120325+00:00", "EventTime": "2024-05-21T12:52:44.120346+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGjlAn2fzntWRRGw24"], "accumulated_threat_level": 9.299999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "cde5cacc-315c-46bd-871d-7f7526802655", "DetectTime": "2024-05-21T12:52:44.229696+00:00", "EventTime": "2024-05-21T12:52:44.229717+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDo1EK34fUcGOFlNr3"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "af71259a-2e9c-419f-9a06-5cef66fec54a", "DetectTime": "2024-05-21T12:52:44.243337+00:00", "EventTime": "2024-05-21T12:52:44.243356+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDo1EK34fUcGOFlNr3"], "accumulated_threat_level": 9.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "98847361-5818-4dcf-a568-09671acf07c9", "DetectTime": "2024-05-21T12:52:44.355745+00:00", "EventTime": "2024-05-21T12:52:44.355771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CENNEj12XvAij44Xlc"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "57ecbe68-dc39-478c-88f3-e8f5eb18a766", "DetectTime": "2024-05-21T12:52:44.382243+00:00", "EventTime": "2024-05-21T12:52:44.382268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNbf724cBfg7Hu1byc"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "81ddcec2-8a6f-4019-8cb6-be6219743d53", "DetectTime": "2024-05-21T12:52:44.454534+00:00", "EventTime": "2024-05-21T12:52:44.454557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzfdIQ1h34bOU5btPe"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "7951ea84-d656-47ab-a222-665ac5d5a687", "DetectTime": "2024-05-21T12:52:44.497236+00:00", "EventTime": "2024-05-21T12:52:44.497258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzsugK20Unz2tROJHh"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "9c38b2f9-fffe-4f00-810b-70d28c0cf36c", "DetectTime": "2024-05-21T12:52:44.509176+00:00", "EventTime": "2024-05-21T12:52:44.509197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crs8Rx2jsiWoqW3Rn6"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "68c35ea6-bce6-46bd-b5ce-6df548f156e5", "DetectTime": "2024-05-21T12:52:44.614807+00:00", "EventTime": "2024-05-21T12:52:44.614832+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSRfh451W5b7vhH6"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "f67a417b-816b-4dc5-a2c5-b2eb6c4d1c40", "DetectTime": "2024-05-21T12:52:44.631382+00:00", "EventTime": "2024-05-21T12:52:44.631419+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwSRfh451W5b7vhH6"], "accumulated_threat_level": 10.299999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "5e78c38f-58e2-407a-b6b7-89905ca1f8e4", "DetectTime": "2024-05-21T12:52:44.664298+00:00", "EventTime": "2024-05-21T12:52:44.664320+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wZMU2kDeJJ1L79oa"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "067a8e40-395d-488f-b782-ac4fc42f0fcf", "DetectTime": "2024-05-21T12:52:44.680855+00:00", "EventTime": "2024-05-21T12:52:44.680880+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4wZMU2kDeJJ1L79oa"], "accumulated_threat_level": 10.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "3765b409-7728-4f71-a879-fac400dc6e55", "DetectTime": "2024-05-21T12:52:44.708872+00:00", "EventTime": "2024-05-21T12:52:44.708892+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAnEiMXHEcrGwDZc"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "374b6a45-8484-4f1d-95b7-d4d01d27db23", "DetectTime": "2024-05-21T12:52:44.724961+00:00", "EventTime": "2024-05-21T12:52:44.724985+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAnEiMXHEcrGwDZc"], "accumulated_threat_level": 11.299999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "8231c97f-9304-4295-a3d4-8484c845ea75", "DetectTime": "2024-05-21T12:52:44.755633+00:00", "EventTime": "2024-05-21T12:52:44.755656+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0NhA3pFIDf054xu6"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "4c0be600-9806-4c3a-9208-a763d8d64c27", "DetectTime": "2024-05-21T12:52:44.771883+00:00", "EventTime": "2024-05-21T12:52:44.771909+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg0NhA3pFIDf054xu6"], "accumulated_threat_level": 11.799999999999999, "timewindow": 43} +{"Format": "IDEA0", "ID": "23d831cb-3d9a-4014-af9a-dc902cae7cc6", "DetectTime": "2024-05-21T12:52:45.139578+00:00", "EventTime": "2024-05-21T12:52:45.139599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPV8r93XBhNfLx7vw1"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "66d24865-2675-47c9-ba65-1b95e1c33d3a", "DetectTime": "2024-05-21T12:52:45.175596+00:00", "EventTime": "2024-05-21T12:52:45.175619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Ew9A4G7mr2KjETjj"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "b1dc360f-5e23-4951-b68b-ded8fe014982", "DetectTime": "2024-05-21T12:52:45.194637+00:00", "EventTime": "2024-05-21T12:52:45.194658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz2QoG1F5U8Dn7S4P2"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "9ef485d7-c570-4a18-a068-e4f89c6b6724", "DetectTime": "2024-05-21T12:52:45.232705+00:00", "EventTime": "2024-05-21T12:52:45.232728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhlgr3EZk2QjJml66"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "cc17a46e-2d79-4697-8952-8b1081ff45ff", "DetectTime": "2024-05-21T12:52:45.299911+00:00", "EventTime": "2024-05-21T12:52:45.299933+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3An5UWOtavHaf7M4"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "df9a9c78-2a74-4cbe-a38f-472b090ca6ff", "DetectTime": "2024-05-21T12:52:45.587399+00:00", "EventTime": "2024-05-21T12:52:45.587421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CryCKl4w3JnGBTHlXk"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "c46eabd1-cf42-4c56-bbc1-0f4460ad16b8", "DetectTime": "2024-05-21T12:52:45.599767+00:00", "EventTime": "2024-05-21T12:52:45.599790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfy1QP3nlUm6pmzDAl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "85a00916-3796-4a68-babc-1372c660b258", "DetectTime": "2024-05-21T12:52:45.605298+00:00", "EventTime": "2024-05-21T12:52:45.605319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnuGsVnOCRSLzo724"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "31184094-9cf4-4359-b498-cffd603bb60b", "DetectTime": "2024-05-21T12:52:45.610360+00:00", "EventTime": "2024-05-21T12:52:45.610378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyrC7l4UxyuQTX53kf"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "c0bd714a-958c-404a-a0af-d710e58167b9", "DetectTime": "2024-05-21T12:52:45.615270+00:00", "EventTime": "2024-05-21T12:52:45.615290+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqEieJ1ZIkKvYG53Yf"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "b6a35149-4eeb-4849-906b-0ee3b2941a55", "DetectTime": "2024-05-21T12:52:45.627204+00:00", "EventTime": "2024-05-21T12:52:45.627225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSbyxO2owWL3evva03"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "91ace3b0-64f1-4ed0-8ef1-62c267ea2046", "DetectTime": "2024-05-21T12:52:45.730922+00:00", "EventTime": "2024-05-21T12:52:45.730946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB4hUNdzynvkMm5Pe"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "d678c778-32e8-4391-81d8-5103156cac16", "DetectTime": "2024-05-21T12:52:46.154795+00:00", "EventTime": "2024-05-21T12:52:46.154813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRnbg6nQJsPzFo2ji"], "accumulated_threat_level": 0, "timewindow": 178} +{"Format": "IDEA0", "ID": "fbba154a-dc4b-45e0-9085-38b936362476", "DetectTime": "2024-05-21T12:52:46.187116+00:00", "EventTime": "2024-05-21T12:52:46.187137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdkpS3S0A4q3hFTx6"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "da0315e4-05ec-4724-816c-b0b3c9061a8c", "DetectTime": "2024-05-21T12:52:46.329333+00:00", "EventTime": "2024-05-21T12:52:46.329356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cku5tN2NA5slzN9EZj"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "5aece2e9-6786-490f-bf83-83ab4ec5e05f", "DetectTime": "2024-05-21T12:52:46.358284+00:00", "EventTime": "2024-05-21T12:52:46.358304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYtQ42kmZyXwjDp4d"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "a6e1aad7-3ff3-4e42-8047-58748205a20e", "DetectTime": "2024-05-21T12:52:46.363529+00:00", "EventTime": "2024-05-21T12:52:46.363548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6qWK1au3xKxkuMXh"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "d2f84f10-81ad-4eb7-a750-2e26ac4ba49c", "DetectTime": "2024-05-21T12:52:46.430775+00:00", "EventTime": "2024-05-21T12:52:46.430798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSgYnalQBdAotOwJd"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "b57c2110-ec51-41ce-80b9-6a83fcd34a9e", "DetectTime": "2024-05-21T12:52:46.437205+00:00", "EventTime": "2024-05-21T12:52:46.437224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvxA2VeSxBPptUKs5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "ad60309e-63e8-4709-824f-74865bc47093", "DetectTime": "2024-05-21T12:52:46.680323+00:00", "EventTime": "2024-05-21T12:52:46.680346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDp7u82GhbemwammM"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "a50ca623-6496-45cf-aed7-1a9bfdd82bc7", "DetectTime": "2024-05-21T12:52:46.755624+00:00", "EventTime": "2024-05-21T12:52:46.755646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYlbAz1U6jfkZq6Vb"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "c05a8af2-d80c-44e7-84db-b0b1476c45f6", "DetectTime": "2024-05-21T12:52:46.837651+00:00", "EventTime": "2024-05-21T12:52:46.837674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsdhJI3hLmboA3Oqkh"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "13f30485-596c-4fa2-8d43-d644606cef18", "DetectTime": "2024-05-21T12:52:46.884903+00:00", "EventTime": "2024-05-21T12:52:46.884925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0tJt3gpnhh9hdvG7"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "1096724a-6107-4414-ada9-6c2d2ed74d71", "DetectTime": "2024-05-21T12:52:46.921081+00:00", "EventTime": "2024-05-21T12:52:46.921106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CypNoQ9whvgCrNCqj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "cca80413-5221-4e5d-ada9-2c56b9cb61b2", "DetectTime": "2024-05-21T12:52:46.963317+00:00", "EventTime": "2024-05-21T12:52:46.963341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClIGevBL6vnW9NAD9"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "52f0b8de-1796-4208-bcc9-f60094e4c0b2", "DetectTime": "2024-05-21T12:52:47.221768+00:00", "EventTime": "2024-05-21T12:52:47.221790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvVaf1D3QD4lNc855"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "f13b3c57-29c4-456c-9a58-36b094ab76c4", "DetectTime": "2024-05-21T12:52:47.460604+00:00", "EventTime": "2024-05-21T12:52:47.460626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYyn741tI8Y14uOci5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "982d8626-425a-4708-9902-52cd03393ebf", "DetectTime": "2024-05-21T12:52:47.470927+00:00", "EventTime": "2024-05-21T12:52:47.470948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMpnS1cxVXLz2hK1d"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "004dbe51-7759-4ed7-ac61-3d58f0c14b89", "DetectTime": "2024-05-21T12:52:47.522119+00:00", "EventTime": "2024-05-21T12:52:47.522153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqy2Yi41wcTGK9woai"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "c6c1a6a8-90c4-44b5-abc2-04820f13b78a", "DetectTime": "2024-05-21T12:52:47.543611+00:00", "EventTime": "2024-05-21T12:52:47.543631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSsLaGCMmV1VpmbWd"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "e07e07f6-7d24-4e88-a7d9-1c926ee6b99f", "DetectTime": "2024-05-21T12:52:47.552468+00:00", "EventTime": "2024-05-21T12:52:47.552487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH5aQw3mgaZNCm42x1"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "0d2c4b8e-3b3e-4842-b2b9-5c540f69cb45", "DetectTime": "2024-05-21T12:52:47.559653+00:00", "EventTime": "2024-05-21T12:52:47.559672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNS1I13Sd6pL2uAcbh"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "67b166c5-0cca-43fb-b760-8a740d4344c0", "DetectTime": "2024-05-21T12:52:47.571913+00:00", "EventTime": "2024-05-21T12:52:47.571935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbOyV832S4ZsgLzgs5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "91ba3696-608a-4862-9710-d5b0a1781315", "DetectTime": "2024-05-21T12:52:47.577349+00:00", "EventTime": "2024-05-21T12:52:47.577372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmHgljKrP9jAJ5F9k"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "e060c2fe-7d73-4e0c-bc80-e6b77ddeeab9", "DetectTime": "2024-05-21T12:52:48.006229+00:00", "EventTime": "2024-05-21T12:52:48.006254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoYIQz4hQMAGJMvmG6"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "5c070b1c-3036-48b6-bcbc-6497a96ee358", "DetectTime": "2024-05-21T12:52:48.071169+00:00", "EventTime": "2024-05-21T12:52:48.071190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUeX8c1vidxVA1Pm6g"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "9542e03d-3bdf-485d-ae50-5ce1aef68b7d", "DetectTime": "2024-05-21T12:52:48.078603+00:00", "EventTime": "2024-05-21T12:52:48.078622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWBGN1SBeja1YaUkb"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "3e6c9876-c5d3-4728-b3df-5c84d366c625", "DetectTime": "2024-05-21T12:52:48.442231+00:00", "EventTime": "2024-05-21T12:52:48.442251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeQkb2q6xRVAaTUm7"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "0d4b37a8-6ec6-453d-a596-06cb26ef78ac", "DetectTime": "2024-05-21T12:52:48.472991+00:00", "EventTime": "2024-05-21T12:52:48.473009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnYrp711dL1mM2xjS1"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "d5d7e894-4f1f-4b53-ae12-bc6bb313754c", "DetectTime": "2024-05-21T12:52:48.489191+00:00", "EventTime": "2024-05-21T12:52:48.489210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoNxO2tpc8rQiEzZ1"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "4171929f-c087-4234-9552-ae8c8b998bd9", "DetectTime": "2024-05-21T12:52:48.519206+00:00", "EventTime": "2024-05-21T12:52:48.519223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6DVD16aHjo0hNhD1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "b6a6646d-f8d4-4ae0-9205-bbdc2eac50a6", "DetectTime": "2024-05-21T12:52:48.634264+00:00", "EventTime": "2024-05-21T12:52:48.634285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NO732FOhsLfjMJQf"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "6b2582e5-8996-4771-a03d-104b5fddf301", "DetectTime": "2024-05-21T12:52:48.639176+00:00", "EventTime": "2024-05-21T12:52:48.639195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQTF9xoYVQReTiKYa"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "12246ca2-4c81-46b7-b35f-cf7525a5130a", "DetectTime": "2024-05-21T12:52:48.669511+00:00", "EventTime": "2024-05-21T12:52:48.669530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZd2tz3JlLFb8Kbp99"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "1c70f659-cf71-4f84-8e1a-855115d4e1d6", "DetectTime": "2024-05-21T12:52:48.982354+00:00", "EventTime": "2024-05-21T12:52:48.982373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9jW3R3HebI8LHqG2"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "cb14e883-b80f-4e9a-87a8-83687374b413", "DetectTime": "2024-05-21T12:52:49.064776+00:00", "EventTime": "2024-05-21T12:52:49.064797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwLM9q2WDexZNSVrGb"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "5dbddd9a-d800-48aa-93d0-06fae6025a3d", "DetectTime": "2024-05-21T12:52:49.069570+00:00", "EventTime": "2024-05-21T12:52:49.069589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctsk0j3dZPPNI7Ugoi"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "19b57fa9-92c7-4fb0-be9b-1552da498d1d", "DetectTime": "2024-05-21T12:52:49.530593+00:00", "EventTime": "2024-05-21T12:52:49.530613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1Cma38PRyGyPlqk7"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "a680d044-7d78-427f-b933-c56347c03aa3", "DetectTime": "2024-05-21T12:52:49.543818+00:00", "EventTime": "2024-05-21T12:52:49.543841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4i9U63qcFdfltpiu7"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "ced97a53-7ca9-443a-89a7-4c451ade72cc", "DetectTime": "2024-05-21T12:52:49.575031+00:00", "EventTime": "2024-05-21T12:52:49.575053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLgfnb1qUbOGTFbDr2"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "104ae3e4-9188-463d-a19a-a7eabf10a260", "DetectTime": "2024-05-21T12:52:49.584527+00:00", "EventTime": "2024-05-21T12:52:49.584546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDr3V42pWEYfj2bCU5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "e0757598-ae63-4f5b-a6dc-610a535012c1", "DetectTime": "2024-05-21T12:52:49.610177+00:00", "EventTime": "2024-05-21T12:52:49.610198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTKKO32UpMmA2Wn133"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "bbe632f1-351d-4ba5-819d-53d23429ff3f", "DetectTime": "2024-05-21T12:52:49.615265+00:00", "EventTime": "2024-05-21T12:52:49.615284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWN8iBzQmzzgupKi"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "b87f135d-ef63-4506-9839-b2390e0a9d7a", "DetectTime": "2024-05-21T12:52:49.622807+00:00", "EventTime": "2024-05-21T12:52:49.622829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqPAGqgVG2XCSnO7"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "5b3291d8-a7b3-4b86-ae0a-a52a157c0aac", "DetectTime": "2024-05-21T12:52:49.674971+00:00", "EventTime": "2024-05-21T12:52:49.674992+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoCqG22NmEWyCO27f5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "a3c201c0-d398-4f89-b020-b193e23e5d43", "DetectTime": "2024-05-21T12:52:49.682682+00:00", "EventTime": "2024-05-21T12:52:49.682705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj3B261xAXgUlq1dBj"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "74241210-0359-4e98-9e5b-9270f30049b5", "DetectTime": "2024-05-21T12:52:49.688864+00:00", "EventTime": "2024-05-21T12:52:49.688885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIyb9z214Nwokk3aG9"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "4cec3d82-cdb2-401b-bcfb-8484e3d06be4", "DetectTime": "2024-05-21T12:52:50.120791+00:00", "EventTime": "2024-05-21T12:52:50.120812+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iJ5wFJz6LTCaSLl"], "accumulated_threat_level": 9.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "9891cf12-dc21-416f-893d-a16877c94726", "DetectTime": "2024-05-21T12:52:50.182723+00:00", "EventTime": "2024-05-21T12:52:50.182750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLroE83dAmwAZkEdR5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "f44b2488-cf10-4e90-9b2e-eeb02ccc3aad", "DetectTime": "2024-05-21T12:52:50.308682+00:00", "EventTime": "2024-05-21T12:52:50.308716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtrRAZbwbGMqbq1ih"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "b8c3791c-da3b-4f41-b02a-a98a13ff64ce", "DetectTime": "2024-05-21T12:52:50.442452+00:00", "EventTime": "2024-05-21T12:52:50.442475+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5bdysOcr5xdNAWWi"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "cb27a864-a9fd-4710-911c-2721196681c2", "DetectTime": "2024-05-21T12:52:50.458264+00:00", "EventTime": "2024-05-21T12:52:50.458284+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5bdysOcr5xdNAWWi"], "accumulated_threat_level": 12.299999999999999, "timewindow": 43} +{"Format": "Json", "ID": "cb27a864-a9fd-4710-911c-2721196681c2", "DetectTime": "2024-05-21T12:52:50.458264+00:00", "EventTime": "2024-05-21T12:52:50.458284+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "1970-01-02T18:01:43.396686+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:52:51.048184)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.299999999999999, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.299999999999999} +{"Format": "IDEA0", "ID": "f47df0e4-e902-4b22-8fc6-bd6fdb5adfb5", "DetectTime": "2024-05-21T12:52:51.053767+00:00", "EventTime": "2024-05-21T12:52:51.053787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBMi4s1jK49iHTCH23"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "d631fefb-658e-4f74-b639-64a79751555b", "DetectTime": "2024-05-21T12:52:51.059034+00:00", "EventTime": "2024-05-21T12:52:51.059052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCglJJ1wNaOhmaeVwd"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "e94f48f0-a5d9-4f0e-800f-8ac524cfb10a", "DetectTime": "2024-05-21T12:52:51.064114+00:00", "EventTime": "2024-05-21T12:52:51.064132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyVFea3h0kzlorfSi"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "c341b2bc-81a6-46b2-a9b3-a7798adc5022", "DetectTime": "2024-05-21T12:52:51.069002+00:00", "EventTime": "2024-05-21T12:52:51.069020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLPj6TJED5oAxZLM2"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "d6234c9b-b6b2-4973-ba4d-01cba4c3d8c2", "DetectTime": "2024-05-21T12:52:51.073781+00:00", "EventTime": "2024-05-21T12:52:51.073799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jbbDzCdh6MM7vLj"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "7d00d694-edca-4110-a966-c5548dff3289", "DetectTime": "2024-05-21T12:52:51.078193+00:00", "EventTime": "2024-05-21T12:52:51.078211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3AwUmgma4J18WPBe"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "4ba599b6-db99-4e04-a5cc-e0488732f957", "DetectTime": "2024-05-21T12:52:51.091255+00:00", "EventTime": "2024-05-21T12:52:51.091273+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqLJF2sOYyg0rQwT7"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "d22840db-3843-48a2-8ab1-03ba073804c6", "DetectTime": "2024-05-21T12:52:51.104298+00:00", "EventTime": "2024-05-21T12:52:51.104317+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsqLJF2sOYyg0rQwT7"], "accumulated_threat_level": 0.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "323b3d2d-f0ff-414c-b92a-616bf5e44411", "DetectTime": "2024-05-21T12:52:51.116966+00:00", "EventTime": "2024-05-21T12:52:51.116983+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0sr02s4c4DAaLWZa"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e9fb0856-0763-4d66-b2e3-0ca85e5260c7", "DetectTime": "2024-05-21T12:52:51.129404+00:00", "EventTime": "2024-05-21T12:52:51.129422+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0sr02s4c4DAaLWZa"], "accumulated_threat_level": 1.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "84d6dd47-b9c0-481d-b961-3dd8d60e8a82", "DetectTime": "2024-05-21T12:52:51.183208+00:00", "EventTime": "2024-05-21T12:52:51.183231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFKRr32KAUFWTgIcF5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "902025c6-d050-4dd8-9a9b-de0b13d98b95", "DetectTime": "2024-05-21T12:52:51.315140+00:00", "EventTime": "2024-05-21T12:52:51.315166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRCGzH31WwS9d6Sgq9"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "27b12a21-a355-4d78-86d5-a8dd6ad6bf32", "DetectTime": "2024-05-21T12:52:51.342380+00:00", "EventTime": "2024-05-21T12:52:51.342400+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9Ihd43HltkrIBrSi"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "042a3140-c67d-468e-a1b2-d7ab828fe51c", "DetectTime": "2024-05-21T12:52:51.357820+00:00", "EventTime": "2024-05-21T12:52:51.357850+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9Ihd43HltkrIBrSi"], "accumulated_threat_level": 1.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "c2ba4001-532f-4b00-873a-594aa585ae4f", "DetectTime": "2024-05-21T12:52:51.370702+00:00", "EventTime": "2024-05-21T12:52:51.370729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4lxibRKFCyayU93"], "accumulated_threat_level": 10.4, "timewindow": 180} +{"Format": "IDEA0", "ID": "976a8a5b-a77b-4484-8337-1ecf62b05782", "DetectTime": "2024-05-21T12:52:51.377859+00:00", "EventTime": "2024-05-21T12:52:51.377880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTCjMH1vh56kgeDnX5"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "0fcf9677-fb1c-47c5-8bef-7cc661677261", "DetectTime": "2024-05-21T12:52:51.384784+00:00", "EventTime": "2024-05-21T12:52:51.384803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1PfaTF3qf9zP6m3"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "9c85adc6-76fc-414b-808b-01a843cdab40", "DetectTime": "2024-05-21T12:52:51.398852+00:00", "EventTime": "2024-05-21T12:52:51.398874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHo1TT29pAv1AMTBvk"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "c38f72cf-d7a4-429c-a9bb-4bc1d922ef52", "DetectTime": "2024-05-21T12:52:51.414264+00:00", "EventTime": "2024-05-21T12:52:51.414297+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHo1TT29pAv1AMTBvk"], "accumulated_threat_level": 2.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "4b9070ea-3b1c-4a10-987d-d97941c5f543", "DetectTime": "2024-05-21T12:52:51.421244+00:00", "EventTime": "2024-05-21T12:52:51.421263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPEZaFSq5b4N7oJzc"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "10a78f62-e494-4671-b6fe-49a32b389d33", "DetectTime": "2024-05-21T12:52:51.434368+00:00", "EventTime": "2024-05-21T12:52:51.434388+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.151.56.116"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cycd2l2t8p1ug6QZo3"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e650c86a-4618-4721-957f-f6baf8b39092", "DetectTime": "2024-05-21T12:52:51.449029+00:00", "EventTime": "2024-05-21T12:52:51.449068+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cycd2l2t8p1ug6QZo3"], "accumulated_threat_level": 2.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "f0d966f5-bc0c-4082-ad70-f3e6f272f154", "DetectTime": "2024-05-21T12:52:51.552665+00:00", "EventTime": "2024-05-21T12:52:51.552687+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.74.200.86"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGpvljYXdmwWRiV7"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "90a2ffc2-d139-4081-bf18-1d374deb616c", "DetectTime": "2024-05-21T12:52:51.566843+00:00", "EventTime": "2024-05-21T12:52:51.566874+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfGpvljYXdmwWRiV7"], "accumulated_threat_level": 3.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "a7279942-9fbd-4826-815b-474fb82db8b6", "DetectTime": "2024-05-21T12:52:51.761393+00:00", "EventTime": "2024-05-21T12:52:51.761418+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6cfOG2oFMoExZ4pi5"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "ec4c3d10-5bc9-4e46-8717-2a4d0ef644e0", "DetectTime": "2024-05-21T12:52:51.776492+00:00", "EventTime": "2024-05-21T12:52:51.776527+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6cfOG2oFMoExZ4pi5"], "accumulated_threat_level": 3.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "acd09039-c7dd-431f-a27d-91351b6947a3", "DetectTime": "2024-05-21T12:52:51.802904+00:00", "EventTime": "2024-05-21T12:52:51.802926+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8Xay21ljrK7l2jX8"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "d0ef2a63-4e89-401e-906f-e88c4cadf624", "DetectTime": "2024-05-21T12:52:51.817871+00:00", "EventTime": "2024-05-21T12:52:51.817896+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv8Xay21ljrK7l2jX8"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "614fadef-a0a8-46e8-99b6-21d658a5feed", "DetectTime": "2024-05-21T12:52:51.849572+00:00", "EventTime": "2024-05-21T12:52:51.849594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CalTSG1FB6GSKkCUwk"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "f2dd032b-a8ed-425a-8393-c242405857a5", "DetectTime": "2024-05-21T12:52:51.886595+00:00", "EventTime": "2024-05-21T12:52:51.886615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG6u1l3LM9NKyqf6R2"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "4971bae1-8ec3-497a-8d17-74fc61b60542", "DetectTime": "2024-05-21T12:52:51.935664+00:00", "EventTime": "2024-05-21T12:52:51.935682+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["172.190.23.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.23.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZV1c1ydv0juhVbm8"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "c6581b12-f26c-476d-93f3-1b4a8aa1a304", "DetectTime": "2024-05-21T12:52:52.065093+00:00", "EventTime": "2024-05-21T12:52:52.065129+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["172.190.23.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 172.190.23.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5ZV1c1ydv0juhVbm8"], "accumulated_threat_level": 4.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "7bc3d3dd-d980-4c2b-8974-ae1b025df046", "DetectTime": "2024-05-21T12:52:52.079788+00:00", "EventTime": "2024-05-21T12:52:52.079807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMW8A2Vo2Cbs5U6ql"], "accumulated_threat_level": 11.200000000000001, "timewindow": 180} +{"Format": "IDEA0", "ID": "54d83c47-f845-45f8-b487-2e172aacd98e", "DetectTime": "2024-05-21T12:52:52.085892+00:00", "EventTime": "2024-05-21T12:52:52.085913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvelVi2BFESlGYuw74"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "94f8e1a1-e27b-4d37-b6b2-1428746d27e0", "DetectTime": "2024-05-21T12:52:52.132724+00:00", "EventTime": "2024-05-21T12:52:52.132746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOYn61lXPi1n6ZzId"], "accumulated_threat_level": 12.000000000000002, "timewindow": 180} +{"Format": "Json", "ID": "94f8e1a1-e27b-4d37-b6b2-1428746d27e0", "DetectTime": "2024-05-21T12:52:52.132724+00:00", "EventTime": "2024-05-21T12:52:52.132746+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "1970-01-08T11:18:55.538571+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2024/05/21 12:52:52.295423)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 180, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c72d1d9c-e56a-469e-aea9-767d663cfc92", "DetectTime": "2024-05-21T12:52:52.423002+00:00", "EventTime": "2024-05-21T12:52:52.423037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJoSkp2F900Yp2Find"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "7b576b87-ed3d-4917-895b-52e3d53d476e", "DetectTime": "2024-05-21T12:52:52.533228+00:00", "EventTime": "2024-05-21T12:52:52.533263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpshgt2mh8F8AR6P82"], "accumulated_threat_level": 1.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "d814359a-4301-4b61-9571-3c4a322276e3", "DetectTime": "2024-05-21T12:52:52.558115+00:00", "EventTime": "2024-05-21T12:52:52.558141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbwpp6qXtgqF0tqL4"], "accumulated_threat_level": 1.6, "timewindow": 179} +{"Format": "IDEA0", "ID": "30a00b34-7eaa-40eb-bf83-1ce0b196ab99", "DetectTime": "2024-05-21T12:52:52.627821+00:00", "EventTime": "2024-05-21T12:52:52.627854+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnRly30G9fKpGZ2Ld"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 180} +{"Format": "IDEA0", "ID": "af4321c4-2115-4d7b-923e-ec1e637404b1", "DetectTime": "2024-05-21T12:52:52.672850+00:00", "EventTime": "2024-05-21T12:52:52.672872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwzD6RJP4HsOEE76"], "accumulated_threat_level": 3.2, "timewindow": 180} +{"Format": "IDEA0", "ID": "1423ebf8-b3e5-49d8-987b-a9120e21c576", "DetectTime": "2024-05-21T12:52:52.725395+00:00", "EventTime": "2024-05-21T12:52:52.725413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYHfO81FZAdXxWvB4i"], "accumulated_threat_level": 4.0, "timewindow": 180} +{"Format": "IDEA0", "ID": "88a114ff-2b89-45eb-bf1f-3fdf4c748c2a", "DetectTime": "2024-05-21T12:52:52.774948+00:00", "EventTime": "2024-05-21T12:52:52.774967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Civj7i1N0kQoOHW0Y1"], "accumulated_threat_level": 4.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "24dba687-ebda-4da9-9582-090bcb06dc7c", "DetectTime": "2024-05-21T12:52:53.053882+00:00", "EventTime": "2024-05-21T12:52:53.053902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLKHu4H4gecZ7rk4k"], "accumulated_threat_level": 5.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "58e10a50-3039-409d-bb21-a4990a3afa99", "DetectTime": "2024-05-21T12:52:53.107978+00:00", "EventTime": "2024-05-21T12:52:53.107997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hkDO23z2KUqYRHd4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 180} +{"Format": "IDEA0", "ID": "1561365f-2cc3-45de-9700-8ed62c2726c9", "DetectTime": "2024-05-21T12:52:53.158014+00:00", "EventTime": "2024-05-21T12:52:53.158033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGFLC7lMNmViBEfE8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "092573be-268d-4c21-841a-918a3aeefa75", "DetectTime": "2024-05-21T12:52:53.211632+00:00", "EventTime": "2024-05-21T12:52:53.211653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1DyLo4aXJ6cQzlfhe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "e3da3496-bbd2-4dc0-8f39-8c0b4c6ac1e1", "DetectTime": "2024-05-21T12:52:53.283692+00:00", "EventTime": "2024-05-21T12:52:53.283711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw0NOW2nlawpHw1d2l"], "accumulated_threat_level": 8.799999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "187ae885-685e-4a50-84d2-91f21b65449f", "DetectTime": "2024-05-21T12:52:53.333369+00:00", "EventTime": "2024-05-21T12:52:53.333389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnFpMS12VMkLzRa6oc"], "accumulated_threat_level": 9.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "4c78da14-5477-4d90-a2d8-13b0244d33da", "DetectTime": "2024-05-21T12:52:53.388063+00:00", "EventTime": "2024-05-21T12:52:53.388082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiE5vfKVvAtINEc6h"], "accumulated_threat_level": 10.4, "timewindow": 180} +{"Format": "IDEA0", "ID": "096e37a3-112d-4957-9491-4c0492414f53", "DetectTime": "2024-05-21T12:52:53.694283+00:00", "EventTime": "2024-05-21T12:52:53.694304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu0eXl2TDq1Rs8Jm1h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 180} +{"Format": "IDEA0", "ID": "75e1768b-58b9-44b7-ba3c-4c1ce903a531", "DetectTime": "2024-05-21T12:52:53.738975+00:00", "EventTime": "2024-05-21T12:52:53.738998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CITa4Y2nbuGqScTDeh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 180} +{"Format": "IDEA0", "ID": "b80e9c6c-afe2-40b1-8e9c-4483e3f4f9ab", "DetectTime": "2024-05-21T12:52:53.794581+00:00", "EventTime": "2024-05-21T12:52:53.794600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7qetM3D1dGup3iLl8"], "accumulated_threat_level": 12.000000000000002, "timewindow": 180} +{"Format": "Json", "ID": "b80e9c6c-afe2-40b1-8e9c-4483e3f4f9ab", "DetectTime": "2024-05-21T12:52:53.794581+00:00", "EventTime": "2024-05-21T12:52:53.794600+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T11:28:46.856644+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2024/05/21 12:52:54.166433)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 180, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "e2564936-1e67-4acd-b0bc-9999bb5168e5", "DetectTime": "2024-05-21T12:52:54.187428+00:00", "EventTime": "2024-05-21T12:52:54.187446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBueX2VlytSVpHjoe"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "eca82451-5ebf-430a-9540-eb068761053a", "DetectTime": "2024-05-21T12:52:54.198687+00:00", "EventTime": "2024-05-21T12:52:54.198706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2W8ePBQ9Cwj6WWQ7"], "accumulated_threat_level": 1.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "82df8cf9-04a2-4e36-be57-349ceeab315f", "DetectTime": "2024-05-21T12:52:54.209572+00:00", "EventTime": "2024-05-21T12:52:54.209590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5j564CQz1tsV1hdh"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 180} +{"Format": "IDEA0", "ID": "de1cf398-6d00-47c2-b6ab-e8f4958d5695", "DetectTime": "2024-05-21T12:52:54.220499+00:00", "EventTime": "2024-05-21T12:52:54.220517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1x1UT8yRqOB1jv5i"], "accumulated_threat_level": 3.2, "timewindow": 180} +{"Format": "IDEA0", "ID": "885de2de-cf12-436b-9693-a28d98baff02", "DetectTime": "2024-05-21T12:52:54.299959+00:00", "EventTime": "2024-05-21T12:52:54.299978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXFCTv4eSUqdfvbpi7"], "accumulated_threat_level": 3.2, "timewindow": 180} +{"Format": "IDEA0", "ID": "23201887-e2bc-41c9-a941-9c056c1f93f0", "DetectTime": "2024-05-21T12:52:54.349042+00:00", "EventTime": "2024-05-21T12:52:54.349066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AFys1CjwKoreSYT7"], "accumulated_threat_level": 4.0, "timewindow": 180} +{"Format": "IDEA0", "ID": "4eec494a-67cf-4051-8cd5-9528787f694a", "DetectTime": "2024-05-21T12:52:54.401370+00:00", "EventTime": "2024-05-21T12:52:54.401388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBq7rE15PImHFPBGq1"], "accumulated_threat_level": 4.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "ef5d291f-d799-44eb-9091-5c85af903a2d", "DetectTime": "2024-05-21T12:52:54.453499+00:00", "EventTime": "2024-05-21T12:52:54.453520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBF9E47T49U2LECQk"], "accumulated_threat_level": 5.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "3327d5ae-2122-4d09-9094-1ea95be660ce", "DetectTime": "2024-05-21T12:52:54.505549+00:00", "EventTime": "2024-05-21T12:52:54.505568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaZTg4bZEncVwv0q2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 180} +{"Format": "IDEA0", "ID": "49782efd-3c53-4db5-a233-2c6466c3da2a", "DetectTime": "2024-05-21T12:52:54.558358+00:00", "EventTime": "2024-05-21T12:52:54.558377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwx8S51QKT5LOXJIzj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "ea265804-44a0-4075-82e6-3c15f796ed06", "DetectTime": "2024-05-21T12:52:54.613751+00:00", "EventTime": "2024-05-21T12:52:54.613773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTUKk5vtaxDDOCS2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "60ec39f2-4c1a-4d92-b8e5-89be462f8e4e", "DetectTime": "2024-05-21T12:52:54.665250+00:00", "EventTime": "2024-05-21T12:52:54.665271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBj6z94ZabLPLIBz3k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "66ffd5c6-e827-4401-9a6e-50764b3094a6", "DetectTime": "2024-05-21T12:52:54.925447+00:00", "EventTime": "2024-05-21T12:52:54.925470+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXJxi42g5E9hJhzGb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "ead23983-3497-4d1e-a6f8-4cb6c6c6d25a", "DetectTime": "2024-05-21T12:52:54.969362+00:00", "EventTime": "2024-05-21T12:52:54.969383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDs3ea1ESa40OocAeh"], "accumulated_threat_level": 9.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "43abeb2a-ee04-4c9b-9f18-064ddcce8ffe", "DetectTime": "2024-05-21T12:52:55.123982+00:00", "EventTime": "2024-05-21T12:52:55.124002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRqEG11BApT5Qu6oa6"], "accumulated_threat_level": 10.4, "timewindow": 180} +{"Format": "IDEA0", "ID": "9c6189e2-c684-4ba4-8316-aa0311a40aa2", "DetectTime": "2024-05-21T12:52:55.177556+00:00", "EventTime": "2024-05-21T12:52:55.177579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CewtCg3sA8U7KPLGXg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 180} +{"Format": "IDEA0", "ID": "6095bd27-e10f-4502-a2d9-99a0587108dd", "DetectTime": "2024-05-21T12:52:55.233723+00:00", "EventTime": "2024-05-21T12:52:55.233748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPm6I2fZ1IKAbfyHh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 180} +{"Format": "Json", "ID": "6095bd27-e10f-4502-a2d9-99a0587108dd", "DetectTime": "2024-05-21T12:52:55.233723+00:00", "EventTime": "2024-05-21T12:52:55.233748+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T11:49:11.377960+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2024/05/21 12:52:55.450854)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 180, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1a0e5ea9-2288-4b84-bf6a-32a40ce16886", "DetectTime": "2024-05-21T12:52:55.470346+00:00", "EventTime": "2024-05-21T12:52:55.470365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRuIA1cXSVoIyxwHl"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "e3d0564a-8ad8-4c0c-973b-dde3f8e6ecdb", "DetectTime": "2024-05-21T12:52:55.482969+00:00", "EventTime": "2024-05-21T12:52:55.482987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCnWO1RgmRMlV7THl"], "accumulated_threat_level": 1.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "f789d251-9e96-4894-b4f3-ebf1dbd99008", "DetectTime": "2024-05-21T12:52:55.597992+00:00", "EventTime": "2024-05-21T12:52:55.598015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTnGsxMnvDO19qvp"], "accumulated_threat_level": 1.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "923fa186-2a96-424e-b2cb-2a183fcf5664", "DetectTime": "2024-05-21T12:52:55.643388+00:00", "EventTime": "2024-05-21T12:52:55.643407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVOCb3HnRnvroBlLf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 180} +{"Format": "IDEA0", "ID": "3ebf9476-72d4-42d2-82f6-1b1b37fcbed2", "DetectTime": "2024-05-21T12:52:55.691183+00:00", "EventTime": "2024-05-21T12:52:55.691203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdbhubmfjDYSvI5G5"], "accumulated_threat_level": 3.2, "timewindow": 180} +{"Format": "IDEA0", "ID": "5940e609-7fcd-4c6f-a01b-9a648594a951", "DetectTime": "2024-05-21T12:52:55.750166+00:00", "EventTime": "2024-05-21T12:52:55.750185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5E8d6G2hhSO1n5Ah"], "accumulated_threat_level": 4.0, "timewindow": 180} +{"Format": "IDEA0", "ID": "b5a99948-a8b5-488b-bbd2-80d08c037e74", "DetectTime": "2024-05-21T12:52:55.800547+00:00", "EventTime": "2024-05-21T12:52:55.800565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJau68mJU6EEDla6j"], "accumulated_threat_level": 4.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "45852f54-5ef2-4990-b825-f85f6e82b239", "DetectTime": "2024-05-21T12:52:55.849317+00:00", "EventTime": "2024-05-21T12:52:55.849341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwrUF4sA2O9Cmf6Dj"], "accumulated_threat_level": 5.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "af07f55f-46d3-46e2-8fb8-85624f39aec0", "DetectTime": "2024-05-21T12:52:55.902916+00:00", "EventTime": "2024-05-21T12:52:55.902935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzePLFpP3yBGaGOk7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 180} +{"Format": "IDEA0", "ID": "6ed032ba-e8d3-455b-bf12-891218c65b1f", "DetectTime": "2024-05-21T12:52:56.176521+00:00", "EventTime": "2024-05-21T12:52:56.176539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUBlC4Hn7BRrEE8ya"], "accumulated_threat_level": 7.199999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "bf7fb945-4a11-43dc-a4a3-1da0a7edfb82", "DetectTime": "2024-05-21T12:52:56.232133+00:00", "EventTime": "2024-05-21T12:52:56.232152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNWUO44OOJPLDwHa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "99ad83ba-d494-4338-a23b-b40bf522a328", "DetectTime": "2024-05-21T12:52:56.285205+00:00", "EventTime": "2024-05-21T12:52:56.285222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEPpJ1nuDf0NxUOkh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 180} +{"Format": "IDEA0", "ID": "e3a060d5-bac5-40ca-92c5-8835a737e6cd", "DetectTime": "2024-05-21T12:52:56.335359+00:00", "EventTime": "2024-05-21T12:52:56.335377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C93V3PS5d3Zad9Nw9"], "accumulated_threat_level": 9.6, "timewindow": 180} +{"Format": "IDEA0", "ID": "63f102b7-5df2-4882-a589-da720164a99e", "DetectTime": "2024-05-21T12:52:56.382782+00:00", "EventTime": "2024-05-21T12:52:56.382801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wbo22gS5bqidOlb1"], "accumulated_threat_level": 10.4, "timewindow": 180} +{"Format": "IDEA0", "ID": "af919e2a-9a67-4cfe-9b44-bc0711a99faa", "DetectTime": "2024-05-21T12:52:56.431124+00:00", "EventTime": "2024-05-21T12:52:56.431143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9m8PeodWTQQmRWl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 180} +{"Format": "IDEA0", "ID": "838d5acf-f79b-44a1-8cc6-116e9f8d56d2", "DetectTime": "2024-05-21T12:52:56.596923+00:00", "EventTime": "2024-05-21T12:52:56.596942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVfgFw13XlaxpXajGd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 180} +{"Format": "Json", "ID": "838d5acf-f79b-44a1-8cc6-116e9f8d56d2", "DetectTime": "2024-05-21T12:52:56.596923+00:00", "EventTime": "2024-05-21T12:52:56.596942+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-08T11:49:14.694404+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 180. (real time 2024/05/21 12:52:56.849028)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 180, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9d52506e-20d0-413c-b7a4-32c2e7265481", "DetectTime": "2024-05-21T12:52:56.880802+00:00", "EventTime": "2024-05-21T12:52:56.880836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw2p2o4RkNP4X4oSe4"], "accumulated_threat_level": 0, "timewindow": 180} +{"Format": "IDEA0", "ID": "2bf96537-9819-4096-817f-8ef59db9f3c4", "DetectTime": "2024-05-21T12:52:56.926390+00:00", "EventTime": "2024-05-21T12:52:56.926424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtD8Sm3sTrF8KuNSZb"], "accumulated_threat_level": 0, "timewindow": 180} +{"Format": "IDEA0", "ID": "d836f6fc-b077-4b1d-9499-35d51ecd45e9", "DetectTime": "2024-05-21T12:52:57.000968+00:00", "EventTime": "2024-05-21T12:52:57.000991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZw7v2bWrcarc11I7"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "7c0efea1-de2a-4f1d-a316-47cfebff3132", "DetectTime": "2024-05-21T12:52:57.076458+00:00", "EventTime": "2024-05-21T12:52:57.076483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUdpk1Nts7pjr5wzl"], "accumulated_threat_level": 0.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "d0008d68-1a14-462d-815d-fd040494ffbb", "DetectTime": "2024-05-21T12:52:57.128216+00:00", "EventTime": "2024-05-21T12:52:57.128236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jVOv4G8PiRlipmc7"], "accumulated_threat_level": 1.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "2326a94d-ac24-437c-bc41-6cb87238e399", "DetectTime": "2024-05-21T12:52:57.194592+00:00", "EventTime": "2024-05-21T12:52:57.194610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rUX2u2Q94AQz1Bj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 181} +{"Format": "IDEA0", "ID": "06216823-59e4-42bc-a6a3-d89deb80cf5d", "DetectTime": "2024-05-21T12:52:57.246712+00:00", "EventTime": "2024-05-21T12:52:57.246732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYLEY1ovcet4YdsDk"], "accumulated_threat_level": 3.2, "timewindow": 181} +{"Format": "IDEA0", "ID": "28f39f76-8e89-4185-8581-101b132edf0d", "DetectTime": "2024-05-21T12:52:57.514768+00:00", "EventTime": "2024-05-21T12:52:57.514787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUBb20No3eWG5TLk"], "accumulated_threat_level": 4.0, "timewindow": 181} +{"Format": "IDEA0", "ID": "3cbffb4b-ad9d-4716-8466-0176a20e9f6e", "DetectTime": "2024-05-21T12:52:57.565909+00:00", "EventTime": "2024-05-21T12:52:57.565928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMRxUDqEQdDp2zw1"], "accumulated_threat_level": 4.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "68c33dc6-8862-4b2d-94ac-340f02f9eb9b", "DetectTime": "2024-05-21T12:52:57.618449+00:00", "EventTime": "2024-05-21T12:52:57.618467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkG1xN7bNE78Wt8b"], "accumulated_threat_level": 5.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "a5709939-c143-4949-a4a4-bdff82f1a95b", "DetectTime": "2024-05-21T12:52:57.669108+00:00", "EventTime": "2024-05-21T12:52:57.669127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK1CZN1iHubd5dPmia"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 181} +{"Format": "IDEA0", "ID": "99db03fe-53d8-4610-bc06-a7f6648e366a", "DetectTime": "2024-05-21T12:52:57.707592+00:00", "EventTime": "2024-05-21T12:52:57.707614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEuJ5h1wVCubpazjE9"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "25a169fe-d506-406d-8178-78282c08790a", "DetectTime": "2024-05-21T12:52:57.759304+00:00", "EventTime": "2024-05-21T12:52:57.759324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vFBy3ssktxuaQle8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "210a1293-4df0-4dba-8945-e30fcb76968a", "DetectTime": "2024-05-21T12:52:57.812497+00:00", "EventTime": "2024-05-21T12:52:57.812519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoxrG3QNuSMs7ELe7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "da3feefc-e2aa-401c-87db-4acf57debf12", "DetectTime": "2024-05-21T12:52:58.097087+00:00", "EventTime": "2024-05-21T12:52:58.097108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ljF42ctU2Ppv7OSk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "64ba47e9-9924-4db5-97dd-1ceb1c02fed8", "DetectTime": "2024-05-21T12:52:58.148260+00:00", "EventTime": "2024-05-21T12:52:58.148278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQquRo3LWcYcQUQp9a"], "accumulated_threat_level": 9.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "43fa34f5-ab11-4da0-b092-9611d697fd90", "DetectTime": "2024-05-21T12:52:58.203541+00:00", "EventTime": "2024-05-21T12:52:58.203566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdCoMk4hrrE9RlgXkh"], "accumulated_threat_level": 10.4, "timewindow": 181} +{"Format": "IDEA0", "ID": "e6bf20cc-9fb3-4e30-8435-56492796ed21", "DetectTime": "2024-05-21T12:52:58.255649+00:00", "EventTime": "2024-05-21T12:52:58.255667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrX98C4jjM38FBZhkj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 181} +{"Format": "IDEA0", "ID": "fe3b1b29-b605-4ae2-8fc6-b016eabf6a82", "DetectTime": "2024-05-21T12:52:58.296226+00:00", "EventTime": "2024-05-21T12:52:58.296244+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.54.229.42"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.54.229.42 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7DZB1eNmDMpxpsOg"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e9ab45cd-98a4-4b31-9b3b-a73e09da3ef7", "DetectTime": "2024-05-21T12:52:58.309460+00:00", "EventTime": "2024-05-21T12:52:58.309483+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.54.229.42"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.54.229.42 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7DZB1eNmDMpxpsOg"], "accumulated_threat_level": 5.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "f07974d8-0a51-48e6-939d-fac677cefc46", "DetectTime": "2024-05-21T12:52:58.323248+00:00", "EventTime": "2024-05-21T12:52:58.323269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctg3mj4kwPQMsQ24z3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 181} +{"Format": "Json", "ID": "f07974d8-0a51-48e6-939d-fac677cefc46", "DetectTime": "2024-05-21T12:52:58.323248+00:00", "EventTime": "2024-05-21T12:52:58.323269+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T12:19:22.734577+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2024/05/21 12:52:58.499041)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 181, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "467b372d-cdb5-4642-b977-d1c9a33513fa", "DetectTime": "2024-05-21T12:52:58.513606+00:00", "EventTime": "2024-05-21T12:52:58.513629+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.97.55"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7G15ElFKCtS1kolc"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "bbff27e9-1945-4a09-9ace-0d09dbc15b6f", "DetectTime": "2024-05-21T12:52:58.529397+00:00", "EventTime": "2024-05-21T12:52:58.529420+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7G15ElFKCtS1kolc"], "accumulated_threat_level": 5.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "23a85573-2691-4fab-a8db-57eba97f850d", "DetectTime": "2024-05-21T12:52:58.548400+00:00", "EventTime": "2024-05-21T12:52:58.548423+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COai0k2NGU0kx8gV9c"], "accumulated_threat_level": 0.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "cf2ca9e0-8f74-412a-9196-03a47f685d37", "DetectTime": "2024-05-21T12:52:58.562111+00:00", "EventTime": "2024-05-21T12:52:58.562129+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYS0ZG2rsnAc5MoPm8"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e43a999e-8168-4d22-aedf-5a3326fb3ba0", "DetectTime": "2024-05-21T12:52:58.577330+00:00", "EventTime": "2024-05-21T12:52:58.577351+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYS0ZG2rsnAc5MoPm8"], "accumulated_threat_level": 6.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "a29f8afe-bd66-4bda-a9b2-8e8a21ed41c7", "DetectTime": "2024-05-21T12:52:58.589419+00:00", "EventTime": "2024-05-21T12:52:58.589438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpRp5z3QVs4c8d8PWf"], "accumulated_threat_level": 1.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "6e024a16-7200-4b29-911c-6a3ecb7bd00a", "DetectTime": "2024-05-21T12:52:58.609106+00:00", "EventTime": "2024-05-21T12:52:58.609128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6esCx2jRn1KDo0Twg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 181} +{"Format": "IDEA0", "ID": "057054ca-f63c-4355-8fed-722fa1aa8960", "DetectTime": "2024-05-21T12:52:58.622395+00:00", "EventTime": "2024-05-21T12:52:58.622431+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.108.40.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE29KJ3HhT6A49D2H4"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "acf12e88-e34e-4acb-b380-3a4e31be1f67", "DetectTime": "2024-05-21T12:52:58.636033+00:00", "EventTime": "2024-05-21T12:52:58.636053+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE29KJ3HhT6A49D2H4"], "accumulated_threat_level": 6.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "7431068e-7e0e-4a4d-b9ee-e92bb7e9dbf5", "DetectTime": "2024-05-21T12:52:58.769172+00:00", "EventTime": "2024-05-21T12:52:58.769194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.61.86.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPWQd3arZYfldCvxg"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "5979db63-e391-495f-a3c6-0bf4a9d6fc44", "DetectTime": "2024-05-21T12:52:58.782687+00:00", "EventTime": "2024-05-21T12:52:58.782709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoPWQd3arZYfldCvxg"], "accumulated_threat_level": 7.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "76a65ba4-ada5-4e6a-bb2c-98d7c9802a26", "DetectTime": "2024-05-21T12:52:58.794372+00:00", "EventTime": "2024-05-21T12:52:58.794395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7U5ap2xL1tEkejZO4"], "accumulated_threat_level": 3.2, "timewindow": 181} +{"Format": "IDEA0", "ID": "dce27e1c-0ead-4fac-a2b2-4e80a8bb44d5", "DetectTime": "2024-05-21T12:52:58.826751+00:00", "EventTime": "2024-05-21T12:52:58.826770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxlKc2lG6d6ssTFR"], "accumulated_threat_level": 4.0, "timewindow": 181} +{"Format": "IDEA0", "ID": "9f24e59e-4f7e-4f7d-abdb-ee8a89af34ed", "DetectTime": "2024-05-21T12:52:58.866621+00:00", "EventTime": "2024-05-21T12:52:58.866644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvfrN64BJjLvgBrjk3"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "e0c89021-1f99-43b4-aa4c-eeffa7ba965c", "DetectTime": "2024-05-21T12:52:58.889868+00:00", "EventTime": "2024-05-21T12:52:58.889889+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.134.36.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.134.36.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYrKN3Kdd5fQxU3R1"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e6648832-65eb-4190-9cd4-6d2f1c635955", "DetectTime": "2024-05-21T12:52:58.904738+00:00", "EventTime": "2024-05-21T12:52:58.904760+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.134.36.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.134.36.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COYrKN3Kdd5fQxU3R1"], "accumulated_threat_level": 7.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "06cb7cea-a037-46a2-8ac6-0bc36743cfcd", "DetectTime": "2024-05-21T12:52:58.921554+00:00", "EventTime": "2024-05-21T12:52:58.921572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd8P102BgBbqvilzDj"], "accumulated_threat_level": 4.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "fb2db5e8-bbd2-4448-9996-4385c3c80e41", "DetectTime": "2024-05-21T12:52:59.061612+00:00", "EventTime": "2024-05-21T12:52:59.061640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvYhQ4VCwPAc8hVrd"], "accumulated_threat_level": 5.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "24a038ab-3644-4722-ae23-a87d3050602b", "DetectTime": "2024-05-21T12:52:59.115195+00:00", "EventTime": "2024-05-21T12:52:59.115214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55MaP2rHmmtSEHUcd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 181} +{"Format": "IDEA0", "ID": "cf96ff9c-9ff9-4dee-8649-b2dbff8e6b33", "DetectTime": "2024-05-21T12:52:59.173030+00:00", "EventTime": "2024-05-21T12:52:59.173053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYquk544IROg78Ncy8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "ac0e1c40-c9fb-4565-ad67-904ebc84db42", "DetectTime": "2024-05-21T12:52:59.450831+00:00", "EventTime": "2024-05-21T12:52:59.450851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xLNv3cydhW6xCCh3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "0a7ceee5-85de-424a-889d-0c2207345eca", "DetectTime": "2024-05-21T12:52:59.505258+00:00", "EventTime": "2024-05-21T12:52:59.505279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CexTNB3TV6k7s80fqg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "00c64919-fcc9-4c12-adc5-f2ec844cc377", "DetectTime": "2024-05-21T12:52:59.555855+00:00", "EventTime": "2024-05-21T12:52:59.555875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKuPn21gTc3dfrQuf"], "accumulated_threat_level": 9.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "abb29fd6-2916-4c45-995f-b7abae69992a", "DetectTime": "2024-05-21T12:52:59.606692+00:00", "EventTime": "2024-05-21T12:52:59.606727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC5Hb3jbGiUUzDhv4"], "accumulated_threat_level": 10.4, "timewindow": 181} +{"Format": "IDEA0", "ID": "b1d43f7d-7513-44a6-b082-2273d23d5aad", "DetectTime": "2024-05-21T12:52:59.655703+00:00", "EventTime": "2024-05-21T12:52:59.655735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxvvxu2YWBZxzaDtic"], "accumulated_threat_level": 11.200000000000001, "timewindow": 181} +{"Format": "IDEA0", "ID": "7b8bdd93-3279-463d-be16-4e5d315e65d5", "DetectTime": "2024-05-21T12:52:59.704848+00:00", "EventTime": "2024-05-21T12:52:59.704880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qJrz33Wm4MYs7gxl"], "accumulated_threat_level": 12.000000000000002, "timewindow": 181} +{"Format": "Json", "ID": "7b8bdd93-3279-463d-be16-4e5d315e65d5", "DetectTime": "2024-05-21T12:52:59.704848+00:00", "EventTime": "2024-05-21T12:52:59.704880+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-08T12:19:26.048234+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2024/05/21 12:52:59.882477)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 181, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cfb54d5f-0428-4f9b-89e5-a31f4532972b", "DetectTime": "2024-05-21T12:52:59.893887+00:00", "EventTime": "2024-05-21T12:52:59.893919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iQgx1RWWxXzSG008"], "accumulated_threat_level": 0.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "0e4e92f0-d32a-4b7b-a640-8720ef6cf43e", "DetectTime": "2024-05-21T12:53:00.133950+00:00", "EventTime": "2024-05-21T12:53:00.133973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtGnn43Ejd7MSkHX1f"], "accumulated_threat_level": 1.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "69a880c4-e47f-421d-a838-63b93ab79384", "DetectTime": "2024-05-21T12:53:00.166251+00:00", "EventTime": "2024-05-21T12:53:00.166274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaMRrl1tSKqFY67cu4"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "812eb89c-f4ac-4dd4-a9a5-12150b435c62", "DetectTime": "2024-05-21T12:53:00.228552+00:00", "EventTime": "2024-05-21T12:53:00.228572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrQpa4hcJLLYw1Pz"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 181} +{"Format": "IDEA0", "ID": "36e329a2-ac95-46d3-8f35-e795e4e72bbe", "DetectTime": "2024-05-21T12:53:00.286556+00:00", "EventTime": "2024-05-21T12:53:00.286578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nlDO1wMpV2z2uCq6"], "accumulated_threat_level": 3.2, "timewindow": 181} +{"Format": "IDEA0", "ID": "eb34f8c3-8465-4f38-bd93-685721d8d8e2", "DetectTime": "2024-05-21T12:53:00.448628+00:00", "EventTime": "2024-05-21T12:53:00.448654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbpk193GK4GhSwiRhi"], "accumulated_threat_level": 4.0, "timewindow": 181} +{"Format": "IDEA0", "ID": "ec60b924-ad5d-4a41-94e3-d73b7a2d06d6", "DetectTime": "2024-05-21T12:53:00.515447+00:00", "EventTime": "2024-05-21T12:53:00.515467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CabGWX3k4OpynjNYya"], "accumulated_threat_level": 4.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "b82c656c-c49e-4491-9a96-2fdbc5461768", "DetectTime": "2024-05-21T12:53:00.567292+00:00", "EventTime": "2024-05-21T12:53:00.567313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg9ISF14G9ijP9fnwf"], "accumulated_threat_level": 5.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "d5149c1f-cfeb-4ef4-b8be-ca69eb338e93", "DetectTime": "2024-05-21T12:53:00.846095+00:00", "EventTime": "2024-05-21T12:53:00.846120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgl8C64voNuh47Msi2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 181} +{"Format": "IDEA0", "ID": "8c6094f5-ba03-45a6-ae59-9f576561fef9", "DetectTime": "2024-05-21T12:53:00.894423+00:00", "EventTime": "2024-05-21T12:53:00.894442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcAU83wyvehF6eH36"], "accumulated_threat_level": 7.199999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "425dc3b2-099e-48a1-99ff-611b03f9cefd", "DetectTime": "2024-05-21T12:53:00.949351+00:00", "EventTime": "2024-05-21T12:53:00.949371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbfjlBKZ48bzAztIh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "563f566c-96b6-450e-b0d6-040e0224789d", "DetectTime": "2024-05-21T12:53:01.001341+00:00", "EventTime": "2024-05-21T12:53:01.001364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YBtI8hJ6pHhOaZ3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "104d3611-1c82-4716-86fe-6e01876ff1bd", "DetectTime": "2024-05-21T12:53:01.054279+00:00", "EventTime": "2024-05-21T12:53:01.054298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7aBsF1M3XepGwkYga"], "accumulated_threat_level": 9.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "6ba7bece-cf86-49a3-b70a-92331e910331", "DetectTime": "2024-05-21T12:53:01.059256+00:00", "EventTime": "2024-05-21T12:53:01.059280+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvO1iurgI0KuMd6b1", "C58YqF2EycQFvIudUj", "CHnvGU3qeXUgl3Qcvg", "Cs4c8A3e6aiXPjfwBc"], "accumulated_threat_level": 0.5, "timewindow": 205} +{"Format": "IDEA0", "ID": "2c582157-b7ee-4e20-afff-345ac2d70ef3", "DetectTime": "2024-05-21T12:53:01.118607+00:00", "EventTime": "2024-05-21T12:53:01.118626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWNBBd29F8cyXo5LOf"], "accumulated_threat_level": 10.4, "timewindow": 181} +{"Format": "IDEA0", "ID": "51db478d-0f16-4f31-9d2c-662f013f5b39", "DetectTime": "2024-05-21T12:53:01.377676+00:00", "EventTime": "2024-05-21T12:53:01.377700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctun7N3d3Y17LtbK86"], "accumulated_threat_level": 11.200000000000001, "timewindow": 181} +{"Format": "IDEA0", "ID": "127ad4ee-8a72-4760-a682-68d661db54d2", "DetectTime": "2024-05-21T12:53:01.406174+00:00", "EventTime": "2024-05-21T12:53:01.406204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfy1QP3nlUm6pmzDAl"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "0e858166-7700-41e3-b645-7c592655a6a0", "DetectTime": "2024-05-21T12:53:01.473391+00:00", "EventTime": "2024-05-21T12:53:01.473411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMU0G1ua0o8q7joBi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 181} +{"Format": "Json", "ID": "0e858166-7700-41e3-b645-7c592655a6a0", "DetectTime": "2024-05-21T12:53:01.473391+00:00", "EventTime": "2024-05-21T12:53:01.473411+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "1970-01-08T12:50:26.546387+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2024/05/21 12:53:01.707182)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 181, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "220f647d-83d2-4ca4-a4fa-2c23b7eab79b", "DetectTime": "2024-05-21T12:53:01.719278+00:00", "EventTime": "2024-05-21T12:53:01.719297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE5Pw618ZwAy9TTEYh"], "accumulated_threat_level": 0.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "1ce8c5ff-964f-4150-b17b-904ab3c2b0f3", "DetectTime": "2024-05-21T12:53:01.742098+00:00", "EventTime": "2024-05-21T12:53:01.742116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9PXnB18PFqtToUMtf"], "accumulated_threat_level": 1.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "0741df51-1206-46b9-9087-a9ba1d5892b7", "DetectTime": "2024-05-21T12:53:01.758490+00:00", "EventTime": "2024-05-21T12:53:01.758511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLoeIK1MLa9HZUHQV7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 181} +{"Format": "IDEA0", "ID": "6534beb5-2591-4c6d-a6c4-f7c8ed5b5544", "DetectTime": "2024-05-21T12:53:01.769999+00:00", "EventTime": "2024-05-21T12:53:01.770019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckaxwi281pmtaV9yeb"], "accumulated_threat_level": 3.2, "timewindow": 181} +{"Format": "IDEA0", "ID": "495206be-fc1a-4431-8bc8-93855cd9f813", "DetectTime": "2024-05-21T12:53:01.966721+00:00", "EventTime": "2024-05-21T12:53:01.966744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkerTbhSNitYb3bvd"], "accumulated_threat_level": 4.0, "timewindow": 181} +{"Format": "IDEA0", "ID": "f79a33ad-8964-4cc7-baa0-a57a93afd8f9", "DetectTime": "2024-05-21T12:53:02.020494+00:00", "EventTime": "2024-05-21T12:53:02.020514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcTmAeN23MwtSv5dk"], "accumulated_threat_level": 4.8, "timewindow": 181} +{"Format": "IDEA0", "ID": "38a60b6d-cf2a-4a74-b823-ec59eff71cb3", "DetectTime": "2024-05-21T12:53:02.072327+00:00", "EventTime": "2024-05-21T12:53:02.072346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXi11A3pKdkVFeL2ae"], "accumulated_threat_level": 5.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "2bbf1f87-e0ce-4c07-b050-0b6b963d9750", "DetectTime": "2024-05-21T12:53:02.125964+00:00", "EventTime": "2024-05-21T12:53:02.125983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXSEP3QGGbKzyYdb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 181} +{"Format": "IDEA0", "ID": "c004c8bc-29ef-483a-ba11-8d28a0d10d76", "DetectTime": "2024-05-21T12:53:02.175792+00:00", "EventTime": "2024-05-21T12:53:02.175811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPz4ym4ies4a5pQ6f9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "de1e8305-6e3c-4061-8a8a-fbacd8b16a2a", "DetectTime": "2024-05-21T12:53:02.227010+00:00", "EventTime": "2024-05-21T12:53:02.227032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQzLta4ynKgBI2pwYg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "770e4e6d-59d7-47fb-915c-503ca29cee54", "DetectTime": "2024-05-21T12:53:02.279643+00:00", "EventTime": "2024-05-21T12:53:02.279663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cogk5R1bIxL8u2KJU3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 181} +{"Format": "IDEA0", "ID": "dce8207d-2cd8-4851-94dc-8a615c70195c", "DetectTime": "2024-05-21T12:53:02.372953+00:00", "EventTime": "2024-05-21T12:53:02.372974+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["71.205.65.116"], "Type": ["CC"], "Port": [9711], "Proto": ["TCP"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "C&C channel, destination IP: 71.205.65.116 port: 9711/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbKzK51TAwgKz7MwPg"], "accumulated_threat_level": 0.524, "timewindow": 205} +{"Format": "IDEA0", "ID": "cb0b9f80-1168-4c9a-b8c7-3913dafc589b", "DetectTime": "2024-05-21T12:53:02.433362+00:00", "EventTime": "2024-05-21T12:53:02.433380+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["71.205.65.116"], "Type": ["CC"]}, {"IP4": ["71.205.65.116"], "Type": ["CC"], "Port": [9711], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 71.205.65.116 port: 9711/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbKzK51TAwgKz7MwPg"], "accumulated_threat_level": 0, "timewindow": 205} +{"Format": "IDEA0", "ID": "e95449ea-7af3-486d-bf3d-33d992def724", "DetectTime": "2024-05-21T12:53:02.563799+00:00", "EventTime": "2024-05-21T12:53:02.563823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeC1ak4oeKkY0CeEL4"], "accumulated_threat_level": 9.6, "timewindow": 181} +{"Format": "IDEA0", "ID": "8f589f8a-fd1e-43f4-967d-63d28b68bced", "DetectTime": "2024-05-21T12:53:02.710760+00:00", "EventTime": "2024-05-21T12:53:02.710780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjtV1f1e9kPGcRX3pb"], "accumulated_threat_level": 10.4, "timewindow": 181} +{"Format": "IDEA0", "ID": "0cb50b9d-6f48-4d1b-a97f-994a46eda257", "DetectTime": "2024-05-21T12:53:02.761919+00:00", "EventTime": "2024-05-21T12:53:02.761940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3RlC17BkHWDJbpj3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 181} +{"Format": "IDEA0", "ID": "ce69080a-db64-4515-8ee0-657080b888b3", "DetectTime": "2024-05-21T12:53:02.827358+00:00", "EventTime": "2024-05-21T12:53:02.827380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05Qub2lvFvvHOU357"], "accumulated_threat_level": 12.000000000000002, "timewindow": 181} +{"Format": "Json", "ID": "ce69080a-db64-4515-8ee0-657080b888b3", "DetectTime": "2024-05-21T12:53:02.827358+00:00", "EventTime": "2024-05-21T12:53:02.827380+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T12:59:05.596741+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 181. (real time 2024/05/21 12:53:03.341086)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 181, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "3dec6f3e-8874-4498-b507-1db77147f109", "DetectTime": "2024-05-21T12:53:03.345000+00:00", "EventTime": "2024-05-21T12:53:03.345018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CypNoQ9whvgCrNCqj"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "6914f818-dbca-44f9-9959-2459dde96185", "DetectTime": "2024-05-21T12:53:03.358089+00:00", "EventTime": "2024-05-21T12:53:03.358108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9lrH2BEZcNPaF2Kc"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "3e9a735b-e4f0-48d8-8e3f-4b1d260841a0", "DetectTime": "2024-05-21T12:53:03.369539+00:00", "EventTime": "2024-05-21T12:53:03.369558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C33L2tRyw53ZtVbGg"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "9c01e6b0-1ca3-45ce-a33a-b20d8a51fe6b", "DetectTime": "2024-05-21T12:53:03.391478+00:00", "EventTime": "2024-05-21T12:53:03.391496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugNE239wZRb7Tsx3b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 182} +{"Format": "IDEA0", "ID": "fe8ea8b0-f303-4528-b00f-cfe459b15edb", "DetectTime": "2024-05-21T12:53:03.402147+00:00", "EventTime": "2024-05-21T12:53:03.402166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzxXflgROwTE8fyvl"], "accumulated_threat_level": 3.2, "timewindow": 182} +{"Format": "IDEA0", "ID": "ecdd43c8-cdc7-4346-9a8c-2553f742e3ea", "DetectTime": "2024-05-21T12:53:03.413213+00:00", "EventTime": "2024-05-21T12:53:03.413230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIfZi82WDXb1bkC94f"], "accumulated_threat_level": 4.0, "timewindow": 182} +{"Format": "IDEA0", "ID": "4be1a328-0631-4d51-a5e6-cf9f909f4e43", "DetectTime": "2024-05-21T12:53:03.431158+00:00", "EventTime": "2024-05-21T12:53:03.431178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcwEMDzN9qxTzyiIa"], "accumulated_threat_level": 4.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "cd9645da-1ff3-4e95-a493-e59ad333989f", "DetectTime": "2024-05-21T12:53:03.480345+00:00", "EventTime": "2024-05-21T12:53:03.480364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxr47G2Qwmv3koWTmi"], "accumulated_threat_level": 5.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "7b1e3f05-f51f-4a17-9b59-2e10c9fcecd4", "DetectTime": "2024-05-21T12:53:03.529596+00:00", "EventTime": "2024-05-21T12:53:03.529623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkjyVCkJksOz58hk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 182} +{"Format": "IDEA0", "ID": "ef1e66c2-04be-4b55-8254-ed27d7074d07", "DetectTime": "2024-05-21T12:53:03.790340+00:00", "EventTime": "2024-05-21T12:53:03.790359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihP8E1g3dYEqY1f82"], "accumulated_threat_level": 7.199999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "3ef4b15a-7781-483c-9dcb-cc21441ff8c7", "DetectTime": "2024-05-21T12:53:03.842646+00:00", "EventTime": "2024-05-21T12:53:03.842667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcFVZL1eL8OW2QGe62"], "accumulated_threat_level": 7.999999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "2aee2104-96a1-4636-b209-0daab8745fa5", "DetectTime": "2024-05-21T12:53:03.893442+00:00", "EventTime": "2024-05-21T12:53:03.893463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpn6L94HzTJMp9xRH4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "dd765c24-0889-43d5-b280-302adb698f17", "DetectTime": "2024-05-21T12:53:03.946192+00:00", "EventTime": "2024-05-21T12:53:03.946214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CluB494GMHFYxS8ij4"], "accumulated_threat_level": 9.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "9dc09db9-1616-4331-8b84-abf8b32cf64b", "DetectTime": "2024-05-21T12:53:04.101059+00:00", "EventTime": "2024-05-21T12:53:04.101077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1C4rIhUmt7aWwva4"], "accumulated_threat_level": 10.4, "timewindow": 182} +{"Format": "IDEA0", "ID": "f6e3bc48-5f5c-40ae-9d00-8456bbdf8741", "DetectTime": "2024-05-21T12:53:04.152845+00:00", "EventTime": "2024-05-21T12:53:04.152864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoyqS1yZIdpHmc849"], "accumulated_threat_level": 11.200000000000001, "timewindow": 182} +{"Format": "IDEA0", "ID": "c6f396e3-f057-4eb6-a856-32a5f18ea166", "DetectTime": "2024-05-21T12:53:04.204975+00:00", "EventTime": "2024-05-21T12:53:04.204995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpc6BR2k5Pqsb39oI3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 182} +{"Format": "Json", "ID": "c6f396e3-f057-4eb6-a856-32a5f18ea166", "DetectTime": "2024-05-21T12:53:04.204975+00:00", "EventTime": "2024-05-21T12:53:04.204995+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T13:20:58.718429+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2024/05/21 12:53:04.372092)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 182, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a4977ad9-6838-42d0-b17e-f878101ccf14", "DetectTime": "2024-05-21T12:53:04.478705+00:00", "EventTime": "2024-05-21T12:53:04.478730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDDqZ2efrsn2hSSha"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "44bf9046-9fd5-4e96-b49a-fdada7cf9532", "DetectTime": "2024-05-21T12:53:04.514431+00:00", "EventTime": "2024-05-21T12:53:04.514453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca6DVD16aHjo0hNhD1"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "ecdba90e-97bc-4f0f-ba20-d5d10e83eb77", "DetectTime": "2024-05-21T12:53:04.565616+00:00", "EventTime": "2024-05-21T12:53:04.565636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CckbEv3pQP9m40YJFe"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "2b35c3a5-53ab-4b0d-965d-ce1d85f4b833", "DetectTime": "2024-05-21T12:53:04.612607+00:00", "EventTime": "2024-05-21T12:53:04.612626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnmJl4K67NsfQIabd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 182} +{"Format": "IDEA0", "ID": "ec6dfdbf-f376-4769-b727-0743abb37a68", "DetectTime": "2024-05-21T12:53:04.662597+00:00", "EventTime": "2024-05-21T12:53:04.662625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMOsQPT10NADZKWCb"], "accumulated_threat_level": 3.2, "timewindow": 182} +{"Format": "IDEA0", "ID": "b86635a7-87e9-4e78-be7f-55bb43cc5ffa", "DetectTime": "2024-05-21T12:53:04.720137+00:00", "EventTime": "2024-05-21T12:53:04.720162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CevJ1x1jahINNDduQ"], "accumulated_threat_level": 4.0, "timewindow": 182} +{"Format": "IDEA0", "ID": "d4918f41-58e8-47be-915d-c5932ed157d3", "DetectTime": "2024-05-21T12:53:04.769385+00:00", "EventTime": "2024-05-21T12:53:04.769407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEC0iQ1IMdCXxesHSe"], "accumulated_threat_level": 4.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "3f88d4f2-49c2-4c05-a1a0-c0f4ff8aa88a", "DetectTime": "2024-05-21T12:53:05.035939+00:00", "EventTime": "2024-05-21T12:53:05.035958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTVRv4MNfaJHixHlg"], "accumulated_threat_level": 5.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "44ffb70a-f2f9-47a0-8412-36fb4513d5d4", "DetectTime": "2024-05-21T12:53:05.089262+00:00", "EventTime": "2024-05-21T12:53:05.089283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOoa24ihkeZXclPB8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 182} +{"Format": "IDEA0", "ID": "3430027b-0c04-4dd2-bbcf-27228dedd003", "DetectTime": "2024-05-21T12:53:05.143647+00:00", "EventTime": "2024-05-21T12:53:05.143668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmPw1l1i53zyoAcS4i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "01f3bc07-a746-4d53-9cf8-fa1ad0fac6da", "DetectTime": "2024-05-21T12:53:05.191628+00:00", "EventTime": "2024-05-21T12:53:05.191654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkKOS2DN4bOLwfFHa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "adddb731-c7f4-45cf-b25d-2293832dda01", "DetectTime": "2024-05-21T12:53:05.245302+00:00", "EventTime": "2024-05-21T12:53:05.245325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEvP11aif7gnyThwg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "2a2867ff-832b-401d-9959-655ec99d7299", "DetectTime": "2024-05-21T12:53:05.297143+00:00", "EventTime": "2024-05-21T12:53:05.297163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwO1Wx1rVSyNydG1Li"], "accumulated_threat_level": 9.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "3250bd88-73e3-4ca8-9838-1ec4914fa0ec", "DetectTime": "2024-05-21T12:53:05.584809+00:00", "EventTime": "2024-05-21T12:53:05.584832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5kubFMRyD5NpCXc5"], "accumulated_threat_level": 10.4, "timewindow": 182} +{"Format": "IDEA0", "ID": "2da08ab4-cdd5-48cf-8cdb-a1abea899339", "DetectTime": "2024-05-21T12:53:05.632830+00:00", "EventTime": "2024-05-21T12:53:05.632851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPExzl2HE1VLAJXm69"], "accumulated_threat_level": 11.200000000000001, "timewindow": 182} +{"Format": "IDEA0", "ID": "4b50e38d-4ec8-4206-bd70-5f442175af00", "DetectTime": "2024-05-21T12:53:05.681914+00:00", "EventTime": "2024-05-21T12:53:05.681934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrtRF4mkvUzi39pTg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 182} +{"Format": "Json", "ID": "4b50e38d-4ec8-4206-bd70-5f442175af00", "DetectTime": "2024-05-21T12:53:05.681914+00:00", "EventTime": "2024-05-21T12:53:05.681934+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-08T13:21:03.023381+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2024/05/21 12:53:05.842620)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 182, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "00acccc1-d4c2-453f-9f9a-17b34079f161", "DetectTime": "2024-05-21T12:53:05.853903+00:00", "EventTime": "2024-05-21T12:53:05.853922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwTxdE2WKO5niTezHk"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "b27bf206-95ff-4525-9fcc-5c864f4ebcc2", "DetectTime": "2024-05-21T12:53:05.858644+00:00", "EventTime": "2024-05-21T12:53:05.858661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6iJ5wFJz6LTCaSLl"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "b9726056-fb1a-4f5e-9b3c-9748f7fcb2a3", "DetectTime": "2024-05-21T12:53:05.894820+00:00", "EventTime": "2024-05-21T12:53:05.894839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2HOWJ15hdNV5GhZ21"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8d39353d-aff7-42ef-8368-4409eff84fd6", "DetectTime": "2024-05-21T12:53:05.935090+00:00", "EventTime": "2024-05-21T12:53:05.935110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPALWC3snMRpBqGdl5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 182} +{"Format": "IDEA0", "ID": "ead5963b-ef8d-4ac5-b42e-8a43cce8b556", "DetectTime": "2024-05-21T12:53:06.212727+00:00", "EventTime": "2024-05-21T12:53:06.212747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDDDc4SKgg4RKmoyb"], "accumulated_threat_level": 3.2, "timewindow": 182} +{"Format": "IDEA0", "ID": "fc23f5d3-54d1-4828-a64f-d541d39801b9", "DetectTime": "2024-05-21T12:53:06.273089+00:00", "EventTime": "2024-05-21T12:53:06.273108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0Fvr49ouEXULpKZe"], "accumulated_threat_level": 4.0, "timewindow": 182} +{"Format": "IDEA0", "ID": "f036ba14-05d9-4bc9-96f9-2a966e1c6b47", "DetectTime": "2024-05-21T12:53:06.324192+00:00", "EventTime": "2024-05-21T12:53:06.324211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9F5Ia4mIrWBIGz5k4"], "accumulated_threat_level": 4.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "9b1b29e7-3489-425f-98d5-7c8b8572879b", "DetectTime": "2024-05-21T12:53:06.376913+00:00", "EventTime": "2024-05-21T12:53:06.376935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBC212q8sN62LLD9h"], "accumulated_threat_level": 5.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "ad2bce9e-713a-40e3-a6c7-2429c3940532", "DetectTime": "2024-05-21T12:53:06.428495+00:00", "EventTime": "2024-05-21T12:53:06.428515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CypfDC4hMTrA23LUv8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 182} +{"Format": "IDEA0", "ID": "3e426ce2-b687-496b-ac2d-8836f76394df", "DetectTime": "2024-05-21T12:53:06.480632+00:00", "EventTime": "2024-05-21T12:53:06.480653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMdEEoiZWpfjvVX8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "31d7e875-60a6-4085-9b4c-d7f0c6d905e7", "DetectTime": "2024-05-21T12:53:06.534162+00:00", "EventTime": "2024-05-21T12:53:06.534185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc4rgN3AysxDmG6pf5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "f92905bc-b875-4035-b9c2-1f4f909ecff4", "DetectTime": "2024-05-21T12:53:06.810550+00:00", "EventTime": "2024-05-21T12:53:06.810569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbY2bl3vr7u8z90N8d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "e119bda1-f5fc-4c79-a670-2be3c1a84e7c", "DetectTime": "2024-05-21T12:53:06.906796+00:00", "EventTime": "2024-05-21T12:53:06.906816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4Ma53VydruRw1rE"], "accumulated_threat_level": 9.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "34c60d19-207b-4b3d-ab97-894b97d75c37", "DetectTime": "2024-05-21T12:53:06.957453+00:00", "EventTime": "2024-05-21T12:53:06.957479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA4lxibRKFCyayU93"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "518a6a1a-c8dc-4b2c-9615-3db33a8f2310", "DetectTime": "2024-05-21T12:53:07.104345+00:00", "EventTime": "2024-05-21T12:53:07.104369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4ty14oscktKSkWo2"], "accumulated_threat_level": 10.4, "timewindow": 182} +{"Format": "IDEA0", "ID": "55329825-522a-447c-8672-f0a99d37b037", "DetectTime": "2024-05-21T12:53:07.189715+00:00", "EventTime": "2024-05-21T12:53:07.189740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmMW8A2Vo2Cbs5U6ql"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "818c4a40-8aa4-40f1-8456-84d475e3fdc9", "DetectTime": "2024-05-21T12:53:07.249384+00:00", "EventTime": "2024-05-21T12:53:07.249410+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COjRKi1p8MsLgXEo2e"], "accumulated_threat_level": 11.200000000000001, "timewindow": 182} +{"Format": "IDEA0", "ID": "42d89385-ce06-469e-b7c9-8cd3b324d1b7", "DetectTime": "2024-05-21T12:53:07.523080+00:00", "EventTime": "2024-05-21T12:53:07.523100+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUOYn61lXPi1n6ZzId"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "9a18a726-f7af-4767-aa42-62ad1afe8223", "DetectTime": "2024-05-21T12:53:07.527838+00:00", "EventTime": "2024-05-21T12:53:07.527857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJoSkp2F900Yp2Find"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "b1a5f84e-a71c-45b2-b3ee-544e38417150", "DetectTime": "2024-05-21T12:53:07.572663+00:00", "EventTime": "2024-05-21T12:53:07.572683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PU0U1vPArBa8vNab"], "accumulated_threat_level": 12.000000000000002, "timewindow": 182} +{"Format": "Json", "ID": "b1a5f84e-a71c-45b2-b3ee-544e38417150", "DetectTime": "2024-05-21T12:53:07.572663+00:00", "EventTime": "2024-05-21T12:53:07.572683+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "1970-01-08T13:51:35.046060+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2024/05/21 12:53:07.787590)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 182, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "aa27e4f7-e0c4-4950-a06f-6847589abefe", "DetectTime": "2024-05-21T12:53:07.793324+00:00", "EventTime": "2024-05-21T12:53:07.793347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpshgt2mh8F8AR6P82"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "f1ea1b35-535f-4b39-821e-bda585d897ee", "DetectTime": "2024-05-21T12:53:07.798242+00:00", "EventTime": "2024-05-21T12:53:07.798261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnRly30G9fKpGZ2Ld"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "456dacad-e865-41ca-87c4-d9b4ac6c167f", "DetectTime": "2024-05-21T12:53:07.810882+00:00", "EventTime": "2024-05-21T12:53:07.810901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1oopG4TeGXMFgSz21"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "85fe620a-a2bb-4149-b238-e638c1365331", "DetectTime": "2024-05-21T12:53:07.815698+00:00", "EventTime": "2024-05-21T12:53:07.815714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COwzD6RJP4HsOEE76"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "902fbe9d-8a14-4f4d-8064-27890d23a613", "DetectTime": "2024-05-21T12:53:08.049633+00:00", "EventTime": "2024-05-21T12:53:08.049663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYHfO81FZAdXxWvB4i"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "d28ece3c-3468-4bcd-819a-2894212a0c42", "DetectTime": "2024-05-21T12:53:08.105984+00:00", "EventTime": "2024-05-21T12:53:08.106002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9BmN1lYTj5cpUHF1"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "73c9d543-166f-4bc7-8311-f0912db5d33d", "DetectTime": "2024-05-21T12:53:08.110887+00:00", "EventTime": "2024-05-21T12:53:08.110906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Civj7i1N0kQoOHW0Y1"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "572fc390-4eaa-46da-9c99-49dde9a9c979", "DetectTime": "2024-05-21T12:53:08.180235+00:00", "EventTime": "2024-05-21T12:53:08.180255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLKHu4H4gecZ7rk4k"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "b382f0dc-bac6-4ba8-837e-17444479984e", "DetectTime": "2024-05-21T12:53:08.303903+00:00", "EventTime": "2024-05-21T12:53:08.303922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUsG72q1cglI0cig8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 182} +{"Format": "IDEA0", "ID": "cfc7abdc-ce49-494e-8c50-5e05617419a6", "DetectTime": "2024-05-21T12:53:08.310382+00:00", "EventTime": "2024-05-21T12:53:08.310402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGFLC7lMNmViBEfE8"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "8688dce9-670e-4239-b8b7-d38ade520b7f", "DetectTime": "2024-05-21T12:53:08.323580+00:00", "EventTime": "2024-05-21T12:53:08.323600+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Botnet"]}, {"IP4": ["71.205.65.116"], "Type": ["CC"], "Port": [9711], "Proto": ["TCP"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "C&C channel, destination IP: 71.205.65.116 port: 9711/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8VPvWU2CTMTfRnfe"], "accumulated_threat_level": 0.024, "timewindow": 206} +{"Format": "IDEA0", "ID": "dc48534e-9d46-4a34-8920-fae94cf9c117", "DetectTime": "2024-05-21T12:53:08.360439+00:00", "EventTime": "2024-05-21T12:53:08.360463+00:00", "Category": ["Intrusion.Botnet"], "Confidence": 0.03, "Source": [{"IP4": ["71.205.65.116"], "Type": ["CC"]}, {"IP4": ["71.205.65.116"], "Type": ["CC"], "Port": [9711], "Proto": ["TCP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "C&C channel, destination IP: 71.205.65.116 port: 9711/tcp score: 0.9933. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8VPvWU2CTMTfRnfe"], "accumulated_threat_level": 0, "timewindow": 206} +{"Format": "IDEA0", "ID": "33901f65-f06a-4b42-a73a-49de538098f7", "DetectTime": "2024-05-21T12:53:08.365851+00:00", "EventTime": "2024-05-21T12:53:08.365869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4hkDO23z2KUqYRHd4"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "ae33d86c-1b19-4cfd-a262-caeefaadf682", "DetectTime": "2024-05-21T12:53:08.405159+00:00", "EventTime": "2024-05-21T12:53:08.405179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1DyLo4aXJ6cQzlfhe"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "23a666c7-0943-4898-a90d-c17908f5ffaa", "DetectTime": "2024-05-21T12:53:08.666888+00:00", "EventTime": "2024-05-21T12:53:08.666909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw0NOW2nlawpHw1d2l"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "fafaeb53-2e7c-423b-8a2d-c85db84ac009", "DetectTime": "2024-05-21T12:53:08.755674+00:00", "EventTime": "2024-05-21T12:53:08.755697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnFpMS12VMkLzRa6oc"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "f999ba8b-df36-4ad5-8fe2-4d08309af0d1", "DetectTime": "2024-05-21T12:53:08.768641+00:00", "EventTime": "2024-05-21T12:53:08.768660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfG0P3wOBAoekK8gd"], "accumulated_threat_level": 3.2, "timewindow": 182} +{"Format": "IDEA0", "ID": "d7b96529-19a1-4e15-8478-07e24b9bf3dc", "DetectTime": "2024-05-21T12:53:08.808902+00:00", "EventTime": "2024-05-21T12:53:08.808925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiE5vfKVvAtINEc6h"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "618a703a-0386-4caa-acc4-a3ec4886cb66", "DetectTime": "2024-05-21T12:53:08.903048+00:00", "EventTime": "2024-05-21T12:53:08.903072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu0eXl2TDq1Rs8Jm1h"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "b3b3fa93-54b6-4aa4-bd3a-a3e58a46409b", "DetectTime": "2024-05-21T12:53:09.052282+00:00", "EventTime": "2024-05-21T12:53:09.052301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5YIaB3BUacDOXbGpc"], "accumulated_threat_level": 4.0, "timewindow": 182} +{"Format": "IDEA0", "ID": "f65486b4-c83f-4f21-94c1-84d89f3c5286", "DetectTime": "2024-05-21T12:53:09.057419+00:00", "EventTime": "2024-05-21T12:53:09.057438+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7qetM3D1dGup3iLl8"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "cb33f797-7b58-40be-ba2d-f9776465ed93", "DetectTime": "2024-05-21T12:53:09.313694+00:00", "EventTime": "2024-05-21T12:53:09.313717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNBueX2VlytSVpHjoe"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "6efe497f-160f-4b65-a26c-ec0f0e4e8b95", "DetectTime": "2024-05-21T12:53:09.361990+00:00", "EventTime": "2024-05-21T12:53:09.362008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2W8ePBQ9Cwj6WWQ7"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "377dd7da-b8d5-4568-9de9-9bb298220a80", "DetectTime": "2024-05-21T12:53:09.367750+00:00", "EventTime": "2024-05-21T12:53:09.367770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW5j564CQz1tsV1hdh"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "c2ccd702-ebbc-4faf-80f7-cfde0072d0f3", "DetectTime": "2024-05-21T12:53:09.506736+00:00", "EventTime": "2024-05-21T12:53:09.506759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1x1UT8yRqOB1jv5i"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "c7c40e2f-561a-4c50-8c38-f6fc32639473", "DetectTime": "2024-05-21T12:53:09.520035+00:00", "EventTime": "2024-05-21T12:53:09.520053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGkC849tKjCrh4zvb"], "accumulated_threat_level": 4.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "2a7900e5-b138-4835-bc28-d2abfe7e36f9", "DetectTime": "2024-05-21T12:53:09.524663+00:00", "EventTime": "2024-05-21T12:53:09.524680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AFys1CjwKoreSYT7"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "6f4ea10f-fe1a-4e25-8198-13e5422f7fb1", "DetectTime": "2024-05-21T12:53:09.813585+00:00", "EventTime": "2024-05-21T12:53:09.813608+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBF9E47T49U2LECQk"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "6575082a-0dfd-4231-ab9d-fb4fd7e26f8d", "DetectTime": "2024-05-21T12:53:09.823257+00:00", "EventTime": "2024-05-21T12:53:09.823277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBq7rE15PImHFPBGq1"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "b46953cf-2c04-4983-a487-93bcdf502a61", "DetectTime": "2024-05-21T12:53:09.916422+00:00", "EventTime": "2024-05-21T12:53:09.916444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGaZTg4bZEncVwv0q2"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "e5fee02c-faf7-4fc7-b1eb-6725b2ad5411", "DetectTime": "2024-05-21T12:53:10.076316+00:00", "EventTime": "2024-05-21T12:53:10.076337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbTUKk5vtaxDDOCS2"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "cf226a40-2395-41ad-a55c-8aad3319fef0", "DetectTime": "2024-05-21T12:53:10.094303+00:00", "EventTime": "2024-05-21T12:53:10.094327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtByM03SZBAF3ldWv5"], "accumulated_threat_level": 5.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "a41d0186-1bdb-417f-90a1-b5f74b08380d", "DetectTime": "2024-05-21T12:53:10.100619+00:00", "EventTime": "2024-05-21T12:53:10.100640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwx8S51QKT5LOXJIzj"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "2ffb5186-6e6c-444a-816b-e97bc32fd7ae", "DetectTime": "2024-05-21T12:53:10.130747+00:00", "EventTime": "2024-05-21T12:53:10.130769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBj6z94ZabLPLIBz3k"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "20e74534-654f-4935-9c66-30dc773a84ec", "DetectTime": "2024-05-21T12:53:10.598078+00:00", "EventTime": "2024-05-21T12:53:10.598097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDs3ea1ESa40OocAeh"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "351144c2-43c5-4e95-a4a4-a127bba8c3e1", "DetectTime": "2024-05-21T12:53:10.629061+00:00", "EventTime": "2024-05-21T12:53:10.629084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRqEG11BApT5Qu6oa6"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "903d45f5-4e67-49a3-a59d-478783a1a0ac", "DetectTime": "2024-05-21T12:53:10.720677+00:00", "EventTime": "2024-05-21T12:53:10.720696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoWyO1V8wRi0H2iwa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 182} +{"Format": "IDEA0", "ID": "0e8f976d-34ce-490a-b543-e77a27576182", "DetectTime": "2024-05-21T12:53:10.725664+00:00", "EventTime": "2024-05-21T12:53:10.725683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyRuIA1cXSVoIyxwHl"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "00fb40f7-95aa-40ab-b3d9-98e1f7b37e46", "DetectTime": "2024-05-21T12:53:10.812627+00:00", "EventTime": "2024-05-21T12:53:10.812650+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CewtCg3sA8U7KPLGXg"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "b6e2358c-be4a-4d3a-bcd6-752cf120a1de", "DetectTime": "2024-05-21T12:53:10.820028+00:00", "EventTime": "2024-05-21T12:53:10.820048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPm6I2fZ1IKAbfyHh"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "e1486d89-499c-4533-8de3-f9143f3159d7", "DetectTime": "2024-05-21T12:53:10.824700+00:00", "EventTime": "2024-05-21T12:53:10.824719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFCnWO1RgmRMlV7THl"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "4de9e57a-7cd7-4d61-97a1-fb0d2817837b", "DetectTime": "2024-05-21T12:53:11.234448+00:00", "EventTime": "2024-05-21T12:53:11.234467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVOCb3HnRnvroBlLf"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "23b6aa42-2bd9-4a89-890f-656f9b64e738", "DetectTime": "2024-05-21T12:53:11.287056+00:00", "EventTime": "2024-05-21T12:53:11.287074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCbPa2rxZHtQmCklh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "56cc08c4-baf1-4b69-83da-be3bcd73d48d", "DetectTime": "2024-05-21T12:53:11.328925+00:00", "EventTime": "2024-05-21T12:53:11.328944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5E8d6G2hhSO1n5Ah"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "1d541c15-b82b-4746-af15-44f6a769375f", "DetectTime": "2024-05-21T12:53:11.336572+00:00", "EventTime": "2024-05-21T12:53:11.336591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJau68mJU6EEDla6j"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "297647aa-4f0a-4401-af71-dd1ad93ef6b6", "DetectTime": "2024-05-21T12:53:11.342229+00:00", "EventTime": "2024-05-21T12:53:11.342251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdbhubmfjDYSvI5G5"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "9f99bd32-c4b7-4134-8e3f-b6baee86013f", "DetectTime": "2024-05-21T12:53:11.362796+00:00", "EventTime": "2024-05-21T12:53:11.362817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWwrUF4sA2O9Cmf6Dj"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "966232e3-686c-45ee-ab51-ba8251f1a282", "DetectTime": "2024-05-21T12:53:11.468377+00:00", "EventTime": "2024-05-21T12:53:11.468399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzePLFpP3yBGaGOk7"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "6bec1db5-c25e-4254-946c-41d98a536607", "DetectTime": "2024-05-21T12:53:11.649767+00:00", "EventTime": "2024-05-21T12:53:11.649785+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGbxa4H7C0HWnBKsf"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "ce949d7a-eac7-4082-a33d-54e534e50d2d", "DetectTime": "2024-05-21T12:53:11.663569+00:00", "EventTime": "2024-05-21T12:53:11.663593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkGbxa4H7C0HWnBKsf"], "accumulated_threat_level": 8.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "ca73d47e-47d9-48a7-bd8f-42b91222d004", "DetectTime": "2024-05-21T12:53:11.774486+00:00", "EventTime": "2024-05-21T12:53:11.774505+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.139.188.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnBBh9iV1UnzYgr3"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "c923bdb6-8b56-45e5-a495-c89f3582bcc0", "DetectTime": "2024-05-21T12:53:11.790400+00:00", "EventTime": "2024-05-21T12:53:11.790443+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnBBh9iV1UnzYgr3"], "accumulated_threat_level": 8.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "e5c2b1ed-b3be-4070-ab84-4a8deb0e4d92", "DetectTime": "2024-05-21T12:53:11.819560+00:00", "EventTime": "2024-05-21T12:53:11.819577+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.132.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.132.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oCSTg8WU5QFzpSa"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "dfb3f250-6afb-4a3f-a35c-34c3079b6361", "DetectTime": "2024-05-21T12:53:11.832126+00:00", "EventTime": "2024-05-21T12:53:11.832145+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.132.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.132.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8oCSTg8WU5QFzpSa"], "accumulated_threat_level": 9.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "25e6200f-4066-4f40-881e-c9f682785c77", "DetectTime": "2024-05-21T12:53:11.864004+00:00", "EventTime": "2024-05-21T12:53:11.864023+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.73.4.190"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.73.4.190 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1l6THbA5o2rXwP09"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "a05f472e-4c82-4c6b-b053-7194eef7d04f", "DetectTime": "2024-05-21T12:53:11.878195+00:00", "EventTime": "2024-05-21T12:53:11.878225+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.73.4.190"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.73.4.190 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1l6THbA5o2rXwP09"], "accumulated_threat_level": 9.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "c0c722d2-0b0d-463d-8dc9-449a1929feb1", "DetectTime": "2024-05-21T12:53:11.883160+00:00", "EventTime": "2024-05-21T12:53:11.883178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEPpJ1nuDf0NxUOkh"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "41f5105c-6113-4f54-bc52-3d75b4a8a113", "DetectTime": "2024-05-21T12:53:11.908331+00:00", "EventTime": "2024-05-21T12:53:11.908356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNWUO44OOJPLDwHa"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "c71014b2-e117-40a2-9f22-6ffd355edb8d", "DetectTime": "2024-05-21T12:53:11.925591+00:00", "EventTime": "2024-05-21T12:53:11.925611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C93V3PS5d3Zad9Nw9"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "c7e23f37-0a52-4693-a3a2-eb12b61813d3", "DetectTime": "2024-05-21T12:53:11.970535+00:00", "EventTime": "2024-05-21T12:53:11.970557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUBlC4Hn7BRrEE8ya"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "0c34abbc-03c9-443a-8500-fa420dc7d7b6", "DetectTime": "2024-05-21T12:53:12.059533+00:00", "EventTime": "2024-05-21T12:53:12.059556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wbo22gS5bqidOlb1"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "0a5aa972-8af5-4681-9b3a-6f1688ba48c5", "DetectTime": "2024-05-21T12:53:12.069463+00:00", "EventTime": "2024-05-21T12:53:12.069485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm9m8PeodWTQQmRWl"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "28869554-5818-40d0-9f63-8334c02b4c23", "DetectTime": "2024-05-21T12:53:12.187227+00:00", "EventTime": "2024-05-21T12:53:12.187247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.72.219.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8Ook4BDqeMkRlvh7"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "7e8180d2-41fc-4d06-be50-ff8dcc474cec", "DetectTime": "2024-05-21T12:53:12.200704+00:00", "EventTime": "2024-05-21T12:53:12.200725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW8Ook4BDqeMkRlvh7"], "accumulated_threat_level": 10.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e14292a0-ecdb-4813-abfc-8788257334b0", "DetectTime": "2024-05-21T12:53:12.229469+00:00", "EventTime": "2024-05-21T12:53:12.229489+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.254.84.17"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqTwZ2P7IxcivlqLj"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "b1204a82-3c5d-40b4-b445-35c1c2cd020c", "DetectTime": "2024-05-21T12:53:12.242057+00:00", "EventTime": "2024-05-21T12:53:12.242075+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVqTwZ2P7IxcivlqLj"], "accumulated_threat_level": 10.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "dcec3beb-c607-4dd1-90e8-cb1950abd663", "DetectTime": "2024-05-21T12:53:12.271254+00:00", "EventTime": "2024-05-21T12:53:12.271272+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.140.158.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OABo2V4KUGaQ5iu"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "d85e721d-0d72-4aff-96ed-45dafd767dac", "DetectTime": "2024-05-21T12:53:12.283123+00:00", "EventTime": "2024-05-21T12:53:12.283142+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9OABo2V4KUGaQ5iu"], "accumulated_threat_level": 11.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "f48a821c-f49c-4974-93bc-1b63cd0ace22", "DetectTime": "2024-05-21T12:53:12.329865+00:00", "EventTime": "2024-05-21T12:53:12.329886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVfgFw13XlaxpXajGd"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "335c46ae-b7d3-4c58-9e27-371784c0b4b8", "DetectTime": "2024-05-21T12:53:12.368885+00:00", "EventTime": "2024-05-21T12:53:12.368903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3c8N3fBiTyvGj9nl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "eebd99e7-ba2f-42d7-8c2f-13f6bf5ac2d1", "DetectTime": "2024-05-21T12:53:12.632637+00:00", "EventTime": "2024-05-21T12:53:12.632658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5jVOv4G8PiRlipmc7"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "4e6c391f-812e-4d4d-9fcb-867a3d5062bd", "DetectTime": "2024-05-21T12:53:12.637665+00:00", "EventTime": "2024-05-21T12:53:12.637689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1rUX2u2Q94AQz1Bj"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "ac441da1-8850-4974-a15f-8a167df7824e", "DetectTime": "2024-05-21T12:53:12.675990+00:00", "EventTime": "2024-05-21T12:53:12.676011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUdpk1Nts7pjr5wzl"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "b43b5c09-0d2c-46d4-a71e-06d5f1727201", "DetectTime": "2024-05-21T12:53:12.989630+00:00", "EventTime": "2024-05-21T12:53:12.989653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIUBb20No3eWG5TLk"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "7107edfe-6672-44a2-a617-686396256cc5", "DetectTime": "2024-05-21T12:53:13.013921+00:00", "EventTime": "2024-05-21T12:53:13.013944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMYLEY1ovcet4YdsDk"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "c2494280-d174-436b-a455-286e16bcf018", "DetectTime": "2024-05-21T12:53:13.040189+00:00", "EventTime": "2024-05-21T12:53:13.040212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZw7v2bWrcarc11I7"], "accumulated_threat_level": 0.8, "timewindow": 180} +{"Format": "IDEA0", "ID": "49b03e50-0235-4bda-bc7d-15c0c42891df", "DetectTime": "2024-05-21T12:53:13.053631+00:00", "EventTime": "2024-05-21T12:53:13.053651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLYHd3Vrxg2BHncg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 182} +{"Format": "IDEA0", "ID": "ae22148a-a47e-463d-89e9-e57d3f9664df", "DetectTime": "2024-05-21T12:53:13.119997+00:00", "EventTime": "2024-05-21T12:53:13.120018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDMRxUDqEQdDp2zw1"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "3cbad1c5-643a-4bb9-9769-4f50eae0b863", "DetectTime": "2024-05-21T12:53:13.227601+00:00", "EventTime": "2024-05-21T12:53:13.227621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxkG1xN7bNE78Wt8b"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "e18bfeb0-38f5-4f8b-8038-57e9f669fe44", "DetectTime": "2024-05-21T12:53:13.232609+00:00", "EventTime": "2024-05-21T12:53:13.232631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK1CZN1iHubd5dPmia"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a03d5986-52d8-40e9-889b-00025076ebb6", "DetectTime": "2024-05-21T12:53:13.562298+00:00", "EventTime": "2024-05-21T12:53:13.562322+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoxrG3QNuSMs7ELe7"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "1c1757eb-19f0-47b1-805e-72e6ca235a08", "DetectTime": "2024-05-21T12:53:13.609868+00:00", "EventTime": "2024-05-21T12:53:13.609891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ljF42ctU2Ppv7OSk"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "78464a4c-a6cb-4c02-9946-9c6c3471b764", "DetectTime": "2024-05-21T12:53:13.633703+00:00", "EventTime": "2024-05-21T12:53:13.633723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vFBy3ssktxuaQle8"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "238ecb5b-84a4-4cbb-8144-cc93fb9b234b", "DetectTime": "2024-05-21T12:53:13.641952+00:00", "EventTime": "2024-05-21T12:53:13.641974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQquRo3LWcYcQUQp9a"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "26fcf6b5-3c8e-487a-9395-30ece1cdc9eb", "DetectTime": "2024-05-21T12:53:13.665479+00:00", "EventTime": "2024-05-21T12:53:13.665499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauX5z4wONh52D95u8"], "accumulated_threat_level": 9.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "b2f581d6-2e9b-4135-a886-7cbe66dc9052", "DetectTime": "2024-05-21T12:53:13.765643+00:00", "EventTime": "2024-05-21T12:53:13.765665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdCoMk4hrrE9RlgXkh"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "e231ab1c-1907-418a-9398-ff37684cb6a8", "DetectTime": "2024-05-21T12:53:13.770734+00:00", "EventTime": "2024-05-21T12:53:13.770755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COai0k2NGU0kx8gV9c"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "7b8af6f4-f48e-4393-9318-a659eb5f75ef", "DetectTime": "2024-05-21T12:53:13.785668+00:00", "EventTime": "2024-05-21T12:53:13.785690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpRp5z3QVs4c8d8PWf"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "22808447-92ac-4efd-b068-9ad69a8ce7f7", "DetectTime": "2024-05-21T12:53:14.345316+00:00", "EventTime": "2024-05-21T12:53:14.345336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrX98C4jjM38FBZhkj"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "8b0c3717-611d-478b-9efc-d91f34f11bb3", "DetectTime": "2024-05-21T12:53:14.350658+00:00", "EventTime": "2024-05-21T12:53:14.350678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd8P102BgBbqvilzDj"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "5a804b41-84ba-4a7f-8fe2-99ee1216a1ec", "DetectTime": "2024-05-21T12:53:14.356437+00:00", "EventTime": "2024-05-21T12:53:14.356457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6esCx2jRn1KDo0Twg"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a817e8f8-3d02-4259-b424-0d6fdd94c49f", "DetectTime": "2024-05-21T12:53:14.364737+00:00", "EventTime": "2024-05-21T12:53:14.364760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7U5ap2xL1tEkejZO4"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "b81c32c8-74f8-4b7f-825b-fb998ffb4636", "DetectTime": "2024-05-21T12:53:14.369733+00:00", "EventTime": "2024-05-21T12:53:14.369754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvYhQ4VCwPAc8hVrd"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "050280ea-e058-41f0-b2bd-34697abbb0dc", "DetectTime": "2024-05-21T12:53:14.374277+00:00", "EventTime": "2024-05-21T12:53:14.374295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctg3mj4kwPQMsQ24z3"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "b8c30caf-d041-45c7-8aec-b12d236f4423", "DetectTime": "2024-05-21T12:53:14.381777+00:00", "EventTime": "2024-05-21T12:53:14.381798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmxlKc2lG6d6ssTFR"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a5d7a486-8707-48d4-a353-6b8fc601899d", "DetectTime": "2024-05-21T12:53:14.400999+00:00", "EventTime": "2024-05-21T12:53:14.401024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55MaP2rHmmtSEHUcd"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "fb7e5b58-30da-428f-bb29-84e01c3e1629", "DetectTime": "2024-05-21T12:53:14.654923+00:00", "EventTime": "2024-05-21T12:53:14.654949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7i9J62cD9HOmAqUQ4"], "accumulated_threat_level": 10.4, "timewindow": 182} +{"Format": "IDEA0", "ID": "d0569d99-f34d-435e-bfde-706ae7ed2fe7", "DetectTime": "2024-05-21T12:53:15.182831+00:00", "EventTime": "2024-05-21T12:53:15.182853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CexTNB3TV6k7s80fqg"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a877a42d-c314-4c94-b743-44ed5d8552df", "DetectTime": "2024-05-21T12:53:15.187770+00:00", "EventTime": "2024-05-21T12:53:15.187791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKuPn21gTc3dfrQuf"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "20d5de9a-d5ad-4e84-9fb5-d30ce02b0604", "DetectTime": "2024-05-21T12:53:15.199813+00:00", "EventTime": "2024-05-21T12:53:15.199835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2xLNv3cydhW6xCCh3"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "3126784b-c4fb-4781-a767-6ae93b7bf18f", "DetectTime": "2024-05-21T12:53:15.246557+00:00", "EventTime": "2024-05-21T12:53:15.246578+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1qJrz33Wm4MYs7gxl"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "31c9c403-9b89-4abf-882c-efe4e830fb4c", "DetectTime": "2024-05-21T12:53:15.256612+00:00", "EventTime": "2024-05-21T12:53:15.256633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC5Hb3jbGiUUzDhv4"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "461e20bf-3c08-446b-8b16-f43d1336f5ad", "DetectTime": "2024-05-21T12:53:15.293925+00:00", "EventTime": "2024-05-21T12:53:15.293947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxvvxu2YWBZxzaDtic"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "46814ec5-c74e-479a-97b9-f0f91d92ab36", "DetectTime": "2024-05-21T12:53:15.798447+00:00", "EventTime": "2024-05-21T12:53:15.798469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV7al2btcm4fnC2Sk"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "3114bc30-eee8-4b97-ae9f-3421cd2fd6f3", "DetectTime": "2024-05-21T12:53:15.861254+00:00", "EventTime": "2024-05-21T12:53:15.861277+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtGnn43Ejd7MSkHX1f"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "545d9fcb-0490-4f1d-be85-8147c48f2db8", "DetectTime": "2024-05-21T12:53:15.881288+00:00", "EventTime": "2024-05-21T12:53:15.881308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWabjURUUHN0iat7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 182} +{"Format": "IDEA0", "ID": "5dbceb64-1917-4377-8cec-8f5948a71d46", "DetectTime": "2024-05-21T12:53:15.935582+00:00", "EventTime": "2024-05-21T12:53:15.935605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZneNZ2XeTbZ2NxSk8"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a97f6327-dc84-4ab1-afa6-5292c601305a", "DetectTime": "2024-05-21T12:53:15.941051+00:00", "EventTime": "2024-05-21T12:53:15.941070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYquk544IROg78Ncy8"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "803bd9f0-7b63-40a6-9af2-278139f4513d", "DetectTime": "2024-05-21T12:53:16.014572+00:00", "EventTime": "2024-05-21T12:53:16.014595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPrQpa4hcJLLYw1Pz"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "f6ee337b-b97f-4f77-b740-e0e8ace8cae2", "DetectTime": "2024-05-21T12:53:16.021238+00:00", "EventTime": "2024-05-21T12:53:16.021260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CabGWX3k4OpynjNYya"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "3482153d-a5c1-437e-9cfc-9b1f562202a1", "DetectTime": "2024-05-21T12:53:16.029033+00:00", "EventTime": "2024-05-21T12:53:16.029052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbpk193GK4GhSwiRhi"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "353218f5-6cea-469c-9afd-0289d285bd8f", "DetectTime": "2024-05-21T12:53:16.035576+00:00", "EventTime": "2024-05-21T12:53:16.035597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7nlDO1wMpV2z2uCq6"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "8e324945-b320-4359-9b18-23785c81121f", "DetectTime": "2024-05-21T12:53:16.041270+00:00", "EventTime": "2024-05-21T12:53:16.041288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg9ISF14G9ijP9fnwf"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "1dd243bc-bb87-445e-83d7-d40f1cc34256", "DetectTime": "2024-05-21T12:53:16.334716+00:00", "EventTime": "2024-05-21T12:53:16.334738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0iQgx1RWWxXzSG008"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "290f0b64-29f0-484f-ab0d-799c0c276e1b", "DetectTime": "2024-05-21T12:53:16.768828+00:00", "EventTime": "2024-05-21T12:53:16.768846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwcAU83wyvehF6eH36"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "08026121-c5ff-454d-b4c0-6901ee5c7354", "DetectTime": "2024-05-21T12:53:16.794444+00:00", "EventTime": "2024-05-21T12:53:16.794463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbfjlBKZ48bzAztIh"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a07dfd2e-9a89-4e61-8298-df9a70aa9a7a", "DetectTime": "2024-05-21T12:53:16.832163+00:00", "EventTime": "2024-05-21T12:53:16.832184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgl8C64voNuh47Msi2"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "89cf6fd1-e85c-4176-acc3-7731ba37211e", "DetectTime": "2024-05-21T12:53:16.848862+00:00", "EventTime": "2024-05-21T12:53:16.848887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2YBtI8hJ6pHhOaZ3"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "0c4d1dbc-5fcf-4b59-b3f2-04adadd0895e", "DetectTime": "2024-05-21T12:53:16.895814+00:00", "EventTime": "2024-05-21T12:53:16.895832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQebqdmaVB9T3lPL6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 182} +{"Format": "Json", "ID": "0c4d1dbc-5fcf-4b59-b3f2-04adadd0895e", "DetectTime": "2024-05-21T12:53:16.895814+00:00", "EventTime": "2024-05-21T12:53:16.895832+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "1970-01-08T13:51:38.524538+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 182. (real time 2024/05/21 12:53:17.117294)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 182, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c570a19b-52ee-4d82-9bc6-7bf89dcbf4cb", "DetectTime": "2024-05-21T12:53:17.121992+00:00", "EventTime": "2024-05-21T12:53:17.122009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwMU0G1ua0o8q7joBi"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "5e15c211-0030-4d53-a412-8dcda8b5309e", "DetectTime": "2024-05-21T12:53:17.126240+00:00", "EventTime": "2024-05-21T12:53:17.126258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLoeIK1MLa9HZUHQV7"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "244a76d8-9125-43f9-831e-689e55b73a56", "DetectTime": "2024-05-21T12:53:17.160966+00:00", "EventTime": "2024-05-21T12:53:17.160988+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7aBsF1M3XepGwkYga"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "e8d5884a-b1dc-4ae3-87e5-b66821bd1d10", "DetectTime": "2024-05-21T12:53:17.471973+00:00", "EventTime": "2024-05-21T12:53:17.471996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE5Pw618ZwAy9TTEYh"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "82f3b98b-c37c-494e-939f-292ee421676d", "DetectTime": "2024-05-21T12:53:17.478249+00:00", "EventTime": "2024-05-21T12:53:17.478268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9PXnB18PFqtToUMtf"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "c234e55d-993d-4817-8213-b10a7265096c", "DetectTime": "2024-05-21T12:53:17.493888+00:00", "EventTime": "2024-05-21T12:53:17.493910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWNBBd29F8cyXo5LOf"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "ee6b1955-e820-4944-871a-2aac77b20ce2", "DetectTime": "2024-05-21T12:53:17.608630+00:00", "EventTime": "2024-05-21T12:53:17.608654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctun7N3d3Y17LtbK86"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "a3f47bc3-3ed3-454d-b3e8-60eab354a83f", "DetectTime": "2024-05-21T12:53:17.712200+00:00", "EventTime": "2024-05-21T12:53:17.712221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXi11A3pKdkVFeL2ae"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "760d5e2f-e6cf-43e0-ac51-11ea5240f0f4", "DetectTime": "2024-05-21T12:53:17.726151+00:00", "EventTime": "2024-05-21T12:53:17.726173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckaxwi281pmtaV9yeb"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "3f2647bc-ec30-47f4-bd2c-f91eb839caff", "DetectTime": "2024-05-21T12:53:17.731455+00:00", "EventTime": "2024-05-21T12:53:17.731477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkerTbhSNitYb3bvd"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "e0a9c049-9421-4875-95a7-e1faf8ca2a14", "DetectTime": "2024-05-21T12:53:17.939649+00:00", "EventTime": "2024-05-21T12:53:17.939670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcTmAeN23MwtSv5dk"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "5b97867d-a1e9-4535-9688-65b11efe622a", "DetectTime": "2024-05-21T12:53:17.958840+00:00", "EventTime": "2024-05-21T12:53:17.958861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQzLta4ynKgBI2pwYg"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "527d1115-343f-48fa-8a6a-291cc7263e76", "DetectTime": "2024-05-21T12:53:18.009497+00:00", "EventTime": "2024-05-21T12:53:18.009525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZnBbG2d8tI5eUsjs7"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "de551d4e-6305-4b5a-a2bc-0780cd1a9e8b", "DetectTime": "2024-05-21T12:53:18.189270+00:00", "EventTime": "2024-05-21T12:53:18.189291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYXSEP3QGGbKzyYdb"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "6ee33c25-4945-48bb-a3a5-7c6ae1de0bbd", "DetectTime": "2024-05-21T12:53:18.194190+00:00", "EventTime": "2024-05-21T12:53:18.194211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPz4ym4ies4a5pQ6f9"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "aca6fd5e-c2c8-4d7f-ae50-16c6f99dda37", "DetectTime": "2024-05-21T12:53:18.468281+00:00", "EventTime": "2024-05-21T12:53:18.468304+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cogk5R1bIxL8u2KJU3"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "c1e89a1b-564a-4146-b540-b657f8fed847", "DetectTime": "2024-05-21T12:53:18.476872+00:00", "EventTime": "2024-05-21T12:53:18.476891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3RlC17BkHWDJbpj3"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "d0965cf2-10bf-4768-8d8b-08317df07da4", "DetectTime": "2024-05-21T12:53:18.519191+00:00", "EventTime": "2024-05-21T12:53:18.519211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeC1ak4oeKkY0CeEL4"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "984ff732-75f8-4cd6-a69a-925a08cea72f", "DetectTime": "2024-05-21T12:53:18.564838+00:00", "EventTime": "2024-05-21T12:53:18.564863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9lrH2BEZcNPaF2Kc"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "8469a9a3-57c4-409d-bc42-7d8040ccab33", "DetectTime": "2024-05-21T12:53:18.594909+00:00", "EventTime": "2024-05-21T12:53:18.594931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjtV1f1e9kPGcRX3pb"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "7ba42798-c680-4faf-a3ed-b238e641f41d", "DetectTime": "2024-05-21T12:53:18.787592+00:00", "EventTime": "2024-05-21T12:53:18.787613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzxXflgROwTE8fyvl"], "accumulated_threat_level": 0.8, "timewindow": 182} +{"Format": "IDEA0", "ID": "674527a0-b14d-45b6-81d4-0949064a1a2f", "DetectTime": "2024-05-21T12:53:18.875844+00:00", "EventTime": "2024-05-21T12:53:18.875863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRgEX2PFDO3pvQqPj"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "1bfc39fb-8c79-4b80-8d35-9b29040aa1c3", "DetectTime": "2024-05-21T12:53:18.881005+00:00", "EventTime": "2024-05-21T12:53:18.881024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIfZi82WDXb1bkC94f"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "a2b2f052-300d-4d4e-a318-de0206aadfcd", "DetectTime": "2024-05-21T12:53:19.069663+00:00", "EventTime": "2024-05-21T12:53:19.069689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcwEMDzN9qxTzyiIa"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "1bcadbd9-d2a2-4f32-8690-a8d5579fb9bc", "DetectTime": "2024-05-21T12:53:19.121332+00:00", "EventTime": "2024-05-21T12:53:19.121354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxr47G2Qwmv3koWTmi"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "c61a9930-1aec-4ae8-9ed2-a4edd9c52fb4", "DetectTime": "2024-05-21T12:53:19.126366+00:00", "EventTime": "2024-05-21T12:53:19.126387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C33L2tRyw53ZtVbGg"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "943fa714-a1e7-454c-95e8-3d188a21fd09", "DetectTime": "2024-05-21T12:53:19.164662+00:00", "EventTime": "2024-05-21T12:53:19.164684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CugNE239wZRb7Tsx3b"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "bd97ab6e-cf22-41a2-a73e-38d8990f6f84", "DetectTime": "2024-05-21T12:53:19.174650+00:00", "EventTime": "2024-05-21T12:53:19.174671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C05Qub2lvFvvHOU357"], "accumulated_threat_level": 0, "timewindow": 181} +{"Format": "IDEA0", "ID": "02837074-c9e5-469f-9372-b43fafefd320", "DetectTime": "2024-05-21T12:53:19.603225+00:00", "EventTime": "2024-05-21T12:53:19.603245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpn6L94HzTJMp9xRH4"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8647c8c0-5505-4b9b-a38c-962302bd047c", "DetectTime": "2024-05-21T12:53:19.666083+00:00", "EventTime": "2024-05-21T12:53:19.666104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkjyVCkJksOz58hk"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "c985f5aa-7879-4a2b-95a5-08a104d76440", "DetectTime": "2024-05-21T12:53:19.681495+00:00", "EventTime": "2024-05-21T12:53:19.681519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcFVZL1eL8OW2QGe62"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8d6d97b0-6bb5-4c5a-b462-d174b063f50e", "DetectTime": "2024-05-21T12:53:19.686635+00:00", "EventTime": "2024-05-21T12:53:19.686654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CluB494GMHFYxS8ij4"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "5d32f0d5-de13-4330-b54b-98d30a6ea994", "DetectTime": "2024-05-21T12:53:19.790626+00:00", "EventTime": "2024-05-21T12:53:19.790646+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1C4rIhUmt7aWwva4"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "539b6cbc-7b12-4e27-9f03-c67ec3218547", "DetectTime": "2024-05-21T12:53:19.812945+00:00", "EventTime": "2024-05-21T12:53:19.812969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CihP8E1g3dYEqY1f82"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "448d6868-66a9-45f1-99f4-ae531c12c865", "DetectTime": "2024-05-21T12:53:20.328156+00:00", "EventTime": "2024-05-21T12:53:20.328176+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CckbEv3pQP9m40YJFe"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "677ae60a-c32d-4185-bf35-7a873f1d5046", "DetectTime": "2024-05-21T12:53:20.443285+00:00", "EventTime": "2024-05-21T12:53:20.443308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJDDqZ2efrsn2hSSha"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "5448b8b8-14fa-4ab2-b909-3f63c5fe4a97", "DetectTime": "2024-05-21T12:53:20.465167+00:00", "EventTime": "2024-05-21T12:53:20.465190+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMOsQPT10NADZKWCb"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "cea6d028-4c64-494a-9606-f0e38bc3d677", "DetectTime": "2024-05-21T12:53:20.471923+00:00", "EventTime": "2024-05-21T12:53:20.471942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpc6BR2k5Pqsb39oI3"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "ecf63f9f-17ce-43a9-a7f5-a01e3ae43e63", "DetectTime": "2024-05-21T12:53:20.476644+00:00", "EventTime": "2024-05-21T12:53:20.476662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnmJl4K67NsfQIabd"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "2c03e0c7-e3d5-4d30-a8d6-c3731cdd31d4", "DetectTime": "2024-05-21T12:53:20.483518+00:00", "EventTime": "2024-05-21T12:53:20.483539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoyqS1yZIdpHmc849"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "b64e780f-52d3-4ee6-b67d-9640a981b4bc", "DetectTime": "2024-05-21T12:53:20.489753+00:00", "EventTime": "2024-05-21T12:53:20.489772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CevJ1x1jahINNDduQ"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "c9469103-78fd-45b1-a4d3-2514b479e450", "DetectTime": "2024-05-21T12:53:20.494382+00:00", "EventTime": "2024-05-21T12:53:20.494400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVOoa24ihkeZXclPB8"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "627453e2-7f0c-4635-ab5c-5632ac545ae5", "DetectTime": "2024-05-21T12:53:20.499043+00:00", "EventTime": "2024-05-21T12:53:20.499061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmTVRv4MNfaJHixHlg"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "dd90933d-73b0-4f8f-a76a-397cc8a5d482", "DetectTime": "2024-05-21T12:53:20.866555+00:00", "EventTime": "2024-05-21T12:53:20.866575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEC0iQ1IMdCXxesHSe"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8ede3ba6-4138-42dd-a417-354fb8264426", "DetectTime": "2024-05-21T12:53:20.982473+00:00", "EventTime": "2024-05-21T12:53:20.982494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmEvP11aif7gnyThwg"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "84ee2434-e95e-457f-bd85-43927b1cdf95", "DetectTime": "2024-05-21T12:53:21.070328+00:00", "EventTime": "2024-05-21T12:53:21.070350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrkKOS2DN4bOLwfFHa"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "071a3229-dc25-43b8-9ffb-f8bb09b8e6d6", "DetectTime": "2024-05-21T12:53:21.341039+00:00", "EventTime": "2024-05-21T12:53:21.341059+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmPw1l1i53zyoAcS4i"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "a0b896a5-883a-4d4c-bf0d-852413dd6b7a", "DetectTime": "2024-05-21T12:53:21.430345+00:00", "EventTime": "2024-05-21T12:53:21.430362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzbUU2iMIaHo5EkJd"], "accumulated_threat_level": 1.3, "timewindow": 183} +{"Format": "IDEA0", "ID": "658d99f0-d41a-4794-93ec-b667fb3a76fe", "DetectTime": "2024-05-21T12:53:21.629578+00:00", "EventTime": "2024-05-21T12:53:21.629600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5kubFMRyD5NpCXc5"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "6e380fe6-6072-4ada-80c8-c2a645be97e0", "DetectTime": "2024-05-21T12:53:21.635517+00:00", "EventTime": "2024-05-21T12:53:21.635537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwO1Wx1rVSyNydG1Li"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "7ea6b3c5-96c0-41df-b93a-3ae481ee90af", "DetectTime": "2024-05-21T12:53:21.659784+00:00", "EventTime": "2024-05-21T12:53:21.659808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv0Fvr49ouEXULpKZe"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "e16b8c95-06d0-4adf-905e-9a55c0c307cf", "DetectTime": "2024-05-21T12:53:21.665879+00:00", "EventTime": "2024-05-21T12:53:21.665901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPExzl2HE1VLAJXm69"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "f644d017-b6e7-4ea4-9eb4-4a279a9a27cf", "DetectTime": "2024-05-21T12:53:21.670611+00:00", "EventTime": "2024-05-21T12:53:21.670631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2HOWJ15hdNV5GhZ21"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "7889e1b1-d76f-41d0-aee7-5b1fb3f78316", "DetectTime": "2024-05-21T12:53:21.675229+00:00", "EventTime": "2024-05-21T12:53:21.675249+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrtRF4mkvUzi39pTg"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "1c348ad8-42aa-4eb3-9e88-a733ec4e70ff", "DetectTime": "2024-05-21T12:53:21.713862+00:00", "EventTime": "2024-05-21T12:53:21.713890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPALWC3snMRpBqGdl5"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8357934d-98af-427f-b796-88b3142dd3bf", "DetectTime": "2024-05-21T12:53:21.719255+00:00", "EventTime": "2024-05-21T12:53:21.719273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBC212q8sN62LLD9h"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "cd5cf3fa-724c-4a3d-b284-84d68743c2fa", "DetectTime": "2024-05-21T12:53:21.982802+00:00", "EventTime": "2024-05-21T12:53:21.982823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9F5Ia4mIrWBIGz5k4"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "e16d3ebf-17fd-457b-bd6f-15830033793a", "DetectTime": "2024-05-21T12:53:22.161406+00:00", "EventTime": "2024-05-21T12:53:22.161424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDDDc4SKgg4RKmoyb"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "f5df305a-578a-4b1a-8989-f797ba628599", "DetectTime": "2024-05-21T12:53:22.171755+00:00", "EventTime": "2024-05-21T12:53:22.171775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwTxdE2WKO5niTezHk"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "7d2cca3c-eec6-4dbc-b74f-83b85b9ff00d", "DetectTime": "2024-05-21T12:53:22.218329+00:00", "EventTime": "2024-05-21T12:53:22.218348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMdEEoiZWpfjvVX8"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "7b9f904b-e4d5-4ead-b91f-77d212f4039e", "DetectTime": "2024-05-21T12:53:22.529607+00:00", "EventTime": "2024-05-21T12:53:22.529631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CypfDC4hMTrA23LUv8"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "86746ad9-bf3f-401f-99a4-23a64a893584", "DetectTime": "2024-05-21T12:53:22.540827+00:00", "EventTime": "2024-05-21T12:53:22.540844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxak4n4dkeGAyDHLh9"], "accumulated_threat_level": 2.1, "timewindow": 183} +{"Format": "IDEA0", "ID": "583efdf0-016a-467a-884a-05a13bb6cecc", "DetectTime": "2024-05-21T12:53:22.656170+00:00", "EventTime": "2024-05-21T12:53:22.656191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd4Ma53VydruRw1rE"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "5796d5a6-c5b1-45ac-8e9c-ae182fd889b6", "DetectTime": "2024-05-21T12:53:22.711950+00:00", "EventTime": "2024-05-21T12:53:22.711972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbY2bl3vr7u8z90N8d"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8fe3e67c-d168-485e-933e-2caa315e3916", "DetectTime": "2024-05-21T12:53:22.722222+00:00", "EventTime": "2024-05-21T12:53:22.722243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4ty14oscktKSkWo2"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "29d3bc62-ad13-4a99-a005-606fb7d68758", "DetectTime": "2024-05-21T12:53:22.726912+00:00", "EventTime": "2024-05-21T12:53:22.726931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc4rgN3AysxDmG6pf5"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "06ccd388-3b20-4d75-b3d8-fac299c09fe1", "DetectTime": "2024-05-21T12:53:23.084547+00:00", "EventTime": "2024-05-21T12:53:23.084569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COjRKi1p8MsLgXEo2e"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "30f2cc05-bc16-48cc-94da-c6f635b526c2", "DetectTime": "2024-05-21T12:53:23.254625+00:00", "EventTime": "2024-05-21T12:53:23.254647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4L3J74EE5kCaZpaPd"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 183} +{"Format": "IDEA0", "ID": "98499e3a-749a-4c78-b8c3-abd2fec8b42d", "DetectTime": "2024-05-21T12:53:23.356457+00:00", "EventTime": "2024-05-21T12:53:23.356476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT9BmN1lYTj5cpUHF1"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "2fa3f44a-2e81-4030-8ee1-026e512bba00", "DetectTime": "2024-05-21T12:53:23.365882+00:00", "EventTime": "2024-05-21T12:53:23.365902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PU0U1vPArBa8vNab"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "57c63d98-4d3f-4615-a50f-87fa103be7c0", "DetectTime": "2024-05-21T12:53:23.399743+00:00", "EventTime": "2024-05-21T12:53:23.399763+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1oopG4TeGXMFgSz21"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "99c674b8-aff5-413b-8078-dcf5e62b567d", "DetectTime": "2024-05-21T12:53:23.696350+00:00", "EventTime": "2024-05-21T12:53:23.696368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["86.156.139.155"]}], "Attach": [{"Content": "Connection to unknown destination port 5008/UDP destination IP 86.156.139.155. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRqtV1eevbYWoxBm8"], "accumulated_threat_level": 3.7, "timewindow": 183} +{"Format": "IDEA0", "ID": "23633a97-8879-49a6-8978-c74081f1d4b4", "DetectTime": "2024-05-21T12:53:23.728260+00:00", "EventTime": "2024-05-21T12:53:23.728282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiUsG72q1cglI0cig8"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "e4b2de3a-fbe4-493b-b439-4ce032fdfb82", "DetectTime": "2024-05-21T12:53:23.781358+00:00", "EventTime": "2024-05-21T12:53:23.781378+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPtlwqhxPGO5skej"], "accumulated_threat_level": 4.5, "timewindow": 183} +{"Format": "IDEA0", "ID": "1cfd9378-ccf1-47b9-9c60-50dfee90e623", "DetectTime": "2024-05-21T12:53:23.832399+00:00", "EventTime": "2024-05-21T12:53:23.832418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlOLyzfvxdmtUjpg"], "accumulated_threat_level": 5.3, "timewindow": 183} +{"Format": "IDEA0", "ID": "7bfdf71c-3363-47ca-a6a1-f38903c0c33f", "DetectTime": "2024-05-21T12:53:23.880785+00:00", "EventTime": "2024-05-21T12:53:23.880803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7x9P3B0P2oQBPco4"], "accumulated_threat_level": 6.1, "timewindow": 183} +{"Format": "IDEA0", "ID": "de71900a-522c-451f-93a7-f79c8d6173c3", "DetectTime": "2024-05-21T12:53:24.114327+00:00", "EventTime": "2024-05-21T12:53:24.114348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSfG0P3wOBAoekK8gd"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "41d64c7e-aa45-4ef7-8690-aa198739c68a", "DetectTime": "2024-05-21T12:53:24.163870+00:00", "EventTime": "2024-05-21T12:53:24.163888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C069wm3fU5yTyXN40l"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 183} +{"Format": "IDEA0", "ID": "12994768-6656-4cb3-870d-270ec24675af", "DetectTime": "2024-05-21T12:53:24.213327+00:00", "EventTime": "2024-05-21T12:53:24.213345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4T2NS3lUGHfWXBs6"], "accumulated_threat_level": 7.699999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "7cf1c44d-a06e-4d4c-bb1a-c29dd571db25", "DetectTime": "2024-05-21T12:53:24.267264+00:00", "EventTime": "2024-05-21T12:53:24.267287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJYlj638cCR09A3RAa"], "accumulated_threat_level": 8.5, "timewindow": 183} +{"Format": "IDEA0", "ID": "23b1fa4a-cf9d-4346-adfd-943f7cbc7f1b", "DetectTime": "2024-05-21T12:53:24.318821+00:00", "EventTime": "2024-05-21T12:53:24.318839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN5y861rpwoyU9mHei"], "accumulated_threat_level": 9.3, "timewindow": 183} +{"Format": "IDEA0", "ID": "c7e05ccc-f613-4507-9ab5-858f48bdf3cf", "DetectTime": "2024-05-21T12:53:24.370632+00:00", "EventTime": "2024-05-21T12:53:24.370651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVYpkJ1tWS9f5VtbH8"], "accumulated_threat_level": 10.100000000000001, "timewindow": 183} +{"Format": "IDEA0", "ID": "7259dff5-25fe-4cc6-96d8-0eb5e5f28714", "DetectTime": "2024-05-21T12:53:24.639405+00:00", "EventTime": "2024-05-21T12:53:24.639428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5YIaB3BUacDOXbGpc"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "db1c59a5-e95a-4917-8493-69c46e6dbc3a", "DetectTime": "2024-05-21T12:53:24.691432+00:00", "EventTime": "2024-05-21T12:53:24.691457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUrhm2xhlgXwKVKWi"], "accumulated_threat_level": 10.900000000000002, "timewindow": 183} +{"Format": "IDEA0", "ID": "d34793de-93ca-4bc1-9bb7-a93655f0530d", "DetectTime": "2024-05-21T12:53:24.747881+00:00", "EventTime": "2024-05-21T12:53:24.747901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHKfyNl109BNVaa3"], "accumulated_threat_level": 11.700000000000003, "timewindow": 183} +{"Format": "IDEA0", "ID": "885a335d-673a-450f-aa81-4edf0c766e76", "DetectTime": "2024-05-21T12:53:24.804420+00:00", "EventTime": "2024-05-21T12:53:24.804440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2mIC20VHvKddNpC1"], "accumulated_threat_level": 12.500000000000004, "timewindow": 183} +{"Format": "Json", "ID": "885a335d-673a-450f-aa81-4edf0c766e76", "DetectTime": "2024-05-21T12:53:24.804420+00:00", "EventTime": "2024-05-21T12:53:24.804440+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T14:21:54.767605+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2024/05/21 12:53:25.019883)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 183, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "a7be91d2-9135-4348-887a-b2d8c18f9247", "DetectTime": "2024-05-21T12:53:25.039202+00:00", "EventTime": "2024-05-21T12:53:25.039222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyW3oC1ycNcPZ5IwE5"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "8c264126-a492-41d4-adc7-eca4f6c26492", "DetectTime": "2024-05-21T12:53:25.044077+00:00", "EventTime": "2024-05-21T12:53:25.044096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjGkC849tKjCrh4zvb"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "4bdff47c-b83f-46b2-9b20-d2691fd36c2e", "DetectTime": "2024-05-21T12:53:25.060201+00:00", "EventTime": "2024-05-21T12:53:25.060219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYJd21zUhl9zzIaof"], "accumulated_threat_level": 1.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "6861148c-5ae5-44b0-a8b3-be5c01eb2b2f", "DetectTime": "2024-05-21T12:53:25.206503+00:00", "EventTime": "2024-05-21T12:53:25.206523+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYg3J116hPzAyIFAac"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 183} +{"Format": "IDEA0", "ID": "22c7aec1-3431-46f6-959e-5a183be1e813", "DetectTime": "2024-05-21T12:53:25.256521+00:00", "EventTime": "2024-05-21T12:53:25.256541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNxFA3j5BmGGZ0fjf"], "accumulated_threat_level": 3.2, "timewindow": 183} +{"Format": "IDEA0", "ID": "fb4c1f22-e5d1-4372-9d97-2c55e648f899", "DetectTime": "2024-05-21T12:53:25.309021+00:00", "EventTime": "2024-05-21T12:53:25.309041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsNRc4414KHLPEJb"], "accumulated_threat_level": 4.0, "timewindow": 183} +{"Format": "IDEA0", "ID": "026e2274-3648-476f-8e98-a0a0bf1ccf51", "DetectTime": "2024-05-21T12:53:25.359895+00:00", "EventTime": "2024-05-21T12:53:25.359914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQNDaMJPGo4cR1zu7"], "accumulated_threat_level": 4.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "2ee1786f-f1d4-4669-95f5-beda74a73c17", "DetectTime": "2024-05-21T12:53:25.416765+00:00", "EventTime": "2024-05-21T12:53:25.416783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cke58Iu8U1oEXOJUd"], "accumulated_threat_level": 5.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "c6007737-936a-4c4b-9470-c9afc8c88e42", "DetectTime": "2024-05-21T12:53:25.465702+00:00", "EventTime": "2024-05-21T12:53:25.465721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNG9K2u0sOSii0VBi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 183} +{"Format": "IDEA0", "ID": "c109003d-914e-42cc-90c4-43858dacb88d", "DetectTime": "2024-05-21T12:53:25.720867+00:00", "EventTime": "2024-05-21T12:53:25.720892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtByM03SZBAF3ldWv5"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "dc5daacf-6a95-4fac-a36f-f4506823461f", "DetectTime": "2024-05-21T12:53:25.771193+00:00", "EventTime": "2024-05-21T12:53:25.771213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjc7asmrN1SbcwU3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "48337991-444c-4347-8211-c9dc9dda342f", "DetectTime": "2024-05-21T12:53:25.822590+00:00", "EventTime": "2024-05-21T12:53:25.822609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTPZH1Z1nmJ0LHZtc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "c0cdc9c3-7108-440a-b29f-4f748488fcd9", "DetectTime": "2024-05-21T12:53:25.878960+00:00", "EventTime": "2024-05-21T12:53:25.878980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZvq629VDxaDpbTx8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "fe470be6-1eb0-4edf-8cb4-1d0790bad9f0", "DetectTime": "2024-05-21T12:53:26.044669+00:00", "EventTime": "2024-05-21T12:53:26.044702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuoWyO1V8wRi0H2iwa"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "c9a060c1-ae49-4389-b5e1-7a563338c527", "DetectTime": "2024-05-21T12:53:26.098389+00:00", "EventTime": "2024-05-21T12:53:26.098424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COfGgN3veTZjN5cxoi"], "accumulated_threat_level": 9.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "a7e0773a-efe9-478d-8dcf-62d68a3e591e", "DetectTime": "2024-05-21T12:53:26.147011+00:00", "EventTime": "2024-05-21T12:53:26.147030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chn97l4ZMiHHFcfjPg"], "accumulated_threat_level": 10.4, "timewindow": 183} +{"Format": "IDEA0", "ID": "6fad7c98-512a-45f0-9af9-45c4d556a461", "DetectTime": "2024-05-21T12:53:26.199692+00:00", "EventTime": "2024-05-21T12:53:26.199712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx6aMi2Nd5nNPRu8Zi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 183} +{"Format": "IDEA0", "ID": "286083fc-32cf-48b6-b9d9-49087eb5d60e", "DetectTime": "2024-05-21T12:53:26.457985+00:00", "EventTime": "2024-05-21T12:53:26.458005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJxlc4VZkqKwKbtj3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 183} +{"Format": "Json", "ID": "286083fc-32cf-48b6-b9d9-49087eb5d60e", "DetectTime": "2024-05-21T12:53:26.457985+00:00", "EventTime": "2024-05-21T12:53:26.458005+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-08T14:21:58.310458+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2024/05/21 12:53:26.895908)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 183, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c8071418-c81d-45f5-ad04-aed229c7074b", "DetectTime": "2024-05-21T12:53:26.907767+00:00", "EventTime": "2024-05-21T12:53:26.907786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8sQy357gGKpX0Dv2"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "84dfebaf-0386-4e2b-9698-6c6eed7f86b1", "DetectTime": "2024-05-21T12:53:26.919333+00:00", "EventTime": "2024-05-21T12:53:26.919354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnTLWrLO70pEeGdb"], "accumulated_threat_level": 1.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "dbf05092-22e7-4d7f-afc7-673de1520b19", "DetectTime": "2024-05-21T12:53:26.931443+00:00", "EventTime": "2024-05-21T12:53:26.931463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFF5Og3Q1kqGZRVyHe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 183} +{"Format": "IDEA0", "ID": "930b12b2-3f7b-4a2e-b7ff-ddcd90b72fbb", "DetectTime": "2024-05-21T12:53:26.943376+00:00", "EventTime": "2024-05-21T12:53:26.943398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeu7T3oNqhWUfQQj9"], "accumulated_threat_level": 3.2, "timewindow": 183} +{"Format": "IDEA0", "ID": "9e5bb610-cf69-481f-905a-08f190e2d9ef", "DetectTime": "2024-05-21T12:53:26.965213+00:00", "EventTime": "2024-05-21T12:53:26.965230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblAj84LDtkBhwV9gi"], "accumulated_threat_level": 4.0, "timewindow": 183} +{"Format": "IDEA0", "ID": "f4c9776b-902f-4666-aa63-42f294bef191", "DetectTime": "2024-05-21T12:53:27.056669+00:00", "EventTime": "2024-05-21T12:53:27.056691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtCbPa2rxZHtQmCklh"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8120eb33-d89d-4343-8187-2206c004c6c5", "DetectTime": "2024-05-21T12:53:27.101635+00:00", "EventTime": "2024-05-21T12:53:27.101654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLJPJUOy1GFsvrW5"], "accumulated_threat_level": 4.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "19452def-0587-4167-8bf1-b1f3f4214648", "DetectTime": "2024-05-21T12:53:27.153502+00:00", "EventTime": "2024-05-21T12:53:27.153534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE9hR814ZTiEEsbYWd"], "accumulated_threat_level": 5.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "8eca0d3f-5b40-488a-9cb3-1153156e89f0", "DetectTime": "2024-05-21T12:53:27.206676+00:00", "EventTime": "2024-05-21T12:53:27.206695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaSVPw1ll8lcJ2ngF4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 183} +{"Format": "IDEA0", "ID": "284b7f72-1468-480b-935e-9d76566c063c", "DetectTime": "2024-05-21T12:53:27.255175+00:00", "EventTime": "2024-05-21T12:53:27.255194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjYVSi3xfNFSXd05l9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "e12ceede-a27b-4f77-97d7-6d3eeeb367c4", "DetectTime": "2024-05-21T12:53:27.308087+00:00", "EventTime": "2024-05-21T12:53:27.308108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpySsn3xU0ZFfBW2A8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "c6f83130-e969-4622-8d4c-0377f5be6c5d", "DetectTime": "2024-05-21T12:53:27.748133+00:00", "EventTime": "2024-05-21T12:53:27.748154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXBVj2dTLbL3hRSM6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "1e939fca-d957-48e5-9489-578cadf1216c", "DetectTime": "2024-05-21T12:53:27.778753+00:00", "EventTime": "2024-05-21T12:53:27.778773+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck3c8N3fBiTyvGj9nl"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "37bc9517-4db8-4217-82f4-b94d943123b2", "DetectTime": "2024-05-21T12:53:27.840474+00:00", "EventTime": "2024-05-21T12:53:27.840497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2y62Z3PuvKcPQ1EMk"], "accumulated_threat_level": 9.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "28afd001-37a9-4a48-8ae0-c764851f79bc", "DetectTime": "2024-05-21T12:53:27.893224+00:00", "EventTime": "2024-05-21T12:53:27.893247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUgHgr2zAEFVckmZuf"], "accumulated_threat_level": 10.4, "timewindow": 183} +{"Format": "IDEA0", "ID": "2be7af4f-6249-400f-babb-72bf0ce4a65f", "DetectTime": "2024-05-21T12:53:27.946083+00:00", "EventTime": "2024-05-21T12:53:27.946102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYjkn3itoNHEcOhQl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 183} +{"Format": "IDEA0", "ID": "4deeba9d-a7f1-4c92-98a1-82537c5e57f0", "DetectTime": "2024-05-21T12:53:27.998577+00:00", "EventTime": "2024-05-21T12:53:27.998596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOVRB27SqyHobte1e"], "accumulated_threat_level": 12.000000000000002, "timewindow": 183} +{"Format": "Json", "ID": "4deeba9d-a7f1-4c92-98a1-82537c5e57f0", "DetectTime": "2024-05-21T12:53:27.998577+00:00", "EventTime": "2024-05-21T12:53:27.998596+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-08T14:52:44.788578+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2024/05/21 12:53:28.205252)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 183, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fe11becc-1dbb-49c1-9f58-57b50863e886", "DetectTime": "2024-05-21T12:53:28.223480+00:00", "EventTime": "2024-05-21T12:53:28.223501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C913nq3NTGimkhpaT4"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "877a76eb-c12c-42b1-8853-e925935f9f78", "DetectTime": "2024-05-21T12:53:28.248785+00:00", "EventTime": "2024-05-21T12:53:28.248803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ32wc2OWNGTmBP9Vl"], "accumulated_threat_level": 1.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "27793124-3b7b-4580-a4c2-cf9f5abdb9e0", "DetectTime": "2024-05-21T12:53:28.380900+00:00", "EventTime": "2024-05-21T12:53:28.380920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaLYHd3Vrxg2BHncg"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "3ebb7c65-04a8-45c5-8b07-660988fdaa4e", "DetectTime": "2024-05-21T12:53:28.433222+00:00", "EventTime": "2024-05-21T12:53:28.433245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEV5pz74NMfAuTwa3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 183} +{"Format": "IDEA0", "ID": "72324e05-72d3-407a-9c69-c20d9eae9fa6", "DetectTime": "2024-05-21T12:53:28.485798+00:00", "EventTime": "2024-05-21T12:53:28.485817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbGKrt09VCUPinZU7"], "accumulated_threat_level": 3.2, "timewindow": 183} +{"Format": "IDEA0", "ID": "5aab04b7-a54a-40d7-b2b5-7fc7f6b427fe", "DetectTime": "2024-05-21T12:53:28.545923+00:00", "EventTime": "2024-05-21T12:53:28.545941+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxvS33dfaNA1am7Z7"], "accumulated_threat_level": 4.0, "timewindow": 183} +{"Format": "IDEA0", "ID": "63a3ccde-c841-41f0-aa25-7bd5c1379b7a", "DetectTime": "2024-05-21T12:53:28.596660+00:00", "EventTime": "2024-05-21T12:53:28.596680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccm5Eb2zYbhuf0Z78l"], "accumulated_threat_level": 4.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "17c70770-a146-4bb0-b811-906564074e4f", "DetectTime": "2024-05-21T12:53:28.655372+00:00", "EventTime": "2024-05-21T12:53:28.655392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakMDB2deJgaurcSIe"], "accumulated_threat_level": 5.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "78cb767e-4973-4189-8618-f02ac3f60c1a", "DetectTime": "2024-05-21T12:53:28.932009+00:00", "EventTime": "2024-05-21T12:53:28.932031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQJvK1zkCCLuiTxX9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 183} +{"Format": "IDEA0", "ID": "f5ca87f4-3f49-4716-a99c-d82793b545d7", "DetectTime": "2024-05-21T12:53:28.990162+00:00", "EventTime": "2024-05-21T12:53:28.990181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3dVUdhsdjXzIZdxa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "b2de5721-fbad-4593-9396-e74993488c6e", "DetectTime": "2024-05-21T12:53:29.155734+00:00", "EventTime": "2024-05-21T12:53:29.155771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjO2uL3Ch5CPydM8Hj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "767e46d5-ecf7-4b10-90ae-c2d2fd6ded00", "DetectTime": "2024-05-21T12:53:29.178421+00:00", "EventTime": "2024-05-21T12:53:29.178440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1pS71frwx4nSK4Gj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 183} +{"Format": "IDEA0", "ID": "f945042b-cb21-4169-b538-d7755365019a", "DetectTime": "2024-05-21T12:53:29.233531+00:00", "EventTime": "2024-05-21T12:53:29.233551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCctR13hW0gKf0H4Sh"], "accumulated_threat_level": 9.6, "timewindow": 183} +{"Format": "IDEA0", "ID": "1741f444-af6c-4bac-93fb-92625751bd1a", "DetectTime": "2024-05-21T12:53:29.287875+00:00", "EventTime": "2024-05-21T12:53:29.287898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6fX2G3dptegfCIEsj"], "accumulated_threat_level": 10.4, "timewindow": 183} +{"Format": "IDEA0", "ID": "78aee16e-6457-4ab3-8c9f-7f1e03374444", "DetectTime": "2024-05-21T12:53:29.579580+00:00", "EventTime": "2024-05-21T12:53:29.579602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CauX5z4wONh52D95u8"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "c938838e-7f54-47eb-ad1e-62e90a32bcaa", "DetectTime": "2024-05-21T12:53:29.624217+00:00", "EventTime": "2024-05-21T12:53:29.624236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreiBh4OIOTCBeeJ7f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 183} +{"Format": "IDEA0", "ID": "970f5d7b-9b3a-40d6-ad88-f3d3e7f9ff19", "DetectTime": "2024-05-21T12:53:29.673142+00:00", "EventTime": "2024-05-21T12:53:29.673160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQZxg9cgcrSPmn2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 183} +{"Format": "Json", "ID": "970f5d7b-9b3a-40d6-ad88-f3d3e7f9ff19", "DetectTime": "2024-05-21T12:53:29.673142+00:00", "EventTime": "2024-05-21T12:53:29.673160+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "1970-01-08T14:52:48.032550+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 183. (real time 2024/05/21 12:53:29.894972)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 183, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f58a3b54-0273-41a9-8023-b7a0202bfbaf", "DetectTime": "2024-05-21T12:53:29.913087+00:00", "EventTime": "2024-05-21T12:53:29.913105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1Tmv3wvFAs9Wsfmf"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "803678f2-108c-4d14-b13b-33b98b794b01", "DetectTime": "2024-05-21T12:53:29.925647+00:00", "EventTime": "2024-05-21T12:53:29.925666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKPaghS7nYiomroXd"], "accumulated_threat_level": 0.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "07659776-314f-497f-b396-a35e74df6351", "DetectTime": "2024-05-21T12:53:29.954105+00:00", "EventTime": "2024-05-21T12:53:29.954125+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbY3Y02oMoD92oFbB7"], "accumulated_threat_level": 1.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "60985630-c56e-4817-811d-ac57657f8a17", "DetectTime": "2024-05-21T12:53:30.005639+00:00", "EventTime": "2024-05-21T12:53:30.005659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYw4bW3PCfP1gRACx7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 184} +{"Format": "IDEA0", "ID": "eec53750-f57f-4fe5-876c-5d0dae2075f7", "DetectTime": "2024-05-21T12:53:30.280988+00:00", "EventTime": "2024-05-21T12:53:30.281010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7i9J62cD9HOmAqUQ4"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "8dda613f-478a-41ef-9c28-0cde33ff6082", "DetectTime": "2024-05-21T12:53:30.325869+00:00", "EventTime": "2024-05-21T12:53:30.325889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTz73G2TSNCZUJioVi"], "accumulated_threat_level": 3.2, "timewindow": 184} +{"Format": "IDEA0", "ID": "9414d826-2608-4147-a433-cf8b596cc59d", "DetectTime": "2024-05-21T12:53:30.379038+00:00", "EventTime": "2024-05-21T12:53:30.379061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0Jhm2vV1s7An6Vf"], "accumulated_threat_level": 4.0, "timewindow": 184} +{"Format": "IDEA0", "ID": "9a8e7bce-0e80-4732-8cec-7b74e94a9482", "DetectTime": "2024-05-21T12:53:30.430819+00:00", "EventTime": "2024-05-21T12:53:30.430840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZJ2v3RMaKB5TVhW8"], "accumulated_threat_level": 4.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "8510d1c2-3deb-4884-bd55-a340050ae507", "DetectTime": "2024-05-21T12:53:30.480178+00:00", "EventTime": "2024-05-21T12:53:30.480196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckn8Zw1EdMGduMog4k"], "accumulated_threat_level": 5.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "007d15ef-6417-443d-ba4d-ed55f6ab2f88", "DetectTime": "2024-05-21T12:53:30.532604+00:00", "EventTime": "2024-05-21T12:53:30.532623+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzU294uLBehx0DgNh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 184} +{"Format": "IDEA0", "ID": "2b4c5a05-cafd-4edc-8e66-3f1ea4ccd0db", "DetectTime": "2024-05-21T12:53:30.740497+00:00", "EventTime": "2024-05-21T12:53:30.740517+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["122.174.187.66"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgX5Ra3xxbPMbaDBe2"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "26a84bc9-f9f0-4aa5-ab0b-12ed2869a920", "DetectTime": "2024-05-21T12:53:30.754573+00:00", "EventTime": "2024-05-21T12:53:30.754593+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["122.174.187.66"]}], "Attach": [{"Content": "connection to blacklisted IP: 122.174.187.66 from 10.0.2.19. AS: AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN AS24560 rDNS: abts-tn-dynamic-066.187.174.122.airtelbroadband.in Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgX5Ra3xxbPMbaDBe2"], "accumulated_threat_level": 11.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "6a8e479d-aadd-449f-92e2-0be5c99b8b6f", "DetectTime": "2024-05-21T12:53:30.904108+00:00", "EventTime": "2024-05-21T12:53:30.904129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wjzj4LxnCitZVa13"], "accumulated_threat_level": 7.199999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "d27312af-02fc-4e1f-94cc-71b29fd56156", "DetectTime": "2024-05-21T12:53:30.957082+00:00", "EventTime": "2024-05-21T12:53:30.957108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszuZz3RM5mvm5vAB7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "73235ca0-1265-4bda-bd2c-6682e7e2c8db", "DetectTime": "2024-05-21T12:53:31.009474+00:00", "EventTime": "2024-05-21T12:53:31.009494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxJ3X3KoFEIlpCm9k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "f337a4ad-ae35-4e81-b8d1-18a6ebd6c987", "DetectTime": "2024-05-21T12:53:31.063014+00:00", "EventTime": "2024-05-21T12:53:31.063033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWS2AY2KYp25iL32E6"], "accumulated_threat_level": 9.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "b85b4bc3-b9c3-4eef-9368-ae0e3e2df1da", "DetectTime": "2024-05-21T12:53:31.113351+00:00", "EventTime": "2024-05-21T12:53:31.113371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdisdTi9brimHgeW6"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "02ca51d6-9e0e-4d3c-942e-0ab5619eee22", "DetectTime": "2024-05-21T12:53:31.168373+00:00", "EventTime": "2024-05-21T12:53:31.168395+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdez89TDlA3xXIXe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 184} +{"Format": "IDEA0", "ID": "893bd04f-e41c-40db-a3e8-75534e90f6db", "DetectTime": "2024-05-21T12:53:31.173170+00:00", "EventTime": "2024-05-21T12:53:31.173188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLaowr2QRFqnRzSSI", "Cydo9mhDHneFdn8x6", "C8zOXr2IJWA4BSDAWe", "Cwy2T13DAY0ZNjNMgf"], "accumulated_threat_level": 0.5, "timewindow": 210} +{"Format": "IDEA0", "ID": "bc4623ef-cd50-4dde-bb5c-c6fe1aec281a", "DetectTime": "2024-05-21T12:53:31.219121+00:00", "EventTime": "2024-05-21T12:53:31.219139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ77ih29OLDOj5dUT2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 184} +{"Format": "Json", "ID": "bc4623ef-cd50-4dde-bb5c-c6fe1aec281a", "DetectTime": "2024-05-21T12:53:31.219121+00:00", "EventTime": "2024-05-21T12:53:31.219139+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-08T15:23:44.518680+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2024/05/21 12:53:31.380253)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 184, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "59f86e3e-6c59-4fd8-b52b-ea9050370f33", "DetectTime": "2024-05-21T12:53:31.466780+00:00", "EventTime": "2024-05-21T12:53:31.466802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZWabjURUUHN0iat7"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "9149bf19-1125-4cd7-b7ba-63d52b763a88", "DetectTime": "2024-05-21T12:53:31.520488+00:00", "EventTime": "2024-05-21T12:53:31.520508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJUSpmg9tnmNv1Si"], "accumulated_threat_level": 0.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "99e03109-b3d2-4b03-92d3-82e812f71f9e", "DetectTime": "2024-05-21T12:53:31.571482+00:00", "EventTime": "2024-05-21T12:53:31.571500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx0EjW1LcTZ3qF6MAk"], "accumulated_threat_level": 1.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "07198002-f774-4af0-b650-39a8ebd0ee1e", "DetectTime": "2024-05-21T12:53:31.623170+00:00", "EventTime": "2024-05-21T12:53:31.623188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURJ2Z12sDyeMwt6De"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 184} +{"Format": "IDEA0", "ID": "c9fc6241-64b1-4b3c-9d3f-fdd95b1e93b3", "DetectTime": "2024-05-21T12:53:31.673221+00:00", "EventTime": "2024-05-21T12:53:31.673240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUk9Mq2r3FCVYerWf9"], "accumulated_threat_level": 3.2, "timewindow": 184} +{"Format": "IDEA0", "ID": "4354531c-1b37-4a47-b798-bb3d0918e4b1", "DetectTime": "2024-05-21T12:53:31.732870+00:00", "EventTime": "2024-05-21T12:53:31.732902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAe1J24fGez6yHcX1"], "accumulated_threat_level": 4.0, "timewindow": 184} +{"Format": "IDEA0", "ID": "24ae1ab5-3c78-414a-858a-e3a4da423aa7", "DetectTime": "2024-05-21T12:53:31.782648+00:00", "EventTime": "2024-05-21T12:53:31.782683+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLNCp1bcZMIq4Xxh"], "accumulated_threat_level": 4.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "ce5d6ec6-fbb1-4e6a-8a91-8ea3abc25a20", "DetectTime": "2024-05-21T12:53:32.054462+00:00", "EventTime": "2024-05-21T12:53:32.054492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMDR13yWmt6wjf9ud"], "accumulated_threat_level": 5.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "e2494b06-7146-4e95-aa1e-e8ce2eb9c5d4", "DetectTime": "2024-05-21T12:53:32.104691+00:00", "EventTime": "2024-05-21T12:53:32.104720+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXo5t4xTT8hOjgQBe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 184} +{"Format": "IDEA0", "ID": "257ace5b-8876-43a3-8f48-f91f81967c9b", "DetectTime": "2024-05-21T12:53:32.159467+00:00", "EventTime": "2024-05-21T12:53:32.159504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAOO34j0MHRah149i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "66e0a2d3-7ec6-4e8b-bf93-771eded56cde", "DetectTime": "2024-05-21T12:53:32.318568+00:00", "EventTime": "2024-05-21T12:53:32.318587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkS3e2Yp3QII87LY"], "accumulated_threat_level": 7.999999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "9fb89f16-90c9-466e-a8e3-b0276ff4f573", "DetectTime": "2024-05-21T12:53:32.371514+00:00", "EventTime": "2024-05-21T12:53:32.371532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqE32x3FzrWBTqPIA2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "588b1fd6-c299-419b-a89d-366743138af1", "DetectTime": "2024-05-21T12:53:32.424607+00:00", "EventTime": "2024-05-21T12:53:32.424627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrorZ83FgvYghsn4uh"], "accumulated_threat_level": 9.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "61530fe9-6a05-41cd-a20a-657c6cffd2a7", "DetectTime": "2024-05-21T12:53:32.703259+00:00", "EventTime": "2024-05-21T12:53:32.703281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQebqdmaVB9T3lPL6"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "3361950d-4ee5-4b15-857f-7a466432bc65", "DetectTime": "2024-05-21T12:53:32.748979+00:00", "EventTime": "2024-05-21T12:53:32.749000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqIuP2cNpV4YeCOC4"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "04188c96-b3a3-4d05-b267-c4f24616ea5f", "DetectTime": "2024-05-21T12:53:32.810687+00:00", "EventTime": "2024-05-21T12:53:32.810705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpsBc1V7CDyGxLgQ8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 184} +{"Format": "IDEA0", "ID": "51b67a42-0c42-4ec4-bfa7-6a1ced9421e9", "DetectTime": "2024-05-21T12:53:32.945614+00:00", "EventTime": "2024-05-21T12:53:32.945631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgzcX23DG2A8dUmD2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 184} +{"Format": "Json", "ID": "51b67a42-0c42-4ec4-bfa7-6a1ced9421e9", "DetectTime": "2024-05-21T12:53:32.945614+00:00", "EventTime": "2024-05-21T12:53:32.945631+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "1970-01-08T15:54:14.597413+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2024/05/21 12:53:33.118711)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 184, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ef18d2b8-e641-4817-8eec-42fa53c9dc8f", "DetectTime": "2024-05-21T12:53:33.130464+00:00", "EventTime": "2024-05-21T12:53:33.130486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXkCq71CIJgGYszFRc"], "accumulated_threat_level": 0.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "4c5b1fc4-38a3-42e5-a084-e12371c786a8", "DetectTime": "2024-05-21T12:53:33.141497+00:00", "EventTime": "2024-05-21T12:53:33.141515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Ko2vP4HkWIyVUoj"], "accumulated_threat_level": 1.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "7e5aa43a-7cb8-4080-a667-2f9575dc91d8", "DetectTime": "2024-05-21T12:53:33.153519+00:00", "EventTime": "2024-05-21T12:53:33.153537+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlSVUuFce7TBqZQk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 184} +{"Format": "IDEA0", "ID": "d6e40f33-08f5-442f-a464-da8b85e4b39c", "DetectTime": "2024-05-21T12:53:33.166221+00:00", "EventTime": "2024-05-21T12:53:33.166239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcXaI3tlLBu52FxBj"], "accumulated_threat_level": 3.2, "timewindow": 184} +{"Format": "IDEA0", "ID": "c5801b92-ddf6-491e-a586-d51c2822fa2b", "DetectTime": "2024-05-21T12:53:33.441042+00:00", "EventTime": "2024-05-21T12:53:33.441063+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAkmI2mQW6qvtDx74"], "accumulated_threat_level": 4.0, "timewindow": 184} +{"Format": "IDEA0", "ID": "1ecfafcc-da5a-4a24-83d6-7ce5bdddadee", "DetectTime": "2024-05-21T12:53:33.493043+00:00", "EventTime": "2024-05-21T12:53:33.493062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cziwzs4nPIPKfI70Jk"], "accumulated_threat_level": 4.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "acea4025-d320-4da4-9042-6cafaf64e668", "DetectTime": "2024-05-21T12:53:33.547952+00:00", "EventTime": "2024-05-21T12:53:33.547972+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcjO123XtjbgM7dm5"], "accumulated_threat_level": 5.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "08bfe011-6b00-40a0-b971-0ea023fdd952", "DetectTime": "2024-05-21T12:53:33.588879+00:00", "EventTime": "2024-05-21T12:53:33.588900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZnBbG2d8tI5eUsjs7"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "eea46b6b-7b00-4a73-8136-7b128d28cd1d", "DetectTime": "2024-05-21T12:53:33.634896+00:00", "EventTime": "2024-05-21T12:53:33.634915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKVJLt4DKlL3TINpWi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 184} +{"Format": "IDEA0", "ID": "a5f15866-102a-43e7-91bd-07c38cfb6c19", "DetectTime": "2024-05-21T12:53:33.688430+00:00", "EventTime": "2024-05-21T12:53:33.688449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYfIc3AWIpnV3d0Z9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "c83d772f-cb04-4799-b9cc-fd92d67467d8", "DetectTime": "2024-05-21T12:53:33.977078+00:00", "EventTime": "2024-05-21T12:53:33.977099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEcvF40jAuoZpvH36"], "accumulated_threat_level": 7.999999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "6f67b8fc-534d-4282-b4d5-821bbe90096e", "DetectTime": "2024-05-21T12:53:34.031127+00:00", "EventTime": "2024-05-21T12:53:34.031148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwArle2fTdGVuuU7sf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "65a4de09-0ac9-41f5-a9aa-b17bc8c6c3e9", "DetectTime": "2024-05-21T12:53:34.087087+00:00", "EventTime": "2024-05-21T12:53:34.087107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW6qO1fKDrI531n97"], "accumulated_threat_level": 9.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "68bbc057-d5dd-4f14-a680-8b337b1b0d01", "DetectTime": "2024-05-21T12:53:34.144331+00:00", "EventTime": "2024-05-21T12:53:34.144350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXyKER8FEEuC4o8O4"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "d17fa2e9-62ca-4465-b846-98c5b6243a35", "DetectTime": "2024-05-21T12:53:34.195571+00:00", "EventTime": "2024-05-21T12:53:34.195594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMUOiNyBTC1NXWOa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 184} +{"Format": "IDEA0", "ID": "a6a0268b-522a-46ba-93e3-18c10d598d24", "DetectTime": "2024-05-21T12:53:34.243445+00:00", "EventTime": "2024-05-21T12:53:34.243464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWygD1tYCZG8ZYFMh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 184} +{"Format": "Json", "ID": "a6a0268b-522a-46ba-93e3-18c10d598d24", "DetectTime": "2024-05-21T12:53:34.243445+00:00", "EventTime": "2024-05-21T12:53:34.243464+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-08T15:54:38.377916+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 184. (real time 2024/05/21 12:53:34.464621)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 184, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "17b3fde1-c839-43a0-b871-f87d92de8e0e", "DetectTime": "2024-05-21T12:53:34.516271+00:00", "EventTime": "2024-05-21T12:53:34.516291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChC7bLFSP7LU4ZYs7"], "accumulated_threat_level": 0.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "711a1c10-4e43-4d26-8bd7-a5ca052a8f1c", "DetectTime": "2024-05-21T12:53:34.571345+00:00", "EventTime": "2024-05-21T12:53:34.571370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Kv6o498N8z07xn9i"], "accumulated_threat_level": 1.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "28be9700-4600-4b06-ae90-14ff585f199e", "DetectTime": "2024-05-21T12:53:34.621344+00:00", "EventTime": "2024-05-21T12:53:34.621363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGVig4cvEhceT8sHi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 184} +{"Format": "IDEA0", "ID": "f65a8c3d-02af-417a-ae23-c8b72e36ce2f", "DetectTime": "2024-05-21T12:53:34.742531+00:00", "EventTime": "2024-05-21T12:53:34.742553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6h2G33tFjvjYd7IIc"], "accumulated_threat_level": 3.2, "timewindow": 184} +{"Format": "IDEA0", "ID": "2888a2e2-6282-4e2e-8194-f8ed51cd2a36", "DetectTime": "2024-05-21T12:53:34.747941+00:00", "EventTime": "2024-05-21T12:53:34.747960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRgEX2PFDO3pvQqPj"], "accumulated_threat_level": 1.6, "timewindow": 182} +{"Format": "IDEA0", "ID": "4b962b60-fb9d-42b5-bd2a-c6a94fb92c12", "DetectTime": "2024-05-21T12:53:34.822559+00:00", "EventTime": "2024-05-21T12:53:34.822577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rtiT3KjwRjfrIXik"], "accumulated_threat_level": 4.0, "timewindow": 184} +{"Format": "IDEA0", "ID": "579af732-e280-49bf-9b78-8d1dd93a8c58", "DetectTime": "2024-05-21T12:53:34.872777+00:00", "EventTime": "2024-05-21T12:53:34.872800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNVkIunxGvBRzT7i"], "accumulated_threat_level": 4.8, "timewindow": 184} +{"Format": "IDEA0", "ID": "a0436016-a515-4748-ada1-340191e9b105", "DetectTime": "2024-05-21T12:53:34.920079+00:00", "EventTime": "2024-05-21T12:53:34.920099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR4GNt4MnIGuYaUYW9"], "accumulated_threat_level": 5.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "2b102ece-d18c-4aed-acde-bff15d94ea60", "DetectTime": "2024-05-21T12:53:35.311117+00:00", "EventTime": "2024-05-21T12:53:35.311135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eEOOrNJmVWR9rVd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 184} +{"Format": "IDEA0", "ID": "6bd80c8a-5549-467c-9bfe-eb5c806c9ea5", "DetectTime": "2024-05-21T12:53:35.364834+00:00", "EventTime": "2024-05-21T12:53:35.364856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjeqop3WnIO83sbtEd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "bdb0ece5-ab99-4312-98ae-a6ddf606d271", "DetectTime": "2024-05-21T12:53:35.417081+00:00", "EventTime": "2024-05-21T12:53:35.417102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNV8L2ad3mY4bzcwf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "17e6b045-7b28-452b-b0aa-04d06820122e", "DetectTime": "2024-05-21T12:53:35.471027+00:00", "EventTime": "2024-05-21T12:53:35.471045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtMbya1ozOl5MFLskj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 184} +{"Format": "IDEA0", "ID": "c40ad3f2-ee0d-4c02-92de-e979493023bd", "DetectTime": "2024-05-21T12:53:35.527879+00:00", "EventTime": "2024-05-21T12:53:35.527900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6aTp4zrmxHadY9vb"], "accumulated_threat_level": 9.6, "timewindow": 184} +{"Format": "IDEA0", "ID": "9a7910d5-13f2-47a4-b875-51808e99a77d", "DetectTime": "2024-05-21T12:53:35.583273+00:00", "EventTime": "2024-05-21T12:53:35.583294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNeOhI2Mc3JpRHRTMi"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "e8f75c06-d31b-49e9-9ae3-f592478689f3", "DetectTime": "2024-05-21T12:53:35.920991+00:00", "EventTime": "2024-05-21T12:53:35.921011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsN364CBpRsiH8WAk"], "accumulated_threat_level": 1.3, "timewindow": 185} +{"Format": "IDEA0", "ID": "54726d52-94df-4094-8086-8d78ce8db2ad", "DetectTime": "2024-05-21T12:53:35.983949+00:00", "EventTime": "2024-05-21T12:53:35.983967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbKVH2viSSC6jayU5"], "accumulated_threat_level": 2.1, "timewindow": 185} +{"Format": "IDEA0", "ID": "a242c054-0693-4a02-abb7-65037aa8deb9", "DetectTime": "2024-05-21T12:53:36.025809+00:00", "EventTime": "2024-05-21T12:53:36.025832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEoH3q2svAd1mGxLQh"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 185} +{"Format": "IDEA0", "ID": "b6762ab6-67aa-452d-9fd6-566a53e07eed", "DetectTime": "2024-05-21T12:53:36.074239+00:00", "EventTime": "2024-05-21T12:53:36.074261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfR4W2n7b57ekNBT6"], "accumulated_threat_level": 3.7, "timewindow": 185} +{"Format": "IDEA0", "ID": "48a61df0-e875-4548-9d56-c4533b9a9597", "DetectTime": "2024-05-21T12:53:36.128487+00:00", "EventTime": "2024-05-21T12:53:36.128506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9WhKH14ZLkfNFdyAj"], "accumulated_threat_level": 4.5, "timewindow": 185} +{"Format": "IDEA0", "ID": "2333624e-0a16-47e8-b131-ef53a4d7fcfa", "DetectTime": "2024-05-21T12:53:36.178999+00:00", "EventTime": "2024-05-21T12:53:36.179017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6o2Fb1IuMQAf5Uuul"], "accumulated_threat_level": 5.3, "timewindow": 185} +{"Format": "IDEA0", "ID": "7f16a7a4-5c4b-4360-acdf-621d509bd170", "DetectTime": "2024-05-21T12:53:36.444701+00:00", "EventTime": "2024-05-21T12:53:36.444719+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhm3spGEetjlakS2"], "accumulated_threat_level": 6.1, "timewindow": 185} +{"Format": "IDEA0", "ID": "615d84f5-ccb7-4a56-9e9c-16b37e37414b", "DetectTime": "2024-05-21T12:53:36.498801+00:00", "EventTime": "2024-05-21T12:53:36.498818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cby91eX9EjEo0dY6h"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "5e8f3a24-21eb-4224-aa04-212fb012d51a", "DetectTime": "2024-05-21T12:53:36.551432+00:00", "EventTime": "2024-05-21T12:53:36.551452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ld912LgQzlGyVlq7"], "accumulated_threat_level": 7.699999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "25dc6911-4750-4ba6-b2e0-fec3335d27bc", "DetectTime": "2024-05-21T12:53:36.601197+00:00", "EventTime": "2024-05-21T12:53:36.601216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoxtQ1jMJdFCczYt6"], "accumulated_threat_level": 8.5, "timewindow": 185} +{"Format": "IDEA0", "ID": "3d1c20d3-ab0c-4feb-a293-43170a1b36b3", "DetectTime": "2024-05-21T12:53:36.654629+00:00", "EventTime": "2024-05-21T12:53:36.654659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COi29F1TJYnTQPGkl1"], "accumulated_threat_level": 9.3, "timewindow": 185} +{"Format": "IDEA0", "ID": "ed45a95f-6c0c-4246-9159-73248c9e9924", "DetectTime": "2024-05-21T12:53:36.709366+00:00", "EventTime": "2024-05-21T12:53:36.709386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtzbUU2iMIaHo5EkJd"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "753db70a-a97a-4b10-959b-b6250f98b1cd", "DetectTime": "2024-05-21T12:53:36.756599+00:00", "EventTime": "2024-05-21T12:53:36.756617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVODiW37jcTjlhpmcd"], "accumulated_threat_level": 10.100000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "84a0d7df-b769-4e2e-a82f-fdd0ddb9197e", "DetectTime": "2024-05-21T12:53:36.900375+00:00", "EventTime": "2024-05-21T12:53:36.900395+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["92.54.229.42"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.54.229.42 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOgZTACZYfw25Ovf"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "95fadcb8-d53e-42e2-887e-17c5435f2fa8", "DetectTime": "2024-05-21T12:53:36.912951+00:00", "EventTime": "2024-05-21T12:53:36.912970+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.54.229.42"]}], "Attach": [{"Content": "connection to blacklisted IP: 92.54.229.42 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOgZTACZYfw25Ovf"], "accumulated_threat_level": 12.0, "timewindow": 43} +{"Format": "Json", "ID": "95fadcb8-d53e-42e2-887e-17c5435f2fa8", "DetectTime": "2024-05-21T12:53:36.912951+00:00", "EventTime": "2024-05-21T12:53:36.912970+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["92.54.229.42"]}], "Attach": [{"Content": "1970-01-02T18:33:34.109393+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:53:37.489803)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "f02933d8-8336-43f5-8ce0-e664b9be65b4", "DetectTime": "2024-05-21T12:53:37.506829+00:00", "EventTime": "2024-05-21T12:53:37.506847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7KguC298xtd2Z36fb"], "accumulated_threat_level": 10.900000000000002, "timewindow": 185} +{"Format": "IDEA0", "ID": "e7b621dd-c87b-444a-bb20-152654e38c49", "DetectTime": "2024-05-21T12:53:37.518440+00:00", "EventTime": "2024-05-21T12:53:37.518461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYpaYR3DeNkJcCR5t2"], "accumulated_threat_level": 11.700000000000003, "timewindow": 185} +{"Format": "IDEA0", "ID": "bda2a11c-f3ca-4354-bee4-468df0586155", "DetectTime": "2024-05-21T12:53:37.535362+00:00", "EventTime": "2024-05-21T12:53:37.535381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggUeN3SvsQTJ1qsgc"], "accumulated_threat_level": 12.500000000000004, "timewindow": 185} +{"Format": "Json", "ID": "bda2a11c-f3ca-4354-bee4-468df0586155", "DetectTime": "2024-05-21T12:53:37.535362+00:00", "EventTime": "2024-05-21T12:53:37.535381+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "1970-01-08T16:24:46.646388+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2024/05/21 12:53:37.746001)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 185, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "df90e7ef-d8ca-4055-a2fa-5dee9c338d5e", "DetectTime": "2024-05-21T12:53:37.762103+00:00", "EventTime": "2024-05-21T12:53:37.762131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8cO93CbNXuHSV963"], "accumulated_threat_level": 0.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "dd860a4b-71c7-47a3-9727-e14d84034d50", "DetectTime": "2024-05-21T12:53:37.774564+00:00", "EventTime": "2024-05-21T12:53:37.774589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGuDrP3JGMzaJms636"], "accumulated_threat_level": 1.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "fa833b7b-0cf8-4fea-87a5-edb76f252af9", "DetectTime": "2024-05-21T12:53:37.786938+00:00", "EventTime": "2024-05-21T12:53:37.786968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpa7ZW1STEz44UUK1f"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 185} +{"Format": "IDEA0", "ID": "e2b85f70-5d97-4a4c-b05f-75388fe90d98", "DetectTime": "2024-05-21T12:53:37.804263+00:00", "EventTime": "2024-05-21T12:53:37.804288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVx8Wk4FfXGOKzPCef"], "accumulated_threat_level": 3.2, "timewindow": 185} +{"Format": "IDEA0", "ID": "d7c2666b-e105-4091-911d-1dedbe1e453e", "DetectTime": "2024-05-21T12:53:37.817471+00:00", "EventTime": "2024-05-21T12:53:37.817494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtijCt4k3XRaRuA032"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "5a542e93-fea8-496f-9b76-bc5c42daa853", "DetectTime": "2024-05-21T12:53:37.830505+00:00", "EventTime": "2024-05-21T12:53:37.830524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxROW2qnezdUxhjX5"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "5871ec1e-e6f0-457e-a861-97dd93c94f4b", "DetectTime": "2024-05-21T12:53:37.843238+00:00", "EventTime": "2024-05-21T12:53:37.843256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRNu7uDaj44btfUg"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "6bde8d64-673d-4773-8504-d222f3bd3a5e", "DetectTime": "2024-05-21T12:53:37.855689+00:00", "EventTime": "2024-05-21T12:53:37.855712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COqANr1YXSPR0oIai5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "782aa0ea-af44-43c5-ae97-369d7dff14ea", "DetectTime": "2024-05-21T12:53:37.867147+00:00", "EventTime": "2024-05-21T12:53:37.867166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU048D3aSBdkExBkT6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "d8d92722-bff8-4e97-8f24-9faf1b4e9c8b", "DetectTime": "2024-05-21T12:53:37.917163+00:00", "EventTime": "2024-05-21T12:53:37.917184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyagSE4mpxXkPW71Vl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "cea56920-4fe6-4158-8a60-be4d920f93d8", "DetectTime": "2024-05-21T12:53:38.183693+00:00", "EventTime": "2024-05-21T12:53:38.183717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxak4n4dkeGAyDHLh9"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "5961815e-10d4-4fa7-bf40-a68518ea83d5", "DetectTime": "2024-05-21T12:53:38.243131+00:00", "EventTime": "2024-05-21T12:53:38.243154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMkZei4jLD2iRBYCxj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "099a87b5-ee43-4180-9555-c02310ec045f", "DetectTime": "2024-05-21T12:53:38.290321+00:00", "EventTime": "2024-05-21T12:53:38.290340+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjl5C117NNW4pLj1X1"], "accumulated_threat_level": 9.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "977eaba1-76d1-49f0-a2ca-bb26567a535f", "DetectTime": "2024-05-21T12:53:38.339949+00:00", "EventTime": "2024-05-21T12:53:38.339967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwQOi4efY1otSpfL4"], "accumulated_threat_level": 10.4, "timewindow": 185} +{"Format": "IDEA0", "ID": "20619948-b436-4745-b1ac-393ec6ef728c", "DetectTime": "2024-05-21T12:53:38.483431+00:00", "EventTime": "2024-05-21T12:53:38.483452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4L3J74EE5kCaZpaPd"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "dc39323a-93ba-4569-998c-30f1f80be112", "DetectTime": "2024-05-21T12:53:38.531777+00:00", "EventTime": "2024-05-21T12:53:38.531795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ifhD1E7ncWbZftXl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "930f1504-c7d6-4e9c-a045-1e09c567bf4c", "DetectTime": "2024-05-21T12:53:38.631334+00:00", "EventTime": "2024-05-21T12:53:38.631355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPscbz4IyUMVFExjP4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 185} +{"Format": "Json", "ID": "930f1504-c7d6-4e9c-a045-1e09c567bf4c", "DetectTime": "2024-05-21T12:53:38.631334+00:00", "EventTime": "2024-05-21T12:53:38.631355+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-08T16:55:20.467630+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2024/05/21 12:53:38.801265)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 185, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1c071cc5-2a8b-44a5-a186-8e845c6720d0", "DetectTime": "2024-05-21T12:53:38.926595+00:00", "EventTime": "2024-05-21T12:53:38.926617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBlOLyzfvxdmtUjpg"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "c9fd4047-cb9e-45bc-b6e3-fa0c148377bb", "DetectTime": "2024-05-21T12:53:38.931902+00:00", "EventTime": "2024-05-21T12:53:38.931923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFRqtV1eevbYWoxBm8"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "9f06a50d-62e0-4118-9310-cd66576071ce", "DetectTime": "2024-05-21T12:53:38.936768+00:00", "EventTime": "2024-05-21T12:53:38.936786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcPtlwqhxPGO5skej"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "9dfd299f-7f16-4693-80b8-05f5155612c4", "DetectTime": "2024-05-21T12:53:38.974861+00:00", "EventTime": "2024-05-21T12:53:38.974880+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7gdY1dtHRsLPvLL4"], "accumulated_threat_level": 0.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "8786f22f-f536-43d3-8728-acb458a41643", "DetectTime": "2024-05-21T12:53:39.094194+00:00", "EventTime": "2024-05-21T12:53:39.094213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrrCr3c7QikwmNDia"], "accumulated_threat_level": 1.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "a950461b-522c-439a-a01e-9a1ce138b713", "DetectTime": "2024-05-21T12:53:39.136504+00:00", "EventTime": "2024-05-21T12:53:39.136525+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7x9P3B0P2oQBPco4"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "ebba2a11-5228-4560-9349-5ea2a69d6e36", "DetectTime": "2024-05-21T12:53:39.441122+00:00", "EventTime": "2024-05-21T12:53:39.441140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQU6l4UKgiZTMc6H"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 185} +{"Format": "IDEA0", "ID": "560ea7e8-6f8d-4f56-9733-267a5568e29c", "DetectTime": "2024-05-21T12:53:39.475360+00:00", "EventTime": "2024-05-21T12:53:39.475380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJYlj638cCR09A3RAa"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "08a9d2c0-d05f-40fc-9bb4-090412473509", "DetectTime": "2024-05-21T12:53:39.480695+00:00", "EventTime": "2024-05-21T12:53:39.480717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4T2NS3lUGHfWXBs6"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "b676b3f4-19a3-4049-aba7-7b25379691ac", "DetectTime": "2024-05-21T12:53:39.486118+00:00", "EventTime": "2024-05-21T12:53:39.486138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C069wm3fU5yTyXN40l"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "845d1473-1868-4f29-a8ea-7249f0271bdf", "DetectTime": "2024-05-21T12:53:39.490909+00:00", "EventTime": "2024-05-21T12:53:39.490928+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN5y861rpwoyU9mHei"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "61554cbf-4a61-4bbd-89ee-a556f2ac578e", "DetectTime": "2024-05-21T12:53:39.655982+00:00", "EventTime": "2024-05-21T12:53:39.656002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl961B10vGqql6hP43"], "accumulated_threat_level": 3.2, "timewindow": 185} +{"Format": "IDEA0", "ID": "4b252361-908d-41c0-8678-0054c1120acf", "DetectTime": "2024-05-21T12:53:39.693078+00:00", "EventTime": "2024-05-21T12:53:39.693101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVYpkJ1tWS9f5VtbH8"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "183180fb-1c77-441d-822f-689a6d4effcc", "DetectTime": "2024-05-21T12:53:40.058394+00:00", "EventTime": "2024-05-21T12:53:40.058426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyW3oC1ycNcPZ5IwE5"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "abedbc19-8d17-4f91-9804-4a93aa986472", "DetectTime": "2024-05-21T12:53:40.084887+00:00", "EventTime": "2024-05-21T12:53:40.084908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwkI21O7Z5k3ncWX4"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "04ea5df4-4fe5-452f-a1a1-3b9b20a68aeb", "DetectTime": "2024-05-21T12:53:40.160750+00:00", "EventTime": "2024-05-21T12:53:40.160771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrUrhm2xhlgXwKVKWi"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "442266bb-8339-4b6f-a55c-763bbcbd522e", "DetectTime": "2024-05-21T12:53:40.209022+00:00", "EventTime": "2024-05-21T12:53:40.209050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHKfyNl109BNVaa3"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "2da36dd8-9738-4dfd-bb1e-1971b2a13448", "DetectTime": "2024-05-21T12:53:40.253122+00:00", "EventTime": "2024-05-21T12:53:40.253143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn2mIC20VHvKddNpC1"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "d9c0043a-c335-498e-ab19-794141f3e0e4", "DetectTime": "2024-05-21T12:53:40.374245+00:00", "EventTime": "2024-05-21T12:53:40.374268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQYJd21zUhl9zzIaof"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "decd6198-7210-4d83-a7ca-3d2ed15932c0", "DetectTime": "2024-05-21T12:53:40.390296+00:00", "EventTime": "2024-05-21T12:53:40.390335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BRyt4JYhrtShrFxe"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "23515ec6-43f4-4136-974f-e05f1d438396", "DetectTime": "2024-05-21T12:53:40.396060+00:00", "EventTime": "2024-05-21T12:53:40.396080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYg3J116hPzAyIFAac"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "56e99787-03f1-4076-932e-29316e7358e2", "DetectTime": "2024-05-21T12:53:40.638844+00:00", "EventTime": "2024-05-21T12:53:40.638863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTsNRc4414KHLPEJb"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "b32d02df-4c36-4dc1-8f7d-e1285ea5e4d4", "DetectTime": "2024-05-21T12:53:40.727522+00:00", "EventTime": "2024-05-21T12:53:40.727544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLNxFA3j5BmGGZ0fjf"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "d2770347-8bab-491b-816e-3b416b44bf32", "DetectTime": "2024-05-21T12:53:40.827298+00:00", "EventTime": "2024-05-21T12:53:40.827320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cke58Iu8U1oEXOJUd"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "8178d237-b105-4244-bf8a-47eddcbfc00a", "DetectTime": "2024-05-21T12:53:40.833833+00:00", "EventTime": "2024-05-21T12:53:40.833851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQNDaMJPGo4cR1zu7"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "20cb46e1-dfaa-4dfd-9c51-53f56af22b8e", "DetectTime": "2024-05-21T12:53:40.850828+00:00", "EventTime": "2024-05-21T12:53:40.850849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNG9K2u0sOSii0VBi"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "23f18bf5-c846-48f1-b6ed-a2457bcac248", "DetectTime": "2024-05-21T12:53:40.875510+00:00", "EventTime": "2024-05-21T12:53:40.875529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzytEH3sQLHaMHPYwa"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "e7a6c58a-38ac-4b39-9308-036b0d16ba68", "DetectTime": "2024-05-21T12:53:41.323326+00:00", "EventTime": "2024-05-21T12:53:41.323350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjc7asmrN1SbcwU3"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "53609f53-6a77-4a3f-8053-fdd7624eac76", "DetectTime": "2024-05-21T12:53:41.329969+00:00", "EventTime": "2024-05-21T12:53:41.329991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMTPZH1Z1nmJ0LHZtc"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "bb74d949-5946-4376-943f-078af64898ff", "DetectTime": "2024-05-21T12:53:41.335402+00:00", "EventTime": "2024-05-21T12:53:41.335421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chn97l4ZMiHHFcfjPg"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "d9dfed08-2d9f-4dc5-908e-fc3ed6ec68ca", "DetectTime": "2024-05-21T12:53:41.405132+00:00", "EventTime": "2024-05-21T12:53:41.405152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COfGgN3veTZjN5cxoi"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "86ae335b-19bb-4ac6-b968-3019571f1185", "DetectTime": "2024-05-21T12:53:41.447934+00:00", "EventTime": "2024-05-21T12:53:41.447959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUZvq629VDxaDpbTx8"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "2b1f6347-671d-4d83-96d9-3c2f2aa6a947", "DetectTime": "2024-05-21T12:53:41.462131+00:00", "EventTime": "2024-05-21T12:53:41.462150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CATYqc2mMncZ25DiN5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "973722d6-3c06-4570-8cba-bd346d6b1c60", "DetectTime": "2024-05-21T12:53:41.848114+00:00", "EventTime": "2024-05-21T12:53:41.848136+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx6aMi2Nd5nNPRu8Zi"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "54a65308-e580-4dee-849c-76980cd6cd9d", "DetectTime": "2024-05-21T12:53:41.875005+00:00", "EventTime": "2024-05-21T12:53:41.875027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTJxlc4VZkqKwKbtj3"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "4ef44efe-6cf4-4474-aba5-91566d7501da", "DetectTime": "2024-05-21T12:53:41.920710+00:00", "EventTime": "2024-05-21T12:53:41.920732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbnTLWrLO70pEeGdb"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "9acb43b6-afaa-43f5-b0c7-2ecfd020ffc6", "DetectTime": "2024-05-21T12:53:41.930997+00:00", "EventTime": "2024-05-21T12:53:41.931017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYpFU3mpbMOF7KeMe"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "0d1ac3de-088e-4afd-a04a-75711bbf478a", "DetectTime": "2024-05-21T12:53:41.960444+00:00", "EventTime": "2024-05-21T12:53:41.960467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUBV4q3mDBBLSGDaf3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "33c343c9-6ebe-4fce-9614-2c99ec76fe78", "DetectTime": "2024-05-21T12:53:41.974278+00:00", "EventTime": "2024-05-21T12:53:41.974299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTeu7T3oNqhWUfQQj9"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "ee72e8f4-ce24-4995-bf49-a8704afa5e7e", "DetectTime": "2024-05-21T12:53:42.063057+00:00", "EventTime": "2024-05-21T12:53:42.063080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFF5Og3Q1kqGZRVyHe"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "124cef52-3ed8-4271-a066-1fbd93cc26f3", "DetectTime": "2024-05-21T12:53:42.460457+00:00", "EventTime": "2024-05-21T12:53:42.460481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO8sQy357gGKpX0Dv2"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "30d9dc59-96aa-4f92-889e-eedf324481e6", "DetectTime": "2024-05-21T12:53:42.534030+00:00", "EventTime": "2024-05-21T12:53:42.534051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CblAj84LDtkBhwV9gi"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "7017b8f3-61ee-4d92-a047-f228b315cbae", "DetectTime": "2024-05-21T12:53:42.539402+00:00", "EventTime": "2024-05-21T12:53:42.539422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLJPJUOy1GFsvrW5"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "5cac1e73-8b74-4ce3-9725-873940268b94", "DetectTime": "2024-05-21T12:53:42.545516+00:00", "EventTime": "2024-05-21T12:53:42.545535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjYVSi3xfNFSXd05l9"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "8eff92e9-c42f-4b56-bdff-f0ffdf1c793f", "DetectTime": "2024-05-21T12:53:42.550090+00:00", "EventTime": "2024-05-21T12:53:42.550114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaSVPw1ll8lcJ2ngF4"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "2e664bc2-2881-481d-aa37-43bf34417d23", "DetectTime": "2024-05-21T12:53:42.587430+00:00", "EventTime": "2024-05-21T12:53:42.587448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZtzb2K8LtkUDQX0a"], "accumulated_threat_level": 7.999999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "b947ae70-385f-4c03-b852-7b43e82a6419", "DetectTime": "2024-05-21T12:53:42.592217+00:00", "EventTime": "2024-05-21T12:53:42.592234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE9hR814ZTiEEsbYWd"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "10acfe74-746f-47cf-b871-847da84692eb", "DetectTime": "2024-05-21T12:53:42.634225+00:00", "EventTime": "2024-05-21T12:53:42.634244+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["189.134.36.148"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.134.36.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPsqOc6nG0tIGTtZa"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "dd07adee-6d21-4b80-a571-86090fd0d79f", "DetectTime": "2024-05-21T12:53:42.648307+00:00", "EventTime": "2024-05-21T12:53:42.648340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["189.134.36.148"]}], "Attach": [{"Content": "connection to blacklisted IP: 189.134.36.148 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPsqOc6nG0tIGTtZa"], "accumulated_threat_level": 0.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "8aca1b40-0208-4d4a-b657-cc46ba1dbb4d", "DetectTime": "2024-05-21T12:53:43.123973+00:00", "EventTime": "2024-05-21T12:53:43.123996+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwXBVj2dTLbL3hRSM6"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "a8ccfaa0-f118-4f60-bbbc-a749ffeb4406", "DetectTime": "2024-05-21T12:53:43.164136+00:00", "EventTime": "2024-05-21T12:53:43.164158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpySsn3xU0ZFfBW2A8"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "5301332a-23ed-4164-a0bd-c2a6a6e721ee", "DetectTime": "2024-05-21T12:53:43.187630+00:00", "EventTime": "2024-05-21T12:53:43.187654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUgHgr2zAEFVckmZuf"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "26d0d24d-2a19-4781-a859-5d4a5a877db4", "DetectTime": "2024-05-21T12:53:43.192685+00:00", "EventTime": "2024-05-21T12:53:43.192706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmYjkn3itoNHEcOhQl"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "ad7c1dbc-f6a4-47ca-b7df-6e3b220ad32d", "DetectTime": "2024-05-21T12:53:43.249141+00:00", "EventTime": "2024-05-21T12:53:43.249162+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpC7Ep3WZtEDvYV8Ek"], "accumulated_threat_level": 8.799999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "db921421-994d-4d1f-873b-eb06c5c7ae6f", "DetectTime": "2024-05-21T12:53:43.259450+00:00", "EventTime": "2024-05-21T12:53:43.259469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2y62Z3PuvKcPQ1EMk"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "abb4c789-36fe-4d54-aaad-993bed0680e6", "DetectTime": "2024-05-21T12:53:43.386708+00:00", "EventTime": "2024-05-21T12:53:43.386730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C913nq3NTGimkhpaT4"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "4f2db1a1-0cff-4147-bcc7-4fb8d608f3a8", "DetectTime": "2024-05-21T12:53:43.735180+00:00", "EventTime": "2024-05-21T12:53:43.735202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLOVRB27SqyHobte1e"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "e50f9069-d1c3-45d6-8c3e-bf8472c3a920", "DetectTime": "2024-05-21T12:53:43.809022+00:00", "EventTime": "2024-05-21T12:53:43.809044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ32wc2OWNGTmBP9Vl"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "4eaef127-8f93-4779-a7d1-4ff3af01d7ad", "DetectTime": "2024-05-21T12:53:43.861172+00:00", "EventTime": "2024-05-21T12:53:43.861192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEV5pz74NMfAuTwa3"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "a963a4d7-0b44-49db-86e6-be5b612699ca", "DetectTime": "2024-05-21T12:53:43.869147+00:00", "EventTime": "2024-05-21T12:53:43.869167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPxvS33dfaNA1am7Z7"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "20983c82-bcb9-4987-9244-01d2ff5bbfa9", "DetectTime": "2024-05-21T12:53:43.873917+00:00", "EventTime": "2024-05-21T12:53:43.873936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccm5Eb2zYbhuf0Z78l"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "3ea1fbec-1090-4a81-ba24-71b62beb1b1e", "DetectTime": "2024-05-21T12:53:43.878539+00:00", "EventTime": "2024-05-21T12:53:43.878557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbGKrt09VCUPinZU7"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "62d46d37-88f9-4f33-b4fe-74349c85cb8c", "DetectTime": "2024-05-21T12:53:44.182592+00:00", "EventTime": "2024-05-21T12:53:44.182610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8thpJOmUinKQWGg"], "accumulated_threat_level": 9.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "0b584622-2e75-4496-b6f6-74c57d89ee53", "DetectTime": "2024-05-21T12:53:44.436436+00:00", "EventTime": "2024-05-21T12:53:44.436456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakMDB2deJgaurcSIe"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "bf9d0232-748a-46c1-9b16-36cc83707bce", "DetectTime": "2024-05-21T12:53:44.453920+00:00", "EventTime": "2024-05-21T12:53:44.453945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPQJvK1zkCCLuiTxX9"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "cc4b50a2-1638-4df6-aacc-70dfe78b666d", "DetectTime": "2024-05-21T12:53:44.458761+00:00", "EventTime": "2024-05-21T12:53:44.458780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjO2uL3Ch5CPydM8Hj"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "0ce99312-8278-4042-8810-209f7c6f849a", "DetectTime": "2024-05-21T12:53:44.463547+00:00", "EventTime": "2024-05-21T12:53:44.463566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCctR13hW0gKf0H4Sh"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "e320d81a-6e67-4263-9c74-7b391e9551fc", "DetectTime": "2024-05-21T12:53:44.485670+00:00", "EventTime": "2024-05-21T12:53:44.485692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1pS71frwx4nSK4Gj"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "9e1b7d82-9677-4618-be70-8be97d5037fa", "DetectTime": "2024-05-21T12:53:44.906260+00:00", "EventTime": "2024-05-21T12:53:44.906278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7OS21dsFEE23Tzf8"], "accumulated_threat_level": 10.4, "timewindow": 185} +{"Format": "IDEA0", "ID": "4e668a5c-bc16-40b7-84a0-5216b7585e83", "DetectTime": "2024-05-21T12:53:44.937132+00:00", "EventTime": "2024-05-21T12:53:44.937156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3dVUdhsdjXzIZdxa"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "136ade6d-fad8-4bdc-bb7d-52fbe7af27d0", "DetectTime": "2024-05-21T12:53:45.082203+00:00", "EventTime": "2024-05-21T12:53:45.082227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6fX2G3dptegfCIEsj"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "2b4d37c9-37ef-4b56-b6df-2e7e47788853", "DetectTime": "2024-05-21T12:53:45.115160+00:00", "EventTime": "2024-05-21T12:53:45.115182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQZxg9cgcrSPmn2"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "9567825a-d22d-47f5-ae0d-656c560e40c9", "DetectTime": "2024-05-21T12:53:45.121060+00:00", "EventTime": "2024-05-21T12:53:45.121079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 86.156.139.155 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7njNh2rekUAXA8Gni"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "5b57604e-98b4-4aba-a6ae-86aaf0767215", "DetectTime": "2024-05-21T12:53:45.126544+00:00", "EventTime": "2024-05-21T12:53:45.126564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CreiBh4OIOTCBeeJ7f"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "0a5cc38f-04e5-4898-9ab8-990229c14cd8", "DetectTime": "2024-05-21T12:53:45.131619+00:00", "EventTime": "2024-05-21T12:53:45.131638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKPaghS7nYiomroXd"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "53e36fae-7108-490b-b4f0-73a4e59fe2db", "DetectTime": "2024-05-21T12:53:45.495942+00:00", "EventTime": "2024-05-21T12:53:45.495962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcgTgb2inr3tcpla4k"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "c75f3ff3-f2f0-4d93-86f9-b7cf0d152143", "DetectTime": "2024-05-21T12:53:45.572475+00:00", "EventTime": "2024-05-21T12:53:45.572496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbY3Y02oMoD92oFbB7"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "7246ac6c-2349-41cd-ac88-52ff43fe38fc", "DetectTime": "2024-05-21T12:53:45.582027+00:00", "EventTime": "2024-05-21T12:53:45.582046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy1Tmv3wvFAs9Wsfmf"], "accumulated_threat_level": 0.8, "timewindow": 183} +{"Format": "IDEA0", "ID": "ead91039-0ac5-469b-97b7-71b4a7e832b6", "DetectTime": "2024-05-21T12:53:45.636695+00:00", "EventTime": "2024-05-21T12:53:45.636716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpuh1nhnRGf5MXCda"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "9820351c-9b32-4659-a215-b332d162c1f4", "DetectTime": "2024-05-21T12:53:45.821071+00:00", "EventTime": "2024-05-21T12:53:45.821092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZJ2v3RMaKB5TVhW8"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "2f01424b-ac96-4cf9-be91-29b0dedafbb0", "DetectTime": "2024-05-21T12:53:45.827361+00:00", "EventTime": "2024-05-21T12:53:45.827379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckn8Zw1EdMGduMog4k"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "230b6c6b-0f75-4184-825a-0644cb01b950", "DetectTime": "2024-05-21T12:53:45.832061+00:00", "EventTime": "2024-05-21T12:53:45.832079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYw4bW3PCfP1gRACx7"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "731eca77-3a64-43d0-83b4-304e4764f894", "DetectTime": "2024-05-21T12:53:45.836706+00:00", "EventTime": "2024-05-21T12:53:45.836723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CG0Jhm2vV1s7An6Vf"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "5c3cf456-9c23-42ef-bfab-ce5105367080", "DetectTime": "2024-05-21T12:53:45.841044+00:00", "EventTime": "2024-05-21T12:53:45.841062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTz73G2TSNCZUJioVi"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "fd4ec98b-98ec-4fea-bf05-538c8d992b61", "DetectTime": "2024-05-21T12:53:46.345402+00:00", "EventTime": "2024-05-21T12:53:46.345421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQ82XYymMVdAP2eb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 185} +{"Format": "Json", "ID": "fd4ec98b-98ec-4fea-bf05-538c8d992b61", "DetectTime": "2024-05-21T12:53:46.345402+00:00", "EventTime": "2024-05-21T12:53:46.345421+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-08T16:55:23.827281+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 185. (real time 2024/05/21 12:53:46.547209)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 185, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "514b609a-4640-4a84-b5f3-75e46dcc44da", "DetectTime": "2024-05-21T12:53:46.552680+00:00", "EventTime": "2024-05-21T12:53:46.552702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CszuZz3RM5mvm5vAB7"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "821afef2-cc14-43a0-a693-7881457d9ee3", "DetectTime": "2024-05-21T12:53:46.558308+00:00", "EventTime": "2024-05-21T12:53:46.558328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpxJ3X3KoFEIlpCm9k"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "49fdab25-cb5c-45ce-87a6-131f29749d48", "DetectTime": "2024-05-21T12:53:46.563359+00:00", "EventTime": "2024-05-21T12:53:46.563379+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWS2AY2KYp25iL32E6"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "f09132f0-9166-499c-a64d-368046488019", "DetectTime": "2024-05-21T12:53:46.568458+00:00", "EventTime": "2024-05-21T12:53:46.568477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8wjzj4LxnCitZVa13"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "ad632a84-520f-4fae-a7e5-7f4ad8419ff8", "DetectTime": "2024-05-21T12:53:46.574062+00:00", "EventTime": "2024-05-21T12:53:46.574085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZdez89TDlA3xXIXe"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "f3fe44bc-0dc1-4a76-acb9-4d77cd5035ae", "DetectTime": "2024-05-21T12:53:46.973847+00:00", "EventTime": "2024-05-21T12:53:46.973869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdisdTi9brimHgeW6"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "ffae4465-e51a-4589-851c-5619c42889c0", "DetectTime": "2024-05-21T12:53:46.981297+00:00", "EventTime": "2024-05-21T12:53:46.981316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKzU294uLBehx0DgNh"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "15d46ee6-1ee9-4b90-b947-c62e0067f67b", "DetectTime": "2024-05-21T12:53:46.989599+00:00", "EventTime": "2024-05-21T12:53:46.989618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWAe1J24fGez6yHcX1"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "2ea5fa6a-7ec4-4f96-8840-10788fdb7aaf", "DetectTime": "2024-05-21T12:53:46.997493+00:00", "EventTime": "2024-05-21T12:53:46.997515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUk9Mq2r3FCVYerWf9"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "64680f8e-4590-4457-b514-f3e35e2eadf6", "DetectTime": "2024-05-21T12:53:47.002197+00:00", "EventTime": "2024-05-21T12:53:47.002216+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ77ih29OLDOj5dUT2"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "d4232afb-9d94-4741-a523-bb5a7954b69d", "DetectTime": "2024-05-21T12:53:47.006805+00:00", "EventTime": "2024-05-21T12:53:47.006823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXJUSpmg9tnmNv1Si"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "a1846820-1e29-47ac-a3bb-0d15be705cd1", "DetectTime": "2024-05-21T12:53:47.013146+00:00", "EventTime": "2024-05-21T12:53:47.013168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx0EjW1LcTZ3qF6MAk"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "f0dd828d-6da4-4c17-bdab-81ef12ca55f3", "DetectTime": "2024-05-21T12:53:47.018015+00:00", "EventTime": "2024-05-21T12:53:47.018033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURJ2Z12sDyeMwt6De"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "63eb932d-7c09-437d-b14c-d4489ba88d7f", "DetectTime": "2024-05-21T12:53:47.432165+00:00", "EventTime": "2024-05-21T12:53:47.432183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ghx52gaX9hB2kwVa"], "accumulated_threat_level": 0.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "65e3a862-00f3-4027-8def-65f08ce4024b", "DetectTime": "2024-05-21T12:53:47.679374+00:00", "EventTime": "2024-05-21T12:53:47.679396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPLNCp1bcZMIq4Xxh"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "c3fcb826-37fe-41f3-8260-6a23f6eda275", "DetectTime": "2024-05-21T12:53:47.684353+00:00", "EventTime": "2024-05-21T12:53:47.684372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkAOO34j0MHRah149i"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "c6754bb1-006c-4119-9632-b26e626f2878", "DetectTime": "2024-05-21T12:53:47.718853+00:00", "EventTime": "2024-05-21T12:53:47.718877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGXo5t4xTT8hOjgQBe"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "9699bc15-f937-497e-9173-66e23e1c74b5", "DetectTime": "2024-05-21T12:53:47.724076+00:00", "EventTime": "2024-05-21T12:53:47.724093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqE32x3FzrWBTqPIA2"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "943e5f72-dd43-40c4-a700-55d2645f0d92", "DetectTime": "2024-05-21T12:53:47.990237+00:00", "EventTime": "2024-05-21T12:53:47.990258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpMDR13yWmt6wjf9ud"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "8197966a-47f0-4f08-844c-a1e573805f27", "DetectTime": "2024-05-21T12:53:48.020119+00:00", "EventTime": "2024-05-21T12:53:48.020140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkS3e2Yp3QII87LY"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "7bed3397-3f09-4fd3-83ce-e0bd1a6f5ff4", "DetectTime": "2024-05-21T12:53:48.139680+00:00", "EventTime": "2024-05-21T12:53:48.139700+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrorZ83FgvYghsn4uh"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "5909c58d-bb0b-4142-9fe3-41f5b8c38a7d", "DetectTime": "2024-05-21T12:53:48.228521+00:00", "EventTime": "2024-05-21T12:53:48.228540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgtAw43ul0stCFcSd"], "accumulated_threat_level": 1.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "1015eebb-7151-4cee-8312-5b2035958006", "DetectTime": "2024-05-21T12:53:48.279624+00:00", "EventTime": "2024-05-21T12:53:48.279647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWtBbr3aWm8B3hbDI4"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "be4371ee-99c5-4ad5-8dc7-e8eeac028431", "DetectTime": "2024-05-21T12:53:48.532000+00:00", "EventTime": "2024-05-21T12:53:48.532030+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["178.88.132.202"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.132.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfR4Bi4bzR0u0IHhik"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "5bb0713b-02dd-445d-a035-7047610ed543", "DetectTime": "2024-05-21T12:53:48.544383+00:00", "EventTime": "2024-05-21T12:53:48.544403+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["178.88.132.202"]}], "Attach": [{"Content": "connection to blacklisted IP: 178.88.132.202 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfR4Bi4bzR0u0IHhik"], "accumulated_threat_level": 1.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "59525613-ef65-4e11-a071-5bab72b264f5", "DetectTime": "2024-05-21T12:53:48.600761+00:00", "EventTime": "2024-05-21T12:53:48.600780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPgzcX23DG2A8dUmD2"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "d5431ba9-5476-47d6-83d1-152f369ccd1b", "DetectTime": "2024-05-21T12:53:48.607135+00:00", "EventTime": "2024-05-21T12:53:48.607154+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCqIuP2cNpV4YeCOC4"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "e6f4f4e3-b034-4fc7-9da0-cb687e27a258", "DetectTime": "2024-05-21T12:53:48.699958+00:00", "EventTime": "2024-05-21T12:53:48.699978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4Ko2vP4HkWIyVUoj"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "497b657e-d5b9-4ff3-991d-3999e458a6b3", "DetectTime": "2024-05-21T12:53:48.781052+00:00", "EventTime": "2024-05-21T12:53:48.781074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXkCq71CIJgGYszFRc"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "2a8bd53b-0877-496f-b30f-2518ffc49c98", "DetectTime": "2024-05-21T12:53:48.792817+00:00", "EventTime": "2024-05-21T12:53:48.792837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COlSVUuFce7TBqZQk"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "1fcabac5-57e7-45d8-a121-c9f7765e9de2", "DetectTime": "2024-05-21T12:53:48.881255+00:00", "EventTime": "2024-05-21T12:53:48.881286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzAkmI2mQW6qvtDx74"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "6ad85d63-a1f7-4b8f-b00c-8cfafae49889", "DetectTime": "2024-05-21T12:53:48.887605+00:00", "EventTime": "2024-05-21T12:53:48.887625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjcjO123XtjbgM7dm5"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "2d50b69f-bdcd-4357-8a5f-6a8d7b072a12", "DetectTime": "2024-05-21T12:53:48.892601+00:00", "EventTime": "2024-05-21T12:53:48.892620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVcXaI3tlLBu52FxBj"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "e4d1b6b0-dfe9-4b62-b3ce-c627be1bab2b", "DetectTime": "2024-05-21T12:53:48.897177+00:00", "EventTime": "2024-05-21T12:53:48.897195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpsBc1V7CDyGxLgQ8"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "f15d1e26-93cd-4bf2-9b34-21ea992ea9d6", "DetectTime": "2024-05-21T12:53:49.249722+00:00", "EventTime": "2024-05-21T12:53:49.249743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cziwzs4nPIPKfI70Jk"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "03f61f5c-903f-4b36-9a4b-22e7b1f82ac1", "DetectTime": "2024-05-21T12:53:49.303451+00:00", "EventTime": "2024-05-21T12:53:49.303480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1Mrbk4hE1yK9oE6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 185} +{"Format": "IDEA0", "ID": "e9f6021d-ba44-4b09-a55e-7add9dd44587", "DetectTime": "2024-05-21T12:53:49.318023+00:00", "EventTime": "2024-05-21T12:53:49.318043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKVJLt4DKlL3TINpWi"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "1b0d7cf5-f4fc-42cb-ae3a-2e8b6d19d87d", "DetectTime": "2024-05-21T12:53:49.733849+00:00", "EventTime": "2024-05-21T12:53:49.733874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDEcvF40jAuoZpvH36"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "25d3496d-4256-4af8-af58-6731b9c745f9", "DetectTime": "2024-05-21T12:53:49.765896+00:00", "EventTime": "2024-05-21T12:53:49.765919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwArle2fTdGVuuU7sf"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "a04631cb-9fdb-41fb-bc26-0e4175f38a2a", "DetectTime": "2024-05-21T12:53:49.801533+00:00", "EventTime": "2024-05-21T12:53:49.801554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMUOiNyBTC1NXWOa"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "d6df02e8-e9ff-4846-87a7-3e657fd6d6a8", "DetectTime": "2024-05-21T12:53:49.860845+00:00", "EventTime": "2024-05-21T12:53:49.860869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXyKER8FEEuC4o8O4"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "3ab0bc7d-adcf-4ba7-9db6-f7bb5b07e571", "DetectTime": "2024-05-21T12:53:50.071726+00:00", "EventTime": "2024-05-21T12:53:50.071749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgWygD1tYCZG8ZYFMh"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "903188fb-0b79-4847-ac81-e451584f54ab", "DetectTime": "2024-05-21T12:53:50.077978+00:00", "EventTime": "2024-05-21T12:53:50.077999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChC7bLFSP7LU4ZYs7"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "7233bde5-c59f-46b2-8d3d-740cd9934938", "DetectTime": "2024-05-21T12:53:50.095258+00:00", "EventTime": "2024-05-21T12:53:50.095278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1FOxYteLb2MLxN7"], "accumulated_threat_level": 3.2, "timewindow": 185} +{"Format": "IDEA0", "ID": "50297e0b-f61a-49ed-a6a0-e41c18dc5008", "DetectTime": "2024-05-21T12:53:50.100847+00:00", "EventTime": "2024-05-21T12:53:50.100865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLW6qO1fKDrI531n97"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "99c6d6fe-de4d-4aaa-9c54-7797e2b06191", "DetectTime": "2024-05-21T12:53:50.115220+00:00", "EventTime": "2024-05-21T12:53:50.115240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYYfIc3AWIpnV3d0Z9"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "78d60ce0-e010-4b5c-a37c-cae58eb7d0e6", "DetectTime": "2024-05-21T12:53:50.120078+00:00", "EventTime": "2024-05-21T12:53:50.120097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBGVig4cvEhceT8sHi"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "d7a446e9-ac6e-44bc-b91a-59396e8a6902", "DetectTime": "2024-05-21T12:53:50.157101+00:00", "EventTime": "2024-05-21T12:53:50.157122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Kv6o498N8z07xn9i"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "cea0f9cd-325a-4132-977a-b60b55f16e3a", "DetectTime": "2024-05-21T12:53:50.432611+00:00", "EventTime": "2024-05-21T12:53:50.432633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6h2G33tFjvjYd7IIc"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "23014305-91c0-4a8a-8221-318cef1ca05e", "DetectTime": "2024-05-21T12:53:50.517080+00:00", "EventTime": "2024-05-21T12:53:50.517103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3rtiT3KjwRjfrIXik"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "d5146cce-415e-4752-a1a2-5b91461116e6", "DetectTime": "2024-05-21T12:53:51.048537+00:00", "EventTime": "2024-05-21T12:53:51.048560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNVkIunxGvBRzT7i"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "7ee9d113-9606-43c8-ad1e-9cfad44d8192", "DetectTime": "2024-05-21T12:53:51.058380+00:00", "EventTime": "2024-05-21T12:53:51.058401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjeqop3WnIO83sbtEd"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "317f535d-b7c6-4846-b278-5ebc2918d226", "DetectTime": "2024-05-21T12:53:51.066446+00:00", "EventTime": "2024-05-21T12:53:51.066469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5eEOOrNJmVWR9rVd"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "f533df26-4761-4e97-9914-1cd5a2f81037", "DetectTime": "2024-05-21T12:53:51.071421+00:00", "EventTime": "2024-05-21T12:53:51.071442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR4GNt4MnIGuYaUYW9"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "84f22158-c3ab-4b08-ac2e-fa2de2a9b105", "DetectTime": "2024-05-21T12:53:51.112117+00:00", "EventTime": "2024-05-21T12:53:51.112137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRNV8L2ad3mY4bzcwf"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "48c5dc6a-4cc3-4a09-9108-9eaa388fabd0", "DetectTime": "2024-05-21T12:53:51.117198+00:00", "EventTime": "2024-05-21T12:53:51.117218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtMbya1ozOl5MFLskj"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "b823c1c3-bb1b-43f2-b2ce-689e10170722", "DetectTime": "2024-05-21T12:53:51.129172+00:00", "EventTime": "2024-05-21T12:53:51.129194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv6aTp4zrmxHadY9vb"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "1a27ff92-9ee4-4bab-833f-2bd1d0a1afce", "DetectTime": "2024-05-21T12:53:51.300938+00:00", "EventTime": "2024-05-21T12:53:51.300958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7ncF3nResd2wrbt3"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "a02bc3f8-b2d7-4152-91ff-3bb9a8b97de2", "DetectTime": "2024-05-21T12:53:51.623250+00:00", "EventTime": "2024-05-21T12:53:51.623272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKsN364CBpRsiH8WAk"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "0905d294-fca4-4082-993a-a6c09a471333", "DetectTime": "2024-05-21T12:53:51.705156+00:00", "EventTime": "2024-05-21T12:53:51.705178+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvbKVH2viSSC6jayU5"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "2aabad70-aa60-4803-af85-f38d656be2d9", "DetectTime": "2024-05-21T12:53:51.815834+00:00", "EventTime": "2024-05-21T12:53:51.815859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEoH3q2svAd1mGxLQh"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "cf729a44-9586-4b9e-952d-b22133dc5e8a", "DetectTime": "2024-05-21T12:53:51.875187+00:00", "EventTime": "2024-05-21T12:53:51.875212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKfR4W2n7b57ekNBT6"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "0b231cbf-72b8-47ad-8618-3298f098081e", "DetectTime": "2024-05-21T12:53:51.882612+00:00", "EventTime": "2024-05-21T12:53:51.882631+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNeOhI2Mc3JpRHRTMi"], "accumulated_threat_level": 10.4, "timewindow": 184} +{"Format": "IDEA0", "ID": "a5e6e1c8-7fb5-4b51-a697-8adcb8e9b725", "DetectTime": "2024-05-21T12:53:51.887500+00:00", "EventTime": "2024-05-21T12:53:51.887519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6o2Fb1IuMQAf5Uuul"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "ec5f59e5-649b-4c99-9855-bacccf4ae3af", "DetectTime": "2024-05-21T12:53:51.892298+00:00", "EventTime": "2024-05-21T12:53:51.892317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ld912LgQzlGyVlq7"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "9bb94344-e21d-4dd8-b1d8-cd8b7d6e8b5e", "DetectTime": "2024-05-21T12:53:51.896885+00:00", "EventTime": "2024-05-21T12:53:51.896904+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cby91eX9EjEo0dY6h"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "2e61855d-9215-4cc9-987b-3794578de164", "DetectTime": "2024-05-21T12:53:51.901543+00:00", "EventTime": "2024-05-21T12:53:51.901567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COi29F1TJYnTQPGkl1"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "0065f8d3-533f-4114-bb90-ba1c483c07cd", "DetectTime": "2024-05-21T12:53:51.906650+00:00", "EventTime": "2024-05-21T12:53:51.906671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIhm3spGEetjlakS2"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "10cf4ef4-6a17-4ea5-8ceb-095b4350a5f5", "DetectTime": "2024-05-21T12:53:51.911573+00:00", "EventTime": "2024-05-21T12:53:51.911590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9WhKH14ZLkfNFdyAj"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "bc3a335f-78a9-4914-af04-a9fb355a9fb2", "DetectTime": "2024-05-21T12:53:52.185015+00:00", "EventTime": "2024-05-21T12:53:52.185036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcoxtQ1jMJdFCczYt6"], "accumulated_threat_level": 4.0, "timewindow": 185} +{"Format": "IDEA0", "ID": "a8b796db-631c-4bff-8cbb-db29578fff87", "DetectTime": "2024-05-21T12:53:52.642376+00:00", "EventTime": "2024-05-21T12:53:52.642394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjLBW1MPvSVHaqT2d"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "14cc0c4e-14f7-4f1e-b076-fbb66b622d32", "DetectTime": "2024-05-21T12:53:53.029946+00:00", "EventTime": "2024-05-21T12:53:53.029970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CggUeN3SvsQTJ1qsgc"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "16205288-4c8a-44c6-aa78-0a400a0b6ef7", "DetectTime": "2024-05-21T12:53:53.085764+00:00", "EventTime": "2024-05-21T12:53:53.085785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7KguC298xtd2Z36fb"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "50926e90-e387-41dc-8f99-32a1d9c0cfe0", "DetectTime": "2024-05-21T12:53:53.132985+00:00", "EventTime": "2024-05-21T12:53:53.133007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci8cO93CbNXuHSV963"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "35baa011-f335-4a2b-9f8c-593280ad0fe1", "DetectTime": "2024-05-21T12:53:53.137836+00:00", "EventTime": "2024-05-21T12:53:53.137855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtijCt4k3XRaRuA032"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "34fbdd14-1546-48ab-8e4f-469aadae6ecd", "DetectTime": "2024-05-21T12:53:53.156598+00:00", "EventTime": "2024-05-21T12:53:53.156621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGuDrP3JGMzaJms636"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "76fcc75d-8484-47ce-a02c-9586babe781f", "DetectTime": "2024-05-21T12:53:53.208370+00:00", "EventTime": "2024-05-21T12:53:53.208392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVx8Wk4FfXGOKzPCef"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "782db455-e124-49b6-98a4-3fade56c4e08", "DetectTime": "2024-05-21T12:53:53.213378+00:00", "EventTime": "2024-05-21T12:53:53.213397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU048D3aSBdkExBkT6"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "f2fc5479-6dc0-4619-833a-32810cae2636", "DetectTime": "2024-05-21T12:53:53.218162+00:00", "EventTime": "2024-05-21T12:53:53.218181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjAOJoBNz9CXQUDva"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "645c0e9a-0e5b-4019-844f-75efc089f34d", "DetectTime": "2024-05-21T12:53:53.278640+00:00", "EventTime": "2024-05-21T12:53:53.278663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COqANr1YXSPR0oIai5"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "8ca4026c-2482-49e1-93d6-5f7286df3644", "DetectTime": "2024-05-21T12:53:53.283918+00:00", "EventTime": "2024-05-21T12:53:53.283936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpa7ZW1STEz44UUK1f"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "77e87be2-bf38-4238-9c6d-ab03e235bbc3", "DetectTime": "2024-05-21T12:53:53.288599+00:00", "EventTime": "2024-05-21T12:53:53.288616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxROW2qnezdUxhjX5"], "accumulated_threat_level": 4.8, "timewindow": 185} +{"Format": "IDEA0", "ID": "24e3b981-7fc1-42ae-99c4-cdb56e0fbad5", "DetectTime": "2024-05-21T12:53:53.301864+00:00", "EventTime": "2024-05-21T12:53:53.301893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1iYiG115s8hX1b8"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "1b2db429-a430-4acb-befe-10f07a01c920", "DetectTime": "2024-05-21T12:53:53.728276+00:00", "EventTime": "2024-05-21T12:53:53.728302+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVODiW37jcTjlhpmcd"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "ea1ab779-c3c1-407f-adad-7fc7ea37ef3d", "DetectTime": "2024-05-21T12:53:53.966848+00:00", "EventTime": "2024-05-21T12:53:53.966869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYpaYR3DeNkJcCR5t2"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "d1200a42-2fee-466d-a5c9-ab25a3cc404f", "DetectTime": "2024-05-21T12:53:54.108918+00:00", "EventTime": "2024-05-21T12:53:54.108942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsRNu7uDaj44btfUg"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "288ae9ec-6219-4136-8ccd-00958ebd733f", "DetectTime": "2024-05-21T12:53:54.251942+00:00", "EventTime": "2024-05-21T12:53:54.251964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyagSE4mpxXkPW71Vl"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "d009ef66-67e1-4078-8e09-411cc998aacb", "DetectTime": "2024-05-21T12:53:54.306375+00:00", "EventTime": "2024-05-21T12:53:54.306393+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.73.4.190"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.73.4.190 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61Ryk2b03gKMFohh1"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "659fd34e-6f00-46e4-a2ca-fa42d1fe54fe", "DetectTime": "2024-05-21T12:53:54.320361+00:00", "EventTime": "2024-05-21T12:53:54.320380+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.73.4.190"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.73.4.190 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C61Ryk2b03gKMFohh1"], "accumulated_threat_level": 1.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "991c5d16-2f46-4cfd-9b84-433ceec4ab75", "DetectTime": "2024-05-21T12:53:54.518893+00:00", "EventTime": "2024-05-21T12:53:54.518914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMkZei4jLD2iRBYCxj"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "7765170e-50fb-4306-984e-bc9a11cdc5eb", "DetectTime": "2024-05-21T12:53:54.554202+00:00", "EventTime": "2024-05-21T12:53:54.554223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjl5C117NNW4pLj1X1"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "2d22132c-a9d6-4336-a85c-47f7e6e48da8", "DetectTime": "2024-05-21T12:53:54.603351+00:00", "EventTime": "2024-05-21T12:53:54.603373+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7gdY1dtHRsLPvLL4"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "00b55608-b812-4a8d-8d24-e7c0f560e174", "DetectTime": "2024-05-21T12:53:54.608557+00:00", "EventTime": "2024-05-21T12:53:54.608574+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwwQOi4efY1otSpfL4"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "b8597856-7c84-4303-a884-cc25e3453b1b", "DetectTime": "2024-05-21T12:53:54.682434+00:00", "EventTime": "2024-05-21T12:53:54.682460+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQrrCr3c7QikwmNDia"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "8e5b2443-d907-45d0-aeac-59def69e4c49", "DetectTime": "2024-05-21T12:53:54.744258+00:00", "EventTime": "2024-05-21T12:53:54.744279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPscbz4IyUMVFExjP4"], "accumulated_threat_level": 5.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "b4a8eea5-47b3-4768-8826-3c2961e55a5e", "DetectTime": "2024-05-21T12:53:54.770131+00:00", "EventTime": "2024-05-21T12:53:54.770151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhT8n3Ne4x7bsE8v5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "30f19609-e84d-49bd-83f5-72eb7dc672b5", "DetectTime": "2024-05-21T12:53:54.775134+00:00", "EventTime": "2024-05-21T12:53:54.775152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8ifhD1E7ncWbZftXl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "c9dd6ef3-f837-4a89-aa41-4785f4d52fb2", "DetectTime": "2024-05-21T12:53:54.785206+00:00", "EventTime": "2024-05-21T12:53:54.785227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsQU6l4UKgiZTMc6H"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "f0923e67-2cb9-4fcf-b420-e2daa015dd1f", "DetectTime": "2024-05-21T12:53:55.221511+00:00", "EventTime": "2024-05-21T12:53:55.221532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl961B10vGqql6hP43"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 185} +{"Format": "IDEA0", "ID": "b825473d-e1ac-4897-a566-e1240bf07db4", "DetectTime": "2024-05-21T12:53:55.273122+00:00", "EventTime": "2024-05-21T12:53:55.273142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbr8mlFKsM64AZHb8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "f2117857-98ca-4887-9c51-dd781104bb8d", "DetectTime": "2024-05-21T12:53:55.310157+00:00", "EventTime": "2024-05-21T12:53:55.310179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHwkI21O7Z5k3ncWX4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "af51dcbc-d434-4431-8caf-98a04297dcd0", "DetectTime": "2024-05-21T12:53:55.577373+00:00", "EventTime": "2024-05-21T12:53:55.577396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDs4RH3XH60ZvJffLg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "faaab821-3dc8-4394-a785-79d9e15a6526", "DetectTime": "2024-05-21T12:53:55.627683+00:00", "EventTime": "2024-05-21T12:53:55.627701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZJXL64Cn4sAUWCXUg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 185} +{"Format": "IDEA0", "ID": "5886465b-5085-438d-9e94-8a9a15f4b476", "DetectTime": "2024-05-21T12:53:55.677945+00:00", "EventTime": "2024-05-21T12:53:55.677965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cea3Z63jwOcwt42Qh"], "accumulated_threat_level": 9.6, "timewindow": 185} +{"Format": "IDEA0", "ID": "5d44e4d1-b0c6-4edb-b206-c3f92dc23559", "DetectTime": "2024-05-21T12:53:55.833661+00:00", "EventTime": "2024-05-21T12:53:55.833681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJj311ORiK4Hctlm9"], "accumulated_threat_level": 10.4, "timewindow": 185} +{"Format": "IDEA0", "ID": "2fe24cb0-937f-4d77-88ee-6d4ae58fbcb7", "DetectTime": "2024-05-21T12:53:55.843737+00:00", "EventTime": "2024-05-21T12:53:55.843756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2BRyt4JYhrtShrFxe"], "accumulated_threat_level": 10.4, "timewindow": 185} +{"Format": "IDEA0", "ID": "ef48e81f-3f93-4bef-bae2-ddb83b43b3bd", "DetectTime": "2024-05-21T12:53:55.891381+00:00", "EventTime": "2024-05-21T12:53:55.891403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFyWFiCwhxO5LcS6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "a70c585a-4879-49fa-8b72-82557529d9ff", "DetectTime": "2024-05-21T12:53:56.200405+00:00", "EventTime": "2024-05-21T12:53:56.200428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGt5K3aJbLXZIcs61"], "accumulated_threat_level": 0.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "29f14335-227f-468f-8594-b91cb0bb4a4e", "DetectTime": "2024-05-21T12:53:56.258749+00:00", "EventTime": "2024-05-21T12:53:56.258766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9nfW14nPCWG9Bn7c"], "accumulated_threat_level": 1.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "d5c0a3cd-53da-4d28-874e-48ee4b69eecf", "DetectTime": "2024-05-21T12:53:56.299644+00:00", "EventTime": "2024-05-21T12:53:56.299664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmsEt4Dj5VnZpHEt2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 186} +{"Format": "IDEA0", "ID": "3b829ac7-452c-4c7a-97c9-f2beb516e56a", "DetectTime": "2024-05-21T12:53:56.341443+00:00", "EventTime": "2024-05-21T12:53:56.341464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzytEH3sQLHaMHPYwa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "d13440dc-884d-402d-b4d2-098298f79737", "DetectTime": "2024-05-21T12:53:56.387708+00:00", "EventTime": "2024-05-21T12:53:56.387728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7mhdv2Htc1wfqPSNf"], "accumulated_threat_level": 3.2, "timewindow": 186} +{"Format": "IDEA0", "ID": "178d8967-e113-411c-a745-453524460d66", "DetectTime": "2024-05-21T12:53:56.439889+00:00", "EventTime": "2024-05-21T12:53:56.439909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck6B0U36z2Ui3vFdmg"], "accumulated_threat_level": 4.0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bbd14154-3033-412b-9681-6482c5f4511c", "DetectTime": "2024-05-21T12:53:56.489401+00:00", "EventTime": "2024-05-21T12:53:56.489420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTQyB23pxYL9wJup"], "accumulated_threat_level": 4.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "78037359-033f-44e5-a0db-8d84e80b237a", "DetectTime": "2024-05-21T12:53:56.765465+00:00", "EventTime": "2024-05-21T12:53:56.765483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEN2gc2CDQYZgcWFN"], "accumulated_threat_level": 5.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "d7595a1f-b209-46b6-a97d-3ac971ec00b7", "DetectTime": "2024-05-21T12:53:56.812881+00:00", "EventTime": "2024-05-21T12:53:56.812900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjbTd2sayhJBcw1ga"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 186} +{"Format": "IDEA0", "ID": "9e9cdeb7-e5a1-4495-a8bb-5f4b65d2fe41", "DetectTime": "2024-05-21T12:53:56.854282+00:00", "EventTime": "2024-05-21T12:53:56.854303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CATYqc2mMncZ25DiN5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "ffbcfa7e-dcf9-4d25-b99a-9219cbaf1f13", "DetectTime": "2024-05-21T12:53:56.898664+00:00", "EventTime": "2024-05-21T12:53:56.898685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cszetx1UGQsX0tUtni"], "accumulated_threat_level": 7.199999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "678d031f-8949-4c7e-b136-c32c101c3d75", "DetectTime": "2024-05-21T12:53:56.953831+00:00", "EventTime": "2024-05-21T12:53:56.953857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHj1LW17c5zBSSupK3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "2c401c82-ed25-4238-b0a0-f83bf01f5676", "DetectTime": "2024-05-21T12:53:56.999924+00:00", "EventTime": "2024-05-21T12:53:56.999942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJIuL1NTqLVq8Vp2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "d5e58496-774c-4326-a564-6b86a4c4339c", "DetectTime": "2024-05-21T12:53:57.051866+00:00", "EventTime": "2024-05-21T12:53:57.051886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4c1p0LRJB93UeT6"], "accumulated_threat_level": 9.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "696ea32f-21f1-41ba-a0be-9c7f2ab78da8", "DetectTime": "2024-05-21T12:53:57.315262+00:00", "EventTime": "2024-05-21T12:53:57.315281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0c5O43SKA9QcQgAi8"], "accumulated_threat_level": 10.4, "timewindow": 186} +{"Format": "IDEA0", "ID": "45593ede-23ae-45af-aeef-8ca4fc23e418", "DetectTime": "2024-05-21T12:53:57.363042+00:00", "EventTime": "2024-05-21T12:53:57.363061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9xqo2DA9DdvRBaa4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 186} +{"Format": "IDEA0", "ID": "06f34ecb-3cf6-4ba3-b918-99fb04035446", "DetectTime": "2024-05-21T12:53:57.414343+00:00", "EventTime": "2024-05-21T12:53:57.414365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcTT63ABMiLzKAqvi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 186} +{"Format": "Json", "ID": "06f34ecb-3cf6-4ba3-b918-99fb04035446", "DetectTime": "2024-05-21T12:53:57.414343+00:00", "EventTime": "2024-05-21T12:53:57.414365+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-08T17:25:34.916067+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2024/05/21 12:53:57.591473)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 186, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b07103dc-1df0-4a45-9b5e-f8d7f991caeb", "DetectTime": "2024-05-21T12:53:57.603392+00:00", "EventTime": "2024-05-21T12:53:57.603411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKFP22ruh6jRtS192"], "accumulated_threat_level": 0.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "69b8ae14-b1b7-41a7-9850-2dca84db59a4", "DetectTime": "2024-05-21T12:53:57.609413+00:00", "EventTime": "2024-05-21T12:53:57.609431+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUBV4q3mDBBLSGDaf3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "2f9b2118-2ad4-44d4-b0aa-dbc1661f58fd", "DetectTime": "2024-05-21T12:53:57.626318+00:00", "EventTime": "2024-05-21T12:53:57.626342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6IVuF2CMosJNErunh"], "accumulated_threat_level": 1.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "a772e0fb-bec5-4f0e-b3b4-f72fa6fb6634", "DetectTime": "2024-05-21T12:53:57.826831+00:00", "EventTime": "2024-05-21T12:53:57.826849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJaML1ihJjGqrJ7Fg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 186} +{"Format": "IDEA0", "ID": "7af5c223-92cb-4bc4-b405-c4a22d637a34", "DetectTime": "2024-05-21T12:53:57.872178+00:00", "EventTime": "2024-05-21T12:53:57.872197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNlziN4So0Mb7ajh"], "accumulated_threat_level": 3.2, "timewindow": 186} +{"Format": "IDEA0", "ID": "7ba5ad52-1b10-415f-9875-64db3fb8edc6", "DetectTime": "2024-05-21T12:53:57.924115+00:00", "EventTime": "2024-05-21T12:53:57.924134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQDeQm49e0u2iNMSa1"], "accumulated_threat_level": 4.0, "timewindow": 186} +{"Format": "IDEA0", "ID": "9224257a-1a77-4021-a6cc-97ce706b34a3", "DetectTime": "2024-05-21T12:53:57.974334+00:00", "EventTime": "2024-05-21T12:53:57.974354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiKFr2WQSwZlHUbpd"], "accumulated_threat_level": 4.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "33da98fc-ac63-4169-a09b-12a62f6e86db", "DetectTime": "2024-05-21T12:53:58.033764+00:00", "EventTime": "2024-05-21T12:53:58.033782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8jDQ3566vPMOAsJ2"], "accumulated_threat_level": 5.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "2737d6e4-f4fa-4507-9376-0b413945202a", "DetectTime": "2024-05-21T12:53:58.083278+00:00", "EventTime": "2024-05-21T12:53:58.083296+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdzzj3y6JfshehRzh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 186} +{"Format": "IDEA0", "ID": "8cc49a22-00c9-4ea2-9cae-b43a5630b7e5", "DetectTime": "2024-05-21T12:53:58.336539+00:00", "EventTime": "2024-05-21T12:53:58.336561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPZtzb2K8LtkUDQX0a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "888a3552-e8e9-4606-ab99-6f67c178cd93", "DetectTime": "2024-05-21T12:53:58.393789+00:00", "EventTime": "2024-05-21T12:53:58.393810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqbDe4o4WjqWDIJV"], "accumulated_threat_level": 7.199999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "4c07b27e-5c07-434f-a0ce-693cbf0871b5", "DetectTime": "2024-05-21T12:53:58.442912+00:00", "EventTime": "2024-05-21T12:53:58.442932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9gNjAeFPkuiT8t1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "20d3ff69-3be0-48df-b2cd-b2b012bfcbd2", "DetectTime": "2024-05-21T12:53:58.497078+00:00", "EventTime": "2024-05-21T12:53:58.497097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsibXe1Sr48cfR8ul7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "d7af3159-8251-4420-8564-f959243a412f", "DetectTime": "2024-05-21T12:53:58.647316+00:00", "EventTime": "2024-05-21T12:53:58.647337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqeerI2yE3mRiGmEY3"], "accumulated_threat_level": 9.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "e0c42b34-345e-43b5-8016-684b0fd1c2d3", "DetectTime": "2024-05-21T12:53:58.668588+00:00", "EventTime": "2024-05-21T12:53:58.668607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmDwkC1Aet5KOS4D27"], "accumulated_threat_level": 10.4, "timewindow": 186} +{"Format": "IDEA0", "ID": "290b0716-a71a-41e7-ba41-4c22ffa55343", "DetectTime": "2024-05-21T12:53:58.718145+00:00", "EventTime": "2024-05-21T12:53:58.718164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AXOg4vo0u4joFgFg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 186} +{"Format": "IDEA0", "ID": "154958a5-7114-4e38-bd37-c8ac14fda452", "DetectTime": "2024-05-21T12:53:58.988859+00:00", "EventTime": "2024-05-21T12:53:58.988881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpC7Ep3WZtEDvYV8Ek"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "3ecdf072-af65-4884-ba07-7c932ed9d423", "DetectTime": "2024-05-21T12:53:59.041026+00:00", "EventTime": "2024-05-21T12:53:59.041052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COWPda1GS2FaaUZ8Uj"], "accumulated_threat_level": 12.000000000000002, "timewindow": 186} +{"Format": "Json", "ID": "3ecdf072-af65-4884-ba07-7c932ed9d423", "DetectTime": "2024-05-21T12:53:59.041026+00:00", "EventTime": "2024-05-21T12:53:59.041052+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T17:30:04.454420+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2024/05/21 12:53:59.213314)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 186, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "efd13b78-c706-4fb8-a540-1086c9b27ef9", "DetectTime": "2024-05-21T12:53:59.225824+00:00", "EventTime": "2024-05-21T12:53:59.225846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqzdRW26ZSLJkjuirg"], "accumulated_threat_level": 0.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "72f6d5cf-0206-41b3-9e35-ac481aadcfa1", "DetectTime": "2024-05-21T12:53:59.238724+00:00", "EventTime": "2024-05-21T12:53:59.238743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJkef835FyV5Ii6GLf"], "accumulated_threat_level": 1.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "52ab0442-5255-45eb-a6fb-73af7b332cb4", "DetectTime": "2024-05-21T12:53:59.250302+00:00", "EventTime": "2024-05-21T12:53:59.250321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlTFu4ZxAIJnXRaJ1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 186} +{"Format": "IDEA0", "ID": "170946f3-6f55-49a5-8510-3ba057a238b3", "DetectTime": "2024-05-21T12:53:59.298921+00:00", "EventTime": "2024-05-21T12:53:59.298939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4f7p490YlKiF06yb"], "accumulated_threat_level": 3.2, "timewindow": 186} +{"Format": "IDEA0", "ID": "b05b5052-3429-4d29-b608-44b8edc6fad6", "DetectTime": "2024-05-21T12:53:59.623969+00:00", "EventTime": "2024-05-21T12:53:59.623990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COHxBb1nJlPJEBne35"], "accumulated_threat_level": 4.0, "timewindow": 186} +{"Format": "IDEA0", "ID": "6b039bc5-36db-46fb-b7f5-87710388a18b", "DetectTime": "2024-05-21T12:53:59.628992+00:00", "EventTime": "2024-05-21T12:53:59.629009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8thpJOmUinKQWGg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "8a9d33e6-bbf5-4870-a77c-be8acf6f8c05", "DetectTime": "2024-05-21T12:53:59.713670+00:00", "EventTime": "2024-05-21T12:53:59.713693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHryv1Shxa2m9hXei"], "accumulated_threat_level": 4.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "5590d25b-0435-43ac-b450-065838211509", "DetectTime": "2024-05-21T12:53:59.763667+00:00", "EventTime": "2024-05-21T12:53:59.763687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIAhA4LhjShUgJSDc"], "accumulated_threat_level": 5.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "0c838f14-57e2-4559-92d4-9dad947cd186", "DetectTime": "2024-05-21T12:53:59.818308+00:00", "EventTime": "2024-05-21T12:53:59.818329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRFY3R3w92zV2A5Ej"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 186} +{"Format": "IDEA0", "ID": "9b3693e3-4d08-461d-993a-068c36529485", "DetectTime": "2024-05-21T12:53:59.871975+00:00", "EventTime": "2024-05-21T12:53:59.871995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xbnvx0kqU0wV9A6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "7612f160-4a4a-4cea-87c4-282e9e80318e", "DetectTime": "2024-05-21T12:53:59.927123+00:00", "EventTime": "2024-05-21T12:53:59.927144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccb9q02O3SJoRyAGa2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "5c376cd4-c972-45e1-88fd-2bdbfe4c4c1a", "DetectTime": "2024-05-21T12:53:59.981087+00:00", "EventTime": "2024-05-21T12:53:59.981108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7pb21St8tVNQVbx8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "12f3d3d4-b4e3-48f9-b6a5-5927f8a8f371", "DetectTime": "2024-05-21T12:54:00.303197+00:00", "EventTime": "2024-05-21T12:54:00.303218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdx75cEJ9k12orNz8"], "accumulated_threat_level": 9.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "d7f9ddc2-9d65-45e8-b7b9-eb7df54b57b6", "DetectTime": "2024-05-21T12:54:00.308505+00:00", "EventTime": "2024-05-21T12:54:00.308524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7OS21dsFEE23Tzf8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "4d62db8d-d5c8-4fac-a57e-8b1fcd02b151", "DetectTime": "2024-05-21T12:54:00.396745+00:00", "EventTime": "2024-05-21T12:54:00.396766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAG0F528AhUFhhWpd1"], "accumulated_threat_level": 10.4, "timewindow": 186} +{"Format": "IDEA0", "ID": "c15c50af-a2f9-4a0f-908a-d24dcf267657", "DetectTime": "2024-05-21T12:54:00.445939+00:00", "EventTime": "2024-05-21T12:54:00.445958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYMxq1lQmKoJG3sfd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 186} +{"Format": "IDEA0", "ID": "4ce724d0-2978-48d9-abf5-1eec6a55614b", "DetectTime": "2024-05-21T12:54:00.494530+00:00", "EventTime": "2024-05-21T12:54:00.494551+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDjWc2VX0WyGJpNre"], "accumulated_threat_level": 12.000000000000002, "timewindow": 186} +{"Format": "Json", "ID": "4ce724d0-2978-48d9-abf5-1eec6a55614b", "DetectTime": "2024-05-21T12:54:00.494530+00:00", "EventTime": "2024-05-21T12:54:00.494551+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-08T17:56:06.747496+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2024/05/21 12:54:00.917496)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 186, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "57a16d45-8372-4b1d-b7e7-fb5327dbc3e7", "DetectTime": "2024-05-21T12:54:00.930402+00:00", "EventTime": "2024-05-21T12:54:00.930440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Pnvo4XkpRed5QfCa"], "accumulated_threat_level": 0.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "1a070ade-8188-422a-89b0-43b929382757", "DetectTime": "2024-05-21T12:54:00.945897+00:00", "EventTime": "2024-05-21T12:54:00.945915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsW6Q3wWT99eKRGe4"], "accumulated_threat_level": 1.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "d362b3f9-5baa-41ae-bc09-f15623e146a9", "DetectTime": "2024-05-21T12:54:00.951929+00:00", "EventTime": "2024-05-21T12:54:00.951947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpuh1nhnRGf5MXCda"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "5ea6b6f3-acc5-4746-92d8-3023ca2cb393", "DetectTime": "2024-05-21T12:54:00.969486+00:00", "EventTime": "2024-05-21T12:54:00.969504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRsQd2AbO7NsZrqBb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 186} +{"Format": "IDEA0", "ID": "a31c5946-033c-4ac3-b484-9be6925a2dea", "DetectTime": "2024-05-21T12:54:00.980602+00:00", "EventTime": "2024-05-21T12:54:00.980621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpssk64PGZ3dMfRfdk"], "accumulated_threat_level": 3.2, "timewindow": 186} +{"Format": "IDEA0", "ID": "04317807-7d21-4b3d-a426-a3f6142ff42d", "DetectTime": "2024-05-21T12:54:01.016081+00:00", "EventTime": "2024-05-21T12:54:01.016101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cly1Vg2CxupWrGdjml"], "accumulated_threat_level": 4.0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bd9df803-08be-47f8-91f0-82b29f16c5d6", "DetectTime": "2024-05-21T12:54:01.065886+00:00", "EventTime": "2024-05-21T12:54:01.065905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmke6z1SbTxbBlriO2"], "accumulated_threat_level": 4.8, "timewindow": 186} +{"Format": "IDEA0", "ID": "a378d952-be73-42c0-ae0e-3147e7383e8e", "DetectTime": "2024-05-21T12:54:01.352167+00:00", "EventTime": "2024-05-21T12:54:01.352187+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Y4el34Lkltpnvt46"], "accumulated_threat_level": 5.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "e676348f-95c4-455f-abf8-b70d7bf9c136", "DetectTime": "2024-05-21T12:54:01.401873+00:00", "EventTime": "2024-05-21T12:54:01.401892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyqKM1QxFXYC6f8r1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 186} +{"Format": "IDEA0", "ID": "94bda8e9-e0f0-4afc-bfb0-a2458c279d84", "DetectTime": "2024-05-21T12:54:01.545932+00:00", "EventTime": "2024-05-21T12:54:01.545952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CriY011lKmYZG2oAN2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "16a5c4fc-0dbb-41a4-b20c-cf762a2eacf6", "DetectTime": "2024-05-21T12:54:01.595793+00:00", "EventTime": "2024-05-21T12:54:01.595813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtS0L3zOXVidxWy97"], "accumulated_threat_level": 7.999999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "be2f7032-eb78-452f-8ddc-6cc9b04cbb07", "DetectTime": "2024-05-21T12:54:01.648956+00:00", "EventTime": "2024-05-21T12:54:01.648975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWoQdW1zMVjEKWobLc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 186} +{"Format": "IDEA0", "ID": "47d31797-9294-4e7d-989f-5d5fd254e100", "DetectTime": "2024-05-21T12:54:01.701877+00:00", "EventTime": "2024-05-21T12:54:01.701899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YBThoGOHSKSoGD5"], "accumulated_threat_level": 9.6, "timewindow": 186} +{"Format": "IDEA0", "ID": "7fb67dda-870f-44e7-af4e-943991306691", "DetectTime": "2024-05-21T12:54:01.754036+00:00", "EventTime": "2024-05-21T12:54:01.754057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNkuC3OXyZjslonG3"], "accumulated_threat_level": 10.4, "timewindow": 186} +{"Format": "IDEA0", "ID": "a6604722-be55-4707-af96-0a9a28a991f2", "DetectTime": "2024-05-21T12:54:01.806171+00:00", "EventTime": "2024-05-21T12:54:01.806191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVMJaM1AvYwirIpOPd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 186} +{"Format": "IDEA0", "ID": "12895aa6-ef40-4407-840f-7f79a348a2d1", "DetectTime": "2024-05-21T12:54:02.061604+00:00", "EventTime": "2024-05-21T12:54:02.061627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQ82XYymMVdAP2eb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "fcf2ea99-c041-4fba-bb69-4be749cae67f", "DetectTime": "2024-05-21T12:54:02.107224+00:00", "EventTime": "2024-05-21T12:54:02.107247+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYZARq2L4N6yIRGh0j"], "accumulated_threat_level": 12.000000000000002, "timewindow": 186} +{"Format": "Json", "ID": "fcf2ea99-c041-4fba-bb69-4be749cae67f", "DetectTime": "2024-05-21T12:54:02.107224+00:00", "EventTime": "2024-05-21T12:54:02.107247+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T18:00:11.311652+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 186. (real time 2024/05/21 12:54:02.332498)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 186, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4df115f6-e620-4b58-8fda-a5d66a82bfd4", "DetectTime": "2024-05-21T12:54:02.344404+00:00", "EventTime": "2024-05-21T12:54:02.344422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeVUd2tV5fRpci4ri"], "accumulated_threat_level": 0.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "7b922238-f634-49f9-b6a6-89000f662ea5", "DetectTime": "2024-05-21T12:54:02.367336+00:00", "EventTime": "2024-05-21T12:54:02.367359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPerMu3OTzi9F9jMIb"], "accumulated_threat_level": 1.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "97b8cb9a-1dd7-443f-ad3e-efece27277de", "DetectTime": "2024-05-21T12:54:02.380902+00:00", "EventTime": "2024-05-21T12:54:02.380921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoMw432765upXa0fDc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 187} +{"Format": "IDEA0", "ID": "006a5cae-4897-45ad-a0cc-bff0d85059b2", "DetectTime": "2024-05-21T12:54:02.392284+00:00", "EventTime": "2024-05-21T12:54:02.392303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFTi82Bpyf7t9bNwh"], "accumulated_threat_level": 3.2, "timewindow": 187} +{"Format": "IDEA0", "ID": "95a98dca-2949-44d8-9a9d-dce00452d684", "DetectTime": "2024-05-21T12:54:02.623185+00:00", "EventTime": "2024-05-21T12:54:02.623205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWPap3TeoD2OAdMd6"], "accumulated_threat_level": 4.0, "timewindow": 187} +{"Format": "IDEA0", "ID": "7c1cd8f1-59a5-4e16-bef4-35796dbc042c", "DetectTime": "2024-05-21T12:54:02.677048+00:00", "EventTime": "2024-05-21T12:54:02.677068+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJoli4GspQzqwpTH7"], "accumulated_threat_level": 4.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "4228a906-c386-4ff5-a132-5bd0f7b54b69", "DetectTime": "2024-05-21T12:54:02.739884+00:00", "EventTime": "2024-05-21T12:54:02.739903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVNlXA3xqh2a59ZSth"], "accumulated_threat_level": 5.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "5db8f28a-7779-4523-a3cf-a6eafd19157a", "DetectTime": "2024-05-21T12:54:02.767668+00:00", "EventTime": "2024-05-21T12:54:02.767691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ghx52gaX9hB2kwVa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "c332a5c7-99e5-41dc-876c-0285465017a3", "DetectTime": "2024-05-21T12:54:02.906818+00:00", "EventTime": "2024-05-21T12:54:02.906839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3htT51Wv4H9inz1Gd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 187} +{"Format": "IDEA0", "ID": "f14f4d93-0106-4521-808d-e1cd77e27457", "DetectTime": "2024-05-21T12:54:02.960896+00:00", "EventTime": "2024-05-21T12:54:02.960917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwyE854yb8VRBk8Bch"], "accumulated_threat_level": 7.199999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "61b640b8-2bcd-476f-bbc2-6278496cfb85", "DetectTime": "2024-05-21T12:54:03.233721+00:00", "EventTime": "2024-05-21T12:54:03.233743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CygATJMjgvWqw4iB7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "081ce2b7-bf3e-4a33-8279-d221fca89d23", "DetectTime": "2024-05-21T12:54:03.285985+00:00", "EventTime": "2024-05-21T12:54:03.286003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfHqjHbnaFj0oCrdi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "7087f510-82ae-414f-b495-4cf820e37ba3", "DetectTime": "2024-05-21T12:54:03.341343+00:00", "EventTime": "2024-05-21T12:54:03.341362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHHXxs3HsupZebPxFa"], "accumulated_threat_level": 9.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "d6764217-d1a3-48ed-9ba8-d0d4ffd120fe", "DetectTime": "2024-05-21T12:54:03.397501+00:00", "EventTime": "2024-05-21T12:54:03.397519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJvfUl23eU9WLaGVa7"], "accumulated_threat_level": 10.4, "timewindow": 187} +{"Format": "IDEA0", "ID": "455c6c89-0a8d-4911-bcc0-a52db2b083dd", "DetectTime": "2024-05-21T12:54:03.448421+00:00", "EventTime": "2024-05-21T12:54:03.448441+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq9rYcwLOWv2ndsxc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "5ad53f5d-2d72-4596-a185-8ba1aba9512c", "DetectTime": "2024-05-21T12:54:03.499834+00:00", "EventTime": "2024-05-21T12:54:03.499853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COyKNk37nVEFSLmo6e"], "accumulated_threat_level": 12.000000000000002, "timewindow": 187} +{"Format": "Json", "ID": "5ad53f5d-2d72-4596-a185-8ba1aba9512c", "DetectTime": "2024-05-21T12:54:03.499834+00:00", "EventTime": "2024-05-21T12:54:03.499853+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-08T18:26:40.134484+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2024/05/21 12:54:03.682662)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 187, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5ad6779e-789d-4537-9119-128307ff7ae8", "DetectTime": "2024-05-21T12:54:03.696111+00:00", "EventTime": "2024-05-21T12:54:03.696139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3NM02QI24JmqqyTf"], "accumulated_threat_level": 0.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "48f2f452-34a8-4e57-8321-44b3937f64a2", "DetectTime": "2024-05-21T12:54:03.810208+00:00", "EventTime": "2024-05-21T12:54:03.810230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgtAw43ul0stCFcSd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "436babfe-470f-41c5-bbeb-8df8837c99ce", "DetectTime": "2024-05-21T12:54:03.865822+00:00", "EventTime": "2024-05-21T12:54:03.865855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4nwv384Vkzr8PaCb"], "accumulated_threat_level": 1.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "b5cdb6f2-4a2f-42f2-b860-d8656e9688d4", "DetectTime": "2024-05-21T12:54:03.921557+00:00", "EventTime": "2024-05-21T12:54:03.921606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqZp745bPGsvXKnq2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 187} +{"Format": "IDEA0", "ID": "dcb7371c-5cda-4e85-932f-91b08e25cc4f", "DetectTime": "2024-05-21T12:54:03.967946+00:00", "EventTime": "2024-05-21T12:54:03.967984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3YKRU3AR4FGW9IeR5"], "accumulated_threat_level": 3.2, "timewindow": 187} +{"Format": "IDEA0", "ID": "c9346153-b28d-4bf5-b762-920584af3f34", "DetectTime": "2024-05-21T12:54:04.024176+00:00", "EventTime": "2024-05-21T12:54:04.024211+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGOay3dHEHlwXgE5f"], "accumulated_threat_level": 4.0, "timewindow": 187} +{"Format": "IDEA0", "ID": "b93eb7d9-ffbc-4147-9e02-1ec811520f26", "DetectTime": "2024-05-21T12:54:04.075401+00:00", "EventTime": "2024-05-21T12:54:04.075422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjEfn3jR9iT16Zhhe"], "accumulated_threat_level": 4.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "6726f1f9-6bf9-422c-bef1-9dad477cc83e", "DetectTime": "2024-05-21T12:54:04.348002+00:00", "EventTime": "2024-05-21T12:54:04.348021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGMWi12f0xeeekFre"], "accumulated_threat_level": 5.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "5aed69a1-154c-48c9-a28c-60062e9f04ae", "DetectTime": "2024-05-21T12:54:04.395779+00:00", "EventTime": "2024-05-21T12:54:04.395799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAStH31pn2XVAxVAUl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 187} +{"Format": "IDEA0", "ID": "f9363dcb-b2c2-4ec0-ba00-82d7835f8f81", "DetectTime": "2024-05-21T12:54:04.450022+00:00", "EventTime": "2024-05-21T12:54:04.450042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnN84a18H2y4OHh2sa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "b3f56b1c-235a-492f-8b43-2eabdf2cbc21", "DetectTime": "2024-05-21T12:54:04.501385+00:00", "EventTime": "2024-05-21T12:54:04.501404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNK6u1eOvWrbNiwR8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "18f47ec0-9ad0-42f4-99f1-03400e7b29fe", "DetectTime": "2024-05-21T12:54:04.553781+00:00", "EventTime": "2024-05-21T12:54:04.553804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8mLn4fJejY6U9016"], "accumulated_threat_level": 8.799999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "bf0b95e0-d720-4c7d-b56f-1a5f9e2ff320", "DetectTime": "2024-05-21T12:54:04.605607+00:00", "EventTime": "2024-05-21T12:54:04.605629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVh082aQh8zxEUv88"], "accumulated_threat_level": 9.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "ae0db14b-0192-478d-89d3-104e30dac651", "DetectTime": "2024-05-21T12:54:04.657369+00:00", "EventTime": "2024-05-21T12:54:04.657389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvcNkG2mtufO0InaIl"], "accumulated_threat_level": 10.4, "timewindow": 187} +{"Format": "IDEA0", "ID": "4f387cb6-2fd0-4a35-aad6-771e9332162f", "DetectTime": "2024-05-21T12:54:04.943689+00:00", "EventTime": "2024-05-21T12:54:04.943712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1Mrbk4hE1yK9oE6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "0f423ba5-1db4-412a-8cf0-99fbf2c37a92", "DetectTime": "2024-05-21T12:54:04.992062+00:00", "EventTime": "2024-05-21T12:54:04.992082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZwxC3mpGqNuMYgXg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "d8f51365-9e88-460b-b7df-2badb8063297", "DetectTime": "2024-05-21T12:54:05.042328+00:00", "EventTime": "2024-05-21T12:54:05.042347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Qe1L2kt4shOwyfL2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 187} +{"Format": "Json", "ID": "d8f51365-9e88-460b-b7df-2badb8063297", "DetectTime": "2024-05-21T12:54:05.042328+00:00", "EventTime": "2024-05-21T12:54:05.042347+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T18:30:20.022564+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2024/05/21 12:54:05.225419)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 187, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5985a496-f57e-40c2-8e6b-d8959b4aa6c5", "DetectTime": "2024-05-21T12:54:05.240339+00:00", "EventTime": "2024-05-21T12:54:05.240365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUVTBw3ETPn2BwFxK2"], "accumulated_threat_level": 0.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "8787e16e-e6bd-41db-afec-6508711b5813", "DetectTime": "2024-05-21T12:54:05.251763+00:00", "EventTime": "2024-05-21T12:54:05.251781+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cit3Ga35EwHdvQz0rh"], "accumulated_threat_level": 1.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "09c7e4e9-2feb-4376-b035-adb781fcb9b8", "DetectTime": "2024-05-21T12:54:05.275811+00:00", "EventTime": "2024-05-21T12:54:05.275833+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqIlj1VH2We0lpht2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 187} +{"Format": "IDEA0", "ID": "8783f56f-bc50-4f16-9ad3-1bb6868e694b", "DetectTime": "2024-05-21T12:54:05.302388+00:00", "EventTime": "2024-05-21T12:54:05.302437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM53Nd4Y82hjomxsVc"], "accumulated_threat_level": 3.2, "timewindow": 187} +{"Format": "IDEA0", "ID": "6e6cc1f7-b44f-4fbf-a1a7-cd3bea05c67f", "DetectTime": "2024-05-21T12:54:05.315044+00:00", "EventTime": "2024-05-21T12:54:05.315064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEJTdR23fUaZHdKMOj", "C8xRfY3dmVHjFzGKJa", "C4ThyS2WGm72X0ggi4", "CJARP63YyV1PU3Fyy4"], "accumulated_threat_level": 0.5, "timewindow": 215} +{"Format": "IDEA0", "ID": "73c0690d-5435-4a72-87bf-4f43fa39b7dc", "DetectTime": "2024-05-21T12:54:05.579592+00:00", "EventTime": "2024-05-21T12:54:05.579612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWtTRdwxOwr0WRCj"], "accumulated_threat_level": 4.0, "timewindow": 187} +{"Format": "IDEA0", "ID": "cde94cc8-49a1-4738-a8af-1cc2ac941f6d", "DetectTime": "2024-05-21T12:54:05.637737+00:00", "EventTime": "2024-05-21T12:54:05.637757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkH9W1wZLZp0TMg3h"], "accumulated_threat_level": 4.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "afeef3d6-a014-4d24-9d98-b4e1e79bfc6f", "DetectTime": "2024-05-21T12:54:05.692516+00:00", "EventTime": "2024-05-21T12:54:05.692535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdMeC2khvtdSk6rJb"], "accumulated_threat_level": 5.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "15631d9d-a2ef-4ab7-8946-4de6195fe622", "DetectTime": "2024-05-21T12:54:05.747572+00:00", "EventTime": "2024-05-21T12:54:05.747593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54piv35p3gUINILA4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 187} +{"Format": "IDEA0", "ID": "4207d1ac-7b90-41a0-b38d-1083bd9fdc18", "DetectTime": "2024-05-21T12:54:05.800380+00:00", "EventTime": "2024-05-21T12:54:05.800401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKUKW3dHB7M3ls0Ok"], "accumulated_threat_level": 7.199999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "bc9d30af-2e2d-4841-862e-f601fc6b6256", "DetectTime": "2024-05-21T12:54:05.855413+00:00", "EventTime": "2024-05-21T12:54:05.855432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5IilB4rreidcHfG17"], "accumulated_threat_level": 7.999999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "4ebcadd5-1b9c-40c9-bdff-4927ad1a5eec", "DetectTime": "2024-05-21T12:54:05.984224+00:00", "EventTime": "2024-05-21T12:54:05.984242+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ7l7A2PMOJVueQGcf"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "f239fd9d-7613-4bd3-bc1d-dfbf14b2b184", "DetectTime": "2024-05-21T12:54:05.999916+00:00", "EventTime": "2024-05-21T12:54:05.999940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQ7l7A2PMOJVueQGcf"], "accumulated_threat_level": 2.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "3efae0bb-6325-45ff-abfc-674c37d8f20a", "DetectTime": "2024-05-21T12:54:06.027967+00:00", "EventTime": "2024-05-21T12:54:06.027986+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfodId2bwxqJ4mMvGj"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "769410a2-4c69-4acc-9fc9-ff6adcf071f1", "DetectTime": "2024-05-21T12:54:06.046385+00:00", "EventTime": "2024-05-21T12:54:06.046423+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfodId2bwxqJ4mMvGj"], "accumulated_threat_level": 2.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "d567ff4f-7da5-4dad-bda1-e49e6c2ba08b", "DetectTime": "2024-05-21T12:54:06.142861+00:00", "EventTime": "2024-05-21T12:54:06.142882+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCN2KF304NHuHCRhC3"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "1e172350-123a-46f4-aa01-4d5d0bd35c1a", "DetectTime": "2024-05-21T12:54:06.157401+00:00", "EventTime": "2024-05-21T12:54:06.157420+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCN2KF304NHuHCRhC3"], "accumulated_threat_level": 3.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "56000b23-d2bb-4704-81cf-32ed5e3d8f0e", "DetectTime": "2024-05-21T12:54:06.163129+00:00", "EventTime": "2024-05-21T12:54:06.163148+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX1FOxYteLb2MLxN7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "940be293-143b-4772-a4fb-2791f4ec68e9", "DetectTime": "2024-05-21T12:54:06.194291+00:00", "EventTime": "2024-05-21T12:54:06.194310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crrk1X3Pr9ECaXXCx1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "a6f53326-e728-4e3c-8434-b83e9efc113f", "DetectTime": "2024-05-21T12:54:06.245201+00:00", "EventTime": "2024-05-21T12:54:06.245220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr9NHb4a6cl6oFv3ya"], "accumulated_threat_level": 9.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "935f4a91-dead-4f39-b99f-5271727f61db", "DetectTime": "2024-05-21T12:54:06.294638+00:00", "EventTime": "2024-05-21T12:54:06.294658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVftrSt8avB7TUud"], "accumulated_threat_level": 10.4, "timewindow": 187} +{"Format": "IDEA0", "ID": "4874ea14-3ad9-4108-8bc4-4497f2981364", "DetectTime": "2024-05-21T12:54:06.342011+00:00", "EventTime": "2024-05-21T12:54:06.342030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs5S4k2GN1sELijYDl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "377134f5-63b6-48b6-9297-043717655221", "DetectTime": "2024-05-21T12:54:06.354881+00:00", "EventTime": "2024-05-21T12:54:06.354899+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvh2w42IAFDu2QpYp2"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "cd87da25-55d2-477c-8180-37929b038d5f", "DetectTime": "2024-05-21T12:54:06.368241+00:00", "EventTime": "2024-05-21T12:54:06.368260+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvh2w42IAFDu2QpYp2"], "accumulated_threat_level": 3.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "1341ad57-50f3-4a7c-af86-611b1ca6063d", "DetectTime": "2024-05-21T12:54:06.385899+00:00", "EventTime": "2024-05-21T12:54:06.385917+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJza2I10X95HaP5Je9"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "8ba1a39d-3248-4ff1-927e-274bd780f657", "DetectTime": "2024-05-21T12:54:06.398901+00:00", "EventTime": "2024-05-21T12:54:06.398919+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJza2I10X95HaP5Je9"], "accumulated_threat_level": 4.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "3e2278c0-d21d-4645-9b2a-395903028ac9", "DetectTime": "2024-05-21T12:54:06.409593+00:00", "EventTime": "2024-05-21T12:54:06.409612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA8pQ3Zpc0YyA2Srb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 187} +{"Format": "Json", "ID": "3e2278c0-d21d-4645-9b2a-395903028ac9", "DetectTime": "2024-05-21T12:54:06.409593+00:00", "EventTime": "2024-05-21T12:54:06.409612+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-08T18:56:50.317339+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 187. (real time 2024/05/21 12:54:06.604018)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 187, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "67190e15-3775-4755-8671-1a0376ae899d", "DetectTime": "2024-05-21T12:54:06.614550+00:00", "EventTime": "2024-05-21T12:54:06.614569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8Cyz22eWSZDSpA04"], "accumulated_threat_level": 0.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "762baa7a-6b6e-45c8-a05b-4e7cf3b3e34f", "DetectTime": "2024-05-21T12:54:06.632242+00:00", "EventTime": "2024-05-21T12:54:06.632261+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4KqRH2fSh04bO16Ik"], "accumulated_threat_level": 1.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "d25728f2-a069-44c2-bf05-44744565231b", "DetectTime": "2024-05-21T12:54:06.711090+00:00", "EventTime": "2024-05-21T12:54:06.711109+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuENGsmixIhZJLKe"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "98585d09-4f8a-4712-943d-eba5269deb9a", "DetectTime": "2024-05-21T12:54:06.725567+00:00", "EventTime": "2024-05-21T12:54:06.725585+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuENGsmixIhZJLKe"], "accumulated_threat_level": 4.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "272540f6-59ba-4adb-8f67-e4157941ef1e", "DetectTime": "2024-05-21T12:54:06.774515+00:00", "EventTime": "2024-05-21T12:54:06.774535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEoYLEAWwiTb1aXe"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 187} +{"Format": "IDEA0", "ID": "f16bd302-96e9-4fc3-8e12-2ef3de13cea2", "DetectTime": "2024-05-21T12:54:06.822772+00:00", "EventTime": "2024-05-21T12:54:06.822795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcCZRK5u7GNwSjBf"], "accumulated_threat_level": 3.2, "timewindow": 187} +{"Format": "IDEA0", "ID": "db2be71e-f44d-4f52-bc5a-34adc1ae7445", "DetectTime": "2024-05-21T12:54:06.876838+00:00", "EventTime": "2024-05-21T12:54:06.876856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1LZYYkYoWD8gNof"], "accumulated_threat_level": 4.0, "timewindow": 187} +{"Format": "IDEA0", "ID": "f01c59c3-8b6e-40c7-abc6-becdd002f583", "DetectTime": "2024-05-21T12:54:06.919006+00:00", "EventTime": "2024-05-21T12:54:06.919024+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7amM1varCi2Ku469"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "cca4098a-2d3c-4561-8932-717a4e4b61ee", "DetectTime": "2024-05-21T12:54:06.932623+00:00", "EventTime": "2024-05-21T12:54:06.932642+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7amM1varCi2Ku469"], "accumulated_threat_level": 5.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "5eac1468-5cff-4207-a4bf-c8e40bdcd98a", "DetectTime": "2024-05-21T12:54:06.937831+00:00", "EventTime": "2024-05-21T12:54:06.937848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx7ncF3nResd2wrbt3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "5ef02994-25dc-4543-8a3c-3b4361003c75", "DetectTime": "2024-05-21T12:54:06.965048+00:00", "EventTime": "2024-05-21T12:54:06.965066+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlNPnGgM6N6muQcd"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "dc6b49f5-2281-479f-a8c1-f6225b2d291f", "DetectTime": "2024-05-21T12:54:06.979386+00:00", "EventTime": "2024-05-21T12:54:06.979405+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlNPnGgM6N6muQcd"], "accumulated_threat_level": 5.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "f182b235-d7cc-45a7-b270-ff26da502b58", "DetectTime": "2024-05-21T12:54:06.991982+00:00", "EventTime": "2024-05-21T12:54:06.992001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBOEo3owvOuoCLq0c"], "accumulated_threat_level": 4.8, "timewindow": 187} +{"Format": "IDEA0", "ID": "0f0d9c4c-2177-411f-87dc-74739dd4556c", "DetectTime": "2024-05-21T12:54:07.030674+00:00", "EventTime": "2024-05-21T12:54:07.030692+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGat6v1fkupq93M4U4"], "accumulated_threat_level": 5.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "f9ea51cf-6c40-4248-95fa-4b2f720b146f", "DetectTime": "2024-05-21T12:54:07.241928+00:00", "EventTime": "2024-05-21T12:54:07.241949+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.151.56.116"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. AS: CHARTER-20115, US AS20115 rDNS: syn-024-151-056-116.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbsFF4uNbBoodgpIl"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "b52b2a0a-09d0-433c-81bc-90cf8bb7f336", "DetectTime": "2024-05-21T12:54:07.257180+00:00", "EventTime": "2024-05-21T12:54:07.257200+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. AS: CHARTER-20115, US AS20115 rDNS: syn-024-151-056-116.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQbsFF4uNbBoodgpIl"], "accumulated_threat_level": 6.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "79d8e4ad-426f-43ea-a9a5-67d288bc0c8a", "DetectTime": "2024-05-21T12:54:07.402584+00:00", "EventTime": "2024-05-21T12:54:07.402632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QEIj3EbnRIGwGP2l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 187} +{"Format": "IDEA0", "ID": "31a5e0e1-fa27-4b6a-9827-5446e9a70497", "DetectTime": "2024-05-21T12:54:07.455144+00:00", "EventTime": "2024-05-21T12:54:07.455164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoQ9Y2zxlhIGhnAx2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "6fc672b8-7b7c-4275-bdef-6ca16236024d", "DetectTime": "2024-05-21T12:54:07.507597+00:00", "EventTime": "2024-05-21T12:54:07.507620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7oOIQs4xA1xNvY3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "ac7924ac-215b-4473-b022-620d0e5f0659", "DetectTime": "2024-05-21T12:54:07.561371+00:00", "EventTime": "2024-05-21T12:54:07.561392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdR3C1PyDXgOqUgZh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 187} +{"Format": "IDEA0", "ID": "3bac8d7a-b3c8-4452-9159-f4bd49271b6d", "DetectTime": "2024-05-21T12:54:07.614539+00:00", "EventTime": "2024-05-21T12:54:07.614560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRxnLL3beFJdEtUgo8"], "accumulated_threat_level": 9.6, "timewindow": 187} +{"Format": "IDEA0", "ID": "ddd7d4eb-ea1f-4a5e-a71d-95ca1eabcf19", "DetectTime": "2024-05-21T12:54:07.672316+00:00", "EventTime": "2024-05-21T12:54:07.672336+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqlCd3qHAvSrO41q4"], "accumulated_threat_level": 10.4, "timewindow": 187} +{"Format": "IDEA0", "ID": "01d09f1b-a4fe-4650-94b0-e023a305f300", "DetectTime": "2024-05-21T12:54:07.976676+00:00", "EventTime": "2024-05-21T12:54:07.976699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["76.191.140.101"]}], "Attach": [{"Content": "Connection to unknown destination port 9551/UDP destination IP 76.191.140.101. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGTwveYnavp5DTlNg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "f309a274-736e-4e20-8cb7-e6f7c846e844", "DetectTime": "2024-05-21T12:54:08.088024+00:00", "EventTime": "2024-05-21T12:54:08.088042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoMTSlMP7xBZDsKbf"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "2c7c3083-8db2-41f6-a421-e2c18e07443f", "DetectTime": "2024-05-21T12:54:08.094200+00:00", "EventTime": "2024-05-21T12:54:08.094222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjLBW1MPvSVHaqT2d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "7062a491-662a-400a-90ea-102c5783330b", "DetectTime": "2024-05-21T12:54:08.253052+00:00", "EventTime": "2024-05-21T12:54:08.253070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51Xrx1TR45gtL3V0l"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "b1cbbc49-a647-4bf7-a195-d513743dc8d8", "DetectTime": "2024-05-21T12:54:08.306584+00:00", "EventTime": "2024-05-21T12:54:08.306606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBw0Hl41Ye8LRZ5zz9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 188} +{"Format": "IDEA0", "ID": "58c3938d-9608-495d-b613-3193e5953ff4", "DetectTime": "2024-05-21T12:54:08.374964+00:00", "EventTime": "2024-05-21T12:54:08.374983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExYdEqDfSPDBfvme"], "accumulated_threat_level": 3.2, "timewindow": 188} +{"Format": "IDEA0", "ID": "b0f31c70-f97b-47cf-98b2-6549800bd702", "DetectTime": "2024-05-21T12:54:08.418167+00:00", "EventTime": "2024-05-21T12:54:08.418186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXn1817GXSPheh2Eb"], "accumulated_threat_level": 4.0, "timewindow": 188} +{"Format": "IDEA0", "ID": "9c50214d-0d14-4a55-8a4e-f396480108c0", "DetectTime": "2024-05-21T12:54:08.470130+00:00", "EventTime": "2024-05-21T12:54:08.470151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYojob3mnp460yIT2b"], "accumulated_threat_level": 4.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "7e912118-dec1-464e-ab73-a21ffb0a8998", "DetectTime": "2024-05-21T12:54:08.835688+00:00", "EventTime": "2024-05-21T12:54:08.835707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYP7Ov4sJJIchkjSU8"], "accumulated_threat_level": 5.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "215f4ec2-d8c9-40d0-9e67-9f74de291ae2", "DetectTime": "2024-05-21T12:54:08.887207+00:00", "EventTime": "2024-05-21T12:54:08.887226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw9UpQ2zXklHZDqxt1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 188} +{"Format": "IDEA0", "ID": "3a204ae1-b3da-4107-97b4-ee7dbb8bbd08", "DetectTime": "2024-05-21T12:54:08.940879+00:00", "EventTime": "2024-05-21T12:54:08.940900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWpEf1z9kcHcmxdT1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "d8c05d98-eeee-4346-bcb6-21b80c094863", "DetectTime": "2024-05-21T12:54:08.992847+00:00", "EventTime": "2024-05-21T12:54:08.992882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqB7Xc1RATQKeT87A2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "b8ac03f0-d033-4a2e-955c-ce192c8cbb5f", "DetectTime": "2024-05-21T12:54:09.043558+00:00", "EventTime": "2024-05-21T12:54:09.043580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C42jqg3TSl88HByrba"], "accumulated_threat_level": 8.799999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "0529b5d1-8510-4204-8144-e1dea784d2a5", "DetectTime": "2024-05-21T12:54:09.092598+00:00", "EventTime": "2024-05-21T12:54:09.092619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakQzn1L3vw0QZtAKb"], "accumulated_threat_level": 9.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "547c7e7f-69a8-4e9c-bfd3-af4b20764f1f", "DetectTime": "2024-05-21T12:54:09.336099+00:00", "EventTime": "2024-05-21T12:54:09.336122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1iYiG115s8hX1b8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "a6ecf0a6-280a-4341-bb8e-6922fcfa354c", "DetectTime": "2024-05-21T12:54:09.381106+00:00", "EventTime": "2024-05-21T12:54:09.381139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwne84tFNCw5uYM99"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "d22002a3-c3da-4cfe-bd80-60dc364990ba", "DetectTime": "2024-05-21T12:54:09.437705+00:00", "EventTime": "2024-05-21T12:54:09.437736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0KFg1FE3F6sIIDSd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "12ea7436-1521-4518-9b93-a6848f860b25", "DetectTime": "2024-05-21T12:54:09.488659+00:00", "EventTime": "2024-05-21T12:54:09.488695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdgrbr3nYdxWhC7SQ5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 188} +{"Format": "Json", "ID": "12ea7436-1521-4518-9b93-a6848f860b25", "DetectTime": "2024-05-21T12:54:09.488659+00:00", "EventTime": "2024-05-21T12:54:09.488695+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-08T19:27:26.281517+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2024/05/21 12:54:09.854903)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 188, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "4431df6d-8fc9-4494-8b60-6d751a3775a2", "DetectTime": "2024-05-21T12:54:09.865923+00:00", "EventTime": "2024-05-21T12:54:09.865948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsLYcu2CYHiJZPAXl4"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "b84af5f4-15e3-4c0a-a3c2-eaa96a41d016", "DetectTime": "2024-05-21T12:54:09.877469+00:00", "EventTime": "2024-05-21T12:54:09.877497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CovL7F1vTmB5ZtBm3c"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "b07337bd-6bc4-4290-b3c7-23772fe09af3", "DetectTime": "2024-05-21T12:54:09.890119+00:00", "EventTime": "2024-05-21T12:54:09.890153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvuNU21WkiU3xZPW3g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 188} +{"Format": "IDEA0", "ID": "d5722283-e22c-4d16-905f-e1a59b933f7b", "DetectTime": "2024-05-21T12:54:09.943326+00:00", "EventTime": "2024-05-21T12:54:09.943367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmJ8x1bgrGWqAQ499"], "accumulated_threat_level": 3.2, "timewindow": 188} +{"Format": "IDEA0", "ID": "a9831ec2-90f8-4de8-bffa-fa2139b51131", "DetectTime": "2024-05-21T12:54:10.004448+00:00", "EventTime": "2024-05-21T12:54:10.004488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjfI4x5cFcoAOwu1"], "accumulated_threat_level": 4.0, "timewindow": 188} +{"Format": "IDEA0", "ID": "0dca41e8-b3df-4fee-a06d-336b99868e8b", "DetectTime": "2024-05-21T12:54:10.063870+00:00", "EventTime": "2024-05-21T12:54:10.063912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvouoo36tk3sSI8Mzj"], "accumulated_threat_level": 4.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "0c4e0d01-db54-4479-bbe6-59a914de030a", "DetectTime": "2024-05-21T12:54:10.120036+00:00", "EventTime": "2024-05-21T12:54:10.120062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIXI74tqXfVF6Tnx9"], "accumulated_threat_level": 5.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "34dd64fc-c9ed-4dcf-9008-f3954b556d1c", "DetectTime": "2024-05-21T12:54:10.175996+00:00", "EventTime": "2024-05-21T12:54:10.176015+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSPgb41IrDCbs7fRi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 188} +{"Format": "IDEA0", "ID": "0f8bfd3f-f8e4-4f97-932b-8744c9d2aa52", "DetectTime": "2024-05-21T12:54:10.227712+00:00", "EventTime": "2024-05-21T12:54:10.227746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJaA72SUxHKqrNru8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "c1a5b63f-e719-401b-a15d-0716a8d58527", "DetectTime": "2024-05-21T12:54:10.491794+00:00", "EventTime": "2024-05-21T12:54:10.491818+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBhT8n3Ne4x7bsE8v5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "8e6e5c3b-bfe9-4ef8-b7c5-5d3e7ac693e1", "DetectTime": "2024-05-21T12:54:10.528635+00:00", "EventTime": "2024-05-21T12:54:10.528658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbr8mlFKsM64AZHb8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "31eb1ec9-fddb-46fc-bfe6-30e161a20872", "DetectTime": "2024-05-21T12:54:10.572958+00:00", "EventTime": "2024-05-21T12:54:10.572993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJZyIh7NoziJv2kl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "78bc69d9-d2ee-4568-8337-60e101bb1795", "DetectTime": "2024-05-21T12:54:10.616461+00:00", "EventTime": "2024-05-21T12:54:10.616483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDs4RH3XH60ZvJffLg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "1f25ff01-7a7a-4f0a-aceb-1a5921a405fd", "DetectTime": "2024-05-21T12:54:10.660758+00:00", "EventTime": "2024-05-21T12:54:10.660794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiIdGyIE16cJxMod"], "accumulated_threat_level": 8.799999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "34224d50-f008-4184-be47-71119389b0cf", "DetectTime": "2024-05-21T12:54:10.706199+00:00", "EventTime": "2024-05-21T12:54:10.706220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZJXL64Cn4sAUWCXUg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "6ef3e539-99c4-43e8-9062-c946568ba06b", "DetectTime": "2024-05-21T12:54:10.955872+00:00", "EventTime": "2024-05-21T12:54:10.955893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduymX1O1AWGvtCHgi"], "accumulated_threat_level": 9.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "df0f02d7-e6a2-4e36-8234-e3c96e170f34", "DetectTime": "2024-05-21T12:54:10.986381+00:00", "EventTime": "2024-05-21T12:54:10.986403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJj311ORiK4Hctlm9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "d8d95bee-5fbd-4a8b-91b9-9346f66d54ee", "DetectTime": "2024-05-21T12:54:11.027356+00:00", "EventTime": "2024-05-21T12:54:11.027377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cea3Z63jwOcwt42Qh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "781b0cc8-0070-4eae-9eb1-620d42292fb1", "DetectTime": "2024-05-21T12:54:11.086764+00:00", "EventTime": "2024-05-21T12:54:11.086789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZaIiZkIa57HX8a5"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "45ec2f04-f282-4084-9bf8-f45564ce6876", "DetectTime": "2024-05-21T12:54:11.177224+00:00", "EventTime": "2024-05-21T12:54:11.177242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7anlntxW9bFzB2Ye"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "66c032b9-a6c0-4c87-ac6e-27f8ae5ebf18", "DetectTime": "2024-05-21T12:54:11.237147+00:00", "EventTime": "2024-05-21T12:54:11.237168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYFyWFiCwhxO5LcS6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 185} +{"Format": "IDEA0", "ID": "f9be6fce-6e2d-43db-9c86-2038bfc572a7", "DetectTime": "2024-05-21T12:54:11.317297+00:00", "EventTime": "2024-05-21T12:54:11.317320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGt5K3aJbLXZIcs61"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "66b87b9a-b025-4395-818f-e7bf8d3a4f75", "DetectTime": "2024-05-21T12:54:11.323283+00:00", "EventTime": "2024-05-21T12:54:11.323306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9nfW14nPCWG9Bn7c"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "10942006-7add-4b11-8d22-107800374bd6", "DetectTime": "2024-05-21T12:54:11.668762+00:00", "EventTime": "2024-05-21T12:54:11.668791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQq5wq3HuIxjDqUQVg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 188} +{"Format": "Json", "ID": "10942006-7add-4b11-8d22-107800374bd6", "DetectTime": "2024-05-21T12:54:11.668762+00:00", "EventTime": "2024-05-21T12:54:11.668791+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "1970-01-08T19:30:26.397023+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2024/05/21 12:54:11.859014)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 188, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "511da02e-11cf-435b-af31-76ba472d41b5", "DetectTime": "2024-05-21T12:54:11.863739+00:00", "EventTime": "2024-05-21T12:54:11.863760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbmsEt4Dj5VnZpHEt2"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bccbd579-0b8b-4e5a-86ef-4192931cc5b5", "DetectTime": "2024-05-21T12:54:11.868849+00:00", "EventTime": "2024-05-21T12:54:11.868867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7mhdv2Htc1wfqPSNf"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "96b3944b-98d5-432b-84bd-f723f8e3c0ce", "DetectTime": "2024-05-21T12:54:11.873522+00:00", "EventTime": "2024-05-21T12:54:11.873540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck6B0U36z2Ui3vFdmg"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "c3c1c7a6-479e-45d7-a52f-2e39fdd03a0e", "DetectTime": "2024-05-21T12:54:11.936188+00:00", "EventTime": "2024-05-21T12:54:11.936208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzjbTd2sayhJBcw1ga"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "843242ee-a86a-4aa3-8488-1b9154e20abf", "DetectTime": "2024-05-21T12:54:11.943456+00:00", "EventTime": "2024-05-21T12:54:11.943479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTQyB23pxYL9wJup"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "d97edcd7-da7c-4dc7-a6ed-6f3eb70f048c", "DetectTime": "2024-05-21T12:54:12.189900+00:00", "EventTime": "2024-05-21T12:54:12.189927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEN2gc2CDQYZgcWFN"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "af5432cd-53e5-41f3-aad5-8516fe65c029", "DetectTime": "2024-05-21T12:54:12.210111+00:00", "EventTime": "2024-05-21T12:54:12.210132+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cszetx1UGQsX0tUtni"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "b51e7002-3c2f-40b2-8116-11f9b4c49dcf", "DetectTime": "2024-05-21T12:54:12.367806+00:00", "EventTime": "2024-05-21T12:54:12.367832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHj1LW17c5zBSSupK3"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "3eb14008-c05d-42e4-9cfe-a61f76abd1c0", "DetectTime": "2024-05-21T12:54:12.470634+00:00", "EventTime": "2024-05-21T12:54:12.470656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJIuL1NTqLVq8Vp2"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "0f554a7f-9eca-487a-a15e-08be66ac821a", "DetectTime": "2024-05-21T12:54:12.565203+00:00", "EventTime": "2024-05-21T12:54:12.565224+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0c5O43SKA9QcQgAi8"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "d08263ae-61be-4004-b536-8f2cea80f0e3", "DetectTime": "2024-05-21T12:54:12.570903+00:00", "EventTime": "2024-05-21T12:54:12.570923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4c1p0LRJB93UeT6"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "1724f86d-7667-4e39-a3cd-d540863df12e", "DetectTime": "2024-05-21T12:54:12.576337+00:00", "EventTime": "2024-05-21T12:54:12.576357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL9xqo2DA9DdvRBaa4"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "e121bcbc-b3bc-49ac-ad4d-c8a46fafa368", "DetectTime": "2024-05-21T12:54:12.615266+00:00", "EventTime": "2024-05-21T12:54:12.615292+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFcTT63ABMiLzKAqvi"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "dc3d1ef3-6573-4daa-bce9-a81e7a8e3cfa", "DetectTime": "2024-05-21T12:54:12.869775+00:00", "EventTime": "2024-05-21T12:54:12.869798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKFP22ruh6jRtS192"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "3a9cd824-4f25-456c-8b41-39d9650e502f", "DetectTime": "2024-05-21T12:54:13.051156+00:00", "EventTime": "2024-05-21T12:54:13.051189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMEtr2UnuZuRlw2p6"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "4b8aac93-b553-4a1b-a69a-29b65ccf9d1c", "DetectTime": "2024-05-21T12:54:13.056744+00:00", "EventTime": "2024-05-21T12:54:13.056764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJaML1ihJjGqrJ7Fg"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "c165190a-0597-46d2-a709-ce89b4536202", "DetectTime": "2024-05-21T12:54:13.110354+00:00", "EventTime": "2024-05-21T12:54:13.110374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnNlziN4So0Mb7ajh"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "2ff32924-3a05-40d9-ba29-a70f5fed1e78", "DetectTime": "2024-05-21T12:54:13.252296+00:00", "EventTime": "2024-05-21T12:54:13.252315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChiKFr2WQSwZlHUbpd"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "4d334c1c-22cc-4fc4-93b8-769e72ffb450", "DetectTime": "2024-05-21T12:54:13.257117+00:00", "EventTime": "2024-05-21T12:54:13.257135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6IVuF2CMosJNErunh"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "ce4191e9-1286-4533-8497-b76aee2f264a", "DetectTime": "2024-05-21T12:54:13.311173+00:00", "EventTime": "2024-05-21T12:54:13.311195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQDeQm49e0u2iNMSa1"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "6008fbb7-48e4-4617-8517-c0c0594970ec", "DetectTime": "2024-05-21T12:54:13.643864+00:00", "EventTime": "2024-05-21T12:54:13.643886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp8jDQ3566vPMOAsJ2"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bfaa22df-2376-49f5-919a-e23ef1bc0267", "DetectTime": "2024-05-21T12:54:13.715134+00:00", "EventTime": "2024-05-21T12:54:13.715166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceznco5RKANdNzImh"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "494759a6-689a-4141-9c7f-b6b43af167b7", "DetectTime": "2024-05-21T12:54:13.797358+00:00", "EventTime": "2024-05-21T12:54:13.797381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsibXe1Sr48cfR8ul7"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "e0a2ec29-e945-4f3e-955e-4e94b16718e5", "DetectTime": "2024-05-21T12:54:13.803433+00:00", "EventTime": "2024-05-21T12:54:13.803453+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHdzzj3y6JfshehRzh"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "5744664d-c0ff-47d4-9711-fc9b2dc2ae64", "DetectTime": "2024-05-21T12:54:13.809803+00:00", "EventTime": "2024-05-21T12:54:13.809829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ9gNjAeFPkuiT8t1"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "6dd03b07-f6df-4d26-a301-f3819a3c7843", "DetectTime": "2024-05-21T12:54:13.816161+00:00", "EventTime": "2024-05-21T12:54:13.816181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqbDe4o4WjqWDIJV"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "8c510753-5289-4bbe-a8fe-dfebeb794291", "DetectTime": "2024-05-21T12:54:13.849573+00:00", "EventTime": "2024-05-21T12:54:13.849595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmDwkC1Aet5KOS4D27"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "0068155f-463b-4074-bba0-1e74a507b18c", "DetectTime": "2024-05-21T12:54:14.161066+00:00", "EventTime": "2024-05-21T12:54:14.161088+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqeerI2yE3mRiGmEY3"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "c7bcb890-2e26-42ef-8d5a-4ac17cbe593a", "DetectTime": "2024-05-21T12:54:14.364555+00:00", "EventTime": "2024-05-21T12:54:14.364580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4AXOg4vo0u4joFgFg"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "5f31cde3-be38-4cb4-a16d-f35c17745f82", "DetectTime": "2024-05-21T12:54:14.378603+00:00", "EventTime": "2024-05-21T12:54:14.378622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqre8146hBskJdYXAa"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 188} +{"Format": "IDEA0", "ID": "a7b40fbd-b4a4-457c-a84e-975f818945a0", "DetectTime": "2024-05-21T12:54:14.388631+00:00", "EventTime": "2024-05-21T12:54:14.388653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqzdRW26ZSLJkjuirg"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "ee9fed8e-777b-4329-b199-604720828307", "DetectTime": "2024-05-21T12:54:14.478632+00:00", "EventTime": "2024-05-21T12:54:14.478656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRlTFu4ZxAIJnXRaJ1"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "09700594-4567-4897-9a04-bec613d655ec", "DetectTime": "2024-05-21T12:54:14.484092+00:00", "EventTime": "2024-05-21T12:54:14.484111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJkef835FyV5Ii6GLf"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "abc425f2-e498-4c57-8aea-dcacc0d2495d", "DetectTime": "2024-05-21T12:54:14.488742+00:00", "EventTime": "2024-05-21T12:54:14.488760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COWPda1GS2FaaUZ8Uj"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "f28cfc54-8ddd-477d-93d7-0ff27bdd81cd", "DetectTime": "2024-05-21T12:54:14.886684+00:00", "EventTime": "2024-05-21T12:54:14.886704+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uqqO1IbLngrCga7j"], "accumulated_threat_level": 3.2, "timewindow": 188} +{"Format": "IDEA0", "ID": "b4059194-c4a2-4c51-8895-97e2e6c22e8d", "DetectTime": "2024-05-21T12:54:14.900855+00:00", "EventTime": "2024-05-21T12:54:14.900875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COHxBb1nJlPJEBne35"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bf75682d-7abd-41cc-8865-1cee4877ec8f", "DetectTime": "2024-05-21T12:54:14.905470+00:00", "EventTime": "2024-05-21T12:54:14.905489+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX4f7p490YlKiF06yb"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bcd69710-063e-4f8e-b694-cf91ad4974e4", "DetectTime": "2024-05-21T12:54:14.943077+00:00", "EventTime": "2024-05-21T12:54:14.943099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEHryv1Shxa2m9hXei"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "96d7a0d0-a7cd-4fce-83e5-2818e1746d99", "DetectTime": "2024-05-21T12:54:15.211527+00:00", "EventTime": "2024-05-21T12:54:15.211548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRFY3R3w92zV2A5Ej"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "683bf60a-9a70-428b-b8e0-d657c0f8c670", "DetectTime": "2024-05-21T12:54:15.287545+00:00", "EventTime": "2024-05-21T12:54:15.287567+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjIAhA4LhjShUgJSDc"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "d6310b1a-10ae-49cd-ab2c-dbb38a51e9ab", "DetectTime": "2024-05-21T12:54:15.350933+00:00", "EventTime": "2024-05-21T12:54:15.350955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xbnvx0kqU0wV9A6"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "7bb70a82-47be-4eee-bbe3-e6176f0294f8", "DetectTime": "2024-05-21T12:54:15.421972+00:00", "EventTime": "2024-05-21T12:54:15.421993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSxCeh2xSZwyUlEded"], "accumulated_threat_level": 4.0, "timewindow": 188} +{"Format": "IDEA0", "ID": "4ff8c1d6-1cca-448a-9ff2-2803089a9c0f", "DetectTime": "2024-05-21T12:54:15.457940+00:00", "EventTime": "2024-05-21T12:54:15.457963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ7pb21St8tVNQVbx8"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "37aebcef-90ea-4bef-8a15-55b2def942d2", "DetectTime": "2024-05-21T12:54:15.498855+00:00", "EventTime": "2024-05-21T12:54:15.498877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ccb9q02O3SJoRyAGa2"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "a7d9e9ac-fb05-4306-8435-36b9da665304", "DetectTime": "2024-05-21T12:54:15.794086+00:00", "EventTime": "2024-05-21T12:54:15.794109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdx75cEJ9k12orNz8"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "abee4477-a838-458c-af2c-1dad5a10536a", "DetectTime": "2024-05-21T12:54:15.878472+00:00", "EventTime": "2024-05-21T12:54:15.878494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxYMxq1lQmKoJG3sfd"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "074d1b53-c930-41d6-aa14-61e93a8de973", "DetectTime": "2024-05-21T12:54:15.947490+00:00", "EventTime": "2024-05-21T12:54:15.947511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAG0F528AhUFhhWpd1"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "20d2b729-40ff-43e9-b0da-6cc9eff0a448", "DetectTime": "2024-05-21T12:54:15.961414+00:00", "EventTime": "2024-05-21T12:54:15.961433+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeBIN2qrxT0ygdqx4"], "accumulated_threat_level": 4.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "d5f96d70-97fd-47d3-9f74-d01fdcea36a8", "DetectTime": "2024-05-21T12:54:16.026462+00:00", "EventTime": "2024-05-21T12:54:16.026485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDjWc2VX0WyGJpNre"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "75f6228c-503c-4c5f-aeda-28f72d98df2c", "DetectTime": "2024-05-21T12:54:16.111798+00:00", "EventTime": "2024-05-21T12:54:16.111819+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Pnvo4XkpRed5QfCa"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "d6a0df14-452d-48da-9063-ccc4caece0b5", "DetectTime": "2024-05-21T12:54:16.586622+00:00", "EventTime": "2024-05-21T12:54:16.586642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy3I8bVz7YnBT3Iyi"], "accumulated_threat_level": 5.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "9707ba6f-9936-4fb5-ae6d-9fcd33f4923b", "DetectTime": "2024-05-21T12:54:16.598578+00:00", "EventTime": "2024-05-21T12:54:16.598598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeRsQd2AbO7NsZrqBb"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "863a4ce1-69f0-4714-8b07-e4ebba780735", "DetectTime": "2024-05-21T12:54:16.622172+00:00", "EventTime": "2024-05-21T12:54:16.622196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsW6Q3wWT99eKRGe4"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "a419e337-5b76-4c71-b98c-132a7b0a2e17", "DetectTime": "2024-05-21T12:54:16.627076+00:00", "EventTime": "2024-05-21T12:54:16.627095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpssk64PGZ3dMfRfdk"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "bb3eef9c-8548-4238-a5f3-d649e2089e94", "DetectTime": "2024-05-21T12:54:16.636486+00:00", "EventTime": "2024-05-21T12:54:16.636505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cly1Vg2CxupWrGdjml"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "d16b33e4-94de-4753-9192-dc5d0614d43d", "DetectTime": "2024-05-21T12:54:16.733120+00:00", "EventTime": "2024-05-21T12:54:16.733143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmke6z1SbTxbBlriO2"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "45707a24-b49a-436f-89ee-99e92947973b", "DetectTime": "2024-05-21T12:54:16.777220+00:00", "EventTime": "2024-05-21T12:54:16.777244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyqKM1QxFXYC6f8r1"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "74e17c7a-07af-44cb-94a6-4eda5ef009ee", "DetectTime": "2024-05-21T12:54:17.193478+00:00", "EventTime": "2024-05-21T12:54:17.193502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CriY011lKmYZG2oAN2"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "127e013c-b88a-492c-95cc-3c8c298895d4", "DetectTime": "2024-05-21T12:54:17.204814+00:00", "EventTime": "2024-05-21T12:54:17.204834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFtS0L3zOXVidxWy97"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "f2c70c00-db0e-41f8-a3f3-6ba4425c5cf5", "DetectTime": "2024-05-21T12:54:17.230613+00:00", "EventTime": "2024-05-21T12:54:17.230635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Y4el34Lkltpnvt46"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "c070bed4-ecbc-41a9-9763-647610105881", "DetectTime": "2024-05-21T12:54:17.236008+00:00", "EventTime": "2024-05-21T12:54:17.236027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YBThoGOHSKSoGD5"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "d81d6e25-7620-4a94-97c5-4c8cf9c9defc", "DetectTime": "2024-05-21T12:54:17.351641+00:00", "EventTime": "2024-05-21T12:54:17.351664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYNkuC3OXyZjslonG3"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "646e025d-f2f3-4fca-9459-e9c2b1ca9142", "DetectTime": "2024-05-21T12:54:17.356695+00:00", "EventTime": "2024-05-21T12:54:17.356714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWoQdW1zMVjEKWobLc"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "2e79140b-aea2-4a4b-9a5d-ec3dab10c51d", "DetectTime": "2024-05-21T12:54:17.447944+00:00", "EventTime": "2024-05-21T12:54:17.447963+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.42.113.147"]}], "Attach": [{"Content": "Connection to unknown destination port 7090/UDP destination IP 99.42.113.147. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGcBLVfyeyNu5MIJd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 188} +{"Format": "IDEA0", "ID": "7ba2e729-2787-45c4-8eb0-1f0dd646a9e6", "DetectTime": "2024-05-21T12:54:17.686716+00:00", "EventTime": "2024-05-21T12:54:17.686739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVMJaM1AvYwirIpOPd"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "af7de942-322f-4560-a6e0-5696e6046c2f", "DetectTime": "2024-05-21T12:54:17.888195+00:00", "EventTime": "2024-05-21T12:54:17.888218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoMw432765upXa0fDc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "a4f8f01c-fdbb-48ac-94bc-cee517f4c5c4", "DetectTime": "2024-05-21T12:54:17.894684+00:00", "EventTime": "2024-05-21T12:54:17.894705+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeVUd2tV5fRpci4ri"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "06b9797e-fc73-4af0-a22f-953b9757cb3c", "DetectTime": "2024-05-21T12:54:17.899338+00:00", "EventTime": "2024-05-21T12:54:17.899357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYZARq2L4N6yIRGh0j"], "accumulated_threat_level": 0, "timewindow": 186} +{"Format": "IDEA0", "ID": "91db07e6-e5ec-47a0-b63b-5b013f1e1315", "DetectTime": "2024-05-21T12:54:18.030022+00:00", "EventTime": "2024-05-21T12:54:18.030043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPerMu3OTzi9F9jMIb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "1ed0f946-54a5-4caf-b087-383b59f40603", "DetectTime": "2024-05-21T12:54:18.036744+00:00", "EventTime": "2024-05-21T12:54:18.036765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeWPap3TeoD2OAdMd6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "7564aa9a-c476-4932-9171-7b52ebce9958", "DetectTime": "2024-05-21T12:54:18.041273+00:00", "EventTime": "2024-05-21T12:54:18.041291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgJoli4GspQzqwpTH7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "09916c74-b909-42ae-80e2-bbc2343a2b30", "DetectTime": "2024-05-21T12:54:18.295667+00:00", "EventTime": "2024-05-21T12:54:18.295690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNFTi82Bpyf7t9bNwh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "373ed50d-7311-4604-9cb3-5b05b5aeffd6", "DetectTime": "2024-05-21T12:54:18.370702+00:00", "EventTime": "2024-05-21T12:54:18.370724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3htT51Wv4H9inz1Gd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "1635e60c-206f-40f4-a947-d17aa70af713", "DetectTime": "2024-05-21T12:54:18.376916+00:00", "EventTime": "2024-05-21T12:54:18.376943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVNlXA3xqh2a59ZSth"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "23b9391c-ba09-4a9f-a12d-1c8b19ecffaf", "DetectTime": "2024-05-21T12:54:18.401591+00:00", "EventTime": "2024-05-21T12:54:18.401614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZj1G3N2xx9QSlBH"], "accumulated_threat_level": 7.199999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "2d5ffe97-6fe8-445a-a1c2-bfcc6bd69f11", "DetectTime": "2024-05-21T12:54:18.792582+00:00", "EventTime": "2024-05-21T12:54:18.792604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwyE854yb8VRBk8Bch"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "b335186b-c095-4c0b-a9ae-d8c2f1babafc", "DetectTime": "2024-05-21T12:54:18.893044+00:00", "EventTime": "2024-05-21T12:54:18.893066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHHXxs3HsupZebPxFa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "68ceea55-8473-4c54-8a89-fc43ec7333ec", "DetectTime": "2024-05-21T12:54:18.954270+00:00", "EventTime": "2024-05-21T12:54:18.954291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq9rYcwLOWv2ndsxc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "388ed5a2-2848-48ba-b893-6151ebb64cad", "DetectTime": "2024-05-21T12:54:19.008344+00:00", "EventTime": "2024-05-21T12:54:19.008369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJvfUl23eU9WLaGVa7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "acc59516-43c4-4843-a8a6-e2f4a6b4d3ae", "DetectTime": "2024-05-21T12:54:19.013514+00:00", "EventTime": "2024-05-21T12:54:19.013533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COyKNk37nVEFSLmo6e"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "234d67b5-633d-4a7d-84a2-40436856ed50", "DetectTime": "2024-05-21T12:54:19.025234+00:00", "EventTime": "2024-05-21T12:54:19.025255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp3NM02QI24JmqqyTf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "9cc9b102-e863-421e-abd9-dfcee7fd5a5b", "DetectTime": "2024-05-21T12:54:19.030261+00:00", "EventTime": "2024-05-21T12:54:19.030285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfHqjHbnaFj0oCrdi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "5d9de72b-44ec-4bd7-8ede-823d60376bf4", "DetectTime": "2024-05-21T12:54:19.145065+00:00", "EventTime": "2024-05-21T12:54:19.145087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiDHze4ay1BIvSV9di"], "accumulated_threat_level": 7.999999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "2aa157d6-5260-499a-a73a-fe346bcc18a8", "DetectTime": "2024-05-21T12:54:19.150023+00:00", "EventTime": "2024-05-21T12:54:19.150041+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CygATJMjgvWqw4iB7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "5c467539-12c2-482d-bbea-aa825372689b", "DetectTime": "2024-05-21T12:54:19.436148+00:00", "EventTime": "2024-05-21T12:54:19.436171+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboKkN3drD2rGpLioa"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "888342ec-2efb-407e-9845-d1d39d7706ff", "DetectTime": "2024-05-21T12:54:19.453255+00:00", "EventTime": "2024-05-21T12:54:19.453276+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CboKkN3drD2rGpLioa"], "accumulated_threat_level": 6.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "2105f4fa-e80a-40b6-b474-5423d1d9ac2f", "DetectTime": "2024-05-21T12:54:19.485854+00:00", "EventTime": "2024-05-21T12:54:19.485875+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVP5DZgobMD5ICid"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "9b22cc31-9288-48cb-b225-c65205414d9e", "DetectTime": "2024-05-21T12:54:19.501367+00:00", "EventTime": "2024-05-21T12:54:19.501386+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxVP5DZgobMD5ICid"], "accumulated_threat_level": 7.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "3497349e-2aa0-4ae7-a0a0-0459c8953d0f", "DetectTime": "2024-05-21T12:54:19.527587+00:00", "EventTime": "2024-05-21T12:54:19.527606+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClibhG4vHlhZenh4hd"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "f488dc00-6b0c-4dec-a414-b5a297bad49d", "DetectTime": "2024-05-21T12:54:19.542293+00:00", "EventTime": "2024-05-21T12:54:19.542314+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClibhG4vHlhZenh4hd"], "accumulated_threat_level": 7.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "a3b3e76d-6d2a-42de-a265-934b521fdfab", "DetectTime": "2024-05-21T12:54:19.550493+00:00", "EventTime": "2024-05-21T12:54:19.550515+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqZp745bPGsvXKnq2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "9fd10e20-da9a-46d4-97c7-f6c65f779afd", "DetectTime": "2024-05-21T12:54:19.619801+00:00", "EventTime": "2024-05-21T12:54:19.619822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3YKRU3AR4FGW9IeR5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "7ae280c9-dbe0-4484-9d70-7e5328b44498", "DetectTime": "2024-05-21T12:54:19.794464+00:00", "EventTime": "2024-05-21T12:54:19.794489+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZAkm2fFPXq7N1vM"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "1034d437-ac43-4274-b091-13f37d216195", "DetectTime": "2024-05-21T12:54:19.809081+00:00", "EventTime": "2024-05-21T12:54:19.809103+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgZAkm2fFPXq7N1vM"], "accumulated_threat_level": 8.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "881e6488-4c26-4b3c-bc20-903dcc037295", "DetectTime": "2024-05-21T12:54:19.836360+00:00", "EventTime": "2024-05-21T12:54:19.836382+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.74.200.86"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS7713 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COg8Zy4VQ9kxl0ERQ"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e7c95829-8d77-4abc-a21c-f980e3807a8e", "DetectTime": "2024-05-21T12:54:19.852560+00:00", "EventTime": "2024-05-21T12:54:19.852582+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS7713 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COg8Zy4VQ9kxl0ERQ"], "accumulated_threat_level": 8.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "292a59e2-5e8d-44e7-be15-42769ba0540f", "DetectTime": "2024-05-21T12:54:19.861355+00:00", "EventTime": "2024-05-21T12:54:19.861377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnN84a18H2y4OHh2sa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "6b1878ae-2824-4bc4-b8ab-fcd341ed75ad", "DetectTime": "2024-05-21T12:54:19.866104+00:00", "EventTime": "2024-05-21T12:54:19.866123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAStH31pn2XVAxVAUl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "68c1a1f6-260a-4e9f-b3fe-73db456dcd1d", "DetectTime": "2024-05-21T12:54:19.871352+00:00", "EventTime": "2024-05-21T12:54:19.871372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGMWi12f0xeeekFre"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "88cb89a9-d843-472c-a3e1-489134d56e67", "DetectTime": "2024-05-21T12:54:19.875716+00:00", "EventTime": "2024-05-21T12:54:19.875734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjEfn3jR9iT16Zhhe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "7b5587af-b73e-45b1-8f8d-c8c536819212", "DetectTime": "2024-05-21T12:54:19.880060+00:00", "EventTime": "2024-05-21T12:54:19.880078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGOay3dHEHlwXgE5f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "31a1fb89-93e1-4638-aff9-a48a428876e9", "DetectTime": "2024-05-21T12:54:19.900862+00:00", "EventTime": "2024-05-21T12:54:19.900881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUNK6u1eOvWrbNiwR8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "c6d4ed31-6453-46f7-ae69-6f2ca736f993", "DetectTime": "2024-05-21T12:54:19.905705+00:00", "EventTime": "2024-05-21T12:54:19.905723+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC4nwv384Vkzr8PaCb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "002f0ab6-a684-480d-83cc-5166439d2a77", "DetectTime": "2024-05-21T12:54:20.229863+00:00", "EventTime": "2024-05-21T12:54:20.229885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVh082aQh8zxEUv88"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "df656880-a02c-4ccd-ba1e-7df50f3c7ea0", "DetectTime": "2024-05-21T12:54:20.255657+00:00", "EventTime": "2024-05-21T12:54:20.255675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdlsJ1ngLhujN1xVe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "b986b391-e5d7-4cad-87e5-53f850ae28f9", "DetectTime": "2024-05-21T12:54:20.267948+00:00", "EventTime": "2024-05-21T12:54:20.267965+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.97.55"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGsGB2okHzxukBnFj"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "925e3af5-d0ce-4644-9f70-9d217cca5067", "DetectTime": "2024-05-21T12:54:20.281171+00:00", "EventTime": "2024-05-21T12:54:20.281194+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKGsGB2okHzxukBnFj"], "accumulated_threat_level": 9.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "4b274dc7-9e49-4c8d-820f-270ebc1d8cf7", "DetectTime": "2024-05-21T12:54:20.288139+00:00", "EventTime": "2024-05-21T12:54:20.288163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CC8mLn4fJejY6U9016"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "b10ffa69-4769-412f-85cf-94e9828b440e", "DetectTime": "2024-05-21T12:54:20.305894+00:00", "EventTime": "2024-05-21T12:54:20.305913+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.108.40.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. AS: ALGTEL-AS, DZ AS36947 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEbHjg1IqHURPpO1Ej"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "3dcb8c4a-851c-4761-9a7d-fea0b16dde32", "DetectTime": "2024-05-21T12:54:20.319839+00:00", "EventTime": "2024-05-21T12:54:20.319860+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. AS: ALGTEL-AS, DZ AS36947 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEbHjg1IqHURPpO1Ej"], "accumulated_threat_level": 9.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "46dff713-2d47-462b-be4b-9f0593e3445a", "DetectTime": "2024-05-21T12:54:20.830993+00:00", "EventTime": "2024-05-21T12:54:20.831013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZwxC3mpGqNuMYgXg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "13a11e7f-00cf-40fc-9b62-41e790e30d77", "DetectTime": "2024-05-21T12:54:20.870192+00:00", "EventTime": "2024-05-21T12:54:20.870213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUVTBw3ETPn2BwFxK2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "5f3044cd-1dc1-469c-a109-77e6aeba0f51", "DetectTime": "2024-05-21T12:54:20.894354+00:00", "EventTime": "2024-05-21T12:54:20.894375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cit3Ga35EwHdvQz0rh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "e6746598-e688-4ca9-a483-1ca3e14b8e54", "DetectTime": "2024-05-21T12:54:20.909341+00:00", "EventTime": "2024-05-21T12:54:20.909364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDqIlj1VH2We0lpht2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "a3fc6323-4143-49c1-96df-5f8e6d0f420f", "DetectTime": "2024-05-21T12:54:20.914857+00:00", "EventTime": "2024-05-21T12:54:20.914877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvcNkG2mtufO0InaIl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "e697d51c-faae-46b3-9071-62debc6ab4b9", "DetectTime": "2024-05-21T12:54:20.919747+00:00", "EventTime": "2024-05-21T12:54:20.919767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C54piv35p3gUINILA4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "eaf1ce2f-57fc-4c74-ae6f-f4da7a2f6760", "DetectTime": "2024-05-21T12:54:20.924582+00:00", "EventTime": "2024-05-21T12:54:20.924601+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXWtTRdwxOwr0WRCj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "c3d9524a-46f0-421c-a977-80602901aec1", "DetectTime": "2024-05-21T12:54:20.933581+00:00", "EventTime": "2024-05-21T12:54:20.933599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM53Nd4Y82hjomxsVc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "a44c0430-c5b5-42cd-907a-87d8978a5b2c", "DetectTime": "2024-05-21T12:54:20.938927+00:00", "EventTime": "2024-05-21T12:54:20.938950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKkH9W1wZLZp0TMg3h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "075164e5-f199-4437-9c66-5a5cdd5c142d", "DetectTime": "2024-05-21T12:54:20.962059+00:00", "EventTime": "2024-05-21T12:54:20.962080+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Qe1L2kt4shOwyfL2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "fe09ab92-698e-49b8-998d-2f061585db44", "DetectTime": "2024-05-21T12:54:20.976029+00:00", "EventTime": "2024-05-21T12:54:20.976049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WMyA1Itx4i2dG0e1"], "accumulated_threat_level": 9.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "c9408196-5491-4d1a-bd74-d017628c9d83", "DetectTime": "2024-05-21T12:54:21.337440+00:00", "EventTime": "2024-05-21T12:54:21.337463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdMeC2khvtdSk6rJb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "d4dce4b4-b22f-4717-a504-151055cdde41", "DetectTime": "2024-05-21T12:54:21.531305+00:00", "EventTime": "2024-05-21T12:54:21.531329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKUKW3dHB7M3ls0Ok"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "97d65590-6f9e-41f0-847f-9f1aa52f9d07", "DetectTime": "2024-05-21T12:54:22.067291+00:00", "EventTime": "2024-05-21T12:54:22.067313+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs5S4k2GN1sELijYDl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "0b4a2b96-0e03-4782-82db-f7cc2ee5f0bc", "DetectTime": "2024-05-21T12:54:22.146601+00:00", "EventTime": "2024-05-21T12:54:22.146624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr9NHb4a6cl6oFv3ya"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "a16801cf-b3cc-4906-b194-a064600db49e", "DetectTime": "2024-05-21T12:54:22.151667+00:00", "EventTime": "2024-05-21T12:54:22.151688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8Cyz22eWSZDSpA04"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "24f0ce4b-7cf4-4018-8153-c7988c5e2f2d", "DetectTime": "2024-05-21T12:54:22.282124+00:00", "EventTime": "2024-05-21T12:54:22.282145+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJVftrSt8avB7TUud"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "1b98292b-31c8-41f8-b192-f450a3758797", "DetectTime": "2024-05-21T12:54:22.295576+00:00", "EventTime": "2024-05-21T12:54:22.295594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIKG7IYrVFxNEeMR1"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "6f8d167e-59b1-4db9-99ea-0b719601f61e", "DetectTime": "2024-05-21T12:54:22.358265+00:00", "EventTime": "2024-05-21T12:54:22.358282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjA8pQ3Zpc0YyA2Srb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "8f566a88-1294-4da8-9409-32de3a236f67", "DetectTime": "2024-05-21T12:54:22.384161+00:00", "EventTime": "2024-05-21T12:54:22.384183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbcCZRK5u7GNwSjBf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "84eeaa26-d977-4b60-8b3a-994650d37434", "DetectTime": "2024-05-21T12:54:22.472453+00:00", "EventTime": "2024-05-21T12:54:22.472475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwEoYLEAWwiTb1aXe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "6e7c7093-8154-4177-8b0f-4c0c1c7cc9a1", "DetectTime": "2024-05-21T12:54:22.741142+00:00", "EventTime": "2024-05-21T12:54:22.741166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4KqRH2fSh04bO16Ik"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "8adb1579-b1b3-404d-b7db-e33346ffcb4c", "DetectTime": "2024-05-21T12:54:22.747866+00:00", "EventTime": "2024-05-21T12:54:22.747888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crrk1X3Pr9ECaXXCx1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "e37b3a37-67c7-4f18-b32a-fde8bac92055", "DetectTime": "2024-05-21T12:54:22.752851+00:00", "EventTime": "2024-05-21T12:54:22.752870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5IilB4rreidcHfG17"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "029b7866-484d-4e70-b771-757b1af01bf5", "DetectTime": "2024-05-21T12:54:22.757629+00:00", "EventTime": "2024-05-21T12:54:22.757648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVBOEo3owvOuoCLq0c"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "d7c5cca4-55cf-4ed6-a180-8fbe3b2ca73f", "DetectTime": "2024-05-21T12:54:22.810749+00:00", "EventTime": "2024-05-21T12:54:22.810770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI1LZYYkYoWD8gNof"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "df07e33d-05e6-43e4-a770-884c7a161604", "DetectTime": "2024-05-21T12:54:23.128916+00:00", "EventTime": "2024-05-21T12:54:23.128936+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWfmiZSCMAFu9ovi"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "ce77653c-40e4-4312-86c0-1cb35e7551b8", "DetectTime": "2024-05-21T12:54:23.147176+00:00", "EventTime": "2024-05-21T12:54:23.147196+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFWfmiZSCMAFu9ovi"], "accumulated_threat_level": 10.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "4681da2e-a319-4992-8c5c-7899de2afa99", "DetectTime": "2024-05-21T12:54:23.400019+00:00", "EventTime": "2024-05-21T12:54:23.400044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwoQ9Y2zxlhIGhnAx2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "976b26df-b4a2-44f9-a0c4-ad4afa09bd62", "DetectTime": "2024-05-21T12:54:23.415637+00:00", "EventTime": "2024-05-21T12:54:23.415657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGat6v1fkupq93M4U4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "0775b1f3-fe9b-4479-9aa5-c130adbd6783", "DetectTime": "2024-05-21T12:54:23.456091+00:00", "EventTime": "2024-05-21T12:54:23.456113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMi6T3JW6tl5pWgIi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "a380b6ef-278c-4b8c-886f-1c512847e6e2", "DetectTime": "2024-05-21T12:54:23.461483+00:00", "EventTime": "2024-05-21T12:54:23.461502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0QEIj3EbnRIGwGP2l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "ec8356f0-ffe2-4b43-a469-deb58d805ac3", "DetectTime": "2024-05-21T12:54:23.466565+00:00", "EventTime": "2024-05-21T12:54:23.466585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdR3C1PyDXgOqUgZh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "e36d2c20-c435-4f50-aff2-6f64287e9ca2", "DetectTime": "2024-05-21T12:54:23.471380+00:00", "EventTime": "2024-05-21T12:54:23.471401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRxnLL3beFJdEtUgo8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "38482bfe-78c6-40e3-9f0f-09daa4d12a08", "DetectTime": "2024-05-21T12:54:23.531131+00:00", "EventTime": "2024-05-21T12:54:23.531155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct7oOIQs4xA1xNvY3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "2ebe057d-c0f8-4497-9262-f90fa401fcc0", "DetectTime": "2024-05-21T12:54:23.591848+00:00", "EventTime": "2024-05-21T12:54:23.591866+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.61.86.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8S0XROu1Lj4xwJR8"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "70a27eec-1f55-457e-ad6e-57dffa4a9659", "DetectTime": "2024-05-21T12:54:23.606791+00:00", "EventTime": "2024-05-21T12:54:23.606810+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8S0XROu1Lj4xwJR8"], "accumulated_threat_level": 10.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "de433b30-b762-491a-b56a-c8c7c820e0fe", "DetectTime": "2024-05-21T12:54:23.641124+00:00", "EventTime": "2024-05-21T12:54:23.641143+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBHYl2w1zxlX3L1r7"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "360ae98c-7896-4ca6-a1cf-228adcf23c12", "DetectTime": "2024-05-21T12:54:23.655452+00:00", "EventTime": "2024-05-21T12:54:23.655472+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeBHYl2w1zxlX3L1r7"], "accumulated_threat_level": 11.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "c30f9cd2-3a0a-45db-8b2d-607c79ab7baf", "DetectTime": "2024-05-21T12:54:23.684451+00:00", "EventTime": "2024-05-21T12:54:23.684469+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.139.188.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCC5AqEbsTjKKpNgl"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "158a9a46-c5e6-478f-b44d-bfda5a17d76f", "DetectTime": "2024-05-21T12:54:23.697330+00:00", "EventTime": "2024-05-21T12:54:23.697349+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCC5AqEbsTjKKpNgl"], "accumulated_threat_level": 11.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "10075862-cb1e-4329-a5cd-0e84d3698bf7", "DetectTime": "2024-05-21T12:54:23.807091+00:00", "EventTime": "2024-05-21T12:54:23.807126+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.72.219.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7AT01FUsIWUtJlbj"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "9e4b3e85-3ec0-4146-83d6-ce0b804e136e", "DetectTime": "2024-05-21T12:54:23.823514+00:00", "EventTime": "2024-05-21T12:54:23.823536+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY7AT01FUsIWUtJlbj"], "accumulated_threat_level": 12.0, "timewindow": 43} +{"Format": "Json", "ID": "9e4b3e85-3ec0-4146-83d6-ce0b804e136e", "DetectTime": "2024-05-21T12:54:23.823514+00:00", "EventTime": "2024-05-21T12:54:23.823536+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "1970-01-02T18:36:26.073821+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 43. (real time 2024/05/21 12:54:24.305513)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 43, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "cc2c453f-d853-49ff-bd7e-7c8731966b58", "DetectTime": "2024-05-21T12:54:24.363268+00:00", "EventTime": "2024-05-21T12:54:24.363287+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.140.158.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXex2brqQI1keqD2"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "4e14d60b-3128-4dda-b26a-2d349ed1e406", "DetectTime": "2024-05-21T12:54:24.376290+00:00", "EventTime": "2024-05-21T12:54:24.376310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7xXex2brqQI1keqD2"], "accumulated_threat_level": 0.5, "timewindow": 43} +{"Format": "IDEA0", "ID": "3173a7fe-0326-4198-8775-348223a80e28", "DetectTime": "2024-05-21T12:54:24.389043+00:00", "EventTime": "2024-05-21T12:54:24.389062+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.254.84.17"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IyUj1zwOpck5Yahb"], "accumulated_threat_level": 0, "timewindow": 43} +{"Format": "IDEA0", "ID": "bdbdbbe2-a7e1-4b7c-b8da-74e83626efa0", "DetectTime": "2024-05-21T12:54:24.403245+00:00", "EventTime": "2024-05-21T12:54:24.403266+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9IyUj1zwOpck5Yahb"], "accumulated_threat_level": 1.0, "timewindow": 43} +{"Format": "IDEA0", "ID": "e4820376-1a43-40d1-b857-d9d0f0aba3c9", "DetectTime": "2024-05-21T12:54:24.408408+00:00", "EventTime": "2024-05-21T12:54:24.408426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqlCd3qHAvSrO41q4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "7285a29f-3aec-4bdd-ab03-818d3a6b91cb", "DetectTime": "2024-05-21T12:54:24.412889+00:00", "EventTime": "2024-05-21T12:54:24.412907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGTwveYnavp5DTlNg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 187} +{"Format": "IDEA0", "ID": "7764f43c-d30a-4154-9fd5-b312790eeda6", "DetectTime": "2024-05-21T12:54:24.417823+00:00", "EventTime": "2024-05-21T12:54:24.417841+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBw0Hl41Ye8LRZ5zz9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "74fa1339-45ad-4754-9bb4-7afac2f41378", "DetectTime": "2024-05-21T12:54:24.422327+00:00", "EventTime": "2024-05-21T12:54:24.422345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C51Xrx1TR45gtL3V0l"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "e13b30ad-f328-429f-bc63-fcbcc1e77bed", "DetectTime": "2024-05-21T12:54:24.426972+00:00", "EventTime": "2024-05-21T12:54:24.426990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPXn1817GXSPheh2Eb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "585f9be9-bf53-47e5-9bfe-8239e6364584", "DetectTime": "2024-05-21T12:54:24.431456+00:00", "EventTime": "2024-05-21T12:54:24.431474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CExYdEqDfSPDBfvme"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "ac2e0671-e9ce-483c-b43f-44a4563ec8a2", "DetectTime": "2024-05-21T12:54:24.453587+00:00", "EventTime": "2024-05-21T12:54:24.453611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoMTSlMP7xBZDsKbf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "193deb34-8cd8-48d7-9334-e62877121e72", "DetectTime": "2024-05-21T12:54:24.562825+00:00", "EventTime": "2024-05-21T12:54:24.562848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYP7Ov4sJJIchkjSU8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 188} +{"Format": "IDEA0", "ID": "213d4911-b349-45e0-b60f-b582755df17e", "DetectTime": "2024-05-21T12:54:24.719683+00:00", "EventTime": "2024-05-21T12:54:24.719702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9c11c3Ph7NWpGgoZd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 188} +{"Format": "Json", "ID": "213d4911-b349-45e0-b60f-b582755df17e", "DetectTime": "2024-05-21T12:54:24.719683+00:00", "EventTime": "2024-05-21T12:54:24.719702+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-08T19:58:37.091392+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 188. (real time 2024/05/21 12:54:24.931748)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 188, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "09434a31-bb40-42cc-9aa7-3841f6e23a86", "DetectTime": "2024-05-21T12:54:24.942624+00:00", "EventTime": "2024-05-21T12:54:24.942644+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYojob3mnp460yIT2b"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "9d952719-cec3-4f24-87b9-365602108b37", "DetectTime": "2024-05-21T12:54:24.952668+00:00", "EventTime": "2024-05-21T12:54:24.952689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw9UpQ2zXklHZDqxt1"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "36805811-981e-4e20-a99b-94b041df0af4", "DetectTime": "2024-05-21T12:54:24.959876+00:00", "EventTime": "2024-05-21T12:54:24.959897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C42jqg3TSl88HByrba"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "60f47eba-1db9-45aa-b138-011ab2d40dd7", "DetectTime": "2024-05-21T12:54:24.992043+00:00", "EventTime": "2024-05-21T12:54:24.992066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CakQzn1L3vw0QZtAKb"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "5d4cfce7-20e7-44d8-96cc-0df1d87acceb", "DetectTime": "2024-05-21T12:54:25.099848+00:00", "EventTime": "2024-05-21T12:54:25.099870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHWpEf1z9kcHcmxdT1"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "79f554c9-9248-4301-a334-6cd98c805b5b", "DetectTime": "2024-05-21T12:54:25.142598+00:00", "EventTime": "2024-05-21T12:54:25.142621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crwne84tFNCw5uYM99"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "e34a12c2-d9e6-4df8-8619-2522fd5fd148", "DetectTime": "2024-05-21T12:54:25.218878+00:00", "EventTime": "2024-05-21T12:54:25.218899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdgrbr3nYdxWhC7SQ5"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "7a8ad7ad-d0b2-449c-a785-d1bdd15c94be", "DetectTime": "2024-05-21T12:54:25.229290+00:00", "EventTime": "2024-05-21T12:54:25.229310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM0KFg1FE3F6sIIDSd"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "6d8db616-0d67-4952-a4a0-3db3a59870b8", "DetectTime": "2024-05-21T12:54:25.331608+00:00", "EventTime": "2024-05-21T12:54:25.331627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsLYcu2CYHiJZPAXl4"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "e403e3d7-860d-43e5-b56b-157971043d92", "DetectTime": "2024-05-21T12:54:25.573720+00:00", "EventTime": "2024-05-21T12:54:25.573740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CovL7F1vTmB5ZtBm3c"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "750344cd-41e5-48c2-af02-83920be8fb67", "DetectTime": "2024-05-21T12:54:25.605924+00:00", "EventTime": "2024-05-21T12:54:25.605945+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqB7Xc1RATQKeT87A2"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "137ab7ad-d1af-40e1-a079-0cf6d6752910", "DetectTime": "2024-05-21T12:54:25.769254+00:00", "EventTime": "2024-05-21T12:54:25.769276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvuNU21WkiU3xZPW3g"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "fad1cca1-658c-4a99-aa02-438a5558b518", "DetectTime": "2024-05-21T12:54:25.856034+00:00", "EventTime": "2024-05-21T12:54:25.856057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvouoo36tk3sSI8Mzj"], "accumulated_threat_level": 0, "timewindow": 188} +{"Format": "IDEA0", "ID": "e8691066-7c41-4f3e-8c56-2c4ece9aecc1", "DetectTime": "2024-05-21T12:54:26.116289+00:00", "EventTime": "2024-05-21T12:54:26.116309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLwd42oRhbOgrPIoa"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "0ad124a6-2fc8-48cf-b461-3a9d699ccf9d", "DetectTime": "2024-05-21T12:54:26.144312+00:00", "EventTime": "2024-05-21T12:54:26.144335+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSPgb41IrDCbs7fRi"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "836243df-f88b-4788-8528-d95bc6e66f01", "DetectTime": "2024-05-21T12:54:26.148975+00:00", "EventTime": "2024-05-21T12:54:26.148995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIXI74tqXfVF6Tnx9"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "c20a17d5-6b47-4307-89b8-8bf20f49b8cd", "DetectTime": "2024-05-21T12:54:26.248534+00:00", "EventTime": "2024-05-21T12:54:26.248553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJaA72SUxHKqrNru8"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "5d6a36e2-7573-459a-80c9-755c4f458b2d", "DetectTime": "2024-05-21T12:54:26.260413+00:00", "EventTime": "2024-05-21T12:54:26.260434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrJZyIh7NoziJv2kl"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "666430c6-f465-45dc-9544-ac88113474dd", "DetectTime": "2024-05-21T12:54:26.368378+00:00", "EventTime": "2024-05-21T12:54:26.368400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfmJ8x1bgrGWqAQ499"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "72f34b5e-58ee-41b6-adad-a4ab3369f63f", "DetectTime": "2024-05-21T12:54:26.667784+00:00", "EventTime": "2024-05-21T12:54:26.667805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQiIdGyIE16cJxMod"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "db5da896-ae44-48f4-88f3-de0a2528964a", "DetectTime": "2024-05-21T12:54:26.735318+00:00", "EventTime": "2024-05-21T12:54:26.735341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjfI4x5cFcoAOwu1"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "d02820f3-0811-4617-8b2f-921888f5566e", "DetectTime": "2024-05-21T12:54:26.741587+00:00", "EventTime": "2024-05-21T12:54:26.741606+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CduymX1O1AWGvtCHgi"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "77f1ccf7-6b73-43ad-8710-539b1cf4704e", "DetectTime": "2024-05-21T12:54:26.749112+00:00", "EventTime": "2024-05-21T12:54:26.749134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMZaIiZkIa57HX8a5"], "accumulated_threat_level": 0.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "cba15052-c604-47bc-8827-3d2e1553a455", "DetectTime": "2024-05-21T12:54:26.791335+00:00", "EventTime": "2024-05-21T12:54:26.791355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch3xl9RKIyi8UGltl"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "98e4d417-49f2-41ca-bf16-4b7cccd4b19d", "DetectTime": "2024-05-21T12:54:26.896912+00:00", "EventTime": "2024-05-21T12:54:26.896935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7anlntxW9bFzB2Ye"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "f22c17da-4bba-4927-844d-662a6fa133ce", "DetectTime": "2024-05-21T12:54:26.901668+00:00", "EventTime": "2024-05-21T12:54:26.901687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmJmQC4vTl9ETZIwy4"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "2eda225e-5221-4d11-8973-93d7cc66b8b6", "DetectTime": "2024-05-21T12:54:27.334949+00:00", "EventTime": "2024-05-21T12:54:27.334971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQq5wq3HuIxjDqUQVg"], "accumulated_threat_level": 1.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "b2d60fe4-4c62-463b-83f9-f7402a104939", "DetectTime": "2024-05-21T12:54:27.398467+00:00", "EventTime": "2024-05-21T12:54:27.398493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDe8sF4SXRljI3Ckr3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 188} +{"Format": "IDEA0", "ID": "3cd5ab1b-07cd-4313-a039-26092d17b91e", "DetectTime": "2024-05-21T12:54:27.444210+00:00", "EventTime": "2024-05-21T12:54:27.444235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zZtU3WVz3dx4Nixl"], "accumulated_threat_level": 3.2, "timewindow": 188} +{"Format": "IDEA0", "ID": "6fdc879d-cd22-42e5-81b1-7490d674f012", "DetectTime": "2024-05-21T12:54:27.501601+00:00", "EventTime": "2024-05-21T12:54:27.501620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NJ0j3QpkjN0qknD6"], "accumulated_threat_level": 4.0, "timewindow": 188} +{"Format": "IDEA0", "ID": "741123d5-f8a8-4505-bb09-d633d5d0fc25", "DetectTime": "2024-05-21T12:54:27.775909+00:00", "EventTime": "2024-05-21T12:54:27.775931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE4NAI378vrUa7EU5b"], "accumulated_threat_level": 4.8, "timewindow": 188} +{"Format": "IDEA0", "ID": "a2a2e576-260d-486e-a753-d6ac96c2c3b3", "DetectTime": "2024-05-21T12:54:27.829534+00:00", "EventTime": "2024-05-21T12:54:27.829553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedarVvYvOfssUTQ2"], "accumulated_threat_level": 5.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "f7c2177b-76db-4005-90f1-06e17f61affc", "DetectTime": "2024-05-21T12:54:27.875171+00:00", "EventTime": "2024-05-21T12:54:27.875192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2kSl8jNoRACsREh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 188} +{"Format": "IDEA0", "ID": "ff6b0032-30de-43c8-a85f-85093d289a78", "DetectTime": "2024-05-21T12:54:27.918966+00:00", "EventTime": "2024-05-21T12:54:27.918987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 76.191.140.101 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzSzC2p3DNgPYO2g4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 188} +{"Format": "IDEA0", "ID": "1dc13f11-235b-45a0-8f1e-a0ce2024e8ae", "DetectTime": "2024-05-21T12:54:27.971629+00:00", "EventTime": "2024-05-21T12:54:27.971655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3YIa2fxdXJIlelxf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "2fed2f35-97aa-458b-be86-1012bdb28747", "DetectTime": "2024-05-21T12:54:28.026329+00:00", "EventTime": "2024-05-21T12:54:28.026350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RW8FbfSL60TRkH5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "00e22192-0c65-4d60-8813-f5178ff24142", "DetectTime": "2024-05-21T12:54:28.081853+00:00", "EventTime": "2024-05-21T12:54:28.081874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbEuQ2iUGZmdMmuV"], "accumulated_threat_level": 8.799999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "b98af3ae-a091-4751-a651-50397a3b1877", "DetectTime": "2024-05-21T12:54:28.344391+00:00", "EventTime": "2024-05-21T12:54:28.344411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMEtr2UnuZuRlw2p6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 188} +{"Format": "IDEA0", "ID": "7d33aa7c-e985-4e31-a15f-87e24dd396c7", "DetectTime": "2024-05-21T12:54:28.392977+00:00", "EventTime": "2024-05-21T12:54:28.392999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7NMau1fL3j3pWnXlj"], "accumulated_threat_level": 9.6, "timewindow": 188} +{"Format": "IDEA0", "ID": "61759b28-0fa2-4fd4-a5ee-fdc92bb0acf3", "DetectTime": "2024-05-21T12:54:28.447503+00:00", "EventTime": "2024-05-21T12:54:28.447522+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CneLVEx4ehL2CC2O8"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "cfdcd1bf-219b-465a-966e-063c83658987", "DetectTime": "2024-05-21T12:54:28.497821+00:00", "EventTime": "2024-05-21T12:54:28.497840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7n5uT2TqeIf8ZEACd"], "accumulated_threat_level": 1.3, "timewindow": 189} +{"Format": "IDEA0", "ID": "c27027eb-77b2-43fb-83c8-530d26465be0", "DetectTime": "2024-05-21T12:54:28.765778+00:00", "EventTime": "2024-05-21T12:54:28.765798+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7Uds3FXAuhnOmrh9"], "accumulated_threat_level": 2.1, "timewindow": 189} +{"Format": "IDEA0", "ID": "cd6e9a90-095f-4d7e-b746-299f072c2e5c", "DetectTime": "2024-05-21T12:54:28.838510+00:00", "EventTime": "2024-05-21T12:54:28.838529+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjOmWl1MafNDqu6d8"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 189} +{"Format": "IDEA0", "ID": "c65d50d2-ce20-4804-91ca-f65bb45c5b86", "DetectTime": "2024-05-21T12:54:29.105267+00:00", "EventTime": "2024-05-21T12:54:29.105294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD1SY1CNyp1R6aWO4"], "accumulated_threat_level": 3.7, "timewindow": 189} +{"Format": "IDEA0", "ID": "45c30d0d-1b7e-4590-9aad-412c0b531e6b", "DetectTime": "2024-05-21T12:54:29.155802+00:00", "EventTime": "2024-05-21T12:54:29.155821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQsD4r162ofeLJRNE5"], "accumulated_threat_level": 4.5, "timewindow": 189} +{"Format": "IDEA0", "ID": "d9e3cd08-b280-4a32-8af0-fe975d0d6fd3", "DetectTime": "2024-05-21T12:54:29.208253+00:00", "EventTime": "2024-05-21T12:54:29.208275+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ceznco5RKANdNzImh"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "938c74e1-047c-4979-b7be-f726775e79bb", "DetectTime": "2024-05-21T12:54:29.254881+00:00", "EventTime": "2024-05-21T12:54:29.254900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGG23EWkLXGLZ9PTd"], "accumulated_threat_level": 5.3, "timewindow": 189} +{"Format": "IDEA0", "ID": "d683b31a-1630-4213-b415-756326c65cd9", "DetectTime": "2024-05-21T12:54:29.302841+00:00", "EventTime": "2024-05-21T12:54:29.302860+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1TBy3pyBYOvGoP22"], "accumulated_threat_level": 6.1, "timewindow": 189} +{"Format": "IDEA0", "ID": "2b1036ea-baa3-46cb-853c-8e6b30fa0a38", "DetectTime": "2024-05-21T12:54:29.363714+00:00", "EventTime": "2024-05-21T12:54:29.363734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvfz11Vyzw2hip4z5"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 189} +{"Format": "IDEA0", "ID": "29449bf3-e759-4a1d-9eac-df4937ced33c", "DetectTime": "2024-05-21T12:54:29.414811+00:00", "EventTime": "2024-05-21T12:54:29.414832+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSD0u014E1ynLUqmFl"], "accumulated_threat_level": 7.699999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "72ad04dd-c220-40b7-a182-b54a777b1eb0", "DetectTime": "2024-05-21T12:54:29.682008+00:00", "EventTime": "2024-05-21T12:54:29.682027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETE5V2OeBa3Z20El"], "accumulated_threat_level": 8.5, "timewindow": 189} +{"Format": "IDEA0", "ID": "9676f69f-ff6e-4129-a240-2c56917fbcdc", "DetectTime": "2024-05-21T12:54:29.737340+00:00", "EventTime": "2024-05-21T12:54:29.737360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2v8rX6rxwEMguZ4"], "accumulated_threat_level": 9.3, "timewindow": 189} +{"Format": "IDEA0", "ID": "313a66b1-98f5-4661-9cdf-153daa74a285", "DetectTime": "2024-05-21T12:54:29.776090+00:00", "EventTime": "2024-05-21T12:54:29.776110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqre8146hBskJdYXAa"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "e67ba7ed-dfa9-4da9-aa73-fbc1c8dc36ca", "DetectTime": "2024-05-21T12:54:29.832963+00:00", "EventTime": "2024-05-21T12:54:29.832983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGItR13SkFO2V8U9oj"], "accumulated_threat_level": 10.100000000000001, "timewindow": 189} +{"Format": "IDEA0", "ID": "c8ca5804-3c31-47fb-bc84-0fe82a84270b", "DetectTime": "2024-05-21T12:54:29.882659+00:00", "EventTime": "2024-05-21T12:54:29.882679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHKg42jjKoNHhjF8e"], "accumulated_threat_level": 10.900000000000002, "timewindow": 189} +{"Format": "IDEA0", "ID": "de0be1ff-375d-4577-a7b2-bc87927fc8dc", "DetectTime": "2024-05-21T12:54:29.931597+00:00", "EventTime": "2024-05-21T12:54:29.931622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdTnoM1W152G3mDFk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 189} +{"Format": "IDEA0", "ID": "d9d31e58-5da8-4a4b-a843-e907a1f7f59d", "DetectTime": "2024-05-21T12:54:29.992293+00:00", "EventTime": "2024-05-21T12:54:29.992314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTEwU3X83yLcJmmbi"], "accumulated_threat_level": 12.500000000000004, "timewindow": 189} +{"Format": "Json", "ID": "d9d31e58-5da8-4a4b-a843-e907a1f7f59d", "DetectTime": "2024-05-21T12:54:29.992293+00:00", "EventTime": "2024-05-21T12:54:29.992314+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-08T20:29:25.425684+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2024/05/21 12:54:30.213173)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 189, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "2bdbc74a-5295-418b-ba1d-f13dbd3cfc1c", "DetectTime": "2024-05-21T12:54:30.275946+00:00", "EventTime": "2024-05-21T12:54:30.275969+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3uqqO1IbLngrCga7j"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "36fbba00-6c2e-44cc-84df-89f758d992b9", "DetectTime": "2024-05-21T12:54:30.326916+00:00", "EventTime": "2024-05-21T12:54:30.326936+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgHp52v3p956pvsT2"], "accumulated_threat_level": 0.8, "timewindow": 189} +{"Format": "IDEA0", "ID": "ed336684-7166-4c88-855c-906e5a34f3d6", "DetectTime": "2024-05-21T12:54:30.383795+00:00", "EventTime": "2024-05-21T12:54:30.383814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVEpx1EusbjSbMcF4"], "accumulated_threat_level": 1.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "325694c3-2743-4e10-8980-c2cb0d24f04b", "DetectTime": "2024-05-21T12:54:30.428119+00:00", "EventTime": "2024-05-21T12:54:30.428140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUQ4BJ19sEJxEOdSJc"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 189} +{"Format": "IDEA0", "ID": "0ad9f737-590a-4c65-b32d-62467345fb14", "DetectTime": "2024-05-21T12:54:30.486065+00:00", "EventTime": "2024-05-21T12:54:30.486085+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhA2n3RYkZom5MB0h"], "accumulated_threat_level": 3.2, "timewindow": 189} +{"Format": "IDEA0", "ID": "04b42296-ab83-4f55-a701-a6d7b317b889", "DetectTime": "2024-05-21T12:54:30.524273+00:00", "EventTime": "2024-05-21T12:54:30.524297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSxCeh2xSZwyUlEded"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "286b3de9-07a1-427b-bb96-9c50a3235699", "DetectTime": "2024-05-21T12:54:30.816965+00:00", "EventTime": "2024-05-21T12:54:30.816986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUxUk38B1Q4tX3h33"], "accumulated_threat_level": 4.0, "timewindow": 189} +{"Format": "IDEA0", "ID": "29c9e391-ed01-4e9c-adc5-a79bc39309c1", "DetectTime": "2024-05-21T12:54:30.869003+00:00", "EventTime": "2024-05-21T12:54:30.869023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXi80D9aVgoy9RSE1"], "accumulated_threat_level": 4.8, "timewindow": 189} +{"Format": "IDEA0", "ID": "53bdc294-99e0-4ac1-9c2e-bf4befac8d0a", "DetectTime": "2024-05-21T12:54:30.917631+00:00", "EventTime": "2024-05-21T12:54:30.917655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwD9o14q1AZyzGM2wd"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "40c71245-6baa-4942-ab31-5eec66828d03", "DetectTime": "2024-05-21T12:54:30.973522+00:00", "EventTime": "2024-05-21T12:54:30.973542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyx5wy4W6IwCgVE7ah"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 189} +{"Format": "IDEA0", "ID": "86ed760d-2219-47e4-a210-7992d89b8137", "DetectTime": "2024-05-21T12:54:31.029089+00:00", "EventTime": "2024-05-21T12:54:31.029107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzS9mc4pw3KvaDi9Q6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "e65f28ee-119f-4a45-b58a-de2ed191f20a", "DetectTime": "2024-05-21T12:54:31.087658+00:00", "EventTime": "2024-05-21T12:54:31.087687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZlixIB1IxfQWE42"], "accumulated_threat_level": 7.999999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "5222f4a0-43f0-4389-9ed4-ddc223ef0ba3", "DetectTime": "2024-05-21T12:54:31.134625+00:00", "EventTime": "2024-05-21T12:54:31.134643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgrUl14Jdaf4CF6Z1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "dd2658c2-ce18-4bff-93c5-6d22e78fa2c2", "DetectTime": "2024-05-21T12:54:31.194075+00:00", "EventTime": "2024-05-21T12:54:31.194095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU2o72KCYk1a9rgFb"], "accumulated_threat_level": 9.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "b1cf6929-8419-42a5-a9bb-d5079f5469ac", "DetectTime": "2024-05-21T12:54:31.430792+00:00", "EventTime": "2024-05-21T12:54:31.430816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGeBIN2qrxT0ygdqx4"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "1ee88d3b-48d9-4a6f-8bd2-3d4e78c15588", "DetectTime": "2024-05-21T12:54:31.491440+00:00", "EventTime": "2024-05-21T12:54:31.491461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92T3D3Dqifmodfdb4"], "accumulated_threat_level": 10.4, "timewindow": 189} +{"Format": "IDEA0", "ID": "2908ab48-c6c5-4881-966e-50ad223d765d", "DetectTime": "2024-05-21T12:54:31.743508+00:00", "EventTime": "2024-05-21T12:54:31.743527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWMJjTQZXzNlNHQk"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "4ef72067-34bd-404d-9c4a-b8d05ed8ca51", "DetectTime": "2024-05-21T12:54:31.806714+00:00", "EventTime": "2024-05-21T12:54:31.806732+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0XO3l1cCFjlC3DTt8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 189} +{"Format": "IDEA0", "ID": "5c9a1454-8f29-4a8a-b8bc-88a13780d37b", "DetectTime": "2024-05-21T12:54:31.849199+00:00", "EventTime": "2024-05-21T12:54:31.849217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUIaV27IVVzqmYhvb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 189} +{"Format": "Json", "ID": "5c9a1454-8f29-4a8a-b8bc-88a13780d37b", "DetectTime": "2024-05-21T12:54:31.849199+00:00", "EventTime": "2024-05-21T12:54:31.849217+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-08T21:00:03.889306+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2024/05/21 12:54:32.030164)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 189, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "07484321-c674-461a-b421-0c341d76c244", "DetectTime": "2024-05-21T12:54:32.045184+00:00", "EventTime": "2024-05-21T12:54:32.045210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRcRvx1p3WT7pOD8Sc"], "accumulated_threat_level": 0.8, "timewindow": 189} +{"Format": "IDEA0", "ID": "cf359ca4-81e5-4038-81ee-21a58134f583", "DetectTime": "2024-05-21T12:54:32.155972+00:00", "EventTime": "2024-05-21T12:54:32.155995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy3I8bVz7YnBT3Iyi"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "6220a08b-80ea-40d4-b4e0-2ffc7efbeb34", "DetectTime": "2024-05-21T12:54:32.201906+00:00", "EventTime": "2024-05-21T12:54:32.201927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjhlJ3O4IWa9mWgW3"], "accumulated_threat_level": 1.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "05bc0bab-fb4e-4b0d-abb8-0db6cda61e22", "DetectTime": "2024-05-21T12:54:32.257336+00:00", "EventTime": "2024-05-21T12:54:32.257357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmsno81RPS5JeQL3Se"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 189} +{"Format": "IDEA0", "ID": "b2b8d484-8edd-455f-b5d9-da35bca13508", "DetectTime": "2024-05-21T12:54:32.310355+00:00", "EventTime": "2024-05-21T12:54:32.310374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAn2P5psVueIy44xk"], "accumulated_threat_level": 3.2, "timewindow": 189} +{"Format": "IDEA0", "ID": "88e3b71e-38fa-4b06-a925-b2bfb8c2f22c", "DetectTime": "2024-05-21T12:54:32.364025+00:00", "EventTime": "2024-05-21T12:54:32.364057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvNM32sx3nZRGtpK3"], "accumulated_threat_level": 4.0, "timewindow": 189} +{"Format": "IDEA0", "ID": "9e63de7d-5c16-4624-a1a2-1d7c1cfa3b10", "DetectTime": "2024-05-21T12:54:32.415385+00:00", "EventTime": "2024-05-21T12:54:32.415415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxe2oYfk5WHdi4Gj"], "accumulated_threat_level": 4.8, "timewindow": 189} +{"Format": "IDEA0", "ID": "908b9c45-092c-4ac6-a2ad-cc67c7520b65", "DetectTime": "2024-05-21T12:54:32.684886+00:00", "EventTime": "2024-05-21T12:54:32.684908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAMCi3SkIDf372Fzj"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "7a3d431e-a578-40c4-83bb-8d11e0339719", "DetectTime": "2024-05-21T12:54:32.735578+00:00", "EventTime": "2024-05-21T12:54:32.735598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgB7q4K4GPiugLIse"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 189} +{"Format": "IDEA0", "ID": "6f916423-d33c-48d2-8bd6-49ee18514568", "DetectTime": "2024-05-21T12:54:32.783247+00:00", "EventTime": "2024-05-21T12:54:32.783266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqeC3j254lXaYObez2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "48f3883a-dbd8-4922-9299-4346f250902b", "DetectTime": "2024-05-21T12:54:32.833154+00:00", "EventTime": "2024-05-21T12:54:32.833174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CluMg53jkOwQclz291"], "accumulated_threat_level": 7.999999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "5883320d-a7ab-47ac-95ac-127d1ec646a1", "DetectTime": "2024-05-21T12:54:32.887052+00:00", "EventTime": "2024-05-21T12:54:32.887071+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fS8y4QwkylrV4e57"], "accumulated_threat_level": 8.799999999999999, "timewindow": 189} +{"Format": "IDEA0", "ID": "dbe2ab8f-c669-4423-b38d-79130a6d6db4", "DetectTime": "2024-05-21T12:54:32.943352+00:00", "EventTime": "2024-05-21T12:54:32.943375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktnrHrPzYToDTZ7a"], "accumulated_threat_level": 9.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "6fefb098-8f5a-4d4c-bec4-50941c14eca2", "DetectTime": "2024-05-21T12:54:33.109566+00:00", "EventTime": "2024-05-21T12:54:33.109585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4YaRQ2NTzU8fZHmCi"], "accumulated_threat_level": 10.4, "timewindow": 189} +{"Format": "IDEA0", "ID": "bf70dbfd-cc5c-4439-a7f3-2ffa1c181130", "DetectTime": "2024-05-21T12:54:33.144366+00:00", "EventTime": "2024-05-21T12:54:33.144390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGcBLVfyeyNu5MIJd"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "193728a8-50e0-4060-8533-00bcf2beaa62", "DetectTime": "2024-05-21T12:54:33.421237+00:00", "EventTime": "2024-05-21T12:54:33.421265+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFwxG44TF2zfzDOFp3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 189} +{"Format": "IDEA0", "ID": "4f4f0cbc-a9af-46b7-b5b7-bddc4270ff1b", "DetectTime": "2024-05-21T12:54:33.479486+00:00", "EventTime": "2024-05-21T12:54:33.479505+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGFuQEXl3ymCaTra"], "accumulated_threat_level": 12.000000000000002, "timewindow": 189} +{"Format": "Json", "ID": "4f4f0cbc-a9af-46b7-b5b7-bddc4270ff1b", "DetectTime": "2024-05-21T12:54:33.479486+00:00", "EventTime": "2024-05-21T12:54:33.479505+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-08T21:00:07.260934+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 189. (real time 2024/05/21 12:54:33.677178)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 189, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9c9fca03-cfe9-468f-8e44-dd78d7176097", "DetectTime": "2024-05-21T12:54:33.688257+00:00", "EventTime": "2024-05-21T12:54:33.688276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBeBpt4Rj2ReLYQ3hk"], "accumulated_threat_level": 0.8, "timewindow": 189} +{"Format": "IDEA0", "ID": "7749ef08-328c-444f-a774-e351ba99da8f", "DetectTime": "2024-05-21T12:54:33.708401+00:00", "EventTime": "2024-05-21T12:54:33.708419+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwohnn1vYddZq0Gkag"], "accumulated_threat_level": 1.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "88411203-85db-4c67-a64a-0a54391fc1b5", "DetectTime": "2024-05-21T12:54:33.720255+00:00", "EventTime": "2024-05-21T12:54:33.720274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrqaD2d4u9BXjZwFb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 189} +{"Format": "IDEA0", "ID": "92308923-b368-4cfe-8455-020ece2e6db1", "DetectTime": "2024-05-21T12:54:33.736964+00:00", "EventTime": "2024-05-21T12:54:33.736986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKrJJ1mBb327Z1ke3"], "accumulated_threat_level": 3.2, "timewindow": 189} +{"Format": "IDEA0", "ID": "1426c682-6dc5-46f3-bb8f-5d973e34f2c0", "DetectTime": "2024-05-21T12:54:33.934775+00:00", "EventTime": "2024-05-21T12:54:33.934804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKZj1G3N2xx9QSlBH"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "982ee272-88b8-40dd-b444-6e6dfbb6b59b", "DetectTime": "2024-05-21T12:54:33.984530+00:00", "EventTime": "2024-05-21T12:54:33.984549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFu3A92ShAdHa75Xx2"], "accumulated_threat_level": 4.0, "timewindow": 189} +{"Format": "IDEA0", "ID": "978cdc7d-6423-4ccf-8591-7e7be2063523", "DetectTime": "2024-05-21T12:54:34.033016+00:00", "EventTime": "2024-05-21T12:54:34.033037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71jMb1lvRZwkUQ7Bj"], "accumulated_threat_level": 4.8, "timewindow": 189} +{"Format": "IDEA0", "ID": "d891101c-c777-468f-b24e-3d7bbb6c6cca", "DetectTime": "2024-05-21T12:54:34.086200+00:00", "EventTime": "2024-05-21T12:54:34.086218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLcxr2IfT6dfMxlv6"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "ce636f18-fb28-47bf-bbbd-ededd15f4951", "DetectTime": "2024-05-21T12:54:34.150963+00:00", "EventTime": "2024-05-21T12:54:34.150985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7vap2n40fWAF9hh"], "accumulated_threat_level": 1.6, "timewindow": 190} +{"Format": "IDEA0", "ID": "6d7b00a0-72b4-4092-b623-90a7a7d7f34c", "DetectTime": "2024-05-21T12:54:34.203806+00:00", "EventTime": "2024-05-21T12:54:34.203824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyYHZ643htLOlTe3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 190} +{"Format": "IDEA0", "ID": "dae022b7-0bcb-4f0d-8301-4fc7e91771e5", "DetectTime": "2024-05-21T12:54:34.574587+00:00", "EventTime": "2024-05-21T12:54:34.574607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55Xg5sXZVuSnvSN1"], "accumulated_threat_level": 3.2, "timewindow": 190} +{"Format": "IDEA0", "ID": "a89f750a-43f1-441e-b1d3-c16aef5a219f", "DetectTime": "2024-05-21T12:54:34.649432+00:00", "EventTime": "2024-05-21T12:54:34.649450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1wsJRRiVM0iZtL97"], "accumulated_threat_level": 4.0, "timewindow": 190} +{"Format": "IDEA0", "ID": "a92baafd-0f9a-42dc-bd66-5775a4e998e2", "DetectTime": "2024-05-21T12:54:34.690582+00:00", "EventTime": "2024-05-21T12:54:34.690612+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14SHE1yuBZK1Hd5Wg"], "accumulated_threat_level": 4.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "f65b77c3-9d5f-44bb-ad2c-0e1d0deb613f", "DetectTime": "2024-05-21T12:54:34.755050+00:00", "EventTime": "2024-05-21T12:54:34.755070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iw5c4HhxvznyBPn4"], "accumulated_threat_level": 5.6, "timewindow": 190} +{"Format": "IDEA0", "ID": "60ca8294-fa8f-4b47-9ab2-9469b716b04f", "DetectTime": "2024-05-21T12:54:34.766119+00:00", "EventTime": "2024-05-21T12:54:34.766152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChtEMV17fbfohenB93", "C6nnE247bQwebDL4m5", "CfVYa8QspvujqHPf", "CCZyfyKN3iqvaSiUc"], "accumulated_threat_level": 0.5, "timewindow": 217} +{"Format": "IDEA0", "ID": "854daf99-b264-4d41-ac3b-6a42b5c9ded6", "DetectTime": "2024-05-21T12:54:34.771748+00:00", "EventTime": "2024-05-21T12:54:34.771770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiDHze4ay1BIvSV9di"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "1c18826b-fa6c-4a39-8a5b-79ac27e66432", "DetectTime": "2024-05-21T12:54:34.853368+00:00", "EventTime": "2024-05-21T12:54:34.853390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTiN53UjBbOjjnFpc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 190} +{"Format": "IDEA0", "ID": "d5a80d37-acef-4fb7-9222-260ae4c2dba6", "DetectTime": "2024-05-21T12:54:34.906199+00:00", "EventTime": "2024-05-21T12:54:34.906217+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy1w8394mTC3Jg1Zc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 190} +{"Format": "IDEA0", "ID": "b844274e-83f7-4c73-b1e5-15aecafab015", "DetectTime": "2024-05-21T12:54:35.194597+00:00", "EventTime": "2024-05-21T12:54:35.194621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3XxJ2ahBZbGhWzLg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 190} +{"Format": "IDEA0", "ID": "84c62df5-e302-4df2-a274-7b6eec648caf", "DetectTime": "2024-05-21T12:54:35.266894+00:00", "EventTime": "2024-05-21T12:54:35.266916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNRgA6CZI5tCQy3d"], "accumulated_threat_level": 8.799999999999999, "timewindow": 190} +{"Format": "IDEA0", "ID": "b5dcd516-93e8-4f87-9ebd-c152f50421ea", "DetectTime": "2024-05-21T12:54:35.305483+00:00", "EventTime": "2024-05-21T12:54:35.305503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA6h1y4HULtmvqy9t8"], "accumulated_threat_level": 9.6, "timewindow": 190} +{"Format": "IDEA0", "ID": "b4713dab-1dc7-4c1d-9232-7936f3e27c01", "DetectTime": "2024-05-21T12:54:35.359752+00:00", "EventTime": "2024-05-21T12:54:35.359771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12IiB1JiHzxTWqEI2"], "accumulated_threat_level": 10.4, "timewindow": 190} +{"Format": "IDEA0", "ID": "d7ccc911-bac9-4ba6-af65-3c86e5ebe2af", "DetectTime": "2024-05-21T12:54:35.412851+00:00", "EventTime": "2024-05-21T12:54:35.412869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2nQb4Xy87BaPn9of"], "accumulated_threat_level": 11.200000000000001, "timewindow": 190} +{"Format": "IDEA0", "ID": "2ba4a908-cbc9-4104-b44e-d03bdd564744", "DetectTime": "2024-05-21T12:54:35.466131+00:00", "EventTime": "2024-05-21T12:54:35.466150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CslGCkELOjHSTfW22"], "accumulated_threat_level": 12.000000000000002, "timewindow": 190} +{"Format": "Json", "ID": "2ba4a908-cbc9-4104-b44e-d03bdd564744", "DetectTime": "2024-05-21T12:54:35.466131+00:00", "EventTime": "2024-05-21T12:54:35.466150+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-08T21:30:43.698643+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 190. (real time 2024/05/21 12:54:35.832659)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 190, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "af229a09-3f9d-408d-ac1d-3758d40cf1c0", "DetectTime": "2024-05-21T12:54:35.845639+00:00", "EventTime": "2024-05-21T12:54:35.845659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06Zuo4qtnjFlEKNDg"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "72df5bb7-a5ce-41db-8eba-fd15b437c856", "DetectTime": "2024-05-21T12:54:35.855784+00:00", "EventTime": "2024-05-21T12:54:35.855801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXX7VR3vwzIWrxS9g9"], "accumulated_threat_level": 1.6, "timewindow": 190} +{"Format": "IDEA0", "ID": "6deb02df-9336-4108-bd6b-84899d97e81d", "DetectTime": "2024-05-21T12:54:35.902863+00:00", "EventTime": "2024-05-21T12:54:35.902882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpYi847WcyIAWrrYb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 190} +{"Format": "IDEA0", "ID": "3c218b2d-9053-496a-90af-62e57189bcdf", "DetectTime": "2024-05-21T12:54:35.907669+00:00", "EventTime": "2024-05-21T12:54:35.907686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzdlsJ1ngLhujN1xVe"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "68daf635-464a-4ebf-90e7-c638f6c9fe08", "DetectTime": "2024-05-21T12:54:36.098077+00:00", "EventTime": "2024-05-21T12:54:36.098095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj9O4qUZeAdKpOcG9"], "accumulated_threat_level": 3.2, "timewindow": 190} +{"Format": "IDEA0", "ID": "5fdc45e1-786b-49eb-9b9c-7a2a55e8f1df", "DetectTime": "2024-05-21T12:54:36.154828+00:00", "EventTime": "2024-05-21T12:54:36.154849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQh8E1ZVWT38WI2cd"], "accumulated_threat_level": 4.0, "timewindow": 190} +{"Format": "IDEA0", "ID": "bbf3c144-9ff5-4f68-bb02-a27badefd472", "DetectTime": "2024-05-21T12:54:36.206182+00:00", "EventTime": "2024-05-21T12:54:36.206202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEXY242BM5iRWdz7j"], "accumulated_threat_level": 4.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "7eb9083a-dbde-4b5b-a01e-b6ba7edb29b0", "DetectTime": "2024-05-21T12:54:36.476457+00:00", "EventTime": "2024-05-21T12:54:36.476476+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3XzuVj3lI4jRSVv2"], "accumulated_threat_level": 5.6, "timewindow": 190} +{"Format": "IDEA0", "ID": "49b0effb-a99c-44c6-8670-be6bb6aa323a", "DetectTime": "2024-05-21T12:54:36.521209+00:00", "EventTime": "2024-05-21T12:54:36.521231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywsPJ1Iyzb2ZbMGt8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 190} +{"Format": "IDEA0", "ID": "2b5e43f9-c7e0-4f32-b0b2-fa9d43d63b91", "DetectTime": "2024-05-21T12:54:36.573845+00:00", "EventTime": "2024-05-21T12:54:36.573866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIFuQG10MTGg48iZn9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 190} +{"Format": "IDEA0", "ID": "5334852a-879b-4de0-8760-6d403834d8ae", "DetectTime": "2024-05-21T12:54:36.622076+00:00", "EventTime": "2024-05-21T12:54:36.622095+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfPNSa32R6nqc35zl3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 190} +{"Format": "IDEA0", "ID": "205c0408-fb45-4829-bf07-c135f66332b5", "DetectTime": "2024-05-21T12:54:36.680179+00:00", "EventTime": "2024-05-21T12:54:36.680200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxtFDnz4MEt6T9k"], "accumulated_threat_level": 8.799999999999999, "timewindow": 190} +{"Format": "IDEA0", "ID": "8afc9965-1a98-4f40-b3ba-3207d2f47de3", "DetectTime": "2024-05-21T12:54:36.730339+00:00", "EventTime": "2024-05-21T12:54:36.730357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTqyxdKFvsrvhNXl"], "accumulated_threat_level": 9.6, "timewindow": 190} +{"Format": "IDEA0", "ID": "b99d32e3-5b4c-4cba-8edf-ec600720ac4c", "DetectTime": "2024-05-21T12:54:36.785892+00:00", "EventTime": "2024-05-21T12:54:36.785915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xDXZ3I5ebUzNCywc"], "accumulated_threat_level": 10.4, "timewindow": 190} +{"Format": "IDEA0", "ID": "b7701b18-c2c8-4fba-95be-cf9697127a06", "DetectTime": "2024-05-21T12:54:37.118349+00:00", "EventTime": "2024-05-21T12:54:37.118372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4WMyA1Itx4i2dG0e1"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "c561a6ee-62ce-4b6f-ba81-7b297200a660", "DetectTime": "2024-05-21T12:54:37.131761+00:00", "EventTime": "2024-05-21T12:54:37.131787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVN972s61pP1ITmp3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 190} +{"Format": "IDEA0", "ID": "bb3fac7c-e8b9-405f-8c2e-d806c10c5e10", "DetectTime": "2024-05-21T12:54:37.210641+00:00", "EventTime": "2024-05-21T12:54:37.210660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxg3up112rcWTE0yLc"], "accumulated_threat_level": 12.000000000000002, "timewindow": 190} +{"Format": "Json", "ID": "bb3fac7c-e8b9-405f-8c2e-d806c10c5e10", "DetectTime": "2024-05-21T12:54:37.210641+00:00", "EventTime": "2024-05-21T12:54:37.210660+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "1970-01-08T21:30:47.343529+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 190. (real time 2024/05/21 12:54:37.417751)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 190, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8ef293ab-df3a-4dc6-bd41-4b37f7eb2b14", "DetectTime": "2024-05-21T12:54:37.432376+00:00", "EventTime": "2024-05-21T12:54:37.432399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwNp62uyx1yCOqKX"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "82d4fd7b-69ca-441c-b73f-022501412551", "DetectTime": "2024-05-21T12:54:37.575317+00:00", "EventTime": "2024-05-21T12:54:37.575356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiukoK3RpugC1b14Ve"], "accumulated_threat_level": 0.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "e1fc41be-5079-4268-a8af-49a2256bc79a", "DetectTime": "2024-05-21T12:54:37.594060+00:00", "EventTime": "2024-05-21T12:54:37.594078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1EUh1S0ftTLAG6fg"], "accumulated_threat_level": 1.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "cf6c63ba-3398-4d15-96d6-5fb7302102e7", "DetectTime": "2024-05-21T12:54:37.720719+00:00", "EventTime": "2024-05-21T12:54:37.720748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPy9E1NZCoQy1VEU1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 191} +{"Format": "IDEA0", "ID": "d7ea0a65-b526-4671-b253-5ad06bb2619b", "DetectTime": "2024-05-21T12:54:37.771123+00:00", "EventTime": "2024-05-21T12:54:37.771143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyKww40DFWnvtyApc"], "accumulated_threat_level": 3.2, "timewindow": 191} +{"Format": "IDEA0", "ID": "585b5024-ba8b-4a13-96a4-fa7a9ea9037b", "DetectTime": "2024-05-21T12:54:37.822009+00:00", "EventTime": "2024-05-21T12:54:37.822027+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpLGYm4a0IamQg06Y1"], "accumulated_threat_level": 4.0, "timewindow": 191} +{"Format": "IDEA0", "ID": "73283333-5878-40e9-af63-13b0326cd6bf", "DetectTime": "2024-05-21T12:54:37.860603+00:00", "EventTime": "2024-05-21T12:54:37.860624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIKG7IYrVFxNEeMR1"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "5750c74b-e913-4a52-b22c-88a025f20c82", "DetectTime": "2024-05-21T12:54:37.909468+00:00", "EventTime": "2024-05-21T12:54:37.909504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX9S5x3msGRWEwnXqd"], "accumulated_threat_level": 4.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "e657b968-110e-4e29-aa45-ec45857932e8", "DetectTime": "2024-05-21T12:54:37.960751+00:00", "EventTime": "2024-05-21T12:54:37.960789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPwkOY2BZQZN9zNfD9"], "accumulated_threat_level": 5.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "d73d0489-a85d-4d9e-bd00-986f141e666e", "DetectTime": "2024-05-21T12:54:38.019938+00:00", "EventTime": "2024-05-21T12:54:38.019956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0l8bmZSJpu46kzrl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 191} +{"Format": "IDEA0", "ID": "53b4428d-789d-46e6-bb04-43e6f502de8d", "DetectTime": "2024-05-21T12:54:38.068440+00:00", "EventTime": "2024-05-21T12:54:38.068459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1wDCq1HWTivlsNVN3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "f8f5c45f-532e-4795-95d3-2205c95cd16f", "DetectTime": "2024-05-21T12:54:38.351475+00:00", "EventTime": "2024-05-21T12:54:38.351493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKBLo4b1nahuTAfck"], "accumulated_threat_level": 7.999999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "851063c8-7fff-47b8-877f-1d5d03d9708d", "DetectTime": "2024-05-21T12:54:38.395227+00:00", "EventTime": "2024-05-21T12:54:38.395244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ0bYs4duO4kUsDCva"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "d00ba5e6-5101-4390-868e-b920dd4deedc", "DetectTime": "2024-05-21T12:54:38.449001+00:00", "EventTime": "2024-05-21T12:54:38.449020+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqDhN1edXuHg3Ragg"], "accumulated_threat_level": 9.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "1397b678-d805-4960-9a0e-74f0f59cc0b4", "DetectTime": "2024-05-21T12:54:38.503086+00:00", "EventTime": "2024-05-21T12:54:38.503104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2gswo1oeLs4AcV3je"], "accumulated_threat_level": 10.4, "timewindow": 191} +{"Format": "IDEA0", "ID": "d8a293dc-ea9c-4641-85fe-d8e946139959", "DetectTime": "2024-05-21T12:54:38.555169+00:00", "EventTime": "2024-05-21T12:54:38.555189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbn7qrdPWWPZXgl1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 191} +{"Format": "IDEA0", "ID": "00d66295-5534-42fd-bbd7-ac4ddfdff89d", "DetectTime": "2024-05-21T12:54:38.613206+00:00", "EventTime": "2024-05-21T12:54:38.613236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFdUyG87uuhE14Gi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 191} +{"Format": "Json", "ID": "00d66295-5534-42fd-bbd7-ac4ddfdff89d", "DetectTime": "2024-05-21T12:54:38.613206+00:00", "EventTime": "2024-05-21T12:54:38.613236+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-08T22:01:10.488164+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2024/05/21 12:54:38.787037)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 191, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d45ed707-8ff9-4d1f-9f9c-504e523963fc", "DetectTime": "2024-05-21T12:54:38.897803+00:00", "EventTime": "2024-05-21T12:54:38.897823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pkd71aXnyc59IxR7"], "accumulated_threat_level": 0.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "1e3a8463-e47a-49cb-98f3-368442fbced6", "DetectTime": "2024-05-21T12:54:38.955090+00:00", "EventTime": "2024-05-21T12:54:38.955108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXx9hOi1bh20LdX7"], "accumulated_threat_level": 1.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "dfbf045e-562c-4353-aea4-b450aa7e4745", "DetectTime": "2024-05-21T12:54:39.001252+00:00", "EventTime": "2024-05-21T12:54:39.001270+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxl0Sb3cD59kOdpZMl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 191} +{"Format": "IDEA0", "ID": "e1240b56-190b-406e-a40b-ca082ff11673", "DetectTime": "2024-05-21T12:54:39.055428+00:00", "EventTime": "2024-05-21T12:54:39.055448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgPcL2GtICs32H9Oj"], "accumulated_threat_level": 3.2, "timewindow": 191} +{"Format": "IDEA0", "ID": "9cebbc32-ecd3-4c74-8294-15a6b085864b", "DetectTime": "2024-05-21T12:54:39.088204+00:00", "EventTime": "2024-05-21T12:54:39.088223+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["24.151.56.116"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. AS: CHARTER-20115, US AS20115 rDNS: syn-024-151-056-116.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCEG42kb3Qj9YKlwb"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "e2ce2f6e-5270-4bec-be94-d79793cd67d8", "DetectTime": "2024-05-21T12:54:39.101369+00:00", "EventTime": "2024-05-21T12:54:39.101387+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["24.151.56.116"]}], "Attach": [{"Content": "connection to blacklisted IP: 24.151.56.116 from 10.0.2.19. AS: CHARTER-20115, US AS20115 rDNS: syn-024-151-056-116.res.spectrum.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCEG42kb3Qj9YKlwb"], "accumulated_threat_level": 10.600000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "39952417-29df-42d7-9877-21d12a0bed0f", "DetectTime": "2024-05-21T12:54:39.106054+00:00", "EventTime": "2024-05-21T12:54:39.106072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGMi6T3JW6tl5pWgIi"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "815f31ce-cb24-4a21-9530-f53a31d9d50e", "DetectTime": "2024-05-21T12:54:39.145004+00:00", "EventTime": "2024-05-21T12:54:39.145024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChOM4N1bzHAYuFt5eg"], "accumulated_threat_level": 4.0, "timewindow": 191} +{"Format": "IDEA0", "ID": "7aba7eed-91ef-4a12-9bed-ce2b52755bdc", "DetectTime": "2024-05-21T12:54:39.436763+00:00", "EventTime": "2024-05-21T12:54:39.436784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKbDrzQIJlHDd0Va"], "accumulated_threat_level": 4.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "46d2b8b9-1904-402e-8386-814fd2985bd6", "DetectTime": "2024-05-21T12:54:39.489489+00:00", "EventTime": "2024-05-21T12:54:39.489510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwaUa1Y1u0MJ98lP5"], "accumulated_threat_level": 5.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "995b4690-068d-40f9-b15c-e869eb38c6e3", "DetectTime": "2024-05-21T12:54:39.547029+00:00", "EventTime": "2024-05-21T12:54:39.547048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDaRBpCOwzYILIuY2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 191} +{"Format": "IDEA0", "ID": "675097ab-d1aa-4bd2-b443-99f035aa5c88", "DetectTime": "2024-05-21T12:54:39.596656+00:00", "EventTime": "2024-05-21T12:54:39.596676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZm2kG3YJx6bUxmqyf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "b42b8dd7-4b9e-4082-8d24-50f2c5875669", "DetectTime": "2024-05-21T12:54:39.651536+00:00", "EventTime": "2024-05-21T12:54:39.651556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Hb6N2UAaBBo4icd8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "a216a9e0-10d8-4d24-a2b2-7c47ac352276", "DetectTime": "2024-05-21T12:54:39.702458+00:00", "EventTime": "2024-05-21T12:54:39.702494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UndXOtQC1UUL0u3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "6f4843a3-5287-4b73-8c11-981737dfa1e8", "DetectTime": "2024-05-21T12:54:39.758251+00:00", "EventTime": "2024-05-21T12:54:39.758281+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyfTk2l9etQ6kpKr3"], "accumulated_threat_level": 9.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "6a3af99b-0f49-4dc3-b899-cff6fa43724d", "DetectTime": "2024-05-21T12:54:39.808581+00:00", "EventTime": "2024-05-21T12:54:39.808628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYrbI1xX63ZZSMnW5"], "accumulated_threat_level": 10.4, "timewindow": 191} +{"Format": "IDEA0", "ID": "db225b96-852c-488b-8cb1-627de00cdee0", "DetectTime": "2024-05-21T12:54:40.098790+00:00", "EventTime": "2024-05-21T12:54:40.098824+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRHtUTqKrWzWmdF1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 191} +{"Format": "IDEA0", "ID": "a9f192f1-6e30-4df8-a8f4-c028b113aef5", "DetectTime": "2024-05-21T12:54:40.174230+00:00", "EventTime": "2024-05-21T12:54:40.174264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbb32fEMIsIk8Ddqh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 191} +{"Format": "Json", "ID": "a9f192f1-6e30-4df8-a8f4-c028b113aef5", "DetectTime": "2024-05-21T12:54:40.174230+00:00", "EventTime": "2024-05-21T12:54:40.174264+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "1970-01-08T22:31:39.430182+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2024/05/21 12:54:40.357894)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 191, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "fbbe90a2-27e0-45d7-b9b9-5fdc749737db", "DetectTime": "2024-05-21T12:54:40.369731+00:00", "EventTime": "2024-05-21T12:54:40.369749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRyun13COLrK4hcigh"], "accumulated_threat_level": 0.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "09ac98a7-6456-4d48-8969-ef48e524aaeb", "DetectTime": "2024-05-21T12:54:40.374779+00:00", "EventTime": "2024-05-21T12:54:40.374797+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9c11c3Ph7NWpGgoZd"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "b28a86aa-1443-4a06-b85c-1797735c046b", "DetectTime": "2024-05-21T12:54:40.386325+00:00", "EventTime": "2024-05-21T12:54:40.386345+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3QMum2l4thcdBqnE7"], "accumulated_threat_level": 1.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "87a3ba1a-cb8d-4858-ac49-4b35edc1c952", "DetectTime": "2024-05-21T12:54:40.399366+00:00", "EventTime": "2024-05-21T12:54:40.399387+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNu9c28PATwxYEjab"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 191} +{"Format": "IDEA0", "ID": "6c37f2fb-3992-4403-8ae9-b67723ad30cd", "DetectTime": "2024-05-21T12:54:40.655676+00:00", "EventTime": "2024-05-21T12:54:40.655697+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9yK4Kpa9f9ssdrH"], "accumulated_threat_level": 3.2, "timewindow": 191} +{"Format": "IDEA0", "ID": "068aad45-858a-4e8a-9f7e-e2cde1d3fa1a", "DetectTime": "2024-05-21T12:54:40.709069+00:00", "EventTime": "2024-05-21T12:54:40.709090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xk2B39EcoUPqn2tb"], "accumulated_threat_level": 4.0, "timewindow": 191} +{"Format": "IDEA0", "ID": "70235398-d881-4486-beec-4d1b0f1e4447", "DetectTime": "2024-05-21T12:54:40.880501+00:00", "EventTime": "2024-05-21T12:54:40.880524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrwUM54pXpLLzIMiN9"], "accumulated_threat_level": 4.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "9dc57162-083b-4688-9794-a5d84a4fccf5", "DetectTime": "2024-05-21T12:54:40.905134+00:00", "EventTime": "2024-05-21T12:54:40.905152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpT1g4CUkq7hS3gy2"], "accumulated_threat_level": 5.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "36061c34-97a3-4b42-8a5e-db96bde30e3e", "DetectTime": "2024-05-21T12:54:40.958621+00:00", "EventTime": "2024-05-21T12:54:40.958641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caiigg3Swa9qW0P9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 191} +{"Format": "IDEA0", "ID": "4c7411cd-f74c-4aba-89d7-d4f02892a719", "DetectTime": "2024-05-21T12:54:41.013374+00:00", "EventTime": "2024-05-21T12:54:41.013393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbjs1x3McKxIijFqtl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "6dfecb66-d3ec-4b77-bb88-c12ce1e8f52c", "DetectTime": "2024-05-21T12:54:41.282647+00:00", "EventTime": "2024-05-21T12:54:41.282667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu7PYI149dH4aZpXg7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "29dd63a6-1d18-4a6d-b060-65ac32072f6d", "DetectTime": "2024-05-21T12:54:41.337874+00:00", "EventTime": "2024-05-21T12:54:41.337892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHst52Afm7VQYhfth"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "761a41cb-1494-49c2-ab79-c04875408a1b", "DetectTime": "2024-05-21T12:54:41.399012+00:00", "EventTime": "2024-05-21T12:54:41.399034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrqBQ3FqvYJejBLX4"], "accumulated_threat_level": 9.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "ef27ef73-4631-4109-9d83-d941104a3b16", "DetectTime": "2024-05-21T12:54:41.429468+00:00", "EventTime": "2024-05-21T12:54:41.429486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COLwd42oRhbOgrPIoa"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "4f39751e-190c-4a56-bb87-96a614761c79", "DetectTime": "2024-05-21T12:54:41.490745+00:00", "EventTime": "2024-05-21T12:54:41.490764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZx1XlFNPBsIRmlph"], "accumulated_threat_level": 10.4, "timewindow": 191} +{"Format": "IDEA0", "ID": "f3e66e6c-2aa8-4a64-9ec5-5e68f7a506cb", "DetectTime": "2024-05-21T12:54:41.542532+00:00", "EventTime": "2024-05-21T12:54:41.542555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIRy513CNWyfg2Zuh2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 191} +{"Format": "IDEA0", "ID": "aad3781a-729a-4f83-8ba8-1d9b70fe5140", "DetectTime": "2024-05-21T12:54:41.593850+00:00", "EventTime": "2024-05-21T12:54:41.593868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUwep4Kku2E8uvtma"], "accumulated_threat_level": 12.000000000000002, "timewindow": 191} +{"Format": "Json", "ID": "aad3781a-729a-4f83-8ba8-1d9b70fe5140", "DetectTime": "2024-05-21T12:54:41.593850+00:00", "EventTime": "2024-05-21T12:54:41.593868+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-08T22:31:42.637063+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 191. (real time 2024/05/21 12:54:41.797411)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 191, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ba2bce9b-9742-47e3-b036-298fcd61890a", "DetectTime": "2024-05-21T12:54:41.867243+00:00", "EventTime": "2024-05-21T12:54:41.867279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCSXyEnD7srW3vTrk"], "accumulated_threat_level": 0.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "313266f4-dce9-42db-8205-bcf3aaeb52ba", "DetectTime": "2024-05-21T12:54:41.915320+00:00", "EventTime": "2024-05-21T12:54:41.915353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cczap21kmeVp0NS7q9"], "accumulated_threat_level": 1.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "ce5fb06d-d233-4571-8d10-38dd5402dd83", "DetectTime": "2024-05-21T12:54:41.965471+00:00", "EventTime": "2024-05-21T12:54:41.965504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyP6av1fd23m6o1Cmj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 191} +{"Format": "IDEA0", "ID": "bf738113-de15-433e-85a5-ac339c3a9389", "DetectTime": "2024-05-21T12:54:42.019172+00:00", "EventTime": "2024-05-21T12:54:42.019204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllIji3c7EzlWJfk32"], "accumulated_threat_level": 3.2, "timewindow": 191} +{"Format": "IDEA0", "ID": "f10e6886-e993-4fb8-96ea-302749236504", "DetectTime": "2024-05-21T12:54:42.072123+00:00", "EventTime": "2024-05-21T12:54:42.072159+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZa4hk32aqmzCqV8b2"], "accumulated_threat_level": 4.0, "timewindow": 191} +{"Format": "IDEA0", "ID": "eaa8ce39-d148-4be7-9ce7-2b2e0c559898", "DetectTime": "2024-05-21T12:54:42.124611+00:00", "EventTime": "2024-05-21T12:54:42.124647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMcTQ2Q3mFo5p5Jma"], "accumulated_threat_level": 4.8, "timewindow": 191} +{"Format": "IDEA0", "ID": "53521494-133a-4f6e-9723-53e364ad71e4", "DetectTime": "2024-05-21T12:54:42.459619+00:00", "EventTime": "2024-05-21T12:54:42.459641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDe8sF4SXRljI3Ckr3"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "1bb044e3-098f-4ee4-bf32-3848f06890a2", "DetectTime": "2024-05-21T12:54:42.464746+00:00", "EventTime": "2024-05-21T12:54:42.464767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch3xl9RKIyi8UGltl"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "8b1ba401-6451-49ed-8f03-b31ec8718157", "DetectTime": "2024-05-21T12:54:42.578510+00:00", "EventTime": "2024-05-21T12:54:42.578532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQjNQd0tazKNsRd6"], "accumulated_threat_level": 5.6, "timewindow": 191} +{"Format": "IDEA0", "ID": "9f2708a8-c196-420c-8f5e-a8a9941edb70", "DetectTime": "2024-05-21T12:54:42.586830+00:00", "EventTime": "2024-05-21T12:54:42.586850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zZtU3WVz3dx4Nixl"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "9adfd3c0-f5cd-4961-8f4b-6165cd0483f5", "DetectTime": "2024-05-21T12:54:42.634446+00:00", "EventTime": "2024-05-21T12:54:42.634466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF667q1ajgDVOBy1di"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 191} +{"Format": "IDEA0", "ID": "3236782a-c759-4479-96a0-a6a0c6c5d6c4", "DetectTime": "2024-05-21T12:54:42.692818+00:00", "EventTime": "2024-05-21T12:54:42.692842+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrFLCuYmu2dRiLce"], "accumulated_threat_level": 7.199999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "ff35d3fb-3c22-4d9c-b743-755b33d426dd", "DetectTime": "2024-05-21T12:54:42.746247+00:00", "EventTime": "2024-05-21T12:54:42.746268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM10Gi2kNmwxEkLaYa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "408dc0e6-e74a-4c7a-bbcf-4ecaf454bfeb", "DetectTime": "2024-05-21T12:54:43.121223+00:00", "EventTime": "2024-05-21T12:54:43.121246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2kSl8jNoRACsREh"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "6e010335-52a4-4496-befe-7c9ee3f568de", "DetectTime": "2024-05-21T12:54:43.165788+00:00", "EventTime": "2024-05-21T12:54:43.165810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0NJ0j3QpkjN0qknD6"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "658a960f-211c-46b3-9efc-aa5e4bf240ce", "DetectTime": "2024-05-21T12:54:43.209974+00:00", "EventTime": "2024-05-21T12:54:43.210002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CedarVvYvOfssUTQ2"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "1d91d021-f445-4f67-b39e-708b8a8b87be", "DetectTime": "2024-05-21T12:54:43.215462+00:00", "EventTime": "2024-05-21T12:54:43.215484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3YIa2fxdXJIlelxf"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "0b4a9a86-69f3-4f40-8560-d8ba1f60005c", "DetectTime": "2024-05-21T12:54:43.252815+00:00", "EventTime": "2024-05-21T12:54:43.252836+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE4NAI378vrUa7EU5b"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "a7ff461c-1413-44ff-be0f-3a648ade9902", "DetectTime": "2024-05-21T12:54:43.257789+00:00", "EventTime": "2024-05-21T12:54:43.257809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5RW8FbfSL60TRkH5"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "87a2947c-7daf-46d6-9442-7887dd845f6e", "DetectTime": "2024-05-21T12:54:43.273338+00:00", "EventTime": "2024-05-21T12:54:43.273375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IeNW2BU6J8rLRyYh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "efa2b216-b282-41c4-b3fe-ab0a3ad5c670", "DetectTime": "2024-05-21T12:54:43.813362+00:00", "EventTime": "2024-05-21T12:54:43.813384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CneLVEx4ehL2CC2O8"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "c9ffe505-6531-4583-9cca-e39735bf0f0a", "DetectTime": "2024-05-21T12:54:43.820761+00:00", "EventTime": "2024-05-21T12:54:43.820780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7NMau1fL3j3pWnXlj"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "d9baebdb-c8b0-44c9-9e9c-40df0a704d3b", "DetectTime": "2024-05-21T12:54:43.844579+00:00", "EventTime": "2024-05-21T12:54:43.844600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZbEuQ2iUGZmdMmuV"], "accumulated_threat_level": 10.4, "timewindow": 188} +{"Format": "IDEA0", "ID": "d49d6842-b07b-48d9-b607-2ef72ecbb042", "DetectTime": "2024-05-21T12:54:43.986820+00:00", "EventTime": "2024-05-21T12:54:43.986843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7n5uT2TqeIf8ZEACd"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "82edbd68-f1ad-4a7d-8833-f0b49cfd294b", "DetectTime": "2024-05-21T12:54:44.036976+00:00", "EventTime": "2024-05-21T12:54:44.037001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH7Uds3FXAuhnOmrh9"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "55522b0b-9f04-4cea-877c-ecfd8d8c9fbb", "DetectTime": "2024-05-21T12:54:44.042573+00:00", "EventTime": "2024-05-21T12:54:44.042593+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXNpF44LiYgVPEDGG1"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "f60ccee9-7c6d-4a93-8fa0-057f603d988c", "DetectTime": "2024-05-21T12:54:44.406720+00:00", "EventTime": "2024-05-21T12:54:44.406755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM28qi1CV3jH0zMxq7"], "accumulated_threat_level": 0.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "83bf3ffe-db26-410d-8eb3-6ed0d552bc55", "DetectTime": "2024-05-21T12:54:44.412241+00:00", "EventTime": "2024-05-21T12:54:44.412260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGG23EWkLXGLZ9PTd"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "b534b2ea-7d08-4ec9-b8f2-d8ca55b03f4b", "DetectTime": "2024-05-21T12:54:44.419256+00:00", "EventTime": "2024-05-21T12:54:44.419274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP1TBy3pyBYOvGoP22"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "75db226c-9c68-48b3-8288-d3b6ca008e6b", "DetectTime": "2024-05-21T12:54:44.434333+00:00", "EventTime": "2024-05-21T12:54:44.434356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQsD4r162ofeLJRNE5"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "aabfa132-3384-4b11-851b-8c8314e02771", "DetectTime": "2024-05-21T12:54:44.439728+00:00", "EventTime": "2024-05-21T12:54:44.439749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLD1SY1CNyp1R6aWO4"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "e4614f21-d02f-43df-b59d-b3cadb21340a", "DetectTime": "2024-05-21T12:54:44.451770+00:00", "EventTime": "2024-05-21T12:54:44.451792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjOmWl1MafNDqu6d8"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "60c6cd0d-f854-4da0-9a64-e93d899a45b7", "DetectTime": "2024-05-21T12:54:44.461350+00:00", "EventTime": "2024-05-21T12:54:44.461370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0LUME1sL2YmHrDmyc"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "b6a49fe3-7299-43be-9c5e-7554ce6fcc55", "DetectTime": "2024-05-21T12:54:44.924531+00:00", "EventTime": "2024-05-21T12:54:44.924553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXvfz11Vyzw2hip4z5"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "38d6013d-75c4-48d1-be42-8874047781e6", "DetectTime": "2024-05-21T12:54:45.058293+00:00", "EventTime": "2024-05-21T12:54:45.058314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGItR13SkFO2V8U9oj"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "d1326923-b510-419e-b6bd-66893f39cc23", "DetectTime": "2024-05-21T12:54:45.100377+00:00", "EventTime": "2024-05-21T12:54:45.100399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr2v8rX6rxwEMguZ4"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "6a8245aa-bdf6-4d5d-8246-48b2803cdeda", "DetectTime": "2024-05-21T12:54:45.126277+00:00", "EventTime": "2024-05-21T12:54:45.126298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETE5V2OeBa3Z20El"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "60877681-97a4-49a4-bd75-65e31e9e2bfe", "DetectTime": "2024-05-21T12:54:45.263054+00:00", "EventTime": "2024-05-21T12:54:45.263076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMHKg42jjKoNHhjF8e"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "5b0f4a52-b2a5-46e7-a81e-d101925390ec", "DetectTime": "2024-05-21T12:54:45.267939+00:00", "EventTime": "2024-05-21T12:54:45.267960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdTnoM1W152G3mDFk"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "b835d04c-9693-494b-a99b-53232c4eb763", "DetectTime": "2024-05-21T12:54:45.572654+00:00", "EventTime": "2024-05-21T12:54:45.572678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSD0u014E1ynLUqmFl"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "e8583db6-efb5-4c0b-9022-8b24b24d21ba", "DetectTime": "2024-05-21T12:54:45.638611+00:00", "EventTime": "2024-05-21T12:54:45.638629+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCBB21SdyhE2ACpvj"], "accumulated_threat_level": 1.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "7342e2be-90ef-4e17-b038-47896328041a", "DetectTime": "2024-05-21T12:54:45.716990+00:00", "EventTime": "2024-05-21T12:54:45.717011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxTEwU3X83yLcJmmbi"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "98036ab7-166f-4e81-9b8e-dc7183333dc4", "DetectTime": "2024-05-21T12:54:45.754253+00:00", "EventTime": "2024-05-21T12:54:45.754276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUQ4BJ19sEJxEOdSJc"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "29c569c3-4dec-48cd-93e4-69db309a706f", "DetectTime": "2024-05-21T12:54:45.760879+00:00", "EventTime": "2024-05-21T12:54:45.760898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhA2n3RYkZom5MB0h"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "6bd86a0b-2ea3-4409-a57f-8cebad8e6a14", "DetectTime": "2024-05-21T12:54:45.765637+00:00", "EventTime": "2024-05-21T12:54:45.765656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqgHp52v3p956pvsT2"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "4815812c-3597-48e5-a702-6c902af44928", "DetectTime": "2024-05-21T12:54:45.790984+00:00", "EventTime": "2024-05-21T12:54:45.791009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsVEpx1EusbjSbMcF4"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "5ad781ac-8338-44df-a5ae-1ee2c104cf3c", "DetectTime": "2024-05-21T12:54:46.241905+00:00", "EventTime": "2024-05-21T12:54:46.241924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwIo4yqBvkhKmaTa2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 192} +{"Format": "IDEA0", "ID": "8def5fe0-e577-41e6-8ee0-67165eea6de0", "DetectTime": "2024-05-21T12:54:46.300031+00:00", "EventTime": "2024-05-21T12:54:46.300052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXi80D9aVgoy9RSE1"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "a9e50052-27d4-4985-90c4-d00e885be72f", "DetectTime": "2024-05-21T12:54:46.306756+00:00", "EventTime": "2024-05-21T12:54:46.306779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyx5wy4W6IwCgVE7ah"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "4c222d23-3541-4b83-9f4c-ba0e80bcb0ef", "DetectTime": "2024-05-21T12:54:46.353805+00:00", "EventTime": "2024-05-21T12:54:46.353828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwD9o14q1AZyzGM2wd"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "842e9963-c32f-408a-a85b-9f4d2dbecc91", "DetectTime": "2024-05-21T12:54:46.363977+00:00", "EventTime": "2024-05-21T12:54:46.363998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYgrUl14Jdaf4CF6Z1"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "e4c20efc-aff2-467a-9fc4-1ad202e75418", "DetectTime": "2024-05-21T12:54:46.451934+00:00", "EventTime": "2024-05-21T12:54:46.451957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGUxUk38B1Q4tX3h33"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "0cd8f422-adef-4877-abc2-352e38d4ea39", "DetectTime": "2024-05-21T12:54:46.619467+00:00", "EventTime": "2024-05-21T12:54:46.619488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzS9mc4pw3KvaDi9Q6"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "e7a685c3-4bce-41b3-a96f-89d552181ddc", "DetectTime": "2024-05-21T12:54:46.886176+00:00", "EventTime": "2024-05-21T12:54:46.886198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiZlixIB1IxfQWE42"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "2a212394-8042-4ddd-84e0-27b8f8371a6f", "DetectTime": "2024-05-21T12:54:46.926876+00:00", "EventTime": "2024-05-21T12:54:46.926896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvcHM1Hm8mmHBSgS2"], "accumulated_threat_level": 3.2, "timewindow": 192} +{"Format": "IDEA0", "ID": "925eaa03-3c24-4ae8-b3cf-899d64152734", "DetectTime": "2024-05-21T12:54:47.090547+00:00", "EventTime": "2024-05-21T12:54:47.090570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClU2o72KCYk1a9rgFb"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "80b04615-e61c-43af-a3fa-2554bfba3f6b", "DetectTime": "2024-05-21T12:54:47.156057+00:00", "EventTime": "2024-05-21T12:54:47.156079+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0XO3l1cCFjlC3DTt8"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "681efa4d-21e8-418f-b54f-e38347a43fb1", "DetectTime": "2024-05-21T12:54:47.161208+00:00", "EventTime": "2024-05-21T12:54:47.161229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C92T3D3Dqifmodfdb4"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "aebe9f2a-125a-49cc-94e9-51c10ecd4048", "DetectTime": "2024-05-21T12:54:47.166103+00:00", "EventTime": "2024-05-21T12:54:47.166121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRUIaV27IVVzqmYhvb"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "d00d7a19-64c0-4d1a-8f34-ef391af39c50", "DetectTime": "2024-05-21T12:54:47.244818+00:00", "EventTime": "2024-05-21T12:54:47.244839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.42.113.147 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CquP2wicFTm2tt5vf"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "8a414164-60d8-4ff1-99a1-733262752856", "DetectTime": "2024-05-21T12:54:47.662103+00:00", "EventTime": "2024-05-21T12:54:47.662124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClWMJjTQZXzNlNHQk"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "7b7e2c60-216c-41de-8fd7-de8f925b324d", "DetectTime": "2024-05-21T12:54:47.667348+00:00", "EventTime": "2024-05-21T12:54:47.667368+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRcRvx1p3WT7pOD8Sc"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "8b44bc5f-290b-4034-bac4-60f80715522c", "DetectTime": "2024-05-21T12:54:47.731558+00:00", "EventTime": "2024-05-21T12:54:47.731580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmnGG3JSyBNBS47Nj"], "accumulated_threat_level": 4.0, "timewindow": 192} +{"Format": "IDEA0", "ID": "418723b1-a7ad-4d59-aaf9-eddeb099304c", "DetectTime": "2024-05-21T12:54:47.736537+00:00", "EventTime": "2024-05-21T12:54:47.736556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmsno81RPS5JeQL3Se"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "9054b7ee-95db-4006-a78e-91bb13cd26e7", "DetectTime": "2024-05-21T12:54:47.741001+00:00", "EventTime": "2024-05-21T12:54:47.741019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAn2P5psVueIy44xk"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "5af649de-0b31-42f7-b2ce-83790657772e", "DetectTime": "2024-05-21T12:54:47.775811+00:00", "EventTime": "2024-05-21T12:54:47.775831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpvNM32sx3nZRGtpK3"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "d39ee17d-02ad-43d4-8c10-b7a3d448d437", "DetectTime": "2024-05-21T12:54:47.843376+00:00", "EventTime": "2024-05-21T12:54:47.843396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkjhlJ3O4IWa9mWgW3"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "f2c095ea-1426-42e0-823a-783b3a86e5c5", "DetectTime": "2024-05-21T12:54:48.220657+00:00", "EventTime": "2024-05-21T12:54:48.220678+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLxe2oYfk5WHdi4Gj"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "437e4e65-a578-4593-ba9d-8c57bc35bbb5", "DetectTime": "2024-05-21T12:54:48.296086+00:00", "EventTime": "2024-05-21T12:54:48.296108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAMCi3SkIDf372Fzj"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "51fbf5b5-a757-4d3b-96b9-3b1f9e4b9354", "DetectTime": "2024-05-21T12:54:48.458225+00:00", "EventTime": "2024-05-21T12:54:48.458244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYBXkA1EKgch1vBTX5"], "accumulated_threat_level": 4.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "49e0846b-880c-4c1a-ac05-9fc43279aefe", "DetectTime": "2024-05-21T12:54:48.463751+00:00", "EventTime": "2024-05-21T12:54:48.463770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4YaRQ2NTzU8fZHmCi"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "cdc77f21-541a-4693-8ac6-bfc366464f3e", "DetectTime": "2024-05-21T12:54:48.471207+00:00", "EventTime": "2024-05-21T12:54:48.471226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqeC3j254lXaYObez2"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "deab30bf-28d4-4a80-8e1c-2b8ad24a8fdf", "DetectTime": "2024-05-21T12:54:48.476202+00:00", "EventTime": "2024-05-21T12:54:48.476221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktnrHrPzYToDTZ7a"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "58a6cccd-d0e8-4b3f-a8bd-b14469215a18", "DetectTime": "2024-05-21T12:54:48.480897+00:00", "EventTime": "2024-05-21T12:54:48.480920+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CluMg53jkOwQclz291"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "75c679fd-b14a-4c10-91d8-11d3fb87d40a", "DetectTime": "2024-05-21T12:54:48.885245+00:00", "EventTime": "2024-05-21T12:54:48.885268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgB7q4K4GPiugLIse"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "eed0d03f-d705-4518-a866-0c1dcaf55597", "DetectTime": "2024-05-21T12:54:48.983791+00:00", "EventTime": "2024-05-21T12:54:48.983815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0fS8y4QwkylrV4e57"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "3db59e37-c81f-4253-a556-9f1a6971756d", "DetectTime": "2024-05-21T12:54:49.120469+00:00", "EventTime": "2024-05-21T12:54:49.120494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFwxG44TF2zfzDOFp3"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "ccc2e2a3-2f41-4af3-8b27-c6678b82b3d1", "DetectTime": "2024-05-21T12:54:49.148769+00:00", "EventTime": "2024-05-21T12:54:49.148790+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyGFuQEXl3ymCaTra"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "5dcc6391-81a3-45ac-93f7-de30a70c7393", "DetectTime": "2024-05-21T12:54:49.260932+00:00", "EventTime": "2024-05-21T12:54:49.260955+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFu3A92ShAdHa75Xx2"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "514bcbbf-681c-43b0-a87c-466c4bd0fe67", "DetectTime": "2024-05-21T12:54:49.517739+00:00", "EventTime": "2024-05-21T12:54:49.517761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKzgo4o8Luez8P1Md"], "accumulated_threat_level": 5.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "e8409f38-2234-4945-8421-02d273b630ac", "DetectTime": "2024-05-21T12:54:49.522586+00:00", "EventTime": "2024-05-21T12:54:49.522604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBeBpt4Rj2ReLYQ3hk"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "674fb59f-8abb-4b57-b577-779af15e75ff", "DetectTime": "2024-05-21T12:54:49.527293+00:00", "EventTime": "2024-05-21T12:54:49.527311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwohnn1vYddZq0Gkag"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "7ec72989-5c20-45a1-a220-f4c242a10a0f", "DetectTime": "2024-05-21T12:54:49.542022+00:00", "EventTime": "2024-05-21T12:54:49.542046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjKrJJ1mBb327Z1ke3"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "76feece8-b62e-4d5b-934b-78d350b60522", "DetectTime": "2024-05-21T12:54:49.549192+00:00", "EventTime": "2024-05-21T12:54:49.549212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdrqaD2d4u9BXjZwFb"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "6146a7a3-9a3a-4fed-99a7-2f4e151af21e", "DetectTime": "2024-05-21T12:54:49.565207+00:00", "EventTime": "2024-05-21T12:54:49.565227+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C71jMb1lvRZwkUQ7Bj"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "5b67baa6-02e3-433a-b087-eaa551e12750", "DetectTime": "2024-05-21T12:54:50.054202+00:00", "EventTime": "2024-05-21T12:54:50.054226+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM7vap2n40fWAF9hh"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "63b3ab61-dd53-4565-839a-9bdc75fb891e", "DetectTime": "2024-05-21T12:54:50.252803+00:00", "EventTime": "2024-05-21T12:54:50.252822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvyYHZ643htLOlTe3"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "5c1e1934-7d3d-4bff-83a8-9eaa3c4801b1", "DetectTime": "2024-05-21T12:54:50.288125+00:00", "EventTime": "2024-05-21T12:54:50.288147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLcxr2IfT6dfMxlv6"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "9a300245-4430-4735-906f-c56f68dfc63c", "DetectTime": "2024-05-21T12:54:50.294751+00:00", "EventTime": "2024-05-21T12:54:50.294770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiDex93KGVn4qC0ak6"], "accumulated_threat_level": 5.6, "timewindow": 189} +{"Format": "IDEA0", "ID": "7631ebf7-6261-42a5-ae09-e964559a1b37", "DetectTime": "2024-05-21T12:54:50.617561+00:00", "EventTime": "2024-05-21T12:54:50.617579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C63gUU39rRZkXeUjcl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 192} +{"Format": "IDEA0", "ID": "41ce586e-37fd-41c1-a20e-932c8d7bd5db", "DetectTime": "2024-05-21T12:54:50.663159+00:00", "EventTime": "2024-05-21T12:54:50.663182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C14SHE1yuBZK1Hd5Wg"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "1d33318b-f6ba-4fbe-99e0-f26952f44dfa", "DetectTime": "2024-05-21T12:54:50.769472+00:00", "EventTime": "2024-05-21T12:54:50.769493+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iw5c4HhxvznyBPn4"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "798612eb-3cf4-4d7b-9125-b24e403126ff", "DetectTime": "2024-05-21T12:54:50.860615+00:00", "EventTime": "2024-05-21T12:54:50.860634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJTiN53UjBbOjjnFpc"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "816057ff-6d30-493c-9efa-b39a87a95ca8", "DetectTime": "2024-05-21T12:54:50.865888+00:00", "EventTime": "2024-05-21T12:54:50.865908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy1w8394mTC3Jg1Zc"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "c6e3c750-98f9-4e6d-8668-9a991e99dcea", "DetectTime": "2024-05-21T12:54:50.925490+00:00", "EventTime": "2024-05-21T12:54:50.925513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO3XxJ2ahBZbGhWzLg"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "21532f72-cb74-4cfd-a9a8-f0331bbefe12", "DetectTime": "2024-05-21T12:54:50.941224+00:00", "EventTime": "2024-05-21T12:54:50.941244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrwZc2QW6zlc8VlH4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "dc9438f8-d48c-4aff-8297-74c7280f9b49", "DetectTime": "2024-05-21T12:54:51.302977+00:00", "EventTime": "2024-05-21T12:54:51.303000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeNRgA6CZI5tCQy3d"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "30c5be8a-c00c-400b-a45e-dea0cc8d07ea", "DetectTime": "2024-05-21T12:54:51.317779+00:00", "EventTime": "2024-05-21T12:54:51.317800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C55Xg5sXZVuSnvSN1"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "3578cad8-6857-46a6-a542-4ad876b6c4a1", "DetectTime": "2024-05-21T12:54:51.406090+00:00", "EventTime": "2024-05-21T12:54:51.406110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp2nQb4Xy87BaPn9of"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "f23746ce-3b2e-4f6d-bbf7-c063e650ab92", "DetectTime": "2024-05-21T12:54:51.412287+00:00", "EventTime": "2024-05-21T12:54:51.412308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C12IiB1JiHzxTWqEI2"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "4ed06082-b392-4726-ac12-cb2667b9c553", "DetectTime": "2024-05-21T12:54:51.530766+00:00", "EventTime": "2024-05-21T12:54:51.530787+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CslGCkELOjHSTfW22"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "61d102e5-1025-4264-8073-ddaa9c567897", "DetectTime": "2024-05-21T12:54:51.564127+00:00", "EventTime": "2024-05-21T12:54:51.564146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1wsJRRiVM0iZtL97"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "7215f762-6b3b-4448-a0dc-7121c8e5824c", "DetectTime": "2024-05-21T12:54:51.654197+00:00", "EventTime": "2024-05-21T12:54:51.654220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CURgSi37DKdSNt5pfa", "CQ1RI313RCGFEWxFq4", "CT5Zsu2rUebAmkFKM8", "CdYUbc3dzivA9uKtde"], "accumulated_threat_level": 0.5, "timewindow": 219} +{"Format": "IDEA0", "ID": "8f841bc4-e742-4133-9a77-cce9b59fad92", "DetectTime": "2024-05-21T12:54:51.666269+00:00", "EventTime": "2024-05-21T12:54:51.666288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVemVG3GjVqFM4TkS8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "13047f14-7c21-470a-99cb-923bc50a5071", "DetectTime": "2024-05-21T12:54:51.717173+00:00", "EventTime": "2024-05-21T12:54:51.717195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXX7VR3vwzIWrxS9g9"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "0c46f73b-aec8-4e34-a83b-424a51e17e05", "DetectTime": "2024-05-21T12:54:52.000654+00:00", "EventTime": "2024-05-21T12:54:52.000675+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtpYi847WcyIAWrrYb"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "27e032fa-5727-4b9e-989b-a989017cd51f", "DetectTime": "2024-05-21T12:54:52.070614+00:00", "EventTime": "2024-05-21T12:54:52.070636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA6h1y4HULtmvqy9t8"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "09990f61-1ca4-493f-9697-6ae7794cb009", "DetectTime": "2024-05-21T12:54:52.075347+00:00", "EventTime": "2024-05-21T12:54:52.075365+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj9O4qUZeAdKpOcG9"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "a0a1879e-d582-49a7-8e9d-7b3b98299885", "DetectTime": "2024-05-21T12:54:52.090018+00:00", "EventTime": "2024-05-21T12:54:52.090040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVQh8E1ZVWT38WI2cd"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "b0661440-4d76-4524-af29-e743db94b88a", "DetectTime": "2024-05-21T12:54:52.220549+00:00", "EventTime": "2024-05-21T12:54:52.220568+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["36.74.200.86"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS7713 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymY1D4tAL06KpGsP5"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "47603146-56f0-42db-b079-7352aa5ae494", "DetectTime": "2024-05-21T12:54:52.235750+00:00", "EventTime": "2024-05-21T12:54:52.235770+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["36.74.200.86"]}], "Attach": [{"Content": "connection to blacklisted IP: 36.74.200.86 from 10.0.2.19. AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS7713 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CymY1D4tAL06KpGsP5"], "accumulated_threat_level": 11.100000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "7adddc37-57eb-41b0-ab8f-08de136282b7", "DetectTime": "2024-05-21T12:54:52.240760+00:00", "EventTime": "2024-05-21T12:54:52.240780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFEXY242BM5iRWdz7j"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "03cc6b85-fc61-46a2-bad8-da1c0a1801b0", "DetectTime": "2024-05-21T12:54:52.322762+00:00", "EventTime": "2024-05-21T12:54:52.322789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmRpC92iek4xX8F53j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "e9fdd526-e4d4-411f-9231-60ccc84f784a", "DetectTime": "2024-05-21T12:54:52.334593+00:00", "EventTime": "2024-05-21T12:54:52.334624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CywsPJ1Iyzb2ZbMGt8"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "e711d90c-2985-4d25-a68a-bba596244273", "DetectTime": "2024-05-21T12:54:52.340583+00:00", "EventTime": "2024-05-21T12:54:52.340602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3XzuVj3lI4jRSVv2"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "3ec217af-2748-46c4-9074-0e0326750c04", "DetectTime": "2024-05-21T12:54:52.346750+00:00", "EventTime": "2024-05-21T12:54:52.346768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C06Zuo4qtnjFlEKNDg"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "84179d13-43d7-4043-890f-db80590a4f0b", "DetectTime": "2024-05-21T12:54:52.351709+00:00", "EventTime": "2024-05-21T12:54:52.351730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgxtFDnz4MEt6T9k"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "82e643fb-9131-4ac6-be94-2a2b3ce960ea", "DetectTime": "2024-05-21T12:54:52.361864+00:00", "EventTime": "2024-05-21T12:54:52.361886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfPNSa32R6nqc35zl3"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "663d81a6-cd97-4e5b-9353-023ba2147cb1", "DetectTime": "2024-05-21T12:54:52.398333+00:00", "EventTime": "2024-05-21T12:54:52.398354+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["41.108.40.143"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. AS: ALGTEL-AS, DZ AS36947 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhgJW3kTKmJbrOp2j"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "6a2e268f-a32b-4a6e-8473-b092dcd0b319", "DetectTime": "2024-05-21T12:54:52.414187+00:00", "EventTime": "2024-05-21T12:54:52.414221+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["41.108.40.143"]}], "Attach": [{"Content": "connection to blacklisted IP: 41.108.40.143 from 10.0.2.19. AS: ALGTEL-AS, DZ AS36947 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZhgJW3kTKmJbrOp2j"], "accumulated_threat_level": 11.600000000000001, "timewindow": 44} +{"Format": "IDEA0", "ID": "9e98d532-c745-4e33-865c-4cdd7568e0fc", "DetectTime": "2024-05-21T12:54:52.593740+00:00", "EventTime": "2024-05-21T12:54:52.593762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIFuQG10MTGg48iZn9"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "546c97fe-af19-4c44-b5c1-8e39341af778", "DetectTime": "2024-05-21T12:54:52.622696+00:00", "EventTime": "2024-05-21T12:54:52.622718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYTqyxdKFvsrvhNXl"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "4a399d3a-5a80-4c4f-a491-07e45732aecc", "DetectTime": "2024-05-21T12:54:52.813987+00:00", "EventTime": "2024-05-21T12:54:52.814012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVN972s61pP1ITmp3"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "7eee4325-8265-4e59-b2a0-dd5ce2fb03b2", "DetectTime": "2024-05-21T12:54:52.877505+00:00", "EventTime": "2024-05-21T12:54:52.877526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxg3up112rcWTE0yLc"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "0d6d6805-8cf3-43a3-a48d-ffe1e263c24d", "DetectTime": "2024-05-21T12:54:53.150513+00:00", "EventTime": "2024-05-21T12:54:53.150539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTwNp62uyx1yCOqKX"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "7a19d577-602a-4050-a441-64f68b275214", "DetectTime": "2024-05-21T12:54:53.345832+00:00", "EventTime": "2024-05-21T12:54:53.345852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4xDXZ3I5ebUzNCywc"], "accumulated_threat_level": 0.8, "timewindow": 190} +{"Format": "IDEA0", "ID": "3abc3732-f0ca-46d0-bda5-21fb63c5695f", "DetectTime": "2024-05-21T12:54:53.458697+00:00", "EventTime": "2024-05-21T12:54:53.458718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSPy9E1NZCoQy1VEU1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "961bc2fa-5efc-472c-9486-a61334cfe85f", "DetectTime": "2024-05-21T12:54:53.487789+00:00", "EventTime": "2024-05-21T12:54:53.487809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX9S5x3msGRWEwnXqd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "0ccada53-13c0-405f-9ec7-71fa88899ff5", "DetectTime": "2024-05-21T12:54:53.492669+00:00", "EventTime": "2024-05-21T12:54:53.492688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPwkOY2BZQZN9zNfD9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "88a67268-0aa3-4bac-9c5e-6710ebe57fcb", "DetectTime": "2024-05-21T12:54:53.504980+00:00", "EventTime": "2024-05-21T12:54:53.504997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpLGYm4a0IamQg06Y1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "8108a90f-3a4b-4103-a22a-4f8e5a3848b0", "DetectTime": "2024-05-21T12:54:53.509846+00:00", "EventTime": "2024-05-21T12:54:53.509864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoyKww40DFWnvtyApc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "c03fbb3e-b801-4f49-bd35-783ca331c9e6", "DetectTime": "2024-05-21T12:54:53.579377+00:00", "EventTime": "2024-05-21T12:54:53.579408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oWe344hSzLsekZR1"], "accumulated_threat_level": 9.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "06f5e05c-9007-46f9-a891-63eab5ee135d", "DetectTime": "2024-05-21T12:54:53.868011+00:00", "EventTime": "2024-05-21T12:54:53.868032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiukoK3RpugC1b14Ve"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "dba67457-74a0-47ea-80d0-bede2ec11e0a", "DetectTime": "2024-05-21T12:54:53.884442+00:00", "EventTime": "2024-05-21T12:54:53.884463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0l8bmZSJpu46kzrl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "c23fe00a-539d-4937-a9cf-eb9b9819aa46", "DetectTime": "2024-05-21T12:54:53.889439+00:00", "EventTime": "2024-05-21T12:54:53.889459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1wDCq1HWTivlsNVN3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "0bfae7a1-4370-4aef-8b7b-75d2a99c8167", "DetectTime": "2024-05-21T12:54:53.978557+00:00", "EventTime": "2024-05-21T12:54:53.978580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce1EUh1S0ftTLAG6fg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "3844e928-aa02-4c32-8432-22d5c9309043", "DetectTime": "2024-05-21T12:54:54.458732+00:00", "EventTime": "2024-05-21T12:54:54.458754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKBLo4b1nahuTAfck"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "e43f05bf-7adc-4596-b677-79a60bb68ef3", "DetectTime": "2024-05-21T12:54:54.537177+00:00", "EventTime": "2024-05-21T12:54:54.537197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbn7qrdPWWPZXgl1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "595fa49e-f420-42a2-bfe2-febea6ee6958", "DetectTime": "2024-05-21T12:54:54.544527+00:00", "EventTime": "2024-05-21T12:54:54.544547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpqDhN1edXuHg3Ragg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "37dd249e-bc51-4023-9b13-77766a1a82f3", "DetectTime": "2024-05-21T12:54:54.571256+00:00", "EventTime": "2024-05-21T12:54:54.571278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEFdUyG87uuhE14Gi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "3034e0dd-54d7-4ad5-add1-d049dd7a993d", "DetectTime": "2024-05-21T12:54:54.895030+00:00", "EventTime": "2024-05-21T12:54:54.895052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXx9hOi1bh20LdX7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "c685e9d0-c34d-4420-a54c-cb6e30675d59", "DetectTime": "2024-05-21T12:54:54.919401+00:00", "EventTime": "2024-05-21T12:54:54.919421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6snao3j6nwG9M3cW8"], "accumulated_threat_level": 10.4, "timewindow": 192} +{"Format": "IDEA0", "ID": "4df13db8-cfca-45d5-b2c6-7b50c69a912a", "DetectTime": "2024-05-21T12:54:54.925384+00:00", "EventTime": "2024-05-21T12:54:54.925406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0pkd71aXnyc59IxR7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "d6f75a5b-efba-4323-be44-1223c0f50c74", "DetectTime": "2024-05-21T12:54:54.930347+00:00", "EventTime": "2024-05-21T12:54:54.930369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTgPcL2GtICs32H9Oj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "7ee1521e-7ae1-4b8d-a79f-4ef9ffe31646", "DetectTime": "2024-05-21T12:54:54.937443+00:00", "EventTime": "2024-05-21T12:54:54.937461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ0bYs4duO4kUsDCva"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "65b5170f-3361-4309-b35c-3a1d6bf1797b", "DetectTime": "2024-05-21T12:54:54.942342+00:00", "EventTime": "2024-05-21T12:54:54.942362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxl0Sb3cD59kOdpZMl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "d0363f4e-0ba7-4fc5-9fed-a759ac2a4c92", "DetectTime": "2024-05-21T12:54:54.961231+00:00", "EventTime": "2024-05-21T12:54:54.961254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChOM4N1bzHAYuFt5eg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "71a1c24e-adbf-44b4-9660-6268a2c6917b", "DetectTime": "2024-05-21T12:54:54.987400+00:00", "EventTime": "2024-05-21T12:54:54.987421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGKbDrzQIJlHDd0Va"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "b75f25d8-753a-4e25-9dfe-4e79a622d104", "DetectTime": "2024-05-21T12:54:55.062786+00:00", "EventTime": "2024-05-21T12:54:55.062808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2gswo1oeLs4AcV3je"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "24805d96-ffce-4e5e-bebe-0519e9647808", "DetectTime": "2024-05-21T12:54:55.586374+00:00", "EventTime": "2024-05-21T12:54:55.586396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDaRBpCOwzYILIuY2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "f9765486-e3d6-456e-b5ff-5c2b80251d06", "DetectTime": "2024-05-21T12:54:55.608573+00:00", "EventTime": "2024-05-21T12:54:55.608594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXwaUa1Y1u0MJ98lP5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "2652d9b5-8a06-4d60-ad38-738c008a6723", "DetectTime": "2024-05-21T12:54:55.920718+00:00", "EventTime": "2024-05-21T12:54:55.920744+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZm2kG3YJx6bUxmqyf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "96b9009a-12d5-44a3-bb7d-26bc0dda92eb", "DetectTime": "2024-05-21T12:54:55.937233+00:00", "EventTime": "2024-05-21T12:54:55.937257+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5Hb6N2UAaBBo4icd8"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "714a1372-58fb-4206-8b07-4b2663ad3bad", "DetectTime": "2024-05-21T12:54:56.057577+00:00", "EventTime": "2024-05-21T12:54:56.057604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyfTk2l9etQ6kpKr3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "c8f08cc5-45e6-41e3-8022-c1f49933ab9a", "DetectTime": "2024-05-21T12:54:56.159896+00:00", "EventTime": "2024-05-21T12:54:56.159921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6UndXOtQC1UUL0u3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "1d6c89dd-481a-467a-8077-f4dfe0df7be6", "DetectTime": "2024-05-21T12:54:56.279452+00:00", "EventTime": "2024-05-21T12:54:56.279473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3QMum2l4thcdBqnE7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "4aad1872-fbf0-40ed-941f-880054627eb1", "DetectTime": "2024-05-21T12:54:56.336229+00:00", "EventTime": "2024-05-21T12:54:56.336264+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBueW27HiCf2QS358"], "accumulated_threat_level": 11.200000000000001, "timewindow": 192} +{"Format": "IDEA0", "ID": "93ff27dc-e48b-4a2d-acb0-5a42ee82b0ef", "DetectTime": "2024-05-21T12:54:56.342671+00:00", "EventTime": "2024-05-21T12:54:56.342693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRyun13COLrK4hcigh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "f9517669-1c4c-4b36-b31f-369153cb18d2", "DetectTime": "2024-05-21T12:54:56.352795+00:00", "EventTime": "2024-05-21T12:54:56.352815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9yK4Kpa9f9ssdrH"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "304a5664-202e-469f-857b-0a584f71eb38", "DetectTime": "2024-05-21T12:54:56.398849+00:00", "EventTime": "2024-05-21T12:54:56.398869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrwUM54pXpLLzIMiN9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "380bb2b2-116c-47ba-9583-eea4380cfae3", "DetectTime": "2024-05-21T12:54:56.408666+00:00", "EventTime": "2024-05-21T12:54:56.408685+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRHtUTqKrWzWmdF1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "5dab48bf-f4ad-4ab5-a8ef-3c71bee2c148", "DetectTime": "2024-05-21T12:54:56.413568+00:00", "EventTime": "2024-05-21T12:54:56.413588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXpT1g4CUkq7hS3gy2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "0f1b4ec4-ef57-45b3-8f8e-8202f24396ed", "DetectTime": "2024-05-21T12:54:56.418332+00:00", "EventTime": "2024-05-21T12:54:56.418351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoNu9c28PATwxYEjab"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "97e31584-9635-41c3-ae1c-423a133956d6", "DetectTime": "2024-05-21T12:54:56.684316+00:00", "EventTime": "2024-05-21T12:54:56.684341+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1xk2B39EcoUPqn2tb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "a26bcaef-83cf-41eb-acc1-d2a32f7e2362", "DetectTime": "2024-05-21T12:54:56.729006+00:00", "EventTime": "2024-05-21T12:54:56.729028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Caiigg3Swa9qW0P9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "730b0fa8-1923-48ed-bc11-2aa1e0c82ba4", "DetectTime": "2024-05-21T12:54:56.734014+00:00", "EventTime": "2024-05-21T12:54:56.734035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbb32fEMIsIk8Ddqh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "87f1c4d5-89b7-48d7-9c2d-9deb172037af", "DetectTime": "2024-05-21T12:54:56.863178+00:00", "EventTime": "2024-05-21T12:54:56.863202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu7PYI149dH4aZpXg7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "ca318a8b-00c0-4a9c-85aa-c061d5717d29", "DetectTime": "2024-05-21T12:54:56.869317+00:00", "EventTime": "2024-05-21T12:54:56.869338+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtYrbI1xX63ZZSMnW5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "e66c2b97-4de7-4619-b345-d02cdb599b08", "DetectTime": "2024-05-21T12:54:57.567184+00:00", "EventTime": "2024-05-21T12:54:57.567207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZx1XlFNPBsIRmlph"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "42de4500-8119-4c19-bf60-cf7721af2fc1", "DetectTime": "2024-05-21T12:54:57.577052+00:00", "EventTime": "2024-05-21T12:54:57.577070+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrqBQ3FqvYJejBLX4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "7539a006-8233-43a4-9972-29b5b3547216", "DetectTime": "2024-05-21T12:54:57.582894+00:00", "EventTime": "2024-05-21T12:54:57.582915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIRy513CNWyfg2Zuh2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "3bdfba5e-2c98-4560-87ae-2bdc64d30537", "DetectTime": "2024-05-21T12:54:57.588046+00:00", "EventTime": "2024-05-21T12:54:57.588069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbjs1x3McKxIijFqtl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "57a96d59-00fc-47ad-9cd4-5bcd9c66a247", "DetectTime": "2024-05-21T12:54:57.594643+00:00", "EventTime": "2024-05-21T12:54:57.594663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZa4hk32aqmzCqV8b2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "c0ea62d4-5af3-4ef8-8777-e873bc27252b", "DetectTime": "2024-05-21T12:54:57.599384+00:00", "EventTime": "2024-05-21T12:54:57.599403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCSXyEnD7srW3vTrk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "82916ac9-4d06-4b21-b70e-06c0856d3caa", "DetectTime": "2024-05-21T12:54:57.872770+00:00", "EventTime": "2024-05-21T12:54:57.872789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZJNCFIb5cDT75d4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 192} +{"Format": "Json", "ID": "82916ac9-4d06-4b21-b70e-06c0856d3caa", "DetectTime": "2024-05-21T12:54:57.872770+00:00", "EventTime": "2024-05-21T12:54:57.872789+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-08T23:02:29.352933+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2024/05/21 12:54:58.034361)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 192, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5f188951-5196-455d-a51e-7d1c8799d6db", "DetectTime": "2024-05-21T12:54:58.038464+00:00", "EventTime": "2024-05-21T12:54:58.038483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CllIji3c7EzlWJfk32"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "01a3b3f1-4404-4947-91e6-d56756fccdda", "DetectTime": "2024-05-21T12:54:58.043118+00:00", "EventTime": "2024-05-21T12:54:58.043137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyP6av1fd23m6o1Cmj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "3ceb5b7e-e6bb-4645-9669-8ce3041a7594", "DetectTime": "2024-05-21T12:54:58.055807+00:00", "EventTime": "2024-05-21T12:54:58.055828+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLHst52Afm7VQYhfth"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "ecbb8aed-e780-4854-8f51-bd4b6dcdc2bc", "DetectTime": "2024-05-21T12:54:58.393229+00:00", "EventTime": "2024-05-21T12:54:58.393254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjUwep4Kku2E8uvtma"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "4c39ae5e-c21d-4bd4-92fc-f3dad609efdc", "DetectTime": "2024-05-21T12:54:58.399808+00:00", "EventTime": "2024-05-21T12:54:58.399829+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cczap21kmeVp0NS7q9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "d8d0901e-a083-42b8-bb15-4e5bc6d6b493", "DetectTime": "2024-05-21T12:54:58.448459+00:00", "EventTime": "2024-05-21T12:54:58.448483+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMcTQ2Q3mFo5p5Jma"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "622466ec-c7a2-43f4-9ea2-da02970121d2", "DetectTime": "2024-05-21T12:54:58.490855+00:00", "EventTime": "2024-05-21T12:54:58.490876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF667q1ajgDVOBy1di"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "8aaa6aee-788b-4143-bc2f-584a269325ac", "DetectTime": "2024-05-21T12:54:58.496171+00:00", "EventTime": "2024-05-21T12:54:58.496191+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmQjNQd0tazKNsRd6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "5c789377-8d92-4e3b-abc9-f50cfe621ba9", "DetectTime": "2024-05-21T12:54:58.867060+00:00", "EventTime": "2024-05-21T12:54:58.867084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClrFLCuYmu2dRiLce"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "90cbee9d-ea6e-4fa9-a75d-de3102d45102", "DetectTime": "2024-05-21T12:54:58.937708+00:00", "EventTime": "2024-05-21T12:54:58.937727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKmar1vVXBED8WSdd"], "accumulated_threat_level": 0.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "4e9aa8b6-7558-4c35-858e-9e9628b297aa", "DetectTime": "2024-05-21T12:54:58.942910+00:00", "EventTime": "2024-05-21T12:54:58.942931+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM10Gi2kNmwxEkLaYa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "bda6fb55-3d67-41c2-ac79-48a879ff7fb7", "DetectTime": "2024-05-21T12:54:58.956472+00:00", "EventTime": "2024-05-21T12:54:58.956490+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxDwA2xSfMdNPUhli"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "5a5afb69-49b0-4949-bcda-ffd0a62d2a29", "DetectTime": "2024-05-21T12:54:58.971226+00:00", "EventTime": "2024-05-21T12:54:58.971247+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxDwA2xSfMdNPUhli"], "accumulated_threat_level": 12.100000000000001, "timewindow": 44} +{"Format": "Json", "ID": "5a5afb69-49b0-4949-bcda-ffd0a62d2a29", "DetectTime": "2024-05-21T12:54:58.971226+00:00", "EventTime": "2024-05-21T12:54:58.971247+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "1970-01-02T19:07:43.270304+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2024/05/21 12:54:59.512939)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.100000000000001, "timewindow": 44, "profileid": "profile_10.0.2.19", "threat_level": 12.100000000000001} +{"Format": "IDEA0", "ID": "226e4708-5193-4d96-ae93-787acbab8fc1", "DetectTime": "2024-05-21T12:54:59.526958+00:00", "EventTime": "2024-05-21T12:54:59.526980+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkAiw2wdQjd7tgUPf"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "2ccbc0db-681c-4f59-8c68-75203dd32573", "DetectTime": "2024-05-21T12:54:59.542862+00:00", "EventTime": "2024-05-21T12:54:59.542896+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfkAiw2wdQjd7tgUPf"], "accumulated_threat_level": 0.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "8394132b-edd8-4737-9cea-2eb7fca6b5e0", "DetectTime": "2024-05-21T12:54:59.558580+00:00", "EventTime": "2024-05-21T12:54:59.558599+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9lw43WxAuxHpI3Bc"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "d94d579c-6efb-479b-ab3d-6b51a8e4aadd", "DetectTime": "2024-05-21T12:54:59.573926+00:00", "EventTime": "2024-05-21T12:54:59.573954+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu9lw43WxAuxHpI3Bc"], "accumulated_threat_level": 1.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "3dd360c3-4b48-4af0-9809-3c5e5022d4a4", "DetectTime": "2024-05-21T12:54:59.579551+00:00", "EventTime": "2024-05-21T12:54:59.579573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1IeNW2BU6J8rLRyYh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 191} +{"Format": "IDEA0", "ID": "abebf3f8-8b59-47ca-af7a-f9d686ed83f5", "DetectTime": "2024-05-21T12:54:59.592243+00:00", "EventTime": "2024-05-21T12:54:59.592267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc1eQ12lm5nCku2Bkl"], "accumulated_threat_level": 1.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "a66aa0ac-4f57-4bbe-8995-f21d3b2b70b5", "DetectTime": "2024-05-21T12:54:59.606382+00:00", "EventTime": "2024-05-21T12:54:59.606403+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEjfmP1WeeW1FgdEDe"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "c907fcd2-d295-4bd7-97d8-739a596c2f50", "DetectTime": "2024-05-21T12:54:59.620313+00:00", "EventTime": "2024-05-21T12:54:59.620338+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEjfmP1WeeW1FgdEDe"], "accumulated_threat_level": 1.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "d37ccb51-8603-4348-9010-10b56e9f083c", "DetectTime": "2024-05-21T12:54:59.635178+00:00", "EventTime": "2024-05-21T12:54:59.635199+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AZ48XF1W0A2N1kg"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "72c582da-c104-49e5-a668-abeb03e13bfe", "DetectTime": "2024-05-21T12:54:59.650278+00:00", "EventTime": "2024-05-21T12:54:59.650300+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0AZ48XF1W0A2N1kg"], "accumulated_threat_level": 2.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "89cff169-905a-4ae3-b4e8-a3855a89d2d2", "DetectTime": "2024-05-21T12:54:59.661637+00:00", "EventTime": "2024-05-21T12:54:59.661658+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnyzc3TJhrawmr3w8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 192} +{"Format": "IDEA0", "ID": "b67b0955-af8b-4fc3-b174-fe4cc555f836", "DetectTime": "2024-05-21T12:54:59.680013+00:00", "EventTime": "2024-05-21T12:54:59.680043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLWTIoWXDF9vhO9o9"], "accumulated_threat_level": 3.2, "timewindow": 192} +{"Format": "IDEA0", "ID": "02ed268a-416b-466a-916d-01cf6ac24369", "DetectTime": "2024-05-21T12:54:59.694489+00:00", "EventTime": "2024-05-21T12:54:59.694510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjAJk617gtusTsVkk2"], "accumulated_threat_level": 4.0, "timewindow": 192} +{"Format": "IDEA0", "ID": "92bcd180-7001-4537-9325-31a27183c130", "DetectTime": "2024-05-21T12:54:59.708038+00:00", "EventTime": "2024-05-21T12:54:59.708062+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTN9t1t4HdQMsbwG9"], "accumulated_threat_level": 4.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "6c11f4c9-6b9f-4e77-beb3-705fba4ffefe", "DetectTime": "2024-05-21T12:54:59.723666+00:00", "EventTime": "2024-05-21T12:54:59.723686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM28qi1CV3jH0zMxq7"], "accumulated_threat_level": 4.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "05e288d9-b73e-4701-a215-eed8b262292b", "DetectTime": "2024-05-21T12:54:59.737669+00:00", "EventTime": "2024-05-21T12:54:59.737689+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP09Vv26wZewrCSdQ9"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "4560c90c-94bc-4433-b47d-ac81fbeb0de0", "DetectTime": "2024-05-21T12:54:59.753618+00:00", "EventTime": "2024-05-21T12:54:59.753655+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP09Vv26wZewrCSdQ9"], "accumulated_threat_level": 2.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "aa46a721-bee0-4e91-b6ce-6a9b0c26867a", "DetectTime": "2024-05-21T12:54:59.776603+00:00", "EventTime": "2024-05-21T12:54:59.776624+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PnYP3vpgHZEeme8c"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "d475c8b2-f308-45bb-8272-d82b800ad131", "DetectTime": "2024-05-21T12:54:59.791453+00:00", "EventTime": "2024-05-21T12:54:59.791497+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2PnYP3vpgHZEeme8c"], "accumulated_threat_level": 3.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "efa4c147-97d5-4689-a9fe-39492758fc1f", "DetectTime": "2024-05-21T12:54:59.806369+00:00", "EventTime": "2024-05-21T12:54:59.806402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qlSacrpdLrURZy4"], "accumulated_threat_level": 5.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "2030751d-e9dc-4fe1-b62d-d0b1000b1e5c", "DetectTime": "2024-05-21T12:55:00.059393+00:00", "EventTime": "2024-05-21T12:55:00.059413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFyoW3nrxKBXoRO9c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 192} +{"Format": "IDEA0", "ID": "54d9b6b0-87a5-496d-a76a-e7ecb11cb09b", "DetectTime": "2024-05-21T12:55:00.111631+00:00", "EventTime": "2024-05-21T12:55:00.111654+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CagfaG49plQ2P2edAf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "ee75c43c-e01b-43d2-9535-202cbcd95cf3", "DetectTime": "2024-05-21T12:55:00.163373+00:00", "EventTime": "2024-05-21T12:55:00.163396+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPSBOJ34Fv5zvxC1R9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "cb44ea29-1fde-41ce-b64d-038678caa266", "DetectTime": "2024-05-21T12:55:00.212423+00:00", "EventTime": "2024-05-21T12:55:00.212457+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjr3W73uWKVxvKijR3"], "accumulated_threat_level": 8.799999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "81aece07-1653-4345-b18d-18824fd00386", "DetectTime": "2024-05-21T12:55:00.269440+00:00", "EventTime": "2024-05-21T12:55:00.269474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXG3QC3vCNwLdSkB7e"], "accumulated_threat_level": 9.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "aa6ba015-496c-4aff-b68e-abcaa089249a", "DetectTime": "2024-05-21T12:55:00.284917+00:00", "EventTime": "2024-05-21T12:55:00.284942+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJjUklc1mvIDcDq4"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "feced077-dfef-48ed-bc50-4b6131962b09", "DetectTime": "2024-05-21T12:55:00.299879+00:00", "EventTime": "2024-05-21T12:55:00.299904+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkJjUklc1mvIDcDq4"], "accumulated_threat_level": 3.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "a446b3e7-2a42-464e-a41a-795e23183696", "DetectTime": "2024-05-21T12:55:00.352607+00:00", "EventTime": "2024-05-21T12:55:00.352642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHH8Si4IbyM28rlXN5"], "accumulated_threat_level": 10.4, "timewindow": 192} +{"Format": "IDEA0", "ID": "40b2ce56-0acf-4daa-998a-cece660594a2", "DetectTime": "2024-05-21T12:55:00.393666+00:00", "EventTime": "2024-05-21T12:55:00.393686+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCf8jz2bzYN7poqzfi"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "8c076bcf-7784-43fb-99b0-ceb8f39c3434", "DetectTime": "2024-05-21T12:55:00.408579+00:00", "EventTime": "2024-05-21T12:55:00.408612+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCf8jz2bzYN7poqzfi"], "accumulated_threat_level": 4.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "027b626e-ec9a-473d-9ff0-34bc84235179", "DetectTime": "2024-05-21T12:55:00.519201+00:00", "EventTime": "2024-05-21T12:55:00.519236+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg18mv1oPNz9Y9Wsoh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 192} +{"Format": "IDEA0", "ID": "a1668de8-4245-4cc3-9900-a1a812083813", "DetectTime": "2024-05-21T12:55:00.678464+00:00", "EventTime": "2024-05-21T12:55:00.678495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA542i1q43X6Pni6ia"], "accumulated_threat_level": 12.000000000000002, "timewindow": 192} +{"Format": "Json", "ID": "a1668de8-4245-4cc3-9900-a1a812083813", "DetectTime": "2024-05-21T12:55:00.678464+00:00", "EventTime": "2024-05-21T12:55:00.678495+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "1970-01-08T23:32:40.575906+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2024/05/21 12:55:01.057483)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 192, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "1d4e744e-4d6b-4494-9f3d-49193787ef48", "DetectTime": "2024-05-21T12:55:01.068939+00:00", "EventTime": "2024-05-21T12:55:01.068958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuyjD1l48lgP8v5Ri"], "accumulated_threat_level": 0.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "7aeca992-b5c0-470a-91c9-3e8128ca48e8", "DetectTime": "2024-05-21T12:55:01.086912+00:00", "EventTime": "2024-05-21T12:55:01.086935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHv2j3cfcEHoYZpGf"], "accumulated_threat_level": 1.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "4788d7e6-37f8-4bc7-899a-c86c1c47882d", "DetectTime": "2024-05-21T12:55:01.092032+00:00", "EventTime": "2024-05-21T12:55:01.092052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXCBB21SdyhE2ACpvj"], "accumulated_threat_level": 1.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "9ad81958-f46e-4637-b7a4-2979b53dfc50", "DetectTime": "2024-05-21T12:55:01.103907+00:00", "EventTime": "2024-05-21T12:55:01.103927+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3hz6p46b6i2pT11je"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 192} +{"Format": "IDEA0", "ID": "55574e64-b425-458f-9245-db21ec0f0ea0", "DetectTime": "2024-05-21T12:55:01.115621+00:00", "EventTime": "2024-05-21T12:55:01.115657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTktdTYizJZ8B8uck"], "accumulated_threat_level": 3.2, "timewindow": 192} +{"Format": "IDEA0", "ID": "cbeb7abe-cc07-4515-aec3-7fe1fe613a1c", "DetectTime": "2024-05-21T12:55:01.286869+00:00", "EventTime": "2024-05-21T12:55:01.286903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTHSY1Fp1KBdFNS9k"], "accumulated_threat_level": 4.0, "timewindow": 192} +{"Format": "IDEA0", "ID": "5c2084dd-0292-4488-9a69-6cf9013be339", "DetectTime": "2024-05-21T12:55:01.340194+00:00", "EventTime": "2024-05-21T12:55:01.340223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNufJ3iLFcTGPP091"], "accumulated_threat_level": 4.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "5d3965f2-f755-4235-918c-144fde0376ff", "DetectTime": "2024-05-21T12:55:01.392551+00:00", "EventTime": "2024-05-21T12:55:01.392582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3sSr4nhaCdSuYNJ5"], "accumulated_threat_level": 5.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "9e499b2b-f403-447d-b5e7-28465cd8fd0d", "DetectTime": "2024-05-21T12:55:01.446466+00:00", "EventTime": "2024-05-21T12:55:01.446501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsAbD2ZzJs7ASUyYj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 192} +{"Format": "IDEA0", "ID": "7ced98d7-ba72-4bff-af48-d4a715615df7", "DetectTime": "2024-05-21T12:55:01.503206+00:00", "EventTime": "2024-05-21T12:55:01.503225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JuBU3CXcCISjuSYb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "c191396e-6e2c-44a7-a4cb-cd35d44c297d", "DetectTime": "2024-05-21T12:55:01.532211+00:00", "EventTime": "2024-05-21T12:55:01.532232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwIo4yqBvkhKmaTa2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "70b32d99-bfea-41ac-be97-8c376b001572", "DetectTime": "2024-05-21T12:55:01.595202+00:00", "EventTime": "2024-05-21T12:55:01.595221+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2Fbq1RVKmyDId832"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "da82628b-cac7-416c-9604-978c8a7e27e3", "DetectTime": "2024-05-21T12:55:01.937779+00:00", "EventTime": "2024-05-21T12:55:01.937809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZC28B1ESo9Z5ov1W4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "87a68082-677b-456b-81a7-bf2d0cf9074b", "DetectTime": "2024-05-21T12:55:01.994123+00:00", "EventTime": "2024-05-21T12:55:01.994142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdBfZwyVVkcNQHP7"], "accumulated_threat_level": 9.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "b1efeabd-bbe6-4dc1-b3c1-04cffbaa8837", "DetectTime": "2024-05-21T12:55:02.046450+00:00", "EventTime": "2024-05-21T12:55:02.046473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPiKat4GAunjcZqAr8"], "accumulated_threat_level": 10.4, "timewindow": 192} +{"Format": "IDEA0", "ID": "0f0920c3-f61a-4641-83bc-8aa39ba0f7dd", "DetectTime": "2024-05-21T12:55:02.098987+00:00", "EventTime": "2024-05-21T12:55:02.099007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaoPK2PZvaKXrbxq7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 192} +{"Format": "IDEA0", "ID": "3dc60d57-16bf-4d96-a774-a6a566a65171", "DetectTime": "2024-05-21T12:55:02.150332+00:00", "EventTime": "2024-05-21T12:55:02.150352+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRuni1qjBu0d2eta5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 192} +{"Format": "Json", "ID": "3dc60d57-16bf-4d96-a774-a6a566a65171", "DetectTime": "2024-05-21T12:55:02.150332+00:00", "EventTime": "2024-05-21T12:55:02.150352+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-08T23:32:43.631967+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 192. (real time 2024/05/21 12:55:02.378579)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 192, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "d859c915-7fc8-4920-896c-6a2c00cc6866", "DetectTime": "2024-05-21T12:55:02.392634+00:00", "EventTime": "2024-05-21T12:55:02.392669+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPuc14hLKaeF38Lkd"], "accumulated_threat_level": 0.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "1c840656-c55b-4fe1-92b2-3e38857cfdf0", "DetectTime": "2024-05-21T12:55:02.404578+00:00", "EventTime": "2024-05-21T12:55:02.404597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgffp4O73QLN25R6b"], "accumulated_threat_level": 1.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "fc0c79c7-6231-4a10-ba7a-6a1191ddb878", "DetectTime": "2024-05-21T12:55:02.524382+00:00", "EventTime": "2024-05-21T12:55:02.524402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdgzM393VxzWNgAha"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 192} +{"Format": "IDEA0", "ID": "8e573ce9-5592-4e17-865d-451d87e4ff06", "DetectTime": "2024-05-21T12:55:02.573014+00:00", "EventTime": "2024-05-21T12:55:02.573032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbtNyhHJ10s1ZBdIl"], "accumulated_threat_level": 3.2, "timewindow": 192} +{"Format": "IDEA0", "ID": "22223d4e-c5b7-4684-ac7a-bbe33649a5dc", "DetectTime": "2024-05-21T12:55:02.577791+00:00", "EventTime": "2024-05-21T12:55:02.577810+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnvcHM1Hm8mmHBSgS2"], "accumulated_threat_level": 3.2, "timewindow": 192} +{"Format": "IDEA0", "ID": "ff54e621-01d9-4bdf-9cb9-57a6fde022e4", "DetectTime": "2024-05-21T12:55:02.664331+00:00", "EventTime": "2024-05-21T12:55:02.664349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CndEuo1K4tY0NbPCH"], "accumulated_threat_level": 4.0, "timewindow": 192} +{"Format": "IDEA0", "ID": "1f1aefa9-bb9b-414b-9ccf-6e2d09cc5681", "DetectTime": "2024-05-21T12:55:02.718905+00:00", "EventTime": "2024-05-21T12:55:02.718925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW56hRwDYhiECXLgj"], "accumulated_threat_level": 4.8, "timewindow": 192} +{"Format": "IDEA0", "ID": "7ab8d424-1497-4891-98da-47e90671df74", "DetectTime": "2024-05-21T12:55:02.768714+00:00", "EventTime": "2024-05-21T12:55:02.768734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cavb5W3OYRMRf88UFl"], "accumulated_threat_level": 5.6, "timewindow": 192} +{"Format": "IDEA0", "ID": "29b3de0f-8b52-4483-b5cf-a4b8ae246545", "DetectTime": "2024-05-21T12:55:02.829652+00:00", "EventTime": "2024-05-21T12:55:02.829671+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbMWaF4rV1tyknf1W4", "CscK1q3t9GR4zaNQTd", "CBey6f2sZLbvKqpRvi", "CL3tof3HQSpjYHBDFi"], "accumulated_threat_level": 0.5, "timewindow": 220} +{"Format": "IDEA0", "ID": "6373c683-9631-44ea-b085-23780ce9239c", "DetectTime": "2024-05-21T12:55:03.047363+00:00", "EventTime": "2024-05-21T12:55:03.047383+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBjCRMpPjH5AaiZ5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 192} +{"Format": "IDEA0", "ID": "c9649c27-2e9b-4214-9471-292bd988d998", "DetectTime": "2024-05-21T12:55:03.099450+00:00", "EventTime": "2024-05-21T12:55:03.099475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDZUIEmSMxW28sV6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "ef97a752-332a-4338-a9f3-6b536214907e", "DetectTime": "2024-05-21T12:55:03.149716+00:00", "EventTime": "2024-05-21T12:55:03.149735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2rNPb3eibdZT0BQbb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "df122dc0-814b-4df7-ba81-f3fce00221fa", "DetectTime": "2024-05-21T12:55:03.243259+00:00", "EventTime": "2024-05-21T12:55:03.243287+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnErA447apherQG7U4"], "accumulated_threat_level": 1.3, "timewindow": 193} +{"Format": "IDEA0", "ID": "1ecc5cbf-71a2-448b-9b03-0349e5d65684", "DetectTime": "2024-05-21T12:55:03.288199+00:00", "EventTime": "2024-05-21T12:55:03.288219+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHmnGG3JSyBNBS47Nj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "79b89b68-8886-433a-b639-d9cca1a7ed05", "DetectTime": "2024-05-21T12:55:03.357586+00:00", "EventTime": "2024-05-21T12:55:03.357603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGRdLtDF5gysKoQb"], "accumulated_threat_level": 2.1, "timewindow": 193} +{"Format": "IDEA0", "ID": "c2a60cbd-cef1-4cdb-9025-c9d6ba5180b1", "DetectTime": "2024-05-21T12:55:03.412111+00:00", "EventTime": "2024-05-21T12:55:03.412128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNCwuS1JuKeZj5xUwg"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 193} +{"Format": "IDEA0", "ID": "af5fdf8a-6e79-4635-96ca-c127da51eeee", "DetectTime": "2024-05-21T12:55:03.475402+00:00", "EventTime": "2024-05-21T12:55:03.475422+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chxtv33LKDQGwH8A79"], "accumulated_threat_level": 3.7, "timewindow": 193} +{"Format": "IDEA0", "ID": "6bcdb5e5-ecf1-46ba-8168-42d2f33a4329", "DetectTime": "2024-05-21T12:55:03.741526+00:00", "EventTime": "2024-05-21T12:55:03.741545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9cCt2unWQLXDeWj9"], "accumulated_threat_level": 4.5, "timewindow": 193} +{"Format": "IDEA0", "ID": "1f98ed4b-8af3-48a7-ba62-f9641df7ac38", "DetectTime": "2024-05-21T12:55:03.798177+00:00", "EventTime": "2024-05-21T12:55:03.798199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMaY7t4TYqawmZAeNd"], "accumulated_threat_level": 5.3, "timewindow": 193} +{"Format": "IDEA0", "ID": "08dd3e03-c0c0-4892-aa92-c93957728065", "DetectTime": "2024-05-21T12:55:03.852883+00:00", "EventTime": "2024-05-21T12:55:03.852912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.232.68.87"]}], "Attach": [{"Content": "Connection to unknown destination port 7399/UDP destination IP 69.232.68.87. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVevQ82tO2Ls4c7733"], "accumulated_threat_level": 6.1, "timewindow": 193} +{"Format": "IDEA0", "ID": "e3047ad9-8454-40ac-8083-cf36c77e77b0", "DetectTime": "2024-05-21T12:55:04.019153+00:00", "EventTime": "2024-05-21T12:55:04.019171+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EspA14KhAo5VjkG7"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 193} +{"Format": "IDEA0", "ID": "bf4479c3-9707-47a3-bb07-224acdc50835", "DetectTime": "2024-05-21T12:55:04.072379+00:00", "EventTime": "2024-05-21T12:55:04.072399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVAeB3CGy6fuLDdAf"], "accumulated_threat_level": 7.699999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "9b109ad8-e8ca-4922-8167-bcecd06a6535", "DetectTime": "2024-05-21T12:55:04.126355+00:00", "EventTime": "2024-05-21T12:55:04.126376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0I2IW1AZK3dsGZUQ6"], "accumulated_threat_level": 8.5, "timewindow": 193} +{"Format": "IDEA0", "ID": "de3cb124-9e23-45a8-8d4e-1a50e1166950", "DetectTime": "2024-05-21T12:55:04.397849+00:00", "EventTime": "2024-05-21T12:55:04.397882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYBXkA1EKgch1vBTX5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "cbbadceb-1049-485b-b320-6b1f99d253af", "DetectTime": "2024-05-21T12:55:04.451050+00:00", "EventTime": "2024-05-21T12:55:04.451073+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDyNa3mLR3lKNwIsg"], "accumulated_threat_level": 9.3, "timewindow": 193} +{"Format": "IDEA0", "ID": "bf375e5d-d195-42a4-88cd-5cc4b3edc258", "DetectTime": "2024-05-21T12:55:04.504027+00:00", "EventTime": "2024-05-21T12:55:04.504046+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCxEwmMe7tpnqJh"], "accumulated_threat_level": 10.100000000000001, "timewindow": 193} +{"Format": "IDEA0", "ID": "b15a7313-370f-4fc5-94ff-86303e570e9b", "DetectTime": "2024-05-21T12:55:04.556534+00:00", "EventTime": "2024-05-21T12:55:04.556553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cagl6m2T5p9Mglw3h4"], "accumulated_threat_level": 10.900000000000002, "timewindow": 193} +{"Format": "IDEA0", "ID": "3b3984b5-3247-46fe-ad0e-a359aefc6b5a", "DetectTime": "2024-05-21T12:55:04.609976+00:00", "EventTime": "2024-05-21T12:55:04.609997+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CveniR6DyypbIVl5f"], "accumulated_threat_level": 11.700000000000003, "timewindow": 193} +{"Format": "IDEA0", "ID": "ead652b5-1cc6-411b-9e1b-8d9fcd1114c9", "DetectTime": "2024-05-21T12:55:04.662425+00:00", "EventTime": "2024-05-21T12:55:04.662444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CiEp4YgmzA7VMOgl"], "accumulated_threat_level": 12.500000000000004, "timewindow": 193} +{"Format": "Json", "ID": "ead652b5-1cc6-411b-9e1b-8d9fcd1114c9", "DetectTime": "2024-05-21T12:55:04.662425+00:00", "EventTime": "2024-05-21T12:55:04.662444+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-09T00:03:05.146243+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2024/05/21 12:55:04.892372)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 193, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "90930823-1068-4648-a804-8262ac4cb5ed", "DetectTime": "2024-05-21T12:55:04.945924+00:00", "EventTime": "2024-05-21T12:55:04.945946+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMHJd3wXqFq4qT61k"], "accumulated_threat_level": 0.8, "timewindow": 193} +{"Format": "IDEA0", "ID": "ce19c06f-5f25-464c-99a0-3f572360034f", "DetectTime": "2024-05-21T12:55:05.000018+00:00", "EventTime": "2024-05-21T12:55:05.000037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFqR17qFNidkU8bVk"], "accumulated_threat_level": 1.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "4f9cd1ba-bda1-4f91-8c50-bae4a5697c93", "DetectTime": "2024-05-21T12:55:05.051259+00:00", "EventTime": "2024-05-21T12:55:05.051278+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZ0wR2XPVsTlsKRf2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 193} +{"Format": "IDEA0", "ID": "bc58116a-08f1-4bf6-ab32-226b229f22c6", "DetectTime": "2024-05-21T12:55:05.110944+00:00", "EventTime": "2024-05-21T12:55:05.110962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpg8691nTUtEmtO5Ac"], "accumulated_threat_level": 3.2, "timewindow": 193} +{"Format": "IDEA0", "ID": "2f5d194d-4a09-45b8-b3d2-cfc21661a25e", "DetectTime": "2024-05-21T12:55:05.158670+00:00", "EventTime": "2024-05-21T12:55:05.158693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUkPLf4HylQ07yVe"], "accumulated_threat_level": 4.0, "timewindow": 193} +{"Format": "IDEA0", "ID": "d781f5c0-de93-424e-81bf-529f6fb0226f", "DetectTime": "2024-05-21T12:55:05.198669+00:00", "EventTime": "2024-05-21T12:55:05.198703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcKzgo4o8Luez8P1Md"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "709c76de-ba2e-4a6b-8568-439f83617770", "DetectTime": "2024-05-21T12:55:05.271966+00:00", "EventTime": "2024-05-21T12:55:05.271985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrAsow2mnPpjaw82te"], "accumulated_threat_level": 4.8, "timewindow": 193} +{"Format": "IDEA0", "ID": "25d3b117-bf47-41ae-b40c-a1ca35021059", "DetectTime": "2024-05-21T12:55:05.325859+00:00", "EventTime": "2024-05-21T12:55:05.325881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxKeIp4GO5KvHNavmf"], "accumulated_threat_level": 5.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "43954819-4b3e-4ca2-9c91-5397f7d86453", "DetectTime": "2024-05-21T12:55:05.681831+00:00", "EventTime": "2024-05-21T12:55:05.681863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZcBpT2q1iEDU7p669"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 193} +{"Format": "IDEA0", "ID": "ea35d9ff-0ac4-4357-b63f-77c9e01c2021", "DetectTime": "2024-05-21T12:55:05.741119+00:00", "EventTime": "2024-05-21T12:55:05.741144+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtiTix29sbcbK8hNtg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "245ef8bb-9efd-4583-aff8-2719c43ebc64", "DetectTime": "2024-05-21T12:55:05.779634+00:00", "EventTime": "2024-05-21T12:55:05.779660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C63gUU39rRZkXeUjcl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "6c2af52d-adeb-4825-a5be-7b3828a7d692", "DetectTime": "2024-05-21T12:55:05.835230+00:00", "EventTime": "2024-05-21T12:55:05.835266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqs0vC38fxUCH9sema"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "0d04c913-9602-4248-a0d5-e73e366308f6", "DetectTime": "2024-05-21T12:55:05.885671+00:00", "EventTime": "2024-05-21T12:55:05.885706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg6pxk3RL1YEtE32Ta"], "accumulated_threat_level": 8.799999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "810d496a-14ab-48b2-8c00-47292de158a5", "DetectTime": "2024-05-21T12:55:05.939433+00:00", "EventTime": "2024-05-21T12:55:05.939461+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pi1i3cQcoEwmdh3c"], "accumulated_threat_level": 9.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "c4116194-e5ff-45c1-99b2-2648b535d01c", "DetectTime": "2024-05-21T12:55:06.209294+00:00", "EventTime": "2024-05-21T12:55:06.209315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnGkcVfO7JagHSXi"], "accumulated_threat_level": 10.4, "timewindow": 193} +{"Format": "IDEA0", "ID": "384d7d30-3027-443a-951c-1e692df8fc87", "DetectTime": "2024-05-21T12:55:06.299379+00:00", "EventTime": "2024-05-21T12:55:06.299402+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxEwCe1ejnk0WPeLxa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 193} +{"Format": "IDEA0", "ID": "0d8eec93-65d7-4c6d-9eef-29dc2d709e73", "DetectTime": "2024-05-21T12:55:06.400343+00:00", "EventTime": "2024-05-21T12:55:06.400361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cun81HSRUWziHe5P4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 193} +{"Format": "Json", "ID": "0d8eec93-65d7-4c6d-9eef-29dc2d709e73", "DetectTime": "2024-05-21T12:55:06.400343+00:00", "EventTime": "2024-05-21T12:55:06.400361+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "1970-01-09T00:33:18.334268+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2024/05/21 12:55:06.598574)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 193, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "9a5122a1-bc1d-473b-89cd-5e457562869a", "DetectTime": "2024-05-21T12:55:06.610153+00:00", "EventTime": "2024-05-21T12:55:06.610173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGG1D3qzyqR7jGps4"], "accumulated_threat_level": 0.8, "timewindow": 193} +{"Format": "IDEA0", "ID": "d7545c36-9fbf-4522-be02-1e00f7f5f2b1", "DetectTime": "2024-05-21T12:55:06.615487+00:00", "EventTime": "2024-05-21T12:55:06.615506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrwZc2QW6zlc8VlH4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "abf3512a-f5f1-4d76-ae77-289bfc5b64c9", "DetectTime": "2024-05-21T12:55:06.628511+00:00", "EventTime": "2024-05-21T12:55:06.628530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE23i3sYYGQd0LJcl"], "accumulated_threat_level": 1.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "b41106f0-02d5-43d6-acb6-1ec7f852b7d6", "DetectTime": "2024-05-21T12:55:06.889155+00:00", "EventTime": "2024-05-21T12:55:06.889192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTmcL2jf2iFg8ATke"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 193} +{"Format": "IDEA0", "ID": "6118d1bc-bfd3-42ee-890a-e7c0c65327b8", "DetectTime": "2024-05-21T12:55:06.947139+00:00", "EventTime": "2024-05-21T12:55:06.947173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsaw31aftkLX8RN45"], "accumulated_threat_level": 3.2, "timewindow": 193} +{"Format": "IDEA0", "ID": "aef07ace-df3f-49b8-b4c6-2267b5d5a208", "DetectTime": "2024-05-21T12:55:07.010517+00:00", "EventTime": "2024-05-21T12:55:07.010556+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBpzb2KLuOKNxDBlk"], "accumulated_threat_level": 4.0, "timewindow": 193} +{"Format": "IDEA0", "ID": "061232ed-a3c5-4df0-b5b7-eef329c48704", "DetectTime": "2024-05-21T12:55:07.050394+00:00", "EventTime": "2024-05-21T12:55:07.050429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVemVG3GjVqFM4TkS8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "b6efa899-2732-44bb-a411-229695635009", "DetectTime": "2024-05-21T12:55:07.095741+00:00", "EventTime": "2024-05-21T12:55:07.095764+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANbRP35mCrqJ0yHH4"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "f59e09ba-9d3a-4ea4-85f7-8073e8f83637", "DetectTime": "2024-05-21T12:55:07.112287+00:00", "EventTime": "2024-05-21T12:55:07.112306+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CANbRP35mCrqJ0yHH4"], "accumulated_threat_level": 4.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "8e26f59a-a68b-43aa-8571-029235f4be6f", "DetectTime": "2024-05-21T12:55:07.125670+00:00", "EventTime": "2024-05-21T12:55:07.125693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYU1ke1b6NSKYwKuf2"], "accumulated_threat_level": 4.8, "timewindow": 193} +{"Format": "IDEA0", "ID": "a5f0249a-ba59-4e12-b3dd-05aba2f9a730", "DetectTime": "2024-05-21T12:55:07.149043+00:00", "EventTime": "2024-05-21T12:55:07.149065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cbkaub1oyeHHxYDHDg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "5b76e63e-eb74-4258-8ad5-d58376bccef8", "DetectTime": "2024-05-21T12:55:07.335003+00:00", "EventTime": "2024-05-21T12:55:07.335033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfC5h39zrcpdfivRl"], "accumulated_threat_level": 5.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "d32a90c5-883a-40bb-852f-ea4e2389fd8e", "DetectTime": "2024-05-21T12:55:07.486344+00:00", "EventTime": "2024-05-21T12:55:07.486362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ350J1z3R6ixR0X56"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 193} +{"Format": "IDEA0", "ID": "9c26ec31-8ca6-475d-abe0-a93e59a81fcb", "DetectTime": "2024-05-21T12:55:07.540360+00:00", "EventTime": "2024-05-21T12:55:07.540380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRfAL2EjkbZScudJl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "0c9bd166-8129-4cd9-b791-c66e657ee36b", "DetectTime": "2024-05-21T12:55:07.597020+00:00", "EventTime": "2024-05-21T12:55:07.597039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFadV1XouNGyQFCN7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "409e2d05-e69a-4528-956c-88d1a26cf9d0", "DetectTime": "2024-05-21T12:55:07.649085+00:00", "EventTime": "2024-05-21T12:55:07.649105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5U15E3vtpR4sTGDY9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "22f5e7a7-1255-4fd0-b64a-9b655124a8cb", "DetectTime": "2024-05-21T12:55:07.704304+00:00", "EventTime": "2024-05-21T12:55:07.704323+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMoX03T6AlDXl2ZP7"], "accumulated_threat_level": 9.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "de25567e-2d5f-4a96-b8c6-b5d676862b6d", "DetectTime": "2024-05-21T12:55:07.751973+00:00", "EventTime": "2024-05-21T12:55:07.751994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36a3qgJeSMdP5JZ2"], "accumulated_threat_level": 10.4, "timewindow": 193} +{"Format": "IDEA0", "ID": "12439474-307b-42be-999c-e52090b8ac75", "DetectTime": "2024-05-21T12:55:08.015688+00:00", "EventTime": "2024-05-21T12:55:08.015706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy9TX1jwfPYplG3id"], "accumulated_threat_level": 11.200000000000001, "timewindow": 193} +{"Format": "IDEA0", "ID": "153c198e-7fbc-4afb-b4bc-5532efec97ec", "DetectTime": "2024-05-21T12:55:08.062420+00:00", "EventTime": "2024-05-21T12:55:08.062444+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClAstB4uI86RnJtWQd"], "accumulated_threat_level": 12.000000000000002, "timewindow": 193} +{"Format": "Json", "ID": "153c198e-7fbc-4afb-b4bc-5532efec97ec", "DetectTime": "2024-05-21T12:55:08.062420+00:00", "EventTime": "2024-05-21T12:55:08.062444+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-09T00:33:55.392413+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 193. (real time 2024/05/21 12:55:08.264106)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 193, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "dd3f6cde-614c-4520-ab95-3d003f2cbd42", "DetectTime": "2024-05-21T12:55:08.275513+00:00", "EventTime": "2024-05-21T12:55:08.275531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPK2sB3iZMHMWiXgJe"], "accumulated_threat_level": 0.8, "timewindow": 193} +{"Format": "IDEA0", "ID": "19661b3a-7efd-4d2d-b3ff-d029f67ce46e", "DetectTime": "2024-05-21T12:55:08.287449+00:00", "EventTime": "2024-05-21T12:55:08.287468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPqXd4lQbVQCX3Rid"], "accumulated_threat_level": 1.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "feb84611-0ab8-4d24-9379-becd9d703bd6", "DetectTime": "2024-05-21T12:55:08.300706+00:00", "EventTime": "2024-05-21T12:55:08.300724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJNxqa2kpepeC8HKNd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 193} +{"Format": "IDEA0", "ID": "944a74d4-d828-4e7e-aa1e-8480da310d98", "DetectTime": "2024-05-21T12:55:08.311212+00:00", "EventTime": "2024-05-21T12:55:08.311230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvXwwQ951jaR1BCQj"], "accumulated_threat_level": 3.2, "timewindow": 193} +{"Format": "IDEA0", "ID": "580ea0fb-5545-494e-bed8-26a8cd6af511", "DetectTime": "2024-05-21T12:55:08.315938+00:00", "EventTime": "2024-05-21T12:55:08.315956+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmRpC92iek4xX8F53j"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "c3ff79c3-1d04-40e5-9662-f9cfaef7ea63", "DetectTime": "2024-05-21T12:55:08.563229+00:00", "EventTime": "2024-05-21T12:55:08.563252+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHeoD3v2Fe0zOy8pa"], "accumulated_threat_level": 4.0, "timewindow": 193} +{"Format": "IDEA0", "ID": "b98d5639-59d5-4fc4-9b41-25ba58f45da5", "DetectTime": "2024-05-21T12:55:08.618652+00:00", "EventTime": "2024-05-21T12:55:08.618674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsaYW81NS0jCFnEtBj"], "accumulated_threat_level": 4.8, "timewindow": 193} +{"Format": "IDEA0", "ID": "0771d0a0-3616-4961-b7e0-73282e6a204a", "DetectTime": "2024-05-21T12:55:08.670201+00:00", "EventTime": "2024-05-21T12:55:08.670223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6rdXVDECjIOS1bl"], "accumulated_threat_level": 5.6, "timewindow": 193} +{"Format": "IDEA0", "ID": "c1aa328c-3ba6-472a-bb84-ce79db44cecd", "DetectTime": "2024-05-21T12:55:08.725999+00:00", "EventTime": "2024-05-21T12:55:08.726018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBrn327GhGkCS5MN6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 193} +{"Format": "IDEA0", "ID": "1cde7c06-d10a-4ac5-a368-4bbc2ad07691", "DetectTime": "2024-05-21T12:55:08.787573+00:00", "EventTime": "2024-05-21T12:55:08.787595+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7y8m4BWtOTXgwNMi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "be877ae5-f141-4848-ae6e-4c079ce2a2e7", "DetectTime": "2024-05-21T12:55:08.946264+00:00", "EventTime": "2024-05-21T12:55:08.946283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYpLgU2xWpCdRIkb8b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "50577da9-b241-4863-aa0f-15363feda27b", "DetectTime": "2024-05-21T12:55:09.046018+00:00", "EventTime": "2024-05-21T12:55:09.046038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GKq01MN0P2EVS7w1"], "accumulated_threat_level": 0.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "110d8a64-5543-4d9e-9c08-9bbcf9c2367e", "DetectTime": "2024-05-21T12:55:09.389748+00:00", "EventTime": "2024-05-21T12:55:09.389775+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5wXAw2qjbpJuvsi7"], "accumulated_threat_level": 1.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "d2fc44ab-ac18-4c16-aac3-947ac5326999", "DetectTime": "2024-05-21T12:55:09.429144+00:00", "EventTime": "2024-05-21T12:55:09.429168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9o5fX13FVTwQrAZvk"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 194} +{"Format": "IDEA0", "ID": "4355e104-26a4-4e8c-a480-ac3f4126602a", "DetectTime": "2024-05-21T12:55:09.539858+00:00", "EventTime": "2024-05-21T12:55:09.539876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9wyy2qVKIrT7WO7h"], "accumulated_threat_level": 3.2, "timewindow": 194} +{"Format": "IDEA0", "ID": "703d99db-065c-47b2-8048-241d354b334d", "DetectTime": "2024-05-21T12:55:09.545436+00:00", "EventTime": "2024-05-21T12:55:09.545458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7oWe344hSzLsekZR1"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "3a565c9b-45c1-4c8f-bf5c-e75b519cb4ad", "DetectTime": "2024-05-21T12:55:09.636442+00:00", "EventTime": "2024-05-21T12:55:09.636462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMd6XB2AINvhSzKub"], "accumulated_threat_level": 4.0, "timewindow": 194} +{"Format": "IDEA0", "ID": "f2192b40-c073-468f-adb3-933c73338e67", "DetectTime": "2024-05-21T12:55:09.694766+00:00", "EventTime": "2024-05-21T12:55:09.695169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWWeR0zTsz53a7bc"], "accumulated_threat_level": 4.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "3693382e-a627-4494-b0a3-2c66197d33e9", "DetectTime": "2024-05-21T12:55:09.971689+00:00", "EventTime": "2024-05-21T12:55:09.971712+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqbtQz2kim1gBCcPh"], "accumulated_threat_level": 5.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "d5ad7fd6-712d-434b-8b13-134b52c3f2b6", "DetectTime": "2024-05-21T12:55:10.021468+00:00", "EventTime": "2024-05-21T12:55:10.021492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAvsK2pV5Om2IK8Vk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "fac02bcc-6fb8-471e-adb5-a9a5f65f4c15", "DetectTime": "2024-05-21T12:55:10.075507+00:00", "EventTime": "2024-05-21T12:55:10.075527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycqI34t1kt8L3xd3f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "d11859d5-bff3-4192-b278-d66b765e6738", "DetectTime": "2024-05-21T12:55:10.130008+00:00", "EventTime": "2024-05-21T12:55:10.130028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zDNZ2bHFCdNLl1pa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "8d530fae-510a-4e81-8d16-7c3476695f95", "DetectTime": "2024-05-21T12:55:10.182057+00:00", "EventTime": "2024-05-21T12:55:10.182076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDezmplABUZzMEMrj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "a0793fab-3ff5-4b23-afed-d79306d66afb", "DetectTime": "2024-05-21T12:55:10.235263+00:00", "EventTime": "2024-05-21T12:55:10.235284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChgBI31XMAwIJ69je7"], "accumulated_threat_level": 9.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "4a3e2d2b-4203-40f5-9dab-0c3336ced69c", "DetectTime": "2024-05-21T12:55:10.286719+00:00", "EventTime": "2024-05-21T12:55:10.286739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CST01u4K5Y4elBqa2j"], "accumulated_threat_level": 10.4, "timewindow": 194} +{"Format": "IDEA0", "ID": "55f815b4-312c-44fa-99db-d15ee9592dee", "DetectTime": "2024-05-21T12:55:10.337950+00:00", "EventTime": "2024-05-21T12:55:10.337968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgBj538omEXBeiuq5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 194} +{"Format": "IDEA0", "ID": "42e62f06-64ab-4579-8693-7782e90c387b", "DetectTime": "2024-05-21T12:55:10.354954+00:00", "EventTime": "2024-05-21T12:55:10.354973+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIGKnm1OA6Z3b2CUX9"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "f8d50989-8800-416a-9053-1c613df3c4d5", "DetectTime": "2024-05-21T12:55:10.369243+00:00", "EventTime": "2024-05-21T12:55:10.369262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIGKnm1OA6Z3b2CUX9"], "accumulated_threat_level": 5.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "b1a218aa-dcd1-49d4-8ddd-b1ce0282c8f3", "DetectTime": "2024-05-21T12:55:10.601578+00:00", "EventTime": "2024-05-21T12:55:10.601598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9bwU1NOmwMAlE3L7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 194} +{"Format": "Json", "ID": "b1a218aa-dcd1-49d4-8ddd-b1ce0282c8f3", "DetectTime": "2024-05-21T12:55:10.601578+00:00", "EventTime": "2024-05-21T12:55:10.601598+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-09T01:04:56.767804+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2024/05/21 12:55:10.906758)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 194, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "ff0a2d1b-c292-46b1-a4a1-4cea9b75c43d", "DetectTime": "2024-05-21T12:55:10.921354+00:00", "EventTime": "2024-05-21T12:55:10.921373+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIMjh2U6GALFBUDc2"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "99eb4122-e5d6-4550-a67d-95c336dec063", "DetectTime": "2024-05-21T12:55:10.935196+00:00", "EventTime": "2024-05-21T12:55:10.935216+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVIMjh2U6GALFBUDc2"], "accumulated_threat_level": 5.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "17d9813c-a6c3-4934-8004-cdb31712a7f3", "DetectTime": "2024-05-21T12:55:10.952460+00:00", "EventTime": "2024-05-21T12:55:10.952481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4RFYb4Jyp9oig6wKb"], "accumulated_threat_level": 0.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "68ce00ca-d6ab-4ea3-9a89-0a1583c46630", "DetectTime": "2024-05-21T12:55:10.965743+00:00", "EventTime": "2024-05-21T12:55:10.965765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXCjy10uQ5daIEjgk"], "accumulated_threat_level": 1.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "21969267-376f-4f1c-9aed-1b945003ef21", "DetectTime": "2024-05-21T12:55:10.977125+00:00", "EventTime": "2024-05-21T12:55:10.977142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck4EDW3GlxDj1fZAK3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 194} +{"Format": "IDEA0", "ID": "7099bf95-d2ad-46fa-b010-d2473681a166", "DetectTime": "2024-05-21T12:55:10.981852+00:00", "EventTime": "2024-05-21T12:55:10.981870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6snao3j6nwG9M3cW8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "09a7e347-ebba-4ab8-af13-8ac60fef5213", "DetectTime": "2024-05-21T12:55:11.015876+00:00", "EventTime": "2024-05-21T12:55:11.015900+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyVNw2MLl4uIMDgRl"], "accumulated_threat_level": 3.2, "timewindow": 194} +{"Format": "IDEA0", "ID": "ade0367c-585a-43a7-ad92-783a685e90c5", "DetectTime": "2024-05-21T12:55:11.298500+00:00", "EventTime": "2024-05-21T12:55:11.298520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3vBVwsN2icE9dOj"], "accumulated_threat_level": 4.0, "timewindow": 194} +{"Format": "IDEA0", "ID": "2f8c4dab-cff9-4594-86f9-4cca090a9258", "DetectTime": "2024-05-21T12:55:11.352441+00:00", "EventTime": "2024-05-21T12:55:11.352459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfrdzu12AhWDUILFZ9"], "accumulated_threat_level": 4.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "09095b15-d3ca-4e38-a9b5-d44cbf454fb4", "DetectTime": "2024-05-21T12:55:11.406243+00:00", "EventTime": "2024-05-21T12:55:11.406263+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGzLk2EJBmWJYGIse"], "accumulated_threat_level": 5.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "194f3d31-7a59-4f42-bef8-b798c13b3994", "DetectTime": "2024-05-21T12:55:11.459313+00:00", "EventTime": "2024-05-21T12:55:11.459333+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyTaX1roZ6gNaK3u7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "8d4f73e4-6342-4733-800e-38061b237976", "DetectTime": "2024-05-21T12:55:11.509536+00:00", "EventTime": "2024-05-21T12:55:11.509554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJB0gi1DrpytfUsGMa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "f2c4b8bb-fbfe-4f90-be30-ca70224be8de", "DetectTime": "2024-05-21T12:55:11.569647+00:00", "EventTime": "2024-05-21T12:55:11.569668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdCD0C27T5l1IiikI9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "71eefa0d-f809-49be-87bd-9802b58c1e81", "DetectTime": "2024-05-21T12:55:11.846270+00:00", "EventTime": "2024-05-21T12:55:11.846289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6MK6O1DD7PChXGzN4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "32d4f1df-73a4-4d96-b74b-f5315b66cda3", "DetectTime": "2024-05-21T12:55:11.933961+00:00", "EventTime": "2024-05-21T12:55:11.933984+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiW4ki2VahQXIOFcUe"], "accumulated_threat_level": 9.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "b2c9de33-6561-458a-bcf4-6507b6d1a04e", "DetectTime": "2024-05-21T12:55:11.996824+00:00", "EventTime": "2024-05-21T12:55:11.996843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ifb113BP97n9gKRf"], "accumulated_threat_level": 10.4, "timewindow": 194} +{"Format": "IDEA0", "ID": "2ce07536-65ab-429b-a988-3811c743ecb9", "DetectTime": "2024-05-21T12:55:12.170916+00:00", "EventTime": "2024-05-21T12:55:12.170935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2jzQ2xyqQZ6bQY34"], "accumulated_threat_level": 11.200000000000001, "timewindow": 194} +{"Format": "IDEA0", "ID": "c7ba6640-6f82-45c7-b85f-0e4045d01930", "DetectTime": "2024-05-21T12:55:12.187880+00:00", "EventTime": "2024-05-21T12:55:12.187898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QqqF9R8BKNH3aak"], "accumulated_threat_level": 12.000000000000002, "timewindow": 194} +{"Format": "Json", "ID": "c7ba6640-6f82-45c7-b85f-0e4045d01930", "DetectTime": "2024-05-21T12:55:12.187880+00:00", "EventTime": "2024-05-21T12:55:12.187898+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "1970-01-09T01:35:41.020596+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2024/05/21 12:55:12.366877)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 194, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "acc70c95-6531-4748-9410-f31e2cb077cc", "DetectTime": "2024-05-21T12:55:12.379605+00:00", "EventTime": "2024-05-21T12:55:12.379632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsoG2i3UTQ75YY0Y7"], "accumulated_threat_level": 0.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "c4fabb69-c6ed-4399-a49f-3845dd533de5", "DetectTime": "2024-05-21T12:55:12.393694+00:00", "EventTime": "2024-05-21T12:55:12.393715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDftG91pvy6m9gPrP8"], "accumulated_threat_level": 1.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "69f1a6d1-ae17-4a2d-9948-3182c4d6121a", "DetectTime": "2024-05-21T12:55:12.411552+00:00", "EventTime": "2024-05-21T12:55:12.411570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qw2u35V3wqgh0nN6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 194} +{"Format": "IDEA0", "ID": "98321517-620a-4607-b9f4-97be553a5834", "DetectTime": "2024-05-21T12:55:12.609780+00:00", "EventTime": "2024-05-21T12:55:12.609802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsBueW27HiCf2QS358"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "155c01ff-8edf-4842-8b31-cd623514be48", "DetectTime": "2024-05-21T12:55:12.663100+00:00", "EventTime": "2024-05-21T12:55:12.663119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7iTL16uFHCslnyL6"], "accumulated_threat_level": 3.2, "timewindow": 194} +{"Format": "IDEA0", "ID": "9c79a86d-de39-4048-a667-c62cf8a154de", "DetectTime": "2024-05-21T12:55:12.714041+00:00", "EventTime": "2024-05-21T12:55:12.714067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RWude9bKUNoqJI9"], "accumulated_threat_level": 4.0, "timewindow": 194} +{"Format": "IDEA0", "ID": "161d3be2-c48c-4e08-81a1-1bba06126384", "DetectTime": "2024-05-21T12:55:12.768460+00:00", "EventTime": "2024-05-21T12:55:12.768481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cie0V73GA2fHoZA1J7"], "accumulated_threat_level": 4.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "1f572c4c-52d9-4077-8f21-3cd3dc8e695e", "DetectTime": "2024-05-21T12:55:12.823311+00:00", "EventTime": "2024-05-21T12:55:12.823330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31KOc1EUa3BW2nRha"], "accumulated_threat_level": 5.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "71b6066f-9136-4cf0-9208-158e2502d8e2", "DetectTime": "2024-05-21T12:55:12.875340+00:00", "EventTime": "2024-05-21T12:55:12.875359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LQHH3cmDWJSfXW7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "e662aac0-f684-429d-8978-009542e33f77", "DetectTime": "2024-05-21T12:55:13.140528+00:00", "EventTime": "2024-05-21T12:55:13.140549+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3a9Vz2dxRVLXjANf1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "b28fafd0-73b5-483c-93fa-be1b05f194ee", "DetectTime": "2024-05-21T12:55:13.193211+00:00", "EventTime": "2024-05-21T12:55:13.193231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkX5ApMYRxGovgRa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "220a73c2-b61a-4ba9-9349-7ff38af50cdd", "DetectTime": "2024-05-21T12:55:13.249882+00:00", "EventTime": "2024-05-21T12:55:13.249903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmOR5atHT4qx9sPod"], "accumulated_threat_level": 8.799999999999999, "timewindow": 194} +{"Format": "IDEA0", "ID": "036d35ac-0637-41fb-9960-4113a3b26f5a", "DetectTime": "2024-05-21T12:55:13.296148+00:00", "EventTime": "2024-05-21T12:55:13.296168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7Mtz3sDvVs0LOKef"], "accumulated_threat_level": 9.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "10d2a358-9333-4136-9212-8f41266671e8", "DetectTime": "2024-05-21T12:55:13.352879+00:00", "EventTime": "2024-05-21T12:55:13.352897+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsfFITN9ttNWIa9j"], "accumulated_threat_level": 10.4, "timewindow": 194} +{"Format": "IDEA0", "ID": "5b39a3bc-f010-4d0e-9f42-f6866893c91c", "DetectTime": "2024-05-21T12:55:13.398404+00:00", "EventTime": "2024-05-21T12:55:13.398443+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jled12V8N2o5Knl3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 194} +{"Format": "IDEA0", "ID": "2175447e-5f87-4938-9070-161e52c9cd7c", "DetectTime": "2024-05-21T12:55:13.651297+00:00", "EventTime": "2024-05-21T12:55:13.651320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDZJNCFIb5cDT75d4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "2354b2ca-dcbf-4085-9255-e289a09bf6d8", "DetectTime": "2024-05-21T12:55:13.699727+00:00", "EventTime": "2024-05-21T12:55:13.699750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQd2VE3dClaAhX65Y3"], "accumulated_threat_level": 12.000000000000002, "timewindow": 194} +{"Format": "Json", "ID": "2354b2ca-dcbf-4085-9255-e289a09bf6d8", "DetectTime": "2024-05-21T12:55:13.699727+00:00", "EventTime": "2024-05-21T12:55:13.699750+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-09T01:35:58.775779+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 194. (real time 2024/05/21 12:55:13.924736)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 194, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c515cb53-8720-4a8c-a3bc-6a8f6e6659d1", "DetectTime": "2024-05-21T12:55:13.936979+00:00", "EventTime": "2024-05-21T12:55:13.936998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ahG94e8NaBCrwte3"], "accumulated_threat_level": 0.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "3a8717b6-1b53-4c0c-a955-dff0a09e7528", "DetectTime": "2024-05-21T12:55:13.947844+00:00", "EventTime": "2024-05-21T12:55:13.947863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDhkw1Y7tpN4ag3Jh"], "accumulated_threat_level": 1.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "960d9d00-7de2-4eed-80aa-cefe9bd581a6", "DetectTime": "2024-05-21T12:55:13.958156+00:00", "EventTime": "2024-05-21T12:55:13.958175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu17Qk1KzN06agSwie"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 194} +{"Format": "IDEA0", "ID": "9f736ffb-2659-4f65-80b6-a9b37972080c", "DetectTime": "2024-05-21T12:55:13.970070+00:00", "EventTime": "2024-05-21T12:55:13.970091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZ5BsAAFkrCbVCh7"], "accumulated_threat_level": 3.2, "timewindow": 194} +{"Format": "IDEA0", "ID": "df616f83-15fe-4bdd-8f51-e5fd24b984d0", "DetectTime": "2024-05-21T12:55:13.983975+00:00", "EventTime": "2024-05-21T12:55:13.983999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHnKoG3qdmvx5OTZFa"], "accumulated_threat_level": 4.0, "timewindow": 194} +{"Format": "IDEA0", "ID": "ae148216-b0b3-4941-a86f-7a2dcdc024a2", "DetectTime": "2024-05-21T12:55:14.160019+00:00", "EventTime": "2024-05-21T12:55:14.160039+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.97.55"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjxnc3dNFUduODgk2"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "0ac9a55e-7f1b-4280-b748-809284bd69da", "DetectTime": "2024-05-21T12:55:14.176285+00:00", "EventTime": "2024-05-21T12:55:14.176308+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNjxnc3dNFUduODgk2"], "accumulated_threat_level": 6.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "31ddaba2-c219-4437-9ec4-9ea7a9a23457", "DetectTime": "2024-05-21T12:55:14.219476+00:00", "EventTime": "2024-05-21T12:55:14.219494+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PsXT1pKBpYgWpAi2"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "c0580837-f4e4-4a53-a416-83067fb4b9bc", "DetectTime": "2024-05-21T12:55:14.238039+00:00", "EventTime": "2024-05-21T12:55:14.238072+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6PsXT1pKBpYgWpAi2"], "accumulated_threat_level": 6.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "f6bd02fe-9a5c-4251-8367-c179b0a90acc", "DetectTime": "2024-05-21T12:55:14.290596+00:00", "EventTime": "2024-05-21T12:55:14.290619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPKmar1vVXBED8WSdd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "302f6d90-e876-4ea6-88c1-e9816bd14666", "DetectTime": "2024-05-21T12:55:14.339485+00:00", "EventTime": "2024-05-21T12:55:14.339507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Z40q4q5Vi643AETl"], "accumulated_threat_level": 4.8, "timewindow": 194} +{"Format": "IDEA0", "ID": "d6f43899-5c89-4785-9f28-3c167b097771", "DetectTime": "2024-05-21T12:55:14.398834+00:00", "EventTime": "2024-05-21T12:55:14.398859+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8XvL1cx5CpqqLTii"], "accumulated_threat_level": 5.6, "timewindow": 194} +{"Format": "IDEA0", "ID": "8a338151-d62e-4ac0-ab2c-1f764c5e825b", "DetectTime": "2024-05-21T12:55:14.431546+00:00", "EventTime": "2024-05-21T12:55:14.431566+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.61.86.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYkE14HKS1e0Egb45"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "cd955b1c-d8ab-4a38-8d13-769b25eb1510", "DetectTime": "2024-05-21T12:55:14.449120+00:00", "EventTime": "2024-05-21T12:55:14.449143+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYkE14HKS1e0Egb45"], "accumulated_threat_level": 7.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "1f6fef13-1a1a-4a04-b9b6-48634e09e82d", "DetectTime": "2024-05-21T12:55:14.466121+00:00", "EventTime": "2024-05-21T12:55:14.466140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrGUt4sjfeqj0tiw1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "0e808b9f-20fb-485a-ba93-65f13038646b", "DetectTime": "2024-05-21T12:55:14.484207+00:00", "EventTime": "2024-05-21T12:55:14.484229+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSVQG1ld7xHgGMUA6"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "101405fe-3e53-4a23-9b14-1f24abc226bc", "DetectTime": "2024-05-21T12:55:14.500669+00:00", "EventTime": "2024-05-21T12:55:14.500689+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXSVQG1ld7xHgGMUA6"], "accumulated_threat_level": 7.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "10520bf4-c600-412d-9da5-7010d40b4fd2", "DetectTime": "2024-05-21T12:55:14.506112+00:00", "EventTime": "2024-05-21T12:55:14.506131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc1eQ12lm5nCku2Bkl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "649def86-45ba-44af-8fdc-b4f77bfa910b", "DetectTime": "2024-05-21T12:55:14.528810+00:00", "EventTime": "2024-05-21T12:55:14.528829+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.72.219.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCSwtm2w5JFQCdUc52"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "72f2d832-bd3d-476e-8478-c5a393928832", "DetectTime": "2024-05-21T12:55:14.543057+00:00", "EventTime": "2024-05-21T12:55:14.543078+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCSwtm2w5JFQCdUc52"], "accumulated_threat_level": 8.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "72a6e4c2-ad8a-458e-84d5-672f212ee0cb", "DetectTime": "2024-05-21T12:55:14.557576+00:00", "EventTime": "2024-05-21T12:55:14.557597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COnyzc3TJhrawmr3w8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "5c989980-a1dd-4775-b211-a7995af8ecb3", "DetectTime": "2024-05-21T12:55:14.574705+00:00", "EventTime": "2024-05-21T12:55:14.574725+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.140.158.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnZ7xDqgzchIptknf"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "723ba4a6-a72a-40e4-9900-42c50d6e74d6", "DetectTime": "2024-05-21T12:55:14.588554+00:00", "EventTime": "2024-05-21T12:55:14.588574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnZ7xDqgzchIptknf"], "accumulated_threat_level": 8.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "00f7ed2b-4cfe-4002-afc7-3391379d1d7f", "DetectTime": "2024-05-21T12:55:14.861824+00:00", "EventTime": "2024-05-21T12:55:14.861845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLWTIoWXDF9vhO9o9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "c33011b9-5324-4e43-be5d-d5e52c75e5be", "DetectTime": "2024-05-21T12:55:14.906426+00:00", "EventTime": "2024-05-21T12:55:14.906446+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.254.84.17"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR8t2p1lvD6Qc5cDM2"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "afdf84ac-da8c-4bf0-9ebf-d0c149c517a9", "DetectTime": "2024-05-21T12:55:14.922295+00:00", "EventTime": "2024-05-21T12:55:14.922321+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR8t2p1lvD6Qc5cDM2"], "accumulated_threat_level": 9.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "01cd168a-3c0b-486b-8e26-b54ad0bf775e", "DetectTime": "2024-05-21T12:55:14.927995+00:00", "EventTime": "2024-05-21T12:55:14.928014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjAJk617gtusTsVkk2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "8fe50a0a-518f-48f7-9340-df3f01549464", "DetectTime": "2024-05-21T12:55:14.933852+00:00", "EventTime": "2024-05-21T12:55:14.933873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTN9t1t4HdQMsbwG9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "40ebd1fd-615b-4045-9277-4ef1239f0925", "DetectTime": "2024-05-21T12:55:15.068490+00:00", "EventTime": "2024-05-21T12:55:15.068508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV5D6SkIpW3FiFX6"], "accumulated_threat_level": 0.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "2e8edc5c-69e4-4dd3-9fab-a320532f8b3a", "DetectTime": "2024-05-21T12:55:15.081866+00:00", "EventTime": "2024-05-21T12:55:15.081888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2qlSacrpdLrURZy4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "1b6cfdeb-b7e1-4e88-8925-de979835a5f4", "DetectTime": "2024-05-21T12:55:15.132022+00:00", "EventTime": "2024-05-21T12:55:15.132044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCFyoW3nrxKBXoRO9c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "3f2b4eee-1593-4b7c-b681-6991f37e8685", "DetectTime": "2024-05-21T12:55:15.185540+00:00", "EventTime": "2024-05-21T12:55:15.185561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCS4BFjvKoytMLbBd"], "accumulated_threat_level": 1.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "d46df6aa-b19b-47c6-a366-28e98754e9a2", "DetectTime": "2024-05-21T12:55:15.470986+00:00", "EventTime": "2024-05-21T12:55:15.471009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CagfaG49plQ2P2edAf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "3d57f465-5d10-4853-abdd-58f422df11bd", "DetectTime": "2024-05-21T12:55:15.599044+00:00", "EventTime": "2024-05-21T12:55:15.599065+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXG3QC3vCNwLdSkB7e"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "e2918cbb-8ba0-4311-8c78-436109fcd9d2", "DetectTime": "2024-05-21T12:55:15.634163+00:00", "EventTime": "2024-05-21T12:55:15.634183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cjr3W73uWKVxvKijR3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "dca0aa93-38e3-47ff-9f6a-6f775b4c632a", "DetectTime": "2024-05-21T12:55:15.657298+00:00", "EventTime": "2024-05-21T12:55:15.657315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDSsV1Wze2Psnq5we"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 195} +{"Format": "IDEA0", "ID": "2426d160-46bd-4632-8417-bc02b1d643a9", "DetectTime": "2024-05-21T12:55:15.764141+00:00", "EventTime": "2024-05-21T12:55:15.764165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPSBOJ34Fv5zvxC1R9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "28555f3a-4948-4f83-a34f-c4f0b547d8f5", "DetectTime": "2024-05-21T12:55:15.836988+00:00", "EventTime": "2024-05-21T12:55:15.837011+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHH8Si4IbyM28rlXN5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "581d627e-028b-4471-9397-0dcef4dd8a3a", "DetectTime": "2024-05-21T12:55:16.111510+00:00", "EventTime": "2024-05-21T12:55:16.111534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg18mv1oPNz9Y9Wsoh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "6e2eb581-aebd-44f1-b2e7-364be6f9c41f", "DetectTime": "2024-05-21T12:55:16.117381+00:00", "EventTime": "2024-05-21T12:55:16.117400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA542i1q43X6Pni6ia"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "78c9a5c0-cc73-4170-9474-ac33fb4aba4d", "DetectTime": "2024-05-21T12:55:16.211886+00:00", "EventTime": "2024-05-21T12:55:16.211912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPuyjD1l48lgP8v5Ri"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "8c551f73-5394-47bc-a997-b2d6a013f8d4", "DetectTime": "2024-05-21T12:55:16.259122+00:00", "EventTime": "2024-05-21T12:55:16.259147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy02Zf3fBdUYsvqsD1"], "accumulated_threat_level": 3.2, "timewindow": 195} +{"Format": "IDEA0", "ID": "5d1cc914-17b2-4ed1-aeb1-7227bdfed093", "DetectTime": "2024-05-21T12:55:16.376326+00:00", "EventTime": "2024-05-21T12:55:16.376347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3hz6p46b6i2pT11je"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "fb9f22cc-1731-4f90-88fa-51fcc2079080", "DetectTime": "2024-05-21T12:55:16.400931+00:00", "EventTime": "2024-05-21T12:55:16.400954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdHv2j3cfcEHoYZpGf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "a1c76b28-ede9-455d-b79f-ef1b79daa52e", "DetectTime": "2024-05-21T12:55:16.484029+00:00", "EventTime": "2024-05-21T12:55:16.484054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTktdTYizJZ8B8uck"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "ae2b7861-e03c-4d41-9003-aeabd2a7a351", "DetectTime": "2024-05-21T12:55:16.835214+00:00", "EventTime": "2024-05-21T12:55:16.835237+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiNufJ3iLFcTGPP091"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "b3ef6d82-3c95-4a16-8302-53f1c0235ab9", "DetectTime": "2024-05-21T12:55:16.855062+00:00", "EventTime": "2024-05-21T12:55:16.855082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtGSl2wE210Y5WADf"], "accumulated_threat_level": 4.0, "timewindow": 195} +{"Format": "IDEA0", "ID": "1dffea17-969f-4a25-a455-b3b01790ea89", "DetectTime": "2024-05-21T12:55:16.859949+00:00", "EventTime": "2024-05-21T12:55:16.859967+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cd3sSr4nhaCdSuYNJ5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "4865fc43-1e6b-4e77-9c42-2fc0a8b84dbf", "DetectTime": "2024-05-21T12:55:16.864488+00:00", "EventTime": "2024-05-21T12:55:16.864506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsTHSY1Fp1KBdFNS9k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "1f5902e2-e3c9-4a4d-b7c7-ebefb6db1dd6", "DetectTime": "2024-05-21T12:55:17.010605+00:00", "EventTime": "2024-05-21T12:55:17.010627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCsAbD2ZzJs7ASUyYj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "36515c0f-4b39-4e2b-80b9-f475d3a4281f", "DetectTime": "2024-05-21T12:55:17.029786+00:00", "EventTime": "2024-05-21T12:55:17.029807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8JuBU3CXcCISjuSYb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "77ec7a1f-8763-4573-b780-470b23d8c864", "DetectTime": "2024-05-21T12:55:17.424896+00:00", "EventTime": "2024-05-21T12:55:17.424917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZC28B1ESo9Z5ov1W4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "042878d0-02dc-4445-a8d7-6df3b6f78255", "DetectTime": "2024-05-21T12:55:17.439480+00:00", "EventTime": "2024-05-21T12:55:17.439502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1ESb1tLn0Tvym8Hg"], "accumulated_threat_level": 4.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "2d9dd7e0-a87a-474a-a7d1-e252a3501ce6", "DetectTime": "2024-05-21T12:55:17.445697+00:00", "EventTime": "2024-05-21T12:55:17.445718+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD2Fbq1RVKmyDId832"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "879db61a-da25-4461-b769-262c19ae1225", "DetectTime": "2024-05-21T12:55:17.450943+00:00", "EventTime": "2024-05-21T12:55:17.450962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfdBfZwyVVkcNQHP7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "50bd6e69-530c-4fc9-9163-59284e6ac4c4", "DetectTime": "2024-05-21T12:55:17.455867+00:00", "EventTime": "2024-05-21T12:55:17.455887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkaoPK2PZvaKXrbxq7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "feca0139-f232-4387-84ac-8000a3656c7a", "DetectTime": "2024-05-21T12:55:17.556810+00:00", "EventTime": "2024-05-21T12:55:17.556831+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPiKat4GAunjcZqAr8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "97277b4d-7dc3-4d67-ae2c-6933de73cd1d", "DetectTime": "2024-05-21T12:55:17.570941+00:00", "EventTime": "2024-05-21T12:55:17.570962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBPuc14hLKaeF38Lkd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "6a200a90-9a43-4649-88ba-82dc4713d078", "DetectTime": "2024-05-21T12:55:17.900678+00:00", "EventTime": "2024-05-21T12:55:17.900699+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYRuni1qjBu0d2eta5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "a81a28f7-3c27-48b0-b8a6-b6ffe6788b8e", "DetectTime": "2024-05-21T12:55:18.025554+00:00", "EventTime": "2024-05-21T12:55:18.025577+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjdgzM393VxzWNgAha"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "d40bd0c0-512f-42f9-bb5f-0fbc2b6d24c6", "DetectTime": "2024-05-21T12:55:18.032168+00:00", "EventTime": "2024-05-21T12:55:18.032189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgffp4O73QLN25R6b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "c581141b-739b-4295-8a31-788f593760cc", "DetectTime": "2024-05-21T12:55:18.037760+00:00", "EventTime": "2024-05-21T12:55:18.037777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbtNyhHJ10s1ZBdIl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "e89394d1-fa98-49b2-b284-3024505f8c59", "DetectTime": "2024-05-21T12:55:18.056070+00:00", "EventTime": "2024-05-21T12:55:18.056087+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7UUxO46dsw9ap4b"], "accumulated_threat_level": 5.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "887c7602-87b0-4dba-b091-41c1e1155019", "DetectTime": "2024-05-21T12:55:18.127599+00:00", "EventTime": "2024-05-21T12:55:18.127620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CndEuo1K4tY0NbPCH"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "da2f70f3-e80e-421d-a439-ec953c23b901", "DetectTime": "2024-05-21T12:55:18.173489+00:00", "EventTime": "2024-05-21T12:55:18.173508+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.139.188.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS20771 rDNS: host-78-139-188-50.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEe5qG4Hw2acAQSgRb"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "0c47ba95-6624-4cea-8494-96222aef7074", "DetectTime": "2024-05-21T12:55:18.188764+00:00", "EventTime": "2024-05-21T12:55:18.188792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS20771 rDNS: host-78-139-188-50.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEe5qG4Hw2acAQSgRb"], "accumulated_threat_level": 9.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "efe3de54-012d-4252-9caf-73f742b4c25a", "DetectTime": "2024-05-21T12:55:18.401599+00:00", "EventTime": "2024-05-21T12:55:18.401619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW56hRwDYhiECXLgj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "a579b2db-068e-44d5-b956-1eeb204a64a6", "DetectTime": "2024-05-21T12:55:18.448089+00:00", "EventTime": "2024-05-21T12:55:18.448110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cavb5W3OYRMRf88UFl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "66f1d71c-7ab7-4188-83d3-0974667a811e", "DetectTime": "2024-05-21T12:55:18.605231+00:00", "EventTime": "2024-05-21T12:55:18.605254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COBjCRMpPjH5AaiZ5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "264e2912-f462-4ba4-9c9c-3b285e1438fb", "DetectTime": "2024-05-21T12:55:18.724569+00:00", "EventTime": "2024-05-21T12:55:18.724590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFGRdLtDF5gysKoQb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "be74fb78-6c99-491e-9a79-1b407f02c7b6", "DetectTime": "2024-05-21T12:55:18.774843+00:00", "EventTime": "2024-05-21T12:55:18.774862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsCMg3HyATsyYLO7c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 195} +{"Format": "IDEA0", "ID": "c26249df-8e3b-428a-b174-3a77850bbc0c", "DetectTime": "2024-05-21T12:55:18.835169+00:00", "EventTime": "2024-05-21T12:55:18.835192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2rNPb3eibdZT0BQbb"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "c2669ce7-c037-412d-9d6c-536c9588955e", "DetectTime": "2024-05-21T12:55:19.159652+00:00", "EventTime": "2024-05-21T12:55:19.159672+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNCwuS1JuKeZj5xUwg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "57dc07da-2107-4d4e-9c9b-ca00743af85d", "DetectTime": "2024-05-21T12:55:19.186066+00:00", "EventTime": "2024-05-21T12:55:19.186086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnErA447apherQG7U4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "f3638375-91d8-45b5-9d3f-c435bb0a6da4", "DetectTime": "2024-05-21T12:55:19.367434+00:00", "EventTime": "2024-05-21T12:55:19.367454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chxtv33LKDQGwH8A79"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "7e113276-5c87-47fa-8982-794e8baf31bc", "DetectTime": "2024-05-21T12:55:19.381363+00:00", "EventTime": "2024-05-21T12:55:19.381388+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeDZUIEmSMxW28sV6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 192} +{"Format": "IDEA0", "ID": "b901d523-dc1a-4443-b402-a0d6b2b0d308", "DetectTime": "2024-05-21T12:55:19.390978+00:00", "EventTime": "2024-05-21T12:55:19.390999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH9cCt2unWQLXDeWj9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "24c20190-021b-4c37-b91b-605f1cc4593f", "DetectTime": "2024-05-21T12:55:19.408094+00:00", "EventTime": "2024-05-21T12:55:19.408117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMaY7t4TYqawmZAeNd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "c934921d-0348-415c-8d88-a2c8dd79983c", "DetectTime": "2024-05-21T12:55:19.417704+00:00", "EventTime": "2024-05-21T12:55:19.417725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVevQ82tO2Ls4c7733"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "fccd51c6-901c-4a55-9a30-1ded2dd197a9", "DetectTime": "2024-05-21T12:55:19.497552+00:00", "EventTime": "2024-05-21T12:55:19.497575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zBW72Rjb6mJE17If"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "55d53d8c-2b33-4fa7-9217-8ef1e9e4ca77", "DetectTime": "2024-05-21T12:55:19.831174+00:00", "EventTime": "2024-05-21T12:55:19.831196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVAeB3CGy6fuLDdAf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "1d1979b7-6885-4a53-9766-844bc091d952", "DetectTime": "2024-05-21T12:55:20.002892+00:00", "EventTime": "2024-05-21T12:55:20.002915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0I2IW1AZK3dsGZUQ6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "0b4abca6-e2a6-472c-92b3-1e889859d103", "DetectTime": "2024-05-21T12:55:20.097934+00:00", "EventTime": "2024-05-21T12:55:20.097958+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4EspA14KhAo5VjkG7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "c0762adb-58b4-460e-a781-fcbfa0c103b1", "DetectTime": "2024-05-21T12:55:20.192930+00:00", "EventTime": "2024-05-21T12:55:20.192953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQCxEwmMe7tpnqJh"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "7546259b-86ec-4858-93db-53878552a30c", "DetectTime": "2024-05-21T12:55:20.198378+00:00", "EventTime": "2024-05-21T12:55:20.198400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cagl6m2T5p9Mglw3h4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "227c217f-fcb4-4403-baa4-5c90827b682b", "DetectTime": "2024-05-21T12:55:20.223540+00:00", "EventTime": "2024-05-21T12:55:20.223561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIsXdQ2VLgI2JbaJhd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "7862f6a2-5a18-4bf3-a5c5-d018de99f357", "DetectTime": "2024-05-21T12:55:20.228656+00:00", "EventTime": "2024-05-21T12:55:20.228674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6CiEp4YgmzA7VMOgl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "d8e528ba-1924-4193-903c-7fdc783ecacf", "DetectTime": "2024-05-21T12:55:20.233185+00:00", "EventTime": "2024-05-21T12:55:20.233204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CveniR6DyypbIVl5f"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "70d7be5b-2415-436e-b108-fa1a73985aaa", "DetectTime": "2024-05-21T12:55:20.481767+00:00", "EventTime": "2024-05-21T12:55:20.481791+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMHJd3wXqFq4qT61k"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "f498c02d-5e6b-4b0c-ae58-9d4293507840", "DetectTime": "2024-05-21T12:55:20.487455+00:00", "EventTime": "2024-05-21T12:55:20.487474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnDyNa3mLR3lKNwIsg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "f0817400-b149-43cd-84a8-94f39618aaf3", "DetectTime": "2024-05-21T12:55:20.563124+00:00", "EventTime": "2024-05-21T12:55:20.563151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChZ0wR2XPVsTlsKRf2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "31b29af5-1cd4-49bc-bc48-0b2bf02ccbfa", "DetectTime": "2024-05-21T12:55:20.688378+00:00", "EventTime": "2024-05-21T12:55:20.688401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpg8691nTUtEmtO5Ac"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "39b3cc03-a128-40b9-b08b-5411aa157bcc", "DetectTime": "2024-05-21T12:55:20.742909+00:00", "EventTime": "2024-05-21T12:55:20.742934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFqR17qFNidkU8bVk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "15102ed7-9014-4486-94c5-6236cb915cf7", "DetectTime": "2024-05-21T12:55:20.978942+00:00", "EventTime": "2024-05-21T12:55:20.978965+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJUkPLf4HylQ07yVe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "42ad4e96-4105-493c-87ed-7a0931e7b969", "DetectTime": "2024-05-21T12:55:21.091029+00:00", "EventTime": "2024-05-21T12:55:21.091052+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrAsow2mnPpjaw82te"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "f8a40a8c-bbbe-4d78-a3c6-2d8656be89e5", "DetectTime": "2024-05-21T12:55:21.138332+00:00", "EventTime": "2024-05-21T12:55:21.138355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxKeIp4GO5KvHNavmf"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "1c28e718-6720-472b-906c-ebeeb808e211", "DetectTime": "2024-05-21T12:55:21.183796+00:00", "EventTime": "2024-05-21T12:55:21.183817+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNPZDy1QvMKdGn41mb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "7aa5dd66-b9ff-48b5-aeb6-ec7e27c9ad96", "DetectTime": "2024-05-21T12:55:21.189289+00:00", "EventTime": "2024-05-21T12:55:21.189310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZcBpT2q1iEDU7p669"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "0fc96509-5c29-4e44-94f7-d1751dadcd72", "DetectTime": "2024-05-21T12:55:21.227221+00:00", "EventTime": "2024-05-21T12:55:21.227244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg6pxk3RL1YEtE32Ta"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "f6ca4a82-af40-46eb-a58f-bc66885f720f", "DetectTime": "2024-05-21T12:55:21.244234+00:00", "EventTime": "2024-05-21T12:55:21.244256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtiTix29sbcbK8hNtg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "6abc8508-27cd-4921-a0ca-8e69dfa44426", "DetectTime": "2024-05-21T12:55:21.745308+00:00", "EventTime": "2024-05-21T12:55:21.745331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqs0vC38fxUCH9sema"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "20f73bd5-034b-4749-8dd6-13ce2cfa404f", "DetectTime": "2024-05-21T12:55:21.753478+00:00", "EventTime": "2024-05-21T12:55:21.753497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKnGkcVfO7JagHSXi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "4c8566b6-39a8-42db-9718-1b1db73bb9d5", "DetectTime": "2024-05-21T12:55:21.765474+00:00", "EventTime": "2024-05-21T12:55:21.765495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5pi1i3cQcoEwmdh3c"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "3bf7dda1-db9a-435e-9575-eb1fd62f7fe2", "DetectTime": "2024-05-21T12:55:21.770994+00:00", "EventTime": "2024-05-21T12:55:21.771013+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cun81HSRUWziHe5P4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "3314a5de-7f3e-4be1-b6c4-b7325b4700f5", "DetectTime": "2024-05-21T12:55:21.789437+00:00", "EventTime": "2024-05-21T12:55:21.789454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEOHut3j6pvsvzOhY9"], "accumulated_threat_level": 9.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "f9731f5e-a002-40fa-b605-e9e3c09c240b", "DetectTime": "2024-05-21T12:55:22.112068+00:00", "EventTime": "2024-05-21T12:55:22.112090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClGG1D3qzyqR7jGps4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "0d76ad3d-e10c-418c-b696-105d9da823c7", "DetectTime": "2024-05-21T12:55:22.263964+00:00", "EventTime": "2024-05-21T12:55:22.263987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxEwCe1ejnk0WPeLxa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "ce4035bb-6110-41d2-a12d-df0f4cb158b3", "DetectTime": "2024-05-21T12:55:22.397214+00:00", "EventTime": "2024-05-21T12:55:22.397235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtTmcL2jf2iFg8ATke"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "49c4c033-efb2-4265-8eae-45bc54c2e060", "DetectTime": "2024-05-21T12:55:22.471382+00:00", "EventTime": "2024-05-21T12:55:22.471403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTKS703ExWwCPzsZUl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "6b8c2b61-7615-45a9-88f3-19afeede3c67", "DetectTime": "2024-05-21T12:55:22.488891+00:00", "EventTime": "2024-05-21T12:55:22.488913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYU1ke1b6NSKYwKuf2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "9f6e4b95-ff00-4003-82d6-571b80b6868a", "DetectTime": "2024-05-21T12:55:22.807529+00:00", "EventTime": "2024-05-21T12:55:22.807548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3lYwI3pnGnLrDKyX4"], "accumulated_threat_level": 10.4, "timewindow": 195} +{"Format": "IDEA0", "ID": "dead60ba-3414-4468-b0af-598c30ff1444", "DetectTime": "2024-05-21T12:55:22.825385+00:00", "EventTime": "2024-05-21T12:55:22.825408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVE23i3sYYGQd0LJcl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "a69ff841-df31-431f-a118-31859a8cc55e", "DetectTime": "2024-05-21T12:55:22.849054+00:00", "EventTime": "2024-05-21T12:55:22.849077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNsaw31aftkLX8RN45"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "df2258b3-8757-46df-ba6f-dde4d8361355", "DetectTime": "2024-05-21T12:55:22.870736+00:00", "EventTime": "2024-05-21T12:55:22.870757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWBpzb2KLuOKNxDBlk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "74e2e03c-0a56-4633-8a74-f3ba8207c4df", "DetectTime": "2024-05-21T12:55:22.906185+00:00", "EventTime": "2024-05-21T12:55:22.906207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNfC5h39zrcpdfivRl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "c128250b-a826-42c3-b546-15e98f3c04db", "DetectTime": "2024-05-21T12:55:23.096425+00:00", "EventTime": "2024-05-21T12:55:23.096446+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfMoX03T6AlDXl2ZP7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "5836c017-e909-470c-b28a-b6e39258ba28", "DetectTime": "2024-05-21T12:55:23.150087+00:00", "EventTime": "2024-05-21T12:55:23.150108+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLRfAL2EjkbZScudJl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "750bf73b-c4fd-4eac-9c44-188b0151985c", "DetectTime": "2024-05-21T12:55:23.155349+00:00", "EventTime": "2024-05-21T12:55:23.155370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5U15E3vtpR4sTGDY9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "107b6163-3d43-45d9-9d88-5f2a9a7e1b6e", "DetectTime": "2024-05-21T12:55:23.519375+00:00", "EventTime": "2024-05-21T12:55:23.519399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFadV1XouNGyQFCN7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "a493972a-c2bc-40f6-b86f-b5191fc3292c", "DetectTime": "2024-05-21T12:55:23.638463+00:00", "EventTime": "2024-05-21T12:55:23.638484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrDIr3Th035LhoY1d"], "accumulated_threat_level": 11.200000000000001, "timewindow": 195} +{"Format": "IDEA0", "ID": "30de3fa8-0e46-4bea-9081-efe4f2e66190", "DetectTime": "2024-05-21T12:55:23.643649+00:00", "EventTime": "2024-05-21T12:55:23.643666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy9TX1jwfPYplG3id"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "a2b69d22-eb79-4a61-8cc5-424c73c3c53b", "DetectTime": "2024-05-21T12:55:23.648849+00:00", "EventTime": "2024-05-21T12:55:23.648869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C36a3qgJeSMdP5JZ2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "048036f8-5061-4673-b632-acddfdee0ca2", "DetectTime": "2024-05-21T12:55:23.657176+00:00", "EventTime": "2024-05-21T12:55:23.657195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ350J1z3R6ixR0X56"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "7d1c6a49-82fb-4c5a-acd0-92a14961c84f", "DetectTime": "2024-05-21T12:55:23.663523+00:00", "EventTime": "2024-05-21T12:55:23.663546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPK2sB3iZMHMWiXgJe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "f4dedca2-5a96-4b88-95b0-c8481dbc3603", "DetectTime": "2024-05-21T12:55:23.668578+00:00", "EventTime": "2024-05-21T12:55:23.668598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZPqXd4lQbVQCX3Rid"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "2e851680-983b-4227-9acf-f6e54221cb14", "DetectTime": "2024-05-21T12:55:23.706174+00:00", "EventTime": "2024-05-21T12:55:23.706196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvXwwQ951jaR1BCQj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "b6c0b9bf-3da7-477d-900b-e417fa5279ea", "DetectTime": "2024-05-21T12:55:24.040483+00:00", "EventTime": "2024-05-21T12:55:24.040507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJNxqa2kpepeC8HKNd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "72eb4228-7401-4acf-bbb6-03db52cd5c3f", "DetectTime": "2024-05-21T12:55:24.045410+00:00", "EventTime": "2024-05-21T12:55:24.045429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClAstB4uI86RnJtWQd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "dddb7da1-e4b1-44c8-8836-ec8f860e4bad", "DetectTime": "2024-05-21T12:55:24.243954+00:00", "EventTime": "2024-05-21T12:55:24.243974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWHeoD3v2Fe0zOy8pa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "04fdea0d-3e80-4310-9d84-75107bf6b8ab", "DetectTime": "2024-05-21T12:55:24.575392+00:00", "EventTime": "2024-05-21T12:55:24.575413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsaYW81NS0jCFnEtBj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "4234d0ca-b748-4635-85a5-89d90046e591", "DetectTime": "2024-05-21T12:55:24.756232+00:00", "EventTime": "2024-05-21T12:55:24.756255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw7y8m4BWtOTXgwNMi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "9e7e867e-b5ee-4a49-8c5d-a46655be0ada", "DetectTime": "2024-05-21T12:55:24.785431+00:00", "EventTime": "2024-05-21T12:55:24.785449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4Q2E3qeoLiCT3c5c"], "accumulated_threat_level": 12.000000000000002, "timewindow": 195} +{"Format": "Json", "ID": "9e7e867e-b5ee-4a49-8c5d-a46655be0ada", "DetectTime": "2024-05-21T12:55:24.785431+00:00", "EventTime": "2024-05-21T12:55:24.785449+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-09T02:06:54.979256+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2024/05/21 12:55:25.151572)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 195, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b48c942f-7122-4140-8dd1-7b30378d467b", "DetectTime": "2024-05-21T12:55:25.156476+00:00", "EventTime": "2024-05-21T12:55:25.156498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6rdXVDECjIOS1bl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "dc8e41bb-4650-4b34-baf1-b811f93996b6", "DetectTime": "2024-05-21T12:55:25.161995+00:00", "EventTime": "2024-05-21T12:55:25.162016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBrn327GhGkCS5MN6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "80ef9c96-2384-4f37-98a9-a3af4763de80", "DetectTime": "2024-05-21T12:55:25.166786+00:00", "EventTime": "2024-05-21T12:55:25.166804+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5wXAw2qjbpJuvsi7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "6beedc37-2a4c-48f7-8c62-556203bec229", "DetectTime": "2024-05-21T12:55:25.171326+00:00", "EventTime": "2024-05-21T12:55:25.171344+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9o5fX13FVTwQrAZvk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "a069e912-0db6-4945-bb5a-db87504af149", "DetectTime": "2024-05-21T12:55:25.287534+00:00", "EventTime": "2024-05-21T12:55:25.287560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMd6XB2AINvhSzKub"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "9cc96f30-2e2d-4783-87cd-08f22f6c0b00", "DetectTime": "2024-05-21T12:55:25.293123+00:00", "EventTime": "2024-05-21T12:55:25.293141+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYpLgU2xWpCdRIkb8b"], "accumulated_threat_level": 7.999999999999999, "timewindow": 193} +{"Format": "IDEA0", "ID": "960fbb3b-0be1-44f1-b377-a5d6a2cbaf44", "DetectTime": "2024-05-21T12:55:25.323549+00:00", "EventTime": "2024-05-21T12:55:25.323572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GKq01MN0P2EVS7w1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "bef28a46-9296-4c8e-b821-1dd044cda8ba", "DetectTime": "2024-05-21T12:55:25.331374+00:00", "EventTime": "2024-05-21T12:55:25.331401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl9wyy2qVKIrT7WO7h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "55ac5e22-4dd9-4ed2-a311-783f205ffdfe", "DetectTime": "2024-05-21T12:55:25.337009+00:00", "EventTime": "2024-05-21T12:55:25.337029+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.232.68.87 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEWS741H2DToaYJ6Ra"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "0830e880-6b33-4b34-9fd6-986e34689c45", "DetectTime": "2024-05-21T12:55:25.917439+00:00", "EventTime": "2024-05-21T12:55:25.917462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChgBI31XMAwIJ69je7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "ed0231d1-58fc-4de9-824e-bb92c655bb35", "DetectTime": "2024-05-21T12:55:25.923172+00:00", "EventTime": "2024-05-21T12:55:25.923194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAvsK2pV5Om2IK8Vk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "67120603-5b18-4d01-a005-bfe8afb01220", "DetectTime": "2024-05-21T12:55:25.946737+00:00", "EventTime": "2024-05-21T12:55:25.946758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDezmplABUZzMEMrj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "26b65d3e-c004-4c79-b4a1-d03b7575d8e3", "DetectTime": "2024-05-21T12:55:25.953017+00:00", "EventTime": "2024-05-21T12:55:25.953040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CST01u4K5Y4elBqa2j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "8ed65921-b912-4e76-b774-3ef731922196", "DetectTime": "2024-05-21T12:55:25.984997+00:00", "EventTime": "2024-05-21T12:55:25.985019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CycqI34t1kt8L3xd3f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "7cca5e49-f834-4ea6-b547-2095e953dd11", "DetectTime": "2024-05-21T12:55:26.044895+00:00", "EventTime": "2024-05-21T12:55:26.044915+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPOLC1rQT65g8NlUa"], "accumulated_threat_level": 0.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "f3df56a6-f0c7-48b2-9a21-b2290b4dbbb1", "DetectTime": "2024-05-21T12:55:26.198096+00:00", "EventTime": "2024-05-21T12:55:26.198118+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CI9bwU1NOmwMAlE3L7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "ec5e458c-cda5-4ab8-8df1-96af2cb7a8d8", "DetectTime": "2024-05-21T12:55:26.237785+00:00", "EventTime": "2024-05-21T12:55:26.237807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClgBj538omEXBeiuq5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "689c4386-a50d-493e-9abd-9d4b18dea874", "DetectTime": "2024-05-21T12:55:26.497218+00:00", "EventTime": "2024-05-21T12:55:26.497239+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2zDNZ2bHFCdNLl1pa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "5b99da69-ed5f-4b34-bf37-a45cf9b1315a", "DetectTime": "2024-05-21T12:55:26.569995+00:00", "EventTime": "2024-05-21T12:55:26.570016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4RFYb4Jyp9oig6wKb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "4745fb06-0953-4b60-b8be-d1bd4a633e62", "DetectTime": "2024-05-21T12:55:26.575692+00:00", "EventTime": "2024-05-21T12:55:26.575729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqbtQz2kim1gBCcPh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "86cdfc27-7c82-41e7-af0e-6c48b8e4cb53", "DetectTime": "2024-05-21T12:55:26.624842+00:00", "EventTime": "2024-05-21T12:55:26.624863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZtCYH3hyGZgho3BWc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "568a031d-143d-4c2c-8fca-4537f21cc1bc", "DetectTime": "2024-05-21T12:55:26.674289+00:00", "EventTime": "2024-05-21T12:55:26.674309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWWeR0zTsz53a7bc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "621b85ec-636f-4997-83c0-6b75774f72f5", "DetectTime": "2024-05-21T12:55:26.680518+00:00", "EventTime": "2024-05-21T12:55:26.680540+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUXCjy10uQ5daIEjgk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "fdff619b-3841-494e-b156-928473351977", "DetectTime": "2024-05-21T12:55:26.971858+00:00", "EventTime": "2024-05-21T12:55:26.971881+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck4EDW3GlxDj1fZAK3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "b8911985-3ae2-4de3-b623-8fb8f715ce55", "DetectTime": "2024-05-21T12:55:27.122464+00:00", "EventTime": "2024-05-21T12:55:27.122485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbyVNw2MLl4uIMDgRl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "4cdd3f85-cde2-427b-a27c-32b455c31df3", "DetectTime": "2024-05-21T12:55:27.128798+00:00", "EventTime": "2024-05-21T12:55:27.128816+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvGzLk2EJBmWJYGIse"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "b4c50813-821a-413b-ba50-2e86c19ee313", "DetectTime": "2024-05-21T12:55:27.137204+00:00", "EventTime": "2024-05-21T12:55:27.137223+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfrdzu12AhWDUILFZ9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "e1d782fa-ef64-46ea-b9ae-8cfce588dabb", "DetectTime": "2024-05-21T12:55:27.152887+00:00", "EventTime": "2024-05-21T12:55:27.152910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL3vBVwsN2icE9dOj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "7d03d9c4-e608-42e6-927a-98bfa2d6d689", "DetectTime": "2024-05-21T12:55:27.159915+00:00", "EventTime": "2024-05-21T12:55:27.159935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJB0gi1DrpytfUsGMa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "f64c14ab-6baf-4136-851d-a3934e5dd170", "DetectTime": "2024-05-21T12:55:27.165509+00:00", "EventTime": "2024-05-21T12:55:27.165534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkyTaX1roZ6gNaK3u7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "3ed3e4bb-26ac-4767-8415-18766f99b99c", "DetectTime": "2024-05-21T12:55:27.185153+00:00", "EventTime": "2024-05-21T12:55:27.185177+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV03wf19asWBpvHo2f"], "accumulated_threat_level": 1.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "ad624cb2-2122-4361-a7d5-f19f1ca1856a", "DetectTime": "2024-05-21T12:55:27.308684+00:00", "EventTime": "2024-05-21T12:55:27.308707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGk7AW1aPRoLW6IJkh", "CIU0ZVUboZB3hyw5a", "CsU3Ju15OgRRQ53KL4", "CdVDm34WKO2HBYkq2"], "accumulated_threat_level": 0.5, "timewindow": 222} +{"Format": "IDEA0", "ID": "bfcb5fc1-fa28-476c-9d30-4021817009ff", "DetectTime": "2024-05-21T12:55:27.583975+00:00", "EventTime": "2024-05-21T12:55:27.583993+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdCD0C27T5l1IiikI9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "63d4acad-a76a-4036-b337-7f100f5243a8", "DetectTime": "2024-05-21T12:55:27.836202+00:00", "EventTime": "2024-05-21T12:55:27.836225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7ifb113BP97n9gKRf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "0f6b6ec2-638e-4fb9-9ee5-e75beeae2c58", "DetectTime": "2024-05-21T12:55:28.114587+00:00", "EventTime": "2024-05-21T12:55:28.114610+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch2jzQ2xyqQZ6bQY34"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "d087be23-d530-4e9e-b175-c2ed57454ec6", "DetectTime": "2024-05-21T12:55:28.216362+00:00", "EventTime": "2024-05-21T12:55:28.216381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QqqF9R8BKNH3aak"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "3102217a-b5e1-4a49-908e-401ad7ded252", "DetectTime": "2024-05-21T12:55:28.228732+00:00", "EventTime": "2024-05-21T12:55:28.228754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6MK6O1DD7PChXGzN4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "d7027278-ecc8-4ba8-9e2f-e20ad21a3e8c", "DetectTime": "2024-05-21T12:55:28.280298+00:00", "EventTime": "2024-05-21T12:55:28.280318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiW4ki2VahQXIOFcUe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "56df7757-a084-454a-a645-bac4422878d5", "DetectTime": "2024-05-21T12:55:28.329338+00:00", "EventTime": "2024-05-21T12:55:28.329357+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsoG2i3UTQ75YY0Y7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "f00d9887-4f52-45da-9db2-e1d5afaf2f2f", "DetectTime": "2024-05-21T12:55:28.334376+00:00", "EventTime": "2024-05-21T12:55:28.334400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDftG91pvy6m9gPrP8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "b0f196ef-0ad3-494c-a846-527c2a5297c0", "DetectTime": "2024-05-21T12:55:28.439932+00:00", "EventTime": "2024-05-21T12:55:28.439954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cie0V73GA2fHoZA1J7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "7a8281e3-2afc-4d49-8a88-1342bc678a31", "DetectTime": "2024-05-21T12:55:28.445347+00:00", "EventTime": "2024-05-21T12:55:28.445369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6RWude9bKUNoqJI9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "b5d17f19-1aef-4991-bc05-0f571b2ed4cd", "DetectTime": "2024-05-21T12:55:28.540790+00:00", "EventTime": "2024-05-21T12:55:28.540814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9LQHH3cmDWJSfXW7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "2fceb34c-d842-4b49-a449-9654f300d74a", "DetectTime": "2024-05-21T12:55:28.847952+00:00", "EventTime": "2024-05-21T12:55:28.847974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKhtWl3gJtfKiZC5g2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 195} +{"Format": "IDEA0", "ID": "150c4716-1af9-4763-828d-e59baa71e25a", "DetectTime": "2024-05-21T12:55:28.931872+00:00", "EventTime": "2024-05-21T12:55:28.931896+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2Qw2u35V3wqgh0nN6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "064dab46-a8c8-4af1-8983-b47214684a13", "DetectTime": "2024-05-21T12:55:28.971657+00:00", "EventTime": "2024-05-21T12:55:28.971677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3a9Vz2dxRVLXjANf1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "2dc09608-899e-4e64-80e6-5664b3124941", "DetectTime": "2024-05-21T12:55:29.003345+00:00", "EventTime": "2024-05-21T12:55:29.003366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClkX5ApMYRxGovgRa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "37a8d545-cab6-4c15-8f9f-db8bd64b1c50", "DetectTime": "2024-05-21T12:55:29.336912+00:00", "EventTime": "2024-05-21T12:55:29.336935+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL7iTL16uFHCslnyL6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "dc7a55c4-5c90-450e-9f93-095caedcb7f3", "DetectTime": "2024-05-21T12:55:29.343406+00:00", "EventTime": "2024-05-21T12:55:29.343429+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmsfFITN9ttNWIa9j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "f99e0023-afb6-4c41-b2f8-33755e2d49ac", "DetectTime": "2024-05-21T12:55:29.348263+00:00", "EventTime": "2024-05-21T12:55:29.348282+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmOR5atHT4qx9sPod"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "5eea3f5a-85f6-47c6-9404-7f29fac0fc36", "DetectTime": "2024-05-21T12:55:29.589221+00:00", "EventTime": "2024-05-21T12:55:29.589245+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce7Mtz3sDvVs0LOKef"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "798182c6-0cda-4ebc-84bf-a1d6915da0c9", "DetectTime": "2024-05-21T12:55:29.621892+00:00", "EventTime": "2024-05-21T12:55:29.621913+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQd2VE3dClaAhX65Y3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "ca851ccc-a166-402c-8d3f-a11bd87d0ae9", "DetectTime": "2024-05-21T12:55:29.627855+00:00", "EventTime": "2024-05-21T12:55:29.627876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C31KOc1EUa3BW2nRha"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "b2f4b72f-2378-488a-8562-14c6d9c46d58", "DetectTime": "2024-05-21T12:55:29.633517+00:00", "EventTime": "2024-05-21T12:55:29.633536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4jled12V8N2o5Knl3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "5df76beb-54a3-486d-a7c3-66ebe81c7803", "DetectTime": "2024-05-21T12:55:29.639024+00:00", "EventTime": "2024-05-21T12:55:29.639044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUDhkw1Y7tpN4ag3Jh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "62118f29-bf6a-4160-a533-1f8093bcb9a3", "DetectTime": "2024-05-21T12:55:29.644149+00:00", "EventTime": "2024-05-21T12:55:29.644168+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoZ5BsAAFkrCbVCh7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "c4803e07-8d76-40f5-9702-403aefef3ba4", "DetectTime": "2024-05-21T12:55:29.657134+00:00", "EventTime": "2024-05-21T12:55:29.657156+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3ahG94e8NaBCrwte3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "d934d373-a0cf-48b3-9e01-0274e4ed66b4", "DetectTime": "2024-05-21T12:55:29.662373+00:00", "EventTime": "2024-05-21T12:55:29.662393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu17Qk1KzN06agSwie"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "5ee19f8e-1135-4e0d-b72c-d7a05f866063", "DetectTime": "2024-05-21T12:55:29.667681+00:00", "EventTime": "2024-05-21T12:55:29.667702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHnKoG3qdmvx5OTZFa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "54337a2f-fc74-45e1-be0e-3f147ba1e1c9", "DetectTime": "2024-05-21T12:55:29.974442+00:00", "EventTime": "2024-05-21T12:55:29.974465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK8XvL1cx5CpqqLTii"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "859e0754-7d32-4455-924f-a66008c02fb5", "DetectTime": "2024-05-21T12:55:30.352938+00:00", "EventTime": "2024-05-21T12:55:30.352962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Z40q4q5Vi643AETl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "1302291b-91ce-4afa-93ab-d5a93d0306ea", "DetectTime": "2024-05-21T12:55:30.501952+00:00", "EventTime": "2024-05-21T12:55:30.501971+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CufXkE3RBmTGWCJWf7"], "accumulated_threat_level": 3.2, "timewindow": 195} +{"Format": "IDEA0", "ID": "2903ff13-d1e8-40cf-9141-98fe1482e5ab", "DetectTime": "2024-05-21T12:55:30.506900+00:00", "EventTime": "2024-05-21T12:55:30.506918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzrGUt4sjfeqj0tiw1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 194} +{"Format": "IDEA0", "ID": "0a057e99-dcc9-4ac4-a73a-bfdd29af9c13", "DetectTime": "2024-05-21T12:55:30.973369+00:00", "EventTime": "2024-05-21T12:55:30.973390+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCS4BFjvKoytMLbBd"], "accumulated_threat_level": 3.2, "timewindow": 195} +{"Format": "IDEA0", "ID": "33c74e70-aa55-48ac-ba2d-78059d227c81", "DetectTime": "2024-05-21T12:55:31.011646+00:00", "EventTime": "2024-05-21T12:55:31.011668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRV5D6SkIpW3FiFX6"], "accumulated_threat_level": 3.2, "timewindow": 195} +{"Format": "IDEA0", "ID": "e63729e0-eb84-4edd-91a8-9638a46be1b1", "DetectTime": "2024-05-21T12:55:31.025021+00:00", "EventTime": "2024-05-21T12:55:31.025040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLs1Q3wtfUzD9T3X4"], "accumulated_threat_level": 4.0, "timewindow": 195} +{"Format": "IDEA0", "ID": "1f23016d-6919-4e10-8002-8932ab473fe3", "DetectTime": "2024-05-21T12:55:31.104013+00:00", "EventTime": "2024-05-21T12:55:31.104034+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf5w3e3j0JtoV0mGlb"], "accumulated_threat_level": 4.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "105dc475-12be-4e34-b155-f9d8d3d249dd", "DetectTime": "2024-05-21T12:55:31.155849+00:00", "EventTime": "2024-05-21T12:55:31.155879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEDSsV1Wze2Psnq5we"], "accumulated_threat_level": 4.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "f3dbc78c-e928-4d17-9b2c-a976a3561e68", "DetectTime": "2024-05-21T12:55:31.201848+00:00", "EventTime": "2024-05-21T12:55:31.201868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFPJ23HPbulkR6i3l"], "accumulated_threat_level": 5.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "668dc1a9-a0a7-4682-9ac3-faf799320ca9", "DetectTime": "2024-05-21T12:55:31.254884+00:00", "EventTime": "2024-05-21T12:55:31.254909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBzqlYRTgEmv0Glg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 195} +{"Format": "IDEA0", "ID": "4af8cc3f-1a74-4a00-9480-ad1e6a66deec", "DetectTime": "2024-05-21T12:55:31.499928+00:00", "EventTime": "2024-05-21T12:55:31.499949+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy02Zf3fBdUYsvqsD1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 195} +{"Format": "IDEA0", "ID": "eeb94c92-7806-4b2a-ae74-d2c5567833bc", "DetectTime": "2024-05-21T12:55:31.548564+00:00", "EventTime": "2024-05-21T12:55:31.548584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuQyn1zMXVs1X6fOg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "54d1bd5d-d17a-4db7-8cb5-392b48a66610", "DetectTime": "2024-05-21T12:55:31.599843+00:00", "EventTime": "2024-05-21T12:55:31.599864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGsvv2bTW1tRQAVa5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "3d80e5d1-af90-4d8c-94f3-8b8590da1f10", "DetectTime": "2024-05-21T12:55:31.658480+00:00", "EventTime": "2024-05-21T12:55:31.658500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpY252KQIeaGz131j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "1bba1621-838b-44c5-af28-3c98b6157598", "DetectTime": "2024-05-21T12:55:31.705623+00:00", "EventTime": "2024-05-21T12:55:31.705642+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK1oa91HFECi307B0a"], "accumulated_threat_level": 9.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "4e2d9b44-475e-4fd7-90bd-93b9f4e3c387", "DetectTime": "2024-05-21T12:55:31.789118+00:00", "EventTime": "2024-05-21T12:55:31.789137+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wFTu3ywRXWjiCcl6"], "accumulated_threat_level": 10.4, "timewindow": 195} +{"Format": "IDEA0", "ID": "e88e5e39-7d7a-4a14-b800-337393427b45", "DetectTime": "2024-05-21T12:55:31.852322+00:00", "EventTime": "2024-05-21T12:55:31.852342+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMH6Y84DujJuMsUy57"], "accumulated_threat_level": 11.200000000000001, "timewindow": 195} +{"Format": "IDEA0", "ID": "9edf2f53-a6a5-4211-86a3-686cf537d8d5", "DetectTime": "2024-05-21T12:55:32.081176+00:00", "EventTime": "2024-05-21T12:55:32.081196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNtGSl2wE210Y5WADf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 195} +{"Format": "IDEA0", "ID": "5cde973c-3c48-4802-b9ea-e02632e29372", "DetectTime": "2024-05-21T12:55:32.137902+00:00", "EventTime": "2024-05-21T12:55:32.137919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvUrETzaveVpCnV64"], "accumulated_threat_level": 12.000000000000002, "timewindow": 195} +{"Format": "Json", "ID": "5cde973c-3c48-4802-b9ea-e02632e29372", "DetectTime": "2024-05-21T12:55:32.137902+00:00", "EventTime": "2024-05-21T12:55:32.137919+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "1970-01-09T02:37:32.654835+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2024/05/21 12:55:32.323163)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 195, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c409a57e-e027-476a-8d50-4144b085c64f", "DetectTime": "2024-05-21T12:55:32.391581+00:00", "EventTime": "2024-05-21T12:55:32.391605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQVEx1O8RrCfHR6Eb"], "accumulated_threat_level": 0.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "6860c053-2a9e-4443-8c1d-8e6b5f70d7d8", "DetectTime": "2024-05-21T12:55:32.405822+00:00", "EventTime": "2024-05-21T12:55:32.405846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRbqI27KLx2DcTZnl"], "accumulated_threat_level": 1.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "d93ce8dc-20a0-40f4-a87e-47b9d2bbb5f9", "DetectTime": "2024-05-21T12:55:32.418051+00:00", "EventTime": "2024-05-21T12:55:32.418091+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxhdURfW8JK2f3ub"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 195} +{"Format": "IDEA0", "ID": "a14b9d9b-c94a-4a0f-b51e-b8dcfa9f78bf", "DetectTime": "2024-05-21T12:55:32.436699+00:00", "EventTime": "2024-05-21T12:55:32.436738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqZIZn24ASMOYh45"], "accumulated_threat_level": 3.2, "timewindow": 195} +{"Format": "IDEA0", "ID": "f5823ec8-e663-4fee-8425-41c6c1d39da9", "DetectTime": "2024-05-21T12:55:32.645719+00:00", "EventTime": "2024-05-21T12:55:32.645740+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5QgGU1vHXhpe1hy97"], "accumulated_threat_level": 4.0, "timewindow": 195} +{"Format": "IDEA0", "ID": "1584656e-7fe1-4453-ba53-62a44a541b51", "DetectTime": "2024-05-21T12:55:32.695350+00:00", "EventTime": "2024-05-21T12:55:32.695372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetV71Kxu7nuQBQu6"], "accumulated_threat_level": 4.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "9e7e8261-90f0-45f1-a4c2-b06768119ca3", "DetectTime": "2024-05-21T12:55:32.749374+00:00", "EventTime": "2024-05-21T12:55:32.749393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CafC6Q3j4NpBfU1cm4"], "accumulated_threat_level": 5.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "dbd254a5-63dd-4730-9ead-068bef401939", "DetectTime": "2024-05-21T12:55:32.802247+00:00", "EventTime": "2024-05-21T12:55:32.802266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9b68HPDhfeBLMHQi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 195} +{"Format": "IDEA0", "ID": "ac221bd7-7cdc-4f7b-b58e-697d35c47acc", "DetectTime": "2024-05-21T12:55:32.852105+00:00", "EventTime": "2024-05-21T12:55:32.852123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkW6s1s3NH0cD1YH4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "8fe8369f-c108-47e0-8d11-bd830de82bf4", "DetectTime": "2024-05-21T12:55:32.902878+00:00", "EventTime": "2024-05-21T12:55:32.902898+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpATkMWUzFfG1hLi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "54a34e14-4893-4941-97f4-de97e0c9168e", "DetectTime": "2024-05-21T12:55:32.954509+00:00", "EventTime": "2024-05-21T12:55:32.954531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyoK349TeEpKu7EE7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "37e4f97f-aae6-44e5-b66e-b71d61395788", "DetectTime": "2024-05-21T12:55:32.996674+00:00", "EventTime": "2024-05-21T12:55:32.996696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT1ESb1tLn0Tvym8Hg"], "accumulated_threat_level": 8.799999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "d5404235-0a19-4460-a32c-eb24a2b8569c", "DetectTime": "2024-05-21T12:55:33.249688+00:00", "EventTime": "2024-05-21T12:55:33.249724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM00GV1YEBilYeyDj6"], "accumulated_threat_level": 9.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "3ed883b8-3fea-48bb-8ad2-54d8f4284748", "DetectTime": "2024-05-21T12:55:33.303843+00:00", "EventTime": "2024-05-21T12:55:33.303882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7AnBlABQnaLJj5e"], "accumulated_threat_level": 10.4, "timewindow": 195} +{"Format": "IDEA0", "ID": "441c27c2-3e36-4866-b181-2892d4bef772", "DetectTime": "2024-05-21T12:55:33.361592+00:00", "EventTime": "2024-05-21T12:55:33.361632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cln6qb4M0hRXTkNr9i"], "accumulated_threat_level": 11.200000000000001, "timewindow": 195} +{"Format": "IDEA0", "ID": "d4313a7b-2bb4-402a-99f5-c44e0e5a9151", "DetectTime": "2024-05-21T12:55:33.410387+00:00", "EventTime": "2024-05-21T12:55:33.410437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSFiw2ADwPHPv3LF4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 195} +{"Format": "Json", "ID": "d4313a7b-2bb4-402a-99f5-c44e0e5a9151", "DetectTime": "2024-05-21T12:55:33.410387+00:00", "EventTime": "2024-05-21T12:55:33.410437+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-09T02:37:47.205462+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 195. (real time 2024/05/21 12:55:33.629109)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 195, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "5ee58b5a-3677-4549-98b4-33cce39c09ae", "DetectTime": "2024-05-21T12:55:33.642047+00:00", "EventTime": "2024-05-21T12:55:33.642076+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CijUHR2Uke6VbHtTD5"], "accumulated_threat_level": 0.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "2a596595-6bdd-4471-8558-b571eab29218", "DetectTime": "2024-05-21T12:55:33.656380+00:00", "EventTime": "2024-05-21T12:55:33.656403+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNq5L3V2DO5Ux3nFb"], "accumulated_threat_level": 1.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "f715bf73-829e-4d67-870e-d49c7b24b342", "DetectTime": "2024-05-21T12:55:33.821828+00:00", "EventTime": "2024-05-21T12:55:33.821846+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJGKNO3E5Eg4PVXkCj"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "f7c287b8-d4d8-4b35-b917-84d26c30f040", "DetectTime": "2024-05-21T12:55:33.834568+00:00", "EventTime": "2024-05-21T12:55:33.834587+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJGKNO3E5Eg4PVXkCj"], "accumulated_threat_level": 10.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "06646b59-2242-4ed1-956e-2c98d883ba87", "DetectTime": "2024-05-21T12:55:33.846713+00:00", "EventTime": "2024-05-21T12:55:33.846735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7UUxO46dsw9ap4b"], "accumulated_threat_level": 1.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "6bb69cfb-3a4c-437e-8812-476e484ad50d", "DetectTime": "2024-05-21T12:55:33.890868+00:00", "EventTime": "2024-05-21T12:55:33.890886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CguBUp3wIqe6icj2Bb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 195} +{"Format": "IDEA0", "ID": "76f7f8ec-fc05-41a3-8aa9-3c3d5207ed60", "DetectTime": "2024-05-21T12:55:33.945594+00:00", "EventTime": "2024-05-21T12:55:33.945613+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKAEe2teso6gnH7cc"], "accumulated_threat_level": 3.2, "timewindow": 195} +{"Format": "IDEA0", "ID": "ff42bef7-a74f-413e-8bf9-6c27dc902afe", "DetectTime": "2024-05-21T12:55:34.104656+00:00", "EventTime": "2024-05-21T12:55:34.104684+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3hIw2iCjFl1xde1d"], "accumulated_threat_level": 4.0, "timewindow": 195} +{"Format": "IDEA0", "ID": "459a9261-b8a9-4b37-a645-2749ca4a8c01", "DetectTime": "2024-05-21T12:55:34.130756+00:00", "EventTime": "2024-05-21T12:55:34.130794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKJmqU3u3Yf1w0b4bi"], "accumulated_threat_level": 4.8, "timewindow": 195} +{"Format": "IDEA0", "ID": "21396e35-2409-47cd-bd7f-cd93302f66ae", "DetectTime": "2024-05-21T12:55:34.181164+00:00", "EventTime": "2024-05-21T12:55:34.181200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9t1cq1tBDFm77QEol"], "accumulated_threat_level": 5.6, "timewindow": 195} +{"Format": "IDEA0", "ID": "c6656f24-2e73-49ff-a618-5cad7c8aaf4d", "DetectTime": "2024-05-21T12:55:34.495756+00:00", "EventTime": "2024-05-21T12:55:34.495794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCucDE4ZUjWkWH0NMb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 195} +{"Format": "IDEA0", "ID": "c41da9ad-e709-4a91-b6cb-70cdf652f533", "DetectTime": "2024-05-21T12:55:34.515659+00:00", "EventTime": "2024-05-21T12:55:34.515691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsCMg3HyATsyYLO7c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 195} +{"Format": "IDEA0", "ID": "e48eab01-c540-4426-abfb-420dbafbe018", "DetectTime": "2024-05-21T12:55:34.572347+00:00", "EventTime": "2024-05-21T12:55:34.572374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CivL7O3Dx8C6hyQ6W7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "597d5c4f-38b0-4103-a7e6-bda8836fc752", "DetectTime": "2024-05-21T12:55:34.672333+00:00", "EventTime": "2024-05-21T12:55:34.672374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkyLq3CaYwqoPKLc9"], "accumulated_threat_level": 1.3, "timewindow": 196} +{"Format": "IDEA0", "ID": "e1562aaa-9142-4122-99a1-8ccc8ac7ca70", "DetectTime": "2024-05-21T12:55:34.736165+00:00", "EventTime": "2024-05-21T12:55:34.736205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRMUO2i9pzFD84JK4"], "accumulated_threat_level": 2.1, "timewindow": 196} +{"Format": "IDEA0", "ID": "3ad4139f-3ecd-49f0-8a61-c280f1b4cd99", "DetectTime": "2024-05-21T12:55:34.798089+00:00", "EventTime": "2024-05-21T12:55:34.798130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoJvC2BrEKZEOf5Gc"], "accumulated_threat_level": 2.9000000000000004, "timewindow": 196} +{"Format": "IDEA0", "ID": "ffd9131c-dee1-44bb-a36a-67f86a68fba2", "DetectTime": "2024-05-21T12:55:34.837848+00:00", "EventTime": "2024-05-21T12:55:34.837870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ0MrFs6vYBCRlFd6"], "accumulated_threat_level": 3.7, "timewindow": 196} +{"Format": "IDEA0", "ID": "50af7223-b7a2-47bc-bc82-3fb610f91179", "DetectTime": "2024-05-21T12:55:34.888492+00:00", "EventTime": "2024-05-21T12:55:34.888511+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9MNZ2DBwb4M2TAbc"], "accumulated_threat_level": 4.5, "timewindow": 196} +{"Format": "IDEA0", "ID": "eb34b6d8-9c84-45c2-ae65-c82f2a9b2d53", "DetectTime": "2024-05-21T12:55:35.128914+00:00", "EventTime": "2024-05-21T12:55:35.128934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8zBW72Rjb6mJE17If"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "bc0cc90c-aedb-409d-8286-e004abddbf18", "DetectTime": "2024-05-21T12:55:35.176156+00:00", "EventTime": "2024-05-21T12:55:35.176179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVycw3GriP8dl7Q08"], "accumulated_threat_level": 5.3, "timewindow": 196} +{"Format": "IDEA0", "ID": "f765ef7f-f4ed-4b80-9b4d-7d335bd02955", "DetectTime": "2024-05-21T12:55:35.231461+00:00", "EventTime": "2024-05-21T12:55:35.231479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLICNj396h0bIROZDd"], "accumulated_threat_level": 6.1, "timewindow": 196} +{"Format": "IDEA0", "ID": "0a2c8f98-b512-430e-a71b-cc1e60b867ab", "DetectTime": "2024-05-21T12:55:35.279494+00:00", "EventTime": "2024-05-21T12:55:35.279513+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRnlQ44U8VBKCn3stg"], "accumulated_threat_level": 6.8999999999999995, "timewindow": 196} +{"Format": "IDEA0", "ID": "521ac4fd-1cce-45bb-8e85-ca26e869c24f", "DetectTime": "2024-05-21T12:55:35.331277+00:00", "EventTime": "2024-05-21T12:55:35.331297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2xQM35esjASKUzUd"], "accumulated_threat_level": 7.699999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "b36037b6-c633-4d53-b8d4-bed1b2939bf4", "DetectTime": "2024-05-21T12:55:35.380396+00:00", "EventTime": "2024-05-21T12:55:35.380418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COgacM2EZmOaIOCKv8"], "accumulated_threat_level": 8.5, "timewindow": 196} +{"Format": "IDEA0", "ID": "a91b97f3-03c4-40f1-9ac0-c051fe71690e", "DetectTime": "2024-05-21T12:55:35.682701+00:00", "EventTime": "2024-05-21T12:55:35.682726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VoXI2yALKFuetvwj"], "accumulated_threat_level": 9.3, "timewindow": 196} +{"Format": "IDEA0", "ID": "d6f97bd7-2621-4e87-bfca-90bc5a26429d", "DetectTime": "2024-05-21T12:55:35.736545+00:00", "EventTime": "2024-05-21T12:55:35.736566+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cec6kp2CBfgDVk22Z7"], "accumulated_threat_level": 10.100000000000001, "timewindow": 196} +{"Format": "IDEA0", "ID": "2f520082-2417-4b55-bab3-1fa8399bdad3", "DetectTime": "2024-05-21T12:55:35.791299+00:00", "EventTime": "2024-05-21T12:55:35.791319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIMcUe4R0pfspq73Ea"], "accumulated_threat_level": 10.900000000000002, "timewindow": 196} +{"Format": "IDEA0", "ID": "dea2258b-3f97-46a2-b7bc-b895baf533df", "DetectTime": "2024-05-21T12:55:35.844923+00:00", "EventTime": "2024-05-21T12:55:35.844942+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrEr1d2tdGGJWRNvIk"], "accumulated_threat_level": 11.700000000000003, "timewindow": 196} +{"Format": "IDEA0", "ID": "50bc3303-490f-4815-90f9-8c91a177f0f7", "DetectTime": "2024-05-21T12:55:35.900315+00:00", "EventTime": "2024-05-21T12:55:35.900334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsALB92sObm8syS6Fb"], "accumulated_threat_level": 12.500000000000004, "timewindow": 196} +{"Format": "Json", "ID": "50bc3303-490f-4815-90f9-8c91a177f0f7", "DetectTime": "2024-05-21T12:55:35.900315+00:00", "EventTime": "2024-05-21T12:55:35.900334+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "1970-01-09T03:08:18.405546+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2024/05/21 12:55:36.121839)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.500000000000004, "timewindow": 196, "profileid": "profile_10.0.2.19", "threat_level": 12.500000000000004} +{"Format": "IDEA0", "ID": "9be11a12-e271-4edc-bb9d-ed9977089e60", "DetectTime": "2024-05-21T12:55:36.132897+00:00", "EventTime": "2024-05-21T12:55:36.132916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3NPg45W5TK7GpIx6"], "accumulated_threat_level": 0.8, "timewindow": 196} +{"Format": "IDEA0", "ID": "a573b618-d200-4741-8e4d-8371fd802004", "DetectTime": "2024-05-21T12:55:36.205096+00:00", "EventTime": "2024-05-21T12:55:36.205119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIsXdQ2VLgI2JbaJhd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "2fe767a4-cdfe-426c-a131-18040ced75f6", "DetectTime": "2024-05-21T12:55:36.257465+00:00", "EventTime": "2024-05-21T12:55:36.257486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMGrC21fXFIjQ8ltUl"], "accumulated_threat_level": 1.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "e48b39fd-0efe-4081-9f46-6c0b72d59f8c", "DetectTime": "2024-05-21T12:55:36.302996+00:00", "EventTime": "2024-05-21T12:55:36.303017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA60YA1w2a8MZy7TE9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 196} +{"Format": "IDEA0", "ID": "569d8ea4-ba56-4cb2-b28a-d10a3b0714fa", "DetectTime": "2024-05-21T12:55:36.358811+00:00", "EventTime": "2024-05-21T12:55:36.358830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwc3Hl2mp0bIbJmCqg"], "accumulated_threat_level": 3.2, "timewindow": 196} +{"Format": "IDEA0", "ID": "73473061-d9dd-45a5-b058-2d1a4920e498", "DetectTime": "2024-05-21T12:55:36.416193+00:00", "EventTime": "2024-05-21T12:55:36.416233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy3ig1Gc8pyTe59Og"], "accumulated_threat_level": 4.0, "timewindow": 196} +{"Format": "IDEA0", "ID": "0cbc5428-3c8e-4863-96c0-cd45334ea7c1", "DetectTime": "2024-05-21T12:55:36.465061+00:00", "EventTime": "2024-05-21T12:55:36.465097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoxy8g1roehXHqg"], "accumulated_threat_level": 4.8, "timewindow": 196} +{"Format": "IDEA0", "ID": "a1ed7d43-853b-42bd-8407-280a2919b1ab", "DetectTime": "2024-05-21T12:55:36.520375+00:00", "EventTime": "2024-05-21T12:55:36.520408+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzXZn4Dl7W9lVl0Og"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "12330294-fc4a-46b0-a3c5-98f68d3050a4", "DetectTime": "2024-05-21T12:55:36.857919+00:00", "EventTime": "2024-05-21T12:55:36.857940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNPZDy1QvMKdGn41mb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "cffb0900-cf1c-436f-b1ae-41307b9fc96a", "DetectTime": "2024-05-21T12:55:36.870256+00:00", "EventTime": "2024-05-21T12:55:36.870276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1alvpFgdcZF3Lnv1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 196} +{"Format": "IDEA0", "ID": "2816aaf3-77a6-4e0f-9c45-21695a9a6335", "DetectTime": "2024-05-21T12:55:36.955618+00:00", "EventTime": "2024-05-21T12:55:36.955638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzqmyU28BMjzWc5SC7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "bf7993cd-bf98-474e-861d-f9723ab0353b", "DetectTime": "2024-05-21T12:55:37.010392+00:00", "EventTime": "2024-05-21T12:55:37.010449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YEYv29L0XpEDLrhd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "3f4ad274-dd67-4700-a558-2be6f66b8536", "DetectTime": "2024-05-21T12:55:37.072063+00:00", "EventTime": "2024-05-21T12:55:37.072092+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgvHIUjLWuHBkehi"], "accumulated_threat_level": 8.799999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "1bf82925-af64-46cc-8edd-fe1d11d898d1", "DetectTime": "2024-05-21T12:55:37.210654+00:00", "EventTime": "2024-05-21T12:55:37.210686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca182U2On8P83o0shg"], "accumulated_threat_level": 9.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "ea340b74-2af8-4a59-b140-39b335f0ddf1", "DetectTime": "2024-05-21T12:55:37.387878+00:00", "EventTime": "2024-05-21T12:55:37.387902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEOHut3j6pvsvzOhY9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "75fe087f-7cd5-455a-a3ed-0f0c7968b85c", "DetectTime": "2024-05-21T12:55:37.464745+00:00", "EventTime": "2024-05-21T12:55:37.464766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4P0JF1cHeDY7BB0n9"], "accumulated_threat_level": 10.4, "timewindow": 196} +{"Format": "IDEA0", "ID": "0f13bc2b-11de-4f7c-81da-d8da9326fb70", "DetectTime": "2024-05-21T12:55:37.591560+00:00", "EventTime": "2024-05-21T12:55:37.591579+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1bDHT1mhHxSPqyNd5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 196} +{"Format": "IDEA0", "ID": "7775929d-ea64-4c41-a9cd-f714adc8ca54", "DetectTime": "2024-05-21T12:55:37.672344+00:00", "EventTime": "2024-05-21T12:55:37.672364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWfOkgxjAUOc3I98"], "accumulated_threat_level": 12.000000000000002, "timewindow": 196} +{"Format": "Json", "ID": "7775929d-ea64-4c41-a9cd-f714adc8ca54", "DetectTime": "2024-05-21T12:55:37.672344+00:00", "EventTime": "2024-05-21T12:55:37.672364+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-09T03:39:21.751103+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2024/05/21 12:55:37.861180)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 196, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8256f098-a1e7-4b1a-824d-fcc4e7fc09bd", "DetectTime": "2024-05-21T12:55:37.876457+00:00", "EventTime": "2024-05-21T12:55:37.876481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8OejCxLZX0mJXJf"], "accumulated_threat_level": 0.8, "timewindow": 196} +{"Format": "IDEA0", "ID": "a08cf9c6-b675-48b0-83d6-49213f572106", "DetectTime": "2024-05-21T12:55:37.893006+00:00", "EventTime": "2024-05-21T12:55:37.893022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw6TyB1piu3sKN9q"], "accumulated_threat_level": 1.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "38da2911-5643-4bd1-af9e-516d1656f629", "DetectTime": "2024-05-21T12:55:37.904267+00:00", "EventTime": "2024-05-21T12:55:37.904285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Can99m18KcBI6Upkok"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 196} +{"Format": "IDEA0", "ID": "8aacba7d-e546-47c0-af4a-7a6a940e233d", "DetectTime": "2024-05-21T12:55:38.096736+00:00", "EventTime": "2024-05-21T12:55:38.096772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cojynp1Xv4DPyBjNJj"], "accumulated_threat_level": 3.2, "timewindow": 196} +{"Format": "IDEA0", "ID": "f9f4f948-9206-4b1b-84c8-5e7796798781", "DetectTime": "2024-05-21T12:55:38.153315+00:00", "EventTime": "2024-05-21T12:55:38.153349+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wGMd1bfHZbWddXi5"], "accumulated_threat_level": 4.0, "timewindow": 196} +{"Format": "IDEA0", "ID": "a8431035-9c98-418f-a923-3613944abed0", "DetectTime": "2024-05-21T12:55:38.192984+00:00", "EventTime": "2024-05-21T12:55:38.193007+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3lYwI3pnGnLrDKyX4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "282fd986-8406-49d9-b01f-2ef4bd653474", "DetectTime": "2024-05-21T12:55:38.248419+00:00", "EventTime": "2024-05-21T12:55:38.248455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYmSvX324lF3dtIrh9"], "accumulated_threat_level": 4.8, "timewindow": 196} +{"Format": "IDEA0", "ID": "36cdadbf-fd36-4e20-93b8-b7a2a1795708", "DetectTime": "2024-05-21T12:55:38.288380+00:00", "EventTime": "2024-05-21T12:55:38.288412+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn8qo43RVAfOR0mCOc"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "2858b998-a1da-4db8-8367-377bfb70f4d2", "DetectTime": "2024-05-21T12:55:38.339693+00:00", "EventTime": "2024-05-21T12:55:38.339725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtYOe4EPe9LLIHQxa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 196} +{"Format": "IDEA0", "ID": "dc291348-c847-4c15-98cb-17c2f0349f80", "DetectTime": "2024-05-21T12:55:38.388724+00:00", "EventTime": "2024-05-21T12:55:38.388748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTt28l1LtixNei3E21"], "accumulated_threat_level": 7.199999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "e3b9fbbc-00dd-4a6d-8fba-74565d0fa97a", "DetectTime": "2024-05-21T12:55:38.679073+00:00", "EventTime": "2024-05-21T12:55:38.679105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzllNr4ESRvbGMSci7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "522539c1-14b8-420b-9cb2-f8209aa6459f", "DetectTime": "2024-05-21T12:55:38.732355+00:00", "EventTime": "2024-05-21T12:55:38.732386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDalyk102HE5U77nJ2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 196} +{"Format": "IDEA0", "ID": "e57594cd-3424-417b-a156-965d57517c17", "DetectTime": "2024-05-21T12:55:38.789256+00:00", "EventTime": "2024-05-21T12:55:38.789294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvE2dx3EsPRbVFl8Jd"], "accumulated_threat_level": 9.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "ccdb74ab-ec36-46d4-9969-4b546f26cb32", "DetectTime": "2024-05-21T12:55:38.838836+00:00", "EventTime": "2024-05-21T12:55:38.838870+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfa4MX29slJZuCtXwk"], "accumulated_threat_level": 10.4, "timewindow": 196} +{"Format": "IDEA0", "ID": "b364d65a-739e-435d-8480-b661f257957e", "DetectTime": "2024-05-21T12:55:38.889079+00:00", "EventTime": "2024-05-21T12:55:38.889099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEcG51aeguXU7Zseg"], "accumulated_threat_level": 11.200000000000001, "timewindow": 196} +{"Format": "IDEA0", "ID": "33938fa0-d541-4da6-a8a9-11b2f6b7be35", "DetectTime": "2024-05-21T12:55:38.947103+00:00", "EventTime": "2024-05-21T12:55:38.947120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vls63Si1kcKVhCH7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 196} +{"Format": "Json", "ID": "33938fa0-d541-4da6-a8a9-11b2f6b7be35", "DetectTime": "2024-05-21T12:55:38.947103+00:00", "EventTime": "2024-05-21T12:55:38.947120+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "1970-01-09T03:39:24.845032+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 196. (real time 2024/05/21 12:55:39.146258)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 196, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "49755c80-148e-4805-a8d8-f0704102b077", "DetectTime": "2024-05-21T12:55:39.252367+00:00", "EventTime": "2024-05-21T12:55:39.252399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN31Pi17T2QOi8s4Ud"], "accumulated_threat_level": 0.8, "timewindow": 196} +{"Format": "IDEA0", "ID": "d3e7e52e-bfd8-44e8-8378-746c2f7274ba", "DetectTime": "2024-05-21T12:55:39.287953+00:00", "EventTime": "2024-05-21T12:55:39.287973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLrDIr3Th035LhoY1d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "2ba6eb2d-ac2c-45b1-904e-014dbdea19a6", "DetectTime": "2024-05-21T12:55:39.338729+00:00", "EventTime": "2024-05-21T12:55:39.338750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW3jt92AizQQOPWkp2"], "accumulated_threat_level": 1.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "6e78f5d0-0e6d-4c44-bad0-7b83bf0f21d4", "DetectTime": "2024-05-21T12:55:39.391894+00:00", "EventTime": "2024-05-21T12:55:39.391916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqajNZBiJUa8PUuWb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 196} +{"Format": "IDEA0", "ID": "21cdfa5e-71de-4cb7-8a6b-889ae9cf5e2a", "DetectTime": "2024-05-21T12:55:39.447394+00:00", "EventTime": "2024-05-21T12:55:39.447413+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjL7hBLB5SV7KUTl"], "accumulated_threat_level": 3.2, "timewindow": 196} +{"Format": "IDEA0", "ID": "162ff51c-71a1-47ff-80a9-6bab2c5c3dd0", "DetectTime": "2024-05-21T12:55:39.499998+00:00", "EventTime": "2024-05-21T12:55:39.500018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKSRV1bclJ1w982Q3"], "accumulated_threat_level": 4.0, "timewindow": 196} +{"Format": "IDEA0", "ID": "45160408-52ee-4764-a134-56bbcaf3aee3", "DetectTime": "2024-05-21T12:55:39.560334+00:00", "EventTime": "2024-05-21T12:55:39.560353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCmXvakbwohYzeq2"], "accumulated_threat_level": 4.8, "timewindow": 196} +{"Format": "IDEA0", "ID": "fc9ae21e-fa7a-42a1-bcd0-bb2ac5a6f65f", "DetectTime": "2024-05-21T12:55:39.609448+00:00", "EventTime": "2024-05-21T12:55:39.609466+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8K3G1BCTPN7Xbxr6"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "9b2830ee-b148-420c-b02d-4b9a2d3f5621", "DetectTime": "2024-05-21T12:55:39.918907+00:00", "EventTime": "2024-05-21T12:55:39.918929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFO5yL3HG84gfJPbn7"], "accumulated_threat_level": 0.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "a0d0b2ce-6f9f-47a7-b0f7-b44c4031c67b", "DetectTime": "2024-05-21T12:55:40.025839+00:00", "EventTime": "2024-05-21T12:55:40.025856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6xXJ2eIKhE2HdWhh"], "accumulated_threat_level": 1.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "5a5b0ab4-a852-47c0-9f01-5daecbf77d34", "DetectTime": "2024-05-21T12:55:40.069906+00:00", "EventTime": "2024-05-21T12:55:40.069926+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF836OvZLbFBmNT5g"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 197} +{"Format": "IDEA0", "ID": "64351fb1-d482-4f4a-b626-6b785c775852", "DetectTime": "2024-05-21T12:55:40.128612+00:00", "EventTime": "2024-05-21T12:55:40.128646+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["180.254.84.17"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS7713 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u8Vm4YQRBXJdaSj5"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "1108898a-4310-485a-af9a-1fdc4d17b9fd", "DetectTime": "2024-05-21T12:55:40.144688+00:00", "EventTime": "2024-05-21T12:55:40.144709+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["180.254.84.17"]}], "Attach": [{"Content": "connection to blacklisted IP: 180.254.84.17 from 10.0.2.19. AS: TELKOMNET-AS-AP PT Telekomunikasi Indonesia, ID AS7713 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2u8Vm4YQRBXJdaSj5"], "accumulated_threat_level": 10.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "42cce139-c55e-4e53-90d0-92569905a7b2", "DetectTime": "2024-05-21T12:55:40.280762+00:00", "EventTime": "2024-05-21T12:55:40.280783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTaXe2HYYC9P3fOY2"], "accumulated_threat_level": 3.2, "timewindow": 197} +{"Format": "IDEA0", "ID": "923c8cd9-eed3-49c2-b5aa-18fefd04c9bb", "DetectTime": "2024-05-21T12:55:40.309722+00:00", "EventTime": "2024-05-21T12:55:40.309742+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl98Pq4cRhQe7x1jz9"], "accumulated_threat_level": 4.0, "timewindow": 197} +{"Format": "IDEA0", "ID": "1ca191eb-fa1d-452f-803e-98845a7bc4bf", "DetectTime": "2024-05-21T12:55:40.358856+00:00", "EventTime": "2024-05-21T12:55:40.358885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbXVO2ZT01vhX2BC4"], "accumulated_threat_level": 4.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "5eea4d04-15d4-48cb-aa58-8899329625fa", "DetectTime": "2024-05-21T12:55:40.657372+00:00", "EventTime": "2024-05-21T12:55:40.657394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY4Q2E3qeoLiCT3c5c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "0e9e24f5-9cb2-4ad4-a923-9d77358f9b53", "DetectTime": "2024-05-21T12:55:40.707994+00:00", "EventTime": "2024-05-21T12:55:40.708017+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1N2B1JtZk8FHLJi6"], "accumulated_threat_level": 5.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "bd05cd05-f80c-4efb-a6ec-b272938059b9", "DetectTime": "2024-05-21T12:55:40.757730+00:00", "EventTime": "2024-05-21T12:55:40.757750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCufA2MANdESykrBb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "1cace223-1e34-4129-b7f1-00796d421eea", "DetectTime": "2024-05-21T12:55:40.810993+00:00", "EventTime": "2024-05-21T12:55:40.811012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUnsRv2LmKx7FQ6yD"], "accumulated_threat_level": 7.199999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "9f590fae-66cf-4391-bc83-e6ed96dba7e5", "DetectTime": "2024-05-21T12:55:40.864792+00:00", "EventTime": "2024-05-21T12:55:40.864813+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaF4A33EEOPDXq0dda"], "accumulated_threat_level": 7.999999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "9bf11361-b7e9-4bf7-818e-4ecd6c45241d", "DetectTime": "2024-05-21T12:55:40.919193+00:00", "EventTime": "2024-05-21T12:55:40.919214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpNCJ2uqpV4v83GOe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "62d92859-a7c5-481b-9ef0-bb811a8c6b2d", "DetectTime": "2024-05-21T12:55:41.224592+00:00", "EventTime": "2024-05-21T12:55:41.224614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH6qEqC7pJ0nksDS5"], "accumulated_threat_level": 9.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "39e88591-33a5-42bc-a50c-44ff6dc86a54", "DetectTime": "2024-05-21T12:55:41.280221+00:00", "EventTime": "2024-05-21T12:55:41.280244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp5Lfj2zDuILzTx0if"], "accumulated_threat_level": 10.4, "timewindow": 197} +{"Format": "IDEA0", "ID": "ba91f4d4-3c5d-4619-a31f-9a35717909f3", "DetectTime": "2024-05-21T12:55:41.334913+00:00", "EventTime": "2024-05-21T12:55:41.334932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfbpj2uXkcdkML8D4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 197} +{"Format": "IDEA0", "ID": "d63f476f-f34a-4509-80ac-2c7989adb89f", "DetectTime": "2024-05-21T12:55:41.385441+00:00", "EventTime": "2024-05-21T12:55:41.385463+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnDqXPfnEA6re072"], "accumulated_threat_level": 12.000000000000002, "timewindow": 197} +{"Format": "Json", "ID": "d63f476f-f34a-4509-80ac-2c7989adb89f", "DetectTime": "2024-05-21T12:55:41.385441+00:00", "EventTime": "2024-05-21T12:55:41.385463+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "1970-01-09T04:09:53.748729+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2024/05/21 12:55:41.570942)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 197, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "03ff6128-21a5-4dae-9c74-37f8f94a4355", "DetectTime": "2024-05-21T12:55:41.582018+00:00", "EventTime": "2024-05-21T12:55:41.582039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoMo8h1umaIdDyh6"], "accumulated_threat_level": 0.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "b7c8a0dc-6f20-4915-8d0b-6d47b14423a4", "DetectTime": "2024-05-21T12:55:41.599553+00:00", "EventTime": "2024-05-21T12:55:41.599573+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90JOO1JTMNTziqRMa"], "accumulated_threat_level": 1.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "3941d7a6-3299-45ca-acc5-3797b659ba5a", "DetectTime": "2024-05-21T12:55:41.611280+00:00", "EventTime": "2024-05-21T12:55:41.611301+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzqjNb4A01Kz2JnJAg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 197} +{"Format": "IDEA0", "ID": "59208e17-c13a-41ae-9399-0457d8d9406b", "DetectTime": "2024-05-21T12:55:41.624499+00:00", "EventTime": "2024-05-21T12:55:41.624520+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C310vD3T2w5wVZ7z2d"], "accumulated_threat_level": 3.2, "timewindow": 197} +{"Format": "IDEA0", "ID": "3a2079f3-81f3-4700-852f-514bcdc8f833", "DetectTime": "2024-05-21T12:55:41.848734+00:00", "EventTime": "2024-05-21T12:55:41.848757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTPOLC1rQT65g8NlUa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "4be8f096-97e1-4d38-ba6d-131cea633bc8", "DetectTime": "2024-05-21T12:55:41.896467+00:00", "EventTime": "2024-05-21T12:55:41.896488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMj8L2e2gux3EiXTk"], "accumulated_threat_level": 4.0, "timewindow": 197} +{"Format": "IDEA0", "ID": "3dba78ed-e261-4b9c-855f-a255c0b02e8b", "DetectTime": "2024-05-21T12:55:41.951176+00:00", "EventTime": "2024-05-21T12:55:41.951195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxiEtL2sC91ciJniL9"], "accumulated_threat_level": 4.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "71deab48-4e93-4172-a7e2-ce9ad12a5de2", "DetectTime": "2024-05-21T12:55:42.006356+00:00", "EventTime": "2024-05-21T12:55:42.006381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRdSi2feRojbyQKe"], "accumulated_threat_level": 5.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "58ab6a3b-e898-4c55-a9bd-57dbe30f6558", "DetectTime": "2024-05-21T12:55:42.068482+00:00", "EventTime": "2024-05-21T12:55:42.068502+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAajO3vVi5eIGM12i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "6cb644b8-5453-4359-a144-38675e1d290e", "DetectTime": "2024-05-21T12:55:42.121468+00:00", "EventTime": "2024-05-21T12:55:42.121491+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjOgx1amQGQ6eKpTb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "da589122-1818-47e9-9734-57e8f800a821", "DetectTime": "2024-05-21T12:55:42.399286+00:00", "EventTime": "2024-05-21T12:55:42.399310+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPPhyD1BNRZzJO56hd"], "accumulated_threat_level": 7.999999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "e55cba24-82a9-499c-b9e3-45bcc43ebd4b", "DetectTime": "2024-05-21T12:55:42.450617+00:00", "EventTime": "2024-05-21T12:55:42.450636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMnZ0N2rEXxjPAYIP6"], "accumulated_threat_level": 8.799999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "2a6c350a-0639-4647-ae9b-7bb7aa54e4e5", "DetectTime": "2024-05-21T12:55:42.528062+00:00", "EventTime": "2024-05-21T12:55:42.528084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMDZQ1QUbw72awgP3"], "accumulated_threat_level": 9.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "a5665bde-6ea6-43ca-a61e-6614feca941b", "DetectTime": "2024-05-21T12:55:42.604458+00:00", "EventTime": "2024-05-21T12:55:42.604480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVPNOXTUcNDAex09"], "accumulated_threat_level": 10.4, "timewindow": 197} +{"Format": "IDEA0", "ID": "46b71e38-31f6-45a1-9fc2-17c7f19bb6dc", "DetectTime": "2024-05-21T12:55:42.669834+00:00", "EventTime": "2024-05-21T12:55:42.669852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuSaXo1G8KvIFHJEgc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 197} +{"Format": "IDEA0", "ID": "37f313a4-1faf-4550-ba27-1ed7e8da5140", "DetectTime": "2024-05-21T12:55:42.713571+00:00", "EventTime": "2024-05-21T12:55:42.713594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jtIo3N9GmRClD9y6"], "accumulated_threat_level": 12.000000000000002, "timewindow": 197} +{"Format": "Json", "ID": "37f313a4-1faf-4550-ba27-1ed7e8da5140", "DetectTime": "2024-05-21T12:55:42.713571+00:00", "EventTime": "2024-05-21T12:55:42.713594+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "1970-01-09T04:40:12.032831+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2024/05/21 12:55:42.909941)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 197, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "78035e88-1ffa-46cb-a472-6c6039b031a9", "DetectTime": "2024-05-21T12:55:43.004032+00:00", "EventTime": "2024-05-21T12:55:43.004051+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLjxn3CGnzzi1kDk6"], "accumulated_threat_level": 0.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "eb7b4487-cdc6-4fe5-8a10-4ee9b29318b5", "DetectTime": "2024-05-21T12:55:43.052371+00:00", "EventTime": "2024-05-21T12:55:43.052393+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXo211WiQbiGW4Yp8"], "accumulated_threat_level": 1.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "92fd9e02-177c-4303-9e5e-a9674fb2dc81", "DetectTime": "2024-05-21T12:55:43.106141+00:00", "EventTime": "2024-05-21T12:55:43.106163+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutzFHB7DI5Q3UsAf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 197} +{"Format": "IDEA0", "ID": "71850a9b-54fa-4fa5-a9ea-ef66cefa40aa", "DetectTime": "2024-05-21T12:55:43.280051+00:00", "EventTime": "2024-05-21T12:55:43.280077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3FKeo2TmDp8heo0r1"], "accumulated_threat_level": 3.2, "timewindow": 197} +{"Format": "IDEA0", "ID": "b217cb5d-4f90-4fb8-9164-7cb0c5330e62", "DetectTime": "2024-05-21T12:55:43.311912+00:00", "EventTime": "2024-05-21T12:55:43.311932+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV03wf19asWBpvHo2f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "964c9f97-7e00-4152-9f41-e47e8b3e0552", "DetectTime": "2024-05-21T12:55:43.368428+00:00", "EventTime": "2024-05-21T12:55:43.368448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0jDj3Hgng63nS1e6"], "accumulated_threat_level": 4.0, "timewindow": 197} +{"Format": "IDEA0", "ID": "f2662b65-6998-48c6-bcc9-e0893fae163e", "DetectTime": "2024-05-21T12:55:43.418188+00:00", "EventTime": "2024-05-21T12:55:43.418214+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChC4sduWsk5yTbiq3"], "accumulated_threat_level": 4.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "6bfdb3b5-0724-4e9f-9792-8f115cf50cbb", "DetectTime": "2024-05-21T12:55:43.678692+00:00", "EventTime": "2024-05-21T12:55:43.678713+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbD8NP0wFBRhYs8d"], "accumulated_threat_level": 5.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "2d1a5014-2947-40db-a1ce-0812949156a8", "DetectTime": "2024-05-21T12:55:43.732092+00:00", "EventTime": "2024-05-21T12:55:43.732115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6DF5A4S0vpQvVx6kd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "b4557e5f-dd0f-45ca-a95e-be9280a1be39", "DetectTime": "2024-05-21T12:55:43.781175+00:00", "EventTime": "2024-05-21T12:55:43.781192+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIB5N1TMXVsJnTQlk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "0f1ff83f-a89f-4c57-8928-2b5aa39d53af", "DetectTime": "2024-05-21T12:55:43.836127+00:00", "EventTime": "2024-05-21T12:55:43.836149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJl4x9NACQqYnKHle"], "accumulated_threat_level": 7.999999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "08861d0c-6dc1-47d5-af84-dfab81808b3c", "DetectTime": "2024-05-21T12:55:43.887398+00:00", "EventTime": "2024-05-21T12:55:43.887417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDhmRs3G2ifm6mf6Vh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 197} +{"Format": "IDEA0", "ID": "f8c2b439-9197-4e9a-8b3a-e44e12e9c04c", "DetectTime": "2024-05-21T12:55:43.946600+00:00", "EventTime": "2024-05-21T12:55:43.946620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktsNE30quJ1oRwvk6"], "accumulated_threat_level": 9.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "87907ef8-8ba2-437f-a9fa-920bbf022bfb", "DetectTime": "2024-05-21T12:55:44.397971+00:00", "EventTime": "2024-05-21T12:55:44.397995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPMbRxZj42qZmXsY8"], "accumulated_threat_level": 10.4, "timewindow": 197} +{"Format": "IDEA0", "ID": "80bfd042-725d-4d5a-86ca-dfd6a93b5e7a", "DetectTime": "2024-05-21T12:55:44.410563+00:00", "EventTime": "2024-05-21T12:55:44.410581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9glIhl9o1BBgPs4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 197} +{"Format": "IDEA0", "ID": "c9e8d51e-8a69-4684-b949-a8417f1a7007", "DetectTime": "2024-05-21T12:55:44.421629+00:00", "EventTime": "2024-05-21T12:55:44.421648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4DcU1k5jDmLOxQPk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 197} +{"Format": "Json", "ID": "c9e8d51e-8a69-4684-b949-a8417f1a7007", "DetectTime": "2024-05-21T12:55:44.421629+00:00", "EventTime": "2024-05-21T12:55:44.421648+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "1970-01-09T04:40:15.286967+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 197. (real time 2024/05/21 12:55:44.621215)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 197, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "c89f4c60-436f-45bc-9e45-695580c18f82", "DetectTime": "2024-05-21T12:55:44.657188+00:00", "EventTime": "2024-05-21T12:55:44.657206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4TIgi3nhgI5QfbsL7"], "accumulated_threat_level": 0.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "d2ad24e4-fee7-408f-92fd-73df4b499adc", "DetectTime": "2024-05-21T12:55:44.668191+00:00", "EventTime": "2024-05-21T12:55:44.668209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CypYmEDpTsArfZ1of"], "accumulated_threat_level": 1.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "822c185e-6c06-4b1b-b8f3-304bd93674cb", "DetectTime": "2024-05-21T12:55:44.679752+00:00", "EventTime": "2024-05-21T12:55:44.679774+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9drLY3LygRaGVBsM"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 197} +{"Format": "IDEA0", "ID": "3eaec3ec-2ba6-4172-834f-4f83732da0ec", "DetectTime": "2024-05-21T12:55:44.692333+00:00", "EventTime": "2024-05-21T12:55:44.692353+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crys403o9MzLZVcL09"], "accumulated_threat_level": 3.2, "timewindow": 197} +{"Format": "IDEA0", "ID": "e98833be-0139-485c-8710-0a29c1d7902e", "DetectTime": "2024-05-21T12:55:44.785748+00:00", "EventTime": "2024-05-21T12:55:44.785770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKhtWl3gJtfKiZC5g2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "a046b92d-8c13-4b01-951d-687cbe4ca61b", "DetectTime": "2024-05-21T12:55:44.835857+00:00", "EventTime": "2024-05-21T12:55:44.835877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsFFoZ3uiygoUucL8b"], "accumulated_threat_level": 4.0, "timewindow": 197} +{"Format": "IDEA0", "ID": "a797b88a-d2bb-4ac9-80b9-a6b62b0bea39", "DetectTime": "2024-05-21T12:55:44.889977+00:00", "EventTime": "2024-05-21T12:55:44.889999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZE4P2orXklCHpSZg"], "accumulated_threat_level": 4.8, "timewindow": 197} +{"Format": "IDEA0", "ID": "79b69958-be4a-4d81-b59d-3b3a2c141c0c", "DetectTime": "2024-05-21T12:55:44.949922+00:00", "EventTime": "2024-05-21T12:55:44.949940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIA2a02p8JoTx5C34f"], "accumulated_threat_level": 5.6, "timewindow": 197} +{"Format": "IDEA0", "ID": "8642134b-d85b-44c2-ba40-a1f1dbf71154", "DetectTime": "2024-05-21T12:55:44.999278+00:00", "EventTime": "2024-05-21T12:55:44.999297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8cdr2zQE3GoTBnId"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "ae19ee25-4bc6-4570-ab5f-897a3ff4c69d", "DetectTime": "2024-05-21T12:55:45.089191+00:00", "EventTime": "2024-05-21T12:55:45.089210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcDni3BDmd4ADm8t"], "accumulated_threat_level": 0.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "aa192159-0c83-4831-a109-429dcbb9477f", "DetectTime": "2024-05-21T12:55:45.179748+00:00", "EventTime": "2024-05-21T12:55:45.179767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf4AqBACjI8jKlne9"], "accumulated_threat_level": 1.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "16cf6306-35ea-481c-a8fe-6a073f3a0477", "DetectTime": "2024-05-21T12:55:45.462797+00:00", "EventTime": "2024-05-21T12:55:45.462821+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqWXBrMktipls9bci"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 198} +{"Format": "IDEA0", "ID": "bbcf413b-f5e4-496e-adc4-076dfa9855f1", "DetectTime": "2024-05-21T12:55:45.501231+00:00", "EventTime": "2024-05-21T12:55:45.501250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlBur2DVIa9h1oRbd"], "accumulated_threat_level": 3.2, "timewindow": 198} +{"Format": "IDEA0", "ID": "5b15c6fc-d85d-4c20-8109-b4d6ea5c394b", "DetectTime": "2024-05-21T12:55:45.561311+00:00", "EventTime": "2024-05-21T12:55:45.561329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CocPAp2cvMytyE6Yx6"], "accumulated_threat_level": 4.0, "timewindow": 198} +{"Format": "IDEA0", "ID": "3103afd2-ffa9-45fc-bfde-0fc732095841", "DetectTime": "2024-05-21T12:55:45.608125+00:00", "EventTime": "2024-05-21T12:55:45.608146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyP9Ns4LP1aSFg2bVg"], "accumulated_threat_level": 4.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "eb4ea254-e6b3-4c82-a286-3d69f951da99", "DetectTime": "2024-05-21T12:55:45.661519+00:00", "EventTime": "2024-05-21T12:55:45.661538+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXSqH28Dhuht2p0Lf"], "accumulated_threat_level": 5.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "59113d47-33f2-4cf4-bda4-274ef8c7aec8", "DetectTime": "2024-05-21T12:55:45.717505+00:00", "EventTime": "2024-05-21T12:55:45.717527+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Ekbj4cX2kouwceh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "7b0a3ee1-2365-4251-b39f-ef905942be01", "DetectTime": "2024-05-21T12:55:45.970465+00:00", "EventTime": "2024-05-21T12:55:45.970490+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CufXkE3RBmTGWCJWf7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "357598c7-c77c-46d4-86f7-14e90f697966", "DetectTime": "2024-05-21T12:55:46.008522+00:00", "EventTime": "2024-05-21T12:55:46.008541+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyo8yc2XNibtUMLhud"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "dc7f0952-818a-4e62-aa5a-250a4ff653d7", "DetectTime": "2024-05-21T12:55:46.022448+00:00", "EventTime": "2024-05-21T12:55:46.022468+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cyo8yc2XNibtUMLhud"], "accumulated_threat_level": 11.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "80ed1a94-dc4e-4b72-adfd-99207f769538", "DetectTime": "2024-05-21T12:55:46.033868+00:00", "EventTime": "2024-05-21T12:55:46.033888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C03xGy3XP0phXhw9Sa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "a06f94c5-0b88-4159-a949-3dbc89cd31cc", "DetectTime": "2024-05-21T12:55:46.087000+00:00", "EventTime": "2024-05-21T12:55:46.087019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCVOudqPizK6o2GNj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "496dbfb9-b796-4ed6-940a-341d6205cc3f", "DetectTime": "2024-05-21T12:55:46.133388+00:00", "EventTime": "2024-05-21T12:55:46.133408+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkA4ry24fnmLeMEsWd"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "442fa70b-458e-4147-bbe3-b38a5d965068", "DetectTime": "2024-05-21T12:55:46.146205+00:00", "EventTime": "2024-05-21T12:55:46.146229+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkA4ry24fnmLeMEsWd"], "accumulated_threat_level": 11.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "8f352319-15c9-4ac4-b6cb-5f6b48fa39cc", "DetectTime": "2024-05-21T12:55:46.151716+00:00", "EventTime": "2024-05-21T12:55:46.151738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLs1Q3wtfUzD9T3X4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "4103aa84-35b8-4797-b4ca-55a9ee0bbf21", "DetectTime": "2024-05-21T12:55:46.184456+00:00", "EventTime": "2024-05-21T12:55:46.184477+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDk58x3ObDFHIq1j"], "accumulated_threat_level": 8.799999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "8f1d0929-34bf-4567-ba69-a62f9d21ec62", "DetectTime": "2024-05-21T12:55:46.220680+00:00", "EventTime": "2024-05-21T12:55:46.220702+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf5w3e3j0JtoV0mGlb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "871fc31d-44db-488d-9b8b-cb9c0fe42da9", "DetectTime": "2024-05-21T12:55:46.272687+00:00", "EventTime": "2024-05-21T12:55:46.272709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFPJ23HPbulkR6i3l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "60c56d25-5902-4dbd-abc4-52c25b7d55d6", "DetectTime": "2024-05-21T12:55:46.322805+00:00", "EventTime": "2024-05-21T12:55:46.322825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAdXfVEPgGHtAAC8"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "b26b6614-b31a-49e1-bdbb-b818fbcf4bf5", "DetectTime": "2024-05-21T12:55:46.566577+00:00", "EventTime": "2024-05-21T12:55:46.566598+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZBzqlYRTgEmv0Glg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "4316e4b1-cb34-49fb-8122-e8bea62b40bf", "DetectTime": "2024-05-21T12:55:46.622720+00:00", "EventTime": "2024-05-21T12:55:46.622739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIUtc3M6Vft5U3gB6"], "accumulated_threat_level": 10.4, "timewindow": 198} +{"Format": "IDEA0", "ID": "0b58408a-2e5c-4877-8acb-4c8080612b83", "DetectTime": "2024-05-21T12:55:46.636870+00:00", "EventTime": "2024-05-21T12:55:46.636893+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22OUD40vV2MVWzeQb"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "d52ec43a-e9a2-4c92-b51a-ec5138843812", "DetectTime": "2024-05-21T12:55:46.652837+00:00", "EventTime": "2024-05-21T12:55:46.652868+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C22OUD40vV2MVWzeQb"], "accumulated_threat_level": 12.0, "timewindow": 44} +{"Format": "Json", "ID": "d52ec43a-e9a2-4c92-b51a-ec5138843812", "DetectTime": "2024-05-21T12:55:46.652837+00:00", "EventTime": "2024-05-21T12:55:46.652868+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "1970-01-02T19:39:44.642913+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 44. (real time 2024/05/21 12:55:47.016693)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.0, "timewindow": 44, "profileid": "profile_10.0.2.19", "threat_level": 12.0} +{"Format": "IDEA0", "ID": "8fe9ac52-8ccb-45d8-9a98-e98787c10e9e", "DetectTime": "2024-05-21T12:55:47.022444+00:00", "EventTime": "2024-05-21T12:55:47.022462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYuQyn1zMXVs1X6fOg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "6a157dd9-274d-448a-ad1d-dc768308dd70", "DetectTime": "2024-05-21T12:55:47.027439+00:00", "EventTime": "2024-05-21T12:55:47.027458+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEGsvv2bTW1tRQAVa5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "d97c01af-baf3-4b98-b72c-90218730047f", "DetectTime": "2024-05-21T12:55:47.043062+00:00", "EventTime": "2024-05-21T12:55:47.043080+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6Gef1MBAfmen7rOk"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "12db94d1-17ca-4f36-84b1-d2185501ea00", "DetectTime": "2024-05-21T12:55:47.056850+00:00", "EventTime": "2024-05-21T12:55:47.056870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD6Gef1MBAfmen7rOk"], "accumulated_threat_level": 0.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "21040e5e-9165-4810-bfa9-1bbdd7efa3ce", "DetectTime": "2024-05-21T12:55:47.062223+00:00", "EventTime": "2024-05-21T12:55:47.062242+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVpY252KQIeaGz131j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "94c6a07b-040d-4798-9e78-16efa2ef15dd", "DetectTime": "2024-05-21T12:55:47.077310+00:00", "EventTime": "2024-05-21T12:55:47.077331+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdbeP14UpISMHw8h6"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "eb0eb616-d563-4a33-ac91-9c8d2b97a944", "DetectTime": "2024-05-21T12:55:47.091357+00:00", "EventTime": "2024-05-21T12:55:47.091379+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxdbeP14UpISMHw8h6"], "accumulated_threat_level": 1.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "e6ffbaac-aa7e-499f-9d95-e7edcd912513", "DetectTime": "2024-05-21T12:55:47.104468+00:00", "EventTime": "2024-05-21T12:55:47.104488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoWcj3uFnjgsrp2jh"], "accumulated_threat_level": 11.200000000000001, "timewindow": 198} +{"Format": "IDEA0", "ID": "eab1ca2f-f321-4e79-ac23-de9ba7a64988", "DetectTime": "2024-05-21T12:55:47.117437+00:00", "EventTime": "2024-05-21T12:55:47.117456+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4vbf87ksebYfuW2"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "51dd631b-76bd-4f5b-bbd5-706d052bb75b", "DetectTime": "2024-05-21T12:55:47.131129+00:00", "EventTime": "2024-05-21T12:55:47.131150+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm4vbf87ksebYfuW2"], "accumulated_threat_level": 1.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "29606c13-4ad7-438d-b534-9e8f2b86e5b8", "DetectTime": "2024-05-21T12:55:47.144645+00:00", "EventTime": "2024-05-21T12:55:47.144664+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09Pmx325Udjus2ty9"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "699ab659-8c1b-4e72-806f-fe2aa8903ebd", "DetectTime": "2024-05-21T12:55:47.158879+00:00", "EventTime": "2024-05-21T12:55:47.158904+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09Pmx325Udjus2ty9"], "accumulated_threat_level": 2.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "35ffb02d-fd2c-4ab0-8e29-09bd84442d66", "DetectTime": "2024-05-21T12:55:47.173547+00:00", "EventTime": "2024-05-21T12:55:47.173565+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxuO2427UyehENJi1"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "7578967d-318a-42e4-af0c-29db58faa45b", "DetectTime": "2024-05-21T12:55:47.188217+00:00", "EventTime": "2024-05-21T12:55:47.188253+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVxuO2427UyehENJi1"], "accumulated_threat_level": 2.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "1cd8538e-8cf0-4fef-a74e-7d1e12aaebaa", "DetectTime": "2024-05-21T12:55:47.285836+00:00", "EventTime": "2024-05-21T12:55:47.285857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK1oa91HFECi307B0a"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "0830f1a1-1d89-4ca8-b019-6d36e2d3b90d", "DetectTime": "2024-05-21T12:55:47.330884+00:00", "EventTime": "2024-05-21T12:55:47.330905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvUrETzaveVpCnV64"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "8a28c8fe-bd82-49db-b71f-6d30a3cef21a", "DetectTime": "2024-05-21T12:55:47.348310+00:00", "EventTime": "2024-05-21T12:55:47.348337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzwRo4wvbWy6v4At1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 198} +{"Format": "Json", "ID": "8a28c8fe-bd82-49db-b71f-6d30a3cef21a", "DetectTime": "2024-05-21T12:55:47.348310+00:00", "EventTime": "2024-05-21T12:55:47.348337+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "1970-01-09T05:10:49.800785+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2024/05/21 12:55:47.517179)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 198, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "091771b1-6b30-4ce8-9135-0ab8e2f190d0", "DetectTime": "2024-05-21T12:55:47.521436+00:00", "EventTime": "2024-05-21T12:55:47.521456+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMH6Y84DujJuMsUy57"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "bdf5c561-c728-4112-92aa-bc6af0990a96", "DetectTime": "2024-05-21T12:55:47.526031+00:00", "EventTime": "2024-05-21T12:55:47.526050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQVEx1O8RrCfHR6Eb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "aa3bb5f7-472a-4636-87d6-bfc1e9de2396", "DetectTime": "2024-05-21T12:55:47.530549+00:00", "EventTime": "2024-05-21T12:55:47.530568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3wFTu3ywRXWjiCcl6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "48dde184-8209-4ceb-b8ee-3a2c18992111", "DetectTime": "2024-05-21T12:55:47.534999+00:00", "EventTime": "2024-05-21T12:55:47.535018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkRbqI27KLx2DcTZnl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "89f03afc-8063-49b0-86b8-434b988969f7", "DetectTime": "2024-05-21T12:55:47.564992+00:00", "EventTime": "2024-05-21T12:55:47.565012+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMc2H3SxMu57vNIz2"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "51f955dc-1342-4dec-8c77-2de48fa264a6", "DetectTime": "2024-05-21T12:55:47.581639+00:00", "EventTime": "2024-05-21T12:55:47.581660+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXMc2H3SxMu57vNIz2"], "accumulated_threat_level": 3.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "cae47095-fa0a-47ca-a6af-cccdbbdca226", "DetectTime": "2024-05-21T12:55:47.614925+00:00", "EventTime": "2024-05-21T12:55:47.614944+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAu1urnOXLE8mI0th"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "39a7594a-b592-4174-b6b2-db3fc09c7cc8", "DetectTime": "2024-05-21T12:55:47.629979+00:00", "EventTime": "2024-05-21T12:55:47.629999+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAu1urnOXLE8mI0th"], "accumulated_threat_level": 3.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "1a4ab4e0-d305-4237-8972-79abc72c94bb", "DetectTime": "2024-05-21T12:55:47.661806+00:00", "EventTime": "2024-05-21T12:55:47.661825+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqSmo2Pkbc2ihOiy4"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "b5c86e91-5c29-4e02-8bc3-d335b804b39a", "DetectTime": "2024-05-21T12:55:47.678039+00:00", "EventTime": "2024-05-21T12:55:47.678064+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBqSmo2Pkbc2ihOiy4"], "accumulated_threat_level": 4.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "5407fec4-a592-4b89-8c43-59ff956929b6", "DetectTime": "2024-05-21T12:55:47.976881+00:00", "EventTime": "2024-05-21T12:55:47.976903+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.97.55"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUydBF2XYADJiM7FE3"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "72737490-f320-49c8-8035-462f5c6a176d", "DetectTime": "2024-05-21T12:55:47.989696+00:00", "EventTime": "2024-05-21T12:55:47.989721+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte58x2Mz14skoJUal"], "accumulated_threat_level": 0.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "767c57c2-f5e9-4417-84eb-f187fd00a48b", "DetectTime": "2024-05-21T12:55:48.003729+00:00", "EventTime": "2024-05-21T12:55:48.003753+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUydBF2XYADJiM7FE3"], "accumulated_threat_level": 4.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "5fb51423-642a-4c97-a3f3-dd0e2781c10f", "DetectTime": "2024-05-21T12:55:48.018199+00:00", "EventTime": "2024-05-21T12:55:48.018220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxhdURfW8JK2f3ub"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "fed10529-7cb6-4324-bfe9-17e8f7ee9d7f", "DetectTime": "2024-05-21T12:55:48.157851+00:00", "EventTime": "2024-05-21T12:55:48.157871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CafC6Q3j4NpBfU1cm4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "3aba35d4-2762-4b94-825a-0b4ea8b10294", "DetectTime": "2024-05-21T12:55:48.163560+00:00", "EventTime": "2024-05-21T12:55:48.163581+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CetV71Kxu7nuQBQu6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "28d2246e-41cc-4504-9819-bcc7069aa11d", "DetectTime": "2024-05-21T12:55:48.223759+00:00", "EventTime": "2024-05-21T12:55:48.223782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWkW6s1s3NH0cD1YH4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "a1ee7491-e1b1-4c9e-85a9-f698d02b080e", "DetectTime": "2024-05-21T12:55:48.318597+00:00", "EventTime": "2024-05-21T12:55:48.318619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpATkMWUzFfG1hLi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "4ed2a3af-39eb-49bb-a17c-a6d9d2aa2a20", "DetectTime": "2024-05-21T12:55:48.324562+00:00", "EventTime": "2024-05-21T12:55:48.324582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9b68HPDhfeBLMHQi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "7c36340c-0938-439a-8de0-b2298dc17bc6", "DetectTime": "2024-05-21T12:55:48.684105+00:00", "EventTime": "2024-05-21T12:55:48.684126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5QgGU1vHXhpe1hy97"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "218b2f2b-c214-47f1-94a8-e2e3e8775764", "DetectTime": "2024-05-21T12:55:48.737950+00:00", "EventTime": "2024-05-21T12:55:48.737986+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdyG22hMpxPEn7jtl"], "accumulated_threat_level": 1.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "db26fe4e-91a2-4447-8f73-484bddcda2fa", "DetectTime": "2024-05-21T12:55:48.745349+00:00", "EventTime": "2024-05-21T12:55:48.745370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJyoK349TeEpKu7EE7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "24fae523-bce7-4797-96c5-b6afec982df3", "DetectTime": "2024-05-21T12:55:48.750452+00:00", "EventTime": "2024-05-21T12:55:48.750472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIqZIZn24ASMOYh45"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "b5c49a4e-fd09-406b-a0ff-cd8711f5c276", "DetectTime": "2024-05-21T12:55:48.945713+00:00", "EventTime": "2024-05-21T12:55:48.945734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM00GV1YEBilYeyDj6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "638e4f9a-9cbd-4233-8cfe-00dff2c3e2e7", "DetectTime": "2024-05-21T12:55:48.959789+00:00", "EventTime": "2024-05-21T12:55:48.959811+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7AnBlABQnaLJj5e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "dfa81ff7-aa92-4081-939d-0f6c9f71f55e", "DetectTime": "2024-05-21T12:55:48.965545+00:00", "EventTime": "2024-05-21T12:55:48.965565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQSFiw2ADwPHPv3LF4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "0bc3ce50-095e-4b06-83eb-a792247d75df", "DetectTime": "2024-05-21T12:55:48.970163+00:00", "EventTime": "2024-05-21T12:55:48.970183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CijUHR2Uke6VbHtTD5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "e2886dca-0189-415b-b932-1960348f98e6", "DetectTime": "2024-05-21T12:55:48.974887+00:00", "EventTime": "2024-05-21T12:55:48.974907+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cln6qb4M0hRXTkNr9i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "4e199dda-130c-405e-ab77-ca7aac14e288", "DetectTime": "2024-05-21T12:55:49.393584+00:00", "EventTime": "2024-05-21T12:55:49.393607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKNq5L3V2DO5Ux3nFb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "6375ea72-44f3-4cf9-bdb5-7b0260be9bc7", "DetectTime": "2024-05-21T12:55:49.434489+00:00", "EventTime": "2024-05-21T12:55:49.434510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbphME1mVVQKx35Nuj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 198} +{"Format": "IDEA0", "ID": "e2acc25b-5781-47b4-88aa-bddf194c0420", "DetectTime": "2024-05-21T12:55:49.465326+00:00", "EventTime": "2024-05-21T12:55:49.465348+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CguBUp3wIqe6icj2Bb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "0638b3c3-7a6b-43dd-8ca3-d734b4e1fe27", "DetectTime": "2024-05-21T12:55:49.531716+00:00", "EventTime": "2024-05-21T12:55:49.531739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKJmqU3u3Yf1w0b4bi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "bdfd5500-dd71-4f81-9f44-e48ccbb354e9", "DetectTime": "2024-05-21T12:55:49.537149+00:00", "EventTime": "2024-05-21T12:55:49.537170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKAEe2teso6gnH7cc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "7cea58bf-2a6f-4daa-85e4-3eed924307f7", "DetectTime": "2024-05-21T12:55:49.787327+00:00", "EventTime": "2024-05-21T12:55:49.787351+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ3hIw2iCjFl1xde1d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "556c2e8b-2cff-4bd2-8704-a7862798b458", "DetectTime": "2024-05-21T12:55:49.832362+00:00", "EventTime": "2024-05-21T12:55:49.832384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9t1cq1tBDFm77QEol"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "4226ee5e-e00b-4009-a10b-737e7407d96a", "DetectTime": "2024-05-21T12:55:50.090156+00:00", "EventTime": "2024-05-21T12:55:50.090180+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCucDE4ZUjWkWH0NMb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "bee50f15-a65c-4189-b85c-68bcafe0e6f2", "DetectTime": "2024-05-21T12:55:50.144236+00:00", "EventTime": "2024-05-21T12:55:50.144258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClRMUO2i9pzFD84JK4"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "a6b0891e-5bb6-4a71-8a6b-d7a0ae3a6d87", "DetectTime": "2024-05-21T12:55:50.171183+00:00", "EventTime": "2024-05-21T12:55:50.171209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfoJvC2BrEKZEOf5Gc"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "81149702-8b36-43eb-b167-b6fc718240a6", "DetectTime": "2024-05-21T12:55:50.176387+00:00", "EventTime": "2024-05-21T12:55:50.176406+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ0MrFs6vYBCRlFd6"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "aa485da5-52d1-4ebd-a11d-cae37a48ae68", "DetectTime": "2024-05-21T12:55:50.490223+00:00", "EventTime": "2024-05-21T12:55:50.490244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GmWHcogtDJ4hZ36"], "accumulated_threat_level": 3.2, "timewindow": 198} +{"Format": "IDEA0", "ID": "f924f2bd-0958-475d-92ab-4dbb02e45c5a", "DetectTime": "2024-05-21T12:55:50.495238+00:00", "EventTime": "2024-05-21T12:55:50.495259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHkyLq3CaYwqoPKLc9"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "dcfde477-ae17-4493-afc6-02e50ccedbbb", "DetectTime": "2024-05-21T12:55:50.657778+00:00", "EventTime": "2024-05-21T12:55:50.657802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CivL7O3Dx8C6hyQ6W7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 195} +{"Format": "IDEA0", "ID": "8233fa65-c2b7-4602-8901-af3bec301fb9", "DetectTime": "2024-05-21T12:55:50.755597+00:00", "EventTime": "2024-05-21T12:55:50.755621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN9MNZ2DBwb4M2TAbc"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "8a888a17-9a28-48aa-8e06-627afcf894ca", "DetectTime": "2024-05-21T12:55:50.770881+00:00", "EventTime": "2024-05-21T12:55:50.770906+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVycw3GriP8dl7Q08"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "4bca123d-71a3-4654-90fa-241c21d57836", "DetectTime": "2024-05-21T12:55:50.826101+00:00", "EventTime": "2024-05-21T12:55:50.826126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy2xQM35esjASKUzUd"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "11d86450-84bd-4e4f-9509-b721af4523f2", "DetectTime": "2024-05-21T12:55:51.291121+00:00", "EventTime": "2024-05-21T12:55:51.291140+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7opXUn2fRSrsKC3e"], "accumulated_threat_level": 4.0, "timewindow": 198} +{"Format": "IDEA0", "ID": "e43fddfc-c394-42a8-a0ae-69937aa2b7f1", "DetectTime": "2024-05-21T12:55:51.295650+00:00", "EventTime": "2024-05-21T12:55:51.295668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRnlQ44U8VBKCn3stg"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "123cde84-ee19-48b3-8e72-3fecfd748315", "DetectTime": "2024-05-21T12:55:51.340141+00:00", "EventTime": "2024-05-21T12:55:51.340164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COgacM2EZmOaIOCKv8"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "3afd0b74-8b71-4f8a-9f7d-9f6b83b4e3fb", "DetectTime": "2024-05-21T12:55:51.380298+00:00", "EventTime": "2024-05-21T12:55:51.380321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cec6kp2CBfgDVk22Z7"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "cdabc5d8-7883-44fe-9656-04d73b25e31b", "DetectTime": "2024-05-21T12:55:51.431067+00:00", "EventTime": "2024-05-21T12:55:51.431101+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLICNj396h0bIROZDd"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "4b24d412-0d45-4fee-a7b1-80a4c58a8b8c", "DetectTime": "2024-05-21T12:55:51.792540+00:00", "EventTime": "2024-05-21T12:55:51.792561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrEr1d2tdGGJWRNvIk"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "c8acff07-b289-47d3-b98f-f2542e6e3daa", "DetectTime": "2024-05-21T12:55:51.805083+00:00", "EventTime": "2024-05-21T12:55:51.805103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9VoXI2yALKFuetvwj"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "284439d6-16e9-4be7-91c2-eb6cd6ecca53", "DetectTime": "2024-05-21T12:55:51.835224+00:00", "EventTime": "2024-05-21T12:55:51.835248+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx3NPg45W5TK7GpIx6"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "fd7dac50-267a-442d-9b43-444dbfba9365", "DetectTime": "2024-05-21T12:55:51.840185+00:00", "EventTime": "2024-05-21T12:55:51.840205+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIMcUe4R0pfspq73Ea"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "28d51de5-f967-4d2c-9b7a-c81210fa1840", "DetectTime": "2024-05-21T12:55:51.870281+00:00", "EventTime": "2024-05-21T12:55:51.870303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsALB92sObm8syS6Fb"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "52a3a53d-cbbf-4c39-a6fa-131d3e336f91", "DetectTime": "2024-05-21T12:55:51.921092+00:00", "EventTime": "2024-05-21T12:55:51.921114+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA60YA1w2a8MZy7TE9"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "a1de380a-cad5-46c9-8611-3c8510eb3817", "DetectTime": "2024-05-21T12:55:51.928874+00:00", "EventTime": "2024-05-21T12:55:51.928895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMGrC21fXFIjQ8ltUl"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "394d0a4b-aef0-49e8-8236-ff84b27812fb", "DetectTime": "2024-05-21T12:55:51.940679+00:00", "EventTime": "2024-05-21T12:55:51.940701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwc3Hl2mp0bIbJmCqg"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "8fe35436-8895-426a-96b3-5fe16291ec7d", "DetectTime": "2024-05-21T12:55:51.960830+00:00", "EventTime": "2024-05-21T12:55:51.960853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCoxy8g1roehXHqg"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "f6472086-ed3c-4ec2-a259-90146400c98f", "DetectTime": "2024-05-21T12:55:52.332264+00:00", "EventTime": "2024-05-21T12:55:52.332286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQy3ig1Gc8pyTe59Og"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "c6257c0a-cb12-49a7-a55c-1be7d15ae6a0", "DetectTime": "2024-05-21T12:55:52.337539+00:00", "EventTime": "2024-05-21T12:55:52.337558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIzXZn4Dl7W9lVl0Og"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "0899dcd0-f7a3-4ce3-aa8c-dbae0f4ce2e9", "DetectTime": "2024-05-21T12:55:52.361724+00:00", "EventTime": "2024-05-21T12:55:52.361747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBLEg3CeoXkOKwzA6"], "accumulated_threat_level": 4.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "34981951-89a4-48e1-b6be-3ee0615c9a8f", "DetectTime": "2024-05-21T12:55:52.858093+00:00", "EventTime": "2024-05-21T12:55:52.858115+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1alvpFgdcZF3Lnv1"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "33bd788c-eb46-4001-a873-f5485cd1699f", "DetectTime": "2024-05-21T12:55:52.877399+00:00", "EventTime": "2024-05-21T12:55:52.877421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDgvHIUjLWuHBkehi"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "7ad3bde0-2836-4009-ba03-7d1f19c074fc", "DetectTime": "2024-05-21T12:55:53.068476+00:00", "EventTime": "2024-05-21T12:55:53.068498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0YEYv29L0XpEDLrhd"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "d257e2ff-2d16-4858-a5fc-408da3f3f4bf", "DetectTime": "2024-05-21T12:55:53.074163+00:00", "EventTime": "2024-05-21T12:55:53.074182+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzqmyU28BMjzWc5SC7"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "9267a900-3367-4ec4-9fb1-ff6b1c240841", "DetectTime": "2024-05-21T12:55:53.297760+00:00", "EventTime": "2024-05-21T12:55:53.297782+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu8OejCxLZX0mJXJf"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "f224cb77-ffb4-4df4-9db1-f4d299256a95", "DetectTime": "2024-05-21T12:55:53.303899+00:00", "EventTime": "2024-05-21T12:55:53.303918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1bDHT1mhHxSPqyNd5"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "f364937a-7254-4d93-8c8d-8f7287d0e9f2", "DetectTime": "2024-05-21T12:55:53.327756+00:00", "EventTime": "2024-05-21T12:55:53.327777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfsvGo2N819NQaT0Ca"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "c7448ebc-152f-4a05-81a3-adc04320d127", "DetectTime": "2024-05-21T12:55:53.363521+00:00", "EventTime": "2024-05-21T12:55:53.363542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnWfOkgxjAUOc3I98"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "93d5b3fc-51a6-4b2f-a989-00f7aa0da109", "DetectTime": "2024-05-21T12:55:53.368659+00:00", "EventTime": "2024-05-21T12:55:53.368677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW7F9Z10yJjC1lIGbd"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "70402eb9-11e4-49d0-a3d8-3902813742a5", "DetectTime": "2024-05-21T12:55:53.394171+00:00", "EventTime": "2024-05-21T12:55:53.394193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCLGB3dsordp9BkK2"], "accumulated_threat_level": 5.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "f0538457-6fc7-45fd-9fd4-c643a0e4b5bf", "DetectTime": "2024-05-21T12:55:53.872641+00:00", "EventTime": "2024-05-21T12:55:53.872662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cojynp1Xv4DPyBjNJj"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "d3290123-f3c0-4bd0-a0de-50467971b7f9", "DetectTime": "2024-05-21T12:55:53.879738+00:00", "EventTime": "2024-05-21T12:55:53.879757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4P0JF1cHeDY7BB0n9"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "eb24d490-1188-4d2c-adcb-4b824f20fb70", "DetectTime": "2024-05-21T12:55:53.958232+00:00", "EventTime": "2024-05-21T12:55:53.958256+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6wGMd1bfHZbWddXi5"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "e42f8d13-145d-42a1-9a1d-626e5eaf8bb1", "DetectTime": "2024-05-21T12:55:53.964873+00:00", "EventTime": "2024-05-21T12:55:53.964893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca182U2On8P83o0shg"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "01e15fd3-14e7-40e2-afc8-c1c71ca896d3", "DetectTime": "2024-05-21T12:55:53.978690+00:00", "EventTime": "2024-05-21T12:55:53.978710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw6TyB1piu3sKN9q"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "8dc5ae66-2d3b-44f7-98e5-dab6f66fce3a", "DetectTime": "2024-05-21T12:55:54.019765+00:00", "EventTime": "2024-05-21T12:55:54.019785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYmSvX324lF3dtIrh9"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "7c3f78a7-7397-434e-8c0f-b0845e25ac06", "DetectTime": "2024-05-21T12:55:54.026795+00:00", "EventTime": "2024-05-21T12:55:54.026814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn8qo43RVAfOR0mCOc"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "a2f441f8-ba0c-4f04-8657-e264f491c132", "DetectTime": "2024-05-21T12:55:54.327379+00:00", "EventTime": "2024-05-21T12:55:54.327404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Can99m18KcBI6Upkok"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "39210160-4972-433e-9c16-2184e165d819", "DetectTime": "2024-05-21T12:55:54.355547+00:00", "EventTime": "2024-05-21T12:55:54.355570+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgf4iu2OI9G1GHJKHk"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "3dfaa160-45ce-4324-999b-c88760017ee6", "DetectTime": "2024-05-21T12:55:54.371811+00:00", "EventTime": "2024-05-21T12:55:54.371831+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgf4iu2OI9G1GHJKHk"], "accumulated_threat_level": 5.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "65046e6d-7caf-4be2-89ba-532d9c3797a6", "DetectTime": "2024-05-21T12:55:54.481602+00:00", "EventTime": "2024-05-21T12:55:54.481620+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.140.158.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. AS: ROSTELECOM-AS, RU AS12389 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2b5FMqm1tbiXoF45"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "05d0763d-67c3-47c2-aca2-530d6e2ad2a5", "DetectTime": "2024-05-21T12:55:54.497799+00:00", "EventTime": "2024-05-21T12:55:54.497821+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. AS: ROSTELECOM-AS, RU AS12389 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2b5FMqm1tbiXoF45"], "accumulated_threat_level": 5.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "2e94bc63-4b7d-48ae-b9fb-f675266630db", "DetectTime": "2024-05-21T12:55:54.629966+00:00", "EventTime": "2024-05-21T12:55:54.629989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDalyk102HE5U77nJ2"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "e218589e-b09c-411f-8e6a-a0654ce0fc4f", "DetectTime": "2024-05-21T12:55:54.635012+00:00", "EventTime": "2024-05-21T12:55:54.635031+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTt28l1LtixNei3E21"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "abb979ec-e874-4e51-b471-7a00a337689f", "DetectTime": "2024-05-21T12:55:54.876574+00:00", "EventTime": "2024-05-21T12:55:54.876596+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGEcG51aeguXU7Zseg"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "762c7633-c10a-41dd-a672-fdd4ef6a2c10", "DetectTime": "2024-05-21T12:55:54.936360+00:00", "EventTime": "2024-05-21T12:55:54.936385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2rUQ1D05KEOoo8ae"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "341ff0a8-36f6-49d8-b7e4-4ba221b56f12", "DetectTime": "2024-05-21T12:55:54.941823+00:00", "EventTime": "2024-05-21T12:55:54.941843+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzllNr4ESRvbGMSci7"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "ba56df0b-b628-4e6f-b294-ac1297488cef", "DetectTime": "2024-05-21T12:55:54.946775+00:00", "EventTime": "2024-05-21T12:55:54.946793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cfa4MX29slJZuCtXwk"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "27553dbc-0eb8-4a90-82de-6fa8f3b39bff", "DetectTime": "2024-05-21T12:55:54.955023+00:00", "EventTime": "2024-05-21T12:55:54.955042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvE2dx3EsPRbVFl8Jd"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "f53b9f2d-3bb8-4d1e-8254-6056e2eb098c", "DetectTime": "2024-05-21T12:55:54.976611+00:00", "EventTime": "2024-05-21T12:55:54.976633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtYOe4EPe9LLIHQxa"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "f87093aa-90e0-43fc-ae60-052a20cb9665", "DetectTime": "2024-05-21T12:55:55.021633+00:00", "EventTime": "2024-05-21T12:55:55.021656+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN31Pi17T2QOi8s4Ud"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "4b2d3af2-8548-4c30-a6f5-3083663d063c", "DetectTime": "2024-05-21T12:55:55.107770+00:00", "EventTime": "2024-05-21T12:55:55.107794+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW3jt92AizQQOPWkp2"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "34f77ca4-91c8-4d75-98ff-28c1adf41d6a", "DetectTime": "2024-05-21T12:55:55.243711+00:00", "EventTime": "2024-05-21T12:55:55.243731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAjL7hBLB5SV7KUTl"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "5c9d758f-ee1e-406a-a1b8-aa88f649afe6", "DetectTime": "2024-05-21T12:55:55.257151+00:00", "EventTime": "2024-05-21T12:55:55.257173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHKSRV1bclJ1w982Q3"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "1d980d8a-cf8a-4d16-b60f-7f8f7e15055f", "DetectTime": "2024-05-21T12:55:55.632574+00:00", "EventTime": "2024-05-21T12:55:55.632599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqajNZBiJUa8PUuWb"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "fb452e24-0f2c-4136-acb3-ee22334b102e", "DetectTime": "2024-05-21T12:55:55.680421+00:00", "EventTime": "2024-05-21T12:55:55.680449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3vls63Si1kcKVhCH7"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "6aa90797-bc94-4252-8d27-270294fbfc76", "DetectTime": "2024-05-21T12:55:56.073273+00:00", "EventTime": "2024-05-21T12:55:56.073294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCmXvakbwohYzeq2"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "f44c5bfc-1e9b-46e0-a2ab-84e907d707d0", "DetectTime": "2024-05-21T12:55:56.113995+00:00", "EventTime": "2024-05-21T12:55:56.114018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CF836OvZLbFBmNT5g"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "6edc7607-0dd4-4d8b-b5b5-0e089e6c407c", "DetectTime": "2024-05-21T12:55:56.120289+00:00", "EventTime": "2024-05-21T12:55:56.120311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS1bFu2izpXCfrsrh7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "519380a1-f8d8-4db1-b89b-a5e13e914d43", "DetectTime": "2024-05-21T12:55:56.278671+00:00", "EventTime": "2024-05-21T12:55:56.278691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0RGYOBejbCTvCkg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "7bbbfdc7-7c15-4264-b301-0537f3aa54fa", "DetectTime": "2024-05-21T12:55:56.283993+00:00", "EventTime": "2024-05-21T12:55:56.284010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs6xXJ2eIKhE2HdWhh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "c7085717-216c-4aad-80d5-9693ab70d90e", "DetectTime": "2024-05-21T12:55:56.374359+00:00", "EventTime": "2024-05-21T12:55:56.374385+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMbXVO2ZT01vhX2BC4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "441a5a18-24af-4b97-b5e5-f824d0144442", "DetectTime": "2024-05-21T12:55:56.496497+00:00", "EventTime": "2024-05-21T12:55:56.496518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CY8K3G1BCTPN7Xbxr6"], "accumulated_threat_level": 5.6, "timewindow": 196} +{"Format": "IDEA0", "ID": "8e96fe4a-e354-4fac-bccb-e8d2195853c0", "DetectTime": "2024-05-21T12:55:56.505979+00:00", "EventTime": "2024-05-21T12:55:56.505998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFO5yL3HG84gfJPbn7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "c775e582-aeb9-4e72-a9a1-37074daec780", "DetectTime": "2024-05-21T12:55:56.771813+00:00", "EventTime": "2024-05-21T12:55:56.771834+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqpNCJ2uqpV4v83GOe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "b077d793-88c9-456c-b0d4-bd1f679198d0", "DetectTime": "2024-05-21T12:55:56.906207+00:00", "EventTime": "2024-05-21T12:55:56.906233+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaF4A33EEOPDXq0dda"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "4872679a-322e-4d16-9460-50b756d2d4dd", "DetectTime": "2024-05-21T12:55:56.915062+00:00", "EventTime": "2024-05-21T12:55:56.915082+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChCufA2MANdESykrBb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "5fe5544d-f37c-45ea-8307-95a173a16b73", "DetectTime": "2024-05-21T12:55:56.920177+00:00", "EventTime": "2024-05-21T12:55:56.920195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cl98Pq4cRhQe7x1jz9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "e38c552f-2414-4cad-900b-2b6f70f5fcf6", "DetectTime": "2024-05-21T12:55:56.959642+00:00", "EventTime": "2024-05-21T12:55:56.959665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ1N2B1JtZk8FHLJi6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "f5722e2d-1928-487b-bdb9-d75a475de658", "DetectTime": "2024-05-21T12:55:56.988851+00:00", "EventTime": "2024-05-21T12:55:56.988873+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUnsRv2LmKx7FQ6yD"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "1ece7af5-c213-4a79-873f-a5116a822e09", "DetectTime": "2024-05-21T12:55:57.068653+00:00", "EventTime": "2024-05-21T12:55:57.068686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrTaXe2HYYC9P3fOY2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "570e1a07-dc1b-47e9-9d74-1da868015413", "DetectTime": "2024-05-21T12:55:57.344918+00:00", "EventTime": "2024-05-21T12:55:57.344939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAfbpj2uXkcdkML8D4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "c0f1e63f-2bea-4e07-8eca-ef705f19bf79", "DetectTime": "2024-05-21T12:55:57.390673+00:00", "EventTime": "2024-05-21T12:55:57.390691+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp5Lfj2zDuILzTx0if"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "3ee877a2-b570-47bb-8e10-17c043b90f3a", "DetectTime": "2024-05-21T12:55:57.550482+00:00", "EventTime": "2024-05-21T12:55:57.550503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChoMo8h1umaIdDyh6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "f42d763e-72bc-4e7b-8b9f-1c204a216d46", "DetectTime": "2024-05-21T12:55:57.571793+00:00", "EventTime": "2024-05-21T12:55:57.571814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzqjNb4A01Kz2JnJAg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "85b6aa32-fe52-455b-bd14-67295d18fef9", "DetectTime": "2024-05-21T12:55:57.598731+00:00", "EventTime": "2024-05-21T12:55:57.598754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C90JOO1JTMNTziqRMa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "d6428451-8582-49c9-9398-5d187aa49995", "DetectTime": "2024-05-21T12:55:57.603977+00:00", "EventTime": "2024-05-21T12:55:57.603999+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPnDqXPfnEA6re072"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "0864bbd8-abd8-42ab-a90b-4c138bb90665", "DetectTime": "2024-05-21T12:55:57.891356+00:00", "EventTime": "2024-05-21T12:55:57.891375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBvySG3jR4Dx6ay9Ne"], "accumulated_threat_level": 7.999999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "917a9d20-48d6-49ff-998f-ec994a9f1458", "DetectTime": "2024-05-21T12:55:57.916489+00:00", "EventTime": "2024-05-21T12:55:57.916514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C310vD3T2w5wVZ7z2d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "aee146cd-f89d-469b-badc-174c7566ab17", "DetectTime": "2024-05-21T12:55:57.921681+00:00", "EventTime": "2024-05-21T12:55:57.921701+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CH6qEqC7pJ0nksDS5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "3fa479b1-3bce-4ad1-b244-3efdc9b3e2bf", "DetectTime": "2024-05-21T12:55:57.928033+00:00", "EventTime": "2024-05-21T12:55:57.928054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxiEtL2sC91ciJniL9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "cfe7fb5d-5ba4-4710-98fa-27227799cfa5", "DetectTime": "2024-05-21T12:55:58.466121+00:00", "EventTime": "2024-05-21T12:55:58.466142+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAajO3vVi5eIGM12i"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "72fadc3e-c3a0-4d2e-9d80-b8cfbf114557", "DetectTime": "2024-05-21T12:55:58.498738+00:00", "EventTime": "2024-05-21T12:55:58.498759+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqMj8L2e2gux3EiXTk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "33402127-d897-4ba9-b96b-d60418e87a47", "DetectTime": "2024-05-21T12:55:58.511611+00:00", "EventTime": "2024-05-21T12:55:58.511633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiRdSi2feRojbyQKe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "2966cc90-d700-4f2d-acec-9a11655eaea0", "DetectTime": "2024-05-21T12:55:58.592310+00:00", "EventTime": "2024-05-21T12:55:58.592330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPPhyD1BNRZzJO56hd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "034c2736-6a95-46b1-8071-823e3d5f39fc", "DetectTime": "2024-05-21T12:55:58.628474+00:00", "EventTime": "2024-05-21T12:55:58.628495+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMnZ0N2rEXxjPAYIP6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "cb896ce2-bf29-4d13-ab29-40c26d7c46e2", "DetectTime": "2024-05-21T12:55:58.663915+00:00", "EventTime": "2024-05-21T12:55:58.663937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuSaXo1G8KvIFHJEgc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "354fd1b6-aca7-465a-87d2-e4f655e58fb1", "DetectTime": "2024-05-21T12:55:58.724637+00:00", "EventTime": "2024-05-21T12:55:58.724659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChVPNOXTUcNDAex09"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "a8cb7bd2-2d39-4638-b280-c50df1a31c07", "DetectTime": "2024-05-21T12:55:59.078706+00:00", "EventTime": "2024-05-21T12:55:59.078729+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8jtIo3N9GmRClD9y6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "121eb6e2-41dc-406b-9b9a-7ea22c6d32bb", "DetectTime": "2024-05-21T12:55:59.346064+00:00", "EventTime": "2024-05-21T12:55:59.346086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc0jDj3Hgng63nS1e6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "78ecdd95-f4b5-4d0f-8113-9b77caa4082f", "DetectTime": "2024-05-21T12:55:59.355942+00:00", "EventTime": "2024-05-21T12:55:59.355962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSjOgx1amQGQ6eKpTb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "de61f3cc-70ff-4330-b5a3-2bbcca43ddcd", "DetectTime": "2024-05-21T12:55:59.391300+00:00", "EventTime": "2024-05-21T12:55:59.391321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CutzFHB7DI5Q3UsAf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "974e1206-d54d-403d-9198-436a8ebce31f", "DetectTime": "2024-05-21T12:55:59.437804+00:00", "EventTime": "2024-05-21T12:55:59.437826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrMDZQ1QUbw72awgP3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "6b38ad0e-77f5-4bea-8a7c-490a998b8120", "DetectTime": "2024-05-21T12:55:59.776973+00:00", "EventTime": "2024-05-21T12:55:59.776995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdcCMA41TgAdCAz4ne"], "accumulated_threat_level": 8.799999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "78d0370a-f179-4d76-8ced-f076524ebe49", "DetectTime": "2024-05-21T12:55:59.805473+00:00", "EventTime": "2024-05-21T12:55:59.805494+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDbD8NP0wFBRhYs8d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "63c0189e-7932-4eff-8368-afd72c73850d", "DetectTime": "2024-05-21T12:55:59.816560+00:00", "EventTime": "2024-05-21T12:55:59.816584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6DF5A4S0vpQvVx6kd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "4dc24aac-005d-4ce1-b5da-976537ee0c51", "DetectTime": "2024-05-21T12:55:59.831577+00:00", "EventTime": "2024-05-21T12:55:59.831600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CktsNE30quJ1oRwvk6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "9e4b486d-dc7c-444d-8a60-1d2d60da3ca3", "DetectTime": "2024-05-21T12:55:59.844418+00:00", "EventTime": "2024-05-21T12:55:59.844440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3FKeo2TmDp8heo0r1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "9896fe47-641c-493e-8c6f-417296163b9a", "DetectTime": "2024-05-21T12:55:59.854772+00:00", "EventTime": "2024-05-21T12:55:59.854793+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXo211WiQbiGW4Yp8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "11037b96-e5b7-4bd7-9526-bc49d6034b48", "DetectTime": "2024-05-21T12:55:59.861604+00:00", "EventTime": "2024-05-21T12:55:59.861624+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChC4sduWsk5yTbiq3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "3eda57f4-ac64-4388-ae03-5b696e8da4a4", "DetectTime": "2024-05-21T12:55:59.866273+00:00", "EventTime": "2024-05-21T12:55:59.866291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQLjxn3CGnzzi1kDk6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "15ecd4ff-613d-4317-9e2e-02ffdfc5bd55", "DetectTime": "2024-05-21T12:55:59.922785+00:00", "EventTime": "2024-05-21T12:55:59.922807+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDhmRs3G2ifm6mf6Vh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "28b4c219-2323-4a88-874f-a636d29543f1", "DetectTime": "2024-05-21T12:55:59.981460+00:00", "EventTime": "2024-05-21T12:55:59.981482+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJl4x9NACQqYnKHle"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "6521f609-1d54-4461-83dd-9f0c9ec0951a", "DetectTime": "2024-05-21T12:56:00.295498+00:00", "EventTime": "2024-05-21T12:56:00.295518+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4TIgi3nhgI5QfbsL7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "66d16a7a-bfb1-45fc-bdca-1c8667ad59e7", "DetectTime": "2024-05-21T12:56:00.411498+00:00", "EventTime": "2024-05-21T12:56:00.411519+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW4DcU1k5jDmLOxQPk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "f83f1ec4-93bb-4c2b-aa65-07c76e15cb90", "DetectTime": "2024-05-21T12:56:00.435286+00:00", "EventTime": "2024-05-21T12:56:00.435308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cn9glIhl9o1BBgPs4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "4bf62434-1115-43a1-b89d-0435546734fe", "DetectTime": "2024-05-21T12:56:00.440367+00:00", "EventTime": "2024-05-21T12:56:00.440386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CypYmEDpTsArfZ1of"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "5a7f0d87-afac-473c-972e-d5128edc8904", "DetectTime": "2024-05-21T12:56:00.762045+00:00", "EventTime": "2024-05-21T12:56:00.762063+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.61.86.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZ3Bn3cUzxe5VuKrg"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "c254172d-1910-4bdd-b7ee-73c45f96de02", "DetectTime": "2024-05-21T12:56:00.774126+00:00", "EventTime": "2024-05-21T12:56:00.774144+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COZ3Bn3cUzxe5VuKrg"], "accumulated_threat_level": 6.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "ce4d5e67-44a0-44fe-9130-3c77f1c422f5", "DetectTime": "2024-05-21T12:56:00.808614+00:00", "EventTime": "2024-05-21T12:56:00.808632+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcLuz3fOtX4YN23Zi"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "bdb1ac1b-c715-43f4-860f-366b5b966d95", "DetectTime": "2024-05-21T12:56:00.821937+00:00", "EventTime": "2024-05-21T12:56:00.821955+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcLuz3fOtX4YN23Zi"], "accumulated_threat_level": 6.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "cc6547ab-7fca-476e-9562-6c55d336245b", "DetectTime": "2024-05-21T12:56:00.834492+00:00", "EventTime": "2024-05-21T12:56:00.834512+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPMbRxZj42qZmXsY8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "6e57e69d-b041-4cf2-877d-da78857b2b2e", "DetectTime": "2024-05-21T12:56:00.850589+00:00", "EventTime": "2024-05-21T12:56:00.850607+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.72.219.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-349170.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57gu22e9rnYQVV6P9"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "790ae1d8-b8d1-4431-8ad6-04b720832b62", "DetectTime": "2024-05-21T12:56:00.864426+00:00", "EventTime": "2024-05-21T12:56:00.864444+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-349170.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C57gu22e9rnYQVV6P9"], "accumulated_threat_level": 7.0, "timewindow": 44} +{"Format": "IDEA0", "ID": "0370f882-239d-49ec-8b82-0e594c39dbf1", "DetectTime": "2024-05-21T12:56:00.883696+00:00", "EventTime": "2024-05-21T12:56:00.883716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9drLY3LygRaGVBsM"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "570d30c7-64e2-4c6a-9637-c91f8e03e9db", "DetectTime": "2024-05-21T12:56:00.897090+00:00", "EventTime": "2024-05-21T12:56:00.897108+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.139.188.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS20771 rDNS: host-78-139-188-50.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce73LN1CRDehHmyQE1"], "accumulated_threat_level": 0, "timewindow": 44} +{"Format": "IDEA0", "ID": "c975cd73-6bb9-445a-a882-fc1936dd00b9", "DetectTime": "2024-05-21T12:56:00.911556+00:00", "EventTime": "2024-05-21T12:56:00.911576+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS20771 rDNS: host-78-139-188-50.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce73LN1CRDehHmyQE1"], "accumulated_threat_level": 7.5, "timewindow": 44} +{"Format": "IDEA0", "ID": "7b6a0d06-fb98-47a1-83b4-0d013a77d8b6", "DetectTime": "2024-05-21T12:56:00.947348+00:00", "EventTime": "2024-05-21T12:56:00.947371+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKIB5N1TMXVsJnTQlk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "a8733398-765e-4d0d-88d1-26b21618e4f6", "DetectTime": "2024-05-21T12:56:01.201102+00:00", "EventTime": "2024-05-21T12:56:01.201123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsFFoZ3uiygoUucL8b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "332b964b-9fe4-433c-a437-d48b14fe869f", "DetectTime": "2024-05-21T12:56:01.206342+00:00", "EventTime": "2024-05-21T12:56:01.206363+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crys403o9MzLZVcL09"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "ad8c9be0-ed0d-47a2-81f7-490c57f4c188", "DetectTime": "2024-05-21T12:56:01.474353+00:00", "EventTime": "2024-05-21T12:56:01.474374+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEZE4P2orXklCHpSZg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "cae857cb-9dd7-4fa7-81de-3d69bea12dc9", "DetectTime": "2024-05-21T12:56:01.507974+00:00", "EventTime": "2024-05-21T12:56:01.507995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIA2a02p8JoTx5C34f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "990934f5-e2c4-42cb-98b1-4cfcd000c3bb", "DetectTime": "2024-05-21T12:56:01.997615+00:00", "EventTime": "2024-05-21T12:56:01.997647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqWXBrMktipls9bci"], "accumulated_threat_level": 8.799999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "926f418c-a3cf-4852-8683-37762dcc198e", "DetectTime": "2024-05-21T12:56:02.050660+00:00", "EventTime": "2024-05-21T12:56:02.050695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf4AqBACjI8jKlne9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "a8183edb-5e23-4000-a629-43bda416483d", "DetectTime": "2024-05-21T12:56:02.055631+00:00", "EventTime": "2024-05-21T12:56:02.055651+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFXSqH28Dhuht2p0Lf"], "accumulated_threat_level": 8.799999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "d59b18c3-de28-4216-8c30-1b7264e437cf", "DetectTime": "2024-05-21T12:56:02.069363+00:00", "EventTime": "2024-05-21T12:56:02.069398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwXcb2MmU4XaNkuh7"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "f7daf005-a84c-4f60-b9e1-32375d894193", "DetectTime": "2024-05-21T12:56:02.086120+00:00", "EventTime": "2024-05-21T12:56:02.086155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQzOx54Wwz9SbInGUk"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "ccbca177-2306-4201-ba04-fe3b51cc4573", "DetectTime": "2024-05-21T12:56:02.103151+00:00", "EventTime": "2024-05-21T12:56:02.103173+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C03xGy3XP0phXhw9Sa"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "1ff12cc8-43f5-4f4a-8bbe-fda7df4be920", "DetectTime": "2024-05-21T12:56:02.108075+00:00", "EventTime": "2024-05-21T12:56:02.108096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBcDni3BDmd4ADm8t"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "eb862010-f1f6-4db1-9daa-ed969101e413", "DetectTime": "2024-05-21T12:56:02.112919+00:00", "EventTime": "2024-05-21T12:56:02.112937+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca8cdr2zQE3GoTBnId"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 197} +{"Format": "IDEA0", "ID": "c91964e9-11c6-4a95-a3a0-402b778971c1", "DetectTime": "2024-05-21T12:56:02.118621+00:00", "EventTime": "2024-05-21T12:56:02.118640+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Ekbj4cX2kouwceh"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "111b35b6-74ac-4cad-aff6-778f0d73ff00", "DetectTime": "2024-05-21T12:56:02.214708+00:00", "EventTime": "2024-05-21T12:56:02.214730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKlBur2DVIa9h1oRbd"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "6560c2d1-adf2-4936-9566-2d716d4be737", "DetectTime": "2024-05-21T12:56:02.219821+00:00", "EventTime": "2024-05-21T12:56:02.219839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CocPAp2cvMytyE6Yx6"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "f78d3bc6-a8f3-4968-9ead-784951da5bc4", "DetectTime": "2024-05-21T12:56:02.293601+00:00", "EventTime": "2024-05-21T12:56:02.293622+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDk58x3ObDFHIq1j"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "811e4d41-11f0-4120-ac49-e7b46d8c9deb", "DetectTime": "2024-05-21T12:56:02.312995+00:00", "EventTime": "2024-05-21T12:56:02.313018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCVOudqPizK6o2GNj"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "7df1085f-7678-42b0-a25d-9af691c4d4a1", "DetectTime": "2024-05-21T12:56:02.747208+00:00", "EventTime": "2024-05-21T12:56:02.747229+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJIUtc3M6Vft5U3gB6"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "0198e274-c607-468e-8ff9-aecba591b891", "DetectTime": "2024-05-21T12:56:03.133595+00:00", "EventTime": "2024-05-21T12:56:03.133618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyP9Ns4LP1aSFg2bVg"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "e715e993-c813-4295-9434-df9103060515", "DetectTime": "2024-05-21T12:56:03.184874+00:00", "EventTime": "2024-05-21T12:56:03.184895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiAdXfVEPgGHtAAC8"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "cad45a61-ada9-4e30-91c1-f78ae132ba4b", "DetectTime": "2024-05-21T12:56:03.234691+00:00", "EventTime": "2024-05-21T12:56:03.234715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVoWcj3uFnjgsrp2jh"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "77f9e3e6-69f8-437a-8f31-6c7443e83b51", "DetectTime": "2024-05-21T12:56:03.240486+00:00", "EventTime": "2024-05-21T12:56:03.240510+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRzwRo4wvbWy6v4At1"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "ac6f2469-115f-447c-8f00-75ef25622027", "DetectTime": "2024-05-21T12:56:03.352268+00:00", "EventTime": "2024-05-21T12:56:03.352291+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cte58x2Mz14skoJUal"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "b631cc2e-b866-4859-a63f-c6ec70494584", "DetectTime": "2024-05-21T12:56:03.604790+00:00", "EventTime": "2024-05-21T12:56:03.604809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVNQfa45YxUcvuRNVi"], "accumulated_threat_level": 10.4, "timewindow": 198} +{"Format": "IDEA0", "ID": "47681e29-bbc4-4d5e-b909-741703becd28", "DetectTime": "2024-05-21T12:56:03.657967+00:00", "EventTime": "2024-05-21T12:56:03.657985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvjMY3TvGiIXFNcwi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 198} +{"Format": "IDEA0", "ID": "4ea363f0-d9ff-4325-9bbc-8324e37d7954", "DetectTime": "2024-05-21T12:56:03.709513+00:00", "EventTime": "2024-05-21T12:56:03.709531+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPlXq2Xy6ux9EfFab"], "accumulated_threat_level": 12.000000000000002, "timewindow": 198} +{"Format": "Json", "ID": "4ea363f0-d9ff-4325-9bbc-8324e37d7954", "DetectTime": "2024-05-21T12:56:03.709513+00:00", "EventTime": "2024-05-21T12:56:03.709531+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-09T05:41:33.736700+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2024/05/21 12:56:03.909396)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 198, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "51b369ca-35a0-46f5-beef-f4679dffe89d", "DetectTime": "2024-05-21T12:56:03.921710+00:00", "EventTime": "2024-05-21T12:56:03.921734+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLQjQ1IBcX6Kqbheh"], "accumulated_threat_level": 0.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "47b9017b-ffa9-4ec2-bf90-c31899a1584d", "DetectTime": "2024-05-21T12:56:03.939884+00:00", "EventTime": "2024-05-21T12:56:03.939917+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXgqeKIl1xOQ8Jjk"], "accumulated_threat_level": 1.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "f38e1255-dc98-4bf5-8b35-2da183652da5", "DetectTime": "2024-05-21T12:56:03.952914+00:00", "EventTime": "2024-05-21T12:56:03.952943+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVnLqh4JeS1nXcCEe2"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 198} +{"Format": "IDEA0", "ID": "9d3115d8-142f-4150-a2c6-e3ce34df9671", "DetectTime": "2024-05-21T12:56:04.112407+00:00", "EventTime": "2024-05-21T12:56:04.112434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvdyG22hMpxPEn7jtl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 198} +{"Format": "IDEA0", "ID": "19726b67-a908-4a3d-ac66-71407b51b818", "DetectTime": "2024-05-21T12:56:04.157837+00:00", "EventTime": "2024-05-21T12:56:04.157856+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHQ5o1DCb157hw4s3"], "accumulated_threat_level": 3.2, "timewindow": 198} +{"Format": "IDEA0", "ID": "1030ca23-a9ff-40eb-bc7a-cda828bd1c09", "DetectTime": "2024-05-21T12:56:04.208354+00:00", "EventTime": "2024-05-21T12:56:04.208384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtmLoL3hPFPY8h1Qr9"], "accumulated_threat_level": 4.0, "timewindow": 198} +{"Format": "IDEA0", "ID": "cb61be36-14b8-483b-896b-39d60e3a565d", "DetectTime": "2024-05-21T12:56:04.265255+00:00", "EventTime": "2024-05-21T12:56:04.265276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKBQl4Km17szI00D3"], "accumulated_threat_level": 4.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "75414613-6954-409a-a428-f4b3185e6921", "DetectTime": "2024-05-21T12:56:04.316619+00:00", "EventTime": "2024-05-21T12:56:04.316638+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5qRqJ3pYjKNP8GZD6"], "accumulated_threat_level": 5.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "16114930-86c8-41d1-ba1e-18aeb4b15e8b", "DetectTime": "2024-05-21T12:56:04.368975+00:00", "EventTime": "2024-05-21T12:56:04.368995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGn2Ms2zqv5io6bFzc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "5499c7f1-d687-4481-a15c-ce00d3bcd264", "DetectTime": "2024-05-21T12:56:04.756707+00:00", "EventTime": "2024-05-21T12:56:04.756730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGPrcR112HlWvgX0w2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "191e4fb4-a590-49df-94e4-d184ba602cd5", "DetectTime": "2024-05-21T12:56:04.781716+00:00", "EventTime": "2024-05-21T12:56:04.781733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnfXN32sJNglXEL29"], "accumulated_threat_level": 7.999999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "cd88e38e-3c6c-4323-b650-e4c60796e46c", "DetectTime": "2024-05-21T12:56:04.837109+00:00", "EventTime": "2024-05-21T12:56:04.837129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fNLM2gmTlOnDYsid"], "accumulated_threat_level": 8.799999999999999, "timewindow": 198} +{"Format": "IDEA0", "ID": "92acaaea-8486-4b8a-8ad0-bbaeed22b546", "DetectTime": "2024-05-21T12:56:04.891629+00:00", "EventTime": "2024-05-21T12:56:04.891653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLVKX34j2tEgQlJ11"], "accumulated_threat_level": 9.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "4b524e05-ec42-4680-acdf-43335ca38e8e", "DetectTime": "2024-05-21T12:56:04.950773+00:00", "EventTime": "2024-05-21T12:56:04.950792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Prri2JxjDxHEr1l2"], "accumulated_threat_level": 10.4, "timewindow": 198} +{"Format": "IDEA0", "ID": "3aafe53f-da1f-4465-91ee-3cd62c1079bc", "DetectTime": "2024-05-21T12:56:05.001105+00:00", "EventTime": "2024-05-21T12:56:05.001124+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZT9eY2BWlV7IyDMOl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 198} +{"Format": "IDEA0", "ID": "792175be-0f04-415b-a23e-f5fda6291bdf", "DetectTime": "2024-05-21T12:56:05.039643+00:00", "EventTime": "2024-05-21T12:56:05.039664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbphME1mVVQKx35Nuj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 198} +{"Format": "IDEA0", "ID": "e9c1c7b2-2d34-462d-8174-7a5503440b87", "DetectTime": "2024-05-21T12:56:05.317257+00:00", "EventTime": "2024-05-21T12:56:05.317279+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsi9r3Jkcw2ierxBg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 198} +{"Format": "Json", "ID": "e9c1c7b2-2d34-462d-8174-7a5503440b87", "DetectTime": "2024-05-21T12:56:05.317257+00:00", "EventTime": "2024-05-21T12:56:05.317279+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "1970-01-09T05:41:37.574800+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 198. (real time 2024/05/21 12:56:05.582156)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 198, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b084df60-5403-4e72-b2e0-da0c43c8f284", "DetectTime": "2024-05-21T12:56:05.594526+00:00", "EventTime": "2024-05-21T12:56:05.594546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE81rl4ss9vnn7CA36"], "accumulated_threat_level": 0.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "b9288b6e-51e2-4958-8942-908fcaf875fa", "DetectTime": "2024-05-21T12:56:05.606761+00:00", "EventTime": "2024-05-21T12:56:05.606780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrleXr45wMjUtgNn0d"], "accumulated_threat_level": 1.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "6900b0d8-618a-4186-8526-1fb1c7068914", "DetectTime": "2024-05-21T12:56:05.620156+00:00", "EventTime": "2024-05-21T12:56:05.620175+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C94N5G2Pe9yQKU0yga"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 198} +{"Format": "IDEA0", "ID": "30547f04-7de9-43be-8bbd-e4553d65f97e", "DetectTime": "2024-05-21T12:56:05.632099+00:00", "EventTime": "2024-05-21T12:56:05.632119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTw1j5AWksxs1nIQ1"], "accumulated_threat_level": 3.2, "timewindow": 198} +{"Format": "IDEA0", "ID": "ec91ad91-43cd-4663-aac6-85aed2adc119", "DetectTime": "2024-05-21T12:56:05.652594+00:00", "EventTime": "2024-05-21T12:56:05.652615+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kvn21xBFWcVs6t5l"], "accumulated_threat_level": 4.0, "timewindow": 198} +{"Format": "IDEA0", "ID": "201dfd60-f708-4b84-a790-596dde4d89ab", "DetectTime": "2024-05-21T12:56:05.825350+00:00", "EventTime": "2024-05-21T12:56:05.825372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9GmWHcogtDJ4hZ36"], "accumulated_threat_level": 4.0, "timewindow": 198} +{"Format": "IDEA0", "ID": "40bab3a0-0e9a-4128-87a2-ffdfd11c26b4", "DetectTime": "2024-05-21T12:56:05.872159+00:00", "EventTime": "2024-05-21T12:56:05.872179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtZcL3PvS8gzwn11h"], "accumulated_threat_level": 4.8, "timewindow": 198} +{"Format": "IDEA0", "ID": "9b41ff7c-0396-4c23-a465-e6a14193232f", "DetectTime": "2024-05-21T12:56:05.926670+00:00", "EventTime": "2024-05-21T12:56:05.926690+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct22RZ2IfkZCmYgrZ6"], "accumulated_threat_level": 5.6, "timewindow": 198} +{"Format": "IDEA0", "ID": "5484d2d4-d04e-4dd8-902d-58f82446f41a", "DetectTime": "2024-05-21T12:56:05.980338+00:00", "EventTime": "2024-05-21T12:56:05.980361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZzl72WF4pV3JG56c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "38b66bf3-a052-4203-bb5b-ba5f9f31c310", "DetectTime": "2024-05-21T12:56:06.077034+00:00", "EventTime": "2024-05-21T12:56:06.077066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB89eyRu5risAUYB1"], "accumulated_threat_level": 0.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "22b10b6a-9835-41b1-a3b6-b19d5fe05139", "DetectTime": "2024-05-21T12:56:06.252136+00:00", "EventTime": "2024-05-21T12:56:06.252160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpwO9gbbF7t7nVtSf"], "accumulated_threat_level": 1.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "c42d2eb3-69ca-4d13-87ce-49d3455893cf", "DetectTime": "2024-05-21T12:56:06.305310+00:00", "EventTime": "2024-05-21T12:56:06.305327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpJng2oJ27xuMvuI4"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 199} +{"Format": "IDEA0", "ID": "489141ff-1b7f-4ede-a388-f5b648b7f3c2", "DetectTime": "2024-05-21T12:56:06.576522+00:00", "EventTime": "2024-05-21T12:56:06.576547+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEL2GN21kdWyfG3oN4"], "accumulated_threat_level": 3.2, "timewindow": 199} +{"Format": "IDEA0", "ID": "d68a55ae-6291-4ee4-88de-07df55093d08", "DetectTime": "2024-05-21T12:56:06.632189+00:00", "EventTime": "2024-05-21T12:56:06.632210+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17si43QwF1KQMqq33"], "accumulated_threat_level": 4.0, "timewindow": 199} +{"Format": "IDEA0", "ID": "07db86fb-33a7-44f5-997e-22b85ba0524a", "DetectTime": "2024-05-21T12:56:06.689065+00:00", "EventTime": "2024-05-21T12:56:06.689083+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAThAV2s9Xlxl5iBd9"], "accumulated_threat_level": 4.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "3498eb3f-c01e-4b37-abbd-77d1d7248f96", "DetectTime": "2024-05-21T12:56:06.738729+00:00", "EventTime": "2024-05-21T12:56:06.738747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbkSCa1fXU6cImjAYa"], "accumulated_threat_level": 5.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "bb4c24a6-ab0b-47fe-b61b-db7d6211e8f7", "DetectTime": "2024-05-21T12:56:06.788310+00:00", "EventTime": "2024-05-21T12:56:06.788327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyQdO7l5iZxS6pZk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 199} +{"Format": "IDEA0", "ID": "5d82356e-c7d2-4c40-ac13-73fe0198bdac", "DetectTime": "2024-05-21T12:56:06.828186+00:00", "EventTime": "2024-05-21T12:56:06.828207+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7opXUn2fRSrsKC3e"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "e8c4f6fd-28bc-4256-a924-9dff1d074fd9", "DetectTime": "2024-05-21T12:56:06.873835+00:00", "EventTime": "2024-05-21T12:56:06.873855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxk41S2yUpyrslYvud"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "7dd7938a-b8d1-455c-947b-f2b422645aec", "DetectTime": "2024-05-21T12:56:07.144487+00:00", "EventTime": "2024-05-21T12:56:07.144508+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6YzwE3u6uJNKr0jN8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "c815ea63-21d8-4fcc-a9bf-cc947b21ba3a", "DetectTime": "2024-05-21T12:56:07.209713+00:00", "EventTime": "2024-05-21T12:56:07.209736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFkmqwZOR7KF5B64"], "accumulated_threat_level": 8.799999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "0804f775-67ea-4e75-a031-586a4b1a23be", "DetectTime": "2024-05-21T12:56:07.256286+00:00", "EventTime": "2024-05-21T12:56:07.256324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDC45ow3nm6NtYtQ4"], "accumulated_threat_level": 9.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "cc90448e-6a05-44eb-bbc2-57046a20f91e", "DetectTime": "2024-05-21T12:56:07.306918+00:00", "EventTime": "2024-05-21T12:56:07.306939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSByqn3oZ2IiOSe8y7"], "accumulated_threat_level": 10.4, "timewindow": 199} +{"Format": "IDEA0", "ID": "cf32d303-e4ba-4f86-a9fe-87827c220ef0", "DetectTime": "2024-05-21T12:56:07.362972+00:00", "EventTime": "2024-05-21T12:56:07.362991+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCP8Pf1UnZrMqxJf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 199} +{"Format": "IDEA0", "ID": "e0f0f916-1db5-4910-b64a-f97d6442b45a", "DetectTime": "2024-05-21T12:56:07.413876+00:00", "EventTime": "2024-05-21T12:56:07.413895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COxKRC4Mcx83IXQCQ"], "accumulated_threat_level": 12.000000000000002, "timewindow": 199} +{"Format": "Json", "ID": "e0f0f916-1db5-4910-b64a-f97d6442b45a", "DetectTime": "2024-05-21T12:56:07.413876+00:00", "EventTime": "2024-05-21T12:56:07.413895+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-09T06:11:58.739787+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2024/05/21 12:56:07.885271)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 199, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "32d74b32-d99f-4b5d-8912-51533133dbcc", "DetectTime": "2024-05-21T12:56:07.896893+00:00", "EventTime": "2024-05-21T12:56:07.896914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxAdTl3Ef49LeHCJdl"], "accumulated_threat_level": 0.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "475802ef-cb98-4140-85ea-46e134981139", "DetectTime": "2024-05-21T12:56:07.913706+00:00", "EventTime": "2024-05-21T12:56:07.913724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZECfp31FHhPzahAf5"], "accumulated_threat_level": 1.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "2d2c83fb-6506-49e3-aa08-650738ed8a9f", "DetectTime": "2024-05-21T12:56:07.924678+00:00", "EventTime": "2024-05-21T12:56:07.924696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouAnC1AMdpdQFa59c"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 199} +{"Format": "IDEA0", "ID": "1358be67-9132-43af-a5d3-3f74472999a4", "DetectTime": "2024-05-21T12:56:07.935958+00:00", "EventTime": "2024-05-21T12:56:07.935976+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKXT44sKPoZxexH63"], "accumulated_threat_level": 3.2, "timewindow": 199} +{"Format": "IDEA0", "ID": "480c70ee-68b2-4573-9d11-4ae1e6392bd3", "DetectTime": "2024-05-21T12:56:07.992279+00:00", "EventTime": "2024-05-21T12:56:07.992298+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOvLU1YOU7LsIAqsi"], "accumulated_threat_level": 4.0, "timewindow": 199} +{"Format": "IDEA0", "ID": "7fc7a88d-a5a5-4bc4-8638-a1b801f543d9", "DetectTime": "2024-05-21T12:56:08.043532+00:00", "EventTime": "2024-05-21T12:56:08.043553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6sWMm08H4QcBnRc"], "accumulated_threat_level": 4.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "7003d539-5956-432a-b966-e18f94bf3ec3", "DetectTime": "2024-05-21T12:56:08.085645+00:00", "EventTime": "2024-05-21T12:56:08.085667+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLBLEg3CeoXkOKwzA6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "63f31f06-5bd0-4213-9b05-45be51c8b6eb", "DetectTime": "2024-05-21T12:56:08.139564+00:00", "EventTime": "2024-05-21T12:56:08.139584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgQGYABQxCoLSDeb"], "accumulated_threat_level": 5.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "c0a061d1-2f89-4bc5-9654-6c0645627b68", "DetectTime": "2024-05-21T12:56:08.372644+00:00", "EventTime": "2024-05-21T12:56:08.372665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIKhE46iyMVAuO6xc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 199} +{"Format": "IDEA0", "ID": "a27a2216-e40e-45d6-a897-28932307eddf", "DetectTime": "2024-05-21T12:56:08.427698+00:00", "EventTime": "2024-05-21T12:56:08.427724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUHoCSpa7GU8BGSfe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "99ea46e6-3f92-4fe6-ada3-d74364adb5d2", "DetectTime": "2024-05-21T12:56:08.477673+00:00", "EventTime": "2024-05-21T12:56:08.477693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLF8M3YWQbztEltd8"], "accumulated_threat_level": 7.999999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "092e3471-a42c-4f78-9418-90a9a2500e0e", "DetectTime": "2024-05-21T12:56:08.535316+00:00", "EventTime": "2024-05-21T12:56:08.535334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9LEv41fdTHghS8qk"], "accumulated_threat_level": 8.799999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "22da9bd3-9cab-44d5-b103-d67bea1c72cb", "DetectTime": "2024-05-21T12:56:08.593249+00:00", "EventTime": "2024-05-21T12:56:08.593305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJsFc4uNS94Gy37J1"], "accumulated_threat_level": 9.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "2c45911b-c0b9-4536-ada9-2dbd32ebf156", "DetectTime": "2024-05-21T12:56:08.666955+00:00", "EventTime": "2024-05-21T12:56:08.666973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6jB854Jl9YsS2hj5h"], "accumulated_threat_level": 10.4, "timewindow": 199} +{"Format": "IDEA0", "ID": "7ce24704-4e91-4164-b17e-660685e9445d", "DetectTime": "2024-05-21T12:56:08.967759+00:00", "EventTime": "2024-05-21T12:56:08.967783+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crdpc84QBaTN1br224"], "accumulated_threat_level": 11.200000000000001, "timewindow": 199} +{"Format": "IDEA0", "ID": "a43b3bfd-122a-4554-be1c-b06a890cd037", "DetectTime": "2024-05-21T12:56:09.021737+00:00", "EventTime": "2024-05-21T12:56:09.021758+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEBYT1OoXepkGL1Q2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 199} +{"Format": "Json", "ID": "a43b3bfd-122a-4554-be1c-b06a890cd037", "DetectTime": "2024-05-21T12:56:09.021737+00:00", "EventTime": "2024-05-21T12:56:09.021758+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "1970-01-09T06:42:16.631621+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2024/05/21 12:56:09.277364)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 199, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "60d71417-16bc-4b01-b18b-bf0ddcc30207", "DetectTime": "2024-05-21T12:56:09.281484+00:00", "EventTime": "2024-05-21T12:56:09.281503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgCLGB3dsordp9BkK2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "d9301a8e-1ed9-4523-a8cc-234dc33ee853", "DetectTime": "2024-05-21T12:56:09.294287+00:00", "EventTime": "2024-05-21T12:56:09.294309+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7ckm1f2ohRjnTsb"], "accumulated_threat_level": 0.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "49853752-9554-4336-9669-97b52163b564", "DetectTime": "2024-05-21T12:56:09.306505+00:00", "EventTime": "2024-05-21T12:56:09.306524+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO9IG6loPw09viJ44"], "accumulated_threat_level": 1.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "5d5bb05d-98a8-481e-b166-1a601556901e", "DetectTime": "2024-05-21T12:56:09.327270+00:00", "EventTime": "2024-05-21T12:56:09.327294+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgPwRc3lixomm9wbMg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 199} +{"Format": "IDEA0", "ID": "07efe02d-265b-44b3-a148-45a6b00294ef", "DetectTime": "2024-05-21T12:56:09.387804+00:00", "EventTime": "2024-05-21T12:56:09.387823+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckt6ZMnm8p4x8bDzj"], "accumulated_threat_level": 3.2, "timewindow": 199} +{"Format": "IDEA0", "ID": "df94c626-260d-40a7-b7f8-01decd325b40", "DetectTime": "2024-05-21T12:56:09.641449+00:00", "EventTime": "2024-05-21T12:56:09.641469+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chj46L2pmjcd3CM367"], "accumulated_threat_level": 4.0, "timewindow": 199} +{"Format": "IDEA0", "ID": "01beb8b4-643d-40e7-8948-d321e29fee44", "DetectTime": "2024-05-21T12:56:09.692690+00:00", "EventTime": "2024-05-21T12:56:09.692709+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW9bK41oDpIDJsRxA4"], "accumulated_threat_level": 4.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "39581b13-04b6-4ecb-8a43-af10dc31e75d", "DetectTime": "2024-05-21T12:56:09.746831+00:00", "EventTime": "2024-05-21T12:56:09.746857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVjwE2aCG3Vv7da8"], "accumulated_threat_level": 5.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "4a2841b9-0e0b-47ae-bb9f-dd92622f841d", "DetectTime": "2024-05-21T12:56:09.798324+00:00", "EventTime": "2024-05-21T12:56:09.798361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQoF1V2HDwGjxvf892"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 199} +{"Format": "IDEA0", "ID": "0ab4b5f5-62c6-4dc2-a1cf-1c3f8e503287", "DetectTime": "2024-05-21T12:56:09.860634+00:00", "EventTime": "2024-05-21T12:56:09.860653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35bY444fQ8m5Wiubj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "1d7d075e-eb22-425f-a5ad-05c65f6e7521", "DetectTime": "2024-05-21T12:56:09.902608+00:00", "EventTime": "2024-05-21T12:56:09.902627+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUjgB21nT90cuIKvth"], "accumulated_threat_level": 7.999999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "804f241d-92ef-449b-9c77-1b8e71e3fa55", "DetectTime": "2024-05-21T12:56:09.977241+00:00", "EventTime": "2024-05-21T12:56:09.977262+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiWr1v4yOjzzI0KuFk", "Cr7eXx2RiEk6dmcRp9", "CLR18D4zeR717FNAJa", "CnXlWV2UvXmRe2KSaa"], "accumulated_threat_level": 0.5, "timewindow": 234} +{"Format": "IDEA0", "ID": "3508d192-90bb-4680-890f-acfc978502ce", "DetectTime": "2024-05-21T12:56:10.157554+00:00", "EventTime": "2024-05-21T12:56:10.157575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CguYD92vJz6Ff52ojc"], "accumulated_threat_level": 8.799999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "1e1dd38f-9069-4b5e-ae23-af128613722a", "DetectTime": "2024-05-21T12:56:10.210524+00:00", "EventTime": "2024-05-21T12:56:10.210544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJMUd1wig7rQjgWF2"], "accumulated_threat_level": 9.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "6d6542d5-f4a2-4ec3-9ab8-1f019bcee281", "DetectTime": "2024-05-21T12:56:10.271924+00:00", "EventTime": "2024-05-21T12:56:10.271944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCs1bK1y8zc3SgZ5el"], "accumulated_threat_level": 10.4, "timewindow": 199} +{"Format": "IDEA0", "ID": "b6980672-b8a9-488e-8fbe-2901baac313a", "DetectTime": "2024-05-21T12:56:10.323485+00:00", "EventTime": "2024-05-21T12:56:10.323504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKK0Zs48sjILXifZYd"], "accumulated_threat_level": 11.200000000000001, "timewindow": 199} +{"Format": "IDEA0", "ID": "dd18e124-e053-4b4b-b957-c17503c2f830", "DetectTime": "2024-05-21T12:56:10.375281+00:00", "EventTime": "2024-05-21T12:56:10.375305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHV2RB4QYgNNXzGbD"], "accumulated_threat_level": 12.000000000000002, "timewindow": 199} +{"Format": "Json", "ID": "dd18e124-e053-4b4b-b957-c17503c2f830", "DetectTime": "2024-05-21T12:56:10.375281+00:00", "EventTime": "2024-05-21T12:56:10.375305+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-09T06:42:20.357443+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 199. (real time 2024/05/21 12:56:10.582882)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 199, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7063ccee-e4cc-40aa-be13-da6cab57f239", "DetectTime": "2024-05-21T12:56:10.593434+00:00", "EventTime": "2024-05-21T12:56:10.593454+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZgW81WAtwWQb7aOe"], "accumulated_threat_level": 0.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "a768e3a0-ff88-4e31-be60-0285e3386d4b", "DetectTime": "2024-05-21T12:56:10.707512+00:00", "EventTime": "2024-05-21T12:56:10.707534+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CU2rUQ1D05KEOoo8ae"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "302d2246-2760-4fa2-81cc-b909753afdd0", "DetectTime": "2024-05-21T12:56:10.760354+00:00", "EventTime": "2024-05-21T12:56:10.760375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIcp9Z4RM1HZlmcig"], "accumulated_threat_level": 1.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "45181728-4f27-418c-b426-47ae3ac7f11b", "DetectTime": "2024-05-21T12:56:10.808316+00:00", "EventTime": "2024-05-21T12:56:10.808337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTkuZy4bvBBfxfm52k"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 199} +{"Format": "IDEA0", "ID": "edf66ca4-983f-484b-8373-6049cc80dfff", "DetectTime": "2024-05-21T12:56:10.958613+00:00", "EventTime": "2024-05-21T12:56:10.958632+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvtBV1LaIzKHLssAa"], "accumulated_threat_level": 3.2, "timewindow": 199} +{"Format": "IDEA0", "ID": "97248c16-7a5f-410e-a333-b0199d3e8b1a", "DetectTime": "2024-05-21T12:56:11.011751+00:00", "EventTime": "2024-05-21T12:56:11.011770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy64kd4vau20gwXgOk"], "accumulated_threat_level": 4.0, "timewindow": 199} +{"Format": "IDEA0", "ID": "e9f7ea1b-df37-4911-b045-b7ac94560526", "DetectTime": "2024-05-21T12:56:11.065563+00:00", "EventTime": "2024-05-21T12:56:11.065582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjRPNS9O6WBj3iNH3"], "accumulated_threat_level": 4.8, "timewindow": 199} +{"Format": "IDEA0", "ID": "78663823-53f2-45c5-ac04-d7b20a8e9c28", "DetectTime": "2024-05-21T12:56:11.119412+00:00", "EventTime": "2024-05-21T12:56:11.119430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5kMQY1LgLxm4Ks3fh"], "accumulated_threat_level": 5.6, "timewindow": 199} +{"Format": "IDEA0", "ID": "7a8f4024-d749-4575-a20b-d3b3f069f0ca", "DetectTime": "2024-05-21T12:56:11.385541+00:00", "EventTime": "2024-05-21T12:56:11.385559+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTFZto22WgpO7X4MB3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 199} +{"Format": "IDEA0", "ID": "5dbe3559-7fed-476d-8a77-ac8f13d0f5ea", "DetectTime": "2024-05-21T12:56:11.442164+00:00", "EventTime": "2024-05-21T12:56:11.442189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C37PrM2E3H6AfJuBe5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "b582e16d-6552-4ff7-bc5c-cfa1d7de74b6", "DetectTime": "2024-05-21T12:56:11.529766+00:00", "EventTime": "2024-05-21T12:56:11.529795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4551t1insNOYFHsa6"], "accumulated_threat_level": 0.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "4663049a-c169-40e4-8541-702a7ddcd893", "DetectTime": "2024-05-21T12:56:11.598646+00:00", "EventTime": "2024-05-21T12:56:11.598670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C040jY20brQCglPzPb"], "accumulated_threat_level": 1.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "d8398291-841d-41fd-96d8-d60bb38424b6", "DetectTime": "2024-05-21T12:56:11.652350+00:00", "EventTime": "2024-05-21T12:56:11.652369+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvt6a64GjbyPxxqmoi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 200} +{"Format": "IDEA0", "ID": "554bb615-3dfc-4857-91e5-fa353ff3bccc", "DetectTime": "2024-05-21T12:56:11.707520+00:00", "EventTime": "2024-05-21T12:56:11.707542+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjTMqD3Vw3KMTN0A05"], "accumulated_threat_level": 3.2, "timewindow": 200} +{"Format": "IDEA0", "ID": "b86e7d50-1bde-4a00-8488-7e3925573ba5", "DetectTime": "2024-05-21T12:56:12.031018+00:00", "EventTime": "2024-05-21T12:56:12.031038+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZJPsV2b0uxhaWKet4"], "accumulated_threat_level": 4.0, "timewindow": 200} +{"Format": "IDEA0", "ID": "7a063e08-d187-42b1-8e17-1de6feabca05", "DetectTime": "2024-05-21T12:56:12.038983+00:00", "EventTime": "2024-05-21T12:56:12.039002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL0RGYOBejbCTvCkg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "1addb5de-b4c8-4e70-b0fb-4e1a6145ab57", "DetectTime": "2024-05-21T12:56:12.123338+00:00", "EventTime": "2024-05-21T12:56:12.123359+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0J2ACOgQK5WjPnk"], "accumulated_threat_level": 4.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "86980d79-4067-47d5-988b-a26e1de755c2", "DetectTime": "2024-05-21T12:56:12.183129+00:00", "EventTime": "2024-05-21T12:56:12.183149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMwth4tIffPaDaMA"], "accumulated_threat_level": 5.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "89252207-a89a-4c8b-bf84-81c543017b0e", "DetectTime": "2024-05-21T12:56:12.239432+00:00", "EventTime": "2024-05-21T12:56:12.239452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwR2Fy0YLzJEhakG7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 200} +{"Format": "IDEA0", "ID": "4940581f-d546-493f-97ff-a15542800abe", "DetectTime": "2024-05-21T12:56:12.301047+00:00", "EventTime": "2024-05-21T12:56:12.301067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZmLP2XiBcwqoD8Ni"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "09c98b81-0ec3-48b0-bb29-0cee9761f0e4", "DetectTime": "2024-05-21T12:56:12.359977+00:00", "EventTime": "2024-05-21T12:56:12.360000+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVuCi3RQX7lJ6T6qe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "b61c231a-1aeb-4d0d-8dd0-f031605b026d", "DetectTime": "2024-05-21T12:56:12.640955+00:00", "EventTime": "2024-05-21T12:56:12.640973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBxiHQ1q9M43Qf9ma"], "accumulated_threat_level": 8.799999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "81f7d195-7297-42f3-a5dc-dc5a696ac1f5", "DetectTime": "2024-05-21T12:56:12.706340+00:00", "EventTime": "2024-05-21T12:56:12.706364+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kVLQt1SXNeND8ab"], "accumulated_threat_level": 9.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "2b5cd3ac-ff7e-41c8-90e0-5d5fe54a16be", "DetectTime": "2024-05-21T12:56:12.746672+00:00", "EventTime": "2024-05-21T12:56:12.746693+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB0cH829EosVehvoYg"], "accumulated_threat_level": 10.4, "timewindow": 200} +{"Format": "IDEA0", "ID": "34b37eb2-2858-4cd6-af1e-b13e10121021", "DetectTime": "2024-05-21T12:56:12.797609+00:00", "EventTime": "2024-05-21T12:56:12.797628+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJmFzG1GvRZ122Uf78"], "accumulated_threat_level": 11.200000000000001, "timewindow": 200} +{"Format": "IDEA0", "ID": "46463556-103e-404d-9c84-37bc794e6ce8", "DetectTime": "2024-05-21T12:56:12.861212+00:00", "EventTime": "2024-05-21T12:56:12.861234+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVU9l1bC7g16cAttk"], "accumulated_threat_level": 12.000000000000002, "timewindow": 200} +{"Format": "Json", "ID": "46463556-103e-404d-9c84-37bc794e6ce8", "DetectTime": "2024-05-21T12:56:12.861212+00:00", "EventTime": "2024-05-21T12:56:12.861234+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-09T07:12:44.750018+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2024/05/21 12:56:13.033459)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 200, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "86ac754f-5871-4b20-9d0b-fd85daa2283d", "DetectTime": "2024-05-21T12:56:13.046955+00:00", "EventTime": "2024-05-21T12:56:13.046978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLy0ri4yfSlHck0L74"], "accumulated_threat_level": 0.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "4e12f394-5ea1-4521-8acd-e73b3876eeb7", "DetectTime": "2024-05-21T12:56:13.186209+00:00", "EventTime": "2024-05-21T12:56:13.186230+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mxtt4Y4FBzrg2Zf6"], "accumulated_threat_level": 1.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "17458c20-ac27-48e3-951f-41e94c8d3bd4", "DetectTime": "2024-05-21T12:56:13.237711+00:00", "EventTime": "2024-05-21T12:56:13.237730+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjdIt2IO2HxdA0OYj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 200} +{"Format": "IDEA0", "ID": "487d1fa3-cdb1-4d42-af53-f9ecc98121b5", "DetectTime": "2024-05-21T12:56:13.286616+00:00", "EventTime": "2024-05-21T12:56:13.286634+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpiCI1G5AiO5Snpk5"], "accumulated_threat_level": 3.2, "timewindow": 200} +{"Format": "IDEA0", "ID": "8a000cc1-beda-47c1-b083-608c60485745", "DetectTime": "2024-05-21T12:56:13.341971+00:00", "EventTime": "2024-05-21T12:56:13.342008+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct79vnnnZDPdypi2g"], "accumulated_threat_level": 4.0, "timewindow": 200} +{"Format": "IDEA0", "ID": "6bb45b00-41f3-401d-a6f9-4db21ba67fb4", "DetectTime": "2024-05-21T12:56:13.404284+00:00", "EventTime": "2024-05-21T12:56:13.404306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQISbr3ZZPOTqbIWy6"], "accumulated_threat_level": 4.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "eaa78718-b07f-45ea-8a46-aa4d90bbdc68", "DetectTime": "2024-05-21T12:56:13.454006+00:00", "EventTime": "2024-05-21T12:56:13.454036+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJBhswdLHcQ2rZLl"], "accumulated_threat_level": 5.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "c6754ec5-1865-4fd6-80c4-f5e12d7b26b4", "DetectTime": "2024-05-21T12:56:13.508305+00:00", "EventTime": "2024-05-21T12:56:13.508324+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvYMK51DgCf0F6N97l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 200} +{"Format": "IDEA0", "ID": "1a445b18-7f88-4b9f-abd4-74774848ecdb", "DetectTime": "2024-05-21T12:56:13.560035+00:00", "EventTime": "2024-05-21T12:56:13.560077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdyYq1q5mqpOzwJ4f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "b8546123-6b10-42c2-8463-0c3383d4a932", "DetectTime": "2024-05-21T12:56:13.840771+00:00", "EventTime": "2024-05-21T12:56:13.840805+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwtvF2buY2SA0VmVj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "ef0edd53-95da-4743-a4aa-39a1d700aee7", "DetectTime": "2024-05-21T12:56:13.888139+00:00", "EventTime": "2024-05-21T12:56:13.888174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDeE81Gkh3fcMliL7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "513ef730-e328-41ae-884d-5f1afe5cfafb", "DetectTime": "2024-05-21T12:56:13.943085+00:00", "EventTime": "2024-05-21T12:56:13.943112+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuWTuH1Gc3UVaMnl9f"], "accumulated_threat_level": 9.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "09aadd01-71f9-462a-a30f-15537ac4238a", "DetectTime": "2024-05-21T12:56:14.024995+00:00", "EventTime": "2024-05-21T12:56:14.025018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxL7s2sP7o8VJeOWf"], "accumulated_threat_level": 10.4, "timewindow": 200} +{"Format": "IDEA0", "ID": "d8bb357e-7d72-4d89-b14e-ca1f2feae91d", "DetectTime": "2024-05-21T12:56:14.093961+00:00", "EventTime": "2024-05-21T12:56:14.093983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBvySG3jR4Dx6ay9Ne"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "dc39fd65-a075-4f2d-b5ea-65b8206068b4", "DetectTime": "2024-05-21T12:56:14.139959+00:00", "EventTime": "2024-05-21T12:56:14.139978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqkGvCaM8AKaaBgk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 200} +{"Format": "IDEA0", "ID": "e9997b27-924e-4b42-84de-a7faffee41c5", "DetectTime": "2024-05-21T12:56:14.530157+00:00", "EventTime": "2024-05-21T12:56:14.530179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK1EMb4pFNWvFXjz27"], "accumulated_threat_level": 12.000000000000002, "timewindow": 200} +{"Format": "Json", "ID": "e9997b27-924e-4b42-84de-a7faffee41c5", "DetectTime": "2024-05-21T12:56:14.530157+00:00", "EventTime": "2024-05-21T12:56:14.530179+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "1970-01-09T07:42:55.068719+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2024/05/21 12:56:14.712767)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 200, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "63c1828a-a5ec-4d49-8c34-b6d46c80d083", "DetectTime": "2024-05-21T12:56:14.725633+00:00", "EventTime": "2024-05-21T12:56:14.725668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnfic02fRgQXtLSCt2"], "accumulated_threat_level": 0.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "f810ac84-c82e-4bca-9311-01251cda4725", "DetectTime": "2024-05-21T12:56:14.744177+00:00", "EventTime": "2024-05-21T12:56:14.744204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXUDF3WyxkfzBKEib"], "accumulated_threat_level": 1.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "5fed7a1e-f5cf-4c50-9b96-c60fc6ddca70", "DetectTime": "2024-05-21T12:56:14.756861+00:00", "EventTime": "2024-05-21T12:56:14.756883+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAr7O2ttmnVgScP1b"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 200} +{"Format": "IDEA0", "ID": "a98701b9-7d2c-4aaa-ac61-920d91205cc0", "DetectTime": "2024-05-21T12:56:14.767696+00:00", "EventTime": "2024-05-21T12:56:14.767714+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAV541Ckep2c3hSC6"], "accumulated_threat_level": 3.2, "timewindow": 200} +{"Format": "IDEA0", "ID": "cc16a1ba-f3df-4bc9-b338-54b916200cbe", "DetectTime": "2024-05-21T12:56:14.780446+00:00", "EventTime": "2024-05-21T12:56:14.780465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVubcEgzmixdZmv3"], "accumulated_threat_level": 4.0, "timewindow": 200} +{"Format": "IDEA0", "ID": "0edffe43-6e8f-406d-ae69-5b4846fb0f1e", "DetectTime": "2024-05-21T12:56:15.041004+00:00", "EventTime": "2024-05-21T12:56:15.041030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7lPA2hEmXpXZIOF5"], "accumulated_threat_level": 4.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "c41e7807-8421-405b-8429-dc3985b6940b", "DetectTime": "2024-05-21T12:56:15.095844+00:00", "EventTime": "2024-05-21T12:56:15.095862+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Xf1a4icZwfqMYjxb"], "accumulated_threat_level": 5.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "d8719992-1449-4907-8381-8d5e862d1b43", "DetectTime": "2024-05-21T12:56:15.145707+00:00", "EventTime": "2024-05-21T12:56:15.145726+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbxTIjaK9bfQ3EMZ5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 200} +{"Format": "IDEA0", "ID": "9753aaae-42ac-4e9f-93af-6dd4b19cf864", "DetectTime": "2024-05-21T12:56:15.195552+00:00", "EventTime": "2024-05-21T12:56:15.195575+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyiLux3Ak7kI94x80h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "ddd64086-fe76-40d8-b892-105ab75caf3b", "DetectTime": "2024-05-21T12:56:15.253541+00:00", "EventTime": "2024-05-21T12:56:15.253563+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXRle1FJywYT1qz2g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "99823437-34a0-485e-9118-893880439a1e", "DetectTime": "2024-05-21T12:56:15.308410+00:00", "EventTime": "2024-05-21T12:56:15.308428+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kYJv4dKhoYX52Rt1"], "accumulated_threat_level": 8.799999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "b6553cf9-43b1-420f-b4e1-69d238e2a9e6", "DetectTime": "2024-05-21T12:56:15.570565+00:00", "EventTime": "2024-05-21T12:56:15.570585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mcuo3iRAtdXWrE57"], "accumulated_threat_level": 9.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "c918970b-8542-4e1d-b3f0-43ba9080d0e1", "DetectTime": "2024-05-21T12:56:15.625293+00:00", "EventTime": "2024-05-21T12:56:15.625315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vg1MRmgcxSNTJm3"], "accumulated_threat_level": 10.4, "timewindow": 200} +{"Format": "IDEA0", "ID": "a2307a45-a3fe-4604-91d1-ff20a5da274e", "DetectTime": "2024-05-21T12:56:15.676941+00:00", "EventTime": "2024-05-21T12:56:15.676964+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGzptDW2OgmbsPgI2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 200} +{"Format": "IDEA0", "ID": "ccbaf670-a95d-48b3-a888-a30a680bc45f", "DetectTime": "2024-05-21T12:56:15.730369+00:00", "EventTime": "2024-05-21T12:56:15.730401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ8Xt4x3ESEr7xpGb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 200} +{"Format": "Json", "ID": "ccbaf670-a95d-48b3-a888-a30a680bc45f", "DetectTime": "2024-05-21T12:56:15.730369+00:00", "EventTime": "2024-05-21T12:56:15.730401+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-09T07:42:58.250516+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 200. (real time 2024/05/21 12:56:15.930281)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 200, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7f72bb15-e30e-4ea2-b28f-55f49b06380f", "DetectTime": "2024-05-21T12:56:15.935391+00:00", "EventTime": "2024-05-21T12:56:15.935409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdcCMA41TgAdCAz4ne"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "faf748b2-a23e-4c40-9943-868c48b5ffd1", "DetectTime": "2024-05-21T12:56:16.033665+00:00", "EventTime": "2024-05-21T12:56:16.033706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyOYj3GVuSqULlJvk"], "accumulated_threat_level": 0.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "b4a97848-0cd2-4ee5-8c71-18ef5c720a19", "DetectTime": "2024-05-21T12:56:16.048052+00:00", "EventTime": "2024-05-21T12:56:16.048078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Fjh53tz3n5ZJ6Ntc"], "accumulated_threat_level": 1.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "e3be4b9f-5cbb-4ffb-aed4-e3cdbb4aa73c", "DetectTime": "2024-05-21T12:56:16.146146+00:00", "EventTime": "2024-05-21T12:56:16.146166+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7Mjf3CLVd6lWWyt3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 200} +{"Format": "IDEA0", "ID": "dc432f01-57c4-4ef7-a433-57082d684575", "DetectTime": "2024-05-21T12:56:16.196518+00:00", "EventTime": "2024-05-21T12:56:16.196541+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSmBDl1JJeT4Pltwxl"], "accumulated_threat_level": 3.2, "timewindow": 200} +{"Format": "IDEA0", "ID": "4a42d0a3-5896-410f-9aa2-21d4f6bb51b4", "DetectTime": "2024-05-21T12:56:16.254024+00:00", "EventTime": "2024-05-21T12:56:16.254043+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfyyGI0lbzXxxcfj"], "accumulated_threat_level": 4.0, "timewindow": 200} +{"Format": "IDEA0", "ID": "9dfae356-6449-499d-b662-8ece7e0d1799", "DetectTime": "2024-05-21T12:56:16.302742+00:00", "EventTime": "2024-05-21T12:56:16.302762+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKomuS1Fokndmppaxf"], "accumulated_threat_level": 4.8, "timewindow": 200} +{"Format": "IDEA0", "ID": "e8007c53-faad-41c0-95d5-c5e1c55119fc", "DetectTime": "2024-05-21T12:56:16.355008+00:00", "EventTime": "2024-05-21T12:56:16.355030+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZh83k3OPEGABaXIs3"], "accumulated_threat_level": 5.6, "timewindow": 200} +{"Format": "IDEA0", "ID": "13ce8a61-9cda-4079-ab76-9f9f05a9cc60", "DetectTime": "2024-05-21T12:56:16.414377+00:00", "EventTime": "2024-05-21T12:56:16.414398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFj5HQ1m5bZPI3LQo2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 200} +{"Format": "IDEA0", "ID": "e694b164-d3df-45d5-9791-52f41350fe2d", "DetectTime": "2024-05-21T12:56:16.487919+00:00", "EventTime": "2024-05-21T12:56:16.487940+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClCFmL2a8tQ2JlxDrb", "CyGMcN3KVbMjLxnZz9", "CzKQsP2R5Y4CNXYXR9", "CNG0Bb2wf3LX5eJOUf"], "accumulated_threat_level": 0.5, "timewindow": 235} +{"Format": "IDEA0", "ID": "e8c7d6c0-50f2-4651-b091-ac5b416ffa1f", "DetectTime": "2024-05-21T12:56:16.688112+00:00", "EventTime": "2024-05-21T12:56:16.688129+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CevYuS2VVrRrLNkmJ"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "a2b64fcd-5b4f-49cc-959b-1b4be5643fc0", "DetectTime": "2024-05-21T12:56:16.773179+00:00", "EventTime": "2024-05-21T12:56:16.773198+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5idTb4csEXHBHInhl"], "accumulated_threat_level": 0.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "64582437-c5fa-4fe9-9716-1447382f51ec", "DetectTime": "2024-05-21T12:56:16.834250+00:00", "EventTime": "2024-05-21T12:56:16.834269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CebnxRarV9qsa98zh"], "accumulated_threat_level": 1.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "56ab9fd1-c3bb-43c5-8bab-85d49f22b6a9", "DetectTime": "2024-05-21T12:56:16.896735+00:00", "EventTime": "2024-05-21T12:56:16.896755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0tEF4E4YVeXBZ6bj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 201} +{"Format": "IDEA0", "ID": "cdbb6fd5-2a6d-4c1f-9ff0-355c90212ea6", "DetectTime": "2024-05-21T12:56:16.945431+00:00", "EventTime": "2024-05-21T12:56:16.945452+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iVUX2uGARqztDDQ7"], "accumulated_threat_level": 3.2, "timewindow": 201} +{"Format": "IDEA0", "ID": "5f3ee4fc-0bff-4a28-9271-2ca6c7550683", "DetectTime": "2024-05-21T12:56:16.998303+00:00", "EventTime": "2024-05-21T12:56:16.998320+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEc3TJht4zL718pOl"], "accumulated_threat_level": 4.0, "timewindow": 201} +{"Format": "IDEA0", "ID": "b33ce8c1-f552-4acc-9401-1d5ea9158167", "DetectTime": "2024-05-21T12:56:17.051639+00:00", "EventTime": "2024-05-21T12:56:17.051659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cMje3aPJerwShw3j"], "accumulated_threat_level": 4.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "231b552d-2bfa-4e1f-bc75-c09f5b72f8f6", "DetectTime": "2024-05-21T12:56:17.106295+00:00", "EventTime": "2024-05-21T12:56:17.106317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeqzu9x6TsTG1g75"], "accumulated_threat_level": 5.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "e3d1fd44-ec13-470c-b866-9c74bfc6bed7", "DetectTime": "2024-05-21T12:56:17.369504+00:00", "EventTime": "2024-05-21T12:56:17.369526+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhLdv2AhCALxcDmB2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 201} +{"Format": "IDEA0", "ID": "1e7f1660-28e0-4a51-b01a-00145908992c", "DetectTime": "2024-05-21T12:56:17.431270+00:00", "EventTime": "2024-05-21T12:56:17.431288+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4S7Pj38i5SsRfl8V7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "9829262a-8e3a-4bc6-8431-035eda1c305a", "DetectTime": "2024-05-21T12:56:17.485621+00:00", "EventTime": "2024-05-21T12:56:17.485641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5aawR2nJUpvFejqfj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "52dc0234-da8a-4141-9757-e886e6c7b749", "DetectTime": "2024-05-21T12:56:17.538088+00:00", "EventTime": "2024-05-21T12:56:17.538107+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NwpYfPKl9sYP8L4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "e1ecd3ab-49a3-4aac-ba84-f64a974ca724", "DetectTime": "2024-05-21T12:56:17.589713+00:00", "EventTime": "2024-05-21T12:56:17.589733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqXLB4gHfoVpNpIa"], "accumulated_threat_level": 9.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "d4a3456d-4120-4b1e-b384-b96f4c796f8e", "DetectTime": "2024-05-21T12:56:17.885218+00:00", "EventTime": "2024-05-21T12:56:17.885246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqV0s2Q205PV55Bs5"], "accumulated_threat_level": 10.4, "timewindow": 201} +{"Format": "IDEA0", "ID": "7e9f21ed-fab8-452d-b0d8-f7f3b370e836", "DetectTime": "2024-05-21T12:56:17.948910+00:00", "EventTime": "2024-05-21T12:56:17.948929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqttHI1ZIjmRFVtNsc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 201} +{"Format": "IDEA0", "ID": "76f91064-a617-4cac-abba-fd0855098dea", "DetectTime": "2024-05-21T12:56:17.999443+00:00", "EventTime": "2024-05-21T12:56:17.999465+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxhOx38EozvnLd4s7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 201} +{"Format": "Json", "ID": "76f91064-a617-4cac-abba-fd0855098dea", "DetectTime": "2024-05-21T12:56:17.999443+00:00", "EventTime": "2024-05-21T12:56:17.999465+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-09T08:13:29.840496+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2024/05/21 12:56:18.390502)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 201, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "85df35c7-a93e-40f7-bde8-8b8f9a38c965", "DetectTime": "2024-05-21T12:56:18.402932+00:00", "EventTime": "2024-05-21T12:56:18.402950+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX28991Ij6o4ccBi3"], "accumulated_threat_level": 0.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "b3911e2a-a73b-4dd1-8097-d9ad3433c1d0", "DetectTime": "2024-05-21T12:56:18.414593+00:00", "EventTime": "2024-05-21T12:56:18.414611+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVCZx3avttQJtd2ui"], "accumulated_threat_level": 1.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "ef7be81d-8916-4139-80af-f0c09f15056b", "DetectTime": "2024-05-21T12:56:18.420049+00:00", "EventTime": "2024-05-21T12:56:18.420067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAwXcb2MmU4XaNkuh7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "64fba77e-1c21-4eb3-a121-3e486f3e79ee", "DetectTime": "2024-05-21T12:56:18.487539+00:00", "EventTime": "2024-05-21T12:56:18.487558+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaeyitD2973V1iqAi"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 201} +{"Format": "IDEA0", "ID": "6911b27b-9d18-490c-8ec0-5da4b4f1811a", "DetectTime": "2024-05-21T12:56:18.539601+00:00", "EventTime": "2024-05-21T12:56:18.539621+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9T8d24CrStY4Zte9"], "accumulated_threat_level": 3.2, "timewindow": 201} +{"Format": "IDEA0", "ID": "445d259b-4250-45d2-b3f4-07a84b117ecb", "DetectTime": "2024-05-21T12:56:18.597047+00:00", "EventTime": "2024-05-21T12:56:18.597084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IcvY3CKBtsvKRzx3"], "accumulated_threat_level": 4.0, "timewindow": 201} +{"Format": "IDEA0", "ID": "76eb3fa4-3578-4cc9-848e-387cc92cea71", "DetectTime": "2024-05-21T12:56:18.657758+00:00", "EventTime": "2024-05-21T12:56:18.657777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7Ufoh4wqj5sqwO6"], "accumulated_threat_level": 4.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "4b66809e-897a-4cd3-88bb-fed52f88b370", "DetectTime": "2024-05-21T12:56:18.662716+00:00", "EventTime": "2024-05-21T12:56:18.662733+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVNQfa45YxUcvuRNVi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "9e094018-31be-48ed-a9b7-799bc84b0697", "DetectTime": "2024-05-21T12:56:18.738714+00:00", "EventTime": "2024-05-21T12:56:18.738736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQvjMY3TvGiIXFNcwi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "12c4f110-1ab5-4a7c-ae7b-6ab4d85bf34e", "DetectTime": "2024-05-21T12:56:18.793117+00:00", "EventTime": "2024-05-21T12:56:18.793138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyG5w31x78PdzkrA0i"], "accumulated_threat_level": 5.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "f3f9cbbe-c76c-43da-8808-a188a8ce3115", "DetectTime": "2024-05-21T12:56:19.061533+00:00", "EventTime": "2024-05-21T12:56:19.061555+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiPlXq2Xy6ux9EfFab"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "716d6f06-83e6-4b19-9ce4-f92d1e76542e", "DetectTime": "2024-05-21T12:56:19.110557+00:00", "EventTime": "2024-05-21T12:56:19.110580+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqXgqeKIl1xOQ8Jjk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "6c13a1cd-fb4b-46bd-a567-52afb4fcecce", "DetectTime": "2024-05-21T12:56:19.116588+00:00", "EventTime": "2024-05-21T12:56:19.116609+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCLQjQ1IBcX6Kqbheh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "fe9cd613-54ff-4a1b-adfc-108e36beac07", "DetectTime": "2024-05-21T12:56:19.254568+00:00", "EventTime": "2024-05-21T12:56:19.254602+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFJRp3O2ZTFWIoNta"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 201} +{"Format": "IDEA0", "ID": "d0c07a43-61bf-45f0-a12f-25f8adc6c7dd", "DetectTime": "2024-05-21T12:56:19.275642+00:00", "EventTime": "2024-05-21T12:56:19.275661+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVnLqh4JeS1nXcCEe2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "9b15aa09-0eea-4486-9b8e-b47afa961f64", "DetectTime": "2024-05-21T12:56:19.283118+00:00", "EventTime": "2024-05-21T12:56:19.283138+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtmLoL3hPFPY8h1Qr9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "eceaf641-5710-4a7c-b7e6-03c56dc6ecb8", "DetectTime": "2024-05-21T12:56:19.288629+00:00", "EventTime": "2024-05-21T12:56:19.288648+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSHQ5o1DCb157hw4s3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "9b6a7c7e-eb44-44fe-8ff6-32379b998234", "DetectTime": "2024-05-21T12:56:19.614773+00:00", "EventTime": "2024-05-21T12:56:19.614808+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjeZa1MegGA3YZcGe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "2b3aa0b7-d195-4924-9480-48863828b298", "DetectTime": "2024-05-21T12:56:19.718970+00:00", "EventTime": "2024-05-21T12:56:19.718995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5qRqJ3pYjKNP8GZD6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "c0fe5709-8eec-4100-ac05-c5c234125640", "DetectTime": "2024-05-21T12:56:19.725834+00:00", "EventTime": "2024-05-21T12:56:19.725857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMKBQl4Km17szI00D3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "8993b474-909c-4d3d-8697-4dcee588a586", "DetectTime": "2024-05-21T12:56:19.761861+00:00", "EventTime": "2024-05-21T12:56:19.761891+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGn2Ms2zqv5io6bFzc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "80127a16-f281-42a5-b4d9-b73cfce84247", "DetectTime": "2024-05-21T12:56:19.833832+00:00", "EventTime": "2024-05-21T12:56:19.833865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0uO812DMlisVGkJ9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "b6e0319c-15c1-40a1-8d35-39dc819991f1", "DetectTime": "2024-05-21T12:56:20.132477+00:00", "EventTime": "2024-05-21T12:56:20.132499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGPrcR112HlWvgX0w2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "505e8099-3ebb-4547-b013-b923bcd5491c", "DetectTime": "2024-05-21T12:56:20.185903+00:00", "EventTime": "2024-05-21T12:56:20.185924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrnfXN32sJNglXEL29"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "c6245506-bde2-4c8b-bbef-bbc671c623e4", "DetectTime": "2024-05-21T12:56:20.281378+00:00", "EventTime": "2024-05-21T12:56:20.281400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJLVKX34j2tEgQlJ11"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "fab3785a-3150-4e80-99c0-9d918732f335", "DetectTime": "2024-05-21T12:56:20.333854+00:00", "EventTime": "2024-05-21T12:56:20.333878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fNLM2gmTlOnDYsid"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "06fd29aa-6928-460c-9a41-eb981ff19455", "DetectTime": "2024-05-21T12:56:20.355192+00:00", "EventTime": "2024-05-21T12:56:20.355212+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPfMf1wkZSa9uxEMa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "f748b952-a2a7-4a4f-8f3a-95a1fc974679", "DetectTime": "2024-05-21T12:56:20.525074+00:00", "EventTime": "2024-05-21T12:56:20.525096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Prri2JxjDxHEr1l2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "f2ba132e-8d26-49e1-a922-30611bc15f97", "DetectTime": "2024-05-21T12:56:20.533892+00:00", "EventTime": "2024-05-21T12:56:20.533914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZT9eY2BWlV7IyDMOl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "9b8a3582-4bac-4eeb-b29e-182a8c034040", "DetectTime": "2024-05-21T12:56:20.592826+00:00", "EventTime": "2024-05-21T12:56:20.592850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFsi9r3Jkcw2ierxBg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "6df3ab85-b0a9-49ad-9022-5d7e8ea1d98d", "DetectTime": "2024-05-21T12:56:20.616915+00:00", "EventTime": "2024-05-21T12:56:20.616939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrleXr45wMjUtgNn0d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "e73fe9b3-f3ea-4f35-bde1-48215a179116", "DetectTime": "2024-05-21T12:56:20.894772+00:00", "EventTime": "2024-05-21T12:56:20.894792+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["79.131.97.55"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUNfE6fcSsw31zW2"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "f71871f4-4a07-4f99-9aa2-578ecc711f67", "DetectTime": "2024-05-21T12:56:20.909851+00:00", "EventTime": "2024-05-21T12:56:20.909878+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["79.131.97.55"]}], "Attach": [{"Content": "connection to blacklisted IP: 79.131.97.55 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-395577.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUNfE6fcSsw31zW2"], "accumulated_threat_level": 2.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "8e343861-cc7e-42a5-a9eb-808e28567c2d", "DetectTime": "2024-05-21T12:56:20.990036+00:00", "EventTime": "2024-05-21T12:56:20.990058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C94N5G2Pe9yQKU0yga"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "692eee98-bf55-4e70-a506-69b797eee1c5", "DetectTime": "2024-05-21T12:56:21.057071+00:00", "EventTime": "2024-05-21T12:56:21.057094+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNh0b93ujrDDoWFnO"], "accumulated_threat_level": 9.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "46712b30-21d6-4bc2-bbfd-3bb7273c2677", "DetectTime": "2024-05-21T12:56:21.091082+00:00", "EventTime": "2024-05-21T12:56:21.091103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTw1j5AWksxs1nIQ1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "370bf8dc-16a8-43ef-a3cc-ac743768ebea", "DetectTime": "2024-05-21T12:56:21.108245+00:00", "EventTime": "2024-05-21T12:56:21.108269+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE81rl4ss9vnn7CA36"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "4bf265b2-6d64-48a7-888e-5cc0565abf7c", "DetectTime": "2024-05-21T12:56:21.153020+00:00", "EventTime": "2024-05-21T12:56:21.153042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct22RZ2IfkZCmYgrZ6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "fb65e2b1-040d-43a4-9bda-4b966a5cfa7b", "DetectTime": "2024-05-21T12:56:21.170093+00:00", "EventTime": "2024-05-21T12:56:21.170116+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLtZcL3PvS8gzwn11h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "4099147f-48a2-4cc5-91da-1eb17cb814fb", "DetectTime": "2024-05-21T12:56:21.186796+00:00", "EventTime": "2024-05-21T12:56:21.186814+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kvn21xBFWcVs6t5l"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "f008bf92-ebe9-4d02-a7a7-81580287f456", "DetectTime": "2024-05-21T12:56:21.448391+00:00", "EventTime": "2024-05-21T12:56:21.448415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZzl72WF4pV3JG56c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 198} +{"Format": "IDEA0", "ID": "638b38a7-745e-4ad2-9cea-caba02d305cc", "DetectTime": "2024-05-21T12:56:21.648567+00:00", "EventTime": "2024-05-21T12:56:21.648589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpwO9gbbF7t7nVtSf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "b6e72b1b-b933-463b-a76b-9ae68aaa4fe5", "DetectTime": "2024-05-21T12:56:21.656661+00:00", "EventTime": "2024-05-21T12:56:21.656681+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPpJng2oJ27xuMvuI4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "4f9e9321-5166-4a05-aeeb-342802cd1d60", "DetectTime": "2024-05-21T12:56:21.661706+00:00", "EventTime": "2024-05-21T12:56:21.661725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB89eyRu5risAUYB1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "56945dcc-5517-424c-8586-c772b1d2105f", "DetectTime": "2024-05-21T12:56:21.700961+00:00", "EventTime": "2024-05-21T12:56:21.700985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEL2GN21kdWyfG3oN4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "3db8279f-bad4-420d-975c-4cc1e1758f0d", "DetectTime": "2024-05-21T12:56:22.009344+00:00", "EventTime": "2024-05-21T12:56:22.009366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JyH33MmIUt2rfvpj"], "accumulated_threat_level": 10.4, "timewindow": 201} +{"Format": "IDEA0", "ID": "de9badcf-332b-4018-a7bd-0aee88e73f47", "DetectTime": "2024-05-21T12:56:22.067339+00:00", "EventTime": "2024-05-21T12:56:22.067360+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C17si43QwF1KQMqq33"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "7a559e02-4ab8-4ed3-9701-50c656cb7e71", "DetectTime": "2024-05-21T12:56:22.115397+00:00", "EventTime": "2024-05-21T12:56:22.115421+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAThAV2s9Xlxl5iBd9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "1682f09e-8455-4375-b54f-2f7b98d6b66d", "DetectTime": "2024-05-21T12:56:22.120642+00:00", "EventTime": "2024-05-21T12:56:22.120673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDyQdO7l5iZxS6pZk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "6e48142f-5d95-479b-b7ce-f1f897aa4e3e", "DetectTime": "2024-05-21T12:56:22.157289+00:00", "EventTime": "2024-05-21T12:56:22.157317+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbkSCa1fXU6cImjAYa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "2fc18486-46bf-4d23-a54a-607b7d69a1bd", "DetectTime": "2024-05-21T12:56:22.628138+00:00", "EventTime": "2024-05-21T12:56:22.628160+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cxk41S2yUpyrslYvud"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "93fe6233-bf94-4de6-9794-1364e4c7289c", "DetectTime": "2024-05-21T12:56:22.641926+00:00", "EventTime": "2024-05-21T12:56:22.641947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdlR3slP46kFetB5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 201} +{"Format": "IDEA0", "ID": "4b879885-9b9e-4f31-8f07-f007c436c373", "DetectTime": "2024-05-21T12:56:22.684394+00:00", "EventTime": "2024-05-21T12:56:22.684416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSByqn3oZ2IiOSe8y7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "876fef5c-c311-46aa-ab51-f6d489fe78e0", "DetectTime": "2024-05-21T12:56:22.689566+00:00", "EventTime": "2024-05-21T12:56:22.689586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPFkmqwZOR7KF5B64"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "aedd6293-be03-4429-8326-b7e866755250", "DetectTime": "2024-05-21T12:56:22.728020+00:00", "EventTime": "2024-05-21T12:56:22.728045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CDC45ow3nm6NtYtQ4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "30e90a93-51d3-4647-8011-3e434be2f07d", "DetectTime": "2024-05-21T12:56:22.753791+00:00", "EventTime": "2024-05-21T12:56:22.753830+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvCP8Pf1UnZrMqxJf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "592d8f50-4ba2-47a7-8be9-a0f2e07a9994", "DetectTime": "2024-05-21T12:56:22.759411+00:00", "EventTime": "2024-05-21T12:56:22.759434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6YzwE3u6uJNKr0jN8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "a94d5db8-f117-47ea-b8eb-65b5e4a6a446", "DetectTime": "2024-05-21T12:56:23.034013+00:00", "EventTime": "2024-05-21T12:56:23.034032+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQaBLZ26rJ7mxelwC8", "C55vWuQ7BGJeDcpv", "CwrKd14O7gEi1gIQ4k", "CM39N2kCOCqsucBee"], "accumulated_threat_level": 1.0, "timewindow": 235} +{"Format": "IDEA0", "ID": "1ecdf60e-48fd-41df-8cb6-629a9a06a872", "DetectTime": "2024-05-21T12:56:23.240765+00:00", "EventTime": "2024-05-21T12:56:23.240786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Ampc3snNu1Y8ZN7h"], "accumulated_threat_level": 12.000000000000002, "timewindow": 201} +{"Format": "Json", "ID": "1ecdf60e-48fd-41df-8cb6-629a9a06a872", "DetectTime": "2024-05-21T12:56:23.240765+00:00", "EventTime": "2024-05-21T12:56:23.240786+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-09T08:43:43.808852+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2024/05/21 12:56:23.419956)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 201, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "54422cfa-0eb3-4a8a-a573-ca7072cde2ad", "DetectTime": "2024-05-21T12:56:23.431980+00:00", "EventTime": "2024-05-21T12:56:23.432002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChKXT44sKPoZxexH63"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "9c0c554a-c09d-4a81-9c43-6adeb085ed6b", "DetectTime": "2024-05-21T12:56:23.437131+00:00", "EventTime": "2024-05-21T12:56:23.437149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxAdTl3Ef49LeHCJdl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "66e64845-b5f8-4d49-9135-f98510e7f380", "DetectTime": "2024-05-21T12:56:23.442211+00:00", "EventTime": "2024-05-21T12:56:23.442231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COxKRC4Mcx83IXQCQ"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "28e7d99f-5105-43c6-b604-ec303bea0018", "DetectTime": "2024-05-21T12:56:23.447460+00:00", "EventTime": "2024-05-21T12:56:23.447480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq6sWMm08H4QcBnRc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "40ece71b-296e-4f96-9aa4-10de33e3b2d0", "DetectTime": "2024-05-21T12:56:23.452485+00:00", "EventTime": "2024-05-21T12:56:23.452503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkOvLU1YOU7LsIAqsi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "0282fd17-65e9-4a70-8ea6-f73a990d7626", "DetectTime": "2024-05-21T12:56:23.838747+00:00", "EventTime": "2024-05-21T12:56:23.838769+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CouAnC1AMdpdQFa59c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "48895309-fe7e-4cea-9a39-6e468bc49121", "DetectTime": "2024-05-21T12:56:23.906556+00:00", "EventTime": "2024-05-21T12:56:23.906587+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIOcE3unUY26rno8e"], "accumulated_threat_level": 0.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "24a90fc5-cc84-48a6-9e72-ddd044449923", "DetectTime": "2024-05-21T12:56:23.911656+00:00", "EventTime": "2024-05-21T12:56:23.911676+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZECfp31FHhPzahAf5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "73365e44-0c71-42c0-a0a3-aeab0ceaf0d2", "DetectTime": "2024-05-21T12:56:23.922036+00:00", "EventTime": "2024-05-21T12:56:23.922056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqIKhE46iyMVAuO6xc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "ad41f896-ef9f-4f19-a9fc-58ccf58943fc", "DetectTime": "2024-05-21T12:56:23.926891+00:00", "EventTime": "2024-05-21T12:56:23.926911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdLF8M3YWQbztEltd8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "77e1e5c9-0c6d-4656-98d3-de1470d4b90a", "DetectTime": "2024-05-21T12:56:23.996991+00:00", "EventTime": "2024-05-21T12:56:23.997016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUHoCSpa7GU8BGSfe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "f46329c3-8bf6-4ec5-b9f2-6f14abba1107", "DetectTime": "2024-05-21T12:56:24.106184+00:00", "EventTime": "2024-05-21T12:56:24.106208+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9LEv41fdTHghS8qk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "39aed60a-8d96-4a9a-a2b6-2409413acc2c", "DetectTime": "2024-05-21T12:56:24.129955+00:00", "EventTime": "2024-05-21T12:56:24.129977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIJsFc4uNS94Gy37J1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "e8395635-2f4b-4606-8972-2de72046a98a", "DetectTime": "2024-05-21T12:56:24.412349+00:00", "EventTime": "2024-05-21T12:56:24.412370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNgQGYABQxCoLSDeb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "17f6dedd-91b3-46ae-a5a0-d25b70173971", "DetectTime": "2024-05-21T12:56:24.615925+00:00", "EventTime": "2024-05-21T12:56:24.615948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crdpc84QBaTN1br224"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "c2723922-b528-42db-ad43-479e4b55c2e6", "DetectTime": "2024-05-21T12:56:24.624516+00:00", "EventTime": "2024-05-21T12:56:24.624535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CO9IG6loPw09viJ44"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "359ed3ef-65ca-4c7a-a23d-389c7e8b8ba5", "DetectTime": "2024-05-21T12:56:24.630947+00:00", "EventTime": "2024-05-21T12:56:24.630968+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ck7ckm1f2ohRjnTsb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "980e9b66-357a-4645-aab4-36ec3e8bf771", "DetectTime": "2024-05-21T12:56:24.637004+00:00", "EventTime": "2024-05-21T12:56:24.637023+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKEBYT1OoXepkGL1Q2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "12eb7011-e901-4480-8157-f76c0446cd38", "DetectTime": "2024-05-21T12:56:24.649871+00:00", "EventTime": "2024-05-21T12:56:24.649903+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNa54d3NpyNh8iEaBi"], "accumulated_threat_level": 1.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "52e48ca3-a374-4771-b773-e2e4e295a675", "DetectTime": "2024-05-21T12:56:24.655020+00:00", "EventTime": "2024-05-21T12:56:24.655040+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6jB854Jl9YsS2hj5h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "7fbef35e-80ad-4498-85d6-44b00e9cc340", "DetectTime": "2024-05-21T12:56:24.659697+00:00", "EventTime": "2024-05-21T12:56:24.659715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgPwRc3lixomm9wbMg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "becf860c-ab5e-4532-b10d-e200d90ac40c", "DetectTime": "2024-05-21T12:56:25.186492+00:00", "EventTime": "2024-05-21T12:56:25.186514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckt6ZMnm8p4x8bDzj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "37d71a3f-81d7-4337-b8ed-c15197bdd9b9", "DetectTime": "2024-05-21T12:56:25.219824+00:00", "EventTime": "2024-05-21T12:56:25.219845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQoF1V2HDwGjxvf892"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "f923bffc-fe6b-4a66-a1fe-7e56b697cf33", "DetectTime": "2024-05-21T12:56:25.224705+00:00", "EventTime": "2024-05-21T12:56:25.224724+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CW9bK41oDpIDJsRxA4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "14884225-8774-40b7-873b-b3dc38d56076", "DetectTime": "2024-05-21T12:56:25.245573+00:00", "EventTime": "2024-05-21T12:56:25.245591+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chj46L2pmjcd3CM367"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "67c071b3-d8f1-48d2-9731-daad1ea37800", "DetectTime": "2024-05-21T12:56:25.269231+00:00", "EventTime": "2024-05-21T12:56:25.269271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C35bY444fQ8m5Wiubj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "0fc99353-09f0-4238-a957-d6b7848d236a", "DetectTime": "2024-05-21T12:56:25.714163+00:00", "EventTime": "2024-05-21T12:56:25.714185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxdpK3D4nx8qqBm9h"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 201} +{"Format": "IDEA0", "ID": "b7d77f95-2773-412e-a5b7-7efcdb62adfd", "DetectTime": "2024-05-21T12:56:25.719336+00:00", "EventTime": "2024-05-21T12:56:25.719354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUjgB21nT90cuIKvth"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "5cd53017-7c16-4e6d-b263-4a90a7655c89", "DetectTime": "2024-05-21T12:56:25.734584+00:00", "EventTime": "2024-05-21T12:56:25.734607+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CguYD92vJz6Ff52ojc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "ca89b1c3-cef0-4fca-84c7-c1d96f461859", "DetectTime": "2024-05-21T12:56:25.739757+00:00", "EventTime": "2024-05-21T12:56:25.739777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVjwE2aCG3Vv7da8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "18cce2e7-3959-4bc1-ad7d-781d6cd87ca7", "DetectTime": "2024-05-21T12:56:25.980773+00:00", "EventTime": "2024-05-21T12:56:25.980795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCs1bK1y8zc3SgZ5el"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "6ce4430f-1f1a-4c55-a6aa-a775058e095c", "DetectTime": "2024-05-21T12:56:26.000120+00:00", "EventTime": "2024-05-21T12:56:26.000143+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaJMUd1wig7rQjgWF2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "51aad9d3-c0cd-4e22-93df-7e9b499e9711", "DetectTime": "2024-05-21T12:56:26.074141+00:00", "EventTime": "2024-05-21T12:56:26.074165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKK0Zs48sjILXifZYd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "96198900-963b-4281-886b-75d7b9410f05", "DetectTime": "2024-05-21T12:56:26.141335+00:00", "EventTime": "2024-05-21T12:56:26.141355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJZgW81WAtwWQb7aOe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "2ccabf36-4d29-465a-8388-3deeda0b50a8", "DetectTime": "2024-05-21T12:56:26.202916+00:00", "EventTime": "2024-05-21T12:56:26.202939+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHV2RB4QYgNNXzGbD"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "cff65624-4ee6-4ce0-a57c-f16493a0ff5f", "DetectTime": "2024-05-21T12:56:26.597456+00:00", "EventTime": "2024-05-21T12:56:26.597475+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqjOz1no3StBpDra5"], "accumulated_threat_level": 3.2, "timewindow": 201} +{"Format": "IDEA0", "ID": "41313b33-b0ad-4591-b6cb-f87071d4c3ee", "DetectTime": "2024-05-21T12:56:26.699645+00:00", "EventTime": "2024-05-21T12:56:26.699668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy64kd4vau20gwXgOk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "fc5aa330-fe28-4e2b-a875-f5a6a1d9ca10", "DetectTime": "2024-05-21T12:56:26.787131+00:00", "EventTime": "2024-05-21T12:56:26.787153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZvtBV1LaIzKHLssAa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "82c8fe7d-bf58-4aca-b9ab-2e24017b3976", "DetectTime": "2024-05-21T12:56:26.806278+00:00", "EventTime": "2024-05-21T12:56:26.806297+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTkuZy4bvBBfxfm52k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "8cc5eebc-5e14-4965-8bf2-62ca1fad11b5", "DetectTime": "2024-05-21T12:56:26.821078+00:00", "EventTime": "2024-05-21T12:56:26.821099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjRPNS9O6WBj3iNH3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "e62b0250-effc-47aa-963e-f6ad00ce8898", "DetectTime": "2024-05-21T12:56:26.858371+00:00", "EventTime": "2024-05-21T12:56:26.858392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTFZto22WgpO7X4MB3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "05c1647f-0415-4ec2-b7c7-f135a53dfa7c", "DetectTime": "2024-05-21T12:56:26.923481+00:00", "EventTime": "2024-05-21T12:56:26.923501+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIcp9Z4RM1HZlmcig"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "c9084b7e-df64-4e0b-b4cb-870b94b8116b", "DetectTime": "2024-05-21T12:56:26.929185+00:00", "EventTime": "2024-05-21T12:56:26.929204+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5kMQY1LgLxm4Ks3fh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "a1cee9a5-4e1b-491b-9811-1dcdbc439e3a", "DetectTime": "2024-05-21T12:56:26.936899+00:00", "EventTime": "2024-05-21T12:56:26.936918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C37PrM2E3H6AfJuBe5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 199} +{"Format": "IDEA0", "ID": "62eb5ce4-504e-4bcb-bc11-8a2037cc2437", "DetectTime": "2024-05-21T12:56:26.975369+00:00", "EventTime": "2024-05-21T12:56:26.975389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C040jY20brQCglPzPb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "d51c824c-3f34-4c42-9d89-7290e5c2b7fc", "DetectTime": "2024-05-21T12:56:27.245852+00:00", "EventTime": "2024-05-21T12:56:27.245870+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["186.61.86.78"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHny1d3GGxs2capOSc"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "bd29330f-cdc2-477f-8f82-6bb88312d79a", "DetectTime": "2024-05-21T12:56:27.259733+00:00", "EventTime": "2024-05-21T12:56:27.259752+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["186.61.86.78"]}], "Attach": [{"Content": "connection to blacklisted IP: 186.61.86.78 from 10.0.2.19. AS: Telefonica de Argentina, AR AS22927 rDNS: 186-61-86-78.speedy.com.ar Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHny1d3GGxs2capOSc"], "accumulated_threat_level": 2.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "8fe6ef2a-f24f-455b-9f79-b2ba657fbda7", "DetectTime": "2024-05-21T12:56:27.455036+00:00", "EventTime": "2024-05-21T12:56:27.455056+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQg2QQ2VFY26csU9hk"], "accumulated_threat_level": 4.0, "timewindow": 201} +{"Format": "IDEA0", "ID": "5062c615-2e4c-4395-882c-0044e0efc828", "DetectTime": "2024-05-21T12:56:27.510831+00:00", "EventTime": "2024-05-21T12:56:27.510852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cvt6a64GjbyPxxqmoi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "2f686e7c-ebc8-4d41-b19b-5954db466eab", "DetectTime": "2024-05-21T12:56:27.515932+00:00", "EventTime": "2024-05-21T12:56:27.515952+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4551t1insNOYFHsa6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "14096eed-fa4a-47df-8fc5-cdfc2803f4dc", "DetectTime": "2024-05-21T12:56:27.789010+00:00", "EventTime": "2024-05-21T12:56:27.789055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjTMqD3Vw3KMTN0A05"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "0b0533eb-5225-4c2c-ade5-61e0aef7a1e1", "DetectTime": "2024-05-21T12:56:27.844054+00:00", "EventTime": "2024-05-21T12:56:27.844074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwR2Fy0YLzJEhakG7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "e31719fe-d291-475b-bf0e-08ab45f0c2fc", "DetectTime": "2024-05-21T12:56:27.848777+00:00", "EventTime": "2024-05-21T12:56:27.848796+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co0J2ACOgQK5WjPnk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "0ae8f6f5-d475-4410-b1b7-621bda96a85e", "DetectTime": "2024-05-21T12:56:27.854866+00:00", "EventTime": "2024-05-21T12:56:27.854886+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZJPsV2b0uxhaWKet4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "656ceea3-926a-4cf0-a2af-bc4a4ba3529c", "DetectTime": "2024-05-21T12:56:27.885867+00:00", "EventTime": "2024-05-21T12:56:27.885892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2ZmLP2XiBcwqoD8Ni"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "76e67488-f8fe-484a-b009-1ed3925681ea", "DetectTime": "2024-05-21T12:56:27.892037+00:00", "EventTime": "2024-05-21T12:56:27.892058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnMwth4tIffPaDaMA"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "06ec6096-4174-4f0f-98f2-1e94a3f2be38", "DetectTime": "2024-05-21T12:56:28.399566+00:00", "EventTime": "2024-05-21T12:56:28.399588+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1kVLQt1SXNeND8ab"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "8bd40787-39a0-44a4-990b-58c4dbf71a36", "DetectTime": "2024-05-21T12:56:28.415567+00:00", "EventTime": "2024-05-21T12:56:28.415589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJmFzG1GvRZ122Uf78"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "0ffb288a-dd19-4cb3-bc74-eed163a5c562", "DetectTime": "2024-05-21T12:56:28.420991+00:00", "EventTime": "2024-05-21T12:56:28.421009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB0cH829EosVehvoYg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "c1b4e079-e0a1-4c6e-8ae8-e0ff3737d076", "DetectTime": "2024-05-21T12:56:28.444460+00:00", "EventTime": "2024-05-21T12:56:28.444481+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBxiHQ1q9M43Qf9ma"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "3cfa7528-2348-43bd-a620-7b4241532e0c", "DetectTime": "2024-05-21T12:56:28.456960+00:00", "EventTime": "2024-05-21T12:56:28.456983+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C453YO3ZfMO5252Iec"], "accumulated_threat_level": 4.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "9c3d3b0f-f296-4574-815d-98437a92ac28", "DetectTime": "2024-05-21T12:56:28.688602+00:00", "EventTime": "2024-05-21T12:56:28.688635+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVU9l1bC7g16cAttk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "5a61a303-b0f7-4763-af89-da6238f9e614", "DetectTime": "2024-05-21T12:56:28.694541+00:00", "EventTime": "2024-05-21T12:56:28.694565+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVVuCi3RQX7lJ6T6qe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "a0e89a4e-60e2-4d94-b4e8-9d6134588b35", "DetectTime": "2024-05-21T12:56:28.699808+00:00", "EventTime": "2024-05-21T12:56:28.699826+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLy0ri4yfSlHck0L74"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "f348e8e6-7fe9-493b-8ce3-9de444dd7682", "DetectTime": "2024-05-21T12:56:28.735330+00:00", "EventTime": "2024-05-21T12:56:28.735350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnpiCI1G5AiO5Snpk5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "591543b6-7c4d-4cdd-b337-2ca62f40c1c3", "DetectTime": "2024-05-21T12:56:28.754083+00:00", "EventTime": "2024-05-21T12:56:28.754105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQISbr3ZZPOTqbIWy6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "1099d3ed-f6e9-4444-a67a-88a793b00140", "DetectTime": "2024-05-21T12:56:28.759220+00:00", "EventTime": "2024-05-21T12:56:28.759240+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0mxtt4Y4FBzrg2Zf6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "dfaf9973-695b-48d8-820d-8b561ab655d1", "DetectTime": "2024-05-21T12:56:29.011170+00:00", "EventTime": "2024-05-21T12:56:29.011196+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvjdIt2IO2HxdA0OYj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "7dc5079c-38fc-4a15-b76f-797ba8e14bfb", "DetectTime": "2024-05-21T12:56:29.222750+00:00", "EventTime": "2024-05-21T12:56:29.222771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvJBhswdLHcQ2rZLl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "bd3e6c68-4056-4aef-a801-deec376bbdef", "DetectTime": "2024-05-21T12:56:29.597923+00:00", "EventTime": "2024-05-21T12:56:29.597944+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct79vnnnZDPdypi2g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "69a07376-6ec7-4313-86f5-1b8b70e72a47", "DetectTime": "2024-05-21T12:56:29.704985+00:00", "EventTime": "2024-05-21T12:56:29.705004+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQCVC1Q5fusYWQU91"], "accumulated_threat_level": 5.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "0e1008b1-4421-4f7f-96d8-bdd60be8dd34", "DetectTime": "2024-05-21T12:56:29.709892+00:00", "EventTime": "2024-05-21T12:56:29.709910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvwtvF2buY2SA0VmVj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "7e3f98f8-2d81-4471-bbc6-d4388ebd8fe0", "DetectTime": "2024-05-21T12:56:29.812730+00:00", "EventTime": "2024-05-21T12:56:29.812751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDeE81Gkh3fcMliL7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "bd7d0532-ab8d-4088-ac23-be85fc49a29e", "DetectTime": "2024-05-21T12:56:29.836089+00:00", "EventTime": "2024-05-21T12:56:29.836110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuWTuH1Gc3UVaMnl9f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "47e085c3-d1de-471b-a1bc-d3862a084242", "DetectTime": "2024-05-21T12:56:29.843974+00:00", "EventTime": "2024-05-21T12:56:29.843994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvYMK51DgCf0F6N97l"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "980a578b-4810-4d8e-83e2-03e4179261b1", "DetectTime": "2024-05-21T12:56:30.215166+00:00", "EventTime": "2024-05-21T12:56:30.215184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFxL7s2sP7o8VJeOWf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "1678d39b-3b9e-4134-a8d2-63d5d630bb5a", "DetectTime": "2024-05-21T12:56:30.258430+00:00", "EventTime": "2024-05-21T12:56:30.258451+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClXUDF3WyxkfzBKEib"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "0420a31e-af69-42e0-9860-02b43cc95d77", "DetectTime": "2024-05-21T12:56:30.266232+00:00", "EventTime": "2024-05-21T12:56:30.266251+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnfic02fRgQXtLSCt2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "c20c8634-85d3-49e9-8c67-5b66282bd757", "DetectTime": "2024-05-21T12:56:30.309301+00:00", "EventTime": "2024-05-21T12:56:30.309321+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSqkGvCaM8AKaaBgk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "0eac942a-86a3-4f35-b085-ab8a25ca5ce8", "DetectTime": "2024-05-21T12:56:30.317140+00:00", "EventTime": "2024-05-21T12:56:30.317161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CK1EMb4pFNWvFXjz27"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "267e4d1a-6206-4a01-b4c9-bf6fabbe385b", "DetectTime": "2024-05-21T12:56:30.337349+00:00", "EventTime": "2024-05-21T12:56:30.337372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrdyYq1q5mqpOzwJ4f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "f7ae7bb0-e15f-4c9d-8cd4-631f72caa640", "DetectTime": "2024-05-21T12:56:30.480106+00:00", "EventTime": "2024-05-21T12:56:30.480126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGAr7O2ttmnVgScP1b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "c864c4f6-2b77-4bd3-bf70-00bf3359d622", "DetectTime": "2024-05-21T12:56:30.839586+00:00", "EventTime": "2024-05-21T12:56:30.839617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChAV541Ckep2c3hSC6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "f969e0e1-c987-4f07-8522-b033e98795ea", "DetectTime": "2024-05-21T12:56:30.860138+00:00", "EventTime": "2024-05-21T12:56:30.860158+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZTOe3qLuWAurdzol"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 201} +{"Format": "IDEA0", "ID": "960933ce-97e7-4016-8c87-a95b5c988c29", "DetectTime": "2024-05-21T12:56:30.865077+00:00", "EventTime": "2024-05-21T12:56:30.865096+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbxTIjaK9bfQ3EMZ5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "a3320633-2fc5-4902-a833-3d40ee295172", "DetectTime": "2024-05-21T12:56:30.871297+00:00", "EventTime": "2024-05-21T12:56:30.871315+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB7lPA2hEmXpXZIOF5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "09caf4f6-bc3b-49ab-89dc-9616dd34dfec", "DetectTime": "2024-05-21T12:56:30.948753+00:00", "EventTime": "2024-05-21T12:56:30.948772+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCXRle1FJywYT1qz2g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "773254d4-8057-491f-afa5-b28690b081e6", "DetectTime": "2024-05-21T12:56:31.246189+00:00", "EventTime": "2024-05-21T12:56:31.246209+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyiLux3Ak7kI94x80h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "f5b44628-efce-4707-9731-dcb96ccd0c55", "DetectTime": "2024-05-21T12:56:31.389660+00:00", "EventTime": "2024-05-21T12:56:31.389679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvVubcEgzmixdZmv3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "bfcb13d9-3184-4631-9a5a-f5b5341dab0f", "DetectTime": "2024-05-21T12:56:31.485282+00:00", "EventTime": "2024-05-21T12:56:31.485303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGzptDW2OgmbsPgI2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "7969cd6a-2e1b-4828-8b0d-ac23ca56b3c5", "DetectTime": "2024-05-21T12:56:31.494971+00:00", "EventTime": "2024-05-21T12:56:31.494989+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5vg1MRmgcxSNTJm3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "fd8ed47f-5fb3-4b46-862a-9e0bfe94df74", "DetectTime": "2024-05-21T12:56:31.532723+00:00", "EventTime": "2024-05-21T12:56:31.532746+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mcuo3iRAtdXWrE57"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "553cc964-cba8-4a46-9f31-2db2a4fceddc", "DetectTime": "2024-05-21T12:56:31.545755+00:00", "EventTime": "2024-05-21T12:56:31.545777+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4kYJv4dKhoYX52Rt1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "69631e6a-bda6-4713-ad2e-5bbc9340590a", "DetectTime": "2024-05-21T12:56:31.569330+00:00", "EventTime": "2024-05-21T12:56:31.569350+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLyOYj3GVuSqULlJvk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "749f17dd-2120-45eb-8a7f-61010e4d389d", "DetectTime": "2024-05-21T12:56:31.594237+00:00", "EventTime": "2024-05-21T12:56:31.594259+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6Xf1a4icZwfqMYjxb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "522760ae-156c-4972-b2bd-fccb6ce77d91", "DetectTime": "2024-05-21T12:56:31.997030+00:00", "EventTime": "2024-05-21T12:56:31.997053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZh83k3OPEGABaXIs3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "931644f9-13a8-4265-b66c-f8917e56e018", "DetectTime": "2024-05-21T12:56:32.015953+00:00", "EventTime": "2024-05-21T12:56:32.015978+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSmBDl1JJeT4Pltwxl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "2de0df87-485a-4330-bbae-1bb4c7623b3e", "DetectTime": "2024-05-21T12:56:32.111098+00:00", "EventTime": "2024-05-21T12:56:32.111121+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8Fjh53tz3n5ZJ6Ntc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "c0d3ea1e-a7d1-4216-871e-d03f28a6a260", "DetectTime": "2024-05-21T12:56:32.168958+00:00", "EventTime": "2024-05-21T12:56:32.168975+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBYj2Pp2WYGmZtd8d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "53bea796-c4ee-4544-a55a-55e373f8bd3c", "DetectTime": "2024-05-21T12:56:32.173467+00:00", "EventTime": "2024-05-21T12:56:32.173484+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg7Mjf3CLVd6lWWyt3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "bdd9f3c1-4842-4c31-9c33-78bf0faa9ea0", "DetectTime": "2024-05-21T12:56:32.216015+00:00", "EventTime": "2024-05-21T12:56:32.216035+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZZ8Xt4x3ESEr7xpGb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "9a0b8784-0a4c-4980-9158-4aaf8274312f", "DetectTime": "2024-05-21T12:56:32.840131+00:00", "EventTime": "2024-05-21T12:56:32.840161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CebnxRarV9qsa98zh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "dafdbd78-91f9-41d8-8b8f-5a2cc5f66444", "DetectTime": "2024-05-21T12:56:32.845675+00:00", "EventTime": "2024-05-21T12:56:32.845695+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iVUX2uGARqztDDQ7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "d99674c9-676e-471f-83ab-03f0f2f73171", "DetectTime": "2024-05-21T12:56:32.851168+00:00", "EventTime": "2024-05-21T12:56:32.851188+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEc3TJht4zL718pOl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "3bfc0621-b53a-45c4-a41f-33ca9394fd5a", "DetectTime": "2024-05-21T12:56:32.856032+00:00", "EventTime": "2024-05-21T12:56:32.856050+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CevYuS2VVrRrLNkmJ"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "ba9e6a3c-d304-416e-89c7-cd9f9c4ab411", "DetectTime": "2024-05-21T12:56:32.899077+00:00", "EventTime": "2024-05-21T12:56:32.899098+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFj5HQ1m5bZPI3LQo2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "24cf6ac6-a0a3-487a-9d40-69b849bd8bcf", "DetectTime": "2024-05-21T12:56:32.924776+00:00", "EventTime": "2024-05-21T12:56:32.924800+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cm0tEF4E4YVeXBZ6bj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "bc2ae7d1-1603-496c-b2f9-9d936fe38099", "DetectTime": "2024-05-21T12:56:32.940018+00:00", "EventTime": "2024-05-21T12:56:32.940039+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgfyyGI0lbzXxxcfj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "dd185d9f-a030-485b-b02d-a626d8fa8178", "DetectTime": "2024-05-21T12:56:32.946098+00:00", "EventTime": "2024-05-21T12:56:32.946117+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9cMje3aPJerwShw3j"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "fee16831-964f-4c41-a77a-19c7163db9b9", "DetectTime": "2024-05-21T12:56:32.958403+00:00", "EventTime": "2024-05-21T12:56:32.958442+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPeqzu9x6TsTG1g75"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "fabba75d-6372-4c77-b9d9-e63d061a52c0", "DetectTime": "2024-05-21T12:56:33.366276+00:00", "EventTime": "2024-05-21T12:56:33.366306+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtIC32ZeCxMORHfwi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "549fe9d6-2f28-45b0-8eb1-7197ce1e63fa", "DetectTime": "2024-05-21T12:56:33.372872+00:00", "EventTime": "2024-05-21T12:56:33.372894+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4S7Pj38i5SsRfl8V7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "eed5d0df-e10e-497f-8199-3ca9879c1a0e", "DetectTime": "2024-05-21T12:56:33.403994+00:00", "EventTime": "2024-05-21T12:56:33.404016+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKomuS1Fokndmppaxf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 200} +{"Format": "IDEA0", "ID": "eb79b2cc-3388-4d5a-9240-3d618428c318", "DetectTime": "2024-05-21T12:56:33.542325+00:00", "EventTime": "2024-05-21T12:56:33.542343+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["85.72.219.144"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-349170.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9D6u3zSEVFYZeLo2"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "36b9ddac-cb48-422b-859b-a7b883c8df9a", "DetectTime": "2024-05-21T12:56:33.555264+00:00", "EventTime": "2024-05-21T12:56:33.555283+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["85.72.219.144"]}], "Attach": [{"Content": "connection to blacklisted IP: 85.72.219.144 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-349170.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch9D6u3zSEVFYZeLo2"], "accumulated_threat_level": 3.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "e835ce6e-70ed-4176-a955-38ac698cb5a8", "DetectTime": "2024-05-21T12:56:33.680185+00:00", "EventTime": "2024-05-21T12:56:33.680206+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6NwpYfPKl9sYP8L4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "99e8ee1f-055e-43d0-a3a7-5fbc54a14980", "DetectTime": "2024-05-21T12:56:33.686868+00:00", "EventTime": "2024-05-21T12:56:33.686888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLhLdv2AhCALxcDmB2"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "d8f23124-804d-499c-8cb5-998ed66794d7", "DetectTime": "2024-05-21T12:56:33.707170+00:00", "EventTime": "2024-05-21T12:56:33.707194+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5idTb4csEXHBHInhl"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "d218c7b2-9030-4fd5-96f3-4846b9cedac9", "DetectTime": "2024-05-21T12:56:34.318820+00:00", "EventTime": "2024-05-21T12:56:34.318845+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5aawR2nJUpvFejqfj"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "3ead6796-4fc4-4211-a2c0-49a45075a8a2", "DetectTime": "2024-05-21T12:56:34.324182+00:00", "EventTime": "2024-05-21T12:56:34.324202+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbqV0s2Q205PV55Bs5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "f69a7d88-fab6-4764-b9db-f1683f3a35f8", "DetectTime": "2024-05-21T12:56:34.338695+00:00", "EventTime": "2024-05-21T12:56:34.338715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgqXLB4gHfoVpNpIa"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "f9c19750-f29b-4f99-9847-fcb571165ec5", "DetectTime": "2024-05-21T12:56:34.357381+00:00", "EventTime": "2024-05-21T12:56:34.357404+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqttHI1ZIjmRFVtNsc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "6b32a420-6376-499c-82f7-a0e2150c39c8", "DetectTime": "2024-05-21T12:56:34.398513+00:00", "EventTime": "2024-05-21T12:56:34.398535+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZxhOx38EozvnLd4s7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "27267a91-8d6d-4cfa-ae69-60b6b18cb5da", "DetectTime": "2024-05-21T12:56:34.414038+00:00", "EventTime": "2024-05-21T12:56:34.414058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4IcvY3CKBtsvKRzx3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "dd9b070d-9e68-4a7d-a968-334832d9685c", "DetectTime": "2024-05-21T12:56:34.489398+00:00", "EventTime": "2024-05-21T12:56:34.489418+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaeyitD2973V1iqAi"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "e7802ee3-d63c-454a-ac2e-b830f8830252", "DetectTime": "2024-05-21T12:56:34.816805+00:00", "EventTime": "2024-05-21T12:56:34.816825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb7Ufoh4wqj5sqwO6"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "1afc0230-66f5-41b6-950b-be1034244e0c", "DetectTime": "2024-05-21T12:56:34.843306+00:00", "EventTime": "2024-05-21T12:56:34.843328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLVCZx3avttQJtd2ui"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "8d035ccb-d5e5-44fb-88ec-536b5b7878cb", "DetectTime": "2024-05-21T12:56:34.857599+00:00", "EventTime": "2024-05-21T12:56:34.857618+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR9T8d24CrStY4Zte9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "e4c6263f-8f09-4929-bf87-dae6d12d151c", "DetectTime": "2024-05-21T12:56:34.869577+00:00", "EventTime": "2024-05-21T12:56:34.869597+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CX28991Ij6o4ccBi3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "608ee1aa-d378-4880-920e-947f7c5cf261", "DetectTime": "2024-05-21T12:56:34.920485+00:00", "EventTime": "2024-05-21T12:56:34.920506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyG5w31x78PdzkrA0i"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "2b2f661a-d653-40a3-bc94-09604fae9908", "DetectTime": "2024-05-21T12:56:35.489147+00:00", "EventTime": "2024-05-21T12:56:35.489169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMFJRp3O2ZTFWIoNta"], "accumulated_threat_level": 7.999999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "c0164b2d-8bee-40b8-a69d-24c67e553c18", "DetectTime": "2024-05-21T12:56:35.502938+00:00", "EventTime": "2024-05-21T12:56:35.502959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1pRq4aCZZajGpML5"], "accumulated_threat_level": 8.799999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "ab5cdb41-b70a-41dd-8eb6-dfd324431554", "DetectTime": "2024-05-21T12:56:35.507885+00:00", "EventTime": "2024-05-21T12:56:35.507902+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpjeZa1MegGA3YZcGe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "3f8d4b8a-657b-4534-919a-9500345a12ea", "DetectTime": "2024-05-21T12:56:35.512339+00:00", "EventTime": "2024-05-21T12:56:35.512356+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CS0uO812DMlisVGkJ9"], "accumulated_threat_level": 8.799999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "be2d4333-cd99-4c53-8d5d-51b9ed845d68", "DetectTime": "2024-05-21T12:56:35.882032+00:00", "EventTime": "2024-05-21T12:56:35.882055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPfMf1wkZSa9uxEMa"], "accumulated_threat_level": 8.799999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "5eff4ee6-299f-4d47-be54-985b86555ca8", "DetectTime": "2024-05-21T12:56:35.928747+00:00", "EventTime": "2024-05-21T12:56:35.928768+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlRrE36YBVgqPl4Si"], "accumulated_threat_level": 9.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "bf184876-91fe-40b5-983c-af827231521d", "DetectTime": "2024-05-21T12:56:35.983964+00:00", "EventTime": "2024-05-21T12:56:35.984002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDJpW1esAFD7MBVrk"], "accumulated_threat_level": 10.4, "timewindow": 201} +{"Format": "IDEA0", "ID": "ba26e383-60ce-4938-bd8f-0670adbbc235", "DetectTime": "2024-05-21T12:56:36.035689+00:00", "EventTime": "2024-05-21T12:56:36.035710+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkeduB42pVxULWf7l9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 201} +{"Format": "IDEA0", "ID": "23516e4a-2a1d-4236-9b9e-fff196a2489d", "DetectTime": "2024-05-21T12:56:36.087059+00:00", "EventTime": "2024-05-21T12:56:36.087077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuu63R3iFwVhsz7fRb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 201} +{"Format": "Json", "ID": "23516e4a-2a1d-4236-9b9e-fff196a2489d", "DetectTime": "2024-05-21T12:56:36.087059+00:00", "EventTime": "2024-05-21T12:56:36.087077+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-09T08:43:46.994071+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 201. (real time 2024/05/21 12:56:36.329512)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 201, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "208d1807-2f1f-4804-9d76-8cc6f83c2a78", "DetectTime": "2024-05-21T12:56:36.333648+00:00", "EventTime": "2024-05-21T12:56:36.333666+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNh0b93ujrDDoWFnO"], "accumulated_threat_level": 0, "timewindow": 201} +{"Format": "IDEA0", "ID": "8d70374d-5300-4921-b57f-0f20239d6708", "DetectTime": "2024-05-21T12:56:36.378714+00:00", "EventTime": "2024-05-21T12:56:36.378747+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpVUy2wgmzYBETR2c"], "accumulated_threat_level": 0.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "ab5fba3b-5eb0-4188-b7d0-c75903e8a616", "DetectTime": "2024-05-21T12:56:36.430915+00:00", "EventTime": "2024-05-21T12:56:36.430934+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4liSP3LZhhfSQffzb"], "accumulated_threat_level": 1.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "d331bcc9-2e5d-4df8-b8a5-8ea290d34daa", "DetectTime": "2024-05-21T12:56:36.482726+00:00", "EventTime": "2024-05-21T12:56:36.482757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwBeHo1zBnCHGErQea"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 201} +{"Format": "IDEA0", "ID": "de980cd0-d524-44e9-8c52-edd7a37ccc84", "DetectTime": "2024-05-21T12:56:36.538749+00:00", "EventTime": "2024-05-21T12:56:36.538771+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUlvab1R7CoreWvJvb"], "accumulated_threat_level": 3.2, "timewindow": 201} +{"Format": "IDEA0", "ID": "042336bc-b91a-4f0d-89a0-294ee639ac9f", "DetectTime": "2024-05-21T12:56:36.693717+00:00", "EventTime": "2024-05-21T12:56:36.693756+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChXXLc2NQpe7u66C5f"], "accumulated_threat_level": 4.0, "timewindow": 201} +{"Format": "IDEA0", "ID": "697f82fa-bf57-45c2-b68a-dff603c65e29", "DetectTime": "2024-05-21T12:56:36.957677+00:00", "EventTime": "2024-05-21T12:56:36.957696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CscvBo1av4ZNJ4NAIj"], "accumulated_threat_level": 4.8, "timewindow": 201} +{"Format": "IDEA0", "ID": "5f54bd48-97f7-40ee-9a6d-057bcf65de8a", "DetectTime": "2024-05-21T12:56:37.009571+00:00", "EventTime": "2024-05-21T12:56:37.009589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CErJXA1sp8DYXqqGEc"], "accumulated_threat_level": 5.6, "timewindow": 201} +{"Format": "IDEA0", "ID": "a8da2e0b-5657-4aa0-bba8-83b300fe69a8", "DetectTime": "2024-05-21T12:56:37.062691+00:00", "EventTime": "2024-05-21T12:56:37.062711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp92Kj4SLF8OrFJGI7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 201} +{"Format": "IDEA0", "ID": "e3290515-000f-42b1-9130-fe7a77907a3e", "DetectTime": "2024-05-21T12:56:37.117650+00:00", "EventTime": "2024-05-21T12:56:37.117668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOTUk4EaumASqnE5k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "d8e045ee-20f3-42ae-a12e-1ef369a1c803", "DetectTime": "2024-05-21T12:56:37.230523+00:00", "EventTime": "2024-05-21T12:56:37.230546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1JyH33MmIUt2rfvpj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "dcefdc01-1492-44e3-897d-fdc79061f263", "DetectTime": "2024-05-21T12:56:37.277265+00:00", "EventTime": "2024-05-21T12:56:37.277283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkALMo85TfusCkvec"], "accumulated_threat_level": 0.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "015e69ab-5d24-4d1b-b897-e6727379a2af", "DetectTime": "2024-05-21T12:56:37.567683+00:00", "EventTime": "2024-05-21T12:56:37.567707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8OjX2m0wfGQvZK1a"], "accumulated_threat_level": 1.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "d51d7647-a4ba-4b60-adee-6b3466b39a65", "DetectTime": "2024-05-21T12:56:37.621426+00:00", "EventTime": "2024-05-21T12:56:37.621449+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cocwjy4G7bzwJomkWb"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 202} +{"Format": "IDEA0", "ID": "90070976-a1dd-47dc-bb50-7350f99fa5bf", "DetectTime": "2024-05-21T12:56:37.681976+00:00", "EventTime": "2024-05-21T12:56:37.681994+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwg5u2TcnfdljRAhg"], "accumulated_threat_level": 3.2, "timewindow": 202} +{"Format": "IDEA0", "ID": "1f9c6065-ceb7-4f45-bdac-e8a7155faa7e", "DetectTime": "2024-05-21T12:56:37.727730+00:00", "EventTime": "2024-05-21T12:56:37.727753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ0Tpy4wL0y7E9Si6h"], "accumulated_threat_level": 4.0, "timewindow": 202} +{"Format": "IDEA0", "ID": "06f231bf-ea70-49cd-aa75-9b34944eff2b", "DetectTime": "2024-05-21T12:56:37.781657+00:00", "EventTime": "2024-05-21T12:56:37.781687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CazuXA3e6uqy5P8Zp9"], "accumulated_threat_level": 4.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "de026960-cda7-445c-b108-d5d908df2d05", "DetectTime": "2024-05-21T12:56:37.838297+00:00", "EventTime": "2024-05-21T12:56:37.838319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Yj7M2UnrSeKtjYN7"], "accumulated_threat_level": 5.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "991ce3c8-8ee6-4314-9e3b-4888ceef8e2f", "DetectTime": "2024-05-21T12:56:37.876004+00:00", "EventTime": "2024-05-21T12:56:37.876024+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbdlR3slP46kFetB5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "baeab3f1-8751-4eee-9d45-42445dcaf939", "DetectTime": "2024-05-21T12:56:37.930149+00:00", "EventTime": "2024-05-21T12:56:37.930170+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKxu934MgMmgTyhD69"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "1f1672aa-0049-4602-b171-17f2a5c37e19", "DetectTime": "2024-05-21T12:56:38.251479+00:00", "EventTime": "2024-05-21T12:56:38.251498+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6AnO28rXOp1es0H2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "fec4ef67-fb47-4906-9a90-595fbd492f8e", "DetectTime": "2024-05-21T12:56:38.304161+00:00", "EventTime": "2024-05-21T12:56:38.304186+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMh3mCgvOkPtsN964"], "accumulated_threat_level": 7.999999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "4ef3cfdd-1e0b-47a8-82b2-706b92c6eb86", "DetectTime": "2024-05-21T12:56:38.362392+00:00", "EventTime": "2024-05-21T12:56:38.362434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJwJW2y6Maab3bgKb"], "accumulated_threat_level": 8.799999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "210e1f54-1545-4224-bb77-3914599f5fba", "DetectTime": "2024-05-21T12:56:38.404830+00:00", "EventTime": "2024-05-21T12:56:38.404853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7Ampc3snNu1Y8ZN7h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "f9b447f5-65cd-4616-b65a-cee1676501c8", "DetectTime": "2024-05-21T12:56:38.465355+00:00", "EventTime": "2024-05-21T12:56:38.465377+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4a8o91p7s7jG2YYx6"], "accumulated_threat_level": 9.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "89d64ab3-deeb-48e5-a2a2-e21ee0c2909c", "DetectTime": "2024-05-21T12:56:38.507904+00:00", "EventTime": "2024-05-21T12:56:38.507925+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3blii4yH8Ks0AxMi9"], "accumulated_threat_level": 10.4, "timewindow": 202} +{"Format": "IDEA0", "ID": "5c0da1af-7fdf-4f4b-bcb7-8c65b64bda70", "DetectTime": "2024-05-21T12:56:38.563740+00:00", "EventTime": "2024-05-21T12:56:38.563760+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CddE6X3dZZUwdXBbk5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 202} +{"Format": "IDEA0", "ID": "8fc79b01-ddfe-4d6c-acc6-e876d3f354e9", "DetectTime": "2024-05-21T12:56:38.613130+00:00", "EventTime": "2024-05-21T12:56:38.613150+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32tGv304Y6nvmbgK"], "accumulated_threat_level": 12.000000000000002, "timewindow": 202} +{"Format": "Json", "ID": "8fc79b01-ddfe-4d6c-acc6-e876d3f354e9", "DetectTime": "2024-05-21T12:56:38.613130+00:00", "EventTime": "2024-05-21T12:56:38.613150+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "1970-01-09T09:14:06.083639+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2024/05/21 12:56:38.795345)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 202, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a89e2095-9a7f-4ec6-98ee-af2f69f47629", "DetectTime": "2024-05-21T12:56:38.877488+00:00", "EventTime": "2024-05-21T12:56:38.877507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6FVM1WGEvb9aAyce"], "accumulated_threat_level": 0.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "221eef72-3641-4777-915d-08d2b03f8743", "DetectTime": "2024-05-21T12:56:38.931113+00:00", "EventTime": "2024-05-21T12:56:38.931133+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChYTKw4Tbi3pXm1dAj"], "accumulated_threat_level": 1.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "c02be3a1-e96c-4289-9674-47e1f60c4282", "DetectTime": "2024-05-21T12:56:38.986067+00:00", "EventTime": "2024-05-21T12:56:38.986086+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPhavT2taKACgi9Ig1"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 202} +{"Format": "IDEA0", "ID": "e89536bc-8902-4760-8ab1-d71ab06f311f", "DetectTime": "2024-05-21T12:56:39.040541+00:00", "EventTime": "2024-05-21T12:56:39.040562+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C03Yjp3P04VlLT5MG8"], "accumulated_threat_level": 3.2, "timewindow": 202} +{"Format": "IDEA0", "ID": "40dfb84d-4097-4e03-8376-42e990d6fbb2", "DetectTime": "2024-05-21T12:56:39.095677+00:00", "EventTime": "2024-05-21T12:56:39.095698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYERxZ1OANZLELVDlg"], "accumulated_threat_level": 4.0, "timewindow": 202} +{"Format": "IDEA0", "ID": "a974e92e-a078-41f9-a638-3b41dbcb6992", "DetectTime": "2024-05-21T12:56:39.147078+00:00", "EventTime": "2024-05-21T12:56:39.147097+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIoAoI3jvUFSfZC5Aa"], "accumulated_threat_level": 4.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "bf8df5fd-5ebd-40ba-879e-ce9c52e48efd", "DetectTime": "2024-05-21T12:56:39.197847+00:00", "EventTime": "2024-05-21T12:56:39.197869+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnFf0hjrqNNjdGBdk"], "accumulated_threat_level": 5.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "6c170643-cd3f-4f50-892b-f09c3d9545b8", "DetectTime": "2024-05-21T12:56:39.450569+00:00", "EventTime": "2024-05-21T12:56:39.450592+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaIOcE3unUY26rno8e"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "d7bbf36d-ccc0-4319-bcd9-ac63891cb955", "DetectTime": "2024-05-21T12:56:39.505678+00:00", "EventTime": "2024-05-21T12:56:39.505696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJQkQD46eraETGvzp6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "e4dfbca4-7d1a-4e77-878d-ec90d20183db", "DetectTime": "2024-05-21T12:56:39.558810+00:00", "EventTime": "2024-05-21T12:56:39.558837+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mQgM11nJCRsQN4ka"], "accumulated_threat_level": 7.199999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "e653d641-52bb-4919-a0b1-a91da93f36be", "DetectTime": "2024-05-21T12:56:39.574458+00:00", "EventTime": "2024-05-21T12:56:39.574480+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.140.158.40"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. AS: ROSTELECOM-AS, RU AS12389 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CumEXlWATaqfM0547"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "3ad89cfe-fcd4-413e-866f-eaeaf7f5c568", "DetectTime": "2024-05-21T12:56:39.589529+00:00", "EventTime": "2024-05-21T12:56:39.589548+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.140.158.40"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.140.158.40 from 10.0.2.19. AS: ROSTELECOM-AS, RU AS12389 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CumEXlWATaqfM0547"], "accumulated_threat_level": 3.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "425d2ccc-73ec-42af-b8b3-3d830ece6a36", "DetectTime": "2024-05-21T12:56:39.705049+00:00", "EventTime": "2024-05-21T12:56:39.705067+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtREm1slYVdwz9oJ4"], "accumulated_threat_level": 7.999999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "30722b9f-fabf-4894-a412-11da9e7f758e", "DetectTime": "2024-05-21T12:56:39.761580+00:00", "EventTime": "2024-05-21T12:56:39.761600+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgzOM130ghXXACSohd"], "accumulated_threat_level": 8.799999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "79b03fc3-ce40-4e24-a240-2e46cd1da515", "DetectTime": "2024-05-21T12:56:39.817544+00:00", "EventTime": "2024-05-21T12:56:39.817568+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGZA71F8IdteEwQgb"], "accumulated_threat_level": 9.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "3244cd9b-05d1-4439-be12-f2eaf7d7c8b3", "DetectTime": "2024-05-21T12:56:39.890135+00:00", "EventTime": "2024-05-21T12:56:39.890169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clni6r2NTdTiyuUJSh"], "accumulated_threat_level": 10.4, "timewindow": 202} +{"Format": "IDEA0", "ID": "d20c1c85-144a-41ef-a7ea-29583cdf36a6", "DetectTime": "2024-05-21T12:56:40.200766+00:00", "EventTime": "2024-05-21T12:56:40.200785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNa54d3NpyNh8iEaBi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "31e067a3-8722-4c06-8d22-7cd6cc51a11f", "DetectTime": "2024-05-21T12:56:40.274102+00:00", "EventTime": "2024-05-21T12:56:40.274120+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8usNy3naWbia1tgZe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 202} +{"Format": "IDEA0", "ID": "a715af47-d502-4adf-abf0-eb4ac8334a5e", "DetectTime": "2024-05-21T12:56:40.323168+00:00", "EventTime": "2024-05-21T12:56:40.323189+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMmv73jk1hTI9vZD4"], "accumulated_threat_level": 12.000000000000002, "timewindow": 202} +{"Format": "Json", "ID": "a715af47-d502-4adf-abf0-eb4ac8334a5e", "DetectTime": "2024-05-21T12:56:40.323168+00:00", "EventTime": "2024-05-21T12:56:40.323189+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "1970-01-09T09:44:15.479081+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2024/05/21 12:56:40.490873)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 202, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f9d34a4b-0a0d-436e-ba29-65f9edb48ea0", "DetectTime": "2024-05-21T12:56:40.501209+00:00", "EventTime": "2024-05-21T12:56:40.501228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYtQB11yQrhYy6xVb"], "accumulated_threat_level": 0.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "ef34b6ad-6ce4-41c7-8ebe-0779b05e9c24", "DetectTime": "2024-05-21T12:56:40.511312+00:00", "EventTime": "2024-05-21T12:56:40.511330+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdCQS3rb9simp54zg"], "accumulated_threat_level": 1.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "ddce834a-d048-46c0-8d68-571bdec186f0", "DetectTime": "2024-05-21T12:56:40.521625+00:00", "EventTime": "2024-05-21T12:56:40.521643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cflrjk4qyWGwzkiyAg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 202} +{"Format": "IDEA0", "ID": "1ce2c567-2e77-4ab9-b111-6804cad201c0", "DetectTime": "2024-05-21T12:56:40.532336+00:00", "EventTime": "2024-05-21T12:56:40.532354+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZEoa36m3km060gOk"], "accumulated_threat_level": 3.2, "timewindow": 202} +{"Format": "IDEA0", "ID": "7ccee0c3-1ee1-44e1-b08b-d0b0025bcb5b", "DetectTime": "2024-05-21T12:56:40.817965+00:00", "EventTime": "2024-05-21T12:56:40.817982+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNAZuq1Nr0fwIDUIS2"], "accumulated_threat_level": 4.0, "timewindow": 202} +{"Format": "IDEA0", "ID": "1bcf4923-47ab-438a-9708-2aaf8e2b9ea1", "DetectTime": "2024-05-21T12:56:40.867471+00:00", "EventTime": "2024-05-21T12:56:40.867504+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7T6E20UGWHBt6foa"], "accumulated_threat_level": 4.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "70fd231a-2f49-4123-8ac7-ba5aefd14c46", "DetectTime": "2024-05-21T12:56:40.931679+00:00", "EventTime": "2024-05-21T12:56:40.931717+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWG5Xj3j8EMs1IqGF3"], "accumulated_threat_level": 5.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "815d4c09-5fad-44ba-9ffe-c08039d0d8a5", "DetectTime": "2024-05-21T12:56:40.975932+00:00", "EventTime": "2024-05-21T12:56:40.975957+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czfab42491o0Nm5MB9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "57f1cdb6-2a2d-46f0-9ac1-2b872df69ecd", "DetectTime": "2024-05-21T12:56:41.028763+00:00", "EventTime": "2024-05-21T12:56:41.028792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CoxdpK3D4nx8qqBm9h"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "e6782e96-c16d-4b3f-953e-1a51f3975d69", "DetectTime": "2024-05-21T12:56:41.296902+00:00", "EventTime": "2024-05-21T12:56:41.296923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7S3bb1XforPIi3Dzf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "24973d0f-7d73-435f-8758-8551d23c091b", "DetectTime": "2024-05-21T12:56:41.351315+00:00", "EventTime": "2024-05-21T12:56:41.351334+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQsro2Ac91jKFplOc"], "accumulated_threat_level": 7.999999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "f781197f-df77-4ac5-b215-9cb612a080ee", "DetectTime": "2024-05-21T12:56:41.404180+00:00", "EventTime": "2024-05-21T12:56:41.404200+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHJbT1FZZ71s2pt7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 202} +{"Format": "IDEA0", "ID": "4a227788-d248-4793-9bdf-4523066e83d8", "DetectTime": "2024-05-21T12:56:41.458702+00:00", "EventTime": "2024-05-21T12:56:41.458722+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MqqX3zRH8Orc0Al1"], "accumulated_threat_level": 9.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "14a3f037-8b69-41ce-854b-89c0998b3b7d", "DetectTime": "2024-05-21T12:56:41.516730+00:00", "EventTime": "2024-05-21T12:56:41.516749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fApb27SGaEVXJ7"], "accumulated_threat_level": 10.4, "timewindow": 202} +{"Format": "IDEA0", "ID": "d4f72ee0-f028-49f1-8eae-22c31ec491ea", "DetectTime": "2024-05-21T12:56:41.581549+00:00", "EventTime": "2024-05-21T12:56:41.581570+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdvOfo48JUoR74CF3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 202} +{"Format": "IDEA0", "ID": "933abaf3-f4de-43d1-aff5-748ad8439d11", "DetectTime": "2024-05-21T12:56:41.847465+00:00", "EventTime": "2024-05-21T12:56:41.847486+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnPG61EbnXjWqG4Y2"], "accumulated_threat_level": 12.000000000000002, "timewindow": 202} +{"Format": "Json", "ID": "933abaf3-f4de-43d1-aff5-748ad8439d11", "DetectTime": "2024-05-21T12:56:41.847465+00:00", "EventTime": "2024-05-21T12:56:41.847486+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "1970-01-09T09:44:38.939774+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 202. (real time 2024/05/21 12:56:42.057236)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 202, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a4aed191-100a-4045-8700-ca61f2593ad2", "DetectTime": "2024-05-21T12:56:42.063091+00:00", "EventTime": "2024-05-21T12:56:42.063113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKqjOz1no3StBpDra5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "ec6e2312-1bb0-435f-950e-56feec3c9d7c", "DetectTime": "2024-05-21T12:56:42.075289+00:00", "EventTime": "2024-05-21T12:56:42.075319+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLXR84fAc4thha6zb"], "accumulated_threat_level": 0.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "fc0b268a-00c1-48ce-b918-ab6a4e3bd3b5", "DetectTime": "2024-05-21T12:56:42.089202+00:00", "EventTime": "2024-05-21T12:56:42.089232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztaGH38Cz5MBusWwc"], "accumulated_threat_level": 1.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "f5b80abb-ac83-4467-aea3-6c0a4c919a0d", "DetectTime": "2024-05-21T12:56:42.103603+00:00", "EventTime": "2024-05-21T12:56:42.103637+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C77NUX3ANkcI7BKu1d"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 202} +{"Format": "IDEA0", "ID": "9697f177-c431-48b3-9d82-9f022cfa33fc", "DetectTime": "2024-05-21T12:56:42.120980+00:00", "EventTime": "2024-05-21T12:56:42.121021+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8LMsc2Ct1ZSslDv23"], "accumulated_threat_level": 3.2, "timewindow": 202} +{"Format": "IDEA0", "ID": "90702370-7d36-40d4-bdd4-46e290d75160", "DetectTime": "2024-05-21T12:56:42.418728+00:00", "EventTime": "2024-05-21T12:56:42.418749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9303p170xnuUlkaCc"], "accumulated_threat_level": 4.0, "timewindow": 202} +{"Format": "IDEA0", "ID": "8b4e60ee-a4c9-426e-b2c2-da1c39f13354", "DetectTime": "2024-05-21T12:56:42.480314+00:00", "EventTime": "2024-05-21T12:56:42.480331+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnQnu1elaDOPgz4E5"], "accumulated_threat_level": 4.8, "timewindow": 202} +{"Format": "IDEA0", "ID": "c0947b23-7b90-4f51-b2e7-36942bfe4510", "DetectTime": "2024-05-21T12:56:42.534379+00:00", "EventTime": "2024-05-21T12:56:42.534398+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwYWD27Tzi48sntnl"], "accumulated_threat_level": 5.6, "timewindow": 202} +{"Format": "IDEA0", "ID": "24a0268e-150f-4afe-941a-c06367f957db", "DetectTime": "2024-05-21T12:56:42.682105+00:00", "EventTime": "2024-05-21T12:56:42.682123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo7FF2FOtHCoh4046"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "ab034d32-53cf-43d7-83a9-98589e6901cf", "DetectTime": "2024-05-21T12:56:42.758361+00:00", "EventTime": "2024-05-21T12:56:42.758381+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwukPb3PGKMwnxe5y8"], "accumulated_threat_level": 0.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "51589ab6-0991-4ae0-b1cb-bd8a9fbfab2b", "DetectTime": "2024-05-21T12:56:43.032292+00:00", "EventTime": "2024-05-21T12:56:43.032316+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQg2QQ2VFY26csU9hk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "47577ab6-0b4d-4b3f-888d-0ee30d7bdad0", "DetectTime": "2024-05-21T12:56:43.112010+00:00", "EventTime": "2024-05-21T12:56:43.112042+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpbFe4dt5TsGLB2ha"], "accumulated_threat_level": 1.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "e03e3d18-c5bb-4036-a136-5d9d9920bd96", "DetectTime": "2024-05-21T12:56:43.167837+00:00", "EventTime": "2024-05-21T12:56:43.167874+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSVMy4dqCFeasTVC8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 203} +{"Format": "IDEA0", "ID": "7473169e-2ada-4d68-8e96-4aaf5dfa38bf", "DetectTime": "2024-05-21T12:56:43.223536+00:00", "EventTime": "2024-05-21T12:56:43.223572+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ak1v4lmenVOyGWJ8"], "accumulated_threat_level": 3.2, "timewindow": 203} +{"Format": "IDEA0", "ID": "33352eb1-b607-4dba-8274-8853b4fa26a9", "DetectTime": "2024-05-21T12:56:43.286117+00:00", "EventTime": "2024-05-21T12:56:43.286155+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLDal4RfBRGiZLE78"], "accumulated_threat_level": 4.0, "timewindow": 203} +{"Format": "IDEA0", "ID": "15fed04b-e079-4f84-b95f-e655cd951b75", "DetectTime": "2024-05-21T12:56:43.345017+00:00", "EventTime": "2024-05-21T12:56:43.345054+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRfQQb1BvtNBibuANf"], "accumulated_threat_level": 4.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "c961d9e8-1622-4a57-a6cb-7634c75c0e30", "DetectTime": "2024-05-21T12:56:43.602732+00:00", "EventTime": "2024-05-21T12:56:43.602754+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnicX24ytABlgkgRah"], "accumulated_threat_level": 5.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "16ed243e-2517-42fd-a744-569208ad3efa", "DetectTime": "2024-05-21T12:56:43.659842+00:00", "EventTime": "2024-05-21T12:56:43.659861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuL33c3dEKVUql5wMg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 203} +{"Format": "IDEA0", "ID": "984d4d1b-1947-45b7-82a8-4d8a85446bd4", "DetectTime": "2024-05-21T12:56:43.712661+00:00", "EventTime": "2024-05-21T12:56:43.712679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7cBpE2fKXyAzVW73i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "a274b973-60fc-4f5f-a041-93f38b9bcb09", "DetectTime": "2024-05-21T12:56:43.777397+00:00", "EventTime": "2024-05-21T12:56:43.777420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce2nu02QZybV4C1781"], "accumulated_threat_level": 7.999999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "d1d2d224-c7c5-4688-b525-a9fcd47e9a55", "DetectTime": "2024-05-21T12:56:43.819249+00:00", "EventTime": "2024-05-21T12:56:43.819267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifYpIr2Zra0Yvtr7"], "accumulated_threat_level": 8.799999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "93ace249-d614-4aa0-b288-e9a34c9b9581", "DetectTime": "2024-05-21T12:56:43.871481+00:00", "EventTime": "2024-05-21T12:56:43.871503+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJk4e1pWLCIjiZSr5"], "accumulated_threat_level": 9.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "b501a542-c989-4972-91da-cc4a0c7799cc", "DetectTime": "2024-05-21T12:56:44.183644+00:00", "EventTime": "2024-05-21T12:56:44.183665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C453YO3ZfMO5252Iec"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "02c46a67-031b-4800-8c89-c50fe0f28302", "DetectTime": "2024-05-21T12:56:44.241477+00:00", "EventTime": "2024-05-21T12:56:44.241514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmvjAW2h7oS5Aqn9Tb"], "accumulated_threat_level": 10.4, "timewindow": 203} +{"Format": "IDEA0", "ID": "212e66a3-7406-4b52-a4f2-e23500fcedc6", "DetectTime": "2024-05-21T12:56:44.294031+00:00", "EventTime": "2024-05-21T12:56:44.294049+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgdCj87Tp7MQWoyf"], "accumulated_threat_level": 11.200000000000001, "timewindow": 203} +{"Format": "IDEA0", "ID": "83df4b97-7e84-4a69-9467-f0f5e7aa6bbf", "DetectTime": "2024-05-21T12:56:44.347195+00:00", "EventTime": "2024-05-21T12:56:44.347218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM2KJG3V7YsDft4yCi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 203} +{"Format": "Json", "ID": "83df4b97-7e84-4a69-9467-f0f5e7aa6bbf", "DetectTime": "2024-05-21T12:56:44.347195+00:00", "EventTime": "2024-05-21T12:56:44.347218+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-09T10:14:48.886013+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2024/05/21 12:56:44.512093)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 203, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "7171caf1-e690-458c-8fdc-84db508aa3ca", "DetectTime": "2024-05-21T12:56:44.525393+00:00", "EventTime": "2024-05-21T12:56:44.525420+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFinb4YaS7qpmxKge"], "accumulated_threat_level": 0.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "edb1100d-875f-4e5c-a071-f4c963bd6fd7", "DetectTime": "2024-05-21T12:56:44.538262+00:00", "EventTime": "2024-05-21T12:56:44.538285+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYGU7s9xSbBozzP9"], "accumulated_threat_level": 1.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "dcc377da-2631-4ad9-836a-30394bd6982d", "DetectTime": "2024-05-21T12:56:44.549357+00:00", "EventTime": "2024-05-21T12:56:44.549380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1QNv4WBSPUTsVn3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 203} +{"Format": "IDEA0", "ID": "5ece725a-a829-4b11-8af8-f6046e9bcf64", "DetectTime": "2024-05-21T12:56:44.561635+00:00", "EventTime": "2024-05-21T12:56:44.561670+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgw87F2iwM97p43Xy1"], "accumulated_threat_level": 3.2, "timewindow": 203} +{"Format": "IDEA0", "ID": "10d03c0c-0221-4f44-bc50-88de5e0f2e51", "DetectTime": "2024-05-21T12:56:44.827396+00:00", "EventTime": "2024-05-21T12:56:44.827417+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9WbKj1KziGPBRy0L5"], "accumulated_threat_level": 4.0, "timewindow": 203} +{"Format": "IDEA0", "ID": "662105e5-755c-4225-be98-d59fcfec01d0", "DetectTime": "2024-05-21T12:56:44.878832+00:00", "EventTime": "2024-05-21T12:56:44.878852+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOIfc4LbnDHSW5V5"], "accumulated_threat_level": 4.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "d1f5967d-45ac-4cfa-ab07-644203b09323", "DetectTime": "2024-05-21T12:56:44.935871+00:00", "EventTime": "2024-05-21T12:56:44.935905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwowC2v33neAgNNCh"], "accumulated_threat_level": 5.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "a9726fd2-f351-45d2-b90a-27e726a02a4d", "DetectTime": "2024-05-21T12:56:44.995127+00:00", "EventTime": "2024-05-21T12:56:44.995181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcklwzKBDSZxjPl95"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 203} +{"Format": "IDEA0", "ID": "a407993a-048c-4770-8731-694fb41d3d4d", "DetectTime": "2024-05-21T12:56:45.045851+00:00", "EventTime": "2024-05-21T12:56:45.045887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EPS02c1FrVzmFo2g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "d44b1858-58b6-421c-a61e-65e9432d5669", "DetectTime": "2024-05-21T12:56:45.105430+00:00", "EventTime": "2024-05-21T12:56:45.105459+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cla1FL106IKfYi7vW9"], "accumulated_threat_level": 7.999999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "22016256-2763-40aa-8170-88dc0e52cac6", "DetectTime": "2024-05-21T12:56:45.152737+00:00", "EventTime": "2024-05-21T12:56:45.152764+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8BTO3AMN1933Ttv"], "accumulated_threat_level": 8.799999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "6d3bb007-7cf0-4089-a4e7-ab90e0cb3573", "DetectTime": "2024-05-21T12:56:45.209007+00:00", "EventTime": "2024-05-21T12:56:45.209044+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpoVGL3s9noAxzJRpf"], "accumulated_threat_level": 9.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "54580c53-5a90-433f-9dfb-92a959ffedf8", "DetectTime": "2024-05-21T12:56:45.553857+00:00", "EventTime": "2024-05-21T12:56:45.553879+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZQCVC1Q5fusYWQU91"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "6a744d76-8e2e-47ca-8361-881d39552576", "DetectTime": "2024-05-21T12:56:45.597906+00:00", "EventTime": "2024-05-21T12:56:45.597927+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["78.139.188.50"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS20771 rDNS: host-78-139-188-50.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqzr237sOVeMuXTd5"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "091b8203-f0bd-4ca2-a51c-efe6931d2d9b", "DetectTime": "2024-05-21T12:56:45.612152+00:00", "EventTime": "2024-05-21T12:56:45.612170+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["78.139.188.50"]}], "Attach": [{"Content": "connection to blacklisted IP: 78.139.188.50 from 10.0.2.19. AS: CAUCASUS-CABLE-SYSTEM CCS Autonomous System, GE AS20771 rDNS: host-78-139-188-50.customer.magticom.ge Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGqzr237sOVeMuXTd5"], "accumulated_threat_level": 4.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "6de12d22-050c-47e4-a56b-1a42ab3157da", "DetectTime": "2024-05-21T12:56:45.623898+00:00", "EventTime": "2024-05-21T12:56:45.623916+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fQmFTTTYep9vOea"], "accumulated_threat_level": 10.4, "timewindow": 203} +{"Format": "IDEA0", "ID": "fbf0bef0-744c-41b3-b5fc-10cc99232a11", "DetectTime": "2024-05-21T12:56:45.640143+00:00", "EventTime": "2024-05-21T12:56:45.640161+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cla3Wd30IzVjwEiDW9"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "f9c358e0-bf9a-48d2-8a66-daf61124dc75", "DetectTime": "2024-05-21T12:56:45.653549+00:00", "EventTime": "2024-05-21T12:56:45.653574+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cla3Wd30IzVjwEiDW9"], "accumulated_threat_level": 4.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "742d10d7-79d5-4a7d-aba1-2a972a60a745", "DetectTime": "2024-05-21T12:56:45.699235+00:00", "EventTime": "2024-05-21T12:56:45.699258+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcV4in3N4772fSF9kc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 203} +{"Format": "IDEA0", "ID": "8bea97fe-b2e1-4be7-9505-4bdd94a6a3a4", "DetectTime": "2024-05-21T12:56:45.753182+00:00", "EventTime": "2024-05-21T12:56:45.753203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwbag43VoXhzMM7rG5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 203} +{"Format": "Json", "ID": "8bea97fe-b2e1-4be7-9505-4bdd94a6a3a4", "DetectTime": "2024-05-21T12:56:45.753182+00:00", "EventTime": "2024-05-21T12:56:45.753203+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-09T10:45:03.391266+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2024/05/21 12:56:45.913942)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 203, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "819137c3-6df1-4ca2-8b63-beb24ef84f0c", "DetectTime": "2024-05-21T12:56:45.932609+00:00", "EventTime": "2024-05-21T12:56:45.932647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwu5XD4YoFaXCZbIMd"], "accumulated_threat_level": 0.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "43d8dc4a-004c-409c-962e-c67ec1f34c95", "DetectTime": "2024-05-21T12:56:45.945701+00:00", "EventTime": "2024-05-21T12:56:45.945738+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CljjDh2prR3SOXOlee"], "accumulated_threat_level": 1.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "b1dd365a-754a-464d-a36a-741989e562b7", "DetectTime": "2024-05-21T12:56:45.958695+00:00", "EventTime": "2024-05-21T12:56:45.958728+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3BBT2eKgImFIilw3"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 203} +{"Format": "IDEA0", "ID": "6e4536a9-c47f-47ed-8923-752270aa787c", "DetectTime": "2024-05-21T12:56:45.974129+00:00", "EventTime": "2024-05-21T12:56:45.974153+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDn2n47v9PZImHr05"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "8825e872-22fa-4266-a18f-14050b2f1df0", "DetectTime": "2024-05-21T12:56:45.989674+00:00", "EventTime": "2024-05-21T12:56:45.989711+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCDn2n47v9PZImHr05"], "accumulated_threat_level": 5.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "7480087c-5dac-4a87-b59a-25ed76a2a8f4", "DetectTime": "2024-05-21T12:56:46.003588+00:00", "EventTime": "2024-05-21T12:56:46.003625+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chvg024vXi99V4UyFh"], "accumulated_threat_level": 3.2, "timewindow": 203} +{"Format": "IDEA0", "ID": "b23a3840-824a-40e3-a27e-85d88c793ba4", "DetectTime": "2024-05-21T12:56:46.254851+00:00", "EventTime": "2024-05-21T12:56:46.254885+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2uSU3JeegCgts9d1"], "accumulated_threat_level": 4.0, "timewindow": 203} +{"Format": "IDEA0", "ID": "6bdda390-1e7d-4ae4-bcc0-7c420ebb2da9", "DetectTime": "2024-05-21T12:56:46.307668+00:00", "EventTime": "2024-05-21T12:56:46.307706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHnn2u3lJtV0p7dnY4"], "accumulated_threat_level": 4.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "af107fba-f6a9-4b3d-ad1e-befd22f79d87", "DetectTime": "2024-05-21T12:56:46.323314+00:00", "EventTime": "2024-05-21T12:56:46.323340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVLl5NHKmR37Vj78"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "af4e397e-b65c-4d4c-87b7-79ddc1724bea", "DetectTime": "2024-05-21T12:56:46.337547+00:00", "EventTime": "2024-05-21T12:56:46.337580+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIVLl5NHKmR37Vj78"], "accumulated_threat_level": 5.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "5c4f5c34-1806-4691-a81e-fe24fb1c7ee0", "DetectTime": "2024-05-21T12:56:46.356575+00:00", "EventTime": "2024-05-21T12:56:46.356598+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzGVw9sfTAOP9GU4"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "bc8bb385-028e-4eef-8be3-6b0d06e7acec", "DetectTime": "2024-05-21T12:56:46.371848+00:00", "EventTime": "2024-05-21T12:56:46.371887+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMzGVw9sfTAOP9GU4"], "accumulated_threat_level": 6.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "b95b25c5-7ab7-4034-9730-1ff398bf9be4", "DetectTime": "2024-05-21T12:56:46.385908+00:00", "EventTime": "2024-05-21T12:56:46.385953+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSf8I1K3MUMGdspba"], "accumulated_threat_level": 5.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "4e19b06c-b5ae-4152-b484-82a6aad00101", "DetectTime": "2024-05-21T12:56:46.401551+00:00", "EventTime": "2024-05-21T12:56:46.401571+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq79T1iLw4G0Adaog"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "11ba6ccf-e735-4b0b-b674-6ef7a7dd8e39", "DetectTime": "2024-05-21T12:56:46.415060+00:00", "EventTime": "2024-05-21T12:56:46.415083+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Crq79T1iLw4G0Adaog"], "accumulated_threat_level": 6.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3b3ffc3c-4424-4a7a-a2a3-7e4879b0cbf8", "DetectTime": "2024-05-21T12:56:46.428376+00:00", "EventTime": "2024-05-21T12:56:46.428409+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7a2484opZSribxYc6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 203} +{"Format": "IDEA0", "ID": "62ecc6aa-2040-4337-9b6f-531003ea90d2", "DetectTime": "2024-05-21T12:56:46.443146+00:00", "EventTime": "2024-05-21T12:56:46.443167+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy06w3cxQ7LzUbs66"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "b09da27b-3c92-4c7a-9366-0dce7d8eb18e", "DetectTime": "2024-05-21T12:56:46.458544+00:00", "EventTime": "2024-05-21T12:56:46.458563+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy06w3cxQ7LzUbs66"], "accumulated_threat_level": 7.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "84db1fff-a8d3-4f44-a053-ca68f95e7487", "DetectTime": "2024-05-21T12:56:46.669839+00:00", "EventTime": "2024-05-21T12:56:46.669857+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpZTOe3qLuWAurdzol"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "586c6d55-ec4a-471c-9639-377bd4d144d3", "DetectTime": "2024-05-21T12:56:46.693761+00:00", "EventTime": "2024-05-21T12:56:46.693780+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcqdRe1Uap2krNvZl5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "88c4bf6a-a26e-4754-bfb4-bcc9c14af567", "DetectTime": "2024-05-21T12:56:46.711322+00:00", "EventTime": "2024-05-21T12:56:46.711340+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZigZ3xc1JVS3mJwb"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "ce98db9f-db61-495e-a52b-f7c27acc162b", "DetectTime": "2024-05-21T12:56:46.723870+00:00", "EventTime": "2024-05-21T12:56:46.723893+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2ONS3RRTwaabZC7f"], "accumulated_threat_level": 7.999999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "015cc7b3-063e-432f-88b1-3334e5d5b83b", "DetectTime": "2024-05-21T12:56:46.737001+00:00", "EventTime": "2024-05-21T12:56:46.737020+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNZigZ3xc1JVS3mJwb"], "accumulated_threat_level": 7.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "a37d49d9-3a74-41b6-aad5-f74b95696f93", "DetectTime": "2024-05-21T12:56:46.749912+00:00", "EventTime": "2024-05-21T12:56:46.749930+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWIU9391HoDOprZA1"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "1bca76d9-3ac3-4903-9647-1e6ae176e77d", "DetectTime": "2024-05-21T12:56:46.762607+00:00", "EventTime": "2024-05-21T12:56:46.762625+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAWIU9391HoDOprZA1"], "accumulated_threat_level": 8.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "ea82f16a-2cd3-4c1c-9267-27d23a2d3e79", "DetectTime": "2024-05-21T12:56:46.876901+00:00", "EventTime": "2024-05-21T12:56:46.876922+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1mu62Nwew6c0BPmh"], "accumulated_threat_level": 8.799999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "bb6a381b-32da-4c3d-8121-97fddfd6711d", "DetectTime": "2024-05-21T12:56:46.933228+00:00", "EventTime": "2024-05-21T12:56:46.933246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFnsi3f2llrrXIyNk"], "accumulated_threat_level": 9.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "74eae69c-8ad2-4e3d-b8a9-eb19303af644", "DetectTime": "2024-05-21T12:56:46.977139+00:00", "EventTime": "2024-05-21T12:56:46.977157+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQ7eo2cXLr8ci7xi"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "c15d906b-1555-4445-9a69-a5507b0589b5", "DetectTime": "2024-05-21T12:56:46.996228+00:00", "EventTime": "2024-05-21T12:56:46.996255+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjQ7eo2cXLr8ci7xi"], "accumulated_threat_level": 8.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "e510cd21-2339-4da1-9faf-399b1b5ce4e3", "DetectTime": "2024-05-21T12:56:47.011030+00:00", "EventTime": "2024-05-21T12:56:47.011053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9R5z3pNw8n77Slid"], "accumulated_threat_level": 10.4, "timewindow": 203} +{"Format": "IDEA0", "ID": "be686e8d-d73f-4b77-a9a8-d38e3c673c10", "DetectTime": "2024-05-21T12:56:47.033292+00:00", "EventTime": "2024-05-21T12:56:47.033310+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cWUm4j1YG6BsFWka"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "e86a24c8-30af-4aba-bf2d-395e902cc4f5", "DetectTime": "2024-05-21T12:56:47.050934+00:00", "EventTime": "2024-05-21T12:56:47.050968+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1cWUm4j1YG6BsFWka"], "accumulated_threat_level": 9.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "bbcae6bf-acae-4ab6-843e-6b3fb955f892", "DetectTime": "2024-05-21T12:56:47.066747+00:00", "EventTime": "2024-05-21T12:56:47.066788+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChOafR1OwYewJNUnl9"], "accumulated_threat_level": 11.200000000000001, "timewindow": 203} +{"Format": "IDEA0", "ID": "4c015a53-f941-4c0c-b2fe-d8839ec7d846", "DetectTime": "2024-05-21T12:56:47.123851+00:00", "EventTime": "2024-05-21T12:56:47.123892+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpAgE34psPtl4jOvAh"], "accumulated_threat_level": 12.000000000000002, "timewindow": 203} +{"Format": "Json", "ID": "4c015a53-f941-4c0c-b2fe-d8839ec7d846", "DetectTime": "2024-05-21T12:56:47.123851+00:00", "EventTime": "2024-05-21T12:56:47.123892+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "1970-01-09T10:45:07.322356+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 203. (real time 2024/05/21 12:56:47.334289)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 203, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "8ee62d95-149a-4368-bed2-3ec915bee4fd", "DetectTime": "2024-05-21T12:56:47.345578+00:00", "EventTime": "2024-05-21T12:56:47.345604+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnaFg01KtKPD289mPk"], "accumulated_threat_level": 0.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "a5224732-61ce-41be-b1f9-6772eeca84bb", "DetectTime": "2024-05-21T12:56:47.359748+00:00", "EventTime": "2024-05-21T12:56:47.359785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCcR32YsiCmkWbHBl"], "accumulated_threat_level": 1.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "4d919315-80fd-42af-866e-cf99cd1e322d", "DetectTime": "2024-05-21T12:56:47.374210+00:00", "EventTime": "2024-05-21T12:56:47.374231+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3024Y1dBn7gVPHLN2"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "78c17955-a372-456d-aefe-487cd7c2e7ba", "DetectTime": "2024-05-21T12:56:47.388958+00:00", "EventTime": "2024-05-21T12:56:47.388993+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3024Y1dBn7gVPHLN2"], "accumulated_threat_level": 9.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "ae009c57-6710-4b56-b930-890985cc9bf0", "DetectTime": "2024-05-21T12:56:47.403109+00:00", "EventTime": "2024-05-21T12:56:47.403129+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb2vsn4nLg5tL28bBd"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "b3ecb06a-83cc-4216-814d-e58ddbb7774d", "DetectTime": "2024-05-21T12:56:47.416767+00:00", "EventTime": "2024-05-21T12:56:47.416797+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb2vsn4nLg5tL28bBd"], "accumulated_threat_level": 10.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "75302a96-03f0-40e4-a8c5-bccee4e24a53", "DetectTime": "2024-05-21T12:56:47.528833+00:00", "EventTime": "2024-05-21T12:56:47.528875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLFNkf3SA2ii94ZsT8"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 203} +{"Format": "IDEA0", "ID": "5e2a95f4-b22d-4e53-a5bb-3c8b50b33aeb", "DetectTime": "2024-05-21T12:56:47.578361+00:00", "EventTime": "2024-05-21T12:56:47.578397+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPNuW13mVT6aKCFlG1"], "accumulated_threat_level": 3.2, "timewindow": 203} +{"Format": "IDEA0", "ID": "c2e54c93-c99d-4cce-b453-85e245728b9c", "DetectTime": "2024-05-21T12:56:47.633551+00:00", "EventTime": "2024-05-21T12:56:47.633584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgDiAr1Y6KWgQir3d2"], "accumulated_threat_level": 4.0, "timewindow": 203} +{"Format": "IDEA0", "ID": "691b4fc2-23c9-43f4-bb7c-f9ada8b529a9", "DetectTime": "2024-05-21T12:56:47.762592+00:00", "EventTime": "2024-05-21T12:56:47.762614+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhcUV3GbuPJ3pKjrf"], "accumulated_threat_level": 4.8, "timewindow": 203} +{"Format": "IDEA0", "ID": "34055444-c63e-41fb-b3e6-2216adf6c334", "DetectTime": "2024-05-21T12:56:47.811990+00:00", "EventTime": "2024-05-21T12:56:47.812009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBYj2Pp2WYGmZtd8d"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "a17bd2be-78eb-40cb-9c76-013c162f5d0f", "DetectTime": "2024-05-21T12:56:47.856647+00:00", "EventTime": "2024-05-21T12:56:47.856668+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7knp2I0PueEi0PHa"], "accumulated_threat_level": 5.6, "timewindow": 203} +{"Format": "IDEA0", "ID": "e5289912-1150-47b2-9908-2887d23c9779", "DetectTime": "2024-05-21T12:56:47.913356+00:00", "EventTime": "2024-05-21T12:56:47.913375+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMRFe12Kf7MZ0hQ52"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 203} +{"Format": "IDEA0", "ID": "8a89953a-d02e-432a-ab21-98bf3c08b393", "DetectTime": "2024-05-21T12:56:48.153274+00:00", "EventTime": "2024-05-21T12:56:48.153308+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3bO8C2LHysxr3Kiq6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "4fcab56f-74a5-45f9-a331-60351f606b66", "DetectTime": "2024-05-21T12:56:48.243726+00:00", "EventTime": "2024-05-21T12:56:48.243751+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClURXJ1OJWysevjqc1"], "accumulated_threat_level": 0.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "eae4f4b1-7820-438c-8159-2b092f84344a", "DetectTime": "2024-05-21T12:56:48.305825+00:00", "EventTime": "2024-05-21T12:56:48.305846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cic5cv4GmOlrG9Xwfb"], "accumulated_threat_level": 1.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "bed3d654-7831-40d4-a628-c410ea82a640", "DetectTime": "2024-05-21T12:56:48.357819+00:00", "EventTime": "2024-05-21T12:56:48.357855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C91h6q1eT0rxCbzNCd"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 204} +{"Format": "IDEA0", "ID": "344379ce-c28a-4f0b-a34a-f8f1c696bd20", "DetectTime": "2024-05-21T12:56:48.416468+00:00", "EventTime": "2024-05-21T12:56:48.416492+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMyMc3bm8c3XuPtSf"], "accumulated_threat_level": 3.2, "timewindow": 204} +{"Format": "IDEA0", "ID": "e0bf7b89-5512-4250-99ad-c0722b6a0026", "DetectTime": "2024-05-21T12:56:48.463943+00:00", "EventTime": "2024-05-21T12:56:48.463962+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHJ8LEypAW0DSWZh"], "accumulated_threat_level": 4.0, "timewindow": 204} +{"Format": "IDEA0", "ID": "469b948d-0526-4c3b-9779-e6362531c12d", "DetectTime": "2024-05-21T12:56:48.717127+00:00", "EventTime": "2024-05-21T12:56:48.717147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjrfQ3LHAOYYnHx68"], "accumulated_threat_level": 4.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "0f2dad0d-d75e-4f85-8aab-05df5b7dc87b", "DetectTime": "2024-05-21T12:56:48.768765+00:00", "EventTime": "2024-05-21T12:56:48.768786+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKch22LuZtwdfziKb"], "accumulated_threat_level": 5.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "97b6d8c6-f7cc-48c5-8ed9-a9737912b853", "DetectTime": "2024-05-21T12:56:48.820336+00:00", "EventTime": "2024-05-21T12:56:48.820355+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBZWy2wAA6B5iFzdl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 204} +{"Format": "IDEA0", "ID": "a83e675e-49ce-4de2-aab2-db8784ac2a81", "DetectTime": "2024-05-21T12:56:48.876129+00:00", "EventTime": "2024-05-21T12:56:48.876147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQDWD47D3RvgxSzc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "cef52b0d-9119-4ac9-bc2e-b456318832cc", "DetectTime": "2024-05-21T12:56:48.928599+00:00", "EventTime": "2024-05-21T12:56:48.928619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ajjL3pr8UXP2vvZ7"], "accumulated_threat_level": 7.999999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "b8baed22-6760-4d62-87f4-5cbd449e410a", "DetectTime": "2024-05-21T12:56:49.249154+00:00", "EventTime": "2024-05-21T12:56:49.249183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9yDl39Fb3UphhnWl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "bf282b56-50d4-4854-afb7-91265fc360ee", "DetectTime": "2024-05-21T12:56:49.303184+00:00", "EventTime": "2024-05-21T12:56:49.303218+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C99lxp4eloG8VX8Pck"], "accumulated_threat_level": 9.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "0ce0137e-a94c-4660-99b1-7a9f1a7d3c8a", "DetectTime": "2024-05-21T12:56:49.342462+00:00", "EventTime": "2024-05-21T12:56:49.342496+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwd3Dc1U92kIILnd9g"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "cd92a19d-4083-48f9-8642-197358adb432", "DetectTime": "2024-05-21T12:56:49.394521+00:00", "EventTime": "2024-05-21T12:56:49.394557+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ2HsE2Cp6g8V9CE0a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "8979f90a-0ddb-4e28-8b9e-14ca23d2d3b6", "DetectTime": "2024-05-21T12:56:49.451107+00:00", "EventTime": "2024-05-21T12:56:49.451126+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA7hTq4QtrjSBCMHJe"], "accumulated_threat_level": 12.000000000000002, "timewindow": 204} +{"Format": "Json", "ID": "8979f90a-0ddb-4e28-8b9e-14ca23d2d3b6", "DetectTime": "2024-05-21T12:56:49.451107+00:00", "EventTime": "2024-05-21T12:56:49.451126+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-09T11:15:34.650842+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2024/05/21 12:56:49.626676)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 204, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "a82f6bb5-4818-4e1d-862e-672dbd61ad84", "DetectTime": "2024-05-21T12:56:49.630821+00:00", "EventTime": "2024-05-21T12:56:49.630840+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBtIC32ZeCxMORHfwi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "e3e470cb-cc59-405d-a8db-9fad03080c1b", "DetectTime": "2024-05-21T12:56:49.767735+00:00", "EventTime": "2024-05-21T12:56:49.767755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C08CVY3T1K76D0taHj"], "accumulated_threat_level": 0.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "d474178b-8dad-45b3-bce7-5b8b41c6f8f0", "DetectTime": "2024-05-21T12:56:49.820447+00:00", "EventTime": "2024-05-21T12:56:49.820467+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ZDAm36BxLKqhkAzk"], "accumulated_threat_level": 1.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "7f122a54-0b68-48cc-926a-a947dadcb56a", "DetectTime": "2024-05-21T12:56:49.877379+00:00", "EventTime": "2024-05-21T12:56:49.877400+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMexFRbGRTpY2nBu5"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 204} +{"Format": "IDEA0", "ID": "f94bf7f6-fe00-4909-886e-80040ac302b7", "DetectTime": "2024-05-21T12:56:49.933057+00:00", "EventTime": "2024-05-21T12:56:49.933078+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4vGWj2ObVUbNt1q9h"], "accumulated_threat_level": 3.2, "timewindow": 204} +{"Format": "IDEA0", "ID": "89a082de-aead-492c-b179-5415d6171b89", "DetectTime": "2024-05-21T12:56:49.990082+00:00", "EventTime": "2024-05-21T12:56:49.990105+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofxILjCKWPB3YFJ4"], "accumulated_threat_level": 4.0, "timewindow": 204} +{"Format": "IDEA0", "ID": "003076e7-6570-4916-9966-547f89d68824", "DetectTime": "2024-05-21T12:56:50.293647+00:00", "EventTime": "2024-05-21T12:56:50.293679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETZCSJB22TrMw0oa"], "accumulated_threat_level": 4.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "9f6cdcc6-f5db-4a3f-b794-5169857e6066", "DetectTime": "2024-05-21T12:56:50.345265+00:00", "EventTime": "2024-05-21T12:56:50.345303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarVcu3f5VrZQkjBp8"], "accumulated_threat_level": 5.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "c5b210ee-1a5b-40fd-a7de-bf0adb0d4cc1", "DetectTime": "2024-05-21T12:56:50.400272+00:00", "EventTime": "2024-05-21T12:56:50.400311+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYJ0AbeiM5FqFNfc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 204} +{"Format": "IDEA0", "ID": "2dbc250c-70c8-4e69-b883-854605177438", "DetectTime": "2024-05-21T12:56:50.460441+00:00", "EventTime": "2024-05-21T12:56:50.460478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtQAIFq7SbYwu8nb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "2dac2285-076c-4a55-8cd3-691b9955bdcd", "DetectTime": "2024-05-21T12:56:50.515160+00:00", "EventTime": "2024-05-21T12:56:50.515195+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUriBN2TEk8y22DZn3"], "accumulated_threat_level": 7.999999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "77647e13-6075-4d6e-82a4-612e6b1eab07", "DetectTime": "2024-05-21T12:56:50.562810+00:00", "EventTime": "2024-05-21T12:56:50.562832+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvnqZ94GZBFvfAfD1"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "2a4d41b2-e886-49b2-9c84-c93cfa99b531", "DetectTime": "2024-05-21T12:56:50.578517+00:00", "EventTime": "2024-05-21T12:56:50.578547+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvnqZ94GZBFvfAfD1"], "accumulated_threat_level": 10.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "3d1cb4fd-6718-47af-92a2-bd354d9a491d", "DetectTime": "2024-05-21T12:56:50.597660+00:00", "EventTime": "2024-05-21T12:56:50.597698+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbSfJl3QymyExBqh28"], "accumulated_threat_level": 8.799999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "d2daec69-aa8a-4a45-97e9-8837aeadfa62", "DetectTime": "2024-05-21T12:56:50.687559+00:00", "EventTime": "2024-05-21T12:56:50.687580+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgS3QJ1CLhUJEJ2Jv6"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "7e824a5a-57ea-4c05-9c88-fbd13fd044b7", "DetectTime": "2024-05-21T12:56:50.703514+00:00", "EventTime": "2024-05-21T12:56:50.703550+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgS3QJ1CLhUJEJ2Jv6"], "accumulated_threat_level": 11.1, "timewindow": 45} +{"Format": "IDEA0", "ID": "35a83efd-e330-404f-992c-64e724edb9cb", "DetectTime": "2024-05-21T12:56:50.846919+00:00", "EventTime": "2024-05-21T12:56:50.846938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHhU72AmodrN6ktsk"], "accumulated_threat_level": 9.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "8b304872-abf6-4303-a634-32861227b108", "DetectTime": "2024-05-21T12:56:50.888562+00:00", "EventTime": "2024-05-21T12:56:50.888586+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq1pRq4aCZZajGpML5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "2c05b423-1dde-454b-a1ee-4d88f446e9be", "DetectTime": "2024-05-21T12:56:50.959870+00:00", "EventTime": "2024-05-21T12:56:50.959888+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadiQXHpUJNc0jTWg"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "c2cc5c39-e0ac-47a6-8859-78424114064f", "DetectTime": "2024-05-21T12:56:51.001727+00:00", "EventTime": "2024-05-21T12:56:51.001748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjlRrE36YBVgqPl4Si"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "c92a318b-869e-438e-beb5-80f2457a3160", "DetectTime": "2024-05-21T12:56:51.233523+00:00", "EventTime": "2024-05-21T12:56:51.233545+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKDJpW1esAFD7MBVrk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "40d91372-f350-4ac7-9ba1-4afbcc22f5e8", "DetectTime": "2024-05-21T12:56:51.241296+00:00", "EventTime": "2024-05-21T12:56:51.241318+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkeduB42pVxULWf7l9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "f1eba05f-d4af-4e6d-9f95-9bb2ebfbac3a", "DetectTime": "2024-05-21T12:56:51.253655+00:00", "EventTime": "2024-05-21T12:56:51.253689+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJdFq3t6BsTyOBDe2"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "82f6192e-01cb-4657-9b70-562a747a6c62", "DetectTime": "2024-05-21T12:56:51.585285+00:00", "EventTime": "2024-05-21T12:56:51.585307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cuu63R3iFwVhsz7fRb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "cf51891c-232e-423e-ac46-63bce2f8442d", "DetectTime": "2024-05-21T12:56:51.654711+00:00", "EventTime": "2024-05-21T12:56:51.654735+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwBeHo1zBnCHGErQea"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "e49d826a-1e2c-4c14-aa5b-636f668ca037", "DetectTime": "2024-05-21T12:56:51.661414+00:00", "EventTime": "2024-05-21T12:56:51.661434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbpVUy2wgmzYBETR2c"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "9a597f99-7872-488c-9fb8-d93635abf4ea", "DetectTime": "2024-05-21T12:56:51.666110+00:00", "EventTime": "2024-05-21T12:56:51.666128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUlvab1R7CoreWvJvb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "428a6b72-4cb7-4525-9910-24de45587dfc", "DetectTime": "2024-05-21T12:56:51.670572+00:00", "EventTime": "2024-05-21T12:56:51.670589+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4liSP3LZhhfSQffzb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "8a4d2015-f3ef-462c-afb5-e3150909099f", "DetectTime": "2024-05-21T12:56:51.681972+00:00", "EventTime": "2024-05-21T12:56:51.681990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci18Xq28HZ3mTLM5Z1"], "accumulated_threat_level": 12.000000000000002, "timewindow": 204} +{"Format": "Json", "ID": "8a4d2015-f3ef-462c-afb5-e3150909099f", "DetectTime": "2024-05-21T12:56:51.681972+00:00", "EventTime": "2024-05-21T12:56:51.681990+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-09T11:45:42.497719+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2024/05/21 12:56:51.873253)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 204, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "cb8536f8-e2c0-45ef-968f-dbb7069d4efa", "DetectTime": "2024-05-21T12:56:52.179146+00:00", "EventTime": "2024-05-21T12:56:52.179164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CErJXA1sp8DYXqqGEc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "2acb80ca-2600-4868-9728-5b8cfa5c03f9", "DetectTime": "2024-05-21T12:56:52.305815+00:00", "EventTime": "2024-05-21T12:56:52.305839+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CscvBo1av4ZNJ4NAIj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "c20e50e2-5e52-4e14-9a59-23ead61d5d31", "DetectTime": "2024-05-21T12:56:52.318111+00:00", "EventTime": "2024-05-21T12:56:52.318131+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1FNB3YnFbWYgWMO8"], "accumulated_threat_level": 0.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "29eeb6ee-e600-42be-8e4f-44405267fa66", "DetectTime": "2024-05-21T12:56:52.323178+00:00", "EventTime": "2024-05-21T12:56:52.323197+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp92Kj4SLF8OrFJGI7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "184492a8-20ef-45e9-a166-982f72db93c7", "DetectTime": "2024-05-21T12:56:52.333027+00:00", "EventTime": "2024-05-21T12:56:52.333045+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChXXLc2NQpe7u66C5f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "f3923065-6f58-456c-b32d-355929874102", "DetectTime": "2024-05-21T12:56:52.338390+00:00", "EventTime": "2024-05-21T12:56:52.338434+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsOTUk4EaumASqnE5k"], "accumulated_threat_level": 7.199999999999999, "timewindow": 201} +{"Format": "IDEA0", "ID": "9eade465-ce65-4fec-8baf-ecd53bd46867", "DetectTime": "2024-05-21T12:56:52.614528+00:00", "EventTime": "2024-05-21T12:56:52.614546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2LPx1YJolLBokRW"], "accumulated_threat_level": 1.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "e459e05c-a65b-4c8a-972c-c08946321b44", "DetectTime": "2024-05-21T12:56:52.945890+00:00", "EventTime": "2024-05-21T12:56:52.945914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz8OjX2m0wfGQvZK1a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "f2f847ea-9c41-4118-913b-e0bf6206ad23", "DetectTime": "2024-05-21T12:56:52.962724+00:00", "EventTime": "2024-05-21T12:56:52.962748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CazuXA3e6uqy5P8Zp9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "5a47ce3f-eeec-4c95-afbc-132403af57d0", "DetectTime": "2024-05-21T12:56:52.971147+00:00", "EventTime": "2024-05-21T12:56:52.971169+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkALMo85TfusCkvec"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "02657b70-4d4f-4c7d-8688-574614c2a828", "DetectTime": "2024-05-21T12:56:52.992456+00:00", "EventTime": "2024-05-21T12:56:52.992480+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ0Tpy4wL0y7E9Si6h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "932ab243-b418-49bb-b294-e7f6cf55bd63", "DetectTime": "2024-05-21T12:56:53.012451+00:00", "EventTime": "2024-05-21T12:56:53.012472+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cocwjy4G7bzwJomkWb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "183a595d-40fd-49de-a629-b7e1d5335a70", "DetectTime": "2024-05-21T12:56:53.022496+00:00", "EventTime": "2024-05-21T12:56:53.022517+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEwg5u2TcnfdljRAhg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "9c6b5f96-400f-4a1c-9c95-88aaf6ec503d", "DetectTime": "2024-05-21T12:56:53.035949+00:00", "EventTime": "2024-05-21T12:56:53.035974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQv1F2sGckCVxuare"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 204} +{"Format": "IDEA0", "ID": "5bcd189b-a4e6-4ac2-a614-a241b81941f7", "DetectTime": "2024-05-21T12:56:53.046703+00:00", "EventTime": "2024-05-21T12:56:53.046725+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ConMiQ3esdJJwOxr8j", "C8aAdc1pwOx0sFUt9b", "CjdmWy1WfHXgfngHF8", "C9XiMfM8roMrVvoR5"], "accumulated_threat_level": 0.5, "timewindow": 239} +{"Format": "IDEA0", "ID": "790e1cf8-34db-41f7-bad1-2ff2904b0c4e", "DetectTime": "2024-05-21T12:56:53.100604+00:00", "EventTime": "2024-05-21T12:56:53.100626+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9Yj7M2UnrSeKtjYN7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "b924dbf2-8468-4fd3-9bab-7447cc76fcb1", "DetectTime": "2024-05-21T12:56:53.685974+00:00", "EventTime": "2024-05-21T12:56:53.685998+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVJwJW2y6Maab3bgKb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "26c6f82a-23a2-4516-8402-c1dc1da5d4c7", "DetectTime": "2024-05-21T12:56:53.693046+00:00", "EventTime": "2024-05-21T12:56:53.693066+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4a8o91p7s7jG2YYx6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "21d8028a-0159-4718-a161-cd6ec52b4bfb", "DetectTime": "2024-05-21T12:56:53.706844+00:00", "EventTime": "2024-05-21T12:56:53.706864+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ29Ko3XvysDK3Fvd7"], "accumulated_threat_level": 3.2, "timewindow": 204} +{"Format": "IDEA0", "ID": "fed17086-1862-4210-bf36-ff5ef18c15de", "DetectTime": "2024-05-21T12:56:53.711854+00:00", "EventTime": "2024-05-21T12:56:53.711872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CN6AnO28rXOp1es0H2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "5fe7e4c6-25d2-4260-9338-a5b35a267f06", "DetectTime": "2024-05-21T12:56:53.716374+00:00", "EventTime": "2024-05-21T12:56:53.716392+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3blii4yH8Ks0AxMi9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "5d714a22-4f01-46cb-94b7-a69af767ff5c", "DetectTime": "2024-05-21T12:56:53.722928+00:00", "EventTime": "2024-05-21T12:56:53.722948+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMh3mCgvOkPtsN964"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "f84a39c8-373e-45b6-badb-053624f34406", "DetectTime": "2024-05-21T12:56:53.727981+00:00", "EventTime": "2024-05-21T12:56:53.728001+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKxu934MgMmgTyhD69"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "ee9c8844-923f-4a2a-b4ca-5d641cd62892", "DetectTime": "2024-05-21T12:56:53.737563+00:00", "EventTime": "2024-05-21T12:56:53.737584+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CddE6X3dZZUwdXBbk5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "fae45c9e-0b67-4b39-a751-bea10cb5c4a2", "DetectTime": "2024-05-21T12:56:54.412053+00:00", "EventTime": "2024-05-21T12:56:54.412072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRnl11WDsNK46QML2"], "accumulated_threat_level": 4.0, "timewindow": 204} +{"Format": "IDEA0", "ID": "35d97769-8914-447d-99c2-fc08b0002610", "DetectTime": "2024-05-21T12:56:54.423822+00:00", "EventTime": "2024-05-21T12:56:54.423848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C32tGv304Y6nvmbgK"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "f4f737df-18f1-4c5f-91fd-8d1067328bfb", "DetectTime": "2024-05-21T12:56:54.429218+00:00", "EventTime": "2024-05-21T12:56:54.429238+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPhavT2taKACgi9Ig1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "2a92e179-43c5-48d6-934e-0347a40bed1b", "DetectTime": "2024-05-21T12:56:54.454815+00:00", "EventTime": "2024-05-21T12:56:54.454835+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChYTKw4Tbi3pXm1dAj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "3b1e25a2-8927-47fb-bd33-2c98470903b6", "DetectTime": "2024-05-21T12:56:54.461801+00:00", "EventTime": "2024-05-21T12:56:54.461820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C03Yjp3P04VlLT5MG8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "bb989e1a-c8f2-4889-9cb3-24bb9481a7c3", "DetectTime": "2024-05-21T12:56:54.466517+00:00", "EventTime": "2024-05-21T12:56:54.466536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIoAoI3jvUFSfZC5Aa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "28591a0b-5079-41b4-9e1e-31b153b741bc", "DetectTime": "2024-05-21T12:56:54.508801+00:00", "EventTime": "2024-05-21T12:56:54.508822+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cy6FVM1WGEvb9aAyce"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "eec27279-56fb-4517-99fd-f238bcda2e27", "DetectTime": "2024-05-21T12:56:54.875845+00:00", "EventTime": "2024-05-21T12:56:54.875867+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYERxZ1OANZLELVDlg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "1cd16f71-f469-4479-8b79-152742d0234b", "DetectTime": "2024-05-21T12:56:55.360939+00:00", "EventTime": "2024-05-21T12:56:55.360960+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnFf0hjrqNNjdGBdk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "7ecfbbf6-1d3a-4a6a-acd9-63b7f12d45f5", "DetectTime": "2024-05-21T12:56:55.424427+00:00", "EventTime": "2024-05-21T12:56:55.424450+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaNFX14nWjQtyaCf"], "accumulated_threat_level": 4.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "bcc8af2e-9c70-4433-b5b6-73e5fed3dac1", "DetectTime": "2024-05-21T12:56:55.437113+00:00", "EventTime": "2024-05-21T12:56:55.437134+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRtREm1slYVdwz9oJ4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "d85ba2c6-fcc0-48ea-aa68-f2c3fdaa6172", "DetectTime": "2024-05-21T12:56:55.574808+00:00", "EventTime": "2024-05-21T12:56:55.574846+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgzOM130ghXXACSohd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "dcf37dbc-0c32-4a36-aaa3-a12ac9c4c89e", "DetectTime": "2024-05-21T12:56:55.580362+00:00", "EventTime": "2024-05-21T12:56:55.580384+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaGZA71F8IdteEwQgb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "6ff55fbb-c99a-4fff-9db4-d21246cfb51c", "DetectTime": "2024-05-21T12:56:55.651209+00:00", "EventTime": "2024-05-21T12:56:55.651232+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8usNy3naWbia1tgZe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "8e23e167-6f42-45c4-a42b-910422c02892", "DetectTime": "2024-05-21T12:56:55.728970+00:00", "EventTime": "2024-05-21T12:56:55.728995+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZMmv73jk1hTI9vZD4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "fb927d3e-6e85-47b6-afc3-eeccd4d48293", "DetectTime": "2024-05-21T12:56:55.734057+00:00", "EventTime": "2024-05-21T12:56:55.734077+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C5mQgM11nJCRsQN4ka"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "a59b13f1-841e-4e67-a854-a6b5a5831dda", "DetectTime": "2024-05-21T12:56:55.767127+00:00", "EventTime": "2024-05-21T12:56:55.767149+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJQkQD46eraETGvzp6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "2495a4a0-20ad-4f69-8bda-58e2c5d1644b", "DetectTime": "2024-05-21T12:56:56.142927+00:00", "EventTime": "2024-05-21T12:56:56.142951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBdCQS3rb9simp54zg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "d9c9bb56-486c-48f1-a145-6b685f0aff1e", "DetectTime": "2024-05-21T12:56:56.171047+00:00", "EventTime": "2024-05-21T12:56:56.171069+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZYtQB11yQrhYy6xVb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "f3a03837-56cb-4330-b6e5-6ed4f8d3dc9c", "DetectTime": "2024-05-21T12:56:56.255861+00:00", "EventTime": "2024-05-21T12:56:56.255882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Clni6r2NTdTiyuUJSh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "4feefc79-0edf-429e-92d5-cfabe37d2d4f", "DetectTime": "2024-05-21T12:56:56.262831+00:00", "EventTime": "2024-05-21T12:56:56.262853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cflrjk4qyWGwzkiyAg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "2b54d0b2-4244-48c0-8042-6604ac5a7e8d", "DetectTime": "2024-05-21T12:56:56.636523+00:00", "EventTime": "2024-05-21T12:56:56.636546+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFZEoa36m3km060gOk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "8ed3ceb8-3ac2-4ff3-ac1d-f988e512e25a", "DetectTime": "2024-05-21T12:56:56.684829+00:00", "EventTime": "2024-05-21T12:56:56.684851+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7eUY1oujBV3ZSzxe"], "accumulated_threat_level": 5.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "dc73b588-815e-4e02-b032-e09e5f8143ea", "DetectTime": "2024-05-21T12:56:56.704986+00:00", "EventTime": "2024-05-21T12:56:56.705009+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czfab42491o0Nm5MB9"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "4bfbe5f6-82e7-490b-9f16-d3489e8797d8", "DetectTime": "2024-05-21T12:56:56.724532+00:00", "EventTime": "2024-05-21T12:56:56.724554+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT7T6E20UGWHBt6foa"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "2af4bb5d-d0ae-4a69-9478-219c1d266017", "DetectTime": "2024-05-21T12:56:56.805164+00:00", "EventTime": "2024-05-21T12:56:56.805185+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWG5Xj3j8EMs1IqGF3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "71d1ce0b-7f10-4ef1-ba41-81c18251d42c", "DetectTime": "2024-05-21T12:56:57.173579+00:00", "EventTime": "2024-05-21T12:56:57.173599+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7S3bb1XforPIi3Dzf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "ad74f55d-a103-4f34-bc10-da0789d76d6b", "DetectTime": "2024-05-21T12:56:57.178598+00:00", "EventTime": "2024-05-21T12:56:57.178617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHQsro2Ac91jKFplOc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "4264d72e-b050-41f2-b075-46993adc85a2", "DetectTime": "2024-05-21T12:56:57.203693+00:00", "EventTime": "2024-05-21T12:56:57.203715+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqVclT2wXgQVCog0l7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "6ee1ece3-719b-4093-88c8-e7855ba53abc", "DetectTime": "2024-05-21T12:56:57.210294+00:00", "EventTime": "2024-05-21T12:56:57.210314+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fApb27SGaEVXJ7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "be05ca8f-2c06-492d-a5ca-24426b6a2361", "DetectTime": "2024-05-21T12:56:57.215376+00:00", "EventTime": "2024-05-21T12:56:57.215394+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNAZuq1Nr0fwIDUIS2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "4f96cc90-b26e-4d53-b308-2aaac1baa50d", "DetectTime": "2024-05-21T12:56:57.220085+00:00", "EventTime": "2024-05-21T12:56:57.220102+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQHJbT1FZZ71s2pt7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "00451b9a-293f-4d5a-8003-dbbff12a53eb", "DetectTime": "2024-05-21T12:56:57.738979+00:00", "EventTime": "2024-05-21T12:56:57.739005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9MqqX3zRH8Orc0Al1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "1f89d479-1b16-450a-acff-683dff9c9c86", "DetectTime": "2024-05-21T12:56:57.797509+00:00", "EventTime": "2024-05-21T12:56:57.797532+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CEnPG61EbnXjWqG4Y2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "38e0c858-97e9-45b5-bb62-77d0b3b4e708", "DetectTime": "2024-05-21T12:56:57.880742+00:00", "EventTime": "2024-05-21T12:56:57.880765+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CztaGH38Cz5MBusWwc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "f275b705-f102-4cd8-ac8d-6510844b104f", "DetectTime": "2024-05-21T12:56:57.925378+00:00", "EventTime": "2024-05-21T12:56:57.925401+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C77NUX3ANkcI7BKu1d"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "1732d19f-e9e4-4d96-8ab8-38bc53835556", "DetectTime": "2024-05-21T12:56:57.980695+00:00", "EventTime": "2024-05-21T12:56:57.980716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLLXR84fAc4thha6zb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "b98a5684-2c5d-4fcc-b6e7-94e451cf09d1", "DetectTime": "2024-05-21T12:56:58.305420+00:00", "EventTime": "2024-05-21T12:56:58.305448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqo7FF2FOtHCoh4046"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "22ae91c9-86cd-48c1-b096-1baa5c76b9c0", "DetectTime": "2024-05-21T12:56:58.319734+00:00", "EventTime": "2024-05-21T12:56:58.319757+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBnQnu1elaDOPgz4E5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "2d064084-170d-4c54-b260-164746ddf238", "DetectTime": "2024-05-21T12:56:58.325143+00:00", "EventTime": "2024-05-21T12:56:58.325165+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYwYWD27Tzi48sntnl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "e43995eb-2db0-4ddf-b9b6-e5b0ba20b9ff", "DetectTime": "2024-05-21T12:56:58.344681+00:00", "EventTime": "2024-05-21T12:56:58.344731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5fXwXFfW88azPX5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 204} +{"Format": "IDEA0", "ID": "ecef5e7c-cec2-480c-bf35-6d6d3cff6aa7", "DetectTime": "2024-05-21T12:56:58.592726+00:00", "EventTime": "2024-05-21T12:56:58.592750+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1Ak1v4lmenVOyGWJ8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "bfadcdf2-92e5-41e9-be7e-e80dfa254562", "DetectTime": "2024-05-21T12:56:58.597689+00:00", "EventTime": "2024-05-21T12:56:58.597706+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdvOfo48JUoR74CF3"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "b35f3a7d-ea69-4596-ad85-9d2113001a9d", "DetectTime": "2024-05-21T12:56:58.605252+00:00", "EventTime": "2024-05-21T12:56:58.605272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSSVMy4dqCFeasTVC8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "53b39fa8-b07c-434f-9357-b7b928535e3a", "DetectTime": "2024-05-21T12:56:58.610104+00:00", "EventTime": "2024-05-21T12:56:58.610123+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9303p170xnuUlkaCc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "8b666d82-a924-4237-b769-c48a33a1c458", "DetectTime": "2024-05-21T12:56:58.703656+00:00", "EventTime": "2024-05-21T12:56:58.703677+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBLDal4RfBRGiZLE78"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "639069c6-7c00-4fcc-b984-1a8c163e5117", "DetectTime": "2024-05-21T12:56:58.958966+00:00", "EventTime": "2024-05-21T12:56:58.958987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8LMsc2Ct1ZSslDv23"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 202} +{"Format": "IDEA0", "ID": "8132c673-e2ad-4f2a-9c6c-462647393f19", "DetectTime": "2024-05-21T12:56:59.060994+00:00", "EventTime": "2024-05-21T12:56:59.061018+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpbFe4dt5TsGLB2ha"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "eef216ac-3ea5-432f-b817-f0ccce6ba8b0", "DetectTime": "2024-05-21T12:56:59.199450+00:00", "EventTime": "2024-05-21T12:56:59.199473+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRfQQb1BvtNBibuANf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "4b0e0288-1ca1-49f5-8086-fea219bd5d65", "DetectTime": "2024-05-21T12:56:59.288631+00:00", "EventTime": "2024-05-21T12:56:59.288652+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnicX24ytABlgkgRah"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "609ab4e4-843f-4985-8373-7d55c3b49b1e", "DetectTime": "2024-05-21T12:56:59.596402+00:00", "EventTime": "2024-05-21T12:56:59.596425+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwukPb3PGKMwnxe5y8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "04cfab73-caf3-49fe-a43f-53d68ee041dd", "DetectTime": "2024-05-21T12:56:59.609515+00:00", "EventTime": "2024-05-21T12:56:59.609536+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co8RaZz6zifnCFJqj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "b449e0dc-4b45-4a4b-869f-a69ac6661e95", "DetectTime": "2024-05-21T12:56:59.616235+00:00", "EventTime": "2024-05-21T12:56:59.616255+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CifYpIr2Zra0Yvtr7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "2cf31ab1-fbb9-4426-9f47-99bd9d6ff593", "DetectTime": "2024-05-21T12:56:59.628007+00:00", "EventTime": "2024-05-21T12:56:59.628026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7cBpE2fKXyAzVW73i"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "30f69a0a-0ac2-4b5e-afa7-f96b118e2df3", "DetectTime": "2024-05-21T12:56:59.690747+00:00", "EventTime": "2024-05-21T12:56:59.690770+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce2nu02QZybV4C1781"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "7566e547-12c5-4666-bdea-5feda88fb4d3", "DetectTime": "2024-05-21T12:56:59.827536+00:00", "EventTime": "2024-05-21T12:56:59.827560+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQJk4e1pWLCIjiZSr5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "fd336622-e3ed-4ab1-bfba-209ed81d71e3", "DetectTime": "2024-05-21T12:56:59.908241+00:00", "EventTime": "2024-05-21T12:56:59.908267+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmvjAW2h7oS5Aqn9Tb"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "6fe1f88e-3a7c-4c19-a4dd-fe828e41ab72", "DetectTime": "2024-05-21T12:56:59.926062+00:00", "EventTime": "2024-05-21T12:56:59.926090+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuL33c3dEKVUql5wMg"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "5cbfb014-2406-42e2-9f29-c0c538e25607", "DetectTime": "2024-05-21T12:57:00.190108+00:00", "EventTime": "2024-05-21T12:57:00.190135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGgdCj87Tp7MQWoyf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "a7d2e74d-0f63-4084-8895-1700f8f0db36", "DetectTime": "2024-05-21T12:57:00.199382+00:00", "EventTime": "2024-05-21T12:57:00.199407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpFinb4YaS7qpmxKge"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "846aab83-783d-433c-818e-ea6bb08e5bbb", "DetectTime": "2024-05-21T12:57:00.209372+00:00", "EventTime": "2024-05-21T12:57:00.209391+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClYGU7s9xSbBozzP9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "55eb6499-3a05-4c4b-af9d-fe2f8978b91d", "DetectTime": "2024-05-21T12:57:00.214839+00:00", "EventTime": "2024-05-21T12:57:00.214863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf1QNv4WBSPUTsVn3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "b2e938ca-5fab-48c0-a35e-eb856324f2e9", "DetectTime": "2024-05-21T12:57:00.222348+00:00", "EventTime": "2024-05-21T12:57:00.222367+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CM2KJG3V7YsDft4yCi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "db13ba1f-2d0d-496c-91b4-999eea30a7f5", "DetectTime": "2024-05-21T12:57:00.573362+00:00", "EventTime": "2024-05-21T12:57:00.573382+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cgw87F2iwM97p43Xy1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "359bee9b-eae9-4c5f-8238-78b7a6be6e23", "DetectTime": "2024-05-21T12:57:00.865857+00:00", "EventTime": "2024-05-21T12:57:00.865889+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUjYe1KP2IsJdRtI5"], "accumulated_threat_level": 7.999999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "e0d916d2-f48f-4b7e-afcd-8b126c3b3e05", "DetectTime": "2024-05-21T12:57:01.023847+00:00", "EventTime": "2024-05-21T12:57:01.023868+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cla1FL106IKfYi7vW9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "48cee6ed-48d4-4ee9-8a35-ee487b9486d3", "DetectTime": "2024-05-21T12:57:01.097233+00:00", "EventTime": "2024-05-21T12:57:01.097254+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTOIfc4LbnDHSW5V5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "7a4d8830-4d09-4c49-8713-1606f45a71b0", "DetectTime": "2024-05-21T12:57:01.154162+00:00", "EventTime": "2024-05-21T12:57:01.154183+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL8BTO3AMN1933Ttv"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "b7def24b-78c3-478a-bc7c-dcd8798550b9", "DetectTime": "2024-05-21T12:57:01.165086+00:00", "EventTime": "2024-05-21T12:57:01.165109+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxwowC2v33neAgNNCh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "1793b36d-6de1-49bb-ad8a-c60198f6b507", "DetectTime": "2024-05-21T12:57:01.233653+00:00", "EventTime": "2024-05-21T12:57:01.233673+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9WbKj1KziGPBRy0L5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "ae861297-79fe-4232-b5f5-ccc8455d26c6", "DetectTime": "2024-05-21T12:57:01.245441+00:00", "EventTime": "2024-05-21T12:57:01.245462+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9EPS02c1FrVzmFo2g"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "3ca90c5b-593f-449b-b1b6-126cb2069f22", "DetectTime": "2024-05-21T12:57:01.316641+00:00", "EventTime": "2024-05-21T12:57:01.316664+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwu5XD4YoFaXCZbIMd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "ef719b48-00a3-4a01-859d-2bfc17792101", "DetectTime": "2024-05-21T12:57:01.565982+00:00", "EventTime": "2024-05-21T12:57:01.566005+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwbag43VoXhzMM7rG5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "a158f497-f4bb-4d39-8abe-4dbf3e294f6b", "DetectTime": "2024-05-21T12:57:01.603537+00:00", "EventTime": "2024-05-21T12:57:01.603561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcV4in3N4772fSF9kc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "6dd0a12b-2684-468b-833b-1b47fab2473b", "DetectTime": "2024-05-21T12:57:01.608788+00:00", "EventTime": "2024-05-21T12:57:01.608809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcklwzKBDSZxjPl95"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "d7c1fde9-4182-4d3a-a383-743c5ae7a186", "DetectTime": "2024-05-21T12:57:01.616199+00:00", "EventTime": "2024-05-21T12:57:01.616220+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpoVGL3s9noAxzJRpf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "7bfca24c-8c54-4787-ab2c-c1ee84cecd06", "DetectTime": "2024-05-21T12:57:01.725773+00:00", "EventTime": "2024-05-21T12:57:01.725795+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CljjDh2prR3SOXOlee"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "7cbb64d3-562a-4e56-9125-8e57ae80510c", "DetectTime": "2024-05-21T12:57:01.859844+00:00", "EventTime": "2024-05-21T12:57:01.859865+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CB3BBT2eKgImFIilw3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "b26ff77b-173d-464e-91df-9b52f330f972", "DetectTime": "2024-05-21T12:57:02.200653+00:00", "EventTime": "2024-05-21T12:57:02.200674+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRGUs3GwxRbsiova4"], "accumulated_threat_level": 8.799999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "45922028-6b9b-44e9-be5d-a961f13a2b36", "DetectTime": "2024-05-21T12:57:02.260152+00:00", "EventTime": "2024-05-21T12:57:02.260174+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Chvg024vXi99V4UyFh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "0880b9b5-688d-4f2c-b1c9-d5a9eb906474", "DetectTime": "2024-05-21T12:57:02.265090+00:00", "EventTime": "2024-05-21T12:57:02.265110+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8fQmFTTTYep9vOea"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "74a4974f-ec6d-4bea-8322-fafa27c6d9c2", "DetectTime": "2024-05-21T12:57:02.366572+00:00", "EventTime": "2024-05-21T12:57:02.366594+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHnn2u3lJtV0p7dnY4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "85029df1-c554-45a2-9a74-4ce46977563c", "DetectTime": "2024-05-21T12:57:02.372395+00:00", "EventTime": "2024-05-21T12:57:02.372415+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBSf8I1K3MUMGdspba"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "c7976cdb-ef74-4061-853b-a94d1a5788a2", "DetectTime": "2024-05-21T12:57:02.377307+00:00", "EventTime": "2024-05-21T12:57:02.377326+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7a2484opZSribxYc6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "2ce16ad2-f1cd-4351-bec0-a86fe7f42ed8", "DetectTime": "2024-05-21T12:57:02.821250+00:00", "EventTime": "2024-05-21T12:57:02.821272+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcqdRe1Uap2krNvZl5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "c7dbd6bb-81c5-4693-9af8-5bbb997e7b2e", "DetectTime": "2024-05-21T12:57:02.836107+00:00", "EventTime": "2024-05-21T12:57:02.836128+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CL2ONS3RRTwaabZC7f"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "99cdd39e-36aa-48de-ac18-2b8dba9f12cc", "DetectTime": "2024-05-21T12:57:02.857267+00:00", "EventTime": "2024-05-21T12:57:02.857289+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP9R5z3pNw8n77Slid"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "a2d08ab6-9e53-4908-a84e-43de155d7b62", "DetectTime": "2024-05-21T12:57:02.894832+00:00", "EventTime": "2024-05-21T12:57:02.894855+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSFnsi3f2llrrXIyNk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "378936bb-2233-421d-a2f0-02cc03f79921", "DetectTime": "2024-05-21T12:57:02.901715+00:00", "EventTime": "2024-05-21T12:57:02.901736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnaFg01KtKPD289mPk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "6f491f2e-9545-41b9-a8a7-606c7cd5210a", "DetectTime": "2024-05-21T12:57:02.906824+00:00", "EventTime": "2024-05-21T12:57:02.906844+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cg1mu62Nwew6c0BPmh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "f17a545b-58d1-41b8-8b0f-a3316e2dd44e", "DetectTime": "2024-05-21T12:57:02.912391+00:00", "EventTime": "2024-05-21T12:57:02.912411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChOafR1OwYewJNUnl9"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "30fc2d11-36f5-4ea9-98f2-ae22c2358891", "DetectTime": "2024-05-21T12:57:02.917448+00:00", "EventTime": "2024-05-21T12:57:02.917468+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cu2uSU3JeegCgts9d1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "2d39493b-7c4a-464b-8398-9804dc380029", "DetectTime": "2024-05-21T12:57:03.478003+00:00", "EventTime": "2024-05-21T12:57:03.478025+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpAgE34psPtl4jOvAh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "bb40cc45-3b61-4bc6-bb95-e17270a8ed20", "DetectTime": "2024-05-21T12:57:03.572139+00:00", "EventTime": "2024-05-21T12:57:03.572167+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUaLF51eenbB0G6kVc"], "accumulated_threat_level": 9.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "fa6209b5-73ae-4611-bdf4-81d430bc64fb", "DetectTime": "2024-05-21T12:57:03.860082+00:00", "EventTime": "2024-05-21T12:57:03.860103+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr7knp2I0PueEi0PHa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "72bc6908-449e-45fc-b4b3-674190be4953", "DetectTime": "2024-05-21T12:57:03.873590+00:00", "EventTime": "2024-05-21T12:57:03.873616+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPNuW13mVT6aKCFlG1"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "f7793966-4e18-4536-85f5-4fd8ab2c0342", "DetectTime": "2024-05-21T12:57:03.992127+00:00", "EventTime": "2024-05-21T12:57:03.992152+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLFNkf3SA2ii94ZsT8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "e68ca29e-ef71-4072-acdd-f157e0a7f29d", "DetectTime": "2024-05-21T12:57:04.028490+00:00", "EventTime": "2024-05-21T12:57:04.028514+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3bO8C2LHysxr3Kiq6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "7730bb69-b825-4b8c-9a1c-6bc6cace4900", "DetectTime": "2024-05-21T12:57:04.343864+00:00", "EventTime": "2024-05-21T12:57:04.343887+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyMRFe12Kf7MZ0hQ52"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "a003e033-1cde-400f-bb43-9edc0b0c7be0", "DetectTime": "2024-05-21T12:57:04.446895+00:00", "EventTime": "2024-05-21T12:57:04.446919+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cic5cv4GmOlrG9Xwfb"], "accumulated_threat_level": 9.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "ccd76c92-fd22-460e-8bfa-f01df43cbe74", "DetectTime": "2024-05-21T12:57:04.456746+00:00", "EventTime": "2024-05-21T12:57:04.456767+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C91h6q1eT0rxCbzNCd"], "accumulated_threat_level": 9.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "0c9b601e-f98a-49cf-9b03-9f4156bf7ec3", "DetectTime": "2024-05-21T12:57:04.515379+00:00", "EventTime": "2024-05-21T12:57:04.515411+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrNKxs4jomJlqKrYWk"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "5edb2b35-9dc0-40a7-87ab-d0696ca12c77", "DetectTime": "2024-05-21T12:57:04.654709+00:00", "EventTime": "2024-05-21T12:57:04.654731+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqCcR32YsiCmkWbHBl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "446f3f6b-89e0-49e1-b88b-5dcc98f1fc7f", "DetectTime": "2024-05-21T12:57:04.724848+00:00", "EventTime": "2024-05-21T12:57:04.724872+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHMyMc3bm8c3XuPtSf"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "774a68ed-14a8-42fa-b0b2-9a1cbe1fc7bd", "DetectTime": "2024-05-21T12:57:05.011512+00:00", "EventTime": "2024-05-21T12:57:05.011533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyhcUV3GbuPJ3pKjrf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "3aa857d4-c2e1-4b7c-84e2-01383221510f", "DetectTime": "2024-05-21T12:57:05.023717+00:00", "EventTime": "2024-05-21T12:57:05.023743+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcBZWy2wAA6B5iFzdl"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "ce014281-ff9b-4f66-ac74-ea3063034dea", "DetectTime": "2024-05-21T12:57:05.039323+00:00", "EventTime": "2024-05-21T12:57:05.039347+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAHJ8LEypAW0DSWZh"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "862fa190-f379-4908-8bc5-66cb14e34ab6", "DetectTime": "2024-05-21T12:57:05.065631+00:00", "EventTime": "2024-05-21T12:57:05.065655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRjrfQ3LHAOYYnHx68"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "f97cd715-fcec-4b87-a270-e7593e3bb215", "DetectTime": "2024-05-21T12:57:05.120340+00:00", "EventTime": "2024-05-21T12:57:05.120361+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CAKch22LuZtwdfziKb"], "accumulated_threat_level": 10.4, "timewindow": 204} +{"Format": "IDEA0", "ID": "1b0e489d-228d-4df3-a6f6-86c0da9aaee9", "DetectTime": "2024-05-21T12:57:05.206043+00:00", "EventTime": "2024-05-21T12:57:05.206064+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvvjL2JDG2CSyORg6"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "8c4bf308-6427-4365-a350-62f2977be2c9", "DetectTime": "2024-05-21T12:57:05.510777+00:00", "EventTime": "2024-05-21T12:57:05.510801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgDiAr1Y6KWgQir3d2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 203} +{"Format": "IDEA0", "ID": "3e658e4e-4ba7-4043-bd9a-e24d71bada0c", "DetectTime": "2024-05-21T12:57:05.684727+00:00", "EventTime": "2024-05-21T12:57:05.684748+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9yDl39Fb3UphhnWl"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "85387f8a-fd40-4f61-a37e-f0b11c46cc44", "DetectTime": "2024-05-21T12:57:05.692288+00:00", "EventTime": "2024-05-21T12:57:05.692307+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C99lxp4eloG8VX8Pck"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "ca9bc52f-a6e1-462b-88ed-5dfc6e199da0", "DetectTime": "2024-05-21T12:57:05.697887+00:00", "EventTime": "2024-05-21T12:57:05.697910+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ClURXJ1OJWysevjqc1"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "57339de8-a920-4e56-b566-594199783494", "DetectTime": "2024-05-21T12:57:05.704562+00:00", "EventTime": "2024-05-21T12:57:05.704582+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0ajjL3pr8UXP2vvZ7"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "760e05e5-317d-464c-8357-464fee5fa768", "DetectTime": "2024-05-21T12:57:05.709955+00:00", "EventTime": "2024-05-21T12:57:05.709974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwd3Dc1U92kIILnd9g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "821ddf32-00af-4011-88fb-9b3909313986", "DetectTime": "2024-05-21T12:57:05.714742+00:00", "EventTime": "2024-05-21T12:57:05.714761+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZ2HsE2Cp6g8V9CE0a"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "9b45cbd9-d11a-4063-9f13-490fd2e1442f", "DetectTime": "2024-05-21T12:57:05.742953+00:00", "EventTime": "2024-05-21T12:57:05.742974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CETZCSJB22TrMw0oa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "e2e20322-676d-4afa-a06a-081397c5b4a7", "DetectTime": "2024-05-21T12:57:05.748000+00:00", "EventTime": "2024-05-21T12:57:05.748019+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNQDWD47D3RvgxSzc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "3e5953f4-989e-4dd8-80e8-5000da8ae12c", "DetectTime": "2024-05-21T12:57:05.752510+00:00", "EventTime": "2024-05-21T12:57:05.752528+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CA7hTq4QtrjSBCMHJe"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "c3e1f889-586d-4139-b248-0b182dd2078e", "DetectTime": "2024-05-21T12:57:05.757830+00:00", "EventTime": "2024-05-21T12:57:05.757850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4vGWj2ObVUbNt1q9h"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "c4e992dc-a35b-49ad-a169-1c30b4790a33", "DetectTime": "2024-05-21T12:57:05.784062+00:00", "EventTime": "2024-05-21T12:57:05.784084+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMexFRbGRTpY2nBu5"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "0d33add5-3e55-41f8-a8b1-594266c1cfd1", "DetectTime": "2024-05-21T12:57:05.804222+00:00", "EventTime": "2024-05-21T12:57:05.804244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4ZDAm36BxLKqhkAzk"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "e2767dda-75e1-41cd-9236-a2a3c99d8064", "DetectTime": "2024-05-21T12:57:05.809307+00:00", "EventTime": "2024-05-21T12:57:05.809327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CarVcu3f5VrZQkjBp8"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "b4855bfd-ff48-42f9-ad73-2774797123fa", "DetectTime": "2024-05-21T12:57:05.839947+00:00", "EventTime": "2024-05-21T12:57:05.839970+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CzYJ0AbeiM5FqFNfc"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "b54aba73-86f2-4915-a3a3-4601ebd8a91a", "DetectTime": "2024-05-21T12:57:06.284034+00:00", "EventTime": "2024-05-21T12:57:06.284055+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C08CVY3T1K76D0taHj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "b7ab4859-7bca-4941-85cf-1ad83ba3a0db", "DetectTime": "2024-05-21T12:57:06.344051+00:00", "EventTime": "2024-05-21T12:57:06.344072+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxtQAIFq7SbYwu8nb"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "a49345b1-cb02-45c6-85df-0dea12eafa5d", "DetectTime": "2024-05-21T12:57:06.749249+00:00", "EventTime": "2024-05-21T12:57:06.749271+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUriBN2TEk8y22DZn3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "6c6e4b9b-7270-46dd-88b4-c7810967f6fb", "DetectTime": "2024-05-21T12:57:06.761931+00:00", "EventTime": "2024-05-21T12:57:06.761951+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CofxILjCKWPB3YFJ4"], "accumulated_threat_level": 11.200000000000001, "timewindow": 204} +{"Format": "IDEA0", "ID": "370f2b47-9cff-4027-a9b2-873e4a64b871", "DetectTime": "2024-05-21T12:57:06.774352+00:00", "EventTime": "2024-05-21T12:57:06.774370+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPhfFr3dzycFzh4EPi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 204} +{"Format": "Json", "ID": "370f2b47-9cff-4027-a9b2-873e4a64b871", "DetectTime": "2024-05-21T12:57:06.774352+00:00", "EventTime": "2024-05-21T12:57:06.774370+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-09T11:45:46.047958+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 204. (real time 2024/05/21 12:57:07.028453)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 204, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "42527e72-0935-41d5-8784-7a677422339e", "DetectTime": "2024-05-21T12:57:07.134519+00:00", "EventTime": "2024-05-21T12:57:07.134544+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1, "Source": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "Multiple empty HTTP connections to google.com threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6yJSKt7K3DYLYB5", "Cg89a94KO550zKEZk1", "COL8wRu4KoqR6AVRi", "CRbbCe411t4AKopDCl"], "accumulated_threat_level": 0.5, "timewindow": 250} +{"Format": "IDEA0", "ID": "cd51fa8b-8d3f-4275-bb29-aef03ee5d2dd", "DetectTime": "2024-05-21T12:57:07.403642+00:00", "EventTime": "2024-05-21T12:57:07.403665+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYJdFq3t6BsTyOBDe2"], "accumulated_threat_level": 0, "timewindow": 204} +{"Format": "IDEA0", "ID": "1fa399b3-34aa-4679-a46c-1d62c48a6797", "DetectTime": "2024-05-21T12:57:07.471640+00:00", "EventTime": "2024-05-21T12:57:07.471663+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci18Xq28HZ3mTLM5Z1"], "accumulated_threat_level": 0, "timewindow": 204} +{"Format": "IDEA0", "ID": "bfd334af-96e9-43a8-ad3d-5d52fcc3e81f", "DetectTime": "2024-05-21T12:57:07.503890+00:00", "EventTime": "2024-05-21T12:57:07.503912+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CadiQXHpUJNc0jTWg"], "accumulated_threat_level": 0, "timewindow": 204} +{"Format": "IDEA0", "ID": "02747123-6acf-41ef-961c-ae2e27170f39", "DetectTime": "2024-05-21T12:57:07.509778+00:00", "EventTime": "2024-05-21T12:57:07.509799+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtHhU72AmodrN6ktsk"], "accumulated_threat_level": 0, "timewindow": 204} +{"Format": "IDEA0", "ID": "523909b9-3859-4b44-a7f6-a3a031da5547", "DetectTime": "2024-05-21T12:57:07.515310+00:00", "EventTime": "2024-05-21T12:57:07.515328+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbSfJl3QymyExBqh28"], "accumulated_threat_level": 0, "timewindow": 204} +{"Format": "IDEA0", "ID": "8642a5c8-0f02-4102-9f4e-1abe36c6dcb6", "DetectTime": "2024-05-21T12:57:07.527415+00:00", "EventTime": "2024-05-21T12:57:07.527447+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0o8aJ1Bz2QJinXGQ8"], "accumulated_threat_level": 0.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "d05c5103-ea63-44e8-aea6-06722f72db6c", "DetectTime": "2024-05-21T12:57:07.957204+00:00", "EventTime": "2024-05-21T12:57:07.957222+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cp1FNB3YnFbWYgWMO8"], "accumulated_threat_level": 0.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "815e8d36-ed7b-436c-932b-29d2d9bc4eb5", "DetectTime": "2024-05-21T12:57:08.013744+00:00", "EventTime": "2024-05-21T12:57:08.013766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CT2LPx1YJolLBokRW"], "accumulated_threat_level": 0.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "ce64ce0b-dd2f-4ae8-903c-527276e632b9", "DetectTime": "2024-05-21T12:57:08.061101+00:00", "EventTime": "2024-05-21T12:57:08.061135+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhIle1r9uUNP4mrOd"], "accumulated_threat_level": 1.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "ce3e1f2b-fe47-4e92-b956-6f6e660205be", "DetectTime": "2024-05-21T12:57:08.112620+00:00", "EventTime": "2024-05-21T12:57:08.112653+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfFmCd14iDW51yELGj"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 204} +{"Format": "IDEA0", "ID": "e462a12a-c8a7-4812-8cce-e02711c7c362", "DetectTime": "2024-05-21T12:57:08.166971+00:00", "EventTime": "2024-05-21T12:57:08.166990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV3n683JmKVOSdIDL"], "accumulated_threat_level": 3.2, "timewindow": 204} +{"Format": "IDEA0", "ID": "4625e4d0-4b2b-41c2-bbda-7de8b5274b94", "DetectTime": "2024-05-21T12:57:08.223108+00:00", "EventTime": "2024-05-21T12:57:08.223130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRZtyan8BkAPG8Mk"], "accumulated_threat_level": 4.0, "timewindow": 204} +{"Format": "IDEA0", "ID": "862d8241-0419-4fbc-af65-920a478795a8", "DetectTime": "2024-05-21T12:57:08.505007+00:00", "EventTime": "2024-05-21T12:57:08.505026+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKnPZ1ZYgerrl5EHi"], "accumulated_threat_level": 4.8, "timewindow": 204} +{"Format": "IDEA0", "ID": "d57c1587-f9f8-4a4e-9b8a-0c582710baae", "DetectTime": "2024-05-21T12:57:08.555831+00:00", "EventTime": "2024-05-21T12:57:08.555853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXUeY1MFaQiXWtJo8"], "accumulated_threat_level": 5.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "dd0a7d05-99bb-49a4-891c-f1037f1607b8", "DetectTime": "2024-05-21T12:57:08.595508+00:00", "EventTime": "2024-05-21T12:57:08.595530+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLQv1F2sGckCVxuare"], "accumulated_threat_level": 5.6, "timewindow": 204} +{"Format": "IDEA0", "ID": "80175b4d-6b7d-4a7c-bb9c-362d1a1365ed", "DetectTime": "2024-05-21T12:57:08.643030+00:00", "EventTime": "2024-05-21T12:57:08.643048+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CseJk6PnRf2DFSJsh"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 204} +{"Format": "IDEA0", "ID": "6e146f7c-2534-4ce9-980a-332032dd566e", "DetectTime": "2024-05-21T12:57:08.696928+00:00", "EventTime": "2024-05-21T12:57:08.696947+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrRxjD2wm61TtFv8e3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "b7c1f950-0a97-427a-bf34-f227d09c9237", "DetectTime": "2024-05-21T12:57:08.786858+00:00", "EventTime": "2024-05-21T12:57:08.786877+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDn2J2Nwv4XKx5st2"], "accumulated_threat_level": 1.324, "timewindow": 205} +{"Format": "IDEA0", "ID": "2126cbba-b7f2-402f-b911-9cfcb74bceff", "DetectTime": "2024-05-21T12:57:09.067888+00:00", "EventTime": "2024-05-21T12:57:09.067908+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXKhy1MLnXiIypYik"], "accumulated_threat_level": 2.124, "timewindow": 205} +{"Format": "IDEA0", "ID": "a3a26cc8-5df3-4c9a-86aa-a17b501f51d6", "DetectTime": "2024-05-21T12:57:09.208004+00:00", "EventTime": "2024-05-21T12:57:09.208022+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdqN6V2HzY6IwFA4"], "accumulated_threat_level": 2.9240000000000004, "timewindow": 205} +{"Format": "IDEA0", "ID": "e7028ff1-0b0d-4121-984f-22ec5a5eed81", "DetectTime": "2024-05-21T12:57:09.261246+00:00", "EventTime": "2024-05-21T12:57:09.261266+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9u7ho37dbCq7Pas5j"], "accumulated_threat_level": 3.724, "timewindow": 205} +{"Format": "IDEA0", "ID": "cac0e642-6b38-4d5b-abec-9ac9be83879e", "DetectTime": "2024-05-21T12:57:09.306239+00:00", "EventTime": "2024-05-21T12:57:09.306260+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJ29Ko3XvysDK3Fvd7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "83c363fb-b537-4546-84ab-0658c92cb8ba", "DetectTime": "2024-05-21T12:57:09.357479+00:00", "EventTime": "2024-05-21T12:57:09.357500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUSA6y47fyjCZYw0ei"], "accumulated_threat_level": 4.524, "timewindow": 205} +{"Format": "IDEA0", "ID": "f58b3207-0bbb-4069-949a-bf50ecb78a34", "DetectTime": "2024-05-21T12:57:09.409847+00:00", "EventTime": "2024-05-21T12:57:09.409866+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COatjPM97FSwvOjg6"], "accumulated_threat_level": 5.324, "timewindow": 205} +{"Format": "IDEA0", "ID": "d623535d-09f6-4e3e-a5ae-0a2f41f55c46", "DetectTime": "2024-05-21T12:57:09.463165+00:00", "EventTime": "2024-05-21T12:57:09.463184+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FGkY2hUzQSq97OX6"], "accumulated_threat_level": 6.124, "timewindow": 205} +{"Format": "IDEA0", "ID": "4c9b8e14-14d4-4074-8dce-02eb865289b4", "DetectTime": "2024-05-21T12:57:09.729469+00:00", "EventTime": "2024-05-21T12:57:09.729488+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQ9S04Gx2XfgbqA8h"], "accumulated_threat_level": 6.9239999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "032cfad6-1b26-4fe9-b5aa-eafcde874dc6", "DetectTime": "2024-05-21T12:57:09.796829+00:00", "EventTime": "2024-05-21T12:57:09.796847+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3xTT1qMyfjBf9fFb"], "accumulated_threat_level": 7.723999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "d6064c75-8457-4926-89ff-c072e5be4b95", "DetectTime": "2024-05-21T12:57:09.850150+00:00", "EventTime": "2024-05-21T12:57:09.850172+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJEvX7wzdoDbFvQT8"], "accumulated_threat_level": 8.524, "timewindow": 205} +{"Format": "IDEA0", "ID": "7750dcd9-923e-4917-be26-434dcb25504f", "DetectTime": "2024-05-21T12:57:09.904351+00:00", "EventTime": "2024-05-21T12:57:09.904372+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVM5Y28WHUmFMvz2a"], "accumulated_threat_level": 9.324, "timewindow": 205} +{"Format": "IDEA0", "ID": "3d1267f8-f862-440a-85ac-1447b0f30a44", "DetectTime": "2024-05-21T12:57:09.962229+00:00", "EventTime": "2024-05-21T12:57:09.962250+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0eVor3wzIjJBTNh88"], "accumulated_threat_level": 10.124, "timewindow": 205} +{"Format": "IDEA0", "ID": "d43119fc-6bd1-4a09-94ca-30e796b1d075", "DetectTime": "2024-05-21T12:57:10.249220+00:00", "EventTime": "2024-05-21T12:57:10.249243+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwRnl11WDsNK46QML2"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "b3e5351b-eb54-488c-9f95-b8e4c39a604c", "DetectTime": "2024-05-21T12:57:10.274898+00:00", "EventTime": "2024-05-21T12:57:10.274924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyaItI1iITKIY1CGrc"], "accumulated_threat_level": 10.924000000000001, "timewindow": 205} +{"Format": "IDEA0", "ID": "dfedd6a2-2009-4797-b8eb-51cf072efb90", "DetectTime": "2024-05-21T12:57:10.358009+00:00", "EventTime": "2024-05-21T12:57:10.358033+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2myc42x65rjrhBsf"], "accumulated_threat_level": 11.724000000000002, "timewindow": 205} +{"Format": "IDEA0", "ID": "7ea1b993-94fa-44e8-bac1-7c97d91535cc", "DetectTime": "2024-05-21T12:57:10.412984+00:00", "EventTime": "2024-05-21T12:57:10.413003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoj2xuOWLY0o4G0c"], "accumulated_threat_level": 12.524000000000003, "timewindow": 205} +{"Format": "Json", "ID": "7ea1b993-94fa-44e8-bac1-7c97d91535cc", "DetectTime": "2024-05-21T12:57:10.412984+00:00", "EventTime": "2024-05-21T12:57:10.413003+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-09T12:16:03.166926+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2024/05/21 12:57:10.833161)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.524000000000003, "timewindow": 205, "profileid": "profile_10.0.2.19", "threat_level": 12.524000000000003} +{"Format": "IDEA0", "ID": "0f414eb5-0205-4937-9146-c06bde63bad8", "DetectTime": "2024-05-21T12:57:10.846444+00:00", "EventTime": "2024-05-21T12:57:10.846464+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTpIeVF6oEuFbEmj"], "accumulated_threat_level": 0.8, "timewindow": 205} +{"Format": "IDEA0", "ID": "1a251c82-6757-4069-9781-27a24d44f38b", "DetectTime": "2024-05-21T12:57:10.857489+00:00", "EventTime": "2024-05-21T12:57:10.857507+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvEhu1IDnYId5kEue"], "accumulated_threat_level": 1.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "6c032f87-22d9-4619-9b52-207de9deba6a", "DetectTime": "2024-05-21T12:57:10.880994+00:00", "EventTime": "2024-05-21T12:57:10.881014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChaNFX14nWjQtyaCf"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "14aa07e8-3bca-4d39-b07f-562ec418cd56", "DetectTime": "2024-05-21T12:57:10.927089+00:00", "EventTime": "2024-05-21T12:57:10.927113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csa83B6vO9w0TPOs6"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 205} +{"Format": "IDEA0", "ID": "93795d17-5b0f-47d5-93a7-af1ee596c6fc", "DetectTime": "2024-05-21T12:57:10.985427+00:00", "EventTime": "2024-05-21T12:57:10.985448+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmfyGM2jUhcGoVGWqj"], "accumulated_threat_level": 3.2, "timewindow": 205} +{"Format": "IDEA0", "ID": "15eb0dd3-c5e7-4957-93d3-6f7b7a680206", "DetectTime": "2024-05-21T12:57:11.045190+00:00", "EventTime": "2024-05-21T12:57:11.045213+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckda2G15VrNdWhQBVe"], "accumulated_threat_level": 4.0, "timewindow": 205} +{"Format": "IDEA0", "ID": "9abdf492-7488-4246-bc3a-11202f358f8f", "DetectTime": "2024-05-21T12:57:11.100529+00:00", "EventTime": "2024-05-21T12:57:11.100561+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYm86y34c29NTBK5J2"], "accumulated_threat_level": 4.8, "timewindow": 205} +{"Format": "IDEA0", "ID": "d951e413-a747-4c1a-9af3-b880bf445f08", "DetectTime": "2024-05-21T12:57:11.155977+00:00", "EventTime": "2024-05-21T12:57:11.156014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8VdRT3nRD39sZYOvj"], "accumulated_threat_level": 5.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "f721de50-354e-4114-ae7b-99f8762cfe4a", "DetectTime": "2024-05-21T12:57:11.417449+00:00", "EventTime": "2024-05-21T12:57:11.417471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx6fQw3eexir8GpD8b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "a0565bb3-af87-49c8-ad67-dec867dbcbfc", "DetectTime": "2024-05-21T12:57:11.472371+00:00", "EventTime": "2024-05-21T12:57:11.472389+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UeI13RWS0WMSlkC7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "120215ff-6a83-4ac5-a30f-132ed24976fa", "DetectTime": "2024-05-21T12:57:11.534358+00:00", "EventTime": "2024-05-21T12:57:11.534380+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czugg02rZDy1zAq4Yk"], "accumulated_threat_level": 7.999999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "b5fbca02-b493-4807-b21e-d6f7d56aba68", "DetectTime": "2024-05-21T12:57:11.579906+00:00", "EventTime": "2024-05-21T12:57:11.579924+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6Ubi3Fr3uE1JIVXl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "6824e5e4-f038-4d7d-812e-c67f042f18e1", "DetectTime": "2024-05-21T12:57:11.639478+00:00", "EventTime": "2024-05-21T12:57:11.639497+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchW5l2Ff1df89pACl"], "accumulated_threat_level": 9.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "5b7d803f-00dc-458b-9beb-8102c6f38c3a", "DetectTime": "2024-05-21T12:57:11.940880+00:00", "EventTime": "2024-05-21T12:57:11.940899+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8vsyoAOPm7F6cR7b"], "accumulated_threat_level": 10.4, "timewindow": 205} +{"Format": "IDEA0", "ID": "d696d07b-7cd8-4cb8-99f3-3a80207f9822", "DetectTime": "2024-05-21T12:57:12.069954+00:00", "EventTime": "2024-05-21T12:57:12.069977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvJVh4cTvfADlMw1f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 205} +{"Format": "IDEA0", "ID": "3a90bdf1-b8d8-471b-8f6a-e7ea13bab077", "DetectTime": "2024-05-21T12:57:12.143228+00:00", "EventTime": "2024-05-21T12:57:12.143246+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4N3vzjdcMoeCVT7"], "accumulated_threat_level": 12.000000000000002, "timewindow": 205} +{"Format": "Json", "ID": "3a90bdf1-b8d8-471b-8f6a-e7ea13bab077", "DetectTime": "2024-05-21T12:57:12.143228+00:00", "EventTime": "2024-05-21T12:57:12.143246+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "1970-01-09T12:46:56.203374+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2024/05/21 12:57:12.304440)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 205, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "2896577b-63c7-4143-b590-9612c7ba6ba2", "DetectTime": "2024-05-21T12:57:12.377201+00:00", "EventTime": "2024-05-21T12:57:12.377231+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09IEGrZkia5b0BX6"], "accumulated_threat_level": 0.8, "timewindow": 205} +{"Format": "IDEA0", "ID": "e84e341f-4aee-4503-943b-f907ad7fab66", "DetectTime": "2024-05-21T12:57:12.390096+00:00", "EventTime": "2024-05-21T12:57:12.390122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDAMB3FqgbgTWva8c"], "accumulated_threat_level": 1.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "5f9d4cbd-c4cb-44bc-9393-442c1ba6ba2e", "DetectTime": "2024-05-21T12:57:12.411619+00:00", "EventTime": "2024-05-21T12:57:12.411657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4qW64CdOtUS7lKy7"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 205} +{"Format": "IDEA0", "ID": "5c6f2682-9540-424f-a49d-9876611d97c8", "DetectTime": "2024-05-21T12:57:12.690556+00:00", "EventTime": "2024-05-21T12:57:12.690590+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGRlhR9qPp6tTcbd"], "accumulated_threat_level": 3.2, "timewindow": 205} +{"Format": "IDEA0", "ID": "2ad2a244-c3c5-4a9c-86ae-d7a195f72be9", "DetectTime": "2024-05-21T12:57:12.745708+00:00", "EventTime": "2024-05-21T12:57:12.745741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUPmd4TiYGeh4IQUg"], "accumulated_threat_level": 4.0, "timewindow": 205} +{"Format": "IDEA0", "ID": "37aaeaf9-eb89-4383-a412-c4199865a3d5", "DetectTime": "2024-05-21T12:57:12.799330+00:00", "EventTime": "2024-05-21T12:57:12.799362+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4qkPq4hse8YO5ps3h"], "accumulated_threat_level": 4.8, "timewindow": 205} +{"Format": "IDEA0", "ID": "3042ffe9-04df-41fc-9132-384732c89516", "DetectTime": "2024-05-21T12:57:12.844205+00:00", "EventTime": "2024-05-21T12:57:12.844228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cf7eUY1oujBV3ZSzxe"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "13297516-d99e-47d3-a1de-2a454e04d1d2", "DetectTime": "2024-05-21T12:57:12.894240+00:00", "EventTime": "2024-05-21T12:57:12.894273+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1f2t1bCLgeSejDNi"], "accumulated_threat_level": 5.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "2e8331d2-aac0-4766-90f3-8ba6a56f14c4", "DetectTime": "2024-05-21T12:57:12.948097+00:00", "EventTime": "2024-05-21T12:57:12.948127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkUdV23LDlBfQWktRj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "db6d5a1e-3806-455c-820d-5e4bcec9a233", "DetectTime": "2024-05-21T12:57:13.202875+00:00", "EventTime": "2024-05-21T12:57:13.202911+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0myzWgQG3VPsoC7"], "accumulated_threat_level": 7.199999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "11586371-c66f-4801-b5b2-df994dced74c", "DetectTime": "2024-05-21T12:57:13.269388+00:00", "EventTime": "2024-05-21T12:57:13.269426+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV9tiF0a9RkunQ6Vg"], "accumulated_threat_level": 7.999999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "d148fe8c-68cc-4b74-8bfb-193e1971f439", "DetectTime": "2024-05-21T12:57:13.312780+00:00", "EventTime": "2024-05-21T12:57:13.312802+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPLFn34RpL8zolj97"], "accumulated_threat_level": 8.799999999999999, "timewindow": 205} +{"Format": "IDEA0", "ID": "c00b8147-6ddd-406b-bfc4-d8ec9bbfa3bb", "DetectTime": "2024-05-21T12:57:13.369933+00:00", "EventTime": "2024-05-21T12:57:13.369954+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpzd4G13HReZ9nPYX1"], "accumulated_threat_level": 9.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "dd5bf7ab-28ad-4813-95a3-bf485d3b6ae4", "DetectTime": "2024-05-21T12:57:13.421851+00:00", "EventTime": "2024-05-21T12:57:13.421871+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKcQEV1gTfnTesFksf"], "accumulated_threat_level": 10.4, "timewindow": 205} +{"Format": "IDEA0", "ID": "701a65fe-4277-4bf0-ad41-406f3b7322aa", "DetectTime": "2024-05-21T12:57:13.471859+00:00", "EventTime": "2024-05-21T12:57:13.471878+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41LNA3XTIbLKsw0f"], "accumulated_threat_level": 11.200000000000001, "timewindow": 205} +{"Format": "IDEA0", "ID": "de069e1c-39ec-4d92-bd0d-a79640209a10", "DetectTime": "2024-05-21T12:57:13.525945+00:00", "EventTime": "2024-05-21T12:57:13.525987+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvUdz4Y2Jc8hvnXni"], "accumulated_threat_level": 12.000000000000002, "timewindow": 205} +{"Format": "Json", "ID": "de069e1c-39ec-4d92-bd0d-a79640209a10", "DetectTime": "2024-05-21T12:57:13.525945+00:00", "EventTime": "2024-05-21T12:57:13.525987+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "1970-01-09T12:47:00.326257+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 205. (real time 2024/05/21 12:57:13.755336)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 205, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "464e6702-81ac-4346-a141-2c58e223fee0", "DetectTime": "2024-05-21T12:57:13.789027+00:00", "EventTime": "2024-05-21T12:57:13.789057+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkQqV116Aw3OAkz3m7"], "accumulated_threat_level": 0.8, "timewindow": 205} +{"Format": "IDEA0", "ID": "7d562192-c70e-4500-a347-7d70b030e6bf", "DetectTime": "2024-05-21T12:57:13.847112+00:00", "EventTime": "2024-05-21T12:57:13.847139+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4KspkqHdMfewkyK2"], "accumulated_threat_level": 1.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "6e8c90c3-2a75-4b44-99e2-a14ffa1e2e69", "DetectTime": "2024-05-21T12:57:13.906887+00:00", "EventTime": "2024-05-21T12:57:13.906921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C94Rkr2ATkZ9nyDtaf"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 205} +{"Format": "IDEA0", "ID": "10ea2908-8eeb-42f5-9362-ed0a4178c8dc", "DetectTime": "2024-05-21T12:57:13.961269+00:00", "EventTime": "2024-05-21T12:57:13.961305+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2dgad3PZTP7HhZ3wf"], "accumulated_threat_level": 3.2, "timewindow": 205} +{"Format": "IDEA0", "ID": "0de39e51-6f21-476f-8923-6e8b621d03cb", "DetectTime": "2024-05-21T12:57:14.012105+00:00", "EventTime": "2024-05-21T12:57:14.012146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwKvCS2l1i2wdaekOd"], "accumulated_threat_level": 4.0, "timewindow": 205} +{"Format": "IDEA0", "ID": "811b2432-0e6a-416f-9b26-1dbccf875d49", "DetectTime": "2024-05-21T12:57:14.070811+00:00", "EventTime": "2024-05-21T12:57:14.070848+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2MGXI1ZO0FmxEI65f"], "accumulated_threat_level": 4.8, "timewindow": 205} +{"Format": "IDEA0", "ID": "19791b49-6d86-45de-9bcc-04b1fcff9b79", "DetectTime": "2024-05-21T12:57:14.115449+00:00", "EventTime": "2024-05-21T12:57:14.115471+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cr5fXwXFfW88azPX5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "80f08a12-9618-440d-a1c1-d1421fe2f56b", "DetectTime": "2024-05-21T12:57:14.162238+00:00", "EventTime": "2024-05-21T12:57:14.162268+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQAnTD3RuDvBhCtQ64"], "accumulated_threat_level": 5.6, "timewindow": 205} +{"Format": "IDEA0", "ID": "f81a9301-4671-46b8-ac60-05b1fc9b766d", "DetectTime": "2024-05-21T12:57:14.220112+00:00", "EventTime": "2024-05-21T12:57:14.220147+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPbzPZvI8bPUXrFge"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "5006c379-5563-4c61-8d0e-374b5826c969", "DetectTime": "2024-05-21T12:57:14.500470+00:00", "EventTime": "2024-05-21T12:57:14.500487+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUy7ykiUIOirvCNab"], "accumulated_threat_level": 0.8240000000000001, "timewindow": 206} +{"Format": "IDEA0", "ID": "b88aa9e1-492c-475c-9e9d-9a3f9f1f9f8a", "DetectTime": "2024-05-21T12:57:14.578393+00:00", "EventTime": "2024-05-21T12:57:14.578430+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBCZDF4EOdJa9pMd9"], "accumulated_threat_level": 1.624, "timewindow": 206} +{"Format": "IDEA0", "ID": "e5057fd6-8d02-4d59-b2c7-748779e1245c", "DetectTime": "2024-05-21T12:57:14.627863+00:00", "EventTime": "2024-05-21T12:57:14.627882+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkkGwn1CqjwNfhg8E8"], "accumulated_threat_level": 2.4240000000000004, "timewindow": 206} +{"Format": "IDEA0", "ID": "5d023334-5d59-4c04-84fe-ac2d36175880", "DetectTime": "2024-05-21T12:57:14.682040+00:00", "EventTime": "2024-05-21T12:57:14.682061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CZnjEe4XMDgjuin33h"], "accumulated_threat_level": 3.224, "timewindow": 206} +{"Format": "IDEA0", "ID": "9b15f3c9-06d9-47d4-baea-9e05f106e8f2", "DetectTime": "2024-05-21T12:57:14.751993+00:00", "EventTime": "2024-05-21T12:57:14.752012+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cs8Tk64c4wIEJ71J81"], "accumulated_threat_level": 4.024, "timewindow": 206} +{"Format": "IDEA0", "ID": "e6966d33-9a2a-4a3f-8d62-16a9c7f195cf", "DetectTime": "2024-05-21T12:57:14.813282+00:00", "EventTime": "2024-05-21T12:57:14.813299+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFpEFUy96abjIFpL5"], "accumulated_threat_level": 4.824, "timewindow": 206} +{"Format": "IDEA0", "ID": "7fc4f4d5-84d2-4ba3-a05c-ec3dbc763ba4", "DetectTime": "2024-05-21T12:57:14.862761+00:00", "EventTime": "2024-05-21T12:57:14.862779+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6LtxSVaZ7mlaZiUh"], "accumulated_threat_level": 5.624, "timewindow": 206} +{"Format": "IDEA0", "ID": "10e13104-b027-4db5-9d63-ead8e050a1fb", "DetectTime": "2024-05-21T12:57:14.918609+00:00", "EventTime": "2024-05-21T12:57:14.918647+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqzXkR2xizJbV1iMA4"], "accumulated_threat_level": 6.4239999999999995, "timewindow": 206} +{"Format": "IDEA0", "ID": "4490db77-77f3-41ba-b375-e908942f3c39", "DetectTime": "2024-05-21T12:57:15.132057+00:00", "EventTime": "2024-05-21T12:57:15.132077+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["37.32.176.169"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9OWo338l2qx1hVB1"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "d5dc311f-a069-4ab0-a9c8-12ae5d5a3c23", "DetectTime": "2024-05-21T12:57:15.146318+00:00", "EventTime": "2024-05-21T12:57:15.146341+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["37.32.176.169"]}], "Attach": [{"Content": "connection to blacklisted IP: 37.32.176.169 from 10.0.2.19. AS: GR-NET www.grnet.gr, GR AS5408 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD9OWo338l2qx1hVB1"], "accumulated_threat_level": 11.6, "timewindow": 45} +{"Format": "IDEA0", "ID": "58640361-ebf0-402b-8d8e-2aa9ac16f6d5", "DetectTime": "2024-05-21T12:57:15.191007+00:00", "EventTime": "2024-05-21T12:57:15.191028+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cnz8tA4jVlPnTeyfxg"], "accumulated_threat_level": 7.223999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "c07a3cf0-124f-427a-880b-3a143e532730", "DetectTime": "2024-05-21T12:57:15.240050+00:00", "EventTime": "2024-05-21T12:57:15.240074+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Co8RaZz6zifnCFJqj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "43e2a776-62ca-497a-9c7a-55fd3663cf30", "DetectTime": "2024-05-21T12:57:15.290871+00:00", "EventTime": "2024-05-21T12:57:15.290905+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ce5Nbl2ViPxquCb3Qg"], "accumulated_threat_level": 8.024, "timewindow": 206} +{"Format": "IDEA0", "ID": "1f5a7640-aa40-4d62-9f36-5ba57343191e", "DetectTime": "2024-05-21T12:57:15.333267+00:00", "EventTime": "2024-05-21T12:57:15.333290+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["86.149.223.80"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm7Li146f42djS7b7"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "e7c042d5-5d19-4bb8-9a00-43be23827504", "DetectTime": "2024-05-21T12:57:15.348957+00:00", "EventTime": "2024-05-21T12:57:15.348997+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "connection to blacklisted IP: 86.149.223.80 from 10.0.2.19. AS: BT-UK-AS BTnet UK Regional network, GB AS2856 rDNS: host86-149-223-80.range86-149.btcentralplus.com Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ctm7Li146f42djS7b7"], "accumulated_threat_level": 12.1, "timewindow": 45} +{"Format": "Json", "ID": "e7c042d5-5d19-4bb8-9a00-43be23827504", "DetectTime": "2024-05-21T12:57:15.348957+00:00", "EventTime": "2024-05-21T12:57:15.348997+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["86.149.223.80"]}], "Attach": [{"Content": "1970-01-02T20:43:45.566705+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 45. (real time 2024/05/21 12:57:15.766774)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.1, "timewindow": 45, "profileid": "profile_10.0.2.19", "threat_level": 12.1} +{"Format": "IDEA0", "ID": "3b3affc3-f21d-460d-a22d-a99c9d4929f5", "DetectTime": "2024-05-21T12:57:15.777895+00:00", "EventTime": "2024-05-21T12:57:15.777918+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJqPRw4tWMTzxDBET7"], "accumulated_threat_level": 8.824, "timewindow": 206} +{"Format": "IDEA0", "ID": "287dcabe-c78c-406c-9fea-859bb65c9fae", "DetectTime": "2024-05-21T12:57:15.789867+00:00", "EventTime": "2024-05-21T12:57:15.789890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNqKzLzCPfjrt3ix9"], "accumulated_threat_level": 9.624, "timewindow": 206} +{"Format": "IDEA0", "ID": "ee139142-a4e6-457e-bac1-7d437dc1a2c5", "DetectTime": "2024-05-21T12:57:15.807622+00:00", "EventTime": "2024-05-21T12:57:15.807655+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C513Ke1mHrKH6flQKh"], "accumulated_threat_level": 10.424000000000001, "timewindow": 206} +{"Format": "IDEA0", "ID": "aa9a57ac-59f5-492b-a5a5-e3f5e82fd871", "DetectTime": "2024-05-21T12:57:15.833087+00:00", "EventTime": "2024-05-21T12:57:15.833106+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cz1zIJ3lRWAvJtJFZ5"], "accumulated_threat_level": 11.224000000000002, "timewindow": 206} +{"Format": "IDEA0", "ID": "d8b4b2be-328d-4a16-b3aa-b597d346249c", "DetectTime": "2024-05-21T12:57:15.845599+00:00", "EventTime": "2024-05-21T12:57:15.845617+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CR7DMs17QqvEHRFrk"], "accumulated_threat_level": 12.024000000000003, "timewindow": 206} +{"Format": "Json", "ID": "d8b4b2be-328d-4a16-b3aa-b597d346249c", "DetectTime": "2024-05-21T12:57:15.845599+00:00", "EventTime": "2024-05-21T12:57:15.845617+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-09T13:17:19.276315+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2024/05/21 12:57:16.028210)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.024000000000003, "timewindow": 206, "profileid": "profile_10.0.2.19", "threat_level": 12.024000000000003} +{"Format": "IDEA0", "ID": "547ff5d8-eb9a-43bd-ae36-ac91770c545d", "DetectTime": "2024-05-21T12:57:16.040239+00:00", "EventTime": "2024-05-21T12:57:16.040262+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["71.63.188.231"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPoWN1gaEZaOuccz5"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "65488ca1-20b7-4a2d-b85e-55dc1ed3394d", "DetectTime": "2024-05-21T12:57:16.055391+00:00", "EventTime": "2024-05-21T12:57:16.055412+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["71.63.188.231"]}], "Attach": [{"Content": "connection to blacklisted IP: 71.63.188.231 from 10.0.2.19. AS: COMCAST-7922, US AS7922 rDNS: c-71-63-188-231.hsd1.or.comcast.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPoWN1gaEZaOuccz5"], "accumulated_threat_level": 0.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "95f86d1f-deee-4160-9b7b-7d788bc3d784", "DetectTime": "2024-05-21T12:57:16.069663+00:00", "EventTime": "2024-05-21T12:57:16.069686+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cmn3HD17TeQeJ070wh"], "accumulated_threat_level": 0.8, "timewindow": 206} +{"Format": "IDEA0", "ID": "f75acd4d-c2db-4693-8018-5b7ab028b455", "DetectTime": "2024-05-21T12:57:16.083572+00:00", "EventTime": "2024-05-21T12:57:16.083605+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cc9QsS1B4YpY0Vy1qf"], "accumulated_threat_level": 1.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "a1575bf2-a002-45d6-b575-d3513d5426c7", "DetectTime": "2024-05-21T12:57:16.098429+00:00", "EventTime": "2024-05-21T12:57:16.098447+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["187.250.72.187"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8jqO3KP9StlphrYc"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "d70a5bf0-2fca-4b20-abe8-b9328b09c016", "DetectTime": "2024-05-21T12:57:16.112066+00:00", "EventTime": "2024-05-21T12:57:16.112084+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["187.250.72.187"]}], "Attach": [{"Content": "connection to blacklisted IP: 187.250.72.187 from 10.0.2.19. AS: UNINET, MX AS8151 rDNS: 187.250.72.187.dsl.dyn.telnor.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cb8jqO3KP9StlphrYc"], "accumulated_threat_level": 1.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "1dacf7cb-27b8-451a-a35c-a21e47b824ca", "DetectTime": "2024-05-21T12:57:16.124641+00:00", "EventTime": "2024-05-21T12:57:16.124660+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CRHOAb1RBhQgu8cNc9"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 206} +{"Format": "IDEA0", "ID": "5de98807-9694-46ae-96a3-4866745993f5", "DetectTime": "2024-05-21T12:57:16.137306+00:00", "EventTime": "2024-05-21T12:57:16.137327+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYAQrg4a1nTLMj8kO9"], "accumulated_threat_level": 3.2, "timewindow": 206} +{"Format": "IDEA0", "ID": "69a0fef7-6518-4527-82fb-4812b9ff7d85", "DetectTime": "2024-05-21T12:57:16.150266+00:00", "EventTime": "2024-05-21T12:57:16.150286+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrIIkKFortChW04O3"], "accumulated_threat_level": 4.0, "timewindow": 206} +{"Format": "IDEA0", "ID": "bb4b0673-ef4e-44c5-a62b-d4668e7238d7", "DetectTime": "2024-05-21T12:57:16.164075+00:00", "EventTime": "2024-05-21T12:57:16.164092+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.49.74.62"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWIQql4hSqzemOYH4"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "83a568b3-006b-4d81-99d2-e97e2d043c31", "DetectTime": "2024-05-21T12:57:16.176965+00:00", "EventTime": "2024-05-21T12:57:16.176983+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.49.74.62"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.49.74.62 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWIQql4hSqzemOYH4"], "accumulated_threat_level": 1.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "78f314a6-d53b-44b5-bcdc-9af6ba471029", "DetectTime": "2024-05-21T12:57:16.191270+00:00", "EventTime": "2024-05-21T12:57:16.191303+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYQZez2G00TGwD1286"], "accumulated_threat_level": 4.8, "timewindow": 206} +{"Format": "IDEA0", "ID": "ee450dee-c7a4-4033-bec1-efc3fc6c04ec", "DetectTime": "2024-05-21T12:57:16.206920+00:00", "EventTime": "2024-05-21T12:57:16.206940+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["105.236.59.147"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csi5QY3frJOmwl3QJf"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "cc4a6807-2db8-4749-9496-21caa143953a", "DetectTime": "2024-05-21T12:57:16.222630+00:00", "EventTime": "2024-05-21T12:57:16.222663+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["105.236.59.147"]}], "Attach": [{"Content": "connection to blacklisted IP: 105.236.59.147 from 10.0.2.19. AS: MTNNS-AS, ZA AS16637 rDNS: 105-236-59-147.access.mtnbusiness.co.za Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csi5QY3frJOmwl3QJf"], "accumulated_threat_level": 2.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "90e32c5a-be09-43aa-9128-aea48ebd4d16", "DetectTime": "2024-05-21T12:57:16.248860+00:00", "EventTime": "2024-05-21T12:57:16.248880+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["190.78.213.135"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy9yo56wHpp3yXIh"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "47749184-8bac-4518-a6b5-e1fafd351e42", "DetectTime": "2024-05-21T12:57:16.264584+00:00", "EventTime": "2024-05-21T12:57:16.264619+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["190.78.213.135"]}], "Attach": [{"Content": "connection to blacklisted IP: 190.78.213.135 from 10.0.2.19. AS: CANTV Servicios, Venezuela, VE AS8048 rDNS: 190-78-213-135.lms-01-p69.cantv.net Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COy9yo56wHpp3yXIh"], "accumulated_threat_level": 2.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "cba5899e-0d9d-4f9e-b2fe-54c1dadc0d10", "DetectTime": "2024-05-21T12:57:16.291370+00:00", "EventTime": "2024-05-21T12:57:16.291391+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["46.36.128.79"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbFXM34qCAl2g0gxf"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "ffa73b88-9d8a-44b8-93fb-3b0123d001ea", "DetectTime": "2024-05-21T12:57:16.306843+00:00", "EventTime": "2024-05-21T12:57:16.306869+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["46.36.128.79"]}], "Attach": [{"Content": "connection to blacklisted IP: 46.36.128.79 from 10.0.2.19. AS: ALMANET-AS, KZ AS39824 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbFXM34qCAl2g0gxf"], "accumulated_threat_level": 3.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "b2740a6a-782a-4ea5-969e-b37c1d0984f6", "DetectTime": "2024-05-21T12:57:16.333544+00:00", "EventTime": "2024-05-21T12:57:16.333564+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.178.190.233"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXk1ku2ZapskZXqXh5"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "eab9f0fd-54ff-480b-b60f-33ab0832eca1", "DetectTime": "2024-05-21T12:57:16.347739+00:00", "EventTime": "2024-05-21T12:57:16.347763+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.178.190.233"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.178.190.233 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXk1ku2ZapskZXqXh5"], "accumulated_threat_level": 3.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "e8b0fd59-cb4a-4f87-b5d5-16ae9ae508ed", "DetectTime": "2024-05-21T12:57:16.404512+00:00", "EventTime": "2024-05-21T12:57:16.404533+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVUjYe1KP2IsJdRtI5"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "7da4c00c-4d77-45aa-8694-dea6a1223035", "DetectTime": "2024-05-21T12:57:16.451828+00:00", "EventTime": "2024-05-21T12:57:16.451861+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGswBUyS7nxz708cj"], "accumulated_threat_level": 5.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "5a21ab22-1b88-4ec6-8ccd-28e7c48922d7", "DetectTime": "2024-05-21T12:57:16.502536+00:00", "EventTime": "2024-05-21T12:57:16.502571+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjHAIo4fcoWM0B0Mf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 206} +{"Format": "IDEA0", "ID": "02484859-9d3e-4b7b-9bec-643df76d2ec7", "DetectTime": "2024-05-21T12:57:16.534160+00:00", "EventTime": "2024-05-21T12:57:16.534180+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["93.183.130.8"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrxOBC3fSZv7bNAfZ7"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "4d75005e-0e87-46f8-8870-8f8994f93304", "DetectTime": "2024-05-21T12:57:16.548915+00:00", "EventTime": "2024-05-21T12:57:16.548939+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["93.183.130.8"]}], "Attach": [{"Content": "connection to blacklisted IP: 93.183.130.8 from 10.0.2.19. AS: ESCOMBG-AS Local Internet Service Provider Bulgaria, BG AS25374 rDNS: pop-130.8.escom.bg Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrxOBC3fSZv7bNAfZ7"], "accumulated_threat_level": 4.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "b1b9c488-93b6-4e3b-8a70-cbf5913b53e5", "DetectTime": "2024-05-21T12:57:16.561942+00:00", "EventTime": "2024-05-21T12:57:16.561974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPG2Dlq9AAwCDnLwa"], "accumulated_threat_level": 7.199999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "9e974525-847d-4994-be3c-75faa86a49b3", "DetectTime": "2024-05-21T12:57:16.612624+00:00", "EventTime": "2024-05-21T12:57:16.612657+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwNkcL22sInzrvadGe"], "accumulated_threat_level": 7.999999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "53e3cddd-6e77-4d2a-912d-dcb5108bff73", "DetectTime": "2024-05-21T12:57:16.666830+00:00", "EventTime": "2024-05-21T12:57:16.666863+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6x1gc4cwuvWgKmMwe"], "accumulated_threat_level": 8.799999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "8130c6b0-2998-472b-aa94-c9544ce1c9fd", "DetectTime": "2024-05-21T12:57:16.714303+00:00", "EventTime": "2024-05-21T12:57:16.714337+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnD69h3V9su93k31v6"], "accumulated_threat_level": 9.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "11156e57-2ff4-4b96-891e-58c7fe7a51a6", "DetectTime": "2024-05-21T12:57:16.747220+00:00", "EventTime": "2024-05-21T12:57:16.747243+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["5.20.80.35"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvd8Q2QslwiggkJw8"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "b158129a-f11d-49ef-9e84-a2afe6f390a5", "DetectTime": "2024-05-21T12:57:16.763523+00:00", "EventTime": "2024-05-21T12:57:16.763561+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["5.20.80.35"]}], "Attach": [{"Content": "connection to blacklisted IP: 5.20.80.35 from 10.0.2.19. AS: CGATES-AS, LT AS21412 rDNS: data-80-35.cgates.lt Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUvd8Q2QslwiggkJw8"], "accumulated_threat_level": 4.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "b82c28eb-8b87-43b4-a332-f83adf6b1ea3", "DetectTime": "2024-05-21T12:57:16.786763+00:00", "EventTime": "2024-05-21T12:57:16.786789+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COktJtZBoUDukvlr3"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "903868bf-b217-4014-ab67-0456a695e7f8", "DetectTime": "2024-05-21T12:57:16.803057+00:00", "EventTime": "2024-05-21T12:57:16.803089+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COktJtZBoUDukvlr3"], "accumulated_threat_level": 5.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "7a08cbcc-3992-4fe3-b6f0-08cabb5cc109", "DetectTime": "2024-05-21T12:57:16.908420+00:00", "EventTime": "2024-05-21T12:57:16.908440+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["65.131.138.134"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCpfD31m6e3vch18c"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "134d4b18-d987-4448-9498-ea88c645c622", "DetectTime": "2024-05-21T12:57:16.924736+00:00", "EventTime": "2024-05-21T12:57:16.924774+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["65.131.138.134"]}], "Attach": [{"Content": "connection to blacklisted IP: 65.131.138.134 from 10.0.2.19. AS: CENTURYLINK-US-LEGACY-QWEST, US AS209 rDNS: 65-131-138-134.sxct.qwest.net Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CnCpfD31m6e3vch18c"], "accumulated_threat_level": 5.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "33c59f52-9a93-409c-bb31-b4bcdca2eeb0", "DetectTime": "2024-05-21T12:57:17.008075+00:00", "EventTime": "2024-05-21T12:57:17.008113+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0TJmcPIGI2Vrt4Kl"], "accumulated_threat_level": 10.4, "timewindow": 206} +{"Format": "IDEA0", "ID": "041126af-fdd6-4ba9-96f6-d6a5fea6421d", "DetectTime": "2024-05-21T12:57:17.086734+00:00", "EventTime": "2024-05-21T12:57:17.086766+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvHa6i2J42Bpj42s7g"], "accumulated_threat_level": 11.200000000000001, "timewindow": 206} +{"Format": "IDEA0", "ID": "3fc9df72-e4d6-44ae-bc06-f9b257681b74", "DetectTime": "2024-05-21T12:57:17.136946+00:00", "EventTime": "2024-05-21T12:57:17.136980+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiL68V332hDG8UfTOi"], "accumulated_threat_level": 12.000000000000002, "timewindow": 206} +{"Format": "Json", "ID": "3fc9df72-e4d6-44ae-bc06-f9b257681b74", "DetectTime": "2024-05-21T12:57:17.136946+00:00", "EventTime": "2024-05-21T12:57:17.136980+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "1970-01-09T13:47:50.797743+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2024/05/21 12:57:17.333931)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 206, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "072fd294-a3c5-4b92-abbf-3ce279030d93", "DetectTime": "2024-05-21T12:57:17.347900+00:00", "EventTime": "2024-05-21T12:57:17.347920+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.137.169.235"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjSrh20IjxLzfoYLj"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "15767227-4a42-4f46-9305-da54038070da", "DetectTime": "2024-05-21T12:57:17.362136+00:00", "EventTime": "2024-05-21T12:57:17.362155+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.137.169.235"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.137.169.235 from 10.0.2.19. AS: MAGTICOMAS Magticom, GE AS16010 Description: IP is not expected be delivering unauthenticated SMTP email to any Internet mail server, such as dynamic and residential IP space. Source: PBL Spamhaus Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTjSrh20IjxLzfoYLj"], "accumulated_threat_level": 6.0, "timewindow": 45} +{"Format": "IDEA0", "ID": "ee07c588-2cfe-448b-9c25-a6fe5862c446", "DetectTime": "2024-05-21T12:57:17.374796+00:00", "EventTime": "2024-05-21T12:57:17.374815+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CGiii92l22lJayp7o7"], "accumulated_threat_level": 0.8, "timewindow": 206} +{"Format": "IDEA0", "ID": "3991729b-cf16-4ec7-8ea0-c49f9f3a7577", "DetectTime": "2024-05-21T12:57:17.386668+00:00", "EventTime": "2024-05-21T12:57:17.386688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxahvL1GFkPeF4uTyh"], "accumulated_threat_level": 1.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "8db3c973-dbbe-4a4b-a6aa-acaac76a1eb4", "DetectTime": "2024-05-21T12:57:17.400571+00:00", "EventTime": "2024-05-21T12:57:17.400589+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["94.71.97.115"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["10.0.2.19"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWfDTL1d02xHgJIM85"], "accumulated_threat_level": 0, "timewindow": 45} +{"Format": "IDEA0", "ID": "069a57f8-415e-44e2-93d4-376bb802ca5b", "DetectTime": "2024-05-21T12:57:17.414316+00:00", "EventTime": "2024-05-21T12:57:17.414335+00:00", "Category": ["Anomaly.Traffic"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"], "Type": ["BlacklistedIP"]}], "Target": [{"IP4": ["94.71.97.115"]}], "Attach": [{"Content": "connection to blacklisted IP: 94.71.97.115 from 10.0.2.19. AS: OTENET-GR Athens - Greece, GR AS6799 rDNS: athedsl-4465027.home.otenet.gr Description: IP address should not -according to the ISP controlling it- be delivering unauthenticated SMTP email to any Internet mail server. Source: PBL ISP Maintained, spamhaus. threat level: medium.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWfDTL1d02xHgJIM85"], "accumulated_threat_level": 6.5, "timewindow": 45} +{"Format": "IDEA0", "ID": "59e0a4f6-8242-4c98-bb14-11e9094f1555", "DetectTime": "2024-05-21T12:57:17.431353+00:00", "EventTime": "2024-05-21T12:57:17.431376+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTTPZ51WQ6Dq9hz1Hg"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 206} +{"Format": "IDEA0", "ID": "f4a66c4b-50db-4a14-ade0-1b3e0d062c14", "DetectTime": "2024-05-21T12:57:17.591945+00:00", "EventTime": "2024-05-21T12:57:17.591974+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CdTfQ24goaCFdi8xA9"], "accumulated_threat_level": 3.2, "timewindow": 206} +{"Format": "IDEA0", "ID": "b345061c-4d53-4073-8645-e173c6c3ab6e", "DetectTime": "2024-05-21T12:57:17.642708+00:00", "EventTime": "2024-05-21T12:57:17.642741+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJCWXW3LxGJDBDSAQ1"], "accumulated_threat_level": 4.0, "timewindow": 206} +{"Format": "IDEA0", "ID": "d493a9e9-2d5c-4b76-bb96-b041cd9aacbb", "DetectTime": "2024-05-21T12:57:17.700630+00:00", "EventTime": "2024-05-21T12:57:17.700659+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C7bcTZ3SVvWnIaLQxa"], "accumulated_threat_level": 4.8, "timewindow": 206} +{"Format": "IDEA0", "ID": "b3fb662a-61c3-4cc9-b08f-d969ff0f0dff", "DetectTime": "2024-05-21T12:57:17.751722+00:00", "EventTime": "2024-05-21T12:57:17.751753+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfJFjr2UbsAuAlPuh9"], "accumulated_threat_level": 5.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "06f2e404-2148-45b1-8ad3-61717927ac95", "DetectTime": "2024-05-21T12:57:17.803261+00:00", "EventTime": "2024-05-21T12:57:17.803293+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpyS2I2WDCp5VceLdi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 206} +{"Format": "IDEA0", "ID": "5c499ccf-da52-4156-9928-876b795725e8", "DetectTime": "2024-05-21T12:57:18.065786+00:00", "EventTime": "2024-05-21T12:57:18.065809+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRGUs3GwxRbsiova4"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "133c626d-297b-4bd1-b3bd-3257f7093ea3", "DetectTime": "2024-05-21T12:57:18.124907+00:00", "EventTime": "2024-05-21T12:57:18.124938+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChJSvdp5dvTRs8WWh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "932426b2-f2e7-48a8-a446-95a7f5b0d463", "DetectTime": "2024-05-21T12:57:18.167395+00:00", "EventTime": "2024-05-21T12:57:18.167432+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6ofKM2dGOGwCnnL83"], "accumulated_threat_level": 7.999999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "d6b511a4-4363-4b26-9c48-61ac3565134d", "DetectTime": "2024-05-21T12:57:18.223090+00:00", "EventTime": "2024-05-21T12:57:18.223127+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cba7eK2ZmTkXyDXN3h"], "accumulated_threat_level": 8.799999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "7716ebc1-17da-4754-8923-8f753d59ef2a", "DetectTime": "2024-05-21T12:57:18.282275+00:00", "EventTime": "2024-05-21T12:57:18.282295+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvK2G22RKJn3I1vJv3"], "accumulated_threat_level": 9.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "f2dd6783-3e41-4386-a778-a858a5be2c05", "DetectTime": "2024-05-21T12:57:18.342102+00:00", "EventTime": "2024-05-21T12:57:18.342130+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CIHWM03u7kRLlQ7Twb"], "accumulated_threat_level": 10.4, "timewindow": 206} +{"Format": "IDEA0", "ID": "6df8e8ef-ba95-4c75-ac1b-f10b0c8fe536", "DetectTime": "2024-05-21T12:57:18.616418+00:00", "EventTime": "2024-05-21T12:57:18.616440+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CeUwxd3eWrn5q3N4Hj"], "accumulated_threat_level": 11.200000000000001, "timewindow": 206} +{"Format": "IDEA0", "ID": "3510489e-0f76-4a62-ad97-3c88f6a32f64", "DetectTime": "2024-05-21T12:57:18.671262+00:00", "EventTime": "2024-05-21T12:57:18.671284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqZPog2zUAktosIQdb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 206} +{"Format": "Json", "ID": "3510489e-0f76-4a62-ad97-3c88f6a32f64", "DetectTime": "2024-05-21T12:57:18.671262+00:00", "EventTime": "2024-05-21T12:57:18.671284+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "1970-01-09T13:47:56.388436+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 206. (real time 2024/05/21 12:57:18.909450)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 206, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "dbe964ab-e198-44f1-afe2-601118869b6d", "DetectTime": "2024-05-21T12:57:18.921667+00:00", "EventTime": "2024-05-21T12:57:18.921687+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cwfcf13RH2tKboNKta"], "accumulated_threat_level": 0.8, "timewindow": 206} +{"Format": "IDEA0", "ID": "92804398-9ef2-4a8f-bf87-43c8a0f0370c", "DetectTime": "2024-05-21T12:57:18.935205+00:00", "EventTime": "2024-05-21T12:57:18.935225+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CLXA3m1Sfq0df7wIn"], "accumulated_threat_level": 1.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "c2d57105-4046-448a-b4b1-5027cb747cfc", "DetectTime": "2024-05-21T12:57:18.948673+00:00", "EventTime": "2024-05-21T12:57:18.948694+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cdnja832FM5qwlQ8ej"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 206} +{"Format": "IDEA0", "ID": "d5af2df7-0907-46c1-a035-b35d0c74db61", "DetectTime": "2024-05-21T12:57:19.124453+00:00", "EventTime": "2024-05-21T12:57:19.124474+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUaLF51eenbB0G6kVc"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "cc2bd54f-042a-4105-ade4-7976cf984820", "DetectTime": "2024-05-21T12:57:19.175123+00:00", "EventTime": "2024-05-21T12:57:19.175151+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYmTKo2k4rvrCd3x9c"], "accumulated_threat_level": 3.2, "timewindow": 206} +{"Format": "IDEA0", "ID": "d4d76544-635d-415a-bbcd-d8d394116eb2", "DetectTime": "2024-05-21T12:57:19.233204+00:00", "EventTime": "2024-05-21T12:57:19.233228+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C559zb4CXpGimpxkra"], "accumulated_threat_level": 4.0, "timewindow": 206} +{"Format": "IDEA0", "ID": "f862e5b8-c117-4d3c-8612-52ded20e932f", "DetectTime": "2024-05-21T12:57:19.292216+00:00", "EventTime": "2024-05-21T12:57:19.292244+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CklHtpxU1GbjGFQj6"], "accumulated_threat_level": 4.8, "timewindow": 206} +{"Format": "IDEA0", "ID": "7fb742f4-9b7a-4c6a-aa59-0974225470b9", "DetectTime": "2024-05-21T12:57:19.340688+00:00", "EventTime": "2024-05-21T12:57:19.340716+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1jXdVnHsGvbojSQ3"], "accumulated_threat_level": 5.6, "timewindow": 206} +{"Format": "IDEA0", "ID": "3eee26e6-e619-4fcc-8f73-47a53bd6af3a", "DetectTime": "2024-05-21T12:57:19.394752+00:00", "EventTime": "2024-05-21T12:57:19.394789+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CjNgYf4Z35IMYkg9Fd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 206} +{"Format": "IDEA0", "ID": "3981b84b-16c9-4613-a0ab-72256c10cb95", "DetectTime": "2024-05-21T12:57:19.669217+00:00", "EventTime": "2024-05-21T12:57:19.669235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CQd5VS3Wq5rV5zPrFl"], "accumulated_threat_level": 7.199999999999999, "timewindow": 206} +{"Format": "IDEA0", "ID": "0f92462a-1d86-47d4-969f-4aabac871971", "DetectTime": "2024-05-21T12:57:19.742704+00:00", "EventTime": "2024-05-21T12:57:19.742727+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrNKxs4jomJlqKrYWk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "b3dc1145-1168-40d9-b5ce-0e3dd201bf98", "DetectTime": "2024-05-21T12:57:19.754461+00:00", "EventTime": "2024-05-21T12:57:19.754478+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CgivGE11707b6fKnA8"], "accumulated_threat_level": 0.8, "timewindow": 207} +{"Format": "IDEA0", "ID": "2ea889eb-d5b4-4a94-9359-0ffcbf6c4e65", "DetectTime": "2024-05-21T12:57:19.889691+00:00", "EventTime": "2024-05-21T12:57:19.889711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 7316/TCP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrySBL1rLMVKU9cPDj"], "accumulated_threat_level": 1.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "ceb1effe-0f7d-463c-8179-c5122222e650", "DetectTime": "2024-05-21T12:57:20.139955+00:00", "EventTime": "2024-05-21T12:57:20.139973+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWcw5p2j3dzeopcI1l"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 207} +{"Format": "IDEA0", "ID": "8dd6e8e9-29db-40ce-be36-e1224d1bb523", "DetectTime": "2024-05-21T12:57:20.152101+00:00", "EventTime": "2024-05-21T12:57:20.152119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKgWNp2NccOqcKeYca"], "accumulated_threat_level": 3.2, "timewindow": 207} +{"Format": "IDEA0", "ID": "2b05a898-dbb1-4419-94f0-c8c06b7237eb", "DetectTime": "2024-05-21T12:57:20.271973+00:00", "EventTime": "2024-05-21T12:57:20.271990+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvxnTn3pMEySnnjMPj"], "accumulated_threat_level": 4.0, "timewindow": 207} +{"Format": "IDEA0", "ID": "625f88bf-49ee-49db-b425-d850afab3ab4", "DetectTime": "2024-05-21T12:57:20.362748+00:00", "EventTime": "2024-05-21T12:57:20.362792+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C3iwNX13GjAgkqAl3h"], "accumulated_threat_level": 4.8, "timewindow": 207} +{"Format": "IDEA0", "ID": "45ba4d5f-f806-4afa-a542-4b3b6602073d", "DetectTime": "2024-05-21T12:57:20.413117+00:00", "EventTime": "2024-05-21T12:57:20.413153+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CHZ4guvgWL08zpbXb"], "accumulated_threat_level": 5.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "ad50eb8d-3a1b-438c-b910-9ff77a05adcf", "DetectTime": "2024-05-21T12:57:20.467146+00:00", "EventTime": "2024-05-21T12:57:20.467179+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBbqxR3vbm131TriJb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 207} +{"Format": "IDEA0", "ID": "a7b6dfcc-12ff-4fac-8982-c83afdf4883b", "DetectTime": "2024-05-21T12:57:20.523654+00:00", "EventTime": "2024-05-21T12:57:20.523688+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C6QoKp4agMs0CUuK5b"], "accumulated_threat_level": 7.199999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "f3ed0d9d-3ed7-456b-a18a-2af516211351", "DetectTime": "2024-05-21T12:57:20.577165+00:00", "EventTime": "2024-05-21T12:57:20.577199+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CacZTt2OHbaYYyZW79"], "accumulated_threat_level": 7.999999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "3fca4bf1-4f0f-4879-a7ac-58e2ba668392", "DetectTime": "2024-05-21T12:57:20.630087+00:00", "EventTime": "2024-05-21T12:57:20.630122+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTjrs8PJ8kuuKLoj"], "accumulated_threat_level": 8.799999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "c515f441-fa2e-4c5c-afa9-2751117e43ce", "DetectTime": "2024-05-21T12:57:20.738181+00:00", "EventTime": "2024-05-21T12:57:20.738203+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvvjL2JDG2CSyORg6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "7c28518a-f9a5-4118-8acb-cc2a162d6e16", "DetectTime": "2024-05-21T12:57:20.995878+00:00", "EventTime": "2024-05-21T12:57:20.995901+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CqweDYe3nPGLjS9Ei"], "accumulated_threat_level": 9.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "cf041fd8-0471-49b6-aec8-fb6f9d3e0182", "DetectTime": "2024-05-21T12:57:21.057419+00:00", "EventTime": "2024-05-21T12:57:21.057437+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CiONP82kRVfLjKh2Fd"], "accumulated_threat_level": 10.4, "timewindow": 207} +{"Format": "IDEA0", "ID": "a0d0e46f-ab8c-4965-b9f4-7c029c5a2e3a", "DetectTime": "2024-05-21T12:57:21.097366+00:00", "EventTime": "2024-05-21T12:57:21.097386+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChjEQm2CzpbjVDbDOi"], "accumulated_threat_level": 11.200000000000001, "timewindow": 207} +{"Format": "IDEA0", "ID": "078eeaf4-f4a0-4e7b-886a-6d41d53608e3", "DetectTime": "2024-05-21T12:57:21.148639+00:00", "EventTime": "2024-05-21T12:57:21.148662+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CD77Tn1KrCjZ5Cp6j5"], "accumulated_threat_level": 12.000000000000002, "timewindow": 207} +{"Format": "Json", "ID": "078eeaf4-f4a0-4e7b-886a-6d41d53608e3", "DetectTime": "2024-05-21T12:57:21.148639+00:00", "EventTime": "2024-05-21T12:57:21.148662+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "1970-01-09T14:18:38.067386+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2024/05/21 12:57:21.338795)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 207, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "f7e7c29f-e394-4f95-939f-c2e13df05627", "DetectTime": "2024-05-21T12:57:21.350906+00:00", "EventTime": "2024-05-21T12:57:21.350929+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9fodn1fKxibq6hN49"], "accumulated_threat_level": 0.8, "timewindow": 207} +{"Format": "IDEA0", "ID": "af37d9c7-e02f-4c6c-ae0a-b3e53268c0b1", "DetectTime": "2024-05-21T12:57:21.362598+00:00", "EventTime": "2024-05-21T12:57:21.362620+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cqs8Iu3df2QR6HuW0h"], "accumulated_threat_level": 1.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "8fbdf5a3-9dd1-45fc-9e27-63d5320c5d38", "DetectTime": "2024-05-21T12:57:21.374528+00:00", "EventTime": "2024-05-21T12:57:21.374548+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["78.6.164.6"]}], "Attach": [{"Content": "Connection to unknown destination port 2928/UDP destination IP 78.6.164.6. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CSi1zP3R0iAJb8uhdl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 207} +{"Format": "IDEA0", "ID": "edb2856d-8178-4d62-a831-b15cf33a7643", "DetectTime": "2024-05-21T12:57:21.387377+00:00", "EventTime": "2024-05-21T12:57:21.387399+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["69.154.77.2"]}], "Attach": [{"Content": "Connection to unknown destination port 5820/UDP destination IP 69.154.77.2. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFfNCf3Mc6le79GeQl"], "accumulated_threat_level": 3.2, "timewindow": 207} +{"Format": "IDEA0", "ID": "50573fa1-8267-4336-9013-c9fa07ed3b7d", "DetectTime": "2024-05-21T12:57:21.623293+00:00", "EventTime": "2024-05-21T12:57:21.623325+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvs5azKlycTxOTw7"], "accumulated_threat_level": 4.0, "timewindow": 207} +{"Format": "IDEA0", "ID": "02c67699-a192-43cd-97db-66613af717ea", "DetectTime": "2024-05-21T12:57:21.675050+00:00", "EventTime": "2024-05-21T12:57:21.675075+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.96.145.133"]}], "Attach": [{"Content": "Connection to unknown destination port 4307/UDP destination IP 70.96.145.133. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CipTfDYQRBMMES9R1"], "accumulated_threat_level": 4.8, "timewindow": 207} +{"Format": "IDEA0", "ID": "16f8920c-2f71-437c-9a71-346b530b8f74", "DetectTime": "2024-05-21T12:57:21.731142+00:00", "EventTime": "2024-05-21T12:57:21.731164+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.139.43.88"]}], "Attach": [{"Content": "Connection to unknown destination port 9001/UDP destination IP 70.139.43.88. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPCfgE2WxvKmVRnSwe"], "accumulated_threat_level": 5.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "c5b1e499-a8e3-4c4e-a086-6e3a190bd0f5", "DetectTime": "2024-05-21T12:57:21.789036+00:00", "EventTime": "2024-05-21T12:57:21.789053+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.220.223.98"]}], "Attach": [{"Content": "Connection to unknown destination port 6063/UDP destination IP 217.220.223.98. AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsKOel3Q91ZMqD27hf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 207} +{"Format": "IDEA0", "ID": "cb713a7f-4610-4e16-ad04-4c3976bb1ecf", "DetectTime": "2024-05-21T12:57:21.843857+00:00", "EventTime": "2024-05-21T12:57:21.843875+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["66.226.34.247"]}], "Attach": [{"Content": "Connection to unknown destination port 4310/UDP destination IP 66.226.34.247. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CXGBzo4indo4McI887"], "accumulated_threat_level": 7.199999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "54424639-6667-4eab-a165-e5a225d5807c", "DetectTime": "2024-05-21T12:57:21.906992+00:00", "EventTime": "2024-05-21T12:57:21.907010+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.233.136.124"]}], "Attach": [{"Content": "Connection to unknown destination port 5604/UDP destination IP 108.233.136.124. AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMOjOZ3CxuEvFOMjy"], "accumulated_threat_level": 7.999999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "6c69a66b-76da-4818-bcd2-8850888269d4", "DetectTime": "2024-05-21T12:57:21.957434+00:00", "EventTime": "2024-05-21T12:57:21.957455+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["75.1.149.150"]}], "Attach": [{"Content": "Connection to unknown destination port 9432/UDP destination IP 75.1.149.150. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CaFqIp1aVy0UvwUunl"], "accumulated_threat_level": 8.799999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "1638b1e5-a322-4dd7-9a5e-56f6f0156986", "DetectTime": "2024-05-21T12:57:22.023956+00:00", "EventTime": "2024-05-21T12:57:22.024002+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["108.86.251.63"]}], "Attach": [{"Content": "Connection to unknown destination port 2573/UDP destination IP 108.86.251.63. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1I4VL10JBt7S1qDZi"], "accumulated_threat_level": 9.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "4a8d1f63-005e-4395-b595-c723b9ef6ef4", "DetectTime": "2024-05-21T12:57:22.329000+00:00", "EventTime": "2024-05-21T12:57:22.329037+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["90.156.118.144"]}], "Attach": [{"Content": "Connection to unknown destination port 5237/TCP destination IP 90.156.118.144. AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CvO9fJ22tLK7s5Bsx"], "accumulated_threat_level": 10.4, "timewindow": 207} +{"Format": "IDEA0", "ID": "95445e9f-be97-4478-83ad-5053fe2b7d71", "DetectTime": "2024-05-21T12:57:22.420461+00:00", "EventTime": "2024-05-21T12:57:22.420499+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["217.41.32.90"]}], "Attach": [{"Content": "Connection to unknown destination port 8641/UDP destination IP 217.41.32.90. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbYlOB2sIBT1lGMBaa"], "accumulated_threat_level": 11.200000000000001, "timewindow": 207} +{"Format": "IDEA0", "ID": "b165e23d-afac-4239-a2a0-b8c114b93455", "DetectTime": "2024-05-21T12:57:22.465684+00:00", "EventTime": "2024-05-21T12:57:22.465707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CPhfFr3dzycFzh4EPi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "1b7b7e96-2970-4f3c-b726-6424c1c1bd6e", "DetectTime": "2024-05-21T12:57:22.515814+00:00", "EventTime": "2024-05-21T12:57:22.515850+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "Connection to unknown destination port 2913/UDP destination IP 71.2.203.86. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGXj22RkwspuoXzNb"], "accumulated_threat_level": 12.000000000000002, "timewindow": 207} +{"Format": "Json", "ID": "1b7b7e96-2970-4f3c-b726-6424c1c1bd6e", "DetectTime": "2024-05-21T12:57:22.515814+00:00", "EventTime": "2024-05-21T12:57:22.515850+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.2.203.86"]}], "Attach": [{"Content": "1970-01-09T14:49:29.074212+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2024/05/21 12:57:22.698345)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 207, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "58b20cab-41cf-47d2-b060-de83b7d4a80a", "DetectTime": "2024-05-21T12:57:22.711751+00:00", "EventTime": "2024-05-21T12:57:22.711784+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["71.205.65.116"]}], "Attach": [{"Content": "Connection to unknown destination port 6061/UDP destination IP 71.205.65.116. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CwQatxdXOp4QYiwNf"], "accumulated_threat_level": 0.8, "timewindow": 207} +{"Format": "IDEA0", "ID": "aed09bee-9ba4-450c-bf53-d81013bc983a", "DetectTime": "2024-05-21T12:57:22.724961+00:00", "EventTime": "2024-05-21T12:57:22.724985+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["97.64.221.67"]}], "Attach": [{"Content": "Connection to unknown destination port 7745/UDP destination IP 97.64.221.67. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cj7jhznxFs7NVGTdl"], "accumulated_threat_level": 1.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "15bd6dfb-8ce8-4184-9b4c-1dd902c9e21d", "DetectTime": "2024-05-21T12:57:22.741896+00:00", "EventTime": "2024-05-21T12:57:22.741914+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["173.174.73.98"]}], "Attach": [{"Content": "Connection to unknown destination port 3192/UDP destination IP 173.174.73.98. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ca20V94vm7fWVuTZrl"], "accumulated_threat_level": 2.4000000000000004, "timewindow": 207} +{"Format": "IDEA0", "ID": "c9390eae-83c9-4ada-81a3-4c1223c53f73", "DetectTime": "2024-05-21T12:57:22.985393+00:00", "EventTime": "2024-05-21T12:57:22.985416+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0o8aJ1Bz2QJinXGQ8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "058146ba-f94d-47ed-a25d-f40dc6242958", "DetectTime": "2024-05-21T12:57:23.030782+00:00", "EventTime": "2024-05-21T12:57:23.030801+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.95.196.161"]}], "Attach": [{"Content": "Connection to unknown destination port 2218/UDP destination IP 99.95.196.161. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJC3Pk3eIwQZLxHgcg"], "accumulated_threat_level": 3.2, "timewindow": 207} +{"Format": "IDEA0", "ID": "d953df26-af6f-4598-8aa3-7ed8eea9d018", "DetectTime": "2024-05-21T12:57:23.086391+00:00", "EventTime": "2024-05-21T12:57:23.086424+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["50.42.61.212"]}], "Attach": [{"Content": "Connection to unknown destination port 6860/UDP destination IP 50.42.61.212. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CBUn7B3psUPibnCcic"], "accumulated_threat_level": 4.0, "timewindow": 207} +{"Format": "IDEA0", "ID": "72906287-d86e-42e6-ae78-0c635e2eb209", "DetectTime": "2024-05-21T12:57:23.202251+00:00", "EventTime": "2024-05-21T12:57:23.202274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CWhIle1r9uUNP4mrOd"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "4e8b60a8-ed7c-4530-a0a3-bd6ff654236f", "DetectTime": "2024-05-21T12:57:23.214486+00:00", "EventTime": "2024-05-21T12:57:23.214506+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["81.149.254.99"]}], "Attach": [{"Content": "Connection to unknown destination port 6663/UDP destination IP 81.149.254.99. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ct6EJl2tsHi6s3rPF5"], "accumulated_threat_level": 4.8, "timewindow": 207} +{"Format": "IDEA0", "ID": "bb17373c-4a12-4ffd-b888-01a8f8bb51f4", "DetectTime": "2024-05-21T12:57:23.219461+00:00", "EventTime": "2024-05-21T12:57:23.219479+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfFmCd14iDW51yELGj"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "f48a1d0c-0391-40da-b054-670b7a42a665", "DetectTime": "2024-05-21T12:57:23.341659+00:00", "EventTime": "2024-05-21T12:57:23.341679+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV3n683JmKVOSdIDL"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "420e49f6-3b48-4c48-83f8-3e4683e2b5bb", "DetectTime": "2024-05-21T12:57:23.702297+00:00", "EventTime": "2024-05-21T12:57:23.702329+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["175.195.224.10"]}], "Attach": [{"Content": "Connection to unknown destination port 7151/UDP destination IP 175.195.224.10. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJM7vUG4p7t4Z5LNj"], "accumulated_threat_level": 5.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "ab97d718-0da4-423e-b946-7583510def65", "DetectTime": "2024-05-21T12:57:23.744091+00:00", "EventTime": "2024-05-21T12:57:23.744111+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CTRZtyan8BkAPG8Mk"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "73ea9860-3aa1-46b0-b599-e7672f878a09", "DetectTime": "2024-05-21T12:57:23.750255+00:00", "EventTime": "2024-05-21T12:57:23.750274+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUKnPZ1ZYgerrl5EHi"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "083b3ef4-27be-4ef6-b90a-89075af7b51d", "DetectTime": "2024-05-21T12:57:23.910690+00:00", "EventTime": "2024-05-21T12:57:23.910711+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CseJk6PnRf2DFSJsh"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "4d1beb17-3b1f-470d-a687-c56277de83a2", "DetectTime": "2024-05-21T12:57:24.025716+00:00", "EventTime": "2024-05-21T12:57:24.025736+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJXUeY1MFaQiXWtJo8"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "4edbadb5-4873-458a-85cd-565123e7545d", "DetectTime": "2024-05-21T12:57:24.030854+00:00", "EventTime": "2024-05-21T12:57:24.030876+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrRxjD2wm61TtFv8e3"], "accumulated_threat_level": 7.199999999999999, "timewindow": 204} +{"Format": "IDEA0", "ID": "1fa8e176-c226-4cc9-b888-53d6f3c1209f", "DetectTime": "2024-05-21T12:57:24.110764+00:00", "EventTime": "2024-05-21T12:57:24.110785+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["70.91.116.41"]}], "Attach": [{"Content": "Connection to unknown destination port 3631/UDP destination IP 70.91.116.41. AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuSDwB4px2plBpYd45"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 207} +{"Format": "IDEA0", "ID": "9c697514-40ae-421e-9156-d9287cb2c218", "DetectTime": "2024-05-21T12:57:24.498034+00:00", "EventTime": "2024-05-21T12:57:24.498061+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CcDn2J2Nwv4XKx5st2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "5d49d77b-59f2-485c-ae6a-4495f4f41888", "DetectTime": "2024-05-21T12:57:24.503616+00:00", "EventTime": "2024-05-21T12:57:24.503643+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CpXKhy1MLnXiIypYik"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "9cfd3579-c296-4b0b-bf1a-5938fdefc513", "DetectTime": "2024-05-21T12:57:24.509829+00:00", "EventTime": "2024-05-21T12:57:24.509849+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFdqN6V2HzY6IwFA4"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "b5dc7be3-2d0f-41f6-bde9-02e0debba784", "DetectTime": "2024-05-21T12:57:24.521731+00:00", "EventTime": "2024-05-21T12:57:24.521755+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["147.163.75.36"]}], "Attach": [{"Content": "Connection to unknown destination port 3026/UDP destination IP 147.163.75.36. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CsbzpV2hfc7Ru5xjX6"], "accumulated_threat_level": 7.199999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "4c415731-6e0f-432a-b8c9-00c5a309b0e7", "DetectTime": "2024-05-21T12:57:24.528073+00:00", "EventTime": "2024-05-21T12:57:24.528093+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CUSA6y47fyjCZYw0ei"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "05f399b0-b957-4087-b92a-85ca5f620abf", "DetectTime": "2024-05-21T12:57:24.552534+00:00", "EventTime": "2024-05-21T12:57:24.552553+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C9u7ho37dbCq7Pas5j"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "97c33515-9e13-44f2-9534-5bfdaf3c5631", "DetectTime": "2024-05-21T12:57:24.557532+00:00", "EventTime": "2024-05-21T12:57:24.557552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["COatjPM97FSwvOjg6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "7e201513-ca33-4653-bd76-aa7146836f7a", "DetectTime": "2024-05-21T12:57:25.114783+00:00", "EventTime": "2024-05-21T12:57:25.114803+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4fLiTuTurkWr3PL2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "05fb1fff-890a-45e6-a193-1b83885aa633", "DetectTime": "2024-05-21T12:57:25.130728+00:00", "EventTime": "2024-05-21T12:57:25.130749+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C2FGkY2hUzQSq97OX6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "11f56a3a-5764-4175-843c-33a9704d4f79", "DetectTime": "2024-05-21T12:57:25.140098+00:00", "EventTime": "2024-05-21T12:57:25.140119+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CJEvX7wzdoDbFvQT8"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "e207c001-5e97-4e9d-9290-2aebb887293f", "DetectTime": "2024-05-21T12:57:25.320610+00:00", "EventTime": "2024-05-21T12:57:25.320633+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["142.161.36.205"]}], "Attach": [{"Content": "Connection to unknown destination port 7485/UDP destination IP 142.161.36.205. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C1c7tm1pleM7CEFT3g"], "accumulated_threat_level": 7.999999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "27a86ede-f5d4-44fa-9d35-6f17d03ca185", "DetectTime": "2024-05-21T12:57:25.326082+00:00", "EventTime": "2024-05-21T12:57:25.326104+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["ChQ9S04Gx2XfgbqA8h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "99c41fbb-e9be-4ec4-af1a-231151d1187c", "DetectTime": "2024-05-21T12:57:25.330877+00:00", "EventTime": "2024-05-21T12:57:25.330895+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CFVM5Y28WHUmFMvz2a"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "c4204b80-68d7-405c-a7c7-5ea996bb6c8e", "DetectTime": "2024-05-21T12:57:25.665597+00:00", "EventTime": "2024-05-21T12:57:25.665619+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cw3xTT1qMyfjBf9fFb"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "a057d1b1-a720-420a-b8ed-3248f6362d2d", "DetectTime": "2024-05-21T12:57:25.687674+00:00", "EventTime": "2024-05-21T12:57:25.687696+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cq2myc42x65rjrhBsf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "4f01926c-7ee2-480d-adb9-25829d1ac24c", "DetectTime": "2024-05-21T12:57:25.738214+00:00", "EventTime": "2024-05-21T12:57:25.738235+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C0eVor3wzIjJBTNh88"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "cab66f58-7ff1-4f4a-b22f-296f6c2937b3", "DetectTime": "2024-05-21T12:57:25.743039+00:00", "EventTime": "2024-05-21T12:57:25.743058+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CMoj2xuOWLY0o4G0c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "50dd3205-2c8b-4715-a9d6-d723bc8fae23", "DetectTime": "2024-05-21T12:57:25.748718+00:00", "EventTime": "2024-05-21T12:57:25.748739+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CNTpIeVF6oEuFbEmj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "5a36265d-f58d-47a1-8060-64c53b922cae", "DetectTime": "2024-05-21T12:57:25.760681+00:00", "EventTime": "2024-05-21T12:57:25.760703+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["2.85.52.234"]}], "Attach": [{"Content": "Connection to unknown destination port 2179/UDP destination IP 2.85.52.234. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CCWAgA4t6udwDnD2d2"], "accumulated_threat_level": 8.799999999999999, "timewindow": 207} +{"Format": "IDEA0", "ID": "5500cf31-b01e-4d80-9c7c-604532eafb9f", "DetectTime": "2024-05-21T12:57:25.766143+00:00", "EventTime": "2024-05-21T12:57:25.766161+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CyaItI1iITKIY1CGrc"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "4363f050-f702-4229-9de7-b5d218a83e98", "DetectTime": "2024-05-21T12:57:26.274982+00:00", "EventTime": "2024-05-21T12:57:26.275003+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CmfyGM2jUhcGoVGWqj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "5c5a2383-a0d7-459c-b338-739b5c5cfcb8", "DetectTime": "2024-05-21T12:57:26.286829+00:00", "EventTime": "2024-05-21T12:57:26.286853+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxvEhu1IDnYId5kEue"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "bb3c0242-2015-4eaf-b008-a525af1876dc", "DetectTime": "2024-05-21T12:57:26.308171+00:00", "EventTime": "2024-05-21T12:57:26.308193+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.96.145.133 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYm86y34c29NTBK5J2"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "b291780b-a325-4831-b9f4-7042c087d5b5", "DetectTime": "2024-05-21T12:57:26.323276+00:00", "EventTime": "2024-05-21T12:57:26.323300+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Csa83B6vO9w0TPOs6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "d68fb78d-149f-4a00-b5a5-47a81223cce2", "DetectTime": "2024-05-21T12:57:26.335661+00:00", "EventTime": "2024-05-21T12:57:26.335680+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["88.225.233.16"]}], "Attach": [{"Content": "Connection to unknown destination port 7710/UDP destination IP 88.225.233.16. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CuXAuV2MX0SKtGB057"], "accumulated_threat_level": 9.6, "timewindow": 207} +{"Format": "IDEA0", "ID": "684fee2b-c24a-4af1-88ae-b255722ceffb", "DetectTime": "2024-05-21T12:57:26.751077+00:00", "EventTime": "2024-05-21T12:57:26.751099+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.34.137.78 AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ckda2G15VrNdWhQBVe"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "e859064a-1f44-489a-a954-383d7fe70642", "DetectTime": "2024-05-21T12:57:26.966262+00:00", "EventTime": "2024-05-21T12:57:26.966283+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.139.43.88 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8VdRT3nRD39sZYOvj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "2afeaac7-0ade-43ea-925b-ce45a0af7283", "DetectTime": "2024-05-21T12:57:26.973993+00:00", "EventTime": "2024-05-21T12:57:26.974014+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 66.226.34.247 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8UeI13RWS0WMSlkC7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "2f4b2669-cacb-4beb-b45a-a2b58db68a33", "DetectTime": "2024-05-21T12:57:26.979346+00:00", "EventTime": "2024-05-21T12:57:26.979366+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 75.1.149.150 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch6Ubi3Fr3uE1JIVXl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "c11a786a-2780-46b0-8c36-2abe7c114767", "DetectTime": "2024-05-21T12:57:26.999580+00:00", "EventTime": "2024-05-21T12:57:26.999603+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.220.223.98 AS: BT-ITALIA, IT AS8968 rDNS: 217-220-223-98-static.albacom.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cx6fQw3eexir8GpD8b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "bedbf014-1807-462f-9c7a-19784dda59e6", "DetectTime": "2024-05-21T12:57:27.004533+00:00", "EventTime": "2024-05-21T12:57:27.004552+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.233.136.124 AS: ATT-INTERNET4, US AS7018 rDNS: 108-233-136-124.lightspeed.cicril.sbcglobal.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Czugg02rZDy1zAq4Yk"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "c20af9ba-3e10-4597-bf20-be745324a139", "DetectTime": "2024-05-21T12:57:27.225621+00:00", "EventTime": "2024-05-21T12:57:27.225641+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["12.175.148.194"]}], "Attach": [{"Content": "Connection to unknown destination port 8863/UDP destination IP 12.175.148.194. AS: ATT-INTERNET4, US AS7018 threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYmP5C3oCNIJ6ZQLG7"], "accumulated_threat_level": 10.4, "timewindow": 207} +{"Format": "IDEA0", "ID": "82040850-1953-4de5-8d98-6d795dfca757", "DetectTime": "2024-05-21T12:57:27.525804+00:00", "EventTime": "2024-05-21T12:57:27.525825+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 108.86.251.63 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CchW5l2Ff1df89pACl"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "4c9df1e4-d7ff-406c-86b8-989b22117950", "DetectTime": "2024-05-21T12:57:27.558961+00:00", "EventTime": "2024-05-21T12:57:27.558981+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 217.41.32.90 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CxPLhu2ZyVxQ6sNUL5"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "ba810c76-076f-4635-b623-c3b41c942083", "DetectTime": "2024-05-21T12:57:27.569256+00:00", "EventTime": "2024-05-21T12:57:27.569276+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 97.64.221.67 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CVvJVh4cTvfADlMw1f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "1f2b7d70-4184-4c77-aa1e-e2636bc758f6", "DetectTime": "2024-05-21T12:57:27.574520+00:00", "EventTime": "2024-05-21T12:57:27.574539+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 173.174.73.98 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CP4N3vzjdcMoeCVT7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "63a5a5b9-d51c-4ecf-bc31-427d30803de7", "DetectTime": "2024-05-21T12:57:27.817883+00:00", "EventTime": "2024-05-21T12:57:27.817909+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C09IEGrZkia5b0BX6"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "1495e262-9027-44b3-963e-c3ad0561840c", "DetectTime": "2024-05-21T12:57:27.828953+00:00", "EventTime": "2024-05-21T12:57:27.828977+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.205.65.116 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CbKzK51TAwgKz7MwPg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "58f69fd4-fb56-462f-b9d1-b096c476ce4d", "DetectTime": "2024-05-21T12:57:27.834548+00:00", "EventTime": "2024-05-21T12:57:27.834569+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 90.156.118.144 AS: INTERNETIA_ETTH2-AS Noc-Bialystok, PL AS43939 rDNS: 90-156-118-144.internetia.net.pl threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C8vsyoAOPm7F6cR7b"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "1a3bd8b3-708e-4c79-b366-dfa88ed73a76", "DetectTime": "2024-05-21T12:57:27.911460+00:00", "EventTime": "2024-05-21T12:57:27.911485+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 71.2.203.86 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CfDAMB3FqgbgTWva8c"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "244739ef-1557-4c19-98ed-ee8de801d7da", "DetectTime": "2024-05-21T12:57:28.095800+00:00", "EventTime": "2024-05-21T12:57:28.095820+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["189.165.60.251"]}], "Attach": [{"Content": "Connection to unknown destination port 3630/UDP destination IP 189.165.60.251. threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CE3p9c1ulRvgXjKwn3"], "accumulated_threat_level": 11.200000000000001, "timewindow": 207} +{"Format": "IDEA0", "ID": "5adf9e8b-7c50-4c8c-89cd-812e6076a36e", "DetectTime": "2024-05-21T12:57:28.413564+00:00", "EventTime": "2024-05-21T12:57:28.413585+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 99.95.196.161 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cv4qW64CdOtUS7lKy7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "08e5a19f-a7a8-4b4c-b2b7-5cdd34f10af9", "DetectTime": "2024-05-21T12:57:28.435386+00:00", "EventTime": "2024-05-21T12:57:28.435407+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 50.42.61.212 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYGRlhR9qPp6tTcbd"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "097a5a24-6559-4228-84a2-3fa445c54cd1", "DetectTime": "2024-05-21T12:57:28.485938+00:00", "EventTime": "2024-05-21T12:57:28.485959+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 147.163.75.36 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C4qkPq4hse8YO5ps3h"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "8e9c1ed8-c28e-468c-8ce2-53d985ddfaab", "DetectTime": "2024-05-21T12:57:28.606263+00:00", "EventTime": "2024-05-21T12:57:28.606284+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 142.161.36.205 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CV9tiF0a9RkunQ6Vg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "2ca946df-02e9-4cfd-9d34-1689336fb36f", "DetectTime": "2024-05-21T12:57:28.624123+00:00", "EventTime": "2024-05-21T12:57:28.624146+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 70.91.116.41 AS: COMCAST-7922, US AS7922 rDNS: 70-91-116-41-busname-fl.tallah.hfc.comcastbusiness.net threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CYUPmd4TiYGeh4IQUg"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "1bcabd6b-275f-4fae-a295-edb8916058da", "DetectTime": "2024-05-21T12:57:28.644324+00:00", "EventTime": "2024-05-21T12:57:28.644346+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 81.149.254.99 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ch1f2t1bCLgeSejDNi"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "ea966f20-23f0-42e0-b6d6-6142a024ef01", "DetectTime": "2024-05-21T12:57:28.650901+00:00", "EventTime": "2024-05-21T12:57:28.650921+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 175.195.224.10 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Ci0myzWgQG3VPsoC7"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "f168fcb6-efce-49ea-ba15-bba39d6f70a9", "DetectTime": "2024-05-21T12:57:28.658544+00:00", "EventTime": "2024-05-21T12:57:28.658564+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 88.225.233.16 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CrPLFn34RpL8zolj97"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "4a3f8bc4-cb45-4697-8d33-b2dedf32b1f7", "DetectTime": "2024-05-21T12:57:28.668162+00:00", "EventTime": "2024-05-21T12:57:28.668181+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 12.175.148.194 AS: ATT-INTERNET4, US AS7018 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["Cpzd4G13HReZ9nPYX1"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "6a92a705-fb59-499c-a940-86480fca3130", "DetectTime": "2024-05-21T12:57:28.672871+00:00", "EventTime": "2024-05-21T12:57:28.672890+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 2.85.52.234 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CkUdV23LDlBfQWktRj"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "f7348553-2867-4a32-824d-37c91d89801a", "DetectTime": "2024-05-21T12:57:28.781684+00:00", "EventTime": "2024-05-21T12:57:28.781707+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 189.165.60.251 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CKcQEV1gTfnTesFksf"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "facc7be4-9a3a-4b20-a0be-2b88d561407d", "DetectTime": "2024-05-21T12:57:29.021479+00:00", "EventTime": "2024-05-21T12:57:29.021500+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 69.154.77.2 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["CtvUdz4Y2Jc8hvnXni"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} +{"Format": "IDEA0", "ID": "174e9e73-d9c0-4409-9864-06bb0ff89977", "DetectTime": "2024-05-21T12:57:29.044617+00:00", "EventTime": "2024-05-21T12:57:29.044636+00:00", "Category": ["Anomaly.Connection"], "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "Connection to unknown destination port 2733/UDP destination IP 99.34.137.78. AS: ATT-INTERNET4, US AS7018 rDNS: 99-34-137-78.lightspeed.bcvloh.sbcglobal.net threat level: high.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C94WG42fBtslJa97Vg"], "accumulated_threat_level": 12.000000000000002, "timewindow": 207} +{"Format": "Json", "ID": "174e9e73-d9c0-4409-9864-06bb0ff89977", "DetectTime": "2024-05-21T12:57:29.044617+00:00", "EventTime": "2024-05-21T12:57:29.044636+00:00", "Category": "Alert", "Confidence": 1.0, "Source": [{"IP4": ["10.0.2.19"]}], "Target": [{"IP4": ["99.34.137.78"]}], "Attach": [{"Content": "1970-01-09T14:49:32.242565+00:00: Src IP 10.0.2.19 . Generated an alert given enough evidence on timewindow 207. (real time 2024/05/21 12:57:29.281858)", "ContentType": "text/plain"}], "ConnCount": 1, "uids": [], "accumulated_threat_level": 12.000000000000002, "timewindow": 207, "profileid": "profile_10.0.2.19", "threat_level": 12.000000000000002} +{"Format": "IDEA0", "ID": "b4b543f8-bcf7-47cf-82a8-d726c35eb721", "DetectTime": "2024-05-21T12:57:29.286897+00:00", "EventTime": "2024-05-21T12:57:29.286923+00:00", "Category": ["Anomaly.Connection"], "Confidence": 0.8, "Source": [{"IP4": ["10.0.2.19"], "Type": ["Malware"]}], "Attach": [{"Content": "A connection without DNS resolution to IP: 78.6.164.6 threat level: info.", "ContentType": "text/plain"}], "ConnCount": 1, "uids": ["C41LNA3XTIbLKsw0f"], "accumulated_threat_level": 6.3999999999999995, "timewindow": 205} diff --git a/dataset/CTU-Malware-Capture-Botnet-4/slips/flows.sqlite b/dataset/CTU-Malware-Capture-Botnet-4/slips/flows.sqlite index 25813b8c60039ef75a6b4ff65056398e2a581d45..9df34fd7f6afb5531f85af0950b5e2a1cd023c3c 100644 GIT binary patch delta 3282345 zcmb4s34B~t)p*_{lT7xcX_~Z6x1>p-H1w^r6iS(W-}eD2v+v0yGm}{WLz)&)6j}y) zWf7=|$RbiIj0$2|1wo}BuBbo-`~($?=!YQa|Gb$=AVY%w`TaVy=iYbTx%ZxX_Iux@ zmtM`g^wvvx2iG;1Z4C`Q*rCnmuzx#q&##UK?&!w8cdVo5L^tuhxm(o@4ebxiUAd*9 zp;dCq(a_Mm^QU-2L*r@R-U`3lZraLeXlTH?UxVMSsqWXxM^pcJwWWMK^^c#nApDia zE!(X76Z7p2Igw1Py4@)*hCA#UZ#_u;o?V>jyEI`y6EbL_9LWwvF*%|jgC z-y3$fJkty`T+$xsTGxGR`=y;D-I1=}ckkz!+ph22)4HMU)wUmWZ0d5gztSq|xV|IT zI^X((wszjp&Y!nD(`N6wsVmd+$4;#Cn$A?Wg4fykkM6ClZ}47de}uQQZM^*h-ak7Y zYRk2r*S@*!U!C9LUEO|D$F7dwcJX;_$=2Jup6KRuKipk@`=WP#&0)!kH_dVnZfM-i z(Z|9Ck1P>2$n1H2Q4`hM^rX=i&v%W%th~YYFp&15(dkJTpvB;{;|7@|=1!W616RRd zUa9nOs*47jCt_3@;%=v$)H~gTKBgzQe30HLs49Sx6S4~Nl&!J z0$pyXOsqW~4XX)C6%Uf(urTZn55l~5zQ{iAQ5q5+o18WRk#1X@GC0*aL(G%x{46~E zC$@(>sb<_Zf6k~>Q-+u&>XG?reNmiWzp4$6&y%Po}ix>4yJ839-VzVBb7}poo z6m}B2>|(nZit>WT=B5luJz=y(;00#VBXd)$G_993z|uj#U$Xs-Hha!pR7BjxFzrt2 z8Mo6-d18*lsU~(U4d%%29?wBR+k=cv-n4dNj0N|A0BWiS1#OMG}UjA*LtgFu!ibJ)5+Xo>(G*eX;Gq>X@3x zE2sdjkJ$-e#)MuLN$PE37=fAM^)@tg8`&OiQW5t!-M~;Vcd znSKvHOU5X-PU98j$&6o~=t;M=OB(>i;(suH*sl|n?h}kcZ64>*%?Ev;@txVB0J~<(Z8?}xQ&WL=I;Wib#JW?gklQh`m1*6Pg zG|J%bN(XF0KhynKXXkkh>)0hYBwszt`3BorFS8`|ML%@5=M6>RQxGzSq9M}yZ`e9F zS9^%_2B#(Jj={c=DU$l68rM4=u{H0(j9V(?IsszSgP>6WQ=2J}2YF9SO!Dpkk}7ZU z$kaeeAg+%^qDI)b2GSCSu4-~aZ)YcLn{F13L1rclN;wY88ZpG;vF>nId?~O{E-{kNL$b#19jb$kXpAs~3yAC(>9}@S?HlJ6) zue2B3Hh0bdlEmY505PyAPD_MCz}-1hgupCF8auubq;7YGhYe1U z!ZvZv9TQWq%%r}kV0T?);QwHt!pdL-q5vHv@Gvbk$x>=TT-f&QbIPzV6U^DkRiNnFZm2vSlap>B$s-HH zPW43fAfNQbI6nAGAb1bk!w_@C4KYR3Z3Ec^3eN*`>5)kijWFfByDB|wW(If;w38b* z#LPLpO^thEavB4(qid+T+q5=?uShFQW<3+o^4-(kwiM7OuFz+(61EH_6%yg8NrzeH zi}cUK7-uSNV)=}nB<0Gqbjt1!g!R!@XzF;fO1hf_$y(6IJW;pP0ZVED;v$iuC*ifd zl^#ho2uZ`H7%&nJY{E_y<4G#wJzr(bm*H+9{C0o8)M1h#$-3VOKC)n5Zl3KHU8Vy> z|Go@5bzOSdCioRz#%kw>4otwW?tmKz`Rf4*{N8(D6n;eq+CaK|Z+`}UwfpzN4F7Sz z27W)ge+T@o+YgGP^{M%b;CJtQ80PM0^T3fj?ffp-r7z9{{+4s+!5(Y=#y)6mo;+(G zG;_bTkAdG!`-WhT9NpIlzhiR=;Pq?g%7RD^x&18o z`RZm)`(#5`+dQ=KR&~ld?(Fb%w6||=f4J>L+kEG>-Qn)Rt{-+?+=bU{zY9;^ROE2F zcHM%##=(YnPkh{kDt$UiO$3W;$q6Z8rR5*HFUj$Hu5fA|(Lhl7pm z5bX_!D4g&LgX2VyeS{&Yaj($tA15g~;HRiyP{>e?Ft=?zw;XAPw~X`m`h~bi7^J9i zVZcX?(>@_NF7)}SafT#uZ-}5oLCV|kLIHy9#I? z$7x>>9%YzuA<59=!2l@;2yg)%zy*z<1lw-9T6fq?H7QbDgb#JLG(_K}h|GO~l%OVc5S@r#&oKTR<34jd+d6pF@0{*aKO7}^)2 z2o6jFM&C%BkBx5k!C+vhKnWh8$7#|_kBhu?a6Ci>Xucp2@CtkkXGiC23!}j(bg0}n zvV-0m3X+r$_u=D&Km?=l5$(mVnP9aNYwBWaChr|b{He4ivqwpI1UrQ z7r=Bg1UW9kL-0=#6~se)pCBOOuZI2=-ccV;t!p~glqzutJu-R04K};m1}c`+#49?3 zv_wkZ%x+n;d}A52{`wjWZPsy`N*Cwa294kt=!+I`6vQBi0-(@Xbm4sI=G>MQ8;{+2 z#WmQLCf@GL+-uJm>2t>%V5fqh0-a<~stK@P^X`}=UOIKx>e9`H&cT&BRPi(d9_QNe zkv^lXV(&6~8CX0qJ*WgXX_SR?rJ0MiEZ2xmJ+*gj`IU2f3mC#RFrafUX&;b9;zp+& z>^le8cILdhXh;AKrsTV1c=d8^$ou!$w(>zkX96poG21n$kAbyAD&UU>^l$*omT&=l zt6a%EyME=y{j=X3G$_HA28{^nCl6YY0js+J`oCDxUOK#bxkhy2yI&kc_YHE-MISbI zY(m{@xtop+%(Y{HiZx-tlu@d2Ab_Zh1e9ZG*S_KYWg8Lp>aPbrnhWlhRWPfcS-W$j z&to%F?j$Hj=S%qKq6=f#Dr9;F+g<9peRXN$<=wqDMrjUEGIcH> zb>NzGzze8WZ=i+z9h--<(ZKMo&BM~VKIq82WfYzIPS&;*A4;`hO(o+M?E^72?XiU! zeUhDdurZ2$9EOLNrmonsQXBBxP1t}^Pk>Fznqll57mYS>f@AW0>HNf}enwRA1P#X8FeQp|4+YRRv9=70{f=E|1Zc z0ESg0+_3q89Prt|!Au&WCHkr@tCwp;7mfx_t1;|{SGTTyv!QEM$8*@5?E|fs@y=_0 zhCAQnEE6X#e;ym!9~H*oe`fvM%!|Uq|7mC4`oVwP=D#=FLia-HJ~HU zU$C{b`ENbP*8c0uSn0<%jG|Wpouiv0nM`Wm=^J=E=lv|%(ug>1@r4MJSB!fohcRAy z@yJNmQXmq)bKPj^*7rgmal)EXcW=S0A&ivDET)W>8M!4IDINdrNOv6+&As&@`z$JL zy;d=3AQcItQWMcT!DP0uwqJfK>&aNnUR=7g#IUsI;>ynFq|nD>oVr|7s8d3PspY;0}PZWwWq; zNzvofQ!uf^{mV9@x0@AXK+^!asRJ{wKos`jwIlQ7AaC~pcK2=omSEhZ159pk&~1(c zh$e_ZRNlfaUuXZa9V%}szw+j7;~2WUU0MCzbu>Y0&+P5r_^C79re8(3d72DWI@0-C~3l$e`G`j>4(hg=tZ8<|dTeiohk zT5o6R!&_Qc9dGD5r{m(b7kK|@8R5#XU-F>(%9`A*6-i}DhdXw{{Lao_R{7*wxA8a?cIb<-JIAq$sB!1A$Al17hh zhE4>PN>|P=wJ1ndDQ=`l>SJQBz7LCO*Ri|q&|~XeO+Z7uf+?TR`V9W*f-7our-CX` zMZ0dhv$MOd0UeQt&pI}HCxc;l>4Cep_sX=i-%d`GB8@>f4PKuBo*e!p^w`MVyVyrA zxM%w^a{u~!R*?J0PTk|dmXYq~-8U z`&()ZVL!HE$kw%p$nTd3^pvA$oRUPs-U*GcWPMez619TXiUQmkBM*P!j#d&kbf){8rV$Eqk&lF6*eZqW#%wqh|l znJB5A8R=RIL?=JLdjUcFv1`k_u_0+Y(6F~cL!A`=blJ|*(0*+EAr?jJB8qxJ^y%WM z=h*ijQ3C%pG(Fxm+40-<>p8YI9xvBY_8xk7Csu|eKo_=Qe`1(NT(P&J2kTcTP%=Nc zx^(KP?v>ZBstI3tx~d7cu$pjxV&fvl`ejO#j{az5g~hAr)CYd@F--d;qad04Dw4Tw ztv-DPQOWnXVo+a{Q+gX4oCY%j0=fn^7L>FXO2;1uD`eS5bn=J(s%jKJv65=M;fY%Y z-4Og_Bjylq&l_xR2=Tdd9(V;z*zoG*8qw5qif#XeejC~+-oo2i8}m}``c#%fCH@a# z#1J6UgOSI^q1})zFv`GSl7Y8z?GK07EZ>NZzEauJqop;^t~BDwXKxvVxLeEIb+3Ou=L2ABi(gSG&g~dm2Q3Ja4GPD0vuIHG}+Vz zgAJl=MGx2z5Rfi9lBLI97zRgmxklvuS+L5bvY)QBW?%j(7;q3)HaInLHW>q<6$FUN3cP(xeXgE@n2L9f=8UwLsZ*Mx(SHdlHk)p#8D9~UH2k5>dQ8wqlx=ZD{XpW zxU}ZiD~*5h*D!vW19ChNTP?;Rf0uwzrv<{ho;a*9@a%6o`TXcd{fkOE?=q$=LP0>Ei7OmpAzjkEH_}}PtXl6E zUei`Zan1j-I<{|-in`7EXlW%$SMP8s_zp-u$nb(H0d*oTx^0k>P3qa)R<88;JHrDjG@{;j##t9U zx`K;%^WQ*K+2T+FV2DBn8GJ)e6f!yRZ*>voslOEad&ipPJD?NW|MK66K2XubqKdBL ztxsV%R^AKVXZ>|Gm(^y~v^}LTexhncET21anlv7)Qs~0c~~Qh0x4l6mG;=E7DCs28<1KvWY#2 z;Ic_MMHD^Rh_Pnma;=LB3Mrbf6;=%0(u4u8!csxTH|~bK9Ax7XEH@Y-;l+-#AH}&? z=j!FUpcA{E`ftq14f`ab#o#ki3SS#^bQbkd{2gGkp3!>mY0MwE|`D82dGGG30xV5I5GoYFqwH+BO)6&2l=KZ4Wo8>L%p7$AS z$TkG>y6Qkr>%-9kZDrJ+DP7j-pAMlv55lC>fzjJ9{$*^zS1o^LEmqTp=!$h1xY6qt z(Is;+%1WvwT8Eev_(N0}9T)<1bzo#Za5X!Qp7NiDu$s$?Hg5z}=Yj8ZS!>0$&syXb z6=^g3APhw*O@bIYryo$&fzipEdPdRn9g-$=H-UAQzt)efsp@?6${Loo4U4oD%?8C3 zO(b%YQ%Ze`KNUc02LNFm7$E?p=kQ4SIJyAgOxSb({Dzxj*uY?)6qiCmlr~Y*`m8Nx z$ua`;=m^$_io;k>cU>Dgdg3)!QmjTNhOu7_K&=F%U*et^)TNPz2>70ip0p&{=SNmA z*N9H8>#E8M>DCox#Z6m5RzNBSq=6b-ZpiV=5|B?b=Z#KH0$E2v1~1==u=%Ujpi|rL zSXH_O1y?W^AfgN+QoJZ4m-5_yV8z3Tza3KyKs^nJa5I$aLFoz91wjxPQfqQl+K!F% zFWZPtX5Ow2e9ajv4t(+qR!GVW3BU`XZ72@}&l~(9!cE#~c8yn~T|2NY2y!pe1yWvj z{x?3%I##W>LNQ0#u@|Z~V>LV!QULE-D+udE4@e}4nJq7o${>-RtD@P)Mw#XZ4Uh-e2|POh z**lmN&>c>9!Q%vn8I%>&{?JH6fF@bK6`hRDd?Yp_heJ(my_Mw0N9hog9GywR8UQ*d zu!7PpNQfCA4Xd~LNvI-=q1Q=lc;(hj6!x19^PO6dEvHv@mM<90rb&e<8BqHa@fjwJ z);TdS-0Q%lx8K}Zy5;iLGA6+KAl)f5M8H7KLycNOuY}MJlzPEH^Js?<8-^6f@~vzd zCyg#W8(WLGKf*Sl+l1IR2V`O}WT03y3AL|~sDM-nj44i6Fu^n}*NP75VpU~;ej&n~ z%kLs2-38MGr8*He33XGpL<}-AP(P)KLc*~|=t`|i3EhpZJ`3AF2qm9vMJ@0=j2F^J zP~rt!Ur(Sj&c+~rv|KAP_jim{v=+MlY|OPhp(WVvRgUMhHFSNiDbRUcM^oEloVM2M zd9BTlv7x3@!0}ESFep=DP+iLH#|gbAsh6v#Cxu==8dt!Y)q~NY$33T^UrVue^!Ia{ z)|T&4VAp+|<B=OsE|`8x1NinEIF108n##}Mw5IYDF%RM;w-z|+&D zKP?Sp5}wS2HG;+^Kw>=@o%~?^Xz9Xh`p}mo*s}vgwnQ!xVJq?U;39!AjT>c_7%ED! zk-lXb(UDa*ZoBUJRZZ+D{mV};vdY-)VpGKQN^n1v5FU*=piUDi4PtJZMLoP>rPeAR z{6vZkpbO>LeM9^9Si#5Yu8h#06+ls8AQRO2r?ior2pzIw!(B_E=!tHLv1${xw&m>P#k6o{ZNe!53JCN9-Uh?icZsD;T6XBRSk^K$hrljO*P_F&!T>$ zx!_Ydw|w6Pi>Bynd$FORc{5}N4rGCA)zXO~lT4G0ikO-V3k|>#ZXYr>R=qdQA$-hUJ00NFua_ECKXY4-B~uim)|X zPeYfs+PUZ(VXU>>dEO$vbI%78QhM5=-B!=-|6vnULO&hlvn*glu0MAhkj2&;sHIDJ z>eD%`y$lg36-1xL7NbvfOZF)X2^+DE%`%mb+c7oPTdxCFRt=)^WlroIuvxb*j=jz* z`)@3^_VT%IOo^@QxKVJeEG^ z$b7d4jDP_^Isgj40I_bcknAKB1wi=%cDC%7)j+$_H=mO;qd5 z&}0B>Tcc->I>aRKbQp@g{W-lX5b?y&k@t0dhzVi6D|L7j>l;JIOBfg36~;Oa2Ui?I zG6;gpO@a{(+EiZ*LrDkNl*Kq`SvP|Y1;CD3vGquceNAQmp-V#8u?_n)=Yi@OsR*uM zOrM^jY|gk#uFjEyJdK>61sPKhUI@7Mp$#$YNw$*pYF1!fiH+$x|{X&=drsx{9I8>Bkx4p&Fni$ z5Qev(0ULC-BE~#~S#B_71(Rw9%K0W}^xPD-wQDI5VefSE(Ydd;w3g4A#&p}?^huTo%CD^-_@(Z-_vmmgPkSIFf ztzdE*Wl|e8DHlq_Q&TQoHiViBfT|9R9`&zR5*t2d$OC0ZuPdTF85|I8Ma=610hux+?KQ|O=^2YlXj-f z<~)h^uo!DJ1=Xj2w=&KOQaOid{>wWnzbY!Jy!%2 zOQGNygH76VW#iiNSr=h?kcE(ms*zC7djEkVSsC13e&VwrQ3p3Sv|z&xjhU{Vj*+%W zY`FPvTrcOhSef;Mcu+5941oOF1~c9-{RA6{=03qjWniNRF*H1nxxt2qgGw;o6F6iZ5bAun%EjFPG4qzR9kS8mKAzB7o1S*YK-`9Y8 zKR3~b4j#Z(uli&wdijQZB)ataw!JG@HAe)it}Y$?kc&=ThIRI<;c$-~`~*1hCWDY9 z9BG5XCNz5h8vzlqY-0=&JC6>cgNL|0l)N0fA2YIsw3ah8Pxyg1(iKs$lnXwcH&&yw ze~5LU%|uf(dXIzIQEGo*JK9}pY(W!OV#gsB9fxe8o`DDhoNMsYtYK$}sq;wj1u*Vb zXe}S%U;IU=FKpi8T@c{xVG~vu!U+gS4MM6gDQDnx8i}Z@Sif=ER){J*<0v0DY(0yu z0&TkH*5+0F8@kT!aI}2^+uvy8eXse?+~M+;&AbGdV|p4GGg;ZBdS^1EhPp~KtO$>`Ndj>%r)xZs%!b{Cdod4QU~_av)lHT4~H^>?EY~C!xq^#x9MZ7K9CV*MSjs zr*;f&K7%({obIVx2`D(OHA}sVKVf5NxcaP;|5>KZf?a!C6yo zy#_OYSrT{JtR&^&XY*yu5a!@T@N+2lz&;mj98DB zR!z~AUzxT$b)reN3<<8owszM+5%%6S;ER9olO}Xwxv9VW_3ME6AteRF4_BmuTLcx@ z#DqgLlLn`fkdx@dGhlvx`v!8;&-^3^7pzhx=AB@S6a1no zVb(`P6DFd9Ws`s;8PUfo&gy!hBfE@emtVRG`wW{O5fCp+fynIij-uoDu3J;?`wGl-uR|q=z_ZFo#j{Z9l;THG`ZiDlbzpSp zo>?#%sOEL$*KdQU<&Yk-BQ+L{7aTD;<#kZ$qK6>$vKU%*2ds8I7#+FpbKB9Szkr3> ze+P@g0I|pelNBx_h4iGBl7%8NMmXV?OvaGpb|9h-jIdJIHq>)o(?I#??U({vfA%5` zUV$4AQ_6(ax3!801?9)+rOg@>ON`$RRFEZT=7?exF zXwEP@icLyXAJpS|9Rzo4bm{z#sQ?`pl5n2GN=Mzu{{TGv3FzD-Z=8;f-v&DV zg$LNlv8n(=)vZiQ5@spkwEChmhLkCm^rNef!2;ET(a~e8&w21$;M)u-r0_6XUk0V3 zg%D*V!^Wg}Dm0T6L5v`KkOt!C2f|fh7)tovgwQII z1?2%dKfoZScibu?|>HNNBrkH&6KTPq%CMZ{i+8{R^ zQuQ;SP$2=yR<~JV7Y(N~-swyxnhe4j1X3hA6KD8*q2MEFx%`t5Tvg%!jmg3K0ua1- zrEvrdEb}z@ny14k`lX*>@>Nf+z~ub$DO2O682aET%+p(^3qVhVe*lB8123wG``7P@ zLe2gpD2G02o!BSP7oUbl>!1~7fIfH{`_B43;l=pWQmOyxx}aj)JiST@M_Zu)(IXS* z;UH+e z6(!j-?2ZV!_c?6K%B{qnpFGJH!>{gHYHEW4{``-YH^9pWFCH7m%GRHNfB*wm5{Hxc z3CNGLrv!444x!yneGc9GJO<}`mT4_}U-z-6Mw+)27tApzf+K+QaQ2`G>Pf#MQ$ zeakdKottdU5}I-g zG=Y%{#=9qGw29%s0(&qQtZX=Lj3U2eBL>U1E}V;L-ZHaDQc_Ln!8L}+D%`ig7N3GM zOIi}h{vtcu%e11CH>`tmF^ge`;qENNO*Via8!)hUTqMm^R)`%|qgW4fAp~tHKIAwNxF+Pf)ZjQ&jM$Jkyj) zh~9b=Hf|jly?vK`41M!0-CA_PAFDq3X{h)oY{NP=SY1`;-eOhLNm>>ZSSeZ5I;BUE zw*XNc6k!)^--<4M18m*L-@-nudgQPD1smEhPn%igP$9~yOJ!ulq>A>XO&W7NpFoel z4%=uc7;SlG`!=-x_t?LySkC!h2oWgsfTXG|4XQ~zNd*fb(L^daA(#oH?Qg)W)q~O8 z3tJ&D{7~Z>gx*+)5j^-N#0XRnVy>D0qO`;nbowK4L!8Dv<`{Cn0`x3}q9a*stbE@q z;Crms>fq6;EfeuM)gE7{C~^7HihMYZ{`M+7x)h4AdsUxc`-OoL#8Hl`Fjft`Ste!l^k+J zwN2ukF(+)~q*hA=9Qu&Q5=OCiu`S(oV07qq1I*#Okanz6^nd>VGIOKsL|*A zXzwZD>3T4mPXq7ft;RLwADsd_Xx*7^2vmtGtI3xtUCBVwACH7o$*>na@ONyav92Yo}-x(oH}S$zWSd>0r)2HCv>-U=!u?zScA$#5_lwr2hI0D(@v z596r=BlAE@g)s)prhh`zyqDJdHB#D;6i;axxa3C=Kwtj=9;*X`b^p+4`QIO~K{AmA zwu2GWl3ME0OqraLI3F*j-BXmS>dI~ukZ@A{BeSZm7sA&5dJTIRc0Jm&zPY9R%)g*) zWz|y+T?F00`OqrCLgO1rZ;GyK+INKB5uk zLg=4uoZ;>|Fnas%SB{k}?Qkf+iYM2>*)Syd44|oQ5jZ@n7m*o5&`IF2kT6N2`#Lxy zJ@sHTmtA{0>geRu_Q;uCfX3s68mX2FH4$GVrJ#)=t4kAvYfGpAdbkm&sRN@E;%i6I zeRAH~@)=DW3;2sZAf(FEMz2~y&_Xh(w`U!cKomlM!eD~xz{or|3Espzt?SAca5xZJ z*}F)BcS1Jpr$vI0HINE3OjL-j=K_K{Fq-1JM$4zToESDlUC1s^g#(!+F`1zBVV6ap z_gM=eKa#h?!*yWvsF)lr-_**!Sa%+Er6pY%k*&RMdPC_Do%69zP9ID`?>k*A$kfJD9%z?nPImfViJ;G zr_U~g-4$*q-pf$ zb+F#`U^e&;8~@DDagk>I!lEaJ02dtqTvfqnEckL6O5h4a9fqKO!XrRm9b%VkDY(@8 z?kF;~+{s1%9^%wO=NmTyCVdPrRcEj$FoHAe!{Ka%B?d<}1gOvhnCif&_h*M83eSaL z!5cjsh_%e5qIi_%XD2P$i42~Q36Xjg45l7@-O(>>L#HlY+h6|nDh>on=qS8cTv_+1 zRnF)LMBK8m%2z4 z0$U`bF$&S81Dvg&gwAy-N6W_cRU_aa4RW^ks${mQ7_F9S!ZM{lON%KaSPQSM10(Sd zq96^_OKp6^KX4JrMXgk_5*V4~>t?_HvTigq}3=RB4VphIn;00Cr5{+n;3M%VM#Z8ff zRuJ_e{bqJ%mV(jAT@lDdP`V~`=Vs0aRT=Zl7S4wC%oOa8D(hNiQUyZl)H>49kcdu` zXx}L8kEKv_r1v>cRyUu|MK6uk81C>k7EfxCqyixp7fFRn3a6j=PM;D9w{f<1*Flk& zyJNI`aNFVzc;GZva?;?`*4S1$Y1QZ9l9dVngxDMu`XlJ39Wb&wFgo(;+R;1S-odE} z&i*qw8`n($lBzW}W6l#1+O5cYZ7EI2FGfG!&Kd1m3Pf9OQ&$o-1Lbqh;K(3&G6~OD zgD06d=^-d;A~>C~@#Q&x9C1zuBI>~CWLu1lOmPRwQ>U}6t4{!i>YkC>1lbVjikS6I zZ$hSoJmvi(Fs)0$=;%NZNRac^m$z;O1nV_PSe9xqJCu((Q+(I7Hz~u-9w_NHoC(h_ zg;oxq9Byx0TYltBcznbB&NL7}tYv@&Cx~=hMEcYgnMg2E^af)P3g?XUega&khdJH_ zVRvmqOR7uPak#0e;o7#BxZmaITTf>Vw;~9;0-&yP3}ea#(quZMau<^huSk_ZhXpV@ zbzn4i^Fw3hw*-qz-3JHM*3lOOnyP>jf;!?8dbtG1b4jg8%-q$7t{^$9y6ao!{w1jy zZ~sFsu<>6hU_UAk^Hs%W%Mue2M@(f@yZA~5G^I`iG}S@Tq0uWx@A#@{fo-1N#o4(2 zBA`fA5x)~q%BY|tOg<-}gZ79pgwCJ=NgWuy?SKN9<3H}?qRVN{`_)}_I|JnKvx{@2 zwW`cfDmY~iYdm4I%7(({fav)I^k|~%G(dF~h~Kk0t?2o4IHzhB#U6HFke2|$-4&7I z70*b8WR`H5GjXMEa*{!h;Xqp*7@4zsN6TvomK&KOJS?p|%(p?DoFWX6pP*!TAe2Ba zF(8lX!H5W-F zVg??j)(U_P1sQ*6h7cCKaJI}76VP7t;Mu^2p9G&g|MJ!456=e0arj)$wUEjV#NcK} zxPC1Fg?$=0`v<`VC?Q4noXZ*RU$(V8r~2u^$~`XJEpwcOFaXq;!VPGU!h(uGxUvsw z5ZsWvGo$Mz9JU-{`9>@#vVWAm+BzSb!xo|waQ|9?z040z$K>1)H!>>Wni;sb5nU-` z30tleO#Rl6->fn`*RVhxTOkScg>i_Vz@Z)}17j~XB=s~ZC^*Bbmup3@X!<`Eq~LCu zU7!r&C2$pq9`avd03BK!cO9aQh+* z17bFC!wG4pkVC^^&p|HNisnvJf2>fW3(nTS`N3r6&Oo?~6RHs_*KI(3f3s><}A~+u!Ij#In z4P0fzCf>8n|7yFw@lcnhBZB<`lx#!8JTuE~t;)7nNHjAHm5XX;v@*9Dw-e~W^MS$Z zz@SV6qvg)eEXp(T0x*;KbIt5Vso>FQB=H!nHBplj0zDJbp$F}NrVa|4>xymVZpR`T z+6idLxkiv=RVkD*tF$=b@f)Omg~Dti5$8NG*6W~fyUBJiwY$C!`R?-;47W?pXHCG* z0zp-on9IUNg@n^E9pWebbi_)d*afid>%r&*c5oCudI6^vVtH*ZD|^(y^E+$$Q0G?L z@>y42DVcIhWP&&vw16^N3Pl(yLB2`?dDYKZIATy{z~&3utl&$zG-0znt}&^n{95#T zD{C9n0kP8=kgF4*P8~K@A!}h5FT_{!X1F&?=keL8nWQP~qmjx4b6W>xOK46*&yO?? zmcMHP5;j~g$KIont>iT$+3-Y~g0jni&ty(mlmV18T?EkA|8~gP}dcguSGo` z&QEJ@g}b5U>@IcV)7-g^gPfkWCmP(mzp~zo3RO&woGfG^(jkq+G9``9*wK42Sj;*oI$7K_S~kZQ z*?cC!*|0${$KF^`^=>thZp*7z60?3jt9b7@3dFjUIleeO>w83t78MHP;Ck{1qV(G<%d0nt>uA zGZ6@8Tv25A0fss-A_fM=(7(4dt}Y+R&NK$~& z)qzp(bQ9~JZsDSv3kw|iND(Yo#E z;>?1GyDN0&6xzNhox43dpI0Lb&QQ2qVAIzqZ^x#nE9shJaaXBvJta z4zvkDk)!xD*m?EP@-5RGKf6l(EZr4(;)=?$3K9;yI~8^XZjlGj&$95oIxspk!aA7{ zw=Cl`9LSC)DVx|w3gbrogd=BWL}B!W94zi9z~$pPSX^K$_6)jU?ODJV`Dj8)5QVrB z4@AQv6B9-MD8i$k0GD@M#ED=V=sEVdcGVG=m{a@=sd4kw0-si4@n`E!T;MNNL*qj&PDoRzIqpD&UtHYD_*K9b%p6X4daj}z8nYEqkgiWEfrL5V{W^z(!0;N^gVSqer+ zA0Hb<2i-R|q2%=X{s*t%2(TW#%pND?iLg3kF{vm`6e&N)+1j-fijIEerqS}vpW{G* zl+dnm$;l+2nI_Xyd56c3KKwkqst%0ij=erswqMB-O3txI7ORRk=gIgjq>ir$&e%n{ zTsDlNSAjiL2Sz8J{(L0})Kq@_D$WyFZ#eI_=IH6TPJo9PvCbYvUpfdctpiup6#h;N z+-Ny>4d=W8s89x@mxily;qr7i{R4NN!-doYdgmIjIhSpOdrEj965eT9g*M;aw8EJh z#Fh`TmC++H(4@8GE4U7|%%lZwn1s?txDO4khNjWw*Rsa)a;^2o@-WE#+AWPx#?2mS z$Keuo_7DeK{|N4YJ%_S~IZ*Gnd~12`yWcxhDYE7c&$TQN1}RfWOjmAghwQK;%HHq~ z-vB6}(3d#Feap0>6Au?Yc8@0DYF;1E0%9X zm|Xv{@Fk0hTmJU3%7y- zt;%kdQX-tlq~xh|LYdB}bDf=bWdQyCmwVpT&F321d5 zVp^V1CCo^ z=Ig)}F;LyZw;tiW=Hd$=55X0+;_PzbD!qk$4y+%o#RHiX0C|4h1=Tn z*QOVn9&ft4snm3FQ=m!T#58SaYHob1@#l??G=8n|s>Yed3mO&h#fMec``D}4v)D20 zMrHm&JlSs>X@d)lP3O* zN#uC8zj2%+#T5i!qK~G{E_{M?WE`uiy=An7q~nZsR;y4N%r*tzUj0S^+(^z?DLQ8g zGBd6)f10sttK=(*Leh~Wyc!{)jmN{*8>@H-1zsfG39~N%_sGuBG3)ATcdc9J;_E^h z+hj774u>t@sdkrIBNE!|$cH?PXp%59rr94>`+YTK5wfffcldF+m5Ob6VYb%b@lR7G zDiM|kCn=|a9E#TP!088*PwkXMixcJ`wPm2z-8Pe_rfHQj?GDeV1k}LpT6Zfk5tK#+ z2A3uqph)i3weCg%MJkMuv@R6WYs?|l|J2}m>#UEC5k-&QZ4GO4Ax2kg(BLu3oQlT` z_*8sC#@EJba9PAocuY|C;b8RQIJ3US4*HB=LC&}*ER?QAh zgi?|w&vaJl)Q72@#HjE{BeQl5+=-60RPpO=$qWTG>>;r;6vI7UE>rEV%f~!clZ{O3 z%%UhxD-Kt?>k=w4Exs>*8nm^gn9dMUFg`Gq@ba36oyS_=c{k!AZ4~5PP&#Ag!GB*v)+1L=}&!V7Cfr zM>b13b^b81gR1sdCH;`W_gUn0#x?0yCtCYzaG%&sPFSs8anfZHO9@`E2KQ=kDz0_O zL)xr}QVTa$zn6onTq-%?g!pPMIT^Eh{p;SXeq94s8J!dwyKh zflv9gzI-m@WE2ze=9<(~+Kp4BEtZglyi-g(78<*})?YUhr?XVjAMsCkXltnR-!-^O zBclD9Nxi^08<0gk!mfYS2o)C+xFBKD5qY=(FSPlhYJWvR$B+e^rC^rC8JEz9U0dz0 zNNYoMA{;dMf?-BNpLwFzJx$vP6V#1Jv|)aHf>^hs29J5-v_U$_BxK&nqJXd3R-1o? zEI`w_;EcdPid_yU`R3LhkO`thEM?5dg)U_-!8iJ9aG_E}XH?p3R4x?c<>a8J3YSl2 zQ}7Kh$`w}Tag)lWKC{=T*2g=ucCV3V~$GP{{Dp5$ZQJ zxWrwcb1t(w!YGs;e}Jd1qL=bLwp1{qh{#m4!Wl8ubKjaq0{i5}Fg580fpafywG=1R z;Tf4<6C;yV^peSFg60Ds(!ptIj)`?XUqvrTh|Fe6nZ^^5=u|o?_<0SiHiXqhz9SZl z=Osdha}SGUR*FkR$`q}R3-Xx+#aG&i#*3=`#UcGffd~Y&S%WBH^7hqKi`YX8T?)d9 zi%A0!53d$gi4ohJQaUCM*29l>M;G9M~qw+j;*Ct(l@Y_vaWf={TlRyHZjzfkIMQ#L{?;LGrgR~0kX1}qel3R*i^ z45W(*Q>y4+^-%Q%LZL@Sg&9rM70?F^Qd;@b8k|qLKkt$ z;rBsK6(_~D0SHNrmzs6rv^J5_3lc7>`NQf1f|$!gC4+F!H&|R@fnfWK)d>>#Qx-)k z6?2#jDW^Otd$88s;uMitk9DRXnDX$o{*mq~obSm_(o>m99^5&J1m?c4yLwFu^1;v1Cq_7DfYSRCGJcKNF+< zE{$62HcI@KEQz0A>mT-c>A25^%itatH4$BPcMWdN`pCqLVrE8Vv{Q^gJzsmRGH54_ zbS`0JQXz$*=dNmZI%`dlUUNpLl{kabrr4gHHTXopLNbO~nOYpC&4NNqUQ@m_P)Wx{ z)05G>GOf|m%BN}%*g_O(4#=fOxi^#!2zI?wgKLah!VC2&sv@J4$b&5p*WfC8g4V~~ zxuhf~5=}*W=o(yPjlvl+g*R`(r;D?cmzk_J;PAy0+&68Oh7+cu$!Dl(K`O5-P%aam zin!ov5UW@JK(#*=3aUtrHk^v;z1c(}vi0g3+#O3%CY*L8bT&q>6dJx=gEJ&SI<-!j zTUyMgqx8lYz-PhwA&crXCB)+?Wl}4ebSBnZQhk8T+6z=6l7+9q<#9`f?$K908Zu}R z8OaKgJ8v^#5Ckz`6p(CK(olZyxyjzqJ(x?Y6C zJz><(`kV%rLhI58ch!akr*h?_E|bw{Ca2+GrjR~b#Y2!&)5LT!9khpw-kFs5oPSl} zcwRn1%;?-+zYLCsM<{O1*u&*vhRWMzQwDN62O@fOcU$wT4cB6ZM$SG?ob$WJ?TxFN zpPl6zTd!-qq&3)lQ>(sJQ1NTu=KZQg%6pV|C+`ri!1IEiYU8#v?`|IDv}5mJzrmis zz5$otT+;N5rtdc$0DkeiU0CVftuLZ4pG^ezfh&h*}A z6fgH8f*?o~-GcZaqJln90_q5Yk0`}1Se~MYL{uJ%3JO-#_n+A(fqT4pPu60stZ(o8 z&px}C@Be`I;aq|!^=pb~8A)(i4owoW?Sj~#tmT<0_p;@XPjpa*JwwaTC7R}ziZRll4)MuKLhB?8<{q}6vVh}* zO6>@kK##zYHuE@px}M}{OS6#dSJQkM;Py1!uDXH9o$XUd<>LYy$COMAh*Xdk9FDxu4JRUpY}S}GJT_%=@PlPpcz zOnweLCw&fW@g(tweL=29hdr%kFR5dkvCPPJ(U1jP03tn$v0djg$wXpW+}*~t^(0xz zT0LyI?NHV=Zxl~!an@U8>~U&N70*qvd@W76SdYZ;sP1b_EeAe#p1U59sY{N$lArLpCs#MXum_J^(MU;T~1^FjCf3k zsI$FPFqq22Ln-n@uLlnDza7hKi+CF0o$) zTm1x`&J|%9G}8WNZud8Fd4hGyO_$AmE$86OTD$fRY$lj7hIbT#s<3|SHsn3>!|hAToZnv|^|Z2~ z?0z*NP(eEdVkkP2dDt$I~n6e zwXaNh%Z7A;R$8?N$}3LD(VVG78^Z1iSK=cLPu#1TxNF^6!n^fp=o0TP#gej|U{qAG zpD@;GThWyBT!0M*eUzQj*Sblcjr6N7_b`kOtjj}rA_t%+`R321Get3Iih66>GQWVS&O%t(OoX$ zB~O-7^_s?FrK~JF(kJZ}@l3HuXY7GgC(=~qO2vtD(NFJMejn6w*imDg)}GRl$!XIK zeo~wU%MP+nTFhp9#oBF}lIhch?I^T!*%sC^&^E4My6k8fikm6?S!Gqk+4Cg0xW2A# zQ}I*wiP>3~iL$nNW6=`Vddk$OSUaUmvq8tZOA%$4FIRG2a^2ssol=Ce>GDhlE;|#g zEV(a)?Lgr0B1CAcS}S}y)aBA=C`H^xJ84JK&Y3EvQiP|rT#L;Vduo-zu8syvF%PfQ z>=CmUYY||wGy`Svy+?_Z?@FvC44|n2SvT5qnqNK@J=8D^=#QdI`hRFuFn6Vm5Q+4ge zT|<0HS+GT8B*Z|V?To3Av7}G>u=odL+DvBsMwhNxqGEK82#UC}Yi8`GOh|3->T+u8 z3~?KfucUJ{>#%q1ktnMUrq6j8=g${oX@)HLHA#1@>B>{IUBvS}P;6QX2J$LniEZ2Y zlf(^6KAp0YZBN9lj+>jk2t6Vf|G=NnlWu+6)>4L3R3^WDT*PV6B+oRRRG{X}XVRM8 z;_)Qc$@|E%fwgp%e6rI>PB(D=T%1ZXCU?wlGSJQ?&O{M!5ffZ3o?#OW&e``HyB>xu zi?}Y8r6Y8!nKI~jk2|iq4mWYOV{9;eBdynZ)lRE*2aB_3i@_3Ut)~-ZRovsX$H|vO zJQ(F^)?O@iyShfGLhpS);KKTv4fI1~o(ePVY>(}zvwN-;|A1q2OiX8rRmu=lO`G3& zvxsZpBDrogHX7Psr=KaP<}sdWg$txw8RlRfN*hC((f`5a%oIAYej^qjyQz#n%5Uz7 zu+MK|miV@=$5vYQRCTH)nt?lLy47yOm2=ajWi#YajHk2d3{{L;9;Dd$JBiK$l z6KQ7Sy<)7uRvaB(DGr#lhl`Uzts`$WX=*+?yH~t_fsz?XTT-RA`1@MNk~+WlOQL-U zib{1dZia0#t!O$+e;4C?xlU1jM%_|%3_dlTJWHGo`LMD=<~3T{>kYRc6bLCULOjcx zNoSt%>oesdZH@2#2)2{zMtY>ZqzhP_zL+MMJU0!vQ2(h+Bgw>Flp)XzYpa^%HgVsU zN?N>>-PqQpQ&ahDyHw?M25bC`8%6sOKFuVGWZ#qN2JNBLq(a1P zEi0J|rmQAsm$Y~^=k3IJ5_&SZ6zj&ySxOa;IWtrO+fO?Ben+Ql%#>BFMqQ=&vY21r zqiJWgT(1U;oX4J8FYe0|O?`?gYr9l|?ZYE-VO+cwPGlTv($}mN%Qjaot<=u^0Gm(5 zt&J{4r8Dsao#Vrrt@nwzCv7Erk!&-Oh6|wh0TTagg7PJ3y}91*WDA*mU%TrTjK{5} zJP5&=J-vWCuIBP@cxb4kyzY#3v$l0-$ZsCoFZ0+SCznDiZ&lgprTc7=NQ zbg#7~Qf{Xqn)WM=_Fg59?tKc*v8z$EJnr9zCVz5_x_rjdLoUHt$GHSnPH&CS8eQGs z3~06eDvK;nj=W)B3ZsSFfU$VlZE*#(8vh0oM?(dIpM33J~5QF!9MVS9g)9j|KOzm9*GJ}G7|n8Q`+)+2fXHLJ?4PM#+s|WJo^22;jbkyFcYp5753(t z4T?efd*JW}b_DS$Y{wGuX+2blhe++NwAL5_IiSbkbEGgj9RKS+9xH$06Dy8Z{y;Hy!jyK%cni2U^r1eW<}Pz20-)#X)`gVILI zE;13cla@TnJPkC7e}M-ddU~WFTexQ3ta9=OxamlaKdLxY9+TZtQ_5wF1Ldyq2)I%? zmd}BL;g93>DW(zRjmdT@m{v#9==P&fu+=CcEuY&z_~%iePA+u&J{4#rHO2-k zEb2ZBl`4VJOZOiEdY0-bf==*Gcw&yILx3#~TQ*Uj;f`LaZip#)?dKiN?>$k z!~XpPP-X&!SIe>r>L5NGGwzPo(5L&&wuP~$YE~r(AN>mcS^}eks_=gFyKjJyz`kFP zoG0`r4Vb{(#3GY#`e}PDA4-K9m9Qa$wmkkyX`n~{T50ffzi=(1N+d) zr-AF;L%$s{%Rnwze#zvGiZf-mkG?ufPiMxzD(FcGa>4BK1z;T0N?V*d!ZQwg$Vh8b zfuaH3^eWJO{{6yNd>AWhkq&xNjq-TWfid@1S=vW1?m z+=JI?^!2}v?4DhXqJ<|%_oKNt5nBh^zX7)h44i-5K&KOEWo>$0s@2e>>b4~M+n)t? zaf{NOQ{v`N@ z30hUSvP<@Gk!OM#T_{nCxEv)09eD{1NMKak_jT}d{epbUK>2&9?32zrUVM9i$z}_5 zD#Dq-3zbtL??2%0B`B8V^o%{E5ERw6phy03j63%8e_|T99t`5%(@eOtAu`-2(`ATf z=CGrKe*l9L6r#5*!WaEvf)E6}HVsBz9=TAqXj|5S89WNgo{G!a_n5Nfh^A}@@q&wA zfg!&d9cmY#hxUwZ8+`i}n2TQ+0cTsvG=7T$k@eDAyzMY1cW&Kg{J z8*!x!y?sOu+Lt9Ss4RfjDFhsML%1W30{JT{ltaH8k?+~Ob}EX0w)X$(M~R%%g=6$d zpmIX=9GxK5-{p*624s0bT*u3x>)$Qkh(1WjXMuRSMivy`^qbdtX%WahDxZR|>;)x+ zPXYmPt`mb7A0egyM8(cwYwsMD&w)qW8d*STXI2cEJ`5zkrvN?}LO5%XBpSM{fkPe0 z>rf!72_dcZSrE1@q13p1?*_rAO_GRSdepy408}{%MFZ{)$x#r-oq|9_7AT(4MsX0N z8~G>Ydp50^ieCKO#jh{b8|J{TLlgkw^1cFu0$^hn2oeaIO);Zc5Kl(NY5Bg5Yb7Ds zfoVH>Y+8Pzz(%`f%=yP*&{~RTcjelwM<>|QWD#d}x z>jh!Ns%+=wu4NmHN-Qu)hpj~&L)x^IJ^&YULP_S<2>Rq)en?);&U`GNY@|*nw=!HcXN55N?gZrm# z*?xQ+>CLrZt{HR}Y_>|?o=>3m2CyJO(V_2NHq-#vJov>1umJ0kAR&iGBGusgeX3B& z8vKTs(`(A3Uv7melEMhI{Pv<3ABYfx3%AKb!X#-vKFdTc(N;;NYPfAowp=+%~Di*8okF{8DqG=K=x<}E^HtcC>`@8ik$6im+Lmgr#k#+$x)&JUD&HtaAJj#T#Ys zl7~nC^x1f`E|~QmH(R$+dMD-WTGBNu7p{=VyblT{LD3U`-nn0J@Y^={{63+paLc~q z-xgL|Z5-|G6^uYnqiB;Fwe~>$NMW?lS~(qE_S{(ndgjh83xntP2$kem7KDuOf=F{* zHcwf~`ba0FZK=ACaX@L zQ={8=Ls_IS%p0(Q03R&a5?hzu@aNcrOK)Z)R;sQt)RL`wu+6gQ7jG1rX*G zr{HBg?w&h??miXDA%W5IBX1XJ=NCQ?pYw*(pfFp6gW9<4&Fkc+j(=$Mo5ZV=dD)w1 zcT5i!=J%PQsJ7)O{0yEZGD$zFqd+l1qwMy>0X#Hbqe=gU6xz+T zEC>zZX^Yq9Q!Q{@qZ3Rbl&2CjdO!okmB8reMT^+^?hGv+rGkPJ9$~$Ry>9|CqS0ol zc`^n{ixye1Ac4`rn~(X$T+0d*mVG&Nd??hCLA%`^28ClosjBLc=miy6kf7-B4<0;# z?*7=~mcg6V!i42m78I#)4_0?l^#EC}o1#s9HsGm}$ag-Nkicm7e?B-A10&GMf1BQj zj+`$)=6-vDeCU<Uh$`p8&q`r*=tq~^2QQopQ;n$2x_jO1uF=m-pC{WrnIfJXfA`4W2XJLR0o^9D zEJy+gaguBX>87ZFzF|JmUP;i+o*SHRk#n*gk!28C5pDFU`nZm4=+wQ4ubgfKSahLI z4xYuUVRXp90)Ae1&Tbprqmw&jJHpF?IFf8wjJT^^48dcj-BR$U+8jg%JIMehB=9gY z*y}t5t~J0Kv(QlHY*8`@@eSZ25oESC=w&1PtptW1dnR}YZTrgNAZwCa1m6HqRuX*! zOzIe=rQzk(4MAyKWGaj9u!0E*j1E0?6Nz5DbNAd}yGX*SC`Q5i{AN;`%YsrGYYWIg}Wnamr!y0>r<5AQJe`idU50n zlUI(PJ^Jx=X~lx@cH-Lk4zJ+MCd!yf8VlO+N)MDt0uS48@Qg?Pv}}hD+&0OpPJ`y# zWRSEIG~bVW@YfP}*n9)*=k?`)JO-g}%%x}m_P(Vc8!HLnp&&9A=nNn>2;0LoQ&Bwl zcJlwzYaK?vmEJqqqm1=<}B0&~FIb%ll4<5Be0kbEx$179m~D2<7A zBQFfgy(f^2{CF6)kCI*johK53kC(v1&NFztnOl~j^J4N42$2d~bqE~^I^htj65Pgo zIZ*8crQMit+E_Ccy<|=PTc-`Q<09C8$MW8Ov}6WpQbB#+3}Tr=sETM0U3d}v#M-Gy zX80b7ZoOi18Uz^Rz7u@-jyJ=HOZqu<|8Kt;K3oD1yFZp-MS+XucP)*sUw2UEm(M*< z+({5~Pt4svciY@Ga}C+b+?(bM@(1TmQ~YhDD&KU>O-BBL?5l#S43V0B$82#nApaO9 z(agL&^Aq`-fkJcF&|xMsvM}S8e-D#rre7SnQs$q2Qg(Fu$n+-^=gLirspKF*Hs93LI~ ztzzHU561p$?DmmgDn2y!p0SSNUgF`gi$@Il8;_IXD8m)~+38(CyQJv!6(Njj( zql34MZdy{o4Kw4cmwXxsCEaJq^=}#85R=(JxK?uLIY-9m(Kywc#MfOZy?Op)!y95s zZEBYpe>D{JCr!~VshTk(Z*^cYQIN#sea$8>H|V`yX; zWwjG+zzatro?ovS{sCES`>k|8ZD~;LygTC~H~bJA>gQt=9W2$1rerhTQO4IV;__Ic z9`K%N!&6R0UFhc6h2LV_%{4WQJ`&61%Rm9j(n|}Nkqh2EmaNO?Pim?*JS{S>JMIQ1Nbus+Pk_s-+LoMsjfh+gZhr0eZ}aNsNn(<>Q3q z%>sXD#6XsF9WBF$ogI*X0ns{g<9mlV<)f7)vej1lLiTdh*vfA#V!X6uu<~@FW({RB z5G^(uUlbqsGm?j~O=Sgc;jGRd_H_Hbs=?K(dJ8-J*ieY&DZ1;*6@l?cC(Y`UW{0>^ zBOwBB`{)p-4Nb;HmMqj#B+qx?WmmJUJ4_(!u5^)%xG8Htoq~J(^tSf!cPVv?DRXX^ z7z_1EP?z6^E1ERB!thjWV!~#ZQBzK(w~emD3=~%XydpP1&S#{m`_Lp(_^<1IE z6ij)pt+Y{2YH2&JX%eKEfIXz~IY?#KXv?rCi33U1GzF*(Q%WY?qI7%#NlT1TR~Nw751g14BdLm zsA7q#QZRmW9+Ii)tw8DHcf#=;ItOi5f$~eF)8m~UUBgW!WOxptfo$%lz|q1%l~@y5 zr)NiTehm<~NMF3w3TY}HaQu;7h;gRTAt`g)V*w5mZ*H)1?DIp@ZVgLmmw*nDtCph{ zPga43bxubTs@=lF7^}lR+Y`=uvokepzg(+0s!n6L6RQM!b!KEQ&R*6j?W89Jp^A&j zl(kwM$7EZo7=gJW%eSGAS6f9xW*z1{Em3*iA7?;WyGFKs(RQaW{&8$SSEvI^lA~vk2>#tf$La}c;%;}s+3%z^lOYVpArguwSSt6T z9zIEGWO&3<(Lk|5`qg!1M^CkzmdxA~&K@c?DzM2)(a}ynY*dXti+|N02$o4Y;|?|& zW_Pv15=+=+gYqj&OvA(`i=|G^o+1^Os9J3 zhEA)KRgZLW`OVH=rO{S3%#N(h5n$&|!}$&Ntc8hLV$~jkHQPg_%aYq^>K!Z_R3dq__tty-#=^PRLgK7RpDAoWoY z3g0Yt)!I?)_eZvr?hM)V>pb~>E?Rbt>W0N6%kE;XYz$Qbnr_F^J4v8)vc`i`6?o(sk4;)4e}^9Gm}yQQF(Icr~|UVMG)fU znVvE3?3HYu+%zU4lQCCo$;i0NxqwmSv**m}xf(VUGrJm8+|_SuDvU$fRLg&i@ld>; zCnIH@uWL|-fjK+T$GAVxEHfp}V6f8uSfkC%Ux{&VIclI81|0t9v|h)23@d{OU__E9TcRj zr*u(GBdN7HEn)3^1^+Cg@8+pWE}}^llwdJFA+|47iY%F_W)2uMUg%ztx|D_jI%casUBkn9re7Ov)7_(0Ul9c8st zB$-6H)1>G+rLz~NtfCj6lxU}zz&}usFvG_07I6syO!fjUr-b%2jTd>Pl!hXI9-9$( zB1^9)ip(9r2~uMHv{<21I_>Q3IKPxfIpV{(U&1(?66stHaGw>uXP1WVv*Ts_2UdyO z=&bm|7KvLYVZ!;P?v?BQjB%;E;iR~seVzND;5|5Y&1Uc-Uc-G*G%xkc8{32HS>h)( zy?=7_`{1AQ4r1ha`SrvuVtf>$1&qc=KR$8!L_s(ej{R<8&&1UD%lJe%{{HbxM`eoV z6;F&bmJ|cUEs84@mC*;~GDTQ%f#QH-p7=BI4Dpq5j<}onAaNOyB|Ib7jOa&Bm3>Cu zo%)?CW#4%Kkd{uCXWQYUBJ|bmaay-P|d23vyC!8@+D!FY;}(M@Mb5Uz@#W z_NLjD@g1}IS>Np0vwP%m5T1B>C_EvYqn9q7;b*v^^2GS`ON3_nN#OuJ+MPZ)-Jed# ze>iQQrl+@0%SS#k^#TNuduZx=QxA-MNB-i}$EL2GYE8X)$~1Mx)TYV5PyS+L{p7bM zKR1LG^bUi{shk+xFFOi@?T<+{c&Bg!ROLeE2K6foF5)~VpKg-v1y~=h||h$&J4@LLd%xgwsJiZZt$!=yV)?z&QvXt zI(XYHgHG{{0aZF{wobd#6*!D0!;vDj z2{QqiSlt_@OigEibS0T)fm#2;&<+!;xC3;fo>KuS$I^1gCxk;0Fd~^)vTvhRJySg2 zXt=yVei}C!6OJZTRE#o3v&y`)Udc}X1RDxRG(EbgZ{=gvpx>saX3xU7yRUD9UWqnD zfg5bm#9*Ih1LO9w9LW`3p;SxdW~sR1D9-Qd_L57Cj|&#G$y_aCC)Z=gci4M$B21|7 z<@Cyaw2_;_OBCbGTgr?z4lbOuy%(sbru5j3(+Bj?tk(iDZXN!Zks>~ZaYt00hZlvQ zty)pG8g2E6_`5bQYhi+&oUfv0mlE}`YWj5i2Noq+q!XM&=VO8)vYeTWU>uzLJ9MOI zhP|sVSfl9$af&e3%0|kp=c3g_v(>1k#);7m{tGtfOEPLlJq_pPnBSaM92RlXuA&Vt zy9!A2X_HSox`a<^3{$BWDXq7uZdeoDx-veyd-w-*1W0eB!xJ=FD|$}fOiklaK!-E7 z9OX1sfFRc{h5VTfcsgL+bR|osSkf8{@aeKryX~ssD4-LSW;w&F69!e$=}r{J)5Fb= z$`GSeP0~OnD{7C1w{FF^L#&NYmza3PtjqT@wz^e)64pU(3J(PL;{&;>5VW}|3u{o@8ce3+qj#Q(f4^tvVistu9T~_{F~rKSEV5nd4=xUqB^=?4~KX|Am=Ia3Ot(V zjv?cqU|^H1H9|F*;uc)lbSoRqQrfgHQ1bTU4K6Hk?0gPx?r8HP9(SBu*-j-h!tgnh#|Yq($c`XS_l>sP73x3bBC>jgY&&*7b~nziW+FxQZwu)|KG7MWl!=KcwLJrA$;clWmPgf(rY*E4#RWQ?J)kEGqfspDqUt(rW?JuaRP22= z;png+S|_xNs@>AJ)!x2SZP)cPTzdYW*iN&aW~gvh?eqBJA%{srY{z(6ZwgcHa<$m6 zfQkyQ8hsDOOD(g8c6Fm6&IFNSRLQBUMVxCdRcN|mSGF5E(8ExTe-Hm|zM<4K4YgFa z)hZ`q`SI(Ao;j*)BU)9NVk`$<8l6ho~Or8{7}R_5YILQGW-snx3V0){v#sJlsr@~p-XF;)>5v+kK$HW#iJ#PE?1aN zp4R%qY-a8P$PbH*Dhj=ytmf&G${N+zD&+Jv_`@PmI?nW}C6b9n8ja2bzI0UiTYQzS z>Umu?!4!%~O8!&)yWVmrKzn*hhR?Da{dU;Zs|H3 zv@P!PwNpwUB`_oBV%%u=(J+$-W9SB8#gY^q{5Qf0Hr={I9sXKkx# zp6+w0fLdoOB`2`8=d*$Gk^*lx*buAklBJd=kP0(qxaE~UhVA(E zOH_!|cCv<2(`U%F(xMO->nk*al)YoJCQQw0C{UciD-P=pb{llfln?cId$62TO<+$E z)@`-q<<5HmmIX4{(Cn717bwNLXX4 z#Vol1OW+ldHR>8!k|lkbY_5^fM6`4OqX1_4g>RBpsyZV!mdfIGF-8Oe}mgw)m42C=Lo)KXL8U?yF4%EwEUoOz8oXc6TgBfIS{=@>H!1VVmIXeIt7H zD*61JBn?6Arv2!d=>r6M@#@7*gV?)(O12nWP6PD=>u8$Xp>ihx^JoY>xmaTX9a@&} zon4KhCl0<-iJ3at(ee}zEJ3M^-ilWib` zQ{G2~@{xYMQL?a3M)-^k=<8R@7liOmuTMh@zxedN!TdFH(CrQ^r;eMj!0xX_))R2j zG-+dT@G>!92dyK4(XwIVe&qS;`jZBqzYh31)9Z4R?;1a6^!AYl73+m9u6M^fJRk^t zmdJrwU6HtYH=^IYS3bX19gEEIhi|}C8c+%q&9q=GG%<;2t*C02jG90kU3ooJvJ?jT z_1v+Lz_s_vxjmOJfF|sDSL_xTD-c4q6Ajq2f+(&#YzDzzd!93LNcRosJhu1C=QpmE z1HJgDp89vlF?;4grCTJ&MDwAXD_<;d0Ubn*6*Pt+>_{KT=)+cd`UCR$&1+{tM`Rn6 zX#PXFlaLFYkYRm00;Y(hS&ub&@q;I7^6M8X*UHfOH_5|WW5ys5y&+~y-kt^04(qnS zqZrWAarqv)Nj|@6%`E8X{e^#vDTGeG8MrbWWn)}M4uZxDVE-0juEY}+M2~M-ODYie*RU;87e~Lp13qIlipU924Zq|*#kN86 z6EJf_Jyec!P`#0ErBDIQwi4s7CG5;(Noxju`IAr-35t#^9yo8n{HNT0i~)*dlOLZwQ|_DYjsAZ8n+k}m zCwNmW!P==_7UFGT^=YN(V1L}d9{uosur7fGf%W|Z@E$tWZ-NiNipebtL8fq<`{HE{ ztP5ef8SlGG-7t&z&w?EZjA}O)_o06r9oaGX(Px3;49k-cAqy{0VW-~OqZ8(C!c_yA z!gLOO;9f8xfx&C+EYTB+_>4e44lj3wm0?IEwf8(8J8Yx*yis4ZQLx?~JPM1;w+_Qh zBS{n1TXCg4;~rt93@-PCE;v++{+9>xp`Bf7C9Pz&uZw;v$tQT^o&UK9p)>AqFAI?Z zYr|534^1gd*Su}IZR!To_5>Qe4?46IhH$W>y1`rTgYmFkx!i%Sc+Rje#hOj!Z|ICQ zrw)2G#6|rgbmi5c5C#wXF%H0wai(>V2GJfocxn?Q^(w%wF322VT0tTQv9+l5* z&H_IZh^j`=Yb?1SGI|ntH(XEX7@N>DkHVU~Rt6-K9~$y0w;|VKCtM?Le+&w&tskcN;65cQYqV+#*`O}?;c z%^c|H)pP&v$DjNSVSNn5zymCsg+L4}2>*8>lmP95kZwr-4Pkv;GZj4i^yi^nZ{0kL z9{q;=L~+-5epCMbMe8zX*k2{EbvGF#6I%v7{!Qpm5_BN@$7x=Onr8hoM6>(0+_U~F zhy^hEN5y`5c=ERK$7EMc*RWR>coDC>7Q)I>OZb9zN7=1WYOSCwhrazI7)z^BBulo3 zQK7dZ{g35h1g7LuuueLbmyRzmu58FvYsR%a>yO(?aTdMfyHH9A3W2kq20tRfz44FV zl|vW~wTE+g=pNWRI z;EMeCgbTL-sVwO&(MgRrln7I5^v559EeVW{ezJQ2RXf*h8|0n@a=VXO7GhaqiGFP( zQC8DVi>k+aqP2*Zf9o3>&3L`p%$4{zoV|-;HQF%#?DU6PMdB<79!z?=QU7wyBJo7BDT!Dy#;#MJ2quVXY6bu+jkyyi; zhA<#6fDI{(WSw~yUGmlSQ-hJ;fCCD4(^&`J8TU-@9C-krOu;*2crqQXkDyZ_u8)$c z6`KJ4=Jzo0C27NIA3R>2IVeL9zl;}J(5Vm&Nh?^3-tppz>iyUv`+K~|(#IBA&S>j% z{Uo?Z`%3Nr+%+1L%2?iB#8q#51=gB1b0FE}*KJ0RUq4qq;rSYf_>{O>22ZwGgO zW%?Q!`s_d9EPClW#g6fZWS36AWmYNYMt?VX@YsEvb7dB0Gx6|MZL6(xQwXe7ikmyd zBsx4v?41uuVCbtFG3@y6DMGk8TM@#YVH?46y-m{Ynv+-C9DTDphja=8;(SS9^u$y0 zp+oFRgU=`k@MCqYOoI(P`!!saqMHtd{jQA5#WuY~p&T2~C9}lBoFom&CZ5{&fqORY z7#x`;1V2!2Wj)xzXB&fCUu}{JleOn;Ce#TNi4MuY&gF8jBT0kkr@R=^`WZPPI54jW zaS5@VwvLM?nWUwbR2OoIZXz=*&n{Z2W=Q6Bi;^TCikm|Fh9RbZI}O#eXj|C;6Fgpn zy@9^9U17W>;6}zB2DMPKy|b%PB%8WRbdy~_Lcn3$wIW1Y#C1g3(;5?*fanm7RNdT) zX>pk}S`AIUu1L~sXd(RM(8+pn5SSp~^gj<4am#fIs)~oqfjo4&rqXspVr}gigW8g$ zq1|7yLx+9-Yy!RTfMVldX$(w>4vcrNQ+OvI9{>H=9{FXnw(0lD?iP-(9|SQF=gM~Y zeq5!U4&8RT;|Z^`*znnM47zIru@|H_R-tJ5vA2Ssr(!>W=C4s~M!Pl=|G+DzeiH%5 z*p;ovo2c(J_BVe)prj+fZy9A^MD7dJ@=jt!zAA zwf17ITcdiqW;kx+4UJw3{dfUvNnmv7MQ$IeW;SgfxYk3D*}eq~-~+J(y)S`DK^_g(_$ z{oV3y=*v3^aWDPzlL>IHrB;MkdRTR+<>_{7OpDSextP-iffUf&Hi0n-jF!JB=ne_j zPCNd4WIcNGjm$adt^W;Cx=voY=m>gcGjaL?$@CHxc!`eL{k0rZt`!lr1uRKmRMWl{ zoKed;#o&?~iS06U=T_omvEQjc7i&5_xgt}I-wHImY2ufHgThYecfOUAq2Kj}NBShl zqiW-n&*gLm*&N(2ow*0b-D(u=e*bST930w1Kp5N5iV#Z*-{S{VK}(PEX!Xgq&Kp-L z;gUj0Y(&}J#N50zO}LB4TcE)syTJntc0YTL?|v%jd?4+&fbc(~30N|;U}po`wvSkt zU7ZB3`d5;0SDTm{^!5?pgK7^Y^#O{7C`r{ozgAUK=%@Q(hL*zU(A5W>gNqLkKG{Mj zt*x19U)n{sTh>ezyt2RaMqyHy!06D~Zs$OM3gMM4Q09WRM3&oiB~|RC+Q}UH=&A50 zQWzbIozD&Sokp0!U3z5))Dw1>=Cv(Lld=`;OkL|%8j2cp<>~O}Qdn@8b`D0*5dNHA z8OE_3UYi&=E}fyRo_Z9*j;ATN7G=+bt{{QY(c)eRNP8x6M7AKU{9(iFUAs-h?a^B) zBDU2X_JN>FfprbH1UfR7hpPaHYd36<575N?=CyMOo0R`^OYqWP7T<&JzKc+xw=l%? zRu^T@f+95&g&?P(zyb>ENhO2`XHiW>Y(j`3W;d^$WpMD0)O9jsQ^5moUk8VGxWS-= zCkD9a4nzf|o4#OU@1`{qgncI9pc|F3v6_@(W3gz1F3&#&ABF z@taMC9J=O0=#&x|9h!gJesLGy(i5=-t2tuqG5sc|Omw|mjmn^B^zdgA7#)7XbnKSx zYeoVjjq)bS9RNpTkp7PbvITr0R?MNwMbKe9CSrEenpxlq?9SCk9v1Z>&iIxLnqb)$Ls7xY)oXwJoq z;0%42oq#R-nyG>_^uIYicRGdfS%Pm5#|j+$hTCF?14~c|LJt(4mxE4Xe$$#+(4qa? z51?C5ziJ{fo}$pLG-7h48x3FU}qqziHYn z-yjPUKbu5{Zg`=Al+Vb&x$|<($|*1f<7cHdSE38FITB8%8&0<)l^3Ro4d|;e*vm=M z(9s{QKXB}6iTcBS#9Tz|ge`**2NG`?LcV^OBlRo`?z(P>FAyKjTPL$5^}5-@AkBpi zUAX|O{<9<72A73}9e!j5ZlA@A1P7Dy&W0!7E(ft^ zu{j41E5+JbP+XDwH>ZM6q+u%H`o1g|4tC&wU=F5=Aa({zk}D6oH^inrtV;R1SEM!b z!qxnJ2hjDu*t-|xu!s{0n0+Ec9Qv0IGVD6V>y!ZrW!9z6gu^2~t7pv};3;6i@iwJ4?i&1!=dAqsL2Y^!C9^pWAU5?k_5Ycm3gY^1`fr z{K4s(V*lvRCO;@UEF3Ctg!8^?MG#WOx3MaXtJsD>QbsxuiN}j+EqY%IdaMLSM_+g& z+|PsB83MJl4gYc@E6jnj9hd{vE2o2Ld}Zv4=2SVlr{`V%OeLPyr}5g*e>-$!Ng6u% zW!Rit_PlHh+OZ>W4w_#g?nW;PR-auWb_nyd^7uUMF()hFR;cC;wu;xEN~DFQcN0?g zh`BjQ8q)m*R5u}J@39MM!Q!obC}(&DG-<_$)Tq;H(@>ndtYzI5J8MazpVpvmr7*mn zZ4!?so;neMQ^MK<^&1Uhe$9c3sY<6d2@n+uuE3S2I2Gx7>5Q6kCN%|nPRDC9MP%zh z6G&imPU5&N+w}Q_U(~ym%)Slw|!z^UYdrE6t6gcz`d2Q zL)hOHL2VenDHQ0k131>WSIOuUel)@Kr3b=irkS)9{qD};N8SCD-Z2}h*VO%y$~0yd;DI`X#TdY6y9 z12%_niQ5;{7(w&0!+}JMJ8Xwj4Cq~|u7DlU+NuAq-sSPpzxVQa5Vt#~z!P>AW0q(a z<`*(%%yeD(3>l?DCG_=o!cV!@OhxhU^T%FJuRP&IaQl@o5lDIkbe8B~v|(Uw=WR5)>uM;~+NtR1*Q)>KI{HPKBZ??ykxn?)UW? z4Z8mz+`mfUVXwkZG!MQqy#qb|vHkl7rS}q3vPEV^1=l5*p~>|$(Kz2`k|swxR9EGM zWpMB8Y7`y3b7^=I7dR%uq%`v%#7?lHJ#NJm_1L>Ps!g|YsYcbR5-JgtmR6%!sP>q~ z9gu1SQ=DqHAP9MKkOaCf_fv^nLdfF9fX zp$rlj7Vq=K4d>DK!_>B@Tsa%Q0@FF1iKr?`H>{m@&TkAjlgNRfE>@%HrOD3!an<$k z2Z>!UU4me=IM=1KVF>f0jA~i7V(l<|4&D7p=wIKw39gi+Y3RtgOBbM>KV~Ne%!gn@ zz35wEp>RvXOB1W7l;I6lE)Z8{dTEdsv-}4XZZ(R?=i>X|CRM(DaNmCrUzDxUSFXDC zM1AGhEcOxNO>0!lV6D^tgzzby1w?0mQHrZOKZ~)roK;GL=IAlM0 zI}BNAYvj;HcR zzlgC+7t}A!g?NB5IW1WpwH|;LlEP@=`EBP9o_j!eP~lbtd2;+B5sPVD3DVXLCxaTV z+1X;zcRvqt&2gm5%n+K-*;OS%0u_DM{<8ru^p+w*8B@?YkqoskTjo~+$KP&7M zS0|yDOkX^J-0IoQgO7d|j;HfIJ68|_LFsxf@C?vK(DjGmf_cjTmW6*wI`Y&f-Z%gn zX9&o6D}t&xKCCO-O*2Us^m#6wQYScVQuuk`1+Iosyrsqr#=*!vxF*g&UK4Gu?)E}h zU?!x@Yx;=>T>st=CL}OA`qY9*7T@#*p)GJq5+UddlUnDHDCD|qG-Yv7q##&=<9y5=fHMV8+pQF!>etUEwO#2XfPoA{|9?Kbhj ziOVLk6P^jp#IEuF*vBTu$6p+O5=WSv`;P2NS#?}Ka@NR}CD}h^&&j?`{EYY-aSw45 zu|nhtA942hc47}PC4X7|l>A}&o$?z--Xnk8$i-tX$WwBsoP{uwhvu#xxqYrNchQ__ z?u@xjvwxrc#q2j{KRf&3*(+vCv%%T(XZO#}&irxa=@HA!qvHu2JrZI^dS)~;yJp6R zkt4xhe|qWQbWe86bYl8{Df{vOxvDbXRCnL1?oOwdY@MBiEQCOy?oxHD2nK53_q{;m z*1qq%K$CQ%;3yawIBw4&sEneb8N?DrBr>2VqoRX~3Ij$&kO3p2fXKY>*12iYmyU1V zU!DBUxnG^_o_o%>{63q+GD;8qe1evJYt%NedFUnChbD$s{$b@$rI$+$(*4qP#9PGg zh#wMPBR(~}mFFG6oCCvBo^@dAF^B~n#O078;wkgg$ZIR6Ple_4e+Sj%-AIR{Rp!E6 zEuRjhGxiH!9)x|!yCUihA+ns*s+|DLR3TE$XZQ?Othe!xktc7lpk{w9}x&jS0g66@g|a=0amEKJ)w@k?)JB>Uics2yLn7Zn z60!+X0gyVTX2}GK4VDYFAupNbW-LbEwU-$#JZDwLJ-tFIleA0^3f@6NGLGZ5-(l!Efg>&iB@?xcVh!%K); z=C-^b6hwo1s#s<#g~-z`WFD z&lSc;%p|k(5!_#S+NNo^+SyDa7p#%#b;GzhawnwFt~BZuZ!zAcjRobk0!{-*GI;cM zsiK!=x~WMVW+(5p{4A4GS?7W_XO*>u;|C569*~2HtqsADiEI@J!{WZ|5FSvum;v$J zzEIzhbyIdLOEwA=&8c!q98V|jIpk#~XS8Zea(|$zVd;mLW5SswHcdS*xrsl`gWtx0 zS501tHNB*~UW>-!J(V}39QjxLOBF{}L&oiGWiP0WXT!N54waKv%;qL!+19%K1+QA` zPV9MBs88xyx|i3+R3zt0_!;-Z7%yiscFLPi`aDISh0@dXrvyA1YLo0-TbXNi>?Mec z_TsQrc{$;Y(*<9i4uuqsh@IVM$9qUQuCZtg5I5j3DvPG<*rx^9VYhcX$%>|F$tj#_ zcSsPg;;f{$M|rH-QrP5CxdIq3)msg^6Yu#IK10Bunagg(F~Fojp(m*xt*u0GdID#8$3qG)pFj*F=(y?DbRsp;l z=~sAe!K2nL=Zo%?TsddAMO|)9%zX!LPxmy=BcAf;EF5?!@3dQ9x)3ZtzU8Pqq)JdY zc30l1Lh8AI&l@xrx;1TGxnTjz@5B-%hfmQ-y1Rx@h*JxL+2MLQGV4{+X_G!;;t~hv zK97I56Y^DvsMrX&n2ZVSX=gn)%I|CI%OyiBLz63ijO(`(5G9>6HFH)fUiLZ2 zgHr-7qGmb^52xs;7tKkuxc;1&8*{&~FSgYdHJz%e$qwV|CE7^}N07?fjL$`f^Tj+Q z;4Gx*!sOp@hg%&;((6iM0^g0zyX`` zR#=%P-D-n5ZtgguK6X4VJYX(Wm`cEE@asCJU|6~FYK%84?HZYhb|NKR$7= zZnr_eMI2jWICfoL*Cyh0O_Nkd+PY$=n;?Xg)3u<|=_y$abEKsfrfkWrCM>7s2s9`l zweh!;s!BJj*o!I1>aAUe55YEJDY8Jm%W z9F&=Evu?H;3uocra?-%1f&C#K?D)bBQ&W+gqsIn(Ce-fAm{IIY&2zTngcosuibPE1qLI@%g971PxQ6Gm!HRTJ5E=kshGwk+>D{M{op zjk2zz?D_q)Gm$K%hVXHR)XaH;Nm8FLs%*f};L{gmdvS9#s-B85)f~OBjrBI&^!_y% z7c;}nVirhJovo8mzsr);gqq1lT!%kz0K0RfCc>2>K)zFRCWp2OVv-#TY0yTHGjNdVc+E*dw%k0Nvq~*RZt95efXiN@Gn`x(RVa%NNAg{G{7JP2a^8nr4X@s3 ztfX4Gi)cIysywZ?MC~Sfrb|0q%q)q;i23Wr=N=FWe3lHIihE;iTf?A&rG<$kNR_i4 zi#SV~nu}`{GI0WjCBK8vc%KZ5VVlV;6)|cxkY&-<20}W#YXFx9rJ^jfhVC#_z8y}_ z+%D9gb0#^6Z;r6xpvNERsE7YYD4^tODx$c{%@#{CS#N#LnhI5vEPJU$c%bU@kfuP( zq6Zp_NJ&8n%TP=xy{{QdF!rf5T1h@E|@fam>L(rNPqAlB6p=oaKZ!#FT4 zH5hHr3hCE66<~9m)8PG$6mu`1J1jhq13&D5wwS2aa+R#Pu%Uu+u{W1wBOVB*|K4zBoGub^`e5Y_&ioMqo@^PmtH5-E-z&$-1ct*?xlU5Age0I0uEqd9>=G$ zcMuou*)KFkL|nM;=2Q0`Q_D++43sBe%~6TCYz#g2?US>&RyIjjqZJcZj^8Z((uPBH3;MUH4PaU5H`GhVX94o$)v%1N+NQ`D?rV zFrQ`z>m5?%a63#gUU|0#{#Rai9DVIEUPC2<(XkIIgxHq7Kfzw5VDl9m4Qre?pk@-G zs3w{!C~Phgz48m_kO)RI_kLy&Yla}!Y-2z31n)>{0U=lg;r04^aPBB2>&m<%7_8FB z|2PN{!4UBdQT>C=Xy17p{3pRZ)&M#b>>lgS>s`Rqs%GVpaycKQ&_lljmD5rbkssR) z4w%mkZRjh0H3C68_H0Vq0FF4NifY*8R8Ecl`PaOLb_tBQS7$+OF%OwzMxTW4Z?PUW z!O!BB0|^*#leM#^oCdy#xis4O^O2pCOHp*}nZH9s0wh%HLqfH{DYw^aR}g1Qt{wf> zuy;~E@ow<2hI9P((F|B9orn3%G}vp`#`)tJI@f~CsRn~8ok>HAKNuPjjAkDBkdTGw zPcQQ7CHr9)v=Qs6tWCMO9S=o#PBD`%O`<1%51m|!qC=m4mi|KTb zN41tkxf9R{5sEm)gZt3~5001Qd|Ep!e{S0>|1O_GSxJDT^*+6=R9S3ltmwZ2KuoSy?N%ZyU~Rk7i19dJh{5R z@;7{6T!%f-5Uhbr+t@^yveMCP2kaawKZ(@OLSIBMI{M*@v6uOmp5@n!{jhs+KD^<0 zknX8dj!IBjZdP(=<#W)Cr6}6r`vUd^zv?+ql?fiJ3oFKtzz!pyc+cpAz{=<$&f=F$ z0S4Q0II=ihHj5(UXr-I1#od-0*#gqMIs*BSmZE6KWe4`5{{ipz{;^l#W!e;7944jL z>}voCO0d+mWy{GN|NI(s-7Da2w6q94)`P(UyEV?L(|_g_UaRLi%;&+ugB1>yOK_0x znhe#Byu(BjSk~PqLDteTy<);4XKk@Ij<8S~Pgx>*cGynvxlrHNimV%*1 z99{h;zkrvZ=+OKx;SC_bdFZ7#K{L21yx5;ypy%^i_2y2gppSQ388r1*czh`ecAU%h zAV^QOp+EOm{spog_Ad&kIurUl9gkF4ADzf3IOKW@W?Y1#Bek6nv33sZv=6)mtCtTf zcso~;(xy}>$WGIotY6b zvNZ=`C-BQ67@hpfM(}OC$1s9^yk>Y^f7{<+#R)5hULm2S|1!B{;-c~3$Rne*q5tN6 zoHq~LATEb#!fp^6gFMJFiE=pSO()v15Q8$4#O}$ZDB6*R3|`-!Bu-iFPD~N-Q3@Y^ zJ3&w=>+|Sn8<<%u-cH?YDImXufVl3ZF!G=fWaxQCwi?}b_w;!GdlCX-`n`ua7;x-! ztt|uNV6s^#=o_6LWT!&h25{y#4il4;ON-!jw+)j0Z0>)0n1D<@y)sZpF)Zz&^BD&u zM0=o#y0cK5F&h#a^s7aCa|QxC}hfw@2X-F^rBpdZE34$r$02Ot+&|lC)F#gxRXja_JbleH@x4 zLebHW|Ju<%dnNxH?xfw7rwXk$+xD5+ayEgkn}FXC!}vFdRfJJ;>ojrAjA*D~25y=@ z!wmFsf}ZYbBDx{MhY_0`;ImVJBr<8a)8qvz5-^beVKo8vpk+({KMdrTuO%jC9VYN; z_G{!3%F>B|cNSQjicvkd?(QXKchYM1G(X~HYoeo{Ot0^MWdkuMLC*EW_-qeCpmX5S zpa;q}y#ridAsh=@imqKttlvo~PYYReEL#;FvFA>CJ72Vcn1XOF2RKCqz(Go*a6sS} zqz{5LMQA2Fy9U)Z5UXdGuVCpPRbB-wCVMv#tJmk{4iogx4_qr?o&;xSNOt6r;{}}B zL`f!p=wEyUCYCwOOp9T0MSIwUXr~){0L0)PR45cT8~YBerdJAI<@5$khV_e6y3bq`S_X&f=8UGI@TS z)}pC%h^fh?CFq%bMIRyA{UU?Ykm9Fa!@`Gth4Xck-duv`>EoX3M)93^HV22RH z{KjSPkDmv-<8;#5YBOfCs!PEM*{{x_()qB>FGW%H^#b-f{muEXbImBk)NaUl0gRmp z=HI1*{r&|+K(cb^0q_z%D7|w2cD8NWrVEO_v&}kS7JvgDnbq zt{~RzU{tI^etLMPRa6fhYHqx=Kcgk!MqoS4Q!(L-xSGqi6Fd!3dA8wnKwO zC?fwX0e4QGtnFnx0k;yz;VQHU-|><@pSD7(wDoM;&Uq}Y7`oU1n}HaHK-}5A=qtNN z*Z1!-U>T)F84a(k3sx$!)(>kQ_E zMIIb@J)u=5SiwtCbkt1?js@44_+Hr$7ob;oY%6(P%|o&YMY&S3K*mQkaynsT#4vhh z%f3Bm|Gm=n{rjCDgFn8P7l)=5b!obk+h+cr_WFie}Xr*D2d-RXwa#qq)nWDIyfk-ax8#+p|NP`hU8dA9dSdpj8s| zA_`N@WT9P2gPg1Cx@-&H>;Q-m!I+Vv{9VYWdv}0uh4V1aGld7Fs0`*R3|VLzSWnaw zFtg~(Q4k@5k>=jbi<+g`{`Sl8{PVO|c>b9-o7OQFU`uNT+Ny>%iEj6R7!iz)T>A-F zLW?=-*Lq?8phum>9tHCntBNEWU2~UYL z3o+8;iuP(*pHogVsOAF^A{ZFBZU?F{NF~w#t?%tsbkmB7E5<)GxqtLNphLMy`aBT6 zfPS&f-{j_j@kKc4^uk@AmA1u|xdvIQCk#pCNfK*NuSCpDiOS#-RDL@o8zOf3Q_6`l zf2VWK^V~0Z8VsEZ_(626OoV~sM!6m5CGMIQ!@QDkA66heoaCp{IuD#Lf&!_W*bi%E6%!J;*_;L}lpMcNZXWu|fuO86)5h>@qm00;4w67;l#fbnS}4v)h%B zEQV2>cBB;5LtGkeh68=T%W(qI^EwXCElz~O8EGfThQe(3waczVip8U(OcOKH;xcsT z3WuOkx;YIq3Yv+l7X=kc=8}ogH`0c@+ZQb)(8D=m_ml{Q)a#VT3C7DU44XG+= zHEF!6vaN0}snJIZuna^ndTf3TtfZZ?js3AAzZhMIuYupidXi`dIW_u71)3^?Av^cxQ$dVZ)!;e_ku`8?fD4pA(2MjS<12W8JM^A5da1_W zUzRNe8pn74!xIE>blr$PC6$6^u0cS~Q-1(rNb{6aZ!Ea$yOFh7aDcNKBQ@Yt(~TY&hmFuMQxt#E}|r(1ea8C+p@iEc08 zjBdux=vSh9=HM22%?imi6IYIYd;G)1Rv;F6aZ=9fFjKIP+2(ngB*7w}s5NVJ$meL7 zf=bsP z;4o<4s~;qQ%Yxse*WU>DQpda$B;pT?tEOz|fG#`eE|DE=8;Cgc*THCsV4i~mzHy)4 zvAN&Bjvp=A;%M1)&Jan4l-))w;8xnIBx=or01*sc_xcrXI# zt>{ukOZn7!e>)ySYu^tdL@+wWUMR4pEW961k6Z2YEBS#L+=z>rT(3zv!5_j+^=e+& z7zYFM@CRU&MP+z*1P$Ki{+@q=Gox_S0v7456Bms<3~7j3LoZ1Gk7SSn`}M8!fq9-u z1+y}g{h3U*2_E8gMf7Asc#HG9%jaU@IKG8Tu!J2U{T@ zKf0xV_00q%E%$`e{s3(uDYa7`i6+Y|`t3i%Iuyg`(6-@=`~F+tk!g+2T~bm?Fd6ho|FZ1Dd^Y|S7Rb&rW{OnRQU*lZvH6zpcqC+ z@3h$at3L*c!!7TgpMt?@4zvmuvkv&iW57G04Yr-ZIBI?zdMQFNP1dD<{k^pR*N+o! z$xPb9mW&Lz4EAzWyS=T;qwpu;N5wEY{?X6b`@i@kui(_WeYP6IX*--Z?2r54yMEwP z#Lj6kj2@GO?dT?jd#wN9rwFG+2DHv2_Y6JEf2=Osy5It0(hILY2UJh%bfU={%X1imhk1Opp&;=0kn(f?VN;Qgfs5ipZ{0lmaSHvI`w*53@f2jC5cmYIZ{AF)Rg#E!giSTUCBM0RsINukt4u61wbjtkK9!N0w_vnE;iJ5iF z*0}YH`v2tz{;V&;2OhW`I*witB6kJ#2n2$_Cl!>SU*vVt%a)>N*57SK4}I~>3W6^Y zN8kA>{pd@}ykPy4w{C&JjC;NeAFVqeHevLKgl_zO!wuP5$sH2`{_uSxe6+0dJh=_F zlUC$TZ=D2Mn?{{eraJKE4o2k5cf-Jn$_CU0_^LShRWN@{r$i3XZ*q6097m!R55x=p0w62Iyn_-0kh_kjZ^Xp&>!69Ikomf_SBR3|pDu1Qg zpi%2VSO-f{bV##_zw=6Y9l-kj3lH-5BxQ}&^eC>|VIhI9RjrI8^FuJ~A{c4X*X`~D zT`0`IbAIRIAbGUfEDUtalZ&Sy;j3PSK69M^Oo?D5`2@8O{rJ<8b^Y1z@GHJfsH@BsjSq7iS_iuga^AFqR}b^eC*C2ft6uOfD?~$Bvgk z12VLFbARU#V4*-)wl8+2V5n=`l$T-}rD(zuFQeJ-@>j#9C_2e)+|vij)ZnQT%ylcI ze@eDSM`%T8-3?!y;LVqGMzQ zma<`V8@lxMzsUMudz?5R;pv=({UT;pH?>T})e9wbwpbh}^D;k$*%HA#Ti%}j13!iJ z0=?S}Ex>afF4{6WCP0?Ey<9*gSE6fw4J}xTqGw*X3KSVUt?i$F4Hr)k0NlTVfB>ZB z@^(84OF`eWCL%O)Jp}@mqCl~y5tJ$4dWt_R!kK*U;xy@-WlrtOnZO@Ckus!|XyWG} zVJQl`j1^zKul_l&tF+9Y_jU_n7P_i7DxE=jFc@qm(Z?Qxg%Vhb!j9(y#s1j%=KkbQ zhQcX>3g48yvIv!SOMEfWFk)NliVPEee|L6 zf4+xn)cA(-qyhMyXf+!>C7lcS>+V>z;;a;q@mYAg#W3$Ib}rifw~4j={%FkTxMq}YFE&mZ`Cv&}=WzHqZECSo>- zK*?)sbwe%OQ^wHx=V0B5V6@|>Ct#Q0T_LW2j$b?Gc@kz0?-ELLy$b%1MLC)2nsN$A zI`9(A{8AK=L}K93F^e922`+YnPt|W;CbsbxJ76CWS_2uR7!O%eY70%XqCo3N)II^S zmcrQp63^lWuE7oz=PtV zLsciFLvH9QEwwwrFz9_R!u*I}yQu@G!Rk8c+8q?DP_U<)c*XTFfrL9L zTiy4)%3oT1^DHzTJA6>>K*U6bEUr>S?TZ(jz*v70`Y(df(Wegz-X8yYk}&gAz${Kd zCm%35z?IfqWYWG=C59$mA$CqKMM0NW2ipZfZ0%qB3csp+^9L3=_EcJzSIcPGia}Lk zAkXTcU+9N_A*Lsn7NH|EUxh$eG_k3_|F2;1oYt}l$au1a(6w%Te-7mPkelSZL8Vb(<`wgLbAP2QfHtf}Y>RjH=iRlmb$t*6m}w_q<2 z!`R>DzPDheR>xLMuA107bnp24A*s$CD`LbnfBUlDa;0?Dj4G%}(ZHLLpu#TrW`f~K zb3QBwIZILW>B~V}50UgLW&e-v;cF!*J0!hqM!a6|xAt#E8o z3b$YiTxRqQo6s+Ug3?e7_=a(%-M;`p#Id?yBbxwlboRW^u+`VFWVRFyt zTN72;1>^S;S4#RjVt@N2Y+#OgKHeFB$k;@;nxUeZXxA+_u~lszFOuKQNN1)*WspQ? zOfcvfR!d>S4bKlEmIoW5ctyvMZdST`S`70G{gQrvRti3D)_EMCWR%;a0K9({d{bk&ro2znWUbJUw_H}qGpmGaKL^Ou4c+?!6btWuyp5e&5}`_-qm4>U+-#@Z8f%)LvDvL^`gBXS zs1j%bfAx-w;OI8#SzDQT4KI11&tpR|d4bjjIRoYH74uwvu<*946~HEYns=5?R1ZBf zaUq;J?;qYFK_A^D-M)pKzXbY=d3v~Bifyu8cPm$IDf0|W-h^~5dVUk^67MKFDhsUX zZ`&*-B@!CBw?ONH^AP?2K4Q>1j@GDjw5e1~1Y6ZMWm4gF5Z=a%5|#1fCztfUzD@dl z2@pnT!H-Q_aQNdLULOJeUJ&r7A<@UTOLqce<~vLKGxf@cC3_jJR+%pYr~SL$$3Y9$ zIQ{7!JWM)4lLFpdknoCkI7#Hu4QKN!e%VrV(#V0);jRN|GOkRFSDpJ@3 zGL|pp6N;Q_h-xngiRyW}MNiiWZg?&|xX%>9jL}QC(e`=i>~`j~#k5>a^vAD7!4fiP z(>eR3)3Zg7+yRMQqW(BI`SBd|U{B!*7I|qqsMEa#qsvqU+ss*eg<;xsKHo+Dh394Y zLBm&s9G;M9EYgd&`8nS?dxla>PWJETpK-t5x?c*^JfgKCtfLeAmsv;slk3;U3m{Qlc~s zFSrOsCx4m4R&e>flNfbVOy1ZT+j+FEZb=rS=q8vRlQQbZ^^xqj0g z^x_ssVq#U}jYhw?(U8TqC7d+p6>#GoytZi7h`6pIxMo?wS_E zu+R&z`yN>}+y8=s{{}ec`3M?(5w`}S?L1v5`%9XRd2tLY1uyX>FuL-(r{S(7+;-Q4Ba9T1i~xt3 zFk%$wLP$nM*3#Zsm-V?4D6fNdh+yQo8`|--ZgdN{1i|uwPo8ISB_^nfHrj5eEmbaE zaD*9jkpY^q6h%8e201oCZ?U=mB?Al<%$jep4O(TkM3ee3=`UDZLF`dFN&4K>j-5Vfv0!dT^le;zNY++XSAc za*}MCwcdmx!nL&M=o;x7bdz1WhIdLmy$G`)4&Go_)dR7p{Du>Lr5UjvIl1fvIbsNlY}c?4{< z*GNxY<>#c^wt}MyAEkj`B!k}85FV<-5Q>VB=DDv3=H1HsiP`>%x)hlFql;aNI*sin zrHva@WGWog#2CIyYtgM&!Ph`s2DYsa4~)AT&|j{SzKI8E?KOiz3NA`iR&)-Q)V7p8 z9hq(iDH5;NU=t*Y%g|%5ZG)lW4dVAS`S;f~A71Qa&!-MWsGQ4{FjmsQCtko!`$`p- zy{HWGD7;%xzf9No9m_T!06F;Nnzt$nDaPwAtK_OGO)(kVpgnDnBPs&|G4;TkXG4F! z4ezm_Y1jigD`4KAA3ZueB>mRN6Oui=rePAk65;u`qe)awt+Pfo)d`@jFlAUsm2~Jf z7|QS=>GZU?jQ?~E=qYFVUq8ejwSDtf!peB>;2X+@?KUe%wPWRCB~gWpnQ(~MJtaa> zwfg;o{hQ~dK$`DWB_awM5{huWUapi1CeZ5(@Meo)9DLEcP73DCMuExJ7=_Q3^XY08 zb1sgad>=d_h6k3@e)RoPt7P*P^Y4Ks;%j`XTV#wZ>nT74g0H4W4_prqi@+4P%WZS? zbvHR5tEPq0fE*9udRnf$yE|=%4dXut-5$^lq5L{NV80XlfG% zQd_OpixmUi^6;j17~7A35EhlV3_YeH_VUgQYx}Q$5XN@eOX(8^+6&Aj9*xq`^&$6- z(mhim6djefumZ0Cof~25=YTxumLYP*)bFQ$JoWX_v!;%Y%4ENox?!p|b=j0|>b$8n zlYg5$G3uK9!Q|bOpO~DV%#Y4Z`X&!d?wXuf_2*Sju6k(ImsZ`f>grX=A##;t=*TL? zs%@*J6EBUTiJwi}KXJ#zO{45Yd+6lEl|xTVm?z{D8zxq){Qb%wue^6Oz4GYF56rEs z4SjxPbftFXzLl%T{|4+&|1sVlzis@6@#=VFTr<9Je6{T5u{Xv}jQwEj?y*md&5z~B z{9_l7?HZdHIzIa6(I-bA9=%KUfb4U!BeJe6CbP+C*=89beM$N=>9?i-D*f<~McS2e zQp*r01>ZfXgm|8KjJTJ$o%jF&K2Zd%BhDw*j=VYY?8pyCzBclyk@t<1Mu6se& z;n#_HHInIym~98Q$=0MFpY7W zK58c0F%O-o1bSgpHgpu@E^90g-UM^$j5(0ahVsf_6Bqb%;U?A0y0V^LyO^lZ!HY2N z)Y#!@9ckE1@rommP6h=A1&6m@V0>E6ERR-V>6SVm{6M^5a?x>1jBD2;MYl5U^J6*j zSXRTdvr#taP{x@#zj6nrfFR>Ba8>D;^F4hx?nze)Q+DBjP@u@<$cRa)ts6smZY}00 zA>-a;m~MNkT&kM&TRVxBm|}vAvzHA(kU zz9%pqi^fW1(X33TVrqwq&HG;yaL8g$7Bl9K&t2_06AFhwHN&;iskxv_Zl*1*l+&4? zaO0qMuI{Y|?d6tJ4z^n@dG=ERTxeB{=|ntgr0t~^>9_<-=L!`glVrMj&fYCr+}SMx zQv#POW=XlKZgrFLTDn>o3k&tV5KoaCX2MQ*%x(5pEznpSI-DPPYMPRi*>%=jJL+i22X_i2LZkk;6a zRno?51Tn5&l`KTHkV?l?@RGFlq<}k{dd5}C`t?e$HEU#ddIa3)tW%t`*HV=ko4mn} zmId)_M%z$Ts5yf^!rEh`MtHrV;Qvo0+FTl_nJ9U#aCSkELjuuJqF9coig6>UVTi*R zkMt5cN~!YNNO?zZNh`FsVLaRpR4ILfRmbWz6XnV3UKQ|$vPwnV?t&^{tY-u2xqSkW zM7ZwsktHTvm3Q^gXg6tiMR>s8;h1hI>P!P4U^S&aAWVCx5r!5T{Bc9Un^yZ3qY2!x zP@HT#vNhm)D{xBSmRT#nW|c*rhy``2w9)KT?{Hx0p*ek}O?5q;Uai686fOGvU*h_~ zV!G+`K_5)XmId+z25|i#SId#%lE&N7$wTRQY~9y|>JfuaTgsK{oZnV;s5fc`tX5<& zOsAvKh`yb2bjs=JM+G5{a)gv84a%~$I@byZQv0661%X~qPJ6tXHfQqGv*py@o3Qji z&(A{A&s4!x4^ZkfyHkK021gCtF>0P{$Cl1&b_-G<5f&9K)MKf7UD;73jR%D4@n$aJ zwInj`W?N@tM+W=aoQ@1wOF`1cR1&O5S#5IE_U(ckt0zV0+QwEpqf@2bYUvb~V=R{$ zN}Dqj{DGXhSMz@tSNA%}8th4~f;ZEx0BxMVgmGgz&(fiszTRxGc0*3#-zwlfQVl6daqbUbITj{pC*@XcgY}VBP{6u}ar^D=L@?$}RaCW1Kr!b^xSqlF1Lh1v zadab`XaK*MGr8;CxW2!qwj|9}WiRAXRO0ciR|#+-TUV*e(W=8vCak3SPAtV=P&-LT zcHClJg}l}u-*CTx+to2TqpGEil`036QWxRfdXDs4YaA1d#xi9^jwz9em1_KeuUWT} z#g@H(A>jT-i77gC zIy3Ey)?3UT%sWQ3y)tTF+0 z)E?kCZM0F?aU8eDTj=Gw^{i7Js5@;mwd(!2x;JW$k}XTpkV{Df(bsATryYjKV8r!3rHGDdDs;dNZ!Eiw`I-MC;7S%~i}KlE z%3yX!yUNLPFzzlJU8I#YH|^GLy<4U)c>;@f=jCLFwWjrHFPIVIXU$`H&TXk_Qd+yF zR7!Q74$kyCeskS=BTM<&Oa@$4O8M=d7lbGy>O(ehRAckGZdRNiTyW33I zk_^OG_XIeYE;r3|S4}}4ry#fS4ctPPH`SyIOvn?8e&*;Q||6TejnCEgPdB~Mh`yBM9FAD8vz=<~=(6_pQNG_$`{~j#f*|4>k zNFk(Sa|W(p;MV|lv3>O7jQcr5Zvz5 z20KP`t>VeW##^|$!yIDiSiDTRGa4??DV#rtt3w7vP}3+%Id90>oGa!hp2GF*wR(dx z)HTV7*BCQ4=mSSi;r1lsv3Qk!Z?xCy=9PB~c-BIaS$B=hM?KM|UL|2LZtFl4ge%wz z8Gz@m6pBwC5OA()r!;}CC&xzIk$6T|fcEg?59Bf>%BU_{vbrQp&$#gB+H4ssS#PE& z3aHW2T6T|HkfZQs7)=r0xvC|X)MsQr#<;a>242si1&G0Fsa7TDyiUNQ=?tkiTflQR zT?oFly}?y~(ZPF2dA(q`7VbswzdW>DHF&X%n-XUvB*Pn?pK|vYSg~ zzh7tTX<}OvSdiHrVyJAaWQe9r?V=}Z6kY%`zlJlZ7?ZLFDyl~2LSfyS8X6U?w>pE> zNRd_>ldNzyGnH*gTHRCEY987fDJBTvLv6}*6mwLX3#&6)VA~3E)?4upn<5&LR3>X- zODm@}Br+=nQYw?Pk^^ohN^cF&N?U?kc@`cxliAc&ISfs$!NwVrsa^jqz^pe(rA;Y0 z!!#Xa)_hQqPS${Htl28GjfLEtqDO6b4%avOvhH-Ysc1E=shm2e7wQ|Gp#tv&5HdRT zs!}3#Q0T7F$#m%;WEJa$Rq+z1+H((U-BXkO*N;gddxCu)I08BKOaIdE`q|H6AgEx63u|G+oSu=df@-#@gu z|JFC8z2ss^O8#kb|HOO7Kgdt~_R$8U0huqusAC`SNIKpqnY8JivJ#hvV?zESr&(vB91Zg~`jM+76u1y}6pLn!uTyv^qA$o;&fnADPyPOz-@hb(3ji9UZE zo)*Et-UT+l+pc(MQ-8~M@Ny_FHb7qn(p$QoZ0I^!;2bWo;2I2eLotj_UUUJ3+CM(J z7XA3Kv5`Le1FVndJaoA(w}wmYu&R;d2Wj_|2u4SC&I+!|+#_JY1eHF- zXP&ZKWOacy<@9+)C{3R8vE`F>9cl!#StO6yCd zed-KyJOp-=r6@Xn4cdR_JRd=h=Q*W{IhAzY?(@}|oHmzN zBh};3H8G5;V@2>)Qp+~=zxX&m!uI(V$iSAd9$Xh`+Te^DGSzA`o+Hthe+e?gFnX*q zBv|Nn{0d}%X$YcagdvVKT@5Qm+d|n4aBG^HXzb^p>=vQu&}*lBbFck5Z*FwW^I_k3 zo*8o<_#W9@NM{eX>0~yCl0Sv962a*BefJIgwa@B5`BUD;=a}b%*sw9~)1kf1AeGCceDxY*m#4F+bOO33g2ADxA=t-$bAtckIOgZzg~B5g4|;VLvfXnh zGB!svWGQ^DwMvueM$w7i zgBTGCdC@An2HbD`OP>eR)mGO6PX>S&UegZRC#oD^qG1Mt=<{jhdI`or41+V5{_Ujc zyuUOUS@G`sGTwc!TAck(${g1-UAE(tn^G#hn?nEg0*DmDd_c~?ZGKb#oImjIgJYf# zUdM}>^*e)g(&4ok^}ck(1|c-7pM#!>;6dowX`bW@&wKf% zgT?OA;1lqzFG^QWiHZ>S>=T2y)eY#+FG}CSeOv#Mbc?W}wyuyK9r?-RmZ3LznmqWF zZRL+LgamCq2}hYcEibniV=mLC4WW83kVGdp$krmqNida(%g{3y;VgMG{ku*|LqOw3 zd6H=|8Ru$VL&u;_02$+iY!>Z*MLIbpDuZwdFL;Su@YPNI8(xv}-pvaHEC#%sEzw${ zo})5pJ4YoAJr#QC&#*}^MInMdA(*BIk;hlQ%J0+~lL79*S|!!8>RJJ1If=gg7Z`03 z45Sm+f}u7rIop^273_=C_DHl@Nhv9dUaO(iY6Uv-8ayRJ!GImM_h(+`4WOMM$pTY; zRUOIbV@6|c9$1l= zes&}@^c~)^=DVdRJJa;u@-MP8%&u?=Y7NPv;Pd7!Le^zCXa^wIn}>0Q0t&bdFnEQ$ zIV782w`>*k%=lWt8@MnmJCir?L&Gu%+&m2Ng+kzFr{SkrM%}V?vX!bYqt4^s`M?OY zRb2LV+&zabm&yXbm*5~HxkP@zN|1x>#3A5MpdjVbU^PD}l}!U*!g5t`-X{oY{)aBo zZ{L#+jLP_|sEHhZBaDW?F(SP0gp^bt!;NEc= z5aQ+H6eQLw@LtT0kOu}CB5d{W?E!J?cQ9)8+e9GCRYi|&`qH91;Dl^?77`$Wk8u|Q zc6+W6&$^WcPj38j?q0WSVPCTIp9ikWvT1Mv_fRf>oOYUk;sQcZ+Tv5}7`?SX5LWr2^z#+R3*A!nz{d4t+! zvt?+4c`k;*;BCTenyi_%M3hww^t0Et6LGMm2+WwL6EtJR<|9&7~;PJe~$h z)Bfy+{*Ki$_)yvxWKE4-%i6GGNfps#7 zqO{udakr0&F;=gVvnJDM+boR9QWPDF6T(*b_6htWvodhiS-toHiAM6R1f}!nVs)n@ z(=#g2HEZDaMKC({;L$tLu#`OTx$FapoJ0AIg8(3;my8m+cIx9&j)xAqLC6K{cmlPStP5wD~7ET z2}u{&$Nzg$L2Ma4&L4<4SW1qC^)T4@RAMqx8Xc`O>x1f&+Ln)?JNH3nMJUk7)F9%H zmckeCJQ;*mIu{`HRgjRf)4%{!FtKWnu2FQ#^T>XI3{K=C7#;f5=%xMR7r^7-J+=Vb zmoVLph`*L5^$Mzz=@vK*xb~-aLK8$V0-yffec-*hOtQtjumPUNj<8%dE@p|j~V`s~Bl1;OV11S&qeF-K?M>U+a)#BRd=X-e}OHsJB0k6n_#L0Rt zJP)g8-Qqy_HM+Qo4(ZJ)rs0XFc=y-yVF@pV(aF)v;mzU6%3nMmBy2G)Y=kyoo;9P% z-LaL8z^;?#yd_r-vAbovS1m!&SGGI}-MDMhy8dT&!@3pDI@hj{zA@}0_DHUsB*6vi zqoa@Vi-jj6b1m?py!hl8j&uw<+TaRy423{KTO`rXRM1Hgj1KMIft@4GYIwEa?8%4W zVhMJz&$47NuhN#S;06H^ZSTDpB#2->q7C8*ehSm|$BX%w%e}B|amL?~Z32DnA`l^h z`IPT4(me6=#sf0AA3GQLcw)Thxw4Vtm}0^c1M>51Bb7&vgRo@9FhqGu;kf!dM06cL zI9Rvl1wJ-9JMfjN6!IDi)pT?kEiEJWI#uWyBOCy~M8ZohDuW2h3oyM28lz-?M-Ti+ zx(n^6Wm~se7tRKO#eqP%IIRjw(Xw5WOJVet+dp~E+vi{OGg|gPSl*iq$TKbM0D0+w zJWV?sD9~z6yPY@bGcC}TDittLA{dc({}w#<6|yxFEa&@5kYiimLzc?}IVN>GYapu* zpCw#3DdgTb8eu_>2u6|{z9a+|zn7K0fn|MCB|CMR=2lEn6Y23=M<15HMw~ZnlyLlM z+5#(#TR0DX>%9Y>5uMdniIP!`QJv7HNQE_qf_9i0F^rDBaEG=3xE=Pnt=s}1y^J3x ziya^2o(fho{&0c~2RL+*6CM}C=xFarNB^5nSQp#i!+I_}kNw|FRf9*x*b^>)qvnVj zR4giM;CV63D{;<6Z%H7h;xn34^GWCi^SKv<;rTTB)2<#BHl(zi+wY0xSagXF#!UpH zna9B;87RhQ(N}b*=JIEHkY!&O!~zfIAd&PGtyGhZC>Tbh62+x$Iye@17FDs7i$KRRB%@ zX=DTiO|rM}B)``TM*!0T9|exzjAq^LC@CDJa+W0__k-|aJYtqjPcAKjvjymnPBF!= zLwhWzWZJBQ!Q8btnE8T{p~+^W7>GH*r#=$HZ`;SL{DE9lhR8lE2ZhJlY4nCw_BY(h zEq2+KTivqOw6T=e=IMx<)W%3fC~rpZbIbNjiO>P1g+PT}^U5w?pI1a74kzNz%jzM4APZjk*SxaTYnQ74*QZgqyIl;2j*Rb&2m0ea+0mJJNa=4e;1gm~<=TaC zox!5t?}z@0%Y;nM^4D(UP&6nDLYyNo&6q5p&5r=hmD+CN{kZslh`Qy-I|E5}l+?;H5r;<7?7;L$^ z5jf|E-y7^d;51zMK~aIn*f zVC4DkDjWgSzm1cH`QA``O9q>eJLxmUXr0SdF2?ceIp~A26p?UW$2i- z`mX+LRt7{`;&%hD`5ll}iD6FP8O8O`@xpZn`zLd}jF3%lZc*xZI#OaYm1J0j!Ufp% z#V~s8x?T4E69t(O7`GSpL+>%;c0yq(c`1wEr0u5a;EfwY2TJg`80NoOj{bcm_~^_L zCste~DHD(}_IGei``Xa?Lq8e%#?b9U9~i0)uNbxrQ^TE+TSu-LNsqWkR3qC*Mu-16 z{EOiShCe^@>d2F0D+hkZ4~^b6dh6)iXnNE&%8s4|Zqt7pT1(tL{`K+OCgKw|S$Bel z9I%@wMpnMK@;_JJH-7!lWkb4E*G{~5{JFW|4YJRTS5{s=@tt9A7RVpKn5A z$3C`dTy}@-MpnX_k4|Ok9eYIbET64cT3w}hIj&$Gf3dz@` ztBJp@@=V;hazG*u$bTTu@n3A7Q^(xC98+yYTV;ykDoSqC^8~&l%q@mS!A3`ZNd&*tij+gk@^VLfQ(jjDWw*2oU%Go$w6wZHm8BC zcx_B<1X9d_e=Dm~HPwu{J(uw*V^Nn^t=>Hluc56L%II&|5+&9bG{>jPgVv}tu85p$ z`eWT{UEgd3nUR+V)mgK`)69|31z*$^DJfS|xVkuuUV`(#s{G2XIcR5{y;!QsdNVTH z9PX@5A9GNw)@9YJS|z7Nwdoa%TT`Yqm5il|v9jFhtY${e5^%k`LuyhLYrY!FB#iMf z>^H`m)yXQENO_el$cg4pk}I)y2y0fEb!5@cGJZK^eRRavUOI62Qd4sdbIn+d#}yfG zp;jKfUucfWswdsX9Gg~T7&o1hZ64sNh>ub;*3AE9?7QP7sp@=h-`IWUhPjgy6PU!1 zrYm)K0V17aRp+Pz-PP5hI_Ds8Ww=+sfQ$%dRn`@G%BsNb=xPg#WLl@0|YKQ|FvI^*g`t{kqyY$`&jp3zM+Ccpji`s$oqutIl$v zVv7@-7qHml&M-9HXhWhCC1eacFPR+9zCjY*4cbak!DS)UOSvmLAO6F>O2A9&<4@U#M!A1D1z)6J(NoGerpDR4*4J-DXQfJ_)V zmXNO7r<-Z@b6B2}!UWwkK!zgFIye)|)beAvA>%P7>0lmc{yB z3G2{mwMk;;4m=HpnjzpLxmqXL&H!9eX8g+GXbcs9k|NEmfQz#-ZJN?;{uv%+IhZVy z?LfawFSp31uScprjrEtb@ebkUYW^shDHWGcrqV_z8lStDe~dC4H{%ja!DhP31+wr*dZ zAjZvxMue?VlCxs5#X^>XUfj9`kG~O0o2U#cRr1v~Q_g1>aYC}uOmY?~7a>HwmJLLW z?5^MA{w94#r1eBLmeIF)QJ>lz8p_#Lr6|!w2`-P$iaF^dcmGcFUe#?f0rq=uQ<-H< zc()2&d0^Z0vRvjswri!BE>R9~{?uN_aAMe4p388CdWEY;+LZuv*30-0CXH!=Z9F{_r~g^(-k$+rl7?b75BVjsNP_-CK;o* zEiL!_fw<_&FX5zVgFYOs5?))Z1v!) zp(mI+e!4jGRebn1;`%6Mb6Yucup(ty>RhY^67!2Oj}C$e&KO;76ldN!{Hyv(&s(Fb z%^u%1=}K{HZX!JF&)Qw_q@l<2v^!}s3&P?(Sll;h(*)NoYAZU2&Ke)zGt^=vQhb6a zhb&qafW&}PeC8hfOkKtjqpW47Snb62R|vMCxf?e$1L-``Zq!qmP{iYj(c|}P{)mWA z{M5ajHFCBdC9>KG->lIg$ix5i>{rIFki!sfz{Jg?sGsSv-(aO#UD83N0v=yH-pkeX zx?OL_a$kgV5rs7Asl>8|WaXLykg;sKz#I8`~l8 z=;43pjgS1-#`6tveK$sw4fd#oj#VQRv-5sDLlj34evm;cSAnT zmHz!xZ)E$GXuResT4+eaAfvh+%4TnSwRI|$ax(!(H(TgSJ6^y;&skzAD$}%Dt%XFz zD3UwgI+PpDX=jW`Ia`T(l&Wf-^p5)6yYWZg&@SbCL``%6cSX=ca?%c*{%!CAus9Lz z+1uTC#Fh;j7I9h8X#N_dn!|tE?d2q@l>?$6Jr}l^ij)6@XUEly^sM=2P^7%BOkJFM z3U_x^wKcMCEE9c>jfJQbJ*Dgcm#M0y#Du|^Aov_W6wl#&ZiB@hrHBFytDTD2)49~< zDpq7_0ARPRSt^&yPNS}nTJ+<;8}kCgc;9cf_9U0cS+@Ut?wK*Iye-Zj9xq!Yw(F(X zy40_Q$*R#NZohGUb~q(lS!*9)Wjl102bSqVJXhGhIM2$9vTHNjiBu%2O>3EA${2E6 zh247eexPGDXIy3nx#fN=kLQ=YHo8>z=IZ63*fSPq@CSg6 zmU03e>!;efx(-r9gxPAKn8cH}qXynZ$e6!dTg*|MCe!~aX0Jm_i_2z|k;H7}buN6V1h{2{F0pEkA{x_*m;d?uGCH+c+; zeLykJHicdUZ0Z(~o>%@XZx{MxxCETZ#=I8@kY?V1)pI#JlpTQ^s9b^=b2+m$faPwF z&ke@4E28t7N`9W%(BFPs{(!T#PJ*ZGcALp+f}H4LVPP3(zoy5=(hG&TJ+s%357aMB ze`sn!ei=M~^m_up0~Ms-wfAPYO`mwnYuu)_zn;HAg~}&pJZA+@fX7bBdKLT4K#|gS zj1HUIX*Y*h^zd83zw?t5;L;swLnmKWZ5urKmdQK7ZMp(MU&t^8a3dqYli2dWlLp}S z5cIVta#)3Jb!HLJiq`9bo_)rn^);PD3vUG{QP(A!15~41Y%#h(xvU*3hhX|z zF(M8@sO0876(Aq`$PF`5fR6_h8GwvWSOBFelm+hin2==HjwYd`j` zqcUps-wpAeaSc9f zP6M&xesu`k%<+|rz}bPp@<#R&>@(8`z+W;V9&RxNTkHUm{VwP%{Y~n@gCCHCgbl+vBx9w5J}VFB@WxRwTKd+{6ezAO@0WFWR%8%EoTEd>w9PzOY3Tsc zDMzJyLmgYt76gMCZ3Cd;=}QJR1Uk-ua4Z}F0FKD)Th;eZ?U-<^0pakj$oOS=7ZjQq zK2N2b^#s?DVr^3fJ^LAW<~#3znHy)MkiUVvJ`C)mUM#Qjt3=oui zNwZ_{zdnrj-|NooKQSY5<|ONnG;|)P%?LKj-EexZm7+&nkVrku9DU(#n4~?96&dpk zLtQrfO)8v@RdQ0fCu;LaG=3Ls;1MY@eiQI-huMSmyKv@#j3S12pRZ-j(FM0zGIoVf zs4Jka{4)$;trR6cci$^emMtHZ=Pu%ib_B9yvxO~{j6^g9dGjCMI4V8^8nkV&>ErTy z99fZp<1p~p$SIBwcfhr{7v_JYZFs`VS>AgF_uV^VS1r$OAjaOKa*S=*xj{AiX}Udq`LumnJG}!S4VHgA_0_5S zr|z73$5eCbjZ?O%3#YbCzC8KDp7Rc24X&T8PR1~-!CYqIPZQ5gd}-nn6Yrn9 zXX3hv;zVf9FmcJmp^3S<$H#v={@wA-g2<;y5?18{a!Vt$I=Q4b_9HkEq_I z>Zq<%T#+{{))wP)S1%fu7mqD2$v6?RCvxuB;E7yaC@(}7E?qdXurU9-`R~nte*WJ1 z+vb<&bMwA=cK+b}hDhC&u}UdpuW8jCWQJA=QSXn9;eX}GWQg*UIb)#7Ghp|JnW6bZ zGz^hEAOtvQv&kJyq!%y7-Ip5%NIq-1bWKYdFq>S2279xJ2CZNJ59vFkD@CLL*Iz0T zIUBx36ZI~578*$+9ig)71e?_RNqf-{vdv?dN@Y5NIy#({e8kD zIbW}I=QBkj<|Q5dOxjlMWiG=vV507JMTxYZFSpw+U&$ga6WG^E)Ox8B*(-PRNya1= zETr)YtfS~76 zwt*s-!b#G=<}!WGz=pcav^X69GEqyl*jSCtJNr4ZRb!18D*Zim3u!6$wRtAxAzFt0 zmnm{ry-!im63xXM`fRu8Oek`usioWYTB8?jm$+1l+=S)TcF+M(4fY1vmb}>jae)cX zTQ%bms}*s%XEWtX1~RqfGfMwRN~Bs=(!=)1wwcoH4=DW|-EK80+9RD(z1GanXK?pQ zrD~@`qCLjJUA0dV&ifR39LjkpZ9kI9C)&+|{y3+|?Rk;P^UiD*Oc}u`EleWin-> zQ%=Gfl?w4rl)6lTz!(j#k7IWWQCeP$0jGK#kESH$!=7R{=CjnDUVUoM2eA5*&}z{I z;5)N3jK}9Cg4nA^l!Qc>1P2ghq|J0Uo7Om${*FGpT+zCpwAO0QGBvBzFqf<%VAE&o zf!1<{VQW?0q20<446Y=lGk49LKi~KI3VRMz6dfrWtdW+1rzBRX*etdkCL++W zWm+t6Z${~}cwEI?tk|+os!mg;Djib_whMVCK`iUqW~T3InEch8v?Hni^Yr`lS>IN~0Nl?p9aCB#G}Im0 zi$8_6NF68|aI~x$QfQPrk!AgklS)Ie?IHaMUZ0L++H{PyO)K(j(?gWAWWv|B3jsgt zP=+I=`XX7CbfLa3pNs^h`3Ladl~O57-<;0rI8NX8NRA&UYGPTM&_@G;KcQ_lc-sE& z!|uz36iY|Sj)uLRsz^aU3OMKkSM@t{)TEk*1!*^V)GQz6CcQ>o*> zR@6K79lFx=HS?B4!yFZlD#wmQQ!M4u_F2|z^Fyiiu6aDle4Dq`wI+VqOBwAREp_k^ z){}2@PAXSoJprAs?Kg^-VkZTWFG6a1GU)CKZnv${%5LAU=*hMNM4Oh(jfl@PZ;71^%jiwqR~8-!!nSw-Zk1}90CY{68^LB#xN{qooG-_60}P%Qv*bky{XAR(Br zx0uM~3MHadtwu?Ut(LS&`>_v^$O$zI8RY1AN6Pwy9<%S=ik`SY5Md#hEzo`sAI|IV z#N*6`qP3FS#JRH;pTVQonw9R$5MU$Cl(rQSz+I82wtQXbZwy9#-F~lX=6h9tA^2}f ze*;~FO3Yq8<%w0I!NS~er8`pznO$s7TW!?JeafWN?PePuKUKDM3o)D34e&TS9>8h< zm8MVk%YMPUY|jU^*}`sRS+as%ONAZfwzsTnXS}=rQ|X_`IY@unoi`-&kt8MTI#-c% zRRdM@1j9*tKPD0E0i_Z;Ye_*Nz0mPxs~IR@rS@Xy1(E4BoP;e-yB*<9nh{fu*fJh} zCL8JIGG%SCWO4#%jtRRviHs2Gl74GW$a$zdmDcZ6HfJV~C{ZP$YfKv>?M7mwa{7v0 zH%F8r-iGKkXe(8N5qrJ}u@FAI@-1)|GY3xKzbcju%a$xndi~l~E0WHU%4~`S zDv=ShRew4qd96t`!cQw^J6&2Y*YfiA#gmNm2f>a>frBKD&s|t0YXvLl>LiCy2 zM7#w&jWyP)x3b6diXJ;HknJFFnujCH!GfPSR#qBpc`XT>j}AB3kdf8x{GuW^I-G=4 z?>FbI!B!-wTY4PJ(=FCaIig9ujo`?rvFK7h2kDl!Omyn`aJ5~ub1lP${Yw9alOg>j zU=MYaJ2sxZIJ4a?`;Le-=c>^y$o+^pf}Dm~4byO^@w0|7Sg$@J{ za%p>`QjhA*0s8g-IyR=7k<&CLAczAF>}8_bE0R>3GPd|+D;15za(K!C#7Asf?PQI# zk&&V;LSz;g5|Y=5rN3$3ieFo^k*<)?Gpvs#MNwlvQ|k( z6x*j0)9ESMZ`%*XnUGZo{~Z6>K4guSf9?7nvPN@-3P9*Iie{~5 z+r+XAE6_KFTdt&6s1RN=lVG9Y1m&xVaZYIGM9L|`N z)c-~i$AeCNDeI&IY_4dK)PKff=|!a+Et)Iw0N*K6p``9BiaeAr5{czh*F!YQU=Al= z$14rCAWwu0`j%7YsCO;Q{ORE^I=EX`It*i|iHVqAqnPwPtusYXLND6r)eMd@we%;f zr(5->h=wgMc@2^_ZY%1P&uOJ!JK2!cS?{qmVnVCP zEtxK*b440n1J87elH&&az+EC7GV}s9uZfV_Ox}4G7Izx1Kp-FCwE0BS!|L72I{LM2sT6H(zAGN+hx7MRSgP#E1%A!=eH`o(@s6fI6_fRxE43i!q)Q@ zxt9t8@=|fR8MDI2N0%FKC=HH~hfH`96*m=0g`KQ%JC?Ty3GO`(maAKBF7SD)_4sL9 zS}(8$1&uzbpO2UM`3Uabl)8PYQp)w{emJ8mko1Bg=N*vZ7d7VkAwL)M>QcwCmwKca zF`iNV9{-?Gmh?neUvU$BCct!ZmnheVOs!}kjCxgu`r)VZ>EP8=p>InN|znWBC>>+{+Swyd!VtiI@z_k$N;trWn>T}RQwcQ5Q1 z9QpSdPEIejfGY;47kgNtQKbU*CZNJ)Igue{PYNVCuN9-0$Xnzz>D`0yeb{Ft0|;ZE z5ozGl4YFRaQC_LktOFG7FwyXyQ{W32X_KL76|&2@Pk>Khw~VKZT|zcz+68D=g(9K} z3-2-rjcgKSAA~6Q21n5^ui6PfzxhKKq2pU7cBB29U7tqJJv4J@vNSeULbDIg zB=?Ptt@uxz53z>xh5#9Bw*zdF8y{YOlMH^~gUlz?d=z3L{Y23V#X<3CoPcannIW$q zmuw~U!lN^Xx31d=m4ny5A~_LCoCa#4>%hMNS-V(=o^pAd5P<`LJ8sZ zkmCKawWvBGgUuID5CAs+rkxjnzq~V|X#3zTH*I;d z3axxeuAk}$ihw#HB|=%i>Tvesp{zC$g5t2dza-aBt=o!{hr>$nMEjqw87sK)KWFaP zxOS(&{<-MOuwrYa^8V2c9#&6Zr9%6jm;tJcLYD{f-(keWB17sIIsm8Nm-pVbgA7By zf@&I8;njW7sS{t?j(zxlhcn}q5rpYYcTCLQzHs4Od1gudpA&CT-7$4st^vCdVhFmG z0KAB}daETEGCHak=(Mc)$!O8-po) z@QD2|YJ6vAAEa~oK{Zb2tTw9*Lln8HpD_9}aPP)}qVGR7v$U|b4N7Qx096e2p$O_j zCkK~(Rrcy$z7hnNDn_vNC4>Hop6_JDNWjXub7;%A;3yoCBBOJgXK?GcmKJSP{d=JLh{d`ykLE zW1eF#Zz@c+^n{%X``tvoVDls62WB>-Q(uF4$w(7gB7qD2bbk64wExjvlY=c^htqnu z2h`!yo-PL<0f2DvW>3*9MIrrjcveTg2@5gOhMxU~5!ZnXKKV_#G=^P~al@^{BwAZ8 zMCV9JY$ReQz(?1&hhy7QqSSJ6&X(WrldhL8B%_hHK3k_KQq#Xme3Q*H}l=k%HPcR z3ZPIcddeL5R;jMvCjf&NY7TP}d$_kpZZ2LUb!04zsjS z&xedjQ?8*+p}#x_Dn`WUrJodFO^r|Q9#nrg1NGEbtR!H!;#A&9DOjrMr3|nv1?r)? zgg)^C6i}^^qNSsgo&oVc@Yk0zPN5qnlKqxQ`m9trL86;pp4o=(`O(bc;z%2Mf%9x^&jkObg||6a9a z@Qd>|EU3`4znD3^>B_P30U%C6%zf-ih`Ha1W9|+aD9UgqWInRSc>SSxWbL*XF1_+4 zEc|K)Xq{fQ+~54wYb>{1h4C{LeE1-(UkU&bkQF|BPN3?L1I$1qG~92F-$D?3-7diS zv5^2Uq5LlNncu$V7h>sm!=h>k(JDpNLZui;lEtbu!&U>?b`c`L^1lAY?;sz2v~2(= z<3Qi>kw45tx58%%sM!-m&H~jDP@c>|EpY-RZRXAB=3mZCqGNxAVvKb=Sx|B+|97#K z&U_~1NW1=Yq#c6S1R!lu2}^3eY&GK2gmTpp<6~C1 z_uJTZJ&A5tsShpW)<_X?{j&Bpoh1q zx1zUCsFyars%c2<^pgp-NB)*w38xeOmNolxHp z`IeD$>V5FhNS^s<^vqCeO&Z~@MCfughb4#pss^niVzi{0eAP$e&9k7(vvLLK!k3PI zAy{;hse-qucNcVg5C{~f)KI#;R*d{Rr=h0lQ&y;h{o2;8gU6@T@W~IY2=e`DXsCk= z!sI4PHJjcTt;PfrJ+ckZj`TC?rG>Rk=%pi^4qbU{-|PU*sG*cEvU2&EaA>t|tcNLI zPw(xDq?nD1s5}QxHX=qRA4pz0_`w`37*tNb5q^y?3!|^7^7_7ELH+927s2bx;9=ai zpav+b?ATZqAAIBY!@>9AsUcmwS57v%>B+ARbd3&_?FuD7w2Dl$mD_U;Luxa`cy z`KpaG+*3c@^cs8WG%MaCThs}tbBYvzF9|T`tQ5TaS~vrGUQ15GQ*Ga>UfjBF7j&)T zL)*bVIerxFw|{T}4YsPyuaVWVxJ@mS&H*#o4f|kOfk%CvWj(y!iYoT=T|3kf;E;mj zM{@T0kWr>@gS!P3&Ph%!9_X>1>Wx4owO$u=YW$gP|Nn+Fx_*~>e!C@0aFPr7;^IB1 z(xVcR5zzRoJ@oNi>cd;tZA7ZZK)F90->rTv$c-CztM6DE*?F)bFWLjI$B0 zeS6hWK;4s>_7Z?m!OWD;E4jf^wotfNy0;9*9j zLrQX>)tksP=b$5!q}{sySjcTMDb~{oI$@mM}2ra7+;hj( zz+}s<$S8$)!FmzSU?VH}Ov)42mf~Cz1rNhBj);MZ>Z)Ude?6=|LpTj!Y;Rn+P<`L* zjnhA#+M#Mr*iW-Zt<=w~CtNOom^)IfdPujc21y8?Q z2HwNNBif3u@wBTEAp$gvie(MQFi*0Ely?HRQahu==QY_yA{QY85m5&g7Xgf2umWqv z0FSW)QkD+R>>S+9r~v?p61~nclxqnC916ok90^zy=aR%E0; zyz=d=u@E4_en;3CP6~E#M8N*pf*!s|y|g&e27Vj>VH#2_?YCk7%wRn)8sLk$whjH@0dPC|W*(lx9Pd0UPX@p8HylJ$K}%6I7pRb3zFv&G zidff`m%^Av+K}qHo3^3-Ut~67M2d$l1!aJ?xAHeo!$L9|HBe56w?q14c33N{?Om6E zwvje`F$LE1J%e9dqCUgv^S-gE%VsuBlvM9qprQ2e9`z69W9bC^9q)>aLWd6qSEytN z6A7=Ql(aYFU4Ih2)eMU2!4>`mzf)@>(f6^%x+;o$*NwE^(^?9W+docwl)kO6G0}0PmA|{DJ+r z2hNbuHu$-6 z%^xnS?W(2mg@w6&v*)WX8COk)r+z+GlovN7-)G&Y@3Wjm=!41F@mg$!c$A}f(k7#+ z_0bD;^`Y&r(F!1UH7Al9uW7UD*XYbp6)B$$zMTtN)z7dL!KGfqFH>7q~t^J^&-E%nX|V z>Qv}TdT#5w zU0_`ow+|kEJ_N`S8?I3Uv8~J{YvGtgr~t$FcLC+00|AUYR^+@!J-2QBE-3k_+7Wp) z71eETQBQBWW^DSGfOV9deV6*tseKci>KZu~m;rm)y}IFyamP3U;b_#Kt20D5L&gPk z+qJOCN2KV~C%1ra?*!Z(m+WC7Qzg^Zw!!K1iTXH%ovwpljEK=A|L_?Mg@6DGVcXz4 z*U45Tx2l0Zj7?KRxYG`5!E@`+nF}!|h1gZto@=Gx+NuH_=G@Uq^vk#H**ds;RV{N- zu1>-Ug0%<%CgCJZO@AEn?8K^$kXIW>oVBk&#xsv}LeJjbka-oi?HW9MlRT{JoU3Z} z1~8;{OJKbsU@_;DVO31n&U5 zK^_m#3Im$?E0vD)lMRVu7(8zO+rd$@qzx6^6xHqNb46dHRENvNP!FMJbg!JL(QX(f z7O<0miS`{}4=A6otAKe`{m|??7KrIzKpBYlG!!lBo>b2-_2bQ4m9mOXeIRMG@!*%e z?Ii4w5ixq{rTxPc``v>L?*`R-oU5B;J7MV5ipJZdhpOp?a4K%4?JktR1#Y4vQuNX{ z_8h_%?=!c^ThrQOOgX|HDp?xVINPe~kl|K1L`KD!UiWV{<~_H{KW;U-q=zCssdOL| z3VzCF2ha20~pf?>~}8Men^qD0zNOEE&UMiM%7_3iN4T`NVW z&i|`oDF5{Kp^djH&&`G$W;$0F`gwi0kWHr0$KD51HzG#QzQcrBk8d7KY#;1> zzdR0p6=3z0x5C4FT>#l-VT6V$)bMAJ`vdAD8%L!B0IXXEJJr3q2)|UW&swLWN&=Bl z(ChSyY($5?{SPn;_7U+b7>Ygbg;z+a<+x#N!7=@^`pK#DClYg=**jI}z$Jy%A)zXI z+a0hqA`zijrO84%*UWH6dnkzx+y$@K19yNGH`<13tmYh4y?$!P;H(e9-+=dCM#aPL zeYQ=|DI(p`c3mc8Ey1Q`MTa(yiqWaL$=40ueV07Xz;|-y=h}X)+Mx@@biS4@HU$XA z{OX@!o=3zu7;}8*$_%_p3!4VQNAd9^Bii9%08WH6O{IfU6u4q|Pl`mh-3@w1#3;Gv zP9@)9?jA6S&+@Kr0~L75B{vk@({0Fev`X=&E0jl%eGF!NRE$)&g$~Qiz`F;AkIR<1 zZ&gMZ#PLkQRH?^_WH(@QA&y1sh4$vY(C+I(!nDimgk0Em0=T&Lpzz**O(HSO|+wi zyuV&HFerO3%*}`xoiv_{D{bW4?`CvOJ|kP+Z+Z$n_b=*0n>LM&zX(CPhvp2kA^5Ou zn!Z)Gr~U+lsjGl1r-1yJC96czt!luLF*LibP7;x);J6qO1NiLqLwk4A;I30}r8tXQ zl>zhc-NqD()wO^U-gLD+?NVLTp%?xQ20J1~2R{DxBZJF6CA)nBt9xPMdc)(&lWasg z5~D3St#Kh-ArSF|dix%hdc~05`K0XDjjRIZo>C)IDVP{DoiY;5tWlQ< z1C8$B)36&x#TeY@+yS^Vmi$CJY9rdlpjIETI(-&^EdC7qWK=xFEJmJh?bQr+-=_wg z^($9p1UwuTY}Vs$6BW`!8i~G;Hwh`!x*v3miZLqPukTkoB@bgjekOUU(zj$GK@T~{Hkl)xZ!~mMJ-D_4m5+^m%=%NR~T{a>`Po47} zfE9XB{aMx0$dbZJzwP1ISZT$oZ9b|_Y%g&=-frzf*eb_MR)z<23h---=)WITAKtu9 zBN%oa56VCGn#T5{kAc5*bWv#3e0-g?It^y#_(KxC;q%}!2CJ^eMWI?XWCc(&Klrr; z2qgvb=!>5R!+PCTr25)-|DT36(tSa_1YtxgM9F~IvtNL$4u3CU0nd4q>!B;Y0A}#| zt%IfD1z-jr{SuhLoRrQ3MslCC6rrBh3P!AzirUoZr#?~CLV!2mlwm3Q?mQZ zV8TKfE(!KBJe*t_>xX%V2b6^V@U=kkFRSM^uhRvJaYX<>9$Lb)PpB8SgBzVmMB`n) zUxW}_0pb7vH!P)*_6cxyuiJ=T`ZRx3F@c{{&n`@4)ZbL0DgEp}&uHfQvR?*&?_}6P z{Jrb6{052WOEETIsfD_F0{!m4;JqIaqXXB2H4A3Y)8lLnJ{0c8oXKBGBP)f{GC_ zO8&>yM+a~DrhN9eR?mgA2R}j6W+bZpzOPdD5~gm-fUf%*{CGr)R3Ci-PT3F4Zyo&l zYx3XcR%LiZ#e)j)HY}OSNv)Ej)XB02^!PKdk9#9xnM?z6-o8A&bwGa`e^6yyN#%PS zGy(ukINa`5vwpoG>QV4%7)Exj81R?Vf4dcI8a)2AtjDz~!((E@FXZWzN@OM&OjwgT zL(-N+OaB7~!WW+c17WlcS32H&cxKDs;8*e2M}||xU!P{UoMMThSaq~|i87S8$oqdg zy83(Sg^i_)B0$!DE?T|^QKT@!rs<>lK)=vjt*1@yUjZ8zBlfQakoz|wo@ zMX+ta!M`e_&*AMEPgUF{5^BDDRgMV(g3VCpeu~xWbg#%xGmrEGIOeNB>G-A{gBO1$ z&$fH@I1CeCtMXBTO#`w^%v$b(J1>pC|0CIlw?+!|-|rcQG`0=+AHz!zmi~pH0PoYH z#QC^Nvr9XQ{*+di#oP4ppMb$N(ga*E{{gSf$@wjVeLn?5UAaOv$7bI?ce(mA6Xu2E z(=SYIQ8ktDgM0O2cy#=3lgXOHN;Z4xLRDe|iAE8<_a%8v*NP#n!u&Uf>88QVujIYK zt?JKAp(#sbn`Fr!$Yjk~XUjvPZ~p-{=%^T-`oTW97=zbx;QAx1>~4M)@~G;AM#MOP^w95BI|d*7t-Pzet8&pi-k3rkG8Bon&flTjv0~nhKKduH6Go)Sc;`;V zdA|G4cx%fA^H>8TR4InGJH3qA=(8Df6!N?bgBTH`NBsW+YjwAJ$KbOs!z9WZ@o%;A zB|Y7@(vX@jn1i)iFGHiN{sKBi#IPDmaKAeUSLUDn1stBcA(cqk$t8{oWQj^$ET*Jf ztPqsYhTqEy){4<7;Dmv+>Ft9z{~pG$OU~@pjCsZ;9$9eCy=x|^*)w%=Ts`KQ{f2A` zlY6f-tjb05=Ak88HdYMa$)SCnL{QA?y#o5ml;+Ulh#1}RgC8Ba&7_$^7ffsZiY~h- zco=zRH2d~2s}K%XqILzpHZJycwv@l@YZ`%i=lU7V;f1wQz*``X-1UPQ4fy0_CF2@U z;#q|x0_BlY9UT;o_iI|Cu2Jh0v&cFQO4dpd@jt%dS7FEC)8iVzIq<9+&nN(hjeNGM zGfQSmDxaipZD@`xj>ync--#qBKwq}@HJ|#WhE<)VUwu7Hig7q8dDiKUQ&NQN z1oeG~ww*%1pVdI|{)iYY9sAf(6x^VB89z*84jx9gD%am*JsvMF7Mqr4DVod1djQ>V zsRkZqtyBhWIC|H6HK%9f-)A-Z&SF;O+A=WG+a@)z3D%0y zv;F6e462hFIh4A3Dg4?x{B_OeG?(a%&leN~Bj6xq(Yk%=qtWKXJJ=PBu-~f^A<={057uF!WV%K0}NAZCk_N6=xv)c zkhrj3BO>N|kkfr(sHj4bEgFEnl@fWGS}`8-1G}LSk{<+u?}ur0^%l*cE$g+yUH9+~ z#iF!r0~O%bh1`iELOS7~MSQMjH0@C&&S01=HLIo{g$aG{C z+mX0Sv$*Ni9niIZ>c#*E_|U~Fv~!PUX}jGI^T#oOEL?!B6MzARa6+h9LdHFs!%MGf zgnWnlz}bmS>%HsYXAyv3tkoiOZo&aJQm*7Tpt}yk)*lfg75l}* zckOyXrJP6yj)EHfsuR@Um$(6}b0soqN;l(aOFsnMlG~4I4s9G2L(X;j9Mm{=`Y^cV zT+m}!b$}jx(<MK~EIxX2~rin<0+@J#j7^Dx+dq&oOk~d8Z%Cbw23vt;#hl*mu(a z80a=-HUdAo)9;BA5)$@4I-6w&Vd$4PWiZ+7$G>HQioNvKs$KAna~gE!#LyWkG* zj@qrANVtmhXT$W2NReu<^ANgSGaf?EpRM`xlH1gRgTYOQVoigs91UdAFAu`6M#Sjk zhxx+;=OOttO0LSaGB|$cOYr49#aV6TW-?bX!27&%K8$@-3|Jvf*FbfF2BMV2strc` zy5WdBLN=ubQ~`$`F!5`UFqpj%w#Hg1y5omC4-X#VcOQVH-Q${l%d_gwjoqqBjH~Za z->SYwol)~@oqDf&dgjHMZ_GS6bJxtfW;!!hXudSJXU0CGo!K!nHvOZy$>}GjKQsNo z=^Li28y=9scBhX`FHQY%>W5Qbp8B_`f1G;jRAnkU_4=u!QyVA$pt)}H2a{i%{KVw@ zCQnRCnompyCNG{mG&wi%n~CpCEI&SR_r$Fe*Gyz4_{ASj=qC0~OppI!{F|C*#~&KM zYy9T%?wn`*%5jJ0PvhG09kaFZG1ZS$PtM+`x=(e7>PA&vmDupk#jh^jzxbiWw=Fgn z-?(U5Jb!V^!e2K0Y~jBb{`bPC7e27?*3-})8(KqfkMGZaVgA(od*@HgOY;HC{6!l+ ztSQc)JwH45tGQ?99@D&k!`J6NK6lI9o9BcLwhb3<*uG(G_D8c%$}q{Z@mbUCxwD%v z)FJ-ATv&F}xC4VPl8IoEAc?v_6^Ne47LhJ14GY`Igk4LQ_^htyE!9e1)Jy^KVb z^3<}4&u7Y6TY<$$2xPpS43kZcF&E5IJ?Ek(zoz^kZwFdef(T_?ObeI*moTsa36!)A zBB-xxJ0`N-v}e!0QRyFO`=AgxTTFYQt~$W%{U=54$oEK|a}eZ3JtuSzCo787gJ%xN>?KLg!^2DNwNh=_*E>32N6fivDby%IO(% zm;<22lz#4JMNfo=L@=9^Z5IR%lB%Y0VIdi{H)5oa?ewbcq*l-8HWqOIsG*`K{jQ41 zQfxQV5khwm%OkCzpJWZoMJUeoXNXu~r!t|DYQswP+Ctu433{Vm@hkv=h9X%gplVd$ zW0R)hoqp7!TR@69@5q$g!H~5<8T_^aIjgAW!w~|YYg>fYLwNo9O}Idvge)KrMddoV zTE0h>JK1Fhmvxd6dkiwV%_c@@=5obIj&Uf87?Gs9e7oS|@sg}RZO&UTvppHM^>bd)m(hB=?TFE^A7eI<;bk^xrDL|b zA*f+#c*u#kNtD zM8CsK(o_F|hZEBAJsKzo_0CK&+%D}pPZ1NIUZoS%I+x?RRc6?cB2s!}7u)@XS-YlTRvtu{oaR#*|x?yF6VyTmN zrHMI=!9oVL1)`SkG<+7P-ILY7{t4VW&}};nWnHD%h^NdM@d8{@O9rZ(m+U#KWrr?O zC??25Pb%F30d+YdhN^Ln0o=*V#2<&1yksDzvnF|$FOdp56XCPJgohaLlnFZQ=~yj( z!BGnkQ{PhLloo&=+S)+GRgPO)(uEHxa>x#Yh>FmtQ4SC3(OECRa(|C;QBJ>;sfBC_ z^Rkz{$cTpnSIe-Dvr{=C4j7(=vy{2?SL*`VFpAMA6V_+4)a0Xz9-r4hQSh=vDYnOF z(?^tz?B~iovc~INUKcNR8qC4xmHsx1NLyoZ(Z%v^qdTu1LNF|wNx#`4*Uo3DP%RK3 z>V_?E$3O6u<36fg%{mfRu_PLVEte?rk_a5{HIj{`omRJ*m{3kmUj_n)wVuwK$+lhI zo@9IoKbJ4wp&AW)CRYzS%6)0;-HMuUvQ1W(L%hFiby0*y}`8GK{`Tp0cPC8ndsOBcwMt8i{!A`?B1qM z8>|+hecU~)kJEJ0SQ4Z(S25d(2u5oqeRgk2pUgJnOuGs`oDfDEAY&C1O(p=EYT2W$ zWO5u6+%$(3#XU6#nbh~1B%c*566^memKU^+JYf>MmLMB;h8y{#{|C#Z234SXMMmc` z>d9t8e?EptBBi?3TC`^>)?AySLTM(YbkCZrgvAjL0WDdwUehg~@50X&7r00lK-lAn zuFeuP`0v1&5oCgD(8*HH+a}!kL|o^;TG1m0lXN0ftP$-%yxl2m{;MJv*bwxIL3nI)cFtN@ksVqgzWV#)nu_u z6ysJ5K152k4(ZW`YBrXtYa@k=KdPwL`+)M;=_^91LNrumw!Q&t$rtLSgqtL@Mo2yr zh=ZOv`V|<|up7`7kNnsCGMUaM)08g}^64G91l7rSZ^wEQC6AAcL13;^t5^(to+q&0 zjM*=eW^+1{ZCBD37w5*^{T;GJF%ha$%jUFYUgvoV%d?G6g{X+025l4~6i^HN0?SkF zLXrp)7sLA1Ib*Ysad&WouiUQCu+0Nvn(=4MNtbf$`oh{UkPI8^rlg_GCsWSPpr?Le zIBS`Vo0?8T&ZVn5a^7Tua#paOywebZStN*>0C;Xj9jUzCxn2n7F&pvOVr8o@o4fGq zxPQ)P=n~F$H4ISpyuj(Yfrmu491}JGbPaf zjr(V9bcBfMY%yoONe6AroN|0;dM1W8JCbd;)zxYl3#?+8X407o;fdwj4N}bIeA%-x ztQ?u~H$>V^l-pg>7EXk848r;|MtzS?RnrMy$EEjVm-YKTr!=sfgED5^B5e^3g@UyA z9xN9-j1AzR8X;S#UP>9Vdw+`;Qp{^>t_ExCRT?>0k=*!mrMmz)KKhumQ5DEq%xpM* zz0y5i@zYK!%M%^Fol3smip9%fAa8GatwC2Z>8X*z>{g|_-x-7Js>HNS+N?m$d`!`9 zu6D>efN69%iVSOuM?Z<>=|VsRs@ZHi;t*T50CU8z$W!hV(D&I|l~691O)&O*6}jKR z(6(;1x?C{1X%pDz-&Go%0zn&ydNz>i>4V<1N;yP?f-3}A)={>gcQ(=iR--J7kgu_H zU2u88Gf&b@*7jbkM-ZZVvaK&BS~VfY^VuaQel9^E@_oD6?uxYv_Ihf=@>g(wz}#|E ze!ibBv8H^RAhuqP`=>e%U)YfJdQ+Z$Cu7*I?6y=^Z=!U71H!w)#hRGf_l%-uB%(6@ z2}Leg!&Ez(@dYD5E?Ov_ZB*pT`dE&(dWmYxRiSb$a{!YTkSSd-z;tu%Ub{#qd!+T4 zG91Rn)k;J&m5)_yG_ysq!ISN9n5t=O;e5mH%o>@?PGI$Gz5b2j_`fT1eNszinP$Jd zoD~v|lBiP5-XzJezHq7Bi~B@@FsPo#e>Q3meI`F^?npYw{L?#kV-NGWV+*#qo2K5R zdST*2vtJ)OS2I3y;VUnW^1s2?96I9xY4_ay7TpR6@i5o*Rb#q0qbC^fDvrp}wYNNW zcu?3fKCZZAocf_FMJ~t3t`uFk#rdfsPlpmhH!T3x!z2F?+>F#0Yc?&8w8=;hkSzDR z%oLK+ON#5de#y|sBSQyZA5X-}SY>!>L(r57nkC?gyyIh_(8p?)7Dw8^U;Eu7gNH61 zKkYEO?;=pft-hj~Ue}T+NP7>Nq-Mxm>88-j6u3xIYsKh}o1v)Zq3_M^7?f#nVuOz- z0^`9xo^aHiCn>kB%V@2Qe%mdgH)z36GAc%=p8fE-=ob$_l=drHSqHx=7k}djYt>XS z3Bb%?Z8S4UU9wN33rQHph#0*T16IhJpPt=0_$N|Up<4}t3hX?NRDFU#I}DuG5CZOI zCXZJ1FpN<#PBnrk$mHNzy#}BFWV{0GW6Ep!2usi`QFDgHTEvt`_gn%iJ|YHBVes&P z->~T*c)i&C(KhrIwYBa& zLjTMx&#-qDYC07iA;Fn%lh$a9=~u;6BAh}WF@la!F(Q7WItM*)5OnM|fsS3#Ga5X- z7*V7OqRywa=>s7Tdf27eiaz4eEG?{Uf?)7Y2-bc3qciB^7lK1@iUUQE&J~Aw!8@jq z>((sAbkLggHRD7qhkoGz_u5)1IuO132zqc~e&-ZbXc({bc+I^2sZAwOtbis^irdi~*~l06PMlOE#M!?MO8`S->|24I@%W zx4B9Ny56vTK)U5Y@T*Yhsyu}|opFYNM2=&!aVtkdC4|QcQ#vZf$pF8co8K{b& zM>f7ndhLbdhaiGGJBdDi>Fn0Q`4M=3fm(a@N>~vbxfVrWiIEx}pF!s#jZq!?X%JRq zM2hn}ugveCM87yNyEI6Iz}vhFDxj4`Ng9edcM!ZAAvj6=#R8Phgf^q|0-8+=Yn#x? z8`9g*FE9D(7PPo~Zp+|p0eH7zedRJoyh}4>*43kXz@`n?r=|xgHtjxG-%&9@yd;he zKIGHHYv6fC#6X08;_%?J*TCl5dmX(hmwPG) znx*6Q5eb(W=$X@2p-muj9Dbf(D@LjdFF!oEJudsdnN_HoUuAc)2c2dUZ7X#MLpj;% zxHm7<1g2;xK!Ly*B!I}-a-=Jdu1?ECvaHuSP<`zykT_<|$gwdC zkd8v_1Q&%m;1XnhmE>BAVh)uunzOg9--=$E<{+jt9E3gxgOF+Ey&=GPkZkz`RDAI= z&t(b9sV~pLAl7dkKqWN{;)n!;fU*=orig33b_i$zBLoz4lpvfXAzp&tuiuJPRxWZn zxK`8v%m$3yYl+i9=%9tvIly)RCFs(k=IEC7n$QmtwbNn7*)lwY7ouvsC0By{H;Bra z@}NT-4;e{Blp#{NUh8d-J-uV_mIpI{6!n*7_3Wl+#uhG6Ju}yxIeRKFaogR%6t zr>=h#Hm_k-E`7!4mb+D{m1q|L5oj~EOgE82_g)2?cSMX19BV`F*M&Duq77G{K3~qg zW@v-Sg^*a6(CSlO!lDy}UI*@!%^a$C;58f-qi3Jmb__k)Ij!dxUCrLJuJf$Q^_e)e zh6~#33`Gf@VpSBFMjtt=a>#zIRED8~B#9^H;cS@L0EF&UIZ9o~v5f>}H}s2@sICAf zFWOayF^r0V>+_y-kWT}ji<{~iNDSvzAIy zEFWn@2b{gbgM}4M0_Ih_Dwn-7J1KarGl^`iPIo<>pgU|3lldZgum!L6tHgufwBUG! z*IL(s)0$Y7tI%;|ODve0m5Qwv@&8}SzB^9Ns@#7k+h?|B(;JD&hPq+iHU$Kow$uB} zP60`#_qwxFmJ&i>*Mdk?I07m};37o?5l7UE2JF`YDpC{`6|V{xK`z&FRes-h-^nKX zvhn)+Bl#rHdFQ;RJm)#jd(QKGzb(()G@|JLJkJ~1l~QtO#5mdZT*`OBdCiF=a$G7* zS7?R2RyCvpMYA^ zG=DuiNM3N=w{6E^`gqbq${-E$B|MW}7e2#ksK6sgGDRA;dsli+V(2a_EXDC)=-FJ9zv%VC{8F zo_2kC?h1A?G(sds&dBz?H`*-&?FX(K9P50L{PF|565FpSFYj;3v?I})D`jTQ z>A6r7*#%G{I6f<-a9d($AnSVzfI{9FS=avhBD7%}eGQ)~`i`XwPLp4ebb2#>r6cMM zs_hXnc{e<;l~O)4eX@PU-Pjkm^0~IczEre(EVy54rc7>4+8Ix#N%DR;wIVShXCjmB zNADlpExABJpO?_Mk~mk*;%v)0ugV&1#pz%ykx0$ZvlkrZuBoARVc$vzqRCm>J}0kb zqc&~8q#%3V0|kGJxE+3vux}lG@8H?v^I2a!%hpwvn2KW+Gc7fF{=I0ENKAGao}DD$ ze>>Yt^6wcOX`9|Rc<%9_w_{zBWBpwB2L}fb%JjkBg!CCcCiiZ5DE4bw%Yz?ECuf6- zLOc-#(rpkiL!P@ZYAdCD%+TpK{@`PMAwdq_2`v(d!B7ndwqM*e-a}lQWgFUm zyc5lU4}BTNLojKsx{`{>E0r4SDf(h=1$pi$#$%-viCRbZlAr6)5Bn#0H$}0)r`ZZV zk~6KW07fOLNjhRFRl1%dw?2%1h{d1;@0)D@`Cd)Hmg@SbZjsfD`n;8wA)Xf{{ns>k^-h|)1DjeI1Ak- zXY{l$_~PJs$JONCt`YOV&-=$D_d-eDA$_1b#jDAO_}y=TPyG|DPA(iZt7&7&kTq0l`5Mn*Uo~Fk}<>xs!P?Rc2J0@E`gYJmL>$r0vygczhNduX4=q{m0~h}_cf=t?{8z*+jhx9KW16L zF|63?RWF^5hBV%$4&>+Lvp1s)Z;?u#-C=7hZdq%PY-bjF@oK@+l^ph3oRz2iO)p)` zB*RLQ{`lI-QIYsVPYRc-oC$8LW@989igdZFpW&&}5qW z080-16fVFmUx5oCDkHm68|0l#k?LcEAUQLJ0LhtZ+JQF|0z{{MUc-U5Jx?xNFWo@? z`q<#ey44ke(^=jLCvW~}aKmm!tv(4?chzUxUAwt!Wc!d>>X&RDxOC0`^nIe|2W>>+N}$i7 z1tej103SuF)=|TqNVsL>C-qw=dTvQ2d02*tw&7_Ur;G<$dBFDey7{kgE_A#g3S}9Q;tZki{$>&MstAi6{?5V+ZqvDdI zr@whJ^jY~S{`kPZfc(%7^qC{43|nY~klP&5v>dk&!)VcEoDa`d^w#&(LV z1v1|L1wKz*__;ZqDpS^mcDC-F=k(KY^8Js%u!*GP$al`QwOu!@o$l;mT?e{)^nh5~ zDqZZmW#Bc*8(jzZXl)Y@1TlLY2qHAE1(t9MQLHH@Y@ESCfF%nc2#!!MA}V&(Lcn=F zU?C5`cuGSv@*5Z$rI;O@uW=pu(QjaAL}i4!W6g0x^NUPRgxvMpK?{$7i7&biY2->x z;}!5nzg%4bJC^jzzaDh#xY~178C9H(Eq1+5-*Oe_sf-~V@fN~N4ymPlgLZQ2m8tRK z$H=kEWaoA&P5*MxvFGsGt18FwDL@AW(;NauX0B-ugm~y;#Dm$JLSN7P-QXC&$5wlU z9Qwi^_x_)(kIQy(&*8DFN_Z&`61NeDDgZbO0~li(QN*!UXx@_sj59;-{XGJJS1$#C z`680{o_g;Va_&omr-GwfdX)%ZMB=5D)qbLuIRp^rR|W%{0Mh}UZw=6W zQlK5-jkjh#jQD1LaRO0f^->-c@Sg%wE|0*CuMYODy|ioS66yPZnDqt8rF}1VTLBS- zRHztyciRG=5G|ORP%>AEfv6(q*X69uqKQNvy?BEB`(Fnq#@Y1@rD_%;KQ_ib3a>OvD$?%^r5F#-j9EyYEBf}fpSNsWH?>76wCM;ax zV9}fnwRF{T%nfcJ*Nh=Y&U*t|yHZLbuRV*i5vFfj`++z3?{LckpP4P3lq%&85FwQ# z`naOt%_gd8^8B9%cOz(ig_uwi>7}Hsjcwasc+cCuz~?{gy zCDaeG5I^v@!SOM18F}I2aa=6?Z5G1ob73ti625LtY&xf43QCVXQ>hvB#+*>m z?31WSTt*)J+q=#n4?H!nuKmQ5e3Y;%R@yl23czOZ9Xs$3SQt?msoa!DUd~bJw)U}q zpgC)+UDEdhKjI60zwOrdZje+*rg%-_4`Cb&d`_|OhDs?PHPOxZTp(h%DzYw$^z=*N zkc!0Q$v-0}4mnGk+l_uHM$NIXeYp-7SUMC`(;TeEbX2}j$dgY>r2yw%DaHZEZzn$| zlU^d(!l!f#1D;aG12KxTCvt8@E1D^grv~s#k(5a0m^}hsmvK;vyimu&w&fc1ah+A+ z)HR&*!MQn#6$bjfL(++nl_fa(zvxWj${_pg#L-(IC*#_$+e|+uC>aq8ptAxj8;TZvP0?O-tr_dj>w!_X3=(O_u;t ze1Xrt6(Gg!rmS5}hm@h5Ng2vE>?so80VNTOan=nbIUYR!_s)mlY0~Yy%I#TJm$V9} zcC^Y6%xOZoY^D|^MExgT1f|EfH?8&8ca*kJ2jB zu{f7*(ei{aG_`J2BPzoY+h#uhZ)^Jp-F#~t3qWemAd+VIq=z`aPN4x250Rh=>l(r0!v2d+~xK*XUk0`J*Taf*qS4s zXi?e>bwZefuP=Dr^d$ATBh--n7l78B5MTYcDCyksL*=`%r~QOepW?&S~Rb z90>Y{oeTSxf3B0WO^Rx`HKB^d7t#jEYr1z$kl&plofs7r0ax|0rB?J2Tx+jyThGMq z(ovo(yFgzNm40yGvA)-OcXqoaSMth}hVs}KPNaJ>UQbg?yFE%vT;pczK*YU(LsLa! zft$ef?AYe^{Tx4F)&)LsS1`ddev7t2Db2o|i8Uydfj9wM0od}7^Gbfn z*%$cSSwZu{eut{gatcjCXJyl&Se!hof{7H1fn(>x0b)1q&#h|o6s{D9*%$U=k3|k9 zFQ#TfV4oW#a^&vw&(9|2gR^Z9CQ3+(bDh}WhwrFbi^4>y&u8qDiuZ-)}C zlnRFRiPx{{5iX2hc{{em@tKBGtEI}d*?KCTOC=3?;1xd2(c>lK2LxLIzLMCr>15et#%IuF**+ zhgV3+YxTG7B?pZAdWif|+&cY9CnyWg)-EU<`0oPqY{FGfg`9?&Rsl2mu65)}M!I%X zR78#)x@j*Ny&7!UKWF&qvMjt4)d=2qtpUe{aaHG%wT9VjozIiD20amp$&vNSNdRq1 zgS^J_ne##;Ov#E|$>f^K5J%I=q>a2`lI|T9Ny+$&pPnSI+y|qXHsk$J*7KH?HJwhx zZ2nXsSnlEPNa z(hBuHmIfBo&HJ~LTho2L>lFJ`l$=&@luAw=|2KIf-$&7?Sj{mC1es066)|p#RWZ>i zHNg0$RBs)T$|5JjtinXi_y5 zjjOn+IK@O23N`ABGt1Q~_bDi~g6!(OamQ|!U2fvZ%`HUonOLSYH+yK)_Tyush|_U( zLQYRbIE8YG1z7HsicZ9*;%ZtRQ>&uMh$^!D4#hsTlD&mGDiOwH=kakk#Y?vFFFBo# z(g}`Iu+b?dAy-YY38f0d9>)YkIhLU@b~L40eg(HrEvLxQo6y2?wy*cZD^BXuN&VO= zyn>1()Lfipr;=)x!pw3QDTO>f6;m=1I;oCvF*SA4D_DlQRkI*LH~y7(Y!Tj};N*&A z1aqK(rI}(CG5M4_o}{KYhEB3nTop+~<;(A2_o?CdAGxv9jXldFwQ4suY#ux`ekR!! z?c2q$`;1~nTjgai784A(r73wl=sB6v-?vmb!96OHXnw=_s>Lp`vba17>~?qXeYiaov}z zmj8WX5;m?Q5fA2B9mj4d$EYJS5bfqDdP*%%;=gK4d{Plr#sQ>!d=*gpl&qRaK6CT- zO{aPT`GODaR#Pek!>L#-S_V_gDHKytHAhVWL=)2yiN+(q=QvR-#jr&4(9PR7(u`uc zttWMXTr-18<U~&$&^9W? zn5q zL{gE20aQ)NW3f1Nf}*A(SoTwjNCNYyj>K_nzuaWyJ}dxo>=U+A4#SH<3=zL;#yIC1(<9I;n(CB$wA4NAF{}TQo_@&Q;r6xVVp@6iH4&%h6QK4eVVq z0eeR&vN-uZPL0K@nU<_RrU&-(dIgIckI|8-NQ_pajTAejVwuDgrUMzf zG_6p{W5?UbD)uo7_Exubjbuk)wMH&0*6^UKYkjx2OLm6z{R0mVY#B|Ae0${F;SUe} zW#|&w+rc zcPNj)gT+ElM6uk|YHU?V5s6KK#a52LlvGlMw2mZuq9e+E6m{#9Pz>QE%a;A*j*w&f zCMa69A66o!mP6Tqx(f})edSbC9)kkL)G?Y4%#;ccTTnYJ5isJ#P_0TGODf|m+>hlk;r4L=zIq|lxBXul z6qX!2W8!q0P11NvLOw-dAHv4XCZ{4%N;SoxBXlg8kSDOAcdWaL-KSE5wD8lm?f<0h zKRM9Hx1HhQXk#2kLyjGTrRCT*;*?^FPQtLWF(rq(PpX*X)a2L$Hw$fFeXQ#dIAyB+ z6aZMGaO|cyWUxaUBe9r58I7WuiewaOuBN8c@QAQ8s<855+vIQ|J8G_!@59cvH0^5kp(R8fqv zK8jK8XYkp=DdZU9ID_v33L37)PB;|-0&zSpk0KcE#M-AY#N^fgeRIb@S(lf`m+Do4 zuUMgsqrvU}hK>uVQb-}xsMZ%Sb9l>6br(CTC| z2@?f7#U`M45jFl&&|rzj;Iokvo{|!t67VZXNmlSm{IKY0>W`ytcjk8Q_4(Ubp7V%RY{EUX5{DW~LW4n7oY9}E_@9yS7( zObH7N#_;7~SL~zJx4wEWhF$%CuX{f9c0ghV2KG=)V(xjVdxP|IUp_u@6*LYtGwV^6v=&Vb83APBVw|^$#Yn1pd9wYBi=`Vn6>Yu*6&+aM zQIdq{iD1o7#i(gdEtZ}3R~4oR>GPu^v6vjqvX=JMektfmFIg~RoP?mXpw&=!n)Ja4 zXYl)w&`o|fgVPg{lt(4Dw{rm;6>odj0uL`Vx7mp>Zn?|oo0oeHYI&vTMQj`SZV-13 zA}Jp>Vr$z&(rL-I$buFP7od%F{7nbl%Ec>G0<5Gy64`)*;%6<=iLtj79s9^9E$wM5 z4x0f`9QIIDSmkfE%5(PcT$bEtLyJXXFq3?9l6ueYZ=M5Y@e)Iqi9z|sc+_da%KT#e=fKoLo4TH)83G|2pz|B8M zssX$P4hhFR5)e=YqS&I+5%5{O^$}9JcKRJ;=cOA)NG2vdRiMJLnDpp)tELCJu&QBc za+EPYV+7(j-@3&(S|=(aPafS*b)pqQNht{9^!}y;e-OTf+zg&DE}Q|AT}!Cqr%5RS zH&%UwNPd0$KjjZyideX9L5f(mv~&m=DJcZ;S<((Y5ZjC)B-zBl18!!KOd{Pgu}W$C zh-xjyaBo&Rwh;kg&5#caEm=F_?aVAMF{2uhxreCYb?5UaL1FCAMK zHX@J2$N$`sMh*#&p(iK1{6S=*=B4XbFMjgoW1EB=A0jQH8GJ;C(UQmbuns*R`4`TI z0|q{oL^`>C)k1RQ^ugmHbASK-;NaQ|Ky$q2uS43Nr={t>&kh`sT)-a)PT~Ywz2M?c zDwm>QaT$on4MU+(s_5nFxl)oJr46T1I7U4Yq^A=Po>MZxuqZ~2`$)`tKc;Gl!LC|bUWvX(zzl$tc)VIwQz5F_)MyY7oAqd-Bt46jDH4Nm4@9it0z;K``FxbzFpnBUQgZCtu?yP+mr8lM&jmZ*fu$eoXJ-pq zT2;bPyxRuc7+UDSm6xFdqB5`+0D1No-#)ap{jt0G!a$5&hMic_pMKI(3?{rM|k zPWf0k9{f%)$FxfXA47I~(FKth6ct8$`wlM*s&L`e73u1VEJd>|toi)Ft9^I$j`E+W zWRl#IWxND?(sYj``p?GCFGuWOJ_C$#vM6dU~~o>DDX+r2-gLzPo5l8#3#sE?~$(Eu=*3k zebv8rly~R7J;8q#w7X>J-uqq{It1$i)ZPusBc$(vm>8U(u=mKCW#U~dxX?{VFBUV94NZePEx^nS#yU5DKu zG>>RHAXYkkz?=tOJ>WGta7qj7doRt&xswgh>Q9r`7S8_HHijE-llF~Y(IvS;S{XUL z`~03ahU~nHb}T%eTC#^cD1l%Pi(XC5MrFBN3M>{XTto5O6Ox)%ipjAUK!^F88-kmg zzmp~VceE)zZ7YwHAOKf#QskhyQ8$MAHIaG=s9$LE|vApyrBf zM5`u-Iq9A;v6viteEU*A#@mm~@nJGE3xHSXnARBUDX?s*s4yy0Zo{-H!;i;0^6h(| zexfqs{>wgui;e1uM{OeR}asMr?k4`dzsL_n7%*L@uR(#7{nN5{lv zMA8`J$WAgOYk%Q>G-z#Cw5!KDv~}=11In&w-zSD2Ttg}c-u;dvuA%K$yABU5)3S*s zXld>M;Jb20m!_=~_?r8m)J{fk;Foz8OWWtBL556)3dqNu=lu$8LFlgW1~^WuKSCtl zn=GV#gY;DC31c^6MSBk;xuz5ID;|F}`SAy#8e;L%v~=2e?88#`uEFE6&EbF<4xXLk z(Piy?oW2i)&PGe8t!LjP9o?|{BZ%ae{cCHPy!+-QCl5)w!1P7Bav=m<8oMu?fjyCv z`)-zkuY%777MGG={IzZ+@>@H*klM;L|a1;@QuV^FE5<5R2QAOSEnNWSIYcG!lXCokogO z{rEEY@r|cg2A%X0M13D1pZti_dShAEx3<|e^sbSqZgbzu1OG0)R?_UjIA)B7{v;714B&nl5Vd^ZxmSArdE_{sQm8tP~T;NTd@eyz`5E z750TomRsS{N18FFThY- zKr5A0rIJ}yg}m^Lbb?%VJ3^a8MN4Q1%MAA$+Rxw4kE(NlNB$57H61OfGgMK->RS3r zqdu1)9HI=_k;X<58PyM&wJBgJ10XE#fve@vO>x)Fy(-lFL(;&@{st z&T8^C<+?@P+=CqC?khzM%byukq?sA4C9Jg^GQJ1=oC@X{0?SaB*rNJszYq>`|t3F9JU1>i9_f@ zT-&S{)df0&%d{eHI*9Fid`#5}DLMAH$2$?W$G(S%p`Ami!`1~J#zN5FLM5nbQH;e@ z%ZEaCmWz>_AH*Ik78Cd6`m+TlG}&kP<~PiC9z2rrvl)#KC}N$pciBVIwPWHkQb|lf zb&nt}@VSSe{T+R&b@lG`$+gEY zS}Vom!Ry-_$pbsinjqKvhcCt5L5zPE=1}=EP$1+F8~!$fFM-UhD3s_;@;3B<7)6D{XS* z)Y%qpiOAs7yt!E^CdbCsA{}hsXScL3ds_IO1xP~2>8cc~Y>|ys>XlkOZL1= z5%RWI;J!Ka={yi$Fk?ucFNAQW>Zik5WKcrY-?nbGQgZ0M7oYJj`)_^x=jht2ySgtJ zczEO->AU-WH5BR{m0ZocTzPztatk;QzUG3ZZ@yYFnJv@mnSedYXccHNxxk~D2u%qZ8-VTh&xGBS&E&P0l_c{zst}3E zxEcTyO9u!`Vdl@j&Ns!iFpGMGk&VyB%X3tzlukxMpl<<~%+LRfkrj){(c4pd$(KhE z!0q`9T-?qE+vpmyj_j2*y4ityq?h(R)7#hHB|i`Tyn2BL%Mi{wQ4x9Y(5JwF!$;LW-ivCWY&@=qP)*2ENR%jVwwjHFRY7A_N#52k+cPQ> z1JexK_YyG2s}}=gXSgsl-u_^}j3-T9xE$VqP?^>spV5_kIMGdpxg2)j$E7j^_^y$|CI)CRrQvw1IB;#t%LmHIYhOu`8&>&J8Jde zF6s5%j-dl!fPQJ<%aRZGZsVicFT-b|Vv)y`5CDc4v%={r)m@F6Qkk#PF_PGUu@Omu z7MTab#||0rg_e%betnv3+qT1&MV!8N98{gtBsY|}LVZT1&_!p-p>AAN-V}2G3+H*8l_v>>CJpI?29-`=vWqq zBdwIvhN7+(E^$?>E>GUJ5p{^gV2peN7T17w+^~^vhi#FE$`C&FB5_rvM(c`&46P43 za!DH7muwxmu^Wp@R7Q?GPCB_EK-vOGj(w5G91*OXN?A8nXn9rNoUud#IZK*+cpHX9 zB*p|?vV@r=1i24xmm%rEx`@M~&d4_0j5^N7%o-P`3ea=81o`?F*`6`6m}rc>u$K1? zZfq;ILWMi3w7sk6TWkJ2vTf)*>C8a2?qs2WGs1T;|s&cyr@l1ZKiD zmoM$y20CapQTge)dM@j-Hj;6ovB@@)ckGgljEc%grT1^}xOpbTkL=<*a9|PcOy}|@ z-c*GEZ<_GiRjj6wizdl+XUHbU-zr|hXc;?G=9Y|?!>o&9Duz%5cz(K+o+j0^plxC? ze+zDJ|Myukd|h6$ID~~K+`l(0u{oR5V^fqUXSs+aGjk3)FOrgDO|QNE%sKq~9AMUE zfWP1JO`BU4eHur~`|t~qnA~=c+1~!*KD_S6cgjlRCC)wHK=etVl(d-};aY@H2I%vL z-zgg#6_w#`>VGCX*GE~c?4mJ|3gpRC+EXY-$GQKqUUu;YGr&zi1PoHM5Y3+u`oWWH zkn^wIJF!X`dF_8}|CE1s`Q{k_4~I7&KLiC$*?h>Cn-6DkgA2+n9NIQRG+-IOF)hRG z?P`S}ek)sv%_uw7_4^%0+0ij1=K3vEDVo$)T@8cZK>Q}z-cga19NC>Y?)AUjA`9@u z!#o!+gDY)x7kq9&sRsaMf!u460pW4gQrNOX|Kf4%cAE_NF#%jf&HI7GfQxD)UvAFQmuC84kHYB8<6lppmPWk{AA3 z-^=s<=77-Rlu6h6x<=0IK6l93E0fj-9+UX`e%s#l#H$xz*IeAVY*J!boz@+!d>#Y9+?dn7>mfv?-(YLejeA|b-Q7UMP*C6D_l&! z^TmE?dv3Q3HxQvk;01I}IvoB?&Bl~VE|1Ba@;I3^`G}WaJ}brK*y|G=Ci4*=U&YMg zrseN)v(oGZtJw?_cD5SM0I;Z*y7h;kYK5tsvv?k+vsvhjPv!Ye<>d1zZ6xAJJ4vMdMc4>G+AZV zXwj+Ey0DrdKb(iFA{N6#yJ^Meg6A@{Gq8BtvR&8b6a|}Z+8EL*tue}+CDb*T#eb`y zohyro`{^?~!9IOe-rJg4#8h2#aA^z+hOiIhQRS)}yyG>WHbUMp$NTysF_7Oz-`;*; zj^7q$7J+@yv0g=0HdSYBE{E5pXI15}ns3E=GTM@jjfu<1gOZr*w_PLMOe~A1TR(pc{V#7mL^3`ik+4Jr1 zN6*EcMQ1sX0qc-?fEm~(xmxn8fu8=C`+qd_U;SSK z#`eKGhBo(KE6MlQ`Y-O+_n*_hzVGjSFZO-6@8Q0W^7jeJ^sMRrefJN$ztnw)vn0N5efK%jL;v2rZq47<{ASJf)_iWw zt!v)Brm`k9S{V(EYDUi-9UuA2FgNl`q>p`OtK!&%maWJN=r)rr}OYQ4$BhE2kv@jVtz*W|%KsGg<5m;y{d2b|EEyrzDzbD*c zZRZQkX(>SU<(jKoV=gyku;fsR3RVXP7*`QSsW0Kon>WEpNp`i6gW7%9F z?1-MTO%SuKNZie3xKvK-1r~Ilz+%U+vki)#uDd`LkxNX^a(x0555wjT+Gi+*TWcw) zt(lUWR&?IV=CpHcG@r6NS)<7wXJ6@5Z^Helvuvdt1_u?XQDLF&tdf;8l)P+FX>=`* zidOFspsy|;EQXA(^w9AiFs>v$?TDx2-T>Ef zaH_WO1G?EN(-mVN6O2!%0~%_&zayWs#^|KCrVgh(jj|~ok+2~Xz}gYVpMkY@{JXj>L(1C|DxPy-THNge7`V{`?nFdZz< zB~&IwQ?*v$O+pT4w7@9MmHD}VKJ2%}-uB(j^Qw}Z399qXQqqw#F{v|IK~7atEET8+ zI8_vy5@pVLO=u34w;V+BoSe=!>&BU4T6R|F`K;1Ov7E^$FZqpDO-A|7j@&zAV(OZR zK1Ma>Y}(wpZ*=6I_#Bfi)aziq470`5NTefoSQNB9oDbGCdN!-0G|J9L(8@%zQO3(<^NC_^;6t4P ze?3g)t!`z0R#$VGDdq>q<)u2yxPpw%n{Zk5iN23_FTHyUQjYrMyq5zG*{H zyBB;NzNR7?HD-7GwIerkYNo7mW;u06YYnS+JHJ3E}1P1@q4 zjV^~j5f1u1{s{L%XZ#zLu#WLe&pVO@Q(~r?R0s-3HwrZu#m$@0@V-dNtDlyvB98$N%~TDLVpj8ZnlRJ(uNdECg#>6W2pqg}yAtkD)|cDR)oKdn>1<z!WiY{TB%GdP^B(6f@eGJd=vKifw?mINr>aEgd3&r#mqFcPNKuz|o>$Ej*pSl*@h?QHm9A{&X>>)&$ht=D&3+$7aE5rwfjJwyMfk6=R-Qmo|bDGq)j?t*t=jSPnd}gk!&4kQG zde_@f4bP}r(K==szrPW(xj>7PWOc%BM3w05AbMA-uO7GJrF)mhrkw z)|RHIK7+3a^^_gf0v%`uqQ0Vv_LWlSeZ3>M7!!=1swQWBu0YzI-qE2TEn~kwNR_LB zQX&$|#C^*CBf<|#DUXr%(M*dDSEdo}GPR~7*CuA!hFz~Pdwf2Y%AfX8p~J;W$y&DQ z1C4OW->R}bF9?qVFEhic=h6yCe%{syvZvqHc|78EGhnQ&8sy4@)gnFEVTvt=Y-L(s zo>KvN(mWSrI;_*hK#gS;20Fsk)WFh9@A7r3*BcWwozCV;PPdnpXLgTwwFWhstdg=NE_k=_crG*R)CDwI4OjLST+z2b+a)|-ciT!-kgGXT)9FkusPJ~U zTW2+1J!93lG#+>Apg|3;jmv}|)EtQ{o7AJr!D3A5Onb{qFJR=3rq>gT=X6NjuP}Lk zhaGY*JwG4S&NGz8n)A1k-krkJ3b~6iGAfl$QEnxtbM8BYR?a$VMW@GCu(K_>C9Mn! zd&oh+26?NLxoimdBk2at&H~Q~jVaSWZ_v0XwxTu31BOK4GlG0BfFu@O&RjA@osJN# zm=SzTx?1+An3y@OHL>crUJ>zkOk~qOlY}x`G@fR>SoOu-9p{0Ig87#{Bk5KZxIktu znsuySdI22Cx}NdT4X!a0R?gFL`;}c?!X4XY3AydozTSfjHwPRBeabsM!&xGkxtQuH z;ip_BG0hm%`K+7ED!}+U*>Rk>il;!^3Jpcp7i1$1)jNg#L>jvO$MwP z-gzxk46_4tr+UEmu!`A(fI3xGT-jt|?AlI2a6U?T-P0jc%cZZo)#u%QTwW~EA>bkE zRarX4BsT>+a(A*t#f%oWypfGt>@j`EVdHGp664B*XM@Qyr}ah0yq)LOAwT7?`Efv= zD$E~5+in#KD611WaDF&R0bF9GBQ{|m=y|;(Oh--Ay12uZr^*rA!yQcuwwjHYB@lEf zOqyoI*4byO4i_?%Gtqe1C)c{8QQLu~>goA#&Cdj8=9zetb!3`(YlhDmUN<1AbPe1; zvO`ko`$_kO(#wbJy~BJ6Pzc9*=EdDO&=COa@~M=0nrhbVZk56j0&F_}={`9s5|cwa zZs_3le&yr1X5D_+x;TkLJmKoNkk`7Z1%)MGQs)9-d?KH^8JD0drDXgO+-AN?^&$5A z7QP0{B9BQb;Ie5eL8pfCx+{R<;~a@{j=cQ_G(sdM4^mH0k_&&gW>fo9H}F+B7kQjj zAu?vR7}OMyq=Wg#9mb=tjrNk;BK_;zf5iC!a6uP$ zE%z=n>#{Z#-eNeRX7v6N?!{5@PEHOmo|CU3M2`{bTcaS&pzQf+HcZm^^vp#!ig;^4Dz*zfE3k`DQ@qas;!!Qc4b8@}H=IkH(jNkPq{4EKZ>%LRgU5UudvY zvl<0{A=@Zu^5pJ&&=--IXe76v&ZAdvYHz!jS7zrT58Em%lLl?l_?gCRtCF?5>joP+ zbO4>X^h2_>qoN`LpZs)kn_=gc_VXX&t8pyK(G{T@TS$)2U%jhkRupCoyZ|6uB0e^-@qf?+V(D2Bfy8oaA>Tc zN2-cD&9R6}p^^Qwhmua3Ds%FnHsi6dG(Spv#>8TtE(+<+gHXO7-_A$n zI2L)ZR$Hz{A>a}gtBZ49_%k`K_7S08)IM=8) z^d65jF3kUdN6{*A8IHQs$Ub@+w)M-8^4&XZUu2huwmOq4Wm$T{`;Sfx+4uSDCFdfK zuqrGAR#DP`*k#60^vo)Cm2{H);hPvwk(eBM>c>mrn48;?ZwcX27cLKgt6sO&7=1P6 zNX3+ZHjR@97jhH3_AwMqb0=rXiykCLU$w*X{f=kI{e}#X#P-E^ELU31SW9zE#%w7R zseDB_9bKxF9QYcBRa8VOPenWMw*US$G!FaJ`OEv1$)z@$m_$cK`8lyu$U{Q3U0hW0? zf(Z?1sIW&=>_N&IO;nj=P1OiFqvW3Fu$zjc0P~hl3edD$f5PwRx@ARjs&qbVpEn#vYa;M`DP(P zZl#zU`%-@=9B}7jd==(J9;`+1FXOYiLX-`brvXqnPXXhVXr4k9A~8AoA%Na4q2_+( zDcOa5WTFODbRrWOP18VA2~UR7Hyk-zioae1TKP&bnzm_@JkJNS{^4;92^4vHxr#v0 zQfC-{LlgIM7PntZo_hx28X_q<@=z5S0e5cP+;%+6$0OPoji^D`1M(E(c2Vvy8%)_U zjcgXdM^9mfc0P@}S8*B9-0_Sa|a?el*p^GL?? zL0b{$%fQUl%mvwyHAg=FdkmjgOn|RrYoGQK|C0hee8cb+!^vUCuwr<}aNpAP+oQOEyKbm4w13Dr zBp=$ebdmX_?2+RanakIhzrr=zevad_s-sf zdcUb&FQ?Q>rC(`w`{O%=GgxiX;%HGO1l78yi(bH%?Qk!B>*|xOCQYSt-il+sq^MR> zeG)+)tJ+hHt>6#JgE_m-$*!B}$eGz96O~uEh`CsBXQSQs3i7CXUeAkOPBWj8Qv%gg1ohLSg@-1vRr#X3DmSzOuTOtBs^l|7N|N0$z- z^-7hsX$xrTYE{^xZ^=9xx+#fHugGZ&l$DJg1Ualm5lv==yB@)?us-y_K7UZtBZSoCmBYuUhzFg+YtT&uDPL~^zYFxdkCdf;(&Kl!32fnUrG zpgp=YH#2L|*%GF(DPe9!2joI6sd-g zrNWW3F4=16?U9$wjnLd(G4PU7_xzy6R(QHA*U&#?p<_ zQeoxl64jQMse~+u&j%vEEH`|X`OPthN*e!vCB~p4wiKhqd7%|5Kg8; z#>#9f)-T+D>cXvL%j#e2_qRu(<=MH|3}$-he=kI`Qu%kLsfP6q@K(S zObhu&fwRu@n^;6Hv9dkHYMIEF4X zAw1bjZ4s8um9h8eN}xe_vprj9rAW$}_zzqG#!rQ!R)e<8<*YGo6Sf~49Hwy0<1HFZ zem0ZVCw6@gcefbQD!N^>dOIE~tyib!_F%fH5h>7R@RX#;h^yA1V))Wh9rcgsT% zIZa*db$47IdgEH3~JR|J6HL`>(@HLSsy{3n>+4wNiJJ;Qa)H9eiSXto^NJa&o1 zpl?OAjD}W4GRl1Q37Cjr8af>s2`X<+3A0Z^9l_ea7l{5oMN5E83o#QI}i5 zvaCcFopcw|+>XbF>#q-c8Lh`{)|fN8 zN~NfgT!`5Olnx)6)&)~mD1K`T6&6;eaD%^6Gm?RNtWjwj;zboPi$70#zp6pg3PzRF zYGS0?tdVcS{k9t=YRdo2pru`|lOppX&B< zWEEm?xCo_)SE;$}0=)n}-Gnv}i84{9M$&RMrW3VDoh+q`fuhEmwWQ;-R}1t+)kE7CY?q3TrY)`295az$`v*RlPMi?62#sBn&^7*w%pr53-08@lO? znsg*I1zS#+(qy=iZ(@48StyX{RymT5*+`#~n!Zh-+dOr`tyPyZLA}%ICbr`+F__W`c`~SkI`o03g=@!|SaB-!ZwH6Z|EwKTI zF6c@%pOGq;T~srftmVDhQS58d6)O>%NX0|Fj=ho9sp$EyV?G6?txDA?txBnZtmR;O z^kPiUxBLdW*ibi9u7ILp$gRljxFH?zYAG!fts4LxCg3)*t|I#6zsBj zDCsSj%}Uh8Fl5gb$|&e=h6`$DIouGj*rCctH<2~g^@T8zo%k%~6Rvbg5>g&1N3<63 znWmq`-GjAYf>NdP5I&L)a8A|uCj`2_Oh7_WHm*zgGupaxBfj?N0)CopN7>MdO_xnq zHEQ`axW89hqQI?DV~d?!77&-maS(ydW9n$AAg5F_X|sZD~(%pm}N(z>YHh zU|l`BAkcL^6_x9>4GNPok*=yYRWRLVcSp!pK3L9F$Q(ftE90LR8fdkf)P)!&T{iTp zx#R?P#p$drV})!-oGQJeR5d0Rp2pp+*0_PJ6}q-`GR7Ip+@{}Sx;X~E*ru%-YDQ|7 zWRIM#;bk)iD>l6;#U;z3uGWxWd}3&|9LX<^$UY886Bj@l2s0iY$&Vi65fFWMaZ=f0 zquL2|DGgB}(#o)wN`SrLLg}Wv?vpOgi<;00v->1OL~~RM^~Q|_K)&NEwgNy@fDijk zK)MtFlkgnSUq__?53z0+bWE~Qjs6)#;Jf!rrw}_Xo!iP90luJ@X+w=+NT*5whM0+9 zi%|3W;qB6;a{#FQRF=;AT?a=ZH$z=-^Q3fsV>E9oxQyPOt7y);nP}VDiz06%vk5)1 zT{?XZl(;#?Y@Mz>XAw!Xj*|&nnrZ3c5(DLQAwdq%Spg0fQoa~3ae-2PujBxr|J3U$hh zfSZ_ypJ##!r?CK74?Z4G5>Qt8%z-d;f$X^Tx**A+Z`sgSq|!4bzU+}n@7iTM1pc=E zUPwmTY!Ju(Ythp(>GG>m0tS*BukuRn{@j1Z&|qHbUc7unzGL(isc!P&*{tO9@n@#d zUderzA;o`>y}%pILtuo#M)LxfPIQTgub3{Y%tmKJ%Wv@Vf|v|Bz0&=I$DiVpt}Brh za3SoJo&|Yrr-1oHk}C-HSqdmXbDFFeMBT7}-}(F;;5$SPhar^#BNo2uvJRF1K)|WZ za7ILJ=%}J4WVgM2vlP%z)g^zdM7Dgr65S*lo-T?0vPHT)FCwFZ^4|*~@x$c0@{$yi z+)dFi1)*%&XfUBxcUxhO|J^OnsLPTMu2jijgB)eZX?#cV-U_wRMQoH(JzhxJyD} zTJ~(|RqO21cg{Y;E(z(okMH9ZV4ef`PqxSg_@dfA_y?GVc{a=H~Fl8|X<5t3?+!8RKJDCsaLH~7RXZ(g?%tFIz4tk%G>*0hk2ks?49a()om-q!~v_6=mk=N4EpG$u-zgu zSlK@-q`wV|aPPTH3IP+g!#q?U9!$NVDx`^cB$J>U5mSw&_`TSIvKyuI^P)DiSQ}r) zfCOLMC>{EUUw3Lew8mT@TZxEG6Nng?MiR}bVNx9t8Q1n4Ru;ceEp!uLkp})wOh&}u144y%w-%NYoGe$vZ(}D5Ns)PuR8e(Ps9yKkDk^mFa^N8* zqnP&xmk)k_IsfO@!`H!|V_#F+sn*$vlr_V79ZgdyuSN%yu#_S)T72ei0WAHca$9Wc;cB!C>#Hp*1VQnY$@Iya47d`PdaB6z2u+tFM zz{C7u$@7@>1&Zz{y7h)8nq@r5?vn0Xcoo(AbMN^`@yf2H!4ocE!Aoy!Ra&52Sb-(- ziju;ijCx2-9&r?}tk#mz@!8*ir|Fz2_>NI9EkOFx@V`WA@44OzfJyoexcr#(06c4i?aTI0rw3eYHI%ZEI3WSGS#QWpmM{7Uc{u z)U{+pwEw|Fo=)N@rym>m;kpi=0wL5w7NVYFWAU1uu6P)LzeGCN1`&A(eK~kZCxwfY z{V=z>1Bnh}@Q~@O%H7COtOoq-H(t$e;#x9xv=0L?&ibo#)8Kbk!zgyx4;NMil+m;8 zAW_Q1+%_gy?IFjtFq5@JM2sC2^w^cZ21Jr$*A5k;`*3M>MYN@m-9*{_x~54>RKPZY zz8B%=vX+eYKKaz?a9fTjf6Vmirbz**MaqC#6?Z_DP4poa{#HchtHYl{9@{k7eHCbu z?bgGU>DLHHjj`w=I%9?Q1(FFkXfZ$BE195lQF?jn-7u`6AT4)}%-#+%0t#sQb7OYNofCjq^MtJf(xN`x zhPA=qM_eFFbqT-6St_{7TsfCP=@O_BG5KvLUV!rC`q^>xp#y-|dgGUFz6{O2_9Uv- z@NWLovUE3plv}_XtAh&btf=USmM#{0y=X*9p==6JJ zSR|2Cp}8E4K}1F|a^`f%wq8zZlI%DI{MM@{G;Puo>?$hNXu=*;qf0ZeN@6mKz0nI( znSqgfBm*M>&vg~1f)zl{;BPov(Tq)>aC!{36fXnI^0icSwT=2t`NqW{!M}K5>?L6LSEoJFO zQ!&U3ZJD)5^G0B|mWqzuyDWqaeCUlZo*g%=&Zt@rDmb#O%9Yz$k6S^d(L=YwjKpL_ ze8zu1+VgeU=D}HSmIC&ykMY;1it5BmGZi6qPm<++tW2eW>ymT8cJhsEH zhwc4zVz3}fHzmK(A}4;vanwEF=J(kmCF(j48Luic zF(Y^P+dyl+y8`!WQ4^B9^461hOZ6K6U;}Inz*z_TNRR}(56RnEptwbE$l;ZmbYb(l zJ)qF9&J#d}R2{Gyfw77N1Swbrs6NuOLa8ArsRTcPuI&sTaO<_MTCG+j=%Su#q}O3Lfq?h_Na)}oFv?-6wyZ6LohB86)pbZqT!c&Y4E*6 z{PQN-2e836O$^5+Iz__+1~^V@kKOQW;n)1IP*MGDQa};8uFr!7;*ctP)E3APy-2mG z3Dr`~iW1#%4`@d*89gnDI0g&vkV1r%L$4^eNpQW!>lKQq71gNzPU$%dVlou+(>n&g ze<%FOLd0L=8gxMy^Kd~`CD%oPd!_s5MO5_gH+;^)v-k49(NQHeEvnAxNlsfcw$wSK zy$=>hL`Fw1c)xS-=zU;M+aSq~$j_Zdpt-Z-KbftMojojz=Y`LksxO7<;z}u*w8;T6 zj0T%Y-?LRh02m1;bKioPJdCG%;E56xP8;5jrXK^_rMAx_?qMTn&cl`c;QID=TB^Fw zsY#(LAA9vB@40FI*-9!>Prr>^}du#NU*tDCA#6oYL#9rUwoLRD`C zV@UAjQm&&b;nw)VB+B<+hWgmeN ziQCYz>*p>(p48Na!K05z0p2Up2NXlWklKMt7X(e{%SClNNM}1LbklpKo6$>emoChU z+Thhy5a4axckz5eeE<^_@M#>`HtnL+t{mBPaTYZ!HOyr*`j1DY3lR0bwha+8+picb zf0j3lhWc}>JeVdC_YwgjWJ?-b@l++rk7W~zJO-*k+=h<-;?D;LgU6&+*z;h2hM&;T zx|($RI~giobAg+gEY-Bh;fLgFcLNV`6XtO~g5xS!IAc6K*Ur(w?3j4&-@2^;y1a15{|mDVzLqn4 zttY_-S))?{CE@^Jyg<7lr!ZQyW#Mx~;!XL%2c-*}*6V_vo_!Am6>*MkNA?G#XF?r( z-vjU|5bvq5-?@KVXTJwfc<5mXy6oSj;jJzbygED{pb?O};OYP#E%-<|X*{yW{++)w ztk(sd__F?Ax--n6vmWBVrA8+OWu#~pE(~sC0YHVaMP~p!7jXLbZCbAt9sJdULP;>s z`;v0>@6HD=Jaz62MBbsN#a>7z@7n{MB9y#&4I%hC;7pwLbpt{j0v2ZjXz zn#rsS3h-d9_Cx5fah(q6x``Z#k(BITIpeM4{a=BF_NH5efo@gY)?}rs3qe-IP+#W% z1JskaO(?r|+1Gec1JruA5!?t2lv@jcm$C=GA0E99{(Nblf;`Rqc80EK@qOdqi}@$D z*Z8A{&iV#e*NZ_V)H#BCWv~s9ae!0@m#?0wjjsHLba~TyjYyJsx3CId`o&;KWgjJRze`Ed+Tm99K*1)$>o3ry_I5&3zuw@9Os=H$<(KRsrg*bH|s zD8;hN-Uq-*;q{|&)M`n};cP+K7>`olqR_$T;7cwdqhm)Ka0UCw_AP_oJ;z^loc$$W zf#0O9Y$BipV{@GRW@&AB+xkj*Hd1AYknkyaS zXR-->@dvP0;x<&(&YXv^asG#3kAV4XS)EVU?=v!_wH}U^-3F!2sU9-gt5ia2_i2u8 zgSa36)VzG){yx7xj{b(#x#d#jkd`#WGkUh<;*z~IR(l_Pm>-y^4J}3``>?ft_T&5v z?R@~m6!xm&>G+G3+Yf^=S>@BouvpT~5>CZ>YZ)>Ke!DELRY!@i7zdJn$JQu;5CjyQxe)+jCiztt=Y*rF7rChzzj- z-~)SUVszV}{!9LJIQl%OAU03L^zOEYgd}n|lhHfejRd;)X;=;s8677?{K{+ke6l*Wbs0^;HiY{nm}p$%qcR2+I`L=V)%^z?8BrTl z&M=)aQZJ(2R~Rls9_Nfu-T)h7|4+Ib@`U@R(&`tg+_2m50ApQ!h=XO4`8|%(M(bCBh?tnkuEtvpif}iTLd@U6%QXt>MtlY_;@@K@| z-@m$}0iU~_prHO{Lr0lRJ$P5}6WmMDYEpB$Lq^;WExvLVJff<12Gp2KgBo2(Y%#C$!_2ENk+HO+?b==gKT)H!vFh zUI79umn|-c+t7(iEz5()5Vm3Sfa9xA9^(5~m#AN~jjsd8hz~f)lcH=0#-mG;y(D;QYdb3>+@iGHH!b z?Oe95@aMWjIsr8|U_nG=bW8{G1l3Ts4cwRgW7IgulsX@`pVVAonW|b#S&HJX>V3v zOlHt4TV(rXYlr|L@X~3e6-rC8;rS+EtXPi9YJ*8l$EjW`)nwUhD2E=Fz_N+RDE3HI zsCIJBsLU+cPOU1_lBJW@Qnfrw*V-B?1u4rC*(UVS?XcmZCQu1C4Gke%2l5@V;U$L8 z{l;qF-fA{eG;89Rn9gC)By#BMTV-H~5|L50x^b8`yKQh_8_Wg1#RLom^GIbmrM6ov zk!HUl

Kyxo1oUW&hSRp=x)>xr3jK$)XT8(dY32ibGQYUw0!zI(@FJ!|k-C3<>n+ zMOX|G84>8~P(l}S6wyBxWq(6Yl%@O7-i@+dJD9$j*KtE$N{6i-OsV}LLrAG?G!eTI z_GS$c#h&@(xd>`HETL~~l>GzqIk8E$Yp1o(r|B1le6psd-$BM28akm45Iqy}?v`yt zmv5GBoEJ5r*op7&N56Y$W*fS9^T}~NzD2fE&{DDyxk?(CElGltF~U#fe@3?(@mRmut6*HOBUTJS{0(~W>YqA;hGF!&$KR;oxLC?qobF) z9fLn!DuXz<>-v0ZIJSkhts%&cWVu&alfV~+-6<<+g2L$=qq~Yk^y4C_64gCY*6AOU+=AP3UzgOCQ2D>y|gK zyV3jB+hf7d@EN1by$dX7EC#mcIY6#TP|uYe{<<@rt5fJo4n*ZGSIQP;Ynsp#7w#ei zE=j%2jiya9CGwV~s;U3{|ahSnwvZ-oND zJtr9iuw`qP4G%%=vn=DJF^kXHWD8r??*b13xHu~QFty=dTZtVGekGtXKt4*ljft)^ z@1(&{)MFvu8!23}B@}YV{05AJlyT9QTMhQI2^j*?v? z*%j^sL<4WOhuL@?m2QKor;KR;@YUm0K?#|_b?v1=?gXq zi?8cUr`)9kAZ`s+MD$u%nze0UYK7nqsPzFc&ewu&-+d_52iypOkLV1YJYQc^$rjc< zU$|1o`D&T6Yx1O4O_ef-7lK*^Ox%=k8A*giA`@KP-iFchs-RsUI z41zvO#ATkHzC+ipD#f)sj)h@)Jvk7ubVliUb9OD3FEAh=@FtpTWoeL;7Y3(&l9m z$kuQ{A#@mI*ad!TzS@r!-0`d+f}hWWK3u;GI&$8nTmFB18Fq5;6#~O70rqXe+0%1S z;*^8>@CEohBDNUX3PYXyGwFg#y;)nORG zVektT06tlkc{fUK9U03^|A*vO`TmLJ$-m6LLF(t96g4;|(LR8M2+FKT8VwZTbd(*G z*BDeJRVaHK$gh};s*h~B1iK%fyNy4xm-eloaN$V_N7m)eS;|DA=~d*bw7Qzn@ZTZu zO|K=Rr{5V7pn9$k%l;1ymFs;GP_Ev-6L`TBA9xwn#*&p(g58&@yEG11)w^y5ULrDH zPB4H>@VI?j1~YGl=LJ|CT>MRF$S2Us5gNJ>OqA-Lil2?4FZX#tT1y>bW)1e-0?&e- zs=f{W7`(&W+1%9M}a+0E#Nplo5`RZUL^7xz8z#EWwhJfWY5U_#D5 zk6{9D6yRl2aBjHH`;@_og=+*7N%ZoYV1dPCbnvm4&qXg?zism%eVBhMx%(dA0ro54 zk>Dx{6A|+Dsv)f#@Y|EBh6G$=Z~v< zt(LhGN59)h@b>RSP35Bl^_J53QDls(dmMK zC|kDV;t_2P%6&gogE@-HP*iL4B`2?j4Vjx~l3ryZ7C9AaSI#7f0+U#czZo{+OtJwV z$A&{tf_QkZfRYs8jLE};{=z1l$@N?LC;k7!8+!6G*y4{oU!{m)At=XO0Dnvl0+OJx zNQOdRZ1Ea!y;ijNiJO*C<(W$$qMLUFTH0q+gYRv_eNeO$utEOL88%3$yR7ZWqEK6j zfRYXXD zQEd9JIQrCz%(J02GWqA}uge)pOUli@Ys^1!9&0KWdaaO&m^r_<(>U5 zUgdfFkbNeoDMuIZLddG6(V`21RK+U{bq9i>irUZ#)r~_#{*J-*2wOoSzz1Rl;bdC~ z1}YpUd&(5y=x7^O2zIjJjZaKPnE;hQ$>MDn~AL7=+ZTcP{<>PZoL->meqir=J^J9(?TFZD&i+@%PBiTA7v9M&2&DYGe(l zQGVPvekp(&&5iwW?76WojeU6RuF>C)-7uCKbI$*2{+sikowJCw>Urb*g<})* zn?|pb|4sfg`G3kEk>4kOle{Dk$q$TvP`+O-m;Fih6WLc}AC=uByGfRld1YGJUfHbl z_tGDZ-ZA=&bmfcEhopB&Z;+;>PN_<|TRJ)S;@q=ykIy|gcVwa(&Axy3w%O+FHM6GKi)J^^{A1=9Gf&NYYUaL~H_eo0LNfF`8(B0TZhiE}3w#&$`r8nuiPquWMDB`-+6C3#eGzvNa) z?TBvkuBDM-`ZE<%l`A!U)Nb)u6+LYtFbOD7FY*`Z7X+wigVP=$xtPKmVC_{x5s!Qe z|6w?g3DvbqlQG|LSxo8hA28W!>3Z3GBH(aEEB-hYeh8CI5l>B>2aI)B)kK;TVc#$* zn+lp4lC0?iiFhL3jWUJsIhby>Dk&o5W_2sHJJf9Th|n{*LFquBy)75& zW4gYhh46ltLG5E$ZM~cdei_qasvtpg=3cYZu;i;1O@PJpKqDU@(h;>s4{#w?FB#Y? z@NaNMf=ik^S`%%l7l;*&fFP}nca(%NqT}2?y(*l_Y`;tR10T~Q!|`e;MEe?@M%s%} zS12u*2}#c5u#-iliKtO~4&a5*8jC?X5jB--9b>x1U5>%CD6K9~q&@mps%^Be4O^1L zXbaSeR;}>^LTaYlu$%LlBzf`o1wM)%9U@(I+M1}i^4Yx~#$-*A>18V!H<_sflqTga z43a=;^iZS2Y;AjbA*VT-N^bcK9=%5C(G$K{vl-HqJ%M(76eGS<8l}cSQN~JcrEJjH zdKS$FT-kt92lYlryOdBA@&R8gqG^AZDRa9kj$%YY7 z*|W-%SnV;Ynz5z)&ZI|aV@b!|co_gmwd5HeM7GITC9LD^iG`x!-!z`_LhaFUc z+Wdk**X31&9Z=FOD`mY?-$?Gd5I2OodLxx8bUCK0R2S=o^KdBvDqJgMC~dJ2t_P`@ zLYv=!F)FBV$>1ZaxvVzS?sT;c+9a%VIAhI`4pW(k2V2FEKXV}lZ=u3ocbm>OtPVC6 zRAjZ(YgRrW{IJcXrR$MMBHiqm+D7FvMronK7EVVKRxPOy1S_EuH}X}XzoL~SOezae ziIy_esB-BbriV(sF6r}xgPyE8Vf1l^kK=_46)g^{$CGqAdIiA$I2VJ8P@xq!oSqb6 z^l5WerQ1Mm6^>&FDpnAUcEuBn=tFigzU%t}e-o>t>qOZ=r>sVET_gFWKv$`>1XM{c4ZR7_E3RL)l8{d0MulwM~b;^4+;Gf4T6a1 z6!n&&8SbRiTMpv&3^>9S!XAMFC%u^7tJ8a&1#%+Yq70fy zlXSaX4)@vTW9EKeXGKqXeQH}$=cQY&?3hMq@P^A|qs8gejy4;MC3Yi$uC+n=DWjj} z+Br+a7Q5u{n7@yU##BiyWscfeZ<3t&2=4BS0T5=S615~Fkq&Dow!bLQ!)6!R;#wWn zyAlnD6`J$U5*l2F0^x`x6*VS9s+Do|D+1kCBZy8Y)l}a|RC#O^KX z+u=H6jBoAW3A&;|Xzg zqpy<*D5V&?1uDwbEu^FCQ@BPmlX(C&^c8#h8hI{;B%@pa0!wK%%8uQb zae4eI#kVjD66JFGl9bC_N^nU)(W$EEgu)&!N2EY0LyE2=7!UL!=Y2=uuW=`+l7lOi zl8jT4%}*}~!_?RchGsFtm;it$l$rjNKqg{&Z;djPstHxml->O>=HhH+dn=S7mrwbU zij2NYZWF}Z>CEOyrlgOwL;AY87#ARrC?}z%h@`#J)`9RAoLT*S0waZwq{CHjUDatC zJn`Jw;URh-<>12EUdz~U1;QbP+P8#9<4C6?WxqO61^CL|iaWX7!CV|EWsS&XVmzRT zMOn;UEa-Sg7%JQ}jM|Qi$fjcn%|$;I`unvW%4X1|)g>)qQ^fr*VY;2Ab7Us2@MgW0 zBv+67gqxr};32(Cj56DbS-m5!-otlaF@XQBSE2Npii0g%ikYrv0t0|iwwl3467>Sr zH7m?e591<1wb=qpm@-wm{=7&?p2o&J>v-mCqKS zaG5ewtOE*>u=)&C?;uopE>x}1MQu4gDM%ngD#A*u#S_UUn2ue!14A29=5)MAuuh#K z2(=KQ&f44;@aWC)e7jxGYm~8gRL!bpgoAE|gj!N-3M-4Dwo#`}?Q!E_npfX?bLFhPpFpF4|?I{zN#l`~8@aF|4+dj%1-!iffc=T6>XjPc_;Cx@?8*X(B!dchIPx z6uKLsrdW!x2Ml3fww~ntE4V@vRDYtvj4PZY*+f=VNmCc&{)PtaB8m(d0myt;&7iq* zmq5>ucB*bqxt&Zk2^HMV9SXC7G8n-upm#LQ))ZGTs8bgRdQD#l`U$-UYS^h~RHeB5EVS*rVBd z9wzJB!D6NuqiuvH?9rzzzY@qLWiae+#9EeETJ5AQ@54W;i@7|6K}okm-ju`dfxKTr zXz-X+1lwd(1pq~)D;lHl`Ovv)S&AzeNx#lwY_X}OG)CUfjmR&QUOjtw^0*{7cG-k{ zuqXakKRCEu{cFIMiY*i7u)$sOx;afZ?{fRKDs=SU;r%Y6q9YqWAVh6$`Vh8lT)S%9 zP~>7{nl`yvzsUfB#U_$xv1tzpg^X3o(~`18{m|a8{1ogi-=5e$&_4)fg`MvH>tIw6 z1p{^$rHYNmT%nXvo5_<@Jvn5FWDkJXY)unVgpWhostKSRiVwiRcDnjkuTCv(3Ki5T zt%hha$%fexL(PZ4+rE~HB%itc^oYV29^x$=o<5ITfrrwjG6|Nl<>XkcXgEU_S!iW04MfOT|CN_6)T*eekkJ!~EwLN9C^OuZFs#EU*( zAO>hgv8b<21bT713Z>o#e>FF&v1{Aqx#wP~Py-l_nPWP6P>Bj+u;dQgOOWrbZ z$=Eeh5(5;2be3lSNe*bl`OPQ~I49+3g)cbJG9`~FCOotL8d$7LVG4u+pTE*nOS#$a9WwmC`_jkVEpMQiq8 z&~Hp(`N_Wz9G#-3(}F9%{61cqo&6-R!Hd%&I*MAXRWNs|^@PouMt6Qrw&^S_q1Bw8 z#%fsG4ILvsKMZHvF(5uG0}KXVA+PCCVQt<@sw@gtGh_q8u$GKYgf?IdhQaSX2ll!h zwtjs2B4IvuGNW_{i;Zr+QY&?%!*QT{j)Kc;Z42_IYC;t3%SU0Wg{Y_g$kE?>lH-A2RGTNLMW74njc^@LN6mHP9rYCPaMqXE+^y04eYg73b}PJ4Y~Xv-)Nz2l&qIW-8Hj zm)a`yo`+#1A~HI$T`xpdE`A)e(JocL04%N;o-|!JVK9)4B4}}iB57NhK$)jNABo8j zj{;c*AD)0w9(c{nWk^0L+m2p(Me=q**8hu_b!VSj6;f}_QK|U7o{lN4@o_E!9e56c z6+ZM0*}Qyh6FTxd#C>|czp!mE`JenjboF_V5iII9jlb?CHBb>FTdgn&la}B7=m0e_3As*IDoO@v^rLTq2Wj0_BzgY9f0nE!cxpV~kx7@pIaOrCeEz(X zU<2S63V7R)vWM#50aws^jp*Q|Z`?XqP3MCAb3i-<^u>-7Y7m02r{fBTIEd8gpwzQ` zOu@RXNHTV8%c(rBiF1mF%8(Uy&9;k{H%5Ct$$X*x7}^fes>$L+DWD zdk|c7hAxAns_Wl^gNOE(P9~Z0E`4CvgRm!>E!uJ{6hm|wxx$d$IfU}G%fR|w(UE@g z^s%BH&&dGDvdD5ULJ|TQ06fjwaT!BJKzPjZvIQQlbz9MqFaDe0&;P=6XY_FG_z^hv zM6L?(U_A9BUhA)QYz#dZgFS-{Z;+r*{zT^6aL&l&yCmm~e*;q8m9w7FKTH<}d++o^ zg7R(0WYWc8tQP_MX(tk|(TWDGi=zjR0aFnf9se4X2^rS-*!l(j5Cr=?nhXy71jkb* zOnSo%TUT^-wi;kl9tRd8GTM6!14>qR;f}!vj>`g)g|<$Y43j2X%ICE?;#m`#c^>{s zL`B{Q_6wQpo#*)vjib+lt6&Wo%UBDJj)86Ei>7=wnnm3&!nJ8F6=KC>LP?na`6B-r zkM%n+a){f6&p0K1M4{V%1;l@CYhE|S`aIMP{&RIl*D}+rTJN+~%9W^J zi>fck_AQ9X=%^{<7`*fXA2k~9^Y}72PL=V6lpJaHkaabyc99Mh3j79sT}(zt-)VOY zzVjP?%`CNw2aK{*!s}B&%}x!{yeQlMYU(h7{?Qk~*SJx_jZBQm&zn3hb&oL;Znic3 zIR6z3z?CT62WXEsNrr0HXDAq%Oo(J$dWWr0jG?{+>WZwT!o>^FIEOKRLm11yOXT3p z)bx486u=dN^{nZX%^txQEeLadR|VMICY6KZZ!LMqhp%S>0H4FyjTyQ8tX*us%lqnv zd_+1BtH#af#h<}VMASCakEadF^>YXZ-of@?zsk&|V=0CV`n49H3o1gO*a7)Q6qt~2 zS`f8VQ0)1+D+iyRkUJzhsatp)nb+dTwxqI@t|Z;bkj2<*`Qqr$(=aRVS}G#`C^_i? zY|P5{>{p(>8 zk|BdIYcbVmeOhNuXT#oXp@5G42|U_SxqNX!+=h-{aOA+?({ec<$rkAMV0%`EOtJ+_ z#ZDv}R%0tx^W|JBH24L`tC)M z3JdIg^Cj87^+ZSrK6~BoWmnIOwg7L=kA5$E_2vv9`Snv0H25QY0|C^ZV~c>pYlJwm zK&BVXCn!LYZ1c;y1zq{FOulr6E<7^ECFrJi%)ai-+3Uim@ZEocpanPJe!58KFf;;^ z;vr!-3twLSaQXLbT&ER0?0^NiFnDM?GXL)x12yjZU(n~`eJddEpW*zA$pgvl7Ra9c z@7(xxNc|Ux)Bu3YXg&mS8eRnpLtz8(rD42EED@jmi)?Z8x;-Fw&h@Xw?4j*{<3m*# z9`M-P1;`i3Th2fv44dV@AvM`7!H0O=b;Ou!IHLea5U|VK~ae}eT1T3W8;aQ#+OAWIa>>dUJsLwOE;%Vo%g zO;xQD?U|BqLbor-7v*c4&`}R{5-2^jLGIZVxOsFn_RQ^pX;K=WrJ+wdO$q?wczOfO zQ$#);h~u-H<R;6EJ9f%JyN9jtjL1Ns8$dD?y`3l^B|vO4 z#eYXO?FYM{QgvGG%=LStgXdXQ=)FJRw;6qDr~FKr8asE%@7`%WbUldMS;OU7`|Za! zg3Y_MO7gTHG_373ydVgnYQwL=C(n}mHoSgB@_PBXvv-VzrOxSRCg`aN{(hH$`(5M~ zfQ=HObJvRSN$Kv6tuNhtu-d}l`(tnfcSUa*hg%3vSP+RZNcW%4JA-ti_j+fS2I=!b zlkIZe!lPp0JA0U{Iz6PxmDT4faYE}7&e>(>$`=;IZRp|Kz959M-hD2wlpMDJjFq70 zZTWbKq++FT+Mpz8YcYu;%PFQ4e2r;JQsa*0y5~ z#M$ytd@qnlsAtp4PLpB-_GDIpsa*TrRW&qBMPz2YftX*bn+~=58gTj zcgmGn>F$wRB%Kk6Df``YaqhbiRrbK#9dqr`C+Dt%xH4jH+ni+f*RxO0erERm*;{Ap z(>KpvHEWo?aCWn#GxPVEUyR9y(Pi(MIXqLHiO%R|UNf_C`mfVJoBqc1C#Qqc2d4K= z%cuS{_2bd>)R(6|GIjUVjZ^6<_mq0-tf{HVmnK)fH~GZmgOhKa>`lhUmM3kK({1@X-jSt4(JNn`A{&;0P zI<6o6(f9@98^-=R_WT$(_Vuw(jH*Y^8l9HBB>A4?3CX`n?i{^w?DDZg)AtIIdGDR? z&sXLn^H=VlKW~0f{)+s#{HyYZo5OB$CS0k-h`8UUH^r5SIuYCG!Tdw^pqDBq zR^nApSXXd$R9kR~A|{wG8awqykp(w;Do)H|_dgRO<{L6<4C+azjnr6X+8LjAS;2zH*Covn<4)i{FXikm1l3)`_%kWq3b9ThCs;;gl-DiNve zR}A?Z8xdWP=ymjthR&lcb#vRbc)AuMp&%nlA|L4a;)ZNuI}Q^uuUMQ=cu-L=Ra0rR zr>jnGAH@T8w-ib$TrbA#0dps!Pi(s%&&wExAgQt?z}1-?80fcNkNFqWx-b#*_{xs3 z%4#cQcg2Quvn!>ulQD(9WcCHgKqRph``{R-(bi3=!{L=mIp<8axUG0ROrf0Ovje)} zb}43Xne(!F%m-jPAyhT5XADqStCu8~aNRe?YchC=B%~-ST9lP(Xy&mGmvOlbIwI2x zW_4zd0(`TRI68u{mD2_yU~cM+C0)eA5-YMBhVx=zIu>Ypak&!dFoT-E7h}{%uS)M9FN} zLv@3UL066zHsN3yMn|te;7HQcE4FnUcrViP8!>yWfuTv#YL3w~RkhpHlekV0Lq{8p zL@&@vc5R^;t(<)dvnLsUoo;$d4sAlIj+JL-F&84#%n@d)tG4uP!IDk6#Wd`0ZbKqL zLuaex^@X?t0nN?PsV6iaO>0C%WV zXwKGXLp|iws+y*rHJx3=QJCgz2?CXrDn+!^uJU2cqx(Q>#?ii8e@-k zC%1G3da-FCYdW>Ns?PyDWm?KRxcT*0##%v>+Fvm$ieYD3J+~G2r>#Vl%*Kc)z>kIL zCcWWrm`)X{CL*FXKv5x9r}AcIalELR4EGY0mCZ(U<+eQ$&rcfg=t;BHmbaS~?z*a& z(a_^K5XVdu>{+t4!Zdsh3)@N=vooK@{0VE3tbaRv;9|qO@}A zB2CAZ-Zi9~I$9`XZc{UUChV(`M%Abb(_0n@ZLBC0@nSd|Wg^Nk9PVJMhXZyZS~E4d zT*|z{5{aqH@E=rzP=O%iG7&+Yg-*tm3m+Bey1be2Mbe$5SzU@WmD3eWFGDOa(a>1f zENAegLh5O(B2A?LfC&VdW~EN~3aaevbGUoS;ZYIAn2jsb?uO18Tik`$-&nBbB8gHh zMsb0Pi&ZZz zoy3FpJ4|s!vexly9KD(&Ir=>2?zi`n5S^FHGSPCz-;HlJV!GF0V@OZR$+G%Y6}S3;$Bz*`E1GLeSTSQx=kUnU3S(Nlz)O|`7fdfh^8ycPGi*=*(}^! zY0vm6klzOO?`=6vD2wovl7;aDQ+5HJ&bj@B$1|$qT^8% zX?-9m{qAsHfSdIHQT85ic9muRcy6X-W-__=ruRTX8fC)iB?Q9lz4wa(=l0$^>VQOa z#s(_93JOF7tY{RtHWXxC+*J{DE$gC!y1J|DE?L)t1%J=E=VX#OO#br!z~__sJny;B z+u!$jpYnamdV;G4;!U5kX^If4H%RmvA0a7wCSljd%$2MjpOHj7W7P(rsl|lOP|G+C zo<2W8OW#*)X)~k&rHTWykxR0U(z=g~#?x42%1(pX0xnXHByKCHJ}P}*Fd7KL?<6Am z6hypxbJ~ejt5oQwlIGb5Awph-?!DlLlk?`Nu}=+JE-caWx#~oA)mKJ8wi<;{fh?w4 ztS1#JdCPf?bf{R3!GfO%7ovkkvuvTA)GF!HfE>F-fUw40<$BKLVW{Mq?W49?^;jdP zC-HhWS)oc8G1HLPb6mHGGsfh6FW^rUES2KqV^RTKN*Ab9UMNP|RM#pnGpl5J)?6af zdQ-byuXl-RVj?fmK^AUPkz7ij)~CXSRAGa33tP!N51umppbk8+d+98gI?4L)uA+5N>jpN2xIAu?F$&#li39MGE z)}!Fo79xW-(X9m8$@h)eSo+;6K~_CI#vU0A^c=V9hcewANfAWFmdp1O)qBW^t2BnZTqdHkjfT%`A~klQS#vGubMm!83O)c z;-ayj+NA2w7DP3KAexyLG)rbC8jDn|M7Qhl)pRw#!-;OZ8Xnv~oU0flz~PEXkf6Mif(I$4h-Kws{v}tvjEV*vRZZEj{88%%rd1| zm3P>iS#--qpnXt~k?wsv!5eLtcYK8Ch@N?NdSdwJi_{{L(!$y$X1cy{;KYlNST*Od zhjYAu{*M9us*;RO34a>J+-)1CSy3J0S(sVk(X8p>b==&5WTDQMp-Ps}!+W7Y3NoNe zJ_s&Xw0_6%&^|R-Ln8}XPzOj6a*mikjN^X3ZYY->mRvC*&CdIe!R#o?07QBRBOxaI z<(N7QiSVM9AVxa4Uay$&DX)_ZeH;qTp3&+(5 z*RKYggq;&Vnj)sZK5khZSOvh3&yU&n-&{Vi_KYV0SRx=}nh!8P0RO{i0`CHQ0c`GF z^t4gEWj}>e=lI;L{4ILn^RI>Mj43owq2rU9N%RS$8Zwb3NdOLktY;=bCNSp#^#njs zAUGA+9@w}-A$sEZ6We5Og*(k^NYogC(AkI!)V7d#(r5;Zmv9N}QzY`f1D5#r;FB#Y ze}uCV>rYHTi$$gBR)Ea`;FuU>HUPlppomss&$$S9 z8QqAhH}7LO;v5XrmA*y7SKmTPAirO6o>!B-)2064dW9MdRBTVXU^^+uBkh_TME$S_ zl(BKhg*o-Xu{l+I{N-8uOlR_2!@b`3fZM`?h-)iZWY|t54c?iAhj-aC6i; zq9CL75y0fa;B`B^@EUQqyB0*eRY{8qVX^fX(T(N2xkAtGA^@-YHPAc-84{d9knZK% zPplE6eYKEkN#Y|S(@K2o@lY;_n+7S)UCJ||ZVLS<3T;u6(fWVlM)04Tht3$-mv)Ho zxKeLQjc&9^c$jdbZ3?;xJ<_=sH==F;EHsKDbn2#efg9}~R9lDN3&0ftCMFSyR&qEC z^edG<8RsLQ%`~SuCM(YA0j-h@nKa*X7~MJ?+dTYVT;d_3{YpIAiF$&?BYIsp;kQT3 z5LC~GU{Dlfa2R;A==!>C_+Us4s8_CqEpQ`9?p!`=zE1|yfgTm_w1avI%|zfvSWZQI z-<%v_UTz=0E+USnumH%lvPVdOjd*zLDIN)Ol%!9sTz~N60gs==xewjf}~1=&6R2?6Yd9>FIS$+*$OGqB)AD}&%zc` zlp)pK{zJp-v+AtM)Gwq1LBgM{V}7d0_k+|8`3v5pBxxMSkFYGp@#pv} zDu0AdZk)MlXwQqL$J{t9O_y0(E^OLf((#LoaCE{z&CT#aCcF>aXbqm z6tC2uRMmoaAu5bAgc3D7qZg$9nA4zuSC)++HbjTm?Zf-iz-XsyVf)g=CCf~@)JsHc zAur?f8PT(UT-b;{%7P0=ps|tz zSDT_-@o*$iuZ3v31TezlU5bw1q}HgH7a`$yJ`f*%#%>?pb(83#l2{PYHzjwbQp?or zknk#xn*9t3(KhG{x4_z0l94Jl;}~A?W;LYGHMv+{mMTSSiAIR7I*SE#@-6TaB^lLk zrk%rm3u-{>s}V)kgtwYby{FtHYk`Bw2KJrsvH`azj=u3OaFpcJqp#pi@sl?zMa0G_xI<(RoFOdk}~YI%Ph2iFf9`aHuKE zhNu5=3wXD1cdDb?z=0JcS{v>v`}5#^OS^)Qj{^+T;?KeAeWzNzW#vymB&+{@M}W~7 z?0mmC2IW}K0}xGaqX?Uq1yn-OK{rGr>~8heeKg6Qy#-eMba?8gzk+n@S59gGkMC~v zG%$p$A!QSI=Gs9n%R(=5#aP7G6B&X_@=B#hxV?C2sD0DDWfl7CJ?iNVwpC+?)CW|y zS^Lz7CRT&w^qnCrRvb>M_yQ?DQAUn|igg)BsgIv$wTdQe&F}{wS9?`E0OwV9b6mb2 z&n(rgH>hxXhL`&>arPn1|V9>f#}Z@V8v zhF$Ij5y@A&LJM9}Z>GY%aK_@w0vN$)646IKs#a?hMd;Ks+kwq*r*{q~KPJ9~y$dX~ zM3S8boGoc2O>_shmy@oz72Wnx^~O6MRBzP2qU4F2HjIKLMu=IPhlvNJcO(Gv%J0Zz z$mYmWT(RK6^mGh^;rZ5&)SFTCAu#bP%g__Y=C2$+@(^4mdq7hF=)y7+4y+#N&c!*U|hMQ%AH=9Jw!Yz(E}i?FlO>f@?S zosB3*Lzz;CV|4gv&e3&Wf=Pcx(P+{ky~VcSm%jw7SQJaIToz5l&K6QV z1-&(X6`H9iLMNZOc0W3s>h|8R!fCWVS&l${+(IFw3vsl$j}syTz+hWWMyF2RdNBgo za_g}Dl;oiZ5Sj9BZ8%NV4xUe%>h3en|33o@1sVCiyZ;a@p0Vx2ZC{5?3ZtZ3 z>V?Z56R1!?-cC=pK7`nZ5|e4vC*{R&pg+%Ms(P?jOp zgR>)OM9uK6zZCDB=z<8ZC^_g0I>C`3TDDf)k;xE&9D}a1&j%1#>JVNhhCp0UD$%lVI2X=NoIc4%hxv9Cqh|ZD|2@ z@?mfU@!A`_pKo^yO?2Ip&>jU9;cFl>?WbK2q$f8ibRagl z5Nvqa2vLZ{Gg5nQ{26Q~MHx~Z@yjWXfATZ&K#nYku!NHGvQV*CAd!j1=jwGcA-$DH zhX024D9GsKZz~WI`ME6sOZeX~jk|AV7F^IJ39Zr6a@lm%29b#sxOT?^2x0%F-mhLx zMJI2x!maS#nQiET-|U2V%Hx_(-SKhFVKn{U>fO*Y`%=&B@j_Hb7L0XcWuQ;9Z5qA( z3An+OWVHU$zrh_L273PO3Fwt9yaQ(JDG=U2DGTpWNq7g$*uaS$AiQ5X@>x}`pwa5u zjDG%YxM`JTqt$f=Gx1;4Zoo`Dv1REQpjbz+yn4@^XL-r)`^j&sJ^Mj`-+4xWAEB29 zT?0|HjtxMLh4?J+OUJ|&zvUthr_YfqSNs+||EJF1S1n4i{P)ze5EPb$2snUG1vFXs zdk`;&;Mtehh@SbLdJD+PuPCM61wfA6U`OWfpI?OkK8Wy&RRfF3|AX@^rgQxS=fHt?rE+lpf0O)zdGfjQc7NB8p!-T8Z6v@Qc!lgXJZZ` zsD0W8R;e$ZdT!>u6YOkg&Dyc#@M__bTj4C^7et6c2~Imh1>IpHJt#--F>fIo{iXe*80bc1*6)Wk$ zYjmK^Vf8BV{Q%s=8@~fd<`qT4?a9Lkduhk`@bTY))U)0JYPu-0>O4TWJsgm{|8)5%c%%|-wzH9Auq|8 zYBV_AU%@%VF9eo`orraW5YckchN7X+$k|DB{5e=CgO|ZuR8fX*diS>u4!`s=Xro5F ze*QQ0u01z<7XU?39-%^n4ri!_*A`4h6RfYEk-E0+C744+8K}4Z10Y}@TtAMy+u;i7 zy(G#YfdwCQPl`w42YM`pyLu%I;u{!KOgt$LXcSZ_I2*#E0C@jcZ+v*@*YE_A#I;qa zkz@bN#Z%m*aXhdpwHlHKM<6w3@B{>4$O;ao=d_tgz28x_59oxWOW%H@=72^)6{9H5 zC^(9%H4tG`uwiZj9P;7cxERI>X`})9xrlzeTC;!4%B7%-xbD^MV$q_t_l!l$Z87Iu z@Fa(040lH$G3EdaM_`jd?Qy7TC9wn6?JF_^du zRy9BlPlC<@KxBw02+pilQME@|WIj@)gIt_T~pMV@~ zvX{PMEsjI()umKzx`G;fJ7Gn z07RA%6^j}ohEyBRv(`n`#=2o+qXxvx@PY`D^7_%c*iSf89>QB}nfmpFUC@!}(0X8@ zAS2yVd07wqKClgo3iPw!A2v_9>m%c~exZ+nxuTsxkDrEZtstW(lAw(kDNnKg6%U5% z7DP}L$Ylb$Q(LtgiQr{_)t2k`I}o$^&TX258YNNnuX`Lr&327Nw86XW@CMmX2Bm1|zk&>J+{@+I;p;C} zPYu6EYanY+YymKv&m_a3GX6MOD<<+ndC=kAJX#=uk9Rp4t$*wKL+J63tG5haA~inM zP5?!bqav(1IvBvKMLS={`Y~gfKreAH?@BUy;ovn_4D-CkrP>u*NQ?a#>FYf@Tc$#0 z^+|`9%|K`ydiyb0a|$ZhS88%N#mmRU9)uPWOC0)1OrM~tHgBv+418%1i+;2TdY~Xf z`mv)j3)f~~u`9R$2rP0Vh)TWc0PNXFH(m|(8LaVgR*4v}umcE4nS=atsnopm!Y8 zY}t>oJbza8yz;k52k@q^Qr~}2quD$VZ&J{rLmJ=^4e;u44eE>NI18itgM*s&8&@bt zr=Fk2koKALVCr19l1Ix`9)d?M*LXLIF_~gc zlutuC0MR)08fm2((Y04=)~(l78h#^Lt-8r}D%B|Xc=WofVJj=i=!qwHUk6G>d7~)v5iT%Y=)nJ{*mng>uxv~eq~j=~Ig@7J z<`qkkKrg=9C#zYb-Vy>Yn-~Z)A;_>2hAiv$f(zi|&{xcwgBw>UL$`hHs0{so;SF2V z;2(7U^=N_hs66Wk1dpHJg=Svfd4Ua{6+O4RcG>>QxDF%W(J~_Km_>b7fNthO7AZt zW$cIWVj;|TG2EMhggVeSu|6Ecsd=>D#=I~0=&f8r`eY|;1gRYEZv{V&B3Ej;OE;jlJvKS(0Ek4!V6{b zK{k^9T6EsnFn}?NNaosXQ9!%8u$7ln(aGmOgAH%&YOWC#iy{<~qz`rsBCRUL`jZK) zpid=oDP(U${Yo;VC;87y(2E~cZyr9@)_@Yvvrt>&5y71haBrg1q$vwv7tI{%HGzkc zEG81ZM9kN+Y541=1|Hwx1;FEy#ek}z4Gt|OW36ZB{Bft70}~OP$qF)h;WbA_U>n

6>3F!)|M3;^vn|aTp~j>tyN@mZ95(sS!yrx#b%~46(iETQqtyuuL&&1qX)JXcA4Ph7`d{Zaz@2 z6{r_KPRidvhe>5*?1Sr14sL$>8?-j>@(EztmabCFvQ^J)tsFA5hEz)E{;iK=7$q`9 zKni%f+d7MnLmhTd9AQBjwAu*b7Ur_4bRnTOvC}%*rp@GzV^~KdvXesb|9A|w?Bte# z+AAWIg)(-9ac15yA1-F=i_kY@aj^8E8fVT`)u#*{Vw%XRm&zcL|9a7iBui2 z{4PtwUot3)UX{?0=C8O-BN7>rz2y?}3kdQHz!dxNJ1!!l|I58bkGL*_I&9#VX+<1> z-O7}*X^Oj=Mf-G?-1Gw0w2wapzf&S3N56W`Wu3n~MUP$TEbeiqJ>0CnQcTxX{3P2< z8sFnK53d#>@_Dy_KTNz2N6>=zhIWV{rQhfFkH*%mKQ=UpE$o3lwnyLPB3HX=rZW!D z9VsAh@2YL*?ca>N?;`jakrB%q{ZFztYYBn$pfKk@o@w>SNDvV>odI z7z*;o-8gRqTnNw+00L#wH_5l3p$C_1N{Q^hJ}Dkt9$;zC-`tVh@%A9$8VDIctU$7} z8_ChgSjXanZT>&~gxk7LsXQr(VXa5Wi_h)a+Ij51f=wB@>lv<}eCQ|K;6w|jCpkaO zZbuGb9^YrDs5Rt)pKxc6uPFm8=@rM1R$I^EXceDCp%W+`4p4I(NC8DEbP;>gd!D0v z(>0|h?M=`6w^Oc&@A)^Jk@$}w$4lIsuGUv*F*F8X=0D&@*HUHiOf3Gd+%(C*fITWQ z*RekZXc&%+kUWW9G|eiG%4s!c;Pm_LQgZE|90$nXqA?zQB)pz%f1Vp0ljyCW(-Xw` zJWQoTMs-@<`NZ?wlgIZC`E|q0!1CZtLs#{V_Ps32cORs?&>&Esmz}r)5<+sPlgXAh zq)QkwhGIE6N6IgA6MHlaqdj@}jjNv`x4f#@fBUD-?ja9;BQn_;`%fCI?OArAQo(q- zY>~y;WVM#7xMq?ipN@BB_G%d{hbJ8z86}Sq*+)Nlac9?`=>q0mwy&6CSIom1n5cSQ z@8{ym!aP!@sAqKOXYk^rGP3WdFB~9cE;-Rz`Wam?{L2nhBrK@uO5UFUA5*~{)%r@Q zB45$eh@=?kxUT@ye~8=J`Nhk0?eZ;KR_tdaTPs$SW}DGiY)xlVEnJz=wmkdau)-1< zIreHd!t0~q9UayG&>nIxgGf+Z1Lu<&w=TJ8c9|mnv@Iok(jG>^$Q38|(CWv4;C3c& z2)A{veudWPU8We~Jib2hI~O1dZ|8kgFbMb5BF~AHV$15{5>qKhp@D|mVpKs=g#!Xwk#D7f?A?FFEEQ4nYwLy;L(Re429EXpx>w!p zm65x*e|w(d6ue5W;3=xFa0M?fR3d3cw-96-WnrRHmt4EjBdu6Cm)qXrbea3NJamQyR*A1VwLUEF30e?0Jj=4 zB|UOQ#h2A;8m&}gzCf<+#_Q7J6Ru(B#qNkxHrA@->U3}_ zPfkyhJck=x84l~lf3v;wU@typ%+FbLK{o95l{0axH#Em@aL38s{>a#fLwex<9WQ-ae!poL=|mf%&fI`aazA5RLM9 zdH3N%%U8o8?dO9l7F#XQ_a*giUAW|}JIg8Z)+Y3cq?pKljR|pc)waE}usH&UwC1w3 z7?q(^tjW5+WdK^Fg^<>bom`k2TbchPC#OgL@L8py_v<5veK|Z@RGCC@ikz*IP zFX{AdivY?vq?KnXn#kh(bg7{-+f$^p9UUhrC3jzVovZWOb~>$QmaoLL5=dq08U>S3 z&P25VrPeg>pG}g$PBdIvOm2DV0$1mmosocS%v{V@Sf-kktE)MCD8i(Pb~j#;7L#L* z0D!i4M_e)t{kmxZ*_VvI`{1RxLI@lw;;7{u4E?xKGRDHtPmuTT#Slnj{P=hFZaxR7 zB3GOiIrR4NA3h6x_QGkA(Y2I7yyp7i8IeO<=}jUw2Ee=t13?l2&%mn09iEcx-yhjO zzNVDCm|HwZ9z54QO8#koP$SxhSJZ0Pxsj2# zX*GI)hc!7rf`}O)Ed!_+Xh%Tdv|?ieh%$h7vHYaiuU5!UMl@dgVWNLL`?v4;Xs_IU zb);{=ziyo$O1hm4mk*fe!7Xyl#e-XkAvkU%Uhtp7NQj|HUkpZY0vtGkY?;%H&k1V*{AMu`Xc*~J%fIzb!&dDTDXMoKK z7&4$3#{7qoZMvDOd1fVb75mTFv)8SZTbYksC zi0qTMQ{|r8LC!vO%C0$lD02G_=aKrrdGDvAFmB{@tlHjKthzOR&wR-&{EXxB$k^~| z3Gsb;O4Zr>G&moAEc-y;pL;uFH~)1W9(`;XNH$_jqJk+#EX+dIqs#fcX+DgRix=c9)FM6p4)2ZXwL+2S)g5JDBAH_Eneio_8*z znpRn}%|^IlMARlpzAG}daaAFaohcv^^qhRk)sDQj>u_Wls6pZ-5-9Df;jkfN4us48 z1-*iP*91Aoiq&DY2w@|K)tz@+BQvrwC8G%?8TD)>lUY<7vyB3I!v=FLEhg9Y2QMU7 zpYvWEZtc11X@V$ydV@tFd4%XD$=o`M7H@q z{`RF9Z}{GsgW=<`CV}@4MC)Rdf@UK`B^rzsaXXC#eQha;_hNa3&D%-N%Ac|uuFcbK zIMQC}hSd}2_?&VSPBEuMqc?}nppb?XoeY*4sC+;HB)$-Gg`b9TtG~hcEBj(EH2Y?{B6kUJgw>Nq=%7M54o1q^KEe(BS=$fG` z2d^G}Mt14YY3qNn@iPO@;mh9W%6GX3&*-|KTPDy6P$~i09Ris^4`mXd^K}o!_3=!bl$im*q10n-!5^$ry6U9|4 z97cdR1KSa>$vb%jXn;Wi^Bd8BCIDtq5O?6<0kFTmvqE7KfpN>?G+WUI_%E<$J%HT< za3$l(>?{akyi}y2+A*NfCghYQ01jVnD-SOYgi@e-$8h8hfM*VXnJqJr7%jQ2GU44M zaHWAQ4SZ)nO#aDGfGzytN92#(`%Q3?!Y@J1ku z3U~IvtHd1=<5O<>!ip3yydJ=QB1{&yKrmy7cIdYXQVIrYR?xwvsN~QCK#sN(ih+nI z#smVh0lvo_#C&K0X%#B6@%^F{v7-R?2CoI40yriGJGHAuc|dFm`bxhNB^Y-^nj#hv zk*2K;Jk}|dQczXI{85x zQ9mfoG1QLQ&7vJvCoiXbD1~93jsY*jiX{;QL$R89=xV?KhqD702+e{$1V%9h&jn5| zv>K?(;DZ?C0gtIwqpKwv4i*96^J14y^F2m*d|yam6VSVuKQQo!j{$l$G-3F|yV|@h z20S$MmLj1>0oDt(LoSM$=@y#>&k1uJz`z&)@E-tc7gnJ$#-ob^NEnxOK<)-BLJW}i zbo43MbRUo43n@@%DNH^^B~AnH8|w)y!N%iKd7A=2!_KK-HZW%RCdOZ!FbH1^D~K+l zD+B;)u>fJeX0_xtJ47i+mMCU1m0)4YB><%iVuPmyDd3Z>0AK~4HTnU4g3J^kS+D2e z<)QsB&bS*5`g7=1%5;J@0up^_J;mDQEh13(-9=yrQ-t9b7NC|-F0MT=-K{WC;*s2o zxL>S8FnxOY@SEcA(wrI$G1zHvL5}Ui%ET*qv6Y5R?7#B*3_W}LQ>j@@bZpS|hQe0z$83mhY zAQLB8xOG@H?TQ^o1!)XNMrlk=8jKD*OmEDwR;zY=RuI$K36(*RG`=2+g8Ov*{tnTO z^U+EOrKTT6mt4ejilqq)7x3F*7eQ~Mr+UxqaI9M=d@|tGvA)K@b^s!h z3@&q_OJ@1*1HvzZ`oapAuSi3v;W2P%1eXDK*WHiz%IZt@?#3j z_WUlM-h{3fl==d53Qh~$8@S7`Ao5+JYXiDb&Wx$-10e&n6Xp^YwzcaFp=Ly&0puI1 z4>W9dvyEjP4KOQr^$TJ*OdY-kP7ikX0Nux81cJAn;xJ;F15pRY2fhQ4kaHGlT^p04 z(x(B%56F4g7+4JT37kS6P_E)&5x3~#%lt_u*vY_;g5y@9tC^v1 zu1K*!z%GHLg2M6R#1AvJn-QcKeGbb!B_S}mDYXaH;noguswVJz21>br6%U6ffR%>P z_9-W~2rtt^LlCo=z!e2I7-|g*WLE7Ee;69Tpur$=1Can_-2wYYNV!3@#tD99qLb8} z!#t*@&y-*{ip>H!1tmVBG&99^6dM^c=CY67J}LZg0;3Lq`5--rf?q^i4K(;oiQ`h< zHvmB|d=n4=gQW+GIwU%Rl-mSzmmWx)4B&e3BX=-a805j}p|;=;0ZRxyx<->>K2@N6 z@nknnh*e|pf{O?C65f(P17McrBRl~CUZ#@_0f~sg2qxg1fTs#u=ZXIo-bGg~d!CP+cJK`DU1B?2IJtmoiZK^V@C$9c*HR1LWG0#+HYv0yO3yaWyR z6t=xAHj6INa7vJz(1HsKKf`MZ=eM0JNGXE@=$^26K_T%TW!7=mw~3zwHxU_xa1Wqk zK-9-N1Qwd&wl3ja%r#I>V8NnJcM?{+0Dc2^bL-DUF;yl^BTPfg2n7D1yY2OzJns(H zW6T6PBS7bce!==dw*`%zrwi};Q4>nhSn4i-%?2S!;rvcfw_wT`tUtho#}bbv4ty`v zvTyyO@G@}OX*Md|^)kedhO9hP7(Ckd`+*;Jn?SmE;!o%N%l5fs&m-X9O{cv1MFyiKnd6b1?o8XfwI78rd`| zl@VY6>?P!X^`I4gt%{36q)h_jS&YK1t6bJd*q{x=NpEVaI#PZLhh2plj-6MF$kFRR z$X{6Q=sZ=!u_Bs-TPg9nQR^_2O0eXaT(HV!w?-*JE{-+KO zwgQyZ9BdJCO4mf!1){$TBXIHiBAdq7d;l~HXFAE}-*?KJh5qYs>EgWu*sEe%l{%^_ z#uVioTU6VkhDu36e`11s?>bxtOJyC|U21x9`2NWMXY5VD+o-Pg@hFZR#~3ehY-e#c zLL4>+&5Tx-5Lxn~U9x3KGcrlE%aZp^wparNTA(bYa7kz>VJTfH`Bt6 zwsZl0G$~M8wnAx3+mFKky)&{CO=RfPr+u0^*H<(5o_p@S=e*}V4iq}w17g#Bw8<3l zMA*2^+h^m#!!{2f3$%~lUjYZSLX`K(KKupvWWV6qQ%b#kQf#(Rq2_e$iuKwt5Gra#5Sn$9)5A+ zzYE^c87iNfA=owCtWKdhdZ=TCSnzJtH|~rHb=<%8-jiSB2m8xcW-*7gOSBC6UR+l>7{kptVZg@ z@yyu8Thlnme>X}91(huq7A^U-?D>*2RYIkwVxs)ss#5?tTMJa1^RX#JUt~Puv?J9w zq|xZS*4&sSrYGS?f^~$sHCT6Yfds?}K;u7nrMF4^>a9RS)J$l`>_(O|^|zXx?djnz za*zgF%1N;HMA2^7SAec5MIus)!0-Yfg&`N5!$@e8qBf}YpaJ0I zI0rE($qU+%LnAZ!LJQS*pwBgv=uyUT8-?NY1UoTmZ6DRQ`dhVqQhbZNaywp4DU*}7 zUU_{>^YVi$By4;yq#*~z2 zX~!*i6NQL`+rF1i9y@po-UOQfi0kv4fYOxY%}nrtB4&mh{^z>$#fKgM24s0^QI)#v z59NzSea+j2+2u}QauY3mHO4!LuJCS#Pl+OrQ6sFV@ZCI@)Y zm}nrMRz%9g|J#S1uhyQ{kGFAwq;D$OIUMaD2+KVT+=EkrLI&viWtcjej`6?uQ04SI zc8u*j8?d%ca6W$^owTasfl)>t_=moOfmg`L?k$lm31z=$@gx@Uk+Dc4ydWjcYt> zaQc1PZU(fxbj{Y@kIob_vi}t=?JT-V9KJtDlUZjF(95rr%y4Ji$xcRD+o;;pIvJMM zem&WKABI^eBZn`)u9;lk1+xFU?vs}=2Unc0Y7%BZb)7#| zCACv+4ChP4eLj7_G-)ThkK)s>ITTz`tq>8W<5lT2v{rok5Cva(W+-{LtYN-UPijIl z8PCSXjd5lWWey}|wTsXXg^Z|Pw%}M}Y*<2uJ3=eOZ;Nzty)%@?Tedek8%Syy^%&?S z?b&HQlcAk8*C-#8{oi{N*y*ofE`I$8=3*d(! zHy*+{uTX^a(4XZQkPbeF3Iv}#6l|x8whSL8E1D1=VY(QtO*b_<*grA_teF&N{onl< zC54RaKl&c{sKql%$*yZsE5tMZ2TIbUojD2bCC9Z#JG)cdNH^Ge46d<>VdSmSnC*u% zc&|bc+5e(X!iKLDJ+r~HRBLrJlwDr#WqM>Z7iXf097rJ5i5Lz_(!}K+ht4Wx0A>zs z7N2+=pG8V*?488@Lhz*8pw(wJF>Kmn)VKC`j2Jnx{zbgVWelZyRPcK@pBP7m%bFNY?R8%4!~1|I?gnh z0uKvr@c^Lw0_rZl6s%cMtOdX?L#QMFinErS`EsyzfuFkKWqkjXOXKU{rUTP1Z_d=F zOUB9e=g_tN6&!*UGP3)Vx97fp-K)VsBOEAdcq^%^9X>f1jdCEL$Vp!gsjVz?{BfjM zTQcJ4;yyRERRW;V(-}`Wj$SA^W67r~z9LuYF25J2vj-`Q`%LZp>1=31r)>{(wAsU~ zzzlZDm$s9h#%wAj`#(N=GpYGGzgp~nni^>D4CR)WEmW2tbuf(89Bu6jW}GRDbcbwM zr#I@3%VRPtT9Mr!zAWWJtQD94oUUf)%rSQP?(EpmsJSa=1v6@DD3X?6?Ds##iz!6d zUw?t+ylmGh@%(4#i+N^_5zJ@$Tthz2Gn#2PTRO*v0twnrbB*#bieU|GA@75jh`jM^ z@MGEXl{^OoPS?yaGXF4mJkxAzUpATxB;6ytMt-TEyoHxi$Ov=tw3NrPM%?_iye}@F zA1$vpI&EVot=*Hc)r^)Y^RK$0a*-wIXHA)$*PFu5h@DrT*)?I0zS%XgG z{ENge9BQ1_lC%%GxsFK}N5ZcG*sOR=_HpM)$n=K$55E>vk%RvXZYKYFJ-BwQeP;E1 zU%8ySHL7uR`xEx?fH`7`$T#-RH(&)6GGgK{ma=Hpko(_&YDpdb{Ez6+J+lfO%GoC4 z?yx_LBbRQ_;mwVW#^Ar8E`Zf%KpsS78QJhjTue z;>LRKJLt8Tv8G;()#AV3fpXMpli@LeH6}m;Z*H|ur}QNH9)?TtnC!oJ!?7|EHRQ7K zFPuXvKMl+!XZ|I)el2E!k{-(GDhakd3Z{EYFwv=2YX&mpeRPcBW64f?U#7DYL`%PhreFH^;EEGPBUfr2;(LFmAo}rPyT`^kT1Sm`k0)$u zmG;yIlKKc2FQp8*D5v4Je2uVDeCng%`Kq^H-g_*=p8l(-|AXTO)lFK}}N6 zFl7C|g3YxjJQn@`!X#SZ8?`R>nH+Q)|rKLvG)6ba={!Y!?Gxf9p+rZB?O! zcwc<;4DrYdjn}J4bTQxC2xvPT_6T4AM1mM0_0YqguAzV5NZwt{SFb460=x?izy`i@ zW)0a5zf3$=L#D5QLRURYV5Nfc{U^egrzE;45{9ucqUHqzyufZv>SQDIdNB$e<4_}7N>OCvxGnrXh zvKfI(gt`!#M>x3+VKb|i_{;gtjmWVsCKYcke;=2y^%Z>iiy_B3>#aBoeO9Wz23mMhZ5$pu=29@ODQO5e+47@imI44L^XRU57kNV?kzGAs* zQPrBozpp&MBCzB~<A zV^AMY=wVhgBZqeH$$Q~%uH~s0e&!ghRdM|$C)e@Iizzs{>z)lO$O}(ySwfzFZOeJ$ zx9j-Ts#-u0lEbV+?;B01y9OrUH~rNLzPVcQn1r9cB+oElt>=-x1SYKfzQYAgX&qzt z^t5#jwK`kJWAwwCYm|@4&HWF-1GJ4t4iyIGjQPKxZtwGiIg@!X+BRk}Cevj9UcQce zV=G@uo@u~RRY;G1(|CcnrIE+36|2!*9t9V>U zg_&ctQ;M}Ux9+Z8&DR!PcQQ-RpH|}wn!+=ivCGM6P<<&=ro+vrMr_*7sljxDbT#2E zPI#*N-8!fE>n3bHU)9%_NX(H(O0>uo*|Tx}DyW$KIVC|cX6^CG%8F)^lH{+2{!{qg zB6IrWDGSVL9u57#sl2cf@jT#O5Szn-rjP@d1=I58}gFL1wn8M*Wf{^W)MU>nm2YQn;~5K*N@1ZX9)?+kuReNh>T4_h4M z^fUQ|GGeYclfPG~!jgh_oW(aN1fuFa`q}HY@`05U%LO|JzzcSYmLFc)pt_9akSC?nJV?v(r}@D# z-ZrEOOgh-spv!D=P>(w1t-S}klR^eI6x&oOWwcojFZH_aMVJ?Q#!lA1hUiCRj+SBK&T?{+Z%n`-fVM z5Y1UR-E>9;&O9AzH_o#B23D2*mpm{cN1kv;BU{u*K#C`8amv z=4!=bnRguQ1(JuVQbmT&;WxlgQPMe?Z^bd;?T#_AVegRJ+UB1y_ml6QgRf9NhMsTR zCayb|=T$Y+>_Cs%WHj^#yUgx>gPvS-9)4Nzl+^xiqvX;;MD)QRzl1E^#;?goH1i2< zjewyxY7M)U(dyO4<2?d} zeYJ@&gMWqWsl3O#m9=1Jh=p zhjLj0*I}I^r?g?k6qk~kZi9n-yKTYcySN>uOF74J@<=KQ~9t@9n#JI_zS~Hq3adsXqWWHe?t3RF~*{o)2e>FwXgHW7uhtTL^C@prgQq0TX}}J_+MYQ;+!iQ}vvVF&?+y7i&#+zx7N$AM?KW zg6jK89O~9nS6gFO*1OP-tdf`AjP5~5X z26#7Ml+rjM{fMsyg?q6ka4@GnC(j1Dd`X(8yo4aRv+#f-0vJl6dw^#GKS+6Cv1W@) z=~7|H_7C+m^=Lsg-ksrT2G-ehx}{*dI+eAIX>t~>)#%kbIy>cU42b5MniE9f0}m!d zPh$&UL2C!;Een80pc1hmy8v>-H3k147*%;I+@#U71^Qd0G1*=5(&uyWOX^E^=DtN$ zr($3Jeo069^QykG4@)=E2q`UQFU)|oF2AEru~BtSV-9rcz2iM;hKZA-KgFf*OJ1B` z6*81^2yYkv?8ObDDL7-8M*}I;TV4Ys)lK*I!sQ`pKFzsYEk2DBtEkUCLm2|)kewsa zK9FPV30t>%#5j;}$w&CNzsQ5^L@C<+i4}Yge~zvY?O);%+YZj0JCDMdvd2x+Uf#@@ zM<@D+5&4ro=+ppi0fizO_|uX1pKU%#yehy0Risd6S;rgJYe6-A+(I%dnn^k@r%pzA zdS1wy(&ik?@QG0-uC?gR2J&+Owodt2Cc(YwO8?42AI4+E)yuDiHz9%uRbh=a)~GwDH~{KgR_IS$%LUVTv$h;{+7vx1&%Tg^U~uSIs4o zKQPWyPSQQ#7tD90(6TuVynML02I|BkH)(gPNMMwAk^hWi{maN%q(adgoE)I47J$Tk zJyZ0BHrE%G0w%WsH;zhA4f*!Og3DhuiCxUS=Ulw1Of`)XTz##KKi%eVc6W{P<0$@2 zzxk(=d~Jd&}n!I8M)A{au) z9z6`9oOfQhlI9kf?P9*B*di0}s@#4Vw)IQ-KqKA}C|8R8jv?ntg4(8m`08qfjO;)BdLFWL(KRrnYh5#x^HD~K zgkuBgA$D}6JDZMaj7D4jg`VDv;Zevy{Pp$I$oq#g_2Q{_;C z-svbm;_mYeNOrw}R}b z{`-3B>oU$zQcl^=JnGdt%&7jQb*2oqX%k9(M{a;+Rz4=-tGp73cI9nf1S50xjr>Qz z8>v#IYbtInd$;_FDoe@vl?fSd1eV*GHvE7b)eP8NeL2Q9*fHd2n+8D*C0*s~H-P8~ zIq7F@IAx+QhP%xvW<@)qvI2r4A=$e3P`wal?DJYWVdxxAv5^edpW+Rj1LG;O{c-5U zp0DAL)HP#8 zM=~D7rFS@7OxC0x@_KCM3Aogyj_$je2kld#jNE+r9RTO3c0kd;0^b`VzQb)c zwoY}%$k1Ile=8mn??>vnomRM;ci(m&-5+Uc3}}3m$uH!_Kfx@Vdmmr5qF591elv#R zzqu_@=YH#)bKixGG~_t2$lG9DAQ(Y{GVDFP^WXm#zw#8L{mY88EQ9qQLPHuOf(4>8As?4nL4&K?GWDeqEd0+xzEGlKm8qkc_Z>`+yR=Ej3nz^ zKfUE5ZwST=liUElZXA7-Ey(ZF>sqlVhOsApci}zpyEq+m?}2s6M~ak-F~3k>xf?&B zl!-TQzoi?o;ww}Uvj1Mbi}XK$Pjw;JDNWM42YCBeg|g)rEvg)< zxU>A35@*@pOE;=6sxs5vHmV}M`}vb=b&eF9Wir{JfnchWbuj=|1KUMz+z=*J-`&q!D7)f3KF(x`qvm~tdQd9z^;Lxu!X#TIlI}HPQl!SzGb3?O zN_!FOHu@*IjuEZfrPh1KhZ54uY=nPJtvTL6E8CHM7q>Q(yWRkQ;g27JQ?WME?{-?b z0e?2;5X?CnDo{yZrF{h3nnFhF7v_d}!TQ()# z-pR{9#ONqxW5~|Lu_(J)E zC7RNuWiM9-pg=%{ul3LL;5TFn$fzB4$5^Dok0o>+5z{C~zW6LGpyDyvcUKE$|4>(> z_|IqMgBp)6(T*@ByJbRP^{P;#c*WD`7YAC(4w?VNfHjyNop5ARu6TTCFiN{^t{NaGQ+m5PQt~@`qgTk__5Y!S z-)In{zk_yRxcu|O#mA$;QO-U%(J|r8I{e+7JmNq58Aeh#M6F`gQ)C? zRt+zzvXs`9y;XT_$#&In#l7V}5;tz&$RlCvFke|aI;^#7HR>Ff9MRf6Q5*~JKTMB> zipON*m;QOKxbhct7Thyoyq>I8v5DM7fHCBz#_iUAHjzoo2ej*ci6yL*k;5x>6560q z{PQnqN8K}&3Nc?oCp7}b zQ0?@!I=OzAPTe-#Kkk@J6a9Nwg2}?iWdE}*PVuq#_znpl6UCp)G0uR^InlweV?O=p zxP3Zo36r0^gmG3rCWj|%PO;-<8fw+efS@z)1?fk@bsJ|Hux5h&;lT+<{s!>)D^LT4 zjMTmX+F!7RHj0-Ug=!T!?N$Et+K4eQ9%TbvUFxv8Z`@`z%FAxzRV+J&49EtpgvMJ* zcAWbj2)2ID|GiFi(xR%SO1gn8cl%6H|8A{tF$EXx%I{B#AK;C{Grd=VE&U^G) zx=OUZL2o;unSS&mL+HGdJ=0dsVd>+zXhxGp{APQVP){tSLT!ywMpV;*3&eX%1q9ZG znPbFk5#M;&%;x&1JG}m6e7ZeGKKcV@T=AHM55JWUx%IzBjc#xzGw*W}!hO+6d)68V zP76-mSU>rnKf;(4J_UyE+s&vswPUS##+$sAzC+*q`Mf*qMXG3Ro$pm<95?X{!s>^q3Y=L24@MJGQ{S-<$36_=K8ExUD* zOJ*(8(W5*rboryaa_psfX&^8C6(=pFOx*wAW>A&=;BT_mtYf|t#SCC#`rlt*V&>vw zf92ielfU6Y0B1RzWjLaDAn6zZE&yq$t4K@rqmdZ@jtfDtCgkYkzW??@P`}4Emk^3s~~lKctXaF)4M;=Hcb0j}|#inqZLkw48V76;Z0{h4-j!-Ikeyl>n=h(hY?Lx`sMdLb_@+ugjCshzvF#j}nTVKmb|7uZ z#(JTSL`#GfCyMraJ=?{nO9a%UHO!1-Uy!ffW`nzrW1WLx&~ECdlBl`ciY~^t2}oor z6p{V!EI#oBdV%o4x-0n^nwY#yf+Jem-R=P67(}%aQ0%8b!yMHLiI>zC4GjVY@id4{nzipXNTU96`HP3u`%Wabvm6L1iJ&BEb*3LXlE<%Itm%t{VI~Hq*Al1PZAJ| zFxj;HC}SL%Ob&J#M{<*4a%H7}Ouxd%s)W;P$0MnU zG1k?_yLzIN9c(|aSye)Fjq-6Gn^h$sJI^WG!TVqb&nmlRk#h+u+~#pg-SZ|)sTO&a zxw58+%82{lr*<&7T-u&GI5D1M|57fA-)CK|r=EI31`{0@rJpH!OO}8)s6> zldG>6YEYD=SQAilWS+ZT|sTs2LjrrIPgD)}|Hzf33 z@;hFra7|1gvm9S#tEp<#pty5n&1WS-VgRHtrMKI4!u%yYe$~e#e3{ za$5&x#9?Xe(sRLXlq%tj5p5zV4@Yk&hC?AkChqU&00gW}pv8^hz5|oA3v_i7on8lx zp7Yak7mwJ4<*374tO-$>e}zI~Z`XM~59|S6>plLt0dWCsgM=>z?lk~o5U~gE3pVa) zY9$(o+aXjn6mLRMJtaRLPdFAFkCjf0hhh(z+h2}27ua9&r(7f(G!eGD^B1w1Uk^(DPx`8S5b53_};TF(c za?{h+wc%se_38Q~HpK9BU%|AUb@G!6`1j zP?)>=s)iPoA5aaI)|dUMq_yho%3T#V(jY(phRHok6Vqj1nMs!$G_o1McjG-wa1ek) zIt`DdF%1e4IsBa;<78dmiLzz1?(n*dZ~@#}v&VA5$K2*YH|x@l8waOtDZ!jV*ca#G z?QxhJLAyQCim=8tZ#YrhK4d6+a1#k1jchiE~FkvoAn!5s?`b+*>`~7 zE_U`|{GsdR^W*R4_#tpz4t1ODfhh#t^Yd7n#Ahi)sG7#+0}10vIsxuk$^jscj@LBO zr)Eu@*4LL6CL=@g=v>#2ZWJPd#M5Jx42|Nu{Zvz(v!Er&SKFHObA353qv`XFJKMP) zn_eEBotI*C6f&~$8ND1JAV0cP_>>$eUv>%^5`^rfris0aCXSdeN_okE(TxZ5~qE9T$Q(-!a#vppT2z);rS zF+Rn~Z#fXf$yFgE8<(k3_&X}BlImrhLf(rB>+>e=qD4@-aK(+~KPr2-bajbMb&(u_ zYQnp(n16THo8@|R&JHdW<=qKDW9TZ`b%Rh>RVX2~>=4{p9h=IC=XanX`0)+GHmqF7 ztdv75T@eGC=((i}uxnPz2$wpyXEa?7 zt|Oc3@%Mx^JxJlf4P=wvuvNz}jP7_!E=5a}3x4n{a>Nv0e!qEI$ScR$Zz1((ASbM8 zvdvauP~?nW&M?rCOARO8Y;xGAZPUtwGLsW(stQG9e>(sJH2yo3M2D`eDDD@P^C+ZWHN!pWD;Yp@%LrOMHYd&+-} zN@!IjTU2g}FVU+=^*-U`>Q3_{8+3&E$kce;AD<-N+l5tY818saPC*lJa=g?`qhPDV zJNF6jFGpwB;H~94Xa-Xz;pJkJ2G6LL4H&{a8*JH^U_2EfvhkYeX7cO(mwx=fJY&|-XW1_~~Mf!RkNuKR#OQkeUkAFZrF*!8O zB+14{pqFdzfnF+PGs}NODpK+MH@O+iEjwV!8gTCPwzn;BWtRFaA~` zBc_j*NJ*q?ME*Wpa@Gp7NF>j{gF^r1wb5L3S;#47+WYBk&pCT4-6Ev$T}RRqHF|^?D60RN)`6apTeXoL||+2f&zqs9xcz{+S1fJy9sYnE$wC*Z6=mtI*jTrM&Iu8 z_(=E@n6L-G1#6@bk$pFvCk3vm#O2=>z+)lIB9}9twKb_7O;57g@qtKdz&~ohJ3=T^O1OAbAEruu)ZPBS2j*Uh1#%Nrf?^@3>TQxwAjC{JTNvA_8HT8UVEM95;ALKXaTZg_i zaW0l%b()rNRD;(JbBPuM@J20|Lakb_59?VRaOBrU4#-we3>t~*?q}Do`K-!Zgy*K9TFxH}Gipj!LcZ!V&9>CJIA zh(`?J7JWQ!Xwd+D)q;Xtv6e(M9@c5Nuu-iu&c8Xc)ySawr72wY*>C>Dy@Tjnvy+J# z;$Z_9ZHa3W+7?Yb7HctRVwx76Hm+4CI5iUs&(Ee2!-5@;96BPdJx#;1I>Y=hvz%Hp z|Br!ie_yn3XkrX{vqjPy`b!C&HfGes!Ywh4fx#H5*_KEc)6B48{GcY9V8f9)y)o*y zY8egK{f>%j*L=n=kx%X$!~}3VHPDW*L2GQ$>Yy(gHeqZDC)BYPty&X{acmer!p(Qi zZsoK(a_Hd8YsvpRA}(#7)5C%u>_IW5J+Y-PyNTRvPT{n9C)^Gi)voRS|db|)K;Gbm0QYl%dn zI_RsO!T&QFS_~``VWM%PIueKzLFiUiDk$A&~fYR*e5kzv3`C%#|&(O zNnj=5t?@%qtn5f4OjQ{_U`Rxvy7Ql7P;W){I@!2)=Vz|xe}9M03bQj})Ei(8)L0B^ z*b6N27NbF{YhfZfeO%2Y!g>x~E!kA)bz6;k4cUD!mK^LVmi+u+F~;N8^Pca@eTNg; z7~T_;9g9G5qfrb^T&-=1vIZ_5W5UQpoLh1_y%y@kklJY3`sRhZJ~lk7uOK5`#w{B4 z&TuTOLw#Li3#X1@VI#Y-#Tbvl*kO5ax_AV?IQIpRZPgl#cQE@@Ysp^(W7(#;4*;rh z{$u8UL?W%elbYJS)V{Vz^FfVZoJ09r9m8R{8(;(@oW3PujAB06FlJqs2y@27+;V5Q zts27}rUupL7{LqfrmJ1MQy-3mS%Z#iQHRwLm=b(WSk1;;VrsQsql+6^BR8j1Nci1q z)M`-%mzol7!2&NZx8(QeT#L@R1WZ#b3R9vspz{RO))+Bh-VJ&!tB=NY?7YV6)woZx zoU}2()GXZj{BZ4FbHy3+tC0R$II7kgbeeDr;J9=zin1-?SVY&N*Q*))0|Aa0Os}L{ z*n+m|b>N=52fFncKStKWC~9D;jByQTh(y#a*b}fMG;s!ctJh$!V4`7sSVAA2x43E! zd&M_Q4U1Ll=ooR_%noy3ME8! zCXgRe=IQF6(<8rk7OXn?5JP`(O3*NdG5_GSuEQ{Gqr<#{+;IpFV1o+{Hx{PYp+saz`tk#;_@5NNM-yV`*bg)3AVJ_6%HQ4K(a~iu$>Ovs>mNfflbV!L+w_Kypi17Lz|SsL^UoI?u?IgO<)eKmc!pCwY(+v-=DJPGA7+5~GHgj13rej22?|`*bpy=rvlY3P)Gyiqny)pm>bB?|0vY1DAs_eO7`U= z*yp{upq;z*O@ZdbkId)9D`rfZ%m%XKPq?}(L`WO4J`C8&Td;5zCmc|yX@d$3<-IRXye*{$=&r7dU|##rBkNn;*!^$+PJn@~s09|?6eN*Q66YFgx= z*vQu`6*MYojFh+d=ki@(!2nq#&F{mMbw zNG#Dm!AztFQJ%-o==yO^qZV}4zl7=qA7iE>{uyI{EJ#X_pAn%PY&sI2Apiv zXBxI=Jwrxk(m-8N_2lh}P;FJAh#cM<#J-T{YA+QXCxs}wf0n^J$;LPn4Ug-XR9mOf zl%AY$wMFQ+){(D$h}}UUBOl}>YV+15Ga$SI9M+Q2r zu0*Fz?(4wE=u06YAN;!MRDw*X2D0wm)6O9+fAi-V4mW=yoK@rK^7tpX!KtJn(C&y? zbmZVSv1Lub$5gElk&VB6P0pYsU%qz}+{&K{|5$$KqKet_KUK9=Uaz{d)UvdpWR&XM z)zCT5EK>aQqZsE>wlp`wy1dh)3HumwoUl6U$wX_{Wsm!z?tAi9VCyy9}D!q@4vX$5qBvMi6t3 zbhwSg+&RnlC3 zx2mhsT9K^+XbC(}lDg3}dU?@i+G3G*&e`pb_%vxV<;{@PWLrI6SSbUB=*Ga{7K3ZTO*D((tcdCX7nR3zeG=zadVl@v?mtJPCG_Z~OGOev?cc-b5iHs%M_fCpbM@M{Q|j zmNE*+028O+X=NCfwxg#f7aItBV#KgD)Lf%{Ob(y+ic_538nS^dx)kw;N?nCpRk~!R zd~ES6Ww%n-#k=G`8$u`7_)r$hukV{orgZLZy*eo!w$>D!ZVQ{BMoU~u4_qZ)w-Nor z*?uh3zLSY|rZt{+Yo^CP&^|E~As?KA*Hbpc-s)0n~sq$orbYcJ|;Imd$vP7>GTlF!|a-E z$4qBexnXSRthy|L!PFtJ=yu2LE)U`XO_IgVk`?qbUJmSnhU+G zLcrCULlszBQVwMUQLoPeoGmI?%D->ahN|m}HUWC(bKupw&_1Nb$57c8W%_)G8={n> zFkl7y75E*Ybd8%h+|Z6)I*PU>m(Tol3&oo^6O%r)5UhHyK17fFsQr`2n-}U%Uai)1 zS}g(^$9~aV*i2Hf{0(1sPKa*=vR10Qig+vV__UZZ(6&jntfRB%glbn5YXM@g^`8wq zMNj{=1tHAdlh@X(^V1r2)x$b0s-P$Ti37ph%;q8zT1QyRsCuluG|;4uu< ztaPOjeeS@hT2M?8CF~LC#XNe!7Q8LA8H_qbq+ry^Y!M&Kl_TQ(@dcq}r1apOaeXKv|8`8M-DE?v~H}4LCM5zl~g+fMd-ej1I{M$o>uGR zU)UAIAQXy7?Nxnq1lSrO1bSH1Cj~tls;pAVL3$%ajbqHT+{0r+s0Nt(6Pw_|JoDL@ zd)!FL>fTUA;{ed>=#;1Ea@1uN!G?O3qF1S9|To|JH zAOLda*Qa8SkhcyHnIYYN_mU|v9v<>32!=8!|RCOGSvcjpxS~2ZuBHVH_DXWYy_?RV z*Ti3uGaR9{aNN1(&l82~Xl{v3JBlwcz*D+w$j9fMe}TBl89E6Y_Oe5Z$`{EVxY8HP z&s_G@lJgdKF7lI&yS{b7rop`^b9wd7RV|zAkOY)N(Q8`o28`;oZg>)fj=f-1KNMO? z-Wm;6tti%lgzMjh`Tj}orK(NCdrv}dVccQr1k`kQ!riq{AgW#s17yVJLe5R~d&}m=mQFc80Jb6voR(mM zL&`9KTHp`DW>im{7gJMNtOeP>p;Aq@Z#t)mJaO@YrgG&ap}UJOEOO)$+}M?i30Yy3 z>E_|fLS2;Vx*0?_UoZbTSTrvy-CXt$Y6>aUwQH8rgUDB%}W^Z>;6~ws?ja&klQff~|f#8 z{p_fa@Wh6kW1T%Q`p0!--`8O3lrmELjNvpQ@wF}aI`uxdW`pxCmY%p_xJ$1dOBt96 zlxj=K-?H`^3`3!a)W+LTu!xf4U2+W_hJ;!V>P(B@6PXToj|#@H^rss+fLjU-pRyft z$9hjAHFxk0qUTF=Ot@J;UPt!4rS(ZyAnf5L9D#T?+0M#4@157VS~TZ)fVtr!I&e><>>@&u0oN_nj^VpJ$!hTcmtunH_t3kr}?g| zDZamh)nqx_#PH-Wr=^?GmYNfuhDB70oO7p^i7UT?e&CF_aDI7o>S9wGZhSbxFt#?qbhGRB@j$~i4yUo#-)3D*T9>-vx5CQj%G*H*x zg1t>4llX3k`b)#B#W!!EV`QJ*fiaT%Nso5AhnX)iJ}%$q_+4x7Fzr(1|6-wy#d zsGp@IC$hV3)McF1b2-%1X?3dA{xLevb!6gBc&`*9a`cs2%Ez=yyj*`t1!^x+_u=c` zfV=IwMXKvc*{b%Eol8q9$ABq+k!l)p1U<9y`4`qqOs6uMgf*TX@8Oaz1N@dyv<*hB zMqjYX6z#|d|8~LIHD6Ux{ax813i^_~|BcVI3T}3wtF3QfM8_xWDS1~s>;6zpjZy}* z;nGu42Q<`6{Y{jwLpGvXwZ|HaCY?i5@y?0P5os{%$j9G;;ueZP)p$hm7q1pC{I+a@ z`p}E)nhk6FyEs`!FR65jlF+#c<5dIgG_e@55IibD*ETk+jyQ zVw^S{8FKc!oI$6}tCRbRK2Epb0uf4{pA9Xk-3g|!$3p;@BX0y`D0y@_?#P+sz>t0* z9klDBTte>V!F|-i7m7$N4}YB6iX@c5r}^dgSKS@Tr#5i+gf_qh4U(38?nolWra8vq zQoH?zu&oQIS9;9WhKi(6{CwnZr554MUljv0@9gf;P9X(ti zt7rAYZ6kw|8LA-2#e4uORVkY>hMSl0lZR58(wAPszS(Z+3_eKLkTw+dVxoo?%#%N!RY|*R1o)nT*19J%$?yjO8F*lalrhd3y#ltlp-xrlScy+n=Dn-(0PDOm=h6 zTIe6jZgx^EY12gOI}lZhi?=lMIC+Yh{Za}Xo&h%obxaG zBve&ZC_;?k|4BxV!07#%9P#ZqjlBM82noNTS(@-GGatDFxnRF$D4Fg`40?JT&NLZO z_12N5Co$X#89C}bSxtu9&TW<7%+{~mj(}C<@*z9UY zVaXS;x<391R+mCXn6)__xqRaVCyBjJVeXpvS)>u?vFVfjb}l~V?3oI7_)_4(zOWvlF;NdEnKbvlCt*c#gV=6%Y4a`#r=0p2Kana{Q2of_%t{(Ue)JNY+(nxZ)rTK7eim6NM&mZJ<`rCFov3pGa315f z;HI79vrbf%a{0W|lA+kB(;w#$Db`d}J-rm@nhn?XmXqpN;g18k25K1{_sWu$D_)V^jf((3YhI5cJ%@NlDJo!nHrt<%Ml z^>5(f``bTY02Lw<_I_o~mHYkILzEAHZ{vJF3IjD~ye>JifbkNKJhGd7OEG$`dv73-FuNkn8%PR zjB?&!Z-5IBbT-FUzgf{vGT!+W`tV=ix}fak<#$(|Qn9=2xsuIG{#DsUcVQ3ip2k_4 z|1a;t;}-SE2TYOqV+uAu{l>Qjox#M^QHS!DQ`9kt@?AL44X)_b4?uP3`E#-=&7 zi@{R%#I2z0HSkD80r&o*6ELbV>Ck(}kmKJ-%1`R5OsE<#|RWy?pzD%|f`4@cO zP0j<9#6d=DPTNNW8*3YCYi-LJ*)VQ?*xt!aKMO5chpe09XIs${vBGKif_~{=E#B}E z?xkxS2bSP-D?8*E2@=}{pVS>iAzrE#h1<^LX|%<^!TT; z{Y{Pt^n78gIpAr6nay z*>A*+!*6T@D)d0vyz@VkaCddQ$C9tUN&IbP zFTDS*0}?@j9Dwh12%W~%xWhH=F%3jAbm2Ew#R{Gh=FO)34g57#FW8hL2AjqT3fB=! z(vVI}pcJX4q_??7`Izj!bMQ2o9)G5!mwL_)P{IXSJ&_PPIH*zk1}2d|IHl7>$nNuc zo2wO%$pI)UMTOat16U%a_HnO z)FA;}(z4zT)#_!KcKPbt-D$BgncQS22Ex!DNRpMM7=^;8c9Uf_sGcH9#U1)+XlDt7rcAdr;6t+S;b3pwX-4EOA#>um^;*0=w#Ik^ zjVho>+&5PAf{{M$M0H10sYQ$wEOJ>;%Y&l|P+!_D`Q?h<<@H6Iklicq03q$;iHoFT zMES;3=Jr%-jvMEJ74vpH*O%(*X0vQ6Yw8=jlk* z)Y}ELH_rjeG$MN{Cm1cSW(Jef37u=YGscC<{&S#Y_cFb;)e0Hee;)O&eHdOVma)`A z1YE<`b~e@48a8*toWohvaif1b#o=!iG8qkc%%%1lt`{yf=Ybm7DA~yubH|a{Z|j>J z&FXEL;Xb)9hqf1hngS8oe*oYl30(SpE%v81Rr4RCYa0%_S^dP+fI5@Q*pcHPz0ik- zUKAHl$f%QQo7iRS1zfOt-cp+4ZKKBEByX5X@vRZBLGEC^9&b@7A}S-iBNEo~GChp; z8i@x)nxLM506HT_e9)%t@>$$Ij&`!;42;i&Tm72g_cq z^jBO}x~%HV5-mNMxo|SGAD~3l_#$W0ZpJg!48flSa$>^ys}8UpdG#6iH?*qqS|AjA%^o&>D1bba8Z{v7H~0e zaE%SK8kAw&8OWGMQyfN=n&mrw1M9fmQSBXp1MKtr{U0k4y*CL37@kcebG$ zg$Q^~khn{U|M$1i^-VvO)$}=(_xg%a%beO`ZebO33%4 zALNDyxVBVBaAeAbx|QUGVDAcYyBFOkL}Xw1|0nD_z$B}xb-OxuPlxHrnHiva1`w!| zDu4r1Ipec>RI4D%_Eyj}ELbHa>#DGWgv=5fdW9=W)`{SCbR=Um%=ayIB_ zS4ClC3O5+k!Zp%K;oEEuK&1`yxCfpu9PXC`{CBah9XP4fTy!&MwzX-kj4CFJa(+U$ zaYuaky2G5uZn8p@fhN|!-G>FfeUKz2`RvGCXyN?nFV4Pm@)wfNPP}gHbFRy8#_GRl z?OcpgH_%BQpC-u?)o!xl>*n+_i#XNIBBpwX2fO)-l^br3j&oltt^x{durZbRjY+Y_ z=g+AI9cBT`-=dOqH(+Orjc72=edY=Xqp)29K(y!7Yp;^zkwM?Pp zgvx~#2Q9&3(uY_a%2g=)e`9el*u8vGx~v*1nIXC@KZ=iNjQ*miX0~O}!4Qu-F1ZVf z?c}9cE5ol6$J)xt`9ZZSbDZ>a+=^za8Bp1Q2gd6xO==aFr>F9`D08cLEp|r=x^EXR zXfq?Vkp=VY6EnL;YGc0{B_=*P_r9sic^_|xmo+}&NRYK|C{SPtCjjEAR>qGgV(#h| zZ&MAC`GAC#JO8J3LM+BRt9$p*Yb5$n4y2;cve?s9rBVzuGZk~t$!)2xE-wyIxuri( zEOYt#34`pt4fG;kL(yMRP<1K7-;5P$gVAjXhU9VXTMZnpPNi~J-Sd^@{#ngci729` z7KBT&Mqw<1xHruS+E02$@j#lwb!({FO0uk$9tgebe`lA{~BU?jF&ucFo zyc3&|b>bQgSt4xqa9f|_lDAN3-O=XP@ zTV0(+ZMVan)q@*fLmiZLdurp^6Wnc`)t7~3b6^MkpWj&6X`~xxwKw z=7<6+`LMjES=l&D?O*t^M!NquU2*-3>Y9yDHI9-ZdMjy-Ehn!!;<3O z@#fX#EvMu5Kl8rd3ZCc5vnn^8hmbUO5R#U4b!=T94tnk!qP7Y6v;mjpqq#S}Wpx?H zozrk}+-V-{U;oHzS;ASbSw#)+0$l9?Fvow0R`sU=M#Y2!CT`;guzOy84SxzfT?_8% za~B6ea&ML#IOpVe0(wMBqk^c`U*JPs5k=16ELPx_K7a+?cB>=V2aT;}&j zJ`+n&7*b=@ETwXmpe|`?C@GVIyXO`-n1;wG#mT!qt+EMj{?-#q^!(efxa4aJ^d%^b zJf)GT$wZzvTLb>4o8?}-34INbImvHcImCHxK5>|=--2!~TDu6{2zuEY&6K=EG*6N- zYcZUYv)t7jx)~xP9q)rUzum=-bMD<{@t8Y)Bl=RV@!5ug_c>}Tmh5CUC~dl{`leo= z=PtPseGQRui~rQhoj2ZiLdD;A6S}dl@%ebdsZwgq8&yoZJ*PeR>hi{6 zGADWIbI^$UF589`Dwtr0(T8Bz7UbC^AchoxRHyCDNS|5%ADi$i3=(O)=Qa|U*q#no}{Js*TFX4d#jMy=}t~~tE_OesBYd`a*!E$qQSYIz#2dHVHgxcEKc<{;A0Ppc|P}H-f&m0 zp`Z<3_+qI0XsI2DQ5w=2i-&`GzDnSIs|U9YQ>im?>jBsJM^^Xrzl;WwOL)B>Dk)2$ zv|64sBHKHd(AKIcrI}3yJXXcwtL1BaT9Oc5RdfUcal*$GGWK>+ug;}7=SLtM!({IH zkG<=h{yiVzT^>$jhBT9ETOtqa(r%_4=Qey4vM@~MmM*^J&;+BrK!#|7KV4(w?)~WM zKb8V&UCl`_!Fp6(QrW63!~Ms{@bEC1Te@R>xqrsT`Qt2IW10*d&?*2*Y*JVgaqh}H z@yIY4wkwWh8`aa3{ip6+y%_Q8YkVf9@S3%{)uo|>N>9E(DyrI!f|K6`;Ta-x#CBxK z?(gWQxGT4K?c6W#T77m8wRVKJECw3wM$RRU7A(8n4FigHS%t&n@Mn={1l!&m5S)E8wS4c@%}wecp<`v?pZx!r(hVe zyzpHI({SHZdW4<$)Yu*te;4O#9 z+!FT)a)GZX?e0JO8Ge-18uAUqH#A3`si4W+vg8bbOw5zyj!9-WbM2q-uJ%({@Mi5r zRrQ|?d?3m-zJ8-1wwaE{Q$lrKUENi(7it!gvwap;%4^8||9PFph_nD1_sHi~&s%ER zSYMmgrBS6`O?xRgJ7+(Su@8}v>tsCGzwZLgnd0)k?h9Dnesmitfkv2u44Ye+IgcEp8PxhbE*Ytvf2v^f!AGbv8-rPYHArxKwl|IhLVAKf(G zFJzLt5vzFT>IB#S^6DPg)uxkTD@$7vCbEfG{0e~CoE=^TZ000i;m=8@vJg6r=#=XZ zj*jn&kL}MWfh4|jgW^Qc_s%VHe$fn{pzH4l}KefJk zSaQStt7Ra2nxqbc4c46waq=dl)$xTd{2A`RA2E)b?}rg|`X>Ejf32M`4FX?Vo!^#& zsRG^sYUz+}NiG7YakY_SkBlYo_> zP3MrAL~+rtukPU9_8<72(>LLsUb$^xMZH6UU;qJtKoJM;y7$@`TfsNz1V+kf zx!hHUOrlMP(!MuIPuO%JFYKml4vu;k;7u@~0;+leOo{V<69&)ex!i%VIq~x3z=bEQ zO?wx$coD&2>+)F_I?|5ti%=KW9ma33u53Lmle_B6&-(lK+t0puU^q>3yB=QMfUA6% ztA#L<%KQc1e8!u>gyoK1E!oT+d1Q6!ER=Qq*ERY7(i$e2I6`jW5nS(}><6xQLil7M z-Y!RnF2tMo)7*uR;5ARr^s`gU#1&%?j!us_km~Yz z84QIGq+YpGj^)#6RZ+bwV6(Ot4THxgHWQ?|Cr3!_jS>}=(+W8pw)c4?(IsDz#rKQ*K`jWrowfu?cj_+YT zhJ5;Bh4i{~gfCtW>#_Uc(UpzEWPbNMyMM;YEeAv`ciH2s=Pc=@%>Z(13}$mUAXEEP zO76zTaaJE9a}SumJcvUW?@#}j-$J%NvAQ2B9@$_x>haTCOO|8?HrudUrFL07pW)n3 zU<||5{yUz)E}20hRQgWsZAdb&1>YY3~v4 z-X~Z8v5`n=V+AV9ww$SQQrAJTbzY18;J=~8hFIKEb$q3N#t(VVVYb~QyEN`i3t>%x z)q3LGn|}n$WSGq7Tbuj;{L!jWvUPs;&XFm}mq!+KWABuFdE)3?W%`+^6ZP4i8fzl* zcx@H)AUH+?9?IR-80D=@MeEQs;@qbJWwkg&WGhluZy?;tgxxuPh8z10CTNHZ2&40Go$|TT zu72w`=nF<0pEx88$C@jLHFVeAR-4?ksn$*NdLDQk&+wkPQ+b@^O5HMd*;Icg_uSi1 zL^=5T)#rB3&ovlHyh&^g$<1m>!{;6M`)9?LpH7wc9r(g(29F?E4Q)D};b?J;$u!1U? ziC6H_LuAC(o5j8Q!B?==?t_Nn^IgQZHqnU^>2`K1WF=Jgl~UXbFQ553bkvlsExLu6e0SuuS6aP;I8NthY~+vV4PT|KlU^90pRg3vilWp|fi}5m*_UB2)WiuZnFr zU2E>K+2cFJ$cFHy$n17(?ue>HA~>I;ZED*|AH|3Hac|rdS=oA8CW4PPiM9e~-4dDK zRzM_!)}3<%?0NWnP|hBCFrms@B0IS5w#eL;(>39G**^teWhEe|RB^(3;RAI6zkmqUFv22H;fs&` z)TSuTzaxTe{j^*d;BOOcgZ=Vj7vt@Ho|A1+`a9?ESnXj(-eEOFCCC~XMtj@W8k-6;w zn5xNOjAJ-b6I3irRmecx}nPRoM z4sCIDwcX?g?HI~1l_O{bi|toNw}0XO2y#cLH9mJlI3br36*E=LD+)!2naM?I?i&-4 z<%LtJTxI7TWWG#B24_#;=81+$sAkFLwF>y{0j(Z1GF)#8zdlUu-}3C8I^LrC+jQi- zB}FKd=#VCptgT3EtL1Q-e`qUbnZcV6@vtzhEB)slzw?Aub?6esxIXrks(Puj7Ij5Ab^(JL zB6F3AOIG^#E#Q0bTM?f|C2U1fiXjOyU#&J@A-3~`LEp{ zLBztTyg|vm{&)6ABD`_WNBjyqxW{DGWeH2xS1Ze7RidEa5|>1l7l+8GvO+BP@4Eyu z#&26!oP0c2tdm~Cq|IjKNrTN9ilFmvh_8Lk8fM)A6(&onpi`I&$Y}>3Rb<$TqZlf6)Gr7UA0D9 zl5=l87+G0*4Y|L5FmhyI*S~Toat7WV$uQ!(GbM|wP8M{bM6RH$xwT48c@Csyh|FE} z!Vj1G?>i>~TrZ!^FEbI|sM?)KB#W|`pz+7f!|M*QgaFg)LpP829p^<5=Sr_NPp&&p z*sn>uU39=zvZlSLhx5tTMG%{L3YEL+%Ew@Jbk=dMIX_~NZ1iYKRvlffRHD(W(%W!y z&ucK%%?t3`Lo8r{KDg5V>ID&lWYfbVl7~@O=pD1)ov4j{Xi7h`9dWmB{5(FRW9>=| zNHEH4j)sLQGbrw$tftDWl4IqVh#@MnRwp0?a){6#=Q@yQL`i3Clr(2o`kTpwIpnJ< zxnl?5LVJjU5Du}p#}Y~5a=X8ajszsT9qXef$Dp*(Rwpg@D?9FZ%^Me9@54-F%fhJ~ z?)Iy3XMf>4qPzR!GG3+H*7;y(!S|nzXHrhWXv!%Zj%Lk+)O&s`eMz$;svoigX5^upDJU@F86uiqXB|Jnx zC#z@;&Ma9^bI)FcU16Av^#3<5_e~c=DwoQXzEYr7`Iuftsg%)Jn)}4-@%e_xK$79l zW|E`h{mH{n=Ax=OcVz7QfPsAH?00AONd7r>`N+8wcXE46xA#Aw9&GXJlbAxmOmLcgOpavC0iOpk3Z68<{ZWH%hRA$9Z=oCRawP(kl3FbG zz05ivA1L0!v%9>AJ{FN z6VkFoOGQ+}?SdoYu$pl(^`H)Y43YVZsdM|+|7LLBbVMdNy&0}0;h-$Lp zP*5I2EN(JO2}oDZ5LwcD&@cD*|0Q|CS^Rl(1ebp6e3?Q4#)dS|T_e$KJ7P75x~z#MxM$5!ny(@Emn|@K zc$v&wA(ND}V$PH9aI;n{7NRLYf_%aXnH(k$0u}mWHi)wri+1nG%s8^p-#Kx)ZK}&PTTj+DE48sz{>F28=pcyXI`=xVt>)ewfTXV7>AnH+A^(E&ZKd z3~#S{eF=Ru1{Pt*?{hgxm$pq=s`hqWp5yERe4-&TC*j_YH9%dqyZ^NS3{&WiO(%7S zt&z-=b+4>u_t92$h2gI7!IV3d%3XEe!ZK{4Y1rT6O$^F0;Ik@pP)ML@qA?`UMwyke*ql>+^b-oUsUuAc?>PC9al_$DQ3bjbVCywPeR)L3Z*}WC zPktX4LP7`%l~W4xWK+{|a^GSj2N#E^+*Qy1V3|APOVCUg#rZB2>wD3Ipbcs%i&H~; z3Qe0fqz)htj=SqxjADq)RUV&P=AOL{8^r8e2O5Q0=Ob_hm#;K!V={DDr3;sefaQVb z>6Qc*;%mtL?b%*`=(FlG4R)r`#;Nz13y%Z?7N{1Zv~%<;pKz;bvQgD*d&1b34=?@y}gXX>FJpL z>vvR9bB&L;K;(?(#Od2+(C2{`UO?1G4p?n`KnFr`@;Rj^W z)NxG485yw}ZeUEim~a7iEAa1!y(#YUCR__|tw&H-;j}GY~0{}C0>4_Oa#XJBivJ_uAFN}QI5MR!mFPU!aqN~$$`D*DWofB8U zIRW5#Krs0;eC_oxpO~SAJ1DCnxeKq1>^M^)Q~v8(<+M%v*Z);6em!pPN_ccaxa+}< zN*6GA2*Aad-|Wa^C9R_W}S}$7OV#{9K&QjffHM7|03R!`otdbLZ^D&z!KqOoCQ1E94$G4ir4bRvrdn* zi6h6|*P*vzGPe|X5|vln7fki%-yON=gk90%&&ThUv}V6I{rjnzG4sUP{R7gAE=O$Y zI$zX7*omWws-{AzgZezvP~mVQ=RWj){xwe}bI10?m$~2Nv0H5V0B?l)*ZG*pHw~-` zN7|?~QSO)`S+WPhY!SEX$I!(PnY;ZUfG<#Mb$eg-z6c5uM%VekRRQ9l6|QDTI$Z1) z8Mff+gcF?d9vFSYWbSzWz4rdvJ-oN<>dV*pP)gx>cd+cSgxO{$6O>te9hR$p5F;3( za<_lmXT)Xp*QWX}evt1Xw$5Yfi$%SYN}G{VB`pbBn^2&JIv3zD)hJYU3K<(#)z*KK z<864GG_7E0SKbp-nsOS(K=V_#mCu%vD_@Q8I@Au{j2|s?A0EXm|4ldYHU+cJM~e$f zDVO%NfpqF4yiCKI+_s?hP1z9K-T(b3;ZN8|*@AHvz(@2#8=S?^uZj^qeN#TX_hc-|eJ~Ln-aMugrI536 zAcP{tx2w+B`BY)_h=B3aaJe_{xOqqa&CmL-kZ{*G-!R^rojWk{Cdr=B`FD=_=kpuh zB?&HC=k4=fmwa~e;9P(4f_drGL-U)aK0WuRh0*z+FMNOY=BeK-+&g~zhQi$A8@{oa zox5>r`@+AC8pjPA?vi|9sxsZ1s7dxL{BiN8Q_T2RCys5{ys&?IYD_VE*@SQO?~8Ar zj?P7afWS^SUj4YN;-{eJ8}$Bs|PCw5N!`{c~T?{A3QK&%7_4``oHL)!3}bi4%VO93k_D8HjYR5n z0WdyUw3aT+o#5g{@;D8(@R!G`87<>%)6sLcBT3<^`g#mt{73Cj`Df8_ELX z9Akm};omAM2}nIaLImnxIJ7!yE+%k&fYI?6AagVi3vNgB5HO#* zi?2Vy<@4bouRR9RLGht;p@OM9|9g?$Mx8*Q+_>=*JZ`d%g3hM492U5I%pSs!0BsHc zB^ou^2j{wNzY(~6T|r$Jcj0(8#n||%GlZCZ`vtC>kFG=R1_UF^FSH&qR#4+?+b0D! z@bH0v9M0k-?#2DJ7CRCu5o~*p_`~f`malM*cjFT-0)RHa)NTE5f$L*<;eaO3+fbei z3xiJ=p|*ZU-~!z#n+MfL+Pa8IFof_m%(<;Sg~0ab`1N1|SOAcWf$@_E1Q*-g@U|0N zhyYd@-@>24YDMOWjoxxh;6l0#HUirSa2xRE_!uDsnr-z7Tpln2syYiH;gd{A01=bE z?#__F?V&j!8nB+QHd2VrG@%0@v*{b+52Ho^VlfIK2rWjA1z^Ln*z!+->mw0dN?}bw zyiGJekAQ+FHrfO(zPx?lys~ z&p>tI8}s@Fa}mJGfp21KM(i411%!z}D8t@dD^$R0HTVk~?-jYwTKasb3$>@^Gj;r^ zYHwpU{Z8c42*1Gd@B$QU(w+k~(`?yvew!$IkXJ3A3KeQ2Iu&&m5T(&|r#DdI!&s#} z+7u!@1E`yjMQ8|I9Ge~$xQKf2f+Iw@LYagJ-odaW5x7_Z*o7gKsNKeM>={(5>}3}B z32b!Rg%^q6Rt>%Y`#o*7pmo$a?N~f`TK`;@-Q}DHRif;^I%JK#Gu!oTR z+xqY|P4te*lg|QM-HtRe2q>mHgiX|+-~K0oYlBKsLFM}3y6L4e@Frn=y7u;83v5&% zF`!G-$NI`XE{H}|on8m*l zHa-42kxPdQyp3z4@N5pYm^2Le@6J4Nf{g?<{J5Dl|LF^d(I+oleJd8CT@WCso8Wekg{9~)vwPtc6m$vhfL-0Q$Qw+}`x+$B_ zPg_JT#MFo9@U5YCVd28oanaLv3tWJ#^|}L{gs)-8)(y!hn-;S`ZFPb@=uGxg_Ui9&4qIa0^JGhc~GqC>}X1OIL_~c4Bi@VqiReo#knrz7H;|NkLk&$R*<UmHzd#3UHfs9}u|whWpwe`FW|pHRBWE zok$bE<73n1D+k!xd#1%9hC zQruOW{{(kHMeK)qVzJp`m*?a9dFjR*+mQ7*CQdiMsUT4iZ;eUqA`BlDcTCbfqC$qq zd0l{HQNebF65?eHA7j_o#ew6u`5Dt;-C&6Lp#Taw2O;#CWP`LsxxMIi!Q1a$VEwJ1DoY9YY^W-amxw0g**stZlj9u*BQ-cgK= z7P>72^A!3Ga&MzYMWqUv?Wza*+@8^5TYx2kjh&ddMCcmB#U%~IJ8y%qIJ}6DBmL>= zu*jugqu}cy${&$;gZjtbkaX%{k&Da(Gi(~9ifZu&TBsQO_|(@%Movt(4i+Y?mp~Z3 zqO=QkJ1oik!k5L@;&p)(p9pe~I#B$z2h9Jet3@uh;xKQ>WNkQ=*t#jK9erlxIf2VB zaL5YuVu;TJLG5bT64^b!61h-XIE}zQX@vkjio*^<|4f}FmB7Y|<&%Q5{G#Ix3qC;9 zMC=kZCvO@9SQHz!-4KSZ!|?E}cReON%bWVJ+_U;T%q~b%9;#Q>nrR7Kd@sMnSY6V{TK*J3)rfbpt^H~)RqmiG(KV)a9sq3a=}E}YW%o0o8AmuP$=uoi|GdZhT* zf=;FJm)yhb9WxJ3BbazKR4=}d0VhVjRxcjkefx7h+>nY@=#keEKUtDb6FDDszVE=XPq8Vz( zsa`;qEfRmnxu@2$oBQkcJj6%eGwXa|X~79==mxDdGL1`NOO-Aw;f+q*27lZz8M(1v zKh%HlHr!?Gy;{D05YG#4`#{l$w1|evUh}xav7lYJhS+)6Lt8e!hIQ3_9FhxvfC#A6 zT@T@UxYbsZ8B*G;I@8`*NdeRZywzsz@lQU4Jke8mJa)oLfA8H7X(fI7k;uc6-t6qX zBezHlqq85Hefw;AHZ-fAJ#TiiW`)7Z&VQ%`$4c_V0v}67Q(~9W>(=$`gPdz#H!07nY zT~o(4Tr<^~icXnE|2RcV?V1{!{N3dDHk>{AmC4>6lh;kwCs!x6ljl!vop@#9mlOXv z(VzIx#M>rH6Tyii6Ne_2#$OtLdi-1C$H#Bn@X+{Gp!m~%`qN=be%d0cXzB^q)0Kou7z2TIXnqjq1mSEi`;em8f8l&n`y;DguDOE9Pe3LL9%4Q_OO&@7U zC!~gMa(g&wP*Bk@BDX#Q8wk>5aC2VuqKqUCKSo# z&k5Z(I_`SK5;h~lINQ~wFa5hnZfHwQS-`B3)yzFpOR>WybknGIV{|=3h8U(|u$YO9 zPS9CpgRmIOl}06_XSIr5IdBR;bWWpY&;`~1dFWZnY`hY=aiIQQW=-#^| z^j>dUQGt1XPZhE3r$8-3ZsX(Vyjxm`=E*hQtx=242O1ekyeMMkYt5%lsR@#P6 zRoSfh@-v5pfmS_@qBc~nGhI(L(_nYMMQpC>D5;E9-^>|PxWHj{J}J_bteK>%IZxIo zV?&H=>o>)27)33uk|nBY1<6D+v|ni6t5mHHf_7$&dP)O_h;q01u`1b0j4I>YsqS_P zIzMrdU3dVMfs>R+Z7$$IkW^LKEtiXQTg^t*YL;-rV61ct)P}huL;e1)^ zF38Eph2~{NMMhVft{$Mar81jEw%;zaFLlgzrqj~ZgHBI0lsPvnv@g|54YI7$7E>xV zW?)F2NodQY4#1nS+Ay&m8DHnBPIG>A}$sb`BiGRep<{+>uD7?N`8HJWfTtnRS6 zLp@P_7PBQeRgY0cLLOt>*{JFoq5opcVI?{-kF%Y(HY_?#R_Lb~v#?MrS#8rzN)ijae6&YdjAhZI?)P~rII-xlt!)cvV6-!0=>{nV(WAh6{Wi!Ms`zn z^P|G=7VK>@rOh;$xIbj+W@VR%WE&f#QmJ~*5;6m&NV7rg#_F|@rM5fKjjD{-Mr zpy%VICKX_tgvJm^TFkj!9}wv$(cO9iyxYFB1xBu8tdzuQ5l~P~ zcP2(>OpTf=Ly4ayr)D&COhwdFDp}GOqet%$+Gm@_G97jm)qZV4U5VzFDk43fPLa_- zF<=kbTfRVQswZgdQZ_7$)6q)G=u)DvosLl7B0k{iYRF{TT5eWdA*YPoArU4bt0g@( zceY5g3VWi<9v1eAQl<$PY86?&F5uuk%sAn?D z5_E>OWMqZ7;()03GsNKww00_k}E$J>H0#62(*%JX^$xt;si^5Nn~i%Wg_D$ z+UiMP!=+Me7U`*s#YP$PDNVZ=th>~dJSenJ#Q`RvQm1r2X*#X<5$C@{q=yKS?D_+p zjFI#s7j9adpJdjX^cWmf3$5@X2TgL8u>X~kL8p`?GOC1@))+FGgnVA;C+W#3DQ7p0 zE!=4%DN_16k#1#+bj`>%O;o0hROK^Qg$W%>n%P$snkO>m2GO+Q5`#5%m1<`G4`Oq= zmtYu`(PDIH8^LIF=8r=AxXhLzWNKYoT@Azb$Q>FJ=&a7-AX<)0yQK9rHI1xlgU}DF zR28VYt5)rnbS|&);xhztEXzdJ$ULo^Yg^qH`go12_qE%!rFrHk}`)>k0-pD!$ zo!pzO83KihmG#O7Z(f#~0Si;AkT#22X$+>lb3*f4%}~J(CaYO$O?|Y-$UNT{eiuip zJgM*o;Z0TBbZ+@2!X8tmbvh@Z_SABoTsWr9uosxc_No@@(sxO}oOU@g?%3XY1v*u1 zrHM+_(=O>V0b^IOk`w8vYJ>39?FDt)Ws(Qd1|R6XQB9e0=QV^}oihfs=2$sPnXVEa zu-l}h%S6)VLZ#C2Ce4ESE>l){kn$VDWrkqneh)nr726NR;qMd8MoMQ!AU)Y_Gqk2r zcF4{U`zISobC0lF(w>TEbU>s$(mAE ziVaZCr-W}$WI`DOK`=E%I!FLTUC`5IA{=L^sM@T}mx~2Lo7wzc?y)~8cAQuV*x^WN z(O*ltJQ_uwbnX>?ozUCWRH&$r1wyHS&7pAU1-i83?UI@{>sHAXxoU%&{-Y>(NtMFs zfd^L?kbCpY?i(K6!jVFLfJKf~qr~ zBqJ?Tp%igZQ>4e+UDB2_vzf9t9&Gdy=V=9%(RJF*nKGgAH=Kr6fxLK9Y;O+6Xa@j+ zx}{>%=8vny-Lhk8wP>kUA1F5K9aWjN{8DJ&(NQY8W{dgibVF{@rPR*}^maQ@q8pW3 zHJg|D7%Dy^teak`9WPsuoL_7!Diw7>nYLdiKEP_Fgj~PfBlGk^kcl@lyTOl5V6H7JTeuT&T7mpP1hOr zah0W`+qpMC6p^|kq4wsBwlZDixt z)3)HA?ji|S+TR)3>M^QFM#iIb;a>#**QRAS0KR{aJMY(#`6ay%#XqQuJ)iZqJlZ0l zsRn&t_G`qo4e@wX;#GmqnxS@l=$ov+|B00=CEOSO z5OFPeM|>Y-b-L6gNGh+^0)4;*XC?Rc$B=tD zMCOj`k>d23T3~zsuaEJuowoIh;g1tiMOv1&izH0?rb!zxg({svFw{2gng5Dx+&Iib zF-@IV9o6(CpC;v6=fUcP_+q+Y?zTveKg?FCLR49c3sF_Y?;$vCh{q9ur!gSD^6Y

r5`l5QwMrY$-j?g)Ut^7>Yg_K5lY8jt?$z$Y1XbYb^>0c$} z!B@j&lVn?HaWT817O)CaqF=tsGRNd95$qoBms`LOUWIIXIQV&^(D$;@@6{-t-cwiz^0x zCMk|w&_6nKbKfPy(ZR3wt`;2&S1yj6tzgOq6>+apmkUHf6z({9>-c&BBezsVj-9>p z)H{xiMc(yz7H|gWEzzRXmdetsj4|nSfwH;MU0Rbnlo}hb+x_n_P#Fb zZm^D)tKJ(`ZPiyZTJ5S(7GoP%T(QU9>)v~j8$HEx5)uN0gb;#55<&^V zp{J1V9F1(e%JSy(A7_8Qcl10nckbM|bMHCN`EJ`(R(2eHNg^(}fxqg58w;&~0YgkH zaBQj&kLw{)PJc>d4(W?Ctm&;~#gOO_e5s3`@u?s}=+9$}3^T5FSd-9-5Fu%IDzmvj zurv!?7=wl^tD_}vHo+5*!4{Ala#a4q7_=q~LolN)oe#y$X|!CQQPZL9Or^AL`Uwgq zz7IYQSY=f!hkrGVhNboK`R5;po^}mvm|z-b=A86?Lre~DPAcw`CXI4Kv6HmZ9RZjw zmDSP1Pj3hR>ULEX{rqgQJ-;o0{nmIMJHvJh8kF(-4~E(2t`XK+3U0Zv&R~nfmGa*=2$s?0b9!HG+JPzKa*&m%;SnV+^ar`WM#+Ev)XG*nSc`M z1nmDB&STKAZA# zJx;BRgN-zjJ^}CX*0MU9N<)N7LI}g+s7Dfzz}Tjcb_9qXvEA0kk2s>;UCeLiKMKDs ztAkJW)9~T;DBdIQ`7qEkYl&JiB$aaXS&drB<*U6!m=-O8Nnd#}_{EBp`4dZkbtJ2% zqGeLmi%r4?6RW1Kci4M1>uKmfpU~evf%9{vvd=^q!cIj*D-uRIe)@$E;b!p#YytP` z;ic?2dbx2o42~10Ow6yCg^M-a5|feQTDb&I!oAIy(Vwp@Zv+xow!= zCT8OznEgBkBQcs47D33(=Q*X^WB|m^(rgcX+a~zN|LYuBFe4-eRTDX) z$0JvCN9cv~;l5?cifL*#UzM+2fUV*^AG`AN?o^k=$4mG*ZoN#wHt-3$dm%iUWySQ7 zGaq#3KUxUCp7_vtjABX`*RNG#c{&^D?X(y}L1%9uLR%ImrnQ!pGSt6V3}?Q2St9a1 z9fMxB46b~r&QS8v?^=<#Z;ad@F+jEggH@74K`+?n;DMJU2itB8{kIi~mi8f!pf9>% zdQcRfxqs#NE*G3w39B__ZGZW`Joe1@+?UG^`>SD*z!i~z3#$oqDSVLb&K%a|K&v9> z4>Py+_0@^CQ9~U#XOILo#MWG|y^3Duw%78}u zDHt}wYZ9YI4RruLrLyU&?W^HqK+Z=Ofpd-6LGnGw1*dyHq}q!!F!!xXjBFqB2>Rmf zvp`n^ca7+A8xl?6!D^4Y;wD%bLG=hl*d2i!8L;b)kJ;Gk#6rP$Q;MMvr7t~o(^Y2% zuKSx3;JOc9uP#`V)S==Iga&}SG8>$fK}Td$0)ilhtfg5!hl}U-&i4!-(7}foIZ7QZ zvNdu47zgad<)9_F=&14|O3&I>DD4#X?@iRun|CH4Nr)BFt~fdf zH*|gjNV(}jzy#MX>Dz{rW9hecCLl55P=|n`+UYU*wlw)T>pF5X1%1f_pGPBI4h6^> z!M-8*Ub|qC6*LK8{m}$rO$hhX-HE0#-*ZTw6%fOf!kIzrMkETUStOttg4qLLR~3-J zy_3z1kk9T-fP49nhtRVkpO?I=Z`t>~kLOeS5?k8_53!d=U)}zpN8kLik7vVr(X|H? z_Ob4W0x}%JHm1WxK%#}1+u;sFXW|ymZaQBCTBBEW(V>t2pMn0xb*ofGlegwWSc^zi zb~Y@l9$)ude#*V~J%DqWUKn_pxlGcKB~v_=F5yjEV``BRI>ag1li`Rs9L`mJLRNkp zy``qD=r{(E+j;!1(w*;v@tB#X8rU*!QmaurBXS|74tR=~^gSn_bp}__9^37um8?xC zn5hiLGcq4mT_FDJ(Z(sR&)Y*;C@+Ju?g*d^uA;Ya;j`-SYxc4EFOR^)YQlH1hzTcK z>EIG-uaR`wV}7CwL11UIthkuFlxEKekI&0bGhYH(Xd>onTx^FV!PSxCNTpAHvSF@A^7zk{=7n8Ra2b7rC!;szusj@o8QCXAveAHW|IMm3X@%7o~}cu3v#BGQEX5ZeUSt11D981#^yVJ16zy3mA)9&LHKQYHs8WFM?}TJVP^bx zos@^x{0W-AtQZE9KNMF4Cgh+06I|&eT>&D|N-ZW<5+=xFDM)um<56~>%Y&04&@via z4B9TIm@oPKwI3xMtO*!0#@v2MhtrYdIgG|soCs$KNN1RP4*<%F=_C99c=d9}NAKbH zm7!1tI7}Z%NFWU}Ar~YZl+4iC8;Q`L`~`5zis@O;fm3F2Y2x7zir=4wdVpZYY>q+A zhvY|QSF%?q)vFU>+R#F_(?4O6!&?T|(U*P&QP#x|_nU{2(1{F%>MLjBFxbs10#b;m z>?w;!6--k0PE2d3jYD-RZ%ihO+XeiWOfv|z5xRS`QCC-pTMTQ&!=1iWw2>r0E zj;5x)2zqrN?3kFJ^at#R`~t?XF^*{Nr)LB+J^v&TxFXO4RETbfis{7&07WEK5L19{DaHn?`CL-_eIm4>TH+uY`4 z!UWmT=tY$PS5^#?MDv)Bb^1S*2!ZSG>(3;%wWtqGE0ou@Yz3o+BE?rO5F zwXBZ5R0FAw-+lGragZeT^4Wb@181iz3HIcbur&>C5ptQnCzN7Iv!z1UA)JdSesW(pFx_XpDUN z=s(BhziuLLzuf;|^?}`_ZtxHLW8LF5Ygjc^^pPhVe*^EE0)z>ayl*r)wMfkkOGshR z)aADJhUnUnaJps1^u@QHx+nk0NK(g|WG!GE2a{@(9kRIs1YaGCXEKr=d!jfWp59tk zOuxwKx?1LP>u?gHs+@&!SHAVlIjurL7!oGRNLsvEGeJLnD+zIKcayDc<#i|%z^4bk znAZqFqX2ZxY;OUhCz!8&sX0bE2_n}Opwx(p@Og91}wH2kEznBH>1rphbFz)#v>mSXU8BVCH1F|JBEWc0zYRg zmt+CT?l*LU3sZ;g27>&%Bmq0!C$A@qqHo#nLccsckb9KNb$c~|h{UOA921 zk*(z5s{D~(j6*k@sbn#)+@qJBO~A7>2a0bH*A7zPN*zjzL3}%W$^ue5eb+P+B*}+7 z1ixq1;OIbppPxz1bP^pM9=YP^;5O(IF26LX>*PzEY%4?qBE>7y$>FVKRe9EfQVhbq zkvugPvd_V%AAAN{gFH~S$nSS^AkobseZ|e8{NW;K z;my!3%ZouncRU8--b$i}X*8#YFMeGv2nxdbSW(SD*_p;ib{e=r4OL5DT)pXk$B=z< z8`(S}SiuUmOs|wRX(2@8H`SACzQr|n1I*x^h4HY)$Vdp3b*NHbQ}h43uhG!g`1GL_3qu9tWnmQwxha`VlI3dk zgj7k75|THx3@)UP{CLi^Jgkm`W(&W7;X%w?hvG@nfEi!WG!Er?d3nK6dASKe*tT+Qw(xAl|tX zUKCeia4Q@z9*%FAJ?v23$2A+Ot8qNM2ggJBq$-VvM?xW8#2+&_ zY&q;AW9Yj($d-23P=|o~*F+7yzvFvH#cBn)b$D6ty4>@Arhv07t1I@rlBd&V73ly0 z7IoNdg(1&@N|ido0Lcts9gkh?ywf>69+!7jI^Lm=hN%$bzW!e+F&~{t)=wR%xZET< zc@#8Qg1C?j3$kul-|fht4kvapa7$E^E#MIM--kdl%&A&>rsjKFWVWXGo`9u-l0)3! z?pf-^v_=abG=r;(J@>K~m>$PTt{Xh@T@br1jp`$qQaB1(pQHTZb8tN&5Q)WCEn^LJ zH2wPz=lx&G>-{2jS2z~vX@CTg3oC^ctsk_$+Il&K=6$X5)>~TJTmIehr*z*RBfGzGY-2^kUmAYVaH?TT!-9rn!+j01 zhMO8jRvPO6S^r-BPwJ1?_1ABxpHm;Jx7OcTKdrvG?#sG&>V8yrs4iG%tP|HwsjIKO zRQp!#OSOAzSJdWey|wCEZtaBH%9@XAUaL7&93aKidI>w?x?!Hs=4xu%HLJyJzMfG zLDW}1Fcg^vwLB@Il*c=>a&0zh?`F!oec~t&+{045kh?SB4cod( z$6EttNOR2V@5`EHuxjqJ-B+wg@+f`>&+Kw`Ytkga4)d!&DV0Z@8d%QJ^+=NOKCe+Q zg~`O2C1h=|AU(%7QTB-NwpGR|a<=k|$`PC+u0?$8B$-8{{F2A=B`hk0sG z!p7z}$ZV&#eP5~E*%9TcZR%`}GKg(i;mu4spCs3&PjUI3VM~8NEe!T*qtltJSV>6J zm*n}~y&AtKLkfh!hU-hbGE&ar`BU*sP{57pZqSyB1tgCnA&mYUTf&AL{Y{CM$cDHw zh*7Zl(@HOgxTn-Q@Kqe*baoPCj!j8jp0N2vCTClcs;=(RjpP+RC1H^H5 zkvxA-pj)F0uwk=W%w!-;atz*HPM=H17m?i=m0CQN$sU?yCk37m>1S&RuUkpRYUVMg z$xd{OqXvz=i_I5%6TvYD8FaQ?-S6Yt41|trv|3{V-z~MJ3Ufk2NJLHv*Ch3ZAjuL@ z!ZG%O!dJ9Am+>3q%FwkxC>5)PJ|gQ+WP?E}BvBceB$8CFPj2NX>?DT>s**ulxW!gP zr*eL?gDY@bwCZT2zc-u=s+kO6RL&VSb2H(b+G~fLN)n#oKvASoIQ9o^io!&J>b3NwyJb&}0P>BFDM* zS0$JZE+iEYxRpw&%dZP@Gy_a|x=%*&d^SPQ5b9Tog0Ze^|HLx;6CIzKXE4%F?GmNzTknj(HBqWt|_p$plVWEkrWRiGNX|Xy=phOkepWi%O4xe)6SiKBgx?j;h$gNp9d8WeI4+PD>@(VhVo{{}7o~Ep%1^jC z(ynwYK~Y54b)~!5$98aGSnAVv1m${vhw#q(nd5si(GXaCeCB?YM6v)RIg1P zf~<<+m|oq->$mA6GjCx|sMp9%hkXiboSRDV`?@q+OE`LejIisZ!LVCzu_b~xPGibb zDOD%O-5H6S750?A$EPn{Z^|R=;>ltOZa4T5+H<11`qJ?NlZhKQ$-;@St1FcfUb_~` zA!jd@VyE1kL|jCsvR0{~J33Rw{GcbTOYyWuV^XM=$2Hx7>wm~?v5}z?ipi%UD0Y`P!QqAxg)KI(rF!7uRGKsCpgjkbxOfsUD&)0iQ%XV^^<69X0bOFDV_*?voLsu8d8l z688k+9_?dHc`^}oaO_@%Dy{-y<_zx^ChZ=TjOxW4oh)S+c@rjQf7Z)-v-E?gP{_%M zI^2A<-l)+9l}yHDDj5)Qc!H3$C#v?loDz@5RXW~k>EeLwlSUMa`N7$y@+ebICE_lw zU#bz2Hot*{EPH=rE|?0-Ll9TrW$sS)Id!2MtXSMHqbPrlBkqf7%`S_}X7CSJmSF7B z3@4Bls$7x;^wjWOOkzli(gdB{th^_}(`ZFn1<`VQ>G)1asq2nr9a=9}FU)!BHWpLZ zQj{W^F|s|*POZ${<(pJhIvK(bS!BhAeu*M05yLQ1>TF~xso#&8bAh?6WA0-n2tSbg209 z*-SG)&TO><{MeG71V5thA?iwRibPjhVCKxq9hX{y$)ul%c<|8p~S`bd8Ly&iz=&Jm8iPmEEIn13xS4V#~>&+4q zzAE8Z)GAJzr*Vh{N=gy-OG|IkgixX2Dhw%=ED?f{M4)G;0aQZZ@DdKUDrORMwN`$B zJ)?xf?eq}oaHt1laI%~(U)60)d3TRn$Z_ZVrXDuC%Lh3g9nAcL>Q3^yc|NL-O7(@b zNj9hQ^7J)iBRDZL2fPRca)-;uf0Vg^ZU<%LB;!%9(4R8}IJX)~_;N=NPp08&1zD~o z!|~o(>dW2SoSB>SOYHLQu*Y^Ge?)xdKE&R+scm3xVcoWcWXHTSKOJh z+vOn2#HlHjt71YP6_0oJ=R6$>h-|85vQAQQnF+cRWG;8h#9qpO%j3-T#@WHBO)l}p zt)x(v4KybKX5%R}2yu=(G3;WD!6XZu1NIZSrzMGaZq%k{4r#VwL zImmJ+blt&Gg3|mWW)>=V!en1O8%}qVfzX{>NZb}~GxRa1`S(8jiqp(|wOSiNM7O~3eXpZG1cvsXvJU0K8 ziA3*;0t#R-o4?w))0*U2VIMMNv1x6PoozBXivFXM9MM`S9YrP(rGqSA^!xOjk znIuK9b~^8dlL`#3qdm*tgB|79yp!_d?jyl%Kwm(u6{fAj9o^g%UlIsp13^U=7V?Vc z6tR#aTLxFr)DM4Lie~wVg#<4NpT!1IjwVZAPdpNi>cO2EehT>!ZEyx4)cqMnQl9+$z{!LirPBd&v~i*rWtZ@pOdVLnPz^1RFyyxgU01%Im-z9pXlR@v&!O z{*(Jj;pH9jo{GwjhPBmWTNHKAHbrYbX7%6>`F+J5a+DomZl)@z&;>a?wusoBhWEUh zS^t}iXrpa~l76B6_ze2tr$cS@LoaRI%q%(naVa?w zJMv5*V;Yz2?)CdQLc-h2cUz6Aw2*1tu|d4!gXf`26cW#L*Q{D1~_{s8HN4=UMucs*KE_ z^5w+10yMp~te9Rt5;pkn-QydVALfNl1N&pQ!s;-qC=w};$YorvS<7{V{V`|67@`kE z0HUlIRGUr~J%cCYr$$K-IMEkwx^f?k8AaSeblc<^LgMGiqx2RxJe$e@TufON>~G!* zS+U;qjm_^0;A7w@+;(N1T59EM&D<`DEzk+xerkxmeEMP=(a+j zA^&ZRgb;CMK+ERvq*;zLt+9oBIp7_H&m)Y0;FK}A4rJ~_Gtl2<6n*#T>p{dML0%f& zyuYHZ!c|fKTvL1V;kp}YxK;NK(^Swb(_cs9`p(VQ&+Z;*y6pYwvYKJh6cQYQiZLql zfxlWDqJ?AhHF?-Z{WM87j~@CE`qD}5X!HPlf;FY_vTU;+L&ov@zs)y-*aq!mir9j2v|dJ=p!+k7|4~z!8H-ImjN^6a@auKR3D{}WS~WV z)ki{5`H+X?myf*%oc88t$l>6$=Z}I%YB3re0-!mVln7GEvJnIXT86BJb>Zmr{NY?( zwCI;uJ9VJ$%DSpG6m~Cr7`?8mFk~Ca5a-in&85`sf3JrPeL76-1 zcEDXyf@3P^Jz~F{2C?Zw)xuUz@_#Nl&nT^~!h5r7j&=b2ZAweRW!)Se0pX)?&Sk~L z-k*P=uI5n|ea+*frsP%>gFH3WBbpwl`E#YD?sUUqRtyJCD-4>Zf*2lF=4BJh$w0ua zBkmQ6d$iU#C~`Hd1&Xp_ddqwBOTjNsti=aaR}fqob&Nd$V}cNePC{@w<3ZQO04KQxwJ&EsdU4eH6z~wgxwAPTtArh-XTy=oC zijU`$ZOwzK=;g;a)ANuJkviUscPu zMefO8T6|?UpS7)`vaf|#JC3!jDOcUm@O<5e81lWSIH3bclu|o8dNK|@r^h9cC1OTv zkR78}t%UwlR!lGdAvoau!jlBi-DiMeqNZ>=Tq6^#8TU9%oUAozx0`iAX}5?L)6htR zOTpVWRf-8aK;taVSO8s@QlE(vai@kLw4EdYE6EO(7dM5bx0M$|cj=swpS*%}V*kAp ze$Ko#*?u1g;Hu?)QoS$e5Q36mEnn{m;3#(;H8duhS22AZN6hK=DeJpbWBTl22+)UV7~Y zIE%7Un)5k?EP(^nxcs$e$rctpepAsS2t;a1Q?^W&lD*IYI7|pq#KOr%h(tha;dUfRhbmNj7hWso z4ho1WKMIuWz?Tpbhm6TD+XC~RNuGiVAQ=&QAL(F=cvii{8gOJfx)f1*>rQC3@?!9> z+^x<}-9>^3ltQSC$T_}{KdFt$j1IV(dAs2!<;5_`PU`Xvdq@cHr^=Vk==fgvNqKS6 zz2~F7=n&-K2t8sBEXF`;9I2`YTn{Y!;TPq_jMvet`{D6u)ASkRkzTu6&Q>KYJQF;U z2ceP6N>Q3hl|Ok9z8FSUI3dR)>~&9Qm{Z}b`)kd{>RP=2_kuvq0Jy!C-oZTL0el#S z>P;me&r9$|pFLt=6ui=>K(Ga5!H}X#F{l=YK-K~N#&sEkRZSm$3udf${*W9#dgvoy z3wFt9#t~-VhotFyB+Y7mL~d>Cv)ZI0uExUeQ?f~eN)9^HaLGUU5nOUv6@BSL-sPkt zo6nQZF*+_}(1zW3cf`gJ$-*+b+*;T%dTb zvx4pk7uM%;orErKhwXpRW4?3>=VKROpL?i7=vUu*UQ6HflkeTV|+R0geIfwDzYsTNqrGztlAre1Wccg>;O95D`%BfDDzOz2%CS zL6J`#rjP8jK*ot9WX*Jl)!^~3asU|WaDC+ePoN*2gNFB4v`lC9H)(2z)%~hrMdkg~ z`QhwUA$a+@3Ysh9Sy`XG+@GH~_C5WX8PqNwgQv2UYbJFDZnl%`RtfCU7(MH4XodSv zz%R>dOe4FC-}n>r&!2#yc7m>e+78ScKBEj85&^5ss!!*t+`QM(yuULCQ zeZ~8ytS^?jspGl-?xysMANJlu|Lx9Y6X<({Utgd9@;R~CzRA&YGw4UR zu;L9*;{4kN?q!AoDpi!`yI#IRMw?w*RW)y!o>m=qFD6VqAXuZvkh5reFs(4Q9R;?UE{O zUNPIRk!Z3acyZ%Z>fRuSHxH_T_&VtFMQMk9Z!q&U7n}<-U-Q^|Q+AF$lXH;0qTZk| zz+Bh^pTLEc)zOkay$lVHO6<>l0*?-UKcQv?1LRetI9|fX>r;6twWX6&e5JM1pZyy8 zNm(6DwNJfzsm$~noRk;~wks`^NoUj=!kq>wSFT!Q(u<9Bx*tdIF6AEtVa!mUvI=b1C97iM58l@pZ3BxG9 zgcpAdU2bp{z2ylNe63+j*+(Bk3&JYT{eZ%JV5KxhgV*Hs>U5ogNKY@U>iq>~?So5c z$-H(Z8ioG&{xxcP*$3p;F!jfbw9M2$D3dD!AmAy|QyQNk1u+kQfqNSskp7Z(+X3>F2+NID;1sHB1F9OniW~1r)eoq?m;~Mbb}nD00#+S32dA zlpf&C7Xh)Xj-~=t@VtOZ4E>*rml3DDM_yZsFMr5)2;yRb`rX%Z;=#m>f;l z{r&QV%=`>OFf;|!(qMFxQ<_8~Nk~j-KR4cK=;R5RlgxZZj%X{dgZMEJ4?p|{d~m(_ z83eEt8~f|ei$NVIU%|M}`+C67l`!kv>a;lJ?2w2VMCBLI)@60{i|RAX=PbSJ3y3=@ z0$%tMB4U(<05l`Ba-K|k1#z3$;C2wsOxRw+8}}99l~utS_PfltDV_f6@(Hf_8t^&` zMO}>IZSjU|5)nV$DdSkR>dfW7@c!5E;18~1x&p*0O`uiZkpE;(FZ7RM3!+K}(}GG> zA`7yePN_^Fmq&8((!1-_KcEH6>*!a<3T~iZxcmAl`tZTf2ztyvFJJZT|0=?IufW2} zVt0V6;CbVOJsZwhOXJhRe~}~G%IoMOO$TQbv-{E?{p<2|H+@T9TN)0hVyek3-K!+-W;V$nHA|edZis2k0Q`T�uPw+t?&U%dcf(F1Q> zJD&b|&+G~GCm>Rq|9vIZh-=oMBr&(Y_zDgQlM>L}?^0;p6y@`GhiN^Ff@Ofg#Sp&< z-|qttJ~}r40*itVTu*@l2<9s?r8C(x1k65o?5vgyTLtv(dTM%Gc`?0Zoko?<>#0t7 z_T&W;It_-8cgkFXD49{Z+*!6Q6teVj>D#WM#!e8juL`Ihd<+QpZ@qzLkDF6V-+RK> znx9lpK^jnFCKruxVUJOqk>p+*#q^dlvvm2hpJb-9=zlg-HxG{o#46ZKp-79?73}ED2xw6Y{I0y1 zx$2WGlp0>c`a%R+jTt$GY?CL+74c%3h#~prd5lhVCf&$s^s%S#)3o zX#8$mTgwzr{oRD@YqT}eSm}v--Wy)P#dgpj*di#)-^u;gt z{qK+B5fiDAV<8P4N9Rz31cQX*md8MS0wfu@(6IO@T_?C&@^$D#^UF_(VB2J16tro} zHPEJT^Pw#}IXdvm*5#xiS1QSXvT76&QQUs0+We*CpTUj!=e1NDYj3`3GWC2_|L#qr zDk^GrZE6C$V^bB_Z5tm2yLn>@?3#@+u=GYh*k?B04|d5$E7-*wwO|)*l!KkW@lLRF zH}b&F+ITbA$2VRNHoI{m*wjYEPi#c|&_=}X+JN|h4T$gU-+%-UZ9sziHz0v)0}@y_ zAc1)U66iJ{fo1~|C^jI$y&I6=?hQyF+RzS`zX6`I8e#(yaMvRNdp#1&T#xwE*CYP* z>k)s_dc+^Q9`Q%6??-~+>ye;sJrXpoM}pe*NKmyN2`bl*0$Z`ZsiLC#AM1gj`s;N- zQ2pgPAgKO)9S~H1whjoYKUoI^)$gwZg6j9y0YUZe*8zU@o9h6-`n7d{U;XoSfL~o$ z2l&-LS~syD{`_zq5L7?E4hf!JhXm)=B0+vF5}a6z1V`5*!Tz;Kux~9A>{*Kh+t(t& zmbFN*c`XubT8ji5)*`{WwG+XvUW@oE)*}AWwTS=p8pL0`CRNd2Q9W-B63khH1hdv4 z!4qqc;PEv`(7UDsY|omzz$Vu4!G_k{0=8?-G_Vh@nFRL!HE;{69c$ngR2$b+gH_Xy zftAs{U?p@M>^*bu4kxLnA>u zjReDKBxqTU1Wl`vpkXx<)U8H>n$<{9xf%&7Rs%uRKUV{O)z_;5zv{EqfM0cKHQ-l$ zx*G7S`afI^1Xb^^27;l zu=*J!SoI7Ntb7IumOO(5i=IJ(17 zB#5p={H~RV?^}uZ-j#@d-%7-{t?Wkv^GYNztwaLDN+i&(M1qc$NFZB@1b44Q0`W>D z;I2dh&I%;BZ3Pm{T!92LRv^LD6-aQ+3M81Y0`bSLK>Xn=5WjT=;@7W0{F)Whp#N7@ ztv~|S3LvQb=L#UG{AL9ZRDQV}2r55c4g{5#mIFcM$IF4B@}uQIQ2CeTKv4PKav-Su z{c<3v{M~XOsC;`l5LCXo90)33TRsi!tIGku^5@GD|7Xh)|EJ3lzp(5v=>L^JT!sYC zFGGT7mm$IFWk_&*84?^^h6H<-A;I=#NU&)c60BW@1gn=J!LnsYuw)q$ELesFvzH;k zV@n?cn_i0eeM=F)XDQ-$FGc+5Qo!%8^e=_Stn$I7@Elh3eRz+cnLhmmBJ+{u(vLWfxUSNJjRtXmcV0NIe7^@ z#+BDBLHsdG5WjT^;x{ir{Dvine^>PqBw#H8f?@wz0tCbUwFC%;eX#@xhJErh5Dfd^ zX&@N($ESf{*dLw-f?;nz4Ftn}OaE&oHL1VwG$0N8@zVe_?8T=M==rA+=-HlWV$cFkfQ*j0-Wf9YbxpT8LK z=PgG3xr-5h_SnTp(7y-?9$SP2k1Rq0$cb_jHKsqY2=U^J5HGR_@xqG`FR%#lJc|(T zp+$)Iz#_!EZxO<|7b2W(A;Os!BAj8NAFOWS{a{rKtzab!wP5dBi1@;Vh%Z=(_`HRP z&s~W4?EZyFaPvYWn7I%MZd`~2(-$DY)CEW|aRCxcSbzj$7a+li1xV1g00~+aAVKp2 zBxqcK1T_ngplSgUuoeJ5>pu$spY_cGz-N8A0PtC#&j)~-G zHy;RCznc#Ptl!QD0@iQl0|Dzz`V)vZ>HNuj#4F54ydTU*yl3Yl-pP50cWfTQ9hir3 z`{p6s-gyYOdmh4Vn}={)<{{i>T7L^Qqjupu{PBGH@mnZK!XIeoBAa?HvdQKm+r4xBVDFxbYhEI(H=4N&Ryh;m?@4m0*X@c?4|hoF1^vbE07D=lHjan_vZk9#d~uA zzvAL-z^`~`HsDwMdN$x!{AzYT5LCQA8we_XHX8^kemWZo3bT>m<=IH^;%p>1H5&;| z&PIacvytG?Y$Vt>8wvKzMuJ^WBEiNdkzoCkNU-`z#9#I#;xBp<@t=AU@n=1W`2A1b z0Zm=;=#xm0ei8{%Pa;9$NhAo<+S{n-Szpn{$-dk3OQ>g_V9^anxliO3Txvb5|HDJc zii(CmABupzc*qO(-9v7$?;J9N{p}$&*f$PI0SNvzd~+D0`WikvJPho|hjL*5zklEG z%R{%r@jpGp1$+L`Ot3Ej5N~c>oEf z9YBKX4j{pl{W-9c_9On-{fIw$KjM$vkN7S70l&YYVLuYo??-~#{YX%`9|-FIy&nkb z|G6Is>i@AH2*$4RbKiCKO_0R1?{B!#dzyIhyB-p;{6m_jdz9-Jf>@LEU@1fuQd9yMdtYx4VI$?$^74pzgKZKv4I}ZXl?; zup0>KezXe-p5KK8&+bBkv%8Ss^e!YgxeM`+?Lzz`yAc1-F2vun3-NdDx(WJ!-Hu&I zux%F-Y}$nc8+IYVx?M=HY9|t`+=&FscOt>kok;NXP9#{o6A2dVM1r|Hkzn>tB~5kI#R@iRLSzjr6%CwEpt|F0u=AVGWw5`=dkLDvo>@a#Z>2X-KVV+Rr# zcOZd&2NI}vAc1lR5_If90{IRkxO)c@+_3`*Zr@P}mbV@8x!Vz+y&dsqZb$qZw*!8E z-Sq89aLslk7`q(_MsG)g=Iuz(v>gd*wpw1_ZSqZ3BYZ54Hh*?Vq**e(ihP0KfJR+W^1zx7z@}w*QT7Kv4V3Z9q`_ z$~G8CYtL_kcUJ97+u)s5`|LJ&XVsqF3h%7iQ(NJkReN$Pyt8VLZiRPN?V+vk&Z^zL z72a93ySBnRt9JWVIoQox?*zMPD-Z03tv7>Rz4dyq&um5fFwjja%TaduD z1@Y|zh;JQ0e8T|ZYX%TsG0=|$cMTwcXaEU_0VLoIAi+%oNHA>x2__F9!NdV17(IXl zBLgu*Wtb{t^1Q+o{L;KRyTZ^wtl~!92b7kLO^X-ulit z_zq}&`&>KC!U|&B6-vOT2tm$kESk>7Yu+lS+gT3=iA6VX*Zm_qUL4p})kYL&wB)H}b5==aU1f$O& ze(M>;uRR0!E#IC2{FZ;50sNM)&h!I8%V%eRpyiV@K+y93X&`9%(`g`R`Tgkx*tbpx z!T$2}LtxLJc7T2Pv;pjy(@L;MPTvD||7juEJ*RI2yYuu7V7H#W7VMhSW5BLF-3oT$ z=~}RJPQeh@k~@_Kn>v-i{{&AV!GotB0_!@31jbWHpge^Hcb&QiEcX-=+;R#Dt~-SU z*POZ*?1WQDF!~e{G@U|%syt#2%L764zw-&OpXC9+`LB7vZ~kK*@SA^=2mIzY@=6%* zntz!Gg65y)MPPrNXM=q%eQDPIS6Lmp;6&8tslz%DyUf}M9V z1onxO4};B~bb?KsG=dGCRDpf?JvcF^p6uj(Dca(AZYr_2_R_t-3cIQ zdh-O}H~sVk;5Yr~1mHJ4e**BEjvvp0?LTmwfl{dyjL#rjE}58$Uh;Z1ngzuz};l!QOwo9_)R`SzxWlkf7rj;@^D?@dd{a z|CVEjf73C1T8|+?^D!i-KZXP~$B>}%7!t6K0zu=q zM}eU6o1;L`_{C8mXuNb32pT^=3IvURJ_`7a7mosd<2y$Izwz~>fZzDjqk!M|mR z(D>3(AZR>y6bKqm9tDENgGYg&anBJX*meX7HXT8NHAj$O$q^)2d;|%eI)Vg`A3=iD z5hRElL4t>lAc5-$;+u{jzWxZ}tBxSP>v_P1dK%RMwC>v zjIa7r)7^EeYF=sxvm})x@>8BTH50vqQ60AA{o^FO>Nqc>4>;v|iJYKk#i({VD51dp zXHXSQ%>(C*V)mT#66zjwmCnN63A2-L2=o}bxpqjf9TTY7S&-canCY!$#i+Pn@*w&m zMuE4rs{j(SCC5&+N|$tULlP4|(dP`uq>y=31=}~}#q^O&^X|#FcTylpWGM7qIRk;E z%PZsg$dEyr(V58rD4gQvNK*$jvaP(1evuO1NDuVxACvFypmeO^7N6A4;bkm6Zjedk zqAS(q{g07t<#jZx@Ke}^+!h*}mniWfOa)M=D!Fnb4LzM^!rm?Bi`9KTk6X+%r&vY} zZ!52(XFdM6nM}mf8W{y{9L_=tTBEkO1!o{t!d?ypx_5ab&V*AP!q#Y?Ob{YM$o)=w zTUK@)eR1J~CAFnb)v&`g$y-Rm$uVkkwj?2jRM&kX0jajg!v-O3*Fp=I7t@l@mh1Ar z)>0j;)otkq=!c9{blFDSAZ9DD?u_Ic5YDX98&v*F=a1ePlI@w zp=#+_FMoD9ngsT%V5h@QHGGn|mJxifRMbf)ngC z=w|KZ-RE*Q<8e5`tGE5ik1KYw%kn`FQXn4`*MS0tACfLYbda?JJU~ql+@lB=d+l_B z5b_0_?|SXfM}z$EP5*ZmxreA`Ox`4@l(76v~x0$snnj((M@0dFM~z@8c{0$l)wtrAcMJQ7H*)soG)Q^uIy=3z#e9go5g zRbF>FE@fQ4<}nIfh4ckfEoO#no6%*qb9+rXw%22p5{e+=wA1PU)z(^82SIj`k^|eW z00m*0ww^$*0rL5zI$WukC}jelMEvceR>iy663udLr1!))|SCl zOc3SdF@mxAA9Mps8{~&hHSA<9s%6!^R{2o%E!dM%aPu!f$XDr}`FcGdkQ&$L_`#4Q zDCptQ*Q8<0EH9=#Ec8+`HBMtU7Mxa+RE$bBMV=>Bk#@PiyE{L5?qejrRcDSHHly}M8A-O zYbYxQ=NM%v8jE-Yd#>QZFra2Ugro6zEXtM0vv!`GNUCl0r3}my(vMT^t>rbdZXI@g ze)2f~RFJ*xqpIjX_EQr}UO~nRma*pNO`Q#WRsX2lT6sMtTUz#k7;ha42s0yxqEnpo zLmmQ^T*&Q7`aK@z)-BoqBS(21G}n7~=Re$l54-sS$|EzuDxS0|(!=HVd97VOpGprY z!k${T^?xSy51vjj`n7(AY zgYi(yuV00yVYq+-zoq9?&sKnrNycFf@pR&DX@I$uQ|sVTy36XWL^-wRN3ExntO=-s z%(O^`km`+GvfJJ3is|@}tA@6%gsUklraAO$i~w@}{7RUHjBkdgi2;B#^-dv|@^aED zQ%>Oy(EnTwzb`ALk6hdVSAv?y6pi;^cL6n`nbFg4k(l}ycu(BlZ zxpWIo6&)8w!Zk8ZXkJUyEa$|0RtKk3n&x*3nfc2{+o_h;vO1deTR9|)pD?KLE!YBff&gHVe!1l@8P#%I?nRBM}|td3Dj{`A6PP)mLV+6{6n zT^Mr(No(sC_Hj*QPR3VSNP9FuQ-`VcDLl}{5%Ip8UC7FhV-kN)-G$C&PRI^FJ#b>vel`uK4Q^pLFs)2@U= zmGzEN$C-Wjdpb@@{qz2#l;K)X|GfEf2#_wPhtP9dRxekCb&!%pZ*@Zw_1s9BcY+$z zK16NUO`8@p;5SQnJiYJ4_fB1_PJ*Xbd4D13{7GoW^5T*J@TOBRGsOuxWO@ciEX=>` zj<}T_kZVdG!(IpphlZ@BFMeqIKWC!3GvMOoc7P_JQpa&|U1`Yh%+*<4gu&tB6niCo z<_y&a5l8=h$m(DNm$}-RXTSGqXP!(TRlJwk{DUh`oTt$0UL0-V`WJLb_GE8{e;(m8$ zilE#fT}mDeD0TFuzW}rIhtRLfs%X#4zq>ns`iD5bG+qGN<H^%% zvMQRBe*va1lH04894ZeM5KDMr3Scp^$ugH*65}P~K~*dHIDZbj>7s2dUc#|fJ zZsl^t;;X*iWP=Z+XZ`xiF)NKLTJgfi{6Dr?o9AdlKq`FZ8rl|QK5U%9ICvC2U0 z+jWtu?M9y02?8H4j%^s8Q9hYsS`8RR5)FL-niGXR5bWFRc1Ub+X!BEv@SRL)Dz> znJwWKQ_JlwQ)@qKX>9(y`R(Q(R^HWouyWe4FF=R(iRMt=ZQR+oq%qz2P@{^aYUDJI zYh*Qi(C})*nTD+mi|Wh`Js?Xf?{B!Jp`Ep>{@eOL*S}JCd+iVE*40g|KUu%2{;B%z zx})`u`g`kdtZ%Edv6j|FTL04ei`G-E1FiF0$yR6Uy{$L4wzYiS@^0VU@8xhz6B!(>Nu?ruak)cn>2f-RT1Meftkh6!j!w@uay#r6 zVVa}e#heZ&B%n9}D?6Eyd2@Q1-!Q#Y9wa?HzJutudi_2jJH+RF!Bi;tosd;TDTUIvtS;tH@zY1;Hjrj*y+{ z?zP3D9+^-7P6;R*>L#4RXfGuH?n?FxBE#9G3M*)ognCq+kSR(?B>1Cvm&*w`A*aG! z@r1w2@8xOM7WM4JT%9VZpnN`l$Q(;1Mlp(KVvzX=@;cbL7>M0U1myyIfyV$5nb7k zgWb;+8W)u+s6Hn*EfQukURg-zh?wtUPMjU*nG$xJED}?4h>)NEyVBuap@6Wt1Y}z3 zN-HD&5sVC?m~FCYxEZ;@YzxXnU7?V$bOYI1ftql5by;htM@5+Y#@7+2UnXX&ojR__ zZ1Kw=WY;G3blh4ZP#X*!wNcHY9xuv8(qSUnVf1wCHIDzs*q6u0Q62evEK9P5EK8PU`H(NLWP>d; zeauWZmp%7=Y3_kw&wXFrbDLm{IRha!34Te)2Ac#(fFyWxbRfjouvs>eHo*xAA;|&` zVUrL-Ff6%)f7R0?*=md3-yi;btg4>s*YDMPuU@^XZ%LW7V!BOtmp%AC+69H~idjEX zQ;?q%UZAwZtr%6xxuiO8x`KuMJp!G|_(HhCUX1J5vZrK{``#850i)!$q}Hr*NWGW| z^S&-TEw5)7%s(L`?B0SuDGj+N+R}+|fl!;wO+Y{X z`6Kiu0gaZXX_Wy=rfX~2oYI%B$d>LG6omo^Ct0*^jsU1s#zpNC;7w_YRYZcCL`~*T zc%1;Wv|f--rJ5Stx-VI!U6{&@dE^)Us?7k5EG%cWnAA0$$q-Lp-JYKSC0QZl6V4>* zis=lh=!Tbt=M`B}ipv02%aJN$6AFCi#|65)K?iXq8Lny*QQSaMJD+dUi!_ZpR57Kg zo=okFQ}V8LLi^LDPF;>S{+%4SZxV!s`qJuPWlZ&yy3IEory-S>7drU*QWdQBpz3l z*{mroDScK=kk7TrN|QX1QrqK^tW}z)g zDql6{s!92--w0wbJf~Jzt6F)e9tu>>xIE)xfNSi*=#63B?1>pSbUaPFX{mnMHqJ-xh%1Sz# zPxzf##hXGG*$8{Fk_^Iy?apBUuW1k1 zKhBguW~EBb{OTcR$K)H|$+oF-|oro)&*XsE@V2s%A= zXT=>z_#CpK_WEP7MXDt2RYPW5Sld)b$9~j)oJ!}JSRwDTI9>Hvw*RLB*_>FgX^YGbVymR0%_J>#ag-%oc~4$j41yxm}fW+GK04Y|84UUHR5Pc2Djwh4%wvZ!xbx*C|Y!wJ3L}&KW=fQa6saT zGW%%OZFXj)?S0zV@T9S3&0dUTWPwmJyke#B17luqA)=Ixke6H&2AN`;09i^KGj$sd zDZ_cU8S|Gc>ESa%GmYV>-J%Y}T~dvyQ3x$~yiKfnN4~@zHUNUtau9;8Fn`_nh5dz_VZRYOIXZJSFMyH z4K8{2P@7JL2rOvIn5)%7wOWoXZBKS>(}>|UvS=&GCo+L#Mt;9w3TVrIpC)NhI_=E> zQ}6yPF9nu(ZISX2PD?|YRD0liLt}dc@!Aa3vq=%~|zC zBz(DmbW5wSOx5LAC=3}g=&)jASGC1pA+~O5Fi@YOV)V#&+$VgKvWl5-vS~@nvTnYj z*P5#ExH3;tcB#zFRM?W!7Q3?DHOiRdQYjt|1ak@*TXy2Ii$Btq<1E8z7muhi1w5Xy z#4rCz-xH{GZ`Yb(TI+C0@d&14yv>}hfG2GKgotqm2VPu@Tz?~!y&>8z3 zfA+Uc@>r;X|5^pk;X1}@WP~;YfO7T_`qW#c(S9*`<^pjITKtF7KLl`&vA0VbM=X5VC}C;JRZm7B_N=E&q_A(X2R$V zP^zpxZl=+?-+%!794ZQ(LFdqFS916M2E3|k#%4cAX>g|~TxYfAC`;C%@Cv?ym)-k1vf=n{8`@PvjTnOjnW`gOg^83PDTdL2Q2yS z8~kWlCV5m}0iD9+P#O|sSuS;(J$ADJiXL-+gC3eoM#oOlkQu(^4=cGXe~0Ua_8rr$ z3jihI(mqmhYlp8l(eoL;sOzr&f@EZJe75t7bd?O@nNXzZD*+lIF6|rtWYXP}2Wb{*uNxiShm3a%LsNRbK+Hq$1&p zwn4iaX|$}9fh_vDWVji)2OM@5`6Be%)9FEUQzz3#kl5ABEJ6==F(Yto*#gIHNiArU zS_pK=1q^;u4Jz|sywoA|^)uka6Y+$4uYA2=H1KYzjemf>SK7GNIC(jIY^EhJWG%9) zj8AU_fN^QcjjnmWv=SY7559FS2Zg@*BwW@E85Xr}RMD^A1NCnqK6Jbf>Tj6jfq(_X zhh|;wlmYy16ADzOLp}!~bYSuWxTzEKW=nCd<^JP?(lwF+?Sj6`d#~@g8=@bgcZXj&))d;-K+MM~UrlGZD(W_m|SihKzj=qVk+>`5HgoOXsE{EZ{ zdoi3db8FNlriBZ3)?8v3CiY;>2UP#i($+~RCM%XhYXx%2?JMNj!8MRqShJ; zWwM#m;DwykZi_nIbwGo8vP_IEkRkkUXx5& z^Olscs*<}2^wC~stZyzA-DG=eOA8Hzd$*T?U^?3*2`v$T2yCX@L>cp{9eHoiTw$dt zWbFe9bIFH4^D6=Ngge;>0swPqvW0-!YJ$m1PXGW!0}2~kw5fD5h0+q}2@x5cIXuz2 zW?h3`k+c>6a0kP$rab;<8<8YxO5!A?qQgpsFYS-ZS}MPhl1VA4;@mZYIx_b;bo2>h z8=d599ZVaYV=F+dnJbve{r&H$Y5yj*npiv2SYVB@Qp#mKgTSpoq} zwltvk)dTKm3aZrstbG=OK7u(ETFIlhQ*e{sOZ3;J2mZ%A`uomcj`Pxi&GQ%S2=V9Q*UuRxBra<_E7Y z=6<+|(Mkpkdb&nnQ8J6$9XMmu%F*a0FndH~bm$VWi&{kiK6?oRRotagZ9+!WJ(`jY zXKGS1hW@&l0Ss6X8R}FHZ$k$Y*R9}kqYR)o*(Z4nSiw9rg%gzuUaM8i3Y#4egE3^b zFvnkHVY34j8Z}Y@j>q59lX%fe0ZSijb9JIzmfl(@t4hE(P?(FK&g_i^wnw zqOGf{VQ$5xupkeZ-Hu8Q4*{@zu9~pM)e4lq43_!j(TMCcnDwr~vq`Vfw{K}Fp5Z71IkrWE4nW0UDT!tymn>uRobLjLxvRlzR zH?-%G+LsEpNq-x^B(~~+HW$exEu7KnXs#=pfdzR7Chw!6H&?9T~?CP#l2{+ z1?H28+771t#}5~wqAxnky={RmSqtF3?H*My-m;gNP^GC@*`}*$(yb0bd#+~&`o%l} z?&+OVnIZ1G*E8zY{8ob`VSXo7KFUpa)0xzSt0+^b66kRgv`0inrPOAAbey2~z!$V05y_P9q_CnocNZ7ETJdlp@Z5>1v7c;m_#Db9U zQ&)38aq;7Co8$p4g+|sLP92LCW!bnYU@JN>N)Vy*Fc9!5;-O8cPn<)y8sr}K@N0u( z5a1px%yIL4JP#B9*``jA<-|jEQac&`~Ee zNW_DZ?2XphV=dP)!OO8u^4Ot5N8^Ba#t@ov)0|R7OCF*%O$O1h59Ek=Pz+#c`}pv{ zgYiKqqap|cJk_=^%)pvyJSp>59I8B<(38T~JskvLA|4!Le%UT!F>)wzJMwo$RB9@@&fCspm`~7v$gtlUt7f8&D-d+6Zj(%wG>B(@L zp74?Uk&wsO6lRi7;g1`zV9}m3Bx7E`A}h4;ku>zbn1=@L0(kmNVVLX6@Z;#3wu)K}#oyY|Rvx8cOP{HYCWoJO*;aJQU(2FcD7KI|ZxtV2pvdJRVn5Sn7gwpjv|< zEo*^sCuu*Fv~MZ@^%tOw=F(}^s_rx$KOTo9p>CFq1rhR(L`K?A}noPuHmT)DB z339HBFoS*4IV^}XT{zal?c=^1f$0s~pnJAC)nug3;w6tf60*ATJ1%7#BY#3cpVwUxbdB~Z7pwU(w z+Y^$~AouAKe@<~s@<^t_x0$u6AWlXMmLM6^C8O4MtL_Z(9WLUb(D&YG1yio#-VE`d z7oPNkAYtRnsj?%$OY)A z2|{Ug#^j}X)?$*kJ`+7shlwuYfxm*m4)6VBKi3UTN6A1_S#qW^pD!I#sS`mj#KC5p zFmz%vI+p!}jeDobI3)v=Ij=|(tlOisMfE9lErcd+fS-uT=xCa>qEG18cXPkI0S0Cu zZrAFQSW%j`dp(vYW0xVtjqp1$S)z*Jl@a(WX6L z+6fg%u9^+d(?F#eUjQo1s4@Yc5wqncau6j}JNd9zwIuDPxMjDc7sT*XH?#L_lKx_JGp25 zJq%wP+$aT=soV6{8t4Wb+&rK@P!5G(97g3BtvD~9aQ=r;s516{Bj-WCbRRy*bb%gA zynUM&f34Ti^^2YZ9c1ScZd36TxJiPO0P@*htSY*4EkGn{a#J7~^E>ej+Vm0_XkR`A zn}mpmLfYHG{219Z!d-MP1N96@Tg~T&AZu$QoUS!PfRfC95)MfsG7pe^enjDKKFL6A zplz~+QrlWEQ+}5@g2Nqxk--ZzRYj)bAVx$*hqMOXoex&%iQ}#Fnq#sB`6`?;DhWS9 z$W)npT|QxpOKD`d52iUGB7<>0wUhhqeb9on(b+92$FO=RrI-h-P&}nGDOxKT#KX@e zqf+PxV?tI^>@)n1ZJgvmY$L7rCqph-ij?DV!s^75(L8$Yv&`1MxkPmA&}neBTC!^q zeLwRjbTH0rMeffr>tKJ3%{Io7a9Wy}q7a8Fv`{lNBP^?%AO=f5XZH|4hmMB6zvb}4 z$A-Csh~FyxlK>Fg&Vz)^2bBYJ_~UXWpRUDqAz_e@d=>nE4}A{SeDMS5^qPG;xsHE< z&HM14{kunwK%JR(#Rrj6%qYw!j(mv1%+zptkhyl1&F5@@rwNKUM#w)Z}xC7>Ev1AIS_9%+KzC!4mqbyaj?|HJnqc5)*XWi5np9|&~ZE#Xf_x0L0PUej4;$F<8wi0l@7{f z%=-wEbevp?`nv=54_T0pDwf}aX4bcX;)1SUONt$;o;wzQtM}T@!9Kn+M4)xV&A@aL zPLI}{4vN>(0T$dqd0VuZKo30y{)f3_bn4Tm#?C7YIQ$*qK$HbB!s#kRhAk?5B3y;A zE#HKfk)fY{8{AT2GUP;OujI5(!ukS-v*PT}y;4^g!>wkckV=- zH(Hm3tGRz3<5w8lWO~+*GGTISFpbq%v_L3U5vp}mpN2(JL`BCeotrsuqgq`LCAEWh*RY#`=v>A-Phr*A~M1@e+f=i?RpBU zxfj1Kcuh*PUK5kUVhd0B>Q&68Eb2%(`qVTG;anJm-nS?C<_Tg4mA=n8*B~5D`a*DtJejeHb33_wM0`mM!lHm{+`96OK;+U*}9O0~m z2k2%PuR8It8jlxLS+I-v@7n!6Xpe}8_TQ6$gTr5o;EDepe@He>^1uYb1)Dk-PFo07 z(+W|{dCFFd33hJm6{dfgh=(NaLOFyRx#Vi@*;g2-&U%2DaTuQxJ$VNUHu%hVXbMhI{T$MJlIrXp@^|yrIMW3x5N+r{|%?KkoWt=VFPa zV>5ry1Q*5u_tXODjlC_SL1t4`3C8TUM^h<}BG%duhS!0+^t?l&=oxT9Jl{TFxAMgP za0(7NBYUPKAXG@M(x-~biq)r1PQ=}cKm)!+yh2fBk{TB%hHi+#>1> zDZEHDolwh~l*cn(0=a(-ohc?mf=Q2s`{|Dv1H63l#@Uzq+(8wC6H1L%ud^i~OYO>^ zz{^Ec;m6dcnVOmgU9RCiC>0C)7ubGt$?yyKYN*#X!l9Qy$=50-`7Cvz z;7z64C>R4QgltQpzP$|{s)PO7`7*PjZ!QO&yzZCa8*JY>u0VT!zxN8Xizx_t#r~Yx z2(H?_AXd15Y{)Am6KMw+^F+$igo=T!quuv@&J6U;W$|SLVe|MTR6iX31wR9=lg(M> zY$&7?5S&h{3Z+^(luQtUnEQSSGf>2XVsf{)^EKc54^~`>Rey4k^TIN|XNK1+2FJqT#Md}zeO5EoXlBWPqY{SL>To@as&B$TiKv3h<#%tw7>$Ic7J^O+E-$M* zVzL{}Msuo^$9)PKIp2aGi>TdNHg!;MH=Ba1XUv+mlIY>TwXUq^D}{4IZH_~LK++2U^^jmsj%KQ7e6wkzkg)S?jD@B!mp6@=1!aOxo85C_?s zP!k#ICs=vY{^K7&1Lx=d|5^2aJqx;+UeMXU_?sP9b^WU6_P*_sbT0~7Dn2AV==vur zO4#0hXOoi2$y8I7h*4H&!-dYIVJ1HyVOLzpI(_%vt)LWv<=j6dEcoer`9-<4?*=mk z2qKTWoNO#+sVg8z1t#<$dTTKYetHp4xM+R{yKaCpFJZwmZkytv353H%w4AF;iIOak zPq3-7IUM6xma%>@84bLYxDrBCSnzw;r=WOZ+w6?Ny^oC4(qurIaN((t@HMNt*%iw~ zEVL(t_vm(4hlwT*-a0Q|JpmpKj`*}WdxBH}@2Fw_;Dsl&dUdwMH1R`=_%<7?oN4S0lcBY^52D>W;6-&2kH5#;ik^^Up~*YoMe7cjrT}+f28|=CEaZuh zy-{)2qedbJS0U`+MqIvw#?JTpd*?oePM++8>B~ng{$qfJkj~{WxI&LoDgzUcD(o?7 z(gtya?UsFfgdOag%Yup;a@Yf(W`?;pM_^n=oKr*4Ea6N-%CxZ}CY5ReiCDqyu%koQ z!IW7(48tN~p<`co=3I#B3XU0u_N=o`4TCJ<6kJqjU?+^2!f7&WhcZ^+2IePDaS()w zc<5vkYB9GCCveBu&rJ_P!`51+R>J2A!V;u6TGZ+7^=5>?Acps(6WX zTcs7;>b1NM+ox8{%BjkWb_bCPN5kq!Lh5w2cA-J^+g0#=A|8^wS82sO40F2G=aeo3 z*zmnUs4|#Y{LP*_`gU}kZd+@%sdexgVPL~ymS(VME?}=hX&^g9G_<;L)fUh>F%O-3 zDt{$c*#bkccFpWS*i)&z52F$)sZ51g?L=$BLP6>6AVJInpTH!|y}4cZSUw|L=(H+k zi4@3^*KEnfyp%i}5?b-wtsq0p<8f8MuW>2Aj`9iA!a7>078^MT0B0drCtI*X(thX? zb_lJ-+5TlB9z@Aq-@2$A=4v>!1kT@6eA2Ygl&B`a)=46-)iOr#7unkDm~IsMUBpAm z?lWU(AD3LoeQ}i61KSh;akV?v)s#EqM6_awd!qVcvDBJ^h`j{Fh*(fa?6vlV=c!Bh zo^ec_OES+zNgGMp9E2?>$14hm)@zN=QpAbq5qvdm;xk@Td!PALpUrXXwe1S ztu@9P0i}Y;k|?TR#|ADSbN4G?YAvJ)^ec+pHsF*qE-&HFlUAoHWMaV@UQa`xipZ^l z6xX0xh$_l69tGs9WNAO-6HK@ha9?}{{6a*AM1tRg+P?qEC7kr(D^^3RH^Av4colnT ze?=aMP((1L$U0&Z`a)4y2p_%*zFNdW$9@8_=LbJ?#Uk#x_3CwPA%oYjBZqgf%rFFM zLUH061YANyV1}?l1uCl>uEp=%#g46y=+xQeXmy1VS;7sRhmkkCr-jpo|)u!Md zL@k0d9Sn50DU0^1*v%{F=e8;_b2lB2?`=ELZ5p;`xT(v+{V0^Ng3weS2yFW8Jp`9LPn9~`R6CmL&rjY8%2K%esnc=ko!PbI{0(| zVHZ*11~!JL)T)3E$4WX!8hzsF4ib?k-_a%vk0QMUXRxV+)b2Ma|xo+>FzwG_JdI(DpYE)^Yp?*YEb>! zcdlcvkzC0m=q_0R=-%sKBfF>PrNw8u<(+#aXF5&-1NM(rfPCv9Q-L&9HwH;(MZ3Ji*6m}9^b?7{qiY3oK^s~qb!u(i|hRHxQ2-*eG?FE$cs4>f$kFX(6PIF zM>#smLh_Cd%lnMDD;@W`qV_bNLMX;=Stg>Qf%or&tMHdii?~0>ShJ)*Rm)ZZ6fra5 zRL8tZdm2q7pjYQo(Xo;L8iT0yNhrQn2@p5L0~Gg<`dW-!?T`ueqd6E2xmhQKZA@-84G}H;Hqp z7lW&WMej`3SD^kJ+r=3&>}X4E@>zDnTG0aM;c&fgL1A!Wdimob}0nC9@j5?68#Hcum)qMi>3tqRkz*Ed2FC zO;2>mzb(0hcZBU&xafM$dHQp|lt`eI?w$_G4o>=7$1=&`iw<8ZqvX5ga(Nt!$YSF% zjEIesFv`=}qdq}>6!XQ^s zMo4KnHuDEU7ahjslx%lQPAa5P92=LzpCDTy9j6shY8=C8N)d)6$`C=!%9ie+6;c^G zsy}Xu*AaE)ipM8~LhXNfzyVs))=)7;hX&FBI zCUn32cIY2`HyM^np_B1(84fx^$|LkR3?)8})6%el3PVb-6av><+Covp4oXU*li&R8 zy8lh|l?q-owmTA2L^0?fzPa=`NkPwqL-3|(lvL1>a3~~|(zBwaJ4l>HC!YY(uYUHu z?u*a$52WnR{Bf>-MsCid+>!h!3Gb1|!Z9i;C&uG3P#jW5$j2#O>%*}S9*)YX7^wZs zdld8zj6f3Z?E2PgX7v)M&wCAOQo#RIhlZgh6!CFd9*GhdbYDCa zos|r|E(PUzY$2~a|6iYwZGD1_lJ1s==txAakdMnl@HR3MrpBqTf*7ab6d8|DvJj2~ zM1n913StLAlISSMch!-%&nYQRQRmGq{}ucH>b{Nse;}e4^x;dM8Q0cMq%lZ({gxM zC_EmE$7KXeZAu=Qoe*-x4h+5aCm4v`UwHex@dndu-tlg>I!g{y8iWvd441<~AtPbD zL+~+Buy$OkP()%FjZ=}(%v_+Q)DBP)1v>dP%gFyWrT-!2dyCvHi-(9f9m2nUQWlX?p?DOV9dKH)Ln>3;k8R?Ye|XP%^WnVrpkLs^f)|eBFlG4#2v@*N z3&D3#5gZo0a9k>thhSlaL2j!lP3({>zzTkE^t`!zp3rkzwC3gt3O%CVic_*UCRY%! zI1`}zq=F#E!&r>p!$OL9EF6}HiJ2avXl#dqmOkKI%TKot9@2NMm{}w!`8fqbYhkH| zn1tQYSQK^`m<1F@!8Q=aaabeB5Xi^z5UffR9zEA77_1R6upuu@1AeiV&4`|Vu@(w1 z99qzk=%g3F(x>iTDmm2ijb60rs?4njw&wTO9hjKnbG3vplSVZimJ)QmL9!D7%v407 zuY$$)DHgnc7qBGnEge1l`^FmXPb}}iwM{{cYx`j1w}dS&%$@fXjZuT0!r_q0TYkT3 zg4ajHL;HX5EFaPcZVcUCFx=rRauvuC<21QIiw7U`}c+nUfRXPie^+Y=8wR=AolE zsK(GU$LlLOrU6#Wh;?cw*iOPpOEW=J8K)W?z%iXW2|+2o3K)lTsX{o)YlELz%S~5U z2-#66o5eI9a$!w3Yo+}p_~iJnxVi>r@LV3msztVdhxWcT+ygbR16M2I&B7^&qI`yM zUQ6Y?wj3X7{dftiwz))fY7@AXHhyDmCpxkIfgx@a!&}mdDHZgCaDK^9-kg*y<5foh z!o4*1EPD6`FyTaG)PL6!{#Jf;5n!~l5U@>Un-dr)C`Nk$hQ4I))pQh)jC5yOY#lLLq2LBW~cR-A#aB>3IgiU^}*HAL};^<#v zn@9V_WQ36;qlcL-s~*`L-z-5lQI~8*#>D1zBRJx1T3O3RZZY~Wh%yiMV)S{(UiHjnjRK*gSPZAISb=6?#`T#s!YStFd@qzn4Ay$3s9>iOA{ z4GR}_$2%WeAU&j9iKv^{r2{fW#1$t}5xGlai8J1b5c1vxgC!;-#La3@HkIjhXuCVa6nhAz7qekLX(<$aT5+-*0rkcsD*;xqBuerIKnVM!YlKfxV& zNbyv_K@4;p%2Ez4E6nAgQ`i-wXx|$*jc}z~_`{Q8$^>!*AE6J++I5&ZPB-MFHfENE z(GP9~AK?XLZqaRRAEEhnc3Z!5st) zi=5&UG=+mXJ)wE5R$)_`R;wKWlMXyimGo-BXDC)ve5)>5CL$xr%cn-U?vD!{%I6abQ=W+# z;XF{22V@zAijC;QylW0%;qQUghgZ@_*CIw zO8{JD4O7S9%E{)f%jy)Gz7JX=CZqjtuh_!f^SkeEXnSidh+Q}0m^zn`Xt5-nDm)&O zSwm2eUv#Mw=325Yc*7U=e4_+&|;7-u8KR-CAPG z3Z5H5hl@&;rOKMT6DArDMieOed3JQ^93ndO1#m50)1Vh~|Mq$IDsYt%Q+zU@qUGVj zY6Uxut3w8jquDHna}jhKf{A(_yZ{rL4G`)BA{Aj`WLdlZV-FrG8 zhWgjaLH>G!&ovWt#ug4LN?68MGqOyCs4*$@?iXOR#bhKo3=aC^*TY>)?2Dk(a5=@N z(FxnROwXDF1eJBGYiftZkwj;{0R4y+$H6ftqJod@mMtifI&MSmudx3d(8-(46jmq}*`x|Cfru=>&J3a2SD}d_9xBm~ zj3WC*w{~&QewF>2WEJFuf$`_5LE)mh9r6d@Z@3|F*3g|#u%kosayiL+Z+${=z%54( z60VvMN#s^#?0RoDkdD+*@f&c{F&`I|-U^;~)6u;tFw-ErMhlk|P6*F35?0((w`;6Y zzH$^VYZYpKi(R^M{zo9Pu?m+AGuJTw*=rbpstD>Qpqv$aUE0G#0yP3@Z9`D#^tajN zD+BXB!X5hAcH!z{U>Gn)(ssR81^~A;xPXDWSWbZIn1KBSCdIW+!S%`fPap|xX*UY3 zd752147Z>FWRC~+PAPvM6lhxOaE&HK(&O-T-ly5V!FirQuTAbdueUnU(&Ow!aHYd1 zp#bzqPK!YwLuy*2Y4_=bHaVVVyO7~H+Y9$P^F4;Je`(BI$-KCr&(!gdMps()l6cKFfFD5c=}>*yVk5S%R`Y^VJ(y zavlH9LP-U6IMsCHX$2XS7ecPIAujy1@jNKHhzDgAiV)}OgnN^pJ`c+%oK?cGsS1mm znf7KXgo}*;Xj!UZg-@M??qB#Uf5{+b?e~0qGdk!2IeVUk#chpkDg<(bD|3G)4lsFc zm4!+ay;T%C{=p#n5qwOah;j7Do-y>pNABuIUp;=;a!&Sd{K7^}@o7{-RIt1zqjGS8 z=}WmtRjQ;8BiZ+1T@sTK_CJzQ?%?#|2 zTbCU6DSkPtSTr_<^ksZd9Y9-4X<=dKzy0_$tj8iAqzw;`qMfT(c5xT|C!AbH@Tu$J z)30vbu&_ogMrO*nT1Z|ZeNIZ41&trTAkJl>lmGGGe2^+wUr>z|E?Ble4f_RKI;No# z)7?Ekf@p#3I**=%rsl6&Y*T!ynlMz6geh6Y%WiF2$ ztWx8yE!@j5u@<$Z6?3bXy zVlqUsIH9+CzdVHg=-Ye+^86S3!2l0?lqYqneArQ9*=i7?A6|jqipdbf1W7X+8@f*J z-(F#_mJEZgES7wKL7$aT5UDl2x|o zcA{rH%45s?bEzmKdwDbZ!6SDqMsN1k`Z;n@8N39}sdFhaBpq%<33Wm1k419MNFYU<}s|2mWt1-C(%N8q!vOmjaQeaQ~4wk>S-h}8y zF^~UZxJ>(UbC@&!p7&V590ozc;^UU9DJv0bGP#&hVJ%prNcI}EMMOrYLW)szHeFlG zefc%s6ejI#&PD`GVS9tN>ZR@o>i!jUwwNqbhJt&pZZ7>R)*u;(RZN)#!PX;8(l0Zp zOEh}!b$FeKj3oDL+9Lx1D0XRefa@7M3#T{7R4bvPgu zhmJlcA3OY!&n@EK-F}u|T4hsv;fsVL6yY=3Xp;5&BXAL{t!W^UW=VN;nTU)I4So$m zJg*t)NM(~I^Hfmhl}m9uI@tkT`($rPqXd&LQG@t<-rQ=UeOH|w zLjUp(+YdJ1e2;L4{I|42W;R7;%vuO10vj7}10bBphC{9|B!EBJu5OhZ&5Gznep+A8IdHescONZutgxg=|+SWhX z^(P4Av4I&1H9%!{cL4HxvyfjfAsFo-XmrJVT;6Ekdd|Y$bI!u%i%5AeIDbGQ0aO&t znX+KmlF0iPJ|qZE7#DK+go4@FtG}@W!1<$pYJgJ|o!FKV7(K$+`u$ z?r7&%I^N}1FLLC7eYz7Sg>dwb#@u0@U8Z64X*CAv!}*QnEq!x|=+tNZqulp5mahk+ zc)A0ADp*=&hRlE;J;g8?hzv+C9B1Kd*@O=t`x3?c$#c>ydhObjh^GQ&`j0B`> z`2>c`t7VN=H&gDS? z(|?R|uWl)Wv6D2|ifYV&+Y~h&oox6?RM=P^+91Q^^7GT^)pMUi8$WY+3unLUmW}Og z<~x^_FCD;bb<&A7$V@Dhgv*(t9KC;8d9+_lZaM5Y`?fL!Q^}_JGLwRnl)~josH|a4 zW|A7au|mnvSGJeO1}-3TuWyINh4+tc-BI2)plhmiO)Opw5eZko#O9MIx&zh~F&XXe zd-ziBxgF)J`E7NYPs|iH#EOSa!!wzAzFu=UIy(H7Ja=}mNn~?IgQ=PY76ExipoGc zMAQ}_9rui^4Bl_h?7mseHk4G9it^KeGOe&cO#$=<1-}+i(dp?+pp@8q2bObQy6lql zhqSbzj+s5U&se2`HUoO{3Rv+)RN<_6;**j^XrJufA#TT&WpMjzgP9VE)e{aiQP(OW zDtM!a43Lm;NP6HW^$~8-)vb+tx@UG|(v^JNhDY6MMXgK_7Bz}p0}@130r{KH zFX5iM1_l>)%4t49QRuXKAW(y1FjzcZFI!St8;*uIgA5TF@(MSAD=+Wu;_~HN*0y!} z@Mu}6UE1C8=7P>IbiCQ}9fFPA{gH(W(Gy30PA=>odOY^PF0BCUm6YRpluWYD7oe2|EY23CI@e2PC%cXPdD`AUABSqUP9bw*nxR7JvS z#Nz4@9;gFK;}u4JWag3un8rWeJ}2$&xb!3(}DcQPA<&CJ^5fnK3o_fC`n{dPX? z;pcm2AVT!+@&JGWC)2hj0B}I<@Sp~2iKk6zz`BJHokn>Ty2D*wx?;XZI0^C0!L|o7 zHPalcJ_xlBoi*M%vbradfHeXi3MjBGSxs-bZ)n~p(Ecxcf6LcTd^8P_;C^URAPv85 z0!~R29EN;kx*m{u!2&=&KXlOi+?nX+ApAb)Go=799NcM;a|!h!Z5pT+$#<|Z2;DL- z7aiQPq#gN<)?8O!I-Ju=ZF&Fzh981A4!~RjQUG+3q06r?uew-qUdFv`-Y2=EhJ~~C z$MxkUtDqksR~2$s-5zj;LOnCc-CXGHGDUbEdC8L9b-yUoE`q7CU^`UP? zc{5*bspiW>OqO^0{Gn!?L7^Bl;{xjbSGpiXy9OuYpT+pCd}8`yc)1Xz(M*`_YFsLh zvP4#eV;Kc{CkZmdWOVEwfWB%^m4_q(w*GDD@V!(O`S_w@XD$-?f-I&~epC3|^L)(GtUd#3s700Kq?8;RG$s)#uk4cN2_C5ap? zG*U!GM;|qsxEG)v8~DF)J((iS(!4QP4_i`=IFeUjmA;UCNCqIqPgTkjlKx5^BW##Q zWp^d)mWaEGMrttL7f??c?lf}u*Z8+s2(vd$dV;h{A2wxcju^ktj4cz90Tgltq;6e* z!zzw#@IO;AWHmz81Ad?1U$QH~Gx>58ekLNL(@yaGoIO=v%~|(?ncJ_-Rn;uUI-}u4 zqT$N8c%2?ZPv206iWzfRP-?0Ru9H81T_?BXqp99{=l0VuXpqDP=8y0fSl%&0|o0fR<-BDgj$g_8_MwlkxroJuQ&^S zrMYBuW)0+X-PDOKLf6t~dy#)F_$EqMp8e-QN}Ue5@B;LuBdsWB0euF})qu${myC{F zVK;LByy`5VUn-{gG*}_1!XV2}=n1^)w`Wr2l)I2X(QD3*t-OFN#E_rTm)CONfd>Se z$HOv)g4>?4W<6K|T#1C#Q&;-qO$`;f`T!IcgtrI=OCt-x;iR2*M_75jq0?m0K0S1w zh>T7hx(y&TZigU)SM^{Bwljlq06*{gM(@rJNl#?as}g+iAwEfS4UCX^nhzODv^-7P znmb^_{r*@($52p4BZlt(7`#G6h8n*&feUq5z6ve9tNeFi&ARMvShIrDkjv2q*N8=> zg#@WcX~?LiVwF0ejPOA)QQp4|)+{j(N%ZNRoac7X(RI#gK2Jtiy_FUp1mcy7%~DFL zNlT&l@$tBT0K;pYfBJH0Qg`dtBPg%nX(C{Ox_WiI903q`8xX0SMDo+7`SEU;qrq6;vR1I{(l~xr}x`n5WD`eJcN#Xy3FIe z>ENDJ3+AB*P%Vv6Y#|B$FJnz;-{#Mh`&Z2O2s-$)>Z<<}f9~veiqf-ZM)LIBT(gb)aEj67& zXQ_wL$B)CTIP!RT*)kCi9X%)oJh{g=E#vXj%}baL+XjVJfy_6 z6LD?9XHpd~8udR3E9>1)z=9>>p^!&5)&>O%{cHK!evt;WmE+Za{Sf8gr0-R42OOYp zl&@V02gyJ>nug)#% zMOue3Ap<%xrqTa*>fUbp6|V>Xy;iTc*4gKtI``at_St8LZ+{NL4oSg)(rz+b!vK{lXW&gdEuK{(#s=U8@)1y+m2kU-416;wR)5 zyRHr-fy+8w%%pzqCk>KGy-K3?#Q_>oOG8greU^4cONV53xRjsA_P_0W*#3Pq6d!t8oaPtck5J>NQ z*Rb&Hy{&Bz-$4YOclFg=k8sCeV;QZAMsD$vZ{Vd$Ni30I_TrEQgn7X^$^*&`|3 z@B)6KuUR(gx+smB>~Z?-dJHOV6f9RD^fySF})ShD!tXr zK8w}tqlqCa_kki=D31KB0i;XsDhbXOEgzne+i#>&6?f23WsP}HZ#4Mn*Ei!vGJbq! z#=kyKVlLdPB=lVTIOSqNrl!@JmU)>q(6U-eXdl6$)!!@}z6-@A9(xwHq@NwRda?WB z5n|Kvtdc-{@k$aSb%<%WbyN<$Cth^Nd#|@ofy^xCcsPLme!}5>OE?b2l;6z&5hS}S zx{Anr>AnQ`9V_s1Gg_BSuVES}q42$5VTS$9$5l)){+isEBCAG>AzpU+4y&UF+2k)z zaF7XAU1?`G_e*lc39OorA@;359mIoUNqEzXjoFP34#EAc%{#l@7aMmEEYQhRg{OtG8%=>8s zwIA1whyJ?}g{?JN0+=)cJ{^FP%is{zbPxba38(+DaT3jY8<_+5{PBbb$nYz; zEM%x;fuogFAq_~X7K^yu?khy(t#2kFyOeZj-1aAOXy~&ghaNGk#5Inha8dYyVJ&S7 zvww!AbYrS;WZQ$UkC`VOorg9ZJvzxP#Ho+waAT4=aa#b?2#F1)g?&nHNqF=xxFc-X z1t=JKn{d`&Px$`V{1xx-&}y?BqjmEEx}!zP20|>9_?))C;dA!UNNvxfI>aSmxKmF0 zdn2+=!EE z+CNSbAQpt_8BVfooH@(w#T~zf75gK)fj zX_gx}D&FQeh_~n}@)x8{-?t^i?Q&qFopN#4H^DiGP$Tt^M4^_htE*Mk9%G8AgPh5l zmEtwjIl?W>_0fcZw}xS-F1&qb_tPUB?gZ{tCr(gNra81>C8u)LD~6`7nnOTrYKQ|~ z__|inz4>Z-$d86N6cli*+K=5VVhvl(pUr1l>V%?WPYBhUU}%vuay5N?xySXrgu{Om zt-`}yyN@UJ~#A_J+Ri1w4IB4 z$6z2J*Qyv7Nu2~IWI$}X1BkK8OS+9IK8Rg5NXhbcH zEn$SdW?|nW7f5#I_7aBJ?O7!WAtIL~XX`_-f$LQ?-mI1>-TaCGwVpm zvHSooxR22{4+xi@!Z~4(Iy8Osu!-h1O{d8UAgKcF@&_T?Nx1_c*J7|G;iCQA?6!@& zNN}}9kiS=@0T|3ZVD2NWdz#97>FaPV$Kg&XH=O0>(JbvAb*yWBNrb9c=3GYZ|Gx;GDU4WbIQn=Ydt8Y10NNgQ19b>aG^@eOl z3hV6ZX4KdYxFwS04pBs?4OLZu@z~q4tS-Rjtf<04w2p+FTbS>sA@Jc>7j?fP$C-w+ zF^)0Bv#}X+S(_B)irO7E9mOs86rx4pF$!$dM-%qF)6}~;b?MvN#G>2=ebM;La zOmdWVdE@-Wxzh-7QLTR6ABlO*C-`Lt0j_An-$P(3XQi zgh}*-@J$Saa386Mye8a#((ZYbIB0I`zQ}Mr3mU0rCi)@zcGJyHLsxG95Lt2>@7o>9$H$S_cBrM!B@oL)2yzt(;3g-!P7jrL57t~wf z+#8!6xp2BYlpDBp@{8lok)Qxv3EDAkW0qZ_+@V94;b{%K(2$%GCtsAbKnrw?CC; zmhD=-%f&WgNfo)$ZV`Td9+aSdnsE4SQ-HVpR0nB~jtjVxC4K7yn`R%Jxoqg=sc%j+ z$DSMbz$j7iuO1LSRO4nA!id1CGs`|>&0~_qbDTn`@Yt45)WE=fG(mIS;!(TpoplbE z&5f2D*X_RM?x8A+d*`C$Mv$tWGJ{mGO-`E?*FI=7_u~2zneE%g1hJIgJ;2|5b;fBy($Bodi*b0J*oW6&20zCmw5s z6nXoLTgd4ZUacKFE-F!~lV4Uw{wK&-u=;C z-E#|=lf*Z|rjd(hRbz`oh!UKB>*Qz0fBk9z9LW$7wV#v*V1#T#-pEu?lf-DGgeMPS zt@@gUo39GK8ke=LtGk0}K%P}n*GIgs<%{wdBHB?tBWbH~$Osn>eGKFDH4BF?Na4Ga z%Gp(E3BI7LXqt*C#{K?em>j%W3BrKjy zm>d?~M|2PODu+Qu^(+yNa2h723RGOJk}eoh_68N+`Ee{}A5EbC=dZBIIvZocesy5Zjya8dUjb|~)vbMsLo%vi zm81fRqjY4Q#wW62OJ ztx4`aZho$hBnJ864vlm7K76o+`!>yd2Div3Cf+u7-N^fgZXXb8SB5U`%Jz&FPKl{tFT{!&c36KAs zU&Qg>C#Xds4hNi!0<`0CYGz-*ov?64Q$$hMF{kQQzU#l2hI`$p%j&>EBY_WO1-BGpNz7WbT zlvXjp{$@e*=duHdtoV%uv(anzFo|j~%(}eAN?RpryV)loGW%!(we*W#;3vex6Fs$D zu}bnLbv-eYfO}FwH(gw%o^@#o8c79=-bG~ZdYTa1{oVuJ+wX$JmCi8rrlFW{_rXAWv#(rC7HG5Eknyh1$mjHr1j+*RZ5t79_!K9EbP1Ii-^G? zE~u-YCkD&t+R(8fqAVK^F-k?Vnf0==6x5!de-%UYH50W*AH6+i#vZoW)WYTJjO@Mbimo5<(8Z;WmRT4 zdqMc^f8sOsHw%Yv{iLH?{w3ifb`3^1DdLqjdtGjY&h6nVfnqHpC*lzZ((77boaS`96p10x?-w{#ZvPFwQy)!;37-`eu7`h1Zi0ce z(PPd$HqikLXvINi$|`fG?G~y}VwAVN0AtE)NQZy2?Sk$zFJL8i1=mOguaO?d6dldV zvP+@t7)|!FS|Mm&d;P?xp9~l`XCe4dZy4HUP z5$#g_tUgu%hhSD4bBGje^QQ0P*4Fp=!4=>9{%g6S3$8#(?+5=4mo|b5??jA^ljK;M zJS-f9@@UCe5Le;+r(hD?xC_A~k&JcsJas~$I{fe4!QHk)r^3#9Dwb+d_nIZ`t@i4_ zZ?xL6NAFK}=f5^?9T0ANn%u8Kh@kW1QfWfwhTegrz(NCgM&6t2=@h`;mB(joY}^~+ z*Vo_pdUq>g)!lpa#u*8DWDy!w#ZiY0Rm*|KACMzQwkdr48ScR1hD71HPRlBs_2Uz+ z%QZjd4(_rYI{DbTtml><3vCrFKjF4)#7AN%(!occgBS5xT)SNQV!^35;<6b)1~kq{ zzcGtU6x85)7B}yWsjz?PU%#?$FShU!esptq)8PFu#P68AdQ%vN_>YW?5w5+2aP67L zxHePJEZ1qL%^J`II!d*vD9rsCd+D7oLC;%H6CMbic2-w*%O04fFZ(?>w@>Pb!U)kJ zN?@HH?;q>y*ON}t4(R?j7hQ^=P8!Nw!0-XoY{c}+Oz2LFjrh(k-8Pla9 zR8@_;WG;t?6Xo+J!hdX`L(-Er1T_b)@dgB)on6ZS7dz4IuEqMcQP)m|@` zG^|O5npHda?YoYzny6dfMY!rg*m`j~?dZOD3=>)Kt5cRb%Xl0eOTlId$5P^XFg?L9 z%=goT2abFk;6t+V|0^isSlbVc}g1V&GL5fmblmPR{as zcKg?+iQA>OAnP}zxL3Cc(OG_eqrFNjGdsH7S>7@*IXQ9frp7>f)7-pJy^`I!GG`x; zkL$+|jE|4~W^8rrzOkFemIrfV{xQYO*C+pHZ2Qa&qkkFw$>^6xZy&vSG&yP<{P>`4 z^o-HTkrzh3JNc232S#og;YLCu>cP2@UBmx7{IlW1!yg-b}V`1nv{==`BQgZ~&127K+o>t=sHcx3M9b6=hN#N73>x6XEE z-#mNK?B3bInNJS9Jn(~=;*4wZM>Evq%H;l;Ez^IT{^9f^(;u3C`}Aegn(0%gN2Y!` z8Jqgn)IC!-PF1EnQ_R#N5#;9%4*Wpar=fO}zwSMni&i2XZ`PqFrF9@oLs4Xn20AW( zF*o>^Jwq1`0zCq_Y!T#b2D46rSq1<&R2eD`pCnN!#IgW|!&->yBfy9tg>|f@olcP& zXhm^Di*zjb4=6OG7bApUHglasmBUuN0vHEJD}pr2NC&|}p+IviEs`A_l0WOfEf(HI znIrE(ZfrEW+aXe&RySz3;ev4Ba)ca%k{ z5%uYDu>`oD%fEtrSzO)$`X=9D70FnS5~}V1bI;im+`Urv?9$cJ&{;suWeEleo*@oK z2wQ7z$0Z`w15q5r)G{rAz9AaRf@`_4xc$GSk%2DaY4%_)XbX@uoCU`UZO!dG_2|Qq zJVLkpS=`+Th6#W>IvILNc8nTA!fDCDz;}zENzkrPpffvoluAtSutMWg5pOJranToq#5Eg{;U<#&x=*A%#~v<8R$Fv?6|EU~(YI1XZK-I6VB0Hp#agFi8(1`xY~W z?g3mwXhblW_${5$jzn!DvJ2C~G865joTQL2f=J|%N580^X4;iIcX zJ64b>(X)5ti*TW9a8vTM=FX8G29`<|C%lJLqQdtg2z|lqc8LRsiyQ9(ND&g)McmwA zRCbb)p2bLBj7+{Y>dN^IZN!zgr(Y4NPQWz6b`PClB?`~D}kksN$5*1qzY0%(zm&r=(JNQ%@W?JHE zgp}nA7}f#YK~EdL2?VM~*inf;Kn2%C{g_S%pp<@Om;00Xh1nHxXs{h((jpiRmjf&& zkY@m5xcJRuRCIQhf+a-nA?F!|rb-@msUcCDNT()>4r+a2c&r%MmfbqCd+5ReOacDcbiQ^sY3K$u`jj;c`2AG-JoC_wjMU6Bvg_Q-^WUuZnHaYUzq3#Wg zAEjdFLGEaf?GEPYK!(xQ{QNeNY9X&rft`>xgamz)7s?%;Bzs$Q4g} zVMSUlJb+z(uAbg)=`8#~9NLHtWJQVu*{cc2 zABd8Wr8Dy5qf}Tgi5SQsI2Hb~ATm6hg$c+WB6?PgU_^Kk^$FC0He#PyPyx-;nYmDU z7@8xhLgR>V02e)qg8-YNJ@E0PR7Blin^=&Kk8g|(4s29ra_m(qi8m#XOa-uh0TRwb z%}U%OT_0A~-yd@G_lgf2uwNh)^vMFm8;y4&@|f8q9Reh>1d^799U0%(0d!D^`P{?~ z=~=i(11NTv=tKd)L~beMLk>zJz#wwrbJ{903`4nRt|6MUAo@TN9V zEI48Bm(Co9HbIVRoFknK&~Hha2syqTtvx>yhao$d9B)~2Aj^6py<}kbykDe7aI6ux zY7l(tfjJ!8NS~qh+$d7f3d03ri1BFxK$HM7M9I+JBP}|DdQ9FGNJk?|QzJhRxq`?O zZ0?ahw+GgbB91q}M&ZYaXa___VfTMYL&NTF1tTWVi-aq~K7!$Qe^sPfP;-!!;WMDF z9{wW48hfAG-4>}Z7hs(r*eGWSyBQJ^8iA#=?LLWIAR^rf%?jru@t5Q6J+gs+m8kep ztOsNmkS(Cfcp<|q)YO1P%|d7sfDzOegdRpNcp(cr@b+U=Fd&@Z@Q>rjC$+g(kcT+= z1CflMqEVuo#*QYSV)_hVi9PaNlE9DP^APAPVq~`tc$Rau|%t&mySLRZLzmX z*cjkO^h9!NXXX@XXh?woWFEdTR;ee~L(%-`$w#T+TIgMH`vX@bg7b)IYK!kaN_DM3 z;c|2mGO|ogeX$6uKw(_s0Gy|YQ3K0Cypq}Dqkshmj;;qRP6-*d3-nPyuZ6HSaNKN@ zj<^V>f};$&3ban(hyd*^AI-18g;d%t9b#ZrXsJEjJcQT@h%iSfnBDaO>0z*|2S*fS1QbOGEBvm7 z+VwG!>Y*L_AOL9a7b-bwy@SaO%&t46X)#e~{6tkF=MZ$^4uPr}|Hht`o=hjOCzkdQ8#HWm^= z97GOTv%948)j;G84ngQTAulLImKNGO|1_5;cc#6&i6%pkbzmLDF&Th3geHUoWas-f zZR+(Pw<(w{$q}h(5llLAF(Fr&?SB(r9=c+l*gLQ&9XKL^5suqbY35H7wMY~*2R0^9 z2%%*Yy~Wa5T9l|{Hn>G0O_JzJNDGI-E4Mh(i^$&8i=Z7s2(2*tSji?t=J~0GJ~M=5 zt`KgRhn=C1)-zE^@vfI|=8?R<-VPy}DE7+bu-_c-AnWVaGgowhh#_NWg&~fWL9XMP{eRdMqp?rhWDN!N%-PUer|EYF2ZxsD`2tP#h)l# z_8q%;Bzhh?_gJFmh87uM?eFF{_nT$9FOP0}0Ku~-@nJZkfgGie!c~9+1jin3@CfQf zfn3;gmQKU>Kh8?KabMVK!~dl1PR32n3>Bt}lMf8sIR5<+njcnqbqNgej(yXBemW zxo+KujnqdH9(WR23_Y0PSN8G9(NwJM#4utcpj@3&B(%zCOkZ-@ond8fn3L6rnP87I ziR#vO6R2PR`unsp9uxMQ{#yg6Z3%`XXGK8v55>!S$|T$x1R z%pTgE;;qQ8R3I+-gg4oGN|AY!uT3C zct`<`?rZLGK==ML%&?bUpyEHjgbM%;o(v8k4U|&A^^$gUoL&-|naeI8@ z?m#En{Lk%i;$l-B^;JNdfeMWKBJR$x<-pa}gHLM;-;IKSA3cwsMU{*Vx(HY0i>C`W zJ%8GM;q3EIcpO}FK7YpvxYB$9zjZ@~eDw@~kL@BJ+5WInI1th5$fG!T&kTn%+l1O1 z5EqN5$z>=Ddt3y{M!kUvd&edJeB%36g9BI1?w>AmG-R78D`yTwik!*Zx>^7u*GpgyAlD)7nYIUC^71Dqps6ln+IO>?TDti;_6Rks{ph zf!ye$30K|s@P5Jhsm}K9l$ZAsfeLr3Bv83<&DkIZ6Sdx=uc{GG8RY@jx~^3?eDlRp zUIW18whAZBoO_<|nOtM{!7%@b;CVB@`y|v!2(InJQi*vq5NVj&o?}x>1QS_zOWSZe3pKkf)6*grg^#`&>%E=?zslG4 zlW@;7285|g;n4`K?I!15&!a&r4SbpPRf7Rv!VqcUbgT1Qh1;Dxu)8kh=jLBSf1u;M z@Zei_4tGC)DGsrPw`|(w-$&;%$>8s1BMeyh6y8oaF^wf4zncz(2KhD z-%GlKM70>INM23;t9H%S(<5OQ_4ZXOW8#vG`zVU>|dKwBnLHV&%7x*uo8Z5YVjy zL|C3Cyuo&2ebENp*>ULNWBTH2IH|{JRyzbtKdJlj*L(V+6Z&Eg9~|~Z%#4^IQpTMY_w{Fx$xax*CpYczv$;#wheba{roSWv}H21kV-Q3x8TW0?{`-|D{%sx2# z;n{0vi?e~*3uh0^&d$6t^Rt<6%-lb7>&%rixf$=wc{8WXOi%y!^iQV0HvQ@8gVR?` zXQtiLs_DJc<5Mq9Jw5f<)F-EIo@!6UrmR!+)Gm|||Lx?zO+Gq#=j6L58-#Ps5VQ%;>+F`@+8;2K%{&(mxL>rp`nY1P9K^d{L|obgWnvyf516->)@4x*+KW9YH;7+1U!V#418ta?txnd z-ae2PJnx&>vQmnom?*8&yR8}1a?q$y?dfiVLr_!uUwwR14&cYIQ@Y3fp5e8z1{mv3uE^(^A2_!S3*R zmm>{!`U^`dy?JJ%O(zpAhxAoVS{3&vCw7Vtq$8y~>*Ycwi!CqX^~Le$#P*c3(W2AV zS}fh-Wx0BC=4)bmLc^+AxhL$mGKG| zl~IP0y25BO%dwpoiv*9orf0mZqSha3H|zy!_eZ66MOjb#0y34WC3EX6s!3jaVV7J{ zC>Fwbo7xtT=`#~WvAff*3^P`j+EyytqX-4re3sa5vsVlZolCI(6;rv>j-+R2M1nEO z_RiM85c6)$79O5-zb zO|@EK^=>8ZJ%^BZF;iYUvN+@UpPA zM9WK&YK?ZFsyn^qlTy2HB@?8TbsL*smV3FfdV0G=@ah3*QI59?enYsb&+T|rd|#Qz zrPOuWIfR52jq=olU+S({M#fB2=}}}fuC$5Xd{M7^u~}yFF-0t(vu)`E6Yx2DLrTv`}3W!g`u?BT-+M>rj>(l7W>zee1g{6k|oXn2TmnF@&T#c zT1rxBgWZ$yMxwT)dgdXqeOX;}Frjt{zTj4it}uhcVtd8nuu)ZbdBTYduTR9Lwu$_Y z7v)N9nopT4X_Z{>jx9#T2g)HU%5kS-VYj|zQ3u1e*(ehHJd_H5TW;)@NVw*If zd^@j2!7N?bTW@$uE@oRye6KuJ%az)Ra8Y4$#8T?PJH+OkR<)8a$Edu`;PxpZna#nT zj47syEv8~*)RksNo6LMMuFyQ)NKf+m;J#%BR?75r=V@(k-fH zEQXsa{!~`Z=XO0N5%j(yqiSTTbTJ!Mr{uF=7RNWson9u^q?W0Aj%oR(P7}MEN>q?i zH7Qwu zQ77G*G}Ve}jfv44#o236XTr@!bZt{HZ1bw8+~O>ip_qAvQs_*vnnP{yHWOR6iUby- zgYs6HWhP~9SCh)Ir=|AgpogmE{k%P|(dM(v*dD2!ZPIKiT-5M(FnWrf|Bm>(bS)gT zd#i@B&S_6Jk|S>vyVFifnXbfQAtP^CDRy-9%rzo`YB*hV9qU7RN?E$8oOn`dS9i3G z!QqRfV!T)@j+`yEhe|~zrmb6+YigZNrI-;< zl|r>+TZuA0Sy&cMXK8Cax$u(syA_`%9pkHsYOLs1*yyE~#c|5&yo;$tn`T>4t%~_` z(-pCM(aX5at$b9`%2MrIcFQ)gInVl(6uqppx|dUYTD{XGHfOcAR8dKJQQO^AU8zzF zzY^QiF0W7NPMXt(n%vRK&zvm&Xwt5dv*wg7s)&`f7U%%tRw+Q5K?f)?%c?{srAZbR zwPOGHvNOvVo0f7UX|Na_@{!L-?HQ$LIH)-jXOC z)#>fGit`C(O~5lV^Ysqnh;zA#zlh@my^aFqhVh81EYmWVVv&{F6={YpSn?jdA?>zR z<)a00n1ETEVFIkRz!V+fWMX)q*xjQ~l^Ez>e61F2BM&(?cA3~85ml+Qf~MUZXUy0# zBhQQdogRIR2^;j9c0G}@WKW6|=Z>f<;7+Ce@pNqpd*yWhRQ&xv!wQMGk z9=ciVZfD8?S|LY`2U#@ZjL27(L@8ddr4nsgug+J?c|)*RQ_qV>cfsb=SLk#mFAGJH z6{5(Dt%(C!8h#n8^Hp5_cB0y{rl!Rss9*_2txURFOMjT$>;%W?bW2jwr*~%tr=&fRRoiC^D=skYAm}4uZ+=Rp=+LE~rsI``3 z#h8$pE%MmVU1I+}Ad-1eVJ>K6ScRY^>5heD>RL-ZE@~15O^rsaXpJ!&%;V5fXSaQ! zcY+pFDOsePOSfbOg|6Hh*&$9+Ws;fL1fsz7T1z^UQ1AK|Y5&U$$t-13%e<7*=ydz3 zY4PYQ$US9S!xiL}No7TmV7Cm5lVp9Kj2wlfL-tITGG{j3DGtw=IzA@mH5e0spUf%g z;r&v(til7HF56@bp?W8f8rUulLst^v6-&WNh28eFOQ)O@#Qt>2Pt%?#a-?Dfy{K_*MZYiUK?5=fRa*_}4AKgYV`!E80e7EDyf zubLCph@kwWaqlmAb=Z@>}A@YHH$YahPh++OhLNXG)$^ zRh@~=uk^aF)vsEdt$ ze?(D>R%m8uNhD-S=>VOnR#c&aDics=wuqlMpQJn)x@NMfGc_2C+OKioJ&L!>UvJJPkg4s zZ=PLG5{~=?m`g9!61%$#Z$-rQf{E?49khZfhS+$;!3I*|qgTHTmXUs%KwbC$F6lo1 zHXg_+(KTTHOYW;skkim~vXu^oI(&jtsf3q4343QL0Jlp&O}P2N#f!SD0TS))SvwuJ zS22+}9!|Onl!mc3S&h#QA8*e<^GplVcn#@$SH7zUI=rKML7O)W>^uvjh@LDZ9Z1_L zYcd!|X=#-?C+xcm7PbVeigSG=;mEz`^zf5+bRVx{Irli%&cHC@a@r!Uq?OWl_;}pt zQR)@6xF{1%e#=}RO?d8a=K#{8$wz_3wRYMu(`Kpv4lS-p_zJjG`e?B7?NJENz3rB% z?ju*gthsqpc+;?Mdi%sT$Ei)>(GSghX0Vs&D+Dj+=N2fVlWjA>bkf@is}f~oYVYe} zvEK#Sd_PUHXI>WPU8h~MaL5kh8?g{Bk#I4Ri`$Ee^AjjuWci|K9vNy08MCh@Fl^it zNJ%7y zaomVFLIf&e;E-MR*xm5!d@;|@!hE|?7csj`wlup_cthcY%XDo4?yf$TDAOXl*o*vp zKf83nE}w-zyG;Dq2=;-49T8X-1k)f~2_=A{euKRC^l7wGj*4=xe$0(}A3XKxe+smI zT=;OBpI#`keRl+L$)8ALtM}93c)tRU_uI3){orHV=;q9(>FDUQL+6cuc4T_?Y=B5# zNAg&ZgmR5*jXJi4eHn#0Pe*d;2nwPZm2OcYYTkh@+(#0=x8Rk4kPp3sIHR3wZ#*Vf zJrn}B{c_$DbSY$+Vp15m4!h*WcVqkYk%ZX$6Q>J5y%)H{zk4@^*@Y+rNe)CK^s<>^ z1C3PFrh)cW6i4~>^%$j(2CR7i$n`*#b?<~w+T&h(1I7`75DLzUBTUO|`MSqlbHda_ zaU8lGw6bT%Ct+ zfcM6+jwD=p=}!*`=k7p>*2}+vl0MttMa~S@8YyuhPAbp&buZH=o zr-%T1C@;RV`-d7&P%PG7Edf%pYU&j#rc+xf$Fja{MuD8`;CSn677ks4{GRIAox8iu z>-bBKCM)MQP2M{Gm4V#Ij@kXAFAN!{d+5iW0ikd+KXW2+dE3oc`hIaKo=yLIGi2}{ z*Bboo(y5X$=al55B3hqxO)syoIVg-`Up){FB)9#=d~vlOQc+VUx*9OY>+l|?~$ z7gnpEhC-W9o-W7=H*D^{_bwu5ZELRr&bM_1Tbd4eYw1W!Rn*qW$%A@D>stkC>|5aH zZ`2pNu}={>m3k*hCR>)5rL&^RFQtxpx=vZ~_3{d+B3j zb-ionV;m8}hG%OIE5$iHj&jAMbY|mX3_#}=@LwMdC|Vjwl5g!FBPhUIx<9%FuZ5gF z0)sEcG8L4Kl9mb6>Q>AVjj2%&0Uvx(Xx)dw`e?$-2QPgUI&^FI65EwiD53I`#<1`o zpW$~;PvUxU)8MBz&HZ}rd%{VFu3B1wYj5yV#JM+kxaZ#6KRYw?$C;nbe0}D=nS(P| z%w%TVGpd=rGvm`QO+P*T*z_l-Z<_8*$ER)6%=E75;i(s<{%z{fsXGUso_hBbH+AWh zaq8TurOAIx{&Mok$GkNCZ!o;5^j!b-O;(>_|Ok6dQoA6GYH*w0! z#N_zz$DbMh%J|*m?;GzR70@=$j_(;C8T;MXQ)6Eo`^4CL#`v*I$4q1AjxCLC8vWJi zlcS#-Jv4g5=<;ZER6Bas=;o2XjQo7$J0lN{e0b#Ak>W^T{tg03j&n&N)LN$$t zRjX|}v462)io~tym?~yyw!^83uZjJO%ZNpAR{ zGyC^T&5A(GUaHZFc)jMU#ZPNVlgwpYOwM2qYJ%=kJdi%yELxD$1#_&!T4mvOr|z(a zDzS5J7su(V=yE_Ijibpm>1NWCPbwRkfIGdFlG<6ONVlR6KBQ)Ju>iB zoq=q0C8db6-UV@-TsdN-ctfkIDQh{MLUX>SF1l$tgcqj`o#7T^g|1%an`h zG=2U~j%ll=@9f#>(>aCRMXA(?7x$)`@@&BjrYkM!bUmQN$N)}Mc zK_`o_a6V+Si=sI@o#iMst^VYZn>UG8|nk3WNkUm7o zB5Jw3Vs5gj+<;2z?@YD1O0I6na*>ugIrx(Fvkqs0$rL?~7^8~YY>KIWNbMFjK=})G zUQtc!Sf@h0S8CVWbc{clQx?K9yQi?C-u4cOpleqdQ?gj7>9sMtnLg)VrFJG(qjCY0 z(oAJ|jaD)GeX%`LQFBnTploFP<(sVbU3+s=#KK z-Q}{sX>dAK;xeqDZn45`;N$_ikkq(z>?sGtVbUB71MVzWQl*+9N|W4?mfGWq23@Y1 z<8`)}qC=^nN2T^)vqKq!{w!Ngt7E+KB(ZrihYwBfIS8?*ZuG*++)hB;M94FNY*gbJWAc9!gTp_O)4Yui2x|(C; zaVEp$Y}J^H+HsdSe#)CGunJ4cSU1@<aWsPSYxx<(gYMuQzbj|ajBinrD;nwSP65Suf}H16Mf6+6z)(g zoi!=79!BM@#aYqJm`)a|KKLp$Y>mkp{Vj$0v*ORLBm+*9CSYAoswzQ!IHnXmc(5}x zgVB!D+l;Zzc9t5L6uT$2>1eYZ3>FejkJ+uX`^4EKwaz$e^MnOdVWlRh2QP>O9e?mQK_|u)xF}ieRpi$t2^(8^wVV zo=%C9HE_Fgf+$xq|0A}?Gu0MraXFoQvyS@R$}=aAwp&9~JV>Wyt(sG*$yx$y##5G|P0 ztS=Vdsn9+f>tztWxy#rlV}2luBrVY>4ywJ=v9M(L0uo!j(xiSZ$P-+Y{ziZYdy+gOJ`V zqqAu<#fUQ$Mi~ZL`~Z=bH)VC0GPPDGos7hnMAt+*QmX&2kTzWbo4U^G8 zGN?II-KuWYE%Gzw#P*d)oY5lOMN>63O68DAJ>rzccY2a$f3%tjc#H;p;esDaCYO%N(aW5_X_K?Ig7$Lpfl!03u(DP|7s{p$-ay*_xYWK} zY*VsQt!mRNbUY}ps%F{wul5`|>0l(L^3-KY40i0;Gvpoh33n#YRDh2Df21aS0sWl z6lcp>xjq*xv+`>3Ea|NRWnY73Y_(j}9Y@9M)Fqx!g86nNUDeRPUEQqTgk$Gkh^A51B2=WqEQ| zIs^UoaA$=vYV4hwy+JGOa+Tu?Nfq#BQPwaJ2-#Cri`?POoh50nUe>`fx=zkfa9dhd zWA2nK;`m-xn`7f0uZ)vf%-LLF%d=8DQz@BwqJLO44usbU^A8=}oLABjde zb<0qc;oCx>M|-)>}*{e-d*r2Rv4?V-VQeSnmux%#D(r0R5}@#VCpiP zo=c=pl~g*n(-&iCucBN_F!D~3u{|x$$L+|4=(;SDVc^kAM%nSNOXJfWy{_mD1i5e` zn^5a~qJ!$jO#?TM4bK{eVk7kQNNe&F<3A)=wH#1855aU6tQQmv-DtEd*?3TEA>rA? zM)2iBxC8gm1Wy;Wt5KM2^dD?DYU%7s*m>C#5iB3 zi%b4%NZ-pk5#jq>eMk3T7pX8X7MNg%5ltuxx>0ZWy!m973&2eTaQ!YUahE@Y*yi;l zp|<}!@bAR99o@$sBDZ_j8Yws?j*`_n0Mn#MBx4Oes5K~a!tX!F@1N^y7G8dMXAix7 zXE*%_tX;5sppw@+N40$iQ>~rC$)Dx_En9xf3o6tR zY-!$UH4&rcCL>m9A4ccRj|4HFfrD~*F2b_hzc5nZ@$7tOlmIdZpu=HyzrN=Vv7CE zLhTy4wcGg`51h`D+*mc!2tx5t8lO9nVTI?ujz{{N3ACrVd+9d_w3MY-Z7;K#n%|y} zF*UW85x)LSJksAR3`8dFUGukiA8O49T8N(2CkpXGkxDldjL5rR{x)oP{WM`9r9N=* z`>5%@?>pE6dmL-Mf>6B=?Dm#XhR%`KCsd_QTVobKu<+hhjMGmO9?*PjzwooAw{7db zuu2SX_BB$=sn#2)YHUIW2wLkAtuasuM8x@A_5^JA>nSiH6W@je&b+nzl_&U%U>|j? zq3Dt{mcABmR~VVTn4lT2K28gJv9*P#KMz*!BMFCJUOXUN`TW&8yXSoYn=aop zI|X3A{o~B0%SS&vY#)4x056zHeH+iQGz^W!sjt$_utTA>muvcj@Yuie+fJ6r)?u#c z`g(N_y<|sHN9Ox{6yWv*J`T=86Twy?Nw68Dw`a3tphe-u?;~M%qb@@20wbz@erIu3 zxauKGAC$bL?2=0GJZZ1mgzz2)u zXoCz$49M{Jz@3M@SxoD|;)X=w<$pn$nb#}o@`k7RE!&}x0(OI>Ya>HBPtw_e+W{C7 zA@nqlLUkKbyGMT0dGEj(^4N0qn(86f_=W!x1J7&$SPT&FND4d2ESIK8<=_|IQq zv#+NJF9&z*7u+8@XIMbBHl!!L^`7&DD}K%Y9*B4-&m|$^75bx+$f7LnQ`3M7JU$7v zzaO&qRxW<{w>SzHchs>B(H>z^s#=pa#e#Hw2Way^}H?O8H1ZFJ}z3X?8 zw8ORw(HHsIz8xlDhbe{mZ>1(txDvU=CtZ_R^Fd_2y@&s-)-M}yG0oL&NI0z74H;p} z;}GHf&BEc9&)U7^aXc@HD*vXzdn6Q5|Iu<@)%_Rl@g2hYNC~xl+#xc};>jwCQ60zN zy1s5bCX%wp9{z9MMSw{I$HFK2zBZVk@zM#HKmrrJ?Dr(_W6Pm89}8v30|p6MR}LCz zL?N<=ffr%&(86Uy%|#%K^790_bAv9xVE(>UxbKfA%(xnRrI(@qCd_s}B*mhx|I5dE z93njN3h{aOaZmT^lcw(PVNgITM9iyS)Sk<@_{C(M{R6uiT#TkQc+ho|9_%0 z{P`dJ%;xJi&6)G1M+bIV*GO-%Re$r$fM6JpA|{QVq_r5>-EhLL|00Ia8C_2;mS6zk-B1;o@S&e1v(6s{{I+z z6R0_k>TFo^?wj6Mk|kNIC0Ul_-P3!w_u1F(*;fbb*=Kt8?wRhM!7%ox0LFlW0lRUW zU`xcnhmC_`$Y2%+V#vp)7ldQ>5IYGF%wmiKB&`3Psg`UFa`<(Qq;qan->I&yx>a@S z-se%fW>>J%D#z%NiXD5ov-0aFD(Sbcg2G!aDef8K%h0CHO2}!=xR9Zat*Ym(o?WD8s3QP5FhcqK$f^pd z%txt{H-WiF`0u53o{9#dWQ~nCxQ5eMbId=0HD{to&rE*+7)&2k4x02$PpLEdU;U@D z``%4zdGo}lKRqnovgs9ug<*B_ThyC&j4jIueX#DWL(ml9P1ovxxMS8Iy;I$xKfgr< z@`#b~`J*bsyLU*ZcOLCyIoNsRMmrCHcLV@U04@UP5vYgb;ibm!=JID$D2oE*`$p`*LG<#u;5fwcyswJ>K5=JnTH4zp@Ptl$3AuN~6= zVH7O;)5}!|6bPLxpD_@jN~d2T%Un7hDHlB)#D+~BQ4epL6zicwS6n>2<%kNAoq?0Z zGc5>68iepvyqXAJYmx=Rv-e*Lk57vA7p``Xqf~bdFStwv8hPPl9(16X2fSMVmt?*I z{K6qsXtlAivD?p3H1~1<2HQkE-E`kCjiA+kxKbU(h6PWKnAlJN4sOGG9^8_2B)u|Q zmIEWp0qj{O6>^*>i%xuR6#bfh?T+E^O)7+R1Wt;hbKw}iprhHtNvDRl+C{dacC-3} zSHtF@c~ITFdUg>ovj6!*&M2fhEo zVDIoGG5U=B$rh+Ukw$_$=B<&nekqeuQdKsR8MWu|+Jsm){q$8v>|={j1=Hq6N@_uB zj4$V~n9F8cf-)mseaR1Mv@dp>%>!ydR=DBXt+FfwYp{X>=ONM zI$^~BZMsGU_KU#D`kBE(N(n`@mu0*x!zGoUKp*>#Yt_vg&nnU_=Y92ve%nLG_6(o9 z7T$SJ@MH~?pnZcg>TD2kccN%@Mtja?1u1#e^)TYjF48m1@k9Fl5AUAUKXt(a+lHUG z9=^Z@;E4bRFQfnPP;ivJ)sh_vg6j#TJW}?+0T_N0Wq@!2*cs!P&0ik?D`AWqX~WW6 zr|qkbmCWqxPs9QJv zQPJH`e)YQHYZ9Zu9XL6nfy94LfA(2<>(G-L4PO3a z|4h$C%WSYu;t^W4Is;Xr0#TTwU7#9)<$j_}-~5YvVB&uLO*@8Pi;RY!<|>!6m`~y? z$yO|3bLY^r?if5fQKp~3oeD|P#Se}s$WU+arCdS6y-u8xEDlO(5c;2EFz_eD zVA-FAedBH59sUJ2dV^a|j@Zx;rH{K26Fj)D)-G^rztdG1eeh@Mp-q!w{nHm)`QgWZ z`Yr%(d1e4Ro=aY>j+j{5r8Hhu5?b2jPhnI+&%Jsych44s$+{QzjYgE;Hhurei?7x< z-K_p{i@0Iw&eh9TQVSoQzIN^hvztuf$lQcS!)AR7zByXI#8Amv&>~DrXcGYi!$$qI zO|Ru(bWRlMr&?1N>z}$(+cx|{ZuF+XlY=vzRS0*m0Ot2bLv(`ad$odostnV8Qv4EY zs(#Bw^x@pv9V`J}4xdTlsW$}5v#g4lJRNdnS-B{A`hokP`^FT8QfV|Fgp;p3(>L(# zF_sS&EC4DP%5eDTown&86Tu9eU8J|a@s`7XUmcAg-^tfN6HriNtk?3iF{e}zt#KQf zuRzfEXaK)I1T$f>45&z-8iynTpKN&4DS?x(1x4s1$-M#=!utxB%4)uB6nKTlir!p< z(L7Oxc!huRg1US7`$+*qe+-wD4}xiwVARq|HJ)H4y25f^GVJ8Fka9$uiwiv0tKp;AU7arNvH7|qn!@4svK-nI%X3xV~SGp&h{ zbr^iDro+{wVwSLP+$Y=g&nqyqCdzcnd%(r@5*^~DDhz-!H$6x)e)23wStzb$>2w7BczF3geblEPHb9&@f zn4Obipxt}aJACR^HD=o6Z_2J%*A4l@HeSZ%_0Zac7<{TXBM0bPUJvtN zPkMdxnMU+2L8p}@8wtr44|au?e(h29$l8PyNWPyNDcC*yyQ8o@*^^w~0tyfThu0l$ zrD3mZ?^Jl3GY@>{Pr!J8;8Ar>f9?)-b#0;?KpF*1|Jk0mZW_AZqym$5rOE(zhuFsi zO%X~RdUR?$vNjBR}#^b?l9VgP4)bHSzgjRCM14Iwr*9 zQDNw~`R!_8gaK7M?ScdM9ykEtx&!czM~7X$p9jF^oPO#Kc%`fFQP10U&Kf{|wbQ46 z@E+Cv3TMi>d)4FT{${`%eJ|L9bA2=8ocrLr;G7HGndN{TfS3W=IVD;FcRL1X(lK@P z*$)B6;5kdd)ZX;Ja&m$Haocu4BJKlNHF*0#HGnh=Wx$l`>F@hX^~lz9m7!F-aSquP z_rKz~{`L2(BYf1-8Sm@laH{IeUx7WD6c0^zxkIoCs?6M??|rwLJP#7d0J0ZoE=CB( z0FxSs=5))q{^dOVei*6S&ru4jpzuB3@V_};_pwy5QY*+CH$JjqVMBDo;u9;|HlA2G zGW*obwWc3!h~9JHTh|>t?^x&bumC`OV3Pu}1psmf{4o_0+W@{995b8#FDx(DJ){Dg z+c~Si31-EoKl;!scGKK@VPO1Giayf2{$3au6J^jnmxUpg|NZJmM=shCjRXK-r_8Ck z7XXw;An@h-=;=e-&s_@0jvxP%*k~6S-Sg+cV{j_HW5iLq&DN;%!8XpB?N%WaYZ6&B zC*JTNoGvDdK5}9!TyNfdT)jxYO<6dg|Ls?m#RIL=oe2~hBR36D&B6aTxNiVi8DOQW z`pG5jeEo?JsHz8)wmp}Z96Ycd6tM~4S9IKC-4Xe#I+k{DP>0dYw zHeo_KHuR_M%HODAz4oZO2!4OKjs>b7xV|fc*9!D)k9m)RjQx*s_9Rn ztX*RCE+k>hZuoQGu_mCyGh^osOmM&iJc7#Pt0y# zrRRRMQkZruy~ETQ9=P!)NNM8NN1(XI>8xLK7enEK)MAPqhg{H$kHJpDeU=oi6?%t; z;H~vYx1ZTor30MJjB7F6 zEOHfx8qVque+&%Cq!^aHuU!mVs%Ic#;p4E;+%*EfMUAi}oLUC&O73(KvedDXp1D#x zPw(Fj{X9{mw=d}c;^enKv}gF;+sDV;^_`#wb!5@gqw1u+&qg{eF4^|uI`a`|$fQ_* z_P4O7hJ5TD`cEG@?$Li{mM_t7IsUaZz4_MigZhIDaNJw}dv)I~;PgGM*`LM>M8fN; zs9N0Lko9kV6gsJRwse%jbdf&JU*sPj9bBC2+dxBMd|yzoxD~eFpo$I$fIB5QJ^TcG zb0i9C@<)(Q$OCY_MdB~)*fFww)UnqX)V2GUAuH`%NPUj zORFDQ{p-~?tTtBTt2eA(yt--Qe{XzdlTU&!UD6fZ+g$d{QUFtU!VVn`S;EL#k@Ly^SpZ= zpWih-Ge0%=+}u-hpP2ibxwp=B=Uz4EoV#*vyZ+23^R`Pi&HVSwGc%uqWT5+I{?Cj! z6FEB>2vUJ=oz74Dr^z99>WyE3>wJJ-7zntf*ux+oS+0m0r@5%aXUBnUg0;(w1gEv? zm6jSTCa^dPGZie+ghJM<5&$1X{R+f+qZ|Oi540*+CS|qs(gDKnD8^7gpy2m(Qg|4n z>$X_EnW97-1@8-ftj1&9px*A9t6{IVUa>($AOvIzezPPKQ7-H22z(B&RRN1_Ecb~y z3TK^7yQLkhrd{RB5Il?EOM7@+p}p-;vSPzy^cDNY5qN@+tNFq)u23(!goajII$)?_ z0!1>`us0~q(k>0y{AJ%n1>QOw@Z+{%BcAqkWpm{a3dj_^iBuMACzE_Dn~279%yieN z@559wUF@0@wLYOp^i?PlQSf*webOalrG_<6=GYqd2h<*q6;J}btt?rI^WAcJ_c;1@ zU<2=oOU8PIU|ev~c{@SgfM9S057sUP`)mn`he_=lb^o`$z8R&2lF+3jVOzC)6xSA&?-!#yLq$@)aN=F3`)`9D_RzHFU6uN7zVIQu@WD8{2|% zIlu}Ol7RZt>qO!$x7aLrcA@&#maRv4OZgIJ?^fcjs?|CUHW#drjZ_PeRfTAVn*RO2 zMUAmWNo&_q%u8V*9Bma?o1rAs9sqVD#W*Zgv$I2G=09l^a4^QXP$a^IyvbUez0?@w zR+ga%XN$2l`3Nmm*zKP(>N6>cAS7#}n+R%7J7#?wl3ReGij=i-2KHZ^%bwqkU}XeL zvDU>M%_bHfkYTqEXRbFst|i@V14NLysCw)%PXrg%4Ml0fg~uYCJ1nR*M~j+yjUkW3 zqqwD62oxyN&NIyNFVG8HfZbZFMmm*pDi*+qeJDs=u-Ls`!Y5dq^)BJ@k=1R#LMZ?O zr{Tb7m`|iqO;@YcqvocOey&ZYa64}8*<-RZ6{3!O1a&i)RV<2Rch~xOrySjZLc|3w z5Od+qqJ?a>s~*^VY%r!S#|vrPZiQjM<55dC$6sM+_uB^+!d~Ru&U!PE_j1^CsQH|) z?2ZaaEW!h97 zFQt_PTM0=GmYRB}(f>?6Um%)XHW=%r2~H+MHPjJ|i1n>5%}v+66$l}Xc?~_;fPhE& zcstlum4ZU=_&Y5{NEG6c;K{*JfBDFrQHE-n{PJLxW+lY`w@ zw8HdVIJ@cfhPadRaqVt9)hX2>>uvv=46(%YnN-eKc7z8(Ud_i)tiM1v!tk?Py;0AI z=8OwBZ9~6Ghf}a9*h@9DrAew>j(X0J`wJq5Whyp-XNgX*Fnf<7w=@DcDL<>Q+U$%7 zhI+Ge&@0twMv1j+T7!r=P<^r#kV&`Vq&*N0LYG9wF!3bM6tH5Y-X==!SUZ}ZT|s(C zZK-0g(Z; zEjHIn2C!bh>lHWu!jQ9&$wYA;&Q7-DM3>!*l0XGWo2Xz+6b}U|tW3u8Jjz!R@P1at zNSv@bV*b7sW-gbJ9$ZNzh;W_HMPik3s*rPgwoeZLuNg>{lI4!4=xit*Pn4|eXc+b5 zbQ{yMv0%GiP0Ar=7s^Hx0F{@(+u=q#U-o;umE474R3A&qC4v(?RfwhPw|Z6Q?+v-9 zUci&CD3?eyJoR*D@uVR)*GdB{OO=~MGVHOIb31>9`qLcG_MIUt+fB+{wnCaLsJ=Pc zw&QhIF76^pIxJUWHyZK?tl*fMx4KBb7B**>^|74qYdmDrbtu7+E++Xnv+L+sJy6M2 zN-f$Z+U(iNAVXHBkoDoA+X%7@|KO~1{a)4>Rb-ZsL*!W&O-@yr| z*~z&3OfyMG&|<;&GC3D+PdMndIq9KF)J}xT$oHa|q>_(_g=8vKXyRLuvE_R%cM2<7 zy@6a&P8O`SEpJAx=~>JHtFs?-3Ppl&R-K$7W>cAhLJo2cpAwhoiV0=6^IE59#v64n zG$u&^qVwfwTg7V)E!wFiAT}Wtu@{JKe}Vcyivv_5Lx#(7e^Pd53d{dt$fIG6U~m`5 z)jW<`F7H6QMPBoF%Y?TYlldm&$yBkyGy?kM)mXJl#-uD2Ez!W4$L>Ir2;`Nt-09XE z4n=J#xqT?DidW(Ahy}bgqN2#YT7mHFK)0LRs%9q&jWFjE zsa(5C?)?Pn28+@t0i!3M_1Rjg+0R^Hv|kZv9HR5Ye2in#wMOZJOHlp}+&JDfyKUvw zCUMm~edEI8b3Z^gju#vauLB!}fs27t-g*)*XIp@Z)-U8cnEr=<0zca0Uw|9F$uj-K zt*eLs{)_6XMt+3-XO8fMtpvMC*;fegu6Dj}8>=|HHX+vAstJXI3;}W|0k_oaK=oi8 zvgN*POW~@c!`k4mEdX1We;rQQ6JmYLCH_)C$fwuU8{k4iSRaveAU^=9HY`aZp@hm> zPgNjg8@*2bNpRmylsT5di$coCt9I>Y!K?O1MWz=w z9ztM4$36=Vji7&hH=Os;U1tKQ{x`w24zOgvXY zLJ7{jJQn)wr}R??e{yK}{0a3YxCC9_d*=P{4p$H`o|QS#qO_`QzQKX;P zq#f4(_Nn8$hR=U#bc5wz-v???;7p@bv}JI2*I%PmMk}_En(u!O)JzoVCq8kp5d~rY zJa{%PTv~bChIg4l8&Xq3<`?-zY9qh6cX4*(zJ;GGJiYMAg@+d2 zx}Yq)dI9pe7IrL{=6^VKWd79r;~Q_CKR$owyfmMlTAQ~{y>b51sR!oIoBPe&zt4Tq z^sc$b=I)<+{ak%6K6m}x;i(_YtDdcsmu7xG^R1bGocX}a+o%38^O~9bjDLol**h~k{gdghO+PXH-s!uhmFb(OUDH=h zpKrR&R5pc7ADSBK>$m)Bmo7Y0nAfj(@VzU8Z*P3k<^>d(KHjY0Z9BMYUivehu(FLW z5$>KPD)&Mm%3)Gf%O9otE(r8Et!d4jpV(ACy3+q zG^tQbDvjge∓54zn2JB{@eltu%5(_+99CNyaVVK~hQi%C(NOO^5y!$?>Wg0!jwe zFp;M!@s>u1f~bI%-CiPN#PM?InIlz? z!^>b^77Kj9_~9IDAqoJAnhc5n7@i9pHRSb90`v2UBq`Y_*o}ySQD94IZ7i2(EpZ1c z`U|B6bWWFgGHHgbGT-;7<2k>XVUQf@1vy`T=Xx(Il!_f1q5G zTJVlnei)4iYrW?)_fou1E7>wsX8*%R^;%8FJG|H0Dx`>L4?hoW^<}FV5XoZ3r>UuC zU$qqdXl0VEX_g+~YQ0srhb6bSen)ztW1_>K3u5)SoYF)Q1dNSO3Scux8O(w z2Of#oYm5j>f+We9K*a#z08?Dm%i@NfxW7nx1ZS*GG=knbcX+pY~I4=n@#Q#>_rYd#8mAxf@%@j=vn4roMTlqZHcRe;427yC#( zoA&YmrU9P%ddQYg%SVtGQfB#n7h}8OfW2J|;I`~#$P*y5{#JreJyNzTkv)GSW8R9? zv(}m)_m-StmnJ)vLGi-Z8FCV!s7j@_-yF4P6LY73_%LAefS#3$1H(L)zh&H?PS))E~#qgH5^77XE(6|3H5YbDaLKDW`h_dMj0PL-ONlNv z7mEzqjYvZ+Uxm)IGHy}h0K=oE*t*NkCh-f=rd0+PgK8I>m_N)r8Yyb)9`vhN)~#aZ zh{qDQciRyS--=+_Wy~9Eaor$h4kRQsk1f3iRX2C+VImHPIZ@@SQmH&$L#J_YeS5%< z0erL-RfK$fcEi6I59IwF(iSs!!ab^-SFqh^t&`1u8%b~;*`qOx-;EWodC;iO$W|g+ zGHYE~$%JAB2DureekJS1;(S2{zo?|BH4>e3K|aXzaMe?18s%tKO;KKBk?rT}c7QMs z^g9JA)d-aKA*ctbpNRNd`KGKzv!Om$zWTtpJEgw6Ow?&WbxBsU6b=Q(r_j?UFZSfJ^NECnw6I!jD*@h;mqy?-tq8Ld7 zjVO2|)6CXiq9sbw{0WA{>w@1d=33w<*>VCYQX2)9>^Q+iOm$N{z@}Yi$R|>O4nKoB zLe0|k7#Bz*fa{lHk^QP6*vH;VNV~{5rM6X~gwt!Qo@6R8uAw69H&mglhWo2^}t-|FkXhch$maB=W z97KoI0R#^t2ixC(dajf7Wi?Bc#GKuZR;XR`I;5u)^}t@D=;s@C|O z%vo9~yW3{BIQN*LC)TrI&8m=dbOm!WQl51ga(hC-JYTVBQc#d;LW z(5%VOGazihOa#+i2$4y*lRWbGMu9o2l0`Pw<{F)-)Tc0Gsc^M?HZtV&1Gb(k?)POD zjg5vYXW=n3pYkN?p@@=UF4%=S$mQ*22w&6Omcrdigq=Y%T6Q{{X`)-{l?KgNH|J-w zys=oodwMZ&=Jep^waH* zK@ZrooE5kCyDhgRE!P{=g~ndSZliN}ArfP{R(F7# zkUuB4VRm8lh$*+?pQe`HzVOkx@1WT*Jo2fn5P7?P2pkY7K)I6={EbQ;uGOTtnkW_Y z3!jF7gR`ZOO#CCjqkUnpYp6dxidYD&9{~j@*xu<)wUT*jtRa=^W>Lm;{wej)>e*8L z)9sHPzV}DHUBgd51u=xX0Px><+G=z8bEH4Q1v7v-W$Pk8%DtZk=fXr0V6Xyf0U-VE z9{$g#M zU3&0e)PFm7co_tFeivdzC&J5g2rr{Y`RM@s|J_lr=+W5vh(W+KeyhniFVx8kUx#4! zKPo!$j_eIX@$2fG@mlwML)~X&t0y;Xe0XK+;*$%P&whR8M$_{fk~)M5-#AJOzxAac zF)IKqIH;5e>5Ea=W{H5UAI;(V;qO6M;HB|ES=Ar;-Ydr2&3qr??L01E zJOSRjPCA%K2fW>)KK%YD2{PYY3U4DO{-XxVJ3y%M~7yN5?P` zt3Ol^Z98YFe%r5qeMJ8gRHTPahuejY^&l4Pig7HMIVd)9vRW!LoX@QKyCwZ|{|0TG z5bLKtcPD00Xg~HJ>YvdH9@q9)ypc zyN2n=R*!z^k6tm@?&y!8Gbg6S=_%v;@heQ3;oE+!e$TW6@?0U&Jq;ue@p7uptLdmv zPC;1Zc)}f~2$G}Nmv{osU3-Lc{3j7d&IB`tj&;xU?!-(S&(H1p>z{!(PZW(OsSz4@ z)4#o}hv&{mCi19h?uFIMXZJ09X64mOcTY!5542lTrmaKs{)Hqsiv8<2%;e^H{(w)8 z2j=+(-fD%t`6T3l7hi;LIw2nAfkPtQ`@X+h|JIA@Z;(~^^?#}R_qf+FFqa5a$(#)q z-B=H9rm{sgh-Y->7hrGCmX5&DA?Nhb*KOC|_Y3t8NYfX83HC);zXDo?+}Ex|g>Vz1 z4WomeXojrgqnKhKCipFQ<0s2>?DK12Jnz1B=kUkB1s^m7=3O>=y>Vbac=N!KUI!i; zAKi#m6&5La+o_Qs{OmG4^S#H%Ia9lb&z}N4yWQ(oo_V!sy8Cq1U_Sx9YwNHXQY=n?YZ7-0c=Y({gr4)SrnJz1~($ zpZ^u~`h--!eLi}z{7-_Yyc^%4C7QsoP=0J^VO0Vk$N6FncYfIs|i zuz-J5WP1GH4UBU8|EMOz42r*o-Vd(7M8x3Ebm3B5XxgK}fE0|?vZ&K;{yn6uOqS`` zf5COeX^`-3!%zJl7QrpIZCJf>rL%P3!YAjaW-px%nt;@2|3Y~@_C`SVXzbyElvN~E zG9L=tShr-(p%~--v<7!B6J`2|$CPW{_qA!wX!LJpwEeKWac2m-X{Bpbm{8x(crE=B zUj$qR?eOZ^(h+LQcqv&L78f-j>yECopa88TN~W4`V|>q9WqnGo2C(`I5P^B|ytZZa z>>_}RN?x!3?7;0a!#n4-S))N8UeEvqY@LC(L*VFKpc$)@qP5o#24lINr7#L6KD;&| zhE!7$vRpIW9m5-zH5M?l&bIil5Zti>k4=cj3&9B1VE6EMEAS?J6YCVLiL>LuHDQp! zPP4P1VnRH&)4KWirOU(rJF5X0`xq|mn{)6Q^!kYS04??5oP~*C9u>%N^3i-k$>{l2 zP&OgfpS?DENdJSV?ik)!1!eahg$UB`t!cYQ*HR<)0|e$qdnwI>L70zO29F z1=u%CiXo*W8jOU3h#3pbu`|dBvgg zfany!KpcHubXG>-RcTj9g_RJ~zqD1`agf2Wms##}R@I;V%cI+e2&!QJueEvo;jP-@ z4xtW2+LeUeyE< zJnf>jlInX!AzBvoPjA-_Z98YFe#5oL?kf6$_jq2`HUM}?q#%kMk}Uw)1)}yxVersIk2)Iu+w@QF(l%{9 zR~7wV?|rvlzhbxcO6etU*sa~W$9-%7uw;A3yN9!+9Xa!|!DKtT+Q>N2!)G?#@PABtWs7$3%&HHJJ3qX2_?AOPe(z(KYL{%Los9rP z`24X>#sMc$g42I;DNOeXv3|RDsln!OLsva-`0C5F%SVZ>KqYTL-DUZ1)PW_Ep-Qm} ztj1h%ParO~r^g2@2Y zleWdQdaKAEyq1CTjgU(1fg+wIeD4E8g&8&Ya)PqOG0& ziOaRkt7jMKw?76nI%d3czP|s12d~kudS`d{=;-pee({ys-aYjCi1h>+ddVFO`+R+& z7~`m3rCHOnS3>K~mO`%Gb+8lup=o9axyq18do;K{BIQuW23xfSvlYy*^gZQzlGYTo zy?D^1ZC#rv(obx@>yZAy)7oBrcIxz7UOcVsGj@I(A>GlmafO;YzI4;n4;F5l(KE+} zzr5gReBBPe_S*5DNNzwV6p>W?Y1&QYQVA9r4L_!>u1%EbCqA{!z>s_h(|n_RMZnNB zk|uLuPr{3XC%=}8HT?;@{{Lw0$fiG%K6`cLhT(OL1_+d?b$|vn@+C=UqpA|gnp0!A zFtmrzTS0Bxeum&^l6z@V+a~G(pc7;y1G3WY;ZZ^ZfV6NcPhuT#MvX<&-%JQatP`q<#eAui=BoOt2XcSzyINa= z1kuhpUei6n|bk4Pp7pOSRD3+bZHU9TNFhuHMR%l*U4xd%oQ_y%qN1&{%0 zJ7WdhDM~G16wlbyXaG=X2>tp)FaamUBkWE0@Z*PI4>4FW-Lm1YO|Geh4=&uZ@LI@h z2rRIsV+;Ei7Uy4>e(n4>=l^m31M_d6@6TuFy`$WQac09;=RQ97p1C*A+&3rB-8B7~ znG5G^bC=DXH~ZV!|Co7Z_Di!Lp8czt+sFJT(b;Qf56!Nw9bdZ><#0^@e3Zp8bM@-4 zSO0DGi>p^WW_o<}{?((a)z!%AHLC|#mp8s>dehp+r@uWTZv4*lJ2!r2<0Bj2x$(6d z3mb)vtbXJEE!zgz+E-V0txQ7}$J5K7Tz+WzttJGw0ATl)UemzRc14=lZLskM|`x^cRIs9&ZZc^UbO2;?uL9FG;q@%Wd8&rb8x)b!rz z*{PpSeQoNAsrOC&#gsO6%anV{JhfwLgXxDCnNFGRGN~KJ4lX5bDOd@ct49~RetRD7 zsq1Utn!048dZ14*Q98MZh2}53Pxkx%>E~PuAeuk)C@Fqi^jHs9+ zn)PaZClomyx!>+17=SnOV5t%emm4_NYuQS+gqHAOG2?yHsw)Tp>diu> zU8q)UOyvI}J?>U25oINySEyM+Z905E5(k)6)l0JtTbL*+AuNpUG!=g`SR`$^wm%L- z(iW(M2Iw+XNvakSZ__=9kkQ0WC>ug|<%(MYW*2)eUQDqekH=CB83P*#R~mTV>?TOR zCtvR5g6MWgNi^CV!7J%{p%8LfJhhWI67Ob#RK8!YX!&$qA%p;`4uK;SW-r-_W+yFh zOij1}{jAqomesu9oeSYo+FuipA6bcussqp1Tts{T+{PJJI1g3#g$W39?>MS0XCX&t zE_uNaL!1e2?e;^KZrai(cU+2o)aO>(BwU^cvy3kQR6Qi}UMoI#3&;CdBUErS?2#BZ zk1o6vpUdeZ9Pwx_N?ZfuPQF6Hp&2Ycf3=s59hCCJk$ow8fCi_IAhgFWe z7RlXeuufR=ic+R|Z=#iT?l$CQU{JC(dUa6?wN*=&%oy@)JBb1Mj^LvPYN>>iHySp~ z)%RC%hu2z9cvCKqT=4%Rdcf6p+sPhJGrfe;2)Fb5cA^(>!5wxz5|BDoSGV2EU54Uf z6jwG{!Ly}iqu|TiYc^){j|??&-brAYWZMhZa8(b`IlI;lBp_izwZ?XAU1sxz z=!cyR4+doAEM874Sumd0%ouXtpi}`?L$MJNf^`5JbN-W2z6F80WJ{ z?#P!UoURHzF)ApWRxqO!2gLzg3HfG>(pp|wwX?2o7}bN-5Ef}C&82vH{kb~juAnvTO-aL=Op%i<+ilv>lRz`5!#BgPQ8|kqtTASo00)RYJfDGoWF4X@( zOv4cUsI%TThYG3A@{@+x)g?W(aL!w()N57hzzIX_5VKUGo^2ItwWfvM_W&pd_9(^f zU?hUI#**W+@Y$L@;dYRt3Qi=H`{b()IvF`;<;i5w)uA;_1PNf#|CUDm~c^)Y~~2oV$>I7 zC8DbNtfau;q275;qkgQP#PczGxl~QHvuWabl#Qii15(~cW-{%DLPaBm8`4H~UmTbW zDv^kd7BjsVSrnuCkFGENok&@BaSazZO986L6mT*n2gdLxL-FL zgE^BcRdLN0@I?xNy1?Ss8oibQB71_dd&E>mZdCmF8*VoA`05FwS@#vXNtaqkVmp>c z@_`LP;v6jAsB#{2gbjPk_@(Ee2hy#8A8P@QPr#-&${4-NSim6;zt-^AReQyjr9Bj9 ztQ6^l(uV9Uzt42q&2O|K|;*r9(WX04(y$ryPecCo4OWk1F&8BkK zf7$q17MCzLp>STgT@mSN@E)ib1o%XS7DArAhwcm2;eicE=P z{!At@5a>cW7D%!;>_^=e>(zT?w9xS9A#ku?up-(jC8m{aJ>Fes5-rBAG6&X?@|dqG zlBI0d>P*`qoVU6Q-4H9$n3ctS5lV5HTLHH{f6T20YZ&yPRHAk?zvpvq-RYDq8CR31^A8mPyISbxEy%_>hBRAD-xFJi~&2lJ+NeMx? zrA?H=Er;0xIWmXdfONkM;C3)ZxIO$`)cGMts#>kKI}%f{#Zn?`bVA6&(HIt1J((_{ z`ZCN_C^AI})>2)PrmIrOQq4Femdzvm!GsnE!v*1`;hu}=(B~U=IZ*6}X;<0h&KIL0 z7k%-pvHuV}vV@o7L@^C`2kBbos;?nEU{!LMt%Fq=hzK=ziS5Q7SfE^0z+`gq9eW~Q zbaDqDLiKq~wPIQz5VYqK0VPCTWGsu2chbZpsosfaBXrP0U4`Ni6kZApU}I(_<7SbC z#GQ)idP7m2s1nX(qF9vu0bgD;U1G>{F^zPTZJ5nUMv1U^fndmEaulme8euo51dmp@ z=vvgDyq~TC)t80uX3a4-z8^)9D7?MJ5{&4s2I&J z8=H84s|j3pkq#%wkP&0cIkTv~KU?!-L@M4+XpuOUEn5v6><_0QTccU1TO3%La?&?K zPebOP;&;_JEZSflT_*#n=ox1f1xP49rQ#!s-fBKVWT;p;w_+H77{Ok`70q<%w!Iy) z;nx_aH(#>vgV;)prC6JvVzQgRzX82*0IPJRlE>`p@_9Oo@y7ljCOM-0j8cfVY>hZg z^2?}pQaz%EI0_RpVa#d^iT=Mr9`*Q!sYd~+eb>^_4e^B^&;9l6+~~x5{oX&19$y^Y zPL454{>ZKKdFwfxJ;P(I6u_)}#IB8SkdDuud3?eXbJ|Pu#v5P3OJm$_zRIeNpxKYF zoW3|tMZM(_@=hQjR0WX-ZhN4c>|5*l#SU=CpSx5yMeg(JA9TE;t9s6<9p60Z;~D#Z zw(DPZYO8Fv#MqQKN5L;*`r;&^;|{z&)#q| z@h531Uc1zrAHDp->6cH}g&H5t^#T3K%tztcKN`XXdtMy5naY96l+Je6Dm9Br!allYBhH13y z_W7}7$Q-CN?b%v5uYWEKUav{<@YttrgmL;<6pd2=A2Xhx@HQf^8}J(`S4Ys2jFiiTB`yUw;7PEH2rW4hUmFV^}Fw|Z`WH-Uj=~~KROE0A~Efi zz^P~AFj(CYDPhOm0dL9YjeF!64AzvkT|XJuHmyyR>345>;_z_O*AHKAAXvRS37-jY zsR_8{F$3F4FV(k-LO&1mAddb>4>a8D5Srqlfa*HUmb1=ALwi_&n7 zBj6$U*%Yonl-3S!J7=N(>@OdN0ejOc57?Wa6J(Ds02dU2R=VU8a@GX$AnU$A1Di5Y zrr+MivD3r!)$slREY<@U^Ikd%2wHu(j2m$%L}4n8oY03jGevPP^VpuVwtoAL`_I=m z&8M_i09ZT5Y`JUP9rxa%&26b~SiNYaW~wi}ZQ&c!zPaDdUOc)IkBxx{`7=KC$$^^J zZz`N){OX~j|9r#nD}a4(+LKxjo^h)CJM~%(cxRKra#FFdypDZD+p6E4)6QF)DAJ$( zz#D1(wrvnq^$e*AIQKZ(1aN7G#18J*E@%M zvl>9JCf7sI5`;zAEs|ClwgLI9%hK+&DvW;jF}O~D@O9dZzFYyH`eX(DL|?dWSgL4A z(Iz%bsOydDrsP(sN5sEq!9@n@bNZy>+R( z^r|Jt+TgsUE0(q`{(kZMi(j6)b@8K%#}?nT*j`L6S{5%^+`RBV3(qcmVd3b)V+)am zYZeYJEYH6<|LyrF=O3Pbr|E0+x6T*l`FU!7@BHlCPv)MU`{dk12>fXEH*=1;E9SP% z{%&e^_WRR|v+J{eKl{M!9kZ?3)U0*((%CIDznS^>nJ>+Jcrf!ZI1+SQHUbug%04PykS^FrUM7?=U zUb|_{W^%a%WNYcs?^;|kp&BTmdY(?}()5%zF5OxR1WT6s8DI1E$RP$t; z4>{6#Qf`&$2s-hpFkG`(G!+Y{<3y{O5F^v*cl#|>#ynX&!$iqeyGw;p0KHPRC$c!; z18^NzGX&`$VdSq-$sTU==cR1Y8LP8mW&7Z1v}A@0l znyR~lVj{$Z{ti{I6-u3KpCjGoNLTJs!F!Ro&gKKo07g3+UM0q4g6~9)Z1n8}+$*}9 zTU0FU|wMWw>OUY%pqWf_T5=r}5mk39@crWLE5sij^#2Rz> zlDQNK#N>_4wTAPh&&9HYSi%zoSL+PqFzZxN{hk*0CKa1AUaOOx0CxFL(a!>AD-IOw zT_2!f<5f?^;x^=+h=ov+9==PbT&*rcpjkI_YGXP>nb9 z5y@UO{p(oEKr)suEEC%3yL zDUrGExX~D2A1;H#xm1kTf~_Py_0NXfDW`~dug7^H+Dz~=Ydxe!v*7VUM6(Wptxn7* zQ*M+-plB2gcEsluF^?O_gllGF3aK5%iD$bhJYq4&>v2)AApL3+(j>D|6p|aOaVADx z=`!S^-9@B?Mpt!)+pz|=({Mto=`c=~s|kQ3>-%dsG1&5y@jzI!;n`wXb$V@Wm(04Z zGUNg)W4@YC&8kkaQ>E6-hMbSu2{G6qONkV)dPAU>A-Ad)EXnvHqTS}^QhC=uBDvDT z^JG)?l-R60X-QEBePj7RQDmAUtl3ybtqO`ja$AfaQ0fj37Go`8f+)6GA@9u?imI^) z9u5JuOvC4nR4Mi|hP;xY$sR4M<^);F^hBp-$a5Y$M$jI(!irRZcz4C{AS-e3;W`J9 z_AKPuIia@iIaI&f>C=Q5i^{=lx+Sz~rVpVn)-5@_6Eq!n8>?p3->o55+pQt$iSv1WQuz3$EEcRPL3jJ3KB zitv=VER|g{+z1_&P>G0F#zKuwT_thu&y4!bE=@|^gh2T7oLeYw8vA~2N+(`vV4MU% zU0F{Jw`3Q8XVkYlop`V6#;Y7fXT9uPcq9j3v6%OCa8CetYv3LXq(s5+Q*>zPP?wnP z1vRZ*Z&rlM#)?#u@1zN!bELV9*eSY-2W~?h)M2c-qF5^fv#}-PtD3JwVp$5N8Bg4o z)^a_SVE23O;)3!=1^HC;^RNHknR^qP+o}5W>C>m@z4y$y=e*}V?|GNs8&(On z?r9fli$^_^jMAcVgyQj!6@}+5r5SlXXUyowJl5ILxbc9{j^YV&hM7(!VY~_tBpbfL zw@+!@aiw`AqtDq#eX;o&S)Xw9PAT$w#n@0f7RdzkGn28cHwrJvMpN>TJRP;>XU!I~ zZlmB>ob-D97$cxeWpOsA*me&8y^~HuX*g##rvnp3Suwc=Rg-0s!9qSMO)Ay16Qi@a z8EM9#jq#n&=VOT>#e~w5^hU>%18T)u!6}Mtzkpq)vrm*}4QWS4*}^}c_axE^quphQ zss>ydS$MTz5zY^}See)7^9?v611@%an;<;%GN8-MM)E;hG~x-3=*|+jXJU3@LZO~X z&nu?K%*f47jTreKm>33rTqbJ-?5sL8YfoqezMU9SOvzMMUr3e&+RJ33J;;CVgv=bt zYPG5vuf+ksZ|n1Xa}Ft3X^p{|@lGZZGUZyqvz?m^>XfG7z))daKW>n9921y4=k&&v z5kCOc=mBRxim(?^Lu*afZ!mnnd)5EiNWaAYyUSA-(a?)IFc)KPx)`4QU$Hv6LZA$e(JuLwH&senZM03{M6Wb%XrlnWT#` zxIKAwKw&YCB+j{4Xto=NZMs~}V^qyYhvTZ@JB0QTMQqyUDFKoRnF;dVkNDmJ>y}a| zZHkGZaV8Qshc5o3(5`R}$Rcs10Z#c+g9(lK`+PTPCO2zxObpw+o*{=i)_V{CczWDC zEJH<}@vPorbZNA^TzH)N>e3d2%L$Y=t0(OpFvvFYT2dh`l>?Y4s3`hJV%rNucMVJ$ucqDSiw^8JhBnRW;qm5Lds6uG1)IyRAy4#dJHVMC|9YN>L*XwaCV znK6@TTB$jUAAibX^4o@$#&jY(t)0rKAK;sllNtNWgcVt#gNm#}dGQ$kv&lfrBV)4D zSyvu z)DA^58Lg`@l+xVGzmSNOrsb0!btGifO=+joeeR`pw@Mi*=*N7P2{UVu*K`T(fmwq> z9ZZ{?smW2BO}UO2n}x(!(k07}`Q!3wAT7-5WIv>z1^Js8NJkA*@r+Yyo6?3ATZHdQ z$RX^_`XR%t+?5aH(iq$k89YY_W+;DBU_c@ z+s7H#tjsr@b3u;@kCs%;DWQGJu0~0COUhb^4@{-fiebT$K0fIjS4>R|Dbtf_L%^p} zeyX$jd`Pfyr`t3#m68s~reB+7p#o5@X(|Wh5~Z4Ec7K+l%VykV+n($_%+RCICw$>ytuz ze9R@!&imNmVydCH~w2hWO ztEjS?{N4er7scNgz!LTFo~5E{B&SlC03sPzgu?!?+QrXhQKbpGWXL>Djq4fBs64uH zdpG~9Dw*D@DA)!vDYw!zJ)`cp;b6WLY89Dp1k29#`O{c-Xaq8FxG$e7UD`4^nKUGP zPIi1WH&yW4$mA<9#QbCm!KES!w}1C1#}ILUtt3nypDA66*l>>uo?DbAGy{x3nhLrR zX>Ld>$>op3;C%6Hsd;_nN63C_N=+U+x2}^sGJAScW&u__`)DF#l$l%!KXQ5DZ;X?p zKgRgJTPU@+ifNqWZ|5ul@!wY}1=h0xRnUhrhbeEyW*SY}bx+ej`j)< zkQ40sf6w@iG7N{im&};K6j0ZJylyk-QFRsY9defAN+9OVqnBy z)k4mlD-E2+R=95tQz15q2{tqH9!!Op#-X_95eezNx@^oe!@@k2MP@+;%alYagxukF zG0P^mb)5mW!XxCw1%2{=%MDSsVBUr*sny}8bmLbV{!n{y{U*t6G;)0w7EIT%AZ&+A zXzDXsy(~2~<}V@VWpYHpkD{~>A7S>cq>p@G(Vag)r zD;!g z*F3IK#KyF7h0z}!FDl3lx55%EZYFylrMP55)%iAZo4Myg(t3XBIH|oIy@+>^u)92% ziBonLIoh-1V(y9C5!H+;smI3t5i~#L%{lYlA#cnw7-SMjqKm^EJFub^d5@#wc=?0= z!jptcl$MfgeN{CV!_nB?xVP>=!@H9As(jSZc*&Xj+755WHroQ%QwY%UzXvp(t;xv8%=xS@s8=Ar zs>~K!?}h>Q`v*&{r_edR?DBn|E?KEd6c}`Zuc$JA-FRn3{z6X3ouxMvpDS$0cM@wRnYy!kNitP#beqnP^$V?*%{o7~8YQtloq-YP!9N3WMl zV4VG#)B9^a1Mw!>GT2V)d-3g}=JHMw{8jJ2RtS;J_mzBbD;nXiqJ?b(m;gw5=rKX+ zufmQ*+1QHIf8SqK7H|2g+Ky(WB;OQnyrX)c?wy9Oqfo`RAP@yUj-9}#lj_`gg-aPw z1qvYqp$^4)+4jjtO6|=nN!XStzGf$fnwxGGmb1u}FEQ)6;ujzvk=lyV;lfxLX>QUb*ZGowSJGIcfh0ee&+mmwAfk~E zuKWm|nj^)HT>Z5r;0rj9g_fN?N?T;wFVm#b!@&Y70*qz&;TRvnUJ%nz3-Uy{TTSIe+<^I>~!qgyVT7i5wZbvH##LKkMP_Un(J4*M98s<@p_- zEhWcX(rjcbqp}Rk$YdT)u;(Afyof2G{k2GI{u0~8ZTT|wU=1Hbx$o=w^43GLWC=xl z5iDvMfmzlkEcW=L=to2&`+v4^scOZe_@s5ks%Ba3j;0WteXrI1xq3uW?}vFP%QrFD*&GlHZ9ojH!^w=mC2?>+^-UP&T{q zvp!w2SCD59KXa-)Ba=_8zl7WTb$Y;Rj-mdNkU6CpmXD4r)WZ`K?3l%*k1F}!Ej))Q z7SYIFnX{jJ?m5c6`)tR?F?2pv+^?O9WQ%}O8O;Z@d84pOMreS|D@jBWDeNGv0}XZL ztv6=cxi35cz5yC&3|;Ynr6W3hXwd8r!F;6&7>5PTrJKWOM5OYm%U#KpQ15i)7%eW$ z*H#SWhk=Es3WX9AGrHllxxAP9n^!gyC-L=@w~l+eILTq;f(eO%p{gc-ZKEVqt!a3? z`MkQf8gJxqI+~$gjULP57iM{_NNHspatmv+mV&u(P_83WuVBI_S2mOV_eT54HNUuK z6ZflEc)^iF7rYP~7}I!dvJsg%?XUnvNv{^`62&!?=?LaU+)T=txr-Nlwuk%s5z5Z? zW3;X@&&^}1pxr5(N;+UJc2ERs^PXe25x7MNi~u_9j~ zMb7^lu1Oc3K;)d5hT7n-0-dFm=^0{y^8Yu$7 z7cdT5rk%X~^HN9iN(zy^6B3Y$48NcU%jmH^7!off$EGbaRyjL3oy)7ES^cnv{Pk_H zsi>LgpWbwGh11EOVN2tPrnPc;b;Om4hwX}NCN&Wl(m99aRF!BaPael5R765B$ff<< z-;bA2Z8y9iS!M?_kjQNcjWsmM+MNENR7Y<76}VK~Ob!|2Hg5H=A>?|lT&TkO@p<6- zNN_SMQ%r)ZM+OU?7|Fbg?+~?qa{oia+`I3Ve3CY`$}r_oOb^*~g&82rE2CueJ^Y-w zne2b%d>i-Ld!(5K1BOlydrKUA3S-JoqP7TrS+>?R<4AwM*s7E9RH-W0ub-oSGS*BOKAIV-a%a9}u_Z_z-bxA{se#ZmpVop`mV%glzo-tQ>aMn+duB zR3JCXZEh4jM3D^}>rv4z0CiM}N=`h}A_IN+@_%_3y7rvIXE$8D&$vO;*BfvTqys={ z2%_R9Ff{=@fIvB)muJQ2e_5&{m;9;J+*SFh1d*M8GsVzUY+vs1Sq)1d z6)9H{5C$@v&#VI2aMEV7m4fa}iX7RIivY+K+ZtfN37Q<&@%=QT9`=N-4Uh39VpT+`?^j; z<@TQa=A9A()Qs9sF}3ZIp{nM-n*Y~isovT+(eO3NP~DHIQgj|P3hx3fM9fPdpFV6J z(8Vn|!?4ypJ1!&lpUrd>CGypjZ|`?8EY_Oq#Gj%#PIU%W-PbU;4k4$Cyspk>%G zPPTM1{jK6=M9b~j%^m1u5GWT|KsjYWSf!@jUa!JG={4H@%3>%MCT*)Bu9~};_Es^C z=udok7nkc|U>)*ClgX6KqL@;6-BW61FiA(ep8TepX=xGBuwFZMapnzlw1DECO~`Fg zZE4aw#yaz9y4w9MqGobL_Ie-pjps@`Bt+iB^!E4`>M>#-8)jTlAeLL`VsaqwMX}BJST5-pFxi<1|Ixn9_-HYW$X0LM z%{{%DF+mCOEubv6(1~cb^OB&uSED^C>~c`_5ETi#xij7=4GTIm%A__YS3T17YU8yH zD3Mz4uB{>4@_iQ{xRhzCytJJMZe!X`S>7iO*$@pJS;aVe-G|RxHt>j7P*~l!S5;VD zL=+F8kEd%GXOHzT;B$mX>Qg4Qe4c4)E6g{n+dE<1E=QF&)ib^>AA*Rp!DP^6qZlYu z*kO;ttP2+HBzM#^ZS57FAcw*S{$;(-a#$+)O#{=^4UsCfyUnnsq#;@ZDu^Tmdm&&O zoQ!Q+nF@tEXC?<%Gp9p;`Q2*fV6XMCba@`cj1eJ+8nMyD&79=TkV|s#*|$P~J;D^2 zEE$I(nhvIbz>^w6B)P4KX<&GcTfLTP@2vO)6>_)#E16G{&G`O+JeaU&jX?7AW^FK{ zmjU3|fRg0f7$D3jbtfr;m7gWDwW#V|Hi4~cIqi(3TbO&+Rrw@f*#Bs}rs4d$PgnVB zS2YpWp-Vc6^sVZ1dafHid;tZYDd$@Z0rh-v+H2FPXN{~`IAU+u%5*fZq?FYl;fTHB z3^1STuo|80EO)X}_z7}xvs$5*orGgIxbms8h!o)ap4`r$7WKNr7s5(N%fUiwBgF-f zhc*-%2J{e|FVqZYC!t-CdY{6`w{$?d}os$(^TNj`wylhbxQW{z?*fNfWu@Tn54OzEN-_@-R#` zsl#Ao0K7;!l;MSV)5n+=g!xx`gzWvX`QMA6-&}Q_?eIm|J$>bT3|}$jk181#%h<=P z!*M?^wUvELM~jHWow(M3V$9`Q)eSos+ZpYLRZBKrWQ-*31{bv;W7Xnt?F~U^aFJWj zV|H{_q>&SUDOkw5^G`dC>GPS-0PU^r&&>wOHPvHH`G!{-KU3Skg!blGKx&0>@5>bu z_JrJCG~`BdzOX~Drkl8nym0SG|JgNtq;D6qwa2x93>d-xmQl@Sl8UfKJHg1OGfEYmo(}SH71Q1#A`w|_ zw69zf`FRxsQy%M{)jH%T<*G}lO_qS3-_=qLm`p?>ddY+E+uaPv#r+!0Y_E2q2?H>J zSIvXrnbJg54rCy|JOeq8Wm=to2&CuA)kI+gw(GEB`)>end3Lw~yiWd+gfv++}7unr`&M+p{J-UY$l6nH;qn16plLs^Ld- znGsrxmh0vtCtzUtx)IFX>s;tSNBlk;pUTbVfxVr}x+ctufs~Bz=&%(XiD_hV z+rSR;-;b2Kxf&ba(T3%Y>@JGYts0D!tRumI$0dB%O@ru2Oe4n+UE0Sj4l=0nty-WJ z!g)hRJTV&@ln>^Vc4xqp8#3`@DcCVJA`%Hb`#fB+f}OXG+^?CqfIRn7aZ}kHdBVZ; zwOv&uxeD1huEqlmFV_9J_MB=Was6gJCzW2{qQ(f6uoCq9m1nJR3V%so`4lE)WT~bB z2F3{c0VG z-j;=Jbal(SOJVm-G0JFa5as-`?7$Q`@jfgP9uGFDh(xyCY!Z-GANMc<((3D8W^3>8 z0xep`dpQsn4p0i+Y(fnz6l>A1Bpp6xdyA-r8{lU*{Af5mt;G`CV_*m@% zEy~7=666JF?Xof7sAAUT%4-J5jh8VyT12g6+n+D(KUkRCKzjeX4R)|C_b>42IE|Mx zy}gbFS~P67Ja@wgTo1`qsdO^o9v*ZiW8}8;Z~}cdh+CJ4M%w;x00#7j4)u_omoANO za^q@8ccDmq-URP;cRd{&pPgsA~iGSOs6fQa_4Y@ypUpcG_PzV`n|uSrv7U;aq2W! zuXSb&1!NTJ!F(!M81hInJcm4#!Hwe-(%#t(aOV}T+QciqPxX-iaQO622)RCdbf z(2=VmOn>vrR&pW(`8e@%Ujz5k2-7a?g02|4k}ve5tBcDMpJQ|SxLF;K1tvYJY51$g zbLeViD|J-?+1&-);LV@?`-NodccwR%MZgPhgL!{3!2p}oywLZL?=3n}(>FHhnjX-( z;?}%^xMSF+u9eMX|NFqZz4G;&*OPC@7y)MRopFrMvalWF%a+HNWJX6Ks34kSeMX~d zDn`zXV|*)H$$rI8c&7w87++$srxMto_5}(e&vSrxCNmRK%m50*mW-xV_87U_g;9x` zp)YxO6noM_}sPT{9T&1C7DIBfoboCy$j)JHfcca0c5F}u^|+TCb5zi3JgsE zuSDgJY~KXaRQ_3}Ve4*~;v!h1_5cDL(2)wAumN8%O-)s>ev#u-80NQ2OnXPACk}r2 zm9x0V*oL%(T+K3V-8Q)y9~nVnYZ|v`B!H(zv%#!QLALFMWO;`|=5K|J8KjD?ULa`(A~TKYw~9e;!JHXH~NT4(&Y+2UdMp_gKv_ zNhfs${J+inf(vqL)hW9IL@WhP`|Gt}8BueY)A-YJavy}@CJJWFTk;0vjv-{Yn8ydA zD%Vh8Bts{mzeUtc^bf)>^uXnNdN{I|8J29id_mUmF@R}0pns||s!Tj0v*ts=nN)s+ zJaGd$5H}ur_9h#ryOD88+Je#8U_urPE0r=woYfDe$Y*Y1`dY=!D3dv5<9csqU@{+@ zaHvAc>2x9LowaHc9=NbR0b_=^nH>7AXP7KDb=Gp#w=iRpHkU`P$;*pV7QHJpVH}@U zlK8E7Puz^y9$mSD zxo^#`=Z@YE(N1OEIm@yxFipr?ae`U4gd=7?;fwHAfy}YE;!=l0{B>WIQTHH)fonaUE z!-rsP>EHL2+Ta&yTIrt#XSP_Zr{q6tjJ9u};M((2r85^>C z7bw*DC1rtZwEOHHnNd1ZP?s_u`xL*;x8BXvY*k2=@{`O7gQq;Yck@@uKHm<}IkNi= zriMK8MdqwF|3ogYM~t~erVl0L86yo8#P)Ce60Wvl8aZ*<_*vWw$Mzs=c(Fry%i|crp|G=XU;{!z`QpPVmf5Ub4TSW%WTYl_N=8RtyW z5S$+L#YplIC~~4^GTC>u|KOMAH*s$~!gwUD2w+}OuAUr$#@*6@r^NR#r-m@xO*Gkts1KztF5M@ z=4JeezSVgt-q7Ex#>d6@iPczwiYb~+O!65A@R_3K@+1o(Y`f2z50TY`@vV0Qpr1uBqrszcnCvhZAy_|a=U4k? z!gO?0dVox-YX7wd>t~;4+PiRU;4q8BPD+m=8#)iL4xfu(QE+93Ww zEn^Yp>!KZq@<5f(1bwiVx(CSBk3j%k@&q+Sx+^^aS@OkyZHhebB-6P*qAJ6*7`$1# z8!?zEuvRKkA}>72>}an*BC|3qpqoUmBnQFyJ81I!Ig$-sI<{!#n9Z5gOG<5-x zA4*_4h!}i3)qr6kr{MhLu|rJPnLz10$&p&|Q6Z9<<_mN@&zvq_ApJa4vQ$;|#Z95Q zU)HuYt0bw$TN|FH&e2gCZndx*M;~vU3i`(bdYL0^Pz+CwjQBld+W{B^*S`eIiHJld ze{qvw)|-8a8mF8K6r-HC2F)U6SgVX%qQ;UgFHh&nU)0|sYKFC~10fYXbG78L$6xN^ z`VYh63H#(O^uy-|xK+rKQK(%^(QB~!3vqsXzVjW(5D|$SIq_mYCw-auIATN>D26*f zl0ev)%UcZ4bAi>#z-EW3?Ih2C7n@}ziMWb8XpCqtcgFXq<u5(Ut~JBs+4k>@+5#FfN`#Pj_loarw~cI_${ceZB}bI5SKBtrs?F!fPZpa zPW$O^5jA7Ck$!RohnUxgUW9q9$GHIGzVJQMqRP1Zk+A<2T(nOiop`0KpFIB@yPo^t z6{@_B$A`>PMPbn6u*N4WW_PCi86j?2!2fvHQ~&3*eA#sEZ`>fH@b*LF7E z(sUUD4u3AmQd28Mq;V|Z+!fd-UZtgEf8H5*)EEuuu ze64o9H(jueD^p6O&4?*lFkf-}3g%|D^GNY?^j-i6U51GeF! zTrr}JCOy*wBW#8^-vsxJyoS+;Xk>q<28R262R3n!yhazzzF@#;_+4f7Mn~;~z)~2T zE?8xQ@^Uv@rE0_xDE_g<2StyOqp}!ma&`n9|LzTZV2^EKh#C#bmnTOlT(SiHObi8~ zQzI6>OY;7IVPql_U-Iah+NU>ht{+j(wlA3Qg?u+TV=3>H7iC(Yg^U+v5VrWj{uWU) zIdb@3WS+qCOOCz?i$U3$aN?)T7HVh*#=p?nl!IR3RZdxy0i@sftb(7eEw95rA*PYg zpHTbgg~y8PySrW!EF&hHFR4^1}#^VlF z8wvB%oB0{0S41O6H0Sp(mziqkj{OXsb@5lxGpkm8BssI@<+}T5pkl*xBiFX|?@iz@ z*Mb|rC8VVl@+f*9&+7s8@mGUkm@P<^HL21;$63I)D zW54?!NP7`wh}PCBn`bw0qko{?c$YhI`=#DlMMT5+(<7>^PFrTFcCzV1j6*~tA3W0` z7>KX_kglL_0V!^Ry(OtmMu%l~h8fKdmPYle7}b9ITSU!d?|BEy_Lhy@p$}*{P}{pK$W%3OpegBg_~=!{rr zhNnG7g_?~170e@UCWr1B8Ri!Miuk8i^N8F(BFpGBBlcO>RIWr-nRa6N8|Lm5((&uJ z+qkd)4bwK?SRJUEl3Y|>ePQF3jRTF_B^Nc;t^QTbb*sO-`jOSQug;_9gL3uyhL0M4 zEO~#;cO(ZJo?ZK&tNymu-f&;jJq_11uUgX~2{wcq42}1$xphr$jdP8>rBzaDNi{Uo zKU#lh{ZzfXUR~ea(BJsX+Ml;rSG`sDm%8Wb-l%&(^6Dzfs&iM(e^c_rs?V*up}ME; z+PY}nP~BOpn(G>C-vjp5W3_kH&eVEWC2F;`8*BdBw7cfbnir}UYsPC1H~p~r|1|BX zf2Hy2#y>Xx*P4gd{Icna>aSLRs=81!Tyu6!Q}u7_-)%ahsix_vwbHfgn*L|)7uSAb zZKnB2{P}eA?_1t(`F6|aB_&C)=IjRgFdltszrK5wBuKXDWn1S1@OB1LqZw%BNI^-Y zU^zw1ql?{C=&inZ6{0UxFn^*xqX){qv1pSc`4yO!JzwRiv~uH6D&VuJP!9_lJuX~X zZ@Oo%@UGNuh|8&k7U^0tTXrama6)MhyQ-)9Vo89_q-?4AOxDguP$)W}wBbqU_R0YN za+(bwy)BsXpsv*rtg;9JL3VGgl&3~f^$LiEZa^%unM}Ypnhd)2s_v&L6`;gWwJm_2 z^gspIEA56L>UCmRZ}abF06}QU1`Vht<(^Mu5l@tbjhbEkwI#CMN3Z8d@kLxELZFav zmPt1}By^2&A_dJ5VS=fF1b&L4-`6`Syql)A!2-BZl+hlu2-GqK6P*cx3TQzD7#U!a zHQ<}+1!~^yDz%lnF3$(-&^CjawXt4=I3ei>H`p~V@h_)g3pOf(z&iyhV-eZcfd7n_ zHrMe~guvo!ZS)7TW+@5@rvRr$>wG;giy-LKz3woYDMJCB-b4!1Y$z=R;w1~Fo|xV!bG_CL|z zpcU8bw9=Z-l0p$r8M3hv7UPljenp@HVUgArLuR(Yh|pKF-0lk|yPxE#11XHWh{eZx zA+^zsFTe$FlkhIWy+E1AOk(&zJjIM6?uhBRgMS(8l(k^3ELocYOPfWI9BOy2T_aGF zu=pjAxDJR|3^)}<{Arr$`t&l@jrS1fYM0Y#w}2bdY)w`e7BD+uj0bL~-DjIu2D8Z2 z2S06mjFPc&Fk6{4%q$2Djwb9TJD@&YrHz*hFT>`5AT@9$tr3gAh%Aejx-Sr@N&HX= zKZxtBQHB*k?z*QWc~qbxloxA~LZLW!6c^k$xO_e?T_=o7UvywhG!vBmFx(Ef_3Krg z^Zd)Se49-HU|euDO1QD;#%E7;-6>F&*f=QkHUJJ!Bjz~H;w~<2yj`Gz5|G;1(X1Wm z{%}Ts8C=RWuYo#G_mzScX$_lIDcE|F=}H>iq$&sYk$BaFkXmo=6*PFWbh@<2C^!;Ls66NL$IDVq)m??Oh6A{xpp z!)yTp)P=Hg!A#Zb%Tz3`!(_<@=BY^yTn+x0Hg2J0>{v|EPzq)P87xXtte_HCeEC{I z&ZMzl^bncgXev^OTaPE9f8!>PLn{zbU}2QAYa^ORIfE-70snJ-x8?ULCBVIdz0Ak zC7S`U?LL>Z>P?=SfVI#J7Zlxs31t47i@-2Wto@JP`SKShVEaJ?syqNLa51)2TuR5* ze3S4pV2SDOcB!!8@Z&ZJN@J;|Mxer~jrv7~xC}oCu?Z=|M%YFPr9vuTkAOcQ$sGpx z&T!aJNz?QOPX%VS%@lyZ2f#VHwaF1b4_DcmIiYK;AO_`5D}n~Zzyos_!bDXo{BT+k zz$T?k8Gv{xTV%k#tDfNBjbj^P;Y?V0UqESR@e6PXc613;EDcTppJyK7a&a~YzZ%Rs znN=GEvLfhqVGbc-TM(7q>ynbTe0psfhwhkC3ZKs2Wt$F zWSmmj#yvbWng&ELo`a*bKpt{5tR1yraSK8e>kED(7l_5 z6Bk(;c3M+YZpp0swLqma1r-5X5yPVE?SMkj@W?V1>H$6j@^C0kYf4DmEd41$a|P!J+jXC`L1C~EK3I{RappCH$@nZ zDB92GscEpC4YLG6PUEYAToUk^6;(f@RO|?9#%FN+V0kQwc`7==5{k8D_Mv1td60vU zSg?pdCe{F1fWvp)R)I?MPOz0cz?>e19va2b70fo5 zmkG=WYcjHms1OIPI=t){nmw_hwwY?G^oIkfd3-9=9dH#rM-s4RC(61Ps9;2-BEd9G zQ+gmF7@ORi?*2XhO>rE>0qCR9b|D$SU@$U!lidM+SlHPBn}faw)dp&%JB{-b@3!$& zBN!R!Jq8Fa_q-8O2tVbsDL3pAUdHs=5f_gi_L;#Xn7ULj*?X5jg_?$yhb%-w4=T)J zS7ZaKMnQ*w5@*5@j>9a7{3Yxp0Otf`wJG{81RYgJ*dVliDBkEbEeHQw66=SAuEBD) z63#kwiLEH7hi|&L(X&JixGCg0I>Ed^9w1B{T7s}&@O;*Y?UzQ{5@H=Noj5-gU7Lj; z#ynC@65-`Os>50+M<_Oo_Euj+$CXALco16MPe4+ zUXW-T`&!N`UzmCzwIId3<(-aL5$tK8PQkF>@tKyJ%1>x9Ose+&hQevnGYDcD(hi$DPFI+HLI+)*Bx2~nCc|((8)o&UDl9q<6>%LU;J?aSk z6OFOBV%Z^%@O^Jskv7IO@_~>pQ%I4m)hvuIqGoc$<-C}?tD1F6Hhp~gWsxI__fK__ zfP`(U=%nJKG@g>Mh-nNi0PR8W$~(LfX;B6U;X)2&`mzI2vaOTt+$z<|Rya-uMbFV# zyF?W@sE z8_S|nrcwszlDK796_`OP)kbzbxx0~VZ4uFk>_|=Be~%tW=HEOt;Z#P3s?VV#w=;#%XWC+HLvoJ zrdHNWeUPvX2|h?MCzKhalib|Oww}Tz+@U)!2h_~v>)2qMXsv`bC2y_+Z-{7g9f4?b zr5qSzPjs-C(qt=RL>UHNZMc*gW!(r~>ck|7n^8D}ra0|xpic2F)(Zz=6pleE3F#d& zfc-}cX;@Nab|SZSv8|mIA3?BK^S|L2?`9D(CWjc!(lXN2KMv3?AJj2igDIbM_RFP8 zo$RF5uKY9!^?79En%6!7ANdCMv_A3;?BUA%*k6$qxjTC%Zj+E3dRP=BKv5H_6hQA# zLVnYWG_(?%lIP~8Ubba@AGdb!)^i4SvcoGG=WE%ObO`!`H z0Ow3Te>O%TYDQJ>clw?@hwT873Qcpc_#$ z0M`;_2kS=e)*UQ7N{$5z2g831s!&WLaU+tk>ODmj;AULsvF+rm+gPMutR#`6e+6tB z;Cwc4?Psv?H8>WMFi`U!R1hJck_Wc2o#du7v57?_()P0UBGUTJ$r|q0XJRxk49AuO zdc-@oyrDbEt>?1k^vM;Qog6RiyqJ6UT!_>*dpem;$-~No-;qg098MJ(J&)~gUfE1q z{{Y;b$M(74iaZZ1(k}T*RkN|y)^tntp2p*nuQdFe8g*?73R`!sw;ZQC_(+D_2a3$h~fd%s~WR{Zy;$!JzQf~=oZQ7_oioh*;1a48wq-yy|+h}m* zV?-a=11H&i`cCe`5f;As(S<3n01sQB^5@59mDV9E6jQy|9ZvFM@Y91BnwUl;H1>MnV}Ev#7IOWY*POY4roqiNJ#Q*cFRF2n`$kH%Ak?sa_p+xq-=ZhN)kEp z(sfHQIZ-)#SzFN&nbylDEP9PSHfTuOboAB!7Ev?VKmFuV`14ar2y%xHx;?Z$7}RjD z$7zNO19W1R|KST&>^cN0ReXd<9x?pWsz;wvvmIS*8UapesIS!E8qCo9I`rWZIih8| z$?Iyixuen(q;21|U0mxs?7W2Bp=BGpP(%x=EVbRk25La~v%!phE#xsR+YdaoN<;*T zUA}}I@RhgO`ZEq+v4m@Y8yAjmdUL>yL+(w%3W>|HOGQ3^0o&JEk;?7W5=1~xT*M-Z z8d1;Glu^Djz#fVhWc08ipT3AiHKK}CZtpX{MWi|gg7D{E?ArA%*njA)70NekKrm6^ zub$<1(BWO|y7meWz)STPU_uoi?<4J(oc3H#U&4N7-Aq;Uxplv8@>Lreo~i9>yh$oM(Qa*Sg>uW3o8L{+&1< zX8OpV+$_ymDbOCvA`b}lo~%+f9Sa8RDw%f(P!W1at7n3AC$6LsiE6iia%&ZYgH?Z5r7d)hNp&@czIk~l}f2Xc5(oO=s9xdw_d%F`^M!EIGgub7K*gLasa6| zB11-BB&ZKgrY(bcuZkbvJATZZm`2*p`TGv?{)^Kc#28@z#*Z%@WP5u?7AVXSpMyb- zSO^tKNC#6kuQ?Q=lCXmedeGr1q@&00+d-u1Ppsqa^RNg9D1Y%wUaW;{fx-pxw-gnM zV$UjEe($h5RSM^^y5+UF?J_E!MKq#+Exzo8Z{^;-jOzW)1qxrppVMBOG&~}okrkY? zLk0(`k<-qQ*s-#i$hLox##1?KcnG+@0SHJTuwoZDvgxwMTN=Jz_fBn9^#;i<8vX@5 zp|eBm+P377dNL~4jXEdCm8Fsi$%Mlp^e<}W^9T`1-_1P}qL;kLBE_!ZZzi)wDVtYn zi-jp!PM%TP(`0oFO1-$59R2hcE!@p97LMV_V%75Nn$cp$FSBcOW;hn)0ApL{g`61vFmwh_ieux07d6=s`pxZNIMRKlmzA7JJi}Rk-=DLNEMw85mAY z!`qTEJ2XhE^OZG?c5-_L$Hqz$IU4$W*}LA$eTY&&P%jJ_ad^2t* zp&aEq5shkKh^=?+@8*u?SQ@17T%h1X#qyU-THQmy*@BaNVlprl2_*O}agPh1BBJ3i z2N)7fn<6xA>I;8$u>uosA7gt2erc^je1uBU+8C_)PQx{;-mCi@wJvkZV{-KGQTLpNK?U_2ZXtUzkP@ zn;N0Q^4WQ|nS3#;9G!3nQLA=xVoXbi(Mg^zp#u?(=zTZr<~A@`z#i{n1BSqdwGXF( z=ckYPb)!QTRJ%aIG#1M2%2u-XZ)pMg_d^&QB$XA1b~3RC>sCp7;4Kmhdsu)nh8AnU zgM46xo{geVcx+hXOKWGs`Y_R4jSVbng<0YAHtw0LAzn7`3oim-MRH%YE zU@EAM0s8CA2zH;inQmUBwLE>K51QLNTSFG2OAJ$W8I8+-3~~9_HT2`*$s!s8 z?nCMbg5e(~W6IoJWbJKi^ZLq<5Xs=-T_{l5?)+zy5Wc-U35Y5gf;$g3cNTssIQ`*! zDp6_Dxg9k?wW^b@NU-Ri@-!`xdI{NjOA2Aocd(}ogT8~kr(LqYs(Gk(pefter$xO`BEZD-VNn&iMiq0Wpnyu>a;uxLdw} z!?h>42$%%Hf*ML|N`ARFuNxTAdQ2JxaXkSUIr0$nF%gLzx#%qc>Fz%sqGz;bk-|Oj z*Q5OC)UaDVX7PvJM(5P5K2G_pi>&z)+tMngk!`9C{q%wa6bsK{D;2cmgC?xE21BC> zc4n-IGBiPcBu5{{NKTC8G3MH4~DJ%znc^&f^CS{6gc}A*W^y1z+t0#H|8uw0 z5CAqK)hm1E1*Fx%9w+eQ5tnwoX1Oo8~Wr662KqRtlPv~i$67KLqo|1U|1>X4S zT@`qPlT4ot>+6%BVjaj<0z#|Mhll|L-njnG)9{9nt@QD`Sm!3o;hAL-amwmZ4pSaD zbzKFB^VI~x5e^`DG-=sd>Sm+SL2y9HAsoTtUE~ge3udK9$Xgd=|0&}5&p*w!13w5Z zLcn(;iUAiqcv#_Bx4TD)Y#Jlmb~j6lC{%g^YASG?%MeSSy8HAp@@~k;k;AYT3E*2I zwkdNIGP+mtS(%vxQ|yiRvVrv`jEb6~;aNo(xU4ed{(E3ZY5FYN)=}vJpbNhN zdG#-3W8^+e0#FF3cMQHg3T9JES}q0$8~-c`cAajGDfyukM(=_5Vqm4m~`U!`aa_P!Y_Nc zro-%R1o|&-L_d7MuQxfNHYSNj^X&F^$>*x-yK9FVpF`1x&s7(i%}saG1NK&cRoE9b zNWA7}T&32Sv=gBT)u_xDhwIUIjHb0d zpEedsOU(e_CEwpR*VnwVm7LhKx_sN}=60Pihx`faq7ohOCJB$;HxrjfJZTN1(545o zWb@9s{uWUyk<2Q#lebPVo!o6ZF@#O_MaA+L%(ARw#)2YQiKw)cl#v_T@C7Rx$^Lcg z{t<`X#{H!YeSn$O%X~MGljf!JY}^}|@Z~LXR1n8Jbdp>8=Gt0Bv~n470?gR;+&g{z zbf}i6V|vnHOes}9rDrf{ve-t*`JL$IiXG@iL?YWXIruj|nD64A-GNEjq*?@yoNyQh zro-`qWeDD-(dh^~LH25(^gMg+Tu1Xt3J}eKYe5YST*Jraum=>2I&{KkPrJ;FBBHcv zjlSrBBMjuOP&Ilfoj2FsA|jQ6ySNw5n=?o{8ma>H0`VWXK1klG8#VBxHYO-HBnvckyh5Y0jvokb!Sop8;I@S2Kg+y`}6ACZvy zm#Dqh;E~b*G#q0zS{Xq`G}g_V;9tM>CAJkntd$-?;%Vrg;$8ggJ2)&5v5C`iAd5gU z#B?Bwsfj2|gi7K62okgL<81go+um96382gm{Ob}#;bZV# z+ENJ1pn*d^1W2>NbO8CJG@O~-c8nT{D^hvCt+cCoBWYhay?u89_FY^eERy|Ax%&2o zpI4_FzgDZ~FA+Wayo)^z9}^DE6)d^LtY1D}ky&9J*~G1Rm1^vxixhE*ck;wD+CWY* zqK^34a3YWkYKh@B@T#bp?0pW_;oYn6?B%}x8a+@bo)mu~$@2lE@0e$jW6t3bMxWD> z=^vm2Q8PKduU$Y0d;140K+0{46j+HDm5O2*NREb_Zd`7%#>Pg&bP~I^XjH0`;a9~^ zklDdqU>|p#NF{a z?LfUqk*#>OeRkCEPbnNpeVCajhD|D7RNeaqPAL%y(FfiYr&Rr$aL4)=f%GJpe#9GA z*v$Snar%pCY+bdK>P!Qt;OId( zAL5r%2x3Eqg$=NsFaMm~(O!W@j{oJmXK{<}xoHWx@0aZAZp6{Dh?!s!G=q@;!9IPFgggd+&l!j3mmE(B-<4ue3}Uho&JctMLe7W*@gtvq z7eb*jmD~T67Gi7SJ$Rn*5f})7sR5mha{8Zj>wo+kUxx?nxYzjpo(vh|!Z zn@RicPA{{5#~wKN09&_is=8U#l&*WXku*GCJy_c%nWE{Hs7tcXwn%}*c$uNh44Ulf zY$0PE8Ja1|6!Zk|ZxOYU&@X-}D6v1No}>BSixduw*X||@6M5(W-qGoFbX++-k|cYZ za5ikLhe9Hvk!|mwY)2V*ldYeFvhP^jiGFx9jBe7GQ!DfZm%Nx_t+7~&4yBU}*Pn8d&L5lT z7r7R9EcbwlF`s;VUWoQwU- zv*R=}+N>fgQ!2+o2}L>+DfhKarIO2ZCyP|^bL4~XUb_>3zw^Iju$c;Y4~uRz8hW&2w$7ViMV#d%NtxYU94yJhuz0Z(2MPs~<0SG_7-n zy@BD8aPS1`r_vEYTK!^sqPol z$>fG}aq(OXl;^I5*N?nzi_4wR`Qt&mTwY$&tr`SZX-pwSgDjupp3I-XH(>A~`dXt)+^+CdhdeQ*=^n;xj1Wk4x@ zXhC^2hM3pcX;!KVjgBP7%X9cn_gqVhh(z|j_Cp?k5oxon+`xu8z-r2uztI|GhT_VC zLsJNwrrfM8R^HfKH8P!M#R`j_Ba@Mr%OyddMn9a(>?xS52w zm%zi1Ufsdn*Et95fXIMy*rAXYd~)4DIOa`jF*W@yqE_N+3*gMJKY)znE;=KCM;BH- zpmNRlWiI7(P$^ZZ5dKu2+NU>S@FEhp^Zb5fZLjA#H(?i+{ZXr{_Ce!n+TZx&)qVBp z+9TB;t=e^eKEDdMVgQlyA_!!WVhHe7&Z1{*EG19)ovbAiA2bYSh+B@aikivMXX|0Z ztF5i!nl8R>i*O>prkLB=rVZ!g85B{UbWE!QfLTeB79~0mHIpN4-|stksj7y{D(6Nd zZ4TDtj-vK#aZ);@454l>J@4Ad8>+c>mh?`;EiEklnGWmRoZ% z{cy*?v>j!2?0QdDqqawM3KH9e-xW8PtvB2YyXa*Tde?=xh4a6vK>&*gl#VRnB z#c4K>WM&mIeO@|_g1Fj*hO9AQUPR60$eyizEnK6qQ{F+K0L2)xV6nc3F=NO^is-K?Dl@zi(lh*_a%&107zHFWAYY{b* zy_4ZS&VI{v^jo(8Gv;jjTu+Z`kz!)-mx9vxxYrjk3`GhPGSh%LOd@tL!^&2o@7jz| ziyv8PxNq8V_EA5m0iVlzQKN3XGbAf2fMu!-+ooAL$w}$pMa?t{!NUDkIyWpi=$y-U z!$6CSGc(dwkv|BWbXviL<{^-qoO38RS&>Ss9`_4s^JSxRP@9oX1XmjJ4!mjPhahzY zo;Elg$%K2Z`%JC$dM=~WL+eDqlWRkCGp&M*0V0>llA-PwY(p)jbWTWtg3n6`JBD;L9zq2Bd+y6xiKTWjHaeYEv&PrW6;1*M*ZQV5^o!qH>czr&FSo(FZBm)ec-a*WSF6 zM2>_$*H0E-d37WArz@!@tXQOg5}LA@H%=FVDWy$18XNJBq(d^enxk|5ZKpJI-yqYx zpuagbcTSta#|#)0u{4u0F)B@VI!#`TK@NzT$sx%@ecYCDND*wzf7ApX(<^5tEU`p5 zstbAP_g$=l|hCQqfxQqr|7=Ip+tV_Fv0 zK@c#bySKS~vxP)L)_m`&KYvgrr z0Kww9x(AlPDw=*Md7r{nw0yhv*qV;o$Etf)=Xux)9<-w7%{B8*pjKQ^bGYWZn(_b7 z*n7asRaR@`Ilbnb^d2CDoDjkZv&+ov4N|7}-bV!Y^xpfKa1x4&A{Q>o7C|(WYr*RW ziVk1_#Bx<`bjF zp|{L-MUIM*<0GG*|CzvAF@4QQaEc!O^6a@o4-a2BQ<(bX@ZTr3lM7Q@1d@%(FU;;<3o!-HSrG4{A#RVgZ0h=eZ zr49IPAA*3;94 zJJ&~OBd!~`ZG^Ufg#(yY!kz(KzLS;B^g*;jDKL@C0Dt-@kT|!1q6OeJ)LL_gs2Y4I zB>c$$JR<}Ldz~6M-4HqVJ*gDHPatp+Ni7fyU?c#~YHQ70eX8^f%!2FtL<@cXhD;K$ zQXBTFWq|yV#2X_uGxVhRGGMM}NS?R;pi~M16R=GH)9S#$5<+zZc==qPJOcAYh-PoX zoZkX`2+SAgE`vTZb3%F--wGl88;P+y0>V4m3@vx;x%q#Qih(voKam3TAFKib?*MSR z6I;YmnBDMEv`{~_HxS7f0j}1(G$VY#=i>OJH8laW7WU${194kZ_e$@AzY+5cFj;}5 zER<1W_~|-RpWi*QER0M6br0k|;H?M@2j~ElGvH*HJ1)Hpt^z&qnSz@FWEcXs3Te*` zzjd_~V_g7PBS;J&VPIedMDtXiTtpaKn6~(9LwBjM(g1u8B=q_RrFW^&avtXnVQ?Wk z9}av1l$4q=NyQ-bz?cOj9Ap^aV*q*`jF{6K#ZotLy_gAFK;*Fq!PA3NNQfN2TPp1v zI5D6xi!c{JJ`UHDe5?<_eq+cQNF!bkYg?ZcU&fFFur~xVE^NO5kOPOR1-VF{iv{!t zXh0j;=S~H<8W07b@^zh=K7Ly$#Y!oR34qju$%YvLklN(iCCvg<7}F4m4MDU529Rac zTAd!gO)3T^Hz|yF@RooWKxi(~N3Q+usZwCw(8K^rW6}X)j@*mc4Qs_xdmal8rj!62 zNA@BNKcLoRL(+^8T329p01pP(8qn2!6871*EQ>GWV?upktOk}^j##&r0OOwePpK4* zh^7W-4hAN2o`Gf}<4;dTrBVzzEY)yp32L@^bqjPr^n|qG3NH(cI{yA915N@gHSWwNm-I5s?*dn`2~iQXW|fk6IuxC2DlCa0s#d!UxPk3^Ec^TbSp6M@Qh;RL#u=30c1SOyDpcC zvDsqF$%Cy08;!u+0?c-Mr!<`aDF>qi91-xUfMfxXawur-l!@;OqXsk^cn8&^03j8& z^W646T}FR@LH0f2a)8dj6c!j#V!7Sw{=3Uq#S!y}o&+2mlLp{^Y@XrF?iEora65g% ze=Is!NCm*Fz{;`vJ<^BqYjfE1kVgTGH6RPY=<$)8-cSk>nGCoN@&K&^!vh>pYP+;q z3%jX_TozVi)E>jApNt{1)w8M^tTO`51MoH=tRh_?xd`XizD+8{KmS4 zF}jpk06IZ% ztiTy2(C+M%_86f(g(VG7fg1b<@L^gL7?DCK0Vg|cY&|R%gCz!s9?&U(=L2U=sK=48 zwKX{Vr+&rH!hRvJongNb27y4$fIN$syjw?MOZ$#+TYW}6OXHlR)d>?AC~cv>P=*zA z)6!}ku|;Dc0x?ej%ng91!P}S~>C?#BI~XS*r550QveAVG)$ zbQO3d{b9coyy1QNQ#u zP8mYAqBK~sV5k5COh!d+{)ku_g&72Sa|77?y=bFM4#&Y23dBoDo zII5%8;oRtz(#rzLn{ax_<0#jks+iiT4bosc10y!rve&OJb)X{y?*zP-Fe>5f312LN zB_{qy(hRO3v;~OJagf1@1w`)J>~d%3lGS1i6zr4&(-Fvru&rVFrbqg;Q#kH{ph$&7 ztFZC+U5{8RL$V2JixzAwIDPf+2sZp;;S8$IPJLL?3?mZEQ=s1x))Ndi%%5<6_`O0Y zCaxR*#Bw9_CSb6jO+nmZIJG4rzKo3uw+CUH#{P+2rBABX-m*)y$sQ0)AvaI|$JAL9 zk+J*N92k0SI!posWjuG1 zU-(>O=_(=e?`^m}i=IKFtyXJ<8B@&Rbvns5F8+dopI4z^pom{N@}33$r7v8wqo=D0 z77qLIt41W?FeSB*BnuVcPC$7fmd&3_Ly4a~f*EF>}Zo*z`P`JK^^bL~VbuGR!DCUtb>p-t_ z?GoJUuHyj9OC!!|F{u({HmpmytW{0}GnVNHtYHIU(Sr5GpBw?!?g;G6JHhE9IRf)m zgQG)eSSILF1NoLz2!m~5-JlpetVloPxPB=Rc`cA={qciL6 zYD!s+wZL}kuKPmFrgnVLtb6^nS;fjcTd1-x=5I%d!$sDlfkq z-y9J45mY_PdxTmRT-la`NVo#pI@xT;qjCO$oAAbf7z_wc!5FBzc(nJ#m+oBk^j&y! z-@N#CG^=P{%rx^EmQYqIiIgJWRMp}_vu@@)H^W6aP{!Z7cPmEk&FGg+Mq$aib@~Tb zvf^V844<{eIC4_h4-fICTb9xSUM8(l5k^zcO-hwI)h~e8H5h>ccW@qom zw+L&C<9Gq{Np$>H{RO8XO3N}fTPmF|CHYJL8GU!UlvlaW+jslSksZhtwd4fVyE)Uc zQto8N?@p_gRx`nGcppAHAm&f}{7M)n_fCxVO7H8t5(%|NMJ%ZP16iHApiL(OT0;DC>u!8`pp0LC>K?a zXMD2v(98D-F-&hk;FRsYrD@O(2!TsrvkTysjC(X9v~Vd$-ihLUaLJsxR7f?k>XKQ% z>iiHAvjBept~Z={gkv_2?XYhVeC%HY-_99J5y*T%a#QVDx9TKd)`7!;kkl)rWV)M}09Pt{29Y6*mPd0h2jkr9YXVYkWhmwpmnG*a;fRFD0P zj|#4*RWI7EPr^+E`vv$4VO$f4#k{zh2~ZRgRfEQTo6lGZ2lrIpi&h=lv-VWYaEw0UY#mSQQ^!iVm$0;_(tu zG=^PFN2_nhSf2hgwv|CK|KwA<7kamRdg)38yc}=in_`y5q{SFX2SQvU5KUO963=}J zb8_dyh#fz@gg<&!bzd*~un_8{I4*Dwh|90NMrt|Q*s!^a6_cB&$oVHei_Z^=d1Alr z{NC=*39A)TFKaS%j4Jr_j3u0ulYF~}^-&d1Na_#BFmQzU(eWLX*ehTuWX z;A{L*IRavDIk0||zyD`nwDa?iFa7t1&#ak#boM=S`pLf!eP-gqvEaz{LO}DKIA7V0 zUxPjp$5qkg(bkZ^gh`fNPI--s@s_Wn2?oUc&>ZmPZ@=T{j^5*67sAw>D*{b`xS477 zEUl$l%~rUn>!=NY+I;6pbn~E?AKL!A13lT7mtx48;-_UQ+QY`%dM91=pquZ13SS)% z3*Ee*fBQR+Ztv~*3U-%uX+$K;C`Yx}V(Db5Y2jO6UE2R<=?dpZre^-grrvMADjda? z#}A{jV)TQlOmS(d#^_|`Y%o$&Mfn%Mi7yX``CD)M93qTwT0hyde{1P2LbO{4D#Va7 zF2Yg@x)|_B$x1xqG$i<)-++n%G0%-%xQ{>hL*&SQ?>B^)Gy&KzMPRsmiag;j@PB|m;!LJ{eY`;CemXc8u|I~1#1ezQsd>bS9I5|x0p1zL??}njw+(laRA)i zctv;LxmZeSqXEn7E)GJK4XyM|3}kZST`uyRMhk;?wi~ zoJG%p%~+|)rprjfD7&n?iT{SKyYWpWNG`gsw@%;n!*{-dymgZAJa3M%ajKHG__VpE zyOLD$*BMaXH;H?X8M>nH{C|w7Z`GA=M`<^i^yl=(Vw_6wtO@lU6!Ry;*Y4-PY3R=J zAG`4;75__97t6;AaccQcXBr_pp~-7Qo>0W1t?{pzyU2EVx|Bb5{HpVK=ZzOkAXMg^ zJEZlaV(sqUNvy~aHYM*jeUy&Y^-R;mu{KLa5#~Q>g{lEz@8?#j+0VD*XAn_&y+K7) zL_jAe3?x!1#q4-#K#T+uYjHHTcX2e9fv0PDNC<71+BWjtiMOqhjop8%Y75qsl_@l; zxTXYRzF?e)sdA)NR&Y`Y5LbK$J4f_5&Qt?sJn;e+mQwRw+j?IH0(Wn4~{iz%y~H2;6Ui-|TM=F1zO2JOv8W`ckI)gv2vsqaD0F8d0IB&0A4v(if? zOB!>c<*2l?X^?q*2WkeS{E1Ke;_}|@-w`T7uYg5jH5yIZlC=r7QK1&%#tcqU{4qcJ zK4Jis17-cpE4{t{fh}pBv8Aojbf%Gsq{BHj6yb@#qYZ9-c4^a_i^}q8#7p0_ezfs0YB0Yqx1#<3&f{*sEJsjQJ`i6%7xm)-1b zw1Gu>`}4TqoG#|ePhEoO8-ax9iD$0a-23kHf*SeChEr`-tQKn_l9l^p?W)3)s4DpB zU!XpNVqS$f!Cw3qOGwi#Z#C?CLY>RBQ;8HSH;Ciod%s-TG(S*;`S;|$-mYKadc3Ys zqAfmBrKl*vWFZWS&ZQSn-P5H4IVbKZH}|9J1Wd|be!aANmttk^)CR&>st%UqyfU`t z$g0g|p85^CWk8DHs$DQ^tvJSdxBW&KmFcM8QXzBRa#&+EwxiJ;|A*fqa&kb-AN`mS zk?4=kjQ1SBgB=M20;C5wT(X_T_RykDi2&(~x-?|Cs_r<_{KsEJsM4Fnz2{#99#XJ+ z?SBcEw04zB87a1GPlgqKx~O20)CmJei;nbvjcau<(u5d*bF(O_WK& z{~&lgT`+~icn>B6fe4)^|BgNfMf4d;d$*=;66+!c?vbLk`g>D5u=?CL@})JT5J9{R zDe+czVib#Edj>k{Y18Ji+EHs5Re5jZ{SNG!15$810W1d_$BxfFg`>kR`N}TLKk;Iu z4mr}5Vltak8O(%3o#M|O?k>!oE)^4Wp8YM&Snt~5u6bx38}ljsl)V+J=tzaOF$5CRAt&??7elg3pAT@W&5d_S1Dv#WzuhQQ4Ui`?=ocgr^ay5d6T&J*RifR^HdW! zA=FK5jHT4hnz5dw%hptaKRkioIv^IH6AQf`Omtzu^Otp1Goi4W>_K^^9?2?sW(r56 zK{0>yqZcgn-Z#~?4Xu-LY$Zw*Q%0ve(6GoV{K;v&@g^xOR0}=ZOcxgcuT@iNq*`pS zZg-p5D$74Giv~Ph3SOP}0C{o87qLCAMRTmjveisb8UxeeB4)cErp5Rie#?MZFfA_h zo|r=`Y|^e7-i{;l&C}nT+Bp#&`}i8|$Vw&V3<8$j!)d4Z?`+(CsC!W~JKfCu*6JPq{yU*uk-@b94f9a3j!=mbm4N$FI z5pYxDo?P-6>CMnHAm&fJc>ccL+u!%mRi}V;Yxlr9I-0b!G%2T!)92cTaE!lU zE4uG=DfVtN?zG>Z9_25uH#hdKIwx^{JLmHH_P_nG$f_gdsUpw#%2E_bBPaWIGU%S1# zfj_YQ;w$)jc6LwVfOs})Ai@<&33W(DSu=HmSEn~NkpJxe>=GLEbTNPH&$at{le@cu zjbueY;)>0f@Tr_u!X0pvvAP}bW(>-+F!%?>{6o&0_V=DVtE(H@cu2U${nPXh)*PDJ zJrNoC{_xNkfAX$>-YhIqujA}g!6r?Rakbxy%zO%iKg}OFfNBkhdG532eYd~uq3!%# z2fBY3hs@&_psSrL0uoDt{^gSy4b{%cZ91(i7U-n;jpssD`E)VA=c~_vd*aKtjq=Xl z9Nxme^W0U1pV$k9_LVo_#cb(_oXpn{VH7Vbl^n_cVlRGlYCz1Fb+Z8P9oxZ&&g=e7 ztXz9v_v}6fNgT}>(i;nh{65c|EWcc7Y&@?FKpIkYNJL{j`Gv0gboG$M3$`t{H zCF*d5BC-&r(*|_GMmpx9<@{&%LC2t&Uw`lDzTVt|u*ex@Aw`8|n;aFi`0EOg1r+w< zsyry>hwk_c3{LM@8t*-`zYA0zwITp2#jtIErQs$B)^4J*UPhOsqx@ekz>54PaZh#- z`^Q@thP>FND;$jJ4LSp-4PVsaoEA-mspuI~+Y`O?I%;MAse2`5s;DaVBwe$qO|+~m zPKw7b>~5Mny@W5bOZ$3bi&#_FtJ`4ibY!!vV4w#ySaPM z2p|avtwLx5e9J->E^N8jf)T^V54{sJ@$ENv$M(|18!(V(ejZo*YjJLBmfAzSk?yVo zb^_*NMC8HM-NgTqk_f@Fh-!IVE&ndM3*7M;pW~k#+PKP9d(C6r@x6t6_pF{1kcM2y zt%b84GMFI1MsW5Ep+$UL(S`N*Or z0Mp&K^&gb>j!xeN2E0CR?SYHCGuvP^M(ClSNrlK>q{e^+A7MKbf9YGg+xF0Jux_96 zN&e(J-Yx;Y`CV`6;=n0nbwRKb0yz;U00KHBZ9^DaM$iYl`x#65W0!pU4G8OrJ-b&M z3sGhWegh{xvWy7eXd&VfQ9CekU)J5X=}e{k^V3`U=T6bUtvq|p-1)P`=|?7Cm^e6A z8~MWU*qXEZe%R|GD?*lP5vD_@O{yR%3z<5VvbvzNbG+J#(KjgOk9B@*>wVRU-5G|I z%TEn>GvRkcxn{9i=FAboljTo%F!(NUcQ?+RUc|e$BlY^rPrtSbullH`dtkj)4F@OL zq$|~^!eTH0Qib;y)(whzSJJQ#V1bXWdK|Czb$6p4uOsHHDU+E~bUMwnORkRUll&b% z>};n?LA8?E*L%e$Ogdvb-l-F0Q(-0z#yk^263hTTJSgTLvVt((sg#ZOJ{{=dmTg

WE8(hdu0Zy}Di z$twAOz7jPV5DU!X!U^k?t8v{`*dM$r4D>Abe-VsoHIh{8GFB>^kU8BfZ@dbvGAQO( z%HtREPmFEd(0lBvu4`y5J#8Nv8UD#+W%LW<9}o^|zuSFXU_~qF75U?poYG7twIw5B zbDbU|e>T_MKi@fB%J1nU4$M0m_1uo0~Aco&JAm;b% zJ#t0Q7DxZ?FbMQb{cpDwGB;N)Hcd6ksPU&2e5usk!mo>V*UgU zZ4Xrro9VQVO+}P){=L`W)sLsT^Xmr7_$S|W&t<*wbQgsFCJ(17kr5AR&8h2IQ$4~L zGU$szG19a?XX~BJU}El$tO$A5#d+_P|P3urq6i$Qf$2Ug#zwJ8~kh5_~+8I+oq2We`@l# z<9CjY3M1e$u=CxEqxvd4-$U+`_L*AOvHN=Wz2}1?=U|`l^z`l$ zdvf7Sohb40y|vPHoOj*Edk;=tdc$7yBKY4C&_@bfIbgKu=;TPL2WTJ?buZL~4d_gz z{Db%0wV%J`m*<_wKTz-fqud*#jV=iA?gj0GL~3;Un80x9HLx6=F71yLiU02IRyVX2 zfCvQq0R$jqkwi*WiBDb_Y6~0BP{=R;$aFq`&a)S${x@3C!xtQ$K4<@G6JWCw0@)CV zCa{sX5Kj+yK;FjR*Xb_6$$X|lerV*F!~uB0(m!m1>z2CroMEghx)?!&!yGhDTR`Kq z`6Db+f^- z^&_C_K4(&3&a`2-BwGdMGS@#d~T zrtVmALXl{oFy>rDiHLOySS7MGWsMLNZRYPfiVNvr89(&s%YD+1t-Ze;74FuY)z28n zVwqFfypEQq$P@R&sgl30yYbCM>+9EE$j^WI+Ks($Uxz&f+me8i7JrSkk!jV4gfkOt zhF$7lHX~Nzckk+Mm>($OPgpOKi2O`9;)b--vSNW>L(~IPM@C~MTyATpRA?Y4h;XcY z?A_fBbElUG_R8}<_nz+CkXmX*$OppvV@7N83KF5lH z;TC&H>nm8wbUNTD%LuOBPG-fQ_1>FMt${Lr=u<|KIq~F8xI;)}-pMs{7mfd9^1-pS zVCA@Bgc(Zqu-Z9>_~fl{<;imh`k@=)Ld!^Gqh16)^;_)&w?h3uSwHYeAb8l(`^&A^ zZq{`euBjnf?-cbIJ3RV7eH;4!O+_bmtv^L_zp3~1ZGxf8w&KOHO!VMTb}No1 za=)x?^+mj$pjeF;K7eWr6v3JCZ4Bs7!Mv`y1DnWB`-%V)71empbyGogtKJ_A8~MxLj}{s%!@gmsnDJ{nN!OBPF?o)ccN`K^LTTx1bJ)V6uQON+}f-0LW2mQHBcr*TEPP%WO;e=ZX6t!r{})4=0iiK;rR`756|5-cl}&` z&Ifqq!rc7Y|6cpkwg0yE!L@g+J-Rl%*1h(UwR?yDdF|}%pJtz%{mSgW&c1*4n%Tsx zeO57h*6hU0%QHWid1C%IGas9|Wu`U5&6sA0ne8*f)4!em&h!_i@1K6}bYuFeY5nw} z>8(?*O}#LGVCwkPBU8)Arf!@nPlcvbQwOHjPyS`{#N;<7ADX;l^5|rG(lvSU{D@$rw1-!k4BfBU#`TsFRK ze9hRe$5zH38@p%h-D8!p@R)k+;Mm5|S4V#_`t<0-qjv$7njiIzUN*XablvjEpGQuN zd}HLHkq?esJCYsoj9fCZcVuSxmEr#!{>tzthu=5c9gYv%hZSg|vxX;zxS>A`{b1IyS+|dEPS=pMtLK3IAx(9^JT4&f|pyOm&s*b_qB&+^q zdp+pNFc}%88IzuuxebvRI{-X4=>dh!!WfaA1m^C`-B=e9YMz0y|5< z?KU(?dgINansiB3w*@pQcfzX-Mag|fC2=vMBddX2GMcEdEUR1oy{IOgPP1f=By(mC z6cI(GwUspGO0hd`m*k#yhS1fT ziH3*Duxg|;lH@vThW0p8jM;8f5J6_kEuuVGvDzupZE>oqE{8H0x%6#fJ(Dp_hEaM; z%SxLoP;4jcuSm~ZQ)Z%rmta4dOs*D{CpfK!YC6>&g3A`!TIB3+OIq9kYFX>5SMZZk#cX2qz0&g<3rD7!&W5 zOVKo4Nt<7k9`|S)^>D0cFqpzsrShWtq{po?f>yVQVAJAD*NOOf|0>DVCOcWKw7jx* zGFEQUmMbA&#(a*mh9H@7`SY=47I$S<_9O9ySR=(y@=_~CWle>0FnxJblBYNYoedFw z9187nmOgN~Sf5y=N;T*(rEuzGUTcPut`q4kxb>!k`|56Npj0pv%}~v zD$Ui5TPqci)e5bnVg^Um6muKd^-qiPXwxO5gZ@G~W%32uDtgN?NnVQ?NvqZ#C{yaF zA`{U%VI!0Ac-5$k=f*xEJdX93t0@{pB3mz&S;|KHXvR%uYOcux0C zNsHeDV@79Lkt{e2Dt#lR%}51i1C1yRuQB2R%t)7zt0cK56{ipy)bc1Bbjm<%y-<{g znIJMa+gVzr%cLAEGkLct5BZx>GE;2R@P5`o&v*IHCAr65fxFk_D^je?v0SFk-YOOZ zTV6F)mZeoqb%MytQDJ!8I!6X zbVnI*MtRAQg|OGnik;F*9(1!#G9L#V)t+FrL2k`wL`8v8g(D&!w^|pGN2>&PVN8;z zDI=B95DKTs%h7pq|Dq%h<|xWqTaM;Q2OTc6#O(W}0-pvk{I+N~5mu?$e0pwGk-f-K z1wvcSWZ0sHh+OoD^t>U$(p4nrBSR(`8&R0vA;}fS1RW|zYAuhhWoXem?-S+zTAU-> ziclzPODjCffvDkcQbEeWP`P4)bOnnF%0e&dCAr1tqKeT-*%?q}?JWiUZn35Pas<2K zeCcpibwx{NVP1UP*Yag4MhzaeT98Unl;u|OabG5{ZB=XeaMei0BgEGG`;RXhd9anMi&0o3Y$@$5$NbSU2RhF(sn6M;QIP65#opGD#KwTb5>c#IOBU?Q|6}e?sjIFwY8YQ*&@AdmJ38Z-VFLZ<~2s!l~gQSqvRW;$K9P|qnWjy>F@-t_HBfEcS^N@Kj5zcanil1uhE9or(QMT@^Rp48*~qzo(Vq*XCm7uC4!YA4~{hTOw)iWF| zZ-!K!YF?XgQd+4`T>0ftCCyT#(eL)!8@Y?6CCnAdCrGQ$QB4^bf4QyPBb^~#E~Ax7 zwL;;z%x=uobLv&OPU9kC9$8%0piG7uv-d0Fcb%0eTuP)d7ic7dvL#g9P12!ah^<6f+HEJ2c}yAbvsWl3 zaSkhWDQ1tg((3TCoSBg(oHbKJUQ2_^X3A#LR3qxvh}E=msVtrH)H;!L)n1ClFaETo z$C1v_Y)0+VFs_c8W9-u7ig zBPwsX+0>U57YZ1_iv;`cLH;8j9v@paaK);QXtyc}h0Yy}JJW$bOD`h+oG{cA9a$zy zGPb}L@jJd`AwgQ=37>`yhy1CGUpn9C6}~3LGF*X4C@q$DX6obO^SO4mKxV7~m8zr( zdCT%krEMoyuITApdfC-+wE`_ym^@2bnsVkM0DoSKF#X-#_`aq0HD$gj%LYjDp?B4Fh6$1t450IgwW8QM$;yS*vxs zYnie>%CGzYR=3AL0Yk-L8Dg9Q5Rk336$x}JFX8V?s-+rvSVclSv5Z4ZvMj9EP ztRF|5$S%vuTVcpb_ia9i#=%+Jl5)%IoX*Tj78l+9@GqWT#6Luo5D$Bzy{&iO{en5w z9nV$51m{8?T3@*BknE3JK8jy5P}H|S^2cBO_9*|6Is&5G9~FW{f-8WDO0?!p4VU*2 z%3Qu&ui2vazqS~rY^f z)OnLPO#E^}H-10AaLd(~gFRsQNY8cRuI}*Y(OuV_&F3F{ZGk4Q=Hj#he89}2oQcF1 z={UzO;)K$_UvZFbCi1+BvkF|7q#9iE|Z)7(zxWAOty$g8d;>Hlx&fMvulwcqp}1?%7{puSpAGl zd5DqmPk!X3v-ls^Uz^yxs+b~CmDPXnk39N85;@|prWG+Ng6}Uz6f$~|W~kU=B+f<` zNrF&BXoBICBzH=);t(8c+^w(tubP98eUPM}8FxA+7K zrbv>DQFQE-X7Z4nzq|R`!au0(pP^HzEz8i+NQ_b}QgLN;k)~L3k(Eayi-`oQL<1+_ zYJR;Ph(omE!!p_K~!4IM*ou{=ii2qKtG4lmcHLZ-%Q5GE+LGbz_EsJrBET@PsLPp1A z2?fP+QX50H{18L4cb@#4Fi8Hf>ed&929aT4DC3k2jjTw>*bIkQMdWbs8Vs^k`9Bp~Ztgp4o=sjZRt zjy)u!Wc;x^wu!Y~SZxCUyo!jv-FT2Mf26PnmA;yjv2lS`doh6)Sp-s! zUF76Md{G`@6>L1l#b}aTZG474gfu!&e(>tu{Ictfvj_@Kwf*a#+I8JVKL3%zKH)PI ztE6R7Iff*mkfS4_%p%Liql<*VV~_d7#Nq%}3$v95|Mek;`tXT`5ww=@oi~ikH++Zx z;qdLGLih!8+?wKaWKqUZ=wmt-S!7rlx0s+wB}>RSlH;U>0ICVJ7Ar(!ytelrsBMqj zPRbePYJz1c8HW+hQE~#Kl4KV#E6K$;&BO^d7Qy69tkzh8QAv>>CR8IBJ8uiVvC0H! z`d7Pze{@u+GIKSk!zqS|DHr8YrA!#{_zHu1%j6Lz5?97!%D8-0x12e|kTk&`4ZXJa z^>yowYF}^h9oNn9+(!-PlZr@GnZP_>WFrYy7(uedh@8OSXXpf{pco2w-BTY>9#S9~ z#mXnFXYsGyZy4LOT3tr*dav?-855g@R&o@@DdUT=xB{&$Pbg4zCMGP8WSo!@R7~-D z)fI;@KKUn~_)oD_{=cg~*{?n&i_x(}f{ZUJ<54VN%4l>E@B;Z_T#;ZET%3y}UY`JR z@(?9QmzLkk?(Wxr&zb7~dK>M!ZbBNB%BzvEj3SAI95Yu~dE#+QG<;c@!;DPUZ^QVh zW+DzLl{|OsrL)ghQZn}S1s(aR&%B3>^}i!$lvhV6CLX8A2nLS~jmF00Scb3`#pQDR zo`h1CNSyi(jqZ@q{blF?^Z)ZpqtcfYSI1(Ef{@D+ixey8FrBe#U_N1ZMaftsf_5XB zQ{6+8hgc*4lpcNDP32- zmpm1W2R=)O7is4MP(Xf*T*{u19v+Gt&bK?{DY7^+c5F#D>{-4t-!GFJPLF;P&ELN#fKmI_qJ#jwUG&QBsn2 zzfzfvi*0t-QwV<;EJJct?SB4=pB&lT`^!^8RH1DJId&z#bF^l4S1GeSSV~(gc6a}` zZ05iDWOx1C=|%kd&GRBx$N66t?jX*UC~6}{Pb0OVoTQw3jRq!0bvv5nhrfZ4qX990 zVmk9WiO|+w;~UVk%eoRrWkj!UL>J`h^?+BaEoPZ?f#k3JDq?v~mm&sYH*QnC;27_` zerZGR-@l5B%udHj3|hq6WRpqGt@CM}QCG-N$nlF`M+DrUaFrHmTkoE)qfK^jcwM~I z)s)_RDO`t5%M@+taWDMdH}P8rq&)HU`}X%_-|8j+gH+bdb<*P2$lIp0Jg(sX z{6Eu2g-fsxl?NDQJ<$xsN}6ExKR>C@K#_3@1Hwe+E4G%16us80t7aH>g7z!WzCb-M$KtS z*f<|3srwi44bP$ugJpdA+`A6;-u`SC*;yPbS?Cb^EUt4lLGINIWr-uU0Pz2G!_jTM$A5zR^jX(AS2EBh&W2=* zRIyaCs;oF28Gkj5W0kPFzWcfEhP9^^@kh?07Wj*{U%##QtLHGM#Du^@`86X~Oy4;E z!q|qngOiU8n{F0HgiOK}A$%bNST71i zb3`uwmdAgK;V@Xnt9rLy(%bzzVM;XcE5xNN(F#-vn$6XNO4=lIA@siA8tPx-!vkgf ziQoEwy?y1{?Y(<{DTbI;PU%s4WjQTPHsU)UVt*$H0*RA9x@0K zI)59wf9~gVPtPBm`|R9@=5CnF4}D*V)|vnH8{%~y;;(rAEt{7gn7wUYGrKe!9k$F` zXXQh`N083=%pYc+oq2rbqci_B)10|_#xQfy%+{GT)4v|7Pahv1n|@^aBSTkDzia4= z)8*;Vv})+R(+8&4PyJ=;#MC#Y9-6vi>gZH@$~DDK?U|aIJURKp$tNd2F?rkM(qwGX zI!RCNnjD>YapL;{@VBp!S~jeqi*- zXlm3s%8c$Aof`S$$d5*z8hK#;k&)X*mPTUp;SuYIeB`W=iQ$vOKOFw@@F#|E8(v-- zj*4M4Mw*ZXNo_3(G(}35FETz#^j|hPg&s%ET+-fwzsB`r(SF)UHX|hXsWUlS!e+2@ zZpj(n3KHaDt}eskHk;eS7P&p_wf+jNPQGxU`CL znshHo{<)$J6bM;_odlyLqoo<~{->y@rVpwqpB_PNDtp5mOnbj38g3iyJe84|oK*y3 zxMd2j=*>1#Otf7nl351zO~l=;NP{fL@=2#{{E+lfStX^Wh;lPpz>g!hjfi4ZBiA81Naaw?DBy`W z_gkmL)n#L_Q7LhXwgoqy--_Q<#k3j9oK+`ET4z30iLXyd&#UN$Uzb-0i3(kou?L?J zA7?Y2IAKmk-43JI8W^T=Plyn43gA)ZI!y$E|EHf zNfB;R7S~rpOiZ2jW-oqLdfbsTwBi+4z08$;+2pxm(8{ur(YA85!{lrF%&gPXj7~f% zR+C|xSwew)i^%esF%+_MQjaiH&`QNjg`CkXv!@D)ElTNmqD_-UZ4IR8gwxTAo&TCB zA2`Pm=Zir!Mg(se3jXDEhA!9HnofCz=npq4LmCZ{FF3>YL?LR7aN9(;w^8YfRVjT? zRZkTh`AUklbj9DL^jJ&;vK}})+FaS%y5v0RvrJ2aG(yFoCf+m^ni=g6#m5z8U0I_n znPr7+RqK&2+uGvuidc)LY9%b>Wt+XgD0hqV+^EpY+?2iJ%_*8TKViwbo|5#aGj4ZI zr_&;ZT_eOTen?a!ug5r2*DxFOwnorRGrO*n)5RGblcRZ~sTyTqsuqdaPG zlPPdk8}cf~uZnG8r0;UBCY4WeVY?otOj(`r;TqZP%5dnE0qf|Imb6-1P(k?uy$e4i+%Q&|O-SGsNK za!sc-WJkmZ9V2Z+BCE8%SqChHL?T)80@1H-q-7>Kp{ZL87Ow5|BT(;3@w=3e!Y~#q zXJtigP*dCU8BssN9O`r+6;sF6F+XygUN9-i(`=JUw!JDMh{Ix%x%j)18kNyX1hn9O z(?)_0O6wBEz=|xB{+PK@beV&SPIC4wq8gG&wx~=%7X!VIN9$IuuZVJ@Aa4<=Qk2X7nC1V|VoUpdo znu#3^igH;eRHrFlO6Dk3>PAm`lQh_5?S_Y}(H5O8=rxx;^yWW^esv=lHfdVLa)A!W zGYekj+?=E+Sx_QUy=V(sEfrroG2RjzP8Kpp6dJ%-EsCtWm03?pj}L%b&;NwwIne2-8D{7b>4mydL2F_uQ@CTwrCZEpvywa! zv=IJmT%9sBBQ-f^|CJ=?7zY*A=8c^soA9W~wJ%F@kX=(%cfzeLW|Tgwf|`)x8o=ov zBguj(m2O9h8MERttMq~;Ri`YSD(&{^YHeS3trR%XRtHl=T^3R2sX#$%m8*70&&yMF z+K@_`J>aHsmgo()OLDU5pxnx~o-kATQiz^AF3MZQe1)XHp#@`X8N*g=QVT81`>Ke(0- zy8`h=;J?nqO=PLy+ zLHNmPOt0{@3Nd1$C&}|pCG9uals=}BiFw#*DcHM`qt#@p&@MJvmdlywspqBV<1QIx zGE!VDnQ5hc>C1DH+?iUYX~ES-rM2Z!jUEvX<%SAv*9B{|HD%3)^q$nv@1*BtX*F%p zmjj)4OA+#A_DG#l?o>!hS#|j1wtCPTlW&q@-pe^nj4B&d4Nt{E6J^?RK-5!CH8`4z z2VIfaayDkrI2c)Txr`N=0u~Xp1p@a{I@jMu;me)rvaW zttzp_h`az&jEnzCe7;zq)uvRtkuPv;G#48d&!dK73<5Q5AL zs)&`6Wpsdc=aQa0$BMN)XVjZCmrVa&FMIUf9@ zH2Bs2TE^%PRdsf+GZ78`qAxb8terqP7P6$Afku>62Hw@zZ&b)iX_`t~{hpFmMyr{? z+eA4TGgD;RZ1f}eK*QQ;f3mM;*+`dxd`>X+V!0;E%X40F$u_dU@=+k130sg+iweoT z(iueVX0o)>)QmC#b)qPbd8DyiGK4c!EA0fUS*SGk?b`f)T{IB2Z+C zcC}oBvKR^0$2u}`qYlj>e0?+j*FQneKpD7$U2mWb=>`9%U+{87SkAePppuVbVMJ->ApVtG=@a*umy@2l&P^Mq@JJ&HJ^5Ks>Au^6&XG z+F(#P^sNi6y}7@1-GJjW1GgW({8xe3V?fN``t(Ki-ivn~*#~x<*I-rN{VGh!e`ZbNKb$U3J}lU^55el^ z`_2$X#^HV}Q!x^b7AbGMY}LA0eZ(j@rnd2&p~G|Q-c)q!b=`v^!u~&o4*Q1;6$Q%{ z2xHq+Aab=gzqc8QwcJrs%Rdo3yqTY!IJ|z{n~GM-sY`p=iNisFUeht71vI!?ucb*= zTM53r?(jzbSCfY~y}9V*4tk*{n>vi(u2k09F2yuvXGj%|YLO$N|FwIk53ip)y-3Ir z0i*6WHtgsP&m1-jbsiI3Jde6-s_6@BkRH=6!t2;oEoF?gf{H24jMA;JEMY>DHocb`SsfN4!;AQ(g5| zdc*V3g4Y5z0XqMhRsh|(vE|taX;gJ^Rn~ypiQ(Q!1N|%E2bwW7x~VlgwQMP}y*`AY zTmG!O=p%fXLpvlVQs5cvJfM*TCK`r5&Ym)R^uQPhIC}SPZq2Pn>Qe`oYoU@XXK^t1cM)egEx!eN51< za_begBj*E(!CqL?Q%bqUl{YBVk#socZpf5LG_e=f^mW@?6Jxw0`sjn(LFF#q*`l`C zj-0*N!iSbVvrf0;q(me-X_w;Hg4PavU4S0l1quvodv$*Xhz~P>rUP*Az|IMy1H{YF zmq~Q?Y-`=<=x1r5a1;OFb~k=c??O5QvnEwE{y3I6Zf!ODQv&tj{+{31Ttmd znD+R9;{hm{IkT|f;e2Z}VH1q2i)CQJkPx02l+&Ju)JcoJ&*@|Dry z+heonz^^Yze5AfIKn~$mJ&Mt};q=gzg7Dy%`)2yzW=>cWxE1~LBa7kF@@BY{!JA|y zt_o=6ST%w?L<_LjmWol}&Fe69zUZoT^h-obFWBOmU$b~f^AwxYdA;bvIuG!<)^q6l zL@hvkw9Ydaxm?^qDVWw`3av<^sg^V;eHvYXwPr_iOT++^?%|+q8<$-&P5%vR0ab}) zejJ)%(b1}6iBo~qL%L$wM|lB*nLV5&pqacPbnLqH9O~Fl-$);jv?PKFNz^0{kdB1E z83E!>pFD|fw6vzt&!w%gF!4%R>aQ>eG-&jevUbZ6-Qp43(7F9lg0w`n5<8idh)6W1 zhaK#g0%ns}2FOc+Sq?bnQB{j#;A;TDh=Z@;X%Hw@`TP|Wi#~So#w!KrB1NkUK4Uy_ z>;U2{2E3IFX&_+HLVOYM(lb2uY?sbex5feOWVtE`d$GwK#}BAiT-F1c786(mNEh63 zTohO13d~>%jLwS0(7U2+1rwU3Inu`0Efo# zQ369;9AMHEX{HJ0*05YD+Mx%p|G%)H2S2v%h!#d=2MfsqfN2a_YsL>0m1-c^jy4y@>pK;}b*a!zPPtRcuh)pnKJaJe3=?C|WT?2=)1-=}1T_E-| zBmi=)3HUg`*ysi#RJD*(Tq(LmSDHrS1HSr4?qt^1;8_1p1nwSUbavP_)ae@- zMA*cG8)*n!*bRG`ZyunnPvBN9ue+@aSJ2%yNb=`dbdz%QjEIpR+L-5}!5e*Mw9GxfLs#%{Y6G-S3CZVQCRS z!C&1a?ASyPT+jjn32J^LdQ4n4JMQ)Mu&Iofvl9HwT<*| zY|xFZmiZ0P1p73%#G4r@=1y3vT8JvD<^yPp3!31Gk^Jr%4&vtqR|^2gt@Bfh!>QKd zl@jSvKss_AxUux?p}but!68`qq$>@t9>QYJLrloj=eE)z4-D^C&;0tuX9#aKvMY5O zU2qXRL3m}|m5Rnc9~`6Ui(u)Tb%HG1h6leji%+fL>&=vqB|AF=fx;F@;xWzob2{eM82yxWu3yX`rksT37n-vdK-ptPCZn`%K!o^5^$bc7A|NGdcT1zB+$TxzSK5)GrV80>A<2z(E( z2oPo70XnefW(UyELybxL!3cBEdgr$<0>nw>>VQa2Rg(>y-4`(>&^2l3%u*>jI`JYz zj1)3k==amifp3}Lyf`XVL)=rwg$hR|pEX+4vH<#J9A3_RF_QlfGL!%kW)tmBfOgM( z0Bmhb)wDR4P867&E1CZpFCVPP>1K^t&h~l0l;fJnH`JO0Mx^Bagj8>K zlTo$_d8IWu&M!lU_bVVHs|MTCy%o@=t>*b1&=4CIB}-JRX`&j?QFTaEN*cm!L%**> zUwCEcm8ZpX5Y7bbGL{Cjkg0hFS(e?R>ZyDcGS?M(Ti8rGD$*djpalC1PmJFEhozgT zHch`!VpfKG9sp!HlLVGZYvUHXBP7l1A%G&u4D|F?V(I3xv=YPrh@p4Bx?_yqehFjZ z5YNxTN@H)4!mQY9YFLBjfTAd=;sN%{Zrk6Q99>$31b6u74*jmN5xrEr@GNxGrc1_< zwOkrzLP383H{_j+E_AIX=AhK#_C!2Jc`j8jxuodEo8WTkZ@0!qmlmPIudm@c_E;ON zHtQ~2)vF)gyykm@;#C*+-#K!0^+U{~Q^lbCS>egJulwj+szaQrp{ozTX|c4Zt6uc> z$$bD2`-#ig+m_?RZOaTu|CVM9&TuolQW(-zn+WJxS;a-?TnV?W<*Oihy<$LLyK=>g zR{vFC_pl!^Ep~Y6P67MJ^Or5Ze{i?UN3Lku(c9Ow*1+2~1f;Wmpl}7|Z3e*?XpG_E z2&?~ExNIz2ijMi^H-E%EWAI}WM<^JGQx?z^t_ zu?@?YLNv4D9JKv=Q=@3#^($Yqu7`mz9lC2u!Pdw`A>$I;fmF~G z)JTBcPMAgq-vna^CMG4s$(tmv9vtcW;aFf`M+KjPT@uc@Ghjzy&$)2QWm4khg2;sV zgF0)0F;8qj)UB;`qf1NBE1NHaO=W*)6aCd&VN;p0&F@`oB^2}ItE4P$AlxOrQHla@ zfsNzY+gej&{F39(@9XCDZl?Erp4o1#^N^{)-2w}GmkP(~a+M`gbV)05Y4_!FicCm~ zPNJSr@~WXrmEWI3-|o3$1Kma~EprbLF5Ux_3Sp?^bYP7DC3U-`2|&98jae#1w!feL zL1_I3`u}~Jxs_PwPhISorBv}I0ZBSz5gP)TfKG~j@mc0tw^WSY{jv+%0bG0f{Li&~ zg01d(Kw9VaG@LS*rKG~^k0rBZ!V)LCbBFG_9Ue=(GIV?x4q@n{FKt?C_sRHjYaWAEfZY=SxnWy`J3rtI!HdwIf$SY% z34N?JyMDP+bhGyoFMVui_-rPRr!~$P=tMvnUx()<;Hm z(k)YkAzm?{ecxE|2)N=K@WAA$#R-)$Jqa_$E9_IOd`{qV^-@n6#HGxH}$|~lo zq{vu7rk1E>-P}ADO`I=A@+;1SjqEH033Ug{aDGXhu*Djg_|nirp_<0H+cqJd%=z5avZqW7wkgc%++ZL8(|8`daok8` zbXF>Yuf4u>QX0uP}}0iZ;F89hL|!5#~k$d_haa=kWoxFr&ak;HoGw0F@t(f_sY4rHtS|ek;GIaFWE4p{x z&Gh8o!L+c|I}ZTg94HQDqRMeB9jGM=^+Z6I6{8zRp`Ba)0bV9v87h3v33*$)56;kU z|D&a2)W^7}KA6Sg0)P=|D&Tgz;|8S+Io^YviZ4co)iDG8%6kwEGl4a0Ru`_MthJ2B z7fU7sNcujECr^xye)hLU`my&J(}Q!>>aT)}Xw%STtDJ+sV@V3~v*+CEYY(q5!?#}F zo*3s(Dt+{pt>EVltZrYp%%r}wy1o3Qa<}!zd)shZ2hLY>(?^(bxY24ELIRtRu~0Cx zFp19VYp^IHl0t;PqsaRu~b}PjHD%)-GMo^`8+Bd0ev%0wbzd> zEn#TW!D6n=Y^J|91%EhhwH1{)Qf-P!Beh)4WI+=$_{-hX?e$~4A}}mNX6(hltwLWv z-8KT0*SrIEFc!*7v{*>7j7isTY z`|f3ChMofjS#B!m?N=u+17GzX*qba`h7vUdh6)#H?$UX=Ge8KIV&)Zm)ytM5>$CdiSmxykqdH!R(-W@Z7<HkjuSNcEG`+EQW{&2s!U)=jj|F-^tzPI~+*!S(eFZJEhSMR&HPuC~x+t?=< z`z;{)KQVUq*mYyYu?xnOWBbO|kG|Ji82#1g3te7>4kTNTy1T>(qg`TzXM24k|2Fd3 zkpo?7gfmBWj;!qxBRn(w!0;g;Mu-hl!_wg$!)w;QyY|OxpI&?a+JkEw94*4;wLQJp z4!t?_UqjyJ2IR&zx-&y^m)laSd(&}4QH&zE% z8&(smXIA$J-W2?o;7P$ff*S=D!6yWoRjURbwq1N|H4B4D6~*ovDKncKC8fttN`l@8 zyJ78AL6UM}>KYIY7~?WYQtD;H)Tv~`X~HBToCMRASDXoX5L-WAP2AD7av`k!# zyV(>vDwhQ;_j<`F^Y~mQy({UuldT^B?;2t0Gz+R+fD)2^%*BGXQw5_|iMbWgvLPKc zD62BZFWEnU^p^(2b0tazBjk_TNylxhJmggu2}c2-y>hZtPAzh@y7Bi^G*_eK#h}uh z@TCDdb7q3A4xkwTzDUa5PKznz?WjZB|I8I=V-}(sar%=MQK+6v=-He;DpE6rF=5$X zPm6RFZ#=m3J8b<(iOS+`C#6Y?b;5>>-1T=(?krU>B4=}D zH08#fvZNpi{e&zHDqDg9)#uvQdY<>{9q6r>$qlA)JVMOihu=sZz=sS5$CLKKGgjhmql_5tiD)U7sY3!_h+^=HtFecW3 zr@LOyW|N^IHj#}A3yB0~EoUjWU5NqC-dZ+Qg$n6i%|JL84Wv>Dp(xbZxRY%s1kf>r zBLLYkMVCyh2|D`O-iHWxz!ewe#Fbh-qQy@CB3B)gHA%5GU=ezA#&8P5USj3JL?(yV zN|A~=BFx1ylI@@20*k_*`@*s zmxxFula5^4W{lbs8$QPVZXh8{;TEl{BTUt$F}EzFXA=Xd0EGh+x?h;VjA{w)jf`#U zCcRJry#^ztc*N|gxCx0Y8svUfQug2?eXxU(skGjNz~-YOA{lJ2uJY zS5dxB!Wzf3<_zRnDy&tnX!7H1LuHE&BXz~RELN%jSyV#DrrS|vbIt`eY>AIdXKXf? z^h`Ew59Dbb208Iwe^Z;sDsds3(nOVIt|CclJW)x`BG)9tgHN&pQAz+VqB&sb=oCpj zQ*iHkkCVsErBXN;0C=Wq(Jq^2llG`m5U~1PB1u_PEIMm?Qg;ql-Q-W;T0dd8ChJWl zCE*rDNkajwPD&nZ5+P|so}OXT-l$?dMvw_ZJ?XT?0pL?Q_un11onp$?UgAPGix*siLt-5^7J$2pFRYr$Pi=01S#Y?B!)8(JZ>H zS*)(8xiJBo^hp(xsRH0xq(a54(cu-vMg;877UCU|#ANr82CP{0NJTT}vF#M(mLlf! zI;?hKP9I2!43}_ni6c#_(_yVGY$z*33E^FAJNcR-CiaU0FF#oYPy3h|)-YlyoNNW=k7Xr%Ao-JJCIvrWe zOY6Rx(ABJjG>>zQ17Z}Wu2`c1xi{xE#CQFPt1i~Z<3O(&H5T%|Qp$QCE6&9OluajA z$)e$~*oY6k&5AoqqeCToxe3pOd`aBrsc6#abTDnf&wGdc)m)IQW3@^gm#T1iSrMK* zz{!mzA=&W9mY!yF;i#-rq{E8|O*rPs1)Jeca-)wOiL514Ys3;NS23qGmocrE z6YJF)OVb}Aq8bmSmz{kb*E}#n5XPcTp-dJExp;EhBW(4Itt75V?Df1OkS#`2L)`k$ zSi&m8ok+#vnrfg?ma4fkH`7t1m83?jPDv!5eAbg1Ws~QqjKZMF5{9tH4YWdy#Q7}N zKb4O96YwDND{T3MjEwg`!1gBXZ>I5RT~V@9#+BGs3wT4QEAkc{3cr} zwwocrVb1@QCtglVvH_DznFLV$ebekmr4%X+8MfD~28p96tS4k_S|pXU8xvSwYA%^# zUUd$S=(&?ADa%9%wOna8%SFkoIlhW!dzr*i?s_?r346`Wsv1BE$|vyv z`Dsop^*2bjO_r*sg=)KPeIMI=v@G`Fs#J_L3Tv{MKX~T7-K5b~u2rkQ##tL(gKzfV zzM4(1IR|-!?U9L8zG?Im4xv}*jmB|9DU6O9+K^Wxgr_^N3}K$*bKDF3V!VCf3bvS^ z<15%=XyM25R|(MLWZMssHkyn%83zh(SYb&$K{*W&+N^J~zka@`%>f7f) z#KSFP=pj*CvBDE_jTqjuj#|-~C(D(5$eC3&D^m8;wnH*Jwj?~3R}Wn}`O_20HAkdv z&opHE04H}!sg!CE?IjW7#luZ0|{Io{}%{R&umWu5@#3Mjtd}GW@l`>p{~vvGjPnGb41M!pH05lM zqI6Q8CmVW~mGA+?Pf>zGO0ZM##AwHJH*pS(A1T3dxRR#3)GKH@y6e?bHql>Kx4S{? z45a}ZfG!E8aX{Qo)T|b%&s{FWnb8AEgQa3L5mC>f^JV3Yv_R1YFOz4Uf$(Q@JxxuF z3gVtPo{7tog$OLVZCYr8C+@B{G>(Qh(Fe7R0aHBx3Fw8g>o^hF$((`E8ATeb=X>?VeRpX&?`G`0xVe9XfJx|!AsVmi_UuMEHwW8*2}C*re$A=Vxmw)(Op+>~T$WyqfriKOTT6U+)vjCTCp{o!bVt?kFrkfps9TslD8 zz`1mIns`D>y_OZUwA(Qx{Cu*Pe%t~kN#H-_>q*JFf}U_bk&Eo$N{M2@be;s`dbBFE zh~faAKIVhfam?NxALEsw*deJz0VvCAkzbW+_&k2d#__cwsdc$hNQ2mb|0}+ep&hjoCQ2r6 z#sY=}pA#N#POuIFfU>#i5}|K>8O+Jw^uu zg)p}~F?(XMAjQWLy%(cx7r}lGY}+-+yRDg3A*Ndd<$>MXsbD<`LT$V6W56+SQjp}b z^&!vA@qfp@G7goC+k<0*9OT!;dyIom_rC=po1ZVdEZD{5*pT27_Ra@D-`S*fo^Ek^ zcZx_T6`$->;Z^IZAnPF6o`OvR!VkiWTUD}Z(Bz49#2wHA=&Cit9qzx6gRbz(Kvx*z zlWX^HrcH@9ASf8;V~gGrp(j+UV=jMAZIk=;8iYmK8&E9-t?)}G_MWqgWu%@DwYy0( zQRodDx=^;8WCRu$rV?hS7YvXA=CGec>PUNXoL|<>PdIczb2I(LNLw!0Vwq7F3Cfws!#8DM99cOPz=UD7m`$qAKlov<=%VQfeTi=>2Y{9&>%dYE<=z?r}blG*y?!%8}+lCWt(6&_q+faLS zS6^TMj|RUoZ0$LN-tqEXX9~9Z=K(sGBlYo{089oGS%9=bYsoQbve6r$zdSLU5ZjFd z{_zdWPH&%QP<+`~E4LmawS-BNFe!{xg*n2_<5ico0mgP|8TjBJG%Y`H&ldWPOBoLu zHP2uov-7BnyCZchSWmiqxl}l+MGqR<>(LLcff@Kv(edlRd3E5`r)Ox{wJ?>?4g-(O zwnN%O84(sOI?NGe)$AfsAO!97T-{zb#w$Ya{v-%_KnxLb=xR8WH#0cTY$I3%!qf1o zqYj&v+mW)d=c({YI8S*+OtdOZ{!X~0TW@v=rEMOaA9AL|q(h&Cqp3K&5?THO$ z2nvQn1_KHN09~-vE${)pCbGQ;F$eT*Ow7UZ6(BU&i1vMc#rwkLpNEr@Kf_@pzP&y7 zp^2y8J+y@Zfw+V5=rtkKx(ONo&5#g=84xpLgt_a{yMyuQEnoUCdGrq5)gB!0v5o2l z2m1fnw|nTG!Iy_?OngDS8!=ddb;QQurGh|dMwT2JlQ|{KL>&ZkcbFUFiBVx{Yc~OE znihVg4Z&kcdnp2}))}ul?@)=ufE&|2V($JbEI)o3dgWl{e7f&zaM;1ht1Pa(Y9lAZ z%%-}-YZFTBkeIRYzV_VcQYn*@F$ej@2WIFS?}G;5XemSA*`-@9)!brSD$F?~fq+hK ziK5?q2}YbRX0yP~|9fW(9k`!4o~-i>R5<&{P!@uBkhP_A}sa-=zzDbPuc+%%cTt<&Al*gJTW@FWxSj9wUK`8Uf3?+cx524*`3g) zF6HoIz7{M9D_K&XM0Xs9?_VlKwjb`DWg~^h?}m+ZhL|rx18nkNR$fR&2y;-Ovnx^o zlHJzp4=~5`k`i?EuE;D6S(#eFx=U7#Y6O=IJ~#A*;d~F(|L4A4j8=po%GWyITpSh3 zjVIvE>Qw_dSO%kP=-`v>-D5l{Bqko7qksQo`$A?~+Kba-Ntvt#%qVHrlqy_WkOYz9 z5g1aw7$Rx!KJC!;2iDV%J;EIJ=7m+z1gn*acq|qowP{%}s0lklvMBn(Q5apG7}+k( z&7!v%8i3JVfbaf80`>knnM>~4Jh@$c$iTt>-;5) zpC0oTMODn|%*3nylHKo3qi;O{ZSciN;G2aL4l-QO`LAErOB3HQDsyVlr;ed=``FrBB^(7JBfCOEx1bb9?&Lx7%AfL&Hz6x?#0>)yR7zzZ!XQl+ zTw7gx(OS*g)7NeodVlD@hh7?@hwdD@dMG#K89Hxh&(Qd&a?Rfs!O<^UlV0OobM~6f zt~Dcre;#~o@Y%tmgP$L~d@wcq+@NFd?7>}wBLjaKcx~Xj0}l)w8fXth2P^}Ufl~$s z``_*VasSi(_xB&{Z}tcK4gEy_On-0R@B3cu`)1$0qwD)_9DBX5+ILZ(rtkE=4Wos= zRlUC*Q}n*l`$X^Ez1Q^?d;PtN-cx(m_57pf7d_8gdmirje9z@QsUAnq**&{@hFAY- z_0LxS$Lg=H{>p#!@acOxLgQbv-h<&92U8r@*#UGu8fRgu`tK||K7bSf%|Q0L5V za`iLX3|0dOad*I~PT51k=Q(*oB_Zo3gC}N)D@EoIKEuhaSdEC}OM0;;EL5e!25#V7 zhMWq|M6+5_Wpo=9_`odpyQ*q560{gZN~_DQmTdks+f2tLE{E`PDnOYHPJ>q_9XXvX zaGG>^QXGWts>_vzHo5%^oLr}=kW@jdOlCFNf-iQ;^{m`cOqa=&JYY?`#Q8)c(aXZX zdL0D-m@B&U7Rr~8kn!jQ>k;%i{Bj?T=R2fVlB~;o#gO6*t|7Ngi>1Sox-O3QZK}3eWs8R+?5^#JQwVa&H8?b~pU~Q({2_SmZUdYPrC2tB(r4$*tQz&yKh;b7; z5O$f-X^GSd1*xY*r90xCw{vo-JKnS?%NcFTm2`wftlisdQ|Q&C#i=utb>d`5Ejcya zbuD^rz#&&mQ9*r4M`_|`zs3HjHDfjr5<|WcORMXogV2OIc|0Q}V#YvJNh*tVZ*q1w zC+~!T;ZS4+0$^1|XqCsXKXL_bLW)V$(Kwl;O8R`tdJ5Z1t65~knl6V7;=ioI*d!Z+ z;-zA$GOoaZYlFi5d=u+x_L_nwh=^xKXBkxc;D9Lz?8befHI@EU3m9wicKd`ir&AhfYlSjQL0#U4E5cjQxU zXUgpoON;CZH59YHh|(!>=Ib$gXbr4eU~%^vfb(9F5(}FpUxD!A9Xs21LoOs2dHn9E zyPlMJW%5-g#Oi9kkd`OlQ{B0cl65V54c@SpC~3lFYr52oswCD=a@Adqd?qFYMrCvIisdQYH}CiD_-30K7xaxr$+#aw|Cn6L4qRVGoS zwFMcmbp!iJdQ+)s%@b9>4S=}QqJ8YI>eWCP9fLg7WI5rG>CZUEHlnMP;#edvmj>cl zzr!0<{+yHNMHCS%zba)ceB@^jLt!9Y^!?OQjo6*+Y8HHVJ3|D|Q zI)Z7=Wt!U&((Ce4U zB@K_LgbjX{lPj7zGLa4EfI2`gl}fCv|I@1_Y)Yc4v_RCIBc+f;Oy{%x(KJeGbtjI= zQhHgbQB7=qiET%di-hrXv=Wr7HR>!8kloA413EQfFu?l&n1HBwO!+z|S30X?#NjH0 zqt#$OAqv&+*kWje_KD_3O zTjR;P!Hko=+!?J>M*KijEl;Q$WZ5Q<4sd(2iZlcuW)BbP3|3s9IORU}yOagFTR|B; z(q^ft$i@4(b5$7^XECciOMbk>W{FTvY6Z2&-skJDp_{kW>2GDtxmb!f7k*=DvGc~0CU zk_pOYG{zE+q0iSS+12)cmTFFDD-SBiD=xLVFr;Tk#VquP>_p8CP8#OyFsl z5@X3wOFBBlsqxWkR}C^ZQ?`PkiRlPYFjr9(GbSCDbpMoHd(sS^XvQ7Qa>UPQ+~Sa$0uj872Z)#`E>Dp`_cL58N&wZ5*D3*{!z>MIf6Sdk z;4{u+Wt%sm4F#xT4tE}9o0n8{V%$CdsF zC(&Xl(h$X)fT*RX3Zt)Z?Z_K?%!Nm+`jROJ0dl8*g_BF`AZ8qqiSM5kddi1E~=pq z81q#e{r*3}bify*qdyQp9xubV7km!P7UOjyK~zXfLXTG)DML(&h)GWIAbC=H0gDLQ~jG9mjfSJnay3s=F(pb_I&)Xe}JO!Vza{;=*7o(^5ujLTy(E{@s!374Zl+6J4 zsiHwImUp|VZm&r1R^TZ26KI1kMu)FEXrkZ!30NPud~#t7zJW!Hw-r=ncwKnXVjKuV z020&nGYHM#Ns(N?!9@SyXYj}H+iMno+m=xT0=UObfTovpCLp+!y~e1_OLac&sQQ%ZvyrH5q`QYDW9B%ChwHkgGZ<3>;34BBnUS9CnO<52*`5Wi#cuBM z9mk=y&FdEd-0DJtRN+2?GrCcF|ZhRjc zU^l!0d2PHhCPxuq!iKLNr+@cG8{l{^UYLY2V6pfyuod|e5_{2^h*0{51lit%S>Q>L z{Er7=a@%)zX#rZj=zo6S-a7Nig$dvzV4JZyO&*+;EaCQr-#lmlmO;>0>7XChr>T0H&N% z-e7R7%+463*6T^XN>7+owkF%c?3&KlhUKdu!S3OI0a&i9t79id1RUBzzbe$QBvY^; zAQ2S+o%||83Vm^?1KFX=mZIa&X8>Yq?TVvu#ab8*!#$%g8VpYIlrpI=isYG6lN74- zbzwGuB*UG#(WO$f<5&01(I>}VjdmbGwg~_O9yNeX8Ik~L+%RVhX&-=dLF#&Ec6xQ6LX)~wjpPu}%qJvh+#Q<9zSxf(AvIFO*dw~IV zWkWt~k&>@!NR*T^uxeQhadgoX4B1jCEYpiPjLLxf+XsL_V<)?L&74@OKHS1^d_u~Rx(-p_ zz_0+&6HdUU+cOJGVTDq3yjj6`nqtPXLt2 zqq{mb^!q)XH2|{VszCsL9AHXG9|Y?7014EebTa@2u#YTXir#(H^sjDM($3!4edo zw)_%20SS6~$2(1FEs&^S2ZRympDG5y|J^Vp_PEPWb^2z>C1?#R)&E!W-FK{7wfYL< zJ)7Z#WcS%}$!h>YW}mcBk10x!;Da8Y12yA|X~Fw@8STFOILj?kk+dUH4iTGuxuy@yPIxp#5D45v|EwCnyti>%U;Tf>9))Uo8q?BM=aEV~6 zSXzdT{cK_my?qpLsvj10;I(L4*aOY5Z)JlH%ZKr1CZKF;3ObuJ%`^i>g{5Nj3I>>+ zPrY>62KpEQP0Sbh@5s7^SAu@i!-ZgdK-qHjQYW^ zgpMX>&wKQoj-ELdc6@LwNl7yDV8N#>tHLO9ZfDn+aj6)POh~}j+hXmdpE|b# z#)ykojh;Sy;ow7pi~C>e8|o1aT}AIW5QDaD3#UQbtl=ncHFy%FN}Mb<)wW_Y6=8;F z61}180H!ss484+k@qF5-?|}8nw(tRHtTdMPk(i?l9%O4Sm@#$7X%ZEb&<4K@9ewW; z5CBta&CstZI}r72T{s;&!)hJnNrcr{!WflV@(y1!gbqx0)+6u_Opfu2fX{9d2iAVC zni+3vwqh-j5t*n%j`CL7o(51ZaQ0#u&CoP@z;~y#t{B<=fC?<;b zX$xFaM!ZAU4t~A=c#lkQLEl=&sHGI33v6&q3Y$qkPPj4!l{!=o)PwFqFLH`t(a zyfRd9TzfwKmJO~0@O|RNewA_-ota3RoSt%!%7s;8^uO-T)D9^j2Hc#Ju!i{c(9tbl z1!Km}@-%&yi&0AZf^>24Lmqu1P2kp0)vnFd^tu@GIA8TCN*oe0WZh3gzwyF8$}dBgo+}1Mi`NcJ(JCJ-VA#Zn#Z8Pzhg~+AD@c(p zQiS8^K7VI!WQh>AufNVB>j2FgNXz?kU9tyWfrFeGECs%r*$!eTn#3b5WV?DxY)fN?2K$! zz6!cD`Hc44H=7HCXX>unfISHO@ z*{VpeaBMdhTYPJ@!ypC&m7B^}1H@p6kg~+#<^XWNU=DmR-r4vu3_rS@2r^y6rqgIV~4aI1Mudh0I@d(d~|a3Z}HCD`sE7g!}EXnv;gf-b|8MZ z0ddKMAK1#wNjcC&C`qf3h*Ec4Yl`j&L(*8+GGLn3T5#h5P0Zs0ROx&eq;n(fhD+0MGjWvZaV z_dK!bqq%K3AhU@AlS>#M`pn?B``;84`lfs6iCg~H&qS0ioC^z>JyjfOTPR7&FrTN^ zP*Scqdc_OfH&i<7$9P2_V23l2m3{OB6*wMXtNH+;w61dGr9{RbiI&|SV?7UGp9NS8 zJTc%Wz43vsWRmVHGV2Jp;^iEX!Sl6BFy1r*!yo+Z6snhCFW{FU+taq)^i!qI1n?seHr(Q+)B3w3{g3T>~!m4sJ@4nHW|&4!w`Ys_PZD5fC>q<}T^SwksQ zQ;NI4za0mI>ylduuO13asag19c+MT@qn!=-m~lv|#<8@?O^MWziV1A7aF?GO<4Iv0 z`esp{Zf`+1x~`o;xA@*Z9gTN-d(k`3wxHl4Yz&?E_A_^}S&F9p@MH~@6%b%nDK;Gi zh_QljCv??*xWO+KqXX^HIU2y{ZGsh)^UiFi5Bb`ivE?+Bd6v%5bQ?D4b$6^9RreGI zf7PcNST}r);Eo|+QhmyB6@;o&3k>2Ydj>!Pbu~^H8ajC$LU9Nq+%A|yZp*dIEs0l# zj-EZV7rpc8OQ%rl+Rp!=ytlIl-FaPSD@-HyC;G^0^|Kv*MU@|N)FtL%Yxjw8-l>p7HBo)>5zDP7KLC;F|6)U|6i z(z44yoo5*2TJ}C*^*eR2%hZb@$kwVyu{8S34REsY#c*ujdM+BgvGX4LEqiZ*=eKD= z3D0@&j)7E16QBu&G)Z?k(DiIpg}fUOIzZxmZKkC2i@U` z5jOB2(AF<5*@P_DuQ?OF{c39q8*A*p0UDGnFetaIwIb>@K?)h>1rF2H+SaNowaIIG#nW^H2B^AW4-_AnG&4E zT%tZEK(d2yiHewNM3@lP!#bDSS;!iR?jeG5P&T@>4E_8K)4BA29t5-1M7pjs7l}Bf z5!r=ut+*0G*r#Fs_~I^g9(sAds-J%3(;cf|f-D*`bv*9{sDg4ZiYJn2!>#ald@(A# zS~Sz2yA`e?-~a<0R?hhr(H1gwl7J97k*1sy+hgdThv3ioV)S&~VW67`UNbYM1)wjv zve3<@6ANp)xTr$u2#v6iv>UWMb3St`l+-?fe|G=V(=8ot-eGftcOu z^MqXNIrJa5b=HmXijd&hGiDDN-`R|gjRSD;e#wIxl>ftZd(h8+bI~|Dk9v7OdMY=( z6RB?RoHjwEB?>KBjoQoQy0K)d0s`{wpfEf!I(#I2;S;%bl??UO5W9`ZHL#Xm}(2$1it$g0V!g5yJGP znl>gaM`|wg?vG&9@BCJ$Z<|yolAZJ@u`I0#;SD1~^v=fLtfLpc3LTk<*Z}zx(-h5G zpq;XL6EY-ypffwp7o&-L9|f1<18`8I!3PT?J-79B1N6@VUdVfPE#~F%=8T=nDfHSy zaQ^eky7S5T3BUgJ4z(2;0=o*A;K!S~?u2eYS3L;r@QS*#%6Vrle5k{aOy0BaglW&> zge$5?1LiyhTv;JQFPZ8R)S|+JFkWXq(pk4*`6|E$zn3GK{OThsUO)RDh3hA8s<^3q z{!zHU@rt^$c(Om@&c`~w4Tdh!quJvI#9uii;H4AbjYzUR-0^s4{p2zgkl;ICIS+0B z-K2E|^pV4obvL2?&v%A)>^?CTkZaz6M*!rV1IdO5ZoiD-*BPrbt8EHB@k9q`beF4w zE`GIQM5lgZ#ZkEY8=WJ|E2Qqp&eZ5K3P^9K*8yJX)^CAxih?LBzY_w(x*zTXe=1-W zG#N@h=++#LNl5%8Zsg@_gM-rbf1-Q*{o9?9b?#NG+~8B(JaqZ$2LOfU3w`}eoWr?{ z;(@{GgyJo`pI!UZGW!{4u@3xu$GX*d57Ch~R46U6fwleJESlO?khz4-62Ve`ZQ zLm@o@+(7?F=K_W(27qM4VCIbh#!EZ{l$$`&rGbHX4(8{)XF7mKvuqXg{~3GlI7zB< zeSCWI&dkot?y`9a3+xg{yJA-(sdLV`L6++7>KvxKr>BFVy9HFdDxgA%q5@*Le!a>X zXd{@jD0fG}aJjC2Fa`%Oh8)m=Ky?04tWqgf1;SJ;iaZju)8|!a<1t+Dgk|9930{49P*Q8mp zz%NdkvmT(_4w;Stm;?Tqj?_6g<4-HaT@pSu|BQkgN(zeSjvgS|dT74HNrO*SDF(b7 zxZvOS4K#mxsqB5f^qViJmp6SAt8=RzhKbgE3wC{L>CifFdfXrGMt8Y`xFpSk!`g_$ zVXy#<8Nc}XFFd|Wd^_y>?$byME|F(m_s>Bpp8ZaDX<2pi;srC?0B)V0;%0w5cmK!v zwVL!rlyFBThFj+mRe=Wm;jtIcASqa8-yrn^>3ilrA%U|fPB}*@Y@iAq(|RRR4B;>* zeId@H$QO|`K|G(1+7RDbQ})vgUBwT6PukPFPF#mp<*hW+F{#slyvcC^t)>vjrerhq z#uGSbjLO8P@?XWZUB9(w@VgU|AJcQ<8flj`d_$jItBnQhUM@!xOwt94H^~T5kHYJ{ zRU|$YmWT?!@QMS2H$N(M$9n=GHcBfNp@e)&GjDLz*W;_12&gC|yZ)(1uv;6EiK?^W zLol5EgMGhK2Lz zj?B$$`_;B@Zu_^1mu|adTXkDt8#7)Rf5YVaw(XsLcJj;PzS$qmes=a{kdm0{-oiI=I4%)Dvpnwhnkuxe)N>=|yN`@N+v z%^aBi%fw*%@#)V^-#dNdbb8u0ed+Y#)KgO@7B{9oK5?h&nJICcnmBLqtyAs!U#dQ> zdWWhz{(mNKo-9nd=D#ud;>jHoPfw{Pf410JycS@`=PZtIe`5Prw|`*!>$jJ;d$*I@ z&sg~Hg~t{?wfXnLT??CqH6B$|FisK7sv!bS{Mu$UB(RQ##JQ%va@^NyD4?&Z3x5A zQ4)``4Cd3=9`{-7hyS`M1z)$q&GOIPZ+UrVC$}1D7ceF2p6S z0g2if-HUY)8G^mR&Szz*jsg}1pv~QR7r4(5GXkUUF6@+BCgX6}gvf5Jgh;3$B7!XO zB6?ledBgC>lGp-lgPH}W6Y4ETGb)a_)moPi7-;PTiQ z0E^@8{UH60XZKvEbfAM9X^>&NvzT(ig{=!H-P*f)?J_>_X_5iKe6S1UusN}#a`h6@wVD8Hp8zHaCy6EFFtA)#Zz7%}sZ zBBf#-aC=A01q@{u&`~->n`M|YuGtj3p9zvb`llVTn>pFFz#>`kELrV8Tfef>>2#h}ou-rC{d3ZqgG0Kz$Gla{%~@Tip45 z-yTX4v;}87wp-xw7-}DMG-6Zlt3uk9>_`p~cWRKZLk%$~5|JRFC=a|tZW@e$i021H z1sFOrZEO+{kC*98-Ka>h)_mB@OCc2!Zy>f1Q1)>}1MILHVT`3cD>0GAKpql|LuoEQc4*=Xl^aoaxOHetiySwQL<~z>Vj#JG^S3z8KsQ6M zW3DE4_n2x^Yc{O>6bcjScp@wbXyE`}*K&8kjlYWqxxX8uf9ChW- z2n=UFLt_|VYhb+)fHM8K@?&XTtB$aqPN5~wF(ts=0PqzQL8sob{Ra<8PFdlKZ7c5wH` z3ozF(H9m5CO_oacJ!X(INTiN9-I5Z1rHfv+DpGLWy6{1COCLDe4OFyPup6UQaYal? z>>2>(gnLGUjDtxpe;Ym+|Ar#t zkbqStt?`aIkI#8)>GhjZgi#^Za<~wrD>&Tl_=|I0MT)Nl2Dk$*PMD*(1;59KZih#a zA_S|OMMxqDHn50Yu=O##-}E0(iKT^!4LVJS`c$cHFb7dkSuPY8wD_Gd-RxFRT(t`wm; zU?qZjnDevBV8W(!bZS@}Ns4z1VXG6Ow#(lK5?dil3?>?XB;-Eqgj>gFYrE4eJ<2qK-CIVFXajA5-|^CN9_@D+`1!in%vJd@w_zWYA zWkkB+#W$p6#%jk-56kP&?F+9I59^3?;@C<;!|;U)CP{?6wp~W_6PvC>7Wwzsf<@fe zmSW3*t%lnOyMVjXLmEX2+W|WOHNsA+h2J6;FPuL#v-rT+$D}^qFKRVd^Eb<_Kq`GLfLM!x$MnQt9AfHuc^r&BIZi#VYvUV-HG@TpUEAba<=kseSnSX;K zZNcyX;|d>NY{T%WZh9i&!d_*cgfD9Zn?ro;@l}J#^I^7Kt;sWfvG|AKbRTlV3Sut| zu5xTHEU?d=6h71b+`gHm7j4$iLy3w7Y*!dqRO|qX_)Ld$2miA4Q}KFd4csOp#iB3rpcIJqvZ*^>a>wq$ zZ+;^+<2)hZDatW@Hc&hOTrl9$8XLi)rI?kw^66hoL$g&TJ~i!90{iy;R~Kl0z|vGY zQx7y~hGuPQx*88ObavU-_R`Gd?>Vz_LQXBdx5 zc2g98hVG1r5bFM#=LdW}{4=;ql%UT3*y1H~cTF9c2u?qWoLDC3)!1dj@?Sl^p-p6ITvydPaI%_ld%(LCe+BT!}L})&62GUT+MQX}9?7pU{J? zB18}T$3;>!(Y`_aS=mWdI`tm)RS(%Prp#prS8tm=$`bMX5iXgnBE)xIcA*>^^`SpX z_mS=s6^y+6GHWrqRw42n?~V~IEuqiL!_j>jcNrrx@wN$00Y&@q(-?I`ALh{;ITSLZ z5n9!j!^1jibTWk7a4eAB;*5d%Y9z){LfX;X+&g8x$(NRVGDK%M|fa%oun^9la%$_<#T2J#^L$z7qiSRC*?O`BaE1H8`BU zDtTTj$X$E)U(mG?naJPy+u`Cnb1?PS?$vN!Eqs4$W$cw>3vXO7&;M=yf%)S6xpR-r zy>aFfv*UBdnKJmaZk;)Q>MzsgsqEB806VoYb=Kt7V4~VL{_w;HClceAsh%9aQT5)X zA{zOcYUk1es%y9XW!uMqigo_%k7wU9>y)zg$Hr`v{axd$wMrV06LQJ0R4lwIa?V9s z?J=5GCqNxYucSC3y+R9wu)>i^W`$0Z$po?v2~c>bKK-tHrpHx>FF<`(1A3vfM!TX( zruh|`)2LT?j!ms_Y69#lS`Eh~1@XI=zx_O^aaLdinobidoWOD`G)*z6%%xTm8ir!h zG?7ROg6flU<5K-J%Oz7t_g~=?QWy9Xzmgz1a)lQX9F?NeNh-~#KCxM!JEl!&f!L5t zuV^*+5zQpVGBnE&70rQH$C6g!Mc@0;OI_<93F|`)fH3ulm??^;2w8t4&i{^hZOi zNHs8+8g_+Df-yv`VK{;%RUh4~&mN;wiIj%psg+cMP_NJgO|5Wgj>4NzWRgs$81U1o zKJr|BDw$?!jlg2E@X|D^MgJ)-v7*(gS%Md+q`v_0{!PO6A29_ zA;B{OnNG7jpJY`Zey)CsB-C7*7o;ggFQ_DonWHcXi~!0>Hl@|_3Dt)->odpF$+R}1 z5i~1gDnUx~o5akaeT)Kw`Q_7EEv5Q5x&DP(=2${QGD3<`uTW|&#)oIqE4(_DSVj`vH0Lmf+kco@TySV^U&&Zh*dssx`{(WE#HNw8W$qfV>dz1ey47?)1-X-3PT zx2&YfDK(Z>LReuqC`baTfEiQW`&@mj{}fM9m?;V`ixF9Yf?&cy%cLQB)jOW6 zFHK-7l}N8JteS;hVsNm|6DuT(B}S5bilS4hyF~RD@~~;g_%xAZi8R)pn#R0>qhbY( zCRb9hXUViCMPm&yo0aiql#sxCYPGb~71T=*=zoIH5NTKmB26bXrz&fcu%a-LDFRl2 zh741RkrC2rflDPR8q;*ysmffM5fH_&LL{USWYkzp99AHMdDg9IFw@M6mI43~#U!EdN$qB3 zphzV_NshtQa?&c&;)6iZiIp_Rkm>|9D4|Ys&kZ$JKr)e{*cD39K(8n*xuRvDwdu50 z!>BPN36@a3eN#`=n0kCa)R-C;Z;SDhnpX>ID2p}$9YR}NLhR*Vd)|dw^)XtDb&}xd z6(+^Nz9-bMOj!3TDKgDLb4U=q5UO|Gjc*fH5UOLYk}y##35u4?J3b#;p2d3A@^ng_ z2DvoPtAKVXtswO=f)$b!f#(Bc4#qA?;5)$L9k{fRgtD;$xQbM7lZOSL8kk%ytkep$ z6G}p9wJQlVY*Q+UIc78hO$rngT+%4+7)&~rCkz|DHW))9m0IB`Lh2X62wGaeW4V>h z%2;X8KnwxQ7G?+EODqO_&H(R(^?-TAFX&bS3SeoZ zRiBk7N{4STU}@AO1?z}UjuvB&uMT=eKzDgwU}=(6YiZSIWGt54m?}4+oqP54e=c4! z`|*X?)PfW;<-_*ad7_GqoP1teS-+%MbU1XLDK@#^-0>Y^^3%e{~_C zQTE?BEnffV%g-2mezAuW6t>+pY{TS}LKFPudMf7i>unVvdLfW_wzo%o<3ex8@;`_U ze^vKR^lC91euO}2t5ho&Nk-m`kU#k*8J?CG}3fJWXMLZ%!X z{6&R!aPE+hh~;xf$dz4VC>QdqY|#QsnWau$uryLC@z3JOF?i*{fpuFC$EbA-mb`oR z*BD1T&{jJLz1I=WQsTu^y`zg;OOY3F;dAlKI|g@6^(5T?6B3rQJTw6Voz#<>)ok6X z=k#TtAii&|cXWBQ7#SNkUM$`ndeyGM{`np*iQOk8JY=~iRX!Zb5k3uL&ga58$}Whp zi5}8rwib)G_1->&Z8I7>6jAOuAp!NuZ|l{2 z(^0bSb=v|Vb0a6n!DSB}z+*;4;yuaRj*5Wn**`evU~hPc>YjRG`w;YlaQl13FS?HHHl9;jp$Yi2t##cmC2yv3T-_ zZ5&wIpPjtp53kxg@a~ti+IvDm4wl0X?9mEf4|7D#?Y75LYyPY_w-<9bQY@+hKLSL} zx1QWLc*S0+C*BPSfLU(BQOuibl!G+dDv3ZGV9es1cJz)cj}{~N1#|&Jh??o0XycIm zgoHdSheqROvZy1Bk%-pkS@)T}@{lCX!UT4;1`JOkbV#5eC7Jay=lLXAB;ws_Wpb}lmZ>}+-V z4dWY=ACWwcC(pVevLPWSb%((kmR7Lrq0AajwiN7GSA~MO<1j{Tq*&4=1#RWkhkGH_ zGQk<@8Ct#CjMX!ZNP-t1WP5uKbJ*Sz&r3cr{6n?lKJOKSW9RkaswFE`NjB(6Hl-Kz zsc>HWEZf_E77gS7ya>n9Iwya)lNF!*#_Q(?S0CwF0iUul4ONtJPcp86iz&LAVXawR zNg&fAu>{Uz9n4(RbEpnpw=sbM9pY7G$LG9{W38gE!oH z*ZF`O`EYkqJa}pE;$=;+WhUY-Lpok9XDERaLzm*GBcqStL5s`S?w_Xg;mlySpzrg&7x2W-}kvSXOfB!ka z*AU3wHBu;75zb8bO$(HCe+2RYDTTWuK5Xyp6@O3m7I&Yvig=ua2^lh@zm)2|5Guw4 zRPWv$BQu`Li#ZyDF;Wa;u#+8pZg%?RD$&dKBKuqxxJx?#eCTB0|Mj(o1VAMazCFbD z5M*{*sl@g6|0{-V_Pp|a8YFWa+rM&TS3EfM8RN19_YSy+k%CBY_05Q3u6K0L>4k&a zW}ke6oNjdvyO|Y+SU5t8LjV*G?wT^dtiWAnBrIAk>s@%p=|qytW|Ly#jLUmFfOg?x zKv9qT{7e&92GT7JE`NNqw1oGahgh)ZR?_LK4sLtw;>|R$#VdQr%QwalfDkUYf?$;} z;=%(%iYr@qNztNcxw5x?&*`g(w|(*b7ku<{ugI&!KVQ|G-|@z=sTWIJYjgKcyj1nZ znT6TGQ!jhEiEo)>12`XwGZui{DI5q_%Y{HCm*i;iY)fzV*%}S0eSYfYNG-Ad)t6l? zJ~?;oj=_T_>;(?FH@2fi`RkZ+TO6E+GP#2-fJx;NQj13yx0Z@0FUt<2&JGT4w@4q6 z*ai@`l<2&$&KV-fxLqBpm&>?y)DHV3&e(d(%cC-6u)X1`fne(aV#2*4L43)bh?H{e z(mGT2v`zVFbS)z{af_k1V{xlUyzR@^Ne(mbBsgqt-97lNLE786Hzcqzd0!GThYd!8 zHdZY5gw^lha^m}Sy(3E_#iH+7q@W{<{ovq`UV0OxTJiW#_X(7W4 z(qcWjJX*Xphji!<>&Xcx~@?b>VFf=1F@t%)fe?-ZTa`%uQb?w+Ry|6ZS-t6la z=O^{!?y+m7@0aoX8_M??HdiAMiaNNzmmqMkBJH>EKrG=37)3 zkbG_RhSmG@Xo^QB#V*{rBYwh$%OpQ;G!X}8F(ZJ)Cw@KHJG%R{G6dYOZ!XB&!_tDZ z;2u+o=Cb&tr~x?Xf2Vv9~28aC9KBNV09 z(9hdkoVGUBWcQzk>LMO>sVH|^H^4+GV$aA>O!FY0C@8mUfQpEHg=;S+0vLR>)se}dlTurCAJlxc`RR4-W1XBwG{M*o$_W!_8!;9@Xk86YnvWG;L2IPs;7&lX$UFnb>bgbR^AJ z92$HlDRs!Tu?r0;$LM&?#F6EK)}{_{etVV_-=BxkS|2HvflaR;wDt}T6ne-rwIqWE zj>;DGY;3Kf&wF^WUBvH3i-+`Y(rqR3%!|_RY+74EONAodPS6wpwlPpt%h+{{6pN~7 z-!i<++dp`yjCaRP$;KJzvwQ$F14;n5H>BFewG1U;jhA2k=h@+8Y>|n_Fa2-%no_*~ zqhH@Uu;tL2atzFmEkvhJs`87MPFykjvANewElDcmmyUrO2l0)OPb&G0C#|6Z?Ph>r zVhw*xe%7Zuc-DwW^a-`|WiFiqFO#;s?u|3iXZib5j#?`PGExO&aHCq_la$oXZgF1| zt93*sK6UZ`49Sr857wLLE$AgEUpR+rAnJG3c}O&P{Fz8pFZH*&t z45!wNiEO$$Z06|FNU2yo_pVE1=gs%(Qct`a`_U75t_a?Vdm87OT36zA-i$3JPu6v> z#2byuL_YD`s|TNZW$$Wemv`gPsYX1y#=4)X)VRELZOxj6(H_p!uUdGW5t-P3_t%ws zPkS2;DT=i|Hg#CFKH*$^@j_zmO|xH`{(q8x;ku!1Iv3B8eL9TW+l~-*mrqYJt7<2( zJcp*>)vt$UjmTs`PbtNE@axxO=W_5ov?8wsQz?@SlFk;Jt!Wag(Q;94<@oE+%7{!n ze(i_l9Pa^gya7Go**JVk&23tw?v({DS7$>uqfLCu3Ojkt8{uBqDiMjyH)KYk2j3_u z)D6xJaE*;)~sI*U_R5p+y7D7W&KK2GE#B2jhprO!E=c8P!N_x>tpYwo?F zcg`XEhJ-Ox7&Z!m>}rWhCrY#|HSY*D?CoV$JY z>(kFn9i0fN%7eq+W<+&naznzedByNlYsuJ>cFL0QnDrK|!Dc4K++C6(A1Rhmc7J`B z2%OORPZ@mpIjmkvT*S~dvsNQ|Ue(~vhZncW{f4qO8s6PAV zWzqey6(#F;*PAi#?u`}nv_5=5wGpysi87xny6x+92soR=c}l(+13MxEhw52!X7QKa z-21ycPoJCaO^UyHOYhK`)(r_+NzMt5XN!?lA{uEDWZGniHaJC@Zbz?2W#Z>Az2!3T z_S-iVX>bR6Xy1@viDX40199*(P$`pv)#X?ruMEMA*xR{0DwFxao&-0UD2SW7{@S+= zRrBIgs+n%plO>99Rd`c1l#U1G-aYo#-p-{Fk;qpsIyyM#&fad7{J!zG4cCnXEF`a+ zx>H@r(qX1xNt#;~Lr@vN54;VpIw}+S+kgoHkLUq$;q9B6xpLPj&D=M(cyRh{3(TBX zwQsgD{`BP6-iJ>wtVv{p0pOp^qr2Mlm1^Elq7mlP`l6NU&$avUDmMR*ZTW7EbOXAGC;V~a6#W(WX=;mL(Gld(Gm+cw6;@y&u(Y+x7 z49VZ5TAEA*sd`f=q^zl!tt~S5pqY_UQT5=l;i+){;9u{NjACR%0_Bn2e(rSMr>ASV za@uKix>$93ctkm*eclnpFj7bCe_2Lc-Z${P2WMWi2OK2@e=@Bl_yA$Z2g}tAuXYAN z0{S4%6d!zlZ)tf{1}EH~t{%+)D;DjU{05Ca$qqcdv*T}5;Ma2L+rd_V$cdE?!23E{ zEFS(v!!>yF13kZLM?_Od!U9uF!Coq^hG|9&d=O@0v{-yZ6}1i?`Ctz`?M*jJ)JZF^ zX;qTNwbd*qYCnXhj24Uc90)lEpZrkIr4pyTy(Mw?{XNUsV`De^?lYbOKOC8LR_xsW zkGi0wk_sQ`U9&fjjF=K4F%h|pb0O`Hgphv-=IRe#+y}PMN8mp@ZH>WgZ`DYCnvV^g zKGGo$teJ?W2dGdU(a-S5#i(H$=V`RhKOuEaS5?9hJ#}h*pto~xu!x99MA#cmNSlxn zCeSD{M8x|)0iVzJALuRaI!z4`_&@s;w4>L4qPM&+9zlp_Fhj!gh7-6+O7VniD_)YC z0dDZ=q+;*l-$e#LnOnFVOr@Wa+6W?~5^=nUrbWamXjX$r=#hw5ulSyHK>d_-Ks{|0 ziG5W`>Av{WFX&*r;nO&vj%p(aOFsjZ87{yp0*j17A~GnBklR+--26iYpLk_1!ygio4SAS`)}b)wybY6 z)?7-r-pJUsKCa4&u7{-`Z7CIR``J5(C$fEm2Om~8ewUwmtfr;a3w297PZh$3YN;ST z_BA-qMoPs#6IS5n9AC%Q{h)K>ic>8_k{Py0q)EYFZzi&<;>=fJXGaVB56@x$BppKA zUzH}nzafD($=m7hI;ABDZ!8c`({V$PNlFv2TfF=8lGkQLCZYEnz2jy50}p%wuhN~H zD~{c+@{i4ZckUB&!MV$k=(&B{e{Xwy+gG-IXnt(l9oxFwGTS`cG~3SJHna50+27AT zI{VPlBeU9-@Nvp5}`zI^)p>4mx1PW`{BA5VR0>Vs3=w=8{f>gDszDPhVz#ZH|)H8c79 z$wwz2ntcD{ZIkUue$qBcOdi>mHy_|L~59)Do`o#U@TW@=>os__fPmsNjK{Y3RO)p6CGs=g|}bkFv4mtMD2 zU%F<=Fn9OTrSlf^{EL^)Sp4hU>f+DmAD#Q<;=}X5TYO;gor|wttSm+ruUa^B@q+n> z7MHg_yZz+$uWvuT{m$+E?YV`QFQgWnbHAGV_qk8a-8=U$b9K@8rfs{rg4?2XkPUU+ z6UgP%VSUc_e}}{?Lfn*CHyE`sJ`#63I+?vP?GEUc8cB-c%%x)6NJYHlWip+f5Nm}3 zgdU9DtC}d|r&HUOW+wOUYMabsTZg=C#Y@bs)(7DU!<9x~AX$zyXvx8@`=eYx+_abpqou~Rh_z12L{CSR@~kIIMH-nvJse4RoCWQ6 zr92?0iDab8t!wF;zRE7}a`RzZz(|LR!AibWuL`B3U1fU1YF~$9!o~v6G}p^o`XxoV zeyC|QQb|WP>*UnleB@wOZa!2>>4|15=x*B@PtmrJtL!HOrDP2RMg=vqEGpH_ z+9v7nn!*eh30i#2*@u;KT~}~Xpb>TWY-s~m$>H!tfGM5KoOZN z#YJ#ApRj1o`i}hE07xxX!<3cH>LQ53I&e~H#+wcj;Cl?M#;snvEqkSQPgmlW5(2iU zL({hDJlvXFZPn;*Qkt>3Ds;_QTrJm2R5rCw=H?UpYlMez+JineqUqRM!qLCW&HFPn zOEshIupN}@HG#ZzMk#kkTeOkV*w&iWN-Dw}_ABKUSGWr|4_op2iV=G!p?4?(b0JGs zO(wf1ktq1I#J2ay<)ffI7d@hs$1Pc!2?uLFA|Eh)q~+TAR95|7l@tLDb;mmHL{AF?OedF?Uaj$9#N`m+AM8JTGs-Cj}ekrzjx0> zR~mjFS*p9&y~ZpPas@p6q0MH9dXV&a!u1%ZAwn%ut!VRT-1$W^+n(SJtukcNW-diy zpwMC&Ra5Sc*Bc5^33JG`UNof~snm9>T<%#7l)Ge^GgtL$^?K9AXy2&_5-9_{DzqC~ zmo-BsSmtS^+*OZLvB0{{9YnILQ#*Z;Qcju~+N7mp>P&#l@!2EF_`3_*b%HSK-J~Pw zG8%dH19E-0lWP!U$YN$3-LyJKXU|iti5popRK!5|+Ll#&%$VQPmIuzwP*yI==$lo$ zrxnOg98=l>Y%bj@MueI(Y~jh&lvgfy`N9cOlX2BqZ@}*Hr7yo#DK{l-gfrT*`h&h| z$)4QxjH3T8ZP*nquyJ$QXSbL*ouY@M_-_||S8m5y)vZ(2WYedO6`i>tbD3ftoU0`@ z(!B$bHcqf+jrOwhmHL)UkwOTMJ>-ids8EugmdhP2TUSkmJRxs^EUiV$`70F#bu_p< zsf!^@yBfEy<}w$5Q~5!T@*$tl=V>QO4SZ#%CYADpouu3;y~|W-5jloFstk~Wr;11o zug05dren-AmoF&w<3^6Ir`Kz%UBOdtwD^lj1$Oc*xw_3!)tQ-AIpb`*1L@S2iXFBYOkFsF z%#HMVv6ZtXGpZ-#$6D*QJW;A?ytJTCCv5zzdBHiRjCBHO`()h9+4F@&pcPC;Lh^5X zRd<64@@W<|{cDQ4iOv?I+~1IE3CE2Ox~ji z1dzGXt|%WQa_ht@bHyIHJW*|Xs5QT?ZU|WIsW=nbA(z{EpMz|r@{Ukh*J&5E!ISb! zhYL=yr;RQ9`6vX27>WTl1dp%jIE0 zU`T_MU$2a8S6q;C%t$Wh-dI+c}j-uR~h?ifb zg2ECg!9BW^E5+KML~6|U#lufm9_zT3U!V3S9qZ#REfxM<%guxb)HV-DmlL`s<-M2bMI5i!}(R3YBmgB)?O(K z#U1x4uFO(hnFCAQY(cVf zw3NPP?rUZWOhQW?9)J`s=Vne(4^JF zwnO-swT;HG+)GDF-K29BcR{Uf6g=UCaZbLFfBD$lUDHp`es!TTSpIIWty)&ci^c{) z`8;)^$&|fL@y59SQC!`DIR>5z~QP~^|&zcpisGQ`&0$B6bV(}gdu7gd`^WB5{zbAQMyc-f$ zuk66dxO7%vQPd-bA{`|hWLowgeD{aA_8XCjCqH8!rt%&by!c1B#XM+0E3y} z6O|ITy4DWrJ>`Pj%AX&D7h+T<@?U=9BJujKiu(pH{ek2U@oebe50SeQv8V}s!H}sn zQW-O#Vvl_hQRw&m7@ZlF?6~LySBuu03I_-0{73HsDNMkK?#N*R9KTLAX%O3ZI>oh= zriiS`Md-*_lL>lw!|p!y zs(B`;Hng<5Scmt4aWX9)eFE;Mt)*iBd*44Y=swZAUUkrRYR+uPq4yHu2v-S`1{>vJ zMf>mIvl}gz?g$V7@tQt-SHFY9N4oEokZ$FXcI&n35~cM80$QIvS`2gI|NIzp8E%-U-SU4tFEN{NvaqqP>~4Zia9mn!@tC%M~lV&S)ed|XyV2_64?0U!0;>C zacDpF_^_X`*oh!E!bqZt#Y3#P{u?}gq*#jT9>(?`8vOP*xM{{Eg%<-TI}c+iuQyIu zU_a>wpNm$+-e2JPdh1Cj%ZNx~KRI9GWj#3f(@AOd#8QP=m}*)CEx$_hp+ZiK{0vVY zDMrXzb9iyNfAEc;VE_+0(0#>m$>*@uLV#+s&U@3QbVhvluZJ48rC9vD?mwS{7oQyL z|1aGCor=bvyA?O(*UmmPVVVBz)In8Ej>eZ_KB9Pzys(-kV>LohZg)BAbLUgY_qg>b zJZGd>&hPNfeD1(t>JRcrhfa-jp&CgDWLuqACxV36n9PXVoyq+VW!XKkQ%6celRz;r5Yl&J^&jlF$%k%#Ty;6ZuromOli!K@fK5axvg2RmoY?0 z(fhaFd5c?1#p4Tz#sRwc-ob-^8?GPEM&OhN7)pguoost61f}CbmKrUq-xvP}V=^KG zR6H)WhT-$){8=)#Z|14)hwxVGPYD$tR`Qqgz zs{Z2gs7!q19!%fz!96qL=ce}V9Ehquc-(v&fR|J>GM@0nGDHff4S_WuvFavrb(`Re*JcRu`bDbCc3wXw8v3O6O zb`3u5zWFEupSSnVK}JFxS}b2^Rw`|~n`t*qYf*22kL5&e5f2?H9bRVwBK_ZI247h0 zU#Yr!PW1`+{a2?|H&3Lt{cOTHK~Ef-m>mDj`1i&?JN};WH;gxC)8j84H;u21?^gX) z^@Qr%v(pn_n)%(#qcaapyk+Kn;&SgtySsN!zjn5Z@QNQzJUzWSD^ACz^^=cJUow5h zwvSHzb?S+!Z%=)E>K#)zO_ip?Q&&zcE&X!x!%L4WeRApEZGT>R-DGd622Z?k=~B4h z|FZbR_;?nj%O=h~*rX)f}G{TB^4nR*)^2(Ax)rL!S-H`QsE z*MVllcm=D{Q4NAlU|iSJM!Q>6Dd()W%I#}vfeIOJ8mobPJK(paEb<{*Z?Tou^gfL{ z%(@+GLE5riZr<(7>4_$kn?pS4K_SI)ahSuB|(ZDdWYmfNQcfQZS{# z=g14*)hNZSth-ymr-<(t6%2x1%YS>m*ro zH0TS?Q`#}FGXa0m>Qj?CAy4lfSL&M*A4|>n?yJe3EOo{z@kncy+rP(F0)#7 zro8QjTS%DOc}A-gyGyjr;#_yB=~^w6xL})HtSz<^9lZgERC8D;Ff$*Li@9#CnIr;+ zj>*ZI;(G7puUE=Tp^&~{DgZ7{2iN`?cguazG)!uW%rQYTn{cMI?6(Zl7Sqp~e7 z%cl*oP`J1xd&>2il%-6kO|(syw|252UiC?(op94Yw$#m_qr2*FJFLR~pDBWn6&dAO zS8QG21$!w!|6fYECtD!_d$K09qQ*e0c;!i@++E9(9dC7&)tDXHps@FAO1Y(o!{DkX zZnUnc4OVVUDQ9zKiZDirV9^%#)%|%@_k{cdxX{vcfN!Tdu_hf{WtWvVV7&=gG?UY5 zRI^Ekg<1ZTQr{UcQF)}L$Kvj+Q=6IkmOOAQlMvE$w&rN(>};cOP%l?!8g`y2m5rr( zGc43%96c+S)7^@%P6%1SSS+slTK3%K|0%aampU$ct3x_4|G}hNB+O4$+M9S-uAM7;pMcSX% zFZeCFxYMNJ+`pcET&%un`al;kqgAY!Lc!ehkcNys>GjI~CB3HT)sb0KDY_bs+d$Of z_A1(<725s=Q_IzLp_ra<{aSfOo$yi3wREUs)CQ?2?fk1;?ri{LChK(Yf|=r+g_JXb z59}K@KeysVKbh!@-~G?`PIrA}Yl|-06Ru1pX3Cg|s51CoGF741DSzG^YBjlhF?zYu zaH|m~=$gl5s@ihxC?ENQT(0w_)3m>wceJclOF*3rE1yz(&MS~>E-qPQ^GSU)6MC^+ zpU7uiaOiXcT(sefs(C*6uq-f{v{ll;BPlfOZh3{Y@4w}8hlKoMh-wip7N}>f8L#Ye z(g)ZzAO%_291uH5jhQg9~4)k6xB&*2wSBRH)YNjPYGem%8HB-SdarpsxIWHT3kQEmp=jZP{R&V`}@%4`5$&+vk(YtZ{v*)`H0V{Mv* z!|Y9xW49?k$XT^itD{NOLL{zI3rB92pX=kR#hQ;33ht0Qx+cv0Rw?#H!lAsM@Hfh# zs3G^FoYIQd8X*G(Pd%v*#cS)_jC|j>2~^hI1Tniv_U7un*nd!#n7vlD#tg1@VootX z-WX3(NsoY!L?)ogP}^Q1x9<%A{EFANcz-mQ3^*B;V%@w{yl6_6Tn@j!RdyxW8|CVr zSgt{rd{JYlR`XjuM0Zkl1?oLyu0_<13}q@XnSzHua=!dp?ph>A8B;EGD#bEBI~$SP zaoaUOdhrT{gsrFv@a)o}T-{a4xec`v#ZwhuljIJ3N3QNlmlGtLF12ZwzHR}hs_f;} zySjotM_D7zSd>Y}jO)q6Hz_}eM+DMe&gIgu5EX;4^D?E}TC!4Xz@Lp4GS#3vb7WdB z9}R-MSa$sDoonG$s@X{x431{GmQyKTSX|#n$YRK+?{;FgN(;y(S1ax4$}ZCC6ap3X zs-CSeGyf*Pm!r*Vbd`3)pVrjZ1KB-4Rf=PAbFSk`7%Z-|hbLK|+=|0mG?1&bA)j-{ zteplk|EN+<*Gy!k<86cqK%G_??z6I6SdW0c3hiwNyuOIfh|8lLiqhI@HryyT%^ryX zB4VBP%oZ+}h<4TB2Tz8**357Jh1^e@J7}#}Yo&FM zSC6gyp5t;e)_T`br1*5c90;~Gj43^()VJpA0DvsoJQ`%`Mv@o&Rc^+bG^Xl$V=h~) zhNEfimCB~gn$)aO?ux?_X;&NVx@M=cxwOXl1f448bDTZy1bWF;iq2Y1W|k~?*CT?h zi+jCnQuA85KL|QYP#U{EP^Pm+zfN=bsQg?DvTf>(NGGWe>!RM`lG1%kF4QFAxmw&? zUgw=;VMb9-iz`$ov}$+SrZMSCTxM}eY2HO9DOWqv!DWE8olTtcJNb@RZ?1-NYavg; zW~+eXA~E(2xxP7CY?8%rMxRWkQcZR8l2xVL7uFNG`WkCo4SN}uv!m%L4GS!*i3bc!Szl^uQO;@liQRqZN zWR9aV`_GiC8)-YWZgPh?A1jpUXyKx}8pm90b{YT@ehF{ z=HT3oW3k!aPTw^(CAnjCXCkH-Zp%$VbA2n4A@p>VT`MOd9a3D{4?4a7+}Yo;xVA+E z_v6=(C?rQ8KcnwH^Txn^PNZvIf{@4Eh7q5L;x4&)`32l1N;}u>?7JnBqrhg$rW?rT z5-KhdQvoY)Mq;WBBr5Kl+^frX_jjCex*Fo~#P^ki`w#B!zfi*c)SmvmJ7R7h+a}ga zDK6j*8(a;o-1N8ipr<1;vH!4mL`m3u*S>yqUmP&eU_C%QG9b7SG7S7zB%%Wa5o2~_ z&*`Ny4r1?#YjXc9z0qa;S){IdPK^VSasd}B0nuYTY`}H(7u;Y}klaUL(bP5dhTP-3b>YENBU|IaZ1R$l3;`7I?c3Gr%#@JTFfBA8Ly~`Sm#f zS{m$s>HjuH&py=KzEc>R{pdn|?w08vESjdyQVA0VDP0gj>&FiFx9>0}d>tdT>TIiR zzDlWJ;>2aG)Bzf>N6!!SAFU_e_R-x}4xT#PcS&LX*;8TuQ5~Dek;SGn>!{nC`2e_G z(4Kh71yGg|nb_Ywb5!(xedmF}zg*A{sdh9gd@V$1OzUwvTgkRMgftlNm2WM^)x_M^3-Y#i2Lz-;VU%ssqVWsUTE6t_yQjYqOnRrLCcY z+@11y{hfw#=-CUcn=sPE0^{U$-ZhB z$8BF(IJo^Iv+A+f^qrH|@#90|C~?5yzC)qE8r74bKJ5{2R`-{eM`eTKPaZ)M`gLS~ z$lG?!=2Av*e-rT4K){!HBfz~uVmTXaiYi^f^udL7+A6p)Shb7)#=M|Cn`U9pM$~Xq zMIUBgKt+|cdo|bp1o98;MdVgUfEvJ7mw?^fIaf*IE7MB$?6lH<%1`$4%lf;}GIs5t zSOG*j_94jF$R|5MKBr`r`P60o9lK9k1wbcfI>bv}@`CSt<4a(I-OD~0+BFMP_xh7J{JFzGlT4(xee@lc;iU_w{!ykIF<gC&2TkS>Mtr!Iw9P1CtXc8uwqBd#_Y8F`a%HqZdKpdXD?6Q3gAj9b@_HV=w_ zxVHaiiP83mxO5#Z4V)VlTpGx^68^T{$Qk%dqaiqRaV>~dB^##?VLY~qM82U>av$yq z^>Kmb+>l_J`N(=PT6z7s$zxJ=5Ox=eEV zf|?BJOz6#ioj=RBHN(9DfGjuwa6ShvV;HT6e3BPkC}EoH5kGfb|L^jfo;=n+`^+1X z8xmZxoa9LvjBPWicQ(v6p;$0z?uhg+SRO4Dj~8!o4{nO|k?uvXtDz$8td;!Ss-NpH zpu?3W@UKx!;HXS|@q*o)XlApmy!fSf|LEe@ zQjr*Z0V%A_aPmF_QKrGrPQ6aov59lR?U zTH+=|6D?799LZ>prTg1=pSH?i$Gc0n4Er+;?)d&Z_yZ*{dx`u#3C4{gs7WMretS-C z=o{Jo0!Rc;S7mVg-n(u?>Q}xmL8qWM9gqO!!MqjmA+-&ua^RqlW*8g1ytKhPZ55F? z6I+S9Z<^aLUQ&2rGg-i=VN^vF^>G&Q^%|88RPSVcD)GtpqWTpFt2`6Mn2Ir_OJak|>r)$O|VpKj<96ARZaUOIQf^p9pgtV&EUQ!}zD zlkguT=tMa@q!jfL*+6nF)e)=-kCB$w_hpU#uB8!?sCs%kuE}TaJ9F@^Mt>Ni(L^(H zoP;eK=~yc3I3yX?8E2N4n@QJUCbo*ili>%H;G(bAC1c~=XrUE33Zjz^m7_I_-HBN% zaR#m2%B@xGgSLvqpuUgYM8`M$57! zYg&>mK>_V;Tb3nRVi-$-(w5ng(?ScRh3*zo3Zl^RBk;9!P)dj0mbR317ihnxl(uxh z?>V~HCKgWn{pIAm_r5y!ocFwEz3=njPA@dB9d*K6h^x(N32j^_BYwT-WLW(jSD}ga zbZ`>j5M-cG;2u!MT>Kty7}pS&XXz~k302(dvF3{?2U zl39y0VrO$8CqWm24+Z@wCe>SW~hR~Yo$whs+dPh5@VbdL}g2TJh1hHdRy$pvk( z##dW!Y939iIg%(_Rg>{MmQ9cE4xw??3kALQp>Sv!? z05A9?;%8;7!-*h-v}}x<0(!?Y@X-6eiq%)0j4ZT{G33hN)m_#1d=+5=1HMHd(%jHg z%NR6;z4AN`Z{2grJWfDo;w1AT^h_Uvd##s|Jz@1l)n|`kaXz3}q%b=o8a_~^0go~P z7-q*@-s_5xKYtAyj>zg_a^jAjy|rxXs{LtHqdTYyCx`i5$T}4qca3BW{@PFPmQhq? z)mtN6TlX9}(%*G)^|Wu)miLRm=n&NhDcYSlAv#VZ4 zj_<$y;_5%Xi8-s!wYY_DG-`8JT4jlvd6#YsYeokq3-udx+w%gpJ#)`2bat#36XxFa z;?}b$8&OF08CZe?U=51=Gf+PVZm?KFgff5S*Qm%BX2?Bd^@J(Ailh zBa(M5^B@@BMLmi22lFfbD8|ky$84VAQhrkHHchjFn%T-i_oh`M^1z~Nkes*UP;d3Q z%7UIEzfe3;!Ko=!+2L_klhazfGvJ$Zh+1~O6E;{U1J7)1UllQUK1rYb2iL54wD?R+ zX-e6=BWla2ZCpd7*Dve?yTr+bki^Aa|T zF7d7fjL`AbGU7i$V1LVqI1iVpF3S(z0s>VbOft@E6mnZSSHzjO=oue$kBVk zdx^c}13RmI?-6`Gg=!UJ;^ZX+J|_zD1fSJTD&}f!yIU!h@~g~Rx%x5EJ*GSp5r%!_ z$y*lwEw1ElT{w-#!BNmt;d@7whLnfX7J+xoCG3S^abNSEo8WZoWr+6s@mT^b#~*Kk z(-oKSA73Z=c#{dlPgivq+HYxly!B7jJx`c!fuT7TB`ZIa(`(HfH)@IMVg|z$Z;c5) z^yNFy7?&bk@m;qw~OMh(KL zq6l7BjwI!*ut;9K9j>!ph5#7>+qZ}C@5PqniK+H8i2Hq5sE;nT(3;iUkJwLI7GwKe}*cSA8+Xtgux7_$Zc1{r*J?nkk^v z8fP3+qquD!)8}S^4bKzDmuV#1>QZv#)5g*2_rJX0l63ns@}i85%_J4WT2tIG;U~(+ z@kU)S>3;2Z#_Ge5(+Q(8y4a526QFd!V#iI-$_?t2E)E*VI63h}^p}!Xfc4{~{#yMQ z+4I$BPYNd_w>^kmV9mH5`XUU%vbYh=A?VlJ`6)f)ANR|1!ALM0P|zP3?5ryWn)VlK zA*dwu(6Xv`JzTTXwiP>dN@LPFW(F}Laiuj;WRtbJlII_WovEwx(%N?*cj#2p8Zz#2FnZF@bo& z(kg(XesQ6D%NkFRD;MLVrD$$39nP@iI7cl}Qm4)>Yv1?87` zv9NlrCNAYnKV8_m)++Agdxg_pz$O&*jxvC%pq}6z*5ODIdw5F%{tm0`o-_DW@R(~p zN{*KX|10M4Jd%m%IbGYvt?P=CUF#%=8(-Kkz2Tc}A8xz0?aDSy+nJI%$rsnh)<3!a z-o}x}{f+Gne{8+3;kkw{G`znd-||fBm)n{fCK}Ff=$Gtj`Fv|@%WW+)>(7<=T3j1` z*COBW*_Phse>DGe!}jLKo9}7;dvm!t)I8jLR&!g^D^1TfJ<#;t`KH-cUE>poOjWi$ z+O)IrU*G`$`1+0wPB4KV=e_`lRH-mX|vJXVbekr8ZeNNjGh7|4aK)`y=b$Xuksish2lK z+7Gs$zTVW{xbZg|zrKNA-}&OkPdC1>k=?jea(Kh`&R-8kkFVw_%8OKcc>R~YGssZ;6=x>*$*jwZ9rm8`OS+E+w&gcS%BG@M_ zX^X7=7O`4TO+O_lF!2Hr7u><=EeoO)Y{a1?S_<$*U?m1sE5-ilePp0v9(_#FzFk4^ z8G|u-98FFi0WEKrU8oj?4Mtl~f@R7T4>ns$oZC_3@W#6!gvJRH1r|<#vONuEQG>B4 zk&5r4n>;ZuSc$;_TB4VNlt{d*v@EsE<0TM;q7ea)guGBNb+VgkG^Y4sG(JoSz)(I= zii6;nvx3XBeL#4bnk-VDVHY4$h4%y}H%RK&-!Do5x&)g-N1(|;K1vPLlWuJirQpYn zf|^xbn8&$S5m%bv)HN2m#c#q?K{-VMAO#}JIH)_V2;MEhZ>y2I2A0x zFhN7VHCU5^^BWYI;7$dqJSDEiksp3I-m_bf0tX6w=%8i?9J!tYAMQLj*Y$<%2Lv%h zr65RK=@2x5)7puzcQD)A1*snX8+hvA?gkAm2+_Sbn{qI{PuHYiNJgLH7HSwQ_ZGAi zMZoeUn{E`|rL6JDawvgp*QEweycLA1mQwTMHHu%ngb}WRO5j_Sk~lVnv6Vp6e4F?( zn6OhIy~VenF)6LJFOf>OUL#7u9!=@y;TOP1Y(5TqVy8iK>Pi;c1oHv&vfv@W z!<)c4FIaj(RL!mbl=!ZUdWIUMDjFUBgL1aZT7D=>L9dJ!VdufdUIJh}!bj=#U6blE(smwG{P+&C(T=^B7ingfjsy-!JYeK`1TyKY%Z2bj$O zxHS;`dP_jGM_08+L@9X3>76`AQbNsvjT_F~%{F~ckg5UO4N6;s1KPpe%EHP@Zf?GL z+3R7jQGQy`V&iHIgvhYtP`pzZiqzJDi{W*F7#_US=uON5*3{M-Gd=Z~;Ht*>MzwVC z^BDgyu*9|+i!-DwmNhcmuyGj5Xj1@mqvaZ&tyOCtVyFfr8YY&62Iu2|k26@ftrv*3 z1_>{1L^p@wB*OtU=yQYo4r5I^4h$~?cx7?okJbVV9sUgr@EtpZcWFBq!6x9PEZvmk zm{PVEcWe?hW2$nn^K?lB|3=w_V>r@}_nt0@Q6<;bHdU6YKki@G@41@Ori3mj__K=N3VV8{iU{jVXp-$%*M4UJi5Uj-S?~6tNyxAea^L!8 z??O4Rclsfnr%Md530vmi!2x@ZK?9eIA;}KZ=#61MxMU6%@C1GkH=XDZbVO<3CxU8B zE?^VJtqQJaz!Q(J#cClo@G+rUY7l5RDcLes2>4n`APyrP_=xZ>NTqf2Cd|XAAC?+) zjYDri2870}tzPsP6(I~1;~b?&#y8G2|6TlH%nBfvFX67s0Qh;AMTQur^tKv9HD-5c zgU74cK9(CUy%fvvbf4e@Af?5QE7&*-x9AwloOl)y3M)m5wsP zdu6TktNY&Q{KegS{&&6P{oiGtbMiXjh|j^S>KHH1VdOcMb4EUHtQhZEKXftc@=Hi=#vKL=~4v>_lR!CJ@x z_iRlxif$Pb36@mw@@Q}qT`yp%` z^vhB>8W4(Odc$0Y^$=XMqtx{aQHpVulv1cpuM2eUIt=QPHQDx6VNHm2KV22U6``*~ zDXRfK0iDtHr1&zr1x^=FA+7`+5k-gS=hk1fECt6poHl~R(g5KElR2y?)g*S4MT*4@ zyg@7}aF(M@(Gg955#GfDcpmIAn91n+jxNRFxjnHCVY-0HSm8L~U@$N-TcGAXY+xEE z#h1Zgu9wke44usB5(_R#*4ei#tr6U$;VUqiTi{15uo1}vqBKt3xEIko^B8s*>!@8R z7H^A-V!BB|38HBblm~`+xY;1v`Z+;rq)rJIgBg7s(+!%M?u*)MZ1(VZ)ahc%1wtxz z1)yGs7gZOU`^9%_b1D`qbaKX|q@G9JoXJM3DCRJA@|cwADv2`7V@Nt=8^rC1kxE(G zd*~um8jCL&X|re_M$C(Js-g3M2R~|ry;zg$&shFptgL9ovFyhlN*6@s_3X9-7mH%N zgg!!p`o=LofU7jY|M)K&e3SM4%v@NM^C)g#YwI1;+-7Yp`&=e>vp5kpap(up_|PRRp>WRcS; zIMVrh9O%683xv9@76DlN=yF8s7k{;IDKK4Om2|bDg8^X5zJ1fC&@jR4l=bk~Te3aaAFZEH%2{{yrC2a=HI7uxnr zEk~`3wS#s|Q+#A#vlcO)5CL{N}v(jGe`!fyKnONMh5~sP^LYIw~yt=mW z9{$kQoz=g-O2bxti@R4UqGu!1Qyem7IbT6I-! zZfL1psn`r9BnC%WX<~XdZW#3?$ju!XQX5~#g=w7(fGp=w3kq~rW3MCoz1weh*=r}XzxoFbQ0ryH|7XdWEB74+Nq58hFY&#Bkkz%uE7|>}bQgI+`(#V?|GlwbkZks> zYrIf!cFpf^eM$0%bsnT`i0`Xb1{~cZ<7fwzXqdXN7{yW-d+n0Ybr&_2yLxKd z=(j&Yjz5|)kuRRJR?$+`sjf_S7is+;3jhg*HzWjDmufo*fqW$a3_5tU;b9npgTDCx)5sC(S z8lzf;=dG=KtY)iX=D@>^We54+)^b}9YfWM=juS+B-h!nq;Jo1#iu9WXx2-88l7=G} zlie?Gv7h1;`-o!mE#&I9@|GS1ieZ|>ayUUR2XM-jNZ|m^OJ0bTx05fomAkgD{RBDw z*Uy;9xf{!;%0;+-W0_tPP7)Z$j@UKv!m_klsZ{$goty(Kt~xwQiv3@>0|h|xa(+g+vrB#V1j z^o&eotZsH%S)5Ac~<3_`@!#X?p^4Lv*2QwB*ZWpojug$#Kaa_@<&NDF?kSCa+C1juV#pK{4C13A_in?MV zIWU6H_vsmbWq`t#eLGeTOJ}G-dP^pG=6d+*)x760wGpl z#Jl>+AT4k#QjQcM%0L^7xUzs!O{WuSU>r^b$?4lrjk;oT!VhAp>2K_9AwLfmw^YeC zd``c0k#e^Pcs0|`xL3y{RGxqxiLgoq*|V*@l?1nxw|1PTVq4fa-E4P8~>1SYj zl1n1gj;sRzUnN+%14=_c!Nkz#`PJ9iqLs4ycYiGS=;qvwxAy;4Z87-`^k5YgL zp(C1{*_!4;#zJOtij#)Hf>N{PM@;3eu6h}{{bToEQtdHQ4V30Y&@jt;O%Yxb8BQmI zX0J*bs(sCFM#0GBCu0QFJx7?9eKlsL-s+@*jts{lrT!4UEK@MKWZbAGV%8OAe9n?m zsMY0Gv{0Q4Q$lDjIk@4rf$9@hM8NK<*cSJ%RL+!34Nvl{Q#b8k!*ScVN>KEk(K3R~ z>SSc$;>d;MwnC<{`pPIY_1hOI?}{+gqt3~9* z(hkHST$kNh)f%Z~Sr!kV%S3vQR4E=*jienam3&f@QVKnPP+#uum{}zvN7WPiD1_LK z>OFc?X6L$f5+T6vs&$g9+Kx0hnqO~ywmsK0*ir3%;>{4g+quY~x7M>i_g$tpiijNB# zN$GMlb)AU#!@j-MCoV4!OEwqQHNPY&bm&_jYtS|Iw%y!*MRkw#{3|8>#zo5XAh2Ig z1Q45L@wy|fymC4cjL=DYuw!*8IqH8-#2|CTVYT?&i&j3@Rm!WCoYYV(Nr%(Yus=aA z2&4b%iz$`QAjL!5QGFmxo6NdMNi&4;qhZFq0lqMsRt5dGf*!HN@gQ{67lUU9!B5XU z^SPbX7lUw{n08grAYxu~%Gcq)NLs*{n0TTWb1-Ib*N$+`%} zPO%zx_w4XAKQon&OgKF$qfss_E6<2RMV*YCcm(k>-+8s%S1m`WSFtW$f;JU~hC^eO zT71@I&ZX5ACcu<^*pD_{T}qDLWIie2rn(_O?J=-OnJC1#AxGF@<$}gce%7BI8=K|G zwJ9`;v91^lPHm>@zf)yo>;ZFNSi#A4hU75bGuy*L8_Z4O1L|amV!VB@dfWKlPe&T$ zRC#c7$2tI?>D#Voy=whS&38*W8lNVZ-2OUHnOHQeZ0_t?Q#?18io0bYKA&*P$s05H zvel*J_IAYgKk&<$j_ORdjE$Xl5ipQq7T@SxEUe)*IrR)DW94BrNA_ee$m)uT`f22V z)*_8brd*4y9YKJzFpcLjGb(x9JQbJ9#&mHLx%n>a!@iv_cXq6nz+?BzNY|(4H&)Lr z(AKe-iwPe$g==JoYuXxj1?X>YBcGT<>(t3e_cx^QSU26>S8XYlv4zXIb0C-qPB^o( zGxmvbN1RNS%6q%&i^+G-R~o7>mC67ldm9`CabAs2tt$qn^;yR1b61xUPd&CsaYU~X zhWxZLpGN?*k7r!tV-pcMIq#NoZ~w^@(c0YVXUOq$fhT&;XqP!M;xVn^d-S@Dy`q;JQ&q=!L`bOxo?c~<$%3W*r zn;4-KDwi+q#m)m4wr-rJJCJGO#1$xR<4dL_ZTT(arE+=mwlyEY^j{Ruqjvu@-bpU6 zlr^VV=08*^fAmycd(EL!bgh^ZZM&hi_rM)M8u=l(Blo&+)qd8Wb{aDG|?&<-Ob2mLh7YbGt~} zwENxV?jCyRO+!ZzKv27Lrq|(=O={%bbho&c@MQj|tv8jCx`XQ#oM+ODs3PJ#=CCct z5iH_YVPZRW%TG!aTkA>k=GWSniKI}Y7SeG`8ARkrKcwtWUKcJmaQT8AToD%zJk_~( z``S`+;)ZjUiLL&5YkA}5OV_Qt6sHUWZ8xkx+WNoEcQv(8AEX^P%}2<>BM+`RRsFyzPdJ(m!-~W8 z0Q}J16As;3KHN8QUo!$LPph5rtoG(6qWExmZ=H*;!o}loXW%Y6j1kh{P2hT#URE0D z#U1WDaNSGi2RgXcl7c3Cla$={+Q{Xna4xlTl-e1>HS3V9dJU3Q?`(ah`Cm=@8!n{> zs9_1Y_9*s#^(G{k*B(}e;PjJ@akcf&5yy!;F0OWc0n;R+-R*QGQuF>(3Ui#})8?3_ zG@VW>BjoluYtTxvpPRPnab9OD<9?YUKK zYU*U<=ox#&1Atqr%LG&<9AV^q-d??=j;JL_avP(58s zl-*gq>`QbtWL~t;)lltQ(xtJ0D>P!t#N}~&ej+8PdFD}6r%ptUKXb;}$gHSruI_(~ zE{80Oz~>Odjy?XoJ;je_XI-<#yelG;33_gR5PIrlG|5;)!nkh>8kBkkKG9>bNd2eT3 zF*$C!cW?E@o4&ONo`jym{_6kXp^>KZ+S6?xX?;<0YfF0r*5gl@3bpWU557}KbObSVAH%wus!{ zalqVqI6pb#X?#;%F-Xx~M5QR0EP1*N=mh&B1wIz`SdOq>CgX#=V>F&Ay zeX+1vs3C2?_7pV))gr}THVXFSwwaR5jAv#%mJi#^D*o^{u&he2E+r@O18 zp1OeC|Bdp$yDW0n9LQ<1TAOT2V+aSxm%oYE>q^P7Jv}u{^`0v8EiBEt)l;r1HIoX+ zY(8T;Xjd`h=4bHjb;X1kJ0e18NWP7AYd^o}K)r=coI>w3sac!DXkct1>BO`!rc2M3 zw{*QtgfV>by6ajSop9B2sDE8?trNt9=E(QTm-S#Kwjg-U zI&Q^9m>ze7G?c`_kmt^-^q$V16m(AK?6*IO1en(C2yQN4C)u-kIi(p<263#6aN&>W zBt$qObX10eW?oRra3?vwH6JD2TQWV>>u%Y4m4qB#DsS!qiUIDf5o%zekuXI%#UiSO zCr5u&?j=85DtByK^9kfz??=A%jX$C)XjCJdKa1!K8bYK)1PktUsfxj^YYD3o_eJkT zO7rtr7a@`p^Cm9f0sMl9Uqpi@5p-jbk&i!*DP(Oak-YCo6FKK6r=Hh-f|{xXJczjN^&7y`oiRU$f_F0j#Yi)VT`r;Mq{ zkrU9;{@e1_uD6Mfrf}YKW#O8g)#=|-7hqrXt+)}XA~E6P(qZp(*v_V+3WZRecfCT- z?N-Z(3Ox+7Em9ohXQ#EzRe$S#^sC!L^2q@kdmuPDU5Ldk??o>VfL9 zKVsUYhnv9d7Aqy=RFhWLpNh#?7c)IKUGtG!Ncfj%>(w%{d+alV)>nP{m%_JQ zxuPa)USU%b$drWYy!SY&Qzs)Q-eWb}i$Ny3C=Z zphWp=)Md4ZoEY{GR};zH+uMMo~?{uo#bJ z%F9T@dij(olb>)$NbXgPjJjgv&z-loisP0`CH=NVz#EBe6%QxJrulp($|ub_V@5?B zXeIK+6F4ld6A9oOG=J#fKVufh3I!=1;*=Y+PsxK)d&zCgjjH1*h8SMMj$(BwInnzC zF_G|**Qh-@7yYP)VAtlb%Q(d{ah0RMB=ojGlHBqyd_-L_VSd|>IjMSWf3@-7)Ou`- z!IdvzV;Z-V%T7)rv7gbE@(J?gf0Xxi)|Cnq<85EKYDbm%r_ke}6%{fo4@QFIs7z-L z@u8$PPJaJ))S|AKFrUy55~=FZoz=@z`YnZ+)`$)0_U>alG}tt)1 z<>r=L%R5^1EkiBaI?iwYcjt}GzwY!lf4ljiX3s}DzR`R`^OWS7=JDoBn)fw#HvO&X z=S@$qpKiLpi8ReizStCPvUUEhN!hf!skQM$-}Iy;xs3WM z{*}Cr{Lvq6Uyr}QqTNQWbnI@L&m%Z0%S6ISr_(j=XCmsyCBIu&!{y6MOT3d&Tl@xT z*5Q~$4zIw(msi_nG7KM(F%zjIa<`Q_%hrZ-)@$=hg}D&br6<$Frf5m?nVOPZ9(bj! zPdaN*Dkoy4WbEM48W>=1s-PQTW=7|OBj%W8)Ed87P@bFe27|nLS}N5lH6@K znHn$J7>}~xj7vw@c)@RcLM%7ud>q*8LK72X`iy};D4@pXrWkFIk=lo46MAdTVT}!* zD}0p7sE{*KH=i?TjD>7rUamI@in6hQnH_P2rTV!MBkKqsJYA^hG-nC2QBByIa(E_< z4ozD8-MNg9DMoV!x1Q5T)$%O@cx$exo1S8F9wVQWj`@r}`Nai6&8#yujg`{a?3`CU zp7LKD64cDEKE#X2_X`+}NER({Y!D2HC9lIf&0Z`Oo}bR;Vr)`3IUeyxtiwU(OqW7{UUT5p7~ZwkKFC&olDzF=i%U4cUhs)22dFGbjL<=VnX8BN~Nn-Y9c$?yNdu zd9R>oW-5|k@St1N9cxVMXH3>fThbohJ)absC*v%oOxj`4GP>DJP{xU^oUzBp zSWCu|%<-H@VGk<>Ansg7Q}7wb6s*<6_>ElfGy&!`mysEZ?2OGgZgx!@CfJnv4WSjZ z!}4)9tB;%AW3f5uNbrJN#d7_;foGEe&XG_7{Js#_x>pqNvork6TtUwS#z3E&=n~-d z^P22*gd2}3Ro1k^sB?tQ(+kgQveGP~{Ksb;!wHAn7vEmP_|@h$QDy>5Vc+n$+z_9X zbA5+upPSbNT#2Mjrd7>H=6pz4-Sulxk3FnmJo+TVO<0R#GOmACEN4dD%p~LWX=kh> zvnAD@eS#i!B%{cv!jX7PuXozy=k^JYtG%q8^(bR0;B%{EiIhwL;?AobGg2m2oJ>bX zUCP-=a`3PK0}JxZl9u<#C-N|@;qg#F@mo=m#T(>99@dz_37|r0&ZbjC?P9qMoO6lUR6(ndMZ>z}?g6oUUKUYvbJ_`{ zx40QqDSF@xL7ua;41l)SPc-GBw8TeTVq`gulo# zsl<#~kzx}Q$}OK2%grtYGcgr*7nQR)yN6MIR%kdS0LRCi`pNlGhDndi$j`9~<=Awa z3e)O%dOT{2(sNjrs55=p-ELH)RPg^%V#Fg)OMMN0f%qNp4$Brv3weo zg7H8opbbW)jxlEM`^EC4OU{m(Cpo1*Q8WZYt@8qgd0rlnPBW#5&Q@@bjr-(EUI3NO z%M~sSGZ!40nf2Nx#^S-VyF^9ol%E-!9X05t^u_eFOvZ@ijLgC?so9uMD-9%PWgPMJg9zCI#y%1aE_u&r*@~9uL+7|L5-7{1PQv;3ZlWR za?_bYIiInZn4HC7nVd2xtg*o0V?x96L3KEpPUO@vkaT*KZBL7jkAdwv?k|F*p=8GT zsD~HJ6^5M%PH^?OwQICAsH5T=P!!Dl)ak3qPTLJ-@(#T1p6Yi0aEP-WO zN4M}eH|_>+ab8nO4HxZ&lvJ2?@*oABW=$cdcMh>95k>0!KM6m}$!E+AU@v0+oJu{e zkM_RH9Jwv zxC08C@oYg9RCKk(BpGu`vsxs-KKbAcAb>UZ~Gj-339Ze*B67|QufO?$4CD|yt4aAB&1b72{$Fo=%_Tv~QI ztm8&#&XiVmpULe9X5|9FaIWY|=DCQEx4Q$W(NdOcd#Cuk&Nj-FqTz7fp;Pz_vJSma z&$)cWJmYp7!)~i4oKJ2RNH%hF(|YZ^F9{fERWUL;7H{~5&Iuk_O@9`CH(#7Gdb3)G zPYQxUE5G+@;qkmDE8}EyqY+cyHL1`9&fhDRyD~*aZUavTINw#H%AJ1@%SYV_zEqrN zjdt5?Ks_5gZ+XFJ93N)c;%s)xFAb|)Y-_Lh0$WmYrX1*bA}PN;E?f5{u|AB-Y07G6 z&3+7MbFfPyJf53UYB^_Qq8Q2BT>g;iz?@j_M~=~?&23_R{zAb#FYj}R0?+6i?+$9s zj9)ov_C?Mqi{;b|h&Th*57s&? zuLaX`gmF*$W-OVxc~ivlcR>%U%O;rdS*c9#@{Esp;-d|Mp4pL9gh_jB3127?a$17s z^F;j$d!94qCe`W5SUMby*hL>N_q(R~(oA}8#2@mi@&S`T?~#`d=Vy4;R8BwP9-TJ( z!p6@-4=9TA(pl3i7oDDr#Z<9S-k=x}xSH}(PG)0A;wi_7Jf`uEDMxw*i!0%TQ5v?} z&F*Ps6dVg}Lj5(<3O(auc-xpy#>Xvj$D2aAB9Ja&&QVUrX5zYWPt+lFSf2GwtNF7= z6DhOFo1e5YDaW}&199H0JvBRAbj_*EC1XPW6!vdBZ&z;@Hf*`Mu-;|}7H2e*2EB7U zIbju=Bb&B)nZOiQ6_Z>rsaK5)hL@M8En!CO3Gt)6Gc!4%@&tvi0KKcnEepD{!HCDp zD_yS&wUx)`Lf}F2vKiG}kX0wg{wb7WC&IHzSuQb=3&?{rN#&T>ZM;&NVVN+i%omth zN0J@O2=yuE9X756?`%$$JTiaEc~DTK4$l=i8&{li7P73$9dMo}gusCtY<=VBJ9f77 z>lfRst+D1Zz5RWOo{mw3Q{l)iH^!zFIGZSHtoocz?c~Xun=9MM@3vMD3$U^4Tq$LbV+Nm2XKNYoH1Y2UFqmpEh5MMby_W`qPKduyFvl; z;%vmg^2)IptJ~wXj74Y#20QDDaa=fXa(GX63#~z5aT*^Yg!hamN)si<8L=3XnJE>c zCHHNw?CW}4X$=?X(a9Om)xG%hN+WUhRt69zG_|6~GCAQ>a3doMpDN4E@X7>vPj6+g ztG<|IDzcGk>y8TIOahA((p9KNh>O}xT*4U|A4|sFVK+~vcH;H=VgaA%Pdh6H`Z_Y5 z#MgsXpC-Y3Y^9l!Cge&?r^r}8Uav1EM_wYM)tB#harrae7^v*;lA7~+z+S11>4H8N z)P#w0R|V9*t4o1wXQ)23tKyQh^mUvmxukuh+O@kPrAa5*mAE9oKWpPTZ>S`A-lz=$$EqKpUo!E6Db}u!p+R8ai?H#=R9U;*fB= zmuIIU-cf$S6bRUqq|*o!ZrKMDu9M-%E~(*=@2E!h(RbyFR5roe^YK{P!wsi{NqX6` zx3jJoPwkhNpqgM{0vETElLj?F6JIS)~iy3u`@so1D!ia=)x{sw|9FdF7*P zxBoWsoE!$VR{M+5PajoQKz!f=kO)mI2RZ;!aDnPDoC1n)kyZ@>9cxPeZ|Nrp9NE%q zfoh=D%z0T4QcIC$>q<(I>Lw+hJih`As5PYI*o&!NAr*1=1r^6B0yA#7pmKO%^giH^ ziWx!m_7Nh=3oCoyW;WFmhiefd7gvyoh!ki*-5`_-VN1Y~0u(Z`YTX5L^Tn0DJ*SWo z|Kg=LpQ2K=Xc2sN%i)8SO_H6Y2Xq8YkDO@a zeFBStbpu-hiT zMDYyL zKi3SHYHMYp2l?j!0|ImbB|||TC{k8|Ba)(icyROEh2*)!_xb;Z+fQmnhzs7$)9aA+ znQFVe^`Yi}G@T}yrfeez_jn~_%28?WW+rCk8P;pJrA0b6(ZgGQ|5Y2NJt(AZSSRnkVO z3M8+NVPH5{%ZTJ9#JrN2K`X%)Weup4tUzeoXPg~*Y~q$yb95+=`FG_1+`gXBGz zVX64G((bFyMCktuA2|(6#WxXg)OIKk)y~B%cpgPMHZBsd*u!0*PLz-pWJ^{B~pw z3#^`q^demFt{6NJ;8p;<1?UubM&Mh(KOkC!^-62?9F(d!jy;L+XYHqvnx*^i`PXzT z?mA?@51EEHo&$^DrmZt=SbVK>GsnP>npAO`<7cAa3BDJ zL!33m-fW*^H)lXi1T`0;x(_|iHVQGaYXckPW#g(ie8H9?P%e`T|k14-1V^9IvH{Nc50A3chhGE z$WN}X{GFl^pHBXM0~9Kj+M!UG>u1dcSDaNDCQQ@AQoB8b+{<@kyI5aLx?ex-tm+eY z9bTRsZ8u@EPlZ4#%SCdWV$`qn&1w)o^f=B9K73PUOIN*&95rPwslIU&X8V5kQX4&b zsC`kg5NBe^nXE3RFw4?Pz&leFBk!zi>8ulxqwfn`T>aELm*;u1bR+tWTiSp&7AAVF zhE+M_TE8}tNQ@-86bavgRpjbYl2Lu4mSMZSI=NVB2O##XmA#uUU$^P=?Y$eGZk0A) z&}fvrw(fGe1s zfZqgeFQ6bL$p zxk3@4-V{6hg&$qxC$0VNmWBS9`A z6YDKisSYSqjGXu%dvk#7uD;oP`f^oQ)jRD^#e?ywTy~+qq9Ex9-W=qWSKtiVc@_JXTHix= zpw+o6q``<1ZOaa^5f&{Y3!`Ns!N3q0Vj`iiDj1P*!DY29cYx!ScYpT?dbA(wc@Esq z%k|_SS@{q7hp0U$mn$NQa9}7D39>_cD2(n5_ya?V5ZKcgxhkxXu2hhP*^4p4)KbR6rCCf56P4q6AVP;eicGE#1>&>2b41IZncLR z%+IIaY9g+uCstBioDJqyDs%!{!1@a*_h%_6iLWbUAmuszL z4xr@^KJw;i5e8HX>z|;ZPs~o98f; zm=HG<@M9?Pyk8LxDMEgka>a1uiUSH(cK3IW(+}u8VrbsFZ1E~7j`T&3MtUBnqf~xH zBqR^P`eZP31|6z|I}0e_$pU^^n2o?D{lS&`Lp7t6Danxn91Z<|liK~H4p zGE!y4AEquBt<44HaFra!t1K)H^74>M4ka5tWKtRxMK;;HBh}?3<_c$v6(qW4RGPxN=g9{Nn*S zN@Z6B(0t*LOgh9#Rj@<9JTl~$h5|!~B=sx9466t+E2??r0fkIKj@@y^z}c$*p#0=M z-7oa1it%H_Fz_^T8TGt=ct#Z;px=U~3H#A4{PGv@`~fL1%pSW)*AYY0+I@Qd7lbd6 zvJ8Wv9)@F7VEjw{a@yqF5TlR-Wdf?@dUI$VMnU`^8~rcJOAiV)=NR4}WJ2r^=cn#h z8B}64amt~fOvNh^kR`_`SW&JxAZJ8F|Ibz5`9-RozXFqHB&-OBhk_XIL%7Kf52=)J z24NXyj6jHCcpeQW_yG4>k)M4UOGi(gj2v6oOzD4ms~3L;yP7Uray&Mh zQcU_s-P%NWG%CFMna|>eY_*6SJ=QDcLbQIa0vwK!C0xW@AFb_&Mm%1%f%Q+Si)wq^ z6!u31HIE;uZ0@X+0rLc>s84J`2EfjbR%(1Mr;`glhE37v68PA}{84+(;Z-lVJy;0oce-uiiB0r<;N4uSV2DPvraIYa6~xD zoBKS@LF#1WyWjjvEz72t>`I?;KIy!_a$;A-y0m$vc5e%Pr^*I9>xzX;q}^ZaYpTwF zqOw&y19;?;;v9?cPqg^M$ru};YzZXe&kr6@!~RiztluH1t&yReDVCS)yQs7eGoPfSn9{8i$E!n}#reEtsSk>TE}KmPcb%K{$q+v+_gTzI^2JB-QFX;c@`mN) z(2{+R;UH{abZIB_2pQL=jC3~3%WW3pl*%FM%2+E;0|r8^i==) zWdw(GDHXlaU4MpOyh_ z!%tQ&>jABgl~VlF*tmh(?1}>ZJIYfH+sGfDtaNW%^9geNYj>N-JDxh_0r$gC)$S3_ zU%5x{xH2k+@hVOFuvY3Z@p0iNuK6FdS-q@!VmOa`1nbx6C30F{p!6+ZjR1l+@U3;g z)d1){x$Q@lo->t-laC(PepUdx`7cb|CF!qMHf>+~k?QTr>kmuz$d}W20k{m-7C?)qLBW9=8{Bo^i*Q9>Q*^~Q zE1R~i^$2;;ENl}etZI1OXw&ofiZ@yD< zW)+6nj#*Q=M4=zmHMm69WSGeF6B^E;vrO>$NQk`g11PU6CYh#x0Tb<(%A3TVxc)41 z%@W41ZwZ$VV*F5@F$;!1xTcK@3GyHKK0=TNyh}h#6m#t3Q{jx3OUR8WYq6*ePJqkw zRm^st?_&P0myzS=$1kcr{9T;K_j{K1t%UU0Lh;D>Xh}Be(rH!2Nf}kKjeKjV(%rFI z1oqN~TDp2)^_(A8z1H)yS%H<=jZwdAPC7H9Ada8n=jw~e zv9mOm>JNU3I5hkmupPyp3!C(jIg2lra}JMc708)YzJQ;rDMIL(ch{Qi=&QSiSA?L(>xSk>6C> zd%>#%2yI~9Q-D{1umj8;iB&7f_FZWOJO3f~Eq@ zNq}Dm8&tAH74?#D{jSonZOtdh!lQrm0IBiJ3u?{)sq~0+g5w6jx)CJYj*`uQFbo~S z8fv!qm6s}ATi1Go_^-c#6S%>LUOuHmxZ&l>N4r*=^0Jj%Ua54gW#wYn#f$OAE6Kng zD-)Y3@;LCe0l%+C^a)6Vbi^LJX&brj)k^bTsY)(aopeR{_J;w$M5F_yTmMre5Ovvy z|Aec=>()uGYxlL?*m0m~OY<*VA8NRSWe+-x$fr zNZ<|Fa9uH3c%0%Oo|u1Y75RYRj(+uKrGKDeUy{=GL``El9}1T^rDK@Sj2erKjQHPx zFS-9j1>AM3MC3Z_E?l+rBdxgW&lQ~n>+c~9Eg>hE!7+n>dRoT@QdwIupA@?AoWEiA zt`m`k7n=72_`h;R_CLdHCPLeJzC=68ca;_`Is58jp~Rz8WmdL z-+xC7)X9j$d0y>8v8U>N9XF;T2Y4QMj!ip2clubz0ZG379Szm)+upna*NWyPIeJTg zkC8L8%(#6@9T=56oU_po{go}m)O2V|$7&Hd@%$w<>f!CxPc$7upWBy|E0!~z%-{%g z+y{g>CZ!3^5&xD$Tgk^HhqiRqi719JZicJaMK-LbYAj1EDkFTe(`?H4li8FOjwGX0 z@WLnG+J30JW3>pdvBAA$caOZc`bzsDyQHgVSBHcA@LVwiT-LPILZ)A>Y$aEApaOLw z;@3PrNb!%hRlm}4NQ*&bU83lsLJic>Vt9s0`X*WJj9E9Q2K+y5k5^ius7{95`d{Lb z{<>^W)wlt5=#KLfIw!*<<2Y@bop2^kY!q5SvC;~v z1#oi>O|yN=AH|y#TGP4uW*7ey$-fQISxfF}kMBZwN3GHUs z1~v6E^4*w~9*bQZN;L1sb{+yU_9_u^l)nPo`qy_FDUdroDrlzHf(DTvS zY+=-Uvw2TAs?;k@IN&acgz92Umc~rInLs#+)NKKRvPk(B96vVnk*9YH!ta&LN3J znB1n%Jv7j-TpC%?6G_ISHZHCo@u)rabigglZRWENZSAZR)v!aztzK;tA!i@@r=YL8 zANmwa8hpJ_udGAqhy?T&);yNTOqmrVbl}inXI&}2{Qnd7o#Am+*V-C&%d(1PxyX_W zAe)lF%$ZJ~t{F|Q(om;qx->H?Qy>V#%+QNN*_RRmBtQzG1vm)_J$wlX;X(qIx#4m# z=?MuClAB9H;CuI+BV!%p;OFt5z0TP>v&&j*uf5j$e&=ZN%<M+Vv_UR8! z>`WzEsxUSr>?L#F=)`=CdQJmm`w>`ZLK(T^moVi|-B%lA&p(1&_?m+=3xsSVKnPOP zftamqv3dBJeR>otL?9#iffp#%@@97XE=&hd?f2=>4`;p8Q@Wf=BG1kllVee*&c}Vw z5fWT<;C|&3XH_SBkn}Ibce5uRRSk-U3>YSE14L%5Ik9!NHEJ^9y!_r2^`*%B$o3lJ9>Gi*}_1;Q(a2T=;uY zD|u6S9zW>E9$y{aysrD|rp_jHQ>R=2&U|pCST$z9 zlaWOt_K?>WQJJYN8zAj6tQ3KWychcuw%YFIHsX;juasGNb!0@b&w~C=Y3vh!(CT;K zZbK`x*j!d=JWUd(Vg(DDiReCxt^eXhZRELAtN-BF%V|}(Xo`JKjKpbNXEvq5?43?J zW}H@2G#DlK%Bx59_*b;Ttpcv=11-DTNT*_X=^d-YXPvaqfzRUH$GpWdXP4THmO#=! zyP%$kknK!$kd&2GfUB>R0p09#Sa`Rc*+zb#T<-8UD*A1XeRg~sr+XKcOXT?qdDs-y-8g4 ziCUVPL?nOirKhptrz~^ulT`c0@#A!jF2j)tpx*|~F^`9dXR-=%-^u7v&`KV(wjnX4 z4Fx6Lr&K@UCh>$*tHVRDts!k}QAk|~+Zw*z8sI|u^dV!U^e94b6BkFw~%n0}Mk^yUJCX$ZM zSUu{oxK={K_Uf*6D_Y5$T}SL@AGcSV`IYi32UWl)?W6FC+%}li1Y|Oq&o1}PsAG}^ zQ=0y;L9*Rk?e7!HKtuBDUF?+kpq07OQr#|kjGC=SMK_*4+e><#)$nG}-GL@910Z8i z#ew#65lU}kXweOH)fBTWyyG-cy ztSz4(9hmeY+YFR%l$RDk4X~4%L86LL3rtjx8eCNh)aTw!>{HiQfih@Z{<>h+g{-ec z20;k~NkG#I_D4I|G|5;HBelAegme!c`dwt`%xd>0aLfRe7*m-BOkot^2pi~AZ4z?A z+11TQN|{4)L_rC;%A@Sw#Hsw?k)E@w2zI6@V-0w(0f39}3v$URd(C8{MR&rDMie>j?hVBm4K8jJtc{#F#QokTEy9;@rE0QYDr^w%K z{&-ifpc%XMN2B*RZuxjwAK&^hwKWvSkK1HHvwa>WFfX1>7XrGHM@7Dt!8Zw-Noa7> zZnpiZE0&$OW2YNV7e$xjJ||lVWK}j#DXaDtV|GP`ypzI~U(rfl9;C&FSG2SeYkJvM zO=r;2$@_x%Aag@CM#|aw5W__MWlMH8s+=PsJ8Zn=rjIxDeM%&He;qxlorxURn?B}4 zx!=1Pzfiev0v&R8*=3SdQnG|jH4Z1!oz5}jzFR*Y?G-eW2VeD$-t#6oj~}Sd-G*)) z`#!<)n=6bJLrg_%ij5bh6J|3ER~Q2&XeOaY+^$1Q&{ijWM)oTw68ELziyJfBQEg2>Bt#HJnA*n&qqBRi!F#psKo z9ZkJ&_5Psu?%qp#Q)GSaGV%K6A9R1A`sMbRs3e!u1? z08G1PO@57MjeO0f&JRSVcK$;2m(IsKzudW}Gtz13+}+&Qxu)Zf9Y5{3zhkec(lOhd zYJRK3*P#^cXui8+sQttCH`<>P{YU$q?bY_F_ObS3o2~8LZGUcisqLY*>)RIECfZJH z8*crm_0862TEE&_Z%wpXT0hs?)ADXh|Ib<;Zn?3g)Dmntxn)~RljzL7njx|ye?i+~ z1L_lG)__?-MJ7VJlttGj+vcPskYExQ(}YowWmQ1rDgzI@9KhPeZKrTjK&G3xEKr(5 zOTknr{qM;Ca#GNKR^q7hL}3@o%)nfUkgiWM@&qR}NbI0aUqnG9t+hnFH=2bWDUaON z5QCW%-0QeS0)Hd$ODDlj4pz<7$hDjlG3P9}=s_J0T4>7U1*+3TcBH{hijM{}Dd`I`l>)K@-J*jf2sc^05cA!>{l^30#bn zN}g6*(rYGz7)-S8^zeiH%W1^X!I=w!S`eNAdlekrF4^!T_cG-Tz~z<~T-HF%hZ)9y zLupvXznesF&O;X5fD`(XPRajl!?) zxY-8#ET#uE?*TjL2ke>k+;{+GAIZmQEXXqbwXi&xahI&~pZvQ3 z66uzwcqzS|WH41=XGcc>=7*)5EDks5yD4=oDs;iljF%W=2CG_(E9vq;ntvIV*9<~% z3aksRT3Xi&TDgsGP73~2paIk6NB4`}iy~C7F){F$W$9!kn!vS*80C!^WIf>vzdk`%e<0lFn@vJF>pVqi3b+!imPIvdxiCW8!anPlrh zDY%RA2kBlxm6)@1?ZTBbXY(h0jx(WYs2^5cbkKQ+fuN*Y9C^OFX{+O2v3(+u58p-;5 zmZk9Bur{cc!Bp!P6L99@;=u;lFa9uU25nHJv`pM4#$$NIl5Kg3e;HMJ&}FD+MrC2e z0a|1bWJ{WBoK%ZDxj4wxDbF-g-$5}A7rHq3pS+ZAza(@j-T`Sa{y25xH!pr+xaAZP z?sgim*q8w5dZ-J^)(!&WgW6@~EfFq$P-D0LalU8pVJE=nVFt@F{J@k3c>tDF8^7eW zluJZTX|3^9^p>e)W6biFI{)q>G(w!>0YGn1reXv3kD=K5MNX_ixiXeH12Ph@dSHz; zK)cueo|i(OV$pb^=Cjb&ph|?smNqv?%3%ax%U~K%R1Fqz@P6A-6c{h{`1yBn>Odic zei2hk$<_n7dxVqSe-1Ck?g4{v#fUwF8N!Fz@TYqCWed`I+<4k5X;6_z6ZC^I6Y_!k z`FDYrjWy}Telt@S9M( z06!m{ZRB+^3>)ypF|B~+*5J>;D1s}yWBE71R!^c;OE&^0Lj%?7D{jp3Jp%;X2NePy zX@)WZNAM$jlEndTeVBqY@1|&DEKt>EDbT-*7?X4#HxZBm*c@Ghmy)h8TF(li@r`#k zx;BBU5@QJ7N|-wXeh%=*QFzhX!b_9T!+?G;h#g)7rU82vYN6$!hIG*sr1=pb`=kmz z0c-@Cc%e=AozK4vRTu@rI`&EclK^i67sZn9-*Hk{*8mI})(C*kDd@Qr>NMFuvn<7= zVYvnI0q|5{AmO`|whZ#pBCfI1i?l!!ry)2ai4?LvB+b=jF&$bgPMl_FiBRJ=726x! z*wm8JJqkW|Fm%E`!K~u|D-#{VzY85sRR;`6g`SE4b^*t!<9%KVgKEZ9B~X-NTLec3 zHBk0M3%6l_0SC{3;=hCAK8=Z>R@Elox}Sd;M5f?PH(4?uZbtDg?z<~#ruCy`DYhT3 zaT~iBssnuRj6J!5Qy->D(3fLPfU$&@o6?hV(7Wi8Z@q?l8T8=+m@mrwgU2Y;I)&-j z5?_{5h8&cy!n1&;rM8-}i3i2J6zanu#lDBq#JG5&;l@Saq^CfVNv7*kMJ*JeQ05Y)3CFY{~Q|*D_|36%JDA!gOs2g zR))GpxX`v_w`90?spo3OB&0!Q9!*iLhV-Ly$M<v(Yy z&>VP?)<$!?f;!19f90j%a!QvmMKFD7*l8CAce1jMvpyytq&OGj9E=4CZwqb}HeYKy z|1Nsepz;bUV39g?S?D;ES=@FZCx&s>gG?S~0YioLOI;*;YJD3o%}iEc{woo9)D0zs zKORkkB$8Tk6D6*$>Es<8!;T%dOa$*QvUQJHPJ&~uElcqW;XlCSRqU9uI9ymuYW+@LO8I&*f$-!JU$D~&#cF67 z;-%1|89=|#=|vI*CIwDHqW1#M|7gs5gsxY_aOgfZV!-L8COJJ?p+sjJS+ip2uOcH%7ir!Td|3=)lgxJlNIRc z02GMcSA?Squ`xZw**%jB3k13!1_qqOa1+f%YLUC=_^wM}l}9O@0Y?D~)_fY=Pv%nd zw|FTwbsF9)GG$UoQbX|>WlkF4+#*o((EX2q8tfmo75&vvo0(SW!I!~sfH?xc5ax{L zk-!>knOc@QyipijItg%lsrG}O+ag+)!ovcf2q+wAuX_AEy{)|UIHVdeQfjEXSQ`AW;X*(~ z!x6>~a=~oj*ar?K9D+*x0-(+vyyi**--?B!hjB%2&c?qk@;yV>VB$b}fjtLr0n-NW ze4xln;Wxl%Vc>{U@&^EmQYA4ET9(={bl96PAe@bXAxZXrjgwOKNxjNw0&5ej%4RI2 zXmU-RUI(vfk`FX>-Pt7X8Ebh!^nT~B+NQe~I*!?^**b!tGljP2qOvY)F+U}p^BVHw zF`p&iA@7}t0K!$^%;&^?6fvLsGJi2uG)ep=K>9^2IlYPd zvVAdJkO@TOyHLLLICsHz{)fSAA_bTW}&`KWc z|MhNSKW{lipFbbpbK*XV#n1h|h}h~>NaLYMC7GY3#~~8A0Nn_hF;@RI%07O z_w#7|s9(q@P?neuCre)XlLiUN;c`hJBBA^-xM==mTN`=yjoJYFw_MdI8VaK)Wg{YG zn$0G{Iloh^p0$>f(;0F>ygJ$^Y-Jyg9OJM=C8xu&K2y0*)k z*LOYHW8e_-xW0{RiBvlhL z+5GfW(PL4dJ{m-94<|{_9L8DLOhPQB z2AlS`k?FbRy?oU?I&NRBD$}AHJg{H>~WqYAwi)!=YQ@FLev#I5lrky?GU3YcxzyxfY2%ey z?)3}Np+H7nej1e4*SvZesMju}$zqB0_&8uA5pk2vyJME9ocov)FT%S58Az!2z=Y&) zY9-=ho*ZOvzKG^W0H%rG3`XC|)2OVCIp^^zG=@<=?kG@jv>lMg| zGX1Nq9jxuERgY*yvTqKZ$+t+cqQ|ukrAek6n+oL8u7JxYq2D!l1d=}_64fE;AD?=T zHC3-TU9_F9ZmWNCwwUo5Y?8P^RZb)-Od)CwW@e6y&ytU?spbJ92-g`mkapnt+2KgS zMZ%FMEhm>=i#xj2rR2aLF4@Rk_U&*lU-rSfhJ%)9FjrEC7oIcqtjQfe$HZRw#p=M| zs!tHtVE1l5A$t6JT=fOBIDhIX!V}J1)c=I{10R%VzKeeLTwfi)#o=mCkOMzHuJKWq zi8dpkAfC)3e4@w69YGr0?iFzuFO$%X^on*>DT>CHGqY*2h6BIr9C{gwcWLMXUNge2 z6-20Mm>ixk@&8A4bZ}KE?p8DWW$1SM^7tSU0Rk}4q*4DGVP%9taJnMKo2$DASC!!o z?oYd}yY_0yC&}6EWa!rF+RZr3ptJ_QDGeZcalT+^gb7#{jZNgdwYq+A)kkQL{CAO_ z+p23eVS1^zixVTl+>MY#1b(WSTzCmmM$u0jG2K>Ow_&x%$hq^!9!=+MK{Q})YBKle znmfBMX<6#}>6(olXSb2io?nRR^**rGc(t|=u}rv`kTL2hYmFJdG)`n+hyD;W6IbmT z7@g}xZRCqzUv{t_`39`%_`WZ|VsNRlb4j&LUQ&5;6V8xQl2($AvFdUC^Ya3ba`Lyw@X>;1B;~qC zS;zN~P%fx5VIy;nbRs7&7Th7JNg4D+$+y0bmj$hWsvXJrqm8`m5<0 zFDqlRvRRT!A>2H#Oh=sw5_^6U+A_mrCH|?rXHMoT zCe&&2_+9wD!e+8Z?uQq8Eo}7g-T39u_~)aKQ?{H0WfqtM?d-)%EI{Em&G#ZTUm<=gGO&c`Z!95``1u zOhBkm@OmWf=^39THem>-FzdGPgi z%-D;K8B;D%gfXtR)jpnz$QhM!Mz6^`5y(lsf7`9gL*`&HWFaQ3_ejS=Y4w<@P*EF0gjk^oElfwqbI(;r zdseoRJ9dAJteA&y@sQmAtG)+y)`P#ut(LIUS!9?((d-wSRk~O)Ouq0#s(%H|$ZzZz zy~X@Jk&7Jtqw2rV{5B;XPgLmr1y(EO_ zX*3xTRGQOZ#w|5!y2Xm(3f1r?V%i96G^|Hc+9Ik z$^yIkTE4ok=g-IxL$nw7XDhG0>8&^IZ*;?IQj&kc(fFjiNZGcxsiSGAspWee$9EUI zzTY$?dV7tiZExG&i|tEWu#mZ$5Hr}M#Ed&VXAHP=YTay@{Oo1yWI;1|@ZMjc)^q8m z&8*>P*u_Ib2mPR_WICUcr(_{@wB!z9RqSQ4D7lckDjrPLzH0UXKBXpyeg(3y|mG|(%MHFDO7^Ri<*i2aI7`q=(gsNPgA z(dv3mRgDERr4(a|$kO&iVMa44C6SLXPJ(7~AgDni)knNFq{tfF>&f)EOT`p}6^$qC zcE(Y%fp6K}v$B;d)_C`h-EFM%7u120FKt2(oR0HGr}If^UgeTVwUu$NRmJ_9CtimI z5X!Jcx<}cz|Aq&|ijV*J7173ymiL?5zS;6VY|Z6eKVLJ{5ot0bN{W2<6IxsTCi(^I zI&kZ2qUN^KIO8*Nv21AsQ_THoL(Eaoly$l>fQppjc?EgrAF!<}Tgl#E-Zsjb{|Q4r zEL$2r`0hd`=_>2JzMNuGYB7u_$k#u_unAg8Blg?+FAUp=bO|8gd_biVRHS2)!1Uy- zLh2o#%ukWPU#g@1pK4~W`V0Op_1Ip1pSrnrb#X@O^^R+RODZ#s!yNn-e^k&+c3$_p zQ8xZp?vGL|3N92B_PUS-<+O&ae#4YroC%ZX{zg^1pqb=jpWnsq_+MCZcrM%VI_J5} zI3ro9Oq-fjn8qgqX~`6+{2hN>&`g{~9Q9uLJFQmBN)w4OMyBu3n zfr#uG-O1(hv)6x6Jw?PvHcxJ9I=L~iKU*`>5pMf>%R9~8bZU1>*yYg$1f+t7)indEQsV(V_JX+>KvmMqc2 zPi{SUrmPFo;y}STKkZPZ$@6Ws-RoAgk-cx5M%kmF!L^S1>%5ka+Ovz2w5N8B!Yib)lEeh>zYedLf*_+qY zaKuq8Q78h=Ezx?!<{~D(EG|IS|!So%uAY^xV4~>W#oCU;I>ujD9Q^C{g_MtB z(yp*Ip7;18h79@U=W2i$6*QCnE7pv%J-g070_P(Kq7la(UpugHq^L#kaGuX z+p$uZgP*{RDXf5R%!Sp)1%KKE@Y-7jYomR_W+K}1f4j*s8)|*z8#kSKIx%jn{j0yI z%1Dy3O5T!)`^!alB}U$9sST3krdofWP(}{CJ-hqHKVCFI@n(BP3vATzI1x9E+TQJ76j^nON_z*+!`YT#pFXw z%$}y{DAgmahuZd|$}=?$3>CL>Mt#8o@x2ecJwM_b5widy&Js*iw( zXXEZqKvHOd#5w4*Q6PcXCS`k&!@mUf3a-2Leq4wHkv5>JjSj9VWcOZ5(Ia-8SnJzt zM-B_BHE22&O~pb&&Lk3fd@?e2B3@rrN<`28_Ry~(LnqhPZl>vv$RJMRW#rW%hXFBI zuw1=@z#C`A5P_v;dhax|;CYyh~aXsbRa@1PMe;x@lTFk30PHAdBnVgxf#L{6oS#uO#7B-Xque6S` z(W9s}bo(=oh(zJ71e6AZDRXl2>?mFlHgm6R+eKfoyW{d{X}maZ%E!fecQ{SHup1L1 zXeN^14#N>Lbhfkqy&JlbFCx}8wf?T>sP^Z&&7F64&5Lv`n_XCK zl1tUI$<&lwHaEY(G&~|&arTUyrsve3Yy8@XQ$zT4e#8_ z1`IV&y*ZW)_;K86N?nRh2c){hoN`(fmX<0FHMp5rHMO2zfea`buj90M&u_M}-_TGO z#kpiWIQj~^IXW**&*`FZpKQE{YaTlKG8?E15&US9F5s$bl=haJ?vn*p96iw6X){8t{YM$Uy}5 zVnpK>y9^Vv<}hbUF1KKu1u~-9gy8M9q`sB?lLfxpM(R6tHhG%XJM?Rh-`fgu z;pEX1pJ4(!N4$3-yM_OB!9v0MdER}P^}~Pm!`_->Th(?~;vhzvU?R8)0|Lv+d2GxN zd+pmr*aT&;7C;aPg?9P~GU1WOhD$w~$7^TExe9m-_l?!s$rHiay1`YS!fAZVXVZXC zpdE6vzt%l~lxHdGDN3k(fYm|XRK-G`zUb-=}_nagW{p zT&|ZG0yXVnM)}r2?FO>tO!ycTYPM;94wB)J=V5D90!&u8_2)dZHn4H^Cvb<5HU&;@*PMI2%_-oYH`P%w^_XIsE=s z@=mGN+bfV0dTl{oI`g5etgTGduziWvvU4G=bgbaZ$=vd=Ga||QDgYsD_=Q779D;;0 zsJ!4wY^exKxz%}4*O`jtphn76nL(S@@^?APY$mjsqj z!OrU_S+L*=Forp+S7MLI=Ft|f{Wzy8bVitQ3(4&)FH?>%MjH2o8 zRM&sBzt^_ClMUU$1{#~ob8vG-6?TmuCsoC~y=ah@fyepH3VxlinYcQpPGz^9SF=&O z?ZU6)?Dj;_;PFfH1-mm+G)bakF}fRe^$MEF9j8xX8DH$$%I=%Rd3D&n6u__Jx{7lHu>{^pc{b&KbMe^OU}pG3Yu|{FY}D2ADmB*5Q-%? z#+HkMj896`62>}{8Mh^!B}5A`JAc-OBMYe$gwHxmwW#)Y-D{lS7&?PNkT#&mIZda|fZlH!HwF#PhCU%1SqoT%7+zFi z$Z(=elH+PPz^yK&sWVp}##lCpF&kF;wtB4_w<5@c$5EW#vLMkLW&IkIKG_)ZOr4$& zSC!(b<`N0H@YTzQz^zj|96j9am((aNC=v^KT2R46Vt(D19%g1q zHNY59_=>th6p5lHk=%26ZP(zcLJnlemS|FpQ zO~LbbK738h+t+q9lwPqr)BZt=uj{7HAF(^dC!Q-B2`-^-o%bjNOB5^j-kT4za>=!` z;kE1$w{QoRvk$6>IXBM9l8Q~?GRQJog?x&0kl+0pzEB|Jkb)>m7Ep;dvF@)^4QN}U z$OqiX&OWYmOv!xH`f0gZlaH%Nu3+-OBD1V&LPI2 z5D+&v>Reu}Pk0;>&W<~;thJGQ_ttv)!k?0#c@}_J&b($L+xA6-PKVBg%HWiiKcX7b zm`bKn0-OtT$W?6|BP@5}7_m}B4xGsuN@Sb=9!P8V-UZ{(7nVA0W}QAJMtR?)T$kWp zAHD~#uM`o{*T*R`)E4%q_^e1uBC?QmJn3|4z$AV7tq6Sxn&A#y zAR#ZEzqyzF*R3_bs2}9h8imAbHOl?zirA}&kmzlgRzWjRrEAEKdHzxje5@RzDVx=G+QSI<@5D*4 z^cC!Cfr#Yq`ZmU68xlod{R*}a7bI$$XrPU^z0oOK^OIIn(?s(F^sel5dR9lK@$y+6 zags1IX){NohMc414UxGAVD@r?W**!3oQJqG`gzM|bQEEsOb7*F~lz zw-uKM2E|P%`$I`l$_E4t;6UK2)kdDIV@0!%;jp`^JWE2Omwc9Y(7DxoSE=*!m+r)3 z9n`H{lKf(geP{K>dZ_J|KUQ<>m|y-}RHBM)DU=4nodGHU5agrDVAf4sm*Nm+|2{r= z^(V-Ie}H-Y>F*zQoQEFA>0F>Kp+tZBIQFEVxuHbam*$dtMC9QoYwq>uH?=7{U+*!s zOm?R`)^at5_}gv_sD34gL$N zb7d=$e5pK2zC3!_R`!@*P|NFFq7^IL7fgg_a$2UGmZjpsxK@<|nIk6eqGzEn1R^AY zzc@-BCm#>9zj_vm2f1prqK9+Tos#7Igw#0gFIm+Kb|y>0Z@>i*v~n?GTE4`heCZTS z$;46?L&+T%j54z%&m=;U$slUQW%Dv}*$Ws8K{Iy`P9v1;hcDD7M19VjX1vTW5oahA zFwTgb+z%+eh!B84M3AVB)8&hZW(@Fpu4$s{qE4p$mgf80T6sO^xeIx<{Pq^CgymIo z#hagAB`j9SqhQ^8tL7MX-Q7%S`x+Wz-0xi|OXYE|o=GUY`6$^tR39L3yakoMQUrMJ zH<#%d9{m;W@t_Ejs0{@+O9Vg=6v7N8msxX(>*1td*Vb=3%p-^l$FKTKRe8&A=y3rF zZa9gc4jRetK;Hm50H94K%iMN&cBZx6eXzw}#dWE~TopJo!d z(t<0;s2t@q?Hp-+f@W59^%&R|8!+O^Kj4gzas%W8x&0i}3%C`D!REIy1h{vk=qD)SMjjz*aWND)H5s$y-x5B?SE+*@BD!%*PZ0Cgab>(gMQD-#k0Jw zUVX2&ezkRV<4qg3vWmaZN3{Ayh+Jdx08Ea_Nu+-r}M=+B`&R<`2&i-f`_ ze_lI_sxDeg#l4GbD^Gy2Bxy#e##5M%leJ6uae`*@prqxKdYnz{g-g_Bu`kgg8cu`R zl8#9Qqe~^ru6WQGn@SS(tLR72Ob(n3*zQJ6&^KSD;STE(tu5mG$KXswX_6ModZWtd zx4NepqWgPochAaJ^4`7?P<$^T%kH7SQxDX&M60m40A4Z_lBOg{i)uC&8FS|?UgHusXmJ>)2~~M(pd{5zMjhI0a?I#NY3WB; z?ZRgGl1NlR<-#U%_7%6BMEX9iy-W3B{-8b-?vKW{86>y9jv$Uu2DXX4r;y&~FK=T% zejWOazwx`dsb^Q4L3A@BXy0y`?%3G*YnlmoQR6H?>pr-dw4!v{$y7X=L{bje;Dm~N z`F+fQpqcE^{pTpLpETU@=wESI8SyO9`h#M_3Ag8BdZ$$ERL0%Xv0O=_BB9|r(nSQ# z&UjT?5Fh?>4x{N z25^-{su~L#XH1oR*xTq~ki5FN4ha2~GSdIN7@(}>pKl?uE%kqrYyVLlC4r&(2tuB; z{)G#9I^)5-TjH|GN(ONurw(ySYxf5*90C!FI6<6(JaSy`#^$vWHIviWY{7Y%rW}dW znHU6#3tkh*$b+Y!vgVciM|+4JoCyKemY;t>1chc)x^dElI;bq{uL?b_WbZ$G`&-gHhg zOYNlThO_GH`o$Adk)*`B;L3z$W1ei8A=j$vgEw4@K@*6`o}Rxf8@H+E`dNb%x&+v5 zfC{2;4#05&?tqr$Pls*%V{?6Q!)kK!;G1j2r{IEczNFzwioRWb=& z7-YZzs>Q-}e-Y#xR+E#RE!`X02RggUB64DTy>Ao6zW{m@02XXTipU0d6-1G2B-CEt zHMpvfJowZr&~aC90BGUyo%QvbfG>f!0a6nOFcgxn0i1*@$qd;ksc$ATo%Nm#t35&9 zJL;WH+?O1!2o-V{=k9JtW=jZ5bpYTRK*0fe9jf;LzyP=d;3ELXtkLBWvO^L|R(}$= zez9fVWqcwE*1GF!H`8Z&ljxZ>F)aB zuG@yz)o&agzq=J~(UFZ4$m)yo&2{zF7A1cIIlXf+L>}p_yZT2dUtbukX-~HAZ+)+2 zt%wb2Zta0u3-6~THe5PK!S6-IvRa;=mIk#`8H5$mCqgL+n~COwX&d|J6YF53h`Hl3 zg|s+P_FFKdg&0FzC*u`iGr8mPy~tTPxsJQ>d9g%0Ba8ZUIj47qQEAjfc`9BJHj_IH zaR>YTQ=xdaT^!lphOhiWBV*KRW5%>HSzfD_SJKmYXND-Z)v5Ab(M&X^Z8q}Kt-o#s zAwZoHF*x_PQuW)=UO9cvk_Qg7I%6!)S|xfpx5exIbx=yIl##sy2*xZY9&RFk=&ygo zsj$9*`pC%m{ucDg(H(-U%dV9L=0lPx)E}zC3a;0)2I}kkgfbjyyAVux;_{96JT`zt zw1!fAYXf?;>~BVooR-y31YDDhVt#T?JQrmq<|VYp!R;zFNF+bGJJtyvBL}{H#V+!I zZtoUy&0zgQuJ3PeMBmo^BJ|DivSGT)0cpkQm=s&QdYd)b=z9lvN5PG8Naup*fE4jl zBvBlH*`|BW-n9JT_04slpwq+!k-n+@vCbQMMqA(LwgKN#-<791GoQl*sP^~bk8_pR zMXkpel%(zUso80}QJ)TxTx)#`x!~;jx?X{d-0|kONAG!Zx+WsIiN#TJ;GFt)To><0 z@eF^Yw9XWaj4U1un&UxBd@`UW3ofiEVKeRot~!nVqpNNgZRv)xZ)sR!rHz@HH3a8! z=IQi|agyq)0n#I_Z|GSmp-{Qtp1J-&BjmC(@h!q;B3UzZ3j5)ib$Gbm{p+Zk+}Ii>OUOGlWeID% z`C`$SQxL~keIt26QSa?pDZ26Z)>GM|mGuD1&7HoSkx9yBNq;VpNg6`btnKO(Hj@KG zVCQO6*O8&jWw{`BhAfxn`@1e8eLF54--=Q${vauwJT)ntzRH}kqLzzrh&)?cw{Lad z-E%O^v~uqFS^b4}^;u=#Ja;oz*Teey8JlSx^lErPWVfL{inPjAq&Ped{9Ed!>x}gQ z+^$fVGGMw^==Bm(ZBPM3!2{{|4(?Kb+g*G}I>_ozQzU8JJpTHqqlnIQSkrN z{wi(=KI_V9y%pmDY&0>#jkwGLL?Wr(e=?ceT-cJ6H%Vs}39 zd824py?;IYRt}EBJ|VZ-r!8~d#H<}InxgUjyju)bqNy`L8QaL^LWoYFGMIOY1F)@_~>qd4%g^RX9%&1B~>m7_@#V(B53&ExQ=b&|8(cbziE+kk!Jsyki0jov?1KdsG$ZNk7u;K4_0?$-!G2nN#N8f@ z6*6)7!Md1QtrgGCplX!v0;EhzmCPZ#Kqq*Pt04W)_b=M=XaP1IDj3ySd~VFV#hRAM z#`LA2LSvdwTGT{$L4CAW&`b_kL4?r=hCOmYeH>OPuph;&d>@YJoW;s4q^GAm?m3?p zSVV%Jx1C>puv3mkkqlfqR<5zP2lng*vvyyb$Y?v6A>hdOrd?ko^ z6E<_s(dZfV4O37HICY?&6nLH~{09>rkcVaPt>xsYsru-K)ubeU{u#)^|H)tvF~;kM zyNkaqUdLVh-PlyTKP{ZZ#$4|Lk>AQC0Cv?aR4u0J0bp>L#T4q(1}r*S2})tJfz&8( ztP=9QRK0i8VIIL*{L+6LU+m9N69Lp{fL@@6HbJ2k#T3OK$ft;_W$FMfSyjr%)iQ_G zfJ0emK%w!Eke_C;5{1pI=#9{FK=I+3x@&;0L>OqS#1%o`({QoMfzq z8A;f;ko9}wq#woN@Ll~|OkOUZ-H|Fx0JTs>X-)gJQfm51GzTd%?|7bt1y?ia6uK@l`JbT=RNedL@PYWn{16`D%hHcJo4Nc4|bfu_*eC<}O zeY>E!0gSRTym&unJ$Kz!-!ZJ%zmv{&pNZ=5K?Gx>7c0Efg9ncB z*^s{+oAZj3ZkN{y()b_Wi8Uc;MONE(=&eV-T1PIs_ikjX^63GB0bL&KOKx9%uodi^ z7aDPWd-k1mJ5_+k9aMl|Ye3=;5EOtd4+02Wivw24pCL!z)!3}7Ny&SUT0h%3Uw?Of z!zSQTgWCZ0SU#X4q;cny2G%ZcqZ%vYmAmWxgR4G44*b_eP=EIvUj5wzB`{}~Pbwst z{J17PuPtf3QrhjVK4CNa-o_yqWaT%Y`hs4d>Y8wlprF6BtPA`_$O4dYAN0L%)cXcj zd4#-q^N8#-y^;0zQf~y8eDs2kQ**fSYG6|%IgOg8qtr6BN`6Rf$ZAiMJ(ow1CVfR@ zjy!ws;kDqmFaUy8y}aUo`7JC0fvmCO4^1<8#IKy-Ff$^_Sd@2EhAmiosYEs zlg3_*P>3h(r&aJA7@sw$m#L+GW+CL1jhphJ2(=Ulmk64d;SB}x@=uNwJ4S;0N9jIm zD8*E0CYfgp4qw(S_uHq643V^50)F4U2&oBVWY0(Mb0>qoFJjvd2lu1mnD1sbAy4b1 zMrU3Yn3>H?c}b`Ry}b3K`i8zwiIAau8f$nS!I&YWPV-7fu;myMxZ%?q5rOgTa+>JZ z&Axa84WP*P@5cD>IYr|+1M;`WwNj&e+)hBzldQF$cW^-75*&p=!^IWs?U){&WCYg+N?t?aT!eR zg>qi)C`yQ&V3vf<KzM5U0456R)w37;d_UUJg+ ze5{Mr-hx2Q^~pgpxZ{#jwl`HhcY{HBIgMxa*?#?@!^}4C^gaA=-97@%hq_^2^L=Vk z8}ohf1FOt8D|$AISkGAxaY|3Rtn?aS*f=)Wy*QZA1RD^dqqavv@(;jZo%Be(Z*bK| zC{CZ`GjB(}_$c+vE65AZ8bNOWAQw>R0ErrC^7bU1+)YQxRkA~D?CQ@Vlf7giTK2Fy z@D>&-K(IoVS5N3Whgm(mHza?oKCua4;BXlthG5A}id*YMvvb2&g7$=nDsvOXCUPXX&%M#AdD@6dQd2rW_Dqtn!A|5; zlAKbe2dmt~Y^6BOggKMb_e1DvfeaOBNC^cM_Xu0~VO>M}5g+U)mb8VWQoYj`hy=13 z`$CL}Uxm67G!r1d?z-`cUkQ;#*Z4pmgX#gUQzB3m zp2pf^HWGK*x&R#=$gM)j2E>g#(2BGNx8f_we#;uiLn=P)L4JdZi3J2gJ- zj6^aMPJ}fvPh34qULL|8c>2fqkd-1(&A*Eph)a{h>`^~~wp*lhV%3%(H+6oi^M=j~ zIuo6)&J#P2=v>?Je#h$_Kj^r(yL)=q{e9j4toz}*``3}y{JIO*CDu7x z{;^KAZs)o+-S2h3*8NQPH@dIuKCe5{ZS9tKZ|iPf`{&l*uidxyiM4mPPOiOr?ZVo# z*BaLz-}>^}OF)e%=j)w6XuYH5-j?fI&Tomf*jnUZEbC}~r+KOQ$>w{SuW2qe zpW8gvENo|5(*ka5FdcJUy@dY^ndY_lb5QT7BisGU&?c2ovT_Af%B89vsG@r_Q^D!^~2T~Ju zD+Px)t#MB!Hum$6Pb30TS$0NcnO_L`W+R&|jrPU7*IZtZ1@!KjX^qMn zk;vP>%Jt*%=^~6P=unsoTCtch-NyCf87ulFV>njmH1h@7g5rqp@{eoGH0!dmDW}teQuB&g5^sKjYj;dX639WC~NuSllnZLwHZeZ)Wb z_IOgpOr#W+Xw0KhrV~9!bKTgZI2J}Gb4rginvjP?UjFd_oawm2n4i$;RUvbF#~^KA z)aC86Ik_aN57@2Ysl0ANYP*c<$F`7^2h+YnNK?#c15>Bo$@OC^IAc=dtU;!;cxHgC zdCFJ#$EOQARdG62&gsnYY036m_{UQ!D-#2(WJzjBPI%L{J^bULO3@y+FZv>-l+vM# zbT0Dk6B0)_R*+83sfv@1aLaStjM%)+g`(RU(#?%q=So|*@()`}4rwG5PAvF!v*UBh z1^#c2S)#~?$Q$#ryjLMfTj%)471Qp7Tx`kaB|5t=+Tz>PvPiXLI+Q9hA%{gA_qt~i zW=S_c@@fBEgh3?KyTBhe5{%M`B$k;uu=~=ls zVkoFYf8pEJnKCmzK8c*?z@j@}WJcJ7f-y$JSeR*f!KU;^M6Yq}iOTd0V_$HEW8>Le zYC^6~^6go_UglXajg@qcu}DRI)B}8bl2J&qDOE|FQ#pdBWdBusd&nOK+CF2l!i!SWpHgjx_Z!W6wAx?=~qc6B! zkxd7t)8T;`=v9i_(%MYw|_>-qg&1j(=Vo&`Rb@9=Rl$SES8}uK(fMr`$S;R5w2B*9VH} zf?e8r7uU^{eP&i14*TVfkj)rLs@~%tSEt6Lx{QCS?6PMUQ@+rtzu^S2Si#Jc4brST zY04S^t@jMyZi!l?)=EmE%9T_BxvGs{o-r6=MlQ=tgs@R!6=wWC?)j+RDv{c3lZBkS zglbCprnmWaaa_jC&j-c=TAfO4U|h%Z>p!wE=3-{j3$wCvN=Ur(zK6j56`(OOgfpB#I?GJGhuy*>pdKC=A`Bs zZDuNI(Ugnn-Y@a(-npVQ6_KhP;tQ#qzWG4d7UrLi=JOI)STUc-&Dz4#;jO%S5BYsb ziAyOrrjl^{EwN+%&OQHWmy7E@n9uq=VSOSw7MstPqT&x5k1ytfIloKlPsy`-Pt-jb z&TQZ}7jFMcGKoztW#-~uS7d7V4!-|{SR>PlZ41G`SUQwrG|%$=`_y@fPZ`&y^YdA2 zrsZ1xapz2&srWSMxtUqBD;jnz@$HrwAEOH{`X&@Q37ot{_e;wHc~YkI=lqH>#k|9+ z+Rm@epiDd|(fKNBU1&O?F*3^i-1C!Tb6$xe7|h3HHu(|*FI6wSQu$mp3tjP9>d~7LKEhGz{H$3T+$RmvW3#r3}%cs>Ju}`ilh`u1pS`$ zd@eer{1*RsJRci3XCx(uOJzx=Z7=iPhYSnSfI5-^`*W`1lWqJS|M=vB-aW2h6hTF- zAkWx#bB`}h7#1pwr4)w?T=a++1t;QktJD{Y)O`^9SD&nTe~gqmI_V65-ltxg=ET7O7bY7Kq)E9g%&8`{aac} z3n``8E`?C&@+kBrk4FoX(*JLCuT6X-mj@qTzs?zr=gyotbLK3+qm1_VI4voEWOJGu z$L;ADHOIyyNubpA2O{S0aoydz9wp;ZF*3O`(lh3eb`ZY1Mya&h(nDRtU2>&gazQKC z>>5p{qEaxzj;_9*jzstrDL0HOELJgoTUeEz);lLvs_t^WJ%D;0Q=X8`r5z55<4Oy^ zi!P6Agc-m}OihnQLXpAq_)T#+jSgv`XArtzz!B_MbiB!r<5b5b{aR&6q6lcl$77c5 z{I0mV{7&hBS28)}@bygV<;!_>+&Q6+F>ceCs>k2kl}N?4ymH{|?T-(3`m}oUNLs8P z*mODeH_@6G_al2&twOPu*G^x{uKz6!nX=5t@NDH%2os~dQ<8K_=JYv| z!(uUKvrN9a8%U}`(h(n!2*f{2HM6h2x*Mhm>x^>YF`rOQj#wlq)W+5s<+{EB8CkI+ z(^eyBCL7k;PXseaugK8o{uw#O;exvv*>I>+;*!L}eF3ezI~E`}AAwOp(2T6uBY?nu zd}_@Tzk*q!rDsNghdh^`Jm8Kb)c%nH$!H+fCm-!6a}}BP>cy?F;{Kxz_#k`Nv6fRZ zuxlu1RG0!6(;w{@s}fS@V87BZ(v2$xRi3Id?X|*Yvj3gx&HHZHSw~v`*?bY=`gg7) zk9c=KMc%E+w6tF9oB={1pCK&nN;&(KGS|ce&F8VX6_3xV*1Nc8;wf-#y!e6oYTw^D;SlC4y(( zeQWm_t4?r+OUv(C_AoqhurI+G-glp3!7?gf9G<~Q_9*_GfL35C_LbU8fzrI~_q#8v zjf}Wbc-(4@(<9>kQJIDO?DxAj)(Be3p%F8{oC?2s{N3HYHMBY|DncXVv;&pHHHa#s z)fw$!vhfep=~I+S>Kbdl+~{}fA7S)^w};kHq){0t$q_^KYM5G4Gms4T!1k$Qf|a}ggDHk-!+P`tO>+mwJ?9yNUd z_y<4-6KcO0QNI-qFr4z$BE8Amzj?q!o_~Ky8))+fyARYZwo}cUu-^WlxCv|CEB@cR zyZ80(E?+gZta?*fQ~A3iNpOJSIZ#3`OtbvRH;Y9aG)7pH;4KpRvm|-A}FA zjpRQ>nYtPQjqJZgypgQGedii>*)oWmmadsC5Eg-g=O@HzE z#4rL9c{_UaBK8N3833;uXD-AD1BDSf2i1764m-`$%H#kNrMVHNN;9?9i%I18rxsZK zC?vwKOX(=SnTx2)qcDo#oLI<%m6_tFhZp3hW(r|xmo5n4XgZoqPh;v zOnt48MvkmeY-Hd2ECV;vyQfpp=biydBku}NclqOSS+c{_H#p_*^J=;K<*uqsLydq0 z`+82o9;?cDfQde%##}gz-S9xSAua22Ogc0pTDw0rNaun8T|qP1e^p2OzRUJBv-g)l zqAx2c*|$D(WnEC;)df3_D(Z+hl6JWc!P@KbYhg2=ynfjknak@!(tc$G?=z{sKisX5 zDb(brXJp!I1kEUYv5>*}=vkS|))bCxLXVQk6h<_LP#PR%fVGidCNitZ#ci3IhGJdz zX>XQ(sYCbc?U}~aP7F)o?K)5hl*Y5bt>ZxG8osBI{Hi^(s=i1E1a7AJO!tnBnWYjo z?%bF;P&Xad_J*Y%qsiW*lMRGrKy0KV2R3EuYK1iRc==c1$d;dz@igJ10J{>7A+-kq zHYhZzgKSB7solDsu;*mz8;kZJyB^5mSiZhF{O{uG>NaQK!9pEqL%677lg~WAAk*7W0gtt48xS_% zuZoslT)C%gZN;X5nNDIjz8ejbw8ZmQ_gO631_B!VxIKg&(b1f(yAYnCRLJ z1(KUFKs0ee68f;mH#MwR^oPWK-Leq9_1dc!w~~>wLtNcD7N8%<^s~$WDw9_Zv6bC= ziDy#QueN(k;RttEkf-V(Qv@`!{sqn1e{v$Glt;2iSB{GXo^87e}8{UqVJW+$a*(U{5Le%UI7gX^Y5r5a6S|E?;5%x z#u?+nJ*XUs1baJU1Ib8YqKlRge5DJ_wz#!WJdgm^Wi`9Shyj`@C?Ds3Q+AG_~n?hD^i8phTRW?hGa;;~iv|27fB1&D7TjDTgHgT>yDl$G)VcJJCC1S(vh;*W+|Z ztg@J16=HhhF7C=@-1u$*iPT+$3bXU|6IZjhxv_?PF4U1iEhf>C%125cuJ~w$s%!_l zA^DZ33QtlB$j4q>FsV20j+FauJR%pP5_Bw%Vz-BA@Z#gSns=@nCo`#Kchr zuGi7mKj4g!zveN7pqcEceHL#%)HPvI*Tf*I>vF2SS_Uz82@h)a8NEU7!u#Qkkjz3F z*)yg(oBXH+{^<)Q|9T-=-@3bnd+nWlGtR!)s`U*^lM;6yu-KUqCPD%?(-|yoCVOmq zQL^Qtma={Sdwm_dy*UdI_;+_b$oo6IBd1^b~_As!H+F?xm~#!>tk=o+Xf zk7S$I`!j7#OHkQes^h?(zbBYMHKVABmU%?@J4!SG9-hK#SO7myeikgK55=ggNWOJX zA+5KZ+&P#*&TPVrn&ld~&uvPW6MEp*JH`(?Mq;LLemHgXQ7t_o3#NEq z4&Cpbi-C#oe0)g_tvQj|*J8R)he!2>LK^Yn+nl@e+p8D17Vh}@C*^R4dr~S(N-LJX zE>c$PD1V@OU6riTN^jKD3pXlo_V^n$V1N*iblT+sMrWTI9YTTE>%shjW^(xL2AG~c z`fwfl;q_2-TDoVvkYzkHf!dUs80|~-!a1iLL|SU$o7o@U4K1u*)L0^FtX{k9 zSk;#0zpMEpd;1{X|8yI6S3o0s6mAKrZ8}uPcJ0N~U@`!T z9d9y-`=clTt+Ecrl;T0LwV(X&*E1VyPij4MYyYKe^j6HF#XS>({wyjO90uf5X-Cpz zl*Ib_QiD!Esrx(BEs0dJC|gX>i@r}TVPAPPgA`)VOnBkON{sgP!?UFgBs^UqgVohv z7>!*0G(Jf{BZuq03YFu+^`!$Fl zN}z;o{5HMkic+c7_}}Ky+JoA zk}VyidVNNBI>P_#_qi6*Is}K8JK`ks9GFr-;;mm-JP+%ac&J;FmKZuaO~YN&@!AYWY8PV_Hi zmddXD<_j6X`QC@;1P|vckXZB5EcnwUq}hBR^NUcvkiC~e5H*7w_$c7TBwn`<>5!e= zRM{6{3@h4$h+EVDHVwb-C2*kE?L>AQbq?TP15jZcPPsRM1AfzIG?JT?wQOG}=_b-#dV>?8^N(k~#2gsn(9Uj;+pV=rfVsPVq;YU;?m8VFS1EA>_UX2oe` zM6>SqDps8Q!v!=&3rK|g!%@IbV6%%JUxLl3#d{t5$m3LQ`(`MFAZIhT`CU4bWGt;T zC8vk`gU|NfU=7K_4NC5xeL)2#8Ka*Tg4g!836PFHYk_tPbko_pbaqv?}eql3L zLg<`-WB?kIP^Lo@65tkhOU>aaBOYg1e5fOWX5!aBR4|I0M761S+U^|e^tc=YamP5y zDn0i{-1pwk!A=4aIeb-iEBn;vxMEJbRyhOUN!}$X9qLMkWZh~**ly_Qbn7CV&Tt-! zF$6RsI{V5(sPr1r^3UdrPw-3L{v=+iJ&ve*N;cYM4|Zq_Osub;y!s^OFKi}-`?m8b zYKaW?b*7=TS&?`%Fc8)0AXR^Wbrv*}BYSoiia!Yak7Y#sbf$UV(M+Ijl=0|ejLB(A zrAMr4XG%%NkK%6&o7qE;wBdfc^7oKNg3aXin5KP8r6-^iX$9T5M*vqdhJBaX=5=PI zRRmH1u0UB4TCo>Nwt%A|=lmga7BVb~P|2>YUw`?7Xzw5C&44Qrsk>sJ+KO=|0j+3B znA0IK-Dse&7o`G)ebhwse_HYo-u)*WLIHoM0W5}<7qqgXuU=;3p%fMGWxP$O&WVz{ zaawX0P#4H}jmK$eVvg^A_+F;2v1kukV(8!M0;}H7G&Duyu=IB#LyyAMT5#)zBtWE+ zkxSmsw4>Hq5h4=EJ9we<{QFCOZ}SJZ{)KGVPk#A95$@!r&g1``v90=cN$EA!XH`W- z->$s5;?))F%C4lL6L|YyaU9xu#4+i1Nr%%NPV?YYWZEGiUpbBy6g0y{c(Hi0Eg z8*2pw8wY#w&kwI}pw^(xsB1U_&_~{eV?>6cdnDvyoRa|E9UDNs&n(K62wK0e;A}iC zdv4vZecY~N5;B8j+Mw?X_Dkr-G{JM1t*H^v$YFoAz>Gsd31=o2^!ku?-0MYX-H=~l zwGD*EW5imKT}`?_%GA~fXk^#NXDiryKFVxI-7+TKKPHhe(hj||Cp~Rf(&qrOmIckg zK()1#o%#pM$nE0m>d4Lao_P`3(VTge?D-gys&67}8kgz~1CDTqW;~n>lAnK!QH0Ip z?LU5eDZBNPj8Sx3)?e2b4G$%y(%zWMF_MZ;Lb5XMM=w1mv6}CPC%Kr7I>;fyO6h6 zKlO@Icyf+GvRumMWHlkgT zUCIl1*NW_cI>EMbTMp;vVoqSO+jbEtV6-VKvu@N-gw97_20+iVB%E>-Acvw1FF=7| zp03Q+tS;UKe!7)k4)eFF3M+x~5ozSerD<}QMF-#xT?c^0y$rdeDhue=qEzzs-yTH3 zLe-KV-MkVXE##>n`Q=I+HDNP*d|wNcoyTjkwpH6p%9)G#w7vXecEiq) z5jDyr*{V8;xy!AT_6LTU-mnJQb8(WAU_fCr8Tl}`h5bO1gam?zkxeV?$D@usaaQ)SCab{= zTewDM#W{k+k|H1~L6PS-wPo7@w^57;QQh}%RfE0l*@o4QPCUia_@ccSOU##8QJs^8alin$ z%P7jR>N*fxW=cR1N%7r)d!&cznRBwWjYYd4Z?X5wU#Jb6A({|R1tjS>#8GV8>_Cw| zYJ&it3FQuGfJLc*^uufa|7~7UG_{_WrLaG=&I|{mDP*t+dHK9-+ev%}*q=%ICc7YO zU*#w%WkinZ_6h|2mH)QNUb&Oq@XE1E@Q|7XQX~J6>d+31bTB$&ASU+9($m2>Idn(1 zoWoJCzG8$;dnpjmG1vH3c^PANCe{g-1L0gde1WSlP@cLhXK zi)9u-ru;aTaGw7=%%NAIS$~hom4lAcHkj|*A}Fx8P-;dt~2JvVK1DYvzhZ% zYN_%>-e00WFxaMzKt)_q65M6T?rS#PH@)Bq6Yf-D5B*&y?;+1=I{fOc!$-wT1~&FuMKq0+@VTM6mH#hUa+hvbtItFeF7 z**n@9P7%Em8k?Y%Y#6IJYhU;4t?bjzEG_RbyAt!@2Ixx-s1!_a($O>Mnv^+{+}VD_ z2EGuGh{k>v-hQRmttMOl>zXpQ!H%(7ZL?Jvi-#JJ%7^{Zj5#hAc0On{G#`3kUVD)*IbK)r^qlpilOS0O@ceMNv)XPRwXxGYR+#h|iB zq1F$oNBaVy0Wv&>u@|=@uIeu*hT{HyEUOnaQ?N;HM|&hgno%jTC0**_sAWnQB+urt z3xZ~H{5=_0xr<$YL)M9Wh}n7!!TY59!~qvGjjRyESY$lxC3|knHjuNYAdY(%lZa$x zs*O!fWxe$F1Uw~w>-9OOdO}jCNozz(o~wsZlds=MSz&QA*>hKrE0I=q6K*`*n+*#~ z5jLqAt<0~RO2xyS)=+>hMI&)f;QAGi3RN@7`dF%oeQJUpklxu<3#&2J-!GdM8OFYW8mDPz4-&v1X7 z1aHo6tX|wo4jntAjeX{3dU;>#o&_={e}9hXbX_v3*kT{@b#-?r;$+VVCUN&wn1p~t z4rx3Rvi15@Ei1Y@JCDgFN|%(aFSS%WElOA33}kbE`7z2p{SZmLvn>nXsx!m~C#5}o zv8hSK0CWtaWFM8#H(r~quNBe&B^%$wm8f|CTFO9x5aV?Xr@dDZV%+^bUE;vFGp%B{ zVZ<3sS3n~hLhW$P?wV|7_hg`N)cJS~+ut?29@`%&oU(3ZS`h>$zCmT`h(^|M-B6nrlgRe#AKpa7vHU9bM|V?+ zgabvf>o_egL2HwS4TBz)OQ{y8`?*iqc73*fYa{kw|pONQ=tIiQdqzS;^7hJl^3|uat7?Tba(KG0hkgI)ESx4zO++;z(c2X+t5vOY zAm_yTEJWerW^(L_D{&B>U(5btZ`LHLb0^&Xq(ma=@A4SaU2ZeaHy05c0RfHJel_+5V15I; z{vWw25xM^x*eTQOnV1X*ZSROiWOC`Sd^FxU5t7A5xt;pkH?UIz5>V5X2>H7`*T_0< zr#gIR2hCBB*{vz1p>KF#h&*x!ba+84IdW}1y;aFt_N+VUCpg5m$!VEuIFt;iE%8aQ zf-+kpx$Q1|y?{oJfBg7H^2(XHHSC9XWiOpq-BH=&dsS;H&qDpHEz5gQ+2e5<(_(13 z&VG=Vui^^ajVde-ncSdDriYZH8X%9~2Z?jjJ=uop#T0r`%*W^r9>`t}jgNt~4=!v} zv4etViH3lO9b?E_k7b+4u>;wf#-cqCNa*@6WHxzkwhcu(icrbX3wQC=HOTr0vgKs!ec4Kcu-RiksKwhrKTW~AExLHjqSH^& zf!2`pec7tj#k-*To^##>f8PCB8eA9yY9aN9bkfR(Q!vp2Sr`>MT=!?&8j4ZbUF+UQ z(%k6};MXV_oj|SxMsT5aiA@IcCRAm_Ep$DQJ*%-O71cMA8`($F6)_R1e+Xk(qDDE& zbi|Mpg0MWG?jlCg>wx!(9*{Ohsz!e37vbkcdn32$bU<4@w6p^L-Ryx{!R^Lhd`G{# z#Kp(1|NB?3fwlB|u$DHJl<%j3cgtU>^ep?YimOCTl>7d58pJ!rlj5GmW4&^pTqYeJ zO(m6MuDXvW%4;^LHdtYhyw1PRd$v@hP+=vPQO)zUso z*wg7tirpGuL;e(|G|!uORtRXYRc(V^=A+E1?2~V1yQo2R7D!wCK!axc0OGT}qo&bO z|EQ%?MGq!&1r|3Gi2+x5AxO&pI5ntF_%vNUNe3ed_KBt82~-UG;S*4>h0SFDqhT|< zg{6|-BkKujBw?Q=o$yK0Mil4T|0I4QZ02CY&wMJo02}V)fJ(nxc`dEbSK{PM3zq^E4D{BzmbS|N?E!oBVJ?ByqKdx0Z<_k0nK zU`1o+!0`IS|AV2FR{gOsG~&me07R$U;)Z3H$4%`gF_PqlnJ`=X;|ddSN?(Na6gjwQtIjJ2G%G|CEX6P!&>9dN zFFx~Pwwk8t7U@Fmn_uqZDy%}wOWDdM26(6rL}oke@TpNDimFf!Uzl9-QntOZC=uAK zKz}Wiaee-!C1qFhFYxgKR_9JY zOI1uXS$U}Z(~8%q>b^}xE<2K4S?i4$T|Kd2XCmC|AD)!?>C~IZ*N(vTDj<=!@2G*1 z@jL0|1Od0J*$4E?h9)-d&X+PpK~CZcethM6JDxIJhJ#zw~n$t_j6M)Ixq@f`vhthU2gh@Y)m z$NuYmXgaNmS)`-$$ygn}A(xFwbnBGkDqG4U8zcjNg)k8|FTm+Fu}DX#MoPthXK6~s zEKm-30jQN(CwnE5h-yq}vrb!jWmIr9lIP|yBLNMS%m0aD;}lkJ!*3zdTjaA0?gcJA zOkoZUy3HN2$bi|eOrV%WVT0~^1H%YNC_k!fW1qb_d!~q#y_r3oFB$_e2Q_TjcPn?1 z+IupFmVH+m5sd->n;7swcJDTp79Wqk?2RsRv^4@T|7{TR%|Y zIDhkR1)*k^Sr}i;44*Z0HB>^QnD(d{172u4OQDvYP^SsCT8i{Nv0}{MmptBg{T;_! zz*X}c7yNh$j$>|?*HE<(zvzN=14g{V3?<5p+RS!TbfKL4gHIuXi*+Hj zfgN9-eP39V=FhUHuJ%rufk;4|*vK78VQEm~)L1y4jqPf+3;=##Xle!A*OPifswR=w z`q`4}vF@K(4*^f}{JvhLkV=&&rd$g86?mTyXMF5mu%7NNDGgM-S*;iCMo8cH%j7Fg zrSfhF>Vtz|KJo|19JoYik~gRO4TKz>T4vmwPQ`ni z{gal0ssm^fv21aD4?#b2`0_V+=h0j5P&1ExmS)8B&ZCeiI4Si6<6*la9PV|XU}06R zy(Yc5nbggequ|)JfC4F7nZqOBI!p85Ig0}m?bb+S4n?Ovu8n&7hWZQquwI4O9?6OE zXM%o2)TTz&NcH#{R(xs>7Kq;23o#~dq>YYSR8qTTC~A$24fae2xoiHBx8XwW6VQn0 z_SZFR-S6=nZkEkb*a9x&&0^NLQYJ|(f=aepi-r@?Q`NbK>ctc?GO&Cj`&@O7y4c;b zU!>)m&8R~y@x>L+L3=zf5D1X}{WD(Vi<|eU|9c}>ygu|_SwuxmI2?$d^T|?E7RRK= ztca19-@`r&no*D9iZ(#ct|h~|tB@Qve9aMJet*F>5ffEjU;b`cUG+Ito{GmxFA>F9 zJOv!oUf8u@>FEo0M6Eqcx45el=w9wH*|Qlc{FCc)t5z-|5z$bfecu&_*0N2_Ib^@| z&eH5>&OAIgppQ$(A~CHpJf_qJQHz<5abrua9+tinNyPu{C_HALy}X>OD0n*0I}8!9ds?{lexX+`vb5h8VBZJt9x)Q7Mov?BgOV#$po8RDC@1#_DA` ztEiTVj!9$ER9vnwX_U;kk7(Y6fgxL(Yd|jTB2vLk^2&$e<>ct`8=Kg_lwuNVOE|Ek zp^}OxOSe{CQGLE>sI0y+U;anVx<%r3xvE-^WW>}xq8sWOmufvjgLtKGh6Mj+T@JZZ zi%I0|%Lg}+WBadfB->8;hKc-W#Z7Qq$UdqiKl#Wyk`o19qiSHtIy|K8 z)mu|Nda_@XYasVxHEV>FBbqYaz*}}66;hU2nhDOy&e18q7|4u>t-)LIN5Qse4ZJ zTNu{n;ES@(evy4`A5sr?N|NJ)YD3SM4&fyQ#pIQ9FqVLX;>fpuk%ipEGUw8XnP+Ko zIG^jDQp9bNVGk1+_NgsBE`DMijTmfjG40mF?;tgwW|)7g5eo&z?O9-4&2Td0Qrje5 zp16H_hb|P~oK3G5_`=3L_Ze&JZM(xwcBECLU2*yz9P>MwoHX9_i(Giu) zTKL*}^3(<@Hv}|tsOn*arAyx{W7nRM+d}79v*a4(V(3y1cP zI!G}AiPXKeufP;*Se>3;d)8Uo!Y47K4*38R?Ct7ThP{AD;kk74MtqWhMl^q4UMT;) zmc4N!cYPv7ia#?Z{e)pi%EWv_Vb7#-Ffzz3jkgWs2x#Q(ht6+fztxtzLe%1)MS=&P zh1ePM_m0b~GNklQrj_w=qPFDPYfoz3@TUo+1X}35axF7U6V^GOVG1zy%Amc=Y#jhv z=@@rvQ|IGuT0|j_WNtty_49LCQJpF7L!mhDP`Jn6F{N|jWp||wtd|gj^#nBfvYWT9 zYMGp`9yQ8fSq$NYt(PHo9Xh+2++)J)W!MH~9YfTvF46_%{0iraJ^J2%K-1O8a;s6s zkp@1&=Z|b7K-{Oi36w{o2vB}SZVk!Eaw`!MQLGEQCwtA;MAUv-Mz$z&ry?QDhQf+^ znbm+IRc_c&0euWxD$wH;IaHb~MkTj&jm=j}K2McHwPYLMxKRHDg{UZGPQhjz)kuj; zm20anLL?(S)-`;^W;&BIM-Hw=o#X&KO!Za(;`j`RNOz#R71qlag~i5=AX&qOm`_nE zo-)@j*ikRe)vdQ-~mu&rbm7hF*Y0kE4c}ex@%b%%ISN2tmEIV3GM7WZUmcHMD z*X?$Sg;F@`_8y;YB;GGh#s`u{A47J%kNfysXRdMOA_8(!G60}z+0e}1IIu z?IihOc{6*rCT9?}xMr_h2uo7CJDIVbX_YTHsx?e@MYt2<-i8w*AaQY(k8jHX?&jKU zvsYA{hswy-HltRd)ENwu14%_$Tl#>!5BPa38Ew7Ns9 zp7Knhx>ml63Iahh*?&iO7h7S>K?UyUQ;*mrj?sX_lT0Y3Lm`qh<=`|EG;=1=|1ses zo3EJlVulli85-l(!H}PsPKc8xr#nVmJ-N2(#f{|fH}1Evvpu*H_*-X3Np+-ZUFBa+ zafo)Tc&02~S};0=L}Z6QS6#hmi}}5O*k5$-`9dbU1G&rKHNd})5O9_7*iF#t>A{!} zt`+iD2!g3Pn5%6p+J%U&3Nd8oYx#9#M=-ZkxaRA@9CGRoqHYhLQ>X4TO~fS1m{qLp zFn3L;{M_HUdw_25Vj4NT=V}Qb!ZRGod75yT!)DY`H|sjXW*xN-qRx7{lk9&HY<@hH zt6yEb2Uhav|IGlo;q>_&T1z^P3|9-#wScq*d;`Rp$IZy+r*~4jQl(O;POuU9 ziuR^)_5Y`}U9s<$TzOp#)lC4CWvske6s!1t*~W5Gch<;LM0~XLP8x{yMN)f0>@g)6 zdBU36PAG%f{VQ7WihrNV1QH5`#`AlpI#MW2%r- zP5iH7g)Mz}X$VNfzY$p|g%ra>eN-x1XG050i^@MFRY-k-F`F^rvqwAw93Sl5o2#o8 z(ul@@MAKJZI<|&=YcEdk+AuT*?zyh?b}I+t(^KxjxOFTF4Qd%nuz!ATurTzMyq0PWuLq|$GLxKjywk_ zlXQyRDw!cTDjyEoloCad+;lSrdC!xpsS(h~2KV-Y52%?ncykEnMPOg$&!9j$W2Hu7$U=f~u*27rCoM>;<3i=gTi9Pzt z8M{T~$?I|`^VE0nEDXwd#RUw*^HOFfwogDR@DiUDedRSdnx21fp}rlEW1uVf;ueQ( z8s|Uajrx!MH&%;oAEi}oOI{~-0{DU+~51@nM_mXH4I-}|)kqVrD7inMYi}${B%;#iP2{{AmK3nNZ@`_?bFdxz#tBCOYlH1o zH$o{9G#5CYw|Sm+Gp-vbk4WH*TanX+%aLX^A=Usl0M1N%Lop)R_2i@fr_V0P!d3T| zi0-d$tBSAKSov7RC#BbvIcY@dEzo6LvyqDPczh0hKa&Ury8==}xHHiQ)6vrqgRkt# z)va7aA-ft^@X|~Cbx1Ef!G{;5mkk$a_H`C^6o3v;zr(2X45w-M!u z_TSOWN`J_ikZ3+LH>BJ*IBjQA_O#9(uub*wob}+XxyI_n6bgC3JNi$(4HIit&JIDW z8VX@$lc{N!$up_#bj1_0aVr(8^Uuxc{ z86i9~IH!CG z1k(UZg$@TC>Y`LyeDs8gRcyFmUWk6(^K3;o_-)#-B7Fx zIsDw^^B(;>H`J2z9?WT$h#dPnr2Rscq zuq37nX{@?9;S@>uegRpgcJ-&(#59bQV_vX1;x?5wCN-CH_U>Mgyfv~}6PXzi^} zM5Oj#yUTVs;4O^e5_RB0ML|Q08--nUmdI%rw3c474A(2N&uA<`jPW6!!0hNmy1!S_ zU|pa(P@WRI1J+BS77dWnZ0Y8Ac&ZG)6N3xlU@D}Gcu_J@GkwZ!JQd~>OKgY5fFg}< za|$px04)#3nlE1uI{`R!B>g%xOv9->70yUAqQtzY+wR-}GDS@{%2z%#PX^!(FzrxGJE{=_VFb69 zC0x!^Y0+Ci*C6S`>aa(B2|bF_>!sy0+;33@5&61a2NGp;J`~~xfG+~l%J$7uPkyfK zFv{xh=E?90YmoG7kD`<<9ux&sh4i{>cq$T=0Rw}KLK>Qf_&QjfV$xa(Pen!!at#qO z=+hyE26zcR9K4e30u=>vkxB?VlWp3fquDCq_^PWx-GM#E{sQU;ctjEGJz_-=dPNd)$5V^oZq@p)oc?m~_6B@q* ze;_jwJdcxPPRFAwc@8i^QKOPf53qQ!A96Z(;L#{+)$%`%LwZQf0H#Ma75+pgpbETG ztvu_Qph^K42z-x>NHGwZ!aiMyY5fcT+bGr$E9R8re_;r;VUQW34~q zsbMe{B!ebZ-~=}fUkZj-e9lpg5Q?3U{;?@vG>EXwV4TK+R$n|%-GRd*^`T@lP@p78 z&Bp?n;-{9)lWANAHC;ZZSC?>pOr05JM?zGiuu#Q)}Pm$@qZ@=NCp|B%fMwjw#ys zs`KWlXrZyPG{6kHEe2=2vSl~&R4Fhq8K6d{ERF!K0xY@1D{HNsr&@JXRre*pWBAw| z8l>RIBBR&ym4Uuw}?WN`E~$!3~T_{l{mQ5JXQBio{U|@ zeO0(VoJ=9(nQ_IduHvcK9vGc;fKHEw5W$D(8z5|a;Ztwn zsknYHtpr3GA^>+-+*AkD$d>a*LJvDR0O6qQU?EdJ9lQ&;9Yy?ws~01X2GRj*f|`wp zZl>rv@>U%`H0}l;VzIHN2FO*Kk(drAT6l>G;SDE^IqHRo#s)gP5McTp^490LA9vtf zYaked2?$1fF>ZWZGA;ax=qQvtF9h7cx`lG`(>J9)<09qB?43B{YxMWy1i4X7-l~w$Yk@k+S1mGU7 zRB$x(0G%z>$bXXtyn!;r0I;Cp^3=#kk>6IBxZi5h2(m=pDlTlW9p1(i@l4#5=Bbbf z`W@3)2(Vs2f-Ydi7_<6Go{ZrDkp}xHvQaT>L|nP`Q>&x%R0tfXCvZfeh5)@0=|{A@ z#Z$q0PzM=`>k9lbhKg-(y6mSs75YX1yb%Lm?6A`~a}*!wh}3H4$z}t-BO1WPse#zU ziN(^Df1RgFfQCfxa0-%wix==6j?mP)Lj@{jL=1~V3LPLI0ZbufQh8GgPmNpLa1`P1 z;W)x(3Ti! zc`B|hT;mqp2GE#*UF41Gw`qa9*go<`u7*Yc1UYCDY);9tVI#2X%=` zJ*qT9ZD{y*3nE%5)e;5YqXm(666$9I5M#Wa8yTV!reAtnc@sV$G~!%ABrJP{r&8qr zX#_~i#S%jQfJSPZs=JA&;%e9d5EzG9YDw52<|*rYQ|14fC*veS&^aNKag1>vW1Hoz zKjx``<-;24sFneShU$!qK2g~`Po*ss(-_ME!#AxGZf2HqA^>VKt_SF~!H9K-4(kaS zVo9524OkDl9MGZ>1WXSC6@}n2=v7{M^PlFa_(H%XV`}sirp>tQ&8dc;^HeB1<`gb> z>?0(uTaU6CHu1_o&Qk%jD8-EhX|Klxsh{2f)t6~4=gHu$I8|IA>M8Uk{)E95Yq)fQ zibcex)19K0CMZ9U)boEB*8-$0bTM!rHU*D1u)Qe8{gx&$n<2Y!H>Kfl&;{dGw=248 zhSNWQDFMY6Nj*xeGQDg+|Jzs(K&*j2X@W`v-h##ewLY?vyUHoMLoKu- zg&Vs^xd6p#ovBqCE_7ylN#!*ahpNvLZ7-`R|6QrP%EO`7AoF(|CJZic%Aa-^rkG*n zn9=S{_L@5wYVSdy_~K?FI`@<>N_jQ0e|!{<^0gGbii>SYGD=jBM445!Mj!7t5zXB& z&g5Q#ab__E&VD)$AAPlk{oo~PEV9i4g^Hg~T5YrrGpB6ld3sPX=t_=8($fZQ!H(NNw*3;;6#m~b9eR|g3&PIx~M&jY-XvMW-*P6>nhY4yNQK) zu1+c$3CSexNtC1P@12G@RqK)w}tgTMI&Ntv(pP}q8k}hY9$VX zdcdV(5@X&7Ir38&2-z3mClS!d@$DaTdAW^0#}>iAF@|BdXeRrFPpV`ln3Th19}7lO z{oJQ`AIEeAG@|*_BZW-wb?grw{~{!2w4_=h8ZFgVu$4EK|Dmj*YC8>y@fAYP(hGlQ zJZkMuGehA~wX=6ZX>u#L>DIphtC*06n8jejZx@VF84dF4Op^7PIE zG>PZ#_~_X11f%Wqdpm~uyL!jN+=T8pjDdtSawyt{5Bu5m>)6i@V=r6HbAWx~**h}M zct)9l-cEB|VYfR|Jd3V-9bYD(k;5-t)5dOpJ?BFykJ%K~h6@>*l*kz$s$ZzoBZ-th zO#KE8Ol6s) zpf21#POGM+N@|&wa1vHX%tMha>^( zTq(xmc653`J>g|~f_=VpK&#PqM7i+}96_X$fJXL|B8+ana7Ghb`YTMn*)m6wYq-g! zQ|ZLCG!jksI`x+ENwOVgX>!XOFwF@me%sgE$S=>#HIonD$o-=*xB548tu3}WAoTED z!VHJ(2FAfiQ;ctK-))H) zRb7@Tp5?Z`iQxn!vg`a6K%i@b@9^-OxzD*Bcq@luVb(d(!VXBI+Ju*pg!Iyh(TJf7 z<(OX00dDX$2sHtT?D=rZCbId?d;=jLJCY$fOen0v7Z*uEf%yShO znUmSwW0So}Mmq|1UTo|bOOZ$4%WbR?w37YD%shO3+h6!ecD3Et6^)Oo({S9~PaU>z=W41K(}-ln zP8uHi(`NRGw_(C>_09oNgb&B@GGi04zb5+KhLGDjB8iia{)RXcVKdn?u;~&u^ml|C zxBBM3z%vm~>3Us^(xumWyS1j_K_yvVmTx4zA3|0NX$4Rda?7E6mb2ggFozTz_Z(0< zc(8+br)tP29Tz8@s3?~VxZ_0oIb0&bW}umFxrBY zCZsWW$RQ&w??9Chw37V~7<<^e-^ulf>L%44P8VYw!K+=V>K;qP$+AD-4+@(B$xC|J z>;6E05|+wCgA#-`OC}7#VNW7V{`^P$MA%G=3iPniKj9~}V@YpvQl=f#xw}I^f#@K= z_;YUK$*o5=y)ogs!PfEjv*0`|>@@X&i$L_(unkYs9;Yg?khy z|G6xG^43v=w?059{`$rMd3bpq*hh|oNTK2#*}_fYHgNCGd|i!z#6I#!8}KMy%koz8 z+46i9B75|BtiiuZ(P*KjLgR%_49^HypbbGiMW{q%5^dx{*}h$tUn-RC^Rhe*>Om$0 zAJo%jn!=4NRWqLPX-3^UtR|0?=i6%p&BWhmXyYBM`zrFtD1>d6#`ECGEQKKzj|yrM z=qOCEku;x@r=dqhx{#y!zJCjnJzALu6dP1)F5xif&Nwx{R8Uj;)ck=uA?L@*c~$u$2SW60Pl(<6dfp)-r&Z@YO$HaO4(P9u$PmP)f5c~w1(k7fcvT+3iXTBs5z;tx%o{$U!G@l>H5h{nXPM|4?XXF8mJVN! zetOu^Tlflu_;1GH5YPYx@kAk6MtJi&zHCpgv zZ>CE_v1z!a5ga|7$b#Iz`ZG*OKr0+eF3<6IpM4Q#(_OOc03=*>xACnEo zP#Mlro3E-9Fbc;%jbvvnR$f3WFcB+0Gl`HI_o}?5)qW5OW4tq3xYLDoJL@C{;6>!o zLthJ!2O9F1HAN}B8Z~l5cu=1LZ09g^g~{n8-*hIUIuZZgT&yqIqcSydDbrh}_g0ew zjY}T(PaARA1>D4Q+Ipp0DUqL$zNi)SD{vhz@orlKiAOysmZ%AK5riqjG)NsNs0zR{ z?%K6^gm4$_0^hgc-{xC><-&aBhD+!D&NQ79mLo(*qEIFbPVjI{Q)d)CWC$Kw2gzEr z3)#MRx*IhSmlXY}W~_#Qqj_#$F9GzZ;)H-ft)O3l^VwUTe29oh>uFT}Q_RsKuF%3P z+azMSQh9>=zG!ctL|uO=*&6s}@0SWkUrG6EB46nRRkq5B>a!~DEu-mXT0A9ebL(&b zIg^JrJ!Df$dm~zDqGO~lr4Ev_+aT42%`_eFY_k0Y(uAynJn9!VFDRInxL+2Px>byA zYREcZjYx^-OpG9GCWm*eYTx(#SDV#6RYhFhN%!hT?PQeG%YFtWJ z67G4I9k8(obH# z1MKg%KuQT{C}W; z>uZHHuH?^lCU2oJh28T99*$f1TVW=K>)!{vF7-vzXc%s!3+4G$0I?|Ag~ObDNWSEe zFH_|AA=cQm5NjOw7~LW9gnh)I@%T(0Kle9&uE^Kd2uOhEZv_DDw^VuWYU<*Ile~c2 z4eL5exWv3nC)xTaUT$Zo^Yx8IJA7$bBFH_!Z@Q`L-w8uB%+64%;Jkp!r;c!=cS&Dm*Axn6U$HAl1GdU^1Cez%-b{| zAsv{4!V9~+SzO?mb_hE;b3zbZ@!mwVvG&V@t*I)wDpOMVZBb@LNyV>AU1jG2T`ol} zC&PG^bAK$%Yl5Qyf`Td*_Z6o^=Z5{<; zH!RG-J>XU&Q`xVI_B-{ABH|}6c3}>JW|B;r&LtQ8*ENmorA8`qrE`c{o(G|vu=+Zr zlgZ&o-(W zC;CQRBUvum0zj&Zuv)|ZNR>VN$zNAC+<<-+!xSGN_9{+AQ6XT+Fo7KsEnz|j(Z?_SKN-{ zBA^jlop%cxyd4h=m@a^tG!I5yTq;&XibzF*;&xlvSR`)}omPFVYwm)DY@)!h)hrJW z#E|&y?wuG7bMx@rov*82Od^u{u!O9CDp8Bb`8AH^j4kOl2{N z*d|c9hZZv?r}gJ~l)y^^`Sq|lu9_KoG~>w-Yo%4X-YsNM+OEt z%QJaDkpCBl6IeTtU*F=IJ7;071k#%q?03gc7VN;8+;Qm>iM&y?33p;8{=+}ln&-rr z-AIA`#0cMr%LW6gK2(wz!!bcOmz+_W4_vlivTjx{2II<~i<(Z%~d~ z`A|tk$z>&{JX_Vc@=(Rba%Q<^nYrXLYHrh>b?wkWl)T%0<=XR*_XpP~yv}fH<61#H zIaPWgL&fCK@%)-I6=LQKjxXMoJ+y2N;6CdgxUrl(aBu!psOoTK!n;bNRN!TW`V9X* z9KVGT&ybxUtBd!friA&R(DU!dsCVCoQK68-e@&gE@Q~9`8;lNDb($Q$4@QaNR3s?Y z%-4&{-=D8*DwNiskx&R%&_THeLKI;9r|1}K$cy*qs~d{-KyE|Ve4Zo1XMs8AK!~8j z2@t*5l!b96;KxP?gi}I>4&l~(_JMpgik1}X0%a-4!!2!oa7n%4`Uhbp>O0u8pymk9 zJtq^|iiraSQZP2}5|PLO*s`JzW8L5uMce@5s1W~$n;u@z7{XWd(}m;Qu97Mx;uC~g z@!m)rIQ*r+)n}_!gOT{a82GuY#J_6e5T@q6)k1vQX+bR*3teR1WnHz?0vl0?v!^+`Xt?MUC?2iOr=b5x*P2^f@UO{ z-MpIYJa}at1$bOb-Z?ZcCYC>nL(R+q#EHLC22I+4!LI6zz~$+24EJ-|TI$*Ssu}@_ zj6A*q@W#*PQH2&-0)=1V1ea1j>IzCFV&B;GXlO(UH_ljfJ?VqyR(lfZ?Ur+Z7xA5M zt|gB@IzOl1JOf*Q?(cJkI>%8z5(+QSb@t$P5YWhewWy8#*Pi?u zsLvEF_2OIcfjx6Dv+^qzH@aPN#v$pCC(WZ{@i>fCdbY>SWm=f z|EP()f9w1VSMDtgDy8p^g7_L4>oP`1M}lL6Rie87 z$)Si;>WL0%Bg2Ymy-ZGWcR?i)HX~)@>dh2bqK*}>eW8-KQB~fZ=iL>e(voUvmANuh zv8VjOTa2h%!Q$8^hGLPEj12WS05=`F0X3oz4>Ps++){Sd>C#R(2 z!xIzZE)*BGDT(Tr_)1|j(R_%qzCZkBUXKIQKL-FC{!eNxkywXBV)FH+B4gGm_)Y5{ z$M1#B$lZkrf8XQK*;?##7h`L#E^KtCHepJ{6aC|%(Qc{BtSku8R;B8M3qvdDLqUAE zun86~M11^33p45Ri6bs%YS=X(RS#%JqB8QzlbDIHnSOj1Ykmq(UHlwIbpAtpUA@wX z#MV2|9qZ}#ie)kK*bne?VKYq&HnWN!=Ix?dzdY%gW=7)(EcB)a)PC}fr}G$9@g>1&#CpBv}|S zM8FKQA@VRtw$Bze8PgLi1OzDaGGG~NzX z;GuQ_Mi&vK2;@a{c%m?7n_Q++Di(p673ocOMt=x=pw~CA`O;O|`J4QTeaG_UtGeOq zD1WS~d-+V||EKKBrAW%$duL@UlgX@^J(xxo&eQ`nh``)>e&|K1w{`iBo z&$;v5bI*CsbDr~@=lMR9O)a9)_9N`hCtMN$2hQoRrY^7DGL+200KELOac?0sF13b( zob}dEZg>ZqgP@IMTi&h##`G_ps6IzB?)?MgdjJug4 zPyBMKhxIOk(m3`$eoZ52FX_lO9S)*gth_dX~oMVO_n;r?1 z>L0Nh=DvAHPmiFD9JulB`X!9)TeyUI&l? zZFPBtQ;+@qchT>9Zk(o}K|?xUyhE`AMjmqGu7Q<<`Uvby9V-H`qq%s8~$B!xsbuJ(5+JM#-p6M5NSjZc{s@>N*5w?s1GAqZ!VZDRV#?$>ZR0PMsS9)W&AT-`mdopsUw`L#P9>WxZm<_WPZV$jIr#t^JH%y&Qe z%Ku>81Wl~(h7(^Ek&pZaDzAj}5+p!C4I!my7-5@$2ta9P{>Phsdq-dYicgRura1L4 zFD;?+P|O(j6bSuBf=CjP*j#=wZh}()&c63|cMPmwxs{yshH58}&1C2A&+51<{vNtc zAcK(4i~fLxA|Tg9bMbECkI-re*+ujz?uZfNia=RhGa=L+ZbnYJ2iC3BO5SMQ$NbAr zUeaFx^B8Qpr2R;jvH7p9U+A0^?dKeH5t!ccIU8p=))ZL8JWa(I+e}IvHob)W^Q~LAk~jV)`UubUD}M!7@0?{xFZs=49M`2*XJpJdJgJH+$aTHt z_2lHf6NYA#W?O8lry9{MtqjN5HYIG72DC$h{)HpKO)pSbsw5wj?0gExJ{UiQm-$~EYP zIUIiLcM(pf)i%LslhSl)Y_yci1W0vzc>`JfH>gQL8xehM5yCt9H@H~fqcJS`Xaq}@ zU&T8Z1^jwv4v*k5_QczFd~nh7yRxB?)Gfa&Vfo$K{73FQZ~>>tqDzWQFuwdW4D<-d zwP9bh+}4zBFdu<7QICHSj<1}2X-)aP!_JD1zXhP}2iKLo&;^UhjSd7gJCXF2fNu-+ z18O6_tH0a}g|N~id;x*OPge)Y-TmdW1#Z02Uw)`hIA!(e{POx0rjzwOb~mR9HzzGXL1wFg>%iNf*D z_Ahikkj*rT*0JIp?GAt<80R?TH9iE`sdwp2DycVXO3G~$A>th<@9Gf{*&_pGg^1TO zzaNA~^v(f1uC5XklXf3Nt8)&cStFg5Ffx)6m)Dagcb0p51a0K_)4+wvgpO@t`_C=o zeo{7PM@M)aXq!!$+>^yvIF!gbbxeIzeeJ?>U-$ARa^lUk0}lh`uihimMP<&7F%E6Y zhsr9viQ=RruGQHzBf11Vg1CwDT5`#*^12>D6Up9Y-i52HO zvVentit2{#7m_DFeA5Q@8nS3SBM$wMk}s*OpO`<0_idL^QI;k#)hH zy^utK^j$8Q&6pxzmy|c2N1wSDt^6nv=~k_0pZ#%pzlhu~DX-cvZYX)V6c8>U&t*U| z50~$R&<`*i>|e2wJr>@ALp8j|ZRb9mU2=8n5Z4h$e20rmvE_=5Xt?~eIQgQi%t73( z&`mKm99NFayj9VRL=wanv4mmRl|BPvMVXD=zE%HoPopm6V}N6F4h&#JVG zmqKd^ruU`Ra}w%e;rq6Q6{>}2c+8BCPVwvt-tU55NGaP3u(8`U5z!zA1n<) zYCK3W>2x9#nMsc&A|$BBmMJ8Ylb!ktj*i~Ej(tU4#wFx6ON$n%Yw9dBEX^7cW8<+= zg@oLxDi8Du$*>qTfHi&k;5xQx7^@Z+OP(c7Bu=x&2zx;tLqNRD)B2~0q4kU(dmhY;a}h^rbAalEiP{&C;xE4yU9aq z+23AWwu|~E(o#1=YsX6QqP?i_WB(t$wmjIqoQyN~D>z-(@1@tWPhX2(aESppjn%uM zcSYR*NHC9NqEgpXG9n|7crlzpGM8v_DZA+^?kfy)UVKHUX5hM0Y9{HHYP3u#=0pKc z(xJmR2&g2R3nk+jYLU!tUS=YoJ#sS0Og93 zg6r5Hj&TxanFH8ceV(G?fX>F445^^nZ4FOEW8^M7K0`ppSUGBC={B&f4vvLwjss}p zBLGTzRV>2{>)g($pAxHZ@V+jD&)6KpX9(JOcLva4H?X-FHyoBZ|58_6)2=B8lNk;N zvy9)LONB{`i<`FPWJGV>GjR0!Pp@aET^tAN91!Q~Q{o!;p;~&OIO_=LCn&pDLKr8O zppcBP%Y7Ff{X}jp`$;E19so(JkB3cewQ|@&!D%Yt)s5+8$c1LZiF?ZoXdiXx+VZ)k+308+oQBQ8#DUM5{g__ z#Cly$#!X2IX%4sF&`j38w}4Jgmf@wlbS{Hl>1w?S(lY(9WLm9`jpgi=OdKQsTY^*x$Oz^8 z#Q$a zWW&(;Dl(BO^G?L0_f(q6`_kpDh;EDFV|k%9sYi?fMc$_s`;zf7H7;F3U@V}LomXAD zo4j$+?d#Ydg<#b{SI5ye-fFa~#o{6}W}9|otf53`I>xQu!S3Z`^6Ek#r({S!dpf`= zIrCfsec>fYY4`wcne#kdT zfw*d$GHX4I%9zPJ#)G43gwI58ED!d*hs-{3BLuZksU*MHUp{}Gt)Z*fa%-C!WqD6G z*qXlC`L)JX++kF<9bS+;xbs%_?6loGB?&sSMTrrWMDWai2Qa8+j1&Vxta&q-lMOJ>XPxr zJ0KaC&K1xvUcv%aWqL|tR4Z(f{B+RcijYrN&@Ta*sD8bBkUaa&STpIUmg_#6-G?Cf zm&{G0M?5duQJ6I-(z40qw8yUwhsaHNuo6(o$(;Ivhku?g^F2CRM28e}Gw2Y%dW?FD zYKroWlxS}xE}KvU$+vRgA|Ru>$NV6fm?`&?w-$C@Nv3A&QcBc$FuY`rOO@q4M_$P>YT$P1$ackUvNsp zDuu=wB&Y6xRuhupFls*k;p=X>w?68r3P#F2H?<_O#`I_@Xrm3Tpt}&W`y<>)A?iN^ ziCx|VoZ|@`ZZ;g=!u~T;M$j5P$0ZX>YZ4m)B>OBAFKEUCvf*M(A0%sM$^(7xA+!3K zy2O@q&bGa6 z7qs=Z{;lRqdQy58z~wd>nmPjubWb)d1aD<=9xm%VGhvhhUs_ZoeTk9O_s z>S)^0eebGMtA4iXgy?sx9$j^3yQ_Wgs_Rz;SD9AHR-Ln|t@BUazv%o)=hr(Q={(%y z=`3_!*Lb8;FPiBTcW&wwb^Na5haFFK-_mI4c&O+0o@~b*9n4v)L3k}x@Dy0B7Muc=C_-F)%>5$Pd4A*d~0*6+1Y$~^FZ_JroS}( zSGTk2`KHe{k*57kktVC?>Lx|ci#=cN+1<0I`|sVCx8K%1*xj@Gt=0eC^BYlx*iZa) zeIx(pmi_L`IE7d-X9Cd$V@#w-n^uX|H(lJQcDrWA9l?CTnx7K89P0S!8lD_eh)0yZ ziO6J8=@`>cqj&OTcSaVT)u5b8$>`9E73#+}G*MvUmQOgC*?h_1nktMbBg)Yid3r*f zl~ZbiaeqYTnJ#G^0pl>=5Ths+lNk*rCbS_F?F$)7JpYI+R6uF4S#uz#bWcPK{ruzM zytqVpXM*YCEM<%)Li)RSde&?lrBb7Q#kg-uoGH=zHFfqrcR*s9oOR~B$yu{lvS0TC z-{AJxth9D2L5-Lu6UOP#fQ_eTtiv)YTr{QQxs+U%@=e@cXB2aWnPJ1|n0QhlEsRo{ zKh^10y;@=}h^Gps_^44Y8TmrJ|1+8NXjPEZHJl0?r;=HtP2-mBAKcO3Gz8HLDJVK^H+l?ak5@9* zSD(+2eA>u_%r;+2JE@(aBkQ|)Ho<9B{u-XJ=CrbeBh5rx->TCy1t$}p3YId(Y{te! zcK)GGA7hHlcqr{pmS$7&u+;uDo*vjAa^@uQOhTs4sE|exY5#G(VZxZE?b?V~ZL@g1 z`Uvwqemnz4i()LA&!%US=EzuR%+L2epi?EhqY8Jvq?4Otl3@K|bznM4jccYEo62AE zZF{uNTj^9&HiJzj&PMiIMohAyZ}ZRlr*)<9m;qVjHaU{PTQBWzx>%%k`==&UqjcIe zB{9h3iqLwVi+?gROcxW9c*GkSR%Dd#`(2%h$s93zoZ<0VMJ5~wU-(r0aoVI~93%GO zf<361bul}60om{N%>*-vyd;&H(9jN3Y~p(Ud7o_5OsgURlSLY~&W;AQuHxBy^BQ$7 zRGd}m%sGQNE`Et008eq&MSF|Im|7f38VA0@Gw~EOYDQz7C}@(-;Bbm+JcnoENq8n1 z;F`#-F;B=pqg?&V`tuP>j2V`jrV4Z-0XXW5>-r}-mDHmyl{BTZctd{LH~a(s`D9ir zrsV~>jw+OjvTS&`KEhM7h?ij)xTGc{v9UsY_~_~f$f;lc0}6CXowG1G%M5_!^24@> z%EI?(x@atAZ#F5@VIm0A<$=JnD)%lo{*`m*91vp&<&KBn4 z`tt_67kK<~CSx2ORt-xx#d-QvCZLj-jiFG{HSCDzm!%{(8PBu7Mr{hq_=*F~ul^vDPE&i5Roo*gcOAJn5 zXvQ^z!XokZ|EbdrrfG@87Po{FYL`rrSYzPnlWCyTstZO+wci(|lbYnNukan3bi*M) zTL9ZKN==G`P50KHA5M%&vQpZYfN*8}k!_Fg^mKAqODQJ;X{k2lRBIHg>cf-vkIXQ@ zDKC0w-5%ALZ1v^!=bcI^6JhM)+KeVE+`i^1pSa2|qLkfD z&E|tqvDjH0Q&M`KOUhBo6MeEyUhaz- z^77b0$y^GlBE+bCJL)@YR5vn18?7FT zWOh0;ZXfu+`r`~8rt$$QI^j1L)Q03`gLOKEl4zR!GwOm^9rGGx%=z`5GLkoqQ*q}+ za3mz19y5h|_VPc7Owtj?IAJRUQ^lAy9c;azPN$+8S}RM=s?|lkVm#LJex4pq*u`|p zYPCm7x`?w7=>BP)ZZBvksmBr=&#D3)@M82{z4|*1Yf0AqdVl}4c|>ofb;G$4Iy5Ox zx^L+ILc_jbzDs7pFSi*p5M7PtzG^9f#>vPRVQ^V;&Eu~>Ea#_4%EmH2Lbb>QKBBd^zwaX&f;CW^W1!Gw3KOar}6 zrIZCnBIbZ8iRy7TpiENtaw<7;-bDlCzx(cQBmZ^V;*tLEAH*S5KF2}l@ZFgXYmI4& z8Y`B}3^Oj1DM{}wI1&Er*7BO}G6v^*DUEbBboJd5^AUos1Cp9f(^fQZotoUR2I^`UPEyNG?lwzy|*R^Ye%EUr` zcZ}S76TWUal^h?tZIJ!Ho63##<2>gi+I};R&6mt`Fg!e`__*B_rBWl_v?-A=D$`*S zcpPVX0U7SZuK;CT+6SN5^P-vHnXGR%rd~qQ7GBaSS>&$H5FqH!<+|j0Nqv8CtJ07=3Wk&jftjpbz%Fhs^43 zDPLLh_ z6sAQ+Iq@BZ6gw(90Lf6oVVI*_0C4jR4996; z-Ab+Gy4-~q@SWjuSn`V(dmI8JmlkP7=n;o23_xR`)F6v-;%;zSsg>+#YTL-)>z(`X z?9#m+fSoxIMC5gpEI`>bj{x!zXdguXQC#e;*ofNm$KctojnAh0xbe{e$rX?s7+L%l zwHe|7(Eyw*x%@s{_pjVaPW}!Rtoa+y)gQyqpp+0Ix;Vf`4#7?XTs)-E0E3ZS{IT-D zhO@M?2cG&GE@A)ixyq{EA2hVT+Ei^ZcaL=4*0!qii|i@)^jC1lbICl1v%@csVP9T1 zMW-i&I$M(Qi?woMWif@1J`Kmepbf>Co<=BA3k3Vr(~E-L_Y4I4viTM;G}PS28LLyA zrX8~ssx!saYQK-<9>#hTkO2|oLAAYy7hPWDe;?soXY(8?72h$7FY3uKSwnP`NhK_v zypMeCli(vDlLLq3@KN2nrB9F1xb-fVsb zyaZ$}F9#mlhs$m3WcT|*Ez?yZN3@Yc(-#(IavxbQ(C*4)@qY#tAg7G5FYSg zd2NrNjflRp7XV=+yPL`9q*c@>e-O^FZPxitFyn8a9C3puM<+64Sx+FNGRtG!_z(67 z$biV-JV5?*Jm1DX!Iqssy_jzY3w|e%&04)BCN~`$(V3!lgV@ilowa1&L+Fp7jhy;j z0@bvixnyT#>YkzTMDGckOGswewJmn#-RReVfbEc>;lX%6Sf{qrQ8|n5mLvYBU%~ zOik*iD01R==6@i9;}&~bV`L~p zh@ATsjDmnnj-UMFAi1t%Lo+$>mGayCZlBp)Z6+Uo3cHYP9)KcsnNj84jFU=E$33B8 zmoJb_5aqLQ1PjQxlLfh`=xjGvyVN?U5g%+&2zXhnp(m|Axh8aWuaMnXk<8& zbj3*E``Ce&Q^}EEjtm|h?r34Z@qI*uY&&S4?*Rk;!Xl_gNmtr9IjNV13St9I=8l8G zaw<6$di?_O#GAOFGkv~n74xzaCp)l?f$WfoPNM6Oa$fx=|o=GFz1Gch9h z4kmGUIhjyDJ3hc3`p%*iK|cT8^0}Kfpwt{MsR~!2$f*4KY*^3GaVh!C^X0+S%ZTLU zw-4+l|CPU`Zto$|vzZKii@P&X%yYOBJR@{oVnhD4e>rl#gazSGJBNz$E#6B>@mCQY~j(z%%m;zvU&aVd(K2FM2G!Lig z5xWNm`q@aRC?WIDmCx%Hk};1HTqytdHnW!h;I0zv^Y4O&C`L?Tq^-;4Gr1Ie5{OK` z>z5cA0T~6`XLk{?;jzu^s$X$h)IYxw-QW|af_k|{CCM?geprzVB`peG10zMehy>#|XF^u=<9D~ktsV^|$20J{TS8%Wte@AZ;Xot3rZqc4`%u3PB|@>2Xq zHQV7P(ay$2)4>BMa};C&l)nQ7UJ!c;fC8ZV=1J*?*!EX$MLpk#7Hx;oAH#M4x#S2r#Wk(onVM#y>%Mx5&!pr>K?iHUv=w&x0M^?Ij^K~rsH%K~Q` zx$LMeqOD~(q2K{9gkjDCubW)_bHtZ1k~4sBR(_N{@>6Qj5MBLq#Fqh7nJZUQ~tAPtYcjV(k#u7Nbv3?jDmpNQn{vxK$IQQ8Lo$&dfp@UXg=FG;{xwwD zeFuwkJ2o6toUFe#B6F(jj53vqx@Wvf>4c0#zIA%AS4bwRk?RN9=e~7XCE6mL-^ppc zTCe@SF}HVkilL1&F6(fC?D)>m(T4=k|z!_fNMvgr92mrl)+ug!m_Px`4QAui^L*n7HM@`cc7Dh6n zh}*Q2KB*>?B;*BrfRKz>?3;G6)>V&euXm#V`=#Ha3$>S5;QCKj{8rZ+*lr?5^zYvl}xL0m_ipBqte{*P@7$ zV0UGpM?fYglCawm{?^Jq*Il_BGAEtquo?I%OB-DN0Fx<(0&3$pZBd1Y_0RYg0ht`% zDH&jI|LyCGV)MeA|AsA1*hZ-T6(McBsBK|C{5J^QR_Xk}(h7u`=LiRfnSd^#8@1x1{*Ql$)GntI z`&;4xR{sx3L|xik4c&&WL!CeB*wA)O%drMm)BiMHM0Q^JpI6*kpva%}2{*j6X>p zy$C!6WB|3Ci&&+O%Uam>p^8z|r^i)loXSV_ib=0NE|!N#U=MyKAQRPV&(%`pn%NV3 zDtjSbig^aF=Ih-23vcTG-DvRyfRYc!Gy%(_2X1o?BD{ASjVrN8+3)|3W$gN3HvY3)Q*Mfy1 zAd?qE;a%j7Q=QH1;f_C^Qx~F4sP_8lYv?M60(8z>}+Q5>Zky( zo0;DOaguM6!*P{V7#xM^3E%MSuqr3F_{g6-F$h8`yL%O;n+sG*cU86@?X66qPB|*4 zytgzLxqeM$(+Nr!`Tyu8w=$KxatR7!4!_; z08EniwvyA0$Lg*lVp><}T?ddqlu$s)I@H%fjvkjF4LfUnWh40@n)}|y@jAn$Dh1V%@_Gdo)s2L%;ixDqX5l#u|2R{$wC zF#TwQl;}5CfLgm!E1*`ii{8CWTPvIeip&{+3)aj`leD+|Nay}i~+bF^;mh% zx>8@nZGVSEr(s=fZhEmT(DIpvixy)t-~IETb$%~Il|SK(o5!RM+85UQro&-3iVpvU zfv^jxM6_Evz}h60YY^Bwuf$T}Pd39*Uq(rfPQ}xuoE`W5QKC4va(<71%mbsoxb?10 z?4##au%Ei-0nb^-u=Ywl!!A0a9CMAPB3Z9KMy}a`wIU>wY<@N8$83|#UxApzC{(E!5H>pjlRr#su za8XB*j`J&n-GOCP^nd#R8#uoLC@uLs2gY#eCM8z6Uo4U6sl>3(H)Afk@{{DmKxJ32 zkjnmbprWg-@+)^$&cUv8$^|rY#0JEIdH|{L9(}~ghTzRt*h8g<_g6b zz+4tTZ%yUwg~+f(lAoHAQs$f`A}3)B_z1}4#M|cpv^_oD!airITV!0yKF?#=tt+YM z*>S5pub9&3!xHjsDTYBnMj6Y#0d|M1ViEPqlfIaBMw>E5Q*_25O^_SqkiO+qLbU`3 zj;_L9H!sINgRe)1e*NodvsJ94>F6Y5vY{}97l+pMIFK8am9;&BHez3!9%PRwIU$zL ztCnQYU(|?)qq9NHG@@H{p&-wp=~8eIG;u+b10*$bUK{JUw4xXF1#>copK;0KGEd%E zaxo$DnaePLLNYn=a3dUcKc8-9S6z-ltIL*y$13`1= zE<2g`{VIaSTvj{m2^o~ks4E{MzF~afAzNi__wpuk?9B&iR!}qhGh4-jko$S0#?~Er zGdB51PU4=O@ybgw=ai8mAG)$K(7l{YUj60OgXFaF&aG^-iXUqG(oh$G?Tu75yFWQy zKqLu3j%pprUt8(x6}AzIS-qP*ac#}0lFlQ|w=N<1QMG175{N3z##Bn7MNBZ54E6}f zd{FRLhcQ*#n0cfv*8`wU-q=`zmgHQFVRB5YFwx{iO{Je)JW}cFdruo{AHnZAwI3CgGl>zRzK;vFcCcd0}fZeU--b~FSySaW57gs0jNy&`PX$>l( z>PeheZqro;``$xlzox^uaW8#G&%G3-+-DJBFba^`QfdrYK9?BqxdJku<@5DDx3{qO z7&y5a9i9f(QaYs_8H;9;c~y}7*@(Bjhs<7h)mCloZCO)gdtI!M)}raUqw@zH>)Woz z`R})l7dOmsV&z4+_q-Qh#2a}@wTjMB;*er8B_1zGlyUOt4d|MHOtODV4zNw{uh>L= z)1!v5Fg>2I+JiD*K{7^>;EfnT0hx&2%;A`RBSw%ru5qc3%9=@-op4WN=};sa$`__$ zkyw~m9oQ{|RQ3aox=r}KF^r%oI+2~AsH7=rQCnOtTEhLRpKKkk0L5x~8>!XyIP5vU znGi>%n{52rEyLu=@yb8?T={XOj#jy~k-*5B#6Cv0Nagr~w!<>$SX_x0KxCby9iPe>dAwM8;HL0Tx71; z%0u_nZ;OMRJ;@c0L`_PriXU!7C0x15TFRv_3`_gAU}bgxijUOuE`ycZMH^9m6qO=T zl&^%UnK~3sa{=-q9!(JN7}#)@R`%G@J{%j60ouN^XVK2)Dv-guhq`S}6uSf*kqcGk zT<{H?$YBm+(aIXssb1+3&QDOcYIksj=U%(=iaO|eY&HuP116G=PRN& z8kC&&!R;tB&*g7jUb9*a#(*utnBX(?nrFtQ(-e8U0&x|P$%&KeaJc@h2peaWQ;dws z6)#dVBg%q>iiUjw1qmL)&je(0@Vx7^hhm%YiG><)9NFe6dZqb-QHJxj(DOdrWAUc}n@%3J4?De?@x0e!bCb52%HZl{L~{JdO*~RD8=B!Xo@^f2 zKJ`rn(Zu;gsuVU&hK-K6f+0*1=G<~BIrY@KLH1CQ+fv46Tw~+3%@P`Sd#4g5nS%VO zgi#cb$pPjK%%|txW~7i+t`J?Zy7SKs>lzjsIvpLK?^x5GY5RW9wcSs5Z(dz!yQuY! zmfy5!n;&UzZ3;Giqj87m#)gHipL9uAeHcHwv;qGkr%qn|vE~EY4?6BWv0b!FBH2gD zg9=Glt{e)6W%413jPVUAQ8!~q;R`W-NJzD1!>h=US}9+HTCp&^MxAs+HmitrHP1tk#W z5G9d{m);`VBbCX?v!5H-PEP;d>9&9U8tdX~0s$tVlm?k0#;5QPNhm2bfYb1N{?*~qOrcw0ozQ|^{=DkNEY54A@ur&0iA`6JyMnO!ppn=gGhIN-Lrhpn2f#ff6AuA9pBeH8gYqGU27kODqzr_X-XqzANh2pe zsoOp%Q;Nk)e3fUs@ZEQ8KWN}*hu%lils^P$;Gqy5ltQFsK1eey9SVp8c&&nF0?fN# zBieE}tn8-BTD$Op;8xJmp&N-Crnk|+Y@}V%Lgk&=`CMSTe^GoH@fPw}#V|Yp8Byvc$ zocKO&+D5j&e7gPJ1$5?IojG*c#n(`hVAvPNw1lZJ)+v@fBu>IW8sxsPTpA8b0>PyZ zlJ3E}BB%aw`W&+347so5Xc0_56U2Ch@gWL%0I!h-WcWUbL=G9Q zt2J7(M~OO-UgdW3;@s)>{-yOPJL4_H{p2Gwv3>D$GpFzrG-g3234paENTKrz<&ZR} z2>Rs^U>~$$oi(N0BbVVsB$_(CjqG4gx4z3WCQ%Ma z{2>{qC#fN56<xVAkSid{)XZCt&;2RnmKfvW?-Q3s&rGM}7 zO`;2=)V{DXMEkkLCl1z@M3@;;hQy(vfG;4HBa$v84~G}WiIHO~k&1aG$qCcD+Usn> z^nmYTXfNozeb|$vj87gK3MwVoVPvxKkT2x-4`HnQa;Y*9@X6kNk!+6yTEDgm$vH2d z`Dtf+(eR?whGa^>cPJ%85*o?{D*;-c68naveld1Oe-L_dNopBt4}&;i)!qBH)r9KZ z5j<0BZE#aI{0FvN}1HlZLb4l_$il2-14I(&dqaax}f zUd4*SyYwFZqV#fHT{T?Zb-44Dj&s_AEjKoOtFf0eRL>)q+*DcJXUs+PS!&df3XPBG zW@fB#_=jPrC2oQ}C1@kZKmK(fKbR1{C;ka)H+=6V&PT`0Ct;lNiQA)c({PB^yCcSe zCW}(;67sqGxbwV_%>K`Pb(h8NkHJ&Q%ySv!ykQm-PbBT8*(CC4HDQm$&vED{rH@tm zx|cWMhT1>KKKn7aA%NjK&t8^gu#KE3j2YR_ z++1;r`lQC$AS~V4utck}sW_a3zFTm37Lv(vQwwZ$-C#4Dxur6StI6z`r$9N40mc(f z7QHhH^1`k7osi5GtQcT-eSrH3T^vhgB(n~Agq{o!dtheO2L0%5l{LM>HdwKJgY3_5 zgBP(637DEuDxpgb$D*3TL^Qzv&UQOKP1r_`U)Blx^_MLz?ESan<_n|Dfo$-j?4Dkp zn??Tb4%n~DspRBGSK}(6Tv3TO@uD=`&@jwhJK!F46RsQ{;X*p>$M*JfHR0C5%$(<7 z4sx})SFLZ>@zEW|+}4SzCP80U|z*7+QI%G>+W zLP?&W+;X_?t!}+OKn9*fPnT24aq3TiBslNx&Fno-ax$r$pFvM9-*hQ__in`mQ=ny5 z(`;dMc#6_RNZ=XB^8GQw*ytgeqd~f0$JI z-_w%a9pS_H*^`7j4N2!GF-QF6^<>Uw4oi}hBcqFX$7~96`8}AUDu6ON|9WEv;eNix>IT%4*>lcQA?RmR0h|s z&B4y zYc`Znp}vF~M~KMxx;&_L1fZ{!F+u+HAMim!F$d@yy{Sel4EwBM1Dpsg_R#AqUk5j=v^z>@>pfnMo-*MBWnQe830aU*btys z^pxP^y7+Ohm7X!nXL*u6^6lti0ATmyaQt{jP%3~%x`@jTxIwPgg^IF_Pb4{x91h}2 zt%x-@!SR!>%!t;ui^L60jomttxXX{4HFq`t2sJTpa_!~x-yCV=QP@4EMrk+XN*Z7 zDkNY%3#jD8!lM_U{J;|%*l&LUdK&kwTq4tc9R<6Mk7%9sya+6c(x zWaWBti{oZlFil&;^03Wk!_`iZ{OwEly^u_fyl}CZy@9Pb;EXx~5MWr5bAyeKU`Q}p?HvyG< zpPn80D)(dQJO>TKDghmjoVtF9#%Jy%)Ry}X56=7=C{dv-JXq35^_)v~~) zwD6KS>dm{PIBA6gO2f2S0fU6xKUdj6?)z?~r$^8R@bve|*f+jg853=F z&F^2rle9?;V-kA8FlTXbx?j2Qnd&4bbk8EE;ynT;g)MVy6KU_g(*kdm;eAVYCw%y`*1SQ$(sJSEFF)EyK zImVg1d17{kA^Tp08d^>z2UMFE_eA3lD_p?@+)|ji+%eQaGM7+d7?72gcmQD9mITLP zJ-P7ZN)L*QuJi~L=DvRmptj@cM|LjaJt8g#8yevLb>1YR&6CKc12nEva{al}Grp;r znOG`x?j<`IsZ^$v?h#W+w4mPI76QO=mIU9WM?LVnJw1Ny=_ERjX6{r8f z=wqllJ2Y4EY#7%9U>wC)xtzG#<`<2cu?2DhG`Mc1M%+Pc|JP-gVJ&o=`^dJ%K|w)^ z6zUVMUTvA~gm$qP?@}_M0l5$p2 zppU)<#gTZkvS#(N1|r&{N2-}}W)u6}H#z6OWnmR~@T%0Rn8+9NL0?{;w+@>Fyc)dg z6x87I79eBBp-kTtH?yyvs$3=7@@@{@bbi*Bg5yd$J1+M7#rkNiA6Nbb3QX9FcS!aZWdL(6rDBhP-B-${1u>+i+UzNh+phaB=j=-?8GCQ|tFePv!x$ z`wy;1=7n}J;MIG{GFmKZyfgXH5x=gWhgZI`t9vJRm^rcG52b#kE( z-Qjm<#l*BzLzRlrv_opPEt2laUzfsF$vMxP|M9eW3>|_<>KG4Th4$>d(9E zO6RQKLBuW9_2hT$)xO^MG#z;7nk!gC2YP`);Zo}O!7arNQlp$=a-)tw5?*fpW3o-v zwcX2`h~4F@A!u%4f7pbf-C|nk1s7fnQ?ceC1-rOTr{N7$;n#^ zjJSYI`erVzmjg&Dp^vtC7B+xIQ_adw7h>5_;Ov%cDl2VN#Nb=jLl&RijL8?Y5g*+# zaP*#ao7f#&s%CEDHZ4t@BPV83bhr>V8r(<|juEE6x~um+)R&GR=HzgH^=i%}<8sD$ zL5@ksN7AT2@A8>xtzlFqB{nIxh{9TKxR$q(lTW`sc=TN0F8*jOCxDiPZA)ylV-bCr ziQ28RBk53fOyT3%Tp|Y>K^sEEP6P8dOE$6}l~)n0W?kTN>39*E%=v~D5^X9wZA>{Q zw1Ike9`1t}3foBE#}R7=AjnN@%Nj`0HunM&+3He&lzg#Hk`t#T;S^B2q)~ow@862S z6|`Z~6JNppb1OGLvIQgi?Zh!#F zbtBn+Y4j4(b58Z2U5!UO^X*$(Z*918sj`9N5#&_Vi#7{H1rqe7bE}B9S}s^M397pt z9z4H_GB4wgpk(a_haf`zYJr$6icogPSwyJL$Z&4eO8$6$m5Wg3LaX6WCT2(&LuXNY^{@Zp#Z||eyBoR(+Pb?^ z?Z50~TP|-(iSFjIfNz4vvo8!_Iq(}qc+?r0q3m%*94J1KOi|9yUD;G!+be7%r#4Fl z$%h`jrIpxLeYltXt*MH7ccz8&m$ZC(B;uY>h$CuyQtbi6FwbnCg%jN6O=RbWCwFl< z)cx!;7A$k*%`R{im-*ddRtXSKrl58s8PZ89OA(&YGZYvJ+6dKj05PUb1td|^oW8Ix zaLH}_*SYDS9ogLGKrm#m#zTG?r@#h#g=BI(*?j@I>B&PI*yp8H9B*w4?^a$$;HVUy z>!{TdnF^UxQ_9-J?!?V6z09*He6C&<_u+CY`*WrWPy%{^OB>|9yZ)4d_A<%vj7K#h zkLfdEURr*42{fXxjr46993&6s4y|FWZyiPn##$1f{j%!ro{4~ec#=}eEVN@(%*Q>k9i+}j&Cbs>WD#G@y3ta9SzmZERu?ea6*X$RtVna13>YH?0GZbY_sgtgh+cuq}xSya@sS#fzXd}LFy?^jaqufq! zU*K~1cnQzDQySn7$n>%iot%kgll*uj)Zid!BUvRJd$r`o@2Mf>Tg?l*(RbcrkhlYu zv?AjTMCnK&U#Lw@KeXxXLRVo2HwU$+|WWd`9+7jwQWsZxz10ulLN_~mpCu#Bk-awh?hoK zlTtWxitt!MERjWBwj@7c*Elg@f+lkE>T3p$j^4S6ea2ZunCMj0qz5RMEm!cUbb3WG z&i|Bh;irN&sDG5StYs@4c5z=A_S3crX3CmE6m2d;<07zT(uq8rjuf=jaum6gg^jGw z!&&3z1$t?alM*G6=*LSklWlZTqn41u7!JG3spN=y8y|c3>oKTT*kfE}+v(b+P9p3p zN-2|hW;EbRYn19J`RfeKQvsQX9v!VCEOB>eB$=z8CWlL?r|{v~>b7m83lcEoYwv0l za&V`G^&OsBr~qc>1uk!puWCD$F#$(0 zpGyXFX{#hZ5+I+lgPD+wU}MXLgy!w5 zUHw38_qr)MJ5iVsD@G0B$s|c$hhY?u5ng-wV7+L|gui;thH(HDxwI({m(N!66udeo z3fDyn@&*)ps2xnfM_jrv$63PzK2?h5104N6d)e1m|bhR3k~atfyR9hZm&F)r(_`~8jr0d z{&01}immT79^1_xwyaKxE)e^sG6yFgxfsk){e0J23!n@vac!+QlLcVCC~!h~T@z8V z=Rg(LIcHWhS@}_Na-nTK`|6c_MG@I*Jk(CM#;YA0xsUUV562K4!xBgCDi>z9DcYylU2zoDwjKvix-ia;~YX&0L+XDZ#)?#Op=?Rl^V&ZR`ca# z$3J4-+{V&7j13) zE4M{9i%9Q*>gqmiG_NjE7KvGD(Z`0za||~MxE>df$*Euc{R;M>1634?@-J|?Y`Emu zWl&GZZSLWiI5%F*iXB0mj%9}+&;lv|s-kB0D~GU5wjT^EaM^79ugAyr8k#aqs7ofzclv|6jr|WZ(P3j z4*)DgURY$78}Sn%nH;aQ4;=l>=Qgq5xUtIN{1_Lw!sWc?8?nU$W8*W@5v?I_ zA5I6zSeElUE~AoTyG|pF;JIfulW%9MZ}V#J4^uU@$7O2sYA-XRrt%U7KBHNs+?^;T z$iOrPUqFT`SlGqhG+kXU;`ux?Q(Y{fEo%_Ty3cEUsY}=V=gvg?6HWb`Xl%zUUA2IG zN6t5aITolVXszcza2BmaGV0W3R(TueRPZclcxNkEqyVX$$xKQ{Y>dm5jY!FnKfuDf z_2ZluW?2*GL#Y>s{hyD6%eJc)ka||{NQ906|JyW@p2!D+!FW(cesc?kUr0v5_w{?( zt8e9he&xGA*Cu>HN^8lYpohjl%O#}qAig8AoJ@RgzJD)!3Y76<*=c-$`!||-4WZa(2*m!0-OnUFCZXi#6u-eljXd`y@YcP4{I<~MIZ?76T$CPS`kHw}*Qc9ry}L^Yx5&MyV~fch^K;Y z5s*pt`ES*Y?H4NWX7C_S$TwL1iLS23J3D9EH?+*e(--cT^d4F%W;NNfVC;t0}NO6C#~-&ftW=Dlqwal6Jup1kj@U*COy z_2VlD=r`^^tAKL*9beM%iw{)oq~(d~m3}j2dg{dISJqSYa>;jp5jGlajG1-ZFrct7>Zn`Ck;xNBK!CI| zy$@n|^X5(OeMV#nMQUaUNS-JHQ4vsD6db!C@g;$52t>&KHkg-yZwCc%qpOh$+T= z=VWFAP!9t47O6%kAy1^GGVzn=j+aC1_K`cRs<##70j`Ct<&W%I)iypQI$dN3EQgOd zw%xF(wIh&Ug?03OQ&`TEf{@9}z_FtkNZohWMv*M+#1$d3`e+kS( zIZ~ssV@g*s=}HDeYDfqa4?6wb@F4pT3me;T?w%E&7;N8nH(0(_HoSHgLRC_kU;&_= zLk^iRdoPS}4_Vmxm+ymLbZ2d_*GAPj!f*OAT)dbAV&XmoTfzxmsb*7V05^AMqD0aw z^HAbuC)RR?#G0eVy{8#K2!0W)X;7c-uu=axbVo4X2VdE2*z7fzV_^0YAj@~&gW7hL)Bt}jgIGrqhXE2NVlS-9cgky;ym z4({!x9AWoge1|r&m#>3?+WyL}z&a~#OxxfI4n77#OtR!>@|$~c(W9|ZXdgJ{ z5KJw?ZvLUg(pg6@EP|7{m(^y^c>UWF;cLHwUCiAlaZha>y>EaRer0@N!U192TlT+w zu4L1N2LLCado}M-vabGp_s1XBKhZc!3;S;XNQ^B%fmU!59cDi>O*5c^f{XU!vbG2U<&6(zPPDP{1L2WVC{k`%Aykh#F%r|aFM8EI-a*0s|rh8JWV0=|8dy! zdw9aWO%H%acGYF;+dqF?bOP88*g+2Z8c1Od%du?MTe2s$9y8ouJE!vIC&BdB!vjQC z4&3qiCm}lENst4h;yOGkj#A0bgw<4pQCZ{`r?B!~7?m$R2D-bHBkaD*+6|T){s9Pq zNC-Cw>5h#Afthrp?|==}Xoq20 zx=^}H=(A5BYY7Px>)QW(8fLg_YpwPTzc-~DI%)iliK3)B`jdh7$`k%|u|%jJgu^gz zcIjPMvS=@vViC^KfRhX^PQrZ$VaR)UkPUEcC+uKzd-~VnS2_-esmAClBc2$fx0(rW zoKnm9stXRO<|^UZ_dx@CSi)XuW!s*w+_`~enO z4@WI1UW7>Y%REnQZ14DQ(M4cC@X^CvC@SUYEa}Zwf`ytT$r%|4vV{5SAq$H4#^8at z>eh__5hF1mje5>r5{hx%Ur2enUX}R8!2?u^b42B#54YetH8|)E!@ExIcy;iA95fc20ef8gw`dy=2o(BA(S(C(E5TU`N(GkL!=M#=dK8HYfnU2Be~ zAxHM8%Rp}{0C+mSQ~q+Uz4u+wTyH(F13H2>poT&N*70!0N0j5aG#wZA-2~(HTNwD6 z53$&n_np&L|6O#e*bj*5{%G2)wKC_#{p!5SsKsSrGg=6@y#ouOhb2hjKkgL3T;KlS z9S{Rsn3&{_wlK()Q*wB~XH#GK9&Ca=Ea5Q)4xy<(xOosTLqD;$U3gFIj{N|C_^T8w zgec&oN>N~fxKW#6gxzPr`o3Xfw;o}7l2gGNsQs%^J~P1$(S;g{>h!CNg{y{WlsYAHw9;*K2l^v$*Z zds7pp!F(VJf{;q7YHmx;5mY!cU|QFLk*3q%-;aW%rK}F}0fOXKk2T>^Za>g1s0xay zbU1uoPr`{g%NdVf1?Q3Y)#na@l%*_T@606~Fy{5`JBFIDj>QVJ=#v`mx<6H^L{nC+ zQJDpJ>W++$9tR`W!vauf>2`25?p_DjuT9ZI?l>SOwV@r>Y;-vygwMrO2E9d<(!gRC zI};lKK|MTS_x70Az`<`rajZk6SfRJ zdv5z(NmC=)5INEvD~*$+KPETm{YhVpMoZ=E2vph9zHbM@3xjtFDl zbqBt+QXDz^0kOg{nofg0p<=PRJn0L#BcVpEt67WdU>bUO!j>^<$8ox$ecpOeL9GXJ z&>8g2tS1rG8p2e9g@UN60vHa&*&Le#F+D7Sod7V?j)O5i2SW!}l+s}_pfdwvQP;*7iVhrLTKvhXVRY|80 zUEdzs&|E$9A=bY4FY5YpXErtsk_}=48dA`jHBZX1WL#6u_^T}GM^eZ&FpE7bh`xAD z4E(%hQ(IUAo!MwRP&m9^s`i90S5=hKIy%H8<>=CN@hX_5r5u6X?l|J0pKCw93KVo> z`LI%%a=cASL;zWlH`gjP02_o6UL(ACT65)0FHhJ_d<$YzzP4wsO`d*4t(<)l=fEk0 zf1gr~?j8OqggTT&wK^LXrt?7M@aRRuIl_Z00{Ud$n9rEqH2R@`odQ49%j=|$0wBqT z_Ks750gxnqNZ)}Bm06Ajf4wB>0Sz{Vf zW!DjaVTC39P)&OOt~FaIl3`>=nbcIh?T{b-D-UjHuRO5{8LMm}9}f{xU06+*lL-ut zX?R|4o9QJB?C)+lzx}(DVDvYK4|Ma7KsUA8G_4{F3V%Qu%-Z!(7QuE7{Ch81%;zz; zpF5`s#s{lDWvzlIl(DG-=4>LL5M<}Uzx0xYy}_?o+uuG<9Kb8&2gJg{0EY`dY2d@~ zW-!SDsc0kQ$J1z|D4hw*;X^DapnPf@obDRQD#>`?)W-hTC+NY)#skB5j($QiE`YlH zdD9hv#i7F<8Lfbl`iIFAx9}Uv@ge+KFLf}o2WRjB1Yt82AMlg zq7J-|!z%4z!4q2E?ZFO0>_K1=(s#t5R~VxxX{TMKoK_K3La}eiu-+Gf#q}!LTsgIr zB`Ch?2J6d<$HOK_ft1buMaXFCx@6Q`!2;MwX^&s(Pg+zq5{dC$+MJp0;lV@ghw#RF zYIZ~W>z6i-FlB+oeh@U$nKGZdQY~RMi%Dv<#YmMCN}0j1ev5`F`w;7$wHqkm;%}~< zXdf>Fb(wMcY`%s`E%o>STv5ZNge#fmwyC95;m$V%OM6J(bW3Kuiln(1qi6_%Dcbm2 zN{FA`gv;tus<2o5hd-VTcY!?@H2udI_K#n1jA8Evc)FF%3&GB#AS_Vs$f^b;TM^|8 z_W&9{AlSZL153=S%I4IXWt)gFw&w{aoPN@jU{N)X6?1u)s`-Tvk5Om%l4`gO^bTK} zP2CR`3WK%@))}Zv1qOG>fbqtIIs??tf*Mn5XF}}R8sS-Oa|U|0OcSs}?fiG4r`;%t zv-Hgs008EoAZP$;VkPk)SZScp0f4UsFyX#NbDfaTHz(IF-vpr9KXz0c0@%zTgac4~ z0nJw&LnolFSqQNARFR~MjLpe4%QgWQK@cE;kB*kG9Ez5JY7J0O!a`Urfk5{H*ediBfGdSOWi?|hS7tX!7IXS&_qv>uzsf(B2g1VZh z4mH8S7j8l+FSP}LkiDW=4uUNLbug7t7B#qRX80xmDlf+s*mn~hTiFI-4}VNee2WK7 z%<5fq0t*+U(oj7b^j8GMrLd46j=(zUVL@2h$71aZI<~@_V@*Hg_9me$SPWp|Ap8X? zxq(Xpv#Fty26SwVurA)5UbAcy;hnz%yykxpvopLIvh%>ObI41&%oez9x!tcDQgmCm zX+Q2t?>%1dFH*2;tx@%Caoz3jc$xux!=s+CJD zf&eARmkx_-1#ksD)y|H(9nfzG=}}qO$7l^P3m2X%T)=(K{%@?NvrzFaN`jLYR=kG- zKt;%gg9>qpBpgNJLGWOrIWu>RCXl|8F$l*eo5zZSt|gm$_T-wwD{mG3IEnEGCAW?~ zKTsXgjR@@Su~lv9qsFX6NamZ9D~p~qQ73gtPp}+Q`g1Uk`Nu(DZp*{Y)yot1y>>ik z>E&xzwEvZFnk1Xei!0#FhvG|co@I0e{r7A`Zk(@{ z;o#q7TI?2a66HkF-e|^NO#68sud=}-?KU_}mQsc1#@BUhm+RUCpA)Z0o@gdpCu=@R zlTMlx-W=E~Z-YUs-VQg&UY;O%0^intZQ^fG{j zt8?oCcTu6yJauIyDa8T)Do9lQPQK=Ya3t87w@vquh21wi4JM}B6^CLpPQRpi>M>S) z^^)aRJl)=Z2^_+EE^B&^HTjLpmYMwa?nhsGL?SpZZ+;Y@GXvoB066!AqH6IO!3C3~ zIwcnOkG9qbzr4IT0|9d%Y9j0?pSHdm({|&P&6NXb6_g@D``?5_S(c?}WibPzuK{)RE zV{Y}8>ziL#*`tbw)b#utj-jSq5AViiGq~30fKrkc2!K$=p(X(ULl~gqflv1|f?HtWod!mR=^mbd`79j+)`s@Ag81}uF3y4+^d2v| zBXR;SglK>glIHOciR4^%GwcVwJOCk{+=?732X97##Pmia2vb)ARvZHZZPv#smBy&B z_gk<%-n$##f;~Jza_cYQO%9o^qB(k9d*Y^!&1g|9w1&Pe5>wT41Qd=-=G98ptjCeC zk39gwdU$|iPl*qF`ylk}#1fMGuI1l-dQ$yXe8{~`@nLs zlqKw(0u;{Ic2>Zic%S%zjzuxs5!oEvE|ymjc)c9gXH*SUE`dhs|2_>P-oq2NxV|EK zdbmyPkKKyobQ3RO+t!jrXPnH*w6$c`7x0GUqMU8hJ!Gg}d7SuJA0HB4!~U?Y-M&Tq zEc+rPEgmxV6&!jk>BKn*hOn5haOYMucN`$z9etoTmbMbG>dviuF50)gE&VJE`eB3V z@ZyAj{PNL#Q)dpyC6OWU+jR}5i<=G)V;GK{EXLb)R)yPWb)oChh2Mj_+)_>lt6EI5 zTi5>1_rUT1QTB@)K?<7M6rfwC0FkbqOsmYvMn#;AHG;4gMzMz_?AGW{7EQ$)+VAd# z!*8RQJBaKTUI!S&uyk1yuUlmfpPWTfZukypZ7;6_VkGRJ_}pCkjqiw)VP9N(cn~wC zh}?&#W4c5JOPk7-j-XY-*S`#k*25DHp5xxS=i^`AAZ(bsbEEK}X7!oEj;}QTvDvaH zW>zA*pT8Qkxv+vdS8&O6H3-^4x_0(mAg_mq+{XLOe_YqT^)5J?XT0TF9$7WVYuMLadQ)cM#KnzK;Ay+WS#ovMo z8B3@F`v|oSu&g$;*M3_xVc8Y|Y@)0Fl*ZzV;tG@29m?2BCLZ-Q^tI-y$t5gd?{AOW z4qEhyjqNACCVsD&o`%d$l&o&e!erGPWZBg)18nf_r<-d|AOVt6epGv-1=`uJV(!`p7Y@LFTf!6Aw&dv4xi|NLDFAkPG0hBZ&R(-WW5%Ld zDUl-$39i^xOZpKQttC9+j+IYu7w)`*8$v~Mg-4nIC>%-Z*#>Ep`s%L;3@z|#2221`&SPO z`P@6zOZ$Hc8&%i8d^HrJkz74=+JJZXgNf4k=SKwzR@l^*o-pbL^)fAr=~C#Dt#sNb zHHH@gnY_`eKE+8=gdGqL_?@HqKx`U#k$wqSo(;a}jBk6hCR(bPpLe_^jwqxNAfEcaMw8 zX<6*#q;*VJp=vZ##??7*jEs3I4p%}H0U<;`gRb=OV0Ze+HsQts0CYY7v*rgkKlBb?BS)7oXT5 z-2LLwGM{;=xp|{)QB1^xTqHOn{W3+}fO&ASxto%Xq|Bm!i_BhC-7Po;$0Qd#Sv~h%&^~9(wU9Q%69Xh_s&%g>;!Vx4JUE784 zpVvPs-2c|~)53A*o^`e`^=$KRvzPTvkrUkbO`|^;etYPI0lVZfG1M;xCVKOtm_`M$ z|L`-Oaw)06qnt)XW8PfY8bV{d`%PH5y*!9wA3;e3e|{5Qi7SiBtR_n&LuOknRmcGd zEc##eEtsDkp0MvuzJo%zvHiohn&)&nA!bXVP6Sf2f()aSw9U$K2@(ptbtZb_%OI$S zhpN0C!P)%y%T2RnMw`k*3ZvS-D?b?p;=2@al>rHah z?{?w%Yg-U2@G6Mee1(2dEVmZz$Z;iecBWVf5`LbMTI1c>`22Gqr-vnAzk!MT$XDm~ zJl}l(hz@T3S+kpl(f1x0>?g=^Ti<)5vHqV8-!S-~XeIlVFn$nB3$9qyV#E|`X}&-g z4UJL+J)$l+2uAiE9$e#*7+fOskME&m)QB=$VjVW zTtDZqaowIt*%O4eh7k#fJ}TIw!h?T?Tb*yJwQ{ialt43$G8)d?;e+&MUUb3M0%Wg}1+l8OpDiMCwY7Ggk-#0gJViy^h zI~0;itFk&*&Y~{VJeEL>0EEil!)Dn-751KXi=}OTz3Gyy^hQI*0?t{Yes!INEuI%1 z`UCuOFIm`o_9xA4{J)!eK!RJO5C5KnWwdrZiC-f5y5#r$XZEk{zo>uLsCn>~QEGJa=+MZYMqV8G-pJh}t&!@`#K?{j z-N;!ZbHo1{etmfV@Hd9<9KL2aH|!t2VEEMG*`a?9{dVZ-p@#>lq1%S897+wjht8S0 zaw;`+@|1h(oT;Y=e>ipW)a2w}CtscXuj%0A1CxRzH@R@x^l6jv>Dfugqf z@y_7T#4jcuo49vk_e6d06BF!&aRQ&%Ffp*=k1KvQcwoi12Q8yviGRfxR$RZLD0ybZ zg)7wk+QI)_amI?({uf8XU6ft!ta1K=yJA=4+J)J!oCssUOoYW_(S?h-5Nn%4 z^rSo;BXM0VlZ+SYCOxhh@3zks)VRCImU2~9C{1H?2M|3`3^P#bGvo9|BZ;ybSKp23 z8I8V1hUHa7U0<<9$++4&I{GQeS$*vjUmG}0f~F#3wAL}bPbqU~GcGyF`|aI6kd7?j zk|*J|@8O7a+$1;XcBdu*<_JY2DlX31XAnJL{7oXsOTTXU#MCYDnb++at{V$m*A=|k46TizfeR{GIhevT4$1_k554MpT{31hN{b8Cyq1;ORb@hvMD#!cx94zQ zK$i}d0LtEaQx=Eky z$ebz2mCQ*ur|512tCO0nlSrEk0Iu$aQs1oN=FuMr`J0B<2p2m}7+R~0*9|<=kSB6< zFkdsJE_i>yG?NNF;Hz)lA`ko9FV6?k%ok3TQX&LV1%e&3>8aJVf6{4&?BO_|`?613Y zX-vn!i5dr2vS=&7nSNw7wZwNBD;3=b^~eyPjQ zH`JtBpED##t>5ZmH;$vz#bbW@p!&+NBpN zKAf+6b;hhlZ!yGHSGx3cs(>rv1s7lNd6bN7JdWrKNhy>!u{g7M&00tWjH&+aLQga> znvmvH5UXspm$THy>(DozYG z%S1S1bmZea>DDAi4kCKITC9>}*|{KfTC<^ajN9_pf)V7s~9<9_1q**1k*YS#v ze3A^E0zrg!I)q#s1@<8S9SWopp2@kq{39gD=K@K zR$x=lciXE1QPM$S;i{H3MDo<>-3g9j(Gs3^I3rP2)KE6#{cSW3k%lQ`jmcdNnSs(c z!s~yE#6+qAj;zG2oYBIU0JM6;@4NJpB~IWDX2B^_l+UAsDGcK^VfoA~Y95YMjS+*2(=owFM4LLTdoG4KjwT$9N+2g^92JJ2oIt-C zmPxIcp4Hk7GCNsN(c?csbPlXYWGq%rX)&$E-e6acA@N*193mQu#Dct3lu3^nD>}sG$HTODTjwJQA80^e6%?;HF{>3j-~5_ zBA(FWmQdYfjmh3b^ia51!xC<@OcAN$L5>;OaQB*ldAN&*3>Z_f#6ZXLWaRPMwLvMIap}73wrovV3{E(07)&i=W=Pg$8+Zw2H}d#Z)E+$T4`-)SXmb znJbab1n%U`0S6IFnjS&@$T%`(j8Cy@n?2efAqMJKh#posTtp!xFUHe3iflx!KM{U) z|IX%~x3>+?p3~QN&Qxq-V!YIU^XTI6UgwOnM)4mBr#14z-eTKu^d`?Ke4WVm2oUWL+cRs}l%0ELK%^UyQoS3sTG_|0c zgCGqf;MG~<7Vz0Zw3P79DXmq)3GX%mt8UpAd$zAO3OB!d%;hQW`7>@3?F;zm}T|DO!Y@TXeCvrsbmH;4L1 zzb(povw%M*6W95p}={05o>T*KZHw)1Zrw)O2sD~#=0zc{mf^KSGH`D?&=HQ};s(}JQ z6&6K zqsErN5QvOT*} zxZuJ4cLK;=Yf$*0zqNUjdr=Jrp@oj|Fq~7D?I~9juA;`MfsG0Z4|LXdW@~n8DNES< zs0o9t=yfygZ=TuGK_UUYs01+pRR!kcpp=ZV0hzTydB_^x5S|@vZJ%071V}C@+;LoM=r{u2phuKR)zcDk z1)u8z$^YMY3t;Sf7PLPiF7`R$6BDiJed9r+=$g>Q%S%bg{)}~@YiE0h}Efy6FDbrU(=d`n49IA2)nOQ1BhQI zZCQ+n-Ls~3tccjR*0h98-g_V;p$h}DR5g&+tP$F4TPv5-n)Z#iJp?EqpIX=QLr@-9 zgGB5Y#Hx^hgd!H{1w3~M5$fpO-1^omZ1T%Bf#{Tf3rGqPvap2;jSa1dwE+GF5lexz zhP0?T%&HdAV8f704oi9~s1Zan7rG&aKc`0j!9 zk?#2P=x0}x&))=-+QaIoZa0o+^Kmdh5Udopq&r#W5Q^ogK}Z%vPBkmr?FXIssJvvO$d#P#D348J@2!oUTRtmrTD!2-7|T3~^9Q!&(fYlh-V zC6C+}4hPVwca6EVdXhbwBkbGzf|&OUzVQDxx4`9JOQ@`2!e7g3RhAf`tV05!xT#)b zg56vj)D|EkW%yDghR18txXZ)xb=VF& z7na|i2LIc`6C}U;>ejDcw66m&25tuD8Ld-R=Am*OO@y7LnuW3_Q)1OP(b;k58Swu- zJh5yXgdtvf4TK?HmH+|cXSOyWUv}TweS>Fo?vCZ*t40?k&-V!{XSSYn@)fJ^`S_uW zN(W+Dtq}v?NdQ2Oi_i-J2+9|SY0WmM7Acb-6==JBYvJHuzhV?_qFToaf&C-Z*@GH~ z_n@UCk0xb}@GuQ~&{9@sQo5+XH!>}YxQ9b2wC*0>t3O@cN=lc}tu98?1uwwuSAn-K zI+lX{06&I;wI99UW~i6(8M5URUSnEf*=-F(Wh)?BUIT~~+N9MThA?t#LL54XlwX$H zDGM(ATOfy5S|cZ}x~B@0v;~xS4&ZSiINbm+h=9X{10wIx97Ea9Kj#?A-kp+-=d}WJ5Z6yY$RY+CS|SM5)*(lLfFfR< z<+2TO=t$X7cgf`&3)p1+KLE`_yWR{B3Ehx-J2QN6^x=VzOnmfENd@Pkh~a?3QQRiZ z!Qz&R(Mxz`1{&)1?KQ$+Js)hXn(5^Ml-7f%pj=_%Lbz8#l#B}mp(q)%!lup=wKSU# zDK&v=EsO-+qyRy^JYjc{fveoay=&X=C|ZCmZCSJ*-h~s4DbYyRvML5@9r*y_A3C%~ znAU;LFJ%detJicx1hcvpIG$~bBD4hx5|L_)CMZo8<*gw;N-0SsHtmD5`4BPWP~ceV&W9w;xiqE)=i1 z0N2qSWVI|p+Av+x$Aujpn+R12BDPKUkVTNnZm8m%NxZhZK>&(n!((-K6*ot{cCA07 zu}3=sRtfif6xLu5PuSA_<+e6dnh1yk0&o)D0Vx8uZIW|p3xJkY)ifX&3WoIrD40!4 zkIw7sX$DELcb&RNEcT%^v<@fUUeY&F7;sE!hyNkDWb~&)+s1DfkJB)mXpTh@$^dDE z+@^<|6C>CkN_uyWg53-5KWk2)C@EkP968@rJ?%skQ50!*&;_R?D47UtfJ8c@j3W#& zU7BLuo{SZFh<*~ab-NG7p@%21p0iH{H0^8FwXgHFIpscx!(bu=wS(%aLc*v38y$7_C*nY z18KS0=yN9VVyy&MrdXA=u}H*eQE}1r@L-b@;er9D93^C59|axT;Dz3xv8_iuyjp7t z=|j~r7tP1f(7x|)t(scO686p1Iw6mn+B*W`H_?kCmIn&$$(Cwh1~lOYT~(1Hh!lDl zRzC(E`Vfn~$^jiZ>Dslzaeq1m$}a3^y|?n3z7ffkdSb`;T>}>mojLk~MA&jp@+uJ` z`c0?>vnXN{prKc(t&RkdP7)4VOyQ$K1iJTJe+i6U4-axvH$l|(TysPF%}Zc)Zxk^o zkQ9!}Cu5*aZmHMq3g_JDJQuFyU_bBS2`hgw4BO4Y`ds@p4u%d^7k7Adl@%!+-q7SK z(Yk@6v+>TgKzNXa?Pe)UU}c~0q_S^pPlv<__}F0?DVyI$Vi6xD&BjxWN>Whrpi4be zh_N0%I>7K@9_^oEiC1)sH5!t*n^qZhbUkaW8hF%|i!W`>Of6-hg!i{c0R-oJmx5-C zuU!_zpx3UVLPzZs>9)8@qdu5L@6_iKEwMn+(H!9&c0Cx9e((t>o^jF107-V%{UX>r zyu%eKc!#r#7lTL?2x7Iw0|jX*9PmgLelQpgcW1Vdn?`g!AG3X93gp)Q9GTx1amPVEb1$v;dLG zvM54Wpi$RyexuEnHC9|fUaHS^1>Sodte&MTC`VU>U4HNOA>o9N@1AWBUypQ2gnU3c znf9kcIYLRB3Pg>O)~)Cr5-GM;&wPlr?}i_AGuVGr6gMa9qKNi@y5umJHEx`>xU*i5 zRq4ui`*celKC*`=?8SW@?1Q=XU-Ga*VADN<`M{^V9`HQd%|s}N%dvQOrL`Ndrh9n^ z(WnDvvF_vIZslBzLWj^@18=zL7$%eI>M9!}1r0!>{_7eD>g5T~Np6H;zYQK)>blq? z`(hjfp=~cuu_+9X#`1DJnDD5hG!k@n83gt6M4@aD( zP_bQnDos{lKzdlPWvI>+UfXixs&=jl2cNO8ZyXBuoiO}p-}Kj~Q`0Ao;!{7LYL5J2 zNR#g|uHJTksw?eL@HPmfm66q4K#3e!-Mf{@Jv#3j^q=Ogm@5Y&yI4>24OB3T@Rx5$8?*bA6%B(Vdc*D<-2 z=jJ2f5Y&SY5m3!M1O>;X6c0t)DUReQZa_GAl@D6uJ18m~3d>n?UW(B&s2LCcCl5)b z&><+iM})u!!bApy=iYzf#8XMA$WF3hK0;&j93utUP*@&1LDBOvDHox5f@9=zzW;Bi z=ckg=9ne*hmvN!_2rdspUu4+4oMgHAaD<|`kes1dX}JIOLto15AmDO>^WpG34+Yof zp`0u|&qhd)kC9A-W=IaBnLc4(`d`o+*^V$n5}ZuVKm~OQq|110o|RHCE)+}A5jh5h z>LYyzko4`)o|6$g7vY(CUPi%alkyN0V3&oVdOb!&!ZH|rK6J+ku>r|RV(XBUg7FH; z=EFFAAqi=f^H6m@JdblSnJgk@cq|gR^T|3_q}{*Wau3-8V^$ph-1YLkr9lTm&+&&{*n<4&O~_d_V@kbNPCK4S(4_- zd5(wj^rSoznP(~ZUhOwkNS|$!- zmLNHBIsAnsVJ~1ESr6j1b6l0_mAtgg(9~?xYCXhR1EJI5PoScW^GO(g>nuZl3 z#pZDeW+OsIC=L(zJ$I-##15Y3p{ObRJWk7CMKMy)dJZ&NCgW(DgP~zS`cp^RbD-}u z&9L*JQ=kiBm?#GNJP-8%IUYoWD5yIbpcN?(Ltl7IJ}>2@u-!my4k<+r2wR>_oOB9o z2P}uNBq%|MC1Du3Fzg#L3Y3gyIXO%oY&LY?4-O3@wgU_%7(?Tsd5AE8_82XN36n>l z|2WK>93tB&tnaZS?XeK3u{;ujVaH%#A~3gdDap@AU^@WoOBm-^y6^Erofo$oDS?q; z&@Wund^rY7R?3m{GM>Vv@C1>;5A_MVBcjqscZ5mM7&!)87}Oe_Cs_s-F9S0xWm%RF z0eU$>a(&-J(iPBNN=YL$PRK#!S?Em|<|-5dOT zt$51%7ey!?s3Q&j4xgoHS77mUwc-!el+jdFIP-zly3Mkq3qkZY5+37L!Sz=0;>Pyw z-7UcDa4w3a?$P;QHM=V`R#z4*34%&DNLDEAgzH={8RgJi_Q(xjU)_n`Ok&A-bg7Zn z12vXl^r=EJ>WjwA=m;OU8jkQDmaxz9+{q&L(S|m6wRr0Xe?)hHD62{nCQCjIUDw!H zRjqSJUL~A$72F?sc>?Qt1Pb2my=AVw`zrB9!!3egts5iVNGa2DA{q#JLMAqt1|%lg z?eImt!gT49-Rq)+)~CTja>bpZ4QeT?Eh(OM$d&E?eCtA}t!}_9xTYRV zL%Oh90jL<^1X#*QB;vKtx4_@JToYmC%~_LR|H3hiWA}amjAJIZJCMVx$#Ak1QYIQs zQR>Ih9^OwLz<_;&J+AWyJv?7!NRK7I=nl)5t20?QtlX99l zVmAOY;xcWa9N_8ykzZisr0hKlhrm3b$T4AcLjpGBJ6n8Ee_^Dsih?3(#C*9TtG&YG{P{2U_d590hW?e7pAUpPvDBVp>-=$ArlT!2Aj#;^4!V z!ZbIaY;X+Bun=)zp~Tg^b9l?jq> zg5^ny!^P|<4N~>AgM<#K8T;s_EgRbpJt6u>0*io1^+|*^#K*wmpqn^%3%|zC!aYb!uWzLmEpZ23Y@M%3f!Lc5! z4KvpdtZ&0}KOk9lZEgK9^|1qM&ujPJ+VX*OB~j2Ruu9Tsj>=iHQI!-DpMlM(mn=N? z>3b~gKYgYJ6;~8W#@7H`x`ZK`XhiaOLa^TkPxKzL;P}n8*7nbCgZK8r_|(_?Zj&_n zrf#3QdMZ2Rn^sMoKXuB~%;euDUz_~Ve#GfaAIq~?&y%YCMd}`v7(LJM=PVf_!>HQPb#Bu$5Mjo9QUh&q7msWgl#og1Z zRU!7HZzIhY)D4W2W2^5Epadjr23cyi#O{>A?2z^wy22NDC$fwKor z99Yr+m#N=QJ>75XXZla*ACtTzdF69E`z7ZHciu5Pw2;kM;tql@hK4<5%DgWhmw( z2Z&DeSV3wp1HMEu)2M}QYF%vdxlZ$Z%@WAse0CwH4pSjdF-1-fblT@@hKQQ51w4Gr zto2o6!zdOyU(?_mZlQxZoiY%%#ITJ&M$PkaHPmWrM4XvI#czqNT#v+OL$Wj(HARy) zOjF_IT)z_0om4SGXt1obX3`nG@#w<3YdUhWoLrG6N{(Wok<~cd`gJHYJ4;p#Wip)i zCrf!*Eh0_LJ<(~N@uYl(a!g~9TFGLFPt2i+=d2FG*@=uv=BG`dk8(E9uHSxCQ5tnSvoQlU^d9=CsMSp3d9^O5t)n~qRM1`p`13SBzsVMKjwnhfkT!EnLXAz8()<|?Y)IYJwfp0yxwJ2relM1i0p`} zROtqt_Gbcmm4#e^GEnli43zn6xMX>~G-@-)QUf|9-CC84FaHLXDO-3xEuYrF*evv` z@)ozfQgxbHRmo&7)mES&$h?Kl0NAe7n9gG=t0yeE21zkGD@H;evXz}B+*MRZR=v7* z0F$Wl28GmyM_lH5G@cC_r928o%o}ixiBP-D)rh=qsOiHKk0UXbTw< zCHav6qJyzHPSmNe-K4ef6?bevf#_04HILVPPzJR|Ns~0U8bvqe8dlnzF68Rq3dOlJ)Rs5qN>Hb779}g>AZ{as=h9|- zjR+@-7G_r3`G8#20r`ENP}$2ylqoqqt48uGsiXoUoo2b4j_6HTXzl+YdRcApVYVoy z4%KyDCQ6NE5WS!%cnEuaL1wG*I3Er0lJgKF&+|zVD_i_*u%;%eiD|T0a`CFkfMw+6 zYDPmu+|}5$3iStKWit&;B^uKeYGI6(sJP_7Khmbzx{J}zl)akiQNS;rnSos>1TaxogeGI7! z7pQF5A;akKDwI-`b0p%?Op4dk5~;Y&8ydbI_0pzictWX(yBN1wFEbCg(63q+N>UTS zm_3Xw#>8ZKcJ?!fVKx{Oc(nn`B@=8|EyU14l)l8R{YB>=GVzeIft!prURj5Ld=0kt6P;hp(_WU9Kynpk|W$|q{<&Eki8mhrZQ&P z2K)GNoRZpr48hml-foV>k6}6Mk|y7ZYqx^OIGpFxRPSzk+glmolA_b zMRY1nCW)jvs>6#;K>VFRX*W3{Q;lKyf(s&j;y!(Ync0ng77su@XeOO6HGBXeiV+j% zqwg(q@-k-9=kn!zT+6AM6_+7;QJuCEg(4(FYK?j;PEKwFx;Xyn2p-3sSRT>|gMO1D zG1~oyq>@sRAq7^7D(HwOL`s}UP{Pqr;gOg*S1C9Gb{Zc?OFA15tE~i1+iP$+&e??Z9`iYs1o#ZmC(@hlQ#mDLC`U8&>}WlHaaESR$q-BLC~$OA*> z45cU@kw%7|M0B0Yroj{?H_tGUWGNw^c@fdo@uC~oF#wYShDezcoA@Q_znU$S+zYe{ zw-cnT#IYleZhKuxOGHe(gY(plK0h`7DxyO^ABCmVxtfu22F+HcpFwhz)oL`R*Qwl4 z@6=(yhftP5R<5LJECnmNgkv6$gC6rEF-%2Y#EJo%#}MJ|r3D%v?aHU2ZXeF4;B+z9 zlzG2wtgAkhqfy0ZNPCZ%4b@YY=ukPejZb6&?oH zYML5<4gD@=U~)L1Hw7wm-5+-)r@kp(92QiW29+-2lpf1hTsAAl(x{)Ava1{+Wf_)A z)1H!?i}a&yBU20*v!t(L#+81nN^Qm_P|{o`uPQ{1J}%8!%)vOu4I*963t>>bd>ZZ-9k?5@XDDKGx*0&H-WATVa~8Umdlm-hCe<#f#_+AJr6HQ zwbJVFz=eaHd8bR)25GRDnypEF&c|cy3`)kzL^&meDYKgd!LEpF(oja#T%dq!E>ztQxfnY7pfaXV{W1OjP_*vH&&HO@WDh-R35e!W~Xq zAeyFJM3$WmBf8B*>u|TL3{dtCZz)F3qRiHerO0@Rn#0bS$aI}|#U&(azhF}5vY0{7 zlZH&A;*8M!A;d6x3_gMdfWQo{XH9WtU;xo|kgiA;Y-X>P59X^hJLo~*rODWJA(da{ zF*+mhAT_uXHCJo&c7k(w?NSY0;1$V8!bO@Wb;hQZPoq>x5#6Oin(bDX z9WrinLAm5UB%kqCB6=RmC?)fCP8;u^LULr@2tz_FK-8CuQk0t*JiV_EUeUt(g?t85 zE=ew5$(JfIb3uwpnjJ|!6;`m-`i`W$n&V`6O|8irig_K&@f)A+(6cIc(Sh^1h*guR zR&}&&BhjJfoG~nm>1a=wrC2;)Ol;^Xkg6IiVBy+AL#v6Z;$B~5!%xr`M2%jz!k|bq z8qA@VG8@nZGwUqHGk6S(M&%7}q%0#gV5oUU8LLMebd1T`Lk(AQ{nLmXuvpA2U5FE$ zrUci^_1!Z$mM*GreNu0X#hJ9xg0DARiMo#~(h;m?PD!h@j#4K0_2_w-4XDZmQc)sP zNwcjM=4I<%Luj({zCJmGhfj`|`)}%G)cjGj_lT7z?*%O9ZfIeTMFv@G077l45l1xC z94Z?5*@s&Ii0Zj_^stN`GYm4H_lx7RfrG&7 zXvre{SDE$sQ?IFKpqzDuI?xy7MZpJva@KMg1W`aF$MOC)BmG* zzp*VNhay$MehW3LEmeTPrvRFnut0D%Wbt&(Xb*g=HM4g4Cc;7ECo!?M)du1CZyz%b zy!!1H6pUQnkafX#j$z2^27hn*UMsLJ;8rxC=ylAdGeUL30Mrpof=Sxa=-9$eB*7~egdbEZvm5k%r5N;m?nHY0s{`!l%Ojg4SBg<;DKNnYUOj@$-q2_r z8O(1lVU4uSU&;wv)_~IdKXv13Vg5;ockE#a`(E*!C+z>|af9s}pM<;;=#=Der~EZX zwT#zHPBKukCUtbz6g>76#6&G+369n7ZfN%jk3(d3`NyqOX3V%z&)KTRP`0AW(M3ue znpMK1KZbysr7Wm%0Xa7vOX=}H5l5AZ+CwhFl`a~~*-%8r%Y;NP%ysUe}G0YI?u!>fc7Uxc{j<(mjQPchH{yV~*}V?F%oMcA!+CapW455Khh zeA3;J<=sE;tW|H)s&l4oVu3t>dk5b^!s| z8G1~=@!r*kGfsQ9q3#ZK$=k=+p}Gp`{&Q=`nwS;$LO!LU8gx6;R(C3474h?*jor9T zcmxS zQDYoZrf~3@)gVOygVF&c)LX#O@o@h?TC=MHi4QdqayMu%fVe(Lr8?oC$5zRIwuH_8 zdjb0N8aeE^Yg9#WS

XNL2{A$oDuO&k)aN6j;zNHkMBoXCU>;B93F5DA zpPM0boqRN(PyVSoU2~Q?bf+)*VNwTO;|3|_CHKth}rmh;n*)`lrQ zuXB8)b+urtbO}z#TnSuvxFQx)&T3s^DqCz3wG^A59q#pj{@KaHHtLWXWcTR-5s z5Iz3tO@Eti*0jwik*B3)GU9Zppo|FnB8pyo4NeGr9t#C{cE@)1{?oWjDckEeZQbf$ z8d!P9J0oG?|9lA51EOC zL*z_^z#rb=mgy4<&WtsWg;IC(GG1GNby^TFO~aDopmUwbog)f9O~I=Q`* z52-TI+Ay)21@#;OcA3R3hsu&Ii2DvgEx3vEpv2(wz2sP+zfTZkW32R`Qs$+tE73y* zuUsN=*qd2hPA8HC2|UzK?g9C$S?K6C=qd#JZ|?kVPYVL0EK74RWE_K(^?4E%GNREk z83rm*=(!<>Ho%a1JY;|F>>cRAYtWX?_cp)^E;yDJR;Es(Z@7Xq6EpeAT-;L2qBCaT zpnd6H5W{03uuHqpP4|Cn0NF-wp6Wch7sd?PHcKqrHCC&NoRnwbZV67Ta7OBP#@Mm# zoaB)qntdzG8w=6?_)kBwsdMWLJ2=M@3&YJ>@Ib@>Pnc>+(@~EqAta8KGlP!IwWcST z)jUKv4|NkkwsvObv3hP^=}*E@cc&^hjbZLX7< z1(ld%ATNvS(j#^L)Zk^J^D(M z7N-eyC<9Q_60SopY=(jHcu4;8lU;+d1xonAz&N9I1r)QKI9G7R!2jzX>7|DbkK9=h z3O02hH-!K_b1a>)GKrQ7ZH|!!heZQ%C^d%_2_&$xBfDT_c`UU5`yT;g!^XL%cj2{Q zk*D!mlw-wYjRt28TG= zB;5gX#^a&GNB^=Dogo9jMgkMU=RwiP77S+l9kZRP1PeNC zMNraUbA+jiA@7qCQj??3owy!42Rg*#!FOHU%^up)nK_p=SoWp&F~(un8uD~gVJ>-$ zxs$@ddXv<tQT?Z4*v9S4nn>_?BMZ<$3~FFY~IeHX#B*_T-Gax7G*4cF5I5^zgPAp-~ROzrnsZa)EX{|*B z(EIS2;*rrG+t*#vi81W2eM>@^Jsgr;S2Rm`I+up0+Js5(H&E>TZp(u7-rspN+x-HEmq_T`hqhQDURvr+St(ixFqy`;z;+4mnF1y)h6{90Mu=IQ~lxWy*hGWFdy9DSmL+cEXv3Es=Drm1($z;@92&#k` zu`_{gGk^>}8OJ5h8DS!@G3)8R7{t3T2JQDTxZuUWbw8YXI1DbHwqQ-#xuz0vKrnZ@ zT2}VO0KTu>s{>D6K#K%^(8jb44i|hL7X$r*z4dkUnyWQF>otH!2b>K}O&Y5H0k#tW z1pul87O~yknx0v+1)F=%fdt&_Zk-Ck;dOWG-sv1aE&|Jb$OGNu^E$z=-UgKw+rE|$ zDl0k?futi2wFxO}*Slh_TU0FUgTJ+7)7o6Xj0yhpCxTp{1)er9;8r9($v`p;&m?RO zB|x)Ex*O=?aBCJl7-&t*tl0$e{`VWvX_uaI(6vij_fGLP47Zmqx$G2s>BN)36)pd4 zQV#xqJveU64Jh3QIel`%lGH$SESQ)bGND)`IvHDIt=3TJ=7E1+%@1Z_;NX?5f%RE% zX7rlJG$Yp!{JsC&ph*d-Ni;nTdp;BpdbCM&^h;ovcSd0|^LS{#awAtQ^^?&S1T))~E`;5PKeRqT zkFHZfLY{28Ql+YsK&fDB$0U!8EB)98AD`ge%%U)tRHMwtC5QcD+ss0+ImGnB3Y>WNWNZKxBe zWB{Dh%-vw*cx2Wwy|W{{@P@4dGQAHDQh_PZrsl7S$cC|>q?r5f7nGl!ElSxu^o zvu?z*rubxZ?D`MwK;P~C*e0~^m%AaoSas6^`s4oz9!68Qw)&7I**beVBQfS1L_@0& z)*C))RY>8PzB36&5k3#Gbzl$Pe>J!xk}W`>;crJs1@XgXxGLS6{D-Xy_t)8do#)dn zgW#6iWefN3Ua?1fok*~%0`}-?cEj`3sB`EU3UV_3xb2oOl7F;y*)&fXPAJL~A3cSl za8~j5kF_q{49OC4f5r@zP37RGbfnG6bkYj-AiIBmhm2%Xl-_^%T(dP2p4T9eaCTx2 z9k{l2DtN5du4U~SKRyf(^T@|xkMnp)?l5rpg1A`cO`mK9W&z)i_2skvUU&f|EE#_T zQarfXnz;^4@0u;p;m_R#cZ=utZ2qS}da%WZx9wW-;*#zL?Tm{|v8(RP?2x%Br6{MVW z@oG{OJb4JA&Z`i2>$5ku)mYTGxFldk4KJ-+&Oa1NNU72a?!|HBja3I zfv*i89RA2~Y}hg^89se@aOlmUUkyDz^rfNpP-Af@IHVsUhPDi?8+>i>XM>Lpes1tn zgQdYs2UUZ61~(48JMhxLPX@j*aM!@c1~LPlfqetJ1}6L8?th{Ghy929Z|~pVpXj&u z%lgmkAL)Cm@7H}#_I;)AmcFa{B7LSlQQzr(gS~I|KG*x*-urrQ>aFz#d-c6!?_BS? zb-!Qt^L5`|_xW}6*RLxJ-0Ln|r&_mX-A2K?f|mvVA$Ume8Ns!J4EpcQjqN~+H(064we1fSp-73Om(wnIiAQ6-Z!K)lSV=B^)W}sU18&pvpecFv2JqfAA zj)>Cg&Oo?uGpYU>NB1U5gdNJ&N-cDx7GS(5=!Tq_5E&O$x-ej>M;)n23=PiIbh)fs zY4Vi}GLuwCpLZrFM=H^fiJDm^$gbopd;onbLNfa9r|sx4w90iB*SS|u)dUg9isf|PWb zPNWR*ssurz_B0%SE=4+dQZvlRdUDIpH)Vk!!E zo~r2!QE?)iBo!g^R!+REoTeNVI^!1=5@wH-E@Cm|K*H{J1{)%6U9T|{7vypCvcCrT z60XQ%(FPdX0a0vApqntjls!3F%$bObGB&3_zKN4wcDqVsSs#yz{ZYTind*;WF(r4t zPKuLxi`1klLbN0KS4=O)7!&DjGzoBunS4p8y zm9$X4e2sKN>;uWs^*V~wS%ZYc1(4tNMB)Q!j-k~tgdA%0rb9)K)ezgR<>V7K1(g;x z3QAe3Ay*CvadW7kp@AnmMwQE}czjn#O-XbnYt$sPZO>A7S= zMkXrpsE$$!rMdXPQI4*R<|v^oR8fR0HiH5%pWN@eAI;&9jkM zYLRvq9M)pNqIWuEIxWYr`AFKCa|p8lpJ58pqns{h)g?f(c6mcyD7TRbZ+eewP8M~P zF+<8rK}sDpr|dt+^h}D;5)7ej=9TqGl1%oUhr5$uN;Kh=F&c?Yy%_acFUHv>47~J1 zB2Kz)h%mZ>gc?7SYfdT*0ddLg$T=H;*}L_NSbEy0(2^COh>2DtvS32G4hL&9X{)$K zH(lWjsn5l0PO0;QTzkMABfNf1&{2~n=wwLT&7pz)pO*Twlu;b^HA8WKHXz-72KNK0 zQcPEKmP(wKm`e#zY>qA}LA6sxOVN!+AnT4yzl`arf=@+Qiz*^-HOotSX3IGoJ)V{j zMtiU%O*>4QY<#?g$CdICR$?&-!O-ETUv9ROIAW4XY20Bb$q|B(e4o6UqeM7-kV&cZ z@<^=|DJtO3(nz@fof9uFmPm`y;Fi0a5}7u=69-u{DKW{Aj)Wpd08C;7ve=)+?UT-0 zkq(v;0go~iQZ35D+fU~h=5T;WG<~r^N>mQpq_W3P&^-l8oT+P@xsWVmOfBFrVkT); zMTFW+Q)#w^(v0LB97o9{HDCnDge0VpxNKPm;p9G0NwLvExSDpQTJKjt;HvgoRy@pq zk}yDAaM9wnX}xBbIVQai|J_6#uFIjgRax-Fgw|wyw93(|@IVfVDG7;V#;jaweG$)R zA|WkAX0>0MeKQv6Qhv`DbHdG{;E%&D`>(F9Hr01 zD?ufx%+eN{Uz^ovcin;8gKh|EnLC|NmFXDOj4HVKXG-cOk@s5ZWL4^P$s>aw!tI$b zm~4%u7|dD}jD;b#$jT0YJ+vNd!Md*igEJ7|)a%vS*n~aoNX;3SghCI|F>Epg=F&ZAn zta_Q2(CQ3EU25YESbnrzD-n!Ll2tP%g3OWg+_Fa_2^lRFi(N#l0fl}RrRM9oAB1QH zS;)HVrb3|P%Sz;v9NnLTGl^VPcNnw=hc6}O<}<3#>ZycO;S3i&3cD(8=ROKiWu-vZ z^ZB61p0hcb&?PwBmWdMn0+lU!yd`1DR+mOD=*C&Y{6`u&V_g=tFm8!C1~raxR6i4e z_q0sFgP6#0y)h%O(zgxie~ z3GD=EAF0Ws6+-e~aPh*MxgUs9aVo6wL2^YEio-@`&&Bj`F6tmW&49AbM4T3<^o)n` zIVtS-*9|eHI$@E(8EDflxz!^^IzTbka;BEj-Az zUnHGXD(Z9jQ%;pR8cLpN<`_iXKxJJqPdz4;itCZx9!w84N^&ApP^oe?9hr+!p0`iX zMKqCRT3*4gxQ-Cq)EB*YiE_U?*>$_o{u6x67roH6@#9Ni%mQRZ}66UzBR!Jt^I#Ppy8 z-g;|f+Aqx0MQJtG&VJmrGiR}<1kl5vXK^FNsGtB_?{;R37^oyejs%PzQ$qZdV0!sg1v7psAi zBj8J)%~@?5wPSLbynoXvXHzssH#mxg=6%^)G8wp>dLX#13Nb(uX@L1vM;Aa>cQ8gJo za(F1?=mu?)&=l>IUY8HJ64XU^VAPp>H(;w*G4$PmS4VCZ*BzzK&V z89*J2L84N%q#)xuBD7)0;0M3f+BnH$A)@p6P6V)`vz^Dj22MdXyarJ1xp&!AJ!cG( zRHETFQS}rfi(pR%g&@3!&qGfX?%CJ51+kt*+mae&U_WP70iH?98<)x~8HrwH=VaXQ zRdA;8dB{HV@!c4S_KmNy?|+UZ1qj04PMJsOiqUzdQAkL=`i3otJM-zA!Jo$C0g?_p z^j|XE+S+;ZX51mRI05cZA>=C8sHC@=5^ESsp~-dV%3DDWkB1H&esm{#LH^M#oyTuw z`(s;zS_zySuP$gQP)3`Ds0e9qCK<*3>9k>Bd>+)AKe`(|_#)I{ojbt3qDz;ccmo#& zrixjcI)awfitAAc|iQp#?B>owq)S!T-$&5*}G2R zzdMLNKmYJ&TKW@@)y1bqdA zP?tU}(V?~D%Ue39eG6uP-n?WOI*(H+aYLn!IttOGt8Os| zGkDIT_kxhs93-evXB{*?x3%;1y)a?$?yXyyd7&`?K7*>P)DQp9-an?hQXMv6m#A)G(Dk6l2=$}rQZ zut`p&tG-&C3VEVdY@Z58z&`O<=vex!F0SfA=h-8m2lJ*SCrmqz2nf2;F`M3*^2?>* zyfb4dhYrK@$7&AXQa{X9?C$+Kt4!9V_YtLOW4cfz6RHLjmrN9FG$I~q?VMOmMf*4W z4Pr$GZ|ytyX$blH(nIioJq4932-2XISaa&6xonKEKb%2x9oTd{7Mgxq3b8NO?T3(+ z4m_*QyH{pH=&}QNUn=Z&*<_MxI2mSL?;FskegaF!$*W$I@XaHf0c*#OYir1rMiB!REaDryz#MLdVIQK?T`>mB)SxVotlpwq#xDkJzHr zDFDa0RF+cUM=}QSQ^4!rgi-N$X#d?;!4uBSf_}6pIxy2QKEl3F1(z(aJ{SfomGt^j zL?mF*S0gUHN{2rDZFp$=2dd!5d(0idcR(Gv;F(BIuWZaS^0A>K1IGa9d{hu&gZ^05 z9s3dsl8lF(3yM`vs!A%9X*Z*m+6g>$kNgV8%;T}hYC8{p<$<}*{C}}#+_K~WG1#m* zoqj94aXS3^U{PJjic?t3qdx*MJRS=E>GB;=yMA+L_Q&|^bQy@jw!{%LR|`bd4o3lp zH0Q5!3wh)7pwm1SD!8ZMW3b`Y&7I@V#;DXiL%S?Kc@BMAZ#-v{f#Bct~E_1)l@&7FI{&qjlZ z6UDHB6#J|$Q4WyM{R#GGGidfHcFkAw(D5tZ-f?iV~$>c63kUu)a${5Dp2W8qQ#aw!!O; z$}1siLT(;D`vlAbj|VXvpolCY+{534{%}e(+%wSXdvx7P6I%qsW5kGI2;zKR=sk}1 z9&L?J=SgLvLC`t3+LH0rOtm!H`$lWi=~9XyPRe#r@|q#R7cYS97m;GF^Y~Hrl~Lc& zYICGd0eeQ3DXY~nwCh=za2^@$|HUF~TrT*k^Oo48WoyS2pA5lmY1o@@v^RB> z&w<5(I1ma&2cB1H3t-_P$1ANJv!~#8wmms`g8O>`H#b=g2zI^%Fb?T z=|tyS$KlYi;9rWZVDhb2UQp>BZ>_D;=<(8x^PM~2YC#rdIqLS!bkTEGIfibctYE>+Bg@O1p!+b|tG9y*pJaHwEs^#9lhM*k9EpmT%aZ&WEN|8=eX zEBL=p?CZSp*KVlEOz-}_SJ{u!>9@+-r_hR96YaH?f=dTftZQF>sx|%oy7roDD(*ZZ zJicFm?&@npl4{dk4RH}PVe+24jxiZz>{pz<(;gZ8)Mr%F=o zZ={^-YO|3QZZN=pDAS~G0Jdqy4-YPW0D!^0 z+%OEiT)PQCUjF>XQ*^MKRo)FOk(>xDf$}^eb2FX+OGN^3DB*|y0hgR+wPF@MFw%xl zy0x01W5t6cy64)FEokd#`&2=M)zS97r_#86W3X6jY21md)rmHg8iGe+uyUDhFrgL< zs@LAMcs)+4Y@oHZ8jJ%8lWL!JJKftNblTCd6k z3zsfsLE~}BNvJbjuoFVHr;_&*o{$i-roo7nwu8R%SjgW04i`B5%kAxM;Ba9@Oo0!x zhVBuAJwn@HI(R(v#KI>CWb3_m3hH0B!6-SFSjb*{{w}#al#r?zQ?`1x?2=g7Z!{#` zSlSz={(*H!15xH|#mUaMEp3RY2cK63tQ&R@*~qffNyOceB<0KKs(5a%HMKWRtmYuW ze;wuW9A7oHyH2kX^acyb!B-A0mBNA}1!%;i93qHV+veQShP%mX9+E!=`H~Ozes#X{ z@D7-r=}5w3NE3{$ZmQGzc)T28XJivPXIFb_iqAvs^bvXI)4SSk!IaKcBZag<<0?lh zdho&GQ%djI?1HRjp(mQp?La4zYTm!S{}PqX0VC~O%CXDS^$A#PNwtYAr92u6pz$1T z$THvFo;gDdNcrSRUsols9oWjM7+v}F`jO5V=eG5N5ez*d>FJT&I`W-8r}aSSFa#fR zp~F0V;Z*5+x zsNi@4@JDEW6OMl_Hvxe?jjp(z5|R*+Cq>__-I_H#1my64Y7X5ZYM(0n?sXAZ1pcCS z7kuYGtaT^&?%Qlcu@npeeCog!S^&Kbf}Kgb2*Q6M@ENjLw}Gb2%Gy(#)@}iAfq$jE z;sx#XaI$2B`BFl*GO*Qa2d_R<$a6u^GOGaSfeYYotlfmISqJ&Y)aM~t`odF=ynZ2k z9enp+ymA8OX%MGr=#ql!KIvboutV@6=%-vgMLZP}s ziz=y?~fA}b*Y%iPXJ)RS|8 zbD1?D7pTF2@OUVAFVq(U=hR&1PBj=JNRbBIX3j}sBXxkyn2$kiVYNl?MbG%aDvoR6 zh_#x7wlSM_qN~4fXrWWkw!tY-mRN!&Dk?Ne^>w|_lVWfOUetj><@3<~XIUrR7arfz zQR&+T!E{~|DmVy8kn@Y;^_n5W_5SMy_%WZ?b&VhVG2pOoG=edn16XCQ?{;C01ZdG_ zteFx@3{4j{#kYW6pZW(@p}^wPOKzC!{8`?H>vhEvsniK+Lms6yB2O65c)IhKP`1}k z@_6X*TN^oV>eI?L_%rNFSFQ9RQSn!@l)ap@d6b%%%n2@Hb{#Ii0!G5;p<_Rp2K@dY zycT@t3NU)>>peq1=rw?E{jUDg1$D@Z?)ufQWc}*Py|6^s(~(KZtr2A)SQkA?QXaSp_jpIP42`HQ{H7V2ACe7~o@ls7}xx5lwlk1n=iRaNk(I8< zTwa-h@HmWFktL?C1C&3^`wV(C(4L;+^Pmpf51=oVPtJ7~E@cH-msz+PJiA7jH%AZv zA?k}uoOz!nj;D8@8>W}X17AyP=fN|t+uXU!4LUScwCm*+QcD)5Sm$5zQ}hW0=C7F*|TzEkwF#{%hcKXe9r*oDz7gzPwJNkv>!IwTZl9I9E^)jS?V zD(~OfdEu_xwhN%_R=Xd)oNI5JPWKFT1nK_uz55`=;pMR_Cpy!@TivV)S{_^(G8qkf zpz4rMU&@Ecf=?-hLJ=@`@5N#6_&fkvIIshq|6kzMzC6Kp*SgH2HQ>2Rn-#t!70jyQ z(p1A4C&jEFC|$Oi3>8?DtXFid^H7vEKi1`;mBSS6Ed#P^iEc2ucts||J9sAp=4Ukr z*}ac}gBDEKCmApTTP@3@&DTT$I4NO#T;_bbqXJC0K`EkIk|KquN~SpEaVbdiBy|? z6I>nvnfTlnPb3KsRTJs-GK&j>&7g1}O#SH+C}4C_s*94>3=zXn_~V&{TNgUN4YP}2 zUS^>;@FPb#?g;{NjxsAD%z0k}AZlRvkXN;ujFD&{<8gB*)Bq6+#^rI=!gLRDj!M{{ z4r)yDq$lGyQDk=l5mjqXPpoF4!tHyx=c#92e`7PcrPhAu=Eom6lTFI#M~~Fo^IXdG zWjzz;k6k%(OL~~Z|&Ja#dMB|9rpnhBg*{*NzoZ^#F z`zPm{I!CXE6Y;do7gcI0Z7!J$3hUs>izCU6@Dn~6$@QB|P>2J*z^7d!U1rfG@OCZH zW?zyH*CglslYiQ0}T+AGHM&j&y?k8JwA= zv{-Vo7Vz33`$xY6iuLN<^PT^>s=bfh1YLBA?h=}PdXJOHX;c!ijwmU}5SB?p2`1sm zGI{MF&1UaP0_&E}zkj5C5scBe%mQDex`Gu7BBP

!t&IjNp{^zt`xckDl$q!+#TZWk}SF)H@RHepNZ6%iIG*ZHF8TCiV z!ZSZbBB7@hSC0#mmtW-*(kp9!U+Pl^jh!mTs=7v@A7;HNWa>cG5i*?NwgXB22%c6j zwqkZCspH;aTvO}Ry%D6p*HrPaL>xoq5h@%YfM@@2)$=EZ?>vTKMGIG)ZXu$ob0%jE zjx2ez&8A24lw)h#?!0gfaFSaY`4MD2v*0Bq5{3tqADKE$>bNmPiLJtze^#z=!%^F* z1auc#*S4S$(OsJ(J$MO-m*Dr_cL8e8M+*V#+WBbYY~11PKfXY87_zTz-Q@~~vp}W; z>K)+V`oQ=IW<~FI!DwGw*?u;r@JZ4aec8jyA?K-4ijjD9i6Em}DMSN2uLBGY3Sf0` zJ94k>K1{2~{~M*V7e&7=I_=2h#t6mou}%yaAFh0{fNX$pWD=d-!&$LKpmLmrE4=gr z&C7ZxIWt{`=i0fqZ@LVR9@~{$r(zIzzY@jWc|d|&w?Gg`NN`9e<k>;IQwNfXF*wR9kvsU`@OwGtIx%tPdr zy%2dLEaAc8(;_yzZBjVsxPRO5dtQi7Jidw`>(b+EB}~&D(%aKAqVhAmakcGq@UL05-|K=&5 zlglD&`}b?tZD>b2cJ=X2u}(W;R&UW!59Aw!K*TUeH%HdCEspSnM{A##JvV>yWEyT< z8?xswQOF+6x)riVYBBHBRGL2GLGuGkuYszPKv zqouk!L#xJeD%>1}^*Dxil)MqOBW3LIy#_;qr!EtISUTY-qdln0R^xq5)Nf*Gjd1^! zYs(8~5(OXo=mo>6tDpg_&O%39RUF);yjbxMo4={}fpUxT+1VB4hsQ1(JFsx&cy|8& z#Sbrhc5Ktwrx&i6Xph~wn4j4_)?K`L+B|)9{OO5HHdm)-H{XhvlkYAZociR{JExjc z;aTI9X7>7NUU6{hoY~~;e<2~wQ5wmrzY1eA-E^+E{VXKCWuHxCLt&2;twRQiN+Ige>H|fCyr(THwo8QS9j`a zxpLNJ)FVKLhuF__TreGYjJECpyIfiP!M^CQ8S9H;4)52ckZPaY=@5PpfR&`F>*{Cm z2%OEuf+l*;N94MF@u2e{ND9xxt9|?^{7`k&<^!kt1x%y9_y`@hgzyjz5e`Sr`I8bi zj@+msfDg_%V@M58Uv%D_o8BXH^DcPZy7GFA8ZeRi2!hI+R9hA#Zmj1vavi+f1N{>| zu*MkW&ae79^S4TDv-pMRwU~fZ6tp^c*@g>Sc1TbQ7#U3O0 zDG!9w&cd?XG_tl9;BXr*#f=%9mM(m?yEK1H;>Kv?coh*%ao%7B1!Hh{h!I7f8L6_Z>%oh9EaK~7_OTMe zIE3sa#akpUJSyN4?aGV6TznBLNbM?x^V$ z0Gi@x*J@t}2sMB;B7^MgbEley>#iD0igv?q+THhcfp@E(yYMtO2#;zbzAdOD+-O={ z5sI|LJ==lrqj$L_t{mCJ%vna6MgT-O~G$HPYL zJx{6}##dsmMB+J*1qphM9HvWO+UAnD_M+Q@A-06DL4BQgo5UQ>YpMjL(pXppW-q*If>?$YdvW1|G8;-9)@{V5#{NYy zK8rEw&wWVdb`Z{}b_1AL%x8>Fz*WVkT9CJ*4^Ar~1O^r{YS5vLrfv)}aO^vBU9{## zLSUO3Q%%N#t3`1y=QlqjvsDP*#4!7_z$%6uD8j=&o|~7qBL0qGlHgr~FUI~47u^_8 z<&0Dp+@Prsl@=4JqoFhtSR?BB=TC8CLHNr<$MnD#9WoIu`+A#KdL8Oq^l>! z3t*waEy!P7{12(J3wofh56wP{?T7}TsOI&>iK}F;=);exLU&3rEWH@vM(Hi5>SANs zOQP>QI?#tp5S;cy^w?!m-Bt7n%Lb{4dvFe-a0F41&eW7FB1DM=C^!=HYl&eXIfxo} zX(B5BF!W|bftJLb4#A9_6gP6Jsnc8}TE^uHi&Kmlg%EO){?cqgu8WZdceP~d0*4tw z5ehgW62|0{%?=Q14gv^A2LzA@yIov9GxFIb`e23dr3ga}LW&v9;z?JS__^FPx&gUi z&v^`DP(1aKQM=D)cYI&sBBBN7gn0J5u}_e5n|Ag6`5li* zTyZCe+Yt_1kp4jN6K_`Zj!#Nl5g#0GUBC?&^J^pCwuB2vX~)KHS_L^Px~t)k6=RNZ zXl7LIh^;q!-$rF{#TAWU7)U>aIOBrjL0s|JMG{xn7lk(j4=%2N!R~VqJ1qf3Jogi*hSi5jP zE9~%YRE{7Lx`a6n+TjR>plSFOLN_9ITp@8q1a53y#O}t8_;Sp%J7O=M^Fz6A*JaE? zCWP}I%POKla0e8Xf!$KCBVrUWqNaiJh?^k}2^%DskJ|kSsn>e3S!_5vrUzd2j3EqlHWmng z2{AD^T78`@SDxaY4fTE3q0?MZae=mkHW2cyFQL=q&d*3cY%jqIP=N4(TV$x`?%NR@ zW9yys^!~9`QOP{}MSPb>Y8pBoiNy)ggcH9L7geuPh?u-hY8vN$A4rPE4EBm2lVO8q zXrs^h!>PJhHBd{id;uvb9=`FQySQ|zR2REzRSaelB{7x`21Psp)q9_i*l}ntdK@m| zNdU`;s4^h%d`v#~;uswnjA zOFSt0FZ#N&{(;5Q$D{{C-B=0h(rD_5vF+0#sbNTHNHI6E+q)4kC2IGpki69NFC;e3 z+L8@=14hdTZ38&(IKHSUS^p55gbslN(S>9KuAmO*bvCP%KPdzyDFkiJq=IG+>4G0e zshO|IE#r7Vpq1!r2~`tk95z!nJ9d|>f1p3&-2*BO!lSUb;d)#0QPW?QDkD0}h~wz{%cIZtdUq`fbZA=n& z%f2tlea51Nq$i;fZG2g#2gRnp_sggH3=v)sMcyiWWeXUWE-p@m{eFoJ6)_KiBnASC zngF?R?o<2a14L9EAmIUf07Doi6dM-KZ2RQn7IAr^%!B0#HzPt!BY>Mxcl+z5mNEV~ zlEe!N)(zH>Z53l;FKm}ja`B9ZtjdQr@BlnP*aDH(VEZPivKT2Sp8n#vK&M03aEg_7 zGN-r@NMiG%W&<5aTu7$=epzS2DH(}F)jmRC3xpRp%#r! zJ_O|13)}9OxZ)tfkryHa`X5$2PA>Q<@0Z0XJeRQm0O0^%W0x9=E6zyNElG8u_ZdZ) zTRrq8HsD%RSPaX^@uuFthy==Qj-_HnnM52qzcc>K98rK3$NWZJou5qtZXVWWng^L zto!jfl2J_?_m?6>vl5SWs^ZmEn&wqUUcpS_BpovR;|PrcNu+ zEDG8jYK)MDNBd7M58str6LTc2i#f`r*gKCe$kqupoZ2n9C|yQwm_O#%R+e5t9v&^g zj~cOerQ+JTFuS?Yf@F5^;%6h*`jwuc8=SNO)xXWrr>x)XX&rpq(YtB=AMGNnj-cjt{78 zObQr=skBCfu><&=@~-=yP%0FMk22RVz}I8bfWG9DoEpe#3GO%`Jb@iYBoYah(5e`1 zN_p?;;%XwvsnT5fIIuYZ$*Cp)$(cx{k86_2B*6f~GLfK_@7XB6yu!1rnp2}3qfLtd zaX_QfG5`#P6;2C;N`|5}8s$I8g*o^vrpPpYIiUqKCIL**q=q8^z{oIEGNsn0HMH_w z_uViBh_+=7qopY-36w)Ea2gR_4j@%hb3B~{5?unAv493uzVls)?D7f#H{tx5K(i?Z zeE=%u@dOV{w-m1-)ijmjfrzQh-u?a`D3(_Mn8}kIl{ikN)93=9B#$R4Eyj=GXjMX` z)uaYcu3EV%m z2Jn>tV?3_nXmuLBgMUt1nLu|BA0@6y0p^fQ(yHS~drYDesRTwCQ^OGesik=bh zRU6~5yuxs45l%FHoCmBcz7AN7NiCN=uIAO61cT8~CA7+0<-(+fA-S}cJ&s8PE+A0! z06U4!^B9m6fEEF<$tiD>3#%xGXHr^mdNB!fngrOM8skh*DK$lE2_#8PC~ue6#SuWY zCbWRb1pp*X06Z0#ctC`uFpv0sUPA*`mro^?_bvTFsW|Vx+h!Gt@s*@T1D{}kg(i|J zV8|j-oH!_n;~dM8Dlu^bo#d1^OFwXwx<*6s$k<2#lMx_>=nnymULp*gPxpt>un9_?WRCMd#KpG)%1;YaP<#VobQ!INVAU$6kjNf6d`wMVqfMy*9Y~=d zC4K_1GmmQtptP!z;Ajv+OeHwwo9-j#6j&ulw56B{?e1a~Sk_ zh2nfHES6z`X2?^=)ks*35mciqNWFWUz*c6^MGDxe%IoC;S6!0^ZYZh3ek4giA=6ml z$CGLNi=|RYLaSzz8eXk@z1$boHE`!jrWj4)c$&e=2Bs;1M^hwq9Lt$aX;>Ad(o)L% zh>0=9dGEbSoPWq79*Cj*ah~Q-L9G#SkO3x{!m~Zia7iXfaLU)+{pgtD{AC_Ez?2pe zflLE4ljg8HH7X4U{8Se537Ei4LhF-?avGl9SQzj_#t@2PL|h2R*(3pX0N{wGRGddD z%A_^P1Q3yr^Vmc9LI#M>DxghsSP3csS&BfJ{<{p*`!i<@OLjAK1#EYBRGZ_8sCpyge8s6B#2ZJ z|4Q?kG?7a45Ie$B3HuhM)j$~40yq^L1mM6l%WcCd;Ss8H|=tR;98k5{o6B=8mfYUXEb~ zn0W$c*>MQlq*@E#B+Qtyve98R#sWK*#xSTL4aJd5LeMbD;|!03icqV7LrN-(a$%Zc z)L7_1NY{$z9D%+=$kD*c#%Cnc367;x%CcM-X;)PVG7ag1!vy07p@*{;f29H93n7t! zgSfJE_tItz1*5?cD8f67gO6pTB_P27^qjzcPiuLaXIQl|Czf4V#-x#`FCO(634(;2 zgL4YDDUexdHl<})PFawe6$L)YrLe+)u8nmMQLSM#;z6L+5E@RSB9dxl9{pWjK{}Eo zjt}i|22k!8U}zAcu7P8jBGeq8qLREy$%{oVSMyq+!J~H&gJMyf;1Cq);}`@SVJraU zsgyD!xnX@u%zN;r*>BHm$BT1w>{i9_Q1XB7f&WotT}*)ax^qQ1oW^LvaN*)x*LDl@ z?^>H*9N|fc5>-yr2oid|zVyO4OFJFVus!oS)Lw)HyC{OcMd&9WB&;1$CqL7f#lf6@s_5HX&Tr zf%^*+i05jAwxDShw2^i&su9{^u;2(;ct+7i3WLp8or*I1OBWBg^m-h9kUV^{>1@hL z^@AMJt;Tvyi$L_yhf(TK@#msRp&*5i_17+1q6)Qqm()cyL?RZjQ4s)>_25JHQeS+s zKa(dM%Irio)Rm3w4~yu0;k9t0s>Nwlj4*`yT0^3o)tP}s)x-5<_*&d-MtH)bm!%Mn z?mRXz9DCgwfL<%HTsuQG+!<}vugTTaNg?@qeE0}iQ2gswBmp^6*ezUp-Qi1w#nrXH zY;|o~n4Q}-duaONO|Hp1$1hcWP*k$j`)=}o9I!SwAH&kvVF+6t>5Rs#H>XpHOqdjW zH=}3QT@UxLGdY6dA?xz+ljP44lMQZ}=qn;paF|Zrp77U9ja@;ID3ICU; z-mtcStb1oGB0O{Fd+mbr#x>)PfK`W6PfTx$zXouL6@vXuYth}X%pfI@3073mRBwls7}i6)g$j?q z8}s(PH?3{idG;d0?Kc~D3R|XPM}-sIz25&%|8BVO1Gfp~2iB&9SKYj}8SW!o54L&O zZSlMY>%D01Kr$pG`?(noHfQIak?iNKqJvF7)`NWp50*e@G=^Zr&EWsOo?v<_d{EBD zg(ut8?&0;fZbuqwF)CO%=WT1VyZSIZ!{h}E0ZbDnJZ6bDo0;l(iVz@#g-xQt;u8yCJEaHPD=Jzw1D+Qgl=txarG zjBi@lJx7dxdNw#+QjAaDrhGbGH~MlWXJc;&kL)|NcWAt0 zEe71!npu+p_FP2YXW}kfh7cY+=l=gk*_+47Rh9X}sovA+mF#;0NwXxxx=U>&5Nh9- zTYFUyQ~SQ}1=_?2q97(BIf96UMN>rtBFj}2hR7g;qQf!_E}%q31sPL4$|#P@@40nu z8oKDb&ihyLd7jfxoqO(co_o%-e4mx*sUu)9dUzaAuoyjm^_P~h+t4w$VA?{*tR-4k z)rj?V6D5u%(G6b!6V*#bNB#F%*vVU=$oPXB0`>}^6!z|*lj&;*Lq;8{GH_wZ^R)^4*pjP8oQ!?*G8XE?8C6N%38rfytE(#P^R~yX6(Gf3$86}$dyb8* zf!HJsX%}2p2LvI&Wd`v;F8+0-b!_Dfv}=`0B=2pO#RsEPmweiQK6md~E!pqxJ$CoB zGvF&HNCnf7Q~}JotS7i%Ko5WA*z{B{3!vA;XDr#FV_?Z}3Luv+2Z;wsaPE@eicf|} z5W%6|c9TVVm}qXsOrZRaKmFl{qBaotq_}bLhKRD zS$89yFBFMLLiFD2Im>8t;$8Haf3gZgM})1RbHaeNE(ni23eCt*^-Bgv$M&(Hv?e%4 zSx?8|7=+u!eR2Zb`@Lh^Cws`~)NKc$Iq5-m9lPfH;HBGOJ)NEx zp$HL~1|?4(hdPqoq^WOFBT~BilV>_Jy5!lSyEr4@PYd!H&Md(-5op>t0`Zut%JuHCw z*~d3*RXoeVIG9f-K@0{xm084+0-3SNE6H#+2F_bJgRDR+pMld+4+{yFzS`}Rx|Xdx z1Lk_8?KB4xi)Z7rN5u`onh)d~mS{wl5TS>E0uR(fhPIJ2AY$dM8`+C~3c2bV&8K7Y zGpWigO(pFXd#fo`R^tf=QT;ivalK@~q!@-n+7+K&&A#;h~+zt;_Rzi_?w4V%8(Us%NS!S8%>FZ=fwz?Q}Bv$FQj(SOVBkh|7rt!|I7HrRpytf8O)_sWWKvVdP) z<0W`;JuHmX3IP4<*q^+_i7}q$&}y-_pOLyrgHUEu7CeP$EGk3h-@`l>QUP-3f*G`> z^`*7!$=`PiBW$O0^Aj;t;+_Hpt)ZYQrKygXqv#huf_K(KhJMIvx1&34kFR50KjtQ3 zJzbjr*1L?gYO`4`I7A}3uPGzA^XJUOLMkF0N4tIh*0Tp+0RbC*r;GC))_aXGXP?)g zFTZ+h;)C}2g+FiF%l`FMIB$TjKM#+Aef_mUrkJ7}#kAIGT4IbHjWCc6%{nwWPkjBrC&76~5(!Y1;*MrL^E*ialeTGWPL_mJ-aD?R0H^u~p7^BTbbIWs4~T z%`9VyBfo(U(M@lIIqqSh!iD87Uef@2{iUZ@v%i0vOBuGF=3s5HDWvQcWr{F)!@{CA zMoL7%uB^9y%Uy{Uvbd`Wto@sJtY`Ia!e&`-I?bUK;4n`Unio{W@?(7A%n-*AV@rnDxCKJ*4WSpJt#5wMVj zh^JneZ>PF~{lPDf0erFXG>00DHCm#Nr5SNPs-ts}h}k3JB+ZO3prQjWWoFR++MTP} zJKx}R$$I*u^UI>7!oE0R1T33SDO^|N2t1WLPQk~%mxoSn{pxP^-BU1!jrP+V=rB$Y zm#br1n$krL)@VbPP&vY|v@=t^RCKr`g;<>DZZL(vfobqIsJ3J*H~PhX^UxmzwUK`t z+%lnJw+b)W55LgqpZ|p>nb8Db-P3WY8;aH{60~Iy6sebt=DxdX=E#n3u49i3f--Hi zb~rp-yyPXFw5}(W;TqYDW}HMojJ`k8nwjh&qZ4mKGu#JXetHdi>CzU&3ay>Nc@fg4 z0zfxJbX=+pdPH&uHiVxQv{p=gfOTM3-*)ssslAr%2wI?uOs5az;BC=N$Doof?WAkM zM$TBZO3?od!Bl$4=)kU{kWBy7lk3>ja7!&%KQKQLui2;YQGvQC;wm;w>Rb$2`awVs z86CdyIjBxqe(QSnJN+%tKwF2y_Qi8Z>C|F-PHZFTMm(D%lIV`n*7nIBDmwY<)b=C0 zkFR6TS=NH;E_E!(qzPl*D~h^=Dm_i2@)*2^UNQh6Z-l~}vDOt}bUGXaGd4QrqLfh) zE?L55s$`;+MS_BxVA?%oboBMhX4uzvwgKb%)aKT<<$}NxL11Fr(3^v+;4^jk$P;5R z&e-U|SnTTz&wr-OS%WM?sqM{LKv(xTl`(YfG$(x_83}&3gFwQ&E*fY5G~KdtYBmNF z#EM+fo2wDZUQ#M*S~E&Xb3#Z`24fT8;&AHIRX`#KJ4`?%t`z#wdL^ZJv?-Z8Gj#mHv95& zPMEc`Z2nPfDx)wGmftWW(SF;cPs&zoH zHF2gq3))^l<`^VB0zMmLl5zQSkVTn-g}DiQ0YBK*I%n15LlE&B_x6Vl-INia&A)Ap zpwG^$O?i? zCv@vYt?erp<-*Nmf;#L}L++{pyZ_#2z5vjG zyIS5gkURzz4&c60K^~*lo`L*ss7;8GoF)Ng^tJJ-fO07q7J;fIPdXzDv3UB~X+ z&239dhr_H*bnUU~lt_8)ujBQ2kQq#(3DOB3cu zsRFnm0O$(^cp{ijFZt%Vx3(eS$`k9@Z;0T-zd_dF(2KF9@uz4~NyZF9gQc9cXl&qy z1P5Ko0$=S9unt%rgRUhL*&!CnxuL1hDQj!%JfZEeR~} ziLk&{KTg0WqL+sVR4Uv3~~TB>APtCi~hn`#RMU2)cc{hDEK-{PD`l^|t!R z=%JB+9r~ZaseXyT%6&T}U`WHAO)!CvcEcoYT`p-PA|)b1$Rk;gjX>fnVVQf$=;$R@ z1N-QeU_Un=O_wQNn?h@eZ=Foj++OyN2+`!DJiKov@hwzQoL%W0iM88z#I zL3FMb^u33SUO46H7ErHdZ`QUh7p&KH)bnP`|KsH1~@w~&Ye z*D^Ec8ufjv*r2`z*yD0jBp%)Hc*R7*m&kma5tGB_};Xu7{M=G(z5;A6;BB?tb z(Z=;s^m#eVc_9@YxRQZm>_fS=Xh_ledsitgQnog)#v!;BOD5J1-7~gFuwrz7-ycQ} z4xp3%>A!KusdML#Q&Ne`lP9biZzYzi#B+oMoy)-c=p`dT!*eNn3)9*sn0BVsjSS$2 zc!`3Z)_G_d5;$OCddSc?WF3KQ{dZ5YRY%Ln9ZNY#UwkaJdFo69Vw-*jnhhmAY5XBo zUE7+TSja+$?tVbd-g7N?%-`1mlxW^r!O&z~NQ(1eRlpJRGy?(jGbc>Dmkf^3#9p-V z`%hfX-t20v6-;X^Av*5}n##>V;%p@|1SvjgqUx5lQ+ zeq&NZlnK8+sdt;9X*rsH1?HK`x0X-!^4Pgx3v@|YY+bRqnOcdSF1Dr?wN;Ni{}*ub zf3e)!w+6~dnp_PiRPVrP(FfI=-6~jN_m?ja?~)M`spx&?V)60lRJ-`k10LL4*>-Tn z{q>PcuRRa+W;MipKsO=g;~!Y68QitaIQyctC1I((#hc%12rvzPzo(=GwJsM+$ZQpM9|C?kTte-zwf;C`Th zTL%EgoP?M1@9x&%xl%~pe9x3Zsm%w*qXWA3n*UokyQ{PlSGUI2K(z-4X3f>@KphhU z>Su;B8i0BruZFA6;#_o6uv~~Q7VOn$-MLdA?e5&t{LbyM-C)w6`Y7z&9&*>D^E>yU z*_Pv+>XMPq391uo2mUzp@YtTwXup`d1Y8N1fIS@!(p}pi=pa7G3gPh2yH!pp7=Bf>mj2# z@#YzH1`+9hv9L>Tgafa?vje_s{oRT6Zcl#euKr}}oDXbWK>vrBLj99)^n#-T*FOLs z6$Wy_-nnxJ;i#~X)%BsG=S|`P=p@@($^PJA3wnduI~T*F;TsG1 zGzwDEtfbA*?h3jVMbRe?z&EXzjOP3w2gk6_x{iJK0OuU^b#~5ws;Q_UWG5tfXDyuq z{3$1zdZo1jy>oqQ`D70ZcaZ?(rM0Z z3n?{A3Z7srU6RL8;bu64?z;tUFTFfyFZTJFBkS*7%YN$?xF&93IyA_^Yaex*yiH0Y zH#G~UGAS|PFT}x{TPr4eSSS!P@{y1?ZpIE(a{k(Dv`ZzKw9aLR97Tdoka#w`5Ez>t z7CQRU%a^e?q83ygWC(S=N*ZmEMA5IHoK|u7&$dGLEg_Y?XJ3@P$1i2~-^yJO ztsT+)EHu$fPHQ*UWKF2zSEr)rXuGv?Ga)9W!uN|?I1I@j8rgot_{v6h`R6#_sK!!SBtcgi>svTepK|E@UBrwgB7M^t(0e(3iNYxT7P6HO67n6eUh* zNq;R82>6ROpIp+N7rNqpSe+goyejBRa{1Cj8v$JeJv=1%?_J%f=USHfBCHdCiQK7>vW*HheUS&puF0(L+T51sm69#rdrwd~_ha0htsg>Yy|SVvXG zoH|Bi80c0S5Hds#i#dE0#PqPxi5K?3wg1gKHn4v@$}OL*vwQxjGsO%er!w^hq!(or z1_-ltrz5!+fu3Sqr(t_ zlzo0ZQeJq-fI26B3|+8qy>72R?h1*^K0f*Lxx1*_Q560+(Clhijr7i~Z2GI*-nMl({5!n<4N;?>qD@uCtJ6`|yp;P4tw0aAK~@h7 zow)tG5LGU~x~;sATQ^%rGB3tkDFs}lQlqE?mZh$2N?`T<)N#hF%-Jz8}fg{X)tLU+-T98gA{#;kR&Xry5MtCPK>C zJX(>c1R3x6`QQ3RYx%@N9-7uZIl~IS$%Q7Y9nHLiOaoA20qu|r1OVOMi49S)2QPs5^c(u#^a8ZO!`b|>t!t_;N^FpGsOZkx># z_O3^`sDZu1A;V!csTJKm$hRPcVZtp6hKy+}CG!xhe-96OU_+F7>N__Npa%!Pwu=41 zL!A4J>0A!NuwsPE7PB2-^8p(!o-8Cx{K9P!98c-C6RmS5dwA&Z?P2KDFx=Y6{_OF_h<3+k+#(EGhnSIHhT zLvy_DGOuD`fqHmchrAiodG7AjY=wojS%uvn%_U>r(NBO{jrPk%9vFI!oxX<*gB9A{ zvB0~;ryZ@ynn=^Kq{5|?GED_P)zZ)4M|xQ3=-5j$==5{ThPc+Ff8~!)Kj)55=8h4j zjqOM#9<}I5Va=POymn()$!o`DPlLoB9wKi2Q8ya2hW*mh-1f9~4D;r(SxCuj#cWIy z)mQ=OombS!XF$movXEet9|wnW&%m>9uyoAxn(9=EVgb@;*2hIYhbCdfOLz;M)F*pb zXsZMoqP`dA`qRl4jkNi?Wb~ria^*sPxx|*0aBVj?;6dqo3ET22qR&X#hhFMr}oh3>vn< zY-Xl<$>50p93R_NKMPNEQe)5g_=3UEMb;jj)|5T?1P4FRNIz@2XKA@B*k{<8m@Z)5kbT4SrB z*qOs90&oZ}4g?S=Nk3QikC}g2`xsU8XB-}pj;Wii?}lK4AVrq z--0V+Q7$WZ>eL~@g`|}0zf`>cqh~@>;0;MZB|pFk$)T>9E5EluYbZv9cE8nv=BJBr z(W&ZDXnxvF_67gK5Sn-!76?Res4j4+hPYV@W(Qy}&6E%kZ?|TaFTzBpzI)t+9)0_) zm&eKfYTZ56bM)tL1^@Y9uupne-CF^FX?*x}%YKf3$W;jTxCc^!NTr+0X~AgJoJKe^#v^8*6!o>5Hr7rY6e1HB=l8Zw5)+D zd<9evybU}0&p(14-NQqI9ZUJ>Pq)vY_s5)hU^>=$VF{<6YiVMtLoG!mN@hcxu+^Jr zLMVRUIlpHVI(q&;aD400*FYfHJ+9gtf1$I!Kq^UvY-zbNZA!>V{D7bP3)qQ;EVT7* zJ@0{k=P%rMjOp0srzL4*90gjKAasPaA){3Z{EW~21fH>n2PZ;k(FpD50HN2?;cBgM zoXyY!$Bs^24~ML6aAllW$U!Gh{R!@zTxjdsSGb8dIu4M6uLzW^oX!yGu%<3k)4EcM z;GSpY7ATbxlJ9e~DSO7Dz&jV7&vmF;&z^W0j37BWky&zBpcPEGCN7%+FC3j-`tH(GOP^hOV(G1uzg>D@X>zGu@R6mvm!7wD*~lM8 zeme5h$bBO>k6bkp88MHDMmCNN4*!1mKZl=ywnsM&R|U1<{lofUVtCzf-_Tn_FAaTb z=$@e)hbluK9#RkO8d^2@_u0YU4F3BdJNV_nPY&h>eS`ABiw2hu{O`ao2fjb>@WAZ@ z*A8R`T$9faTsp9QV7&jG{@41S?!UkPNdL$Bqy3hCasQ_Np}tPvkNZycwI{#P_qo2S z`oevtKDuv1-+y z(5gxXTP$J8)6OqV;6K#>cxS=jwbMdnRu`4ILYQogIPFw6T1^q=n6Flz*xbdlX5e!~ z(nLk#HYOt)kvcu|Bu}3WWNf6S9IB_HzN%0`Xga){fC%QPjiuu%n?fR9`vN~+pOw>* znk8pbm5lOgP=h-gFjlG1LNzo#Mo$9pzDv3uwC+F&*uqsf84^5ey^5|w5Aj!K2FQd7i^>tX^wao9 z&2Gj<$r!y%?o-PO)!4?5W4ftfQILf~RiBM91!p|Ed77u!3Q=md>{J(w5tqT^i0{Cd z^9(eDY?2;%Ro<|d491wR`zf)eQP4@U3b`&}+s_MPvJ@3ptNfXGJ`I3*dkN}})trar=tPtg$~?=dO$$%Nlg6j|nYx(SdZ!Jm*d3!Qm~Eqz&r zr|aZFx}rDGWuH>)ix8`C;^oU^K8L|3O+eay$V^@MQ%u%3s1R+Esy$(aH8?95Ux53N zG5SoUMx-(!nW!0y6{_*2MSgtJ>Sc7$G`SW@m`sTo+_;9(M|C!>m+)yDxg6kzY}Vq* z=pDf#<@ejH&O%V{X^1VC@^q8hNe0Z$oZDqlI10gCzw6Rx8NI<2r4lktA#3tB3@I7I zFFxpTk}|k+UU9VI! zYa4}1C|n}t#)iX`kPgrOJ07o1<#Uv{L8bCZu{5ogijMN*BfdZ|DmU7_q&6&z%HH6I zyR6V=gYx~${=}0j!+0XZY$aI)<`N+N?eSaV=#)M z0(Mr4gMuv0hD!R_Zr*+=a$s|URkJAHEES|_5$@~5C}L!h5;i@te9$fOQmLI+;N@3X zgl4}bRdFg+HLp8)(ZAqnDinzXMFyEkTmDyiUZo-Xo+X?IeusJSvZeVUl$zFW{Q zhf#>gBrS1gO47QnoK}f0;rE2RkPwn`O5{w`{MBGCwDDRjNS<}7D0@X!Rm7ELMoe43 z%+rHjnzV)^3Qa~8%)~;%D|xz)4iT0rX;Ng0q`@fCoEh(y*=7lYw^+q6jazs*G(}6R1)ss1yN=tq47qO6?q|47N&Qe#&lU#3K@mLWXucLcxFv(1ou^9 zWF=*?E_S4n<$|IdAy<5tAD+uJDNn7T&B|r75l>!p`JZ`)D{mwkdR5*XFL)Gjntm5A zw9ID9lT}xa&T8!gopB8rzfs( z1~>Dk4=Lde(FNF$UZE{xwk8zs;PH~QL{8ewR)f0|VYH#>^563Gn1&%0vRMl5x#mXA zBDH;#XE^Nv(hvn7XgT9!s)6Y>Jlz%~2wO-ktf^?KAxRBddAcMKCuLTX%9<2~T~5+) z5l6qTDQ}iGGm3x#YQMMN zbB1oVlG$=WMiMljMA75Bd3plC9nBTHxGbyI9OlS5xbqwX?IBI(MA|Pg)S|wmMC-%D zMd?zG%0cmEF_`vgG~}ND<><3YM&ym>sZ=tQ(0XkpPdT>Y2l$1F9F#-ujpYhaSxjUX zZ5Hx!Y)L5@q(YIRL2WWsh}F0W79*0|ed1t46Y&y&NJdZdx-1fz41`CfPD{zGTjdf@ z;$CSCT}>Ixb!em`hU0oxlHRlxi>G6CA>~(w^?{OykT#NP{_scp4Pqjs0qoYAF%u0+ zx9;V~`$Arl>vkuHYG|wS`_s~t?|qG;{h#!GK;)C--x>!S+y`Z zOFqKO>B)JLZozaa<4coqySP-h1>+)fT!1Fu)W|jf95$wXfTt_vDUu+}5@WcK^GamX_#B{S$aGv*j!6~u$_6QDc4JT$nEu~>sms_L&9 zf>K?U)I`0wyBlMS*3`5p=#yqBZ=_xgy3<&qLY#F`ZY}huirKVzk<69EF5c}+hVC7B zairPzkBPN{?PH=*GZzjW2Pdz)!{Iw%lnFPJ3zz9~shSaoEk?NvdFCLMZXp$&G(2`G z`|KQ-SEY4X7&Ya}d&L@6Ntl2)-0eZ-28bJ&AGpKnh z*v31YoN%WL&(X~nRR*E!7-hEBY!O{t2-hwoo@mcZ^^(!ay2Hq_6Kx0;9^BvIU^!~t zzfVi4yedjnOm?9<;gXAxBQS%{keLk8M6B@TDFH%dw zWF>^8e}_fvC8ML?bLpT?y*Pvpx#ou0kFycT=>7RWTIZj0$&!f;BR7o61(%G*huDEX zLnI!w<6MX;?dt@&{Jn0tBJNX3jg(tqOqz8LH=~QA!+XHj84$FWPxbN;Gk4ow_9;Od z!uk6;(Rmrtq^xeGWW{8&;3D&KO$5nzfn)dft?lWlULG!<{OeYbv0-;70*i%15zrjC zlx%o&^>{i@%a}C!$gdzi4H$9K_ji_8E*ypnPyc-nJ@US&#D_=PTOig4;01hS2Rh^V zDzsRfDl+m^KvP5~&Dfi}V(J5|z<&$2aYe!#*rWY0#YH^c{}^a5?(s%@=73rx% zQ!wRsQns|(kx&<);jvj9!Y=bqjkc#J7P8RE4WGQ6{q1NQa!vPlJ~FR_d5R{3~MIObJ z?SYXq$!X>!pc{Abk^yqMi|L+*)Ipz!d#5YWzxk_k6e7csGB^wKr^t;tVEVI?de5z=9L)*yZ>W%a4Bl*+EDEQpy1FJ0bqjxk)Kr4 zkf#O^_>e-`-PvDT*FI44Ev(-QSW&=j#~ZF(dB7B`&_ir33Sa`y0Uwt0RV@}X>< zIP5MyMJT3`rs#Olmd!eAkXFS#`pjf>Ar+l?9wOMCqqnVRx9@0oKUVJ{4;bWBMM%c% zF;_Lz@RT5=)72%@_V)B-4-XL@^LF;o_BMp|Z56|tfOHo;)#49e_ z6^$ItSpmRgT1ZB6Ed=kosp#x3_-4I|jovkS!)R%A->7nQ=jh6%e_#6R zr9WKy=+ZluUbi&2)U$N&(({*2j{Irl=Oh2t_qCA|Be#uwd?YpE7}-6tZDeftkHfDH z|LgGa;ai43HXI$c42%128QwfRGSnIR(a@7a$A%6K)rSH@hS(4}v~H+x@U6iY2Ok@} zYw**9#X+- zO};Ss*yLT4`v7Kk$&&7Y)vgcG6m51VG&-j~o))D&H%;zi_aFX~NHA-+TC+M*?A6+p z=BPX$l6b$^y$;w-DT|3rC&`S=PlQRo7hmP=x@xvS6%*l_NN0Bkn-MSe+uLRCbdvIT zigK|tC({a}m%fI7TIQ4jDyI@UtNUnwIU=**cBpp1KaN<+{#j8ym{ps-3E}m4ytJ&9 z5Drhn7S@GSIT5iQ`zY+vGMOjRRh5_ti9&!my#n8s?9#ALL|G|!pxI19^U$#17hR8! zT`DV6sjxHX_UrNy?+G6h%K9*t zBZgivl%^@Px}9A#*iku8k5N)G?T#r)kH+FLrAKl1T03O)LN`~xhE6kTqG}*) zQ6ue*h$QrELTZmy5+P|5%W;^kPNLygM3P#@lZ?vN{&o86(bTgg;eFQT>8RGE$s)_6MMEJHU%B38(`8C5V&YVfbxi^7bHF{?fHoWztQ z72jDk+y5buV^6s)q@!R76#Z^tv*NfHi?JvC7E+>$2C|xv$l0V+U+2YmVCHT`Lub(# zw192O&&KX-`UyH4DTz~Nx4S?I=IH?g@X{#_<1SCNEETq?UFd5=hJ=XIZP`SL`n;HI6@e8E~2tAELlcZoBED;5Z;<#wyz z5WV0kp3cZ^q{5wzgglHb*-SWY;OT%(PeA2QC10Nih@hKz^H0j)de@Vm~5 z@KUT%5#`W?t4?L4ToMIWXR$ZcZqwNvM9EonYU)KsM~A0*WwR-ydZMIkS{&tSxe`pP zu^Y~AlNS?oNgons+*!cG4=wv6{{v!;os6rLQMprARVd;v>>#q+gn(idbb7*7X#L>~ zC5emiJgp7;Y{TPL=QKK%2`=r^PxEvev=#ufV{k~lngo5$N-W-L$t$UlLvpwth}TYYq+X`w0i#w}&nikv>SEr~n*HKD5ezUIt=H=cQHjAL__554NRcx* ztb|B!s>7pv6Hni)xB1D?EYWD1WzZHjM~~yi*>|CzhoGMmJHkHglwhx*&(=X*3i9sZv@A%^M0*3B7~F!)J{Ojf(<^ zma-E7{fjc0`s=(Lu@nNH9_S}!kcLXJKpzf~+Kr+_lnz+wN+J=|gFEG1>?^Vx%3%oj zXo_JyV{Zi2(LKD8G2~Kus_M)8q7J(-U`Wm&JRgHoMX1dB*}N%HCh}qN_9RbdJSM7G zint3&b3R1xmhxl+cpaIz8!(M+QDbxk!m~8!35sHBnPSWkP#f~ZMSth%-1Z?Qw!A*? zlf{}+)o0Go={VscQ)x{jY|2Gqve`Yne4!yiQDvP$oM!^sX1@rJhXz4V7f{LBTtrE=VJ1qs z*g72Ow(Cu^^%`ldOUhA2)l)KwNB8ma4fZ^#P-)a^c?wVtiOVjbv>hRb(V&TEu8& zm7>Zlacty=L*EKOWR^kRYDnl&iCx%LYuA>eHOfGik~OiKs@sybW4tzN^UW}2cQI07 zF(=p8W9P2Ng0wlAh7N=aX17x2NlGJzRcGjco2}MoVs>*`tT)JZ4e)dy9i>7cxn0Pp zy(N8c2L#Ny54F~2C{uN@kV=H1gj^`;$LR`o&8&~IQ#Bdcbdz$CI%#+TkJs2^G9u#6 zl6p%fY759#JdB@L1MN?P8Fiv=A+*hGNT=Y33o|9sUE7b$5@@reFhLYc zoD@|Q@vS%k#;$-UN<*V@WmOSFilF*_iiax-RU1WAJZ5>M)X>jr6OIevT>CGc~Nx^oBCniRm1cFITuAyj2Xv z%Z6NDr%P%am@aE1^i*7F@mV7wItORM?q~E0rCnB#dx@CBOY6myRwEH_;x8bwRFDod zJY{Ww^Z=3@!=HI%k$~S=k%px;bHZ7rFXgW|vWT-rrU|{53b?Wfugvx6(8;S`+RHwX zZR0{2sO~$H=gyQYQQBluNRuVGq+yL>XRTKRSM*8`51n`eDrK&Dr@fA4MIZ^>4)3AW ziED93gRDSYEohaNM0v;_=O*(I0h8(BA^BYZR|qu}>)GWb$N?Wpe%^>)#bM?U3trra(uB23_a z+9_#IO!n}ggy(21!nGw8vmo>+&T zxZ}P8+P`hSgWa z6AM`=@Umz-`eFK>HE7eNH|{~Fx8J=Mb>0=Q=+xeJeadEXN1(4`%U_J>zPJ0|Gt1|6Tw4X)J^*Ex@C$b<#Fs%THISZoA17RR9! zxN-8zvsC4Fp_}h~4brQ3tH817S3&zxsBZ(B>X!947j}k-x~f0fB^s;kbKQM zTeUbB5RT6=phrw+b;3@V+jlSSQ(K8%F~cTb%&~T+AlTYAAGrn)TvJO%Z=BdQI4wvG z{d(-f{g;ifToB61ReLn&t(yIecYt>ea29Dfnux*1>tUf&?!WJ4b202i{V41??7FPx zbjk*m&ZwcMm^e_e#IcAk1wcd(k3(_AV1ut8xMwB%*8nGr=``l;fJQ=x^OUhv&ev+G znu-izS-*%wRHK&%V1d%@NA80fKV^cm1Lh6~T8RD29uwmun+Cho7cZ6c;Kc7f)t*TE zoQZ`jF7gAJ%AUK|u(wBGHc*869=c>*D=vizQ#O%MOQKaL%>}Pkpc}7-$$Ws-4PHIS zJhFlP{na36eWx}*nS#2aHG8GXL{?)c>77Art8YldmS4z1)6WXQL_YGBwd`AI&P19! zSHsfa@}7c9>oig|N7}5+pn~`C z?>C^QKGx}3nJHq<4Bl@%#P zltM`gikst}cmS{9FYEC8Jv`VikG{WnPSt1w%I{qN{2T((rY1;80b&Pmbu~UXQFNCm zR)RV7@{m0CmGjX9p0BQ9pDl5E+L@h~qjpxK3=wkI6G@HNukj`DoW9wFIrZ?+-2Ok~ zy1=zpaUlq1j>CM!@f1nIW2lo#w@4p1Rs0Eu2v6tc0!*iu2PkLn0F1Kl!PV?L1rW53 z!=A(|n{hJ16ydQ1Gr4lSVAP@4zW|$NcLk(;fYq&YysZKP_&Q+klEEeYJ4RY#ZYVW> zQQ#e&Hf8d>ZhrIAFvngVI(m0(J9^@>hgPGh?|*%O-EadZ%`ykD zko=~KCcGh%NV}7gYS~duOZavB%#9$emxrc5>E6x0btAX-jyVn&64zN2b<&cAFk~cA zkIw}uPBQ#t!Gj>9mj?mk*JqIM!Uxu|Paot2+2MW_MMw<%Mr2M1( z@_G=|%R?tjgEQ#$t8s8mMiDnnNi0ZqElj9~hvcU^+u3WbgfoJHI z33@Ct`Y}$gIJ8IG+&S|rU*jo13EpS=~U0n`x@CP8{ z)Y1h~BP&|{g?I(L?RY+)yPbO*Jv@NmgM5trztInM6NS*+?Ps2I>W((R%gu4PfcP=P z5v#RGMJaD16pz-bA%0^P0F-XBhlfu7^(iO=4h*vZS?7kln>h|h4?|NJ9cm3UTx8&T zTe6A_MH)%&Z=XNeLxnPLy^ek4e#o}ibkI1*A?KyK$sT5}Qx_$fu(3cpr2cq>;2sX} zSr?Mg;Xin~$y0!weQWzNKx>;@F^|?37d4{!NX0}t9Tt5~iC5>T+u)GDkb?x`rQ1+W zZy01Jzu0!1DJT~#nK*w;F?z*FrSJ8jTcH^mI&qEXE%ff4?eVF47)(83u=~QEdR-*S zp}@p_E6_zpVTpQJ=)gNGwja55#d`L}qivtyELVonyBEJQbpJ4MciRL&UvmJ!#{+#? z)r7N7=SwEJov`V`D!_{UI$S(FKZL7iFAtsk24G=4^26>5d*=W`kB37|YcqtK5GPE& zh^DTMd6M|@@tb?#MB2kcC$9JleEk4}DYJM+;X|*R)a2KyuqYL8EevJJz>?EG%8b` z;_e7DlRac~xC5ofckX(49sA<(_Y!!zP*USdq@$IQwL=H`4iCJ=c^bAruZ{;mTlw6Z zo|n$+!@qw0Ec(Fr8M^)9wvEf-SvxO>63KkfJJ;lD)U2^gQ=ULmkHCw~JP7Zkhlc`( ze|Zr*rM&Y-0IK>rm&fxk-1vMR=&z%-qH!t?k@mLLXW^p2BOm_f z$Y(%L6whdrt55TMB!O(iOo7a5vHx|=;!DX5lyZ?vBA)n{M$J)Nt zNd_+2P|OT#1W89Uz)ht9Q;fiy=l;jq(<>Jpflm1&|Gap*d+Q$mHunya0HzE0QqWSU z&h?Cken$jcDr?;S+O~30E;@Bl&WIlQ_E{HV;&He`_Uy_tJNA{w&$46B+#&x3QhBae zBDiAWJV@oazkm103y{q7CwA+81$)z8vNt@#Su1})1DKz_NR}w+ZP|rT8H%O&XxnH3S8DzDvlylsy*$Bzi?>RS=J!6od_3Ih-iA}BZ1Zc-| zkiqGjVsSmJDt()D;{`9%F;Y=zc2Gs*g zSRPq3bj`daM3+1d$N8RD3~%21Jg80&x%=jML~P}Y?GI1)yixqNXBK_Y{GZ+aA8i15 zYy$4G3LIJ)4yPcT=5hz&UvLqEu571;@Av+kW$gbA?vdNo0IT=FmNQ1rs?tCUdrO+D z`iFi(;8F{L&&o%lul#3w`-;W5M?AwM#*W+Z%31gKCtiX5y-=$-Wt0ABab;r<-FVXt zVAX!o_OHsQMSukX34~^mRpn{`CSwDv59gX&j*kDNy<){;1JK;I)90ftuk2j&Pf;Pd zhHc{2_88!Rr!#=%P57aEyT#*9`ke6;Jh@E+cS02y{j&`KghnyC^Nr0b(KlXgpAArO z>a{l7;C*2Iys7_yLUwia<<}O`RW>m8FW(ZNhko8RLl#!7G9%1;+%31a(+5KIN=o z)26c!di5y7rARp%OFErUb+MkiVXekx7qbnYp=hTdxhWjVYP4oq%-iWkiW>Ti$xqom zYMDyqb|s|=@2!~5SQ=q62PJkEX(p-z*po*v-6O8(sTifNXS|kdF&Fmi#&oSYWTA}i zpg9S75B{dieGt z579*02Hkj50byiTkvhM^k9XLugfdYoR~j{0BfnS3lQk8H;-;xaMj3Dx1ICB>#}d^j zqAroz!p&4sE=*Xi=INBCPACY9jKUo*9!{RK3)3|Pv7QjcZE>qLlvUVbV>pvxwgDd( z70sxkQ8%S5#mmvrEdK`yTY!=)vmtd!C5t748*zPB18%@YvRTjhjg+exNs@MkAMX=p z2*L%4uJxcdVGd|Y&&J^mDZ#EZ7kflZ(YOePDH-2Ds z$Z5)$Ez)c%ZA~c>Hk`-PPzQ8b!VlmTiE=1o_Xe~-z`v_D+M57+V+k4@79qT^4fpeO zT9qVHm1IaCOlchP*wCM`cvY(62&DpgBJRj~o3mnD5RX@dvLRCKR7En)N>f`G?Zi?1 zhCd}qlMa18m%`) z)0S%JrCMtJgZywqQ%!S)!`gxkk|SkHUg7EVteqiD6$h1RlyX9KaP>2o;c2Ksq|YE{ z)FCb9qtaUmo?g%!D2XnWD9eLJr<0!K*T)mAdPz|V0_OIr1&T>8<9DM+Yd1j-45Kc} z3lX7}-o1>ML*{$Z_U$wJ5~mSx#0 z#>UvjfXv>q4TJ6Ny*KSr?CpJ})%Fd|F*P9sLhuC412}|-!0uuk$|ba55=em*haVx3 zgy19uLP?PHP?8Yxp4q#St!w$o^ZsFf>^XPOojY^p%*-j@Lr==hmV!ViGHOLTH?ZAz zN?li2RHCpcKT-CQCER6N;k9Rtb-=aVKTF4InDCS+{4xEEnjEqNQvw5Wo^-aun(EdCG;P zE|QbZL?$hJO(F>PBbuXWtE9orb44_sPia!ch(x^Pzu6bt@>(eo7`MA7 zwB=G!lhkf$wolp=lsTGKPx>4Nt&*mj17S-{6$nE}DKbhNej-dMni|O#w#y0mL@XPl z0eM9h>zA+tWE*z`ii9O&o(w1BSHz;k70q^?(`XaZUec3x#k^w4H2Yd>#R;LXDz(`c zquiAMy%V-qf+sIqb%dGH0M4e_R#4hv(dNps3iBl8%t47Wi6Ft(2iNIX?v@F{O_|K0 zfJZwhQgK2HZ4KB z`OzyR5s#ZtOs@DJwm)V$D4w)&!Xn}8L{ufR{#Lf#6pb4}(W)X|NtQqE6`$SQjZNVq zP008%Sae#4J{n%jCheC^K7oRuJYen+~ zW`CKqY8h$eHsf-k&{O>!<9a|tyel_bg@5oI8Cy-mGr zjHq>_SE|ap92SjM9JjHjjIuG{uz~?8rJ8`uNnOfkSi^ERUg6V%LiStJ=3vE@A=k3u zNoC`>HAqiI5_(_M2^D3+rgKtiX6GX@EX1h%lB1nB$1c$V!RY02A z80fOm=%!7PiqHoM-+Ezui=_FuMwTKHv`YjyIu+xDDRBD3O@cBvMLN@YZ{C(Hl9NKc zyVYS9aPZ*?ee<-qt+O>WX=#svMg%Ni#X!6-nRN z$Lwo$p}2$;%L=5G^vmof$x=4-tgQ0}^OQZHcgq4&g+K2fY$`|yLrYRhqqJ<2W}}jE zA8#kiN1KzDNuNX#pPZyMeh;-}f3tncBq7ov8EMq>_7`Y}$m_B;1`$R@B9@J+ zAObL-)aaT&;5dTCdz$U`aE^3Y-7y70nhHVzHOr2V*6Jo=>0rg~$h(~K(9-4^Mk`l% zNQc{}P)sGgSxeL|VA*IYaSL^YE0+m`^ggAm3@VuAqsh}23JyvMN5bc{i+k^CKJW5| zDcTfPi)?gSB%rr6SFXlM>Ii!!mY_VTSjsQn#754QHHxssWKFvxv{U4UO>LmbhBi-9 zVvka;(#tFfG9VV6#)_aiuPBp2c`R&*aA!K7o#Kr6w%2I9JX=4IgkJ0RHml;5_2eAY7~pA#k5#XDRsD0L8rN#tY_1 z4Nc}uk%W87@Cx0fjfg8%XC)hn<}OXa%(E=ErdhtP%e2JhJiyu2af!62NQf7{GlVp=`Hh7B~Y}g zVsREinXohENP8O{=|{hQ2YgivNr<=Awh=+<;t(VG3vd}e21}n5riJ4p`n{EC0RJ~caK8mVbiaASxe`EwvFwdbiCMV>6+qQhHGoC>j;5G)I2SK zL1%+Dw1mZDC9=Np34T(q^s?sjess$;yoN)=hI8nwecv$i(KOC*v`$m=0x0(-B4yfT zomBh9Cc`**K^p=n{s{PRXxIzdM10==5eVUkX_^m1$M(l;llj92rLve1m2CNR!y(X* zn18^~EhIq&icvO5kXiFjEXtN?VqTKf@q95rXT`#agjb@m&|ogc%i)ioLT@-UC>{$z z1PvT(#ow`S*EUVgi=oXO>%03Qww9j$Ez+=OM{8euY@;IA@H zV^Db3x9hN$&2S&{`aO0}u3(a}-TBgIz=lIYnJ+GZO#AP9)-Zqh3`?eI8YAzsY`iZ0 zM2>dEshGf<%eYc_fv!T)S@4#eK-zQpA2%}(%|0*=WjLoXusmCaGcJQLUP@ploB~1E zq8CWmuH?I`{XHBSI^6LVM7h55r!~w@?Y}yC=ogPw+t8nSs;93=wzU6+mu!`GJlU=6 z+SNADc>|U$2gsIn8iR?m3rU|by7@E_653P%YZP-e+*SkV++|gO_+Lmvhpl^A1nQfX zRU4Bj0XA%Ofsq)us7bMj&Q3T~eExWl^`c$W25dMqv|jl*=mp_CU4UebB16pJl4@fXM8JZb1&X39V0SPD zqd~h{P&T2SM2KsLu${jU!cnFImtEajM-7 zK<;6tbrcwk`lm6rJzI0F=x}Ez39U*56)U`Un>T7i9@1n*^TCcGu1o*@H(dGTH5;-(<^xbPgtZ#UG4fDHxRuGi)f}pjl zNRN{5RfpgLTXuko!fYPstM+#i*R^YF)Ok-SiR+>z?aiN(~micnCR+tRi z8~(L^v~dtR!=a(+>2;7R|Fh*wnaRPb2X6y%;KMF?y8&RMC_+{!rTrCOBn-P2?u}&t z_;6@YC>RpX8zn9ITOJ=|9v;A}L^O>7?Af&UFyEyp)8po(Phicbec1pCtgUY9f z=Qe;6?z(>f{mp&Gd8qre>OXq`rK59o$EJ4v(hFJ)OYX%^ei}RHx6C`|rD2CvLP^w~ ztlZ-)}=Zw+crMH_f&)s>=rfdfOX!Qf9Rh>T2ndMsPuc(;0wZ&Zur0Sd_>d zl6?b8a&6gE?OP4Lqa;AA(Pp&?V7~(uqa(lv-x44Hd^L)1sxDu(_#=q7xp%%0*O|Zx z%F^-yK7%qjT;MK?kfu14!E(EzNONWtf~gm!qNBfE){H(!YtE{kx(dP=Dk{L(hPtb2 zh|5k{A>cbuLg$@T-8`@;joIUU0&2)Y%y~OneonP(Foo;LDk%@3ki++YBGLj9xhu(P z1?4$a2(@423B(J$JcuS=ITyTS+xGS#=A5eRBtiGxV^uWbI=G?Z-0MUQ(2<4y2}Mcm_J$vBbn z0Xj6x=R4L7aPm*5q=m;xooAtB$b%bGE5&rqzsH3Az}#|1h?p4v~D^86!zs$)Tgo&Wa)=KFDfVexh@ly*XVw}*q*JBW5Re~jxA-uh&D{%I(Vq18o5KUx@Dgd-oGgx_mGzBn|r=eZA>_+e5l%)y9m+5w$qD|o~v zvI+%22*!(sJRsl-SvC->uG~SWcM^>p;Har z;E;}kK#Qv}6U#i4f>r5BBodk2lqe*3df=LYzvVkR7_o&Uv}fz<8JFfY@FS>xpS}M^C1sXavV?2b8KyZyI(nN7=2m# z#17_wy$ZEo$)Hsu0E6=6WCAV$vNF^x+*9p`!m*&DxHNPqzVQNPyR!-)ZSLs{AvlRG zMK6Scz5wCLPY?-G5RQo1bHLLs*dZ2@(2?868VU~FCA>8crYBPk+;DL=iX0&PrDB*?K<~CyhJtOm1Z`Hx;le^7= zIF(L2%lxE31(sT5zX;yKZD!*;U%3dhIICb<&Tqh-E%`dYoej6|Z8?AGdss@&z;I`9 z*>1v}38W^!5%RL7IUPmEMH(L>UIN|x13z4dxU^~81R-k$d#A!nClEQ-y{}jZC30M19 zE&c>sn6vjc&-S2mA}2kK?2T0KIhl;=qKn8V2>@jXN}*H81ExuzG!0eMuu6&NL2q(s=;#AE)*AZbJl=1u(*PgYJRB%YHd;s$ zQadeF1I|m1)xHHt`?d8w=9(rOtM@yKE+Z&s~`5_53v8eA(DiH=v@oTm_>R&Ct(1xR0>yW#x` znJ%r4LWrnuK139PaH48c8sP6I%7&5;>cwC+^k0|4nT$h1#3@4;F#o(1t5bcd5)2Sx zn|m^CrYl|n1ZAE9KPz8e?d{>v(E7i-*c8ddEE`9!sBT;lfwFbHNb7kWk3n{4SLgNZ zM;TC<=EjLE3S%&5gve2_OI3tx+!|m9^U*JXfS7FyXlT##r^3wcMT1QLm+>jx zG>viLSU!GFC=O^lv{)SVg_O}4%jOT)!C`1233LtEnRkBzDOa-V@zh$UG1MM=2z8_* zfg}|c#0~OvE@ZbxFq;7s+Y9=eO9N}^8IZdrxoL>`@m`h@2Fha@k$Smqf=cLeo{-aQ z9ycV=f!l%6C3gZNE)DH@qa6~QZboYu$ngeqDOjcB^XD^hCJPlDg6>e#RLVr6Sn^k$ zMhe9gdHk7S;ZsPu=Wk$7xFa*nOkN9JgDX~Qe#9%;gwsV??NXO+DjzJykndqwk+;Bc zriVj9eIMP5ZDzL)F(2*09WzZw<_DZC6(*c=NyQe|iwjPrkR9;rZh!$_NJ2MnI0rWR z-#j$Jymtd$*rw^kJQpaAWOjxDpWbK^8D$Wb-5BrfSA*_aNW!7n@JUa7eU!QT>gtZU zRF-H9&cW-vs{MDoXvafs-L1$vDwW{ch^reb{}`x&m0Mu|`JRFA7TpS~mPPl9kN3PpLG+MBonHbaQoO_d*If`dM-_`tYd(tC$aO#v^E+o|>1B z6u%$=f3ws+UKAEcI5Ri6oQj|~91`OF{b5K{M;?<8pPlO>>A930SA)r2Y`RG&!`GOrAv_cbr2gx zQR3syqMXOjp~K(73DU40Z^IhWHjM!n*vqBL6>=zOT?jBEOGUU8G?&r!cYq?}&=AoU zYydZmGVk4i$J#PI34GXNcTQ-qXvwIIh|&(NQZ*I8UE9>dX@>hLq%1z0eR&Ntuphe8 zyjq4^TE*>ufP%u|jz_vK?!3NxD^_H1u-|K%#u@7D$5--BnTK)$^iV*g%$bYq5H7zD z=7B>(eY0cW*8r;_ddPj>Dkgm&4CHVTI?GN*J}MTQNqWL

U&v2a<>yQ~ISEu;S35 z$KP#OwMUo_YIyLh)5o&Z9THo-_cg=6&47v?|E zDKQ00I;tU`xVAo${Yt1Ej?AWg3t0@qgHsbS`hd!aAGIH8}NQ*kk&b(4{l zQlk~*#=0QW{axH|5TdIdlMa z9u&R@v>}&rgm)8cd5}x|!adjsVw%1j`oc0vSd}>sH9-|Z=4gs?WRq-PzWEeP8Ha{^ zZE`k^oN0Tyx_wT_u5965+3M&X>$<4(x{epy|K4^cK8i&fZs{wav#e;SCLI7`CXfP{ zRorgP3)t7Z^aQ+yLqh9cd!v!0I>?;+BvxUTnU?vXn{Y*?4k{QomZ8>4OloY-;-`;S zSM+jeU;%pk0>=Gayx5I1?YJwAG)9X;oJ@MOx|qi*_LMbH`|TwdxNjbTu5d``0JUKg zPW2o@ZNIGk>y~E^Za_DEqq-EG^Kx}$)HH*$@mZdBu`7`wz4}Rh*q9kFj7u=n!L<@V z%{xw9IZq*9=t}U#ZeFq!K^eY*ec!46yYY&R4_DWXN@j58xVq6}|HPD1LQ2WJbc!k| z__oIAZR+7PBi{FW8)?FWXs6`RHq`UI>NK1oXK+G%zQLyu$mS!IFrbE8s-!H=H`dhv zDn1N*JC}y0Uswg())8|X!nOU-s}DDO_t_)WbugYw=EsvR=fuKNAQ}*t2#HedXQ$Ti zDD0;TNoe}@mycO2SD}NCHpldrkHH6|Kt z5r@|B^6k6$(3<iOR@rCM&LAbESy$<+YCBlc^K{84Zu5$^*8?5!C;0x@Pc9AC# z@wRJYv(o2}fR955KU0C79#VSLfK{V_>_xaKqisK_uGt_wu8bp;#9Qo1=FppmZiKR* zl1ACjgMvA*7|2?w0I~}(mR8ITxcSGG6@b5KFy1(@D3#gskH>Fm`VqQcs-C*qsCFg6 zX;JaUm88jGibB8$VFr8{y!y@^crRgm=e&&*Uw#hP)Js~r`CXTE-qi6-`v+}nTa~;^@CK}c172VTLjka+zl9Ry35L^%YoP92y&20mU!|nS-z3 zRU2DX!~7aP*6U_Y!P{Y@D-P9E))#@m z)v`P8lSAxEgW2KNK@BY=HA7b(o)~5}{08>15z|Zqx}w3wmX%2YbjqC-ncO5Tf~^_f zF~0g+*x^qg_5EedS?F(u`v;im-&PI0-lX2*FOjBlLZ9-fCEcIkK9_p#|ctuWKuW^e+(vSFw$i8YcWt&L22sboPL zA%j>MtVWgY8sxuoXlVLJ{{=PYpQ(P1e({5Yo6ymo8h|HUI0JADO%p6f$Ia=#fByl5 znnPptpXHC$OL#*o@nyZyowPIQp2|m+Mn1%K_(O4Ya0Zm$x}$IhT1Y}iDxZM6d1U=C zbLCNNY4OZJqINR@GM~xVltdr^LF!(On}|kOHgEh1y1}6VfX`RhIugwJZ-Lvo52CO2 z5TQ>O2(Q{83KxT{{(bV#u%mHl=;)t6-N6jMU4<$V{+T`y9CrEnCnA;!ecWE8O7eq8NcwfG}o=L-_7 z-aq@3lj{AeJ^@QDN9g7R()j5~1risj*!k+09N@422R7L{qDjC(!v!M*9tRu@)LPn< z(pK0`KKKvZ$wePQN6z}&|8BkBUqh(-GjPJg1_>5wz*$r15&-^IHbMx4$AJ!nVZLRb zRafF2^u!0y(ax34-S4r_PC5!b|AJBAE}!Po`t`rSh{~lgzRy0zd)~ic&vUo%+}#`7 zU+;2uUfJR#9ibs4}k)d)BJh*tw61jf!_FE>+0m7)kx^c8D?HUl0FRzid5 z?T%Vc_d*gnaQ7Gl6UDwZ%&1PO;S1`_$b2Uzg^7wQq)LgM`Qk(XF3-@30Tgeo^>r^K z;k)xD1`NefUa!NWvgWCfTcHdCesQkCj==eCFajJBc;kKy*Eh@4L(G4*)xd{sm>Gh1 zv$1UB(n=_tFPigFl`JO+!|?_mWBZrEyBCtcFhp+J_s?Geg3vO|#67cm-h&o(6LJX= z6`0&Qi$zFESmpDLuG)(3g(P(I9l`UNkGg8+xl3fSrE7P`&~`*UUDuL z(K54Xe!AUuzJO1fQ+c(L?>1EEAZTS6qFq~SeLWl+l70fl^hTWP_qNusG2J`^5CYBl zRwVS3P|gm*z%wRANJ_wg@iWj;ll?Gk92&|DoZc)6a-<)oYzSZxn$qV2uYZopXk*c| zOl&J*gb`SLcl6Z;x))L!fHRP9{>x$J-+eG@YfguOXYb!?i_Pm1xl3xlR31vF@$_x# zUf76(WE;lJHB5F8kGW+A&;y!%2uHQFlW-)m1>s~^PMg?1e0Qh@*jQZBq22q>M>nB+ z0Ay#L)(i&5`qyYp^n45LNt&~V06d!LoUho{6egLY!tedKjFq$>Mv1tNJv~-`_ zd2L%?$0LB!_-5<&t_!g?azHrX%-QqeAS|n)ILo+6Qz8sOsZ<31A}kKljWCK_8uA@_ zWCwH4Mi7NYpf}s)lFKy}C+$#UHy|iO!Cp8|V-B~iudV3i(vF#zK3$J>fPMzz*_z=Q zrdU)jrJOd4(?e6TLWSKu-#W9lvWG)Lyvvo%xKjBR_+F5Tb6^%&g+x_!0+~N!RTm;Y zL$C~|a@?E52CNqslF-qM!jJ@T_}*2_OB-rx-tbxTqY{azl}kP5x#DW5MbhI(G*90aYvdfn8$u$2v0fi!?&X4Tms z-XNAZC4yD(LTx4^Au48JVB9YfRPPD%tme4k98hozN#Lb=1MD83{d_5U)A#0T=7V!;JLZH597EpDYub7` znD#$(pWV8R7s0}W9YdBG9G%VfS>Q@JN~Ay?))TaUQV4NZJQ3)Hw>8jb4h`-38F3Z{ zWE*63T6Pj~R6ol{$B$2iXegYNNYFx=h~6iHy=@->TsRc4tN5{>;{IXgQvxq+^9+un zXC+f>7y9FbOq(`3d@jG3PvhPUptr@f-d-*ZS=AS8L)o&tyfcgyB>JR?;KENM%Zv7KpQY9lz+L*s*^6JUB-zB%wWL zY8!G2w(GX~DrU_#*u&v2doGL=y9a6uva*OKGunxOPfe(#tl~jmIls1|heJcYk*_w~ zBdeKr&u0e;2l%sHf_> z0>UotQbMJ#(GIk9rZdf~e`pNCpwFMdf%$Av!Ez(>>A1uv#8bn>7EQIjUM>ywz4rbl z29OAOkO0uQ44Uy}&^ohizSl*&8ESQT#F6}zIvf|5 z8{+T3aVhgnB^E!+%&|~?g*>U1(+Yv#tI{Pr0PBhNN?~?6&1lcskB?bGS23SRv0^mN zi00R?!sS)#q9TQ>s4pwcQ=p5~n9aggbm+j(w=;P)?u2~?N6E7RgEpOtUQnt5x#jR{ zPBS_bXgd}$IKaFl#}ZKywG|ufAY>;92E1g#6juRUv!{gW z!P@He$3Y@_7k!Yq`8oyIEB6L#{ez?pE^}Z(j7!1f8G!KUVA2ByR?KPB%EgEP&=uXx z++jbM%)MGU?Px!oeaujE^^l2w8$~PQM+&x57{PakE|%RbjjLZ z>YQvPdBu*qyH_v$kXg?^Z#Qp5Gy|Nk-oe_q$`VOlsu$Ce$%y-Y@yw;5(MtkT-cZp$wHT`LM7_Z9=VH>pmY`%|H4+Zr*u}sYPp6vn#CtI+YHXiVIAI1eS`?onPl7~ z4e+7Xi3qJKLLWHIXwS>VCJ5`7ieAY9cO%)hWu~Qj4GxP%-InT~M`j?By{UIK>SUHC z?2>V*+7}h*CzELUi!jXGW^{At%nO*{-WqtyJu?t@ehsf7J1U!ZLPbR5GPPWzf`}u? zYupD1yQ5dZ#?GNZ#KPCH@*ZTiUk$fhU}KuMcMA3SP=+iNDwD;$A?=Vtk%|Xlq&UsU z`f3TzD}e9GJn|seJpco5215IrHdBQ%VpLLe*$##GloR#@BrxrR&HtHeVDsnF(4mUy z0%rKy8U(!hW^^#+tQ|6yak~<-LLhC(rlH_Y1YLa{Y(fhg(Se7fMyBI>xEYN4XK?I1 z`&$4s3qv`>7$q~s!s&=Aff8SWk>oaG^iL!6!Ix?_2zj-K$_26z7V@VQ(Q-K8LzWxh zC){Qn;A~`GzM%$&Rwn>is3}85Yt#Xvx!Ep4q8s5S+-4-5z1he-aU+b<3TaDsXV>78 z+dHr5*wFsv7U|Mi1V{8OIBN)k>6_4?+zD^U!2l}V1a<@tjk$Z02D9Fq2fh_R=C9Q( zqt1gMPfb3YNoNIO0R7@?z=uO?2t;$^y!Y!hfXh=@1yEoX&_EM3WZ-~{Pe~a8r4kFn zAmZOz>mFG25p?sJ=K@srGS8X+D@q*R7H-@J`=MC@Wxm~w(!Md+BKTf66wj?dm>CER z2FE**ijI8gMgtO}lWv4xMKz27YKC!OHv_K3HKo!0jm4x9{K}E0v6Q^M=2;C;r6g?F z*oOxlQxaxH0F0$dNT9(I{rK&*UWmP2>=CHEA^YFsTld%QSp^W(|x>44g29&=J!J9 z{9Y)J>8E_!$zZgso{DDz60ENVP~u*YFAj+fZvyAqz@q!$%l{4g;Q2E!WzE~eq+2a3 zl7^Jap~T9}7Qy{rjqa$`x}kvf0vfvcUK6C|;Ya{TH0npDFP{SWdFI+f?2fqf!P>eJ z@eEE8kv7z%BRFoKaI5%JKE5fKDMJ?GzS^qOBz&RZxbvW#^Hjqqve2Z4h9<2F1GmvZ1ROES|tsp1-dNV(z znJnev$hWoLk1D?fD+`B&`d-<0KJ(gdL5Bke$oFXOBq5<>(k0VO1@hxi&~6I5PeGol z2jGyhkkqJF0~^5_=G1TEjbMDnfxo2TYYe6(@Fh`kwCqu7-1#&P8UZdF?t}e=LqkXQ z_G3WQQRdqFY8t$sfHrIH1v-sNkO34Kl~tq8P0000bl(FoAe?3-y$1l*VLusRMytne z1}6ZBzJvAUI;<}tKc=bYIAaS#UjNQXhPVN{APYOvpZ-+(vQf(n+T7m3%rgpN}jxRE` zd-^!j0<$H2{3Nr51KvO6K`HVCpohvJPy*j(qOen_qQM{25y;^fzW}X!aiAML_Eha;7^2-z z!$)(@HgM!=D6&_d21Ul9HO@VAq5j{i*;j09++CM^t&{b8Ze#tP8%997AZ)zp_l#!D zrcgFT#6&8sLX<^^N9(K551#|;-a-nL89zGb_PpZbaU3z5jz66pfE3V6QbLU>k!wsI~|`IS^JI6zusN_Vmrq*Sc3O_6T}&D6#WD z?dISF-90CvfRtUvcV!P;^&nG)_CU6**#QRHZ@&O{<;93-XDP2oV?R9Uo_@^_VNZ7- z+y!I7Cd}HsS*ew9Ss_+&LYGQw!btKXkW)@GoDV07Ipo`)z$Mp1LRZ|LqETU_jd0X} zQdbqT+F3@o{RD({aVo6Pz<*q!sQabbse@(*Y~eWMDrKbs@)in0X#u9ihz>mmic=2S zbJgNcK#In-P4DkxFP(G{dVUJB%F(=YTKQK$J&9Is%IYIOui0?C&&Kv&cV5|L>v*u0 z-_|x4?}NRKm%!f3`g~;ZqFhGs!zz_h6ZTXr$naONA#hsJp8kI|ygsX$XZ{KXEo`lW zq`sz&v5+fLMam9PIo5P8RisIzc^OW|+-AVhet0|c)XVs$Wu5^+Z{GG|VN1wF=#8m3 z-#Ve30B=v>NNr;er!dZtwtQDyQ=$6+( zJ~++j(Dx5CQUHgUWxv6_FwI;zKMs@Sh&f7ng=L#H5Eu`eBxvLn=mn=4NtaDGV2S{2 z=oNhPHO+YDS-5Nwt&H|&^n7PP=N`8Q(R06sao{#1->ZkVG1P0&gAwzL7mh0Iy_?qS zbJ?6K>YgBST+=Kwg}d6L=L{7Tq&$*n3+WTR3Mqz$#I^agtTS zf{{P|2HYxFcw0KZ(0W#vb?Lu4?rlH9^LC#B?#@y0C>dr#&^gu~JqZA(7Ndu*xFkj) zKacmHmFTvk;7wgfK}TP|2EcDRemKJX^C&9XemR1-+T^u4IPZ1GDEa&h=r(DC@EnjFdASR*E7%X*nd=_cnYXrxl#bKZ8j+ zlwQr`-)3#VIF*X!P_c)LLW)dHYP_V`VCP4G!vISD5tKiNgbrus(1~9BBMej@Evtm2 zv~zqaX`|uH*W^^dI3({GRJO&xQ@3TwBH$RX8y|Tck%u|tY(rwUASlFKY5bF5f7PD_$Ro`^?CwZ#%Ks0{+#_f0*VX5@?LL2+Z) zp+{yh3*$@#Sg>olm@|eYlwRQ#m5Y7_t@W{=aQ{Exrp%?GJ)fTf=C-%Lv5IN?CuZcC zf$X#9p+D!)yu%l#gkoqa2B$bt@Y^2~(i_oTJAbp%>)R)@^Y4FSH7vTZQ&kv9->aa%$?__Lh zT&yzKDahn*g?DqB(c#&C5Dko_Guv7Rf1-H?rv$Mb5D6xTup_Op`pI0BUq~QZ8@!*> ziVoG@#+f2(m>1gWjhG5th?bSncs3(5QWH`!8KtJ|@+|HGSar^-_w{f{h*$A zyTc4|HeN%X8OYmePEkw?i-l0-#AS)Dl9H$c=%vp3re1C{o5#50)H;MSj)(PyI6+Qj zl)_BRV~o@IMmUI`?W*_maA;5=4tCbLT%46Cz4EWyQ18#5{snro2QEZsb=SA_=_W-b zC8f>zgD$lPP|Ff1*bPI$X-2%azO#{e^P*4J^U&{mz?Ax@p8Dw>(w61l>gsBdqVC>0 zaav0Y9JgU>Y95q1qClgId$EF9C^nBCT50E@5C3pa0BKj$FB*hG2p%{fn@APpFGpyv zLJ4WsS`zIj*4LcQKh8D)w~s}hMAM-URxxkB*;j!q-<9=VC^!KgqPT~TGqVBy20TZQ zyG=R;=-|paVA(86#d+s*fH+@RRfp(yBMlxW%2>fci_sWZbtoeVAV8y{`XG98RlR3m z(I;3CAQp-SUx3aUte@-x^u@vYJ$>9s46MT^XN}k5NpmRJ9 z@T@^~SoDpd`lb~p647pD=|4tNqU9s??v>zQ(}I5t;u9SnxaygrW`!1?pjRQ~NWH&* z5i%Zoh#fm0{G*SK)KBIh>mG$K{b+}!}0hd}(qH8Zc0~F-B^^aE=T3SbVhHhEcROdG#Gvih4h6H3WNMAP0 zwm=jbdrLEGwH9f`=+fwO1y?MI2fQCWeO?_fEEiDVYI$e}TDz_O87oy6oL^rDK~Tq1 z--4vntx@{YQ}J=CY=yF)4Nf&@W(?(HC|f!TH} zQw?8PI^$7Gh`7u!F_CuZD#RWpCGL5@9X)cL^)_kH!g;AV>-=5G4 z?^ZK!Q+4om8fI}CTB>nrnk+|65;_wyhV@Zji7E?_NdQ0RHlri!@7j!R3ME!C&kE|0 zUy)|T&i|I_!HY7S~Alm<@I+)mLBQ2E5mQ)jo_lZZ$d`J zETqFUZPP(oPEXLDpj@6c2FK%>1nMh;Y=5Z0bG?v;4o&}cGqT(Ru~t?k-up>mPU#>c zbSe-qr=9r{g??Va#|{-%J_~7R{VDwI%vN zk@J~-QW)IP@ma`aYTC4YE@?qV&~!c+v1)@7HOY3tbvcXxhX%Hz-AxbYqnBeD+3T9^ z!WQ<1kR>(y*^E8JP4XEkZrXj$~Z}d^jYwnqs#WSd2JkJ3-H|X;I>Fb1+X-ta4>J zt_v9z?09}zSMTjTfpqw{tIlWM(bWOX$L*V#6cWO$!L7;|1qA|%DH&h@xXtigHyfB= z8tUq~Ae(J1P@gCYkcEYoZ5?m4U%m7LY)apNP3dqtZkp0LQZOeWG0RCLg!#qJTLA`e zr>%bR$t2|aw#6l6&OUjYqYhw)P!Zk@b~CUVLQ#9z^|iSET?vos;OVsFc-M?)k!Sbq z{k8#p&3V$T|2=0NjW`d&72-MpOy7W1&h(WDfv0jn_ScIDZ7-*KoWS zR6GZtAOIdhjvp%k{hoUNz@krp$$RQQnY?d8X>T3-@Dj8KqHs)ca4LYE)~m+RI8YxA zR@@*u=&g6JTKo}QD-EhLQs3%EYcD+MiLY=W42J7q3I>C4~xB6>U}kHb@eFeV7HN>Gqd6Kx3c86?!Gkx<97ix+zu?Y?^aKc$;C z#-x4U?)p-Cb<3+Qr+%&T!%ovFwNpAfqRW2Nb4mA8-9yVu%Qm-P-S($8+0wgP|J}N4 z$7KP$>Gt#f#M>+o?Ber-!f+rg921cu$rvpZi^qJTkZ6n+ zkztB2p!lIM;HD6eARwSc#8z4ea4m%G?9nZhfEJT9A>1k^_>h)Mi-r98|D=4$SRgi$ z&%&FO_)S|#kv|aj(=k}N_^M!dpzFS z{m;C`Tekk#TaJ6>@o(9GXbo>OO;PYY!f+7s)5b^%312}8{9}HSFB%K@NHP#4!@iJU z{(FSPRtX7+AG2%sU-D;O$FaAF#NtK2 zDG~)lA|GGuqlmfB5s0@61!&!)x3jM~eg0z>f6d5MGL*VIy@}@U3J4{9pU@v16Zs_c z7)^`(W4no(ZsQ^s%WS_~ON;X7noQ{`G0z zCOm3F@T&tlb#RPNhT%m%AAbzb*BCz#^ox8xng|f|{EI|eY5K0|>JpfoU4P~+`%mAq z_Ntu?VWVMkd<0)0#FOI>67U*|8k2hAzG8h!kzlPpQ^2O-peXIYkui3%A zhTJ8g=>V*^z?eiNAjfDiUohqigorVpFW?VKd_lfILe9Si%YbnI^ozXH_V>QeYd`L5 z1mq$@FnZMm%~2zF1wuYp13}4{NFwrqtdW8-zfVYy1;rv^K;R39L?Zv(dnn0PlG=aZ z`Q~emleI-(v-YaH4y{=NE0iL43H(%8BoYV5AVQrQql2^rmS})K#)lOdmV^c3pnqNp zDA8644ZhaL|2?|D`+Z)=fBu|p&CelrNhm4=tA`v5`aqKDKrlEa=9BnyLinX*FeD7k ze~w_QK!6V129vY<1>UlOV=_&^cHGnnsQjbfkOES&i|~a+J~2(fQp9pBg7pZ~K#vK< zWI*6236k;&=QtDeR-ssc4nO;wQS|xUhGT1gflMF2_L20Xe{U92{9S&5fE3YT7#W`* z=AHKY-~$Aqv5=5}ITs83H07Ir4Y8GgFeR`oZCty*_od?}UbyITS$h@9$`^kZpCChl z5Cu{t#;b+m!-s`K;ju92w{Q@q3J+6rS@I=YC6oZ|ah<((f6q(Dua=X&hS<-`!Nf~; ziHVR{A_$7dK%EI;)F|f0zOCR=Z}efVscC@6q4|%ph`l5`Ogt0oE=dSTUpzrV8YZF8~DqS!tjUsrgrtAgz-9 z(m%tS{%-@PZO8%aofJWZhyX1b6VhY=HUap{#|PC(!=5Rj!~wrRG`|Um_*+50{r}uM zHTX?iC_*d=fSL)91^Im79taA@Krmn%Ai@G+SOgm#lvixZn-De|F(pL2OWH>pd*?9? zaQt?CydX$exdsJ5^Tm=NL5zt7KKLHU-x?DKg47s6N3UpoGKPPR^kjrV}s0q+e(OJLXtzYo?=FvuSRbO=z=;$To97J~W|&Wizz zj8Jmdk@bKT(0I+-Ib8{(y~rlL@20OCkZE`Q)IRQwuz6d&Z1*C!Mds$4zVav!IsN!5 z0deIDV+n_%cvFB&nZnp4N=SMgc(5P+JXmi#T|gb@BZ8=%6Q2h=?E1l`G54})eHq#x zte-Mytk|NSh9x!u;p^TM{E0(^JmL>LxDs=Q5T8Y#Ku6<+IjipV;d&ngJvt%q!YF`J z;zeW16$O(nF2Y+uFa5vzYV?zEefi)?9%0shf7w@f=nGMNO=x^2u4wE{c-$TWinkZd z5UR;?c{*BO4k4O&AUKaOA3iesHQreSMPSI2l?MxRaT_N1Ca*&ZxeZbZz7s+t09Qp3 zjk0&-2jlR8i$B7K7V!tWhtT@ON$(xyL>!1Ms&=A%*;PxG}~d3QFNZdk%m_;m&luf8}CNpx*xC>iyZ79^6TI4n+ATC8;C#U?6_{TG{hxy|VCZ+pRr`pO%F%y){| zLuH%o2Og}Q*_{unvy{XctEAMWq$9@;>ZN%wWN}C=$UBs88DV~(uY)gn<$Oo{Dw{n- zBmxd^VKO7Md422`)v~aBxirL!J+~QR7=E{k>B`~WoHq+FAXjS}mKKA)I2j>Rl*D9B zB>7e)+ndvz^)_^7x!%)z0=@#xXsMd%*5ifT6PU^7=?K33zu)=QX_Dt#sS6_Sd_&c3s%<5VQWu2sW|L zu7;Pg5)xFp6DdkhjSHr9-m=Ca!sEHAm)i_3?pDCS+sh0g!{6OH^x=WWwxHe(XLO^l zl3jPRAGGa;`sj#x76SyZyj5A1ma1rSW|KjxGDRCxHEddoULG?s)%Pr@-iEGbAQ3!a7!89?3Ff-Q(cgGwmAMscKJCVg!k0%&Zr z!@!3X#e!a~(nIu%BjBJ2r`HTAx?cjTqxfpz!=a(0$ul4h_>PB1nA@+$egWGoMq*(3 zgv^unG?^BwGBQ5DP&C3x{&wJV@twejLxbz_ZH@f#5kL)XtS{^AATVN`uZgL$LQcq{ z3ERZ@xP=DyabuxgcLTN@Eu>)|GDs6HAok@~1_7fJcgj3FIzLEik#n*{dz@M-8z3f? zF$}_3A6QR__%wMuE*tl`hI1J8KKacx%!hmMaxu*wgK3ZpO+LSY@@VOjiPW13cEEyr z!F{oig!;bwEf#_Rwf*ZsE&4_1>kwM-D@hNUykPYK)DY6YTvZ<#WJ|+#VTEy;Au8xi7~p0lrUB;To59*S zydJo)o}8FbI-!Fjk3X!+TWGzQM8Eh3aN#s#=ne3};5Y{9ZFLK;w>+MX5Z26iN)ycI zv=SknmCZezR$P7nRMsr6Y_Y$t;tih;uVq)0Mka!~pE`kIobV*5giMHEJFr$nNsgaX z&Qoap2C9Lw38lRdD<~LPf*n#SG;VVeiBd@Hi;;4ROoH?e!jN*C(Gh9e8R#MFqfiUz zLA=B4HO`&^i=5pVJi=&j(pQq%)Z1^{ zEGeL78YsKF1eMnaM%@ zRQKcIvd(UXp0aDy9jh30R6&;Ucnp+i$|6C<8q7PV84=90Fygm9JjA?L!@&{OSqv_~ zvdH<01rZhYsx<~*$pB@$aZfh(a+{I#YJk?pfS%d=SQh8ZvnYu54iN#Bvz%pdE^l!W z$bAp=g42xFKc{06G+(+0`w)$@7@mNgF}`z(G*f9+MPk$&RT3RL8c#d`I*UU>>+ic_ z<73tOg;*B=fO%7H%2e1yIDN4IU#Paq6(l<6-uf9moK_^={3ZZedLX9g?t9sf7@PkH zzZvR1Q8^c1m6H)Ffx?fzcmO_v(~P8^OJObd-!{yAasVF#FhT-5kj8-AU?+0gaYa~3 z=EQCSX@3R`IL#>Y(Vd&13fU7w%rifOMcmIbwsa}mUu<2!^kbf}bDGhC=^6yQVL-Lpo@ZqR;}5X?E0lv#A5{vADu-$cmg6L(v{* z*)0DdNbW)sI>0Y9(^VRUU(!Fsd#81lKi{RO*WgG}dTAh+kSld~p+T26_Hvs+ens(V7~hXxcgS{us;;?EA>mC=k<4_m&~-I>7y5YhW`BvIIcrEJ*kjL6H_`{K$+A+ zG|uP|=n-y{AKvYk?~nvsE^IiO(r!~7bO;?1(sMoY}d04-}rxU+~$y2 z@Q=HCa)#A$M~Y&yUG)iBz0Q!YlK5;$a0bAx|R9Z{a80W^~|PWMp2T?#21HI4(!)5HSE4jlsnjK-08P9LyCrD_juRWkpwB z)4vk^<`4B1fa$r&6U-hlx(TdWB))G?J;a-X7=$LYy>dP&?2WEuv zgO`CBflcq^3Z);N{XU2Uw;4@8wj#ppe(+xacrfzUI)=gX@J;afUbiY`OxeJj>xzQq zsEp+uBiJrRg}}N4H=YE90I+eJW`hsw9lae7LpkMZy2skz;-y=6w5?#)TZ(SHzbjzH zHuv|EKbSV!1*MRstaQ5p)(NlJsaY@`@E4Gf@5qaAL_KBqD&`lnpkd(_fz#4ieH6D$ zIg3QJn9G^6DT^2q{2OfUny#yivbeY5?&@}QKyo*LM5#+UoJpz zK7wQB!bY^`+Zxz0WR5}Rn;+pF1Lx_p-7uyjvIMw1T~jun396qX-X{<@_tnopi*ZPZ z_v5t?MDyBZgUkn?0TWQt(s?$JFYbkUh6SyQ$R;yNSPfY8-u|?{viAg1-)m*ihS};$ zM)mi)71ww+2E0V9G9LCO1i65vITBC)1Ny+B0RnetBY$KyGxSe9o*2o2{g9MV9iquN zsR{YQl9G}J9B(|H1D{~?C5HykvuMk{ZTtF}+$W%qn@8qK3$FszJ>Kbf0`6P7w!!W( z91QITb#0hc!+Th8g=EO!qKFb0ND39ZNjA}({u{es-Z(Tg?SmZ4hxVcY=G`tlZ`xVI z{Py8=I-&-`9`>n{ZV6p5u-z@RKDeTXLqdnFN6x?{V^=c2Xnhb)d&XJgJUE)sV@MEF zgeyH63jTkLeR-H%Mb&pYvt%-v%#z7I69|$F0a^Mky+KIQ`@ZkZ+WWrmtsg_)h^ztu zNdY1n5pkXFfOy$NA|QgxYgAl$frzq;;LM03;&-a=%`kHv-tWuvMNxG$NFN!|TB;h_=Px=S>n_&Ys{G=eR-*daTI9=Vo)3|ZEYTUS>pK_&BGiw_M#PyT~*<*U1yEo<1pKuQK~FrJVy zY$pS0I+rK>QDu!=;_5yuVkr+D-wkh1FBWgx$b6{}%dyTvP6ni{b8@kci@f1U)TaK`jWD1_TTEBIvJDUk9xJctIK!p0NKXFq&P zSjT9#fGJFxW+5t@g9TQzg z$!ms!SHxxL{jtTecZ|<$gO!bIDki(4X>Z=8bq0)CuT>p$xsq7))CiA?1czMsCcB9_ zdeY3^?jGY@7<$rOO+{!GRkD?uDH&XcS+gjQgIVx+=*Z*@=y52#3H|r@;%>dWe&)ne zQVo(GLOF)(1|I5vwQqBeUVsjN_RTVWN_rDNCE-X!HqX93C3b1(x++M^%~Up(h@w&D z%+x5K3?{z?K98rjH{EkUIfIkzb87ykYG&Iu<17v=WRq~aTg7UGu2GP1J|rQ^jTjcV z8GW9ZSv$hxL73FHx){xk_skKCg>Iu}woRC3F9iMOyZSYz)s^ zQ8ObWd=5@?wt$~qchA$*V!3~%VcsmWIR20=+RzefLuo<=r)qi1=xM51gOe@JX|Lq9 zffBT}4-=J*GoKU92o~w%NipcdG7D7>xj$h|D^waf;;7pU5@$)+NMe0#LK`H|c^(fH z|MV_SrMCH=ykv2=ZD0Sf~bA9r7X>rSv8Bu#aB6A8zjGN0`}_twN3ZDzI$=E z$M?*fc+_9FVwf0;4E~>iL;daEXI8!=Scjo#?;(G1X6;x~m##F(q81{(EEZ=PV&RWn z1;e=}2pbcRhXiL|OrXw7rD5ic;EY8u>7KHe2zprs8w8Jvj_rER%p}z_ zkZLD98wT~UH*~$uS`HBrQ^x5mq$L4M6#ZC(*C>yC^TE4yj9xnf)zGpYO{D}iZ5Gkx{XHmYJC_&bS1l zUTr=lCX8`SCMZlMb9HuABGb&sf3o%u-wQzQ`RB)(w@owq@G;^N&<$(N@NlfwSIl9j z$Z7Tm;9UoA7!!aJS+prHX@d?6o`+&kF9)C`>NUuE(8u`Dzknn;0+`K zsW7CGi)0|%a#tjzkXx3^9DG0u$!l7T8SK$EB%p409enl;C?<~Yv`|;l0m*=BusRrM zvVOTHP0)2v^|lpzd@st|us6I!eal(zqY(KL{tDJ)eZR<+0Gwo(rHx z08YMl>78G|chSpcAo(6>4G;j3p*{>ZXP6MkQDD_-vTRSkaM=tz1uWYHaPs^AcUbWo zGlvdcKGVPMq7}nChRz?ny#LpNiw3^cb57q%Hf!gEWfsT3vIn=a1&}I)MW?lk6Y;1W z9s4RA|Hk4l3_j=JeI@wLo8H*W6yh`RZfKpw;koR&IiaZ)XgU>5=!{i5ML>12?)H`p zgB%_Y_VEbZNuGUjGxNhR9JwYwj1yMJo5~yxRv)S}WA60DR9uLmhS9ypU;hZBJ8 z#x2ZuugASP;FwK8cR1%?MX4m{OfX7&65>J?lIy0xoQ@}E){jQ{EMiUoUwxbbU6lku z@D0k~4}JHAElX=GWrf=uur(YJT|LV7XLl6(!(+kS^jP;!xrzCF6b|9rWV1==4qGm% zERKl{lo_%s7}8Ej81|Izd(ZvQsSzFz9eJ+5d${dph24N|czWA;=*H&PC(vX6=rCw| zX6DQ>16ia^goT9S&hdoS;fkP(GO(TU$>`vZ&#^Eq@2_^ki`e&OzyY0u520@sf`7T# z2%e#GHtfkkw|FehhSAVghRMM}7z#;79hEmr&q zi%(n3O4-T$?Eabc!%I2no%bxDJ6s;|@B6V$SY~k)Fl*=WM!r@dbqTpanfI9_Hf}Dj zxeiXWJRS-@xt{ZLzjhrq3Ck>w#pRwW3Q9|a^1y>|!4x;@^z48xx^rfH)XZn?Kj|Om zgG+e^yj5_@#nt^-vuZjFZZo8k3y}VtCmE1p8B@bcsc8SBaN_9tlFvJ|fl*zJjmkD# zf&sBYRNh9sNh}(_au7~y^+oj> zX`QTux$WWkTj7?ul!Xp=AZ`t=#9NrXw_(LuXK|n&cgHWZVs0u@5f_Asq=S&B*eP6t zz$QIQdFY^X-_ApCe02+xM%bWiv+xMX>EEZ*ktsr#N@k+bU;F(abL{4s^RRpD!w^q5C>d^p!ni6UH3h6eiXGNf zcYq*14;^{)=q~t5J-vl_^A1oDhh<2t=>Ox;#ZcIk>DfJeR^P~nScV^OJ7Aj=EbKKU zV^&_u`^t4+p3a2KoCaV1Dwx<(79>Ns12P#r{@7MV_qDEx&2<9`yWb6moi=NUu!E`= z;GHfc4x+Q}o;huJDHRo8+r>J9zjQYo8@Ji#a4;mRJ6AFxR8qO1H+Cd0U~S5x*C$)F))Fe^6cIWszdNXy(C{Y%Ha$b*kXAa3`tpdq5%OB`gSWe6D*%+R9Y!0fkK9 z*iiO!oC#BT7YU_Hvr#(e%NCO;@(7HEM@C0RA;BoFKFB=w$jk+TZN@oVXOVqlj)faa z8>tQnWu8Vs60~&p%yIO{*I|p{@t}gh*|6F!{3SfmeglRxG1t4WgV@6sVcaTGCWK+P zSqC+=eRsjmyOfHnXPtXH--GrbREOSI2*E0}c`Lr|FZ38_3$Qf26n*ei^p?>+#-;gO-J2s~9o z&45XUdJq({%{sSwL9eN>)?TLTp0qZbH;V(pFnawvaN^;Uk^Gfkp3hvw;H^452Qi@B zjn!?5Hb_#asbG?<5ToaCqQb3PdzKKIj*w)LlQ`Z(!8WDdeuxjeuQxKR2jUpbem z>Qlie1P4eSh2QhZY-sWWkHYzA-4wW_2QC|;1yh58{+Zt2_4MHn+As*dU=EOuTzIb7 zY)uhFKJD@}%vDV+202DwhHtp?D15_tJhcDl|LkSHbQFYxb}^2W-6=HbM595QDXqt- zHTvUTF*^AE%+66h8E`&d+spL+3-466xef4h_7q`hHk}Eg7Ad3@c2`3OXG!?^hV2w7 z5y=*(+2^%G_QxSVJ{;n=Fqb`!7rSY0{er>xDkZm)bW7Dahb`rEb|pehF*t$#{fU{i z!%Nv{?DX?@U~uaM<9ZSXHzqU1gceF#%@mX7cq*J=uczplAHWM0kB5S{*tj>2olnhx z*WNQXz7VgQ(iiH^QZQnOq`g`T1z|8)wO{_>%-HZ!77{!Uh^@{^t5!2TPtSM-qk4E* z(aMTyb4%KU+C9u@q}UokMRJu?Gd?NB@$YtkA3h+4%$W2+QJwjYCi@X6S| zAVT-Y@R?*c6{rS^lLN0XLvrBL`fupHZ6%Ti&k!Tyi|}H^oBtEGaoLN@+s29DTGt=o z^}z3igp^u)(*jBEab`NdS6zp6wsrJ8-QJ8|{KL%JjmtMd!JY0CIZd`1+N(|(TX;Nx z09~9V#oY2Ftu8g(u+t)|79J$9$WtYYOQ;8yZOXj!?b)si8(;gg4sgI~(s1ET!F?QD zkoFdIsDZ&&x67% zx9?#d9d2U;yLoOK2w{({8HHb#q#L%TFkWxDWstcK%wQAx&O5N;c|10K-;FyVNx{0m z;zN^lZVSj^k31w(;e5!B`%Vc`ZunEeP#-9=ZECK8dd zrbZ}4;CsM(D|+@lSiw9V=X;RdyM>|tiRIYmFc6&G;==*6MNCFTj%2gZPzCD2uAD>v z05LokAgd)T!k4-9ANVV1pTo#%R!l%qP_?LX$*Cy#z@eDv+Q&FLFbl)t@sQxDA-F%` z6oW6%;?s#}4&#mG-G_O-)o6r=M2fOI?5TLX`@tDU^$$P{kATYKH#KUXg1>)Z` zQ|odope%QwZ)4BC{#OUD7UTvVVnGt1HVg%3)mE)}$|6eCFvSctS5Be`VRINqhXif# z2QTHJgP$Zp{q-+yX66NL7_VavqjK3(l+EbX+ei}~iC02Ittji7)i@el1#);ibl7$R zi(0hqkA`(#w3Vuf0z&VVs+Sk1M-a z)R0+9QdEX2Qmw_~1cVLN&BZ6R$A=bk(Ej`WGKIj+3c%o#Km=ZJxY`^mBWfySg`{5O z^fr|SmqyZEwc{w!1D)aXP;qs(3wz$e{HUi5#c8c`+ZT@0tyIqKu;@g(WW?L3Ix}o< z?i*~64=-gM^6!MR>eEdqskH|53qo*(Hg*qbs0#9+McdT2GOCotj$InCO0F4dj}0$n zp`%-&@*UK9n`GV?YA;k&%dQY)`~NiXaNk(Z-eGzuG_6w%_kMbRUbsiSdIS zZE#@Db@9pF-A86=xN}rV1PMUJHovtJWashrF%Zh*p(AJht$V=+e|h^~AIkjLczfHV zZVp$cV_ornrxG&1S}i%1Co78P!O4ObRel`Icqt1?y5Rs10HK4gyZz4(Mb55opYU~8 zSzq_nP?PPYzV$sy@O5wfL5cHq8|E<5mG#nFJoaiClD!pLHE+aO(kGF9PkZMmpA7G! z@04`J#a)yL7p zXTb0HJl1~jbI5634XN;{C)6Ff!;p$wT;a8&c?D} zgFRzTs{W!BAH(FMx{;nLY{R4h_4XeoTmhislp$!LrMu$caVi zWQ^1oJb7QW>MTNK_^zBwE(SR~9$Oi{dzbv)#ob8>&YcIVoOODu)m3$#ChBU4buA>* zRm6zfQ=|VuCA1+UBbBsuP?UR42EXR=o0*LclRPf2dK!{kAxxvsOF<#IrBwC>;A9!- zVlp@&_yS%eMv0ruJAG81O68;ZhcGFZqsx>C^|11IltO`y=u zizhtA`&4c46nmlEUKTsC9gyA;e8!|*1R>90p$tgMYubIMLTZZ-eeBD(XAVj)2jB68 zp}iWNr)jT-^zOK00k}y*=J_nnPMH8uv;~Zf6T1#_yf4=Tz`>WC=-}zP_PR|iC}aR% zH;YS=w6p+K?Ml}zP%axebnU4P%QE5J^vV<3g3B`278F8gK_<~u8m`*_^LD|tJFBlF zwE>#{2XMHVcFyzTYK zVrs8jt^pDtsLsS@B*nLPwARvIy`einplJ(E*qKU`R<9*#K}U3eINxJwZ(t{o&u=kD zzH|qKJpa?$Ub8N}V(6lQ`vYf-`8UOVbC$wE{@T8e85#h_ms z#Orgz$uf~lDE)9cmBi9!=)M%+f*&_TjA+qbk?uM~Dg%1bd$jj_vN22IR zsUv1Dw@Pi~$wz!itPaLIhGponzX z^-^<0nqmh#6mO5OEiL9i>G(Ifl-h+j-tBF37(dH)G+#^=LsTJLH!E7rtQunRSR1$u z#>(TNqxJ(Zc{uO*W0!SLS@t;$=w+?ZU5w@+%eFSE%-Tx%A_3K4@h4Rhh56(25KivN zTpn%X9MW@UkiqIbUoEvlbR|jpMWUkCXy7_?QxJD%DGwcg>B3#;?MDu8VBQJBrx0HC zF=CrljNMDx)LxM(Qw-T?kqc^$;;w|la70Wdmv4w zof%Ihs56S(-SvvW5ilS=59<59x({#>a5>njUFe3c)GW#qWQevKBx!qy)5z5s=*ChO zIym-iSflscKgqnA!82r;(?LJj3z^ZOkQOOvy(ttWTZL?#vqmNbO5yR4U-?rnh>9t*=spnSpMZ*5}M ze*&~Wflp=>S$0E!>EOq?o^)N7~+cAgn-|WcJ z>UcFuT9k4HrPXAN1UC!+(*S8a9$R?6doAAEWUb1v&?`x%U=q`^kkD*w>Lj>^V7FJR z>L7>5L)}7xCxW=wGx0j?|KM}P&}h~)yvnptUUj7kKEJyW%5ux)h9Vf)QWo036OjCH zAKS{jUBtI)X$3;Z$y&e`H`wJaDbx_`b|X{<-yxd->sU5;^RQ|r9 zf&2T93qn28!E3Np89;B2xeFJ@8x2s^FnBaI*-TSKd2J*zAAmy{pNx+D3eZK}Qe_bP zxqgkBm;JvF?P3PHH9vOf2huY>P2w-rsU7@ioS;a2w6K&JN@!DRm( z*l2pYTM-8DvirA3>rBX{ig2n~aEEAL2s_r1z^->l(Mg3b2BX`e1{4(R43&B9y z=ux+{We$)sry^{NMilT~gns*37$}d7-gyW>Ox?Sg`Ia^$v$f3O0x0YPbH%KI6fG3W zGWD{>Nx;M1iQ{q~+J19;c$D7&eCij0+M-|H%(QOCYBSA22@&q|CQ&I2DRHh^6slV$ zxraN_Uor#3TFOGiZ2&ZYD6lQe_hw-JCJ$UR7lzM%xtl?{sA;JrUa=z>FIq#bCi?WP z?Hwb0B4lvZGrhO9vDXcv45gG?D~lCXS-n&(LFwD!{e(|O-C~@7zP;@dj5VcsLxwPW z9PVPi0lC;>$Zf>Ec(m9r84P)@E=*Twb%lHLgm{XeMPjxl$( zt%7y26+^zktNQ;i@a^Fl3gI4 zN+nN{VogOe5*Iz%UN_3;fKT@8`=b?x1-VE><{2jE-VR$CnlY&E9qllupi4i_msl`6L&IqZ<-!rWLLQGqm$4IW|Ie+LvL2~fgzR}?`Au#4o z*huW4aNAsQ;qORf;Zl+k7ZU2US0jOI06O*nSRbFvR*88r_~K?p`yk#Jt#cUp$nHAk zs3J)a8Mjf_Y+6aWm0 z$M3f?RR)d^uq752Y%^X7B<*fzuqo0u^cr(_SR2qo55YZYDGMFhKExeuw>%8Pf^~um z$FLf=sWbz7ICmr7U#tO=1caR(*Mr`RRQig|o5zioW&zul2|U z`C)SClEE7W9>ty!Z+B5+JS4lQA*XdhNJyBnZzcIDFJZY9n1sI zfE*qVE;qM9b**=PF~My45nkZtISk2UAJ^qX)S)INX}_gl^yRcZZlk#9d3Z_X^U&d! zhT#$6{rk3}N1x{$4L2s*edtdwv?n0l%^WTf!iuesN~hXYiAyrUqC`$|CxFi#g&AGS zLI>}NVBf_g`rs(%5BVb9?nS3Q4*n4997b8P@75ZbF)5^7zFIV^YZ!F~Zoq}dVZb~d zBFd$yLlf<-=;x2OKVXCAu*`ov0sauf+$W%ytV2K*ZW^MJz3T1A@AEU>{){qKr9Z;;x$9|d!`@<5+r*;_CGD|Lj7e>m2Dn_Dp~(T zOja#5DWToe)JaLX6{=&yAD9|mN`?dCo+tg6&O zsZd+8>x=$yGo^)uQy_92rGEhvx|D^JPIYspY(YQz#o}(h^GoQaX}${{?YdFurizRZ z-jL8qhs6?gQp(EQ^DL;J$3w+FAABEAe`E`~^V!8hpZFCBHP5eHu;;2Vq1RB^G~u@- zobE(A-4*&V$Pf(gbmB$tbo_>B|MP%w0H?_WD*t-1CEofQ_!E|S0sILzdeNmK%x1!2 zG-jgCsMkOO-uE|fF6EKoYoO;YBG`L^RKH!U-}LXg{l>UYcEN}$`&=9H)Gg%!CMMrK>Z4bmYjd%@Smx;SCv1Dgzu3$(rWOAhh_3u?|FylSc-$)kI!~U(h$9bC0)2;MBK-2WW9EcXCI^;p9H) zpC7`gw(ccMk`?;vP$;u#Z^$a~qz$}X(EIf-fja(!b*z{;pDDit_u@(WJVrxu7e*&x zE)gw7Dwq>leKG~o4R=l(2`;6gZnRG~=j3;XJ8;uG;F({$fUOJ3Gij-^BJ{LkvVh9~ z;aV@Zr`9f^B7ysSC@1ptx(VjASK4mDn5f~+gCE0NREa9uP=b!2&%6pp89o_Dt(ck7 z*RU5PG>;*mtoOz$)2K_diq>T0-l*1MAyMgdIPLSvko@kTj`{QJZFmL>&tniO>%M7` z9+iUfG=1r;Rb17HrO5pz{B=H=b)x+GP5jrx^Q#tquJ$&P6{=tk<~`0#I^(C1>@D~? zpA4Y-K`ry`x8UBe&f3NH4FZm21?(lg=dZjQ!2wUQ?Ng2pU>~kJ9j0@G@;~ORJDr!k z-5&jq>12*{E_XoTjbC09Le9Uo0py1hx2Wt;9m_5s%+NXvu!9B(Se?GXGDmHK>5r6Jq63{omEKq_x2j>ud0J<3yNs~ zc3OqKCVI%Z3myRH-`hK|r(+o|_5m!oao)pj996tw@j?X-RT`9QuA8;$CImGmkorCB z##xpN38XGQ;Z6d7*T5;0CmcCuts?`;dO-ySa4g~Myg2_4r2fSlz)qQ%T2wOQBieE~ zfG6Gquh-fS!0Q!AC9;06BZ(_;cl$#^?p_k`oml1$nOL~!JidHe4D?*o-@fU=6)RTU zxbikZ?{9h^>-}o)jlGTDOM7*_!rsljD|%jC`C`w{dLHQcV$W4Qg&tqezMfqphexg+ zDUSF@6eAxW86W=V@Jqu#8oqD%bHkq+&JMd*{&0BD@YL|g+IQE!xb}x@J0q{Iy>;#7 zYZGg2Yo%+quN@eAd+0Yqj}3iw=*FSO(4`{}3{C5XghQK0jt#9?^Xi&oYaU#4c+J&o zifjC9*p-x48)-sgOnQIJ(#^HFi;yR)P-8M(uA52k_gK1GYSvQv z^t4}Psry?VSIo15Wr!r9Dyvg^OX2IF_&^&$*4G6MBgJ zmTJTlQBEiWu{FPB>2xs!&*MZRs>w=JiAqe)b%@Tw?M@*Pwu&OBEi|2zoL1s~5Qd7d z&UA!q#5F>FBP=v>^ngZ3ICD}*urAAMGBWM`9Nlk-(TbQRn+_ZOGGXM5Z*g>Uu0fEY zTqPfuCf(}b%F8&qk%pYDd5xcPThoM2B)kRa)1YcvSd5YWh+S0|def3pYADbCfNE-O zR7E2tbTVZYsl@+VbQ3(~L2A#7-x0KOA7uQ@<%0m$? zt;Za72LrjF;~!jeg;(TP2c$l_Q1@p=d;i8Ym!|7>Y2v2ZY7jb z%AZh5%o({WpH7~~nW81;uz@eL7#DkLC2b}}oX!fec%(F468lVAU(Jv;(r!OT*O#=E zpvDh}xbBYO5z0$_St< z$g-`a3|fQqsv(Xp@{5T~(I`(>6%DzII`b5kZVokrM80Lsh|C&OIh`_Gz|rlV24&NR zXkpV-NV>#3-eDDFR>@?vH&lw-rb`C0C9>||+EYa>k;yf)ZbF-JR)|$kuym6)o1u-W zrcNuDTEv+UbulZ)q)gGdMx|zrc!*Xoy$%$L^=XpXl7!!6&uG*tqsO1z%o(Dw?n;s} zt=Zm&nktlp}pB|BbW1sQ!2c#0!}Cb8ZhkNTtX1V^`% zBBJ6|8nO^fGbCFz4(9MEDYN*;GL}G+fo1vkZ z&O&-zqe77tYp9$^@jX_KA@7PrQyNLaB6JokGSvtx$B;Xq08AJ1orXy@I0?RWH#rI8{NZDOQe4&e3r8uPcQmgeXqL4Ay#$$ji2FV1J-X zxFw`Kn~#(%;&i2)w(jBRJRsJ&oIUFt#TuDVRE&OMIspJF$#rc1b$XkQGM2+sI8avk z?fbZX>huQHG*MKFBxY~2>H}8|xADO}TL_;RN3#^y$xROWq)G1Y%JON-7_`~yrlPS( zh2`A*>flmJO1*N8iB9Du5$X1ITzlGTC-SC9Jl!z+%f^Ua#?rO998IZH5sBG3o!0q? zm_EWWvIPrKwo6>zx>YF@i?kkg0NR8(OzZ3#jk2jTmMAgJHIJA`Dx{3MT>6sVqD^jj zm}@R~#0%woS&{G*tfeURX|}nhrB9Jbp(c>cJB)I9{FIwG{cDO|2LZL$@q~C zF;CbN!k(3@#Fh-`Z3W{z&I6zSM>3+hs63_g>E+@$3gCXJ4Qik@}Y+2V94vio(8 zuFva9OPr2dA|5|{rp`N`qmwy5rSjRF9(Sb>6($rvV(BWWGfS0SC5_ZrwKxMI-TNF} zSS*qrFKsSH75QmZK)mf=?6{OQMTJgU3;t|FRW}wloXxgZhHOEy)ClM*_N+3UN$8Jq zbay67&^8fSk*UCKAKb{DT$D~oVIj&?gGd?I^4D@f5a3n^znA=gluh_@!v zbGwG3;f)gt+9$5$Lf#g6Mv!Y>k1HvQ&@a*#EWt!FvRBH{i}Dyf4b_BPvXVGp^<{P) z<``bFg_N2lMQ#)!(I7^Wg?NHr}sAbeHP0eS`=yY8B zd?iDAOR<*4T6L>E;hvS;{x6HBGnB_^lGoy3fgCrXaNw)u+qeE;rnf9hqrDC#DvXjIk939@1h(g&OGMEbiNh+aAb9Cvn zJ4@;%K3mD^ZxT+~DFK!t^<^#a!XpU>#iTARPwwN+c2cdbOox(`nt~Ids+f^K%e9yK za#TW=E5tK;o7GIHUSmyK(lCo%t)@Dhip3OCsp=xOxujZ&Qzm~rLr)jW)v7A7FVD5l zTlElC+K>|sOU+Lir?~d+RG!p?${}%H<}zzC8tywTab*jEYRpFI!wrolyz4mE+!8cF zO);ZX-_Q#^>G(NyPP)lZ(HGsaN=)Xrl_ej8bvKQVR}xt*m&*lIwn(#(B;%IdoET{l z9D+83s2HyWb3T#qC6+F3gz|J+m9(b`Tx_!G z;j=&_XqR5CDTSrn&LmbFGSg(GtV@c^kkw5ivW;0s}lSt%l?B2D`oWv$*+^i^V^eNS+7n?pet zvTC2TDymKE{lvuYIfg|Xqe8l3&Z1ZAn%c14$jLWm%V~$gTCCc%Id9}t?vN(0MHN&i zYI0g5CXI#6xPQ5VZLi3vib;LLQ!06*t$5nQZ5vW&TtbDM8Ztl;{!ET^-wHJi)~^^4 zBvuTc(KpopLeF_a-hqxFG5CdIVWnU_121;x!y}hqK8y%X^4xm6vEN0=X7=z+-y_0D7sgDB|ImdwE= z!4Gxj`7wC5V%=HkxHy@nQXYpq8J6jYsto;P03`6p0QN)YG3T#_{%^C+uZLfAaI>V* zog*}QZ7E(c6ap40a`kj}j@Xxy*>L+W_T4(c{ICZ`08j24K?JKqxi=@R)ADE_MycIu zhck?oxB*>qc4usa$3q8$?{kR3$IkBHS_am6i00)4iN%$MH4rWZvxTe(wq`Wd2Ls_z zA!o{idzjn$@IV~%BhU*LGNmn4@@g93HL`q2l!Gq;Di6U-EG45Ok8eEF0eU;phE=7*CT-n30rY&Cfombl<*g+T-oC-3(K|!q;J>-kIpc_=vl?Y$5b(lHB0HL?_$5IZQB z$xKFN0gAP{>(A_r4KHP(u~ILFAwwC0H_z-~hxa^=17-URp#6H9Dr@bcx+@e@%W3ql zDX@PY866x4pLsXyQ0X+7HqQ5&SuyaiATxL!cwk={riL!+*^7OzuC7^cUziS!gib=W zg^FJh%DT#sJ=eCUvmU)6g<0jX01>zsHj0}e^2Q>=vudBm+Sei=GnsS|P$|*Z6f!o2mvu!O)w{s6lmxNBKNtufDm5`6b2f zT)6fKyK|{bl(0#M?N(o0?Wp>TVbFYRT>~N`yEAB!*(1iyo$x{C23Q1}wzo z_kRU)_gsjL$}x}Q5!opq^ukJ&u&Ol*Q$nS+DT7$()CiA^_76V+-rM)@o9GpZq4cTX zrrIV{Q2+I8bmNov?LyOk_{jb1<(w9y(^51Te!fYajDi4(4@SFup=C zzVhY%&vt8Um?7%y0qn^7CnWBj#}RL==IAVx!zN9kl3bINS_-Nt_CigK^2rNvh?|*k z6fY0UJPyHQ*Q&&rwfP8(qR}*k?9GHMj6Fo-hzvt7c{~)XLWu6A=;1BQO<`;*zIido zVSTO2vZ9cpBzZ$LWG>0fVd%@J!Blu;boBklIX7$c$_@Y|ZSw?(VAbwXWC{k-ZZ4H; z{+hxLAXB~vD@ObF>?Q3DW(A97RvW z;NY>8iVn~F%#0@9frzu6|{MH3i|>E#a)R zLdmkF5Q(B@27b&Zvx#!v&vZ0`Lxs+Up53f(liv0zcL%nCtIq2BHtiaHr3J6O6_+xW zs0Orb3JPqbvFi|ro}s5o zogEvO=c4_)^pM8olcO7usoeRfJf2@Jcd&003Q%#rO|4mFXhtPoZy}#FM*w&1tKg&I z5^5KB%+;dQ*E)Xizd;}ygu{XFI}1KI>}pKmfHm|`t+R9ea$GbTzViRK4kh+xp3~?I zZGsSeze^4&Ld}%fWy#`1A$}5)t2!E;sSV3Ax!kG~tCU4-? zwfR($WD$yF`KHXl-zahLUe}FzS!Xq5e+?wfE^{4fawN@Jb3NcvLl%@whLuQ*7E4^V zDcXPP&eND1KWNtk>(ndy1jADT^^mdWV}qX=xQ|Upc@~^-{PPgT$>ArOeosW16W5&; zVN;u|iIM#-Fv{e9*iVcg9t#2-P6sreGP{-e`T;nOPF^q%(VSe$C!XnZt77LBAF(RXW0R*$FjroI#aQQY zR4lvS#sX4Pp3IsPiA>fZDydL#2Auvcd=+}bW5M~fJq7o}EzF*;;qA#YfBpiF!{@F_ z?Bdbrx4 z{x5!Yr02hSU&kM{Q@4G}*@2JmRUhx}U`s9Hgs~)UT;5oipY6K^Qu6G(sdLds7|Y`~ zeT1b^;qy7O0nlD=UX#YtE!0P8PO4 zIXmSqT-E7An{MljY*@Axd?FA0?-K3KxU|v21G+uB9*@hWsV_JwZ3UpMc~|y z*XcK)$%bW{KwYW}NCX9mC(y~C>wHvpsM_Z`cYTDh?Y^V4{y$mo^lywa`+j{5#JW!0 z+3{~;b6m$oIQKTxg39_+c#94odxN#t@r}#3fXk_R&;ObYiqk;HEgf5r#CCinlDI7$V!*D?0k>T6g-g)S@ z^_!SKK~hwKfJPhd>YO}jnaA<6?7539SOD(nZFobjoRoCsk?pR|#_gn7Mu-++QQQF-*Iu(3d-z`S}vW-Ux6qh!9Ov!@$=gC+v+6?Z}Bcw`j38=lW@y!($(gyJqZ zO?1lwu_x$)q8L$=DXXibFhzZd61%~zxu>&kgwGkf(gS;o@dulk)ID(W1+be6`oW5U z$YiCGCM<4E(_*S?On7YTk?3w%!b@35u=+TpsKKEI=x%&|_RlLp)vLN2i>n;esHp%Q zZHA$$q8HNceE#b&8Xg(F^UiiSf-v6`U*WS~QtUg72BICRno`)PvMEq)HQ!4b?dZ(7(IqNbv}Mis+#yUd?4C0*>tKKVGD8hEU37&9(kwS{@+ z@eYJ{3XM<{f{=%DdH60AvSNz;EbM*~uGM@VY<#;QThw(>=km@cVL@;GFgRT1*C;il zn1G-K+73x_*&h7xchCbK3!>{xRohA1#fi=kEMMl^%(pAGOQD1hB5<> z58lc?mO{4Fc_>Q69i5lo&%Si5vu?Tlj6FFEeh$N&u+G~SUR28ZEYZ@DC2zjc5E=CN z0J9P8{52??&k?Nt8l;lmebW}^%3ot;*%cx(MN2%{vb3SAWV&bWarEwQz-)LdeCB5J zhWmaCx|*=VgtHF|vRFuIqr65yMM=e$=!r9>^;s|+9uMC@*np>dpT$Dl3)Tl^PG~z( z_BmTpmpE-yK^4tkbasyN$!x*x&VgIDGQa-?d|kUiJ*FnQnP0eIns@6^jX*lKnh4p9gL5Sm@v^#AQIf^7Uxj|BRiBMqcQ=3z3%ne-y;P zmv;%I^uBK3L0m8oM_OY43yutC7pqi3m^Gv(W-B(*Vv7M17MR|G!Scv#vI2N^oj^z5 z>ii4+?1}aiI{uf=$qTHKS1&3g>-HfJ`20zg#M6w=(Q&-E%&~vZCX@O5h$D%RtlPT}p zg6yxI=;vcoonBOZy)y|Cy$cd`(gfikg;7n}FO4XYt~9#kI1HReM(^By0lYV(_*Q21 zAMl%;bsh((vn#t4P1=QoFI%s*AnZviN}%)q1R{83xUdVsadX`(TTuH?C;If?FT((> z^EhUnm8D6kQhrJp_xt?uq+0}l>Y-Oa7LSaP)NH0aH2um6SzmayvmN4Y0%u*`62LF0D+Wy7~mG618+oOx2M{Mv^!|0YO>3l&-nB1YP zA3Qv!4?ql$jNX~L_%s~fHNkxUgU%j77b|_sO4*8)@2-4dFcdxmAO?}NJYo@hpgljgh zSuyzP;Liph82sYkRfEMr|Db&E^ue*!|5$x|_0y}5tiEma{?*CV_SNUD-m!XUU~b^K zfhPvOHE?L)vVquuWk51;^1!N9e_8eGRo`26&#D_%)mL4zO1FwwwRP3X{x|x6+5brY z-Tl}1*ZVK&*Y*qhH}|jTd$sRa--CUJ`>yFLnffm1Q}vzMx4!rN-aqyJr1v|$clKV{ zoA34Y%6re~UDxwo&mVez)bs70&-Yx>lk4&H?CF{68CiMC%GH8*1iuq}U+{IoO@fvn zBrvQ1CqBCPF!L7{9&MC)(pAb?4%5wCvT4@r{6iNjV3fIZN;**rw~`WfIvxzIyq=?L z4H6=tj6_=Euv6-iZe}43MwwclhkUDKL6y>2bxFx~VHYc4l*xliy)P&WrX+r~jyf&M ziJ>zM%BZHN-G!JdS0bgmW>|(4uscM!AyO8KMUyL;H2smIdjkaJZ^a~ZC~6TFLP{e? zw*ZDqU#k)_En)NJ~# z=lwP+VX9@lP;|W(6H^bc;@x_W&K}c9^UY~bqTxuK@)wRSH;Wa*kg*xbxV;{ctH6?7 z(W)nyRyfTzDMbVmS_v!N<+o?(m^7`ZsdNCWk}9fPbCp_Sut3b=fL1lxXQ8P6}zuI)d^zA*m{|Btib2`>R58l(xH#(U@G7)=0?d z^I6Q1(GhV1^w#Z(QGSr| zl$mgHbY6a+b6I4X(IFE$s7&1u6Y7e}j2dSg$G~&rv_lH%RCR6#1(h1CC5*^}{Y1ivrwK7Gu zG_t%x6(4(x6Qc|m$)ZtZl^UXXf7HpMu#I-9Cr{TDZo&^1-!#&vox?S!-6~;7BBA3! z2pSbn9R@PCKU*-Ka7uFiWIhX3NFs&_wzpDiq%~bD)FhQ+izas&Sh}?pEl?#Z>CU9np_(hW_aTm6l#3|+blxHg z8_BHJBR%;j$8gpNT5cdiS&dL(kR?{Xz|t*6k%{tM*3`;lrnjSJP&qXse zuOrY9%UQ6m(d-4!lsf9KrYL){n4H{?|LU~TXx56&Ey^1fmepaaI;_2l6QfY6pt(hv zRW?ht5HYZwrJK?^1u4%6TkfdUTD1RP#@;+YuApPoIFSu@E@l9>PjlCaZv>E%KK z^uF(VgFx@yxA%Qf9CmO+B0>owi!3Ulrh9+}R5bck6!;-L#RYjt#0TO-0WlL7z~8xD zH-Whs-h2E5oKthUs&1{PKId~1)4Ovq|;r*Lacm59w$UUFF&r3p4V`SCYw8aN$BgDDRawodzXw1JeACg!kplQ(Lnsw^a0 zw<{Y_Kk4D;m5Fi&DQzew3po_pW+083jc?mrnLBkqNNKc&9<>g9=m2g}9-m)?0c4X3)FW~+(NPG|qRh1d+ zb+J~K5e0B@eaS$R{)SsE3%RA*I^*M~y1t-Pk*4TUs2Pcii_HQ(`wRXL1Zk}pjCwZd z^|c74kQu;R>dK}<#Mz^Kd7Z*b5FQQD48)tPoLS&EZoM>25H)M72^&B&s!6JFkc>%J z)+xz+THk6^)5_eEmfg4>H$Yb~#DlJQOlo&}BRsLSKUq?V#=b=XEQveu+i$z!xGrZqN0Rh`!xC7^)xY0XLpHsxP_1k)SdcrH;qHt2G-{Esw*di)PdfTW0OuuKwP=}J>YW1AG_Wl;V=YQ* zh-WzLw`AiMVRgFZArj$8I)>@S|H1x>d@Xx9eiCj2W)<+ak zXOj-k;lM_dDqfY4A#bgytHuoBWcc`>@MfIm+!DoRT@im$rnQMF)vLT6TdSpx6`D@5 zx?!qirU&@)Rv$t5q|Hj$W0#tWgyMS4=oK+Qn9 zD)1ojA}_C}Xp$;gZA?PCq-NCA**kbeRT=^>kK137YjZwlqW>vgUMAf{E~{0$l7&oN z5j~w>Yn3*cj#la8zCzmJb9jhTE4cnjy{}%dHDpmoHC?CT%$3-TqC`YVy|!AlCBt>6 zhb6DT;V~wKUBwWARx=s)RI>IgHID-*ObV@=YnsnrjWunOM0m^Bv3-RmMpk0wyfl&1 z%OVlWG1xxi1DdFO)B(NeD)_a@GcN=DHNdaG&^NMaa>saj>|3L64`hZEAUN_*_tftj zYv8)EAB@8V9eZ0G&O9wA)OA~~7}6D;kWuTG8{0dlgu&E8+3&%l@=M1}4 z?0Ub!Nole{4PeRRbc{lUci;)+wzt9CC(xm`;?*9WZEN@4w>d9}{b1}!H4^TagrelA^u4L+5s1eg`m3Hx<5Vz0uqrn-TUC z?!y~D);_umyLVpvnFmG4+26ikv(*Q0$nFGO*}cFG?ciS3n^t%eK|k(qL$;wcwcYmg z7vVAg`oZ>wd7U>4PtuS?$(ataPBy4ch=VNT6nru=O7MrBdN{g1Kh_>bpB`?n z-wf~A@SdF@Y&t+TsR8l=Nt3N^Kn;CsxV>Z3n%eH((W{{vpB;oJr*jXdVzRP8Qw@~R zLA3_*LVJPx+C$lN5d9B!Hls&J+Y@tZ7x`e&KU9k&<%Sm`NaAFJCI#FE(&h%n1D&IR z$L2T2+S7Au7l9Z3%Z+H;`u2xm4r=S$9L@@$COpn+)yL&O`5ZcLyghyNcb9eVNZx-n zJh@M{gYzwTQv>!0fI&bNt?6EdBuI3`RdN1Au}uDfM=a}_Wx=6%_5b-1YiPFb-+leR z1+1fV%-Z+w(Zt}_hd;?dLtaJWGwq2PTAYkS{G&OqOxNADY*pUt^kZbJyxzh>kTx5D zt#4j73duia+VC)(Yh~;<%A%@N6l#erSC^yVSyRo6GHR;wJMfso>y_9pbbx%SMIK!-$Ee;S^SI3&@r^KA?Fwhgp^{M&Xs z%oLJz+^F!FJ#q#{0B2|Clt7I3pH(=g`@lJEGpx{&gBe&FF|i68Gw3peMD7g6n`sHb zX3!@#LsNueNSB5z-SI7Lc;hyPAwx8gtCt%lWjz{nz_;8AzbFtRk?wkH_wB81fJI(( zFa>K-wMP?~l@YomRY@8s6;anQKIC0&@0dPHdf?h0Sh~MjYy){_e#+&ppFL~6n@!AxwQSU3LH@#n{}ySO#@(s+2>I8K4XcnBQEzg+*= z`g_4)Tw8zPdhPl%*3XT-H}=Zd(_`JS+sCdM%a8fT&O72Seqvo`-7V`bU&pROZ2knNztFwkRoJxwFQXp_=vRzX+H8Q;dvdR+6=Zy_~xQV(C0gJmZk+ zBjpyvu!)n$Gg$1d7nKUNsa#Wq8a`!o9A8r_?rg+NvT-t{O~@7Qbj;RvntDt3Q7wHrIND=sphpron-8?0$P;taV9-&ZQm>=NN2B2tM=Coe>;PU5uRZv3QFSZUA!5m zNzF2(SryPJD&fSr`21dRni+~niqn9bSn}6tCUkNf*WYPs%4k;M^k@|(y;mL<<#@TV z?xg}0DK5x;5pOI$rQ_{0V(_hGGDfT1MG!ja=lJ5XSc+&_qz(<8QA#E8Q(xqZON%X{ zNyRIUW+{-At-p;A4|mivF>tA6*;qY7!;8A+G;GHabA|~Y9Sm0u3JYD8F7Q#Xj;IC@ z330Vm%v6mvHn!(RzI;TiAnS^-+K|!tA*N#MtGt|vn5lrjP&K4dMvo#j{UDaxTe77n zsffpzdZA=cn`FCbUeSQaZkx+qQZuYPTFwm4^748;P6j=aggoXikrc6BiW_E6d+Q3h zQyugb31yBD;|oj0ZYf5Ic%&N4SL*3ZSR%ph`ik8Q(Xmcn($Zv>bV+3?y@j7Gc72i| zV^Q!}7>ki)BEAFPa4L40x=QDY%=vDGb-ge&E)2NY79C$;4wTuoc9 z8X}ubi^iq28Dvh@CBpJV#E~EpN~g;ngvj53WP^tfPfmE599?OKV2M{&bbi|YZ``hg zJDP`lmS$3=ktQ7MdDztsmCv$tx(=@SvIDqHDFc3ssl-ccoz_W|lrLc~DN3m`Pr$z$ zkHu|7))%W=GR0^>mR`4ymq#;8IvOI23qdWgYdB=Y1Ne92LCP{TA3K~GUw9;?OF zbjesP)~ZY5Tv(Sr_H6vSv79eW6}9Ost6&t$V<&Bb&&=TTQO#$6+|;S5k3b&{0ehl(-h!R_Dim z*l#mJ>{g&qFJ&1zD%%BbKHOdxb~7H2BCYo_WsQMlC;4SN?9h9upvpx@ODuJiB%~#kX?-4j9VLuhFHRBOjD9fMwynfoA}Kr z=%(Thfx>o*d%C?Sm#3NN|Xtfi-w7Wj!T7 zl{aLJo2Yb6Z1iSQRKgzZd-t#$c)BSFJ!;8KO&xFm@Y6A9sHn+;%g{_HNuSsp->Kxw zGm6R*JX>k?NhKSxSR=YoULlhNNm7EzJ1?ih5+Z42?0O?ad6Y65t_9G5 zKq+h>8h$Ai47w~ipTzVY?w~--p>>fCML?>I*isTY!xwj#5`-F_%9G8^QV7>_RvGcw%rbXCdLs7nRRUIXE)`|crINSqOT>0zFIFX> z4FRi(g@_tm1}77eksssDXn-0>TGv!0cAK1`GBZ;k=lVaOVofB3+k0L1Y`tV-NPgW2 z(4{=V%0pHF$S{PGJsH0eSNsKYrd+fzwPvbTt7Ie@Tzh{+2Pu1M9#7DoR9Pfb_%*KL z_d#}cpWhN;?Mz*+PoBvi82w&}k<2W$QuTV;)BwKdCvY|W3Tu;607Z)-Y-VCHndix# zC%EEgoPGyT)O%zqjWay+1HLqE@{pRQE?{xmGF7X@dJmR+*=Cf`$8~inunuL-wC!?U z4sJanRH?i5b`sp>A;X#ciOW-I`H8Si%A{?jY%5OkJF=%DD^PC2SGGHdf-5VTsbf2y zT$mv;v4XzZ4CV@rSpVHO9oPQGjK}MzYgAg6al6WzI*Tq@+CUWvG?rGi6F3dwvY!QNOESnp*iwtL!GUSl(jwwBt^d>Y zegg-HC4*TF3CR77)tv;dPC{aXa0`5M{`kr5>5Xd@x#@?mn$cfQ{!m|s?v(ajGlKgv zzD93C)2Bk833S|DTFSdPUO%nvhh|%o0ibWRsuNH*CjgbbsX!~ra`oDb#?J(Y&e}yF z>S4qG9$3NQbI~(rv?u1(+H}C3Oa*)vF4J@>;C4U0L{V;BH?(!Y01VGR!|8k%d+T%G!|DYSlFA zO%+s#?3n4sWNoWxfupk5^n9eDIxw)270Om}(l%+GNa0aczYqq1K!+TUe|!gm94K2j zXYG^-{o$ha;xSjq4|0U|*qVgM)Wd|%scWjGk|Y2H(9?2gi9n2qkqAIULnB==)84}| z1p}2m@7J+sq9P=mee!j->eu}=j{!Y;wqhDD6iP3fIOY4K{mFrJizp?*EBYz!x zNA$h1Ka4%qzclv1*sW8+u`9>k)LFwuW->eT-K>_4{u3scIG=SO}p^7T=9&++px zxP3l(#L<(R^a5e(t{!3P@4!RSTiL4_8zmteo^&!O&e&@qYRfUb?X8-sC~d|Pa1(}g zt&$?T1#fRl)r^>OkSeRX=(O6xkVIwk6TR|vnIx(PZ)H+OtE>4gJ?*Ct_qd48I#qt*$la&)=PWk>t3g>N~>I64O30jC63hG zlUSZHd4OguOGjF4!jnvrbKmI6Yvllyq4I{D%SpA2<|R{j4sW?NDVYxuu8LWw&TE?4 zf@JP9BfSS$?);i`eYNgt8=>mkV=nc48 zn?>1V=63adwn3LuIZ_YKcOoB@TQkJE@t%CCK}N(aTIJKr92E~s5V3K5xo?P#DhVxS zDk(adX@=$UjU8MYu{;z>8-pG#a3~rI$tg&T4yW;kn4;BWfTB%6Zy2tpHVpQ}^;XE6 zrY!+wt|g8IT**Ovb*k4@1!+`g^O=@%WQ~ZXM()AI%gtIQ<#Ulfr%q~;rTg)NV7;Vu z$XJWh1epIyu}TeIg1fj7D!NIxE0GU|TQZ3J9^T)Bn$-&d9ZjgiCN(&95)D^cf{W)X zSqDMpjD9O6H>Y#*xlNk}mH@I+&r5V{g7Rxj3W-}=82kt>o>SEQL{?(2coeO)ES4BP zo0mh{Y}%z@9fiEk;U+_4f5GysDwZeJQbUSPw=C)`GjuF3XH*r+%SNK&q%H1XlIt;m zsm}TmX?iKraOf3TlLg%2Lm22+Pc@hXnRMDidbK|xlQPqXu%U!i9VL{~U<=;J(-NPUuZLtTMOAe+X*%VLI=l&6~0+C}o@y zg)O-WLlNp8ecDK}R*O|1Z)O9b%rw4s*FBnKlD60(TXnUTuMmlG&JLWP>uyQ9Nx~H< zFDFa&uvU z@wC{T6svrBS!xhdwbiwZq@0ZwTTwukhqIYYc!8;F0fk3KoN~Lz%Er}HYNU$ot6O$I zsj6GGGDRV3r$WP3{I%3dE*!|u#7*)%yq}XBTDZI_l;tS?v&Cw~Le>0<8SMM4%Q9sR zl}pL!h(^N3^W-`VzNkwRE(e+Qwej?)Ov8{z+JG`thf}=d;=gO0=hy~wh6D-wOW&m()qd}ArI^QihyJ) z(W_6xpn{MHwXKnNN#JRuIf08e^vw)QS>ax+hd*&Nzi;Mt9(Nb0h7_Lwx zwzLW3L~Dc%5DO`9L86kDwCV8d3qAAIinS$6dD4(^Al#Ii60^_a<~9M)K&cfF>}-XR zo`^5rip?7pz7(*#C`|UaNui4;2G7N<0&HZ7ZkS~aSw$=ViwllGexRe-0s$yN~~B(l&Te#od40d&Z8n( zZBAJa0W2#JAHZI{TBK-qxzsdZr{%!+K@7f(jfc|FB4KH2({fX-nUPPwi|Z0fxwM2= zN67*WLtf)02imx}r;$`OE&8Rb%vX@9>oVRqRr8qAES(5fmD-?M;V!2+Cp$MT-5#Z! zG`S=-ow#7rtE1DiSngC41|m$CEG{4)*VxnR@y1tkl%#};EjbGsv4RLorcL-~ZSj^< zs!Qth(YV{8lg=!Ku^Ee}>?X3M2Bj7UtcFHx>Q}s6U64~U)<86iM2(hZrtoP5+;ue< z_zWc(W2gx!uA=>S;PP@mxawQQLcS3!#@s4XgOB5Z z*+>`?08mgFtm0BK-S;{!UC##eL_;19=+dTo%^n-XsL5*0U2GCkTfnnablEA!EMNan zuYamFf^izls){KDKWd7M7_gmkxvrtZfnr8l$*SeaZrK@v>9R5fKHYt7w}hG7=8?laouA;NQ)`<8C9B7F#VbmXU`> z-o*B^o`R7uddw+CTQUYE@(I2^nWnNrR6;G24c>gsT2+C6vav*C7YSY@)(_ukXoSAE>b>S zGeZo04a>t;7W_C>W+`4MIn>E!WcXREfVdAOYx zc3ERXZ(zAIXQTFhGrjEmbO@RF^v=-8}^ z30GB;=;*Jp!b&9K;5WCEbjF@GS?Q6#;tyj9s>SeBWpFzZ;*7yEjnTDLbHbn@GIo90 z5;SJb1^JW@7dLBLq(li&&5}J@A(`=FU!Q1%i?16H;rH5l$rL4Mn=GM85eb8XPH+2D zuL5-@Q-HS%o81e})+1;L5rY05J60$zz5N^q;vK?$=I0pPDsSD?54f4!frnG1Q6f~y5%Ejt^O zDzf!4+#hkk$q^~5jPxnIk*q(t^^4fP6;Q^Jpv4sN=ainhbn0tZY>FwGj)00#m8zLS zfE@4ktTarzbb!zU($mxmseEziupX}m4P(nDB^?#7r0A5M*QD?3eUquauaE!7Sbg+&!>L+ozDxi+CSn)kDs@; z(}efDb(8>eva~#PfHgsa5hpm!Ao|{?O$U7e8WB%}7wH^Tdt%d?MbKr*8|S;1UbpdM zB6Q3j+oR}T>h?PDl>r<`?T`f6Xd2SUw5(Y!-H4)zrgZHs$ICy!KZ$hqJ1@ zs%=ki2GWqERh1o)2*uVnS z1BenZF##I%0{b4LoFB<^8Sv*gaG)nYFnclnuOZz>Giw@G6N`%&!9|yncDg;uW*`C|U>r)FdtV-(X)46gcF{= z>f!$0c96>^h%1rtC5lDDq#{#pjUwX6BjO(L#eE*CG9^&ql&|}q`_bm^-#!g+R_F{a zdmx6hI+a8i*jM$@2&5WtX+7v^2lxa9QuNlJHbY9j#g7j4g7sBSt}@bt4Y0y&VRji* zaNagI^L3Zl5Rg_YEtYex&)#%?d&4H7=6Dz_Wwia&&n|TJU;HlkDIFKIxAapI#9q)o z7HrnRCI*Ox;&qubXl63iSSb11GIOhqjNr2WVc7 z8n*v(sP9%TQ6c`E`Ig;kOce-~7g(z6S+Zy3I0-?MvJVpG2#RsJz`0?HwxA!})_#W% zFu%PG0p`|~L8u~T7%5@ z=fb;CVd$Ru?(v`EzLRc+OZyk;Inyh`G%@I#pKQ;g^mXm2DS-|sCF?yNqPgx5uLC<9 zKGHWpj9oGO+o2)RN5*}STX$b~`@Yk)faqRXf2590pU!C}D`tnLq$tM3HX1$q1sDi> zZiIm#&>^CJA24D*^&eZiU%HX&YWvE_5jzQu)|mm$q@W|n0%oAm`&vNYaVyvn=+O3c z5G23v3I`B)+{)Q;u5kGQF}-Onn+?Q>geIOXmDLVA*J_nFl|7|aH z48LAg`+$0vfNZ*-8U6O~>+tT?o%#O1FYGN<9N{>g0iK#MZKc$D3r#Z7s!kWjKeOd4 z@G}A(3JsmMqkHjJxb|9Bdd%s)86dW1WC^;N2t&3Ct5WJ=u!)NwYj2!ftwNXm;Lnf* zbW?k4cmHGUbD=8Ml}%i~_3Wg|8OjgtaJDX1*W}^|Z|8gWwP&Y=Iz&AFm-D*Yzuq1h?3ain+=rqg$xg=c!94v9wc=X4kTgR>D>0bYClg|XrDmIu93z^gd*Ooszg~2$ zY=w@#q}S1rR1vap>f``kYMIL+8FzQsjGlj}Jvk*%q05dLIHxP^w%wu`Mx%<;WQnQe zV=b92k`JRVJ`AtPLNP$p@3nNdJpw{PZH43m0;%i4^g_;=vr2*o$-y~o&n`?p0cL6>nP zh#&t+8)zVXM#z;50FWLLrl%QTy=e=eHDH8oLf`#Kdur2~CD3^dV3RxTryqKIx$36? z)ewx(-niX_tWUJ3*Bre3Wv)j8dGb>nTmvcwI1#wSft!wmprEXS2HHC@RBrQeg!BWf zwQH0_?*S|J|D_W~(B#wY@p%Y5vbY^$tJ(Kja*P8XKNmP>F4c=W0!Zra*? z@;QhbS=bIO!uLPIXs%kxuv{yXL2AvUQp#23I1=7JWFKUG5)?z*PoR2<3Ff=m-*EMk ztegmqQ}mWHz074Y5YCj%-co0Z=0?vVLsBIDfq*8JpcI;M$xq}ishiQo>u)$4P5=9L z2-*7`gzQ;gfSpdZ!ey4gH?mYNsb%O?tdS2|Qd&qDh2226zW^UWphNpFc%jE83H|R| zf#k$|lwLlHrcuir45cpX+7h$6J9wOMc-CWAn4YgGrx zKuek7CNP9LuBAlV4NdTy>>k>I9(?^n*WJlK_rd{zzl(RM9W{zzY|Wux|G7PV)Bx*- zzO(O95n6tu?b=Z98_RTuIx z3EKZ>xG6mL&-TXYqg5|V@4V^Tow@EY|H4eB3aB8BMwF7{1F!N0;<3T-*GzFq-;MXxQ5x1lYoRfpXbz?J#Sw{ay- zI#LN)q8SFLAMIk4wJ?*B5qNd~^WS016X?+PYaZ^=Om6L({()EIQ;w|2^{_tRl%zDZ zlp~{Y0jY1VHj9S5SD*nd-h=9>5@pQVN+SI}pz; z5Tj@J-n6^>-N}v$wkh2Tmjwj-1srv?I8H@lvU)P7XOs3gZbdK!^4^ZtNvmTI}92)PZ{@4OZ~oTUl&T653P9Idpa@oeQV26?Oou2y}>e zbrJkkvo|lG@7?x*0i756=*j3j_tF&lS?a<&(C>cN9zt&ncD5}#R=5-w*uF>V))h(8 zN3j91MWL6Vw@&PAL{-?@rUa@UH6Kt9E&^264;j%Q-4YF$?W@WwbLpeUxhN36R`NyN+vweTB;!f~(Lp zX&}QfM0I*xOc~sdG`eT3vtvpi1}@BDs0HVI*}R@J;aK64m*C!Xhat9z0?tKP{NqNV z8AbK+4$wQV7Na|V&cc1Loty9eX&g-O4gqVQ$U3eaeqyXJdfVW^$t?rufc^eG2olQu z6Ot>f$lzD-*mu)PX-e(dUhXauPecbEksol2@z3i zkt*P&ZE2>naY~><+g)GZb^OyuHOnX<=r_L z;{qLWJoqNelm{WR&js^b?^{>S20M7UPUTonn3AN37;7}RgOV^(&O(C(V#qhN0s3V8 z4_mtr&B8DO@7Y;k0#Dkg#hFnOUcX1w?6aGvfMh9L80%$HV54z-Wu>rmL zl{ZdCh3KA1blq=nz5^edFFFYp*3gO?ItC}~iPcpUkjD|hU|5m{?huqc1uP4sNE8?| zci%Xrqvt#Yz{t;ka7GVw^_0w*3?%*9SR)oguG3%`3dN|M`K-13%hNhqZoDXt{JGib zthPwMR{^Y#(u&T3WM_1CO&=vy80H`}{fv%9v?0?c$_$)4d;m7K;OM@wtA{3!B$-=z zpJZBU^Ftm9g+(0|N295V5fK_#WIwSRHVc6Yy|n_V)L_hP>Atp`8_uQ`JyZ`25w7tSrDg>f!xgSyHl;F>QfMZ8=gl zK!UPY;8b;?6&69qY8^0>JkB3P91AHfZH}n<~5`cEfnu)TnY+`^2oSO!( z%b_v?6@Dox{MY9;cMS};|2S7TE^@qZ_*F@1j<7p(G-Mu5$fLMTISRT)pyEO;`1F*| zP}~w`U$KB0ye5176^n{;RXhYBx+o^qs}6we3E0PkI@ErB|L*QT30Qv?EGs5x5ncwZ zVMyT@Rs~vNRtzED=rRY~QV+GC`z5bk& zK?4Lje9jQRcH2U?A%p(px35Is?j-wWe zP^7+5ax;1&RU`S|xK#naA<&_a<{EyNeNVxSAKQxe$eII`e)gKo+4PyK%BH>!x#hS| z|B(y9j6j7Bc;7p>``Cq0OYR8}d|!M&w{kHTa8|Z}yE_-pCN+FN7gb9rK-^;@U*I;k!T9ni(Z{!T4F=AR zbp;s7`EO>FkU(*#v`ZX`N?O5WA@MBxL4IOTa{YYC>DXLnh%MrGegQ2V8IFou8l*w*fXiK~M#;w=$m+Lf;q^d76M)!PSV(WlLw*~!&9SQ(DriN62C z0OaN~!z|)QPYBM`L!$$d(S76o;TJ`ru`d?Ia6g67L&Jo%uW&@tc#1>;0<0wL=0>@i z_NJ{4Zl=K#xC6$wK!xtC!s(~?@Ur57*1{kP92rCkMb)1RXdx(_6|0zh2Hg>aGsjDQ z*#1_lfc0e$&U1NQ0A|W`I#qD_2wyBCQIa*XkmBaoMzkD+UJ|HKh=g70ymi-a>&~B# zzc|NXjc4gmWDw4?S15Di>a;o_@ zjQe2i66lcVAD`pXY-W78D>(9MJc#3k08t>FRclBem*|1J`jSv**OWjC={_MD>^{}r zE#1F{@X$H`h=sJPRb!}xOW$yY3QijwC40Sjwg+k=(Bbps9ee+>t$VAdb1v5+-;oxH z3+bec&TA@3Iug{^RFI{R8_J)!09JK@4nm*c9RAFA9$D=E_XSWNJ^_HDZ}5-9j}2@P zDPT3aaI7(UeRun%51+!_g~LZy$d-j^`fc%Cjs%o>FcL-2C!y;FQq&$FJdryrY(eH! zho^DRu$|*z-48*H@w)Fd`XMGNt!Nni1+NiOGxtX0w^=xv9j%hRelijV_RXVX(}xY7 zo9P_qa;^Zq7jIBf&{1W=W-6-EIs>G|&3yFuawSx%R8ra4@n;=J%jFQzc7~jy3F?Co z0pXuPGUYhjG4_6A9(_O8d5^~k~om48M1o~J8xgxXT7+UWbI(JT z?js-Xz>~}s;guMC6@1E-QqhF6Q8Y&?bRB>dc;5;~U|tI~civ($c7GP>m_!Tal_)o* zd!EoZJRoF3BchxBHbf}N9!u=WUaX#e)pdUoczR~KQ~+U8ryft`U~M|qNo21|$H@w~5S zi*d+4u(JsTZtFlq?e9*Ghi>Z_VHXXraFk8_8P_XzfP2ELPKPA*T8^R7 zGnLMc>6k!_?!3>S@0zO}2*`}sQ+gFqt4U(5meS`}%hA58;isRdfu}&IL;F9r{+#Z~ zb@;ofOtWPRClqlFB%7|53h4RGN)vEbIdYLH?mk@SXV~@Z{wmG6eWUZg*eVv2(9>z&pji+6lfh z9s_{tSv@p*pP#p3zPw{Q@rsT6Qimar!K@Y#m=FR65xX`>iWz7{z@O~^#0fVFPQR)% zJ^vv^0MvKwp8p9)_}0M=LZ7+1vmRX1RtP<|KvJ_z20Y143+ZUU|D$hR-Qir)Ybnuz zMQ~vCJiwA`Iv+*|cilCeyFP3f`L11S7`-*O>2Pp3^~p|P-lBtNMwZKC>1bG67HB)9 znapaqs?DKCKG^}Tx;0Cn14iZl7$Dwj{gzL6)^85DBXzhYu{{8#8?r|EEObx}Uj5yl z?toW+O>K9^bvir^3|-gRusM*03{zQ1jS1m$0G6!-2owD9km%yf>pCaSt*zzqT^xQD z_}6DU>*2v}WM)z``s&cRq8kU;@lT9(-+!DP*1nt`k!{C-1peuzs^wtyi zp40uu4d9~$KTzd}4G8XP_(&U7&DrTDU1*|be+}!>5B9>+yIO_LgG3$Zj-f9sba#A? zyZl&JAkdiKjB2Jz%1G(lp{lf~E;=CHb8l_P-v~7k>JahMDL74E@Y%WUlQ(kJajxXS z5Z;s_SwkU1g$x>vRMm1dT&VaIRLA=1&hR#d{-6&=P!P^I+j{Zb3*G$9V04>#r3gmx zMX{2!=t(kRWHU8!I+-=bxZ2GhL(?C8r&S3`p}m)Wk-NZd?cRalumkS`HCSWtu}f`X zDlsw|%~)D8yFVPo)9<3k-~_r_g+iNN=_Om*+I{RX?&x)ee5DHY!U5iCg@rUwYE7A@ zavD-w!+Xo`Z-IqHphAkfj@^mgyz`dL-N`3kS}#H`IhTi!>(IAl}{?MC)(sEaJ_v&(t?@&-ldH=FuI)XAbV} zGxgt%w!cZx$a+U-d?o>}D=rEcW6WNi*j}rLQ2Gw|9f26oQ`bnl$IX7~QW5fgxdSAe zWPpU|reqNEy#in$1^<=+^`;m-@nx7=Yim)v|M@vIJrX$Se_g!Jy&I-4(!z=EM3Xk~yVG?}!p37Ej% z6j(}e7B-{oy`2eI1lKBp9G8E0$MW^pWktIvS*TRFBEK(t_!$&ZWkMc9E1=&a65#yI z1btlAU^H_OMz`(0&d3SCMDxCfaqZIGJN5nWs=w(zs3c@Vt_O9-w9TiXEUf?mkna{e zrl!$3_jOL(w5ArlsSQD*++J4SOXikGx2F&9Dgd5u27Da4LIY@vL=)E4RFH)fV!d5O ze}8Ag##n{U9xS*^pTmrKpNoZXAR z*|}G=f$baEBVxycL({{*pFCsq!Le(&mm4R{DBDT{CIFt8_7vM>iM%8n_7F`4bnvqe z!^ZIFqp%DerF!f61ADsj-{vlciDIynB^}OGq#&==9ZsaU7QV|Tz5}kCqg2JASNC*Z z`wq9pSXWx`%lJ4RDKtuXD&))R%_(WA3gC&}0dKYo2RwnU2cEd;zrVT_)gJjp0f~P+ zF^$eU_T}5r^`kJUzwmGe64I}H^hleWh8XK2UCwgJR-qJ5IdA#A2f?yHhaCTaca}Gc z;HbFsL8##t4mXZ_CaNHU6rIURLk?})9p#pqjp&v(T=G|IFfqm*suvcz@3djX+G<<* zICo6%onlKBzbV{Mq-jE1tu)Xx55sPA!PA`$lLAE#i~$+*7Q2r<4K_Fj4i^%DjTAFF zV+&Fs=!>R&OqYoAN8$f^7}_JyAyE#na=m)4IZi1>hdf)gY9XEb9zPam!q^ zWu&;rbIb76ggVq-ynj#k>1FU*@Q444`i4e(uYh##Mexeu|2+H>=s3jT&G8N^Zq?jC zK`1wRP1d5!boki*;!mKi0v&g5;}NHdpK^7zAL7v1xXlf>*YBeO0b_hym9d9wj4TJ4hvFK!Tb1k`9%s=7FM^fTDs*5Ryyv~FVBdWa zwtV=Ghd6vTHX}{h;N+0VHfs^MJ8Ja+&g8B%ohP780v&Y!y__RvvAgj}_ypT*hu(+d z`z*GgiYyXd4O}X6$_zgouGfMk!(D&ec_l^A>NCp`UX%aTVrb*h(Vzawm z<@+`CL#Ts52Uo|dIX}uX3*8_75dL;LqA27ewBFZ{D$CJ81<=+H!<3M~^=?X_Li-N@ zsrNJA`TVx-%|Cko{ut~Vy>qNQ)F%p#>xZ8iIAd}FJn!4!Kyzs9NGGYnaoS48S_QXJ z3X#kbzI8Ldg4PLjD0F9V7kY`fe{;9|E111K%rYM9UP(Yn5)OA!Els6mc@KmeaD9F2 zv*2A3=uq*waePI7_gSdxg89%o`11I%*R(o`40qPsH6;`hiMM+|-c4QgZ#e(0<!1MI`|5e+^y#$rr$kKm|DNa1SlJwfo;MKy4N{Kslb9UYplnqg+9aUY}6OEOvn0 za((j9^I%1wL!r0!?!0LMxOV1#%XO^n(E1~@A<`;{i9j%Kb5|6FNF9%YJ# zd(S!riGQ@bxqHWR+#5pZ&?Feamrll%ZPg*0Ls>~hfM79=WPgG4kU$D=SYL%#o4 zU{-W(-_ThA%FBqZ9sBI)&qwA5V%)P$L4+<5El*5q)nPA7<@N4NS(ow=VRX^-@*LVH zTArR|X|2XU8D``0_nOD~W`SjI!0TIVM(FEHo1BT85c^#`5fxK!-1I zz0}8#ow3XvR0D_Rxuoj7bw45%8`)|d;vW4;(xeSxJD(Z=I|3Cta8~M^?&|}~LD94+ zWC_xgPah~~O**1zLEfQd7;dYj=q<1Ea2n%Z4lkcJqiscUMM4!-nHn}*#jGXJ?8q|Q zl2?n--pjl&B{=}%**9%Gd?@D5us4n_pFES2xSBvpnYXzLk!&K6h@hX1E(7zuK#UXF zE7w8CElLh;fzOG7d64SJQlOP$S5#IC=WS8$=(lrnwG=s)FI)Q*efs$Fwng8e%|}3V z{#adUCR<`R1n{s?l@E7cYaF^ypn?@QcOsXWeoOcH@ntjbV()vmZ*ptjyW`ZDd9XWL z=>PTb&3i?94qk8@Ji#8Ch7XRPV9V*GS4n53sb;)VD0)*8?l`y^opPWvIVI4c{j)ov z`e(pf#MK92L@sPP;_^}z3X%ft3TAZL0uX&g8T8a2U^ENF=vn(B_(cCPKi^gS7d#|v zJO9w^5fg%&09+9M{QI>p2u!6s1FTm; zM(_0jRcA{rr4t&NPmZqoBehSQ)#6>vaCs&Jg#IztcUlp*Wvet zVsz&d9zEb7HVt)u@jARA@>jM!eG_+&PxS2>tBx)XU)6up;Ga2v<_-?^4flQCnI-s& z@Npmb>xXAT#~l>EC8Xjrtyr}d62tltWgBL@z6z(x8uW6_^?G4gUSRl1G+^QP^)`-Y=;1||bqV|_>-HERMuMWA;b*b#_(vx=uST>f{*Ioqf1oA}E3be|gDbQXuN9K5do zi#Kk+==4R`zK&@-3=R-A=f;#7YJj(3kpf4vM{RL2Efun=kD9M zy!m(_%zOVvy=GAqI>;Ud8eh9{d1k(sBt0U5kx2wuZ5H6S4GVZ1IeR-dt*Jx@o;dZe z=MFB_GvJ|gK zp3*+hQEL@Nm+5~o|9^49+`Rpxhli!Lr3B|ony|T@8H+mt{?Ig_qoYYY)isODGZ65< zRuOdP_irK49aoKQK@Tl{Xm?C)TSkkXeGue*t)w?N1v@Ff$^LTNhitOl>mR-!iO>Vb zE;~1r`b4Dx#n9~NBV(VQJY)FP@$xHe6 z+VY0U)hg6J?JhnR;g6>+bAEzD93~$heam9Ail!Jt+0c;5%zA*S_0D9Ep0YeUE!3g6 zf|mp6iQ~4MKNSou+7EH@2>AMCsC%;wl68kjXF(lJ>(ONjINQB)((=aXqg4C%kHMAT zTL51;8P0Za6yE`@!hV66PNp*knrWRYrq(LF46e?XwnMiGROqtYE$4LK+rA9GU)!PM zp(5BqrkoFFDOOtzXMARxEHB|q?3@yak)sNPn?3MAWfz!OFdaJKNZ0ym^)xGOL@GpD z(umn^+69MQ&5q^iDS-kVxbJi4bnn^$f4`NBTfr4jDx=OQ5i!?Yseq?wOW>aP@^0vf zqg3Dr*xl{l!*!dS3S>3T(iY z@MQRQct8WERGl=7-9;@!mBe0tE8itso}FB+x?%szJc#C68T9|wQ=l4nC`Z&DjfPfx z{(r{4JV36p$~To>(&==1Nzz$5iv&r+)}iiNRV)d$@B3aNvFg^o@0)0w7ZF8dh)6y$ zj2IF3h0xU$A|ed#C<7|PL(w4$4l>Ay4s^#seCMlsyVHGX=Gp)CIbWUo?aMj8b56@> zi)jnd8sGaaW_HV%hy|#-A7V=`XqN6{Wf- z0G8p+QN+Ur%6%tJo}NMv*=GO7J7MD2!}IppUAvE2=cl24yi~2prZmM2rer%2h_u{- z&@U0QV4zvS0$u+$9;kta$>lPo6ubvy^Or(Jc{ROTuS^D@qD>N#Ij9H&I?TX?ZyuVR z7!$G3slVj0;sj#1TmtF2#t+ZFzUhN&MyZj=@U27tGWh3#y?q|Z2k}(P!c?=&V{|z0 zk6JNh6BMatk`c3?)pK+h?Qz2;dL(n#JAF^+1)4^9=Mts&}C# zGDMTJG7VK!=9ZTY3G{!Iu*OAH0Epb%QypwWuPc{}n^J=~>pZ>GsT?GKw?*ACpHgeJ zC3P9(QA6ccQW5dbE&OPoLO)W^3a+=fZhz9u?gp&}1;TjnfTmCmwzW}rIplz7;YvJv zwxYvY7@(CLbliRQg-H6?b=%OVwTlw}{oVoeeH{$Cb)Li%ve(*-E9?X}qhhW_1w1Ni zK7szOgXW6J==39>fS>?(e0>+H>u3LZZW7&YnBBeGJdYvnnV!6SjVn4R50}e(G8%c( zC&Ti4gWDl1Ky|HRYAz2>Y?P4-IW4Ill()n3k@Av26))~mwY9v)2B38;b z3BngauX^zBMPzj9Q_otvRqrfhqDsL%u}Zg-euFd^^f0u zGpebs#Xk#9#cf~9SEpk^9b_)>mE=?goesd)#AK}Zv3BX;EWl>Cd5l=+8=DT9D={Jm z8kI!QuCV&iiO}qU@wZTWu<#x4!gaM(AoD1ZswR>KV?$OYNMyej=8=L>$fe6JyJ}H6 zbo$gSaApAty8GvAK&voOBJB|^LA$i9qsd9t+60!fZ%jl+60Y9ET<_>Ua_uY*Dqx+* zt_=Jdu}0-?7g1!~>OxLsa>nDx;*`PU6D3r8>g`||`9D3y2aI`;GhQmd~>7JIJ4^o~Zj&tbl z>g>BVgRdgQyz&AZAj8;507Uqm=<4B5Z9&E2>>!%1&5mtdr3ho!z^mZH|0~?!=zC`o zx~V?90lb{8%@FoPgzGWvVi3K{2Zq8BWMFH;+4bG}>^QhNuTlh^`Ps)w{+3KP-u9OK zu?9REc8~wxOR+=d1GDSV#`n*Hhi5NlJ_m2EXcDZ+gbm(dHodovMedti zm5a`VN{dF(|CyQHuqm*nPX_Vq10(vO?(j{6e;C+;_bD8h;$8Cq(-%S~h$mogUT#IZ zW3%ILnVjf&ta-S5T?~|rJA?Cwmz1ia*~ibzh4@?NC3@u1-G{oN#4N;KaL(&s1@gDa zSP4>o(UiHUYnLK20g=ghpL`&1b3BS}{7YZEH3R9nvIqW)OAH+aa%&5n+V zc<9MC*ib(3)bqQ#U*PaPR5q`HmhcxM2n-faQH3)bR49Xj!~ss8S3=~;-&AfEQU)i8;Q zS-2&NdFagkcY)b3J8NFN=jYb+DThBcux03hk!vNn(aQ$^17E(pFg+ae*rkBK&?efN zK%HpoOtx}b!3K14JTjY6`54^KMLb04;f?25ciU9=XUCvlz&4@BH=CZ`U1OKEA*wp0 z_01b)8Vf%~K62CSmeG|QKzTa%b)UFt_C1oFMyLhYvgbO)t#kcBD&u$tMb56g! zb{`nFcXYq~X*|To?DM9jwlJ}fy4q4}i&`aQVahMki8WVzOx^nlujSu`f%p@|(IgVXaEc-7v0J;;HJtQA_tzkXUab-=FDb3`&*4cEgE zLj$+!Ge_a|vyuh1d93$t+}{2BQRtj?7Y*>szyCE!ul!=K3$Z=gb`t z?d5B)T*Okukw`>N#p!TtT0tqI(=-#NrWNpjoF=$fG%5qPG$y7XU>T4KhM}Yf^TBKHJheq4xrn6cIKyxXW}2f3 zW}1#jxoHI{S4=CoxSRqf)<~R!FbDj1NX0<~0sTJvsoi(Jd#gk;w0H3{j8wMzXYQ0- zuvT(_p@}0gnv;_eS~^WAXmXm4#=_I#FbCfyVzMX|mBQz#r4Pvu%H=fLJNJ)&=;W!- z@!z535uB=;nr0zb@HC{?CZ+*1OH4=NF)6`O3aN|=FMUULkYHr!=qbxT-k`8uBDs*3 z9+AmOHYR1{)6y_QOw+6)HXUJOxF5q|8NraUX!zWB=z}ta6e;C5?7lO*6FTnva~(&Y z8?5Ey6Y7o60r(KX(G0~Y2pInuI}K2B*|c2F$)?Gej3g+Mq2v&WVsV71gER@g>JR_w zAO28q=|eJEn29i)d^*NJf6+8UPe&q==(K{3%Q&et4x=Ss{172KNXw<@5j;ZwV2k`G zCC^I^(2656A{r(cDLqZanD8{TKRz91q~vs1uHdMMf@7jEUxWrp*@KWU?&PbFN#1ei z_%4ZLa9Pj6lv(V?v(z*#qa)CBk@&QXViXh^hK_?3 zzu0rcL5ii(soS^jIr(3&O4coXhgPuiRXgrv_%c{Rl>7)mE21$*5uT1g{ikX0=Z4iI zjZDkKVVa7Dqu_(jEqz9MkRTPk0Xq4oSC@^?+kVE?>o-Pzgk~u@6C+@P$yw<%9cI~S zNM*%MOCf3+v~HMb^Qrk2&7sIud(E-<8CWm`9g8TYsi+(Vhk_*< z=E5+o87U=;NaX}2XN6v)74$*;&0cf&qrJa8_@Pjc*Nmgp5ez3MoNO6Eti%a7eJQ z4^R}$@dzwmfX_0~rNNQIW&j&2B3}Lb?vrD0ET3y~#p>t6Ny!$;0hVHq$is0;#zJ!l znvmm3Ae#oXZ)7?iR>UZn2^1}rF7}#Cevp<)g-I~}hGg*EoPN9S+_9($r5NEF>YT@}iTnehPzaj<+Y)4|X}}l9;gIXy zPUN@2B}c@A*dxz_3I~T9_|$E1J=tZN_bxpUXzQ zqbpfxZ}1_If_>gzKMvPOc&_-CYLn4<+Yl{DS(MuHb;wyyV=^wTfH z7>am+4FVg;6K_1Wr+e8~K-UM8@|vYdN$S0pVy0=zrBhiyp^orkj@<=fL@d-pwB4hA zd~5g2UC`iN&iNozhhHN`Pdy~30+mQDWhg`NKIFU=X2Sdz;UOtvp)=n*BkPq6j7?gd-F)$avwA6M3<38m~BZ`%%$r~p{e=0!Yn?<^ok zRw;sJ{`%Jo|Nk-6-#dFdx~c;zB)i|(f;d@}Rqv&(`cNvQ31zJs8#qPZH@oef_$)f7 zu3xn*I`h)jMNGj(_sx!jJ3$6O1mLCw8nj>=Q2QG23G#=)-Tb~;K!B{uMb4)#0Ik&f zXN!^xjulRCT=XJ<$bZeC-v)Md2xZoW`1x&)vH=b0@1NbbWi>7;UFzP>$5Ojcj(rl! zr$-i}g#k7uY4iJX5LgYu{DZTDCkV&@D}^q9pjWfixIA2scOuwxKWITWJ_t%oYtEDd z2Lgx}mITlQv=t(vh4i`{zb3U0&Vpaoszm_xaMXn69(-E`=IFO)?|K_$&o92cin2#C z8cufK^U9Y%huQhgtaB4U=hi+0Zk_<0Tl2S}SpSy?QR$w|+c9?TaSR#bVCBv9bS*Zm zzgi(lrM_%v2kk~(44wZ7Xi3Fn>~?sld*TsL34tQu2&@r75#W_qST^g9WK#-Af(OXh zB24XxM`3EWR@z=x1OaJbDEH zT+-6?wJFkWmTBVkbOtO~y`|>+4agDk;D7_=pyQiccXsdpO%F-O&4cr!V5Dd(YPv90 zVvEJ1BV#8k33UArv5iASMyF|C)mOg zo_`Mv3J=RADSuLxb)^j&&Z^Hxcsk`vD2(MWFXPrH;rg(Wg@_x@KrDhUaof6odUDn&nSfM?u{N2b8)i1+ z&jyJM|I^sdVQfV_RGK`$=lQ&&`@Nro-gKfaPgNacA(*U}8kurTM)ALuJq5oN@jzpB z8V;Foc>s+c_}paolTXb;dQ~P93kL~LRhx>|)6I&7#{1YL8hskj8X_K=c;OrSPMDwG z-7P$gzuhhwJ!+bey4(6dBG`^8dYdYG;s4H#jf;7JN4^*iNgT64^$b?{s{Pq&hG02o z#v)_$Ed~)U!}^;2CFnv|ve2JCB!xg3N9)_W_8UG0u5wqWXZz9l&w_C?GLPMadE;BY zE%VBBGF?*HNMszXB)aBVm>MD~>c!dl&9ks71f!J&V=PC8w+&s;bBnWJw>SuNfo#vs zZk)&j%4L$u(GhpKRkQjlBsyL1Y(_KBLFbBi=+wkd7SA{TZ)dOB20%6d?PWrGNZR6o zAeZ2V1+H;TUc#?`JG*)7>Lrk}^~lHmw^+LJ=Vv!>(`4YV^ilw|Oj|V^AQ7F6HSNoy zC-!%?qxSQ&qm!$aK(F3sS&TF}{d;_vL1tpBMwbLJkjunKf^#bzm2eI03CjI`c4X`7 zMY^Z1_}7n1E}|6p3@V(STs+aN;A3oSLwj>tNOzTKflnJ8@fj()>ZMsoF|#ZV>gpvS zcx-dAhLbNr4SRP4zbD z!@){ZW`8tc)CHvxCYQx6fynuP0UOUs7Nk;m5sbdiyl+?chkwDRlV!dR8z1jTt0;Tg z0n!k!*f7` z_yTOQmjB$|z5O+KV(!GwynH_en})WBDy2Lgsn4U8#R=R``$t!jA(E5{f+s_$lkS%P z!DozX9{WA>Pt=H&vzaJcDjesODZd=vNWGqZZUIbPVjd#?8zSyVacno`Sr~T#*H&E9 zrpBofei){OL&O7n z*AK4hPHpHw-fCin5^v4NhnUn!4 zsikSL{JcA6vB@dF;V=yCt>d>F3Iy`)=cg$?x)dA=VoPXfW@Hv}szcXf@?3oettX zy$rgIE$g73A{KgN;z#>o8T=FY#IEDp&M(iCL!Ctgk!#H;Il>KpV(8Jq{~j3YyHMi7 zceBf3qjN1_=f?N;I$YK8tAiDrRGQT(J#3D}`~G%x{JsrqNbIiQZhv#yy{%W1lQTA3{ks?zr)#)rEHg_g> zvvRN{oqKtzSCm3dZr6bxmhs7n6=S>!#@M>h^Fr;(&b6&ABV|t4J)x9d>r6zj@O|TA zGTsU<=(&BO&u#AT$h+PEKeh!=ng#40%TF3>IG;8V2}L+APcb&HHPNdrnwo@#FXlmn zhL^5F&B^7X`_Efp#+Vn@EVVvZt5u5-aJT6zLJGU8a4CLiYX=-$SFiwM{W|Y$i>%w0 zPr}mn&hDM2dF(UG*HPxHE0ft|G2mgfK34%be-3l-q3s}XB?mq7(rbW)q|)2bo*j$b zIMor*N|K9kupnA;(Qu&u*`e$E1_$rKvu^_2Joa{0yZM>+!l18q={s@zmTlc{?d`lv zGU0JJ%_+JRR7RQ#uSo&c>;vzFi6$oFXn}xROx-=zz4M(Nd!+lMPRmFm3 z$V#h&=>}IZ(8#SMqetF=_!0M1-rU*M9l#=-3!^ZK{D~Kj+35%+4Z18TeU?a>Qpk7+ zM2N^epOKyq<+l%YurIKEVFX0*J8;Y#rn0n^EQK0UrmaacxE7P=$r+j^mT64XqH^fW z55b2Ha-mFhOZz%-*$6Cv>#XpErHQ05LHlDar_=4US^}W*$G7SGE`;qv#6xE!b#Mmz z>fW*Lwu@jr?&cP-pD4ea>s%sB5fzWF4Uzt&Nr+4OzKfxGA~HHPeAL+e>%|?2Sfqzc z$vVQF%Xw(C#jHi)OFIYNLhPj{dHzyZz`{|PTGJ<&qz3Rg55+7*k%8>{K-8T0|7Gr5<9(6-d_ zArhBEN7p96mHgPLt=;d~@YFeGTbRHLwkI`}2$>SGoW58$#Prc9iJp){b5>Fzg54(s zg{MY=N7=Ceo_fM9u4G|q0V=`j;GzO4F49@#rl4tJG768tp47YNe4oNivoCK~Z!-K$quX zm$;mPsV3&^tqj3Q^~Nk@0%JN5KhYb>#8hBY3RG1IvKDoPaTiRYaT)A^Vjc>g?!X=s zdjjUW40=MCIhi#h*9?DTR4U2z9UkfoK0mMt&m0f#sHvrn3RrXD5*aYJGf4|5luRr@ ze4&vdG9oJF9?WD%x2)&;Y3EWuHIu${kxFD!Em}(6zznGs=bs~}qlXY7q&?|~lgP5L z8^rKSf}!$mJIO@@jkrP{R3>TMvPtyMN)RLBfei#Q4fGQ7{g1K(0pOfLeO*UILf&e= z?J*hU6#v_-8h$I{p;sT+(u>8jv-=Zu2O_U-U+NgGI~9O1axrb(rwh63j!189pa)Da zhGHHHf3JJEJ7vaWZw;|jjAmU5L(?2l#OM_NyN_A$`6uGxc=m9?{@xEE^_vAxKg$Ak zIObmrsb)BwU_DuBvu$8?Su{g*wxSme&}rkYCeQITL(licz~|(~;cpIH zAvwNo42OzpNzf;qa4@-(4M?*SF`JW=GDYjbo&cNZBznx*86OkzdParrn5%OwydoB` z#}faFDEl-a6KT#@rM0BNu646`l=qK`$lx6Wu}ymsGe7U=7ddvX;h$=?cEqD5i!lvl zNZT|~HN)59PB%1A#6!m`5b~oJbK*@moHKAzVNW0aqzWV{GEOuAZRLwtn`&bg%Yikp zl8l_l4@>l`zXRLDZ=?ov^}YFv&@ESNA4mUQ`w0Ynws-oGxd~Sp=fXRdM7x|)+Cx|? zw8p@cEh;*~&*iBgR8hp^V-ob7P~IEFO|>rITr~CF5afD^?_w#!8g5W&N}s9rVL2YF-O15V6oi^$Hj)m1leRyq({|;iQgq z_HXhm5BYS}TKyW&ZF_%t)jJEP_bzH{g6U+^*7ibNGYG#1ftw&3Q91;mTa=4*w!c$G zFWW>`FWNo6Pyxv9CGpOBWQlavZ?|dyR}2y%mlT+Hd^zyl%|Lu65=(>}zN>Komj3W! zuHwt19f*b0)`52;D0Uzi9#|p3{}-~Jcp$MZQ3CDOd!wC^t*aM7XP#ZRs63jEcP6%Z zxRzC~Wvp!+*$eWrKyoX)-b(UV8{@W}PM zAQqLeVbcdmbST}~aXz!`B5z%_WcT!+J_~`KF8%%N5Zax_y#y*YP-3MZrwsJHm%%aR zAgM1zdrEg8+S6)WbmrnBn2>tWo`$nfCygy*^Jw9Ob>-|D6L?{}Ac~$X#ZOONwzGNj zDkV_q4b5SQM{vs+dLY|Ty^Wr6BG-X9Pp9Fm65>3Gu4ju^x2JP&b9L+9a?{Np1$9=T z`z3$!RBTZ?N_ZR1piAS6`@;Nw^550Y z_~=R&Y--nGc5A8G#+TME{MpGjdtLI-fO>m zcL}az<5>r-sHGK}nj&kFH$!1O4BODoN@r|L#DYi9`a|7D1&%8CGImwtH$;Qpn{iMv zQtOblJnBG+#$TR9M{e$nkBfQeNeOsw^m30rbTe!>__2z8$@tqXmyEZYv;p1^cDYVx zswvP1o6rU^8J*H53|&bJuD27O3KdY(a%bL{u!K@!Qy8V&@Dni^oofFYY%=YROETdq zreaE>=`56`S=z3wgB|8N_=%Vdel=!8_wnoSS0agQR7!BClD!{(A|^w| zJp`^i@9#j?gUA|5WcY@m&cKGj=SDB>V@Cq`9)v@eIu>xI4!-ZwmRLhhleK0^?+Pe= zklm=)cOSh8_Bjy`V*UVN{R7_5Pjz3qi9bvjki#D)5MWRv1#qC7D0(!-Al!yP&SnTK z0z0*sha_M6($(GnK8kmH=K{GTL#faP<8Gj$Q z6pJ~6RLWZUWH~^{-Jn0f75d$WL6De-lm~u&WmokPxF+thE=ZRaSF~10XW|uI+!W@l zHiOVF_uU9>60r~@?mXPx{!ysKPV9Qf50JXzasl2kp|x=ZhqD=z^L2Rlr$K;-hmOBf z4woVvkRB4>;EWQE1$s$P)zOwkNo5@JJr~PHjakMEiXZE28W;0GRcyVmd(W{>aPd}M zTGOW*d|@OkDM5stZw*Y0QW&Zqgl||EE{AXM=e4aNkJJcNC`4zYK2<&!Mt?ui**_*C zgB5S4=lQS=Ff-6vP+G{KzxeyBy3vdl^%ZYgt7Zx{H^tZTraM5zu#yGVxZM|`58VCe z*6z!9;6B5SYkZ%zbMiogWH^<_ZndjZt~jp7BszH+RW`s-#LIX{oaX-S;WH=dNVoXE&q_#&4J%C-Dq&EL^!%6OXB^Zqhnq zvc+ai3MRtwH7VQ*H4*XPQvWS5wMl+7)&197J7D1pmM!u;+13`c3Uwf3OGo(Ms&9k) zu$Tu|`F}gq{p@Wp>bqCp(zV1;kTcJW{6nmNhR#d@Ftw< zs&B`GVq7=`Vt9vDWjV!$)XG$@>h*iI5atB;=R4$-OiC|vEK;v5hGW{`=LMwa{?6A0 zMOE**`206I=WlxNno%hv{r#t*hX(&Ru&2)|c`u$&7$Rj`=y~Pv8sCIZ9wQ@=K&q6H z!qb{YPjz5IrB;&Bt96LMiSc&GG$&}AdS5Eu*HhYQ@p$y)c^gGNB%z{BwMe-{S_}&G zp;I7FMCKiZTMzC+Z=4d;VLfr@-PKdsVOJYo9TpjBar6=1@8iJA~M>m zeFmzBJvtw|Yk5cf>2tm6;jAxw_1chxOF^g$MM~ES=vB5fy7+F8CnBRq9@)dc4$!H) zJG`sx!=LZ$g?&c_L&kerTR07wC&GzlmZ{`i)+&1Q^B_q?MW>#)79u2Jjdt}5iye2Q zGk{Kh5!B?C1@O@lG^rXL>qyYSc%fh`Q%Mr+Oh5l(XWy8J%$t}XOW97O`_l53X1?5O z>D5auEf!PC0GW#sc4JXqm1eT&?k~fECMF~2x{n+}JHE15H~iW-{8f-;Svb5@w_;F1 z)+o0kW+^iUsj-pe7s}0Fg+(Uf;kaYGw*8M^U0%OUUtiLUPvZO?*9_N&ZXTTLe`4*6 zl1Y4J`Wsf!o%7;h)S0Y?a3r!cQ>*$?V2L>RcxU@=K!q*SD~k&8CW#*8@H@ZhZO_pK zobiMQXJk1$Q6nR+Xg*Pmh1Dhoefd7<5HT6S zW1E(;tc*T>Km7VF)JHDwGj=z9vjeGu$_>^~r9Gi&h)tPI6;q=3?$`}3D$AN6Dug7r z{|bU}Fe-RaAquzSoW2pFPN{6R}qnf8h$* zTm|r~cT#d09E8C))1-WG8&v^RA-*so51YX|zw>E#pb`}e{Gvn}9!Kl}$ud5yn9tIec^ zZISLK5rGfv9}`je;Bok^jjFSPqQAFmoa}UVop`vD#37Y141s}oO;T$*l(qXqNxKFj z!+zl54n*u-mD@eud^f!DcK*1t{=5qpv1T?BvS7iB(MEb{aH)lO;t;o1V?;9#cc#!y z{{m06)k}1ryyF=#&0qc9&gQK_%BF|3og@GN0RtD(TiY0&2cg{OHlxD#I|F-}R}KTC2xY%nX47S z;Dg0?AJlMY@4m%{vJGC5p`4KndYnz18X3}pwyilQfeuUNcA(4;aeG%S0&0{Yc#Mv7l|}njd$@CRZ)dJ^H|(A)xW$?{?PjedkiG(twBX zTcHcJ1b`(WC>1;@J;_vWCpe#4ZefA|>u)WJjuH~UHZE3f2yJ}4vwmC94^rAXKxG;M zRHB2|CD*ihtmw%FxOiUuI3BoFOLUK>|BWBoffG-31~(Uv4Fwjd=0`yX^tcG zI*nCBTDY(@e&T7kseSBO*t$h5bo6_W=%j~(e)(BmQH1g1{KYd?l!F&QL+X+;YH2|m zjP=BP`CT+Cg6%68vf9zbm(45>RjTg9TJp0 z)7d!QwpvMLt(c>7tS4FVQ0V$I&^sb3pLq4`8Qdi2!ZI*+BwB7kXxnlu*hp}GZ5A2d zgd@r*V&GqaqUaO{AjpV6b3ShoijY2VR1n zTggIzh~0PMTW28;+ke6dzVn);+Lh{3KS|c*b(=P!v0>MP!0(`SVlrIvp9SmVkGc@9 z|97~D91Ec(8Rd-E8>W>hHw0f(WC=hq{_XeBzalb^VC)%hivNL^lWPG3@cCy8q%4aD zNWHEcH9B3bh&GO!0`~HiWY~IsdjQ?TJqQNOKi~;$S-^;QeknN{YOBGYY1@-tUm%ku z(Iqc{1Q8XW#`j#&z2gOFf?#&Zt&!x0?jJqacW7W@BryEp!54U6ZmeoL2kZ@%qNeGQT+{=*DI-rxZsOm*Lmud?cG1Tf&0k5fFZE_3XQWevz>4^jI|oa1e!s3 z6ul1pEGA~DZrAKdZh2&lia>~w4qOT0ijgO0Ypty2^KY;qv zJGvXz&%qPTvVdW=e1Eqa;G#g;2|sHD{gG0S?*1!WtVL85e(*b>HG4F;4UkDt5s-ir z2JsT|F=^hFjilQ7s=^f_;QEUj^vPFYVTf3e4e8zRBy-=pz5DvBcpG1ZTc_pTM-XlF_1K}XOsBJU+|={Erg*8{IK}Ba3w?K32mmG%Ex^%^s@z+ zG$JZG_2mB??&{CN$`K~b#x?zOl8tN6fQphHym8n%6vub%*C5f^LUL)q!il0q1-a%G zZj0SQmXqj}{<#BVA}Tt4-FeV5=iJV2bYQM$7ELWl@MW2Jj;3v;n42-n+u(E28!Ktw z93(ef$>W_a4o|+hyZiCJIqY<`kN`RS-ri1fg(Bhf##Qo?HY|-scsWlG&P|Mqd8jnE z4z~B(KrO(on}b;#Sjd7P9v+`H$`WoeVP>1=nA%aV$M6jVqP(pnqwvc&_HNr#-C4;T zC_T9a44dX}&e2@F94FF+cD_~f`psI1lDuaQGPH`wLYU+|b2u$Cw*Wbmgx{;0PKTOM z8I#6ZP-l-hWhgZazZa8vXwA#R@OyY~WMIJg_lCTf@)Ge98)wu-U!z7L$H?6N(Unv* zal@dw`^3l`yfzg6sxMAi{jyL7yegd<8p%fCb7C@1kpxklN8xib!^20`9GB?U4C{w4 z8{Rg&X8nsBz9qSK{S)iIx&E^f-TE8XSJq#%UbFtv^;?GC7)y96w$8SWUAJf5;NUBRPY*sk_{G7G54Hy*gQh`p zaOYs(z<&<>V&K7n&kfu(P#w5t!%YJ-+JWhT$^O6fztI2F{%-%B{WtU%`UCw}_g^Tf z_mB52^!>K)vA)^9lYPhfvVESuEBp5KZ5(@I?dxlQv-bOIzrOaw+V`)GueGgZ*X~(6 zD0xNlZ<2>3pO@S`cK_IC#y&h&91DzHJ$BL9#OT@4GowEmJw1B+=+V*isC)Fvk)5Oa zMn^ZkKC|IJH~wbh_c#1}On{<}m@7mVao*7td9F?r z9JaP1sPI<`NsCUPGenxO8t72aT_`4HEV-VigSTxF9Eg2d&Q^Dqs_dvwpxcs4s;Dz+ z;!=ig*4WLT?9t=xg4ITuArpW_m8ch*Gx3QR1x6werQ`WXl(FWMF?(40O@SVWR0xeK zlJv%!$x<@HkOJM8i%|JSxmD3et%^eA(BB2RSEi;zax&d;M)Y(sEZr^8T^f$oG7Nak zRvD#++jw$o-(_oO)bTcJjMBw&DGHl(k&4R@U%nMfCkdIKi(63eJh%ia#77ep?IVnC31C#OWX1r&7L&H_glQ>2z!aPT5q&?8xAg&nR-If4Hc$@dG*V|M8qLk{Qks6i zH!HHWfDCe)J8jtuUl-`CB1HM}ZJk%mCXFmX{(z@9nhLWTxINFe0ry z(FUD-(H+tSLgadzK=)f1!j{tIt@5~^4YBX=Pxej2pfn6A)>!3AW`ni}&daX}rFGFX zUGdiKtUX*Pld*vzfv#00X=~EfRM%!2X`ea1_2U9VRUwILIaRf$vndl7-SY}huQ%0Z ziZIflK((0A7Bj;S3Uq}l26>cBqS~pQh$r?=9W=IZf66Cnl5MrLIamlpa6QQOz3B~R5 z6qSHr!?76QXx1|O#|65U*3wFSp`HoSFuc(rJx{OH^##%39ZN(NcZL_597)YZSnQegd8)HWBH2;0Jxv#F-5vGJ{fc%?2+ z1S7E+m#D;&k=WswKvxutv<1L}Wp@#x+R64?1v=xflR23)EG^aC7ArAk#C4`M$AuN}o z#@M77O~PETQ~J7%+P#w(R8*FgRGT&%7<;=Ifv9T-czU5()>BSf&26p7w3e96C~U!n zhRsH~@=bNX#(NLjaD`xVS67A^ad} zjFOQ?vt*)k*1A5u`40j;&8maWCov0j6J#D&m9^%O)*ff{ob?jE;|hjG ziPMo9ui7)?s)Ul#DS@uDo8fh9t+s8_OhUdz=+J_yWuh8-+E&ha8|eV6iu1+u)k>Xn zWwLQbThHmTnxa6?#SEcxz#mYud6_9anBpswk2ZWnG*U0O9Hi1A&Gg-m=`jEE3R8=2 zHHjLb@l-9@=-L-}Ik|eCjB2=u(IqcaY}C-;<>cxa(7D))NrxvDOlsxB9~J1ef`*cL zIBm!o3|Vc8o$nLq!9tc!M~kf295a;534?d+MaeWolIs0+FM6(TuLQlvdEUTGyjEZm zOsnE%ilM3o{A02`2?@C(tf0+yhLN_-+E9k@3nzVElgrSg%xwzV_3{MG`6<3UQ%~iH zv>kxBZjNZ`Bfe(^dS2zAD#575SZFG89OwHGU&EqT79pzbnW)iZ%9f>3(zl=g0p0Xl z3A@cyAsDWl(#U*!c)CJgWeHc*(*zZmjIdDdQ@tKb$ctKowdt-g&Wxc@Ru~2aa*C5V zW73L=aqFys$YtN>rO2Z-1wmMY>O$0*4Amnud*cGbSdY?N!D&y|>eV_Gb~3yiS);}| zQ$?9u%BdZSwD&6lIo2#S&34vYra3Q>z33%@9QAVqV~u5;Y%7w=^$B&CS<`V!ZSh6f ztl!_NQnqXOkIK|DuzE@bqT$k4vJgRS zRZEecu;u-W^jeYtXr(gk_J%E`#HC*l=sBsBf@ra-W;9Mil+wee1iDx0q!hVaawbp> zDHtC+{aJxwP?#vVKNcIlxFJzXTq5D=OjAoxo_NgTk@=N%b7D8YO(mEb8KZqP!Fl42 zg2SuOTrQNaxKu6|jdM>JKko^*xO{;<7dpl7xT{mfXUYQkQs$viE> zorv|%@EyuPZ#v?^W~2FHMwdU{uvkN`G;@nkK4DPP77dIF7mcQ)>_OGG zBfYm38A-;7G7*GZ5Tp|+a2N2KV1lHqdD3Cl+F-R*ly1fNdwD@b)e7d#kj5YAt56$vwdk9qt z8WHTw#;dUEVJ?v&n`*n+9kb_ba`c(Y=eD4`rslxycqI$%O+aFr@n3yus@t~{Ya#3l zkiA4u+9X?!N|-Lf~O%6o6G7lsv{M+l83I8RaFsxfLXc zSU3ea=yN4M+}^!*+niQ1RRbY>SI85UDwP1}lE$EE(i(8e!v?Hl6LXtKSF(^Ycpaa$ z>iLPe9^@T+V)EK6bH-gSkurY+5{&C? zzKLqPL#3swZl%^7tF(%F8Q(^1q(krBH8(mgE&!Iuz8=JGSNEA+P)9-87FjbA82q&) z(nk${aA+T(0wF0Kr&Nj&4wb0pOQMAKlG=FhnzdWs)K{C^fJPCi!wY* z9Sc2ALf+LvPDgEIzLLmfQf@C;-1+9e+XnN*v66?=7=dHXqYq7icLnHK_kc4ScC6%U zMWx#IEM4@<1BALx8L}}fX#bdq3`wJQ3TBzDSKx_aUBJ$QeCN1wrmB+W>MA4SX_##U zc-!LXmZMcLVB{5$h(!Sn>NOTHeJa;n?yXc zcZUli{U;ya2`&;)pPh{*DcX=Z>>y0GV9Xy*C+%c!@=v0huACbm6Yi(4g8N#f(0Xq^#hffTB z4;%^i_jx5ZV7-3`2H1WoW6x;;$ORE^9Ivbyp||D-Zqldmk**l`M4h(1S39 zprJ-O|D2FZ;J*O%kqyj&Kjhf~5Xl?mvpx;sb?IBie5OGrAjWe~2el?wyEOkN_Y{6!I+)qpWL757&p@V!-O|PUvV6g|mg7lX!Pa?HZ z=+o!0xU{J!4m%<8eHwI>s3?&Qk$ICop{vGgo?GCwSxc+tF6@a*)Rz^@vgWB_KwKeQ5Z^I-OW0i6+lyEHeImzX{= z*p(`t+Xt=yg}L+g9P^&t2$E)clY&Xd>Orbpl&acRqdNc*@&Wy^4ShQ>H#R2XfrE8g z(Em>b=P=;sEKVND*GMHVgX@M{-PT%IZAj%nGa;YuFL@hiTI>oPXik1oAt zZuib3XEzK@U*Fha2lt3#pg|Zj&5Y5OleR)6ieCeI{FOv>>c-=i?u*wz6?U4>4nq}q z?^=7_sMXopp%@j{`R!n4HNY+8J=el8tmI&G?0#^mgK`N{HjytEJ?64=Rz@U zD4z)&mPGG6u^YoAP&jvs<7xyy43lC!{qk%hZCg zs?n-bU@?;rnH=r}D_Q7~JN60Cf-iGejPvX`9_rpn9 zwGr{qBU2D+2e5KGyMIad4y>~f{hjf>8hHZS3i+H*sDrHk+~Ygz@MuuvulY1XYCFTkX{G{CqZ z+Cp(|JG!YnH#)g$33T+)zX%Afi)bR;i%oOcB3ufR)B@-&0eJ*XNyyX(Y2l2JUl7*O zsr%=)UqH&1on3EJw0ruw(*T9r1$9MN*5}r559V-s!VJL8Y>)!p2r#$=Bt8HH78ZFv z1gJd+WL&iK5`RmK_bT9=OGBpE$$Oj-4}0y$Kp=#q!PBngwLc;6S}gKG8&2@ zPYRNCv45k}vZy?9y>Q^X`_mvr#6n@oQ&&M!0_YTokb8C)RD|E(8Gn!}k#xOQ1UQT} zZW3gqkAVyk4=Lx@FFyM&x_?{ur^n#A1{VLD)||i=|Jv}ohqc4g!;|a(w*H0nKV3h! z{?qGk*l>J(VZ^rHzy9!s)`q9oA6P#&G(U7^=to1RH-v|7A38de8gdRPhV~AvU-##A zzufR&>mFVAm36nSyKY@{on;-fZuh!@!9NcE+u(P=@_)-8Qv->~S_rtz>`fl$# z+L!8c^Y11;u8}6w-X^)1 zw=rg`4K+h3wUt6c)pBI@w1d~P=A^E0oA5-<5P^^~TatwOa8ECllg_w6g_6xjni-Ea zP}HQZ{$)?GmXkW|GIhI^k_O4Fj)_gC1oEn%%}LpEn1+N(PBx*m$MxjJ!#(lYcDZ*g#<|1-M z#p20Xs0(Jk*=ty~)wV|x%D5I{3f9U+@(SKek!?j-De15mh^R{H4MZ~92rs7l6Ku9c_!6YLSu6U>`e-_rHTBGf>TENu zt&s)RAk)<{6D$theC_SL_@==M9vyZa8w^=ys1=wAf} z!#N3`ykPaIa+g zDY8`~+VZN^m`%in)(LcZQbjhwMJwnj+ibb`z!YyP&Nk#R9Z{=5Am>;*luwZ7sfF*d z-he`#X{%fLY$BN){~J%Pw*y9sP$g3lQv@QO4P3;FuP5Po)C7A=+YkiwS8CIj1$r!{ z0fnJ7?a2nMQaZc!MuBd%%{0lRLy_>eGqgPz9pixp*}7GpqXTJG%n%6Wq$-8_Dd7h? zANU05TUkX5G6K?R)iXT3=JzJ)rZ$qQYi-(qpVCYVbZdg4(iwZh$z|K5f-v)@yKGGb zvFr6#gDyDJbjwp|+Q^&yvo(dkKq>u3j5u>}QgXeIZ*VnE8?+GvTQdR(A(h>l5XhE5 zD_^uY3u;e^Dn&HBEhk&mR_aulqyst^O94i&{~n<@qm6K_Kr)WlM|Uh!F8PNg7aNZQbd)~K8&qu9=GGTBPB6(oz^aKW3F zXARNp`tJy0qIHf`nWMRy7INqo(j!9eR7|<(3;}D-nQ#R|=BVNwytY4Ek-D;EF655s z^A4KxWu?M)Qf>q?q@DGZYg&(uR3-X9$=9b`Ph?v)M?vedkj`vEeINhba-~os)$VXm zm5&%4)#RnZ>?x-MTBFPg5tLhrnWTr?#hcQz<%rKix-5VUQPFXM#%=MmwvHliB05_!n>!NgSIiH{0ookd*>=4xcrm9lU#3y;Fcmeut}-C?tb zVy&3ZAGwe>dCX+Xima9Lw{oQ2-)xcvs{eYS_K;zP)&(>*rG=`WY|M^xlGoQmdh+Gv57bMXG_VHoN%x+ zx<+2*PMHGXv0w1jFBw^PMX4!Sl%;5m%dDB_t5Z_Y5Dr&rBwQuA)I-E6mZyu=zE`$+ zF~wpqDf4R+tRiT4CA06~ElAm-DGDH+RyG^47TYCtd}gCtC{J09F}25$w6g(Yk=iDV zNx`cqQ#4>E8?2`YGwz^*|7^i%H4{b1Cl}xnbqyEZA#9xadL>CJ6o!map-?Hbv0)zQ zmCe_pI)ZM5^PI_URfA4=A1`MH;BRd@nsLMf4Mp1(Pj1@AGxEg*N7_~O8~}&f3Qh6? zr9e-yWzyz}dQyPFG`W+uM+JJMmZRhKn4u7tGa5&j;7wrJyx$ZjnRqzh&@|18Ty(>R z9*88HcR?Vcc4kKDV=GjNx;iU}F`61+kF?t~oK{yUD=y0jbVFWGYpMw?U{6BXXi~B$ zo-IXat2F5fcrv!KB4ypdm(TeU6ya&qn(a_smkwmcb_sNYTt`>6PL|VHq8UFmqY{pU zY_;hk^yzfMSWL77F_v-g7gYI0C)4~v>8HRjJAbTUMUj+{B#(J)%;&$+et8CU| zag+Xx`TsHYCeU(KRr+`;Zyxeq=IJGn07;lrcc{8m48fY`Tk|L&HP7>0+P+4_sYOK^ zE+8Ngv0I#onkqz8qD`Z%GKjQj+YF70sMt8t??KD&yLB!hDboM-4=XFIy-)3X&bep0 z`|SOFytC8l)QzgMq=mm=$z?(1Vdxdm9eIYfOTAoJHoF7hFDWTp*=EXXORMiE^(?6C z1dZ7DzhP2R)KJtgA9wMRlJg@AYMED)xdaNW=0Wg{I;NdpZadN_(RArw|zMq!^+6 zxNzquCnuH*r9>~pXf08$5OZ;yzYvlZtzybsVFS%v-c+j;`EDwBQ0l2%m zNfwo&B7w{ERwjlh<8&h)$!>i>DsEqLP_-sNR-tUjcsTdi_4I(|rMZP#yOybfK%rf?LR2F3JC#6H`KrBqzLo{WW4%^vsif4?OGsa1y7@sCatMX0X9qQqFh858q`Xm>8Q9ucLKOjo4aT%HLgo5@I2k1NcWixj7`RE5&Hmkov(g`gyzVQf^?Yp?JAxG05fK=;nt>J*jxLoH3)9?;iZ= z9(=m*cCG9??$@X^5=@>-YqZ6(u^g-RB(L+W*Tc?;PLRFZAR@}#xKnsnuw518;}0$h zhdz4Cr-Wxe3jgMw8{md_t-OhS6;2sI2^G@Y3@N$XLR;d*Wm32Sj+ap#uED`K`TZM2 zU#nwf4?G>jdE*IMlyOGS6k|=!NN0gaD0*G)yA`z?Q3>vU+JBaC=furRgPorstrT&k zi1)?>^zInjYSgNRfX-tyNG`370_=?F;55^c+r2?kI0~qpVU->dX%5H(X1!-!6h-LN3RQ~dTe^o4Z&t5`Gn z_301F6th>3%`WVmXU3lqN7nA4XXqR}hj@m}ZoW}wYqVG4rd7p!E=!)X)` z@m}$=Xvd&=HzFaH&O2@-9?n?;bdWO8MQ_8B1N7wZ#T5?2$cRqZ@Hx1bhS@-m92T8- zp_L0^ha}%L04?LBa+P>U8*R8ksjSevA2*yMVq8Za+$Y@m(8SKci}xe>26v<)ViF;F zb+_z2@LkzmA&-`(q6JcuZ~pVqP3ull30DbU#;xnszuGxC{j*0e6R$(gKHi>UrBsd6 z30FBG4>S?>EnQ>0_!$g>QJo;0`O=|*^`FFm1oz6h$87{+W~3lT^Nnn!-lJnh1*wVV zF7(NWPB`|i7vXXfNvZC-OYD>QiU{6BvWfKOXuw6w*^rv+G(&o~N^pN3cNn8$;qXqs zZSbSd9|iTR+vImfSsNV+RbpJPs!9l|FXGN(R4hDxHrT=M|Kd?F++Mt9VLQk}-ZB2% z^oL~^k1c>cVZ%=mh60e#?SqGp zkWPLRmq;IKN4zxU@KIH^({0ogLpysZwGwoDZ{9KJM#~8s&U;Lom)d?HEr@BN~zx1(*!M7g4+!H%XggYY5 zRA(AAKtG+nb|9lG26R$qEgVHNM|8r~3;!~VGg=yyj*U5i`nslnI3iFvpov1UFn`3!>Nj!ewU5)0?g zezICwE88sIIRL)evm%1;kS-2467~{Rp^Y`l#wM8n0)E6UE`3MbEJk#~v46r%@E-L) zE)5?4j@UGQMGZq_$AA~am1iT(Rw3uHW>h+GC*z{<*WX14kEn#}bwHw#tG~QsVECSR z|LI)0`1p%Ts(lzkifqLl3dgE)q}C4Wqk9PT8Py3_NAJCC@acz8m7OZ|F?rQhkEh^k zX7Z_QBABbG5eX(XXz*`X^G{X*52&*Lrq6u|m_*+ftHG~`AWft-opLwmriw;;Oci!= z8t_dFt!#N1YsQFN}zn zsGoxNWk`3t>p#S}$*eKq=rVlG)MS`)#NGqqhFHmu{2Z_FWF21N3?iYPd}#aNrJsv! zb*zZENK!b0I}|dq@l4xp!3iWwC57u(G28Sfi-kXYW-E67>cdOI%3WMFPG~xXt8sPPI!#xBNP3tX%RW`hG+w$mYI)9UP}O;f^PzdOrB?NB6>>_PD)d zCreu>uOf;N`+PFrlI(5x3G9vN1kGI{>^Gtdh5AoUZ1*isq1}!Z4cbjA>8M&2nqsfy zulfs|{EZ3rtEbTJlT~DX4a2@HKRwZ8`De$&MVulY(Ur3wn|^Te_Y=Fu6f&oH!r~C2 z5nJK$NV0*~Eoq<6ZNlZKvD*Sd1JY~z`xi%~f-F31A3XMho6Z)af%=F{im!+WM8pJK zsTm{FNTq$W!lJF#VnXsYtjD8bU<`i7Jb3=KqarM!zJt__DCJLOBe?m)8DRK^-|;u} z-iS`PdJ~|7hDWkvf5TBooKhl#IO#DbQ!6M~dncR7dn%P+NSadD`~ikWbi&n-{5=@9 zzVqNt;g^3nvCroIgt1~@vBD^cPs${{ZI&)+suUj%Fj}%PZW2O&g3%Ej*%%-D@Go`? z5B%xq3JEU~2jJ6x9?ldCjFK^JvsAjE+papeq`c`trYdRjd4ItoKB^O_hd&LpZ+~LD zaNS={wECsL4y$TDUR66~aE5SsVlCTZ7L~CjtzEDE6;&P4Ayn|~7=~j{?Gmnf&9c@V5wl)io{ts-9sD!<@08UxV?H8Dp6X#!W_2@1M z9%SE|g#+`K&4#C|<3CvY%H*B0K~!_w0)`>KBBGy=4a(gz`Mu>}N}VZ(qp3>frm;SN zI4|sPSU6cj((H#=_20a(FT!xTSA61V7zPSCJk3;{^*Y-2b`^Kz_B71wUmTGNM~-bL zv>}7WSRZ6scC|Lqq}7hRPE%2+^=)eS@ZXI0H>@93;keg5G_Xwchu>5p9u8UA8;W+y z9Sx`&hJ@S5T80+(a12W;PXOc9jg$f^YEe4o9hRXjyAvxOG=;!=MGS^+hH7&q3WzKw zB@humJBhZ8hy~e!@7V_DO!b4Z4IOt(m1j+{s@11Y7tLN;xPH37fBmRf49c?(Hq7*K z6gTTU!8Fy#B{+kk9b&>tp*@SAjEY4-QS0E9S@9`q6IF^bHG4_h?j;&&;8G5Qd)o8; zh4rI4!tL?+eBUCwX?;JtHQY-eHptQq`+$DbD-=XTqKHpeUfv5o{ zo&D*(sy8By!a1PS;}?jnVG!Mda2ZDz6pY}ZT;Ja={KLjRB8^T}0)R}vzg~7O#nL3o zh+xsBXLii3?FpCJ`pJk%I?Ch`G zdg>x4gzcR3MyD~yI}MJgFz70sK_D&TUxyDtMZP#aoIkEz{q?{mJ5`Cnk@c^M*kn8V zGs3#l`m@_|VOC@ZL&wu$+5re^#AMNy?$D0zwEl+8rz$Xb?6#lYAQN6ay+5}xzh>;x zh4W;21QNX+K}G8)pA+{wAJ_#}!pGMbI-jjObwN!|qo{a`F5&RG{jI|DXZJx>JEA$Z zcbkOmsyzo&9j8|jPKc~j787Gi&~4gUMqIL@6cWQk`CWfv$)Ze&1GNL2!JKs1Y+CZS@n=nKjhAX4%^9C#6SG5hj z*g2bp%$aD^h-#P*Gr0H6KIpdGD-l$Kti5rwF`1#cu8rO4{!>8uVg#KDzhfef>=fC#wME|Gs@UeeRK6gWLD@ zfvFTaUKK8A3*~5SlgeA{^`2S55*tU)MO8+0f;$LQuLqxqEe*DvhgT$dr*dm%KRAB{ zQe8HT9h!VjmYY5*jwg|U(zTMrbI6CU!&tG~>6osdh%v>gEtw+E`2>aMjOc{N|LxD@ z3^;g=!gCOa7019NcB~bBP0JztNp1*+RLv+cqg9~EC#!_#cK*HO54>B^2XYq|r;_?a zCDx5vJ5k;t{c3LbVwbXZl&r^t6)E5dZcLz*3!y)kDOJHb3H>AT69)0aAy9O^`(g&%uZAAn~ zB8b4*4imIHO-5h7#)g7XX`+7pB6QBlD&g_HAHi2d21Dtzi(zG_NPS8gRW~=YN?Pf5 zr>StYZEYY{9rNM^6(;FhR9AoG{!0fYH3qaaijt!D{ApQo`d)yeT|0IW;i7R24=q_d zf=nFV;Bm3Ejfur`t#%3fkJwybAD=7+9?!Ew$N8>-*@7;^01{bDNiEw!HlTDBS%1gY z(#3db1-LJmgz{QPIz)h52aDlA`k-B$WGAbH z=l-gc7*c*~N8d<;X>QHJj>-4W)3dhe`1n`WJ|mkGuq6FSoH}AcB6&(ARm+x`N;H4~ z468gG>_Xzn+=T`(+wu7xkks7C?|xo-8dAEiiKm; z{XnE^|9Jc04!5`#@wIx1)_6=sb)Bz-f+^uOPyfK;h*a1R#-oR>&5E}VQl)&?g~%IE$cm$14=I@3mH5f1SU7gJ)-?F) zmH5fr#Qd0Y^1120EHNwWy(E9F=;i*d__6eN#}6|4VoTBWM|6?4TUV}kQo?(p{rw9k zONAp>!-;`t=B2?aQE{pEtn|=h#Brvy@Tm$#x6*DsAE~t4Y2klUsMe@hc<%nw0ETz$ z?k$5#x(@;ZuPzy)D5pBAs`y*wD83h-$lzs-h=s%K*~2|`*T9k$AMIWdGZ@KKbSnz= zGE=tlfm*B(HX3Q+>?BN#h=pU9B&B4^+mmFC5tAv&8k4GzV5$g#I82O)0V(~$C4-0K zSP3u@-%Ja2M%c1~uIr<=aL`P(s)9_wGIzzh`R8sQBSIU6Jf48_u;U$P!p`;d^ zH&d_Bb#GCrE4WR(4~|#t3}4UnH!hB-gu@@Z1Y=$R2I|hdIOfCYkPDGD_L$zn1zAd$ z5PAhPU_>k&`vF|SL)wJj7qBZypVO5!6Pw4hvdZKyMbtz9PJgm0ACv7GV3-V3q*jN- zfWyz>l38ocu|^HA%Ij^;Y8ezNO|K;G>~;KE)N)9}cq;87=|5nEH0 zP_-RdUkel&qKW%^*ji3j35U--U4paU{mwq_D#1ymb^_|nk>K^Mh_96r-uW&JvQhCc z%w3SbaPzjoOYag#i*r>>S|m@`$aNhv-Sb4XE~J?@kv=zk{MI&>%@Lh&_*qcq4&9!O zw)oPWt71kav6JtCYK!g!Gx@Tv;?8CSd9#0D{ad8CF4=d}86Vs__*AoRk}XZ*_rz^l z%I4Hb%1pW4g&wf($nenR=Fi8AX z7PZT3p}K`?Ctl3t;Q|v4f^DmcZDmA^|7E>wWlbR>zMU zO+}45J#BDUsU}Bt!XTlXqCHOrlN-Sn1X(b!9G6Mj_hlkCo+?N=K8HxeD+BPKdt zAp!318S~2CBl@;;*fkuhVxptuSPmyLB?>6lYAsjSu}biPh&{CPE{rw(hz?1`?>rzp zd!)2Yc;{VxlB+v>>fukLMV8fd7=6TPmeK?abyY7O_eOH%2rG@g+povyJ6T0QaRH*e zB)ooopCsgwPP$=eQp|rOCe0SN*`hA%!`hf5>`h4{s(b@Xo~#m%X=ohTyz#~6PwAMp#-yuOU3zIAZ^6Q~epDw=2M)hY=m;lP z__mu-Ve6`xJ4yPW;Hv?1Q1C4 z=(b_^zL`R4cg12pTCE6cx|Vc2*3OgK{=;o({-{p)!>#{&ws7asPi+-`ciV|pH{Nl4 zKyMQrX4Mz&KBq9{#tFI|lE#TimV9 z@q{A4a7Aw~%4h6eOGfziXYi9zv3Opw4z&N&2ZQcas~hn^lHkkPt9&WgZR#7QPJ^SA z!e{>(o79L@IDG%r{NRGm_T91#3cZM`rPU-#=1Sads^c6cdgK1-p8mq(h)!_peu?;o z1%MMwe69~z+UTlC&PiHo2e72k+Ul6uK)MkNrG)h7QSG-#kC{Jc9sK(9a4zoVR~L^D z!(1iV$q@>`4lHGk#YbqjkIFPy56T|9BaW4JbBLKf6loV zE?@k>9JBUq;miP_~z z(`;1s_KBCq*UjqIW@X*!s~6Uey<_*<_s=5XdUk5&#f6*4|99s5vOi2Tr*_PIVKTYy z7wa~z{m#rs*DkJ;&s1l;(=%)Dp8D~nIO1!YYr_(if-D0w2-h*^uoeFShOPjGpv|- zdH2|*YoUc_75R}S1I?QP86JK);L2y_^^&&3>kAo2(13JN4`|WEghjt%=gmYLR*2B` zpo7bTB&`SUCo8g^&0J5kd=b9dWw`^`U%cMXfm4!!>rgR!9Z`F7NXYCtkn@8?(t<;u z$b^Ib-fWp@;UX*=^E^^G!4}YU>fLZXY76T&6D{1pIZek=wB{pVCx91M?(~J3b!&+> z+;Qj&a6!Y>oLklwd9=q-G{|>8L)2(7vQ?e>1nP$@&R`&iEK0?EU((`1Al}o%S7{PS z;4Dl8AM0~Fh}Pdl577~mzl}87B40#L<{a&%1xbs1P)!#ptY})M7|tP2bh&7urmrMw zWVPnv3Yct%dwCc_*ZHiOxt|a%oZBK@fX`Y0on1asbaWkhYkt~AwC*-24LaeRzl*%l zF0@0^yJ?4@6r6gzUS9%9xfzfI_~l#g-95G}zGH9&^o%(kRDF2Q?TAl2>Eymb>UJ zF!vdA%TDo4`toRTA~Wfeew+^ndE_u-X6OybpN03n7|1VONVJi>qZh`_g|!&*#oNd> zR`5XwJGGu@tw`L(JV9b@BjQco7wSnC>DgBnhOK3ZN9+4&yO~Oq< z(A`_o4^Ky*r?%dNv8^A?MxaZJ2I*wi%7c0m` z&S|~5ydH8>OOHyHMe;?gD$Ag`q>cG7rjyfW zEiOqb7icvRH^vjR2IzwbqJqvEC<6Kyf0?y$5O2^!6F$V+}pvFcG64f%x!B+I>sFOLlKbO&oA z=8i^=zwGj^yNH_4;+;~cE!HT5NCS%7Ds6V^G@=!!AXry|ks`9%<-_F#wO{xv(T1^F z;&KX$71mMkjd-wPXnMP)(Zd(Ow~74)*HvJx!P}>>9(32Y=3ZEH+8W_34YeDa5T=UH zn&(ZH&Tz}o;|>l3>9i}z1F%B`0VJUJU?$@MsHlVX6n0B{fjA-4@(AcokUNibesNhg z78a#>5x|7xaYg9Hr4;rQ+K8FsU?$#8EaRFf$1h{qN#jZl>$1;+9R9Ro`_)8^MWPpm z1U&-w7^hyF5jT_xFVR}iZVgs?JOW?|VJyqo8?qB_qKy=IA6Af{6(h`o(Gn;|@O#-y zZ)h<*+nC~th;P}=I)hlxk1#-C4Y_ENgX#I+aK7id1{RpmBthw39a!%93v17R3 zV->)(;z4ucFj?Bza6v{;fbzOh}SFK}~2=qWdivzNM^wSDYAP!-|hdBS75H#lsDD8YDP_w^cms@^Rv)|9E#y zI$B}G3|F=^4kzI2#a%PHyS+wgv3Sm~qCsGJEs7Hz6jXX+aeU+W{H<%+;<2Ve6A)c4;YH;=|?l7(6g{$n%%aLb$YN(3s z_mJQFDI8LJPH{yEiiglN7B)*~Gbd?rp1?XI1}C6*aYRL58nc^TUH2hjuZG&Q3pejH zMrs!`mf`VgMY<&%ps5|Xg+s&VW1Qj%dIM&z6}v57Gu|ZcGiEnFPM#p{SD6B=V2#6) zgUuGl;@-x8C0fkqAci1Lwh?e(;f#X1xaAwQ3wV5UFB<2-Ye$FBI9JhlKu26WJVqoV@(*vgYSBLY8h~{kC%riK z>p1T5amvAz0!eso!!-Flx(f>^PKn|!juSnWUc9Ug(rf@U3yzrL2>_E7GYU(t*fEC} z|7B?XBC+l`&gI2p9ZtYlXK<*;d2mkJl*4pb#Et2RI|YvHCL91U1h$;NX3enccjCpi zMVf1TGT;Cwc3)w*^v|u_wEm{Rt|N%C{J;h9d2Z1;y>X3_(gZ1oE-!akRh;nnm*H6Z zz`eMD8r2PCM_xH96R!Aj|4PuBIf^)9`4SmCIgcI`w_jkGeYt;N^Qm;g)n{8Mq4LuY zUGaa=F&{C1?PJ1aU+r()9>KPc%>>g22jQR*Q%?Noic`W~#Q>aX{r<$6EPVpV=JDxJeJBsk~d<8dZ9_TU>dhw~)PCOCiLoC2ORIdRGG5A;C| zcgiAzBWr&K3h!NFcdh$oe`XsFk=StkIL-ReQ9KR=X`ufgmKH9VvzZIk3NR6~Z${>y zy0~!ow)DOs{Lk{RsiesB>`9Sgq@!8*o1 zGS(Wqa?Ch(;lf1=XDrOF`{UZz*ZpkWx7XdX?&FIuu6yUY_&VD%N2ja#9t=tUZ*l zX5%K0y|$2B>mKZV(Atubq*+_eS*x+-hz+-2+E#$4LN5)o+HCn4xPz0*rnyO3V7_ z=n_f3vqjCpDw64z>1>DUHqDs=O#n!2QB^ukm6FkvIZ9id%Bbl%$&kWQWs>%|&aRf* z>gxPyHxhZI9aOMPA{AF#>INnlyKsWkbAe5 zvMHM}t!#JFCJW`#NoF!ZnyM7!ortM!OtcHSPYrX;ZOgS#4;iX8XU?Ut&~2t873VVn zO402#oV`RZ-ce1yD#!Fq=ZXIQnx)AX4t+$;fewp9am zQ^cW7r^|7(l~XLmCG)P3oyoZLDK6ckUD5RUPe^h{P|jlTc#I4k%LXXbeUjWM&`5XHIgXhl9&;BM<;NzTTsw6Z}dO{JnHnxfY~Pvj+h;j=a+$JbMC zOEi|S5Ht>3DN^mF-3FgtV^Ng!1?H24R>W5F`ATfA!YKo;oILMJ93mOMwvrP^rle0$CW^X8K|9eTyMw0bpv&D4G zs*GC2O06yS67gk9Lbo|^klAU;)W&OO>;E}6+u|#2#fScF~5mz%8cjpYAfDOq33Tf~cw9Oi=4_Kn= z3|02T5{`Q%GgOXa%NDshk#?73aW(y6Qk{IR8_;3>%h#Pfg({P`e1w$Ghgt=O4;X44 zOC}yqFzlx#`3NfaB`ryA1^|3JVvkhhK1Z6#*fvS_4UJYa)6?m#wRB69R{vZouFfmj zgsNWC$h)fAa+%f;q9a>gta~jQ(79_eY65*HHi} zmA6!DA=avuD=&Ijl4sZuQ>GAsQtZ@p;lyT>B#+m?>?f~U+El7sO2saIT9hyAY`I93 zr8NboQm#|#njFWHba-3N4?jSx?)NK@-WqP?xv*r&knvGWCs~ZS%bZFcRZ2Trjsw3z zFzxH4aZyt!Mt83z<+C-wY^KzamOqz?#kKKs2yTQe8>z!z1kRh1HWcl2g6d1}lz!l= z>EZJ(t0H#3o(<(U?2+V(s*zG~wJ2Ya=i2SerEeqhOe0ue($+=_CUuH5ZI?ESjK|qv zK`N(B2U}*3F}6oqH8PH9merfWRc*Vl+=in^TPB9m5w)3ewgdhaABZaxsWbOW@*rQK z`FPw}joXspc+~luH{_g$GBS~dy_io#bP3tEAx?oU&D!Ox+-i*~c}=9m(-)Hgk*4Yz zV@=x##Ix=~p5FI)SP{p6D%G+v^(;^T9Z_8?*0M7YGYA+8Sn)^GfpAq|Z{OsjS-Frg8>nEPt+aP)fQ2 z4BgVQje>%As{^!guk>7ugK8t3;X|fsQ594FMHFNFC)IUzGG8i~wAHX97~A#F#C)O^ zvoJyIbm~gIWQ#Ln6Iatgh0avV;_>=&f?2$5~!k}D;-Jt+lDrpXqKVh44{0}4|k$`-Zk zS<)4!A=cOw@sp87}8d(g|7|&f@rwIwC9+G>0ojn~6f1 zi*H}}#TxRPusf-sRVBLZ59%|{5F1>S3<1@=PKrYcZN zHY-!j74DKDmj%8b<8L7}g zI+C#ZTNy5rp1+ekI#LccSXaql);U}ji<73@lHAuyvr3P@;mSr_pb!Qqqt__y!r6- zk;!Lf-wTr6jj|#k*cIbWQ8F6y1X8BN3=LU812aLiq`J0N5!S8=An(?geMZ-w2ZN?D}H>fHo35y|R zz~CBo%nMJ!%7{jY{^9xq1Nl$;SBOE7dye-^IAJWL*aj6)n`r|TtVpxJ5-LBO$VS@yQ8*GgrzT#Zn2%kZ!Hlnk|PT9+;IfiE5ba?4T%L#j5{Nbg8 zJD(JzksPaM9PeYhtIhJ}Y*=m5n!GLN@MY~^I9V#Vzj8GK7q=YQIcWX_@v|4r0tW34 zS$NF}Shgact!D9D*`06%y}IxV*<%YoSUCEI8*Smx!hwawb+4>@Mwou~C%cwqADHhE z+S>W0`LVg*&OI^r^|`y|K0Mc$yL?VRcmCX#+5esW#6=W=@}(o_=}ysp$u&|9SfQ>E3i=+CB|m%JlB(iK&;S zo}Bu|)ZJ6pO*N;km@-TqoZ2?EX0rU^}XFGk($d8RN5Ke;oVS*tf^-8M|TZ zowEDJ;$!wPc5K(!#M+nEKDqXrYd^F0qifr1-?7%T_TbuWve#w5zFq?=A(2InYqt%o zOItS^b-ISVqX?3ZUanWO)hT5q;4d(hoVk_^l2b5OrK@RHA26rPlrluix!_sDje{#h zMVE^UUoH*6L26^c?L)ar70n`5HDQYuip^Hkp9*dv<%{NemNLti>naW7)oY8C|F^@< zRi!o8!g3B&!5N-Qv=#e4PV8v8c9P|&bSTBO_#_uQKPAa2hmi&eW3`i4^41u4(NjdO z$*0^*qNQ?yh%Km!Mt6TglDqgO8);`_b-h9z)-I-uIRz|N9` zm`cN^^$ewo`^&l>r>k<)1Wrq(F+>#_XDiord%{V3_MAPEeVsYQGF7Ef2|(|9jq)5K z%~DqqX~xbMl`5U0R#seaJ}JJePU#t1oz7Z~&Qd#E$!&TsQK)TY1J%oE+l3U7tysEPr;sB1^5eaEEYHhYJ*nmd+m$ERmwxwFZ!L&ddwVUW}o?X6OciGZMY`EK$9 zu4Ssy@|wOAuttMy^SzyPrPma!H;@%2~Cy%oYva9^4LRiJwtx zbt=vutWZv4sF^M|Gi8cXogvBHrUH}D+Otgy*GQ#u1}%{D?ya2D{-B3-%ZRY9dJ^FniZF+=&{S&3eS0x zToKn((SX6D)GFe6ZQ|S@F{9}D?2O8;b}u_D;ik*6SR>^XUC=;BD}cK(m@LU!jwSwM zm7-R#u`ZW;6F;U(u3KO zPebRGO_R5#uEuqgpLmZ{Y>A7|p_sNAR&eH=BR@k><5X->*QIUE0PCFb398XZBW7yGw)jYo zvU1+p&@r80v#WG_Rd4$=5i>ng!fIynDK_FyMN_&TlE*ULN}W~YmCofxxS4C4l5#>< ztzx=SV z7NlMoZ&_837wQyej}bEfjVxEqk!~Ok=1^mbdu{8oNRq9hBOOJ}0p?(rOQ8$W=enih z9(h?_;TtV?qGr-&Tz`|qj$~J%?kV-H7NckBNvUUOlcmIJi>?wAcLDX2qV5|y*HyG3 zoH9om7Cxk9O~EtQlB(1Cc8L!7mdhSbIHqkRVrQr%g;En{7)K_b(K{_om16%JKVY;p z8&5>xaI?nzn)vv|q&yYu87WT*RE(_6ZE$BO;$Klw) z*C;?KDZSRHyyP#Od!b~<)-tekT4O1;4dBmAo=Y|su2-_y=(Jbg(L1c|qI+FhEWWJc zdc}O2_0;MrU(T+vv=uWq4*QMkUM?Ce+)bc~p4?@Wf9jjH{7Al{t>gmnW zHr)Z{GgUPPRo%F@?Pd!b$TrG#ygd(1TO(R|v`#yjg6e&e9j#r(wkqL#$bJm9SSm-Xi_B+)-2Jv;Z%u@q}c6;$a7nbSdy-KN}4E_cX+dkGsrr{wSq|>lcAkzqyUyQ zarO8=O6AqvENyES3jUb88#5)h7bQ8z*4R?puIMtpNT{8^^g2n-c1=vf?benwVO2d^ zSoZ0NqM55&DW=p&W~{nWrdYW2$3)&}g&cG()v3^FCRd0@H+v*`3MdWvfZ60KrkG?h zp{)+Rj$9+2YEi0gG*3Aq@OVdwdzx!RQ&HSGbtxm?Q5K?#LrG$0x#7?9OsG-P6rx&M zA&(lRAJlW6I_0btBZjIg=;|t`j*=hLvwVRvr9BnD!{aNvRHv^Y&#i~KAY-%{96E0~ zmsT^xF~QYUEYDC})LApCjea(JiJ6$G1sVayqs=X=k`3P2*5~$F-cT?ms#`RBVl6GpXiN)tO!}p6=x8N@s>s?v~2Cm?Y}~&nzxVqKsK-BFqI`P4BPKb&sW+%V;zJ zUB9$V$^$|u#88cN*DVK;f^Io==teSvs@a4Ke7%)yv1#u3>GP%fRFe${qo)$4W`)Vx z3o6T2sW?|EH%#%6Bb<^0CF~61j>Pd8H>YeNTI{wu(NH|Icb+`9QrFbz8Uh7P*?Pp& zQmOxy$d@Y>Ws%LM%yLcM6>PQA8sfm`D&=sOQWe@xUgwOpD+vv`f8Z*aMwzlkf@!y_ zj;wCZAWggqlQ6M0W02`K<6@}EB2DU9p$j3qvQcL(A+}O4tUp4YTkblmY^Bj%<~v$t zF>J_8k=2$f*Zgg!NppNh5s4tb&b^)3DOW=N5}opRYjvBBNjk_uk1LleMR>Xtp>DRD zp-ah)uS@oWNl=bvyghq8nU8oVJN1U#5d>`)HYB=jFVz*x6U#(VDmR-{S#9#EdsU@8 zT#$cPk{5uB*>+R{bdPT8s!Gdn+17C-#FEpsWZtg{X;h|C)+)XCk~dnSTb^EtZPE=_ zmmd2usecI=1T^Nq-L1%`Ty^dBM7)fAl33l5>e|DpcCVJ)@JH#fdR3mODA1jil(*60 z_B<)c74Uxhs!2;q6)|XZ2^-n%I3z|F8AHYts&;seQ5H@+law!J5-r-?h*RxU)#c?= z*3XgW7Nfx`Yf|Qy13{OamECY5(JaFBHJF1rD1N1i#IAUtzLdALp4994Hm-AHF$ z7k!u%FI4PGRvnW&Y+Wa6%4S$)S6Ukx zwoJ|+;KzvYZbPaO^YdOlP}qDrv7R$1{j|;O2cd?dj%l{_Mk3F4^&UE+YU_QTbDhNo?9d+>q%tV`^D?_5*-KcxFB_ z{nd&20pk9gNF(G|MQl^zyJ52}ra@VBTonNuzGA6BoGxGc4csLoI^oFWU)tCIZ9k37 zqpS!$p$IrwW6ImhWhFn?Kl~2A8qom(B}1|)2fzCryc#<%ginL`NE%6P$PTQ2dp(3` zb1E%->973*>rN61$DZ3MWelD5is)l;ufB;hi&@a48D7O$OKn{^SEO!wp}%DhhudDo ziAjJX#e}Q(?S<2B*E@F)KJ`n{6)J+Ok_wp$-8>F5_Mis0uwh?SA=YS%aO-pZ^@}4q zAagA2yQ%xYuEFYasMiv|dd~4ajk{D#hB7vo0B&2zV{m-6!D z=iIwZ_*UuLX5p$=A4U%NwvR6gS!0qztD2qI6cV$8ik3)g3+rKy>6{6SQ zGDIcZIcU6qMoPd4lWSy?YoA(J0*3GxX6@6-$@hr?rN0-))xqO^5CclNpYGCTTVCmC z7LfKi?8-m=85JGT9nbsRK5+j9kJ;s3mBSA4a;jAbHl~UWyH(dVTFoiZ4ZBHL`cr@N z`nRa4O-~)TY3=8>4gT&=qWjFh%AnicIn2!ND$1%}FVM_r6W($_$%uh=`xi%~g6zpJ zTr#-x5Afvfe*3C&ntI>F@W-QJj8cf>?K=l=4RI7?-5_{(cMhDu?Oj!%9R#zlmh`wa zOu%TW@k%>mH>8AX{s;I6Zxvtvz%BgXrCaYqTG|Dx{qr~ItPMwvt(cp<6M!>d9}se@ z03SG6EIikL(K&c&6-m^)6RRR1E8B!-lkZaP)8JwQcY>PRlH77S5ba z&l{(2nEaN^GXA@3TcY@Jb<++D(H^iz6!Gn0@`e zo4#FJ8r;2UfZ<_ZJp?P{7KL|n@fZ~}IsE#dqv(=CJg>O~Rz_3+X8!EHAul?v8-Oj~ zTonOHi7VV_X{0-B7T1n7jX6+}b5cC#hQX$VlXc*RJhGpVcs{;CG~-$oVPnapN}CcD zhVkW-{s2v>n}Iwrvvtd0!{UhUhGWl*7YAS4HE3w!GNe^98N|_Q6WvTmKBn_@Z(W2;31X|4W8OH0K|qe zUx}p=w5mC6uzztxEd1f$wMt?A_mZ=N{%LsTM)jI?pPpa0_T#h7>7~hQ)~LsSE3O)Q zcfZ$v1n7!VFmXz0Q#l!RzHN1xBEV4)4$n?(5*|8Zuz7JrCCGknqy~?o>TP6;K;{zdu77ge*B@BU_4{s5?(rMFu$GGBV`Ne0TDg229Vf< zm{nvZq$y#;zQMk&r`8J8OR+=3+v2yo{=cG=m-i1gZbRM#@&%A_;>&j(xkAwr`8J3-BYs)N6-I1o4#)Z)Vfr!OH(EOaZm+j!UuJ z;A&|fIGByuc$sP{{0V)Rs_R_Be_wNO|N6H`-M@67BV6@M#TFs{-h;0T&$1VuExiBQ zgS!qcnAU8>8hOH>Ym|40tJ!5k^A6y!8NpvV@C;bbYM{sQo?^P47w zo8EKqRbsq<&B5KfRCinqOS+*Ys;&xTsW@jwK&#CgNeIWTJ-FpGxJw!J371bNmlCdi z+Im2E`GMA?@bvrNu>7|V9NfLc-65{q7w@pS}gE^dJ9 zJbo3^Ksw^;tmd?ZvGG*G>qE+gL0Vh?)rw7GL?>K-W_CZpM%iZ@;LPM+715+gRczUj zC@WHxXH+-_jOv8v9^bkTB+WYphtyd8)>o)PBFfs^uB5zR$;)fP9>rj*@YRdZiV>A? zbtY^w$g1cLUK z2qtvyazR<46!~!5D{XckrLbq7tU|a4@XH>v{}z|El(>PveHAOUbha8<)}-2ZUIE$-9bgfkpTbQ(00U$b#^0D={ zxl3`mqEt_-0qq^t0kQb^hX$WBh;QDtYB_F0)mC>aY{63XS+fPXxsoEg^KKJtjOs+d zt+U7_?BAKht=-*aXfwk{9d4aF<7Jp6`SHtU{CHFcfP@7J?c8e_fFnT!UM3%EHqMZ5 zvu>M3V>D<2p@f>4>F6+uM|8sDu3ZxL;8QyB{qw6l>=4uts_V-Zs7S11r|Kmt8~}vj zmvN##d^zll=T+z1)_h@i>IawwA;a6u#AmWqS0Rh1onmkW8*u7h|YDZ-a!{bRW%f{3AjH-Lx z*fQCq)bTglQP~llP*ni*>E3G)TlB@1rAvipg}b&3FR#e@!qD^-KR9PYvmj^Ow2s$T zJ-jnkb;bk@j}38DEFAmr`b!62<;6iJtXYuHUp0I8^pB>-CzNApnINV}EMt(_R|BXg z0kE!C1Njb>Y;)$YrtD+LfCiZ$Y zgD0DXPfOQs_53wPxY<3}w{WslIDF>?u=e>c>=M>_PV7b6JJ`KsUG>3Qe%OoUoSyd9 zJ-HGaSMkZ7aO?u4LA~2M*t~GEMxcWC0%2~YvP1YU?|@+X3_EYakNR0xy~i!Kveg2J zV(e{oPsbFUtZM2<97s4%;z0aj2==&DH|*(#_7ch(+ogToWZV%~ z*Obi|8RD%gF=|G1I9dI12p+XvIQ=^9#lre`3|`)aSL;Gk3C>cy(n8_I)9Fc}ZS~1W3XXLf6vO)j$$@-@B`N??!>%tM`4W9o|RHs7*${PVkRzID^Gc=QlDxk|XX=;Ufn zR~;?__t+V24fusaG2x|zxNBihETPRi#dK1%NC#gD=obB)CmKNwnZmOcBc*a0-5TM$ zDQPP{AV#N1OIkW%IJGgI3ClQn#+x$eO^jMN!og1l#S)00MLa(v!g1YyR078B_CG&c z#gi!<*M+TKdneH{lL8%u?ld44u-0=jZP2|@aa4hj^A|4N!%%n zUHl2l$`RW1lp}GE3qh7EiTv-+uPu2^>`|#%g#oAjHFIjd&b|ye301}OKA^^;S zY!1?-6T*@ALO1$xRons&R?_AA~e?%M;E~tyM%W&Y5l4BvQ9}>K!$HC#l z$94p^DQ*#(b#ZRf$x4VforOWN;l&>iCk16woZJFA#(=&OheYoP=k8;f*uZWiFWK3( z>10~*&;?h0P$9hS7IAW?^LX|nWJ*I;uY|z>=RX!wo&kRZkX8h9Tim^LQl;?7BRfva z72W9oV{zz>8zDUx>fj_IK>%ohe0uoXl0aRA3p!AzlWE06Qxw!`> zi{h&foRStVe&)SCI5Krb?@w&fh&Xeeqe&@ZgCs?l%6jvAe%l9^M*YzTJ?_5VEyk_K|A%l6VO`p{|IaAwe zf+?gwkDYcc%wy|S!V7uWS@aD`dae^qifsv~ z9crRF7LT{^nm$$am>Z!?1#rT|O@i|pSXc&B2xarCYwlSQKX(mm>Q_`pW6(<4{@lrx z%Dz@Aq)kU+A(fIAu-jpz-*N-2cI!353sb+}CCxl=wn=a)vjbDobcS*?tuY^(9=tb- zo8GDdKhl2Trq<38v3H|*mtt80{^{tl0M`L-emFv9474M6KA7-}a~iibmKz_N!? zFAWbP;3WVsjUg?;@MHiF3NqbuN+J6J@YI}KD?~pGr^K6Fvw-%0+AZRQaPUJgbx2_R z;h<51s{$Ygs1Sfyfrp|kT>c?(*Ydy6ig!>~ybn!4I|IiCd_)3z0N59RfN4SIKHx4G zRgnGMkt}TyayN^!n@?Uud}8L=5A^G_akCQuE=(}_K;Ak4^aI2ZfCqpBs{DkwWqs;8 zAmW^)sPMv3?AUa)@iuW08Y%~`CIJlO00Bs=f_Vf`nw%uENDwC`!=JRM@WS@(C0~7Y#fv`$u9dy-*(LOD7xn+b znYHi{@sn@uKK+H~>5st4X|U7DPOL9}OmxUQr2K|q?bLfG9vu7C%w>xF=%zWPbUgI+ z{R?j*Ri`CC25xb~A#w89}e~3|AI6{xsRrgPju0c zTC1Z-DwV-n`IJ3{8sWN!VEhfJgd=-vXTdr4g)QRmACiv4uA>DQ#^{t643ps|sf$70 zX+%|GDdDR>hGBgB5ov$8UL~-be1Op0de3I@??+&&g9EFC=#8dbZ9C*^68SPg;U-6^ zoL8ahoFamq0UZP|r(w!`>X$2GT@(RU+Ukw8S}|4A!co?0N|``EeW?c%<$4ut@b`e5 zp?cR=(Xc8VGufjOE;*VlZ51b%#C(=go-z76l}r+ux&J{hvtB1G{Q1Ls`mU0tFF~sU z5N8goAoqSvT}b-znzfR!WmU;A5RUcxmiB&lj{%)TI3@vI0|VN}?uP^XisNVzz7Dbz z(8ZfE-qXNUKxM45pjN&7F|abIIrP|6-{Y}GeB?1`)l-0w^_;19&jjEuH8u9a=5+y3z<_b zM;&vSF}n@ut@{1&ly8EG0i8r|C5L%ezX^6$8po}qbQGt>DQ6lmcyLW5MJ_5aY zP$wMT_~`@U(MKd7g&U$*BZM_qN@j}6lDUS()9B4&OurqLge#tdt>$`_fQer{ApYbz)c?!y0;vCo0vuDpA)V0b zGiMV7gTB=2cc2~vDq-=@qq`pXu6T*m^DD<&K&4F8fm@EKR}C&@((IPU^Gn}?78ukC ziko2w-Lwm6A5Gtud_JC|B`}1t2pFB)X~$KNMrE{QAg7H+O>+JBq;I-jC%k%(f46Y{ zvkz<+|M)#vQRNBf!VOc=;rWqYNEDiLD`Q`nQAu6r4Cp${Q3;!rd@b@9x;141O9g|W86AFqZAXoO98J6(@BqP2D|kGk;9&pR6=EG$1dS>Kx-w& zpOLP>{70_@GkpK5)K5n+iVWCb{j3&jE>~V!VRp|Ch=n^e3K?Dg#V4c#BYRZBN=GwC zOGBz?B16~!#w!}Z+j3vr`xI1VKqn~nS!9le_dg|#`PT9Gc}uL5)F4a3T|WVj>wpe! z2A}Kml&y%9Kb2l6c2q(yM^~U)Un~&AEX7E<#?{ooZ!c)(db<|}#ljswx!NK=FxRue z=Zzk{0=^6SJyQ#5XwF}@1`4rwrxX+DpF?{LNYUB(!JmsZ#ij|x!9Mxw#Pw5`kNk4% ze#ODzQ>1>gM5Uk+!(yufDW-#!l+iT_%N>1uD9?xGfD!ww+>tEn^ z;nmOueyy3x)^UHmq=s-NYb?qM-WlkAgJKC%*dhLCre`@e`Q$c?y{O2IE==4%b?xv$ zNJtDyoyZ51<(h;bjpiOaR}C;k!)p&|wOKXhND80Y*4qW_OzXtLtEpv_BDcIEwUl#h z1}vb3l?_-d453Tf&2^i~USn0lJ2t{A4v4|A=#&%QZ9oxDg0wI{C>T#Pdt0G{e9cT z`m)pm9cvOGIl2pJHq;e04ms_Gj>Fm>48JM*` zo_l}hG-fCOSWz{dp^`&Qv@5_0bQX-K%l7pa7Y230k>5WDpxcdmAtiKQPdZVuYqL-p zG#u2;fjC>?x@vbet`h zO5aSvd`90)+i`~rSW=gwq;M9E54dZj%D!(e43GgG+^N9q+FxXUw^wR6&)Oo`L4!Y< z@hOu8UZ-`b3Khu*`*wEE4~PZDj>w*y&s|*+Eob+DB1Z4bYXQ5a=xefeJ!kM`(bFF~ zr?;>$s1qP4=%BcAt~7l));3FT&_C!_&33j;SopB5UhV{OZ$dbH0lY!yB6x!Vop9B| zf8H-VeNj*LIe$eQ5&p5i2cF%vrQ`PMY{FP3u@vk&G!0ub3p}rqz1w!e=Nr^P_ToSH z3xC_$lW$WbgFDUugZ8yeU=TU&>)wpXAbBzUxtc3%f^5jX!NM7m!2zAHbNT)~H&6d; zi}3w3da~bMGWyDyVAQp?5saeCA4sBMtc0tcipR`3OI-)lM`!gm3j24#>M@`bc3OG) z@~4j(|FK;sR`=1}{py}_yt-Zo0~Fp_YqJ*7diA~7u;@=@BarfN9?B8c!P&_dE?b#!CAu4e0Ju;Ggr=}W?VCrA~3UK=TN?ex=u1QO(eIDmKl+i; zYleO^S{MzC9vIy{Iydqc$YK1ZapZGDpBNEFx+Cck_lSDrZ9|5U@!?m7e?0uv;k$+p z5A(y(VXNY?VQhHo&=Zi?c?|dr!F!#n0sd@_T`9m#`bLD}MQPpEQeTLJbWc%@2!^!^04$p&jCdUPqo`(zW^`7(nhr+@U9FssbN<`= z@u!qJT+5L`GhWcutZJo?^WWGHx1}KU)lf}$Gc;A?tvsXhJ&Vel+Ce*3xjUEU@ zPX(EMq$nZHZ_pbB^q!jgA`jwkf$dW^0luj^olPWv$8Nu!BhMj_0$ODi+|0oYSt&Q9HgS z%R_*FsRitMWg?NO+p-s$k-Y2nBzV$ja=MavcaqiThEbd~<#whMn93B1V=0xT3i;mW z$%ZUt2NBKt9SICz={Z_+#W8t`CmC}SGUh6UdK1Is7j~uE8It$%K_*A!3zqo!`%!sU zG#A1#ysOjsYHn8rC#K&c_n`Fwy!-dc}J_jdUQT&qO*HC}zO648{R z>0Q-ha=eA*TBSmWv*0c)d#YEKr$`P9M1mEsznLdVd>2Yvq8t${L=-Sv3hpWOA4>^9xTG*Q-YNr3#34f*T@06p2XO@D^*;JM9Tk>yM=ji-w_Qf;8CMr}g( zC~7zdrL~xGJrjjIIGaARjIwwrdm~xFo6SzS)o?)KXG-HjX6%$og|!=&WG%yHJY6oU zK>4kdU4@szRVy84HB>p4JPjojP_~B2fdw^5FN>=?l#{mCksVtZ=LuV`K$ki?y|Sd< z(UIjkV+vE&D#5h9#fNjbQ^#bvsttK+RbZep>ueb(w}+7AT|H&3#Z?3i6ebMg%cZo5 zQ$LD+V69X%SjSDpLoqegv8pvFSCF!%Qb{7CR!15+zgrc{oc-@|`9Q;j>z$>V&1I}M zikz*7+Q;fQk+jc~@6;dWWeB^TzsLCrR~pIAD2DO+CK2$!j>K1{6q0hzJXDy*F>C^3#VXH_}H5oE@~s`I3S z;@z35%f_f6mq~stivzOE)Oi=91T1;Ikv{D)`3JTD#M~t;;btdL%W9)@AC%=fw-=8` z(q>j&0?fL+;d}CPwf01yRxH#Fw#RizQ09 z%i?gW8Cs3~KUwb2*)Uz+Tc_&gY&RAmw&-MqhKk@8M+kS6tTt;IpSlOh4OP1nuLTKZ zL*s8-s;N^@aw=u0XgYXQt7h32AfW{|T#G({Ayr8L^MToDoIrM*njmhGEho|k=2PyDGZ>`Bcppr$%t))s?2Y?wy(gt}Y1kj`c;SYzc z9oEA(J@mxQsJy;oPy$@77c2V=<#3I<{_#mpMzGU{6yG}#3 z?RSRT1huaxmrq-9oN8Gait)8<*7TM)9i4L3l=W=V}Wcjy-A+Kw2Y~N*8-7Tu$o zi*j+jv505Fm0;G9N!uEko&8BwPiZyE6rR)?Yq+IT=8ftRlzL2QsgRAX6Ty}nC*2gc z`6xm$rL>rrNQY~#luB>Z7Kn4@B}Y@N`Eai?rgLWe=@6^A@XzS6nw&L?Q}%L$NjvWOe`w!XvD8c!^Cy1cm4d{<{7GyzuA_NpSK zY;^k<&<|)=zKPk@2ErGLM)N6+fpBC=CV` zeoht@SC`2oZYle*H0fql#o`{Ps# zgXz+~I3G-t>r; zQ*EPz3c;I)t#v;q&@Ra%x?YOBnX4{vhVHo9w{|Kx8LsR*Z7g0T6T`H;CPiq8bQ@w< z6Bzg_2gJgw=R5-UB!@EF#AmSHNI$acW}>(A)cD$VFolA$?3Dq)VL^QWObv*Iit%o{ z_`m^h>qC0mS|4Ey)dVZp0qEA|FD9$1wu??9cLz&=yTh_x2VwQE^)m&9FA^tuJDw%M zh2mb50Mt+zq}8GHL~&n9PkD+;jl~F&xsnTIx2m^sVNeHm7I&U4D6K&E_FmPARzF99 zRma*^u!P?IoDnk+*B7h6b>=6C+^;%L!5M{aS(0^iVwG^ODymctP*f?Ep*) zeFQ~Z0)lEMg6rrKPgP6iG%q>6cF(Ps3WvE1Hw%wnHL`#rOvf)gvA%mR>K!A~ym-Uh zwi#lqr?`0P(&0@L*N?m``N7YUF5%WBbS>mEZSt;oA!N|RYn4X28jK2$n0k9=*9nCq zPkc?jfuPNjAJe^drqsxN=PjGjxH<%5rVCk9nokwtl7S^*pB|ibgF3hkxn#e1gI@As zJJ)tY9ngJBp&hcBn-N1c*R+{z0a7xtQMjzw+c>vgB|LHDI*FA2?ycg(MX4rNyVrI~ zt=F%LrlY0mO|Q9PcRAISX8%=|gnKQ$#kut=;f0I9AKoWFoVKDH5D8oky%6Kg1~J^9 zv(QcemQdE=I$EktSPOk|P$wMv%sCK2F#g$X;+M3NpOsycaL`c8R-9EPNtkLzQf~w3 zmw4aM(rJW}RB2AUo*5`79RB3TBp)GM&s=VlDi>dq@Y&?C+sDT}0UlS#+rYt%U~}IT zOChCB@sGA1&`+Df?j(;_UHT@tui~UJDR>>yCBuMNxZ{Fn}zF`-opHVPB^?haV$6O9iHCXA%2Jhng^>y0t1{ZR*8BC zqK!NPb}v}?m8Z9`bkY*S6F2;3k8s*Ed$;_bnPngUY;Ww$t4l{NgD|Aaww||VBk;9I z5kDQ^GlEnrAQ0)~fU7916n^%h-j>tVCyvsS78PFkhGAKJ9uZAMdcb}W=uJXu9ME%_ zfrJZ4oPdT5h<1RcF6eB_R+T4EIh?epc-4dd3o%Yt-q{-$&JXpbmm##NBN+e&6I`N( z0bU^BZF321sJDC5$&}(7)$c-h>h?%)aSM=J0SOTB@)&@n%IpW4zyMImS=)j!(%ZH9 z=N9Jyw|Mf^ob^^b5zB+%&_~h8DW6zE~ zGIsaa;W2(JI%XRqM)r)Yj2s*r8U6j}k47IF{nY3UqxI2uj2cJJ8(kXt=g7-*J7@ng z`~2*;X78K5b@tF~W|p1R%9QoMHtKFHO%zSO;o|zBLTrrcFam8JKiZJPYY8;%^hrPkd|Q$i!_E@1Dp{_$KyG?3$Pz|I7H#$GmX6UA&&QNT~rZ5i?Ln}igia#ixRy?e@Q}KR9 zOL5u!d2sU{z-V+8{cP0InDdhvAwsQqvcJXOjwksJ}PjQ~C~v+jJ$B zRY&DwK`bb3L5K8w!%*RHK$mKnV?Y6rAOmPW%*QOL1TZ>=x?0weabp%Ta0~iD(-Tn= zAzzelwE!0<1m}As&s2&O(QEK2l#r(uOgd_Llag4#G5f1Kwd?@>5X%k z#UIGJ>ngUYr~UWz_l`Vgcg3h=L6dLW0nItr)n0()>5MUs*^QP^Mw_6_%<@amDnSt|xKb1Rx&M$o0T?gE%s*cBl9*41z)qhtmZ?%e2T3U0bZQ`;%oyw+y} z?zLvH(jqfDwGAD2_*9qoX-Oi0IsMM2qo9q?{{q=bm5dr9ZLOJOcs9%ivhyZcp2{W2 zsxFp-`2Ln%NA38gERR!dyrE5T5iUW*JQRtXv3x3`*JG{ZN zU5Dyca7r6@tFhA#qKc;cNrTBAv&34Bc)F6=_q1$Z4eS+;vR-8~SXxFeZ9*prK2g#X zID@5_G$o33n_})pRubMu2E)_-MyKS8hG6#5*W zD;r1$fiEJD5Z`PCbXd9Mujg&qdMll$zK`rQi;f1_41oKpR4(Nb(K&R4;hR}N3(>TB z60nC%@iMvVtH^wlW84AS8uN6G&NAlDOd}Tt-(+-EKbzU@v2P7fy6hWK>Fc! zhv{mpUh_MWGp8dvb=G9TVIlEq+`c+r8b#g*zHVUc7~Qh9RhT&+FmuCpRL#0hlO|1= z1CQ5(5x0s`wb3b^uNCUiFrDgyI)3LBAk5d(#wKvt1XUoNPr6}R%3XY18gyUKimj_Xe;JR=~uej0? zDnOPf%~{tk4WF;j^VPN{QuPysNW}`#Bh)@*z1nD%FtgFw)P{_Nol*X$EOvRRCQV12 zxLIwbb1O6Gp;bM&L;Y>O!TLfffc&$3LY5P4GnRr2pH?UqZFhZ1rhpWcYA1=sQyspd zR;Cgq?9_2&zYMfFs=7kB>qXWd zjMu`-?80lve7T&0OR#1jh@0Ypj3>AE+mgJi=gTEegABN6y*cbs8VJ=X2!e_)=c%@~ zW%c_l6*}RHj>#jj44FYBP^?w8IN|U&Y3s4)g1?EdV45nxj=PMy>{fKm#Fv40&rtRO z;#4Yvl~PXRwdKqHh8g23U0V$vW97V>6$FXTmt7@R)8d+GJ!~2)S*t>>zAmZ-t^ze5 z@)T1wpK8O4sCCMkk_njIlTK|i67yt% z+V&?C`k0oIi<|Rd4A!fx1CYd<6up4%V)&BDnNh?-wF^*ocnGjE z>wc$$Ya}*RkfCB7Sn1k15^~`+p)AcY9Kp#T2L- zOgTDUB4_61;xz3lQVo5EspNRL<2w(D3vJdM3g_d&bk|sm=dw$OkeNay?I22U!IgFw zbY*XDAM$APg%aPw93{IK3+K{xXJ()LT7@*Yo19rYlMiM{Z7ezdfNVd_IO?u;x@|8d z>~zK?&n`fXY#{4ehY}oY<{G2gbS^@C;`1F3T%(2pzGU84S8DbaQFZcen~`v6)Mm=S z_&nk4=&~%w7;y4weDNCGaGMOd-LgEVZME@~yOs=>+%ZRn+au4`*`(Kpd(su9hsi&Cm`S;OUc7G1Pa%9jKFe4f7@O5w)yb40;?n3p-FJWSS$CnPuE#8Z zQR!)>wNt1%S+~7}g}o_8mDIP}uKdaqvfS!{dzG*`-7WwCO--l5Dq3Bjbrj) z;j(N8(?|y8rF7=B-{6>)CwTZ~Ct zE@?7wmJnq_Ex@G4f~ji4=d0RN`6+p;5p85Vc(JMn$}1IXrZo%lMk$*18p%Sr9Rh$o zH5SO*u0(AbP4U^VKNhcLYkpQ4-+sAlK0v{&nQT$@e8pJqlA0BHBOG;w-B_*Uv0|lG zG3~`o=q`zGs`M!`tPi@vt~3dhTxk%fK7(9_0VoQX_br$|rq z=Jt)w4`1{qXov9jQ?>g<<@3YK{m45BRSP*gXlKoYh{wvwu#L&^1kdl?tO{pcyob>`-}B7?jf9(zMYN2rSAmq%b*T|$zJTo0&W%V zdE#c1aNnO&ki*^WJq|DkYi~lE6^mX|80U&Cm$o^bmK-5fZKLq9Xz!Hy0Ud zMFMU^QKN}yCFdpBilu0)2Mj>tD^+IK{D4?s?;hKA^OpeQ{}V~68qPHdVhvd!^DP4o zP>NMtnGTlla^J#|@H-A#dO#-}as2io(Ud^}muGXMCFfcLI5WA%bO-`6NP^L-fT*tM!_~s!_e!CU zH%Ps7y-s-K)g=jj@59@~XK#?~Fl*TH1~k=JhQz$CmL}8;`Lh7w^+a3psSSvQozMOp zdZhK~Euxu+mtK)T(aAi&$=%*73;&!Da!#3_EX0X=&gdEEQTGi;zmVWnEK(kR+Fd6Z>pFgn(& zgcoMc0$=;~5047U@O{hT_i9j?mGh5R1sE<%IfAt4Q-(UJvLpdbLmIEwUjbixP$w(~ zpWQG1?h5b)%Pb<)hOzrcUK~DU;<~BJ=C&%R83|hFZ3@A5s5iT)H&b~Fq4(F*<_;V5 z08AHm2rgj;#KO)q2suCgxkEj>H2eTIOdftoEtS*}RRE~>;;n4Q1;MG%g-)YYfTvHL z5OhCKPKc^L0xx~T%iz_$7UGs6hMR__L!F`6$mXL(iq>X3yp3_I`X=87USg6y(d7DK zg5sYJ86T3kuIE%N;{H~f!|L{WrEN1dEOAOQvwMC(EL1Y!`+noLBP-(A^(ZL$0(dzT zlSUJl)o$ z1nQ%`-Qdw46d$<(?y7npg&cq#SI5^b0t3ihZgnTxVVpEN9d){`%;o^b??&m;ZM|4H z{M;8@;)6H#9Ewx6Y?#|RgDbX7MTY)5@y?MSjotMbn2^BiC2N4pBqR3>IK7cWd`X}W z!g%k@ZCg-6Do43XX;NsK~7LFW&&b{%2a3?jO64+!FQiYOt ztcZ;dLfv2nGQyjoDLh*0=yO;#XDEivUdocpNPg(u3xi_ei3f`ZMCQZNtl?RcfT7Tb zZbL{{1Ea0Zpv%ph@C+$D`5^p!P%J3!e*9w5`X%Y-p|w7AQU4B*Zn~9KA{Mi&JeGDk z*U3t6u_Qctvow#c*9nU2+i+!b{qR=t3<2I^#kZ!LIPc#TeLDj&7}CAM@(v9}pGXt) zmNK0W9uU$Qew%Rq*LI&F9=Nr)Rk08-acl`U#hmd}9Zo%IA$?nK&s(LB{Ot;-_`BPr zYY|^D-K-ILZ^>6=Y8q!XDY$Qk78n$xYmpz`-ZRNd)&}#2*?VSA*5H@{sNf7b0M_0M1ae zAMRoToExq)B#XN?olFaGJqu^and0xf6Yd+}J_53_O__*ULSulm^C0+~d>kiz_hsSX zJ9~4RPhLd8zTd%wk6$yjRoMHP-oL`{yXG^!Pc9C0oMWBJb=SY>RN_s&dj$aRyQddk z&N_)OB-6un4=^_-a$x|EfZS{zb<5A)(_36RX$e6we8-LdA`Sb9M5-=bE(vq@_GY&9 zY1*?u4i4PqKn>q=Lau(eW5lFByCj(Jg=>g=1 z7z~Xih*??}o`fFr>}O$zHlTs@@B1E92w(hM&jXN6Q}@pq$LAHoaBk+h(ft!I9)oOR z*51Sg)70w0DyAYhudalrL)NU|zrVL#zut3A~Za+S~+uHTI&up!j zm?F?8R0!c+U+C?cTQ3!!IJ^w2=;1${D*p8gXd~u?`A6P529&`lu5p*@{si6Z7;x!J z?Oxyp!~*v1d6)vPeRhj@=I5o=fmwSKn#^9$0a;G8RWWf+Wy7ArQ5zi)p}!31gu`DK z06#NNk zAeBAbJA1KKFJKxnSZo=ox+Ygqr-k^#U}{h-R&Gt26v8jQ(%Z9`>~pcr?H!#_B!@K< z_s<9l_J1}@2R|CtLT1ei^+XF%#a2nih+rV@DrZbwr_^sf$g6o27PJ8!AWmHcYyIm# z7!d$eZHxHvN2PAzUh{!5v~5r~251kYPq9(RejSVr=wK82YiPWu9^EQ_=j+lL%X7R+ zG+%F+NP`|w(p3&yxdk9fl9k18f|UWC5Zy%suEArF+4fDTGVGcg%%D%0Q+gW)yzMFa zl{GBsk7WA&Lb&03Fa`&70{hgN5O?!uu=79PgMPZ*z2-muQYzT~@)$>GG?a&kYn8%% zM<8ugcm(!TZ&4k2eMCmk``aT@e|N4iU90eEcrPL~Zy&3zA0QDh5v2kVYvmFNkCret^2ov;e+*R_)CtiU1?0%RcF&UNd{!DV z%o=;Vg}siJ&rgu~xGkpAI7mnh?ziwu--09cfKG^x>g6M~>D%y1^1<)Q4T>x0&YOu% zeQ4s*u|JKTKFmrG70G_*3Lbw>yPW63SV2SBeQ}oq*mH!*XQ1Z}iiK$M`TgP*&%h$R zO@aVJkveL)k|Ml1vnEq_RDkGN=spKC_2qwn>0v-6C~keGzm?q#9Dn_!Lf4vv0*35( zG=Y4U2nMTK$_I=D$`ms6^`Ago$$Fh|)uUt34g8O87tj1@@1PXqBB6ny*q)Xx8V_I$ zQKQ;L(or!B?|iPeXMR8`y!w+T<=y#f&%x1Sv1SQp9Jqn3hC(=%saMm2`{%HO9S{rA zr&KVq0A5f0+Ru9jU@o$)MW7*2J{>>cvlc$^1eh3*3U@qt)qY|0hjOZ0fA%={NeF&2 zuZ7_qBt$2x-X2P|^Mt*S#ME%xmti;|`DE|R`2n$T=szEj#`zbw3C}#)`+FZ=tZ(n{ zKkCPQg}@$)`zn%Qor$P{Yp|WtyLBnGKs*KCcTfyL0h&HGh^5vo5Dwd^f*&9-XPzqWCO;+u4+sCkp2!!$$iXmklK$cgRgiGgE7w6Wi zgu{a-*sIai-Q%mBP=T`O5H{EMVs5_dgNZW5`9y=A71>GXaK1C@D<72%ly^iuRz_zu5CD7QDdd zOR|1@GNm=-Oln+s<(JTl2BcD6wM{I))C(#W+s!6b#k7vHgO4W4`XDL%_*c>p8W0P2 z++%f!k(YZu#X=(+@DlZCuF%Ptb=D>fZrFJWPyf0H$W`l9!X3l~@&V;78=hi=$F9M-N#0NIt} z(M;Z~wWKA~)n>IysGasiTDb3jd%G6&19IWerLXJ}AHVp+fU|bd|H8gJQZVJ6okZT% z@wdYr*iplF*l95G{hx0>xmHlr#9iXTYp^}o;wnVo_i4as;vmL`%SQ@eBg^H5OaCJ6 z>!}lX8%|ynU=e4IK^yHj3UNvM|I(XU?j&+fU%2BoBnncX6V$8)|F1)vv3TBYSZgr1aRs&R|l}34CxkJRkolG(g6rN zKAxnV^~s6|uikv=x(1p3CkoUeBS98mql{!2w*izCgn;1^6rMahM|a}N6UHY*YrUns z@I>~>W9Of>H+s{ja2tjXjQzKQgT(ObCmxu?MmHYwQ+n1i(sb5eUsb$65yabArtK+c zN|2(_pI>%rRG3nIV#MEIIpGNAJt%4?S7DiD*V14Q?Laa{o>${Uw&82qLT0BWf#$30 zW>y#H2Xq4aSMaa)LmGcQ19rCC*CY%el%tQ8w22tOWTUOR%5U?>rKVUqO+y2Z$%z}> zfnoyo;<)UxeR#*JuD>)(C`V{24e4D#a>p=*fY;Y-cnX|Ux83stV&Tv~zYoJyLi^u5 z4O8e!{>_(DV_pt#Dj-tkG%%OQGM+k3)M7=wJ=I z1suhKL*X^SZl&lWKe}XoyroVlPH-|d^~OKzvMzqw<;kbxYrtB39V8}pA!xsZM#{+cq~}e-v9O+h5uLtOM^N%OZ*-PJQk(z z#H`i92Kv+k!8XEG3RpDr8&?6QXMGqB#P>cg10H;DBUpjh<`Q&5dHYJ4iLjNmM0Io{ zq6W5|{&>7`J2aeXovKf^gAP`|+rBEnd#%CjeXQHTHMkXP#PC!x%&Tyw{|Pq=FKvO^ zgx2eX%4?VI?qimjwnAlKCtN+=EG%5l)kv+kZE;uKEU*!w+MKcs%`&Ki8-+jZ7pu$C z3pv*$kn@e?^s&xA2TG}Cp5^7 z0P~t9LPf$E18Pu*KaK3HZiA`}>Y$t5c|hE@0#%Xs(Gu0s=-kXDV=n-8_7@fDxqZ^a zl|ovX8pTHH~o6Ny?r$eM@*u!aiP?Ofe8KOh!fxNW+RuCzs5+bOjayC$Itq3XGV zc&3dRIDp@*N6i)B8R>tw8}>r=26X_H2YdaiuDNQP_=mkgqu4dyColP z1e8oPoDrDe)lEY0oYjqU>ovk74?VP7eB+!|iJE#%0!KnUx!x-1E11WfbsK53#>=a3 z-m|)EVNfc(I(5?lv9?Eg4QA~M_%(Vu?7CAy!l-Sx84Xu8b`ruRXTWqdAQm3^{qSz# zl@}h~F8=Tg7)wwA39brNfQ|z37#=kk>hZSE7tJMveY?QKfEWhRKA7>Ot@y`xLGSGY zO(6sBmdTW;|QNbjJy32-tZrJe8xs{fL~i81 zvG+^6|X%tVa`q!ZzvIK1e9Sa@Nt4SLO|@7OLj2x*!O zy)NMrA^7EX$)jmwe56<`WPI*SHYc2pfr$aJu;~B5ZsFo29Gh>&R$>2m$?K!Xo$Leq zF|stqk7!I+cMhHXg* zUAnrsFsK8+=kfvZflF8WSXQr(K${~tqjoq)lBZKfGu)pje1BQ}K|O%dll_tPs=y+SUQ6;eb@Qkbcw9M~*S1-!XsPd}Tfi4C!ajFU}pExO?uu=e{%d`MKNX-Zht<^Uhs3 zcgEcG>}#_>o&B%bduKm1d*#qev&mWKEH%4hc5LYTGk=(QdgkGoJ7;d3Y0g|aW12aC zW_f1A^slEMpYBb6eEL1p<>}D$#nWd^FHHS?>cy$=PIbR9^&eC3p2`Dp`oXC^Q}dI5 zoqT@sTa))q-ZFXBBsa-S(nI%8o_3r#{qO`o5uE_%-^A95p`m|_|91R`;}4F1V*I`1 z)$vQl4dZ*qH;uhM_RF#FjeT+K_OWZm3S<7U{bRew=0^WA`t#9mjNUhT>*%4;%qTmm z8QnQLIr6{fjQnKeYa{oJd|;$A5*x9N;3L~chK7GT{N(VLhCexc{cvsgl3~NpM~2TE zUXpyM4TbRWKdy~+Z4@0Ns!hM$oV3@Cb|Q3HKlY+S7t}#4!-uOuvpY}y*ID%fI(`YZ|f+#q#qc!L?c-ooa40)$Mg>eBC7SpkX z${fMyyDp~^a+@2alzO5c+|jX_HF`pg<%>izoaS;%ry;SGPb6$+ACnBF@^yRC%cJU8 z^L23K$DJGyH5#&ziH|b+JJy^jPK2yBCmwV2MG~7qF_axEI6m--uhMLimKsYYyBBh@ zAs;ZxHh~w}5_H=LyZQjiKJ8fT{s^WjJDXuvX{tum%>8nGfaq1vsMtQ%UJUcR6PdAe zS`5y1l>Rh?jhK9?ZE}4qRWd`Qs_lxu=G4+DT7M-f-?il81|kz+k|t9{S#DEj#biU# zJWwp_Y~EBW>J96Oz58W(z^Ei#WZK>&?XFriftzJHTQ3mikfB-CX@hC2<}?(>)Um)t z31QQ?RFurexOhM_I1tw3q>F>g^Pr%~!GuEm^K~TCh$m zOUIc+!r0Jk{x2jqWi&YMC=<1?zZObz>4Tq@OY|_@}tnTVN;IHu# z4V^y3D=j{!TKh&nmaJpsLj?yzD*-Lvsm6N%!Vt~pw4fNkOYcs>liJz2$68MyET)?X)FdZe#F1rF`C#S z7GmmHr{E6N%jb_GI|gqp2wB;Dpknh!W4hQuOqMg2Di(98tx+zo_EY#YidO9ysB#s{ z78zwjUE{RDxZytZRSYVg40jsVK*ZrHWwPEbj_m03Mk84zAz;GV#&l^l^J!V`YnBN= zNAoSb60?SqoAw~Nj>nV)UoaG#-U!gLX5O}0mgn3YQEJDkrECE*>9O+COxq=lhumCR5tQ*>D(uT4WI*^>MBgta0st+&?SDD+hD3>>@AQz2> zIE7F-YtrUM(=bJe3RNzbnVcK1r7!%YEUz<=wq>oVNL+(6Yh=i>MkJ0PKIPF1Mt}bZtM4pFT zM#7cKB&kiZ9FNnOIi>1WOsQ-PqK3x5iWGEBRmC+Hc!)m~RL7z_QE*>}j)_DV;_*^R+zYrswQSD#GMff zF(RTbOlxxPU@X-3;)E?6<_-|3xH_jSVGfTgpRbk^wK_qe2 zy(}Avs%?1MP`3D71;%U1p7mdSHtUYsoul!XvS96YJXwPwtIo>hjnI?RRkjn%2O!5P z%e;6@o^%j^D``#ue><#gr(2MmYMWD-(VVaAQ+ZpMrl+@|N>UYqXnJvvCQPaMqEU$| zNkzSBYf}?xhmE|Q!M9(B;y*i-$En3kS=`Lw`IIY|HJmD2XUk?RNM*8B7LSx;^rpLI zxjB}@G&)~So3#gcV_Nf5S+3E=ad7`}zNFF|cV(H=Wx3L*#e&UBl5yfTqfNs;gygE0 zv6~?hn6r{=7SdW>X2LBi+_e(sk8`F(p{^_g#r)N>TwNtd@MIVR0lh<6PWvvAb?f?+9_oy%_fg0_gz25;3GEWAIb^{$W7n}9;`J`N43rq{O z7=%#S<0Pb`ZGHvGu};@&Bl4c0wrQ)|Oc9m)3$miFb`hjLQ*>(!DPBWtK@r3qtP;-K zTxL@xNdVeVoZKrH4*+~F<4@DH%EEwuz>C8DI~c2J62WMr5_AH+8BVe$)Sk*twG=E` zJvh;gSzG$_Zh1GUY`eXLBglk^gc4xSIQm&+U+GSkF^JF4MY4827RTocvK>pU(2Q8B zRhO}xDQ8Z7ykDH})cj67ZqXZThG@;9$`CnO9xoL!tIv{;Hq=--o<8Gj)c$!-#>?AhJ4``=SY64=ujchAu zas)FoUqtn68*@d6G2XIQx|GFR#%E~Rj#lf(m_W&riG?&(ReS_3*L+*mf+e4lK2^Y| zj&k-7q4KR7W5cX`Cx%BL{iaUapO)oW2x!iyJ0X3RgiN8V9?kK5D}~ocpUc>yN~}j2 z$Jr>~8MPH**&_<$52o!~HC0HWV(6Vt?T&KaK%V^r;TM=J^bcLHfiUhG}iLhxRdFIbhWcuYB7UnWDvr|8t zG%7A1|LiDuq9kt@ME$`H4|q>yD%C3B1uIEwTTK`YhMe6J2P_M4w0u|#o`V4$c;5eb z?3O2|Uw!))w;32vJGw#`BCufKz%32j^5Ee%GVv$nn6U64nQg)=*42L%+-0?`esZ(K4s#Z$XThVIr-Jv5j_{f@meAJ-p2Dx>1YBVHGoDd?X zA1o(E@4W>Ybh~RcyajUj@d$uOLfSh-w)wG0!OuJKK(6m0+C|gUiQ%^=FAN@||C8_O z=9`(-vBlH|MQZMh8E)b$Qy&`LGWJ{G{JiN6iIe`4*T;`Ly#~7Hv99|e_Fr^e@VovlOL*W zTLQEY&S~nGS`qm68Pc%$^?G$imwTk&0||eXpNi1R$mFFUjVKXtEX!y8v?QA82Jld# z=^0#+EF!8&YIt!?`&^@J@ve3i&!4ZKTK*Do#XHyL)n7h%1#}Z{K6uT=M>;}7+zbI^ z`EVyp!?NqiO?#fH&j0>qNJL9g{+$)IGgZMkqctB??X3SnS&6%xt*dgGjI6Nud~JWF^uoe3~!IUz4VJuum5~NEdJE;_c&I zUCanO-apHW9_~wNu8{70E6h#>bsSz=1VFN?XwuB)# zKAKh*fm`o@y2yn|q-E(x*OB>eLaFWPJ5Zig+icShzsWSy2vxrRgX>#{D^$bvQ#DI#->B+<#?>v2WVPzS>!>Q>40_YCe3p|h2d4mhGH&e= zU{@aPXK2kWAg0lSm&`9uD_$Dq?-@OKGo6K~_a>$CV-wL-g3ijU zF-;vmDYav5?{W8X0bg7vbj8OEh-O$U(^L-mDN7?QBi9x0L2(~(8y#cT=~a|Z@jfDF zDifV5e5AW+hRV|DZPxYqLwDo;c-1z`G<652sB|SpGkt!>rLpvk1Qpsp@Su#2&~A zZdR;a<2e_6w8lKHkVQ21i$wPr?)A#aWdBv4#LdNHxVc!ht$UifYf?g9#ydy)`gwlX z6oVrL(-2I$Ha>W8$x7}58-lWz6x%NK(jP3(|3^LuV}L-9nc&bmytQJt6XGr5X;zXjy7UHG;v4Oi-)!Y$h;pIDaPx(nT4g=v~Pyi&prXI=Wf z5I@pw)WywVUns6*;plGMsa}{wB%=>G`0U^^M9;(JR!fgMZ4vmSH#%nM>1~fPA?4F& z_aX;nX~@BFQ6+I{{<1r<&uGC>Ag5=>G$TVjojxJRNXoY#zYE`%rI7iUfpj#^TELnYBmS81sQ1#US@78JT%zdtZ&&KP)CBEkB_`@e`u zZ_7QH!OK$e2L_TJgrfV!-VpJ999wwAn#9I60(~ZXB4{X@J0xu>R~8%=uMxHC^AxQv z{wnUnx0;FLzW3eHe&xP{56>U=sXc;gq+M@x=xtrPNHK#0pFjr7Qu5OD3G6s6_aE$8 z?0_3A2Xw3ujV_0ccE(ZMeHw{;7}MjA?>~6Sr5AgH%)hUnBLlzQ`{Dnet-_U`I(P|u zFqt?T!UsA0?gW0*K|>;A>xJ&J`%?$kF1mOs)n1;}qiQVFUNLmwc6f&>2JsB!+`SI) zba?gI05sTwDacXb&x;s8b8!8o7fT~YqyJLk*q#cT>^r(3U&xq zC`$xFyl5&p{KD1eRM3j*T^+@^L#mF(p89>&$7`Rjx`Iws)PrMSdPDsOcUBd56=fYy z>5{kZe{Yv0s$WBS=$ZZWD%vsqu5q(i=Ak)8EKk#I`GsU?5FpA_QI+eNr>V9G7U^p+ z=9PV|!>94tCva@;VI$#AzZTtYUGs%Ra^Ts8>kzJG8Clu%x{2KM_!l>jEr0sxJaXeR z2fs)j_!6dl_jD_r_KU?bS`nF@G54Ds6MUP=)e|OHJ&atHk;$Re*TANk`P`EH=N`r^ zyh5118ktgJXL4PJ)Hob1M68i9X2i&nm%oHuT}UPOu5T!dH~kXveC6OZ7avJq_{w`n z5;^?W6F1~5ze+FIrRggHudE?jS6e5;=*&?yJLn1Z3ncvr3Q$HRFR6OE@_&DXPTm=J zn^)xe2M5im_Mtx9I1u-vnD5KU%A)h~qX#?BZNyU*s#NXkRX5JLx$!R8#xJbT(~jcC zn&g`PAZk=O0gW5<=@D*FaxxWb7$qsEkYw?-kdRXMdhvnt$Udx=V0RGqa77 z(HqC$jwsFteIxyDua6}!eg`bd$b|XyTB;}FTApt|h(=i^piY$Sim!bj&9exg9Ehlc z6CHN4>j1tlqmlzZUAjgwR6l({**K}eLD@Ksj)cZJHmn{S&*4UHfF)ljpiwWRk^?Wp zn)IHxk1fkDnL-(si?fyB(GD2e5p%xZ9rW76(U3??FQSgi$>eb2$s6-ezev%yS*N*K z_}qmz1LT?~53X;%kca?|QYpC7=boeoK>IW`j8^uK106}@ARBXq+egfiNV+#pX1om3htleMht8J=zwq~^Es_H)?DvG_jrm9fYU$v(4 z*OhlywyRF4zOD+X7FYbJLVnjh1OD1K`H)IgGqqc-+MpuOUb<;DQUCR9&01ck(MS

JlOyK6}NL>}H$+b)3LOS|tc1@pd%Us^vs{ zhiJdiSWL^uB4X90B3xCtB&#vIr{Yl zYc^<^&7wBUagngt3fT%?#;2`1UJAEzygH_4W4dTa7pj_DWV}u-X~NNHRA|)-ktj03 zOZZ9`X;p_=R;}T9AsUvd<`=WPUcFh%Mq=7%VrwWWXuw$qE>ehNgjm%B z(x+5cY|yGVvwS2ZiCRr-G!&6q`G}-z)xm(fRjpHp!XdR732VYtjY@T>H#2ITh)Bm$ zs|Y<_6p`UuCHjdNW+QAgqTwSNrmBGq78YE-R^=Z)3F+Lh`FW6cb#Ul7-2vQ zX<7wcEYyl(v8`HK)(|V=Wvv=OB3b>h(aSe5n$1jDh(>i0R5YtYb!hQfC@RKUL-WV9Mn`0r7g}qz2H5?1;TKSkHAP-WkRn$e`7A>TfbWFIaYW8(4 zuVXn*47H-0aNr(Ox9Y-?NNbemCAAtM6rv(mRX6*(20ofuP8UYUh#==8i_Rj11oRkn zNK|Vz0`gc@t-QWow^`(*uoTgv+B8x0qi|G0b)(1}1OF+wMh{1%Sk*q)NTurXed?D~ zs_J#Is3?i*aHv%iMYHfR23>_wqm>v=tB$CnsD5qbnG%3@b5zan=-<)S2<;)f4&Q_r zMr>t5VNC=@mYAqmbze*3iVYg==CDQ+(n(rmnG1(oc?lgdq`?bd=TNHY*+|mBr}!o6yIID4nt2H z(M9=IR;$HmV}x+4Ho|kQB8E;Vq+?fPoytEEEoFP(dt< z;g8W7QdhoRsz710Mnq$U&oZ6#7*+@jxNR>xs`6G^v1b;-@)`$kp!lU!GO1w7ODyc(U zNMIODMB2&+4%~-fq~SMX$YCO4)vYniUSJ*yfjK6Q7%NF(0TWV03RUitvKVz6@Vbc6 z$iXrVZLUGT4T~7BIx*VHs3UwViV|rBP36D#F|VprYuB-1?9v#FgP5ShRIHYGj3?AP z`hF-Jjfq-aRI2>XxtAr055+>d*05T@2#sKHYSH&F%ZV{){flZf$5#Hc)b!lua2WFi z!^T>fC`LVxwr-VlT(p%F1au-ycC;J5G5b2^&Txbe3#c@VYCekU!P=s0WyPq5m$Wg= z3QXnS-+f&pA=DjuEQ|LsCPbzcy%N(YYDGXfbXrzh`L}&9{frhfgg6soOyXKKVai*B z5=t7ZROmH2k!Ki8qI~6_OD{_-<`7mx=OFZJ_=`n906eB%F)X4VN9wfOS7H4$*2<%+~GYIqIiPpuG&ph7SmuvpYE zMOW@?`AD%Lna$`pe3(bS)@W!igo_zW%b2$`F^rL@T9m@-NagQ~6|#06+DXFH5o-8& z0Abp0g}X|=RS<-T2L4CXq8O?C&Ft#}f*I-PGJg#fazIX`RjfAYcZ4GC~l5oPGG{A^0B}b=M=ik zqW9{w(Qr7Vjbc3vRs2x72~1Sf=Nos=`B3vlcn@l+eXWYPR_b+BsJR4tap&}P*aj-+ zrH*V4exMx*quy)snFBiM{_h`LxSC@`PJ5m+;`Z{_h?G|qEpeCT_kEXcEnU;pFNw0h zPqoEz7G^Lu-me)PPLGFKV){3>mStpebe)aHZd{gs=HJC*oPB!J?AEe8#sJL~>3t4o zp0X4w9=($MQFZsFuye*iWcl^8MRS|X?g0cF>o6MiXvFy1o;YyOEJp)_S=#hf34@+J9y{78|FYQaL; zC*-550VF+ zk1d|Ow(;`DriNpxvkkv(c&_2mhEG=hyWx(8ScAPmtQ>Dx)lgf1Z{^48|5N`;{WJAn zfzorR-dxXCt*T#EUsdjZZ0Z4FRY!Z{Y&kSYoDxruy$8%e{E0g zO|=_pTWU_${Hf-LHQ%cFY|ZwXOpUi@Q_Y&1xirk;mDS&`{zmnuDmPbesa#y0sCHI< zxms6!d39sen^nK5`tPc*Roz#0dsVc`MsTiuUWub9!LRBBuXnZUy4`)eaVXvM&*DA3 z)UNRlFqsZCS~6m=vnju#KoLYVDFxg<|pQL!S}&kqid#0*2m zKJ6%c9=oR%HmtkT#K7}%BpmQ|*(c3mx1wMY91FMEnK3JCPe{&@-toA5ukwKqu(UHq zGiT#QQ5kC9t@xAcICeneX|wD6nxrvZpDboaG7P$h z`whtsJL?;@n)&vIB6(6W_y>&b10h4!uJ=0)sfMc*Hiqt?l}RDQMQ*?n7|*6F_Ltan z+53d>$Vj)&ABhBnjf%fo1Sm51^J$kq=<^4nnlWjCq8lk0)FBOT8P?bs%ecnoiC+F) zg?;<5fYHpiPdfNuoar+}77dmXk})$o%6ATq!SOO<(yd;h;KIqNS&jH^gJXTZj!a^K zqH8C$heDmP_6!2QI1{~6#-*sfO6^w3&LP60$IBaRAyfDgMe$f_@02*kI5HGV3S%Sg zE|#Ax<)JZm>%sC#Z$A?78qnq9*5sJobAi?@hePbui)HHdi{{p4GHKv6)e|OZu^PEj!BexJJ^Q*8YA$aSJKw`zKSG zcvrkL*5SxSheB5=3igt|m&vfBZ9LoV>oIB*`gIDbK9q}6k%zX;9k-ja>}86oj-;0? zA$G(x612o(tS2E>EAGN2eNS&cmvw1P1BN!WaY$J7WQmWz!^RC}+Ij`!_^!$kd1iSV! z$z*i(OzCyO?g&}hvOR3hGGdBu99GJt&2@wr?IaArJN%K3z(_>9O?h8CGGsPqhX#Yr zuqhN^uYI9J&Lk`z(LUkTdU;nSU8!heO4|6in;p`P#|L$44;N0=-&0~Ajts%$rjhIH z_qO$!BDOCnbWLWkn;q}&);k>@k6@V;^np@>B#f}boo;@Nu}VV;Vg4&h*U<#jajr9C z3HG#`+B+wbrP7Ln2=^+Da#>3@J!(Tt$5Pvhy-tL8)OdT6g2!Oc#Mhlr*o!>_de#?j zj}0Npk4qA+`B#xXDTxMn;TEN?R6l&lCJclcHzcghl<02P5Ub7#ZYGlPbtJWmN+X4z)H{tjaa`Zk=d(=2#70F)P2%)f zBaV#jBx4x2r>*g-Lkb^GuWjc#`+6h3vB7b+Q>#)`$|ZJ8=U`%kwus#@7W9tAHYrMW zIKmh_To=?cyR<_&U59k_c7+eyogCvkOgYP>en{%-@d@>%&d<7i%+P={)M3ws^}}2( zrxcfU>C6sGfMo}ILpFVAO{p?jCjt@-I7Nd`Vr{%0CoywxHfbO7q9<@qH`&sf_3~@uO{aAje3Ja8E3Ns%j9C75lg?2!Q>x^O8jPp50fy*`O%JX zhcpp_hw8YowAe5{9p-LvLJ&q1o}`qRUs^#KE!)jH`n1rA>sJpa;y5L$4#Y9s2<8_IBRE= zopAZIS#NB0X{}eMd(>P%Gi1o{AlH25U~T|WY5V*A+F?Wguo#Sqr;G0g;cH=t zL9EWU4u_tJySV0&65Z1+abjxNW*X{oiJ9;vlk-Xmu3(x?dosQesmmgCOV^r8bi0e; z9ol4|JL>jCdZHivRf(=18D+UXHmn=sMx#QXhz%y00ms;A#3dN}yx|oeF43I> zJxtsY^Y;xK5#Tvp^?QXrIbm}pS+8dZ(dBHmF?YQ4*<#ZNCyXN+);Pe}+uaCZ9nzOJ zNfR&xVTK0=jqN>cecB1ljcq0VIyS?ou~pIZ_Qi+O+9qXR63iwXSx#&0&mo3Fgdf(} zM-}$jZarf2GWN;tj4i<=*vk~H@?f@GOftw|Z%`)%vwmitP2r!l!zp=RWYhv(>zJ{J z-L$YoHwi{AZh*}}axmuVkmh`~#GmQObl9DU-Rbq@x zRQ(lY#01A9+B84mFv07*v&}b{YAdlH7oa*|7TJW(6&dO1)?PVGubBC!kMPOmlBxaAvVovT_e_TiuH(#zo5`Z zquBWxxUQ_fJ>xYG#IGpz&QV9OjT;;2PkP2IhJLl!dZqII$b=`v+WP~x_Cyzgt@Cwq ziEhdH*$G36V*^omv*s@UNU8ouy6hv&NXj|V&U7X^L-ETNmp*6@ba4oT8;mFVxi){; z`c#RIP|b`v&}Hn%SiGE=S=g-5hb4=L>lqjuok;a0`%NL^XG?V6Kf&9^-9tQ#X96N~ ziLzP;hbE&U{7AVI!K~M3L8!+?%Jw@rWYsxYslOvVKHL`=Z%bbNTZPe}WYaKhh+-4W z@L@|x)9?$Wg$JFMP9bgN1_PeH*obafX%r1wyBUnG4o(}J7)ki*N)0pE=5TOAQfJ6b zro{<6!g~Lv#75o883#CbOgm_Gs}q})2{$+pb0s;mttZtnlul)$(RqqVOKvuEx>Y7pvA(pKM;1U;WdEuBE4YcuXyw?mcbp zi9yyd0oCGhNgoL_krSU>OfEY)e?C>7S)Tv#YgA_8nx-C96(P>3)yX2Z2{#lQ zH8F6apCnrk<9@Q7OjLWwjrn&DQ>lq_x*eY@a-|@`A4q&~1peGReWsM8BiH-|@`^Gt zIeh!_lH$!ne*p_9>E1M3DP!#+L=m?c;0-q2=hXAW^(kn9CnUfxjsMmIu&Tyrf&obMFbQS z+Y17)sqGTHwRV$V;Vfzsfdnu-e5muo_hz|8pzd1&YpeWdYmc0QT&P4*5_ zf4J}p`5ZTR>ExlNLempXk2Za=>A@z_bWhWsrmao4HH|d&HpQAY!?N7fWNvD2+SDX8 zZERZKbQ$7tUDDLlRNXk!c)amHjel!A-1wWupEv%f@w<&rH|86^+4xn&>3X2?6OA8j z+}SwUm~9+vOf`lZZ-z0ty|J_Lrbb;O+jw>3n#PrliyG%O)=xI78csDFYxpO^dHufO zm4=@-Jm2u&4O0!@YWRA?mm2oLX8qoVy$#zMZf_WE=xc~K+}aRma5q>Q3=P*ehz%cX zxUyk&!?K124Rac5>d(}_Q-7rX@AZGG|84y*>VI7SJqUWfgFs-9)IVJR+4@h`-(A0} zehUOYL-pzUNd1TFef5s|$*y{R{k8R6{WXXZwyJ({{rvid`pUY~b#K-EtM0FLf2jLa z-Ai>Z)IA63(35qK)qT0{p}J4keZ20@y6trzsT-^7M*uOYE?DQOv(_2wZm84Lsp~e> zU0%1m?$Wxsb+xr;Yfm6_+COSvt9`X*Ma{yR=9;>iit3ZqZ&tri{paf6RsYgk{gdh+ zR3EA?R6kMuX!RGXAH;?9J=J@vw^rX)JyP9U9jo44-Bay?8GU>8rfQ*jWA*y#%c_@F zUsByvU0pR(b-e07Re!5G3<=ZEtA14VU3y_XcQ}9OwZeYYWc^$Aii)PXw>t2wdFuu| ztKSmwta@uBo|SK{!&CLvs)~xnvu`cJ^UPb#c+R|4i|6#QJMcVxYz)s+$NKO*aV&=C zJI8Lp^Y}3zo^Kxm|HikDfq&zh$H2ew=rQnbJaP>D8~-zT3;>P)K1Kolb&LZ1{TK!K z+c668`kNHsFK<$SKfg%7yIz>kkofFB;E052S+0M8$#0N+1K z0ls&X0(|!<1^Az%6yVTN3h>NP3h?w%3h-Y?DZo=lDZtbb%KzXI%0GXE@_+IO<^QcC z;6LZj@|}}Q@%x&5XA6G*B;VP9pTqK$%;AOk#|$Tyu6zN zep}v60iTq2Q@|(W-4yU~c{c?-An&Gt-;{S#z;DRADd3~>ZVLD{c{c@oMBYsSzbfyh zfM1b!Q@}6FyD8w81cTvCx7a?q=4JxofL4ZypsaT@=gl4MczpPC*_?K z@D6z=1-wn(Nda^64hlFS@1THLc?Sg?mv>OWF?k0C9F})bydil9#T%TIcTm6qc?SjT zmv>OWK6wWP%*Z<^U`pOW0h96$3Yd_0P{6png966n?G!K~Z>NA^c{>G^M+xd2%}i?2)%qK)<}50{Z0b6tG*~P60jgb_(d0w^Klu zyo~}n$6!0c_8wI>k-bMkhm$y>DP4ZR>c%8hJ0$wX`rGQ#_D+ScZTPYwfZ>4~o zyp;m7@>UAS$Xh9(THZ33b;;|Dc~Ae zrhr$-G6h^M%M|c3S*Cy=kYx(EN|q_$N?E3W%Vn7YE|p~pxI~sI;9^;(fQw|g1wRXA znc`h4%PKnlE|IrT!1?kP3fL@fp@4JbEflax-a-Kz*OsIutwfO0juRL z6tGg>LIEq}EdXpfD{lc{(~P_YfKAi#mU{f0mbYN#X*zW_i|2{6{dm4Jc^1=Q)A6$( z#`CSSUObPTwcz>Y*)}|noCQMDf6l7${P)@Qc>e1wCfcSq&SIi%`o~#Jv`v3Mi;1@B zZ)Y&kHoblZ6K&I9&S0W#`tupe`L#2cXq*0Y#)s!0&e-w%-I)$NUp;dJp1(aaDdOkX zXEx&bt268HeB}%U_~jW2@bVc7@bfbi;Ab-w;H4P~@Y5Lz@RJz|@Zt;w`0)${_~8r% zcwvSDJU>GLelSD%e{Y8J|LzRs|35R7|8p~x|Dl;?w13mHGZf&NX$tW4GzFNNrT~R$ z3UF|m0(@th0_3MDz_+F;z~j>t;G5GF;2YBv;Oo;A;L&Lc@U>|Q@W^yCo?o7({J(UX z^8ey#%Kr6BHnNf&zq3P=L@03Lu@J z0Jol?0Jof=03SX<0d77)0X}qs0t8P`fSwZ+z<+`Q_)buO?h};1_XOqdd57|MzeD*u z-=X{+lkZRf+dCA%`VIv!ze52`?@)lwcPK!|I~2h94h1m0Lji7jhXUx|p#V3&Lji7h zhXP!GoB~{ToC4^MQvmI8%3pJw@)wU&{=#v}pFd9dbH^ts0DGJQFvlst2ai*L*5ef5 zn&TAU>f;pPs^b)3!`l>K-P;u4inl4i>bEJt2i~RttKOynE8nI7%ipE|OW&sa7r#yU zFM6BuU-&lVf9czl|AMy{b>V0J+Z15l+Z3SrEebIAEebH_Eeg=|76oX0ivl#f>q|N3#`{+D}z)s{8_3eT3mxc0Uf!V2*gg_M0 zbiDQ8e$mwYJ=qu>&#r95=QfyT!xTCj?DZuBy*A#CC^z;Tbv)ZxShMKjspmVMT`;Er z@3lF6m_jITMA@(*PPMH!z*DcW0N(ESngBv3Ue-*Q&IU3#Ghdr&8j)| z{ng*A{WQTf{9CKG1*a{r5mw9)$~#buEISIpMLC(M>iTcU-*xn$jrzmu#2H<2%@=kK z2YZ>cxve89d9_)6xLDkky!O1}wwJv`?!6Bly^97@H@yw}A&4<-(6~?}A-0j6udUxT z=I_ktQue+$IsPV8E-s|P&c2G8BrMNoj!{93dz!{yQ0xzeEqx5j1~S8)DP7n*>K4dH zSDl&H0z651P)|8pzlc*Pd$pT$QKU zShHRw*Z(LFqu(Udb-Euy%JU{o6 z0&3qm{cf;?iDX%DOLEh~!rFOdWFm9VmkbS_ScvLh=ACVRy;bkDW()1U^5?8-12Pg$5mLXw<*Lv)A_6Z=MRC?k^t4@Idr-lh3xH-ZD4 zw%~+uxDF-Tjz3HQ?a~vpph-UxDT?BNO?)=ho(*y`oUG(e=-M z9X3freTXUC9g|FU#Fj{rJFdYJS57AT7r>$k!T%QL|8os3v2*$s@KB}?KGw!`vUaU6 z86L3>q{C_QvKEzAMka?FQ_vkdgi15(3Wyii0|rX#Wx3GE7&~f?j_X`wCOfq89=i$* z%E)B(#QLJ4_tN|au2%98oXx{{S2hjxm!59P70T$lha#kYJy?{H$xDy?sib^{_$7<; zA6bvV1m&~9Y-b+s4iAQUf_-rO=ZbnP8uIFuU{gkgw^Ca%Y~|v-YXcpQj%gZfLMe>i z&bUUoPJPfn&iBKo%o7 zgCm-?;7~>;2OfT=qyzVrwO~<-o|mmqWnr}&ZoIGlziW@xTm~l1g)R+)`SqJ+d_U$&6)UU*XV=|9znH~{knN&WM%%Oo{h=pg@R&@ zUd-+H#lnh`dGJvhgYTxsVEu6I-PMm&9IYgWf-S$Hj#A)CyJ(WcUEzb7Ow5zF<==_f5kierd-rnjC3!n1?chmQZJINKe}OuxegNB!_O^ zh8gFsearLtzJdv6n72-6P?w5N-#8*~BLb){-l1_CqkacD)&}_ZQ1_?)ZqJXmW5R;L zVj5p7_avi6pC>!S4|O5dqNo{X$gd2jsxm4mMyvafv4D^qiGVf2dPTmF*v5+I-=x#XXb>j&tNoT^M2IWTFZ*cIB@y6<`%9P?vJt zxHstLqv=exT}L+FQdqK*70!#6&|dZuIWRv4`?-gwSLUlM1(&LY8yS_{+>kJmV%%Nr z37%7WZq8b0nO~kp!L9k%t%Y;;l@-==mf;_)u);F@`pPfT4KNS?PLDUwo~z0mIYZLU zi?n@y{{Vl^FudDcxOuVN?=JdvvaxmqnD8ZG(~Ogik^I12Shw(^i9{9t980#mymuLK zcna_5&*{sa!o%|}>^yoB@Ls$}m7>;}eT4v`>LH?@*N04*)B&$M=`bL&UP>>JDIY!V zT{M+2t^cbtr+dhT9vqSaDH>tKBm_GHIOiBA5Um8|jZY9y4-QEePtD((xULvH5Z}WT zJ&9l(z4n}5uz6h!)Wh(bNfBcZ*}Hfu+5g%2IqPq2(fa%GrgPTcC>n#KSqcZX35UU^ z4x}QzwqBFE*v+nB`159=i@%ybQ28620CCu=B~7;!nu^x$!BjxNDRLYoyy|5wqMzWr)p+fKYE?ze>ovyehpScdZf$AD}*ZK&N-wYl=?$`z_y#j6$9R#enF=w9juRb}O_yzB61w^dfltF}k>9oV2!ZD3*d z7mC1=u~p39!rB$g8=1M?X}hTDh{X z&FW%2tXu?9GYceaWJFww*RI;^GSaQHhBpg;# zD;t>FK=BFIk}!FRMPT3rYo%EnZll0sIcMBguiOBWF*OXd{#U456)2vC0ToY;NhDZ* z#bECe3BekTqa_r>uy|6#xJN?lsZ!ms8(~$r@8}yU)vEs^)QasR`!Lb#_Ry30Jf<}Vr;%xaYXe4PftvtY> zf??Q-+6zex4B9lXA`A%}tO&Uf%SB_b7YwtrFw91^j@ftkuPD;Kc|fXLI9qw=BasL8 z|C<%i1z?>hMtLF9s!_*a%@$%{>Vx{H)@(ed35h}kR(qxT(x9)g>ici0UAcjS)*K3W zjyHq7%IrVqmts(97*52|5v0{+xttMP28+zg)ke7g<d{1;X0T!CD zxuzz)F#)!)5~F>$^4N_GriuslM=|#lk=~tq-VbTtegoznUf2v1K#i71cT)>RJ6FsJ zFe(kfrV~S$!LW}+W_z`$-l*k-eMcXlliYt$r1K`Z_XB!Ba?s(!WB9;a6Iq8bTNK@a zfyuZOg2f*T&zdn_6NN=}_*~Tq+Kr-G*vA0k1N%0wQ>kj-tvd#}J=fpQue(&Kk@(Hv z9b;iE-U@SKSRQgAShtB<7=1E=meInJoq^q2sgVTDM%Zlc)9<7M^%fwV*Glh)lq|Ip z>^`-a(=czs+!E%kh%*X<$S_QQB`yTRzz7c;)OV4DjT(&(P#qNN|5&I*X({5VHFFdS z-7xJ#ztgZVT#ZEd)+o$W1)hsWL=pW^8A}4@9-b`@CS@f$ukPMwC5o3|goqBS8494m zYz8dM+OUGA298)6Si~`f;ovzKp4kXj1p5wuuQUR?o@rOMqB?{RiyFTb@8?BgfH*twRI$@*+KT+~ zFqL{TwQw#HTA6} zE;PuDx!T$G5G!=K(!?D_Zpz4{h3zl73Hff6$^u-|G(?q>AA_3D2%Jwe2Ksy4Nxoa7 zvKu#2>D40m0M2D z*QRmasN}W8mML7_k~CYaaW0V*oX*iUS8rdG?8%@2Wn^;TUR38rWo`Y1YSP$OIOp|j zph7iJ`x*UwBV7B0#%6RRLm@+mSnfvg%g96@xV%x6zK^oPIY((}X`X*24;E zPe-?V%Ywzf`#@cd;K?vKU zg#~2aVBykvWl2O@?}B`a2IW!>AuG!*)4BTAQUgV}uCDF@<2dXOBetklsn_M>g_hUQ7>g_MA`w*gMU2wbBH%5 zFyc#oKNA%Q!Q5Q?2LvAURbAJ(z5W0_cR1-7oT;2`!&FZ!9b@exYfJhEyM{76IlB{W zSVktQZN2ms;BU+GBfDs|IcBP7S$J|5f0%a+hxF`#Qyhqpmv$E}CCP1t1@p?1$o_5a zwfS#ugD7}~ZKh(jD@G%o!H&+9QQgxUOC=m3@`b&~Lm3t3yT`61>Rm4_&M&=_R+oK- z#*9)rGm{*%nc&i0XLXCtF_%6{ezqI)YZ;jwSj}TR{Q4uy^2R;r&C6<$1*PqMBf+e5 z(8qQ6O!WD6LrHS~r;vp*Dp{TUG@QnIPA<#O`84f;_L-X5EC{?AYoOg?9p<`5*sxni zw#%48%E`nv`p+xLv!0<#^T%Z>OLosxfrm0byWsh0jEg$`7Gt-%-{yy^^G*!P8+M@8 z%hJe82jEi+UKE$-_w7(*(liQ}QkoQ_8_9AGt~b;lA9QtClVtoZ+Nu|l$$=IGSX3`O zuq^+^T_{eekr>juHO^n$%sP=2qed=_W+;}g_T1F=NIBt=)$jN2- zC+;mEM3-X*o|8)pQQJt23v#}War@YiEo{~aRigz*{w1Aea_gpSxYoe(+adr0at=sKx#>i&Xk&;R=~1w^`yTCyfJ*X`(brrF++p1u@ueHNdTlgZ%AL$>@c zK3kvxc4w%Er&gj@o_|N zrEHdxJ3n8TyXfL?kbAW|7Uj3xed$M3SLzhu(BgB#A$ux5Vef>uMneLExiIzTm#}x* zSaS213QMjK)aUv1zWA&8dp{*8lB))C-IodtOKhob9**ZTL2nwup#*N>;TF+r8>bu* zoc5xrMAiQJbDjY=e5G*d!W{J+N&SOUEd!e&z&iZhS#nPSy*&Pv!h)9fq?02%yUu9^ ztazkw$zpFXZDYG9;E9lPKui_%CK3o|n^JfLA1Sn4da*Z9Rk!=|&pz0^NkuMs6l_?V z5b(yKfe{ewDIWs%!sVeMJx&M8(#zH7iOyi_dyzL0=>Cp#J|0&Dp{y|XvBI2%93l-T z0uY5F7_k~|?sIlFpr$OBkdDU+^A}ts9kI9#=W6KmHwsOc#Gy>txU2aZ8hx^+x$64b zKhrgeIyQIDP~X(bOwsP{3&*(*XQrbEu21_W!eqgd=&a>r_{4)_;d>5*m*saqN%tzY znT6n??3y%#L!lmy8HrE0)a>X`JFc1!V1Sm9iR=3a!hYoDk1fjo?mz)iUn8SVb06z9 z54nx$VYhLJA=f{F&&tR|Zq_OK1qYs>`UTdRMF3VdI7xmq&F~44?{d1FW-EfI+F!)R zq?}v~n0xoURjwB(pQYVHJ zQLVGn5iRohfL6!p#PddG`-Sh3Eoa)+DZ6#%AXt_br&L8v3u54YTa{|uIVVv2m#Q0S zk10A)oLL4)%31_3uE5TI56xCaR&Kw(`9%M6`0}8d1*=eB%2n!U z|F{7mZ>`}jOTuQgCyDxHjM`^@gH7CpNpQINYpR`qEy1ea(xu5cvv{`Te&YnZ$C;vh zZcJy4nEYCrjfLc6KSB+brBT0|xG`GrX}A^s5%^$#v=X^db~oP6zF>|qw2dXL_OvG? zDY<#*5OQ;264`$Q-bsop`k6zNi*;rxxF|!wuTP6GOZAMaBO%{}CZ=TOZ$AK+3zLW| ze`Xy~?|El&-uOISwjDF?y63hGjg3V4iEbxM8V$qNv_Lj~7gbwECWrsAtF%G>{CAbj z8ub;e6sMzY5OUi7V9Jr}$Hd`GlMg=!7G-2|cna1DT%$9Dfk5CPnTQKr$ zGas0(`Cu|O6bfbSqoM&J4b-Ai^Z)u)p=Is`Nkp%)uP0lKFD}d5eof2kn7Is@RXUTe zttTt8ecc{@Y@|ci6D_shvR4Z8=ar=qsryWWkt93RIT1Dt4O%kJ z1hJh#-ItMx{Mff|%s+dE<^c7v7N7SQKi4_iqdA6?;EGoadImh?_E!t*=ao^(p#!P4 z_fI^vB7f{vY_(ck=Q1*34(1?TS+RO~{-L9|TgGM< zUVcjfXZu+MVPdk@jCx$`6xvcz(!Od6LY^`*WGjnr%;#54nNUsPnQKr@%D&D6PhCAs zveP@R?ltSV07Dv&p_ zvr-O0g54q)?=%EDr3iWY1Tf3ViEI^!IZIMPxxwGdjkQ!Vq$)AC0{UxohegVj?GdQFW5tfc;1)@O#bpA1f2 zyeH+q$-as!Nn_=dll-fCY7TC0&vQHK;QssPPt{)XkqXsEn%B-rReh-b*ELMzH|nbCS{7B2Y|GT#mhw)=k^5UP zr<9Y4t1fn3zV4DKCzVN1U&zX;6X}49E;i~ML=aVvO_a2>cGt}>CzC_BH(~3M{P^4>#_uGSejCS^8UBEY?8|}6S#iY4gWK#6wh2-gLQP8raSzXa3`4!jEOgLvY zp&-gJMAsV{3^6%h$PhMV1q7-s^0`c_QA1tg-Fc$D>^X$4)vRd2b^OaDW!5g$4o)?d0`q+2{%C&_V#C%=Fc)TZ;qL3XZaWgJc&^@ z0!e|UFRac5LrNJJYf#3rG;*l$5PUi^k1olNYo=@n2r`sy({OEufIl5>6U~;m^6fvg z__i#KFrB|I9Wu;1rJ6Of)vV_=oq=4!5@X}qfuOh8&I`%io2FXkUXVn#*r(PbBFVE$ z@^5UKniV%kAZ~8lKBuStiP}F@X;hJ#MtU%_sz_3gIcUUTnGhJS)t_+$Q~kjtt5noy z^yo$9X@q%x9%|h4_>%l7{S*%2x-nyLj2TQjc+nFyw7D7OC)IQ7t`jeSV;G3bB%?7YLjl=8aXgsUGz!{cl#EwSw=lm40QydaG8ilQ-fS29xysP1J3SPS}D$*Ru%+w=K_W z{a8tGD(^yOl$kN*vvr12pJ1Ms%SXCtN9vh@F-}Qx zt?~86-K@txZVDcMun-@WwePlD^>7 z+WF;V0{OEoeZ6v;P2+?uPtSS zAy;?S<|UK2POX2xG>B#weY@^Zj+%fyRk!-ebJA#s0cKl%b0U~BG4@;_i$IM$m1z?B zRKn_7C=c{Oy=7xM@H^pDcT0-4)~`hlh%Z2k^xt8Gj$70x0) z5JTC)BJg6VM0HSDpTEaGH=|k!H~vEdiaH0Bh?g}ES097d+|SMFsC`~#rOOy!+!Rr} zA!X=i+J|8)(lKHl)(3n0a8E#_`{<_VK`bR@X^@1u72~029>h!pwU8NVK&7lm1H8R6 z!)m=fhP2RTGrBdj5*Lzx?ZgUDo<>y9zj|Zdwu`PJ?ip%;q)cb&p0^hY|AL9G_{>U%MUgxaZ!`f@Fv-VogLiJtm z_0V^sR&wA;zZp)CL$+flTz<{?wUcM#LOwtCjfv3E1tU|`-uCrHD~wJGqGj+EnjB}7 zN30xIbip7LrhXTJXo+YjqWUBbm&~_z@NGhk9sAJ_ymdNpF*dA1hK)-$?+!JRl+6se zb3ewKT}^_8Yr;qH%oE%BwKq{VwxgGTjbNh~8NV(mi(40hoI_!^>-ua?Q6o!;d3zyK z(PKoSSbzGhzxgssT7DHAsnCZoLP6-QQHxe3(}wCDmC7EGX5zvKU;7M%OH3n24!obn zd_1(1w|%DIoyY$btFovjsOTu^B;dpxper_kSpGsJug#wem;s(uaGvOTt&zxNjK z*-i7%gl`j7EHWSDP-5FXuhv@GU{vVNjkiHW#Wdj*Ml#wq{x`QBGD>z|e0<$3oj_X; z95!8|VT@LdxH7l&pzV($uTP9bNNMz=vz5{n(|=)#tJFjrz4seE(W-ae3i z;~tCyzVO)bCCj7id{Gu@dhG6YyU8{q0w2wns1{#M19F)XV?pW>f8a}$kMn2*e1sX% zDxK*Pjs9Frv=;Q<*5EXF<;&=gm_}ef_pR_9yy0Fd(DO%=v_pbtI;qZ@IbA-GY`YzW ztbfp<-CqZziin1!#-rzx%fEhTP?eMV6z=%Op*{F?PSCaLGc+=qR-+!xo7^#jPq)yQ z$t~nF2e4MFNl5eE4nz00%5L(154@e_Np~I^q*h6GteJcdO2B?}?7-+l!_Tb!jfA)l zTsT8eH{o>}Q&c=YAGqhpY8j~|Q@1yit&ozT*3|Yrt2Kt`A#&<9--1{CDt;I0d0~Q2 zx+;DY8CxIykPxn*!!!-FZF0jyI2J^$6u!>JZ#snE+m!Kk6gj44R@W18 zP7_j-i<5_TlIy#NCZ|NCLFfs!{$K6Vu6p%alboA}L&R0DFo?(%MEA185M2?CoSNE8 z@&E8G^xeaUXtJRFXbLkcTgr$Wsp-Iu^kgT_cH(jF0|o?CX>79=`^soRXSP^n1g7w1giOHn2mJ%-2~%sl)_i z9`iiH@F5^G`;%*!lGk49W*T`JHin0=oc%se}<+6ob@*=t} zqLC{f`!KEnYEPn`#)|_htbDvX3)ON=gZ%eIq8-$FvUMfSZmhewSunu1eP1vuXl$=w zEG4`PF%7QxoAqYa9aI=H^!1rjP@IQ-n<1+cKSqPeF5oYEf+_*mQ5vHwuyYi0C<0@b zJDrt;gS9P0`|QZ%<8*RX(}>1{;;{XM^8DkJkK-tf7ZwZ&J@P3lY}gudW_9vPs}dEa zC-GfOkBCMNutE54X`JX|-=*5kb(DtK3jN6}bQlA}RALI4p-odF8ijS}-=Iyky5mnvz1-R zSe22Ir+$5C8`<~@sUmr&xN0%9DMWhRF(+bTMSC%47~st_pg>CSzMczV;W0 zW%}pfBcc(>;Y)EEU;oNZ{(C>~yRVklfRA9sWm5%zm@C4|6Z4rBsD(u35}}5xn*o|q zrUis{1N4y89|8Dt6$p9fA*JjXSkMW1h6nG2BuwS7dp*IFdqUmJLR%(a&@C{ zA$0%GpWnmp{VRs@>279w(3o?=BLh659Ii2&VH1MlP)_)kE4q7UPDtbTFQjO!;U~K5 zPmvz;LxqBFHbh~Of*~fvA}LjGU=V0Yu8efIkdLnIZk;*d1LVpxEXM-sE*kDmZ?|_G zIY-C9;YKmzH2IMxo0GyJLej(Cz3`2lh{*5%^2cd^#=D4p9PO@0Vyq(@)*BJ~h`Y)H zqBJqQkPrAs7ms#nV(f{iZ^uVEbF7QVMF-*n;g&OnI7ikk5Bu`C0CuEr{UcmW*|F~A z))PH2Kxsl(fYOwW0aVG47|C=l)Bz$nP@9~%MeTF=z<77#%n6?$kzamn;MO6VC(w~X z7;EF_9KLkUp0ySn1vfCGsH17JyW=$3s^G^HK8ny#<+176IEm>&dND4VQ79Ublp&us zV@KiWFgiv#&TTyrm0b4AkDVd7n#li7bvJC@yk_(|#8z|T^J6K==C!{X{x{~g80 zmM4yjwNo85*BQ4Zn78WPS&deSkQlIBmcR2&s`zP$v!M9fGDl`1l6DjqUGez^ zmy)b(>&}o%PwGx@Tty-;eH?xq!IVF#OHKKOWg2TOgliizR#d*Jn=Q83V!_Yal>L<; zzxflK-eMZf*g20k{2A9=doEk1(aVCvd0vNdaj1CO@HC9FcvcZ7AN|{*)22kt{~hL@xS2e1hStiz^7ljY@ct~X$217u zA4hG$i9%3JCT5IOxN3qp{{f{ZYK6P{V>Tc%9Ri3`JCint*nG;{bmzIOH6Vp^5&%grN6kB2;Lr46IV` zOeyGs?41&|l1CmH$Cvb}x6Y86`KQgq^?^^FK`z^K_Z0d4_U@y59Lw7ZhwuP%bUPRkQAxMoNRHnxHp+r z#iYm+6GY|PySgx)R@2Dzb}w$qRP9w3uyXb-1#n z9s2BacgvKB24{m|jz@hsMDRJ5w;mspuWC1>m__4!Q)V?f?G~lLqOb)lL^M>(+uTR_ z+0H+?r3-7?vrL0ng;O`(Dm7Y+Ih|F;JlU47nI}Kofyov%6Up80?MEK$;`KYhVz+I1 z%W>1oT=CgF3t6u^uhW_FaoHcs1vA|(8&^@_V>;T8SDfV!%yj8_xjcn#2xna^lJhnh zMK0E~nKN;RE-K9Ib+g^+O=23EKJzOV@vqNzFFIyJr`L?WjL_NitRH!_79h$LdG z2k93)bdPg+Cw@j)Ky{sMcv)|_5pKB5Hd7=+J3B*OKLbA_rja8r44uwP&+G!<$+b)a zMTM?>t9#=3R4i!X3+qu^9+sw9t?_*>Tdz8KN<`f($tlp16&37D}j|tIylz0|EHtIp8Cr zk%LEm(YF$J^KYEfh56=KrV*#Y<}iCbkt!Q$)RI1nn`tRHp+DWTusOsuFnaz%{-m?f zms!U$jpG%jHDiq|8k2cXr{y$P3XVZnZa=lVWpXu%9C+yh*i5v_;PR<-X57mNFgs?b z*xf!qs+JjQGH)eVajAu#Y*u1KhSf9zKt_6hdCLfqhJayIS7M9J+Lw2sOTw_i%CIIO z%V^m|(V>buZIssx*|iTlRYW2O-A526RsGjl{_=g@3y--TGixTL6Or+ofcf;7k$uQ7 z%TODdLWRYaY1pZtG;`iXc~)k02i1#Sm42~_{1^v>LEKC)331Ek=u*fW@A4eF`Juie ztEJ9YGaY-?RF3MnW&;HtRo%Ult6LHO4`1;ekB#i&&FU_kGxN)*)2Z(>Fd^u@Brh*o zQQ0nH(&U6Wd-%PW`qd;D5YNw%DbF`%`P1Ily+AT+UOo+6QhhGIoTc70B`Y=kg3YAM z^tZ(pvj04)OjeV~!ABlApMUc_%E7iwgHHv2i@Byug)B9BuE|t5051srxby<_V>Jmb zi&3f=ADiVLy#QPgP_umM@!`}$nm{BH^)$0~SEv+5%m-DBw=!U}nnb48eMK;N$zPf7 zKgea-!>5s*T=$gS^UJ3|H3_|H&}uW0phJ-e`<)9w;Go%G;u&r!bt*@y?d9OyS?Jwe+ z9-V*G*xkBu6@i@ki+cth#?wv0o_hE3Jyl5AZ1Zf)U{$t)oH^c>!G511dJXiQm?T_N zU6FWt7yl&D%>yTNvN#`tH^#5eax(&>DSTnae=+ zmuHzq1`BNDWt%j|*sIvv-Tye4LQzf&8T7zV* z-MLNgXgy%P9f@w%u8~@9`|#s}<)(;sEH$p4@FO85770fg;TbB!t59iU z{n(phKOK7%6*X?!@cXgLH=Z{Zo493ceoQttJ2s4h8PBdeyzcIGH=r=aCF_jq&Yk$v zx^1J&qrVz`YV<*rQT^CxX~X`};OK>;XN+zd`P<0S%Og*W931)VhI==jK62$qX2d=5 z!iak0)D6#%j1T{D_`in#4J9!?J^Z2JBn-Wz#5e35Rt}%MabkGg(C;Ky5B+55J40U{ z+CS8uIC&^CWEoMNaLWZ#s2urPIZ386C7cn+lmSleMyK zLpWlR&E7L;H`Y3`nnSN-vbjupDIDGUe+T@v^KDr7b=E<2@?rK zm3p%-VM$Lg0-sP(iZV^waL64 z3Mpx#p!Ld6eh+u|RoUC&jD6msD{CU_KR##<8`DwF8mU!shMZdQp24&Qo$@SKEc)Bhyxiz9E+tey z8L&6DBFN!0hm#GZj7eqoZ5gy{xCE!kD;ipVsOd$O^#g-;RYb}J7^^zs(a5}YcCAoF zPZ#9uC`VRoYb(vX#W^42UKgGZ1RX8bX4b|^`XF0tCnpcleq#Ou&U(CpXy187iG>@) z&I|qb7g~-5IVuK61EyRbt6YL4mr;YOZI*;I*QUCrbd zvcpENBX< z?G)ObapasOYoT^I)3V!B>4~Pm#<`%El@`-EHfS&gsvX6m4*F~`&5le?%P`ikx1FguoB8Ow&p$>;m26C^lXGAL+599$Vp`mbKR`-q;=eu*91oPcBsLs+a`HSp2_IV z%;;l-_PnOU6pOxwdtR5;`?BW?m2-7=Pr1zKQy#gdo^*yXY5A82&)btJ&g`m&^l>0k zIMouNGPKTaOQa2oPI@U4cALB~t;&PvErkkOY*-mrHEH5ZDbtj&0Csgar)Db(D`#p} z4KeNCg~x53aD~m=GrkHpUyTN`+TRY^%d#5N(#Pf5a=oAqMfVJLuPs|NDe8+gTgcl1 ztn+MZF#on#tIArEKH!PjTlt1!{?LGrJL_gF+Sr0(z7kC*()Oo??$B#hzq8GljI~BJ zD7XAgczoXEcX58m0%JDkqUESrD6pxUH|e7?OTH4+1f&^hDJuKx;CXf_8{k~#cGi<^ zg#Ea`8HoRC2yfX1e&KoRB5qj9=DNcfao7XS{Q0s$d$ndn>Bz8*Q^}gFCBOUALN~3& zvbwtH&=r*FM!lRoeITCJj7!5-?Uj1OyQI-dEBR9gI@=nR2byYRHoGmxS~B*Y!BJuL zmcvX~V^qhrNk(psu04D3v*whAn|CmAuP<-+8RF*;l%9pc|M_&%>_XbeS#!BP-xHoU zyQO)?Y1e3CWwXPfNsN43C?%^iTVy4MsmWxupjp>o74OXqUeF~KvS!udZn-QntunFm zUkB}6%gbqNTvE}{8#r&q@NuEtl+##Ql~P@3Xp>5(T7FvpjMeE(S@{B|t`#d9cU9X6 z$+*E;Ve&485Tc0d`j*vP)C3vsR|7`cN}Ela(@IxRna?n)UH>*{SL6}O;a^OdI_{uH zt2kdM0jo1H2?LX_$fN8+%4X52m`%d-#&#*l6|1dz?Lx`pRL5*WA!wa3+cYwcKr(s0 z61NPovP^sb;Dw|`$yk!bq6P+6WKp^IXM^^zyDdW%O`|u)a+YlNv^mtRxrsWMZyZEYf5g;byungUC#yB< zLAmdREVRlRQ^qI1TrGH+1eA8sex^A6O3ZA82of6OD)(bjnqbt&Ur440b0 zsKY<6@<@cssF6_#>bNtTT%+_?ou#yv2~JglPuP)8=F z$U53=oO7oK)9F&FTuiav3ZX=7P39IV;_8yBY=@0@LJnoQROuu$TaUHN6k*g@EvFXB zY|EHUoH{trlWd{J$!s$3k~wWk0Q+T+Rdb8W`WNK8FCIK^b2(W@%7+@#0jE3=-*=zT9#1DjjAD_Q zFUe{~Q(iT;G_acDk#K|KI8`fYX;zDB-HS6r?_R6Z#WjVttL2y0QbD=eXc@>toRc!RF??squC&vmRaVTF>XoIF3BdJ7(Acp z_}Hvc7FLuZ-mEz}H`v6{B+8N`I%OYH)GShY?0tjNIqJu!P$a4?C7m3nUySHt1OBr4 zw5(ohww;N3wvayae1UyrF&SlC^NEVnm-ZW++4tSGeQ1fnEJsSdI+xFM+9h`;UT848 zzBzayuS#flu@>Q^ z5I2(p9|Xk2OZySj_njhm%)$rGQBPg}b|u%Ux)p(XI-X;~D1u9VxX|53&i8kxCs$K| z0P#4k;3~h`&EM`9+^Z~@2=3K|ax#?ByAkQyumPS?M#nO9GO#J-t75ZPKSthc>_N~g zIkb~62L(UQdoVV^k0X`Uy=69n63X-1V4~{E_F0naE{3a0Oe30SQ%I@TeSH`I`o&-b zPoxxG6XFrtCa=fI=rXm%db_D^mjyoG4#OcNA|b*%H7B5=%)DRloY6c;!N1;aCfS;vZ%=r!S_2m$^3KkkxL6V&|M-w{WNh?B0p`pGCz^9vjh_%)gsyrS*k(QZC|E&jKXr-^`2O#Wyz+CepjZB z`0)t1oS%SWQ%pJd`XlG@wArv>0gA)L|k-my}?wvW|nuTUE3X2`DXnmE6E^96XthG=%OB#7x7OZY1 zr+WVdGF^Fm7ynuwyLKQ=XRTR#bnL^!Pf5-iy%RU|vhhAx_h#H?IG1VSp6~-7t!Fcz7N@O-+g!&->lR14=&Se#t-$? z+`P%5ZpyS4rPN@vaSADb`)}xOC#6bva+8=w_W$FB3;6F>x^~GfnuIt=V~jZA`e`Up zAS`PNJFLRWzt-q(o(iodp%lyy2M`~&Ca#d+8a84=1lOqp#FdRcKCMpToqY19Dkclgi3Cig-bb@rqaYki0gxRThvMpbpG4UKl8yZB531@ znxV|bBOG6Gk1@0<>L;vPBtHJ*yc7jZ7CVwCv|DPN7FK}_Q#=ez=h2HVHF zL4XsWei<Ir??gYY0W{l>-xen|b}Dx)RS(r1vZ1V|6V|(%c3%vMXx23TkIbW_XeTf zLT>NkdPzhg5kr2j05G<;M^DCu<#`lEk@VGwPVdiq%1o7Inu>Xclsx=XY>mHt8rp0% zg&er~_j9*?cIz%abPLqT?E9B3$Lq3)H<7TvcHRuF`VNxBl)aF@{AS7`u#8mHL2VYL zZ5~$wvRWf;)p4<;iahdDjOMvpp%g_VBKg19T*#|PHz4_E8|NFJIl;yu%=%py@>@UK z1t^Vs*^GG%_EQu>-a^L6gte)8Z!|B9R{<>ZIp`B{GgV+Fere0fP6_$hQg?*R+}7QL z_#zWD+2E?Y71Ay!La;REk*Jo666bAL(%kA+gh}3Q;(u@(#=kT^dCHoaWOitB?YbMM z{%wP6_#Y#S8-KC!d+WX`c|h{sjb9$wwf@PCpICdAWOnq0sgIAJzP>E^^v3)~$M|g< zr5iU-{m;aoCZ1b6F?ILY6%*eYs*jIKo*sE!(pY=-#OF2?CqB5=JbH&@Vd9dp?ucsr zw(tFFIqZ12cZL&5d3b&B<#A@$JiwO<^* z8pYks!)Fao481Y*^ze%#!BL~+jSbhYO|JdN+85V8JalmA=HZ8jzc_OL$W6E~8z241 z=;3ucM*qIfx9+udKNyQ{_{x}m?Dq9HjDL9ivT^PBLmSu)TgU&B>)1`m@HAO-yXt#} z&R;v`Kwc{X@p1@VJ9F2P!-uHDjx~da+IALYJv!KXC>k>RB7GQCsl$X;6D>?BW_64c z3OOQbGAFkKYcY%<&Rr$pU4#<)@+fK<$fCGr-WhZt88;-|x>=wG@+iN#lmWty4AGz& z1WM){CTn5SZ35X-K(Z@hM3HFhOJ|@^ThKi69o+%zJ{Tsdt;iidBT{p5Lg+pDiOU3P zt^){3Bq-CGERH;M9O4;c%sPia4YizlHybv2pvjiv`4CFe0A!~#p%TcL552a4;8eCB z8QSs7DOTo$T%ZCqCkWLK-#S2oPy{8{1|p|ydeG^77EzqgWp*T5J93D@#Gg=mcwBfl zTnL-otq^{Tf(?ay00dnE4A1m$1ac0iNRG9e42X&~v;cb}0|t<6=oo9%hOtZWVVXuH zWe!Xbv}*6{2?_5aT-0Y_ksqB87f@vri%F+^qwN?KI=byZJZq>x!%Mt^aUVXSiDw0ks*vo7mk)teD zA{c^vTbhobHM4HLK=mMLUjuUh;tbeVyH5k*HOQCtd{rQ0l$~?|)&k@by=Eas=-R~9 z0yWm|gP{6Cz>NxFtKsn12htngJvuvdz65YmfLwI|N>*EdsR7hm3c+gWaDyMtqTnkB zAQHqS3g*%vTK*s_s3Y~W|Q$B$TqlblJqgyo_>i{&DLF{pBO3(s91bqV~V2MU* zW1nJ0Vr_>$$F6G}`(eaj7Z9k7t)PX_2l9Xokd60Ms4!pzuG50HSbd0L4%zta@s#kx zaab~z4lJz}R1Zugfd6JSt!?)WI71nE5M&LVskbj-^cEJgCExT#;pG_A4a!sbtT{Ub z9t)9$4s1=vkH6fP2|wecP_p`bI@Ag0MohxHejtX~Wzh9$-~dRm$2)fDi0!{0ybGuX z>;e`r2EJS?j0#=h>{6&RRX#?h`X2(qLOA5;ISTaR95^DdPN(r>1-z7o4#SSk$zcAb zcYkE?F4mPo8yGQD1{MM2*sU?y(1h?VaJ-;?Lcol$XQ7zzvk=epj*CHE!V!bI$AC4! z1X7Ear4vbY`L3IVmw|*z?CZXuTed-% z5A69cK*JzY1zJxFiW-NRH9PY)fiqNpX9;F?2hyz%F%$)v0!(bYOCUqISUa%NVo;|z zM11*-y?`G+PxxUY#13-;QFrJq3?>vOXCS{}|A2}iSuq!GOfwdd?)ad+vw2D29BKnz z7_$o=OId&c>(NI9`)|JJ7;8*3R^ATO4mSslpF?T`xBgz?Wr!)32o<7Phl%PnI~T$( z-xw9BxMQWU_N)O$v=*l(V3~0k%^ny~IdoKtWCeh$;c(XHxFwum-0V#PIiAI54N#Nu zqd_CKA*R|FPw#OFRA4CwEu0g|94E(^A*$uJ;S)Pk)N+s8Nmcnl&Ozz=DlqXpIbXHN*#Cbof93th5{F z8Z-qq&(2!}){vSYN_ z=hi{5anQvuWpSJjAqF_x41}$-V<7V|J31lk7qEs^gP+OLjVlp;81n}?hbqK%Z?=Dm za8N$&X+bAqz|cFGslZYe+llHX;DiU#dv*&y9Kv}V#)h-Bp!J|`F}{u`w{>Hmij@y# ztw=Y)ChHqq5Hg&B+aDF)jpyw2jHk#RSZjNM=5SbKTdy3v3q_vdkRXEO5FBBJB|F5) zAm5=qMuvWdUc!dyg!7PltW`|9PB{0l`Vc1U6)P6PfpaemBP=H$dsFyf4}=k@efm6( zAP>?!tXYU(XZAY+HHP^MLx*B{gS2Y5MP|o#+`ROxK+Xg7n}T;c(02`F*pEJjq$h0= zx`mS+-@^FTL}+^)=U589fpB)uZ-sYL9L`8|T7&Kxpcf60`53#-e~e1c6uT*aI)o0u zfxB5e!Ho?pqoouM7(wK)$vQwp1X;tZ7Y0$wW-m!E>-WZT! zxme)wfD(owiqh*~?r#m51uC`=U00kOp#sj!AmC;7vDR9pK&9zWaflwy2NTR1SYr@h z`AA?uh5Y~<&lJWP<8Q(Kf(#cNxv{~K8bZOw6pXbT%s~hkOeaSto*z3Vm>8`V3lM^B zLkqaWpa|OA>skZWV2h4IB{`{kBnyoRte5o_fr{dWdVB#C95D5%!vr%{a4*T$59~ER zJ}^+eU7y2zgwrs;A=SCo`Z?icq-NpBz=?>7jJ4@5hYIB+1LfnvNsp|eEY3c9iqOLe zle^{~;ayMG(b1wnyt~;?@xl}6ctaU@GT@A`_!5>k~D>d zh)c+(m5+@q;k4lP+{Z zB7g9Uw}H%@;Bm1S0_q)EzO=>l#EseCZ(fS84}ydcat zd@bQfYYFa=`@YiM4DaKK9wCuu>+|H~fBC15$L7Cu$*li@^RRAmgvih6L~fRW2j+tN zPT+xgbK6XczwE0={h0f&b{DpHH2A#5@qq0N+XbI)mNsHVIH8kY_-c2{))PHJ-2U4? z_0LdZssHisU+YdxU$JJQH2yis6_ffQ_t^JF|2)DodjB2?&3&-};(FPA+%a#LH2^r7 zYnJp}KISjw$tE7R2di7*_>17&K!0DxP}O=9j%-AY5nRtA(|33!aE0(l*A@PU=QQ zx|g{1O8+NMr#xRd2`56g@|-mkOwpW#@tI8( zLqz6QXVf}}ELts-$YETr{`Fh91rw3T!R{G@nD&KlcO8;VK4%8OY#o(dpLb@YW}x-Z zSAXyjTy^gt9eJpD5&!N(baqwC6m`qc&*D&e)NwPHGcn4VBBTr1b99MkNb@jwh-oD9 z*f0C&R@;d5?yKKNF1qQfyGi-F@9^a1?{w!-zyf6m7KYT46h(F#dthWEb<;X=IpJ6i zLn4IxqDItNjnB&>kxH>4_jwcK>3{FeoTA`Z)ChdbzpN8IhP0-&eW;k7eChG7OEMi+ zwX7)I<_H8VIeA2_RZ>24Q=(>?5{i4nfBbNmy!6atfN6Y!UimndFTwZ+IX{|&PR<%s z3;xA$IA^m($nX9W(uG8zw>JYI?FQVCjXl1Lyn5SzRmc^GLQ~|8#~(dFuKsEF6eOBb z>?2`(N_V^FFg|xnruHFouxVt= ziKuNpN18vt_(aV_vTPsRC;$2f^q$taOwpKx5wS9qH{!TttS%3l?D|rqzhvawPogU# z8o6@JJGk23`F+|I_wrj1RmQqp6JrA&w^UyMaJ^S8@VW3Y@Db7asQChj#O;qkWCu5r zSFV}V4f!QkPSnP~IQI0qH6#1z8J@vrcP�B4O&{nOGw)Q&o)ZL^7DoH==^ly!ct% zO^IpbkyE#yNiKVwZ08R@i!C+nSCx?FqtQ1VYISlxB9jR(OMim(6VZS=v_fx^xAUL+ z30*$_GDR;EVA<2na3sXIYvph>YUVTr6+NbQl1tv`Zk!U)h-5u8NY(oG8@S6u0sG|y zo&5g(Ox85UA`^-x60uY*k&Y&4fA($?Hv^C5$ay^XU+{r%Qt6u=CmT%qtVNxzg#54@ zU+C_e614)$;FJLp&bt4`^&{XJC>WHG0#!~J>^`njQaMy|by3B|g-Lku2qr;9BS$o! zMwOVC5APz|e{?KsN&QSe4T_>v38ToR!nGFTP^ruYbIt+CErH>+&){BEL?Z{(l0lNz zYtI~GIPokPs+TVXLsNfR8WDK1IHlf_4Ml3jj4e*0FG8$E&E)0myM?d;{^1vqKr{V^ zK@QbeYV8k4Ke6Ty!$dP3*hvq*NB3M6S}xGLll~Qs+gy)v4#3bh6H0`E#)#&m-V7P} zIYd=NA}{}a=0ZO4bIkmn@Ny0pI0A>N!eS_M@wjO|8(NGeTQTy(UqG?$d%3%Lay1ER z_1p9sXg7b&%UuL(gq8sx^|5vRabm?y4sOwrj8&9~U2Z37M^M^I)C|D!&FAyqIH_lY z_=J}8$KN+q6K*MIF>{f4D%;BVGqe{da=E%$C{MZRx}lxC_LuY;DY8tVoP@jRa=xNb z`+Rb9PRgbI3mm!cSKuIOrB^v-{;XHJ3zBJBNEwwfo|4_nS!LD=-njYK5Lt0EeZ|Ue zd9@1=)W~ugODjM}`F&xpg-I8ZdQZk`Sd^wn`!#5GQ8THy-mvh0eytmnOs7>jl~GoS z2N&9rszKvUk`KJz-Ft#&H#uzOUwj=ImE%I`3e}pmpCaQ=-}IhY?*q7fADG*s6&4o% z6x7H@;n%kvQKHBA1DAag^$R{T+;h?T1&ELs)Gs)(B;1neolp=4=KFNbjFjGKcjvTN zruw2bL%u%Rn|_D9@%!)k6mHBvHP#CQR3h*2;iCxG8F236^C^Z;CvAcDZ#&t(zBe^< z!Y7Et``Q0DqCd4)i{rhm+u&sL0RTg9=ctno-@f=FPWL5whWzVzZ}XNDJV1VbtLFl8 zis_C?a?*z0KMNITY{0-pn?cwkGvvaF-t-AK3V-9b?jryRne2sT;3IkGeF1T)4sRtd z{h~X1I-{1oZFNrgw24S+_y7NziP2j(^+q?}yk`9VN&UoiWB)y(97;%TUI%dThpm_Q z%`A#kC7kXa_mFqGnnVu1{Knjan|o==CaaFowHPUK zH7kqmM$%3$I;ppf+^_``AtI53r=b2Q(6+YmuWsp~%$IZdty;FGj=WT3bs=pvRVrob zfHdoC&r4_Mgs!FukY@K^<=(*`n&}xOI~&kD!ZE(+@yzS9YSyL;nKURVF#R%auP;8g zw{>zg1y}Kby|>PPayx(MT-p;vCsmI#ajDCp5SKISmG(ljma);EY$4}v$25pYLP|H_ zt#|UD+}?9brd=LQvC1ZZ-ItixE*7kE^1B_qy;GuQXtBo!MO9)udsfM;e7S;O*Yve_ zv}91bTJ3B_l?|0_2$Ja^0YBT-o0<}l`q=37kUCXD%(K07rWFhILY?(5mO`bdTyI7t z$B)k9*G0{UW;lWa4t0gerhRv95u4@1C-shH4_DVrgaEnvZb@}WJNnAV)-j%%PT{__ zK~c4Y&$X~J>#Z@WP+pbyy18Pbzj9m1_I;Qy5shf>1RVHf%{#X8)qQl{9m^CKOOU=I z43;9BU9@$AW+PNUInbbC;jxj&LiFTjk5XhLyj02OTG zyBGBI{i%Hm`OFv5YtmdMDDxU4VRa^=78pHr78r?W#Zz0kX5Nv z30z(|16)Kja%Cmjk0?gfvokT2f&E5$~~2jACwKQz$_g~JlM5^Q@LcCHc#6$%q3Y>Y*VG0n-0b&pY3^ZH}byuj!V2Ertwk^PU+8qZge8UBA6 zjA_=fLV>k}4wV;BcG1>W$@|E*big%C{`%$lW?}w7v#n`yrAh|upTpW29~U|;O9lngi$`Xmw)(z%TJMz z`_DQ&LOy2gojF}y^jSijFKM$EYt@JfpNJ1z@vf+uVu^ zP+%Y-j5|iS|dHB0P42%0P%ssA^&EO)~ zAF*1X5@t|7J3FuC5@mgc7+shoQ8SU8dFdQ~hpYDigfy?vBBO&7Fj>r1^sFuDWfp@A zK{eUs>CH_QSGN-PzH=$EGugr4;OW72Dqq=l+<35Zt$J14aWP2U2NNavP!K;aY9$iO z@;?6I;^(oxeeqge!1^}LE_;aynd=Hx+L3vJEK!BglHR?N z9d^VFg;>O3;GzZbIk*l&{8|B!msecYLji~rQu%`)`3)jxZ@jC!{#4iTD+PL6gNv|G z$K9kcQV!gvg$wRBWwe7_7wt`MIl&V|^7t4K>~5dVOU{(Dk$$xc=kX9)6E3e%5!vp; ztsnw*a07=r8tFXXjC(uY#c{H?z8`U+{LV*jeSBj3pf(3?V95KDJ%H@#bGVzPms9jw zFOREz)UL?7JCr9t_D(=0D|;sfT_k6wdt0_4zCv$rA}|Rzu$DH$aA~LxOFZe`zO5&s z5y{zWj|K8(dz*G390E62xE@AX3R=Vi(Q5s8Bx1hKnFVX-&!Pw4pk8uXL=Z>hIo^Z%?F;wOzGpPcxl4P)IMqZC`bpI0J*kc6~*~WH=x$zuAEv+){-e6wv@*1jOY{?Vq5wZk28w&kDul z5@L>JE+xaT3tn7#8uUPBW69lh>^yNZ(1A|gOD=liqdWOs4SE*1RwzW7psKPuU05cw zxOL`Ez|t=2IPy#l+fUR?Bv)NKM-HF#9r(c)sez+jp+H)KLrra0SiGFS+A>-@%GkUr zMJ{iGg{YZa`Qjhv_-C8+ZRN@yye$-f(`OtNH^(g4wNXv>(+U1@Mh zn^vCA8Nva3g2X?JcSX&l5_{qd{*e#EW>K89X3a_X1poN>f2`lKE;#akhW=ghr@p=7 zS)tHR!osHAaUER1Rb$d($th&6IQjimU@K}yKFV`*q`Um^PCj}yrghe}LNR`Xb(N(3h|Prv^C9sI*r^r-iJg`$oL^6FRT z7p#bO2syG%hcW`Ie9uSF9Z|DjkiS&<>@bm@2|?Na5kb|{s<*;Kr)`m>n=3Pp`8pyE zWhRDv_oH-JtD8|Y_oO-gQ<>i$Q}vo_Fw-@Cx~OF5>&|LgwWx4M73A`3AnW30a%J%| zXYkKoLx-SPISoIp-l^PY(dC?Sr9vhR1&URBp>0H|RK>Nuz0>b#=JVHLmDb8xa_|$q zvo|??L3Nl*r~JlwF6T-Ii5n`Btb78qC?W}&dF^X^oB7anJr*}*E2rYu-?vkZUr#9t zQYlxg$F!|@QkGFF$(OIkufL<2|Jn8U?xMfG_lDlt(*}=Asg-FX#fC$xY6M#>iQa(u z5;YUax#qom?}na5qC9y`U$(x#erla>gbY0o**cj@*Ba;_>GAbsVoha`OUF&MQZ=a5 zd1S8KfTJ# z-+EII-dvm1!RT49JzUjCIM!?ee&x*=_B)#SpPi$#^oM=rEf_YU1=YCvEpxSyzqXJ_ zr%3M>{E(=bOh55S4EtQ&X@d=U5rLS*4R(V}CiQ1K8I96a%|%Fu;9XHOZ~?zQ$N!l0 za2pu&>!Vsm9x3P>D!D18NRT%_hcz~T7Wzj-BL`pj8Pxq}sSZ`IoQ3&3zrVbSsw2a4 zo`#84nN^m&IZs*aoqk6%f5zu~=KeU#xAjhjgit&%;Vu<$)&>phl_D9<=nl=xqm;!A zdH6OQ2_hPiJOg}9`RCEe@cZ9$5efdE-XFk=*7X&5WokiFnq_mkMPMjtipZCV-;OyD zHPb?hxGYgzKaAp5J-bBmNiumy&o^CVxptb>F)6J--ZVuSj@0hJMiVz9UH73gacPcf zH?Q6Sq22Kw$ol&r>uGOL-gd-vb+#F68A~jA&`Pf~sK{rJfqMnMu8jD-x5e<-$ z=$m^dSGN-Pv!~DThi^ZwS1!5-CS+Odk%bJ6e7jI^Eci@G(!K|8u5Klfk#lfMdgSC` z{<(W_PqN7me1s;uXf0*|MpdZUiThg^qv2kBgS~@vu*;pvzhJrt=SJVk{>E2&dmueD zZC5xxV?I|b!@63GJ7JNPlPDYb+pl24#mywLAE4Vk$JJi)xqs>XVOFt1bF76k)b3i~ z;%!Z^SxFV6`f8Nidmjd|x|LkH{J(Sj(7(bdv?sXqW7C#I4sPn!c6b+K2LoR0c%!Q+;oFGu6e-w}^bE_txG z^ECBp@A-+IU?U~dD0o)Gho%nU^LBI3(VO+iHVq5L;Ep0@48RPyGn zmmD(!&-_*omECACWYCj$(2%DrBGVAo4O1I7^S7wQdqOH6Eq_Yv<2 z+uKL8BWPfxUrG!Q_2#z!6Doi3f!=2&WLLL0z8&Fv4n((NQ94M&kt6&H2_~^NIrlI= zCK&14B2MfldX&F$#|IEcML&AT#>4oMKtciTkx+WtWMIMwtVL)k4anyxL#+J?spRFo zw;!9C|NTyH!&dd0NyEgo`1;BL{|lxps;os+^2;ycL>DEto&bDnJ^UcERk4 zHna(KEkTwZhcYxj3S}swk(Ynk#v%2{PiFah9~JClnqMsN(JS4q5^D~sJ#M?!*3e=Z zABG|nHIpOekD}IT7e!5;d6=?LtxtgTFn(R{zRlfUta-dtZdfAdKgLK&^gS7Q~KL@;lt zwgM{3WbfqaR&wy1I}y!gnj7Zr-|x*!rr841K)8A(SX0)NUU^1E?)?FJFKPzd<^o=O z^}WOVy8ocPSFX@>ctNwxJ3EOoS9P-fd@dJl_#!0!6qKX587>DN7WPxH-8P5UOd2Py zAAe^3?sb=r+&T2?wdaz{Y;`RHJyzzyS1^xViGU);wbGfYi7AyrID#T?U{8R8UuI!G{iruLxw@HL=Duk!|AimHR+v?; z(9)}dKp8dBqJF_zZQF7YYdfR9^~abIQ6mB)M&|hU{}`j0RjtrUslrK-sH8MiSxxF{ zSL4V8(2?G=cv;liuNlX0f3An*Y_+1T4x`3*v|&iaS+h(K;Puz?TiLLM@5#KQX z!cTfY+Lf))d~#*qa?X}mhfyX6CZEME&&Wzd@jO_FTlxI+$L!{x_D;s<6-_B0d|m;7 z#_!dbON$|IHno@`zx^phN4~0+FwY;v2|KMG=I8$lC+xIUQ%rQ2awrpsmRp>`ohM&@ z0ZuScGvZ%f=wH4JLtKA*?91$o7khhfJnGN`L5SqCd3z%kSg6=6cHO)oi+~Tzo2V6` z6ld<`55EWtZEFz0LKD}F|8V`*b>Wda*90L%?9hHth=;gDN&rwk@Vw{(`-gB16BxTdSMNWsk`KeH;4x7@zn>?>xzFZiPl- zp5Om6&c|~Bom(fX2bBg-x=Jcf!&rIxm#}Zelq;Va$9>wm^~3z^uW%tbtx_t^6m-__pKNU(HQS)x5>U2JKOqv81qeN`QEN6`a2HI)*Qzk^R^IVDE#!r5^<)Q{B#T?qoh- z)ki9F2DKI6z`#Y#WWVdnbNrza`x2XDcGgexSlnG9`m;BN&wE3N6BKhNAxARvV zPF^lKi#g_4y!4ovM5Cq=KG1?O1D6@iiqat0F9s*zU*IrPsoqw_;>3><=98Uc#!26` z_!k%i4tVYm&5qoP7;-BtQlva0S1Z(_Tv6WSgjBNsuugaQv(q|jW}hR zH-bQK_$ZOmk|v(Nfys%fsOqaY=8wJj*sRf1%y5t<7$K#~)K4iw3LXl|8vahrlM_;D zN!erO$>x9bwrr)TiXkN0(i|=gGPD3qnkAJ#KwK_d?yY+lLUrGA!6Kaholj#OzV>z> z?8fEZhHbGHGX9W|fhE=FU>G{Eq;}X%%hZ8-0vdTUpgq>DzSUF{KI(t4eskYp^z*gv zUQ?r1Q|P3t6e~3BQ_!>dV9uVCMbgQZ7Qlp&#mFr;A4aV6>Q({csFlBZ?O|PiTRlE>`0VL8qgaTrF;_f{a-B#EjFF*X zyd`cX`=^cj_{)Y5!{w$}p^?0TMy}Lqbu%|Ftpyu^OR(V^eFS|KwGv6vI>+xAJ&ez7 za8sisxnkOHZ;rJQ^;N${`H4}C$Cze z5wpVKo{u)9CRsh#K!|GHB#Y$9Z^r2wtZpU|^1vK9xosTbEgR6Y>7ruZWM*rQY)MyE zhppxuxqAYyiJHm5*}HMCg@9y!c;jK547R8&DPt?)v?lIwFjjo_MJMr^sJZ{$Czw|c zPaZZ(wqCGi(z15z#Eok%7=L#C&UKfKd}-)aDo&>ZFMWlE!V0HbU1uvWupC+elS)4C zQ<2CdeBq@{hqq3NNaV^b|20RxaMi=J{Es$4NM_wDmtv&_HpvA)SGF#Ail$gC-0>ud zbo1f8ldD_F!TUc5K%_r^f0qB!W-!2<(r{Q|P7M*xt7c8fc&DO@g#%Ru8Quy>6F1ZP zEOY!NTMt8f>ylo-nY9{X)ojetswPpg@AufmKbkp=D1y~Am_G42e&@EsX32JH@lbEw ze9WE=nlv)0J)y6$WyDBh;MZ?Ij0&==DJ*~gcI+hT!1(J9Yzk8-(2TL!5^y8k@_KDP zL%5w-5K%KZ^%WbeEw_7^zj^0jn8^+cYpOBrge%}MDdKugMt-*ouZf!fKg!-bKCZIf zAMZ3x8qzjP(>86>mX?y1O_+1etU!U;XEHNMW+s`9MP}dk%uHqg+kjk95UEHXaX~6_ zQ9z_19udqW;=UlLxL>4~i>xYK^?F5=-}{+!8k*De>;3&hUp${PpFHd5`8=QH{lW5c zFu`ARc{lGGp1Y8muxT+_;p|uPwnj*4Y`V+_l`)IL^O)t0q_u5spm!;Wsw1Mtw9|Xu zF^%c$9dp~aaqrM_#e&L^v(%7BXl-hAt_kx*Tt#9#uxd+N$m4QC40tA*5*YK&pYE4wjVNi#We_|`pS z|J2uq_)AZpqfuh-(88BOC`7$n^dKd9Cg_Yi6iQDjO-wt%LefkY4*%B~hwlH`5dYZD zIXEh{cDrqwGu!mGX1Z8cjAzK^)8 zuG_LIWkw$*_nw2_N}9>8zg;T)mhXHI9c^gbUz-2|XLwqbu;jx@#8;n-11oKY{Z<2g z``o$v;g&^CA`-J^kS0h0N04X-%LhA}CbRN6SWK3s@&~`7Ii?0A7u5iyw8FoOWLCKI z(n#r~X@faioif@&KE%$gg%M}DPsr@(?OuL0Yei{VIV>ZAWd=w1`}Aq z4z?^+gkPd=QF4}MZh#u(sGFE77IL_DFxY1Q zfV6DnO(HEDz)EAl4M2*fl9>br;R`AX-_0blzq=IhD=@AS|E+XUVx2p)<=8p}|cZ>kL(u z22Fy2>4&HEul9F-y5s4ULo3L@t?!((|vnJzS#aFhfu z!N!&}qZHQfaNoY!+Dd+S$=p9_$(KFk&pJp-6y3~wRG^o>sby~a6!wb|dHfvQ4s!}Pe`rwo{a8o#1g59E~i^~O^bN`;0!PANAm z{R#p5ufQIW_~BM^mwxUaLchLcX!onS*spxCZYgjxOfnYFC5*-i^0*0y@Pt-bc9`ozcEWzc`9}bUHtlwz9wuRy&#@g?hTp zVB;bC+(5sSL>A8Z@Ca|V(`$cp!c$0bX|vNmnJ6T^ff%{hfn}96lY>u$5SW#(tmeC& zb9m&A7b1Z)j#1T|&1S>dF_uKe@H0s>Onmq6I3;oqC;S_5ck+6f_rSGMB5fX?-Ef`Ns>RWtQCU0b@xsfDJ8s_^wGRxs~tG$T(pM zyuKV0U|6-uXj6Mr24{rCr|@e@Gm+I_!zDa5hul2JJ2duG*jTx!g>iGp@0(B*LRl32 zAlrTTwWOKoW~%T3*`D0Of7nN5x7O)07#LUBs$iR?j65DAuluoWq|M}L)o=!p{~F<{ zR|c^B2n@U$dq>CsDpVWp>5?6g#}#F|X-bm0Ag;)zt;k;+qM@cwZsoa4=^u_x86tL0 zVMU=XRDlzAXDY?>hR)7i8pbp}F4vF?U$);<(66 zRa4ey%6T#rp4;0eX(b0=XGZupe(=sQ|M$ltb7u{Vjs?aQEbA(3n$xHQ;bO>7BIuf= z8Sd|H)Qr4nTPOeV)V;D1&k9Lx9 z3B36#5iSy}7y~ZSmBIidt+Zb9>HL)`dY=8wkWt0rb(k@0OJ#)<{y>P}K1nk!H( zCbsKN-*FuVKCn3O=5&J1#lsEx6r#^p=05hq%yaC2LuoeW)uWa4hR!DwxlgFaQ09 zfX2288fT+ol}~b0cJ+*=k#I2+VPdUg!$_NH_T(P^?m86nK5HtVF0*AUE zzo0w}Hs&_=ODM3$nAVQ)mpABx0DpB2=2$Q&n7oZ@*lTi>o!(%el#G%2CPpf0B}WHW zoq^MVj-PfF75#C2CKhBz*+S0Du(m)=MXtFTKa(^Q*`dnFq0gSRivRW1R94lj;gX;6 zm}6shWj&FA{a^DwdL$&x&wT$#Lym|7OJ9%|I!HhHRrKZUEo`B0>{^eBiK|+^m?(9@uMU#&+viT%#c{`(xR(3&kmsJw#|Ihy8&p}K zH~`VW@7f(y#Tubm>Yn8uudhqg((}&5z`0TjFzLK z^7tB2q1=1Sj+#043IK){G-Vfjv4DQTD+M4=_*YPMFTQ1N^=`HNxE#Ned@WUcZ=r7i z*av~w0NWtI#{fnXK&XooK!w0Lr9EAiN@mkP6CW((t-{yVuJ;I5!XI}3uInG2yE`tF zd7za1`9c|)I5@X%z>{!~Wx2*=-R*ZVuF`mfe!U#J2G4fz3Ey z0-C16X);!WW=4~-j;fS3;=K)WLE3mYt+4XX-ZmG+$(qW0rWKsMlnPFSCj;^r-3&Nc zOPc}8yG6`^`qJ%lsPU_J+e2x#YHg%)b+6r~O^~ew-IO+yg&B{P{}_SH-i~f=TEA{ir$5jYfUmX`j21BH=s1L()oQ?>p;E1n0mu)!)_XJ#E#|wZ@)& z_a|kF4&?1U-?0q}r)&1WPKaJ1PA`E;6WQv*1^oZqhxy&^pFM!k zO!4{?4n=*A0Y5xFI|i68zvg!B&Q>;W22Ddei; z^TzQR{2*i2JIqrPX0VUUe6D%` zdZCmgfa?C@fjI=x#Vi^|!8A15hEuJ|)y9-`4v@wzX(kIde&!SWL zp4sNHbmosOO6H-t{^b^h?>F3avy5Ew@Enqozcja&ddh%?Y6DbP0-_X3B?T)4z8vkz z9*tHd*Boz7S@vT@eOzlNA9-}{WXZX&K00^zfOJ;rgd-{W%NVPaMA{fSm;C&LlgLc| z%3NSGu=JF`7XvzKn zF@&&n_|5ci8b$yVN!?$-vH~(2UEV=*|5ssJS@sje#_zY2?T^o$EF-)2IL0pB9_?MT ziCpr;T>pt%=gqE701&$3Z2$;uo161*9tS*FJI0412jS8K@)f@Az z<-R2!-hBCH(!V-z#=ihHKXhn*u4{dGMb}Sd;Z=X`9qHJ$*46#Fp7&AdHVWx>{_Fu7 z!fR;bDm13tA)}&b7@w#qRccy-90zfb)StowMnWU9UmFpe_>)IAkPk;!o=@ig8XhKZ z{7v>za+m6Bd&tor%^~7wZ1%t&TpWT$IXn^8SSJ&jq8{GvGHOA$S7H6P=LUP1l4vRD zJ%?_3c`HBtZ9KYnTsnK;bR6-{b{Fy3&gR&-HCC9O30LaoBsub9Y`L#}4{}CALt?!} zMc$~S*YG>OPX*Ta?19rTR-rr9N-}I`t*)5dG-I`~u9z^^m%cN%zF$hC_#J1E=MR5j zh_`;1b_sU^4F(nNguLC9bTHX^80HOMFwM3%0*VqpiCL4-$eZ8VxQBn}$+^pAJ1{vk zI8{hUipSikj6!9LnJX5DF7HD&CEcTB0WJ|Kjp%-kXsTQP^4tdgFAFf14AYQwVNeq} zxKCIv*fg+=#ci*s1U46a6Kte3;hlc#!7mQ+pZX>>jd*7dj4Z;F`)bMYyvZDhrY6D# zc}$$5+^1fBXPW3Lz17#l96Q_Vp$yXxhr#yMNnt-Ky89m>i*E63NV> zn3OD*u#h9mt|7m3@TLPY@`<0$O;9oUzC|%PVG2#4FypkwJ32Nt=1maUFR>R2PtW!D zNl5&WTelypa$xu|-M~s>s^?`MANFX<}B}9e(s@ke5;# zAG&%0AP%?w0;1B{glME-t7(em4P;c{KmrIlO@B@ke3qk0YH!ufjeS9ARvm;Ho1l=^_3?D+LbXQBSy?PR zCfPsY*1F_3STzYroP*)#=p0x8Dm)3iNS1;LLYoK5Gk{5jU+)3X2FDyHGnfCG9DMR~ zs0;A(b2k5Zj|9NNOxFGcjYU z%^;(ip559XaQ-DUGJDa>?ZnB=WM9|%3(3U3`?ee}HUBtw>Z#X3PkgtCk}5hj#WHrE zI$u&}ikWIsV1CUDU@oEI%KkU84*T;jz{=5YGL>SAWM1y9TB{yCynyX~d0vFXT}q;! zz&1wJF#n|&seGH5JwS6A1aD#{!-S{VN=EC<+G@s{TebX^}fL1COlAeuqrAp3~{Am?3Jve<4dFPbRTQB1dkE(=^@X*sb=<<1^QcVO zbWW>~MAg2GuYVIqSwa&ssaj8dYdinDH|cud^+4+&3D=*+QEb$kR%@uPjH-QJt-$BJ zzu>l!kboC?)(9;SMeaIG5R>>9TbK0#1qOnibAlDUe3 zwc-t*OlfkXu&CbL+uBUt_cq=#5*jtDGNk_#;eP%%Z^Kr$1Mf19DmrZsn)E(s-xWh7 z_)k1$q%`3Q{_;O@=+|GcV#NixeAo3z+~J8^)w`&!G7PsBOW zuWXHP^E?8C1o766Ry~Mo^XUT)M~X=TOF(uCZptTDwg&nnB>wQNkI}cys@7%DcHJ3T z+JJ&%BNG8=r4f|Y$#Csok8oO6&KwslzwFl}H1$5bM><<4)5%}!Y~4Me9Onv2CaPqt zQ?9t}z?PCosSde)-j?@w!_acW zApfb2Ef`w#lVKIZdfA9G(ny*Tm54Ag{X>{$DUC4S{_I73X{d#l0VLc-i{N{bb1sU2 zC$^p_0+0osx|rWK+=3NQdivTYbBNrzt<`tJ$s|WcOZ)h@wzcfXplvQ)ft~a1p7L6A z_np0`%P#F0rten+w$TN%2WVv@Q~R21rakJYBBEsjd9NuL0qiIgl{FX=YH^kx)jfTZX6TdzD&4l*JCUmQ z@+SVjchP+WMl?xAcpzq6LA#Evxh&J#(E_SwgoNdP=?q9EDGeFaZvph;53P;7@l32g zy>JbS8%Z1Vlu}&87)gaPx_WRlDRAoFi^-SJU@W=f_?+X?Ui6Db$9(rOe>FTG~nu-u=Z(_;2oR0RRKPHZK0U>PV+OOx((;T#SE8MV>jMwTYZR z(i-SpN)b$UNOIlAe_{k&=zVFzH7A%aWAN4lS!>ZB)92!jX$?m{cUEhpPtr`@{3_1r zUC*96%x^y%+hV(K_5kWoiC3jd;nWyxO^Y_Gj0fW5Nuoa&|F@*%*EBMckWMQBx}%nXn%lx;EjxT3Y?G>!V*h*p@fmidxD z__-Tzp|MXKg{3Gz(tpg2g1{a)ClKz8ia7xCMtl|mmMGE%7>^7tLnQ~c-W=fNsc-C) zk>amfo#Yl(YYmV$09!u^2Ns~wX+fZ1+6Jif1V@gj=q0u+6&Rd1h*3gUYgz+CX&|iw zDt{b>7k~ke2r-nVY9eF`EQZMAnpWS&WxrTbweJ0MUAs3tvhLW$hpwRNlOAO`TqxOq zYDuV!fxsh;$Li)Nyr6_XqMXeFI^G>9aE2pl%)(T{(SG*9cNL&vzp&vg7j8;qf@{3l9o+;QVLjR*@ISTf?VbhZmCze1#L9uNfyjtW|3pFHJQjf?9+a z8(JH8sZn@NrG0n58l>M5S>x4x{5!f9tV^^2pTI4s&4i0g&S&trn>Amso)xsKQ!S7_ z5*m^H`}upx0UBF+jRjW-eaMY2GMY^2{1aT$H0I<|X;$CNkPkU9TuCz!-I03K&I*$` z#mjjdJVaBMDX5)hqLUNhsnV3LjwEV2G-5YFs7^>|B=q8M&*%T$MCGYx_J9LS1T3Ni z7cW{ErQE=klQr)s;HKL8;`c@|A_)zSwC(K(>S6wDJG~Sk;%Rw9LBv}~V{(>ysDO>C7eNWfVd#*ihyG`QH z2-_{-ayDvgvJ_J_r<~bQ9o`nF;O|tgfF2;Fk)zLS8sQNTBoi;nqwl5q7Otgt)3j1< zGpcdqGv0DFs0}nq^ez}ApSld)mXOF{7O2`Z;*WplvX-fRQBojyVHS&xXwb<;Yu;i) z7qU)Ir>TtC(=Tln^0W`!jw-QJ0r9q_fY<_)>0(5$QfLr~GhwPbRLCs8)rF1G@L(|{ zw02%G4Ko=gug(9ya_D29Uq^ob?XQ1^{C%>uldgLaF~5=-YiOs#No9aZlV_k! zlJ5jt8~RTm9dUG?&i7y1y1c!*G^;{b-9*e#Eh%P-#gNxkfPyMa(`Q`ZaRQ0q)}7f7 zo9T4ZI}@AjUCjMrfvIa0VS6Q3^9F-uMBcPVxYLIbN@$3wyY&oUq2x;-wy2_m!(Y z({=62uTxX+k50V~#^lQ|@T=N-8IxzjW<}V>n0)C>pzdp5Nt?GF|L8MFz5&J|EBdXk z3bpV!h8F;t6QUO&)0k8#xmcteP3m*Si8@SMw_uI`8paGrXs{;zNx*ORMyMiM=3=q5 z!s|i^vppD$WYuILiajQ6h6MEOBR_K8-pOlY^zTD!xpMK9?+9ljVK!T^u+5~&p92!- zkuv`NqjCIw35_CgG6;v;)yHp0wBT(l*%S^nGdZEoPZ}~_qb5eKNumSN=GzY5Gs^!X zNq>=Ul+_ldY}GsEdguvZC5fl;3u!ZTx;yz-(k*!TtJ$hg19;77Bx+O!VofC(&*CT2 zX2DPY!)yz{)}h%0G-0al4g&G~aSjv%|{U zdQ;Twu;PO5=epj%>UFvicEjfX$fiY`zhr5SEnA^@l4TRE5XN%rvSro{Q-0#Q@v-%eOCBe zZ@%RwxJloKnHir%u_mgA0{hLGj;5fGBAPw`rv#4M2*YWQ&#YYjW4PRq2K@ha8VgQR zq$Ho-b^ls($ENO^dQz*NmHFu9c`0`RO%eo5L@8qpoS|6=~$>stV*hpdb*+6%Ot zlPiuXg84=caNJRPECxyZy4Hr?r4(}bI(Pexw}t=Cb*-^>mk3ePu)E*@xQN_+jE1ppZM+D3D-j0Xl@>B{rE*E6xZMUCP zX1;zq9%z#F5|{GfL(mo_B)XI;{;uQ$|0W{`KL&X~tLKfOs4=pQQ2>^f`gL)rp4A|C z9m2jGx}(*gE+me@j@+4bQl#Ro8wgN+l;zVULnhuXAKd@|2 zV-^A2V?=fb&exrHwg!>nwA>fu%`dnA;Am+a09 zc=^ul3giXM9>@Y2a9>-&%jVr4ccz)qc~upz1l(kL!G8LI*1)A1q&WcI}~0f)9UJUf^!5CSw*Q*ts0YL)90ahNScZ4!7G=42;Y7m1T4%{`9(98 z&ERxI^EI{IZOF0~BTBtc5%&0D%&>$c7?z8r?{4F_e+DWpHG38p#aPTTqh~l*%;I)N zmC8_(3_RLuClbk*^qp5AT`tQ420oj0Qye3z2zDh1+pES?-^$~K}J*|;` zX|qtaf^usV9O)x`-tG6f~NQ%$D%`a zZ-2k%5d;f~ex{|sd-d!~FT0LO{t~|RAVSy+WV?Sc z^#3PFZmki{g>cumI(GIHR{f>><5d5{(V@P0nz$!uYyopJRBE!iMz)-=OhC89t+q%-lZgpGqdM-%Sp#mf>nVgCklF6byPcARR-ClU6-t79UAhFZ($-Ntz_YuYtAA& zPx<~vzWi-!c|r`r3|I((w+@T1X#+B1C|j!89JW01J&EmpLMyG|cj(fGHuK+mlG+m> zB55@e!IWl*o4F}Qr-oEG2Pr?E=OlX(qbAO@c=SfV+QPpq&AaIyxg5NuuM1+9d1t zSsaZ>HOyKx} z){k2w8<(Y$XVMSQG?rP}F8MKs0?IJMw~X31fQW$?0Ck2THPX5!dF-cPvn-WA@YY+X z2%1mNuO>JD3@=WKHDgSoFe~7)0n-9N6(DerlG*Dv4U&bQwKl9j@dGlU{Pq?hb*1@> z*1!-Vjxh*e5Tc~0&zuXur2+i!9QoqU@T~pnFIv4Dm;C}+!3AW9jIBcsHZp3cGvPgp zsu^kmqiQmWE7MY?NQ$ulPY1NaaPj}iwQ%igQ1$HBUfFOhgnWo|j9`Z=7QkY@jQuE2f zxn|Nu4%fi!LoeV>AR&l1L3nv5Ql2Oqi*vSQ$XTq;q>1ZA$P7s{0-V1NTk64AhWT&42-!uaf>!wv zrXsGDYqHFAvOZIoF;yBqa^zu5#ecqvsgRIJN%u=Q#l8#FapPiT5| zA3FHg^V-E|x1e(9>?}fq#9PFwE~qVeZz`=QRkhP5a>-Mz4P^CS@j#bSX0LGWJ#^Fa zLwxeD!UE2o0xrS~j%zaE0*8Vn9u=dQZUo4#zhD7xeiO?eArV)sd^!(T!WA@@dUiD? zP#Cy%!fR7;*_wTFyr}2cW}NaE>6bRsibVVP+x|kkfZum74kY79g=$7Ks@sj#>UJ2b zX%|lAIIUWFT$GYw>1Tqy`sq(1W3}}sxXrfGtX$!Gowg;WoL);IW{QmJGU@hRFi0MG z3qc!8Nn~~o;BfDof{lIs-{BmA2V%ApYy@3_QB-nDh0Ws{)hd+bEQ;kkg?;gx|HTAL zNQC(_fSfJNy7dMzHZ!ftft7?tM=Noex#L+*}13nT`8}Nl@ z&~G6_XMfp7dVlndZRDX}exQ#Of4pHG`Oqm}`3!mfi*USNuy+2e0fY-q)Yz0an6Y`W zOnSH^==ywMEf`B^sNZnPnWzi)tpQ?KX_v^pIS`^>YAM$z>Ep|#iK8IN{q8QX5hxO`G8S4kROmyK1)f+w(c7_ zWdHeg{&gAH4Ab;x;WWmwMT9-+Cu4ep&s_3MwC}M&!gYd)ga(MJe?ThU)X~{?TixD? zfzfl>17^ax)J*|5nj4#m*HvSxh*#G>mm7C#HF8v>diPp1NWLSkpU(h#^^RGbtloL- zW-4~pEuJnN3ZRBv>am$rx{=A}V0)m`{#^I`VDC~AIns}ss%<2Oi%yw09FuUN72OZ_ zd;m4GPLYK=6unFr4Zx*JKmH0W_af|djU{5JSghJclS|auFp@}vU zBBMsrtz@{QCxF;|ds3eld-B|7Fp|*7k%LDOyZcB1fvQ{RYG9jf0V82VZiMw2*)hA` z?{O9V=1{vwfF4@f3@o-^!Z=LBsQ)}bdAMh1X%Qabs;byWqZux4Y%0@L6&FPkV|(&1 z-GR!X;CK+{S>H@$yo}am=9~p*L>@yeHp=Ibt@DU*lhDYKg@@Z&J)8MW z!*pYf&dzQIr$}3qn3}05^lW3S=}RbdTldpED;=zDSphK?@NQYFIH$ot&66k~6gLRpQ%8PXyXl>VVN z_RJ%5aw(0xS)&Tt!7pv&U3=$&x8+wmQ7tPx9js^~@?0gA6@L58Gv){SrL=Yc`k~Ad zL;UGy($PX#&;lcZuwYe&TteYyBGcm*d#Zt~;PwX3?ZW&^XsD@l53m`Yg!lbNyXFC= z5MUdQIyaS37aQ_=qaH^3COsU6-T1A9MxHrJ-T&LJI+g$YZrTZKNt#0{Y{^Nc9PqJI zg@Q)iw2!NNDS=V=TriT*0J3J>L*#$^)iC+Sx$|#{TIzZ8&{DClU|<#ZRnZnLB)D;_ z&(pN&nQA^FupAx%O9_n}-un)&jq6_?=C2u<2g3A~v$MM(0ED`?8WUSCk6EVDj7RO@ zP-yVlv*!2oNm|Lm$38d8%g&znQizFyuEy20Gs=mSF)`tek>ok}g`^o-Iz=wSbmx}CMjRV3oAR~qaLnfdVWN9n^9UbH` z!ry0Udfxu_@oUyxNi}P71#{t2q8>+)gZ8WOin00LeklzetnXdKKQ=bsc`QU_oNffw z>?}>v6EHJUa=#}6Tw6}=2#l2*>IiwxJU`MWX~wGnj<&@Y5RVtoIn*jJ3(MrOxO|to zp;A~P)@e`7r38LWd&(cM;=YM3AyEvQOZZ;fJZ!k3+1b;vl?30qMj;;?pEhtazG_3| z@@PnXly0S^t>l^OPj~Wfjm}%zzuvw0YlpR}o8s!$yu)L1d-F!}%vbRuFFPRMP9Por z-bbAL3yyh{?4xgOBpW9_t0j&r=hqBK_QtV&bJdk6**Btn)f1k-jOG?2PY%u@AI%p7 zM1wDg1X~+N9(;LzGx=?Je%*%UJ|S0*R4J^*e%bEQBN`YgLhzXn26FJ{q^Um#KI(Kd z33oi8?_nYUv!UHe?Qt1h%YS;jt)P&e?;eY_KW2Fx}lSN!XNzi zhXJ;M4h?P^#qV8mT7Lny3T6!dwp~f>U2}hWe#3_4J`g-f+cWbg%XX+`=BYthv1qPX zy7!K4%YE5px8*UP+Higz;g7KI!k&s`I)t_Q04)dDU1a)Yg^m5`{QP>vjxP5JVn@UO z%C3wW(Z8DSI#itR?(e?8bEVAR^|OxidahkN)!Pn)yabmaGzywgC1?~}xWL#LpR;Ia zP88W{N$kZ#P3%kwjg+)kL89&Y?l3=i6_p4G9_@%R$zj3w^~3Bx(1 zKEJ+Cx0FU?k0B%v^(eRSi8^J3OX+Md5-z2JMN#3naJ-svn{i`AS%J|FS5t|$lm^xB zqkCv>693ZGln<`?cQfFoHU8WfqqVCefWxq6bSZ()uV=tVLPLBT1v#J<$@VpHc!y~U zoG?F`kldE$vUR=5GS*<46B>cbrSAh535^`)@S1GbZJ2u>Rg~z>c;2E$n|CKC6_d4s zb|z+>ajWA3BUKd}W+{mb+cMTRIO=Z88#@NwrDi|WHXZ#IDN2$4lSjTT`xS0 zXU{nw*~b6A1SKNavo5vbQ?lTSb>CX|;5yg3L+j38cbY7?u4nCkul?29udlst?MK!& z*GASox7NN^v3A?qRcl^f^V2m?toiJko7YUQxqOXj&ADqf_58EvcRf$_e7Wb&o*Q}! zJ-(icd-nG9kpuG24efuk`#nXFyNX@@u1mVk=<4tMTj$Zv?{*&PyrXlrGu7$pJiqg_ z&NZw4yy`zzeRI_pR^7hpnpN>tW2;oFPF=OSIro z9kP|Lto-rHulDX+`I(hBt*orPY^8DKIV(5F{vrF_y8W^r$-W{xEc-z3h^*ZAa^KT^ zkM(_~?}NR)edWGO`wV?&_YL;G-TPwi4|^Z&{Z#Muy;Hq8dqj4{PzSTpU{)(q4Gx|} zeK?`tHCHU{ z4Cgf!l_NWFv)CNiU-U=yQ~7ctCr?+Hy?e#>QJ;kgPg%^WDOD*D)#Zi0j53Bi6U@Zp z;k33~tta{)6WVRS_E)4BgQ2XmdW&-PzI|eQ)WC60I~$zld~AqQtuzVjZEl;t(FoV< zO4ojmHy>F)E`DzfxLAulI6mnyHM2hT*$we~tK46*a0*wZ?5+Y*(IS4XEk_kv6)K#w zm2xx`8tD<+S(AzxFGq}uLNHmWCQca^*jS52hK)Jo)8i$z5%|`x;`9BOd28NWVG`V^ zC804U4bF`5YXTo@iY;;|keQrNsNxwfH?m)BcREd+Jc9(_xOt+Xj_S2yJ6Du*sYz?v zm({Q2pzS!qmF5# zS(#{5>;+fY5f_^$X6yws9EgdKJ3pRYxkY3%9%^t=tI3+J`x7Q*eDoc$-N@<~T_azZ zGO@Y9bY{3Fwi~=vMZpY=BBR{D-)Bp>KPeE*^$9r>XW}N+c&e68Wp>{ow&zp^MOo($ z=!1m`>qPY2YlQxoljfqjYKk>d%A7tM+v*cPkFhz<&~#N2A%y|)B*SL0T{)iMTui29 z3A()vYs~f+u%YvB%FA_4#%^#-=#!i!b^5P_?@fu6iAg&QzVu|Js8SstD+#{#>?_>JN(TCP#xaTTSkUK{;bkq)t0m=)TEVn5yib zE-5E{0P#;JjBktWx_ZU0o|+g9j}~>BsQx2jv({EoGzz+Aa@2$@y54I=?y7j6&AZ3y zipgj*R$^EGQ25*!_NKXlbuwGAqHf{zQIOR+`wU;HPLFqt$ndfg;y);e;*SbW`Q z#P$h?jS1&`k%HTnbEcyG9}wFeY8w}7YV`(f-Cv8U&iRedZm7jPjBdK=ozzV+HC06Z zezCpii2=Q@p`J=;oJxK8!cVo^_nQrQ-#Ft=%>zP90l*`2S$rQu5OctLd5)AGG9q5koDMmc)dZRDTq!M9I)vlgMGD^$qA|Iu!o0Pn(*2q0w0}G z8RguOcpgy`O=mWCnke0L>Oe~2AM+H)3fXAbo8j&fzSqv=ql&1bJndHc^I=Z8^@GCS z)u!2`%FRtWoNNrmAkQaa^AtO2Q#baHS>u&})~8tgS&@xBC09)PYq6Yl#tyKw^RE`a zXBsAzR-LF>bK@RgYIR!pT$7Kn3Ukxq4XUb0pAW4`itXv5QNj6)PG#Ixu~w4XcZltY z=`5$o=_|~rEp7E>_Mi51kuX_Sa~U&hEtwR4)l6uOIGvjD0K>&J5%+W=Ty)tpr(P_6 zZ!Jx8hM9?imvw4c17}hR{nVIi)k?{24dwiKYazMsRIwRelenWXF>0G~Sp3;@MG>#r zuQWMWvl>-33yNlBJhs^)e$T1KYe7fYjJm;-%7n8Z{#AK3!DP}dwbeh7bGzfGwuE+d zt*BF&)ZTn5ujJCY?0KT>QCF2wHevND4Yj-)zO&8ZVyQ0Ep;U#UE5$odtxj@`FH%lv6x9i3EU6OL zMUA*pHk>rswDAd5MytM9+&xQGl5x%c^N;mN5iJ7Ubh?PsTQ{;1jd=H}6`GpDtn^oW zjbyo)JokE`KdNRk#T1IgN>X1LOK{ndXT^5EVTx@`*-{CIHOh>oxCya+(q=*t5u-Id z8uBJ>jPfF(eZR_9wXi@2ix`{=M_dsxh?k?v=xHkAoIM|!3|p1)xcisF!l?9SEyJ=k z!?@8iWsdI@FAJ4QU1CBI;@)w6gNddb!{XoNY&Ndk)FksEM0btH`u-@kBU6_P=|lT{ zc~dT9m{guBc1YQD#<+woU9uG9^}04I`-1QTWpxzDgA;aDSYvD|#-qv=VtcM?Wy?DC zcuAis$ExvdyM=x#;lMGeJw>BD=X1u@TW%6Rw=*6fju@kpwpybxn%(~%jrcvQ)d$Dw zVJ9=1vL+eDknp{tp+)J|tXmrk=W5Ow*0e`#pMkZ^5L5Vreh<=BxeIi8?f0e5n zk_x%2oU`Vwq8iL)N+!myHtYv>K~Sf1C5Ecv_aR4mESVfn8`GA_D7W=0fju`Gkh4>W zd@-d$33XBJeobsw*T%W=azW4NnhIT0WfYf%W6K#>%Jz8i#6Lu({{6byrRk_G>RT^yKP`KDnAn& z)fy9yFZrjlPkGM}+Q(pZWb$#PG68WHpGZ&rRcIeqHXNMQqERH` zqZ8r0dcRYYXJfILflbWRebt1)Z!;!My&|KS&d!G9`n=hV3(X(7ASbp*+#G9A6vIuU z%{nQMX-33$O^D&rMRyXas5h)nxJBK1Oj#|V>Z_`*)l~d?txVjF`<=CfA*gXo6^i3b zu9`8(1vbunHpDs=MO#tTEL+PV`A)IjGM-Z8GRb0aA~!Q_%qYeC!KqVMxG_hhS+=q6 zgi))!R-DepM9i(9P>g9OTvlhKj}h2F5E>QfF>h+W*FTzw$GM$95DCU+Sus{qO|wRp zX~q+40wN!sF=BMjxbq3EebklNwn}KW*BI8F%Qz=OHLWR`?KTQr?CGg0Q*jwIlaVB2 ztfJDW*q#XJ6iVBqmDMng49j-EM@)V6uIN3h>)D?7t@U(&PUc0x^4a{Z;xiYw%@t}` z83g-u*qM+gI5Ve@yFFt*W|9un1Aq8^Iz}Hn_*D z%v3t=v%8GO@o_b^Q~(BjX)~EU7eML9mOfG?yfxhQ7DX3olu4ow9Wbn&x| zBzPVCJQ5nMqq~QP10NZLFxt>6w8EdRREt)(F*BL8WxP-}!h((DhMQp{SxTagmObR5 z+x~Ma|H{qOgha7~1VhV|(HhYy;zh-1Bw{I~koMoUMRwePIgrwb?B2C7wa~(y@f$?j z4{VMiC!O8vDAlsXd?e^E*b#}@X7tbp(VL|ta>R^^P7ifF08`yf)bazHpAsDsy@(3r zw!y7xk0%q+xVI^q)PH#+Y+9A2G=v{M1XJDHKibak`vA3R!Gy#vj%++2PnWrdEA6SX zep5pwGP>***!(0kqDufnuMM;D_$~0H^}a`TMdxb7x3CDR`eM(gOU0G44ZQq~|4_-c z&0es$^a0MR27HFuYL3W*iaL-=+iQ5!C$WYSS{wF&M?lDXWy7@Ys<8i3X#fzjCR^20 zkAyS9qUay#C766EjnF(&!SS6Z*o8E_heCk}2F~fkWVFy2vp86TNtJK`x0~*!uY7!d zpm!;W9IndRWqvmE8$ThM-6-;kup8Xmj8X?B)vVJ^*H}X>AuQs5eheLw(r$b6)zgLC zUHu)jKR6Yapg+RM9GdZ}u0G}V6m5nHOrE3iouiZbm_@_Sx;Z7k^$tL&1a3z||TU-^yq2rNR(r zjzX>o`^U+c?Itej*3J}zQ}W7`XlD=KjTx5G$U@{Y0Y;OIZagx2XwMgbUTVCdk6irQ zrw*gC!2Bxm>SyP-Q@gnle?Zt*(@Kv%qwu>CV&o|Kr%`FF-P1?zLr*2NcBL_tf!WFr z-Y;%+{bEO}@`^RbDT3KT(jF*|<;4wp*@NICp^>9!bpR$%`_W;9-P1iqE$6h>sjwex z3OmE(o0*APc08Df#Dosr@Bk)!DTyq+{bW1hWSD>D0V+Mgh8ArV*rc@bh&DZihzD!M znbe3|^ZC!AKN1qsJhOo33+1=*hR?qnUjR_oU-ewqq3&D_ne|Zb*|M+@uilO?cozdg zug>QyEL*mxY7Vu+IhCP1ZBL)1nH=m#rpm3i{R%<`wb(p}6 z^67kb6t?;HX8p=n=LgpOBZMu-YD^IuS7glEa;U_NClISZkIv>U{7W4W4wqnKKR^5kKmGf5qu*cGUW!C`$p>>qv zYt6c`kiwbNry91Hrm0OARl(AX9Z@HA$j^Oaetqv!5)yiWK7Yw6x9;He-=rrAK7NX0 zAo%zZ6j7aI!aChlp=J)7wJO20Dqnz)UrHk(*RL)lKiYY7C;#Dvd1SbkrzWa1Ft(|) z)h4TD^5SmleiAb#p#ku0S_H<-JW0>trL(g@We~9hGy(ODAHTQwj0%6z%aPePF_?$H zHNT-xLL#y;Btbs(LK&(2-<}7SKwgEHFI)38jZ7|}NGFwK|99p``lZc6V!rIV^OLdx zUoPl{^&y?9B`XsVyIM=)-<#jlFKs4=O$i78^7rUSt!0x2C3B*MqBm_CSE>|b><9RX zw3!yeaPUw6fCir!@=8>m7`6DFjYwf)617m(PvIxhW>g05aqy2lg?NzLyS~N_KZ2^@ zVg{;Y=;ExTo<7N}@J~;C^?Di6{dnHBed-bDJ0hDHP~k0XCg*Zm7`b!86h8FJ`Ay^- zKSmIhghbwKD))$i1|R$BJhHM-Q`b2O{I>MeOdw~@2H=JV=&P_iJD!DWefcj4^PYx? zmv`{llRD5}eRlrtfk-)Kjx$z;$LfydVzvbB9pKARe0U}^Y4R712$7>q_x%P3 zM?yoW*Lz1qq=Mn+5Gyb~iP!*CO?Dyxga$+eCs8W|L#HeNTdrQ3j(_5}{Xk*urE&SL^RG8py0x*c!pNSbZkz(X9V%PHu`;>?7)(u4e0<@tMNCRgh z-mL$XCx`iaUZ4-ei3zyEn0$IH7}Q5i8f{wW#MT$l2?>pq{sxU;=PUON^UW9OJ&Q>R zElx@>P|j;z`h>BmotbhK6#}2!QSgzFP)&Iqt)T%_)~AnB`3%W;>7rzmoY3~+-AL|u z6?`P5_TeSP*x_ybTd&RovP61(=*b!)&DZDqPCQu)H}~)3fA%^RsFM9B>`g$@E#0#1 zZAn9ohxsr60TGDnLn{!wtLj|a_1o@;dksC;uZ_{oViO`Q!&n^Q+H%=zt|(U;cQqSU zCX#nVg^79je<6(|G{m;NM-0KR{Ebd9RvEYm;wneMvPY+#&0z~h_qn|8@H z8Vz$C3Y_7D&kla`nsWp^#`0e&Q|v*&6Nr1zQ>a8(Zo10m)OlopA+>k!0*>Wh<~Q`8 zK$?B<4D3PA!&~?}|AJ-P21c<(HLJ|IHD;qi9*74Ny+(~LIYDw_*I&Q!!S>Cls}z6C)ep#j;fB4X+e|DA4x$uQ?g!!S3QuEO9rrA8PX;6{iAy0lKl;AM&>pC(_k=V~Yn8~G=+UrDo2 z81{*O;^(C6>6UpI?*{P(lk`*^#qC!uEI$Ylvc|n~;fhVP)Q~qD$hk8B1VlZlNYiNq zX#2NTF6`Z~9F0P@A1m3}^YzuctjF^C##na>nR6**mNfuM&_IDzAjl$~?Xgu0NXuQ8 z${z@R6$yR+*0nGIu}#wmX;D=ji%dL}s(03bLz^OB?85Jtr}78?w?Yd(wZq}M7XU9v z%c?i^DDad3CLlujjS*&yMd~=1ARMlHVcn+XKOskMwjayqEA%X^9|C}ja}o&lEK1QD zry66lsC>>0m6tB@{XGkV8<+ipFrN}G_N`>cnuU{L0M^zl+6bPmi#k8fKe1y0_~)Hl zyT93UN3UURzQf%0hht?5+GdN!qCk&NDb$Hnb;dR7t2k6lf*jnnuxH(pRx*EdD|Rp~ zR@!kIW`^!ST8CE{RC5%OM~ZwoWpUf=T9uYE*m$a3rG;J3X?r;YiF!U?JG#tAur^sWi==erjyZ4+c=u|o!^PG!Z6QehZnRC;|x z?9h+SLWd+Y!1X>&gV>Swci!3JHkf{Q8|W%-JD0OJBcqvArH*11?QQVZ8FU*gr2$45 zr77CQ*aK%Sz~q7bR9j?JE!e9;ZYrXP`u!eL$)adKRQB#&80eFb2vY}WW;+Q}xy(ZZ;9iE=U-OsF@ra8wkC|b~uXwI>ql`FM1Buc?)R1ZWQ7S<9MWT#(=aZ6~x zu{;M8_{3w|_{Wuy4OEpuftO=K57AN;hoe5jnj@%_E_C-t=PzvNGf61S-qso9!0k_N zCCUpH{zfkO`23k<^1_Af)O2*!V#kW!>8PAxOfa7YU6F#7sgR)LYe5 ztlDR$!#XeG(eHD#sGVe#hZhp~%Ix zGB6VA9BTu$88cHG&!qj$a@OC3@sIZI2!q9x&`?g#g!GBQJBG<1yYP2fx_38Ga0@%P zAs2%tX$zG^3yjO5;oz8@4p@!4yrAeFzHnhf?@|ivxkr(g_{J7eFkXE==`URSH2Lj& z7rMy$ix!5(1mzkn6n#a{hr7Sl^;+k)4y%kD{^;u!B7eT)^;55N&R%;8U95INg;Bju zuHZ(ChP2t34o3>@S>DsTw3%GF5eCe=IzKi{{ztd)wlIRth6P$e5)a+&(&cElpZZwK=NdajTb! z7&L+W%#<=`q&Mr}=_>AA4Xb9CVCJ3hC2EB4BX^mO@m?^aw-|ZX;>ah{$wG!rr_3>v zIj)NZMNMnH1uH0_k%MQPzlqHM=HUOw*q4CGRaN*$i;R6C3s zP*)(%+uN~nwgL-OQH{^ILGS<%^2mcFa50eZ4fg_Mw1wV}EcHI^Zi{Kul#bPMmI6f? zwH5HP9oFR_Pp(WB_T2olKdzUpj$@5WJE6~@wMvw;s=ky-+D$P0wQihaIo;uG)S0G(OV!1GURa_3Rrz-t>(7CX7CbWzNL8^QA z%D;T(v5oRp*TQ1P_*3Nb+zTgauhZizW>8Sm&cvay-pG%KUe=8(cGcgXc<{pg2Owlu zyD_;uu}%a{8H$N~Ga87uNqM(_0U$?~li?jFw;0N`rFV;e0rGQ-`wu9A(rOyfd{u}5 zeu}$I#*KIs3(G^ng*~$aRQc()Ab1z2afMV;tm*+Pw~3wBO02H?FERAN0OLSI-jvz#Lz)fM4I<-YGgxWgq2=N_}L zpSNPgc>t8Uda5&Y^Tdl|SC71|Xu@s5SKH2AB583#r9R`o*^K{J^isxLqe$e>*B7RhTch3!(085? z+TWJH*j?DQ z{M~3?je@F64j&(_U4;p)25Sdi)Z94d~wuveNOJuUr^ga|S@6j{I=i zHuT%6jP8uFzn?f%(GTmkDWBE16&#oYN@Tl=*oQRjAvYR#$4lUYErcD6{KHRxst%AL zSq@nD|M8tik0GI6_Qb-7?7enj8$8Awfbe#02Xx09nKUleQb}u?#1SwoUk@X*^J+Np z4X|Jr{O4VAdEv-b`R)6@xV3la>IGDJ**O3~<(jZTHCI=Fu>UwKK(4&`$@6+g_Agur zx8)!$WwBz|<7K+BMyxBzhi?XjHy?y0zMLmN`r0rgBu(7Bx_8$>xQGEb-T{cP*TC^8 z-bUteu`4tT9TZKsAl=a|3mfIpYZhi#5Aq;8>J~zN>Z8}M?1|SbfDsEM0dBG;30?$q zIEF@|WmnqgCF_*zzYB)twrk;IHpr9j>v|!g*s*b>_wKa|@D?<Opaf_FmpU*U4%RBee-(wsJtKQ^hQAXJ23L9veoTWwyD6< zHZ?G<+Khh>7Q}I9T(hs;{`m!;0+|YriJF~m`OGZMTJeVC&zkmNW&Z4fPk!z53)Ar2 zq#!Iq2x>Q9U;!K!Y;1tw1W%jFu6goJ3(9lT@k+@2f7hMzO*eh$f`9#{1qJ>N0O~dP zyTQ4~6#d%u0hQ?S`F~LIQ+)w!QXX3%3mcG7(iY7UK>A<+%!baZ zo5US=z#JXFguG_`?En4nc5L@M;i?t7tA@?f+~^2k(mXeH^~Al(EjJIhT-f;lq*vSd zY#n1PjWqOvv4BO3W;daH7BoqT+1u#iGK_U|u2JFolIwqE(G%1tn^|A2zepc+_8 z?zA4FA6#BbrxGKJEkY3l>BW|lED%G@5|w2tDXK-q-L}R00bc8CFc)2V-!q~>qcSq-69({WB!O_E`pPc^cXl0ZeHH_{Z zT{H5>krzjPFmm6>ts@6UvLnIig^`bpoH8;!{MPUb!;cOB!|+YR9~({#dxy#49m8Wo zuMhp}&?7@%8T!mnYv|G;+t67_6Gy93z@@#DO zg4w;ZYi9m9^B>lkCuZ)Sxozg)Ol~GLbI#1EGt;a7d)3cZ{nM(iuaZ~IuS&1-t)f?* zG(EIxV)~5~mZ8Pbk1sm^@)3zL;1!AE=(gQ`qhW*mH;2YX=Xq4J~#SP$rPCKM}!qW1m1n;AZF2{T%)2W-JSisf#aOtHEdg>OfR=X9)y0KcLnrV2_ z-rU$XkI|VtN_6Kr7wV-fSRplbo5nCSjR=l6q?F$wF*cOBUadD=uBM_fnu#F=o~h^Q z?`!02%Ic7aEFWPZF?N1mS(Osb)J3dli-)rzCk4KOtFF}O=`w+mEmMREl7M43g<&S|UK!uoVv9zE1lA?=&E!H^o?6ohn2@?os{H`EaNjLG;G99~T223ZYMZ zS8Y!ypY%C`IS$~Ha&`}MR!|iaiq^X*W@%Tjq(R7<@d?!3C29w!8pL3@|G-b%|`MD;?=)|#xS9D2Y+#^)e zTZc6|gT>H#A;K1%fl|FB?x|~Z#8XAO#w=eX*cf9Z&Q`-D_&~GiLEB&}D3V+X%VwA# zsr3dL1$!(@RU6JKS58y&XWXgE2^4d7w18%+oHZtTMSk-+8a*9wAk8Qq@wZD6l9SLi znjA?F?>KR^+F)9pu0V{b#r@rG6VsC=h*tyjA0{!QX_dboHsax&!|iv0!xEc0<%lX~ z-d9W~lo-5@-Bs>(_>CP^jxQQaA;qBGP)B*f&`F#$uF?IC2v&=gabwm==3MmYx2tm4 zwwq2^Sv=Tt)wG|j<`C3uNR>m~T*7EhpR6^9Eec*NkZkbtMt>+6FNy0_&wZXv zrvoT%f~1~Bqp@ozC;y<<%f^~M6iWzoGG!|YY3cmmXmnc^MVN}ci90IYRs)@MAESd2 z9*$%}$z%Z6As&4}rF)zC2r3wywp>tZda%^|3N^5V_vQkS+>jtLRZOBHRoW_RKS6YW$|xG%-ZC zh$M>@&SZvYju=XWj?v>mB;O*6aXc4qlt?_S&Wop9Gv=Z;ht(X`XF};+XQ{LR+8M!}@Y;M17eVKa(c?}893705FYHZI$rak7cG+A}B-(10f^-vO z3e48GwDuqg$?0M8t-!qC1RKlFH&r>#6jQFD7z6|zf4 z3LR5J_IM|5V6mXvk}@W!fWD25e^ss4(Fm8E!I+WDBuqtHa@T1Zx#ns(=EJU1D?!=n zeq`)&wOU6B%j0n#0pDP2$7)N>v^9DxVTaH!f)6*`hDu&MRr`cESkZztieU~VtHlzX z@LsExcT@x%f<3`J$uZ(|FSt$>orDjPI43{)jQ z^Qq_+xFa35hvH(T)-ES0ZBw%NYZkQbvoxJvtQ4>%v8OaKjJ=Jx!f4ddTuH|vKzlc& zGuNG^xLutA7m>wdnGj)%7@9XkTKT5c;lN|x)S4z#JE%2fEw~f#%W5Kef=agq#5!i- zbCn!!PE~0#tZn!a)`nw%N$0UxEQTtY4{IMdPm3tyb(}F9$a<=t#=?Tyl}Oj@t|9Xf zt>$;7QG^P@Bq?*`An+o_XTrfc7EEE`MBp1uJnEr}q0NSNcu2D6psJTam5OUQ+D2usk( zSda@iu)I01{U89j<~>*ouUeB>!hxUuoJO}rV^|Jn%N_6q zpDlTs8nw^!H5SJ>sY|k6hZt_3uI@zhJYS08h)_*-3(b&+3Nk}#xG2vHObP>MsEFOy zY@{S+$1l}>@vvihGbufqLsFGea?|(JYU5I)fD}AYq!>m9A9H zJ}-Zk8l}j`Em#KZ6t4MLA{#Pz___U>7}P1^?O-ZJ30;9{r&#Tf&PA(T%vs3T+;IR- zU{dQPwLBNi+YpxnP!>vtSh<63cv7vF3wDE8u#%+e(E^z$p769*+>;hCMDI6ul1Q6D zsPTC1M$tM2QVQ*W}X`4+4-02FNmix{CXTRr#?xQb6P8 zdNHm?#Ux7F?pKS)gh0jO6eS12gG&^oJJyPa<~>D>A?z)o8m-f`bfR`RjroKWUJa!4 zj8&`=t{fiHJcQ;?nWWcWg|r;PSun)QV$ytB$p^~2A>-| zaYr|O9(IHk6T0$>sRMvrQC5s8(~+^CPRNxjqv!YZSAKh|ZpS(M4?tRot8I%n^A5P_ zb#PA#57r`C+H2CT_^n6aia)@Ub-z7h_qWdd$+6_kFMf9ca#F(mT*1jx{dnRO(Q!c( zFk3g|V!oKLXfHUCA_xX~AF7;bc`?}#a6+up=Bvi#lRou{bv^VuU<3h|gaf;lNFy|Hg7EdoI&zb7b~O$Cso*b?1dfDW>ws)6OMhhg-| zsG z0cemi&;Yck^$dI~kUZKj;;1PSv(WOI-ol=lR&X@I?x`FlVc#vWI+Y8gk?U4I6Mx*fn*(~pBqYAZ;YTauEm z;?7{+m2BoKG4Phr1wqL3-(OfiGr(9_a|I0Bum5*T@7y0OSan+zR5;C6Sb-C8yqkla)mp#WFlQKzj?wi~e)B)ebi%+(8E z85>}M6G?f|S!qk}4@&)(cxkJ)Ri-* zPkgPn^WHfKPlX}Ipte0odI^c<-3W^}1F)*NoiI%v^s zik9q+I19k`D_BW&&6`mD0HU}sZ;=2d-kiFsQ!HkzjKC@z?K)X}2Kw{?mX6y6zAj3{>|@V> zpbhGmFtK7r4?ZB*js0qL^~AS_ncmLA%Pe@DKx5wve-=6+C)^mKj2J3pLy}(ozI-0) znjK)l+Yi9pE3Qht|9Mey94$0VRT|AU>sEJxbp)NT0Vt}Oc}W@e0iJyHi31n(o_tAJ z{pT%>R3Ju@QlSZ{fZZ{g)q)KwRZhn|iI6HH}na%2kaF zq&ipzVGP&p4+p(qS)7AAe7K;O|2Pww~Q9zoWmTj z1X)C#w)1}tAGYowYv;xX_ADY>AO1BoW*ay^y%#5Mt?>a1#0iS&bTpe`)tB;zUR4x( z83$Zj0Q&bb`8%6?TYd|zQKWnXMn+xs$xM+0Cpb&HY$zHVrkh`exxfB3*cF#EAaE5N z;O>3)u}!_-y|&=j&34i*uRtaWOup@snu1#UWv{~zmvdy~z_h(+^P4bXgFLzN0KAGU!hc`> zrnXAni?U8u&`tm~G6`SKgmx_IKz;WQuw(}~>PVgSM>y5&{2xVwV*3wRp<`-fXpZSt zM9fVP3R-CB^$nxQ9Z*=!|P+!=ilYjXxcqZ)o)57U%nw^#v#cWc;cbr zjR&CU14@Lr3KT6g-R)AdTXB`VHI_tZnR*AF+Xko#P&6cAerLg@J9`RF+;`~0Lo)yGyPSFx+8RVS_*pZ@)9b^70?AD#ZHE9sjH_7Q{kB>rp}$(HT%l!m!@VW|7Y?Sy8Pth zv)ts@C%-UxrTpl<+t$rbbSC%-81sqE6T0zN#(y&Y(D;|euN|-It{RVz8^=!{Upw~a zv6sevIQGr4FOGeDtaJ<*b@rjrw?}`u3>uXIXw<2Z{~CFIq(AcaBcC7n=!i7?lM&Ad zF|vJRboSce-wi)I{Ex$T%^HV4J=_?+WY{`WW9C+w^`Eq1o-?FcEIfJyjLvd~ViVC{EnaLmyCGggJ&;tfh`J8z=0Mm;ujEMaVW4K5-4ph}Ml*#gpTweet-OX-Wr@RUmDSs{xzDYWRw+Tva(cK!t# z-4JZ!YqV zr)wBea6|;5&9%Cj)V8fEohw_zSfMO4Por_ma zjsw)ORD;iR70T+vP~>m4@|K1kbC6My%9sT@L+P~ka8#YbjL}5hWGv{L2(ei;KX9>T zE{l5XjWC451_7XTRuvN~Vi^>WiAtp^;`Ex*m}*6z=VEca19Rkz(MB$nF-qk4&(!9C zW4jOY+iZfX+un{QNbcPL;)qt#k&%i~&k0}?_| zU$%?3@*J0>Px?=l9;szHtdwE%MMpK^Ycse`rH8A{Iub^WRyU>(umV1;DNnfKD`O^G zG2Sf4lZYEx`PjVngLJu#2$p!IVDrT(I;U45%DAwwH@ zxT7QM@;0NZ+!`5g3M^tQ_^oE%946L$Ta_LxWUNTsm~sV$`8*E!uFqEuxm-|!Q--N! z_wimbTKDJIYq}PUi3p}oCRk4+mz5Y~gKF;Nf_8@s;~Y{tlOWlGi{AbXwcenqlVVwK z(HtodiBj%t)vnA1^>G_otrZO-;VJnF^x6kD&MT%sF3>1ukV@9r&_lMaI#0N@;S7|c zbu{32#r;JpoG~QUXp1_KBs&OO=F1&#GQngB>UFhafhe8?6O6q?m#k@{l-Fx(E)a6r zPC=-sz$rff@DS9su7IycZ)_;?3lv(gdNW{sP(Gplk+zm z2{f3jL_JMF>x^Q0hgz@S(`lmVN`mZ$J$a`geL+a00~9hw6ta;vnlLkM=4`!6_cdBI zlx)^L>3I);Lh|&8Uu}>N-bv#)T22+rxollrwOS)rAe&1*juruM*wWd1KiwlWr%ym4L;NHLcQ0d&-$`+CXCIfGrlGk-t^iGH>F1PE!Om zmm|fv=%jBxk7|9h^ESHxW*y5dAJ0mymq56C`_ED{eTq>khM}O z6-rTOo2REA(&$WF#Kkz>u~oB?h(9^DL!;|cMyzTG6BvBl*+7O+?W&wN*DzshtP{`H z@};5;bE*$=oHt!FBaUoaUyj7^`5?}3w=bf(0>ek6JfxwD8*3dlraeV*UOy;Xvmnty zU&Q2TFsBP@y`FBxfl1vmiFsIGEyA3reTm%JLKPlc16&K98;u?eSKksiH}7(z!LG+% z4aI%>QvT#?Kn{Qzb8bLDga=xzivS{yWX$fRw|pphu5j9<=|2xW-~hj4p3!s?pZ99x&CtucEi&|s)mGKv3QBXf-cN!C~go-URmsTKdEO0oHj39RY} zqC8;v_hDJB%No3wq#)>|DT0m3S&KooaE?BT+6gI^apR*_MO&`_h`l=JNCDI;G zF5+;tAad#$T{NK_uaB3Dovf>wo2;wtv38=?jH#7wvxHj=l1}vrm9w@iVJy_3*=WTO zn|EVrgZf6rS*xWso-GS?p^=8%zRcclYI3r8m#+J$T)r9M!l^BKu=|Dzx2L%^Qq$>EyrD=z(?|VGZ86+v1Lx^C_>k9?k6{ z4iJUythYpxFXp(1 z$CD*mV9|)TYRl|-LLCURC(QCSyW8b6iGdKg?k#))-8;jw>j+dR(F%PISVg(v9FXfLk+6!(%Mv4Owi@-)nR!fZ;`W z6^RsUCLx7l+Tp<%%NY=hD+Nf6O=BoVxKCHxX-Ek^#N{lzI)tPT6FZdgQT880G-bm5 zCNpWUJ38fvIH`S%4B=V`>k`3aTf$5x{N$(9Y7GQmM5&~|OLtp_U^GjrZ!8>BAX@;{ z?!nr5t2N}vobnO1JX}5jdjnhxYBiI|>&$J`#-EW2Mtt6A$_PZWW2=V~GhbHQ$;4eu zG$3>#&aLUMQpWA-_RNG7IF5+3S+hAa0LYDL;{EUr79=AbGhL!wF$DcvO^U~tE_<5B zy3jkUpoakqr2T`BDYb~9oofp;88H$>e69- z#g*HoZDI4Y3$r0cQ^@C~VnVx0dXkzTq$FasLLujfS=t>dz2RJy&N)ma6p6sDDS1L- z8;@zDN%JNnj+iSR+SIVSjG5?vsO1Gi%z^~a7E_4ED^e0S{!yj#f?L8I!FgX;a_2L7 zec~kbS(dYzT3w8_L@fw zCW2p3i_>JBKr3d_wdwUCTg!|9xGwvU+MrOzU9(6r(qBqv zDmg0ns!E2SlXQTAn*>=8iGsv_`sVVz>xa)7`m$mY!j-@w0J717erib@!C`4{qZ{)} zF^4@N8_w&mzv+tpn%MzX@9+g&2ofy+%e8_W9O_@V36eOqAgly}Tr7Y$lmiEANbY2I zbQUGZKO5?=-f;XP@{3z4h^*f@vqg3f_dg7m;mgB)C1cTL?`16VFcD8AN5-v1ztaW} zJW5OD!U!}qv780L5$jXE%kKGK@B?>_^<$fq^z`up_~>WDn3DY&l2muWT?l+|&+BhG z1ts72z<2zj@=?3^*ExjC`zHF+kRvIFL+BHP+@v7@$biOep7vs1?%X;3&2kQktUqp% zW68O@I(hq4e>F55!gsnb&LGR%4WuE^0021vp35@Thy32h8MHLINNSL zXGRt#AOXTJ(wm4xmDg%aw1m*EaO7ynfwBb@HDN z^;e$YS)udHoH}*+*uPACW!ewPsn3L`l!K&hM|}SQ2y)Z1*9|D7rmOOm$On~G24y9| z$oJ5y-hUu{2x`guB&P%8gb<5osRC)hA?Ose=MoHlJHV4~TnjeYr_TA!w%&KKzWNH| z0~?!aW+puLHZM|LD<2oLWD{GIvjbk@iT7g~EH5Q59EPXe#f(UwCHi1N_khVywG+1s z-dY>-t(t{UrVIvr`FeMMgM81~{WYsUzyegqz4EEKEA!s|I{Auo`fFEzfVJjRlK}X8(LZhJy?72ZN_qTx4=)kY19%X;Qgs-! zhH!_rsG}uMQ2o`j13UmwI;M zsj^~ptAcPb_WSA5#P@WSVVe??!Kp7#5L%=4v=oR^R-Ea0Oewx(w=@8Et5@axodJeykSFsu z{rh>n38OMvAOs?tG$D~tTwlN%s1?4O)kL{1D02wOz?YNd!#608!+&{pOK-@dr~z2! z!yrRdgGRVqB+xul0LUGtj)R*(7N+iPdmlhcm$T$GpM*zw@Hg1f;~YwdKu&Z?j+3-d zH9Va((I(F5BPgvyehYMHkSFUL|9yV%ev8r}(4!y-QS}JYc@)AZ9;_QNf#xExSRQgh zhX%;%>R62bILieMQJ!@a%tv*-mD@qGfKv8aESGEO!N+5bt-oh>fGQt-{`|#v{Vlz# zZAvrf{RcuILItr1HiD3yfp6LxHi{>?ASnx8XvP2;+$Lsr$!Bf8YC=KWTGP{Setabu z_u2lbr>z^lWN770Q*TWLM!q!5gC%=rB0v7b_-Qkb%xqtE`Sf$s)YvCR|8vwVpZV0g zUmISrVo2V3PVVZjT=wGaLnHflTs?K@a7d@ygJGAFG{s|tK+Z`h&dlLBM$9o3L(d5W zoghgD%wvQep%4;f2oj_A;V9V4Z{2a|_kNvj;$(6kjp*T9MG$%#Irg6dpU;SyQlkd- zOsMtX*rftZqkyr)&+&p@n!^z^IY$#DKL<&*P(4pDI4+1w_2~B@41Vb7ZNs|le`QTq zwGSO$2R*{+OQ{3~67l4mgh}WeE+*(X1`(5UdWjbj2qc!EB}uD^V90_ZPI@(6+IlgJ#3 z3KS?BjFgase<<*$M;L+-P(TD z<%jOutgKY#QV~glsh5)G7+Qh>#4uz|5EIxOLMB86Cm0dd>rz$ZJ_^4LIjks~VYyzv zZ!F(Gd|hq*FqabW#G)sX#2n2?G^m?|&Cy9pm_ri?u1AwhlIM@Fuc06? z@7=#{rEb5fsg4{`hYO$!bdpHS!TO{z8c&K0c5II$Xl5UN=&8d) z(4lv&%l5br*%7X4X#Jrs6?j1eY+INT47LSag35R#A;3RLiB2Mkq(t$@`a{D&QIvf2 z&+qOyH0y>b+PO4xDD&PrT^c#qOmAB#>h_QXdZ}I_MMj@w=7dB7G=YM>ju&B9<&#n} zfl&;_OSo1KiDLT@O3%p1(Ra5Wx&$_a_f_=%4PjYD{#QZc7AukDY255oRAr%KN|k`i?_|3zy9fj*-XN7PeolJG5|#@?AhKO(by! zlovWfQM|H^Vsiom-vxn}2t7^-;8b}`+u)&kA4=#US@hWULq(|QeIJJ7SG42m6>4_? zNQ|PviyfOIP=SEY0s)gl!)}cTG*7~$Vd9dqDJ_QYr+oO9O*_4EC-!>yRvH}=Bl=)}EKAD`xi&$<~*3_bm$Z_VlCi~Rjnt6eUA08-mj z8W9liu+66-2)-*=i!33)h#kZK>n|WHIHSD+b{_ zH^`G;e0sy2tiR>R3BAXH%E=IddM|?0lg!KyeJZPZKdgpsR*e_k9eVAov)7q9`Id~}l?j@l9R}UBDb6c z*#b@kKVQ?oZs|RGN#Cwpt&5H7Chi7T*2vVAWB;n$p?^87Bus|$w1R1?o~J9Zw!w*F z1tM)`vO!BzQ-n*3phN>aNFxC0+ZWOO9x1|zDPU#?GE2QR83b1gL5mS0XX?09j>StE z0NL{(X@CcCt$w%w-}w5D-tYPT`HOcA1szu#HlkLn zr+E^8YIyYKGk&z8_uIU7=Kv5{?aonm#iSOT4|z8Uk1`2R&qZOEiXd!&r|2lSCI9T+ zZN0vz2!er9;C0o3O6Mxo797fg5eW86!i=bb9>~IE4)UN`V~d$rw)8gSv?isNnq=%` z!cHXIwYMsrayiz_s*;EVNE+nH3oopONv+A-dbcL}03`%k`X0tEns>4-V<>8*!-TCE zP%d{Hug2;*x2` z>Rgt3SlPAL%4=Kwb+dz<{l%YrM1JbX4I{l~OSuWd#-ISYs@P(st}`a!tUDofOU0%q zqRP3c(qFgw1FZe;JbAAChf4n)6_9RAt-lCJS5|aj5tK@-hvI(J7?A3I8&zk$X=P5p znp%VHcz`GK#21yE7~kA3KUM2%Abm&c{Y5}J1qW3Hq$4b~Vhe4d^$?NphvSIaJVOJz zIlz){^!*(qq?mYoi+pFJ|0lJHN1FX(*k|ihzt`(0{&wsiM_wBGvu>SYxcPnf~yZICcvsOT%$3EmTz!kGlon?rze+{@BT!8_v%5iTzR(Y>CJtz4@n$SkO#Gc;T-C- zWRu>eBO!n8+WxN9gJk*e*&p}x)_)52e+4444#T73*|}Ly(t%kK7g%6QCTekh*UHyl z2g_xECExcjcG@C(U+<0U`hX7GEczlTT#PZelqv$6o;s74UJr`)0oKAtpV=(~X4&Rm z|N8!U;G7JNs4g|aQllG?&=*1A?I>M@kLu#WH|&Q-46xqw5|!`V-`8*yA3M-L@#Y)) z(KU{gDcrzY<~YH(VzjH7m;Faz4PAZ%2pZr)7W=bzX`nyB&%!eWR{*r=P#8uM&^G`J z#uN3o0HaHPWw+B{wF!gV} z6@Cxc-SF<<&9F8OWup!vUa+7F_>pY66@GtwF4#H8H5l)`V0>D9h!B?^BC=xF8-mC4 zkOh#%4PCD-o@1llyt2YJoec4K@15j4$1B>qF}?3I$KE0C=ud6PDvufAE;Om)>fG_^rjZTy`fc&H$``X0+9Gs$nY;%o9VEk13-|OMyr=Kcoe)_u zeCEstkQN6bZa90r!I zd-Zm};8NP~(zij|ma}BTgIl%73Dbk>LHOYKQeUzKJ%`~1bBtp2@FbMiw3c}QS}?$a z)NgAcx!wc)OO)&9!AX#z9$w>&#YUs;Vm9v!*+rD()wW!BAIKQs$(2`5gFEO=KitxL z{XSSh@WOFWfsj>KP^p+LQCMBTiU=hTfvhIzfrnsz26?jKrx15`!7Y#$Y{Pey+pIoV zadAk=9SAn)w9Q}Edh*GKp%nu>2oXJX@$qkS@0EvPRf$oai1AL}n>H$1pX`KB+b zQB?#u7{84*k#>7A6(H5t{Nnqd3(HyRCFH4dj%8|mU7UsW zCy{yz$MN?*Af|zGfS?cIjK{(&H};M$D4Ggdwh|<(T4v@`-3*?#@MOLfcKZ$5TKUA2 zFuwyl*`T{~(bBP{_v({y+gMZbhTQ=q)o3O4^;W@dTkIKNhW`kDJHP{Y`pe)XeAED8 zJU@a)EUwt;rT%>YB|;tR`=02z%3 zA4Vq?qW~OFm91d|%&EFp8G;T2M|UCh4@-Nq7VYS<@~1GT%USY`Z$hHId)MExy;u6F zGHM`Z-BNqIJeH#HJY8rqRZGx_(OP?-hxQKeWZecQ+`W%oIQle zwGUoj-fu4&C?@mID$lIf{nMu2dCzH|-%TJ>Gg-u`w6RW?QHz*b4o4wtY2o_zRTy=KsR zA@&h03~vt(5&Cdpjf(&MwQUP{`!-^903lq?_0V9<>dRO zKd*dWAed0U_uh@YFZ~+EVw-FK!EFGytQ~1Ac&v-+qg_X`QcTp?N2V_$cLZ0 zjx+2U>lYkf0G}{)VRG9>CqZ{9b`|&L=!d5xRgHz2HPm^yT zVEg{#i`t@4aR1bv<}sm`M@!9GP7=jBBvMm)x_fqjEbkl_;QqM&zAe4_%SvlNg%w0b z74JVR;He^Jt`oUzDbw}mB(+yB{{~DE13Y=Zcb{@rdtp=0{ED)uP68?FmYc1*JR;&C zU50SGgkK`(0l*6@qbP05BkEGFf6{#|+NQ8=Dk^$rh?1iJ|; z&Z1Q;M}iB|kqxr%Xn*zULEd6^$ll#Y;W($9s}&Rob+#OCsbOT|4kAT#Dn)~|IPHJ} zfg*b3eQLS9n7nY&K`m<~{y#8zTX(@&sb;H8F5|IbkzgusV{*75l~e?-l}~>Y#%h2k z-?#GyaL7A&m^d zZuw@e?G15l59)*jR0jN}E0642e_W=li|*L?t?>oL-R}7#<2%bs3AC~fz$uUCPdw?(=67?Q5kma%>u6Q*n z@^-B|9=EsuA^LMV`Lu~6Yd4xB(2IB)Zt;3g)|&_D;w-=x<8ol)$nN#WWhx7JDaF{4 z)tkUTfq4s@Vo?FdPjAkfH9-FWqm#e_LAG>LvFn#2NjUjK2>xzI9oKAaD z4(Gc5mIu7n7T4=;1m45nmm7*Ze&ODlXXsBa8YdJ##3NH13mzm6Sv6tOz_0<%jpjT+ z5Lr5k%-!pc%k1fHdJYnv{dxAt$`ed*_n#__JvMEgxP9bz!<%#_<(zbe`qg?5sX}yy z^mZg2U`>A97D&ZWIkD!*?%4q{|C}q`K{DSUoJ*K85s`odTF{U|vXYh8+56UxBThi%U0Gkzgrr8pFAx8CxHo)g z_?qF;aCG?m;XT8vhu$9g<t@_5089#?Y-ng%3_K&-{0Hyz>AMsl5s z=jCdUEP+^jR*%pm84>MWdVjIO5KF(sfrsvPCJ28f4_E zH9H9EFfth%3VLJ@*0M2J)7xkdSI zQ!G%xxJU{x*iucijXH0WMi1KS7>#+29AmVE8D#UVi*np1vs0v7yj9QVvq4jSE~6F4 z0FtfSiiFsP$sQ?6J9epbBX12L)uP^F4%q;HP(uDi6=R$aAl{;>mf_lPy2sKJ1+Ba- zmV!Cy6r>JmD)Z~v@#Z)3gJu`bz4mSoa3a$S$7+ap_WmP>YHLGT;$JJL($wu zswSZT7+4cY0CL08(;m^J>q{-vkctSk@;ruA3)IM{$}q6z5(X!`ieR*Gt+upJ4I6SB z91$Oii=vkgc|_WQp5ai-Gx@3=HCp1L*T-8?m*`MpMu$vpM#}OCD|7&lg(^9+=}C1_ zxEZll#sapwXh2e)1c45j)zD2h!$%xgtrhI>5#Aa15@t2#&&@x9krhNxDd#phnia8FQr$mnbsRPG!y2ENWK6 zkKD|>QEH%!CucI03C7$)&Ur?i7&=qU*PQ`tv4mS8zQm}4Il5^H-e1ebBmp5qcqh41 z1vPNfY{SqB2ZCjX$wya-3$$8kTRwuBI^h3?WqmCxc6vu`C5=lE$p}gB==QuX7!4x3 zuh19>6G78KmWyRPM7>O{JyoSsZN`Tg^**%ZH~Pd9?)Vpt-Vz`{K53}<^qkp_W`>L! zU4qQ?EoX)!Z6=2+z?}0jjqc(sfN)u^`r$neT;F#LY2!~Zu^dtl*GLhqwe@Di;^8=Bv;9jhe$7KRMcTlQ;Yr(I-QPNCGamB|`$)(TAu z6$B(`$`6>-dIxxQp7NGTN17QYpl(zYR1!Y!W=z@+fy@^TRV>UmAjmrFZJDJrW$gzU zLkw%QTh6vWZFMEdsp~Ylg^giU)>(214%*sGpQCRC7|~rW;E!DSIs(|umt|&O)ad$R9?6SDC(|TE!Ic^Q`Xb%ct$Q74)Le}f$)q#L z&Zk#Bp)qn!7W0e#a@g6*(b2TwX^oz6M391ov-;dEBo<5Ke^3Jg-6TdfSVx`5NFmcg zgqVM2UHgUi|1tLEadK5v{;A&5>2!C}Njja4K!hv=4E2`U0wL7C?|Xre+N)med%c38 zX_L5sVj`1VMSnNxT{ukK4H{RqF`?~g2> zbM8BJmvgss&-tE+iqv^c#iW$3rM-+t*xNc5r3LodvLfwHMSP9S1)y6z9I&;ckA}fy zOt+=>n#>oVF2+a+R+dedGA6sXE|WDnQf2}NT3gvfC`(3|maoQ|E%91%%lY_s*|0xK zW;>KQoMP?qU~+Ltpu5yc+GTC4rK%*E(dXBW_jJh0+LO$*E*S_I>bp!qhX1`HEwfFoB? zl&{`&d@y?O%+sgNCUuhqqVBUdszfH1HK&4G@%)l{jA5rH$;7n2rZ$(h&-I#Q(*W2t zr3FayoYUIssO9#DMxR6OW6!PMVN+y%HbUMon6$Ngk+sQfzrvEJrY6v;Imm2WuSz%> z+k<1uGplfk4G>DABm^;sEarSN-%eSJ__tK;N(rF!Rk{S68NmbCau39o{ERzV{!6#- zaCzO(3jdH zjYMQfw)|?(q`HB7YZHHi1Uo1X7KrVj*-S#FB>{7^kkH!ViC7Xj&!3${FK?TjST5$F ziPzQwX4uz%zn;@y2sbr=FWh??FtDX4x16pl1e8@7bE6(b)*Z83#url2(Tm@Mizxrj z_P`F1!22%lCuSIXzR(jIO?^tV3P2;1dU)K`e(s*G=it`zf7WfA}i zuXy&q*K@_Kd|h}zNjxHXf8FULE1724R(2YcRSJvw@pfpDh=-2c{_$Rj*9LCgMbMps zi9Wh$WFNd=hlcMO93FbEUnYt2#tt*??bFDDfT9ku{|uSxgi9e^T#-f<8w~xI38=4_ z2iSr-;kD#_V%8;D21cS_m8}*dnR>)Qw9xU;>?*`ivjD{?;+)tyd123)^XC-Y%)yCi zFOM&XEzM2Bp{o(8WDX{F5FGoFL;(scqJodtW4n;~n@^a~_tFn27|$y zF?jGoY{np*u4sXQb%OUXLhn9ZLVH%cy&V1d*}H{G zGCQG?pzAw9EY|gGu^_Jy!Kj~w*b`HPO(W~&pmJg|SZSZx%{_SeEbr(G^X)PafXz0I z9N=IRK6}hzV@(bN1o_^%b9VDG5gDGjUf9BYuygjxUb8NpZ&uM{hHM0s%2Bg63(g?C zVzw^h7mtPH-UB8FZ@gEX0<8=$>fb(o;mGx{Abor2=|Rb9A9ns#&J06~pJ|%O8UqP6 ztdw5qDK|B}F<6N{tDapszL13u_AB9KMD=}mKUed%8yHI-KM;?lC+9AEC=0`O!YV5O zGSFB_Kj8o+74wkfn@?WB-S6Oq@C%D+-s;~jt7;S#)YK~!6IQVrULoLFLJR6DVgdZ< zLtD{-LttOOPYa4Zp(vN-1v;BDN!2-5unGA+d*4d+v%E=tArH+w1+D;3erI+a_eDMb zajT$CDX5S&?6?p&(4m`Pm%Nl3Fg&Nit9*_|)3hr!4nx-A* zmO_!&#hj3YzBgCDXMt`I^HB8Y55Q#jojcg!FUNPS8kCc*MG&}YVbFXjT{)hf9Q37 zX1 zz1I0&4U(Byk#Z$yqe)MN)ZjSW8{1D`1){_}boBW1ySdk{;&)KcEk2kUPvkmXiN(nT zfU6k_3SFk&Tf|nPdm=E#A|Al)LN+yUTwV(~XazxTzTyVj2Ae2Q!HMK=f%@eoAL z!)mkl&^q*A?peVJc#U_K&-1+3#dlOsVnZ2r21rXe!N{E|05lSGH|vG=iFv29)1t?{ zvw|1!4ex>b)k)v%2Jlqg%ZGhqxynen)}hjw3ggiN8etr-{=588Q4tGb7-o5`{^ojg zn}1et`+P7k%lj7Z<%8RC3S9;=H?d|-yeX}f8l+#S=R^<$idbl7{QH-oa`056|2YJW z23dT>J@!*p*i1nOLFvJn6dq6NabZwj34t&X51rU@TklbJ4bp{A)$YKy*#X2vX4n64 z&+JCY@={P&t5KOqHcJ@*prdwZdUh=`MrX&Di8$zpLFK# zp~&jUd_f&kAW0lncrh6r+orK|`{J|kDppS#%u=e@Nj0np`CU1{8EW1>1m#jBbC-Z{=L+*%17Q(rBvDu`H#h2yanW$@6bZ zYc|N}GhSu13k#vL>RKKKAH1J;Wcgq97FuZ!DO1_wd95LwaAwgh3{+H1#@U`HaHHgGKzWV*d~~_|V?oZ1Z# z6x5rkdy2CwmWz4l_?jX-wY&@I^^O%`J6{o8)DLMJB|&h;>WA2wPY&P3uPVFoYQP6R z;Wf5yQk8O)HR^J;Y!z#TibMKF*bzl!BzbB^c*t3C?JQtDMCJu}LWHtL1Po-pYVBl8 zdbH^fzsp=dyK0$;1)^HD8-#ZM$;>1TR;p+G!KFD1YPKN`G&TnQlG4xIo zsv{z!gV&L#U=>=z>Hf-j83tEcUZm8rPE;3fWzB%}P`eIfh{yoVVA_hGhhDu7Wbo(u zD9FI)3}eZ_mWj4j1woS0YNdtTcR;H?SAkZESm1FBJ2~W8T+6*#;m>-oPVNCYc%3vP zt=oO4)oecRmqn9F(0pM5-27Y-wr|?)KW{u5AI>WUZi8eN1 zGg(MQMOuuZ2Il2DuI6122~Z4(J|s) z*paN@544Mg(U=|?O)a`ra?PSK$C!L<9b28So-y)2bQ*% z?pbPDN-SNwR5J3~$nlYT$1fZCmysLCe?C$jiHvB*?;hDcvSP`9FL`;%&&Nk`0>|+S zAcdoU$*v`v0cPO+;opsWhaVZfYZwhr52t$x96vTZviP0F)4y3fyZAec|9SCsixZ1& zi|NJZj6O5kUOYJT*3h#<4-9>M=nF%wp*=(9A#!NlP~YI|gTETQckqtEn+EHHR}Jb1 zKR!4)@Q<_kX2- zZ-0K-tNp(5T>q~A&HZD2@AbX7z3<_^@Ae(;yS^{g=jfC7ZR{J8yft=c^xq`UNFI=U zeQZwh1xagsujHC#Poh1y-?nNDs`tR?H%1TanOZaoE{t$vo@SLLOP;U?JpM|lodo>O zoqKv0UsjpT1So$nAConj#v+>}e{_m&$&m2Km!m>ab6lldY7ppgSAhuRE8vXaDgn@< z@`c{bn^pR?a=%M$Xf@6GoFi)cqfp#qH4zqey3tlf%yhk!9cBcE-IAc39Wtpf#j~A& zie4`f>;UlRQWhp~kTdJxW z66&vDofXn&cF9Zi5ZRihnZft5AVo8(qU-*a+REDC#X`2`C4pXVRmifz7cQ$5u82YQ zag#vLmm4%wiBTS*U)nM1ZXQFq%T zVVUtLmM;&qojgK=wV}ybtfcbtlpw~}%$MSfE-p_dQ#x|#2BEkt!xF@_)*oousB(vr zuSpB#rJiV|)H2s8lQxi*Z+irnm$B^}ZELziCKKf>D|1REE-ou6JDmW40VceVDUsSm z3B?(Yj%u={pxj)@r8|0IB>g9Wp)XgckVE02?e0R|OK8r+ zbec){$zNdk6tw< z704+E;g4qH(^9z+Q1wU^en|rtL@GnkMw!|cO@+x?b}``EL9RHKGAm<&jv`#t_$V`* zwSEG(iXz=XO6Q1LgC>)`){<@KFr93>?UW3zcWSTI-|;8xf=ZEKyde~{Ey>iHa%X(w zYxw1XCCk1lkybS5s5Y5#k;HB@{#ml%*Q!;@e8{79=9P+bgh3?ZHY=esl(O1bycD3A zv5RnVqOPTVVOb*Dil;L1=+xhFZHQ`GN^2|5SjtuPs@h5=ez@ZE13~|vkvvE(bTUya zutYRwXz8MEttCY4*ewVOTidkXuCXcskvb_)?@|hMU!h60ng(@E6|AKSDa#6>KHf~i z=ToGsc9}a*&`X3RiEsuL36II{Op?=-r>462=^l6>OQ_XgLJeslfwnvtGp5RdbfvpQ zDC_EQLdDpW(fqP^Fl)#kMT^tjrTiEjuRAv$+!O zGdA72yvLo3(_5fAd?G+r8ZWD~`dGSER);lu8Mz17UK*oHTPZ zuDrJ0Zp0k%DjUjr!{ww&1x^#t#Xt>N+6`S?S#8ucF4gMW1R>K9fk1_6RYWB-U;LXg8g(FtQRuCu?o_ z5a=e~fL2CPAic$Op=wVV9I?rr0@*M1=&Eed*LJ&;sq7_q4BIVVzCzlIE+*fQwV>6T z@rz-*<)Y#=2yPb41$jE17@EeI>g|?FOO^;5O}fGzqdPH-CtSPPY&XboP!nmx@wA?e zoAEq|%t9>m^uDqokCjnMA~H3!3w- zwB$jdcqZ!yM2)I8RF``+snn8d1iCX`fvwU|OI2G*pDcC>-YVPmh7WE4+KRgao)?gI zIkk2R{-9o~!$U;QC-uTZoy8>Ej9*CG^=!C6(0)ymgd~hQhHtwD&F2tj&c zbP|+hiE1nxU$OW96<*xhRVE1dy9TD&NJRj6KD!Y+p0umxsw+_K zc*@|1-YL+#9>Is9c2y+cy`AuRJxOPHzKZDz$gz^d-Y;zR+*=nV#iy_R;uM@G$?FfQco)h zfTv1=RmR}Rl?Z%GXa}t@lI|AlV!2Y#SIC+_kLi_$zD?G>`kJbdahD^Bv7G|Fnpe^3 zX-B=Lhg6KDl<2=jU_=dCveCAgD-Lh2)09)VLhVWa-z@3M5w z7o!_SCjhw;9Ume0y@Kh=csNSrY|c(n7I7#tD$gg!zk(`X99jn(KjdkJY>NsP*jcBBTtE<@AlD6IT`19L7dkbVgF^Wu2b1-02l`+pRVmDhh8b+-fL` zG3TXNOsmw=l1+*#Ce>*N+LPP6i9Xd}gvDcdsHm$#x=G7s8}P(nb$h6`r&^YcufSro zCBj0go$~1zAG7{#`*&B^7Qf^P1Y02ZZvve3A$#yxO#`>{Z2bQ%?zW z@V%qL%6P&qk0${*dUP|UtMalM;c`{0DKi5(F|!}T^N>|#y;&-03Yu7V5CCrzdnVT6 z-&JWSCS|Ben>u+}?x!|Bj^!xXP=W}tOuD295KW7Gg&Wi5bS^hRr3fZ!sCLXW|dQnNo6r~vMK=Q>=|r6 zHNzWh7P3(E4m*C{;a-~&Oe7gFUt-gS&PE0bp|aalH92XiO^(jp5ARLa?46w$U&ul; zmqQ3ZFVWupdj)F^kCTEeKDwgYrz4XtO+C$oEp&)Px8DeIZu}g)TZwo`vi3KdxnF*6 z_UfK(JT-6aNQBgCH^ns7%BFHgfe%K5lF;zCMrMZoWBelCYzP5Wd%?a`nD6mM%2m+OHC;Pm zGo~_G7Tta?JV(6rCEms^W*xn59ESf8V2o0iJr`fWYKAyg@fY#6+GGup0PfUznG$0 zsYW~=uh~5z3QM}@R*)p-q3A2W+lj9D>>C5z>aXx`^%W3qqz!GV5mLVC!EAA4Ky zLwG{@3{^T!Q*Fh3iuy{0Avs39j6RB9@M8YLZox8sUjS}(D(R(59-2vjR zbGS9%=BFSCs?7_^T4Rj{l~T0Jtzxng%cCQ=!d(9Bcc5(_Vo9lo!7NE5SkzVEhgX2wsXMUaFzdhFGb|XXh>ZtB~p*sHm88a^%1+?o0Q;Pw;D22O5iC`7IF5sit%- zx7VU)ZORTWV)eOlLZ&$LF-cSkow)V0@cL2x##-)y`+Mt`cV^!rkcpRmWzG>~NmouS zZD!r_`l-1YyBkJ9%!6pid)3^-ck_DgoY}{NR^SOPXKGZ4q>V9+%v($A2pCF!X5M@h z9*o31RPi3V93TXEA+X+D2SV_AW7caOehN;8AyrvhC5*k56khN|=>egzIioUpb0)BHf2Qg&4#6Sl`yg^*S1=&c@;=aO<2 zL7o{Ry|5TWJ-*O;9bL;^@ne{DSh*IxvuJ$nz`yl!P(~NMGqktwDFn*(8}$Bzv*QzS zPfDGn=>8?Z<9^+@?LLTqDBuBSD5?I3BcnsWACVY{+)JZ0@Dx)iH z%Xm!`ioOBIpQW>Kb`kRs@%2Al#${%CCksQYQ0>r0Xi!bMP&GGM`316ZKSvi~}W5{))j5&qt`s0V8t|A^h4*j$j&Aygf`v^QsL446Z z9(V)C7vPwHc_%PoF18l zK)J`@3o#kMpPUx%Pme)F(#F`#J|5cwCxR?B0ty2ePni5EUqJ59B#`HE_+Cs#2Oq!0 z&i%*ZvtG$W+@9_bw5AMJ18E`XNav993HU@z=3_KX+z+3ay&XPTIAEs+v-9MK2a|)r zgya!#AD?{?A}1ZboXoD{VVU#*$&{1Y3wl86r=D3Nv}yw z%H$t|Xk7Ro!T)R5$0vM)eX2Wajop8tQgTH-t)^2nY z4)FH_L?J;#fAP%hidAPTf@Yq3X$@MwIJ^yA5&vJVkEq=V_JIRv+j9{6=m@%{cAX|0 zX7sW!34y9XH*GJNQS=|M{3M>6UAg+~CC&`Q{51q(LMDioJ?Mw*4Uk=eiR2tQKcuxX zckrZ$KoLm3aJC}o`1U_C`d@3`yAMCc_0i#Hr>1Ez1mXnJ><+ zIbTJe5ddvJYf&^~Idm#m6vAoI*ozRc>IixYPNN|U`8T9apBo^k{It`Tmhn@Vnqtc3LxrzRXosZRF>rkDRSmUIfD{oA1NH&R5=2a% z5OzKu1O{&!p`^CP(4J_KZ9Ag?!Ii^;94~_)5f7r76RXjK8(vw7%5iQr_nnvd#(8G; zod!w)^e(mvsKhD8Q?F`@{wQwT*ItK3S3iOA1XKwIZE{`{BCUinN3%{dWL$S?0u=@= zdw+KGaxods7rzqxboagwp}rG7N0CSpP9+;l2g+8OP4eGOqQCqFdRN3l#J~3OPFgRo z=fZ#Gw`Ay!mGj+^c18;_BP0t{Bq%oHmt#4<_#4;^7P7$O=?4C$ePBKJ@&D#W8^&k# zyxRC{>OhI`>8Y?+E6sc8D3;@R7sf}-1MJanUWnd4_Q+c9=(|uMUX9nx_edvJg8ZF6 zSH}}>s9aui4jniNJuN0fkNnqVoa8@wKUruH4|am}E>G6#Eh6K!IuZ$gyd2E*YO)b< zsLwoNh)VH}Y=XZ>-~WK}!7+H>6!Z}m32$P$szqJT+MA@VYDSW+u!S_=0rSj5JOB#R zod+1fH#SYnUI7pdOW36X)+;1B;l!oB7_Nf+E*SlPmtYQD*C^YpX-zSr3*I;+~G7%3QJRg9F9(*dcp8M)x7uFKc)eRsB zuO$t0)>5S);>hS!CNv%es%(I6`r!z4lZb_)@BGu&!<{zqbwFHS#I`);9Fq;DF@neks1U z@mb#YZG+#zmoC3lQLa(eu%-mgf?-)uiO*K?l~8RF4;_7Qax*HoKC_DZ>B_F5H)VOG z4_x7bI^JeUTI)+D%ASH&7RQ1PPIOl;7xUnN2AG8|?#Z>>$%$^yp0aQ2yd<+pU)7UY zl}hh4#iKSre(N3gs7a`jh}T1Y<58#Aakor%VM%QgatM&D#vBQk!Ci*XEd1@z6x2e@ z0~6g{0KIT0I3hArd@W!xjY-$qcd-dLW-i3v)p^_Z*dEH&ayR^95&-bwW74c&?Hg)DS(od&K3JjnE`8=yw~ zD$m2i;2y3PAzv=(mD$Xermfxrw?%$F|8@;D?ZYfs!?5T1?zNy38(_>YfXRoK6FO#1 z#-#3+M&)L#S_<7D>8?5tvJp_^nK`|{&+W`&Xr{d#Tjf@)KdoiWMUrN}W&D!SYev2R zF4k`huIG2itMOrrM@_(0w;Ks(hEVClv?-L)D%*KHET6v^>MrJi=l#38xHm5b4O@E= z)EVokDb}&Io4I6_DFp-85N`Xu+q)~r7jjT#?h!!H+xq5eZt9{g>?^jJeFR^Ro)hzj zT$qq!M|aCI5gA4GKiJJZv;$^kZ?;I`d%+31Qq}`bV@Q>XbSjM&lR=-_1m8Cnk|DGQ z@YN2;URjU+x~VHTDz87kdmdkzOXe#R@C^`v-#VQi$JOa8_ zLFSPMJ#b)of~Uj{q%IdC7B!$@MtB$q7I zkW=NX&+7o3J;H$=ly|o*{}A=WXCAV1Iz_h!AH9zc!ovoHjGc8v>3Wkjl`T!LGfkjx zDB*iCnRokka2Kig@8dK3_>eLD^RleI$k0xO)*G~>Od)3y-MkaN7n3oT^s-C&@BK6T z`0%&sp7s<9ih_%D_~M3WQ0r66QfSB3UBE%QtUJC;#DnACMi^_}6a0^t@q%DqCP7f6 zCn!y_b{QQEMD-52MkA9eAgBo{A||7wf4}z%2x{tHAvx^o`afz6S=UF5A$Q)&n{JRG zx2Jm*+>-&h*ayhPKKQp|DL9OF9%Z?Whw?d3cLm&&&sGFU`j7SCpXJEr?S7Qm;ZAS& zj*rrlybpHvv*`(Mc2Gbn%^z)vAxoeOwg*NJh5$bRO65o=WRZ0Q%{(G9B;Mn7^@%`t z#pGFwprccr-TzO!Luq7gF_MP5qpO)n!QOFG05#Qd6fAiMX~{-l!HYftzmg1fS5BU_ z0Fpd1DqQPtPIQMh-F@9Dm@K;yZuLG8q|0O@Jn9ly3!pcVF4Eny>TFE(l4b2SY<##- zri}J5p|3qh2Oq!wDOWeHbY+T4qni49=TSo>D@9BCcL~9IQdRC*( z9yphZc)j&UfFF0px}R9BgON4r0g(luwivzC!NjGGU<65)%&kOE$GWQ~&sqQi06ulP z%a;S}mtN-3!7{*jvJuF;>d>hHe;cw`{xH!6{Oz-HVJfD!atFpA%1h9`R2Q(jIyn}E zw4Ff%K!3$~J5R@{Q@7FAGTpVClxJX(owX!%&7=U925PVvU7vv-hG|8^=;t8WDP&Xy zSTWK}IdyuHmkGe)XXT=UTbG=&K;@b41k6zw9!Ss%st;-(rX3_?OVybveubYz-(tGF zE$eJW(22*&yU_PWT@z?yuB-V7<69#Kb5sNPrbQwfGLgZi+|o9rdEu+k?tFLIG7%5P zklB2Cj>gf3VmGuVVst?I)jZ?WX#lkxy5Hzw97ewkU2%PP>SIz!>~`8fbhfhSrNdvN zQ2F^AKk*UO?AZumt_~e8cZXKE7L9Kjc(4D0QS0!Lp~pv>5*N4Wz-yOE*6&lpwt}xY z;WnUMkc}XdOcbk@Xd9jQS$E|o=?=M6er8Hrt*9KD@G5(Dm^IuB6*y19lg+-%Kqx** zx*+;PM#wwbf;*6_HUsEz2ew%e6&)E}1E=HB_ttPruI+-6ok=t15=9x=ga?kG>OulB z*TH8ZGCFn)9=K24pI39gyNgb($& z0=6pLw`!k82DmWlqNY@k%d0j)kf#QML_BnK0!~ali1qK+ctLQf<>P~KgXDG2omwo#HG-r9)LH^@`55W`ye9tQ%icAr$|ddgF*AQoK<=8LFAt6 zyVg@z$M7Oac>JRNi-x~DvUfBHPkztAq5gYtL4vX8qiOMp+@UFhySF8sNE5n7HedwX zAZQfYa~quL#XK}~8@w&v@af1Jz+#7;ntyZM$48_JcP(4R?k071r_Jq_c|10-SMs9n zxs@M?g*+trb_1Y3m!4e9O@4(x-$VbI=KC+JFi>h*6?gi{YD8AZN3o#zE!`E%#XJ<{ zAZ-5ajq`$ay9vqB*3=iIl zx7S1Jf$r{8UNFr?gXUzW!ff}_-ZJY0X?UB;xAGw!0l-cP2Wg;n8F>2o8C=c8WZ3K8 z-pvIb4b z2k;PuY$P>pj)+41L`&6MS0~ZqkAcF8c&PH+=eDCg{`XdM7yq2EjC^Ka0D4>7+bVO; zO2E}Hgj*_|$I=Y;dV3{mz%^%?hy^E-5lANTL>Kbsjb1hU14+DJHuU27$45TH1D8Lz z%GR^9T?LZy=_n9ySBs5WsbWy*Q^p#aIS#Glehq@foTE1$zm%K&4G3P(2b*FI%{2>c zCn-15Eh6P<>5VBoW-mX-*K8pVMF%hDEj#ansr-3<;e)~Fqi*rwXLYQ+MQJs(J7KhI zNp!>U?zZJ3q5(l2wnE1EZ>{FuJuVzfP6rS>^OVmFK{XX`jf^-WCPBBypM|=Jc*y-e zpwGJ=`Oo!S`B|9W>#l?j5h@Zi%KT|cD`p0t>GSiieLF)%JTUW zg)>YlV3j3`{QOvqiX zd3}|t56igpX^-yG@_6;yg|J1MSzh&uv0J7?xOK)D+QV*7uDO$Pl^YZ%cl^5)g z?pXZ%;)fQ0Yw<0MuU#BpY+X!AYKzzRe{0!~`Yen4hyFA@^pxbOp`Q%h+4uI)=ZBgD zo}sIU3`0AHRuBGT@DBrj8GJ(Wr@c*{^34tPOg#qDS3zV zXQ`$^o9p>-GudJ%Lu=Zk!4s2VO2^qQ((*Q7u7=V)bcJ>fU}bx(o`mUn5s51Lo`f_&2IlPysQO)WS*`$5ocgu^hG2NkQrbyU7!s&JeUJYoRcMiYpxu&X)DDO(UZ!=FJb` zAE*Z)m2Xm&a~b2{TUw5pZ|HfrGbJshZ#GOaz(;Ws^{8pON6snYxdM?QOBoMS^wnaH zF-)dx9epG%3)GTyK&{Q2c7Sk*>CLJAX$oM*L2+edxU43OPYJc5B1)31YHad~IqfJb z4LB-+VXGm?JjU4UgtrtVb2-DOaV_(ns-BXEHGy=+m8ZQ~$01Cw+Fg07I84;mL32UXHGmu-Fr|4RO zP&gbxx(sNSA;L0^>A7}AMHh<-FG;1Sq*=CUy+F?-eH6)>q|KPCWlzN~#nBl#m9Lnm z1KCo{C(U$n)5?_lkNAUnst}`-B_^GBr`4=8<-WB?&yfLe3T>FneoeVp(zx^PPYSwK zwnqw%2qcwNggvReo5f<-oC8pViJB?xBBZJcnRU8&|T$9qv8JVlspVL~V zP7$tFCK9zcYcf-ob{@mZsJ7W5KF*hF!1mot#vT8PYoj%gS|Z}A+Nq4wlTancKPAxh zHa+e47<7g<1nicG?LWYDO#!e+^kmy^h)YdoS#)?M7O%-j3xqo~%|>c^Pbfof`GinD zsw=k-b4qQ<1egk|R%K*3hBBwlDs{9eqA~ibnsTn5>HjvC zqlQ>x+MzMKt+ra;pH!YVBG7q*mQG)zsiK}VG^Z7pHUtJ;g{RR}v0zKu^|fGPRSnZs zol2ZCR9$9AQfo6xlWK!N&jdnLg>9r|DUT(~BxoFtmQ%&eGQwhvHx$8O(F5V&{X+S0 zD^EmKx_X7ssNR`54(KJe?VkI%$>EQ+Elu2p0m`$~%dbzgPUb+#NRt5@Ex=uD-VY|_;bLKbW z1uLiMXjQb#Zkmo)%%-@}EE|*K4;1x+1{`Ts?WjExRfUNyKNaZJRF<~u?e;WT^eRHi z3;qeyV2o_TYOIDUDRMG?v8qLYo)*uPkQn3s;_5wugxp=L~$#RJdVN^*ygu>u( z`KF0;?!ba%*}R`&? zB#+Y<{S_CdYoQv{-cZRIqosIUrV#Xv_PWzD%4-bT(iy^(Ui1!@GEE!IA*HL*WTOtV z*^^m^W0rDM(V8Tp!Lr2)fV=6CLh^B3p0aA}rBm->|1RC?$G{Hv6)Li zShEUpiCv&;2^-n5Bx@#fD;N%?FT)#Bj*@4MWTcghPDdkES6Ho33f)ghOHJCqWLlIy zSnK$ceM|B0lBIaaoU;%imo4SgD$aip%Lls$NxF-4t}SzC<K-QMR3cWIizEAO&NP{+UkG#=)u23P8*8ge;|v|$@;s(X8v%$bwK-^2uuw|o zb4xK0YfhS(Cel=)=_-)6WXO`pXfXC{PU>yw$hN2Gm)3}+Ka$<`OF@t&k*11d!2syk zC1W{$!8HP18>MJ>MPH2CV)|$~E<1_qFD2WV4pjkDstMBdq!)dzM`k)Tl|HG}(lIdj4FQ*b4$?UzM4>7_hBrE< zo>Izbg-y;nKORfeqS^8}FJf|; zRahgsK%%aTWl|M-`?A>?5JRep-g-zzVEhxN zoVRpr&442*%PPx`_(d-ZVv^HshCdtBOiH=S6wmBhCj6}1-_o1w28-39A??wn6GC|_ z-fpG*8o+zN5vfcep@@?vb%S=&m1aGXn%s>A z6=HB_cQ^8Za)5R-soZ(D3G`4y518qlgvM_u>07ePgd-j#>@^U2F!8V|UrDM}?53xM z4-A$B>1932W~&)gJ2D%$oT3{{L=8Y{DL>>-%@Qjg5$K}4n`#U#4mmfq_Oh&9t^f|D zHJ;cg{BFKl0^AOtqrt`k8e=YX=^891pVTJ66G9erdIPDZo@A!nxa0E9x+b7j!OLIV z>2l{*`i1firc4s?oY|hPR4UHQR2J@P-{74){gVTWRM6neXXFkZOx!(UWK0&laboI+J@fT`Ke)U&uief zGU2dEt2N4}idpLpdz=LK@cUnf@5E$24#dV?@h32EZQMDtF9B8Ewf0g-b*{9i6i$M) z%XJ!ks^JYol+IgVO27Aw?!?50c-#%|LR!7aQhxFx7? zvO7LO24qQ+YCE!dW5r9w;SuO_C*cuIMDAtNgdEOO-2a^HUIk7>#YUYVs?mbleXOY4l`il&usNx|J@_Aek&L`Fy7Sp~V1`nL|E4@Mqbi9T=M005hR z?VjX)jQAj4tfI*{)zFf;QZ}Ng#wm}BMA!cf^hQiZM{Yc5<39Ks=*>BSnSF)fOFq@# zGubxE6sTKTlXT?Wfuh-sZXbdk?))8kSj2+xhUYKfQ-@A*&-}d$fnk<-##N`~-Za^+ zDCA9T7LQKwAMmY+hmI`24xSp(=o;>xf56OKap|JITgEe^V?9a%TC5`BGSZfez8xGnV3_OcCa zT>6o%Z!Mj><17kt(dgWkkI;>0w`jO4p1l#G)i#XJg?RrlaGHU3GnO2>%p^bE(Dvz7)|{JY5if6tF=_yB?(LobZ%9sb_n63I3F6u*FhD;@7m-i8T> zZPZ4$+hn6M?QkS1b(ok2b}7oNoLjm4L#$1I-Lnn7q4V zZ3{s{$`D1nA`La1B$}Ck-Vu?}@sTxK&^bHED&mYNRS9qUABxlnQXh?bT|<6bKUW zutzRHlTLBvsX5rOt-i23Pp6bQO;cx5#OmNf&$s9mSgx0gc}P8V&czT>|LGN+VeK4t zBsm?%UU1c-dCD3qc$7hzudK-NGkR*HTtSeh9fq``QV^7QOV2lDiu=h%zG1wFKOcvV z-#8kfh|NT(;u!$o%hReTI=&4mchiQsRm(rbQYR)hAO6^9S8;#b0Cf{031W+eUg(#P zhKIi^i486p**m_S*D(v6mtZJP2N*ly(bqvF6_rdXq}0d(AR71JR_FyW50KISb~#tw zItQ;QFbvnu4};y}%*81cWDCmr+!~@JD97h7hG7u#(9FBA*MO758t#pYdBp%h)ANGV zR-ZLNrRrs$ESZd2NE+8hy%_|FcxYzjV_VSM2OnL--M$(6Z(Rpe6>EhpsO;zy=6tkP zC4APZ(4=d2@T$6i1rR2(9&GGd?*1Lns^07PKS6DT*YT2$(b9p2GVAGtEx{%PiuN=F zMq-&`ArBopQim7-_SvfX>Af2v;(#ZBw$A1>%o-f(qw@AQ2D8 zA06m_VmL2M7%dsMeP@L1jcdbizHhg?nk!+*PMu>91Tg{O_PkfK)N` zYsr;^i+flVyjuaZck%pBm|9dRM-yp{JeifoEe+u(WHR^(5f4&3{0zLRSAH2VU}R8N z@aNgTWL{87M?k_AQ_|rw2JOu_0ITy(l{XPE3qHg;@%Z@{9{$tAQ`}nw3?;nH?;oCD zyc`XAU2Uo9tC}ic&ZdO=L@9nC7qU?F;2=&`F-u`R-_M76W5sg&t8EXZ@v7qhY@?{d z>9yB&BMOis;^8AK1ZS<|a*DZL7}Wm0`F7E?xt1b5<^)Al+U5#m8SM$W>hif2%S1fn zURmrVp9kQJ%b`XaAc}E+KeP;wrjcsYYot-*&3Mg(3LOJ~Q?&oGxmDvLM)aP_mcw6x zWFxO$#%lz~7=+qjJ@+?=Vv@**Oc{q<$+iKnzgL^zDxo$a9yNme!PL(trEI< zV7{9Hd(UPvxaA6C+bIp20fd9stncpx4PD4WHx%F5#Z6p#dbvt1lB6I;AkeRZn7X@0 z_744yU#=XzXWRXJ2r1qXPyJ>ALq<| zKAafWr)E%QEQCsxXLAu_Nd+U&Yx0;8G(yBfQ9mp;y=>$KBVQrw%>D_e4|YRQ6v3)T zD(NuXAhRh~4a+&K200=Y8ZIX?kjp;L1DrypVxGUMiH)36vX>Bg08kfM_@T=Ek9!x z@-PAkV0o-}UGKo&G0#J(p7Gs&)Jid^OzW2uSFji0h?+x6f zbq)f;k|wZ{kiLA{pHuh(WU}}3fP-b51MjhgJaq7#;O4{Megd4wY%n~+?w4LPI3Y>* z?;4kmUOjU2@O?wS=hexH7pj%>^DxzF%TffTQnXw|Sk~m7x%lq7Cj!kB@z9YY%V57A z{L*@E>PmhJLBFq>*8@YmQqB?T_`5d3z7`swxDy;s9N!-q`m?}Y;Q?rO=b!QiA^EnAj} z%WdJNFqLm{L&u1CNb>ygUZ~Rs^qzZ8h)Pf5wbv6YcX_K_fp9Nzq z;4Sf8o%YVHST5$FqbL7o7n<|V36Vsv`al}gj}LmrAzh)WJRPAZO6SR!(phg?=x>!D zmYRh;G*kT97VZZB+>``|CH*uo$46o9pX3*nUez2;aATo!zOpYC2sKST6oIQh% z$6%fM%$~W474d9bh_^8Q zUjszk+aErB!QRpjrcMQ6*dd{~0|FJozD&Vh2vdN~!A6X37?4|`j(cvK8#rHjhR51R z6z7hqo%S(3XAo!pFC>X{-26-}bn^&Kmi%z_-_;ggo;!Ueg#j%8g zfjnI7AbW3^gzW4YyU$I9I}jwKXXds{o|V}P58`gPdDV3iv?4#Zay5*HFW2U)0as(l zXAa%QMDpm;{M^=6XX7ml@c^)l;v595Fq*tm2k-O+4+I-z;17htbToOiqsX`FtX#Co z%x=E>z|957WnP+Fy5f~ZDOY-|gtVpJ*eOh!juM>g*Gb@2P=L}&J|g9QkK`S{uv9Yk7c{|{r| z9Un(^?eDdUC0SN+lWo~xgDr{;?38Wb7`FE|+m{ly_ue;v5MY_mP4R_<@GzthLI4HG z5V|4W6(wMY5JEx-4&hNBftNx;Nb)-z_EHY)X=?`?O$`e=;(7`;il-&Bj<7(Zu+wQkb$Iv95JmK641=g>ajpU2SW;yz_`8k!z=cWtX{YYlJ{S+<3Hu|F~>C;ylVfl)mj(n_rURoYtmK^ zKq)m-kUc0z2ZH-oBlT7LM^`P_08M@N8Nk~yCc}rW`qBv)x_bY&7u;;C(5qL&wV$`y z=-uDG_E7&$!>!svJ5O~FBKtfoKO&AfXjV0W-rb%);L*W|%stdXV@ zZbz6E)Q{lv%wwUc^M3yoI)S+B8H1O=8JuG2xDRiJsX8u|loL{%l@YiBWEAJ~(5Bb~ zT#WX;I!-@*19Q28dme)?z}@!?F8HuZj5(Jnma$iY0PV+pG)G5DJRS=CFQls2zIXpR zNS}eLDU&|4lK}=`!>J9jSUN)%b8)vz8PF>mB-^Lo-V9epJ`WX+yR~C~T0x(A3u9h@ zP8~njDZAaQXcCfIPE;&}QzbAKbvkv`t#DBDd1&vhQMfw}erpWyKABet^oap+VEdG6 z<|{d(kq{aTgxGHmqrwaOS0dsjm?ji`#FnxU+xkPx`s|3xVZ1`?tco-p*Nkc z=wux1?0^Dv9DQM*sieni@TLgo>{fj>%}(EyGtgHa5A7vRhlOC!Qa_l1zK-jrc5dz4 zx--%dRFz7MwU{cC&1eiUfG=dU^zz5{FJCr~fdo+llnxbvarE8CxbX_-#tStaY8uSq zjz%Tnj5U2-91X7(Js{22HE z)~cXyipe~V$5gp!2A3of7%S+3M?esdhjuSt4h!^Z3##Hh%304CWCM0I9=ue{lLn)o z5V;**iVcp%!c5G>FpmmW=7ZqM*!#mVdjB)b0SqS#1C+ojgH~<#m$9VW zXLQ;9c?is6C-?PP7!QvJ901O^f7LA;=rf-ML5yh;z$Q3B=0d8PCyXU`6_*OVZXJ8n zUAqtD@K|UD`yaNI=!NDs8x9k?^7|=Qi*qRJe zJLQnV#-$jM9#0g|9(|33TO`4m3(Ul_#L+|~n7#^(Os`$Ijz0e9Ojlvrm>Rj9JzJV6 zrppFOlg*Kuh*`!yCR4BMA00ByW1-!pA8(<-#FP*WyR~vs9t2F}VmPP~)>z%y{wgT* zd=8qrMgoQX64#H@x4jA<-f^aiF1zeyNTSYQzLZg+$cQyWR>b}=dKoTAJRUl9au;NN z2%cR>fBG`FXpq;+&9yG*1=K!B)PWdN0;^g&N5Lxe?yuom&*PyfVirt6OzxfbH{6%* zjJY1=G*KZ*rl?e?tnlU)1Se?aYtSPe55P(w2a*W#(2OzN+^^WskiBeFVX zS3-RqGG>&ygUrZQpvPW^)#vfhzR`<10J~%8*kzkfM{oY*YX{Kpp4{JqPI_bi$s=in zC?>}1c%WLVfUUsGs$=yH5X57leRkt!0E2_l4)^|j{43~9bmtllRP1;Aw=54V>KPcg zyh}24svyuu5BhpvXRcLD$!1VnCZCkme`P^eXkcL#Ax?$^VqZGC=N;HWJSt4$vmB;u z`5op+0Nb7lM6l`1$ca+We-Or!zDT%IOL3A(tiwPl1) zM)E)HHq(pyTkMb5oi$AkZlHGUP?W1E2C2~pO*43#h^<#jNfh>rZmmp8#qo7sP=NLI>4%e6o; z0;b;M51V>@O$ake+5xf0EVSTy%$KyJ%m4|5PCc~+<{kW~r0Ip5(t?*?x>kUCPHin8 zOUA+S3AUIFz!@j)B0pflSepI}BWq&C0!(z!aQk7P9Wd?m>=Cwlmzx(sEY{#axo@)f z>h7Bte|M3YFzp;vJ+K(->wc}C02C-3DnK`UxC=v%k*zhGu%kff7i@{%JUu){zj@YZLx3)L zxYdWgNw)d{oX1!5XQ&LARuh(_0SvgQCRmh{jL^*h&a)5~&0J+XjDd5xxHSs)Y$^i? zTVQX4b#A&73>1`KWhT*#xV3rJf?V`TOThv1d`;Q{kRU*=2IQHf*(rxQTrSM-0R&zx zm1ab&L61sXgR2*ALQg&S2biJk>8<4u??i!#4sfA7{&z zXo3R!GiJ2mj4$11)iYq9@lR{+IRDCaI8^vNIFiLNE)Z*cM~lJd)+8+%dmSKd(HyoyKd2tdhjad(%uyjT(@MP51h&N)6c70;MIfgIg_c* zUbnEgDCblfWN~4>RLC|_A<$Zh&eVb`^Ep%Zo(S&@2V5_1*S6p(UQm{+3Nj^g=~PjR z$Q_fi6R|=Mf6L>cgWvFO*^~OlI=ZZHu|C)%FakPzN}a%icr_Mun6nN`XQfx6o0Tvg z9uJ(<0OZ%PetoKJ!L=D4qzqO9`yfqMHSQ9r)Hc$xhBic!ot0UIekun+JRX|4dvm9v zG`wgOFel6_?g$h?Q~@Qb$f8RbB61dA+#X;@_TL5=8IOl%_U(teEMrB}8Cy_VK~#o1 zs|ja3g^NjTBi8xmuSQRpS|h_e7DS@;pNKx%v~LCf>VATywE^%1b~5MkTjLv@fs@8Q$MPpXq}IW$vsDKme=h1-DD@BtoXB!e|IN z!$I`%9+1)R0U2LlP5tZn9dyzIYsoyM8Jq(4MUr%@>q0^!sWxkrwXD*zGOo14V0bJv z)4q(e7kyxFfwcqVoHHjUZ3)90Ijfag!ENozMcDED$PaROEOhX>KTn{Sn7UD`&SsPp z%s5{KIqa*oPI#LhtQhj^QYl}kV3x4DC33-__&hKeo58Brb7&2XT+pNOv*)I!qRGUd z;tnLJD!fioPU7q#aK$;Tkr6%*fLhcO^nr6)3Bky`gmzJa+wbR|2fzLW7FPQ1ne>zA z!M$zNwW#alp>4gt?7K(c0`#Uu1OHXXFBYt%g$Him+A*v#DGuzS*)?uOm~dIl5lhyU zcWAiH(;I`I;PcRw^4T49EXM7?;M{CCgQkK3D<>jqsis2N4`2V!$$}6*4;5Akp!UJ4 zH=s;?7EYJWlaxtaU==`9k3y_~xt=q4Yx;ar8DS^<>=3LRkB6{Zeg)>C?GKI9kB7KE zF^L7Nph!Wgvk;cFODG1rp#n<1cfLqJO14%G&1bRo-aDq9)hXt@gJUWJa@hS9a%=Ks ztP=2L>Jkf3y2DB-8k|8W*J*O6uy83AN^=T{MPRD=JV4-k z_DuSQ2&dIdWjI!=v3M$IAu3w3sVhiI4vf34U!Ddbd>)*8_7lK9389hir(1I|G3PE~ z;`Sik_}t##^*zu<4D6ye-G7Q!uwiN^Q_GCAFPNJC0-iP}oCU&I48j#>(@k*o`rYNN z<-^MPyv_v&ZIs*1feQSpX+6cxZGL#OMgeXow@a5(F{!-R#_I z8bZlNy6mk+yb+b$Q6||A4eSCrJQjp=FJn6N^cbDo1uwsKOhyH}4lb$1B_&cNVZtEu z+cXvCbG`zJceYlJe1SFd;lAzkO*@&B4r~ntkipsmF~7B0z|ww&Um4b>!Pd}`v3rVH zN{wxTtnO@lzkbpCsbtuqe&W%H>zVXm~sn_=}x0GQWEj(;2V^ zF*WD70W~m3f+(k5luZ}WgbS>kbFTq8PN=tKg+Z0Td8BT~iEP|neePGZ;b2fsx-3P%UPMyh3+QOohd0Akn$O}~0Swx)^_JE@ z(Cy;KCs5`at&PkfUzuA5yA*SW$U-THdxbVAkeOfw25y5nMYqoesJ49%y45$TKxlz;pBHS`TP!Pa5| zxT;|2Wv_Zob;Fx6*`z|8GMeQnwoljI+FG$}9tX1ljIf9c8>(g|lJPW6 zOjlN+&<*gXJQkX<9|U-tB{zXH;|69I!#vmK=DC!S8KGXB&qg)Ll*^NqvSWJU8=xLM z9y)Y)dCQ&;?plYA{pR68?YI>N1)&m5DgqlS;S0*WYK+2bvW&-H2uDdq-zG-*WVH8g zy@`H*ptV(iZo9d)o^=f_`sbpdlLnOo=k`^4uU+)d?wQ5EWnPbOcT8IlMb25Jcuz#` z`MBp!=rfPic|AfF*f<@ylQC{tr>2=eX?ACL>;71csHfBsaa@}yKy3i#3Aq70$VWx> z^BO^N7E>hP^H>&EJDR7%k)+1|3!- zjUJg;ThJuJ=$gA=#`$EnQq<`8VPiAFDNNWoYv|G@ymBc1==R3SGN02;qUznPiJ|#a zbV&TUk^bx5Ekoyzzc%;B)_52ympibEh$^bI*$6uC9_THPdc*GT=;+t)X+bI-e8-tM z{;zdxgG#du>I&lpv4POmicr<7^U6K%-qz4CkA-F)Sh<6KHh4{O#h^N_@w?F{S*DeeV_LIuCLv9Umxn5?27@&l62{J`!)_88oH#f zf5|5Rvb1l>_m}Km(pVB$qF;g!J-cMxlEuC6_x`;1k={Fpz9Bff_sZT<@7YTi4d33Y z?A_M8vgh-jKP;{F{H*84!#)mO$=$P~XQF4Q`>)+^EWLL4!0^LENeuu`Z6De)G_>q* z%idfzyX^jDH!r(*_}yjkrB5ugEt4%fZrReoKMnq7@R`9M4Bjw!!C-XIGAJHAX0UhZ zM@xU%8Rwd%f`RvT%g4}x;oEvAlR}q(QTgDYrnS#!5v$^(^Poj$C0bjl5Bs6xR zSjVFDP(G1LP1b{TmnbTis$Jnz*kpSO%J%}cyDJwbeV&-4C|N~z5{oHs-T~Rn)kMN8 zHo6+2WA5#w0aIQG>%_@GW3rGiMd}JKxt&dPro3r$9A2`MUJ^A*bpfIfTyh%MTr3V}s(`?6 zGU7TtE}z`Nwa26-%nfDTi^gUmr;f;f&C)#yZ3rW*Vo@@zOBFN0(-Is#7^{)>N?MaP zV^G08sQfJ}-(%A_vpyoGo|~ zwYcY}Y;$+o8iHclO^-yKOxE+Ft&ec@ke$MtF>R5`PByACndG?RIEEyU#)IWh24HcN zxFe;HaC9-iZRArPQ9+|C7=B}trQz_M)=};70OZYG}XW%d>m(N=yjb63U=GOoiO8EF6a_!AvD3*xy`cR~* z2&Xl_WP9V%2i&+s?{+r}8DG2_G=7JrI}1`R8FwU&Ibp*sj7F%pSuxINRv{59wYb_@ zQzh`;Rb2C6RgO=_Ky|#Pf-MH6$63G!imA1P$wPRiR89iMeRwO2jY2^TU8vABG~-U_ zZcrq-gB9;67ll|gQu5RcMy;3Xm$KsdX*h~0j-E|4AWJBRTixnVZ88#GS7#X+OS3|H z-Bd1DvfFZDoKPR81L}p_6q7Wf)k-ld8Tg5<7yVufXW!kFo3E;F9Li%3ntxu0kj7=3@W27WN=(l#_EQsHEP9$zv2X`!UZvglnK@)OYdjslS(RK zZRQDsQbH-xT0;>Jj%2t$u!bsl!=%oVfDmH#M1?GL1eK6A>bNVN(NrbYV5T9`vREp- zG6lx8Ldy0hUQi?pN-u^}+H@lu7!tGMfi0R^jM+KY*_^3u=eoVFq+A)#3KC0#g&ISTQtgX{;QQnArBQ2H>L=ttL_%ki;}i zLe2u1P%%@D!b-_X5_jw3lVM9}=}PVov<5k;PfI0aI*@>5_SIK&bg3N@sc?0vVN1nJ zk-(|1uI|DFN-A2HI{?Jpqs_QWN_8~N0)A0ZbG3j~?J}K%lIDEX&}rwe^AH6jKdf04 z`!TFx&0AL=p8u$%gpnePOe}MW2#a2N#{aTE8ztj)JY9C03kkO>W=V{(pg2^N^hhwJ z%wkIrI)zxA96XV2AA!<60DK=PHoOj#sTLf2o};IWek@?OMw>2w!>W^<$bDKO43ODm z#DqI#N|V=9j;%PE`vVAwB5V<#6ZeJ#8d*%sogCr1*@P)|KCeY>vp_=E8V1h>_HVdQ ztwwCksMKb6Ijs1=U96a})sn$f&Zy8_Fj};w=z0N1*GNSq?r_L)fMS`<7V&K?@D>%a ziB(wKo+C7|nBN(R6WoG@8IkFq>a*l>}vJcO$g}DV+<8YvMuCHtx$F zG-BRn(^3w~%Ygy~ms?J{LFvS+-bgr=lUVAql;lSoUE~VjLBe5I8sc)XA=vXM`>TPf z*DRFCMJi7%D$Pd+yV>Rez`7;uo=Kt{Xj(IMk7&_f+4lZW#1ayj6$W=H*mM!AJE(0+ z%J282F?p;C`HJ3v-WgirXXW@kp%8AsA=^JDBjl;@FpG3U`Rz^$19&q-un-AmML{L^ zi46vo5fa17q}-UxtCSnk-V+va9W@XQtXUD8BcUQ@33$(3`UEOm-wP=l_KiK0RMKgu z^1?i2c2^2cp~TA~a8aJ3Lqhli0iz!ZFs0KHFALE``Sl4S<};QGWhvMZ{e;rP_Sa{F z+&W#>Zp%aQNNY~gcM(UIr=>(itSV(C@u)c$?JcwPG-UFVzQm58B#^->S}NfBH{0Ee z)t8CLot}_0kS^3E)FHNgR9b9eiE^1Jx||JZAVEDn^!LR-rDyVgdulOzB-6vRjp%r!sC?W zttzP_Wc=>%<;cG8SL55Lv{O?d{dKwCko8gl17>)E(~h!Pgy}RXDiqH;j5@>E@WY+I zSV1L=Q9EJM$*n$LR#z8GttX+|pZuY2&&LzJeFn}eiiSS^bO*BB-VDtqNktXWr> z%5s}5+eo0~{qSt#lj*$&2ymo-EdNCaxqs9;8%lua8$KtvDLuX#IMU)iXRPLjnj+}& zHSIOWNu)d%#N#l{>)o>%u$oju(rLdbgSv zY>Eo63?BA_e*MSb2Zb6Sgpa9f>oGSi;7^ADe{f9u<7kJVy#_t^oNfRaP*5J2iu*loK)-O+pr9?(D*+UUj_dh{kF=JrUbqRuzSY2(jDvM(m`6qjkN+RAPOZIc z2?L=p3jb@rhi;!3n?Q$NV$5*%sp%uR<7Cbp7h)Qz&f_YWmD);#9hhxD%nP4~3WB$H z&@=lPqo!?Yx*seDtQ9+;Do~}IDxtC9?uy9()y|ptfjjqsxp6)VVPpRQd(B+#LC@15 z3%m)_Os+QTO|asbe2t9fq^WdG<_%FPbj=Hl4P!nT31kp?eAp4ZhVK3uYZ0IB0zqu2 z^l5ukgF~)%JsMEBoR%% zn=VD!ku{!S>~ZsX$gX^Q3;pCXt@D{wHE&^Ac--q}U;{$|j7IMN?^4z`w!G@L?%9xo)-S*NB@*FaX!`{10s z{2&aK$AYrM%U~5ByKw{k;X%gkZ<(4Ng7LC;yin1c#}p~0m1^?hEE524ywq#1dDH9)h+b(eAK~-BsycHbx;XN))$~oTa4N-QSF+`zx5E`7E^CaaJe7ew^O%8Y2cq2Eap{PIv-7ZJ}AINE%|ykSzpRF<*Td z#LQ=*y|@R8EtXzgPe1)K-{an(#{M*{sOT$i5O#4>}Rxx4z8`8Wdy2oE$w##*fU~Ma)zS_nsUuy+lwMV`dN|dJyakRx9uIPXUI#CF1cudm3rw(UnUr=` ziZSB`=+R;p!oKaPq7_Yj0#khUN1zY$IcRD>L|GsB{G|=_lOMqWu>sKfr`LiQRy_kH zQeO8Nnr>4xR*KIVy|bJ1+%g2kW>A zeuZ7fdN?4($~LhzTunx;I>>!u_R>wCz{K%bC@=#hOaJl-6YQe{7#<;!_S$3GtgD%- zbH{1?PcTRx4{hp)prek<=Gi|%NX)2KYAYr1Oa>kYN-C0Ra!2}C{sMo?`xp?@3Xn9mMoD1rPr=m?S-w8K4LE9o2 zKay?vg-0^0N#E~l160xc2Q(7AynGA&abNo!!G`mvrcZ*OudTHLTBXtLt0=_fbVOee zQ!@DaCkNVFM)*{E?{n7|1?bJ;b`KgGY_A6w*z}1YgLQ#9j2UrJNNP;>f;(fA%aDB# zhQOnuz3P|&0=L_p?C@zOsglbMk6R0QTrJhraw!O%Q$~?=s68=i_yT!vp=_of9cmi| z%a30)G$uHHP}a40;OxHJx_{sM6x0TE3^MiNrniDev8!_%A7>2L1Y+IE%slnrN>=uF>}BFpq}<4+M754~&9RZ17D@ z3mH(yP8T%hYE0>unq0ZO70Up!)uDQO1tM0oS1g;yLL+Oho&ZnlI{L;Hu*k=N5Qz8X zJfkW*rBLBPyV5K!$qUL9)Uv8WNB+FJJvzeYAwg|KgbrMA%~IMm*7gWS$*9p4C2YA` zFs96;Jyei+nNE!G$>`9)9i0@~Q5xPKGQnuZnJ`C4A*RmAa)dlqgmZeLy&7G&u01l$ z;{jIAp$<&JTJ-PJ^K$ys@%CB>e+XkvF%ig-KEK=PNm#__>QmtXn_u4^8sYPh;62k< z=;znB0jtSdwmbxXi+k|FUi&|y9q%{=x^3;oD3pbjep*E5l;R}4JZbGqRA zu2|peOO`T`t4;P!GkzpCtXXv^Dwr^>GKqa&yoM2bz7G?577Y{0XQ9BSi{T2k^Z9Xl zFAckPT@3V{J=7eMYFrXAIfY4^Gis^f9U-ZQ+M`4BIc({>jqd>#(en?r;a&t^+XzTu zzqa;5-C(x+;xcnxsc>tEJwIWNj`>9PVQ~Jc2iMZ&pD?EuNJzlWVP7g>4~_eXvMnX4 zDmAs72XcjG+FOQsWK?JXh{SbU?p{kD`y_g%2CH#`7p z&10d1GhgTOX#e~G%mMTLITDYSrpjd!Gh_Og$EUYB$T-Zy7<&Ja_V6%|#pM=pVZdu> z{iCo^MwCI9&yNR!id@tRP&H+=`)=49k3I&c7mtNzwn3`mMG$a=&cE{3)6t0P+HUl_ z{rlD++vBTgH1S0Hl#z1OPk4o5RW4l-W(i*i-7f}h``Q!jp6g&W}p=oY64$CMaK}c7Tvg|{blJO|Ffli=fZn`V!>_Cp*~!H zV%s;CgbV=4o&exh30(}Y^dP;=LxK;JmIJ+W#*COY)%gaIA9^-Bj_-wFffpGRV}Z5!-H9+^IW z@X^NvXv3*(F93O{Ni(E(08UNPj8hPZZ?BmFF^D8u~{@)2Nhex|)kFedl zTyZ!dEmm+f-XUdAE!&HBg@AKE z#zC9t@%Fi+@wg_YB%D&aQYBX^1NIc6aTqd>j7ISsMqhW;HCGDIT_lX#msCKN;*iMa z)I$OS!2IBLfFZGCXpN}7W%a^bz?ka$zZdx0U$*eOy19pKM-Qs^HV_>S|*Xy%@G7a55Ow0#-&wNCldhGi9i8Lu&NhYvPxMYlx8|JF*KiwrtZ>h*)#t7IQ?fk z=rE@~)kTBp-v1p^_N?#H^|b`mfm<0D45%m|HBRg1mQS7bG`$WDp09Y+DMLBMUXz-k z_Q=qD7Mj_391E2B>k#}3a}H?c&H*PxGzBU(qt}qtQ94K|VJ}-Tm@^)Wu~~tIjWPD^ zj4?KXm`wrRT!kkD38?X0$Q@$;_Omz~?0g=RNY0qmR?)sh8!)&A-G?rr43U-lpZqXfKCP&AY&=xb6w6-LSv7N9)KoF0I z_7x%^2uz>o{<1nh+#gGs5!t%wr?N0LlLO$&zN%}{`U00-#7a%?MwAJ`nLCN?i*b4=OwQ%`RS5-mfX1Hf+gW4<|U#f83OM#?zz3^@}7K;x96;$6ML3-f7bn0_w(Hk9M^qo_hsGbZfE!Q z?#*eWra@a!m*RskXVPpt=3?oNt0Kuh!$LcK{zhz1Q7rOlVF8-Sc;{B ziMn%ZjFV3_AgZbXdGWP?JRHJyuyJ(`g+VAIec2cpOt{KYJR)^*?KSQk0hrFdTwNqq z1jEB@WhV!GE^0Yv%7Z(Mc`Pv*oX~MUEA;7OiMUK=N>m(qiSTV!j69{&5ec6apmK~l zi;;A60;7};Ik-}Zrrwf@W*vAYl{%h{?sUlgO$mfwW-L~rA_^h5OEz(GY{fcOkSE0f z(qq)AFbf;MIO&ipvrQ~Yx>S;iwj7Schm350LGcbYOwJ)q znc}!#g2xIeJE=6{Vm2z!A@zZ6$&O)q_!i*+qci>!wwF?GxkwVWP$m%4$Lf)kU^2on z+^GWYH|B*=bHQ8n%49w4EJ)2z<4gsm4pU+R7FXqDn@bwz3K5ap39YFTb0#aJd=)+(c$eAJe<-X5VDRmykzOXL0i>j{8NVSAiEJlv`XA1~#WyL1Lj-Mkvf`OqXzy zML9lp5=$2~hyYP8PripcPyISP&2r<9c8ua=T-kJzJSzLRwS%>ALMR_(`N%_;_ zV>hr9BqFGMBWd=LbvdrkCD-WK=48_lCj7>R+a8iv>~PSm;OLXpqyiJ_6BTn63f)Pt z9UpNFr^AAmbCP1st`CH@(M|WTbfT^j;Z2D75Ls+VVL&Wg!qM&KFl;PY6KeKG@^(r0 zQykqSwc#~!F=r^{ZB zB%F4R?t@5qyl$0|(Rc;YmW6C>KnD&f$hMR_UG|skX={Axi(GSQN)ET$pp*)@^-(Nk zXKSrFutubSH6cw@BNSQe`QYS6HjLAOr4uQrc%jlu8|8*mnLhnntRO5R_F@UGvnI?K zAS?*m!A%4f)Ku_9Gw)SKi=|>*V$QP*fKh%2uF{YdgVyBq+C>*~Vss@lWJJ|*QA*^I zLVzQ8nok1$dw`JIsD>8eQwu4H?p5{=gcYk4!&T;VqU6@53^EHFU+WNt<5ir5DE$-; zr54HfC>uBF5E=~$%pY~+i#dmuFb0-!{S-naX;SDnP)xK{kX(D-YNku{B(3MKf0l;ALeI!rCLGS(EM>=p0y7GpeoH zDmn|4&9l0Fx^H!+fog`;db>YO`9=1!5yJf0j}FyzG?jRsP+4L&pB0Dq>!h3eRlCoH z>m*R8)+qLv;-OPmJ*1kJlnS>P6%Snw~aBbaLD&ekh+OC&K6d4ymQCxc`CMO~l+!9yhsHRc0 zjNR2#opf1=y34EOL}G-oVo%}rOx$2e4RX=4e7GP57hlPDlPlRu zdQ>eMP2ojvNahy>%c)Yl?+vy?HB-cidxBPnFe3(#i!d?iWLL4K_k@))DHN(MM4hSA z9%QGXCNhemM4{m^npHI|R10Ov)uJUYD`j zE-~7dW$BengT!M|k;^UiRH9^P8P}Ui$d?XiO!A~V<1-QXY3zokDtI_y&``qDLQK5rXRz1f!Jyu@_K&QTl0p_DGoI3<#Nxq8 zi8LbX;~3I13CQnuo!Xd>L%^$$%Wo*w0MaHF5ytG2pwgU8Ixb_|7d3SX%VcU~tZ5T9 z!$HSQ99<5%5R|JNQdaHq1ew-x0n9~N8uUgQ!yJ~pGHRV9C)imoii{0MLukYlHlsUE zoWwORWU38y(nTbjsk|Kzbid9@FQ~N`rjSFW9(zTc3yAe>fl8_XP`_l&mW1$%gfplo zd$zLe^La-K4~Anon=PM%(0JlTjy{=)$g#RTR}`j6tGp`SeiGZAyw7OY=#mb-y(EsN zgPt1K-mOfKRYSs|Q)(m8s_3jCj&3&^u%bH`3?z~^cQAf}hNGJySYE6$husQ^7f%GW zToO;-98MCMXt^5{q?MrD>Lm1AZhD?S^HiL-V?$=1~5@MJ>w z1FpH=7{tm}iA$~YMwLRTl6}cgSy@zr<;zi-)>KkK0PnV!xc1_Jd<(9oqUxN-pvYme z2@P9q^O{9N+QH1gt$jc1{k&&e*H;B-li;>9XyH>UztZv1+2M)G7Ef>sm3A>{FFT!9 zG8ryO!mJ1Q?gDtZcsy|SJqkYhLVLB~hNtd34!!xiRyR7W)ZVZ`H#KboTSTmr_9^vI zLR_p?7bDR+mcbINzza+56+`n`$lkta3sgc`hu$c)KRY5)P-$;~;uF(W=pW@h}*5i#bOe8!S;#|pVhxUDb>=ty^_d{#ZeU{K4151#j(f-#Fam^;%LDO6ZtqHSQP8Q+5XuT~mE)>3?3(?m24pw_emfc_bmNh7;br-A$I%rHDFj zhbzo=laUOG0)T#X^W|XN*cPeIj-PhYtoDcqad}$FE=;5iO*Z+-6VEw_o*#UCuD5>6?k{Ix0RhgEkVmWcCqxLJ%wo9Rd zJRVrdH?ReC&^4DHmYM^n^h1|HybY+nV@~y>HoU1)rYV=Z;tj<^GPbXacY;tJ3l;h^ zY(bXL&Z9Tz<+3emwczW-h^vHGXF2U#*DxsszyI~*j$ekKO5CpRx{bTf7 z>(GH~Y@6v{?QV|?M%5LCKSr3Vkq9IQRw*)!x^IBL=aG^8Q;2Sa%CqBi^M*F0%R>~+ z*>j;d^ZlXVC4FMg!d_Bj>$-E8CQus?4?I)T45Snrs)dWBi4<9tYl{gdCW4yX=&c(; zsrh77C_J~FcHRU%VB&ZH3W|&4k=op51C|Qorkpn>EvG_gv<-fM2X2PQk@-AyR_q{D zX}z**oL+HD8{jxiZfjhM8OwfW$tyGIQ&A@7WTQ|_VB}HmJteOh6S3V1%mHZTZ!p0? zJnt?zeSNpWJo3mLr!V^Wo=wB_i?=erp2~YnaO=;A?PQ?|sl7oYxeW%+Cqwud?B+*r zYhS+5iaT%rk`?Eo8_v7~ywbcCg@yj%9bdB0T!b4Ll}Y;APrq*7Fo1r3@(;Jc3Cd`9)waX+yw0O)&JXJ+Hq+A_OA9)aMIc_NacZq zBSXrs@-@JLP6DK01{M)~<_j{B;F&j!X!`qK>NS4j``|U^tv9O{=zDj=M~lbmr~((P zap^taIEK*=8r0ssD#C_Jvy@!3l%^pJPwl3uCt=Q%!Rd zJo;L9%HlC3{i;~goPoMPSKSMPUzp2O2I4|hM(_L5$c^NE?OR9li-t5^>YnkwR_`AN zb5Q;K0sHwrE|$FjCnoFka^#dcts_#;HnTO8A}>X|_rczuPeqtk(}{~+k4~;#vK}2c zc;l&PBPl--!i}C9MlXK)`d;+rOYLrS$}@1xgL{QR8)C)d!g!{HVVDC-1XlAIX|$t3 z8*vPikw?|WRr1=QPu$BpfN$gU;-4{oV(>XJz)q}d3^N7_CS2}n*pm{U%@>NZYWdQ0 zu(&)P+WQvVNT9stIDP8#oVz6pf>?KpDWeR#2w^R2gRmim$s1t=K|mdk3_^wgNwEDo zc&^$I3^{6OT1#bsOAy69hLlStPO}~O$1HS!$3uGqdtvUjKeLYZKg*4T!Mb8cB6Y|@ zVnS=yy6YyrFK+~o(LOl$E_?tx&=kGQO zp^l*F=u?l^4z5$b$xPozmg92Ar?aN$gh3L{|+I{g)ha9Ows3Mgm(KO>Rg z6k7oRuX-UwnLueU1Jpz_L!mE!#;*nF(I5T_vL-Ppc?9xj!KP?tta&(VGV?mb`CRp@ zcK=F$2Zt64Awf8eC8MuFHd-3VA9);*=6}^*y=o!01?|4eFh*beMD%M6Tx)v?y7<>{ z$S}cRW))z^s@xf?Dh(k+3aE`1&Y(Mg-QF_xC0u$+`pMOuprPd;z(ra;W(*3y0b;B> z4i$y!kbap!dtQf_qXoHWU-~B#Y}GLc66!;#H`-9X3{Ey5?#@85BLWgI>y~D$0Vh4X zcemh}P$E6*Kv=Lfd|Y%;RGcZ%H2S+QKm2~zzIAzU5k%qK2Y84BP%Qg0L9k2AT;>5} zh)Jko(8X9!eO{F_848V>Gpy6sR8@4{zV=EKd7J+-}Uxt`loL(u6mHt zn3ED0IkBX=ptl#)o?JBqKJa~TL%jMBgfh=#p^NXm52A7A9LOIZV%+I)+pd5pHl`vg zE|!fHX3D0UDJ@ou!NsAy>R5sh$&O0DRq|S)sU0|T#(+=y%=ef`9k{<%K_q*|$m_9~ z$6bP)C~w#lEi&mLaKsG10~dh#EVTFbQ@CWM+&hd%88RPAa8$8V1*T9_31G`jMA4V6 z$IS$LR9*2Q>}ehkK2n45q8PhwoPO^^=9q#09H|Em-jZ~0eT~a}G z(BHEZz!2{nxQq$TVd~9xo=snaA7Epc-NBkWfytxpNYZ5z)ggtpqZC(u-d;Y;<3Sb_ z1c`T&Jl_ADn=S^+ie0{f#9^-z<%m;LuK*MSglRC!b?(35NyB5IsoUUAd*Fqi1I*sP zK(jirHW$u)Ynr+unINLYdcjpP%carIr+x+c@4vxAj?ZH%P;Ew?BE;&yGpYbak&8eQ zTlmNw%N8`G-V32=m+zH-f+XcAWmsUzi@*r*;8C8n>K8B#=B-$4D)!Xu;K+K{N(O+^aWkBox@@mlitk{kG)GZ6cucoSsieDcK3h_94rgwJB2%pT9VKC5&CA09Ti~;_c4G(FP z{fQo=&;+1+J{ON<9Xu~IlpTt2lI>P&9dwJw zgQ)xEY~lzyX?zx7N*Oc*?fThMM)L}Vyok%JagiuzD-;4Tv~xX74UdebUaU^gZ?1=# z-QbzpH3&wWo{pJn{)L#mD^DzRO=gWJKR#x5Xz`fG)wCp`SZ*=~A?r~3AZbbXlZrUP zKAK%~yaYe$&H=a^3p7Q$pSkOV2cEhx1u^i)%`RV!Yf=`cSp;PhYT(p>Y>afutO}z8 z$IYIwYC#@4^x^nwu4+PN+ic&auO5z3wsV z47Ef6Uo4t=tY zgsb+g@a}(xfc*-H@w?U@IY#_qQ<=1dyeeTOY%xL{xB=dkS7LAw+UK)S-~{^wvbG__ z_CpNh0L=F;CP|&U69=>5YCuLr<0(6lH$ZkdJRi>40iRz$W;%)kmiac^%$RzWPwtq7 zpijsL*wrZ`-Z>QAW_d8H#T&sUK+{QGfE)v3JQfE8qoXHVIlmd&J@NzulKNj;Pb*}z zfIz<*hR1#-GkH7~!)m3f*`ZX+gEau00D)+k1jfhXp+Mwjh=^7~wsTs-oNF+?m2-l` zg_ywszD}LFqRi=oMtF{#KD%X@M+WoI8xY0b_2LFJezsYQHg4E=BC`GA{$ccl@3}jW zWIKD!ID(&$$eG+ZOcg1X^fky-`hS$YdAuBDl{cQgTW)S{ZW5A^l_fwDAl}fmSFO1n-XO$5K$gF`at);g_!*0DERe`%pTu1-c&X z-Gy*AqLe+JvMHVlR*D$faZg^a9eq}*)H6HaJ@ELgDsbLk4=vP5_%dr|ADxeZJN}>{ z1I&)EpHYt&H$JQJUDefFPAyOEx_IRzm-1BX?P{%PRw#QsQQ^^}XgfS=wMsq1fwO7E zVW`^S&AjW96&o!gV-5h5tc5Fii9V1%jow?F6fAwwnnkY}hWcg@~Y6Bmfl| zQ>mx1PhNTNm+slFelD;K=+`6Io!~OS?!XGwGUCw+Wo52pCCpj7w`MEVJ9)^6_rPTP zdmmJ4Os8UBgh=eK-tp8$ga7ntlMNQ-r7Mflm*N{HlCzg{ogQNqYkD8O#k{;_)3^?z zs2|btNQT=7zc6c-ph~+}szel;9Xn~wwC&k^LpE6eN5BJb(lN2R_XH24_32LliL6&U zsK8NJgAhPVo9j4}6y9ltOg*{Ob9VHOnsY*J#&y7i_yK^ip#E#epx}h%txqv=&GaUN zIP=5VPflLHV4S~YPQMC&adHcMn?a4WOnuaek~51X@m@wLo7k!n=;{ZEH{A@wGNuF4 zbaM94}NsBHoUN6wVZiWZN^WAJy1Y%bnlEVYk>kMt^}*-(%nJ3TTYyzOT5)j`XIy!S(T#8TNhTV z)Kd>Z8UcWC>{LG=UDjg*G^4M?kWmc)02$2?e2>O0AqxPC);(5!8ZXnhyTr>aLxjSY*HS-flPupoAG}py$cpY)aPhc>I z5NJWjn&?*n-=>mLupIbK)q7=FJ!8@l+nl=RKmK8MaEY?)2bMZH2|iXjT=zG+fWl}q zsehY?Z=G?m26o{8cwrfM?IKLb<{{dBZ-eX+SvjnrF6$Pdbz?g9(jT=TrTv*7?lY)| zZ-=Yj3(Ct^Zw?ZKXiQ2ysw9wNo8%=l1h=vdb4i8vBXYXlrqFB2T5N zwA8i-A#@WcSkZ}mi+YgP-W#h_Bk%R-2420BKRY8fE>Ei;6_)pClNW#+bem$X-IMWh z$mj}(xq96%p*}N+P}4CT+@ZkR=%MNRcB{OoTix^n=({&dU=?br5lEv@oL0G;E8(qp zrqQ!xswrBx`V9%Jj_K5w`rik>)-zw+rLwtYJq|^iXE)0$^US(tVf*}bvv(V;bNR{b zQ$L?Mt<5uFqtQO*sg=E|#Tu(I*<4J+;r(V=DFG*MPqV5+ZjF9=TQf{(_Ow5+c!oq?jnC2|qCLIZRlk zD6{HA?}XQ2^Z4@Sh1Du((pU8Z$+O3`-3i_VTIL{n6IhxxbD5+wIXRZ6aaV&vUncLk z9bTtnI$)FjrT(S;hugI`0gNdP^+68EV!fR!_FAEeJ>tW|#oWlwB{aqo%(*v2tBXNu zrRFr%SO`KVw1X;qVrof|=$7B*VNE`w$jfGksq||(^O-wfXBZO$UdClG?+$%**Wj5u zG%pB|DEE7KB$SMYWCw2p(mDE0*cryf$k+13oy!5k1vjsm{lLP(nQu)R4L8rnr>Ey$ zk1`;&mz_p$j9zw@jD<6i&O$j%d1Fz|rT+R}u=`ii(`T-LHoX9egNmw6A$ZT<05;GR za>tcQ*IN>;p{z}iVt~P=4cm9`Ti(23l}i0L?9c&qN&GPogug?3Rl=!C%VR`?Pe~!b zEtWk}75CM=xj3tO?uMQj6RXEx|4xX)xb(>#gMYbOs|ie?>sKa_BN;PRn4C31`01|V z7PXq}Usx@LbI&i}-J#*bZM|Q!0R5pQWTO6{AZIa_vsBVOyR)2X>r?RPyI~5hRsoO5 zCq^fBV1a)(m>Hc$%qw#+WL6XpVXK6yS=K5RMNVzprM&@Givbw&+JpDr^tl~_pWdZS z6S1-C}`M|uo5($?SHrjOlTu>9n=D~Mv8W< zE{qMPI$1YW&$U$y)}(skf#nM}j;SD-{3iX9_s0)Fb4F=w_e|g@jqMYoG`1R~u~{}A z+_+`ozZZV6@a0h&+ieTw*~rA(^;EWn4Zq*;y$xU7@SzRr?6n(~CbAoHz8KYs}uNae(s480YrT+qme(%zHvnV@Pl<>@k;n~Y(=hpse?el9txAp^T?_T>iYx%XlwdC48=SgZ?oVjrN&(kQW?ZN32)3xa| zIc=W4dg9yDTc-XS<+V-SKXvO=VJbd#!_>ZW(%SBue8Z$N8J;vv?wwrsC~VOH2m2># zW~ph$ZA7wQPkT(1IVzATl)oU?Ey+HK*Xj)%_Q^(oOulXu3@VqMW(M;tHLyCs>hh@CG5-EPd( zqhmLs@^o7E;ymP9^xNJ_TqYN`=<*m_!OMXrR8uI_n@iGbp3oI;Qovj3M$eJ$Rplyg zM5#s!?UE{3vey>V{(xPOWg4XvBFe_9&;vhMtP_8f?hozOD z{K_c2TcIkAoH>&snQD%1o7Qhc52co3wlbEo0(2SfaC>R$&@NpOg&Y)rB^a&prCd74 zUw6MQH>Friam$Pi&&Rw(asJU!H!EZ>)lCRiSHEEkc{Tf9?8O7w%M@L1A=$`f{jYoMCPg;FMs6{nr#Y94;!8Y zQYFYE2-LE|r8gl%L?YlPjFqqhOA39u!y6HLx&p*@Et1O-zIdqAWt_#CyY=#6ryYwK z<8m+@$+S((*5^?7;F&b+_gz7@;8GgCAW$&7f;*RLBH6af4tu?e^Bi*@GJ{n)ALg&P zyi{MtRP_(%`v0%0ulEQyNy@N$1Q`+SL()u*n3|@{hD;3OQ%wT?+ z7Nemg(Wd0tpXt`k35M|3n{=ITEyd~uY7(VjC>Wcn;jAk|lwv->PsV~M_fau+_#R=C zWHU>7{8foRgmS7BW2x6q=E6=Q5o%PdOz`cX7bAL;~Sq8RqI zi#%i z!b?f72rc%yAs6ZzU7-|uxV33dm8@a09?b1~S(gh68Os`R`6Je3=S(<^Ra34rVP}Ysy3pF^R zV^><3X!jK&rt6!!oscJNb4IWb>0vPob|Ko5Ae_Hfz_38dyAW zT4t*vwKBjsvV_cZTaeS{t3*oKLR{f!+6C2t{+GMWHbMBjwy?9~V$F=nC!>0HYfU>T zCm~-|s@ZYQgd@;-xmy9iahIHD_(;AR>l6>`?dnR=0ujpjYazz(%wOhn{YNZ#U-IkFjzOF*3xPu8W#86MDaD4{bVMJ3PD5mgB9~5fD}2%v&#n0q`awr%#PB%ot8*Qp+qW|F`h@6YxHJ}S zR5RJEi-5?X!;)S;=nUafs6iObjs#G^&3p`vK*w7vIC4cI;8m<_sIW1I@+#zxtI_mV zJ5+<@=#W*}jE$DH+%Z|A1muy$F=swR+uxxZVN0cau-_EY76_N&FV*Yb&KYsCol;Du z1R3uE=FWOlmv#pHJ<+;7Yt7R}zn!O=$ap*Lz!L5y+T!&_JMKDzQqkmgxKYRa)>wuy zW{ORs;JjWpV+;5(pIb!Pm*2IYI_xO5Sq>$y>#865deWN&&j9 z>tJrYNSEiz4FUqCgls5Wj5wEsHMgN=wW9S>*$&@m1z$GhQnokr@{xLp$i-wIo^E5E zv^4V;UG7mrSd0mW*lfyJ&575(S2tr9F<-RCu|%XSr&wBV7QoF3WF<$qO~sTiXC$_F zQSqf_Ki0{BgR;t`WRB$sMA{=a6QMxD*2=_faYiWcJD)^PZS*T`P%+tei<_Z$N37 zas&6#WLbc;8Mc`SX9*i(v61V9El-xC0!QMk(V3K-KSG9TJ;4g8|7MDk&7ru&U-N)2 z&l+3c@<6tccbwAAld>Df_SdD|uSfN% zn%zdM6t&wqDU`^O8__FGu9|??1LiB&YRRJA$sF2)o(mCDVL}My`c0zBm2%RhbzR;F znMrG;*Iyz7MLAK(;$J}aE7e#>N||$+Y>G0n`5Usjn4`V{}0*24;5Rbei@H!J=MD`Tw^=N4=|nfCv!zWyt2rw|XZ zax+f2B3_eGuVuOKB1mhoT*<_Yd_lDA!nqM6(p0$U^!ihq0z;aZ2CdOVJubD%G4TT{MwJjG;E8dKTODj5XY> zvsu|%C=lV_BJ;&2&5%(~rxUL=miiqRFth23B4pQj9Zb~1_R7|fU`JW1a*<~(1R3>p zft{8mefgbl(91{4I7D!}N=&H{Nqeyiey=|lOH}L}k#%-#Mw^A&tG}NLwR#5=jL}5D z-IHAPf>}V!U2;Kagm6clkJ$Z^P`9u<-jD1QG9tWJ+LdI+vFHxLOLL@l59mpk3b!4>2g=qi!BLFx2?_9 zBY?~~)z=?uc9_DkAcbS~yb>)kyHWXkCu+ytZQ2%g6>6m#Nqq(B+-;bs>42g8N8fz29ULK>zjm`kJb(DuPo z@6oCR&Koz_LLNY>)Qi!*3XpVp{biP-kgc~o47OIQ)Vn_Rb+~mRehOr%4=)3RI#fx6 z+(G_|grX=F+*We1N{)|OVwxlIz^1>F9)IjN*AKS-)A9(8>x3PCj%tzb2fN_->q0zN zDu;Wj0;gI3e4yZ5I zRN(l2Y}sjm&|3(N{0?B9pO{ZhQnRNFS=RB&^?LfX&?OR6m-{aEh`g^en8B6ow&ys3dJgTFX6{g{jU2MSQ*m+4Z?}h z70&L#yFaE)Bk;L-ps$eMP8OtUO|kULe9YqT;)>qRCzl~|_gt0wuyuOB77w{|@Z^(V zWpuygT^YMxF4$}lmAa*eCnG+4>FnzGH1yZFPCfm?CWuV%y|ioa^H0Mh()?zjm6nl2 zG7!X5n9Uu@S34dcj~}fw@grbqT&H3~AgvBP_1WEn<&S7hg9|Aw3lu@%vP9o0cw9sQ zTqAJ_vOq_Me)t5;>eVWg3TiZcc;~?J3C)oQvsz0}MN^^ZFeZ~&t><-HoGsp6#*m%O z1L*28oqGDEt@~8S(%m(v4>ZR%I44JGq@y4QA?)x42?_i6Ix*8uSNr+59)5{w+jqB9CUo=DSYpJsL zonH2i;vKcDQxxwgmKk@QjHPqNs!uTnabA7>GWg2J#p=UP$6bJt{ob{M$st5A0Gj!U zBupuEF&OT|T2@n@s{p8RBnX&@xu?M`JSJ67-}gS>;3rQnyGFlGto%BjbJ*!bFO*oF-X`g#Um{jzp#P;C3z5}C?dL{}UXpE8$9ziZR^2dxxym51v&$5A11gmlJI^smj)WUK1LLPT>|#V_}5^3 z#&oba`2FgUcMNw8KK?arPJ^MFR}AsdRJDW&mSQEH1IQq_^nt*+E$YM1gP}1Uy7d84 zot+>557^8gZS}-a=o%DIZ56l-eD4!%S8{iN^8(f9e|-bi>S~qx?5%J=1HmlY2B~jq zvlXgy(@J$b8Q|R`@O-~W`}36^1QJ1YcB+5#!t#cVV>%Q)1W}s12G6~qPy1tF2u=Hx ztJRP(v1(>HxtxinBvhfRpM!Rd=^*&$<8UAP&F}3RyyZD<0>kd1<%Oc%Ba$3rvqgr! z@-5iT#&znmwg0|uaPZs9Zo_WK4ArY5kN`zPgsiqk!WC^XUJ6-wYg{d?y*5YvegHL{U`7y|V)Y4r_cHjpSWWUW*O84R4 zPGI%I?i}t=?|X51!?yDlQH}5F9T>bVu%T#BFL?z58s)R0hnYOz3)*;NrsOH4`w0kY zgxpGCEmYgzU*5O%d|I{k8vhPGIP%EL%Ye2Uvm3RPoj^>6xXLt^aRTado;Rw>%Mjsr ze(m6R{x^3S)QewPUZ>vp!(~Xsi2=bzDN^v`ZZO~{wbV-h0#?+$)NqS>&E>;swe!Pe zKma~(IrXKd51tL!ggVXc6;}c_M?s(VUZ4*lgE31n7>h%D{l;_b=6|ep+xg1fdtlQ! zy|#IWKQENh`3S^j79nE@QmcT-)!+B`RM#ue((`Kvo1=>Wb$s~c<#m_xXKUrx*v=p% z6%xUKNfAkh2jxc)An1%GjNID2aL9rKUPOS8vkmD%vDX?Cwh3O+xB zE{oRxLc1P=JSsl?QcQ~T$?JGHQahnEkjz$86+$>iFJ|D5``u8oo4EJ##U3g&O?-q&+v4tA|R&rs(?>2lF?&3~u zc;|*UZYXYuZ@6K@z6~4Zf7`W^Qm3nM$q<(%Om~^Lz-7VclPi(IBN-bRmjM`&75%x; z^yt$k!P}Gu*=o5dPZqwzoOq~!FIV6@L2 zNKyG#w!mDeBKcAc@0#!o=k=SLxf%n$Q1ro`s2L?E;p5Gjo>U0L3Hrik&=0D8DNYDY zx@we_2xiWk{!5p)85hyS0(iQ_IXXq&uz=cC%~7Tt&h&DPWW#GBu5;_f(>R5D!|o-K zbHXbO%ljvFMYLtZ%5vJ8^<}t1o7`m7yQb(VDd#NF~A+ zZfigzRuj zPhax)NM7#ub2zqS<9+>>C)^~InV;&4F8C}noUdl;^>|}Qz8JY`66Lbrfj7h8h>t}q zSd!iN7rnf%CX*g9ij`Bm)h^=xf7j)fUV)$*$+kV5=^O3&o#-kgQKnJ^?uhpDy>O3R z$`|6li$zP|HAy8(S*EbJt;;E?M3RA; z7^S>yzbap^pcPQ4v;I`xtu(1f#MLZbsgFw`Rf4T_$zO^HiGbW9a?{8ulPIJhsoTbj zVI%3S5>9^8-N=5ySEJw~O$>x0wqB<#;&0dOd-zP!1Xn`f@AFgy0(r#~1-q|AChXw| z?QUj^PH96#H)DnyAFSDPK{|UUxD;m%U0q=!>LlQsH7h>Rk_L9+n{>G`2TtyGU9r?t z*>r(F^jRd&_iI7IF15NQk3e${V(v7mPrj0};SN4RwVb(p&_(`67ngw|-sn`a4moO- zX{R_6FD3G#4-2)hXhteTnH;l#IFS>1g7zkbT2`!?g6?{L{Sov~rJu8twtmqYD{-la zS>E)|y1bGPLkMaq-mHOdFellpXXUh;NWv}_#zRF%Shx~hMkka~(@7XpjioT{40l3F zatrcukNZ1#>%XGv%W^aUXpy3~>`aC&)x(E%amLf{TU{}k3voS{a24`cCFE2+Mua*T z@M78fAs07?eCr@LdkJ&2!UDXU7)lf_TKcta#~uzyZp?yP9TeXuc0GZrFPo(l7Ej^M zuGNgYN~S~KL-N&GiY?NLeA$UyjuRUR3jk zEmg8474m}*ybUOayfKWb1MF8c?`$P~ifj#exXT_x<)ua%A`-+vEa?#`G0idh-XrB4 zK)I7Da@}f*%R2=(qn9_;97F^N-r6l!F5SZnmm;~?4zqYO2pPFcB+oE#Rj9w##Cnax z8~$jcWeWfUO@8`v{RgFllW^t}H2|B66{4)~kS_PwYgnuYl!>@d?^(!;^w*kb<*j5n zlS{jTd92M)JHCU;3kvucJw%;I#OgGeQ4TEKjv6e)>s2<;XgidiWcL;4p4Y{0&3jKP zVXLTwz{QL=5hV8=1Q61g1uI_ zE4Yc0uoPmL&aO+m!^;-6Kj0mJ%xjdF9{f^05SA>)+^dSJIDj zg{D$%^zm$ox?bPKvsONgX9^^6oTo)Aq@8?8d+d@mk)<4LHmC@IWtgoS^H+Qe+2Puu zBAIM7V@-EECQ;PYU)JT3dI%3D;1aEw~>oF6kw6zQIR)dTv&)RiPs@3Ik6cg`eo6z1W=H%7$zn34INTqT0~MbIcUKi z_PV9GzSk7wkOlKLtYwik<@-4-egGM2>o7qS`I2ZC?BSFND=opT7om7; zZ$nnvN-2Ud_D&`1=t+$NV?U0Du?bF|ohV zt#~>GtQq$BFXTWUnnF zL(OKS~d=wvC)a1;WM zOf)myP%S~kQ@wK1v{YAa)JJ?g(bak<>dvMy-|&Z%b_!>)3awmn88Y7h#BjXX?7HP_ z!s6~?`=8R~Y@|-s^FeFbTPwOml6WhU*V_;vW(v58LX5TNNdC(AX>!<_>MhwpG^Jb& zr`(oWJ$wCE^dA)S9>N5eJ7%%d@6?%z9;#2h7;MHWO#qv%gsT85te+`r5^f|d*;GDc zu6DZB{NcBv;x(b=f|x*KL|O8ntxE^!bASSj8zF2h;lo?rYl8YM^@i(M!Tc>J$S#yR2mK3 zKK0V=^sYha_uxj;ZWm;5>*+aaUN}Jj+HkR(VS*W(f?QX*UxQn(uu27xa>oE-!bF{M!HqVqQ_Z=>(T&c9gZqA~`8>g;CxRv9(u=m!5ZD{e z+A>nmn(KF1Wa;~V088UK)$slw-Z-%SaTzd^=%%|;Bs+;}$W;bBF@ZX=S7 zl;a0J{@=?tjWTz5cr*%Wk6Jx!5Mw(E&9-Nyw{+U0+t;o`xp|fVmaLh3K`0RbN zZ#dWYvi93rnC?_{?b}Czy56;f9;o|`sUOXJX6DhEx6O2CZW*~XFHT>$@h2Pqed8xJ2MPE`ZWrSkztV<%-(^P8eA@A((4Y$mGZ}y8*N2acv+BErx z$rmS=Cm)~GVu2F=A9t&SOb72|MjN2);4>OWTI|VxQ)-`J;UK*UL{^2_l=nzpZ3UGc3 zd+~n7qtwDBBK6+U9#Rf;dSMJsZDyr~muw9(IoforFyf*p$2iJC%2c;wA;q}NN{CdU z9L;AsjYPg{42CUkO4@uKYE#rpgmAV(TNr0QAh#Jt)a5p7kZAWH71d&DW>ex8bO0_# z%}pPchc_5i!r6LDnnckbWyrSY>fCTT0rfn6Kjr&c7bjJ(x-gSez*O@awvLOUEI%+pds611p&Fnm?oBfo``(oxh3we0V483;zObUJMdUTz841E``vZz7XTw52NBG zf2f9=j7v64ARMm{S@OUYy26p62}$$?3NGNwz_|ShBrg_>CfsE10?d*fH`c`c=v%2= z@PI!e?@4rXqNTy{!qxwU%IBLs0(15pkt|D_fOuj79kR;#y3>rc3m#w2#Q8i+*21CR z>p#G}I2OzHaG4P>I$K<)8&dKn5p!YTFl>C$TrhXT3@WeiDV*#z&6Z-Wkc)6~K;L?l ztYCvQrA8+eQxqC_j-b&r5C6dp_?W^4u|Nnf=f=EWTW*!JdyTCrK?{- zKahKrpKw!bHj^|mcATGm0~#2)QAzniIn2{6`4uO=_78gTBwfddP@(~tkkyJ6U(lD4 zY%iCHwj1kv0_A#+g(zrLJ||f@e96`F73mJsm8!~tOLPTqp)gCOS>sC-TXtqIMA2L2 zoHyIR(+Qf-ByxQRNi6P1^%+AEwBDhM8JL@mf~??{V3N;Wi^5FHQn^rr{z*o$W-^sr zG97*!DlU}(+bYy3rNpFY4dRE;M_gG_cq1-Fa^Y0d7qvEl@B&p*%9hQ9YzbyNu^J0O zaR)}z*;PsS3(OpxSbK7G$-%7Z$`BL0(#`fQ+mv`ih0FCSo*>KiW0$RiE zNS;X+aWd$|16_yW@0ge?KY`ktVY;?juFuQvYO_$5wkA<9W;xwyDMZXwNyq(+)gvjh zKR|ZU^=g4AdU?B9=m67UcK?5_$QcY1e1K4jck@xq^+jEt70YFXz5b}13W59_Cx zG*`$Ie5h!)7JZ5tXZ0O59if>evef}cr_&lVImC(Yp?aqMejf+qE(C9HHq-Qxnr_}v zhx-G9Vv`ZLs_)T<^%rm2!UwaNR75Z0(`DjD{wqPKg5l*3coeCVeJm{M{w`SogLvDKg@SpPhwpgxlwbTQ-jA)Ki=9gb2FpU*0zO z(fkl%X&~>p1Rve#BM}^0VRI(jGNxT5ftg2k_AjiKsx@&6@?RSev|?X3gs(%zB$_0m zLIwqUpcd&R1oZU5+;GdLaoySA%L@kE)(_#6AENFwIAs)dN42;Z?sf-5UNW4w6lrAV zorWQVx2{%=&;tiA8is&u1E1<;Fo8a>Wjrc-Xj6=e_Lu-K0pOL^5gXSIw=AqysmD)$ z2l`?D#hru7+M(01ySmbw)o3biCc^!?J;U<}i1S893X@QeF`atmckrbg+Wz#;!PApN z6t!0YL&*2gt(zz(?lb$N<$8rJ7IMhY4b#vu<2u#w4jXtej=pi*;2qOLgyfV5ODM5D z?yUBJ88fNmj5J-~;#u_Ze)9rY8rP|te=>Eo`pXv%ZyWr}!q9El+*o61Ou83{d2a4) zv!9;%`ShT+_vYOO&DU%m1$VuQ?8$YLR`}3&^DHj4iVcW#8};9lyWlzFI`z!cZ@lW> zw>-Cfuy^+m#V)-Hc$y)zQ67ut8?_2#5_BvgGW5z0Ff^`%Ai`&_RE?dl?-=-Y4k3mT z!n=CVbY%nt(QOy)Wg-?b+x#gnPnh%S@jb)+8^^@zUC|>52=cdkh91LaXS<`|B)m2o z&2(B;szvQr+f?!5;pR=_I@NsOJJ$_PUpzdFLQ^|hw_E8T#05iyCsI8LsEk)`8EOnBC)(N^89l=5qO%y} zIre)|!QK<>vi1m|@>nfa@A~!jed=G{3G4`8-!eqN5hH_t*a`;0Z`J~X2si^vK^g*X z14nDNQFr1145HOpb!~%|kL%RCh)>?2zIWRYahQxOe&xcU#td^pLySetFd4s8!~F@7 zi}Zp`puIu{_iP_-URbSC!+!*@*S9_L@^-be{oH21Ysc^`jLH=nQOIlO+Ouz)dB5R` zsjp4^S@R;!L(j*LpU}Wfd!vBYUMC-n;Kf`&WzCbeYAmn*>WbmMP2*zq;Vlgs2=I;%X{fmp=WEG+bKD`owwPoX&4#0!}2w()(c-Q6H;?EvGq2auucuz+nKv&6n-R$xv zlfh0)Qop=^xPS9si?PqQJp=!NVcf6@0z8Y=w3{tA9JpL)<<$>g33Fjgs@86$d;{Vt zXs-4|4Sp3p(X1qV6j5`=TP$M?YY~k1T|L~tX9-VW=>ghAUnQ|8Wa{J(33SLzZEqZbq456uIjaY!}tW)a~nLt!1 z)Cg3W@3BysF`fGCU9fgXDEelTHcg;L8kQ=mQ8COH5=73!q|BXq&LWQ@3Ad@YW5dlG z$8_-Sj2uuOYW=qcrw2POBx0P@&|P(Zc{OWy035&9?zGVXETdjZ4Y#VdUk?>3tXAE< z`S&`6$}86oflAs{$Fe|~>gm@T!Ghp{K-^KszV=4=>6lIn#03zJUw>@(;IlUlkHD&h z1vd+I&?8n;MZb)aAyBT8`_^A*L@dU`daA2fVru%)Mbgxo~iLa^^V= zvkpkTFB+w?oZPfBzZ%v!1luTe2NzLVY*v5HF)N%MR;yI=A7kJjf8eu#6>Zf<6sCrT zXNsmq1!q_e&x>iBBil)r-TFMe-3;{|*Qth|Jb&Zhr)F(_`H!E}&{fevj4j6deZp<_ z*#q7jlP+daqvxE%3pS1G)Q1~?x?!L=;WW2vn9=XaMHtm`**t`Sl}$1ORFb zz|zxzQBJN0OK7HZl*ePljal$8F=eXb6;X|D^FhCi>(poSUpX@Pu@9;P=ev^t)T+-g zD_tiln8n`3ETUj6wULd-JwpHrTcuI&vb(N8FzTDVTB~59Zh*R=iQ24%D>f|Zad|x5 z1Z2YL%l8Er)MZ=;sXo8BVQ{@0jOf$pD4=f|jzW6Q<1nSJp1XDCJLo2C)Zi^E4NkQ% z;8%t#n;dY&meOqjRrch~@Q`txdir%=J3M&hX6;N2HPuigQB8wx$r~lgl?rfElUcxd z3jY|c(>{^`8-JyGcm|SVjK6*7&cU{uv}FYQ!v$an?GMggKT{{8Hh&=QZ6!;jzRHgs z1xw>P_0-Q^fb+|(AKf{4>gezW7)datA%G%NB?U5+@pL@sgNs$Nm4f@QFuZ8S#Ss2~ zB`lNpsU3sgg!TGtTQSlj&Auu?;%B41sM``q>l5_F6zn=poSlY!@TkFeZ(s;Dd4Gai@$Ir9cwUP2nZ~2Whx<`~@=;%np0}r517 zl_|sO8yAl-1_z%gYlHNgH2{Q9%z4-RX6ljI(#&lW>gmkp?_7Lq^7u&&BNF9Hl_bn* zBEjhzX@rvQKuCS1K0L5-ObT=h-vCMi%Cc*4v;pTnZL_*+<(-qtHLGQB*_5f33JDjm z^NsR74%LPW3#(OX?W&x9biTc&z5H%EesVt$noXl@H>n6XeM#JvurzAce4kan&>S9E zSS?jw`lJ9K%zO6kRxkR}lZOZW)^K6eQyQ!!>M3&w;uml`QL}iIl${fE>LYFKKs+W^ zPj{oP!DXExQ2#|_cZMW_{hB?RiTbrO@Eu+F$+%cO{ls%Oe!Qpsg0|6O8H+UNO5W#B z88bOG-`9p?OsqY`H~3i}j`^FFDwhmmINLMl`v6tpVAaU$;NxaotYy@=248*M5UA43 zxh}zADNmJ61#MEWM5yfR;V0u_jm6M6_{8gn4;nVD?k?y=`3=MU=j%kBC@u2F;myEZ z<^iUg0uitY1)%N%j!8Q(;N-fHn=#y}e(#OLdEhQPUlEmiuJvlF$8c7?|L=zDb^xId zq{rkazcWszV?r^I&wyDop_$u$1;vo(d_|wXtZM$EayDh=O>Y`%K;3*N9kUdIHakF? z7bw3ilg}iz+@fE=M)A2f4KDz+?(-E(so~7!TR&Q!z2UaY;WK=D0Jy6GJRH(d zGKF->j;Hg0nVyH#*hfwd0sZ^DS}i$NXA`^n&BOl_T=%VS9=_*1vx>R>e6z}Mqa!!C z<+1;jFsN7GF--1A=RHaQhfcGl0pGj`Nj+|(mN}!oDK|p5hM%Eup1`-yyk+5Pp?_nwV^xzjd^k|u3g1r3#;T4^0?;I0(P=!1oPP$1lEZ--8dw42A;) zdkh$hS$KcYi+C0n7D<-F7PBnQE@rc276(`29kkH6oZ)#F_`+|@BVVhRTNIbID3r3Fb1cyo zTZD&8f*^?C*@P1MgP23){m-5;T>L+K&fG88JfyYp0j+75J!tqlgW)Qi!$l7seUrg3d)cckJExhiw(R2D z_Ug|ONdc|`8GKO`IcS$8Y8{y67p1Hz%K*6}&qHXR-Y%o@5KYhzVs}j#E`IPBJZJ6y z{W+JQ=U^<$2$abrEfS}SyB8i&1O#{$E?8 za$oz)0g7Ud;kXIo2@ZOU!{HB_$S!hx7GIPEBj8^UBt}xy%46t5G--VBS?>R#ITxXs zN7Bb=#>g=6c3l**JOvYi;}=;0dXL07j)S>oq~W?4bsTLX50NbW;F&KOpyMiUS>16M zeV(az@ojrno+PqHk&{GWk>!ohCW_RC$cQa+S%#qj?MLLevr~aK5r;5>eDI|o{y#iv zhrXJqV*u=|>fyhKB?_1V<~v+$77sG5lr7eDw~38vh( zl|iDQa%caeragbbNrF5^W?5DuSQCtdM8ZPF$wf9RV2egkgiuXdB(dzuz|ia=6ZPOr z324K;|8Q*W%J5@=)W2f++{t`D_ZI^UKXr_!a6!Z+7zNJ6YC~a!uHvyp6G6jN5Gj+y z0$S#1mC}ItXChcwHCk64g(jRco6l{+xevPF!BdL1IvI#1AOW9h5vNQ%Jd6+*O#*B? z0K`So9E^Yj7nEn8LmZ+oTwk4k(Yor@RYQ^IY0#QAhEYQGk?%!1y1G!N^aWx%e;W*13@ zBp0(LKD$T>6l_M&heqz~rbAQgA&h44#~wCZ{6B2W27Toa$FhLjCNZ#yk{AZVWQ5gf zB4A>Gd4VMb0uw}t+D6lXqG38P>gmVddC`Oa8D2d~#`C=$F1~G-zHn%GJ7jsI#7i*S zVD*p`rVSJH8=K8$F`6(^9Jey>OvXb-@_uvMaLNC4E7*yigVV=2*2H8boLMAIS=g}JNu05-??E!l#35PT|AgGtA@IhW&ty7QJ z@DZ@|uEDM95GXYpX1osQ$bB-?4P?6!*C^8)KHKht-;U|P+5TSL9h!LueB5Z?ONUmz zm!uvaju}fX#n}@|MqW^_yGQfSu9hOofX5$sXvg63dvwPF2JJxJi9pL#Wk^wRd3~fH z+p-QV9eSiE2R$i4>5=&lLyw1o(&pcIp)f>AE#Rrzjcj&HSCH9Q0G>i>4f zk9H28zgw#cc)UjN;-ilti{GC!lJ34}qvdAXR}@fH9)19P3FA6-^N@vz>YsdI=V0Pp znrqkY(nz}xDfD5ZUqdQ%A=b1Rs%%WXHKpH*k|Tm(PX0}%v{v0Y*X)i81CGBt5mAl@E+Y4 z{qu+Qc}%QyORyC$7BMfIY*9{=$C=No%@4xhjEU9bPtIvK`oQ<|;}2>s4Cq>X<)fYz z9MyJ;D){maF`o7mRo7$i9l2Vn8g9MwLiM4^cWs4R&mV6eJoy;hPF--*nwb}7AD=YN zy~%JBu!&AD9Mt@z&|})Ifrdnmx(stfl~7J;QSFvT%A4}2#})=~O}9#=R{vOpj(-k_ zfT{z%sn@SG)q@vX0lcR`&P3NGwJi$jvL`+Xj_NTTKwd|6f8w@JX&xx>Qy&3CXd=*7 zmy5z`-gv{9h6n&3fNX&uWK61_nd?Be0~_f8h*Vx{*nKVh9t~ZNYT+W8ATd5Bg({&q z+=Ri{T?#RPEPn1K$XGe`_~(8O`{G+Br|&)Z%!Px`J~_Hxfw`rDdZUiAi&CLURFY;d zQ*uNI2VBr;v*M0VLlehzFr;u%v*}ll?*^bGZAg8`PinaB$jRpJckG0cYI-Hegsftt z9^b!lOgh3^y7yBbzHngugx1@zD`^nrsF78xC&=SPh#8~{bzfAw-`AGQbsvLiKCV*@ zfBeFYg9knaGkmv(la5xbEg~juc${t4@PyY_&W#$g1;DJ}l`*D6tavXTZ|@%b`V_n} zbU$eaqTv?~%^w9$j(?f?+4PRd!RF8Ys`lX={GAbj7@z#>-t?RxCjx zl7&zft?}G5u&b?B0Y%>)cy-kOdC%ZqpBY|{dQk&dLs12Z4#xmKTad`c;sO>-=;Qss zX=u#2PCYYu_YLZwPU}$xFCHFFsh2+mQ3c-PCv8wO6!?$_&LbCY_PXsJq316_Y>Za3 z+EY-o)hgBe;n@Cr??1Im{n}GQo$*C8`GtX<*FFmy{%Vza>OG$UV&7+n$27dFlYST?a*9f zp26g|hX7&~&|*`GX2s*iym61z6V<}=@RM;dz+SlqKY1S39K=JM)PUtsJcMHB;sE;= z5dg(YfrASpQcpS47*m7& zjrlG-dR#nu^vAwC{D=WiZQ@2?KQv}y0K8Mm6u?cY1f2n(gS_);4fANY0T>U@Q$#hq z=dSG^KQa7UgL>)hPp{qEJqvl{$1_ELUM~6bW}q=o8~xy+1G03Z`mF2eE$W-UKfGY; z`HBoaBtb=wfn>2Jg}LcrwDlIFFnh%c-4>p zH)C%C-ez^Ik6TgfIF92bjuXdmLelI3gT6%@Yh+25WLuIYYq11PqJ6jJRZD^3(gHS= zCZ*)iLRs3|-rL@`kW%MoCq)^pCW+S{M`cRa={_MF<@KkyZ;|B) zRTiy9f5K|8D(xmq0o5pJ0Z7cxGZ6c|Z$7?!#b-Yu|MM{_JRjZFT#)Th@d4Dg9R2Co ziF8M(mWjHJNbHpHVxPWLCA%crHDnknj^e|>z}icpnYRlT&Kv-YR5P~BDazM7-L#)no~ zWgS!3c&JV--xVT#$`sFH=kj{`;6DIPqDl)I?QlLD z@)~_QlW`lPaC5bLA6si9Y)KFf36ajTlsRcgl)fDhXSh z*TJ%*Jvwk4N5w)C2^@G0wd81>nSUIoXCW*BH`s_H>*>d7%4F;VK3~Kc^usQrY+m~i z1Cx-5W8&@Yr0Gll303_O9T;ZFJ3m9l@erzR^-UDx=5Bi;0hCLb(RuHKk%TsnY-ty6 zd7m=ExM*HMak-K_%cR*6WzwEVPK1)qV($UXu#iL!JhHodeQFne^B%n^xaQY< zK!Z>oB#|%lA?_GiW$!92&_XQZqpZrgU zFtTJ82LeWaGEW{1t5Fx5?^R?cjK;+HQ2CgF30XZ0#L_|<+4#r*tXy(#siur@bkZz$ z;t9+t9nk_4GW9qVxn#J!3?-w{E{%rH)|N&| zD>;6y`9i_4bQa)anr%;%3A=uPSF=HFp3e@94tVnvM>pHL5l(L9g4=`iJL1@O_O^rf z&#e&-H_TEXE2ij@`6=o%^?DgTZ1oJ~lIUJAQuneEwz=FbG$5M~ojyX%^<1QHtAIBh~l??IIE|2EIUkp$@q z&+81mT2ma-PYfa;!>%11*NS|8(hfcn5;+oymdjzb39HtE58do>3|LeeY6pXDs^SZ& zer7DENvlOhds=2&nxr(;13r4b@IcEfBDQ;bIj5iN4n))ehpxNeON+l_ThRdtjZ8iE z`K@Gw_Uj$O!B$KZm8HnMEM>a}iW;<$f3hO!T#R+h1J4E zYv?Y)$_3|FE}U-ay?ysl%2bVM)!;2 z>10y~PKoD{K-{Y}D||$;X?7)9x*ENakN`9N*%krN_&u_z;%$M*rH|TW41^N@xUSu;?vgtzg?m=MJN$@fG5z z$F+F)VX|Y6Aj-w~)hN>nKCPsE3#48`qh(qz6!Kdzb?f#{T|sx(e!y3^#w zo%pq+l@@`s3T+V-HjB=UYas!2cC(z@!!Kp|YEmvX@q%_ie=D#W?P*zDL5VlkvoJ3nn-vxLH>vGt6 ze@x?nktcFeao{ASp$M`Op)Hp@ie$zdJ)0oQ6Z49ZNfp^4JZ#vJWz-SR;3TJAx>qxc zyc!EA zQY3#aBwo@gV%h(BE|vJ9T%>P;=}q}H+F&x$3r9Jw6kD34&1CAr+Vh1Y=g$I&lXJP9 z9(F>R8qEy_>_d5ms4tw|+9YiT2F-33?zwQ*L5nNaO;sKcmu7xj)k9v{iFinQ7h@$_fx4j5%-9O4M6QZE44NxwtB{a;-mWKGmE!687yA;eQ? z(CX{$=3Sa`>%>qdmSWG(-5wk6!k&#wBY?Lbq+-ju98EjyR@fW>e6aJC0F;>&( z(u5qy=wK`}Y9ZJ6L9`__WbyzC?Ws$iStGpDM;SpNFPj(07*`k!v7_8TRudU@@J9H# z&6qlAGj(x87Jq>_fo==V#il?i*BuKmo~SFtC`Rn%nQ0+E?}7L&B*E3+MQy&3wL*I@ z-C2<0BL2Lnk%PfLk*E)n*{mJ9(;;J$>eX;D~nwRBg*WOk4CDBn%aktYn=s=VL zzj`d{;D#e6=ZGChusA}YbdZ9hgZM)d8VTIk4=MQ1r`m;!e3c&4FbJ{7-l5!NA8X>1 zI&IiC+0P?qwhptWc4PJ=G`x1S?<{+yZ*tRB7?_$~3_cTOC147SDg5l<0APs86cY;} z7dY+E-F|dPLPKHGAIaX4$M}Q^DcqDw@*!< z#QvM|!-#s<4-CYj{UJ|(E+TexnHOqLN+XBPH|!)=Jn~2@d9dLFGwFZga;TZ^a07X8 z&Fr_yR|aP{Kod^a&TGQBAv!r35SBq8A)^*(6$zQ@-HZ(RaLwRQ4`s+g*)t8T7;O14S==Vdo9b1ti` zdk`sZ&RlwQ>5WT!YX4RHQ)KU1zvSs9*DSf9=5NT)b4g8e^`na{vb$xU%GSx^)lAiI ztFB)BXH?DXufFtvZVh>8<@pJWQL6nQ?WbwEg)r8c6NJt|$-8Q9OB-^ru z)ACGM9Z+=wG@+$Ht^g21K=7bmuR5qwYVoEXkl#G@EI4b`dw4b!iZGnEGo%C-f(O(B zfCvDcrQ)hQn-WfkNSVz$!S* zyoO@oLfSC?6Ao}ZzHTdjeHOQe2}Q#|R-l_93d~UlwVjwDMW<2`jz%JYmjL1{Z>_$x zs_Zm>zAOc|UBN7pE#3?iUx-CvI6$2g6ekjmU=U0YkSldqg})flMAf9}mo1yOX|;RQ zQLMB^6Yj(UVhq6$5JvEGbOsoTmO=^z4(8c$e0(M(jKK`6ut=Q&tpYP2;PA7MO4W(b z356Pt@gOEwZb7cayKaBUT<+2iMhk#cD4+-gv|J~r0X7O9igp4i73fr9mX+u%^0@`% zw>AHAk?eEZ>G#SIkb!D0)X9Z-{24gL0d$FA0f9Q?*a(YxVaY>xw`{)kTNv*arG{52 z0q4L#>EuG#AdOrn^6&C|0Jtx7Ony;C9QZv-B`_cOtDPLfVj1{o0AP?XW`|K?UX@xv zp(65g=Raq$75H!<*cpmOso-nr{Lp_3VNhB?VvwOve%}1&2)4)4V}P1S7?2hX&jQWD zVUaQOoD#1G5ndxd|F(@BHq};ut^lG`M>^Rsb}hhH*Z~^44U}QT2>?_SRE6c*%E#Iu zqtFJzn$Cy@vW%?(&J30!7>b0#3ROU*B?D24EQ*FOg$y=8G=gCQA%+r+DlE_|<^9S6w*xr|1_5{j zdIpkQmU}h+O{EI)*d@`3N-gI^?pxSBiYRi=D8MtSVko*0NIVS(u%sps;Gj4ZQFWN? z|Bsd}+qBFcUKM76q||l-3WyD;z>dXU1)h_k;4rO584Rn)UEgWhyaOLY!$A39kAyV} z$gURKLmN;)5csGf3W!-q5#;5H$|w~S1_W3W1p{()OYsc$1rz2vLyQWjBV~YPv{CtO zhn_BvQn5$PhNH@05W=nuL2odS5$J#bpm%Z4tjeAy6ujd zMY7FXRmv!y4YS>P-G7^o3RT^YkS5^J}1ZSWt0kh+wEFvhF$_Ii# za)#9a3__W3$`Bt=M-;)^rj}6g!zu;w|HGZ(XaKzknfA6iNWQg4i_CAe1xoBJ@Ns2n1O; zs0xJxDhB99%=F#Z@VD)+!yewMg>+(~!uW)tiWjn|3E;PwIRwlAf(8_)e4D6BHG6ni z`r)Vw*v@DOo#E-G3}W?FVYQM8aL_6NR=)E#rXIuG91a1JtA?OLtzhjV8lb;87AlAd zDm2)E$UGkHK){eBJ~{pI*!oJ0A`OaJw~7ivYa{~-*DnF<%E~qw!f@M@#Nrg5D zSq!Mys4AjSg@f{q;@42G8Z{FMLHYrPMo*MbKmnX&omzDmQWDZ)tU>u1C%y(c9EU4D zjL_Z!N2>v76X3uQ6fGCj2B0$4@^$prhDb_WpWjn)IO6*>AD4@hv4=b4vt3eIf02`FA6}<_8s+!-+0@d|(SJwL* z&Z@mfuA&CKrR8B1uSdFeA32_FQgPYR}MJ^CYFC{UUz zpl7#SQ3WkZ5nl=$YW%lWNW} zPzXnp0kJce452ep8ksu#HN+N%knQ2YAsC(OuCz=|H`R7ls`<<(z!me~ii}br>N7f# z8n;X#$Div!eCLuI+l9FhHG-W}(=@(QbeA}Ly0w0WRrhBtS)VqB;Ft339F1dS5}FuC z1XR&lL6^YAyTdv)eKHPrK+Q}JanYV^uWdll-%G9tz?N=`VO$bQfO=oy#QJHQFdU=( z!BwMi-ntJ#%B>tfn)NCfbN@u3a^bolg8oQowvI71wbB)$nl*Y zp&3y#y)mM`9R4mzD~%%S5$?Tw_6PFS zCV$4pTJ!ja^}(59Wf2eM^2bTKer^rf|Hawmt*8A$ki9p1qioa2Pxs;3I{;5@3m(n! zmTy&9i(PTQOQ*1AEQtTY+deq8eNKH!h}P-96sFq$2VjBWk7sMh`B%*@TWK?(K$5|V zyw*Ov@y8IdWaNnMrH5M%{%Lk8$z6r6o$eDW3H<4*6JP=07iu?LcH(8;R`eBpNnO!e z1dzdi_^e_$?sIvFI!EN$pyqnSK3yLCs199D6XH~+Im_dLd{m4GBMQ$_s`a> z=z|Bl_SVIJm-Wfl*F0X|T{liO0uO}>4Ym#nRouw&u+QJe#*4;*kk%SAke}TIv640( zxbo7?WY?y*I)rn+L6sM@`+BGX(V;M@DDo(_V-1)TV-ClVHAen$5W*~NhS$AgyReJQ z`svHl^vOV4lvo{2v8rs?)Eny3rd4Wk{WtM@X)|7n<#YL%G0}6HejCrqy zTRX}d+*+qHVl(l5ITcxU;T3gZH5!~ z4;Kh89hgOGtib4GW|S|YZlTc_W*kF2(cS=`w6vMXe*W6|!Vhkse=;;R-Htygf~H1% z=5ZIw-TF~@)~ZCVSE9KUe^S~E4AU#9y>=_cyb7fRYGr$?>MySSaYJX_mup^yNbIc^ zn2qNhMizGC{to|pme{6W5 zO?dQfsu{bG=R?Ef;zLdk6yt=8E&p}{jlEE+PEqob?@05D^kumEm3HCgdn(4nj`^hu z_o*#rZZe?BBN>TncuYwyJA|c@G?OXYyD&&vzp+mE`ypyZ^iEB0g|vv7#EOM%V2m5l zA+0UUVsk_sQ=>53+^~>D?%3snpEULaa*zwuISeym6S^Xr5dfW~a$KO$9Vqr&*#WhZ zjQ;}DFKvcH?){5|H-16g_SiWzq*~lLqmHg2p7W?pxgM>mI~7ui{W$tF%&mk*MiR&= zQpRBK`Z?r)njxQ?-^8IFe#|oF)F)jbwS6E>dLDrAFKk2>trEqbz6vnT19T5l-|=S5 zh`7vAS7vO?A7aL=T*Bf_MQKmAG%Rc-y1Q$)kbO7Ktrc4C$GTKZkBjl-0l?9V^w~pp zF;euLBYLOl)9~~;_zR+On+f}}<4ILS+2aptvf~V~KMXliKZ3DJNTi&o;^+agMmYEg zm3i!R8owd(DL7N3lT2U4sJ3cRej&<{;$f`6q!}6De!1h|+>NV+zaFL{1Qs-uMP%WR z>uns%b~C&KF$KM--&*d=?|*~7NN8dK*K%>%^B)%<%cjqoA5)KU)H~Q^P4zjQgTa1X zjNCelu1H$p+BR=L*!#scVdWg{3TEYObVZ!^*nrN)@>w0{W6~+z2&zGryHfwyY-6K@ zMyo->@c7`_b|Lu~ofi1oX&i{?Yu5&2$!@-@=we2UqyC^%OH5Bf7NyN(YSXj3gkL_1 z-<>v(CzA0J1|w+(l7E^$yF9c;_)DoW8pZr*iUw77lt~WtD<;%qah*3r zM}t?nh0Ww};CtoELYr{-VRWP-N0};M|1;HX4T>^m`~I4@kcFq#jecU&(3k~r(+no; zW<77sD@OB3($!<;$@gBu-;gwujY~d-4te&E?LzzS@G#fxbSC^ZR&9s|hPp#aSCJ!^ zzD%{Vq#4HQ-!BmU`Z8T=Y><<2EY1m?1u31_TxQTV!nyKf<0H5W{rLr$`kx^&QIjKzluIcn~_A}kqd-hy;^xQpVrX%Ei>Q( zeWn!akC{}XahIFrJx?>DI_!&Z`b8aqKkBhBOIRUpy7dAjlpUw)f?=b71cR2`|X zEk?>*73xsd*`3WMJ^i+<*GP^X#MR)uXJ=P7N-6YG1TfLv?c~;HXT>aYWuA{bho>IQ zT{#R$bhS zNTm5;lalOuWObcz+c6k6%|p^8>ZI;9`p7J4CU+!xvvBomz;Se77hi;#yR1CQVwVqY z)&lP>!cU$ZBk%qZkBti(iS8R~5nMO&ZRE836Hau%NTzA9j0hv?b9&UiAcCP)Y{X&h zO_0a`3}~68m2CXWgjKNog#WaSv-kKsmejO7lZ5ChB+k5wK1q^y0 zUgR%+b9QHQzf+T$Kz{P>L47t?$WFw`!8h?^X*10=Vis1ug?mhMI1zEV8H3j7H#7Rt zxV|jHt>lKcF}o5Pk-c?h)41=N+Fvv#8~Ym1 zuDznMso`%+S1tQZ!!xzF*4(~qWnGQzV8gw&FE!k>WPjb}hGN4d4HqscHEd{Dw5Vap zkC**m>FY~Im;Z5D|MEwd|5sg?%)fl5b}LGD+LkMpuUPiy`oGsdSN9LuPwRhH_d@N5 zb@$cXB71kyS&O5K&5L&~u9vNszaxK2{*&6JeC>xzvrA_W=-P}G99ZL;V#k!nQ> zk)D*z)SW@z5QW|3Q{sx4ShY-~V*D9P!4K9nHwdu!ycJ*8^_`$%cJp?F1K@aL0RZnf z<|e+c;g$+H?kgf|2X2VS;(;5ZpWYbR#&=FqX?o>m@;(Fma=vzdr`KTMTYBQ9Dl--Y8a|eIllpy-egLF z)#t2953;2A6f3@ef{N>KaUbCL@F>6u;DslF^~ak9k&GaQq+5xurLl^f%?t5yxw)DZ zA{8A*+=SKO!8*HnYsQWG(f-8pvrkZM1_xWdwHtJ--|Imhc1Lb?ONE;DyNtXogRW(q z`{EcM7`Zw5`cufP4K+t?NEBu>bd?vT>Z>QH2$JCJUaWk^2xz_q`D*;h#@kO&?ItJW z$AUa5-AImOWo?F3ZqbZLMF>X5hBysNfo4y!d3(~<%)Xv~chlxF945{(!TCM-)Q=dy`-E-<2OT5VxG&)Sd7rZ3t6wqxU|h z)>olID|E%J=o)qd*4V=MlCgYs%?Txw>QK9B+CT#4akF)PHAZ-pL)K;`*7B8xhm42@;Z-ev4nuO?O z+&LSnWXmf1*rN0m{b}rQbP1XQ8H;FP@0Cwiev3bt&S05%s{uKTioOB@dyEl9uUd!EV;0|lRb#MF~aYI^)mVLtLsFnRpEnHKx7U_>!s5) zNq$35dey5Um5Lh{&*e~3)#A^%k(5Z6U;NSus@02n+|(RqOVZ^?Wz7 zEg7+rF=#GK8zu+U&$&g9R(=eH3R!3IPX;?3Y_WOR`fpdLNIBGv@#u=w5$IzboG;^v zH@AsYoDVdg6SNAdrbD|xupxRYJ!#%@Ab58W9>8%`0UqUEMaw;(w<(BNb9L3*ezuo*n*}p7?*M+lsnJt-8W#}VRYJ9dav>>lh0C@w4{l3EpM zS}JF1ZAAj0e3Nb(hlLvIP{=y@Mh zrG@h)ZEW~gjj;$2 z-y-G(LTXg3&4_;+o0Wx5b){&jcSKZC_o^qkmR*LdiugUYh%-S?4m)@tkrmW8wL{#+ z_KzxkhdM-Ln4v3;#pcQ`QbTvTy>gJ8)`6O8FN(iCeb8Hb#lo>*Ds}rJ%cf&UUxx0J5M!Xzf$Wa z8B$tt7$ARIzO_`LLIZR|4&o`FYhMT%x1896A?1>lA{oXK1O*mK+U`ojByhrTuogQ0 zB~op$Q0S3o<>`$3O-7vI=|smrMJf&wDmX>#On}3wUPp?wWXC^5Do%fsE#b?c=m4VG zpcV4gC6Km`IUr#wi(!QIX|80K6a=JzE)`Ot`3=q_CNX53_c!2eK8z`L-`sgk6TPM1N*Q#VAB?p@R^Zn1rCG{9YQ%Y0a6i-&txpE?hs5$6l*nvh^uv8JjxP&<_Yu;BOqdz{F zNp!PeGGVvl`j=k(g9;T!6VwbQ-&fRO1tDa~6uY>h`EV7$i3iKAoR1OqDomxAQa*3z z!cN6O0KqO=U^q|_bSoDRm%$TNHhEQ*?Z&!~yUwVp`jYb=S?xL3?0}!9RWEVIRQxoT zy*t}bf=*L2GF)f3=Agw z|Bm-UWR;|+G2Z%UfU*Pnjo!p83i9*6&u&53^y#SN(4v=CiLu<-kKvEI?jN(u+F-P1 zaDT)phi!%11C$Dk8!Jcd{0Dt_JROxBujxMV-iOZAZm2%-`UsO7N-mU#{wQBks7{6$ zlOO*BVc7S5IJAw)BlJ|>mv~*n)53TYz4Bi==tm+-h>?$FmK1qCD*< zn4}R4S@+M`f0ylY@}IM0t>+$qk*`t1-_@#5m}5qlL7%d_l_thCih<3wkn=y8UD>dZ zf=U#>L%x#dw{{7;R$uFuk&aJieXCtIh?EX41A2lPaa6;AhKWo4b*nck0A4)##)QQ_ z&9@{laVbNxFV1}a|0@yZNB^2#zQR-0u(|d-b%mNIWuE$e`PRjs2ph9UE-F7P(R>=> z!%}*@59NWgeU4$hYlIs?V&_&2sCvm2Yw}K6GBVoM8J%B-p4&`81*Tc zgs&^-HfV-39;L|V68Ri*#7k&mU{E=~)C2N4@lnzOPU53vN|TOuGaj?u)74#2n(Z2q z(~N8mQM3zbcpws(*zu%>z-ltWx)PHvW7M5hQwYJc3?n zN5`JqLH2&$(?Hfa@4bT@ZJb+7Y8vL&(YH7Qc#CgwDSbEc>h<>+3*Bxct?Sp4gLQM; z8Wy&qB*#N16K%8!^~>gvkjn%n;%iL6<<2pDe`Fx!QW*jxX-1qawi>e~p^@Wla9yKp zL%VQ8HD;^BJ2l+}7jkvkkGoKMD{?*1Fn4;n?tgqmyKryATtBUKQC(HP@v68|xP39rKV0kCZepG~3q38kY@aV%80eQ6zg0_%G6uBw98a@9gB0bj7 z6~U_p&AK5z`mp0FWr3OSj}N+{U51>isls&`=UYJk1pPrC=A)+6Cszm zEUK+%P_QI_awF>{pOND~D3@5;-!2?(sYtD3zGu0jA&UqUpE(&cSR!L)6kBM8FaP@H zx#lJ*jUvyG9pJmKv z`C2%j%Xzz2t;M1?hsHut1sk?{_0DWzFgTp5Y{CwRm4t>gLFa8H_Q!xs`rnQ@yj!Ca z_W4fqgkqjCMiq(0m4Ts1+D;sLs22`BX_S!2)a4CGfBke2RU2Bd?3J8Iqg8Tq^%=E~ zH5hB&tGih?T7S1=@5SN^8_hc)ZqxV}+o$4(!m1&MX58Zl0-Qr1KrY(^p^(sMS|CUl z4VZs<(;VKr&|R735usO^?@8nnFU{uVXxy@o-Gv#DszGVqDg^II*RjSQROaOx=ol z*_~%n837Z|JQJ6fcN^Gf+JKnHZWZs)(t~bmleC#MdtW?XxN_SZ9urj#eKf~&Rz6;^ zWcr2xT`TMP54TfkkkE+k+1S>DsgK%)i+9WcK>)2vb47^z*fKe+fhCe;iUnuUG?Gn~ zr+PyfK6|RrOTHtAnCDSj3mF0L-U6N!3gesSX;y3UdL~;K9@Iy2mZ2Qk1-(PQw-J*r zA(1=2Z`evuCaqnl{T$|HooZ^@4L-WE4nu+B1@(zViO-#lF@A=`Xxq!NRn27m#Xmof zG@Uc|Zsk=sSXFmb^-{oI&y*`=!J1cUe?k>nkGT11wuj2=bC1`l;}SXNWO}q;tAwaP z=32-uEFql-AWw(XYo1hpM zlJK&B2(P4}*VZATlI}FHxp%WkGG&1;1> z`>@mKV(bMUaWC1OSv-Y?z475LD6U9(eOpKb+qPjLiQEx7P!3A&5FXQ0J&o?r92TOW z$BPr5A`=>&9M_C8#t0HMmZ#?i9r`1oiP;)~d|e~_O;=%bGJk}VQF}8S-#a)qkuWKu zy+M)DZW|a$Xk_CJufs&Sdzc1BLdt0T_B72IA(}cWUm?k`39H_e9SC@hajnQn=$Tv5 zB&Cr<*VS%0_|NB72`hUmQ}lT-5?9Qq_Mqs!deGL}udwZ3Td@ch&}~KB3RLes9c@1cW1aS@ew1$y!J~pIEl8o947;U_>b#6BQ9PrlSyM@%Kir#@*HLj^wy}PLo0o z%%~sco1~Q-kq!00S zTF3*FbE{5IJ~H#je6MgZ+_?P2#SpI!{KI{hbP zYUev1;i28DE|8IIajvNikkk~sh$(9^rKE|&;N|71=bQwt#J2hoK3R48Pso95468`? z*>kp$4RfsxWc?TB^#A7CHTi|P?=)#*s(_gbI{W&4zCwIdO?F*Bw~AbJDV9`1B0BHl zEyDhv{ScA3YcHSkA=w%nmT=BdzdLm$`00CQ(pTR4s4Jmjv?o{N^xq<`dH4Unn_+XZ zs^N3>vFa6aUG0OiWX&6OH;+6e+bk%uM_Ad~Xh6v`@|5JcA4GDQC*)#5f*>^>lw_dghrSp+bVF`&DT=f4tF_P z1ywxQ)B}u#<^7>x4*4?&oXDVq_21egZALnUXgNznoACUV71L`7OhlC$>CPzzI9;zb zGa0p@T6mdBE7@@MTw{}zMn>*=`6BYbr>|JZ{*NBoL3X)rZzP{yJ@+emQjW~C)E8BX z2{xWrPWGfs(YOZ%Gp~dpar+deSwbVnUS5L9p(z9weGwMGdYC^nsf%d-4Ck4winkY2 z$U!-5Pii9Ms_QU7Y4dzo`AO5~8I;bL+j&~~-F8~hB}Zqc)(ZDtFJ1s^UTiqC_RhL1 zs~6R~a1A``#03z;qzOO7nVT4JbUT@$kqI}`rvpr#CypDSizUrSlJH77*~1#)*Ec|r zkW+HH0Cg@3q(L3#O(xIyxXlv?`At#E0(YYWbIlD4NhDBx7J~CHd10;aw*!?+2~G7O zvf*=nt%h@Jbisr*ocHt-+0&5gMuL;+Go(XrABHqEKiMvf6FTGQ&&letOe&%DGpb3w zve+}$<;Yf+?vh)vbP^iioo{04I&Q3nf%5t);elHrTV>?(`1}+ZyZShmXN}>o#%8fb zMx&x6-1|+ilhBC6eHkM72Y%8fwBC$)>cEDhDN#fpiZSaQ=?RZ3Vm5P+p~p-d4`Y0P zx(O!SLP{AdeDMC?t`Q91prVeu5Y6=>&eEtqX=a$N;q;I#6jpoUL2e`<)oGlAe=|VOkV0CBUS*`pbH!8k!Y`H8iw6t<0DF!7tcb;SY-w81CNCyK>Lv(5E(eyh1K^{ zU4_kZG8>4-XHq0s#yRL8a7KE$OhvGEKY)3Y(6D2kz`T9;w;jUa2j*y^G^_wkv?8v6 ze%PgCIKYl$1B13;QC}IA>K<^C(8z%?I3|$Y4*97*dJcD$d+5%A_vLa7Pu#>7x6RV+ zNqX#gmLH086=ur>3~wQc$ZS?I%SJ}PVs>D3m(5R7T4n0hrh2r)gYGP9PKb+j^k;J| z%NJ0{QKoU*!JAPXRR44EK<>kts`u1r@~adKc-r{Ed! zPuw$$!7e0`Lod0v9K8R#?LzAuowEL^8Jh7!T!64DH|*zn4T+ItcT}Hqh@)Np7?jOt zNae7`;m0b2t)3q&myLA|4)qNWuw%yFF%K{H_@#+!=w2)NJz${{sUoTO|5~hC9d~f<9nv5+l0N0s$ zFzgL!L^ivhL~j<7$bt74Ay>}GpK%|1vV0%2OwG_rv0@o!v(Y<*96)KNiy6?{qsX{a z?$3>f=TGbyX1GalUKN!CFIG6=iU>+$JAx}=C8pUBd2L*#H7((qpnGo z3l4SJ*hH__F{~DOYaRh_DGdqL_g_G6dSp%n374I~4?a3~0@&L`%SK;}veDPqd~flS zi~cNYqBp<~*8@5}b22ElH^^xxSa&+XX^bXo!9fBYr51A05!^ICLpm@3Z_({Xs4fXj z%`~CY;vJ~hZ}pGy8Go)|?$-py{b6cBx01J?f%PS&(R6KQ!S(DMaIaeZ;6OL;7;)#a z(Xk1aS0!5B&pn5WpOi)dj+f3C6wl8g2UWK%64A4~1?)dm3 zq;`9e{(`r-2c2AOC~i@?vSwQ>N-lqCZtH29??}F36Xd^xM0V_*nyE)LiI`f;mhI{7 z$!8;pl*(E_>Eh_ib6Xo0Hj0JhUVnMcLW7`Y$|1~UrxEAKM|eK3u`1NPmLlI164x~F zD%Mm=BZ0`#3xtPWEz7cPYNi}8T;|f1(q`g3YswF$5~GD)b7gO}J`H^&p#iY36vHt| z?&-M`+2J5>-+E?VIy_Y}kNm8L?bY(SeKpV3e!t!&zTLq5n4uL=MT^#IW3+lMm5Ff^ z4ln1J3=+#bF!-d+Kr8hB1^WfwxEWeeRve6DGLe~N(}v#oK%}Tl7{y7M zJ_f(HgoGTMcfcZ<`g6PR)-gJyfvFi9{wxN`@JWWVar*d}X;6pPT3?EM^G$3fNi&iC z=_ln!thGYZTPM%CU{%A})pfAUzgY8Xy;l~LE2-@ydNOA=;BSZvh>ZT`5!R9jj(Qa8 z@w7QX_8rHx#ovR1kkZK1(0k_#zkUyY1eV?mjU^N(Ozob`IykE}s0^gC_JA`1e*O zSa|yrdfwvHUO#_oC$hy+z@`h4nA@)oj}DN3{saAxw36l>7i^{$T$_;ofS!|(#EyAM zEcW*dYlpZVTiW6F_}vWo_Q#OKg{{a*7{=Ll-NPNoJuG^(XK2w^aW?#(pfbT~tVK>a zq|!%2@DP?(lA|9&r+kJKxbc+>$**5~%tHECu-nOoe*~Jyohw%23E{6$3bBvp*5OHI z<_z!__p4i})nvGEB&64|8YUkiBX7gH*SwGYCLxij|1!fYe;;N!J;B@OPw+1NaI9DF zWiy4z5rv_U5ckR6Pq9xVB>0?Pyg+#1(>XJIV<m(Xy$c<%B#s15RZ=K3SMd^ML|O&ZsV-tcR@B+^~>@GP8d>PxyCbq z5bc^!bg>hR&5=iHp2%dBve?=rZ6+Jvc;bBFKy?X+9>j6``~uhpCf!k2a;BQG^IN@z$6I0>!vm#?iA9+a0vor2P>6&>5n7qq=xD(%!pf|*Hco+W>)Dd99* z*i2++n`ws1Z+8gsC8e@!e&%zS4pADq{mD_})ec98G$Fj%KutGL77JU&vdIrLpa(R5 zZ02OprAKe$quhWe5X%^Bi9RG>e5@98A#H{e^`VP|^Ou%zA)yhU;u(=-^lU%VJsI{H z^~rS1f^!$ra#ek)rBOm6$FDk5G}<2amOz=XqH3E+?wBvL>xIZ84@%#Ohmh=zz2t zy5YCykqxQuEf!WR!!Rn=wzX>U@!Fef9y)M*9dpElyL2Z>8F4hAc|d4HNtU|1FTc)Q>hC> zB;5=S(#DOx-RB+*W~+riG?&VcTQf8yQCz6_P|?is`t;DS-=zqp!ZFg+3c<~FlyHD7 zq#-C8;kso@`?(JEgo@u;^NhwFxpaiLu*0;oZK#h0&GD_qrDx`?_2W@s3ysCrl@n}=;} z42_L&=03c+io^O~6^13D!Hu>bE4AeN9fEf?<_Eb@XBg}V(O^q5A&-~q?@Q?-dX1JH zBkJ|&%x7A4TmE4Yg!Lu6Y(*PQZ>w1RXq|b{yRx?0e9gE26K5H=3XV$}9Vi}`Morp3 z$_9#AHq05KgZVHLU19-0++1pIlF~@?M_2458P$Jfs?pzx^X6sbNYP$ zu!ps3Sv^NNwUE+QY#a$qj4%bTVy$r2HYy6rjbIz>14>+ z7nWA9L-wVU9$mfUBeGHWupBYB_TC*O7_8_SjmfO^44G+kOpFbLA{O49LdNp)82dM3 z5xN)B#Ej+TOrdveq>F&!PIyz>ln$ZC?A*>3tLg$?uU3p-b586 zt`#)AQM^`I?Yvvd>LMA}h-$(!XibpVPO20n&9wZ9S@_e=5^fY`W=NT5;@Jqx8{?`N z3Vqwp!cU~lVxjLNXO(a@m`ILxso97!7c(PGT$)P|_1XA|v{{S~yzlJNk7aE@#v!f( zfMXyyDd3RS8%B79l3bxEZD~C%RoH)%8hJ6k`t{P%jjK;QK%kHZ;FS&pLv$ey0cc_1 z)Pal4P(E$sTDAme+G#%_GSjjX?;^YS(u&mxb)W!RAXE`)Mx$a(8;2VOYqdUS7mZYeoWRa)8x^eB+Nh~P5ekp;*{L^~)b^194%vw}NCP5hfr zg{k5_D5|nUQ=$c^oj}an018IzLlW>#fLm!NM2U}RN-J7V`-yb6R9Jcy5VSvp(G?!qn^^56E^hDs=!wOos1S0gijtbZ%<_ zA`lNiVRR8N&mzJ!00{L1%1`%E+a@i0N?wN3e~L`#jVCH@)6SCR7nbT)BT@&@V~XL% zV@nJuQ2_c8{zJKLZ9OefkX`xs4Knh{MWyU!B8xvK8U+Pms~4QJK7LJez^c(XbW zTSQcsiUGGT$*FXnt}dr%IHYI9Nw}&HIz&PvBRLr$0$)a^f;alGQ#-Kb&!6A&TA zbIRFHR#X4(3`Ho4CW~S`6zyWY$lVi*TI>UvkodQzFDaosql5-y{_p1tuU|r~ZJg^A zb14ey@bLKX1e-M)hGM!<(4=HVCSP%2+!7i&&fc)~VDDGf3hz4TiGq7Yxj0)HE5JCl z&uP=C>vxK^Ol+#7LrK7{fEjuaM(*170W=8k)m+)^>|qu(-Sup<0Izo zv<2@xbpG!3qdO8Bk-hO44DV72wJt8kxYnBIXQs3)4^p+leC#I z&p)w^?7#8;HsnI4BSKe9^MdY3=i|)qSVoy0$=cHsNpVEyxp9+ONP>UqHz%Cuw7A2~ zZrU4)MiqBVE^f%GIjuJ7F^rBW4X(7v>5qfBkVt6c2y=G%c>zvbA9_S3z6*@R<6on8 zn9^Lht1mHOQIAKXzP{MR>8VdCLXW#W40Cr+1e zCCtNi_h7>5)!1}+Jfcf@O&TgLImFlEXk+JKBc zYVE0jHOY5`8Gu^`$*nuc8GlhEics@xuKiqIv-o~Fo6k&!Fp(+{(mZXJ^uWQrpO zo-zWyPtr_|nKj#q;&Gu>Seb$@qka$@7C^iV={!6?%(%vl$oZHbi|ED9G{n#u35guL zh00q8GNfc;RM&$K1*D1@JVH7fUtm=Ied>60Ff--_f)kqh`T)f3GbF%xc9C}jrAh`5 z>c40Sl}@<4cUG0_n|uZJO`cx-mVB{nCp|S+V8Pr|GZYQDuk1>7M166Niz!?a#%L&; zFGi_Vv$aXuOl04GcsqHB`PmvlnJYPE&4$FVzl*c=I*WdfOT{Cb)lGT)PTEXe+*aX# zKYn2gYRVN$XE%4bhX;E(rdyFt_bZZW%=W$_ekW}vcl^N8C;a@?_mNNH_h(@B&$_g< zZhd%ahT<|WD_2D6NlkKHe8A&Zu)_oWI+dD4F9j!QGts?wz$(0cDYb8HqoKZGHtk6{ z#wR9|gE1A+jnMseIW896=#i;h2a#yb|Wz5 zCC%j6n^%ifN$wsgRs7C$iC!Ent)pu`K+mu85~NIcFjRMs==Di3TV%&aZDVi>m6`r)90JKLq*1RB zuEe@8t|7Z8N|g$kw5L~2&I^+U_d%Ja{=C{77QZcDRTrswhzipNyy5w#W`K&UWJb}z znb7TJt;1}JwS|y3$vag-t=|Q$I2Px&lB_<{E|jK90MS9;Qk%FW7XKaeQ`_9GEu&Mw34}Nu&`2^7!Yy$ z{$I8WXHH`S($kP4DaF$;5>6zB7{(upk0cDyZW}|?SE2)wW^&*)7Mu7w)Dr&DmGt6{ zgP9^0MP)D%V|#iS)o3sp>M5l3qsU=`OUyc+JM|JO`3MCl{zOec6vO*;hPp~HEwr?l zI4$PnkU7ou`SeN78JbM?B`L>Na>kdjoDv#v`0#K%RL)}eWqQ~TPR#(7SqVIth~{)* zCSg;vUY#eD8H|%luEX#o&E(h@4e&NR9;p+KTvzHT-$f}#RJ@B0X#&19@AgL(shH6m z90?Q6_1JjQW^wD^cYUc(Mrv+9Vs1xf&uh*sM`kUQ2*^on|LNsKXll6@mmcTWN|&@D zLXH8}4Y62AEI{)&AeI#A1JdNtua&l}Iz5#*{xUp&8TmTBePxWuXy8HkZ8y+-i0ecY z8{#{QdgzB}zFmd^&70^x_UMHkKx{ zKPzorzMz#HK6D!r@lmYN1wW_83hoY}`9Uxv**-PznBcm*bE>QYGB^GUEP$k$=pIX) zdNFk^LB+cD!k<6%O1}xxmH2 zLmUnAN+MHtDrJuj+b2en2F%FarOl{yxS*LFIdBzpOgU< zJDBzjs0YnjcwZ+DVNMq|k~`i-lErc*z&8%jfnZs}^ULC#^f?_I=QFTs07yoG61ep~ zEUUEnluAM??}yf}xXTBt>OBo-$_DGEYM!r_)&5Z4Ne?zLo@yqIKO)+Q{_X@afNJAR zuQkrv)R7>$eHMR2+6)Zhl5GdCJ-QmH{AfpUO+AS`R9bo`hvB7m1;R$ol=QP?|I65u z*B^!sm(Yl#We68lnlAh8!<7+Jpr|N_7I%ixGQ)i;W=xOh-Y%3Epp4XyfRThoHhzRR z;CJu%CN9p8P;)FNxou8z+iYpo1~qOf3ra{!KBJD@?I>c|ChU5g-UpNO{Cb0Gqle`u zijL7#p&0KD(Dj2O=E+hcpdAZo$PxGYF5!VEG1~IwhC)8YURnM9td2Ds)y{&2AMbO9 zL@qNWOrC^BWYa%_sYb)<-Y9`n#nmuQ=wx=j-@kC!2bkRc!FBM1W;A43O=hufV0e~Mhg>o0S zHcFbwvEudRE8rU8C(l+C*#vlqip*yzriPfV$?@FSSX|>PsKjAze;&h>(1`4TJrsS` zCVc66`fgVM6Vd0ORP~!ptkv$fjGO#LgD)zcxpy4_6A2A>3)B=t3c7Y-`ETj2QculL z?5@6iAIS9#kC>Q9uP)ECdP~q3AmLXrS(0XC-1`|u^x|c0Wc@4VbIH48YAxyig!+=#|!LZ~)M z&N+rZC21xHI>G==(0cE89HUPQT?!jAB8$LzU3T#us-$i~R6M zNUHoA9V$fq3-fbkFBXubqA%`O`6nX?kyne1-uojMNoY4Te?ad(NZ8;1Cn~16?i3-W zqQ#w?NPE<&jL&ABDA@D~EoFllTi8lQmS*64ilkNvoBjf2*yI6h1VK&4+;FhF5FJaA zFTP&d_Sx1$w;Z$yOWwe0(>ECk_7v^l(D0b0$4{%*$TvRoQMDhdWZs5-U9z;w+ zBO@)PazsN1FgGP60H^3laaIbpfYQp0gwug!EaNqgvE;V8CtAr@j)RMYM($_^mvY#^ z{~o8B&^mSPVlWaV)$NVh#+mN;a5Ugk2kmfMm8bV-AH!R{kR*DokOBZTGyYjZHgMPE zXsVCv8#NV2;q)5UhsB@He1bkmXykBdomewdc#)QWBr6U^osEwVGd+H9%+Ws< z3?(Z|-1Gq$Nob_`*%K+vhd%(LirKWACJ4W)=Eb@%H+0Gw+3xBk)NDc-OFUd$+cYl$ z;dF2RcyHVswRQV=-VRjA6RXHx`4i0z3n_U2Xseu-56YjweLfqH^>s7Btf|K^i4s-1 zDA`c`#MVYhGjTkhhdcVnqa6aNegf7$X1W=FTvX~k6T#F-Y`ou;(!?jm-QsM5 zBPp)|N681E9I<iYX8`?ZNB<%(uSSB=UiKQVhTu)RlT z0@F9jqC~UI&@9X1(d~Fw6JOIaZI#9gfS#nEGUi;oaQvdB&3oi511P;S25?p_q58^o z(3V|a+SdQodNR-GJ@M`od!N-d3vS9!S#yPiz2jGLf^84xd8k-8?qc@ewG+|zC-*Fg z-v38WyD=J~dd5civYl9|s`Lgr1=1}97jIqKxNevRD9`(^?w7VMVPUuGmQI7Nl=KC) z*KccfQo_@^rv}c01;PSX=^dB3fL3Asr4Bc_jO{x*eKO9=2ZM}Ch=>k>^al{l4 zb&9s**(E)v+z(KOfwH zzjN{nD**>s1UpYH0&maO*2$}3O{Lms6x+&y4hcsufw~TngcHAb7MMdf0i5R-mn;n) zSC10+K2hkopx+M;dM(hN3`$i-NEAderJ= zLX}ptn+s*jX5pTTmJZGhl?v*udj{v&o&7BrOY3^~sUbyjxtN{r#rPh}@SRw6(3RZ^ zPQjev^`JegmT=F@;e*0D&x1SrnnREw*{ueCrh}uXx0LEMscbX=0K}lifRNsSD%`Pe zY2(}w4H1zCF&X!L0$IiPElEKGFSK1US%u zYvz1#9ik1ufrP6+8s92><@_b-8l7U`q@9uzA*c>*-y>BfA$||i?e~*D`yYR&aM6Z$dkgQ&tJZC z;o~!R%)D_XF=LxyXLil3Uh|7J-(K^`nh&ixwx+q}+BNz$^J_Lw|7H5e(@WD2P5<-s z&C|tE*|dN9is}8+vs1sDdT#3Rsr#pdsfDTZlygckwRdV_@>i2jPkwRoBa`o(>`Y!i zi6`C3?USPuKL<$b=O;ciacrV7am|Eo;*yC?<9`|dv1NQ|{GsuG9)HVtX*@7~<@kZ| z*|Fb^Jva9F*!^R|*uq$P%sHkQ+dDR~`d6!;S^aOTKfd~o)o)xKUu|2>uHLnJ3@N9- zJNm`ZkBr_n+7T|Np4!ouf64MbnQ+hD<6{fBM=)ebh>g3(v>ZT34ZUsaC^e#OWQwUU zl{eJNA&tuJFr`9rvAmkHXc=w3!y3JDrN_kt?i`diIh)Q;HT7L@3vS^ZKYejqD(72y zs-rZxdzHA^Q_SrBfmqJgtty&XP!}{>yCGNcD0lsS%joMzv`seMYsIS(Ls+3N(j9)= zZBl(;sxs+7C+0|otR^bE|5>TJz0u7$DrvgmZy5{h71vAE6}l{h)I)1qc$nLR(3 zs z2YgL{mGT8cxlSdhx!occy6N>ZmSi%mO*iVQ1m&EO%In2A6I2*Y9uFJq6$@AXKx9KN zo4Kh<>6wyxRaG{ohtaP+dPrE*WA!%$IQ!r06C7*|0amC9{O zKb7w3swurmt;s4@Jtgtinp28MFHmo08dQsO{mj2 z)0IM}(4=+hVj#cw8L7M+0v;m*tFjS$KA|YgZ`wM#099*J(F(`-tG-IrndoG-$?X?P zKTx>yl(pvo6lognI7!>{QaKlvQ>An_#XGvD1QXq}K`fWoO~|7WDU>tTaK%yLuKqWv zJQ*s`K3$da)RmSZl`(G;$1C^y7a9nzi<-;nL>b7i+ok&6TAFV5x}l&snhLj6eo4x5 z#EP;BzqaD?m1(6~b;-C?U#>{fu~H_Z)kl1Err;3<<&9n}p`k90(sev6D;LMx=q3y{Cecdz)w#IErR29s{pnOGU|o1EQL3D=rR)WM)z*c< zTJL226*?O>mztS8-b13>-Xiv=(ink(q@Ue^LJ--_JcCq+Ijf1<}CZ)9AVX_Z1~ z`rT5w+is?P@m8j*Y?%Cs=-S!AI%>4smV(ldEf?}NL`F?W)7vrxqg33gRJZvU7igyr zKOpv|+4dPdrVJCLyOng8^>JXnfZjK&WhJd+GO=hT+zwcx8@?j8+AJv?Oadr03R@#) zRr2PV#3!k-XloW-UY%8$)E zfN`EdtY2>jcv>khdlk{BN$p4-YDncpt%f!!1I23E>!#yb`+liBFV8WFh|A?LD;E6e za@O=+i4d~nDP>q$?W8sJl09?iUa8!n*0SYL)MPN(!^LE5!yBb?y`QC%Rzt)YQYmyv zB_rv1ErDnswuy`wR*%|cN3uP!el2X(Fg``Ro>t_uns{vFo-GSx%W2d+>PV~|Guo@M zDwWNcek9d5wWD-TZcJKhh}<))EyS6gz%<)AM~Bx%l;>R_PE3u>n_{JG4bW-c zTsCoFRIFa@DO3!uW%!KNX?8VIbDx*WJAv*3J^(Ag#0~-_l^Xq)L}*zvEUdn_V+_}O zHs;`CQhB_cqYBZMt=Nppc@w|aB9*(#I?8J?SuC9Zmo6~6wPHEYUdl894`vIDrC8$5 zlQgB04l$IMF=~{}1(P?=CDxBfKZt7pjce1hE`8g^hpDSWQh7M5WEH`9*Q^f01t?~f z)=MSmsL&~+rq=D0%eiFyDrv+Of3-r%OGbl1;qp?A!bVBuD!#grwL9#+Xaq@5Y}C%D z7NiE8jsm5$Rx9otV^%2h>kmrhcDt9-nC+HYMsDe9^7JdBq$@V1m3CHmtA_8GQf2Eu zOVzC|3uDvNR92TOs@5>O&lAhbDTk3t#DM@?40fHi!NG+9{(iK)!td@)(u4O93x9^k6b%hqgB|YXu0MR4%{Q2Sz z)+jT!2!Rzw5U{)M!T{BqCZ??zB+uy0yjUlzYwM zfJ>2%LKoNT3XY^F72pqiRI2XCndm@Gr?B;+tfHa3>NjF}v7KzO7Kb4pvb336IB&U5 zWK*oS@f4E`b@YZ}+?aUXT1o!Jd_zN1rJ|~mGE=HhYRA(OpFHrogSvXW>J0`B9co-M z#6?@##$;RuS6G>$+%=W`+fsdX%Yo~@Qr51oM$CC?@9(5?g)K|5JU&1YIjsSotrt$;~kFUHne#rlP^-Ab2oVJmAgR`M0qgtRgWIk$^RB`R@wpvvf~$$6(# zKf}h@sGpX*^7cSIPnq_J{BgYyHRjcPULCBvESWVvsXCjjv7FbL^Dby>6;m!QdqE`R zo7pm3iK*PFO47jUqnb~PeDXPuOXcci4|(}-~9YL1WCt@(?0O69>| zjM9bO5mi(70;VG}X0+%9>s0k;=1qH?4EX8CTiRFdG;~QvFO2pfJ3< zX0LbP1gKMKACT$?k~tbKNh*J@S>p52xy>u(Q8+_rOA5+f33cu4>j%5tHTcl6n`n4X z0$@s>&lD}m%c{~3^m-euW?Hto-KVm7Vwe6^D(7k{O5KiU5;_`yPVD(Q5m0&!iQfUt z?__!WZL&41KRxoFeu16W&2kV@{fpx>hVnaW<6b-FcmYd}+ z(+Jfao}@pd=i-9va{OetSUCQKA6UMZFCm#*m2##%Oro5&P#&*2#b*S?mH5eUvGg!> z<yF2Qef73K^uT&H-OU z=Lg6G((EI(zHqH!Y1=*(b^3-je6E`P#TQS&>5DZit>22wVJxzY!$(U4-zbu-x`4ou zfN+gr2|i!vBqEuhbtNF^kZFmeUPFF&{0_)eIRIsV7lC0gWQBcxNGEAp+OXx^Rp2ar z@rw7@E(_s=jA$gWxuXc^5Ffz^A(`VN5~q-ba5`rd!Tp^J4u1MeZ_3Mr4K_#`*|*_4 z1`Hc`b|JMl9MUjjjBu-RY5VKsXQYAy8p%0ok|6e#e%%IlGGVP_iFl=fn+}i~G;)g< z{S*NKK!{FJIP8F|&P_#J_2P=G;NLcOmuqQq-Pjm;Bm`(@VDkRa!{gs47x3h+8}A|{ z=2CnY;rUjmKy}+Lue@#3ck!YRX>LAG&MTD4GbUI&R1Y_AM-LE`-W~l7Z&*S^2$;%G zG0pia<`V5n>Ai{or!jD8af+_XHBG{oHa~cw@O;`iCtUT755WVXytG>A2bOk|=cRerKG6UtivFmH zvNWh}nhNp>b}$pd4?^Ub?JSb8NVz1}(96RR8F_3aF{|P|cDkKYB`Hrr>+~1x$ySea z^WfZ2sUSPrky1jWgXFpxTLHlc6?L(>a0epzJvJEIqk5#>WqZ?Y~PB>yOFf2zMHhKwcYE7tI#3 zYapB{jVU>sf-sTC_xAzM3ruNrRC%hSoGWAxGr(20>T)4Br%(#^IQEO7VqxEpUKV4t zPsSw;BY~l!USQWS=4iK}qcwTcnNpV(x=|SE;bKAd%3AE5qxbFX|0)WF-$}w}MS-&> zOB%>Wd_tA#x+r&EG9z3P(i)<{W2#N!pLX=`N)i>tVCYkW@mMtmKa;0y4WFYNtN|^4 zVA!rHk&ExMX-EuQkscVoSR&I$-u_AStT=yNKxn$?M2T*7YT;%H$qvYg;QrjwhIOwY z4bnoa+j-kqe?y*h3A#kWRmGuo^&Jy#;{uLCgHifzB_z5hw)O`ZbZLl&=lik2+wb=N zWm%$>um}toiDt%7%WB%Vx+@{hJeQ25#lywT1@IXn2`66o^5A)FSO3KVIwU;?y*(T0rRGyUcY{1Hv0^YPkJ~+f|6#nzAOPkichIHb@ zpRVd(^)@nStV0sdCh}++lcgTpE9rAVi#eY`Zeiz5cpOmOjD{5h01ML_2 zk$3br9$kXdEnYNFM=n}nP#UZ%#<;UqN3B&J3}mw~dkap8!!$wmzP$(Udcy}d_w%<% z%T;}9P^E4 Q7zte2e@k$D*X36B-wg^VUG~w5g{+0b-E}qt+3s#NavwC^5A-iDY z53^fmUO#OlS~MdQ&O5%e`i!`rYIV??yWWMj z)U?8$$p)Hs zzGO)X{0H!p;o>`P|FEh5;0KmGvJJadjsNrPj>-1SRnvjhkIQzA{F@Ls6mYe-c8!&mg*axa-3XbK4w6E(%=qw*T63GhzJ zZqIv_DdEcF*ujR1A?yuxQ^$#M1rHKJC-NwBc_zXbl<8WmYnIm%;^)F2KLkZN zns>BDNxp^OpRKLktfAt{w@`NX1w3ob%f}5 zUXi}5sE;fm5wxdh4df|TTAR~3Sd$Y75np@>y7q~Gg=@<&O*rxVUJkGRo2UCTA6-HK zQDX6^17i}S!lLqMxyU5zOeJf{DLI}OS|7ut4Hx6x_Fcp|E{FKCb?;vq6VAVH>7qG9 z$(wCUY;nA0tw(P-EI)A2D%-NNM7rws%p)wy`nC^e`KJxLF_vFkDDzEf~ zWAYH)%~FEuljy*3v8ZVMPcD7%Z;pQ90Vu@q==-;S>AMff1plX&uGt27yZivC3CL1F zL&cYy8&I2S>!5Tyt-ErIUD=OB>9 z{Bq$_4=?TCbS|n8-M_HXp&LH4gikZf*6^7Bt|BpE98LAh~(J>05L&QasvemeH!T81D{)(`&(6D z=dxyD@8_5PR*+2R^Go-hQ;USFAHi|_9IDg5CvzV%jqiMP32CVTC}{_v6A&tafU1Y| z0T){I_XZu?4?UDKiqo@s&f3EBZx7M`f5f6MF3qhQlZ`(!y@I zv6jTcmn|B}A{4IdX%rmMVAmN3s6AHYb6>>{FhmoMKmVfiX>rxp$mWZ!goJ8}TR=wb z;>(Q39Lu&1(RkgCk43_0`f(`uFbx@2i&yn?kHg~aB=L-5SF$m`JIWRTgb|A}1uZgE znU=AthKsRtzj?p-dHIE9(hYLqMItT5jnQwb27^vYSMe3tp0*-&Y!A%CRT^gi64ogSzKvHd zKclzBRUx0z+ab3FL~vJs2ki{e5I1{+gd=qKcce4+8^B1EonNQ6Tc}df>1{Y_WfsW_ z28`bNEEo;Z2FVKg-+XrIn!%t+h^IJcZ_opGk|J9R=6szLo;pPy?|KqEhG-=8NQ$5N z!;?gM7}a&BMiq{;N)KhTb*XMFVyCFV`q;RSKFo27GebRx>j}i+RJhUq+}3{O=_NR# zHc$Uiu%Z%yZc{!ZpkQH-&r-Q8~@GN-ckEZY4Y*u_sE179@I4l3Gjp)URau4A6D@_ z3vKqYo|3jRB(~O)NDI8$-py;!_vk z+WW`Vj_^&=&HvHkat$fCfZl7v}`he~5I=W5Z4q%B&DBq@@V zd(fkceu^Fq(ZsCWgV3Y5|CBINEFLBCmSPx8Bf`cwNK)l8SppeHtstsk=a*zv4AFp1 z_w~z#Jxd<}w$QJZeoJp#^~|cZy_sib_%(M<|7O}X^}y8ZWMSfox$9;ho!vEY;rK0M zKOWPr{^077(d$PZ9oZ%82~_;&A6&h-=Vr~_#~+l*4sz@fE~Q9N3W}YlRZMc8O)A-W z6&H`r%dxuSDiw$Qm9#+wE=5FeQOt$AjmQ(Udia)HRHpwJZiPKFf4zqHl@WKc8 z?>WT(oh@BGXz36gi}Ugr&#UJ7M1seV6zqI77EjJcIYlzANXVlK7O4oNA#sNpIrTmY zDtGtG7}mt=R>pAF=*}F_m0~lvOQDd!Fe#r$ax4yGlJoOXRh*fpQdBI(#o<@PoE{E+ zn7RA*!iem=zqgeu#8waknZnFO74r5>DQ~fA`(jJ$&|zK%grlI&(%;cc1vIOm>KtTD?JVu?Gc%D8?bIkjm{52;2?`%dXH50|or({&o`B;)tLce14yb9MY z^9o3d;;>K>3GUQr#yd36^R-V!^PH~vV;Dsk67w@@y9a`hy1gWHZzLDDi#n=?>@5o?nmBrmgp3`{G5vLda)r! zeuRmu6kI}?oTuVYJ66dOtxm?~nPe)SN))U9V2`DC4$rY(n!=Vmytgx6F-*fk0@4{$KuT2Gg+Hwl- ze#2j(m)sFbp@=DA$mVG(rI=^sDb>76k%YP_QVLGa!6PDeCTmz!qRYF5^Zx0`#J-h9 zLeYOiPlw%iJ!7-G);OfUN?C4KeOC6J_UVZ1RWWz} z`sZX<8yK83R?ZowP555$uQaX?jwF;=b#MirPekK179~ex`^SMJmQ2zZUOa{-Rs_Z| zWa+E#{pFs&YfsyAGc6fS`4KjmOvU8!)I80oaHNUFq0vMQ<@Kv%ub-9ATsM8&+CiLJl=k4vV(r8CKoAYMANX0O&ymCTI05R3#G7M1W1f5P{{ zaItXWk@q?Jvj4+n1G&s3nI6Q;%uqJ#Pca&^)hjP6xsH_*5`V_;hl_=if4ITk|H+@1 z{IYdvYcv&Mx)ob5VXApmUcvh6(!tl3E*_pZD9Ath$*qW)C0~&@nHP^1$;aOyK*yLZ z=k#QRIR8hrdD83_el@*)s<0G^R?p zNhu9B-egTsoGLHucm=~4E=Dx*{Z|R^d_`jRz;BoK0c_+b$-f|ijc8MaxPj&?PH!z} zGs(*-GMNX~4HpaR!?FwRy7)6Yg!uoi1R{}+-SWGomE>reRkIh)TqVc(`set1koIO}2~#Rc99qvO8vxVIcI!UHzwJ%eYD-$qvMxIE#*i zjtOM*>5QQj?KYHz!A9ZBlgk^{4by~^m%I~~1V4LhM}Pkm*pM-i)C(e~nmOmS(@u5B z6$rwwn-;E@K|sGAUxtsx*(BkGM=bb=ow|Ir08EQ*eeVRug-oeO+ovuZ>h`9^=GVi~ zt*$PVtip-OtRlkKsyqgeLC@-`ml@aSS3StB1g0iK_?ia1Jk3VnbDVR~LzN zlfpGK%Xq&TDn>x$J01P!XO;nHiOBI9di17&+R`~=C_r}s5gjd*s6trK&qB~crGh(I zyMW|I*wO#&?6O-nJNb#xivT0?3~;&wGH-w1%l~(!Y}YXvdL`b7sFHd;#X1uqttIVK zc-16Aa(T0G%lhT@b3-(w)cDchN@P#}rS)WZkp2y)q#sZQ)H>RzS6V9WqSkH$`jrff z9@+s$Lp0&UNyJy*f76d}k+_p+6vj#N7>E(_8LAo8)7n^?b5lW$4e4PA3L)PN-5jO~ zi|2pm>i$1%#z@z(N-F51E4{oD5RWR>B2NFrR{ZQWq!+e5cttQnz5`a>+!tpOz58m~EU)|pS!p3D>Uf?FBcZyFl8E6=(X3k(xDvUlIGUE&;=g1y(Xox0e z!+AdPy`|FfkpKkoq+2I?5eB_OUppVra{ zGpv_tbz_-gPDR$tCgH)0FafV2{raw5haSFo8L(T<#bYGfgSbC3bf;UPtHxk9lrUt1 zc;p?7SGgZ+c!)N5uCF%Q9dRfUfmDkPNxHb^Ao?>z13b_mC-C-u?%*;m z)l~jm!9^MMF~5^f)J!};%7|Ti?n3-@h$ifNiYzQ-GQG?C{q242q2)nP@3F~K!>Lv@ z%37h|EoK{TN)wd25kDWihDZW%zpv;&c0SCGDYV^^8ogs5 zem_JKWaby(Y_N|k4M>zEzYy=t%Ne`MM5#5NT3BgUh1}{XCl{9N)DLnL0lF-&^||t)jjkBfFa;R8L zjWI~#QZz!?y2*X90AK-E&4H3EXFF6vrGRgTIkLkYjpIYv2-e7wI5%C?Lz&K!dM!U_lSlgy@(1SMrGhmQ4`BP_eN1D6W+UZZ{e;m@G_>+E=|t78zOXS$*m1^GErSRjb#GzA_>o z{lVzJkKQ+W=jaWi3B)UZcJ707Z=b8pMdmbf7s={#8)pA3yLaSYX8(I^ZuaZ553WQl zkNk2aZh7tVBc`=qTYF-3&)WBnJi7L#wfVK)wU@0uf9;x?S7v@N^Y1hF&D=S2!_30j z5zSv%^Win`7(_H1)*N25W%||WpN!nP`iHWk)8ClxPv1TL){!IAmFdv*)zcSFubcYA z)bmqcn>sP|o~bua6{dVsmrq?VH6#1kcxK{D6Ca(peWE)Ny?nwl!A$I&7#;ul__xO&8UL{Cb0gazj`sLF##`gp zjeK|9Fn)M^%h;=9KN(vddwA>vV{aKN&Am7l7`t-ppn$b?o*2W-muW+cGB@pRb&B&h zn*~dD)gTCg_m>hOXTz?CHs{+8kvw%UOMnyv3|gqLfnbZ z9(TDEy-GUpFJkplx~ya!YFh%3csx~z`Ni-RKCdy=E8zv5($+IM*g)L-zapEgE}qkv zTmEjr8Bhe3-g%LYCzeSw@|@jZ^=0MhcGPpf#J;4bSw+mJ0d*r)AKrfk9WC9!^4Yl)If>UWf@7PHFs)au--tqACs z{uAExPvf%-yf+oovhhmBsp;4~m1OJ!G4_b}MzU2(l~*?Ns$k0(QYwBRw&o3KS`?*s znJb=R*;mi+NlNAJXa_m+6Pl!{UX3;j)4Ro9cxhzcw^Unke^bq6l6%AuHQv*-;D)`o z&{h?cR#h#ZHU6u}$5SyR*rFv$%R5;w9^`m2euVd=@OtDh#o7i|(epO4d;UinWgy2_ z^cB6;)Tzg;DfwQBjX&d{BMK%PvGgbt#f?g{=K(?~#pTP9rVqgf!HL3-KS3VXl4TK= zmPOugcG5;pt1#oMs_kKduZk>_EnkbWxUwc|DPd!qZ1DGDd5+Cz=yI0ITNAE8h|2|^ z5X*zbnwrf-Vm06-=8QHb=oWiiQ&^c)-B5JLs`aWvIVHv+@im3IM@PF09YwxYw5a&F z?6}CM+H@iG*i^uyYu+4fCpLzq^0dXv6jLU9Q(HF2tZD6?Qh7K~r%Y}|k}ALrEs$FG zl2q<>&~(Gz%M`MdfpJ7P{Z=Zs0YF2^t1}vHy&79cQ~R%y2vpU|AabN+R=F4xN6Trk zywXL4t;yL*A)O`Ft?{xiOXbKnO2_bG?JyZlPGxe#|4QWnRfKW{JMyTD)nr@I^TdEt zzG8PdXk{X5_m-Hjxuu}|sE^QIzM{pl)wKAYmP)q+G$j)wU3tu!ijgCp)}5&4gNfMM zt)fKB?s7a)^x5pHTC5Uer`{>HTXqzSbV%8?#7gd4hs2Qo!LR=R@a*nX6l$2jA)wfpNzNSKnU_OUkTew;b_~lD_YmjbteCjSw#XTM6 zycnpT%0e$R|5E8YL!!N)*Iu7uS#s}tun)uE%H`f4Y+!KQ(P+7@?ARYq^!Y?h31mU zk&INX=8BBmZ_6YKNS+^{CjKloTc`ysY*B4YT2eu+F~^3)>I;RO0dF}CKkcft6i#p6 zY!nFvJH(SxMq!^Z8 z48%jZT-ng#t-jeT#Ui4b36@0cEOtGDuh3zq2gR5Cs zcZpa(TZ>z0KIHUqWo_IO&c1#@l0(*`QL?lq*NEy}X|t`MJ|z9X*$L8V0OZ9vxYV2S zm)$7#KWpLI21}2(`Lt25tzZ^odihLO$56^hh?V!E>VPSENmOK$>6p@VqEqeYGD$mC z$ul34$`{)DD$}r+GvQ#@FOQ_O(-NVjbkfyUNntM6%XnfnIyaBLUZ&+U^>BsPM>soc zZ?+SOZDMaSVP`4kPMKq|Orh+gX2d8(KI2yunM%kjbu8dHS6m+%d9BRlrNm%YpHa^ zIJ9N%dqO5R&_qEezhsY;M5>ED*mXot-tjLS9^A@Q*Tw~a*DnR>a ze=*L*XWlQBTM9AC?Tqwl*#$3xHd$FuY&U60JKGwwv#B$9yr$%)IkA4i;is|C6{V^o zU&%K!SHE5=XVY%lnNG5%qF2kdxE)HdJf3nI>9WCI)^{RoCChF6xKxf41?A~xOjbdNSFM$-S{>&C`HLj^$J%8zYmr9*%bHNsz1a(IlK9l33lyz&8 zvSSS=E_g~J6oVA&pwbR~P^&Xh{MxKk9z!BijS)C(0V5O5D)^FA9>yu6($+DNmZt0K zCbv8-mAk4e6EJc`Ycgr#?94@fl*(;sp0anMoM$1g*I2>{N=)v;#}us+Q*VTGmV7tw z2u!W?hb_A3ZcLp*W{YCBom~4Fkx#Uvc2S5cIF7K!F3VSc*itCz& z^rda7JY1xiQkiY%7?n53rC;~k1&LtwakQUhDLPdY6(|zOl&M-Kl(MDdJrlq7NvYTk$g~h;Ff-bHxZ%$uULV6xLMB)Glc&3bpbLMMD#t+hHlKUvBzo11(i^I=&LUoVYlU3*e zuqB--Lpmc(IULP+5t+c;wd`Io?+PExr9D(C-j3TGdPZ)d)vp^wkn;hhR$tPpjXJL~ z7pyUosq*84izzr*Uj$HB@jN#oW`*GWv0#JcD+{hXz8#!hXL{AL*nhv8t21d!sg?F5 z8(|Z@S28lbtiDIb{PAiil8ifYS%prl@3VN-wA!TeYg>VUs-8Ub=aq6zlQuPDHEo%% z;pBC`m^q5~A(FOQm*=TG&85;Yr4m_|5O&Y|SfiYw95u6=(a963LQiDlZ6+&BMUzxl zVr;$;rzfS8b+wAPPAsdx63Y1|m@i7g)63O*9ZrrsHoQ$9AAEvU4t)s+=;IrJkpR16rQ_W%$l zhubeiupiqDafrY7y0bA=-CJg?33Z&IGJ?CXd|>wMQsHXz7JL7*|M18`8G=EVR|~He zmv? z!o~s70an|DW3}a(E$6O+u$|`*^yT}v6=fGvB$~YZ5Wj**=*Xp6d(qr;`0_OR2o<#V z97ab`xc=+Q+s-ix}+)mB@1uU7+Cf0YFh# zC<@oKFyM0#g&%(R9T$qd6E5m3uLFi7M25&TJCa=j^s-?0sY&;MI2gw`bDib2fL%OS z6(Rb+hgKrD5pA)48v+`-kW|~DBXF1IcDM(wLH$69w+Yww!0FsogcF95K>th6ZM{Nv zpd}BytRMht($I;EhtD2r`J5bswNAq z9{J(u9cw;18XW!Q++o?Bvk$L1I{xhB2iE>*O>sOiE6luSjcW}JOpnRw-%Wgd{88Db zX5TRP*6C+tzZ^Na+BE&S*>A6X+uDzem}mD+@YC-fRjvNV$?vaSzdAMfhuJHp|6wjS zef{`7({F{jXMyqk;&h#-ZCO<39jAhs~5x)doE5peT9tEXUXHZ zlihIr?$IkooJP#@AR_?+JaTy^?6VXB-N|kEj{#Me?;s^W(cV+H!$CiO@5quGyWcJT zR?j(%o?=9&r^3E8g?6)m#A(mAM5>*`UtQ+{lp66P8Q{{;;htZ<=6>nNJw%ky4qcu@ zNKPk0))sOwtofBlbtC3PEf4$h9F`Iq_aNPYySw8NiQ2LEELi}nQsJP!8wt9BfD`V` zzIjw68}fEvT#m#KjJ>E|U=dyeB+*QEyMA=n=oK=Ix$8ih6o9+RBR&sCGyoT+j1upz zJs9ppeBq7*NU{XF#;Hs9CReB(FO)&N+1&m^XU|nIN(||55xgU}uB=p1tVEJB{IX*k>q&X}5f5 ze5G5M9}E?xIYZIW(<6I?Be(I_BGrJL5*c9ZM6&jv88Jj=#(`QJ{sQX4h?C^f$Q8iO z--#5>Yy^<8K)99f{E+x#M+W2IoJKpQA72nUI~(qq+3EcQsxD7CAbq5*$k>63OQL`f z1I13iPLj1Jg9s)h)j$(IL^0{&FpGM6{jDNvPsXtT(~FoeU=ul@DrqQDAT#!a#G7;a z;%$UJ6&*BmK<97Ub!uwu&!rzDm$WDEfbuzdmI5+@$iq?A{mTI+k^pdsV%X^IPuprr^+WDv}h+xdb>COuBG2vOtEV@x>mc?9j$&W}q} zxl^brdBFr4tMh-TcwzI2ll&C;+LfQ)*lryKvz~C*w zr25=$_)lS0pMrtw!`) zoa~Z$2RJx%f!ypLBr25M-m_yOFd1E^&kh}ScV^$WAd#^bCP;r+gwb)>x@Z7ZbvFEd zh3bGH9Xh~TLy^oe$vFZGa+^d&Fq{T8$WkyAB1HpP zn4N8Zl&A|}i_e817M;&h2>X!w1pg*~B$4wD9U7(em`P|D<~QQYGuz*Gnra4KFBUY` zq&=sGF4~!`e_f&4a{#F_MzFeJ1#*5aoGTQ^S&?e**umMZTgU(k+6?1@u*6(kK1UD8 zx_l1@00gH^w|ox4Q(aTn8qW$q|o`vN+$C1W?5@k^0vhH{zZu!xL32=&9z z!alQn_O~Kc&%$)I9i(eIL*B7~U_-zx=Qed$8g}?_w!tnqIF#hf09`gSn|`*!8W_hI z2W$&;7;wxCYG>x&B2oib@_y{1SfR852OK>NNg%uVRgsD$l~}C=#ER^Qm};0ew|rqv zvd4iU>NG%wqN53)n?SfHH+jE$~Tmmx>oyYtVi?rJzvc@7K z-O2%cx(Eh5|_ex{Quw zHy1^!9m`nFE;xOfEUMrPs3D7v*;tpzILzspFzqQ|N1(B+uwv8nX3269-LN3&F@pU; z-ywS{vAuhk!Ed2GF!BJnMi3~bBoYjB#8T|pEOiTZ1CyY0LyIg6n3Ztbsf+hE?iI-- zk`=+HIWiHMB4h%As^y!-E!RlQHGp5*3r+mOGK22%Ae6dl=TvLLe`jlE|1F%wQ3w0VX{h4CJsPs1ZqhAb!XKXVD&Z z7dcWI(dalm=@oyAQ-n^9QM<9M+&G?NAA{Ie-7ZmcfT4rBK?Mq++B#bk!Gui4KED9yyo-#feFYip)$f z(Y-w5Sip~9I&rAhWG8otWLPWA9nP;fBcKz#F!oe^cYK{hr5sQnf-Zc;(C+#TMPlmH+(V`0R_*ZM+lg<6jr~oLbYQY!>PE9{Xu3Sqd3!5E`s43k+N)w|+#TVvc}dkHbm0NO;&e2hv$>en#vV zMhq*A?amKdnZ`25sh}9{towlYV>g99W8u5W@ulGC;gr-1WY)cX?dyeoYU;d8u|sDf zMr@ZbYWNl{Mshfb0@85fUE=S}h)Bowfv;8^C}0e5TJq)PYd*L(KluGFCr&-~91cl1 z3*z(xI|rkJ6lfbZul@2$3pjkx0m2#9%#Cfu-E#y3*-a0LEf{j-n;7DNorAqMlEbQ* z+4zT9nbZO?MnMZ66auiMh)6G*p~n99djH(IL5&3`_RoRv$eBQAhN*&$#o2lK&(avM zq#;%xq|+nEVm(eCIN|+Jq>`_;2v!#{7M>h7Nt_|w@@Z+?z~+ePe4K^JhLFMM08Yz( zcEi@eZ*@34(fS1rUBdor!5JZq)Bv8$^rvSLwl0rt zDb8)(CQ{LDTvU?Pgk7XyZ3X-EI(#|R_1g%Owo@k%f6ZzMRj5o40(p1oU?53UL}3YXuE9u3g|LI?NQ zLG1VYZu`4_#aR$SA z;jQS!5KWL7t5Om=?b{?qJ5DiTni)q2+0}KvP(0V}@C;!DtiW5B*RLC<2?JN{2k!VU zvS_{_aX5IVPm@k zLmna_;na7p=-+pTqy;2b@{V^S9`W}H#3>F{K2PRC$OoA)A=M|EZ@6Ybg6aC`mi0m1n=fO$Luu2y%Rf2w2N znANUD>R27zlc;njPm3M9`@QJc5Dnn10d(wQ+q-+e#vL`{@4e)z890+h?U>iP^TC_aFn4HXObe9Vl?+z+6k z4Y5_@&y6Z3ADp>vY!(MF+s zFBZ#dNVji%o4Wthz2q(*_Jic;6YYm7X7OZco!00}RjkTf5$^wF!f(9~9?nBFK{kaz zZxM#{J~HF5Xs7c9s*9GO4>%QhwLRBsR27o;ZT$!|XNV?H6LDy9dTB?$^AVzgSh*xu zqd4QGYPRWQvZk^gNus;7R$_GBC&6flCfu&weL&2n_r*_QXam96b~d+Nw%8t zYVv7qB9({NH5uFIJ_Z2|(}de^`tgkvthJ*PP^ zz-t=+Jefl10&_}czIX*8-#&L)?p4Q&ZX-oxw)s5dfI>Lt84pB5^pW9az}jugWf@=x`t+G>pLq~$ zp)w@vVtK&U?KC4*X|nAoyL5G{8hJzp>c9UXsQ)kxQ7?~OE!^_ZvWV0)=;+5E21gi+ zK|)9|1cnN9I6SfRd|kC89`i9G$3H#{j`R>saEDI}64GrEBK_r82QW$lwu_%xUWvQf zziM_THps|iQ?`Hno{>MS{tsg3*22!A*()J!aS4Wuoj_6J;jM|L1t@it_1k5NxhK#U@_uy3&j(-Qm;LDjPBrHk*aRk6|N!4e9oqZn!`U zbh`C1X_GviJkZ*(=qrp0u3&af*$zi(kyGR(I1ST;+xH)ZpM3MPJNutI3FET!bb?5$ zqRVyIe2(!qj1C@aZouX|3c>8oR!P1UHsVyB z0t}Kx)k+nFJHEPn!Q4=(aQyo>nfkL|TaL)qrvL~-(>7-#=m~qO9Tz8bpTG;@a513W zLdO2@p1}6B$G3RwGH96?7Df3>x;h;x)MKf7o$n}<GWR^Ax$DV}F57UGbmroxOZhY4_w)TJZq_nYVPjO1sRDq6zzasnY>+Tlz0POCqegEtjT7#d8$z4>#HouW(}pd%%(B zpmwhz4br23^Uq%g3hHy%1xUK)V-Te=IXBi1* zup;&7hV=20@CH+~E?Mu{t4!QrrwFJ0bNRE2g%jt^;6QckrwGmYo^I4RZvU@Bn941BClWY zcKP66f6+%Cz4`S!NZ+$KkpA#r*i|u8?TcD-)2Z+{fC5T!+K>FpN^Uzrq|)m!4+JtI z+OxN1|6lY5?Fvj)N_N4`rY(Av&br^hPkH%k&?69$!}A*vSjuITe~s?AFia#IHQRkzM;1*2+Ls9w;;0U}_$;yM!FQ;Bzf1 z>_`8EyI+57g(%kbQtx?)*}Hz#C7ma+r^Wsb8d7?+c^0+TC$!;+B&45^PDdt^5f$RI z0rO}tMQqOS2${DbH0{xkQ9qg=elMlv<13iX1i?1oiB05!zIq8PF=YO4*now_gdu-J z4}JZm^{oB_XrXhEQrYoJbd`y8L#hCE7j?0+AZ>~;}3@|CTa4hXBy=VISgc9cY|AelmpW4XY_8x60EHocFi#O_Z;R&&yk!T}fcOV%JW>w_hKSXB< zipe{_$$>Ade(id8=^3tZ;X@>?QwFdXs&l) z%#xd^$Rr+}?dA+6*$a760cX!VX^a*5mZu`Rs`f)rZWp0SvyKb((UndY^LwIT{d!OXR10o__Gj~a^Hxy4y z+cJ8m1(47(`N!J1_2hvya|1%b(d+jx?2UV8ZxE3i*Up7Ez_kx&JpB(|rE$EQBPB+- z;Tb2Qp}DQ=mX{*6!DSbbo$;@_hP)NBLZf?y6yyD_% z+bxd-9dN@?-=`a%B1dMaX+z6?f@BsWBkU`0-uYP(8QCzmZUcN<%i>wc(`R8>(m`>?=g}-ZNKS*nM+Prt7he?ew|w zzN-~@$)4E@CcZr#+~y~kNBks1e(LtQ$4#$;x31m9zPe@3F50Y~*_+11)^RGv9ARw` z>D*n@c0+C~Ob%J*aIT*-H?+D<0D~>sGJ_wx{bwH&@lT&Qn{3%WcQQS5GK*)9WKudE zVoXLk-1s#HNMSnjhDiJjtZspf=NJSl2k!M}%)w45#cL+Fq>!ssWM$X5A(26zW&BpX z6~7h8$kDflTkP4lZk+=?CZ&wzHzjexSk*HMr4{~(@rZSdPN|VTK`A97!C7$mtDD%J zXJcQZCom;SzmbH`o9hz_=%Oco zxo1ls``~$V&z-Q&2iKu7jM+>5-*I@O!V-tkO;$aQ-#^UE^$soj0ej%r=U^r6|K;3C zTa3Ub#wkoR3{MvPR}=^V=S~g|UieS-ZaG=~IM(HNq*#~Be?pF4?`W;7Z4w^zXgCIX zgijbAa5r4D8Z7!aK+_I5vM|%`o?A<9m(Q(PyWAI~^vLdGE9=Hz&UKSZlvr7CTgu=_ zg|{gO$1K2;SnuJ+=rm5vxxur*?<4{4`M5Ma%YV;`Zhira&8nVTvt9xZABQl>0el9~ zXfTimx}rg<>bb2$%L>ufzGF~PplrL&C_kWE>_7@t044xHJ;08_a?}rCE&DVX`#d&a z>{QE0iKyeyu{}w4A-5+bsP{8(55j}!(*km1fHxI;61SF4+A-I^4%nq-KB4J{wvjs? z={tiQy>RZ+sIbq!Xzpv^5qIS5pxLGnAo$AxZ^}`a4zu((KK&DB$J}#k0xLjJy}jpZ zP*mRoo~M7%^c}?}u9esiD9aOXgBIMmgbepIbvj^~D2I`Yg=@oZ$J{`_P)15WJAE_@&@H-L?pF}mD z6=(GdM@WfeE~8k{!eYw9qG4|trMn7D=?VO8{tD$ZB_nahU&xzmMcri7%l&?ctTxWA z>1`L0BZsqF$z#vPhS|Jvjw5E-o5u#%GI-+!oqpWus7GC6(`Gj^`Ot1)EwB#KZ6Y%B z?vK!dUBBGGuC+o99hvdPkqIlr;)*m}EJhX9d@+}hb9zpbOJ$6#jUu`IJHpgw;GugD z{v55D+LY+u66(ee_h_l1bEutiO;zX1O8ngJKS-|ApnC-(61^E@((}8Xgez48J*~I# z&ScPlZtXS@tr9~(&q@HQwEapLQD;P{DipP4NU?WDGebtJ$=l7(@nQ~ zRA`C1DKuutsij4$Ycf3Ut2&%xyq@2N=0Ff3kP&yi?`+OncR`q*dkWWBJuXc({Nv@A zt!PGe18!0tj^MXK8IIw*w-MKuA794~Ts&tK4KMLn)oPijLN=|a)WtzrDmvYo+q=AI zia^F^v*PZ2|KX(*6>V7}k5X3s8HY4fozUc?T8Ug7hwLl%^(^VN!nXwJhZF@Ch`6CyZUE@Th*Q5mYEvUr@Eos|N^ zxDxerb;?()=J~qp*@Z>ZE+R)7c#ECid~+wc@BY`AsJ5;u-nt`xh4L%S1g+L^e4lvWj?6?@M!=;UKv_kA@3mxSG5?a`1-NH?x1t&+XuD zR+lfXP_2F1Cz0tUCyV*4)#=mob!M|@_a{U%&pZY0cKQ^sAxCEwmeUefQ6-npswE2V zl)^cImn5+Bb2H~*A^^+Q1W^6K&Xbq+^iJuB&;F|aF9Cj>8wkE|Di<5$hBz+aH zCXfnh4fR;Dwat7cH8opohdgIKc_;b@wkLZyJgDMXvwUJ z=IERn=@S%_qn0h$tnT^FW@4Od&8ExV#FKQsHaFaQRJwFU*9)C1d$)Jr*K>{N(p8ZT zc0hcy3GPq)y}rf0#^Rll7ciSFqf#W^w(&-_@)~T9?Go_pBS{38;PuvP=5U}oX7*8z zB>ouGr)6$DepwrncGZ+rs!MYAG`VR8JuQ#{DD>-=Rq;PF^z3lW?4x8+yn$7BOiZaH z(~3zXgHjmAG%#{tn3Fwwp-3PjM=TF>9>QVv^}To*>PP&tH6igA6cQKmR9CBfTP~i( z4)qDq%*T7r;t2~Mo#i$=)PfQ%@wFI>SArHsAG0e0nL;X+K$1IJi{D)fRYDnI-uTfD zR&yP{`R-dH&Qi#tsstk$llyE_wulZ)VVshlFGGn?2A2B|FG6xN+8-F6e$<42R#d62 zg;A!F)wuntx=V`2s9k>mx`i_0-gX{xxjns}ed_>iF3tuT(kHJR1h!uQ##l{uQkSerg{LLFM~RY@5nPye^+)+~!ti z#K@d^Gj`_H1h&3F#N(%OgpQwQW*-gv30ued%>~j~fJ8o_D z^qR$Wq()~dnCMoqj`V#K2lppLqVV(J4j%mb2Db3c z)*`0}NnVjmV~W_NVre-uu8S$9<4JPpVNA3e4?&YqhDF{yi`@6>(GBc7hj?Rm-!NLn zYceXv>ves;VQnZzRoY3wo$1WK?jE$PT|@>p?xTk47pS2MPww0IpjMl$Gy68fr@_zu zX#)PyOW9%C+5(nmA7)^@e~Ud&H{41fI19qgm`&RInLz(noo z{$AIMo!!0LMY}tsbeE#sh#38|7In)4K6zPUE#~4=r8KhPM2Y);oUwvpa&*&`{29wW zd4FpSE}<)93M+D>M?-!|zNi=zYhqLf#YG`K#&PdQI>C3~Nu1xozH^waM{Lg{s1v_E zn<7?uT~?fMgjLy^R%KFg`baN}Yk9j2KE%T#NXfX7&9kj#y%lQs4bKY#@*lyS@n?3EA9MUEYV{VRGmu9BYcrygr}T-4un&B~us3;l1W zULBs<2b|#^5%H^--^iKAVp835rQ{X#G}l$9dl$X0Ljj`k53n`xx{YpIawg8l9+xl1ign zpOtvMS@Onz!l%|=N)EqBja_gyvya`ruth}DPtJXIU`lI`CuI@2IvxsCg2tkZuk}Mu zqSitgIg-By5X+zNZnAw8I?9{*MT5_kl-ksc+?i#>k(z{D{ZrWN!eVmh`U9p1f7bf> zXBU6&b4=*-k^&IHdAH9x?MRc%&+&6%G0~XUS=iTqjupQ-I#-o~SL<7>h-;;N?_3Gq<&0Sd3fAH%#mU z&&(Zy|8e=jZOkt-xa@(yd=DudJqvTYHXxP(DILvtT8|)X0RcaaIKq1D67u8%9*UQh zvNzr$N3cGg*w<{Z>k)25Ewxo`XwHQmzUDSTgM)Tzx*pa3?sw{ zQHgQHUnUS`hp-d```LYgaXQjNhlz|RjIorsd3RJq8NU)Lp^O~x{`W=fEw9mIodQ|;i=rvw(K#iFtVd%SpDF>=%{A#XrBp3#OT{Yq zjx=4Hw;s&hHq2_?fCqA*sGc;ZrS{2uysE8u8csRiGv9v`JtL42(Z@FQ%#r6evqNuD zs|%(8MI!TuloPlXS-Gg13fIN{#$=rDm;*=AG3_EEl3oo|I1N$x>roslcxButg&KaO za*5EC%V$oxYC*lh3~pj>L0$JY&boFHD8ZjO>);Q8A$jv{dSc=ht$-HZ2GBa(84Xj@ zn*3RDI4lqFT2}u7jS`5+p;a5eP2YLTFnRQp-Zg0WUlx z@8SFr6cf>(E@@?&KlonDj-h~Bz75`@uc4B~CW@)5)2^t+8NNqvd|eha!Hysv=fJNGcoGrlnKmfUMD)u$O#{>Ih_n3EqdL zOw%qt_AxG7)E&0(!o{vJRudt$EIJx8xI7IngJcn0mHz8*Foc9Ma(FL=ZC>zS8(8fJ zsM9*0sw%mncRR3_>dw`x0^NtZe$Q?h|AUhQ@9v|ZTYf^g;uBJbWIQ+~j|PgPt}MB1 z^ZYtOMDqjvpAa3kAx}6LdGWqz9!Iwm8Bdge#^1jQuU zIRG!q0!-4+%yaMI`zT12A553n9kC&JKBx+5YBHNdMO6%Kkx7x+=s2K;PWThhFpP?6e^x1$ zhst;{p*11rccNQ_GW32on8`cmLtKwg6f)nnP_oKHH4DGul{H!`=j1@qiD^gE8tR* zcb?QMSrzZOsr&J+m*}QMA8|3`EsOPwgKlD4meo(1lBM*7xF9Fd>FP1jWQXdFco_ zP5m#(in5uGJL+d$?5IQ{T!=6QXM8+RDNNMm2zJ>&oKGn#s`Pz z`AZr_vGN^W(A)ER2?LjuS0zcq%H;LTZ@{PtW#q`6f4-1CZzGfd3AWFT&f;xUdD84n zs5I)FKIM%BadA|hf@v%$r4}cGUrw2)msi~FDR7yOS5b$=^$FQ%GU6&{ed98BlI$47 z9F{XGiTe19r|>(XssH{$^1FfgRzjcsz(lSboIjbq9B^=9?r}Ss7#;VId7@Qc#H+X3 z$VG$m+j`pz$)Q)T#ewR7Vl#PQaGv*Myh63Tuol{|JRE2$U)M^Vae}Er&RA43Z)B9r zh~@{$$k6=SKB0tp|J4h~o}qa@xP(*poptjkpKPAlXNNjIxTaXHfQ;6ZR#)`?pjIa1 zd;fpe%@6dpi*QAL94{^J-aSMj>*x7^9Zu(!8|IHWTh3TPIrb2+Qa<6ml|L7q(e-ca zmK(jRs4H$?h_--R;OcO!0aTaFGB#0n2kZzvJ!5{Px4o3Om0RG%q+p;uXJFf+76!$t z^6SgvM`m=XQVx38WK9d76*LTyUyPvA?IPY~wUkNcylr&qKvxiB&+lL5Tq&oKPEXX* zVw>D;j+6c~u$O*tCZ@4KM2>v)_y`~M652}F1NMH3%H>;Cl;y@#vP?Ez4=UqXpF+)7 z%C`lI1Tv&Bk1YQpFe3!@Hm7IkcOb303ijXECE*%h&%uYtw`p#t_Q+rIVpRntN(!L zY^9WkMg@*RqriLs^by!Rz<2{X5dbSep90(!5nY3oR#41$o*|LQmmrACe@~)YuQ&!s z+I;?eH~G9`{-g~6X;Sh$&^>?y2JAY(g@Jd@0;g+B_nLLfe?ml8&#vS7;mFylc}j%` zs*ncACP0w`ZUL~>0C)w$335Sc9;AAz`PD7m{#66JhHem-EN&3qSQ*5;){tH$uWC$DQ-W9Y zs%d@=LaW!pXY?@s@hW(LAr9I!GWR1J51gKvXBQ|2j%{bySEZQRjD1 zjYa1{(h2EULXTvJt~lSW2Q26xfe5f4(OCy?cxD5;&Wi3Crb*`c%A}_&#j@0$R7`8D z4tK+l;gzg5qA~&*Ir{T+N5~ylKQ_!3jV<%$GAQEBlCfz?V?vVh!~)q+#5jc)cW&5I zx_P)O1u{~S_i&~>O^}0TwfuXRuITw9;_&<&%H@U5uI{^dV~j@P?Mp8HrChY38As}G zCYRFK6<%0+mie{hr4VW?5YeDpF1%?Idr`P`08xZ2-+d)rvH^yZ$?({i)#C+0E??uG zAo@=r1J&$B95(@ZboMzjx$%SN&mxzdxuuW%+h_jw4)QxE4wC&LSPGcG6qL;Oh~JEO zzFIJ8)ml^Xkg7F2aWCpA5aIHe2TAZtEl!BfVclERDWG1P@$+$rsZX|zx`Iuiwp#u#Ynxp+792t;Jd3ol>DKD?VV9OUcpg}@ScDNH&yBe#Nsmjcwo+^0 zuH6L%0vVn<9)Vf(m6s5UwQGJcdi~NB-QVp!7dWbGx?aR=lXaeWY^K4~DWJ9d;t14Y zG8s5yeC5%xP(8(&O@l<4#KzGsB1ewCKSFMdAKc9TYjS>6G)&Q&{48@jqo5r(RO3?s zrq{$;hPdM}wFSlGXwT^!RA@c><2c<3QI8UI@FrJP>Ce){Kb4rGp!V6pcncjvr%90x zT77(Eui!h5_7>2kjqG2d7=~dAH{Wr0#l0fgi#PD z-@1uuaXlq7k4oL+4Oe+m+1j6vrm=GfWn?C4$ymf~ zVm$+glshq1-%NP2tKU(x^_l5grrtt0eK(l)NsF#t3A% zc>png-~9!In&p@Fu9H`EPa=BiUD3&K&PaO9E1#q@s*~UQmmrqKv2wb|Fw#j$R-c?I z6f<-r2g$h={2_r1XSL(L^aMNyq)w`gqKgEh(t!vb9f8Ob)zyd&}UxuQU&` z5NvLh#TjItM#L2p%V{S3MQ6Q?7>Oe_Olv_gA0F|S(ocq2MSUJ`rj1+$OzM@GX|!xF zx<`FEZYGnvreO37WI!jraTXW%)jds{--sH^YFQ;ZI<7M25)D_1q#Ll7g~jC1{b>jL zc7qz&)(Lw^ESqLh$wGh`)#lOLm(OqQ7Z&sJR?l2M9~KSN>oI`5%-X!XoJiN~Cb(2- zCtI(WU(+v?weH7P%-ck3B=jaH7SX%hwH+sQeQ)K9bo@8*#u3e`$?tu^hC3&bSjU3W zm^~1lG)Wc>+0K(C%HyAZ1YZ(OP|+e4`t$YF!og^K5i_4ZYLE#goG(PvjI3ZV25^yp zc|6i5D1~(c9HCf^Se4o}{1GurafJL{XEvKvDygZYxA~^zW}j0{bqtaG3`RyEBS-TT zkodrlH?cpPp&PQv>X^z&)sr=I(mt&>#emwSzukE?o+N}ap6ltQXIHX!T#Xe>kw#ab z68s8wAbV;`s&<%jh!kuT@l?v$`LFN6Rv?s-!}t7w9`3hpV2xj%cZddbZtGZ?341)I z>4dbD^C8rLUJ@R<7C#oscxENn`$+S*`8wJcxKUCJZR8|OTnWecTTZddK6-`zGT4b8iN~GpA-)nmg(L=6HM3@wu+CO^y z$<6E=hv?8j4Tl-ztdxp9X^%7Yw8N6r7abaXYyMnzFDfOF0n`6ma9C8}4SDQdoGa8j zKFeVnIZYB}Hm;EAJ+4MVGiofF07IvdT7dg9sBm34pv`X%oS(<&6Z<#)& zn$|J8j67_W>%C>UlJ6(^*P%!tBZr&+1x1u(>E^G~6Codt+u~9SlQz^-I<+x}jH9%V zKl4reRv;tq?Ae4D$#2eI!u9OR#h!JmU9O^}<}b)5j2^kuN>$+GZ!aZVloRlzQ>%LY zw_8ofbK{uji!&}$ndf12%Ctn9c#0^*P{r@`8&rjZPZp9U8{io-=9BBIm30NmoP zU*mf7C=M6;rawy|hrDeObd75#r5b0s>{5sQlQM2143Zue_oQ|iIdab?xU-&nVk4Vo z>AbYh%&ta-cs*L9dAzE1D;)ua!&>zLH%nLZi$8$bD-eOr1C#uY(;nTxe*Piec$)1) zeR%UiXE%?RBoj3Y<0_9CrABUZgcbJy-4+Bgnk{t)d&>i@-H`$p`Kjd9C;VFA;|g+P z%`urTA-sXs=Dvr~JpvidUOZOy-_X%XiXE@5Bac3Mmzmr*`r6q%yt=>`N<`%E7BhxX)S6Bspb1FCU)DVB{qk{ zlT$m@7MqgH9L7c_EXGl7=dH5$4x=)y%`Cp6L)~>$6z_hpv#YG8VRr3Ptr1$n62|S4SX5HZ zPlBH}mM<_dUeWGnphzIYb0QcJxhu}2&rn4`BhOOUCO-=DLIR0-@^(wPnzF~mtt0xx zpI}357m-6Z{e?5yH?U(rp=UA%VF{9G3`GkziM(Vu(%6_Hs>UY~SOU zv9_663N7Vv=w5FnmXYKtj8tAMi>Hi9Uh5@~W3ji(h(_{FxD*kEPab*v*b_Td`s#n; z;tZwhX^Xk4Dk>2}#$<67jK#cuIv?Y8GEbnU0uf>U3Pb)cM<3lpZhGSQnm+X8{N@(0 zbKQzwF`PSJ=>C_khgU9~@P-I^&rcepxX!mJdB!ZoQSt*Hkmsk6)2TikE4mZ4tb{Pl z`EC85DCH2&-0RLanzWk}GqV)1$Y+H&tEQ7$Nl>8;gw+yz!6zZl{}L-kSWK};Ha7I! zd;oS!DLGnY%9Dk1BG)iXfLiiLzrs(1#njrcv6|=S5tT6Nh=lBnc+wLePZlHokb=Jd zt|yQFdcLnuAR{w3Jr1jH<4@M93(fr zGEd)>m-~c0eC9CCTk__7_m)eKJ*DGC8ZexEF6>Jn1&0>UCPNw&hjx1`0JSdc7IGjxYj+C1w_bQsmNh3QhDH2#{m-&=E zaMlC>L&I;*BPY#&<3SjF$ROzjwE$%bpx~hfc%4C@&1u{sRUCKoSng9iP-Ty$s3}^S zo#b<`&#zh!fE2j;LDY=Y16eSE2SKWhgd*^~Vr){c&kqbO`vrSIbtPXpAjKA~{0>ALWuWV%cxW(Qo|VxHtc9vieW-Q5}R42#H3j4>(T1{thG@GCF8E-^=>b zB}&C{p3mjJ1)l!>W1Yx7s0UW83iNL8IH&uru3z?CDGIFoxMl5Q zDD(KjNWqs3Wq^@D|Hj|NK_ZX=3w!0r!He(Pz&`daJKY>!f73T_c!bWLK!(Uc*-^+{^3tHvO7O$nbs79+cN2b zA-wtMT<)oq&gx6M<5bf~pSQi3H1GZ~VjGqFHn9iaYw0+BQHR@^^CTtmvL&xdi525{ znCEovU-~g>Bb4#+ERTFl4ODvJp&(_xJEkOYe<+(X<+Vsd9ghH{OqE>!5xleQBI14y z7w`EC5V85zM>u*~hStR^xH#i`J3DC9vFKtx-k6U)pB1CB{P7mEWhy~Nt!sFk5%76+9Kv&1s_w4tcrruHCtsT+y}GIHRaFXDjs=KLo1 z!jqurWY5ejB~@+toa&w_og_BqK{{9PT~zo9CGUiuTDyoa4>iz*lpXk%PP7adlG*J` zBT<#;6uNvit5!8C;I8H7<$XO+GbNBL1>CIpOw%CRw8S?njYv!r5>>G=?Jr5PnQ7vF z9g}-kZ*#E!6C%+`cL5^sKw~5OSZ|Z39Gs;SmrN8bf!rTAO?Bul0cfG(3I8)FKe zIufc;$QbJ%tl7*(n(5+s=hQ$F5BK*N794Mf&Nd3 z-ud}eXCJ)bx%KSN2GMdlQz@k?--TsmURIKMR5gP)I3=r%wWfUkdQ?atBZuxYMB-zjsCxTPPKZ5^$4z^K&j2s!n z6aLP-;_Dwgm-ZS~3T0O1>(Ur2sH~Zibi(U28Ur?jchX_}UH}Q8nv5$n+)+44wrz!mb`fCEJGUM@7uh$j-AcC^OalrF<)=Zq z=B|_(yUrI;iX-`|6hU9KBEL8b(?B32qFw_Zp>y8ZbY^3GC@PfSgUb_{@hK^iMK!E} zRM9-a^~*?~pqLzZo52Q?`R7gSueQ_i!R?6xclp~>#WmpxOSP7UH^NLgiiI2yG0l;F zVKHT8wtzUO=@P9uaYgU?u6?V{>oJH(vzel_GB)9> zD<+e?jsKPmN(3TucmVX@HaS{IU$x9o!S8J2S))8N9;qfv`m}4(+)}Y#iZN>!k;6y- z#67YPv(r+#9|dP-De97U;polgqDP|kk7+Ur4+wqZ)Q}(P7Zwxd)e|pZPg6GG+0fK2 zt_tH+D+?*V)^2x#9F=y#zd4$no7Klz#5%!;WZMT)QgkK1YN$F}iro~0guYn|g`2oLtC(b;9 zj2rM4ah+G&+yy!{nq~>%E!ms|mn1NtAs0picGmic%NFvAph;&D3io&6}mS`$eUe_=5%{4>IenMu_Hy;bvDBRubBKr)@&uqYT zi)L^_#Eu(D5|Ie4p+zDYaLC_hXd(b-St)zqZxvj(rcKSk^;zWkLmt`)(%aFrk;uF! zrU~Te&)1WOP0ijlpZtPcCZ9RGm7WwgEu<$M2Xcz$6{N|~vNTT<68vPLg_}>`w$LUm z_X#w;s2!7~nt^#NDszAr*y6-_8!wZOK zIH6~T9$D0Y!(yupqE3DLy5Y3EoD zU}*YqvO0(ZP#^=G^vf+z&qNT-+C*W@{9bAp*EA$Dak1*KS~cltog9cl$@e4Z8-WOH zO$EGQz3@+)*$o$?P1M43FY3`&eDRvZT@Pu^vH)^O@qM%3jSaP3gg1`eeba zaGDfK{#W)SMo}Olq7OgG>kvrgrdiHUj1R_EJ~M zta({lol0vhqXua(!*|_fSD?uP89*U=G?^l29=!ss<*pPI1ju(@qv|OcC9%S2!z5GY zQyK}cDP4gkfsAaq(~RZV0j8d(D$qnnfnq;-MTW8@9+w&AcBdm93W{Ca;WE-ECgNZn}^Bgt=7ab38qW|W?W$}yER%iRjvsv$C1$A%}6k;7jGLk*&bhS^G;D#HG| z1dY{9RVOtPXVGHR>n4r$P@eCe10`$@LK%4{YB(E^G6Ze@wM6Fws&w&Um7*GT(h2}% z&Nev}h!iWWD$QPwYot)dlWN_#_2G@|A1`ld+O?=DkH`b)~;n(Au@EV2W`~uo_*bqbp2}OAL%qZ52qpAIutv|Z(HICb=GB1 zjaod$Xwi0Tf$qN^3$$Itqh4`s+Q9ztdRk#jjW{aIPmPS%6OT*FX{R#b%uTvHtxkOS zTFfzlj2!)N4S!$Rd>!Rid2;|$P2M?n*?{3Su9OKDZR1)#6JrI`c&F2 zDb#~^p%s03DI?WujODs`D()?|)=YK=?Gebx;pgZMe&WrW$Wt@T7D3dzsMKGsYI2S_ z3U1}K8fChgpD866UDT#_SzT%eP&1HFz5AwY+%3!ysZ@@8eFTBKHxNC2;hl1C3>)C9$( z^u}2@DxN!a6N_Pi>l(|MLOc1B%i^(&r=?Q_)@q>GuQC{#XOj3H1|`xvpm90(zeXc<^W++{Y9OK)$k?i0v(KqKb~efajKO+>ni zPZ@@>Azb@eyb%oP1Y?gWk-p+2`A0sZl5AQ zTDP!)y!^H1>UGP1!X8LVa51}4-#lqc;n;leK z9J$-_pTf-TTXc-w4OiXXZ{XqxWk{6krku#g{|cWc^0?B(x8%Fuz{PQSDJy#XSv0co zE!_DcL1bZu(+7=2rc#=h*NlJ?vyA?J19|vcw2{kx0&vv1$5m%wJwk4%BN9oladEWc zVvoGr5=0)|a(8oN-SR?^;MC3JeA3#8V&O+Bg@j};{ z@QThA9orG?5bFMR&sCyu*RR+ur`^Zfe{oc>fIqed1WZ-8o1lHe3 zp-@YP*sc{lR|4wyZMbMo5bc7+4~m7$v|Qqn*(I=W${Wt;RfdW!Xtd!uJkM8D`5gXA zyNHz37y=~q*~H%R9Gz8;nf(+n%-QiHFY1L!8bP1a{?LSnZFL+ z#@GIt=CNw^90mRIJ%>CNHJ>yZwkVP|MU9D3XAcy8=6Up-P)16nLEJx{etHu-{ycA} z?_U8;eD~!oL5ob5t2U;j%5gP=dpxHp{wy>JWi*oD0`|wx;uxi-HHB#NN=iuEr(~v7 zqY=5q;j-FWO78y+`lnq+N}UoKTmsPO&~It~z)qzgV18zq0h{wnRq0w(8q(MC>dIGU z*URW1fs7p3`!p=Dp<7R3kGxFj$El-+!jXAR4d-auB(Y7q#Wq_g6p-@M;>#~K*Y>tc z$dPvkL7hJNcL2#=q`ia5McH%tes<}`$_mCce)>84(-%t&qjHku>%iDNb(0o994w||a2f$ObW2!6k z_C!Fd3?TsvUzro%r&GOMhAbgz&<=~R|7G5%Qyq;u35xhN=PKu{S?{E4`oDFa1^BGG4*&p77E&p6uSUJOIS>( zOB0qoC^N`=m{)i?+uw~I=BJg_ZdBMC(qLR%8I3!Uh>okvW$$8R7l;V+_{TfJN(hn08FNjJO9CASSVac<|AWo5*EsThY~A`S(@SPJKM zLXSX3nmrqEL|p@b$ZY2V(u_uD_V;7J`HN~Y2}-wuvZzf2O3`s(HE-@&80iy~BK^-E zkUm^7hYRnHRSTaTn5dX*QfWq~)x_LzHzNh)KdnMP3X5qlgZ;tP3vloRCqso86E}F( zc~>GGa#L29=HTh_^Asu>)0S~d@Ffwce+EFnx7L%3o*Fry^soHxF!{>|q6f(9M^>T{x1J?<0U?yjtSy6X;t3G-KavD*(oaqD6?H5Kz|C6SWDF41bHV}&RwZdw>Z zN&vBfInH?23BDsU-Cl;cI_~UauNquHQc5UYx2V)w^xG5?T~uNm)m4k`j0z_jlq#f1 z)Nx!OwNCII4v5fJ8;Wh5(Qf)-mqLL8ehqlCpgMs|Ml0syao z^4YD@lpzzdAg^P?r67t^@DpJ%IhwxD$^P&Zbawv=Rd0IL>Ym9H4s^fNb=Ar@>0~+W zlrQ-oC@tRj1ap9&E9=M;r!VyP31r;-VCP*AUn3&7ow?wmieUV;u8x9n=jX>dl0OZK z1Tt<;w7iX)(-&Oi%`+EPQFa34zDd>XdXVA;J-ILq_NRzXIv68rwMs5NjyZGruYujg zi|QTQL5%V*TNiYn;>3D;>jM01?E`yk&>tB2ltFJ@m=2t^5Q2XV+<^^bu#tdEFbir1 zE>)Kwxb(9Zw!*cxoD`>G;{PK(*EtJokg&y)aR5mgq4-xIR3l)wx9d}4ZW)t%&speS zyWA&e{C3=1IuC3mr=I(%jjx}J#tWt=KWh=KwjGTZ$hfK7YW(K&(0GbdrNo7H-zatK zf{Oz+4Z7hr+_bRabcyWvL0axp9P8KY`2W8q{&YpJe$}3y2fIHyQ78IoXQAV(K!|?f zJ{X8NhEK&lz?-a9aW+0B&BvIGz7jSj-6X197$kSd7uNQFLd3929FsTx$2#_7`GSG^ zQ1)-Z3BhkDxzUOx&P?Q)aYrf;Lk3}tDISrSg*CnHA}(n#yHm1|Mf9ID8Wzjyj!{J^ znNpeLh+3h)dPcgire7%I?RUT_*Rkiy=%1I(>^}v6eh2piRr30Eafv(PRG7&*VmbjRgtsIpr8DQQw%Pur_$PgEi0r{!Dc zFCZREAS2Dlsasj`=NA&9fuhkiCY6BJ#+h>(^je96Z`yxcu+ZBlkRd%|b}Rdj3viP5 zdyuEk!6aoGUD#7EA>Uu@A~Zr!N{(&-qy|}NHjwXb+PB_M97p`WbDEajTUS~ABg;K${LZjEtaO`kx<5#*A8eE8G#V1K~K zQNxx3Vfl%ZRcEx5jKi3ka8>-F1Y#JVXy{b6TCF(#d=z{}M8*=A0c}0|h+{#I#{!&? zOUP%1XVNmp#2R&VUS(C6a~U$D!O@h}VWA3Si1V+Hu=nW}xMWHD&sba2OlLdpL z-h4?P3|hG34e3y9FrEZ5a@1zx{LIL^Vxw~tT}9#3{2D8Uq@_uTc_JIlrQ@0u{M8#^ z2R>+l9)XDZs}auARIF#$S{Jy?Bm0+N$3;cMIW4ng?WRVpWGe#zMAz!)N3m8vA)1-} z)mfzfDe+pcf1pBO$=bgai-kvjAZ-gXJ-&YuE)!@Lln z{;~ZO&dpyUES7v(EX|KqBU6b|%>_S76*aj@gPMFobokjXB4bbL$wBrV4Vu(){G?WN z{chF8y`Sy)yeQTEKNtI-QEhi71F^EGP!l8*Y9Y zH^*KU#G2_ZE3<{^Vi?hf$y~5vL~IHj{Wn4j1HJ7cG9c|l6wo`Gb*wJDU=j^4VV>o6 zLrf=8nEdK`Mp4X#nCTx!Q6k~E5bSk+%mT)5~ zmF{x8c4GnvWaP*u1gc&6-cuXcM|N}5+BUPFf|dD!b4z1RjjZl8#iu8x<@WIutrOxx z+lz^Y-X@TxbuD|lpVkJmky)IL$dHuRO3fi#9QSN{Bn+=z8V0FYjx_SeTe*Voh^TTO z7iqSh{n$;XCU$>{H*T4eVX0$68cA0qDn-VL*tRi;>2zRFcu#9(5)6Dm)%t}YnzYTBOwhPD@jMh9H=a7+%dJ2P~LK=(?_=QtAjaj1ugi zw1du1VwZ5WiO2!>&GZJkj=d!bE%d5FLEXHTXsF7JgMX_!5fLL_4^A&`746GoW(Z{5 z=|$-=u!-hrH)FsQi__NW^O>YFARhvCZ+#+y^j=(j`cgP=1TsFo7qT90V8>ImM%er) zjG8}(_2DU-U20QJ$rMFn+UCI&i($=DA+#v1s&u$a=C+t@!eu#dvqxu4>dzrdM3lZp%z$s|IWk~3;d%N69j z*@g9_x3bXN+b)99{1SSdMjYlU3oAujw{!N?Emhc4iJAQre9SxHH8SH=NRsmEJYJpA zXhR^Q{c==FSWE^UIP74XmoNB4{Y*BLk}=AlC+?1js}%=5_y&pT3LIOX5FNVP3_$1= z3l zUbt#uaA?^t$UDhD!V&z)z7b-(`crQ^|9&-YJAyfOZ2slG^eOYNb=xuTSqQJUk0V;J z0gqo+gJ8M{;u)G}xX?8)wW3$odFrZy zXsYY|?x%XbibPtE{UgdjZ1#_0jq*>0dhj}rk57q9HMv1?RR<#)o)6_V|;-4}O&%lQ@_F>u()QVp)oj%W~>+Av0yHSnM*s!DkYz zymk>ex_L8)L>*?oL}-I?bQ_VYhCko}HFwEopRP^>bEeUhme=CEd0}96n}igv0^pB} zM!ffCyrj|dpGF7pHpG}bH!(vx35TRWL^RJAVMkCW>5Dg^QN#Mh z7HKE!YKNq#Qx$@l31a~lDQ*a#x(!+cGVb=o_W$bw93QHg{aWZ4<#y^?U0c^MA*I!u z)$2^^aDv2c$EGSQhClO;vuN@Sg9!fU?(cSd7KCVD5`}v|+x45y4&EP4yPG0^`ED{f z?Man{@iCTYLp`dHB#8S?%&*nogf%Uc0jq-~pJMa#>)G5lVF(OUI5R)J>>-b>D2=Ao z@`-F&E18ml)C6j-y9aF)$jFwH#1v0QBOdR;umMlE-wj2)7dTe*#`BEd6+|GFG3$4O z7me0u{~;(6$cX5q7da-y&Fo(e;cP4TzAr!j zb<{v8qv^_au>bn?g&oHX_V|kK`{?~o6i1FfC1%j?*e#E(wQAPPShVu>A7H!$GBU&beg|uKsMY67^uzT;&5&RwOdhGvoAjpZNGA#%r>Rsj zI2V@Ux^;r@z(l6SKq6rk7vlG|2k5e+I9-12<}`TL!CB%fmF1Ffk*1KQHQVTQN$5yno!D+;M}hGIBfpNv|)c2$ga;vl*C@WSBgHVJv>LkIRv z$|CpvVcJH_h9wNLSrrJ1!SrTw`(+A)1`J5ty#9ZTeF=P=Rn>kbd(y0J)1+xyTA(dO zQs!M|Q$QxOPcmy}2Pw1flVoNxn@EfZq9UX&eU(M52<}KhI--aa{162ZI)k_%vWg3z zAH^L}|IeNGO=ySk{XhNnS9;H#``+c;bI(2ZoabC}A9~Y76A+NDc@cTh?!yLYm{5pw zwJ_syxlheRCC0cXWD1#8K+z%N`p&n>jGs!w{d@cFqu(LY1dQQYo0?#-V6!r58x?jL z^697yu;MjZOU1|&T2pT|f)v7d<}G{2wyDJQL8<`cjpv`8AFcoUa-5Hr?9<4*W)!SlNE16!*81V-0HA`Z*%u9lyG^>H|r1wb~d^&mm;43m??y=MO(VZ{E| zaaekrXvDv!@nk(-_15q(HWbS;>I9pa1^y5%7wg>I{28^)+>>=I$XiH_lwGnX$unF` z646qW$&k%O4L)(f#&Qd1pr?2L6vJ+!amPfP#N376_Mz(NQ{*j99;HJb+E<*-NR8Qu zNhago|1+E&&BffYv!?XiPo6%}QEmG56cu=u$QLgm8fh1ZYt^s7yAX; zcuVOM-@+yCzkhKYS(I~gepjB3XTq7;q)cL(!_({2_(^jyckJ(%nX0v?aT$fD>2(3D zG=CWmN@SWjMoP~EawH%r>XMxN8T`Jvn0Q^|G5Z;)I7_|#RLkX}oh|*F`u@^-Ti;WC z_w?P+_rAUZeagNw`Z_keEPAa!wc&>wzPjOK8|F6HHZU7TdjB?XLGRCdztjIv?@gkk z{pQ}KUVpD@U}x`c(Wm=g?Ct9LUC$#uU+=lDXQ5}dN76Ie{d)J)tux*Cb$_n=1Kpu+ zZTDH-y@wu;wb5+lMe24EII zrW0^?XK8#%pq9OrV8x6KUL;QzE{GIrux*#GQ5_~^q>936G!#edW6GSEN)7*zr)tV3 zw=ubda7Efg-ajIu%ycYL@oBas-e zV|(c*y|k0wrst_K_o1;tCQFYd)3 zlfz4O=Y$^vir&ir&OZfsB)AI)S=?Z$*04Zjya1^;(;7^(6P62HydAOl*ewE;wy0C^ zTsFo{6&rpVOCrx3HF`*(;=;dVput=z3&L1|q(dS}#jVe*l7S-xTR;$vL@8ey+2$PH z;(##K@M2B?w;RAma2_rqw6kJC2833F@LRFjkxB!=3Dyc=966#DxK9^{qdXO{uWEvR zluDVG(grc0kia_MRR3e0*sZ`6v5d^0$H?4 z7%_H2+KCRk;2dp)E3rL}2mH#WZNhKkzC^N!vD_BSeVLc@^CSIiyCMIbf zd~Q?OR6+Iw;1&%Z+`iP<;^5S%?THTRBEus|CmrU*ag5)N_bgh!$ZWe zvNU$4Kt(tywi7yw2YM`q9cda2rEy`ip|fc`-8+!A-R;C)@iG=Xm~Z*)>Tj3K4y+{1 zTL2Uy)nEv7id+7*N`_RB_|)dKMTd}Qct^mko*sw`R0(WFczd5pAvqsh$&mvCSqMk| zDo`1-&IbR1DAF=$N>~;wiZLPj#2S@016j+q1RhLcHA65S1*uW1K&BAdUBV(j_+SO$ zDi6CHGy3`})tj(ESlO_WU?F(^Bb%bQ^+y6#jD3Q&g_~AIBQZN%DRe8|KDJ6lw<>`1 zlK9d{^gu5`TqJy{u?;-gh@F73B#?x$qNKeQlh~)zCVDu5nnY&6qB#M>k;7I-CxE== ztPI?@O2zLW%z;9N-xJ{lrY`nBCQyMP=7JC>>=y-cl{SSXquQ2kTP4HY0*erYLw~Rg zVVcICX8XHWsU{tymk#_6CwYj@2K$T(Y>Ta@LySV&n6T(vF)!BJ3(3Cq%lvO)noGnW z6;cphBu}9af#=cUIL%X+49H$$#1sKJENvtpT^N%&wORNuG9>Cu=#ByY6~=@Y7;Pq< zFEMafXqu#rq_87U!$x)nq=km=8D6ED$PCfiqz@+mI)Nk@HhM^qr)V*eN?4Y3_N0$Q zS~boRVHZY;1a;K!q{X3#KATL<}$!ng9c4V>fiIQ5~Te zV*C*t4^gATynyva1FKYI;eotKrOj${YRTe=rSK=#aX=trdJ(z~p@H2lL0CT|m_0r8 zl~pR?Y7?ztkhle6+d!FtN4E75flB*y5Z*YxAhd9tgOhYP%Fml{5BrXcS6+?KZOvtW+BMYxQA?yxgdSL%56(=!FmQie9Z;9k!fmcpx>#IB! zyi~!$C$Pz}9zGn77<{o)5c68J>WagDii9a4g6~!)YuWwo#&4I9lnLStc5iRloW@ZP zI6jLylpGU2tW6O8!>1;Hr|{ztGM73lZGw`ZjpLjppm^Ag8mx%{p(#pw%aua6kj=)4 zotT7E6*+yNp`doxlL8e3H54)b5ak4t!4ZXoFiCp;#*@LSX$^#b2xxf(gAf0$(?uA{mDZu!K>(0f0BrJ#1RG>uTZ03`(GT;KU*t8z3COU-3=f5vb5iyf_Fo zWt_t306BM4@s;MQ|!f)Jm_z#-J7yK`pxG zEp95KTSWf=Is@3eAt@bE=po3%lrYBzSDVJ}!6fQ5P++`Blz6TcAQ@;C!Y`@Y1vBoS0Niag66`yp+H>4rf^ur!jOC z0zHT$qE}cZvICt2F_AGX=@5qH#%YqUCp(`P`h|ngiDXL9y0BSDdLkm$wzLXVNGY5z zm|}!(VFi(&7JF#(O#&7FG7?n)Pc=d4W#AL2!NWrW6*~zc(E(Lk2ifKD#m_?1;!Z)i zRYG-zq7QUPq&7-7#A3zEY`wCjrDgj;zBtbZ*4l(a3W|v^FTpM3dcqCr`yaCSd^hB@$-2 z&EOaOKA~hL{x1BsNDfk*V)z|o5lv)@IW=)YppuIMQbj>Lrfo~mQIS6??MhAvf&@vR z5JLwkQZc2?acoPx8F`tBAM-!P_#HUK9Ht@^AEerXG{k}q3Egr+X@XJ(0S30kE`iR9 z4LrU@_$|T+0YR#U+U)?3H8OrJc_m#$amT)KLX8I)B@Q>RZ4qMv!x|Ht{;^8MbU}ec z^F*_6oWIIS$8QBHwy>t*vx!}Ws6{w4Lc`fA90pDa4i1PzoL&tT+CX@;)JJv|*|6Ys z2S9Nex)pW@ZNjECrUpJGG>u(OMh&&70s*9kLWzAaBB*@0B;a5q!Hl>zz{52K%}pcO z^n&nPh&7y2IxGT?O`xeF3ePF-{3cJuD`6ThXpoB#+2$mYcj1DlDGv+V3S@E_gxK~v zrZ8Pd<%TTRqD_aMJ??(1>7-#*dGE99SXG2v*|X0dzZh6M2n2Ma!wv&Dzyu|OTs$-t z-njCM=Z|j$;LdtgIKS!$48$*;c_ugW!tu9@S-kZHJkB;*XI3pYsTbeIa#LM-3F9ZNMCuYNF`caMA_K7M+1R{8M({G_a*s4nbB_;?;id^~$^g|2 zXFk+9oZk>U8kTR#^ZVl)N7k)^)Kgpbu3`{1o@|e{u07d8gyV3+DPYD)q9peb=w|j< z!|ryvM0`@n2zKdPt5!v4yo~;B`~C4A;Jo6w)>I+By;=y96cMLT2O)H^uStV=lU|pK zfGOokZ_4dUy`oRIBc6(pjAKM=9y{GNYwokSd+B|LVY@6sk(E9Jz zXImd={X*+it+7^P>p7j;-ZMJS>g?@#x#N}2&vkyFYpmyEov-)I_1HF0J#5dG?!R~c zqWj+N&x&5_et+M$x`W-C4V!v?*sJW`+uhUkhprzFe!uG*T}ubMa((R`kM-WL;o*)u zdOJEk-Wd|r2d^G@4LRKMeLwAR^}pEj)qxB8&0Wq8dGAvl zZ~y$j#rG_@HtoD`U&m4fN&;L7U=1ij?hyT$sQroIi^v8? zDMFJWIua>ZAe=b!i8|t~v@}#Q9HCHYoh1|QCeRRL5T`}_of?Sozcu6X5Q4}ELOsTE zrJ=DS27AQYI@EF=4zR}mINx?9dmgUUsGEcyLE41WtSBYeH2_wPbk6RBxUWU#Ifo6mD;VpJHG*eRrDg`d*xbZ-phw@uV zLhPB?@rG(as1O=Zi=igqlr|w5JXGqmNWqT;>N5#}hLwT1E|7Z%j>Dp;aWlbhAzl= zhn&RN%!!sC@=YV2J&iR-eXI&Lk^$PBiE4j%m1=?lMJOZ(CC)9F_cV0J0|J!?=f?RB ziNSi)X3Wo0R5JSPD%nH~OBGmwpaSCH!p7GWH~(6oLg6JQ8e+gmf}O~9Pa7L(9H9+1 ztUx=(QHWC(nhIPr66WOQhNcdxgc!Dbxa1T2Az~3yxQ$A-JcgE+2)BZNgP1@Ytf#~t zK-2;aGjfUWVNh_`r%k--h|4$8JT_5lR9wf1qYKmlC`BQ1Rj6#do2Q0|Ef#uS6xTeM zdekwTLE2>J=>io>=@P6ZI2n;G61Q8T)JLiIhCYJH2M1tGL@mJTK?wpd0oZ3$_%V(P z8>Sb^rJAV6*ao<)cQkHt_$?U%g#!ed2XbxVs^vwl&F+RB5eVH_@CN#I(X<3Z6@G{l z*A;JR*oi=fC5TKhxn~h$F7$Zps-Ac89}c3!_%Ut3tYLg)QnCBn>;jdX>M1i0f1)^( z1fS4HDy@IusW1W)6ChMgA2IvFa=dylxp#-Z(oGb#aOo)eZO8N!9MOP}Z6l&l^c4CQ4EHTLR3L6#szXFSTrEz^M zV^1?CTr&srLbu3H!X1FziD8QYgJXDf-zx%@S;B^aG6HRitTkbww3po~;mI)1H~@mC zGr%;jAwYw;k2;yb7M@BJVm#fK((g)hSx=)?AQ!rz%7 z&jURIhrsX?JQYii6$Il$eIqw$7p`_ermbN`fE>eEAOJ982m#8B??dcqQ-gP`{upFv zW~n4h7+?n&`C%()6Be1k6GC5fYhhM{fK20_0GZpR7JiGh0ViX_klUdbw?zW%*!S8h zl}sQEkqo9Bj75}jQ*mkV`vMu3DTu8E%zTi<*fYdjNDnt26B_#-#W zV)rIukpZ=_(;%0iL&J>Zz=S5W@$>kGT@b+7MUEiOrx9DO};T`;`@M9S3VXnpV1TL1)!BfQ8QR!*ezsY?SJdV9=$6C0+Jy8f|gJjSp z{1ysX2p)b;7!h!lOp_b3iEf=0sJP#uwIy;;5CbK#QK)_K;nVpc!CZy(!{kPa1tfwM zPd8rL&;J%bsZ8O{jB^Ft3v)A#eVc5XTB9Ok0$PWiF9fv!>H&JyEu369rXfnfJ0(cB zm~Tl9Cc+J<r9`jti49jO)0-NhSpD@Zr1-!lG$tXuJ@Ogm;Qd1H$@41gN7p+^1l&Ar>`kSG7hw z(XcY21ovD#kl|KMtemh!+xR2{7*BO=A1E`KH1D334d~i(npbQ-Yw-rnk59 zRAS|YeVV*p;mju1UgUjdHZSnh5H?;C2M5wlV3|+@iiR<@;d?yQi!)jySt74Bc+i19 z0kMvy-qFXC!2sAi7%ADs*caqv^;R~%)G%;kP*|fRZrEglLnfvn*|F)j32npr14|I3 zKjbPdh)4;6_Y%5Ikb2M?X;|eeF0ApA9d81ti0+SO_%CA>a9+Vmg)fFuxH;qb#U$?h z2v5bnL{mPnfEQ+4oPFf#NN+ep_$@5S&W7xP35h&mLFC%#ju1~JhZ5OECUhJ^9TQ_& zg4uRMoA6_B7Icz^d=C-54`Rxg?p{4o(G^G(q9s65Vn)dYxYXM)YG6Ka_!wXs0ApZI zAOIV-^c@s~>$DgX9%tOP;>de=D&C236cc#`)eX;5c;?hOOJhfPY6w~awy_#ka@@{g zT7cROi`}1jDhzH*#Qub95iUZIPgrnT8{ay!N+t#(nES}9GM*jCYnL|J@rLkWsA)*w z-OyukgRDUK;KU!ec=f}OvN&X5#c^Y;@rDKyL1OEY&@z-a=+5BzCA@TD&9t~qxRU*X z$P6{kDm>)CbU_Sf(Am^V@fM+5p|r(;>js{#FiTLVFl*3&wlp4Q8mxvi-aZ}BjYv4F zgTTioDCIhx3Hg)^80x z#DGwRV>5Ov4&MHT1(UoVdSUi4;~f%u9?=P4YjMT;FXMkpPE?|TLTZ71A>&xg4>fXL z>);S~>CEDLwn1?r_kLo{f~dd?n-PzEPVwev1{0ihyYhkw%rH=biB=xPI|hupcr+vC zsIB`3Z{v0;sa>QA+zMdr4dOgd;Qs`GoVZqU8?%{rH|O>k|<{y?l~^0XSM%5$HNZxxmv)Lpz2dSmKlewGr;? zuOA=Yv`!6f_`xe?xb6RZTdP#zpU1fg*U=5#=Uy#?FY$<~#3T*Abk>)S$ed*)K_KmK z;VyjR_|U+qBu;cinyRi`bL~fAOZoS4?-(!XaXZqXhj?-(ekOSLN|F{v&!nXE$%dK6 zsnA@PJ8|^D{{fKsKgatv`dS9g?EX^kWg=gnx&1$#HIg`U=XRv`fQNQ^&CT0^+`0aF zV2K+Vp_Vi`$H%aj0# z02A1UMYYX?O(bAE-9sRnez~psil_!?Xt=x)xIW(HZAzA%ougev^}=kTJZm?E_`Xmb zwM|3Kv_?AlL#KauYxQ79jdwvN7=*mbVmRuK#uzQD4tS(dv5g?E5~JLE+Aydl8bMrb zxWFUrW?QY1X70Kqe7N|A>}3X^3_62ZqIOENaVOsnjC(+GIhDkn`2Ehpc1 z9n3Mo0OUguv{Pz#hKff6vy0O*YmDL^AA=9u*L%@U6Nx+WG`t`G@TKu;|Av}MG!7_2 z!5f;E0A!M02$ssO1&7R$M+%kWn@^YRm&hoE_$0fgs;MGJ{rpHHo_Jd|)P*LuyO*y^ zbf0@wN5d`tRDR`IdCz)W%sqbD*kJYOKn>{yE@|m=c7Lh!$&L=>WW8K;Nn0Zlkz~)r zs0mUV@AexEyR%tJC3gj+23aAQ<7Y1nhrz)n5=V9Y@Jt?s`Jqi%PU3-DMmxM8IAt|t zm653#WhN6Tn*pHMSj}sPYnuj6C6NrzjTqBy)f2;Hs0fc+L^Hf=r#4|l`Z-NrX~;PW z(-s|R2I#q`mU8}kzlR{sYhK=3o!VLh)Ekm7h|QGKX-u;Eia$MzoTuZpJwwgK@C6m0 z$GtjyPJ4B9TWto;e0pms&p=4zwepzVWCqgi7=+M=Cu&23O*CN9I)MW8^g}?Xnjp*! z|4jnM#`|xkXBVvV%wocmO4-WMnOOj)6J}P7U>cif$fmS?clG@vwF3>G{OsC>a4pP~ zRBWVJiu>JGe}F+GC+W|h&W02Ark`U&?7$Xn_~aMXxX|Hosr*bjtZ`(u z`6&a8^NrpNjiNVAG~!k%0B_|-(URb{Txt=O1~i?2?by{f*L!oDsrwN~rS40?JXmys z6vl5oTXMD>XDl;PjX$87cbIvha?3doDorFIoiFkB?wZ8bgHTx^@MnU@@I2!)()N5= zJuUW7cBPa&RRDgoshFc)e(wD0i)VmqNH_xl2;=*qk;sg2v{B{!dHqz

JzR9dDe4 z0XNY&(d8Pr&tCKOiRz{Mh;&0kZ$hYiT z&V5G>xc3+kftce5WXmw&FdK+if(9DNspGr{?j5^on}^;)Ix)@)j^i6oCo_Znu!M%f z4Xm97V|G!@%+1dF=TtI@onGR(*48Un>zmj*er9$F424Y76?xT z!Mx_>6_O*G7f3||%_b;YxuQ1Y%~r8hPLAD8+@%`yx{1aeW_l5?x$oYs-2Ix`8=Uyz z$M$f)*4EA#?}R|%S0XB(*XT{9*+q#hsh`U#cr~NLfKAmz;{1R4=DWGDVYQ(T8f!br zs&=6*p3Rha%QL1I4a(WM0PXklZJnl&DI^SiQUJ%P)wt&_+eYBRf3}VLgl@I%JN31l zWD5}JIia5_i6+4=%H;uxd`@kXD#&7uaG#tZ9X*u>h+^dFMKJeP?zNfPzxZKqH1jPI zh%>%Lheo|%U_xrQN$FErD~^V9HSn>OwV|PA8XsXZ^x7TUs^e2w|M9l9W=j5G)<@a& z*_kP+s%)_n*X}J`$c%n9kvLlq0{=;NTJAw}?Vo(Vp0m_WBcUBD1WS%j=&DqwW)%#b z1ETh{++=km_!YiJ1r?&1#vS?5A>fcEQqSXm^K&QfVG*~xSe$< zXg|$8V8m(BRLU)UvAn1H?99`ri}-*7^~@?yw)~5D%~QSZ?uE{4TK?7kjn-d~80wdH zT;W+>8N~T3YHUJk%9KpANln635F6+jn%ii@XPQd6BhQ{D;qEx`kG|@MZ8bNLpJu%J z3>#EO6M2n3r=FvU8jrB&redgD_nlV_&eq^uZpoYV6syn9E26o@qR$rR9&+F(&BffY z^Oi2CzSCKo7EN5byfOeak#}cTu}nUyq3P+;Ok5w%aJRV7&*s9z*I#FViu=$x5C~mgXvIb5T44#mjs#y4_R?bT`X% z^(PmTnYEjxW(8fC)55E-+vhP+B37n|mY6~MFZsSF`(vZh2xYiNhOjn%ybfSiE=XI%^|Lz4Nw>?>VJ5Pi{ zvUbZld*4B;42gy0-Z769gK;{z^=0IHLl`_h*ht|%j z#dc|eh=&o*vIxQ2L~BG_@zJ~ASgawX%|^7sA4#4ClX03#PY2`N)QvR|1^m05lX%@=TVAMkt>$pf_tG?uwCn)sB8E)8ycD}d(CB2EniE7IYAf#>8&MdDbu8gd; zW3d|NZH!??KNl+LBU8pCKd{|Jbf}5O?P}{2V2ZCSqC?OUSAaYybSURFBr0rDS6*<; z<`8(7;QW_k>E4?|LrpYp;U6g;1@UJ&qE{)FR|t?IpBtqhW+WC`A5Yoz(%6)Dma}~V znojO==v7T5&Ob7`njdAUwtFMeT3*rTXcHsexxM@LfqkO)RCnDm*}%41*@gCbRZ2<) z#34$tsL7}dQ!Z@?z%Ezg11rl=rJ88mbHCV#@WLDKAFsZ;Os>XY2?8D_s1p8w%S;C< zNwa6h?orygCq9jym5!csQTppETAyxgw;ny4;(2>02ch-%JC+ltXpDk?WA!tmj_y0&-V z)Kczn5HNbyryd%wYCbG1+nZo>tQ9eptXOZO7R3^$(Sk%fWI7aAVi-*{?g{FhLQb0- zt|SaOv%E5n1Bqg)?kyF60R+HFNSsz#x&CxaJxtXU#Mq4gclc)jwQA7}~zPvJ;K)w@$e^BrCIS zHtc6qHbbS1>nj;h;0g?=iN;Z1006-J$lW`tKe*z}d)_52180ja>Aj+(x6j%6OdHdE zCkap0^1Xc%i!83l=PH!bYqh)F`CQB=eCWeB;=paD!QMBr@6bCQ0}T6(gaOcF0*uD@ zI4IY8G)zuAYc3n7fRBZ2hNQ<~@cm#DjXUy$=A^jihd)6C-)^+Tvm_h$SdFwQ5H!=% z>9|G>^ATz3rB9rX37&s z?p0L(cn~83VD1WmYU3G8bTqhP6L-(`=t>g}wq9QYWot`y%MFk$ zL_)m@k0;eL$uw=9vAQ$L+FWgEDbO>LL93|=yD-@rtF zrSIo`vfjV;I(qKx8S2h-J=%44=hYp*>Cm*_(k^PdwDo(f+c$8c_qP0;XyAw2H*l>V zs@k5r@ru^=EI;t|4F#YCl8Wto*A;blT0YJ|_}&o-W-lr^K{WBBf|Cwfc{=KNSzg=N5CzJFfKH zeE6IA5UV&4plO*RAW=*z7^!@c6)UJoT={~NGKvXN0fk?|1R|>+Vio(PjP&N`ej^g? ze)Ah*#PzTD4d>c7B;kk{@ZQv9#2*PxvJ{3T56i=oezBht%cT^$DO>x7WIw~mZ$5ER zn`ryZ|HhZP|9@ZFex>7P(I+t)T7E!A`9rc$NHR$Ug484%4*2nUN&6#8O%V+@Qe|`oV7Tm~zoHaJPKfS08hsRWa?Hg)uVh2rMt@QF92 z&-$N$M`;6l{Kj_3I=#RT(gO;b4nY!0CLz`EF&S7Ka#AuW2}$KJAW9;XWNp`qfrbwB z*!#b+dj~&zYvN)3PeOX@gi%QjNaUf2A{1sPgVG4r3DYwfz-GeMjYw&+Od9qB1(IiR znF7-Xz|A|a-+uGJqo>XuyT0(&@&lqJ2Ozh_QW+JV6k}Pim1H!&dn1 zE|W~b>}PL&)`dh{|JUzmge@z9xRV6^WDkX;Ar_|*rI?hX2s=39mt#;0e0ps>^nSoo z3JgAo5p|8MvYJG3(ulaHF8dFS-yL9rVk#`b=@4KT$WlBZO$LHt|70KnCZ*;0zXDRN zA$Vj8YQJ1@^NHzJ(T=n5NgC6*+Bn59>u=MW{pXUSPAWM-)2v(^Q9!UUI1^YpKu=;T z;#dmMV*Ftki7dGGB{9xA?pbdqP6sjw>FRe*8N}M=X`oYxw%-)tj})>73Rd&{6Z0Cod=)!?!}&P@YQTj-2z?-P||Yel}6f-%2hl z(0>T#Dc_LQ7*dE?Uzn0B*cg&&kSpUR?qgqpF4jciM8Es@zC(|EYP9<5SBRny)$ko? zhF1;U5_8Hyd)bOKpTSGApKs=#FTsre7LxMi`uVWF-_>5-@#PvaRzR^k2dW`|6LYbd z1ug3{q|#P>el{SC>o>RIb?j6UclcE=0Yv%KcvbgBqG6(${cFu6nVE{l7nQhjVb-No zagSe(YuE+1V0M}*{ytG7H^f-=##>-;8$Wk#Y7$ym%16bWbF+)N#BAC|E}fgX#9=hj zL;~~)$<@<^v=EOTCTeqVd4&ME@<0|giS2Tl{jbp8tg93#oVr!7XgIv zHFN?1iYo-*mIqK&q}|$i%H}CVTs{B-8dU_q~CM|?<6~5 z>!s1HrG~9HXNsBPOulS4TWLjV&JZO=vps`N#V~08Kmb75U4)kUNB~zeSRu{!BGo@Dn zweqpr*mjmW3CT~@R0&oBT$vj0+xEN3-3w+`8CvA+yCs;MML*#~MDk0O+SgdhWF1Mxoq`5>{X6=RHh=z-dv&Fc}7!c)IyO#MDgpztk(gE&07 z;0B63-X&m#zm5ZzAOa?e@ashK zH-gy#?>z!Ni3J(qzW-2dcx2rg+;E%sd~PWD_d!njgWA;Fq*?gb4{F4bX8W2W&8dsa zult_$mRtbfq<>WNjgnx;1bj=~4Ig0=zDXQbi#*TV^P}3($htND|C!7mseOJ7e)RCh zMiP0rvtc$#^gS>loaM$AIUPAk-?V(LTb1*F>g=_pfd!uHf2`IsiWpz`X2MSjL6e9# zfNMJ(KGjif^0C^UE$b6G|C5VrzDj(r@Lj=5dhRbF4~Ly*!%Tse zC%y52yD&XX2YC+o!qc_kp=KJvyF80~|5HC5t+xM)9CVO2!1@)W&6H}LQK<4Ei%cKlg3r|U44hiZ+5RTRi{*`?SrEzEr9!rWdzX18#TnxqkR$SA!&8JLGJ z4?43`0t3v+nPgN=^?==++jHn$FN{~Gen=y!12% z*#9zksfkA3d5C|=gA>)v%S5ll&Q)Xe_|9qPXG6(?j-Jt1rYjL2@IQZ#)jPG68_vQ= zxbt_nZmVwj17RbyFtyf#T}xZbfwU%GGE=%rrm}V$Ij#~9r@hE7cOM;J2q@_*P zeS1fL=hLDHT*R*Ea}s_63OE3#SIqd3;1(B@$=o5alFB*fG}=InYyBG;@+qZwpvv&R zFpGb~h{@y=tWkdQ%ZB*8hbjVXFQ%2rY>O$*_-`;|b1~=N{mTog-~BgXh%1cCD>LW; z?*mheyUjLAYqrnL(KAfO!QJ{gn5wCi^Dpd!PuR>K#;aTZ3H_TGRtZWeKZu1XCsgK{ zN@d1vum=lBUswM-O!iI1$b0fL$jDoNwW&Jw54;rFvTo>zb*&>w3ylnePV=Ht8>eI%S&Z}j35_%tbGt_G zepmI8KM7Ki0LSv3m~&Rcl`;hdoztY7QFZ@?%Bg%AFaNA zLRc0HTH=?*Xrkj$HpI@x-I<)zA&ztB`~}n6RLqG!^L!)k0y2U94zP33zVNqgr~Y$7x-bxw!%*=&^iWp{ngU{f(pQ3-#Qg9k}n z@Ee)ytv5Vm-b4hodW=>z9W}r?qNG#kHF5Z6*5TyWRLmV@zI_3=YeQY|2fDBi4Pgt~ z(JTJ=&6MExPV0~vHW=~*X3YsQhr0)xia)h{CFH=uZ?`BII|4ad1n@azsgI5 z1*$ybqb(LVyKCk{^GKF?c^`(@RLtke1fKsm_gdd-&xQx;JBe=V1*h}6t-+*W!)(cx zD`c^!HPc)`gb}`_RJr@FhU#;ox*M4Ck#f#JX}#>U-dTjji_^E&_rA3hj*rMQvfRD3 z`rWpA1Cnrs0Mqgsxx+RWWLR~U0%!wObin~*R|h`ZT+Blne!im)-;bC|m7Zs#QpuuE zYBo!YG}qOIQ8yLC)$vcl1@f}4`kHg073uKW_V&HAqoel{k+u7Coi9~)t^7{Wcq$@j zr2JEntq=%Tn6Sn*PkS{ceI~%&KL$>}dbmD3a4L3KqD2L zcV;58sD!aQ6v_Fyq+)6+&g~mPSDT8F-fC9Lz512=x~n&g)R8a!qU9C9a|)^X%n~YP zqCAy^-mNyWet_c!>zldvY^uX6@Kh3B{dVw)^S-wU&FsM0@5hjMKe`#4KWk^=UIZ^0 zOzBxT^WCwhKFVz$tq%@1(YV8h2O&kSIkKtx?qB|NgNS=}uHMdFHCErg15d~Vfs}tj zUUX%h9(sXMS!NtsUra0|v$SWhshAtSGA=wHuXxaoYP`O0*qbhv3Y14NZTEfQD1qD*%f&ZF|`8(Y`J20)o z>Xw1tzR?zS?^5@fo!7M9*v>6{_1%*@KIk}#N6V|<(QxHyT45|a>DEpuOkI+beIuIc zH8??t@3`&Ex@G$Zok#IlDCEm)T5f?8iaXzi6NGemmecFjGq2cm^sMgluiS;p^e73k zMO+|)!w6~`2@Xdr1;BF}OTg{lT^}4-w+bgZw*9IS3Mu7jc6oAaa=y;s_umgk$j>^R2V%LnG@};Y7ik{+Droew2hr6WBGx-XUTc zKt~8WMBFy_y|MZh&U#LL2-ynOt5H32>8F69(Xqb{A0-4{AtDz6YCzlp&K6?d5w~Se z^MVJBw4Z)*BF^=z=#i%q&ODo~|P{=r&cEq^nq}a$!#hhr*dti4W>C#=YI_?%wF5+uCp~0Um8EHAA zmKG8J9rBYVHgN^2zG>i85_k9tJMl^xtJbNyO*E|1u%Qy2%Fju|NxxlLk@3GYFktH@ z8Zg{Hyt}%>)Eh~QSAuH;@I`{LC|yQ6Y=GKEQx)U~I}f|KxtKdL{L;ItKRpkfC$0fe z{GONh86{)RvP{h9QRn77DPxfIVT3zPQXd{_rg6toPh41izof1ejfdBIU|@99ZptDq zmuF|vVkZn#XJPn1l-D;8Hj%hxhR;GiUVVoGCkC0u(3{gZr>H2P?dB{2voxKPH#%|} za=**uCs`I$hEu9>)IAmca(?t(WNfgNz6tv44bKJV>0%(1_88=vyc4$03otj$#l+UB zuikw@{jg|wMq!poX=RuSxJo&vjY)Bje+koZ*@f6;O*Eh}e{r`UY3x&V_#`6G*5XD` zdm@SODg@f5ZSVv17WpQAIaMEm09v;SRI!WB|6j8_zN7vb?tFC}xj_IY1-Lli&?06M z;oJ!62A-lT$=S5^(KBhW{3Ms?_3M7(*bA%SZ)a(-|FCZXJV)H|&~?B$Ao`EMegfTF zTSvB$b*U$(L^(}g9|8u>`Vpp_b)i1S9njbNH?LQvdhBt-3U1rR`o=MWT7ZCCfcGLK z7gL7-OF&*tr5jD0K{1Lq%}eW7tv+$i!>}9f(APV;{uu~lj0#pdf^-BR2c!pub0?xu zjd8L?ws6{+`rwxJt8hm?e`5oYX*YLtrv7%BQ3p&A%gx6$f1GnqnXrGFX;uFlx4{|m zE=zrOqo<{_J}}w+mG=MiF7>%Yp0-IMpGZszZa;5^Ybo?<+DcPyA5yv^+$taE4kvJ$ zilt()WzHhD`{+e{+f|Qe3pY&noI0-)(}XzdG+i$PkqzSTS%(UqodU+ zFWIJ$!HG2iqOoW_D%N3I45~u;G~SGPF?jJM5Q9xLZkPK~A)(5Bmtahd*&?xIe2)T@ zSD9j5hOkoVHbx}#f>@HdkcuRrjF*b4X*%Iztom}oo+$X7 z2JV;%nrE+@2u9OcCx*NwmY?os4sZ#RwHNYa=pscDf*G2uEb4yci8N(YRgzaP6)> zesSHmYH{$xf+g~IJ`HyJW=D7Lhuc`fYIqqOf~SQpAa8yf0F*D>D@y(dOM0iTOkc$WN2~!@-uunL6KXO5#25NY};#Xzi4}4@H_3jZC`EsMB97Yf^9Qx?BLm5ZLLe{!Oa7247>yhl1)aAJ>=_ssyruuI{m=G4+<#>7cm1E~U+$0h+d9A7|IYr? zTl4+BeXn(XtnZh75B7bv?-O0dzW4S8`)2yszKOPpzV_D58~(d1u;IxK-)&cHxD^=x ziyPk4Zrh;ktZ&%AVN377Td(PTx%Vg9F1okcdT;N|y&vkG>-BU_b)Mb1vE!c|FLXRA zdV|bF$2VIq?zpMr%8s|D&Hnpsj! zIRc3gZNFD&zQBa&gd=N}x#@)47ioV?D39qBY*=pgPpPuSe3+SehA&@SSg=rrz)U8Z zRYm=>#I&!K|A4=s4KuMRF)Im7$36PCGx+)`Z_&WaXLOmFta`faVV7q9$`jyv;iVFUQNF|kQt>!j*2|}JVmukf73MpIh8!*f zHC6CA0=l4BsSTX*IicJlSHUb@&XuyvbbLW-IgKx0jG0T+)STMk2_}jqDWe_d%Tux` z9b1Ul^ZC+r&Q?(D`w>4uDY1)DN|y@i8ILDpTJWF!LB4)6U(~QFUqKT{gbZ$Fs|Qwy>w3?W{~&jzVBzIs9h zC~GRJVHUG-onEyRofHWKT2f*t`J6mIr&J}%lAYh+%i|SGik)}LJ(Q}z=u_eIN__i? zlFB31EvhTUtkN_eF-Q68fjP=RxlQw`iglh|Tu5E`HNL!%%1N2oIF$@eyJ9N6%yghp zKFSoejzy+iw0qo%xGI>Enz{$ot!EOC)Sa!|=Wg!A7Rhztd3vuabAm8oJ5%6$&sg`%ZWrYJ|6G05!kTq5BM zgr`*%TCw0}rYeqv>%aNxsTo(8rh={|nMy1M!=_w+;Oj@zNQLb!hl){`#+#;G5AgL% zCQ8Xhqtmp*Th1;zDc2YH@;q&^Q8rsD=w$5hSynh-;L8hA?2c*g{G!>22a{6L@d)31 zCMiZdp=&-Ao)dc++Oc#kUq9|qbp z>nv&}7zO%t$*EWCA`XF3V-@KQ?hwSF_m0gq#Y5tu>q%GkU3B&C?I1FO=)W9-1}I7AehqaW+Ry{DmJ_2(WCFuMlztbhL7Uxs5@8CZg z^e3})#vaxhGKk=rqIR_i)qRU$h1(?!W!%&L1;6Y&LUpe^%g%=BluY8XYLe2ko)pSe zA!MY@Pgm&tQr4U+(;7QZ2$aI`P_yTBmV!Nyo}$EpI0$6rS$ohfk*8fzb|EQyAOG3F zTs{*G%K|ECYQ_>sZu%%+T#mY8>;faTIOi%}AKNW-z8umxshOxvTMndL;u*>5v-s!| zPPeir6Qyhmp0qx+m^Ub-3PBi`XZ?$;6`;Usw~Q)^Q|Dg9_p&sP;7nUc$3z_1t8$9| ztWa+7Dw#^w?Fy?Lace5P;T*m{#bjARsY)&n{Izu1Y32xDy%<1lizRhN5utT6;aPj& ztQ`Wurpz*#sI)*yiV1^CvQgNJMQho~guLQxP^C+0vi@xgLi=X5-jI-{3jUbV9|-QZ z3C*Y=E`n|kCDD869Gj9~%9j`Nl#DU3g>c+K0aV%>?l>V3=894_qSi<)LH&Y^lJ9)K zP@XPI*eJ3kmCU(F8QbH0p&YD(P*qwxZ3=ipZbgT%bqiW^in3Z%tc#{~Q`y+*V!oe? zm4KCzhl9$>Tv%ZXotH&3Wd0Xp?ij6z*d1wG#h)|zx0(3%7o#5dEKVgeC8^yU5i52_ zgmQmcN9PIwjd!68&}~1}FSJij#R3LjE)odB3>P`g$5+oU`t3|sl21@}Jsw(_3xvZY z&zJ(tl3WtE+LeY<%C9(0Soa)&p_y#n#hP;pXVE5^I?6Yc3&9zTbycV-Yf7b&QoAy% z<#IJ^iR2|dI-i6HQ}pru$@!En`GUS!j?A-qXY%ZzP~9~>%_#D=tPT-_OCh;JYUT;q z0^&v-L33`wFJ?7zh57?RIS{_+1*$TiG3J6rm2}^|eEV6CUdK3emAut!RcaO~w@}@L z2Z165fGUk{#%h%9|F%$02UV0}&h3yS7fTL9WH5|!GXD$FLY9unv4`ZiR~p#;!lAuj zRT*h|X2vCR%QGdXpUv>!o%bqZNW12@+SL)yba>zOeEaj}`4Cl}D<@nQqupmrUQil= zfmFrJYZ#WX#H=QXa#2Iio-Nc?&Ck*yhxy&>y-Ft_LnjJ}sI&*a<;?ap~axoF&_wA15P3*~b&3(SHpl+@=IVvbb! zOkvqGk$DT1#${45UokkALWv$7KdekZte~}0udjfY$%1z5r$VtE&frO{Rvyv^a>Z!t z&xGdn^HFwMp^MpdGg`Mgeol%nPdjZk#s+w%B9utAo_$w`P_CJauZeu_~#M)246+EUc52(Dc5$_-0aCeSw;Dt24AO zmWj`%&Um_IaPWzi101g47d14Reau`b6K8-(8rHdk*|3qZE%7ZT^eTzUrL7pJO-{er z`T+OD|H!wW&CExqJeirfSvseg&be4k2k-35wsc?9Hq`z?@1>p9fpHPr*SO}B$6@#K zK?3^mzJ{k|z*g1;DTUf&OEF1Rlx2v0ZO>p+F?TSB(9qBQSI1cO*g_q7IdNem$P~Oe zV!EWwB&nEEQgD04b1|CYZ;an5)i(|`(~wA4wU@g?1vAumncVU(Tf61Q(}8T1O6nuh zG@ZtV;9GgAfO}^Xi90q+9BW6b6IFeYT=8KfyL|12t}l3l0cysq3Mx~Hyq`_*4PB5! zLrpYp`SukcZajGZw(8*=xe3E|L4Z~Gi?GHJb~@;=qc~SdBPu_Yh$V!;qwuZG#WLamlNW2P3RV(TW_ZK+@FEQ3O(b}b-Xml? zTqMo-mk)|COZ@Bff+s%}C@HgkBr1%|xx$>~GOSlqDdP06GFNMtVS>rq_R`v~6LTs? zQ&`kXl52n?Y+yy$mLr;2rQ1P z+8UhMWM7Bv{q+x`uT8}bv-_dXY(|>kE9=%q6P;^K%&8nX8y&_4M3X5Nby68OaRn^? z&BdIk>^{GG?G<&n-6)n15{wM~T~}Ht6aq9gtG0wvMairmnMbuSi~jK{SaX|c+_5L# zcQ&`P=aJ3aH?~f^lN+3S;yCBM8g38X<%3=5Qdh%&Hy5LGdAi^=`0}PWm@3H~x*DTu zD&}^b@qUVX^=rEZtGyqt!?PKCwu20-(FSXP>mofZo;GHo`#Btb{z>6OAE^%wHPblT z-qS9qzW9+kk~Pj~)k+7Woy|J5mYi0Tr#aI#n2zRR?(jzrnyQaq0~dvf!1BRXFc0sd zP%_OXn2H@9*^6w&rs5>m*7puJ7an}{TvPR)YwFv9|?i(e!Q4&Cg1#mdv^nkNU@__*#@%roQdp55}#G}qv zN4cRc?^*w!rznmayb;eUm{Fh+J4uEQsN5v)9?6!6!Q;tn3#Y%aKDc?kDtJ$rpW&)E zzU>4I-PD)>#5@QS(9Gfj`~U1F?8;_Z)!+9$^2TyA-dI8{y;lR~@2DAXqH=;{0w z5oI{c;L~?-09?+WW;7ixs!VoYsS-q1IGcofuf6T9c(yGB7$N5f>tA zqgghWiF32JV1b*8xr47z4U~oP>JM%qFBZ1tgTrWpf5>)e6oxYEikO3{a4;fHaSI>8 zE9`ZLao9AGxD#WD6L@^$Qys*ec(nSb!~B7Iun&##CT{>Y&M&fwg#crh8?s^m;$TVP zJJ?jr?TUZqf~xw<5W~aGd%CgJ0ekcntWh%!KKdi?u8w~dPZUElGKD8e<()Zckj|CF zV(uq|d9ME&d2ct@XRlRq1^|u8&q)0$+Eb+WSP&s&Wd)k+h*(jB&5}cG#w;Jf!Za6i2Oo3;{7Uts@#@|? zp%QExUF%A=98%A-vRsy#m1X9&8b6t>kzEo>%rGaP+|Bi{YrlM6^|8Cjv;EBS!HwX3 zeuk`xh&HKLBw+H08+=-ZtA86_eNCmD|8KxSxZ@Mgk5~2I;nl8#1e1lIo=PNSuu(CF z4OpC#K;9bWs7K+TrLDq2tBHngY{uKuQx9#e9NEG^ji*&6=XT#$KWEtHjcUS_BAO~!6!Ugtf#Cx8VgEH1 zbH@(n0kU?^_s)b{*!SvtHac7Szt}g}yS007C)IvItG>m_?Yi*C@7{Iv!nIU0$ghWR z5#R(PV+8V*k~FUXaOMj4*MZx*F0uODJ1f_UxCYl0^vyd{rbjHz#79pfaKA%Ar%$DStn^OwcO|4`Q&CUhZ@MhvtA8& z=WrwgkMGIuUFWZ&Bmr|4X^r3>05lLFU;_@k0jr;e=K16%F7gmsTfYiib5@aP&rjKKaRXKf$3D^r5nkO5=Z3dZxnCds>y0zsz13*^Cx zwUf@3OSCfC3}>A$;k7NwzD5(3|)t8naoG zplDA)8BegRCk1Ev+tJP?H9Y(`)3_5q`oO+J?>aP6{ay{~9^4+o$e5_tw3)&hkAC@Xr3>vE75KpV9UXkfMR)pj$w;$OafJn6+}wqQg@F zEYabpW}k*{zY*RLOH{3O-m`5`cpAC`U!%uf!@FrS-UN%~rCQe%s|Gwd$i>mrL#=?I z5uUp5vA009^O67DKKR=eO%NREyP!wtNN+Sv;Vv#Wr9>5+5#b7rMt1FUa5j$cAV_oP zfjfLppAAWCaQY0t)il%_w7&+OCT|#*`aN&j-gKJ<5(&Eb`%i6L9O0?UU-{h-k#d)M zr}|GbgOlHX%6ux0Agg6AeAkLj74Fd&%()JoQ0FaJ#d+ks(NfE`own7dp zj*wN$XJ#PC`lMyYApD|sU_xg!8x4!}%j_}mw z8=f5EJ8oBh^Q)&`MWN>#e+|LnaF!o z4!-we?Xm_k_QQLKRxDwuP_aay#Vc+;&-h8S^!NS@mh4&<7*F=Vx%rvu&cO{o(-sJb zc@08`c67`Z(#4b;xKDOOWf=`l_%#e}gr_cl2{1cM+D7+Ei=6>Cph^+XBKH5bF5-7}bY0hYpcWYpTQZeiEdO>_9H zXXg5`9~d@FsQWUn{C;?WH=f?stfUy@vi)8~Df-J4Tpxx<(&q7%%?oQ;==Lzo5o?aG zKq{YAEEO7rBVEKp@M%<{;T6+Pv!70^KnC6j4>C-$us+`Z4Y(4~M%clH(<=~D-ZJK6EM}?nd=-vLv>`J3_8IueC|Nb6X4%0v1|PZru0ny8 z3H9jg%GnTmdF(Je9GMQ-Y|hPKN+s!_yzWrZPO05lkTgmL1k|K|@KU{Xz@VNxw{o6l z`nm|TflOZ*#Ai26=4!g`XR)joQ%wsi5W2ILiV`FqT3BH<^zF&1nG;jrA2%*stO0Dz z#kDO8p>H2!PES?}%n<;rMa%hOx=zO-_)VL2dh5!jg|#g8kxe(~fxmZb)g}v;H+-1u z%bTa`2_MF{iLS3(Z2ObwV)guvl`V@SEcN+!*x~5W@Y!rTL5}vCXvy#BHOXg-wFnV0 zTEGb=I-^~E6~6f#5H!Mrqo;UK-E00^4T5?Ff`cGj@R*k6jW(80sud#fVmaMQc4WBc zs|Fhk?7>|tfDFBsrCR<3>2gmTKE7wLYxfF(c^BJMi^Dk!)hzWnvm*_0Qkqh3-LtZJ zafGLy_#IrrpZGImw*7L?3ZNyx7GeVBqSGc)NLBb!$eOiO!Gr5XUATVB%2^9*IqH*- z&lQAad0_UPbE(N0 zZDAR%)0ULWpuTC}%EDr#$?`56)Of|>wQ?qb27AjsZLn)Ns$u70NDA9`$613H_pLze zcP7w_1G-RzOg9T`zi_H^*Y1ZAj_~x}{rTJH48F2|1uO?gVZM>B6=TcWA_}#ND4NBr z;$rk69s(&NJatp+ieV0j781I3P&}kb((-JPq_h&}^O&6o*~tQxvLYk5p5jBE!4Ntg2O!z-H>M|kQZTMp_0k3T;Q>el98 z%hg5;Iq9!eBA5U^ShkOgJ`5@L#6_@>M_B5y;3xDi!p#@241>y#U3vOVx7V1q33rK^ zT)D%S%YLMv=PrOzjj&Y1wHN8=_D3(&){&MxjNZ?Z$CXp8EUi=$X3k=VJYDV0c+;h@ zj@Gi&<=_3s0rkT-K77vL;Y(NChK*A{SU5a6GxJY#sc{naqhY$92J;86zm__T#0PVs zVg|3%-EiE(M`LA14H2+aj*``V@BQy#Ug6Hc*NK&(v*DQQwB{?RMvcL+EQ>)wz^)uo zgT%@<^>PXnKf+QCziY##3zFgne@DUe?XsWNIv0U(9U_vYYb@Tj2pR3IgFNE3R4^_; z)~Obrxa|s@5u58*k%2SsszdJJc;!&8i z;eqZrJ!@rmp(OhnL9=Y}Qcg1jw-YN6^o&suoBvuAxNW2vn3Y~QIlP zB~1dRNZD@Of(6TTVJK{$*+>zl*MoYDwo^|UDi8yH;-7a8{tMIACv0*~=plMtLQ$u= zTTR77;apVmrTC#xb)JC}WGxGl3qB89%dcL5#AXIYy4!Yo%G?wm>Ja4upXO|367NF9 zt){D6j=-Fa@YK*i+i~~2Wm0|kp8wo2cQNsedB2BLwdtvIc2SQy%}KvEIOfmRsCT1;9M6hOYLZ5K@M8m)s!dHC&iH8;_~{HvWwOfwME?u z$I{{mPd)MVcWMX+fH~f=X_vEP!s_C%h&3nkSc;DoA?r)~?Jw-`+YufZ?spCE?z;v) zht>(Wi)h)q=q^(C^{6Hp?uG@C^L2uXtlr>;bv;6c``snJ!K>~SfVy_t2quT6+TKRh zSZd_Ln40&(D>+J5E&o&T4_@@HKyGHXRfCV>ekp1%rkZlI%BUO*KN%&fmfwM|hL^4PK)oVVI7%yD?+0hYus9nY z!_~J3R{+%cjNHL7)7!yPa{E_T*6(wjvXuC>a(*(Hq@r3%7*r1f5N)XY)X@a(RBsKh z%x^to3&09->dslA=Au?z7R+)` zZcDx58tBj&xlnXld0mG9GUZxO4}fTcDNd`87sIuJks3lystkfIy%yASW-fq?E2oTF zf4**I7A!`FH-n`JpPZUYOg%I6=>@2OG{iE7{aj1hM!Tnx3ji#gGaxqEyzKXe@~W=_ zOLT;+KC(yfy>H8kwBOGtu+i;puWUUR&S28?`Yfik%~XT* zP5ox~<))@YEu~vOR&1~YAc@zJ=-C1|lc!Xr4jr$qC98Ko;JIj+0QJkdcB4x}f6%h_ z)`J#Ty%2ZdNn4~6V6<^>Rj<7Pj_=i*MELI$H8RQj4un@_Mlj#|OkRpNn_0nw}4C93^W7!j7mL zAFWRe?r3X^0*-9Ry4QtxdKq&c$4IVIEfxvhWgbqJ`ok`CWrU~hd-`s;N`Cxvdj?nc zv?JTzAmSumOE^+_8PC{alzLYm-t-YN$z71yWY;9c^POob=DAQ4| z!%kJ9C?X4A7dOLuc=V=~EpxBuz{lT72!Z-cb@$-IH)&JvTRx`c&mx=^r!U+faGxdS zOhgMF!AYs#c@KWPheHME#rga2OEOc1coXQ315gaK#Ep4OXkBQI;v^Nr#POMxg^Q0FuC4yG<$@hRVN;kr$G|E}N_R%AQ$8Oa3 zH31}`_1kKME$K`rW`92W#O&v1@0xw@Y~A3T zP0d<|sZFme{(Sw?kG1Tk#m(zKxc59RK?Gr^nUtrEzgQG;SV0Z+v#_zs8;&dvxsHvEzno7r!v}mN8+>H%5-_8JjS? zWLPzP$?&non-?34=|$@>UXhJT#VBS8a&Ew2Pezhd7=^F1`KrH9I6ag(3TQBWA0E0E zwGS*Y5gsS4F+AJ$_aZ(lJcSs7#EV$M38wp?StD)i) zbT+Ht7SU#5yMn!J#W@tb%8DK@Pxt#B3F3MMXW@c>8Af@sqQfE4NzoZtN*3Eqg5Upf zU5v%jz^%n%Ayp%~O}}u#BZyvTyE6pk^UHS0gT*Wi`3#a%s5XO84y0tZ1Kh5qWH;;0 zM-E0e%CBJyfufHHnbS?en@j~P^tpetq{|^`f{%g97+;{2%=Wex6%fvTSf`JmrnpfEJDaC6WjGbG?xYlpa00On#qhGZ@=}t; zam8*bbt2AilG(^3LAit_ju8Q?!|S(#&4N0wh5DIem3BGNisW21vnj=FMZvdh&I94` zF>k{rG{JiVkjL-To14lUAF;$M?qoJ0m>ejdi_LZ*EY*|C*b1JdS~Z2w+>M?(YV>vA zr_-~MHo^F7WUP=?sz#p5>U6&AA_^=WF{N#plFZMdP2P{}dbXgZ$=V%{kt{3B)zt z_c34I8!^_+mGae!Ax@kV=42GOk9n@6TO;>-4rHl0vhP zcZxKLl|{=|onGk{2}{V`N_LFabk=O|>GYDh4V7!8w#DZ(H%z2`m?yJjW7ATkh?DIE z;i*Q9CKkU0rD?M1WTS}Vb;YL0*-Vd=_Wev36b^^6Ce!ap0%L0ur431>pLCF>DV}n% zHD{?8#m_P5&AEgXPtgraIKh*p2DRrKI^9m1iTDz(@Ilh&s`J9(^K=I7F=C#agOyzg zf~=QzcM(0+=5kn~lL>lRQmP6jdINfHD&4LD5V^;0wGd`AH8!g^PXVaA&6Fv-iXM|v zD(rLW^r+QEFg-y@hBNNOQm$Y``4w!+6YaK>UC8-NS?x@5oxW^S4kkeGvxu|_6<*@Ha~U5-0yz3~T-_+;Da#<*4}m{Ot+HilpF52$&vT=(;Rho#Dzv*uV~ zAIcM8my$x$O!AIOq0?h*IoK)g(%V~zG8W0#jR20{@l*o(fs=@Os)?lCX;#F5xoT!j z=&6ZFu!<4xR<>i#bbEjuK7*trOnpbzQ{tNqEb40%tbM&X4VkuipS|H(q6n;FX1spA zJr#E}8BvDZ0KwUy_n&G{U^SABP;oo$^kjSd;$Q2{F^InL%1)t4g>$Yn@e?FI-V-{6 zt04tVS%`l#n*5id=J71-mUziyYbq>e!w-E`-+$u)(S-S0>1Z=)We!<&Oe_|Cz z!9%sajdDe5@nY`4cAYMFmI@@sNTpg|NGlE5_GQ%3n5!0*^K8Z#swzoEm_4Sqr^*tP zIFAbsItZvm%={iikG7)><}A1)a=ztvljMetNKCZU>vSxUUV`=E99P-wE_hIvgZC73v`4aBzQ);@a|U{ItZ2pBp+3}# z^A{tgyyHnkk90Cn)I46O7iA2}lIJhhH}Xh57rpFf;=_3hi#z0ECLIyl zS+I2+*Xb#iAv5*}Mdjfu#hqbpMDoLNCY2Egp2l+_zfZD%NpB9Bkr*54vsN7U2r!!}NT9+U66im@b*&7D5wkBz= z>&VN* z$oH6wB%L0%Fj%~3vR1uPp2%WjXQS=}J0$0pmQrSy)fG_!*(>#ZZS6NH?*5tHJYVr< zDmHs2FUHMDW)7uevB69x3Pny*mY$~|WIDwwr&04jC0BCPLxSCHO4mc?=^50SKs;>4 znMl3ou4Y;}EazP^=Fakwu3^}+3Y1kg0S~8BnE0WGPs8i^O0D= z+2Tr

3Fkxr~G}5NLOsOe;ZVlGW`?8bAc=??(ez)hc@IDVL&P=5v3(4*en-;JrBO zx5X_jr_H4B3H^I64kio0-0p^rP;4T{i}9yX`!EK%k^Nj4>Ss7PiVk(crlU(``EJKI3$mzo_#D{7DI zC_zV>cSh<|hJ-kLZ(mUT_k#gqEfrD$ApGV>%gQeGk^5KvqF%jg>Tt!LBnxRt>jZeBh3YKfi16;@z4l4!TnU5h!{sYLoqL zOc5!%SjgEcNlJa&eJckxj*`_)_e>nPpV^ti$9K9af9F|D({I zH&6|a9cBj~`{)W_U@Ey%T*9qRN2KIRwL1){&V3x_XoRd{(*lYN9K7x0D_5PeS1zC` z#va4MOl9oX6JMQrzY38de>~^LH!UA)L+;k(FsseZLUJeWpgSemMk)QO`sB>&S*qm( zn8ij|8d@!;8b5N;{NSz=U`^G`vK^Q{WE=BDc`}7pGHq8qB1G*uQS;L6P`~})%EHD` zp8EWscZ22pPfzR_TsqJUjxcRqkc4b~NvAEUkhw^#p3N(nngrJGAXvZu^jYv>jPlec zL#0ESOJ&C(@i}dMf+P*=NjIY>yT-gC+$?LXBQ&J`}F`W`G0)pF^)0MhF30;XtRle0tp=YIo_^ckBBmM;I; z-wgY+2?F&kWU3FfIiQ>~*AGGQm2@#x4j0v{S74Rj|IL+++s@oXJ?R!$b?;*<|5uHU z&SNY0Y#LdIusnxyum0A`#{XlDK7G(SxO)37G03QRd?mTvFUR_t=iTp$^#PJtgxV&? z6dqG={rt+#{h0Z6AYNx~31KetMzz*^*8dnXOJEBssH8@*ceg3l$W%02mA=GM=gE7Cl z3d&Dt@oV`W777xTQmjnZ%6+?~q!zymJLd>lwHWTvyf6@)_rvdMP6u#$X?fcyn@Pzx zIGVJ2WmYLz8{pJNs=VN7aKo+Tsmt!CwyS&b)}}i)d{e6vp>@I0_EI7sXWQDD8sC>4 zX7uw{zX$u+C=UXuFM<<|zia2<&Ch`Qau2v*`jA0@JQvZ5tJ(Ee6ng+O*Oi)j+xOw* zSxZz6=XlOXWrGYq&_)7|)Fl`RI_r6VxKYAd5g*jwpc$b}YF#v zf2NjDk2cZ{Uc;+oxX1;`Bw3B*NcEv-H4ph(vbt|)Sa%9v@*i3sAo=O7Aj2^{KU;QF zq)arU4X4T1<|65gnt2ZTFhW-MU8o#<@bA9|NlefGaOGS*%sRbp>e-nG=Hj!<3l~jJ zf$dS{*>*xT{%HJHYVstUFu_W=)FX^8bKX~TrEyl>_Xlw9+XDflB*v_2eKSW8tOFnkg+Dj-m5@b*8zhP`_XevXzoPut^mjON{P)hKeJ z9aBB8YIC%ftZsTQq!SpQc^lj?Ue$CAWf_i-!@Gi33N3l5j?>$x*{F?=uq7x)05V3X z>hsqCT<`;tf7&(p<)5`6U3lFlPtSGPpD;mOY89&JHmMk0FR6FE3>(vr{u}(OBRt4; zf6LGVzH4yR|3GIneM~@K(4w)BrLL3-`<%8O-;0?EP0qo^5vqFPSC2qU#F67W2isrK z9GIcym(LPRcNe~3`$sqPWL^UO1G)Ae}XsY4Xl%Q?9mDgZyiW~g0AR3+uXXz z`Pp|t=1~qp950{w+|-Y>=vY7aY+=mvr^n2)K6jgRlZBj+W*SAZc*peWR`q8ytB~cn zmIWdD6&P~i-**k1>sMjO-170)5^Y^h7IH%TTsbaT9eIaI6SJ2#n`!3t5Wyp@RQ|sJ zJmTT~4*}-GibZ<>C;GTAR!@c9SrR&PaB+mH zE@MGdaHKH}iiADz_#8+;ij)+Ykuc6!3{?Z}gb@<%K0XT~M#x%nopvICUw-!nP^G?( z=GIO8vte%P*ut){=jMo6-%L)sOAix0j&FgvLIaf?l#=(w6-&#*IRsi%pFK-^!dfcC z%MqZf<@aqHa9g!rCYO(Exu&Sl98=G={Dd9Ly4p2DVoRps)#7ZLe0?nFNF()_4Id_4 zK>g`Ws{qab@6cwDi1w9=vj)aDJnk>D{V-2g1@-=I(5n%$dXnD>(M>TZtbYD>U3X`l z)?M3}OP27cy^e*OCT|%N)u}BogQH}vKFN_mcgrgH|M}(PJ3%ohQ9@#)Y%u5YM`FPg z4b?H#cka*>vzDsmTCjtuovZNS9hXi$JJ`4PY*@N50eenQK!TDfnzV)b zSgRSw#H^^^c@d0$gbdZkrr`#VerC^L%f;FRz$^S((w?=>G#nTe^pxGspw(5!)N>Dj zj1e-FWr6CK!`gwz53Ir!gtRz&P0S{DeAPxSl8Q3g&$g=T53NEt*a#1OO8uy=?ifgi zRv~Uj%Y{Ts$i=6l1u~O%RD^g(G1hS;=C*wxW|XJi{oR$LgO~Qf8qn16TDl--ZRe7B zywqz&;x#zra;oQ27{Uk{g09~V>rkuO@uf>OH2|#3ai}_{Z)I2)i$zVna6MqfWQCH{ zZ(IN}MyM)3_&TUT%jQ0M;i}WHbNA`r;|WtPXbqWd9hpufLTcmi>Y;_TL#&82NEO2V)lCa)dFsj72O${cMs?@l;r*~D z>O09b>n5kCo&&7oPtPUC@!5A8t{LpR-a5>!Jg()r>3806+hf6mWF%ho^tv5)Nqy3^ zxvkYd~q5@k^LUix(n+@OTj~1f3DNA6^N$A6k~ir)|D(EIhRu)XN0Hj zd*(twoZe3F8hnt_1cjH6Ysrr2F5KywA`}+#MJYCr^m_U-8uztF;fNgJsfJs+!z_b6 zgD)K&P9a=TwB$mh!AvyfD^f~}@7nDFTLjm7v{k+J2nZTsLCu~AuN?g1h_)ED1V=O^ zdy~lVm?OfI#z0lDfS~~d9NaicR!_(Wv`o?OL&;P#Y~uMx14c5AtVs2kzB!-Zj1OD#%;+H{qthvV35#z@*| zeq9p4NISUiJfl@PyLZ>1&S=VkQ|`6gRI5z)&19O-utC;i?Gr_$oQEz4<&5xD!-5kI zs%xHti_;aa9aQ`}Eg5LxvT=Iq*}3%OjDgoKJQ|obtP6lF(R=TWSxYw3U16-@hQnd% zsmqqtLyIF+b>F}K65fQL{AJhRj}{pHu1jDN(Md-+Oj#OgC5e#$R-r7q`hMnyevYsJ z(ds`h7#KaPX)Po1_-k2_{alcB)`CRO>f#~hfI%}L*MIV9y-lj{N%!^Jh2dAx)2w>qt z8C*7T22w$hkn6eC&5I*E?RC>jUp>shYpo^A9M@_CqZjuLE=45iRu+ae!h@wS2iw$V zs(S{%VYQ_IGj!SM8A@~-F(=uy;7}8=oTu&jxUO)lZrM1>QV~c3 z-f?_<_xSkOFUP(+_RnMYjNLl6)B>Px``F>Jt%k(xS_8{V|=p@nxYlxFW-h%Q{I;cL(TY5s?E7~pF^ zF#E3A%4~f0=3PH z3_s(Y!Dn{QOiaHty*mA+>5otU^>kqYZb(tNkiC*F4Vb(zHI@gcN9E8Kz=|n1g`qV=f5kf)b7(CWpI? zc3om3p4?S!^jrwk4OYZb%KyOYbEkuru%Sx?T;w&_Q;*_`qZLW|BPq|f5 zjNUYXZ@&h$Uy4f{0XVb0sMFJ{+eLEx7Q~3>G9jEMiWMIp&Y0uW#V9U|i-+1xNY1GB zl|(ku@JN@_s6Vle*J+LCx*mVKrwAqUSCE*P)MANRH5hh#3gG}Dj{hy9M|-XgA%{#$ zTrca+`YOVlQD-nQu|Lb&}1@IZpNLNaII8g?n3lPtJx$QbS?sb zeJp_M&)Ri*sOi8xLZ1mU-VE!w?V%$k6 zQ864NFRSX!JuwGV8&YBsy5NcmmzDMAj&hrH+Dmnz1mPxxa4GWhbAbj#?u%YPa%O@t zZ%|m;`eXEifaI=X#dgRj*GZ;cFim)LdW^PX;L8@R9v*@!L>z@xasjAzLD*RU*tXOl z;gs0?uX=kwAHqB(uAc|&QYs62r98QmJ8- zFcRB?;_f&W07!94P6=kYRfd3<-Q(;An|k$~4$l%Nm17lLiQ5WwKz?8xnQ0VY%1NTn zLd3$sSc)X9N?$Zzh`J-k@`Mem znjNK>M+p0x682lYd7P`acykW0A3bHBTKB&?+2PLw!9bKdA(yY4ZA7EWE8y`{T4ieANhBsOhpc2ns^nSs66>dp`HOV*J>zE5CWSc)1skcgVe~;wngkBYIlu}7+t!7U- z@>czD%w>Eo+-nR5qgA{Y_v5y2>+Qo?mI#!q=1kUJ@>9%JDCmsK1w;?-7YJ`H><&l$ zlK0JedlFmfKsAn}+3Haog@U~OZp6rjd;zSM#bhF4>T|`+y1&!uff7XW67{lRZ3Myh zaQ?MA-Os_6-8U6w#pDbVh4ZF$x?ODI5gXlWD)DMM&b$7M=t8LH#Ut)k#<7%%V~zrL z@ZS)F=UP63h$qTLN3TQ&$T$j9|`b|WM z%9`K{0D`g|7tHTlr*1O7@6zGJF5w~>D4ycphSfjXcqgm zPMhH``7fm5j1JudUGpLz;nrTis5IME+n4kI0l1B$U_`3A8p86AJpkyPmho!uVOFCzIK|Q zMCAcE-q!24xCS2S)-3f1J#Agm+ha~}eLH=jKKQ7UB6Zo%5j`yx(nMFlyzvNJ@jIEb z9@gpUkcc%cK|E8Z3cS5EF{9H%U4?*3C(de)@+(e?LUDIo+G_1!P;95-jymjCQJ~+U zw_mba+Ck-+WG(@r#d~ZpLLWn9c!~&z&5{( z#H8v;J5h-k8}*F4CXy%sj&9m15sPh0;;~zu46_Y z>6vTcBYiDPJ^9n~0VGR&9Ewk0yZSQf*z?z|4vSA8*KmK3&WO=+LrCJWYoKQ%JTSNN z7vAyM`?jmUyJqzjByrQVFjP<*0|Jp5A)YTdI~b8H@!eXImt9#T@MIDMj_}mw#{mWQ zu0tVb`;WEH@hy@T6h zno}dQeB1=TM-GLK7>g;SiwmRx>a1zCQ0jlj;rF9t1mEYh8U zUoG$OC!p@43;+doe-|K_Az;O03`DcCdeil*=WjhDcd)$UgHQ~T%dBqNk&-Q100)su zXwU?qUI2ngKuk~VWL6`JxKDEBG?dJYL9yC+ zSq*&=OucW1CTE?giF(~iZU>5$Q3ILPY4ytd>V|D$_!x+nxrC>m!u=hnaSL$AA^fzc zNma?OE}nI!R^Sj9b+iQaun7GE00cmh1V9421Ar7nrw|`_$ zb?ICgL;&nV8RBa?emlTUYJd;8x5U{)M%5*+p1P!1r3f}$X|FC{xD z4&szFc?Y(ffq94RwhQzQ{kgh2yZN$p3kT<}o=qAqn|fg4KgK6#-lf@Aw;R;!vDJy) zSHj{%Hb5wWQv*=zR+Fj84XV>GsrPijOEE%Lk8On#2H@~H8ww9-25Q({u0AcppJE*; ztf~mP773*&>_v5X8CC_=gja5ar#^WM(v^n}3$+P`do6nAD%f36XE3c2cpDFyNeg(O ztm?k^L3rPWHf%0yIVk^o=y)l&b?1!+Dv?XLs3@xsD^mwKBP?~_*DZQz-&g9OpR-{D(Eymx z22zO!tu!Q7gyQ)u<1G2qPJi{##y3#!?*G6)c)1VGKFuL{1#|=LA5E-jc}>n% zRk{)UcB4E9Yybe|uidB#0au9zx`a*>A7)E)nB;C}vQ#!$mWD#MsGq+X4AG-J0NeTT z(ZSAJG;202XD0|j>nC6BHe5uAYe)P|#=++F^)vr&nD-H$dTdV?=KYHR4qbbnIEKxdHahEkl?9?@(TTaZ2x zDggrO@ZI|Hd$h&8mZu)u52y%$n6+o%e6RMB!n>t`S|LGnNp_OB(2C)~n!*Gk`f4`c z1cF9*YG~&aLX&&{O}dIT3@D`HtgY%Vl47IbFo#QpBwQt+LkAZ}$mkaFz!vZj|8aTs zbeL~+-NJ=)v58j=(V0)o-Z1sl_@TkRCw_b7Ffzptk3dVI7Oqi!A{1|uf+=eXCe(dR z*au$tJD9{burP8DboH}42G;j$`UgLthE;^TE$~~+h+7NROkI&meLLDu-g6B6W^Z7H zKKHGw2fsK5FW>Ih5SIeHWGv!<&}=MrO@+8wfQVNZ>j+up+psxqJXIig>jyz+T69qm z76Q_Jxm)rHc*#X)>1H$P45K-`?r&f~Z)83G*wMiwf1~LgRwW06L93F^HEn=k8?InJ zd({~26p)ZP6@-lP)J?q)Ts5eunh?-P;Iu}V7{%A{E{nAs#hjcDkVpviK3D`JJP6eO zs*X?ackk0zfe!?sRnRIBWtl8?f+0T?2_gH0CTOdA^M~MV9p$Om&whR7;AbC#IGv4+ zq}gO6Wq=YgIjw22h^FLCcf#{WSWpjUBfMIFei7n??i{*#=HI^VLk8bE!|n6p*u93# zd~n`0)}P@Bmc*=uHw%p91RpS92baQ5)R;_TM-ude^u z`fo3kr|)0?`SnY8t$*)KaeaM#YQ1Ish0|X%d~f;(>o?83JoCa>X6CV(&rEZt@duus z`tsB#rfwf2r+QQTlxGT?+Br2g`OC?tCcilO(aFD>Y)`&2lZM|I9-jWg%m?ScKIU8e`Qj6cpPz{?-o5xVdGF;ph&6a|wY?|ze@RfXpjWR*8 zP_2twk0U9RSo32_sml~n6hldTz<_dtB!z|iS9{lFqs3l`PB4CCoCa*YBAoDrR=XK( z#*0OqH4gx#g2> z4Uz0C84ofm!)MHrw@Tu9bB}=RVY{caAK9&CSELV_ep=nlO41^G&D$Q*1#wssW5}vP z3NJk(?E#z{$?0S2ql!lUi)kwQ3N6I0S8)aJo;#t}Z<0(LlM_Dk5hJ*Hr5F{qXdwLZcaTT&)$<}^W z#4YAbBmvB2y*4vAHMXC~;*kucR1 z=9xne7)AJUKZgbkZsbxGAa2O2(-p55ocf+bHhfk*%(KaUK9gRu<}%KEksNo<;~~E<&Q9LP2+13f_m*`g(9GeMG)14CjU>pqA%m2Apk zlS>5;>DZ6D(wUCR z-ds6A12B}9k1A7%T#PU;HN{+CNvHiBKd1MTiW+TQvnAE%L++@UzlhV@ldd2Z7dyp7 zhPPO{1chwHGMVu9aGFoFT71>QSja8^j@pw!3ynotClxRDjZs>-SYJLQTX5kfJW|eh z+P?UbpQQAIowO&R|D>CS%7=6bfJZ0ZmiE)nQJ4Hn95RC**s^V2kHj;E3|X2}*I3f18=m5Fh*(Jskrut$#UD} zO$77Ic^xDMx3gtBYEQ}}!}`;?i}eE^H+Kj-!+NVZiJ%?w_6Kz7IKa=~WYp+Q)YxoD z#=e5+SXRj59i``vrDU8g%7^s*4l}p9M1Uw~ma2t%$jM4akzZ0a_T`W(2K6c8!FPiD_S<#A=BwNb|Tb|B%jrb-O9 zpzjPuI>%zBP~5}%J-i~3JHEGVX?T01o9rhw=wp6+1$>b=*`n14p+KfOTUGO zNmpr>(WQIHL}SS#q#9OpknRYSWbF3cw6jDX*{L`8M*NsBSg2P0iaX;q za+)J{q1Q-xwUWXr`Z0r>!WYo!hk_5MuOaHT@ic`uXS+DEdHSccP@#m!M#ZsW9)3(HCUrEw~Nf#!&V z<)dfJcG+T5e`#>C-t0vim6FL$)A3S5-co7YbBA8~@I5B(gId7RVk| ztT(;kn44wdDBwm?qCLDM=3-F4OYShG_(iBW-XjT|sU(y#rHGya8PktVqrY9kd8l<> zg+Ku>RHSL5_O2R_5p}s2FXzg1zndS6fm`IuC-*GLzHrwMP+g`TIHuc$G!=LO{laIp zyRg13mCX0#v^UFdMA#j&j}Uu7kDm7-`b)u-KgA; zx7Q={sUTyv36q}B>T*OXjFoCZXDbRg4B5=SM|FBkln6LAZ8a;OXc#g4+X!CZ`gMlu zXK$K0F*!Ys&!wimuh|{nUhoW!v*FXmH6NpPee&KH zz~ubV@9Z8teE%>A7VKhiuw)?HOs*T{tVA?U7n!EXn6IC*t9%^nDx*Bra?=Z7SNZrV zz;l8Xg;T)en-vpu*Jcxk7LYCK^Pd1y#t2V+e(r(;>R+S9ueDxm9>J2ug*MNaj^>z_nUQaksU`(9Q z(+!0W-V1Wp@>JvYA46F8PyPbnz@J)$aupQi=Yx2|T`spG4tGq@b$RoBpn_4Jiaq`B zM+d*WPcycG{Z@knMn*f)*A7;2tN>-bviU}+jf{5YkAgZzSn4CfPAKp9g`I;Bd{i@2 z!Z2Qg(d{Zqw~eO~RwyCK+gp-==JmF_p)aF6DCY31ql4ev4MI@v<+@kaO?(d0o}QT_ zXZQK(a=Muw1@=c#Kh5UF|Yn#YTV zmWu--Q-&>yL*zrb$OR(9K|~}9GB`j)($#=UL`4L>Mo<)y`+IktN+*42e&6@xk37#_ zr&sM^?Y-At!@CY4CtjR!r&`QpAkYeSJVvn?N9?+; zG$U+0)XdX)+qy!~O!jpusJZ+ILfxtJ<5KJn{uf*BXjl=zd7H45gK+i%BLL$RwDwc0 z&i+3X*8Tg3wynBw(V`2-(xb~q>L=VZ{L7(FF8(8p_&9Cze@;FaLWQ`qfF`k4D_rrO zEIjdp56S{}(_@EF6ZgxHA9B)~x`6lX*W{gawR8bVB;=M(Nt&5NTZP=hL+ef!izTw- zQ{V)jkuCb!t=zqmmv0gg!w(Lj&hF!fMgc?~YB_YME$h`YP9xHn10hM+Xi1ZOKZ0R( z>l25NYQNwoKmfj+Az!;@WCPjr#39{>B(neci9_VXz=Oay{*0nm9}m%7Ef?GJI6LvM zIP3!4GJa^=3PE$v)5hKS&|O4CZhGoaaKh=$r|n*K6JAnUU68S7EpQC`+H~ZoqqrcI z9DXLY{r|5HZZFHe_{^bI>k)7Sf373vFos(2SGU8+PIcfUD#jjdhq3v&3y zOC|gqob=-lorC6&58bxF&N=5NAG&jTa04^fdMVsMZ}2(P0ruydMtGW$HjROI99|6m zx}U+@jM}{)ppsud6Wj6sGW4On&m9^XZ!Quw$4(pYjV70zF#N*cxg%U;`lT!26ADe= z9HpopJs1>$JVETRbgRkT2XWR4Xgyi$Rrp@^bKF|g8$f}IdH+bwI5j0@_1U<>?#Y>g zOp?6Q#cmch6VX5K+rbrP`!0zz{+_?NqVOE6Sff>HOnaJmmt;uuc}%6C8Cj~xw0Et) zaTE8(^WZ_RjU@Ir??`Y}+@**#9kbYMp(f+%kW**CLeNT%{9()KWMzA1Be!>^-;LB< zHxyHO1pGDaCBLL2scXwfJAMH?1kL28SHIG8^`6N6@CAD9$fs}4fQP#0Ck;;}9AQZ? z;f;nRj+Q50N~dmc}cVu zD@c=5S_#~2pLrRK1kF7UTfhG4jbA{l$I@Sc5t3_T6zitfBf&<*{=^PjPr|=Cv|_&p%0H9f86zu}{$uIRSC&4tbpO&@mQJ6b75!vs=7igp zPA1j(xhu;?YhhH9keE6>6kDu`HaAMd#EE_&?co2yzFNnUpeVe;EsWt zL{kIpfe5`4BxJ`8FAeRK`|1tJWT)E7SdAHrGVgu3r=liI@j<5MyC%#i1rcPf>W$?bd?bHeCNSETt;K4W+J%VC>z zi1!yIjE01V&6+$u;O05KI}MqYe4uo~s6;YBTd8W>74kyEA=|;bLlQ=X(GqIsjGlzf zp!TaSyq*7DM4@|Fwbfo|B+b=aTBYOPwh05mP8qkR7L{hLGN~rDitS65M^Tn`qPe`= zq1H@lPvVEQGohbqG}v4%iaAqzb*yY`oQ`v`y%gZ9gk% zRvaCzG2xOV&bfmB1MO5%ELA8op_H=5dcu)a>3(~-sAXN=3hT3(js94Em^c0;v`i!? zEhenFkXQ?>U#XclGA1;wXp#*@0bgoQ$^+>^-Yb;Yi8@1K#;rF_Hri#Cv&o!$IzKK= zTw3)dbg@R8G8&qV8bb&MT0@!io_kbWVSgbEdtTxz#TmmK}x z6v|7QOsAC(vNoooSTo*dZ*&z6^7_(?g3d}MUv?i;iiWRuw49qs(lABPQ8p_U;EUDMaWrzkigHHrY zsMRIlJtnNCP}!R-x0O4d9PFZB^a&xCll4fF0lU&^uE#Sc{Jr1qwR;&^rsNKWqGfSj za#4Spm9=0+64zREIgi7cwxm`)&VR2g`Pz)u7@drkW6D%3!amw>FU0dqu9=DKR7ecs zx+b!`f3PYG@YJ~*L30eqk9xa&8SlnUC^NAd>exBFlQ~1O;bJ7xJ|lG_z$*1^tI8a0 zG^_C)y#FMjXxsHtS34gnhb0kvo7wO-|GmN{mb1mOQPm1dCj-Uw&WSZWfrz&hvKXA$ zIT)v~2b7i<`rm6i1;&*XXH1H^1horJp6a)=HV31{jgY2BB|WodFW)XNii47hSKXM@ z`;@TwPVk1igxpd>iWckCYwIDIS(RDEn_Lq+<*JfjW2(gJ0E|vmQYsHGpNL=dmMmr_ z=kc_YzR0;Lp1rKx2Eu(gpSS3=MV~=7d{_VTtfbJ14yldTOOWR1S=HjZ*go{%565wXWkdq)N4@tQ2Fn@K(fx)M1TC zjGm^W3|!AlIeGp!`#-C3XC?KzQI4F8w#}_v`Ypbl&A2*JM-7!D{noa(tX%p`zddc) znPtlohr3-#TC1_-iT!OSvB>gLODqt>ZN-!W%2Pc2A4sG!gQPTtx_r7=I9JVYlkx3L zN?eu(I%;ntgMFIFpXThhM>93nAD1Ofet*qql5csx->x??thtgdu{*tX-1@SW+jxSw zma9n%Rdv;-@khflSZw);5GVbix;L2*huns2ExP6N{m&E8IAaP|i-`*Bf-88KPvDJr z7r%QkDNsYXe$FDwE_wYhn4N6GXIDzq&0I7&aDAV^O0-fW9l08Ag+J%c zOz_Uec#Dz4!z4+R4eqo;V~=lI#ea{`38+JcxEuZ|Z{3nSiQhx{PR-UEU|eOLeA*K$S>Hf-+U| z0p2MQuLhH-!GgLTxTx*+LVWq3`rlitNolHH&R1M%Ny?a%^NMi1YLeC@il(RPvnOfyVOLdTFx4pQpk;4 z@7%zB|IgGAKv8?9V36Sb0nubOud#-u%4i3EP;<}zwwjE-1~dA663WWG-A6~6dW~X` zHDhX@l5MsdiL?RnB`iu$Q?tx({s6O#fCgMGcMlL{Bd2|xLdKLZD*pEs5lz*=*x6vB zWNhX_sotnolh~`68X=ABkGzXwSa03Ao_qXN8eS<0X;3gYZIPEuP@hG>qbieisghI8-qNlmpMMi@D*_rh^0&`X{4yX~zWF9rqK`WC(M3JM z`4t}cL#V6x$>DqY)fBN#6vLM{9OWXdW=5i9N`+d)uWBbyc%07mg?~dQg*3u&k6*-n z;cwJwf`I~1xIa*pD>$WLlrBTL<}Lc{wZ0tw?jKk(0S!>q#ckvj5lYq@|4C=eGktRd zjOsm;oUNEJTN%48qB4bjCbyq_?MH{!kmc`ykAMU|0DJ;C<4IiQ9q>5``BgRWN%i>X zWv-^2QHGo9w#w_(hx+38op-@VKqJ%FM_|yp{kQA6b^ih*R1UwnJ!e;oc?;@}Hy(i?%%_ke25{-sQ~T=?YMsOUw7`Y8@Z}N}Z#3<3WNM)(8*Rk-IZnQX z-Uvv5^P0JYd+M$J6j$e_xM}x^5&0Jp7l9{|EoxB3n6A@j-vbW;4VG-r*`ze^yLG^N zq&~JKCANH?RA6ta_i60yO?_Nbt|4?`A zBQ$dXz89LW_aAd}6bgFuF4k={My;K8DBhQ#wQvcI%_otsRo~mr)tAihPPdO^aJ&$@ zJGNRx+McqeG-gSu8A|bk%MZ+~ULl~70|S>Lg=Y0Fo4IEPW&k^gBnk@O%4e+=Q#m+E zqvn=PS(jKXzW&brq6mxxG%|gr8TQmAdp2_a5>ZC3>0OKFraN2nGf5_)%DIfO$sk+m z59+#6FcQ!JRaEU2uiil39G&T>zbzk|Ifd>KiiOG_2G9cA1!*Qxl}2PGw>;UmHt!e& zM*)rOzcaiI;OQH=uMf^(i(tcc=H@DhNk#%2I5PctJAub4psqGNiO2rT=_ z2J9qEGzv}56wq0scxm!19~lA5(tH{+M*a?0-u?$B$mV4;{bb7vM`up%A6!cTVm@@u zsCdLO92G5HeBTMbq$b8A6w7|slDT=Xsqz(*M59Md6Ia9_vBJZth7{<#w{NAjm9C`_>YKAAH3U9T=BJqau*)fg@719XvHcshNRJ%8E zw~fy@MJrj>CaF!fn=&>GCCLb0JZ(eIET$3@kB} zuxc0@4U^Ny$`s^dn`cnYc78M2fAF{ctfJ>P&kTzAb@Q-dPx}6+9^RqL!QF z%}OEPA~#Hc#|K*7I;YG#)9}8%c@9E~zH$Emmz)kmg4GiLjX*I8$Tf-rhK4 z7twB0AY8uN)}&Q7CDCU6nt;~bjuezcc@q9!*h~&ybGn7&PMW!2v<{hu-kii<@B>NP zg2Kfigmt9h_dR9ij5Q0Q$%h*>uLP3+G{f$dZq4n>l^m z!cVq6ZixvnG1cwiQak!o!ET# z%&PT9Ae{$*3|?@+RTpZa95l+AAfvO#BY5`A>a`1gaa>mCnf-Z*9-Ws^A;dVmaU^5< zWN=WXfy~}?6aW+tp`SQSt~$=&yYQ#nO|A2h;c1T^T1u9mH-pO4-dsEE)pr~L3tXJ; zmZK9!Xjz`;xJAw?j{);7^eHL-#5tGodH&4E_@#@6UK$)6zGvj>QNQTYv9kwgj=HXg z`L=7t+^LaCyOeq+1y8)b9Ac6{knT;2QZ}<{g@DGxNZ)hytDCu7WOV!E7#jy8{^~1D z$!#jBspGZSORCnS2~tN_=mv(KoAYU?FYrEe#OdE}9*9;=uU?sKH?W~- zcP`tG%X~hG>|-yW{>Ybr+PR(HF!XpHo#PX0>g~FYLsf2hQPj%hbBLAF=3k zFc>D1mFkov?eV1hbGFKejtXexu>ZliT)DNtHsn>RT@zr&%awJiV986Za)qOsbekhl z1S6?u){?Xq*W-K|x#_KqxE^U>*HhXVJUwE$sJ_9L+%8o?Dh^o;3I0zn($9>q6w**f z_zgAp6+M+B>+~)P|I2IOc4yV?@}g9jS{Jqkw7pw(+X_J|DL()J+^Z75U&|d)V+hC_ z-gOLGnbArs=CrR+Q$zyIMx?(pK5v^@vwR+flsC}i#XB}|Z`kPmf+9zuka>B|*OA8| zHQG%E_$gqb>~p!?fk_q6Ac*_0zi46Y#~f561kB?u3W&@r3e94>>|xqrbG&3K#FSDZ zS`9J!js=VaBy!-^f2+C8R)`V2^t;xAMPEsZ$u*OboXl0OMp;$SOx$OJ#cL+8D9tAU z^Zil^p*a&cDnvM!W=5_8lR-E|B#xRSFvJrbQm8g<&5NrNdu zz81#1D}7izA&ndfbK5!MqmzbyQut!Np9QafvLUrQk`aq3(=z2#l*!f=f@TDut?q+a zuDz7b7dG8V;K2)E!PR8)Oh(3b+C_B?wLr$6$_1oznG=nTc^+(j{b`Nb>fVYg=@83fW! zwY_PiecC-xFoey7S@Y*J$&Ipm*KR-$V1BuMo# zFcCJB{fBQqYwv}7*K@C5HUrF23aZQtW7Ek5S_}fd+CT?1GPVq9xiKC=Guc1>(;h1O zChkvedK6(^Pn?@qzq5$q#+h_35e~-kE{(D`uO~^Bto-=;HuFCtqC=aY#ixF{iQ5sH znKKbATQqdT;zv&S!`OP!vQY^j&SO;5ev2%N%#4jUy{))j60kaDQyFifW6F`UBeb*g zo5}vo-@xlP( zshVx)zB2_idtAL}Y{TL|iPXbi99TE18+v@?KKB)8V|UWeA{GUa?=W5IVYouqJlKk$Q%5B>)g^z*=w-zg2Tp;3{ligkU^XDeC5xI#|B z3jVc$`%*|FM-Kh%9BxN*CfM6<=gcvYn4AEFm!;zlzs#5pOBfQllFqZBne4xEZ0p`1 z|9dmny|RCCi@}56_W_Mo!br->szWZZ*>ox>z_cTlDnv;@BL{A}WGi=Lb>{Nk<^Pd6 z9zLB;7n6Fdsg!imS}3-0mr)*1x4=U{BkI@g-O3@t3Ouk881UdXLc5gIX{8AHtEeTc z&DTI!G3C)LgNJ}dBES1iAKzi7+`rF`VFarTGIK;)FjoQ^v#}$~;Xb2`PO5{EfJSbz zWx?o$CpK^&uj6+0MyGdC{A2!+r;*nD4oM)1LXI^h+>h!1IJH`fRBE+MA#v&jSbHg! z|2(NeDpMQ>yMlCx`G3Y^>p%PnC=M$}J~?*IP)IT5{zDslkA8$@4f}#NN69FT8 z$td+Ej6u60<>_Ei_k9uf)9z_p3ql$>ctm*yaozXt4cy-Gz;21)YGdpR`FeRnE zYD)$6MM+=AF1iMsgfv>L0%*zC&TXsG=zIm}eUmMP1oZi5*I4TXa<(ycVjefJUZQzl0NO_T!tl zb)W0YD+M{?mN%oP5b9G@pZshI68$CNQdW^6=tLJQ#e8}g+dxRP*$8t zTyH1Wb2$PF)3_{Tj%ZkoFA~!^gHdA%W-dDazxo2EPCz3^)T%zzg!&dbCfoF`OVA5m zA+KrLb}@ozG-?Bzj|Uq4HMn38#w4IY0l6NNV|!zQBYP+#&-AVf!HBofXM9zoLQ-a8 zsk~Vn%cPXNh<^4~ye#I^;Bxv5K-~ZKW31(^{TB*_^WjedPtquMu}!B&T}xEGk9slCb~1itb21|~NsuhY&rWg|W=BB7Wu-Wa zpper9_w=rrIVhC`(0K-z4=6>6pCTBri z_PP7V?#*{$g9~WnfM|8Ed?xwpT}Q2(<9GMW!MiBL4lfjudQjGpHl2>NOrlfC>irEG zxf?nvhDCaGbf*PH4d|55JC}K$P{P&l~zikF-^r_jijQo zZy)yjd=lBe2?`#bnr&>a3B)R`X+rolS7<|)PUPV+5F&6%&CAx zwhTUd#@?6yxfU4`M{UFEyD(H7MVh%q%CRw}gH38O-gd*7RZaDbbgN1IHuP&gjof?L zJ=^wv_vgs6xQ(7@7@cwMsCFl!<#-|D*QmT~-er^X-TLbt;4+_t;te-$BRB4PaTD?W z*GwNXuY4!E1v#b&Jpa*)49-uc^g)TspmVaNhP&*_lJg#gz0Yy`%<`2&8riq{BrSxlQ(8(48P(xOZmxx`jXC_Mg6q+U6df8QxMnYQ1zKiy#!xGY*Nl zX%B?Nuz#gP*&M@j``ou@makp#6LR>$JNwvlXR^HYa%#>>7l1vj<8GrHz?%rMj=*Hr zL2Dr+O)NRCARvBvflvFD6gNFQvy@!;AgpxZtRWLN+QmTGLuEmG$6<8KLJ|PX zf#dp9l`8RZX1ayGB`agmzOj{*&h8G8^B19WdD1*>Kh^4HaOp)L|m`y$FF# zJOl&ff?ph)$5rdSu}-LyPCEmbJ*12PbS@K;_;Wmq;KN|C;1}GH``?1CwRm=S$!Wz0 zvvU)d^@&5Bd>TDMLB((yd9ek1$H(+U>olq2xEESz!B2r07(d=hO_o23*#nLq*4AGD z=v^xuuy>p~O(s-u_tMxZE~vCfasn@zRAu#{IeOGXw_xZ`+M2I`OxWSp>%y~)W=sXf`fdQ2W)wP(d3<| zPLOQ0;)R+oTOtP^hehi%FXK?2Pa*2b)35wRWK#ssHc3Q&*OR!(#XM=2cW`JW%r5aF(PXG zqN%z3)W%%3e6yTxxr|O(6*yzOjDGA_(6i=~$idD#XA$w!+*<>IwU5a@|3UOh6+??)3Fdp#O7_4h?1k9~kjEi&(B|7TBau*7ml8 z4yicb>(MDng+wepK2k{V9l7a=D>2-Xg(y1o%HSB) zye#|!1PONi9}T5g3&Y6Mt`4%R4eAIK;3L?o7yS*-JRuFw?_c1V_cvrBm1t@pjzjFgPRanLYD+ONCZp5tAXCC13By%`9$_VP+fv&T%}nK`(`>RP+m1XVR%sl50Gjh1 zy7oOV5|DazL-$@2NYGAxejzy}_l?Ee8>8J`4cJ{YjgXg#^pr}Gmxk>blgSWEW?lTPvRec` z0um9uAA-Ix-PpwaUDSneVVP)3BfnjJ;YL|5QTcVPh^`d%w(!WJQ@mrai(;|@8jR34 z_uewxmj^MhzH}{Gbi&Jvzdbe~S~SYQKAsx-G}W5^aPrlG>0Jf<&c}P_*-A3p} z%4jVG#kvNHC60Huj?Hf-2X>)4UFlWD2JWWuuB~@{(I`xQ$Srxqo{>1>vMGmavaSsG zSMt?07_)#z+%KF?UvGdGH>^ch=^>p1qrUCJ(#prA{&22rZCax>8i+%ea%?pidFRt; zAP#-0ZsJO-DW6NHca>@4WN%E-LfBf7bgWtg0K{S)v5csf%7n{ z4W~9wYlNEbnWO8$N>q=oW z+4qdkwD+T12f1Ht?jn{AaVRumlUK@$OvKV+^SX#m+G?67^D)GsbhoV(Hurdt=SHWO zaF3kS{gP;0Fd_V8ts|c}rMq&W$&z!Ytp40pBH}rHTqfz6+y&~zC%THHTjFOyO`X2c6V&;g5QxVwENE>H~#MQ)5%Ha zbU!T7zj;pg|E!2M)q05r&R(@u>rI(R`7)@c+t0jo$6 z1$57g2OC0NLV-}z;l+b3pzrOWiPI$V<6b}ue@fI#ul>L0`oDXAcjegN>e0l|?*}d! zxqkRzQI6_R$g|Hg-R0wYReBP6jbU#_udm{z6X)mW%M6YJ0gaT~o8UwNzQy}Y7ojCI zB$vNpyotKP%N8BwbikK%yR#~u$z}yTPv+CezBdt$jTH6G+)hOo742~tSLg1`=#&*J%KGgtkn-M02?8NdHwsBa9c0LaZYt08fMIQ#bA&*Q>>fGm5t#^f4jdP zSZ-8ooKGSm)y*&gZGCuxbE@d=4L&p+mp>x4HjB&RbG8|yq1vbfdaJUUlvu3md=e?& zlJDc1A7s0TO^@c)S*6sbtK~H5reBrH@ROmJ(NWB&k@8u!-UDT+a3N9MHQxqK8IqDlbYfvd375fi#lD|H) zAwZL`t)#=?0l1_r-(ULcY#6P8M#^hX;<2v(WW#lir`c{AOv~SGuv_G&*i5bHFzI8c zNS5bkEvf|{0S&M1mwOM8P2A&JbakaKWlG^1QtJ)=SgsJRlO5Z!2bFrlwV2}!%mf1hu4@Xxx4)Dhy&OXp(#W*u7f|CbM?a{8Y&VU# z<+-?84G#;frieq$L<)*y}y9S5G3IUBAdC*4lY2bAE z!(~u#HV)5qHIlRIG?IA2l8V$TF^`$w16O#!L_k6a%b$_g@{?Pz4Lx+??9;nx$Ta_m zbh#}JE7QqowYGZ3+Y0v2h3nlohy^qfNnF)?b!&u#{rmC%a$Es%DHTPam6 z6{~n$g((To<&;!+)$(~1#6_G4CcY;&lTW6){V@4`=`QuI>>isNoje(o7}r@?Z#orlGC8KvxnO4HEjzPOnyzNC0w?pRTvl z80LH$S^2G{$mLmm3mh$(qdlxmaW8bIUkc zgfvoq>$5w!8_M)Wcxz%XYt3704lKYxErpPhHF%q3RIJYB>(cb{1e@=6#^PLFntS*f9`D? zxQ9Q1@vZvCq7&X9dv3XMA?uO#&V zRqeo6W8~YP>^e{MJ=i{mf41OCZ&4z0Nhv!PzOEInI(O5Jp9i4Yl54sj{g74v^fe#0 z>J*Y|<)^y;Em{x%7xjACB|c;*=p_za3bmx%2oIoQ^V+AotJg001?)+V|Jw_N5c6ld z%O+@9DyI&JuLwy-5<%MDG0X5YYmtLr?5^F$sFZTaaYnd>zb2xA1M5iXh4T>*bX$Ck z{PnY4?T28rS+4Eg_CcwozqLgyW2LI&T#Z_x$a9fL?tNH9{&Zb8FagJ12k>NBJD$Rh ztX>LKHav&b9l9+h$mk7tU@rItnSS@(ZRC`hb0_{Uh-G`pbJurACs4Vo6V~-SxZ-dC zeqo&fIW2JT9Q~c;AN~n*{{AOURZ6SHWUU#gB=}&Nn-+~}m#i55)Zm2!NzqLs4-OyZ zwmfEO^P0=CP+@OJffR4A$Ds}TESaJo21vT($vwD!1vC~RHBx6_hJBIi>F z)k@=3hD5)D!&lIZazgNB@^8skzS`Y3Y*{px8Lf_7MaFi#zMVL})?GH9QyRraX-wkJ z>on$MDyAaYui=ChHgo&Mr{X}{@r!Gt#P{{C`@|pzMe{Q%m}k~%bLK$U!X`_lxW&$- z80aKF_&RzcXzr;aeNe=2|DSGX!f6cW96BHw0aXjhQ&}WEWy4t{b)9xQY)%VPX<8RU zO0(B~^g~VqfFgb!NkZW?QkhzzPB@3q3!Fso&^KEsVGFohIkAfUKr_RI4;s*BZ31uIjKYEPxE~4 zxvRSzHD?$4gcH4>MBGB`?k;k~yat*#*9jLwIN!pE6-3oOuN?@yRFJ=RcXxd4f}iYt z{)bjFe$R)R&a(G(zp`@FH~g)k7sk#Wxk~g=WS|es<(}_81ES9><^hjH9gC5a43 z4-!2>dgw1J9>DGs&`^}?+@2F@14ka9uV5SmXU-i2@k}-D&8VW4Ou>{&1p0hp_koXq z#HTm^;J*G@a@HJ+a6Hjbs=T_qnr#KmK?IZ1uH3L6XOe(Kb*-~{{ukN?EC`HKoneP!5^tPv(6OLnjc@h-jI3+umi*z@7bFdZt=CK8Z?Nx1j_FaJf>j z*Y^7GnMcqE0gak#F&&TWK9PIl5sYQiHuQj3-%BkE8)U6TgWjAkX$vY8D5E18;m`vi zjfg(IY#aH@!RI$}d5)TGa5$bi$0;|31bRjvw;SVidohKRsmJM~k78N{wBE^t;Mk4a zqmSZ*qt=eyTjwUF+Np;-IAvu8iUqDddf@-+Autlq=z-t2|LphG<+}bF9`0h~J^`(lqXF;#)9X3i zEIpH9T%h6WiJtGnms8oxk_v0k`a_9I0J++|k&n-y!vY#P{N|Zk_kQ>G39dAQhcbOI zo&%xcAB;hZ&r>R-RJEysqrm{?x5wt%mvKeRCz0~%pWuqPuegbO^JU5g;w_$&O_$A~ zEiutp*lsRMgRQkWR!}o7tqQjsWL_xD|xW1hCdHR>_`P z$GvrsGJ)-frWx?}bxW+z1{hn+8)nM}xn12CDDFk{MnFRl{450g*2gw-6E9K8oSfcG zW7m0Om0O|6q$Mh+P3O$Y;yy2elIgH6`xSPIfJVk=ht4K{Iq>8J_vo*>CebSGqQ!q2 zsfx4%>xX_YY8=}zOsMVioSwgUH?7diZ=+n!!zLuC7VS2hl?q#k{=!=F(?8%=7LZ`4 zf>~$BYd3G^&U?LY`;^Veep$~-TCAaiczti#WmfmQ`uE>s%mNzOa$66P0DisDYg8t& z8zo@GcgP5YmzuQY^(xcOY|5=kkjR@@0bw&yH-EF8d*Mww`S|-|f!vj1C5*>bsu4=1 zt0-#RMo^7ze1~P8(X%N zn|$nW_ly;SR&wB}-(SrA{4jmtLa1n1IDh`<)J`WWMO|>yWCT@fRK5Lyv=gxu^-_*| z_Xxft?!cq`+ny7>LFWmZ#GOCq}1tD77}<8B)0%uBp0)rkcq ztj-8qaoktXkpo}Hptil$U9<87r1Cf0C|(@^u*GNJqW4OmrioVANT8t9u<5AIEG2(@ z8+!8mW^%X#?=;n!pQr0x&j>zs@?5>{}9!VLg{YiHonsZ zKtR4z^+_cf#Gsp_{QC>&R0H4cZW_1FFK9AVRJa*yF6~XUtvQ=jL0s>l3&Lh{ z(DE`M)Zgm@biLBaMB0+3xuBRzd!x;ej40m6p9q_&b;!nj=Y6ai8G7zX{bmm4xjwde zqfyYC8J|);$+F3^(h(<*oiMw0&&OxSR|rT%^k)O}z;o|@3Vz`eW-lA>7)&aSG*JmU z-K;;Nawq6tZd)mA<|21};kzQTfAMT+0@@tPHmhY}FTzm0{;a)VD4^7|toNHlF*v(& z-NK*zzdYt|BsUJtu34)`wP`%zb^c6P2g`v`FU9*96&+^RkjI8+2e(LM$E6F=#C+lB zWcrK6qm`qJx6TfdYlml-0T3O42?)RqQO(#J2M~i@>?oL7!gyv^Q_iap#=O8M1*DfWujm%PH^@XUY*}M68Re#IKocG!b#o7x_ z_#Z{2fmdLbg#wm5**gkup#`Z#boKS?cwh(;8=D=6yV`-SnA@~wHN3(Z2mVJjYPyHl zovu(Sm2%aw({7=UN%=0#CFE;~#u!<(V)n!A9@!PMx2}RGW(oW-^3kB^3V;~==g`aj zEG%eb2J8i1P3@?21+%2!4#>-mny#gglK)*di@ePF&B!~5(M!0ziJbW*lbP)J_S9Kq z$J={Xkh@>nwU6KhxtM%$V)jI;^ysild8Nmh_xOEvLoA{2YRX}EjQ0z$1oWqmXpv$K{FA3_P^1^%|Ide{zN*%k4EjGvkO zYB0*qr;!6!zK+@kt7k9k@t}DqJP&^?7%{W8yiHS=NenH(nfGS*j}zb_pz+ncdv&5s z8!#&BdZD=@{Paq#MM=XYHRS^4w%=FGlGf(gZDaFW$$>xq4Xz}`=Qnb%Z=OBQ*(bVU z^s+4sHk=={^?gA-llnFQ@VXU5Uic(sfp7;r|2^E3$51zRy>0f`)V`M=KM zmAzZH_J{148*;F1)lVu7dVO6hEh9b_h?7ZL zbrrLWWe}G}o<9>3Bxpu*QE4miCu9?x{wz8I4B%KSd@9gR>6ltb8#XG#A%h*E+oxd` zgw5pe!F7=3_x^nn_ta^#m-HS1HcTbIt(xjeJ|RhZ<3@kI?o(9BK_!mdht8f|wL(B5 zZtd^D=dxc+aBI)$cg6}n{MOg$V-15;oK@G0;ZlRb>($SlJ!5QsD+Siu#yxxP>_ znx}WW>E`Yw&7`%8sLkMUDQrGz7^PNvYjKKP3i#vWpj)(p&!`Lb0`lgT+5aW3Z1*%W ze%kEGeK%ff5pu3BAGvP$yF+gbZX7U+$l?2Sbt+45o_saV6&l7|=>2pyQ7)F)z?9jk zWUJAdK2EM?uo8l17z#3o0vPCSCjVq+-{pUA13P;PJ)~&0pkj}iETMNgD-KJ+ADC2C z{BaUs!AsCerpIQslOMCQ@AGW_M>^YcM$w>izE3Fc=BP>SQ)Xj56!C=uDsrw2D=Tb9 zwBr{qB43srW%S%{adJK(pWRG-+J1D3=azB!bLRR~%h=FNcD#xVd0!3zo!<)g?nb;f zf4+(AI7_;Ov=y^|<2$!o$#;&1YxC^b3V`xiYqmL=O;*goOpg3qiOva|$@Eu#crnqd zX8+AIN?!m*P^oE%K0jIVG(3!K&5&(mLve-K93!`107k-Qvi~RlMuy$^u61O?g|qMR z+%CKb+%QTHxaE3NuQB>FDQT>sPsb8oW!01+?Tf%o*o--Q>mu^TMMt|eww>?RD}~KupB@2g&%M`P%$;SPg|n?zXeJs`i^Gr$TAFMnlq1($@OQ#ya^MSh zn7CzD^z7hr4cP;+CX#2n#YDU<` zo4$?(d8-0xs|g`^wj83U;%#-7>a*Kc2%5=Fo*jKn=o=n-Vq^Q!XlVZAmlq|5C}XbM z-Rh*wSFh(OkF})ko*iE)q#=s=IlQ&qv#<%Kz=1#Wt;tDgKr*F>$`py5L*te695(yF zK}bW=E+Q>DzFB?G=t4`f@Yir7YW15Wjf}^mm1iSupNwbnL=f9eK*Mw5Q}BRMoV;zJ zSs+8uIDB63&=*Yry{j5&n-&^Ol7<}6%O z^GW2$#J9I{uI6kS4)S8F=4P^XOWdGEYGbXp)T_zMtyzQ~2xx#`S_l1(hL&w_(`72+ z$9akIqhd;cRb*q{Y(8Bopq5>4M%g;p2x(;eY2`&^xxIC$iBx(^;KWO>!kVgU zB|tf@#Svg8Peyr8kt)U^pkWWw1TU(%JXWQQu*e8V?=Nzw6bVhTx`ZQVL6VoOCgB-< zz6?eJ8kyd6BkZ6vKia^(S;khNs&9_o{d{D5Tg4=TDt%U86vspIo&>HYpS}`&qVq|8 zjqJJ~Zsz`YCEZdqQkwAcIxrg>v_ zt}Etrfvuuke4>`kM{=Itkk*pRKY=YJAd!8~zp$PA-X|bQtJ;f3%Scgg54|(|^q67f z%Y&y=yyytd9*mR5nDTE0V_jEqu@sipfU<*J$;Y3zKJaR@MmX% z0hUq5oGMlubp-1sk6$J4zr%lWE!JO112*OCndG_rPbawZKS#v~kqvzr_O~X1m{y)j zbmG2NIvea;BJQ8YUJ=sB^v_0MJHGvw>$sJlq-<#5FE2x-h$0+dJTN9mr9Ph(6}EaK zIrG!#jgUqd>E^9m>C>~J-qYz=AhW-v4CJJSWYFlec3j#-pNa1pteAjC4n6}+>U)3q z=mdBFH8^dk{IurgwU)_hYtkGWoQzD?)nb+uubw?~YzJ6vbo8(+y}6E~U`UgLUFZPM?uChI!B5DR2Yxf>eWeDg>%IVP zsMrS-OEczAFSBQ%8Ntp5$8dX&+aP)J3$x2nZE&IQ;9UMiuX7(4O~6Veb9#NS+J&UZ z;72qLGUSmJMt1I-T}QtA#o4j73w{E`@-@fxYbBEG)lx^t42v7}N&DLLr^B?^V~^2) z-wH+xenO6X>WZT_w9Hp#N7r@KO~46IdmQ+vCH8ErN$pjT^Yy2}Madi|6$ps=z_+}) z>XesGg}LghA8xMt>g=uK{zW4H$R`KR91Se~_t;0^+T#v{$1i~e0Cz|SV$NTM)k#NP zQP)MXQfai7^reXHZrss=Rx+J1UPN{*?JnjH+}+b7aedH`Yktr9#8Rb>jd(QioW7;W zK?nM;JE2Dko5{Y&(-(6azlGDDI}GhTHgV71*1u0_bU!~K&a&E3 zVSv!>niLn!k&KLV?!v4Jn#uInzj-EEx#|{VUEW0xGFUcf_&I+Iwj(KzURo%%f;m?} z!5}XAg*(7Q&{Iu%IXHr{s0&O41Uj22s1xtRku%`m-?)!OxSCW$xS>T?SAy=10-hVaoi#= zAK1u!V?UjI=ky*LdCuSOu4*jWk(%2+yWgO1WnKLqeg8q6{_{z|oPuAt=UzUUn}uIE zCvG>JQnyc=F`C^`ltv;uAHrr3HuD8x#jiipD+oKgn4J6Y?AhZ!w@CpIGuG^pEB!G^ zJxNjz&u&|w8JT@%?zM+!5n38Acx&Z~EnExNP&6r#BhE*#(1KR__Ox@lrLS(I^=I*O z|N0(&F6eVHO*T=gn&l{luFJ)V{898(*i3p@3Ez2i7OuE3Kz&97Bh!P6hh7wg$IclL zLqR$b_c(SE4Rq!g!l&^|%WOfX(bzmjT_j1K>q0axcmfM5AOULYEU|GeztsSE$L0>hGQc8v%)88TAsaHgbli=}84XG$NcIm)aXD$0P;&R4go!=`s!( z-=7svLc)YJGJekgLNa#!W+PXAl4?4(={+Oh#K&6aRdPndh#SUoIgbo{X>W#3Va}7V zlH)zbg3kckb}1Z??dLaekNphCAB_gtLj$<^?nyM0?V8jQN>^&0bj8q0@ZEd(8FWub zBjc}cfFh>F#Gm+Ms+XFYIkSXuD#EfHivu*+m-!ohf=Lq4$d+67QWdPci97NWsySg7 zu0${R)6W$KV2H%3wAFGxojV9nYkDpue+WJT64@_O_W;`v`}jjFe*gF>EgCS0N`vc$ zUK{(!Xn5o^!w+#=c5H#tiNUU(8?09WG*%{Fh1FTYdOJxa9qd|i?aO$13u)xY1*YxX z>n~$LH(RIotU|&7ul_1)>5|1+@MWf~?f^jMdn~T_)$I7#dpAT#l_(5_!UFU5mmp(swnDXpEh@3wS`G!j z_SYXoPv(=zzE`&QRPc?6PdaL`TlGBbIriy26ZA0cS*6U3y%Nny(|QI~*oufC>utT* z^WZn1L`0W+z;EELP2@TD+hyW>TfLI}>`R(26W4W6>E8SW+*mm8*VC2jan_}3>ZX*f z=f%~U))4cMgHK`3R4>3%B%~bKyZI~{5Jql!;i!f8dxy|d@LM;>k1?iOGD#{DRHZeN zT+`35!PpEQV*(PM!4xm!y=PA(58d`F3wcHV^ch6_zh7QSR{VdAeF=PARoQo^S(=6< zO_#Lk3Kd$Qk}~(+S&_C(GD~KXnaNCMGMS;!&YD@1Otx7>>b0U^_m<>zUsPUS6_tu` z1$mK0#qCvi5s}P@R76&RiU=wne*ZIfk~Wv{y&pe*y}#UN?)jhPIp;j*InUDE`e{)U zb?A39HRxNRL4T9m7_YLg#A_lxEms5_=H^N=RZHwe6!1Ehqo|;uKH4^{0}8dVDoTs;r=n zx-|WqEv(3@1H%RlBIT7Dd&5g$s+lA)P#(3nBBx)PD)6yCqlRGmRntsA$i%!c6T>Kn zHPK#Xs)mbRMhzt-!d&^^n@IZQDK;8^MQrU#R8G{z>*AfQ9>&@=*4@+YPs8%5#Fl@4 zg|6*V5;evWj_CPveUvV-$m0-e1+b8uM2(9>u$S@F(u4GSbRa_;yrD)qrH zR|?s8ust;TQ~h2!7YoHk!+pJ$Av5{y-ymCm1%Q} zxz8qC^^fOZQ_`+9_je%{t%?b9Bdik<_ILjipGaSmGp~_Oq2XW9_rMZp{Bkgp7`D!9 z%pp%jTPB*dD?5YTxW4-Umqat);_jrOtc8F11FD7hTH+kT*qyNsMSE~0nbL|Z?f(#L zBc&0?=o_1b$3A@SYdD(1A;gO#vR!Y^B3(n==Yc1O%bXwQC$CsKJCQuK;jJl!fNkz1 zA_*X18JtQKwv<y&Oz^EHCyw0CrQK4CX zBJ6)3723dPRQ{pCokPNk=`Pb-bJUlI7HHL@ekN-UO_rAmyqr;8e2$;>r{qBU@RTXb zrL~haq_JVLc3Iwyfix&>apYY=+&r2a1lBgtqc%*ghfB;XL~^b;uVi3z>y-GkbxsA- z@JR^hzmsjP^VEE^mZ#ChjIvey_(r<4mo&8o8`~FT+w=~vuP^8^+9(1-a$PwI|InEv za`s6$e}8uT7b}GRDg_3P}MOlX!}MKB%zg5#}kR8 zD}+ZjPEy$wqW(1~NEG!Gs#dw1Q{`EAj2knCQhj1U-`{|OBs8M?uBdTaDXjS9Bt$7l z11)q*D7DPya^zZBZZPZZ)MhNBgJL-^UWIZbBqCd5zCw)R+;%luM$Zg#R7mWh;e2=` z%eYOB;a>TOd!(Pp8?ep>E=M^MQpxv&y70iI_wvcoL4KUt_lo7T$C*wKqYf(bt=-+D zgB{TK(jMBqc5-o}lm?S4x)ogW+)Cl?wP+bV4P86kMfrHZ6=H||xu~Tzm|>83uT+v| z9ZHhY#MB>0)=i3MWE%Qgl+M+uXlRUW9|NBT=Vxf32$73 zCY2@g?Q?3rTm5@%MxSqJsZhzbSIwI?ff~OMX<23N88xzP)`4M*%`i0D53f{i5|`SN z*GNt9C!O$9Zjv58I*eT`J2V}|irZ|!7aQA^yE9_sWT<_qND%Dt*)vg=1l>6+3b}*`xMv&qW2KEQw2BtI9 zB?{AqTBnMg=Fo>7DTOvHN2X_+wcF2#EU~+DvT=cgMxI)`7oik8Crid*<22B;SVns& zpGS&sl_fG94M&~%(u$1r(u77!Xhe3aVI6rp{lp3(Wup8E8RL2sBwqDKV;#mJ*5l~T z_>%4Jz#wk_C`;XEL9?VZnz8T(VOhr{F1EHz^HN7Tpbsks6rOn6qc>Z6!~!&iNw~7i zB#|?9%~yy%3x^GKT>@|GP!n+>7>)&c!%X*(LKBQQHKR#fv(cLD(V-?%8ccs4*etxM zqZ0(YaNYD`+iy$eV>U(ifZQ5T`{SjV-bA+9CKoo$BoXF`hrkNd>)>G30wzw{A>`EZ)fo7y6m?E-c8@g9QB2Nv%<*(~;r1Si78)itEr{>M6yuW(a+&{|Z z!BqU(T2sw7s_)%e?bEp9beCSYK=K+M7Jn*>b|)N@C5!rT z8dX~40EMpC-lrHFkdG?j1I9iqET!&R-i<0sXyU?x$Z4yETe>Hqa!0>ku)a)(!$W2^ zXW&xKm?>rOmiL24dQgyrM$Y-5A9*|atCi%DZ@*|J`(rP{3h2EP3&;(B_}eM+hb@!U zq`h}?73KG~>6)hWnM50-3q#hocPsR4d0^jg0YE|{kDiC;Wl8_r>82b45uBQMiXwPA zm_!zh;ZY^$%BX|AV`1{SUaaHN*W}D~U$6>Q-pNwPuW@RXDSpp{Mzw8RyT`9ax>(ku zOOlum-%DR3irUV0;m^KFc$9~SG(%l%k43H+4O`kq13}WY6`x37PZ_i8tA*ceE#p!X zToJb|n?Y0x76y{mq@gVZ4_eL5C`9_2AeV#Zl zN==3%2`)>a5GkYFhH^UWmt^pmg=Zan~H#UG9?AZvay z4jbWXCo9Q{;N*sdakDO}Q*=h--BEX+rCX0wGgQ`&1~HSRG;-i^53Df1hS0*l3{u$% zyJsgFDDIxlq{}#}@MU#oOF!;lEyPiS1`2UnubCur?!~Po=U=!XBIGqjc zLpgY5MYDc3rH%F?QfsM3o5GVz7Dz}$Hh~=ve#py(6Jg4NSYN0~rMTBv65)u3QyOzU zN^?wQ>Wqj5?Mb3W5*lJy*3lIPO3Am9w97FmY$!;azV`NPYk=vuB)cqz)_&vz7Yl0a zLqQT6k=c;I04n_z!eAe58oJ0j-9^2MhO!4I=BM^eFwfkU##+U8^^XlGdJ}`ra7gKhwE1cIP2^A- z0*r(P-oPD3NfLT1jq+(lsWG59mcf8FEobdqw`IVY)0zCNSkc>W0ar+AP;cG@{pc;2 zN-Nyci*hK7P!I--Ho>q1L$i6gB4*IU?(| zX46d4k?I(*n7CoMbo;?s3e2B|nH0z#ABf?u#z*OPg9%9E_KNJF&IbC&vhqaQEk}$n zol30H&9|cOB_zUc{0{7%pI9b5a%*Y+p*B6!wb7a6MkTA!Mcu||)Pqg9#OL!fC`Upf zj%D-8_AaqZ`Se305{vZ->f;{xbN9+UIg@43HWU^ID>#h7lF-Nj4#`O%3oREO9WHYf zwF4Cg%cmX;uuS)e1}R`1JpqK%EOFI$^B62CjfT?%TfO^@6~dBFqolIAZ|@x3%E+pJ z3-<&B|E;*DhA<27X%^)BU%f`QYW!wEi8CRU2&?jlMe521T9ZRDJNV)@FxVwuM4crx z@>Fdzte?IJafpuQ_UZn!twk!=jvJ-;LN@{*6 zvP9T9>CfE|hSd_(Eh@=W@|Zj>USkps7|rM$~X{I$Ex>075eZ*X`xp;C02d|b#H zaYjN3vGeZv5(<*gXfkQI<(@gZQdqoe64Cfzgj%l7P|Pc5m}E!F>oc(fI$OD4cJt^L z35}fp34#!noIzjb>6!%*j~YUXB3|3DN9Eu$9+y@d?r@sI3b8sj?nQMZG_rQNvlLNk z6*9!2UDU^7oEnCT?3K(hJ$-Cjc687)WD3PoW!=Z`Z^wosp@H8K3ZfJNOMW$StZlx7 zb`u6|+jIl9UPU;`DLNC$k-`445d~(?ZIdvVocWqKo~Q?R(Ev;1w}HFL@|AK<;asFa-W8O?`$UJE8B4>}UTugp=6zjf(R1QZ^ zBOHC=*km~dlkWH=jlnb?M5RS;^$a*d9wu+?i5ogR1A)%+-qwByohhM_^R=0E!oEY3 zF=#qRy5*f*-rn023uQey_!g9ye9brpQ$nK-2G|iFhh%!|IGva`7Z zw|94R5191jjcxl$tkN?{LQLdf* z;H`_se-3D*SVQICr(|({rAqa{gE5R%{T?4!*y>qLN>8+qP4(zsY1*Dw%Ce z5P6z|esxPwE7!It{C;_hMjnZ@1cCu3tWqeo>IloI83Zy`YLr^|>&oT0&8l8~YQYCG z*}PAvHfk88>HfpDNj z!T41z+K@`sB3B3Gst^ii)sc$|mn+eXbKmM;eWixsICi?`45!je|8a3Mj-B}`x=StJ zrsTp(ZCDj)iA2PrV6{ znv2F{R**Hf^^0S2tzuhP8`7{LR^Aekg9Q}+K%m7RR`^>YtluA02ExjaKTvLsR(`Cw zUUvDZft7PF9(Puyn57|WZcCNNU9nB2KtMCOHq@e(tHEJGjEY993b!!wkRlS+av_aU zJ&nO`R4CYE=hmagNXad?mi&m+M z$e|~Z%Q4brR@O2bHEPwV^EXz=R-fuelWP8Vq+@&{^gF$7OVIwU}*dL*s%(nQo zT)2f(Dm5X_AM!`S!6_h(cB4Y0B>t~-uHL|?ktS1nf!kCpI~%vHzAbj@(KT~rSIYx_ zRWPIoDqG|cZ4f-bXj=Rst+s_#h1CkbCZgqVu~Kf4Mzv9S>ij1wWNZF^an{@xEiVJy zHmD}#VNRiHVF3lURxvGpjmF=iLZ>R_emJ_Is#8dcjar3DOPKTjUcKu7)g(f`@NZVB z053E~Ls7>gE-QWZp+E~Q@?oL&Mn%tp0FMIQOi zx;6j5Frji|0-Q>vilA_HkPg0@!`xJ>F>jPXEhZhqYSkBDI5ZeU@oJ?)17>4YSku@bctVY#3Clxr)<4C{D&wr-wzn%w}mQ2S&zL)YN>T`g^roEB`>{$Q6(yad=Ha{1DGWrZD1x zvLijph;uL)Qw%{zgyZ6#2XP$w2Va?`%&WfB_;zy^p*tiF*I@&?I%3bA~)BR_6?a+g0HXOP89cAI2xr*F^UYO_}sC zj*WFym-u9^s&$YN8;DRhSXfoHV}d`e!=K~)X)PXi@~0U*4)Uk3#^V5gdMzIN`P0ks z*vFq{v-vA@+T=?gg;5~!u*bt6fne}q<}&G zBn1rcCn=zxKS=?%^Cu|aHvR+!yoo4}XFJ zy7?0n(8ZsifZhBFis$4{P&@~JVh07Z^Cu{vjXyyFt^9Ec*vTKKfF1mC3TWYvQ$RC+ zoC3D<$0?wZKTZMl{Ba7{#viAEt^9Eccmsc&0&d}tQ^3vqaSC`nf1Kidia$>AwES_| z4m{QTF$$>Sk5ND+e~bbu_+u21q8ujY?Yz$^J<6mUI%i~_FXkIC@3f}KEWSN&)G4jVJ&}@0$#=+rGS_6M=9WH z{wM`p!5^i7%lV@eu$ezf0hjSdDPR+Slmaf{k5a(J{80+Hh(AgJ8~LLYZ~=dm0ygkR zC}2H*B#p-<{1J**%O3&Wj)wXC5eittAEAKr_#+gsnmJuz^G5(!{~><_fb}2nM*vv=Fa8Js>;J(Y24MaB{9yprzsDa2VEy0u!vL&*mp=@= z`oHmqfmgrdul!*E)}QAO1F-&W{xAUR-{cPiu>KAHFaYac=MPiB*Z9K}@KydW1$>1+ zOaWi!4^zND^MnGv#1jhmB2OsbA9+Fn&+&u;zQ7X-_y?X)yytmB@qWL9Cls*A6AD=1 z2?hKePblECJfVQU$SoPw^8J@JW7x0{)txpn$*PCn(@A`3Va63x0wE z{+yqnfIs6WDBw@|35xdhHAJnq9a9UkAqy*3{A^5YcnEI&^1?t#@I z9^c`|cTm7@!&(}TZ@~&4kGtUvfyX!aJ1OAT`8z4#f5PDvkFW7}Qo#R!-#;FA@pn?d zukv?Nz%TQ6Qou9(ofPmieJRgGQb58V zqJZN_a)Za6{2>Z>h(AOD5Aug7-~r?a#A6@QgyON6KSTldAbm9+yOGWtk6rvB3iu`d z5Cy!0KSTj<=MPc9FYt%v<8d2*h~j;oKbV`-I;Vaoe~<$5{6Px1gFi?CZ{-hCz+3o( z6!6phK?<1X4^qG^e~@dp7Y+ec%!?vd@NALS2Hg^9OQxr1%3AIKdyFz;XTn1&;9tC~zNtfC5MO0~9#SAE3Y?{s09I@&^E1AK(vA zJU@Sc;_cYRAE1CY^9Ly4R{j75ypcaZ0loZw3fRlE zgWpd9yZHSS(8lklfL4A#1?=GWQ$P#9p8}fs{S?o{@27ai9sGU@XyEr#Ks~>Y0=Dt{ zDBxy(9|hdR@1ua%^ZO{^r}%vo@H&1U1=R5SD4?3(M*&s*J_@Mh_fbFvzmEd4{5}fE z@cSsBoZmBfCFJC%4mH5}W%fY0?@`i-<(*}8Y#Gs8Q<2Dbx z>-2~M<$*z7+^ryqA59{W>#S4+PZ^sssMP+1nhEBEO1S2goGZPqWYm|kppx(x@&9BJ zj+L`hg@sRR_Q=SV%E|d_ub8TiU7t|+;>o0!b!UAkGcpAQl{5_%EvcC#e>&N)WVT-* z8uX5mzaVnU!o+jl+RIVkHrij_yqU4V#?$Vx!q>A8xp0FpC^9qT*7K9iYZdB?Jp5<- zsqpCFP5VogoJUstauP0^c?S#U)VN)br^gL5Lm#4p891>#?xNu6v;LAe+$X0hTKg+% zi|Rr{P0us zsj95~9BxH#go)X;a9jKxJs{$ag&K^E;?N-;TylLnm&F?I8}potoB|P^0=mPM_fwAGp1dXpkEyp=k|@9dh3!%8`)BnHQ;jDYc$#DxhPL z+G>0Z-63{tq&*#P5A^$uarr>o5KVgsJwW5L=#H5b;y4$F6UxqWh%WUk#<_fL)e9jX zE<~TJxm(stEn+LKrQAe~PjO{;Aw>`8?Qps|ol{{nd9>!RQwbY!=nCe)3|)bQMr4mS ziry|l{AJ1qU6AsoyKl^7^~9h&m1o1@aKeZSVH5;o&vR(EghnrfQPATL!(QPWRTAHGOi1x>>RU(~*|Z&0mJ2D(hcW4#^yX;$o>7hZvy zKuRNLU$~UI>?{>-c$IQwo1#B6#%UBiiTseJ%ik8D-@+J2@*3`Fl^e)s4Tu`t{5t(^ zkh59kti#MIEU9!l=PGqT6WRL)hD1Umvai36ThzNAX%^migIbf?a~-w>r|$1D7`r=D z1FBM^o5=Pz@vVeL&OW}L-kZWL>xXaR7HgqrPMxn}16-y*S^YmUPwnSx$ob<3ze=MP z9jCXm6Bpc8$AY$miA{}+M(lEPzu%0Uy>zT~@6xfJNh1#8DP83)7f!!R=L!m+nShV?t5ntaya9@CUd zTKpbLlG2F(ud8V$!n5M z|NMI4?emjX%6k*k%UE1UjJ`~^4e8uWY1^pP+t=GCwkh=vod`2&WbJcTmok>F5`O&- zz1*LRQp9UlUH3>k#|-wfy*;{YkIr2ltH6h7kCcXm?cM8zM?OUN(u7nKRnxuFrb%`7 zDg0{1}FncPSxA0cgY$m@1Of8dUN@A zs`#9^;5i!`;Y@x`X~?vP#vFP15aHJr7Lz|$7MdDnQpltC%1Q=UD+O~^0W;Q$vnOgQ z>Kd&|&K6R5HEc9Kkjf7C1gYH7MD(&kW22OYkV46;CkoFl5zfd8CA*!83(lPSv^g1P z5S_>qmL~_JBV_weCYO??io(JL5)vszhCy2R)xuas0j~LWeu8?=itCWO$JLtQ46d$z zwl!nScF=N`ujaHDDLy~)6W)K%W?}Wb0#<{()tvP(ad*GNYL5<&!kzurngSxWN?wZ* zYGv~a2qqNkVM10WVb7_uu}&svRFl41d?I}fhG#bv>2;uDQG68aPqkgRV!HEt-}DdOag9XDE}kXNKe+XB(1~uP7jb%^GyQgap&K z?{5(vUW3u27K;}T;a##-F@*e7pl>x73G+Ab^V?6UmJ3ZQX(5<-%_u}%kA{X4OfT0pq&2kpdwbim z46OuGj;k0(agnInCixw42usS=TR&WkLSe-;(KKDCQZX1CT+Ux=DcQ3SWk_gb?T=r-Y9jFv;zukj zOp822a}ey&ARB6sBa$d}UHuCUVdN{>7ERFPDB`9Q*J%cEoEr?vy*VA*Jrp4SUJv&A z!3N++Xwdxst8BWq{F9W&(2FIv$x@?-mEDR2YqBxJhR#^rtA~*ihKB69rqH-RLL;(& zz;f+^o!}eS6zsAEmY&GS5KQ0vW36hJdz3IrtavwVEG+p5h5zuEn}q+`NLM>VvYVjp zx1wLEnd$U-y$SDtN3ZF#AtC+e))r{uvKem)L*Cy^{=T+Qj-S|kd4YP9PFzNX&5{Rg zAlT+}b|^>HCR?UE-Wnl2mlxJI%zO(2+8k}er>iDDHPJ+VetDrB-0?40h{atxU0lX6 z;O#W%Jeim)!1$5)qSV7TtV0h=NYjZg$fZFPOfM`Rn@ zY0iKZSB{(ZB0tBo`i;U9e)D1T>qzL za+k7D4#)a4m005C(Z!J$)Sxg7 z$|t4=rKi+et}qoS5;q$1 zxzE>GYC|=*R6`M6`2dxuULpUyq0rFSnF#r;T9?x@*yRf;d;O$Yhx$t1V&28J2)lLQ zw$(lS1Whj@n*9w}UEN7*mpa?((+_t9BILbRtOPUPLfC-idMO}htgV0ydeP2oB*3P_ z_PjlyaBwa^`HdcOfb=!eZ|~S5v>OWW9v&TOPezzjk3H@S#Y0YOkbK98o{+v4{T*(2 z@0Du7GA~Kf6>lt7k*)28)$rJu*ocl5uVSt3J<$=xKrrAPvnqz{N(57HM{&~EqQ}Kz zbD|`kjyk7>JMp#TEjjZIvjq`M3lnp7k zm#Wk(tX(eJjc5K0l26T5&H_ z6HwS8C7l6EPGiD~C|`tm6Uxo!orU_Pv;RckAN(uwJsorv7B&0yt%!>6&LCqtqL#Vy zP|V3~d2g0{r>D?-ISiRDG+_3h3I}f2BRJb_Jt)k|+7bv3poK1;mu}pBBexcVI49R%tpoJZD+{o z+iI7S4c@}XWpCf2~j=lm4NN>f)>Sr4^h@v@_d8iAdD2{pu;sXIL)jz0E z$#Z5Gi^!WdLuje*!?q%!A;1w0SGXI;qI4gQMYJIGg@U@&_A$k<#bORd6Y*|0oHA)a znlLSBCXJ+Dy1i^%ayU$7S;z(#lIj?;-jE@!k92qGTO(tsuvpH0@xtQz86=`}v+yE{ z9b6$SOHe@y)uEodV!JY0_n?E#_a>6ITOczdvib9BO#FkKSnH;Qsk^3_Lufs92+=PMLagNX5{Tj z1>+5CI-NdcK2O$;qo6M(QILcLf&BXr0DRA_7XFe%$E>9OvZ9dN)!Wa&vd@G_Y;fCT z4drqAV-%%GXykleiRv7v9J2KvaM7lxxE#JIS>zSn6CM7r#Cpt zwt3rQ7GIaHH>nUuB5(*bm(Y+DBLxnlo+XbRqT)G30qW){o&X2NI^ljdhUC^t-$-kU zLqJSAqz4Y5APEhMMC7R&eCZ(4vmYqS`P7Y8xN; zg@i`VyzRwVt_Ci!uO6pNhLPQZg2a&x^$j6uPQMq1`3Pp;jT|ba8Y#z7BMFTrPeHQm zhkm|7I6RIT(eoR15iTDJGyP$WV#H``%P2>^R;|b)e>hxN(lC=k&N71~74s^g^+*8< zLVv=M?`Jx>v5ee-uxTAQlODx3A$d*K9(n~D+Qo=iu=H4Yu3R^bo^Dn51{tT$<>)}L zbv4pYmHK1bN%V(=R!%?l>`&nQdJ@f`UfmNHoQtjU4r3oN7|uWmf>O#VZXXO->O9rItNFIfS8**aPvA}cX1A^G3^-e#fiYvuNurpv$_>I*0s^N_wRFszOsFJq~e%v~5Z35}fn zY^bE#ULhR1i!u_LOWi`n6K=}l*QwcVcecGFJ!BgiEw6bueFe3V(#YA})Ts~BsqkN4 zL6zXHI6?EFh^mQ1JYrU4l|f^0Kxfa4mRGB@-zY3@m`Ni3Cq7g1vso!D`6ebeWk>@m zBr@dK!05mLry5Cc!`)_$HIGQ*wEqkLiIz!dM7Ap{#teXp8(ubFN9%B5F=3`+OzAj0 zWbx(9QMGL#AG3_H&;Zc&@Afk&N=kY3D{pNQUO7{M&)o&*-AKx!$ufbyA(JPqb12F@ zeaGGSUP3A{HPrsgg;(!}imY*L)aGUxPa@{#vc4`4NBj>1`KE8vM$9A;$8G!2sW`%7 zBRJiRn4VB$EVRw3exmZP6_?3u4Q(~YaHN|KcJ&x(locvhSkXptSylV{ll>!Ek2YY; zx3b>yX5+mV{XUaK4m{*9pQ(g<0RnHniO%U_tUkXv=1Z9UN_Bg$#$R3sTJ9?>S|A~j zgnuq0wBbm$5TCk7;bAt-Vj=%n1Q4myn46wimCO=y;=9@C#5q zG&*ADkSS+2Fsh&>YaJ+0yr;j9FC`@MDD&V|M4mw?1LXshrJ>}e{;r~u+mTjg(p>wf zIUCof-Hx6I(RrQbP{Thwc@8u`p-uMNXs3Wou=eyxt=S=mzh3fx5A|1I>#JN^>umeY#)04&BAg71uHZ(%p?)rvsm)F=6!wnNBVrAP)W3tg$<3)c7qmv z1cN4Jz}~90X^3NSaS8e2B=}ZBLVQxVog&D|a^dAkdPr>>NExC?m>C{$1ypjaEl!+8 z98#sPMHc&Y5l2LN#H6V~#3QC98TW-1y+d|aCu3%Ykq|)hJVbx#Ycb&HgU=UEAQ}D4 zVHQWfiG1b-?35B(i3NlwyB@p^soMUC~mZs_WRMFx*a{Nz)`OUUG>=Qf)t>nU~$YVx0Xm{2cH{{7Ze=aOvtGXz= z+N{64zv3)RD8BgT!a@X=4k6HW4@$Eo=<(1OhvA4ml%yqHftb>>P{|9gIj7EOmqm+J zYnBMgnoYM|4mH&>WR+8T^M)LPW#wRDgQBhEz%@TzOj1u3=8*?qDJ)v@ksoAjc_QmR zVj&w|{rJP$s|Dn1pOslGuYC-&l+#9E^#(n(A(1nhmbIna$kFbQdsBuCHLMY5(YN0y zG&arplZlEm`#wHtG|p>pmdtRa?Z3_Ia#DQW{zKY~PjS z?S*WU@cMbWkj3=vdHAm7m{v356KX>-a@o5$gQ(zMbg}7Ao8))Mp$m_M7akQ>3Xi@6 z!Dq!y*lEOFGsl@Vfu6kD+u!Qq%sH_@^85EODJ3KV4~rXw&Hq5J&<%Xs^akGHi!&z9 z#%8lxM|ZNdoz`hx<44{y^M1ccIP@+(C{pilQBLa4w&6sU?e=AI?xZ0U7MHNwKfo^Z z5fZXsVDJ5z&?LO_0e1gYsKm|Fl`sWcJ9{FzaLzWWw3-pJf-Z&g-h(VMlR}<)RE0nj z!_Tf1V((#e%5L+CIn{rz(8&^2i;*pBTkYN&;p}HUE{q+k>oYD5XaRx)4sA)SaM0R6un>~I9*e7he>Vr4)qwbHbdCzWW@3RQeCmJ zeg=s=`pYNQmr_2zQb!Acd>NkRB5jaCc*8D8n4UpX-+)hS?;mQ4ix)^pxCgM5!b3C* zo97qddLNi>jskO7$CyX5iWrL|pW$*zEH{%z4!i@?g?pNgfTla8~lQXAVHc%52@}r7kIe*YgmBq_e<4&lL_I640A4Tpb zt+NB1t#O-@Bjt)|s)`F6W|EMl>#yr4ZoH?NOjH%impKnqqiSeq$+NvwoV_y>Qm_Ng zXu#e#)MXw(t~}b%x_Rg_361bI2#EXS?r*Ik{qu@tz4hLj;*7*>H`RWr=E3S$tCm-^ z%cdo5BxZw7l)4^?ZBW~+{!u2<$;G)rPk(PRPP#S%G_(ew5*j&koCYAH0hS(LQ{05> z3#i-&(Hr78`2vPf2OD#ne5sH%HQG}u=rW~>Rmd;CZIJv-j3D*zqquH(d*RfuEm@4N zMl}aexHxP|r$=K9M7ldwa+fpFt`uw8w-~jQkfsIs<>beUrwV*^iO2`kwMi_nlk=MW zY$O}%wV0FPWHus}czqK}l+ego{#zxBm=)w$Q?Y!txBZ`xlpbALq*>r5Qq%Q}vI(d! z;&u5H+9h?0LUEv|2v`4;@X46(!<53M8v%ci(%e>0klX_!P&;$2)gSA5# zusNdf8FUDD4SA<|wMKK1=+q|p5mvL+0MuQxQrN$?h`6x+{EF!o8 zE;^`DqIgZB>Fn?r<))Z(w0p=pmgdN@t1x1cw_=3<)mIl0Mk>Hh(3Csk*RD7MkaE5D zphBw~GWHEB$>%m;pro(GGuyv66nkY0RhCg>C*#qEyB(}Lud-@L^cs93eNCRa?FvNF zx~7PGopyd=2o>%tEnfZM&K^Tn5sr4UZEdVwL#NaFhM8|+z_F!#R)2J3(I9KQ4t__K z2kS;_SJv#DdtLSGg5%urE9S2Gyi0)U>h@3KP}bDe+S{AVv3>ocT7x}gPeqVQ%Z3H& zM+z+eQkrmPP|=O_18YwQ$uU*Yw)*pK0qV4JHs_Cwznh(fE2hdg^VJ|}RTS;yRaLPL zX4`!**+vRumWEDsXM8Ci!lzm}TA5{+%i$_}K}$R9Z^`*;BTELK`_fJSFRArZs#tx+ z&LzU8DY4xfM>b`BPr{}*MtyOs0-1;*(PA;UOH*9eG%J-Z3Y(EayrO}8Qd|7Ee8W4n zMY5_#Kz{Dq)fm90wwde=rdMA#JJU}|@7EV^Txv;JJ&ruCLtrfKj9T*u$m=qu$dT)d zS1z7~hO9n|xBRbHEwmFz{pMobG8_zYHoYxrrB?U(XuM>ZuGf*YuDF=AZ7wcGN}O4K zLC$?6GnHHCgDu6{MUFW&ryD*|{foMA?X8vns#qs;K!JJsI;u4!)UsBT7ahZT#SkKO z3`D}67N^aiBttq(I>~Et)`;kUNM^TOcu7};+}x>Wy1h)BEjP$GReldr(;D0GndCL$ zZ*72nkc%%D9&9T*WQ}oq%9CWQ{)kPV9#w@jWTgRLN#4?|0@S+b$Z}z?0iqGTOSy%v z$0dD5yV@NZ=8V0%(P+OtH55fifz8Ebmn!6{ixWIZe+3=96$^ANx9JiqIlDFmMsiW8L_$JD-Fk?B zG>GqSyNjhW6Pbr{#8aRF?j=2}J=}_n0j%6m8q>wZ>_#~f67ko`t}K~%eZ!4nz+Hse z42#^=#kg8?++eQNYacTWAa*VheCTb-Yvhl6uWTfG&5c;oS5gaK@mSogmyaR<1+qKz zce>Ll1Pw2(+?RSFVo7Mk@$x|VBI~mrdLThf=1zBv$;5I7PolHe)alc9xk6<3RxC|3 z-x9~;e_uyV?R;dlP;pZck?7@}ZmWSA?nDUm_91;L7bL-(sjwn>4Sk;DO5u^4i$u1t zBRs&ivRY4OKslC=clII^<=xn7KC>Mame3Fs{srXtW{bF=?+z4iS{6sLdK3JN;$FEe zWq@CbgRz@>kc^F%Pz)3oE}88YWcxGW|IY>SQz2|acBqw*$}NZDvsM!XI7IkFRPiL) z7Ame=Iy;q|(aNSSpf^N{3zx+aPu%5<`}A(PFCL28JTL_CV6{UT%_JTvHZ;xp3%c<2 z2sgZpGy3HNLfe$r5Eg&N%c9*ZT#%@8N#BR+x$~qwT3okeHY%)BvdzLh)suM{SsbSo zLas}X7p0hCjeuKqmzS}6U`g<)cyaxb*@%d8fA7VLF4B-JUV;p22IQ)<=B@Ekpme1j zI|uY{Q2Hm)IkQt~veU9f!u`qO$5|vSNEN>_`|7ilJeMjq&bkDZ_sQ=K6rGFwbLwtv zxVH8S)i22WRdqGrtx!=Vwi!oVFgi717N^{Bk6|#&7)FN!@$P^%XhedXY_VxAa#ga5 zi;P1D6~CXM*teY#}i zwo-T}P0#YwVqDx9-3~>oh0zWhELq54-Ik!ZGJR^a2%~=qO|+;Q^yHQb$4BX!V&w_V zl2q1n_q7iy*)eVqF@*-lhF!>jku9!Uke>OPoK1gclhB%@&A|>$O~u8E_@X+tpL2Q> zzJZj|+A5EV73mu;E?OX=5$1~j#9{S=UssYBWKT8=KO3eiHhQ}brHQ?rbr~{lu2;k5 zI)j!}DiAC6Hu-)Yo1c_MWOtCOCw4uvOj!PDS`ey5GcAeLvbJ~h;eI;aF<@(t#*G>z zMZ&O=?YE*JDNR(n$<5Eg2Jlu|5)RSi5-fFM2Zdby16IbvD3P=~r8goQ6)kDcEl?@U zBoXEWH4^Q7y&2g}(a+_p+O2bH?yJ3x=BKTGq0ZNEZB@ne)jy$T$z?rZw>A}23}(2F zF~2^hb*RLC{PXST$NWqhq=h5v$#&15R|uv%in!R$WtF(m@u+k6s$Z4J322n8CzPGrjVI~Demtj#0fIy09Olj&;GkB4iGJ5R*qewG4 zUoMZVBAJj_pFO)VN2D}zwyyFDWT##syt%u)*->M7u^?~XkUPmJEQo@oXfvvOVuiG~ zK~j>CV3l$=qyS`f5suwP=L$H9+OwC_f4SKKHQUkVO)!4#P@gd%Rw%X;6-r8Igz0-n z%)c!>u@h|*nQ6}Jh%r&e)>>*pbAMj_g*mTRew|uBKD}nAk0+Pm=B=V6g{HFx77m#z zpUKqf4Oyc^_AKP54-TTj5)w@5=B_8FpSiSI*m?-Ovj7 zd&$pA8!>rg)!J18e*pXb%C#u4s&phx>w`fxo7EfA=Hax-9}JV9-U$Il@|ryQ!Q7Qn+>%p0)t+?&8Z*G4iNd>#iiuI2}lAG67j3QT>2iVB1jQeihiD~ z26u@k@sYt!O$TcqRCTnfvh9%pvhy&6kdM4ACEKewQuN3c_Vie+U2I3hq>aV9#yYSn zC63|~>1%SX9a-hyI*OGVw`YVJ%Zs;X=6p7kVPd8MOWfzvjK%!Kc^uzMU&CrZ(JuV@ zc+m@sM#oThkJ;4G6&lT(`+9KSb`t$0c`IJGefZEZn&0nKaeeI;#CWKypR=WQbiDD@ zwe+ZsFxKUxwq)STJTZ9sV|YSnT)YeSUhQ8lZe0c+VVrQ`VU64=Hj^=Cbs?#0+(Djd z{{3R|t1lN9FP;4txb&`BD!lN>N=Ox7{A#fgS8+YK<%;40%`LaOdJi_&0-kdsbe*@=juiR>a@*$2cahVlf7t|0g8_wI` zC|(jBt;s6yCFTzPKBq! zeUZDzmt%B-b3dH>LPc-I zbyWweMyh(MG*v4qKd5}Z@{!6fSAM=SQuAD8d*z18x{5a|o~-z8#hul))t{TUthTE9 zAIQ|cqyE~tkJaBX_p1$mtvONSuUJ*nR{KEBx|(^_p_(7mZmT;Y%hp@#Di-{x;l`>r z8gjMAE_vyaC#sE?d|kG~H}{%`O?B_gcP#ji`h^P`Yu>wL*CnY-?6U98ZJ7IoxzYMW z?d7tG1skjGsTix<#=EBASjLzwNs zEwlk*z9oSiz|7LaA{F+Ud3>*r#v!S5wtRxI!7_P`SEO1JND2f=I+&yO!9El65bLdq zg_&~6@Z+~OF}U33=(V)X<3M&IbGBg*s@Anyw;5HV$%kO(Y_bsWb5r4Q#490#I4mm#-cQMqb}3<1R(0t(pTJt^E5v$j-EqB?tl z>fS-CmZhf32Qu&^?9(acr1uYfJ^^;Ypim6nHt9pG2R68$XAV) z!yv#FidOFyseSU2MKO{@Aq|tGB%SYH%XOCe=5l#Jed)ALhQTwt?atXt5m zAyR}p=XL3r1ruV)$WESBW1d(EdK$;v-fC+CsBSX-uJLna zD%xU(X*!l6)_@?!eJrY{tUO<)#%##k?bG95S1YQPK((Byrq7nCQQr<%2&X<<)SHjS z=<$};yrEAd)4b#8Trd;@XQXU-W6}mrul-Azn)7;SvzzL4p)WBFCc{wm0 z<1oB{;e4IQdM2v^)lx!(!TR*r!!UvfpTaEsUAbt?6<@+GR$PuvDFZ{8=)zx%RBTJo zc%Z8h1O&~}C-5{zmz1Y*LW^As?a)J?AexjgcD+Hqq`bCaDRLphx*mowH0hhk0=;ri zV%eVgd*-Y@pj%EZOW#_xL!U&4CNZ68HPLIBQ8vsFS#P;%dFo35?G6&hVaDrW@#Df^ zitD4kbVq=kc@8;}wQ*on^r?fZsuL@3!#uG%PJW4?el?HKn@?!$wJgnc+fvTy!hK){=54SFbM@jp^t>H;2#{ z7!WWyex+#IRQnmSy>oOc6$>zx;cnzI)1jiBKLpVZ^9O6R zj#*QlmEan^n;J?{eV_uf6T)C?YIS*-sTmp-$LYF^sgpNz5Cqs2`^1{TYAbGRf|N|R zFbtUqtczuT{y%D;ElDib!RrbA*heosEG+pPMd4B9i!HdKZtb+-p#%qkU9gbiTdZqf7YAE)S-EfF zc}1f^p=lM%d$xr#Lr+DUXVjut6j ztoAqJw{#zII>3dv2gBZtg^=!j8QFKrOi9*>HCC5ty06@LbP1f(XxGBT5JMG%*5DK>RA6d1HS&F%3gD`=Y}Wem;GflXU+ zUFpcwmgfg;BnpRW+ZV^~@6sXOnL)W?Z@HI}c72F$2TB|}Q4Nd|B)x^#F8Jdd-&7@H zoul2DMReLBuPa)J*+8#baZ+{5mt9kCZ7Go{?L#V5;v9_(scyxxm2>7$W?D7z!ixC| zjIx2cbnUU4pH#nHVXj(DFT*_0L%MlVN>p1?>Lfi@OWft~_2#hxwmTAJ_gP%I%zR7E z9-u*S()#81e;4XGsuR5mY6wv$ni}pO&@j%fZlxvc=;XR#!GAZ@Lbm&$ev;CViTR~1 z!aes<6`_qMS3`Ru7NYBCyOe{&J)>cBPNB$_?qe2{{JqfeNk~X!_vphBqV~&o4EIS82Y1yH_d5iLEtJD z9%J8--Bj0GB`|C6lgVgAA_L97Las%3irUHKsI^bY#S`|7BbdyyTB__rlBFM`OC%)1 zbe}0*mcm2l$5cCsVWGKL%NG+mYg-Jru4a7%i7JfLA%?QYeLqJ*rkOO+A!dKYuT~1n zenHixP~S4s>f6Lf|4{o-7o_b0z00RYEQ=o(VYEsU1zc<~B>5SU#U8s7b|Mo?gugsW z%fu}Ob(6w! zjf*3Ef3nx_wFkm^q?e>koc9EpD4`*>&d;d3%y<>G>|7?qpP+1z>}yr06&(swS8TMe z(>z?BLeKw{cJ@pfA`8&lfQKGfCFp)eYl1|R$gJU);#|~$?exK7cQc5&So3!m$nAB1lVZQeI zr-c9dRnaV4l$-eeY585&19otEv6>O$>)wXzox7)mVg!%5npnKT-8VO{A?;IaaYs}{yPhAb8) z)fzzjbsv)mm-}LW5uZwE9?Vwv|rDL6r|0kp4f8=v)sm}hNgv-DZXFy^IOD7{-05|2(eiShe7d-(QA&fwEL>eK^ZaWC z`R}KvY$V_O&6EwH%!nlm!Dmj%j1|jjgz6_NU!fPO8^!CiO_<5zb(&Q@<{xDH74nEj zXVgZcMD-%Jv6*kl+T13v{MVjbA$;RS$_^O9&C?}}<-F}al>(6oJMBpqh9PtgCCq#) z4!{jx5B^`q-aF2&vf3NZ$&^eclbKA~OeO&mLK^k#avC9l(|hj+1Wxb0AGwSpqM(>d zM0gVQDtQsHaM6gcX(EvqLA)vf5ifGi5Rpp}P~@UC@wcAy>l@JcI{6$d63&}Vf#=?E!MX)|hs^XSp zlTwtbxk9QFpy?!f^M9V(2A#B+jE=P2Ca&}nK78SqIR2IVGUc&2rK~|))?2a`HtLO| zXI_S13duL@ztzBbUI7yTIRD363dXGW71**`9L_=>Vi@ex<>!L&g+9^rEG$TzJ;4Qa z13GojdFP|etdfu4TD1@Sc9gF@w`)>uiMA@VG2xNM64q9(L4*U)9?T>G4{|kDG1A}$ z?v2;Lt8!9CWvme@*KmcJS+7&3;`idq-hfX9JhXp6z72hU;CFy}`38)_YSogli^eyK zR0Gqaxse-(9~uOhqSD^8aD*rND8iF!R!uHf+GiD~Lp2Me@dER}H2Ug$&y9~SX5lPe z{q??yd-pv&%CL9g2v4$iQLNhlo-TD&$V?ex5r@r{2V7S#O(a z${~GH-lJwrNh%b@pRGgsx8VN*9-z;0yvxpQZ{h#Lv4w+h$+2bfq-_$$n^8sVnM^@f z;stGd8w3e>=uM?!J9qip&-D?e5Do?=_ckWogd8r0RIAY`v{jA*OFH8(e|v7#Dj^RH zSrB^h{FWEibJoAZ4!X%Vhg7iq2ug}X5=cs_fsn86E;JyOc;5rT(_?$~LG5Q%W z8Tmwe>)(eqpo`voZg8XH_;3XRGM@{gygNpJrR7#6705l%-98~8 zqeGXhfN6c}H226rmmJSd5J9F+trSelS(!iDHY)vY+@LFp5M!Bu1A?hvI>_0cwUAyXIEO1KP%e^#)8v+%sFm7`tl~Q%cD5CI|Rug+>M_Kd;pN%+BQt=}0F%es@}i&?~Tt$(j9 zF6+V-0uBmigblRiGF8}7Pyogke7b#=kPH#NcU-`!mcy@kr;G5C0m+yTJbOk)z7IF) zXK{Qy@$P||L5M2fJvwb5NVBxcDoMNiu?|Fd{c}A`6#=;);RV5&H%@bLd+Hlj-11HRI*jmX$l<{qI0DlMHXGL3HoU<5s5yx zVizh6ytp2{xv2|bIk--fr*=2v4bcr%A{(L)AWF4V$mjPka=(#|#?X_~&^RF(r&7O= z({JeNMH~I_G3jk1TqgAtXk_(CR-O(O6#ec-2Pa`k2zcn|Rcm+$lXoV&7cES#GnWiL zDLQlbn@c|&r^bw<;gL3;T&v->29xWfU^lj<34|D+bEor}wmcMEi%kc<<08@Q*oz`ivZ zY-PZ=&dg*(A=(OPR#~)XD|{j(W4{RlcmG!WiNS7@*r+sJR%LQ})=x*#wr%iL;)2YahgH>aQLoi?#dmoI{AG`3I02SuM9sj z@*ktsfpud#krJX;?>V!-YvcGjGT@G8)*hr)A!o>@=-3h(1-hJqUkJ!(?ycYBz|&3K zZz_sR+eF;Oe=y?)0gUq3xrv3bn8h+Va#bd%0g<(1q)-dk*1H%6eaU6{oab z2tXGnY95PHFHI!TRp&#C1Y~qXIlpk9J0Bmaa4p0^kmMk8JK74c+lJIdC#1;LdP%D` zi)9o`QzukPP!8bU0G9-=L~yrLzzKnOZye!Ac7tNu+-$O9jm{6*aofrgx{T_sM}L-f zS4{|5_-fU^qs?$u89wA-jrM~W`wa{z+>#cPuj*ZXZL<(4$4HkO8R&8W4^FG+dCk;q z3_kV2Jt+c9l(;A5Lk>^VsPwTe4Hyz?F(lgy9VMWm{r`0ypvvy;-XWT{=5a0sC)n7v z*v}dCkRh;>J6SY$Q5T}pPsRlwl-H+t$DC74-DO*R3mFW+z6)*$06pf1o(6NPO#_km z9&HN?+kmc9byu!CX$d46II^Dm)PspnLb?G>cQxR0<-mpn0Vf);;Df6Hv2+JnbcwDz zy;V-1pb0v8QEq>L1#q;DrtWgITi0Da4Yn%KL>oa@435%(a%S}hTcA8=ute}BJ}DQy z=~F?jhg+Y6%nD~3y4V9r3E3<_;|peCNIn57W-Y|HgAkVigq)nq?SIEaYO-buEQ6rU z2CHojY!RS4*9QSd4tzqjrtbE2CuL%=d9Q62r zb&$78`b+I}#fd?hV4eDSQ4}7!=EQMCD{atG5c4Ajbu;)Qfn5m#qQGJWCRHbcr9z1P z$+-Y*H~%FO`oP{DTQ&T`(8Tzz0r|*}MA6Y}#{7^mXDuK?z~!_E>xOLpbh6qkQpLEX z$||EiCKE?Hys&Qy$;W+br@60r@uGoq{G()jA#o&FWn*P8qn5rD}qAfsa! z0OTS-YHj4SLH?@UkEHA`JgTWtmnnnalWydyHlK~bGS;E%FTpq5#XNL~0cj233 zOS(?cgg7UUlW7i>;C4iuLn8%Qxe{~u{fyk6g?{ zlW#-7D#lX$A}R zcs<};AY?s=OWBwV@O}&Js6=6Gxn#&xfZLFO3U{>Y_i_&wpe}tyYvcI$DLc3VP?3&7 z8LaDSl6Vr`oPoZXNJ8HTc<68x`UbFXXSjS4PXy48RiST)eoYr>DN^<{6-m)zODrHG za<0pDSB)=bA?nfp?jN>;sGmIkPdWTBfy1#0vdBF|Z;ogx9jDQhGiYLBUzm*7?l?T$ z7PBC)`xX2}`73c;B{&;#>?;xDNjjnyT3<7&s|;;W*wHsK-SwwQr3&eZUc`b@=rBAF z&|eOHWh19d!`+)lZa8bn;8UWr0Q&XYOaBS3(CjETx%r=K$%6dk@jpro5h)yB%CJgR zWYbXy<@;#^b|)d30FC|Ntyed2(k5OIQ0*&^3#kPw5hK+KNSRQ`Z7ujENLPm4NkB&B zgE=r!ZGLbXo%Vkk%ekMHyAZ_)bE9*7Y(sfEt7n3ymNepR<;(2^x~T=V5t0EY`%XaO zbH6*ojkWPuKyCi*cx@u>1o&Fy6!DrTSpf_sJ9sw1G@{tR;%j@`^8-{Fs@HM%ZXbmkxQKuD`a*lx5(#)c4 z2fh|i@zvVGz24~>`d=?O{&iCo)48c~BIDG#(>h%mxvzk)1ypqOe7T8x>I%3%;!Dx& z@vkcmWu+R1OvmMfUMja_km5?%-4;{P;Ri0aa`#@@1sx^m8TX7&k7h)w!9Nddfa~_b z{UQT4p1pu`z#PCKf@ITkwd)0nQQIvQGnauQqX=tGf^p$2hI^ zJe^}}sc1}9E@)-s(?5R}^h81)65adaUe5M8yc=5P4vfIbL3Tq$+sv9vVMRhwt;Q+_ zL|p|f5E74kQ7&m?o|Q^#j9-AtUq& z*J?pIIE~;i=_6k~F^8v`ZSKGz3>aDR5ipV@v{qx)n3Zc{<$kxWLtp(o>>P_(Xfm$t zgY<3UKKMK=b3kN1fWr*QBP8fD)V!Xux#I8m^D!NTLf65#FQ%gXbH2WwaU=KZ>$>2s z-=H1zZXb-p>iCiYDMaU7Jbu>bXNSf_@sS_l7rhm> z73gUk>_pCJOQo!GGP-gj2-!eXmO%fG4R}pAz>y)~p)Ch*g6->)e_zl2;s(66z?8w^ zNo2}YnqDhp7zmUsmX6Vywn3OM^f|ip>o8>mJT&=*NupZ&$=CUt$AORHz$}JpO+qUZ zd6~}{OeJb5d{JM6_TJcCvr5QAb9q z+FbWFd@e8Mp}FzD!UprTG6wksL2wBl}&`7b0n1Kz4N`a(|$XSh`n*}@w6*&#?eFk7f z)e#7SK%xUjtz(Yqm&+s9$x`Q97iwa91lUV^&MHp!4f#KJN zX1FbmCir(iqd$sP0tAD2i8W{Iv{qhk)be5SpU>V7{}J#Y0Bn}Gw7zsZR+AcCZ3*mR zHh((-uDSITO}@SO4wwZ(9#ZajelPdH9k7jHRG$Ml`io$Rw5?I_-gYv1T~Sh!m`Du( z@m4CPDa8pJfuJ0zjpK9Af|2PE=$$q{uyHF|eG4eDU@UO(6G62Jh1pb=p~K~TM_u;G zBYYjBw?O*@JQUt^3pTuNM33CkeUAuy@tYtJs@sps>f0`JIb$ZxL}l7e&TmS9Xwqou ztsqdqgEJc7m~jFnbl}#7D&F@kkO<3rJzfWWiEW283~=``n#oIxlscaw5?9;?-6-Ut z!-wCy5an;{zEA46@7tt)IHHeqXS4%$PAZ#^`$}S)TUO?$-~6|`>sBt}Akn_FNOCcx z`p$y9=y$sq+UUSqytw+cQ@aCgZ9yZeR{TuEQ^}Ib-T7T;u7E{yK|H@7&7gJPTj)T^ z?cD_^A~_^T9=m+>-$#B7lW`cpKaq0g4|04wzH;hSQOMp4Z6G?hs9j>UQZBXAq|X(7 zaXU)h*WIz|W7K}&(u?lB{wYcSD8ApRnsM5u78WbT9!nr1(Vnv97yX(QOne5dNyT%VDWsKYW zw8|?r$txCDJIHTF-oxG169OKX5yRNRIfL#x4EoOg1peI*$#|Y}d_1ibfWOe-H`r`x zvzBnMzd+Zav+jglQow^-&^@rdy$eg?x;qy}^gn+DBMS3v6SR=bkX%J)QP+d{IvsPR zEzvk0(RDZ71!v@9&hdD-A)*?;{H}#sUUfH_!#LKA_ivC&Wo0UyNoss{Rht6HxFdH% zx9Jv>2|^scCnA?f_13K>}W_w7i_A)S$mGh&$F+S%%K-b*E2}$xnQk2nwO2 zGoJ>8HHm75`^)1n@4#qxUXggoTD>%T7IPW?H5uz%$7S7<~H zR?3i<=ko@YJL%?Yv*wZR>QzD>awheFxA*QtQ(W~CEGam5U>gK(F6(bTv1pY6pN(Ru zB+=<kkKL9Pr*BRY@GY$e_`#qv63xYsH{q5*0(feKbZ1mzk;inkc^aX z?YDCG7n0imTjbZ>)=6eX>WP0bD;5wRp6p%%DnjtI#gQBkP!!VOsE#N&v&T~C(I>mx z)}53KZX6fyMVs|EOd#7+UDdxp0=o67?k$so#^OHs&A;da?)vNYeL;jwzwHJgO@s^F zkd;Tb`7Qs8c!s7!>^v$G@mhKS*%b@49QIa0CnlB!GJ{ zL_}CySlNeT!^pf#K#8>{D}mnpnQB3Ecn<8#219zsN1St2L+ zY%4XVn3~>X_LBz!A@N0XPDjdm)4Zf=@s(8cJEgOBo!#S-h?`oTfMdI3K)f zg(cDDw>CHMYU$w~u9O~J^1+QCLLHhRPZl(p5cUFY!&n*sS)7E6<}%kU)aQfw?&#{u zlCgrQGN1*VnKuC9`ltBvwU8L=z*(@|$jvos?j(zBQEsWnJ8}nQg;?GpE-FTl+be}B&L?=6*PC`vp1(oQZa_vH-z$+-^gdI|bM zz(ZS>eaP#2uXzc#275Y^9u2AjStX@4C!;B{qeg8XI~in#o&*Y|6uf@!LLDpZEnyz zxMy_d;I_e)18)z^4?H^X{n5Yx8u-*edcZZXdtmFp*wX)9+Fkm{(*Im~!PQ}KO9{p`myL%(LPaQ#gypMiKiy+AH8Sdn-kYf)Fv*O&`z8? z{`Ju(#y>Y+9QTi3IKI<3zG~$=E1zHa*vcQQJh<}Hqc^Y2taPnBf92_;rIn*&e;s>v z?5AVj9lK%dim}+3bxbmL>e%p#H&*<1#e*xpwPN3j#)?Z<=vJJk7+X5E0&O|vXH)3r zZwwF3Dj8X_OgU|NrLUr;(uExRz|;V>RIQ||Ooa~QHL|wC&6Z5^u|4Yt&cpPgLmzDz zw5m``sbrGNf6EsS$#iTc9t*MZIHdE&zae5Q^`#E2ib+}?dEKP*%T7Pa(-p}C(<(T8=lGAZmZyl9*Qf(Zh*rIh1Z?M)732l-EoCg4hZU~+oOB<7K>$#7TxK%n<25c zA}L2_eEsr@PNN=Uvzl}+D+8^QBXi1)(4n(S)rwBhA1s@48rGRg(SGUPU3~epy+A7| zd%);%F;;78)j9nEP;@-`d?1~(*dt!p;BwFrxT6&vca){nxvV7}kgFAT+4hV1;x3n~ ztWL@EVvRXmpe7VNStX89*4AuJT$CE5+Th?(p01SE8g6~rY_rPBjqsjBJeiJ$0%=XL zAyE|F#n|XM?H8-jEF*kzQ#?zBTCQ|LXUw!S5i#G^wkc?03bvGrQj{Ix2D5S- zUtZxeQ&dIVvDlfU-5VVvb4t;Q75t1kRg)Fu5vJA2p7jW6Rm(A}R)$=$hBz!2*EOkg zVnj}}ByrFxiKde;8e4HWJ@XBop3OE`chlgDMttpnL86=H>AqryX|Q5RE~509wNb<8 ziTtKBn5M%PRmm;0H@!BUoiDBeZL%aK&s93Jot6uXAoubNxh=|6&6Qjr=X2YYikZuJ zI%5w5vWvV~2-^cqU6TF`Plv46tSjcDLiRdqtR&Ako&2{E(@8sNNl95u%8UUSvv}$>w4nx7&e~ZiWF}O(sJ;J}h;L}<7Ic?f6@+J8SehC7 zDWTVkxeS}jK*BL&Q5`nYmhTYx^{Botb4LDNs�x5l*-4Ngz_D-5r$)xsty`8SJ(K9cFE0wXiHWuCasuF^|J-sa_)OFEas?DMmBy6((u{^L486jCdyszBTiS)^=PRvdC> z_`$8zQVu#HFYDF$prO=AZ{s_&;sMuXL!xSnS|lxtl-d0^EPPh2sAwvAYatnNuqwTx zM5~9%Pb*?pWAdcx1(Pdm3CY&%CT%Tus1Ri`CIG}u>8xfH11m}Ka<17DgJ_#Q8t|PY%|lb#N(NryU02$n`$~~Ae{)M+}>Dl z<9@!lwwa<>c_miUr<~4&eB;GDU7ct$jdD}0lh#VfdU}nK&`Yhdoryw5R=H9qRx`PY zAClUXn1G&A6=PbtE~Ql|4S$)M?eAShNg_ZoI-jTMtSCc`tmO_;zL1f!rEE!3Ry0*j zZTzhFcyhWCq&k6mspX4lDBAKU`D?+K&@#S|%|p9d+GJfZ8Csy5wT#)VtZNlisohBr zyus5Q_R1^+F9TWGm31WW0Jb8DrKU=H)wl8Be^ZrJWEzqst8ZfhX&2ifmaC&DR5pvLdH1^HNmB zChhgxLX5g*$P^T-_=%ZkRYt0)EShPDLQ{gwz}G-|eE#HuVmlQugSNg9QHdMT%_<^4 z=MCv0IM8P8_>w-cZ068-{|8F3PMn~V3Z1;w(H9)Xl>aFCan*04=vKm{QP4THgN^uy z3BBoR8t9<8B8fz5;z|87GGx!y@PY5<((CHsYv*05zdmMo|h>ZBp5lY1#rzEw8^@dj9m342cO)0K*d-dy>ludM^`mkIA;1}BulH!`2dsYDfOxC2< zEVnv58N+hIP{(6wMoz2Utg$L<1*I20!P8^L02MLTL!bsNiH+>;FY|OC_@hKr>atg= z)0ztLp(Q-sQIOJ7S-@wcQm}W%L|@|R_Hv%8cLHkbEMv9gOHw&$m{P4W+G#iINT+pf z39U&D|1bXmL@qNa9~GC06)wM0p+|%cDkw1(u*D0Bn5mizGJD@8{i#yvjSyno$Y>Lq zrX{hw$QPIUJG8ozF(xyeM48T<`!~M-Rje^sW0K&qVW+d!#P(*;V*T@+`x z^0P!)q?uXP6L3??NIvc?F*|TTAy}6L9lG(J0r)wckeW01rmFd}%+oFkG zK=TYJ%SiNwTHG0?%*ptgHlfSCrV86C#zV!pU0HHx*g4W*xx}tu5-z(-7OYt;<_#No zG82n9Wwus2)6N$1%tc=$Qe-JlnRV7G8MjJpHJIXd_$$7DC}lW4Usg%V10IDf=gJO8 z_z!F{1th*zr}d$hp&C%g))Kn3Q&7;^f-D>NQh|aqddg>c`eL7bx%n5QKGKlA5)K#S zArI58c@+w>+LcmqP&rFA>9E`yYRf!Yh4p+Q2O>rNR72CI8>O(O;+9T)kEe$edOB6D z=~Mvw*p@|iM~QriSwn}59*tb$Z&{m};cNNgES-h~%uGP)D5Rz7utndeE1FVmlWmkU zC5bIRYcw(uC%<2nbRH>fSJDaASWMXqg1#$=>* zo`yMAkhy(^=vD_rYdbffwKtV!h5*;)rw8ieuB<<8O8M_7y17;|i206?al} zE-xvl!9J+U=Foe80|ktbOdPi_cRzaySNS`3gK&Tjxx>aeRO6Asz~RTszXv@3MpuWT08y{df;NyU^o)Vp*v|0!knT)j1)GMq^)KBDG_94g- zu+ZU$))CLW2R{VgmWhGQ!;gtu;u3hvq zg-Xk;3KU&-MHKybqz6W@#bgw&gBlWo9jCeTmiM5VV3GJJWo5-aItT2k9|fQqvub6Y()&{yiAK}0g_1}%4t*&k<7iR~ckg)5EgBnq zc+@h|7`|CFwe&Rv2DE=-2f_n}<85=)+Zhd&W97M|L*9@;rp`kq(2s6j(}S$Hi+SkC z8azaI79nBY8a&S65{083iAz+>(4aF+G!fMriosAxpCE#alORaI1OMZ*ccCY8zudt6 z=Oh*c#x)HHBE~g?LGDho#t2~E$w8f9lc0Um&`2Q}Ih}hixO+nn5_W*rSP!2Qt+P@h zIJ-za-d+nMF62S_JO~86=-|&ca)EU{aI8vF@_d6TI&2+9P~oo@Q{>}ctcQ< zx|ch93Wgbv5)L3G*6&PAt_c8W0p(O!7^R~fM%fuW;{{}b+xf~&4`M^Kj7+1CdLRXT zL{ng@3FO+;+xBtlp;t3j?l+rYTqmn)bJ#+Q-Ib6(JPH zh^8?@8erxCkQ;{cO94a~V2Wsh5;R}ytwU&YZ({Aqia@G|tELyc{vYox+mcxD`p0;F z!9Fk{c#U@eLj}OFAjL(V2)y?6-l}ycEpqqOuY5^#CZ%AAUweGPuN|-gn}8XZ3T9Mb zsS~WLCojrDIKjV*(5A3$xhC~20;)D2*8sT-r32h4fY`y-w{xMFPR>O~L~9m8B(TK{phw2M!_N&3jeLLf)1ps|pLs&4?Nooy z!C|gsKUG(i5e*&cn5r_R8(E|j@8F@jrT@Tt! z{i(HXvs_Nmk`oq!^dB2Cla%tvM7q;{9t zdJy_8;GxM^Hf%>vJO@due`4$5KnK{9acDK!ljWwm%FCz&QMJ*XskY2@f$}Xrb8%-G%tFVmS-9-|>5?AgRt~9Yfa%w|i;9q>2)Yz>vk5M&mt6`q5U|je^`k~W=Je(>GY{A&;J@1G9$44R#S0>%> zNSnhoRu~%3BCaN*7jeq0X^(qkoZ3yA`yq`5{W8DJxZ}Di#Z(EF>*^b zMk*@x_Et{_c;JOdT>NIxP2OJLiR%n>pRac+A9$I@K5x;{FOM97d^1}HT%t67vpHd` zVsi&@&?(6hX0)qaS;l1d+RSoss34C*$OFEZ3CR6$Q1ryux*<*!=>a?lU9mYLOgtTl zg*;-FGs3sM6NR=5c8*-#<>F*gP3%GrWRt_dXX}- zHAvwSai|TXH}>aXzJH8$?1JTIVCem6q)tC=LYIHrVAS@s0c+rvh5ffdn3h{-ar^cf~9;07cXcl zN|u#{OR0Fpsh4@#{#EQ0sYH5$W3QkPI+kg`k*$1sSt>V_e#T-WhlZ$!KKFmIpb$@Y$@d~%B#^_m69R(mGHfgjHA)v z#damUW^jfX-+*NJ`O(ja!VnmD_s}R&6XD>&0|k&wris`{8~u=^!VE47`j8hgf4u)$ z7+wJx-o%Htql?;4ZQu%@gAT!Od>jNxI@A|$IOTNBPD40mR3>B4+-6v`pSuor4FRj4 zQ--9Oy$+uWWspIpSvZ-Kf)YR%1QEGH9tn%D63tjQc=TL=W<*A0=`fiakL0B1xG0pZo&+T6G7MR$J(LAJhXr7RNsky zhI?s0Kk_)3l8k&AwCORX87S+@Y}q5Fvgqqy>FpR_Ohx5&r}rZlH*#yfif?LAmlo`o zM1;wkbyyOtp`CMzWo-Z)=(p(;H$YVcEI2f7#Tl1>KE*wF123n3T#l~nqGV;AEgj2x zA=z~nJ$j(GeS9$$9qVl8HH3Q(;>N)6HIH|1DJhpKz|qHB)8=b-i86|-vVB58MihGL zBJRsK;=>O%ew=udj7}q7NV}w(cDocY`f`#4GJUhvd~rpy$ap+vB}6K*5Se=xvF_DvR5C$Z zA$JX%b7ajncJgFP@CHEHX#`vt<@C_ngnx;bOSU_2}hxI9mRR3dAULJ1e zsAAe>l(ZU|VmPeNF6HY}aRuR)>`KJa&R8NcL#*(1eH>tZIt6XUZ!%_6GDiCoB1gk^ zRN&2SGApXJLQo-5|E4cywk{W!JSk<)4;zP1tIw$K;>Fj*c4dPCORu}qc7;biO~mN( z$qJh^O2VpuhgAZ6)9(pg*=Pi4iz7tmizaKbsc`edVxx==HWSL5+(Dn!T%ykU5)p3= zX~a}QW1RH>N=nXX-M*j5v8oeFHso_jLDQFwnsTd%EwFBt1>&sPu6=ZH_Jiz<&Txk#pJP(peGD zNE)?N&S9upL#Di?B;UG~r#om3Wn(Idx)Ji4M$&t=ynJ1UmZ*yPYQ+(&(TYuf;EQW) z71p2iYn+s}nbxMZy+G*Zl2yq>#oB_{ppge%vXuioeKuv(F?mR0U;~evR5p7)-_K@m zUI{L18AsHmv+8Av83*~mlrgHQ0@Z95Jz-n3kXU*zPq$=Q)}U#Hq)L4~ZBm@Qp48K% zFx4d?I%QU-8aa#nq6R5$tSK{8!fXxCG8Q{HmaqdEo>8(Z=yJv%4uO`l(V@4$!qd|x zup0qnxLqDoxn!)0*plnUR71?L>Uu(v*MuPee~MW5>PENSO2?Ccf)x&wI*g_70L#U+G4=Zh-KTFM7%zojnI@s+Q|mgQdc>=>NO%} zR{JL4u-TxZStQ?a!ro~{Q^mY}rQc1F_GVmZ3&MxHLoOPHzy98hxdg3RP*=y6gZ zZIgCKsZtyka3LT`i;3@BU7PGQXn$00Zq@xYWje8*-!-&8cdNoy40JXkl{Klo*}flF zU2D@<^NSRHy>@tlF|WMWm9NY$cU;IYW_hFe$A`m%T{js~eUA?e+K!Y9*x3(kPan z!_)Hx$fT4_MvH#8tmb4lM0tABFk7aZcB#It588D`iSkLF5q6pxxg%+>ttWu(k%WssFMTrw%~jHs(Ed2rNdw0wHG#O#sBELRl^>@u1Y5?N&ZpLlw^?WDDOnXOg>U*k}A%`H5= z*_JRCnH&5@6b*Gaw)W)(I)KHtvMLA-b+%+S#We9^uB#%U25q*tEqOybt&wM@XNk?e zuJS-9GflT6sj~Vgi|l-w7bK0yD2rTgDn)%!v5b~|lhBndd5US)jggSAQg;Un&sVg8dfD(fXpGRRf!gfBM=0A|@ zYjo3KYD$tZcP=K|$e*$bu}MOwYT{fqKov?=n)xd!FAv&%w5b%!NbL%%PL@;>52m`@ zP)gB}ER#zG<%WDMb;_)nbP#wX#tUvuycx?X*mUg7dw4l&u>rCer_3djLNCcAPX7;{ zuJYuVf>$POG99~Hk>17c|FWjU%+#aRytM|N+pXMQ6)7((CY)4JpNUA~#8 zUs9-pW0aVURsgOvX^Tro2t%5;YpIg9E!X>4DI1lXe;-c|M&(Q>Ez3FLE`6~?Z~H$y zU6pFGtlcLrnv+3?QMP(`0)n89{YX>44OF}$;_P3yWjrOel&Ojte_GOL#{yp>Ut3Dy z45hGoO+~k^Tr#Bn#9^xLNrpUBC<5S$I!DeLNpJfhDev**0l}YbL)cRzV3lUi=I>4( zd8Nu)ovEx_oNX(_F$q7<+~Gix($C7x4WrIr(k7$UeMFGksdG_C?Rn*os%2^kCCV!l{TA>{6v@~VWTqGZeMmO-|=W5XbI;OYPb!;G5c1aaKCxToB z6H8IHx}mN~1e2ER#1~0DUEsfBk45qtNyuPMNp!@6sO|~`GK@W~jI@i*h+ZP!xdm^_ zv+BCb9#qnvNFx*~lvIWlaMz+lK-Ibow8t4yXjn$?kY!Hgf2wwi*&-8$c!<0)T8J>$ z^K{0PqnJ!F)PmDa8I7%5M(EB~QpK{(N<~6h>$arq9O4*TcUEl))?!i3$}?4^tZh%o ztNaH^w}tX0J6f3`QmvWevOf~Kqtz<2by_aAhAhT(NG_V;={4}u&SbPYaj<7@(&+x@lVR%PL^d(0y7-szR>^cKqp4A#_)~H+JwgyA)jDq-m z*6sPWfd*ICK(TE%x)^%<2SkoNlB=Yv1m)!ZbWSf(x2f?{5r7`KtX(lOFQ)^G* z>5_1pRa^C$yc&)(wPY>vf2z;gC82^^>#5M`X2}6go(u9N#sUN35oKdgk{6elsSk-9 zRm_#An+3JeRgPxzZmH*WNIt={(l(ZjxxMx@-3sL52{(TYHbACQD(tf~EjF>bTuHkg zoOp7Hcp+!S&gTcVq060{hgR2(TDXq45-gjMw-eQvb2mErlQ*aO%ronf7#vBJPPFa; z?9X7#(OL--Mns+^gYSzxBR3E19RBr~ezZOg@pMo8Wl#SB{Sp37D5@%X=rWboYP_-% zApM|!|1LaV1!OdLDgfa<;r!(cH}E~Int)d{2D~9=!E#mHP&4vG%d0jhs&RlL02%Ah z2j2pHfPmMBAm~F>hi=1i;4zQUcgSnJWsVz5tllm$Hw?CLBcC90TDOB70S_ISJJ?5^ zn&zIq9ozvh&I-l@BK}-SX{nWETox**t!cqZsob||4cd8YZ|y1p$AiL;dXc5tKgYHlrr{bAHR_u4gEiFKl`w>(}Kt^v$0X5|2bAL3$ zY3>45FQ{)0jvQCt)C+RT;C6ZaowOk?aj@tgKLq{JVk(+j^AFICKmEsPE`KK|w*eyi z;4tVgNiCwzph*{RxwVyu)7MO)+wTSei-~}keDQ8>69Dl@tG6eM}zzMmqIm$!;9bX!6Q&Ipv zNZtosAfO_palM6m<-VRzv`S*H7AbEurHkcj;*v}XFb%yO69Otabl)7tY3O-GlgfDA zE~esgY1OA@jGeXwuo+;Kgk*G76ab%<2f?g_hA+QmV&HVHmm4|fnq8pr zU8i2$F)5UK=wrRb?Z4=TyF|$K)7~Z1LCE?AiLG$zF)<`hgTzSyRS9_%(a(O`+qU*( zTy*rl+ZlB8)uS`W@^DZ6FG8xn`EUNUT#Y?sFK4!2dn@Nbs3ajX&#! zrZV7hkpb5b+6ftFpv(cpY#h*J*|*}5NGVOL9!IU`*tI@M!^do~Z_d zdceA{m>^X9OV9Prm=KV0lr{i59hFXTOS@n>ft~aqhEO7Vam|wlh`UUJPV16#r6(Il z4?PPjLP$oU4G-<+#J|U`X3n{TUOiOrBUUwXzCeQv;s2Pe@$#X zdgzL0cW~D}19gD32?xiH%dl0$O@<05YFSG_?y|AyPrvK!SS6%#TmHNEX>2q(h;glm z(ZrTeOHz!YQ;C*hiF5I_D+BJ~J*A*~7p(0y)muxYM? z=OKKLf=`3FU%;!$L4$6Rwn?|a^#NDPY;cX5(6@@$()1jcd*+6 zDA+-q^`2Ckk%pOa(iC@FV-ATagzLNpt$7Jd$cs5hnfx70AmbLE$?Ybx~L)bajv zwiTWLm1!m%!BS4o0NjlTM1U(Qn7V~L$gBP2Ztfc|;#mYU8AA?{nVhf|17gM_RpvB- z9328@m%fmfUIsg$fJeMt#Q*(oQ=Ik{TpRP;!POv$7~w3ggwjH5GucSU9j(VqIb?qW zCWL^DL|5%wk1mqEy_I|54X8|iU13BkQX8u-3}K;xV%?^1J9TQC3|;XW%xM7`9eRFm z-!W{8d+jw`5y#xYwIG9Bm?U0GqGce`%EeYadQA|rTj6fG|5a#_fQPo+djTNHF`4z; zhCks23X227Pmu+dQ&wv#wr-S5;Tcu)JNf?2z5x9zt&`im`u(Grg3-~lzb;f9SQ;{5E-iDKLF%=#D3)uQ@-tqc+bj#a49v0}) zzx6OI*g*`_L>xt`;hhEGTB!B58^4_J|F$~!-YXO_RroKYeY+yKKyI>(IM8l2qb7gAE;T6OIz26#-#)&Wif_{t691nwS8&&g=It0q{@@O% zDS>cQ=*?v@WwnVNH0X&zJ&evhb$%MH9GD+pCFG%FN(jwK4a|eL2?*H*@I&NMtPqBK zqg#gO0pxNq8D}uzuf=PZ&4)yj_8e`G(jk>A*s>a;;!*@4Md!D#5|YuOSHET8{xLES zh(#^R-bye{g@w)A*i1A-q2wrhA|xZ_y9F!v>gaqQ=k(wi&|&2AoisXI>PSl8j%C`_ zU|otFV^C266)C+p*|?3@J_>k8&wsx+i2kv1{uIcMa}Z~HB>8a+5ZVrUa&dr(c?#k( zgXH7$+a?55@cSIa@d5LCNVx*b>h$BwDp;~4y>!c8Qpa4zY($QJJvhH(LO?}tzGnkx z!#9<%i4V)k^zi&f;*GGxvSfU8Y-;rMk@J>VhSA{erMKXD!k+ROH&=tJ@>%^W z{Nf1#(x*E_DayBtLL|^KRFkC zKR!$0tNaFJSu?Ns7gzaP*UaBCDVQ8a8U@$>i#fwz;7#l2gVR=wF_bYuX5B1!m_u4+ zPZrE{P6@hyJ=E&tT&R`p{|8*t^gQ6=cZ`sV9AefW345>u$&hjSSjfJN+|yY6Nx3+K z!Ft|t|J0fJRnu0;v<>-dTh=`I>gSyR+JsX;8=FWsGY^peC*z|1ziUj93p`rAX@2#T zM+pG&PDr_oeb^zzFb4aF9?F{$KR#;ja&xK`0t|JN|N&tFc zC+rSFGJr$AyodAdnkUzMj6cNRLKICffRue^W5px$+hr*WykzhVDKSmWF_ej+!3c%k4S~I&o49Ml+T&&>BxM95hK?Vf6X4 z=OM5~Kt_kd@AYx=KX#)YK6n0{RWd)@w3gk8q{r4Mg^Davp9{Uen2MD87{7_%dG5Sh zG-zG2#CqfCd#Y2Hz?K8vLj0Dqc+g=gq{Szn3OqoZhwg7VS;%Sag9OMnNUI(Na4{<+ zV0Mbp{p|dPEwU5f$$|hk_OX)O_0yGq#{n-a4&tbAS1tt51Rm+)xaCdZodI+#k|2l;dO~T)5uJw3rj5$(`8DW2&!1lnh;Sb-g63wf+lj7!@r*Oj zX}kaB4&B;4f6K?GLtpaV3t%#zWKQs#^v1pOp()53Z_VSx)R4HGhK%c(AYlH1Pv>=e z=eMsvITMBN`oy09r=I1#3+KmHrL4KBaO4Gu3VHgGY3>!v zJZMT`CzK!G%G@3?RcFnTAREuA;C7lpm#aa9fQ&?!UJTdKua!4&Ppa`Y0=G~pY$N2E zsEK#-rJPdb4Rx$qYbAr0>0u2nrUJ&k47A71Yu0m3{d^zY?jQ{k$c9>u)SMkUo6b{7 zl{)H3A)^f>ET)3%>)nu8aY{PF{n!Q)a8lHR5@-lfz0e(vEks8QI(5uu$x(3W|E&QU zA|R7X{|~AZ#5Ws32!4Ibj>||TRsSDjZyqOEQKb!c*1mOBcUM%c`66mdgP1aU+`t7=?8$E{VALB#io zjN1j3w%_~x(Z8ifRD zTlk1!bpx+?)t0I9pnF<3^2f1nOx!tqP;wPH&Lt%L+dWX1)Ka3`U|3BisP|j!#)z8E zpL;#4v)lT4yypxAG2mn}FU)vJZ)3#H-xx8O*BFk;teuLwoJ}iQHnR55^52TA?wsjk z@ds{w5prIAa)`g#d*`fh_!4L!8M=!%hR)74wSiX6$!6mQb;6Y+tvWcpnMz79kiq}c zZs8}3_+H{{AaSsCC-R4Mxeg<3c;tzw#gI$q>4&`%TAiKgfE5Z|<Q@ILnLcitv$ozrf zC(qz-PUd$COnMb1*_)=WJ%I5i04qwtwre!W(%&i6_+mq#R$RLYxnvB(vjq6ZD*;T+R{bceAxeWO$ z&U`b4)nWeCBF=ocN;6?j(zBzwv^l91uPi}v`l$TfHy~H;gQZowWQS?X$XBNKjNLua zoU#n=ANrldL_Cz|LSNwfA_11v>SR4Fw!z5*T&tSSNJ~xyAFHB;{p5|h!MOdbLam9( z=tASD($&f)Hp}^a9;G~tU02CZG_X={rXtAmn+N&dKBZU?u4)hom|Y}zkV?>}>Lz5r zYIYPwb=tk;=A%{EuGSjHsE>t0O%n%&n`^6=_OACxC?j=8WP`GNmJLKRo{+_5Bvq7Q z-^{;>ld9fWsiOZWQkCuk;fbqO5n>LtApxUQZIszmj9~x;R4YsBG;s9%JG$ucJ~Dso z-m4A?YhBVBbjj;spBXmS^|0+u)e}*~JYi18f2NJs`^Z>DIk=mq)^-brI#@-K1N;tB z8&#Zxo@&*o_Nuftrm2)%3gQu3f^`TME8+VR^sN~_Pii`;U>&XQdQs%60<0pDoJTT$(fK*#$1kQ z7^{;1=nW8(-Av{WJO(QP)kNlmT{l8=aPxi#iQyDG$s24WlIobv?<`lX7QX$i)ib6Q zn}}pu_l%ug!Y|%MR1dpd00O9?qPBa?W-eaT2d#^#P*BN_UWZ=ZOhu^DU$DX?e?BKP zufxKyJA~Ki`c}w?}{LM&9s+~UIS-JKXK)hpPVmz_ZoPF_K+}E+H#Jux#FmO z7{x}wmb@AA>Q4Tb*RSrJ-prwamc3gM(>u|N#CsdwXh6~Bl}GDlpRC$e*WBdz$eZZ{(=_<1oD zrLkq?H^ciRjX^7-C!-TLk9`>n%mQjlLr-2W1S-oFk_m@)Ah`qEG4 zkMG)ZNRZyKdbwopWg9)@Nw5I}m(UfWnoLL`4|Dt=kM{ME`SpmV7saw5)Oj)m&^;tf zkd9BWhUAj&+N9D^?{YPLGfwRRtDo5csRNO)h^!E`P7LMX5ex3Sa%MrP@rqLMlOS)JAwXU)<;E6wA+X|_N4{> zueYp<9`ysauJ%0YS3nl^sQdMqe2YO4Q^hHZra6RAU2!WusgK+XqUzap{L{Ctid8%Q z_#Ozu#JQY|PS4ZNMKdO~EU9uvwYsHNJ<0LxZSX_(k@;hq7kXCJF8=P@PB;?3cKhmy z3y*Wjg~t^W|2p>Y$g@Mo2gfAml6`7k!k>LNyujXoT(4NnTPi`$m^FqJ{5cP=F6@)5 z-dJdK^E3R)t;o>w!LJT42oK)98j@^}=owdBwiH+dI7}1lDpmaH{|*i8CzB)^_S-LO z4dK4(**8o0ZH3h#{;B`KJ{()QBaH#2v3?zuU#IXRH(#r1L7m4aKXnf}u#ZZzemI18 z-y?c}N!Tad#T)5@T9#^bI#OMD$y!M9FMSwI`8(<(=670z#z$6Bu&BFa^4Ddx9CH5V zr1dOZ^+WoW|fQ@NfSFzO9eUKgFCwti}c5_$TnzHgm~VHgVNN zvDrrUjEIq}VzYegQ>#1wo&^t(TKM9pRzHS3C3*t^L1Y|kqzGI_+o4CPOCO*Hp24+Q z{?>cpK{(kXeDw+AMxK%fS4R(woN%)s&xe%Y6&&yqM{;Y$J))|Zxh(sjeI4Ku9{Iw^NaGdo3JiJa+ zEr5rEMYT@WnX{les5a~9rdz!C0eDnT%H@yWA32fIfB%E4+viQFk;)omjv%s?Ab~#6 zBHf4{y>EDM_0a4|m_V&n`npN7(M?D%L+YeDyODg)k)%f+l_2hgF;{n=rhWs$13vSU zJSpI+_(U&leHgt297_uoYti2bm4H{tY4T=~kOeN|hgT2oJQXoNA;2mFFo!H?3 zkZhtRaZH(p{y2E**j*#v6b{^bjiP6_l8{uoHyHGbwEz?BCRul_RF$`I*#q7E&^MvG zf5&>{BLi5*h^034I5xq(uLpGckOv~h)a@myuh}W8%xQl9tC(v2WL{!fKO)@lRpMZP z2~L81sR{0^n-&Xf3*pDouso>IBWcvvFz@=vsG{=Tp8dQ>xa{l12!Q=eN_G4dnTqh-+faFCT(w*H@gqb6HtGr_&{p`Aet#P&mJ_v>8nDfe9wFG8x24%POUN5w3Rz`hdriE@UbWG`erJB;D0YcW{2+T zZsB`RpaJB9mPF@L2xUjgMp9f#oA8Hg&1y~0@L&7}wv#?Gzx|zKJ$rXvIQKEqmGPB3 zNPsR~ofV3R%*55~E~LAzq;!o8YKmYe`pFdF_PKAv=!ZjZ`mJNa$WNv&8N6_K+r)LR zJM^A{hsNi2*>%j4$ET2|RnCGx%16Ho75TtZa6t6)_($TG_KyB@!rz`E{R=yUgyo9X zULoAFaFvp&WM9(TIw3y#1O)B*{_2itZWD_?71iN{E59!uDM;ig)mFS`S>k*dDJQpQ z%3&r!+A_ymzqdLwy_v^v|L5y)tRSAb4}XtzG<1c8<5H{7>5k|-jHl_aB}^q5Q;gAX zdgzBZZ1wRF=Fjx-I19qQ=g6ttQVS(KY`~tju+~`An(4J+_JH&p6{}Leel4Wye~#b& znCf5;AN1?z$*7@0?TrS7Wr$tjs>!lFt3!;HJWd*fko`U~A5E?u5uW)jc^_Td*yvh= z%iO3V* z6cu#kkKsJ&-P~YKdsO)dG?l zqz%QU)Kp0Gk)L3`ZKgsYXM2X_obcFB$j3TXj!HIqE!^;QN=(-g3Lxu&BIQc+*RNyQ z=_B(iUwu1;Y6vf{i>gF0%T$#bsZid)d9_8KDX6msQ%d?d_hA{`*3TpLZO;>S{11*# zhed2N0a4mSsx_Y&b6X)dmi}0HE zvBZ*%w>&l{T=)wN_ukhr9+xy*`6bNO#Dqtgt{;7P7mQ3; zY1<@|1FIwN2Il$P3DeML$6`EG<_`oab#!2(kp@$(*<@qBAXE2xGy$Xt`sAPRrTyey zcA%a&@0347TQI|p4sOT@RKl#BwRtSbsHw|vOpgD-A0eZk%tvn-ehc!w>=3Lk5gEai zqhpXk!5Uo4=xcDDmNyj4Wp(j_qGtx3qTDp^`yb+?o*!Nyyze-HPuQ4pRLz);23;0` zk6LMzANd0mu8+(glW4F@{r5RIYX5<#{go?6$Du0}`d|pSHC;AoOFKJ8XLt!!$6khr zJ}Q6rQJY!#+snlI=fWPeI^_)4%;!^RMSMcTiWMch0g=PfQPN=}O+aW%~Ei&rIJx{od)Wf4}5skKlH7-_xLBr-#uO(UmTZ@&yW4@*mGkKjovc$ftmlF**5c)nGcWr zX!_KVFV37Za`(tJBS}=LdCSP;z&XReMwOb+48Lc%IUJhF4WBo#ZFt|%YeQ>8Ump68 zp=*aSL)M|gL(_x58+>~3KL>9gY)@Z07#X}^@D$|Htsl7bC@=ldr$&}>i-${Cr^(TA zvSC1*9WvlQWcv>6A3QREOH@+xiDd1|yL|But|CeKEcw1|l>7HLkK}T4?_Vf4-a!t- z0`SAAe4oj|`~|W^!|eTBkBba@IFe+;%RVFlH2K@%Vz}ed8@hYz^yNaq+4XcIK4Zp_ z%aD7|g45^C?M;e53`$-WDLQizU!oB4X>*R8HMi#@lpDbnEK(l&98ARI0k}E>+uI`D za~z3Bi^xVZ;!;3D^5JeE=kys14xpg-WGEN?QS<`4 zoq(Zi1->GWyn%t-o^vTTQ;g&+9FAEsM-H$KI00a*7x$b-xe4?|FG*zE=>r&wwPwOy z&9ZFw@gBQqVIw&Wj#W5hBn zie|v115Dm^=pAi`DUca`@C4UI`mc-XWZfQSAJWsz%pVAMIf4Y1&YT}5(Qr`gI=W61 zj!Zd!ckC?jWdbKhOtu3j3LtU1X_PlBWaqA>T=Y&i0nr#h)b4YzMhuLhv+z5Sn}x=3 z4h#l<0mB7|3;r5?`~=sL%P*s=;w+C=VsH6_Qyb}g=Al$VU zMs|r@;Dd0A)sx}L6mdFh<6zp^`A;HO>gXcef%RrdMpD#W=g_b6(ZBV$fbe4`Fk#Ff zrw_9OhsbcwTi7+Ue{h-1@B0b&dF=5mhSkH1}fwLtJyfJJqoJZ)%fCmeL<7pMZ{fN2OW11o_w z2hzzSEY7#Gsde$?Jn9HSC9psgEnS3|AV$K_*&RK>brg+I`7q)qoB(d5p}hv#>}4BV zWEXWomt8^3HJ<^25t00sZ;4zaqOf43(jDir&%i|V2m|(cTDv+%MiB2Vhy#JSl>>ON8%NDTgtb6b2vTL? zFnt$l5rj_WtWcVC8+wW1GPD-6{;J8ucTbKT8bViFpYVvNF3I2c&ftP`AbDE zJ|U5fn5@evQt3yB0^IHMbmsk(okvSaCwj0ZTcqKlHw!4Dd`{dV@-6H~=o8`u3!qtu z2-3&9Q{pB7E^9%9q1XUdhJ8d=^33FSMahH;jFE-IU|=RL6GxS`IDE+lTOTH41wZoVi49>oQ#v(ZWcMtUb`mprs4tKs&9Otv8D=V`YKg5L+b{31BCkWc`s2 zSt&OIjV1|;wOC5Ahc9JH5~2f3&oeSVXT<&a$x{61xL^#gQ9gO{#WE;2Q}i0u^E_9ZL}BxjMCHE_5kG~ z53dP(nh#~@uri=9Ck8W89JpHKVrxLg-({b-K(;NYALc;5wRJ&cxA3)`D;UXPrlR05 z+1$Ljt#l#JA=auJzz^r;7z}7OP;6amZm4_WT}-kroTM0tLJ#8x{pt>i{gIXd(^kN; z1ikP}mof3MtLEF2;!Gv$F9CW1T?qpwTr{FnEz(_WQM3$OWzL~5U_;b&B6vLfibB8 zNQ_iT)#i412zMDiWPEM93$^QD?i0^u(UH>@C&lF!QwTLou|L7E0kRc^Td`DkM(tEI z0^P8XlBEUT1O3OXIC5uC{z9qY#Fr88NVEXcj8uK?IthZev+YI7MZr~;SX>73 zqZ!OBAQGL0u}4HMK0(u4Y03Nt^w@(n-LbK@G+I0CQRj`zdi6Kk((hpkL=WFIP}DXeHVF`BE9Jgl_Pyae)=!&LF* zTO(iD;9|kVmcqgiM`$AUYK+N_I}y#!pQd5n1SKdyM^H64Xh0Mr_K6^77gpUkSJa?EQVeqFmU2dXjFP*mFpBo^!MuQ0#rr^|(c1e^{_}V&C?WT|I-X zPg~sg7=4$Vny|Q-kc>S@4l6KImrV}oK5<4BGT5B3TE=mdfDr@RA6>@n7QYy+M$9Vq zS}c}i+k}-HG;~IPL`7p*y4d8foo5?^$S0bsBC)RfI@0@~|e$L8o0!W@3ylt28!qgf(iw?6Qtdi*)IcvjF z^LOOEZk^>Xo5s6+JOl&2(7Vt;M)c`5lVnGF%fvf}w@qCNTyT2qKd0Y1cs_9gyLuqK zqq{an&e|#4IGNg)G*oO2rNMw$%=xuL+xp48Wc<@dg!=p%9Ny?|5^hL)sZdf>V={*{ z;|=-p&Lwr0yg$qH+tI{69`6Z049DrKfP40!4S(KFbO0JXyP?tQm_lWC>ocjO*6uKS zL}54XgRnjpU#-HS+ylz~a-S$?ZbMG2g5YLYpIu|h#ANI}Idl9k7uL2Bl*wQd0nVG_=`5IN8zX6!haRnp>OQ*3aW_nY{7CPAunmPV1G z&BNtn&WbkWXW~UN{yOq>0|NLgOB&nMf1W#r;x?~eQ}fonbKP+TCa zOXGSbj4abc(1Uv*sEJ6q&B+lUN=7U{i;1?G z1)SXNBA(=%vk)VqZLZoPxe7sf(TRT>dvxTF!-x!}K;lyX=Q~Pb|LC&fSu|!_tVZ8* zo83*$ZlulKf5zI*ZGXp-{9!8`t#{xy?&>qhheIhyfGLd$MOmQD#Z39NGqJezk%1IB zLcsvux2ypKY+E@>!b&OF#AYp4{ak|!rcUzy=Oto`^muV9zS0=_3Sl35F%X0 z(qgkZY?Dkok;E0(@?rdHADO?!{n6gN#=P*m!)wS3Ze2Ng3Q@xzEXAfVB$2GPR#v1- zW@S81dpdd!dU`X9KYjz(yHi*YzH|=6yy+UqApxTl-jYT+g9_KORFjHqJjZHdRM1Bb zU|#g`_*<@GX$Ek9^t83V&^X&OPhTT|nWOtQB-)%+xt$BJdY9ba=1N9UV&`;dc0Z4= z-Zu(B$2}-w_3Y_uA_nJ`H$x=)m_(1#kIm-%W-sf{Cl!I1x$e`;X(Me1(a1g?=E|pg zdG+V{|8sDymj(ZHe%p@;%H`17iHN>ew@jZib=gE??52@>hQ7Gv)qx+7D~X@J387X; z&&01%sHHjIu~#`=G~BA95`#Ui=Ff4iEu4Z{if_0A?0<;A<<;je5N>4FBFHMzHd@0t z5E@jnlCc&64u*wh{2le~qwjVIpMU#@NGRk7)`s}IWorZ$d-MzpHU-pFL*b_0Yr`)` z6v-udfqz~Ged(j(TA#NIm&@0X>)WtsTr$Y~oq{IN)n$SOhX0BJKiyBJF`OnPd8J+} z>a?s`6)0BIiyk(f&3Dd?U}l=REvM zKbhiw=g%jvWSe%Si_^DNIz^`AQ2>W{)dl#JJ~9C!9uaWkM9ly@?& zAo=XAs3o({x;A!T`UL34frB0neQ@}|?dXF&hiE2Z4HG#F{EgbRt-DVC2*2_}OF;P2 z<$I1u&Qws?&DIS(iO&j9j31{i;%UHX0f}5(KEISd_m;JV)1`_x0!mK$sBm+pKvJ4m z*T(ttjcenGCN(0gi}R5yB^bR#jOUM?F^8*Q3rMAC4(22J=(^A&0 zN)(hHsfr4k3PMmHkC&LLFp@}BxKfa8^ynTExk?AiZqYe&oLZ5Q#w=bJ%3M)F3O^CF zna3ahrL1R;o+2FeW5D*Fwb7h{*Wq`uS#_mr)T?Axn~X}i{PMLO+xmGtY?p(#-}#rl zSVC}y*m1=cRNNdJd4BBEQ-SHTBv%Z|h*p`PRj`|1k85jlPIp=+56XQurKw_R_quM5 z&&Su0?rk#5hq`au2XNc)nQuFu}mstwB$UhLfu~=ZJp!!=-T#e{XAas zv6qerFGa=vf4$bEI#3Q-*p9|-Gd7a-W-CWO_~rt-t&azb`F}1Hep?_ipbI2eP&|#s z6?xQT*QU~Xug%`q&4IMelr=TuO}}Q8fi?mJtSO@ zeo9Sa*Q(i?D^^t1I*SV9?ddh7Fi2ux`Z@fuTfTOo@PQEc5y_XX!TjiB@si0;inV#3xP~m4&?gcsM+c!-yZDWzi>W?cb`$1uKM$2@ zb);a!i@St}ZbCQp;4dU(j`owM!)4QqDXyw?d`Y<)Fr}V`-+u$Ns*gu{3-H8yp4=_W z--tHtGp`&yg2a3AUT^8j?T#vqNVH@oWUh*0ettcU1)Djy9{;6?7}CBIYs+2|WJ#OS zigV@yTdZK2i&=}h6Ebdi7iLL64@sz=J|g_`U1)}=ToYRcRwWZ8zv0lm6Xub3jpcbL z*YA6}MZ)E%Zbcat?xI{Jm0QJ?rL|0&pSTrz(MRSbZ~4_*5RdY$IpL~XF^T|G9o0fF zD4|Yj2+3Oy!T??mY_@;V!{(8yP-8eMs;hh5E?cQmc`P zo0IymQmd7g)WlFaG}A}spSlL#0O{^;>=pjwmNkpyl*r0a)EvEbkSZq|ZMWD;DJW%0 zT{yrwpZdbu+^JGdDt}`F2_3WfIfCy*@s#hqX^(IkzXsG$N2*jZ99JzS*<`M`WK9w| z3;WfZsuT4+L~<;hg+eq*YIYq#hiaBi3swK{^Jc7CW_-C;a_Va|hul!e}P`vxTwaezoEg(P@ z@X*R}R{}q*MeZ_1GQ8&7YxDf!``2dXPWl95Fzx^EG$$853|sOBVQq2&cm24>#HBoZ z#JG8Z3)&0h2r%A6OZdp=*0!On=t&;oqqo&Av~F`2_Jm+eg7umul&LqlEmN=3s42P zs{yhoIy%I`PHwQsZzGG#NxA&-YtLr*$`5Y1>>p&US$TZ@W*)t_W8oiRpNM#>8_3RZ zQg{?W2)!NgxDem3!~iTeg#n|S}s#S`zCC{Fk%j!Yb!*gA0W_@BmC z$G<-Q>2ZGW(n0b%0Sv~t8EoxxRRn-nQQ8&7rAup%PPhB%m-tyKHjo!kawKjNaFOB-8)_j*Wa(>NX zOxbNVjg^>$X8pJ3ot7LYjoND-xv`^FsAuMSA7+t;vP`m|h_&(^POs#4(Ap5zWLVK; zby0si->jDtOW7TTAz80$mT^f}#=T=HV~=WEdVeK1duOllmX0SUXQYKClMyzA!I|6s z%HUwH;)6{Z>~a;W!=1#gqKxgx&@RQ|A2(KGzLYAC3pV+7ng-umF~^ais#Qh&Ut3{| z$%a4Pd)%BimvfqAXj$zwT08ExVmlRMV;Zd2DPOGR0QE$W-;TRzS1v9E^{m-tO`|Z2 zrRL9Xr|H-&raT+sg28&k9gMiFjnuZk(AFEYsQ{x)cDZ@adu#H4Y znJP4zOhCCTrpGti8f`VBRn(L5bh(8Ywd+Upg^qf$&G;KSC)ajH1L?v9P5X~LWA!qV zs@N7=^0=#_jqUmvecmt4Xk-di(UUQkJr!?k*R4IeP1g0PnRZJZN!!$H)Rv#7RYcCU z$r9cyrzztA5{da;&g7P_i9hTHnA%)P=JeW%h0Q6qe0b>hTcpI$I80OQqnK^d!`M8K z5KWrpU3PArj)YNVtZPh)bi=Eu)_sY&TPQgmXAx9w%`0_Pm!+bbdv}j))494`eX`Q= zO7(49voPxD{k+*>sd^ZxA<(FVnLtd+?EC_yr=$(7EW@Va)1hXj6AUPKUOzp2-WwY> zXEht;RYs#Wdd#MJS!XNEe;=6-NI9lun0xh71Jf?QHnjfH53T$eFrOasMY(<|ly3ASS*1yu{l_q0H zX0~Rd^{TJl2`}fi`g;s(rfO@+j1GfJTb0^NN%g?}l%7z!6|!ccQkI6&DwjMl@li^T zdp&ig=EZOuj5Sq3HbbigSi_!jfa8KCRvD_LG%;q17U{8u5^e`)@kw2z6U8mU21iUK z`8I8jgTbUya_&Y@)`-{Ds<8!1w;3!JrqKv0Bk@St5SPuI-x~m{xu~kf(#xH4bIDOL z$>I_-ectS?L=Y9LuV)=PW5Off_FIweSPHQjjRz%pL)n6s+eQc2YUn0AvPx9rbW0VQ zl07?0wb&|aN0Lm3%|`-Rc~#ySqtzg+Tt2@nE^cX0u z7Zo++14|-ZqjWLNyvYzx8tjQMGkIx`zHDihJvF3#RfXl@R3%|ZPCDreWskMZrU8yi z>s6_UAv*MVN{7eU&lRHWbhYa7MH+?4iC+6HA!o_!ws_L9uqL8bW@eO>94y2N*{CZJ z*N1{3Z*G9Do|a(Ru8{>p=H+-(&tegO3GA1`2vEy{Q7Qcgf4m(xI!1X z1e@{{Gxe(6l3O150sUQDDd?!BlWe?GFvK#M;SMERIW7YOBM_;bHo`(z57dQ~@sH>a<+JTtPxB*;r)D zDwBe1nPg>CE*;btRMWqvzbjKzlDiA=)SXi&gLRa{3pM4*(f3oj-4%>7 z{&Y>@wRcg6BswCFi%p^Ovk8ws7(c%dm!=c)$q4-{80WYLNn-%v=zI*$$#gH8x$lT_D`nYJauGH zJ#qEeqr=mZ6!DxnahneRl4rwp-Cs13oJkMO^ig?+Cn=PUJq^FvBe<6(*awnWg*r%> znBMGTiWzfz(OvC06Y}0&(|%6*#*_ek5AjTErH47$D}3;)@OB{b^{5+-qRy&PFy+dp z+c}Nj73VB!70*16lT_i+wQVzfEVy!iexdNqM~QR)l9i*#J#+1F&)Ly`pcW6?b6-En zVH;_t<}MN%U&lS@_EfEDDzi=%qjq|tKB+EB52!DF1Lw>>9=|gE6=a%u-+NC-xX~gm zLu22Bqd~QD)QPU4*`ZwI*}mua=-kiY65RK; z;oHx@eJ4pdby$L=2S@GbA?m^K%e7iPm*O` z+vjHf-v{*%9$6pZ&wplZYJs>YF9mQ#QvXKs#+gAu=m8>AONwz zEXRRM2Ocwr2nFEH9f0uh=4aOq&7G79l*i02;ofJ~RwVqMAFiPU1M)S%yAtkU9vw2^ z_5g*(jpg}2gou+ed5P|s6G;qCeHL!A>F41Daw66Uaa;fy0;7pK6NpLzXgN_NGw|U2 zKj8A~d&(C6{^$Rp2WaL;Yy3X{1Hj%~FNglk>H0LyN4k@xE+j35ucKuu*#=j$In`DE z?pNT-y7V<@<7N)e-1f7Jg@;}{;p`?UfvAUB(K0y_Oe|%N#Dee_X601IPhZA*(8uE+ znLX6QE$tSx|4VKcu%-nzR>^R2u^Hk}+ttV=>XxO9nhM(XX9()!@!zSAASm@GFYFa6 zet99B_3`-iedi-m{JXJz!i%qx`!cNiVF;r4 z3cfn4DlqnXw(U%2Ib=E@LomzVejJ|jejfi+1(_DE9{$dP@X~SOn#RpS5R$~jT2(E} zIB!6ca(SgiovXLf&hqM)a2-(E%tQ5n7YV+nx>vaKCF02sZL~*Q54(~wgFC6V+bw1f zl2Z5Dll}vw^zmptAousbwnzB-AH<75lEI1&SUJ}zRhUpyrgwL=Ij1#8dg#zh9~ntT zUIfPQbIx zM#!&>)RJl1*vZlL*_l2be=I(XRD9L1?-2^4>r^R7_8%&UYZht>ZZXT`qF>!KAZZk5sJXqdfU%&mCa9qMCm^Vg$3OLmqIcmt zbpPafsHYYY$Purb5Pz{GGc0=k}BwN9`3NxCT!bP$y} zLa4x1utplXdZ?ABlGer`Db>g0CD%=oRDl>$-8ktWz_Oy`!+JYjkjvH8tR~y_cwFuv zZfL2bngy$F>iylkx>eU(W*N zzFagFDvM1P+5A1h zMFhVWIph(UU5BmENA9K7=b!wI5z^kx>xvxH)N zJZ_Kwuy6e$394)yjX{i9Wh0t%MzmS0KdN&38^IVA6F+5r$4qrIi$8YYmuK=H9Q^Sv z;n7ppjgpxUO)p6FQ|Ar6Jo4nk+Xqi0Lw^`{dU)k%ffO3+*|VFirxS)%`@s514J&$G z_w0dnAp4e(?K8=m!(pA;&81vnp1ELsfsdTNK0VXNLWP*e&fvfE$WwcS2TsQf+7C<# zNs2?~VolKwS=poo)+TFC1T(}ko8@0Sw7zqukHs_J>f)L`e*1nQaR!zL0+uPGqv%p) zRB;MdGh&Y!5rF8Er-|h>$G`R9`u3SV7Qa4WKJ#|lKQ9RXdJtmBjVMVhLvKWlE_uh! znN29kp0c`QB_;ppnd=9)^^;MxaPUGw@fNIf+fn?)*kH5WN=TPlsx2Y++Xv3VMCv2+ zcP|!T)_>xe(|~bwtq<|19$w#n3I+p-ajqThsf;@))i&8qIv>Vqv=GNlWY5ekA70K+%yHTSXPmGV z5krBHn>d1MNDMYYkq};o$R#QN_6OH@^EXS^x6YmP2@!yIF}prHPZEz89f2U~2EB-8g5e0< z9DlqH4XMf2cg&si5!_Jjo~Ksqfj8p|zr3(i|#IG~cf0kC+oM}@l-SK-!n z$9WJH(US@ZafGVDHaA%T(oEy>5GB7L>L3!B{XLg|_w|W|*Dd`Ke&&L8T(2U=_GI}J zsOp$5Sl_nmfc;VqKz^x@%wsleE$Mt(4H^`I1p_Iv4`Oj7dDb)cYDxvR3cH{(ev+f1&j zreAQG6BD?P2Y~Yfu!!gGI7Rr9bDiW-1X`wpm4F%>W<}Ld)hR1hX(?aRFUt9@2Gg;R zitFVcT`2rUBiaTeX%cOR72)Gr##)c$RYtSjnpKc?9GdAP^HFyEApe1DzO-N1Wg{|R zl#>KbBDTXQ({P-@;BxCjRcRs-LsOSCV(= zu+eTN^H;y7J;a~-i+lD8kLZYT1A~jCTcRQ|x<(2KAvDf}VX>260xJ|2IIZa+r#dtcoxykLhQ z(RNO3nTkxGJ@Jk~#n@*giIE=-kCTne4&xBrMXH!mC``ASbH-#EDU27^TC!@={F5QL z2rlwNIs17$AUhWdclq(bd;V!-1Id&fWmSf06r+}ezLQZ90f(kHQ?cy74Pe39JN63t zF#Xs&NunkCu~kP-WoMIYx&fOxi-;ZmZwa)4_uymuc>M9BmjF^TcWjUFl4l)W5RQ>H z^_-7w$yuXE1{E7#%qL;%U>tpfj zpMXWw3$S_ka`bW!IrTOOqO(hridAxKBb1LP@(#O7FXKCxVrul0`QwI%&$!)pY`5^+ zOR-3Z>U91V$@zmb6PFCFj{N7?I|xXNsMG2A4cE$@ujgWFXAN~bThpnTIQ-XHyP6K= z%{dHZACHe3JebDU{cx}FyBsk~Y%6yTq66tyXT6EVESpMt%eh#`V@pyw4`R;3!3; zPIk!ErRYcy6QUHA|XwOnl|eamb-Zkg8Kwmoo`{&}omQswjbmr0Y=M=KgS`xI$r4~lUK~beWmq9$+oepNZPKEk4=P!o|YUO zc$MhOR_Kd&D$lSNU^?8xTQuu3Y|=9 zXwptLhRQ6%1hbx4))bV5D=I1}T!qH;@p#6BGI7`k_X`hJ*A0@rq=+VMk1AKUlsTu` zRP^c!dUdDQo=QB#Gz5W_cW!-sJq);=u8_|kcj`6CwiGGnFgSP|fQy9-TcjToD|eDeRhq;(+S7D_4$;2qO3g5np*wMLcAh^UPEV%nJX)8sTAj-Gnm3}gRw;>JXcsts? zJTWo8y+`)vEPn8JM-e$m&QIic8erG z@wc(gSZvHT#*OVA8yx+g(eI9ae)`qXe;>VZv^ILlsDAYD=-kL(M}9VW?#Q=B?i+dk z$h9LS$v=+-MlKvVG%`K>r{NzDe{J|v!~F2_aAw#uysRERZFpkn_e0MOJv#J>q4x}3 zHIx{#56Na89NGtf)UOA>H~7%tJ%cw5HU}>sG!C9KxNG3Gfu9dNIUo#t0C1}EKyct< z0(jwWF@<6`r7HzbYS|T=`*Hhw!XY|ZR#$V5MkSHz;LBn zRk@b;9H7EHaYK}GYswH5kgEb2H@y-6|M(GvP|3`-R7>g1*6hr5qj$;IjYTucCc+UE zmbkv{jGys4k?fX6TT;JrIq6I_6DHZIMe!T#RV!1^CJicM!|Tb!wf{}&(Y!v(EqPip zcWhAsSL%WDM7qCFVcRLjppH5g6_uQ^LghzoQZMJLM51AP#~iMm{+jr>X-O@sMGZxj zDWB-N)5hhOMFy7!tW{NPs+SClT27^T52Z(985o+*h#^z0Hc+Tg@+XlV@j4L@6Ui>d z+-`fBS;&fXQ#Q$1iVC)5E@h<(*l;OAvnMYFCq z=zT4R>d=_@eBQvw;8S6eQbRf>lkfD2^k6a0xJ~ut_L5y5&{-0vQ0zfB>|@QqofT3F zXWEa^04+vYOnpiUHkQ=K;XDaRz`#;oKv~sq%B3H*vIsg@t6)HazThg;mYq_i~ zge!^?!%?6`H`q~H7)>e~vKhmRPJd?kqFq#euwid^Yizk>aRy>`cJyDVoM6Mc#MQ%g zTiw)%q0M7AiS(Mu%Y_${(y}AkigcrUMEwbB%?y)Y(wNvMys~$jh$1V&--wN%SxAO>Wso<4QmQ#yj!H#d=bV_4yLM0%8a?fswt|h>&xkt zL8rH@_6Ard!%d6oW)xLB( zn^)D?Tnu-&(-!)xi>a1^15V!@VO{n`X?NC^indq(?DZ|^=aqy9Z z0}-#<#1_*syGXC8!@DQbYvN0W_th6gxm%-yyf069_7pkBKjY>@_Zywbo6(ZrSQk?HcJpD!Lx0u_|K< zt#Z}ms3@w5{o>TPjc_`BHh&}v)w{k ztZ z(pGc5RgCZaB&9n`T83@w?K*GPnpL-zBkLkPQp|F(px)|HS4&=>Vr%&X-NSG?rJ@in zt8La=dgz_BBb>HQ#}KKvZ2Fj~ZI+!gChEUamzB$mZA40%-6?fpcS#hZUGi~_922!B z)r`@R9ijNCt|KMQDT78Aid<3Q%hY__1>$1mu(X3r&R_C4T$x%U#Mriq&#OBjSE^KE z8D%FDPn;j4WP93LW~`+)(+Jqr?%cqvNOq+{ZL3`4F_c?%v+VrC^qcH*01YyskWHbt$|R!sVAn*YOtMv0FzT+Z9!s421eI^|CXB{l&{u3^ z62>%p8U?#`ZMs^W^VZ6`hzki4OWCuQ#K*O*V#~`$s%@rRE~NJ@^?vo7E>3?HnMUhK zGRf%&LJx;Wldg-O|4L0{O6gSTmHo3Z18*jgTMXD$g-1ZbU1BN>Tsmg z)tEdTq%fzh%~Nx;UU^uibB4kpuR0*AmPeL0GP;b3(RCu#f;kzOrJrppl-pdoU=1kk zx|UAO2E?5+>o8_GS+HPrOT(2#E;~fwPu;97UScxI<+@5?PSkDA^wckVxa@9L9qZ(r zr9wc~Hml@&#C;?yi>JAOv$p6VIqZ_DBjQq)m8Llv8}MiSL30GE$fjv?GTm^2(Yrkz zyVYuRs<`w1>jYg^VcK13T$hb!xk`L_UYzrpcEiQm+75-=1`|M)ke?7#GOHO~xdIqe z$fR}VF3^dB(y=(3awx(bvq2v-=eM3J(&Oa{4i+h`s%nTz6R``@bR06lqS{(nlIzMf z&b*X5j{>K<%jvAy!iCCqd%9p`^b8|))92H0;W|aVHPPfki9*JUJZo+rd-#hYU15;1c2!2^D&@IqR-qU7*;H9&%T~G4@}kRR z3fN<&BlP)H!s1~tU@@0p9;*W!f4fMJ#$>Ea&6E*PE_Z0v&Zk6rBpl_Ejx3jMV8if7 z=e{b^!;ub?*BYyNE^5^(3o~cX&r11Ap(T^mj(lN7l}>%ua$9_!EiTCvrd+Jp4yb$y z_4M~BJy}Y|xbRX`?_X*JJ&bZjM&%?6$xta?EOO4YToKFcofaRD6)a3L&QvTOr@<&M zu%fwii8~Hk%HWpI zi7RnpDN{lwe`zF~u^6mv?sRcMOqA5JrKXx|G}<;xC$F#5<|GO=D^p6_GmV^+X$O+F zs7Uvzy-c%#o>{J2Gof@^PC;{9OChym zinc$YP3CgZh$&$(BHLG5_dZIFH`KPgzU}qN>WM;*+5Q76B_7FF*`iyiahV#Pltrew zbAI@Io#0=Mi!&>T03uI15H(# z^*+Ww^~K}+&h9$A(m2b|*0`1QMp^9W9# z*R%a7^hUWxwkT~@JWa%UwS0d;_~tdl#|LNOE_h04AL(Oy6%gkw zqZYR|H5L7`H^~@;F22$0y7@7FW%fC^+6KS9SEydM?v`xJ=w!7-BUsDJJH8l}5b|a4 zKX0P)Pu(&PkIyyy9zp+3(hfNJcB38iqpSs4TkX{7Jk@Z?W-cU=9vwY=#|kcUH?#O# z{{7pBZvV@F?Gj#EA%0r;eRgd4eH!(y(X3VKEpiX%uW3?rz^}XsQZ}=A&-dFXK5@aX z5S)J#E+2Ljwnz$tnvoZWcaD7lDU7b1xP_!H@==u{sf)z!$`rjd4uu3$MMW{CK(>lr zJFmD4V~A97Z{(5m6mXOO;GgyiU%U(7ORB!!xfhbCzdK*AISrh&+ORTZZ>tHfTTjye zW$er2wMN317%6~;$w#Xq(L!a?Blsm?!-v@8k2n$8@Q0eZT z#-9No@qTGuLC&rvIbK)74{&Rmti?;wMvRpjw10XzRXqI^3M9VjE8lut@sM7;)I|~6 zD1?XtlQ))}p03YZkUe0NBHA;;6X&N&L$sd@2YC^KfRS{3585Ngr*O%-Ge$Xk89#3c z>l-dv&U=qR&Ik)dey_MxeAM@Cgr^*vS8#|n-9Eot@@MasX2t>rOvY-kp{u9k zL}fTTHjBdT5IDjTH^x+#-g)KyJH&szeO^H!`uRU1+y(M3k%n+6j}F>0IjWq^V7jFf z4OCkl-tMw@%x~H-$`j{qbO9=9HLj#TaL4=~W%Q*l-nkU+LP-_I_{sN9JUIUB>XlxeLDZQL=dIQ#R{haMwI?o2@}>Ttmhz{s2%&E4E}> z-1E`-edi&czWW}};A0=12Rt3m3duUz_n9b5C8#gkl5)@N`Z&Cxqde(GXjm0&>)?$a zNA$}^n~vnwWRL4nA_bqhZEGb%qHhu51UH>V zz{v;;z525Q;_i=Mdg0(JrzI~nT>ffI1KGvyDC%2v(ilb>VixKLLD(CA2tk|g#kY>| zUJbm)?bz414chlg3cnVK>g%pTGgmD(xCGFqhQI&ieNt%8a+bI!_x@`K)`6s}!*j>4 zz-pAERrG?foTK!{Qj*pgOKejLw%9*2LKROvdLyF5r1bs&`XV}6Quha?1wHJJG_9-Y zb%wl+%{z)nHIrN6{?`2XE{;3r&T!;8z?MCA?cm}EB-Mp(k>GFSZm9@fU6mBtu3oce z(!>D0GW@K=pGUWh@FeJ!VU?*}gAadRa^Oejjsw(32`2aOjI~2FbSXYu^82D{QoQG@ z(rwd&*d|7J;;GwT7(!oNIQaI1(t6X?L)9c%)P#KAkeL^HT2cEYEb&pYsC!8&qx&UH z-3j}O>B*^WE9~O*L-U6&dTZ!@0M`8dEV^imVPsk;Gv*Bs{f!wjc=Y-^5Z4{}%KQ!6 zfu9NtTVT1Pt^j~svp_wCQHaWNU;D~D>cE|sD;JZyoMR=ptor>2mqJ*8j1J&*MAaa_ z7v5~(;R4Ot))T+@uk-sh1L1g-E55gTH8B6)bHN)`;@iGDziAr)rzDJfR6U@8z1x*= zRgtjXkvbOP+~;G8^LKv8E;3*Hn^7X~`P%$lKtVh2P(}XjZw%Gow)^iERU-9``Pg>g z8h3`(0uY*xAbkMZN{H9tl04cEd}DrQ>-irM`R}LxHz0zKAU;N_8<7RPHo$rNC{Z!2 zc^4v=ra9t%&ilyV82e^miy^dWt+@U>^C(tlMEpGJOdwVY0S$mm0FW;LsPv4zix2d^e^3AJPjgeCkRdf7D6aPFtJJ@sm>t3(An43E; zf#m3h3ltNk%g~Wdp9>^xWlN|ay>N@ze;OBpBRuig1_=Z7L~Xlxczn|#(R=t)7m6>u ztolcB!_^Cyi$D9x{4Ob0<~S|c2SeeksgTIiLX<32S{)%Z{Fp7`D?h@(jj+UHpa0yU zLF|cn6bCa$12rqj8ndlzldP(pX}L*{K8c@=@Wj*4O~G7}qB;)#2b9Gw9165}y==}K z!k$*L=FRmT8f2WgWmW9_{`>{g%Q@niGZzoTZFUXr`Mx9tDvVuHVFtjUvt7!QFq*Bl z8X-&RJdWi#$~kuPGuIBDcwCBHGEjn(sV?gs7j5_|xDqC_|&&y9~fg-vIaC+co# zUMJqsdZI3>Kf8W|_}g)T6$E}tFC6F*$x-rCAs@& zM#!S-`PUCIQg;q+{UJV0($3t{r{#3XXgX~2W-QjGPKQg(+a8065h{u=KYVyF_C5T1 zt9-ai;&3;fPhJWSVfMW#beAUVedjm05(L zznmqWeh?83sC>I~@U=zhp7~X9qjs`qA<3+(+Vz^s+I+Jp3)%2<%!Co1IQOCdQb2nu zKZleZ*I@+YJt$Glx=chV9QHZ76yt75Be+#O^bAg8BP?9Z|J%8?^9P=h#`5rzq-F{; z0ReFY-6&KLG&^k1{+SW7$cvv-qUR02lx%n$qjcyO`52|GRHLCXnf3?j4TphBiAU$> z_f0RSif=x+a-U?}4*qLi+PQEDxMryl;YvivQ!R5jpJ~*qWIij6+7|KM&tb)m@I>Nk z52EVY>h~c|{W(bxmWKq1B%hT0{f@svciM?aPt&G#O+prQ|FbyXjPk@&;~RkT`pf%v z3@-eYbo$0Tx*C$?b#AwXnm~cngwstXL}m1vp`_ikmZR0@=q$s?bK;)8Ku$#@4lr|{ z$4PwSp%oMFP#s$Jv+=>?k+GTS9a97T*dO-E=Q0V~NPb(!;I!zeWTR3~RylpaK}ub? zMf~!AqurxCIa2?gz~@kT@MWb3EK5C*6bvpMO$0N#q(RrG%PH~37qI|F$N>17-zWa% z1E+TmzW1UuK_yHcxhWyC9`X@JHRCXODixL=j^-Be*T0|Nuwj%Z&R@M{7zn;?;QE7f zL_`;wmX?cC?YG1{@Czjj!M350k-zD}-(jYYu*A8P<&bz==)0>1z28YgfkD+TeUek} zG-W75suC@D9G$*SBMZ9ikLa9H9$YFGO!q@S+dla9A7TATgDRmn$={}L_W~9w@27Eb z$M-mQN+e%G=ZuiWQ+I_hh7Gu7KK7E-8XSgfkRcz2GDOprB0O=oEk}@QuRw~PSEMkB z5i+7bj#&raeg&2ia9NLA(JS&{C{A^9B7BIM1eA?1I{JC?7V zcg3h++mf?I&2FKSlRjyS_>=~X8Q}q@^5lN;yAOV2=isn*0maV4ZXZ%ym{>O?v|E06 zSo!VeS^Rc{C-V2!F#Dvus?8j_Rhl_YG(w&^KC{u;B^V&0M(SmUx50_tLl~P;vJ@?2 z8GP%|0H#VF2&Y-_1{847fvu1J9r-*WxJ zKB;o_UvUTTz3htHRN_VUg*AKY_iN5t&nR@zaib^z3fHJnGYM51PzT27FNiJu0xa?K zazz#AR6^1Za58u;b2el?26QZxbU~#W*sK^$R7*g4s*w14^TLIDIpUn7)A^rN>`SSc zz^+|DB)7#cne!-n<71@KJOE(Df2OW@qj_Q9mh*DOjW@qVfrb^YvMy`@{wq7xui|!Lf-KfKiKE?a&QM))w!)VPW&k2v0oy zjUP+?PblYSZ;+M;tUoCeQZ{Yt<#g0dkqx^$Q;eFNBqs~H(+5E#Jn`5GptrvH-mmN& z{I^e9qZV&n@Dl`SEk@cIz$FYnd$U*!ENq$?;o%JZ5`O#rpY0laC$NB6c<4_*8X@b? zaM@YQ()Lty%s5EIBJqD(f|SV~G9s)s<1YKMoTi?09-ASlDz#JM#IZsfQ+ zWiJQ-^H0^g`pmFV7c<&(b72f4Pl>hMrOKJGl#xVY&c-29p0jM)?R1fuQn2VL8)J=J zQkk=5bl52GY_;j_gD;gKXm~v!C1=)#zGaSfGZqrLzX-ezse2h-mUJ5rNuxZGAE;o6 z-~7-{@g;siaer?S7Ivdr!f`1(Q?8a!$MtBPW~72|&5XOOP7c3U%nH~&M|g;;=Z5!B z;@5=*CEfGcBm|-ZrBq$npKfA_dXa84xOTa$HRx~(lSWlMoLbm0Gs2UPVMtKkDV|83 zZQ_^G3um)EwNkdHxhqVP{zuz=>JPV6YuFTsdO@4jSmk*R^vfRW@e5e8YWrQjPP&)@-YAhgw zvqZGjEt(8jwXU48nFgr#-WFasN*2#_1J=Q*)&l%@_ISUjB_n3K8m8vHigSHLv>)XkEC4KH*aGeYq~vs|j@ zZ!z^;Ll=ta2{Hbzh5gg|WmF_xz6PfdM!#e5op(tFEjG)_Qd6+0y*F%u4-t5!o; z{;(;#Z$VQ=cq0G1$A{MSuEE?b3veUUAVqN_6aoewVBH~&U@PTyF_E8JI53k~PDLpO zB#%A%%J+8+zCR}^A8aZ}!BjRCZ`EGTkQFKp$HMgVau)V%WI7G)>X+Z47!FcGtUN5R z6)bLqpd=%`w1uj;hfP4~>*Zwe%neWN7d>BlYUd#IHhhM3Dl06V%DAN3l+C2{8n)Os z7OOc?`yQ;(5vn+EeLqfR?^$q4MeS9E=_^-HPuxHG&hdq*_}DO0Jfzw+cf1a%@{Vil z`H~(j=1RPaSmt;^bbJWoyqqc?yX@+%;tOB=#btvpeMstFRM|N$<>tw!C{NenH_$Gj z%Tl(e&)^f^atsX{p#nwW30y_K@`VcrzdI($!2Td5=*gq3iS;`ss-&qOAWoRMgz@MI#ju&aW`X4A1(gRoeTS>ms7}bUXTDgeu*{?i<{5J1iH;`jN8pWRs#>posw43srmdMlsfICB^m$ zXy#G!Ir!$kIsrT4TFJ?H!5F_{=Ems0XC^9Z zzP;wk@wcy1jqxkLyz(N|8&*6q{oslf;~o*a(g#&5#XW}#w|xAj`4cNw&F#8%wOIOa zc^^%aM;IoVNOC+qt0pwsSvs8(X1Rn~JhGb_G zOoEwBAdXd|X0@oEfj~y(J>)@Jqv1rtf8|A&X*mt8W|xF(XqsO7$2o7h<>YDGm}>vY z>o=`bts)5~%_g}NJxj7IKTG4>Jj*6&YF3lf(uo8|q_t?T@-~7!sL`s$`QQKL;*;Ku zD^+Xuoc$^dMZNlo%ihHwQK=5lTILA)Af-uA)GS9O(R~c5olOulGs`3r2~w*`q$o;Q zdJ*I@C+GL8RF|Cm(iXhvHLt!%jqX?a^4u5IPO5$@y@@$O0<}7c!I({Ih2$(v;SZi> zQ?tA}F&rf=MYBsUq7SOII5B+0dC|##!HXu&`J(f`=+@)DXH^F%j8i(HAu%t6Ss^WO zm=8QN%QJj>R>LJRArfjHIeKT`!w?5)arXyay5tJt|2Rswu2epVJ;L&=noVegS#^@5 zr3t~!@}wp`OD2e$-C%$2nbht7_>@DK$ZJ zC=oK7OfeWEj^{8&gk~0)6WS!ci^mWyy@@?YQG|Hv{oDVKFWPnMilw!bV5xK}g%=T2 z5@WPfKanEk{ot5mc)El$JdrXtfEB zXR(ARL71ia6xNXzpG72yR9Z^IB1vZHMVMD7U;OmS|8vjX@+P_GDE3G?rQtPdAu+2> zK{}l#_*txXdX^_BR-II*SgmGh($UO8Mtl6jk6?2D-$v+`zdO0{@|CK~DMFKC2_{9( zCg@~pmL@gSEU%%|vsxmZO!0_|Wr)<$*U$$k7Fcp;KD+OtlN+vDzFM{C)j_wMJY|Gt zzz}PXut|y`rH&IA3R8jCs%KH958p>}f`&??@5toRtEhvF1_3gEf?gQD>73>IH{R4A ze$f>KLG$UPnwe!uEry4rwX>WW3pPpfiByVGBSCd(4bkd@n42Ph7uM0>m|rlj;S(5RRunuL03x>1VJ>cV5H zi!P_p8T6~lZP~7I&T_q_qbyg=5jv$M2qB4&LAWb)H zG2$@2zqwL%(Mb=K_qpBoHBMXr{W43dv9WU;dJqdaAz=J)N_h1} z>Vu40ON(>2Z@=hdWhd4Wy)-FE&3SfN`L;8*V*K%`!1NWX{ygzXoIBq4QN%mCKG>wR>q-L$OPtceBg7}(`!gyUy6;;3dGraCMym#y1_K!-2xp(e_l-@5} zOEn3jhSubIuCT7<(R2mz%zZd7z55gnDI+|Qf8+spIHWR4zdi-0)2`!xwM%WLxXERDcPN{UHeP6Ygd;H7AaGj=A0?30gzmKK8oYz z4WGgBa)c$$KkLWwa_nwIPkv_T(Srj>LJN=`Km||R86skykk;9->1vIf_}h=ccpM?4 z`l{yoLGI%VX4Q@pE0(NZcgAOlp~_{~P;mx~DY16l=AKs{8hrUK ze3Rshdc#sv;wD47N)cvj*4yW^x-=u!??zKb$l|GcY)ZV)FYktooo`&~luAoiHV`@& z5?*{}p5X-XgP($c5wgg)v3wYl0ibN@_r z=CbMe>Gx0j)?GgN^xFTKv`*f>cGud>+RshgI`P<=*Ns0i-e0p}{I#opw)*`m?pwWT zRe99|(-Z5zyuP*ms;R}P52#csyXqfRKVDf~xqoa7cIT>wWcXUehb}m@_cG0q zw3gw8B%PcU$f5bkQM0TX))a$%GodC~BttS|39?#-H+k}nl#C!q22|k;S~Os5CnQQMF=UF7&H(`Xq9eB zG?3r1J@CXV3zZ7HCr!@slr}L7boWzOO?JQg%T zBois@V=xkbwh|3dC$Q+DI%Z)e!o*G_V3l$LIh$lSG>rjjGs&x5L(vEDjp;O?>eJG` z4to!Ou$oy;kj#HAo#wRalp195)JJ~(n#)P@2u-ILlA+mIj!6+v%IH6Aqv~0LK?5i% zmE?q^DmIjT1s;d}L(&9nNBj@6Ve8Fu0AQTe3Or4*X@O#SzOm{u@tzMqX;r?JJi<|= zkPswI%#ipIuf}I;D0UWyf)v4!Nx;IVn@g|I0=rMmr_p>KCKgR4rR|pDXH(h)EXrhB zUkw8Rx=t>I|iTRmP325&>o?g1f~X)o=vl8IV=Dkmb3Kr zFwiv`H3^eEIVMcJRaAc^zh^&j1kKkVk&ME;flQj@saZ+DECZ(sGHwzamu8Oh?^C_z z2!rrDp;a2icgI%@Eww1-e>oM|*9x`*ckZ5r|KLVE0`leNZ5)xLc^8iz9oMk&oo zHm|^9|HJ_=nG#qHCbf`A3uDK1YgDhff>h%egIxhHglt&+=$I5tOI{!_UYs_`5e&r$ z!q^SNFTIRDlAu|JNnp23r!gaF5`(}ewbU$$k^x!{M=L7LkG<~f(^QfW5-=EMHCik< zT8qO3iY~y~gDpl&M^BDOj>XSDonRAuDv9yeXf^6tTKYg%o2F+OA(5m3G))s~ek>+E zy>Gve;@D&YotI3&FrhIu(c>_H(ik-@c5+Od#8_0CF|Rqm9RXY~<|#qX3N&USox~d9 z$OJ4}f#5Yj+gGPhG34YK221I3HOw`Hm*Es7XfT!nOkkXSw6heC6Qr6-5EPSCZNRx) z-1q`#mz2!D{RAvxN>JlKLy~Asnx>%#7&X>8&K)W2^eKiIi^wfUKf&zfQnNVJp}&(F zOvDr?%^E(_CemYJxlhO=T6G$&f$>dZ8^Yovp}ct5DG8j+V6+f4l*Cx*?9(Y0 zAF6@IVmUQtpVW;k4_gCs8>&u|reGh814gn3L zCIogYAU{nUAt?sdI`kIF6L=bhkl-!AXQb1Ze;VXS!)zM!pM6@x5d==b=;x#~^00yN zm4bSfN%Ayi1i=ynKjs@geSkQ^!)&F~XaobEG-aWR7%qWB4GlG?p{cZ>9y`h3zf!gL zGPU|hDy>HCCk9g%;_#U`-SgTAzqoEV!_`NiL)8pRV6HHdvCLuh zaN2YlM;Qi-l*RLj)YwotN^>R2XhFp?)2KQ0I0r`sM<=wiX^w(lApy-tsx$Ij+0R2e zq;PgXPoUp0w{RGPU4fT|lU;gRO;8vdG=*nrsVP`u32021?j)nt zLfO!)x;Rv_m{gc#*!|S#GOZS8O94v4#Ukeaby}}mP}J?WYhhk6{?HI-@o!V zs~$!y897m!6iMenEN;bYfdH=$u>E#?` ziG1bS!I}qT$MFdXc1U*EW;v&+P2&h3v}UpawpJL5*v-Ptr#=U{&oJ_wc>2ZXl}nn$ zz0xhJZ|;Ny&Ln%1ZT5y)pj++$Mryv6=1xp6ogqD(&7vt*yd5>y&e>^NeD14g>~gB;`=`AS^RAy?I5_e( zX}aJHDd957XUL4V;}@u6u3IUUxK6^A5w|^pULGYQ%y{A2!8;#O&Y%)Hl>GZ_p4K?Y zYAG)yDT9lGH>h+*Iy{b$#nX=;Js^5BU)?@fI3sf4Ot;#J3;^_c6TOLKY)p@z%Pe1S$0E=#4-BXFq?=5UZNwAbPJ3m)Ec3|!P!EJBaRZ<;L%Q0n#&&HIw`h_k^6m-!h#HSU2e2OqEV^*Bovv`4c z)5VLc_c9FeYEI7i9~bxZ4g7AfQw&?qUq_T}ZT`#T$RHaOsxw zGR1kjUTLFv#g7nIhN=lUo=e0G4U_;doCMn_~=t5mH5g}7A7~ne#KO5`k?CdtH;KO$(tuW zJN~1=o_l7^!x=9nG0QXFS1}V|(rWBj^4)eC`;YjS|HP{vcos1qBRsM8Bj74-=>2f# zVEeD6J!31R$XBVMd=2pu7dd$!$s&7k~qDXt7wL=0!^w2v(@ zkz6a0N3=eEGD;TtV*rc2E4z&h4I<$ndTd{y0+~3I65le9 zy=H`p)gOLFQJ|Y3Lsp;>F5#ew zim_@l+8h3^j+XoW$n#KJBRuiN{WnVPvmYV9`FW`^l0mY0$slQm^Boh(8!S|~txfW* zEa+X&LC^>buDquX4}SR^)Rq!CR$iehkLi)EdLz>B9~l4n>TQS|>qLh0WCz-+Xhw%R z-k{k=-sX(v((zbQRR0e1%j4{q^q&*>_l7Tp0kEYzn=ERGH!RY zZ%G*M`~!x4lqjBg5n)-6K7|4Z?LVO7c46<6GKu9trM%w@BgdnO=<`(0Z54G7!_4`Y zKQ3G_Gs>Ae_`-oZ-}%#RgG>H|UPBc131A2-@l!nwT}aYxzJ=2Y0DU~-8(zWW8KH{0 zm+nx!r!TyM=!6aNc2gfFoV=~?usRzJo#^~CelP3+5e8$R@IJH{46D0bA+BYLY8bVP+@i4K|= z@r70R$tW3_^ik)azIxF%v|BpWS!~sCCzZZJFJh^zqMoR0gqnbTs)#%dp zmOjOZpPa<&M#w0meE`1a5Nw!B)-5_z8-nI|vqF-QOx2@}(k{KcAl^N-c)?$@=00;7 zLY8!I*)e!wY7uGDOu^-g5zdUWTcRBeDxDQw(|F|wStNeWLy>PY$dhuF-O~Sns zUGvn6nP1F23Lo`{XZ{|3>iCRd=E|AP)2~cFv*xMk?<_-YynK4&`j^+wum9%y&#yne z{^m6=tuL$(tiNXBHS71TUkBjEr>6dO>N8V!PUNQEG?kumPh35vow@{G@ZU`M*ZpYS zL+d`V?zVN^bvLcEP0Xz$)^QiEQ%$U!e0K7ClV6;?Yx13wjmg(d8Yd4XP0^AK_+*kBF4yf3KJMT<6Tmk73okSoDTQm>=p_Gr0a zGrLj|HYh`w1#5iTO*Qi&#^DQ_Gzm>mMw<%OHCc}{7>^$XE=JN^X99mO%c-{7PEsGV zcj-vMZtn`dmi*d!Nmp^Ob!*JQ`MW0Gw@!Y%LnkvRx#q2*9+jvlEeHv(EZmaYU^9Cd+0uXJh3m~a4(-lNwSxb?Rw^qj!aMz^*^_w?R=D7QoD z&Gyk8!P140P;PjU+Rv|&aSwy-l%@&{q8P7EwTN1zxOSf+N6>f(qKZNqfmnwKYp=Xt zq3b+4s^Vw`^r@7qs7q~mUZHDIt4~LmbEdkjsm^Ga12Vl;H$=!}rWiZw%yoF1hB3$` zR)eid+(_h11{0+ZnES@W>`#;*gbf5mH;GivY!92;InDbNx}jYpBRX>|SLrqxZ+h<^ zw~W13WeB#2ayFc|dTddRg(;C;xtE(l-rWfYEX8)yV~vrFX4_E-mnYa10I$)@JDjnW zE#T%U^>woJX0)3jygfWZb8HPEcDY|A*~IaI7abfqF+4cK{GnymHmx`dq~#(pDQXNOS$7#bhVdn~k?#|#AB}$nHXS{X@_PPtU9z~s5 zL$Gc(H!_^yr6NYF&z3{V)o@s9-FSl3|#H5VJ7p%3~$TUha#Ym&eg}gMi zN_oEM_Yy@a0K5T)>&1ZyB!6!$N7X`2Z_eh(Tg)crz(M74cQtpEZbte+ZMtmsr-(}< z3d6~l2(Ob>=c|DNWzVXADbuUH97#u;Swohz=^f$BI;G#LnG#P&>&ZqYU^d4SiHqMo zgjfq!{XM>F&kJrg)~I+azgDDJkRsy(aimL$RMKVU z3p2ON-BY$Sx<_5*w$VdywRY9|N9A$G)+IxvS*zAnD;a%8qm}8UhEq*MJDx0D`E1T# zoaia^y0=3B!z&aIq7X8G?P*yBlmZs7EtIu4A`PFfORD8gE?K)-fT9Hwy|Rh0P)AqE zz;3}3XQ2ouP#d{^uV=5MuhYoVi`7I5bp-l;+z?Q@dUiu!q1*L6LGVXfq!rYBt&$p*dFBh(^s#w_J)I`(HB|jOF^M&#h-$Lc!^f+gY%+I+ipl>gxi=dlrW0r83Vl_Xfk!!97^G#!$B3g{MQFfZ+ zEJeK_i^&&lDF<0}#E$0jDOabs_fdIB@_91hs;a$tfsCgtTa|U2&(RE3Vd_P5D?=CR z`K#`d-3S>TKPMOSUT`FGCjVtsBun40bf#!5|bEe8TlubGxs*z+UtnEgeofg~A zZ2RIi%W$FR1NAJaw&lCde!3EK<}Z-(kAr#ET0=~3q8?Ujn?-BRv|Dx)Bh%(y1SNB; zXHW{_ZQ~0n;cTYO2?=>bKID+`lG95@b9$jus{oNJCm!7ht7?QSqRc(=q+fn=*Wh;> z7m?+OBPPIM6d5S$S~F5%V8ptDZnaJ=esss;fteAisCqlABzW%Jxri_k91DP3qByGK zc5fq0Ce*ENmXA16OJB-m$vUvIx)b1LFk6SNX93~r|P)nz+VPtT}Pnvt`n6qy; zW%+_dD}BlqF}Hbfp9uORyV zxvQk!2!~sS90fEXZPBg?YHC0Okk-{r2NySP80Cql&-@k(;ozc0wdu%;)nlq7W9soA zPW!Pe zkjJf^PuiNK%|lwdNuAmggTGIjc{g3VxM605C(a#wa-aBF0c!D~YoU&$+KVS7Tn%}> z`D}qior=f3o?tCu1001UY5&X!S*j38hFOY=}r+M{Gq z^~Cen4<4bEHLhFweY?|ao5@5gMh0~1a0v;|`27~~y#z*ngeRpsEBA@NAs}dKa8L*;-_v(?L7LMi62gUdE(;}@15vQ+%#dGP)}^1Sh408YaUzkz?xHQ-oB=` zCbmYu=883&#{W3JF#e74&ySxNf9rU0JUD)6{L=BM)xTZ+7a}?1S7VQlJvjDHWA7Skj@>Y39J^}lf}<;6S^2Y- z-&%R^$`7r)byy_gx|Ii3&Zz#N`l;&cC=zj8b@R+GR0UPw95+OCMmKZ$%*N@Lrx&Kb zIsJv{6Vq>4H04^Qu#Ucdf#>wmodk@cThf9Lu)txvD_tkY=Gm zOx-rsow_N-H-cdU>;A=7R3=<$2m}IcW3Z}j>Rk?)EP3yZLqjGIaP&*!v6JH$91R47 zvXe6COyy?VT88U>e`;ur1OhQnpEUbpHok7El{JOeh821kr>SJkU_R$n|I3?FokTm| zO(#rkYDO*u5D3@SDsMU&T zLkuTWd&(;t?SX)<6r?oyw5Qs!vbeF`EE{$Kf3B6G0v;+DB!XqWLT-GA+<1T18z)MI zv_7D(uw~5nqpZSkIjvMbk+n0F&Tlo-%wf4beml#ib#c8xuydUx%bt=S_f@$TVe*t> zu`urK4ZL43KMsg`t`VqEj-*bYh^%>wLJsAuS#8-JGdRm|(1f-tQUcUbJymVH%`9Um zMM~+5Q1SJMuqi}1o{DEW-0 zjL}EzSu1yhClS}zlTD{iUkJf1xyE)>mg5Pe{iMDl^vPH?Toowqs-a;W@OYj1T;0L? zHI4*ly*R5pjZ)WSq?yb%Q;n3ho7jDYLU$r9$670CDqUOG#1>a6bhk^bB{im^DWcZ2 z99m}YwEVo=VLI9;J&hD=MRZTQTi7q7g$LXQHcGYI{zk~ob}L;W^0M*+ecws|RG=SK zbIrP)+p|fb6OKI5566M@&3X71vGNl#-PQIL$UfZIad#QG#+3FZh0gFLI@a`bjYm@k zcOaKsCm(VHE=HZCLxz4Zr}egKK6>wQ`3KHUFhtQPW{D^xC*3F>er#B=AmFSvjYP#t zCmLS6uh1>}l*i*)oP%3>va01{f+J7Ki1qpKP$J=?x+w*qtK-} zPuOkl6eeaAx)IlG4w7%FCG8eB^ zp4SKJbfwg3LRnxmoI;QG9Hb+Xbu?>bf_EgZomA+N zybo#{kyc3UDYdkdzf$Odo|#aqlWkp2IEourjio0y2%sFj6d&#L=6WZjP55>z&+Ab1 zuwd_!$wpC6Sh;KNR_J6UO>2rix|?kEYF>8DB?_I0wP(lTQkxOaAzm@6cTD?vi zij3DD<5;sZI|YB)QTQ5WW5Sne9|mryV$oRHnS8tuV0l zl4etdv9#T-Vl8QrTwUlNqq7j9q8h)sG?oXl+4F1i55DtIljYq0sdf zhH{|VGISV$sKaZOiD*=}kg{hYdSz#*Rx%eIw<`L_P>Uu=+Sj$)+CjEcW?!Rh3&@Hv z(e+x5=kr{!<>fC{wiiR*NfTk#>8jan2F{Wvlo2qb!%iX-WGG8YD1^=Vnf-Eu45=tV zc#v6F4YezLOmpaEd3!NLt}xUYZ$$6&=jmvgB9+JOtcPIjR$b8^)1xAcVR6L@)o%yB z`4caw#1EewUwst*J_`(0O^4H)dL~^eHFmB1(|AMYBf`E;!B(-C%GNX|`$hr(i=fAv zhwXPl<+j(H-K(sTcp}#XPENJ%F6N?5n%MHRA}127Q#F0Po@iNXdOC5<+vKSi4;!+6 z-%&c^t2nd4So&gR=;Ca+NvSj5!=An)O0oFo<`CZ&PTo{)1$q*fz*aQ8a@!Jc#|5lMWHv0Ny24K8~e6qCRWLZpO(K1cbq+E z&gikXO09Z`G0O!90#V*%B@@N01{ANRm-D}FDCTG&5-r;(gV)#17#zW@Pp}-2gUac&Jus_67)lOa$?`BLnUBdqZS$?SF z%upe_!Nz#_FyM=>x>KPi?Rv_{Ti_N9#$&oX@dsIcDBcK%^;uIOT=h3~#I9c{WSh}g zE5!YtZV#JI>gbeCpQ(%NGWL;89ae zPw49@lrG@CWp#e_9z~8Z5F;$=g5MViG~!udld{tX^`;KpYnlVbM%=?YQml)VJ4NU&ukECLk@^R9A{ON&1= z;%q-c7JYLS1!u)!!uc5xtS4+s4vRpoU}+n87prsdJWzn%%p+or)h%wGUd|C!pRp>g z(+}ttQ83cnb!r=A!>g^ZVSCCGNsE8f<|8M)CYCyn%6#i$$7s%m% zyv&ie==S*m9v7I(!LC-#`n!r^(0836aW7AAF&i9B|d+N%|l;}l*2R?P>e$!G|UNBp92NAVsEYOIABweJ9b{WIs z+$qe3N_cVgYmj(+PW0mW9tQ%}t>-paye7N|=;eM0h>0+8;8<}-d`vtTQ^!bz=&5dB z+`gAuhPr&-M@3cRo~3}s=;8)Mf4U1U98yuq9i`w+J#<0V)ejd%e{>NciRa~tFW%=o z8(4|X+z4!GfZOF=fD?2V-4-932dKKByCj<8i>Tp#9CSdvtb`Kx zMu1V1w!Q}?d1Aq2&P@UcdyZe+EV^%4+_d%lk4Qk+XWNCa)CqC@jf<1pN`Cwrc2C6D zaRDei7If$0mQY`orn_-*^XBtBA^tR8Q`#rKa%6FG(~T>puTb4MrkjExCe31;J^ZsU3=wpPCyd5KjVuwodH9Wlwb4C;v(v2Ea!=Hcie`06)NDpK3kOB z%o3uctj&tikkL#2v>e;C8ZG%Qea#Z8vJkV`&=0Q8$N(iP*zm)4H z#WF>)Ca;dnno7}XG;Z^l8CgzVfQxX1 zC!T)z)V{%Ig~c0&ALd&6FpI9P^^kC{l*5^T;3bqEdM1kx8{wf;c|%4hHs_SK_#j7C z`I;z@6X=`}@1$$4SiU=yvu|dEES|beE#vt8mX}1pBP`*V%7f(~Os)i7HM=8ib2Q&4 zwQ?WdP)1WmcnB=qf<8V`+co%dS#qZ*R!j`W=f||F1YoM)K6S(DDQQ+ABjIKYqXao9 z4+ptQq$^5ZRZ@=mz-qYxwO081Y(oe1g4l;G1r z&5(asiMlY2#VymLj1*wjhJf&oG^AceTh0M>ED5a&mGkSG$!Mf*VzhE&W;*B`W;qYT zg?tUvLb`BJ>Yz1Cp|yyCj3Wl}{_+1@y=m-vRaptGMc+x#fHIDsInUqOq+l~OA}m@9>HvQ(||UGcFjX7l~;fQ_`ACEhdl&j;>%=i=*z<9#DK zSdL)Lq!IJr$(A#b&2l z9R6$%?p-+g++>*1=fvT~%cIAh-ah!sdk}qi3E&h?Na&Gr-JXorl}}R!XE>=TMk2lD zP%Ca0@0i1K7~zS8_E$2hg80(h;-AGA4nMP3+;;QgZpjRlfHLK9TGpJ;GE}oqm6r7t2H4rdbr)p`w*s}0vuJP27U^}j zKzIBVYtCK2PCRwX;w!SShi_dx3#qtq1?pH?C;5qa z^@ias6q8E^6SUAUMXh?Pt(+~2-~UHM){c-x)z?r70qIve2G%6?>Ti0t4Znv393=vxl)O8*U#6( zT&=-#Y(Fc>+&{gXDyrTjZGboY`-Ow%?UIf`dR7J!N;07E#7k{ z4CB9|o_fdK?g1k%qHK|+oyNw*bO?2z=`ops68FCM;U}YH!0>&-KG^<#Da4p9g=yr@ zI}&vog}6->jrisdEbiMdN=7X$hjs8jACMw`ZIzPKPqwTcE(E+O#zBjj6L`xgS*pQg z8T{CoU`?~-~O zDzvtwLN)GAHJ0`|id-Y+Wu3Gvd-{)u2U|ZaZ3~!?`K1X-<-(yT*|O;TwSLoR^l66^ zQath*sGAXw5?qly4 zcMd8aN4umu_7XZ<7UWIU`Yo=j2{wWjBBLE1CN_)npMabZmbmdQWR$!x|D_!R!zZOh z200SeqAbTGP(gdPN%x&V6Q}}~S6aB@JMTt6jj%-3*T01ViHpCwaPX_UamTLgSVs_# zGVvLd>xcuHni_vnbwrwCQg8u2ytnk>elExYyuwfqG-GtUiAqhrhwIgQz|oF}SY z_F$iuYOehHv@)=rrGa&Z4e>6;x0_9$y_qCiIa!YOUa13@^B{;+?(^S&FHY+lqCg?y z2wPrL0Rn+OhwV@5`*j2SbcBWA_2&-{@&jp(<1-}0LRr!Asa~#WBsnb=CUP~M@^=37 z_=@E$XtqTqsODckFBu9jKPBiw*@{Zk!s-U;Bh`#I%rN?fGJLl_h^CD25C!srl0)^2 z2c@7I2}@FzQfoG?HX?4zm;B~%)7=o{54z`zShb@(k$Cve*9|uPKdD2ZWm^y;8$R)F z*3+d}Q>EW7J8@s3%MW9U2^dK$=D9771HZ?v_j~>eSO2Yq}Dyx~n!` zZpaN^!sm>z#M+*3T|4-fFToy}8GmZxbJJIi(W)B(Yd$$8s(jE0NS-DzdC*-F){p$5 z)qE<>6RuRoqN8GQ!IF{&eT%sMYfuTJJn^yox33?Rzb3h7TxPq!ikqT%&>XQ<+)ZBo z-QvGtc8~DH(^vf-YxkA!?iv`sE*YKrHM`fB}zFsEL}q>D2up^3cTbu z4joK82ai0A)hdm5f9V5go6ttufJ5JGv>pC_my&1g4c|crjqt=hYt=~AxZ|5U24DJ) zG;yRLoj0H@@^B@zp>!oncWQa2QR{d#@)y1HTlk_87ODtglO*Zo9%`B9_|X>}!B zYd6a777=6PZonS+Uc#Ec@-ehcRYp`LPvgZV(BXr$)cZX6uq>jU`{pl zj4b0X-@~F`&O()`y0Vqg@ya z`;vWNkEYC3qN5G?YHTAIEak)#KY)EON|qsTFZto3RjTp$!Etn{Z1*^IOjk$Z9>W>7 zAzRg55a0SEm?WcQ$%=6g#-ETqiXW7)24s&S;DHi$qG$Fr8nu?b?kB|DlX(9qS=7B; zma^$_D27M!gAyQs{QCx7YDNgBD-xya2Bs(=p6Dt3ev~ZMzF&8VUnxJT5qE!Z@kQ~! zf4n%mv0ttP9F#rpDOxD4E0y3x&C~epC|OFNvJd`0U0)vWMqMp_bN73Dm)@4!ozenr z*~u))B&96LWZ(B>A_&Q3l1Va2Ci|jtx%v zwn4h#SFg;jJNXbvj?G2h#j|kaU34FHk9EL}h1;8Mxpzm7QM+@{CLdb*oCcwD-!?cIQzh3vuY-!9e1+y9xa}z?T>9#6v(c@G8g=e&Hn8?%q#- z1TnUDeJ2m%haM&H7=uTIc+`@0=Ro<)uf4K!@uWy_N?xfDnf(YiAa^yi)5}9jddqE< zvzjv+cZV+={rbkvfFiob4i_gMFD>W3cJw`i4_TW114z#sGJvlWI+lbC7}J3>aTGMj z%BYX0jUCsQ;N;__!{0UyxR>7fBlsI*L(rk)gLCIXJG?JI3)c%&G1(TnOeI}@7}g>& z9`bTT*;S7k>XlTdB*?$EDBW@x7CHq^I&}TTgH8X9!w@vO5ckuNQsmd9>s6?;5!Pe! zvruC0M6iSf5A3*oGgQ_7_M39RD8#`tULu}$d!g7EZs%C^i@V=~UsT|v1LuuF&4us0 zxT$;RTgYD7Hwzy$+JK$qoVSA&OGL0{6it=HUczlAW~-@hYUKd`jRr5DiFp0ImaD92q413#5wNe7mN zOz5hA0y|1vzrhx2u=LNqOTo9iPc8(3OrTOLB{~TcS#0UbWn)1<*lD_d2bL5#>9M_+ zg01oKM>loXzYP)^SkhMwOWjY9&s>{ukOp-1p5_w{*Wd((8Mx_Q@&uXzosvLyTfv)nGAE zZeye}cop*#y)~mrK|jnC?Mc%DLX!xf3y{^Lf8z&BJpbQ~8{;Z|zZe7;AQ#fNT`H<@N?_X=rZM z|HyBg>4Bg8M4a5*YDf2}nI8Dboy+^=8U@HZl@uf4Hr~t>I*idA3gGbBZtX2fx2bvy ztCcwEvF*AYxBu?T8>BZ?y@3m8ain+JYIG4>lCuTgGkxP^x4T;8u99v4ecR!OkRP$? z4TbZhIZ-bdg5{!FGtdCrA_z}`ld!RreDU$UP2JBf_8<#b)Z@+^8HCb5-ipOxwNpqB zH?4wDmcG*=uk16CDvCMH%cTh0A-X|43y2GC(8PD*euU($7M z?7@0gWgEs4mS~W1kAw6W>^bzC-`FJcdm;|nyPrKMmbq=S%r75{xmeue7dfh~)zX@D zU#Q#kI8;?TZWo~y<3RDDcW3`x@aC2t*!7O(ea8~t!$Jc}!38L~RN6`TXHp?p0&%|#UIa>+q7>l&cYOeTU2^s;_+qVFdQlP-X z*bUkbM`P(93%!3Jhu^lfJ=qtzZxawizDQEY27QDp&hzP@Kb`LMxmuK}Ye5GUIGEmR z@KN6Q`7P43Ymey9Ury;AaUo6($(Q(}Uz)Z~Ua6WIzj62%vJ3HWU+H(rGw8bzJ34PJ zh8NV$wAJ5;JF$dph3uSHfTe?HY#&(1<{cnP$cfo^wycYN8s=t3Q^!MWF`W`}0Ru1X z-`!g$U9uf`R-m9*#7%It{?4~Hb@y$DFYwgx^1d_SJ4Wuzyusxz=`4uG*Gz9 zbO&^j|2+9Q1sHY3`JeN8$Y4MHD61*1oDeW=)tU~bw44dcOS%i-1uDQ&;(pHEeei;w zTeT)SH2Ima;hEs{)g$MRKL^*WQQ6di1~zbV-*+sljZElDdQ7CM5bcIDObd!Bfo|W7 zfo>~MsGasU{YN)<-@xR(3bf;bquSxo8j47&X7*v44V9*RYY38XO zSPXL7*1&PosmBZir>&RU8lNsM>ZSj;8{X>mdwL6Vi4$;=Z}G>n=LXVle!B;@32;j9 zlheqMcDQ+>KxZ1>ysuXEKr035bPe#KfTHX;_2R*e-P<%h@Y%>YZHNztIwZEqrc2$X z%=%zf%OgInyad*EB@R-D-Ulc6gT?jThcD@GH6Rl?RS%JJwjh(9bZ6X!OsLJ9puxir zbij)O3^%DS4_b*_s)y;w)`Xlfh^z@clcT_1FIIw_vzB8#l*|tFS~(Fc9eDYYT~Ja4 z+AuC&B)=PY$7-N~cFu^S>4@TOtviu`(ySS067pDph5{^YzxCC=NxP~0C;@yNGkQKU z^Pag2C%-iQ%dsidRU;%adSoj@&Spakj2aqii-b>2Mg&(#YhlBB?%Nx?e=>l{ zBhOdPCqwh~@rgzVuO*xYI+NAgGZ-Rtu^9*{aMGc_V}m=#{bu-3SMy8=^2tNVEFs1U zSjr$hX@ga6trZ?sprpOQ%V1>=AKcI_TL&`N9Oa>{wM5)l)M{=(;{rpQ)#$!Jy{CNiw9`Vo})A%SHN!~wGb9(6gUZ+ngpvwE+_xo8jnmF=^N3 zy;HZQmiNgCZXej_-DRhlP(9kfT3lPx?&!?|pO&ci_I57(D_He|^B`*Nz48t>3Z~EK zgEQE)O*J~1AHRLLC!0R6OXG>&+=8vxu!e~;7Yk z6Id-1=cEg+?rqo#HCKBJsmxeTx<^&^C_9mu-=BQtl^U$hwmc zk(ST0gA=#ei!BCi2B=hXIw%hO50n3On>5l*&EDM$idT=+0!kd5s4cQaXuEgu_kLI< z;hi3{0s0bm!1)NVlThl=YKQ3wyjzZ+>?_rSo!&h7CQmj*j+?|J@%iho_&>N>eqZks z;60Ay-6n9!LJ3T_HIid;d8npnZuh@|Gjw|5*f((Uq20YdJMV~ZcJ}I?>|F%kY1H11 zn}mWpBnV87g({C`wM=ox;z_a6Ew<|V?lm``^1i-PcKr5hdgE&t`S2c{{$SsoIHF=k zF6eIGb{{g0<;Xnr@kXthSdPf)% z!BV_g4yr?BI_X3bB3$)QN6AyrxS?)YpUf@GKt_q{_mY)vIrz1W-9IkN+oarR9FYl8 zA*~r#hpkbYv8GLz64II1_IA#l2$rsy4DLjAA@8_$u(ilxg2=wI#LcAyp)C;kf?BK2 zc=OVaJ_0+f0xb2*>>UYxT-P=JyKM1+bs`5+qOHYah(jWbr=m_b?WV9jh)aL_Fnq>J zuyiJJyMS7L~}_Cm0X@Ix1-i(C!cK_GSVlmhv$`Gh?RnS=6>MhDL3@| zP_-aM`-4OUQc|-8QA2hzQsYLLfC4OGBg^3axv`g5t%mk_Mht8FD?HQIwjxQ%d2?^q z+=)=>v4yMQXXMhn58vFgsn#qHjRaN8A>}1JOAWka0FAJ!1w_Z9U|@4cQ3rN2VQ3?NF{-Ip zNy|F1bF~sIL5IFGQKZ7yKH1U$qel)sM6c6a^jWo-Ia!S5qGc<|;Al1Z;$E;66gX%a z2Nz*rDQxMk{!iIZ1WO@w)Kc)<9LW%7iN`6diiTnbPm4WCMX*S_{vU`2sK5dg2;Dk}wuQx5Ay;?%p#=#nOux=Uu5$9BP7xW5$gB{tqF4^=Ab0= zZM_|{`s0Dp_U} z9A=0dQ{@t6vEUYO%|^qOGxS@NrtazOm{)+|pyE9nJcCbd=w5w~?A?R%xKR^Mg*uQm zS}oR!g7m_tK|%^JbmoB|An1I%q3imL?A$XJ{lz-Q2?>+em+6pZjr6(C%3sZiVCkS` z7~b#Le{Jq=`yBk*YCWMQL@4IoD%Qh7K0(Xs4RIy+_D-2spd?KCfuZ}SdwUo6*9o~d z^&oc7<*u?gUBlwRs$gp1gyi}H{4(UZ9S@ccVe^CjJ&%8(Cx;Y*UdSPZ$d^h{o^XsX zc=D{BGCJ!RSh9Eb7Pmp)MQH1FYzv_kw~=$&zQPmTxNCr1||;+;Uub{~Fe+CG^WziISq zDhb>EmBZ5HL9mZ8Lmq38LV+trylrdL0S>8W;I-^N2&;|)2g~OJP}1n^yP>qjL3s@a zYc~bFB5Su<&-;>u&+2qHi!DwA{hmMZ0K6Lo7>-@9z-h_w?B?#eu58|d^mw3wKG|SU zQ9Gf}4734*;{PXfA6E{P5`R+dxcxo%ZRnQnm)&d@F=^q*R814AT3tq*he!~4R^A`N zclDbu_vYpm1E8<+1ATw(hOXf&@=5|$W6jCX+;WJi( zA%^%D{YJNth4agI;g`;RsCO#FIqu_NSwr{zqL6B7U^&Tan=VM^&`aruKt>9vwD741 zfX)}*gxdEnzuOy?)_%Qr&Vt{jQ45&4)Z*}R%#J7XlIQEdgc2-=3b?vYeZ2?CLzIDv zW2Qh^wae043C;`UhK zj=1bt*(lxlXm9qElZ}uLZQ67svBvdyZ_WCGxdWxe^I$4xp(c0U(@Et$Cc9cDvq8G) z@!s6xNk>QrhhJDXFtZF#^wzG&{TN)uLyn0X%BP3HVl&9Kz17mf$jYL0%@e(a#gmTc z?zL6H^HJ$@vbfe9I! zaZ^Nq^MD{*w~#K>@+QpNO0JHd<|4>PAIvJN{e%xENf$133aVtCwGxSip!(PEUK|(@;!y)4n`T6N1&>z}YNk=Ez@^tS zy&ZEWLSgg1d53hNT%+yV&&bxX9R7)HA&NDMW<2eTwGEv}lp?ZyMz(2n6g0j)Hg#Gt zPCE3l*7tIx?ifq`|b{Wymg>uTH|Zzm%pjX`Ox1Fykh`=V!IHCLdd<@=eP zQs2k^@n>bb8_eA@Fo(=tzavj_m>6}@_FOg|tiV<3Grh&_q#C*w9rs>nOd!FdSNPQzz@?zTN!yu+2lq_te=ZwOK&Wt(P~AlkERixhBjK{3 zX+jSR(1o3=m0)R^v+n5{p9f9`Zbm4)cJB1GGtm+47ytYpcbVX9s zN0U&L#M#MOea1jrEni5#0(Jm2egXsPxL2$ghc2i4SvPMSl6OI1S`N}gvllJdViNo) zL8>ekTFwmI5y~6SuU-W?DsXU*^1Fc%f7x$g&w(Bw`Eab|Tb+o4*58NrbnjRJR-l0Xz80{8{HU3xj+Ar&M zYPa+o`8)vIdKIW3p;$91I;Vr`vXt8&Ew$l77t~d{;dRh^1qy;Qzp$tK>g)0r3@1c6 zf)*_dZrtgB3iuRLHKl80n}*wZnMU_DprOD?*ga-2F~0IR#2)@m)++dRDo5XXp^-C0 zah@s#HHLCgAA&1anb4Jg0742JTwg*Xn|`9!BYyxN*6PXqqkmDkMz&9v$G<;gn%gL= z6$z&}_<{Ey6&afsnjNRn6pXiWK0)8tsIYS?P->DC5t9oFsg~5uT5&b19DfOq~#w^ z@9IAK4rrtNammreXevSigYrvit=*YsvQ#4q(Xg^icD)5|c_mINkNxK2?sadW#dH7A zQ3Vi75vz-+>Wd{qs{>KTpp7z-s}BPaB@V9Sth=OJ7QeT?`^&?!WRuJLRX_&j(@QOdsj||YI{RK-X6k<40-|%t?*>r&>OD8~4WJEuN_Mek0 zZutPPUyg@G2LLugW{ZS}q$oTcwCM9JV&%zkU`2tG44J1E`-p- zpU*@lzc@BJ{UH_9F|9}CW@N8RmoI=exNxs0NCX0*CS26UX(}ykUj!@nmIaW40w*ne z4suWWYt$PHD}6&@zZ^7&K3pSVG=^}_nXwlv_N>r^oXbr>=*q1t3#*klNQwXDZb_uR zIof@AD^QZNYxc_>rO<9d$vqCqk_hHTHrZlWt<2NTc?DQ1XG5SLgXUK2yVBwcm>F{H z9a;qHIMiJt92}RSGqoyoN0b?Y8W1OfCI9*fln}hQS)P-3dH=DvL}M_mvtv%e9d=t& zRWX@BbDCWb!cpL)18*>pt$X&@H+J*uL0e%p*}ociL8}Q{PC;$%a6-iM6;C5BXpods zYgbm!D{v5So`Egp+1{4!H`lH}ix%JVemUk6N!eB`;&noB)FNt;N);Kh&(UcVsilr{ zNz;m95;hB8uXx>Gw{(pgW&H)3a@-`M$u}};oNUChdVPcpw=IypE5Etxx4G+-T~RWTY%8O3gU-GE}DE$#gD%-HVYkKuAKf4dAsuU&9(if9F>AkAJB9N(bLow zDJm#r`)kHpse8`K+SN*&bZ}-AqE`O|(KzSI;)G9E?s$Vf-3(T!YjIDLYie1w(O2N* zPZt6-FIa)pk`r-Y`TPhzT{)%p(F;JFauUgYIouI#eWD>_CP=aBs|jSz+kgn8KBbvm zz>*Rt9eR2lOn&>fwscFo;A>pqy@_-H^EMf->F|W1%m{k;&{@ES0w>2g%F6n_F-Vqz zWP0=2@@oKAb#J*Uyus<6Pc8~N>_`!j)}V|l+E9E$qF6cd(=8gtg1J`CjA}pJofCg?FsHi+Frw=gO9Wv&k%bEUy^!8-glQs_w!q?_Qvi ztQf3ptk&v};`u_>6Lu8KtpqEjF<4`jVClg3!#3%unZ@z$YuHLqwa^YV3r4Ig2dynPw#e zKj98opb@S!O}XQ0-mk%>NebSO0xTWIZ-qFKZ$ggV2Pk(Rrux6tOplk|I&+mYdhU_k@D3F?$shheKSJ`VNmFK-3p#r5t~V{EI$M zJ&F;9NJyJ-(iXvrAwt|GKuCd;mcIZW3uN?c>VESQQ13P8gHv&2WCk1m^5nm(&L4ew z`U-h{SwtVR9C3)gAe+1GW{G4$#}cu+uNF*8e=>ns6<}BqPDM5egl(_uX3X*j6kFbZ z2GAK?riTMD2j+D|+f}ZSE3=sFLE1SloCt<^122?2))+T+R~#!&*^b?R)=@jwU~}kP z=C){vs!hQtILmzKGJWqAj1ftKYg^rdZ()`C~4SoN`HIw@UH zTv@*rIzJyDnW`8CC$!YSQkl1}^iMYX<={iKCF(I=TgJGMy3(SP9S@z7zH5PrDZtWW zKLi2YwfyT%-96U9o+yW8A{qhEA3x!;8N3Wrw6(N4$zcE*3b3?Hya9KLa@~+`7+`AP zn%pmkVW7i6#Q^#nCSjC_?n$B0z*W+Xc z>I=a)sRT=pwSunhS3N5>)$LcUWZ{z74ITC5Iz!+Yj9S1W2+1}b2Xr62YGudbNwE-| zWjo?j-17I8$!+N)PBV9iZMi#a6S7%IrjyD+=^4@+4NKQt1y0HvlPhy;PclHd>b7%^ zRL9XI`o)E~Be^VYYaH&C;gTPE{lNu$!DEGff>w(l9e4;fGcmm~b_RhT=N<c**~p z(h)BonO<2~>&dYYF<{9<8J{+|=b&B@bgk}OwO0D#Ln~u4*@eZE4C%PLPv7`k$o@H- zUs=0OcAi4(z=B)tF+rUo9LhAASX>J5E4$YGEADps<_&}Hj9YRmat}$N0JWQ%3?6Pl z&qpF|1yi+{)0MW8hLAQn}<0;&f;g ze%uFfva#LA-l#(3M(5+;n4K-IOsxZNC3r0J9VP@$)sWomGL?5nrSpm_yZ$fSabDSX zN-NWA;zQ%l%N2wszo3fGL`Kwe=fOSesqhWMo-RkIq7?~>l$r!WZ%Gnik>`t1L3*+U ztLJvssFc{{ zA6V#5RN!faHWnu0_3}md|2NvkcKQ?vO zy>GBA9g9^pI9VQtdbaUeGnMXSA+WPQr7N!nQ&xdP(Vcy3@!_lcWc?xq`o7X?n*9!d{_PG7$f%8TAtc+ptbATq!G2(Y6-$^LP8Irsc}OV|1DgCm(7h>PeLC_Yps z{k2LiXr$dX2Ztnk<;_4yfs^)LbLSv|>5-dPpc2)ELz6d*OiaH=b>a9|<~Gh?qc6z% zvmT74;PQSs^cD3PNCwjmh*E49+UAzA%;P%gosYtnssu}_J8@W*J`UYlE4K~Ab}UY_ zRr4F{mNFGgGSCgDn3O*AU!X%LLM7D>{lJXfdWS4A@Z%UjV#tq^NM-#on;3R@SamKG z%}9>DK;c9vn9iF9snB2F3-|ekHHV02$dc);Bf5|ZLjP8>0|O)9M+9v zfxF>K*66`Q=De~mHfff7;wXu8u({MyZsKZ{E(boTgYvf;g!K}Ie zrz__yr0Is&g;RM)jS3ly=2%|(!%yL1C0IK2kvARP;&ZZLSqZdqCcIhDVxgL)q2s`7 zB^zJA{TUpM6gcUi;WvFB`sS|dd3k@fFYmt`W{OU=RnC#u`ig-xZn6X&Rq&z6bRK>I z4z&st-2cCRare}p%lZUskQ~o}ieWioVGax%OTwRxMQe@{+}X)AZh8@TQQ+W&q}qA= z4Xt&;-CuFe_qmk^dQ!7(Hn)(WK#Jp~J z?^LPZ6Z5R8)suglJT&vi$?s2oY4Xm=4^8GLLz8X1cy#{3ap&-35G5_ylcMm^5c7y8mvFg}+#^|wg$JWk%e)R3p-slfUzdY+zT{*gM z^xDzl{DIliMkAw_%u=H}RnMxvF*-N$=aH92w$ElpzCAlJ@`Vv;WNGHP5q|#Z5g(W< zb2F%qhsrwt+xdrvhTlK50UDAX`$PRdM)Y%s=Ds&~aPE$|560RBxLu+sbV$WrEHesf3mh(neHOnJ#J|tKVS_$J}jT3fjeA_CJVF z+Cqde1IZPMMml7SP?yyQ@L<@6JIrh)$J$$!bn;Tv@PaO>H6$Kx8mOGQb=K3+_-c{w5ZVwH(KjNtSTb*k4d7&^OuDgBsit-jPMk2K>hg42U@f?IN%RIQ zQI}0!N}Ex+dy|?JG(<#eW=gR@mJCyu)R9bizd4y}8bm&Ai`GRp`ink&6Gns!Bv$3( zj7Nh(4f9=p?hiMqSzH@vk(|eEaQaPJ&F9f@b&&Go1&7HL2-I?A%MyFmi-Ym*L_DN7 zhjdsfUl#Za9~q2yS~O%u!|M2WvJx$7Fw|kfq&B3~ScCS5LavB6$zodv)9tjOgQ%+w zEk|0WkUooHsL(mxDf;z#H?r_SHhr@usZQuP{HQQIw9drd3mvYXfS5i}Hi z&yrZnq%H}iM2o>ToHc+aLoC*Y(%hO{q!}@B3zh-g-{EBkmxU^&vzoN9Gl#_13b{pp z+z=?bO>PTKT#!M-TNY~zXX{I*3>Ff&h*_AqVlZCU&X|i_%*--PQA-jUG`^`9C_+qV zy{Uv9(*&_KNc?mo&1Z>LH0UcAd^vwaryWIP8qiX&ZV>%iHk&A?GOP9=G7U1~C&)yH zvHNnxST?z&0k;v<%%|(g3_&oCV3{N2zPowyi~-!q!R1f8jhXamE&73K)JcL@wM@96lOR;J-u>MH+$iPca=RZGz$sT5 z!*zI;31u9C7^X&*)agnqStim3CY8_UihPDW^=dS}lH&xjvV>zMd%&fM3MmYA&!8)i zUPk&lTqt6QHE}&Tz85`E&K3gDu7xWGoSaZd>&|W>Nkf%~#YX_@aQLYK-rL;D&SZ#v$XmOx!#X!=7aBi!N-fkmm#kC+*yNFOkiDBtYERYA~B&}p%UBvgofv;wv;C4XIpxcm}}s3?;!HI zIBcnLUAWyA>+X0xH-gIW(>bP5ChV|R(Mwb~fwNP@oB<|>7nm&J|wi+l*qi&_J&cc)la!xo4bGN;@;fP?a3oLH(cc5ThnCa{4j^Lg5| zM4EJA$T9Ik%%CtfSjzcysEQ?Ag+i|2YI{oTIsZK%#HKWOJD&pou%&1U z^fg&c=!a;0+flY+!cs#`L_3_NL8e0=9UwAXouq4JM>AW<6tzUCir~!z?j{295Klqw zQ_DdFzu1SH)cTTvY^RDke@x(Oab4hTG`@-@omgAfVToWSuHgjFMkJ3?tF6mml@iCt zY~|B3?u*gzI%|TuS>aqXAGN7H?xg$l`QNJE-`)PGPps248 ze#wwD;qi{6N*RLTHj{IC5xi6|^H?y;l|o6aTJOm@2TM*hs`V4iXh^T;oB=CGI$l8I zTTO_;!wb6LJ)W+R-By66|u z(~lfpf4jJ8e2q?yO;=A|KYfKtH~!VpS4L)K&&W3LjKIZ<1b`T!K+p_Pe)qyM1@1oTJDBt6*y@x@$((Gx4*un`dAYdutjA2r*b8)?)IyU{f;C19l#6n0XG9h0mGuEs>exc{chJlI`4fLPT)$M^w{N( z$RQqo+t7XZVR=@NG_v1$^p)`mk0l13|Da=6t(~CLvUnDy8@~>|$P-bL|2yO0o!#~@ z6kq-NidnVE4K$DrS2XEZGiFIgb-F~y7t{1n>iJyu zpd3vjr|=YIa0X(tHJOGL$&v+w4aa-~JVOe&9Bf6X+17G{uD( ztW?h#BSbvdY4tT5yfg~1^w>SaJ8r)d;)mCLO=d;TZA79D1+3vJVQsbo$!fOLNI(pX ztUp)YFYEM)IH|mGOW(x~^(F2HPN2Heeh&xsLW8r4>9KEfhau0Oc4X0;LrAs{Ny<@dj`NqS_f zd9wTF!IjO(sAU&FEar)J+8eX-w<^z*Z~&3<5(QyrRh&uaP|N#B_H+1SkdM~2_+ z_a)ss)1FDp*k|yWO*6x*UR$;FlT{Cm1yV{R-Rqt6vuR3?t+Ud8aUzz^F^p~eU zK7H+UVLCi)n7(B6iQ&6c{`pr&-#@)`SR8rp^!(Ic#&%Era_T!%U!0PlsNLU2KBYQ1 zmYuq0Dm%O|_Pr_plzwXa)YRnR$rmOcpZx6Pt&{H?J99EM=^FmXBssZda&+SLiT|1S z#?r*6RN0Z6CT^OjPh2r!nYeIdo$7lN>&M@nzia$AkjMDscz68&4Zk{mo$8L!{~a%l zSjMB{myMq_eD?V2;jfPUb?oK&_`DHBc>G^~hhPdm4Na72kKLh-`(0Mbw*kTH{zRK- zRT62^T6Z>=!h(MdLMRi|JTD`7i!VipyeZ|tV+?21$cPk^AuBF2*h~;9rYYF3 zKo6Abc@0V01Ktd!^RR85J%r%xB1K{~yNugE8@*$st~j5%(ZadmPGJEv(>&Ih z^bLs578T9l^=OVu6)Q`QM9YW_cP7*6=C_IyV=~iZn$6oif{Vm;#3krB!W4-_0qaz#deQHM`uWr) zvhgU(KWQ$C4il7-ENFx_PVD*yqEq*`i&)1Ui&U|gHto&0(P@nlU70Z6ii&h9V9zIY zNf)wNnUqCHlQnQr*>E!!t@0P6j)_c)&WofjZfI+))j%$h#~(-Z*$x)LmT*(u6f9Vx zLR*;q!vK+tsj*tIW;GXdj29<0&mp<7QMn>bNX>DzaG2pnE*%UH<%>ipUKZ3DL$U4C zY#zKumed6>m#dAnlX0kV!kS+~OY)d z(Z(^S)Hhd|s;iavuvju2PnN@(Fgn;UMJKocXg*3635VI{5<*WPvE^JwM<~$tXxn5h zX2OGaA#m9eYrC-}S5a-i<0765E}>baAeR_V>lyeALROD2A9Nr%SAtvWNQ`VGJCq?2 zOaN8Ana4$vA6ihe5mg$g1Il#-^Af5^b?KUh(P{`@Y5{kbW`kz&T6R2id~{ z97!&~5dD^|6CxnSHl&V(%v2h?=nVvKcDM{4#KN|UDdZ4?$+3F}@N&CER$;-=VrnYl zPoH+m04}(7c*Wdlc(NI-&YYTV58wAQ9&)dX2i^wg*X# zyl#Wm)?H1S=ujF)V++>PrW8pJe%F*RM?Vs zm|8nfL|B<26R%XS*0W|yp3csQh)$KG{8+;g$(9Vhrn!^Sord_VCNmAkk_B3H1*&YP zq&sW(V7x13BwLOQ-y+k&tdCoe2IHMM!KA}W7@Kv*Y?`fu?XJ>D+wq2$3b$Fl6iafO z2CGS>Y)fIbV$4fenWovPp$J5#l4*mVL2P<>4O?(58Rz~N{cI(Yb`oYy5E@1LTpFI7 z8Ejt_m#&C+%q6p)jzLSeBgGkFHsZ{^1GwCPwPmgoIlLV-B$7je zRjC3>fRRvS$&d{*1eM33Yx9M&{L2iRH>dHs8P~LEyD;%h#Ai7IZgpqNMaJ8~2$$Wy z1CcLg0~je*EKH@I=JXD&daxT6IkABG2ym>}86#oOPC5tUeaQ|<()xBwXS7)S{6&8s zz#%&o(=?XMR=#KwODr+=vjM`vbA&YofyHJz9B69S{T%UAG)Eb~I;??4TOPcKjgx42 zA>w3knksa7s~&G=bsHW)!wY1!feGr68#)nc?b&G_4Hx`H3+W9-0?`1Gup|>p7kCB; zy}6B7>@8c$-j32asA`Vr2s)q5-pmwzjFGCax!r@!PM|6jrZH;09+u6KN#TO~(eQjn z6N*u4f#HNI%i)X2MabkENgbXvHHehS!8+XeHT}hhX7bST87h|Po6vHW7n5o3!g<6_ zKIAkJ#d0WV&tkmE&tLfb0B#oYI9;w)Y%yc4Y{{>?YXCRKy?7yD&KAmAChg=;eRTkb zYT;PN5jT>SvWrZz=Nuluu}G8DxbUT*6^@X#fM#Z}=j5P{Am$P2P_ZerlRkXG!Vt;njQ>Xhn_h)yQv%Mh3=X|hvM@TsNt`~{f;nW)iTYnZ}utJ`Xz7U;ofw@ttV zecOeb%lUGJ)DQOFj3eBFzF_)jJJ@j7lH|JoUP2F~8xR_8vV{CvD#=<}>4kwUnXYGe zvQvu|A~jLVXfvk|&I;)~LTo+{(_J(W1g9}X@J2e4F*nNu&f~RkUx(}vFQ+a z6oXpuWY((&?aqf0{Zu5-&}-9WTMcX51HzWUo|E!Hn1avXB!OnYF!~d z7}e=*JnrDm{4(M`kNe8@5t8|rr z+t?D5^6+?=uBxpe)?LDlnWEDSZ{s2Z zElMTbemvAPc8Vr%pwMK)$XCg5<#>fK+rf^mrek`w;29WdgcmYWMF>~O&QH$0KKAI{EJb;aa{+5NL0oK35CPWmQE)sI#84_`cd`fz>XiBb0`HuAUem67X5ela{Y z{{8VU4*zq^IvgK+YINP`Czd8&9y@pRXT!IQJT_4t{RSMHFB?B|d~*1ev8C}_$D30> z9SMwRC-h@qo={C?rkqn3PMtFO*U1+r?wz=0qBaqm*fX(hVs!k~@gI#J9KUV6J$}Ww zVSLB<^w=N9elqsJ*qvk7jHSkGW9N-6jJ`GcJkUQNPh`|Hio@mX-$z~=Ui$9HD!PCk;lhAHned_N-gg^WeEn}-ydjW zJq{h7_clWTu}IYH+}sZMfsw!Vf55C4lDc-dUS@O6hMmd;-yIqnMh2s)Xy+`LK21U- zgo&k`!fE^nsL^fx=Nw#B7s*BFYRc$?>!{qht3ebqh-AbD*TG9=A)ZzjIt@~{;SkV_ z^l@&DHE;0REnz(+P?~g>NR5JY&+p^Z#d0oErmE(gm^Ma&$t|}G4NdIoqx7CqCj@4C z+ZPZlwV;0YZNSMeYQpWa*31mVJXvUWDk6G)7oQ27{1dg3w^u7M9&Zad$bi60Nm9Gc z2tRjTUo2|B6S9*EYD>uIrUbuVd-@p64w>A6pqJ!vUpbtoLP3n=^cyIUSf&45KvSt# zh-lDVvqn6)FO8}G4QM{t#}Qgrt%Qr2O3t@rq2o3!zAgZh_*s7v)CF z{uFf+Jcq0zj4kstVf2f33z^co>Ewndhla+H+rS+Q+0wW_v&9>niC58HgI6^OWEIVg33xt;^6tCkQm)kLJt z)k5lQz#sCJ@bk`q8D85*d0Zi~AX>0u1L9+Ge|qc(@O$V3aPdvjLr|V9UiSz#3TH>> z0Ee~8>_l3)bjtJyL8tvn4L4io^U+K!D5LF=C|8 ztrqmIR>7J~PDt<~HutCCa8RZQEc(u%TT5qJVNK*Mm|mxk!#YW4o%Az|)mBdgV3nWR zHaRpj_4)oB6rImBp29?UXwzQ9hNYS7`%edHk~QL#$X9(v9aNU$&VCbqHQ&cMbshrV z6=PGU%09Qnl)E4Tzxr+;r!i!TMGR|oYAH4jcUkQG&p~i+_Ho`?ovo7AREl<%8NJmk zjPC)}_)mmm(g`iBG)sgDdcbBQ9ql;i%{;OYy+o|#z!SVNp0x7Ojw|E*9xO*^_GhBW zz*R>e;ZKJBExJx=&+ot|gH{=^G6Nj0sW=311ZWFF%6d9{GV1>C`EkFsg+)oKkRa0f zYEgey9)$B9bUkhNg(`L`3Bg-Uh@_1rCmsVn(Mi^hGmveg)~i{E-Q%#xW}759@^N`j;k!q0M^@8<(b#c9}~g%V0IQc;W>*02b5Q zzr$}^`;=X@Xlas-cEIX!X)IdkLB9@UgtiZ@mb0>?CrYyFO35eE8Q(>q>BulOnAMR4 znJUF{flR8IjFPI$LDA7iN2m3b5K%RpLt!z9SGFhd_0Pk*L~93a2^&2a6fP(2G>uho zt?K(z9~!#Ve^qH|bX}jNaJfuySj&*H`iM%X9wIi}1F!S}g!804AzW9;sdFZ+Cr0Tl zC6F=lqlTIuQH$4M#(8^!;9}G4{Zy3WJZk{hEGcI%X)TgHo4+SN-KJ{;zpYCg?KMMss z+=Qj2C7N1aT9|x%_Ms6-CH{7$`>6QW;gQJXjy^48kb)}JPRyS7I+}$nuGv)tsh}0y zh((zs*{l`xY{J_#3+y=$!@Q8~YhWsYEMB!Fl2%N_Vvuie{@e$KLNX75rBxs7^Pn?& z14hzFiDq4qgllQl*MM}m|FcvUPU|>p(%ZZRLpkgx?cV|%Qd!Duc3UwMgV(e*H&IOM ziFZIV{@Q;|TY)7GQf91hW2v(XHsR9G&Yw91;y(UQy71+ZtMq7*CbK5OhO-&LP%va$ zrYJcw19H^%iIHY=EQeE?K%A-O35Z$RGzDZ{l;`lXrQyl_L+*)1SVrd^bFa?#=I@=z zPCP%$&0RkG;QXGMN9MQ9k4~OH_rtmS<~}-m!R(s3v*uu#I=)$ zr|;_?6#rTtUz$MnQ`J^?)^RP=N@=&tNt=z>co04Sbcn2FIwguU#!IG#81}^V1ilOl z7ILGv%As0_s9^??vJy2gsY@%uRn7h<+0x<3h$&HZH*mq!qseY`axxNluud_y8U^NUsT!_K|w?!fASnaIvK=ebdZSf*apd7c2!gj2&rc>H@w&wr z9lUO0;%50cTRRI=X$+|s@q}R0L^zkfLR;aki5u7pv_WKmi@D5JK<*^Hc_MGf+LNnS z!Sr1ArLI_Qu=?exVA|=fwN+kqD6-)>=)Z4t-&}Szu$CGwm{e7BnbN0r-vnPZLueA@ zf_&3Hi}OUiXp4m$)@tUw5$N1UyIyj!3R{R#u7*LY6#_y#9$yVFTzXmeg^iF~S0S~T zuo0ZC{3d&J7`D&RI}i;bU3n@RVm%bAExQx3&9IS;e!446Jzf#)LD^u)x{GzSp!(jD zC9`9y?sIjG8*q|oN=JZmr!5-EVt;}a_0cY^mTx9=M9mkjwAA4uT% zHAqvYp+owHHG@%nI=SK*7-`h+HD#z2#BzafAR1C?+w^%Gq0?4%c~%_>rx8zCW&?$g zmUGuC!oDxTj6^+CB~n^~@@O)NSe0zq`N-za!G`vO?t_(>$A?kMa+Klo@sbK0Uw1)| zuI`GGu13sRm(5oqGF6WW7rdb5jvVVgRxS%(BW@$PlAiP7MW?Xs9T@_2IbzfMr*2^A3h=x?2rpBBK z4UPiOuXRbqhFhpKn-zb7^<=YTa#9{Ybe^ZI%|w(a#T{)&be3|F-iQSUmgozn81O}0 z;76D=)T?+SWQaSU5yO_QEQN?KTBRD4I`6~VZUF3C4@`#*h^EE8R@@l3I}HI_olj)d zH^TsWyRsyGaGTZ8SM@QI6D!jR{J&&jx_+0lnx?&IQC9MSxQ8`c>iW!t0R8z&muC*f zT}9H`9Oko|>i`MldmIK3X|g%m>v9u8SEdg4ub9w|u0I5_M7qyqGX}Q_$80XGCeX&% z0>23Y1eSleD~n(WvlT3%1Uc=Eg!3Ajcm&?JvHM&m1{suad(%|0!!;6K%u>IFxfDe- z4S*ct_Ds2G*Xzt02elp)t0}ZC3K^Y}Cjmje8m@s_fM-^HVfpftNL?L#w)=S650)o9 z;{Z(Hv=!&|j0L)2vd|SNj8Vx*h_SboKB`HyBYR}+>K^nM9R+XHWDCb*H9@P^CMG@% zvlM-drPBUD7*a#VT!Nd7Yt6}}KZBM$(0vZPlXWa^$fRb;1P{4Et&Cj_n+e{1U$mqQ zLozvYJzbzIQFnaz6p+O3a|zPr_2WJ>mm)$e14t|r_rgs4YnK)b6!J|lX&Q8;Cf20F zF~!v|8nG@d$(cNQoHB4}!O11^jf4rb)e+ck-EirWa5TZ~J*)Bg0zLsQHY0m>L)Rgu zA*Qa+Q&mSRm*D;ON}gQuPcT$y-N%h?U!BOf3@J;Lt`*hssb?p(UFDD+zM%Ws7?xJS zj;O;l;IZbn6_pdPHYV@t()g%06eAN6KCE-qFmIW6$ER)=UB_Ns3!nL8-$G5Q`fxzd za#wjl?<>>B$e=G9$Vqp2p+1XeFQQ{HHSWnx>u0B0T27NQV-Y$Kf3sMW7aXt8W` z_hFzR9WjcztS!Q7x4Sc(gELzh!%7%Vv~xzH^$dm2HasDZsRB+yhQxX}UWR|weW5>8 z%$V_Nz{5eHXf+CY3n-rB=)rJa@KRv=_Z3ww%40|+H$*|u?{=RHy9AXB=c5(cox}1f zCqD-EhzVtv7K*AHRzeW4Vn9Pg>_VIZ4f*o1xh}B;db=I>s)?kb3D8FB$nyV%2hr6+ zOB>{DxTg|x#J~+ZW2Kh=Gw3|BS}zQIz58^)ShksnDxWkqOc6jA#_=HZ{qfnU1RFu)C;BI@Vi%!5vxnxXHSTd*{UZ*HPsM|H; zw~ReL@}>kJ*a2|#14lG3I1(X`HfJiK2S|%{i`TbPl+KxkeD)BY)>kYZeSA0g?M(b~ zqf~vi7pdt69z91ZyQNv7ghI}oEm_K;Kn8gLJ@%Z8$&3aw15@xM|(0E!7calb&I^P9O{j_cxUkUpjxU|VpjUjMpLg>t1cNl!e@~k?e zavE4$Pnz3)&~=SEizIH7I#)?={Q!VEWENdG>@JYBpUl%NY0g>v4o}RawIVUDdjVMV zk;J2}mo9`@*k?9M$6k;DKV&~P8Ic-6$0YPQO$-NhIH1H^I;-K(v*2EJ*D-Lf>Z6Er znl<31B}37?a|{8;Y!^2_bK-nJp1#)){7~BhDN{C%1O9{0?xb>MM@$~BX)*r{aO|Ur zu7~Czx)yTvh~IzaL@y`W@4f{bq0431ZWM8c71)RwSGNh5Ih_w0Tx^%)c?3gZXW%Yq z`l^Wv?t3sHx>!CBeQ%w3trd}vMY#?&f?(iz05{u`JKeKhg>XH~#RM*Mi?H?q?o z1V*RjvFp0Rrd*r{oPnA|Fp&gbO%{+k<%Z532S$A~@mLlxk)eUtRa>#{E_40lpq99XU%SUq_* zMLfCl+Dp3lGDE+XS9)yj-Y9eiN<4$J5-m9v?_&5Bb% z)^DS!GaOUTRaJaVSbqv;g!&&DW<*GmcCQO}Xw_*)zz!KT+!^qINXh&zTzhV+7*T%i z6jJade?GBdJtX!Z0e%JYZ1DgM1L(>Cg$#dyb@FGxDmgb*Iye>rpyy5RbQ`5=+uMG~ zL;^U^21phXa0}spt1ar@f#>bQxu~MzqKTdmyLzB7=~GxIfPswL+iplOZ3nbx7Y@m$ zbMV(&!uG$OST%jlD$<Q_03vu2 z7TT)O&Z-sfBOTl!UJR$l8*8P?Xa|s$Wr$}aN`q{Ay?DviN(kx%m(WL%EVoZ|z$v?r zCLXE$b+7c+LD zpHD+Fw<4yh2~V567E=h<7|Ok#**6S~`e@g^sldv%kvby){?AsDCPVi%W)T#KiOCao+B<&?St_}B85 zoE-#l`e>p{bE4-){rsRTj(+Z50mR|E3Imm}rold0D`x^_h=3ARufsW?oa_JuM;`_M z-qa59E!QX4O3zHfNUa#27&$)n&>%bhu?fF|pS&1COV&WyNp;WZtbM zxe9!1)O#x-vl_;*pC%r?RdrUD0MmQ zT+v@Fs$Nd+6rcV>W20o)(Ah6%B)zu`jYU4=c5l%X_v`6`uBMObay@CT-U^-8M-q=d zIS$_Wcm8sd^v$hu@5|az1*Abof3vPj)o_zGA2P+18C^|$aXrlNTQ)sq*fvf<%Z>CBl+wy6)f_nAhp3bWgQu@$rq&|9vEJ?)ulSl-6zP0Qw2Y zQeTuM6N?ZA957|1J z`+>^yVvTs!G&Jyiq`An0S4l^vp|>Fu<-Ia)HbMez(g|0CjK`blGHWPm+1>)ab0u_l zA5A>@j=h)L_s=U~?0XP_86@Eh0)v4P&9e1MtDtg#lcJvH-Aq)Z zwsjzB$l0X;34+0Rmb4qBFKz1p3I(4ED6@nE|T{~er{fdB}VWgUady$z)OM~FF6dVBn8m7mvnZn=r2al zx4*umBO`oJCOtt0_1*@i%6WA8nCQF|9_cR@5B}gXoAkp=JAim{VD8@Qp@(bT1R1JG zS{)&SjXK1T+nvR#$nAk1?kk03{;*M!_CRA-T>&ZkMx=?$$K7M%(0>h1DXx&CzP2mG zy?AGG1;&|lhH^NQj=(jp8g$FKYd~iz;+>U~XOnuWr3`)gZ@4_}_PO~nkP7WBPPhxL zw}lvQE5tQ^FN4_VNLYk@B*?({y?xT>$qod0`N1tSMe*KxLZ!{x8hAohxz>rBm7S>- z{WMV#dTyW8Qo^gZUOhKIDCgDdYPJ2UT~F=%9o>1q+6U-%(^pA0rUPKe^xXUi3?#}P z)O1=?H6q;dH(hka?gM~&St%3$jqOZM_0hVZ^wMkB{P_Y%8B*vBi_GPni&qvsp1hqb zxXMnfh&5t>>RGxRhPA&~P8nj8-o9L(3GcHHB84-5B?#V66JNS3ca`+Ql^uxTs``Z% zxRxdi4O&w*<*by*?1L%LS1hX16_fPvKDnP2kTgwBZFKY4BLGpmYEXU1_1kq4_Vn8` zvSvQN4Y~no=E{;Y=_6Hfj!yEvc-X{=<_ff;zgRq?OPZzUDj>}Y@b7en>n1kp^aaa$ z0O6mDz$vP$byiKDO_DMA_e=NJpzl|@RCzDpu+_A6bxKopLB`MEW16VJF%@8!WNv4+k-iD>F@eo-& zO*CSWcm_V9yU#w}hG+X|@+UN8;92^qP12SRcHraQIX5roIIp2(joWo~|>yaJIHVyP4%xn#_ifLPy_1rUoOu#j&l$!f^iB%nNa zmH1|<(}k$rE>2WB=N;PLIj}wyu&2NSA!9SRns%a_sxR&Enjn<#E*R2V_IFmTJ$DuH zWE>FE9$Y`%Qe2GD5rBCtKU!bJjRZwJ)CL4auRiC{hO@RdDB^G}gt&fK-C4E9c8)6I z+%4YVBh1j13h{hnXGGkq?JQs8B0_B&9?sc7t+$ajty{2Z#cQ>li_cBL7yPH7AurK) zRzeQKY#IO=@vs5D^5E+UurPBDuZ22`LTFQAK?17EcdebFrt&r+P~M-T@FyEUcCB zA~Ten;}XOp#4F4l_?9{+70`@6e(Hm6skH;?a^PDBQtd$29ssHo)H%qrNIJB9L*86= ztou7u@p!vw7A0#(^LM^tr)-`3{@#Z5s_h&bmK6EwXCe93Hyj=Js@Rg@3D|$a@Y(cr zMQr@0kzdFskhQCX%*(LnNC}}z8E1(~RpJo!qbyd)lq~XUQSF1p*+&zP{bBXaZgAx1 zeMp;|Uk)pwr+69M*_4|rIg51F%SU5~&2NJ6eGoc}1Ya2)goBd~{j&Rh%vdg1mcMVVZ_Bx0~WAZw9*G?bmC5$G5c zn^u4b=wwde38IQeHP&R@6Bo4hG~$r=KzE!?6OTW>QMO>c0nmOPP<6Uk@@Q!4R4G7H znwX>N^DtRU3!U%VSXxOkXQt@suO}*&er=z0-qo_=1iO`txgPHx+EGi}qQoH$Q_|9A zYz=2p?p;`d*TQ+*M-vr)17vxyX{{5VxwiAJxc?FW>b_3s42dTWbhfQZFB$py#MQ$~ z0Vpy(c;(pFCohvHm#b^*o|l2n(QsOLm(GtTy@|XxUeRaZYp*-GMw6XYQ++h_wI|y* z4_$F+os>?>A3?^s`E@YEB3iuL5}x zqcoOlwE>_SvbH!Y1<>BRZM!B9@|;bQm3Nq}GRErDd1#iLu5VrjJ4c^V)w(a%hGdjx zKxC@tgZVT%9+Nx>)JGE!{s!-5)cF=Kx6C~^KMjn~cT2GyqYOA{bjRV0bB2OlTiR;z zCn;dmM-xlmepV&zP0Py|8nt?{QGTwP)?*RQoq>o&+TWY`H)VlEA4xp;%)|SoUuEUx zXPujuk>Jspm~oZ-5Ob<(kPcO*P3B-f$oGxiQpo`;^B zxNO{@*fH|?f&Uq6%d=}a9KP_PoggdfIJG9M)l)i0%pBps1%N|mo8m?ofU`;BOHMf; z`{i$MkRmtA@%>g@L_v8)DL7V$%@(#E|0+8x!x?f=1 zK@{`_=4&ynOxkC1q|0@UJrWh4zNxcw^6XMbe65C0^T_5668Z5CWCnE2&7X!5&twdZ zJgzAT4SOP$WOac5AfNx2-T-?}KdqY#P{f8Gft;Q<$kPDUiHwyUM_N)fNoxr~r?OV` ze!oB4(2TZ@cN5oC`3D?e7WmF zfI|E4jTmt(tFYeXypLHm}VL z*kAUz$lM06>o30J;QdDF;oCsK*>S}emV8>FR}BAP_~GHt4c|DNANCLLn|e{9pL%ra z$kZ)^A0F~dl_5Y|Gj-|I+R497b|zn#lqTmVKQURH3=Mo{QayRe5 zzrOtY%O4v0)ADF?toiGrW@{hw(R7TZ9@AC6!@5@>}hL`2w2^|lqz5( zoCd{j<;&_#m*%xJmm>XKrN)sN60g&ar@OcKc|G7W31z?$6=DW8Bu#u`fEP=j8JX_J zQ(T+pl37zK%N207I_a!Xw$C96*iwNa0gEW%aAP@*gSQ1xxwd7GkU6WH%v$UXQzdCF zpmJSVMNv$on2MKO2F6EOV*~%R< z$j0fszG(B{gx{92w%rlBz?)VLf>9V+rOm5Idzm6r;h?rs2xiT^F^O7bh*^V#C+Y(C z8D%aTHy{VwyrvNb6treruS;sc?;)Z8+F-H^-nb^Oj@VPt7U!^0x?oKc)BVTbPrDe6 z*W}tkh-1Q;QZvoATV9(GkkC75TiF&1CgU00RdyBQ0pu`{C!>@=Qsz=Vo^}!uIui(@ zE}&D@I)(dLJAeRId~pd z-l?&8NFQ>q$!ox^6mMtrez(Dq_tTtjtSb|Q0_OBhS6&x(`oc|y@^+`0CU1`Gw0Js5 zVG*OXoUlf`cO#k9K7g8m8w@Xmjm1;}+>7Ff^Qr^@Y~}U&w2sQ9gKp6DQImBQomFqp zwDl>kN#9C(4))j>sU+@etDK%ni}tuUcdv(-lAZDCQvN`zkTmExw+B_Ha?n9(Pb45f z6mznicK&Yom%Zi!qO>}X1>-smZnWj1&KJ5*hw~{G#eL^mkOm$P zyIn=4;0DYM5{KNymknrgEt^?Sm6L{04E93O%YCiKMhE^2rJ$yv&tWCCmcq5Yaty<% zQZ~XtlD@RjXT-1S@o8o)JdrifF}hOm>fI(Ms^3gu0vSovLf(|c4p1c9t`m#1AOG-d z-WII8h@>awQ-=ZxU4q(=9?09=W{$#|Nux`Za>Np;fj^@Dv_Yt_DoNM;O(tLDsmr-8 z|Gdp)YEzDABjDnE^{AWJGu12SLOcl(rZL=>RXX&kO~^wxZ^NotQkk6P;w)wLGP$hk zG4y~nqVy5QV$4=AWSvlc`R-mhTh-xdJG_YHqe**8y#ke6vaFu+s)V%4t<+fr?s62~ zl(*kD|AlFmoK|m7J0RxISl%--G<*Ams(P2bYB~Rc^3k zJT^q4>c(1GNtT$_Y|5SU7Xq0y`|}v>9Rk9@-xH)~%vvPmVYVvaa_NXSP z@tNI;bXYk)iumXRPl{|8GEGXroNx@X`+DUuJP#PIW`D8*V4hfXY@k<8W|Cyem}<9N zRrn&#P9H_%rOnh@Rg*uVva5prRGMCes%tYumhgIKIi1U0EqHKp-?Co)WYEuINsTM3 z36aLs9^{)0p2e9w!RWx7%UsY3xy07q?9|#g6N%eeAuCm_+i`qZqQ_rnbdtQw@5FR; zIj+iVdL5N(S}?xZHux`j5^j%rmel;IN2o*GeM9YcQutUb{N(G$XMsMzw)7k(DnPbZtBRDmi zqHB=%|7>2J*J_<+eHAR3j&_n*{~W5X&gLmfUH16fhGaEl#%UD5oL8qTOkL^34OyOJ z%IQ^)^s4I(5yHZTBAB*OtO@k8-YBY?VGZSu2__-Rm_n_{vXiKnRi#Xvv_;jkMz=Z> zq4xo1P2z^KmLXb|dX^)mp6ZnsSS8*B_`9$to@5;S0P^4lAWdh9@De0tQEKxJ zJ$GTTSKsB7eay@SF3d&3rTF#@y>d(+A@f+MR&~a_;Y56P#ZM4{%i=X$ND>C8Gifzg zm0T7H%2{k`Ks2TCaK-Fl*s(3W>SjPO&f;t;0>@fC93A$ea#l#zDXY`&acU{H80H2K zBQ~tRo-oECU2&!a?qlhp-mbyS0>&m)^WhMM+fHCMg1a5@VR%)6(nEj&QH7X|oUnGR zSME=+lmo)21I46L=_Qw5+bcIDoCM4e1KZZe*lK1?Z`c{C3}`rhmEIjMv|WkJ#ozgke_6p zwlftn?8_CcQNfeuqcaco>RSv(qGA^cnj#lA8#7nE(ktgIBvJRYwRkQ>2`T0N*;f%k zsW-U@fG*Y->y4Vm$txc3mFoxr*FjLQHf(kHiTL{7?nAY-71ElvSZylCl&TWU3M4<( zu%vJ;<|M7fc0?7Uu0w37kXlbx9BiPO&^XiyW^eDc)U00%Xr7FnOXMmATa-KR;obud zB1)FQ7DPw=q^pu1`5WR7M%1Vw8V==MWJ%Y|EJb(%dD5hZ$V-Oeok@4qV~dl$_L7{9 z!OIZatf_`034-1FUx*D+<7^Pyq;Ad@Vi|*jo4&nQ4xXq6cfsz7=m?0DRwBp6JmE9x z@kq|=C|e*COEf*?=~cIfB91^gStNCq1fHdTi-gCUY!2r*-c@qq#d4irwW;e_pT{d1 zj)0 z2G2v8=``C&XsnTKYII;?>3lLqg`07|l68B|@9EW;ThIwAN5&O#`rI*QO|Pk#K3=9= zvwT~pQYA4XyB$Sc<=Ty?3IuZ7STmQeRT#}@yTat!S=ZP2-rQS+7P_{g;( zq?;stDMvn(qRe_?3Plm+Z60Nathnm{RZ`_CL)3W>@)?aT8TpAKI(g~vFnA*b#vT}? zWJ?Fw24oY_ZZIz(JDR?z)B9Q+9f=AieG%@-z%~HjeD}b8;n^hlnhe|s_?I?Izq<#n zE8x<89$z$=*h`kSwXJa`gmRTkH+u$?+Yf@FqmKlp_e*vhy5Q#Z(pv{*g9%vB6KJue(?FC^(xY=MD!~$a|jND1Gx@@BomrE6!uU37JjJC8xVV zRRcC}yQx*{;99h6N#XAR`$s=bR6KU#D(TyI$VL<}M9VppP><)^Y*j@G{;U&Bm#qXO zJ?%1CE<#`R(ExIi0xO}MxhN;f7F;>W59+D7(jLtceu%a$)ihDk)#Jk538M7V#FL8r zPVx4mPpp^jy0d4OyA*~Fae^S@rpF%%gDM>fr+r-;738!yyA&);AH3+$yZ5b^*4_;r z%q(AaXvykAZP`c0h3vr97Zy89dJ8@tHWC zz-A~V6Q7B|;WooDu^3149F?G=ID^v!M`HxNhr;1v%)fi*k z`XT=5hwqUzt2{ul5kN`;u5p%80&9w$;bKa9hNqMy8Ra6Jl4DM>#+f}zmZ0X3=mr#9 z=MMnz!N}j?e#Oi0k&xZ>01xUW9_5IcSS&%$P#iQNqGairm=fZMSb|7Ih(*D1Y7dFu zeHaq{&F8N^TX2FpE%?uXH4UsW2Ip7|BW4l|L(NbTXhIacW@kt)!p5U908qo@i-MDT zFpT3w+`W72d;yrBDfgMoXJ0|g6C}w*s7P!k5+|Wo;w(NBWn=gZ4!s4;X`X`->2)}c z?;#k15s!X#$Cm$7@@+qQk5sZGbUAS6IDCepD1L?_DQ1QxaD0a6V(>2(At@qpiaEyZ zVU&z`?6TEcw%{yDE0x4zSI|n9UHl=&Uq#$$m>4+4@-xav97Lz07|fL@ITMX5c?^$7 ziRc;J={*e1h>`oOTQ2!Ox#uF;G@l08sktpTP0t^*!?YyH12~_6>Bq1$JfDEpFi~!X z<7sS0iNzpVn8V^U0p=7mEiq~jON$2&t>3!&|7^yWe=IkHIKak8j#QE`0*M4OLlN=B z3_Qm|gD@_h0Cg%6qY-Z<$I*K@1`}0}zPDxmfPO$Rc6wHx**IIhKOa#l_>Hk*)LB0q@ZZPA#Fc#^Q7bZM|v5 z{7Tb+;$i}eFnl}?gTN|d@EU@O%&;uvZGgNI1jdk*GR{X9Ujs9gWA9dVU}3#rKKnH| z0J`?p@R_ff?7aqJvtm(YoSlhAV}v}XUB;7v0e72#({fU3s;KrbHUdg~Xq33d;O=FB_)sIOxGhl*E<26#=iI z_rSh2fAa1@1uQoUyy*0ZP_Wyadh6ngAXr2(U%GBku}6YUcB;Fzj-#zri5(!QSTsVj z%nU5+$P5*Wz#NA8Hv%F`nTUdym?KQ5+#2JHTz3FTktMm<;E9HEiNb(VIx@ z0FH4qBToVuIuFJPr)DDZ>tG_rhT#GOgHpF~iXmc6vhrSMAfg z?qX*`i$)gTM3WId5@WfUC=-YI#>XSjq6EAc=cx#ekvxDpp6WX#32T(S`{cWdt(*U^ zH;KRfi9Gd)0}+a2m`Duzhb3Xz6EWD|aX9!AECc5mE^j&1Ddwzl4?~JCorLb{u2K5b zBsljPMY`aDCF64w0ni1<6bD9rG4{1VrK}4Yka|Nesy966s(5fU6)J`>e+w@GQnP$f zH1wVW4)C9BJ!7<=RmJOYFF80%2@P;auqNvG0H)TA2|XSS7(=s zNACmVXozdsD7}3|)|BAZQ3>*(TgP0UG-?6-;;v|Ni23TWJa>Y@tm=2 zG17^w%hGGoH4i|O`f1`(VaHC<`Rq?Y8GWFujDoIA0xP7qwehyeOlI8yRoz@Q>%(2u zeYN=Uufk~c(ZqwA0_c&l`}Lb&l?MuLDXB#T(9LLV6`XOE>N=xaUxpYfdDI{JC*adZ z66chD@D;uNU)D=2zXEORWq7nK8Qe1VIfZ59x$(l#e^2NpH%i+c1n3BG%ALOwUW4>r z!KgA70LZowuwiPh`p26k>M_}S7FvAyVv9qrFns(OFwARc zXd!(JEwh*w+fRbON23?OG2L_J}sG}OM9hsihF494;TYQ`5I2OejWz~Akcu*&3sw2>#|mcU%vw>Xy? z_6%<&hzi)L%k@ai&~3@Ixcgz~j(!?kiGK$IfF728N#tyOXbQdW0!{9VX>s;wXKJdC z2C;FkK~%!S?G4f|j)EwV7jIt9dWewgg(`_V8>w)_?5HS>X-Z_D0uRQ%QUpT(*i+y$ zw`#L|5C5$RY}`0j1wib#6r1H8X$W>Cn3{6N0knrSBdNL-(tc)~aXnS@wjk5-Ntm1N zW3XKMY48zv^Iqxe$7BadLmG0$gZ-4qnj@_uQvgQ+`MI6Xz;pdH$a(P7UE*uE9$h2d z_zX;H$mck(ftI0sj+ob+v;qT>g!Uiyngm1(V2dg%uppJHX) zkH?jS#^EG6lV5EMk|Og0Jknnb9>C*P>9H3&4=L8QA$-bU0-r+JLoP$v!TJs9ta0(! z>0oLfL@wQa;lk+l(xcad<6Q(C6;_7@$UH6h+Tir41a^&ZKu+A8 z1a(Gccgw$brl!wX1w5uQ7fH8Yzd5Ja#mH`tg-1UOJP&M`xoEXL7s6}?i1Z4Cly)J6 zIRYUFbas*A18W!7UkH%}rzgbUsVW_P?dYev!j6eoywVw85BaE-4y|8+05vS+)hTUS zGx!N+g)YnO@ELa|%X3u~kKB_y<;Hl)t6hgkb0#b&fA)r2p>{YM)+QmEOGl!~l6Vz7 zJ{{h3Re^jRM^3p`Zuv=P_1Yw4%1#oH@w#CTKoZBC9vlxt5U43nx)4-YbFK>F$?s@S z1%h?mMhlO&PW4}?4Nks-PYHcUIkfOUIE#g~I=s7}wo^EHy0Pc3DjmPP4P(7u-GPX( zpLfRB1z^h4JVB>EYwTg^bOF*${*T ztZLGwwE^yUBDNddxDuvPfTI9k%^kIrXu6(Z7t7T&X{ni2n3k(~mDI}TyQWjZ=yo`1 zjdRvjFZi;hka8!wOCXGnfEib&VgTlENQDX9^p&nnl`tCI9H4Oe!nJ@+pZD<_&`mO7 zqybPrQjBu?x<6x3bGyHe>i5UzI*Pq|bS6EmvHd4;v^8x+)^n?pBpDhf?LL zCso!rfEaYSX!I=z_1t!x>D=!YA*BE@( zVy0=%3F&MA*F>-QX|KAIDdR;u7ReJWaOdGR9qW}-Z6jW9I-(Vax~Pf9w|=5mj?)IX z5NXY}(f~hONoVl=Jpxuw5dkGAo*YaJl3u+TmFqKH4uJZ~7?Ewn>U>(UwO1Y?n>gpf zR0d6>)<`kK2n&+X1F*H0QrA-2XwVVMoQE#v2)!-nBdk@cz{L4hDMij+)Sc2ALT_yq zDs{S|x1>xKukr$fdqL>+lnQsWv>}eSQIs=jMBYAxUKgt1xQhT{-JfTNse?m{h ztYlc90MBGRDDY|QX(Xnureuhs-s3a0R4%%pyzH;2J7;xXMY`q`y-bq9K-$M+O@Gizjy%#U=jvu6ne&mwTujN4EQjty2p!pK zKpu^FS#1T+!7@3%v{#>Wmq~54J!?rbv67EW@30|)*6Fa|{z{G%V%4h4&l@eha>C>z z%$gQnb!uvUS7zn^qH;|#WhYB*utkxvtlrD+*o_(nNkf7;zLrSqohn_79`B7ifbSTn zupwM*k%^4k7oArf3`nh~m?E@-Z>sfr`9^YtEoJWW#qAr-5UzWbCXU~T`dR{B@~G^@3T|26tfH=SrO`Fu#D$@tf6d7h7wvOeKD#(tBxxh zgwknBM!Zd|Y-Dy{&|{=6rwDzpNCnLvzq&%LKo{$TT5D%0huPpLcw#|Kncj_ni6C9K z!-`W@S1y5tbq;PB0(B)+DtEK!$~%NckaU}bjT*$A%P?_LZ!;!mYhD}N4{_VR*dusY z1C^>KVoko7(gm1R4b)uD7*PXeY8lV6hANx6>Z7PSTlASoDru|6*=)=gQIfsY%Z8LK zs@Aa8jZFjXD^VNMz54c8g(zqAq(jJ6%Wh#{wl}=2jyI8z{);O|O1LAL+>h?n;j4=C zkQm6?;!5yMm_F~e?%f>0QUwdCO{BC+HXl+KgnfuV(^eMALMfg#=j}F6gu%ay#Aj+$ z-sWh;W0`WnrxNyW>{SAhA-R}1Pu+XCE^PHqS}xxh~B&xZ>D zBbYADs!EOYj^4>YS9M+@N#%Ink@wY_BzH4nL-PeC1<28kijJu}l?vp!L(l;b-dn@k zx_ZD6O%t0>l^Y;EXrq+!6oaXH!Oxz*8%arPa!JaK^Hqnzl5TOy{r9dNoCRMlf`~UX zHg~w$=5zXtOKH5VS3lmQ@mxt~v*5hPDk2veQ)vRGcAGpQ>Np#dWUDRtH@7`433kdLxgyw+nw2w4K0 ze{}vz#ceLqgFi(`z66OmqC}8{b%&V^^#H%Bw`&lkw3f=GW4V$!=>((yRh2uK6 z*`P7CvO#BhO>Z;A%{41dHyiRe$;e?Kk1bh28#>WFBTXs;@mb+!n#r$iL#0ET(p|BF6F(_N1 zSTpKdipu+=3mx~Oa%+L6$YQ#dt>v(^5!NzttRSpW7aRk#dNm!Z)hQyIT87}b2&+rb zlMQPXLb`B^xz6lG*>MT0x#nbbX4=p!_-ZcYWxwh1*Tr>&KUMQsI5)-c+_ImcuCipX zfGZ40uZ=M0Wti=~XM2{%J#0dkcX;fmHkjkFPai>DqU z!!e=dj3fyfOOD;tE7zC{WX4<##eEJ((3)X;TZM(O6iHA~+uFFp6jO22y>2rnSREeC zx#t0wX%iAjx03JMGH-_)A6ZuY>ilk0wTHI|0q$e2)=TIATDJ9ql~B%Hh>TiZuQRN~11?%y;!uKviZw2H!tUI)7uip20r0QbLq>`4e3jGQrxJd0f&jWBTw5eA>_ zAi%5HAyB6Ko?HG3@9CqVK$#c+3V|~6ZGj(npxc7DuhEQ=@jyARERlA~C?Fn7{{%ex zXyP_+0^MFfMA)<>{7JTy!Pv`CYG~~176Ndc-4-)=PC>Gvde4F)y#wK8eKhgdk!m-T zYooO8-QFFB49SJ0G8w_#P1cx<+nRMT-bNHj_1d3dHulp*{B6jn_|{AG21)f7StPi_ zkm1MB9Y!e(X`YF;PnD?_DkfK~$LaDv0;hhOSbBIAWQupzO5z{or3NeHG{zfUNLXw{ z%-}FIH2J)h?KSQLe}l&L(ZrLF1C&`ehVZGs$rk7v%yaWHJX@w45M&Li$QL@2?R5aI*6^@vXflwu|fj&^cdjTM*iY_%sr5$3?o0MAZ^4*e%uG zYDxV8X6xBB@%T@+L8#M3zg;VS`wyM>5W_d$UJUSxE}7iZ1<8ACup6DwEIDppxq2`&V)=LizFIW{T1v`9vP_W&bY@tk&)5pYRqwrW?u^4&j&F)>n zdg;TX3lNhb#a|!UAkaX ztjJ`I)ne0!8=`_i?-FS7%i{|>rus_7qt;=VCV%|?Mrrf11%M_~D!F!)(gcf!bgtOU zlzZcF+r+}^sXm&BfBZOvaUPR4O240gH?9oz=i5Uw{klnbwvPrU0o;wiy~cX!o0AK& zn-$y?g<&?J2FLOOV8FnayRy{Cy4ZMcB_C7(r#_naQu|MEVf0X812{P?^yb&};KHeR zzX7;sPz-eM8S*2y4}E>$7a~lDH_y8vI5#iD!p(Mfxn#O-(7}x~#zg6aC9h&-3+&FR zzG5-5`O^^m`8u;f+O`e`S9a@?5#i9KPJnMHA?+S`rpF6K-h^kn#^!AVNzk!OTWx-ekK>(M0m4_oXnkVM!par>H1YUXH^GK+ z&8JsO`=%G%imjo!`6K{ojCSXZH>Js`aZbgO{!E7OGYPRoF02;sT@T&ZM-x|mW$8uY z;XT6}9@(&9=|&(X#xA=_ffjkB&?plwx4x8jw>=&cVuP<-SiQp9PkO18+ADo#<-(`} zt;}z(S~y?6gNQ>vp*sjuz6q(VjJ8BITyZoD!Hk&RxUh3Ye=!2q_|3)zgJKIjA6tCh zC`7dh+#W2N5^jwz$%u~43m2_;U+IzOd`5Bqy7xw<|JV#Yvr@3Qn>LcMv8_B=szJ7J zk=Y8b?JpKzQUq<%<6B{PS2>m}|LVk=rH_qm8`(X?4yczn`@ zfHfBim~g;SNJCJ6+otuW#b+;A*g1VpqIB@j6?A6-5OQGk2g`q31~s#LO-)C@*06bb zQhfZv1waTmCsjPY^WIYk0iW2p0FZB9UpwUG!3gfp*|Z_J@sNLqaPh&Nz~tOi@#LXv zPuct1yB1agm>t}_7-ZqIaD$*DApHXsg18u&$$IgLT?@;n&spV>mjjWg4AzYYV;*!g2%9tAMi`2w68NP{tksbsC53|KL?U5o~!sN=)Rg_VRf7A5B#JaMg}OPyG8vX%!(KO6q8-=_c#Z98Tii za@yQ|bmxlxVp)5-5aDcgNH|nvg-(Xf>nU{2yf;r4ZMv2xpBHRS0d3DT1HNcypayE{ zef0q2_MN@bb=(5nDqE5Pdy#+)fsPVyiHG=z%wy+NUoqgie65GsNnZhvtuWLfd=-+T zYD|_)84{<7PhY;UR{ZLf(DFVKT-^Q)?(+~7(NzmW;<|kcTej%u=4Grr1WuRtS(DWy zo7Z_LTRCQD(UoR$9}Mf+Bsf?0AeaT|nSC%EE3aNM_Tcc?8Qoj&gdP^FvDSx9N+5`|bEPgt7iXo*hQDNa6vc24yb!yW?o5)VG}#%AeRjXZI{ zJ3)pzL%!0b3Tvv7F~~LKrj4}#mg=5k=Yua8ICGwH9`@A}@e9ASsG6^n{#yl%Wp|Z| ztPXV#Yr9t{S6HW+&D3fZYe5i?nB_}dEA+tGBvEn4WEZ^KG7Dt!Ck3!9|7 zbf9(uD&xG2!-rN(sS($P;v@vWSp^TLll$kQss6&q{jMHXIDDwvv`$QUKj4 z^V#Qv4)3Fhb1%OF3jg#!Y>^K87H8a&ca{u&ao~rO>nHFf?|@Iybt4~?b+!N6dV_cF z@Cb<8>TVqXDhauviK^AYRFvvU6Dc>lOAC`zeI#+EhrLid{O#fO(v77BfRn&Yl;4VD zW_6YE;3aK1-5tvFSe(Vr@ce)f|Ff!zN4B55M7-|fudkE%ihPzu^d(afhx}xiuio(0 z@>w(^epH1XJDVmR8~-pExo!mX9;OBj-E!UB;ib@$Mi(_O=EM^uBv7>%E3Qz3B*a5? z_`K^Ym7z2Y(yGQnSg|r^HAN}Hq)o(Pv8*@PjENs^g8tiIEPwJErFWYP;Q14!O{p|w z(r&AA7Oy`CK?U(PJknn*gU5l&{6c&uC@fFHL|gqKIJBa3hlfF0r1Sg3ggdOId?`Jy zWaGA^X#Wtb^uAINz&otciyvC>D^_|O5PV9g8$3ik75zm}h?(o*)&0di52EYg^K;dK zC9;R>$WI~Ci5MPH92lRIKm27MSNq&y89oW^7;0ahQIo}r&zX+qHGG;ET~EO_o45hA zuzni2-~DEv^qm{zZO1Wp_%w=B1OmW0s-9yK0e{UKE@#DeZd%x}qQ4j>{eSM0vLBa~ zA=vp&BV(C0BqaNan;NdLwP{T9NpZ)G&>?-r;?ezA^c1tZZiHiJ;{&#iAS}~^S3R!mQm8cUxGqp zpGYNm#$8i31wae!iuCYZz@?8S!-WET;$MEUNm_Teypz>D+J>4cHi=?ZT@1yj-W<63 z9#}~IG;!{Q@rw?9<&|~PoA=0z37WEQu_?8nssZ1W-Ef}x5kYJyDd7bq8 zgYwjb!CJdGvorx!QbkqiTCAbXYawg_FMbu(l))5v zVEo|Nv60^nZyc0X-u~XzXgk^nuR#l$qXGtqfl^m1;Hk^{OT`4FZR>m>)@3u zrScc$PZ6TtG(bA+5LL`Ig8BdhDvCUrI$wh4`e~x#f)DNzU(7zgK{9_?w$#OVSC}Ab z&Pp;sSh8hh96kKRKSA62XyV+SLp^lhEnkuCib1EJgd`!n6;R%BXsB^j{O!F1D;D&=s*Eq@=#)khQOc5H)B)BD$p&);{7;qN~W3~h6V zHvvOrzw}!I)hJ%i7&QelnH0Qf#PF*7VQ~6s;@rI__lo!4f68|GuU}ZST}~{S#9{ul z#tx4>KJ@Pczfw%dI?dZ#!FG8VFu86T?n=+L9l=_H z?KlRe^Ow)tApOJ9g|VK6?%A({__4XeGHMwDjg8jYfhzdZFr-0atf%sv_}Vw*UAeDV zKKG5%2OgHSixl8Inutg+kmGfARlPxo-+crg=`ThKiB5vq0RH2LWxO?Hj!zTeP{NyS z#!_k`5o&?e=}|b(`bx#p4N9|wJ+=VWd{FClbOpZbB9lhxE&-ZRkp%1@y+a2%+r>RE zfYEBpLkp8D`e|aRwE9Y^@zBCZul@IZW8r*Rmun{SS!?$&#qKJe7Vmsg)?d%2fwkpA*m?f?Z$lz>@q_E6 zKR&qt(62BbFIb$9ZJJZ_1Zgv*ym8FHql03{RA2F(b2mab_N|X@l)m*8>^iG#iy1YB zUme=7II+YgZoBRq^!7E6O`WpI0j3>b!9r3v@RoG|&?)>6Hab^J{FiqY)`>s=*M+Gy z=c)l-vpX!J^_jnGjJyAth5J^Ni3TJORwgXIOt4(47)903;j=UUE$D(il6d5yA}-y2 z>usM@i01Ds1lK#j?av+nBv~(bPJ8`Xo1g+WVR!ET5%wiua#Yp+>De+fnaoV~JtTyL zuy<{}KnV1{R_{BARPSBARqqSvFruOm+2JZ8X5_CZ@}3~z03xzHMUW>Tin8b<3Z@4U z;kg43|EKy^51Dp&FW;9h`Odk0>ej8ho_l`3gC6+d(Y+g%)dIZZvUC2gG#z_X*a_#k ze?m+u(sjc1jR|SET=ejV443)obyr+1L*7TR4{i^-<N$X+b_CF~Hp6WL zL|S_?qVqTGbL7z5&%=Ct$;(GaQ1(YhCpIo$4$Y}$JvZ$3C&3L1RI%WQW!p}ZCk>I( zZOCE)F4PpgXl@vNSiPaR#m5psa=8X&X<4=j+|f;YD9Fd5U` z;jx>NALE7rH|@U^o&VN_2;P0$lSd)o`X@)nHnZ?;B0d8h=H0Du&@w>CI+wS)l zXurm$3Mm{hoeCS@#Zb(Wq$Ik&a%gtlORzn@VsID-G-9CIQkB*@27u>>)Rz-=o*VQ zlZ`OpFnV$}xtwVv(ztnF_$8eF`*k9)<{(nNa8$}Wb>53$%|3hhRA^ev%jt6`iz-Or z7iqctxv($8iPqMkJ6?nZuU`k82H!Y&V~Y&UUH?W!bdkQ%Jx8h+`)4Ht0j8u^**3+wkX~EpHsCsR?Gbq8e%%My zMD&*udx>@P>RZHNAT z&SHO;7oxO+%(bKXGG)mbko!k4XZT?EI@Pb4{r4Ae8XPqLmtJ@O>lwQJ@A&(iz4(2~`W7TR*6S2aCq$?l z0y)(AJ2YCK7@VR+);j%r9H z`14E8Leu{|`j(i|>aYl;t#l0)+Kfe@ltw1*EqV+NpSV|Bhvwdcrtedsw{P0?!9f`f z|4*-W``=$Yr>qsbVr2X>ND4SVbY$Qi*;?_O^3HLW#%2$TP)_UvY;fwRgKTJwcAnK5 z_0|l!WVEwyx?hZ*JyT_#e}A+C4#-?PsW4LJ5>s#RWnWXpqx5)Z?{vRdJQtYfUmNe( zyB7?m?nYib7xXj7qSJSFHlwp-oyp0iDx?W2&Yr(P))|)i|HA_vF>K+mak2U-eHDnl zxMD8OlnVKRn?%kDsD8g#JmFa9pPuMI7MzCLCGeD`>}@-E%4;%nNI5CKai18?@ib5n zPj+m0@ao~2c+4qkF=L2~7RoA%sh)9UN%a0e2fp`GF@mfJ$DAn8aq}-&(1q_lelijU zRFmkOZ{2e--UZw^)Y%1)?87>E0G^0!K>pUHinyje^~}?m)X%cBB)z zcC>Tcjnkdw1N+Nmwezy;o`PtKZMS#Ec5j4D zxp+&ujtyFx5Wqk|I7J&as$y=4CYy&Oc3@~Tx?*i-^@e4OAlYL_HqBph<@$?c=$!Q( zh|kbNLW!UVCUrv+1|#ftS-H~}Nu&2Yoh`>N$?&&q$$8nIo|I~b&f3@+gIEm%6){=! zY@U^~d;~U20Q-a#eWJn5dnolWcL~cEh46?+HhxgWvEA!>Cy_9pVgN%6X)CgDY>4Mr zeI)NNSsFK<*x7(mn>*9%mn(s0tT*(s5N_Yvfj|&QHXin6A!&s%3$F?(KC%=GNd>!R zB3nDt8*Nr`V2U06?x{en%EwI+BTWvjK)F(cs?o%V{Cw&gb@HY%hB6>7(Oo z8)6QfkB(nG`u&l&hIhbTuQ9({e&&TD^TT2H;tCI z!z`G?Gm6$`;_doMm7*PRb4tX!y=Gy5XU*hN4Z6k!*Zg8)Q)D@*XES#)ye8C63<}3f zdc@n7)3i`2=W>NyDjp}g_P&2|XU$Zf3b{8y#OpKX|7Wlju@Ez(Hp1s+Hd-FXg@fWiP7eG({3Qu z2@Mf4)mqkEjcR()KlgPu?j}fJ-#iAst^1c^U3UCShM(DtzJGdeB0O?N=Qwg4NPMmz z&4SN?SB*{S=d=2n(hUOsvy0C$0Ve&8}-pBIt4?@his`PAe+lQ&O(5*?5~w`In$ zTD5xD%CD>*op@{FmlF?9e0_BD#MKkci3=yp6Y>d2N55)e)lXMFu<9$TE?-q%6&cWs z%2#PuoxE!8_&ejj8Gmy8+v7Kle`4zOaemx0e&+a|@l~T2jyA^rH1O0wXmnugrIini zJvR2uvFpb^HkKG;$C$C5Ve&D@&DJ!&T!d@eD_TuF8^VB(n7?Y`C>K{KlHNp;Q|1CMb^#eNlSLg( zmh54xs>ue;$-oO(9I?cCGMZ0A&~H1*YJGE9?9=E1rkb2IHfD&tr55vH&~3~ODRikU zTWcn@d@>wWc%5B5Ml7l>$w?>WwH7@s4N%ZppOfS&lZmPo6m%+3DpkYW!oEf?mPJa`6CPP?8_VFUHwQ{!~2ePdXZ;r=*-7lFS$h zKN-uJ9S%W5s(}d?lVQg=#Y|pFIsKF^rU}#0Kw`%Zsoi+5wG^{7N^T&1cg3fFjO|3y zt~BAzCZeW@C!1kXo34@Mk$8gU>Xkq)S}nw)jKueQsHR@?dw(cF4Ux+r6*`?Bt@N^-m0OR_d?%wA)ed?Z1jT z%3pLg^SVG#xvz$w8!`hqp-*E|R8vZ=Sr^~+Z<3st0Ul+tX(TFc4`&a=Cst$o!Cb-* zSD`{FZOj8-_ExERf-x#bWD_kS4;Nc@ZS*Y6>KqGNGC7KL#p)hYzF{$^PPz}<4=Q|h z+UMtOD!!2mRpR?6wrY?@N-{qq7i= zwkw{tv5}}j_D>Ativ^5Am8fyyd{gNlGPwiOb_ z$%&dEL~8j8y%(dJWBvvSP&l%f6EPa5R_wHg@N@l#6sRoLQx|3V7O|`Z;8yL zXtgR34XF!mCQTkMeMi5=25BR+JaFeSKoXJ}x<`7hKB^@cF0Zev7*k4-IHy;hq@tuD z880+caW7Nj3>fVU@iZD!koR$Jt=S3`lIw5AW_(4Dj?}gce5){H3_7*ZHA-AhUtW`N zz@>a8>JtfeKDcf~TKt4X*M7FtN^_;aM{7?Roy>1*1(#TG#@w9<<~&@n^GTcacP zswtSPR|$R0{RFmS<>O|;qzbw0ydmXMrd@*6{_dJpym*NiJQ+P3FDG3I`~!V~w33bn z@IBa?Oa(&ZI4t+aib*={(U^k_OqdB}=!`BkZ_FLG8WT;gp&WGw8fiO5v&C%fRFN*K z?6pK&t zHeDtsQ^_WH%TKY`tq%x9q*=7JqFfmgGCYN?7y}VIk+7?rLDFpkYDde}Sndr8c_OaO z6~ieaIa5ljbT3N^Kji&(d+QZoNys|<~62mY{^c21hTDX=Bu4ZJTnLQ_jNm^b`xQ`N?r?gJX((W=$N5LuP=OC#eAj zL0Dm8N~IxHrnD<1J6w?_bsiVE{?t~Y!c+e#$t^)ES)r+1*k7~<_1uYO$-cJc3WTik zkVlClFnvn zqp_~an^fx>Sne)+LxhHOmzi+6TsJ0$G3+?zHX55mIn|D8avE!0h$;wN-c^a@iL6y? z%y2${0>%!Sq_4=A9G;}pOaqlCJ)Y&dN&i00%tnHXjGr za-)J$j{HcHdmBX}qgI+po;F34%(zFA+oDQJ!~0uiW58zDaBDFkNX(_8(uA=}1st}5 ztEJ@67O|*e`#WptBrpK#wVt?E3oIPu+1QXXYY$U_n59svJ4ykK(om4(;g*%O6~i8N zgYrTKkbM?O9!&TsI&G|53gukdMhyK^lG_axs>m7DK7ng;RC@F{Nv!haDStlV7udtS21Ss_45Vc|^<80cX41*3QIzypTH?!(C$zr^-t;EQ(-IsU@7r z^rV14nS;>B?RiBs?5aj$q09y~7PC#RXe{V7jdBIDSQDpx51VIGZGzSc&5R(=2OX)b zc0iH`^l8HBt2=8ARlcGnOkcpv;4xP3&k}}Q3cw&PGiA-J__Fi^6-Cpz1Z~WEvaXO> zxnCLpEK}oYP1dPTD@}$-S$(=nDo;i^vYe~ATWmB}B%-FZSZ?Rcc`^WrTY?%+qfn;x z(g(1)Of!Be*Z?+M!B8sHvpXZ%+Re+|HI3mmvZfdr)W2xSh2TCAMOzI62xF30d{=oIX@a zZ2P?==feux@0C~8G1{igQxlj_J!VNqBb1^RZ8bTQo~Tm_XyzGlTWaCTz|NlZCpimb z%gyr#gOZ^@I!zVgyx$X3inIa;e<;bFRGup5yqR>;!SNYp>RCx{0)mNlifJbdKo=`d zQNxm4;n90eNnuQ+NhRcIZL^T0Dr{T3e($kR}OpAndRy_r8SdW6HGzb6COC?zA=^PYp@q(Zs{-o>I7s;97BHh~&r` zY5g^MVa~h3qqub-oo+EANO;(R4LFD{25so@+s%_hGbxfosOc*^(jMRG?@aaxH z4?ose)s({qK4)kb)exIFD6L<{SUp3=THyH)H}u(7W`ooWh6vB+i87-rt93>-6OXR_ zBerj#9WBTJ107RH+cRZ_@ltGG-%RmD&}}Gsqpq+%Ir#pH6}a2Fyj)EV6f@y=vY;SC zS75@@i$&keN4mb5H;0b{)cM6C#w898QgF_M;qcw_HUKv`r3IaR z#puYmc|QOZZrFnUPV{^Oo2kyOZQvUSE&486hM3QuXC10SHs^#C;^xjel%hHtCi@ge zF84wtT;|%X=*Lvgbh9VE_zqwMb>U_H4}oSX5kr!`bK4E!*NPE3GCL# zKp>WuLTj#ABVEOPnd#YoQ~{0$sBK`ewh5z>2cjRhjcOa5aMS|R`zDtPk?e{lL{V*e zX&b63dzL=0!afoIqECc(HPZ}H71V9I?GxP2ZY|O4DsZy&sW7+c({nHFKsI$px(w&f z1cPwpA%drInm|RsSAsl1O|>EKE-^_rExtDT-kF`LsXi5YM7FLA^+8+D>V23q4}d*z zc8Tb4?Cf&d*o1}Bc^y>B#RRIgOxNC_15m*}6@=oEd*=bJ+`Gt{JP5|XVdDW~*kKd( zd17YLM!=wNHM1^H9N7;-%Pke7-KPJ6Z@l5It?1!{J$K%bbKvr!Enaq9Fn-nOLnD72 z-Zp5PU-SP+v0uWs;TBs|sF8e;W{ed=WmVNGCY9JP*P-uOJL{(Vbr58HE#xjxU%h31 zrwy(!*0^m#6DC_@t7KLdv>J$J>i+mjJN&p`hpwR>ID7t0yZF11H54~d6=S^W%2nD) zJ#b!%552(AfzZ6AIwZS$N(#+;#L*E`PeZR20mrzByk2iz?-S%zEo;m0BK%e~bhD-d zm%K|<7=0^->7n;DJulWy9qy_hS!|AmJs5401gFz+skWw+LYEMo^{AkOiuI|`+b^Ee zg;Q)sPw9G2x3~1zX?gx)1q}*2qad|G(xk34k%$Rb@LU5J>{B7`!SA0S;)A!M!-ifB zA2otOxG6sm3}Qc{+gb@K2`Ag|SF}34333XEZ@kU~Z@g3mu}c^3N3P2r+k~p7UdOn> z44n*aLqr5K_VWUDNVH5?xjb((+LB?pLNvGmbCoq&{O*Rl*Ks)viJ>`e2gn z7o%rCb%K5Ve18WBK+D>k+f1dXKp?CG>WCVR9u2@x`o)+KRv+w`Wji3`8W6|uNb%xM zV=$+U=_H@@6WRuAkBhe>`zDu4fwA&5z(=^vTjtB&&X9C*ceAgvXWIv0<5>Uk6x|-` z>|66M;`t+?&SBXaMWT{z(<)DiQdA6eU5rH6MxfsPV)2sCj_xp^(fRG?bs)0Usa3N^ z+CzJzVY3m)&Hy$q_Mgw45B+DU4jtY;4fh0(Jp`!v^I_CZw;=tOHo;;PZ_jl2%KCB3X7u90GdG0a7!#h&3) z`P~YF^M@2hm%*z9ZeI7LV%<2HPWp9#eugNJXYP7xEBYhX>)q2aJRb{S63@r6es2Ia z$;H5AzYZOFZ<|={XSSlpV!clGyErykTr}wpM+#1gv&TzHSCjRTQZ1DU7}9+@#JOR@ z?1jf~LN_IPzOogu1EDR*lq2(~4!E^x8b2*rQ`gG!qCayo<-hzIg>$T+S0$7A@#Dhg# zL4`B#aueFJF2x9mSg;<)7B4Jx)=c;7&?CeH`)~a54V%!zg-fxy4$+fl%RX{>(H77AX|Rs9`=&UV&L_v_HxTWM(9 zN1ojVOyIrBue-F{6mud#6jxs3tI#A>vMIt%7o3SL-LDTZolC{&?fZTLyHWK6ThR|M z?bW>VN!+d?iV_=(#}!pIUC79TL=0FHkY!|K7;G` zvBmnil_{f})T*hVn_*iGz^*_083+;S6Jy+ZcTZ{fY_H|gm*d0Q#b6B2N7;lyOVAZ? z+homT7P%_oe0h0i?PQ-~%?lIa-8BGXw_ed}x&w#snCT*ZyQ9!t*H+v_P9F%;kVv;o zBG;v`L;c*L&f2Ly6;NDn=mJ@{qCXt!8JxNj48jSaDRWz^pE#;LM4=`(0*c4r;U zwZY(pSHhU-Q=z#7a*QBG4_(=N-y>H+w|r0B`RT{c8~yaiEkpAIFRpk`-1)t_Mi*fu zjTY%6D7_{uk2rV-n*s>#;m(F#v_cLUsE*k~_LT!<-PI80dD{t_=P$XY)5DZJ{KL)= z`u4SO8jjA+t%RY9calC*M`&usDx(Qx6;+l*7k?hUf1eabP`&s04uEbG#!w?f7%CbE z>C|VEfG$Eq==6W@ zY~DsLxtL#41V<%wQNI^l*XbcdF25dna(s4f2)-^x$OJ-$Y63F1R8o$*+^MU?5PNgy z#Hl_h!W=Ze*Nx0Sdvgakq*9#6$I%Tk7nTcjIT+0##VznU{bIEHXpNn}|CSC0ug(p? zbMcrgh9OTcX~Z2&A17mJs!hi=uU10#0W9{U%zp@TQ{`ssx?_Kp=R?mZSR z^7X;#759pr>r2}|8NB~E081#L{Wj?Odr-G;9lZ5J`j!Og*!tB@XfyE8v?6?(5Bne^ zB5&l`prPRauIg^DLSO!B2k2jxEdudPkN%(RD(LTD>#W<9_wXzaaYYb51(8inpx|jl zAO`A#M*zY8hZG^sxa&VoBIW8zFV&v1dUgQ%C96C;YJRR{l(rnw!09!o+GMJn1hA(&FLl7Cu zf4#GMzZq4HI55#D^DdVboxTr5;P^oZhTzMCah&~m1~@0dK2xs zySqE_xoMa)@G2UxbCqOCnJl?eWujRY?d_XfDnv(4z4(Og31t4xyF2TpCG_=sx?7XE zsl~b#a=CCl1c)O!MTJdqSlsW1_4w?2Vf^%|fUj@kNl4y$e*?Pt-rlzU;qSn_W1F25 zap!njPh@=%tnaJ$L4EslsHDCPR>76eY(x6{du^F|pt}mrbz$n= z`L|R|HXtg(E;sW){hNa6O6>IaJpg;Nr7Bc92{;s=af2gi%XfRT)maZh4dG*V;oe<) zYI&1rlQwUaO12=W6l5ao8a(tMeC<9RdgN_br*Zh!gS{F~Jp>l5vvVQ>9k0`bQ)@5+ z!F-agsB>Pj0J|J%TmrazsSfRa72X*l%(kG1AL_Lt%&0@?weNR!uf0fwj(lYNa}Z95 zUDg+g$MIM0Ne|prmMyk`Dg{tM@qyPp0+{rdCb}~putpR@~$(qz!!REGOdzr_ejhAX5gU_=k%zx{#&K9Y|zWE>cdu;++ zxPPhrX2H-jx0A_A!EMt?&3o_%U~8!g$yWWF85pWC=tw|Xv-sz%#t z+AR0hDm8$Ji|@MTad_806zuy#+Ij{4J- zF`DK=fEf@C{_aO$uup~Dx9vLtAeIkqL53%Kt(STd48n+74+ilzvYuDPokl02FchqH zzf$`A_dO}raH$G$cinRi+WO<3tpiWtw_OK)NwQUFLn8F1&0I{o)y5)$O3%Tb@6c1C zt)(h-*BqSW#JsNPji-7BCw~H+lbxMg3kLC2q|X~&DKh6Z_-ihY#iNsIcfn7A-{iDanI9 z`YZ5Yi```BVmEPS9HwU6qRi?Eq2(fTcuR24v*1oys)FElxEZ?StH0WW*8Q|Mrs?P4 z%QCZbJHVc%J81PLPSd6;9=cp{81=w~)a`bSUyI*isS0;H@HcNpGu2N5_~O4hZ;1}M zIT3D-yUD*~Y{u3;^&D91(}6quIq9(RyXSge75s5SXyWIc?c&@hg3hs7bJOUJk`8OR zrG@N-yc}Fz;@AlP9L)CV(CiOJ_M!{XcekMXf8HBxFF%jFpU6#syPrR303WW!6${yG z5v@KX4d2s#0q6979a?ki5HL~B-Lwr|{fk~h-u27H?WTLhWCq|$myBLMf`)VhcdT%u z-4D;4xg&W0iHo~UyCYI)5=C34?Bq1LFd0Q0v#%u*J&KPLsdkG=&@3g!;A4)TR$9g1DcbclQ5=B$oZIbK?#m^4q&e z1yxhgeaLZgHKkA<1F6+5Ee7lj*?kh6IQScJzxe(edrp!|`^6J_ zJF;-z1Fs$dq(Qa;SZz9zhtyR(+eX)nFKjx2P%DTJ*7@bj!fHR&+maRDfGyeQI?ri{BJovf@vRJMN#PXj3d*=KbBEG_xA|dA&0~xRyPM;R&GvSSS z$oti`@vS#tW4wHk`C0yX*v-b?1S7Du2FNu_0{}S_CIK^TaRnUpjsgt^H$1_aW?#{2x0vuN@bU=Hc$8%-uu(Iq;fnTs%Gf_s&ZL zvvVf_aq3`q+F05F7W)Ya33!jG(Q^GnWNFwsU;0xAcvP>p{sCa;f9{;N#$&1`8x#a^ z@ePH6Y66Gh%YTORW4{>Vp(1|)2-UPx01~IPJ#9(aN%Wt#9MEKNcS#I3jg9V*{1Mw&le!=i89ome?f|3h3{xY@Z6s2Os4 zqMa_KowQQ{;d7o0y7nD-ojxf(KW}&!j@;9(M6*z$%t>9z$2bF4mAEFaLxx~msoGAyj zZDlQDQH!H=9SRICtefi7A?{ugp7r<-wxat67ybwLmY0SWy8GM@!0%kjkzpydTbn3a z0qLQVES@?H7W;HaW;qXYoLn)y@E$h!ZzEt3mKzc9j+YyC(%0f?TfiDjS3wyFep1~G>Itmv1bm)QU!n@ek{)vUt*4XrABTqPJDk`t|yG;2L3kzb z_MN=w?dw|yduwEH66(~a>#mU^x4@S9dnOk=vbE=kYw)`9i$-^ie0GQ$_~MFl#7XPK zou3Td58w4OY8dhxbWX+=@DUoq7xEF+qM1)1%|UqSog3f*eY*Jz@A&+KGW5>Ig>ZKw z7ZVRU^=?SQ2b{=0YYx_7Lj3inJq)D6`e1nxXY_w5i;jHfcJhB?)fJcFo#3Z|&nx+9 zXkQwVPXtYQB^i>ZQgE{g4_k-$=>@na>eJnO*LtrEy|QNEvSZiXb@!hN+$g)@#WzKK z=`3s-0IDhS6l)-}pt}v&Lk55I&07|xH!NEMR@+Z^>58|a&um%vutnpQEep4PSbzG) z)`jWi`%{;$SiWuH-(>4yVWhz6BPMjDz=Z_u=Wn66w=bNuaXF3ChpyTDk&S42WqAMp zwY3r3^rXc$?dz7%TcOV{-&^OWb%zhh&==RkP&{TYv+n-=y*3T!-7SYcMzd{8n*~># zGZ=vd8mRNdecfJ42~4mb^or#Ri-h_LbojLsHllUMEoeV%O+IenX7KV1_lW@{&mKUZIC0^hct*QzKQ<&%HDE*9R5?P@ky5%~iMI2`Hi6&xo&E5} zeL6I|^M+$@{?9w9H(y_TGB!&sn$6QLlZk9pbvb)9XLgz5*zD6MgV{bEu+tF|7V(Tz zdMlp$RImsu9tjrliWk?~EEzIjQ5P-ohCKvih22H@E2qMT?$@DN-4kb{fzx{JxA*jg z<2K^Z#&3u_0QdOJ=pDd+vu7|luQ~lM*THFAH9IHLHk`FZ4Hp+>jo#rTLLOt=Vaer8 z8VXIQ7xu0B7xDbBZvKl=Hb@e3borSJr%fm8tdG)W17V-8Ntl5`q`P9heCER1sXo>G zvroQalA-^aS{O!_0}DHLC}!tGY6d(=fZNBIa%QZwr6uQxs8SrU>kvAyux@gx3SG12 zo)hO^Ik2FUZHFWH!NnuEL2ly7q((3&j2?SFg)U?kHlnAAg*B5)HQk7>8^5`*9m&as zf8b8yq@eAg8;gt#xEu3nNM1y!^7U|_O4S4)h!v-hT}nz$(8qS;zH%a2?7276y|1u` zSr7s6b0Rqdw(Ik`4TWeS;ZH>?X?2ws&BBe;QYpIY!Eq_Z;1^8K);kKY1^q*0XTbfV z?T#5Z!lfy?yp{l?3LwoSyfUj?SUb5?Bl^tu-uUDBt>_MAue<$31+NS%J#aKg*&F&6 zTf7j%)_v*vjGnnEfA0Ku4lcO53}ESrGW0C*jI9~?hR6W+${-`I?=Zng>pSaYZ8Q@ts^!c0Ouh$`kVPWmY z<%{jc--VMuY(Vd5Eo96G_Jlv8Y@tD7xfVYjo61Og5^26O*mI=23E*dnn;pPP{ zb>LurqaBPbt3^jn7J7&KxMN`&h!4`Re>3LbYDg{u^??9^hycYwcQ?3)RM2w8G2?ET z(&!a_6N}b37d|Y51Mh@2yR~AHo=A+}F#71o+rvBIlBXp)%{iD3A@afkLra3q$DBnM zm8G+~a;2iSD1kcF3#;N)ZgGuRszXO^p6(vwcA$-`{cgCw-x=s+Z(h;eR!TSEzVO3#u+Km zZnZ8}Vq6}w4jy!|qG$S{qJ26@6Mx*kdAOj35RC3-|9b(v;)t9hct(*6gkA~YI&D-% zaL%|7Vp~LO)4_!`)BQRex_77dZ(C3?*sI_*AzVSjVg;G&c|NQhOI6rsv+D_F zEsn>1CZ8y!%Y2i{2lkiZyS;y!C#|Oi*ipi}L#CUMDG;+nzw+5bF@xD0G{!UE5F()!d;I)OK97PqK z6MQz4Pw<90#C;srgOM1tbe{_C4nNc-N#2SQv4!_>clc}^uL!Qi6`^mA##8q?G@pb6 za-Xg{f8(>?rWBkJX@cF$Ei=J(x2*G*aSIR)(e0*pN8yWsQ%0na zz~r3;%13Am@=(G6I4L$CMW0B+iqa=VbFY7moqzYtC-=gpqX?UhGkDl^fE|%L0^9MH zRIYHksSMIu6XWMd#PeXMPuh*WoqvO0Fw1uOXXiw!h?(xbzM`s_trRCGq78LMtE%VF zr9MzKc`PuF zbFjPZ7k8ai^UviLAm&-F^QN`5JJ3u<7q;ol5DIsEP6n}$Cz%ny5p&m7(}JTdg= zp_d1~JM!YCj+2cF<(j)eM65+isbV7mAQ{4NYk^ZGDJoVpnAKcMm2Rd37_KHn zD^V3C&u5gZTW2g5dH-w|{v<^8@-$8P7>hopj5rIVALnZoxO_uS1$F6|T(IffWYmvI z0)z&sixT8aEXAu6ZlbMF`7kVBsFs^5s+MqNqke}FO;En?;s-Q5ju2Ta#MmTbF*8cq zH;?7Dlub?r%$`_^b?B^K%KLT~UM29+P?k#=LN1RSVmQ5*;nI0F*(BAxBdUnxg$z9d zc)Tu5OK7P@m3^C>j+wm9i8Do9tGqpMZI zc)3(uRf`6+HbXVbTWJ-&@-6(-dYLRy|UW-;Ot{u5wE0C$@f8 zk}D_+8LL{fnWVN{YpRdG0Kaf8O%&1vk15HpAzhraUXP2{^lT7PYZLlt%LG^b%m&OM zBGi;&Q1x{&V^?DPRe@oM94oj9 zjXPO(lLKx^9;dQIN~6sejm2oGoj&kYT+M3K6y>UpCh#S(vNzyD$XW7 z$#~X^QT9TGkJqViIM!|e-3G%YNSv}GM`o%RT_^1a_Cq_B|DyWnf3ucMiX+Q zr`hb*0&a(LrDb%P)9Q-eAJo#caR!5fg>ueGk^z;XQu7B*dJCh$S*?X~&|N1J21}^z zwm0%DqrfBzLRnMxQ-B9|HWOqb6;2FXfS+4xhH8{N;tH1(LBZ$AsLYbQUR6>?ca#r? z>Lx9#JYIzH59oxMQk7CsZjIW)CLqCNCB6}(Wrb3rS|XComc_3LN27)G4yi>;iA0tr zYHWy$H1$-2-}4>(Vx@4ro+On-D5bOUZiN=Z+J%y}mLwt`r&q=1Aq_mS3*-2OlA)j> zERoPm(qHkUSVdf=l`5)FJBUO)R5Pb250^^W-o$btqX_|*2jR2`s;WGjJ8&+3t`Kks zLVicX6sFsyHphHQ5<{kOud^I*lPNbq_Qx{LZvC~BH*t4ByWXI9|yMZnAR zHgAcoYB_r%I)Jg+LXl{w=%}rds6&iGndZ-xriVfeI1!Xow8lhyu4+Shf;8Ltb()3LNy*Kn!TRrUB)c#bU0SR5K}wQa4Jbxlrj{H;=Pg&hJ{ z+CD2QsGA-$ZNUg*p+KfQR9u_!m@X53PHl^2{jae@3-4?8~=di*^1poB=SZ; zn+p^~PtyWMatql~GDZd?`bwS1X=6?D6sh&I`Iwc67F9KS#U~_F%<7*=hB&pHQgbG< z#I^)7pxFJGBoC>qWHwfDb8IxjMbefZOLAS=O(^3`Q4lOdJgt`Hu$)g;X55sRYTRG2 zg;f?pGbkw%5sqLJDe!)UBQaCLfsxGuAF`(ksz5;Q@C0fR#hUAIJMhM0fzegvlr3yi z3+Xj~!d5a3n}sN-YmI_|O8Oe<dCbr^?F73T-;gTP0a8)1`!!|*VKNgmMw<&Ml|oGveEzB-Uv)B?n7x7RB+F@mASi&P>J!bP zkTL#6lIL}5Dlro=M_noG3zLFvrGZIECV^`#g*(^hz;luBh%;teIG*>sVl(uLh z)lW;swP87B=W8aP!Dy}rGy5?OgOF(O41_TF!UjVlRFEe(W0<&*NEuBOUDnG}o=}{a zDJNw2VMB?KJVzGGZi^)lSIQlUldO{50FKReQRPrE>Vk@jpA(bh>THVeyIa6aE3_PL z^*Wr8UP!14g|?xdN}I|}U_m-z6)q0!L2}AfG^J||V>0SVuj|U8{o}4=kphChSlb)% z`1H&^jr0T3QlTS$FJrZ8t)_;Wl&1c;Jdh)b0fWI^W+QT4>~v{{jAbe*=vHP+(b=%I zlGznKIZVc6mT{FTQ3@Q$l;s9&KWYogshKDh$)*}L(jo9`pO+M-pqVhn14LP=t}#i) z32)#Jz*QU#f+QnRTY}ew94Fj_i*tTelnk?$c-$a3n?CN8UU7)#jFMcySY+Zs3r~2Z z;>t*n@IvBIn)dr`GepuV&5@h}z=9eh<5RIZU#*qgCNiDC5*6_|6I97w3uwPN1QLIxCq#lkNQxm64a;BN1haBt%j*WjLrsQj8Pu0RgLMrzrd?Vs6kk=&8)?dm$xG1 zfh(~2P$5WB&0IDYS0?fePv(SgNb`t zW^$B{kbN7DPTv##9rxdO;pL-Kle!6E{Fc%G9C>&6l);GX%O&}sZ2P=?*J!AVDxdox zSGd7LD3axit$6`r-k!Pn;jQRbm7c+WR^i|e-mD-P#NH== zxabH`Fop3Mx1aYIGq{$n8d&VpLEy_N5GV1EE$Gf#&)`q%P(!$32!KI+y%kD2;jG2d znrf;TGNtrl4L72_4RGQ8i)xm;^BnZ4M$g!7O{g9CDnDRq@On*f<54Q*lDaUQIB*+o zK>uihPpMCbuDRrk@V;WSa-h|_v}m=#B2-VLYQWV~%k2u_pNX<9pM^71ZV3C-f{XE~ zHq@_Qht@oyg4@t1<~N~JFX~m&aWR+#zn2$GV!v0~P=Q3PLBigQmRP@0pX!?2O%RZ1 z^%y*XuD={+>A3K=FK(E^n zPeKaSn?HZNbh-8F%)$`}Pw=F}!2pCO?KV*mkBGVP6a))*#0QTqvODKCu8I!V9va97Ehhi4G|&$}2@d;Zwey!)Z@3oM3w`m^3lQH2l*f@E zpttgF0NRM$$*dd@9St=1B3#fs{pp3Z8D{1DUWaFe3&9$m1dExx!Am#+=3ke)Q?Ve0=d25^gE^~Dhh|G8 z(DU!TeGB^Db-h{PmFvMG+_!ubEaLkXfbT#Y4;dxtfIp&gL9*uVH6L*USnSh@$(kXl z)TIw^L)YKXvp9bvo)j)veB*>i%;o5g6iVTyIbp~^`epIra1?>XJ{@}G!3V{ey0i`P zsAutWpT~6+NkwoSRrR8vqEnHyIh`m43au=*`0LMu6T4rBWS6ai8{7w<+=jGY=uIv0 zn{Y#(zu1uZie8Z?46c@2NT$n*m>QeB_a-peuLIf^_W`v2i#>O}>Sk>1yhUrxK!}Qy zsjQH7tHKR!RQfERy%}D)PY0OS?GRBv_{(kRjhlP%Y!kP@S^|qx1RUh}Ln}#>rI-#z z3ocuTPQw`Jw&6!^fm`{dDscoz5e?tJrT4x^zPxbU%=qdruDD5d!HTJf#3TH!$Rj-U z%+!5Tb5oyPed+4#YTxREtM{#*ocPVF$MX>85tKSqy?J~4XN=odz3WuKesjAlmNqw3M) zN5@zG_sSPnKDzRoE3aR9@yhs0`$}fzj@3U{IXv=*k>@9G9(icwYa>@q-ZN4kxnRUN za{B5&k8B+N=kU?tr-$zwK0N%HVPQBttX=)9;gg5g4!t+@>d=1<-8=N9p-)+5UmYq8 z1&7WV+CMZs`1iqA27feo=inCxKQYJ;dIryw)d!Cs93S}aftLmz8@OZO`l<53#RKsH z`v5(#ePCGj2k^}MCJ)GrvI|y!5xF1v<+hnV5($6Og?&s*Q>=%gPJHk&JK2PaBz%BN zZL19mGH$}BX>(98B#Acgl$vAtX52^E)ZOiu*&J$CD08JIL=sU~)5ux>hUGS+3wXq9 zGie3ysd|B*#X64_F?qE}Bn6wd!Ni<`Hp+0_bAvhBwm0k9M42xJ1GW&MJp~t!M(S|_ zD2sCjA1TlIiB*`u&>RiK#-1TnyGmyb zk(!2#C9)1;Zvp>+s}ZoM74<%s6Fkeg=!vIFa#uP_2ZIK0uA~nJt!mS)un(2#%$zA+ zruFKik z6>nt}1zzlSJ%qnvNZ#NHO}tfzgxpad$Lzvpg6WWjim-ZccLdA1l;X4tCAp7_ z(iwZnoixhT7ACWw=*dG-=*$Lcyi_*4!|dKweS z6*Mi4D`QP?$x}9V&t~R8umr6IUEQK7Yf`({W9tFdRik)|0OZ;hUgb!RTqVhsnLL%x zyGa+T(iXC@)4qkD>aPc5X;mSjY4CtFRUCg{~ z@hcrsZ%EB@1AoWGeNBg)*807wG|O6|s_Z28(we>Hpq?~4ttp!|V5#`CCpvI>Z^9EL z*mSj^%z4x^AzrZyd)v+42ym9Cg|<+vwQ6Y{cNV5A1Qh6hcT8>HkgDJl<$rD=aIWT(&r#a`HBqxTOx4^Om?72d%BK=KGwb8zsa7(Xmf<@$ zGY}W)ZFXR-Z7~)_j6Puo*V2^@+sG)DOseY|p*|B%tFZ^j>cOj80p*LWJWfvn`V~n-%>O6)Zw>Q;dTTP$Y_8?*cM%nFZ;}FwOWs;EODpL<(eT| z%Kaa~c37aYAz(PxgfJ0^%84_i6_C}MLzGHW*4ce(bz5Lod`l{?DYR*IB3Nw{sSx0S zr(cugggHfIV+Ei`=M;rHKk-{Ew^!RuQXYhBQk$98+kreCd+yEl66+@QtkdpxGaipU zt<_6ENV^HzB-Cn2z*7k2IQbd;h3&pfgfOKt0oue6D#ZkLc$w|aAV>I96@|y%t~iq1 zq*Q;qCSoFj$#lFOENLyALW_OVW*c09&JbEfH4#e{8^EN%9L3MIeS6>cZcylbyS?u%KZXGpK!gMy zIeRWRBENry+Qx2 zqVjffIq%^E&!y3jykV+`?^(a&ehgx=pto|K=Pprie zR6wWqlq%JHFmv9SLVHwQryJ=;O=GGSoDJoIM}>A@&PgRm)~RfJwUfazz2jVgzeZK4 zmDp01Gu0YJ#Yx{3z6YplB2IIp!%0?5tYXV9;d3(43etXO)6*epuIR)?_;YHrTiZXId<*Kg=&DoYhX$tG1Y;-0XijTg6*|SM&hgO<3B&7*jqw&n?f?dc43VPbh z5gNjybtE-ub`iEHSX;qdiMG9|Xvqv4W8t8{-E3Bp1;VDu)KXQOM}9KquIqGyR9cX)N z|Bn;>cGwG%>q*<4 zxZUD$`-y0bGZRg;)T>?R}stOmh%dI-}jYq#{n}q$V4pZt_Sf2(Y zZ+$Kv6iyO%)JM^A(5QrugJJ`Uz+;$`$6>XT<(S#dr1SBLLg^D$gtn z21qag+eP@?n{@;5O|S#I%OJPXCka|oXOHCQED`ruTwz-N)dXGCM`%wa-;eJeg97c~ zb&$}&g)xa^TBrYV_fbf-1ZP8f*4YrD%z+{)^VgMxOKJ4hu(RRP?*ktR3GIIl;6(t_ zay=AlKgt(thk(u$NQCqHN>+8yO&X&S1>he0vy|Yr`09R$5S>fgXSWHJ=04glW_D~i zh+RoZ;D?=OD!Ef;CSp0AA+3fosT#qR#2p05Bs8>lP$h)0K66m?gS_`m?5W{VLa|>Z z*mg&2fWvLjv=bVa(LrN(oc0cIt4nB5nEpFk(R+J;u?FqGLv&94^jr8{B0kG8-wfJI zbllZ~NAHrc&hESO=(Z6_Bieh~+5P1HwWxZh$O?RMP*&^PNBhbBu~~i{CD=qns^aPd zIDe)=WU+*Ae;XWzQW~JK-N%F9pS6x z?&m>B@tm2f3AiBoT(X#7X3~4>N$gJEb_nK7LPLjRkS#jeetA8*=8!1<-S>d_kWO3z zjyRpTUROFBl&M}|@`ZFh0m+$9{0K5+KHWU<^x3v)(~pmO23D{&PU)xoR3hH2+5&;9 z3VrWBi0YI!^GLR~Y1#Bqfb1&J`7A|eJdr>)o}f~d47&M#_!DU}PB~ulz)^iagE|kp z2xm~&Nv$cV40rt1db&n5rF4;%)+Fb@KXeXd-#T&&Y=rLIx26l-Ks*vgkY0z4!% zwEu@Dz#seI>GjixA33^vU=7w{m-C797XwNTkLq;tpk?54-a(#(w?gC8{x-;pHO+W^tb0leKGzb3>&Py*6iAAMmj-)%BnIQ zIoA$xRRS|hz6i`DG<3N9;8yfl3{V??@uH|NdcVeg*ygNiR8ei8kziGoVyhB%nT`Bn z9!I-gf}Qgz(#(!U02Rg8&b$33(O3M~Z$L&+whfRGKRY^fB?CeFxVF~o&E;EUyw7s8 zf>x`Q$0d?zrQe~*%ZDyN`Ikk`dtU+0pndDW8Ean~01;M6N1d)1GaZGwL1AIvd*6& zddyQ9N2~rv+{DV)Ksb2Mtb%Y@@m7loj-;(Ety`CICCa577Vg^DKsX5v9U@*9lE~kF zP2{-bbv)UX*~zwgB54QNcKgklMxvzTVm!w&bn)xp!k5y}v8S#C(5=ijCeWj=i?coR z`=fo3cmAlo9-x)q0qn8kK;94VaG+Rtvz=9Y$Z$GY?l`SFB~*rlMLLddnt^2?rQLL_ z3t&X!ht{I^W<=q~j)3sCsRN&&fi{edWQEYR{mGCDB48MRa5(}I@RDZadKpmt_fWsy zfSx=eF8jCN#M3l6JMp!YACli|?MRxcX=;Wbavp()=L`M_Ln|Sn&A0A@q2+6T-}*<9 z;e&s|XWHd3@A$w_k#1R0RKkLXu1CFh#93edZhzMI z^H8C9Tn$OBB|@f~&JLTdNAxYg*X0?0_Fd3V5*pgSN45>X9$s6I4!cpM zpS*!;=Y9osaUrP+U@X?7zaA5Rcjf#2?R)?*M1>vUZPM`+;jlQ%M5b;6-!kq=^nK`w zga*&yJ28e7di;HHtl#__N3c1@tsI}@8+W#RetT+D&JIpbch9cWsfLF2Y&#Tey ze~AyddsN*al>V@9>K)**MX_2TTQ)G2yd)&)wBm(|7mk7tK?z8jk?Zll^8kEMm3h@i zqV7`s8)S4$9T)^=c>Ll%wN+20G7){W)Q)q`2$u1he}jw?8k#CRF4)T5e~Z0d_A#F0 zd9&hiRy7lcI>l|MI@mI*%}UJi(vQKKpG!iUf1v~s`Qi|dek_VO^B>5cf`Z{|mR<6u05B+%Fk=cUb)~N$4W`8LQ)?$@zRq~9s(QYREuyOfdjq?Y(V;GbphUXO}{ zT>%LM z3xH*8>HrV)C|I}IM6OC?Xg1z#64ek`w^PGiux>xqycw-DO#f%N3s66PgPKzl;0$v5 zOih>>D3;#c`sr4%hpp4y#a+msiccL_3O|XhOIL$sGVl~7BZ90lK|7RC;2i#5+Kdj} zzRy1W!qTpRw{#CIfvt)yT`x>j(W0stA^g_eVk79A3%Za>J+~D=uomr@UcIm@A|Pmo zyQi(^;TUnhT@7~HJ#@9jG@a{ zb;rg}_yr;izu7h|lW)uoAjit?FuHJc7wTMh{QY1h2ZR|x6?4eBhVtkga|T6LcekuQ zF?D+2#b=>d_VzVhNG#4nu15z#dEoCMm$%gidCi6)(S3Dy4dT{xm#seWC({Ej1t2bH z(>mx83(g}u^R1KyJr!4 z_O$K?*c$4d-sNLR4)744_;_*ZsiM}A_BK>Dm(Lc3lwyz>?cCA@n8&#!xLN&X7rK3m zsHOIt0q51@Te}-J8m12L7@xSU1-LX+A4Q>AM?{=e!vqbsMKO4Bg`7s9E z@cF^Dxnh)Phnp&uP0`dl;BLxu`|{bqO-h4M)?+(S@9eIS(>ro5a5GOGSP9&)H5RJ7 zB5exdVUx6>ZfW|2;k)!);3lO(l+b73l=IxP20eDJcpS}~*WJReS^idi4Y&r6&R+wr z!B5sK50`vkGt3s2zGLIUWXl;f=VcmI5%A#p!tW(uw&s%1{((DSY=8U{F!=~^G{z}d zP9Xm#;D?PMkHJ}KCnCX4L|eP2GZ0o^7S$DzMEA64Mf{^Z%&a%O5iaIp%byi$}BjEGGDY;u6d0>v|CaU~T&!s1kFqLxC~ zkG^p}NO?pBQc5X@mJanVeQVH#YLQ>;e7rh&I8eMg)r8aKB*W@}x7=alQGx*P3mkdU zW<%0-)o)-4(yxOMokk*nwZpW$y0 z@0sTxym+_;1?o-nzBcfWfkVsojg$wj9MlaH!)u2J79L&r{K5wo?q7J#NNC|?W#L79 zY5Kvl7mh9Xh%Zh*L=OBO3e?}e;PVT(1zsplzXeLm7Zxm=w{89h^MAMOXY-$!|NZ&< z=8eps9DH%!u7M0hrM)t8Ka{L@%vbhH*1tFJOGB>=JvMaLygv@zh|AXZOVxjQusX7G z`G?Ck&imE!KP-QGnREHQ%Wq%4{PPes=3BlK=X0YQzP@1fIO9z-ezK|#axG4t(ZtoZ z_Xd8>2b8Vm&zTK4DfvVn^&c`AtG1xhxJa+7#Ocd1m3w>trGYWiP>i;rFj*4*R))+RI*m`$`gr*nWQy1B7yO0^Np>9nfxBT<(r(t6b=3U+ zPCB`xHxGBfPt!%hTVo;Rzg10WSvzjFSlA*}NQCMQmm(ER`fwx{!xrNzQby>*C6`)J z(2(BOF#Di42Se#kdllI%q(-IPzr^j6{%XTW2I`?wG-6;~ZrY7YSu$p=o6f|jWL&3! zhvS%D;Nz}En*^mQ<(eL&B}*ywB<5oe6b*FQXsSorP$M@VW#7i_R)fk)c>*nKutM01 z+Nk>LSbQ^QgX6E}o9u)X&O|B|{2u;3P^?4s^olN#RahL28olEdp}nAL(o71N7+BOIB4$)~2>4e|lqz9{SoIV9{bWFINl@~JmQrcl zc6}nbPFN@b1x?ayvX-$a)vP5#ZQFz849HSWTijC2R9!)}F?((vH~Vu9TawPwP>(s9 ztmL*mf!X_$YCTOd=6pHs^_TPN?Ozhw)sWL}jyeOAE{=|OjLAi(3k1qek*$c%#Tuz# zIjJ}~irak^UyM>Dvu(DP^l~=E;tu{@Uqvl%iUd)NrlU;4lTugZXP=4rdp&fx84CN&40s?_ z%FSc=b1wx7Td7MyT%RdMr{mjkYB1yJ(DD)!wfh=Y!cD^r;m4RC-$} z!Y{OEC$(}ym-CVY*Q}CSIr&wA5K0tiD9lHdJaWA`6kGqS(5}wqDRU)UwkO;6TqnD5 z9d37r&1R|`X5xXQGgZx{P8PI}D@KGWl%l|u%=N50srVfJ+!d-N$cRyH%uaTyEF^!O z+7<}v0!4H2N;u!jq~j{Z;vjB!avB9d*(Evy#y+s|J7&Qw&JE>PDVrA0l?C8m+Q>pl&(9ZbdRW1=p_=!@ak(U1r zv#}-ABqayH30*1|GPjik4oYHdamc81R;U0gH+Xzi<Fm6^u1(3aME*&7G#92pV^$WOP7OkgNZiWtU(i7@(BUNy#%biAKBaV7vypt^k@|cX_xLjuB6o8+& z5dQ(2GSC1hY<48u>Wt14R|@*gOe-BE<2T6Zq854`U+TggGkLj2Gm|Rk8roDjuiW^o z&}`S0$Y#){&{zv)U2H3kX<$sIC}462c$z(x*FL2hrO8sxIEmWA3Z zOs}D&(~(wnBow1+j%Z1K+M~kw8*-rxl?8vU!|8RX+W`E985!Je6JgrtUIt*6Os$zT<`g++S~-fNDImC+aT0ZN*57yWIuHhU%x+hW*;k0e<`Ra^G?l_^_h)t&fzHZS*54Q<&P%y32` zxL`m2SvK7a5Wco9Xv)OoQChV~Se|S!P@w}(XALs9TU0fAx}g49cS1qP8akJMhufzC zH^nK!Mq(`$fH$wTtrll4LbLMK9^nTJx&oc?If_Lu8}b$tXBC%SKJeFR*Uatj4hVJ} z>vt)rI>fYka)oNFlL;E}pF%9OmIykMCS5rlx4Y!QO#;hifTB}*)@Tj3!DSQo|M!Rn zBP7hN-v{GZ7dk(;T&gpx+)`>P1+(P}-EIQq7Lu81=DnX6O6D=K;HtAnTKyoGm~(_*hDNm+-we zW+j@QVyKy^8%^x_I8KlWxjX?P?o0*TVIQlnk+O#bK6U{5?3n#28Qo5CKGhmwtU`9y z?hE_Mq?}T5v`U8Ko0wpeCdh=wZw)xJ3WGlrKSTK0V8zMiybPOa8VVX$dfjTwKA4Ir zsGNgMDqUc97a-D0eOUTHsZEj%HcVMV6|b9J6(9M=Niser z;_Uu%&@pzxRi_M0IMAevF+)JH>ofQdt&G#k>2yV3!N&SR$z3>_i7~5NRnl*fwY<%$ zr9{%ZpBj0tKXGG>k7E+ixIRM3$^uNb>qm(Oj5Di@dIN2_U@ zsSDvv;JDzS?Xly6_5WfP@lUC#ePl2EK?-p zzNB7dm2+XW@TWIe;aV)E@x{Hjp*@M*s_8#lyY_(<=gLq!`YQCSWuO!3?< z(gHUL2_3S|=Zmd8y&gTH6))(2&|!bnsW36vyOD`ljU6HxwrCw5b34O8$r+v_$pS|S z4H1imq2x#T$#v*Pwkv?J-=pt}g{vtZC68Qe9&RnTW9X&9p#f?dcENfG4}+;B;1{vm zLJhSHnslR_Ey?Y9lZlEV#>M+TB+U?-p*#bX?f_r>eJ;`I^RgQ|L1eSsQVCPRL}gSO zPpsnCxWE$(j_z@^-2?s^2@Pt+-w5N&XGmY|5&bjY^@6_#9H!^N5M%k63fvQ9=}@}` z1|PWbk9{7-<0Ef()rgc5dE$>3qDy?Da98+2IG8OS;U4=_%5hnWChPTpF`&_^WGsn= zd(jWVNoZ*Awneab!>?{YbU^gb_=CU^oRI*5F1YiYaCdi5YNOjowUn%nps`>7?qGNM zh=c}DFTWGs$QFjg1#nild(Mgm87?ujHOpDdp+><@a3~Xo8IU$ZB*j(6>9@l0*0e&a zE+%b6DwZH(rgnmKD3Z2Wr!sFTCh81HAi-$MqKGiLCo| zgfEl{v|L)k;!_|;3}${$1O}IxOM_xbSHR5QUY*lTdzItdK`e{s@s6WN=)GKGF-eTv1UQ+Eb*O~>5Hy2Ft z6E%jE3D{Q>8ruBonK1Qy*ubp`aa}%~1dh;O#cY3Np$wa+v;jxamQMt$@U+|KxGdFO zIU=Fqr`-{5pc3W45%2w!%G8L{v7*b7tv6~7O5iw?1{ozZbZEyL5VCgh z4G{K}5f@W53moAMgU9y9>d9FsI6H&|s?%j+Cbp?jV;S$sf~u6#z`LzI6QYlxSkzcf zWU1tEx2f4~XB}R%fyi(rE6o(C?b{?>$K|NR7@ z7yRW9qiAG}=5zRDT2cU?Ck!h&d$QQmtS#zvM^k~e+CsF1dAhg&=fYePiabFdUoZTT zf;h4>#qO4s72YM!2V~q2F8S4i`hf}`=oaoH+aBP7zVQgZX1nDTc^(b0chpv!xQM1x+vH~ z4ZN~;0W-X^syeMAMkYKyWnE)*sN{0=uLejaX+|@bfzInEr*lnFi+-gA%s}VySm5{x z<5TF4=o=l_=x?;TD@LU>fS>=#F0{KXiWcqQ^|S-HVYN|9+B90SR7u5co*3C_rg?5# zN2SeZ#UH=94Gfzj6HwY(+~$hQVAMdi3t$HDsMSquM?6l1A6Rok>kuHEJYc9(cClq*n(GvJ|0{%Amb0>HLw)HCgVYtu}v0E`Wqe!>gCkq zblcag&?t8;jD)lq?f;I+F#YzmUa439mkg%HQutSmLWCuiY{mbWMR*BFvpTs z#F$oFr(e2`4?h5FlSfX*@U7uo-fSX6wK&cAT26g|#P9B*sqV;#ga-9wHVPGoel#^3 zNicII3?6idhfl^G>JTnupx6gOM2XC zO|xdL%5)L**Uy7A(q?oh^5F$2_62dpe({UI2-cVu7zqI^&akme7-dmI1%MTEg*f`@ z7kR1XHlsrWcR~E^7p_=~R9_OAU34`pSddBslZLyfwK`Q`*A(ilP`swE(&(0}yIYpc zX+<;l{1D>FAAe*WT5^rpzjLnbp0aOGHv<6*8i)n3$wOXO2Wopjty}&{-$$USJ>4y< zPDDk||Mt-{1dxzT-R{E8b`e*_2Eb@Goj>m|ux%)D!iBtmiITVH0b>G!6>hk(yL{{f zUm(cG5D-JoB&bNGbXDa6+bpz77U~}9SUD6GgAye641lWVLS%^Qv)n8vj;neGWv@T= zDLU4;=y+Mt?tKuHVb?+RT|klvbyza&WgsBK*R*xwd35Q%?v{!F2X%T%b&QY7xTQO` z+MTr& zcTZn+BI@+BXaD@Beu&5-H2O7uTp)}Cst>pAop3G;^1#>t8z0SYWgZvjL{x|kX^1fx zAAP;MWaY&tEuVmdg8J|`7rZe4q``9rE}q_esfO)adoI`nSZx~;<#>)t<-$>`Jy~ir z(rDmGFa!Q;KbQd$8iX1`J*)K)Gx_`df?nKr5Gz_I@WYC`O6Fvcjhq8yM|s9yf?92T zey)SSPeSV#^1~Ik?mZ~(EI5pZ&~Lv9!4a@m9kY8Ca_iDs(wuTB;BjAd(%<3OqSq~;`^X_rOg0Qj;zz~-1dWQa9jC7cN>r9a}HcQt{Z;1Z^O-^`SdU0 zArKO;9Zjj_17Bz>XO6eLDnHbmyc?F{ola}Fh?HO40qZK4{b%tQYf1u zWW5qd2^(<5G;oyA(Ej}+ThI>%U)g}F(_*i0z8_n!zFF&)BRw63!I?HX6}AwQNMaHH zbU#?$b4jQy-_Z}CT91qmi2Sk-f`qX5K7lqP3^lid3b$qQsJYW}S%fY9;DaEcga)pb zuWY&Rp{`hp0q#aahv zf+~Vw?{(Af{gQWhxlCqjlFF#{ri@=TfC?buI&8;lQ+CxtDcyt@VYiE0Y6;pA-C zsst0^Nl>l2CqQ{gXb>59NQi7c_=L#ur#}PF5y*G(tZl`#S}Le6WcRxxs)Esv)xsDY zQ_JU4poC*taHLhA6c@|BpX2p>5eSIwzOpvk0#xP>#2BjpeXc18c=YFR?~&3_8JZ%i=gO*OR zhz&Y5!mAwzS$j{;EP%T#vs_uoGtH?*|O=hE$`2v?3>-KD?d#{ zS3GrbX!@~tPu>aEF9?Em|Earp!mEKe?-;yEo8Y#QYJvewggW6o+U)C%q3WNyW2;W| z1&XjG(GK7KHrU}%3b|wJ-%`R*4jKB>VdORg#G&{3B;k|QC;kKtXb;Q|Pq#ZdVGlsb z=Kv2W>5|!XCK{j|K`K2mbh}#td-2mmbmqN6 z`!>4Z9e#{YNJRsK`;QX|Vz%GqW7@s;T*#a5U+ruY^I3*WndY4Xy`}a~wVNAslB?8X9mcp7BLW zuZR5SE-YM=Sn%v*-t)xgKjYuc7E88p-X2yN%F2*C2~pvLz41*dxk64K=dsXAK0}eE z146{{y8}JpU1Mypw`n6pFt>m?wwpQtte5MklR;;wE^C<}1z@mu`trH0=-3y}0uyK9 z&Fj%m2YW)2!k>nE{bkXdokTS!a}`LnH%vxdMx{Lfq4gjrQqS+L7?IFW`Bu1|J@#T0 zqPFLY93Nf)9O3T6XF>~426ZcGCrWl}pwMYG!eG?(IgTvstr&GmXz0*y2EY->V~>^= z_Jp*rn}&P+7d$=%8e4YWQoUg%HC}Uz4&=;c^z3l&j1g&LC@2wrbX#g-da=3;cYOzxHmQ`rQvY>{vBX^i71_FDa-~~L{*p#ybqe; zuqnbsOhs=i#{u3x=6Lne-q`ZFBz|9Qoql#{Z;hZ#mMsVIVDIzU&v@AYili|^GhTbk zq$!)T@;GMp+2y^Jqf#0qyS~_u*j|esT`tbY%t&twuUyZ84451G*WNXQP$l#@@dNw)(7)3p)nuR86SBls+y>K=K_r_TksTRsG9fLOS#cab&}BDWjXz)}Eid`2{0`(&7^ z(vf`H(I70DFxYc_&Hei|uoUK!(0=-iKDfdLq**KSORNLwK#N=k(&2?~$hcf8B5L+V z?Dcd2F0Yv3ed~JQB%4cvnxrd0Y4bVYtJjOGLA3#^4nFr8um7@K7q?Y1sVWyTrWmMk z)|c>_4ItrM61+x0AV@#?v%5i@ktHYN@#Ax!@%TXmSFA$Tn-x;$sybSbOw(t0@yW2C zq%;(neiB5y=@0Opce2>&nNxZ^sO?QBT|MAEY1!wN#YYY-vo4b_+qi80(s!5sX6d6# z?_9cPwmjO}rSq0_m%Om#!6gTle0fQA$wf=FOU_y{w)i7HF=6q&BhN3seevg^K$>^) zj>TJ!OGda^NJUUAI(gB8;lB*OJpAbJox?Xk3PNPqG(1TTuOA*<_|C$YMvg9gWZ|6) zZ&=t|c*#P;!t)kREcnlYw--FO;Qj^QSa9`%(t_ZE3m2TRV08XJ=g-Xl#r#9_Z=F9i zKQrG2rO{4>(r6zH{ch-qq3;dt8@e2-qB(|?Lz{*c4IUeOb@1@uU4wfEJA=_d^B_66 zZsdW%dGoqZ8||Ta2j_iRKd(CPqIueRXU!WM_-NqBz|#Zw4t#as^8*|ViSVxCbn-B`Amm5CBo z|0G-V)EkbfR=xw{lT~9DqD8{IL*`UI?N@#bR<+R4Gg(@MO5AbW{TA^JZv{7_f%Wz~$mYQrOSK&bUYE*8n z({+1^$diczS50b%@gGF0fjX_F^g1RV_q3o)3C>ffMl#_XrL%i1cE8E)2$5?r-effr z3P33gk1VUz7ucF6YsHbm)kv^RlAR72_bQ2aGM$jSVL$;;t{PEM8b!mQZpr{Ox2kZ| z@b8A(*#?=eJKIEo&B1MD^{YaAJyW0wf5>BP`IFgT+IK&0hYA@bGSw(rh`K4DP!PNA zLVLv3AkwB*y56$ZGy1IgsL<{v7;3Uw)Q6e6rWlN5muwRVrfi4K8QNv9r|N^UamEQe z^C89`iA3Gatj!rJhEuySkYg3z%;c2PT=Aq$ai|QJSscb}f+4y^J1mi0L{>E9ROul> z&Y({gBz#RKl&|^Xld*96WT9h0Z%Ij!A&<_lvSpQl$QaHrs0KBuAfWDc4Dm=%rzxbJ zYAjDsoz)SUQdm=L`cp>5W|h!PFxI-=S9Xwwnxz>%7sD@B1O9X#z{-kFb+~BJH!=(Q z<%K4-)qtx)L2$C)qE*@fIAXaKiyv?nv|#0w?X9q0o;MJlG2HGirV_MCPxz`(b%n}I~e^{2a+0vPODRl;pE3W$U@f;Z?f?PNpD^m*P;#UMV?uL!>6(*CcG8JLk z3Aq~Q7gYUhsYS5$YBcKs2v0q2!D$&)zYLH^Yg&eNFgBw)zH56Qn6Bz;wDhG~22Lec zo@oz%19SJ~sWxrM`NH+ICRnnP=U#(_^u@~2V7NeO0Ato;QSJ)isNbs3PsymdCFg7v zYF?#-J5N}HK2y0!sl!=)%N=rC6~y?6z@Lq0NVPoYYgP$chEBS^BD7QHIw5zY+-{eg zvRG-a*iMoJsnEA0Z3kp4n6hiO;P1VY9mr42#+hVOSq($ILGnvjP;bW(jW=1fgVty$ zvvRdX_#S{Eh+0|Ut9xVhKqfK#sL-ASM_vWW8`e~^G8v`My-{e75q?S$ltcBj5Fo51 zJUAA$>NR>oguX;rCN*)r-J{M~g<1FNGGzjS-fLN>FXSobm}LSZsvaP{HowBFt6L($ z6osQjtDZW9IV(&ux*Yb@8METd8T`G+W2K;?T0AJX!tt(3*mOcW1YXmAOD)ep&~%wg zO`h!%2>Ol+4t+vZ(vvZzBX|1KcpyA_zps^VRLV{T;jydN3wy#Nx0neNM8zrzC)o%S z6F6GE>TcB_yxo;8#xhZtzYsg?X3XB*aJQ&R%VcfGYUNyuCN9S9lkO~0r^AYT(Lx#7 zfJ~*|DEvW!Y!PX-M-lP574<4HhU4d}?g-%_ayr1euXACl92>hz_&(&6QHg}LRka#A z_C{pW@3H)DdtF)AMY1#8jq=5V#dNmNPRKHmc^Bdzb>-VJ+D)eXoZeVWP{}jy5xB&gkRkv#ID?Au zs#N1o3e7$RNBb2t`n zjl{AKgl3g18D(vx#RKqI7UfwQK^R$vq7+tugignmA)4IwXWZ^AdBS8eZ!>1OxTPA7 z58@J6RcFB+q9E%IDo_zEd#RW+V0^`@Gu_G2Em=9lW!nCFMkUAC;Zni^Ib9fd-W7WS=65v0OKb6J*}NDGX#1qW%D*VKi!IUUxfH^MwZ%__jKO+*R1 z(cn^~Qwf(wuI}Oavd8H-95}6zTjx*uBRhm+&K_;c$Vp4pVo3%)d4oGDKPd2Vr(ytp zY@#7dOKW2yn{N@?O>!MkWSo(tf=z1W3R)N+y8&V{{Q-|1pg83<7dL=W%d57!+3I6i z)>>t_f+f!W1GBNEZ5gW8cH5n#nwu<|QbtlBBy2IFnYNn~x{{sIsSP+TziRX5%e2Zx zJhO9c~t-IyB1jEGQNN|&s zOHG7rWgV$ZCmsL6ziTnWTYpm5k!R})Do)TB3fkNP6~akx&f$tHA}!iOob#&iyYeip z%w;0JTwU+ACB3+^U)9_)L3MU}&TUe8p-?RG0_JYchg6i_+f-L8>dvIKN|^4(C;Dq&ffth&5a9>^<849De(Q_m4Tw>TI|?I?v)2762sptcD|rpYMF z(m_kZrfND_RVS`mga^$8z}vZ+Ki`Zf%5=b`+VZ-8lAseP#Z6w<fj={hGIWPD(b7- zsgg`1&$T02%9F&-_AQ&?qAa07^ali=J-6X=^T8DhD4<{3EP9LXJhgwjJ;>u>;oGem zfUX@>&?S%5A{Mv35K25yX{@3ZiEjD#*|INAX~rcWUI*}zHK444OBv`#;FcF#YsB1ih+rdBtVe40|BsBv*fc`p2k zw3!e4uuVUBZqGWfa*}^bkAUloho?Mc&^|E9NA0HirR)x_05=GBtjJT22$xIw3nZj! zsaa7x-fL$7xnWqkp%nDbCL^8olE#a(`!zEcGg_&I-@2wn> zkieq|)u8&|l()%y0!GOr3K)9J)WPL2^tiVGmuA*OX1mf}(L16l1BW?|C}9~(X=vs< zht5EkE_`_cm6c+L_o{#;ba)xC#Gbe+B!bPkFkqH{PytIR4Y`^lXZ9Z`bZXI)lsF$a z!WQP?tMCvO%}tw?%E;_hr&(RESTdO7edog%N@$RkU0-| z9^eY|tEN5v5TPt}f{aaBb(-W@%u9Ch9hcAm)b7Du=&@a5r)PHew(uy>XTt-+S0EXp z2T(7Df#&pP+4+|a@KeS^6XBm>l9WD0s-UE(yRL9~68#l5j&5eaFDa#=sYgE8f&R*f zLXT_l@?0~!JcCZclO+pACX(wllIiZE+K9>YZMt~^Y_whfe6-V}{4hF$Kb#MZt z!+OzA%MuJ_lhySxmCmbe3QP2S76w5|LuK`bGxlBdjY=2EkfW0Oa z6nII=ey@p9r(i12bEl&wx2@-^VV)o2|G z2xaR(zy84p3?($Q-*cr<0ZnHTIVQ|lL>`3*Pl>9L^|DlzN_)ylXW1K#2n*B z+W%f?3)*z_j`e7@MI1(z6*$7$>YcHriiI>;jtVdrzRrf1+`nJD>{zIG{~5tPtHcHkzVq0RrgNQgyx#4b+C zj009@ihtgUF5U~F=6{A*B-=oW4>fmy{)|i=OufLvPGknaUSNC^oIe9U{GU;f$JX=ey@`wDkP z29CZG=O$`3c*+C!dVfkE3&Y<^XuN+NA~vc|t()F_QE%4(xakk_m_m5@LUkBLfYfT! zkWJoJ$Te6g+;B0h-cOMti8ppmzk6}dF|eXzbIW2>z2?z`pkOH*SMt97RbKw*$ryROp7;O&Rx%Xj^yG2jm6*Jl;bBW6_D3#$sGcIi#k3uL%WCVWv>Cvm{<&@6m)}@}_W8su zH0|$+sf3!7mY)HDk>TNM7Th=V=HS?XW_ojJ*I9f_@IgLd75`RDnbgms-78^8_L-&Wv;*Pq5q2H;{IaarZ9K%E3kt3J2iH(()4XgsEsfMBUVw#;@p77EJDWVl{wYNK*f!<*yTu0apBddo*7G<58?i~6tUYteXHoP1RW z))8#;(`UCirI0xZ1Eo@F6{U7kpF_^eU_K^h@*L*r>C1a2*c6_rgQvnTVh~DQNZ|*^qOILzP4GfnMfDE+qNEiO3x9Ds zD#o^-kG$MK2AtVj;N28j^%Au+;h6guDj(l|3ka>h-mFtVW35fnpjg1!)2_6hm$Ej3&@muIw#`qO&LZWO{|? z90*O?{rTR?HDR4O&sVF3{~3ojM%eNp+5wP~Jd<&B`R9A1t55vN^nmAo0Kn0DWp5GM z^~K&I0J!9#5upaFPLl&HN5bX}LuFM~hMxZo1SnO$*jotzmnZlH9s9dgj8HoB>fVZp za5fDh`Pxu1H*5FC`Sgz_Jw9^r=EHfO6Z<)ZEqNjUe6DZ*PRdL-D!JP52bhk#WU-JQoN=XBChXknfQNDr}rx^ z`$|8IY{9-gy#>5|cFxi;K=I+oB-5;Y1`2^sdd3Pt*NH-1aHFqdF6J#I8x=#Yo8aM` zCKV)cJl?zHI|whF5~39TLfmM?0NBsfpBh1z|21$KPH7yw3G{_&>L8yJjn#P|V^L6) zF9?1Q+OF^xAzAmP-j)$bGdi{%;sN?8osZolDxWw17rtHa>Co7WX~i4Kn7-|YO6U5p zPY*BtWmrA(n?d(TNNE3&$u7AKLP+3fIU9P7=PTS)=)s>{P^BmxVbdXJ8LW;U-UbHn zTnd_c|9`fi|J-(HJzDuyk)8Z@tijI$39$xOWerKFsTqjJZQiWb?CSS<99?}oZwt<) z!4Z4QR&?Q8H?Bo*-7ZeclCQzEz?rapmSfEv(;A3!rmQv=Nlg%=~Q9^=% zLw~=<0X(CBO%!qF>tMW<`Kv`3fFT}$tHnACllz{e(|?f9faWk)00oM7Gi!}jkcF; z=H$MRH5Bz5A?AnYm^cX1JLl3M+gc7m0OPlAM87yFE`i=R@uK3>t?}_4ur`f3nsIZM zlA`E$n_$WF9CzHo2f|2bIIcjJc>@w2?huWSN52IuVHffF)_4~cUA0JxN+`o2zdqK^ zF#^kxJ3&YZ4Mp}I;mx-ntwY5-d;h}w^7?NBM^FNMzBOJ{4QtSuq_wfK)!$YmwLFq2 zFXZpP4Ff5qLCE>5uukXCtU=6OV!uaUgM&Qvo!$oC0YJ}gQIDx?=)_Wrbg-P)QY{D` z8C)qf3Zn}~p4A!lIezB*u=FJ~*i4T? z-bn1X8_}cR7yCT(gWf5tF_1}zSG9aWq=zAvZi85*p>HO;W_K>DF##HOJnuJvt0oP% zuKsDacLuiZToQlj0#oU#BkR%oGvcp}AAyYqnt)Ff!z;@Gs8Sj*GD8}dHxPg<&O?hg z!BRcaTQ&MA(*74;+66TlL}o|d1ZJ?N93ULN!8OV@8z&F6ZH7FXNF{PuIQ1VvxVa>> zKeiWA+3#3`&>zLwdhkzpw(PUBrOIWp1Xb!ZVmb)_QW@2l-;%drwj?yjL@I1W&+-+q z^KXd)-taaE2z~?`2#9-|P_v$PUeWM6T1=u0WqbOg_r}{G;9L@}+S6Cf%u!Loco!su z(fcGrOlx;Q?WRbuS_xHxT2n)X8UDBnn@B=Kkv~F2ULV|dbx)K~^$u_Z3Hb~$d>;9# zb|_t3%NNZtSGn8QIvWLY+Y$HcqhMQo9;f?zE z1nTZGYmKxN0Cw?9Fr6jMXwNUt1N8S__MkLU#Kq;6lri0Lv>j#{n^hs@GrcXN(q?>* zf8ZJDK;P^BNg}`32AP#qMP4^)>-mr|DxCb=ABWMF(9kiXsehSYhrax{IDOy$Dc+o) zB=dI^GL|6%jdH?iBh9QCpVR;ODKM0f(2Nzpey?DkUWYDyLR?)}{tWM^3t&{R{tJYZ z&Jt)Bx!2?-r~{?*+md*^c|^v0H#02<@2A1*`r|MMBa&O7s|+3T@^ zPnkUrYH)pJ!9zn`$m}=pEABk(G2j#Y@n(*(DF{ypTWf|uvQZ;+u(W!sQReyH=;)_N zGyacvqn|%7_M`g(9vS28$XMzrNPUrq=?3X5>Ee)44f_s stGE}=oLCj()+d*9uN zzW$yqROOENO-Z7!Yqu_++l)%%r@|S)XW_Chi_0wi3h)A* z^9e3Mp}|$XWY)#FE2gMBr|;_=2wi^#`YxfN!?$mN$kaPtUyIhgDjF9T{1#RPm;yXF z0G7_u;(Q$GPqcGYmm|^1^LMGW8)@b7P+O93(9CU1ggf{yiH)Zd5 zIYravCoDN+e+@K)v>9hLeQ@(dT;{{#W+<-JV#p}FUk~HHi zs{3E>*#{QGIeZ>Gn(Q6^$@FMRog3i26`y3s2IC&8O?eZADA#G^vrsdvub?ma7*@Q5 zhHHlP3km+@V{p6i8H5MYbp>rYeTC9Cx|}XPS+WJ4pyP$`*7CHrC{@J(}ZFj`q}&9 z$anvSm63mz9r=G5`wloctE%tJ_T6mF?xy!-HzBZLo;D?fkm-G9rx$@_dhdNi!b&HI ziD0e@QeG0Heij1C5Tr!}L8U6M*ohsT8HkDndG$NbJTsf!C+qutKYl-woO|ayx1M|M zx##?k5O)R(RuiwNk;#Qz57Y0<-UEJ%i_p10L?Kz$`ZFuhJ@2*ofsv*uIq3LU=A<)) zOGcSb9TvjnG!TT)Z+aXz3wHBJ-Xdq~#q}Vx^=s4UEzw8UKzv7gN#FH%W=Ye*vJCTJ z0?#N3O&k|x-Gt1qYpEi?`8(*M>@v{7dzxVeYmn?8?Hw03h5ut@&qrdYZcJz7H596&*3l2npP&O#{d|znsJM zL9aB@;(GW4SWT=l^gzwnazUN0eDIILeDE*zw7uHXKQuKC~rAu zqkZl{cOQ0BXY;lrD47CI0`x~^L|##7)R0eeqBf2$?yQZEvdhrfJ>h-T+dFH$tz-6d zS8Zm@TM9W8cw8#rr7>+Osc@seb=9Uv*<|!Ugj83H-8BbiEKBm08GM#3I5nYIPM+qW zw|d|wY%&wscXe+~OUETXNJqvp&#vM?E^Wgte7##8#Y+{Pw`sfDK;R2)3#>|rQ~V>G zh@v;vRUhKi+R%MJ?x<~Ee_-yxtNLbcEUq!Y^-lo~0`d^RUj+3Ptc0U)_tmC{7ZaO7 zis;pAKH6PX_18dg0a(yVHoqj~AysL@oG=;!F$rX09DvTT$?!P&>=o55%b{~) z7FoFzB8BB}wiGdVZ521VcCZG?WfqeW=L_#LS(d7e!5V<=X}w{02(!zL7RRix5N|K) zgTpX)>@tK^Ph4JoX1FHjtS~Ga9vWOVFx~rVkFfJ+9kOKxI+T^a9e_oGZHp6xsf7#* zH9$_uD$WQbSFw0;U0e=%XA-s5TLn0N-Uz>BRZwq3ZIjriCu*asoe_Cd2Z>@07CmG% zF>;-D6PU(=kYaJ72AN)#EJdPHUXA3FHR+^TDZ(ktvrK-?DiFf>m#&Lf8`y-HGrq;9Z2GeQCb$ZK8vx)3o z)!K1~Mwi%e)d!B8{yGQQSJWW5^k21Y7g3>HE_HqUvF2!K?_TnZ~! z9}$6d5G;<6dIoYCK)(;Htqo5uSq0|jrnc2{{|#UwT)VzT$9TqF5fPY$eQ}7W#PyLV zm{VnChS}`;+SufhHL9FX{-|w>9o<-i5XiVXq^kr=`na>Ak3i69+*;PztxePL)Z~(- z$o?0yE~ghzc!<7-^i$-T&>sF6W@PF0FN;t(Vj`&^Leo{CTd^=`uyTS1n9x6>f3a!%X_% zj@sDp;vyva-9rn)Dx*8voxWoyG!bN>Z(bI9B62WQI*3T2k`zSCX{yO|GnY$H7fhhf*y`GuJ_I&D(QA&DEp3Awux4Yiv1 zD?x3=@Zusg_TtB&h4(zO7D7~>a(!0-*|2f`u*N^E0^zsafE4(%ulmOAk-8vd&-%~LAa1F?PE@{tM|bv#wtVZ z8{dL{gTLOf%Z^P#a+>yhpS_|swIa)4r+f?&z0%$^GESB@d4GtpRFvoE%@i>6^SG*_ zE%A~rgAm7=9vl@x4_IYz*Z3Rg+ng8IqCbn;12ZXMdQdvwgOr(D!qhsgMfq0mff=A7|BL z(0Pt@zPt`)6zu`HO9^TuY_2>kG-gqRVug%LV$5X(o{%IOr8nx%p+z)!ceH~3PN%q( zs@nYys$s=~Sf)dA8Ah`aQ%pgs^aSD4TarcvGOmOb`>47$0SLH@ikJjX&6vbhns&>C zT3`q=`Fucb!DmrL#Z*WV(`V9_Tx%R}*TOh1E<&d^)7AnnIQKQQZGNMA7)R(S9hA## z(E{HSuVCeXAQ8%hrFL6uj~>+5R*bUCnt6iX4Z+wwqi@g5SpzK8ar%yZ5F8Uv_Po^f zn~o1S}t9EZQN}hem*|b-;zI0{lc0vcuGPjc=rAbhPLaJ5=3Ae}L;n6ztnhnB*ek<%c$Zh=b-s(NZ`K#57 zCYU#{V15MHG8W8$JrgTq+;}>rk@6`67xAvH?HIj)`oP+s1KQ)&aNN;A)DP0pvdlsX zL%z*05sgWeY73-5m~F22akSP9o19gKPR)Ih@hw6Xb9-ri)&esR!ui9%kx^-M=1e6` zD8(K#mx!f9yq4IgTVQRnir^LGrOT1l+MaaSj@>9@tF5DLWOTeN(?*PI!rY{k45gK} zEaY@)t)-`IwTa=yMF{JJr(zn#32m~s7pKTk+q8;tlh!kLob7PO5p@2vL%Ix&ZT@%j zij$nb;s7*@J`w}hgD3_WECE(96mm&@QG~q=ju1ch)P~2GsDa-4@jPVWT|T(j=qm8@ zIDm&#RKUgvpdr2pB*%;+(Y3Y7?Kl7_U<-^lOVvgPy1`I-|BVA{kjVcZ?>e9H*B%@T zW{h4g8P?mqN?B0iRl1vBLEb=ZY?NJAbq_xM4REsv!3D*%y;!H7DoaE^U%+mq-ilc|rr_grDI0`tDkfIYV z7J$Rh_wM+yBAmz9T~q7X%w4dzmaP7ZKiu2~SfOt_Tf*%{05CdHK%0WJsDN{c8zJ{6 z_`*nSAwb521_Sf%Z3MLd3S;T|kWExDe*sFs1qf2Kg0BVm#>4?G(&7Zv9DNkrTPRu- zfUm{UrPZT-?|z(vKG;+nSm9YVJUyr!DE57>=lk7VofyYM-+a`tsnv7GY0rLU3qm?u z7Z10p6l$MW>kI+9e6!tGW9Zw+KsC%&{1F5tj`yhTB&vz>Qr-yM6CNLmzIp?b2%) zZgeC7Be`^Tmob9rMCPKL>#>Ei0%qu70j(Hel_BhOrDfUv#Wn5rbzTdmH1-Z|?rsPt zU~PJ2+_7n2_3PKxH1Gssojcyqcj-->=9Q4Ow_4loBk2pb9Xk8||bVDHY^*wb>QXx@m^c^XF7l0F|`cxsK3=Ipbge1w$0CnqU69J4pk~l_DU9#zkY^pstW6bbgH$ z0^`(}EP&MF2DmmZCZoAG4oy|#+a;Sgh&xs9MlVPj8{kfSVhc3svNe3L-U-vnup4uf z9V)I}oL6Lns8iaQ9=m{C-6L(tIGs4ggGaK)C1dhb20Ws~vngfCZV0>7G4!Mi8o(kW z&h>Y!M9=(c^=NgqyfMoe1>Z29otQ0Xf=Q(@iQ%ZEXzUnXOht2VYQaxv@3URiA1WFm z&PLwc3EJ6K)SNN5U!#SHR$Vz+0YnV7oJ5qWF+IvAqf;MrO;taxYKWV^-!T7sMMCaS zW41KE;H((J{!kdz)zEMj8J#<3g5iIAPghl?X@JF1u8`RBWKv!Z$E93{T@^&1)6)H2 zOa_VZ?Wsp~4Jl^>G@5pxWh@T`Wy)!{2r{IA7ZVx5eCyFSriT|((a~SsJ5_x`-%xTU z`Z(Y=M&~#<0vG05^TOPA>(|d6ADdrLfpC(agKTQNk~QS=^IRmeiH^>}{gzz@@H6lp zdH*MWy$-!M*H$Z5UeCyk(Rr4R*`g?l&1RA~rB~~+PKsd}ydJg$s|<0nVAp`O3G2{{ z*SAGl?FP`pK;+Wt&>4~DNGIcFBA7HMO+sf$lt=Ft;10g`M%d`ABHC%7>2kIbed@;c zMt|Zaripa?2_x3r0YONH#e-loi-#OVWvhupH$$)4Wq^A7-hPz2xh;r3aSJ1e&WE0e zQ;_!xx4I$iiR@Bzq$oF%ql~t2JdS5n@MkNa}3-D9aha9ADq84&k6(ll!|8# z7WCo(?Gn;FVjjH>bh5=IXm0nfE=QAx+pPGv11pfZbhrs~=ZdOAyjh|^=>%DYmQ?c? zR=3;^*YCwe2+L-stFPW(YeSX}-2pc&;6;a;FcMc3Foz5nVDV}xr*W2#L?>VxuDS!J zfn5T@0Zayqr|xJ^>)DUj+RoRv)6ynR#D5Kkopq=5rHj zZXyg}Z(K^}XOyJt9t4i8GL-hdxDUPcV66pu)qSFQ-#oqwo-LS>CA2Yns8W#T^cK5~ z3!_2nTecH0u!~C&=S7Iad+bDeIsWu>Fh`oX<8;DnW?WNztJPD~m4rnIvL+=#n$;w_ z^d#I57Z)MUA88D&RX*PqI_6Upxn~cuv6zi&YJp#AF_3pXjbbf2bgz76MOQchqqd?PH{ z4>u3Lvc;g8wFE_So?7jzWax|68l*c_8ya3*g3exY4ZO(GX}7*`s`Yj^jsE-L+U9li zNyrR^JX}=zNmAs~I+B7iE~n79AA`oQ$q*y*XMI(3n(hq9llAa>W?5O}I$j@8}coTUHr5 zb;*M}(L<7#S60tGK|lV8D^GN964r z?(02!Ku1HOdu5X9K{_wr_Uk837y2&0aT^RWc(dzp03U_t7!$m^$pH&p9(GzF5sT>O zAR%7)R&B+~rK>PWS&j@oFpb2|)g=Gn{`Z;Z;8q%*6@WG|Ygdt#ywWQnp$jx~_wyir z7MFoW@jf7CKK3O97t#_!a6*59B%o$Z^s+gV8ogUjr{}Mu5m}M;%Qq;Tq$}ctya}eLE}{oV|L@fxaA2v@>bdRj z+{HotFM}-t-YfyY)LSuFM1b-dEg9_2qSNk*(K`!3OqVQ$ObIv5XDE23wtR(`jz&@s z#QTo)ywTm=NpZYzAWpy=yl(C|9gV~sI3cM9vT_NPxlAg4e^YE9pPY4p;6*EZ0in2t$eL@}-q85NL{$m%kP6%KJi$Z%ZuL*U3NL$6&w z-n=kQo-F>b&GG&>YrDp{Q7=VZ%$hWFH3kBG@yEb}MMkF{1ovIg>sKuh;QK@M$I(SUg@#a8 z9T~ty#iA)Bgw)4rKf3*2u%xf~X>E9vU4~x!O#F)KkA7NHb2d8Wj&FxIs_v$MYD1;eh%_!14JMl-wGm|F>Wr}8?7CL!r!lr4lOESEQrsn-?Fay!uMN7 z&1v-aAJo>*+vkS9IJly}+PA6aqAp&?{{qu;(4 z!gGF5@7XqSx-u{H;rBE^v=id5TnahFc*(&csgE36Ri8v(dA|lhRZG@DXU;%Q#v@OB zY#MF)=YN#>#eag#XRl#Dy7+_I)CEhs>i*KFzzDhSUtomPgI9$!q9R>!6{WXBf*9P& z1$P62-WjxTTcQ+k#((kuwm;H>o_4Z;*P@n_1#5@E#tFasA2v>Pbo}rU4zm1-k?lK~ z1LxHi^QW^|29F z89Mj)MAJok6?(q2&9Tu196_(S6gV<^O+n-@l?ek;PMRRoxzOriIPUANkBzd+=q!|b zPJX((-jX5T>|wYq2xr1IF8Ka4(4 zGUCT|$+$mIs*vd{D08$%^4LHfGEXcnLudQa^!0G%$;svIe(xJ(`b~#4F{3Ep>53%j z$fsr%ag&w{5%^7phX?E9!;8z%(QS`3lgX??zaMOOb#%DCfi@%T0?nIQH6pDfArKpJ zi!l|Gr@f#t(ha(dp`T3~IOU3RW=w%`P?1m}2tYJ^2*fD*ukboI#>$J@;QG{Fq&`7kCGj{q!KRo*J* zsZ#bZxi{EfB1kW~ct6aF;% z_xmrbI=OmXo1thuFa)Cv9l6AWYf*7gUP#)MR!deaHl-s3-NH>=93vJ2XtQcTu-#uF z?!S1;#L2hUw|TGF$c!W%!^Dgv71r71B*hbJ_>o*HEQ%oQMi@#K867q6Z<@g#t7fED?gt{a#2-Q9P6U$oEMcUj+5-%#&+y+7-HuJ_Bm$9k{r4fN`Jd1%+W z)peZT9~0d(acJc2k=I8aA9=9rS0jf~8p@)Y)GxX7+$dGwx@6e8+k-@(WzBTy5;Hkk+56%sS2aSWm!7YRR z%g-(U(eg9PztHu)WCJq;ll}kG z|C_EGyYA_KssHQ!pY6Y~Ki+Ta-`79gKhpR2uCMjI)%QZ*!(FK^N7w$Yon2#{|L8p1 z`C{j(&QEvFbw)bPoqIdCcMf*^rQ@d^-|F~M$0s{J(&6vWbx<7}I=VS^&KsO3IVU)G za0;BOIr3%8dSeS=o2pNy{(fmE10bc#1XXz46)@r9l8RdrIOduFQo2l1C&Iw1RKZtE zD@83~{|!UWhe9gMskbKbo}3*Ih3%FmfRrw&!+4O}w`}8!^D$-2c9f~^OK13m2G7Tg zE}qg$2y6@#A)voV?Ad^-bSP%a`XMT04TCkQ^GdX4ET?iv12Q}(uw%lnFnqicSsdq^ zFoT=YCxg-Gz?YfNdiiBeX2;mGGEpa8oprPL8h4=f!=2K+cl7@C#|&#F51de zcb5)1vjpaI+OSH0bQNR9PC{mGr+57gtsmqO1*4(&9|Ji*c98ulH#qExJ7;#Iq)g@lZt+N%&p9 zS*lf_lnQY&9Z07lF6%5NnEY#tF7$^mvz?pHs0#6n!DnF-!0TLDof9+3j7F^@stXdl zp@U3)mtUJA$Y4%wl}CbEMPPV4GY~Gf3XpwOZi=sT2;7wB5CaXW1JFnxA&nHA`hp}b zH+uK~vBhUrjA438VYNa^K=-U~!?)UWfeMQV0hQe?j4Fa5D}w{4bIsx+99%O^Wfhsz zn!K`TtG=%6#S&Z{pYJ0{ayHoa6NY}sr7$H)bu=Zm2}-!hE7*QptD&NTTI_X-J%EvA zP6+$J@?}j%RCI!mqCyg0@c$V^n(x&Lf)^5p%GX!pt$jcd}EmBs6`tMaCF=;6x z3Fi{>7~Z$GMOOeGJt47+tmav%(umD4NZ;VVN@*~GJz-B+aw@R~-*Y)rKa;ZPv4W2h z141F7B!;%STXc8cjhXm-ub1Gb$`Zl~AlrukQ&N|ao81I%h^svLvO{8s^>?>^AO*xi z*=$xIBFv#^65F}GMHd($Ikzxu)#l>?LeCfUwCI4PN(ijUxRoa{U^>#8V+JC_H%m&< zus!b;$RYszHp)~_M+>P#geGe%-~z70ru2$WGxgJIN))dotZ8eE&s9hEo@v#W2fTzq zNEL*$a$Q#ClPqJZrzCnGVM{}z32jiLR0&%mBU#dtq@Ak{&w$DCNmAqf-q7Tq%&A^aAPwkYSzwI$EA5a<9AsY{wu zMIu&8r6AXfHxUbtUeo%4POrnwki6KJH4`4ApZ^7hp2+7gEaQ%glm>~m6yS+lLN$>R z@o@nUKA|_|{4(-l2KrK$2#TXPfQn~KZoNC~5ei#pUBboHAHp*-M=3HZa;hLx-_5NL zI9w15s^q(bSpuFtBfH*d(HBD{d5sKAq%NTr!a6Zkif(vNwn&14-d25)HIA8WKDj9{ zD+)M#moj+8x_CrF;QCySl#348sd&tXJ;nSWuB+HEhoY!3hJ+DOTsYb~cH)5Oi3y!q zJdY*xzDjT^%FKMM5DpMAvCe9)sEmcu91Ud1kh73C=_+0~e>npOtBbn)VKSnX z9>T*Wu~SltsIO(d88uhpnAK{rDO~;%Xe^Unh8~IMGK5D6S@H}fQPS&~%(du5%11<% z3SQBs%2Re~ymfwr9egEjQ`uvRSlAMck$aiyVau$D%sXWIlr3Krg?NXgSGNibP983a zgv-XDOYRSZFa8Td4`uTu9P)zsw@N} zkCaj-jin^i3q=&c0H^8#71%{`EFs4-g^HOgZ4l}s( zx&X$_%Xn1Y>CdTja^c?Ait?A_CXd2oNr4qsoTm&FGwFVfIv}&BwEUpUmWug^EevzN zIG)6~R(CuA%g1W*tlPHgQ1h#PaTq|Atr}&yY{1D%XirO2`AS+l7Pp1f5o;NIi-W6z z41b@}BF7D4wM(wFWJy!FFFopi@~Y0kh1v>2(H*;ZZu4j&@I_Z`$0>EC;0z-f~5iySeWm+_nXC$3<{? zk~NL2nu^{f#HD6s!p|kMK{Ft^?1IY^i;PbFv}dZi%69j*mMcr_lKQT(e7RsW5S2=n z(8MY>${j-|FM;2($jFTz1|yyG?%rzOOno0`BYd9@bZ5RVk6{%lo>o#^odF9fodV?D z4Ln$6`2KeQ$?&PMuIe+p>-!m#!M^z$pg<&121p{!lk<#(Dx1MjY6`4SKidNLRaP0A z8x{g53AOU1U~BtM>E6cNDd}K%=1wW(rV9?dDBzb%9!W@Nk2E=M=2MUwaba#mRy}m; z%J-X3>0RiE>F#kfw7q@Pq^7{40*0==^Uej8a>Oo|@ue2hmVq@DrN1yew1|pcoBI(M z;XZg}4f@qoo73_g%;lO6i)Sv^X>TUXBXc29CL<}@weVyu-vMLDA~#>FtM~7ykGITF zKivsU0&CtLV8mEU+>}!z!DMPk%9Gc~NiJG>QGLhg1=Mr0r*@#X&R#ch@|KI*LwIUe zef?_2AIn8Yn`8za?fYl1wELFMmpjJML2X{V@p^LZxEi{DMRVZ=LSCs{3s-ivM@NzX zI;j>zn^{zJYVZH-sGbzpA@6AlqpWcz*L-GY^^CsGB$hochBh;%BeO9j%wsY`-08Ft0cybZGr^*bw1e*0j1&A#h~oy4Cz zPRBDdo?@nwC7Z>qzL-(P=ZoW3Nb2eXW-KzA+o{@BJ>aXub9h-Eq%wG=lyqqbYsMde zw4J^>JXHJZAX+ z>#iR8!r_fA3H*MjzH5XFnMnYD-$LaDyiyJmK7N9SokLx!glh zeN=^kz6db4{2)*7Mejy{*J3g{I{IZuo4D;$T~$LAb_~7XX+Rog!KWp-fxvTVFF|<9 zAtN`6z8r%Ee*wArt5|!%?@ZJ;(UVAH&@huocnHFYQ)cz7A1fR2iVyh`FsdvvI#cU} zglpj&daKVR>c=_o7!7avQn;TeTv70YhRmh1lFOpP(OjxdKSnQAiq84#?e{xProLh& zJYv((fRN|23}A)ey=z=pqpL3WAR22grO&meQSMz25b0>1ekQY)mC^b%!LY>af1zEE=Trd!;;% zOr`qt#8QRTu?KGjzj3-z8z1Mi-xUFx5nlXc;0GWpf`uR*fY)}0)Fjq@g0dT}?+fzzE z$)dq)VccAxzd@@Y6|6c2ubq&O79M!*03J#2_8s_cj1HVw5Qep6{bQXE>^MKm-N#;q zkm1Lc4NIEte6RJc?EX;a{hY^WcfR`>$Egp&nr6I(%nr9qiF;xp9wqnA^2%YPy&2Xt zi;PZv&!nopcyk@n5zBmupn}W=V|fzto_OOVB5s9Wu*fJq_1&rJ!Q+Rww8Y9Ix52iC zJxL>mFniJv@|t9XumJxVO4edQh+dro<*M^=eQfN4vg*{~_Qs6d4kwX{$c2I!UlMg& z6}cEMOEEuw;&wO@h<32>u0+V?{Iw>sSl6sN2ZU}|3p7c*r7R$z)Iu|5i60S zL`h>$*^bgJt8!%*4J)13%2$2Gr zgRE#HA+ObqK6iZ`01#MYbjnSuc3=9-YP9BtHn%Ho1QiM%I%rrB#@)7H;5(ygo**GH z5rG2um{)GB?-*J{WSq-EtLsLoAHK5!{qe?nGw5|1t+*K)2kJ2m1j4AthCDYQAl2i(lajBCJ@$*4ah(5Rz}IIy1Urs%pK9)~CWjnOKBdyhf!ZljSO9 z1bXz7F!U@kpd~*rRUJJB>wum)h+uBboNTsKERrRPtOV`wzE5Guas&pNO$OCsc#nb4WqcAXVZn=RObL!ijkwgm574;CUoJ}Xxe00$#pe-yi+VUbmR9^b& zf2~1xf1*9g-@Fr;!HIDYm@y|tP@{#!RhYhP4jD^SNEbmF1k6}ubk;aDRs9~KI|h?< zV1APPc2&hdD0M2ghAd{JkszA+H2j=JM(5UYTDsyh_rBOxHox*2P&Q>|@OUFL5>rWl zQ}#eCfZqNL9D5g#tDEnx%Nac{d=Km{o5fhnV6Nz_LaxgRHQ>;EHSd=3`El_E;|UYyQP1YYl4KAP!_i0SIQq&%@T$!! z1H6xCrmBB=s4nAd1RXjCJg7AUL`Z0)31g9T6is4{Ay35vL54@<;rjU41!dJc9tIt{ z87A?{BQQQXLT47@K3$wkUNa&c;q51CssW)_Z&EYJ+sl$S517auHcO7 zbsjM65+;+z1FA6>W6tw8zYaRy1x4<^bxc(^KT7Wxg+!9|5njDpmUpGhaVmo5s<7bM zWHk0%?{xKNRoJ*2iMiu6paZprg1)8qiV<>Pr|;Qg*0PUA`nJ@ejN7oVk$bj_tIt`yQ;I_sB6HlQ!j91L?mSj1qq|g zBMzc3JpoIBMMmlH_Ni*mlk^^d>l`4N+{kaX)$5TueMG?Rb;*o*t|j9|p{HO8UqG(j z_Y^FnW?O&xbbb58hiFN4+rTRjymNK;iOyQb>SZ6IgLg#DwM2(MGlEbe_A87;iUh2s zcovLG@W}g37)v%84w2WVs;Yk;-r73PUVaufJ9x(DffM5y4<=MSMaC`Cq#~J8C3S9; ze+D|rB1541HPaC849SfD_)J^ek9`xELAU8}XQtbRunlw-YarwImTg2f=0nds2Z!Uv zZ_$S%yR5qZThR9_Ac_ayQ`BL6vrbt_NW^AO)S1f2ouNxfSxyrZT~1$==>TZvqO8CR zc|NWckrjAFCelk^E`#i1QbLWm{;K%%?PLAPzr-;Z)Z5B^5ml0af zhreClKEk3Rclx63)$f114j?_ju$<2&Y#>tX4pA~K_agj77-u#aox1I{oz){Rwyvx+ z>Y%&_V*|wvq`YwI3hxAo&Z}PZ939ig*FPXgP zNBflhm2)#}{e|Er~0qdosktF6)y9WPvQ;`*2# zdgrX@iqK<%W;nI#Ka?VlUua#ZR1eH6)fN>2-f#f2Bcgo~OHT00b6K1uGQCM(k(Mm2 z9(9m_o=$7~TOaSA*Y+de1#I% z`b5DSES%c%7~I=Pmqk?3Rb)l9`{(sFoB0buZI`Nv=H4&0Lv2Cb??XdBuMe!EG3KR4 zt`65xI?(d<(jXVEgCxyzdSaT_ru=fTj89 z^lxD6u*m4OwI7{AvR~I%AmQ@Te&qWt=;ojZ(J}jskPe4aazETsND&#xszJF#+1~*l z7MTXS1#^P@nx5*j!?$l}3F^Q69#m=Q7@gg^CHRWbv_PO&$>8mVmk#6T(zk(`Vlfpm zF!`sdx4jL5mDcI#*nFl>Mof`V;t>lM?xO`bG*$vs{gLRY|us!8cBpPf^d_5dlBOoc@fCx zn+R%f>#VHlcIr@>T~A<=%pJv&d-f z&Szl^zj-I%kiXSFo`!x|U*C#}g$sZbE&$)_ABLqj*ZC0V&#empgrD}o2w%2F2umkq z4a#hoOD2{kBNe_?LW?WFzv*g>PqK?>2(v62=xMC0-mH3Rl!Lt8jaAKK{KMT4kZLWP z%u+lTb|q}qa8_dhKTDd`ce@+oqwF$3A$RPkPWI5jq1w35??^}FNfvmK2lYS%P6)7jXtK{$7U&ZNdH7?CYo zP~!HyGv#qBWJVKMlOeK|MMbBcT@KpF+rwZ2>~96-b^r_JhF%tUoo+0uHB|hROV1Ap z(K`c;>6I6dnK^v5_x80_#o_HRht|QyWOELqgD{6#rMW<0fke>artDdj%tNyQjGjS= zk7kvja}{bDZ7$1ut8ew*zOJ=}cMUUxzifW+jaf^WBC;Ny*x(27JYNv`hM{*XGK~AX z)5mn`E_B)Q+lQ*J3^y+0jDq0&df(q+^?Ex$$N9sunWLg{T5g`8!*3aBqo$HY4I!u` zOun*6=$s|c2jdWn%qAnF^VH6&bD{y-jXUTKmGERpP!S~+<}%n9ADe6dNHU8IhfQj_ zI=&KOrpMeWicAphu+^L+%t6BHN4ZsW#50Qwm;h#o0A1ApCEhxBf)1BuA`tjNV@OOW zEct{-Y{pe#9@37&5U|L|jrYUlkPaC;GumL_9;Z=b3Z;Op z4HIX~;nx-gcqHe_DtRiO9Yo>D_0VlL8Hs*)p&-LBgER zl}KMvdW5gM*nI9#Ea-G zx{5(+i#y@(bZQug_bSs&rzVyvMVwAZWVpZry`tSfNG(G+E20WmKTFWLqO)Qx86YDJ zGVg3mtz5bkbiNx}I^UMZ$J(Rkf{ZYLHUj}-p)hT%2GcCqP*n&Mf;@KYYK%`TRRg^? zaNmNK^`JGEG?qhh7)aei$F)?%&^wqBOB6EBK-#U{yBn)F3l}&QFI5x0^|{9ujoQ#| z7&Tg(g$Do(GT(r$*9*@oM##!zq-dT1`MG2%I(wUbf#trb_f6QB4a?!(>XrVnUPt$5 zJAc_RzRZrc?0;z=XecM>WL(TrR#8T^lQ5h3fVL9!d1Mi!!eL{u$>@RcjZ@X*I7k*q zhInEPoZgJrcis#>N+dTS0fzvuT!!3w`ds5SCWaT6G;t`&nxsBFa z+c3_^7dptBkuRBI$OM35YEme(xC#j`fx1Z8UMw;?JALnt>H)HK60Ms5d7jJVg94Zc zg(NbU1rGr(1qDB6krC(HgHzR&Jm?WOYG z!G#^{Xisl^y0`i!zX8##Zrr3$VOfR8=XF|?dNo{Gg|vibknvrwrpx zM>cK~BngjGh(5m;y3Hb^EvNSaF6tM&UDck;>7Uv8JVOQ(CHMiMM5<4xgvh@Se#Rmr zjz%wU*0?0{gKWy9bL;dHT|-$KR9=S&X2=@0#}HfNnlHw z(gm|7EGtoH-zlxGpMe$f0yG8}6N=^is?2{y3N{Xxjn%Ow|spDvOF>>44d)nTqfJ{4J}iV>VcW zG}^~b=sdHn;tH1_gXgv3v`Lvr5Clru0qtWk6}jL0K7>JhAD&cSu{Xd5;g6NmW+Ia% z<1x}*wn4tq87FjyMQ)}lt={YeEEf7$J|BV!00asJUN*&fS$9elQRC=s7pxgJ85x5L zFuEnycUP4kYFy6QxM%Lf6fC^U*IWkLxPV`TJYZlb)D{vM!i9sWb2E&>qgOV@$1W(V zUiaR&l#Cs1`_-VlIR$_Mjk(l*k0#~=G-odjZZkc?A|v62PYjwL_I%yD+VaZBPyS3u7%Lr%O7Bkq@5oR;#V~rJX zTrX9ndh{_td&mY8je*sA`WYNfKYazb(b1yNQ_!8rCa0bJ-4u_9lMBGhm#&Y_-E=Yg zY#dL~F9&xFyxza6*VTP*=dU|1T6U-LpnVhAJWtR8O^oM^F<~~Rz=1WWD^pa_l_$~B z6i6@@8I7rYQ`JADS|~$w_!4s=noTMsc_Pm(dxB;+&k1=#)S1TA*ahV3b(uD-((~EI zrVVfo5FkgGqtIejCBj;Z-)U8b{FaMi1F069dT?Q~2MBZO=^kF`va zE|Wu%aoD+W0eUJA+mS^En~r+Ay1GE$GYV0u-Gk4jmrX|L zG{oUQbG56d`pR_;NF)nF{POvOLlNbg6rMr}58I-WR6d3-{wNFuiweFl7w@Rv@=@s3 zdYEzAosYSV5|FYX8L~;V60yY-fh2b!5L)kF58Bw`62$ojpcrlb+Pdzl;)bRcK*XhC zTpCYGif)I|5yQ~uZiMgJ7n9Ms)elcSdJ`-(`m?ml9y5Uvhfm-p6%w(Ca_eIzl=d_x zQ1<4=#3-vog~lH2ng&Syk8N(LK4))fY+Xe^6wp>guEwc#@U#K7B^eI@4%w008!NZ) z`NG8s5LvZ?Rr9UTqNWMqQ@1f2NHD*FvN4HAQ}&1A@mZf+prB}pJBj{qTVrf^aS=oY zp8*e1^RccfahN`h6JjM9#Hm8t{TYq-QM#^*GmBAdI^nP zGXY?Anz<8l=ni9@iW3e3Pv)?MM=#4dWM1^z3oyg3qrjY1gfKe!IQP5PtVZ8B+GwF; z|LhYD8qx0r?cK*PlqpGyi<{&DOU1`ks#O@napq32nX${@cKp&_bofr@V!RD~^{xhu zE`CA^&10Z(BBUd&P|3Nrq$qB1>D}nXW3Y-?R647LvZ?@pTsnQ#2??}?NnfSSrUfQK zj6>jo+YQzc3|;zEW93GSyYK=kVby}1H`hakhv&N2Ru6u%(G5m^b$uH;d<;73n>#_f z1Tr|drhp(*!NR#5k+E9J0(TgF^;0mNY%+sTd-10mF3wm60JTDxN(JfDxM{Hyesb(H z@Dnzf`N_oHpu>)qomO?8y|Cy}*F%jUjjcey$qmm(fM8&ukxYDXR~+t) zKbv@GHM;wu#vl!_aAB3|oB+W~jpkucduVHf3$zm*AesWI0tI;y%8*1B8Hslwm-fUv zUFi0Q8$%OIRXf&sKfJ;<-~f&fA4Lg^Z8-@s#y6_A5ri5lqC zs>*^Uj)4oGJmQ4k>MJ^U27*Vu3P9w7mm9OOoR5PBv~(4?#*YBb4?U1*;t8l`0zN)S zs|!;Hwj*d8S0@#5=}obEDz6IRYv4}wW)zx*JBc(;!eooii z#+wB9ow~Jyvx6iKkO86Bhk4vH9-kYVfq!8$0x!j#@wok@o8k%iULk?;;k8=G!??WN zBt_n5T-U+bc;D4Gb#QtodAkJ|7w17mQh>Gpfxhyme**$7aX{$7xI(v2Fyj|^-7_Sh zw9h~-{*1@#_xiXzH;;m(3T@`(Za%@i4?7BgVfP&X<~{#``Rt!*=J)|_fGflyefvy+ zhXHdQ2`wi)-Wh@0O$a@1Zh-Ie%`?Y$;~2pG2yWi63lriz0iQSDTAmPt*Z5XH;_g`3 z8&2l4Fi2E$kaj_XJzOD0%|KkN2Sy0K=)w5pOu$ciy%a?S1O#vXJKWtul6&8|{{x-a z`Tz47xVYa>>oE7AeeeBy7mUyW3L_z6(-WBC2{7*rNqD$3ZUGLILIR zwY$OGV z=>r%g=!p>4Kdctt4A+OjD7j(kLA~z41EZ#N0sjW4+G+`3NAhWmzN z9h|-e%!%`B7LEOjo&x>>pVtG8fmK6!eXt|^0%``ZZUZwy%)=G~1cEf%a zAk1_z%r7wS+1eg;9)AJz^HZ?lrtSBg(Sy_=_y85-z z`~ut)@R9RhB6fq&IJb@iLo@;(>fQ4H_|V3i?i2YtI6Fz+0lvpgxqTEqgMlQOA>orV zLIIze;gLQM5%387KJWa3CBXxiPoXXUrQLAfyT(PM#RK8h{wPYmMo$Ir0Awd{3t_R& zxV=0Ac=LoaZm!TXgW+x-9^m-}JRj_HW}^|p-CQAd-`U^NoiG6N1(I(O^Rd_eO#sB~ z0lomVCfIW`kh&CRm-K`9;QBl>0-pfph3kRrcC0!HiG9g(W0}JtlN>{WE+rzztABub1nYAA3IJqT^xUb9d+J4gc#deiE2dLhb=R z?h8;J4xV(1o9u_vApoK09(alH3aI%3=ks^Nt9ol@-*GP*6amRSKjH`e&M8T-%rj!FSs*&A-Eh0gdPC~`?0l#_}FeC91T%88rJNd^qkrUd$`-dBLH3ehKlpySXGEL#MtpwPEl7 zS2vg-!5iBc$KUMvQ}@ThX4iaIUn%zab;3eYbm?Iz12O+6P z^Xh}nz}1IUgxpU&y}g+k`7dXfSB7n9)w7Mw>)_==2Z2${%_pT2i85faFU!4ZWsp(x zg3mU_hZYr}Q)iz8s{@@Y=I|S<(2LKuuTp>f7Thr4ZbrwAw9tthmMCBo*+LdxBvMMI zAb-mXaM#@T96Vi%7MDTP(;pyrGi1uS=eah+r=Ew~6fo4xU-tB*+QTEIWu4WV5D2`G zd;<7wgcF0iK=+d@t_2?AuYytek>om*`gXhXcfQcrydDNq4V`D&Di4QjIZ~<=sLFY% z&rEZk9$rjDV;5b%od&h*u5w>&FtAbEQ0P0*N?@g$pO=c=Wp?MXrKke86$D90XhHY- z8{dImvx<D5Ya9}U{9&;O2&fi8eWxHw?2Ot-+K=GX}yv6Ke-vef>GCHXa zcwe}Fv>w&J*XB4n2p5&Hmm74pp%drR$ST9;Xps~Ob@G5jWRFphzlFXwU;Q$DCtqBK zux@xPXl5IF>gD$MoqeUT>CnKyYs>E9C^!SB2Oi)Y7`Sa9GvFGK3|ulW(f>jJZx+Dc zScm%hFYlk~(DV=Y{cZ3_-!C{t0Ks`^u+;Y{P>(;~2jE|Q;XY&Ep1y5;%Q^byw$DfD3((`%F9n1gF zbF`<@12bP5lR{C?!sL1pLGk<%j&3~e5{btFCF91$&ledOYi@xfwjdF;ap>nm&o67n7c>87=cM)+pJ|pxG#RxTi;F!3 z&Uax^KcRW78GRf%WQf~in9d#0OVfFtPoQBiZz48XiA%`&g-X$6$VnAE@mZ$64<02k zDY)HK!qH;DFa93G-k0z>@oY)r@}y_A21k&*l%X37;yB?<X@M=2~4+f!re`^EBfHtfwsbU9_x7gm-S_TGpA z!wE+&;tA>?(1B7b8M*=9hzLoDlFXKUI)O5xUe3^+HglLL1@v;W!^fp!Le)PHbucCV zbTUQQ6DorMTv~FF{MFf_dnm}IpmYQQ0RvCz{XNB2gB%i@yCfDl4IzO>&l_bBjUr~B zm5&o5jVY}uD~Liw!N5^O0y=w~@Ht~ry{w#ws{`vUVc1&_rBn%gHXt+eZIoC}1!YY5 zcf@YBrgJ%&1oH^x0%1t@8RoM=U5LbeC1u6p2}&e^i$1}y354WUJS7cC0k>DEDwE4j zGIXCEW~-c`GBRT(S zt@@ZTh^G~5VKA+5#XJOegrR#YG7^(iaB(QeR|WOF9U_K}H;jkLyxeb92vQl+I>dl= zM7%D23D*fTI%T|ISGjpxZ(u^~BVLDDgsEdWsU~LPVgkWnqQzff%#uZ0R1r_=crLDY zPd`KV_=P3RD8YqxGN=)PM|*3Pd&D{wJ}U_N1bn3^W5m|}vsIrfh!fU;hp$L$!iu>6 z5(YRR;?5rm@-d|$4~TlApeDTLyG;At=@h}|#V|qHEE1{(-A5QU?qoQP%M8}IiTb~c zy?KCKMYTVkNoFRK$z+yHCVN6clF2IcU3v>4(EGmJ-n#)w@B6;DXc%!p0U;mkbxMH$U}IF2oF(I9x}2okM02hQ6B!z?Yei!T*CW(`76|^Ien_?RNbnxe2&K& ztCM@U)eTB@88SgLes|Ve@KKrb-s0Fu0sn>|ipf z4azRSgg{=Lq_VV46^r`xVj{AAC)W;uB(x=A^QsL-PtK4SX>skQa+Js>NK@QzlS3l= zc^Lj76_BX?q{CGv0oO0#GDp|nhUM}5bM|I5D~kn-rm8fvPK6;hQhqN{q#P-;Nu_r=mN(kdY>NpDdPm^%AE%e6a;P|-SON~KIK zg{l$WFpk^3Rb!Q;3sDClb3}`o&^WhT-fZ)ri=tiLtg#Z-G}6J1pXdG{mMBvVWi6ab zYULptK!9-Vs(6dG7zmr*tW^Vslnin0Vo!`N*$u9+FC=A(vEC=~fIS7DC0T08$ZXm| z2b0_TaCg9sv{Qb$lJI8_%5qVelzN8iZ_$NPp+Gtti2+(pdjG>*v)OEH`J*zYRNV;r z)6^htcDI}kqgvm{Wz^wjEz#q{+}%DSa8}A(6>(M~3dh!ejcd1?as&}5<@`30L9Gsn z9|JZ3F_UuZ%0;7^lGtpO6u`j_VUUfKTkSTIEk>fIOg>0yNXsxhM#{x_6GT=W$eGh= zqdXV;#N}8V7m=!(4NyM3Z1;JrTZ!+(~Lm1+PA_^+7x=M>#5@R9T;< z;8aT@E_!DX|E|Ms&63KnFH^7Tf?C;fZVx#uX_9c-8Z}FW)`xuuCHt@8_!t68%I7o` zV-7meC`Z?B2lkYtmUj-<_gQXS+H9oHL_ThD(ZwI3$?oXU%+halu}E38lITW z5>Ljgy+6U?*dkgF6>t_U2b;E3(3FzwUV!`CG*zP~M%kq{t4>@@E;_+AOTb+d&Ql(J zs9K9tpZGh+hD>@XM>OTJrd^=~Ne*IMn3T0jHVLsQUob&{JENA1ZpQts-iVyY=RFmB zTI)7T>2vJd=iX|m#|V8|W7Mlf37Ipv?pOE^ELlBC$}DPc&EstpG;zspzFk=(MZQ8X zW|Y=a_RLo9!)r-qJcNyj$3)IF{Caed``}nY)+!|{YRrmiOs&^s#1=d*%RyDT;3M*e zN`j44hn%Nw0mr?Zj}4`E!llsQ_L(PXtzgwz6`!V^gBB_I$I4VC zE%!Q38i#?RnH&Q*l$?x^%Uy5cc3;Y*CJSYKD5J|J)6TT(>$qKrrt3KP2~3Fksy?D- z$T(AxvZ+-}FdE!$59o`8UKG-ml(u3z7h&LI1sFh3wA-j7l9_^;*5q6=MIDw_C`WXR0{GI-EtKeo80bR_DjT^ zdTQOllr;`<1p!KIu=vw)xi(_^3!Z8Lo`S=Qf5K%cswq#MGC@3|NFfqi_u%eu0y^b3 ziC3ATl2$!s#Xv);q{mw#BL-4O>6C?ROK#zGJ`!(PC^_ZX+h}>MaYZ6%=I)>onHs8F zNeM=7rWE#O(9BJdyB;mjrZfbu%c`|XHfSD4Q%5q+Uu1wwi=_gOLk&_%Ty|;@KH5e!b6)YwpJ>$2t&!GQm`}O7^%jb z6d4Lb4fHhTpUkxqwDMqs1l%RDIN73C*aXTrluC@rhN<(|-Trun-wA`gHE^#-hY@k}n zTGQTiJa+Cdw(Zne0H{w6UOjN4{}n(3H$XwF`TtFeM0*()3glKc5gw;hJ3S7!j4ISq zl0YM_Nh;7|4}<&d(Btq@7m(1*uWpA*Oh5U>TJ+}Q{7Ze}32ahu&zTfj6s?3~As1j$FVI8=}%uNz+78CQ&sa zNfFUx26L1@2^@tqNCkatA3{&^MxJ|rkL7dD$!FB2vmzpv@=$7DHdUkmKZUhT4E_N| zETEy|>#1!Bis`IH=|AusuXzeM!W6RjF?b3U^0KTzr!xhYJ)bi=p~701<1)gto&R@B9;R6wpxd!H2+J#ufyd_%kn~^l9J- zrY$>g#P+AWC@xP>vO>M+li5XzgcNhU@@e2Gpg}7BCP->{`i&KwZ-4L^FhRkHZD4}J z(ftW$#-Y$;*{aF8hMO(V%TD1%&p_nnd=gupcRPCQ*_^XzUuQvwtU|wL2mAs%4Us)(s>lgsM;rEYKVCY)brXI5IZrSgpT(d1*G{W zkM&Of8OWUME1tu1d&%6~)>?&nnJ|RZQmKnB6suz7cn+NY!e&Hl|M`yTA3Zn6>6Pb! z6Ii(}22R+ZsdHGBF4F9;5e;}^r@(l&{RK95Xnr%cn_XA_!#ecM7x*Rr*^79ASga4c zKoU_QTOcHQXTvOW#oQ38_|F%CnV=cXJiWME)MpLKy~MBfbuR-m*f9ZMhIfpv7O#g$ z0Ix}9EHR4?;zGI$H1je{n}CLxTZg;x$*a%>ukb4rdKHhA#RI`()k@UP79FEZxu7eg z7stA`(Q)+SS78qdY3TS1=RjJE{KQ%`{u)1G`gLFlO5_8Uc-x2qEt{9f$U%WZqF_eJ zspRKh2O$MC2$_RK88!fT`Y|ALYrEtPU}>Mam4ykZb`ziFv^$fhEz&SlDfF15YEH_) z8^BUP1HkqhyDZnEpS{5c*vzy+Gm9*e*(V3Dfn)ULz7>nqJw+C=-VZ5zpqVlFEv%VI zoz)y6nSjDwAi{NLAbz;74K)Tt;`z}tf^KMR@$Hk4zVo?(>A%drF~V!v-bjblI-NLyj{E~SO5cVB{0OOM=k*t$8{g)q<>Whf?ZUteubnI^*ZZhy z#BEMQ)M<}8iQan$v{lfIdUjsQ0db_?<(XakcaRKb@JtZK`VwXxctfI*CNGxJg?|KfEVn^Ae>BCFh|zr&qft4Z`c*g6dO|XoqvF#eSRyN z+W#`AP5**9;MPF?KJbEFbO3naH83{AVY7!;m>b?$#Q^Sw`ulHe8=l|Vbu6%&*@bmk zfnIr^mu=Yxc$_R^2-X-~K^I6-jie_)xrt1bThmKEfED-%Y3dxPrvSJ!YtYX=;5p9x z3&L5UqSm<(w{|t4JigMmYSFnp-I`il$qxv?%E8a!04z6TVLEe`=~n|sCVS9dM%sPo{blW4W3Gs(nWl=~pv|Mz1RRzak`A{g&(Pd0yS7Ps z~Vlz?r)Ec2uM)f@B(n8%w^_i7q`2aIa^S20Jy^Zv0xy0 z{veiF8l;_Wu))&>n_L>~a{cK*du&ulVxfw*AO7<{R-?5`+FbbIzCkQzd``@wGpO`a zgc{5OMxRqjVTRWZf|vplpfEmrTDC2EZLrN1b_AynUzc*ng5lLeqCxjSqyOu@zh3xm z&ki=^XcW#$*hwso2mT&~6kr>oWm&6L1$KbCEsf~0_O{{q&FI3nZkR-uPk_!J9pgvv z@N!r)ILAIj@&Nd0U6X3MQe{)pkZMAeZ8lXEtb;Kfs#HJ@~F^eF^;|)AD&M^#X6)PU3gPxEhOgfvXxi1x2y%ojxQ|f zeteYms>EFMA{ z3&rw@Xih1o(6y^!#|oPfvp9A>dUotWNGV#=<|8nPwXoKnsauP{uBR(dq8jwZ>59`G zi{+GVZz;yc>rIXbni1pvG#AggZB?7Ew9KpqZsDn0S&R=1Mi$CND)3aTIekW*Drw0> z5cYZyPS}i&XyTUX-|cxGj+19cz&rT<1~^VyI=i7kN1MK~)!{Q~qbVfa2!AYWM#U?{ z=IMJk!ptnUEa(>Bx@TZx|Bhbq!V4Ez(B=boNzXoU4j({hb!j1d(g4^S5CBLTL;+VI z6#xtl^x)ZTC~9{G;`H(Re+MCYU)kDTzADf~`U@oBFK7st6#G*U)7Q$N>8|6@K#7kt+Eju7860CBNJYP*l&fdG} zZ0i}jqN&tRdC01`sy$uDEzJfSPBKrvW3*kGg9Hz6N980 z@rHB{%I<1IOeD!-c0eYhS_u)GVKJnD&{nUTW_5BUx?@*+Wa5ln(6g!9e)OZO&12}S z-EHN^6fUgoZlm>{6FUday^;l-nNZDFa;*9*(S>{3qi528wzQ%YA{_6T451C@w7pPj zUL&%$JZS)55dq{PZS%4S99DFw1-tRv=d{@rmNWIh8PA1>jwe4x(4H4xzHX~Dmdr%U zpL3kpK3925xTCroZ6&&FQ+xCyyKQ3I40Ff`Y9G z5dbW52ZsJl>78j4;Z`Yv>NHa_7emNF0W(1}IzoCO!2Z_fSD{}}JhK;QI8Wijb=lmF zDUgTKQnwv1v;=gL&1m!U$Kb&~t5}03&f}$$?Sm{M+HI=P=8=FA1{ZG-S!VXZ#b4xF4GwGV~Z3YbS(bPargu!XhSFy#!&^`eqnF42Y# z`{7#hRRvrigd{}#t!FC$VZ00W9R)x52~~HEkM_-R1dx7t7An^ev1T2R$;**0$G8e^ z5CRe+yfgdJ&+e0&(WtupW1J}Pvbwv*M_GssyvEkJz0o9-Mi$1KPI%4HF2nOQz)(O! zv$0ihLwNhwYtc6}yoC2@yElZREVu@K>C{P8Aw;Fs@JoY52s2WS+|zr{;O@ckCI4LV{Gz`u zc?4>0-Mr+BOA1STODsqGF$bYOGh4?o2?xq7c#{Ky`N=$4J&(x|Jfg%W@f&b zScofbF;0iJ=!qyQ;2hL@>oTvoYi(wtB7cQ&S#*BA4iZv=a!(t#d-SmkC5q4tsjSl_ zb;5HKZVxKWU~(@RrP)R_Q&-76*lWtfizTZqp|?aOE=Nlzbzie`(YXs%j4f{ohn&jD zL1Pli-fE;Y_HZ$_VkJaqgJebJE|CmWFTvGbn4r5=Cz2s|RqAu6T>6ab)A(mYBoyIM zrmJ3y$StquNGEpCGyXu%Mg`50qSW57xJcTb$NeK>kCXBi#U+opWiM$n2W`({LY!n6 z(xdg0l5p8A2b}4z;C85^(V`(TLlc5(4JB#x+*Mq=UJtI;s7Y5bicMukeE!v3J4wmt zW+_o4Xjh4Jh|itn+C_wu@Mk_};3 z2;*w$Yk8W<7GzY=q>}cGWA?7P(=YMM!}(-WtExu!{t0t&)g@LcpsdT2je1e;756>P zb+1)IHk~3@FN9(_JF)q%I2?y@Wy=g{XlcZfpeSK;#>bT$pM-*fXhd%-Ef)t(On42h zb;P)$X&phPA*tCZDVM83>PXiC!??^|y+mDOerz(5*Eg3jWlT5#Z>AgU6FA_ z`u>w^hcfG=LS45*QAod zV05z|%jvK;D>jFhkQeN^QjF-ok>g{flTcO5tt8@1E>A#O2iI=)83~bxc7!2zH1DB5 z@dU?4uXdCHCDd(?866Hn$t}4%qLmVOqir0qH7v7gd}WiKzSpR5&vvbZf#L^oh+Nu#+$Kh`26qT_C!`5C!wHS%$Uel z>@=|iJJ*;*!s(?-(R8Kku*5Ajq6fRhn1nZJrAi0Yrn)2=D3-MHfukHFlUqqqIXk3@ z2dTVTvX%b7&Hwtyi zbX6@~vH5ekf^^O8Tyxo9GbYO_xgUI!#>CEBxaLq1D%E+Eau=1cngda^) zil!=I*ND6k;wt>JVXG)^6RQ%Uu-l@~$@cbQDZ~1tk+L;iVDpSM3gz@(?zjkxvqd^z zHds{tR;!+&C%GjIm9<*BY7Hs#fcI1|WX7?(nF;0M2P1@0sa26ax5ZSG4B@yzCX}ry zNdjVwqVZW__1;U5kq(s4RqRs=Fd@S~UFl#grI>yxxSYm;b_c}iXnt-k}y9}-&v zrm8Av%h^J4AGzU8+#F1+9HLyc=+zPjwNZQIY)-?29<>p|^rXf@BOi)Hs6AP(zf5a4 z=40uGJ?pPPwgfKD#{?x79mKGZ0lMgbdt`Em)6Af#Xc9Y<`I<|st6D;R=U^cNX}67( zL+C@om!s>7^tu($4&h)-AV{ZZQ?>-@v7!JJ;#;$c`vZlsPE+2LhSs~a)ey1lD_pzW zn1K?_vW!|Q_Q_L;k*m3OiMc}C!#*{5RIMg?T*X}t0^%Y?w8GYS%c(56O!BQboPhDy zsnkJI=@JLQeO(Ibsnu6vM*a#zlj&@r>8q#I1v;X?i))W-qJ%u2X}07Ahp|TKxs%Et z%@hsUnmkvuHdR51dL5oNf7HQ{3coMdaFk5h@K)|X@`u4?8D!(9ih9FA6GbnzaqJzL zGF8%43Z7_A%lIT)xK;NXBP7vsCo=L@%Mi@R49{@=bu}#&3b-q|mdj|6QTx{8-}N=} z>Ab0G&CVm#%Ewj_iwTDbq!gMfSN~H9mK-nZ;&fQeJ{-~S`m7Fq9fDr{f#FiQE53K$& zt#CHh-4B2V%L6>+hFOaC!qyY?#HcBb4iWIN82J`XMqjka_^yl*WNHOaVt>g|9Pbq0n zmyvLL*AoFCi<~p*pj~n@Nb37I_BP6B4;W1eU#28>MI}F9umD{*b71vB zh6y)~WX<5LMU>u*OcC6$9RD)orz50Br86qB%0x36`ou=A-J)z!(t2K8Dn`;}c~JRX zu3a241H`x@pKoUMm2&88Ze18c2FY?|N8J%_*mcU-j#qGhyGE%YeFw{4i$-6GBy#aB z+;*{3nHbTGL~@L@1_dTl8-I`gAVPXHR78~tDiS^k)G##Tz!SzHf?WNYv{LfvJmLTm z+>gVD874yLXl2q_me^GRqAK2S2R2h3VLh4w@EM(4yr6H9W>I;%Gjs7(knaPg0v59n zKmKGXv7OsdDuswd$3GaFV3C-SZ2J_O9*|q4OPX2Ye(G3hGQ%8q@AqIGf z<&{buB@s1pTCWijGO@Ab>sts%Om5J&W0m$l+d zqwpu;Wh-b#%o@Oex7W43=ub1?9lhYszu${SE^W`Us1Qd7=L|sA7E`y1qISE3qRDw=j+O42q3=dDg%1VY9^mu*PN!o04$E=$J-PAu^IGBT9hTVsb># ziioY>XNUamI#l)ZbAMw1^IAN|%ihq)-9*lmcBH*7bx1Agnm}F+fE`IlLR07ba0j}7 z{izA0yNI_DWGuO!HDzaAQ*9klv59EfSNum?kc#{$I$CR{zu2c*jh3H!@$;(P%K3&345p@3+Ad& zjW>)oMZq2x4uet(XejvLynO;RJh$ma@~Ud8o^q=0yttV7ZF-fi}YuhP$X^h z)@ZzIsAzlnh=7ES-@dgAF24qSHOjBrbPO0;r;d)#&2-so&#A}|Q?xb$T5(p#`lQBD ze;fubAfc%rKw0-LELwj1o2yVF&adB9iLPbm=<+!+Nnc(`lYzRVU>4hUcv%y@&tpZx9ud8d4xJ2w zgyDDAp_eoK0W_Ec>1sq!ZFmuxA2dR{XZL z=w~@z#F>11+Zf<^6GNfFLj(8szuvcDk+f%eY}3D_;Ngr+9o-1Og`Mq*4A}@%YMBcz zbW+k{Podiztm{tDj2&FNn{7kS`ry>j4KQ{Lq8`7lcilG`eUuVbwtq2 z7GOEuf3C0d9J7t~S*yBV<^}&)FuZ1n8oX$r+<&siT{_JkABE zERDM6c2L%^*4>mT8BdGox_LLqWYQ1ayuwc4mb#(qT3Jb zH=`r3HVo*(cVF&Dm)?4J|MaP^v^70rdlxLbV`#;a>46P>5A~kg^91PJ=(a6eub4O? z894v*+h9dkSpncM;9{#s0N_sxs$96zP!1tYU_DuLLwjuHnY%#9#ZCgwDCv51%?)kU z$GBx*xB>jfz7t~bAD`FtAJ11_Ub*i$49DMm64vX{KTImog@5?+->?t)>KogERW62t zLULl8IxX_IA^^(-@Jd-@dTyJHPn@v_1T|-&aO@wye96bi+I1nzco#A?=Ry|j6Mhec zultxiG(9?g6%^$=?|Rmad~TPRS7+afZ&!OjLd?%3wkq;u$Ya!-Wm0D( zpTZ2Qw}ONM8tVD#aMy9Y7X9v4{!9AKQ7qx^ISHw7*e|tsOaMht5LXKs%us&}7z#*e z=Jw;~qg#*hSE2v>K9+9RoOE?%y(FXMX=zx@*pqq)-|ZgyYj1;_uYiWbce~E(=50L3 zZ{3bL?wsT3P!?-;iU1dpB3f=5bV zkU48H6!}4Wa@o9AG`sCSxX=q;i$83?%Z3o213{WsK?w0n5ZtcepEze-0T)yW$cHbe zGPOKaC9E=!1WfuVc|eYekAMnZeH<>RLK+(L{&5Ey{k3Q{di^-BgClps9K!2?#Zbks zrlvs!8NM!WP^~Uy0%d!m%W@N7AOY0WX zgC}6N=94MR@!5M|6V4~0QzuWdkBG>CK|O2iP)>N7-WQSg)-1 ztk+4IvZjc;0GY%}0`JXhPQk$}pg~onv*9e-4Az`CPVu{a`2(;}FtKd0bu7HvB_@27 zQpuERR(C<9Mz@@RCr|i+_W0;WNK+p$=c5N6;F-PjA6PN>0W++a!HBu2Aplm0QkO&8 zXeN!tlRXIH325lhm64UGv+LOM!{^;KfzX5elHL1Dd|aM4cU=1P2Dz{13P~7^Kh{V? z$UJ+kUGfl|NApSO(Ca$Rh?07U=XdqPzz=Ladx0O8(&x3Pz))N-IjoANv6#dB{`+AV z@<&KB`<6g3juZk;FZfSB>iE)M!MH)6Zm&~j&K3)0lHEU(!}D9wk+Da(XW(P| zI;+r&kMJ6`y|LQwuQJ@DEe>A?DMJ)>8=O+u;isg3}64jKQa!SE( z>D2p^_yTzJaagnYBs6>A?*Ke=1+xwf{1-3(?k7NgIHNTnKR%;1S_l!P)K+r|c3D>D zjbetEJpnT;pg~#PQ=Eb4zn|dcU-%?mGxgk>=}dluf(S|*S#>2L@>86M&L@GRfCgBr z%jOE&PN2J<rBFCQ%iMm^hQDx|;e11PFGwRQ(y?D4^jeL8ueI8g2Z|vGdUA zU)miuIqc|#zzrWtnpjkoBD_*424a@jTWR+DzVa+FIG-i+US;#Tp_zZIff%hLv+EG? zXMWvXPvgCM!Q5U|7HuXaDQ1cupVJM~(_Uc+94H?iSg5HQzQ#N$$rzFMM_#LND->d*Vf` zSZuL&tXOK3-;tp8bx*|QXHtYdg2h|*QhRhnKts&CA}(7(blcxnpv+4=+iPD2ws0C6 zfh|4_{Sj>-K*r>Lf4SCFqA{Q->xG|N6TAZdoz3{}p}~ z!mr|4FwD(@DC_c;DM_nJi$ofg25gk@3zH*)X4XEr{WOd8#A`gqy{}_E)6eOd)j$;E z_LeMOZaCvHZ3b_#t6m2^n@>W_OL?yN+iS1$J8an-cn)-PbC9fr12hytp)(~_q+$m{ zZ}%MdIV-DH2c5ZJH7Df1s|}Gr7w0(Ql2@J zlt&bGs%>#yN~QM3(@iP5KigS}?s*3mQ9we+Thg`R?NcZW_~kLT(N2L@J%aLO@Ds2y@b>GyWWJ6gO!I(6UJ5^BAn6LsIVav zte5>+yCjUJ{th=aVKeH{{lIwldu=0Ivg@c5{v4O=Dpnc0mQs5~O-$}31T`z9={ zpc!rcu7S&zh`cpt(z*6;AWUfLD4P?E?YSXJPo*H<+f%gDvXHhIM2UZZFv4aG&Hds( z+P7v%G6H663Zz70n@57%6o6(Whe_N*i>wVS&3|1sNXcGR(c-3JEm7?(^ zl>3yaAq!dh0mv_CMMu7T2r?`_fWPh@KsJyV?@1`|-SSguOSKVGregk3_X9GqSt6xr z^7PFk><2gf8!;X`y6|oOUJ-exeb!2B;tVVpUOKdP5Uhp$=k@A)-b4q?RrS^@R-D)m z=8r9``6HlnQx>(AE&st5KLry*xB;mEb*xXXF6@k~JaZQ`bNJ@}XETH21l&EZ{6yEx zFkin|wPRKHhO0WGXHvcCACXTV>OltM&`^TEI*aNkFkIC^qI6 zvjwftrTv{XXG>1Q+dgy8=|eBGwN*9_c9x+1{T)dEaA^Ps95PB$3{)>+QM}y*`~NJ% zZOcDOMZp_}p}0$b=hINy)|I9}2*{yuB(0Vh8M)rN8d{hd+|S~t{L z3gxw|kbt5DZf*c2*TAr#un1sbvzu$prVk&aXYL1kbt#`AbM4ml02&_dELj1yZ2>Ml z48?L8u=OdkHW!qfQmlP>{P0`tC1+Eol_)t=PfHdG{aw-(veWhhyeY`V)t{dx&jRmik6yu&5;J-?#U zbse$^>G(cWFxVs|kkA>BS@H^_3LSX|u7LDJXM99JLInDC_c^#8p@|Ncet2SKXVZGH zXk7$H3jUz#RSpfLMJ7D{oUB;^^X~-c(eNtRCi5v!kWS1Q$TF*VcGs?k!NMJaO-sjj z2ydd?sM402N>|7kt0^+woxV*JKp4qRt8%Oo^g}_-7a@(<`_6i#TElaXt%cFU*WVAq z;>9s!f|UlN%Rs7O+^h0S@Y>wFwllVD9tqt-@0dhgYt*WB9WJMF-+B-h9&2oRI(E#P zn{vONNawRoL&lpb6=ay-wd*@0BLW%}F3|!q#>C&&qSx1VI9KtqjldBEWV6%pY^s9t ze3|f+)Gl981vMFIc3-aEKoh5(5-LF_c(?zP4YgPcwa@s4pE(Oof-+7$x(bx`H83&h zdHjU4u7Kwko28DQUpa{~!%ui4xg8x_*f*iAckq0ZA6tU~S0 z{5&t;0`m+?5uH;CO6pds&GlSZluo%E!6?gdazxOI6!pLEL%-O<&+kiHVK(538Ue|$ zvIbQ?21;mzW&V1uMum(Nx@8wgws#xsB>@c{hQFPhzI$$#3=WE)Ws4KL{dX?bjJ`Ynr?v0^vROtuFv0-KwTb;<6~8q{@B!7J65g86I$OLx_t&e-sL64Fx7*F@UbNDHo zIk&TI3@SbC>B4&4-3{(g_T0%FV4)M>7|p>C;howdJZ>XpcgJNivEE*xB50Esmi}r2 zq@Pbik14(epdOpyvGzK_OWyVJEvGu`+5MlL6JP6Zh?`W=ESBX`$%IOViu*b%(4`cd zegYDjy3@~v=KP%E#s4b}ryq!!nG;hlcF5AS)KCx0yvkS}9b!7;hyY1P1r#wl{{EZ$ z(bvR0uW1RMTQ+wc&uv|00_3k~vm$|r(oCch#QShi3Ue! zNO=kh0tT{$B%Q$=@7xO<1vIpIaR_8Q*;$Q7&*NpJ_kote9%s|n@g8^A6Tup7sM)k0 zH$Z`V*(KRNB4|aAAK%k8a;!!#?Bmai!Tlf|Y@ayr!rRAQj@Lv)-sSXa$`XYp6vEP7 zvLB=q(9q*Ekonk6>$-10za}#mfO=LJ42!^!#G)s>-ZjjlBWr(I;y(3o%CRZyc>Bxc z{+N-{*V0TvRkIbF;=?*n(Qhc=+!T^f@VoDvkKR-8`ngU8vco)7=jNg6FS(#tLb+tF zYfP?`6f;Y!fSHiQ7Hk6D48zCnS1Nw3UQ@%&!faILW+Ps+M@(eKR3c3_sY_8n|I)(S zYrh62LqNiK2wgkZ%^H5Gexb$cR0f84Pv+f4vxI=yb1T%8HFd3n3wzkh2%8{`r#@yhWU2(C@T<+PoWo{iPndDkiA#Or|Dvgv=XZcgIIJjb9bN}vMSVRfm{o;OfVfb72j|nZ9eYE6?0zx@XJR;DHa)EMIL=gL#AW!=p8mvUme2z&Rk<2P|e{O?9AV>Y2JsKep%L z>wD0`4Dbke-Go2o$yi!!{cA@8%C4pW!h-5%;{r#9 zvK=-)2aMrde2&1J*R}LPUCa6QKQ#Nxm2n)F^Vm&}FuE(>aV&p#!SLE4axgGZ?Eh-- zT?>D|;9b^|_?NS;2uvM=EcGue0p&5M>heqh(1vVwkGSs2H6n2|QUv|{c@4f60vek7 zWM@0N|FZpSrZ?6*U{CZ<9fRa_F0!p0HUVIDMXqzut)P{0MOa2)rJmo6mOt91P46G*E=Vlqg01_Zt_It^OA&_d(0j0&3M6p%}iir!Fp@MPMI{j*^113Y~)Uh5o@NfY@byc49+goZ^ zsVH{R1)5bvfNPlFihAC@_k!tQxzo$Zaa9H62u~ejlhE-8$tzLnT4Y?34T-C&-6{IZU|Yq~rLa$wV?zo_*!ErdBIQjmcH3Ft7N=}ZpKZv_OjFBztP z@|h0PGrF&P@GZG(V13_xy;~Qai|iW|lUtz>o|QjCpjbU=Nok?%d<1}DEi{yhryw?r zM!$I;_UmJxh5dTwE?mvtsn2!BS3zk$C^s**sv!!_6^0NkKxT2pn_V7fpI#Hhdd8mU zP~yCm)3}^l?F;PQWld==V3LA83&=5nl!CUBet>rQLI*Hs&Ok*|t=JC0+>}qE?O*)Z z{d)NqJKr4>>=S+u8Lk8!70~b=`q9Hf3U0f;X9=SnU+(x;2V9CeYl^eDAi*JPXaR-{ zZG{gY-jDzO<<98%8M>fD`mr@=bg_TO|Nl3`aRR(4oEcWIE%9!hfGVyavVhjzvYa7S z{aMx!3s5ZVccUKy>GX4fbg490U)>^`%iZ*QHAEn#%mlptI^M3Dt2?8sENAY5#@_mb z2~A)9v2#3nO$Tl8od8G6mGbTfPq6R#GvTRg&U_{$xT*fq?l8Lh+KzqsO$&yNL(Re4 z2L8NwN#A*kl07#~Z@%9+1#e~3)Un~Y3r-xecS|Ihl!la2mp$ho@K}Cu2!2LDLo>$j zbpMrQJFrXok4hPqDAZ_8Ro# z8+bu~cNh!06qw;BiGyLF1c=g;i-x_7J=N+8inb$mg6EUa<_90;qFcUzcW4knEGBzP)+unpNBg3$DHzrhcd`6lo)PaPWoet591 zk_0k#U4ei;6OCv~+zst}--N*mNPr>x+w;-FZ}Cs%?Kgwrf|xqC7>W(C;j{)-Arqkh3s1y6p^|$iVJAD+yv`rlwpBuSJDo>SZ00l^= zmGyFxmcVxn)_(99td)R=Skr;f4NIoM7TmK7X9GS-r3 zi*^WUfR_i$akGRFi=?OLfeHJeV$Tcbvk`l}NOc?kf{fe_qc=_+8w1_KkEEQYtTAhK zDv0KG8MI9Z&%Yf$^MY1171ixS%m0m^M9Cdk%F#I~MSvVY(g~BrE(`wkWoLrB$}YVR&l{WEgC%1GKs9I#!AWuPeK1r33C;c< z@(zFWzzjEMFj{pzA6gmFfvMTvwUcvGTQ4*$X@Hx^*%~El zlZfJj>6%lW<)a@VfqMovz#rP+o;k&TNX8z30lLFg!uXz~cgVXJ7V24k)cmxXDlv}wZ315sN#ciEu9tM8%NvJ442BuXuBX|FQ z^8A9o!rIPe`e1F3%XJkA;fS~z5Z@yu%oLu%AO8vlETEwy&s_=H&L%F8|C;A0c?1ub z&F{ej_NUBBqs!5>N}6=Vr^YJv#YcdjkaFa?fn9*?`Q}RW>LWbAWsib{a921BB*aS` zq=L>Mp>Kv;+KQ8~Mdet+Pd*A-Bc!2X-%Fr1+kxfJALZ9%=C^QcX4%BXO9sC^@JRoA zecKngd$KIfwHq#=@U~;~B=FlVRLF#*gq1R873mV~G?J+GG`#JE%{Z{+9Qm_=`#Ex1 zrw>g&)7ikD_Me!WSbIhpR8a>+t8<9+jYT4W> zUp*m-KzI=he$_^(p>w+TSI`Sb8+D4t4m%dt{uCtR+ z+9#SUM$<`^6a}B@Y#*NAih7p*d)E%R27U4-dM`TgjT_b>`zOwtMl*luoW-Um9Ancb z@F%3M_O_IitYNR3P4aZODQ7uOpckHk@4bKqM%q7ui+;`Lmf#$0^&j~IG5IIFU$@Wg z*RWJp(G}=gC0bx)MJab$pZF7O2LTB?R@VNRpVjl9?wpo5$pR0121@-m^xm`ZPp2hL zo^{1VQ^z35;tNZ=^Fr1bbDr>tE7rI+kxWAX@~QJ@VKcl4D=DC{0m!@1Est(rIlbW} zuq|x>+l_e6c4MY0`52{VoQ0HMuT*Q%{pZiJ3rNXMzoO0Wg`WM@ZYk~yH(Jet%GxY2X%swXb{u`oo0c?G6Xw{Nm4D9NAw3qIA2ExBIBG$m};SKC;oLT^K z4#AY$3h1<8(q-ykYo@T0?R>j4y5dYd0Cf50YyS`1`UZfjbzZvrcci?@;l)PbbMWdVR-Pr}lIOwX*J3V5vvtSk4u(^tti^w@iypMtU5k+!

)rbGj$UxqK!OS@@1lxn(I{D7WY#q)RrF(Op z6T{9MAi+71Vy$QaNISKGX}R?-&n-}w@Gq1*mv$dAKli+OZR9$ z@PaEAoBD%CYfq|^fG4N3=X3$Js3PIc(ZwK~fCM1agRD>d?KSA~#j{+X-?M74rhI>3 zc0GGH-wR{LSJh<3t~ZiWyUUWI!*z(59@`G5{NDyD6NzCtA0C_?9~IKjkvnxe4zB}9k6lZ7Ijuv$ z5iV&m;D`tAiR!Bcs=(+Zxv(}Qu81+mZw~=SAq~O-z*O?V5I>DuhG#!9CJRgBNiw5s zL`-2x!PNqhhG!>7h0W;5Wy;CvXHS0bY_L6@fcxU}BeQ3Z)!3-E1A||IWVDyNQElkR z*IqAo<1_HfiB0t3E>xM8tws5=Wx32zSFxMmoY@KVwXxZ;VR{~kReBCo`)_0Xz*mpY zvaycGG;`WR*YjDrob)-&S*pT_(G08#N{oYg&!?c7{weO+_s}@c?zI(I8P#)3t(HZ_ zIid!xOc#}n7)qGmc@wkCM?XSh7Jq3Ux^aSMc5)>w3OtwD0w=b`UAq!}z=ZWQAyElLvub<_j zW0!8kTbj-2!J2JwX_zFH&;(;lSs?;Mq3#vy;*G#iKth`zQfvn&KU#@SZsbLrIcs*? z@~c_>3_>E>WBvcz_lZT9^jysv?JM0Rv}4w}pMtWl7E6=xC&1UMjk#0oZD1VTwt04Z z**p>w{o(n^X$WuQ!&T1Ng7wHUrKddkQ1ppeRuh}#av202e0bce1l`c) zKR(k9Tv>%?w(wK3Xd6s2=scU$gU_Q_Agz+B~VzWg>B}JB(Rw-wrH=G!%?Jdp`R7c7BR) z-+{TY89kU=B;qXOXp5&vDMG3y4Qbfy@X`A_fSZs87uq-Wqrgsn8+~RMaDyijo4tdd zNbY>gnV?L8AQV7TyKUYSs{)fFf@TZ~4zNmV(Z=)7-HSHS3jU3B?(A6`uK?4N9#~?B z2ayd|t2ERu4CusSv)zVI^hbBWH%CB1WA}o0rW-Q1XE(ozYa901$ zUP;fhi1_hq5_-2G}E~l;e`y0Ps75tM6-~(JfDU( z$5%?G9}~^q3N<6{dut22|L?Q?TklwRFUzcE$FoyTeEM+82RP`@Zjm+V&vGCK3@I0upf}K}N-eRuBYn*HIYUhfyM;fQWQAqT{H1zgPFY zO1g;iecwM>?zwf|x%ZxX?sm@aWPOZ7XYUeDGZ%r=sjFacCIyj3_Ajj8f)`!jia7E( zq%fgwsN*!6JK=(xUz(=4OZP8KZ9a7kZi9!labMcM@UI+3CJrocyTT8{)&05yIEQZ1 z4jin>p?mKs&)f4K{rTNA_WS(9=oc?paF4;Wo$jTvL_!0pI?g9FxX+IXN33{D-^#Sv zxn+-RJQ}fGrCQBcVZ0T2&01?3A~Jy`rH7;g zG%VWx&F>+9B=}X{suvB!Lk6%#2k>!fqyun_HaRGDUFT?q?TI|wJ8DjGtBqhgK;sVA z;9%Ih@Jty+t8k-5;K#XX+@bL>-NsHwW@%Rx3N>)vnJTE0TQ?H^47EY`_3KQ z0kbF~dbIb#>;gm5a%Ecv(AT)Lh?8G2me&x54_YAM0Ew&o+tAs35cW>)G^@x^VFN>K zb7#~yD z@reRA5AR!+iVgP`eB6+5hw3P{S-Rqqmy}v>)96cb>wF7)H$>l3+`C7)#kb&*Y^Y>| z4jau>UNSGjuzcPYBcQu`sv| z(71|hzu>TW#yb`OFoy>+eS@Xa1)E;yqNAkmrH;kN@cZf?|riE#W+JLVTI<9|!V zm<+N`md(+IzLH>Yn&6f5ZSs9mie2_5JXn$25JJW-V9RZv|N0dR2eCuL_A-dUCp(|K zC+1DEGZAY!+G>Oyy=~PL*LFdq0TQ`{{JBfi&i{2|MnXGb>;&!X4jbV6(>S_u3gi+J`85u#%y7xV2Yd4?rt!_QEgn6-k)ArKRG~xuL*O>{F=-H@xVh^ zk8qJ`%qi3XDl+3P*#dI21)v$=vFQw?ua+uKc5Pi=kGtg+Bh5)acK(L>&qo$;8Tt6+ zs@>eLqUdT|<|52TxXg7{tVS*6*CgwfeA1$As`zcgX6}Y8Bpje|_wJX%`tuNYFK3}j z{6%TBe^ENH#}M})>k_Ble;nj4)Tma?mlF$cg6qk4XA-hS=kAMOP>2(o&0X}A8ELbi zms`BqP%*}N@(X*`4;FLxe$Qu`|4|+y?Q+lE$A|P>)$9C3YQ|8BWdMF0bG4*xIlsK` zomgIqXrA02t}N4RpT8y6m*wF&WP!oqLwSh7QK^||iP2iDU0WrWRv9v!vIyfbSj;_r zk|J%2yX0x? zXns(|KIGI@<{y0OA4t1~&CKXo32=*{y}Tb8F0ve1hmm(?O-UWtnAml$7UA}_I?wHt zReIr@WTVw+VxtwJeU!ti$%njY1gpB*_O6R^WPP2U;+-v{5dMGCN$FIzxhpr#UBZ3t z*~ofsPix^{q1L^twZQERJRHNlCh-6pm=e9&vS)Cj%ts!$;~he>v)$c=@RqC}oyKqC z`~`&6${a>}*N((eyjKqC9V|3z^%vg+%DH1!2$OY;PLwQK@7nJ0G9A zGH`X@P61bU?+)$@@BEiL%JFwC0K4u~vmFS=%ZtfGAHW3s!t8>FcMOsCc9ML0woQQE z5TYsgn+84_jqC%AwA0z9X|^S0bWBaHP;%;TV*m5OIjjW(G+<>Q?5UTca&Znj%AO^d zx*D?&OD`XZMwZ@&y4eiUwwW+pC|T^O7T#xhj|N898L;l8Ji5snXF7;sJI3U2WZ?Aqb~@qaCcmT1*XUG(QAo_d^{Qv zQJspG8fq(cqfk?+kq7h!LX0;J#^4Ty`NG6&g zJQ?&(hhMn?%m!%udl*1>c=x*PH;O}Y@lAvyABjddmb7xGjA5D`g~wQqBoG17<9PE; z;5b0zgCF*g_~2J=5@lR}Gubus@n~cR(THTrMmFX0QqG1~=BtyF@}ZltCmkShl;RH% zQGvVM$8N?pqSxr-AHa1Iu(vK8zpR&P`ej^q8b$0a{?@pOo+bC%)@V|ea9Gq;dDNZs zo8ZdBYZG@EgFisxHgxVh!2RX0DD{q8$tX4Yqa@F1Oto@Ir?hoV4%QzdymGgK*8mAi zjq9A-ANeyZ`>mqTfBF#VS3VAn^lKukw^kX-XLbSNDT)M1gyF&4u=g3HafgThx}Ur2 zHc=}dza8ArQa%Wc^l8l-qx_6KD9f=_$YllyPOqu!Ifyqv>w)0(0OpFEDBj^azz`Rw z$fzouL}r2=pO&)tBR+lH<(8#s!tghDK)gX3r#|PogPiumV&|pqMCZX$@NsCwQj{Ah ztCaDZ+_9A1p|yDUAwP|qzZ238khsbw_y$RTvu`W6`7Ti_6?YTy%6;(|n@2UnShVV- zqNt)QQaC*FLwnub;5b0z9<0pmoqy`?1;jx26lmQ&;D#BYI1Hb6sW?pF?SkKH5o-0>sO#uCxS>*4sxCq7q8O1wiz0Qd9oS=#Y#e20vA zU6sh?8NbJ-Zl-LBZVWH@ywumLnl8%-#A)Q8T~%DblxB_4~Fd&$N+_p%tPls&Oam1+&jCYba8K8nYN zp16%P=O?LNn*wAljgi>wiBMCCvL69(kE2l)0br*W(>9cnEUEy#PK-(+5Q3P2HtDw5Yk;f3fu!J zA|!9%m9*Nsfj>IZw{uKHUMg2LA**S|EbXddz0DwZ?1_a9>z0wYD;o&R;}4wNny-u9 zalw-ierE0{;)(9$H2t4Q3nOY&yXjsvVp{Fq1ZMtsmkMYdMLVd-d6K=AYaD5}wO?hqvGU zXkjNGR(}-1MZ&zCaRvM(Mvf=*ZqN}`C^9^^y^{mQNVc(k5Api@(l^E7`q{V8Vld-F zi^wETI#`#MsZ^6@xi%QGs1fqSi+29Ev0x6+uu|}De`3Ob8^0|Yya&G1Q~aZRz!5P~ zNvYq`49gidq@`myt-$on@9<2QlVCXH2e~W0D~`$B_lSfm`VvZ!TrNY$2`?-nx z%a_||#nj`G1B zB>u{u%iE<)y;4c)J&v-hBIgf3dnN~p5xIJg03-g{rx$?1-m@yt{wF#lHg}W{>>!6e zMX;P#v+-0Z;we?zRcngN{1S)0!D8--w#PF6(k~Y*d=%EvaWtPCV9QdAv&EDu$Y8Hg znSyD~^(@q9pp;XaH{_SMgK~_y|WpYL$7VBW^1ys_ouvox1%exX>IRVH{r+K-CWYL{yBqpAuCY?aSGX z*$rM=+6)D%YNbW#B9|K6kADiy7@%=aZ1^s@OPj}C+InHI{68lwSNB;eOTKK7GKQuBF15@VT{4L&wm8Kdd>);xT}~2R1-8P$Rn+dU|CUVVO?`f; za97!66tzxM5lgs|Il^!11@IdnadSU>bw5{qLA2-G??`u?2+&aK%qA}#O4-XZ8CRns z&k$xW{tnCrXnZ7+;02%nnp{`voe8A0Y?Z-@uGe?BzKj(+xs1dg=!8dy zH(nN{!%lZ4xAT>S^ESlw-mHu*(&?FiDwPZKccDu#tGQR8Ndq+gE>zAvWjlZE{10B? zZ;SkMN0BV$+Tq@9QQWU9Fl@l;q)nPou7a0ap3jxXc|OZY+=I`ZA>*XKH;!{ZqBJAi zcaDqA{Nr!X%;?s~khm<^aWd9eIhIq&wcZ&{{wgfUTS}k)<%ck#UxiQ`%sm&m zvCBqBM=C3)hMq@yl*iwsC1+o~`Qc*!)&M?BPGFLS@pxtL;t{KWn**;O&*Do9drvzR zkvqP9H}cTG^BwCs^XvceM&{nv7e2m)w&dZhmc@Mvp6HO`5HZ#EuCK-O-m}&Iuc*`| zKl%oD*&7R6|J8`x`NpY7M2zF(Lnb?aT?pcx&!0v>XWFh)Be2_$4&f@w-bJp2-hlk` zuM3lS=Q~vuK3Bs38D!tT)7kajnTK)E79#BjhF2K**1}sye*W;|KSi9q9X)ZDWuBf?gV z=-NC6*pdOvKnr~#BQwPD_l1poi2YluaOK2G5p<5f8H9@)|MHs6bsai0<0!ZQX_KS) zOQx_6F}M7DJ4d!psgTMPC!s~0vOZ?cy<3F9+rPcJFut+FKPg^0b}MrD{Atzc!*)rB z-!w*GAf0nZPlw4M$A*f*?+R1-HlVUpGLyo}MHa9c-5^;!ZT(wF3*Y(3d2n)jaWnTv z$)a$Pv0-?TKaw5Y1&+kzQif7afy|7$TBEM8>9azwM28orCI@KT@$bx$7yKuNMTRe| zT2rva&82G=g^Q}h*y5Q8+d8_fAGT#@m9kb!D+`u# zzPv(97(O(%I5n}H!X3YR-=5pAdSg4cb?u^XGp8DdfY{Y;g@8i$6@0chonS0#m%f-T z%Cdyt4dW0nFhJuTeDH4vxR=Mp!I+qUZ05P6TQC@8pW(KvD6iC||Y4SfOAD;a9`Pd?BLkmv57TrtohZNZ>{<48g9+(n$#NS8pWD3)~p_VZS)tTU!Q-l{MYAK zAD&swee}r4s##X)&qgR^rPY-?)wZ}?6(CuMnXa-PVp4%-UDa|I z#CEzltI`|ryMj4WRVX)7DN65jw+b$WQL9jG7VGQ$3{Z6w0hu%#(kErJ5|ZGW)yXV+ z${vy_eJz_TXUK2-J86KnP^!x_U$qUS?iwUF56Uo^Vg`!!W86hbtS#{8vVw)u?u7XR3lp$sLhQP*! zsI*G3REjAh1&ca*Mp-B~h3$+K*`PB8ZB)S&5{7#Pf}vBRwAq%mR84q7UWJ+D&ScdF zZH3L+)2X_xpbx3CE|MIbRm(jdw>rx-11{R{iLCxHVWVovb#yltl!feCleWaH+fBMt zmFZd(0YgHm(lqFF@{C!Mx|CH#J8?!^(gzcQYi)nVN~wK5vOuI3u-mRz5~D$FfROz`$nACR08*Q|MUY z>xh=Kvr3J&ONCfU<}$~8ZEN}>kr5T}(&cVWX|%H{){@l!lQck4OO_gXt6@fMmURqC z=5e7oUZG3zl8@5q^^G_+sU_mbOKLss@av22nnGJiCx;&u$`ee7^;crm*_klg?#8lH z=L!UeDom-=*k~{TUBnTS{aq;6Mq%!pOskuSnsaP!<7?!*a&;H@#7s8bp3#+akasjrXB9S2+QhJ4wvZY9xlrzN$5@56noO~Uu*Z-bpLGZXeWFZBrMgfmQS#0>nLW1& z<=TuI@6&R%-6Z$hrSuw-nw^!&s5+G?)*Q}|!BmUL9fJHaCgfzoNxKu6S+qG3b9_MH zLs{gE)?tye@=j9kR!xuu((Ei-OC_i{{IG1Uup#7QF1VKbfUU^tRKlZ2>N!=jX30uk z7s^Z3Jgsuo6*W_|U6n@8%nRjVpNnZz)oehfqm1o{@_eD(Tuah!bDW_nZF40|YyM3v zH_%MbFzane)di2f7p??{|M#zsFn??jY%n7T#&h)UM-YoD=Eh7$t#s6O{W@-ST7dJ6}~tvPgc_Drd*q8 z=XbtDnxi&rttCx5 zIiXlq2y48_Ksr=RngXgbgo#Jd>NaKerJD^lYW4e*+y6|sOEaYwYw)oZx!=&vE0VJp zkzC!ZG@X>wN?S>jYk8Z6hVr665dP8`TcB=+F;9o$o*J`XP*17VpM_n}HPhKD9m+)y zPW7rIE-;M*J!)kYt3pkhpgTgbMW%^XT*hW9VvBe3stZUy-`a}xxL&#fm!Jf(*eHU( z_V%-Ua534>CiP02fz{FVWGEo5hVWj&?`J=_0sGmvkR<1Q@F4g425}>{ZHjE2_Vl+- zoqStuU=2Z~!KnvjsRu8TOiPAzVj9H4Ozo;fZ!OnrAs-0r+`8rdzL2rTxN;uVyiRT!4a2JXMrQxG&0_L)=MRWiW!Z!Xfgx64;(jf zk8FpG12pb!QkDm?+u}S8`i^(RL$rznFCYEx^>}{V(XA~}qE~3%ypmE2~9~N%Gf4zJ0Z{$k#&9lJ~=Qlp6m~?G15}5H(F0Hz4On0cf zr*~bm<#d^BS=Ks={7Z50O;o?p{=jze(`=>%%vc`7lh~6#LyHXyL zidXx+6U$4vdzXs6xD_OQIcE_`UwXI5$Ic~9=HrM-lNB~)vBK8t(0JX9TZ1sF-mLuJ za~C(PAEa>)J~NAp$y?vp!iCNgTYA;`P*9w!PXrRHTHdOLg0q3at(7b38E!p)6aT~W z!SO95>U}RBFQ%Fwz4w zZi6{4Ja`RHiz|GPF(7TJcjJ#_pp-D+~O&XwNYB^lNXPFH^CHWU{1^ zl115RhN5HBESro>t5osmbexhU5-ORBjwce7f|AoJIYmkLDU^!4?%gCg{fKjJNV0m9 ze4mn%(sG#`c<7Y)A1=G_CL>odhvEqu{xyokG#!^Er`d=~J{?uY@P{leM}`_X9hJvL z-csd0il&qt<$n9FBUfCzoH?uPGrx;FO#<{v)uA{X^r(n3F-;}ns%ch6Gt&`eEH+Iu zY&^y=i39>pMCJ4y!s8jj}PCjmW1XQE7CVRU{MBQ8|Uqk1FDF8oL!`QqljAVxL0B98q5@`TzbU zv+yP5Axfpd#z?N1j;N$c3 zwF%+>VgpaKY1g%;BTw9nHqpvMig=QeDly&)xdLCJqtfXJEsIa9B1yT5im`DvLiNAI z>{A>${*VOUapF5C^hrUT^qsrDwnf4)D&--WilUe}tC(h(Bt6Z>lI(Oe9$}|x1)E4B zUN4e}^&7z|_A%U33vZrDIRC%3VCS_4uJF;~9y!Y%ilXmT3Pv$4m&-ByiKJ>env6tv z-DRR|gr=bIVhdQlGn7(Ja>dBb^H?0OPEu7$cG9Fc(OIWot0%+4C=M|ymWnH&0Py+a zl{gl`u*783*m^3Wa+xX$4eWo4-NzzC&GqK#M=ra4NHW@=d2Vm$%}nrB&0HV zU+j~+M=fZr{7^KhP^p+$9R06?E@7B45vlle657mQ&M-12+W!pZ2P5YW-@f(qBX8nE zCn?j(AG+&;of78AYuu1z<%LOARK<6BLPn#9FpjVwnC3BQJb@&kbTYy8dx(+kQ*meB zwj?y-r0zMX5qJF%yzlu4SW7YVu!@OkOlb;M6`hZvWTxdbPCgMCOJU0O1!wlL3hvFz zM_`=pUM@E+?RU^!FKB{fkwa%GjxJhG3b3^Tp1vd zsg!bFJ9iQ0C-weG%un?G&T9`GITVvf_A>ZXJQk5gA}VH@Q6?DPJSC@9NqJ;io&^30 zOc%b_*G^itPkLnG`$LjlM<&pU(X&J=p^%>PL#JPRm`C+7 z04ePlw$Gnc_`S0SP;(RjAHtheDUO7HlwRRY){KEd#TMf-`>~H2EbjSTW5aJ&KzGWi4$I9PT--A`P|8)lySo=gux@0v;!bId!M+ANCE#}mC$?I)Olw)% zQEeK%H8u(mf*!-m80>2XXav9G1mw!YjJTu!HH!@xF46gr$_er0XLqcrWDM&~*?Cv(}b24r3Os(tp>r{>;_eVK; zd$1S~k4E9i`bvd(V0*8UY&NCfMmC%Fu7h$ip>#Lu^6P@lmhc?>EAICAI8?+m@s56{5v^dLS;cBi;LNUA8eK2~s= z&6KJm=Ug$ov|H3TKn>71$zz9l?z%g;2h?J(|42i6{XoAN;Yv-Og^6x!opxFsOlJtk zGqm71Km$&myXUUEotxE)96zQb9QXG*vZaVN0W5H>xoOI@0>M1txTM2N$RG_7^#65` z^Xf%zEd#hgZ!ZQna?=pe#4-T#OTpY{#(PqNH z!I_1JN+2)M)rOQRQe9_JW9(G38w32XnL>&&Jg^#&>IxASNPERS{UQ|V)|o|QU_WJ*`NLbQ2x;9B zUR-llLkzjVyF2AH0&_f@YK4seL=U(Ct`6+*9=B`Vi+HL%RTVg&jpMoZJ%1=j&ZDVF zwG5=?x)>GW(D{(D%>txlHDWm21t7Jz5!4{%F7q#LJ5zR2=*6jOa&z~`w+cWfJHv~k z+{OMyAhzpbG6>jm>hPY7U{wTybe+0%j_0}Ov{O;JIn(`Hg(u&0gNsvJ0z7Vfz87`t z^coO9i`VUfB}=qCff~T&d20K*IF2aW{5~C*t@Kaea!a zeCkIrBDmK{>#kTF+fwkgkZlfqltnr3{Z7qq$8zNM?v}hl~P@&Y_Q&*Ipagp<ys9j=l&rYJ=i!tqcMYs?@G zsaAj*M4rftBFp0?+$6r6ciuQOc6jv3k)>5<4m%|8=5G>{#Ji2h+#p&?&lsHrMI==Z z$(m)#lH<<02IGHc1zWM@B<`$X@pk%uD&m)R)`$w&`zj!<%>>(Q+19OpTEHEt9 zpaKIl?m_BjJumGY+>dJFfGyO)5h}o=Z4ebmnB<8DWlh`ILd$K5mXxGBG!1m{01dr? z=+)ls^v4?FzV6#i(!o5~hTyQu6lx0E6=02>bhp!zQ-tHz7G%^fr@@mvFTmC`TcQr! z*@h0lrNM$;B)8KsuUhLjHl(znMHS4A7-9HQ8~zr{Nt}eaTDVI#bi`iFbO}FmpIsNju7*D z$f03*IX7{!ccUW*Xh3F)5kH;B-z{EH9-oDtBHE0EgU=({j1T4!qs^cMJbnRbfM>>7 zqA7h`UZ_T^W~D4jdgO*VG+=;6aBZIAqwQar6J?*g8nVL<@X!TB@hwqP35jd7A!Cs$ zMa^|#jl1${%(6imo(ALxxW}&+xjp}0!p+;~)|oNpit<;C3R zjw9PQ@CsIvZUEk#mtexm>Pbr`Av8uy??Ekq_9 zyk6uOy@52@)o-$gt{8(<8jxy@3Y*q-k=mN)_@x_Qn+It~R`%74xeYgpb5ed2oPuCQ z`82#_PNqE_4<3$X-h$khS0}kMuYsMv{wA2AGw>m(K4 zg7Rtkpqe~N0a4AYtEnk4p<<)abtW1!ZHjyP4)nvVhxtjcoW{B4Pdgd!bMdhF!Ogd# z1z>x5pKT@VqiHHut#~4hY{grFn;FkGeJi?mkOqI_2`CnlMseS~RqW%JKLnQ8Gn~LS zuu|Qsl%}*+Wr1;bkphaaJa8K%9iVY8E`Vsh3%<6R1BB`nclT|g?tkreq6qKkD?(SM zs4}cFnbrIKTAQ?->aj(JDqJ|73{X2zk5jwP?w##-ay3qTOS<(AB6Jwsg=e*h+()r_ zL$^_^o3a%o6h%MmnM63s$;Bj>=&L`+#H>OOg!;_l8M>UK^Jd0gWo=a_ z(h0`kd-jz(G3VbxS{T0dT<%O2)NuPjX-8Ypk>OXXdVs_o|J$bXZh!j^@euxTakM`03Gl-t1}K6siR}?pB29S$(n=NCKC4b{?l?sI z^(Pijn;alPRBbq%_l{M$xneHLNyS2E}TA#>SWkW6%9o_ymW$Y2RC;VC&{;z z-uu<-?DMORE%snpk47O6fn`;=YS9_W8`tG?DTg&Wlk6SVxJN&=xNdTQhSbCN_Yenm z%x}AIQA9t`9$nnMgNHsKhjp3TWs0!{S25~|2IE?1luO?ac?OHQd+&VKKL7Ili^xNS z!!&_D;4x;C24kZ}X|h1pE#?zWz`8zwGr&M8L3MrlfknS$eGD!G!FaJ6&RHy4Q=R1$ zpTQ3XO34qt{F%kiOSXgpIGJXB-B8yqhmm!|xK0)6U-ME1z}*%xtLO=3$lKdJfO$Bj+z|;%@jnn4Y@Iyd?Gt@_A{# zh_j(LMLBiwz7FW&5^rX4>6LfzuJJt{@A=~5hSN?}gZGaY&#Amv+{F(quAK@SLpTPy zvk;<#qc~jAL)=-n?VaNC4=rxlbP8%aJpZ2TBM{~MFE4J~iX2HYM}W_DlxxHHx`SM4 z9lOzx=Dc5C+_UMF)cMa{$pP76*TekJaaa#|?X3{<1;G;^U5q=60FVug4=T{Lx8SzG8 ze9CW2^}eb-r7uZ-V0hjeBsz&HRS?s#VpvuA^Kq!+pEa73}e|-vPG)8b<{_w}%{c4}4cN@X_x+`XZ{@4XYgy$J%z&9Ga=f6@=quKg1G0 zNaG}5LHyEJe<;d#{6|z)oNdm{b-=gXu=1VPu6#Ga+Fn{qE;bfdLvPseMj>q&59Q zY<%vQ=u8|XD(Fn2RJKMv8rHXL%8WBb6$^seKk`d393Wv53Iwm_RsI?YrQMt>jHf`>T4*1zO2`jCk&I%qbmkz+!J42O&q641o3yC7dzzT--0dF ziU%GbYNamZ6BQabrI|u7=8S2Sgzd#Ifb9T{TkvlYj=OihAWo>qeg}@Q&sTvXv3=nr zjhmAK5TzQ?P}HJ~5{?tU2gd;#x9~Rya7I=?zKtvXewqGrFXGk}FM>P*0lDzVgzc2Y z;EU8e8BMyZ@2S?_$$?T#_gD6F+Ly%k_U2ONWy~dr$fFMs5uLiYFUK@=nu^yKO*-Jj z*PHZTei^5+0UAJLAI14@HxN~~{Xx{z9@|S_0b6K44?#doiA8PD+30XAVN8W@+sJv(ad{|G?L$5;8 z0UD1g)N>o##Xa$=s7J^D1dT;78J|P^{ldk$=|nJ@W$qY{KtLvM%__^Xid-h*%QXyM zdy*fwO0E_O4L|6-+2sxvSeYfj zv)Ma2P|6)2FP?oO{l_F$ z%wKTs*t$M`Ud_i?8kEeLa=TqJ#%g1^g`p)R+Ff4EZFu3cc-^j@w`)E|j zH#>%A3>I@wpZlz1{tDlV{G;^)*zsI2zO)Na4##-F0dk;@cC02hDKGh?P%N|N%J~{>`Dr$Ty|2xtahLtcUI`J6Zc~q z=O3R~GDy~2R;;^!eB+vjMt6?vUC9g`;6C@!U$RKB`^bp+?CaENfLdo~?A|=E?BW1m z#^IOGL;dxQOE@f^ipuAmKKao4w(29R#IrO`a-A?Dh#g+MjUqQm@8wsQ;=Xv=(%#Ld zCUTOu4+%%It2Zxg*wRhmScfDV1w$UMwJm!Vr)fNNbFR6it-BfJNqyirW!3q^%4_gs zjtw-Dd427zF?5djD<;?mo2QW8Gid;S=Yi$Qh;CKg*ZXHwZHRqE1$ zEYCfq#Qn|t&sy3rv7AIwKS%>_?BHHKYe|TLUcVc51N=7i`FT5;WM1b}wxnij!lf4Y z#dd?=auTPOd|bea_{MIL-|xp z)j3P23FiBTbHU9ycWfiLkv&R0TT{3wgC-JBRHN}3O`34~?{mRzfW{qu@@UWBX%~0N zd18|z=aVkn&~I`wX|U5wIPD6>r9K+>iMXdb7Z-xd3njOEaj0;;zLnef_9Y?AU3LMa zv(Ft{4_;(=tyyb8NwpBW)M3=Dfo6$x*IfYV254{x{vhCBZX904UFmycGxy>JqKISr zAR^fEP#NS%g6L% z(_@>~{A11U*8FhILu>9?^S(8uHNiEPt~qzj`q96RJ~#TE(a(+EG5Vg-%&2QrHG0VIE-+v<0%POP@CmaX2kdSv9)k)MrxZG@A(Hou-b_T1#=+2>b&f8`fe z-nH`TmARFkl^3tvy>jjF>%-3ue`EN8$)|=tH2lut_^^FgHoR+i)zGU$KO1^{=-A|o zLmwRKN(@7>A?px3v~y^sO6tqG_xIxI zy4^}VO}Pq8OzHAR1N5vyGAs~+L58KedMafx$wKwaInSY-XZ8Pw-T%#PNZajt+7YH) zi`y*CY@iuX%#OH(&pS0S*5>gitq}w`>!Q213*~IyLs@KwvcadZ`#kc|-x7Jcl)4!9 z_`{a0E!adzicr1NEwq_Twmaj~JL*lEorVFT@ZC;bZ(?dLn<-*9&4gMJ%lk?BY^N4C zQjvUH=awg!N-Rz76WUvj)R>BzO1hY2#FWr|O5jt{X(+d?ZmPNcbX^Pf4uDC;^Lvk2_5B-1ON70RuyoX4Px zYs`&&)}P%pvTcOL+u1qHvG+RsxLwf&$@B_I^M$_)D zv*gMm8jIO;0pZ`OOBH^5J>6=zRAmLd(Lk!Vd@2hSR@;l}xRv%8>EX3Pxu>pUJ&kbH zpv?JNk?07C8|}8->LxXt)JtXNqP1k#WViiP_<^yTpvtVWPRBi7+|XZ00%*G}oh(ZG z4XLnR-&VP7In`@IeR(Xygba2^G?XeB-KpLGEyyXQl#G)C7@=%a&QH(Yzl)JSis$Nhv?Vh09Ud@aPI@NTg6|~+J zE<`J-RJLDOJ$x$>~$T!@5%_SLHiYFw8W%xja>`Wu|7f4A1h)*;J+~ zY`n>)BPy(49ocrFVNI%)qN<8oOeZtXIDFJPK?xhFl$5T9bseg!uCSq;^D5HdhEEe> zd}=o$Nc44QOZhkQ-Np=Urm9sx<*HWQGu7Ch(}Z$etUXI5+kT5p>5-;qVjD#Mnht`G zvXoI)W0Iz_YA1;y?=}>j6zy&_idkpFK2u>=3j>!-ta4-JVh6h(T>ztaIsxi?9vSan~2fG zD79UgUDK!qS~16e3FYpJ5uo<^u8CFTQ)=3HrND-&#nJ|r2~a9JU`lOYL8{j}J{9Aw zw$lZ5tmEnC*S-Vgy#Ch!E=o&%#V%cUJ1wTPi6AR0;8C+ zMbG#;(sCsfv-%XnBviRu3#v4XKH}5?{=k{b(&r0`Ub9zQG~6cK5kuVQiKdyYgip2Z zHq5exT+`RhFsiaQW&VUfaG4COn~q_VYPV8x*}j{Fa-*-#*0RY&B`d9GT9oYt(%`Dz zoyn9ai?-G5`l`$UAE{m`bbPc@W6yR2F_}lJuwP25S8}SEYB6O<8k~XIP9Uu$&C1uI$B!xyJnP}(Y$j;F)WexbHT zQ;fQ$VT&{;b0_7y5<;=8nsp^-@#bU?l+`8`GfF;MDr;4=yCTz?O8G)gpFb$fqEfP| zV`OPvBCSzoHOaJmN~rJ6C0PaIVsdG_BjBdQ^|xe|R!UNRBI<2zRwaLVcCBNH^Ig6*k%w$yQt?$XTdZ)Qn19H0HH6i#(Ov)iW})+HN75 z3{yTu(bTP*JE=6gQBeOvNSCJz2$qpGnPAANa23f13f_)^PBWPqHJkCdeTm&Q(xC;5 z(Po2NbE;KRf)*B(!4@rxX}nImQ=4%o_X{g#zR)e$Q?qfGAwkRYbawae2>X2A zQDyZWcQb0Vdtw=dJuH-GU;&d2Y1h#RdIBbTS6L`eRVg~}1&Da3WNkVXN@2s24|OoW0{^wV!>`%gF$Czr?7)87gLLx z^i_M=rT69xi+s1C|8tdiuB%E0XF?5W+swM!LVZu(OhJX`%E&ALJ zlgyNf&j#8JPyV7a$v3kJjh0d>>=h;;PXvn5)dbt7%il6Et+cBW3uy|;TwFOR)Q@`O zbS=_JTQsp2m5NwCE0hBcj%_L}F{O-^`#Y+kC86A-h_f*j9V+_u;h08osYx&;Sr@Q( zREo06Pgkl=cV=8B2x^vD6cp32x?_1(#_roF@KGgFbW~}qg%X;!yb&D{R{Tt-n`c8a zji@5eM%(#4?6SWESEQYh(@$HmV)$-8-uRAT?xTPD-w}1oWmM9stfMIpMzi5&Ch!OH%T5ALykTI^ ztD4D9su1y?O^(EH`Q|+oZ|>b(ZyPo(bNR+4F^_~sF0U;f3c|Gg`m{6^D`X2QZjQqJ z(_k?-SG;pSw?v7jn#~M3$nEN%gi4#B-)2OHFSFz{x3hnm>)6B64xOsjHQA0T4s%R6?w8?qV1UL&6d&VX)OT`s$;5Nq zqjJJ9A~>P3Zkxc;CL9C2RfQP9YF zJsZqgb#xg>GkIenlk?%E(Em>bnN1Iyiwxek&y90<5 z=0&{XAUF=tkUxRO3)MW(mLEGP%6R;eB{94TkAWACN8##Co~)hXV<4ZH{MZRx6N^lt z577B;%g0BBD3NU$S~bNTb}a$8ZaEDQ8utn=ps%~cFK+RWUg5z_NUtc`8k>@BmP2)q z#$mD=Gu*vlv?1$38wP0Hz3(yMqUl&{3->LL$nhmFIO5&r1h|PiEA<%|-;BdMQ}Cs9 zwkYAa-v^EZG>%GX@EZIBWLEr$PweNf`N0ut#e+6S zMoFEN;Z8eHjoYvq{#!Gv|FWGc21IcW2Z@@!t*>SoybA|S^|VIcZFwuWaOt)G`5>en zAaM^K{?-BR(vZk27AAB4tp1#jh0XCS9WA6ixUfpvH9RjkXDu%!nZJBn^6hFa?@o?8^%wja5I6&5N-I(;&$$p%a#Q6zjarT z9^`>dNDl&2tYM&4#auSyOSpW#p56d7^$OUI0U9@Vu32!GfAk7*svkeJv}fb2n6u## z0Fa+P?3B#%57sHkE`aSG+lNjd-%5L;`J7$ebkx)_m0r(Du30*byEU>j1vlW6DF`O^ zoa9USMnn{UOALL1sXN^tBOE_sono=l(7750Wr2GS1(xX;lzxyxDd;`(coh>}YW@(% z7@=P;059_XOX&>dOvKyvY8nps!1U}gJSq~nA6`!4s8*?$&1*Y%XF?pON0Z=(=Dxk( z+-f;zXKaR`Qnw+aq^_HM8D7L_gy2|?1U@01I&ek zW{;z{YD{ro&SE^4lemblE%*;?&57;3I8UZG4{1Vf|Fo>#5ohgQq(bV(t4&Jiz#H?B zaDawrBa+;&=PbX4dnGTjoh*{6!{eF|ttn`e);JrD>*M}vHr23`F+NlT*8vh&i2-N2 z=Pmzev9F+|zA4oaoc#BXJ`JDm;o%(;9ghip0iKuLbI0W97m{=;Zt<&Q1%*t3Y$oZv zHO{|n?42Aa<>n5K9-RN?+>+@2`KNzFf8fDN2EoaLRStN;1*YRI7`zHw&7@9qpS}(o zhQVTj9)8~SOMo+u%pKzcsYy7cvDqmwS*dxZ7O}?MQaN|)4Ul7?6#k=D)BJ`T`R6Wa zp)7Z>!EZ_VRFMEg=hHkwO}|v;^y`N0?hh8 zaS|1-TRLNOY~9p~lH|-4T=>fK&p3-6x^C^}$@OD@9s4D2rSBPg&scO!2jtMvp>M2t zdCd=oY+SW`J)Iv~Kl1p{r$#s^-wXRl!vk zt=hTrpDUkR`E|*USAJr0-^y!OrdL{4Ua)dv__g8x9RA|)?Za*4qhB1}KYaS|ilN^~ z9+KQ4=}In>9309{{$}zUlb@QrZZbP*JFMP5v}>4u}(UN9sag4I1MAMCc=tC1wCR) z?VTN85I)=vc@22pwZj|Nj2irlYL1pP$#2bFXTS_`)bL(*wfM(hd}Wr|{yjqWF=1p2 z3kQ%!SLZ_TtP27-GTR>&KFo%*DP*C|;XO2;vFk!zxIJf1KPY?{_XcnSHij?|yeqJe zMw1F_z9v#b0dNc0Auw`*XDvBL)+OES<*Bn6V~`BlkeA2g*5EBzjqY+$YqkhK#*g?` z+q>a_5ADONF(Q^H+#=Op@WC_Op9yti7_J;04(MB(4)v*Cy9~L7A-tWB3+{#jX4&{1 zeX7niE5rD<;CbD0bmJL(f*#{|vNI4a!0{YT;*dHU!dRPWJD5yO3RK=d89juL>kOF? zf~oD^m~8uPA~n=a;{h6h$OSmAds6_(w$qbYfr>teb?gNP`f-+zzV@+T-`%{Kkdf*a z*^!}cEFX0o&YHW>>%!It`cxVv2r_p92^>9_4`ubT^}iIU@CZl3x=;t%m681~41Dig zXXHA8+D1S+#PZ|z%GGgro}u8)QjcOIGUkn9g#)-_WSp-mxvSlDpE zg<8D6`{*#*C6NigrJej7L5e|4)D9l>vDMeN#s$?2ftv$@!ePDZNcUdUvzpw{hjtCm z_NEgBb;IoRBNYl{hoV99+(=KkFxe<{aT-qYNE@h^;{VWJUu)fq!iS+BzOLOEE;tIv z`pl~?hHQ16P?5aP$fp}bWO)`1!mM(@T8u3T)C}4Wlaf`lVXqlNU<-)OSrrw?X{4v7 z?RZDGXOZlXhIYdXd88;(F>o@wE{#^3Aq0H+1OCjKo?=2ka7FIsEc()m?A%7AV8oml zT19^AL+);V>bknKb{&`igB^34K5d&w#)P2}zn*bqEqNfcOC3f-Vd!>&%Gz}Xn45SS zwv9oL!5A6x>tF3tX(*)^>gP2>-`)98z+c!rAyAnxYzIEv3iB@i+4yYE9?(m-z0fDa zEI{+qNTFTery+ivUMMyoo2MuOu?>o;Bt{(C3Gf_c<%-S zf7U_kVWxeE+eoov7YeM?h{kA#Py*M6EC!;58jK{-r}A+UUF0064O!Sz%r#44^!EaF z7R!eN#s{W0tLL>FZE_UW-A%~oCO$GBdVy2{SX_JzvMEX@|4pFELIFLC)SBoIe%_>H zaAqkC|3IW7Xa$PN=Z%EL^YUpkW73hc1uE;H!x?*FmPZ3{KzHqEK|D8czd&Z3@T!41 zf`1ICMqeA#idrK~HaK{6UA%plhM_rpO{Xr^oiGZ&XbVL5e}%3eoq#mxd$ z8p6msXfse6FwnCF-k7-aqrw=wqz=IM+i4d+C9$&kU?!k?8S%$FD|;7aNr$}iw7Crd zSc!p9(Fm-HP+4dW1`#HkkK5Svx)8fttZ@(0|C@-sM*cACijt^Q#{hseDod zM*y)Y0mO)vP$_gEMm>&B1@tsJ6oxCiK`&CBUJIge z@>pnLgbHSa7n#|O?-Zy|am+K!6{OqX=f5NEz#eCG4HmkaHxF#9xc0}R>lZY2FuQVM1(G^La-bm6sqbfFX%DC>jL*zU&T{XV0)*N$(~KYsiJ z%(*@~Gjrz5%$ajOMc;`jsyESLv3Wb8V1$C8UxIJsa$@zZ@zjcgy7+&D^< zgmP~7r*w-%4pjj2fD!KeoA=~bnk6bIX#w+q1%dMiCLiay!j?}`>V9x;y-|I{Y^*>i|L^o05Y@azFR1)_=EJv z&@EW$aeCmP8jJ@Js7KeW5)~E+HCC`rQKlDlRtj{$#1+y>51R&#nAo3ip4%U9Vi&;~ z$*t~vO8R4%GMpfXt>g5N>$L>&g)_5BGF$++!D0bE3+4hp+(}zYkN3o-zXjEZBO-QW z3l2?17)+dBR!c_+ObymJx&`}{#(}}F@vg!ix)kni)gLDPQ+NJOC0z>W38ID5B8+|p zS!y)7%{_if=U9hD3?mS1<7CErur)$iuxWU5C;yF!0P|1`s-cxQG@`HY_8Y`FX_=)VceG(O0s+AA##~vBMBIqE=U@zJ{Ad|8G!1@?rjnOmg zBRHiA%ifo%?%@awTPV{xu|hBCDSq87qvDu>DZr?~eC8oIOb725d*lOji=KL5a%o0l z^Mer#Ej{QjeVe@mpkmaPHJ7g5x3Y<%wtk07I~vMXv+>5HO7{&m1P`z zzYLBF8mYYU*A6n)c2fVc?0mZYE8wV~xaUG}WVpPewXv37s3(2-SkN;XOA6$hUxP0~ z(M*mQUxmAU>oqH72f_KrmJ#vLv9o)U+F-qbh?Qz93s15WnbhS&a7`$i$-y_sz~sA! zj)hb`A)ndlcR*sm2OuMOxl3#uWG0TcpGIc@r!b!_lkFAzM`u4qnVCvS_j_sgM9UVr3Idw*x zgPsw-T#CC>ntq2yN7HQ45oI&Wvwiqp1c|S6En55aH5(8(eDd<$OU1>Pke?6gG&FFy zOAZ_k^SCR*Twuvz4-I8u1+m<$ZK7H-y^;L-o5zrfd%{m95B&OE#OL1htz+xA;7SAa z_t3L2tQ{;F?t?gIaE!^1zeSmx@Dnm|_YZeZ-tzvt1r@pG!DBs}ab&=q2aC3!$A*lZ zFONgpV3yqV5Mq2e@wgaYJgfifr@-j=y&Tj0iEkZSNj~z>u~nOKYACSPNzab99Li+l zNa!SAc<9)!4JRU!cfYdlOoR%5M70_Fq&HyYu&d?qXV@L-r9I9uh4|Vd$JTE+(HCTD zyuF!>{_1=!+5YIi4-b>jVJts?3=0aWb`*TT(NP;VFY&S2N6V#|KjMs-4+d@VZo=%VZpvfS0JMK z9AtoPG%Iu%upiWNH1C7d3ex1kTOLN)EAKZK1_Y1Nl-&}x-G^EH~)p>B+O5Qvw8>r4oTK^^$^}OCp^H_({2t?V)~J~e*_@2MD-k=FF*h6v7U8G z8aWdE2SpcqXB&C%S-A(N`~p3|zDnV**uL6wCesei9PJ+-^_pzvScb7I{{jm^K_dsA zq&1%JtZXGe{)M~{-u@*UlX>_ni`pt=MUSW%(q%+n6J?{RkUO=4pgTU5!mRv`?EK9O zXR^8q2Y)5A|K5KeJ8c^U!eY85G?3ORy27J%k27Vdw{Cw9unwPm9^F?`i0aytu%ZxV zF!|2&$1YXT*LDhj#a`Qeg^^g^H#$)F+6?|Q(o7-ZuC)tVN#&{U(=1CAQ5btpKIz>4 zYu4NTISojb^!XxZQ*&Iq=+$sO;PyOqY~!g0wLz~xZc{NUz9UoDg;3hA2W; z7I{<7S_lMlhVikEl;pABf}w&$rp~?c^ap=;OfJ80(epHdePwnLV!)TJ9$ozB)#25q z)n~6>zv`c>URw3zRrjy@+^VbB>Q@z31y)_Wc>CgeR_$7RU{&|x*j%LgVAto?eq-eY zD?f-h^}nq6-Qo|gcyh(z6}PVV@QU~f*9u|9_7zK(zq$OE%O6|*rNv8@-?Y58{PN}2 z<$cRHF8klLS1o%*_2#nuKUwy`vd=I3*s{{H&|-esCChd#>souq(%GedSi5rR(~Ez- z^czd>=;~TJu{68Xzx0B|uH)j`|KF0^mi)(()DrI!{gPAH&MsNm^^)orsz+6Kt8P@) zR97rMih69%c0b&Gu>1P%N_V8&)O}8OugcbS^~%q56}p05mvrqir}qb}VIMcx5DO(k zI^N0@Sg;?G;;e1EzL{`pO@#r2Mr5IZX@9HWNtas2k}HfbZQVK+V2e_2J2x%iROa;m zZ*Kcfz%K2NnXFtX?J?_onW#G-U$>_d6_ob-#>e;(r_Si$^yPrDu#Ux|p*<*Yrl{TJ zPqgedA+z%?>3es`!FdK##qf|{V~PviEN(X4?{C2z*xQL*dw(@t*A9GXG5Z6DCt(pv zRkhA%9QT!7g;1sw;FLC%bOy26uhwZBquFF6L+5;##muGM zLDx`5mrD%|)IIH5W_W^qZyrD#Z=zZrON<&!c^B_~a^?O`cv;$76uka;SQB=+M>X8= zFQxA_)|^<^>th;y+2Yq497|JQO!u+3zB--4q@)A>mI9H%FtZKPWXviyG8S)#wsJI}_BJ zSf!w}*D)rBhg#Zr**cWlU(TM#g4)uk0+r`;zzXn>1kz(ceg_NCOnd6llF;U>wnj5C z?#pqfOMEN>s2RFm>Z)ZY!BBiM4D(KzSLQaSej5o^zJ-JOcZjo_uD_GptwcDwh>}wVbWh z436|?`+QRKkXuu5H$w)Sx*Urb&R#BYF*>Zgw>oSth$EbfPn~UI?E{gZMjX_*_Um)W zCO2G(E_smg8L(J<(Ms0l9xeTO3;b>zxo^lDJu`}B&ZZPfAB}RCs z5XrWp$%a0_saQ5i+F2hk@Bwwxo_7Ycm6k!nf=koRO3=YuMrs*NJ*-KlG6IVYPdm%? zF)mZ|8SRb~++g|hS*Ul~nTyoKcG{rUCDhJJGQW8b>y~qWP;2CZV#cEzaPY(aO+RMC zenTuc2B9uHMCyKes|hCR(9t$J}VI%>Ol^L1AP@udIWgzr>CTL z3&0+;B~8Pw4RFIl=}q5|+I1zHnBhtY5FHq3n)9kpu#P#(PEW&7%azCVQLjF+K^g}~ zZpRts+HDPIg%i{xm2$Ee4lg(sVmo9?U7OOEXgL>f@!0uwvG4_ z`Z({a2`FE<)~ulrzcQqWd+ z1%|al!ty@G(Gtn%Q7W+ggfh zz5ZmnmOr=7BrwOU$#APWnlIi2spuDG`rKb<9!ph~#V5M7x; zO+9LL8VqOtj(u*5_)Y!ERC_Gy2v(!fE|LAHX(S6L=crIZ(zqw>)o!pzpSy z*^21Or#MOxnfI~U-=~a17p^1 z<{H^r$uepjtr!f;q`l3UvHH33vR4d+{4PT?vuUgJJrcjTh$#*{wlP;*NN;83D$_=5 z3+B7puLav`Cql!_%k@3VE?zvz6*@0i= zo3#h?<65Dbi6#6ap+Tcxw=TziKd2A5Edv43nH&b*LTk@@%S}5FaRV7RwN~{#GW%P`;Tp zI%7q*K4DQ?V!PjBKQ@#c$ch1>-p~|A%?+W@b-(m^IBU_{ssqFJfiX>`V3&5+A!7m_ znP8(en)d7BN!{XmBsNA5FOC|8@P4k4H&#YcmU|_FXf+8=x5?xfiuibKe9H%{~k*MbG0} zeoNwBIix;EraCkzJ3Z`00oV_+c+6_=qcRFU!Rh1 zm1|$ZtSTXaGPj_5D5n8hTw=NFvc!{&2yh;q_yxdDnJFJ_`5Cdi!nhrI1Kboe^6XJ<2iSWXS^uVdiPpS@z+8yuLy$7#C=NQ+!y~*GRa-LZLCIbA z@wX8Bx`0BC+;=7Q8~~r`)wg6%&ziTv4Kv~eH|B$A2CDgdDCrm!a(rB)XVP8qHn=UI zkez>rr=Szq{rKCmY*X(bLb*u+imq6F)5=ExsYQXPo0B`$7wl6}pCLv2Wj_!0!EyjN6!^bd9N*dt=nwtSw-pSt`gVTh%iYUM@o1NxZzGCB=<3fD2s0*f2 z9ajg+oy>rfl13)JdN%wU<^x+N56w_cP@Q>PU!%30(4)SQEi&piXiFxZ$+Y#am>LBQ z=pU=*aZ5H#j{g;JAwBl8yW|t{jl}RseAMAW9CAlf-uN3tQPN1|ffW!1*g=y6e?R6_ z^+ZO}`e82WO$+vfwrVd)6ZyzL@aqa1iEae8I7R85-2TsFm#HWKL>TJI^g-(bmdRK; ztJjv={cWFy331bV2sU0wB0V!eSdxKsC*OIG_JO{VHaTr;*gINHn~Pp)IQPB}F%&fN zEO!B{2GD>ekG@Ywlg6MA&n=r~A~Rwb2-$UZKAJA3rKSCqcfm+OLX5KiVzT@%vYj~l z*jym-R{B(^M#-DX^6Qs=d+{5ptu&ArHRdRYMruw8hE3^GO0*S&1Aga7d$6siPcgka zb?2$|sK0ZZi(By_;Wod7S)k=$?p94pq5I!kJl#pBNP<0csJ6vwASTxB$czO%K!8IL zt|imEx)sepzxZFtms(viEqRacSUP>`$@YnR5*QZ-CRaAvogN|YD`|@&S5z0-tI?ZF zr`L5WNJLc^PQU%pFK;3CWz!PiM|L@c!#i0V!m)QULC_|2g1s5nHPW?gxosfVteoDp zPT5QjTGRGP)vD=;YMrkw7_5zuKb{?nTe3NhG{RumYpJk={Rd~E|5LdhvuDzkJUhdmn*n*HWNB~__&{Y=S; zVIxFT(8$Cd{~41&Je2*Vk8NV&QH)e3p0O0*IL=!rSSlHSAJ|f?!)rH#n}SBTC!ah1 zon>^hEaa_Qz!pZ7qNTENv?fHp!Z+3RR5oAplz^Vw8ON8lfUSZ?3pL{jivrqMx5|qz zwGA9`j+sYGt*3E0701PR)8F!YJba9Cd~h2$DrjWtCZLAx>qUmw=IyeK7wlj%Qn*wm zW7$zNpir}6C}eTDjU%IYu%L5&!wzs%(1`Irw|8Fcw~;q?$Q;+60*;s(3YW^J#&2|F z>by5H6m?}w$qJWX9QT|8jtUw%-~$HDJj%;=PLaDl^?~Wm_Q{}qA3=f-&64bFpHbD0 ziF+DzCcZeHDcV~8k~QKBMp}3o@5ukjozSd>B*LwTcW?xEkU#H~P00GwnE3TM@kerQ zhexmo2~-=dsY7i^`QxWeBbPuyBNJaJ?Y{j{An-nQnk@OBPG>`0n;T+hJrOL5cx=?0 zoXLT(P8wqE8Q`d-k)zMwbLQk#AW8P&;a#wqczLLz!|b?FuMgHkK}|eZji*9kRL<;l zc=c|o0t-px$Xm~!NpAV-JDW*iw=CZ$&IChjP82ScG0Y_f`vuWo@>|VZNzWO`K_@ie z_h(LT=vI(WUS*V3+_?BGSpoK)js8MOE8xd=h=`6$Hn`wmsvmxM!%#z7>_^VVlq{r? z`&3^!2WgzIZ6dwr$PBgTG65-AD$^*J*i4jt>2OX{6snpc&w70Ax#+QiM7SSzV|CsH zbko<*mFM`R^O%I?ISHM9yV}hewPS6wBcoIM@w!Bn{_^v{Q9&cm9{MhhiuRf9JVI#_+2nYkYSTl{p!-X^;iXA#0 zhxJa4EaSRcrHof`&w>R6se04)1k3@K(@h2?va~?$3Zu z)yXPxKo4nQWX8dfjjFM~)9_rm`i##Uim1 zS9EC8shGj7*X5abH(Uhq6f~kDw@P=B*DsRATYCu;j{>GL@kX1xIfhEs>6{@6Pmxwy z_IoaY$|`7NLin?EA9>;ud1j_Ag~}qUmjhtxO)DQ;{y)o3#yj>L#IJMW&^%zOemH55 zaGBhQE0xm5l7qx=h9=x5n|{c zJcU4ktAbzIMv8WMfIsPABF=-S+9L%sVzK+nnu30~kdhd_=ztkqNFqm#{QM1SJ-Mu3 z7PB*w87CV_ilQo=!S(LJm=GT2O%;Dgmo6e%kjnZ1>~?p1A&ne8+67bc-p{0Bnwwqn zm|ie|A#hI|qG+nj1QcUqh^Ez6V&06$9FK-jdx^5WVE}9uG(e|c54Hyp4)ex<%yF#; zLx8=CqNz$Z=uE~HbX9Ve%xFvO@6R%Zdpuy+Tu367N-xIrw(kL#+9NB{lov|7LB95s zmS2aOBQL8qP^aE|)XW|NkgBvkil)52RjS6yBPoqRmw-FwHi&NU(__E_5{`pd9hZFu z2IdaGJkE~|vatZHsx%f2-(aT1bL~-c+C1DEb|LJGGF&@^OD~<|`e5>wJIW}uv3=Xjs+}8U z&{X6-aSWXIX+0R;V8#5Hl3JCrXooR+x48xG@w(FeTWcyntw*~FOh$N+^a~It&UV? zx_9FVzc{{n%gMQE)B-^+4)TRs=n;oFcVreJtpTZGj8Ql@y?)b)KOs|(TtNjIQ<1HO z>65lZkU@i4LnwJa(i4$6iBNi^3FJCTcp9pR&wD&h{3(Db9CBfqX=Q|@ zKOKep9pyqq8^Zdi#oAYeu~m?W>YjTpAxEpSW9CmaEWm+@LmMENbQ&rNQ9UY@n`>sR zCZsFC(My@>>X6K$ps}h92xf#ut;^ftBMq>`_D_*cnRuQ7q#kh5u*ukt00P_!rygZ_ zQWNqiXk_A7`z7yDz9|cNOA8$PCk|1xQ|2)bIRQh;r)q?g45^Uc9EXq!8aZGF9)lcl zxrJ={u*_C}CF?syK4pFH_eOmM-Wx62>iTHKos`&Ke(^a3cUji{W9@xwQ)_pu`L8uMtTCPRkCVQ6Qs$&nR{wJK4XZC(HM{ETt75CRto-T9 zYbZdHX$iUci|_9|ix>B5V{u(7nh^R7F!TcpyRjjjRQ+iFb6|<+;##3EDT)bj7eokU z5cJ zsZ^&?(RrV~gJI$H$wUm?Qi85e z%>!bDv(P2Ipu@jf(AyCgyZ2p@VJX z3l57>Sf6)uSmC!@MlG8WUu z1huLz2@XAnatR!?FwP}7OsH1ZXGrQ3eQ`0K(CT9dXwoFf)W;yW!0+V~F+OP!F(WY@ zdKpg|`tWlxs2avQ7Eie}Av1;d80=G97(+epvn(Q+O255^Wisht^aeZ7I zNMkxqEozd6#e3QJyYW3j9upe9pzez&HJC>porLQl*(b!oJB|tB6NbC)0{7D>cdbUv z>*FabGTf~(p($-&Oh*Sk$!mCnCaP8QiAA4c+|R`K0?+XPIMerWIyy2UT}Cmjz7Ipd zX~no;NU3#;fVzAg`pWI)4KX1uCbWGCbfHg-CiHzVZG!I;w45dui)(c16u;<>`M&a6 zC|^t+?@JiyLP}vt#dwU32BV(jVtiCJ! zkbO=LjSJEEVv{V5dT*5H zp>|rx5QR|^V^q7;Ni6G>A(coaMf^{4(Jk}e>(u&aQp0O8`IsLp4nvDTnk=$ zp-+>dGpdfk(C|r3AD860gc@rFX0TiO*1+ktSTiDqSbz)~E#}jp;ri6txHg4lk%;QJ z-p;qDpB_tcoCZRocVNruQcx5Pw9$}&MbsO32)#~P5{A77pzS52g1(Q}V9|>jJ>M7Q zG|4_qG_KL$QCFLcCKrEj?sHMc8H6~e?b9Y;Qn27teR?=E`V1lpdO{_Do0V8}^W5iL zG^vXsS_#ulr$(p73W_GgKCK?lurcTyDs?W_u+MiJ_Nt=^q_5C5!3i)Y1`ReAy@)?d zXktkXR;ic}7m;TR&_Z6nH-;FbxL&~Wg;NSzC1{}I2}2)`4MArR!~~~JE#5B4qTh>% zM4guIRY^eyQ=yN;JY$*m#dS%ZhdtmlYQv)I*yp?Sd)1f&UPxjR^)VPZYE)nm#XcTO zQwvLxKv7eodinogoppOt&^*0bo$6DkFx+A+sm0=lP=Y3=i;FQq8x=K+J|>Bx+Y57; zG#D_|G3;KD95y9tfP$f{1U9cklABCf*luEcT;G=x)EEo_;MXxd7IQ+M5)#l0 z7)+gNmVJJiZm+0=rPuM;)?(xHv ztz|nKC^2`Izt|qz^!*7iA-$71F)|NXtcjf z$lipFSL1+-6XeNrr>HS!q~R4}{hmTS(2t`eId}ug45hDzhekmHf(|W)0WW z;uo?*o<`f&mPLQEof1-m?z~PqHvaKC9B`GiZ)ZI$cQs2$vHzV!-EYs+&4G z%P6dP^Yr>|1&O*&DXb(g3~!bPaq5$B89_hU^Cor8Z^6USoPJ`qc0p=3{T}U@Zd@0R zyE4{6pSy|hliT3u{Nw@XlY)dCj-~LS8)93?{~VBi3S-gHr!(gC$=I% zhM{2uJy4GETj4oX(ol6;eF^#Qt@6me^l8S80v9sz`nBeW8T+v#gAFp@25=#`?dn!E zQ_RB7TfsJR+ifzl2XAMidfMFOu;Q>r>-L=1XRkXVRd462w27=H)9bnxl1R_PUy_~+ zazyUxC++}0%s7Q9WO~$JZWZe(jjmm>nDqe%ijz|{df^VJ`a%-f8Ax>;kR8x9+`c{| zGmU)~J;nmxi5|0S(jd|tfLEw7jAguW^{_?Kqi=o|`mUs5iGSlv@|_(=HJFmZ#=SveESQs1)91G%88&L_HOhTf`Ycs zziOU5ap*jZ1RLI-3Od4-wCvTj52m1>yIFdOsli%34il zh4+#_ehvH-B=YRR58;yhSJW@F+#`=-@(|O2v*zZ-lGN4oyrYnCWg5Xyng$Yf%;zE6 z=Y=#HNXSBp9y~nVBk7dx>ug?*!!JyFwQZD;NZWm-7+)Xic&<^j`0KDj=7lu!?z^XU zobKDn8()_@z4l%v<2-a>D4+3}I9JtNO6mUc;4*wPAo%%=aj@pmq{fnz<3`ebKSo1A zBL{@vb=(@jQ@vjn{!`y#qan`CSiqSY&GJK@A-gZ)Z6#Z2%5f`s{ae#(yA?DNeM;;+ z4L}DTkY!9g2##=03*g9tj1c#v9^oyuxKZ$C)Wx!%eDooBnw8DO->f+&7e72btm?_N zEHyRfE9EpguP-b#lO*>D{zTbKjubxWnSA?^X_N^MO&kKi;m1{-qMNkxV1-YlOJ;*P z?MU17)MdMwJo?~tcejFuIsIrS%m^;_$?4^i-dP^P(nw4kQll5F(wp6_fdeVfHV>zU z8@k~D@jW)Zd)>dZ0vf?R`HRP<9V$8q=g$oS4iCO0Uvul@1#K>F8c7rV^9+C6>CUp!^CNIr!rJ z9sK64KlfByq;RM5!LsSPkLkKu%S(GTV2wC_jY zh$U|TN47w7_R%OORC4W5Fa%j5uU!RpF-}(!T1k}npcd+tk)V6lI zpw%^kl|rjTD$n5boBajYEu`T5IEB%rx!yncg*;zx{SpHK=`3K!HfdlK(mV=bpcNeF zt0h#|rPFoMufT61i5$878`ujd3i{`MC5yMtJhPM>{cpTKV_T)T1dM6k7I4RSlVGT4 z66t6TAk`hNYoEhvQqsu5UtDz&$v-Ev{KT)BN}1+VDpMH=7llEW#+OoCtA!xYTd9mM z{2G&`ppnY2)-WJ><8Ne!@!x_WocI)zfI0DbZ5z;&PHVu{@D$U|VGT7OySf$46sDc3 z=WWYa1k$G8$)k9|^WX^cF^@^$Q3om(zG#n!?4qb0tRgss8l;<^r&ooAG&1#kkAzqK z`tvf!wJ(4p?qL*{fUWfbcW5Za3xlYj!VeGl$8edY9QVBdjtUy#uEk7u!0sP^VNOH; z01d5DiyFZz)8z730Hk46Rp~waLmeoML-U{n77>Y5;z+m=2Fzd4G$!fjfhi2If<~gh z(qK^D`&s9-zJ*Lr$!m7wOYCsvo;zF_Qm9%QRS(r7txU#%2iMNDC0~MSEhHgqYzbA> z?`*mKC+{vLPro$%4|W24^<_3J6q%FR5vaq_txJHKCfd`c-gK(n$2S-(N(sugcsys{g6i z*iDz>5-mO8wHK1K7Nyw1JU!QtXZ13z!BQ-nA3ijE0h=z>VQV| z_)IP2!!nK^e+wKHG{AfO4o;0fZzr$4B{PJ{UrN@!-3j43WCvGi10C-VjBxRIKH#eb z)d7oSNUnGrT=ffSMD_Pib>fc@GWWLJ^Qm{BueC*8=d2l7{qdC#EPo05YF5=IcV70P zD^%2p5}MPifdt(3flAZuE9r_OWAr_~mt6nu^oF$y2;}JfD(T+y=DYIGtUU%T#X<{$ z8x!2zZfi}V*m4+$EDoP0NLjpQRH{#N2*9&@_#g zEZ)Il6BX4d!{vX4k}7Gmx;zdN4}4`SN&i(g1vmVS^_gbrus$1YrThq&AC8UWkg#o( z_UPaJ4I(Zi5&v_*Sby={Csq*kJ^0a!{x0`>-#?g~^VvE`xU0DUN?Ng$qh2+hawSdu z2Q)xIBNL|pF>F5QsP~`p{Ak`|3&1zG07j$5ChBRLGja8(%j`!;bEo?se-CUGG#1kQ za~gE?>U*-FC%q4jzKKI#aAaYT)~p|u42#i$SXN^VC+aAfLI?Ci?@w>&T1WzL5RrTx z-+o_aIQ4(f)c0A?kz-{UK}TO){If;x)BDe#XuZ-yd*;SjPIjn%a_bZ84({@I@7tV&_o_~St%8=m6i}Us(l$(JC%nM_KxK<2#ZlP z)8qgb@)BkMfmRs}BnLUiu-Ir1nt|^dCs(b+pD3Hj!5;-3CP|C&=KQ=hh-!-!V zIWG%Hpj_WS`9Rmqw^WEBv2p;0Edsl^0L(xEc)SRAakt6Dx|!2AoQOKvJ=AxLirjb& z;)+h5iz@=8w|jgL__S`YL*$N~0>nB|Dt;Y;&Tm{l)4kzDA50#+@Mi~9$d=K z5Me`ZM6$$rU{wO$(G8T~ph(^xo7wU~ypqk&!U;bmFXkFDuG&r4%&a6AZkk!W*^XF_ zA__7CAshJD?J!SaM^TlSGCfT^z6=V$$4>Am*|}tm6jpThmYH>1fCCM5P2ipKVPJH6 z@?Z!|cw3(7esasq`i&?2gs4B?mZjUVZ3e+Rh?4REr94bQvMGkI9SCmYrXpiBvJH$* z_{rqY&;7xtpu>sjRXexLg{v^01!t+65@=U#f}E=6u9Fw7$vFymxohJIi9}@>V1u=T28ppZ z7(^H`5VZ&3+sLOiGg2V? zL)sZyP~}h@Mwvwg`E8h@igRR8RGUk{3}Fmc>1Nh6@Tben>I$l=~ zjiveecza~HKbi_RBsq^N|UC3+cH~9!l*+=r}GZ`_OU5F*`gI%Z`qs zSZ*WK5(8Q$=d~Asp@Kw??EBnB*Go3pMi#dM?ca)7wEb<+tvz3azohx_@ z{lloM3glTy_#2JbN*9uFw)il{nBIHeG|Gd4!+Ph~M>EdYIXyHu7|99c`f!0Ca5S^y z0thh!a?P@`=x;v+vUEPXi zr0VrxJ0tB#xBGD#8&=TB&Zmtu#t@<9GyWMVgBAzrrDWR>PI*|YG|h}1(VLAJ0u8I< zjzoSq9n9xDcDa|NhM)xs8WgmNdxY7xjXXUhuh!QCY`$ok8PhBGm@eoQ^g+O4Xw6>E zE$P(-L2y*i$kdJ25y)!5e@)IF&MBl4(eb1@g^#UI?)yK=OSlZdrGfiDLjJ_*r zWWw{Q-Q=oQ;KL{n%Pc=N0+#4D%{61)ZWP9yW8zp`6ZItPev=<=4|-&NX#_$lXr!|2 zk~3~U=OH-b!!pBkgspR$Y{u55PAvNdIB&aQRg3;mBS`#Pu+ATffS-ayxaVG$f(*8P zNFK%uFJ}^t&PiCvHVi0dq_wx~0Oz&_rB2^?IXEh4fHA&Kx{$wlxh!JW9*BrxEYF#a zXgpqRiiLQ@n$bBL#TM)Go;_fwAd!j4BlJCHdOJC~XGU_8Oznjg#m$*|dXTUSU*skz ztaNjxqx+FL*((;GGsLIMW4W>B$QY-Stmw^A{FH)5jKfQJA>8=y+sL1z@@TA&GZmmI zW=#DDeOlWfpRt%z#(<$=GD+KWJdVvzLBsZpWKMdQM8UI}Zt3CSl>{s)P9#^(S$a#; zqls(lLEDh4G}*gqpkps*aB$28QTKvxhkTvjbg~B(={51F=je;Z2^KRXyoVtG(^h>ypp#J0;on zO_gD5|3Q<^`d3F+UbpLPL$2u`p=rHHSY9Li?3-Xy(Q?dn?CO7}|XsV`QYyD8sXW8%|vF(&?KtctKv zc&v18zZo#2IpVz%vM8HLWnA^H2s#iF5)fmME8--pDb)fY|a5- z3VdY7-oZybG@toZG#LjB>T-ItFsunhJd)jbp@wC?kVK-I&r5E+OY5@Y>}$+?U~}i5 zv#5X3+CyvBulm-?ZOczz$}PSS>hqod<4?c3^yn^J)2`Usx4RbwKu{+ERky~|8WagZ z<&rci_VkaF=v%lY|L&tRYc`(nlgV3NDSsx7ok54{beLJG<~(CnLZ+Z%u(2E#KpotR2Zv5c)=xB=H|cyU_p z04ho#+Xm%`P|m_Vj*2HZ6(7R&?H+ux@r0j{BTtX>4HdE!GV^7CvkPIlZpGqM?VYVs&%fRd6Z2-g|;w{c_7g*VEy0M zm|1o@-1W!Zwom*$Ri)iz^tLag|Bav&()8V{P`5@o9Ro+T_Z|fNT!)xXY|4>a6F7O#|IuRTj$@sl^ zd#4POx8ba=pdk+y$TFmq0^e@cx^@P$~vn~uL4K{7U>UZ_SmAwwqG`|38 z6f|;_`!=>AT)uC=@b(RpT|a)27FF0ZyNtYi*USzYxpJ81EV9FLGZiywg@VCU%qKkF zND2jLDPIEtUj+?2I|@d2Zr_B+*Sg27R8lk5bx7}Ihoi$C)?4?oilPpXT(HOf6NS#QuYI*vpfO|yxiDcE@?q3+9& za3P5tynmncZc4r^5A>s7Vf<)b8tZYvn+Cp>HD@bjd?9zr%U0w`UxkGKLYlbw{WHlI zUlBKv!dK-bdGpsgzJkN+=Opyl%|a0Mfh|5kFq8$-^9u~&3txkP3n}O@z`X8z^6@R? zl6z#$!s%lvNgskHxF!zM#55-5z*t};BiJK+Z7i3I$IS`a?Ool9W^(kIlchkD4Tog` zwO>b<-4ln`ff+m8WnJ-tMl@Uct;I+*G*BjAJcR4`^$BXyvdu5JO-(Yu~^AR6( z3(yJPShg9j+43D{VB+v8_$fC1(L}5^&KCkBJYr-#(NJd~ddV$Ea4=QS$W=EVLafNO zf89!s9g&avz4tSVN5jh5Xbe=H>OtOA(;)nRC_fm-t%>S<{C-T>LK;!M@@Hu1)H^%K zQ}@eC|EF(Zc%k$(telO8R_`JvIP8L5+#=(B=G{2%+I1W-|&lsSI#A#n6g9Hx=w z?84BW*EwxM#H$+|_Z7SiykmFz{Nh94sGxNovhhf~jTj%6mGrU}lr;Cq%no>E4sV?^ z9)?KE+_WLgU|8?VdaLl2(1DzM1g_VGByv#oN9Fmy;4ugYecu8BnZDQbLus85 z8?x~cfeROK0PXO)@i7Rfppkd~`()<8d*di}|m4({h4J}I+&^LtyDhb&0GzM2eBL_~) z;?QtUd<#k^$QPsy-qL#=qeFvquiZfY{!7fOl7h0|7nAU>gQxt9{e?9NrS~1OK06ZWasm3 zUC|V2+sdQx^H7_8_pc$Jf(GQ2>byg4Jz4S_S<>CVojYdkrGXRH)%BGJm;Zd3YRP%3 zy;S??2xF(9k>f0aaL|wpH2DJ8KO#hfrR<1--m`m2YYIQBppj_uDxB+SVCr*Ia!3CD zM|1=>az1k05H#{B(XR9PVs4XQtZ5m?{+BQ|N*X!xOyZ2mTV9%xQ$2q2GRy@86z8_G zhSjMn8pm7Bkx@O2P=awg<&~KYT?;9s=ZAWvn%#6{1No0viz&$mbwOv?W(c^m z9cCZU=|zJL30q^ZxWOk6nZ_1~k)81keLj%pF&8ynhm-!m6uD5~}dwRIz zQrXo#vap#1Cim;_L$FC z)YLi?)Js0~E)-HhqOf`wAs0iIa^o?!sOF>1Bgvq@A&w^uW`o@&hD{o#J*i`0rl64n z_m4?uji-*u8|)j?;0X1h!RE|}gp4V>mq)>_SiE4*ssVM;SuYpNK)aPR^6b0%-Q>jz z*+f1wBWuuOvus{yv^kp>Ytw1-38tVWAF)-(++k_KtobX1RM5yl@k}HH(VJQEuQEsM zI34puqs^I)7hCC~QP5h7>L75?H6f|nQ-6byO4{-1ihq|^b!Wb_|G?b`Q$u6UnXw3a z&0`i+>$Z#}O)Zbn6=R)$@E?#=K_feFeNDOmZThFIle+iVaO&rVvl^*qOClEv4-K?J zsoY3s_4JbK-UCMkjZA&iBHe&qdr$8BN$<1K)Xj}%JCuyo`AW+*3iyb6%1~f3Uj9DL zd<$vF#`y`VXwgb?PrNVpeCq#jy6l8>(9`84Kw~!JseCS^1D1|f#$yvFm|6y-AfT+! zpgm%!mXqwKu2aqSb}MLb%~RVch4XGEud8OI;IlPLW;+JdI>$C*Fb9z1uC}CNp*TO7 z&@r}GECE{u4L;AkU`yW*pI9Pu{NvKujt!-;=WI!(^Ok;NqFGIhnE;2>?pPH>N-mpS z->o2#XAj(tRq*sXTgk1DK+4#|@bH+-mtw%VnSwyr@PO$QEo{ir(S7ZDXG_te38{^H^yAolwv_h|21C9zBnYiTJNM2ksyHT?7Cv`FTXv8^_udXYMn>bz8 z=V^1T$aq?s-^;teO+h0^-}?Z2)PKB79=oaTSt)n%iq$u-d>jCRG=-;00nMYTlP3<- zaC0VhF66Qbe0^ZB+H8*)d3}Z)+BUnZThUC87If_DGkMDPSr?uhLOIksNIPv=E|}9) zV{tOR1AnGyCaNDkItSFfW%At}v%m{amEtZJA2yA&J)@rSQpG?9PQjllnu+S>b1>?7 zOPl=8DYKWcLmv$mXJXezjGne&9I!e1V*`d{Qb(@q0TV?tIj|!^rw%D|fA5)`MaGS=WDQINExUF-y+Dz`+D0BSoCUAt((+F{9r}K$^ zH;_DxUPl_`iL#=^v3D~#Drn?D6|>a2T-7$q9O33$Nk*N@Fy`3jW=T@0%aoeoysytVQ&3|n9FPHw$k`1bJ=^1hZ zCJe7~A#{U1Yw5*Oz{uydb^Fkmp%OQ9s7ajCwN zt&$S7O?bfK4XrPqA?JCJ{IX}~Y*)8}Mh?7Xmo6}m?3`UHEwPtBh=Gkw91egbyLQx! zjigD4B?pGQi2<7j54)?+m_<~oq8X_kS34%JJ7ac4)zd=+F9C6 ztwv!A&z_HwH34tWgwZwS!YIs)QubN5C65P{$m~{P%TG_qZEj zzy3DDfHjD+MbUY`21V!D8b^S#ZvIwt;!h`4$9_b?6P>fG$Xd@Vz!Qi2IZRdyHL5di zOT39%_jpFdWWj2jvH9OnCnvVOhCu9pdS_2sZ(7u~ZOz52uUL7*@&}i`yrfrUn%p^h z$vL!y$6;CwgzZArN;t>iBC9uXCUq^XOA}RacH>UH8hBd5ywGOlcSvQp=OS{~kh~>5 z8GvyD=lQ$>_gJ(Zf*W3?`9CaSBiKYJ2IdV3@*cj{?>g|QFK()hK* zG_Qae`>1^|UK6a*d?hbh(ql-}qH>ZqLQs4qja3nL49l_=Mj#t*vmg5Z7<&^qxr%Ck zJUug+OeT|=Op?hSl8}X+^u4!NAVBYX_jFJ10@C}w?=6pULkOwL*s0f17Bl^St_jcVLGEI2zj~^tdQ+;kNr%s)!I_G=9jh<%BrBK$! zsdbL5zR@iE6Isgb+x~^gi9QVRK z2cu=gD+Qs``isfo+rNAfSqS!ap{p*k%>XOZ^~r?V*5O4O_*Behuc2D{S@1WGWPBJBvq zt)E6AD1Q;@S-)>Y=?uQ<8D92s7A@n^10dWMj>e+WF1Otb903$3cu{Ej>cMArj)sVS zHMSsx#r!Nzn;KbaDpzG4PR8lXMm(I$uGT1doqJ%Sub3QP7Z=XGS0{S1_QfQaVJ+|; z;&d&P9q~#?VsEjIb|_G)rPEY_|0@aU?W5s#eiY^-e;|A8f|oawOH#cyUYQ14ELh${ zoT>s(&IAxdiQS^hl$y2%LN@q~Yqvzf0f+1aRnS)thqJnH1U{JQO_nPQX)?`yiT4(# zW@R>;4lrK8h3UO$u?w%1{I2-9EZW>hqWGQ94^6T?W2+Bzx%1~v+59^&uSBSwbX0$rV5=p z-c6iN9n3X8RK>tz+IUZK z%F^J^gzc(|LR@cgX<0r^IbKl1k#aeSh#nQ;Wq{8@^~qX~-$QlUMBZPV@{{L`l@wzX zR}?C4Myt*-l;QdYdfrDPbNlxQ=gJ4~{_7B_Hx>jZ(j!fJLgBr}>ES$=DOc=lBO546 zjj52sNezJ)n$S;uBr?gu3!R6)(zbddnP}5y^6uianf7!bZsL3jldBx{g&V;*ZRWjg z{+P0yMnvbjpu+DiY$aRX)$8~LS5S^`I*t2E5s5}(Y|P00#h}7pl=B>?$PHIOy838j zQpun8Ur}u*f4QQ!q9(3HpK+9W(`!5#vR3NSh&k9WYi(lqXz&bo$>a>jop{Z;yc+e_ zps#^f_FDV=?9yokjumHjbLsF&zP943TX3x4VFJEXUxEpc$17}-W2?22C+AAK$d!ko zZ~6;GVPt`M>|el)e)Vv#8&e;l1M{Zuc*$9x$#4p7xe_h7IVqmNXFdXj-Cs;zNq_GG z^2kSeD)z;Xf)PZOcNwP|#^$K1nv!Bc?>3bTridd>PQM9^`ipVqe)&Rj%T2u&J#d5y z)0>{+l2~hcnzP!}?MPYfFxANGM;1<7_mfh2y@7rHQ@F6PQm>!uy9##4phRTl zkJ1u)l;$1B=}|hB@ion?OOlXlV{V@&hFk?lAqf4&-BalNPmc0uX&l9QH*xy=yj86L zj&&+wVSIsFx}7G9yYTz|V%|70&fjwvu6w$-@4Qnuo$i`L8q8~S?lPNd6sKd{k9A8c$$5p@YdW-HLKe?@^-2VC*xu_fPbd zl7~w73C{4Be{Nx1nCXvxo@%7lQol3pl#64NGt+g89~t3O-G2Z6^XT_-3VG%0+XP51 z-5tHQCBH!X&HI51dquL5k}~mZO&ttan*Ol7%kTa#Kx4|6lgQ!8uL+(9+rQXb*oW=} zLo5~E4V*3&y}c1HFnK_YCem6aKAk4-x)T%IUre0${J86Mu!+2UXRmo1j`noq3g3#} zX?<8Rq!ayhg^xfCFWPt2#`|SBuJ7fK>j73LwzIC31A83eT${FZhC|3~oBZ^v3kRl7 zN+i#}US>$~7uQ|-f1QDMy6(qQq2TRVmdE@}d`Xv)MRO5XQOSQ|6S?*)3+pEOXv8`7 zDBjLCd;n+FOTW5+%e4~^!IGupCeZ#Jyl-uqKM2DESepSfzAH(7^4*24d)N~;7u(5d zA`8IyQWUFs0Wr2;$B8q*>T@=&vyE^@Bo)ZC13p{Bp7UmSrd#%kxf9N?C$BpH%GX}~ zh=`nd?*amB)4I0Zt!n}TBMihXJi}n_B1~ zE@-l;KwHI-b00t_rIHhd?&MYBM0ZsWz8|*<2(oOpgwy)u{uSc~#x5N7j5LNn1^~2|ia>^|HCPTN z4O{d1Jd7q|Dj35Kdw`YkQw0>8<;CQcU#8!*tIrngxP0#D5R49bWVCtflDxj0Y-^)Q zrCUO-`#vt&mKWl^-(;R2{Q<9&gL6j*ae!Uj{eCVO)4N#>LW&ZGvR99cL!}?$`+dbU z+0b)W_;<{|@I#(QVD9Juc&zI3=vz&~O54Q&PWr_0>8sXVbVPj9p>6YDeQ04sP@d0y z2O|`nJIcp3P=66t7Hi6wTuEoM=w_4^87>ij4CT~cOl~{#Cfoc^f4qRWhN@0sGjOI% zKx=OV+Fo~@$RAxeaFXKNzIm-}{{BZ7bl584_cDu*Qok2hR;vXH!`oLIw zjb`+}R#jHLW0hv~U#reqwPE<5V`kA;hkpYs{=0{7S#$RAdxx{b?%@lD_YIG&d~NNO zE1y|Avhv}TM{#jbS^3eGSFDY%jIFe-l&;*la(L*ap(lqPSo^D?&kx-&)EIi_ka0*n zv}H)N=Dxw%KMp=Ic>mz-gVzsMMIRTX$6i_U;+n_Deld9Ipl;1Z(R$K?;9T*ePQk2`8?r#(gFMl4r1$?zKb`$Qe=61l%I0j` z`a4lK!*ne^ozqGx+Gfydh$mAmM)en3?hjgxj53n+aoQ{}?WO7pE%y}jQZ}p1wQOx= zRT7h_JhW+P?+jNB&1Q1#ltFE(XAeD3>!;;16^nW~v&^B*u@YHIs4vwRmGOiz6%ngz zg~*=gXmP5lc9_fAk|k_tmsQaV^OQ>}tn#wCW=)-ef2+;R?Vu^iYbl#gB}wRVm8^qH zh7`%!3xsB-6dHyrdMtssr0i6yxm`44cP$w&%D7CxlP{Z6eyd5k1Aw1kwRgr)xZZ0dQdTiY8IOo$#^}b}-kT8a%Nm_q4snIAUCACi` zuXywUb!_TofssPtU?l~g)u7;%fqY!i5y~Yp+{YU&mh5yTqnCt+{z%)CXk;3#TDIcI z15VPA8H&;B36-(PMm1VpD58IzdXN5ckHsaj0QPjk}pST2{x(Ss>i z)p<;q^1M5z2G1GL)MBw22kQu^3+{-grQH1b=Gj4pFZS6jjHAuk4Tf|hZ;lLKPrn-T znrf_ES1YKCVpl!NJ|u8=RJD?bTb$0Q!lh)H6JIZsO9~NIU(}0BoX^n8B4$ot!*V4i z9j{IYV)b$`I{pZ)9xXUpvy9R0NOBIbqEV6TeVW#fPOF0+nZ*_|g$mZ7a-}f0kyt~< z1+4m}tDt6b4(X1EDW6ERQsM&UVAv@(X&E+j;A=v;X9mkd+KjMHL%d+loGy%U#AYi? zV!>j>Ep^Ri+Tr+x{}O(nh|9Q^t5MTA{W-f|IpCu0iHPF~Y1kvz#4E;Bn;m?WR>wI> z&Hx(R8+Ms}`UE#bgmRD8%Xy1MD{C>=ES2OyStz%s6HKTEWU;bSn`}kK3!4UK4`TR3 zt!&wcn3bZfU||($`4hB$$W_-M*_=b1GZvfGv|Q<><-v9($QbL5q}!)sO~%wVfq$^* zR&(l>)gWVlKFlf=I-$NxrD1d$t;Vi0WOX^^88-;!Dr0b#Q3G^;M$9E^_Qcs=qJ%)f z*J6!!jY%BwnB^MwLQ}6?p_VwDYGYMC6E$SRyQ)HYP7-0NR=rY^mKUtbg!Dn7+~ZM7 zBIT4@6;dZF;_!e+D7PCMthuChw=%QSj4BX5=Ny5+l>l++voZyhRjadRw+I3kV47ww zoXJ%*kr@f{HEjAbofv<~UiC<9Zl%_wEh>`-K1JF1lTkIo7rY_h*v}}r(3*onc{u0< zIB(Nn(JS0DL3YReg8ch~bsHx-VUrX?6ORf%km{q1&6o7~Y7rwmA};y>E%(&| zF-{Y1Y1@vVJ?oN>UM-ZzjBN(Sq_h^wS!e9Av5yPoPH94tk@$VZSQ;~&72hG0>t^*9 zrc#la{F|R5l?vH${lyoa!;)m z;Ua!lrCOf$`<$sWAEpE3DYs`7ZFN|#ZZ#NXYWFXM>PjB)xL8OV_cnCuup_f8E!0;y zT_ITOVof;~&&Lm}SabWpC+D5d-*WQ+x!k#XiVy_Qz@xobwo z5aB%DkS(88#_bwfp0Mj!PT2^~y25gIr3nQ6_X`qGMP7z>DqG1&8}VS!SQ9>5_W0Qn zr*T-_`e0HlGhQz6DS6GTI&bk=9Ia4>ix{`k@?gbo<2;h6vF?~Dd2?y~r)hbzp=Y>Y zrWPs3BxzSGGo%lUZ6l=*4{y7)7V}mOOf9X~E93^ZHjvi6E_{PEn;BU-9FLe=8BIB% zyOfs48>%RivddYY${We~le$Z2dAh8YBmG4qVT{INSuUkx$B?=7p{KW>Qwx?V6;@$& zDYZM@tJ~_?z6%3!*z-@yvi||y^HW;hpRU<0?04~cD_GJ?^qHXFG-FS>zewjJ=v3I4 zv_!1VS>+LX-2I-lM^+emR?mtRiI#VM*{q`$6W^1{)Rm?U$c1a*tj7u6xm#_(@W0?w*lIWt122%+n z;?8l(C=xBYS)0CTH##(>XquURT#&tzS%$AbxWzshTh)D7IJ zUlHniie|>_v8I%ITJ+&sxS`5d zr5k=hjfyO=39D*fOkZ?l^iIh&0vjweMM* z7QMK3X6+%-6KfBw9Uog5`=7DzjeU8HjLnWE$EL@WW3zk4RTe;Z{+w~Y?0{?qCwR^Pw+_SGL) zU0Hp}YTe-I>T_3b8hK;ncgQdH^^sdg-ZxSh@r_(Ga{9=+Rg0^hTlIrg$5(xP)q4is zwJN>Jwd(v;dj~$eYR&L#!_TCL9~nM2eADoM49A9T!_wiM!z+>8?8%i6to;1S8&=j= zUba%d^4yi1hTa(Z-O!^$Umv=4=zT-^A>YtNL#GW*40Z;e8~py@R|Y>ecYhf~ z7xntOQfp6F;)RC49Z1f!8zzOqyQ4e!ea|PsxaW^+kFRL)AF7e*EuG=nnpTwwMf44) zJ#F^7ZpS@e|;GB7+zG4)` za@L~MHWNN7><%^&(J>l{I1pn^j%HQv{Ws-Pti{y;zqZdxb(w;qqLF*QNC_3Itj0!* z8MoH!G`kR1$94PXU_)gSnwb{M+!fXzo}n9vgY%W_T%cLi6zj_As6-+8N^|| z5KHC71w(~BRHbYR^o0wX>^eeKuEYNRkCbCfiW@Bd&~QKqz;#HxhE;5tqTgk}KI2R~ zLyf#oS`KY3(CXsZVrqsp#k|(Eq}i~9(yDs}LLtzU_*s1@7%vzUGGrW-!4^tYquMHWXlvo!Kcn9jYuK{YV)m!C@{&0g+E?#Zx3_CH8v}^+ z_^eSU{#CRG((2*)$U|rEq@}J*)Qvf33tx9Z7Sf-cVR)BKszU`qoyQtp~l9 zl%u9X;;YFcz4D-vk#NyqQKOS{n#`7%P;PFfCGcA+72 zu0=HtcI^VK->gMktY2H2G3!}*)S5mw(k-90H>(*5+ltql@=)HOt0lJlxA234s?ODw zP3d$>i>Rd7#nd#hH>VX9NmM7RR_sb9s*J043iTZ|WRiJC-J z4(i&WrrGM3UA(S4GxkQUfdt31oZ5<`cd#r`HfepF1B;Tj+E(#e3YnR9=HM=&JXX|l zMPG)AMNPq$gB9%;%Do{wS52F0e#A%w?8<#sq1=_QvQ>H88HxH>#OBJsAe1Y@HAWo_ zO0rR}IzO8WT_7y^hNP8Yt6po!Uz2H?QQ6tO4|9GgW6UOf(ekv_xg=ni}Rb)!sulThEFN-~m0I9Fy_3#Vkxp!=A;R%|ky)~wY;?8T5OuTcD!ezsPK z+X0M~4Y_MFT|P9GploWz%(MQYwV1Po;>>7NASjD+ zNi1cwSS8VaqtZxzp-vh3XPpoHe`bdL&M5xEzUtyJ_`mI~ka< zWQrbNF^MEy8|Y?kuQtMQHeheHBwl~HUQx`By+Qd@iy9x3S7cIZU$&f4X2-uOl>224 zPS+A^941*dK9f*by(@W|J?Ykx@3YRjIKe@khOQI#Gl)iq%w)*{iHJBr(=)u0q-5V#?Cf1?jBR%05*3+Y(y;Ae1S(`6smzhJkkWq1lFzc0gq|UZVZI|C-%-7N}CPmv*i90Q9 zTQf5|9gk%ql0ZWBCxH;j7MWBvku;hb@+!lg{|%u$)ZmyB;ecn*F$vvT1t{zryqcI_FHteE1A;J=Bh~_&^=6#aT0IRMa2-8K+e_7qmo1mMhR>gf5~h$n9|%Ql>WKFtnj?1g5Dm1r~3A}&%&k@Oy6j0@VdM&hk0Qm%Hu?5lI?|Da<~ zU@F?QE?}`q)$yo@JNN}!oNs%p$ecGFwFlywZ1&VJ{c66MElHv=eJN_T6lRK%bLr{A zo-ddUxFnj*Rl+4@Arh4e0-FzMb)2ML)XMB}Q(P9=D(oNm8Lx^l8Y5-BFJ5BJ>G5YN z|6B%1NNrMwqZG5VR)6?HLG9<9rU>J5Mx9YN+#QST-j4|N9pN&=xyABkBM{PwXS3_> z5C}GvO5%@bs#<9**0jo%!m#CxK0Nal%Qi(aSM=Zlm|7;O6&Z@54nN<-wT^Vhp>GZi~{bgsX>{4epUm?_&2hFUhX0-y)Rm?Qx zgMy)vZssFg)UNkLYrrweup1qePr9j-Ga-Ld>#rA-uCQ(e6~S~VGhH!hOyRU&oT{89 z>=EfK!(%CqS7^q6)OfD{B@0G;K<7dhS%Fxto_W`$msf!UBhP#$p$W7 zVIzAk|C;>N`!DQ0UIu}~1kkCbLkqZ~w28I1y=hw;IH|SA7WQvCIh99B-83)$&7L;U zh9AevY|xE6ue3=T%((!8>;+78Mq<-O(KVp?)ab0mOzchc?Tf(DZWPi7gL7O>3Vh>Y23Y%;QB@{Zl*`;{2-2%Z!-IN)+^%X!4XoT(8^Cv?Gdk1 zG&%2=Xwk{3T_nNz=idFNoQRzA^ujP%`wT|Q&YJO_f>APfvvxzEi7u| zpH8x_BIj~9R8D8J;fqUn_K5CUUQ9wOCwVX2ZRC;P^mzU8w_UffqdeA>;Dc!Q&y=}@ zB2-7%b}Z2*&R5}xb>0i`aKa11i6p`d&UKwyk$>}ro`cCZe}~3d=8p1EQDPf;HonN+O|aIR{)7>~%C zhFpva+}$t2OS+#1Wif?0@xVJ}!=HLyI?_K=mLp3n+m>vh$tAL87$};CMk&bfwSPvp z`)H)}^!0E${odcUA?HVrN3DlJb+xWTL;ZO_edUc;pirOkh&rw-Eqvv zDasB>wdHD=b5Z_-@b7&Evd~8(hkt{_dS7`0U3m4Co|oUoSJ4IY+|em;q<&f^lUNyH zE47T=H6v{oW>{SGd_R)xHRSkZZeD0%%U+oRb?_L8(tgMaTNWDEGshm}bV`;vY z3r;(0O@?xm{T*%WqY>x)M#07ProZ=`2k%>;6USpuQCVm^B?&#FNg5apE`+njt}Gxy zO$QwNXymqw1A>cdrqgTV2NxH1?=a0BUBBdJD%LYHwJlX~`o($HTcs_0b`j3U%PHix z$1dAPF>Vh1qu0Rj>$HJ9>=bQaIUmz#I8LASIkl>AQJkg>?|vPF*hd3O%$ImMpxDxz z$i{#6q2D~uE`by_)L_ICiTFX~K=FQ*;3 zy9;gh@)m?(ca}o1J6!?ek*KJEc@wd!lWXT=Mq@VNb~AB0+LsP?HmvKX5!F*ypN^EY zaBzQMupC<1`SK-FT16m6b_AhN4hfny&H?k|7ZKR>;yvq^B_xqbxPpl9C1p(OiPQ%hM3?%0I%@oJp>8eeYOgkiToePeo5;~CY8|!Qs zUrr*2t?&v(;an5LrrZOh4T@R02e(!t7IEJy0 zM2=s4z7Qwy&GC*9fByVLM?gpwHTiJa%SR87d>cX8I|eNx^8DAdwWT16qX(AcD_-=- z!%VduHJQ!XvN+n^CpM6+r{SZ0G$e8QC{{D@jE{WjwaxQaoYq0WXH3(~NhC9lWKphb z+7+&@YiobOxzS~EG6wY>? zaJSCyJd6LWOyw{YBr&B$%-D5#pgYrnzu|0rv!6zKNnE$gzjSs7k*&r!vJ`WvYKT#| zede}>F3>#+MyWV41W?mokG%5TP0$P%zce-fz_}eYOe}0IJeCyQTJ(MoQ($a*zfV^T z`wF&Xcir!n!P(^mr%X+MH2}G;b=#3sJ3?Rv!t1(%wi_#!F0dwW`SOZ#E8~WL zL@OQd^4=vC%f-vgx8>DfGml`p_^|Xx_x5Du)qRxrt|i{EJ2Hiq+Am8b{4kzlJnsV& zeWhgbsl;jI-!V$qM6&if1uNg*51J5P3cE7BUg9v zonH`b;2$Rb$*1%@dM<{H>LDiQ)wP+7L~SeS+ia;2;*SthdPFH~7t0!oimAx~xMR-}0FrMst`9ZF8}<|#+Bybe+vzP_Iv^eyZl zWv-_{ZjwNOMCOk2FjUl;y;b#l0P8hvRR+YhWI-1qcgZ>j*7X;Y+uFaf&5Pw7g9veY zN8bdW^4ZiHcc$)8Wuk`ZraMb+Qecq#O8FRY!~A+BM4bOMpR$;`Y^Lh&7Mo4RJY{Ys z-H>O=f1HP3_mu+YhS=vt=Xbh^Vvn8yhfA6$Hf{_klx(yhwlfl+qvB1H$0hiAUomnN zLJ+%vTsmo|7jamU(UIWsrszoMO%mL@_|*DZL>|@P3{GMffLmWNK+^_I^S`;E6A(=* zB6SJFROAJRE91;aGcvkbFTW70wV%ePf~WXd^ABE#p3roLmjhjbhbZN(ec99#T$@|vorj5le}QOFWJ!UgG! zC2P)_q~#48oJluZQN}3Cga!(#k48c_|3$#B{Jy3qM1RtPBN{1LYNVkO!=)2bq28QqtX0$@1A;X8~N7Nn^%#hq4OGDydO5w*79glbVwbJh$6_iLynLpQDifU zIL~&9{MLxo*+(O6ub(1DVwZ#4Bh29MZRI~ ztefbgkvR=-EA#%)TP(d1J>QD;4$GFuk)nBhye%VqE0bZXIhb{;wHC6c*4ap|x1#5L zB#Ij_eHtM5{%q|j+A%wA;=!dR&dgMbPKNPE9c7KYI&Bm>{Z2bN-A4nIY*9cue!$*q z;`5G9*HYxs_IOy`Kf+R6eki|iX@GS~xUI3Q&+pgyXH*VpcQ`hXk2oQ-{WNmhP4B;u zyz1=PV4G*C6!7>`R0?J+)43{RmPuk3yD|XRLh@5T?9TKI-}2=&x{o7z4QXO$dJEu1 zHwG8h2#+sCt&yPHD8p-kRwB*h+a=aY9`koLkqbOv*hfNm={YBw`JeFg+WBoS9bq0~ ziYk4dJ!zfc!pYQ(GAc8trZ{n*?5jrRZn%lx%Sv03N~E_GKI*4~z@tsk zL15fze~qoB94TkJk&6~Np80`^zG8CtWf32|xRq!Ez3#_?;02?WN0_2}ZVR{cGOpfW z^6(4MCBwpi-Wx>!`)DMz<96X>x9J@{QMkN~Ao)X=boe0oqdd$M?Y}i$))+Xsx1FAe zNBs?}oUYdEF2St#(}1pLyNLYxl3pXnFQcQ03nYP?xn8r1CDYM*E0Rzo)%7UlcG+d% z)=z_Oef)fK(Lesal00}>ZErkPuY#QmNMwe6>5;Jkk^$?MTID ztuk3h)7Q+Ky%tZ`7T7>S6?CMZ2IcUB3&?|&o{;^v3em;f@hDTYeGR+bKEpA2gv&Y1 zN}rTAPg;XvzMLc^{N+)rNUb+>_tnulXl@>4it55Z!*7bRfqXF>)x-lyoXNZW9c`e$ zeYEbGe15vo=^^Xg(4>7;FZI?_*(UnhPa~575q~D{Y$F%8 zdcz0N;`3V`<$C%Xi*@-}cb}9Q{?A zf-z~xSJ-;Ut&o?ZGsc`Sr`fAIK=|#W5oTTjr0lC-ogzQFs;6>aelKOoLs8Lr zO&L?x600+mo5iF_mWvCcrMeno(oZ9zJNQ`Ui(lGIZo9fCd5^pgEHQUH78UKfPV3M% z88%om7ekhO$eN&i-*gQ>dCO@?Pq<}2c~B$WO6u42*6+>Nf+I{M131!sp=DhH2QQkR zy{)rKM4nr_cz}HQGo77$$dqR(WNO-EvM1P5*((X^s=;^_X|?ac-hS`ru@&{v$l*sW zgG7E{a4W9u9~zq9c1On~I>kG86o^#9dBEyo6k16;=8`jVy260#ubR;Aqre%pY#d^P(?y zd^i!5r%OP?%SjUU8hkqHa+10eKj|+fs#gK(`{z45U7X>gPJB|p8TM7-l9Tm>#WUdy zYc$8mi=V+ZpIBZ@4!`>oIMJN@wQcj4-QGdCRks7zf0lM&dZ`0%aqdN+Gg{MMOb-9} zpmF}uqgduU5pw3h?`g=HEm|teISX6MI)gG}gd?)MI;X9BODVGYSm*D(3s(^9k9R{~ zS3fjzc=#VfpBh}X;y5ouH}6FL5$v%-MCx1Qq$@(d`pQW}X#TkP)ENM zV42?NoJB6br?Yws|B8jAv+1DEgKVr$sSSuy!L$<@s_*IS-*j>+E)MJr`SjJJTgmX( zJ8zfa<(*&e+&*oLEA3lR=Joa)nA27(yeW0^tuUvM*lkCZ>&L955`FN7O@Npi8>H$nLu&3I1 ziWS=ot|UT^k*p|#thuHx$Nf_$rQ$YAk90u2*W#5&9_$RSyI{q5a%^n0I&#YJ`-aXO z_%NB?sXA~92Eo2G2zG;59cCMG&gz%O%nnbSsKytk$Rpo@D(a&V(f1DSpZ^N`4B}@$ z{xBVgv&df_?u>5E=@?tu34zRT=s)u3s#<||M1152nE1VqbS9@xT7k@^UpqiyJ&Vyj_QTHPhLhAFbH+P?zW?)sr{Ole<9wUtRsRvz{98PgDd&rR%!|Ns zFJ@9w{eqdl@%kG+0NAugF_uW=)U@Rg*3DzE;n5!nsE|J1Cgxde-p9$sC%i_Vye<)) zw(kEN+9Qv3hSz6TjGsD|z$@cj!_Tc8AG}bM<=@8LxVVL3%A>1M1IEueB0k1cm_Za` zJ>zOf=ysTU0@g+!jUe|b|4{nKHu94vV3>9{l-GXN;Q<$qUbv%2p`&CjY-Xhzy5e5?C@!`sBPECRh9v+j?JdSNxCMym9mVUw+zIE$r&Mo8oOyCNKX6hJC+j{Do|ymovz=+t`uFfB=yyWwzJYhbO@o(+-ouMsx*Icolt);j zHcX$g6cp(x@P|Dy3cjyaSEZ82O1T~L1HWD}X~e%l=cRK;dDOLwx}8@xTn!@|u#~0Y za8+CeGFI#*jAUOio(qAH^p&ds3jVVE`t!);r@ntXnLcON*U58#?d;xl6@;3HUZWrP1?*_ zSq?5wFu&amN0_YtJzCmVOvJB=4ji$3a67s7_r0Zj><^SzXo*)!#S~p!BVlPuS!bKA zu~a$y^AG&#rjLeXW3evA`WABOAA8Na>c!5^9e60>LDuL%2AwHi!7pxRWooC?3;;L& zWbl(0I~&KBQ^-T>*5k_S`rmIQ2mjP#=lL^Q2<`Arw2-Q=d?8bfb8V@K&B`0Wq^4`; zAX&qo(ZYTjMK)admtKF*e5td8-utYu@mv4e(b~xD@byDS25#pa+nyVg@_Q6cHNqa% zGT0(^&f*Q*($;1^*jAD+%dq+X$IHvv%sFRfzNbqbC?< zlUuNlw;aA8eheeYXU@Wug~=RDQ^V`7*E{Pro~#O)d;0$g8~W}aO^uUX|LnXSYHj16 zo!i$L*{B)Gz0F2%D4WtK?WDA0aRWK@FYJPSB=XQD&m17@o;siwtfcL4bOM{V)EQsw zUPffWh$;Z5CEn0Uq~U-f$N6K;y1*zuxVT|mKaJe>#JdlXM+X-LW8>8!Gz;2}hXSP9 z&K|N?Ega|d5ZTk$l-rMHk%*Yx^q8bb?l!;)AsVfsW|kp5fWfE#UKd~y8b zOJMp3>$lI(k1qmN6}h<284HYF)Ahq#o~Q0;eQ9JfO}SIfmTOE?C5FllFvPK8acVb! zZRIcMZr$oxPgvJ4czHYz&Om|j3iJ%goP)S^5LBo+z+hl zFDA}w3>T1xHZ1;|ZlHhMNCn_c2*8|6$HPGRx%(+ER;eE~T# z)f?JxZ2~tK4sYTB`qXgaW*myF(-dpADvAtQ+_ZSw`0`S6{Fd+H8UE%s01v&nCrCGL z0Wa*GJOUtfvIs|QjD<~CUFtxko+z|ppsE(%6ScpDwB z($aXPq7g>R1QgC0XTUnGkYvaww}Dw-F$q1A=TpvaC+oNO8YbTXUU(}jf){-&o6aa> zT1nGjma~mS#i8U#c?ZV6zZhv^9y)#gu^o#@$%Wroro;nHlpM$`k{J_XhfbuII zynLDa4{q%ZMCR@|6P7Dr=gIf?_GaZT`@j&5d)HFq{GloWP8*UOoJm-hHAT0~ zL;In3mXpZw$^SY){`&MQTgWH&_Zs+}1DIvNZ}BjH6n@Lus=HyqB+)xq#{%UeDh3bfPNaFfM2_SY(1+tY!{!s zxPt=ni&m@{-#Vrq4UUwDZyNf>z%wG=ru^fst9*0EhM{@~yZdTFnpaPAl|a;LDm0b3 zNaToVaWi>QvN$o(MmbfHdLW-5F9_gRHEKL|x5T zwxLmg*%UdQLA(1&$g(tb5qaQ3JpEl{%IzcHV-~;9FUq~-9(Hl}PPB1oZ5h7W}I!e z&nLM>`W~>C+$4bo5t%y%2sPo#-Jx*m0n6kw<5H^ZEO06EK?NqeznJFfTc=#~h}MN8 z$&y5zanx&GrPUG%k=l8Sr%m*g^2zFr^RJ%AuX5Miu@zWI@9NG`L@Ed1T%hJw%9Bn+ zN%BVQ)*XryAME?8kkH%(7tH_Uf<=>PXL#-?p9G#h7ub9ai&3GM)haMF8?`u*U5KW? zrS!1$Y$TDtaM31Oui=j-PF-NV-ooilLL3JottXYF{e{r<~F&bjssv~WrzmDYVV zr(A6?$Fz}Rov1Fuy#J>fD}6bI9M&243*e16YZtrclC#L4wTq*h(>jU6trFu#k4BUD z5U-r`rpQ{|;(?7PBjSd=WFa5cExz3q`JZ%)w@>y7aaX>l$k+6|t+HJ71^MO;>&tKb zlt)Ak8y9_BVD~q1P-+BowpI|$u(LQ+;MNh6y?^7$h&U!+^?%vYHrWuiCY}u zaM!;+=+a4Fe3GRzfB4;>ya!<@YGM5L1bUZ`fp$P_OPdk#lt5#HNL_&lsI;v~eiFo@ z{<3*-eACIRkh%N*Cfx1rw7l(r)-8)FAg7>UL5APRtFX**7eiKLszUnG#?9KLGEzR9b1F-Oz*L5oYKx_GysID z)FSE_dBwlDiG0?Hg}0mn?-TL5<)3uyj25;kQ zE&Saem8nOk{h?s*)K{kNp#pL*BZlPP!{MRny)#g_LrGT~VioNHIy-g~9l zGko0;GjQ{Y+j)KXfqe*xi}!9Hpva^_gu&U|Uf{*rvo?URI*?X|Fpn;7*~3Xsz{@^a zRq|YV%jrw6LyIHiuTdz-ZoZrVLhO)|#b8EGGpHmjA{!w!Q)GW^adPUUHTdX8;W_c9 z*xN4cmtxSB{ZiMJ$SE=(KZ!)nAO7rzu%Hho7yVm+pql|!FdmWMla$tp18yf4cs9p3 zZQs;MspPpQKgj+cHx5)wZg<=thQguy%yOabiu>kM#9|<%oG_uwD|IDbcn7;9yolG? z{Nh=ALOqokbmL{#fCn)^(ISEo7f!fFX}h}ewt;*py|^AxqbI9Ej=#G%t~)btJFfK% z#*$0oERj{y$&aGR4h0T~WY$p&Z3rd0vh80jalC^qkt z$WJ`Jp1dx3{)g9I`2SyBzMs!iQX2jI$j?^|tUQQYbW-}thAs2rUU1{FO<3FX#H4cu zV+^NHYS@r7snFpe6|=s9+%bo9Lm!PC*AL(};O~#_AfxZ0C+WT9tgE1e>~qKXFfqze zt#ZcW5?4NLX&Q|NRQ%_)IGe4c;Y&KS6D_ObGP1qh#dR?J*Dp@j_YYZ*Ddwa;7R1;tR)urXq3T#H<|A8 z+AUQomD~xJikiN9By`g>zeC_LY~X{vdD(x%;yIJk0Eeq^c59YX`7^3%HN(p=(p}wv zf$O7@=SNR{>q+iIi?8e(72UJqa?vi)_&wufyfyxgp=ZYrjqe&4t^Li~N7ml4_Wf%! zYi;D>-4}119UEHnI}us){WW*4xqeN4&GZ^}=re0JjxLNoJ$m2hEkp64_l{mUdil_U zqv{Fk=)Te6)qhz1!_`Mu->|y4+O=A;deg+UBa0)y9Qo#u5!hDm9tp4d@rZWhz|fgP zV}maZJ~r|B!LJT}bg(|?A3Sexho}XJ-sc9sGw|7gYX(vSmVt8yCMQI%h@KF=L$qsT zM09A?ixa;-tlCP}{ri0@xBG%ATRI^@usXI1TQlfR;4+rl?}Kv_zLfgVPe-lPN@J2 zciXe}wjKfVdi*(qlw28Rr;Jjuy#VWaBf`w#Ct#8|aK9hS>C-zNANm*Hyxp@v7{|Lj zpVJGM7{K&K#xVq?dzi_GD1$&7UKLG;JDUyWoDw8b%LJgkR<01JO`AK4)MAkaZs-xn z?#)2?wx&KWP=Ts$MzaF&B;i5P@k*VuC%4|*quSDe*%m(D1_>6qO&at$na$S;WGNrh z?%?~zt4X)2jlWALpV~2aNQ6c+u;y8e1DptS=p&vN()OfW_$jn14s}`&ev-hH=s5he zz2=!Es@s)u;3x3um<5SH4cK#27gMqqc=H&`G~dw((%VJR0h46-pFOIbb;9ieJB`oQ z;3M|&sn(9e0u_H#A(0tO_MACq*W%FvsPKbtEKymwm9+6(;|B6r8&UG@Sr0ezBY_Om zcMtZ2EbI&ui$Q7QO~1AJ41tPf0I44SD7JKjg@;cYqS7AvG^N5pA?@T~eJ6p(&f49; z7&4gHi8}=<-~|xe@5ZUZ$JgLLY|gH>fI185^Kh6zNSzG{-Rv2D@*$Dw(QgPp=IoF> zUbY}tO&bfSe0MUpvD2gShEX7`&pLeGBy#Lw$TQ8!0|FJ`4REG$gR{ZeKnM7gf$aLL zDHU9Evo@qAaN<2EfyuNXlFcOEaUUf^Vj){Wz}VY)j~s)u4L>Aq$H5*okhTN8-v-|o zC!iN?O~`j^dzMnsq_z_?&r57D<$&83-b-@Zy~1xXLP<=siL;-pg^7pWqHm3DPf{{} z@Z$f6$E%zZ!_1>BxN_URJ^sYN{6oRX{}SCHer^z84p{!P;EWdH>=OV_;P*q`Z8;~m z^N*BO5QC;e!Ug!d0D2z-z&Vh>VDgIsHH{JgN(2}HOJIHQGic9lR8cBoK`|mo+<+Pc$u!b*l}|X5oJV zWfjbcgb%yYLAc34h}sT5=|CGR9_noUuY@0`11xIr%ND|5V@(*7gmmJw0u}By=!)B$ zv9Xx3oDRCmBVM~!pyE~13j;OK!a8Bl2*CNw1~Y?pN_Ms|-Hfdbv?NSD>_E841heb3 zJt~@l{0Ep2s4<7uhML*jU{#>v(UWheN5VT(QRU%mY!H^76H6zHvg7jjBE zTcbFCc9##xhJe`a|-L1wBfEOrY%53?C@MGw(3Uaq8pSr(3wKFEL0B-#3RO2&$VPzKWp7Izq_Kn{>8Z5=Z>+N1Ir9kKSXUZJ10 zm=fH;O}E~=6=BZ|ez-@)^kk8{1HxrO1E4gZd^QU` zwx?{^`0Nm7tP^Z5sD%_FTP-_hyW6)tX=hOkZ%N#Pv>--OEUnzSXDMr28=Dwp9@{sI zNr2cP+a){s)gBd7gUtkr2FXKsCsTZ)H72Mc<;kT_> z;H)6yhzUBG*T4ZWcKgQEM+I^d!o&rkaQM}2$5Xn)9n5UGrbopGk-CG=5W@csn%`$@ z4hIFQ6phBmuwCSI=o0>$R%gcV7pT0bHgSJ8D?z4CsXZOVusgY-Q+s5jf6efjL2%8+ zd;3YT|FpO65~$GFm?FID+pr8_u;9O$#<;jgh1SntbtBCSKB`qARZTEEat+<~p;3?_ z1-1&*8^C3>v&eDc^XASMehV`J8yO4%>?g2206UY`H3v@@sJsq^k(I%Ugm9;A;Ot?x zMtW3y6Wfy)>of|r$R|zFwTFb?nsfYlEC@3UN(SGy!5hKU7~o?3gCK<;k65D$3B>R_E=KGNCb zs%<^0-N0|^>Z}brutSS{E@;}+X_RWhy#zLBYz=UB<|&c@%$jw->rowiW?FW=3APh( zf>(6n$*)IvS-I;gE<134YH?F$nRca6{U>_}^i zUIY2age`>Mk1`T`HnsD5`Wb%b(J>eS2n6p8!E4|Mv-3J2HuJ_Sw$32Z4l zwi*>>l=B(_0TTKq9t&?gjH65+i9GbNdvPARyRe=7?QrirH1!c2+$?j)cH-bh&w)(I zHEj!ebI~vpPi72=Ou8LsqxeS_H;gYQ0nF!YAVaLWX&d?8M|%8T{3uRu;I{(}q`nTx zphl76X8b8vAXq>qbwpzE49~x5as5Oejg(?T!rT8RZ|a=~zjXv0aZ-H~Yoh5$W^9aE zD`TV6zBXe{;~&&ggtTQL*XCE#xn^^cuQu@E?fzx^V00E;f z_%g2{ZejCoTV#4#-Y#}$Z;E{6Hrxy>ClQrvA6_aifbZ!mxAn$l!|fOs^W3rhXglQ> zspef#Ccqh635hhPLy{;j>@{Y262AR9d;FjX^S%goTBc zE7x$f31;x{{~Rtt`e^*6CUpz=*ynn}dhh44oY1eq9W<26UIl=^8T)Pa`< zQm1Yuzdza&rLKfd+_kuazn+#q6{T3Hkg_oqZ>pl4ZdbF>BxUKp8RI=IV{|zUX>LzB zKxVK0$5wLvJ-xa5%GbdW({v^{QVDH|U5yx9(khsiBHZR=h(blTkIaK%ABpVoU5?fL z;~#G!@0{;V(R=Qt3;|ssFtqp3#Cu@k!5 z`eCUThkt(R+!FfDKWnmSQqk;Lr8Cbz>vz+2Q{I`JEx!93<>Zw&%zrwHyMh%sSS>}c zEVhz#Q` zh?~2;wFa(%BUk?dUG9AWFD0X)MB$F|LPpp6mrk{n;v4~c0BlAqR%~Qw%xeSu;2;^8 z3H5&Q(y93iC;kPE>s|H#?>;quZC(E~q7@4lGO3}kiz-&n$63LI$01~3F?8QpG(3%5{W5N^C;nM>=)Ivk6y)xI z{O{Q-LSuJuHSpPS+GQ~b^pvNru?8DcN0hO2yn@l9P2c_rahG(D3rj9~^%O<&q|SXP zgxxQ;1MtRM>^PjP;pvqg#oe5UN>2JeD+Ek0r2*4<-*VC^sg7aS^v$Sa_{OAD^aAlc z5_6uKx733F4g9-kP>@(elPg-h2D(CE2e(D#YXfGo_%H%siOYEIb$ZDcUpc{;Om^ z%UcnN9er+bcKrvVYDPcABI6Mc@K|Kn_ahXs2dj+9ej(Tq?8#WYB=|9|j%BT^aP9{m zpK4bW*O_Xy1|brwNhbVF@Iu3+{!<#zBWq>>J;y&ig@jmquqX~nA!HzCM>c}jmeORJ zE4|@X)Y|==h78D>N&NL5d-kc%Pnq-CCX(UqsW*9PaFnerjVn}FphV=JT-U0L_ZlhfufZYVl&JRhZuX#D@F*$c7NpWr9(EJaDB zSnkxk(hM$t8*$j2!O2h*$HPcHY{NF5&7^}lT)R*B3!=F97gn--EX#~s`ZaEa9W;ltg&qMQPXY&5_Qp!=xSi>|YUP|>trX4(G??($ z2>ic!{r~e?xDc#_@cu%ul6>tbtSi@jF~Pc$-F#ja(Mql_S+vpx1*DVIq#_;=d3Vov zcKYAp3sx&q*%iu5-HK)60gBPXJenBL992T4*IB`LbzVWo_my{oPh?l9qx|GlqYj z0fsUfQ8?^y>ujHt5yRP%hWIc{C83$aOX=Z-9%{0|GDI9MWRykQ`aA}8bDx%ReGJY= z(RdP)0?y4}4lgDP&ykqwXF*N)cRHxa{5wk}pX^oj)Y%)YK9tSm1jg{TSr{rg4cqwF z0M#>VIG?Dok`xu86S4EvLOZro^{ZPPg3j&g>TGJ#H6R~R@+{!Lk0%kuua2!HM~WoP zPRtoDFHW9$AVh)C@c%FL6c8QZg;Q`I)(zUmhUzG%tL^Xi8m*eHnh3eJczD$uSu=4G zgiwv`lui~)Hal-V>j(XLI}cUfwMP)geQts$f>0`4}%54Yh|og>$Co=1ZNC z-_`wX0mcivV~Wzl%)puA($?(CHv6N`@DbnWe+UMdK-CD2^<}-(K?jr6f`+vAd&; znSJFbJ0TdYjRRB1mkKtU+M*oQ4=~SV;5VK`#PSt|zEoa#sFYm3NE$ltVlc%NrAR$& ziUwQTO!ZtxRT9~}yv7qD+ZGS6o+E1|&L8|7+l9oNOUS|{5-+YH zvIFBv^a@l3fIvZ2qg5Ys2&U?8do=Fg`ngVo{bNGOnz2Xz4*a6uf4__@|6}!~oQXTVGj9UM-iH{e2Ziuzb-f-^u^P-|&E#ZRHD0!4XersgT4MIg3&0G6L6LmeU>M^qEnd!Q3wpX# zwM~XLKbd?X?YZ&IWb1DZ5}x-g2bH0g{0*02R!Jayw1Eju&ptxEnI5|6*UHhY(8 zxEax;H8rRq)m+zZP}Maj`!XE)ml@VBZzcnm)>UVFEyHb!x!!b(vxXD;dXx=`nnYhc zQCx_f=oi()3+Bj3MDaCXz=1-wDC?{lb|~hyTk2z+%3sye-`1z;4gt}?hK1{w*5P?Y z<4FiL`x!ge$*!y&2C{C4g=;ekzNprt*93#=jF0{+ko?CtlcS$bDc|zL&lYF@X&b&= zLC2he^RO|Gxpe_S@OGQ3_3nOMD2;eNRn_TY1YA>q2!Rp76=Dyl+o~AKMouF!=a@pJs|bR4b9+) zFA@cpD0m9i3|B3vJ>5xTPt;b;bx@A0=C;b3iF@<3{Hk6`R4vksZ*65W9w`ZhG4nR{ zTHHdtyQ>>nVF5RQZ}S_(M_RF#%V}h2)?e3=nQhYBUeXQ=aEk}p@HuBFx?W3--V=!1 z+N`>?y#+^q9qmv}-kKd~AKs?G*1O&2k9N4tfnYq?2~=z6mBZz8WUXYt6trjm=gQ$m zMX{|}-HlKcW4b}<;gx=Oh-f!}y}X$iY8E1~WdkPLyiJpe1e`|Sg)#^yr>&S$r`SYO znS;!R0??aTuGwbF=&D=m`?)q>o1+1UJ5DSF_qyTMjwcc4*^T(f-}uoI@=v$a52ao< zMid-^jZxfbiAQ~)fOn&8+2K`eXIuzOD*&ps|?{Y+xfLH4^qKFCQx84taG7=GwV~`&5OT3N-;KJd2){9yN%uCjDI*lV_ zs;#V7Hgi^FKT=lngTuwM$5F_@Hk=>l19^Lc!^3P@zc<7Th(bZIu4}gi+xvySP)}!_ zLD|%uh){m3=E$0Hmsy1gPjMy8VQB>kcCdb9GkfEN*RM!mz*jWsn6 zlb1JRW==hyC@(y`hGq7R5V1A;dCuFctx_s2UADXt%qO!_*b~ZWoO8a zNt)iBW?!Zbyf|Z-(5Cs0cxy*povW{@J*H=ho=D@($CJph_P5rP%6^GeAOr2-B88zH zvv*Ijp|@S=&>OHVN15g>q|nl};_(c$lhepCXJj?*oqknDzF9hR208bd;jh>{(p}5m zdMx3-E!dYz32{fi&}wgQtqTB5it@eXTJV+A0H!m26|g{uOA1GW=UfMN_>v*pzVIb; znYenOWE$%nhD5T)foYy+cja{$8ySsGbZB|_<)!54b;J2w?v>=kCbl8IByXcn;KG?k zNSwJL#z(1dbj*}i4e#YTBQ4daX>RC4KD+aV;gS^^6%PdcGtxHXzk_Fi8_N96+}}m1 z)92rSx54s9^X}O<-fGnvn>kBOt;?>d3Z`-D2==Sy$eQU%W8UFG`J)@8MdrgFvJo81 zy?4RWN~&y)TBpV>aA7|#d7&%O--yLjMkAY-`pUD{-8d{=89#LsQ*A8wzR%lQ-@>K1 z{B4ji&@YPmy{c^efwXQD@uIR&7Cmx4SS;uecK`%4o#- z*ca=`;X8-(5DT!^yN1u7ub50vaLhBiX52LW;i-owA6HDK*DfC~N717L*Nv_Ql_`h5 z$!z4+Tu-#i695kKadgD$&5$A^ks&uq7u=nEatXO@v!wU_d$7Ft!~@@l-VB~HV)om3 zE)lKQ+d6~cjv8{`mf_WNztxItLVFhb%xYSD-~dg^XI>K*YeFhwV~wNEku>Y-Lga>@ z!nkFv)T^n^D()M$DVA;&4_t%Kd1_G|59`;NEN?WF|EnhZ zxBG{Y$QZDNG!|ajThAL4)?Rx%HV+TtlOk_sUexgiskSchKtHr)`?StlqrcS~?eL_v zoh^0709kWzxNNCLr#WMqkN*u3uls4?I^(K)ho$R`n}3Yq#}x}ruxD2+K~I0ezh6+x&s2yJp|3<%|y{QvpW0OL&LRfOG9(&*`(=D8sj0JH>Oe+Pdec6;W~}Z#kYTq zxhSI%kwfyz^-a4L6a7!55A&5y=7T()cY z?6P(vVpkDri7-;c-XX@Wu^o8{j!w!I08tZCk)E_sx;wdW4^%_e0E#CfB)+i|*rK>? z%FvkJHuOE6RsKE0^A=A0lkDbJRsK%r)Y&W2(wz@;P#YT?Ah?9ea%0-Vl~ z!QpeHnj3dxU-HSc#p7#k90YJf;VZ6Bv{*Sl9k3epe59%#r^5MexMv7Um5jzth2dc@ zCSMLoU($t-=9k!mKyN54u~x6EBg)meJAIs?#gwQma11^QjxriqaWCEV(+YFS@U~L& z@}tr``Rr$T2kYQeuw|bDU$?u8<2T#9Uc zOj=iuJ`QCa;z7VVNZaw2ns|h(i)AeOj!FPWVv9(vU|tp(4|M$S3B0+CM2auF@XSyWTKz(A$Q$)p{GNs?I1`lF?T5ikMk50!_hWQun&2mgC1+>W5paYbv1#-eD8 z#8s)3ZGOI{F5L@fhjP5?2)a;CBb!$~xsDt;A`SD2XCxo+Dqt->g-RQxQ;cW$fXh*y z>0l8)46G;YH9bmoLw~$KV$&&Wn-F(MC2c+m-DM=ytUIxee0fwF`329hksm8}N#mtD zc)rK4YwAy{O`bwW_@4ta8I5o+qCQ#P$$s%UN%fC^neT{$vqn3@)T(Om3Nd9MV-BW0 ztwsbMQuQu<9vo#fQhe)-0>a`0&r3S~`~`5di3iUCM`rW=fvQZ1w^nwmYbrIJ9vqhD zInI6&9A&ipi77Vui%8@}NyWQfVg^bR^O=FR2UG#KU<%ZCd83u85IT?==zA}LpNxcR zAU9+1AB-;{mA{fS^u5e9q$&A@S=r?5=~7u@NqaKwSM>=6Pv^0h@jdj7r;(wx@6pNr zlWB-x{-~5J{I$eZ_X^lzpl5(B+eX$2&MqG5*t%Fxq*iZC7e@NlS1{XUG=y`g;7QUL z=D)onS?SDI!Ld#}cosM^$4?*Xs6lW>#M9E=-O$`*K~x(ZoGV_%tIKFae3fIMl1E;Z zy7I(tnW54r;4H~NMu}`Wot+8;M3_p@>(5Lv zm;H<=He7T*g$P?pzC0$q%KYQ(RcK-}dlj9|9Trr)uht!jCi~m~9R>GQb7alLedAUG zdGWaP1|Pr1R#ckK%#`eHZtAykdUHsVj2cwEHoBssG|cP6bLW1Ggz!e}{!50+2zgy{ zh!4L3&9MH_bY^B=J(U)e>8dl-H|T8LT}kYM^PN2FO?0x1Mw}(DQu}&#F^Rk>>3G*$ z;E45^rZltTQn%UD)6biOfK~RlJF0uI>!ZW=-do@(qmj)5qDJqY@+vI$_Yz0{+jwgX zO))sKH6&t*Ipe&bRvG)up?Y-{`;I*RHdd=|kqoQRJna&W3lvRYoH#?%T489Znp1S9<3Ye;QUzxj))m;rEAKin#`F+O2DE4RpBs zqCp?_o#%c49b~Qfz^W}*l~2nKd_YfTLy4AV9hdI6>Kc63K9?qM^r&$7SF8v!8o;(t zuQY#?lKv~bNin)RyE(qCTNM!+^g*qXt$H7SgdzVHNxbepm?h$Pv(~@ie~Z(Gh)*lD z8myi=w_Vw7Eqo>pe~iJ9(a4G^v)JK4cG)M`L=|fz?y5S$QSXj=dTm0YGVckMkh?y` z;wYn$&DZkf1jhi2v!8!Tb#ATGC(=SqtKR1g*C*^z;(QJ(_0^w4=WmmO7U&FcvFy>$ zhfRuk`D+d3%;p*C>AR=CHD#J~twH0P53a%(7QB^APi=zJ#G0ETLac+%t^D3Y`xRbI zJD$eoRvwJ+r(a2S_Vhp4Y^8DhY__UQrgSr3r_?!2krr)NT*Wxf`X{uO(}?1$*@fGK z$UmheW%Iwl5?=xu&Ck9B+BhE%s*Fg*sOB`Syi&_p{`p_S^XAHF_-4JgmR$b7l7ik- zY-+6pH#T2|CbI?K{K`hJ$Lr~Dvve|UkDh{pavHKkX25P;A1@;Fho#x7&Vgl{cn|^o zg=oe|TU=Gi*En^S%4pE3?e~(~i*QbITW+{$uAD}=vlp+=ewf3)a%q!za0Q^r6#1J; zeQVerufS)5UC`CF>Pg*c>~7`Fq31t>sj9%WHR4$sKVUO4ejaQfeOhDOs@E;y_h1(895JE|z~ zG&2=>aWqIAIfBTBxql|!5Q%0JP-#+(m7IG{?mxkorO(NslEPu^01A~9G|tWnvEbv)zTqd~+(c7BlRa<#kFHmcrpdW{rIeLq>*U2zG^Z)|Do(W^X}T0P^~J|7%qG~zx<%D40% zUPg}0&lRE!|Fj^N-%egKs-e)+)NKo^jCQ|DTNP^L7(Zo64!0@eNMzvdwS}y^drNYK z2*Ae|=JL+e#iI&_yWM^tFSOPN4Vu>WDvV!#!9S}M3d(3~^zw0#;Zlj??PcHyubSqH zFjrJa)n)oQt}!aqXdA+bjsnL&mVu*;M#LjCsr!$;{-H;IMZ>Ekw%)~Hi!T$+7-3%~ zXU1(v^8sHlp={|lclZj6{-cY*Rz|~`zY!mMZ1(f;JqwoP3bA{drHtzZqg)NWnHnSC zV0Ks%I(w?u5n-=?^HOk?(a3-v={$MhnZGTSIG(edbtugpVIyu+I{7Hq+h|Yra3N2) z28k&2^zO>#;3%U3S02G&`OExgmP;H@oSQ43caIdjLerVfo#Iv8lU?zwHG`8!c!db$ zFMPWE&bT9~^0u_9V}Tm38mFT7ugI0pku|e}(0t&`tncIsv75@3P+Th>L_~if7^&O7C7wZdolUy7vOiP;4eRygBnHbjcp4v(p}l39)*uzFST8 zEFq^a$jvPpPa@9b#=?gGiVGz*ue*quC`|!ih98a#HVtRi^t2%IEyZxn^(D6w)cJ z9M|3xaMpJAE46CU&q0>FnG|3A4f9>eXPne8SYPuC0*$w3+?th^N+sWF>{cmlx>jG> zOB_OO)f`zfjsl*{M>LUN2okRkRIC?hcs1*VzG%C;O7OJ1+cU_US^Z(W4R?m^O(u?!*Eoc87`&_NW z>n^ksX(UnXDNJN~QVezeS|w%yV3r&Sa)R2bR&vYVkd%3K3yx>%Yld${LFQgfSK4JpctkZcmN(P7a`x=hnjE&OJrb)wdQkGe{0KG70a=IsDzd*^GE4& z)n&M*`mo!f^VfDZY4U#PGChAr=0=t5M?@^TzECSXUX_!;JRdZ&9-y(#tOqg<4oOgz zex=N%kExGrwpoz`0-5uZyTUx-zbKINk%C;5@@;&GP#mOT&di=1(f(8)?@y;Lwg=VZ>t;-x@vX#=PF|FEwh}E;mu_hV zCoGOMoSDsZm9DwN&FSK)jHb?D^J&QOR%j(_#g_(0!ufc_nl_17q@686G@6+$K_)@n zrB#`#>lzw@30*XxBKz9GOxBD5uwraDQnxH5i?5KnYu%NM8I5LU%rx!Ij%p5&fvQME zt!vf`s}HlqV&O3hyK>kw3wwG!^R zuh)_FVd+(U9qd(UAT)bbO-r=LpbE8ndQ!1Khs7q4hdVGO#5T=5(kjht*Q&3n-F03BDw35oTmz08JaL^QJ@ z9L9N?Idem>1>5nMPU&a5u1|uij7Cnrv8a$}@Lx%3mb)Hh<-^h#2}M&3qYVQz*Aruz==j0X^ugO#&z@P!rO3l7};xFY;!x z;za`nW$j-Uk%iYt-1OHnZmpx-x&)7^Lr_`cUH))A@78pZ)U~isSu-XdLL$$=rny#{ zhDF!mU9otz;9c2Rv?x2Q$*xLoUrZTvC~I`2_BuL!#9A`BaNcd<0Xw5tnT}^A9movL8W}_+SuZo5Ue*^kJ-pt~S zes)8yNm0!8>5`pXs;)DM;2W0)x4&y1%9SnS##KX*{fG=ju!p-|3@^^!bz{z@C^jXW zb`R&Vbhd`ttjeb9Ao=Ph$dxz4T6Q_I=V^a>e&M`z+bua-s^cInrN?^7Z|Ldu3YIFt zrZjh?ys8L!`xf-OtQnX<9u`rQwcnb<1%u7*s10$=Dg)QqSl1Fj;g)^3p?AkO6K?l` zRqSeE`Hyn+N`p_jP&3lh?5^(i)~A~_$FhA0h8!aclqKrv>NA+q9m zoKX3Hnwz(9;-8=z*q#E~1X-TTowZ_y)MEfg;gj>jb4Z5{oYbiyIY#Z-Fv_hOJB$6(pO)tuaEHQ zPJ^?ruHRq<>P4R8vwOf%Mgz9U7x^vw67rqB(kG{CALBR{KVKhAsA`3_m`=}W!meIh zVN~wjM>&qC5iVGXFBvV*`Q<+8txNXjDvFJr&9y1sZf!P(ld3)y((hdRu~f;L$+mqp z_U!BXb2WY!`j}dXG z8IPPeOC@z8a6d@LTK@;(v|QF)vGDjuQ&KM)U5f$xilsK7sqhp504;vp*VJ@F6~_$ToY z75GQ-5Eb~gc!&!8y?BTUd`mn;1->aBq5|I#4^e@~#X&0Yf5bs5@OR=M75H0mkji^i z9HjDovq>DJ0$&jaslZ>0gH+(J#6c?XC2^1nd{G>v0$&gZsleyOK`QW<;vg0H3vrMN zJSq-SfzOHuslX%RK`QXDc#sNw3LXU>Pr~QL;|XlQ@W_e>sl3OJ;@HikIqyis7Y&ahKkk5d}Uhx1GxJNud1@0CP zP=ULUsEWrxsqXM@A-VBe20L6#Le*r@hj|ap9RN#H$0V(r-X!j)0&f)eQ-Pwmp9=gG=fgR#LDljDOqXL8CJ}NLE?xOKQ25~PHSTF9S0v+OBD$p+Or2=i@UMjFw+)D-4hdy7 zaE?jbL**I8JyhPNDsc}LXb|^MftQPWsKE8&9x8C1xQ7b-p16k!yiD9f1zsxdp#pW{ z9x6~P?x6zJ;vOnc5cg1lyts!7u7Zq46?xF(cio2-5 zB5@ZLI9uFB1nl zP7-%QUeUkBosd^_THLt_0*gk(ooYOW#hsVnaYEd=5|2~j&c%5AOWawE$3MlLGw}F_ zxC1k$=u2@2Bo&<$cSP~{LfqlQI?$G1$k+_4y z<3n-Bg?Ri$+_8dkdtcnK2#-IDJE)}h#2shj@vgXoR_ObqxV;~bcf{>+JpLeV599HB zal0Fjx5Vvjc)TudcjED;xV;9CH^l8!;A`S`D)6|toeDfAZl?l&CvIPX$8W{$RNkxN z_F~MxqTh(yslZ>0+o`~p#fPcDUx^P>fiH>=Q-Lpt4^x59iw{$QzZ4&)0)HVsOa&el zAEpAI6(6PopAjFX0*{CfQ-O!YhpE7)#fPcDC&h=0@pwXfn99qF4@2IjqQ}JnD)2FJ zfC~JXI6wvdw>Urr9ufzrz=Prd6?i}#paLHe2dKb(;s6!6M;xF6cZ&m5;7)OX3fv(M zP=VXU0V;4n9H0WXi31Q=v{l?jBqw}`Z!{^UcvGDeUC{TpMD%1@!m9n zjlH*~rZ?>1_+%mxtMi9-_QHG5$|8_qJdMP>zXFCJJ*Dc(O8(g9C)lyqSn688&groV z!A#JZY_Cr=TgZ9O1GZ%C$Z_U}kPg(j}CQAyfj?ha0GZ?bl~%<))tm~q^21OqLnkz<>2 z8K=}gwU|6}L}Gd3ncPa{!pWtRW;#%rX6B60SudP*{`4E>Y$!Thw0L%U)*G`_=iD>% zi)kmO8K!QX^6x2EOn!25Y1Vn-!S@wY#pO5ow+_5ES+QEsZq%z)Dz#r9sPOpp+6t9Q ztEDO?=)?+KCD9+tF_npa#v%aHQqvMpkMy*w; zc~1HxifZNFaCb5RK|Ur(rQI0N`n6sjg8YJBRiO&#)fIXHe|mXTit+`NY7MU)6~wPm zYqeWXe5gb#s*uU1#M1uc3r|tv<2?b)SQz~WHeR6MwY*Zj(T!nLdptsgJD`I#>AkuNw@;(3@cF$ujn;=S z%>cv~I!Rcg)@yZzQP}tbMq%tl1oW-Me(Xh--PE}C=)2T#`Hg;^UM*-m-U^*wi5Jmo zlodL+hpT|SVmveff#XIyOsQNWAn*E#Z-PhhQlnOKUR~jpU{q@~T5jt=atiF~?~ruH4Eaxz z8VWOn+lVlBPUBa(D|j~tNxYz`(Btm8A`rmvYuvm_raCoCO1f&-I1|G^ zj=s|a(P9OFamvN;1beQp&lLpdFXn&50~IGwPD*Xtf| zF2Ve}65P+2f8)5%nI~~~^B#>VfF4qV7ae(Tg|xWmqr8~p*L-{(_fazI&(wF(BNa=R-8J$g#3RJ#3sY3<;&>NQ%uuCR7& z+dW=)<(O4H@Xz^qqg8H%jVskUE>Pi9tFUzFG4=G?K%m0Ssj-6Sz~18@Rh?ghbBKb` zJ_PR5&#V4ws;a1|!U8Adztr&fCcKG=>5W6cNjn1@=Sg4b$Q zTD_Lzg@82HJdeqsMu*)*P3ap*I%BmGRAW>Afxlj);I}M*C1EA?Vw8OqFm`a)y3t|0 zo3HTrkci>ayH$ElGE|=9)@W2VWhZN5f&L)qZ>> zcuz$DE1%Yl&e!ms!cgOjfv*JohD+uz+gkL>c;-so*bMuP#GF(5l!6!2O3CwJ9#E+& zJYF@HC7sW&_A3LtUp@LMRjSwM5dEJ2Ld*g4GyD8Z=G_$q&C!Vhr@?B#yXh40Y4Dx) z>*<%y9Z>s_2B!0jEqAIlNKInv-T$R|@tQnyexp_yKqM)Ll?T;6D^xHKtfgKpj8lz| z1F)RESoaFcwvxjP&=F_z^uiLS`M(!a=20i8N4;U@9mrq(6r~8vibNKd<0yd#47P*U zjrx|&z3t6Syvu0ljc1}>vC3wNO=FPwhW+%pc&|~bVHk&PVy&9z} zRyf~%_a%72<4I(Q13FGVLUR4DBq!7TGPHwN-4E^9%~sU!)Miu`C-N3Td4&U}?^CQ{(Xb|($7wpypTy2DlDOlSg;!fEjpuR=i?iE#f=ly9lMV+lF( zs-)kE-{PL~dK$vJ0f~V>&*xe@6xUN*4Z&7xaN>x*VE4X0yG5PgGy3kzP?ZO0^*mGk z{$mg&qXB@Zm0`b7{iX^U??M@ zsLV6xvq-3ykLL{cj0TG!ip~3m8m~%F*_*@W>c*N-L>-~`sU@W11VqVbxc+zIrU+#uesn?_`vZSQ zXH<)Wv(d54*gI=2f|ql3SbJ09ggMYb`IRo`wfgZW9^-yQhHNjdC0D#JasB>Zz|}1d z&H`5kWYQyawyA4Ver3pP(bVIdb83KAQ?EMyK{s1Nn_(hL3h(w#I4m;ywl9ksl0d5$}26l%i-f18q=>l!H`oBolT ziy9ac{e+x+!6;pxueoXDEVA}rxtXOcX4I-|h~Od`1!z&Oj@H*jfyz9$^AXywIy1H( z*el=qHL3sGOsSIlxn-wktSFW=MP)b65k*Z@p4JpWAy3{!YiV*ssU9gKou_g|B@_N4 zd*adz&_)n&Fs}^A__P41kS`s{ql#)HYFDBvBjd3lmz!NO;ZL%$jxX+2kol)^@s5-= zS`imD9!;pT2JC%QVRcyS`KXN2@6dCau^5PneoMrT%cKOmv%W_B0`B^0JxdhEq(vZ6 zk&jmK>*(b3%g72|bB4K3^ivXl$1e5Q$Tzuj=0&MHc?Bw4JvROQX~jqhi_%YYQy!*q za4d1ZwXd!&DTMr~bYrczqZJvu%SRTHTNER6i^h`(_vX=6T&rHF=KbX_b0GqaW+!D%tNy@r_}mh}?W?8Ts+Fk;3=? z(dmr)SO&k+ZD{P{Y&w0fvP;{Y2>U2^)S!?xBRS%g^(1iCNFmwkmKk8=5C_K+_oKnK zwg}(k?KK*cYKO<{W-tDS86(AWNN2;_Z zly3I%yLlEyNk$`a*R3@Axs-e~OJX>)XoLoz4$i?M&GdDrdfdi_ep6pV+-!-b^^D(D zMc^kRW9qE&XBw(Kw4;F_RXj3(uAGK&hp$#M)Wws5R$zN>V}& zFCHl_8c!l(*O%;yf+a>STOz&lx}}V1*(lR?Asp<|`>H$A8D7vM;1J6bcBL9lr8{$1 zD*G7`{g$=l^Q9w&{MGr(M=FZzI>L=MoPF^s)ZlE@0JtB#5TPP#CPRi7*JhtvK2oKi zfTBv^pWL2@*w>!UP&L?wMgQJW_6h-dQAm)XnXSHNMKfVB5Vcx(MD41i0 ztLu)aoEck-%Vamzc6Bm6-@gEFE~n+uI?46^!NtUQ;YcA_!FLg?2W#>Quw?U^t2MS) zb19Eg2*sK*trikjU}PS<2zts$WZ?R0V79`JU7}LZ84WepbplmqVcVOn_Y^$6Lsa{ z><;w^a;dP4(hP29YE5tZ^Bt!u&z&aSnkG?$k5VVxZ|aWC^r4bdc{(!ICvr0 zu-RnlX|`yS@fwr1wb|Ly%q;5grQkB2LfnsG{DBm|D7*Bs5n$AJIa2*jPUwvo!bv`A zOynJ-`Q(nZcoR8|98=s~o-bUO{e10+K|$A>)uT3}@~50mP9Ji%_Jw?UzKM0o)$3q0 zG7{1!%Yd&WVZvvhU59QdWyg(cClxK3r9;5yrs)T#{%J~)f;g8M^o7bS7z3J!&Bmar zE#4XDD#NI_S=rsGO#0Za;A$s48#!&X@I@*4xl{V!o@iimou*?mv+s90`h9$NO4;N< zdQ&wINE{aoOWus)6v#@?7u&qoCE5IAjo^kcQGpv9+O&{%g@t%?x}I-Ov}%-{Ou-pV zP*6@I;^g4!Y&}SYQ;nOOnQ}B4n<>}HdwY^xO`N!=svRc_<0-{rXx7LpFlF?B8ts7}IFN;gE zAGKpPEpHYFIWS_FDYC7dwC&s9Ix_LLZ_9lP7G=+A8<7gr>D%D}Y!C;Pz&TCkaZaO+ zb@kZBWSXrgO`Jg4(2Yag9I8`2#L4TB8j&8;EWL z9YJ~P!2NgGvxhf~7$v*Ag(g$SXKtTyZ2C9TE}n9Qf~;8Ed1JxuuzJ&sYPNctl9lal zRg)$W4SH4PI9KSngK>16j7G#{=z=XH+snw@9%&ea1Y2ysH#%{2jaq-)92J6Gtq*x0 z1%5Xqz)waZhSZ~WDY5-yAJ}59(G+Vo*PI;ypA}k72|wRgmu|Ia7~6^z*ve=u(qnxI za-;7~N#DRjX~vNzS~HG~nih4G4>yIA*xWl@A-FwMQAI!29XXA-{qKE`xcjAvdt(ON zu!_=5Yj()xareg}yw_9X3fSuHRb~|-*J9Y^&BU!JDbId!?T80SBe5Q5NbvOa2IERT z9g6#j_d5KGycq@LN-o4cV?J^8UUn(Ddl;YM`igTOC+}^761W2y9LuVXW?I`~0;i3q z!@5j=qn-RBGqQS)td*Q_&dx(xEGF7(q&K?a+L1z5|0Ktx**j*=U{|M-KEk_8jd$G@>S^&<=B$VlYG%ul6L zoz@?WFg%#iQ=KK!S&5?qXA^*Cb?|n;>L5h}XC97BQ;OXAHlnPq{o%+gK;=&G6ODUV_sp?ti>q@s+ZciTwW3hs;qZr}`k`ocSgI5NiAu)?+@8h(3`!risQ{Im zwr84=+~Nfw9i20l+eZMri-L{c{s|GE`)U=Ln|idIJazj>)qfcHd3TIZXrhIq&_uHJ zU-~w@c?YJujF$g46w1~oW+GNW3Kqat zK?iRL^mCk-PlP+t`m_Zg^7oD)PkekcIr-F4TqC`?jJ$NO#Ovc9V|B(?e5|foLyKPB z-sJ1n+PmT{;S?~mp(y#@Pw>^1k?6(5I`ZI8Bwk0hKrbv1RnUulI?RI4SIapnt2%jA zN1H8JSVoHo7CkwQxObwuM;DQnhhcD(&&A% z1IB;}WrLz@LiMT~f``{MhIPqwCugpu2m1@i+MTpd#*>iiV#DB_KyB{_cS@i9XLd2W zrw{~eM-lI>ipB$i5e2#eJ(Y$|a%|5?$+-yP)9cPW=^Otupqc+3xDih*Aw9dL0laq) z>jH{Nz`p&O4pnD}?+$aFwZ8i1R&@vEjnscxGj`Lt?-Ao(>7_&a*bJb61dNf@rA_s7 z?zA%Ktky@d>Ump6rH|;<_IRs0 zmDc88o7}M^{Tco4e) zIgJdxp+IJ95?6Z992_;*L73}eR$ukb8M~&xGWDY=lNF0;2JU1WLVCr)W(Z>$xUp)T zAtKn?^|&uF>BFsVB0hnIPu7e=L?6`vpYfyV*=bLXm}!lI!6pnmyV{F()H~apmUg7$ zR(o6hJ`#QkEM%<|XQev(*Qelrqej7C<7kb7peZWUIlZ`Csk2XWq$$4PNMCe2Ma&r?bI@ezumHApcB*uoky#ap~Quk~Avx++avpI@4Q zA|-1E!0%0$lU3P~|7G=Ps-75;P*;4DidLeAMhZst+O%m?v$u?!!)E}?|@|#4Cjg-%oH|NtJ3DO{^kv|`kI%4W^%vq>?70iq6imO6SlcytP zh=l^xEyo4FUOGJi0Xd);lB93r8DM-yO9;IEx&d#k=4vemrf-lP>CY4{2pWz7XR5n6=$#jhl0AOC|560O+A2C2;uOx0DUoeh=NSXf)Q%%)P)^F;wqXGMbU$y1esGGNJM0(Zloo2J->QRR7 zDs4-QimcHD@UqeGI1{BkPEe8E6 zqZY6TYHhu>zNyO=ix9`xSf%96tg_*=Ul$l{nRa?A`QV$86~%W>Dl*MV%-lBPw>SV= zGv#U=04W~2EUSEW!T0iqzg>{TmI}SDv&GG8>tX?OqPHn-)zDcqpBzw}288{18sQQ> z1s~y@$)^h!eczpOI=?24RcrG%g;VzKUQGjlK{Nh1#~5y!a(Z6TcoI?E_b+^GXt}0$ zr<`V&zIcVaFBpMAG6iGJ8fz#aSk0#PhMFcpVC?Frot|Gbo`eXZ<8Ux3j@_fvP8V+Y zUYmY8e^o=1&6$B`QcjDG4|X{EG_9VF_P#JSVkj?-ybVfpS|HM>4kUC07n@5 zShBfKAJ8ZTkIkBKhxFl^_Cgn)ngNb78acM|vy1Xr?d@kvDqb@a3^Ac;t~vWgX=?mQ ztI*pQ$GJ!##f98V#b3_^Lm7>nXnq{)#OdEoMH#(A3(3XjNP5=I0$aEMq0ymkZ`PW0 zyxEr)9FFR)5GEvsx^y`WE>lDNI=!lBd@FJOPXd|tum5FH_VSv4pMwQ->vQ+E9lFM**lY)P}>8 z$_||N2W5q3N=ue8os({HEn#uj_Z-Wcq6Se*Us9VX&j2rIs3 z-s$-ZC;kO-mp84-D$7?!@+TBC$hrlm&n|OB8#*XZGD1^$JMUE5E#^*~=&I{D*?Y&yRhRqY+0@<5w)D0MSwl7fLYQ;TR7%M7-uv93Oz*SP z8|bnk2ojNquZ^2P`O1;S=Lf||%)^Ec%TxngH)$6G{;k|-@-lE@!RE_NV- z#hKkJ{~-P-Vmv!2J8 ze(-{pW30*fd$T^Ye?-0_!`y~X&=Jl(hmD}*c7$wG5eU!;J(H@dUDarv1abP4KOSst z9D4(cb^jy+{eN$pGhfuYx??n|U=eWVO3dlj*RqwIyqULaWr8@jY`=anwyLEpa<&lV z9C7D%U($l@3Co|2mE@McA}|%B8MV2hw;Lj%f|k=!zV}dT%g9m=nNe=W;y-l``2L4j zF)(437HY$IU2#uICQ_?XWs6STS?!z1wTDrgr7SY@lW9Ipz}drSROjVzJ}y#Wt5*V) zuxM4Q3;JXO&#=x3anD3+(^xN$$p1T!8X;={X-{-_i@p0=dszb?8x_g*xK-?N`{cHO z$(=Mz6}(&n^ZQzxN0xHP>@noALjvbr98eD z_K<{7`&$Rb-ay^(;wKQPdeZ}2$S3x9>-N|rw@aRniHv%pZWU#e+Kc&gNG<{NVW+v< z51_fdJTj4d-_@jffIqy*M-I05=g5jz*euWznEonj-wXfP$5*_8+Xk-@b>;odApUk zVQ?DD5+kGXoBRq9p^o7yyoYLS7+%65C%#mK!tnxX!w0zUMKOC+L%GCqr#~6V zDMU%~c`?54B?HCq7R#JK(gN;Pw9%wgl(V50c`YJIz9uFgkm8eGGCXMRGS6+3wSbB0 zv?!%MrdoBB+(_I!1pwdcFK+?)X(_n_;7e|h|76$Pxy#wlw85#8nrhUGF|pd=i`tUJ zb7gD)Xb+jpK77f=dYlw!-v_6Gh6Ggvx)dvxGTUd2?HtkB3`4xp|sd@c=?jp zDu!?=U@ZB}^_W*|#hQjVlqt7llLI7XJ^A|hjZ*8p<# zK^Q;;I-Ex^Bc*^PC4gIS%8zpi_8Fu^^d#6R0v}dgYiR58Mac8du3K_g9_${L<`le* z0S*>$1rp|F1eq35Kcs8mL|$WPjci%A1UaEAZJoQ}_RZXRJ}_~h+lM$X6R1Tppt93u z6)rAtnuU`qLk?S7J0?Vn+)dRKj z$kC6g1^eLEEb6wwpS24EDj2{p{wzKj{x1Sn8R~`$*b@$1z?LsDx50TSoP~Ei3>(uO zF81!FawGy;Ab_dlY`x*H3=A(-Btd3fsQ2<*61;0&=N6akBh#K1JbblqTviz}mMr2| zT&R@`^T`W1F?kLf;u#d#x_l89PE1TrA778~1aIrjj7v9pTV&jQhDKfqQOBML*T~RR zs-#ca-t0Hqda`7qHP$$-~^bdI=jHsQyO1SEl! zn`Q-U+b5PRy3{RS6gfYJ|359D3+sQ+yBuc(Fo#{*sc~E?3(AB>t4Jhh8r6X`GA!p> zTS>*%8XN85;YD>(HzkI_!R-N;OkCF8xnS-TT2k<&b{UY469b1EJkoIDL3OM(xoH_D zdG6tzCi2j+H^1v$)4K1C2Vdt*{OL8zoQZS6%;&$>M;?4z%dyeDVq|j2Fc|JXvG&o` ze_ge&&pkJhfAI+Gp>%pJZXUdr&7KgMv*Maf;*QI`h>??p@lKgqLghl_I{01phjFxb z&d47|a7G$uPOn+GbvU5rlTej_(&ls51x2VV*GF+4^paU`9XOui93j_7aqZ|x`&f*V z#>Pl-cbJN&QOVMErs9aCtZ7RvLmo)9w(ONrG~(nJJDu%RMbPnnQEGQCezaQ?e@-`UV#)xYcQGh$|Y-zUw)IztUNZC$BwxN zb1haM?4EgmjfUdX^gUCaTMqDkMcnyfh(%>jIU+yt^3`)s1Y1zqclzq}P^+8D;MNr* zDqi{0UUTuPV|}D>dK2OhI22|JV9N08+*RM@NVyZjid-cMP2{r$y!3l` zgsMGz;N;g{+eJo-xC(cE^s*8+(rkbfH@{PEgUTkX#PUXYI%a`0;4$1Mr%Sl=FXfP# zzQdR|fKmQMiJ#&pD;RCmj?F#E)vl^4c@h-WWKu3y(10f~S36q;wd>&l3iekQk>{?x zZYw!m>5lkQRc`*Uu~M8er%8+L0h;mw@X@FDs}m7U;{F;IcP|f)ynnxvysOswU#_vA zsY9A+=JX(>aqlge+!Qkd4m|6GnKxCTLY%aJ)ms}!dw2i^hwh;Rh~jH>7s_=_uEhiA zTZ|m`VqwsyNMx-|M&g1hhaHc{o2Xy4heu|w{qU9K4szdWa@lp=ZNh#%SIPc`N(O`_ zy@QHIDw<+m;3y$&J49|HpSr#^I@-hQq-`fih_;KYetUO}_rIfc=>~N$O*bfY%t@2LB%HHN9kV_R-z2+8#w5^4tFB!5By~p$-jNy9C?1a)qw`TZ0OkFt^ISz zv9Sd?QH!kee*o`cGa&R92FX%ogl?+tmn7=`hN>3eCeiU3jCv1?oY-_fpTqQ(nQj-1 z-NqF&mikXM+p-=3(YIfh|i~%@B!JpAS-Ti`}Uj z6Jf&oshW&w3OjG8O{D+b5ZTKk6F>XKL4tVioh1A2*1x#@LRN8aEAvMJ` zA$Qst%$51o{qtL(S?J|K8Ty4Ib{YbW>~ymGM`&xfl>?VgN_s@alODj_jg3uHqL zYx|4uK_~XGNZ;+3z&y^9xj6(~85>OtW70F|gRVwDSnRk=HS8LC>+Nhsm-0v- zb0frlqyS8z+q)8``?(V8;uw(}d5Rz&^T^#l8|b7i6;j{oVO`_|A^PiJ zSykMMddHm*x0J)C@Z}@4e|{$~?&Mt^mH6ph3q4$<(~$sGvgfo>WjRrCb2Gtq7q-0~ z7Mc0aKVm~*^)V0J)vex-PI9Nl&V~CyDVEMQQ^lAgmX^fo3a+*L2&%V~LkjO)*~ull zi`+!ILHZ&sFc$yCH5V2mafLM;BalW(Vr!*u5cHej3DjKGj1IaGAc4fq!c9I`4sl7rid4l~&#x#50%+)E};UM|(m&EJn()Skf1X@r&B zJkYs@dFc#{%v!5#D$WFAWn@+so`NE#hs-5a=Ci78ocrXd)-Zp0divuSbN9??HmZcX zmetFNREf@-ttzD_inm{yY`qT>d&s0uX4*fOzpsUcbS^|+{saVJTW6z5xEqHYj$lg4 zXN~Dqg+#<+7jZAN{!g|xjP~$4X6%#i`r}R#|73Rpz2{R9D4sce0R+l+NO0w>TEc!U zosyW#b-5)f%JG+?<`-IV+TW%<0yJTbAX{^?m717(3W^^2C*0RRkWnh>XQ6-vyj;tsaV(bi=GQ3s^Zj$nh_> zhBhrzggp1mTP|X49^7kr4b(YTbf59ojx-j7+kFQGhH z^F%AW-Q0{ffs{>&L6*{?PStdDk z#eXdxRdU(WP!gI|nxqA8$o^&=wZaT*!e~WX(!}vJ+iS~m=T2cUhtk#h2&$i&NZ5NqUayF4|1Il0+Kw*=E z{gE901tykQxF`-2y253OqE^L)iS>)tz*eglQ#BO_!ay3$%OuSzf79Y3g)idHc=Q*n zS#KrR)Ugk~#HfD}H1yr?Usz5812|+qqwE?`0{MYYVlN;VZ zUUUE$|Ij+L!I1F8^o+|NF~}T-!jv+`ez%3(^M}@kk)=H3pgcZFUU~Z5_TKyI+E;L? z!6A3i`HrHa)}+v$vZ*6-idMrbd8ECG4E?sXd6ZttB8A@`oFvy){EE{a=AHN* zn&+E2eQ?1mN~#U#&2+Vp^@#&Hm)RcTddv4pYiz8SN6sD}yK3&iS30^CNI@pku68CA zQUWK9DhuVtsk};=VWmJr)ah$5L#m8&p%-^6xmo5T^S+?Zd9nza{yk7FD z_5k_t-*9XJ{G#Fax`jC9C`&Vq;{)ItO}KAD9=nq+$L)A=&OLX-?{To+`VVY-NDxvRYxMG~*B6qU{~z`~P6A56c#r>-+2Xu#T^L6}t=6!wIuWfgp}Z7CTf8 z%J3wd8S1PMFlaD>$+PYsTlmcY+{Jmt^!Y4~} z@B64f(;7*S6NOVeKq> z*KHl_<{hi_eYLp>!R6Po-dCr^3kz2!Y6i-5Dj9PH8kF9J@W5O8+LNO_WH@J^nIuPF zdjAgcdS9DYA@5n$?kGjrfKTq(6^vJD6(tl^gN%bQ1fn7GZ>!pqW4&Z@>c=-6AwOKz z=9P$lS`9%^7qhXRoHMT8t(Mg(ALVfeY7J9393_{o!Hi3dv`0pJc;syB(M|x^_PIw# z+E;bFZBMgdp4_fWh4V$BaH{A~8E7R^l!;kMlViPP=#f5ogq&K_<`vK1TH9v5z)r)? z!XE{;K+dO%1c52!e`mdZ@jBWGNZgFb}Zl zxWBda(|;Q3ws6ZxyX*g4U|n5~VZyPYO006Pz$*9H6uRhv^8ueJD(5lLGM6}2p~cmx z1JH(B+JH9P(B3fG!z0hnJ~nyswim|9A2)O-%gClSo5k!j8}P{;(y~z5m8K|7xM%`^ znt?s^q3qez-aN9D13Z>{4wB~zWIIm(ZeRR*GdDtP%qKTv6gE0CC9E=zl*V1JNmED! zv;{M!mkcEH$62KwGAW+i(&lY6U)hRjgVwU4o}4sIS%D;8Q&UB0q83WY8swup+gr)t zHZ-<}MW{~zWD$8b$4Poyx3$N&Lm(87m!q|uD$`O?$oBkWU+yu+yILLR9;G(;z@m6R8P^?7%}X@i1d;PMP5BZzOkn} zw9jAA?xX>{4B#HOcl@u$S1qIgynt1=u>o}4%~6%Bsf~=-qAgAp3)zAQ@w12V6TM`( z_hzu!C{JLsIo#Q7P*FBej;m;0qcs#Mp-1koSo}sg(~+`;d}IQH)59ZuKb~0}jP%+> zck9`+j~gM?!U)wXVx5I5NyKpMDkO{=VmsX4x>o>nVYJf({Xt0V;USFfFz+2~xTre`vKMm=W+Ujh24|}-zYEScMoHbm z)T2efRk98K`o)mg!y~g#{_7wMEVPx3U()TuBZs&R=<0<=JAwwLK{YF4b2MC}EZp7q z_Cwf!mU75!!Mp&IvW5KlPW+NupVii(_8?eM0_4|F&lub^-|_OLog2;{kmlN;vlpxRJ(JurW=@mShzhjL(`9LOYH{+e77aem630Pv4ldDGiluv0~C? zt7_`vAo;BjAM{W;y<%F_X7!2^i^$5z%w}`hpE8!TY4U^^>#Uc|x^-FRToU$^dMYWS zm@1|4#k2O1K#?Y2mEx0LGW&^n?n)W^iBhFhI2qdH&k1ryCGHGQJd;DUKK4Y%km0cF|111QtU*6&bEh4f+yAh(dZ+0zon1- z(%N1_tOiKJHsV@XRdQM?3NzNGyp*Nk{u56UtrA_{Lneib$}q02`P&ZiuoAn-`MUi= zg~^C5*@?->ty6>A>l8IB^?*0&x7w8$dU)5=X)g-MsDnjE_!6BA=9LdfkxIiF~%EXJ1 z2$f5Vk=YxttB<{N>w5Cd(%*KHCw?fsket%Czq6?O->++r^N=w{7!}r^8}zT6U;D!~ z;+4Mw(9oY{!oCY{+;ql`ciaRjf_Qt@IS!bNS-1;!UVssJtz&7TD=vgmbUE(-37F7v z7rOWJ?f!Aw85jJUF2OHtQ7-M$Zg0ok%l9@9f_as-ZyY5eUt94eFSz5r_Q$uIQyLaDB4c#{t+MHc z9^8?Ij(yP&ZF`d%a$Wu*Oya8@j zcO+vfEmwrte{v!Aqu0(|+DHEJw)WV@Db`pUK=}FG+TX0%yy|G*6#Mk>ViUznfepRn zE)x!K(J5g9!JskVG5RtYq{6V^=)X0HyG}0;+o<^y>N ztt?0DrYWa0;Q%x^Tif+<%(Pw}nLY9CBP11HBytV8BhembU$tzICU@I+=&HE_Q%pu` zBAvq%Y9bX9EAp2Ki0tK&Q%}AwC-UTyK8>ch1BJ~1&29gsSg`ECv2T#YUDaw>0<#%= z;C(p-k-a>!;oY7q$cFTiu9RjV618O0Ky$Us+U%4If$~ak)nbw46`kS78JfW`_3+5^ zLj#=?U=5et^ySQw!(}AL$wm|>FIy5zxkR+N;tMn-Wt-j_=BoSF9Ax+K$f@UEo;>+s zWJdZ%Zb9l)dt$opmn$lL_P+I-2U~+L4*p>9%Y*l&LQ@}q+{ue`dC4F7E~H|QO_ zdho#D=)gY*emU^i!0CazN4_}l&Q)6mQUlI`D+cxrtndG8-wpl$)BkAy{Uhr~<^3NR zeWL&R{z$)R`2K!j|M=)F{j1mgq3?lpPpvz%?i1^d_t{52yso_N*s5deRMYDYt=qD8 ze(i78{&4L>tIBIX+V{`3H?PgD^^AUH<%?^tUVC8e=$e17d2Y>j)|?)>an0RpX4WLv z*w@Hbde=;>x^(p7H3O^vvih0TkFI=Z^ySr`TYcy1>sE*RlB-Rtg{#MhpIyCr#JTDZ zqxn@&tvUnMz+#ECE zDxD=$P^&a&J(MS(4S6HFvm80@&jmRlr0>h;Hc$Wm|2kt=MC4OtYt0bReP!D!3cnR< z)UALm^O~4wwHg#Ky3cU*lsH(R1*KxfuTlD>DT(&C9KC9UojPI98x4aJQOG5TYVTe- zO6+H!-nGq{4L2H;GM=~D5>;u+nbBUja%zQuz0)5e_kL{cn#-J_B2dGO&@G9|a$Qgt z(fpi~ns+s&!cZ|Xp~r`8YhGhbu8yb_ z96c6n+9_qk9FiwAsfs{t zIeKa;5@(#1>2e+5gnGXs;kcD!WEH9mWiUitLR+R>t7k0NaP(T7QVA`3oz*L&ELE>a za0f@P`r|^%9#REjR%N_dlPX{2=#_+_%&4_dS3)5#C-RX)MV{_V=&4{;ThU5_V*j*L zEO&8?ve)UNZI-CZ7bvEi$RYASJYB5GFb;D-5)#92%D`N72}dtw>J`T3RAuDMR846M zD(>OwDRGht3xg(O(q@;3)0aHUPuGCJV0H2A6N~M$zMH_}58Pl3sVs?B;nvEvIo-K`1! zSZd_&{LqIKNg-ve1@!r>#T^>UaK#H=SDkWB!)3BqGzYY{%t1e2UT3uBM0ttI5h~bZ znXA6Wm)E8mw9OM@%pTgD)2A*w$kFq0Pg0nm3&x_-t<4&R2mi#=jbbY;tTY>DzgA}# zCw6V&=?15l5i|v&m{)3uPn)AFe!(-;0V9&0DMe|^>b6%2yNEXWNBkutqh5_^2HS@58g)8iioJ75DC<& z!PhxPwib8LBAGdyQEL1VYf}CcPcORC!b&Y{4y3X=pE9xKOFZ4^n1WrXr1Hp0866XO zi;$ydDnRhedOc=^Qb$Mh!L=KCx<42Znw)i^zew3_(?0R`VV+?Rr;we<@2xeIR(C>r z(KomTr1LgusTyE>QK`U^3?J_Fo6?!8>nJA7WB?Q7D|^F(7jaTjwNRe1hH6uJy{Dnc zB_#X?if}(EQW{euX3t8jVOe7B13cX^C1R{Gxf{{S zN^3-Rlppv+O(&;AMq`4JCz1Xobme}oe4^lrFdC(|?#;#$Wl?m^3p_oOnZk{u8p`X_ z=zm>kq@QQR%?3)Y5)_K!lD=7v9sVj$4~b=T$muuhR7Ha@6no1JJl&Ur9Z>HpsN)*1 zToT&q;RY;T5ZkGgFr|rvL&clcygAjXKYHQnN}DKlrn2n#iQX1cXQ=q*?dB1LSU!I z)--w@^k`tqs!LJNn5mi*c#E1!&MHkOF8Lf+I$Clo8I>q3c8A4gp_Y=VIq6YBNkUIK z;?}&YVNnUi-{Oi#$~l41Xbkx&iz;O+O{YZswjG&brszOy%3qOY1RAMufInX%36Gt2 zN^P-_B`I_zCFA_OinxSwp+BiD!b?V562z5S{s-)pGOd&A4Z()JQ4R+$eLGLLvhE$2t(4kHItO|*|X<>RwmeAF+R#QbR8sfwRt6sIR5z%`Yp|K*Qle?3{-&}bEn@#ijm7P1umZhpFsHuFOkt;fvk7LfV2+;WnYdqpE`Vw|) z+4dKw5+cs99(VI+R>CBgP>oF3U$W+sB2~HNZ0XW5*wQ*kv-l_;OSpr=gXk&*9_!u!|m)HtWg0wDvyMZHB5lI65%;~@9z zsjwti$`&n@GZe158U2gguf((h8v`5?`BXG*l*S|aGou?9-`lo0LyB05@pxnzt5#-j zLZxFK^^Swe zEhe+UAoRYC|Dliwsr(eRva?Ag6F#9=%Fzqux(z70)@CFi2-p-UeV9WDuCtcAw{<`U ze~%z_eII%LK~;rEYsK4<#g5_LjsaOg?V~mBq}5GX?dqC{%*^05+CwJK|3l1c;{P_Y z@Wf$t&O2}9UZX5_3@6c~^@aeubyh0b>F<8y#Tq zKRy1Uo?Ls|{6%E!=JsveL;8`M+Y_w1lZBSyUZ;85sAQ-_$`?#3HF_!==R|LQH?$!= zJR<+13om{aSikh{C68Wm3pxXjeHLVft8lRyFKVbMfuI~SdaPMtkQF;Q)=MUR1D`rd zG`B91mU<5-jYXN^q!sjvXojg6J&Z~M(>G#!I_i$O_rTK8!((H6U@PqV?oP7(w(etp z?5|Mu9yyN3J`}So)(mGWi&wQqDV39m0!@*yS}g=Qv9}$E*d87Ux_`C*NaYl#xjg?oYZS>hi;~q2P8juZyo*F*YY%^&`ak^IL^f4ztZF8JmcdEdvkU$;p7Gbh`-cj;zMr{R0gjiCTXj9qInNxix(rk4CJHn;A-` z_eUh$4h-chSl`9_9js*Jp1 z306X054)*tA@z@93+iE!Q$xU7@1Wfv_y!0|w*tj@^keOFdv1hAFpiq?7+Z0>!N>TG zk&?^o_fDzF4KwYn6Ud<|S?n*QO!OA(*q8qt%eDhn033fRD@w1800qG7k*+aBAzToF<@Ze>XR zXYaY@|I!ST-=1m@Z7AvlX=JKtTFb_%KuT6Y5ELta*T>OuJv_2u$9ubA#^>&1weu;w z*j(^>#Y+bc$Qd|~(@>r>B=m_kf~}Y3@*duBmD{u}>lav>arm+;Qf68M1mQSkP9eJ9 z{i*ik=H-|V{Y3iyzKdy*AXv=bm^E?J}onCXAl+K;UM z(#oH%c%9W%z0k2>RTnH+Dz~m$&BtXDiCdz#yAdwM&X}J+h#%--krSCOT|IZzm)l<0 zSC^k?4?pxK6OD9?Zae2#3tD96G>dG*C4*C^G=(YL%#E^yz|>$IVRFM)aKQGG$*J$T zb>!%_|6Mz0)84VakK7@~p>^otHnL^tii#%1D6Ft^CS}=Fg2W$&gkCa{>$jTbe)}+M z_OliwX&0rgDfNsoA(Nz}#Cisw^pe^9ex|u&?w1b$nCgQ0HKhG@9Fnm67f^l9^cW2^ z;|`{r6emi;dVxSs8iv0fet+Ml^{?v~j$KvuZZ<$Y+wSHB3E;hEEU$mERv zMQ65}p~bZ%?f0kYls`ix-(c??J!Hh~5YyaOztPrmrs?x|H71)|D_}IpFjg-~%3fi| zAi9aH{Sr>S9v(UOOsEsAh6tB0E!p4R`(S%~J9isxu)sB1_>p}TDRNntod#>n336vR zkZbr;QOr1-8d}kegneRvJ%g-=m`cbHbru(fULK+5K6y3y``IPuz>Y_84&V-QK0U4t zM%^@JmNe9E50#Qj$js3EW)goC4e4PKxp(z`@<8~7-Q@d^wqILxzP|EJ?)bib;rRBI z%qpFk)+#D0Iyxml>?vE%E5Fs=G_sUMPJHY7i%5R%>^AbzZ!I}uAN@9j;?TYhLOBmf zX}($TFvXHCVNm7LQp5nULN`1Hp-Wk0B0kyibl*<$k1Z0qhMfEkcL!^tOSwB(N^eYO zC~=_fmeKmExe2JdXWQGzOW$daj`i{g(11FY_w7XW-G!lKr&#)Xkc%KmHd`(iBx#U` z6*4-k4K@;`T2TW4^y?mHZTU;dTwaVfo~=J2tskKIxY@JWa=Ds%)4@O>S(OLGX_-1= z43STMuRS@klu9P`L zLo9+`GM6Ost3QNKz(&`K;ZF~Z4({lmTq{_8)k^IO*Ig6OT!mnrXxA~E1(1g=7UzrnX-F+i-?%p5$<1WCbJlzJM+*9p=Z5ZL3 zB}hKHdfWMW^iPDkp*ew62EN-7#AvAzh6IbVmp$iTmpo;d-$bH6ZExJXT#=JM{&_cZ zAu6{4!C7kBp912L%aif5foMSB!<~dCx~JLBS(ZC@LV5##)=pfzP#+hfmjKvfY3dn7 zdNEd)C4=ijlU(skdp{!Dmf_Cb@bD{0@!0Ve=lsEopOB*sL>ummt$(ufl>H`%Gb zfAex&^2^tX016e!}aL=w?ShL|=K3@=uz4~ZTlZYq*C}Mx1y=5=M2!z5#mltJEITm7MlKj`1 z@9iRgd49>Zxb=n31~$v4W9Hr;4pZ77$I7M)9J8w+lB;6G=ZZ)vYch^N2VqmlVjQp{M_y`g9PQ!p7zZ=eagu+j+wwbJ#tYv% zGs^;va5wm*C(4wBX@^nDNXwL6%uD>$%cx{84~{;o;LQ2tLr7Hi+l88b40~bbcW{g~ z&djoCBV0|*#kii%24W66S=S5d0C!_6`jy||jOk$!>c9_4ylJ)HAQQ=*5kLp96@A+)sAvz5%uqHw4UavwoqXe!h1&iJ`_nr(Z$|bg zXM^a?eeYn8@)+Ej3^TJM=o9X@l37VL6Bmlg^^Dq~Q}TUs`#Jnn53BQ9>>%R*`CPXF zP*Y6c9G_(|NVs=+AS;PAd^P~U(O$-+<>iI`3VA&&a_(~75%TC?m%PA#|2M1vRFKWj z%vI1`3pacTp(7QPMrk3kR-Aebx7I8E-rg|0ghkGY_fC?_J~+RFeDLoJJ;5G1|M8FZ z?s3h`?0P)Axg_Udn=@DuP-UCH8Ow=jPUPr6p_^LDK{|#XTuCzjT(YQ6yvi*q7K(&h zRO)hEM+tRhQ(-FYP?aUZj=;S_iAX3|6y&JvDMzSvVO~2W|5x`Xpzm5k;;&)qnr3EM zY!YtjmeXNPlF7#vz|XE)WB?id1ZKpSUTbe2djqTEdv5#ZlRF7=Q!c(AUEV_HT4rWh zd=hT7C|}qu6b7xPg3m7u+7#Ta>y{QqtA|A<_A!%lPqf&ui1P}Qv3YJcU{gMG70u)# zO&_Ds2PK)14KEGohp{J;YvmTBXnpw%nVC#Lddq~08v2j=@y zD#CwgOp+^qy`B8$kFy4HI{xj0L{L32M((|$zpGpto!`s4Tg|fQBit}lEGbuBm`{}i zj5jH&BE=enZz1pMo8K_n!{bt{-QfPzPVz$E{9^y5{#EmxI4r_u4#C3CCh7rVm#d^Mz^vSSOCl~$4|C!MXtlu8N;?qZOW zdg&TS?covX-OuCd%VJs_U$dmLvuo!&JICn4Fu9#!%IZs3?Xp0up^gH&l-))DcP)l# zDGRF7%W;NGAQmFHZk~6I?Py?c?w{YqKaB+J(?~F=L(cnCtN&}&iar7BEWEvMH3+2uEJm1u+Wgp@bvuI#(7rj zJIiLzly`@Ze-cy#vg$k|V?M5apF2X>KsdHtf=AKE#8@mNEjH3b-lS1nViJZ`85Vms$2-$18i{|7LE;aokR6;-4}vIn2^k~t;BSNCAIS~m!{ ztgHL)CF`DW(Car1{e9@ahrT-Wk)d}GRsL4R+-&~U7uK;hA_>_Wym;+2^lt!RMBr)@ zF9U!udNNk8A+>w^?p0T(q*Pr%q?(P4W-JA$WV9`yCRuD z$}bxKD$mW}^@Q+$IbuiU(E9lqGXnW{pX9lKWB}OWbjp!Ie19sSlH(Z=ZjQc(XCr#m zlQnxSX+Qh?N`(=-9?9%_sLKUXB+vm^$O%?OYDt;_&amT43tUwK2%rkULb9>AZsds5 zWHx+&=O!&|Bejt3(l@3%@TtgUHvUML4Q*l_eL(}RGmEDVkOCZu@q;`U*aZpv7;v@W z^@>UZm^+YK^X&z$icP|XhxkDk9$>lC@Z^PB68clTz1WtctB~GaFBte4|1pb} zz~E^m0tAC7z(QmKZ?oUab3tJ-6!c9%7$CzNn~2U$k1BYs5P8kuylsJ2m30UPS_Obg zhr0cNN(QF05D9#mv?$;L;yF5WK+AtjnYDKO`Gu_3)ItLXUF#NZ{SePZc(fZchK=D) z!vd{FsYG`DeH<4N-RK=u2^!c;I-mj$NXlFv{5a2L!O%MZuV(LbAO%1Jbekf(Th6il zz=2O-`mrOaNkMcC;OnXJk9N7}B?_SP&=z~(FYW>CY@FVHFVDsL0K|tDEoD8rfrSF3 z_RLtg%QZKlPhce@(_aUFWjbp~Z2cC`u9=&OgrCJibp_HGqlP)FNshjKftxiXEiTM_ z+6~lPKdb(xHZcoaEkd1XK*Rw31IU`lji_ffy_e^rcheLmGoaSli3!9C07Y!ojjx)% zs*eqRHv_B#+GqyYFqoCVc2CJ`4gOmpMg|kwlC-j0fy>Tfg;2ZiS$D>;+9bU~~&r*IG{SWxhM!*|LSW#hr(=D{{-vS|n zoy(XVfa&*VA>EZpZTLFR6$G$o16~8P5C%ZdXHsUDySDMJF4wBcV9UY+WLV5wV)IMvxq8-OXLDSqt$ltOLvv3lvgp^1}@e@LW{X&ms(CXS1Nk z!1cPRp?wQn{Ej)5NT6y0mSb*evYWQ-#`t5G_W))^j|~EAw5h>j)Fffl5v{(B{}>n` ztSw4US)hUsWU+B-?ZVMtb6htpFf29>wr>|OgIN$?Y)~7Y=egKD6zCHqvUK?y7W}9M zjadIjo?G)zH#008493=tGz>^Qi59P3(`B2R24Ea}l2}eyrT`a8C9+#D=ed|Ha-0F! z6)|}+aeykVZtmW=!1X#H%`FII5#HfaAXOy3<i=%{ zW3(8Mv}vq!Gq82i$V#B5$B*z_j3Ar06A;YoluzLdNLkW-ALF?Kvnzum1`9D2hDr)R zI5-pctmc&DP!3T;At;B=BCi0eBwq;c$6aW0;VzWRL}C%4-AFg549S8$%W(IV+a_=q z>fw>uvAwu}&QxKnpE!S6#$|BxK3oRzz}~-bYf}fx@+8H`^YX})Pi`p3I$|e8hov%x zS_BoN>?sIG9r&JYzMiUXp^NN@xjwpqW zeo?$1HSb{|nSq24)wp~ALe1F=+&3m66&JXD3l}(DM4F<7X=6fCr;vfiLF_+;xqIjU zr1r4L#N4ZhRr42jk*Nbqq~3LqyXC)S;g)X}#C#cd%3JZrQns)S`T1t6MqPV&WagDN z7p{QZx?9NhOP194$RUWvWuC<(<1X{rxUOQM5&&uSm8R@;nZL{*KZI*+FOSTczIPS* z!=WV?`LV-X7qB_*ITcAGpHxI^R7BF$g&N5)LN3`Zc=JZN53O^7UI$fd^Vf@NVc^pi`(a(f; zko!bS#_qdfZd$OwKisq^NJ@qRQw`dTlqiYB2K*Cbs{~?uc*sn67q8r@NxHRtq>3ed zk93|5*q^<4L2NxL71bz#MG-Iti|&Mjdo=z|3aLFT7W1wX#=Mi5WL>GxT@9(l%jd^| z`#gKm0w&Ldj(%OrA${Tj_*DSj^W<$m*+%wUv1nqfCW}ForA|Bdbes?$7K(*SK(KoXl9|8$2McDrlbk)Wu&S?~pWK*TF(Mec z2DZ$vtbM72iIHWev>OUg$IPr4^Y6Nj0}36}yM(mcp)Tp-8j-?8N^)pndZ=X9{vYDRXQi`1AWJv?ZQevf$qump0K zdcGUw#)>_o;i}8Rv~bmBa#fj(QaTg)S~)Hf(ERo>s6};qd64_)RV1ZdvQF;MK_reo z8X`G0z!aKoV3?raS<>r_$!uqj+d`hx&2Jd%<&o!2Sk_P6|2IHg=@+R0panH>XCI5; z!u3EYAWau3ms)EOglmk#*{SN}Xb%}_1h*~5ci3!P(gRnRxazWaE?jl3MX{$Ql$lM= zlF}OxN;>BqU{Oq%(LF5W$o%UO@;lQKi5o1Ch&953x^O$PQ7wyy8I3MS8?5@0L7icT zYRd#oBbX95@117#0oMM{tQdWH^oh~0jGh|3b+j<* zAC-?@G`eBrUn9>Wmg|cn9~yb*NP5IMa^=W{BSXV~8-8~9o5S}He_;6S!_i^Ouw?jx z;dMiQ9(sD{k)eMdx?`w5bnTFCNHDa0XvO;9u77gHf3*pE<9Y*xT`w zoi+jQ&qg<$@0Nr_wH~H%3RiA)c-m#Su^G5323@q*fUp`v6a;bqb-dFs%TZQaV?# zWe#!fPdgky-5NjKHqW$llM%H$6-F$U@^Y>^Mw=N%_G+`K z^Z83s8%-VHiyLW;p<18T2|e+0$QQe6jHeq?aeXAGbE}FHX;L)yPF{>&9;4F%b>^cA6JYrL;nUN}QA1tinPpA>aqsP2+phMok}1aSb-uJWi7$=knEcij+?>=H|sn z{5i^`oRY}3US%^QIkJJH>+4#Y^2&VaX=&PB_8X~*&+-g!BFx~0W)4RpuCynt+RoDr zDFLlO5^s@1R*swFyN~g7Emfp6GHc$Eb4DW3&}CdWrb(}~q!^hvAqeRm)_^Kv=0a9X zdSP^mcGwyPy5P^dr{dFlf}9{762wrpYSUNq2XlUhWcxpOdJUQqsVL^Ohm2zNl=#SG zm+lEt+9{<#WmgN#-q=n7*Acpk+|ATAG$mg7US7Ne z=dM&Jl*^{n`cO2Kt(xyU1v*65{#5wpi=>I z0lD528@-*AqfX~COwAjp)RKvIpCBVoNO8BoUuM)=~9SV?FpGPz1! zDof;;)%^5V%cl`VE)>GbWwT~8k}0Dr zt_#K1{gtPyL|LKEukjh1vAjbhv?qDG!XaUNPPeJX$U>r6eD`#fYnV!GQ&ilEOeL5q zqy)0Pd-(DqQ;f>{v#KeXJ5tw(M}EcADW{)OS{ixEAr5-2LL(Q6W>OXfQ*=tx49ce( zmUuQb{$HF%0$}9ZhAtb__Fs#9b6;QiN1&5)|H#4TR=v)Gz|EcqffLIMj;b(UG?;`j zZ(2VkA(z@=jp!wlCk>AtCHL7EUK#A|@jDJY-*D4m5#YGnqb*eR_!Hr&VpV{kmSTde za?VeVETxjOU+Uv+U3KRYdH1-un-dEG$K9MlsYC;DuH~f9N~ax>97UdX!8F@L27(om zALeVfY$pcylFMk`gBqf}=V9OqsW^0y$sog2YT}YENG{FI@7O~x1_xEXq0EMXr>-V@ zy-P%EeDfD?P}p<2x-er1nd4J_bsRY^XMFSf$9l=+?5o#X=2rXXHGS}Qn`I&2IG0Zu zV$!Tswc3oBa zHQLpYd0?Kp;?PmU1srKz{V-uznsQhO0NDNHH|MucP|PBqs^yB3C;!mg&R2XTynjw_X-xa_!_3L$iT`1IrD@0%~M(IEN-vqD4SO z%NOl&f$S&4x%t6u$mRw8DO9yE1F$xvEG`huaD$Z!oSWsCXVGf$*68r4EqGhnXCGpahA7dm1SC5Y|e zb(|N7VB6d{`F?3ZEV~2#xy-#DS%^SRETtByD7wiY0LfR6*F#ZO>=tr$1&`fc9t*&7 zgxpi(}udNH-x3 zI!qQBkki@KMb=V`Nha)0Nl0N$m__81O>ELVWI&gF5HEYyH*M>6OFHq2>md=%W|0B8 zW=Belm1Y=GJ|Pwdl{s2Ms@Fqe51E`jw`Kp_6W1?wLl}JrwtTeq>V?))MnOSBB?PEt zMwU_diT)iB)wb};nTx+58p7H7`6>dhbM*yhRzK=GxVQBpB;Mt&~-!MA>$A;v}&xqptyir-)PbG(H3vI0c=O=o6puACHt_1ea|7QUm>u}wz|25$z%g(+ zhcnavZ2!0ViF|`+$J`_NSD)(m0_-ABylwB=X)0L)~ReELr~&PuDl> zl(?E}_*4dAIi5NE8ZSm(uU0}Ct$jMIb}4B`~cR_+F?ZWNg$lPnm0VSzf4$;m`qbJdMh+|7i&syJ22xYGKA*K=YT ziOh6`j;4c2-BeJZtEP8w(c9{VNRgnluB@u0_RA`H@yZk22lae`Vd@5--1sPG;=cLr)kWWtS9OBF8v?6NCmR3&Ly}>F)QFxwA0}Dc3OK3Afqc>PCnWBxd zGcnHHr`5H%s6xBKxmYBVa>x^L3-_EvdJw14Wm(g97WX!eWUU*r0xrt(g!DRsVJPPo0kgkd1ZmzQ~_C|^3Ckq11w znml;*H5|R#FydWNs-{CRn?6&M?c*>6)YY^-P0O-*ufyjviGu&HtSb+aqrC1}Bq8le z+Lh3S4laWvL=2w3=8zH6Oi#~!?;PFZ#L&|{Gd*|rbkFIy1{J}8%n=oa1_Z<=Ayrhl zY!sVpjE_iw31G*;e%$%G@Ylh^b0E}qF>TlHS|Z@&J%uY2G7-h027 zCz0R9w6jbc&t)N6=@m5ALf!Bc6UXOw;4&rTYMFt=d0A>TB12(X0ZPI;X}Xn@`F@#k z_&!B9v|L#Tr?>NYH3l7wNs+#7S8N?03Xg#Hvkemf*fn>#M`D@Ri z%e7wAgNM8#p+=NaqFi-`what24o0gJJl1KXdp6dZv+(#XL{`FR)xJVXm4>tDED?1^ zNWXz5POJJuzLLik>3XeEmu)RNMT5(2X(CPJ#f}=zfUg#N*Zkdyd{_2}2_v)zlqxlH zam|*83e?qinAZzIl?=7|lFt(@l~}=@G39*!9S-W7JGCh;dB@QV<7uPZksA9x-o-!^@EKR#=G( zSW>=X2AyUxs)tHf;ylfF>P&*;@vY|NPCS6IT+AX6O04e3whHLERC|ly`xq9nu~I#e zb2d$}wdiLnlBXSp$}+l?dI7{h^uaXKURz7?Gd4CI&!kHkbC)**@b0Lx-OaIz;$?)$ z-y#^`743_GbhngFbaGw(iUJZVeLCWZQcjIdmhn{4qo6S=T1LcDA~x@|_=7A~^uA`w z3n>f_2?K=|S)r9}A>^uB{an3*MC=1Mi;^j$E%~aK2o3*%Gc)j33~0hyaI? z^GXThb5y=eDyg);8rf~$AXbuu#9AU9+Tw3_1e^K1az+V=nxz==1>6B&-u=FLd4jCq zO21AvDVA#m9GR*qCtNZS_G1N_$GL8u--Fh0z%=@>85nzAiAU{hzKA8xqZ=B{SRc=o z;FWfV=vYy>{6SOhBNSY1J4LMK?S|q~!2GH<>^2pPv#DUxTT0cX+~@W$*T@;P*7pIq z|J$o}t_V)`OlN!aXW>R8#$+(a9*->BBb6{wm&o9}nD$m|DwzQ`1jC>`dKf}1lRAAP z2SwQzBuEUsc=%7Ord9g(J0Nff&bL7tjI5?aIT=qtL^cslx0IyChF}YKfI&Ni5Y z9|YEhKLK2+zw_5%IDugo0zl+_r`fc>YnN?JoC(`mmpRV;cP?HwJFe1?-~9YR{n0ze z%+7!L8af>aE)P)kJ1RLPJzwoRlX-t_WOZ)R*WU#}$Z?gf?EV?pil6-ZN~lMFb_;Y? zTrxrb=58>N!Hy5WY$Ai3P`M0`6}q^O=5VUfGf{tgw-K0oIlDzackdYPW%na{*$ab3 zE6-#TRj6X4)CwM?B6S(qDvTX<>-{j?37zhIY9~ysK^=eM{^g+30}vq{7}TA&&K!k4 zi|?+waz%7%U_?lZuzTSdpfK6o6l}a&4HE&Hw8cqFK=Xq?Zv0m6N%*Y^ogUXSkbZpg zo7)ynJ_!l$2G#p9M1*a+5lU;(hmK{iCB}t9Ips zXd(>qV>A%~Pc0ZD(!iKCA0hg{dW0Y=55nLkbowthCU)y5XzFtP)d!ch*T}=U@C~$a z4F+Tct2(em%%-+!HOZ<;Q9!7-JY;O#F_k`5PZ??M+w~_O8pHhQ!!T6XU_gRw`d|bd z4kqy`Z;2(M-J(qX6*I{m%3fvS2$DbduIgQ5d)YmYsG;`|0DGMdyBFOyoI z>XC`0)QA-I*SoN9&prYp9oHD$w018*fy|aASI6*YYmdRBLm)o3jA!9+Pfx5CD!ovq zTg;5y*-iQn9|OQ~6}+=2jrJeEzFgmNY;3<4dp`o?N`zZUjLiYfdh?Wlzl=nQP8v=iGBQ&OtAX z*)y~MHv8P{6SH5NtqTr`8@> z+gzJn>soum+RGr~`P-S-X8v*J*vuU>m6_DcftlSi>!;tJ{>}8u)8CnXczQ5hoQ_W0 zAmBN@=DjulwdUk!;m-Xi+{xM8Sr?X%)ZAgYE347srtgjZ$#6D0M-%B#Scar=pV};c z4h6nAn=@&_JSo+mNoj#{F1SiY9HCUA^BIQAbEJwv5Ko%#}ENP)AA%tCj z6T+v$Su%&YG?yGL=Tp@7_Ye$ahkswO99?s1_9AH&r_J9bYl#qnm!wD&bEasmG+1!} z-9WN(4|4%ir==q{(vb1>Ji;e4R9dDy#XLh1Qi9xhiFtWkOA<~#+Or1=l_HH@@xhWD zP9c?iBUGZ3ga8Bm(3I1GByOu}K>4To1D@(l-$wEQN%Xu#OAWfBm!s@f8lQDpjnJwenONNa(HPmB>lw@QM&4 z!eXu(Nb-EMmAh(yOcxIKihZ&eXvUp2qAFF3S0Vq4Gid3scrYLU(`dw(DorEDkHZ3x zI2p~xtwo_9#S-~_&!GWXdX55_=gE9NCgwZs@`{(xGFp_HRca`N+l%LjghbwCUOvb; z8+cfDl>PG=HY5wz^-KjR<;Wt_wReMlTaUHR-93`C{R&GHbi1d?opQLWikF}XV*7dC zMZ}$a((3il3?+TxC+79M+lu=`{fft-G|4c2XoV?ff+XScGJ{&u>B@@k!k$B>!rf|< zfo9toRQ!T!FM0pLl-uetJi`@=iGI34xC_>GNZym;z-ZEPiQbgoBeyFXkP*uEiVlUq z(Kn@k#)%+=}RgS2t*63k5@gUmhY`5HZld*2C(g|xb+jbU-!|1s>EsMKvA&Xv{i^>*qYp2n8I-0YH zwUdLK<}Y}lq{ea0Uz!R&#bX@SvV;Q;do@M{%?Imbqw`qPEdwdIw+oHdZhF+bJ|;&9 zi?hWtL9WIM<Ls9Xyh^R6d2%9#6_^Z)pfYqcVi+dSHvWw8VU6b}bWx{in9!}18lLGIT z+#GR8M4r~hKbzgN?!ZiHP3_XVRz3&q5H=dLHXn^j9Y151ceraF5~o^D0WYbQCeRo_ zfM<(-;3S-wPw4bhAFto5zkUdqx*j{ZWLmuOE|@_lUO*O$K`f6f7Jr=4az}5c&=8MY~wgLO_OUMZPj8i@yiRSu5JKF(PK}ZktfQ$7K zoJ~)Nb?n7of&KSar+4U{pDtU#24dx9@LQk~_Df)|p-NbPn=0@%AK5C$U9BFWKmGFJ z-nmKP@gE(FEc|fxx$B^**^c2Vef|}QWzJi0KTk?>rJ*r)rX8>7_rC%`fl0B^-o>}D z?$t$ZYGYbS+BjTxCV79w*R#h8;d6LEnlIZ)4%+4 zxMfmoG^Y+Pocj5qZ)#WS@Nt9Q9TD%y9@^<4>h*FzVuL3&e5g%&<`;`w<|Z{GCu-DG z<_EukB096F285jqfBjzQjrMzBSPYDXoxngZz)Yeg7u{~RQmUnsWZ5Q!(uDriQxMA@ zm+Bk8xNo<9K@oQ87f+3Cq3x$(t-*21!^n|09ZopsF|sfAt**YK+*K=j@-(dVgjoO9 z)YHI~a^}+=`YWf$cF(ytVXeV|GFTN6qE~gLwX!eGsZ1mpE9kGk1h)SEGhmvJYxI*& ze4qa8{43k^$Ipymp7rLwPQ!}3)&=3B8 zc|M2W=@i~Z0X&0L5v`90r&~4*8swDNG@OC8OvvxO4I`b<>8Ezw4k-uJnVtHUKPeqi{*LcV?hOE_z)yM#u1&pCjd(CJhAZiQsyr!Uvfo*P4*Jr7F- z&wnc{6`EFx$4WA7tyjG1fU};`u~oxO`j^fxZl0Ue9KH4jx9C4UzwAA}3$FR7tHxi< z+yh-T&aAp@h3m7f8sJtLWQu4;m?~Fbu}CK@;vU5ykA&Uc9)RwrouA@BRpgFvjZg z7ygel?MNl+B-5#Pf;VD|R zc#}d{apVoKE&B8aiyLRhRXYFZJ8aR)=b{K?N`Rt#nas z21~XgLj3;65E-7->DN%(&3=4a|91&;^sj0ECol)FwG7TgG*Tf_=?29Do5~aJNH4(a z+9$9?6H@)~O{dMuoU@-SPwG|h?VnpjFP1@>hz1(0-6Z*BQnHCc7{3c7z0KGBn6 z{rKnA>mUBvL)-M9EG{Ds(Ls{Y@ALuSY&Z{fU&{wcquO{Npff)St(4jgxcb#zttZq) z3v|sK?wy+y9h*sosRv2bDC z@RliKs)(!c_-HWe~l*R0JhWI}{yhkMqKN%h<7Yxcki&W?o>v%^D(A4LTK^gei? zcFPvwY+iTM8iQti`q!t1duGR_di>4@{xsoyacXE19$dX*c#W~kn#;S)3(V{y-Y&D< zracgD2lD!tSHMF}i1nklA6u$*SutG7-#6Z`4^|FG!FYq14xRsyWx+#`{hAhqRv20t z2vzY_!`*WeV#KBT&Asnzg;uM>rAm7P@zqNK5hl%`r9+?Y9v5gPh=ivp3U!Y+>?rCh zSHl=5#5%t>4lh_}ai`u}JzPpwHxQp#GaT($gQpH5Cf$yTQCwIl> z$#L7Gd;PSlWsxvK4MIU_px{gJ0(5>G?%gmcHkbyz3xiEV-_%A(nhu4qxFk8*QiQhH z1fUKHZqom-dANDQq;AAexRBX01mi|=YuO;K&Q~pVgFmG!=qIO>Mx{ zh*pm#l91cevjilY{>6CRz^t zfgSJ?O-S``F-5T0b`C>E|Fq*>xE=AH)XG)NhNtq?n#95xj87lj27Ed9?HbO`O{nyf zKUxhLb`&Ieo!vEr4t;K_1xc{7=&y6uoX11z;Va>XC!|ng_n)^coV;>)aO(d6y)>f^ delta 3446702 zcmbTf33yx8(J<^QS+=}Mb{xk};)K|aoz>xP+Cmbdec!Cj5|l*yE?c&2Ei8^nLfD(2 zk^_{rl%_1Dq$w2zN?BiMp%mywOP2%+l)_8NTb8o+pDQU&EFAcrpXaHZ&bfEaoH=u5 z=FH4Fch{}ExVv_Jle>Re!y`Ybt83qKVAVF}Uz=RI!+}G5taPNc{Y5_U!0c@ub#*O2 zoV_AiSJ$LDK3G@RK>c>Su8zI&0X_U~xRGYn)zxAAzr!zYfdBW>;mcQF%Pu{7`RYsN z|Gsc5|1h?O*Wb-1SaPRfEEJ|hYFi;NEh>y;!fSueDWmxWej69_QOA?%pDuu;f)>A( zy%L*g?7X>`#r>deTjLXK=-b))Mw^&_Ytw&tN1NYl`=YhA=`T%>wY4B0=6x+beoxZ{%|Wi7n`~RcD>NC*pA#DR;q9FexHQliiwg z7s9#4*1EdZhBA)ANZjpm5Ju8Snd}aMn{?nFMIf^19C$*>JmEy*443Y>}7Aoi~w>M0uj?p zA(8;1v(Q(;om6HU0m%*qiIG$a+_6B^M4BRQ7a%Ig%H8s(n@8))LU6n+BEguB2$D$$ zor|ihhLC{d|EjKzv!_gHEKC3+V3=XrO*&&9g)?DN8!0Xi7*fwXVY1H{3m!!xZd5p< zo|qE&6^WP?x=6>>Ahca&I$X}ACkA{6rkE6}n8zM306j#@ap-0f^Mu)D&6#3SfhRT+ zhks|?N#H%qOzU@HMZ8cZq~J_=VycAMF3lNZfw);=iWt?-DCdpl8CVpD$^&sbB3YUY zn0;=wP$13dgY}cp7F)tT6V`z;B=eElyjPzoSPMcC9~N8Pqvh8Waf??*2BxDiD(Rb2 z>O;Kcz~n<^(iOm0HOwbz%$Aw0@WU`hl8r(b+>-JWv6+#i+b&ChR1ii*JO}ea7?Vc9 zlJ{DkscVByPW;EQmj^-`^B{P*yP!%MV@BL;he4^0*`@!gtE*qcJYiNl1V)DEg-Ft) zb_?7fYDQ8O<=Bw@EQ$1zu@$9)%IFI}C(xDGw@YS6efbA{m$# z;F6G99cX(Cc(I|(3%y$;kB#Z#N>{{~pKyp9->9o={+}{t`$)u-bQH`mO>R<`bjOsW zDQV3wZUDrFGU7x!F`6X;VVy4^^iD~P;u%&uNZb(fx<{dGr9P{I*0<1Gd1cb^I=YlM-wPg~@;%tPaqs<%bs-&slpv-npa%rHh zj(>lJ$T%ztW`(;6cg#JLHQL=dW70u1?`mCJ2b98tzp9`z5=NI5cw~eH@25>J;A~Qx zU)lt$_(OR#KCRo}r6p>M(54Yk9-FWA8z6E=%565a-$xTc+Te(}A|9!g{{9bQesj_^JdT`?wGZ( zY$-hPba_H^LZiqrHfq+%vx%4^?rpZiqNo#@AWsD*i&jg_>_*^Mn%9WCexQ~No z`v>#3M-8%Lhe@BYgC;J3@D}1Qi@Id@nefQ!@^E4RjTuRgT1%B@QEjBnc4NM63k-)- zc|uBn1_y@uNw*ya4bp8=JMzn4f{A^%{DcB@uZwx#O&Ni4AW67Uq0BXY3p7fZ@iQ>b z05ay?q#HN8bP*#%6(}Os9l-fF%HuGL2^B%$2Fr+HB9)ld#n?}P4*zwzE#vZu19Zyi zqz(2FQs9kt-3jmASstSu)M?U9!@3~Nig4a-cMD7kSz_tmKq+$Wt?1?%Se2XF4$}7^t+YVoYjJ z!UX*ExOCCpX7EzDWin#2s0p-~oB5jrHEnl;0(1!KLHV@~RB(Vy$E1Kq3j<}iF)|YY z+nVh@3xq0HCR7?yWCEZgf9L&`_cHG#-gCVF;XTTGkoRNWy}a-9zQenb zcaXQAcR6nl?;>7~H^EErLcEW1mS_Z#@ ztH7UYr>=~_FL~t%{Nh(`hTlzB_QUV+mB8Tk4OdLS@A@k|@Vo8`8T_ufVm44E~wk%a{(9UB+~<^fIP{?#q}CmR!bk&~+)( zLFc7R2a7IcI%vO?>41MJ(?Q!lrh}G!Ob1Q-m=3u6m<}5EF&%LBF&(fkVeqpqVer>o z0{Hn~Tmty{pIrj@`5({hO~ar6>>Y*Q5BHu8zaQ)!g5S-1K|FYG?*XTX*RluvtG1u* zf$m$M-LnpUBYVK6w9M?z!f(%RW}dIytptI)XZJ?<_3rKj@yuKd#BsYW_QHyhU916V zdHZ6}GMrB?UIM?j&t3@ni5pZ__`TzTKqbe#*Uv`wcFSf4K4IjpL1d4KKCyHSBH>@O_*& zIEbUE|G56{W(n^ZUV*oDzJq-DG!7mTC&Kdg2d9e?wK)$1js zj}j3Q!7%9;2!?4%&^PR(#N@CD_mVzB;Pv8uqV6f+=b7lm>t5?0rUW~LK8o^(1fgM? z5($TCfsh{d1>paN#D1X=4+@A-kZQOGULh*4kkk&ph?0azQZnrG2FYPMfCq-Xl7L{C z3I)ABLP&-LVqpWYp?zcJ6+*njD7ghlKdBMCca``}~y8PXvMzQY>m%3$LtZ#@;tfNOpKb z5+NZL`G{}NLH$#5tb@)8u` z^LcTC0|ME;oOyg;Be5e$;X;YXOTZL_@L`&UX^{xw4T(TZl0kxmq2ru2@J0`^zJKfB zIPzuow>phs7i z>oDzuL5saGIRZK)76yW1KP~XqKL>AMi1_T*fsObMQNSA@C1UR|DTdc*0pS~#_(Z;8 z5iRx;5{Xa{3gGpyK-zhTc=*nNjnodINJ5Cc0(w{=qP@@uC1%F$h3*Bk(1-g&BC)7m z3vV=|rB4IE{OS~Xa0*QZ^CPX0WWH2-=AOfL4kdlyoFU^j%fJ@ab zLe^_v>)Sx?AiZ8n6e6kNfCOfb7L$z3l3o};E~G*vL3qi)V(8*5G`psAU_FdO5EKRp zFYrnf0`7VV@32oq28M${i7*Irg8NC5E#WUIrsGBy|GzLPAiIJcVsIjbxCAH?_+fzv zg#uWH%wmUG1;>JdIrDO^0EP2WWr0ZO9WcFKA1vNsf-Db*hM5mY7~vF$aA7DU_WA;> zWAMt`l~=@)9X=rdNq=CN@KHdafCSMDhCtec0lyG>_KGDU){jBgzEXZ=qZp*c@29+e zm^!b70{s9w1;!%|43h#%NCZVeU<=8*1QauRam#i6!y?g+04)-D1wjeSMF3_+Lc+og zfsO#ZCGko~7$)ImFVs(kqsG=9e`_3Lmibd5s?ej45(0zj8U z1nU?yi;$qjpm-<@2RS~g(hWuK2!_NG2?5JIDDi{vgU*A|69QliENov;LVCA26QP%omfnV0%RaW_yqNL{b(FjnWtu5`pd2s?ms|>9A;sx2}9@tHTuLrwZCIFEfi5l%z*zQ@0;?3E< z(>5Nt^U`auRrTDhm$;X180a)Xh{c^WMPQden;{P3QG{Xp?I@mosH=E$zOCmp?PM8E z9~;oPmJSbe8Wjm}vBBRjc#>w=$3f_a2Jg5~oIbyA$-<4L+xF^8Wf7^& z!#)n;I3qE}Ni`{~=+WP578lbOc6NQajW(*$;V0Xdly>pP&c}-H?X53vnrZ2Qy;u}_ zhOJK=wotI|g;;`FA&V5PGs{ogi1u&y4;Am4xva+>V>T=f8n#0aOHoox=)oO}Q^mu# zcNWjv#qV110d&;U-i_|-;cQ2LS;jvD@!i}rj&#qqU@!$r680|?6L|92VaEd717p&e z1bkgZ^Tlnzn1voF9eChOhB16VV1ymA17cyYg;Sd#bRdO|y&o?l*s`Z>@j?%vW1jJ< zsI2l%j9s^t4<$ErE$2;MYLW z@t^$P33mG!PCI(#yqU-u$87$CS0%IH^QJHV30J$0Nv`&1)9)-f1KN0JbDkmbaee4!x*~fR~WbVV(Aj@nR`0R(`l5& zQ>lC`J}olG(t12leCx&m-h3c>%-_OH=3l!D;jCHViMj30gd1Wl9+xs}OuBPrb*8zw zy=%dCP=+nw;Wb ze|s$y-S*&F`Xhh7LxU~1aJXmgJ*WIGAvP0ZIhoDl5{!??4DsUjL;d_3Ai8a{VDpiC z4jHjtPd)USEWerZr>8QM%`_<_Ce^}t#s{x<71!O_+Fsj&j*m8!!}%vRfx$M02O?YGqNwzNi@Z|AYuEj_aGM~#)4GaOmbE8_zXnf0TU>k9sHGnEo~ z^#*|;Gdd|QnxF3H*Fe!@f7(}8Ukru(Bk7-R$9k>2IUzESD-BtyATe9U3_(R!94_uX zGQh8aBCp^VRa!ncQl(|!{uRCQHo(Iu1+833#$XpbWtAx-0+l_J@D-nXaDZO}MaOc@ zr_dsJ2xzgi0*(q-g5xnoju4sjs!>Wi5upUdbMNox&4(f^f5uRSEzjOxCFSFv04XhV zq}1r|uhHriwtV_9LrU`;DWl4y4JREky;mOe`KSFcaCfUwfaj|R= z3|B?d)y(nN%sjXn-zsi>M%e?7W7Y^+5hH0zKuk0Tu~BdVxDg$@>sM=w zJ3k*N_WnYC8UvB}1z4`62kfDnhBRl^tX5JGR3%LXC0R^AzPNbyFL_HAegGZ5@qwY@ zd(VeYgSujS`sZxVd|_ZjB>ninLLyQ%JvU*+sV4`^=BN1R`}Hd>miNtB{~F=^8j%Gi z7K`6`P6Y;53qB`o3?R(}QG8&aTVPfwscU}4*w+Qx5O(C=ZuH&_qIMYQ67T?c#fyKX zIL&}x`PD730Wv|F%L9&}5kmct&`PQx!($Z`k3QK|JoJ29=K>F)9lyJ5?bjOdm2-@& z5oHkYqfZVjDBveK`S<@h$;pE+V4O~tyCSR;O&c2?=Md~$SZ+pGr68>G;W<9L3>tx* z!c8`N#9+7KvT*UhI|KY0DC*1dPI_6JUj{D=(ztH$A|X9VGx>vZUWrsiir2jiUe-d5 z=N$I~%-@{hOlfPY&sg69GI7y+}-g9I7uI$=w+{!jf~3pS!%pJ>0vSL)pp zUe7)AQfB>k$>-~IQ1q#n7F6^nnLP2^lS~FSuA5_{CY_Gy$h2UjptaHgr;#eU-W}lA zK#Rw&Kf%R6_84K$2>VVLWSD@QETq1jQAh~Ii`ZXa-??BTI{b%o2Z0#IQ3Wym%jvlH z%3pwc3R%pQgq@%r^4Q?8x(m_*_^5R8n!onL?rot)v)@6!_BvGp9gy^W=~)@GeUX^_-0mcYOBsv&ga5KbUH+7 zM#C{E0Pz>kd3}Ii14YN4yRvErfBAaV`26RM70cz_bH>LM6Ng2lYO>(>>a6j!vuOHg zHNOUkj=#}$iWyA5wH;e-1~;~92E}1INfVlsMB@s`r4eEAzGDNt`9L(gl2;|#9;_*&Hl4!jQbxO0vrH7osV)_>I=zr)b7XpRRB5^G%_=R=|6}EH*yC5dl$zD@)oZ9i$z$&-F{t8c zySBByd7^0(=sA*oE9)FagygK=i)Dg2qg*q~Up@6;POd3#`46Z$(w&72Ei6tWWFeJ# zDBOYC27j)2!+$`{E!2pP7WgMNle}W@$ERDPQy;?`g^CHNsfj^JNF3q{StG<1Ak#|~ zH+}*tV8O<+SM#-Nl$=|mH39)*GVy;4i^<6~I{p61H40leVr~mJUqHWFYAY7`GZpAL z2gDd0V3BnYMpDH+Fhqz95!ZYUdT7BmbWHVwQ`Fq&r(@wOpEE`RoFug_X|y|&Mu?%o z-W<~F#$55(`-_X;`+~P*;Rld+D*CmmF0u*OSg{l}vJ4V_?EQr${3IJ+|8Vu3Yf~}E zJL=jFwsM*$oA8DwITZUltR0M?szFe8DwB}NwGyz^K+$6_t{6nP8S6x= zTCra)flw?H|8zl}g4zicPfXFDDSogGTfOMZO~~>rwgyNk8)tNJ+i7|EN*nMJ0?P|l zlAvpN7>AmUugJ@)5kVo`xtQ@1Jf*91xmZJhZ0*SEF_)Mcx5)I921H|=(%OU*%~l9{BYYz zV^$I_$IixjN6r8&7nV1uWPVgmlR3LT5|oN@hnz<5_h19 z=$k^Ut#qghTf*QUM6WNwdV8%9)vWp<1a31xW_YR)m8FGa5n&Lm=ms)t!6?1=@j>*j zZCHD0Z#TxT(E3mh&}xP7W)+twCDz-isR@rQV^67UJ|Q~L0gS5wBkxC7Rjg(STZC1d z33O&B2HwQ-Id5XVa`;-60g;B%r@a{1aO<);a&q#Zf}+)8zf=$;LmF`eMLJ<&YY`pwWOd^~s*<8)zb>e_B-z+vDYD$6WYP!=W+u=gQQ0(G zp;jWtB+xHJSpN#Qec{$}ZUSB1g)Kwjv!339c8y^zC@RLLSL`|8 zz$GqY1N~j{8f^(mbsGUUC3r*(E?d zXL1CJDItmn(TWOLr)>qYwxaD~Y$f_&E4HV{n1lqf9V#B7oEfSdAyCKYl{keCYy&}A zxD_&{?Sl-F(S_+NmP2%Y6$rnrJejqoD#&18d^!wv2AZ?avic1C}H2suH83lvUwdEUjbfTcir+@pj$?h`s)Li9Hk z%F)sY?(rT)nWa-`9LJKb*`RcpIVPS1A~L}A_XW^w`(aljREQ# zYOmG0C|YB{`nyllif((Ne+Yr6)rN`&%zYZ>VMc~|G1$4pSae?r*A3&<%I8nqSI=ezMcU0cZE}dfRq3c1&ex5y zf<vNhfQ{ni->OGvhOp++e{Co52^@gW0%?e9xUXih!Ww?k`c-SV z1o~!q#o_nbu-;|NNg*!lqPn*4wWgb2ZMwD*Z@}tP064%@ZRIfxy=Wc$=OL&g2B#sp z1Bx`5ZB-{Y3UIsuN`T@GtAh61zXXvX5LT<(%;oWE3_$!HACtL z4t;xww`(uzI4b7B2k%j>^(zI~{{|J7oU@?$?eb^Ytk zf%QMY@J}ww%fvXTPuY@6dpfI$3sGwVkkx|G>|nOKo2Jc;>G*s6Ye2r_$X zx=UAOF(tNKfy1))00ORPDr+w@`C7Ru zlADZ6EmIZY zQoBgLa_v+$@fU$k@9C{;#Cq%4_RG>!0_ph)hK6=y?j8sq!xBuu#xnu|NN3EfKH>U@VV8Z+ZmezbLXVW%kEHiA zrJ8;1Az0aG0JFNGng|q@70!{3B#mmO01GxvY7<(r5B$jm8_}^p^%7{;Tg^L8v#xIo zFZw3hZ^Rn<*9Bo+OP5LpR=`OpDC0~-%?hY*WkS;~@QdKwF6!QgtzL4PHtRm@CCtjK zHzTWeH|2*(VGLX6{~w7hhd{Rc5^F`Pi28*uJEp-sezRjrh|)z2YVqcS(edvs12q?2+EY4OWH1qAD zIGzkB$0?K388xJ>QKj04ZaV#m)frZP1mcY7^amKLr`T^#^I2+ zH4`*wppagKc7A~^K|j9%YiqAP`kV68!WCq=mcVvZr(qs|mJ-F8A z90@Wgy3oEGF>J>y5c6ZD$5p<`HEH$TU3k)9u&=TlWWkgt@Yid znL~^b+d4P7nUq^QP6^c`sZ7Y=8;OL`*>?a>YQTt~UIzlKt;?*IaNja%k0j0;Rk zoV19v*|f(Rrd4rt^!tFJ2Fz3q459Y#vg*;Vjbo1rSgwT>O?4vkR3V)qNux&uyo)3m=9Z~gYb1#9b|3Oo=_k=QLv?P-MA24dIVd|n-7F=&gD?SdVh00 zdf_+h#ifsr0FRc*h*}L89bW(WAbPYnzP$9)M=&*rhymiwRWXaunyEY-m(hAg z3pSG`>PJsL2qGyG!Ilj4snb0K6(80o_=jKpK5xBT+|qbX=Q2A3Xs4 zuLYyWtQW39j~;1QTnhdagk)J8`!{t>Sa)61kGbQGy0#y;UeWv?th@e0)^=tS_WAOQ zhtk~P-EQD;r+gkWfy4M?U&-NzEpQzI6xqNX08q9EaU%##F_)FN1?TrqX1o)bOf(sU zqXwizvI!SJeoS;S%(n2GP}6r2{{P}@aNsyAHo(|P$i;l}B-Z+6Szhwg=_I_g>nZF{ zSVye|5TX6gfNJ0MG^qC4wz73VPd<$u?v+NN&_4~v0r>SL;{X^27Pbor>;ea|e}VnD zR~m+`S|#CKV+6j^Hr#rB=NZV-$mJm8FR@a$3(nTV`FS`?0#g9jS|m+yUkU7z?|lyI zTMT6YUus4F`ibXk^v!26+i4uRkDi4ctq~kVj|(st;4&9dm4u`>B)TCS$lyJFD>3%M zQ%v3a;`SP!J%(QR6-asww1n~GR;*8v z&*Jpu0hyaQ83on%F)06sdp6(_f><093sTAiyJB?3Zy|7an$}Xszr|OTiOQWI3W5Vb zh#yu3oXBuNB`OJ5!H~et-0!i$&IOv#i-un~OOHO^v88-ujMJArNfJac>>em2fncp# zS-#u=3S09i@-naq$}tycMaMqbxukUT(T;riNDZfN`UGKcv_Qbb>)}ozSh^87g$8#| z#KJgo{E5M~U@JQI;5ny8S^D`?u&-EA-dDhNIc7*Ln38Z*$fbh|akOyHhMPvpKQj@7 z1zQnTEb7qHe?DziY}H?|TNlv2FaG5;+PAd-#<8m~bpPKl>*B3-Jbml6%`dTEZsM`H zbz2)fobNFjZ=iR##te2TShgv_h}c3Hq8b-HF@+nHex!dB?CyLhI$#S9qNT5}drCij zv+RYKKr2_=AYnv5NmIgcYwbC?5f#=M%eU-}DGcz;rpNY}%`%qv*&xfJ8MPjE=p| z9X#}fpc>!X^e&TyH^Ly8keyaO8MfnYM^>i5b0KR|o64gXo2OMD++p z(ut10UX2BGz6r>->jBw0Wn@`OY*JB^ei@~*T7)_;G93kiYM{vbF(f7T@9t?R-E$Oc zu7n-`atvF!Tn9rtyNt*(IVJZ|v~!ZM<`oIMEr!DH0;U=;n*A$x5Z$`z!lmec|J`sF z+WF9;WpJY90rdBOVZAGMlUl&HwT#b&2dOD4rX4d+hR3C`cno#D%J6$W7~SUov^vhQ zSFz8_OfSAxjfXbX$?AAAFv3qZEn;;v8tY`7>)6K_!CVUt0|d0HQlSg!r^o0C!mOW& zj+iCm6!L!rf>jGfk3HA8ru4Iq7{M?);q8i8%A;0Agq%|8e7HmtP*7r2`~V280VCMwZliWItcJAwLM=Rg>yT5xgp z=`QAk>vFW?d{$%W7hhmovG!lX`EQ=Cwb=Yu&IL_t*|(IAU)S+dW|~xvT+x4HzAM{H8Sr?`~UK`bHBARGJqy8;xb9YA~neA!;&Z$%n@X zzfKuOyhc_(zXpts74ndWkhU%@UD(JPfiqY;<}g^NM~ykcDUm>NzSQkj3eZE%KtT-{ z9sbM%DnQw=w6vjxWrh9eIWV=AF_>kO`T$8u93iz|L62#Wkp~EBpeXHldo>z&6*%a< z3%*~E{?^OxDE*8Fqgk<=+6nxqs1XMgDov8EnADONkOtqB0A1G#$ZEjo_~q-@pj1=S z2}&24JeJPnB7cGZKbWI+KbMQ-PEO**QQ{4HzAGA`6)A{00Xd=2S8Lt^qJn zkb0<&&OV{@DyWoFnQ^95W=ce&*D%0T1BM_?=MWnE7GT=WVpW!cpUtWyd7A3ZWnx&D zvNkrq(6p>E!1+Plx$KV_r6vQxia}SENpU7MifJmDb-^`jUVTg(K-YFbS2bXSMSoqM z*5#$fB`hP>VR7IZHRY3AHA1~T`fGK&0&5lWVKtoG>Wye26*$KP?7ZfQ0eh@7FMw(|LkBm4$gj+fpDRE=A7^_HIUxKE1M{#qL|iTHBsU2JI3$Y&9n}IzK7$qJJ!7 zLE2zG6nT%oHdK00y&Upmz2SOgeqz-abA<{@Oc_EHYowTM+w z=y!CoKy3!*)MmkxrIOOZXviTOl?g{F^w&<{=6on3&@YD$zI_+OU9ugOkpH<|fJW{I zG?hGrtuX3SyJX2xza>X#;{xPZ325d+(XoGCS`G^Il%872+Jbd+U#x4Y!|T}B@`&ai zabJgX*umCW>~+*J@I@9GGUZ}($~Q)(69G-wCYwmc1IV@thFb$h$3I*(gl_F> zYeYX<#rn9sXkY3BI)^8L&NG(^K-=bA+L1{i6}3@`hYsX_;3@hmHE&G(O>S6a?t`_3&mb7#)8gwHEDnK+tyk1`ym{Iz1d;o?(j?XbeQJ4&d2r=AfU{0n~IDsA?V6ATd z5;VQ{-L+`t>Z+oU4YGO(Na4bbG4uc1ts4W(l?Y_kZglu59c^-&y(H}l2N1Rn*jxjK zob#b|=)GQUXK8F5V=N3Qz)o46^=Pp5u>) zSSyz&=V(y63Z#w-W#S5De%xxIg6O7=z~)+Tr4;Ce+Z%gIt-}lrOa!i}?v6U1q4kF5 zzc-!PnCCoJ&trM&?qHPP6(Eoo&dq@}WN`_JY;-E&n;4DS6+WbrKp(Z>ay+|qvxEhy zHsS(!yAryx=4@6yHI@m6l3BHV!s6hK>$-$14gr{j|QPmugWmH2#^R0fTW^LR5n3mgh&~@QgLvE zFiV5z)6IaS28{aN?|=YqE33ZbItxa$JP!yeMm6FRsz*sWAx>Eg>TEz8Mu%}gPy+^~ z4zV~c!D3aEGC=|vWDc-YRyk=Wrt?HzV$6*yT_#;dh*r_SmRd0C_#Lc8gBzv(o0cY6M*= zVy))Q2cp|v@(-bZJ-oMpK~kC5HVLcu;C9xxpq?Hsl40&oDZp_W<}X|u2)8t5(LLK) z%z3wkT1y8m6<6XXv#b*#0S}z$go{oh%w@Dpgab+^Av+dF*UMOt8(gRn;wOtwji2<- zVke>%##kf@6@AR@DR2?6C*m%^eYy~#L02eP{fifB{fYmj1C=O6|7_g}nwYy8;j$b! z-2vG-22fRVhTSXt4G11Be>5|2P0I{ z%-K~G)vyLS7idH~e|H(=rB1|7c+5pJaLJ4lF8TyaYPgP(xs2Ez&mpG{Xj!-w9lKn1 zO2~xAl-og-v=(lxu|mL06^F}VAf~N^w4;F;(1NXSIPs!Wqd2QBm}3vz=>c&rz%T+K zG+6{z#8!a5T ztFGq1-FlFe6G027e#)VqYATA zKunkwHU*_O1a#=lQE;njppahRfNRv%%RzVZ>X($CM`+Ylh1n< zkW72u3dGbvk+mosDj7yjD5NPHD5P^|nTsbT%LzkmdO~mUE5hcnj9xDj#n2_^0+t#m zT)@TCmDt~4L4E?Ct%sK@T0SMp(4@?66XpULaRCZLBIf~H=R=v&5Mb*^#ro0{=dre8 zD|ZvKY#2lZgK6BJn1(b#C`*PYacnAt?zO=VqXvwQz4*{ziETgOFKloyYIO#%R5a3b zGL5U?T0zfr*2rA7BSBj%Fp3&5dQtl0p+n!YRJH0uR>n=d2nJKJGw}&;rr?^Mh>zK) zOthRt0S63bJ`{FfhX)Tndu~1Yxud$Pc-1+#tBBR{w5``P|G8`A~G*(XBB3f95YM?T#`|mTI;Q5O~WQ zR=a0fG(i={z`+kEtWGg{H3kUgL(%L-ql0K{O=DNd6lZpb z@r*@1utys90je5sWsmgUaj^6Id{sC79zRSXHQNHis_YRBLdCQ)A<NA)cHTk|si(OH7#{r|g_2(4$i@e>Grq%+NG+@Ks1BZ<=PAuy%*gA&yWX zhdHDR(J7%2U6}<3y%t(}G|TcclGi=QUZnxfH&D4kCX$gWY?ICqGEczZYQgBS3li(m z-4oSW`qgBazg=@Ya)e?wJL%WwrFn(luCR#E_B>Es14h{M=M16o`}c85H|1Gc*qO_+ z6E-TQvItE#+vt$Bj7tAszutiJH0@-kBRgMImr~H9HR!5Fn!srJV01;mT zmyTV)iZD{%F(>7t$*?;>7$>IWx$LrZ=2c6N=q(bG@WjC z*&K%ODBQmZ-vw}(Q@YGlScazd0frhV!rom61O5o=K3?AkstzzPXWS|@sME^a^m`aHi_i7}f{KL-5jnLqnNkvgv8-!U7euQr z1_bk=sPE%{4xzj5Wp$v-F0Rh|ExXGy%bdQftZS1co08B%e?n&~WC-bW1Sv0r!PJ1! z;oj0<>AlB#t5)jq%USE&r#uRpHe^Dyy%0}W2od`1a&WolL*bb8eGs1n61BUCv_e=sWKSyc_>Kw(Uq{&YQZ2b&%h$-U)NCTxQewI1MS{BM{~-ci;u&-xp90t zK5d)QiBM=4&|CusTk{^&Gzo_5(PO)++Wn1LP^|bYbMUdkN7txXA05%<#md}hSY#nk z?80g6G(BwJu_(Ew^&e*w@@oOKBVeC>7jG_XSpXFW4LS|hfjCFmFdh4 zBXIf=4lhH60*$5)f}6c?D@wmKaEh-E=o(KD2M4YS%;orue{Occ8IqV0?uOLnQ0O`! zZoyVK!=;^1T*C?COpqXjk2qw(Ylka0;X@7uxDk{&7H7Yqya!mQ749RNm`@z%1aZbf z0(LZT=#BY+ND?kjf-MEy;z=Uqjj#(?uo3dY^L7+{;DlDo?>!4&!H>wBSp#sCexdvM z(d_!qPUNgVH?x`+i~*(>TsrR40ZU*Q<;^Te)(#bCx+uGE?@uYD5nt@{R9< z4A+3m5{W<}J1V6~t~*(yScfDy8ZHnLrAQYDkBe=733~J{SdFz{2q3N;D*Ifem3On? zfCD+Z9{R7?Ak$P_7$9jPo(t$llO!Zzl(#a@@_cYP2?MUvs6m$b~prxYE0z?{4lS4oy zDV>Bfbwm(-aT|=N77S(Hf#s>8YG`!F1Ob~VsaaUC`JXe>gdC-vhrrG{H`DKv2hXvq0cL}Vf2 z{=z-qYeX;H!TJ-LTq>v}2HcUPB?^y4Aha7M<3aSm?aV~gfDv}^ z8|%>G?^e~FxW@cLAa532`|NS^0x7Yc>K1H z+Wyw|Oxt~J*SF2KMcb@xlD59Krq<)wMC+egA7>qCy{q*a%-vdGX#siJ{Mlbu?MqMMx!Wx$~vK!uE|D{3s+lGhP!G`ZP zT-h+ya9)F|VN=5r)>6(FoHseY=9DmBu5*%#Ii*0&vycA=fuv~gx|K};AXA~G2jvy4s1A*D9TDu1H|r=8}JP{wRYdwiqL z@u&{IUQqt>1&+tfB4X4y;uuklPCHal$61vZ@DxqZ1?Twmcv`P<2viSNz|unABF_00 zc;1{J8JDOk-_O9+@bx0fHlx$YWRb~`-4{^4TtP39S|&*gne)dD0mAJQC~XzE7Eh`P zsdQpY4qswPc*BlIDsa6rmL$bNkD3-qqo#?FB2ej9=+yYtF*pg~jTqr-8^yVm$Axmu zIGIUf1=cbJfqcyN4bQaPp+IQMk1 zhgou*_Nu0Gv?)EF7_(#&w)d-C&|9UXB=7bn+#;`?vfW$7?jseHE8z|p!jpDcIApuN z44=WJ2|=2qCyXf}t=Chwu+31xBcBrL9q<(uMaqTS6=B;-b_Fg|g+@c3gd{jNA(Yso zuCWS!LY__&4y8J-cBCXm6*01{0v9PsDdqJ{it~7e3LE^^8!B)~B$^@gn!!;#Godk0 z=o79FDh=9{VT8yAM+Av%Rvjipmh0IcK;*e``FXe|XID}AaY|uGE8%LIpt-s7ibhU* zD64`T(Zfd%yxPXwRt8m+>m(nCsUa$>DpV`;>SQT!P&WzJuS2m%HOh@Co z*qN)U4LbOMkVYW18emrwO44i3sKQ0zJW1tTv;iNH8Lg4N+beUVkLi?NmCfiD=NzVl zXq~$9xZYiuCdQ+)4R#-oJzkstC_Nd!)bNgYDs2d99PYFF zaJNU!?`wa$3U}doYI15^la7uX6_cc>zS6JOGCk@|PMD`O;mqiSVB70eu-K_d$PD9} zFg{sG##b~}u?RFqY9`>fr(D@-pgz`gxYD4>YurS^omN4CFpfJVTgEDQG`WeeN+7VA zCcM)&p_jX+`glZ>qv4tqpCoP#ObW@iYpZa_qyxSI5hP=dU?@!r_}5g?XzVgtTu8W8 zBgym(8RorOfvdA2!Xb<);D4LjDrnTx;XEM=x`I&0s3?T|gVyTf6Bfg`NaT`v z{bIK%#Obes(-Hw?bdJ*+pW38Ji!QE$wfQhTVumfU1fNvsWILriwQ=JR7^Q!PMqm5FV!eJsj zE-JX9+csDFRp}EdxdP7U_?@Y7QKW6A`nU%7Q%tYG$WvFN=?jX z6*~*wNSn0^7e)(|)jg_Ly23h}jpQ~|;7W&8LkLIkv= z%*u4(jaB?gS>8fUj^rj?X`4c$BxmZYv!zHvU`Qdz+blu7RBebZ8>t{t#1(SFCsoT6 zdP*Nw`ueJBUE$McAXlU`N2e_cmpZuq7uDw-HUSCuWm^ z7FUwah!=I0;WIegAQ&MXK|^YCT%b%_C7r?Q3nEvZFu5#gt=ehP6XE5k!cqB@Qk=56 zN2hZMJgTD4zNrcpr0sc6Xk4rJPMCxV?sqC!JiLtEcOl1{r6AMV|bU>XH!Z#zVV!XEsH|nH> z8onesJsFe=;{l1zjIZU36AgHt zl)3}X_(W`cBr4)pB}*ceQq>&IASbN(EI3*>+ zMwL`GoppFKi46l4xHy;2P((PaFs3H5Qhx+Ln}N^Bad9G>r_Juvlu-~Ej}viHQhh-^ zE+pXtWD$c)X|&{G(n~6~LadyQYskq!#53hK2l$@q)AC6pnG2XFQcm0!(MOlcD{xUE z?V`j!#gxyV5RQtxqDW=FL@|L;nwXx+N_8Wmq=sJVu0HP%Iw0|&Q&`fIo)JpKd%XI* zeZrhHQTVvW9+@NqD=X$47a8Mn((AD(RHD@QL^9I+y9yfNSfW6wY@)b4NPEmK->Mrc zXoN{yN+ng0;*dBdQ42TBTwQ%WDOQj!>6poo3db@YYV9*sxLpb-{KTVE6KO|2r4?@w zRG1*tnnv-!q}(B}>P(g`RhLGn4EvyPSd_sD_mtBf9sW-Riy%HWPU%&o#z{l{fhEM+ zQH8_DISE3RHb_UUR_!R^+qSpTK<5-fA|g+FqKbky;2<~5R^gs(kcx%ETEAQFiI~FN z_bS7pN5ygnl`%&r#IFC3vNw-+q$t@(q-OIHm1*#jhsr@ir{59bFzRD!`ce;2=BeK;I=|B_>ex@oa&yi^x^<<5JxC^_4e~6TEH_%SL>($DGTE@fWD|C!vGouQ*4fBf zjSgQw?CKUy3ghlX-EAjWm(I{}JAk1yr8)}_lPEKECQIkqZbMiIXvcBkMyPqE*HSsJ zF~<6{dA}v6ki#}2UWU`yh_()(Hol|hmou{Zptnm|^cq@M?3!~9E%o&s%084nRTKJf zM-1_)YD*vDbG)`BUzX^Rl(}UOqziE>!>v4o)u^jIhDrnez8avslu^_bWqG9?C&f~` zD5L{)J0b4*309*{63JY`Wo!#(Z6TqV`LWzRQ6|WAKa?fy9=FcdVa}C5MRl|zkWDt# zC9RE|xtSx|@(-e|Ho*oPsbV+O35G=x7p zpl_&TUibLS{LwA%P;irqOBMgF_}kcr#;#WO9TWPA?@XRE`Pk$aCvTrxomqkv=zHeI z7jIp>YOy-^=CR+5eRtwllh;gCCL6Q2Ptnus)8Cx_^vt*C-#=^FxT>AKc=F=e|D5^d z#9-os6IaX(6ool@=7UhS`0SbTOk`0%b69b=;_0z76*nq(E4vfhhD+0@`qSr4siyzB zVTJnMxgSbv)Y*4Txh7)cPmO`?%_ps_SOXP`y>bsnROX#H+`)Eyk3@q(#N5_NykwjLP57eo^`O?2fU|DHD^= zDIZXNRC#3X%j4AF7N1or79W{&&-`QhhB;yJvkT?9_bfyfE|^-K_|C%VGfUDse(XcT zmHg4Ms}+~d?L)qI&u{OmQ&lrZl2oiyE!L=Tp5|8Ya}V=c1C_GrGlmXfE|}BS!&vUN zwz5={&A2lGkDKg?dyLpVB0YPG)t3WaCRXYia?@wx?vb=70fjGZ+OEc^W(;ZVwF=zd zZBNJa;XdR^hD(-STAb#O{UF?>sB}&Rp+3mI(NUxCMYt>4=QX*Zi!~N5A zq)FzxMMht&Bx<&tRu0o6HK&FuWgX#$jd8Mi&GKFNx)}-6l<{Ocx=Kl7?dP@c!Fu?x zwL}51w-K=Pa_Vq;5?2US^Hyt%26Usw=BiZ9x%6qWQ+5XpO`<}DMSVIY=1Tn8^6Jg) z_Z6sIr^A-YcEMWDSmo7Trjm{k8Om_m9d`T)9%8m~wdLsl&I$%b0vXq0%@~oL<4&m`f9d)QX*EK|=*(l%Q*aNaW z?aziNbElS0n(Up3vp^l0kY7N<6xa8|JRFGo?3sFg#}ZbQX~qGNT2GdEq8+pu8SA51 z9y1w4+MH?E`AEPSHW6c2U_IGPC}3v5LP8q1ww+m&C#P(nkf*&YR2^yPT#24|(uHz& zeIebpTDXwc6`=Kf&Ac1}WTNdB9dc=mjI&va6|;-exPM09(9?}V-d^>Fc&}Ui1w5K` z%fu6u*H|oaI>^uvR^&x;x(3ClGCZL!dYF(UuH9Xd`_~LPqMA;_TCPLVS$=hHC zj!5p3-CD|8Zx9*3x@NK0I}Q`zfN_7JSqf05THl+ntFwiKi9X|1azmNy66SQ=90|5v zgqJw<20Yma0gbC%U@fjnT1$GS{zvX@Nn0oqqK1~fO^DVcak(rvl&S;|5X+i|>b9ea z)BYQep3nEsjJ36|J)7S_YldJW+Zimim5HNrY= z@@`oUWGX~~w-hWT*m7=(EAr%&%rrVs5i(oqIgKfYg;dFrL^7_Alj*eAYO^_5yFi{K z&no?7KxhzJuC6oMJ$0*lUVdGPR-{T3ghlAo!wE|)x$~#Tw$ZX3SBg%d>BdU$E z3Qs4o%kg zS^NWkER`hvE|Fk@nm{p}*)OkGpvYqvLLG0^;4pa1DcbM}`MofHg3jc%gszt;dy|yG zipTE>h!MLdr?!!5fUby#7O*(oha#O`bv)kCbCr5o(Ek(5xq_b{Y=%mtLFOsg(S8Tk z91?ZB_nRh3QZ=S*po{qOjTTCgwQ`Y2@btWLM zUp);6MUWvK*SAz@ttCNSaHTv>PB5r*wm`5$JL^VXDL>~7d@ZCoPiDGFuesA^FIdF- zV>z>trox)04+4|4FLAycV0$%LGac+zOA$vcSty8{DBpn36D4|0myNaB<4iuY+LuH4 zL`f{sMbf5jbc0SWn>q9M_y-Aa1EjWHNE7~o*tOG?904a{6hp?-d@kv(`O3Z&DSNkg zGubH?6V-&crdmn$?N}a*vRb;TYxZ+)z0>9hvF9b^24AX2n<}|(v_TuhX8v3`ii~+0 zG#k{Xg|gch45rVeaQ8qo%#)5*fnqgHtr(#%I3LS%RoX)(8U|OYTMOCn3;f~(yr$XqXghHo)lGM_yM8JUC&;F0qFl-IBr{5#XS#J}H zBPQG3ZqV+n(PzuSNf_30w9ds8YVAsp?D5mGnTLaJKcP<*9sPuhZI!e8WWNz4Ie@j7 z%6b5#yCHGPxD)FSmEuOKLZ)0@Smbb8%{dH~=S0RzkWDcvI5Obsb5=RH&j^JE-ScJv zSI}S#al!g&d7L`8NCgAUlnod&9b6&UKN~;(pe9GMM66mX8jNjC(*G>(&!vbK(Szbo z(L^>ux-|X@mh;(0j?A+DScFm6T`cdD%{EbBOhhWog|e`lPTCT_`*Ht(w<=IUKU~}r zwg-UVQC_HK`VJ_c5GfS8HGd#u@E3f$@DGG+tw0bJFDxFkLb1;HIvz)iJTu zV~CR#_yR$nCPMLfBkvN_VgvR(ek056MV|J1dR}wVA2RC;`%jYPu;V}omUcQ!Ro(7R zX6f&6Wbv+-p=byHe#_#TLOxTAL`fIXVS7eBQE&QF+0Z3eOWK|z38%H@2IOSR8qsk# zV7X84FB1i*>&NJ<@uVZYa+NG6NDa;UTESvBA96DM1@fk*x892oB@+ed=5d{_&N64n z@4Uuw=}yR+^QJweS~$HVht4@mvQ5UtWZR!CISYR3(A%*7oQdiZkht0P2MKe$uG?+E zNe`q1hr4d($?*?Ma3$sU$HumhNA$b)U*cMm2zYRAN44k{U<*>{xD$t3FS@C7{}4pkq{w6!uGA zef`^a?if7t7@(f^xz>o|!$`VVBj5(j=7bdve0(e{9q>!UYcdeA zmhUiBzQI*&>2R_N86Zc048tgmh~*p(31v6`6G-CPd(KN5LLnkS_h=^PvbHqc7<>J9 z0k2TnC`Hv5o&(zS^Bv>p!taj#1CHg#4xzR0!LdBCCULi6_)ybgwdW}vW8!!&=xG6J z?sMOR`xz0#o7oF_tD0#QTK&QDi#Q=o_Za9>ue}CzVWh7s8xEO>K+odO>f8W&Wsu_$ zxUo?&s($AEhtRE$$VdDSJvsz*0j(ZXA(TL#X^Sc3r1%`+jaS(u&(J9IQvmY4LOl4u zPshX|L6UkdF?0RYHzxiz{%U1hCP>e;8q zyozN{oKKl4J}Mfl4U=H)QONcTTx?VfnTAsrp!@H7e0uQZXU24roxMc#1^Y_s09DXe z)H$!&>2+(+FP;S*qhhr7hcf_<{53$327fKts(noZH;q{h;%!s6NUN>tP$FH^*y}7> zdk!#m8^w^4{F&1vuCQH$KRhRWbk;Q%G+;!uCu?t#q^}jwSrTQT0H(V8SJIt~h|%+3 ze{#qGwqtPhuKC@|z(TCkWhR=MoTt(@$68qeefl?`V^oaRet7+9=-Xd_kN?1L zC9t4tO(Frq4n)VfqA?;~sCL+do@sed^|3La=KS5*^5RGnde_}riTDQ8-2b~Vt77YI zTV_7FKu!H*?k$r`<9cOXaht@8^mc%6y4H-xFQDOCJq;C0r**YVtSkat_g8;`w>=^r z!gZ1Q|GOV@gr8At9fbY|uCVtdavoBwyDU@{4i4kmlsD!R(4{YemJu;}>fD84GUJfp zX#3z#FOD6S9+^ZFgu#`88fPxkO-kL08PFUpYkn;ubG9zO2{M}%H>L+ecA$1ONZa@D5_PP>77k+o~RELdIIjy!z z2_cucS3qz1#9#z&kBU0KksKeeabR)r$e3j28)XsY(fG#m!nFE$D48Lo2F~ zcS1P}MVg@YtW+bp=z{+N=XwC7vU4!HGz0u(*<@`=AECQ!b z$HPIjz`Udhs@no54icu62e)t9D3yA8S;iCC*bEE@0G;i45fam&l%pr&$;YHB&>WPr z2+k-0o49GKRL=r%lgCT2pSlQ%A2Ml;J1?bx1%Nfk4psJ`s1J}10bmrF=9GuFZ{GC$ zAPITvmh6+r1_g5Wo|ft6(Y6Bw4XoqM24B4ix!!?E$qTV$6*X)CjACQ}!yssoK{Z z0Hwnz3XJG&B;hF9zz0*=Xi9@j+m#0vHcG))nIVw5YjWq{=ys(^3dtlM6daQ2*(7jY zbTuJYv#NzNEfRfXS$SY-R16i^9(px+hcmYic5PKc%8YwW;*-Pok>=V(7r{1cTu%s= zTeSr0uflzdh!K%tVVXV0&@cdo22SC&ty$q_u)E8o^bP~fYBEI9=QU?@8>z=Mr21?f z0mZCeUIJ(1PjJ17Tb@?#96-nmqjarVBxf-UK5hC+&p{G-e=HPlT0&YL{cIPEazu;> z>)T`^758p?dZ(g3C#$b8y0xb$=-gc|NO ziHZcjM!m64^(bFE-wWln;dV+u%>$rfM2sFyK@9p*D&VsRz$W1){l{<8T`d@bgy7Yg zSa+FZjA`_dQ^2G~#ptQH%P3u0rt2ZKY>IBaXcoiD$wRF87|Nt@efuO{^67OO>1p8>CHqZruWsMB#C z%;8rlfx5)8=7IN(N8zbxjs8eRE-Bx0d=WI~0QHu0qhflkHeQM9(fwQI84Ot!% zml9SGfrLodB52XJm_G_DW%Sn9fP#%uTu|^kw?PQ-yVu}P%XR#nnAOFemxPnuRJH}# z2B9pv>(%g1M#Sj(Z|aBqE31Q(&xAq9bdtiBshbz*iEpd^sXRv^%=u?3gHzNmLWyka zTI{$@vkg|rX<89BRS$5mD~{eoC{JD3C`C`@&jRH2e#o_amcZZDOY}wsj%IvBxDw8| zTA`MX6490C!VpKqkV+vO8bB(`MZhh)7Jldl+~^8>Q%! zU)>EW7b%J5YDRKkt~H4t2`i{`+DL^;rG3U804LNDE&2@$mmd)WqvM6cG?qPsxJEKI z&zi*hgMFZ_6JcXS+idgZScfkaWs!{n6(eG}1BaY;_*qKw3>U9S95uMUxx;MH)^plg zwg@GPZSDe!zE*i~aYTx4{n-1QgU4U13@Vn@qkAFfyz{}pN5$yKi|057_nxn`!Q5e6 z3&EIk!_Y_6X(*`Sm}|r+BH2oKdGuK=jCn+ij=X0pj9KF8`q^tHSI`+cB_>VqoU2@w zt>nO#h5f1@%$+xJ*GzKk?^9P}F2-4~ztad6*H%Mo33ygGRe-5Qoh1ipEGG)d7LXaEKbw>X7dA@K zn&)pX*OE7b-&-!I8-XYR(o>-Tc~a2Ynyy?;MC%S1{)iYId7%M3CjS5`q(3=;D|k6x z^3yfa(9jtQU9T}0&Y=rkaJf;jWGb$~k6cQNV&Ci6BvK%3njwE&2oY+FyIk#2$z(}` zUgrTz84;r+&*|KQ&wGHgdTV~m{L#79u`fdPkaH(KvL!#hEG2vd_Fd|g($B6u9UkO% z%IX z$)IR-6N4H&Z`plRfnFC^hJk1^o`;18R9gt-q1rlBt?)y-mA{QX9#=vIv&~x3k#zKQ z{AKc)20XdRr=giVj}{ar)-1=*TDjOrXP0@18^VT%-(~ z;Li7540k?a`|wG8=i(E55`%X=ciL+dham6DGH!WPIdiAl?5Y;^ki^}Wf|1x&1^6B{} z=fAExJbzSi3#5sx&*$fZ^XHBI$NT~1K2>>scFd~!_S_%mel+*xxlhbpH}{sglMP}bQwq>?8`}$ey>^ZZ$X1B~dE2WA^i6W{OXKFL? z8NB2NO{o3h+({tk{B{TIW#g${{O#O7~p{Y-) zE}ue*d#CzS*(u+YcIxD*smVV~J~8>=&BJVwf|`2i2Q!y@ref} zKC0R_ab%)5k(_WSo}Hj4R>xm6p@RIG=ala8?~i|B{KMndj5o$F8edWVL`n*I;MVkb zpGta3LJ%x@wVgEq@y{;#G=>_1(XH$m?jw@`y>Jrsyv`N2d)PKZ?!kxUgj$S2@dt0Y zay8>q?r)Uf4+O_!QP}i#B+g)k8W+TPwu6sU7%mkrcd~k7%Yt0Z*&e zrJKx-3y1v)dmaeO8P0E`?2SaH+h@05H8#8e*=#!8ja=77CyYry$L_$VsU&1-q)0=! z>CH!?urw)bw+$7k%e=8im#DHMl236FV|Kd?;2QSTAk zAZ2;<$BcwQEof*>-CB0^oX)Ox&#vKVArZ5>3^60&GI&FNcXs8Y__Cv?YAg7(mayuA zc~a-;dUVlbCn4lkE+6)XTyP;s3Bjh;#_F?;gl45Nlv8{uX{I|?F)#WwH6V4SS1=Zc zqT6;WDflXhwm-&X7~QU`@%VF%Y=JBoN_0#Uwh<sQ<`lCR5lHVtvosK5p?E8=5%b~1#!Wl1FbWyif zozE2ZeS5PL)qMke=`Q1r5jDFn$~S$@M4npxB!0uzy1(Hu1q_b9p=L~r#41MS64pk! zM^xLvaM~y&GObmN=OFV2hNjiQgoZBpBbuUS730#$8bB^-V8TeXY~e!AklA}5zU=6E z+ukn>FH6`PIi0=PGig#8uNV>bzH>)k3D`#>+G_$KsEO2DtkG;+*lQoEA&ssALFI~E z-Ow_$Aa!XkM&(cyZ@@~qOL->9sePQA+B-Y!PsI$BjiM>u;>c)?LNBxDw^$Fa%T*~| zJ(@6^BNcr)v*!c2f3ZUKtAxSCJ4y+yGhr=E{Tps5aAKWG!!dMAo$5pgat@=nr~<1u z&_dHuqp33CbETB{Q=-Hu0G%_uv&37xVKb$fek;}k2lq}wm#_FM)|9rRPR}{9JRPpt zi82KkkG|PhvXbfPf8YjQZ0Bi!TC^HW&Y%aB))%lmR%J9qPl)RskaJ|GiN!mxJnAMH zvg!?1Ej*iw)-=-(Y==e8D{9XaaBpuX7@+bsHet$_>Qp#0xpQY9;O9ob;ManLsYu1S zh(Dk=Xq7>1YmQ3LOM2~8uu+ccYONXk8Yzdz;i9r(M_%tuihhq0qg^OdkrZeR*U{F6 zs>N>2&0ttDP*%3=ouEgXH?7~MsZ3uj{8BJZ`QHRD%d z!*2l`RhQKJ>#mZcSn%vQ$Ak_ZFv#QcN! zab_wl%Aaz?qNYeyO;HnO+&#n9%CxWOPWxgyKt(0DS|Ife>~*xvF#gU-J`@R2l;7g6 za5Zt+MoI<)VJm}^ zvAeA#WR$gW|A?pDH<8Ay3Fw*xk!WZpF%FIlLv>do7ZxJr5U+M*a`OoPz+Y{7$T$!s zn&?<4XVXnSi*MH}SR&qnt(-L1^%-Mc@h;rmDLOPnJ(44NwV|S`WM*%~atCeJ68UVb zl?nCRiFAvY!ZuDqrhAwOtC?WFUI^9o%WB-;mW;WnbiiO?Z5~~Tp{6nVk+elhNkUi1 zCoJK3iQ@UCN!;I3i~xw$R!BgmhUn;N=l=)G&G`gmZ6tDu0^9C{JNz<>zkkxi^EBxd zEBbJx+S535^G$qTCR$6?8@V=ZaJe&dZVtn(fG^ZrBGn-${3C+;DzE$^)=xJ?lJLc& zK?{6+MJu%pM>r%INNZ?Q(C>nZBx#c~H-k|_M9*#Pi`7EM*;F?P!k3x*>QE2S1?m8* z*i%zJ6WPsobc#o?yi-j3s9-k*RWGTKrIFei9uAY}_yVbHBPynuK&n|zEgq4(TLD5- zDMS+bhCQyeXBPgByEnNC6SMfV=1?-xPe!yeugCqH0Yir>r?T0m$6q#->BXWfcjO>f zRcK{WEq69T=a;u*dBtwblK}Kg2;QRA)ex6)+(VR2?lvJfNUNy?kwU&O_XO@==;{U1 z8t@3FV8vy!rkB78NYH+c3;TZN^Se8EH8HrRJTsslT^oHcCgd`f#tD4 z(bT8x4!>X#ysc_0xrk9@1Q+LZq@Q&|>ZI6;jrtJz3(W{iyy=d z&Y~MAIihJpitv~8E`C;p<&LO32_XW_)a)ebHqkS(BD=NMB$FBgUjwIy36JuSzbI&Z8(+AB=c6scJvru5V=<>$`^Dw>qK=5OeOteFIAMtohm z(QFVEGMwRDfKM>xw%vp6hiCtk)`pI>nGCDXI<)FRLyB3xbcxIRwTX zucz{}KOCx8=Q)R(494p*otJMVTFgAwG75km`y7@F8v)9FVhKB2H9vw0p87Gq>rG&S{3~`;bGt0h_DJ;LDES=f{#*{b)Av+-X=onlwDN zBFjgzdbeUvtG3FCt9?0hbxe-oM^jE`ci`cSq>xUeuzJf#rs#x>9Arl_*_LHMCw)BU z3#WX|_Fsb)kt4}V+n&VN9mzTxd*jUbXSQ6Yh;13WU1^{C)6|crzB0Le>JyXZsrSB& zQb9HO+~mcR-=F-# zFG|TdKtExS_ZglZzX|9k?gsjaOBV{t)dgUsZ31#eg3+M zE9T!apPF}%UpCLq@9)n~%>8ce2g>f;{d0HBT|3vFOUyau$hkdpW3#`R{od^7XK$N* z`)qyo!iitb8fVX(-8S>$%ri6JR;p(1nYnr9az%BfG!vdVf9ABAh3P*}KRNx4>7&y( zKzBPZ_d#2}rHKH+b(S&K@tcmU8e;!gnjJc$Bcb{&R^#&ObLpC^pKsL&vltG9cNWJRYv z<~osSl$|uIa|tYgwFt&&gVH3-I(@)O7lOL&eGWGy^J1M0(X=rdqAQVXa(*9{N4;Sa zm9;y7nN#rC+gSy^Ehv^|@KZLfu4lCITGyJL!B3598Z8tR>JS2{4{I!G?T)_>^)O*Q zWc>>+t_|Gm%_z_8_&k0c&t;1j^i`+GVk<)*H1e z9~sIuoKS1f652B0aMj}(-OA1QuB=U>Lo$g>oHwMzR9Q2F!*9mO9n0X5vSWJaiNOknn0yRc1!_hN)sUb zIZ}bAI)=3L98|HJ$)wAbY)+q0`Eh@BI9elgjM?m`qk#&SP~r6q-Rs*;RhaivF}4nT z(^_&0hi-J&mV}5jYtr^?5x+Gl%#cGxbf;2m6V_smO7?WcYJr}(3CkO4fuR9bTP;W9 ze#)m&esDNT(G9k#rfqys-%FW-xt?|zzukJy6ea4ecA(Fhv)+bo8M}G95-MkCSFh;Q z@}yqdEGSRH>MJ?`M-Som#GqowjHMoC15Gm17Pq$~G zHFmm4Ov+|rr zaC_L@t3&myx?yopHJ{tu>Nt~54Y~92p`1yyYH89~kD0weqRDdUos-~j5b-K2WkJQ6vI<(;*gUt2?RP_uNpQCK`@&WVM-N^)S%J(fsxXYYB zu?J7)G%ffUS{JHjxHv;PyXif6fkBt@77ta{$Ltn}c>p-L2S;SI)*i`_I(sKACOat& zmD??Q16!yWq1r^aCio#M!A3{oOcZqTRY$hwxa%Fxx2@ zx|#H}?1da^szoK#C0^^NG+JP}mYt%#LKdk^)L?YOW-XTxR_?{m!4@_YX@4T$4jXEn zKqfIoW4X1fZ;};<*64L<#b$uocIr^xr>#OyOJ(!y< zOWPFCE^CMSH9=9ZQMquUtjpW|K9e|mFIE!_S`%=%X^8@#Pu;0m9&RZ1jhaB5%u=C} zzG2g~l4O~jeIxGg&B7LBv|0>#O`2GVow*OIhe}`$Dnk>da<@%$j^xBP+}%}V3W;oo zDK3Vi)>qOr^gS-@<0qGNztAw zxJ)ixK-@Zm9Q7r5yqFXT;1w*=|ZC6)O3=bvM#;&>*0;D&Ag%4GvyLx(NywOv(t}YaU*DrrJ1VL z73o$rVQ~h>vTVKIwYyq|c*7a8xr0t(Q9snq)+Gp=kc!nJ{#rv&Gc(s?d97*oQ8Z`j zIc$-XwU(G%#PVt{RG}@cW+j>GvZPs@S;6v>$4QZ8x7P0or=gl#O0|aN#ZJ^pSlT_N zACKybusC1(Puw6nBU-u=3zl`oLdC#kwmpR9*>DM{gF1GTm@~%`@%+NCu{>R1J9MaH zQ(G$5T(Lwh{Sn_Ua76iYL2ZT+yG=_>v#7+~Q#C(Dw8(5Y*#xF^yRg{L;f8pHwh~5l zw2-vBk`4nijb{NiZmi{~C>$ylf~}UF%qf3{`-fX0H5E&8ITvXQc+8XnyEiseu||3^ zAd=A%)><#K@SS1M!E%Do4RMwZFdbV;ImKJC5`R_O2gG}b?3QRNX{#`cx8eq`8A`D0 zioTT9YHqm*V#15%?siy9`MY6v)CD%j7iJvzZk^$BBc!!aC7|voXPAi#ad&+uMbXxH zAp_}lqMuAHyaCI#31Ap2(k*k*)pygTC_nisxxr=X616t6cp+P%(14Um6*qy^-S4P=c#liOf_>l0F}{8SK$67ALk-{87@SpbFP|E zoWyq4)GutqOH?LnbrE#gA-4Ixs}V?v;uM|*nY05a*}X!;p@YK? zYmXhP3?DSZi>$2~Dd=2!-kz#3ieKXE@^s5f#{61Cv=ro$_WTq+q+yc0#z_Lpxyk8i z>s*2Syome9n~@}?bMdetZndk!$t~aP%MDpul`01Vx}=e>rGo6rep#L_wa9uY-nIv= z87{zVgMAX%$QY>(+u<8{nDHPS3+8&BU|H*GRva^UvyO??C^eaE<+ZwiDO(GtCgmU` z=GOF0usz~U2fEs_4|ei(SWiU9W*C32-l@X`6U;At7LO)mVkwf!c6?M!SJv>Uxg{(Q z)C#~#?Gr*hSBJ^?3-h;OxvvA6pw$wTeo9hmyC^PvNS22>F(Pbr*Qw5aGRW!E<2T`Q z!#M~v^2+9*ZOPaJ{@ z;-8<|Ir#D=fMNkCULF)+B%PrqX3}ZcN94tTrk2Z~o393-$VMrYAiv}^^ew6O`O@1Z zq^xr-Cjq90z#qYG?-Ep)C5&z-pDl`rcxGnXDQD9#0on1GUd|ZNE=d|9|t(o4X5uMTz{DapySq{ zaI6d`(z;nsl{5xoJ}3-SvUF0YbPb?CM#bpSGfui-@YFRDqKRBf!7wnUo{ShEQ#Ipj z@^ENv)76vc18aaJ8x^A?k*$FKcz!o71hwZ9rNnwF93O>~??8T+wyE2oXyX+Le&FuuvV+QJ=0GAuj#3WctK1Ks}UyVm(zYd^7n|47@ zUTynViIA6oAzMZbd98LjUX-e`8bqo3E>vlSk}RGqdiZ)k>1^5xT-A9e@}LtUhVDRs zn;A8Z6pFoX6Pp<*&i47C5X-&SCeQ^p0Bp#^6`*p8o$^MYhAq@ziIE{S&=z;mCvN~a z&*rTFKwrG}1R$Q{U@5f!MnDV2O%emLUG0Xv1P{||0cNg5o0`Ns88Pn)-=*KG}L32WIw3%Z@p^E)b}SR z#u;U5fth=&;;Nb3r9`4CU@N0*HTV=TMsUO?kJ;B7h*g+V2 zCWD%=C5(hG#C6g%fOkIzFKJYa64vwN{I7i<#{gidq!xCZhP27g^3)!~Gek4Lph9tpR>XEP#&jK0g|{IADu zgHh})93KPiw73#34yS61@yCzf`Sn-TK@Gvz$@H6vwPsZQ@V}NT3vdiI8(C@sOUguxk&io;I|D&uSvBjV3Ll~civeg@{LAx-Y;zzCwEI7bKkW(_=f)J9a~{;-$s!J%SeR zQ|`yW>@Ddn^PisEza@?5*0C?(xz)4((tyM?e&v}%819G-9kZ|Bf9VAFB~OeGeMLD` z1O)1`qK?1KJ1CklX|g#wCYB+ic~!Lyz5fAFG}4CrhYlT^q$^*-GwhkiX4n{)A)rEf z+e3n%heG7>yx5LGwREh``Bmi-)HmO(3#z76|MxU==R+`u#5%E}Cl}*9Q2EP{jX|CA zxCv_Fz?ZfC0L7?@m%=%>X_LO_snb5>M82<`aEiV2YtlTkxgnIkzKJ0Wo(~@YWbWZ_ zDx*6|e-COO5b>e|3WCAX5Y)sX=JwEx4r$Z`7{*KE19rz(_C{;F-uM3lr;JYicWLUC zDkStW?KqSVlZqI)^C18$+iC1*BmWN1ee*8p`5i`>dc~a!=XmhCkUO@|u|6g}is8IxG30$! zD%$pz(r#fU=fT~v@?9ma*m&Oeq~^t8$ef~G|yFL22^>Oolfybhe|FMkOS ze54H}#%EyazGPx6E{$RNm6SIVT!%Vd@;b5A_4J}dDQabn38U5D#JX(5e641V#PlxD@OOO>~9 zkx-qb5rpa*?ozv5u_b*O7Wc$-JoJaA>Qlp_PYX}O z>kq9%u|C<-p>QD71`snQvo9UbMtcG>{|=t^s2JV4TDo9x@9$u;g`!~VDi|6L1^m@y zCqsv9#=N`BdxK>jTlIxc!-E-VgKWRZp#da_N(Gsv5*Oe2g>vuzJ>3Fzh&)S(i~(52Jqq-dKjB#x7*OQjkG%9_27&%?0)rTULA)FCX8sG$vedCz)=m1MHcY(W zAsxVxEI@rvJ#emui`XXYFDRE+HtT^BGm6u&k^L(vAO|4>hB&sCg)*5`+*HVWfVjqE z@-wlXy#tFmHG25JVd=PeD_V*ZO z_OHVgtzYft3`I{5vhnjVNR|gE6+~X>lYbqqXg6y`Pr-EXuO;E{e^E-pHwh9Gbq;Ej zcD+_l(QATAicp0}a>=l)eNnlvvRN18dsuM+I{CsXENWjo;mo@K?{N1cUR?I}=;^5ZmEZ+LEY|`GVp

    g24M#bohGCg9f}VhRu)^NAPhnnkxz>h7^#fR2^6x5kn^S z&mpN5*9zS^_=ytKtUA`0z{TS`%B6{bz0`$+Ti6nebt&XofN_jS(XH2=J*9eiqBbv!}%i(3?5T%dua;Qdn%Pp*u=UU{u#IkyiV(#r9N#Q8iG7ZnT!EEP8m zboG$?xl^_6WI{th0hpIXA|w4!_4a|BDE`Q6cWfK{e7kh#dnL8QV8mw$@JTXZNo$&Q zcM(X!(YKbtAV%Uh;p(Oa1|p>0cG~XI7Y=N zare)0^(h3^rU%05z8C%CB-JVuk6hmcqrtJ3wO}gHlsaP#rnD4Y zB6R5HZJ>5kjF$iBRZuZLwXz*8uBiTrXC-#KYIUD&T`CQUvwgd5gQrB5oE^enb;sa1 zS$YKr7e~bCsn30GScwuH-6=n$AM8@?TXnAQIR4aoh8Un>86e$DYMGeEjGo$~T0sYP ztCr#W+t38t@j;yLjMjInaN6)k_rNo^txLrw<$?Lja76FQvLt6LwR>WIXdCE-J)p0< zu?_E}S5BYYi2{4&;k8#)$I_75Eep=M{LJObrKt~3Jg8t*&km$2V_=Knb=XRlbBFmB zuhtVmo+qNwphpXd)<@JZ{__v078gg_!2V!z8lFeoct8c)Dct%=pyy4)Z3t~C4=0^9 zcTEs`dSe*Pwvk@Q^^|G}X6IM-7}DGPpV`3A-?@4% z`nON2#?k9()!Z(xHKc|JL+y?@vOrn`#REkmZi;mg5mfC!@1s@oJ2vkERr=nzWAJag z#`_B7V^uRd0SD(b0iM5SDSE8&Y&-)0=Y#^PvZ{mIH*G{mcBOY zvT=x8al9INt!in<=3UUyBj1Nv^1{A+~y8C&kRp? z^H!*!nEzix*Ov_T6BgC{&Yqi!<-tt2j5;pulW}fB+L1z!SX8HO-?S0@z7_U^9^Sfu z0#?K{e_tHZ+*#%!MuvBH?!yrAJNJA34+RKI1 zuwY@Z$BwwbLu}Rsh_os$^flLs&CacoHpPG^?bxQ+M!yep!lQ05gw3XdV>akj`M17) zi{kYQuNvPm=b!kmnfEErow{F|`z$c`Mb}}+P2Lb2u|hD;ABRt1oG;r)@J3V~#a`Iw zm9?1S(sZ9#}#S3~Q-GbvBP zqMftzR3&e0*62XoA4czqs}3!_Lb`ls=YqlHh0+wxtiKAP0KBPD3g#;$ENUGrN%SgO zsA~`2cN@CW4^#L^+pxO*ac;Y9=-TzMbJ4?hD3*{qpt=P;@Ilo<^ydIXN8I}9FgnFB z#I>_jp+ktG-fsv6TF!J56)%GO8xbSoSLdFNZn;mfd+_8%Dw|?&a2-m3$|^Q~JVpFj zMP9%8XCzh1>DRB$GLHClQ=dEs8i@!bbz6cK}doP=0lRE&;3dD1z@4hjU-@Sp&A zwB#*}5mPa-=<+w7z=C8SSxKsfr|`~WyB88+2b>KM@VP@ZVu`>bL&i<89r?&RAeeKd zREuy%uvr&rSMp!C7C-xAm> zb|YWrgrEMM8JKZiVQ2B|Ce}B2{`y1G;Xodo9e@kk9+MmBLx7*8mjRkOpuIDBU@@Lo zow{T5R`h)94gcaz?=Qejdq{{+NDu5*_{mt_3}HpA>&g2m^qs1-TTxIgz^uJl7nHc@ z!z?;HzPuehR5+pM-(OVSx;$dSVA+opPhi=D!>@kZ+hO;=tnx2^33mVIu2+6w=8MxR z#g`_}97oHZmAbV1uZ45o&^iI00h0vf<50!}GV^TFWP}XIsq5RIencpp&&r6SdRqnj zK%<77L_g}N4s34UcxB-3N-l|5r;f+0fp9HgR)_S}cFPyA>Urs@9h~1FMU}5kopx*& zQTp(`b@=c@>#)ryyCq*zA1x4dLM%f`zL>$9LHG1v{3Bvief&xpNAs#TVc#S%3}fF! z7h}#ArBArK9uF{Uv@_C_y&c7xu+kZ6gC#PspdDw{L%^)}vQ1a)n;vQnhY0+`$97%2 z;Q|2a%I#3TYj-on{P5#DNlnn|mz_@;yBoW~PR2LnA&Gsb&0U#a8p;z|3)I{4_3CiLjl&V!ikYV@dAdP_6SV~fo#B0gFb<)hX6 z@zH8fLK^}5n~XLZu{H`__O=t);4!q(y2`ui1xCGN97$e{Ek<&X&0%wzx}sY^KUxP3 zBU1FB|{(R0NK9pfEWfO{A*bg=)} zl_#)&ITSqqYE?vHRHZyUPu9cnKzQoz#(D+dC=KV)C$EM(-@FyjNv(g?J6;3c(QTDT zjN&CfecTUV%%>;MQrsx*#9gXDHylyTFSiH>)ShvLvc_H^SNDZ8=-wmX z*G9!qrhYf}hv+|FoLfbQ?FSAG#CNM^6|3QO`Z$%_i2VsjiB4dZ*hjXI3W~I+xt1?N z+J%(9sWvml9)o`NKKQyv#ptL{9>XB;e(szHQx>>-lU8GVW_D0wgqtS{gKO~gdg0me8p-+8Gwc{iWO}-35 zV0=X<*djlF@YIbe2XMl#OGMjvJgKrbo2N_GQn_0&cXW;{diQ%^JR@QtTB{ECJ5H7F zYwLBY)z!c{BTaq7s4)^V3mIKf%9zlpqreery%}~*HcBOmQ2Chmvp1{mQ*2@)SKe|W z6Or9j^+T!)H+ii;`Ot}8tMt346hOabX5c#^fdY;3TERyR|MujN?sh4t+O!ot_07}% z#jo^ZACUq#3C$3ZD38ssZgq%WQ(TPa^=Cr4H7kEds* zdnS{~%w!KqCLv@YEFEgE>HtD-)BC?7o_p>&-*emZ_tMCF z=V@)1yYGZ0Iyj$sbopoDlLyJY6aTRm%r@=apqQLsH%7VvaQEavQEEHRf(QN$*KPOT z4QJG4ThYxAUGUF?IF{(XM1lha`7LilI~8Sfd{wdpjiFvKMb zdgh+f>ZhIeg2}p6j6k@)cklATC7(|p{QQV}ZEeNm*%P7h8^#_`{kL)hTyocXJKe9r zmHS~4eOzElNZjwX*j{V+)X02#_8{AI5gQrFw?$Ov4PyAJDsgA^KO zHqGiZgw@ZwGgXR8VidaN7;qRMBmVk(MYr@ds(yut(JzQ>9EU~Vb?JV}*XjrfJc#Eg zf86JY(;B4e0h<9b;`h*Uv|_V20)YQ15~@>@?Pe)w!s11Y6wnVJf}ahL(GmSi@G~e1 zfzJGba%0c@WjK+->qUrj>Gf7yB330i52lF;+G;yXAm#zMQW_v5{Jn?dfbdU0Fk%#0 zh^Xxni%N~?#EGyrHtTS^5|D+B>W_ke4w3ND`%rKGiPk+z3@fx8v=*HjUlVWYO#*PtH=8hrb zW58i48U1F%U2q|?Ew{Dz&|_c<&OxT<+{lG1#*mCzcVO(Su~nnL8~w@1;nAl?KR4nV zy=C;O(Zr}@lpdWKRjPii`l0Hvk*w-7st>7Js)H(%>H^g!XTC+n5s`*K4q9XAFfPppZwe8E0fPoJ~%h|iOKg( zmM5c=y2*1V*RB4`>X%o4d-az_E?oVw)z_^qtPZYz*Xq5iCnx?m@#4fY6ZcPibmBb| z=?V7)H*w~~*s2q&URd?ys=HPlS=Cv^ud=MdS8W;j!m8o%SI56U{^@s;mgSy~xddCAJNS5A$sd}Hjt#=Z`?eY??wBENOt^FvPz z-8J;#q3%#@$T~y}Z5{95rt#p8-Q6(3Tx6bBV1e8q~Ocgww4Myq#uA+rHk935Nfd5g>qiW zfK#HEIY_g{X7#0FtY9uC_<)2AgH>=JMp-lgNW5v5Yl*DwseXzJR<1!=;F91nbekbA zQgLjS*(7x?ykdf+p=inD<>q1sQgQ>8i%~3;Jxus=U56&eIV3)%wA)S8jXo2k#Tg6a z@Qh4ObRDKZr<{Xwc8ou>|3?y+L3}=3?tRIkNdfX44@q>9cs9bYQhFmcS7MAD=__ZU zgmUw#v^YC%-0jsK~>>XyZgf!&Kl}pV0?odQ_7n%$~Uf3DAa+CPTeT9?zmX;36u? zbdXIp^iDTEvqk;^6jh;IIK@zePwOl4%3EbRuF(-rP0ib(+ggh|WBG|RKm!meTS@8h zLda+$$dFHftSq(+m_V2OKe+)f_;C|gNm;UH*KCX0aJ9rIU+T1*noulUWm1AAxl_s@ z!}5s`OX!N;gw2pM^SXrkc8N`%&o^*))u5vtanjLFkROog1Au`VX=3KEe8keF;^6{L zQ#x&e$&X5y6IkBmN~CK3SSRYt#Je$_LGF&8^ELFb0AbG7n%2CrAhRd)847nnb-yz2 zYkHWe3uQXiaFLBj$m%RYeeVLbU4B02Zb$K|D?Jy5VzB9ImspvVevos_W~f%YNNDj2 zpdY852V^>%DUm@T?sX?;dBK8jc}b#Y+x8}&HE8k{dj+p~xJ?J8erD5-x<41u#@o(9 z*2e79<5LX0bs%d#^V;cVO3sVSJ_jEzmadX! ztGP>+Ox2dtS7*|7?)+cNd}y8`%ryt(k*BIqi~M}ML?=3A4iEV#ZmtRd03J7ffrL7N z6M(=4z{fgwBj71EF;*etKoPD~iXg})Zphj_&Js5+sXd&SZC9x%WffvYZB3s~T_6Dn z;RCouTO?369BOI-W?hR5cgzV>N|W6>M@t>Tv!Pk4(e8R;u}Dg5V;oXxTO2?=2-1?I z%|4IOtW8dTM}8b`w1@)Xvb$zo9aEC=z9Q2HagpS1;sF82`G%&*m8`rFOkHr1{QMlP zcj3uuKHBzLLw+5%`qOd)W`IxvF5Wd{W4S1swd*AMAmHkLi%id?Im*z<`idQ>Oz7rz zNC}ZR21uYpHOkOFhU1}(_Wm#Q1!xhdX)dFyFr_q;l+-GYIeBY^=hKjGOL$9p#aCta zW=aEf6e<-@EnSUQ;)<{L=~y>sfvP#ae6&us8jftr`(a7?yL{Z34ftYiTft(~5S!&S z-RXwx^>jJh=E9f&#{DBwdMpODGMz*V^P~lH)KsKc>-!}39e1{b=PBA1GgQnPOta~Y z1-iC^7fe|VR$+W@TV~~cnQj#fxQ{jD$&MC^$;Z@6na(-^rK;)-L^K(weoK;4mNwR* z=ayoIx}}AIb+BB3#A4-8vFs!m4?ZhMjM|+HPGTml(ZWV&>kfLKloyJ%v+;JLt2G$( zc*EepXP=QD&oY3i&j%$m7o-`wwpEL)-=&%m|4fHkDrjzU9nahs=B5f<%XWI z)@f&Iuap>ywF(_CNjn;?44>et?yPO@x6%t*X={hlb)7bU&S)*rEd5alYPA)!MIHLM zr87!MAXjAk>->}S1525ZzO6o#<%Q{xHnSv5)tFP-Be@F zVsDj%5qWwgoU)TJWl9Ni0D}zsrr8^ZI=kL_*qLJfAoJna0O5@2p;}KkQM9FYvod`E z)oi6~%G6t-*?Ixalis=!?_@6sZ5o~fNK&kx(_n;9VcNcW(^A$EtL0&?XJ=WwP|CQt zl*81jkrVQy)Ds<-#RCP612t31z57SfTkE`wC7S?5U<0URwwm5|i%hp-Ig%l}W-6l5 zWINQ(f0d@TPGp+txoi&8;Y7la*@dLXYbCQr1Ss&C{N_-@n%#JJ>l;Dn;TbgLV zMJMOh$xFA|wi0BDjOscR;NG5B-Rw_}+Uv#-lF0u8PIasq-^7%}? zlrc%$5LWT9ZK9n9^jLdP>lD&EB%~0m;z&8|l~lIj_v$Tr;@roj&Qvr>7tSV29LF{> z8^#YGmeQ?1x?-X^e&^T^MwOFhB{Q5>d{i|3-vhV2_QPUPASt3S)%7$Sq@m74U2V6n z73I;TKM>EMOUdZCN+)G1AjnkM(EGvNOQS^YGsZUdu6rH=CAS(EKgbLAc9o2_6Jc)* zv+(*Py8p+(Wq^!${=-mdN&6n-{9MxM2X zJ?P(G8QRwS?N7y_qz;SKk)({pw^%Xgf#-n502%FE+1-PtJ~gC7|M!cKMZW!C>Icx3 z-y4B6HSz9(`ToM)h2rWJlO&V_Ix_aS>etF`kR))m7%Y(Ji;-9lND?Cqk83$Hbg zUlYa1d04CjByj*huvP^wm8zu@Zom_b7;?N0EC$FB(QT4LWWVw{%)A)pD^>!MctnFV zl&ImELP?)Awlj1Lm0kuO17vjQbyI&$ZR@@KvKVM!KP;94l6*3LiZ#~-3uHf9{j++U zM?d)`ctn;`(V-W&%eA9y|06neoQEBYeW<2!uL<`EHNCcI14tPhef&7|VSo(xIEUqk z!|9)ip}v;GcIbl?Ezv5+JIz`xkgWL1;X)~oE_ns|u#}3PTk}}I{M44-{jb1m$VFZb zub3nz4vv3l>ksgXiOTH{jsW(Gw63;r;_$ zwGFf($jTSJa8p})pZ^2I^+I5FbW!z0$gUwpH&Yfs{n3_esXm(>EEIRAPK_5{`WQN{ zg(`-NrD}Tr?|1O|ppzodJxM23tBquv!ssUFZ`ZZ7F(&feH9bf^S#wp2V4wai^lwXe zv3Eos9R8#wp4RJWa}bidUwRWpaVb@VA=rz=Sk<2EPvSJ#4xcPpWGp-Kv&O2wn()UP zF(}1%&0m4RQYt#}AOz3$t7Jj&^ZMS2zrtO}8n)o}_(*rrM^NraATkRDrTz{wFhGV{ zYd;4cqgb!)D}V3Hvg@!|_(z%~zS*hP;n3J923g�Wt-q-T)p0WHCuV4p~3^hWP#d z#qW=BrFcA9E5pU2*Tup2-}h(e{!%JhbHeHEjIVnnFpzg@8CQ{?q zj~yLetNMz9SqRh(AC8MI#J&^KAI>MWR8S8|)`q4xn~tGX!^+*$gXDgwiFD0$?XVKA zi~NUq_*5xKw`H-{V??5BGFuW&9he%3-wYApe;rXyP7Sm{=rdfU_iO%yl}f*2jRrEE z(omH=sL@%I&KAp}uc+YtgJe`WTd`XzEwz7C3E{GqcqY`QT&7$;?aScaPy*dN2EQ95 zqoZ3sX75d}R6;2yI70$%Pr}I@V4mk^-74!H3ZWT=KpVz_BuwiO+py|>@18x?D#1(!e95kn!Jgax8F^97{+ z@x$v-d9!j930ss?>)!f=10B2h7f}6hvUHUKZP})r-W>5m|B(*@japHV{bp0`{Re0N5<>@~r{Rre01XDy^}?o-q!+~fJN zFAcj@FDlRJ?R+WsZZUBZKy768QK4y@7Effd25*qp8|oZN?t&FEKt{(dFUleQKiVZ~ zkHFy!Xpd|98pvy;I|7-gX}o@?5b~Qy^ue9Vv!({f=;+mRa1pauuIz6+VWmMpkO*BQ ztr}g24>yQ-j&@)|(_~4)I);y2N=1qWRMIVDIfIcpW7(qZxY~6(k7oD7dj`p(g?VwWw_h1htXh#Bzj5qcs=J4tP@-dJ z71kk$9lKP7L=YAO6bFO^WamZVG_oU?^Zf>;bcj5%i#!IT1cc{(81NV%_l2h?l{Tvq zN(geC2FxoN`zHc%%ua|uboe1N!H{ah0we&oAdL>t%Cj~s+lr2*z%G2x|BN3z4FJyK zbuqe|0lgPB1#^x9Xc&VL;wR&j!vwn3pU$Ia8PG7xw*oi{AQ|&#`R3Z3SC>Z7-AyptP7Aiyc9Z;SHT5q{lbmXDJ#{VCw z7~3yWLM7q^M6(B=60tbE0ISr6_$4CH7MCYPIbNikTEE;AXw7iRhMvCYv|qmcV$f`Z z5||gcu0t6GIH9=HT_+aWO(^WgYRa5np2<@RBZ;!tnrm5Ho)l&FCQkd6{W zCge>JX2NZ83Bht$gN|xpSeH^!;zn*cT!rN+)yXZAHlLOZmyPX^S1Z_v zjL2af`lA_oH`s=>A!Q%KrsuUN`&ZQ!;3IW}D|)dSVb&$P$#BAIXbMPY1R)=Iz+1Ua~a4xeaY%1EBMiSj;1r7sb#DCh}$7S2nJJSX%z?v?> zXvi6ql`=T95{4)fDw|@25jmWqSusGpg})9Q4PO>3!aJ2>nRLhDlNd>vTowukR8lrl zqXqcWdls+x}lowaU*K~+7l7$5_{ z+!h%O?q$8Q@9z*%l4QqCw47$hYLznud_t&JjG=4n@Fl4MGL#X01}xQ=hc@?Kx5KB% z2Q1$^oN8J+m!O?`tJY7k!`vY59V z?!cr;C(#BhwGhdYCEn-=m`ruFIs_~Rs4!Yk;CJg!hBx=-LZal@4g)Tde3*09i@1-Z zB07TeB4v-dg-T!AzfXpZ2$V@;&?j`iy%AFp`Hl~IX%^Jw!;;;5%bLE z(Z@Z|i2*V?R6GFtyJuo+Z><-;W2^OW6H;%bDJ!u-2ZhD$21D7EN>k{kVdd`CONii_ z_$&zC3%5hr^2{`x1|w288jIa2lNnoZ)xP90^rQmtBKoeX|MJ1; zZjzjgA6_xh9lvYrhoed*2{0K~Dtbrwk6i^~WSt*|H%ilIz)Gx(u!Mq~DW!uua2#op zFmwZCIO8*W(c^LW?7NamNLWm1n<*pNHt46!Q)o0LO85X7t+A|vz>pe*mRyzU z57)d186wSEIb~p5cq>U$wL&VRXR;_2hgT1fk>Y_1Wmn8kcsgXH?#>;NZ zhGT^g;ANv9r-8))8K53+lbtcvj1tf+T!*iPUPy;%Z>3meD6FP6_&s*L9fEyqMPM;N z7K45E-u5lfd`}d`PJq(623SbTsOHG|A?p>lddm(2>#w1^v&ubF15|YAS#S*YGq<

    !50w}LHgJM-b*0Q1JJgl3d!Z!ZmmZTWZrZRBu|7W!&wuI<-*YN1{UNx?1g1k1 zQvT>Y42pb}f?bb;v&;tgK2RbNoc$rG0}zA2dzZHdp#H)Yk3&-HhOLMlhjPz7^XTzk z9t^%m=>(`x-*cGFKF}w6V0sDaOy50l#po|bcA@?330t~P+%$6)=Kwi8ux8*jn*l_t zn9O@3aeuPeiJ&K*gsjjve<=}9uWv%?%YMqk7KeVt8J>fON5HN+&~t(WSValE7bUaH zZjM0!E*g6pHu-vLZ~4*RuId+~UL~gwKh4?vrH45KrED7o20EpJX_`r^mC6Ry5eEcx zp>O%%Lv=x$}-0{d#_s(z6t!8IF{tL+d@gD|LEFT@9>lBMkBCl5J zb$LxWSzuBAx4=k9hKP#64|JdXt%MQnQXb}vm>7YWNa!myS{<~t%{f=elFf1s>&*+4 zoOox61wk(u)f5K#MQ=YPc>(7*&HkKA>pIL?H?gxr*R+Ha@T~I5107kUndTO9acUj) z$ji%6c;of0ThX)kZ2vRn<9e$1g@AF%f1%*e!dmK|fh{c{9Q(}!*84r@i0-a9PbAez!hKL`0X%4MCE0N3!+t9=2 zJ*xpr(ceoPJKYDNOfoMA*Ka2n*iU}H@h0oSCIfh-`~FjM4%C-#adAU{j0LH8xjbaY zw*lh{JR|10&3gzb^^W4-5Crt@zDV@#-vh$c*LKtB=yUHW3&#H_`K&lzOc!Y)VJNql zCRq+bVKn%W`Q1{LoLZNiEbP}6J)?F(J&x}`!lKVTFYyBct_^bB8GySAL+Sb`74kwn zP(Y8^n_%Ad{#hb{eD#fbKz$b%fH7UB{MF?)#sEq?f`=7oZM-#~VMh{Le4c|Vg9{lCN=y+5l z=b{M~L`eA(>{ojunoiQnoH47)S8h<;yC=QQxy+r1Iml4#P_)_X9upapCrYJC zwg8Bq#OrXQ?*A?%dB5?hWM=kV?FaUaL7qKQ4WcJ**tw}2e2w!_`wnyXpEy>lQIgwP zQk|hYX@kj|3MTLoy#5XF%nF(i;rZ=Z-PhiLXrNu;!xJDDhI$fScvAUOeCEsVb&3&G zq?+yC@G=MoajI30g-Le-qJ!&F1)-wRvtx6c(2iFmvonG=bZqim-VNBhB|5Kgw*-55 z8a@V>FD)A!YKC+%9+O_0HZ|Q5^dE1*RuYoYOTlql_t;w!s39smaZvG|6G4HuVerB> zban2!v!SFDcpoL9zWzHwt>a`{2xQw0L&IF2v3kcx+y?n@#}pBB(Tr;zfYnCJJ;IXD%MUQ_V|lYl2^?}l^3tBH?I%sJ6r{c{sr0c|4} z@`h8P02IxH5^sQT0f~k-DSE1Z4k~?a*oqE>zsUyz1qSBcD-h_efjJ1`jF*`b4W&3u z+G0}eZ$?pcaE`;ATSo>gkm~?|_J$(pcFgcxuvdSyhqs{v`9=BwlEl@7O3*U&jbUz7 zP=EB@t?1bJ^#7;+=n-`4D10v{Z>=8Ci5H6aWn4{wS8qE2N(DJbf%C?#=;-YGAodGg zyB+;}bnd-^R!<$9)kHaR!FISerFHYgPZkceJ2=(_t#GX66*_5ZA43)hK zj^*O?dMaY8e}XSO?Zcz!iL*9Ky8pRz4uo*vFvM*0b?*cx1`g79w!X(f;(`yhcNN>_ zKnT-^H^awaEP)^`jadm(iVn7`L7%fjqeJ33zy=YJ(a{@PQ2gh101N!5YtxyCmdxFW zwY~AVIZmIQThsOgJD1<#D7Y{uo)NV5b~PSZcVW&f+BChd@6#gB;8bd0^OSQ+Id%NZ z6I0(ur`#3TvHV1TS9JHp*C%e8_~^iS6QzmJgnHtnnQu&p$6p^mHvZW7-BX_!|J3*; zqSwc>A^nrRSN-Qj9J1=h{+${LMe$!LxH9=1`;I@mJlc< zP)J&qHceaHls%=SltN1i|L^K)#vWx1@$Uz*&%L_uZs*){&-v~-@7wT}4W$i{4L5AK za>J&}AMW|DwXf~@C)4?!FZcXK&wJP2-}A;Ey(iEk_U!BFHXmL8v-RIu>s%f*DnFqTztozS(&#n97x{s}U z&$>6PORpPVC#>6RDw$5M>stE`^S_(FZT_tJLGz+{Zp%B{FZ!?9(r4ZL^5*Yv{+pJA z{M6?0mV^8V3BTuZ>v0jLRTn=v7aA#q$3}DRa?J3)h=Fi=j*V8Cc@gn3M(pX~AGAyq zVj!uH7u~t&P-a?4DJ7rbrW6Nphv3E0q(dEM>+Z3P&#=^r$ZwM1GXpa39^k9qiuduB zAw?X>g>!5vTsh8{rrca)rs#GDV|@I|Aa0X;q|3^c@{ zVp5Eb)Y-s;Ms>OB81?%lm(QznRhQ&BY>?T(@c=87$}{!C_{j8p=xatR;_+;yCd3oj z@UUHF(q7(Uc-BO3QW;>&j!IcAO$W6?Zt#EFy=k~Y?7&22aJoJ{H<2HF@bXqeLfz%e z^U7>-X13iw}6h{)ACKI9+8~F|Yp=~0 zP3`&}Nld%O+SR4}7_YNBR~W7qGg0>Dq(S!=#>ZHHNhwShXVSyTqVnf$x;~6dgsj9J z*K75$;!JLb0TdDa{?RERR<1C)B4PpSx@5dM7yX{}^i0a7ir(7PK+xXzw?;eg##e;k zylZZlAMnli3)>BIt>}vZc|0=Y_jv%3njPS7GTcg{4~gzsSC)^eu4v9ZrLR5S=60WR zyn<9l)y#Cv6))8Eb^mF6z?f09fn6m z^hnMUn=c7cc`)fMxJ!Z&p+OvM@Y6yh#UEF^vuOm&E;?#PLxb4K+-M*<50F7)W>5?GpiAQQ=|BT9~G&!|&ZX4w)uQBs3>VP>AYX_wI-XF6V2R9DqCK0o6h zOW&}^Xy&-nH5KHf;?&fcTpz}!qtq~7I5Rh%ttnq_^qF)!Xv9d75 zBX~rq#J3lIAfct;`brh;>6!YNn7y&st{)LZp_rVK;Ae}CMD?woZ_|A#7st;d2uVa2 zlXISY@1#-Sa8J(gmBE2z-shOD%**UQw&_YS#1Hz%$7lTk2JvCn-Dl91oU4Lx2!4*8 zo$(Yn?X`yAR#f7n^}u+>6TmC=si1Vd)UFrG{{>GZ;q%aQ@r3+P+IxnZB@_?gH|cEqc2y0q7DS%~s%k>vst z^LBeaG%#5e_y0}1{;0di`-O?5!to=sUU}!QDgC%plmlX%D~=5oCb;RySVMBp8Y?Ed z^I>*&IN;3&B9eFL;J>xo;r)^@JyaAY%PconNMF9us4i(-G&fqWOiEH^(yf>cZ?`BV zeQB<)48@{}x%9+vZoT316Q$U!DiqzvGn4hQ7Eh?9E!{@@(r9I#tGPypbZL|g7r1qA zYPTOwR1*VCeH;^*o)?d_4>wgj*4LS^FuYKSSe2N z4#Np63ej4gA5rYJe52wTnGk#1nvyUYb^5FJQKm4T6^1j{wO2&&IEMMW%aJNKoMXqu zVPWq>#%J+DoZ;krd}JcXNBlGEj5rS>KcoX@Ax&q7JST|`qn;VzM9O-yA9*PKkbOXYnD02CXz&fKT zAuM@QAw9oqgV7%@<4cb!lcRZOg&hm%hm4o8A~)FZ^W*hgE<0Jt7aZz_c7O0FN#`PR zLDxL9u0m3AJ!gEEopyw{MAAN;9H~zFl+2Fy^s@!$9D6*MVr70LlqyMiTYGg`Wo(vp zI;&IM=wvcAQNBen8o~?rG>g|+VyFT)9Am$#eO5Di(8CQms>O&tIhAT?`yK82NjxbY z2{3XkF~{*-nQ3!06Cayq718Yu3uDJeD^Ya=-~K_wtqNngic~>b)QFouw7yM8Mle>Z z77KG}zc(CL+-(uS$e}rIyefoR9GR9>N8OOLXSTuNq!auT9ADgS5GuP5^kA)v?X0}j{toJT+OSeqU{ z4(y_K6kd6(SqCc+*q)BjF`UaM3bTt27HyE0>Gr(5f7?@_zr zj&n}AE>DQ_`J~St`)RAbC$71H|WwhfFNaij?c@f5pHf=h#6`% zT+$57I%5OUv~!Z3DU@SvdE%-nDw`+^#mQ8n%8b}!6GlUW6@P$r_(w(+JK{`?D~XfF z-gQR2(<6;|eIPwi*GJX(kI1vf|8>uCaik`Ub5j#Qrf5)iN~Hr|GwP3MKuL_UK>N%E z{EF;-$Y_2fR!g#RPhf_xagnGayNPYn!|n)IOS@trjtgb_o9+jMA~JiNMc84j6qC|dw~zf1!8gt7fsj-67UD`yXRd7bhZpQ&+!Uf-!Jl#= zj8D5Ao^9}RqHlO|c3?6tq;G!Q5OAT%`RGt3>B)Hcwz(pWAi->T zM6PQ)3rqCTG1fhsEBeLxnbC4O*1p5JoxwqNN{?jy^Tl#

    jB4^oKj%7)dE>LTk*y5sH+hVNo?d_jrM&h-OkSHOgNboT(dE8^kM4W-nC|M%@%$0 z)0>&g&use5raLbC@@3a-eD{X`+K}w|T+fy3-_iZ=-I1=xknZfH`A6meP~`olJJ+1Y zkJhZA5%1`q6FY+BoO|ODUe@g*+#y+;AS;?p;PHQ|swnuU$fQM4O>2UkwJWmSE-`lb zDByMsner{}J;=#2%N!L2gnG5}oUr`&akX4X7bfRsPV5L6pI~H8vMX89CMz;;6EYdq zrr8k^r`nJ2KJF>d>gy=|A9da8G}&pM@1_(K^Iw@psI{b^3t2wR zWI;^hn%SNw=_o*b3{n65)eXYm{sb?IjIK&HNo6xw3ej$p?P=X+*VwFt8BA-C085{+ zA4M#G_Epc5&-g?Zq2#iW*a^O`i1rjA; zLvflY${8-p+cKHfQpi|}jGng19EK<9dIrAL&;O}4V{=p3=dS6QpcsCvplw&HF z#pcvy8=Da*hhznt%%)WvFNqmlNn@OdKC?7k!cjXbziQrq^KcmKr$~w>(ghJ!0ow{1 zn@vOXWSe9Mb0DIQoe{N*z5o_v$hn8M?73RzL~fbqF6PAx{MYZgFc$fk!f5nkXy2~j zOX)0UQ(3x9lFr#R1XZ=G7skS4cQNFE-?rz_tN73kXKOGlCuQt%2Asi2BG!e?P#$3v zn;k18@yITKMOz*Wf0UES*&8tuVSFM(afWKfZqpE!5})8Xn*u{RaLsqT z&RB{pkLP5FN@cUlf^HMAmu!lLdCO)sz}0~B)0oWiM6pLjk(~X|TVLH$+-%H~q;jH& z04fk53Pi39PECkh@^4Wf)TSeMAG9kteDM;inO#8 z_yi)p*oou+X7=v5)M}F-`!*t8%drdt!GT9sHYuahovLd#na3RQ0!p&THp=2pTRMq2 zy6tDaUcBNU$J#H*jf?iv1-Y?9p?|F({xEjUo%=7C$~yvc@_th!eL2ZyyLYC zvm+lBWrZVWKMLt2{o$|l%S+PfN;aF#K=PqsEe)9=aOsw4*KOGh&tw@)7AGt-1V+LO z#Bt{A-dFV%>B3he6;joX70xIbdcN9an~WDtm^6fv)g%@FyLi4BnV1p-dv{)PEM%j5 zBP&S9pc7@YaH88(f$C9ozEtQ$P(HE>gtrmaCP#;I;H_URi`Z)xV;N zmUcItKI*j#E+A4#+xIsV3frdzL|!W=nYmeQHb-08PTnzW*|MdhjGQz3jBHCU48twC zC$vCwk{W%f1=#c?FKPpgdAGYhn>VmLpY&TSTRMvH4*DZ4SLv?iwjtUZap6La$C1R) zV2GCz6D1cHm~~9+#+csiguAYz49?;shnmPhwS;AR+12v>U9s%@oAMP3WdUZeay35B z;2ua^LCkXpnVcQI?B?d9L3sT3ofH=KE;}O&{Cv&9sa zbk86Tn@?>uPd@(+?Aw(^UB%FGJwbn$nJ;?l9^(#;Q(+e#sPI#BOghjC##ndlXRJ%Tzl&!(I}^G z1sbJeb7IfRx2?Ws?aeRrbl+(r`);?4^?QPaAeTf!nxv45y2T{$z@aGe<1F58Ib>O- z@Qi*FVnR^a@+!c#+ZNU!&d8tkJlp--u4~P=nHDzHXabhm7Si_WWu&dU;!YtF-2A-g zRTHy`G`U{|ieM#`MnXa6t(TDl&!Sm?3maYllDr+OWV)W39p^RgjJG@*_clUE8i%2G zP|34*4I#_~&BfF`PFn~r99fo#)Bb2Sl`I9~FbxhR3OVxmBD%1WN?!W#$wLIdww@+3 zrp1vxa^di@7!z}T+;K;PVsS<+jCsTic`=VZbdZs9_*6@TttYoUxN}?c_5wv|gcfM# zT|*qoF)i!Hy?Ht{;+PvtAhqFi8trtD$<+0~rU?OeHNT&xl5k`Jp!hby6*W1aRrzV-9X|9k7B+wuJHgl8m{L?9J?!g8qh z73Ah0Pgsx>_+KY22Yc^Yvzgsg-}tef=hk1=b+dWWM5caz|IQ|JN9I-vfTP(14FFuK z;xT=tC?M*mGI>|)+ z^7+H$33K00^7%Je+Sy88IBr3f(V>M_($&@o(_^Jk59=SwD%pCrTykW{`x=&mTRO<( zzyqH_9Hme8?<5=EU}@(ayY9}`zMvUP4FC^2H7-}UYJEIBQ7+ctHzdUw%zp=&oEW>N zm9MDX%#UYV^F))l8uL`IxR80ZJP`;El{3>rESXAMEabVGW!sjHA_OaZ_)rrmlysZ6Gx8G36_O02x7hx+RYk%D{-~DmZzI9FZXU_FF<>L!9!QLBN%2>ocr_J!w@>ty; zMnLZI0@-yEJ?olXMgiAPgp{x zJ+1|s(NAqH-OA(gRh^_;|J<^r+5b+91F>fokiqnA8(J-Op5?}wPrmmyC_9~H7oGF= zw_7YUhx=>D#5*ke_oxdr6RE+)1Id|zIy;EutHnw^CJ&LByDW#dzJl6{hVsk1ASECJ z02pomnxA$vW!914eT|Yf>>1=pVgZxWK_*Y0I}vDpcfo@2f$8zoB(EYE*Wj3EAPvp& z`n&Oi4k`i$-7rl4<72mOXg+l}M6UJfHJiV2`E{4wu))9nF4NWBuV42S^Kl9#++x}X z5UdY6(bd={ea?1trVdgr>Gd7AQ^R; zCIJLCwubP4)f7!L7}T+ovE0*w>8#m zwr{!(DB2@EpEfnto6G^q02<_EXyFzxq@mFa}=luAlPe9d;x0zspBn4i{SXf3|pJ7tBALOAP#5#42SwkB02EGPqu|!<}|@xnRcF(~oLq2e&U~;$xzkGSc?f!4M;TF14YNo+YQ4Pqvxn#@ zG`K+X)TUd*=-|UY#Ga&eethBMfH(J0=ht;>Z&*XNKK!*S$dUb)-OPG>_fLUBjdgGA z`h3@H*VXI(dELG1ya>zm33JZ8XYI3V-?sJ!)6Y#0no_1MYreFm{z&69JYELfZ$3kQ z_v~w5bA+)U1J;)pfVH$`IgOf?SQyqt*mXG`$p{o!%JA%j{QS|c9lRQqSqY9P7*1`h zs=^8nHxW$aFx-i-KMImgeK5TFb>zem%avD&#{l2VNNE`NWI=|7Pf|sjBEvK-!F|TV z&ZNtB&J6prQ9A>psE~oZT4kxB5pFb_nudixi@FSgnV?sqSzM|OKTQU4=oDKz1Cx@V zz<#U9l4uh-&7Kw!4&R;;%-m9K_`U$e<0N=>6!^fH3~Xn5M!-*0E-iALpfbE!TBar~h6C|8* zX)desc%j$sw~R(I3ZJp1^$cq3)Gf<#*a)nm2$&O=lT|ajTw4<0ugzv`tiocSXfQ*< zo2#Qc0&L81GGuk$Y+J4kgCq~*h%Ia9Fv|)&bTENR@X%#N6=TFC=;ot@z1DK*Ft!35 zT`-rbcI-QNz+mrZ@i&Igz#*!s@PV@CtBtzg0$s{rT%1U4>8JqDi3raL!{|C(zsRv5 zn6EPGvI=Nf1@o)Gw<1W4WK)z3wR9??!ZLPjPR)FzRreqZPLgzNWN-ocE3hi|o{oP4 z=)(d*mBvJot)Ha~#vRk`;29A{UX9hU^$^4dMqd0vWD$NsQ!;j4NShBCQ^6fein@TvpN~4co+gc&R6x9nL?nt1YWx!%_b^d?es^R>8tDNKV4DqWQp5Z5Eq| z%|e36jE|X4p}@V&1bjuif-*9Y*sdn+SHo`=O3I+$eyBznt9h!ZO*RSGjMOh zm8pTjWbmY{%QAL4lS%7X{A^k>?^~{oM0Z>olK^2(nU}#@+PMszZ}6iqjEK)_=Dka` zS?b%jr>PH+?pQ1o+J>u6*JVg2UC?0QH}@~qhDa0v_lDPk`t4hw4Tab2n0_sj&ScRW zfj93oYBR^OA`9>U&j)iL}ZR4`=j)*Ma60&6OTdFOydRkVo@@Xt4))J0)Ma;rW4r!Q9V-E2Nv!zx0 zFmueVBC!Re3mk(2MhR~xWRAqyI7S0&W^ft;QQ}zp83+heW^q_!JXE~XAm4h1vonodP*5w)|KS zJ{n*GHZTM_q$@fr$mUJ0+BY)CkZ^`q6&xKIU{`S30UUz~gv%BV95D-4fcxLvOO+OJ z%{$kazi6(SuSHnMGi!%h3e3$TmvwFY^v0=;SK*b;86+NF*Yla4>7FC&pI?7^{b2WR zx*zV=yLWYcv+J#0%DSJedtlwzy35zDF+E}`nyy&$tu^GOkM!eo0a`F?E)(_;&IFFhsM#!bA7m<~TLd6N<*~AIT0$5tXhN#M zm~*u5l~-}cvN*-EkY|u&RKx;dWK-Z`hd2>=Ar0t}A}eM*UTxQgx`ZqPa8%pv^lXCU z27~}I6h{C&r#e2Zo7JV-Is~>oo1t3?uo-API8(FKK_=QcyCgF_+;e7qsW#kxGF-h` za4jS^f>T1eg7vVfXhM^8RuwYlw6T`(>WLXigM73p0*l(f^HR78_+G}Zb?8h21l! zI3BITBWxybK4Lj|mHk*+!p|uTK>|vLb~{6bD>Rx6WUHoSAU1UK4Ms=o$J7k8E64#_ z2NTE(;017)jWS49lc65jGv=F@Is&8@1SJjyJ`HcEpkZB9@C-VlWdU{)btpn+a^m^d zUU@ak9n+wTDl)`1(6V3##2^AH!Vdk1%SZwQqo&J@SzDTJ#M@-VG^8*DB|R;5XaXAe zj?n?1(X+CY@#+Z{!Jpoh!dk5;jt^nde5rKe7U`s+ZW9%w! zF_Nm8Q%kieW9txYHa<($e<2HXK!D_w7%q+V0$>*kW_+nOPJO<08^QvjCtyy>41n^f zm~q^8^eomgwp1H<01;xQby}i!mMWwgy})2JRNJ&eFEA&_>Bm2c%h@qpW!Nkj5n>JJ zfsg?RQ3bTa#$=T=AUK)`J`T4kV*(+#?Kq0EHW8N^EDn_`_yD@3<2f)+Og)_;_dNd5 zE7348NWdE5A^~j}6M}OV(}#^KXMsgj5yDK-wUMP>K!S+aC%7T9R7a91&;i}BLBs*> zo`uBHrR6T$RT;~Q>jx_{m^?rTaMYtyxK2PYK>b1Ziuh8?f?(I6gyUMqQk7ePW+jV| zSy&K>1y4%2P)3(3Ga9ep=0F(>A{)#OELfIfak8=+U?lWjCPbDiisF?wfIGf)I+?a@~4Bg!!@&EWjTiGXcQMJt070niy6$7QoR zxJb39(`NGQcVCMoSB|j|=vYPEZ&;|>f~bPQu!n5G=_zU&z*yWn$m#dL0CC31$AA{I zUix@wJoYrQYTDD}nTP4EMLvc_%-HSNr*?V;7Z`91R4dg6kQR%Z z4+IR8G5cw^4;_{{thxjff(BI&%Lwy;0+^sJt)*2x4b++<3TB^C*RJD`fY8QQA=ROO zfp2l}!rXub12+O-C7J_9T|wp*++m^Mv!RU%;9yaPSm?>G~>Ae)}2X%pREN;y(Kd?BBv0gZ&J+$tX zR{_)nkq7k*8dh4R=Kv(TCaaJgKzm6dT>zFb-?CI2I|zxOIVj6uFl-L+Ew1xl-Ui-<7Z|kvl-@oSeu8kB9F}U}w;Zu?2C}k_{j1i7J`-#=9k8SJyXFg?wun55e zU_>eFv@_<&8y<$!t&`k5d&{klm`LUmmJr$ah-DLkfFbZ#v|J8(kUSJ_W zIr<1iEv#Bf&VTGp>>se%(;#4@OMnD`4-jZ8Tn$DCkSnMRXhc9v!8T65^e8^EdMPob zzYVkC)&skUuX)Ls5oen~C3F}yVe5=O2IFrBxn=8Y$H=(;(=vXx+g4$ z`c^GOVvnMqJoUsSF&KM3i_vzNPhnd9=4WBq?I5?Ts?Gaf-1rs~dF1n!@V1kPNnws{ znpkhz`2S2Nd;Y2G2t`ShfRYF@B!-8 z@7>v4|266v3of`|ur-1;Ood`|V_eps8w*q;#d$%X|mOl}96IKJ{2LV`Vn>=Mfn9$Ie39Z$gwA7Ajm3~z3==Y`Hc&+8NV^mHZf9q@>x z_;rk;gG^4`{@u12{<*JH9G$S>#*!GGfss_gBibkP^MiJMYTPT4*i-0H2ep-*#t5C( z>d3dh)anROQ|*rAJ?6-v4p~<#BoBXSYd`tI{$2aYo3B1{ z$ry#idWP(No<{P4TP_fdmxGD07>pt=4q}}J6ET+D{5+M)tCo`UgMZ;CUwrG?;~nf2?shNy^o6I^|X zg%Pl*;izlOc$q9;p4ZYoya=v(1@ezS07G<;$&&}Zj&x0KBz*GykOC9p3xQ={-xNZa zLs|7txys=Hax0KWeuM?-pc*3L(2uEz5En-AeS;sJu#4fr80!uXP0Wvn^BJ=L`}lPS znS}Lt8~@p2$oqZ(077ITO#9H137U@pUr8k=K7LhOE|`7_ zw;JREPW(2QC7J;cQpl<0$xLl>K+ThnoCkv871Ss1EMEluZ1v^H3+PL9A-J5EXJ|f$ zw}FM2Gg=tVh*JV7zKFi8q>`5gM{pifH{J6uQa7En0PsK?I?Bn@Llf+@9FI;1)7k21 zn(m?Pr2YcH107}LrS4sa$Q{30zm9zV1n$O(9 z-eV%#e_BTNgijq?R@XXqN}hc4KVP|jmc-V7S#Cv;urTln{&LFWt|c2_vm%0pK_Q}x zzWpEr^W}xuNUPT+z2?JzSn;^;zroiCXNtUsF+eO4Zq=14r(DR?7)@8n7ylc4y?QA* zE!(#naTW)EbxG#F?^l*Hd;F(VOvC|f;y&lfErN|R`s>vI_5L{6(#3wiv1EtbAjE08<%tB{}Z_X0&A*j|R_l|V*W7uCEV+h{J< zMpy`pr^YFtZa>J`m5YLX23M_1OkddqDfjXvCt~;iQML0Gn-m|g?nfFNenoh)j(V+K z+s;+_soz7I>`t>4sj6VQhrprY@sEtEqFY-XSw5=ug@@;P0y z`>NU5`B9nd?6)G&>k2YC+qL@$dH4}ifAg+>D`IK+7m|=VMoK|L%Z3)l(1msbwdqL@Cn=2~Vc46;J9hHKF6*H!?v-Rf z`Y(szy1J*YdChJ#0U&JxeK3;#RTHWjt`ASk^U|O+H&-M#Uu)gI*N)5C1txH=tVB-q zzwM$Fg}3gc-5OhnQn*74y`iTfb1orP7yPrV>@2%wGHJ0M-qJxO4rlp>=D%31A=B>Y zLVQ{N&6Hw(VHzfs@!?`xo+D2l##a23Jyy%+l_lg^(_gd&&TsZu0hbUKV$1Tl9#AG{ z*~nZ&_5=g|5GRsP^;(e>x`Rx5tH}4ZWt;W4Ez!qe$Do-AnlZ4eTB(>Dcn0UqN2Nu3lk1xGlHl@=t8qvnGc-rriCZbst~*S*oNV$l>Uz+%iV&l~Z(L z|0}1cX?o!Zl&#Whtf?KT#3)pb7;xL=GJ*&)K@ZIaohguS9JKad31jkw^;*3u!V;ct zrAMxt$cGPFw<0~Vj|oL%HH!Ymg^&+;MvH+4UVE5Op&l59BIMqCM`Ti*~qg)iQG8b6)}=dI6a>2ai}U6>jmqBi1v!{ih1c!foZ+ zw|7P6s?~Qzo1x`vtVqThO$)(9k_tB{REUICq}Sdg@b}lyQLb7FG;Hba->0bVzSer# zjuZkfgrWmQv|30ZS$1+fPz!K~Tn!civVYZ5a{96Bwx9X#Ux?(XYps`xy|~+ErIKA= z9{fs01nS8*Y!DPHsV()St+IaVI_v1RyVq=*-S|My->qNM#h8z6_L%ObQfwY~%)o*M z{x`0Ovr146hm%9$Vjwc%&Si*QMAIv&_k|q>^XDT~t_X+0pzK4*>{p@-eWN5il_{kjN(a310>tl42BYTe3ld{OTYR zM`1S-`8|brgl~|*=)H4+(UB@I>}w zUu`AC-P!!?%~mH4A8|oN8;0In3WWJ-PM;PhlQn(5EGy*CSlY%)GMW1FgT@F5^VJ&d&ny2F5}9p@eWZcTo6qVB;HlKHB}AF0=VM(;dL|eHH<`hZc(Xrg7Q~ zxMzooY;8iQO+>4MQ$?MWZo@Y_$mB_fqZQ6~d-ES|L%$Kuw}2+v;e6dgqX_3aAdO}c zRY$=?o*skL3#_EJ-WHHbqR~xb_*$AbCh5KjE##MHa8%F(2*5TtCppHrK&XN|voT2b zPBLlbnPuvImL`c=X@1uQNZ|G=IK}C#i<1fgM=3Ej8JNhBw}!C=R+0%T{rE7sqWg_q zG*PLg`O7fvN^l{IW(@ur8=9Dkas{8u71YNvysu2+5p<=KOdLo4;&Aifh&4rjt}p+b zQ?#KuUK^4clj?BYH_wy*jblzb$i(#HGp&G{JDQ~gJ#B{rG`%( zVia<(YCX8MlZ=-Ty-M?UsuhW3E6bm^CkAsoJDHc=48sig%Xz}<_OIP zLpz%f>QF~|xmgh*@?Dvr-DjT-=>?H=<>;!cB;!2+QdZ+w|igSosy>SeUkLB@#~z7WW@xB26;6>*v){>jD^C+d@>0e2#&#uPF< zf!}tJ$pLaJl%Vf-^*28|(UKB@g)+WxD0lJd*j!eyPfivSY`BbwE95(Q>y?{VlF7Nm zop@(;TkpCiQ?Tl$-m2GIo)H=m)=|!tLb|Mx4;QheJIO?S?};Pio(KE;n*AlLT3eJ< z*K9tz>Gq8aNKgJ^*DkZyRD~!pA8Q>ujpd$2xePnS1uK_YQ!v~Px{PyTNtTY1Jny2Y`;#;VK zdGwabE2Z%!qQi11h3MzHXBuAR7gJEo|t@f$WiB_bFQEk zEXspCPxKkAU?&;2ucWfb}FszL?ebIpPu6?Zs3*&kYg$nOTgvLoy4+rl1ccBPRzP($xWAOd!g z=mLJ;NhW7go{Pf+{$4tEizt@}O@}5kw>YH^Y=gZ{eJ(&LvGC6zxDSPvK`**$BM9S~Mr7Afd zEC)R>|G0crJcO+Ui^#ge;fc&Me{Z!S5;;PrTpWpf)!MM3MQ$Sdf7-X1r0>0?PXC#E ztsm;G6|(je=M_d~ktuA*$z@vK+0U@R-d^+_XGcB4dj54OhI;gj71rovE#z^t0csWY z_{+hfqn<=g2y**F*6rlEGuADAtJZ)^%kg`zHD~c&$H%0K@jT4UT*?*4TM>61f$AG1 z^+(o&*40XzC;sTqmmWP=PEGdQ^fnc?C`+brXW-I~qx3DM20%E?7j8iz0G!xO_Fje30IE`HN!CuU@rz z`tOh4Z6fPGXx-M28!CNc1J@tML-QY%>aE;QXzNhls)cw~b^T%5pPFgwx^HjZ-Sf^( zw{(AeW7gbl;;AUwO|3zTG+&P)L$cY4=r}*13`FKN33Oz9tnFk49_>Wl9>LT>r-=AF&ppFs=j z4aAWTR|v?J(V;o5;VlVtezxxej*-1!5O8+XB4_{V%0p!9k;`^8_k7ekgaq}AG=Gs{ zy%~>b5t$D(CJXh1!ygpRJcwSbB;sK;0MYmSvb?J~^B{V$H@VnF&Bd*wu!HBoiU%LS zOmvVbE8g5Z^MDmkZ{mv=k_vg3(>=DcJ(BQaI5qz0W7gg+9c9Y~pqi8hrsG28}jbcAIEst>1)>LWaAxu z$$e|q06Q?ZY>ZwxPeC&Bn6;1m*W=dS)n>45(f;aZtRq*BpSlyw^ZK2(Ll)}x2{eL; z7~pHbo>EN~b8IRa=E&rYef{Kv4_h}|SF1tJ@A#+wM?GI`n2yj81eH^7SmH)-Vkwny ziy>DD&&^^rusAYKz*^X9@ZF!VZn3Ubf!YlZKl=EW$4$ijDeIOUL8Pvr9Eq1|^?(QO z3CF`iGT{@*>mLP20$qAx!>wMGDlXewJtX!=(O?R)D^PU6a1=lof>Gr43FE);%A-LT zP*yFaZuxenu6c~Mf#?hf^1y{$1Lc4R65JC*8lQN9ZkvPF)kAe(aLAr=yQs zY3hqAjCEJG4C@{HZcc3N$^9HGugt|<)={suKbLIFpSKQ^9Zy&rJRfR^jyY#TZ48oU z|JvHOUj*1txMpF= zE)Wj%XmdxwX>$e1;@%1M|Lm8c>g>84Ef_L;!Z!{Zae^-omk>EKR4@kggTDs1t}KFW z?L|XupZU$s?M=^D(V0D=#ZAjII$*cQkd8Ye*SxA@Qs$}fx01=H(9+5x^3tOXBY#=* zZ=RxhXmAmEh1%+DAn6$ePBA$+H9b0BNlj;rW~^Va_HOMgBfSbNsDNwiYR-OzUMB2| z+t84+<<3+i1-xeoBky-;X2dQzRr0|np$&DAaqs+D%Sg40Z2hA3$M@2w+54Vawh5Ju z`~5q6KGprbu3q!arZPSEqErQ6+_l{2QVPjuxsh4_jO@=%7deI8^(?OEon&(UC;MQ- z>)Nub`G3#S?uHg=z7t~|a^w1RMVQU9!CcPaDLPB!nr~x6c96+ScKBbBRb*H5PrgkJ zOGAr0umHx{nXE9Bk;Q)W!QhE{ zR490aYTTO$g>y(e-%5)m^Qz=Z$ zCj8ROtlrY@Nb@-`NJkk7`(V<%pEvJnZvRKxPH2&)Z84?;7k0o*qhzgYH&u%A`uJ3FkcYGIaqR0OkeWLn}Ww}#qZD7>L*X1csA{b&rgUG3ePVHwA36s4@ z6?1mfBc=y7A0b34^!>~7EZ(R%9(K}!}dZBBp`KG141>5xEYp|%s{eC)C zA1^ZjC0m*sRL6rka`gLH)D9|=u)z)V^Ctj+`q1}Vrq;y+%e@X~YKUqdh?T3pnfZFH zmL~5yk0v_Ed%nbe$C8y{Dv>VfG(Fp?&|pP`u!Dq-EP z0YA~aIiL9%y_cOFSww`Xr64VGyc*(bqm}TKBhC9#m(a!wf)_1Tt^MF)@J`tv18ktYmx?!xntwqJx_H1q-(p`X_{;v z`1uuM^gA@xjWOtkVo%O+^ZuG=uEEW46D;9=iBWfuVgEgcuD-NwJvFshnh*Yxu19F` zYP4f8Ya|pL@UrUEyf~mV*qLCOtos$(=^&FQ;l`z=!d4U@YqR<*W87CQ_h;Na>z(0h zGyZ&hsuWKTX34Q%VBDQ#*pPm96?x|GaQA=a7gn!n_Yt&UaLXhc!M!^^R@P?b2E|e) zOYVLNEp(E}`SRL>G?37v|4DawaPcs9xiOZMJr~a_p_vKaKyFZSYvj-V7encwk`upp z`&EST?b_bl^&2X>f{Qekk}g2R3Gx0ug; zV0s$N$S`2!c z7h7?NjQdi4B7}q>MPHH;9JA3>k+ySab72J;JahYDYB_4cax_MV%PbE!%KN!ed3?A$ zkLO6*q}}L;r>n1b^U5OJX@7#WwKG@jYJRw@uXPC1ctgf;>Wn8k!RGXs?3peO2q`EZ z^x}1FGltVq23_=)mi1^?^K+Z&aBxzzA`Z32Q=Tcw!z?4JzR+Y%%p)w{W7dB1?oEAL zwsaJc(|zw~nRX!vHub?B5m-cq)Am-H%1mmL`oK^nKkAnXfJlC;rw_2Ol~kfW_~6yl zCfnEaZ0G}P4lmNkK!!kaxFV4Wez5E-X0&)*O=)D^`o2S3JIUnqClP1t3!hxKqgh?w zhg59hA`N(C_}NAR&Pa)kI@#ffSe7dcPaZU(8y#eFqQ~1ZG4CK--_mbrQU}d_OWw7u zYt}uvdG{v!#u3xjo{6ds_`=X|q`9Qn)bnE6gJF)4wY$X}lNpRVTN{yvXs&+UseUeR33 zj5sbav!m7U+>pB(n+ZB3a@P(_d!z7jq^4RZ@FrMGXD$;zKOzgr( zJIN&6r3acn-_;i}^*USwQRHeWAZdZ*8k`XAB)X^XAa=+~vSDca>0KYX3Z}}veb@GS zM?;7VoJ~zftKLLI7=?XuA3oJdZW}1~VXoKRwr0(3WaIw6kts%J{?pa{s;tzvv*7Cwmd>$_Ov?_`$wgcffYW z0QVpUJpg2J2!n&1U_>UGJvC%R$vdE~$$at?5_OW-3m9Pazj z*2$1tm}0{t`B){#XT}`lGl%;Qzk=F)>2TkMwbZVF>oAfXaK2i~g=CoH@iL6C4YKX( zzJu1)N{Q)*-5eSD(ZSm<(Fx@Kem6P(bl-*pYnGoqxPY5MvLzT!VQ`?~95Ej*2gQN( z0SB^bDLH@5yAX%*wSAX@shoOk--miTw{?!l*RHbLn=cLSL_XhrNBdIS5qbw9AXCLm z2|+0fDcA#G@ENCEvYq_t(Y~$L)hYm$GWq*ahwV{!pJDpCfxq13-F#@{T+g3&Kijp& zY%|?X?{Bzro*Y`Fk#-CrIXW(kjY=8MguN07I4T^8@i=@|QXz2Q{%T#J|BCN(n|9Mk zImW3G(i-9{UrxD^M{iIYn^VaD*dcT}$mGO7BjqJEd!Bh0+=XQc0t3SS7WBf9J}xab zqUM8+>B&MQ5qGD_*Jbo#C6%0x=oi2Yea)K{92wBX5N2noGYC^H@rfC?ePU{0Oq;fo z!y-5%w319rM}))8H;aA9RvcKQF@p@nBUY>XCirr0B$FOU%}!0p~6luLZrZGd*iaieFeh}+`J0Ik?>b4H#Hx*87D_u)v2t3pO(7s z2R09Gyn9p0RH2(>%tSBw^!bOeJo9mRG{wzC!gC&RWPCoF18xHy>>!iVFCbLkmfh=j zHg8HoEx-y7F0Zho>>Z!hV+H%v@OWqKux~G21&=YDTi?HpsyQQz^hu1N_lx7TS%#lX zj|?W~+`}bbnjDOwjZQK-VSeT?`Mi1iPC!TKdW9G9e4~BQAN5x~qA=~MIJ4zox?bnV z2U2LGlMMSQOf>)Tv}H$g^R0bgyyPMcb!J$}b48_&^FHB7J7NiGbW$fL?!biH7QuPj zQAW-cA7IJ;kM7vgd?G^6?ZhJ9$h42z`sC>3ET5WISeLyrF$)kD+UX->xA$$`(osgC zSS`Th&gP@H_t6l>_C-97S+W^1?)r=n@#cd`dG=2lM(D({MJtL z@IBXEPk#Pj_ipmNPkjC{a(Se0@0mOLD!m;;Fop+{&dO1@M%H|WIrcXAWWFjmC z5&A6v#CO0GH=4VWXD-4XuU?gy-uVwln)m$kQ)LtRK(^K50NiaEz_^pJ(Zeq93L-%8 zK%P96#VHbi5&D&-349otuxAiO?YJji9@{PxW2_F|2Z&{P!-a;_n)@FL5*tc!lD=VCN>iMh4{kL6q zkX&23^vPDj$=0!fjLl^w!)5G=jZ^M@BHoYEbBr49RMX5vuS)?V%=yMT6kooMIE5$iN z-dRPBPQ}KGwu2KWqSQ(W}!q#X$^(&sA1nz&Wb!Sk^hAs3Bh3e_Qwe7J!oI>_WnKa6W{ z{^geb=Jq#02f^Vow0yYuqa&`oqYew@=&0L0l_x`QLJJ*Ka*llwq0*^+^NBY>{B3*N znoV;X@9+7W?w2=vyRI@POmCyt{0VHCz#@hD8}k$m&n5~S6Pm7syrbD^k);YV9u^?1 zfpn2La(2`sQ+kQoICeGvW1$b2)dZgo=6R<&9I%JRtKMj-)yx4_;UxJY&D+^okDUMd zIPClijEbMX8;99G7!~OQ0Am|?hlZRoo17^PG+Z$k;ych*aS`btlk*R0SDn$W=x;uF z3i}yz2e^HE`V&Yutd7TP6PjC_FILjzp}YDHZeB?xy#@GCZaK1lck_yO(UU#27()X_ zA5w|Tl%E1dl$ct{3>3)UzXQ74N-CMk!QS06jr!k7kHYXGo(r_uAzNqTWo{#Z?i)#_r-llyDV=n^z3=el zE2!kjPs4M5!D3i_JLM^1kv@em?)q~{jq|C<8>>z6Lp~Uu?mK~jtfW%A69vm1=_0>9 z(f2aB^4>;UaQn%{9vsy<+ghU63H}e=it^(GCA?4uRu(~zS{i4y?qF< z9$35`Z5W(aPqH%(X!P08aBX}3n9KubR!%+Pi~Q3_~6W|eS**2DBqUn&?U!b+*giNX`*K9 zG+d#gH3POvHU`o?AA;!_Y8x1=J3kCx8SuDWeByD78~kmLMOV~%Ouh(-%z$*+O)!|q zNlg+KIUiR3LkCv+_ud5NYN@qu=DMi|C!Sxhj_(+Cs9JOVr7vbKAH3k?1Z%V<+S*FE zKzf0&1WwwnkVh}=`2-k*VX^eWi%>QG{B3G=|GH0rHH9OxoL!9`XwqPXS_z8wmRPoH zXovzjO>}ORx97=i@L~7hz_Gc#|HQ5GQ|UP*XIP`LWUOh9B8?ug6iO6a_Cy}(`QfLR zm(~xrNw-}xA)C1`j`er_=W;}TyyYZmw3$q4S{K3_9$z{H(!ptEo2^PiG! zo$HXCBaOb6f%K>BBylo96^kLG$=Cp(g!dl- zYjv_%;w%A3eFVgF>9p?_E|A`E^YRyv$y&bUxXGGdx3G0itD2wjjXgNk9Qp0UM`Z8h zUrxI!bf^HAd(*%>+4OZyEkfhUCA-#k&g$c($=hLH4U5t9tXT%mhVJdlP(Kho1ex5& z5{nXI!-Exr0Uhg2w@f)m`h5r17Crg1s?m0?&gYER`e(;Xvm}-58w^@MPg|&15B0Q9!&~+cV6ISiy zCh72vpS-AlP9Hq%ORWloaIu2TO1O(I3)`gSOKp-qa~FJA4Yk3m=}#B+C%+>9%;6O) zIMxM>qj24oG}tpz`EJ;&Lt^Q+pMBJE!#QK){Xg9;zYe)Wa?&>17z7s&hw*gNYK^2T zHQEUIllQ_@4~tR$t)}hhOu?j;lJxh%Plm#J@T!9|&UaM`!rdo?6k zylWrqoMqF=YlBv7lk|rNm)8$1TOXEYT@|0Xi8|wmLNx^|j zh9~adD81pK<>i&Nnt^9UdMdo?knVWslpi(=UkCr>$;*ChM?Cg*7}Uv4@{XYTUwndp zi%R;$Hw@AnVsM!41l+m0q_B50d2sqJ`9&wvx}s<{X;J4oNu4<*026HeA5l>-DCTj z`3_k3p*DG6AES=h`QOX26*gaBx+0Vv!r*d#GR}sfwl^sb2DTqC!0=a{WSO-)OE3I5 za_HYo0rFqw)-7xw-#TYdL=Qm?fMS>Q!2Deylhv3uNM;OpL@)jAF?eK$#E>L# zF(zGm+wx*R|2PW0$jS03^kQ}sYzL24s^zZ5=WgNB1Dn;Gq^Exf7Utw8=_x1pga%GL z`;R~ir0vK>5y+-{%8a#4@_D9AB^$WGshAw^58!bdZUe4|Z}00rcVrnTtp4fT^A*mv+X$K!u}e|abPte`wW@mZOztUHHS zD}*l#$6qf=py{gp47T7WVY{ zz`td0a?;12UXHGS3(f@L-ELv&f?_qdrHbR&LKHB~-G=M>1;t$Ik zpyt?`V+z(>j158l=-^6P#vIPcJ78J5?+?q1064Hl7wPaBxfKM7aLzNQoPn#K0RuO* zgO2Sk=Gjy1uKu;Jy9)BecReRtcNQFYxW5C8V`4041!rD{^Z-%9V1w?bZ~zB=RhG@# zy`{rH&Zz%A^25+Sb4MFY;O6xhfZHpt>a^KE|b;WUA4#*_zB$`D%xapY`)Jxy;cQ_@UEJbiGa!g8sRD7sm`-gl& z_Z~V?(_^!@8yVakZM5C(xWnnoLP8Cks)ogqAp&moK}!C}pFqbp∓_2YmxY$|kNv z;vENBH+W1{No7-Sl-~LB@}|Y%mMi%W?CXE;<>iazML#4L^q@u0TN=0z%XSLz9LBXp zIC;aVSuI`m3Va0*w@Lmju0fP(d;jPwaIV}?lk@E2Gw+_d3sRvrk6Ki<{_ZEQg);6{ zxpDywQCp1Xg1FCNi?l5Xvgp@KPfV#HA~Ga~FSMJWMssFM-#x9CT|leTphEG#xJ(5= z6ZX3S4=}@fXz2qg_5Q`=$x=Bfcz^$Sl^VW?J*!i&Sm?*Ga5+Y1`J$V%R7A6wm)%}GOPR~N8#cZ| zwL^A6(v5?LAt`*(-Fb#|ZD?Y1|Fh$;3_Eca@V<>`pzvLx4Afr1^Jeg$`b3W=S!N8R^qd+7IwY1} z`0_)F)9~^Ywe0d;U4Q%$Z|AeY6yvQ@)h1W+afGye85aFysf0;d@CYQfZ0;XgR$EnD z7LSjh-h!HGAm8rl3^~#3la_wJyixi-9NHF#Td?2#64KqK0lEs`f(9{rd=Pla$cUwq z-jT&Ec0j3>-oF(Fak5l;^fypzGe{Yp+$L|E=<3|@qo>tX2i|vg-a+XgzcpCmrKb+U z!7+TAdTDW}4Qjw6`=#=4wr}mbgT0)FNk(D7stXjoKIQ}m_uJRU|H!sORzFSV(GS9z6q{Br7Zpx zbO4>(s6Gu4&GQ_iS3LRr({t1J{L&F&E#XK2`S1m-eV{ zUg~DbRs)eFYZ`449_f-+O6>)UIxJRBUQd1t0I*&A)v=X`1LA@Z$b<0!j~1MZn3fk9 zq9A!jy-&S%BLIP!|J~=*w4^yhJ)_2oQNId-i>wB}iZsvni z4^RAc`~YC3bm#J;A^8j@b6Z7LH^T#hzVwFnDQw>$af@bb(F%qE0p*?p3+o03E!l9t$9|Te8J0 z;Fy#{3@3e84|;~gzzsb$z~k5g88d2#L}lxVQVFlb>?k7$wk-+0{kiUvIZ z)OCrDzf#6pu9gl8(ct+Q7E6@_DtPDrW?ashQ3EW)@B^fkOc$;3T%m8;J1$bYVC}T4 za*YQH@Kn4VFG)IC8`m@w;YyH`K8V5Zhs6^2l4@`NkC^({r}YY33ckbxir{@mOb!J<0+?-?PnK^9wuIb;+ZJFIXr<#3c z_VL+~+52WcIlDUb_Nn|7JN3G$y;Hrp$v*?V#6vTWO@4k-n(R#qqraZ?P3k9iPfky~ zF!7U#2UP8e&rDo5(Va+4I4AIlZPV|b7+s8yKReSLe{4iMe(z|0{Nt+U$KSX3o-yOt z24LK}M0Nk-(!xvA=7pzb4vjsnx@O^9GnX!WY2iaN*6Hf_%EH?g#D(C(1q*u?X6IkD z&fGiy(^=d2y7{lo-#Y(+`L`_IyjY!2E&hJ-(XmHIQlmF6o;muDd1juP-??a% zqzRwD3(3oZvxG$iN5;?V(p-r;qmSee@`pmYqI|8cMZ}9`|$!w$<|T z)ndYM@$%?7aN(raoWW`ife*CXoRXx@?)%nDKZlZFYt_RWY2Q--YCS9e4!-2A3sT@li}yzk3C#DO>FE z2A-zNcG_PCwzBo(r^^jJ*jPTIiWOSTVzsE{(zP9zB1K78ks?HgzSE*w`D`>vYLCfT z0xK|{qTOWjhuHL97rH}W7`+R1Z`L&_ zF=y?0bfPg;bSB9MQU7WxfD_p^;g8hJ&1#V+A3*&Zc-WCLGdXw`Gu1jxZbjl+Orv%A z2|ODK3SA~o990HWFyM8d49F8&uINb~m{-JkkG5Q)%O)XXU`0Lg&z0U_layoj91+um zd7IB!ui?bpm1r>KP%($OwVhxbbA@OxvEQl4^)RraQ%89#elg}I&wV$Nmr5R-h?-62 zDp3nrHQMtiMeZ><39`~~m||7ZUgkGEpvcX=rhw^Ecu|Chn+ha$eFqJ+SP~rhNGzI4 znXO(bv$2Z$7jxAtQDv%0v1>4;bG&M&(mi9Pea&pJP)e9v8UEm`(mkN5;dW!H3y4ro zb2F`~C~^m`C$p_^o^AB-IKk#N_>~4K#ez}N+X|_)5N%)^dWu|A!Z6-ajJsn2y2N0k zXCQf@R3S+}Ei!3LUut>vOP8VX6u3|>YP1ziLJ^X@>G89b?q1T4IkMgsU%|>yUA+0D z%KR5>ni5&C*5j=}xS{i;re9QkU`(4Zs~<198cj>bLEu*-dAqsSKdE$26n%J@ZAA=eELUuj`wfcR@943FPZzf|0^Tgc)6?f6 zJz}e3#?!`fvxX%@8uwX$NBzYNmc;aWSFB^exh9b~{dG$BIDiTWZClwQY7HIj$eD_m zY*#UR$b<1Qx?K#O`&0EOrZVYsNne+U$D&wFOi;aWgi~l-h(%bP_ldR23O~z1}x}KCTBl}ejwz1MUu`C5uOg{s2Fze z?qhNi-cYPPmkH+$_9(aI@`0Sz*aZs~@E9x-N|w$Y#1+fdglTpgZl;irnU`k^=5+a^|c{BZ|hiBYCGO#Brkz zzI>~lg5bc;Ro-bGu_j>7K+uFUA)hNxoPR4?n2JE!T#@4EuUpyM)J0)RE!zy z)>_*iz*#N(BofyGoGx6h;9)2jcQQQtR&>>3E@#IRF<+tP?Ye{MZ1Cr(dmQLY49P4X zjj;*VmkfLziPN@PnrpE}LpB_@CsTp;KuZruQd(xhU5MKK86AHoGj$6(ryFVEshokRV0pl_X$vfwa42uTx}bsA2OD%}Oc_7T zYkT%LAw4-!$7FT-0AB7iO|gW1I})e0Rw~|37HrW3Afe?f-$jR^OcswcE9rE!T4BYY zMKQDKSUr!^tOv7Y^qydqGk+f`;i^o733*(dKqen`=gf!D80!ra)*}UfH^I8f^_m+q zTTw&O?I*Edsp2OJ#ZH+`n5sxmDkmm{mZl{7qmdw!Hokzm3m!)aC(|99F;NX0qTJ3K zkvvoB5}3oE_vmVvH;~P4cnPV=WZ4i|?j#+KcCF_#r$@i7+>|?+Z+ha@d%bCrU+l(pj!bPKp54_jlHL#*b~nlPke=nnou zksF|_rK(A1YDRa(nW8tojO4vE#^ngGn@NuY@&$6~3*LzuQXP8}E7$a0PoPmQGe%G?BbyQdLlofPAxi-`@A(jBOXNXlr+2Aev2RfA6|$Gc=B z$l|;$+9M1RYcd_zZ8(hdbj(eQGs?B9!Bzo?2}buIJsqRVhXrhnc!tL+2}-|Z5y{*3 zYJy-3^+d9ZrHFtq_A8{Ot*04{C8M=?Vz|Y z8f8y_Hn^N|?Ov}Uj|d|8bF!Ye-;QgG$({Ep@<2hvv6K@c7M*xCBJ9d3a;@2j!GWq} ztT_CnKRxq2lGoaS1QGGs0$dM|*6n3+YEo%v`aM`1CyZIEwN-HN(=58LS{~1{flAC; z>sYv|_Kcg9?is(8j2p9tO0E&?`ZLSFSL9Zp+-2z!E&5oiNt-?E3Pp{n8gf>QR1sb+ zR64zbQr`bHy}3iyGF_JtFq=a@e!a4Ls+w$ zgaXM8%I2)dAt*q4cC${eH<{JWJ+}`1pyjm+xFw#fx2s+T=m^8gtE}Av7XW5!n3yJYDE#c&iUYBJgo&e8>uNSSIxgTR7FUZ$H_JeId*NK3Uv zn(0VD>2Io8fmxKu^KO$N!&BH6G!vb0m9_h^iqE1c2P}kE^AV+gzNEu!RcC;U)Qc>y zi@XQ*Z-&}_cgd~I3B{D?!!-L4egVYm&V@A3_d#6cw-B#0oQT)CS5H6Tpuy>q9e7iM z@Gf!2V_sfLnACe0t0#-4!`E*ZRON2z|G*@>O1!Hl01WhQTeU#i4FMo}OLr`^R=UOj z&YB^yRJqwXNL(D0moN9nj1XJ^pVKZF3JUTx{6$X$&zhLB$qVOs8)PwCz|p*71OM<) zoAkmBn<0nbc43@qPW>mnU=bp4bnU zK>@Q;A!37QTbe58195wznU?%#z*_z-3^zX1COvgNWRC-8;kJGxA};~6Di`acs29Ak zMG6yatyDB`(U{BwJ!Lm10RhL7Ek~e;i%d=H z$yMFy5HH;s1-II;SUU1B&Ghv#2%_xZRu96@QNCNz=ft&G7!R0RwUV0#2Wuye; z2h_z(z9L?185k(GNn-@$U&|Ai55fcvwL!J8??kQhMrr4T2hW#Y|0VSoQOx7Vta>NJ zPh|9h3$|Ra$6?Zdub@lv(E?D984XD)FC{Jo=lyHMr-ReFChdGDY^1MTsy;(?0e*hL z+2YUA@NC@eI4??C69zWk?PN8{Qn_^@xG`mT1C%C|N_q3Rw`Ot{<9bbu&qyEg!;>>4 zm0?lNkX|{g{udhQ_MrN-8!lJZ)|*N+Rsde9uB`%WfN`_Ly&3LZx*YC(sHv~oa|LAd zBDh{*>W_dw2+- z_-TF9gV)+wCZl6**>YlVnO*t;#pDThziFtS^uVp(JdTr?Rs*RRL{XqlEax>R3yc}y z2qB9OsD*G@9RMY!)eFmOc9EX!rms0=&_I1;bKDHD?`(`@a3|DT1)!K%Yy-boM~VyT zy(_0^?JvEkKcqT{Q3H6ks}CH5X9M8Lt~UZjTxQ@?GFvo&y;xu(F~}?VC6b6`d;;Jnf`>%D3=~wI zES4U4pa@Jgw=Y8mUq=m@#o<*MiUZM;HMEf1O}52A*PdnFSdEZ&)xaJMizV!iT^IGQ zuc^bTQ#=Oqjn_T~5Cw9& zC)n1KgFm`e42FsVtns$SPGIRO8#2VgFn_p|sK8K%#Spbg?7!g|0M00P-f_P4hQOxn z*Oxzjr}RHn_37I*5cWkmenr3CA0(1krfs&EC`}WSR##zX-_!*YKGY^X<%T!T(R-8I z`v2&vL#nkOvb~FIJyQrR@ds~)hzgkQv*Bit=?+E`t`P3lJFqJHB+?$Q=+Gmh+A;o%-X%$52|HRl5AG5E~v|u)#WR+D!vZ4E3ropJ}*X z|L~?5SSsOd>PyyIp0};NJjak=?|-{G4%CZ01Q?Bir^|F>tWbzWplr13%tC>Ode6o+ zTBS#v-(aLKzvGmaZ2oGnWD%VQ2fAu+xSck6vw0)%XTJl??PFKNd1<(<|3Y{V00eyU zU0}I9K$iosjeuGjfcPf^$PG~8(*;zH!Ozcpw|WsE3)boa&xt_&UzB4nd`tbo-I`+s zqzrr#13LyFqC#{y2R6L`^{54~kVg)y)q4qoJSn4ht-f$vOaT0?xUwK=-h0Zp_`BW< zQDWEC05_xLCJyaR*tzGw50+_2JlM1fsm0D!bp$MWNGs0=RNBf!k?;;;T5u0-dEbMr zT(cGGu#=~RPRyu3aKp9gi4E_P85xsvu9@ppGAh~2kXlNUh>}#dd~R(?26$w>4k4@yrBQ?52$^zApwjP<)lH{W8MZ4j5V4*88qEcpZLzyPnOq&uc^yIBQ`GftXHX2o{TO)@0`|yh^u9AGcVML@8h* z#fBko5eq_2uahqXJVz&qrH{Qe4mfX6d?Wqquo|)HoPND}*N(`l{&@a6jobHvmao?$|IPef4_v->;W(4}bRl!C1A&#~ODV%vQ3FQ_X;r z$HjTeL`k4`K{MX~( z8NXxvBV)ptZ~W@<;&^!c_2UP|7Z<+0aQj&AtqUJsxN78DRb?SR_QeHu;dKjp7v|^x zGXL|jC+ELD|M~eF=C7DfkN#=i15w`7<|iP+`=h!0M;vpXn!9G?({ru4%jWEJnlXBA z^XLwUWB+0H`(x9K@1DJ9_LkZAj(u~sK6}ZmdG_qtO*8+T`OWBcGvA%LW9B0>@0cmf zgk~Ca7nVEQf7>1pq@ZhGg~2S=Zno}BvQ z)K8`oQ?4muYWvjK8$8aIfzUCZ0N z-e9)uN~|C!E}JsTex?$a4il9Cu!;~XpB?-l=%pGImdloTn~jJD^|_Tt2X28-%a#cR zFlQl%6S+V(wZbF)-3%ASvyl9gs9StpHopVKWkLE4qMw2l5aG!!^Q*F-5XsGLkz`)-2W^`*Qi#CF#6TO^; zaaxO}aBiETCmGhbv8-F)iCY0EN7QZoF1k4~3z$cu*Q>SAqzfpzw_b=8MS{R!lBx&j zhPNzgE8-U9{RQ8RHCXNXvU#YCDAU50?+m=H!FHFUg=W5`HF+S}cT4Z%NK2qWTCk3} zns>N8;IPwfxei?wqILz$>Cc9PzC^geWH$dlbXT}0&`QR5DpQMCjo#$u4$eZnItKp7mrMnU0R><_Zy!+k9a1tLs+ejUq+tZ`;%hCEfNI*2EyZ+Aa8_ zL}JGu2KrbCt|ZA&vaFS%L~CJT#}nu}{%R|STRYuwu$$Fo;+*+&(7;mtK;re0$C88m)fKuZu7pbfXssbs^XU%m!iAmhn*uzZ1S zS`E33uYoUD&<%uI^*HV`c0zi8x>8PSm)D{B7Q>dt4kZ2S<#(!Q==$U$U3YIfp9n6MI7P>iK?)0Khh6hI1zgR z()RGK;7%o{?nT423g!e^%||<0Pe7B2@l(j($XdbGMAZEOOi$;WRScW^5mICI8RK0p z-lGz}YSu<;CmTo)-La)GtFux{F9+1}BSYhMMO822-!6>cB z#T-qfDt1dS(g8YeVqRG;T|4Z@T3T8Yt)_e;qwP)IiGH9H3LR1uqY=I(q=1}g6fFx& zHN+?;wp;{m^6TtIYO;X(Q_fHsZzt>?KV^WTOkq;FFlA%ngfCG_`!m{v!=0Q$;RsgS z%4LaUE*GS^w#VAhZAAX_9;?mfA)uUX6a+?WnsTZIbiY~?pUzl4mW}~3ODJ-~vx8@t zC9!PY9`V>6E<@bpoG1+j6YMmYESa*ETwZ;yXrpseUmGY1wv!lHWfFGLZgbk3!aVYM z2O+1gh4U#xCQ|O%!qKoeZ$teX5qGejZ$->v)oJi($4~-9u;#YL2usM@?DD#l=*i5T zi@HNhyF=PMsd_lUiuu+?6cr8Tv*6#g*#i1ltkZC(_}MZVWu9}V2tlKbiMqJEEo#T$ z$;BbVD3~i6ATvduatKDZ*VReSd=UL0Yp>%(4GuoRLfV0M^-IsLTc_GC=LT+8Nk@;Q z$9rLmrt68ja&}XJwiko>(ad0EVRIrL3wkX|de zOr1~{2%B(==t|IKu3kvwr%<9!s2g+|$%re%u{nLDnZ)LLC>|GTw^~}9FNV#{4sVS` zh)Hg6fl!+cz}qV87c@azB%jHR-Gk(SHUaNYkDDPN7#%gGr=LUeD$^-rZC*$FN+MVA zW|sbpgN@56OGQoV!8B1HPKQQuiAy_&jpzhYF02A@EefmaL^6 z9u}W^7X2V6>YZ51#)ZJp^G!XuXhU+rk*pAy7Ym#6RNF?9<7mM`sbC<9RcTwE>bmum zF)?{D>Yo(i6i#Y-Eo(TPYU}LD(fgGKO8~?4tkvkNcN3I9KkXi@ScoUQc7pIEEolwz zEwdA6q3(%JT}N7saZMs#4+PxUG&Du4I^?vLI&m#+&*EddQFk@~IyxMwJkB$8jsR@{M7Jty`2y6JRP)Sar2Q$=jg;OQm+v=LS zPH&>9CC0O;zsuL4n1DlwGmtpO3yX>xhc8jUDUOesM33K^o1H=2Q1JekbY zX=41NNN#L-8<@fBt)#22BvDUnxCCjZThUx9h85^uQpW@f)HDi?0e&ewMn;-z>2-~Y zBb}SO9_b;o?K~NaM@_bRi`5jgORp$$rot0`hsNE^R7psJnz#+gaRWgUjIUbpXPtUu z0b2+Tm5N2O}^m7jE-=ZEY%y3NHTxTV4!R*Y07#$c)3>3 zrm|_>DALbXD)6|lzOtj7Hx%vW)CLr~V$0DKL3Cpouhs5nQxrCXLSt;Hs>#EHQcrd0 zsNEjq<{5O^Vy_(P5HTDBphc^RbcwTQ`v4tDkt5oYAV0I5-HpMJK zO)0{K#L?d&Mfs!-oT! ze}K*Kb3LR#B=Z6!+u z!B@^tqHPk4)UqioQYqx!UEW|X@+uTG4hFN;BF2R*tyak7$m{dt9~fLW7-YjDX#x;c zTOiE(bNm<@f6x=MnQ#)bqy{tLu&8;cPNl4cmk9G_me|gLw$rgF1M5 zW|9qOK2o!BqwgGa4|((PG}-C2Ngo#!G+2708FkO;Y6-p`X*h9RE3d(q4kGQDl+g*X znnuCeb`i!JG4UH@J%c=>;c;D@N;H!;TJOWhl^<|!e;)XJ^IbBUu6j!J`g;a3)DuM_ z?|>qa=O;djibUi>5AZ!Gg&spr736T)x2CV9uenNnjY_)vdP( zYdBl_Dn1X6ME+*ASDOBWdTz5P0-3+_yH96AA;*#U5Hqkoc=y4Quq4 z4k!P(1r@H|_K8#a3THkEzQSR*hvFX56B@nd)kssr{rakNeNe$Ws3W=M)8IVx0vT=G z41oZdGKn=ntv+Cl7QzDZRvq|H^?LQ%U4YN+)V#MD^$k!#qd#6j!}@_a-3W0N18@@a zSlnjKdLuw81AY>m1ormo+=a=P8u4n25xS00dRY<-jpEy$KBxU z91;WF$v!}l-Z!4^kM-Yiha7E*t)74@O|>Jb z1Zir8u~4Ixx7YI0AMS*^84^oZzH%#s?hhBY_Alu}-3fRC-*Cda)(SRSxPcdVLpubA zGo6&XSB`=Vi6y_`g$w&XyI1!7QL8dkD~ffn(EeCZ*vgz1(5 zs+BNrK7ms?h@w3DW$^Zqs~3X8*AK7~;;E28;escU))~nfBu8ZHcAl?4ZDdPmQUzeZzp>3d(?)&;0yQ8nV)CzV_^UVi2z-CcL zR=jLX3)JXXJjWAE!~?u@BIzkOrH$WG@7uIi~8^Lvy4dtM$baZ%epMx|FC*-dCe};Q}0Q+q;tQ0N*njiZx1Tx;Mr6v=Z1F2v7N(w z=M+2Vn7#XN+1{}+SfISf*y18Ud$&BeMH@E*;jO&+_CpdK^=fdIwR_7vxc>&nL5Y@J zyKWp?uuqQ76-GJLwKF$PJt;#cwjm#eS+yTesu6YGDjc6{C8w3wG@EEF(#9XDmljTL zl5X4H-+#l~rndB}KSEV*GA=Eua!b`akW6Q9XXtV`k+o%U`HsNaoGg|e-MSI-X%0?p z?i+q0+dS{8jMs}2X5x8m-GoJ2F?(8LflB^_^wB3k#gG^<9=d=Iw)kDCG;EWPrB4bKdW%x@n9Bg3pZKw)K|(1eBDWh~;uTy3I4>8PZv z5URyb7DMFgJ%IlOND2KXe+K1j16>opP@lbIFY5GNAW92*(yekWC5Y0MPr`sAzksba z)CPGQX-xX#jaMx8`@ev9!D&~Kt1_N4vYb`B!4V=d=}OXRiWJM{y!4-s!o&=VQT_h? z{Cc&tBQXvsG&?2{3HgB^sCVA*q`JH`Je7nzqSwx_66zIy1!hS;m@zESRl<3PVHwC* zh>@{^qbt48Tv^$pAz#Hyw0772k+-`5`s0(oRxg1vC)C7R1*kR!_zwYszj66*QdXwk zOF?47iQ~fBeWl9x_Y5c_0WA2#zlA)Cc+LUnyg)sfGm2g|UVy*hYa@n9yO$r@DE;ua z>ZRp1yGT#ndF!!+jQ2eaio9UV7#r|l;tl|vf~YVcr^IrAnle!Iji({xw{{olNO)Vg zfApgH*Qw4Jq@8TI+I}qb>#@bU9vqId1uFm~J0O=O4v8`zK5hD z@UqHd18b%y$yWso*X}Lzvi@6Z)|*+ZtoyL)D%E6cF}7$}JSbO0F8pfYVW@+IU>K@^ zoOo(s&&az}zmn@9=YOhtY5u4c=yQ1R3B1Zb=a^nHlQr(fT+1&ZG)}#%7V({fi`ysqTL=8qwA}NO2Me4LaA~_YxxrnNrr=qT4 zKqDqt9g;h=P#p%Y;3fduI^#7l`1iqwDNT}wRv=5;OXX@-nSKZbO296TEl`M zTAeY@iyQ;ApG#XXN>hO`#dJvv`TG0Nb$y0h4zmQp8qv`Sav91zs>n$#fz^1YJqCUs zyFI&iJ(7D%`80uh+v!HU7SeaK7@FrE?akL5SRp`(u2d)7&QfQhFemNJwPP68)H1vf zv^X@G{XaxE=1n+a?Xq9PRlJrqo;dfI{tyr`mE-L;W{*?8a?162<+|PiocA1zzFSZ8 z&0wDBDssD-#uH>OowFNKS{KD#_^{Fd)L2AXZw=91S1FX$um7@gT|=y)i3GKL&Y5*| z^V>hDh^a_9o9MP2O_8Mv+B0_`v8UP9;y$av+ewRFBfnjleh{5{cDMyIC;;6ES zj058cAJHa^g0G`Z@UtlLLNi*TfC~lQ-RYQ1`l5a>N>r!a$OWGnx49w^0?b6yM*Kip zk*Dz{;i(nVnW%@PLj3f&BG-fpByEoSv{a9E*TmGiThMK}>c$F27bmI9RGmb|o!9L~J|fyxD8Z+Eyi}|+;k-MOIkS!~ z>q=K_M2%&w?rtL)iSzTN1k@D9UBoQqeh*P40?u;?H8*c3B8@ z1mbt zcFOe~^aDC!3le-JZL4H`5S0^LeI&Qi0J|O*{GLwP7|i5(7Yawx4x>XydguZ;cl=R5 zu6Lop3ax>fX`F#7P`4kqrDL?~Dx}AlH(Ie?z)%q@E)AWxW}S*DxA;0`f^eI`iwO?l zCgr#c{XpMloP;HBao9-FoT9aMWkC9xn8t&-PTB1Xu>~e$zZCViSFJ2~uahQ6#E^gh zhiwy*>$+7O(-+(c!pHZ_(PY~C%p#gP+UtqcBe?)>!MHYwhkfV=mXbaUah`^zqNB6~ zuC-1n@(>ZngG{v?58HLcI)uTM3wT^f4A#n0a6|#KAY)lUa&x7O6TBDa5}3eP%7Xa_ zDy^aQCeDtRqDebrNoKnOq;{b3Kz(#Il(B_9`mW85bEe-RJ;s19jbo)2uy0iAEJ2z+ zgRBOmcX|v|*VPP|n;AhbAtiP<7j>8{c24i^G(`Ly6gZ>pMrQ*r_Dm7M$|tlwm-ZrM z-R-&zWU3g9oF&+f<*4lW$EK6A(1fGVrO6E8^*Y4Ueuzc`K}nYIG(2e^mg8KB{ria!l6qXug|NMa&WY_-bvgfBy>CeaO8 zjq!pV$V9m~;r3*>JzqoJErqfk=Yn*j4jDI1n%eXt>TcmXd^@Tywz3(B3+E4_00(V} zmP?o~n=}xahMmmu+XfL~*#8!LSSuK-&T!dn_c-&X{ajJ6iNe!PWbj5sWDF@0yAY{2 zchZ5NzGjRk8sQ|ZGyF*rw}luHD{)PYt>a5JiPtOQa)NAncpZEsc*_D!+>4Z(Ek+Fy zVnf9qo3vQXM*Tii1x=fA_zWPxps`jlM=7I^mCDUnMyoX=xhW&s zi6G{6)y$Sk*h+0VSCNxu4JHy6%tSZB&N9C3K_oYJijWvjSzXqmGh1zBdU#D~h&f2S zr0@8`ULI?=h?$}y*ZO$Uiq%*n&c``QJO584H&kc=xR9NpN;d=bws}ffL_?yI!-E7@ zz?-Zd3g9mMg3{mPi4!J_2>HNzl=a$`w+`ez+Tg4LTTqS2g!G^&if=?P03a{xXuB`n zj1)V1F0t`lXhIEEO-qcpGv-K2jD)gthZXgfu$M5hX)A?$8qO%DQEUddo6~sRt1SzT zoQ-ahd#_XaD25{Xc75y4Zl`Fv|D~>vN?57kXMt93aGH$McT@Aa6 zQDKX6{G($zH`d@1gux-Wih3GfMfz!$sS`Ba>N;B{m!nO+ewQNmr5bpYvQssCv>j@t zdpL^2(6pvxBdvvUi8uJzB$3^6KKg+^mQUcJGMzCpL@n8%Hlc7bt#<}pn5NQ9*L_gS z)}m*Xr&re%iljDBa-{e?UkDLOdI7B~iM-d5gUGG9T@9z_{uin5>7cL_*I6)^w^a@o z%;NZmQGNL2t&SW#sZ$()xv<|Yiv8XFc=G_67 z&nI>&=R&HPEMVSL(}g$X@=cunSF^Ze^wftP@37b>w}>V z>nJkX^Oe^iMU~-TYbo#;kC`W2`@oP)Jw5@UFSqr&GK*#+e!Prz~$z$#$Y)|^qF zpWAgS^oP=ZTE1JXWv7g}oY^Jv3F>yF2p8EHZZqJPP7-08b7DVlWhR1$vMMjD#0^2r;VeXjzNJt-m}&#c0R_s zi^MjU(%)_^z=uLCFhIelWdwSpyU^?*lDvOJYK8-+S)O|x4k%>mL9@K()w zK7XbI>Cx1J6}+42(Ct!*3Hk`)Y(-v9WXOi4Q@4A(}sI!k5zlX#lrq}(MsY0Ec_W%r1>%6;+T4Ra?|*fX|w`VFZZe> z)ngBTMACe0^jXO1Qkfz%!VO=L&ICT?Cq=w>}B3-O-o8JNKHV!@>e!3d)4m z+)Lmk+$MAKpeT=tjRT5ITxWA63W0z=A`aZ+(&~%g@EB^74$rkAIC86QO#0>7lbia_ zyr`DxPggz1eWxsC(zVHAJ0jCyMrwXp7X&^}mI8+9EefjT*gs{LrEgWH=0OpoSkQ0Q z<6#%UIihI~3*~*Xw_dvJFEE^;HdNmC$j^YC{i}b0k$@ieaXnQ)kg1UYB3kL>+Z8QI z4)pBC^%|}2RYhN>;eLpsdB9MQ{X-s{cGV9`=`A$W$pwM*Cr>n6z{e5h3V9(bC0~I$ zxz~tM;`$4p*|4pD_bciHDo9*!bj!x7#^4MFqp`DSt;@vK8HN@$zM%fXtEg2UTmwak ztTh+y$8^@1Xvqk6eJv^7_X5n}kXTY(!9j)JpH-WsbN{6N!@xy);fn)zt4p4Pfx9&t zZU+;1xo(c9-FVClY^3sB?$XeD9rY?NqiLug;5L5@aoI_S|Em7yK=#n~2}>mt(RXTICYJ>^ zU>M1;SlX>S2f#Wz%gcT1^vYl#hvYRJ6kXIIrN&P9G+JvKn7;y1U?P(po$s4lSy~)w zla3g^dxGp--G6p&1;VkORTgdw&1_K5;Wf;p3&$#zLNS#^x;9OMuAwIB(J2+&oXmYy zn_RJ~ww<6Ys%Uc+4Hm3=@FcKe2sPmDlSg#v!phS6;WhxoT)41*&%%o7SgmkT-aVJh zyld)Cz>HoGHRwe-^c)8NymwXR8bSk2bZZ{K7RuL}WU$M%fYcjXhM5}{%dFlCk@Clv z;Tqdrs~p@c3c(~}-cpiGt(+cuaoup=_H z5So96>6H8!>n<7fwgx4KjSnrY>{}cX4`Po{V7=|m4KNJYj+cP~v>i#zrArZJTBsB) z@I?jieeToXR))oZjPI3szIJTxA3Y7WBT!kc%A`U_NeIu@Q$(e$5%Ypj2tydJyB$U` zB$l|;87G*4mizy^9o@|vkKc{m3m_bXsS1oDscflb%}8S_pl3)dJ-~I&=wH6Fl2I*1 z3)WPb2t`5>!QikZAsqJO&G3sMu^b8;z%_2|ySA*z9NnuI!$r|z+Urpu9n+=FVWQk| zxJg{PY@>Y9lf^(au?T}d_bpS>QDXC^{tq_7EGPx$^t!1lCO$Xz^U)aB64Dua;5tKMc>5exipy`@1DAlI%KS8Fs3FeP ztOCMr*eXzMu8U(*Xg8=B62pt<`-8gjt^IHAmbaaIHFezZ*}5&OU^78d4JL$51})ll zzt|7k?&K!vg)e>h1pL9K{zV7miDOn}0w8ol0bQ`@!7;2;Zg;Ulw+0~E@)n-ox3Ye5 zs7>-~4=A)&;y$$MJm^7tI3I7+35=`g%gII#%K=B&K+hM?faiXw4KdUoV*uLJUw=^E z&)n(>1|Ywqn*(jhtXF{3n%S0-N@v1;9u`ZtoqesR|H7Foe$|qX5gJ)Cowc;`tk)r= zX(@O%{A5@x8TNh8-GA)t6}xKtWvc?rD5}&C;l{KUz*#Ut7f$5diq&Gyh0zZ+!Taqz zXaBBqSKO*iQ>qQ?R2yWHppj>0E}pn$>aAm6mv(DD_YWxJ6=7;n8Lzd(kTjlj=o+=E zsTu0pCu9^bj8f3so52@F50#p4V=^=?+s>vG{jtIj37+O+gr zGrTZPmP#+Y!0hk8!LlN#wpNd)wixYE#!Ps--b{<*{H3V$NMdDK+F^pb8)}lS{LK+S zmi|kAYyT~#6_09b`M8pBA)6+Nd`a*&0|i6LBRyzc*}pg>mGST?>FAXY%=C3Om?Fq+ zsT|L3AzbZh5HlBuI2-W?3`XD)w!<0?ixC&^ddCWo2Kgu)KzEF(te6Zn;c&xC*Ic@y zmacKGEG!PSNxMxSSE8}cI#;0BtX+Xh6FgeBHBET9YzhJ(ts5>kES8SkeF4*d+`R&H zK^-Vt_G4AZVSqDt4L;x`y$60WES8RZ#t(Eso|TAd;`ZYidbS;J_g~E%r@=URVPLu5 z>^sGBJ#smAEu^IcRxVjTG@Tyl`+-wTa$jQ#LQwENcI9F<(*gcg2&fv`fC8-XW z46Lc=g;w@2uh|Abux*EQduZiU*u`_<6&br2-pEP@#_%HPrTfBbtes3;4wbsML|3Al zfnPQY31%G`dl>jKx-u+4tn0w!RaZ*~V=D{lwYvZwe&hd)PYx<|eaFJJv0MiG{}}u7 z__nGm|0s?f+i|?aNwj1kA#uXyRBzD+3?RvpELr<5u>|e==0%nSB@Glpx7aBqx3v6P z0;Lqnw1gH^mQv_O+hGbRv_o5d9nuwAW=hJBwzLfWeV?A}#1EV4ANj!-{s{(VJw14$jTpY&LeG0`{QkYd66KWXf@K~x5$^uhiG$G!-dHGg= zt&C&5|MIUg@?c`c@$OAxyqUaGs{`5_aP=6tFs%vl^(4kyKqg1-K|sM}kJdg4SxbvU zo4hfgiJ^Ef03HzA3D5^)E^I=n8}Z&1noj=BzEb9MOS*y!(gl3&h7B0#h(~A@Ke2hW zsBMgzQzveQ6n`Tt9@xD66MVg`(cFq_?4}&PcT#RIlqrL`P|_x zQY~#raq0@NaWlAj?bQY4O=xYNt2McP)nWwJR(J@^atjWX+eZh0%ccsw(=z$5$!K zI>yMj6CQd-=g-t9mE_YEun>@mXfKPtpdkC{$f~VVVlGL2YOyy0aa<79z;!Sq1a17e zwFRlsyiSbpO|GJFzp3}`?h{@Ab7n6})b5ppg0YftlykK*V$l!@ny zA!^c;NO{fbF;gW%EQh%t3&`ZiF8Z9Kf8Qi-K5-Z_i;~5MuR{lT6WXXBZ$wxtFi)AW zv3f4AA;&%psa;AYROch8md6FIZTJY@4BY$og9CpYwWg}6X(nRJSYlqEU8zGP=FJ!i z0U5DxkF+BKbsysFc>7_ls182`K{F-y({)QZm$Z)?GWjg|$4y`%AafY_d&s4)_RE@6 zhqxn!;xJd)hescn2u?+TsTxG6MXp#^=wap^1PcL~MD9jh;@pjEC1mh=F)#kxZxAnd zfDWwco9g{+_rLd>y8hm|2j$8SaL2I}H)L~Mg&uy$R5J#<0%@(LWW$~?G7J8CU<=b6DcH< zlOMI?V8wK-Ap;M}hMOBd4GjWu>INfToO~(;U|tJleN92>xmz#t_E9hrl8NZ=p>xTz zw{I0UD+D}bYq1*muGHhEk}W!6hS{5Ck*-B7pMf|mrIM4!;X`TFQ2F|2AkjF|&vCVP z_{p?RrB$=EiuGAC2AwuAt{^8q$;rb~G8`yhgD>vGpICGB?2gUNvD;c_ySX)sqwFh{ zb#*E;p_&PKVhNWw$+6i;K72cOI$GLBTrN}Vge_~ndOPRSIbDNCoe&^z@?0{vV5bwb z!8>>YbH#aGzk3Teu!=dZBvBjO!Vz~xP^%ys@Rx07O(Mqg`O*>e#9K@&d5@8F46|+<@7>Oa{Ev1R82_lb128HA^+>TFv zspaRf&2a^O_^mCi3WWU>Yqd{D-F|1eiUQQ!n%Qy>#!t|OHKT614?6iu8})neNn7l5 z{fjc%2)KN+D#y&UQ9c>hRmuLla9j}*xf<)_18)t9n=jnea%Ie+2x_}G^%`)oCzDQu zy5)+xn1=7n6ZfGrf~HnoN3Pzxw7K<*oQOK+P%fxFGLEXtoTX`6>#4b>OOsJl=jJ}@ zwJ(5=pbbJX-V)Ka6UcTi`m|*oSn*S>x6aHs88e+9&nMK1fQRK-&D{^*qp*z}yhL(w z^R@diQEfNUM^-^!jdolm`ba<37wIM4Kj7lOr?4;`bDI~tYth9NWjgI}&rGF@=2$vK z8joXP3drQd$u*qHimZj5vw67rUypNp*2LT<@Zrmi_yXnGIu+JNCUZu{nbs#sZ&Q5s zppZ-sUiE6*huLUyQfZkxU9x04YYG~*=6E3JoSrPG6Xd=}#e3E-A>MNGWXpLeYi@fC z^0Z}QZWtxTcyTh-1NEu#s7_(+^7q@%C9mhVZ)#c|;Xc7U$JKnv zv@Q@D1#bojx8t61S0jw5iX6G^xOn%VkW7x}6C+KOd*8&zYM=KN@s2IVIVt*);^V%} zMZ4Zkg=Y=9oY_4^Y)_yc`Xxki>QkECjuSDH}VAs;> zm%2W&hKQ)Ews7}#Cs2)gZX4do`kiH)>UL^OuOaeZh{fc;zYPOg&_+)F z?eA^eILmj$s3skn11f4e8LHtic~xu(kg#5x1E)Ol@{iy#VxPhqcvlm3SMHML$Db01 z;I6SM%ae@5UAG&jol1j0LEiqRc=v#SOd>yi33AOPKo!5$auUq}*R@>&b&@Hjj8s0N zEKVD=x}1(CCx3*M{H^ce)xtKilZ^jMbH~%*vE|CSvmgsIQpbo{KjUDN7Om1WgG=0) zYKDC1dze5W@nmwRt=ac|&UqLNXc4kg)m3L}zQCjvegk&C? z^U6$kFA^7@#r09w)f)ynT&o`=*p{r@kOUf8Ok8@`RJ3O4w&#|arRMP`HzW6{_#-j0 z0|5FMqRq$(aMi+NS~!n^I2LZ-H?j}GH44ik#Z25fa;z0H#Fix`0ATboDJiNnCCRPh*<`xh`O z9i|Zc0r`SGt3}p`uYsQC;eASziJyVj@~y2xsLc=bm#z_!1LsM)$kvy{>ww?}*t!71 z>`>5*3-3qn)GT~?nbs2C1%%JjX%@>rNUDbt#Cy%b~9Uv zTX8@1G8Tz|OpblDgKAd>j{j18`7$cuxnHiJ5}G^Su;bm2{#tywn6~GTsH@ud2!8zvYy} zQZhN!{fPzt(w(os)dCd2S-_aq9061wr#a+76gO|gShC?&4CV5zB(kaYo^DLY;?Z3j zZb~n>n(Tlnb&TbJvSL&K%%i-qvt24sVR+IBXix zFiOptj;CcGMpe6;SMtDNU~WA+DD4^8+x074;9lBS=za+BgNxU=wmA-CnYTZb#*8LG z*^{oYKVE5MrdlduGx^fru;U5ZkW~8T)~Qw6?D;!qLE7dx>}Z}(%n1~6DyYp_tZJ{u zWJnY18{$3vOR41e(6`$@qsQNX+h?l-Ny!T~C^J>fj8m?hMiIA_X*x?zjQ`s(`JX?F zhx?Z{kq2H{vxj`(%>i*U^cNhGw%X@*gA0FVGkGn>JY}DD)wE`Xo|z$A-h@dlpyGD$ zjdnux;WxQ23C*3exOWRyBo^x9e_dgr!s3t&H05vcn=p{4+ncapIbfBf-(F#rv>i`x zbB-tF90w)MJHd3N$wG{&(7O1Pw-TJjX=m;f#&apPoeG_OK`O{Y9(Y5%W2y-=*2-?WOU;N*8p<3BG$(V?PoL%5D>tRex z+?&n2LwfnR0%w^HaM5>iT$Z+x$cUnSOg`4haRK~i`y`_^B(ffq8m%@ACEAiH;v~ay z+20Q?f;K{_j&sLkzEJbV<`exA&Zp#>+XrsE7ovg+8)`b8EHkcZ%vucNu*Y#5UMoQ$ zg`kayzW*8CvxRsJ3Cwis+$b3Fry`{xQ%g~iu%m{`UkECKr=>#zKjKm{TuXy(*V2g& ze3$Hk#e<$ZKRq7OlnQ{2OKWMM`?k!wkM-fR1WjOqG|!fc>-T+Ng5`1k;(=3ZQde@+ ztZA&F@H1wupJ(&CZpq+)pou&sn%vDhh)q4*=Y-|}Hr%#v>toZEEEAp%YaE_Q^%M{? zZxBgv(I+62%E?b&+Wd=1GO=*JyKYtQr~3DFKi&0a=SYWJbX{MLa~C9Aekq`HwEa?b zHa+R2OVjlkMWWT<~>6NxB!&!OaVXInesM74fuM&@`89Tb!52~|;Fgq0b`J>1$pb)Y{*3^XX=_M zW75L-ROIkJ$z~GXF6kc-v_XmdV-Ke|w=}=DUGfO-odt52BG>O&MjV^RF1s8?eEw|7 z<$yAYHGuP5vzzQ`SVnmyfdcBtHA|k`EfMcx=raNkmw&V=`pPqah55p6$slJC%kADA zYxAaYZ{|;jQE1oRaMd_wErWQOR#Msew}qr$n2Vje@;6PwD85`eIx-AQm7FbL19)-@ zpu{d@&~le&2vqs@9?7oF%eQi|DsAiaW9LX3>BpI+9>jc^T1^JR(Kx|wc+?LIA5~T4f&1d zOYR&J%q!+xeF0=gKyFQU`?hlXJ_%rGyr~*$7$a-h0^A&cF#a$a}oJVti@5j0y?|P+kQ-|p^^2)>T!9*>MxYzCUx8Pz7Suuvd%Kqn(xy{uHgD{@nS!;IXg3+LTTuXs#-IJ6MR3W7|se< z+C+};+<95^1xBLfv_HUT+B^36Gz!tMfh?d6$AU$5sMUwDU#_Z{vubWDrx;=Gw3!ER@p<1id}RSX|X&Orqlg>*^fZUnU{ zvetwhLO>?RE(ig9huJA>)=lUvv^j^`z_ajcXD8FtWG$zTIwuT9yMm|;SV#gg5$ywh z&yI{#+Pu%eeXo6v!_?rN9Z?b^h8}%s7y!6e~e2;`j=9P=$gk{Ub}5go0;o_ zW6p>^@C<5}QlLP~wc%8%9?3Yo5ptgeeGrhzPVt4<=-N)%4b3eR5?pg|un+u~0A&|7 z-zGyUwLjg6W;M!|MDNfbzeavWX1-qV968owX!%$r%_r=wJ<2h68mA*~u>qX5YVc}j z{Bzx)pyYA#$DMResOAOpiTJF$eIEHoq*LDHP!=pB*y?b!82cBG>3K zWCAjYG_T|9CgB=k^Drsixf(bZcS^p@bA5YEvaRhsU$d%zOP^A-rq>HU=g;8hY;s;N zN?AsmZbW=; zPn02NyYSHhG7;T#%cad*UEHq&bBOP6AFUEPWQHl@Cj7uJ85j_> zkrS_c849m+m#n!r026duWRAueOLEp_RdOd~nlqAniE;D`2V=uoC#?m9x636xrx^F^w#?9xp!leWg zh54(Om!CgnQ$B1!kX?LIVk6x%l0GqTo+uQ+0H}&PjmRK26bQpVWh3X$NJikCS+0>B z{MjGd&Y1^hRx~GisuIpQbIqc2CT8`8rplp2on@5vDYcS3UWJq|r8Y&E?02{D?IPr^ znj`=?6hCGZ_R?55ANKm;{ey4DYoN%6I%ilc+e$>kpS*S@`Z+E_r~Q~j~;pJ98!L0euRu(BUvfj?#63iPzhE5R)_jp z%#DEDS{MtFP}fO9VnF(FJ>dMWfYw7ynik%=7;0Z!Cm9)DrjeX@=9+WJjze^MnLQx}5es~i^ zQb;CGS$190yzGz!VNans@1jPT2`7tLWZQ>oC2hJgk&lr#K8UXtka3Im2gK$c9FaB? zH$tsIvvavHyt^e)tiK4}+8z zOV(FL21)sc!{q3PCByG-IyTgFG`l|nn+XmhKU4(&1+D_hyfS5fyih1+WAaptJA5G2 z_n>58P}m0l*V738V%~*c_ty0i&Tr&f^czumz0Ni%H;&;ft~Nx{%tkiO=lhrwV&WYy}g0j_Rq z?@g;BDCTo_=K!b3%ur;9M2m_{C?0Wcyx%P~P0_dZK#@KA2~LrDZbGLVa(Llj=carQ!vF{JjQfV=pXNR8 z$8TLxsr4R}9Nl6%)X_b9^EQm-CjC+=;^pfsN~6U4PG4>ap5kOJ)f~LL+k#lnPeRE- z!J!%$5Jyd}8jhIUeF@;_Tof;@dv23(cSFlPLR|OcVLra+s)s}V(5eMZXK$Dr_C}}{ zHkonGHq3I)cpO40;=Buz`NXFr{hOA3ghU>inIIQ@dc}dc@zX7Be_&DD3uF;@gSTTQ z1=Qxjo6mPa-DlQB$&SxR0%F|Tg|fL>gyKTur-5#V3!?_^@gU;AfU z%>~j`UtTqk=>J~-`Rfn&o$B+hYp#>^Ue|N7XRQ04?%uV9t`l8sCt35iHCJ{#i96_l z14OPApUX1)<&2z)XrijoWF)B?WtHmKs9K{)jsiWImMfCUL^7g4Noa(ns^l8gK9*IG zr!KsF8`(cT+OS%yOIRjT-?G8s{!V5%w>i?WNoSMF0#w2~aVcVOFlaQ-bgb6r-;lTkz} zjV3S*qX1e+j%wIsa+LevD4HlWFjp7GMY)e+6r>Wmef!9YT|Q%6Vy$sO_gQ5EWwImj zQ3b7xkFrR>9M#Zr`Di4fimD2p46nWvE?UEJ8WydA0-bdB3NKzT4 zM&&dc8)bplKN^iQ(b1?znN+iysFDE|_d@R#`xJ6{tM~6QEMMmttD+H9$5p6DS(P#} z$|f1*Xfzhbd#D748Y9FcP7jM>pPWYVt$=Quj9PJANchrLm(_G!p{6M1XcBxzS&CAO zMv}?cD8tB=(PSj1l1EN=ncb(PR3viI<=ghG%=wHF-@h>835`<2aT{e+G(F0)G1aI# zK{2CBIg6PX$#F|Uzi6yL%^g5+{_ zOc`h83M#QU{0!z*(|!xZDCLVne&!^f{ub$#{OUOGaF-v2KC!!FKQHIuFih*r0s!=C6 zwsE-ze<_s_`V6+TLQPKn;nwZ%!S>T?%rLb-Ay-8-k+^!4iP9LAXhJg@rRnIXnu;RM zkOEi<9b05f?^7x%B5KLb${ki~c+NDdRA^#Y_i~!y)Bu>q@K;Qc1ZKH10vU>)!I`1t zBM9iZNzJBQYf_SE-?Y;0Qp|_)vQRqUb$fO3NuAs1Wu*pOs9;2{foL;eD z#1QTH=vmU0`JVsz0gkVnjl>cWwHg~yoP_`?T3S&(8p94iCn$`FVzIv}dLP4*gSWkZ z`<|6Me8#|g`GJ@3XIW)53OzfDdMo;d`&_L=*Kf&qEL~YpZaIN z#J%t(8ckeDapSH)8aG}7ZH#RLyCKF(1&s>LyeO#n61hgvQk?HK!J;n=&XKnwTa*M-_49>4}i0|^|WPk=6YD1Z62NDI+VKZ`k%gH z??atCx_{PT7hT64Ig@}8w$4Ry;N$&_MHJLlvAO_L^Ldmp0H^oejbq7DDvz7qN^!aN zZukOmuZQ5VwvQV3o`DMMu$8j5Vy$Fj5U;?U_U^wA&OkvMIrtgG0V7sl+U)%zf0c^l z^R_!Itsa+qXl*=dj}$YpU`9nwJP1C|egQ6gVH+6|%Pwuc?_T}@e8nPzWoNp9GBG2cgH_dbb1({UrxD` zNq63*AfGsf?g+@_WG`@6xT^HadRI5ywcuS{b;YXHUuhpouV_`6ZF$$mxI-xtAlipY z;gq$ebL3q!**rdfJr1RheYJHcJ%pTt_V0yrmLZJ?mYK@tu^kTlKK>w9RqsPMkRlEb zJ{uGcGFdWQO$pl=BK`t^Eas$XM8m@DKjT2U?9;?~+jg2y>-@??EBcw%JuE?L>mdYu zw^LgM64I8Q9cnp_Et)fqrGn>LlGMJ{yYp+f)x!}Ck$?HLt>Ht-1RMN>h#5m3C@+kA z9+3=gT<#HaBK*XA=Y6)q#13^Yo=Q>W)iLJJ+8YL3%W@^QxkyHHoqYE9+^O_Y$-stp zKXKIaOuN{|1&^(KEPaeSmL5V1N;`a0AgK|eejEZQpth^?Zhrz}fa55>Jx4oCxZP~v z;y0UzuP~qEq<^<~g;sLv#lVUwh+HTbcdNO7Rd21&jL?hEcm23?Z3ipb&uK*ymW*qT zLk{5MT@ZP9Q}F!wx;yoxQj%`Tm~HYTOeOC zI_07~R>zFh=1Io@hH}GG;2SUYu0>d7;E;dmXFP>G)Dq-4(DoT#g=cl$g}?! z(=DL3@Uhw+^oRaaGO_!H4Tm-?_7x6(REPogh8xApb+|={A-C8?bDWT$@Ds_vCeF+M zu1Cnp9}K`Z_R8+7R`#kNCF&P(kHS@o@TMq~$U(%bukJ9Rn2;A~27`O08%gO!$<%us5%FVXRMbAdBe-DV`R4%m zapQrO4p}OjkXXmBB)gZBSn@jcfi2B%{tByT3s67Wnv7+m0T-3eGIBa$HMx+=`1Wt{ z)j~2k`OKBL(B@#6ioe6khYqTs3%v3O#=}!~qp_whZkC+)8!VcoR1z`&5m(p4 z2-CX#H@LY2X2`N zF-&G6>C?H4$!LO9UPH%)WOBsx$MeYpmvj#|fBhQQaqC=e(L7GOqER<(b^t}yT}!Hc zq(lZaUqw2|k+o49fx5^_gE+P-w(^s5B} zPW1j&eY41+etzxhPNv_|5f;6l6PpC~z|b6$=-UQ)%xo;>7^hB~S18lO!4VW1X`TL*o+oe=;{Ee>GaX{S6 z{RIq=k_Hrjc3hE()#K<`H0YAWX;(4lj*=s%@U?Sq<7)+NM0EIkF4{!a{I9pMYeDd; zi;_dBf>pyz!eTQQCnoBU{T7$U|AwomrA?g5Zm07-cQKOWw*DPkF#H^j5- z)EJ%1pa^RzkW=uiu6hTomNp?z?dCm4KP}zT{Kh-jjJaIeX?z#I5})%K|bvb=1BG0o9T#MKWa0w|ig;7c?FwFkv1`glw!yMfScaK}`2jDmn6o z63c)~dj0g9oH)~SHGIRrv}7@3C2e~WYRY%*$BlP!wKR*e5);lp5*D z`ACG6w_-P!Z;}F5b7>nnr8c%g@U}GPH%VI-IENp=^RWlCeh;IZDaOh%|8$~?taZ+z zaOE)g2-=9~r!S6>FQ3|gT;5wYAp(9_ilDBE`PJOAZ7m#cDx0b?)qpA;uuUl%rF_f8 z*g>gqO>rhZrQkVoV(5txfbGf1&=%?c@Nr6tt$VIv-zSx>ZwDpEWZmLR)>l_DA!Dq%!g&iRWV@?I5{&AEEbSgMzBLf05 zsr&|6%L_rH8_6%XO8>!sZ})cTdCN#NBomI2?b3mFi8T>vZ2!`HXuA|Sn!v18^u>Gc z>przs-I?pS=?uu)?Kec{IZTLaTFIX&_gFSV>x|>NA|o$RdIfpr94QVf0y2l;HPM_n zSLzcD6^-F^lnE&nN_)Pl4;r)N_<8t=kPJMbu&v3QFGb3ZdA=LUnU@3B+E6M>@=#iV zED!6ff?U4~!y=#}2)G9*3&+J$^5(7uk&=#Jh!yi|(RtohP*2s|Q6}Itxg&INdc2$? z-VyK;kcoEft1Tox33-CL;-aH_q+jAk_{V!%{5Y@#9!*wmRAw5CD-@hC1X2KorAcC+ zbY%0p$UK^CWH0u-VFvB`pMI-y8A$iQCdrk%Leg~#&@f6Tic(?0a?=aA=~mu+mGb@rkZn|4XJ zZ#B(#V7B-~aZe*PrKHVMCVgtkuc`x=iaT@McY$=Ue`ymENP78@Owu(feTN_6^Y=*? zf)%B!L{cC{UbyCmy^*djb{|@OinGQ<@Y8zd*Wq=1Ms^-WO#E3-vgWp#bUu5W+hj)i zmr|j|5YEzq{kxu#!ie9nXw12)v#8Y(DSbW$`_3Z>0H%3yLDeG^mJL@q(@Qeznj$>iAEIInNk zNP*GEPAB6E))|OZO2M#;aUyBLF5SFcgX`-vW?JwR5&iITCD{@9R8RBu3%T{{3e_eP zw8qF-6b`+acG(Ie+LSXp08$p!Nv~LDM4#2IG@{Ry&x7&v$e0wF z9sx7bc4IYrBaJd-@b!)5YRD02kP8ejFIH$pKF$>vlO10i86XcDq`DP0_#Pu{4B`AF z$m7OkrtQpPx_6FCLt>;;*t2|P71#MvlVfk+At1Ka0kNUq*gLjcaiipJHA6Zmj} zSV8#IR?LTh+=R3t$WlJ`T!frum%=OHwZjra0gMJP{<1kFxmXJJf|-2G4$ZoJBd`{( zd++3pRQtn^I;CB`ZAZPV_k(2cJ%d7?M_WYTZEjev8Uogl}3D^5nQpOeCrT>+%|Xj1z_ zB9|+hLP8i+2kJYAXi|wuhXFn*9bV~yljp6RkG=5iN3WK44Ssf2|DL{lr@r^&-9KBq zqhqpp;k4|S=TKdE8{RunVx6e8rb)VelM`d582N4*eHW04=+(ep^5j?6NShaC zqz=(QxXidK5of_qJ3P!xl6*2N9a+DGNKT%3Y^3?etQ0wup?M(Tw4ELT`RA9#M)FP) zhOVHETN{@&FHcF~xlqn?z%RV5?5%hdA*NXLQmMRclAg_yha=E~LNYlOcDF#?#pInK zDGywxj7d>8d7i_5;fsGN!YC=n%FU69vSYep1`PUC47`M7B*ClqkRQgR@3a79PQ}5- zKM$Oswi{d^?CnKCuFK=A1Z~_xxTN_~UWz;c<^0CQuZonBk4{fzrtOWejndgrYj%xv z(^&{xq0USM5a$+=Rwe3@J%7R{fHzPInVbu+dCHP&DvsfI%1LmKTD8jzymQZhjr z?Owj{gzOsr{I?S<_%t_-MNr_3{Hz8R0y5G?u1BWnht_UxTIx8DZne+vfO){nvPz>@ zG$=MwnXWnYD1t{U*TI5YN+r}^e!)3!TK7Slo8Pz&{Qy+m{8{J-4^>x+xhn|Juug_- z`ntj6%#y?uIwBzBQt|BeP0r7zV5i8oqZ|BSgw^U4W1ceF8-Yl~sg01@wdlrDDjB-B zqXl>-YyRO{?mMjW+ZGx4z4D3p)I`FgpGjm=Q@}NvK?ej>a{T49_VD*W_aak7G*p<0 zO#vPz9gG(X_C~D|Cq1+HnSe}AF~Ff~MH zeY+yvGa#S>-u*2^x8Jx{d>Rk%oGIx79v~`0>_bI}n^6(sH=V;Bmn>9-AjN~y^+UmW z4yB14<{5=*MwN<(0C937jQTqcN(To7ZRFr~xY-sl;2*x8lNi@LHrVzRqM=~2xtWGH z8gx-UQ?{buc#RAS$>gb%bKt{t$eN$K5nsH`J`V_nwzJS342(@M)6;cLz+5i@oWIqd z9So&Lp}I2+TfuYWsSgy|dDtgz;HGb4elMnv&%l?D*Cta&g~DT>j8r|!2x)v&y1RcV zl^nTcGhBciIOczSl>0E}Jcn?>OQ0faPzRW}KjWI6GEaFBYWI_yF_Qu^IkNSt*7(Sp z<_~e-<(P-z&|V6TG8+k@A`_=Yt>)O7p&Dleor^r6PYjK$AI)$jN zF^h9H5Xn0I1r@pX!}uZrnM6!mu{IY=%1A#VT`Uz*Sk-?)U%2-sh}ADUH$bck+!@Y? zwQHN_@FDo62iJ~=VkTLYL6Z)#D3wLz#~@zgw?YjI+DPS2OFNJ6bGPC>m;s;;v}eF# zn{d`>ts^q2D^(js#Ir_jL4O5g^3)M&%lFiL;TCQwS?A@8Ygm^bD;Mbagry#0^NLuQ zW3Z9@{*&m4pb3|;e;#SdZ?QMe<96p8pJ{7F z4pxGfNlmRd?qu|ppwkpoW_3!Q(GFUPrE=!>BzO*+9n?+B@3$j2Jlqt0oEvKU`~{1m z;a2)xE{1Y>^GdI3Vv0%dJ(LjX(4epl$b#!2AhEL~%_`yN?EJ+Z)&mW@mZEj05^I2I zk_Dm~r&=ES6h2kZMvlJ(&({JX!{+9ePvd*r2yUBKt$AwoA5khmCEDEU?k;qZBaz$x zvF!%myb7=4T?OVDHj|;%UVW+DFx5*ca{TkqlL9KQBU+h_yYAsOd;2^v2o~=8ozwXl z+Lj6<0%I!TnaGouKL-KJEG3f@f5n9xJalWDm)(u?Gn_9BW|o%_l;ADaR4Jc1=E;sJ zi%L$^M+O8`{>ttHsd!g&{us{jTLbeKatSl7DGITcCXq=3nBi|2F!5a& zFhLVJICT4E&DveuXGG>X_zXT<5MbEA1k6yD^4PRHl{H1kN4@|REF_a-7uv1OzI&y} zPxPQ7Wtjn9t7;}(sh2HjQoavA5t4aywNv-uCxgtCDLGM7o1%^6n5}}1&3iw-R6qr) z#O*ltUnKz?+u#3HdclyzWmHVDljbp$b;^4y6R^s^#I50_Wb)KGQCstoFTt6!A-Sr* zuWw85Io+yN$*yB-+E8wGR0}vn;nto%k_kqpJ!nTCc=w>SBd_ugO0N(j;s_4@OxO#Q ztVSG1aTF{s7-snqf8#;v(B|czASWL!n@Q{|D;~)n{|XKuHA^^0(dDGunDZu0v?9Ut zz2U1^L&CN*y#v07r9mV^hU#{jL*!3q;2J<$q88Wv^$9>L*J2 zy+QC7Jp_eAa@^=#$>B`^bPYE+C^ukoF*XE|aWAwrkO26PZ%ern_0$=0T+2TT zWc%Z|3FC^~+c76$uTNnw_*mfEA&1mZC-Ntx;$5h?dfGTx{!v(}*R?OS$iNfa-C6-C zX#oy?3;3B?!>rwFU~OZ7;sVFro0o4z#GxFCfKN!T5v{+h>w(_Hnjd$6tYeLc;Woc5 z*sE>xx<$Gtc<`$W$h;{9(@)Z@d%3iF@GXAK}nbEF|=+6&2ot zzmjrcR2Q8NqY}N4`%6#YW$5*@w&WQ6?tAEZICH&wT1 zT`U)u8U`XJB6#7Ai)YEjufaXIY$G{-|FTvmiOtJRozc@o$5Rr-h;Wme21gC zbLvtq0>(Md0g~`mC4wcL4MwFaR2_A7I%r678y6hAOUY3Ab))!%T9ODd7r~EN4 zW{9X2PEW-*?Q*z+aE$GElZ(VyLgoBoZJ@$i-sC!EogYJ|cm|ZM=+m)*q|@eOqnSKz zVOt9M=C`pJ1#SFQZ0l71tG785-ZHO8M|jVOYRYQ$1t#iag>bTHw;m$W2&BR~0tEs^J zI9PPHZu)$P_g2!ZeAehsCTc3c=tdaXMiO`j-y&!ut|Kfw43EdRG@I{8TcPsv9Ci!u zVu&jv;RKT^jnDYZC?%WIkWZXKUj$@wFmZ5MJow=^q;06>RhO??{a`zW^m6FI&vp{( z`1e~e^4di;rm8z~YQ|Yo8s#xVdVCro-m7IJ0|GJxd#kc3ziSj~?6EbnmMX-))K-Op zVd6(`T)uK3T;*&u?A|*rl)>atp9vSc z{If`SuPBeYx;K#rJ7p_*qI^n&Ne z@yELsU_hfxs- z=z{QC`!I!qwwCZN09N$NxLko0r>Pk`m%k2hGgy|h2yU8fb!`N$Sq**0z%KhV5j}tJ zKQ}0x-rR6-Rlm7&q_5QB?)}=@)!n}k9c=ErI-Ug#(>$PU+K!HjGLv^PAqxxeVO;?k z7u?3Wdq6-YPcetu7?=k($>64P%yYmpyzaF)-KB9Rn`umWRW4g9PHvUSM*5dhvD1CB z?bPYrBE!i&G>@vfZM7m;Mf~F0xC7a3O4S+Wv0m^Tx7sdkI>a(uUC$I|F@Pqm-#+fD zCtOs7JR-sR6p+c0`){Ur1k_Qf4EC3Qo`dP(1JEauhN_Oqc^PlQ;H`yqF_PU176LNS z{^hl{Qu@VKnOU@rndcCC_?SI?z>v`(&Cr}pq+G#dFhxE+1Qr4^B7<&+;dpNMX0mVN z?u*Fln}!hFoLb*U=GVR0B+_BoS?HK;v15WY)?SMwxE)d_Xlt!M4hmJ;Y;NazcLOue zLGtk3t63D;7^9h07Aq)e;n9h(49kRY5Z`w%JnQA4@cpYw?+(eP;4vc_+jF?Hu0%Y{nXUkf5 zm4?N;O2MRIE@QhPk^*vTF1fo(#0A;*$Xq+E3rfJ=02HAKQHq?d9J4iSV?gaGxLET1 z*|ObGH_Nn=q36{=#JT+XeiGcZqGo(xmyF9J!hp7;%+-m|xQ6znjEPFjR6`L|^21RX z!j=W(=BeL`5v%vr_sOi}(|e%FZ6;W4fN%&ELV#p9G*HMZhl8w~d}EIcK!?k=l7k=q zkN1YMSTLG6gK>OuFlf|8%NkI?4QLTrm)r(;ZHLL8BffLE!C0=99Q-5!V9G-~S@P3! zR#b@exlo9L#ep^Rn{!uKGi_b?Z|6f7qN17tmz5~m7OTTvWbI?X#gI9L_$!vD^?IxKFa3f z3K>ip>wFl?scn{p$L(g?3jF7^%ceBYDSlHsbg^t`kP@_!u%`7C9gj*Me&SwC|DpGoT>i=&yka_Au8~+^HHmj;RIe*7F9vIJXY45 zqdBIIqXD+skpTgjFY1dbLel1ji)1aIKZnc18^Kw|p^2kHokOcsR* zt0!3*Dv{0m7R^TCl47`}f*8U}WCQP7Zsgd-H~$Oyz|Q|!(|qI-8J91nocAnts$r|R zrzv+n5(pSGr3pGpK1ZQb0x}U5QSAvC4id7S9=eD)Y1x-sccQx)*}?_Yt*h4db!z$z zNYuTxuipE`?q6_%_WqVL12yxJrS z0=R8)GK#ifBgKZaOvA32&iTqI@_7q%jF8+Cu!kpPY0+RkpO~Z>Pu1&H+ZrX>Nrrl4 z!{j4Y*@gi@6FK?P^*9{fEtWK2v&wMwXLM8HG-Yv*nLWnPl&aJg>8tG!X<-`?eaME| z(qg#zpR&s?#W0)aqv$qYNjs7zthY3 zDkwb$*$$jrxSHF1L~mfaYE>w!4YxCscGom%^87evOh6?kUFmb0a*P^jQ%*V`G9{xaquFealDoCwBA^miYCAGaM4dxqvrfj}(QEV&M%Db4_%>HdA)_jf(L=GPrWOKli#qRdMtPicPEHbcq?u2UHUQr;!2TAbuhw6K!D1-u(JiutHG=Xg|}LJ zCuf4WBwT;1J@_sGnRokfS1IJV{Em&J>S>GZC%q68xH>5Bewv*6u1rZDc&2X?iA}9& z96dG#d%(i#CK=W~O(Sf9amCW=)_Zm;6)JW~NSE-rb`fE3RTdJXs04>IXv>DU0$dGH`qE})$B?Luk}q7a7S4sXF+c|vd=xzH4HB-w=vcOu zyPFUmUP)`?9a#)ewGIQ-Hm6k9-@8~l$`CfETWY`Mm!sPhj;LzL_yt>edQ?^t{D+Va}aTJ73%*KX+go9MXcwhqJUV5g>Y zXJ^mA9UWJ$`O})8t@-Af`__DX%{6OcYbMq(Yqs{^)_-u|=KgHIr~jhk6oUB6tvwqsx4ANyWhJ-E8m_hi=(i2Z?o zY(5}*Yv8hV$JTvl-Q>FPI{mr})@|&4yZ>Z|xcAp<*7QEp`_+NxdjC)FjlIQQfA6K; zU+CT2JFxn9tMBOfOV5AyJl*rq0-lCk>E77g%WpAtMx(DQ4BF!U)&q? zD`VMAYRi@u-EXSY!U(KDVfE>VCvAufY~tyHqU+fXSDPLSXxMzxz+{3+gVvPqTFcWd zp3FF1DIEw|$J1;I8g}3?_n|}dcqvD@#)2tiN;(3u ztvg!eK*1l0(FT*bTnpQR)2_`2crK27iedDjvZFYY_bc=&@$XvnkhLHWFtZ+GI%TFj zhDzqZ=8n}ZM*f+pBBPO02Cp-mvNNfTueW{>D9nablqNJ$VY4~As*%|Er+)qoZaSc4 zsab89WpmNebgE}#iyllzQ+_&HSIMh6{dgde+4$A=3*5!9zNjj)ii~1BEKhe|&%O76 zKBN!RwV2Lb(q-Uo;>dMVF{=EiQm0>N>{B(F0C+tLa6F*yl0~)1$jE)pFsT`XM&zR^nygUa~cGM$P zJN&hz-jT`cA{`9RUtx<`OVOaQPO}buGPl0O^Jl#p2mHgDhBFsz6ep?vy=^)}RaryA zQuR$Ls)1T&vw^1rLLSIEI`sjIfv(ynV(HDdwi{SSk@Cc*Cp7kiDp6;|1^&JAx>iS( z<61@0?RGjNdcx>t)DC(k4~MMBo!j~*-?w}r zWv3dhyuwwUl* zhJW9tt6~K@7n+QF9OH^yO#W(oV6IP~Pw&i2q*;=w3>)z9%hde=q>FlAnT^V3IMtQnH=>X7P zzQWoRz@ud{BL2%l2C8VGYmunZ--uXZ(R}9!|GYlzRWZgHIvzGfZ7yZHXS_uZPMcXT zbHFxToDNqNlZ}8vs^l9&?pTnXbebEmfV4oH8~y>$NNYEw81%M?pbI2f#6`Sz38{l# zHDfT9l@(yoSuJem*ZJp_>WH4ou(Rfpak?CxVEg`!r_+{_mY$vVJCpIr1MbvVe$DfI zgAlH`<6w&(Y-lH=_}cLq3V!dzw)R*Cecij#!b7)*Ln_Fdg$a^W8gmdd3rX zQV}|iVXfU~WE{$ZNgq(#6l-Sq z$GyH-fzjI4wz$o3Kpl>%`+mc-_bPIJ#uS>a%&L7RPfm0W|Ge8F&rmLXHEKd7Dc2M` zu#2bLbbcLMiIj_$aL}2nB}HzYK3+0a*^=EbIT@JIPKDJXUVeh6M7=`KXiAL?t1kL% z=?!0PkH4W&HL`iemb1@f0#0kX`>*``8VVjc?bA&}^oeM!8e_Ke-PAXd$|-e8A5qz~ z)qtk^^ZaXdWk-!-48=rxIu$FIbN$crk8AW*t)irzs?;iKT_DwU5&t+3mw(_iUVcZN zZ%}E*8nl+N7OT@h`^d#N{E4Si6A2%kONKQreMS}6s{7irD^J#Esfn>%X~LGujYU)& z{$K0)K)nzw&}C;?TOMD#cdDU8;g{ z))kD$hG?EXT|t0P!Ec_;d&BawCAR+AHa!!fkdY9rFz!iDE~p;-*EZc91Bjx7nnC>& zx51Dd;um~i+U(0v^z77RL^aXSGSN;EKmLKKhD}Z*c(yh)1=kkg)WehdETGN!tJ~8kJ|9H-9oTS`S zV{F)O@=b?Qo$cji?lDQtNXI$DZ4T@d>Q|I$PiCyqEu?UtdR#js#P!WZw(nd zWrjwqomHhOdjg3yM|iqF5SgG%u5^56!fqd*$gSfI$beVvsWFpwt12=k&t_Gr9)5BU z1U#;=g4O4uQ>jwMYn{q#R@8M)o#OCT=>0s+!@>m_XIy>IXP1|q%h z``#==%u^5$(*vXckw=se6jUNY3jzY_Q(TaUyQoASf0d^~M4y5_{GZ$R_Q2c>@_l^p zovJ=lx9ZfXs z!!{TI_kb*iC9Oy-6H)tQBcEi?N3cXnascP3ahB3GT-?NFAMXAEU&EQlTh_b-)~p$l zW@b^Bk55k<;5vXMVwolulaSafr^~^Ypu@06s}VCx%o?XCG8<(F8m5Z@Tn8ZQ-hf@L zOU+(7RR9dK5#f10%HoFd;>uW*4u!~kA-4V#-9O=X>CFw?>(G+fXc|+toMjsWhoMBRXk4y5YzRgTrTO0exVoZ^AgRW4tih5om{BV(wMv zgTcmsxVU80sEt!BIQ+)z=DM+Bxg{2rW}b); z?hL>u#Oji?J%JA204%0H40bVI8$fRT0rDg?VDHR*nBn6)oB=*;1Z=sGtjO_NIxO@1 zi;))8ZQ61OY&|?ODz+oLk=Q*q*SYl&W1{mO2Jjv(GC~qim6C)H^QSV-T8+jb#DMvl z=dOpZ;WaTKWEXXIf0Xe^P=^a(apGbkJnjZahBohz8^z@UNuuyUuz*E)=_SMPMR>%n#jQOjG3PKDIOV}xDX=Y zx`7&lH!`2)ISg1hoLjZ%322+7(vr_9aEnUTqyVcNEce&mG&eQHYlDRG2p3WJ(oJ&^ zQO7qEvF0S?y&25W{5E9&W&z^cZl1FX(D2K%Q~hil2UHSqTnDZeF6frGroHw4?c)2a zH;1DCkj3sFGT#ML!E5WvVlRH1G#y^avpPn-@LJR%|PH0!ubKtUCuKjvN zBkpDV>CWqdOQLGa;zV#J;DXb~ltE&SU`}se#sfhS?@7wW5Qm z!@K`o{Ra@k+qYe@NEurR8WdJjdh`Px|;aO&(58-W`zz6o(=~>dj13N zD~um`VD8h?JUz~-c=Lm2s(3ca621J~z!hlA=Nb8fy#k0zkb9nn_)2XS;s*d(2`ZQ~ zW1FV{dHy}M##Zi(1mPe3`?^1jI6gEteAexKlg5G6L_u)-_@hJG(U(THGp@~R;rz86 zuEBA`CXNtklb;}!HKqLF};OQtKd>A&U=Gy07iWtbmzhob2F=#wSX!APmn~%#O}QG1apc?4%e3k z7|qwrI?QUR1jBAw#%GW*Q$0V;CnM~e+x8%FbKTl^-PY{5@Q1rcdlkmT24eDd8*D<= zQ}440*@DlVr@8?}*x@ob0x#%#%vutU#)Pzd}`-}ZT1ns zK=?WvR}@`Rqdb8CIl1cT_mLCs*pEER=)!Nzt)9(lAiy~QP{rVo^4i6IIGxQY1(aTW z7B-(0ml4=|ci&3AQLuUrjt;!CaU(kMjrZ4&{{{NdB~4_TWIFBhhU>2SO@%w7jnmxocK-OtTUtzD@L zgp5o6Eigh?X}(*-KI?(fiGhsO3uSXaA(_3}tVL}}qWix+w|mVBP3YAAD#TiT=Y1#P z!{3>^cWT+*fL$Z|?%eJbHcYR`>htiuegFo6l}T7qkQfEm2nhZHRJI6IfO>vz=h~H8 zQ88ow_ejh=jo9uRx@2;GA~g^ie`xg85uu>XXv8LHM01sPgx2daC?q;ENXd4_^aGC_`Omztk2iDx+m-PEG~OiWrIR_&KoQ zQ5h86ZsPX3&e$)&XD;#`zH&(^@^=NZSJrJK2stTxPnfCdjBckA=Umje;wQ}eM%xy^ zhkan9bO)`{)>D!Op|@q~4KLYHTT`g<(%k&a8RX9AUxM%zH1aFZHo7+8oP9Xj)fBb} z?t{loOP!{PAXX10(D9S-MLaT^Ip*#LpRY%=KbZR`tGVPa0x!wocM;C)rntd{8SR-? zsOh52O&nET1YO7{qi0TTg3xcsSOlEp_3v@4vuywJLtraCd^HS_jq1pXO?fr0t=iRQ zW8Ts%0i-C4roqX+U{LqfBB0KTpZrln016{z=8;*^_6j zetY$A`k!6>?bTmgedp>!tJAApt1n!=bM?f;UnX9f`1-_y6SqxVJrSK)Fi%hun+8TF zhF875>L;tdy6X6-W4ST!*d=4T$EHXBK6+~OxzQ7&cZ?qFKRucpwU5e2w?lQQ zH%ERk^0ko%Ms6LsW+XOZ8Ig``85tRVePQ?~!(SafK74q%F&rGGhw+I)tLdvxjtg2BGNKD6_mf&W7U3tGx+ z?hZlTvPaZ(%%~8{%4V%M?7f6#qxbn67%BCsz2JDN`Ejp=9kI%jv$#F7HY-+?o zkCg3Cq@Xs3NK}7-uPTbgq6IBohw7u6O)u><5?ps&Y~1aino2W(I7R)m(R*zlae|n)1nFMXffp zah#oh1+7duFihnSgi6YoDJvxs-5)4uJl4W7tGyafB%|6$M$H<575aeQh39Q}qNMfN zVqO_J%=XuNVZD^roUQ@s7|K9MXW{5Brw!K^(U^so+#ouy45l(+!<3+Hgyh1*U6#wN(s{Pq+WH@Nzkuwbh22*+-bUHs>RH1 zS3=$sTQcv)Gg(KAO6n7~TUf^xf`-^2#uo{6=zKGOSnIvN!VhTTwb6TYaDy2>~a4W~g8Oh=`Z?%#lvJO!Zs5Frl|lp9nXw{4XHBV)H?nS&odpfmu!fX%eaIkDSDPU%_q9+B!;GhB zb+MXJhq5-(_%h2~?R4e{ZH7)oLLN^r5E|wdMXhvMacwdlkV)0r93>fkWc|PbM6D>) zO01Yp$SQ%9JE4(NW=;szRMm|&C8kI^ukj=cA>EtoaMYBv6~b%PlE$L6*@71iv42+8 zqO62jfqAU4fL#+!Z($u=3RTVK#Dh|gMQ4dSm1T189bEr1(E|NbPqo}BnWr9&^!QnAzSkC{?N)}^74+vp&X^`=x3U#VJ& z%ICIo{Ha=<4AdRTwBH-nc|r$1$?})A$^@+nM-uW9RThT?mvQ83RBr;GU{jwZ&7~0j zah8kB1DG*|=z`J~Z;{!$M0OGD@K?wT`WV)d_&jwbZFPDi%JaD&Xq;+1V=CGksd%E0 zAkXJip)?k%TA<(UiJP)uK!a0WE#cadcNOLxfB&t%{2J zOd;x`H#oY|9>FUfLoT1wDY7+e;5CjtQS;DM05MUTls+nLy`Am8K!vb0o>1p233sMQ z`(@fU*#^o%6Ie{)0mrdc=7RcE93RT=Q&mD0c?)Z0?FDkLm+P)h=P;i)BiCx(X00W? zGs6B^N^NKbtxBZ}*ZYhX(r_KuU6IRS;esc;;C3_=X*?=h&o#)adD5E30&z_kBeQY& zt1O)~*~5fJ5pC(qSQ8SchCj*CbyfmvRjkEQNN0Ab6X#ve(UtiU?xKvI3}nL@L;=wj1 zIQl{*(IT*Xu3&N-idZzW(abdz{7J0fc7~)fn;R0p)(6<};Au!P3`gQlvTT(UCHhj*UL<1w9^6*}Zxbt%`4XhNCOY7D8OeHWn1Ljf#4t=dsRy z1y=U}K$_pL&`Q&)Trs{8oXrqx0d%mWsUy~698d{!vKSTR=p}mzOX_t|W3cG8x+D`l zdM;HX6p@lR7bz4RwzL8c3PzV;N@FqWE7p9)l%uJN%ND-J@uB24!lF=m#PMJfbd~r9 zw!auE(qdV!%^=H4l4O-R$u8ouCL|Xc2 zx4*pQ0mvnBDTp_sK}h@~&b^4EFQ`pE2v1F!4B<*#ti$)Qx>MeQv?0u>BEk)go>2Ir zoA2$8N8XY;mChL40Gc%|92yEXW(IbHMNYcC(t0kdhWZc^>T;HUGcC)IxnPS_`L)4f zCc5_-mQ6E;Coqjq8Cb}KGloD|bb_OYB{q3Nky1x+EJI=!e2gP&!OgAHCOjISA}Ech z=Q-|j8pjQlrpH6%YNkwRh`rp)0lzjt)KgMNCT;U7JqPM+_eRmwB;&Fy?uu(kw}x7y zVb4E#qhKr}f%{=iST{ya3L(et{8w7lU{RKppoQW7v}a}mW1*IN;3Vt$#l z5>h4;L@B72aCD-M6DmigqK5){8Dn}f!qV$4yAPumO0~QN(}W-vV}|uu%j=-5ak0fn2H|{tgTcJTjYa^TrLg4j$P)u%@H_J-oN)#=x%0CO{GO zs8XFOm5LgDQ?K>{*zX@8qjfnI@Dl&k&1l`&dF>B#P-)NB9)(e`8C`Tn<0f!d*+`Va z9*3nEN0+|>CJH_o6{(2}JKuk0PA`~)5?tJ0H&iLC>82u{Fh!b`vLNdJEqnow3iZ(c z1~uTy8)rME-@@pH3<5Yi1%A=U&bg~~FL_nIJi{m?0=3OvD|2UNv>o?<4&(jHtI zm(xiaQ>3RXR#(N&fDJNm@K<3{_+;=-D;bE;;kBJly~^?!SmNQq+$trOl9G0@Ctk4u zn%RA?0S`VI3H%q&Kl(p&0S@a#0H|;0f$UsA+8O?TAUg-%MSZij0eYL8`5>(*)yaZh zo^)EJMIseMg1>C`Ut#+|!2biVf{<8v{$p+FM1z`mf@TqHcUN=_B_mh;N)r_N9F z$*>rJVGlrQYdiVB%>fF&xjhMj$_kp=8>~!J{<`bvEi^Ok3f`9nWM&G|nw6^osX<#HY zw;51xb~tfUjZncU2E~sWK5^j4-{#h#oBj!d;WdDxWj}y*P-|y9zyBwM3(VwbT``ZB zshBb6_9!5>85!RJq2iO#iOYu1MGx8QGo2^j0bj_4JNt%iANZEwfBSYq64%GaUmDvv zl6qHf9kR3m)|DGuKx?x$@U*9rwnm~ReD{iSTs+KTAo1fy5(a|@Lbx{u2b*>o`f~W&3Ecb26qQOAhVr^MuearByAz^Ve_TPLI{#2;u^{)acN!oQ0lgeU>rOu z61;LYOh|I~&~0}L|Bp50J}D4x*+jM(EMgXmHx~>PLULGJu+LZ}d+ zb0*>UM4N#ZX7laMQJL2Zab39HpK97QnJ9Wo0K?#s(a~*%dGyx_;WYZa?js8H>3$&> zj#D21hLZN|(hP;;x)_+}@+G|j*CrGS0!1f*A&-nsiu&g}PfiMH!5U59q!4OoJUIGh zpJqfpbZFo^{piH@>>B1s-3X{(?XAF^Rr#@k-r&WklC>#~2Lo9<5^w&+TJ+61SVdkF z8wqvz(1v03&{LvS9g$E7?nBK1@l3(q0J0HA3Ac#w_I6MX>{^IbRMFK8#0s=ASh7f* zki;C1+fs={AZ&4mk$f|(C!dUtep_ztd}Xuns{*JFON#-^4j{DLEy!kT23&R~-l2&W zw+eTzU%3@P_peybX2Wg2uDq15m-S=-e+KILK?y<~MEa!^6mTNYq3uG58(FCpow{Mm z?#|)Mg$2RRL)q&}J=8&f+JmqYrp}VP?uS|k7B3Sb1BF=YJB3j9Y30_=%$u^03D70G zgfoDLLz9q`2S)UG)9j@oq5~!*1!WKuyWp!@6*~j8k>RfusMw93L%Hl1r@rWB&`)N=mDn<3IqfohE1D5;`4>GJBat9j<4Lc z)Bb53u+(6NM$y#yz!3snT7VV_@n$ehYB0+KvVFjn$S@pX@mFjGfQAtR9(oW8!BM&rEz~VsWB15uPwk5EH_QfmQ#r>cv%0 zth#sf_EjHW)mU{!&nq@+A7A+W_{mZE_~YZB9=~b4@?OW-*muXiH1^4{4})9GGj{RV zuCXa_i@iMht_KpbT{RLNF^^Cqn?{C)|MVVT*cHS2VQhHguwdx-LnntG z8#+4l(V^mye@HQO_R!4WTZ5+tpW8KfV(^Z^4-KXU9fSJ^w-1gFygBgFz}E*J9JqDh zs)5LWX@DHqG%&vqrI6o*nOH>UZah< zSWBKd6!BqrM7E%H`s-1uVTxTm%Kjh}Hpc+sGN6yqE|)_p=OXacp-@OcwqiuiE~blh zTUyB4+SDO8r1v|WPz+d6puIVA@a*oh9O$-S!lEeUlTNQk6CQq=Bhz_}ujQ7y#ihC; zm|DP%+@GZ(mZR=d;RSs;P?yHHutp)lZUKx~|#=z?7vQU+bBrPY$0tpjNLh3@w zAEz`;>H;=6UmehdRan6RP^fi+h=Yl9fcwM#MoU79^J%)CO)DS=bjLn+K>nJ0z{=S0Ehhc?ax+-b8!uF7sZe!Ak9`>K?Swcx0IZdnLh zutigFz-d)MXK)nBrCP<8 zRw_BV$8N#0ShCoSMH*}Jw&6CqZME@3MI$<^;K~jtbOsSS#DyB(q zx}RXb%2QQ9dcVie&_IHVPX@r5O!oz~CvT#$l0qi4+p%g&Ma^yH_@pB#qLITYjjCKi zSg@U}{Y>o%m$QyWz;A0svY0~Z*ur%WB$b#eYqJOCp+rbW7`a*YSQ0w2B?%hJ=D6K& zju|W5a11$B2~#XcF;Go5Ke2Ng$A^sRahIuXOzHzRIvE$g#P!Ejc@0hLEJaBDD@pOy zYI}Fmpz-@c z8`K;hv&=}S0~Nh3X%k!1_}Xbmr@!f<0967eb~_vFu&AtAyop<)Gi}wg(%e zMAV~;i&)$g&$|MaT+SVvb+GK6&3HAOpzZX6&ZlXTp|i4Ve`f`%A%;p$2ktAyiCB2U zJlDUdX}EG2B{zkFGBTyPhU@MKXb2onIKU59bIW80{>9O?axc-81<0_4B7H<`uE@~| zS%CzE;ZRar(3SLZa)@>DsvY$LoL(uq8CI7qMJ;Ll9{U4F-DoGIa)m(^H|uddK6Qwr zXE1Q>*K85FBI5*$jFok-sU7KZge1*jjJ9}+Qa7>#DJYR0mTu`a}eei%&GDLsSJ0X=DL%XC|NdCefpT!AvMQ^Ut{Uke5Q`u zG&MK8<(gCm+pxDs$0Aro>dnQ-WK`jnUUc^Q1;+89wpx{?h`A(jl$0pDy7)WTQ#8BC-4MWulR_NOb7XQ zoQRkkg)*TDIa*F{%9)m?)EpzTC1-@2G||iv@n}31+g4`(uvwFmkS%LEku8_yB{|_d z#E#P}$>{ASJc+6O(U5W>c*#e&{t{mk5^@7+N}KlNrR3Qbw!bNy4I3);T+463i)nnG z+leMWl_cF2r=jI5hts*#-p5%sCZEGjq%$GfP)vGVndk*`92-X}i5|zM~0+GPH`Gq zMh_+-?XtW$Y*G@0-pchaC=*zqMkgspI!@;nGR7Zs4Y_Kas27k73 zZ49gA>1IOf5XUcK0|(RwS0GGE^f7Q<)%=ANwuN=}sSU|-jcVa;?@svbO({e>~R?sq;*M~I5D^o;TkAg z6_ZrGNwJL5;k4ZN9LrzVbhWUEHYv}>J)xFt{(82%u2L@&>14@3X549e48z%kN3{<8 z+oZh|^u^10ha@w5jOz}iR4{41=BgIc9(YOY=gtWoc@Bi@dP0~pX$(S)O;9IiqS43t zl6`&2Ny9{Y{HJ4EM`A;t8~AJgMF=txt$;q=W{TvnChQ{B47G@eKU|^7VoO_1Bg4gD zbm5WFiMzf8rpuq*ISBU4>DkUx7Ymi(b|KqLaTM0#B6dP@D<-A$MR&60Q@NAqgHm9` zBLkGXZT@&i+B01KQU-<_vVATXZdhXyUy-7`SUA6W85JG8`wzQ1uTS*v6rk5J;Z`t4 zF%?kQ-zVcrnTx0>gN>*O&&g{s^m_t^!6QQ)H`FdVJhXWbX~~}HCrNcpX6FDe)~cJr z(w;iui4??AS*&g_V(45Pc=5=n9o|3R`7kc*=L}n)Bf5qyrbrVzHIQ>{t`m`@LkysZ z9+d(|8|A=%Y z$1enP6rYR^{%Lal`0p<4&GY2NT|T>)_%u^ld5JJ;Q&Br%k_H?R^uzryCLS3bJRdx5 zQ^Jv9wDlu1Z?ncW*M(gJ<*p?Ir6ggB;eNX_5l@2Ky(&Y;C@{7yr=kX2Hxtwq%Xxts%`Tjds_k{E_VaVNn6-q#GPU~WO0eD z;YG_2Y+77H=iSCkR_Z9nQ2hXmflo#!TlB8Z$pcHa z&c7>!TZCAf7(I`(=}NWHLQxXerdt}P)K*7?5@u{Ukturu4u@y=4Wh%!o;-X})ireD zONLIDHI$9w1X*JlmV!Zy*cj65njJ^s)h)S`Qm{z(ITm!yrscd?RgBC;_XW-j}% zER8F2IM;h*tO(D^R<1FdV$S4|q}Cko};!9H`(yand8!St5iTM{$dA=gb-8 z&RrJp#9WB)CjlDJACIJrG2BG^D`M4Nm8#^EX&o}fMWCh5Um9gA&~(y-wkTGq#nMVa z5=DPf33pEO$$*pxIPjJ$$3~Dv-5X|BBiww%CcJvR0_>o49m>fvfNW611QJWLfegCE zCY)clVq53nmrt{1)X{BM_6(SiCYuC+Z_KJQi_I;7;!3di02zRVsxfOxk6H=ik^9NYFC1X<^+L5`g0Ykc!sd58mYuu~@ z_;jd$Ye~gPC?W%yJOH15sZY2A(0f;CMeUf6!>mJR2ZXC;U2e>h0?gwSm{D;J7>c2G zEmVy_#sJLpij54E9ydWqc$pCJic<`FdjLvWK%pG~4~8V7WWWm`!s5$?>vm9LjC_v| zbEVFZhxvgen7Ye_<4npk)RTo=S_Y5MYX^is2Gbs_`@nJM+Lc;62VeWZEl`nZpK#Uw z?R`VH4SZu#H}P@7pT~dJw|#8ONTla@J!EPFe3 z4c5tQ0&44E==Ux71|AtH>Th=w8b{FQt`Sb4Z+HH503Eqf_ytzOq_65Kyo-S=tMF{5 zXgWr^OkuYwYz`*85p>^Gz?DZvg3sIsNj*1yU=)p9-BSa*uIV0s7cL!t(N@5(Q28t= z8SU|yDiRdV0V^IA3EbFj^wnHX1^*^5+{|2{_QQ}^1)3H&vl`rPmMh9hwKgA=qZ47^ z!y}{MO*igBt0KaGv0o;R!k1BPIj~_b2ogi6R3@Cb+7CXfV8|FpZw7%4kBm+!{PP`S zXz7G1g@v0H?0LMiZ&EXH;}9Buao}5H!jUu+CD0SmzCMTz(8H&*0+tD4T3V~Or|M0I z8UW$YGj|HtqOD2C%;fSW#*GgNUnARuooka0rei8`({^Lt}ky(D9HxlNJhck|y(|l^@o}14(AP`{aoSdU81%M#W zNrAGIY`8G9Nv#Rz!j#VxM~=7yz*3i!(W#%Wnm_*f>9e^j=gEYF2_sM~vC-M=*(4sd zwL<=cA|6dfk*ok8#3LgGIu2J(@~cDWNTKIT?G(FvMFG6ny%KiU2n|WQ3%X3gQ8Y^= z=+8yq#UmqZ$B)6A3Poj+t<<}&l*+(M+CBihF4%YhT)?uLQkEc-H2`L_5Fwn3q0lvO z0Xu`-x&0c50g&MPU3yC>T&NQhutHz)JL(Y(Q;_zuxT?|xFqYS4w}B^}*M^?i_Teth`4BoB z4Gf}}U)(;`dHgmZMDDmS1z=s%$}(k2C#5AKjzkD%l}AQ`c>#>(i7j)Tk0Tg}$kaB% zH?d(4KCMzIAx&9{TId{XrK?ZAOYMaA8M`6D;(Sl7Ay4xvLZowu87bzB zEUn4VlWounJTf{xdh0y8`0IO|X!VzOe2&$r7u+J;EMGlzYu`wp5J0X6o)x@4akx)7 zLXM3L-3nxQK)d1Zu&M(u`($a%)H2aTB}Xd*5p?XcunIgfY}f3UCKY1L2XyBl=wmtA6tXM}J z`FI4EM;oPDD-bteQS^iR;ljZuqqgq#bJ14?(V33=GmKXmP-oH|jb>$8tmTP8 z;_ju#;PSDYik>;WcK-O6j`iM^KfkZ5z3ea~R(tu4F>48rS7W(Sv`AU(5%iy*h9U9D zPz=Dj3r*kKKZO48(>?9Ai(t5~)yVLU4!(AA|2+PKIh(AKZnmcq}}K8jtk`eCOj`b?XCG z?B&T`sEJ)zC8I2-lu9$9!qEphFdQD4Et$fE6r;yGy^F=KzudLVFwpVruyQr4iNab= zI#INzGX_0sKLO%#1{Kr|gO)%Iq1T`2jcev97#G#P40y4Z6i?GrijWPX77L_&1s#?~ zKYkp>#UrDGzH@dR7k{OBiCdrU~^rNEEXgz%15X)#k$Z&T$Q;Zi_` z%ufM79vNY;fQ1EA`yeXJf@b^bQ^KzZW>fK|-{r|bR0?VKLRq@3B@s|(5~%$&gxIXu z$e@aM15&Pq2!v-L=EI`%q^)WwZ3*!n4D1Ym0#Rm{A4dnDWkO?CY()nje}aqoVBSu{ z+pq6mdd<1CNeD)PXdg@3@1g-yTnmLy09d>Fbr=%V`aH803|gzZPp4}I+XTHACg8we zkQLUg3FFBa3I(!kldDHNQGC(abs8wqGHgHbiX- zJ@nAP-}`s>xfxAy0RYgn(;%_z85#{agIOZ)CW1b@CNB4-(2jZYkF%Q{p;<`8#D7r$~Ft|*GV2BQ(iJ!sW&n+h-#dAt{R>^BaDE%`bXaBqL=Upw60A8$?QLDp_ zCXp#XkVn*4wJBxjCoh6(;FH-1=1sj@q);iYgK~@jd*B~hTM`NOXuucp;(5D}GlM&(bHyv`e83-M=tcS{{ z(UFiNl~FaDY8Nd-kG=*|yqpTf(;k^e-2&jd|3~N*%!nbiGD@UkaXJj3=Lt(3ef$q# zfa8;q{jnW;(B`q->pOx!GM7fO4WLV$h?vW?-HXM*eH4{vO7@Hl9r!JLA&-n^(!%b8 zWDr^3x_$(G`nSTrviG~Eeh0!rwM+0N>>a^@lb&q4LPI*K)1FKvk@IC{36@i#_{Pv4 z^w7(_1M)|wVB*PkacNjho8FhlP0G3&kTvU82-LmqRoDi6G82nGk6wPY$7krb!fisp zE#%}u6*O9!q(M_^s9c_gJ&{0f{|*MjBcoGCQ@aqvF%Kf&?|Y)#daWx801??Ucf069 zf=HGndB3sQ@I^x?{3piT%_n#6_!F4B;dWil8vT)0tx|6VOs=HQ=?_^oVpA)cHij=c zBxwUQA~$1Y6Rl8@bxAo~h(}FiB#CBz1Eb`T(TS7o?yYJN<$u$&d@Q~Kqa@k@K*?S6 z3|KYNB(z>vLaBxZnz9o7JI|3k=9s)2xrq(S4b9z#gL!k| z?W>pcO42Wr6q>Q5G~g?^BT))T{tQCDoQh`X=jV_7@u@*{%b$B|^T?ZBJ$Dr_l6GAY zzF^oKvXJ6NwMARyQWEk^gll(^I4%*tH%p1%Z95!kWmJ4iDD3DyVVD%4v)&PIMCZQK zU3tLJ;ns(U(A(TaJB^>Q)juP&BMzx4pOI)yg_sPtKvh|IIA8e=Ja&04ox9(G*}4GVuhz=a5=|Pf;8_O&2aHFx zH%!K3PNk{NSmOcytf%W$^>7&1$_@HPT;CtSNxc#U83cRJuo6u>`#(89W;HqIX z{=dDmBcOU~b#+@BRCIxsN0M{O=s-zVqiLQJDq*A(^40U231A8OdIf(AOV<+cm zd;4^EeQK~iEH9|A(D0<>E)!*`7Yq6XdgD!C#iOEw&yVauroZ%LJO5YV7Aw`R!iZSy zp3ONj6wxU8!WBc)6!KD6ZZB7YrAj54jc(t+RU#G3<>$-AQt5k2*{GKP2p!$3-Gyxb zxN-=6?Qgw5^#A@Y+`NIcf85_UvTevRa1}Vw4v+t0^nV5SGxm?e@TjmYGFfr#GgS^Q zx*B0A=VEc6g_J-T`{;;heu_s%+kW>)(3z%9bDb+kL~1b8E%w2Tu-hk0r!a3c-wI@7 z0NE@Kqc4n$pcwEnDw=uV!;sr|xofbqdX>n}7)};o3@ih=JC9XKOVyN;xLZ-D5%%Ax zXnvYchD?DSyV1V4;ND^z6G6c_d;1#T!FmBrkygQnd8Ea3CZz~@14%>-!6=rK(G_kI z40Rv9Xbio4aQk%U*pNso*c4o368hMveq53WONnAKOzYyxv{e^FhbCYsd@?$n7&dhV zSBrFDwpe6x`Pd{8nW_k7=G_Kyx?Z4a28=?9Nzwew8RX90lcKKK!XL5Y1xtvA0*MK^ zw377rlS#ZGt?9jS*b<8j3>PbQ<(x$lgD^L_rK+R?Ei!?g6~MswWOVS@)LWx@xG*z+7YX+M%ja1VhbIYmd;KQ4D0R~oa5ZyD~ zTb8fQz_L(_Ova$RtM#jnXt{(1GhwH^=5Lr3AvClR1m_HLXa7c!IXICcjZC~;P1$P6 z61ey>!9d30j(Y55zzip{ba4VWvzKtc!!5QDvJeF+-a2DFNTSEqz{m2);4XT89_coU z)}TA-*AJlRTG2zC(Q6$Hl~`obky-1DHE8j-h*;I2ta-9V3QBkXYX%td$ZXYa-&rEg zA93{>5oF>lG6~77Ko^t2Sh=1o_@k|)R|$_;SXS^LEu*3nS`fp-ADtOQe-!oRZhCW9 zq?zPkmXodt0i#&fT+&LESx4B7q53))5RZ&bX+JlA{DpNQ&NTkN>qVQ7h((PJ0IS!s zy6hOdTH(R(NWse*(0lC-bPyNKqT^!G>h&vkK}FHq-ACd_1slv+$TERk5h!Hcuw((s z6fg?Au2NtE&)^kXS8|oYbAP<|v<_soX?V6a{a!m1eFX=s%MAae8>mVG&y`yt?c{tm z?PO&8^r|SAG$FA?&EOh(GJ&iC;1mG%HYO1H!H=4bCEhrY;tNwZIF`XmCVBE>!~RvH=LDAp`z$C|7o|2&^hAwK7(fZZ1_(u(2Cd zwVw%9fsm?!m&Z1bMEh3{J=C|KxoB>Mi{>Je?8qK;QZp0>Anblfy=?hQ4Q&{mrvpjl zk-4NWhRiA{=Xaecj5t`X>%cLixJNF2c?5(9}W7h-wa%Y*y4KN z!eXO_f?yYPwXl9DvaW+y?Z)e9;qO^uQCMR8CKatPd^BMF{g=ps# zkBm;vJT;H9O?Wt7suXc)hF7V&I+Dp~XLTe=H=1cIO=OMspiWhF66nh+7#5F=PQ3*PlUVpBopuM6(_Gf6DOOn7$ljVb|p_c6^aZ0c9n|Yc()9Im%+nl5y0{ zHVpmI3G2)!qnVEm!Rh1btxd`ee9VhX3TUy5wJD{2b^^Dm=v<*Dv(_tV^ilxkfJcU{ zeLXw|{=9z(edl5Dh?p-G^^!^}mjOq~;wIq83XYbpYH2)D!Ocmh*%Ee9Xp0{>^2iAL z+m_wOTmIgmaZjMTI7}8OyExIXz8=N$7#22E6IDVkM-eZ4AfF7O5Q?+Wv)-P-yyAn? zkXjVN)?$YfPs%B46F14Aa)Ym=m7@FHutAqoA=5m&yCd){ebgSWXq%8p5odj27G(r%3n3%R)-!>7QkmF zU1YMx**iqspA0}{CMfvRRGYPgDSFu8w%s*}Yl+r5&cry2zxDSG((| zu*fqBTucQNDMwuwE)Zyg0~qniNO0XW;GF*Tyt(5yI(l<|!nq{O3#=jP$77q|;`!jf zpZn!~3yd&F8RfvlSF)2Tl{HlfQf(I-Wjd`c5s{;T2qQJi$*8T`0WP>h!-MF9k)Fmn z6orvfi|@u)Iy~Bn4RhLaVqGx_h2}9thkzH4j1)hCau0>Sz?{ zm!StUu(Qj#5-x|J9(NSR%OfMf@mt`Seek|Pv?12}XS^e*~)-`pE#>@etp)lmK zQgmgU`S#^x*e{}a^kTesNB(<4)O)<|VJ;NW@q?px4L>T_GawlJMF-@28XoWN#eMK+ zuIz@s$})C1{cO^Jrs}XJ%}@qGd^6mA{#X%BPV?JfqPJbx(N#r&6Yp7M;xn)A@+fDc z)es5qm|D&eQr1W~_DXQ<@yHN2{6RQg+Bsn-UluWCUKSxrltTozr0p)apXfm^dveCA zjzER~0Ezf|O*B2lYePq`T7a0aiF@ZdJL)2+hazs;6h$nnOUcDWiPL6Gq8l2Z5%^@( z{^vd@z1$Q*QRG}mlLot>Um+3KJSlOAM1>aogil7>zVUlg=X6U1)tWOpB7s9m#em-o zAf!QK1i7z*pYX}(=-geV&X2DGtAOZ(i+e#kv(=%+-WDB|DDn;~<=|Kk#hpQ{Tqr;lIC<6sfXT`t{G3N-u#)GG-&yRbyQfR=KDky@ zn&GVkEYP8A;paSZcY(Mv$=MHyE}MmTO~}ZH>J|_q>4Nlmmj+{AHt6LKiNIsELL)k@ zrJL10Z&BF=hc8+#2i>*iz|1`#5&72w zJ}$tvTXlhq8S402To&*cqLYnZuR%Zlh-lr)&Fw!F|82RE)1MI?*^#+^8eS*e@KURq zZUwwB7E+@;f&MQ;|Ijf;b&!lAv13e2-&t#jdPl@}UhwO#vFcSu{Nhub-sFrOg2BZPEg` z4}eC1K?M>9yu%;o(c9%=qKmLE2GDU ze>yZgKnOZB55)~2&Xz?ckdU>WcuTq(K;Y$z`8as!RWc0fHo(;8Zh^Ch--g;dX5eh) zuzuEep1*~$p;#B0NK*Dmq>*Hx%6hq=HWVL=BroiS!W5(H&!6=z5Dr8`A4lgpdXHYYKUel3_4cGiAEbU+}Y7b)Np?dnw8 zoH697STU$c)eUJs6!E$phOwLq=G%+skF1)V>!|M#T>@c;i%dEJYn09V3Nnf;)Z$j9 zC6d;;$nG$<;$i~o&b})mDqcUh|Ju9gShJlRVl12fMI4m$KzB@Delc5gbsN+OkBp8w zzpx7xUKP!CPPau+i_5!6Ea`bl?D3TVL0F@)lRifQf>^L`z{>mXh8G~Ojg4gKR{nVO zZjr59zse`N9ORnpalIc<@<=-kK;|xeSsOu5-3LSCki79;*F7LQ zvdMHkSUtEBRXow?iH-Te_Ys?3{fp1Tq?lc99Dtjk=0&<;Y1!*$T>ugoz$3&+-Y&7E z3#z$wdo>vWugUh6dowsO5UqV3o_L=T!~8&vAkpa5$k>o%ASSp4yoT-3UyOI!SM9qB zw4Zg63BPAGjFFawtE5$KgMb&@;fEm4uJ#K&0w2R`V}m^Jd2@aQ9XPgeP3N&kz@W0p zw0I#fW3^4#>2BHaY8=aHTDC$&!W8ckt=$SR`1rDtYrKBwq#d5i50xRdf8SRaM~HRt z-PnEznAFLMj9#w~M2kjcHOda~ybcVI*M@?}OkLA`{ZP&{a76tsF#|hebQj*x^Xw zP9Es|`eF7`3DL#erINQ@U>CtYSa}zrH}1M-s?+}@!vbGqQUus^p{CLnHbQ27%`3AS zDtWOSC7u%ff5N^yPO_rfe|mE4nb{nsdv;+1AYk9n2}zyf?HsR!?e5z-=b$pKfUcs* z?#LD@4_OcuBdb6QC=#AxdMF?wC@3N-!b4Vn1Rn~&bGv%OTxRtTKFjA+O?BO>Q|Hz_ z;rrb&{|<3?t}W4v&LhZkVkTL>qGi;zmRU)A<7~X-0A6!v9B||yJL3RfCxAb0BI#U( zqFN!FRj+hJz2!8&QoxF`QVhWOBID#_ zanL*{8{9IU8TX8z1DH8eLl2GpeelV#-;8~K?CWC($1WQV@H7&WcZ$B#qmmdOJu>>_ z=>5ZYjNUplHu;g!{iE&C=%{s+5?wmFFgiT)($F&_zZm(>$mfR(Lr(DaEREDgE}DF6 zL_c!Y$ok=bi5j98C;vFBd}Q{X+0V~@e6}`w(X4*<%-Qwgw}!>yKZ<`g`)44U_=U(Q z{8J#lc!C7PJBj>qvN@mpU&JqbN$Q}GdW=BIB#a>%*^zw z(@#(Tpa-u}aRfbt%Gi?gj)gjFLt}k*LUsh39cML4xUPJ>8Ts!+8e=x+vfM;DT#obd7 z&!QZ@dPrq$SC$eL%JM_}s})b!3P>uIER#~`sGJ28)9Q;Qo2@L*%NhxvN|#q!_TXWf zN{x#ucr03nJCuRiW=FCIZ>xtCDYHu(ZWm;7Io-0X$GzirzYF-mZN;LE)3Qq9bUT(W z#SQi%S@f2fu*dFJnlkTsY48<1oo1p|S9_f)S*VkUwId@vz;m6x8Rc?x#iNe|El^BO z$84YM&&OxBl2$6{>f{t=uO%zTBog{2qqYN=Ks;*JL5$u@?84C0`lgLdxEo7=kQ?mC zqs{c_2xcSECkomMQEF!l0IU>JyQ~OLr>!Nm{&X&@H@h8GGGpy;Vp`6Tq}gAzwKCa` zf{K~?s3t8%(oe85LPN^xoWY!S?C(z#5EH1N#$l__$*`STq9^A%;J7}g&*NS9TRg9+3 zdt(^)Z>IpcpdHn>^5EjAxnpblkPYonKppgD9X=Nzfzb5W!?=5@Kq$zhZz+?>sbqy5 zWcj=sb0X;5rM%WE16T;XFW@#4Yx)q-UIPMbz|*>x&VAi2Rpt@&pw7pf z)na1%m-_MqfOY`bQ-%Xx3pS;cU(uJxOGP^FE44#Wf4t2S!{5O292b<+fl@i0_8Dvq zKyg}&<=L{FA&aEV9ASYKRFPc!K3=}0(`OSY01uC3%Wg-&=E$Wb|Lp$(8=~okmrc|G z#wXW`EcQVjvaX1h-d2)opg(2z3GUa zN*1i9Q=h=%bjgz@HA_vUUta{=N%giqR7aZgLohrVu%w$ZZ`>spuj%)Xm~*tN;?1kf zA*;4D*@r7h!-bEOM;XH2qJ5QWbhr<(k+vI6q^jgGTY}+w#GBbz!B3ScWjmCSrR9!< z-bO{1a__G78?s&t5zY7;vS<|G3KH@@v_y(+s%U>cSc=mzWx1)I8o~2P**dLy)oC}T z#h13VUFR+g>$hJ#U(^L<>8L`DvFwxh1Mie`YDQ;YjZ4vCN|F9R5(vPRKJ z$x_M(@MIERwoK>jF`ZnMYWt1gTtpD`q#kJh5_;MQa#+Q!PzU6F`HG(^FdXHrr-6g zzC2p>Qw>&=Om~(zLz$z`?(b5=5N=TRI_)(DI77pw5cgjc4J{QU)ta^}R1PK8mH4JV z_Xh&50K!OTWS)=@Sl*SV_I0=c#5+`);kc|OR;c=-#O=6$9q8oAlqwfz>2^hQv^cv@wR_WvLnivZD%%3z|>S$jZnUjMybXPaq)P2_c1dqi2T5o`LE zyw3OtA{lnY+z6@XPw7?&@pyolqnK)n>>*U!=~mg z=*xA$S>X)OnFPnwDGjx)Z`9(7fSS}Ll0|o>p_bW`z7OF3X@x0CSb=1Ob7?Ikyxf`o z?>eJOwXGHhE~!q=M_X+i?w^d;2mrFl>2gMw+iRiSAH(u0TW^s}hPAMP2BWPdT^C|` z$&kp90fK3I^B!%WlymlfH=neo=vI`4Bc8XZ>q^J(2L?p9@mXnK6`}hMB}SGE1Y@nH zxMZZ6C48AuYI1LHL<3<>H;7!;mZ^1$c1=Dqhe4)5PDSZ7nK0;;kdqqZjHmSb8!9@& z-N;2ac^NRlQVw-rt|c|JFO#x1wK@yHgL#L0Pi`QT{-8@mEm@s5S;Wt(cb?Pludrr_ z0GoiTmb=gZ6_~_hDs>wcxShe5- zLZ+hKRt^*+DqCWR#F|v~wxhX-GE>%PGh92pfEj)CRjm#fu=E8x=Z@=1PWnc_w>qVy zyf&3*$)gIibWX{uSYFYoQgO36;P-i(@ltO3?|7CKZOBVRsyZX&PbPqf_Vl0N?&U_j z>Mv;2Zf!ATiPM`f5s$uHwnVJD8o1jdY%rDD@_9T;xzs9Cjz+?+a@I@fM06Ss{SuGz zS5AfuL@ph#Xjx5LLn`Q_f56%q(qQ#_ycJumNT+tcw?B~I?;xWcw~DOW!kSt_)W1)b zZS6D>vDNj)ay#zqD7O9pPqS3E+nq(3tCqB8;+$&z7{30O;&R55EYsz*LurcTXTII< z?X}tzakiN1UA)%1R0A-Oyosd^g%NCK*Au-LN>@ed(wC1f2)? zYG>@M;o=?6Oj@FzOs-uiDlIuY!SDSToXf&C$Vq>sj}IgL3Gd5r9XMVGUQ>qBdO9Fa znyc-gUSCP`18tBhRVSuo3p=4_&#ZwvRy4Myd+)}DO2J9Dc30n18+~-)qIuy$#L&+kU1fc`qMHlgAinDt5c2W`vTPob z_w)<^aq#(NP(%j*kIsA?LSCyiBGK|!faYBJxh?4M<0p0MPW*D=;DUAEspIe7w;i$= z*6S*&W;IMX>>cN^Er>Usqzex!WI<>C`lMdnD}N21ZGmDPRXY1`-l=q5P&yC50r6z-(r0*2t_e7% zJ6y)W6Vdy?#q9$~nvTES)7zcENhp(%$3q*d_C~U&+n@aRKHSkYnSt?pz<*m9{q2Z& z^5D>WL>WGE?t#o*=71X_G&qRGWm^eCrYRaU$xzyW{WFHAMZTm>pY z>5OtY=doww=x=`n=crL2MtgTp>_UG%vbeq*`O^ZFJB1D~U;;!vvni|7W*wz)nmB(e z?^i~%=x2X}u=~57hp@Y#4YI=??1%3^_B><&ECdf&fteYPv+^Lq@jU0b)sH8R3w`Z5 zhzl+F4mkM%dRaY&a3bR(XeO5^bO6uUxlRJ)mqX12M(QvZoFt} z2fFRmlb-a6*A@LLP%O+R??UM@ zM7JPHFAL{AdGw|KNcmM{vZMWnaY4qhu$&Oip7+@$NpRn{qU<~cq zxN~iHVM^i<%_W0+kJ@jCvN4<0SnhWG4Scb8R|d-bdw0i5r}&8$SMg+Mj4at1ahy1A7WRE(e{tr*)Ju(f2{;=-|ho@ zUvt{)Z+=+s><3;mN!n<#7qhwyZvV~8w-i0oG9je9(8zpwpyoaf` zJEV;+>I|KhE9X+-oAYlsN#^H-ZHP$HeNdD0HpBBlvI%?afFzAE6F~+lY)#=Q0W~i_ z4&>~vkRr`T9)$#$^zI(M%ck!03%p{64*+~dKQBY@cEE2AfS6kOLg~FU&^3qG&!G!$ zy=kob+4XQ(w|Wj-0_B)Xy|<^pAY)@2l1hN;NMOJ3zwX)dyWf^d%&_Ik13dT!&hqto zWB?T&iYrSNl_OArne;v>zBCVG2-^7RV4xBNKqd3&8!!0IK^Lx(+=kzt8`esWCNjnb z#=ik@v&G4)MxPp)7*dL2-R-3@NGx$3NW(AVd>30g)$GuE4>u=X<3X zJ@PDXY|fQ#?cRDS-i*|-%_ys40RTHH#Y{Rmfd0~GVkd0IN-5g@DL{8UUjFyKo&51) z4kV9hy9w zpgU#h2(Vav>_p##xlw>e`#-Sm<{ncpd|wgNSvCfX~5 z(?UQ_`HEZsK|h|XsF$#_wd>g}fdKfP13W|l&RcY}Y+RCPrOZT>*4r#p4qbXC7(JmF z9s2Th_U`Y_lz2q*{<4|NQ}K|xqb21`x{9ZPf@j0QTG@s~)C>V!d^gN>yJt)In;3Z@ z2K#|CU}cOY5!M8BfcFo~4T)^;>@U&;Nvcl#reE0&5RJxnB7n8nh(7ngY3HC_r%1km zHR{b%Bv7p-Da{KWA1@Q+?XO(D-m3J!CbOjEy#QtD$+9K`6bPjNoRg8Ua8Yt({4Mk| zS^|7NCnAEZ-W7?IQyaQC@$QSXWNwpFA11>cAaK${xY7q{eL(Ew0H{uW#2xEbZN2kV z)q#FC;Ef8&)FwbEX+c?5(*dX=a4(Pn%p@S6SeocTg#_SXR&DL>-=~5Cud7s&H5=gz zitRzKxa9zGLa_Q6RC&2+bh}EjbL}dPDDrsmwBtE{^BX%rL6mXJ0d)oVs4S43X_1FB zo^((1(09&}%&%Rg$HD0o#V0~Rb@_WFCrbjl@;#E9PNqxtb63};?zY|QKO{oZ^CfVH z3<47saN)8+D-c})pe7ma<^J@hwu_R{D*6Q1%j&(+k%Nx^lskIu!IETR_N?jfX02OLPD7?RBbXP|2y0dmQE9q_{7 z6EJxs2z(pT>Dh9bH)5zymN0nqR{O z?p-Lr4f3xH9w!ICGOWPvktAd(8Td^KOvRu?O*<@tK#aEkNwu>Jb?bXXTX~cmybH3d ztHlx(XNrZi?o_2iB2EWSFBAiD>Ee0a$93?k>6g@-cnqJbC%-)YgVAS2rr|e-w(+X+ zZrC6H0Um7tXXUeYw=O`o+?KkPZEHh*IeN?oQxk~!1l&FXirz2jeUi72eUf|YLA$q> zYXTH?#j0`0(N_boJS(MW`>Fdc=q?5&VbQ!M$EkIM(yL@M_KsQB%Ak*i;E9A{}+NQsY^X{U>n)$*VMiHy#WMnx9>L@35t?XR$K7hc$Npboo_3*~`tI?@8}I%|Q; z#njC-@?8YaD3Ibme*7W{WbKC()(Sy|@`_@?9*t8RfzG)EF3$ony78%ZGu^u{kwEq; zB+>JrGC1K%X|B?76YcT^tA=uh&Z4jzR%E3V5y5kg*MIfzy-#^0eC1aKwg+FKV_d;) zAY6`iIh&6;%%KR{;DxCR#AyEcD|U5DUJ2AP^_-o^CxMKu@uvqmB6d`CkLYI6RifHZ za>zNv=RJ)LzB2eEcHi5(NudQ5*DrNUlUN04{v0BAC9P13XtfmgB%evKCSDy3g zv*Xv`{>?J*s5|t)|E>10Ryn!uWh`$bEDoydViu67F_hf#nbESy&nI!+Pyu%=*@ai_IE9Zd6}zB zw5#Dt*hnQTF>({0Ov*w<38Jbin;rU0)4^>xjOEE>xJCIAZlAZL4j9_$e#AYTsA!CY zBB<1=b*4n!5}m{p>i8Yy){+Pdb3-8 zg5|{o?W9(or|L;#>rr9_h{d@bAifmY7Umkh?8PCQ&0c z;S2+olvz>~E9(?W`CKqYsfPN$D{}@zL`>!{yNa2B)lO|W()-=0fpB;UYZ>VD3|u~7 zifr!i@+Dn_)R+=P+)%euetjdVh;P>8-}QLS7QIPLstgKX7F2H@81FqUt5PJnaHk4v zA2w}8yXLLl@DYtSO9NMnKIc_stg)DU6IMdjMs@NO)d|KLa(LTjQ=4$SIFd;fl(e5- z@~f%|Ws$L~H{q{e2FkNr-v-kc>`rqrU*xJ+KuPQ7#J&Is3#&hLtR!cEhVOK;!ecM zX9lo3SxgV~hzd(wdO) z5*-R8G)9$=E+_n>UEE!fuqA18NZ;^UT*ag-JB@R!BJxHQNFmkbSS%#Bxn;5Gui#&$ zVp^LX5>fMoma|k!j(!9WLwRduinb>#_QH~?1yqHz1a6QSbWx&}$tQdvvYxX<=CDPI z$mnF7YRb(3R~l&+t;)G0z46&r-U%duL=y;d{6sP{@J4SKwnY|-q|WQnS5+pfH%X3u z5zCw2dXv<|QZY@-Urkt)Lpq#Z#MZ;n7!~tdlMP#ljAyempT>VstB1lw$m^{ufbdH% zOH7~FGYxDFiZw_>-eUBY5?-A=hm%CuVl!+cN;KWZv77731C{@QEd-WO$gAGf|_tmc^xw zag5s)oo-`!vfffr-gKhnQAdGwE-{N$kWJPy6jd;{QlW&rY0Rp}Uc&todL;nrmdczb z$}F*5N;#{>zso^hiq`J1RFk20Rz*+baDR@@*(kM7YxY8@oYWFy{nd%pT)+|NwOee4 zu*vPt4dWyPHe#lX9dNkH0Z^Fos;6-R3kz&tF~S?-d=;&`m1B|{zX!vE{bj?taD^~= z;8a8{w4$7u{~`Wezb{%RxRfQOP)5w0m7ANza<{w#cn1+ULUME47>tfwgynXP-bmL- zMZ;rdl4>tGq{NS9C!+p_ylGK7D;2r*CO$hIK`@HIAi;e!JMLv9|j zmKj2O4$O=!MIvpZpYSItwR}Qv$|V(&-}QzJH#GHjN@2|@<&4$RiA(OsLx!_lfpA5_ zHkZq)Xcgp=J9_eP)fn~?GGnRY@`Rj?PE3NcmRL(7B&U37Camaaa@t^g;zRgJ%#0Qw zzza*Eh+LufCfeN8I^1A_JZFlv(UE$ptuWSvXbQFnv$13drL+maHD8OPU&(gz3mweH)5qDac79+Ywh=k(lTkb$wZ1q{?7!QuVmpy5vc1!Y32H zs}&ZCE(C3I)^ECGBdv0o~7~PsO;AH~Vr0mn9nD=S@`1b`_PL7{GFE zB1cmlLYGixbm4$TF&oBmb)6y!#^;qa^ePish;86?n^z7Mt1*+sTrJ@>C$)AiI*89& z)X18F5-ZU116gM&N9Ts|l17bW3@#%ESJYw*Fol$AJx+^{YV~PK#To*T_6#JT$~8Cj zemANpaS6g4Z?T1SNF6m3@kSXU%avVMJ-@ToWQXQj~^2t-Vgn{lb z@_Br@h*C|BmtwWrTF63FIT<&o?Tr)ZBvV;ZStA%OXR?_R@^ydg4HN08^i_kURWq7& znHU)#@4uDW=Ae~gQ}~U9_}5roEJv&)o6@=y zz}?|(sL$d<{5J+9OEow7h9v1S4PK_TXJQ8l7wsTA9kJFOVqh~>G0KS#tO zL`4U9Mr~bk9X25m$XnxRgT(|WY5I1IjZQs^`)8aHD^UQQaCZV>zcDxR2`mo+02r0Z z>C`P{z^+b(Xc5-8NWg5AQ)#CoXVtl?Mww~~XKP1%YPw1R@`IsRh=g^%>b zSJp@=B}exsAfWlFJ>a`p*@WD68osehX8>(XCMt0)IQKy%|rTV!X%6iBJ`7N)UsiHZV%w)YwhFOMwN<3uO|74n z+tgr}(K$KzI2VYqR~4tUNDKT5z|%syHavYQ2SwK%KBft{QZ%}{AmKyM?`%b7`?=Sg z{K>C{GQ80>`2q2+k=@g_A?svm{I0PP-jb({gys`;J z>YCLH(TF? zKKOnZM$ptdXh=44>Xz;^?+4Eqz*PWNYd=Xuppu}eplch@doPpBuBxu6SA*QWOyU;J z4c-BH9K6-L1gzenk!e1U!?*x>98h)G&*KoPPEV=ISDZwtx<8j)3RxW14@=%VzfxU} zsnU->yt*p&4d#veB(78E_vzuh^T`$)9YISQXsvj}cmN6T1D%wc4nuSS&3y>;^56$0 zvl~|L!eh@X(0$`;*Q3$Bl9Qn~T(Vbk(`?1ttVO9r5P&DW9jz73en_(G9m2@aT|4^5 z?$ygBcJ$YM5h_4*mEeYti=(OUBXnJ|+>bgFuO}ONI|@*wI;6oz&oc_$mlT z2(*>XVNGT}eiBXYKmOv?lHdl`r_BIUSqIqZ;Z+26$Y9u+AmCO>)}qf{Em?cA4&|3# z15AxyuXX)9n|GmPTrA!#Do^KzASOTltC4M8*((>n7u?FOWgc4;d%P8Ng;o$u3s8g7 zVLb(TS`Sa~D3nL!afXfMS_P@Weh` z+F-H*gs_{|hQk%kVj0pQ08#DM5Kz3Yqr5=r_#+%?N!+ycu09oe@gp+?6|(G4a_ zR)e0b9=IcWE3$OGWNuE_hURZ=o!@=>dfr#BT;?HTaoF5t_f!~?Z3Z<_Aho4@$i58c zNgzdsZaeolMO5E4{qUzGi(CE6gU2)A-gz=NpzsZF7ZILW{&->&dFKs$0Q%yAfs1ke z?cg^d|Mmtzx;y+MBY&ea9KX@6+~VHuL*#U&w72oy3$5pZUCZ4haZ0@VAZfgB9fdm_ zLr>ha%EtF|a_{>*1YRNc2{32?ZU6ut0aXz$Oq!O%1Za_a9s|`g-6EOYc#$e6$YWms{T8(KwCiYg?w2GXFuY;N)$-&S(k*x7 z0knf>aU?CU>5`pba#w5QX)OLzeDS(%=A*U^KsSM9Ff0QDMgrC-e2D<52pL9S{4)H) z>Wz?}ylh2he&wWg?aHr!T@xy5Uy1Esg@hJiTldJporfXD`gORyu|WgP=HVTa31om? z18#3&iZKQ9y)&>=MF9rE2}BvI_6Fv&r!V-A_Km;O-2jknL#64`V4(zJ(2b#;Xq$5LmTsua8#(_nph@;~Vzo@fLr~R#!JJSj8f1Y) z`R~AuS|CP`eCEEMk=xXL`a9Uj@xYJR$VF_?n2s#Cv|dj;X14^CsPHYAg+L5!9%sKJ z==JjLa5E&AXW(Xt(=nP^NP6moV)0I9T9(TM&SmLEtQJ1$?d z&v*3vhcnhR;0i-30|O<-S@^nTGk{V>q08@sY>(AjQ91W=A8}>u{*zjPJ@yH%p(+p7a`p$t(S6jWbzRY;d?uk|nFrUz#wSEJ4 z8KJP3BYPbB<)z>7xriHJ9{6D#7EVpjvJkCP>9iH4jY9O}un__=+I#QQeE_X5J~d4y6?ToFMS4HX~H)2$T=I1V~nlqe)kzj*x;|u>tHy1 zb(XW?nwMYz`@`mpq}pIfVK}hoE5+!D`Mg~RKf8Hr_wmR02{FrSVFX;S5%M|19kO7} z6y+M54?ckKgueR}f3;ZIh9ZVJ9@q=W{C*9?EI5|ez%c#g&A3ULq#G%+QLtp}4s_{b z@a6R4uV56*$|f}blf-WH!7GP0b*)cA>Pa=c1Cn|Qgzp@w- zq0SM>^n5uHrTmmURI`UHv7D-&MCb^-K80d5zj+AgJ+^P@PW=tm3LbRZu?IC(IYo&` z<@5P?B2KEHEG_eQ7(yuK@AkdAK;Q=cJD(Y3Tjo)JaXnwSY_nDXvR{_)xoZu#8>wCe z>m!h&Lvx_dJ$B#Ezsje3*q3>{Ukr@YBne9v0B32^+ziG-nJjwWKVcR^G1@x@ESSIh zlWzn)b3G8azVuI+ip0Il!~Ej3EnC@C&QSJnFl%VCUS*L(U;IB9NGJx6*{i3cSGJFD z>Pp_^_ujS4WBg+6(UtO=0#q@W0rXm-ivWJ3^)1jIftbf{+=XsCRXu`So5weFzxNi* z1+b%*x57a9V0ai?mZW3Brk$z8+-BgY7=0ZE5{Oa6PxnxndazOJ(8~{AKHlB?y5t;w zqjd%JMdihswnV28!6cC0b=hr4cH8Ps z6&f3ZnFz(`{`rlkqql#&eIt;+NROGK^1vh-|8KDo{1(~KS4I|x9Q>Ot4ErBmK8ydt z?iH!!YN>RE(&m*^RGVQMDhhFHVbug;pfT&f=dl5d<`ZkBa2scq0baJhU^0u`%urm+ zR|qy6`C2A}mgivzff((r=X#|GTf1Xxq!;o-@F2JSHTO2lG-TFfWcql~!{*dz?M8mh z1!7dL?mVpv9FTmn;WCf2ix;YCN(1DOqG4%g6RlhbNb$N`q&sE>VxAPQx8NrhE}Xtq z3W?s%<#)kgSQqX2w2dVUK5rZHDbh92qYKwd*P%ByN#|z;ZM-t=LKnOshIhUwKGzLw zmI4hsk1UJlmB{LvInvfh>mz=@96Z_lP*9t-QjE60_&t~xPxkuF^}G%Qm(Pa%8R?Y` zaHU4kK}Le|KptDzyf>CX$!*e^ zd4YC-(p)>|O%DNR4gyKsv1;tk;z12~kTy)AXHSvtT)%2t7qe1) z;xy?vx^0JaViTj+LLdXObxeS$8Vuwd`fwX=!!q>94(SeX;jPk&p51jLa6w2HOQIc@ z=l8M4XfnufD;%_@0E8E+;n+0%mvZ<3i1z!tq&wEZ#rhqs-A}6G*N70zW_}Y?$wIq< zhHr9+`|wDOVJe(wI_S>RU?QuwqP?o?H)6!u(@BCyv0bw-boAQo=r~{oe0n#q#rU{9 zz+OVF9GgMk3rHau?+mGU{i;P8fmafI_Lye5XQn zL7~10eu%TB;D<0-09}_&GaWvP#51P)fe*x*M^~Q>&$?$)4>BL&wRN9%y&S(XWSa!LjWfs&|sF4z{K7-}1!w(FCp0)^I# z=fXQ-fmtSxUAtR0b0|%utxZ1ROXDHX+X}GfE2T)Y@$D0>9RZ9-KGd z8?aRjIyDrbXl8Ypj3sJJq6!7)P#}idaR9yV5s~pkN$5FB`W7B>OfFqqur5QK@ycv( zz!C}YOr%d!&vc@dP~60SR_>Y=NTFgY*3Vpjn~<*Q`)-w#bo*Atv1hdqj&g|5MccBx z(p-yabLdeO?3h4|4oAgsP2In33o@vW&MJM56v*e7X&4K8aQzNNqe3{^84W|^@~V^) zY2~nkLNOxNyyrA@gZ$`vJ*bc#t#V@cYk3`NG9Mp3GBP!^Tf}s?&poPu(A6@;mikER za$QU9qa5m@-fmW>Jqa3pDg-|x6a(e-$hqB-urwr^SA~hDmhidaRI(;d!utjlSojm6 z80T64m6bvPk5@sp97IeVu~Tj`Zwh6R=OXwMp%@*qDwyssE`oc~!k*>xK@)Lacbse( zOU`QCLIg69=$1pOOJG?AQd}@}*Cp`B(#!43J# z)-IkXVk@G9M@I^UU?jyd4~dE$X=VoYj&Zx zt>DJm_P^urLGRzXuoZo9^yNFzuRYRjaAePcLGkolTs>N&Ob$X%l6EyPy_G5Hdi1tW zIxk+?g!T_z2~TU6Z2scKeraEuFAp5kol^$HTL)j8zHs!m$@uVNpmp9cjvFOBJ+BC`LyT2hQ() zqRL<8!pndd)1N}s-paF(PSAjH|x(1^GerZ8EDyN{p^9l8DceI)91UCJX4ESvd2 zR!`4l9<5&;tE-zaubZ_o5%iT7=*CJZdUoCi^=Ujb>|&e0v#9gIBtbY;dM)6t0iG1V zSMxvq=??t3pbhQ+>b~>4uXo^g;kE=wHT~O?rWA>H%vje1DSF}Z<=J_{H$sjMRd#fu%_yW>@PC#9fHgqUYm?F@y%|Mzdh z+ORg)9=uUHI)3rM;O#tk1`^A*xeg84wY1Ft8_E8{4hj0Gj z(X6sPH}Q(<*$0KKeRsUj-lS3N^Q)Ml?xAf?P;}-CQnw^`>?)iO@R2>46Ry<&D-H#m zNig1zKEDn+0iQm|2jk%D1wI#mP*BFJY#6?1(D%N;e>$wv ziuPujr~NyKb6#0bU9&HBY!UQf_&9=KLB%NCa-#+i? z0t^FJ*wK?;I_WZyx56@5_W^BtUr|@uWU$oF-@3Y`?v?`MkO26Tukc?4a6TbKLO9@1 z!Gi;Cy)gq{LT&V(uS$8Sq}5tsYI{zWWYSZ|YZk|6M;4%f@8hFKCJ&GQbjY#-9L>25 z(VqS%y2928G^u1*TcaFuTg32z;qIt^3vU#dx2^Os`S_fc3 z{HuQ*`meje8VlOc_7}K*W%)nv<{b{fWr%^E1g~S z6rgP=HQDXnE49F#Qn74@-^RDMj@y%IQvQ-6Rk5;c5iBq1*_{eKJ~S{vaH?qcv}ltn^m z4qH@SjXD;KNNgaoHv8Gk|2$gO@euRJScWmmO@*;1Gm}L&e!pFx})2n2ZMQydGtN~S0mBeF7{sdzQ+Terl zM<>Q<+JAzHfvbVXQo-A%gc9XwPS3i1NvFP;RO7K)&w)W&*@X5=f!gYt5$WdcfqhMi$I%ExviL}m>cq5!33!G>3FcVy6|e~0~CDMow${%6QM=OHB?`@0l? zu}WSxnWoBdk}1$RKbu6vtGr8ar4&8;(}q>zWsj?r-TE+gJEDzY}foDlU^6n5?VLWjH=O9M_>*srRebA0rBBD{LsIS z@Igu*6a$apqO&C}t!JWzwk8qNWt8X_Z@>%$VzfUNgeN&yx&RSf{y=z^;iKcqdN0}* z(dK*v&>T8ENgoyRXtJpBPp~=yF%muF2dve9N-yPa20ShXzN6%8%2I+#cA8#g(^?ML z<;eCH{Ix)g?%$j4hm*eh7Oxz!fzfA1rp2ZqwI~L+pabJy??XI!mK(=r7E{`sb}}c^ zw`&1E9j$Tb>*I@%gtbzP%3nOY=g-^HJ!N9C7dWdQTc3!r<$`QuUoi^BNwi;|MpGk; zJLiOAB>IOM++e4lvZ?!lkwtKkJC>_320luvyh#Ry$;KMn^aKEbJdV^uFb#niu3??y z9_@AAuM92rOjqTY>59cHsg{j)Gb+GruBl__>Cr_1$6Fyqkt;v63+?&HwoP5f7z`lU zv)qP>U}&aTLeq>>`e>7*9EK{HlcT`&;*L3?7(A_R2F-qYe7yVH>BaL!lIU^^#(3Xm z=T3{xo>3^ulr?YbP#!~7W>g`y7#2h*23E^k9Nl}wu%5hozsWB~&x_^^s}p)sZ`1gr z9dF52rqLCXuowa{@It!!-rCnE7a?_-znE;DUX)7Y%QYAa=kOI;giA#@YIdzWOAwt% z99eKuO9O#^w`TDa0E1ku6*6@y zRuo;kc(UNuJ!=f_~j2yJ8UG@@-h; zfgrPh%*2q8_(t(4Q~(1Et}zxpxM7h8f?TZ;QrBl>$o1zPmz*TR1>dxXHia_~r_37x z%E}^V^M(!t9QjH)Il5Z2xN$p0o&b8fT2~|rPHpPmw&8y}BJ|1Aq@&x5M_Df&e0?1x zD+9Wf9LPGsL6igkK&;an_!L5Y0*2SBUArGVH+ww7pt9>!iWIl1x`Jt6V8X*Owb74w``ly z$4Gue$fsPj6&<=r)?>YFh}Ntb5Umk!nWl$-Fc}`bdHk}$7twav*WQE_SEx4XL-{zU zqCZ0=Oo>{x<8(ktdT+YuH@gHI4 zca|&JXmp=qaowUqp-{=G6I5trH$;pz`$-Xpwl4z8kKhcz(U>~*Bu4|MC0};xB44St z3>9Mi%;u0^6DOQ$ry_6C1y%4-{^uQFw^mAdrxbx?-3R8n7w?28kpw>lMQVKyI2kNx zwS>9YsjDrFiF6a_>hl*jNJv_F!VcC zT0Ct&T#Jz=vTUr?DX+`zGG&nJZ1`iL7|o|yz#ck#(I{G)1R$DE4&FU*6ftLZUk@io zJA20LTJf9W=fpn|-!8she1$kC_KVLK?-Gk=UZ45x%tJHZm_aj3Gszj(jA~~4%*6DO z=_jY}pT2c^|MdH&W7GC&dU|1cWa@vX9-sQ|)EB0%o@z{8I%S%A_td5-(c}x0k4)Y@ zdDG;_Ao4VL_hfbQy_34hcTKLH_~*nQCVo0``^5DVS4`w5{1fL*?3xgdzc&8c@rTC0 zF}^gO9CwZ@0V!yF?3J-!p=WNpaHEgM1iEUpI(iWx0-f1I1bTkte@5;YxnbnPBZZOR z$OR+2N9Km#82rodv%^0cK0N&C;l0D@VfV0lc>D0g(2=1hhwdM`b!h)kdnhtw0j!co zhqeqM&HTjX?$2+W1>brPA|Mtgd@KQp`ZyQJX(^`Kl-DaNS2e={hYnAn6OSl#S(^56 z+PH%uoPo^dUt&4yt?OxERI=6xl`dyc4gLws!!f;s(kA2n3=k(PimJ6eycS(NEVtCD zw!>pebPO&1k|j6wQ~U>^yxUC?{#?!=Q<|bpVz7bb0Vio83wk>TbSt@7J~53+*W&)T zk|7k{SjDO$YsCgVj44v$u0l~qS`#12kQlSMYcWT6_KNGmq~0>%f3 zfVd;%p(p|<<#ME=3f{)KL->asYMYMohCKCHRFU;G6>Cnzaz@LkhzR3RrYw4`TpyXf z9Lwz;o00H1k}6luqtzC2(=?Xb6eMINGe&KaG(}h@HH=Xm;uZ^2T!IRgfR8ArjigLI z?ZQY5XTb#jQrs7RQ z&dm^JpNp$aZhci@bm>y&dajlo)!^<*+8v@QE(734=SqQ^a(n}pE8+ne)#fUyR?Y5U z+Um_)@O0!QE~U;zQbdNW00Z5o4Bvf87nfB%b)vwe)#^}KQ(&{R7>b5#TSFXC1ZCTBCr+LF-Hy)#)W` zZsR@p4{}yulu6k+z0Il#B+aVLU&gHp#I(E)O^ft&&zHqAjH}8lUfh-7M)iE?LL`NRQQS z)@3>c88!8D{0E#m?4cYvMN648F-3K1027dLv4El=i>T}o4N&bw((}*Y?$HvfB}*+; z6W}q5#v9exOpV{_{gv>{&x)@=ARmXS04b+B^4f|%6GtR;)1oVKRKZ9I%IR8I#B zw9FZ=HVui`{D0$N0N;j&k5f%40iU}S=MpjTW!#`wB|@ZA<#upQKc(QfIgEG3X=1fJ zVQvJ~Vfh9`e8e?y}DGfG)~ z6oj89*U#a3LS6w$1j|~0&7op(jvm71Hr9yAG=w)6BSImsL&f9qc3?+%coxYE~XgI2q%4N9v#Ge|3mJRK%9Q4@M{&NE=FnVy_;0<&OjFb){ZtO{pj zz&Xhr9uthg9L{GW&fs`HaKaIzbGAAA_j;gw*QSJm~t_kCI`MKrjE z%FQX;RDKIqBwgatU8S9>W;9t{qo@s&%nXa$Psi0}%2Cs?rX;5Wg{s|noO7v?vqx9z zL?-8EX@fbp@v@p?gXH%Z7qC5UY7tb> zw4|jY8E(V3@M{Qy7MD7bhq1%@?6h(-R+Zv{7EM40L?%h99D^gwjZ2t=j|(IN z3{@<;JerKn3e>P8c#Y!xoj{CG6>RoE#}$cd$=OY~d2iX>@Yc;1XVx1pI`fkE;NCdB z9V1aP+KrT}(zQ_3DE7^qgRG?peI%QSsT>ftPHy=PZpOY8h}0{QWS6E?&bmf5g4Za{ z?o)9@umn=8p?rvP6VuqaaW>#=qjlauA<8%Z@Fsjs*7 zYq+*rS;~_!KVfRS*kp-KZilJD%Vlw@ydpvAquqF>5eYB>Y7(13`?-Zvfl)I%zB8Ej0$!UR%#T>*2arfgPVvK{TxwrF11Xl!q(wdKp!s>%?iz? zW44CT&zOs`E!ZW+3+<|&OouBq1t?(#In6lUpvChJhl9xYBejw( zQ`;Gb*OJMAC%54KWbHZ=>4@e`J}XtNxS8F5!0$hvF^2*~T^F*46}6f@mfXIG+e!FX zj~&RPGVV~Z=t%5*6q`9XeQs6Fji4>5w^#E!@cuH+SyCn<94#3-s(d!+BuDXr5RVth z9!-=xAR?NivJAZwv&_Zg>R5*Wc~oCBWrcK7TYeTZ1;%5fKS+diYBHhjc6*vFn4%~i zErg3S+hcu9HEH!4)w|Z?#|k%$G^uyTQbZkY5s1&>sT&XJVAqk2>gZO5$b#7Blo5A7 zqyoWDmm=*=Xua%`IyH|81mhth5G3m@m)_9I7_|{~Fo4_^(;`}Wa8DRExl_OzQA5*Y?RI9(sE9h!OY}l2H0+M*A1jPtkmQoN6V~@ zO`nJD);MtL8EfT0wUP?>a`};8u3~E9wP)g>J#+Wi)W1|b*R4Yr-aT>!pW_e2!2&R5 z^$Ei1g9Z>+0x`8$KWGrJTp3d8-s65#6IwhpWN=!2HUK9E&yZ`M7z`BkbKfXIU!bMY z9Zn2g2RftzpHUCzGSPwq&VCS~llS=x5IbR`W zPg1bAjO5i(dnb>+ppqV(60C5-xxcLgU(~5bHFX~$|~r;qrtN=7V)SWbn7M3DafUV!~-~ZgOt`Tu)=pC5dqLEc_41S zL<$)8wMvg2xX*?Zm!9=WZ@pB?XZ6Byt&r8b`cQ>Gdb#v6>4BNm=HXe3fPa%-Aq~OV zBQF!AD}WXl}QY5$BszHH#gSJEKV0kT$A@t zd{@#K|Hs$`5OmA~*>|YVlXc*Pd{xP5qsX!Ywx_`qP(~-w1{RKnMP^jJpHCy>6Y@K( zlxH021ILDd8-2z9GCJv%Zbg4EO6O-qWk~+y=ZEd=9{5cB(NWeO4~I#uG2<@f!Ucw< z(IaNKy~vDW$-|KPb&Y?NKc3zWoas`hWZsc3XgN9-vrtM++;8s0&}~*YITD-USaI}< zfy5>aO6EO{PTozr7@O9_0-WDpK(}2Z-HxueOJ`?AWk|BqBv73Ez|J4EsrqB^)-deF zWg%K|nxaGgKr(Al6C{7^ybT@IOXp@qWe`P|K?M5L<_&9t2>!z$-M5GCk3jGOpVe1M zL!;!Wr;IjRqZ>=-`9odM%2;JZl5?+K1*nF`jwMF(R3S5!fhzzgij(W8qUOH z4?Z(B_?(k}t5>aC{~3Xa=_+7idjF8D!~js#TO}~q&mX!S(dd9dbDbNG2u0@Mpb^3V zNw3rmY$ZVMB{U%#7%iF~G=ODaefBaOFG3R!`K4DcK$c7t^1hwGv<9qhAlPK-I(ekB zWFXysKt&K|fQ6uJjk*}QJal9y0%x7xlR=0rhzC*(eLlFx_yTpU{lMCBPgn}d2*n`K zh*&6RE|GWm1K?%SU8f&N=3!)RN9RVQGuzj$@@mpj7#?`*x)pd}59Bg<#YDd`12{lp zDB;CpL_ZRRvvud1r93E9;3~NAs`c(p(MxTVx&14uPIPdJQ;mkf#7m zM^6u)o{j=Iktc})y|3W}g9HCHOVNqB^Hi^vs6T`T9+hsKHBMJ2-#_v7@js89HxiQE z!e0&xS*CctWXo3ik>OKc|$P{$JQLg?8IhJO_&1cDkn`z=DTfohNZ3E zd|r`jn4A_0nUXLDMP_uP8&U*@Dftg4rI3CXZhNkFk^OA1rkZ?@-Cie@a1cBNsm z238r-9ih#K&~x`sY(q~`J4Od@PfGy`!_%tZz%EEv02g-5WJ(1{qLQGM{5rf9eJ&=Q zpIKc7!BYs&|F>je_h2E;$1L6bO)Jfio={##H|>^6#9NB`eHz@%KQq$#IdK`EG;5`>mh$t-T;!v*QwoVW}fe*&~m$BTSFJpCzX1LJbq zj78<7C}k^J>XZ}iFmTB!VeCJX0~aeQL!QTv2yy>?8xL(Cka<3;tm;ofW7yAD8Xjwz zY=)RlBxCmi0XRyQU#p}}J%2o7w%X5F-V@_NZN6Q3G?Zf0?8)5xWK#)c6_ zOQa8^1Hzi+RwYP+G7|=6(d&q}+IjT4Dtvm88J)Ofrx0v8RfRQRx3m8*T8NaNC`R>` zK-HIwIVuc#e@}XFX0;J%2X_xeDt8aIUdz8ISD$Buz=(p1F5?W7*^(m@q9V;0BsSgM zgYQ1qh7Tq#Lnkiy^I=rE@0^{3YFo;KBlb|Eq8h}3fJMih^zq2djEOoG5z)} zgRj={AmZ5=a1`I34BDeaBne!vMo$&E&CxeI(1gg$gJS=MJlr}s(!~Rbr(+NRUY(es zMilKmE~RO-%0?wR+=O;2tIeRK@>9$U@!lriLa4v6vIuH>{$!mDd+9X%E*RoLpuW5f zhGOJ;>Fk`i44trUxNpvfDgQGV5fMPFF5M1upy%uP3(Wy}cM?ZWF} z$pY>&*w%F%Iewc58LPQ8K&BlOdg=|*1@x!aOJ}yORpZX;yB7vn(dff(kk0KG64Ue& zMJEK5!JE>NkOjD*VABrGz^0w2t$9W1;Kp5lfH?1aZkEn1^t=#x=M{_suyBF^Brv@I zOCW`wxLLZmb*;jI%{35EYgF!n?Mz_2mCTUt6M8ld5l!ib7=GV4ep&&%n^TPpi z06+k1l>#)Z`>G6M!`16{>Bbofpnq?lcy#=?V|&E7_P%_@ALx6{dWT>^XmP7w>{aWsqbtCJ2T*-U&W$kEOp0o&uxXqN=vGmox@B zML3YGqy!Jly$?LFsEGf3pzwN4Y1`oQ?}L}I0A~ghl6%%oK05Jhkm7s$hV5hQNL_Ld zzr}gWaErrJeqi6s8l#yQ5p3Drv{PLt$|S$--HIN42yP=PLy`xb2ao+7AbGnU<~!@` zABN82g(s_{wAxOj7A{BK8dZV7tz7dc>^D{yA#MHOnV7go9_0~RH#z#Cy()aZ939Pv z>l#hN-PClVzyQMcNJcUg#hf7+trt~8$DiAO2wl7ru-W%M0Kb#-F@vpDrM0Zd7$H*z zs-EWC0rZ&2jPAH;+qvlWWE5C4c;U&$00!|MSD)wJz+aTHxm#vUw-k&AOTKOI&6t4nIF^+?*~N}K8`)OiF(mdJ`ueB(Zz z%oCV5e(?xDnbiG7_*6J+*^&zf+$3%2YVv8N6?8h$11F#fk$JcX9^;X!K;W?zec{eS zzrqME&HeB{NA?duk1$1Cum(q?bla(lsOt7`w}I;SLvtc4fSrM8<;7D{$QkExV88!2 z>0W`F=$>^W%^9oYp6Tl*KRxkd7-Xi?1I*dK0D6rlW2@-WMTn42+X+JiC=pbmYrg@v z5t#uN4}Y{n=-h9=!LPZ_KF@lAn@AP30Pw0=%wbP4nPq@}6pzub!ITo0A~DTa zx^K6+uYgTDPHc}c(Xc6ECyfDRsGH!>#~+t2ZdzqT+7ChcJ`a3F(l4Hd(dnOnk6`Uz z%nyqpB#%_+G9ZA{h`H%1;R2+}#xKL*T5UxqIM~;mrXkpluKV)oZXN#$G-vK#1kGiK z&9NG~*@|*)Z(ip}Y4sW8_$EA|$jWo?z|Id~vFHomJl(UOd`r4_-%Zv&Fu4ei*wrPK zO@dMAdRd=?@sxAu2Va466pU&binNsq+xO6FPsH@E_P##I6^7r8qu^Al)`i{Y=?@J-w-(UgJR7$T=5{zGMvNu!6 z|3kP$Y(}Rt%{X41D!zfQ>r(B(#OI==E-Gq(W!y zT}I{6`Av`|0&Q(YJN^?+xkP0+SA2^q@=V#)3zb)OnG%2aByHgSwS%u6h z0y69JnZ=n+vs*U(anpazzID@+n?AAr5iGy9{?~#4+xU8R`o-yIryrgE;OzO+w@tUF zUpsA@R!r}lmQ4L}>g4+SrXHHQXX-6ejj7j6v9rIJx^QaSN%feRJcx&(KEOG}K0mOnhmm@U}FOnQ%{NCS(|~ zHPm*yeM1+d-7Fi3^{?5mbAx33m*XeL9~?hE{^s%8cywGhe%|=zS^e1G#(q5ZwXx5P zy=(0CW4ST!*d=58$EMiP-;e%a^oh}rjovwW?Py{)I%*%KNB547jr?}x*^x&_KD7RA zBex4kE^1`=$jJH&*Ke2nQ}Tl3Tatm~xa3wzb@t>eirsGAKE!oxXIn(GKv_d-$T`un zg;vJ%+u4WKA-R3#BnE!5gPvz>Q7{u#D-kgUO*&Urv*&xmUK&;LR+2P@vy39C z@+(QlHw1H}8_I`4`It;Ps&#VTb%NQQWavzW4YPS)r@&0%K%-IR;FhvoqtvEs&p>J3 zI>Z7PRZ2~Q@EGZ|IqbJZtMnqSt}Jzuv@uT-Mz3zkT~=#k=L!W8NZu%$!Zod?V5<@I zW!K>DC@uP6%*PNBCLeH8#9j==Fe;6%5T#ISVhXR4c4af0r-Wuy(F|b-8WMg}w-oJW z_I?1{>2{VQ>>i6H=hZjsK1vETVAQjT3bf*hcsT9Ro+eS4V zX{7WqDGo9l6|_=E#@g{}&XTM-0bYh72Sx>vHPWG?j`3x(8XA%}9K##1J$sM^uFq=4 zVvjhT9nFOprNnks7Rb45XOc_7NX%aKGm|(P&UTdrH(@AOJeI0KZ?F}1ejGQ{sg+Hn zn(5hSyE)^E=EuXs2WC6qUkF#n&$KL{;1Zf{3e^jhGN|AM0K{R6#Nx3lU4lLA=)i$a z%;bw|itTcqSi(b&?RZrNqHeVSmd9c5Saa0H!UYa{h$?E6Y7&68Ix=@5#@nzRjY|W< zO;pihjznvj_~QLSeO0gs@oj&rQ?e-B>fDAgY;S`|HmT^SG&N()WK^dYF2(kxc7g5? zeiso**}J`bGN#AAiERgg+QI8}1$=gu%HzuJydOVsn@z)^aZ~LL#NrvPk}_j+s|9Xc zTQl`y9)C}j-i84&kf`lZ0thxz2iCu?sT99#8Q->LHg|}IE8<_W>qFjFICUw;g0L+n z7igJFF(=WrseH`g=W+dJt=IxEo0bYvOx9#eP2w5GHmfa$1|VvVq)nc7I(4}ncc&R@ z8zT(`EG#BRo8%7SiN`j5y)tcenVhLWjsfTt#o%$vHq91$Fz(ctJI*Q@PkV%y(CBCk zge9s{7d5)JEtI|JcHEstx#Xd0RZ8E9*C<6hzPM4a7cDIkl#E@P9v6rzsKY+ookrBg zDAEC&lFB!7k&N@Fg4vp1A}c-0)eW*vdrq@}r!`yeB>>;vaDj-o ^x%owr4);k_h z;fi&Dx|GL!kw>tfWb5gukuX>S%4U+t7%BjF!tK|+nsnG0PlQsygY2LcKf~r)N*ir- zIG2?U1(!fW!u}n>4mrLSz;rX!EMdqn2LP7>-kGhrOg_TJ*|gPmQv>h|^Sn^qq6`xt zfe9a>%5=($PF%g(qX;_b(W;B)uA*#L$?@XFR@=!M<#7cX<+{b54XUgfzW$P)t(HKQ zlv7j`QKLp_sc1Ym2n`iVIfAvC)$uk+cKK+_-GV(2UQMge1uB82qv4Ei$_sV_qo=xI z9jT_Pj1mC6j|z5eH%Mp=zHU>&=8Q_!Zei$G2{J}5 zkIvh&IU6KOW84u7+y4$kehRi!glfhaO##1$N~oiAB$#X>lrWSOjQPhxD<0ZG#gzKA z&OwnGqf+S?syhlsw&t%T{9H4hUm_$S!OliwRI$}knq#3xh#SXiGF$Fuj6_XU30MB~WDOSyr!nX; z7J)m}qdtPwRoN0{N>HI>G#1NptjB3o;p)YP9waiI@pM#G3bV=7EQaC0YEq#HmrIjh zVmh%%(8gW#fN(*$W~bC~o3RGapLm#bUN6{#Q8+&ICo4v`He9SzCczIDO%5;B^T)#; zB4El@l@sUU=PLB{RgWW{sMDTIvYxu=^e(dM0A)S8VejF6t58sUOR$@RH7aFh zYu*;8vQ~43y@H*rwW$~|Ryzuc6lb8fuEX}Fe8B+{bh*qB31fh@R zQ~|4}myOWcp9pqURYy6!ODR<*O%=2L^dY=QV4Y2^o7cL+}N~%&- zdOV(VBc3c=D0q`BBnenr7G1W$XezAcvNW!q^)<3Ic=?jP=nt6#>G_OcXJAFBgvhdn zt(ibLHZzmMUo2A(#p-}#%xIjAbS*I>xRXo;LLi2y%3rS(>ZDbD-W9l=Oo3pjM%&Zt z=_#^fN$Z7ip2-Khv?-TWm%OY_?N?TX7oF11LD%Gk5 zB4z+s=c*aswZs0v-iiRUiMEqhDvMbc0L_N=jY?-GLb0l*y4PywG)0Z~DDF?yk%`fs zysFf-D;&O1%Jb)S!kzQc7(wP^6@9@5XlyeVc-!z#gspqxCi85P&9EgCE3n3A#X+G72NX+h|56G41#A6?SjO_NG<_EqI}QU0|9_7zvKf?YnGxrzMBTt)c;EZV596V z`P}J%6wqt|vnjX(gGb@WfpAt42%d5*iEf{lZAG8|m2`gFnl*rW*LOJ(gh@ST0b||# zYj}8{56~L4zR^pYyg|Pw$06o7@bDrtl4NBNSQ$zfN?+tLaS$B?{;M8j%@!Rw-~|gs zGY(#E?6w#AhhMXlR~mcOpwy|2vgKnh0XhsQOBTltPg_SElQl_i;-L*=e4IQE$4RdK zmHcti@NiDo@`p1d+ zTrcQ~x?xA0bh+3vVIz_Jk8pOn+KL{xo&%(SA3bLd9kQHrWbn)%r3*mT@ro(&zkht8IzeOKmwXj4eQZ^6SU<_7Aihl|qZ~u#Qe*P6@gSo## z#N={aIy3gW}KVWsm&f0NVO{IC%Biio~uO9egE6jgVDe9CzPVulpyV~m4Y ze0+z)1e!HHuICJSNRaaccEbn>@PI5HF^^8l05iKr6?F8;n<+H+()rChwd%H1X(k1!C+wM+}nYK(1K6h7TxN_;Ab6m8FY8Z%S$9 z@_t<~+5|fG+8+3NtF1#e_Mtq;Pxr_mZ0hNoVUlA!ia~Fts&vUyb?V$jg)ae+I@vaK z(KdJ)q9Sz1j?{Ma(ylLWMlXH;(8A!Y+hhaZq#^%NYd04aR1$r0 zhYTbSL}qmIp}m(O*@GV)9jJCff8cc92yNhaeG4|eNr?S-EhPZZ2Q_hI-68|Po5&2D zF1MV^!)6x-k8Y6xbjZ^;tUObNHk!I1d7{qw)0ucTtr;$Oas@>wsWWrm#r0NH2eu7j z3;e@H`Z@^7U{wLpjKvdq8~W%j+1#458Qp$j+uUGsw+ukGRG)>;;h3jAoYXL zbA**htNG3ym=&2J1o&r|%VUQ(pqJ)lf5BdLc8hG^on0u?o18f~qLL)0i{n3>?8C5n*}=oWoG`2eVi>N_ivc;fn=*trPm>=N zThK?&lWm!CuPOmP3zBCg+C7*$Uj{)_cb_K##8GRqRgYJQswt#aD>=YWrqBxq!S#vE zC^lAsXqzB1v~6(pAsG-GIr}_~9uB^$=x97dmVBk6iz+45ku=)A2NX`H%4S20~ z58k}UHxcOrDWdT4{OzO*bfxvh21sk0xgv#_{V+1cW<)$7yJGP1{W6}ypl@BFFsPCK zWQb~2wAp0PUj$aphYmvrL{@b2BoM__ezs@V;G%P7yf$0k10BHZ!4*ZNWuRD)gK@dk z?Uaf{`3s;4kr|+n{X_6B#&!<=`vRF+vRB#X2@x@b+TF`>43V#@U8QEL^%;GRglDn9yq!vQ6{i z_e!B_6>Gfi!5v#8z?GULWsv`IE1+kD-v!Z&wW6oVv%GF0gX9rfcJ+2p+u^sBBxFTE zgb^4$x{;8lhwjdSKhrB^^V`;}fKJ_fH8`XE!VJ1!DLWe(?vzUQfqBu#f^P_I11k%q zV$^4NeZ8pO@S_fnoOi=pBjBN9^ zHESHZ|8uXdd&t1*8Sw-D%#g@}iftk4=Yaaf(~IUj6#r4-_u&%RCfGczRRzVazE_15 z3%6`X7hihT_4DRS;XQ~(#pw~_xNPkabDC^cdIcAVp;Df~>9KZYfN56G#=5$)c2?HGdRduar(=^JAOFL|$*~3gKL98tZ*up2D;|pS z`{N!Ug=l4|T&`fCknE3;@9+&XJcy_W#Rk^{hu8y?y9XCqWROsxGIbjTvTJMVdy#s< zsZiqm$=y~N@W6@6K;!4_L&Ct%+W6%z(g%)C!7-7wqPs_`Q<1nn&BjfZ4EmuFW{TL1 z<~LTa9JoxpTZ!~TE0=TP1kz(HTrIZpZtcoJgN1(Y25wJ*Rz;&x*Rv1@m!xF+F< z!?jyc-3|{RE<%t0CV% z1?rB#8n_*OQ~AbAko&@&0>Awe25?13`#dWrCaBVPeR-N{hx27O=cW?Q47$V#k0Umt z6VbcvgNL24Lhrjt-RIdjF+3@jjdfbIr5G$jdLS3pY4A6BuNEFjT!tinkDQCX^&XI; z7UHby7g9&AhSU*3@Nt+s0w6X4MJxVb8T7Pwjqf-( z@z{3ocn|w!JPrD-fUFX(7k@Hp_%UvGL(j!Ug4axWWiB)skWB;65eFhGfi?gu@-CAD z(nA0?OL|CjQ9yQJ>sqDgcfr?QiROOr4sd#bvpc;YOmD<<= z3_>KnS9u4+LykG%{yjMP-s$4RH^%=ycJ4@I$oXyNgEWf3*_m9F1!+#r2oi~*yGagOb)hgBs?$oed zbVU+8rl<_b%`bvb-u%IZ!8?=C4uCazqE@`UtlF|196fZhC6hIif^15DB}JRk(2S@E z1aMLUK(&;{KMOozEB;wv#o;#GPKkqQBQ8VF7uE|9)vs_e5dU-ZLCQdAD4-}?AnUiA z@wMuqT&|Jh8(N$dnGwN(D+8{}9fSEiY=Y+FmVh}!byFQr&8r4*sFGjC4$Q1Jqsj-Y zu$BM);)cOf1(^?gma@+izT#b7*Aq)6iBN@!#X@dVDnt)gLK&@KAUyQ1UrD{F9y)&i z-gD7wO}n<>UEZe_w(P+hyuI9TgBM-d;EARx%wR+5EHfBupASkh3(!$*%CEa!a&%&GN7O1>lc!jOo{zv;3~2R2Pl z|6%&SW`D8iuIVSIKQVo5`ugeAv~yY|Y0vnl_f3yay*Tyk)EA~cJazk2XX@ybd5W0Y zCAn|YpQqMO{%Z1ROhyGfR7<(!MK?S)(56Mt$*Ef?eZbX{v7Z6Xt9Q@HdkG z#dap>)q>nuHQ#Z%LjYsCGAr0UREXqa1=3*l8|WajwCTTv0$R@!W>3Ol>d>irDSJ)_ z_eayqRdlsTR+%xm>XzjEdj)ehK+t{#2`rDvMkr4G2)CliS0J*|$YqOVb0yHx?7^@s zqXtqOdYwW#)X5fGwcG{Q2-U+&pr^;#o3<9+44cEGL;(9}$O=W}wPAtcqSSi29o6_QVmr>0DM|1^(D{W82;%{>k9Img9ReeM=t*dtnC0Eo$NiP@d z5eSwwO1;KXmsQmCiTI`Ozy%?fvPRk*rm#C6*V65TMz|p4)U~M==r3s--Jr!%*e7%} z=<{#{V6H0~E};v=G#B8ApfSi+?4+`kNpM!Cqa=xQKZn~7GHoA#tpYA(y%TIGsilo^ zToA~$NivkL$Fpp#<29(q{(@h0AYE%a!fmESbx=_xd{uR?*l9<5RO(!r zP~B$Fq!@pVP8!*gT4mfRRA<2@_Tcm!l;2cZMs+z3$QlDn`goRdm(8JihqIW2DfK_` z1(5g}CTtyFF5R+)I95GnxdGqTZ_8(Lm10}hP50_4m8Kz7 zS2vSnF4+S*O0`XEjcYN@gwfZu7^ynlvo58&v8qz9+>hhiMqh@utFkaAw9a%PO^>>_ zja)3z8+|Etz|Fa;3SS&T?YTL8Q=iWf2-mr0+7oo>ouIOXfoncx#!HlVYNw=^aA}i0 z+!rr|%?Z}5X{HEAo(nO=IJ5%PX-2Qs>+EGLac96DH3ZZq;Zu1Th!UEdRinf?V>t&Qnis z`;K7u2DL;eKTRM|d8jcCo?SUd?HrCBH<(ns~*nZIbOU*9fgJT%2&!UG!435iJL5a{^)wPWDZN&F0ld6jiRJNbI@=H}4EJ z97IQ*N<;{gJ?T@*FTw3NjljWUXKOXa6LS`|=BsdZM;Cz61YLI}VDG63?xon zsw-j+lhO(7MH=Zx1O%NUZcCBLPSqK;c83u|D=eJCc3XD| z-m8*&sKJd1m`!WXlcM#lMmfO}1&?1deYx7h*d^F=Z3SS131746Ob6SVd7(d6hdE1>V+wbw zm@A}$9Q$RVzHLeAraJnt+8)bQ6pUu!S^Pq+RM6h6almUAG9|S63x)4xX&NnLqCq+! z^TNsbl^gfsb}Y5FfleBV8C#)bs_41hLv)nhXsKnIWGG&AczX)k$>z`fgHXSs?obwU z&ed7c+T#U=J}eUo3ZRS}Qg)N!e6P_B4%{jnr{F}oTw^|gv5Rca|yo_N+(VwlMnh4F9h8C4Jn zuqE;Vb1Fm?*e&=1bIMVqN|`{hYk>p`OMcNU*g1CzgmCl#j7oUHb!>Fvewy`7i<)xv z@)oTrLu$?woQA2*5juaT5=xd~-;zC7Sjp1 zEUtKr;Iz+RyRp?M5lKd?XN=~oxu-se@kK^sqNyTSuPW~Ex`Fc|OU>f$7$g2%4>BFA zbyG4E%TIn18x3ePlD5?G$X0WTKwl{u<%7%AlD{)`5>H znDVq?8`U;xteZw=1FiwqTFdW2DvXjagD@ zbFf6J#uk=%ke-pXQC+&qx?N>!4$i^zJH8@ZpbfOhq)Bb6xZDxOklu`8I7U{Z=@2O+ z<*TKeI!z!YKYr7%$n zt3!IK+yv;hzKYw?dutX#5wyD)ox1HQ9sUWfulE|;bf`g6`CQ(`rMUfR!EWxwXnR;o zPzFOcUtl%}pGB|ZLO^DjOH~8ma=58F{9U0wr8kjnm(R*LWWiX}qS=GVMvZ!c^Jg8^ zNWrAhC49`{V>9nT#7t@{dhB>=Y{_UZR%3)lqoFfhA7|Hur9yApfl`x+Mk4xVG_K)- zQG6F)$`T^{g;FLGPo>y25xf-JbvbvH3b$RQl*8n;Yn2jV#nZ8V;G$I6ylQnTsP2)M zd>c1!2GOfPlB_LtD_oJaWc?q)?RY$lf$W&Pw9TtaxtWyDh3k8buv1s-a-Cj|wp8=p zpJTJLuCx?$wY0(*1**2R7ekW)ObCp)4Ncn+Q8`U9CLg{9w;r&YQna?+@oMcr=-5^##sK zdHnH?Cc-Ff3Of8BLvkz0yVp%VIPr@a(}rzhhLOtjTO{x169#XBe{xTs*DS#?(M*I) z({$TZ^z@VpCTUBf=5_GLEHb0#wUIOPNME>42ANK!NWdK)~iaRED0Pehs8=UAAxc;L+>(qYXI0Nv)jVL@aEpQUYL5EgY{p?1kak))h@a9IP%u za{nG^NXsa#Su%-R;K<}Z|~fkj4f=E+ZYbv1NC`#8{nYy_#` zYMVdbW-{GimM-Nvy@%+s?F@&G_ux5x+JU1LaTx*$Q#cplHF=J7Wsvdc?8jG*dIF(( zJ3=zPW~ENLx>*a~4xFs4wxY-1^b5#3y>DK~r!CVXvR*o= zOLK9TE6KlC$blD`(T#^T0;kfQ(hYnr?cZ_Sl&Z@>IiR0dIdn0!I}sNZf{SZ(8h#7u z;ls%_q=KQ&!~luw@pKA;pvzPB(^1*qHDr4i@bCg|DlCZe==g8Oc8r)LgOf)lUo!+B zRpI9N?8{VXxXQG}RE^cVY@}O@p`$m!n>D==Mu?~k6I*=i>O;E*AABQ!hUVy3RtAVI zt?zmr5lyY`D?%O~!8dcx%xWty*@MMu2T$JwUk2i{W#|Zw&)PF&zDHV|c?t;ZTnaCZ z-g+Z^8j%^rEWd;CWrvaR&l~wBoPA!w1Rpapx`+ixqBUK2(8Up*HigD-fv+MqgSf@S z;sA1MuL3omJ}+T{&+kHQwvwrY0#+8tFv|Kky7sNm0g;uL1{&syZXdk(R_MS`z64)S zQ7Pbu)PtuC)wNl5gGL{HGsMzGX7uS3b zx=}wR2$@)Kg%*T7=AG+C|9$;SpbVgt?3{E@l*jMnqg4_ZIKDowXVM-*J#t~1)e!j* zS!YpW}vBiY>tu|h!aPB_(r@6QX9;O`%5C;d%|Z2BmpwQ4hh z7RPWP+U|gXC@SLxIRM3XhwK{3Zd<>`=O7Qeq|TSr0cE%fDPtZ&N8$#4-v=kPx&%G{ zRwv{{^I|%#Wtm4ZU#l>kI05Mc)sT)L6QJgH;uw5-k(n2AgQ(k$kWs&g07$X>HT@3U zyE&915oO4sx7{UM+_cJw=CV=eVD_EhOZLS2z-lK*3pR^xAc!`@4w`Z0tKk-kQKz<` zo8BecGWUuiZK!S^oO&0W+s=C}S$l-=nQ6OMTXnhXc@%gL1mMMHB>CzaAn)}(G80Ir z^m(}wESLFL8V5w$0XAKNJ zat{Pb^5M9rOE@#hs=efHdwedIeNH>?|o1ju>A4^XP9L*Ut4#4lVM$N$;6E}nQ$NrDXwruxwhoY?zzH<3F8aVO`4!^g^x3su* ztunyRngo&5IY(9rwe&W6v_L`+*Txg;*=2BzxLwszl}$ zO+b8q@3YW?$b3c;ykj5>OXgSt2v{?TbgZ2x{JBa7J@7dQO0Tve?N~<;>OTCS43tMz z{Uw;F0u5rI$`;6ISn2PXDiJLRf5cC~eO;@~sJe({6nCzPv-$C7APf`gUk^_+Hr&7j zI*hkOSF@gs!e2RG45U7k^|lohy6u~Q zfh4{#)y%RSOZ0Y5U~~y1L1jI_~Kea!7S2)yu%WlS?JUq$fVLdlKYObNV&J=BKrMhTQABgmypyy71eF8+D{u(@KnH#7 zYce^w&$UXCL_K9i7kvG!5C6um%kFvQh|_#Sc2G3f1~AyXr@5xS$-DHT1-AK?ZqyWL zg9JMPD$n410m1>p6$GT$C`I#Bl0r9pPxhL#Kk@Rhr)1-sW9!xrU_9=H@fd^gc+c1- zemq*xYo7wFSz;zqBQhiT*RMM?P~5Z~{Al`V*;Vr*F9Ocx zKc7B}a~V8UIqw~yUH@%a1n^a?!chzWUMrZzX(S#VzeS*npOFE_*IK3Mlmir^j{Icj zF7$8DoOMl|es&1U25hIGVr@$qfVW7|wnRco2F|$A7oLUwiL6Mn|9XWWV}0Lu;WNN! z$bl9aj6Y)$s6}BHgw+iWV67kwpJDN_~V&ZWvztqcbELgX#@r!)Bw)` zN6tW13TTX+lLR~$;Mvf}z7NaL+NC^jOJM7~_y=blf^Yf(K(tqTYw+Qh{1EoitF1#H zE<_lk{fMZ9jrOtzC+qKhN=h;VtIhv2MmRW}Gff z-ak^D`2L3dlEEFZ_goAA>!Ib1D;QCKL6@?mEcI5P+U?c~6gu$>Saw!h(c>p>zH+et zm;6#0SRRL8hu00a(GHVK2|?SmsuTAGJsu97{2$r2eS{h)E6;!ctgZ#zB!3)|zwG+# zuX&7dWO-y|)$e3{$qX3uZkL(gbT-Z{1dH z17YNouQYb*XO0j^yKw1i=M#!sg7gQ;<@H2QKkr^Pki#%=OPBEtIuAj?f z(4*0n9*O4BaCU7&;THkSEh-vLG4#@VTCg_02)|GO-&h7l;?o+0c5{g)Xf_5^0*opZ z6n4RtpTMI5W9yk^=y-7Vzqlbci*Xx|{Yg5Ce)Q87*jfBvPA@)Ogr|6?XGPb%B-=E% zdRXDXwiUhoCHV1LUBr(#)!@0iGoW*y{2!SMaJK9U&UW>H!ozNHX0>%V%y~6D-0} zuHn{`9iQD|V zdqpYy#awh4)6QS`_p`o(oBs|gg5_2dd@d<0_}lcNsS?Mt$no+kXOVzRd+w_vN0Ia& zfJ}2i)?~984X2{19fWbcOKfa*k3c1v0B?^uoA&aaLp= zY8;*>liN0kY>)#LPUGkNydGwSSE79Q=}85ilf8SgP~_M^S>vMa3TDj=!u4xA;U$GHE+dyw24HY+YVnyWJbq*p8{Fpqr~kJ zbbN>0wf7C~TOBL@Q8XChh}$YZARZ!v6VFKj(re!?cOAHC{#HM@1%A3NM01G(D1vrj z=MTxgJQCjt3Z%LWx_M5%A5gikEJZJUFnT4r`+>?VnwpoNErl&UFF&@|ek*|3-?V?| z79ymztR>rxpgWbQdDDgh+PWFOiP$W7#lLQm+tEuq<3%iXLA8N<;Qn8O-?}N21sWJDD6Wa{}AGNb>Zmcqr2pg z8@OgEg5#F$$G-CkCAxUG{A^hmx9paGU~ctbg>lU6k%NN!s?j|h!a~ONzI}53?}Tmh zKS{7H%mGa?4N1p2AiN>@NdQU5YnJ~1;;G4QE>+7DnFB2jSHDYL<@EC6!$JRry1a0mvwxD4HR%`XoR+=t{5IBj3% zxwY|WyD3W3MJiO+Y1xJ**;Qt68@J2l^E0c<(21A-4d$?rRJC<*N-jSF(Szj$n8>)T zx&nx;5`Yr+yEOGKaQQ=b7H3vlk>^%W4ps#Zef&>2f1>k_;X|}CAje)FpDpaj*_RxgNSjZKSd=a{^+Kle_ z$-@VSsf%|m%2~-S;5rvxXe}Poc4>>gsjnAG@lG98FOYAOE0v7q%oGy+E2`c2P1hlG z^gDYO29NLOyA)Xla&F-HdtuY&U ze|Gt?cW)mB@mFYK{%z}~Ta))pJUwICux{+)k(dNMZ+`uog>mFw=J}NIs+lRZi#^ie zi8!js0_Q0(NUenS#b$KlKePgD`r}GDm}`00%5cmD=vb4kmwIX7UelK; zZa6n(45?vOA?`)>kY~(2xA&v=bgiE>0Umx(ng%&+zgRY*vSf`b_AUi>e!(RVl#T4kRJvVJ}Bn= z+76!qKITDa1G`yo+oS8!xnRg(E4Dmk2a=dzNQtbFD1QU^H9qj(G{NM656N>J;}$}h zp3hEM)Rl0j+-gNZE8spW^g?U~?SkhI!EfR29fO@Vz75CnerN-~%!DGxspy6Zz#zb0 zm@33kTn}$UWJb?-CLy}DEZsTywjOqv^VLAGQ73X*JET+9l94WnNLGGePHcv#*!$r3 zp*cE=UXtwFJh+$T@2^}w0Qbj91u?5lWg|f}*lM&|nwoq9eMk%U7n#wiKgkw9tCLG4 zc!PFWzcOaJ>&E|QOg3VZbZ1CNp}S+^i2?k4#$e1imw9?#yoO|4v1XMrN6H?OihG-` z7`paqxQ)n+9>3#iVHM#Ce+R$4njhz$WuBlJ<1Lb1j#E;`SVL(HhKQ6+iAF=P(Gr=F zoO{0z%Wj4E>E~QNf2Aw&a;U1JJB?mD98IfDWDdQ<16>iB(ep3A@9^Na9#~jmG34o; z@%Kt8n_3GI%(_Ajm#*sVp*uYCZ88cJ!iZNPElEXU3Jka1FQ?ATVAg_=bn8 zK`NrCq)3HVU1s%KOTdyvs(^g|tjLUrPz=AJ!R-P0R^fAeJqSB^`?7*}RKv!MB8(S$ zHVlqxwG|Q6>o5iGhs+VV&{8=nm+ih7I)&SzTK2M!pq-_nKdAEnu{+{?Fv7)V^!RlJ zSOHF5K8kK%*s~pd$0z>>9w;ySVJB~0zG&q!+q#&qM%7H+Ofg5>>=cPU8kHZIS#3r) zUhxj-+Q-$S=wb`}4(-0`bbCjxUKx1n*3ImODEPWb&qQhccgEj3dIHH6Kl|k#-!cvF z0aGhOyfItn3T%;7XL~9&9QI!?U)ZB2&WNJvSJwfSd;cOjdjGavgEA+#NcIGm)zBQ) z3hU@y=4Pkk&iV{NU(u67@)-1ewH3*4`7C^)J4(CJv1IuQbYx0CI(Q}~p9E=+Wr&Fg ze>7b!n<>yObGGHH0o7|Og`TUyChr#s*cyq-fMBQyd@^JEcMXh5c}OzXt+bO=FQU>I z4Zs`6YS1TAFb70do*>yixF9Wu@Qz2XOlzoKI#!Ljf;~qgfo{*p_s@yVaLIe@gW0Sc z!qG>UA?hL|TN*7Q04A#CV8)2d$G-Xo=iv7_IfU$s)lO1D5`~J>O({4h&^`wWFl@wT zp7z;3c(x#i^!3;>PrKY5hU>jKXS+j|t$r7kr4;Tsi7qL@rB zR^(H2tG@>RMqANc71;Q$E*gF);kc?;lV7z1B&C3@0|GJzP62UX8e{>p5I1e}Uj`1U z*DOU6?im8j{rMBSP_lm3zmd<^hd*Lht^A0IzVPXF7BP z1vs|%z==@+!U|di9zWl0$>+DNSpz-)X7kxjsgAe#e=*D(!^?F64HOG`Iu<1_8i=AD z{$Fg(QaBTT?e@W^`!Dw-=s-_Cw?GEqdN@zd72uDSC7dKEu9#Q?*?RKDZEF?+XTR%o z1pJ0w=Zv8}*U6_Kb`3#-9PAW|Ea;nYUDq%X98RJ52@G5JGw^9^RUMqT`zZXUZ@6B* zdBG3>0;xP?SVkyk(F5H}z^RrM!gSX|m)0yqCmtDxoy)d!%98CEt(9LV$_FY!PXR&07YFBYzqG6k7 z+mmzH-Pz3UPWR02lKX~EB)4t`am9j=k~ob>|ADjZ~i=0bGoYTsZ&)a{EoIxKg}mFxlJm;6G>TMcsAhtY~J{Rs;p3HlnGGmw{#K zuA`m>m)+G}fOD4@fF~XxI*PkNrupQ~JGD*Vs@Q&S*G3geh4e-e!n7y`N()Xc349)? z)^zXe+&XYv@LSPA<0(>GK7JVv391Gt(}@w*pML| zC3jYC2$)m_Bz|Ca{Z0&*D99tCrPRD`XxjMpt|iC%{j>IM&dcM#@>uX|&Zt-Fr6ra1 z+Wo7mtj^OB_sT?iKc zE5_#0w;njExQ;&vU(0+s#D8+Wc8MjPHA0CVmENv3Db%KLckbx<2WO|J_-$Na%$pyY z4Q%u%TUNc7gd$H3FmjR*bkTsczB>EgyC0sNUcXuo(DAi@i2w%Qtu0!6IkoIz(nD#p z76tV|Gk|Lo1@Dp)D*pzX>2e|fSGb*-@ZA2QE<$0CE7#s%`0uw0JFyA$cMB3^XB?e5@D;4Ja4Bs14K z2woqY-P~FKQ`UUNpptP`kFpgrV|6lIGlV4`(nqj|!snlcD~f+*8&aY)i-g$$Busco zdlw;Ug^Oh1X$Mw`pv04KJn@>kiUWf9>zg}IJqd0mu%ZHj8)rr3Z#r&62A^4FLo$_+ zKht^W8F+9ozIi}wU|D!%D0ua2&I;1Ko@{t>b~_iA zec76^^2m)t&j8BC9>5N|Y(mRe&X^Ld)$4gcFBPhH%NNcO%DT$8PFu`3ECN_C*G< zjgNH=&xHUI*9{HG&Bk<}1oERsIGJPFakyx>o zjkPQ;ivm6O-?O_WR#K5;_gYBOShl9>K7gr!LBOrs56h`;jq2Sv4aE&qjhwu0i2$qliIr3c zx7@)v88&r_e`h8nTLeGil2g{Mj`@j1$>~nmG)e<@hE5q04vh@HJNVMz_Xh78 zyk_wH!RVm5i&oJ)@TY<20j=VefiDhJ2hJYQ4xBWwq5q%#ul4_Df2Z&F{r}#7S%1Di z&_$|P*Y`l*KPF#?YB~>3-Z*)n3r3;odwTMOE*u35M)7YG`zIFi6M>1n6URk&{O@4*zrbwc-C9?hOC?@MXh= zzJD7I4DTJ@Gdwl)-$SqV?H~G)Y3RPbi~16M_C9&v&c5N^cY9yzeX{qi-fMc#?~V3a zdL_Nvdk1>{tLK+JPxRc;^W~maPo&4xgZFId=@I-%@VwwVf|~?a2&#g!2QYVAYDZwPGDk_Gu)Jl@q|ti_!gTCR*Ku2SgxMaQ4LB9H@^T21+R-s z>#2HLAFlc3rHnV}e~|5-D8?grD`(2nsX*BjN%_~ZS#42D8c&DQRI8Ma=;O3c$###c zlwm?nmKLy-Hfu5#DA%KG0~F*TaR^Ne>f?TKIfPB6SU$0MLKn1!bF@ERCp>ijUs<$| zSOgLwycE<%PSGlC<`-ONi&O@c59$SRHC3zIhxc>5%|REY5hrLVV5L@LxH!k9SH=`Y z7pAt6sytv+D5Tgt2NDsJC-hh{=XA7GSl-o)tQ}(+MI%Zrp|DgPL03tcbVzpY;OI6N zj>|$)Z4oyF;(pA>OPkSHX!KF`uajU-9PYPmu<5taqRih(JPjvLh^LAa}mk`a6*sbhsKJy?w{ zSn-@CX_uGG(ONC4<6uvMv2+F}X|*~mHHC4EGF`;3L(tr+QWip*HjC@!TukWW_?Uxr z%%Sz@0=jfYV@>ybpQ9VkerxgkxQ!2NKb2q*)sR*TY`TQFEm!l3Yx1yu32P-|gUTzu zM8RN^T1=IMFv1R};)SYNaa~pcTT+s>g-_t%1S%d&ku;GKS5RL`n_`M}_i+7jdz_@o z8n>jZ3446>XSht&vRSd<#ALc)TAQQ{@^WmDlmD`!l*c3?om$%vHz7iF>(^LDrBcIz zdtyquj%izgdPK$vL@B2#5PGaoYe7D7R-7>2%Jq-CeV9BJNmzAIA~lYQ4zu5}6iaFF ziqaqjcmpC{AgABt`UCm^o(f1y)~Lm!i__vaIJzOO!J?GP7&b)>PGjWc97k7GlX%tC z3}qWJL&B-p!YxG6<`xrHpUD)7r0b2MV*FvYe}OJJ2r5*S6v8e=x*V1r=F;m6(OQ8F zIsueG<0*ux1pD*FrYIi)QhcKUvHA@U0)D&z78!cDcdEK|yM{fg@kg{5$_ zO&!QKGZuq8Oh`Do->o83_9W)XS3N#w#K~6P(dDhA0*@JG)pAK)3fdHd9OO!_?#vT; znFRckc1_VPQC8UB&83b0sxG4NECfhhv#xMI#nD0D%32Sp$){a$BG$w0iyS41k(IF7 zX)Dihkf~7Ez!AMscCUa89eU@xoks#ePnUNTydS4~tm}mQEQVU?(gsgEY zWHbiw5^-{zYk=4vTw+lD_JAA2Vkd%NTBk}59K zne%jb$28Yn4*}gxm(Jrbd996z@rzt{6$S-R6`7<|w~#Kj)Ui{(%JnB>4vUF$sH{$d zJ}#5>v;EU8wGOkS3=Vb96)lD2L%(9Xr%V1i8O!70sJBRK)5mkiPC66QVX+dp%aXN# z&5{^=mh0|t)6@AUDdFVLk&nvF&fk7sazat zLCY;E5nHH7mnI8hvQ-b}BLz>`6t_iK_H-lQC9`T}O+}eok%XAL$I$gg8BeODfEOB% zYQ(f<4c9$g*Gm)&gfCw=w)6`5^aMLuT0>Xxd^YP*IMa5DqQnog{ZnO+GGbCnxj8tVZKei39V76a?m#xxU4*@mN3!8&wr7?y#tc z1;Z0uf3qn|=%}PBSB8>zDSXen99^HR5@LnZqHmQ$LAhj{+d(Ov2_P0+a=RrSD7lD} zxgC+x`piU$QaYWQLb%ezrZ;mxtJTn|uw3qt6mYXUF&biFo2Z3GIjwY5Wqy0PL}`iR z*dL|Rbtr!mv*wewyo;m~Ru0dJ(o&W*9gr7`HYhkLv2ZXBlrk=XXcBcGC(HUna#FIJ zWs`)JAxdroolYn%2~Tv#VUAuZ>&Zenrf$X;G-9GDm41$Ehy>jPIKmT#nz#%|Nj7eu zBt3y9DJ}*m(EmBRo*W+H`YTLsTvH8tYVxS5tj799?D?0V%tqXp2$KGo!-<^`WP2wl zQVar)2dWV|lS{{UXSnk(5jVszF-@C27GqjLlHL!wf3W6cL@`t`U5Ot5V|FnU z7TCvh$<=6<%9c20`5(4>+^dt~>N4%D)1(fM%XWU7?H;$JtFfrln$TE%#W-e4aosJ} z7&({mgo;kPA(b%V-s@QpOKr`_RTF!lM*N=`yUkcufTnHh%Uo2GZ85m~O7klG3L7DD z*Q4G{p=yeB-}@Vopv=fQt>KS zW7|yv;q)Z04PNFOyKx+wI)WY{JjxkFTlPUMmRZwkJREXpbh2Ebl%-H{OgKNuBZFt- zoo{`2?&suL(JSSU4U1=tIo9Zs$=u#1Sq{$cqZfvcu6q6GnsVVMBk7n2pPLZG1{vZ zZWKYF;wO0rt9J$CZhFaidi#3eBxHu8oEab(oO>RlN~ z*cHCi8#V~XHiFsNs)1z3R=NR>V{u3i&Ju{MMfXXC8_`P}gcCEX_UIg%+X`vTU)Uss zRALDJwb3^40XYFWok|5;&Tc?3!(#*b$tK|hV1=*N1v$UE{fH4wK|v!1^cD&$X#nZB z<%5DoPH<(%DE2EpvPB5y`c=Dt^X7OiCG3Q)!lSvD_HPw3B}?+)SC|DC`0-)Cr{BGB2gb zpqplebCWzWQg*<%eDV7yZs}|g3cI0C36Cq^*Ei z%Naz2subLH!d{)Npp(WSgpGBn91sB)UK=_zB?4%P4*`_-k0M5Snij(hpRTXk6vFiw zRxe_(MI6=5$n_=-hm=s&oUf-}wBn5TS zsyC?VKmtS7lZ5jVE2&73JBPE=vxV(X68;a%?zblkw;uzh=`(>J>+&vE8(1sqaaUXo zwWR{392j343eCgxcumXEjx*@(eZn_chCkXRT(VKmF_1IojeKe7&VlFq{?a=nm}8tH zV_=m%ZxMWZT=0!PWS2Vw;!02})tR9B8M<5!I-5sD2k&%RJ0l7q1Q+1}g%-46(I5`$ zlU@k=K)F+3;rL{9@THS2o&P$8`IlF%CpXrLrj)LwiKAbW z@FjU<*zD^$QG|fP4agx`Vpx$bOAfuJS3fb|FB~%o=#l);w+8;fNRA66C%6a*KisuJ zXIu%ShYlHpyCzmr5%!b>BKsgZuCvQ1gn)SeA`K&E!|S3EeGMagdL>xg%#lzfjs8ai zBj%CO;SWC#fDETmQ=Ot#2oZYT#SBOTqDlhc{?rj{NGCDncCvr3rAN+O%039hz&^r~`c z$@QCg)H;yJ!%M)!MPgm_uspDbiqRb*;oQcfw8GUiZ-fE}N1giT z&V;G+zrP$Q&H~NHCvz989p}K@;aUsPc)F}zLjf|5i3tk;90&kK0I7oPs#RN&^R~?Y zevx8=SI$|p=A3Rg)uj+l_104T4c#$N9rQwwKsM53r9#Sq+p)B|n&JYY9;pbK`l1H} z%N+a_qc?@&^>QgJGq;pP1WoQ2&g_uOrP3pv{k(1nbN^x~fiO`L+R#Wp-iv^ z=mQY616ODw2zk-~`GKL6s<0rdw?cr$We|yW?WJ4LH><*))hAl-8Bjhva zSDyzpp{j#`4LQHRS@K@aZa{bU~$w$1Fg39Oa1$fl!_Y#CtXDxV2);tzRZ+;GV@X6>!(q z41v8B@U{`V+aP3RO-;##O6)qt3y-Hu(R@mxXpTv?v?{Ln#%v(W_8B3=n6)&Hx2=aJ2TT%YRw%C7?v;gP$-x}>|V zhuK>p{Lk)pF(H5u5DSR`IOJ8g7+jm{VN|QP{!3gNPHj!c*7Ofe=!QCD>4BGeWg}M! zI@3FoR(J{7+i)&&%7O?KaE!?LG&NmFTeL-^Xx%L^XdW5ui!L6SAbHs>LMV@15qqdo zNf~of5`WQT&7eQr3evlhii)>byJ2ZtI)U3j%Rq)`3-0W!rjje1WsTWj!1Iz~mQ>16 z=XPMQk_rds4cud=8y|Pv9bgsQdeO3`0!;V>Nj9vCydtH?6Dc{8-ULimlH1Q`WStvs z68gY;yLbU$OtNZfv<=h9YCh*wBo>P9MUVe`pAda;qj1MW*L1&TDTsY> z0-)B;y-zqky>h{rb-eIC;T&%rAACO35un8V!n3AixFM|o=Rq{1QBXQef_`>CJd=1- zG<);@dG1d3=(iXHY|BSMAa&ckqfvg^GPP&@$F2?kV6CIefYv_Xk= zbmzB)LQp=dwRYh;0Wt!DqEGzJQ7?`AzXQsLCx9TA@<)y$mrKg$F=23{-j-(U-!>+Y z8EoPJ5CQS9kUn+gW5W5FRU4V?secU;v2<;Mz}^$a&Kfx|)EW3=|GHl7CxN}D_Ap3x zynE}xJ*89>le#g&6))9QIEC*133H0^$Y}aZz`=g}638^)@>AxvVrnyJRxFQTu7Rlu zFmCE7u#~1#5;XZkc%bsgC|t$Bv$P0-gctshVPS6%F6%*mC2NDofR-K$Vw6>zjiKh# zFbqB!AP+XME|}M!7DCFMwLJhV*f3A4gw_>sB9N{aWpP4nm!X$`1fPIMMh8!uT=SX^%vq~R937j(B7v&YVUah?tuI@R4mVT%T9L2zsJnR*6ss7 ztkIbExe6p+wk2XQsGiWk!z`cko&i4mHgq_81!(9F+ykF@M)(;}JeGDZaAL2u;K&5? zm{Vb{Dq3X##oY85AuxfVt)?*@{@D4AnbG zeO;$du%o&7N!W|LHYE5Hn0uEZJ~woJ^CZ}Oxp>{1*G%XJw~b}`&AoNO%_H9&`hYRH zU(r3#CYP6xbg5EiJS!0gv8RKU^AFTq#fkpY8amP=Ki`4wYUcC;s!$7|B+V^Y#r zpqz0TDX~jr=x;v<7CbWKVf`M4%A}d6USwEU+vC83l?9JFTT){(gQRS$Q*~`XhN>@v zIPu9xKu-VhW#F+b*dARz*?78Cf`0Uiqi9&xICuIl8RML^{RxgyP9ahHiHg3Ij!T+! z%a%ajdk!YTBcnry{{R!Q9J7fDY&{j(T(ewYtMYj;V@cW!s1uucF3H>L3EW+kC<1A$ z6-mp`sV~5^_~fpm5?LdCka`Lyr!;38mRh6Z)};pxl{#^{TVL zs@-N_Us%lUlEGh95OGB?k@E*KfM<)YeiIJOl~m-clCZwc54U!D{{+vRZRYj{xB{{J zD`xcj%W_p&CwBNNQ6Gt@Kf{1|RKS56+TA{L_e|%Pe+DVpYHiQJ9frL_6{_I?S*G2= zkW`|9ht}(V6wZ&YAhOS_XV2QbxpU@gUB&WE{uJq|{hWg`{Za4=?~8 z8SQ)WS#V)ry>mOd> z(Bb?7{y;NEMv@j=KBFu_Rk znQ7T_W<7~Me;CHWBZJE}%8Ub2Ho*SA4sHLBD^5jkdzW_2+e(n6(ccNTw%-=c^m=-} z%e?#Ckd1Xc)4jV)DE8h_uTPJ@2X-gp0YFXR!01xCa2>WR6LKSr-_#09m}7_6;e=8e0~f`QOY9ZPnJ! z6ZfqL-}sf3Xb2tup>P;b^P-U31v!XW8#s!cb+B!T0bsO+EFXe-dDYg=#asS*jR0Mr z5DlUo9{~@r2Loz2lXLFGL$rzt0!XRV1Gzug$Ka^x zYTu)b)cplOOxxR+bBtGt){@i_0@12c$DS%z3q%1xg%a1D5kga~*TC)83a8@e!yXYN z+pHubCAtkZ2IDEp^)mlv42u&bOz!sSacx;4@niszOSA#~rB5_D$!kM`&3X=(&eSgg zTslvC$8!A0N|{>{#~%#9z*jZ_N_Mu3l0DklJtzWQdu|&F&vTdvNsG~%m$$H}+bwOy z!M1qCkO-XdE2%8N!PqeTGpH5@iilM$DHEoIs@2wH#c$Mzp-dPmjELr^_+<9q-yRX^ zncrq$h}h!Sew(e5DQ60Wj6zc=#>2=n2J6S8qJyW{ptiu62rA8ZW27>HJIxkd%nN>6 zEx0%*;P?1s$OTh?i*o{2Y~<|aQr2inywi4!>%i=?{o9r!NE&yE^(tCl7ps&p^!!>F z0FR7jZ~6|#xnLeyF9I97`@k{F1}EOv1|hf*ob#&+0jIH&Yei7SdPc-lv9{Jj5E}!} z9?S-Hh-@A$0Z^I*I%!4(Ch65%k>Ii^Bf5V^bhOZs(G8*-r)BcEPK`Tgt*M@s)|EyQ zJ+=Xc#UrD4HmH|s)!)2H1Xic454L?0YFB$fQH8QWn#n&_Vrczlk!WVsRwTImyxnN$ zWjJ*-fIPO8wilk{fk1vV2fL9+ z?g}Kj>d?$YCp#|!*oFD!>v2$vb4ZZWDb*G}M z$^gi=`&bc_xevAh+={bxyQ2^T$YjGrYB7kfb)abl@Og8WXnK;@g!b9ScC$&1rriu1 ze;XjSID@q<-jXB0h3>6dih1f% z(gkHuRi?TFBJW_4Ac5@!(bOcbsp|>uynF(T3LX&*+7uhiLR%t69cd`%4S2Qa(Ad)G zl3CIG#7Z)9{#3vr60T->>J^EY%f4v&vd`O`uxB+V9c9n5p6zd+1na%_+%;>?1)Dlx zgC2>!px=I}^8g42cemny{H|aCVkS>sI)Z2h?Bd@cMOJV&9)J(YIU9K&os)+ziH{-= zTy}gM7unE|1XP`^#UPgWGImdlhU9ht$ut5mOHhKYIu4e8uSCS$fL7}Q2KI~0=#WHo zH22`JRCMDMPolbVHiMp(!ti)aU1957^-&Qn8aK&d>xUpD4qRk_mIK-5dRH3!%3$^} zrI?XzKzkITiH%3;f@WWzJ6a|;I0vtt-Ls_hLNq|pFiv|0NZJEcqiLnsrni!;;5~AR zXliEFF7U7$2Qy%2YzsQ!)T1iC{ili;2Py0sE>@5y#GHIvPJ`9pH7&&oo&ma_!Hl-y zRsi8)Fmtp`=K97|tmzJN7XX9d&yl%WCvo12oVZI+z5n2_3#b-MwLL=@|5^ z2EvxFcP3vhLD}sMt=ueEml8Mx^T3|sQBm>v%g*S`8AVWhgmOb&Pp92lwq(O*lU9bF zb%|!Si*d2!2#jy_%3f&pH90qef0{(#_mi~6%kL+bBQMPmm3qyg*Z2w{xFK}a&52r= z39pU2D<16;b*&B*nWug7@)gjnc2G%EN)h)e0nUw#qLc-+&`K&g_^bj0Ajk&5y;ztF z9NA{z>{x8$vcnvq2tOuH#w^~JIG04{sNuljk_M9dT$NzHV1VjaRU0G~$vhEj zic@ZJE?rNdgGx9;cvN)o&j>!iD(0G5wP*)xD_aB3N4CbxrCsOa4gDis=Oa4HAsV0J z$rLAUS2~U&Zp>W{fIH$Y(V44C45YHJkfW}Ia2LRbJt8KKhl#j`w3!yTO*~PsFauHz zn7`2pUgjROYAc{1z6??K4}g{KkoV{c(brW6#IibADGwkekN8%X60WkujRDXGL63@t zkRHHqHj)r>19hvE@TAs?(b^!4Z}nF6oaHP3n;HDtS@E(~WUjp$8(g{|BwLe#mmNSy zLxv$MD365TObD&o1?2I78KQcQx&-^rgsb36AzKze%UP=n;F1U69GJXaldJBkWo=?qFbf_TMug`{nH(Y;KZ%N8wKqf_&Hqcp6F4Cj+vkbKM**T{=<0zR`tIp@ zgpo%8c^!&?$h* zEw<9|1pjSB1TLjjS^@fb-6l8}g%=BUo(d*~bK$16E~JNwHl8RTuf)=JJw&;9tbq1n zLWd)wP3X;-XnbbX4(PcPUh;Jwe`fkr0s6OuXc{8LfwL2141{P2kX&yY0>n|sy(_W-K?war<*fO9`cx~vp=`hA^y&XBYk-!HdY!KN7 z2QY(()L=sW;9!|X&Tb;XYf7wsdE}fYM76Gr5we!asVY0fR1hK~;57bYLo_}0sV3|;%N_=sVtq&5 z6hY~Nik5)5D}^&wwK-{RflQ&BTW|*R$msANhPqDijh&hEMUcs3Z^LqO23@CIlQk1i z=}?s?)jrxAVRgj1IxHuz4LLUghG*9hdA(%&`c9!P0t{wzTME~I*1Sw8o61(y5%nb< zNkf)Oc6sekz_ykhdBm^mhMqgz2Zz)L>o;_+uZjT7MB9c2Yd`n|%w!7nltdq~R(4Stj!u1>gxSWs?2K`1O#?DrjTrQF)Ln!+ zr)B05yOIn*hyXJ^x^V_QQx-uKKjY1Qrvj{uZ30-aQT$2Llg06B+9fe%8d$ZgU@zQP zTmT=A--f1B^8gwB^z8c18yAQ^!#qs^%aS|Jc|yA+(1DANBG7;ne9=_rp^M;s%AgsY zFct!*=R*T;bZf+NXhx{HPc%Lq5!Vta!fKUCo$(kI*2fXr2eajo(V;&BJ|E;f%yjxc z3x=evdtr{OUx~=d3kD+U(OI1GdRmc*K}A+zz#}8Uy`gT(+WJoUGDg0vZ3f_vV_~p| ztyrLDgWTwpGzoQKl9#|eh*(Kx3d8K`fWI{M+_j>0$h2Ry z?$b?&&H_yNS6}n=qgSrmG10kYKS(6FCQpZ-=UkH{VOQWXyCbd)D|9u99Nl^VW&n9% zN0QOi+aTMb@S<-Jowsp*vNQ7qn8sF1`!tY4b{f&TOcADy`nptVtzl48i5b&tpBJs0 zSlPmq1_Ni$*LH90XfJ1&001C26kif*M&d@3*JSi6Ov-o~HLif6@W@cetiOxly{YrY z70ezllL1^$cvS|UBOlG^{b6Lf68?=xM%eBXJ_(sw*LmbhxbCezux6|Zm_yGF{7?T0 zy+Of&2?O&UC<(S*Vs0CjcWpCmumB8LC{ZP(dXv75L^C@ixLk%G8LGOn6Po?{sh|ot z_}#UgN3MsBdklp7K!F*~$&xR-iZm&UCmp28XD8JN>R+x$S6l~D&1*v87ao~oy|CbD znd!WF9bBfjGKf^{+9&ZK5hHL9)c1@zqa|yMVFf|NJTfZ2-`6eeyS7t6j2vr$1M9Vd zoPh|2>7437g47d~ONws!8mu9Yj1K+`94!UOiJLkbzRsvNTU!IuVOiv{WF+XLivefV zr%UGvb~=S?;L5YI2?<_}~b(Kon8jQy}cMDDA1{rDiF*`iT$M zq2GfrO?|q_zjlssf^F=mzRD~JgGI%TB~hZ9S0VfQ9vNO|fCAR7JoEOpv-;3)4(^)jJaTVWrX+0_d<6EzQf)=^l1w$|_Dl73 zm61Z5?f_;yDmv_>jzj-^Y7Zn#F@yf=F@j=d37 z5|4}yJqJN(Z(~#++JB?ypDeG!PlSEwo|{D5w&86D42y-4fUKl;1wsWyqj#u?(|rlQWNH3q)F>CqkMQj{a~H$O@kfNM2x3d;DIy z5251y=&;+ zzxSNMNV0>GWG1Vem1JMTF4K`(g_eMl30|E=g0?*jKgJ`YCyMXyLjRnd-`M%$!_1zO zv;ot32}4dNRg-wA6mQg<*<=~qGH-vI*|$70q_*_!MpquYjk|i}AA!$6v_l|o?7VfU zm9Pcq^>4z~T}cJw@erVtKOF5t+HWm=(BuQKf>@i$zm{y4h>TDLHt5XZxU`v2M>V=y zG66dtwDjYTh^D7M)z-QG`mHK~K#F!fCfWfX!oU0>D)DH-P3T=EonB!MhDvgV4ctRl zlF@T-J~@xh`2HR@8h=Q154)p&^AJo9Yx`hwr*^Msj=Zu!;|8Br7Z3U%%L<)zKd|Ca zAuy^vhc3H+Ni^>IW_OP>x$>;0@QCB$6y~TTlunEWWrJjQF4V`2Bw?HW1{&DpCSw46;ej;Jhf+A=i$dhy9ELa z{r0<}Yr%Gq$v}2CB*wri6aYNIvWr7NV+(!xaquFo+6tD=sg0di3v=-NRKxQ#%sfA> zSr;VMgfb8a2+vL^dP|$&{pLegKMv2&uYON7F|%q11`riIz(W}UvVI?4pI}U33gLnG zI1LVRNKa|GD0oj{sP=skpv-={746$|#%6Xfv&yBxK$X`Pc*3E~s0lcv8KVuDN3{}^ z`~et5R&VVbe*Ftqci+H6OdV0yPY;F!F}yy3krh;3_Z4{QBn`Q4*NSNRay{LGf2a^V6RqcfR%t=-SgU{FJg$uCi6jm4-TEENT)8 zl}i&$7mZCa96TK+%p`NO6Sf7t#XK%eQAS5G7meAX=)o6Ym^?Ci;xG+bR5sj)?s`Qu ziT>lhQ}&|B&qd#0m6!CzuG%?onQJ^)w285ht3j6JW=a!Gpp$+HTzO1 znT%uRigNEu-GlaAP=c&)&X&U^7-?1Ot3eB$szy=iMP_g-sSs6|o$vhgMG@3oVc)2~ zfZ>pBCYzr9E$G$xBt6||_uK%GvK@VI(xvMAH z2G9;}@(QaF3lk2aL8vH4Qxbt(gEyE_^T_D%6?e>|%o|I;cGa6O==0hc;KRmJ#Qch8 znvfc#C67C7Z^csRvOkOFrubxZ^+%As-v1Zo#YtF?fV|Q z9DnnsXx-$eTF&X8zwOPB_HbX*@@EhVyiEfq_L`}aI^qhFqO<{R+TDO+UBTC2@px1y z;PlgZ^v&0nrt{+KFdcC_1=AtAN4_;?sFg5FGnIg_sS<9BqtsiXx#>@lJJ-Jgr~TS6%~ry#_hY!lT5(nkDThWOCr^iXHfs6vR6?4}G zgJ|JrdrV0GN6~%k(6+tSy`lgTId?^AR0yaTgBc{jvLP)^VdxO{k9FwcSK(>PYeG!H zGW3I2m%hfEhed$hI{fQ3UlizihMyX~cep+A(eT1>a@aAf7#0qX4!t+@^3eB(?jBm~ zS?rPYScfhgiVxX`WIg>8*A49$8XA0i@E3x=3_dQna`5)Ss|Fi`;X&gdHn@3EF!08} za{~_#92~e}pfYe4puC3_EWq5d2CFYhn*hXCbu;kf>FegEkDUEfdp zzSVbK-=%$-K5yUYeY+-p-#5|wx8C3M{;>BOy{LCVa7!=M>+Fg5p4uw{42YWG92oPj z0UY*O4ji^TdFG_L3k`dz;03{>J;(H1*z;7+Jw1P&$V_-9PMesU7$5)J_$%W-82`rj zwc{6$Q{#?t`S{L-@u9J|$9^&P#Mm8U0A(^38?%f_Mr&ioj17#wHTv_>$3|}*y%MX@ zQXQR7mOZkq=XQailErXFPWUsCO0sNAmg>nZT{0y%h~2m{76A~{R5Xy1^Wnx(X zvv@Rq+$jqbsr0%=7j}vw7EG0T)~zUF!B{PAz$St{-G+pr5VZYYewIb?qWlSWo*;d8 zV53qs18EM-kn*NHYAhsIIwUeN0Xfy{@9d5zq08#Uc%$xYE~ve6sXZUv{5abn!E;_L zf|m-qhBD(W$~LpOpp-u!g)9Y}3=u_L-4LT@4t4v-TXBt#a6uT6CZx9pGwIE@bM#b2 zhG&&clSV_T)8I`2xh>fX*z6-Hv8!colyzv^A53Oj1ani4hD!qQ0Dfiw`#U*Lrg%O&$!H2aV#_<;jtgG|6q)JgP2cK4jYMl&W%&! zy)1ttp|ScCRktIZ1%zaJ@ITn@hG5xDkWOPG9`hK=x>(;ptXQ?Bl%7N$Uw>RzG7~LJI9K$P!%0ly z$OQV1?{Y~rGsZm8N{1ID9#yp5%tS|i)SYaiR&q#k5qa8EN(7vAeBB1Nf4)>oV=O{szRWcw_DKnXujI(l?fW4z4 zWhPHkoi>?E73ul}%RLr?6R#Okgd%!Z5W*#fE@kOaV>XGY4YimrYba!0x!3Ps_(=S$Z(!Zr~<)HRv)r4Ze7El0|e( zcxnzmZj8m1Rk2p0Zb{bsobB&PdyJTb&g*hCZmC96Gv8zv*{!VkqY9}!=30olazu1! zjO}k%SHhSg7O!dw=4>HKk8)bs+NkTGAgsM*^Otn-DmlY_6_cl$Cc>3!Ru&4-0VUP{ zb(W98&=lh|X_H92$yN(XZG3^HLwI_Ds5a=5LJujwWnx`|-Es+S!eGKmtpx3FVezV7 zI`twuP_0^Ga=T=O1ne)hf*4={z!R!Q)J4$XDQ;9tA#E)(-D3F@WxR|P9C%qAff7s_ z>8OpBK@1OIC5bfcsMunZa)gsuCV+b3$iQmA%YrSTPKeWmBq<>>#%j7@suvYKbayoI zrd=7Zgmjci9?ROLk}(!iI^OWdBc!_S!@Sjc#!$}mp5A2>uT|{ek|aZ3D&`jBx#-Zx zESnk_T#bdQ)e@w03v`+sWLGU-(Y8p^1ts(1WHE=SGJ>1g{^g_?Q1(eF1(gt-WqREs zEV-!iIVwtZI8|;sR3Z7u_AXv{yg+Ljn9OF@1qg^RA|yh#cR_6rxg#xK%19J!WMa+r z>=+mFsXU1#bj60Tju!*@RL}iv|Gd5!CXF(mUQe0IhD<+;avaZ9DtV$FO$M}-v(RwG zH_Wo#bH+#n%j%u}kY6D-M}}%F`?ODc*U#J2?dz-GSm*Lj+8!JudV zD><;x(w716U87Fq^Aap)P;B4UWs)-K05Ur7&P19vg|=A@AHzy_${m&}$%aSnu{ZoR zc`3H#Gi-mCxzNBWMqkR}*VCG6r2j6K?vUE`gfp7``$~Y*+KqzdlMb@$_50zrQ1V(w3;asCgNMq5l4QzLr zzo~>nO_DBX^(u3CBa5DzlDQNM9wKf`Tf(w z3%yI#YNVd@;Q&9dV8qk@SY+cQ`w!J-vV`lDYP&U}mFOk(diIB@f-l;_qqtOCcBXVG zg?ya5c;(G$Fh@llDQVM21fo;*?tH0Ss}*i~3l6y?;C2y;0T$<#$`pfO&h%GpSd|Eg zRguA8urU8r1`IVsqXyw_*0R}YAjVjgNu^}<0;P?Gs75vg^}z=TmOX$4B``e{YF1lg z@(?*;X9rK2@>*K1fhAnVpKX(dWfSc1mgiEV%B(i8H$M@N>GnUp8n ziWdX;whqGX3QHD}sYIiQlQvy6FEu&EMtobL`w#J4i`L=ctT>a7nUp%CY}*O!54gjM zED6`d7~}=3nqukHZR~_sgqvw){U@^Bot~fxPZR^;P{LZ%YNJy>X6bgBwni9?3wTr+ zu@m}AYV8)558Q&I5j*WH#!BTXrC3X`{Vncv5Dyz9SUIYbq{Z0iZ`tk^mp9_1EX|@k zlhf$ZgI1Pou#~k{o84O}TVS}+33ew^26fhgxvIW;3B!|Rzig0rfMu^2mmQb~54$J; zlM2@9o)=gL-YJX&@5+%EdtV*i(KEK@l)*$llt;axcPEtPZ8Lx-tOGq=j}}}+xTZ`M zN)l}>8AiYU5FXDwG7`Lha2|d4Ud;f?Np`L4*#05vX1SJu59>ZjgySYH;VjAGno87C zqEqP9zk_XnPlo842v`{Ju!6yDV$Ve9_P;Y>i`I4#7_r{qkc|p^2!o~4swi4m5K4be zd;kODkbjuHKGKUmd--f~P$Y39M z23(2Cu|9Oi+e>ECpT5(z`7tOqtg)_ID*JS}vyzn*osE#!iWc4nRy-;?r0eNoF7zSG zU$=68x{v<`77wD$fXd0bvy4b=xxV?;Z(LxhNBL5dz~gDV>bn8InHkCY$TI<%u+XmgNdk{hBS~T--BWD$ZUGm zRd<}-kG}D-Xbhe7SJB(7F-848jFoHyCLlNMxRvtNKo8WhVl}U>#%VP4E->Vg0krgu z`P;(pia6ug=iU?T_{v;k6O+RR2vZP82!WJPb`7lU02&Kb)AseuZCt!a-S67yy?*lLr3*;NJq1x%I2HqE|zkxfr;)OR@({OCAV2 zWV&?Y&0CQ50;o{dmX5MP2_#hQn*)S{)fyoT|FR97OT@V360vq8#u*Se@Mu7ApWPFM z5JA9>Nelp=RT~-T7;r)`VR_7u3`;|TvV^H1t|fw5CgKum%0cX#6~JFmXlM=+a8_+a z&%OSQr7`K3#uU<6n<2lo$)s0WTTHAUl?iE*P@H`P7_Hulp1b?Vct!Axj4|u&Hv$Y0 z)PaTML#8+_09AmS#YUsgi~*4vtS2B`e(X!VKOgx;&%hdD_?W?1{~cE=H#3km7l3@S z!4_I61ZWb3M=!PJ^|^{Wir(Ec2Z&BQGAcgsx#Q3k-rXBI$<1?0D9P16AG8juvuIZW ztE#bxHts9BrCAz1wPkL8VkH$}FaCJGvwiE_Sxm?XgY?DzzD(6Ln{Z{cfU8V3ja-M` z*)+Ef-M(#Z?bN554heRgh#n&5*L8-EnS*3ySsSp++o$F}vCa0Or>Ez(f$jq+98UMql2XbGp$c`GxZ03O!%%2_ z?cCfXkBo{py*%GJ_uV~9zK+kXn`68SfVQ_ZFq1+?5T=;57Wcb?bux*_jm*GSl2LK~ z9wzt@igP`F(U}+3*m^u*R)$As4)X0 z z8mbSSJHD`U?EE3aka%d*(3-*52cH}K_TY_!2L{W7XAWuxPa51f@XvwQ2L5xPGw|;N zmks0x0t0&o_6$t-f6#w;;)DJl_aEy2YX83eRKK%d(LdWi()VuPOMTz#yR+}heXX%4 z`l5a2KC*9HUw`jkdSB>$bmD8hxAtDyTkAcySKoVb@5Y{g_PnO;dA8@Fo*Q~D?shk0n#dC6lsKal}8)DMx~Bc6P8p?Q;HGcOg5nyUf}wx zLVgSqT;*6LQ2IJjxKXM@s>v$OIWJLN-H_QK4Fb=Zz6;x0iCo#)x|_9s%0N2M!81i z$D1L0+~}4XVQPE*EFW1@RU;B4(W*NaNK=+3RjiTID5L5MBBPc&NjI)=TV&^P{V9)$ zh*bSvb-7T+-E!^!XY9-4L(&?nLld4JpJG{N#V@>V*z84_8+V_1I zX(EdV3PdHhRYnO40YNk>l!!98F*^EF8Bs^&2gGe$_&H`2_hEkL)vNBLA05X(@=1Tr zy>;GQ&fU)PJ)a!VliCRGsMm0|8S<4($q~4)<1(#T1*&8MZ}3GuSK(Xg)L!p}G}wHk*dotHt_sCF3Ps44brhESz2ySJ4A{B27|+ z$JVUt!_g>BtpD|Z&L)d*R zHyV?E0vBM3$Hhc6X4>Sa;!aE0;P3`pgf%s=LYQfz-AXi#+IBEmqyvUsLK>ZQS~G3% z(qypWY&JTftUXRn{!FA(jV4Eh)8(4a9nQF#BqIzPq}?%78Iy`IFtJ80R&r!o;O{l~ zfkRs(x^}bAVzC$rcW$$2*D+H%K218iw7Q|~@?8TvdiS6{QwWqvPA=8by&0iW5d!TmFpJT`fmFnz)LZ8cZ;$@#+bkRco;7tnrQ}%YwWK z14J_UFrn(^;*5=1EOcqs@U{UT90pWh(8a>~C~3E9MeC56s25VCJ*}=A{8*CH<*}cN ze26rj2Ne_^v)QuRhAp>inI37_aDQBFF~(@4AxmjRwVIg-gvw-)v4)F8%m~i-7r6)W zPuOiqDo8ji@lwTHio}Vh2Oq%cAQ3L*0tv1XZbY&NMBSGe@3d27Ek*e3QLb#vr1d$m z{dgmuw#D2bSE-vdQS?>M^%bLLyy|gSnU*#Y^(3^B*};yAXERNfUhL!=u~f_tW7pTVz%VYKMa_=avD6_t;H){Unb3&2f~TFK-1Gs)}#7D6U+M(+kQV_ z6vI3fpP`Vh6Vf5@^%frH0 z3MUI;t2qWf+5k*4CN^gg3nt_3g1X6K)~1(9?|Grm$JEWn)wso6;`Avx*Y;AXd+nda?_rCgkw6c>=GOL;n^+hq5sxN6(zV}`SXkCKrLUX8fDAtTW)^6Y_iBE6Hz zrpZdpTBb-NOU20{ad1qK%E?5U$}xR6-$<6S+`On!H?_-5jc}NYG0xJ|2EbG6h^P-U zwUbPM2t=y>8u;>Pu;_kq2QamR40sFcP0kEsaV0{`&|q}hzK#yJnyVeq!g=d;>cC}U zgW9f`o=TN06?fC3&YD#0zYXZxkPgx-hUsQft*^JpgKrtoiABajdO)(wgr`=_rIhCl z3a~_tWWcCg(#P}ZRtnRJBiCyCvNR-NBTJ<^s8kLg6st>fAB_KeK+pS%grDoGTsEqr zVX`xC9?;WP4{lI(bdJT6QD00(FZj`*AXUc*$e^Sl3RaemQrw3I^q7GoT@K3APPzhR z8?kdRV=aFjr?5!Njx{^rB&@n*^PruCA(S^$V1i9~OtH99G-R2YwVVzoR9HUWYR4g4 z@qy~1$iG>LcFCM7ZB*wnnsAsfiCc-OnTeaoRHa6SR9YXSiXCP}{!NwBsB;DQnoeK9 zJDJ(UfDNN=<34vLWIzNHEKNkF8#!NhDL`VlNy}+rb;Di zAu6<|3kdx2fSsHXe^e=(nv~C0bLYYd+-!@HxA*C0jj7~YBpVbH&ibf`Ho&;W{moR% zc}xUW#o{rK#@}dWm5+#wAn{t0@Fy%;ZLS*OZBeyX9E}=lbGu+2`3+n(7>;XS5y{n- ziuS}CI!`s3?$W9&7?DfWm?KDt4aM9!H|}(HqPq8r?NR61HVJsW;6BT1!+O&7*$I(R z9She>R0)#yW%5OL{E|z>`j|iF!TER`9^F(`ZBsd~+6>vHPX2uRqNz@%LOA0OYu%lc zxsI{ZkBUE`+nkzA=xtRU=D`3P*e2%fGj%91&@xS;tK%IO2MJlr27*+l;&GlVMVPh^ z^2_8#Ki_YWS>w}c$hZAz;SuwK>@8yb?4JY0)vBK!jC=4Dpb-kDEHVs0S~3v6R#7u*cX`a9V7!DoAC(#otwFrLklr zoC$dPbW_t}%urdanE6qf5UH!;1yMpE>Uh)9a3Rck$*#HD;dI3%Gs$i z))X@@nvYBk4sy*qjbTTQ?f8674qFH*!M1#g6`4%g{IMK+w;@brLggu7^rFeNn6Os*bIbD|m1RM)x#M8O+&>ypK| zDU%-g@Sr{in3-hURkkt}GsEXiuL$%vY0a8Qog!Uek)w^Sa@i6)Z=IOz?dhRO^TyE) z)JSajJrnPiJw5(?A#&-%0HEeW0tRNMk7U5ohLn!7G1g=&#?@mG$?*aUDhLT#h~$9y zN5#~9&&bIkPTz(E>`F0YG3UvIamrZ9)i9miQvi3>^(uIVOUQz|YClc=wq8R8nw6b) zB!E^9;*)$PHc3#)LdvGgcAFk#yHc*4PD!b!y3?S!9XUAHd*(`D0cv(6fL4lXb^~LN zWvIBvQf?M_tyjgN8!m@tNXY1@+NwYohatA;*O$w|(NI8E78}88Y+jB`Q;^SwQnftG5Q3JIX3qMN6NujNv>rWI9p{56Zw8%G8jSV+i- z9~oElK19oh2ddb^mxKQ0>x`g(K_e^r7e3Oes4RKhUo*86yoyG5lA!WhO@&BqpQ85@ zQoigkx{((2FK7swB)U9SqEwh8h(e+4x2mHhf<*s@%jMHj@_SC5gkd3;)i_R4z8t2M z7J@t8HU7P!^v2yA(j$)#|9;(Nf|bJoN0pn)=AP5%iQ%KCmSG$ONq+(B^(?E>W1Z zaZSvsCwX`amXbknAv6KvAo^hDBIUR-osGq? zP_<0wb7(;WO_EU2@y{^_(H$E3An@g5TKNU@<0~Sia>deyYDnWvwG$b)J%_fLL8Mkw z5sr2$PgKqFfpGSfgCDSfa8hXFN^6{I@F379$pU6`#qbD^%7=l|YAQN4s)2~8D=j1F zTZflt3&0jZd5HupU@@Sh+{{GFRNf0tG=Z9z^Rp=GfZ2Kjxwqtioks}caDqwUGQlVR z==k@BU*5QHLu%xcV1MgN<-T1v+Y!Jv4mO2KKH#nq5nDML@p-)tNazufZ`n<8EWxs8 z!ql~^s-dH=LQc77c^1G>Ph7OMcYRpyl+Dn7wW^C}JMnat30KN|pOt({LPlz^r1iF4 zEziopFy{^E{U#$MH-cy#?gSM`S zw@p_HXYph>#QWNnQixQcr@X*fN(Q(>2nYSxo8^<}FEdxFQNkx5cc9-bCR)6QHzdV4+{2akNo^eNx|udZdRPQSbpI^wr=qDh2eZ?nYe*Aa*d*n zv}@=>!*5r&ARbNa0x6e}#dx&7Ci{b~%$McfPKsXwd0A!60~a6!M`Y zB7$(TNvIIMv`cZ~&fv1NeGJW_O0|hhoxwhBd4}TeU+3(l|!#( zVR5deq9dQ$tvK=W&vp!^qLzn_lV~rrNE|*kT{1a|24CkxYTRp!$I*=`=(vQ8W=3QR z^!?OwgZ`QZHaOY?Y{dAujJ25Qk}X#umt>nb@8Z!X^02($K<@oK4@bISAuh`I?br>! z7p)L1nJsceu9HhRJGn}U#f9H*LA&DenQ3VmI{7z9eD+#iK83=MK5`g+GQKRZwm4$%VM1yyqoEMV z=D|vbOGJt~<0H8`st{*AZjZvsk z7YwUwmLh((y=i{eXe`6@p7EI!6l%gZQN^Tq2v7O5;vira=>kHEn0IiMaG>{!O zkb?xHX=LpJo3%>OCw}~O!0etZ9X;Nm*6||uJL~x{-W$ZH*Vi>{m`zFqu|~LH+lhGOT5uDAf*)U=X~Hg#T9fu z9Nl^^NUMa5oO>)4$up%Y!NcCSxDLNE!0ED`+6(w7CgCAhsZ-#S3LPqX)j4FD2 zZxQabR&=q@hkh)dGh=WwWYEl5I~gP6WMU|YpaoJgT#NtZ0GjA1wxX}0<;&ZvOY%L! zDRCii6Hke9qQcb)y)Vo+>zsiz=27e}7!e5>?BH7tpwHj6yeFT!TjT=>ngc#HRn?HB zRGoG_n9rK67=tF>A?zuu$>`+iZz_6;cdR@v?z}@_q(T7QI5@A_+<|ElPnc>Bu3slO?G=XNlwQwXps2S-LGRnCM6y92!QE2WCd$e?4l0y7C2@#?og zg3sEX4d}I7<%2-`^WVPm?#T%^%)0@eVb6xd$a{x>wC;kTobc{(@4lHt0v?WN-wx5q zT7blxF?*|#RE1hJ+PA%~n0W)a7ua6c3Fq5=^L6lmLL_hyC)K1kY0BVjX(=VW_NL7q z6*z1`ug=$Jrln;NwGElG;@j&p=%aHt9Y#0rs1L4W!JWVsgauG>mW3sp3F&ag?o^Wj zMpbJdes^6tRbEX+r=EXWdE#@s>w{~+sXcX=VmrctjhK41>ugnNobOUmrV8;LCx@)CJ-WG1By>1qgIc2)&;s>Bv5-L*vOsDAG`oPLGKl%6s?rEY$ zeUs`YTmc+2>+=;3{pzE@M?!`bMt~ot@M!(^zKfg)Jt`k$W6C}T3~40bj)}3=xn>X| zVM9$k)#VDQGTi>+kHgjW4dmYYAD4@<)w+Puz~K=M-E^_sC7pN*13O%ykSu2~;nK&h zv^55~41$DDr)pMp&V<36K_?!Awo1roA9pLLL%ypTL61EyywXl@JB+*^TfX!jc)Z_W z0jW$JNY>ucn#j01LTQ+|&X|a!Uwjz2O33K+M~%u8nvX1BdQ%Vf2a;K7oG$5&RH(cy zrlr|b(+gM?A9)biNXQ~q#c%I;@A_jG46jEc4=sBe$xi@3E24p)ct*Ow^>QR(@l_}KamJhoyZHx1v{ zyXS^W?gvF-6bVp9Z`tkyg^bZs%A0VA*U5zRe%e%pEM}j96)Ghoo_@mCW1o^kf?lUF z*rExmgK*h2ddyoT(La3_ej+8KnLlQ2z1>gCJpk3}^cK6ZEbfU#ToJ&kKsS93`Xr%3 z^6dxhJ=y0$Ja*DZ0}?N;M7_OS4kQUvLC0otScgJaJ^??LP|?x*wFl7$o>(4+{)Y6W zC;M7NHLw!*BNrX3Rt;`YvNSCwV=95ZauVKxtEr$xJft}Gb$|`J;FHU%Q1_|6@EnF= z6Qy16sY8CpyusT|C*2JPBwUI=1JeEma_{}m45XcMu|&RIsz+Jl^`8d~$Zp8jzUU2~U~bdjOr} zCW~SOslE!IgB*-L0e;#~K~85%@L3g-mY|vM$mjOc+*xY0NN}yH00ns4*4`(!jdWz_ z%ID-8_63)pHt-gKd~#;Uq9Nd{s$sa&1-s4-+82Q}#i-6`=+>?Z3aZIf?cMne`NUjM z0MPW)j%>IKd2}HUvyiMZo&~fI`BvorhJ0#v%^K+B(HBL^oG*cac5j=C&Dn+M${^9=nv?H6^weEKlm#+WD_;sTXkKH2MD;UkjU?*}SJBX?H zJTch$fS$xDTwU;Xqa_$rm}D?ntR^G;KVAmR${&Ks;^gy!DzXewsc{m=i~ghmbTh%E zFkp&lDH+lTy?A-=ZQqgGWjo9((A84;?Thsm^uzCgK1EuF++XQj+2g)1hcs0o1n5%( z_-k{!gt0itI1!6C8`XFW9shUG$-Mr8e0oY!hSVqi2ks|AhLLN(EAR;-0K*#KHgc@R z3ov4pX0q<8wkXJ+27CZtLPAC-?@(OT+wucB#4!XBfL9HEo^3#wCT{cCI&HA9c&V(g z&bFYteh6KWmZ4MMyX1=AuYU+l*m)fiko!bviZbEAnhcYPIBFKU-e!>RMVJ8z6&-*7 z-L~F$Uj%Cb{MfMa<3_=j3FuTIby-(;r5ahpy#zm&Pyx9z0tr7}f_LTO_(*5yn9L{} z;YTbZ#K!N8%#WocWm8_>yqmnGUGaC-R^axQ_stOGj)9G z9aGg!Nq`p6$)1^d)A;GB*~$N&{Q2ZJH!V6RpPc;ApC^7i@vjq~lwCLR{)x9uWG6fmmrd-S z*tF?)n_k@Xw~mwJJI04M{(9rn8$Z19&W-hr*KE{n zeAC7)V}Fy~Eo(2zzBl%bu}_cPH+Jh-Vaz{v<=DZo=?#C{aB9QXHk{n>z70nTzbhpA^JQ&zuLUnNr4qxJcvmRBL$tZ(99E8@ zd?v=_wrLGUwQBw~S>M>Zm^XnXJe~-qck(c{6 z*G$U;?kZf=tLCDBHDx5Xp6JuF5j@kxofw3U`Q7?bHa;gt)aGsWoSJN~ok-PQwQH=g z$*+j@-PwqVWZT6>qa*G0H7n7XXT<_n91?LwT$yf!NH=_ScKw9|Iu&LKm(S~Hu=-|1 zADtA<{aL#`SOZVFhA|Z|=99k6Oj)dNX^|LJ*J55zM2F*bcEg~d=6s|})pexT7x0<0 zn#K6$9pVp62EU3R^?G+87)$uwv6=r8>Bf9jOSU5Rwk>MRdz`81i$%H~Ru~bquocLS z1W-7{mc0XdIY*POd{AXHm9-s9YTz4~)s@sLLd_;i`bZ_1Xh%0J2m`&S&Fb6{*00a0 z3?;1LQD?_Q@8GNs3#3T0WlUE>SYFd$CZ8AiYu)||)m9ZKGaz$?vGk1S^O)7d{LoJ< z?n;|#j#z;md7oHc1HZ;g-GVxiEr$#kHDl;caF&aQNqufH;I})pnp8c$@l~-t>xy;o zD8~ehHJdrhsLlt^lS|fVvrN5gAT=o;>~FTZ-n8x^u{z0jI6PaU1B~B_x7*|f(P*C~ zJ)DNJs(D*1MY~F>+^pz!lqGWd5&=$SL8cjuHnWSW*?`Ch*YX}h-7(fxHZ1R=^XEDG z-_3NwI&Br)Hd0AbJZMTxJlL3FIIu&vrl$y}9g>*)1Yi1e1Rh*4VbX$Z73X_Ym; z`IJa+RP+u&5iqr}Ou%oorDjCWnZ-<@-OZDJEfFS~l$H->#zg_jWa8Q=iItq-OXy42 zwb|)AMMjC77BbP3);Q@krplhg)PE1?*;IrC^QcR0pjt@_H7SN9W)g1FOE9sr(_aa) zO)NF@@Swh~o*=D@P27(`c&5pf8NO94h}r!$s?DgPSS=T`_+y*jCDJ2cG{7l+)~fe3 zTOl>O>6QWA3MZyZWm1z`B5rf$HasN`TrgHuo6N2_;PGgUa3D3i&oPqmc2fU zYS&l$ba*uuNC^%LQnXGNJtVpz=1a6ALQs6A+R*0l zSb1EW|9r8VvEw;od=b(wfU~JTKP38+<_l>qNsuOhR$%j3y_}h<^!u03L#$%j>Zo|s z`gF{}O6bnH5wgjo7}Ncq{r(n8#sKn zYlNG3f&h=*C(>gob&iU-oz;*nXJ=gW%zlv`4Or|%26sBj4#uge=eN95q%ZQ2gOTW} zE6E~}!x~N1deI>%&)d?CpwaJ%)q*8n8=uF;`eBAt5!q}$uTF*H@G#mgI_Bkr36lfl zG!XZJYaw0A?eg~BDD#1^wr#XG(pHXaYw@Xn5l1KBWs8A8z}0LlmOKQbns~d&J>YCW z2tAuhI6}=v%E)XKz0~qP0)h^5TD*brDuW@FKK}zEACEPzBg;9p9m}TzEIai_k&Vj) zqZ^H4ns&4stHtOkaWUnc8dr)`dE8XRVXoyg>8<})beGKAiWUQ5u!o&my+5BdMz{Q_ z&nT1BvJXdumh!EpV6fmR9pG#~KeX;T^wFsW8WHn1y(#dKt8rvpDP2{P7UWe16a><*v zn<8C&_U&SaDO)V#Vvy0%v!FpWnEeeh{{A&(+O`9v^DGI#jo=Av=eW7v=v`k&$(^i(Oc1xQIs%|tJrK^az9+Kx`Mfr6QKzkFRJM5Do){NB|8gFl&{7$$ z)Wy_ELrb09^18^!ZD?6Z8{rLk+KFJ^k53QyJ8Ptstfr#vT+I$)YN?G5vA)9}aS~iN zA91MzKFUp{SlyVWyQ*TIVy!yLlH?|SDOQ(eycxMf zpf753+7M2VR!=!;%3D)jJ$wFo@dsQn7$7xma1wVJtkEDdzOBEd=D0{9P&D|`aa#sA z$0kJFpB#s~4B4uNuwfnt#FB1piH%{{3}qWWYotL2E9AJ2m4s5XbU%;9z#>?$O>PiR z8&F$E-DC(?QEeEXbT>bKQNLH&N?lDGn%$<4$IX$LYDyIFY`Imit7(jG8}ywx$IA|j zwE-7{Z#&)K(vs)M2t6y_(XxfQv4Ahay)a-&6ueH17#$ItA8XYscn1&Bs&vNhYbS?A z5QS{4)N*y2seH3;wN%TwNim`!8!N`jls1DoG`@V$TxB*p#m`1!c&pNknnDmf6^M{S z-xRq=+Cs$^`+ zFOoy?LNJS)t$?S++cWv|ek*bhdAk(?gqO5M1K~^}IVtX!Sx+&fr?5cQ7$o!RY>S_G zqF+A~Zep%74q6&hS>IB3YQ&rf#gug?v63!t)Zyl=HCxPXJ>IXM!%Vn~q&(HMGa9fv zG{pR6qTcuBA;>Z}KmO{*fb8ZC&yJLbe<(P+<{-VwDf#9ZiB4i!U-8r_`OKR7ia{=< zyMH3TdK>rvlVB_-L}PcnU=Qj$LZGy$^4R)Q`SjMcs|d;AEaZt)UL-$!@&REknOew0P9|4>{yyAwV$&$(kY%fdPoY9Y`Gm z=)dZY(8M|P-~Rz|+-p^V1e<#D@1|jSL~#s-e<|Oz&E5@wy9eYM%0fa=NV+6g{2}a| z5*04@{8BzWyJi(68-A2P&o13Ek7U1+pDRmV_*e4dpl!22oPSEtvO!{AGbHJS95{rz zbLJE0u7a1o{pEuMT`MK)Exww##dZe(xDEzYst6h=iR`bgp(N_bCbclKuY7IzdbImD z^3XPzZ1CNH(G8kA(7~(&a>YQSTKz^T8IqvcvobuaT^q?pey#kwIY=K-+M(+Q4U$^oyfbw0@q@Yzy+%oYt>|}#dFB_JGpX7LPhQa=P8fGh3*MBEJ z40#-o8?;_x8$2Cb#FEeOR9?rM8<7n9)}O$lu$qcaA9D!Vz{Yp0odCJ#YQ6Xbvvh(Awa9i0(xw^|WXB^9rxaP+`m zpal{#I{uUO{j50Kd*}ZZh7ok2o)sOa))7c*05MC#L zJ9@u44f@NS0R-6Sw+;7wL&`OOm7v0S$k1s8Qt>2u*Q8<&MP8RrO-YK-k@tM>qGOM| zcWdu6ugf86%^+JGWaolxasN5`z{rGP&NT?xe={KY7lY%phTB3bwkRo@UGwWl3>1`fC-e4`{LF6#8;*k>W%((JHCRuJ|%zYOJO6q{$N zm4wNOr?7%CA8P>WCxzZIqfkss$%y|-;39O-^N_~tZ!-$LY=;vG5ZU7X)aq6u4iZvv zm6@EGw4&?x!<^l*Q*r*3wB*R^fCL2jVRrOh-KpqrQbMK)ag$Q{su34ah*imQEmY

    CRH?kR)#jMq#8P1I|TWlX22Eho98PGviac3 zo|`Z_t1-51N~lb^d|8tNeu~M}M1&W*;E(`Wpn8x6Dj*y@ft7hl!(%!~Xrnp2m{aFq zyF30D@Djgvx8nTiHxxkvnu7>4&u{HLvs+=3op*F-!}z3S?1vMT5!G-)c67Wa-0wPY zI=YYm!7t8PL=&=^2%n}>47F0)5Ko}LC}Hp=WOVu@0A&64!I=%{B_T^r?f~=?jt2pN zUpyYFI#RF2orD&v$1R~yjza%*5%7_a(edZ@4_t39G4I;a+kCMCPAMmf!ib6O@lsKh z7q7*A9fw0(DERx=hJ7qeac8G!1QgQM)!xJ3B1bp9wlLrO@tc4p1Y5y%W)N&;4h0(k zC|oYPR2HhE2}jX44=UtS5;8h^{*y2dG_W{)p#p-G!svS8*y%eoN)7<=T-dS~qZtxA z%j7COKl%p+I;@}D-n&PkfIPAcf^%YE!7pklcZ6`eQdrI1^n0=tdT<}CTPYcxeAB4| zsQnbA=ez4`2QNoIdTReXx@q(`Pon!jqganF+^^WV(~o$_AuFDcl6{&J_ut?lSPGIN z(MH%iq%cDgEdmL707U1mEbZ{PTY1QymN1v_Acdm)6^hNPsOWnA%NL^ie{#VVwC9tG zU!t21{?C4NO0L*_-sbT~hek%geabqLnrM%m-f(H}Y=z5lKmlkBofIjxJu4W>e*t#4TEUbo(ib&8j`EZ&?O zoGk7X0<=UYi%dHeXj0*{{^rgVO~(dSRas@)3w_)f9u688@2P zDpuh-DiZyXQ7EV1Kt1`5--FZYi;&DLuY%(NF2O=30dclF+HNjJ8UfTK+^re%dGw)6 zVTX`Vk?hvX;p)FbKG&PM42~(d1;h1h&snM}2%&7-fguph4`Lte*Mm1t_+!TH{moVb;wfP)yf zsn>Sebt>m9bUciuP^V+4b~!XaN=EpFArOeibt3{W;d#BEUM`G<6$#k^L=Wkpx@t{P zsV42!`Kqcoi)23qPm8N)#nhCf2pzAzLy1ysqZ~4;3-bZK!E87`FaDN-P7FhMo zDvWD`P7yXfUUr}k4&y4JqLce}ffyYv&i7u$g{>%v3M*a#dfJuJ;N`3@30YX8kzy3x zLYv!^!Z~+3h5xDV!`hbR1K|+Sv7W%dh?)ZPuD8L10tr|j-^0U2V(8qNOa7BSc zL*Zg@}VxG3m`+`%~k z#ST&yI&uJvM*yxefxc`|?BB9hDSE}SecRa{Je6e+9(y5@gF8OB$wab%A=nXO9fbG` z^l1~^6W1<9kXa|tyIv2+5?qAK%NOB@&ya;6`a-xH$T@Y;Rb9Ri@j)8ihb_>>bCjYZ zOTVz71*_s*s)bvva0!;qdK9rXLC__F(vuzXt-Ssnitrqy2y$fgko`K`vUee4RM!m` zVnacYC&l?|6rzuRd3qaqcJKUNbkl_gLbG-qEkyo!O=^N>27lq`wD{Z~J@3Jx@z0I@ zdc*vPMSu|qG(qskm8%d@Y70TY7_|Y)xdaKvLvkO(sgp(!q zSH={(=S1~rW@zm3(U(UihcB09Ce0Ix@gAOk*dttEP#3->N{Oo6Ht@K{T#x8X{#-Ll zpii{n#h@Y?>})STt)w2p-+lzH!7ok$tYGZGZ13@!aL~ZUy)vRDeN)|JRe2NrrlDh9xCly$ z5Pst82YN4c6%pZ(Y5@oFv@2tN2l#(iOYUH*Og3|3=WqaF#_=<12(6@=5Kj$H!~|ec zzO|u%T(VxZs;MQ*F{16JRo;*{FY>`u3}j0=i;tupdcOM&15h(~g2pHn(yH{O!FX0+JS9cwG`j##)q&gf zpGDDHS5qwCxV8>W&dat=aH9{6zj@tn#%^B!bwL&Nx_~kvAZLmw6G>ef5|^slu@2zv z`D<24Bz3bwIk}pOP9Fh;i0K2Hw)JkgSpmAT@Ddp(lMJIRm`r5Yn-nF+Xz|$|d1aJz2n?1k;hQfu>9^d3F}DuG?WCBVuUxGeh9 zW{BX#op?Z-XWB-JLJ!;y^Cl&ula>uv_O`r35tPjojb^wEHT3?3uTY2=@@e6-ThKjs zz+6en(CO#qnPX3VcT?~59qE z>}B@e<-gpd03G}w|_Q`bZB9Pu_b@o!h2k3c;lF7HFbq(veOqg+705jrs1$9J=MJ#{)~CfQ$q^ z8HW$7P2j!l)Y&1%*4&2sM;D#It0CAd*!;7Rd>Of(T!x|X}D@- z1fX945vD}p`rP|L!x>q#3RsP_SD@*q@18^pA2|2D>jQA_l1S&Waq3C38 zV%PZX>z*9@uVqELW!EjPJKhQpfCGI|UA;%Z&hf$nYwsM(lKK%rQayLV)-e$FH@J-< z>_J$=@3|jFLQ;l~H2zC5cu1rlP&m-UgNlhcCrlAcRR-MS+i+pW90f}jZpY}72NjBQ z7M{NCn#NgQ^#0A}dAS3?#;3JCZ*)^-&dlLkk-}FQzbB+eW zefhZ40UnD^2wk?rqs0Mu!eHK{oko4@Ef>`4e6?QB6cQI)x|ij^Aa{u4Xyz=d+*&_H zd?IT@3y+?2A>Z~W*cB{yEP@Q|>)U2ilJrrCdkn5H5-O^EA%^wJfw3c?M}J%qKHsOw zI|^Vg4nkymSKSHwAVR*f9<-hxd|WX*yGCi)2VqB@|6Ou_D<3`Yy+e}+CQ9R<9WIZ( zyg?y*?}$x!KimMfy3o=DoH(++wvR7Wcnc&x)wq+6LfG5PBUuj=h7vM5e(FnCqQB03 z^e{U7BgOjOlRd>a*t?cMy*1z?5!2>CEG~WG93qVNsE`RN_YpevY zHkz*JDW4X)i!TZ2HX{6mLz6Q>0yLk+!~yuZB}AdSKBrJ@eFM1<5pnF3itRn)kLpuk z-T%B|7J`L0Jfna-(Mtltlz4G#709d?$DOu_Hd7?L22M}`Y(ZZ-3Eh>Hp;PJqr$pEN zarf4<)S8DrrP#C6zcjj{VwH%n7v251V1#@|F}bF6qi^5Pp6-3-8R#doedw{Fso3Om zlNW7%7vv-KZhCUl_VF7wzPwQb@YZ7+a--iIB}VRD|EKj=4?i=!Z{01j|BzXR9uw{Y z)%8c_j|`zx+#DDJuZyv9Ce9M{0!^~i0>yFM0-sD!3p9sOTmljeu{?t_9Lq2&9LEol z7>D+0-?bZIm(Pvt#SYPwiozJ0!tmw43w%Bk%aj_mBlC;PAEDz+G|4it1tP)67APF} zN0VH1fl+a!D#~F=G9F#|2zH1iNmL2n_m6$##^sO1lNia69J3H-NP2;a6XXIPQwE<<_6w6Li@ldvFG)uj8o%_>D3A0?*;le4b7&uymYQ zh(=i&Jo)1cmZX+BW85KzB^Y%4k*Qt(&>-E=Z$C|62SZFI6EG@tJcch&i5RyKjq|F7 zWRyunqtJX6#-H^Sm>v$DeC!|m%3GGdqT*;4rjuPD2$Ec&*ciLOQXId)a0#B`2?oRA zQ8t)wj6FmX0Qw@E{g&95wTJ272g5`WD#)7*g9FB8m;f*`FYr9YEU+qyjK@h84??iQ zT6G8#h?D3GKe_iG8>UXb10)D6MKMtTQiK_XPf;-E3w$)8T8Qz97{l|zzZF@+R3NbE z*-Nk9jV`%-ZglPD&pay3GIbplr+6|!#uvCG!@$V!G|V!=Ef5s=nk1tHjQ5%GXAUu7 zM-pcFf-|cCqt;jj+aa09NB1Zx>bfWl4oN1N1sp_jfr=$DkRUv{fUy*xR8edkAO=^) zhdD%07~((u!Y&1Lm|bB^ulbSrrZ~UUb*cnBhIuxzK*vg=mZi(S;5X(HI_2 zlHAHi=tC-oqY?k*r+3T$fsZtnKf0oDk%kbthijL-=lFngCpl{y5o)L(WNoSEjc z#tQ9yd=CyusjtIn7#%*ISctL|EM^imBrXQ>gQ=pxm?Su!j-AC7Bk*Ih-`c(XoRfe) z4~+Zr!(lidjl;@f5-bQNpIqP>0$ZSYOa+i<5b1K(^pb~wA%|pFj_>+AtRo-a0|AQE zbvzLx6R{+_5LXHNCkA^DPt&mlRU%3daRN^QuKY@yi9-;?ef-2NyOsDk8-3O$UG5Jz zh$p1C#6bjcI0=M>rHaKCSRgIL6BLo;lgU`@%qEQyhj0QzvTtN}&7b=#==4X#G3Rj_ zFg6$h<`1@hD#}M;(@BE7s5m%a5)_F+NagZO;)fvhERqE^f0y-L4~nd5A_|*3ODw3U zD2zHx-2%(f*a9Af9gXBwED5<_msw+nIF$+(?Ver#*w_?AQ6#U!V&MJ`nJyMsE=mZy zCX5Y*B^L-dT6iwTU<`LgXs|rD%1j>)r^*jY1>7iWOH4$@=C8Hk=+ zAn^nT=L`#HF+ou<>rrs&rebj{K@9qWaoi!6gO5B)?Lya?7DiWgp>upBxBL;<7GgLS z=N6J&0=7Ar*aaQ~G37}*4krK(d&KevA$){lRmlDIr+5D&J=qQrRIt^Nc@f#Z2N9^+9g3i}WsmV@_3|0aZSaD1t7Qal-jIi{B{5NEe~Wsdub;304v`!smU zE<29hKe9=J2h=Qx?FB%w zFj&omX6)a(cBzom2uHu2-Zzh)_{ure5u2ZbN3K;ch7X=|T9%D<$qH7kwA79Q9#8eV zioWw4G*eQBX1;ei-J5=J%mNSHuPQ=wz8v_!deUGi1Jh7G3$f(|cv*Et4hO!bn3-L( z29nXH|IH5+R5V}nrT|eulXgHT zz3_ljY+0)i;r^fhZ*P0S^>y^T+W~B8Mu+4z01zOS)7PX0US@}#Q)&CJbT)l>XH zcnJoVwyeA+%MJpvtR-U6yuRK}2dwb${f%PlZkD3XQdVdswa}5fVuPpeOD_sfUwY|0 zcngYfE+IoMLsDLU3s+~oRYR(;YT3G*1W%r`ED@4gXohPm(Ce0)#t^`$4D|WCz5~xp zc1b|JH1=QVDoX>xN19~Wl<)#1b0v<#-vJ4ckO4RC`8U|Ge)Ix7qXSFR!nE~yN!HWy zS_{9l_F7}m-r)N;_IfXY1{=`NmL|{i*OIpyC|$mqGbAuyHj@$*wp-Dm?}DR2XmuGN zS=`)rV;e)Q|z7=_rdFjhOQU)K{S2;PS1`zK|wLl)k#FDFJ;O#1+0hFF1%HS zKKE0F0~CgL&a5a5R|^t|*A1_%EnWjXU-HMG=NtbSsHP*jG`NDM0dvq(fUJ21Cm?Nr zzK=#zv~pGf2hZ8UvUX)5i`}xO`e*0d2R8j&@xXMPZHE)2+MR`<-%iC+LZAOR_`yi2 zJ=sg@W##loegT?3P)37StQ~jya-iA@w?N|u|9i4%%P(P{Ub_@MKfmiA+5M)McR$D= z2(g4RFB>@Ih^!MSi$s|Qs%uYX>52n(=EGqvE6hHs>Pq2z4W$4uW ze}l&k&yIqZ)y1>DEB*}T)E)Mv`4w}jJ{^p9?a>PBciO@>FrWVotZ}P};CfxY5bgct z&bi)C|JHXXSlSMa5lzK`hLLwbe0-(sU|k74$mbva0Ana2i}@5?e^gu}+vQ%`2EVTL zRgxVHBb|f~QeZ+7u5O{3MECs#ek~!RQj@f=d9&JTMGO7ah{PzQ$5SNAvey*?aPJutYD%0PGrnJH!B- z9z8y|%H4a7a`Vg^@Dc9qDizaG>cB7-U#A4Gf6tw>D_fvsD3*umj~kV157WTz@qacc z-TQVfFJORk?S#AF+3s_I>r5CtpmN}M1W>BqU#C=@zeeG)n;){FtA~~6^7a4pu=0VK zq%?axO08EymC6E-;ek^xg-F2i(6w*W&R~zO=)Wanq z35Be8l)vvSAUENqg_T!D-I6B+sIxB|1V$3F zfI16LqSqF7^voA31-RlR0hU)B=rmCedT=~u$JLsS!_Ba$^Cn;+A)}L#pAVe-UwxA> zSFWW4z(Twx=qlxQg>*ENHrClFXOdA^MF7pXnhJH9JTn74zM zChhXK!+5}GuaRxS>r*Guk;AYV8A#>Kw6qMJ3hcV7_Yf%vmUD?-nM|_a!3ZMhuNm$7 z5Y|=?Wd1o822xUn_WgdQe_;a`I>Fui00*PF!@5MRc&~-K#j?p;^Z>{?1WX3dNfyqP z*BIr@y>z(};y6@G*vjnZ415tM;>n2B zS2nWGb+9Xys`txi+ZN zNOvW0m5}?l33UJKquY8Y z$%7vQglc=z$X!v+$w}%g>vwqVszO}G?7#{8gibjP(a>hvVH8*jAdxxB-Zgi@i-_*C z+z(md&gcNvuDTjMQ8|L{Hz+r64G79Ch<4BC!Phwl{w5SeI^yU{2Bq@+HOkN{hL6n+ zn)ObT&@AXBgi3ZC#xP_jSCe)ffW!+otxubTo7S48=y+g9;7Qf`%LUj;-~mHWaAX}2 zaxTPyLuPphH@6!d8BumV2UP$AbFC`yW@uQ@o2=)&L*8nIJETPJmSxgrgOw>M>&s+s zZ}4qz109${36YURxD_c_Ku4*E2{h!w1yF_+Jh^_;6b#OSjrz>MuUQ+t^4Z((KKGSU zyffW9v|((78&1jY1?cAJ_`PE<3eFvGg?-Ag#KEc%UqIzzD#$>_yRO~ac1K)#aLDt+ zbzwCbojUJ}N_YtZLjFhn!fx+a5`cz94%Tj@8z;kqm}Ps(U^ zRI}kkCWby5QOYM*Q&HvCOh4PeiS1V_2aK+|M!5%$(948D?K8@GaRW{UGc|*{oVS%5 zG#U>Io7HOa|EKKD1LUg8wDD9b-RX2X-D$D`2_cYlRRsvty|-@NDiV;|_pNI$*4p>I zYZYl?0F^L6R5;zZ5L9#&MnQ#A)KQ$#aaYD4F39JApD=FYkZ~M${XMtt?T{`yqo02u zyyx_(bI*Ctd(VBB=OL%=yacaLQB8%ME+5r1 z`8s7wGv9C`%c+1D!>E|}?wfWDP8DQ;RQ7p{4vr}Yoyma4?%DOAFrjEc!a&t2gh ze77V+o!IqDJVJ7Fn9l0Rms1V{e^qLQYA&Ce9Io(cyILyXc7D17mEC*Hv7|e_sGW>S z@1_z?n|lwP`PGA+4s;?3iOQ%`61 z5ARNn(|4zA34k-IdfF32-jlsMd4<3fs|Iqj>))iBbH)PpE?yJqh4-GetaWyl|oELr#ukfCCO z4ZQAP!?BiH88d@#p8RwHlNynd6A#~e)!^C|zCGY*cVPiVN4v_B@-fYDgst}*eV2yj z-?4Kuk=0_np?yQtja}ph$GZ-beLvnS-aEe4z`Y~7!~@@M8tzCr&~up?I_is426LiV zOOm_aE!#<+>dIzjM%qaHYsaxrPV?r$c|HEDp_seY1x<7)4_>Q+v6bK#2kaKB#enpN z`|5LF^PWHWbstw#IGX@^d&kD%&+AR$NSN{HOg&4hn$efY4L8GLua=U>6Vt)~B=}R$ z)q|~Xkex5tnoN~@Wm~e_RYpzvIzn?--h#heEhW!9b-+fxHMMno@abEy53`YV>pwhn zwjWy;nfQm9*8|DNinyG8^fnnVegc3vK+q9IY(-R>AZv*befwJMdg1ZNqIF-1`d|kh~v!vn;v` zo@U&Blpfr{hOxJP5nku{55^c{tsmzQU#)adMeeS(RZ(1&3-87yEM{~gJKkRKSb`L)^Dw^@JbR`Nx%+Mz zvg6loB@ey*H*mH6V4L?Wdv)rA!g7o+PD*ZE_il-G-ONvBzBTiSnUeriuFphgbdv7O z!S$LUobpT4U!Q(r`d!nvPnV~I(^pT+r?;;EKU;pg<%KO@+Va?zWy!r;j&3Pz@ozc2 zW&f7VQ@@hDGWGn_KTkb6_4cWor&3eSDb@NfPVJFyUOzE4w)sCcKfC!en;+hM&*skN zo7Ug5dC|6+-hBRM>EzERzdiXW$@eDTJ9&JvIeG1*Ve+!c?VJ9%>BsB$ZTi}#k8gVC zrrS1^B%j+9-1Iuh-)~ZE+B)&ui5DimH1XKP(!{M3xe4EdcH*LmO&d>b{QkzzumAAI zM>f7~&JKm=X~I_syFR7)vxriM5tcLg#R(B3~GSfO+d$WtcH&(uRyuX-8sT(@vWe(cXn&7X5QTk?w3g(4vSM91wTeZjq1=LD!*&N^)PhIWR#?8)7 zQxy=KJ{O1yzgtY9T(#=9*9ufl zT}cJz1aUT>ozLo28IRq{Moq=QMS^&-$K)Cd*-E{UE>sfMOkh$Ny=2z{ma(EKvcXEm z>|z1}E}&1DYUil3IcrH7luRgD-2KsEf1fhsp=g8E)iic{I$bD5-6TG4ufZTeOjFGH zV|rIIv3_Pn?#MERbbOIf2V;evGvg9S?!EnvG0dea4u`c+b_coraj}1~oS+<$Oez{O z0FAh~-yq5hNi9{ZbDm18UGayRNslOxsY*-)4Af;h;iXF2tBEN0T1#{QwB{Ci-p}Py zi<|(i>Fqm}dD?G}+TBq@(#9lQ-xn6BuS*;Jsi?D_jGJ;TE%h~V943)xY}HOgtqbQ; zefGlJ1$i%D(lP#YsOl*I$)*`U@T@4$+5=205pVUKIz!LMoF`y7dlx|iQ)VpLe5_i? zHyoMF!5;~~+lv`krp#1a39rwRVa^v=#l5`<*PweTTa|Y7(qXe|>nDe}jNaaSMr+8> z`b<5VnRiW!D%*4R5UN$zN{M`ZKHQF9C_sIBd-i@MV@!_@%=QX$b9h(zWx#q8na-1JVrH!?V z8H**Cqi6xt)7wd;JB+g#H78=lLQZY^ya2)I?KmqP73&Fmy2&VKEHI`SVG-KxsukGi z5hrKPsN1b8cL>AdK8xhxcHfB%GF4fbJ+CRs3%V?gqIA72!Lq6%=On`7v~vs>GA29T zTEYov&~wDzzPyWBw6pORt8&L$3GFq16o1ugNwqxj1x+)YLzU&>XGF2u!ur^bUfuUK z+I3d(BVm|U6VAeJLYIx|%yn}!IrY3Kujj&aq>|LS4ef+ZS=u75eXBapMCP;Zir!ac zV~fm%8L@x5l%!+ssM)9EI_3&>a9a4;mMh1qi*0qW)TUjLqC)_4_O>kL7G(@nVs2-> zW`sfs*wT=vJT$U-U3!K!r_0mQ$JS3x#IC%lI6HDFJeN(c3bF0lscY1uZt< zmuHGH0SVRHQqQMU%}iFGH0r|^E$g{OnCC(_T}ZjqOg@*&x=WE_#gRIvDh`vd*J*uXG2OMWS7I!?3 zM-B$O>fN6eyD!>OeO1n4ZWr>cDhik+|0OmUTMXUyb?0#1b8T?{`*k zL2G4G2GL&ETizN&7hHO0%VRSI6Z-@b18=<%tWm6yqS=zuTrF@rZxhC;*Fr9e=~Nc0 zeswe6&vLtdAT}g96;sfm`p9) z&@xR+ujL3<%vlFLE}pHL)4@`uh_;l`*2)1&wdXxz|B>RgDRFgbl&(qBb)7D4?*$Ac zdcU}f)$AhcXS~Lu+T5{)5=_GVpfFH%zNx2734>Fw43{*m^u?bP<;IegsTB1l&WrWv zFb?q!P}S86v^8Whr=y`-pt4y!j8#pr%9OG`e&uxq`lsmLvABdM-E zJ|^A{D&bg@=~X>?m93OSj{DdN;SVb2T$1*28jvd0+NxOQiuZ|fST&W)5zR8?uomda z=cELAx!d4q2N!Mi!FSNCWt3Y)c_nP58VRZ;9wUMNDVnI-< zQrns87Cp8|)28X#EaDj|wVbFb==Oq*qLYh7<746?mx_4{ooXZj(A`m6^%=Q%p(>@j zdP*0mo9yxI{9>h3)P6$v*-|*Rz_bHZN5C8{I-0cY5n-Aow>g;c6czvzY^sJh#U(=b zVm+Z!W%>c|YN;AjEH!^rlqc+3D&a`yz_PA&S~YtF>|Jj$>g!XC&lIpXN~QDy`#Ki= z0fFr;+8QOM776vQU{qVcRf%FDoS%fsD3ddyHhNR`BDAz@^RK4jdW+Hy;yd`&` zQ~wiPTx2W#thte-E*JhF+wb+LRFy4g=Nlob zP3yG@%a)B=lkGfLHx<3OwUjorM6tKjS6NlIp4RI1aNa%Fi((VU71TAA!%~@d&Bt|V zVem{Z$}rt*W-%HIr0wNsp3aI5ac`5M>`hHPYKRsRn!^fFuJ_t0b7{UDYPLJQE_JXY z$~jw}iqtdNp2?MQ6x8l72=a8*RiP@bps$Ub2EQhGmH1*wC!Bq{Q?nOUxW&hi^Ne@DM(h*y?M(bly&Z)JF zxA9afvA|f|l#!;LT8hnV62Hw-nS`B*tFlT1<+nGT1;saoNv0Bu2`!bg+I9VEv>8v( zyY3Ym481ZP(qsaCZ^&6rs-}J*tY*q!YEYa-=V*EDtiPnSiQTnkL?#;!ChYU~k)Q7r zH8#bmjEu!mJxz|^S$uljI@#2gGf00R_&4#5_0`pW!KG) zxIW<#{mNV6kQxyWJ)(mbPVPnV@Dp#B#dd~+$gJdO$D6Qe7sHPlWF03zIH$VJgeJ~=<~x%23rS* z?u1Wj2|lSXa;d<6<|-p;C~QWqDlQ^ncwew0$OB)aksLjD>HonUwSW6@<*V)}@Jl1d z9`2sJ$7n9N3dl7rn^^Mj12Pb;uhoczzv5Nou_*(BP477CD%|!Ctip(|6@FOmo!FTX zG4F!S4ZOd(%!wf2yZIm>&sbjO{e|$489^^shyrvQ-cWdPd3e;dTKPhStN$kV)BPu9 z<6HCVfYftfswg!hPvHk+`-zS^XWKw|QhLqM-3};Y(XlEW{|CV6a|a`zzj zFamJ9eWyn;nOu1b74|b-Q!SF$&2wb-S=sh|YEDCG&rBvC=|?1&n<-#4%eM~pe^BO< zoIeCN9y;7pnQkISRnU z=p(;gp2sG^qpsgH7K8uL9GP3oeijWsRk7(^k+fXgU?D!}D zS?0L_10iTF4)mJshi2>~cYaQ`^);F?cxayoPWl@^FY_EYw*B~#6|3Mb6#JgAxfnAB zyKdTD1{4IJX_^z1Zeeu#~H;5q2fV`(ro`&D4r7aH?cL#_Zw zzS;}29s86h&p0zYIogdpUcc}v@-1CrY+(2<%)zY52T(J*6mj)JmY`7yR4m=Jd^`Ef z_xKaFx{b%i5@)mb`#8J^Px64*LU=Nl?blgceyY}ms?U|oz}7wsTQVXB)9hd+|6yoM z?)i@F;@tqe7Gsk0ft<0X>Qv3myf>}Y7jwg>BE9GFA{l8z7VIzN zc$l}9NJtS)+=wo%=-Cf`bQV1mBbkr?n9s!bA4j5sIMApL4OMM!>!^6}&^2z@$=Hu% zp8H>tO>GB1N8eq*oiPl&&_WdKAlVLisDH^eviJfLy)-Y$w(eM~Pn5j))VWvV?sVBK zdGsaO*)W5oFXQesq7y6n^3|8mqA!E3Z@LVXgzx?d((&EcMYj=DA7OXV9VmiRL`TIe zs14u`(wqt<_Gi?@t=$<(;9Hc$`;!AV{1x-C5!cCUR$d&qLgx6Ct!Tl7q&eQT7AnLF zsN#9?Tsh+JKa)+P>~hU6h;KR_`Up9PX!_tOZH{>>Wr;kk+rvuYRrst-&Z26xp zKiu-gEg#-Owk&SRZt+U@uD@H#ZqaPeOn-IDMO!vaotpao)YDTRoH{Ypn~JZ0|CDWt znmT`K{rX>S{@Lb#-TbM|?_2+m>-{@7|J~-+=Ib|`HXqu&WAaavFHL@Z@`?4|nS9se z9h23`@bv$keBGpca_gqwO8&g*g-u`H^!TRbO-HByuqnT3e$(Mi`!{W#_|?P@Bri|= z)5N0_Z=ZO>M0&l2+`I3Q?Kf<^VWU}^+IacKo#THQ|944b{9EIn7(Y4w=Jhv>*VkVz zb&kiz4da)M?-={@*vn(z92-b)9(!=?O=DH*+lNc>pyW-Gnsoeh#P`iJH9q1yb8zOI z>5osp^Mr0Y+4|rsxEv!!8I0x_GB-R$?Sfe(BIkyS5&H3t4E5FZZcl<1O>U-0Z)>ajz;39q~A}eJbpp0 zx2k%ouD{}ImwfgGOnc4l4IONAe{&AT(9s?uRo#XB*7adBQF z{DG^+e@-X#v3Ywm-LtYz!5!(N!bOg8wm=`7H`_y&JSX@CeCnR7K$X~Ru)tVsTqNcA zvoMa90^OORmUD$V6<5Emb_iZ>pKbwPm5H9w;dh&YRJ-6fGVH(TGrDVC8r5g*q_W_2 z*cr!V;y@j9N0kgaD=d8Dy)^BZ7UWbhkfoA9v9ZM#Tz+-h`77bU)TwZ%oYw_%{ivrG z%Glp2h&f#@>MKTr8GTA)E2eF46-IHpOKRHRPF@X~+LqZCVr+tc!RP3fl1we;N>nwj zyq;yPLX^?xX+>#D=Qs4b6;Lr|)0R7@-?{F6{Hx-mph#RcT&L3rDONpg@HSE*fg91M z(&P$MU#+%z0u`;=nArDaVFpZ}?W^oMd#@I?H*DV00k)FiEQ+4A@A{VoS}4nui=J1_}PLqPO3r8$o85;HC1>NneY~IE}7mGM(u5<0gTB z&PV$k9V%bw1?XDVUH322GQmydqwQ>na;GYJ+U{xii^a`?$KFR(?F~A?f?BX0G%$6Q zT^z`p?R0_hQ&Dlglv&qHUGZt*0lXS>gz2aW-$ql-?}_YJ8q_LZ{ahSid6|v3BW$-xtOo%~zZ<2n+2o zwA@Oio6d!mlqcUD~$>i zHe&?gX{M9*7caj{n7S*@bttRT9ErsmF&kAdZV;j_K35o#OGk(6fM>LAh^nWa7RUF8 zgA7>MtvQubZ8RCht#UR3E~Z;)cNQ!m*51+T?-aT_v+ig{*^Sw)VP&~Un}ryS&xwdP zb!-ZPf8;8iWka+ z2ezjQ@q(q1v4@Qau4lJw6Mon3YHiX{oynIV+nCx4*=rqa#$ZGhvb1nKc- zL^*2#XEd0kZAI45jb@mi?UF81>kU40BjupNj)kN{Rkm1TDcSSF@0zpz1<)ShmYv{~ zw)nWH4d#^6%^(N6M|TqrYrH`JLKxrd2Camu9Mfs546OFTvJK8Bb}bASufW$8pX4s-02EXwT`=>ak%yF zQc?1#IKF+JGrFr`O3B!L%B=2PqFB?1#c_nK!5E!Qm(Ca5{yw9(n5S}1bJ7Nj?OZfa z+k|+7&u9&$RJByKrt0SVrfh1v5UuhVHM#{V87y+W1QoE`Qx}WJ*QhkBDStT0m|D)L znMoRGVVZ_mxDC<w~I1)Zpzen%-o*>qhO6Kw+AZ;R%ggwQvV{a4Xp)zF%CJnjy zoHd_FTydZ9t2$2?XO0e9tnO~aN);~?FBUpY0Ho6SR<{wYHfSXalvcb~3_fj8m!@cM zv0{%^-PSyP`Tr4y*Lu}ufZ3EAy|BMeFXkuyS?sTAyXj^(@5*ukOTL!ac)2L2jd8|P z+^QH;Hm%*}<6A zIeit}T7_U@Gq)l~s%WCz?Sv9Bqso>t3uMbaZlS4VytGlNZf8w}e3AZ*un=6+9xN_G z(XIKGGizljAzJI>60QstnJ@W~K@xK7lUs!Vv`-y!#VlDW6!(^U)_7VY-UHNTCPNn( zoxR#M#0m|T@d(oaC|;e(pq7}WGDS;8JND=ie=;Pwd|%!_DXS{}E

    $RDxkO$sB-i*@y0^gS zJ9G)?$5gPB-zCI4eX54LLe&DjdAHM{Zh)EWgQwZ4dxTl4B0Zoe zrkdHdl8qZ$YWe)SnRC`%fy7JUf8^%*Kg-QNuF|QiGM!Q<)llY~&4ORNew!j058b6( zc1kK7{kv>X0Q zcJ11ZvK{2#{tK>#wH#%lJLTj5jofZNLInt5 z?1B{P>@HG!;)t63!>`Z!(Leq_vimP^A4m1Wo8@rp?=a}7hOa^8t(LSSUJrW$h!gTp z`St(7R7cv#LysMy29GUyZpMF4_*TCvds~_?aJq2Ps&q6^vT9 z{}o&nG07Wl5bKH?Bublr#{i<$a;y|9z(w27(r$|j?oi$V`N`k&?xD51puTPk;ystj z_mE5faMne+?GNyTL{koiV`}!$aQzlb8>!;<_|ZsM`Y z=)D5vq`Sn9WsnGynCo#UJ8-#6QO?Ss$SL>NXJ6o^1 zlu>IBG-!PIAuN>x^LKR{)ZxESQ})E<`GY5=a$pNMmUt>O0UDtR0~@2*W~Uuq2so7~ zVVDn2%4ernH<72409*!S%6Ws0o8?By`6!g9mrW-8_^-4zqcK zP$KB88fYq6j=7R--wXWQiCs`<=PD`jy-lqfyndG)gW-Gq`G%G8N8MRU#t$ ziCOvF)R{sexj_nOAs}TCuw-r}zkK@8Ve*+>bK=CfZSo5z1(>qXy7iBc$&+#yxptp? zYU}C^61S1uwGR_q-Nf%553MNwmIReiF2pf~%Ba=5guVOf#jn}B!R&k0PfEzg4#T)>I(sbGXb!=Ph4VOtl_s92dJbMoo!Yjq*d#O`MJvZ&qU(K-3q@O;K(^7qVI z6Y)@ispI-)blF?Za%!lW!fkuTHwE1*VV71S`QT3$E);`IKpt|IY3WSJ(Ed*&B=SuWLE`OeZVl(msTiFpYdD_1Js=-GYxd+_f zOD$MzA-}}bt;BnjryJ0=ZDku12I(A5-0P3XL1H-C^bDW&^8F()L_lD9l{?JsU7$5908U&b{V*l85$G zt{QyoYB>n166-*$QkXh_^4P>ZNi zXCV0}86ulGJ*-ib2ZaC;4v#e$L-Y`QiYQey7l`|9@?HA@Z~f}caP6*x6ABFqE8lCB z&w>UK6_u7~2Ur)l-2u+E?ckhLzA!x-I zd6!wfWhVe3=qLre4b)B|h8GTD!m%=W+zO-gU9)^<+Zr86Exlm{LgOt~Ip8l)hU!7t zrK=3$pFSu=P@V?p!#+O@pI)|BD|zv`oa~J0?B8}g0u#m;S?+R|%}7^6#1%O*?f?)& zEcSvM*cIeqyL>53u-%gIf6r&SlvdBer)gD z;L@o42FY$PNQnak{H_K7*5k%-+^015GHL$ZJ2x{TCP%M+g$L+3f6xr`-yhB;o;y## z{YfyDc}*)^U^~fn$`;_r`(k+Mua*MJ>EB<)x7t3~aV^Z^9?w$ev{_6#YX;;i>rqXj z4y4N#QupI??#3JBvs+)&bYefPATL~W*?EJfZ;-zZFALvN`}86kS*_p9_>0cCy&mtH zTw2n;4mvU_CNKUBs{xFv8+g8#KK@*|`>7*drHSIY&RDF)*^5XodD6$<`B#gF=_P~d z`O|m)$0igTh}JLP0~6W9U?Q7JE~ItR-j1iM*J>(CWsWrbm`i6w%wz8yAfNrPah#{X z#f9y=3s;guSIzAaSR0YHa^b`zJRyu^W*yo3*jFzk@_pNOziy*?{O1Tk2gfJJK8qsS zgByOh;cXkN(m$b0HY?q;{+ac6tUoMyMe?vDhQIsbx;Kcf8R7pV|H!*e?k0bE=F*D~ zQra6qkfH@SMCwpdodT&sngulktpVu)kL?dW0gXmQNeQ8jY@3s%z%&A(<`6L40e#K` zii0dfbBIf*K!Jjc&SYFIeL(DsG^|VleZl^~_f4>%ECDqELvtBc4SoYksg*7XeUsp# zpaJ!Nh(U;&Cm~4zj9v?RkaQ};sX;&hEPd%ag}xe!hrR~^L0YW_l)nm)@~BDE9^!cq z;*6Xl;A8#YLlr9j69o= zE)!~Q+kS=S#!Mzn#i^7EWEc#<*8!)0NXvjL0CkLMn#m+G2~Avj&r0vKGOYzpzWNYW z7h{9N;!vE@f*wH~SE-OvpV6eW(tB5WC)GH^87h7VYl^W!TmT*do`ypW9*(pUgby4i zefvsp&{t>@Y>Gl}`~XNlxI$PqfDeTacs2)|De!Yi|sp zIMhyD6E(-F<4huT2rQr&TLTskVBISZ0gFC`?NqAL6e~Tk(p#0JQ8cYg9?H;au#2R? zi=tr?=|f7EPOI<_22Uz|o6wuPF_TPbpa~i4J zdgH&7NwA6>!V*AF!To`mfQ}=nRL0eyZh*=&(%V;hC$Ymr#lt^=(ND*fhqPRhS1{-f z_9>ZRIO$tfddHItMA@OdYH&De0S6dTVJcYYKxU)gUgw zn&TvLapq8pqm^3lQ?PNhR(fouHy#T-9AM)>av;w;gmVi<2pmnE4NY3jX5uMM`li#p zlZ={EgS93}4OxnqI8J$zJw$_V0IX(ULZY?OJ63u#;Ic^aoE%gJBr&QCzw_9~LmBjn zbD22Ig<5*oN^fOS$tKdgilmd!Sh&YQ?gM^=IA*N{RYd~C64E66!loA5;#xk42N3WWL)~j zmEK@r0*fETfF=X{60lF`$SOIQicBgEdM8avm5?4?>5V61pncH6B#sS=1QR$7&;goa z)d|pg&}k|my=A30mt+!ZJm;YltHiuv??C$yPaOgvS}LVY1AjfGl-|73Tg`B3Pyw)q zl9~)=0-`CJeTpq&f0d|Q25m!bnEwA*BGgJmvAH8vcpm9)5*b*opmp}Tnf(m^CQ#j|#Oo`~ za4EbfSl9ywHY&lB1*uh7I1WpaVdBynKlYp~om8f9W_jWqC1#z*8PKRz;28n|R)$ft zns_oP%?o|wY&s3DFxaq60_Rnm1oIOvFNYFJ7!VCA5tB46Ee`u$rO9N#h=w_6QxsNO ztA@%ak~DM~dzjYZC96zGa{`I=o$IEWlP4#h8UG8oA`VHfm5}-?C(j!wZ%SPYvgl6$%_wsTt4`0QhuFeH~4wQKW*n7R6@nDK;P9j zk+`2Ge_z1gj);k_0T0Au`!73xu)7Ff>+WUHXNn`FtHFGO>LztPi>ld)6o{jOc)^I2 zP<|0;Yw+2MT!$O7dl_t@EAy{Ktpz5k3?(gI`$7{OU+Oe&rJ4~jdFZ~&=LW!!yA}Yh z%j@vx0w7<{LbDBq(o~u3yfT(g(&YO&`Tm&^F?r}Z<=gM4ExIdI#FK43c zfSgmS%`US)PBv!ozU?MjuuaA1BJ=$Jal*;W7R~{o}pIg3FumD+1n~ z8MO%!%F*=~vTa8=Y2t)W^@DZ!^vp;bx#-{Fq94*zAFK0D-|+I(X$N~AS(Al!(Ao~V z6RL2WCO>cB8*8kJ|MqWJ!;=QH)3h3nLu2x|my#_x?tiH`jZ zPkJu5NG?b$kMkQh{Ns3So;9gbTsK^3#?7ftmS}ImZ;y(}Lq|=n!Be+jp=PgLxBjDW zN$r`ueciPaubf%wM3LyNa7k5Do`{diS=93jMvigoRitw(W;7y3;`t|6qSNs=%Dr%~ zUw_)czIw-@2j6((+Ik>{s6TO={MwzMhwTEnRRxbN3Mqp?kvEsXCv@<3x$JCh554s# zV*SqJx1ZI^Jb4Ga%&y~zmx=a)@&paZZqmV`Ks4L$It4jy8Sp@RrceEhKdwWtB(~UO#`M-~g{P_uQriEGM&L}3dvD$NZ>IN8 z<;M0*-X*n5dK1s`9``t25w2yB35h$!!{wEkxXK(3sFXT?*K6a*KQH0%jEYHJE}6Uk`2HOOW|=n@;bl@}( zwL8%>waVcZH*`h==6to79A$&DGegkdcsn0_T%I}YVjnq!X_n~UeU_t1UiiIZ_uz?l zBMc2_#dQ&}80pc|#Yj4yjVKL87wF4ZZwj{R%kP1rua*wCYNZP4eR5Q6dXMK%kC3if z>T#8g3jxZ>-n5p;!b!|+L^_ZpOYqd+@E*DQ{)gpTcELb^`U53C^E`8T0aOzVDAW4n zz{B#nb6(p>ZhcO3P^irO(8FgnY0~#2X4nCLR)T6}Bb{8XSnk+a^5pxWzN6xSaGB!9WcRjkHYZxeMo*_`&zAdn_T=l^4MkGt>n^2&T71lJ%Yy`QA?<-`cZ7d zh2gL@y9zbpZcb_nS`X2dOZ2$ZIfQ{xsW*`ezPcC6X@*V)+5G*;PlV;7)Gy(HC7 z-ZSy6Bs=~)-dF)W^;md$&uLrH%lQn3ZY~#7C)I^)Qbm6CaoCF0QV`d5De^hWymgR! z0IDvTF`l|v2e7JBI=JpJJlm%^3dBj*$1}H%f*}PlOIRO z?fldBpc2jHk;`p2WCI~bFc|~S)Hh(CUjJ#>r;#>t>VCJHyznz>^WeEp4}*ZqJlB%o z;Z`mb%p6s&<~^FM%hG8wWg%xPSN2q4@;$l4w3h&l=00B;-o` zBjS^zZJ?uyUp;u@ANjPI=(_cf3ifJU6!uC?5QM?<9IwON%pt>Mhhep5Kwny)gTY!Y z9qP+K`R?29;LF41*S!`wL$l!}u`cX0H)p#@Y;FoZ{0MZ4L3xIIZ&-QqT zjTlfbKsd(mYItDRSz5^{v-0dDW3Q$()K;t%?pHaK$5XC?iHQ}Ez+g-jQGJ;s@B0eE zZEH53Q8$0dSI_#`$G(ck9??!{uKH^@dL!bY(hg33O^)(Mmr)PaB;;@elCYNZu%C$W z22jQhl}Fy=nyo?w`@T2PxxZ5WInL)X%-*n0dKiYPEV*IwUU04be2g6Z`p@CjsQcW$zq%&G_@04OYkv)rm-AEhq!M-OWCyyQ6J$Tcz{K1PZ z?>#*Z(<#)zIjsq&15L|9C6giSx3LT(VsfiMxH|Bhhqm zscx-BhiXbDl}z{Q2`w1>c+>SmeDaU9k;i{EF4Vb`d*c5+G5E|6kQ|v$8tAc1m40xmk#aWh|WNj zS}&YMl?KXVJMr0eJ$uANhU~=nyWX7wdD;LJk)pTvWg`DQv}&m*nScTcZPc zA@p`sgF8)I$wyu~>*ZwQ%fru1gsjES%+XC1H~i}_ud(4PIbA>Dzca%wmCIsM0_CWH zs|vn1afO5x98OY3Ap~_M7R}nd$R({zM#MukTgmJCC6e1PnGR3K z=0;8gs9n1Fu4H2Y0Ea+R4{TqnmAvp=?Qg39AEtG^bKT@q6F-?YgIdcpb&s?zc_*I^ zaT}iwu?%J{F&!eDwc8DJpd5(W%(Sr?BoF;wzT+aq8q^H)YN`#uLr1#BKj1ic|HT*Y z9O!??n6z^m4dt2H>H4h@k3-0Jo$SZiIFC9;uGbaq&7y)-v5sM zI|t|d0biiI-OHDpwrs7OE@<#uT)@KYWUDOs-TxqAZncoa=U6eTw)7ih)n4FQ2HL#% z3Ec>X6FODN;k4+w*;H4TA_sqsy%`aci{ASwG1+YC*TclzWq_B9#1&lsP|-`Ng$WgNl@Xg?G=W7NZr48l0+S35D z_q<>}_JLyw*#u{(?MOc&kx$JLWZ#@WxM`Du&*E9;iLZod^&6};PbsSbUCKb95iw|PemO_Jd7b=%!QC7A z=Ws29?@H8ps%JB0P;pBKv9zZA~Q2Uus& zkRjCNid}ov>N6mU45OV8#(Dn8V9$99IH}yruaYVy7wDdzs^;b^X`4Ex3Y7$Pacon} z&WyAX$y>gEklgfvOLh$&*@hk8<5=dPGD1?UJ5+7u10}>VtC^aYriEcH*rC`uy}F4! zed4@1vhTJ7y9V7I3X~5xm(>_W$p4zRce2fJHJtYM`zAmH3!^OVQOr)SZX%}ughXx{ z96W#UZ+m#{ODrG30tpWHh}KujtCYqv>+ol-W_5zxe!gOE>!_HVicC5Ojf z7=JEACVWACqfI%un5kX178Y_@a%3;IbyUpz>z#v7?Zq?j4$mv`_jM!|qHE0{CY>bD?Zi=BEhW19zN{cqJrImLcPaiPgqJ|%vVk<9~wGaZ)+I-nnm@ng217OrBpLqOFxcgrHvSOTE za*1McC+4E^fKc5NM(skF_sjX=f%xU(&_$E=Rml~!emY_;K|^#}!nGtwmZy!L(h;Mm|@lmb4lLV3Yb1~6hGWKWm< z9wqF9Td{+j&nULejI@#XOV5ZNw;rQF1aL&Ng%faKW<)$xc)_6`U=VXdkJrl@=*W71h*W!;LM7v{0<3>dcpJ|~&6#UsZp7=~dVGy5E9<#%CkQB z?G8Nnh|UW7yq!3m*vgT%p+1XWjQiYpaC{xYeF^K#f4-L8MOZBr!l!-yNL;+@EUiTM zlJS3a9RA*;m^$b7b<<{PawFFLO;cl>#;P@8sru~*S^Yx%0U*qJGQE-kn(#?8h$ailcFD&{?Rt_^z5$x2p7F_29eLDO~&~pAFL!KKZOvMPH(O zUYCv0R@5~OC77^-K}>J7jhxs&3wH0lJ4V0z-WtNhqRUoHOkk$dyUO`69nA*qLA)y) zwG6)jb6ZEnWcGtyl=|F&N$th;-HcfY-;J?+#?+x{54*4s3IvmMi9F!L-;avPiGK>o z$-SlvP(rZ!lkt4N;=<{b>c@2XVrIvhJqY!Gdc!K4-Q*wAXSELF83n2Z??U`utQH*65J7uj zA~SgQkv3j?)PsFlZV`o(IYszfT!Z>CK92&h;sPUaERQ;Snty5pJ=Sa`lJg$<>mUO# zk((~sdU{Fv`W#}uD9SX!mz6|KR1iGCxGO@R05MQd0HSxzE}*~ze7Dl#27Gr>akk2% z+lsK5qgpvs*6qYm!Vws48%Ta><}n5;{2GK^EH2q}ER3WUqYE6v09!EPHG#S9JiyWP zndp;i_Wj#l8o#e9nzJL;Pqd7)xSJq_LIMk7UVselk*_T%_;BzV zt>i>xVHde|x_ZsvbKjUfEFsPxD<;T;ZH$I@d>L;-#@*)w{fKuP5k13om^|Kv&VQ$k z%ki3BK30DtZs}LOjB)Pm^5c|IdPnFdvW_-=bW6fIs!dc4d6 zST`Hh9^=cag}0mYX4r_)Hh8qJ<`wN0{yu{2B{werJcrxi;CGTSB*bAS)X|Sm_&NH_5SGAb0{97?)G3XDe57Z#WXXv;;m&%k7>ERi2kVb3_5#=DF2#ixSeF5z ze|vW5RER4LsT$+8B|ViUqRL(Pws}kUcSkX!kv8)9C4a)}c>B5Jr$<*@3!9JOO`KRp zNx0~6ab>-g9ObC?t)6zn!y`cH%uO%_%wo|yQC&bb8yiM_g*jAvwS^fB6vU3W=phARXjFBv12VL zk#BS4K7786ipi-@RN!5HVE?YcqxbPk>|W+Es)aGUqauq?|JktUyE@B?eV5YctJ@1ZTvW^#e8;vjG%aM*WmkaQl3~tt|BUn_k5k_mMijOWUQhTjJgHOL( zfx7r(&gIZ)KVl)^Vd~TZWwC4if5N^4O0ue2yQ_2e^mLfi6M7g1rf0fp2B>>)MI=@3 zs;(TnidZ>!s$8heh$!la49Fa&2aq752nY|cNDm1L@A(@5L4}73Dn=Ahd5Qu4@6^5B z&_$1Lv1YN>*|&C|d%`~F?)~j=Yjt5DNj`KPhOMQQ96Yrb;f~*qjW&LN9VU+lV~a{{ z0~hvR(fdgEZ@RX2mP7V72n!S znDoJM0_gdc#`kZT00?eg=}V`%dAFa7%-R#-=`@kwik`JJ6U}I&S$BI&%^Fg)c%yOEU?Z#+vo9w=~RO!uYscN5fFTyXP$nNC4sh z`7zCfEP0zWaq&roVtAogOy}b#osMO}amrJ%Hjqj3uGQDI{0a=@_X+0nqVMn8+<5H{ zx_YfgDH#y&69$WLNzdquMTaWKWam)H`u5u~NUhCC2;MqQ4g~jYYHa;7|F##dylp*H zSt!biGsXECMOkA+WcsR`@U|_@6y88{inlaGH}e|6m?MlATgwGq+(My_+@jn8~RW}61nYM$Y8GS5P`o~~%D3+g24zKxFg>Sp5F zw_$JNqT41$1#hl%T--@+{Nlup?er_5uT9(5@ykKWz*YS}Y~R#(Qk%9X)Ab+JLpA{_ zo}=$l@no~^X;(01G0dWLM5!19lnOrI)vaXywo{w^?Icfsd-s;c?;oa{z&)c<_ClRU^sHZ{f`!gkm(c{Bl{ zn0S*($K{pkOjGsQntdjnq%;PPOzc^|su4-ho~B=abK{{$Fb5}GDmzMa{o=v9z4X8yLWrW)dzjIQ{~4^y9XZ|H(VD@4X)`aoN#4HaDMcp;pdjqYiV% zADYrv7yJogyc@%_x)pGMo%^o&m=J2DeB|Edt5L!t{?*FKWG3aCvdi+|!S#maq35 z5Q9G_i)r<4m5jXbExde7GkNULNB5GuOE-3rGoBJ}Y*_vu-K6rPG-aQE@rn}F;F!d0 zAYzrKJmqYX%smQI(b`NWW1KkB^Ihb7k1mhm>yI^Ogr@EDTw9LfteInz7Ma#Vi=a$qcFCt$bJ;j4jpnTCs+wHz6qL0# zQx1T=jR&5ZSWfTx>3=~Ha}+Eqm&v!u5r~}0%^)^i*Lj>Zry^o1D99b(#?9@0&5avw z*r64PRAldWCw7gUcC>(bRW{eFenF>7#V05IKCh<|pUaWoJTY<7;ObVQ34Ck(wzIx5 zA()`(H?cV6M;D-k_j-h-m2e@NH%fI5XG8@c>w(9yI99ik!yR+ujmsXN=n%Br`9yP6 zD0dAXRdq*{syY{7l!ZB8%9;ws$&KHHaVdWnj>Y%MPQoElAa8tgVyyANBPZ_@ox!oE zhg|B@>QXzS$myc0NliSIpNz9AA2;jtoq4JJ=%M4VUMqr}D9~GM}V>2*8C^ zt>lgWy#jZrL)k9!&Nr85a`#g!i#gB+GL6slzu32{C($lx3v}Jt@ejI~&!k@-G$D-t z@(3^F=9EkrblwcZslX*p#$UiRc@8If2Bx|@3LfG21gM9BSF?-u*{%3;jDViR~?1t5|E5nQT>=&?9&v{R5`^ z(U&GhHn)oS**@?bX8VU@I|fB$HvZ`@vgIceo4}8D;3xPLQ62>VOW0l!A4(T<0S6*0 z1(m&^2=kg>|2|Hs78yBw^%mj6p?YpYp#M4VdGwSyT1QXi+mzU5mc*c}XX!$u1RTP#6L!1o zTw2Ds7BVHH4mXkL(-=gMK6gv`lL!DqqK%S-WR&!CgCqm<`_*ELTP>V%L$ECu*Z!SH)I$)dAUt=R5^J7|4a{t|~eB zvx!l1+sic8x7HJ6e(djCsF&pvB7E*s&$}HV2NbId0Lohrf(OVar#cXRSW`+|pXf%A z^}Bn(BV_x<#K@=#95^Nbll3l?wlX5ZLP5G_j+A}@N6(tV#!Zv$2sgr|GJ+6o7WMIh z6+7H}$knQZ040NGr$!RLoY*sZ9BJd=((4E};?MW&K5;n$3x=SKodxlkDG1_J0|?L% z07c}3gnkWg(VEi6-5Y*?WitZXvwIixgkfPff|(6r3A4X_6d5#B!<zRRW@M8UMQx!BE+8*xME?#IEzM;2=;`C+^*6*@8mIk( zemdBf-pwo4%_K~dTq&W5X)LZ{U6CNxx3NQ7n#nWIjPD~4=}z6;c=&Df;)F|?C7LkH zAGkhi)@a}gd50#0LXRnblw9)W#HN#Idi*Lb$@e|i(7XjS60Fr_f5!>TF7;w;_?uN| zrtIgKj9;xW$;=g>o@#_&X>}_Ro&4cFMEaM@I?0dUT)uq1{l72)ilrX(jz5R}7MG^R zSi&ijNv@ilaggpmP3#?hU+ZJ9dec{k_mB%S~ed}Mx0TsfW!ZU#@6QM61eTR z|6IOl487gdL(|K7J)Stn=$ZJ8hpk1Oo>)prm%%1-(I4R;Xq7b%{&8YlxNQ8tHzsy1 zQjQ`b`d8b~Z-$;3dO-BAp__+3IaC-rcSzU%pF{hHHV*z{@aKcyM!lQs2QM4U5Bdhr z8r;`@>)_D(zpa0H{eP{$d;QV%2iK?9yVsw-{^a%R2L3Ye(!e(c?il#&zy}9n1J(iA zz|MiL_UG39zWudzKUnw3y4%)$W?g07h3ib~r0ce>YinQpbpLPqpY4CJ|K|Qr_Am5@ z`nCO%{*8VA==(+Aclz$@yP@x6eKUQ5zO#Et-@d+~-oN(#wD+mruk>Ehn`%G5*V(J? z-QC;Q^G44LJ&*O=-g8yY#XZrUsrJo1T+difSNHF`pYML8`wQKlX)kqGx-aZDb)VL5 z=pOBQr|VZ;-)ldmtI_p26|MJ!Qb*@>O>_-+zSa3k=YMzJ(|NS>U}vV&-FbTF$(`#u z{@n3D9Zz(8x#Q}Ni#wtnQypB#SVt$_&`*&QW7l;rhM8cM<>uA%5l@nnTI187Yw~TI z=Va-!EYD`NVXr|xX;)95z_%CN$|^Hw$xCeu3klAYo!-K?FXS=>hVv;vBW_GEQ7$0m z+w=6hTAD4$GO0-`V~F~n6P`C#RWfT}QC~nkkp)LC>c5Z|q-T^?E;nh3d0iQmJf!sT zb!^R%%nZw*2#{Yr6Ll6fjQ4X*25)mX991x=G2jn+{Z{Raca~R^)Ef*;FzYfEG>Yh~ zjPdpf?K%G}JEN}Y?b$#sA79LPKEVqrGL&*LxQZpMFKd%Z<>t3}{S}$YQOJArnuOHo zPe*Nc@Q;^M-ZIOmOt}zBN3+$KnP*csm*b(BOz*Opv_+-OZ;Ef`OKF(PF@ISG76@BD z?3jvKWb(sJJ&WdYB$;HZ(pWthbEq7##OW^K4@|13xUgz|zBXlxC`-BBR|@TVS(0;= zr=!7;D`3|!F5$(>TCiN0SgYL~(*g4j)|XW=SH>5ZjE~+Tv@cXNjB_SC6P?!k!}WCkF8;lWsKBPtPF7@wfT65n zPvrUR&BaI_td%o~(u~5A=4PXIi=f8m&T%udiw+Qb%KX#Q>WzH8A#+iaj<9T$W0-_4 z8!U#;cwYDcYE8(@?)jvG&E+iW?1+SKFBBav&Z3{zm!{?v(qy*lG@;#QoRO6RHIsC% zs?cepWB(G`Cv~&3e9@-1rsj>cMLDMuHduizPcd$N1Q!l>H(GC!j83scUhKIxb(PEBc*nYPP#{qu7R z(~P6+tlFz4=Zq?0O$d+cX9KPUy|!2~*=9Vdeb)((vokW*H4omIIWM=sMK;~ax6jqg zYHn&VKA(~0YK}-!)xp6Dd244M~EkDc7N1U;2E;1MPC{7gA z$SQ8eJ>^lx(rPb?f;;%qFy`6n>>L-a6*CIW0_wD@rKj-E&-&qZ$VGzAh^HEHSr=0W zzRl~OwdOgiB_CLb#OA;c=iDqjuTvuwKOLQ&)#u|Lee8r^3y-TDia96e4bOTfrPGS7 zjPSUMnc{2?SkHVsUWlho_6zNDRGN%R4UXB8GdFEWtDoZA7iZ#fGne+8=Dg}st?XjV zkMe>UdCtvcGWDs-LTpA;kMvwCv`Ygq*-XylQ`k6n)u$Z2itkT;em)xrgnc@LH(rga zPiFbY^Le|J(Jw?pbCcR)Gy?>_(C&_#7=5X*XwQ@rGe%Wx=kEkPlgT9Gh*$%0yCSO9 z_MgQ+pG(W!tS4PpSW5HCbV=<_3wl&FxNa7#C|?vy)b+ z*?3H7&lJ>bpqdG2J!Phr%V>o4kn?3VoIZdmFm+?0np8QW{Cnl>j=Hy=*Jl}LE?}0A z@kLS0i#cNXjIrdmI^^n8-V*d1d>rd7OmPcQzuP{a?B#2~m~)zE10ghpJkuJsylKx+YDA zEYtZ@{;y_(bsgu4YfITVtKK=S7=254-ajXIo7Gm8Ok49AvSYs%9`|9uQJvms^w|vQ zqH(W26PFzGPo!Rbl`5X*^H>%RZ$i| zefJ~2Ju~CsxY=pf+^p6TFBej#bwc~J&&kU4HB~k#N5p~a9~atPAX1Z+LH09a&RFei zpRhVJ>Ut~^G?ZMrlG8J%+LPyBD_vcb>KEj*a)m}$u&Pv>g}XpHY?m>~q*^Z5v8shw zQZJk#X^Xqa=zTVs&!N;#m1Nub@?z$+K2vww;__rIKJ6~4)F0)0lV*x#na8LpvoeiB zpG>en;M-GWN0|vII0Qi#JtzgsFgpZ6!AjxCHitDGR-28n{{I%*D^|TOHZ8YaEIjVZ}I8xxu$Qoy4E`&5?jw6D8>2yFfYeNQz(^|}_ z^n9s2b9gQbvc*U|l2BL7aesL7M*i_|-e5`^mD6*XnS??b?>&dtz8KCFS#C=1kLk)O zqr;RM{0lD#r{iw6G~-GX&6$+Rm6&{8XirGBoVAd^2F9tGi4D4i_L#fKYG+jmCcuU> z&V*7J<*;u)&bgC{`pi7*HHG66zDkxk>_~%BLAR)Ks>`)f)gqhX%P*S4=2@+*Jfn0} z;|ZUB?i689hjpPjE{EL7Y|b4idsN29h4<1_IJ-Sj)g`j_1x;=*O2N@B4N|=YM&JlTEw5pYi zNX~+1_KX8N8o%ihBazFov<_|n-k%hAm-OJ&(^h9I#)wi@RuSu<7?dolo5>r!pG64r z=$*ZdI|s!c#Pg??K!I~vo{xMao#r$sS(&2U?I|egd2DG9(1gw8FflT z;G2JShv0C2vKMOPOO#fJcXO1j>G~WeFV7kh#*nF=RFSI&FhZ-F$zu;6-P`!xMSGUR zL&Jkm!!ChUM+ipNwYo$G#dPa)9-Vcr63r4(yLit~OEWoq--pJ@Pki2Pa(=s52-{uU z0bPovLFnRrOEHt$QkDhE6-U9AkmtY-bAJcktfd*CyMgh>7k{{8IgqI8f*$44dg$Q; zXQ*v$S$c0{-n=qiPm09Lp-FEWV(7L0ulIHL zxVlKkQ|*IoUb=8k2fTM_$I2j-rczn#5uXO6sgXn)&Qi-hbiSpT_mX~opLls0pWWRtZt!&`sJUUL75Vqu-Uv|D`Qn009zHWHr} zHYG23YBOBLua5>R^YJXX>HuDQbt@U+x;BE8=M=G!&LuvzImeVOg`eYm z+Uo#AWhkX~gh9d~Rg+JTqg$=b=PYT}Yk zomnNz`%-?6jGjbSUFqXk=iT*`OstO zbt~$r^iPmacS$yqU1y4a!w=snXQ5B*68KC66PQ&707uiY!Du9_h?{j0aw3bh*xF1E z->ce7>a1A6bsXcMN4|6-^zas0=Qra^ykzk)Ib|SeN~OseYHYRD&B$}#vbS-KdS&B3 zbUM^1m%zRuSigKG>Pmuv*lr1$N=Z5D=zLg7cUVg^x#v+RdO^9O=p7XlO)Y_6ML4}I ztW;N*O{(IhGE-lOBYpoz9LA`nnWpa}FXK;=?Zhfuez&|Fx@=23p^IOxnyN2rU?U1+ z1+iUMw#<^-<Fj-n&tBPZt$Nf7!wmnLzBO#V~|n17p|5=gp0 zIArERdc;G^dNGJ2*OE3yzJHLy!;NBqx>4)J#u{WGILv`d4L=8k2`vkfFp5zJWlbqL zn0ej*HD%`+B67-BNzd+y<#49WL`gL*Dd6To(T1{CNaC}5eH;l*iV;^`OV~K9I-QTJ z_U_)d63+ByD;PU4Kbqyij2pyBD5io!Eo91qPKDN#B5mX)#8>%frd5p4qZi2#l-tSc zM)9T;$niAzaslV3)Gi)9S)q7O8syrK5|MmzC75X!_akZyx=fV7%9s(srV-;5O2~kF z2@1zIttBLXJYq-vnr7U&nP>VH3Qqbo@Eme)hWMB z&Q_|fph@Zsge)0yQwaOFwV8~hL$=1y(G&NIi1|G14)+oztGKv%@hsYMHYZK-*LbB- zyE7djeF1E@mS%Dj_ZGl-&+ppSxHuq2CDA6q@2%4~9xhy>G$1^SY$VSyc7V99Pl-p!f{iUNIn{hEAmm2y#O!P(oF6-_?`FQRY?1V z;Df`T7-mgj<%{vuxKy!!(y!DH`rS zxAV!~54ZoW`xa`~{)SxUrPEeY09%X~Z`XFoKo0(%bO{t{US<87CXOcqyfG}MNrg+? zipHWMR17e3eO^=0>H^Fp>5HQ8Ev;nU_q#oOmhy+AV&n(|x1e<}KAFwU)uRPB8zG-d z!NC3_1_Rq7Bcd5QD1jc>H`EBl`M)m1U+1ZvIi?KHd8AmV%{ZJgEk~Y6U}3CoC2y1{ zUnwQ_R3@QdXK)E@8$wPV%DY&~oZFw4hMDB#TtG%U0v4gw&E%Q;|HPnB=5S+UT8vc2 z=_Tn(x}mcWF3oU3&w`0nhxBoPhGFTqkSjCdq2X2;xyRCTX5)7maZog(@Xny9M6Jwv z645zN(G?@U9QH?RGtu~d?`XV`6FWpBh+ighG90KLRfzMbry@i>gP*iE^E?p`&fr}~ zylw068rahQC9rdx+I^(W+eH_}ne?#36bfn1Et54#igU-ALgAddU_pG|@uu+Qh2u;i zO%i-r1j1uC@H?m*oOdIA2dT_?5FTd?RWebcHhxVh*eEmqHjNmE`il5?JP+4b#575ec{fRL_42@~aa519Y8rP> z?!Qz-6m>Bzte8ShoFBNOC<-jPD##?}g7s92uDLDb;ktMbjC^Z7LSDHk^KX*`n**@p zgBSpCD9C`gsn{v;qBoWb=0WM<4L0u|n~3v+;$h@!uk{G%hUSHQ$;Ur<+@aXY~`aVGf@W$Y1zf|5XF|u2Cdd%{8z} zr*S+wmMBXK@0U?2V!3&lHD9;ca@_R1AxD^7@dco`3|{~(G635vLXq98FB3bl*))?1 zIp>+Qrllp_B#@c>Z+ky39vN1{ zF@YsPi?_M-5Z;04dUR6IPmTGY&1ZGfIJ zLCvXp#hl86Hl?0%L>&otO*QL;L57CCgR5KLW03E=f|^r&pUGFg&k#mb%uFj(ny5LH z&B>DFQwPO+23NO|`EihTEvKEmugdFpbf^Db2XQM{KDtYu|1*MPu(BU^%PbeO

    fKWZr`GwBQJ2UHkIe2!bwe!@@;f_CbJlFBH zj%z#W9p`nN)p24+d;2fipKSk9`={FT>%Z9U7(Bn7Y2PS%Q}n}ioBAK>zkc8^{g?Dd z`t|*L`+NI-+xP9hyVg1TuIyVFd|ou(=j~GroYS|p_wVc2-o=+hi@lHZ-q`z*_4alD z)f?;o-(FL%xObiC`kvqSe6Q!8o~sA$?Cwj7>$|&Hs_JA7|ErYe4&+<}V72lyuFknC)w;L!_@B-D1*=-l`QUf&N z>zsAtBo1=8ebnh~M7#O3f@%;i*^tC_wt-U@ z{Kf%ycEb<*UuYXUtl3JO|0C{RL@DQtA6(!D(4Yr7yUCae27=YD9It{Fdd{Wsg$x8U z-Xo8%-GGhV=vbBpS$7JhM6>k0?cNj;%3VzF#e$T>t)U*IU)bIlt>!5MrIozzhk_K< zR{{zwpmv4y@_R0f|R3N3)pB%`TyMR=)&!gcE)G*6+!7dFA!c_pNWyMguRgkIr(ff2-=rVbwTjBPRC;_R5fk*fvG zS-Z)C(ya!#1pH|mGTUjb)Gdi+DaZ>z#ECp^)KrEi0(j^kvwnt`nn4W}t>VL92496V zlmY&_9?EWbbXf}W&I%=8hjw`=K&xd~GK=k_f*5sA?HLrg!2KsGM-F(Nc6$4TD^gs8 zU=FxozzAeHY-8QVY}_VD0q&;B{00p7zgE{c@Z*!gO!4!LE%8}d>e$t3u+mp+S@2W zX&xY869Dtb`yaVa_`|4Uf@`D60@xagWn^3!@@Tc~s32t>Skj9?$HNn(1(N~(kICHn zaX}282)a|i#{go25L{7|0ATQAf>eril?E7{g#;sovMF9)U38dV0A?xPUy6N*%zqcy zZG%|&F1aw2#yoX&p^`2Kt^#fms~tDnAhWT?Yc^(W0g$fc@!}@490b`|UWVF$upa<~ z#|Co*++gprqtDp$8B4bPa^bglRtrBG7OOW2pAZ1|2z#%~@={c_Md5T%cVj{M;q0Ny z(!5yRHXw*m`2~O_uT74z%s2uDDYg9lRbCp(z&iw*UaWjlX&bwUAv4**rQxge zoXLxQ^&qMw0BM2~rfO z2H75_3SWpIDzP!3wU7^gM3Bm1RgfkEBLTYud(XlvD(?`isZWjq)UafJP(EW9<0gRv zhZFVe>{z7d7sN=%KoSLZ3QiolBfZJmhEFW3Mo(dWvr@|SWy70;8>Z6n6G4ilmc)vo zrT|n}C{m5O*WCJkLCV5#U<{F80kdcaev6)#{hRrH>XSMaVI6S9VGC1!`xrK#t$G^& zTbw8vB#fX~M-UT9$#lSdm=Y-kDQaqCpVmV-k&q0MG2pPsGVK~(>Z;r8Ir>?hgXzLj zNlHU7P(8v{12c%pCAU#$=wiT<#)N>FCYS1XPWUm_A&ziZMARFS;?TmOjTaV5*$00l+RwY*EZ?x|%dZsIt~>?!Ho4UHzX%g0wFg4DQh`8HuR+R@pBj+b_8WL9JzR_#fIDFVkoQG{9N5&{ zmJ4_>n2IoWA(Y+1*GCouPASUeTek30Tq#gv2d5p@H%LUmxr8DL*$rp&QkZ`lfeBzg zAR7%GpyoolXUTPM*!gLLd1L5iDa5PuBcqjXTgdxwLPT_+qN;7Zri^BDf6 zOccuwcU7F}8^6c@mL3XbbP4u7S#ggmC4e)q6cn= z8>>Y|UU?NXC}6(W4*Crqyro@ntGV+`v?4Rdr{cDvN*eNHcs&>1B?cq&Dj7NW;jiqa ziLcumkK6?{Adg?tKo8G25=~6|QnHjKZ1V?G3aJM*RjIS_b2p(sEwZZ*{`Fm6ooyiW zpnY;KodaFGi_WKJ>wZRAjaBOk7pn=Ys4k$vZW9j=x5_|%_R3x&4es9BDBT7G3u5VK zLlHmPK20f9mZe;C*;!ArFy&>bA`n2VZYJTMe+|CJJCvQ|H1p0)jhkar__mL(G#4BfT6Yda=-Z^^*yeZ!5R8mlTl|&L-!?kL-Asi*qeVb77&31lbi}H z1kIdZrWL%ZpSlBjT4Z3=ME>Q|XPmID@tZsFUc6^cbVb`hssGmA?{&Y^by~*-qALa) zBg0b_N{+KM1&<*A+Hyyj*6!8k3|YTv3S2j7MZKIbXLvQgzaN9u zA|nT{cw8VZw>=;}TZ9O&33^IRC$vr<)J(JPV6beQEk=Rsr7IknrmLG#s_Z)IfCg9C z%exP3ZQObv1|9G&Gac#fA-v9MS#Go#R z1u(3PtwAe|xTMBeZE!Xa^CS1Nspg7@@m4J&;(FlZ3G!$Z?(jc6O!X+1C?O~xN_84C z%&e>gIB}kH>*w6U96fjs^t8ypsj=Z*@)scx`tm!HP9nZnyh9*GsZ702>ci( zGZB}{Uk|5vkGlW6IG|c(L-@JkA=$y1*x^}m8nKZ6hFdK7*RbDh5Mro9S< zLauyISJ!@;xQ?D61R4#$I&PrxhF^(q9*(O`E`32^bm~%*rCc%F{4*r>YuKpOB5;db z4l34P?ftNbD1R%S9>v!h?(ucpw{We5F9r@>e5a-PiFxR^;^9qeJ@J24Xyn7JuVEli zLjZShV5s0>4SGR)rALT`#UE$}Y@Dwl%)0g?*Bk^M`o=>8Tgly4*D!hFwc`d?cKp5> zYQ=FYgj!qIE5DX^BhV^m-!tmE*5?`rFW*l?t*?vSBcE*RI(2Zo4k zLhn25OXq<=i$B{FZbicE%19&rIe)H{<=^X%e-n?aUnL>;T=!M5vHa=uF7laIC0iTr zx9GWNUwW4>FJiHl=Vck`Og@@|7tYU;{=dSywX_0o8JQsesXKLJqyATVe*2evIAa!@ zM_$VwYHqLbHFp-pi3~TM{IeM4%>qlImB41po)LDI62^{sm)k(S8={JY zG^8Tr4P1y;w-V;(Umm{=Y!w3PXw#p8sR}HCa!`QItlmKU-r7t8ZzEQ@T15BOS&e(& zMv}wGjcxr8_5N;f62-0b16Op+iHPXAZ(UDN>+dysXN$pp^Hh4iNCByDb)#j@;!1FS z3z^?7*-Z3Zk`WXfS|uWy(l~!pX#j5<5e+-jvcLl8cFLy>g*f9Wk$1W!dxu(DF|=+T zeA+1XNU-D_OJV$R;YgmEQ|g$6hOOAG%jKOce|-&27EqP| z?m=ZZR4=CyS{Z zX?Mk|A|D=>>>XU)3Z|=x<*0gcg9KGb;m@V8O#oux#f86{#+l&$Brk4|pxE0QQu4}{ zum0O&Z#V*u5Zfln0FIa(d_r2!hO z8rXb{;vRC&771`ma6ZCm2M+@(E5K!h7!jOtKsrJjjZd#7Z6Y2UAdtRTL=J3~fS|~P zupa_+Hn^qjURpt2n}Z^boOUw0l-nv(`oGfqt?pNOoCvLCI*x7RTS{T+U)(&ALNP1r;Zz#mbfvDJs%g`7 zV6drIHw}Gd2uf~(b7t8+J2q2aqd0|ZrI_aEdD-! zK{w22rCC-Z)%xaqC0h}@_mK(g-qvOwOn8=90_z`jD6~P2NyJMPb0HivsL9O|{G_#+ zr%nF->2d&+Umn`uNo)rs;*s<`NLOS5rAKP^O&ZIwF!}fa{J6E5+;qC#+UPw+f+AO^ zEhW%h9FA>w z`BVl4A{eVPoDK@QKDJvjGPqhq4sV1nJWiWQmiiT~<@Q5DKbLz+(ne-781mTV&*(0VG18 z@b*|EEyq!Wj~S3x3VP~>z+6?v)@retWX(JiPLrnR!iFLx?d-C$cDqO}#@_r?Dbi{mJ`w1Cd>HyfmoyR0b1N4ktu!2)WEL!Q-io&9 zaW4?ZB(5$Op8+*3BC=cghdn&9_{B3M)1qN%#2qU#DsMrpGvi#e5$#zRo|aZ3y0k0> zn0Tmh-&y$4y1M~O%qUs66$J5!2*B@7gWdrkIcUA=40!b(F-lGzJ&u%&e4m*jI@58F zgzHQ=5~dEha3q|JB!bPlmdR_*E3D<}*=|m$0L)TaBmtCApz$Ak?16g>v7+HhfQ+x`FFFfQv=iGpAMgBp=f^rzol~8s zbPjdA(eeF``#MNRjfbASi`{BMw}uD*H2C~rWANzU#e?S$o;|pGuw(tJ>z`WxCDDoN zKSkIpKdBkIiz3e`>a6`2eOo))iTCBd>>cQSwEO1nk9H@zC%Yx&yO&(HWlQ@v+P~0# zd3&ba+J0*Lu;@>s=R{uKVs6nVChyZ_-Jz=~VA^~>B zR!4a}#JL@a3EK5;#9VCh9ehAqPoX{3yPyFO2Urh4jsPQ&Zun+10uL!7stCHd7ZLgg zoDtXqI7wvt1kDJ`8GwdB-4;EZ2goEsjGyb{Bk+0+g*zc?m_;CyUR-Hd&s^Wghe#3H zgu?+bJESxr!ixw}1^^9qY?0TjsUgaZ_&g${p+z7QG~ABA3SulX8p?xu9>>81 z^TzDfJC~(277JJkMZQ51P&4SWh=&~DMeWTbHlVn?a4=!O0Nl@R`UL;NRBFbxGuez% z+i1kv>tee2I5>U_&=GhkQPRwWaHz?LD5tH~_lod$o8@7EWx@qB3A7F9c2Gxb>}f%Y zP%MQ7MFDd|)EQy3P$rh%`a402o4l`%NI5R1X257{cq4zd=WD#wCtt+O0_;N3C_n^y zfqMYHX(Jy4)dR)?R~Q26h{&Y?vw{-VP#ZG{KL&1!MsDe71ErHes1kSKQK=xM$PHj` z00}}Mn+MvY@;ilY`A`N1IbtUBB1#VfTVz7$nDu7|garVI0g4u4nh^2N0o;T|2q;Lq zFwz)@43>3033yf%h&CfYe(wCpnDB@3g@E{F^LxgE+cSzC;(|ZOBkACW0;mMhO^gL# zQV#uMhz6C}Q9dY)fkZI4im{*}R`idC0WJBV1zt7Q6OtsT-w=6=@ExL1CerpsKO;!9 zFmZGop*jfMB9K^ceQn^OgV-H-!DeYDta^mr4OqR#)aJ$iUH&oMs=yBdIRyNlHwwU< zLAG)JU1^eT2)q|M(4-9Y$+zDxNP$N5W12$Ph@g9=0s49@vvq=(QbJi8-3NXI$U^+l zv<+Z}kzeuBMI0iaR|S3szys7v!mb4Wti1hO!jAzO!9Ld`TT_p3n>wZn@RFWoX@w#y z5$z-|Iy03ly2rRo?DM`)J(OV+R;v9Pdr^t67DJJoks_$|f|Uz`~OsBh_) ztQj9@_U!tlWhtf>05POh!E^x!gF<}(9rS%g5F;o~zvz$-38Wo9G^^P3nf}iUQi?mr zr>6$Pj8M7>kc)sNKjsspz-9r204xNyAV5@EY&ciF>or~qKW{VT2Ep_I)>oYt+sex92IR?}TF=(0QpUAy^Ts2QFV%zW2(Zm&>(mnCIV!+_I$^~!jCaJ zu;YLP0Cm{J(E$d|beu0p(*U#pg-qcUNGHkza-lacgFHA4P$Osrz882Jyb@NKltNKE zg}sJJ%a|7#D8SoNyfDC+-dKLLi&qUX7Kj}%3!8}=5R`fh_@vte(*%@+$p9oL0CRv` zBAph~9MH>7@n}h!Z^!eR)8! z=|PYW0Y-;6_u8a8PvU=!Ee{Y(5H`dXph*W9Pb6lEcrc3|@I4B&fQbhx8fY%CG-KS` zg`*mUdI40#h~bI>pa#%szyjvm>w;!%kwq*~eM^wy7p$Ax$J zCxR4f0~jt-5EIfoSKVZ zDLsnk{IqJCkhHu3ggG!ff_6dCB$XMWM z#tDRJVqoEM`q***_)p$q(v?iFY6g75!FaGpH_iL=8wJgn+UDIKI#5RugMkx++1a)% z1r<9kYZSE(&nl4Cz{atgYo|9O{T!#?$64HbfQ~ueaPc_NSxRv?Yq?|mRz~}$vPRa1#YEk3x zqfdJA5yo~!$oX#gAzFM~%l@yQxR2xi5}XfT^-9j&fNF&_(T66z(1OUYNaQj0GaJcI z5|VCmx=%8)`TbA8A5RWCFZ;g|<+_o$Vu z>OH~LH6O;Oe&sA8?LnfLJ|H<>qS&zj91@m82m@ZeyXlZf&D87Rns3gjl23cwoVxi3 zcXDd!dnhV&s~;kdJ$UE1;GU3&;GVDtaKC7xgmISPC1AO+IZ#>wo!>$p3`qvJto;bB zt#B4O@qactkK>~_c&_B;QLI>+n}a(Bi^UD-B0~T0+>;x_(C$1>GPG%}C&*#d2S&-< zeP<}hqvsvhMX~LC$;~4zjyX8(pnCHzsZ_0gZ}xD@V-5K4z6z)Pg%bCMLv4fO19{P* z{;PUl>_~P0tII&007bx*rk5&k>hai^)hm==yyGqFmSEi~$R&r}0}W%6_r2CvT%U%i z1?3DkKVS88s;NT39!APH?WhV|$nOauw>$=F{mT{PqRTV`jg!)d0F23&J_uJRA3yVy z>vbnEsKt_P+GBG0$mhb6y~FQoJ$x@}#oU>63(QD6qfNgjDv}6(&v0!rVBu`?cq!?R zD_zQXvuEV`3>=m%GV<6Z`DUH>?TvqA;P*s0ueQ=1WhGz8%TVXXtWeYo^BM*9zilCN zQOV#?i;T?w`2%}fAwWNhNoa%_MMH!Lvn$Ry-StToSboEDnJ+~R#wJqD!OOl{MBez8 zMqp_8QI78xEsn&G5}N?iBR6B7G$m&vWt}%mHpdY+Xl*8kqj&EkcmEKC{a=4#nX&2W zM6*k!l`gH`P5hP{A6(tq++(~~_r4j4OSB=-w*H=hZEb=6OMBVwC8Q5GN$bx(;iK+D z2!;yQv1Q_y*9S|vHIBbN8dx7+6OpeKCC$po(Uo|oLaKFG*s@OV;Oa7sW0E12IqGR& z-Hf{K>WW|9jt@#ueR<7C$l?dj# zAN$~OhhqDOntto^SNzti_lmHMPLRnIt7;steyX{ngmdDni?EV+whdZEcMi<;-`{g; z*ZIBgbbN|h$!id(3N4|alu&8DWqD!MoqpMIRvnG+>}cF|83IIO_G6t0t?}3kdpMnN zGC8@Brg((0KeC{U@o7~xWXFNg#-Wc(fV#FF6TxoqunXgK%2;FJPw!Yx1(@Tr6YkcfWYMja$b@U@D>YtfYrpOhCsHcB*D*?XooJPl|sfCp; zeF&Z5wsD}=i&*2a3Ih^jX{iuMI}zJJU}qCqyh1WE@;(`lN@{1MixwKY@BYiV0Dv7EfO>v9YZ`@PlC2numg$+S%>X{iD-TOH?Uu=va`}5% zhgzQ__q^1*@5s3*aQVm$m;@BKJhl!>d3=#gr7X^Zs6vr4+GCl*jH0QOTzQ>jWVls! z%{}L%cJA%sZH?Ej1EOlD^BCp!gO)zpJZz%9+Z3R-?wbd>}| zSB_(SP{FTw?_`KgbFqwBmkL=@vFQYfUX25)wHbVyvl4R12l(>~S4#luwjb+V86&Gv zH>+TBvr%o$_m7Fx(+Ds14?3*BeJlHeZm^><>*#XCTpo3rV!C*Q%%VgsL zHD^icu^@@;8Z3gAW-=fDya4FG`5J(X#%#xEDJ6cYrX4P`EoY8r1FAs5GMgh`TEg01 z-HO7HkASN0jh)-cDgQWkiaeS;b?C@{?B7P_uG%m}Za5}+3@W=;R959G{X$K{Ndv`X z+HFsgP6CyyTaUbOHgX=`+O)M%CO}UK5bn#`28#W+^giAFk1k1vUv$}^iJGiD7J}{A z#+A2D>x)JmtJ5Nq;O6GSEJJ?qMZ9%OGm<@?MM#?L+1fCDiNeL4$0%7ZzXnp~g{fI) zDm2aJjOAG?3Ur=!EBd&)nY4MHS zlcZ`klTY7)dsvH%yplPk38~-K`0X83kLwua=jBsR)KiIh6Ibwhjn;Z876?U2=oZPI z;nrqq`_5^6_ZGSg9LFdxFTWi9j)c9&%-N%PP8*-hf+&-2H)NZ@e749aQ6`_df+Dbz zb45ESBQO6lnve&rsr^UD)N?dE9)Pz99#Uk50XButye7I!BO@36K(h5@Fb2MR zyqXA8k2GQ{>w}e*Xcx47C2K#5+8A>OiQOJ@?D54IO8R@)Q^3qq#H3 z##U^jNmG-i=UM%9PCk|Pl|g9rDt79j*YJU~T10MoRL19p0gjEubcQ2`YC$RC7T*<946lmh4 zMoATo54ALt@T;(Z%@TUIzS;!29;0N@yuFa7G`U2@Wc2zRR<{fqZu>1v=;~IgV4OUl zJ9V@%`a2vwFv64`n(srNOQV|0yxFHM>J55ZI7`m|Ir`AjOc?G%d|}?k!#@XjX3Tnw zGDGuy$mBIu6lIupsttBGle3c_{2CfsTFE`TckX#lHB{qor~!2zqdd@jPo%{xYC9z6 z6;)5MY@XAyt%H_5xw=PvNu_y(Y&j`0d5Ku){;fzQl&o~m&fRkY(jZ>wM_aRE2(RFj_m$Ce1*+i zxfaG})0?=rTaTTDzrfd3cj{^?8N-?52>NTQ zsMC4U{*C0Z?){qvS4+r9@N&V?wWkMvdbngzO{$rKrl^>mnyx42$ftVu?|olu3-dj-9om=skTO1+w1f-o2T3`#8As zCdX~X5xGd9w|W9}r^f6q45QCqeXH|yCrL+9=77Z6f06XWR7(+WLgX2Th0w98qQi^M zFfhi7{eUC>(M8g!$sRd+>fi~C=N5gd1l@ayGz4fuutaHjatq!h2sRP`_V8v_w0pmF z|IC_F^z1|BcV0*h4)?H&XKt&&b>jf9S_9)a4#rc!00E!{eD!%ACH^uctb%XPNvCGk z%z`4m1t8S3>ZZ`~1JVl->fLcb`k`qE9H)(t**r@snK0{sIIyt7X3^CLq4hm7guQP) zT+Mzn2UjcXuoNgp!B)-N0D!*$a05W04c1&9*TomHf6E1=NcD5=g>+y1JrvqsSZ+UH zMpA%(%Y?xw#oMOAq7N_?RZF<>+GNrxKy0p=ML=wRRVKXyN??*_+JobheJzo(#fe_ z8M-}p$MMb&k4bI7625o@#z0^RH<$9P7c1wrMT0|=C$U`jRfCF{bOK^}td^liUEn+U z;?wZ7n|f^XQM9lgl*%^@z4&?bpSX1IuJEE9dSXL&@9bG7!V=no0+&lC*IYvAk?%UU z10EZWiVf?W;x_m3)bByZB0;4%VD@?G^A`r=3lHc59Eul!$w0=!7qbPiI_U(2BVRKMdT#s8|Ho2qFE4e#%%tsYfH!5pvn6=>sJU{B{6hLQ@thO_94X6f|w>oTBs-sRnf z9@)EnFS_B-f#8L={WDv6dPVhZ@eWH4*ynQVM!q=oiwXVc>9G{(U$2zp_J=$dd&}g+bct-K5+1|PBX4vGWi2-hAlHvlkygm;Pn%X}Z;uQ;cle~JwEUb$>XJ-h?7Ux(0}LAc`s3CXBU}Uz`e4KC5uvlP zdqwi(TYXZkWCyj}o?u7V2m$an|2^Wu|qp1X=KDzM0` zT#8pOTVX-(hA7L#`JNW5Gj-QCde@`uSceS3O&4}Bc4Y_Cm+c+}Ve^~K(P$Pr3D5yo z!^N{F8J(KIMa$`fSMx>Os9fYZrUg?)yxm9z2s2Tz)+isVY@nC=;41Y#7aX9gCE$H} z30OT|*tr#5@#ZfbUDoN23A^jCN4n=IuRYtg?#^|S(TRVVm>a)k?1eGwhWj>5jaJtG za6L1!IQ+NalfVXh@!(qro*ytll<)DrlH~gma^0Q0Q_EEYr?#KkhMr@$%u(#gNP<;j z49&@-ILXLKmZRknE}@jiVhRu>XoVuCz?3YbRMHr!I6^Q=3Q1<3*mdWxT!Z@*M<|je z6-p&M#FqcgM{;Q{U94B(D_gr?A=r}?^nDbgmGU?n;p8MvGx7)+9pn)(+0#lEV$x9L z@>dA<2uq-MeROiq8~Vl;p(V`8L>yOAoFXPC7%nac=hT=y%8`^D$CNllN7-lsd~L;+ zz&9XT5Dp&4&+p!^#PF5cD@kVM?{h8Lc4`)#`sAKDoH+?(>TFaQXXQAdRLDt19G5d# zG$D_3SR|sL<1B|0D_>!bu;`Ijs=E(h%>Vt7?Wbmzo5JEsK%NkUoQp(aax%d;MS)Xt zhGsAlOHfe-8$a(O6r{h=rffg8dHE|e5sP6A6PHs71vCYMOUoH0j?3u?Mlt^;<=&rdpG%(ZM&ye&< zii7GVn1~#wX&4wX1|N)Iq?}N21Q>zoL=2Cvd`5W$Mhm^PcxLw;4Ru+WSLaWKb8~F_ zsj2Q)2>K+EfVCIlmm`6*Fq7k$JQBeZa;1{x;*nS)0yFHquaGo~=;biU-q2Sjg)XB{ zVgT$>G7KZfag36ak(fdrWhhS0;SmD7VKG?#^m$*wfZGB+dc~HD&aL|M*3J3tm{{(u zSS-RSA!@IjVQ^UWOgt)wa%nkDV+4UmnJ5uIH^HbQ49TL%&+d4Gy*0kv4kdx(1QUzM zX)q_l4#twOmqp_87|q5>MU;zTv2*R9j*ukzhT5_1)R?g5>5~c=V>+UQ0pJ@$VlcT_ zl7Y`eB2i#{fIW;jHy+dx1&a99Z*({|EH{ItXk3{{kn%`04kHiyt(+kVO0Iz2nBqv7 zUWs#So;;$2oLV1#lunC&N6>Xw*e&O_{PQRD`GdcnZ_hy@!V-#j0!qhVXyjy^ipUub z)(sWqVi7t@kSz4#^4>xmp<%~EXFf5x>y3S6MED4%Bx7t0_C<`vBCr}Gv^+{vggg>s zB20|K;smyGb`iu8lErEM?And?vRei=FCSRvw*<9qava9;WFi`ka4c+#aB{$5!a^fh z3U)0_!BIpsN=F#jIL_4{NU1RN9K#CrU%Tl4XOP1no+KHiLXm(Km!P9CnV{uz29HMN zKpX>2fpd_<&mDz0^bCP+|LElIH`XzOLdPUnTFKEcq6#Jf9TSVf`H|ol=qH9{I7I@0 zQ0JBeeuTss{9NzvTB~DLh8QBv?KuP$JQ)QBH5^tOOjQQw4?;N2<8YX8F^pEkXgtow z&mFhe5tc;~gM2r-l46I}?w`-!vxjf_$#@*9AEjA24ObHApeVnd8BC5RB2n1mY1n6( z<*vsVILFZ=M^F5tg1_<6JvbZyCzUu6iI8y0MHn&xClP!i3TKd9H+CE1MogDpoe~l}>@Hj)d>|If^>T#TX25qx^x2VX*1(Gbe$?&`$+JQFM{gSW%+OB;*Z1R+ll()& z&{e2t;l3%Fo-??c!f{GRo3j2;0wS26iol)Kzd9L3>gBo4k0VmRiFg)y3dm+x31Ti< zH8dIaVJd}zN?1xU{?{{TA}QTCv04N?A2-1p>t!q9ffhnEV^04cn7ECeti;C^S` z%tn(&WiBBU^R67cc6w!C!`X3p=f#|q=PX)OK^el+1W$V0I-)^AJT_e>>}lqNGSVEp z40>e9_57JGE!(!vH#lk6l+QCi3a0#^J7%wtnKG%gw5+jw6J|WGD?b{Ca(ZOl;I`@@&Tnn$i#*fZC>lN34I|0Z?Rs!DqGSHu%1P~lpbT0N=g%pFJeqj$vtWAog# z&{jaA@HCRbpq8pxZ5<*qvoVuJ6ERTeTl1i_S)B?Xo&Nw!S&keQ=>9HiNu81@pH5TM zD@YpmTN(vd72@(8h8Et}mTsEt5h3j6e+RCcj~(99nS3+BTK={6&}4u$lH zfF|)S-m1j|R;Gb-b*V1BoYz~L;E5^dEgJ?yy-L)SmQXFDk16XMy7GFMomW+1?0aPh z(_M7D^H7!7--Q>=E6-FdnVk>fX`PqmY6%>(Q+ye7lRe2uawGzL3uE#PozGt{HNzaF z7I|h&!F+{RlqEgpYkBY-U`-r!Qt00gl%Y{QGIaLZ;r(}h3fOFR{q3sDko`jkC(zzM zNbeQ`7>-t@%cMenp1E&koqzQD5$Vu-20qw#FaHd^90hNXj!*YCPHgzwZ&;(@9mzcf zpx2AMMH&WH9B|VBH&q+>w}KZ1ILHBsF8G(CM?NauihlhT>G+llWa;dCVED8IE!`xY z1|>Wn*@O4q2Gu+mCcu-2=blDi{V0H_esYs^YY?oT+bl)-vf{)qI zb=?E^JK*U7*CZEs(U{Oa9Zb~kyiK|Zyd>7hfL@x_SkVKRO7jA!@Y zIITP%NZFGOh;<@>(I;<}2DgBpF6b+PzL@7j=NZc(UI+Lgp)0P3etY;<>BP*MIS}Ui z1+PoHV00tVIC1^5#!~Rf12;qPZv-b-0G5E`FTiDZ-N_7c-X;ZTZr5$EHw$_xVY8yg zZo6Pd>^LpuL%;!OQnXF3D`^2+eR zv0Ded{Wpw0A^9|K?0+xpe$GYj$`%WBz0GEZ%lI`#2+jz&Tv%nZ=+(PGU%Xn>MTGOF z{#~6ny^lYRoQrN)Xu{Fx4a5DE#B8ZVJ?u#bVZnF%#dinH`(7Ep;P-dq+Y6AB`|pqf zNEe7T#j(pL{x|aSwiw!oVE^bzMXve;Y|Dd(ws&qu!Xe8OunNads%TgF358Q*P5JZ{ z&3u;E{?1MHCZn^tI7EF<%6E1K{}~Sa9l)_722O74Y9TvOW;_{HCF;vL<9xqtLg+ox zO;f!xbn3wRx$~lV4&DK#2YQj`loevo7nNL4Pw3UjqPmizGR`FW`t8u7o@BHy1RA&d z>vs<#;DgHWe^W_VAxRNG3aMs-|UgU5uU6(y)Vl}aJ*15j#DG9M@K z97pU7dQr0HD4P19^v_cx*A9Jb;NSZDC5OPkPmj9z>)SN!!~Vq(eB-+A1*{p-+i5)C z@KiXH-cWJi{Jyq-sy7+!OK$?y;H%Q@9r9yR6AwZSLKy-E2Qx<^TGADZ7(Io2+u4Ys zo%cXJdy)bF`1Co%#cbzY_rRcT55S}lCaNbMvuBx@qM0k(4f!OF-v4nps#m8X$upp6 z=fh8TCO^Sn;9QG-sD_B4tmO-8ya+C~nNlv7&f@%nnb`}P2S$0mUlF@HAHx3hOt)Tx z=znB~wsxW)fm_N>*P?Hw;1ujF4Ls+rr!7{hQg`uN*ets03|#1XL}1wd4QyTzfxYvk zGkpD`i&sH00;&K@H|i-&ZO*sVK4;!Tk*N4dn6tgfXy4<%vfg=IH`4jbCqcVA9rP1s zKbEZeQ*OLuBWn;d^wZKyrh1ck$}d~zho6>uBvWM_7jEV9x?oGeL|eHWV()|T=t&j8 z2oK!{2F2;wbrahMzA<*J?^mN&58X2YcBiu!<-q{orFe8K##RQYWv!8Vrz37psZ15d zhNDZr2WBDDS?T1&Y7vt3KQ)Vf_uSwVuVUWT`RG~xej8rA25u39-I=E^ag7oga@Flg zt+%Wo2{iNo)UqcTss3r~LqL`wT7u%c6Lhi4dIHqIDR_d|}>EDkagoUV$zD z&!2;V=@FsZe~>+nuGxQLpc8%&E+b$7+kpgn^z%@Wo>Xvu zQm8siN6^`W(~f9$G-tg54`Jr?ad4}4I#Xb1c>%iQ^IrgiXs-;pzEL{fnf{_QESau2 z%$yZZltM`#oi#{#FFdKT41sm%BJjDM*&$@^J&P8&#*67ueepYC2@k`L&9vQrr zel22Qp7@e9D48z%_0<|4Pd97kqLRpAG-AF2pX*JA80rsNI}d#YW|8DxH1UYkxXXJQ z5cr}Iv}bT&%qovuV9Yvu`>%Mn1ik4ou!6cy4}*PQFoO0Bj5ub`JofrA>zujr1l+KAHme#(!w@yc2Ez zu5<$g>9zCz$q?uZ*o}cg1HJ^D5q4lXge86nj^XEd#IBvUbNj*5fJqtpo^*OEa9{9L zOTeGNN9qB_7I3%)e|w;%{2m~3)|8^>zP$?~sPifGr*Jqfc@+BMPlEc)(NFpGZlQ$XSLh&pGUy%c8Wy+4y)wFUTofY1SWOn^^-k4Ohp zI>0YL@U@xSw1yC!8u{DSH)4(k6wc|5D;HfJH4VmpKDH0f7Y3MXa0FLp`R!^3efJkq zp!!}b2g34gk$d~{=P!8KMbE=!*KrzL8${!L@8$*e*3ZMSck-9gsn>06V4pq=_G#<| zKqCPho@edpLgV4i4}2%U#R@Df{Jsci^EIUawJH3c$av_BiRHckjxU&`J|Kt!wheC* zeDi>c+iPkf<~P#)o7a+}Q!iX4a*BTSHy7-Mt-s~5Sg+ffzw_HQw&rD{{QrPa{*HAM zhT*+qw@L08y?;LKAr7|(*(TI{74$bfA^-<;<~nfm`;J&AE% zbE{fv<*FtOCH@!M*pm!|0`&{4Iqv^3U?G3?2dNnAVjV;&0CeW)zL87Uofx`nz|i*@ zUe}=kz|rY#D}bY9yW-C&eEGK5tF5ar^i-d0=8jur)8nfI=^8we-8}GYe?_h^emi!fCEIqe%Xa^j`#P=!1tf5xr!u& zs>6*6hnor{`9fz=Yd|(R*&`F;CBN&tbKvM}8Il1lBZO4#QkB7T9!P;8CK?}PQP&iT zcydTK2}*}Gv!FBY{nPP(M0_yq-|!AJnUf78`G{Zgr~Ga zt`XVX%$h=UcIq&6;^!^}hUdLc%ZB%D89Dwo4p2^;c+NLoc?47<5a5XerX(P5fk2~t zVO!COQQ7$H+F8JL_*#GGk!NIAf}{7$>DlGI&klMXfMoH+ML;8F0&+PQup#PN{Bbjb zY-6&Go7TvHo_o3kSky6@=K|=bt>ZF4VxFE^L1OlbCS~sF z^tuV@SZMU-kLo|bi8&8kq0pc_>OYaWWgD80pvC%lB61U;f`23@mT2L3Rs zW$39}`_I>me|fh|1Dk+*u>z$Dn(>O?(aMo*K$~c(iCoRV>)fHVi7ilCj|@qE4TQIk zL>N%D^2+Vf78&fZ*2OZsm4s(;ysbBwjkThq!L;Jd1dqUivX0F_Sv?}~RQ$>Tr1-?4 z&7HeuWUxaz7E3EFOd8YfA{oNm9EPX;dQ3d;f3{UNHQ6IWr-Fx}g}i^YY8#XT9bQ~f zx&RVB5>~0Sg}O5q47!9v1l_h%Ha)Rggl_*DC|>UV-~HgIxD!g*VP7n)l;TdelohVw z&(m4XOSRCcY1w9!*d*IDv04JJePH-sW|QCC`T8clU9QDEv`aWZ?D2BbiRqInosBKT z+UA^akLhfO{^^kcXzFbuo@;go44UXOa}7V&0;8u!?i>2i;BY@7xdt>GUp7IUokgB- zLzo~@U)`f8<2dQfCOmLs=8uNWD04B)vmOz8G|~c>)GtEhq;Fj;b4aGsie}A&v#q$2 zQIxICX7>iP2_4%HzwMEMitng68^91S+xh4HP{3q^P9?2`GFrFhqB>6=Xs%%bOdXJI ze4T`633$)5pPoWLeo4NyQ#=53X_tGE=jjk8X3$>B1#!BOz>_LF74VaMXKg}v?2~Pp z>Xo6}@75gbKm@20d{4};^h5+VU=6a?jwW)=e4-TK&wRk>9E8^Nh|pQp4-cZRatF3` zw1;5(fvNxyR;)^v@|roaSv0b3LklZ7d89ft>sFa;da75}RVa3zl*z7^>~t>j{2qd? z$Ldx1w0N==b?FNFD437#J}f&h^}1B>wmR7P`(as#pE-5-wJ>v>^>QkJ2MZi)*EFIk z1zaup8k{@=HRzRr0{yAO5I9ac+xhAdnL#pLTnEwZela-JuaXqOk^QRC&PyMk4#GZQ zU*dTL1hY}IYRchwMNJt)`ldw*bOcW^vYEYLZ6(i#_Vs2%r~021m7YtK41zgWme#?_ z5xmzu^HxnO$J7#ftI5#P3H#lx$7CBPR!b13y$#+c$7EMYb}lZgbh{Jx01}`brMPyy zZc1wCZk14;faTI7LuKlPbMaZWbiPOMt9bGHm7U2Sgivz0Q?F-nzsYaW@kPx|y)HHK za{Cg&u%>1C3F%nm`2&Py#i}VMN9wVvSB-Pw2w?n%FX|jQ)HzAZ zz#r1FG{84Y0BtK=fUF2b(<+P8VvEF=CpO&QCM&CD==Pag1O;N}Sxh!7dcEubTj);5 zQvXVcnq-Agk!GE%WJo%4R+q3vowyuU%Iie8UyRS8|9biG4xoFNiA?X$T_M{8?&eE< zP-3}TN20FJYOq4JnDVK?;>EGT;`{tjD6&_Eo_k^Uc`9@SD)a%g?K0V`f{yp-G1(r` z0@{El!`OSl*KcI_qQT4i!xA)Y-&_@SZr3c0!DtDj{hny3&hwuIynahDz$wx9^|HCi zo>X+^{qMAPJO-HJJFi*Vu=3+@BoWd%ZCaKHMnXO-i#kU5aZjp1-p`tZACIp5I8Nya z8T4dlIkYb9l6dv=zonAx5bZ}PPXoZ>8n~cuB zKVs_)*<=7XW|nwH1ko{|5XmM9g~dX97}CcCIH98t=wLFKSIdwp&YaWQ&Y%xIcJL_r zn@jc?p`Y*6%fN|mi6=@BocJQzwvxjX31^~aZ?-s1Mksno1@pB>hR#lZO_*nhkM4qA zRmnt3k3AZgYnLwZ+zEpJA{Wy*RRmtO)U2hl&qxS`UTc?a9$zIvm_8+XFg{_IVPNQ? zmIk42!uufLN_m__%A^mN$h4`Y5@u{(BilT&T7srO!QWu`0DnDBi~pgOiB?bvvrfYF zZ<@Gh;J0Ji(OZVTJMu|h@6Y?e1eSOgec=I^)vL5AEKx67^{SNGRw0Dz=$uD3G1V(W z)6}iUIyZP^R>=gyg&~J*L+`~(xa@jvoj()1JVs>fw=1O&YJ_WDaj6Cg%DrY(Ok2v z!IQyKMGV=|uWDw5oV{^Qh;*QQqA77>L5^xTP8eMQMFfll0rgVuW z3=NM_=gUE1D5popW7ILA^`Gjz5{6=SGD{m*CbKpj^R)mM=r^UC3QydL>@L}X$(~eH z{`mkH43K^p**+rOc>Xm0>flA_DK|{x@DeCx#JaT;EHEnK>QqkU3EBK9jPI^lG=G(B zYN}U;9v!{@IJ%NG4RrqVDw!Wbd93~R@?Q-%$sSqv?IrSIT`luS&`62W?K};RzoI6% zXKaLVo9i924h$JkU41$xbL_s!dm0>>#h>?#$MRTRd(8#LO5|VgMr984*O+V!=mbC` z4AGH!-r6n~9`KO^bu;+9@neO@Wg9oIl?9#MJI}vVom1#z@e96G{~m{zYR^zFPlLx3 z7nlYjo&I79UaAlx9O#iDTslvytc6!<2H1*$!d0lSb*afGu&;`9S zN}O%x+#0j3bLuYML1$M%76j!lkca|_Hz=%ugcCy2gG(kbqr#pGlXXAAQs>7uTst!; z)f@j%Be>ELca~&B8@*t_8hT>jZ)4Yte0cON{f8u8e$zV!o1SZFCoDA>*i)6u= z=g6oxL6*AhnL$f!xH#H-Wa##br$Kea6V$xYhP&J@=h6-+NVvboJ(`@CV9jpUKxg9a z1l&L~vMsv_f;nID+>;BPt?v+DG1u4O6|>X6#Pb*k_bIAs_c)pk2(j+5Clet-SA+hy z0k5;wA_$tNJYS{eZt_o+a@^xf0|&4>tSts}5d*lj^vSjW+6mMuJu-CW+695jr!&{$ zA7$aCZ7X|d2!hmtRorWf)SIqQ+Q1;!J+PjxsKTW0ks--_It)F6>8Cm$stS83uuF*h zRCpdQ6mgBmt*tT!vj?oX-E!`Jhiq_{QhC1fP)|v^mHfh{5(48N8BPX)Hp=+X=nCYWR6fn>>z zSIzZEjnZUP5Sy2|UbcU#HyKT*!?w;t*Tdnr(Y9`#Z6Xb7x9j>oJo1a7_YV9O?R)kX zD+=Kt|mJ9Tt=*Ik+n`As2;ORpv1?5ZOsGTsSV+qD@Hbo#{^S-yj z8w3#GICVb$uP0wOc(dq&7<`M&j{bHN>=Qf@GB8BXhckS*6?2z<9q8oSe3_sxUqcEu zicf77i0eN7R@sHzcO`F=eP}B0R9b_C1vp&rl*v|gpuKN}x%ch2!LiaK>Jm|jNSJ@V zh2JO*ps#~192^^gSQw(9w|Q>8aK78tIe@oP=L2ij&W)aX$af(t-^wn57H$Q-9inGjID8yxH3-oxJ$!%IM5B5svEOQgGcfYN1&FJ|?^ z5^3CCvFzx)vIP6lPI3wK|L_!HA--s=7)bdW=^OzBPfi`h09FWe)xD_~fnBr;1ijK7 zorgd!Iga5+i)<;IQ8+n`G)3B*N}V%cRYw&u%RJLOej~labC(Dv5-J#iz@-75S*Z%O zLOKRCcKkp-csqYct&*V|CdSV(D#F8>-+}kNN495S6kH1L?7L{)At%*)Hhtc zLBHY1hS|}-k3Qdb!|1{jqhA=kd-Rsk@@QyOJ$iU_pSZ|xc=t##r1*p zSFS&}etP6DBmX_}oskDd7W*z5xp5>r;vG3Qa>>Z}@E?bt8UA`-YWOq5sPFON8-`QE z&b~hkGsAoPT*D)M?9lIqo*sH^=#xY59=diYK4crBhIS1N4Zb+|!@;i%esu61%E89q z)r0!MO9!_M{2iPopBU&2+&ys1KxrT}pc*(dFx~%3|4;kB-Ty%UV*ic(xqff|vHnZ? z$9UV$i+4W!jiCjM1wTfOiw5tRx;c{!zHLiC)~9ikUabZ5F{OgLrikh&Ea05&zm!k6 z`NN4=vxr-j?d*KU|5qV99`sd+Sfxn1RZK0~Ncw-$O?S;3$O_@b-6ZMt)~jy9|E_K^ zu13LMOk_MM|3auyc7$WTCuaKPeHvFyZI6_lDYg+yF_o(Ct-?nM3z^M%s)?A+)rglO zK9f***=q!kggjm~*y$KJ9{MC=-4($kL6uEZwP<$WRL=WrAzfpxT5#SOM&oNVYAyQM z)-C-Dd}B2#UxxJ48DkXK?(9THbCvJ|^?V_M*`q2IU86mo1UB~zF}(^=aT?q(Kjc*AsE(MuVu_K)hQ^@Emi)0+{P;y;dKn8X;95JI(PQpZ z7)xlU#d0#ic8*Hhs&y_CH{f$mi}`&{8dt?|t5$6-BzzhBi(ta z`~lmByJ?H?q;whZB5o)xYN32KR;FXkmeZ>+>v9Rk^_ox&>ouyeV5QP5vQ8!yBX=Jc z(=Cl4;m!NvOw^8L^~ob)C}sh=pS9%FiFDd!j@ygTSnkT(#r#^%NmwlEl&=uunl)M@ zR+H7lO}H`XsOqyg<*!CA{;8N>SuNLCF@H&v>xOdp*P z(^W3CU%)txTPlMO0@EPm1BV!Eeb z2mElWG~WiKMwJ_m3GJfIoQLp*7^g2@baMvhze9Gu|7oSth+(dRB4{Y%dOJ2D4y3Z2 zH4`nr-paC;O0W{!cUmZ4>36vZ%;n7~y|krD#7AU8`Bd6Mr3-CWGZ1olXr<&}cTKy= zcA$l2xQN$aa8_%FJ}neN78)U}SX}U?-Hs}bH&fJSMM2zFC)@futqS5cM=3Fs64PTo z@F32+OAe++`s|rw-xQ0F8Yv=0Ru!pCAX2lI#oS?^g-{jZl$R|=4t{u{QX?)qMGuNlAJ#2R^YN3Y6IlM&y;cP}y5zsu|{MLb{@53K8vc(AnVP zRnD52G>GZ*g%X~Rl#05tPM748{VxfVK~eNjPD{P)_LPzZN^_lu*t zf!g{1gxV{7s)Z84s;qR3Hmdc^Wp5Yrdmsd_EfsT=OTd+xWekss`Q6!ku4W09S+A#_ z&1kO?v#ZrnvQGHR*@(a0(xvtZ=a8$-In@MLZw4BEEkKAP^iVgys~w#$;ud8^S0QT) z-U1h;g~4^T?NJt^(^#D;IL$F-M)e-?2bTFXVa&5e!tRb%>cka~ckAP7Qw`SdQRRIp z(%7`ehIa~wXq!m74Za-hX%X6_^57SQ)K<);G<#^gVXc`p4YfijdZ85#$B0xZ7cHBr zW;k}~FA0K{Gi)MiX&==B)_i|Dt*;8-Y&liQT(aP1Ra_{CXZ0_L*)6mM3mDy;IT*Fn ziKydSVsCd`_1dNgFSNil6<{<)fkT9tHHQ_6Cy%IO1H;)6mt%>ob$DV&uC z*9bO}rP!vdm~QvfN!9^D>Ae9}DTB=jN3N^U@>94Yq4756!CDdD^OBIg(S(S6QGKi# zvBYy&i5%G|re_vB3JgLm`U_NqVF`TfZ$fh$LEAj$XTcZQt_p>8)JZYF$FIfWMLM2I zggqKOamh9@-4Vqwe^rH>R2FsHO&mWVG`FE@WVIoU(G!XSvlKa36|-ZJ78$2C4KBN& zNX+}#t)qgVUV=HP4(r<~leb(~rM7)VD5stZVsH(LCDeAR>A*Eth}k1-i!2%y(RiDQ z*1g!3>&0|;v4Pcbi)NNc+_)Pd${i`6!y$vcTUqU9}eBga@52 zP1|&dVu;1}2?f>WvrgQ>T2z3>!x?XGR9r!|`H&r_oNSYhggmBP?)b2nzf3TAI?^^4 zJzj#nh0^{>UMEh1`iW??ca4Qb_VVs^V}K|wkh(w~W@J%JoHGa#&$8fJ=BSXG-+ z#TA&wbXZ8O7Sxo*9LlyeT-j4qeo82$YIjsHQy_uYxn!np;q(?UUE}cL22-Fyu(3#v z$&DNn(kl&L6stl6!iwL{W*1DDO}Iz6Drsks&^c2LU%;C36WpcZpj3hxCC<9l^By0@ z+KBESl)i{Tz$Vmpo4}e+_*P5cX zd3QS+_r>kv>?~tIAE|?vUYp5P9Yu;fD&#LU6ke>BQ&%%;wT;l=BR>+;Q=$3-k%_nG zoo;Kn6;N8mRay#rI%`WlY8G`@7!WOStrl=4Nd;%uuie9|fZa<{c;yRF6RX)vDDX-?XiJ-29uJRtCn0GF zkSE!X2|99~mQ&D?n{_IUmUK6*gvQv2w86;nNvPP#`=DYyB6Q|Upd|l0aQCCvu^3gVC36Fe;Pb6q3ic_6uFOQVB$HJNEjT!BvKBx96qvP@yC_Xlp=uf8r)6j z_=BJ;TrEPU>_9-@^;W$5L0(trTmm*jv6L{$Idh~p^v*AV9ivAk z5CTlS@7@t~@5G_0&ac13cY$>YgTe&$Wm9JX&X#&R-l}J~ygQN1OTia8R#8< zGKU`09GUHGeVCtjjwJ<@Bg{LOTc5PzZlDcoU|tnvK)0WPrak`!KtlG20R6#row&Dk zj9-Leplv|-D7H=G^pyQLqYN1W0e7gF%m@oB_W+DYuWZGqe75tQ2l#?KOFVy~K$>86 zlzk<#W|PSD6r;$lIgr9x;h)M2^vKL>o0!=N(3175)O3}bc9TzXk$p)QuNSqean=h zg+9OcEX?0t8It@80WfIr&=&N>l^c(uCy{i=drBXE5IuWRHh^|LAloTIW$Zju=H305 zNbIBc!3OwT*9YW_JXGd-z;7-w@O5F)*))n!k;r&VYSx~~Km<-<7BXK0D8*_KI(z%S zodbDn?JRzcH=_Z4v98%G3lLUQ zQ)LfCyl^C;r@jsgzBgGQ)AW7=jOxY6SSuUpe~27Tb$@RQzT{wLPX-tWkaJRFFH5f`vTI=9=4+nfQnH^})+ z4g$UPyKp@8q@t%req!s4{3{R7!IqTJyO(W~11)kzkLk)-&}j`CjCjP9PYS(r-S?n( zdSvLOKfYrb@bWzo@IpaB0^lWEQvfHi8;_ebxgaQPga!5HM`1zrh|o))dmI$Wt|K#O z_whq72s_g+ACv95^GR838iF2|Il^U9SR2U->Bb3k<%@uZc>9xJpYD})Zr>aNf1PW- zFS}|>z{Q6pg)ptaAZZAZcC8vLF5w*i>lyUR@5`n)t&s!xwQmwZ?k9e5K`YP$KLESA z&+ASSSc!_Z<64zJY@vmc-~4ZIw)Du*?bKVBgZnvt$lJ~VE&!1)A*?DN6q%1W1(tn? z3d$F;1^w`cGVq&UD+@5~0=do&|GD=~7r=L~n8Gf(v2a=e==75?sGER29irN1A?~CK z0-i%eZZAXu2D2FQ|46ofc5NxJxnF-C)_rO#gc$?8JcOi#kPHy&86wdGUS127oW`dC zg|Ma+B0Jm!?tznIvLUqn$Fi|mFNDn1x*?pe8Dc&{>~IKG4M9!Ok!NIEFHr*V)w%r$ z0zRyf6`aqs;C!~{Y1s&xct*CK_ZEOKW#B0Q2EMSt4&hiKa4G~EMwdRrw`@%*5H=@( zZs8eOL$Yz-y1qXQ-8*s7$Zcb$fhR_@l6{?h@7grV!xzu7-&CyTIyied=ixJ4%&g=>;B~<&a7vQkyl_3aZb$RD6FUV|?9lj+M zfY1iJ;LHeJB7^>fN)P(sa>9pBzXqMx{tet0dL>WY>b$)3qu=Q zQn2E`_qb@q|LX77N&S7n#Uz52rd~{ zy!8`04Q2MY=~AMc&S`*d?#y=i3Ze zHhm6f6lQ}`<<_f9-juEGu~xL1hJvf%ByZE_xut|YO=(m)KY_)|VVw;#*qsErxgRD- zPcl%LhR=EPi1z%ELHRQCl5<_($6;gKI=ZmVIr7UPH1Ha4v1WM8ClIWOn9n>gt~PMH z+7K?+9Z9O3L1$-S0{r_%IUpTY%aEk?{$(HSPi>YvcHQJY4cucQ#A@|yS)NGOO|3bR zlp>M3XQSMKUfC=MEEM?r+rWh|=YZJ? zB8TT8e0(>;1M~+hhW%SEAQd{`;EoG+z^NVG4!B~a19}#exYo=&U%%GGqh!}^=mmSm z58NCo@IO_7Z+!?NC!4{WQUyp_SgDs_7--?o4c3~O(R1(L`o=EC-F-E*Zp<`sV6-{% z;h`r7{?;#*gm^WZN`g-8laEi?Q^9(Lba>L)6vGt45SRQQOySe}pb-q?uJOEV#eTj2L7350hm1?}zvX>1uE((tQ-A+>M zhxNHygfRN7h_5=mUv7}>aIExD+GN98I2YBnsJ5?SvNNbGgT1~t8J)Ebfd=xe(E&cn z=4|JAnH-{QhL?auY58irdS_YQbv}Oh0=tgjc)wl>htE#mlAS-jy7$bUmD*juGbnfj zM!rXc&g?84?>u+}N>~^jGp&1{)q=wTYt&= zv5}WYelqg)@zIgbjG&PlM$#j$5q9LFkm3;jdC z9{R!1!$bFsJw0^WP;KZf&Nh+!;t=DDM zSc!z>dNDo0RfzC>EV$r~DohbgT%r>N?h1u*YNwCM7!#=~HS^x(^e|8%`?*HMP6xYin?q00R&%QCP#!s#EFAmN79o71Mc~tfn5em17}x z>)#i|^qAU8WOMOWh{2O^nUbZ)@b~nLZ_H5VA<}TT4xFgssRMaWBU|#ALau?g~II&PosqDZj6OR-z zuTm7Wv)q_TE0ke`p{NyU>w zIeAuN!8MJnpW>YJ>JqV|IorR$WAO51&`rk-1!c)*QI4<05=3*CYaQl`)sCJ2H%(Ief3s4Y`^z#1``kV=Se@9r*C4 zg;H`AyozHBtx`r=ubD95j=xLH?+VvREoRn{1}CZ4yB5X###osMHbSX-&|4<-8OLcM zd$#6|RDfuuVO1C`8t%}?h3wg!7b6`xmqFd|tF#p1{Ee6%)dlckvc$pn)ip7Uhvk#B_5zM7Y|CXg(H=7tIlR({g&lhvCkc#)~`L!6JR>Rbn~~ z=DJi-snW4FW!i)77p$)CEG!1H6jwTc>pki;6SLi3UeLG!nMLAhyBZ?M+HH0VrrRSF zlu0vLEYmcUYk`<67EPHR7SluNG?tmKF^L#g&nl9(C&YAT#ENO{m@n>c;6W}jml4zL zO$ec6_Bx0(@DWDw(a(zMMjb&c_}gix*F-0aUe5djp+_^Cypv0noaLn6)W{_I-nN_! z(7$TYU`W-}Arm?ASuvT;9C8e<`*m19z z?o4Y)jV0oAB+4G0H>VP8=kBzn+9G4Hqh$gZFLbhyr=YrN5()s8VWfne=G6GpdvJkfFa0vKWqK*rQ z9d}B@*1)oD@YgEQrk{*?(n9`Z29J=%Mlw?OQpUU~a%|s9x|1-ZNn>4!hje*HF76FU zy9p!H4u!GoZ)F^2<-&FW=>Y0rPYlO(zK~IEG1anJ!?%Tk5>Yxp6l{5A(CIWqplSaq z3{1kMZ-rSRU^hinWHqgLSKsnOD#OTnBhX24X@T4BNNQhCWOfRf=i z!dO$Q<~X`g#8{`=mE0%5sNAt&QIF@VCY!R{Fk>7uCcvfKF<-r?od+L?c{UP=#tCtu z#Jow9%a9JJ3}hr>qZH2yUyZr#Zs6b2lnP24V@Y#rK06PWjA?vfvnS3O6DlIg~;o(jF$4Z!{)f+r($}*qQ=Y~kBc-GxKxFj6uX%7 zhqO+8*r+J$DP;@W|2r|eqgln$3r>Y4TrRmQD)Lxe6zHs8EY@yl(qTel!dYgwm`>{r zWZGD15V=fRjb-VI&}kg$wo?j?#sV&r_C#`q5VI3n02XG=rFIPSrZs8oCqjC(H4ljC zg4bm+u&if6l^GBZglH@h=Wzu-TT124s1y6eH5BEN5v)eKk^~@(0AYD?O)SU@P%TX= z=1!^@r(H|!5%dvB7o7=k}qXVh2mqs6Z=2X3_FOd zhSRoHO}&OuUoG4kBDok_Nmv7Myb7nn)Lp_?0g-1VO3q-_8+V)HHtJ%znC=7BLA6rC z{TYIGsp7Mr7kVe+A~>%t9%~2m9&0MS-!Eo&*mGp4-dc!M<~4yVmcXaP{B$McN_uql zf{)F4xufFx3D39Hc$J72nu)49>Pn6~g>rg{x5mX|F6@e0akZmucLOdn8O8^$5Q-05 zW9e9_*seBPN>Z1difP4i$czpz*40^E-sQ^TQNvatJyc{^yr{{!!l{7X6v%DnF+MP7 zLrJ9;^E+EMo5oUia>T`AJwuk58#C+OwMZ>PX6)ES4}m)c!pcJpboW=mJ0McGP$ za5(JQcHFNKvd`nWFlK54R>qZgSBk9T*J3f8&IG>Xx&^A(!i@eX$NpFpxYR8&;}2*p z`GyM&!=oP+`l)Fx$BYK2)c_12u^O`>DQ4GHLRh^L$~D58V9lC6EFgf~jfO@^V%`>O zH*hVJI=SI9LjFcJswWf1Ho!sIw%1H8^#4^TzhTs8JoEmPN8Jo+Go(s9M;iKc42#dZ zY&qOPG_d5zNuiv2E7rne*05gF2GER|85A!e^=3+im0A&&Y8M-BzjECV#Qf<{8Pi5R zDNiDl(ZJmyEqr#N9(9E9TrzL23PBfYWo=0^Sno&Qr=799W)2WQ$QKrWUY7FcayB zE|lYK7j23ht%?GlHV6@SG1{wiV_Y_~TkOx8rw)9!O)C=*TADUx^6;O;{2oUR;}QWJ zB0uSs3TkjvtdEwpmGarRcHZS;YRS33iP@RD6{B@6T19KrF0+zY_$N_7VHVtj+tZ<% zG3PBsFBMP0YTZ&HeQB-E?9)*hMZ_*Zv)t8O!=|t~+bv78k;CG<#jAXkN~ei}Do5nh zx>AH?^gf|FRa_IvI$R+xSTN~L%66d4<%>9tHp>=c`S6vZ1nSSOiQ#z$Jin*p^N}kpddSiW{N+w9As! zIA|`KN}}>H`TohCWc1W?1N#vmq_%f{c8piCTbBY*gn)Rll5~@ z*>0_q9)mxoYdDoibvY>7K6VteHa#+Q7Wjr-@?o_YgG8u43O`-Amn`5M6)2enRfNxNzFKZ083KR^Um<0vkV=s{_7y zJLpm2?-t6tYgLN;QMp3UE zqBpN4?MS%q11%t5n|-Ebrag!P3VLEY5FsRS@Sbgk0`45xA+yNqm(R_tDMV+_%ykX^ zxo)Kffn(IT%(Dk!9U%0nj!I=&Lup$=nQY6J@xebpL9`(%b{k9_|DUn%0JE#A_Me;SlgX4!dWIyFnS?U;o_1Sk zxxM#(X}P`keko%_6i|?;WCJfV5)cB4NCZ5gNRfw%A`(Ca7V&aEW zY#QFd7`T-;hu~Xe{oN&HEFQ$Y2}dU8RoIQ;j>4TlkEcNjkB5%^WR?Y-Vscz3=xrHr zdV`+a4I^SzZCOQ8ZAZ>4ubWEd7UZUa@}59{OU_J;EM>9zsM|hw+IrfQ0x$lgY5ygQ z@1>V}HQ8jn=`EW2gt?0j0{s2|$<6>Sn`8e)FhOjn*98`-6^|;z88H?o zadVV?sf`I34v&ZS;X>Z!OmYl2)`W`^zz zfiNBq9r*j3Q~Oqadyq-P96>$d87@9J9hqS;m;frB!(d8>n>h_>B ztw%s8j|cM(St?B47yV*nMgUk}Oa<}#(S?YkK-D#(9xe|Z9(bYeuf09pTLda*=bZ@( z+_ygqzsTj*_?RAZ!AhENI9s)HMvCsPLli;GBO}M!jc|lKC|FN#Zp=V#OT%8qUARR{ zL{xgUT3r{T&o$xi_+&__by(>B)(j-(X;N~Bm?(nxOQtDnj1C2FHPdgl zXWWAEJQ&Jg42DRZDN&OCEYHYZ-Vlhe63Ar|A(S$TgkCY82o>76*c_|C+dF|tAx>%W6 z!OcCY!fIOgcL0DpTcqwy$`!b>67pdIS1TsPJMmNWMs;R%l*dEkgZFdEmVn&09_ec{ zAG0f(t%FqA{urzn3jwB%r^RKQYRhZQfs~+b9cFu+(aDY|!H=<@41l76HjUzzh{8~cWNWF;X^3XN zIx{lL|`$(=VrB(SlRjP_jr11^hd@@6noHWe1* zTS`aV7{e`QOU5fPxvM2K`ZWCP$6o_OiN`|6USG`tw(PzUglq;dRxS~%3V>)OJlAkl zGZ2=*YGC{^gTLh#7(9;$Jqi_|ARM-`k zqQG8w8y*?$`RaDq4qS_}3BJMf^_d>@o3C^-HHwRdTtp$x)bN_RZOaxsA)_9RJq`9? zWB<(RRZBRi==m$x9QjxKnF)3}BIOooH8rA;0nv=dC1}??42efZj?lwgzk~jn zj;<~Tm}%>WW>?$|84Wl03ed^Vf9~wb>mahoH#%{AZyIobAqP_dPBW&1xrMS2&?2BS zRkAx~M%O@q{Deo)lURZSdb#_KPYvg~*oo|%3$`%PwQ z0F57#Q=xML*n>K-d^=qf0Fedu0`!dk=FAB6h+6Iu7LMqK7-SWn{;f})oX>u1=C#=ur+0oE%cWJhCL1qoy-MD)PPf>Mr*fd{#ahcTjJiu&b$8`bt z>(e{U6Qadv+KpA#FXYT`5#ABf+ul}=`{_XQ(XlLpD?u-Tf>j79L z$ms*{9|skHE)46IFUu&y{0yiv=Th`Nk0lVzv1s$_>@ zdkTi(TFOF#w@!zql@AVWqQCPLGYsqg7KmYo5o~CRMwyJzd6Fh7q|dTq{`o@?!(%}L z&G>eD*N9@g8Ho?sEa(iRhube>!7i@^Ju#nlm+c9~t`rPA~iI zarl$Zft9i4O4)t}KAJTWb!sb?Cz{oOKVCHI4BF1?0W=y0P2G?8kMN#DdtXkhL$^Lf zPB6f(Ytgpusf_Wd&^*`gz`JN7-b;HME}yN0eFpaCg*4J3bM;j(ctv-8|wPdnxq zXkd25jX34B;~C5ykrFD88gdA~2RE8CelfFVl*dB2?mwnbQ4FodKDDyf`U(e&4h5l83c)@{KgGWqdiTKW_^ z=Dmaip}*)?%xgOLUka4n=x3@^&qi+_*~&Qv89R6Q#l;PmV9@L@ z8v4?}!+pO8cyhTQ!E87i{IYd!cyWb;&T36Xi1pD#FpBNq?bYyW02wG?RAbR>iN z<01To63g#0oe^F4=HbxLWdk>U;vaF(0o3tTtqy{-D{WG{Nx#b$q4Y#vZx$ob7U2ej zbqhyEc|7#wo)iF^Z(q5AzP4NF5sZcX(NYq!4y3J`U9HMD8P&HQ_4NwJMtLllb!bM{ z>Dn0U71{)28KX1e$0hm%UY02uB{zEFyEALh%YDMtqdXQA-8ncv5Y;b)^5}Rp8IF>r zS`_j=tbl5SLa)Ni+%+IvvkdEfr~~NK^!5)5!9`=NNW}(HrL|~_Vx={VrBQlFI6cNE zBgc&+M*58*A+!k$&8-GC#sY@cq`IUQl2C$@WWn!kxR7HQ{`v&!G3|hverZ?;^_>l+ zTbCn=bg<$w=Lv}_gk&S|CwwyWg|J%aM@EE@;(Mid4!V(X#RdAd3{$)EE`vB^DP*FZ zy)=Px0^!8SQWn~)I+gXoeP1AapLMPLW`%I;zA<5ZJfX(re!L}(7O+@QoFs8{KmqlX zUm6pRkMej>2(DkqyAQ7xLMtG3G6|J@;MsR(;3|d%2xHo+&OrLL0!;EZR|`ibmU#pn zh#uL9?)%1W8M=5vsQeU5@4*S-ZDU4Aj1wzDRJEmUdW;hA>M~=yY>jYyWGRalSTS&P z+tvx;x&#gIEIKG$%z+J>jwXX{4GI6}{`jSJ!m+i>KC&rC8>gM$9(s3y=oGhFg&9|BM}6O_Go=HqK;z}xV6Y~6e3Z~xC3@VCoq?`ldTa>VaDxX>u!dtn8RlOYhv{l7Qk-Y-sCWKb>0VRaepf*4xL$Ngk zG@DF!&7jYlg0LUa*&S073>Qm}i^VPbG~B>909f#=hB0)fSomqdzmLR1K$t&awGT-? zWwkj6+AT8BenD`Y0jPY#=3{yuf=XckgVUZSGsyL)iDlB`7H;`x0bD)$|3pk?eGogD z8OeFmK?sC0%HOJnuApu(*3t>+iLjH=4a;)T_?6IjpyQ4?{p?Sjf<0%$6!3N@yK})4 zaSm7!JYHw#a`SM~c`y&1R+|v+wWt+s2pMOgaVa!^hc4O7=AXiu9emtkE&DVIX|DM9 zwLy#Ch|e=MmzALd1JCvSFF+>;1fOSWF7t3|+vZLK#lV`xYH>T>#;x+QKCO^xjX?ve(E>y$P^hvyUgxm(3u8$3uH+|I@LI*V1p8 z8AHS}2i+PtIl)3a&>}H+%LQ2v8JP)!GR#mOH-a1<4`B2EwS$RtPSBGkA+#N`&20mF zhQ)|cnN3P-IYYV}xYtq&L3b#an7``5oLS02q*-%c1{EGL zLSZa7%wi?s@u9sTkaCF?#=>JkanR9Ds?1vY5o^b|vd%GR((E$1oDyA}@Hl0Z!cs2V zp>Z7ZP8)PEnx!o02XpTy(b5UJp<`r8=T3qlu}1-!Q<}vTZqHTS0NEaM!8|MAL*|ju z$$z?^Z={`~5-#*@xuR=C3J_281JCyT1Mr=kf-9H*)6`gjbui%`q@h+{cXRoFsu6tnpYws+U>W-Bx!ASC6UrtfNCcrz2ahaDslx#k`zy zj)8-^sDqv2b3s&w2wC>x1_#UDy~YT1~K`#$an!6l8ygC^5?_*^3Z zw=M|7C2hPW!8A3`ViKLpGUdj@1yY>};l+9@lCH3W(Z*mxcr0}67CGd{ zee?9S^ldR14NNQp1I4~mAR|tbfZG%Zhnl%7v zMhHMd0ckN^CDj2VnNGHnVn*9AD&Wgm*xx)}N98bXx%Kp4v&@#X&dn?iBnANADLk)M z2kS?47|bva9ymdMkKLXOv`(`5=y?H=Dxgk)>30P5XZ zt1M@swEqg>^tuzsY-zu}ECjfIctC)T&I-4lbR{)+HVldlx#Ow^QM5R#Qrr@gOLTH( zil;`FQc>s#q*XoooN55=E(sLJMal%<@73!j`SlnI12821Q| zjE+8g(bT~&HiVo)xvvRwq;m`i7ke6d^+{KV#2c9^S!?T)P`axqf*d{>9e8o&4)pb+ z5Spto$vr%ztq?Ok?Ja8P;tRq~n^=ZR@7Z}a{IT$A$d|NzPB^sQ4M0;m zra`<1+Ch1rfrJOLt4~~=^trW+SV*1 zXaj10UbqT+OD*>ZI#$1gxv~q3&`&sjU2(y`5lBPVc*x#lVvQDc0KiH#@DBv~t`<(M zU6zXuOmAMl(Cv5=1kMrX}gAfgXgG&%!mQwNjK*rmnH4l-OToL;*ulZHOWa0~0q z)Jb1r{1K2P1}>de0J>&b;7=^R04$_|LfG}NaB|skQG?|lWln?Ryf3|I)%7qdfT@+v zW|-daHl3wmB>*}mZGlaGy>NQXay%sHJ_0ebk-{$eiRZ?llkva4EL^EPqpSM`xCMM^ z=%vAp{ksJp_ukcY257`3|A7)@U_4kQ7$`OTCPJ5TS#;{ExtWh3!#r$b9vL0k%k(pR z6Li>P^FqcSY@7Q8W(v!vlsa4!%vF-!bUCDDEawSy|1IG4Jb|@W_x4%zivJMq7L3~+ zaVQTelYews%{N5A>o>3y5=9{Pp-px{rU<{%N7Q+Y-zU&`SrUr`a# z;%##YlDxhO5_n{Y=k|8$_pN-(mZ zoi2g{l*a?h{dLIi7+l$lu0{(2@4892ZBjZ1s8^h#!K9IxhcuauYI~^?bdrp1Hi7!S z!psVvwdW(_4&?mGg0k6mmaqr4zABuYq~;Whx-_cMYAi)U8d5p`hoK$LiH*W$~X#cgGZ3VUl2r%vq0q)2*$5IWrQsfYGAr_tAL zSQr+)x1&qXUwlP*z>NoSlUErH>$8N^lR}vrVg7k!bl^if1k2X8`p{2r6hf;}MxVa9 zPq>vkthHS$Hg#!7v~XDeVsLYRr1x9h?;yBboWJ8q)`-<|j5J0f zsCp0l7>|thL~ew|-Y?!n|M?!qn{RU49cD5dQ>ZF#tJ7*>H)rr(ScVf=M?4sU7Xpw$H2r6bAC5udgK6{67YLrJtM?xl;v{`dKq@jN2vbZI( z4OP1pDVLO`YReaLrO*#=hvRiA6`d>x48N`45H93OYVQCkk~uR-Vc#qv7Q6C_h6`#? z{4I4xj2`?ZY^-UCv^b0(0&9?&vU8&c_m)`UD-ub0b7WVscV zhet&r-Pu$0UAHdo&*u(wrpNfn^fYV6B;k`4@j%nqtPo+e@-~puSV~5Mymbl{`bE7c zecOV~aLw(V7yAVM2v@6|4x$nAX|bv$T~DHa-X+{V%A-Q|;$2g;^X|nVHNUyIHN{=9 zE%$;gIXLw4;I{r`?|oh3y^75z!Nz3jFxZW0(`)s1T$dKdTuNh7nLvB)fDirlM`4GZ zzzRK`I-P#!QE+X7*WeSx6>;8FHk0~Fx{3Q--eL%q9t5w!3lD?WfX6~7OCOm=Gc9}* zO+6xHlC0+#)D>2lM{`&R!|j%$6#$v4zDNu`{;+WEzK6he=dmDz*$dlCc=-U>-|KoH z*Ml6VcR$3ac505P*pY9PLfa+@Nw&gx)+_b|04E@*6{FZ=!s+o7$n^flz#K(KA7|}9 z@8Sl{7t{JYo{ekuzDNTcg6Mnq!(#HNkbl1FG#aeZ1*Ii^u(QvZsvXvhtcyz(gGWu7 zo9cEfL=vd{AneekRJhjsdWwGb!9^+m^SzFWcf;GTQY0a#R!Zam-qVQNT(u_AnI1Iu zT`>50Jaj0Vg!%cwT|Fr9-G$GueZO$qW_->uFvHn^U^>WEWFtXE&4R-niPp>m?9n-9XQ81MPEZN zzT9^XFS=%K>>7G_;147E;T!tLd(Y`k2ySHjewV``ZJlF^3RqWx#%qpe^tqNJ6%6DH z$`CsBY4{l)6&;9uX_}sWT9^=wQ&y$AOvIG|d#P9~MO8R@?}zXgJTg-JDhdf7uiVnJ z?`+)$I`<>+o{y7GGZDkXQn6K{Xi1#_1N-cc;ZJ#Fz~?>{0DVZI3498)jA z4!3IbIct=u(2AKHQ9=W?VjsXqb!5%Dp%dIgi_HCn9#I%_LD( zgOEIZ;3uH@`D7G&5Qi+?QJ|*Nz z9$x=Xh`By5EJ2d17obd`r=eQ`IeV670KmJfklKi@d7g2bFUzI(4iv8Eto=(D>}iY6 zn`Q7&nOs8)bfpLo0mu{uXw^$!0ONdFE&^y(D75OBtnBsUB`~UOZY3lyDxk;;z;1Jz zCfN0a5IYjHdf8-#uW$pB;$L!<;=&YFbmU3T+Se<_@R z%g1t0bTW1qE+4t;njnvHj7>n6D`h1#aA$zLN(k#hL;-5H0%GKQS$NvI<++f@b=jhM z|7+pcI+z$}1Pme3G~^=c0B|yGXb06u`)lF$PvOyf(r+)^IVN9)=>beeKv%O6ft-c1 zwmY?QB; zl+=rKuL)PJ1%%rZpMwwNr0vW!l>{=uJ6-)1+=1S?%-M%N-bAdXul)<0L_PhKfTmC0 zU3~yB!RDCiANIVJ#;wU5nP}^?dYi$7MJZJHBYcj0GGq%7=h46aBjYI(&n4i`*;Bx+ z%(}sW04*8FMndgRgwUOD!iaceBzX4#D5qEay{PYR3kJs2Tf(g?y1M94Eb%h|7(Yy5 z2rJYe)&h2iuVky&pr4W@iUjY0lBvEWTr|c>?8OX_+)hQ(|LnUqNYKr0=ZlUDb|X>)xAYDG0NisO6m^SQ1|?F z1A5{yO)ve_7SXvN%{kWqY3#wSOnE|eGEI7P*?ckOt7njYL^M6dC!=G(1n;8#i-SG% z!4XjatRmA~9Tu1^Nl!*qu0*PuahNUnx-%R{jbRbsi!P<2BhTlyql?$$>*zOzMevo` z=Abx$GzB1sOUUTZpRR(Gyr*oFw02Mg1?}QE0JGx$ zM$R21^)5*{hQ2Wbzsw^8micxF%8579>sN}vbu6BPRON-0vpY;J%2o(VG`>iL@S@OL zpmH+3qBUcBKFd)XnL-criZ~u$va4)lu_Ax6z&*USsD=)#rX(idx1a(S_ zsn#yW(2)(IwdjtsL}14+?3oQc$nL||(7iJ-mnYfgnapI?+N^1l zl!EYhGeq5M&RgYKM&k4+j|?Rjw?bNc@0Ol@o8@b1^~R2vx!FZAVz;cRAr-lD35*4? zsvu>=OrY`gqKPp+58LHW!K7*?deG5{1yMa~K@>H2DQr+yO?g{JOGz!x*o^8T z;kR@&$MncjD#Fp^^uhgWMV#yZ$#skS>QL8U_lUk9>kWdF>E-UL1c#V?bu;WM`~2YI zv||Z>qfU9uQkB?L%Lj5vbYv$i-}gw+PdpwvblI_~eLp2P(;Fye`W*92#xHw%6*C2K zjgm@i`HC$>BvLpl#xVuEfX@Tp8G@B_gO2tqa~fYN9K@nksIDmRFZu(jx;9q_^Nc<9N!P^|p( zS7Bx@KAlln#C$)jqO{{qkQo(LO;9hu z`R>L2CH1P(u0YP;26u8aknadxi(WlhG&Zu7h4yR_O`-2Uci8~ieu{_-R%uTaZPl`o z#~oeWFA6?{f{ZVA?HGEY6M4LQiT53>dlnXMQ2Ki8e;g=Fdi8_ zIlggvpVQZaE@|Ma>A#3!Znj+Mn*StYp3?fw1{|PXB*}`xV3R|Cmz|=u+XzSrJHF&e z#d{8gDrZ4({6^U%ts)q8=A37;=UF`)wx_`jm$TUNxG5^G=DF|TqVr(A_&gRH;rT2m zlt<6&j7~hi8YHowuOgy!MhUr2+=xYD(TZP=(sno`d1T~x5(3=MKf1La{lva7w|{Yn zz+o~!zPJIv2VAugGDlQRXl1EnA%SW>m@+;Y9qL}S1HI^5Soe4RAcvSA13A)-V(@LH zu!1T|X%n?bB@4(6$r$>sM>IWt0-64^2flE0rjOZ);`!0Vm(t;WpN`0=TS|i>R}+_# z=!SD(Abc{~^ISjJ=+7m3(A(#TxR~qcdCUnsziROW*0w8NEv2wV+X{oy9#bQM95gP&ba9y`X$u=ZLoM+a)S(u=t<@jXMGHJ7}8XhDcZ1n6sv}S#-@V5u_F` z%cTWR{fu=J^rL`Mv~nHv7Jw9O!m4(r;P#4Ha{&x4#Hg(l0T9bFJZMri*12OA1<0%x zL3OO#Bev-rO+Xq?LpdK*#|AKf2fYBn_+^gS`p(PSndfXXYiBY)3?-Is80J(-xEzDHBW>eq|z~QEp z4ni_I^65p>YnEdo$1lFUBsMv_FgB|Wd?-vTQRkro5EKTim>d*LH<7^zQ?(oq9c`z% zQK3y{n5sZJ0iAg~c+eLFoOA=u#FMS+Y?9eb6Wa+PA*aO0*FP@%I6C&jO^g1Ej^Ds4 z8eAVBoX|uj0kK_U7G@A;50c!~ihXj?8l<#}R)g1Qxd%`w`&MU&Rl%;ouI*hThVGxk z5&Qx~CodL!*tNa)8%vbqm5zDHg67UqgFfIV@q{=zqaj+Sd_ zjhoCx+w49&6a$0I#b@n#ZE)(~^F;{ccH(1O6QHi7^N>}}8B@WkF-75ds%|zX(>ZG- zj6zq4wvQ~OLb+rw)Q_%&UVx8Zv7jK}#Op<`&x$rN>T5j+WOZ^(Yg7<~GLW|Ani-2( z9c2W9i?sm7dpXCv|XcN8h^~**C zXzXIqdbHzW(L$tB)3sv5h^|XBeBIEC5UC9J9_;=r6RA9N%aykIE%1A+?M2w*k`z^N zfWMGRQ$f2FJsW|s^T+y&g7`r~7g)%5vM_Ey5=@UwDK0h!*3E6bSKDs?u3`V1Nk z!#!svB^n#$@zAk9p8~evsq$X*oC6$a*QA)uD4S>Ue%V8z(lF-p;Gk_}+d3sQGLNAT z_QLA$$*2lLRLhz@mUFhIfMBia|7W5u)f!YiY1TDNG34A0 zhq`kq86BIBOf$8_J?OsO3rEb0AVl}PL?w26PZqO_FglJ-9 zDF-&swViAL^iX19fBz=QTo&e;gkUym<<-Qa5-O;Jj;{f6(3N2oM7SQ zompV*%xxfqwKMerhec0lqp`flk_xxHN%Yq=EFzDLj>Rp|QWxE*4MEsFbOP+JcnY}SJ%A>+zx`pw}kpl>D4moS}%MsC5BWtam#o!cO z+kHgvQP){RKObD%e=$!XceL}B)_EommUZG}ys;R-@aE%Tl{8Cv+;LR95#E4DMh=G# zLMb-TLCc1Bq zxntSpKS_LTYIO}A+0M4~8aHkTHl>W5=`lVTm9`5`L)ht%4M6?}$e5JOGZ}{5S|sh& zG;YP^&M@@Rl~C+9`S_b~zUY^-(8&jHgH?Vg(nAmB9$!f1D%>MFX_B00y4$jmebT7I zGPpe7vKd_lqqv522xf*yMGDu%Y5Tr)Mi06JEoiJC-qhJ9XD$w{+)(D@c-~{vm@{Qd zB_KiP-2kF^WK??h%_;h(8x}n&kL_h{;PYpI9QG4c==EfY$Q#;ii^7vNrK|0?d`NBTXn*W`$?xbj5no_VK@)A_X%YBrg@PbZh>DH zZBxNk9PFBAl7j0)2M2!Hzp>ZceS_fFKsxTfE3tW|BcymE3BS_zc#3MGm~bbh1+7h! zrO?|yfnPa+Oi%w*v`c^z&%*2x^GtFko8p(OB+EpRG@GR|EG714m_J{O9(q zf-Y?PqP7RE_}RjdcFJ>|mu7O7Sq=*fc% z^8Roaqv_=H1dPkT%Ci`hIx2604i&93T<~!uyc@=)TS`Vx3Wla=%jb+!ocr&AZ-V>J zGLM6tQb$g}?zIL8Z919PJ5tetGl`_Pf=c3%(XG&gi@xDj(FV@a`Pl)OcGEnQ$z15j zajMJuD(T2p?1ex%U{#}`+h906DiWM}#T0t{GHN5b;L|d7B|;lmav@ zjxM_c>0=769#}93 z7)V#&2iJw=n1CJg`ObCWGlG*>F5DC>xnR=fhMSN(0HIqelz&2X8=xto_IH_k*|J=O z|5uAK#LogKN#S8pKe9dmE#cE%=rfgss3g?S=HR~Ij)>uUMWWF6L>tf-9uSSJTmA`X zXL&88er~-58$i3hCxWENHehT*5~QWgRD5;H)Edy9Gs#GTi1M=B4&Vh18H|?-(9B`c z_@bX&T>rp$@@eQC*Ah22ufJf8YnnTU@-m$WUc~a zr!yBwdnlxT7yzM`b%c?SC)4|0TP}bqn+l0$6Yqr}SWv++I zK0)u5oxgDDUG6+lHS|9Us$oZ>k`J&)Id0Co=L!CRf>a11WaT^uku+`VX4j#Mbr`4 zmpn2Oq<%g{Uw=fjkh}H07vPg4=g))Bggv>`dQU83)L<@gT#tFA5k#gAPme66g1hJtYMx17XKh;}L741>uBOO%WKfgdAduu4IMYrb z)46BBu00ngcIu@uzoXdB#tm9uwdJBHy~*W2)0dMeuyf(IDh1K(0k6^}HEpV7OW{N^ zUaglSsQW)*Gx5mis2?J8o%r?c|6H(5Kl`+3>+BGm!(SH|x<>yzdSvvW(F3E`jFv_N zql(efN5@CrANk$LPe<+_**|jCNN&V4a_-3V$jGXHta@$L4_AGM>#XElwR6=et5y#G zefT%SPYvHQ{I%iBhvUQ6Vaf28;r^9xul&`@Csy9I@`jbomAh9ORuU^Wtz0qm#?T8x z4-efobnVb=dFX;6_0U;EYX(0Y{KMe0gAWYuAG~TXH|QBWcW`QOWZ)kIuMPZg;9h7< zH9L?Pun))vwhavSAM1am|H=Mu^?$Yh(*8)lsh{lM+|Tr-`bFPkeRuYKxv$k1>NEC{ zeVhBbd*AGRsrS*|Z}fhtx7K@6ucmjVcWuxA_PpNn^B%hA>$5#q_Y`~lJ&K+)d)9P+ z*!_p@XS*Nlp6kA$KCgSadt}9XEB<@Mk5+tV#Z4>rtVpeJtdOrbdBvdMnBWz` zlY+Yidj%~)NMHZ}@D2vJTiTR`@lZ(Dc7~g(j9z-~UpRU)*P=2RKcv(pV}vv{a2Z3N zRk@`JuZ|?7(ww=d(qsyRxrh}^PmZ&{Rst}Y# z+N}_23k;pfkyX+rm2di_Sk>vPIQp%ec&Q|hYg;yZQYOX>kVDBfgK|r#Xask(bESZ- z;ge>f<^lG3aU-1~qv^Cu9%@>(E$LYr5D(ov+~OKpHsNjTzl z6=@17Rqf=&Q=FW#)<=kQL{j1~h7-<+s-GREIF+Rw@>DICv}Ee4wBQfihZtcyYGitwL%`Nf##U_b)JvBw@%`B~c?$FE-OYKS$T<UAod1`gkE7$L6e+Fn>uSfD~3wwEx0VIbS7i= zlzBFiatkh!sa1v*|Lti_@`+p0yB zl(etSi4jBljgZ2oi97XJI(#PE0m)5Z&PFs4kt8a!KCRLgJ!gm&gS)*^im>61wAmSq zQCX9jqdOptL|utAvJJvo$jV1w;pkdx4zJ=eD}2;$l~cT{hogf{M5Z(6D(3& z*=9bjc0B-{l7dx7MV!^gDKpzq%GFL(B!r;?fLax=w1p3Jcci%5AxVTP>bwwOj?F53 zI@!8Q)^>{oDp%Vd*7=k-DG zvo5VxRE~mHf3r=0Dv$dye4C47NW)%IrdPO|9$khtjD04l-;Tg8KUuw zG;z*BR(i9JwAs=paoGy6KnsKxZSC0EqSFssQP#64^S3|F(*@?e0gnp6d> zZC|37?NaD!f_5cBxH4*0lJbmLzADU#i8*mXM!DTFd0r*eWVcA!HEc$4s%#1CGkTp- zUr(O&68E@gwgpXTyxB<2nXO66iOCs`Vbc|no23)Ik_qUxiYM5`J?CU;>1fUb-e71P_4wBk|Ri)Scz#AS(yh=M zxS&zA^fKL5-17kl?3U_jZy{`R8Wpj#*-lfgny+p%I3&4}-Y!k&DbwTZYt?*aS2f%4 zsWY=>$Sx2Mwm309MG41iS(S`%wKK8k_QM?AVa9P2#P|Y!Qy?OadRKFFWl%){^p*xv zz1^Bx_H?$1kE@26Y-CQ1R|zQBY$WBL9qjYfR5=dKHEnvzt1?N%1bKj)|7yr?2G5<^ zTDH`%j4i70aeolf6v?KRkk*2wR?(Ooka2WZ(SwoE(W z*OMNp)Vq=;S7QEVG!?;#f>+nJhjyI8N~uI+vjsxx)f-|BgC*;VIoXa|u8K8kz_n>( zJ&BuT236?X1-e-qAT=Iay&aLpGSrrWwsTR`kX%&35KU{;pncimWo2Z#%QjbOX}h~pIx9EAt}M9 zi3E-LTsxX1cdVOby12Q@rnI!}bSX^1LdYGJ^sM2AZ%`(6+Dgr1OKWAS=-Gpu7@4m` z*(}h>DBmnt$aMcv_VH4tS}o(ALPA%ml**)t+nXh)vP861g}OXxcEq#UH33#k$q`DB zvvz|)9u=FQ6Q;});}{lgg0MB?&VaXKaJJ+_`#Jg0w~5kOV^we1oyj)NV$EDvv1Y6i zW{EdTW$Fz`d)>)x=3+q|BxA**KkRdPBJ#-j7qeoDp+E{cUzTcMcIRhtdH1~>-JRE( zbjG&M8>}_F=^^fxC>Endt^qvR&mx`xs+ zqDeJ8X1xweHe~jwAd*QD4Q10_ipW1;e>c~3#(h*UA!+9V1eM;(S`4mS zE?=V3tybNrtOJx&dQFlQlgqj5xV+e$O#}#gAY4wncXNznBu->(E~1buw=hlOv~O|p z6B>KCDmG{gWZTffPq~02NAj9fS(bJZ#ZavxmT|9@b0>?GF)Q<@q%xl^9iMh{kIO42 zk4YIeMqJs3fl^jj`^%M+T6JW=2G^CgUQdzZ?{b5Y6w4FPx65n>&ZD_<0ijPZFWbmQuC(C%)khfcjH(m|u9c^x2@^>+k0v6dk~ zwo86{Jrb)#%yFdn2weEGzl+Al_&kK)j-5~6^moY4o%GLZ7Ey+6Vq+^=a3$P|lFnhU zhSASn0&DTF5^ z9BSIOUx|Ez@t{FNImx=+R<8W5>`d%$tYinR4b9D2)KW5wdG@zoivSO@&kgp4O0p`bi&uS=;^21#CnWKTZvz{6)l8v1KY2DGhf#lcPw zgDbjh1Apqfu?H!Req{~9iVsa8>u*KF~-jw*F|Gv zd>$s zL)cn0|CR_^NG-z-=AhQ}Kc`@Uf~n=#26b9UG4H?c9Z}zEN!Q4!!{-lNITY%c}L+i2WQ68D?Yt#Wzm|c%SFxoP2 zg|CMVtDCZ=MordmR1}%ARH{j!74L$FcqtX~y;=~>-w)*gwRa)mdpwu+rPU-sDa$S_ zj`>|O^oxJM7t1H3Lm&Rnd9>j@a0pM@=9#*0cG#|TT;)&Hvd~|=noD`&=$rq9-&{&X zdw#!xL$BHTK9isloQGO%4yTd=VDLQUx3=0^N@}2TIN)Mq6UcuI5=8kt7sWJS|ugqcYu!tn`0>C;}WP{#Vxd0;f;-_|SpL{JHc4 zABo(86)SFsz7&`Sl*`6N<)UonoX)B{?o>DO8hIv(PVR*{_|*z*Vq_@`3WeU>PGeWD zgMz&8^kCL4pL1Ui2~QlvB!9lxxx8@}J8>%ML-(Bmn##8Vv!Va(!65I?4Q(mXkU9u$ z7p%;-&l!lI+d?rz0gRO8xJVE?cRQ=7?&`%pMNuI^A9mZgrl8A7hCTOXj1tJ zj3-3fPJ9?0+h_mx7>FHx^_d}NDxjkt0NCU#1Y~8pA>WkAR|H@cc306u*lN%lCq9Dq z{G_sjosKhCe(H35ZY8$wB4VcOM|{1VDpDxX%Z+{=}N)oRAedhG-{{JrpwucEM-q7FG zd*;9|yM06773_hE%4nKN^!9=NViUdF%0fJkgAM5*+XYKblSKw0=r0}_Ikq>LWTMM^ z&~J}g*3;h?VyccJ^eigEWU=D(kY&C-o3P;%#( zXP^++yvwM#;&Br0w#n|zs5Mjp3NaxU?VSzSno%ALmG(vnanYbpG#2CkDwT}8KBk|z`Fp=DeP8@IibhXhlA#=Qg&VT}IfT962~pnK64T>3#T zeCw%+<-c`w-`~xf=w~Oej>_{csyyCDv+zO9O@7J;g`RlUzKQ;D5(AA#%sW8iv3ZR( zw**>oSS{*&Jts5BQYf|s1ITY4mEOMvV_OTH&U%B&r8|&^4Kf z1b%`^P;iz^1evQFlo4kH9Mw^D^EfOcj|@E{eg}XHCsS-8*QsdJ1h$0(c+Yl?;KLU} zyMTwFUBCp>qk=g%-LPF8^Or2HwLj}{+X$`7A(K{e2DvzizAuB{;gJ#kt9ihy+XNMw zgq&Gp>-@zaf;~6Q9xI*&uz`fhNhxf#unb*!G6rpFmy%KGs=sh`vi~?4j^54Y`HNs0 z*-~4xGDA@6819y5%3)uC-EfIhu{9%0Ip~-K5UTDw6=T|&%wM>;%^VrG62tQeNPV%o zN?J(P`uPqpLJpsSjgRtpos2E?_`8-Nw$6FunamEe&0he**aW$tNzqPF4lGqRN)%}f zkZj+8jIA%8g#ni7QWkQoW=gnDm2am1b{4jad8Z&CQ?S#5$u#who~Qu&cr9RyG9#KE zSxQ7qQQ*Fn@=dh*beIw-_+bza*pE=JG$%^9Pai00q;9VXPooc}VPSY=wCBD3fXezO zybl3@!x}oj9X8rV)4U&s!A@QhB=y3dnp>H!qTLq?qb3P8M$5wDE$daN+*ug=nwvujB z6`BgeNO@HBfugF=Vm%A#m-~$6PX%yb{X9oX~u)ATXtta-4HvA3HIg?B(d=^J`X82 z*0uxekYqjm5Q#wz816Nw3Y1Y%^r-M^rQOP)4PtmF9vK~dlIWB_Ptso&Gg|b5`S9Y! zH%*3Gay(rTdnFzd-fW`X=V04Mc~rn)eQ_GydgbYx=wF_LS(tobrc9pAeel&?RVjh# zQs%a$T#5sVIowYs&@B!)+W0)=XgHzE!;4s_zVuWy=)$&wkq4#d9CCOw)H30u$xyX9 zaATXh4v0SG8A#R~c6kt2V9b9{%g_OT*tEzGL|M;l}VK z!@6O(Ck=P4{L9KCD<58Y+sZGltae*hUbIrPa%Sb)q5mCvedxKN?+wil&3<91FytFL ze`x#A=-~TASt}i+z>83;NW3XZ5Y^{iyf#-sgJh-mmw5p|{ZM@7>kAqj$XL{hp&e&-5Ic z?76w;vpwk^SI;>;r}eDrez*I-x}Wa;cK40lmv_gRPm5ZCc7J76@2oGRH*IdVB>PA#=5KAsuuws`^6H_jX)EzJfS_5x!(P6sfdyDO39V+gLiZ3JsEq zV#ZQ*#*%77XriB^TjDs;YN{IIXxuJwCWLGV&6gL)vy{X=YtqG{#SoDqEMH{*AlC>; zae2T5{=bY>+Kyp6IeI=*qp$>F2~gsO(Jq}~g95&sHxwbDa-i4@TKrXqn2i?ta;|oc zsFlNH#HbUOjj~mbvagkML`)5plL#5D<(N)9JMjcZmt~x$W-FX`B_s_>y7_YUSF<%Y z%!4Ttg1B)>=Azbqj(t2^OqJZZu-BiGPyuhk&gMG!vRSE&2$y~Nq(R{*kuuwjoEV2f zPFl@&%uX~6R&T_b<><2pDuL@LwcDAHWaKKzu4g!gHrWEFTE=0?Ny=hUwrZNAYa}7k zX)tEJ(Iz3+;>6e4@nq^Hb6T8M#xXZuHjr!gu#ab|DLd$*+V{0>gedGh&YN4ij3km`v2a#uN%4uGr#{QpM3iBx#zuG_uYH$ zx#ygF&iCNTsZ*$H=HDjuqj96IOQPv4Dl(ipU3hha_9Jxgdaz)x0CULFj+tkr=5kap zRNXAgru2*#DH zw-rW-JAGP+39`4)esbBgj*Xhk%}$`1vFF&S&r9u*Qi|oHcD@m*=rX~?oWu>eh_}RX z%1&CJFqoQ|^dt?*2<2?J4l@PyU9D$@RTd5W;lI<4vfU*IZ&g*o?Q*jj?aC+ak=k2I zC-3&~8gtXCk1JJ1siSPY;^VZILL`|98-0LAmX<5K?2qvVH=~IAlZjwS>7JJQ$@;pS zp;b#Jxklb#;a~k{Y5uczlMmd=H3|-o4>#n#1JVl?cbRRp%n@DNYfkDDyFF4n->k{? z#z;C9t?Se-?)*>pua!fYOgSAdrgLq*u~IDWc%062CbX<&6naNTwWL@oBo=+NlZ?%# zU*Y^kf5d9y47GrA>ci6WMih!u+U&|o*c|o84@sLPU8pKJZFMN?I#^J znRuJYi$lzo>10y2*GTQYRGq7%?s%-@QY|fIm5)m8UX@mEuV`zgRBpv;i^@lMiC{`; zSE0aloGE?U9O5d0wDD=F-Guy{uN1FU*6NE^O@`> zZ2&_v)JhemDc6krgg%~ZSA8p-OUrm0;eg+%QtB?1p05;A`p{BG%UIlIW!}A8YA)Bx zrItOcQ0cuvoqS(Z>LzP9vg&YNutc08S2FH&OYMPHmvx8y;ix4eSC+ZSTcmDmY`kuE z1tT2qYp&#ThiJqTVqrWyo7IC6^ChE_PaWJwpHGyOB|-1u3;`{x4e~pEl+_Z2xVfkb zhHTYx!;?_i=#M6HN|yI7h1#}ol1nAj%7>-)l-j_1Q?|On9X2Prijik%`%1!JYOqYy zyX=p6+*(`GyH|R_9jUXqwobF;HOW0q`MJBKcAK^=&$;xGu0!or+6wG%rBPa|QO;Z} z38ARhU=~zsA7u#?SR12jSTbQ#ce!w;LFz`=)N!m$SOK(?Bext-v1lQrG^qr6_`VvfX<<^sa0)OMf-`DeR_Gmp)DBm#jK!KjcKHIm%YnnTy?)b z84Ys)=KGD*ZcByua5mObYP#x#BDSKX*O8%^pG$C|jxL{anB=LNdY;C`gkm;(os9*P zTCdlVFcyyV=;y}N3MCsb`KoDGD6B0Uu}RIUN<0TU)$6h)3yS!tqy$7e!J^#Kwp1+2 zx{k{$i~@Z;y1b%kIuP?%aV#}*wv^`rI?8AUw}Cja1ZN{_c17cIdRrKZ#v@8oUWwQm zL5uA7UD9D04H}E`Y^9=UM+=O#opkJxy7vY3R#j5X7?U=GTD|EesdrBY*ky56&pO>J zd|gnUbBjbUp*B_kAs+#uQgbO2M|4uVk;!vH!BVy)8`(%PamH(;{&lX9JHBLQy0Ilg zB=0gy&025UWmJ_EF1;rt&yW64>P5ZW!W|n9z;xc4Hl??I5RW5}Fcj%jbbOns)+=RI zi+35`LA!|r!>Ven9Z&?!sZ=nfJcD)<@gVRpr^q#;?QTn5Oq};O>2YH+qlvQ_OGN|k zuu7(o9ycykcuraHJ5;L5QYbZX;aYniu482luY;TUn?zuJMZT)cl$PC2w^gTR)3iMt zN;0f6VR9F$4Q-{!JEZLycH474TSskdhchYhF{j@%sJ&nl4=t&!TXa^8kd&yO^)fXYU%l4v(sd?l}aS44?3)ZT-FbMS<#1r zC99P!3#o`sj?k)hTy=#0Krn~$t-(mvt8y#cCac_bx6~er*;%tUn{3!!E{i?CyD7DM zn_0P28`ru!kQkxD`O+2*I%`T+?R7RI8f?56|Eja4=Pfq5d?i*5XR?}Qx38m8Ng8mF z7eX8#EhL&+U#+7ooGU3+fsQR9UlL*v^4=g8$s+wgz~feMetpbj^u+wtjBuf(O$2P# z93N}>%eA~*ug?|EewO}lz~Hm+m4GJfkJeT+a!1A{=`nu6r{`nMe7;`bvxXG6wLn?R zpD6oEwR$!oARfn%+(~bnL;ir7+9&WTxLfn0}MWTUyc(foRd2}wHjA%=}d{V ziN-dBmTH<57(}BpByh3sO7mCUrkxk(Ph6te<2!c7dI{-BF{cTZ(;;8QqtMwzS&LZ^ zUwav|b!LF@q~jW-FJ8?eAH%C-NLln_D5xU2>Icl|zHz-E77cLU4Uqa4w$zW##CQ(O zAA8mK#WxV=@d7~Ki%ub$cfvgnXh2ld&ZCfBP!MBB$^C(j0jA$6A3+Xm^J0-1bIyql zJ@ZO6oc=}M_f;cZSMpUiDwU?o ze(X$)`v4iY3zglF&;tYjV9j%+8kGysjmY-ukNYtbv+b205ue=irvJ6Da^H=AmW7#K zFho)F4R-}Vk_Qe#-qp?KBi)38xDDnH$$1Sgf5{avklau4wD{yXufYZ6mk#e0zhimD zX*y!X4acAhLUK?1!Fme!gmf4Cn4JmlavO{&N#|`r$H}=u$Uovx^;^i$CRu3a%qh>r%J>IIzc(^8#1e1nrLsjtO%SlUm42|p01Nkd zJG#Woor;H@ukuU6W(S%@+4-@<;$^>@8SMd)D+u(f z;{^SWUQ0$Iim-xfDHL9Py|xsnCrB6b`&nM0U|w>&tsi(!)V?s>M;_YS``H!nhryvq zaQCP~Q|qrZ%j}ZLtI*1YxQUhSgT5CA^AFI(qv3OK6>#^`-kv6c&%-rs9`i%}sxGU; z*0NQV1~(f?14fcwEAavNG&hofJ#-~}ngqb^L_;~;dq)5+T1>UDKGoS`f)PwHf>K!5 zuuTo^>O)a1ln0O%Xbxk{>-PGS*f3F0)F-Znt1ZbVG7UnSc0&E?|2Q}&|4w9 ziP!u1){>oZSv(;&9P6`}cv}qJ4A8`_PhSssi67QRdq0UWzz*~rCunz+O&xr_;$;(d zBbSc_!sWb@_H%OqF5W>J9Hg>C;!kA?`05L|#@VVw4o8A-TGByzP;1TQQ}pH6l<@K( zO?>j+_+jy8FT11nnG%+s#2!@Ehap!5LQdAq){T*%v9ZKvX-}UL@HqoCTtNSs@T3ZW zad|Sk>fY^EiQ;ri;Tet?ns9w9?m$OqdBD7)28;Br!-BwZ3zHYt-qZ*`%kKFtiY6{E7hAEQA zGuL3r_d1SuAUNoJx$;VrPHxM2e9b~i7sNS^Ls9%(7t=LB0*WT!4_<`1+51{@PhdGt z%BSc0iOt%$jc+K`W{)Cc$>x#>v^$Ev_S}HJ21w$QiJLJl8@o&F+`#m6Ko5v_z7dXo z)$uOAlxALf?Gcn7uQqfFls2fC%IJ^`?mw#NaDXPto`1t35uiQ0#F>vOE)>uEJ#!yH z8aW`^YW-db)FthetJHWm7dLg`YGzceY>vbaEQnV$nAzC@8t~Sa5A{won6*pEuQb;$ zB^?Aj;EIX2j6XE`o00LM12P9WM&(%erPVR~*tPvBVKv^0hVLZY&aB4Jjw^EF1;?3P z;)QoHGjoG9k&$CSU{|%x-bpJ zrJHe6JJ^g$aHzEWy_?B`U%fhlMWU~VVC85MON>vKTW$$lT2vpyp*+wkK9?Ou_0nUE z3E$&hB}jmc{`Yu!U$Vd>r=YN;)-QEB3CeuGd?PmY01f!#-^S;V>|EQMn0|Kd0kL!= zzQ(pXgbpeGfWgcYtv@{k%G!ceWtNphczCc^~)cLKRrXUOMKsTOdmMtfcVwx znbY^$S2vTBus=d3n+f=gih?m6P&w7D{{EjAAG#50`9_k+zV8ZLxjmv-6i@#rrVr?M zK-AsDoWAH@&PUqx<3RkplH>&Na6#3|#;%zrU=^vnBlq_b^!7hr= z-?TQ13pX>T-M(KvKV;whQ4w6H6T`PK(_5A5n5V`S^h$~h|yI;Hw0VJn-LOdxP<7rIZlnKZfE*| zij32MdeR1M+hsNZy{(XShOBM!_Cer_dtXi!w>}^Le++P${W?SHU>`ec9g5ALN69OI zAt3MvwN`~lC<6HRJTIQ{UF_b{9nADRs>8ng5ts=()&bcBcI=G9YcLB@f3)EAn*_HZ zz_|ShV73!5d1s6Ec=eskGz_#;JtDGKz7|nXCAMG6>e!*RA)*`%D(gXyG7>2koUCfE?)%#q!d3r z$bu4k{`Ox^!Ja6rbLPc8$34vDvN^#})~YzII$btKtD#g|j6DIqeEhx4j+c|XU+P@a zJMuopE!z!TOewNZsM+caDhru>-g=_u6ss4p+r{a-nfck5Q3}s0#oyg|$&_fj=i-Zc z_ub9R$QHw^C{zE&Eq&>d&8b?ItT7qQwu`wA38=tOd_QJ(OmCndNb=)Q(MZ|q2Y-x+ z9aIKionF_llkrMa$5qUTFARxn|V7#Ock;Wuvtml7~{F`aZle*epJB)*qd{&)kR8XMu+5yEbidAwqlS z#I>8>JN}CoBeYKp9Uu-7AStamL{7Qf-~PfWmRpLl{?Hd0_ulJ$$ABIq#c025UCD}H z^Dx4`UPi%+_kOy6&+Abe`wI+eV}B8Ge~2#Zy3B!2#9t`le<2cbqCy)?@dv)l%)g3L zFiQ1H3s0ZoX+RZvUE)1odPTYT_b)NGFFKC_h)43MY~Y_Y&U*CAr{t`)64{TzZ2*rC zHg7WLG$cqxd&mS-r9&k;GS;2q{;$GqaOy`0h|B+48JkE&@!H2BnGhKc#|#imk|>ZJ zg@eY3)Jq#ZA5Q!`Ga`QSab|Y@luyyf?YT*2uXy&?UeR%K^lNaO46y#%wy=Kv6}H7% zf$VP}2GZpZ7Ez;v1#CwUZ3I#;K^P6e+Pt;iMah+%;+|8 z)7Yy}2lOpNjfszpc*p-B6Nw43f*_*kD&jaLapPBR1Q-w>v4Hzr&x890NED?5F*Eym zAA26rDcIfH*TVw?K7-2WU9wq&Oro2uCPnWMx_R{bFc~(IMA;8co+C0N=PvXP{Q$yd z(Y-p49ZoHeW@x!!l7|xARwb{C8K}U*n(dg`ND;NhFZIK(_VhOY5GKc7=jt3fp^gf# z!c(*66rpU@rb;Q4X>w>CoY~kao;-Q*pm>DTlDh4?%mJB<7eDzuqI$3Hgx*6{?@Tiu zZL!6&PKT?ih7Jk}1mAYCcM_({AdQ>=z(HBlz0VX6KEdqY7g+_UrX-8GiX$!{BGcnl z=@8gdM~VrVp%c$SIqUwYug!0G02V8v&-+68`#&OKlCiKyj-j z_d62pWJA#?Hk^W?5D@=y|3%)#W14lzIlx^B%6QlQ^c5ISawP|T#&{5e4x}2jGkP=#tvR#w2%#u1-2|192N;`k-7f>JvXh_d^cFptr&R;@S zBI^c7xK;&x%y6v+a|E$BB3KpuE)Fmnh5RKh!Bagf&fR@2ib(vw1Wos)=j)zfrWObW zZxr=YU1kE11#Jx)TO`z1uXl>QXP7yZ+d0(}1PD$k-g3_+3*tGyenrvwhF@b+USTU( zegm^?fY#py>zOYQorXXQ<$k&@sJam(zq$+wJ`zF=pS8`jeaESu5M@t&@BfE(-4~yg zP4GJl6Ss|je)O4ch-#pJT94a#j)f zXbqGyD6}YE{RFe)_7@;@?)wY&z##R3y}XoiGyPZMO7g7|P-NOuUZDptM<=PW#^e$&qKIJSAkG0d7%fkGTr6~#of63`#W6Hv;PkDbephg z=G>{^#0}%07=3bNdgwx#Kv>L&6WY0Y7~`eqnaLA~74?-=D(p0Of+>|KTfo8bn$y_r zGaE^$QDr1y(SQwo_%s#;60dWu9$M#!aJo@2YMe|pR7x3@z5?y$rYUr@k%Z!O=fErQ z2j>7R>e$hoChb^9dj=u^*xOr(W_AzZj!}{ zdRGZBFWo%GVqIV5<*s-psw{<#ss4%{nj36J3G(tGk=f1f>3wC0MF_in^}u?Zb+pc> z3o2zG#`tk@+TVWj;)NsZ-1G*D_}qI@d+K*=c0}~_lskHNj9@TO8wd_Boo4%zUCG*w ziB2qNjPR(C*cT~R&0u~ul1PEX!~Kc`2>ssL`|J#QB0_OW|ru;un3Fyt`am}+F76j%sft6mV1gNn<*QnlYLBv$$lB> zfhTV1m*Lyf`@IZ{Ci$XMn`X|N3WLo)I{IU~(9%?{8+_VBk*_%Pz$*ZbB1!e`#qK3-)1Dy|la*EqfvLYjZAX6oWX z2JAX7zH2MHb#{Q(ziSmwAH8;j-tPQ)D~oC{&Q*d_OZ~lFza?7aJw}Ho(NL!wjXu*J zp4r$c#*Ey-9wOYMvPIA85xh*fv}iGATAZQn@)}h^PgaC?e7jiO&d$#bP@>|K%BK&D z%%4@edMCGo!7wodkd{tNsui}ftRody*Y&za-Y$L6f9}Eu4ba3#Y-iG%MaJD&Ms!2) zXlXZ12k%Pp##|&-)h4}$n6&?N^WcdAni!jUGwkuIa&PaRdG=Dm4g`dlvO__iuGrXw zANT~>P_>Y}eF0MWlY7|hbAuF^^|rIc3qHl~?Cn`(Q6xvOn{u4o0gqNBq0)EZyd8vXmoxi|-}n`%tFhgcN(KKCouM~J*(r;3+QL-Z^xj)5MUP3n6MjA0`>Aj-(&?T%?3FgU5S-?&@SCx={)XA$( zD3`r?Ydhd@WJ;M*jCR;N2OSQO#MqyaF9u-kJ>tT-tW;L(!XqruzE=q%E=5!fd$Vp8 zuMGJ$mfVus!KbJ=dEg8%>L6|XmQMo3+;@OotBM8Db?#JP;`QVAjs9?CVo0?vx?HOS z3Y1Fjf>RmIbKQV4;Z=6LaxW*|W@8V{4m9I(@HL0Tt8ZX-_r~qmor{;OvxTv0(CGP2 zSjVa4RgEH=7gtzt?34=2IY2`M%JfUo=CdjmR~F7yf(1%P6UoHNc1Nflj%RDZK(j#m z(kNI&+H4?+Z0mgxqh~Aj_1>w#3h%iHeNfSruGTqkspR8>smu}woa6p@exgPn8%Y%G z_{9sji!~Syy!QkUln$q^ceXoh%ax6os!kiS@`3_%@|bwCKt~lE}nPxet8j*q~2A614@Tu>nhtNxy{y2 zM-#z{yVD=ey!i1~L%s~sMA_t)gSTIZI$=95gkY!MJ(+IPL~Q)6qn{i8< zK(l!CPuSNeE-->3nA(NjEk^Rou2ljhB5jLu+>qu_p57%d^GiC1Al9^GTWo9=tBUMP z?v;O`#WcZ^(1I7K{LL3TmT)y>PwF)pYZFKG=~l}%GsB6=dtYV0#VF`q2wLTp(Q`+m~1cnu%2FF;-$*8jjO6T6K-Z z9z*c})m7}Fxxr>}YcA^Seflcs5vN@jTQ%W*dXH#`HW)Kk2QqS8fI|ZnKQu1(;Os!N zcw*1H@Vbk&%fykn^MhjKYIbsKJ*bx#_-c76)U4Urq+Ttayb+vmDRrn-b&P;;w~?J2DX*ua5SHCW$4u16+LhDglh3m_7sCw#JG7@Vx>j(gerY64VZ;K?JmeZpacV z2N-fV?961jXu?}#DZ@P72Ez=}#9I$+J=i<1!(J}i8(6hKEKs1L{8H1H>e{=hf)Ek( zxfuD(h0}nb^wPZ1frkiS(Z#(>0@z=Bm8&j{hbjy5<(ebH7B$v}&8?1^YT{jYf&;Y( z`8Q(nP%PheC2R&SE8%h9?}PRcTXn8)_kz=*@Uc;OGs9G)v0ykazBkAooEvNw zAGkB->YW`TM|flv=pd3gKe%b=^c)YLVn2x|Z}ME+`$rhY$JS)S>MzOL3Lx;RtS)o1 zAPP~4%7JF_kvsM~d%uaYz#USu9fO(8v4wDmN3Fsdjtq*i9)5D9HG1ys&&C!N8T}W$;6*$_Rnmd z{`q)nQX#u|?19O*4!>#KJpJYA_fNlhx;S&kv}c-=T|T)m^u+L^TLMF!E%#6F82^u{ zKaT%(_`KO0M{k(9Vs>uiLfLbp(^KEyq8gu^S^53!dpAEi_36={j6O2;uBq3J{?F_e zXB|_qk&lhNeM&!daMU`SoA}|Df8BEH*f*!fw$vs*H~!GX>cr74yGJua4^AXTA``~p zS>%Ck+4Af0vuC<9-xyIYeiNysi1i`c!{GZ~;&ZeaKPF48h0{1-Lt!m)=E9 zF@)iw*Z{(CNr5ygq797Q`47{cvFE$V6-W>(OMrOj{adg&5uxNjw-3|P1*kq}0w_O{ z(s8A}ZIMzTC_+vIGejW9yb7m*R5;Hlb{D00QCrQ~fk+YDejAD=I02fGEslI#qACD^ zq=*_4Tr{*||6rN~Di_yYZ zbB&774n?FGU?N>D{NnKc3JJx+f3Hw7&_oQud=ypS0OZl{+QkKP`|jvd{e>)U0?CY^ zEP=7@!mLC?rrf@(>AP4yzX=8Q5KfJ<@NP^xDR#eaM0yvuiKOU+3l4Z(unGy3&vWJX z4bgYKD`1=ezRBA`#0PwcxYg`>TYLXb$%u6?8cCouSOp$@&WO=lTYGP#RIp<=(IH1K zl!Y9k{W0NQZf{!Zx)Z@Ug(b{K{7Im>`0~!Ku{Hk;rJ`hm0L9+F0yg1-D4C~iVWrv0 zc}foEQL}*sXE2c>D%6FdLKLo~`NNb7BpAO|?kYMJr0@hTk>Oa6a1-C9RC0%kih3au zsISFtF#=sD&u)8K>bZaq1moIJsG=aaSAb*a4h7m!{g;p%sd#fq{LI#Hp;y@B51ME`AgrD_A+F z0W*gD0aTPIuFSql`r)oSgh?!7y1Kd|&TSxLMLN^cLV$HbMqIk0lp`sm*hNSTrhE67 z)`o?UeoTI*i_7zDG!)=5yxc6EYJVZ`0xk_%Sgsu%kO0~Z45*2?25tcWP0{GMAV6{!yXC?-F_V$Ud0bfp00jhmvo31twGxPfq< zBz8l71$?N*S2*Q+enVeImx{ z<_rT7qyUheeCUYuGVq}yU^_@egBI9vS}aVWGkV4v6;q9CK$n2|U=Uw~)eaV?M(Lo* zXZTQ45_4$C;L-^~OvuO=-UI3iju;~knTAvd5}0Jev_TkgR&Jpny^IV#h+s%BH;Sxa z^&#o4ojw0Wf4Gpt^H_a|@S+v9B?*HS@(Y*JcOiZS_{~BvBLv6-vlVB8x3zGHQoRVy zT7hDX^>G%#EM{Dg`E}U^Nd_2kwF$w4OFU@Gz?dQhM2)S5Ir_2@8#9`V2qbsI1@87j zt_7F{>5CypvCC225(ifStg8cq2lKl>KnI;iBv!HzB>^2P0w$!J$9~LkdnLa0GGG_T zL%a-Gk7EYMs8O-^O!~uMw{8Z(Y5`I<2jUh+h{04`{N5TB{Eq6Pm=92}Em2S>n_E0d zsb2h!6`^0)GhJ|x*_2%&)o&KxO39cmFog>-aM-OZA_H*%<@xRZBz4Ua9>?y+ix3_V zBG{VT+|MYL96e5!9N7^r0Kw%#JsfX)JCzV2urhiiCkK%mU|rscO~3sE`&Rl&1`gp6 zzN=`0a6-QRIP~1Evk&#-JZ%55u0_B)TG#{YI ztlY@5M1{P74#T0OsTr*6*OH^PJBPE4=uHSw!Nw#;8p`-!UV}L|RFJtn5_QdbTzRSa zC?C_Uk+I2e^x)7nL=;4UilQv+)<-B6ciNm2?B@at1+##ZglLL%=cQdv4kX<2h9ZcM zAsY`z5T<)xLEklDS+GGvzCsjHmM;H_7R7aK#rZ9iY{Uv088YvuKnOpaizc@b;duS*5|wQjJmmtUhou0u&fv=-ui5Fgrx3}CiA*QY`~!B&J$ zge}^|d*Bl26U_D}>APS|0|bsa(m`D%upL5Q%|T)0E=pbL3myPf>asY$AZl^`g(Cd$ zxb!j+z$`|NV;LLAphNPSl^Oc$-l21q%P66FpW61 z`gMb$O2{6Ss7TkwWEWSA5JK3_92Nu8LiP`d3=19Ac>D7h!E#~Fz(KO@lu8aZa4qH! zY=HwrM>Le|$Qvou3N6!yAIw4)N02uUS%i{U;}5J+QHU3;h2mcb+HkL!p}IkSj6Ffg zr>@;RHcUU*gwHqS$N?Y4Ho-n6$!kSvuE6aalr;!x9JdfO0q|0?C_9h7itmIL1tlHA z+5}l)%i}QSijw|G7#-&gj%b2P>gwyD#@4Vv2ZbF*K>2WPfGKd?Lxth2t&uAwDmjCp zotnV2P!$mB0lwphzr9AqdLr$RXtp>S!RuHG`8a*oUswURkUG^kF$H8)B6bXCYJO;@ z|1wmUh#$p3{m~pmIAm=Q$}A?@O}mCn5xhLMI9w{^kO1U9j>WB#oQ9?X;n{aQ!^Sy^rGy!X%~#>jtmj> zv*%Btfci(QJ9fz~-}1{@VY)E&Nq{lkyXDx-6_cJVmD!((ultB~=gQ3H@p0M3Grym{ zY3!M?uTL{$_l?~$``)qTG5_@Y$CP8cM*lMUqY=$acj|kipP#yH^u*{Jrmh-Ij+$m~ zoZdEi*60N4MSWxDJ0l+%c^m3Qg(iP7`Pk$KCvToCO@Ddj5_lv&F?{#T9kX+@4%z7= zi>M>@li^2Zzxa|`mg2vD<|{LshwqlGdlX-XQiSbFB07^$mh#x4-p>51`!feM1G5b^ z5K@qsmatB-xZQ<)l&S-3kX@X|7O){Uo){#y?C#G8!fRSAgCMhEc zWV;ww;5fkE0auU^_-M%6UWiIB!}ih=g90iBEPH6XSo+pBs)#@%#^Hd?8i6KAP=s*? z7LA>ePt$jyFGHt?{R*7`7EM=+W7(~crWJDml{7>+5z=l2lRNY`iA?IeLx+KcH9)z-_Ygg7{^2z$0V0N`N;W%jEkOCs z7N#%hQ;GZ_nr#tJ2z|whs2lRR>>3sN0CEG!X%C|UTZky|lYxChD?}5C!qUuQn#t(| zDaaAw9q8=7UwRn_EevOl>^UflMI4imm)oeO3X3P=hqKp^hkM2eiIafmBG8_Yj5Ej& zENj0Gq>v;QGme9Ze9O7CX9&&}d{Y#T1*~xqqDm3*yK=*l_1@R%p#&tMctg~|79|?Z zyyUMSzKtNn0r7`mOM|go(1&+P$`#=Y9~Lk|Z2WFtO8K+7nWXf?aA^5phMMwF|Dy=% zhAc4~x!L^^8MX}($N@|lOd+C^!d#YpZH?;el3WnzDlnwU(4fl}rl_3*GZOj`0{e&{ z%ws+WHT~Z}P$HCj?4B$P zeX{$Au^-HywwY34mIzSnv1?%tVb@|T-F$b#**`}G9Jzh-9V|qA5||hygmmK4tHi$P zxL5p04~Fvt`Yi5G^4;xV1#kl1B@+q#je%~?L7l?6V^wUX#xzzxQY1?ST?a0ASn@cf zP5Ci8FQ9_6;lm?EM12G(7s5RtpOdyEHO`^%+|g)1>cXoD41XzKpBIf zgZ&6?+{;mGmh!Te?)*s1P5Z%LjDHXP37s**LJl&xcVmjdK zf&9Kjnl2lhi&=a(QFpPIyZA;}uand&5#Tm7kV6L3+=V_$rrTg-Wd~^2a2pfXBg6~* zBv1t*vJJk%v`L~uWh4ubgi-?$7lI!MPNn=1)prEq*@kW|5CZ`ge9;6>fF|_~>1DWv zh()3!ZZrG`COlM@@pnp8*euv1)4A8&WGLf!}U2@$=)HrfzlcPDA8KdZs-+`63yLJF!dPiy>PImPmff z>KYYG1GgErQwSan%oI#+`3yaz`bRR(Ju}`Xj^vOH641$yFVJ^&@a~&16k^rlE{}Lf z;RzUj^NK{q4_f=z1yDDzCG$8mOxfYL^{Eh~5x)*1CJXBoo+}PF8qkM#|2usbMhtWS zCld6)SeQ9np%eq$E;*%wuOOOm*urE=;xFzv3`SklX1~vml1v(4&tWn8X=_I$_9R5K%5JO<@ z@01Gn9NctpDiigI9G*^OEakiV=KEwQir{rP(Qxo0HXjZKluL%MpUwxYeh5>zloHqx z@Ys^~p`h)h&L^A^2n2wO8P`Zq*FeGGGwf-*Y0uc);23g8KyCquQynUym)T2s9;ZG0 zIJjiWL#RTc8^9#~hVNqHL7z7~$*NN15+M13b%6b2dw3xmCH z5&3=DJwKA!kMu6t3$`mjeqav4dXShv z6vD0#bavi0b4UM)SL1La3<<|Axh>4VX`{oU*aR+X*uJ3RN&>dZyd;NUwP5@(uW?>MaS(_+0vPG>Sx4Wl*#n;k_BinH z1uJpvW7S}YBfeq&tK!`K-#jx&4qw+uHCOZteHb2oa4XT%;Y`Bj zYwx~LnjcIi9EC_e#<>CW1+xG*`tAvF|M{1liE-jLaXi6AhwM0b0AbdEd)oUt{RBu^ zY134E;;l2>_~(%QFb@>-5(!8M%Jw2QGqfJ3mUS;1i>x}Juhe}-3oCx>Mg*f~uS3Z6 zMhegvDg&txbG^r}BcVo~)gZ3zX{?l*kLi-~kSCP#I1&M51@A}t1J;>lYtMb0~c^#7kKMuLR=rS;&cu)d@3 zmU2v?p=Mi1LhOIgjn^R9b0bAOxqTR6g+mBb`}H-L7KCef*9TMdp&Bo*bSC_HN32#U z#%VmlWetR8575M;&%QxQpt!3+rq{9R!C+`KwbI*c+n1JM*X6s$B^wZqNF3Al7Q1a` zBMFHLll}C%#a_LIu(G|jRUdjO_LGW(_Qq1d)krJ#%B8%{lcc@$x>)p$B%~wEAW#%( zA>zVo*CJ0f*R02OCN|BSgV@eDjNgyg&Mk=TO!UsEj3H~-vr2ICDNAHiOHB`7sM`zq zY(S4Zmi`Q0_zse4Fi3ha-ud`D$Q-&>Uj)l{7TcVIugMcWSA*%4nHU}R9Y?_ugEW-# zxE$f&A6Q!G{pl$AeAg<0%%_~eu}r?UR4d0@Rh`CDkV0p!JciHTND{TRL;Y-w-M!Br zBg47Qvr3Tj>31z>t2jK&nj)9dv&D3pe%IWa@Lew>^;!K}h0FH#8gD}A%vO6|2$cDb zyT(~8VYQ0#!=c%MX37fv%nQRmA;M)(be*A8OxfCIT@mY2LzgvV>}1~pdEsV6V-Ao= z3e1aX6FYmqxtT;6dRJe>%lESbWqs+ye&Qxf>>y2i@|n{Ptz}N^?Cp9pnHJw_7z3jz zK9#bf#qbep5g65_db=xayNhl>XM;3A=TDqP%W)jP0U?J{vIEL5TrhPNkWM~3`pc0W zLzlf+e!;U!Al~Wpx0PKawRge}L$DE7)jC=6=mXdbv+u(X4bsHBcFtiptbUC9N-6L%seS-cezXpnLgVd)gy=ufwj;7iYHa=n+TLZK?l)v-vb zWLmN?i9G$%8{dU~2591~4_-?myMea#yT6>jtM}`7k;QhdCeRs`Ai8C3isMzSM9nTl zjge}Mc9wrTrfrahteq5q&R)21XYXroM@Ng!)i@C%{Vb7IwZL~WN}l&?Jtl9J$mi|i z$M1w(+(;2+ojd!L2KM%Ly%WL}k=6tdpN__wETE=&$dgkD%SoXt7hnGXr2L$SFB>3< zTX)}dkQ71K)2oU^MmtxpMg|ex(T(M(-Nk2?mCB~d!f5FyU2z<}3{c)4yZ%)#$%}gE zIKHYMkM*XZ>PBS!@a$!?XU)#d{AuQ=Gmp)DWaf^U*Uw~UJTq$eK3|Hg-H5m({iEXO z%4lZPJ*pnvKRQ10yOHmYJUsILky}REBUg`DM!1nZBb$ex8Gd5;GsAZezj@bCb+|r! z#jtVsyy5wwzYqQA&^L#AL#sn?BAFqVZ(ix66UQSSbv98hce74w!Xtz(?;~KwV=kMH z?`V04DwMUeIn|N3N$uuZT^@5{Mbv$;RDMos*S1Q0z2#Q9{IQxAAzYLjabjw!DVxuv(rKh_oViL<>q4S*S|0Q9mr*#*c%-SR z%k9-%D4k2@R|Ka<^9TBTq?%;wnq<&dayc{6)T@3^yN|eiX}-O@oUbTVt#&cv+9b6* zlzz6V();ycKC3Rpf?t-}RopU{x5SbTXWF0UG#8(w-G^J&TqeDgZ&kU5v6NT6l{~(p zkB938E!$99;^wlc(XHgqZP9+hb(5Uadtzy}#wp@~_@UdR_GC2+lzCOB;W6k-?aa(A zbPdA^zLfOZQe7bz=tM7()-Y^O2=a{6-{H-^n!d?fUXXgRw(LCPUMaIymnocdC%B$O z(4|sxXF60e)z}PEU>DvXwJX&;7l|sJeov(4^6KwQ{Op{?U68sF}^nT#)~^%+&^!`DlX zvwbX-sKFX4BeWGHzY0F zXnUZ&tY>qjw5i?>nVs&e^GvC|X)bfdf>|A@#kys4;et;|?TsZsRC98FKD`9rU}l;k z7smr7wUS>cbvvA&6&!3@Gk?4Ef>5aP)pppYi&VYUFgNplsXbFI^R}SDEih)Kx~4u0 zfV9A)jR#_NH82d>1ln9RWo+uNlpz96TP-XP6n!d_TkhPOk)Af^H1e!IWwS^1Ty~|9 z8D%NKA5?ODsIDq3$6AJRDL+qvg5&-r+$j11P974xrSOvA{G#-{rxIrQoLN|Qg!A$& zZ+?~3ZZvk-O1R_AD|1bSLg3#nwKK66%%qAryyTRJ)0yE2+5spXUuv3Q5o?435cV?h zWOm=r=nG4gyoqlF?8JCVwStPRNvS;(X61Rcx}%GSL!NYcXs6U3muuyjV5#PgL@V*- zBtxq{#Fwm%Dj%`8q8V1{1yJ@jS``3D*ySY@l!z$m7KOj#G-c0vNa{$hvUBB@Ca`Q- zR!8#uu5+Yzow3O)3#x)W(JYjM@%?v5?TQM^@*YE1C@qCJx7_eS+U{Gn7P(xh6V2O_ zOKx{eQ=yW;x6C?NLs-yhohy28om1Q(JzuP9L%&1aJsS)m8Z;ERC(V0W$9-Ve5m2IrSo33 z-K`K7zJX>k|2~5|;Ee?1#dtca>adG{qwM2Tshu&WGZYUc{UP^eidP-?hShB(TUt79 zYtb(^6c`HrANK~#8dmG_))I;8lAq&-CHdnu#ntknDbBQWzRI$i-RGl&^a$z-TXe3t zQ7b#CsF$*{6A~e1OdoZu2*XJ7I78VEhuzGOGOaWQ*o)?qd@j2mqy@T zqXPVY{vxSes}XoF;}EQFr>g|`cNv`plt9Sy%6c%9Dl^r@O8A0b(dXSL1B5#8MI)** zM4f)Qi`LtYy9;_>v{o{dT{>qbthnre^mv%F@l2~0=CtivN|m3whIa1`FlAT8kS-{~ zrdT+3$w}$)rEZxs>l3Jxl8j^>1&t&nSKL06o)gO5bRf>;0*bWu1*soz3l+_mTZmZC zGc}%*q_Eote?X-Xl($X#d?zh;NSn@WWn*%;rMVQ&6n)+xKWvhISDlXXW?iD5;5gpx zP9J`?)V;FnYt_~66%G+o^&orcYozBDc@%oUWlz$I>xBw`(Z#ggCA8XHGGR^Ron><} zo8I;#soj`0%cIt4tOT)qwUU4!_FBSF`uU4u@%CJvuH)^xU+1_vlgM<$(xe) zqFq?or;}bN%PVqcu&zs&YaBc=r`gxqIUkp+1(Ho&MZSb$(K4ysK~BLeSE?A@>T*FC zk%XkvqIa>i9NgX6cr|Lz=vJlY%^nR`O@?Z1x4u|SDbM_BzkMa{G}yB!N)qTYrf?0o z`Il6s7qprvYhsp_HA7ihl*i@I&~`^nW9RK=w>IH&8!Q^(j6X{4sbq_7DRNAs7Rq^C z`RQxvOgmi0ioWKKD-|YxPOmh)M|xbTPjOY_iZN!E$4oi5X43-_fl0;X$bxE=H8xX= z&7W7M?e?tB$N9|qT)?ApDBFb*N%+`fB@4SGR9wp)ZNZsWo%c=Yc~8y2slp0%K3sQL zw6VPsr`SDJ8yCx$UB!$s)m%yDS!qYw9Z56Wa0VmbpPWT0*HA?JxZSX%8xsa;@r#nZdyajo5ZaVM@+t=F?*Ct z76l(&itoK&>L_5z@||?syX;f(yhbr0i88AP>YT6G)cOPIm^G0dw@S}*o&=xHEhiim zJv>SLX^ypaEHN$%jh1jNu-s;cE~D+1ayQ90MMywkGGMRhz)_EsRL_bylBK3%f!k=iK=AA|E`kaCp0;$ZJ1 zA7cS2?OG*3;neu``j;I7TQ-&2QKjA=(NcGT_|JF2pEp25elLMmA(`hd+(qCs+^a?O zLk(BGU6au80p1|k>dTdGIYUiX;chteHqyk{$?qNRedKPER_R$K*x=N~;52vj4z?O| z)lJo;wN%K_9v(yj;OqcReBj6p6jyrZhcJ-E{Q5A=`EZ~q4`vL-uDzV~1>&@mi|#=u z12plGCyyQ$DGa#iZ*^84Ui7^I1}eoTEy z@3Z%jDS<~ihsB{^B)2xJWn)3kTMFKir>&-AdDFdc&ut`$54;bczL)+A(8WL=*wOpd zy~G*iUd^t5SE3#kN?gg!N8^@=UnNh`zMgtNzH5Lcdewhl2OikjGkgG^0m&a#+B9` z)2frsh%+9^u`2T2^WvL7i|q4_Br(?b$RY8eYvj9o&wQ3<{npo~PhYel>_w5tSJT<0 znibfKCqKy^p4r$cK5*|pC}3>Q^eN&bvaQzOn4#4vD`g>~ad+b`x1i8?>~t8P`ZR{I zks`*1KGjFFUhM7u4Dq79h*aJz#j|Y`4`H2Ij<>kI1=`7F4UP;BhI-rM_=N$Q_@p+1y#04vu)FvC z<75xGRy*j2iYhkf%II*@S&BJ%Wj+eGdEZa^@MGAMgEZ7=ho2N_@C&`uzY3mOBq-K& zI00=HrngC5$mD>C-&AU7H~;lzB-0O&h>sXoMS6B`&-)c3A`+`B=;zwq?t@l+H=}LK zS-w@}ar>E4*^;8_S>#I&Hj`54_TDF-#eAK1U3`_`t-rSae$j5V;Gz=8L6WOm!+wS6 z`#RnqY=$%5>kyCK^X>88kG@XE;9n&;>nr{Hk80hSZUK5*!&bGHW<;A6FZeOLYoA8_ zQUH;Ghs3*T4nRG8_w?PpuRX$!$_Uu^nc^S6fV9>4Dgj=n!}Dn4Iuy%s*!}TkO`vK} zit2A*c!SMIk9{lfuD?Ohav(+eVC(&%h4m((CU5v0?OG*n)0-(w6Yz#nW9 zdcZA@sCSC5{nFY6&AY$Mo__l+%>0mL^Zg_k?6T9YUpi(5YTvnV+|KLU-9iVUP8o$Y z=+SzW>7@A3_i%Uc)^D*WXF5RZ$sRp~nA60!*(-MD`)PqBDgl842%$rSECP|q%k$zh z-)6V%IMo9Zrd%MhAYSQ->g%084s3 zwEYxBoJG~O6nJja%--=gPF*tk!HMMX_lAaKT);tssk7I{^=>!C0h)h7#=_GjbnW&(O|vyOgyBC@gBP> znkHk|DSqUaKup^}5g+)s8zcbInP1UyY+eVv8`ws4i!F$6d4`=m)Jibf?GWa(HP-J5(5y8&hcYcF&gep>-{F^p^U?w-UIPr!}{_$Ur-ZA_S zBAzbVcfI!*>cUHCpsirQyOa(2RQh&0-DGm2_B4Fl4ZmaOW;T)lGjsaE-nS~}+$s|z zzh^I>+c^JgOY?)@pK@u|K$!3QZ}#$CNV`QC5ec6lSvn+B7qKje0~gQu12*KTsp8h5 zLnvfrcFl<&_`@qoHrXH9_iS~kHHMnp5=xeoPNg%@6zDfS{zpi&0h)NmpRYUIn|sp{ zpk=)KPb?rrIRr0t5k-ZdJ;e1PY8FvIh?L3gr+QYbUSZ|`Poxhb;>6eg zg`Hk72awl<2sjeWXC|?6NI&joSi)ip;%EK>aE?Q>Aq90y=&n1V&BY%Cx*|`3% z?Cp!TWA5?uZY0&X0M36ZMt1z|l#INFA^LYVykI6VsmN9&2&V{$L%IcnaH#$$cOGOF zYK`hey$<1er+8R=PKg3r{}%!ZnU~wR(XEY56aPH^rP1d{PN!9drbKP*%$+^vcc)u% zmwsXzvV~ffO{UUa;uW5>ISe1F&mI%MHO?KH9cV^{??1jQn8vh)gX-ozF}2=VEvew* zoIxJ%I-^aG8zA}UY+k%%gaby{Mp_>tUwrt0ZclG@g!JP%F}W`AO7*P0#raINqPm;q z?amDC=Pgs{XMl!~gQq3f&EHO;pGCmwONwN}q**p|?M_G+wFFXaPTue3bUDkZG%wD! ze&8|0)>xsNI#5ulHpT&I&~swT`oJ`dC2M3!HRo(hCpVhnbYS@*ZtL724VBd|zO?uF z5C*l^abg^20=+^`1$~Z+)m1leimEB2Que#p4-gZ610LMKW8&5yj2yiEovPivhiAyB zt_z(Yp!+gPkn%o|T6K=3vF3F6ewo(SAO7aG+T{dj2-pZBISF*n9Z= z{uH=R>|8%-d41E@DhfKaDxtLmbxHA^d$>b08(T&8-w-zS&>x%=y?^ZC2;$g@c?^PX zgkmvLc5vRBTn+xAqqM5kCMGpC{YMeS$!CQxmAdmYNz?uTfZQ?rh6n>cm#`Ls7{KK7Fdlo6BCglF3K(5YK%b`rTXcNdq+Ts0SxFidBt@Kq}oPPIFr? z6yN;S^B4Qb-#;bXF}0oBw=Z&H4hK6e88L98(9`DNDGwU);Uh5oA3Ti%k}aZc&V`rb z#y*nmR(LrI#45$AUgth>`Z`|>R(2LIIEYofRKabX*+>%E7k+&3CCH%fQg9~tC{7TR zWICPZs$0kM5$CeJ?or}~igvaAFlJ$ZBtH4+3MxU}%bnJ19_E0i={SLUmXeD>$vSHa zzT_xbvMm#1NQfuT;&zC-gWR^+0g|{DWV5TcdXOxx_XNR8ru=GF7jc`CYMDYMf5_4S z9{UvsxI=S;%`{}GA6s+s0O`YZf&e8`Q~Up8>^tDws;>Vn?>L@uY$tIN5+DhL0MdI; zlEp}nE!mcBZP~KKiY*UWlJ^$FgzO0+i7$icfED(5Y4cV9ja`_ywKM!`96P3&~@4_Wq4?*-d$h-0(kVQ!T7Rz(S6;g~HL( z;OF(O-bPEiS6f)&VZXZ!Z6SReLChb_heuAy?~4UgCDX zEr7cXMPIYoWUiHWse!CUygn=7GBYG3w()dxF2?+V$?W|aAvav20WTad=8O(+c~ghO z(a=}YWNt9EbW}A&SowI2?y(g1Vbu&V1tggsbHcCiG|A0F1dJ?>?kc@g9#nLyd8NLj zsJN$A{KECuLH$WdOzZq%Vfd@-XgJx1E*WhkcZu;T|=yFb@$Bve+o?a8;@2 zy+U(EK~byPscIDG{NjaZ6)BC$RvWJkKd}(Y>LgfTuY^b7+T=$g7T6m`EU+_|nuZAf zIBMxq10RF0(>OXSO?@SNgNL#3ID+>$CA`CqcE=#NYIG2^RhJnH zTXldU)mR!lfdY}ugIbJ&u_Tt|&yQsEni2k|mIi=nh=7m9+BDj%7EWj@(I7m{VpBIZ zvNuZ6T$0Dgw*v)#>vH*&FdW?@Yt}jVW0j}O+`-qGx=k%yX+b%*M+@}aybQ@x$^aAqV?0q^}E?z(qus)m?5Yf^VeJS>RS$ zwLQ)CbQ;ZLPgZ09D4{WJ$Ia&`^O5rVO3>NHz}TrpQ=>(ctWDr<{jST5LsVI_S` zc>zt~Cw5SkmfkuBd+Tit%34h)F5A!u zu+2&yBfW7v<^egPerV-B7Y)5%+qjDc@8asRD%vd8W<_IRmCsUVY(vx}duj!=>Ds$+ zI2cP~XN#Tc@P~JC@5-jYT8bEDMCBm93-L^dCb3Z@G|ZYSXsx=N%bYykD>%I0WMb~6 zobCel$rDStU0Id&c3YjILsJq^1uF_vg|%XpZeIokFQKt#vW|}$OIL8NJVztJA>aV* zN0bgimk^VWsI+F{FgIshA~s`{|7RMf5p!wvh`H2+P&ESLf`t-b9|-Owlr#jYu&PxY zQofB#h2i;kWG-F90WcIX_%1@JpbRg-ltDl!&>djuEM0@&k547z=BT-J9S3tMzKkNt zfTM9#~4>Axr57E+x+ijENvDBnZZ)z$<`^ z0Jz7+6T`W=;}gS6*1Uc%lGxqDO`LQUjHU5kq%Mq0OR14vmAo|ZB~nJYgcmw={U}~& zWnXWvlJm4w>3aG-#V#k$hEHL{C^urol+u{&&AE%hn>TW}?sg4bi{orU(zkf{(FJjH&zICVttGaa4x`)4E`J`=UhqpkbV2PXaso z0ylFS@V}#Yp9OZOy;4!q?&~bCsSzA{V3qTe*{g$Gc7}w+hEs|chOc5A;64le`kH3G z+++@v1$CWjSl}Z~bM$`990`r=?`WIpj)~#)2dHf%GfSLxu%B*)dX~^4vySYi)52eD z#d4I{WYZV7Hu^fcOA0IwRgH()x1kLrPm!xiV+_Bsjnm5p<$`JY2Dr^fQ`Sj)J~}Gy zJU-5-2ydM1!WEAFVa_t$wgFKv(QBZwT|Y7^-gx-mMnxE-!XX>v7J1m=M>sbuk`y3I zNJKQ?jTDWJi2br=8kxCs)dieh z``oGVdsY>m_37L@Wo+wd4yo#bfSU6mP(Mh)k6yByBAAm>)uEC4mzN;Dg8rpUV}<1@62V3^VUIZ~s@# z0Q2aiRY;XBTb0_FawPfvq~ruuTtj&F({H!a#fKJCR8&J%Tv?q?q3di@l~-3dwLujN zy#qb;(+hMYlF-j%J3o$oRSph zU*wN{i&;wwFJ+ni>glN}1xzmVKTgH5tnKey&ldkfxQxksOptmRaBDRmv55U#F=^ z)!k~Rq$5yChkwmw|2ygIOABuZXS_@&k%}Q51dC^Rd1s%vWvcJ}tG1ifDzxXWI_ zUSlkYWzAn0NrpE){P8QWkjzjG6+z{S*v#F9RYHTJ&h4)b)H>P`$4Fx!_abVH^IJ{w z8XL~MgiK+Y1WM%{g=t>!EQhp7LqMpH>RrxhYSnQ?UR|Ko1xLXy_)<})R=$e1k^9^DE1YWx|lm1J2AwbTg>g5nWUfi-Ne66{Cwg^6W^cs=ETZPQUczil$g=eDJye0Ezr%3nTsJIZGs z>_Yhz8?NUr894dib@<1L2L+VF4-$*x4-$)G4-$(b4-$*R4-$(*4-$)qwi1iITZzS< ztpSv~w$`BxZM_NQ&aDoVJGNG!+`d(Za_d&&fB#nE&$bf(EnA8I=B@cCH#KaXgg+a% zPC$9jR%)&d5A>p3|3C}Mbq~~|T>HSyDAzntiE`xwMwH7R(4$=X!1XBaen5$G$pcrS z9C%<3$~zvIf%3Koa!~d^0H3_rKK5t>H)Ejreq!XmpBOdXPmCJwCr0)66C=<4#HjXu zVpMZKF}n4BVs!KU#K?U=F>>CYfU=6+fwGcyqqMVTlvY-c(!#)Bmb*3y|7~IK+I+cko~+F0%ZT#3<0tqH$#Bz@0%e& z_QPffkp1sw2#|fZ83JVAZiWEaH=7|q_Vp$Rko{#71jxSH1Oc)yH`Sp0ViWkwKHmiX zvOjMk{-10j{vU7B#LSD4{b>^kIJ1cae7K1Oe6WcGyuXPAyt|16yv-7txT`OE`9AvH zukO>JeDOZ|*$em4&z`?;7Ru+Cy@|VcLEO;BTKwyYjnwgvZ*-!3Y@-F`qZ><6p5C|! z<*AJ-lqXrJiJNi7k&UtV$Dw6UWS=*2cG)U+ zy^pgGbZwxwIycZ;9UJJa_6_t_%Z4(PfenQyn>Jj7vT*~4vVOySlyw^}Mp?UI8p_2R zCZW7_Lkh}UHpHU5X?+l-dwmB=*Lvb#y`K0x*AxG$^~B$?p7`4b){_A1dJK-qc{P`aK3l&m8G#p_6bejN$Wts?=2>qx*2>qx-DbtK@Lb;Q45 z9r0JMBmSy vrP{1xj4NWj(WNWhirNWkUmARy*}<HOi@L=c1glb_UA4wKUUhYoYCAlh?{nX0IX6 zlh$-#?8>s%5bMk}#5#SA8)fPm`ht`-Whf`CDMXpH<{FfVYv>CS*33s4yXIn)F>9uw zx<9YM2gLkyO$y3?tcgYW<7xAFU<K8ekBQbZY2r$X;K&LRaCij?IJANU99TgD_N^cRdsmQvJu67S z?iD0p*9sC4T0sJaR*--lDRnI-sRV#yk|L&a>H_H@R)VWFG0C>ITo{+HOsS6u3kP7<;vx8D3>q0 z4dt?BohX+s^P^m{%!6`Z8T5F}oy+VfZ(ml9^0s9~D1*z0fA2El-@T0ZcP%6Soy)E! z0UgUoK-)4B(7KESv@9h7%}Yr@U?~Y`T1o=E;cyF%y%SR=$)1YG2gf8du+%p023D52 zd0}iyD%;S;?Pq6y+y1NA^t)Kg4UbP}(>u7f_~glHiELd5_f~9LAzPfa`BJv7lWQ8d zE=`ptPn(~1Y1+)RDQT0^QsXg2Vq#Jz#U#?-_`S!mvc>N{u0*-(I2QT%&~el|e&{%= z9l!H9svW=mII120;Bizt{{CaAcKqNmR6BmlF;qK#^D$IAe&ewlQQmXRj&j4Xa+K?j z6`{G}*B!eS|5$U3N4e_Q6)0C6BLT~gk$`2#NWk64NWhX~Bw*ku3Apnp3Ap_z2?!n~ z0sTiwK<`l!&~=mqbRLC(_>QB*zx^ojZ#zo-TaFU{z)|8q;5$kJyhlku<53dOaD)WZ zA0YvrBP5{q2no3L2no352no3P2no392no3H2nlc861jk{lZ}A0((OvQCLwBN79m3`!UO0r!MLd59n~Qkv5OG!5V5}e5V5}O&?PA69m+>}>7i_tmmHdi^5R2rC}$tM4dtwZohWA>^rM_{(1UXN zK@u?SAPJaykObr%Bmp@GiT~t-#6SBW@y|L){L>E-|I~xoP=4_#2T8z$gCrpNArg@E z5D7?phy=twL;_+Sf`GW6AA*3me?9~OaX&o-0dYS*1Oaj1KLi1B-#r8Yao;`!0dZ#^ zf`GVh9?C}f^+Vtv_m_vjKklmo;2-zp0q~Fe?0_H2FYeC=ARz9O10>+%10>+110>+g z0TS@x0TS@R0TS^30TS@e0TS@`0TS@m0TS@$0TS@W0TS^0{UqS^{UqSE{eG0M?kE1Q z>?i)e+E4sn+E4sn*bn{#anJ210nh9w0Z;EI0Z;8G0Z;BH0l(N!0v_8>0v_E@0#5IP z(u_N`uLI@DeN8AI*|!+w!~3vBi5uQ$LV0{2cBOI0_F?MA9o>gbY24v`n7VO?_7UfU z`=Bl39@>X-6F0DbUo!se+l!8f+q)P0^SC{GTT$-X+lVr>_g0iU_kwl&zT?IC?;U&1 zD7Wt|LHXd`MJTuK#gZHMz+No5arf_?hjPo_i%@Rbn}_ngy%{Js?#13W?%q8lW&IwK zvUU$iSv|0a#H`vwVpi^fn7HM8NWii^Bw*UH~1l+od1l+QV1l+uf1l+WX1l+ib1h{sQfa+bu-?@wU zSM4JHmAi<)eHZb!?#d%}mR%&kyo&@FL-eE~L;}h}B%mZj0`#F{JEjl7>s|#5DAbEk$|g* zNWfJ?Bw+p!3Ak*C1k4>$r=^N3LPGs%jN62|(-^i1p3@k%2{orNY!hxdjlq?0^Jxs* zgqu!d*e2X~8pAfheHz0y!40`O*dE6A zJfR|tZ%QZ+%TbnvFGE=x#y2IDgmY2q!)YjW;RKY0r?AQ=XipLA8%`1HMW?_zVc{v_ zeBCKK%4<%QqbxX8gi?L#T9nFDJjwy#)D`%{ow@|2{8T>5D^F#kTySb4$}3LAp}hR$ zZ7450Ndo4cBmtM6BmoznBmuKel7Lw!Nx(%XNx+PgBw+eU5|DqA_)j}Y{HLBI{!>m8 z|GbmLKX>3H3CMYb1Y|!#0k|+V|CbXG5dY-~2#Eje1O&u?dIAFC|9pZ3d~$*We0+ig{OJSiG%@b1GT;GKs_z}pWK|F<3{{%<}^{QvMU@&En9#Q%2>^B9fs|Logok;Q zr-q6DBg4f1#4zz69wz?Bh9|~c854hWm;@X-P67@eCjkeKV=Ef}(D53S2aZ>x+<)Ah zRvM#XxI+<=6O3UfR#^evsHkKE@z)&2mMLz|5Y4_zhiLX)GK7&DckvL-zS%=G`z{)y z**9Y+zBg|APMUrBJ6lms-AR*g%FbI+=Ix}(H+d&bzDYZ2@@4H@gfep{Woe3690h-J4ry&P7;u~g9Ie(AOZ0^NPuhy35eMN0kQwu0Rgf9+yMcx|JVTm zv47tI0kPljz$rHNe|KDo^1B_EqWs$qG*j&V?7;pq_Uw)cD8Jc(LsRTuxA$YPy}!L3 z|NZrLY%pT~(y$!@V!zyuH7NFr?P#pn&$p9+&$eT^i2d_+G*#>;+sQEU@pi01u^(+G z0cW;PNBP0_$teH09qkwU{`Pp3?`^|ej(vL@&VI3PZ401$a~pOrv2U<<1_1o`TdqD! zYR!#Wde{DT97}IlRx}^i6E(l%Zp;G$9>4|-K)(e3FJ(0W3?nk$u-AXb&B+;;7~Z(5 z5tnj1_V7uwH~4Yk=z&{tHZWy@u1&eGfR*d;;Ign0u__++-0yKSH$IWoa#xM)Ed z1)yvK<}i|B0^q(r4{kwl!%N2CxoV9{r8)nyVcfS7iP-cX@0IDY0ibhNz`<-)@`;Fp znQ{bl4&FDEA5pw0&^vfrFW25=wv_i+I_wP*n|(IR$>S$wN@--Yzmx%HEkE3o$HR@s zIz)*LMZdr@bwi+sYtz>CmI)PI{)Wg^TQ*Di6!%XO8k_xj-8s+C$zk88xVnS?6D2hi zFA~ZGUq>I`*W6{$R10Q7A&@~oo89s?mz_SA#*RO+Y#yxdNOk zDiqm#@ENWZBqS#L`f@l3j>h{e`kX_|XGNj4P0ks+)tXL6kJ)8w5E-2K0`-v4*je}Q zBY=y@F#IJNC+f#I8ufcJ@#BOnpwLC(GiSi(jNmiH9&L7&7aQzdyV0o{u;v6K1AZ8Ntxq;N`02Tyu4mLFKGhifndd@slznG?ry}bq>qOw@eTJ zD~rawafqNZ#cQV?z0ToL6jb-wtGn!WzMYHknJvFc&I$7KCUTMFMK&Dxbp)erO8Ci{ zRJov`C(=FB@r@D^veW(&n0kL#PYZuLoyTpKWyprg ziLOkY=I)?d(ORK)aJ6nrk*Z1T*-xi{kA%iTyJc4(fLE0pE}KdpX&NF(PO&4*;ym_=qoz-TIm3Nj}v=&zc z_Kld%&5%5X4*6UJL|{YRs`&7WyUC^7G<4IsNoDugOF4_Pv8+?uWcNBEbz`?4#pG`u zOJYk-s4iv4b}R6aN67}8}hwq)Lfxgs{g*1gm?<{?7a z6ep+G*eQ4OMs1*q_qEy7B~eDF527{_8XNxVHS!Rj8qPf=YHPyR6i0xvv9+^6XtFo9 zYE)&K&I)y;ac0SRzCd$+$4TCUTkbzF8n(eh_-qJO%f;a=CRuh{OloJ!&h(PxUnhQ- zFe|PiJiBvIJ%);Lh=4XlZQu{q$y*e~TC1&~v{+x;QbVhHHv2;PYtQOX->>-T;gFJ4fOUvqHN`e)DRcB& zIAxE&yQs98Q!Ao1YUD8sBs4hlAr^haeLOGxGEaKIIz;H2BD1PCU%5i)b}Q6fYP+qd z)hpI2L(NZ4A4_7-JT?t=3LuoJUCooq()JKc6eot0PFx{C#aqtEAv&f?S8p#BmX3mv~sgr#7!9yH{Ir(H{W)iSgg z^%wPFU7Oz3!1wp|Y0F)0+J1jzTxGMh*P&IVH1-;zc-V0dB4ob2j>kSgIaCWqS}~}! zx2L;_3p8@Ac5h=xtI|g!E1Mls@RKtnB=%Za^%d+xg(8!E&^hZGb{(fUFCt|c&yU0_ z-5MjiHT|jxnCnxCe@RG+LqxEs)yzZZU^;@0)(#_I=2JVWYub9ejnOVxsYQE8Xl!`h z_XxwkTsb5Br50T|jX+&)i`2iWt=FsJ)LmYAX`i9j)5RuP`MDXAr|g;6(l2F0PZm!L zudwp*(J=mFHXdR8Lxk@l`nDpWxW}O=QJRIa2D!5kksOgR50KI9Oeqbk)k(zin|R7t zZyF+Sm(ECqGyn}O0`h_YztwhSle1Q2vcC*Wq%?N+r4Q#b1oBT|spb5Lw?zf2RW?Lm zFa8L}qT;4@yFv&ynJk@1oYLkIIo?)*hLX@Qa4ZzgIC~c+n7Hxk`2Ydr*ZeOhjLkSHhq|GHYlsx7s8R7V}ijQY&O8MznteZxgvbZi# zDsVM&!BtZ4ly|zLs>5A`dP->Qnc48D|Il7Ko&BPS|EE~b4|M!R;zAqqKQZakQiT*_ za#QT9iECs2C;kX*2G#E($h&7W$lFnF@i#Ve9lhNZorNtbH9OwN=Uk*vs|vvGynwy*4lY^2s%{V{%VCED4JZ6Rb5($W3Z3UVIMg7tPBZ_ZS2gM%Wjx+Retye z9HV6Uy`vsBy~@t2YRW{ zs@^JqGgVi17d14u=xS8~u_8}a@$kHo(Ab$j*cXOpIC(gcE*|Q{?COtrYb(8q27OC) zz*$qJEH#x0Y-KfSA$iJXKmU0}c!G;ZVsxRef$LV-TDz5MO{KHI?q$tx{6g}WWqo|R z0lxm%CWgSm z2>*7m50ULh>Ug+ZItYougfhny7-%E|0yul4ZR z?1Yb>oHOnVY}X@RCx~2^pKw!n<-|n1LfdELg}v zgyg7{f7#?KX2T7r*v=MIY}^-sm}CDxZ6EaIgKd1`q)u3>(=Sf-Cw`xDPx2dadRb?9 z_J{Z0EXyAvh#m1{<1le`9lWz&eG7gv8ElyDfV3{dgN~EUZI> zv?FeejCPeF$Tb_h*o7MmWkwARh`E{4$LyK2tqa4K^z+y@yN3Ekz0MuQmO^*1#;vNg zbTpM{Sk3LI#K%3@RgI;v_FcfSiKxEPUd%(d7Xl6^>NBczb?|bow#QeXvFW@WRrPFm z1ytySZm3WRjn%yIUPS#)3wyhvz2E{#h(DqWWKgK6ZsIz+`?WP@r>?9Q>$wku+t`Vn znv}+@IaBBC|IKV6x;Y4U@w2cx+>S3318l2wwQiT)thX1nHC4$qkviqFtwBr_35h*Z ztysvuIrx2i_@^LmkWJ@@g3zdoB1>h3w;A|F?&?;xt>3LK5!h|*{M_`hPcbk&(NL)I zc3V5KR{pbtpMf?5;8WBkv$Do0M{c-Im$lzkUF^^_vd|iQYv1jtpM=J&^AH0bamjr1 zb{@c)kyAkoTy`v?CXC$&O}HhVY0um@naS^}n453g0F<$)3;EcNjCS$w?jFC3q0bbE zeK@p?H_wDhMSY`yACi6)`#6`~br+v8ZXZXLs^f0n#C}}H!z>B_2n6Cl`6x`7dq7Y| z_GEuAz{;Q;mCN~zoN?b^XAUBo{NCkr^V#0z7t{tnFXsoR8#mmBkDiBa%PEp{aisUL z%^W)>!m_I@PzhUC@j&qKA!H?z&llPEkc|d8uaJPKQBFe{Ug)b)zj0q-A3k>DJs0qd z&#IcZfr;vH4b&mbt;E?y`F4O!1Y9EIlL?4g=foOlopE1a?brMOb(m8zk6pf&zYsRl zlC@BWl5sOKrpne`U`&k|hd1E+BMHJB09Jv?9Ql5cJ_tZ7NJtqOmUHAPrGh(Wa2Wq( zws_7h|DArUk4e|1tW9lSM|94c;xC6ow0;?b+7*X~E^4|^?dsZ({R)9$M-z%H5Ub8;){BcTmGYF!kb{2+ai zH5516GR^|OuUo-Y^xBK%E!ACSjyU8ZAp`WJl*VQ^Wkcao!kboxPs*z|OoA7{Tt^xrfipqrgJ5&Va0DeoX&HB!u)J`EY=}u!o9mpR3+YUOG6c{x%HGM29^j{3qB=hd%J{E>qxQT?C9(Af_z6>x zfsJyD^&_EQ013b-O}HQV(f!1B4%FK?RF<^~AV`tRICk4XJ}Zv`|8yP!$yu8y$1jpq zB0pfAPaG1b4)WPK}9^wgs4x6Yb0^Qi*H9G!E z5A)gM4ZY}Yc*apEJY=2*L>}URN{}@VcU_c_-Hk-&qa%1y?)a}D-BRs;r{>m?-EL3v z>q)T*SEd`{+_H6)tfLF|&$1A3Y?e1h0{`kfW%AmV{vu6PtJTRBVL_nH(><^7ndxIm zNUnlxQS!I9#t&XwG9~=iSNMgbp$N-H)KHz}dWTQw?kVqRYj$}1e8`z}8Z$`pn4PJ( z9Z}HvmV7{gVmq0C4$8=4cGUX00*8((b2k_anuw}|mFfv-1PP6uX$P9+)882P>hd)AlGesVHf{3K?Vgaos~n-Ob0@`^o4Hpr#MPzu^a+#EM_ zX(|M-wx!~T3^*_wkxZG zoU67^=Ybi9m@GQUXQhpyuqB=?=ixksac5=&#zQC>4J(?LOFEE?ixZFwvbeon(OVo@ zin3YL3ABrZ#;gxt102!A`w|9Uz6u$6PM}iL`B2*EhO)-TcX&A^c3+0|b zPcyHtF9zf+vB+WmXK}6`OB#G=!R2CZqnDq>nvvOH=&JX3*-Ch$zPGNe7z-BtaN+Y< z@+2g7CUyN~Z1IbWfcfw|Ey0%1WPF3Tly|#&)DA_3t+u&FrO{b%2^!(^_^+`gkkVjN z#sIrluLbD#r5`OAczCe3KjGpceUsri^bb-I|Ybe;UB;Y}ujo96%h9CbL--;`-&`i`*WTRJOI&mr8Ksr^SQZ$x2f{OU%dxCGu;@Z5q-a-lbVWvEHoN`}e3OL6X1}`~NG2g{ zP%zBbM^_e_ zG79Bvs|nO;IvOgR^<1aCxkvn<%r{XZ2_=$aYu0G4wbnOjWEF%6u}R#H=?j&?Vnwj3 zqE6G=RPWLua~`$vq1Vv!V`=QJI{_v$a(k1_o@!fu4V!6G9v7{;(_SC3>dIOPA?DVU z4atuq+2xctovbxH`<0836oWPwb;;xm@U&XnDU ztLK&2r{5zJ=&B`j4r$0y=i&W)v8}ERc}*IHGGHK|!Sqc36mwfj6G4#4{vHl|N}Adf zBA6kuUs`&!1x=N{phMnSP-*F?6ZxF{0#i#uVp*D0Tp1HS_vA0pkQii_jt(+aP-!o0 z>9MtyS2p=oCb2pf@d$4nbB8uRRECTsGJ^cL{nm%Qr+2A1VT>5KTih?yY!LqU`sDH+Uasvf>Tj*l2f706 z>sVoK`q;dp};t%8=05Ms4{G z;p-CwSoy0%fIfJ#He1kH)?eOP=d{vw5OH`SQOHUkOQPE#x^GAi=O+m+_}jRG zCA>oEsH&`P()erOZ?!yGn42km%+3z}Yz!w)5O6_I+QlPHld95HWbJP>bjb@?AO$~> zK1LPxn!?|t2!P724G|)dXyEVZsViw$Xj^*v%^JY9_A8hzRRGfF*vIVbW%1_l6Q)I% z;+`NwfVnJ9xIC-hZz)i48h33~U2CwmPhZc}=@2b_j5z6Qjp4`AQCpVw%>pemWkQ>b z?Z?sXRv`t-f9US039M?8aN~tK>&;2ycNW3b&RZg5M<)w6<{{ZPkav;Nn9>`=ClQI{ zUC232!w%3OIYL&>xNpGV)p9*X4NgJ_a)b-mdj@lb!Rh9E03I4W2-SQ0xH3**EH%`2 zl=qc2v1caXX!=~PFgZg)Vxg}X{1v~Ny8)K3DMB@1bsLeTSPygv%G4e}e&ad-%6d4e zXx=4Cwfa1i)^Xoui}kDi3lrEhAvF(axPhz#a2aG_b~%xW*=guE=}fGBHfnofnvjj7 z<~VOK>&vo*?09NXCc8ZULT$p9MtRIKg9 z6%)gCb4YXD7y`!9iloSqv&Yw>w{aeOjmB8us4fR+)ia!s%bvPS$jp$?BA``tUz#7D zaXA#x3}uMGr9@|hK5Khl31>CAN_46|t2|gB4(_8`)JH;NXa1y%c%9{rcbJ)4B+S6> zLp8elP-=|G;;3$KZLt*g^L=)pAxsnUSn(x7My8Yo;Fdfw+wDD<2+^zL;Y$Tv2ZWTP zIrl*QrF zOtw#XL1po?GNLT9N0o(S6hsEdTtxiKgZs`Fqp^1?YBNGC9km6)1cL2m#UE|LBm zoP$MdmPW|P8TT!g#b5K^UZh?lr03T8V2|^fb$(c@jFd-!6t)tWZNj|C<%i*Q5a;0nm9=)qOnukm#Y zF0Hva;4rtUu>S$G9CnLIn3N$Qv1gXd!a<#ojh`?HI7}=xg|5dIH+stB8@fCtL2Z?$ zqu$;I|5KXwt18gW%@T@Yf8nC=7Zr4_F^8^0O+*IeRzL6L8tYXZRo-r$yA(HuRFh9i zp|mA5rv226nvm0WkwJhjTeHxo>gO7&ySwX4fmVy8ullYIL1PvdZjD};oIaMsYMzn7$?^@HUmnzh3pz+M%Ei)O zt?uCZ>kP>A)?e=|hWinHiML3|%9PR=a(e-F`ct@BzEp%J!LgxW^w`kO7n_T_I$Wk+ z3vl(sj?SCT3+H=3k9|k%@R74>Zn&)kJjGLl>`pS*ZclzG@%w~J(@Wy4vO8%FZoq&r zhe}4fL2mHY@(OKbOIelM-qq)+6<3m??{F-X(BK9K_;T_P4Sh$)Yjdc0lntkCZ0Hes z{Hk83w!WdO9)=qzIQFy~JtCp88#X0h9&sk0d860@ggqpVb*H7NxuLSF1_bOdDX6|*;urh`ScStmndRql&wW7t=>j|36ifw8IvBqHio4rMn z*I3qs6H)W+*Eb2|tQi8_P;}1tJ??fvur`z!%-sz&TD3C5auz37$c6Ja-;(!ms&|}c zhZSQNc2!b^Z6P33MQwM!9#}~fbx?)P9p$C2Vi<>Mdi(8|-Vz#HlH3fN)M!}6D|T@x z-T-FNqjZ%T5e&h?DtD9JC!nI0HZRQkQ^KUdoUj{UB}* zdaa%^Q&pqc+gEIG*9wt-$eE?aYQ>$meJ+x`M%mTohM&6AJ{#vAGV0E<3nNaMFzU`v ztxCBo`B3892?=rhh*1|4z&zUh3Pm0Afg0+SrFN^nREyMKKfu)Su@^hsu_QM8Z&{et zqbcY0P1LNW5QWf)Cil7y!3cydW0S>V=oA_}z&|Bk51xhDL`s9()Nif}|8SN}3YHK> z&WNq)sI}|r6nwd%th!QfszRcGA8;?3^F5}9goN=Ef1V+$^Lt`t3RU3CL~SRyYF(8E zWkA`9RIYsij%qVEee6?aUGe~o|IeE9!@9pm9AiS~0%jV@H67K8!tw?_XehCmS^+su z-*fBFsEmZhWS=`DAX@NG{~5*>IN^uNM#o!8kF!+Adrg)Cjl$*E!RQ=e)ch?PMoNRR z5qT6oltJ;n`Yla)O9&~QqOH@`rfVtZoazDtE?1gs8aPpNtpACO&Jr3sbN}`81_juq zzWRy2%oZvgt&qi8*Vix9Hy3&MPI*y(ZS)jy`bT`3gvQ#Je-7t?Er6??_78knRMX-9 zeF2uymC27Jp20F&FmnHnu|+{MVrTaHdi%?J8=EYy2A#&@jr0JVPP;KPBqX@&&KSiu zP7H7ACWT-LRgHeRvb3hx$@d!^l|jF~x>r?0O_7K+9O!A)Iykwhp|4G6vMc3UgeAAykqs$9`7Ql3c_NCYvada8V z^cuCm%UjExUUfwwuNEtG$_GYL8q@AMaM>xpP%XcQvHGO(EOpD6bPr)qVPQ4*N!Dz+M||G8#r8(DF}e#Gd7||x_gd{5!B^PXS*-OHHdw?jYV@FqB_t+0YQPoxsO|R!4_R$2 zp>xqP)xAQQQYdtp)CFB~Pm?P$csvG zCdg`hwP=D=mzT8kC_40oo~l-5N2^2p>bLu_JCl&aAe2QXv9Hne3y4*)hbUs_j)<36 zmqYJuQB>Jo^{t&f3X6u&q=mehO78r`Jw=kYu)MdUVkc#J;SC#wkz{j^-Y3k;zcq9V zO!A^nu2)%TY7|s9WxJPeMH*A}oiGxPeJDDoKYFJ?kwg_Ciq#PvwcFa1ElrA!4xyyE zpx#r}SIf@!V5f8-h@Fy@7FkT#H^T?x*$2M{EONqaBZuL6w+rz94&5}$*4S6B2VSj5 zTNdaC_-1QBWZQo`PQwx!doAn9IbncH=S3aue!K$*T4U%&bb;tVZ*MH|X_}P%MP|9R zyv|uqyym8leHu+a3D|7b*egWc(%1B%T80os@iawx!D&UF8@{%Yuaj%+Hm@mKt@Z7w zmV^c&x1KX8=d!Qbg&)Q1hKZfRh!eRxCVgV+)Raq;xfpliw)pbchhY|uD`eGo329mG zIw4TbYaE58_G;t~C{(bgSD(!#^XFQ)M4yXk=H(D$240H_K-4pWKSYizD+ z2FPWAexA#|xLe3TpzwIFzZzprlND_e>cHy@sVsVMN%p8QyKiX0n>qH34v00Cco4ck*~dmbLr@ zj$2|@yEOuQM~Z>>9B4K=ZSc&kgYC`hH~CzB0FM^tW{*Q;w?6MjLc2dIDbe0KA(gPZ zaR?0nuN#&+A2R&~>yY^qcM>#_FI6heH(`wbZg}|8eAq-0rJfAvXkh|e0;|Bz-v=0Q z@?S=_Ef@tkxY~dv5(thz4Gg z@aaDarEu4%3N^sEmJpe^MZT6cWv8RC$LZ-*nS?sA`p*wSmyabeh3;$MGk>vQVt5`C z;A&ePsv9-YjUCS7NY9(0;N|CI-;aGMGUkEzTs<)y_W)TrJs}E}5|fx(ifgJ0Idiww z>*(z4akthm-&TB;^f7k)ri$>FTk%!XYeF^9Yht4`^f?;q71b3+cZ<+f;HYDkZ8%y< zp294-4Y3rOi|38pTx`e9g|o@kQm^3M<$SlRt+27m!_+$=1HKp0zUffy~s2hrf)@HAzEx=^+Fg%t#jkR4uLza?XkEGkH z{-tnJmUQ?;ht^xa9A{{SWgpFhnmhg+)Er>kIg_u>@75Ip1|BL-N0zRtW>K{2d0|q{ zxUaB#PhXwK+D=}lVh5iWE)>fU_ksXNu6vM0C3=5hQ9CUGURzcx2py(keL<5b=cN}= zO(`ub`=b_ayW3xiTwY+RH(Led1%%1aAiz@%u-C3$@#nLCB}_tM!0}#TGS3_TovLGZ z{aQ%N(|LF}=mlLtzru_hAV%1_T){%0IMTzv#?8gJZ@>%X{b(@56)#_~IhMT)OWfF* zGBSw_uZ%m1ykX1t3o3A1@hTd@)LaQ89O4;#K>db;qEV;qbvcR=X#p)VPjQu8!<~P} zIsWTx<6DieKg^moi`{kkyz2k703@emJQvdz`)mwLKW?~~$v+Gv$EV5DCb1hn49sGS zj~j|(GycS8K0SXv`|WW<##JZcw#48QTtl^UEE&2&1aesWkqcD-f=JMfoTzzUi`2#-au~pJTFD!I$Z`PFGBmh<>h4i0 zhC8mM`iwy>77rUT(i-}weHNwmgIm98K&KCybhyeZv7x1H-n7?8$Yz}h=_ujP-)!wg zs>1*>#`+U~H9`flNf0RC%|>4%e9N(Az_nofh7l@ODe|}$jE*WVK21RG-rnrTr^j6{ zGX@*sE(*6yM^(Uug=YZEcP}z1_T@x>t28^1siN5hKXR?yT>=d85`!Y{4vQp@c2q3upo`)0ehD+vs$F$R?|_b#9cx^b{2qSp*GRWQ$8A@y09feANHAab-44x z?>So_ZZJv>m>hLY1Aw_vz(*9hEy}#eB;k!+8zlq49V5@_ZZbM61%TM&BEZ_0qK{HB zVr{rmMQ#jTV;}w^#f7$S!UH2z6YXy>o&km<;3^UNORvcO*9aAseqh$)nv`=50B6V5 zi%VsH-svdW3rv4Z3O69_0p@~u3Q7Y!^~ea7QY-^oCkRSELa+SB5?dgB;RqFXD?t;6 zI&O7Qr82aSzCR&mgbL7ov=*)$bWnT_YUu$}Q_eRc87v)z^p(7uG8&ge`dFUZ7p2mV z{BCUIplk4^M?r%t>3EciHqfK81`Zp>0HFVyaBCnWpNLYSx(fYRTac?m4?rLcLELrB zco5V9OmdIXt^!O(q>;DVp8BgrA~6hW9bWmB6tVlN=7rm{C=MDfTE8Qy(fr zN6LY64$$95W#)ZRsvOWieQrk;ZgP;xm14s%_oi4xDsYaP2S~6M`Dd-Yl!C>mEA;2c zM##u;LQRc)%y1KhLdF2)GJZEgMMe~W9JvEf(+U$R4)5{abB;;~b$}`;~RFhBJXGYdnutW#>krSramwiW+iX7OKwHA)zK^#&_ zDiJs7SEMRLD*Wpsl@8!zi~VS6sK!b~!mb$u5j9^GARP+lc1#JkANhLvTn=q8ExHI) zVT|kh%_TUEH~_%p#B~|kCQTk?jk7^zFBA_ldSkpJ{*bg^TKotVorg1%0ZW0gkLC=t zrZD9%QEJlwdJyZ2vCrj1Y8suErvRpu)gxpxY6;{iC=MEANFx+9ARr@3^}?+JLl!>& zm`W~;1{!_|i$|z*@G)ToP(EX1%|U#osX4Prq|&D}qVuc+Xl^}}BM`TI+TOINLahu^ z#t6VoA$JiHs$(@kpprbp7yU7QgP0>HW&?E<)(eDW_NUAlrQ(1Ct$=nUPX|mmPOnV4 zc!WydPhD)piO%F0z^hP>34e@|Aq-Gp&2B%27&JOqHy8Uet465E&y11Wh&Wh8JaDvR zRt4hrjZjS#QvgIQGo?xvtJpmKwkQ>eFbsVrbVekO)@SIWeb=;s=we+dm`mKq3smJp zRufD~E5>nQVA8wMAM=`#k+(m*8#3^1Ow76z9BJ<^YiN4=?B^v75%BO7I4hPj~e zTsR1O6w_ZBp+eo#wKmiYb{7szI^;&4m?TmuI1U-DF%_Xhumva!;1XP(+I5bK(76Fg z>|E0AQ8MyP|9dj{r0DVk2s0f96?yq!`J!X1DHv#;`1j~jCxy#@^h= zL@GA9J`7tYE_s`)yaUk0SR%E2+P5QQSU=zxW5bpP^CGCFrCFKM8l^&0V%=*tphGZ5 zg0x6k6|t8@shEZ?fpSA*KMmyr9p|(vk_VzxC@u_HhX+BrQ0R2E9;_S)CcimCHgZtH z90p(s>c|!QU07(QT@rn$s8O+@^O-PdUBSfYF2M@tJ5(u%d^kRj0 =lQM7W zhtc2iSSQizRxCSZxN--08?M}Qrx0}jJuWw6tAv?~)f(1-5^N-b)?n7L=#Qb-wAjHk zLSF;Wj&?ApRz`HpqZ-ISg(VClh&FYwA8{@rZ;kj{G`zz|iyO8z_%JL|E~m+x^huP8 zIZ`};_0Ee42fYUMiFvHdSaObxYWY0)a&kMX#Gb9#H{sF|DpWJ)b|BCN+g}oaspy{` z9k$3=4ir9YP2^brF-H7o0YhJQbM&|9)<#T6{HA#Tn?xtJlSo50IXc-Qy$*Fm3vMCY zr1T0m+@>Z)M*xNsGKyhgkz?Q94E2J|YFSh4l_G1RBA6-Y$3_$IMo>ifJ)fODLNx}l zr$WdmHZj2GKse?A@)u29KT0k!VdnyC6Si8gKp`_)l|Log5k{Pca8STb39A9LITTRP z5X=cje~Ztcx$l8$a?z?tyIVeGc9aUWX2539>T;Oeu|>3B=AF zoQUwmi{7T&5ogE`gODu3r_0}D2o{^lYOU3cR!t!QXTCsn_}6hF9!p|Ne#Eugz261$ z!&_b#kju;+0&Y#z@mFFY8L^(Ezi|QUi3kqT_6C`g)S*^1j+hgznN!(XxlWzjX6V(} zJN!!es+^0|g1{G?^93xDyv8ogC3%eSDMYUSYnoyz%diR2EQ(L>Q^vE;ekV*v#Q^RSt(epb6SdI5#1elIr;wk2 z%PoDCZ47L=KKz^aV0Ik*P-w^;+j%4Xy86TM`!(v1yZBGAN&%Jv$1H&AKxx3j+>28W zPPL5+)^1hiu`m84r00zLO8DNsg@p9EMo6B0#Rvc?HUQ8(m59a!HXKqtQs^_zU{Pl8 zeGJE|@n2zQ_nFDa3*$4{!RL?I!BI0DSZL+Ix}>9Z#Y$!fB|H3?Fy#`ZQgd#YjQ?tQ z*g+;}swP|e8BEYPWMShNfK41H699>l`nD_ z$v!psTOn~$Bi(a5Qtna}}LSu^kH$}a0I=%;& zXyxNFUT1&9N$wEJ(Wdq-WiG&o%bk3eWQJNqA&9|7MS$btjpo~{| z`W?o~N{h=5uM+x}h2OyzE2Y7~;Fog-A5>2b@BEHDN-UucR6)EU?{RB7H3~!{DP3I! zwQhH<$miyt!AD9%kljmgmC{Uu2L^7oDR``Xv~k_N9l;9V)A+5`CQnOwfnQ{_>L+}R zga#*_(~)@4{O}h);nqK&u!h9y6j`hIGQLA7>+MupPTtqObuf0_yS6;=hSQUEo{*FqJ5u zUX`s{t#DY>ijE3E1{P9PfNnMRsfh6kXOo%XvI)v^SyoM(x2#VQXy(-pXJL6y72F%> z3m#9w7f5OBnV)Wi^A|7A3s0G-jD%1T2#e^OWUA}v;sq^iNL77RE}>H7vp5}m{*5&J z)dbAZXZXDEQ|b5&a^3@qNpx29amvb|qFiAsw^i1<>y^>IS)Zze!}?enTk>_uzj>p5 zovK8rvNhBPj^dW7sjym6p(rz%bQN{AwJLRkShpJz(83ZL+xV^Od~dX&1n7`~l$4KR z*2pSjQeH`UBxPI5vXnrIBjvi3OH)!Od^h3!3C~YBGGWVvJ0>(tFilWRm^mRa`Rn9A zBtMzFFZrJ2-sD@8;TDuUEjc#ni=@|+9#7hxv^J?L>82zdGT`MT{xk8D#NQ;IO5BmS zGO;bum8eaepO~HSkA#mBUQRfX@LlAfOA;o=e;fa9{Il_g;y1_N9$%k& zHr^Poik}&u825GDAL5>j+ZVSXt|#u6xZ=30;&Nkuj{S4&tFfnIcf_uWZHslq7RJtx z&6fQ`_L1ym*$LS;*)mx`R+;fx#&6S-Gfrm=Wvt3*%cxF$JL86o%Q7<4e@H)*c2WAT z(jQLWntpe2>Mzs%>Gt$%(=Sa=P5WEgduh+59ZuVvc1K!cnmJ9~(cthYyfrPHN9n9- zX%nvab8g(#u|>5V^}33l-j0^;{x+k!-)msULJheCV>6UD_%kohi&N0sO?5iHsm9~b z7PM-t?)o__`uxA--W7e_?WpC;{9WdLxv$z+rm*}FeeNpn5R{Gj0avrX(8_fSngdaS zt*>68H@hlYTZL|}!kh5+$n&wjFPU#gzsgt^C^IW7>Z^kVfnWjG5`Ep!&>|r3VuPc; zv(XW()!iF?y*S|I$JCZmX&!*tR33^hM+Q|T70|RYj5Ry0**$6Jv6nL{Fcs<=j9EG z+ICN|N2qfK%<9s=N1xj|1{6YlyS~BIAMCJq)h&EVB(!xYbV6^r+UoVScKDpisqW}= zkJiuEn;a_6-%w-osO-by^H!L^6hdEdd;0xeT}|<%k>~mv!CTn?Y;K?2>Z_lA zQ}nsBT_yB&1$(RAjp`E4mvSijT%j#e^aeF;#l^*SHRasQW#aReW{qBcTb@GaGe?#r0n&|U(okdaG?C>a> zO+6(IfvcX3K6ke8oU*guV5uyu@s%_tydd^30=4Q}Ej;?x08A2&kB;)@fpSv;rw)`> z_c@z*zglzIp6L6$!lcrdDtoGnHEk81wE0o?itaW+-&j-L1^lVf=9&d*xp4|vQEjuL zRIAWfZGm!cPm9B#s1;ui^tKmq|DUq=fRnSV_Qx~XlFeqbCCO$}HjofffB^IMnIIw4 zd+!4x(|hkDvc!O*B9V*cK~W^LRzxllVbtsOf{F!Dfvbp}=(S^sUd4X@=b7itl6|xJ z=|7)OKKbOFXU_YS^R)Av^F66xxhhX|Oa7Q*a-&GEmh^PoD5OIR4xcV9#Jytw=SvNS zY3bvw8WX5^%8^UoEB>IA5?FuKlCfCq-Ex%QI3m*hiY(2=RW6^mo=DcBhTn;FXO5!W zysZ|lB@BX=*+dh1u9ZqsbWP}1RYt$h&gd4zhUHpjJME=3LO@$xVAr+IQxBXP4>*N(S@604~Ax+FuX69ugUFoYbk#y8! zlt;oQb?Tbe6Z%3ntMStS(%GnmTYSPAofJQiO{?l`Hy)y?j9V!*xT%kmA7m3jhHe#j zWh@xff!o>s|0DyJg@EChU{%`OrgSYc1#{z zND2*qgi6fMlk%B#*KcY@(|X?0sB$#FQ6#5gWxA5+hJ|v}M4PYvs7Q{&DyAr;crE8N zwD?`0B+@fhwSl&Uvj&fusg#{c>xabRDzNEjYPLkjtE5!i!SBxvE#S2_!&UT*KOT&w z+Km>Qr#AhX$Vr!+Ii}t2`YHi%GpIEi#M&A5~KatU-CT zYKDyV?Do75!IDW*|N zXRk33@hLNtrxlJu#Yb5dQmvYD_ZlKUWiqpDk*DYiSiqgx9ji$BB+L*dXfemlLNEeB zvFkoc=!vS&&19)ku+|O$?zF%iAz~7GZ``UZC|e$(RpS!}t`x~?wf+8eXv#OR4nzb ziP{k(;^Q8j%SxB>X=k8Nu*DC5M=Y*u1f1NS13v`@K8{{=N zV@Zk(TBoEv-9|Q6b~sI4#l@oH$K@d(lXuhUu-sg%hckP9q-LWw&;1}34RBH9# zNW)^5y0%$?Yn~;cu~u?diz{=?lr&Jma8cXla~Z##9)Fc6-xLoqLa5=%+FW6inYmz_ zNat-79W>O89c`i&*2URVm=66Pt%ekgx$aOoN=&?-%nJ{YA4Cgum!(Q@#*8MIjFMH4 zk@`fvMMJpR_F3Crxm!i;eUDh&SvJ%0PNvgVTX-)xV1G)aTZAB`aSBlY_o)hD1vMqo zg-DyyENDHAq}gfXExC*D5gA+=?4J!TmQ|Sx%?RZdH_b>_7hy6U&Th@h9U2w8^D0t4 z(#gV_8j0nc#dxTwh^>o>^aiJ=+YXhn?DSM2!N!bRq}Mtsrjq7b(SkLxQ)`Uwet^8rgP#`^PF zt0q%O+cnCIn__uAfa+x1Ri?vHP0lK?uOanp!_BK>g{S9+DXmwg{G$4{X=))tInxD0 zxa2Q&EBqznL{6)jb?siFN#?zf*;v94^vTVm_R1!EzVwusZa={0$oj-i^V z@#&;dm0BzAR82*<>QlAhAz6{CWtm}~h;MY&az>#t1;a6W#Z{w>-xcZUGEbE~EvqkH zqM?KK-YC+OsTid(>D)#kS7s|qnf8mQ6?^^W9*TF&l7Wx5<%5w%1^aZsbV9| z*V5tCoNFmFKz01yu_q^WkQrdlkn>Dt09Wr797TgaR>;yh*o#V>)?jKvfEV^2JiLbk z@T%oJfCgJTh*g;H_x5mrriD=y$vrp61vF8*>nc!bO~^xavP4RHBS?|((8R|;+pti_I4u$}4@^*XKS_ImX! zNRjX$0FGM-3U77;l#lC zEgLz}eO{Jd1xW#}9e)!<3H=yy>!@UTY&{*k8TF=?#(-6pA_l5N1>H5HO_i~eH>1z; z+@|SsSkyQF=TQG*0W=HLVG_(cBm_|pZWIPi$@ohxQ`ewW;8C1K_wE9tjD$4^^+&%o zQ*-^l?&2W1Lk5;LxTboAu+?sFn)rcQ&Z5$8Y<^kJL$XJ%f=8l9#z!!M|K|SJcH=>? z^f3G#2`0gJBrBDRM<8pL;8GP*xFVa;XD$U{5*|AJM?eZa18K9VzwNStVWm}Y6|yr0t%bMS)JiOD@8ohaI&v4pwqO|ierq3Yk5^3>@@y>{Nw?eCh!SF>2YvC& z{m>T@9>($8(}yGr*MhCCw-!E3RLRKL8yd>h3_+%%sE37!Zv2S%rUTsU?=-)m z|DRWICfSCIAVJ=wL3Yu^4dXYC9UpyY_*twx<6w^q^fo|U7X~kUu7WzlQbME>x7S?B zkT*GaDnZ*AZgNV(LoOHC<8F9(c3Z!}aNze2&N70UcADzxmYr#(H4tTrtN0rhri_#a zp`~EY1%Re)eHVwDdTkGo@kH-?O}t|cGHRnLXf3qBR)kL64{|;oL_yc>fLeQz@~g}93cbAfz}Hh0_ZM8lu+gcImi1-ExvN+xJEV@eKC^dnW3;G!v= z&Y3ailR85hOd=qL_Fnn63FBL~ryY7wdRu|L9F=9g)1{`fTO z+zzNDB2cwHqw`w;98u+RY0Hs1UuwUNN0ElQ7R#9^vR#6ELdl67)Kv^NJ-JBLY>%qwpTwA~+2z*|_X9&Bj zU^sU$O`pR$mA>?v{=-K(jE~>j4kAVd zBGN`p!AiLs{#KQuQ?-DAe(eRtmXOIi9IP(${kV^V%p?-Uhxzcd|2*@7_$;Uc@ai%z z^f2rqISoWwF{OddID;0w%Vjt5=*SUR+SDFy6F^@tW0AO9$zkB6m)p5R(R&3Hu#=;U z8CLIWRMZYO>TxCT!~5PT2^lhD{rvyo^YD8&2aq^DfO8ZfaXJoLT}7E9U>%OMQUNXQ z;*H0B;DzwsFgG$(C7^Z4BL+Zs)ZP(bB;C)6y=*$Zu%TW>7R7YLAb*Mbq-MW zy~nsE84{Hsnz9)!lws~jcms72S2J&wbD+Q0IS7O6hI7~(8@qsl8~nhN)?vVSU{yF$ zu?=o|?mR`%>7Q6F=mU-OPVWC}z~t6wJ8cIO@_Si-uwY77c`O+6k2Ilz5*|8v|I26M z5$|bpkbeXamcf?`@{ig$aKHl3e(WFWYY`DUJKWUVd5WMDZ-4pfe{p^5LNC}M7KDUk zxWVB!4W1p4Y8G4{(1|X$XVXetRGR+_Bd%|+J#QBrc`etQmZ;-d+G@TLdO^Y-XsZaf zw&Nx)2oPv0aK-b13m+sL07pa{c2O?)mvnv)C+GOHFpgF(52H2v&vA2>mbwNkbrad~ zyT?91`kRq$LuOf{zf1m(>t*w<-ac3?$Q94dRFz&j&y^aXWX!}B@i}M{y6#>$Po2Y} zdaD86<>!zI>9Kq9$@i$Ww|D70-;PpcZLFZJJ98aNkzvv4H^3qxp#p{keRV(nMtlf& z_4X{)qV1=(1~wQ>WJ`H?<_H3MPZw18=G$RLN_a>XzjE-{zqSAU+c^mFcl9n_lH>1$ zV_w=`bh@%79UJ8VWCrByq#*A9>`g=?DTh?*(jGM35$5~9iq6Da$k`erZ<4ch(i16CnNGv1%XKr6EC4xm zVGe!kHg0-yISZZ8{C+R`zj1oLfACGv>#zqi>Sqm@#1qWZ`)+k`6^;L46#({s`PJ zmQ&Hpz8&!7{EjO(uXF|*Im$s&lHN{Oh}V%g&Xs4k|BjVs_ci^G-vQ^!4e3>rSHeZ{ zHgJphA8?DfN|x^LdfPe|zLs1G)g`xOdnz6?bu^|(ph|@)Dvyrb3B&rD2VqzxEN~VY zmBU4indv|FAha5u@OxLl7?943>KSu@4qG!WWjCLc12P;4+B+>J!*ySAsQ-6HQFG2FP++6?5cMaSSdIz8h#0`P-WmHZo zp0p}FR(+iBkR}{@2Q)##LMQn7iwDR*?|ugd_)Dr1Un?<=nugOx?VdUY670f8JcU4W zBs>foh`~qzfV+&a<~Vv7PLnhq05}DnHMuJ(p3djNB?Rx3kU9b`+vl*3tdRlA!LjE+vD}ZATkkI>>fhcE4Grh`^l(*XM_KLwzJXL`6K!2|P40OJ6IS-s+ZUd#qSu{WM8K^84 zgpmb_AQRXlgEZsUHEq^NjrIU~E*5n4`$3R|hj#rGK#rCG_wRi_?nYM+wrf$ACsp=` zn20~1tOH;USgo30Uqh+|92ZfbN4qfD4AGoBmh{&c_y$M#C}%gTgk@&7DdmtKiPs zOf-^WNOrUd*_|JN1*Y~vyudhnfK(_diN6pn%BfPq!SVqI>n-4Evl;!*hoEK>7Ml6a z>zB-1oBQey<5oI*aJ3Uf)v}o`fUx+DdfHOU28h(<BhX$64@GJR&W1aG&m&+SgU-XiZ)CEz zwSEW3I^CgEB?rMrVTK4RJ`C)9hCm-gkK#5Py9T`sHWbSl!+!s9SJLg(y*>1d~A~@?+dD2-3)ohnGyHO1uNU8j`&| z2EgXSLpx+je3je<=b{^W2Ix6ruxSLVN}6KIWs5!HExQ#+`D<7$Bvg!~Yy${=IL};g zG}gn2aRknQ&j*Wj+M-VTg;K~F)I;Xir=j^$GMdSRZT+u5&3RFsI;pDfTiHkmEY&)cF=O>6-Q=` zq!5hii&ytcPjF}OaNhL==ygj^gY{=Hj8P^`b81B;Q?`3@dH}u)J`TMgp`s(7`S~IA zaccx;Gf1bPW_%mF5CRu10 znrzXj(RiFOlLuV)saYOSuAYH;D&YF2Kp zpYQ7qgU`3~dAR>MFjy)?Km%4N1nj{b5W*F4>?aZN-18h@HLO?!ozj2wpI>$^dx6`y z1!77eB+L%Ej3C4dq6;CuECV6pH1fZ|?U`MX`{>ZKI5gnf+{_jTiHDe*JOuuvAS4cg zOCi1yqS_c_{5CcSuE<4|{IAa-zFeW;*P!|Da%|c z*`*N9fWMjiKeNY`s*r6`f?R9y|uJCXQQ4IehZsX)~)?KGg ziMPSyKf;x9_N>q*vWGU(W{;7{7RqeLAaqo=7^%!pe*%?}@E~a|JT&aQ2ZD)AKgB1$ za1Sv2L{pw*{+*edYkv%KBs>yZGqC67e+-5>Fr;C0LbCO6U5Cp=WdTJsP?8rSh8Rkm zf<;F{Ml#ET=WIJa`5`Pi!5#nrVE#n4zzPoO#Cj>c@%!qydlQDkdl!ONtgN(%4dZuq$%MY$CuiyyUvpS&w zZs>|yGNm;~x>+)c`QJnDOL*wnFMV>)@uwg&{nvhvHOkrZEh&StY%_W2YL)VWyQC{= z!U_(lK~KX;;vP>9Td2f*h zbbY~TWh-iUP9DgaUBkmIb2$$Uo|7Nit=!&kuHgsm#<+c?-Hn8i(^DCFrcv|OIC~>b zf^@!rHqI^o(3Z3UPRbuCYp?>a%iG2+3#p%}6uC z&rB}opvND$esDLO@4s(^2XsS6?^>u08PZy(R^-^IPh(WpO>sRX9w_dS@f)Y5JapvH z3xoV$Tl#;O;bz%-7@&{T##;^sA%Hl=aLSlQ9_xs@@gL(LNXmmiviI&g{tYDOc`|h1ixWg%0m>IyA(Np3OeUM0)oQ@I-^p1p^`&xr2G zsW2D_LjgstZKGmsIR6cfThHu=WlF-shrm}}{b%9v9abo~903xV*wyuFQC>=fGfATx zTw{wVBCEWShmh4}EOaV+`PtXLXEyS1?Q`@16iyUn$fsfrHr8r6i$-P3RuyI4F%O+B zF&ir5Lt(#o^nplG<+7jH=Knt8%HWNHwO)r@X)hwe)epb z(aszwBv_zg&_L00q*n@V#+b0W<>17m%@A4l%z&)!auz_5!JGRt-(|M<|1krN+m4ah zh!EN#bR3jA=jdjeZQjKWrpMkX2^oXM4eU7c{SVFJnQHGvmPXB`QRa$l#~etSjNX!t z8Z>GaJ+=*In3RW3kNt$)W_NA}IpBM8!_ow^7}QR|na_AKb$i8Qq;Y#@FXVZ!oScm! zzPuPjt9@nf@oNvx_CI|AZ-%?=s>yBRuNiyG=%d3w9Ga4`6a8JP_72dqKo1936JH0K zFHlapP^c$jl)s^~0W{$uehb>Who791@W6NpA%gO6T)4G=WDgHV2S*P_SBo}4GZXbO zsbrn<2Tfir7=8!(+Svs|04}O$^N9KPhFigw`0ZU}GlfWFaS#IDtXsoGnz>v(&!n}9 zLDM&)zwHJ6lJWqV>kF4+x0%`g_4}|OS1$*G$YQ4gpl^@=0h6+h| z=#&S{GWThy3;G}1jh88B4~Hxht!T!pDJLB^wbdnERH)iTh3{Po6_WDMk$>zT+@QAh zhcDy7#;fmUR59A>Z3Ij45?2b5Lu>N@)Iq`mzZsvH6zhcpJcJ115O3nc!KqDQEzLAJ zJERB+HNYW5VdwWwOUc+F11`)EQvpL9?Lnxy_?jt{K04e0J^MS2L?E zYk$1!(HL*3;)v-0~ zn)x-uqc4qqU8YbqpL=KHuB8KCni5Oa^J{pBju6c z$l>*08reTGJ^bh4Q^Q}Dy><9w!}kmy9nKAVhOb%}-n0Hi+1H2H5B*{2d#i68dSdlw zhdv5WajzRn4B3bHp$pfe^$SB|5DeyAuUNlx{n*5BC-+WHt^X6?CE`B=_sBHh^I><| zR5#vc**eqJxRphh0bq}bn|P|OH(D9JR%H*BY+_}1%%6{U5O~A z^%C)%A?Ql;VOxNA*b_-^UQLP@JyeKt+sz8zxnK#DyOfW_T%}s!xF5W-i{Uia6jV{c zOZ-Svtwtb8Gkm0$is_tMA@6+)5mbrf6-*!>t*2`CRJD~-e@&#fz(yl?RUCDV+AHW3 zzBdtir`}mH`+&N2#{^6Fty8AXn-3o+ zKds(A5R+CIkr5egh1F&u~vIM>h?R!&Dfe_BHeEFF+zg(can0a zpwDPFiF7&m=v%$o0PPZjm2~a^X>OX2SL95q>GRd<{-!S&x0Im#!fH*L_nM5fDz8&E z1-_HcL^ctv0yiKCN@x@v)dYZ)S1bzK)`3g3I z4iYMoX0j$LWo+m)(NLxpX)drEP7v`BHPI?~locuzZ^A(A5{HYC=M6M%GuoYo7#-AQ zc0Nkv)AfLxqGC2mrS8~WykcU%NDmj9bl%;_Sgc$XpkLR2L!?{13>&Oie7;mbQ{yw2 zkk&4wX>&A9s~y&Exmn0G3z024@dwIGgVvS;mAtBC_GD5@;_IEJ;eDR+dNVP#!qs)w zWBZ7UcA6?faGxes@s{LqRni>a_&-Dr6){$rVke)iBor=-Ji?MtmoycEWa8EZTHSEA z6Kp2K4E>sP1m&S12a?0-DaP0&pE+=yNYlBW5BRBT}B3>T0Yni-IiCP;v zMVzL#i|QaZWQsK4&3l4&wXvDXZoOA5&v`Sn+MD%vbf#*^w~*R+{TYUdqMPw{JZou3 z5*qf3Giz$I#WMyv>@Sw(WhIw7@ZSS1Om(aNyxdpldcE3)ikh4pNJ({bjy#)AS<6&8 z1vnrYgs~RCwA>52?KO+7>;g2&-huUqj zDm}bYm}!Z0t|rj(jK^ne)>%)6-+Hk~hcpjVra)Koc74O7;&&$o-InTv?M^OMq7wq6 zRLA2Nr%3URH}9mVYJQ=VuOw=Kt4)zOvQ);m7-0z zwGe2;Wm`#un+2!KkhHpztwJJNPVc!wEFKNFs6t7t)_1E7buczXR=tH(Go%U8-Jl$z z>57_Um$~R3QI0hku^6M?gp+N1wV4SgkyCK0Q;btzh~QLJ%FEY-qQy4l%q&KXoa7EJ$E!4rws;S7&ygC~cN8b)ta4 zjIQ>gPuXhYQWpDYtMu_oc!TCbetGa>aC@QB{3lM*=wJS#!Ncmbr34yUTmC55~ zU1}e#90bT|Qni9xlWs<8*_6c_u`oLp{!Hpqv&CUMrb{`CwOLiihxdtM;Ek9`Hx(X( zs%-YC6gwX#^lFt)GirN9r^*5jO_IIreIh-S2{Y}qHVV+sCY3TZb(2W9hnrNuV%In` zb{pG{>^~^d7u1F(t?fqLyqya`O!j4Y!l;CNb;eTD7L>J$R_BOqx!?@lq+{wuYgv=l zb{Iyjk2VCz zp2Nl{vS_Eu4z-3gW-2K?_}3N#$^&E``)Gob+gh8ds3U!NOC`H0f zwM`B)bgh^kr(Smb$*MuA{ClUfJr$t#-KBxv}KZ8#3iPXcd>LXt+VJ$ zIhT@&>=h4Tg+vt|my?t|l~NfNvYOoJJH-zq3NDI)Sb0S$!aIENp|D5~$7{4D?$9M0 z)@DQ#WG(fYJgu~}# zN+ zAsEOalvdi>I>x{k;@*s|Va{f?#z76zO4{hm#WmeVMUl^^5?B9$h*6Z{X*%x9FN8W8 zF0P|;lWRo=M6^)>y^^)$veir_egT=rX@!>wGCp6t+F)~?a6U0APJ75<#{|X}VM^Q5n6p7O*;mQb!RSBOd@aAT8Ae+g{G(uzQo;NMIYOsVZPqc`XjR zPphnD@(Rrsk!%WZS%ucd(@_OP)6(A~VpOU|f+=ci3J89;n!|AoITWPoc`x{sM9Wkw z!1*(ks3AW2LM#igCZHu<4>z1ix)S`j(XRhl8vQn*}&|&@Z4qvc)Vi`@u`FTR` znA>iq5N#@ioQBfWlFol8-=-?|4ghot?W8ti;VLQT`=^4d5J22$(9Ku>VN{#o~FH_(NAFFFIyj0`dY>YXAWT;K%{6G8@8p z;01VCIdT#nV(*dj8#cq++X_YccfP0`>@sYY z-Z*#CWH;P&R!D?oWwfU0igVdP%=8ToVprw z=ZP4D3M|sgS!ma{ez3QHOvPW1&2kuzOf=RSoQ5ph=n8RXEz=FdbMs(if1`zp(93z~ zi1SwQ3D%+Goft~YZVu9Qg*zR~g3$zWRt|pqIX!%RIS)mAKii9(0o@Mt?_X4xk^GvA zr;yFd_K?xYV~33zREQYt!ECIlFq|jpw?qZCDhWv#u&V9QK!qecbm}BHLCU{;&9?qc z8vL3O?O}W}V(rVD{FM?V7$Ky|Ue<6m4&7=5Yn_w~PQDNiHD=-=Vk@BRD18*gc|8yT zp7tgqC})PBNXa;*h^_x?GZ^^hBfT<=1^J>-Fpiopf7W))cs^)=>nwFx)GzE<#r? zXQ4Yk*AkP$JyryJIDUtG1$HbQC<_g?9;-ppJC;qm#okr=pm!xa^z1h5T@2|J2Tv~d z_(1o-GK}HJi0*ZTW|ETV9}NGmb`wa`*YXgXB9{975p)Iq*`pY z3^k`vv@}&=h_uCRTOWY;pJgoc;Gqf z@{M5;Z@LbeCE=mUX~Wsit1n##2Id(^fKn(i?s6^yhflXL2w-Md!1dRI00|G>`48FV zyIy=?8oS?agRHWHPPX?jY8X-BXd2*3&PFRC!crc143qK(Sabtuyf1mM3LASE&nz`~ z`ghRA8l2hV$*?0`sBw^Qd{C*oT`=g&dFaHfmd7Q8xwi0L@UFFXu((%hxUhQ5G3WHQ?c72ct{2ij{3~tMPw0&lam^0I%ZXbN--*Z ziMBbNWk`F6hxpBT7-9(zop=bc=`wJ+irY%;obMU@NF#i%jviF>t-6P*ad z2KI?8h>@_+>Ddp%%8mVRx99MCh<$POl9-Iin2oRwE^IW0Xl1-DF1%MKK#qimjx7E+ zGz%kB-j{#}qnVtt?P^n2j!8$Hie{7nSUTL4sTBNH!b5jzUW7W}WWnVW?h?o1D{<+( zS4-FFNWoTYm`i#^R$Nt%M?j8*hfaPMQhGk~066jdF#>X4dBDGX;41PkDAqJ&H4&r8 z!R2;w3ff9umYE`BYf_qERMAdEQpT=W-=}Va??`y)&YhRM@(8=Bf9acW|2r0OJUJQ1 zxWjKQQkAY(@XO2fWJ{bB6_6!i!6S7U+&e1#tMLe~U+Vg(1ek*yK~xRUsB>5+zYA}| zFP@;b_InLj0Jlv*J%}Ep^d$qQ&a~n#Yq?nS3|6gK^wt~U^?o@EMMlQ=pwHYpxrT&L z|Kdixi`y30Es5&#a(z<^Uu$+e~4^M$_$D7|i4BO|HVc41Fv;Ajl_!-u< zxE3Um6~4@P>VC%LH|ew)z~ZY9#%&gTvI`O=Ja{yHY2Tx-cG33s9f$>OM__M!V)VBo<3s!UyKdfp z6|Up-QXSPbGY6@8EM_KNG%IRhaiMwln_)DiJoNbERfzxiB(=H!k2m8%c+KJ*3_@$G zV~=nmy4(ZkT^EqUoQ1WKI9mcVL%*qprnSr~&cF&1h>TZ(W(pv7UNO4zJaNGk^1T zesXd-3!OYQ4`EFE)@|uOb31>=7x%Ak<#%q^FK&X|lw|*?J3Ee~yOR!ag=D;2ZG4Y;hy*=)rEJ3&gxE6Lyze>V_KdZp7WleH131 zgojT2X!tVxpge~jIeJFm^SAKeD!jM>noC@Too0oj zoCU#Ufj(QZprp@@_r?^(!prp_32o z0{4s?*{$f*5njZ`7&^+I!N!n-Gvx#?laB|-j*Wg{X#Mcd@ELv!jvZdy2A+8&b~qM< z8#ZH#*7$}_$2HUF^rKLJ*PWnv=ddW=mxf6T}<^zitECHeGyoM6(swj9z z&{5Mvz?kf1kaOi-_!Pa2g#*T5Tf#BK|8^Hh*%4mEk<28ztK@XMDK=RtFg&I62;dGr z5aam_R7c7~kB{GUb^qbdfalJRqq@Z%FeI@-AL+pMq(ey_)PW6-TfW>HDw>ZBfDP>}`wm`Dsapnr$Y6+IK2l>5|%c)59 zLD^YCD1<$UoO-1P&|};&S{17Jg9iBJ2f!=p{de=zQxYCJ8H>Z>{1$VNmO_jtTs|I0+)D8|JU#0At&Gsi(8=1#Dia>(a>_b=HblkMpPLz zAkVwu*XK|x4<5Glzxi&MzFRR)&)QYs#rDYh*s45af_%@IdGzG!&yS!JV?Uk4-nXyX z0U^MSr4ZnA6l0(>$M54eoue~-*`KpHN{3DbgfUTH|rz(Ke$oO7{;Wgp;YHm*!3MH z7lMPqrZ$Vd_$2skNqOLlxMdK+xTU}6DSWqdF75?EEvE2Ivf=cD?x|jPuQ(=4aL~rrcylAOGNj><~!Lvrel@5g?a^0XobBKF{pPG{J(A$o_=9>P$J%anhu?UGm#m*HJ z9zgF)l=NT*;o^oi1W7`l>|)@FOnG(`ptKx1{fQz@!m+*o*@p+tql*v|EXpjk^>r;3 z@mDgfN=ucB#j(td=v$wFtE!ZTT%XnK>F@j`KI0h|aojXHW)wrtmXF~Jo>nSkQ+B!o z8GEOtWCTb+xEh<$?@pe%qHcJYzwo$IZ=F9DTv{U2`AR5HR{{+?)nLMMbrh+-3Pba{)>R!02xN*3MV|E4>jo(;I;Q3W=f8ki9Vl zDYPJe7vwht>n=++Da&`kIKOfc=!{#gMh|_L_nhZ@TfPU|hx8;Qo|3-*y%kPL{Udi@ z0zL5YAMoxC?Nwt>0mwpf{Ql9GM=lz&%G!AOy8(_*&P5yrFIr=1OFLTew>=buu4kQa zo&Eq!rlFt0*4$afLZ>bTIR0{=JBDufA~V}h{S;r#-HSL7o|rx4fvQDdifOaIZsaVy zO2D#a(S=`xSs>w|$dB&>T)ziCFfuUIEqoDQEL@A1gDg_5Mj8Bzsd|<1Ril(c6A@*Z zpMYVP@=#@;Y)}7fPr#iS7UTmUgDj;GmhEg(^JCTA)t(5+ANduPre_kUm(j4~O8M!(8m2oi9#y|J0-@XPcd#dV=)Y%BEAfY@t=QzWlh3Et`RU}y=~-z;p5wt;Hm#tytg?QakM-c z)N0XcH`1O?zMxS1m0TUybR&A5p0M4#NWmSIL@g@|%_s%$t&FKfSv_E2fEjav@(Nn6 zLuJH+aiu3C*5N$MTHF2h*BJ*RS2|`OhM0&pjr|Zl09g` z(eYr>`q+ z2p}P&Q!`$QKn?vGBwTQmU&LYgnt@h!)Nyr&Ql@NvJ?#LTTQFzfHRPSAV1bhI0Aytd z24%N=4n20?6<49jy6_+|{SNe(@)mol+jyrCs~b_fIif`sP0qYuiB(MCOjbu=WyFW9l44?(=Z&vG)l zbEtfdp{@NgUKO2-fG#BpvpK;dm{x?^23D8PSM-C~G>f!Yziptb))Y1%doxQ@i$l+tjjsbwGRyVfWxr8|I*)Z(}YEg zkU((76s7tiK>Gl| zc2YNFk+rb)y#}<;xoB8wezE8-6)3wZ7)-i?kh?L8k65!id5-7hXT{QLB;_Fc+M}TV zk8?Zv9!`KR^)C(r>IWN*$(}c;ASY>57Z73@pOQh^Nn!7lgp5vALU3mPjDB1H6O*t} z0MyZ_J%VH%Z#n7oO6L>p;0M1S8aEA$tI;a~_zgneKH#1hfzM9JwKhJIx^TDdGbbr6sx?|WkJ6!PsB z&S&CyaJO)L-gYd$ge+On6k~;mywr_1+nr{M!ykkVWjVDkyXjImsG9c*VB^41HTwz$$_Qg^8LaD;G99mPp=w21$LwWWX|p8 z;n?m&&i%sP%_}pJOjviu=VJS%!Zf7&^Jk%G2J*(TVaPoV7a+(NoCf5J{qT-??WMwc zNcXow5p=5CofBO`rVa=*fGekmT){ZuIL;LePQh9ePN|J9{06LkwgbZS=9NnTm?VtJ zLkEQOUKuVIdNY#U8#Z-VoHk#mWLWC#TeqaxV3QZYFF$^z;M%b2AJ{R3A9s)CS3f`c zwpITaM%33XJ&A3E{EnmEMKJf=`r5(DrB$m`p|B+g;9&)gFGr)*jIeidITcYae_zDQ zZ8CxhA44D42a4r`iLLT%AU;%L- zgLqZZRJ?qY!~wj35m@GI&0Stk+F+!U-PkP;YN-n{w( zuGrp9D>2bSpP!y1CfyJD&b!{p{KD}aj$;tEC>kgrjY5`TipF+2nB-deoRT#COMYQy zaybv(oH#;@6YQQKtbAaUkV6J_FxNmnYi}GZ2&xX`J7MbHuRJGYR|xa8XN zcE;tox>vLcJm7Atg{qAsGM6CotzHQ|B}t-cv%?T@cLDgyN4nZy79M+JtuoT zTrdvd!(9$v_yLYVyzpBbSzUlGGwNid>Q@J9aWtcYElfg2vYR3ldW_Of_ur@!;3-F< z=V#`?h~YeQfLzIv2E2yxix{SY+^6DhSAl0L^=PG(XA`w9k}<+YRI3S_rX(zMA%p3b;kH7sAP(W6uIG)+{fDulm>Y z51a7v$Sq>53FW|$(e#H>J{{vzR$ZpFA)Z1XHp99hr7oE zTj<6^=pn0X8a2p+bze+W0&8y2aF=K zl9@#28$gbO7A~J-qRo0o5xT_Qh2+tYJU*0#bO8lOlLRT7;b7bzRB?|0(KYN@U@j|` z2B+%H|5~pMmcyG?$!?mwcp^XkhOw`VTt0N|8X2*)V6TB79ES*8_;U4B40LBR`c-pf z&BaHv?R{GdRt>nnVJH)Ff1`|Cm!hl1T)CR<81q(!^!$BYxW7qxfVTE=05@B!+|vKQ zE?kqr1o&!LKFFm~mF#5Ad?cw%+k8SWpCodgYQt=hu#jx+U5EOYb_AVl-nfX-S;+HG zgzF?qY=MHi8lcW63h3Dn!3ul#5m;d*EI4eQ9-!}TL4P_Th{l4q83nMR9u?+cRm8|B zWZACAjM=Wu!Xjos^7m`mFu$--r*B>>|cUxn^LVi+Pz8O{FpxyRlkf81G6|Q?-h;WjS32p@E@T9Q@l9~#+>pQ-T*8pA z_~Fr0fUGJkJ`T+XcOZ3cVxY zpS6AIF zyL)(bajmdAF!H6f7Y=P*yJqaSV=s(7HumAMJI6X>kulTA560-T5)!{}&F!O8I3@Au zzBSqr_nHGEyVqTGp()kWr6Vs-ZIC@R`4`ze zlRun%Qnv6gNfwf<9`|d(fCt?Jj}O_7sh?#SC8)V$!y`k#8e~oW;Lx$5_RtNGF?mMJnOqd(-Uk23 z{(@%Q|F{CVk4$Yrul~37V+$6O-e0A4wn_>R3=@e~-1xtPkS2?%no=<|WF1unyXk_3 zG9DcShFMIil81>0E1q~HknDPlHd5TzGW)2YFIv~6Vu?h8)7~S}tIZ-?uLG(VE4MrS z)IJi1ZShqi0&5E`q!QI)(Z5CkWkOt!UtC$|*HzqoJCJne)(%76dm61Ia09 zQPo4qgge3K3>8NW*sP%FpJ{XDHDYe$rwsxqf z&dF^5ACVredm!(t-d9UDO!h>cUU*1ku#kT~;{cGweAnnNP==>O`Esj{DFeuk*XxRF z!ZtZ69*Ef@EMS^EN&TAD^A1D3V}Btq8WFSlZB9iAM#bx202NRNDq{J>u}#u;};qvPeB zLfW6OzF(xf1jtrvr|Jn;GGIw?dQo5ebWzV&RS}=o?rB=%yIiEWqrr1*L+{BhXyS!} zydLpAL)xotwadD4J(ldIoK!LA`vNI%HK@Z(D_1ty+bW8)3%;%Q~N!X=X0d@z!< z^1j!Q;+DEYM?(m?U7?ORGnKs8LyEhL)`%u<2}T9Z-wGzZDiX|Wado|2rXz<$9CRz% zYQ#MR@WEnNHA8eQ&~1go230Ofc{UI^DuY*@XhgDB#%j?=GcFSGZqcw@f%e7o{;I!{ z&?k~k5>{+6@okP$hGPQPYS3y=%t>NaEt*rL-=;qr1IYa8Nm1q1^G#_`^ z!foi*s9l_`65y+u8%S{jN2e$%&L{NE6d<6|SL`CylpwIp5Xc&f-q&)|QCrGXFR%*< zXH__OJCUO|{C|vnd7xcYb$4#wke8R2_cG69f(!yL+%uoUkZ|XD9?wOEGu?Tf??re- z6csE5DIBX5jl8Hh5& z_uBjHy@uZsi&$N#%E_iBnsDT-C}ZDax76L3IoFT!a-(365uWSx_Jjora7H{vzcZM? zlEPdA(QW;{mBhQrwo@pydnV}!f_L%Q+I5L=v>>wEE67#<8W=XM{;145=r%~3j$69t3a2XH9%mtV1@aHDZ43Aghuy)R3uh5lTB~Uc!T4iaL(?rkYB70IH z*)+>XccT7SnlQ29rjm%@$*!j=9{99QZ-@(d%*pah*X=BK>@0`yJUo^{A!AIr@qmpD zd2{%|hxPWUSO#yDJ6^Y2fm#x{{aa|9EisG8Qf;fr;d4-ZYSVps^N=xxL5WW@R)ARc zqOj{uo$gCPs)^js_-yHgwj9Y{_z|69mT){+E!@Rw>#M zu??uXxeBO6NV$hy6ZfR)4Rk zso#Oh%y_&Uu1l?o!ak}C!kPqN)7C5*-qLJjS?Z679%)i0yd-9-gda=Nj6CzSPH)I2 zf~%#X^>z~TqzeZQ>EjC%N zSZl0dcbI*(!tPJ%^22=#iFHLERLt$hZ1T1<&kgsX{&>&POvb~pzL(q4)5VAC&IJN; z-*feF)KPZq?&)&;y#`*P*g~!gwaZ(?CXe3ULt`Erf_O#xd!0i#pDhicszGAz$;Uy$J+$;hLIA)0l1C?NOq0iz7paYOw$O6%_IB_v# zmhvJ=B7^`>xTeGiv)hg_c%bY}Qk1?L!)_>Ths9kc3+*X~8`5U|+Zc95{g}7!?+1%c zThoml_>BHwGn~5$jan zj+n%I^BHB8{*euZa(+Bh5yViH3x!E>_YYC~pk&Wr&MsbM8`eP1BQaG(57f&hJQ0aU zMN8TrHsf1=snfxRx^T7;b-g}e0V!4_gG9OLDo4^;hqNQ8|3K_kFelT3Oi^Q@M~XYw z>GTj?ClgYk$QxTtKo*jb)^;)nY`7KU6 zu`;f=2c&ocOtS^4XmYhO1?(3(9gjtcG%Gs@v%}P|$d_twrH#L@;;~^Z6P0%7i=J)( zKcJsMeC|{QYsob!Uu~IF8D-Z+NU?m*U|lK#oMqe5bS0VbJCJ;z&058MjvOJS+8)`C zk9{1`y|p-wn@o)e-wJbufVgd|PM3NXV!;*lc38pV_gC0`2=&Y3DAVswa&F2ssZ)%&vYrX!P$~N2>!0P$JrTU4>BW6glMkU)ES&<@f zdT&sdF9b(8UuuQ*MjC{ktsf5YbvlcPt#wCRm!< zsh?F{EMTYxxL~Rj#>0FHTYUw3VQ1T3W`i{cMS9$RK{CAq$#)h*Sv-)8Wa6=Yqo2ml z)4z6*H{2uKfk-eEwWrhe%%;39M)CCVOsSVO^|F@6f?(6%*BP(`02m8`BkApNstrIJrADe!&s1q{+s_c) zQI#`z94c|vFwXCf6)zsw@=P{N8E#lHQ=PR!G}pg?v*qAecwj7kJP$D|{(CD+CIC~u znat;KFjIAM#03Uf8T6L3)Y@;xhe>zpu{U88gP(s2tO+|cL{nt->DePi zip*g&O$6crdkqqCG)YJA1XJ_~4**0zFsy;IWAMQ{K?;~EHAGWntBGf-);JOEnrprk zK|8$=6|2el?CsE_5gxcGo*1S#?ij3npJs&$-3zWk-BL+)<6aZi!Tez^S(p1JNYQ>j zIFd%ls$u&l&&Ig5|26byM`3ArlFfK7NsB_EmTCnOPVi}Kru(b!0bBBNmU?Oz1lJ9d zcOSb)3oe3qxjcwLFJ-UGImn$gIcX(8C{+@PdGFmIW;qM08*qBw?9c87lh5`n$Uvso zjN;2vRoS0Ql5sHunUR{^bXEoP(C?^DCFRoey)RWm=a_vT<&P#9}0>20%6e$rOt zy4j{XnNbUOz_5&v)#HAsQl!TSZ&IJRgVD>J{Nk^eGg)u76;RIiy~7mo^ zk{2-O?0lb-K*$#LLnoNI+2tI7Qhz%n0H4sTk->X4j0vRL-C!}=$IX12f^U>KPyVnai6A^;d?cl31r!f;O%CBs9PNUUd~kKwUXSLdS7`GWR37p zN$#(IAEKTtM#XRFUT2Tp$J$lJ{SrjxV8@d-1llQ zC5556+Z}=-#!AhC1gN4ywVWPK_miIoStBg97O_H(`aW*Edg0)VZQuRyl5*|QjMdjb zChvWd|1kc{%2y0~H04?acHP9i3-COIqD**O$u5@i)&x5oER#@l{gSUiEYJ<#XJ+R{ zc&O<55JmZW--mDt$mF{o#sFpVxvOlK3%6=m*Ke}N`BpWCvzS`=qUNw(PKDG5i2eA*7nz7*eW)6XIq`Oihi z{o_x)gKs>-L=EeFibS{YvaujF6?39xRhdU2q~&$gp%>zdk1|@ZX5YPiO<9KX(ujF{ zS)6WLop?YHy#SeU^c3`QgbaZVSAw2Ee5Cr&sWWr(^yk3u;J&w~EvBKYeoPKnoh@%v zCvmf4>4N}D8TsI&of$fu!ebovV)~i$t99PzL8*+7Ut*( zLrppK0BFhx3lMW4i}f*q-KoCo0Y{NF-XF8V67ahu=jE`WH536wfe@J5T0>7`0g3H$U5(9_&kVMxy1 zWN`ZnZ-KtcD#ZR2O>EP6+In<>ob@pq_YMAd(-yenA z1AylReqM~nwQ8{bp+u&%*Uu@#2c?D^Bjp+@xgW)c&t27682 zW3b$=S_GU7J%(jO=g#P(`x|edkLnGE@VddLzM%!O1r}GqB0*boA_&Cn^US7ouVVpxmR{ho{=Bv=2Nz!hSLuY!g*bqr`to&Ihy_z{q|#>ckKcm+ zjPO)b?8~~#=`H`JeT@B!<4d0kHesYnVYy?A+C(y6(Z#&!X%I8QQup zb(vF5k_du@j&cO6RX0GhXmU<}8@z*~Jhk@FP2fyD-@Ic$en?S+#N@j z@R{Wudj?){gg0E?Fq_xx91Nae0)`D~t@Nday7Rfoe+Tpm&XCr=d45o?z@i3@f|SCa z3fM6`7iYpug>quxQieWnRSiu;k$N&^8)fPqSB{&CugiMbK@@o6C_Fl1k!&#KBw;e3G z?81v%m&PxM6$4N>v6JH+LB9~JYFRR%KZ9v@{oDvoJ^t2xa0}25pxf548VJqemL(OE z?fy#5$9DKG-1&@9!Eq?&h2OyojIh*a=^q~&7=I5#uyZr?18I@b>gz!@O;0Nx4<<@v zlhp(qoEsrSl-=orcU?woA2fdpS`6FKrlswO?pktwzGqM6tvRa*-zTjHdyJHkW6lcI zu`F+ck!rf^(OFebvU0c+r-uv*ny9)HK!7pEBjzWgS zq6T$>V*UXA3EUJepFaX+dYa+>P}Mi954{Xq#wbrczWePLYXCp%)$^`3U#14t}kOPo-iyBx7T5$z2BPGqAs3Rfz+%ADsPfxL%q2v$?chO}m z&^efuVV=-0W>}aN&!PrYf)WrLbfA_~BC%S7SK{6zz>7_>2WOX4A#?m4XM<8%RzqiY z1{QZNDL>YB`#reB*v$iWyvwa#`3y|$u?cqL+$iT1b06H3G(f2jPq2_k*`afhJ|U#w zROS;LJYabZ*WIR7?7F!To{r_EUyNaFSFu_i+2VHS1{x9vFBBbEI4qhyj*ud^bzvVc zfUprBB&3u8JSF1XHF(9KbtD@ohj5IoH*-n{oEPEYi5V`AWANJ%o?3hQ{fD4n>XkbO zUms(Soxy9`4ux`t(3gdkzcXx~ymkB=ng$t$hp7Wghbe~$HaT4AcqyaXQH?<6?r9e0 zja?54Fv?R+mf{tIJJ+)T!+D9t3*bG`J+YlE`3t0lYub%ff3_UTtCt*Mx2Zqh#LmJ; zZy67&?R*fHq*iUmzL|xDO=j^B$UzIK<7m_4Or%a~I?gn>GbkO9hc&qxyA zITzFU1bZGF9stEcKRmc0MaGWhtCX>1?D~8peA-#i^)GLMAsykV$3F+qb&ow6+@XH? zng80MJ|#S{QN8A4mv0mL0vo_R2JQCD-Da4P1nnUE6Iu0Vo|+i8+3Yv3c!}{ z_YT%>XCZ=3T-*<@i~`_F0h8dw0!gS5?DC1mn5b5Fum{(TlGT@!)84_$J6O2ic5RKm z11BSV0~bZ23|GY1F8IkP8P%r!_Ab_@JyFA$Ku=7Ax6?tmeJ-ous=H!|jLPkXpO2FD zx;eX9uR)!>%^2Nv8ypbzjEGUa&~@g$d(WXW1H*HN05?b2&%SwURH7i}A5d%kaA%1T zd>`%yQ4?HzSb(Pb`F?h8^Eq3nFMsZXn0nhg5AIa2I-h-`WUU9!XFsxjWE#&*@pTux z!4&J)zu-YO0p(0xeID><{D5W)V8mH}G!8&HnPK;~s81hc=eC@?iF*5EU!ni+yWe3} zyZiCPFySj2hU)?hgToDfgYgs;eVbZ7%&y&h&L)6$e5qDA^+FadZGE3HRfscmdiUc5cUBhNxtiW_`gdE;p!Plia6_|4*y*ha9|>R)5bi7)0i6Q|6E3#^ z39QLHxbYlJKyx6G1Ie^C48on3!$@e)vAbh0eRoeqg8l2&J; zQk89SI2~#`)?b@I`$l>2xpf>H{N99iW)05)?aa+w0f`i37)G%rGg-_FaluU=qL!*W2UEIa9zc>>%}UOMihF(cqGXmU0(AZLW9?pxh| z?VP!3P-CswL?*X|cxq##Ss?uBlIH+taO=gYJ&7poVJ-)s%ekau&}0 z&Zx^$#YDy$h~~1K9kA+#-MIQFbYq044#DcG8Sk#aV@F|FAoX_DKJI4sIe7 z9Y-~ub9LeFp}o(Q6bKsOsi!XdfCSK;y`Y*Hcb09!GSUtl z7Y`1DGPkK;Cs;kg_diMYEd14rXA;xzoO%dCb(i64sHg>pU^7?7RjxQS9}o*ys-re`SUrHx^!Qp6ZRG)J~k4AXvKIcoXtMO`g zX%d5rfRJ!zy7R7Lj4*jZ&bW_?2pwJGd%PgAyPT)K9EY#&{Tgh&2j?XltjfCqdb8=!R(EI-TN)^-nMwEXx(ECseufHBx}2N^MAQ!+N!!zlu#k zE!IU15CYv5`wZpb@PNq{a3&hT2B0|(m#`XQHvqQwavq4d@bF!q1caC0hP1u8AT-Db zo|7yP*y$)o0ViPi+iU~|V}z&S1RNNAHp0H;%o+aD732RtHf^{Ra95@2>!$9S{48Lu z8qbHiwTou(0iqX-r)^?4+-Du7fJG?)aw#Rc zpfcCP@pP1|p89~`AN=k0+UfR2X>kZNG5kHr@?r-Qn+>m{n(5#L6>6y*TK78YF!A^4 zA`2K3;-Ut2fDXq&D&ewW{aDFi?plgTET?j1c={+Ar5b;+%xaz>*P<1EpBvgIaZ{k~ zCj0`&5do7702*jA-k)dJtsCX3$KMIi=f8Ag+tmNgvpVeQwjv8Ss*4toh;UR>t!6Ke zJ0oJh!Mb9l4&bP2)9aH!eMWey;lCC%+si+1Q$H!O|AS1ZUze9YdzZk4aQxpUPt6>i z=EqhVE}2rFb-w*(EuHUH%?9e%o;kGBSY23=!s8Z4x7_eKaEqYMHQ*%jyC$4OMtG3T z^b$IW#9P`{6k7Cw7-U*#w`(RV*=zb87E?@g0VFGk0W;`wGI;g}!!)FwgBu�U*BU z0uk2@dqPm{VvAJVu2je$59AB1ddaPDP=2xvH_H*88tN2v?2yA9)&*Jbi*Cr~LAmoz z7vAoYK1a9Nh-aIfii({C^>)@Y^gN%>+KM{} z!q@W%orJB)k;8%6!$HmHvs1W7nyJsuyhTs68rruvypIL@_Ww-oSC8BQvn?zFR)Bt& zRGP(ZnaEXhY1Wr5@&!q~waXq@H%eAdJi++~>wBR6@S2{bq@{Gk)J{ko&B|dZTn5YW z@HOAvXVLbt40)kL@ityusM&Kpxk;orMg}Xc1gta4SrJ#|T_tfMTH~bazp| zUwAvaZsR$cs3*Sp_uEnacIw7AybnHbBMaaiw*f-WX zy7(`^FL)EHrLt!*f1cMag(bKr6#|Yp0;s$n_+Jwi4L6zp zQeF2dJ9)v4<=a*-6~uACAUHx8IP@rA)Lsl&Q#k-U>}k3Ncf@zIYd87N(L_D{-S1}QviR;=j}x#=bD?@wOh{J1dh*_f@Ab+mq96< z&F=+C{=5sSu=ofqdmXCQfP*iUgWmOqi}8GtJ1dd>+)crmdkuh%oaq}}6>nvsz)M~N zKcNZtM>WI|Kim}o(!lDYG_g?N<(yo&#D>oF?bW|zr`KHzL0HpwPyN5iUrp>C^Um4^ z`x?iTp*tqAbdF%zRxxfDtd>e46U>2f4<~Nh$G|kXoTZ*VeAVz&xnt1zn0BZME<)IHYQhvr78s^L3;%=Q|T;N5qk<46?5ps#g~4Ou+6Jxoj9 zw1;#8(6;v;*cC^}8pt+WDYRlLkKF?zpl--w1Z1F{HCZj%OSp-UA)wcqGl8GyYwrgc zBV^6Rqu*RDe+@Rfb%@!E77mdWd9`~t><^=4_2p1q0~Osdc_lN9f(U$wdU$JK*tO}aB;bw@i`pLw`v7@t?p`aN^BQVy1MJ=HgeGG|K zSt*nGyb>{oTt>nMRoG9$2l$pp-~&9uQ?XTlcNW6mi;rj*oY3N1mc}4rCB-J7pAce@ ztyr)+loQuvRqlmz<71y0YGZIw%fdxxN1U#uMN+Q29Brub6HL=c%6mTrof+Y&A>oT7_tJHP zmp+Abg|EB0p}2VEKAovDNYRXyDIY2)o*1n^pYt=V9a z*+~eGD0t&at_Xokk!W@{txZk1ki(vCp8hC#bIjq@I=>3mnvZ_8c8H$?zp4e z9E#Ye-gAQ8FgLJwS2Wq5koNcA(Qf@q6xF(zmSU(n(I=IQ1Fb0i6YX+Zs0P zT+A$ORh4`izzov3(Ux%uExd?^a@&_+C`VYT>CmT#$H(o1{+F}?^et*R!f0M&;WQLn z%-E}eYTSx-;Gi;`*v$iwGr~islOcd$W1#6rU{QhYpsDpsaSN2|3>l4PZ@Sdd^~3xS zh#6t2>$w^IP=E3v)EzBB7Hyca9@4~#^WU*w4rp=W!lJeF^K?<>) z2mAED5AVD?2ai1pYjR;4qLS}1#0=9j)30c0wrjqy=EUrcvxV8nQVQ?))_!U2C)eJw z_S)6|xcbwp@0xiLGHf$*7tLL@`q!(2tGU(tS5HsJxK6oqFF? ze@dG2PLZ>BPwkqTSoMpU_Nu4nZeI21s*kR^bya88)oU(X%@Z-e>3sU zHT8+oL~P>d?2jf6t{tD4o%_Q0e;Z1xzd!!W_*ce1JO2Lh8^*Kap>b~Z)$x7ft7lG* zy*&1v>C46*AG^;G8@qk1Hztg^#&G-Cj_Dt+d0}j9`UBH9uKfAj>6PD@`R43{EB|(_ zclvX)Pp-Uo?XH=>TY1aM#>%VaKC))RO3U;GD=(Vcv~r{2Rl|=APp*{=4;t<^yhHu_ zOG;Z8N_4V^@j|E4uA9m!kCa5^HIuo1-WABS?V$z%)dgk$sbPqCvgsnDgs)j{rrK1! zpP-Jpbh@dn;N@~2;xX!pV7|!BAbKNTE@81mvPR^S-i!x3h>}~A4L<1rxTXF=yqYv; z6-L@WjeY>B#2nVOP(~*MwHe#o=JGHmK3Q*+qV0}1m4U=LTLxz^y?HK^1PE6M4C8Fz z#ifZm5xv$DS=?V}c)Ci*n;{C9S#`P{FX8#7JzB-R1;xuO9J?4Xs%=M!VA{!0w$wMf z?D+|l+LMH8QUqp)j8tD!p|SyL3dQ1&96);FhKMdF9JP=&)*(bwO~&cqE<*{5$x6{K z;S6u9M=^6VD+_y2uEIjH5;aqhwp(f2EGZ^xr&r#J1eIH{DnP8~WlO@$MXKcXAE1FK z$NOH&X%v!KqfGmm-8R&`)Plr_8Xb&P!Lul_nM;hQc`3uon6KWlKz5?)LElPuXx z0_nG#-1P#^ini=F2DLBNymc~3n_{+HtKatKwxcX;K>EnJaH4EA1}ko?*;=5s@cIuz z(Ex6@gjl9ga&c644kgMaivg*Oi`{^aNHnELu(;ta)V@$?*2zdeR+Csqk%{8?=XAR0 z3j&B^IR#m=Cb~e*qdK_BLZT?)?tV9{wBm(GN?E@}8=wV9Dhb$JkuGBqtx_ddlvky6 zId;ZLgwsK&M9g8nqP*wrh@Q^~UJNVxOXgm%i1*mTccFpKXOd;JoHJ&Vf(fvIk6f>l z(^Lowg8J++__DY~!&ADHxL3mYY<3|kn>eK}$os#oGdz%k(e4ED?!M9P1vKJ!BYG|( z2QdN9Q%$UDu@tGXf7R)P*d|*=V;GCuy}VN%ds3$x(*zN+ggh3dm#`J`>|0QOvK65O zb#5J=N?wf0;)2nG+GooIK!vw5p{6$;rybnpU+VOtk|G>UbI^<%E0t<`vp$?zF%yRh z1&py>us9P+?vku7Uv#9bBJJz8Ox?VhyX-1m3}*)~R5`|A(Q-LO6?W_EbRk2B5_l}{ z57~M|)l#6397l4}t)h+d8Ec8MVxz;wIaGr-nXY7FSjFRm<8{g^_|y1vNPaqPm9dhm z!X(&=62;^lYjk>oDB(gRL$oM+r5qAA>uQ*eL@=m!#4SKPONt5##kC*Pe-P|dF`kI_ zL>KRN)7Yk}-XE`Mj^})>L_Mq|WRB5?Gi^)*IBLV4jdnt0BXcpzt4%7MbcjgF1e77^ z$#q+H<=-GFN>dbw1|4S086Q)@@y8d?Qx#e4;hj!P$@!RIE>0h*>U0jW4Eq&7P7su} z9$UE~%n+_x+MBaW)HCS0a;o9C+qPo30hs|OYYh%7nWzfK7m0sB-H{UQw9(c~6iN%; zOge;fucH2lip7J8eWB?HCW|4SVfD2rMmu@JoFzKJSliVN6pu|IIifk-5WVK6z0k}k zZIXMdE`|wP@j{E|tSKSgqPTH=(gg*Q+>o(9F1Zxt5`;XF6cWA~5f3)Y7AeuFn1v~nUX~Psb{iRS#gbOO z)<_nai4y8gD%l9)ri9x|H#4*%5l34(oiVu$R~FanTOnUeIj~TJYXo8z z$z07sK!KM2nBTZeBtR#)`fh-`Fyh4gg{c2L+pgo0EJ>!t zuEi+qwIgz}%LeP&W}2(!{R^}u&%9Hoi%mb~z?+^zTon3UBPs}HsF=Y!w^cbvUbLB7i66#|j+DYKi5)mWa?LxYj z-t(DZ^Mz!>K~wRh36DfgQAZb>)IWcDXT6B0d%2D!nhD43Sn$(GPBI|?j&6yv#pHYKv>p#jUi&9C(blyHmyBn@xQPte75 z+NmFWviWKevzf$PGfXv`nS$dK8i=&j-}5(WVG|ysWQwxu2d-GiheNJNB-mwJK`1C; ze-1T|nG`IL3oOtjhb6)KsMY_29;-lwRj3!?cNL5=XT?nfQR;89>Hli)ln!e z#B@DL<859_wY-=&QEGbS*xw*Id^y12oGFs*5mBGwPsdPZZc>cf17O~ug2twt@(1K- z5xrKHv?N{OWUP`WTK%XHT{^@-5*e z*h(@0iQrb!Q+Ao_CAJvR4?T%Y#7Wqxc3IAP%FEK5B>_#6DCR~+vaws8%xx^Zf=#{K0%oqWD{@kIj=QMTQhVQwTBWV z03*<}rqW)Vx0;w$3;OXRUhML)_oOmXF3`*}d7`fWARH``QJW)+dkHwqh$aN)l8lF{ zWfHvJUTchib0)VB*V_~BIFqDya{br$_SXC+cjYE|QoD0F(N7uvH+f7Sz5V;y&EnYI$)?mbw5qIE$vTPP;`R z?+FD$3DVb9%r~Ou$xs^(?4hQ;4Y}os1tV?J-#A6`0+w@#T&~$H2@cGE0g{u9SXzFv zkMjhXcEm-~IwXg$5JnzCsj>_Ig+%uSC!c0DOms`fLr7 zducJ0V2(A0Vp7SREsK#5^im@maOwvXrLQ9S6}nTwdleq8WxR(rE6H0>cT)Xox0?(! zjRgzlqljZMEk}9EFuh{(&hf{z@`=-dmCsM*4bv)^IDfVKMt-pZagoS57HrBsn#g74 zjK7#Hls$lC{}QT4*7@Axra4o zte*JdW!}LzpM;Q7h)30up;3oxRS08bolM?^=lUds-mzbUQ5&J^$k$(k@XihVirF!dLKVxuw5Ve?(LE(m%!1Dj%zk=iJoK4hc^P2&n6`NBA?Yo*=E~@1KhPnWK4Ox70!3WhNVR#AE`CU!M zxwwGtD?$t?a_xOza}xHoWW*Te!|ec5Tj->$yoUOp9j@K|6m^zc`m_IRka2+!|mrNVfqOqR07i++cX(4-#Na&E3F{N~`j16_Lxz$>J!peUXvJ#0$*9OP|-WGG$2%9An0jy6=KTBgAXE#rYO zD@*f+DX4YSKxkiP<^J0X527wC9qL#Cd+;Dz6$Az#qZYw&PPN!m# z)yA_h>?36L*|%B1Mtu%9+^>Jg?%xS%`+BJ+FIc|HSj0rf>~163cY_)JIas>=7h&m+ z@W7=1ABP5yy~u)>H?>$@5;3yE(ds{V&V`S%0zdx}d%t1*h@v3<*`of%FX71}ytC2$ z#a|8gH&Ztib&-BN3<1<83RXxK0-ihShilw6^%uWl*KUQ3+H*A-JbukAgcscNYj!;p z@9=5$L3&WQqnmQ1vVjCoK|xscLp8|W|Bqj@P{Q?`E!3COK7GL)#)NtmVhDDg*?752cUb8*$<7ry1N22y=cJ^Y6^jP^MG2Z;V3(Udb<Woc{duJ+n_t-!%Kmba^^HeN+Q$9lHp@wXXim zxN9!8`mWX2&wXTdW_4h^x0;>%q9M3?-|E$xKWX-dhWj;d($pPO*G@^hr#veYQ^eHH zsj*cruKMPxM^-J4nOD7cTv*jy`Q+Fp_27rodls%=n_2k~K*zodjEN~KXxy^aB7_AODpjXcvO47}Pa}G>5TLOlPbW$_qT5L@7guz8zE2Ri zpo9}yHlA+_tKXx`&-aK0qRh)-q3Z2(v=Bg6QyzC$On9dm52odMIAbkNBm62JcO=_* zpf0DI4o;wA8Rq*)5MHX~p@5ht%YlidoM!zlgsquuxmta{Oey_9z30a1%XXsnR06JH z#dbmRM8aagN8#RAhKGBeEedYF+NpM!UL(z=y$_)FcE;x;V%1cy(hr6JInb-iA-ujA z1goYkZ9gN&BH7@#$2P6lj2v67az`P^Sj%fmgo33A>D)Gym2BnWaRTnEF`;h9GI$Zc zQm6Y8IjksUqe;RaOO|rJf7j{m5KUO3Mn2F?x5YX>w`Hw7gsbJ5h$Z1FnH<)1#cVFv zu3ej1v2|$%)i*oeK8^5Wc~d@sVGiEmNmhB0U z4t21&;>k6WsgBcJNcM8Bh|>p!T%KUM2yyypBVqyQG^ z7g~$|Y7F*LyM3B{lclw(l!Ugp^!g+?Mx%1)AqxKe| zULZ@6img|OwM|quoJVxrZ1xcOcB|^D0T6MVIXZmqf`tc5B#rf|qPZaXqt?E>>f7iC zSTUam7(}*NF$Il`i*wzg)1{OVV=b;k({FbQwaf((L^tMaRlH(OhTX1Qz>VYE&d^gt z03L2tWK*yp)PylKLcEayW7Y!Z7VQqB!{=%ikD`T??0W&OG+xFFiL@<8RpcwL7(O7` zH^Cj>M>$&<$(utJb}XRNv1orUWG!4gVEvyDhx*#9n_j^%j56qBRLI4$LK87H-6Y(cZI zcOwg0V*QeZnNT*TcLnYyrrG_jKig#zgq(ZTHDW(u?Y9TMM( zfQ6dv<%LQfCjoW%i0*FbkZy`J^L~bH8l@aBt<$}1?S6Ycak0CM3Vz zWt9vQ^1N=6X{RkUBAjWJT^)`#_X@{2y?u-l zFu$n5x##jWZ|>-Cb@BE}8?*Lg2Olr+3%GO2thcu-R@_|YrG(8Mp<;{;t<+@On4k!w zO|Ca&OVw(^?E18{04x`mGYPv9cW|VXHvM5Jhj&8MH*T-mS!-9!U^#I!GEVVMb3+0H zW+vZkrm29F+2n-wfL{nzCw(bALw4d)HBQv63VRt6HG}xFYyjS zEE3t2+s`%4Ocf_D`T6k0czet20w57*zEaLa-1KGth{V`)77~{#yxACO+Re`V`JdJ4 z=|GTJ2#3-}uF`Zx+tMz5f!Qr=1dIE;?lfjBJMzL|WWM8Ve3BvK#%LoQv`}UYU-=0n z$Y#PN(wO#y@Fr(<`_j`UolXbRWV%>`H6s}_L~cBa`f0UJi$Sb_yE!)FKeuBhU zidwlOF;}cN94$_|@DU`&l8Q2fy@ksuhv*B@+07=sc?$1J=5WQF^JQeBcm%Bq-ohBY zL|e=WrACx0wbEB0!ype|3X1G|7u+rd&ax3Rw-1>fd2_DYz=ar?{Oz>jYO&M$ted0N z08y=iIkc>ZZ8p0fS&@0OBWxxDev3OA=(2K~JA!QTyqR*;ad)HV&rwRXR?hFyN7)py zM2H?yPRDRI9AEI_=PjZaGx?!*uUlxA9XRFA`(?vVbh?KvVa{knVJgmG$eqRR*Xj16 zndresHjs0spgx6m3I^QY%fbi@Y&Dk^msplwbTAc zC?J+=5o#WR=JJd;=#mRUs}Tw&>UnvAx)imiGf>8p3N(s=j-PKd#Y;b+)5U&)^hA6a zwr(sI1!2`6b-K@IEh@E@N`~5}zc0;JEo8Pq6HJwMoAdJdXm{gjRvg4}Q zn^n<6o`=+Jfv54lL{!_7TubIF;gGUMpDrp}Zs0~A?Jyd7-e?!OXV9!rqSMCK1=;4x z_&DlKpF`cDgirv3!dHQME0^f>HBB)<9823-c?zz(R>C zVZnaxsQ$4gL#{j?jlf-Af;~NmUH%_PKFMV&gxoXcBF1u|lgq9_UQ{0Fv2e^^%Hmx! zXIC!!4Vpxv4;j;Kh+V`oriv$H(ANsl@UUbwL8imaK7-Zr6I;+HoF@u^5!{g2yf@lp zv&G`3IrLbjlL*H;Y!B*+a1SCnE;-VqIj+!(+uv@xu?>F-XG^GE;n8eE4uksC zC8f!?g8vPy9W}-4O&3MCAScm>kLMIO;7yw`rz2f;MNGLQirV0<`B)c&Br}Fd03a77 zC6T|M2Ykx_mZ?yLJLqjn3DJFOuD-&l8Aq+^HSb$Hv6(lQ;w)yg;w5*e<)uop^Cxqs zwK@~Tg}ep8OQC>*gUWmTxl*5T-l}g`wSXt>QW#6OD~fe8baw>exa=1fpIZfGlpsO}l))d&x&WZj_S z9R24E*!%#mM1$)?cqL5$GH@noGaV#C9#a&G`)M!t{1mrgZiJ<-|NS2Tre`$={)NDz z2Gxg#+!l*k+E~*g#Ctt=G?>k(hE?2wxe>B@`q^=)qCEzo^{rLfsL+eofe2Kd3Gh}t zLBeCrXCi#25Vt@TE3FrwF~G}=@YMC&*FcQ&-PAU9?Mm*a$hx<4j5`w(pItF?)%1I& z9-e$|V%^x~hV1N-!M@wpgdh{*NIynY%(BjF;&1jwsHGJhvy3!N8Llg35 z^{u->&Ik{HTmPUJGkImpW#2I$wea#|YhNdxE?(hjrO$}nV#ha0Hq#Bv$5uAke+t)E@ag2b2`4-6yp zE!#Ey2%H4KJY9&R3I`rRkDi}kcGqZ|-O1HU^JNPr!OaTc_$db$71ClBDbKAJ!+eeK)b%H0I;_r1 z7i+^3Joy?%n75(0Y`C4Qk`=zGFntEe$)68$MtJJupMnz9_n*(b8RG0uYG`o?`I8_0 z9%=KlQ6)^U@7sq+e?_CGW|F}T6RZ2;s>&9FW&bAbPOatIwa%r{VsVm6ZqIx^+7 zS7sH+HqiwB_%H|@VF8|~I7|T8qFUd?LAs|VFMA;eNT4S*G&wX=5HVR2h+r|8j5K|b zmJAW)n!txIgdKB~r=IS+j;T8?;s6Fz6L!VL&^hnP84!k&QQggCF;7&gHauO(_((V8 zOL1HF8X3sdINQlP(o8kA4rq%H@>2iq$eE5ldkMD(QsPf)$a82c`&g+*k-c6v$l9F| zjuz2$96bQvuu1|7=Al~P={h8wd1p@OGHb4Z`y5AK5r z9^t9Ce`)r$w1X|`@Aq-9ph4Jn{u%XL@#+fjq*K$usr-spSAKKyz2o<5XMrCPM&3V=gkY=uqghf~}Zb+rYS{c?`F{A)+HgV5|Nz#Rx;{_ zZ!cF??~j9!*$%w@C?{kH9~+cA9C*f3C$}v5R9+Wmte!}5oA-k0gIVU$8fmB2TmTvU zgI7E|2m2iGy<4Bod+j+)#IkizAd`nB)SI0gU=EFt0qpDFeS@_w4t(gTc+(ib!#1mk zOa3rkPkO%-g(!YTnBp78Rn4ts?NBX=oW0z6cKmYzyW`mAD%r*)*SG@!6SaoZCLML zvBD3fQnyTBw{mgnCzE%KtLwj9V|KkGeB17&`p?T}PM_1K!{?k+dhmn2hmIT6PenPu zCT0JUl+mdhPU>~R*H7x;)DQLm@=_$s1=Lrf9Fz$KuvuT!1bD1jtw1{iMHGz}cF!{*oOIc-M1V_hZc23D)2^dR<%f znt#0Mw*S@j@@8&Qy)FggkOJ$1-vPd-ysyt|Ku`Hh*N6MFnsP(l={dQ8Hv+}!jqieY zf74ZO`0mHAf_EQT3_&1Ss6`2aihIk2 zp@a)qf}xnRzOGPC`*p3=FbaJ$3>yUy{Q$l^IG`I=%3%7G~b0d89xOAuP&EE9BGg~@w2Ye`)lNtyj z@@6;eRT&~Mr~;RWdKoW5Kh*rxEyBl>WQ0S3#B+5Ac4-3J<<+}-3n*6&}+4A89%uLy31^* z&UabDk+!FelS0y)tz;ASR$g;BZ&p9_Hg5g;*YO6AzYWGv9lsvlnLeq36QWClgXzNg zy;8QgjLl%t#1u6l5TrChUMfYp?yL*L-UbNcPi}*^M7X@83p=eX+t;smb^U$aE1+H~ z7c|h@SNzqAIdS&Ovj^9{d*){|-Zl3_O~~fzZ>?shKCtT5Rd1bqY;ym^JH~%9?i~BX z*v!hZ;VA>Y;;*z1ZfgAaj^nucEVuOliDOrbtWm^8(m1aeDQcdSIBH(R8D$>ooJjD^ zAu%Z7hS3~L(+pH1I)V}EiItw+hj93h5i=g4NQN}h36Jtp+>>8$O1D z$54#K;VhM&7cq>SC&7I;4-X*c6&a^wS-=^bNH0AGJHpb8TD^37_rX8wF~+60VML<> zwYH4&5-lEQKlaxMIXHjyB3h?(D|^w$ZcfRe$c=T(a~wq|qoq>?%7i;0iWR zVw^B9N*p;alLVJ0Bq~kQ)LCzX0e16=`}X{qZ*yenF*tzk&@#l{%V`44&74fma{|N6 zvkDll37W((hCTBbia0{C0112fRe$DV=9eBL&>SvPEIluA0z5{f*?Eqkv3Zu^1d)+3 z0;gYl41NSBX!Y5TK6u`rsRI|kHaQAO7&(ERmyE19PZAh2FEB>f@i?vwzM((CeC_{kswr<%k$LTmtQsc z+S{D9PS0MOhnF5>inz{3Z05 zO-qAz)??I1?t?PzxbbSE#6g8XnVwe^BdilfAm#-@Vdn{jgFs(NkOf6L^8zG$gad43 z)o^rr*Pr(W2lXj8UQHPVg_aq49x8kY@CGb3&yt|fm;ejKNYmi4o(4K)_+N5Pkna?tN z3Z2Y8nKhXuGazO5$t=lClF2fxl|@vdbw1DaX|#vD=HSn-HTQPWw}Z( zB8rN?_nFU3Xg&?!>yLlR>v=wT=B&>-&v}-24EiMmT@w$7G zwey!p4H4#;SXp==8kIpQhj0ogp^mZd;{Zkr$FLffl`=0oAj8`D|1oO2m%9^Ia;m73 zj}L^P0HFM#T2NRaJ|JhYI5d@0%a$X%)*b1*fJhe4 zJD;v=rBco+aeN`~1M4jmW$~L490xIlRHjhzGG6x9y5Rq6=qeOLJ?b@9PR+JI>}Yv`0~!bbnL z_9NKZN<~=44#*T#k;&xHl_6DhK*b{rlVRhWRJp9kc=iAgjfwX7iGS}$cGP|(E)7Td zSS&K2l2g5p)in@OG2DQhf#Q#%0(U67d|Kj15G#g4jy?b0kMvf4M5a0%RmGSPj*tN* zQjZ3BoHPTfC^jkf4c=Fz@t7hiT^=sxfQn~PlD+E(JN~Wl+Ftt=nOqLFi>Zjys|Bx6 z;s}eXR0Cm^l2Jy&VP5u@M&_9VGO3`@{=Hw>R{0f9br^es-XfF(F@}v`n?M&USzK!5 z3Tzc12+MdJTGbPb$MM3@D6%=K=E%EmIM*C0!yI`SNHp(M z1!?S}6u2tcAc`3U{D@yPRjUs_{Z7^1?$x=p^6*(vkd1rtM=wT*WdxQ;CxY2g#Te0@ zDT5SHD{R2;KICCQKiS z46ni^r@s_qg<8$~->Z7NTFpn^3p-h4@d%btH?iJ^S7{NiVhz>o{T zJ>CTe8%(2&H0$)(k=_Br^y9ayIybNO1UJ2j?QKRW3ZtE2V+BjL$h`#hIwnW*w`%Z~&v?vv^k(^T^}ZWcHEYgyh}j7d{K` z1FYhHycY_t5dA_fJ7mQ({D|J;bDL=wHj^9gP<6JgUi^KNu zTyWZgyAhT1gO5Oth(}J}_rtdwbeqcuKB_WFw(nUMHK%lEM%gHzEEYns_*`5`MRk!k zKZGY-F^}Y*EnRT@yFiq?^279Heq@nWMHjqt_DoQ2(q zi?n3AW~&PJHd3ynL#)LyA2RaM1Ot3QJP&k|xw}=J-RJPmhfzOG9)H}sz5J!SRs9lj z`s1oT0et3ifX_UHs<3VK>bJmWT#K}{wXhbfvhYZhoze|YWJZ1nseJS&s&R8W7rh)mp@^k>zpdhG-{ z4o4p?Z!NS(IbzP6I7@+%P7m8G(^7K72@GHPKKj_Wl0{AqKHGo%a&=dE(`WDuz3t-V z_03HCN^2awHcO_Dk{;*s?2GD2@rB zihB-R+e}Ukb~nKJ!)+{o_Y>5|=USwNvV~Ee1JunV0J0I5BwHAr4$>#B&E)i_ph?bQ z9l7q?`^c_<6m`vhepy4=^l8;WNw*Lw065Y@%ZcXiHN62aQg54CfFq@@Gg{PI*y}l` zd3uglFq6fiVq)5ujZszJL!S5+dN1M;?G&n30;XeU`ND70CfgTf%R^va7?L|OHqWRp zJeQb8J*SGwcn;ck!wMF;LFU~@p+^As@I^WmuEn>iPpiVw(IA^0*7-tq#$C{+1u26M zLGg%qMDmQclH>=h#)qf^b1ZV`lrSIW;jw6u4We?5IWsyv?x?Eb@|Pe-#6$J-=LA<& zx$Dbb$`S{3ogN#;pt=AVD0fk?loL`24e*vh@mMd|YX znKKpj3ycZ_K9Pt_O~ES$m2jQ{_N?sex5<^Ck<+6(!O>ctF4J-67imHA%PLQ(A>)Xu zz+{JQ+VDg=C-+tRdH+fDQ^X@@p6`0gEw+iAr)g7@jlbizlY3s$Jxm^Z7!RJk5308J z2urZ8uA$tvvsKyRZceZHZ%JL#a)sH$J8ldtUJB1tW2LUE+mjeeMIE8xbi!tf#3Be- zfMU@+j+wvgkQ^h&)P zm$Z0?M&)CsggZoT`7b<}ipfG&Y4dmB5!)y?&cs5zKQ|Ojr2`{6o}`{o?K_8BMrqi4 zBpsFrtDj?|CfC&1a3Wv>P}<1%AYV+b<&e^2{K`cYN=geJFuq`nF%x-Z$To+&ff*^J zI6cI~$3L|d?yo0RZpnK1z3LqBdwsCs@AQRMP8_FH8#qm=e8Hj%O!4MigzWw? z-o7hQ0%!Y+Mc-9#?fxICT)pn22jKa-0E?zew{m6F7R@hyxcZ_gpUPeM0SS5FX}DE_ zStG8@L%=tTaP}+zBN1UFe8?!qkZ4yERN zLsRo3i4g5)H+kYGxMqlWMDp4Rd3o3G`>&IbkNr&LM{U&v16WCbp;%D$6?y7_%L(d{ z5Jg4w;Soc5mQ!x^kIAv5xBLGDpcL{@sT1t_Ur=XY%FZ|_+KHc{ocK`G)`8nJV6d9q)A>l`aEwigrh3&-9StUtx$utjflz zUG|?*1-lb-_Us6Zo#ODSn~C#3%Vc_?%dkA&|0C;+cQ#@_Pq@9Du{U(`d65WmDZqsb(f z8TDyL;`1W`XJw4L$d>2OKM@bvy2su+7`n={&(SNWX^|Fk7aVob!niiV`DBhjKAm=D zCuxM8(ACa%5s#d{>*}hLu2LX-`gPS`gy4(Y|61|X(Q@d5r*6hK7c+B8;Jj<+#$D`C zgd|QwHHpYX`})i0dgfmGEj)8W%UWEtGi$r{gDpc8E zqsfSQT0RjNiI6K^hI$o~fzKGTmw)}T%1|rle-jPoTx>qo^shEU<3+%8yNNnnGqhmw zqI3CrmFA3$8yQPZLvVI_K^m^;P4Zl`x}#mhBJQO>;0kZh_LfcS)R)n9LF>2+>q76( z7;Q{ahUnUqXTn(IDspzq@zS;eWJ3HMB8%n*%Kv%;ix(F*TF_m%*C-5Z&db?`Wl>Ze z^g41WDzAqedJSiYXXZm*Qq6H_O5XhNRL>x>p>QXsT)+!hh8k2ez7uppZa=HmvdX>7& z-+h%{)f|iF<;^`iJ)TQSb6hdyMTuVrUK(kSf^WhwSji&CUiDSd$aerev~qn^EYc$I z!Ww7hQSXJFPI(vPsj$`*3XzYV!5SBlQK;VdmMz{%{`C57YSQkJ_X=0DZLikCmLxF> z_C3~e3xH3bXNk=%Nnu^F4qU4A~-9_Hli!~?W zk&YMM#5gVk-~F*yT`>=Q%jA95Z_&Xxm6AO z-L*(dZVT%+KN`sSSw`ou%|x>kW*z~95;aO0%cDQ`)4g}6=71xE%IT; zHWm$LA_hy`5F(_nx36s_6@f+F z+*KTtbEAGI@3Brf^g)Jj7xebEi^$~h-8c7@-+Mu?L?X!f+=Uf6w1Tf7$8H|e=J8%T zJ#KJ^Ipvg$L=HfXh)kGo1HS00FGd>3R}b|5Q;_xBOL}+G4$|7=f-seyMHLraOmFk+ zhg`PN82Qx2y?q`Bb#;=b=-Kjp$?;PSO`CLe4KLUCNOVAw zIoxtv^J3Fip#rD0b~;HHK_|JWOWoNn;sJ(H-%m>` zm*3r`Hd3YhR{idYQ9SLij)lUU)G8bGx-)_pU#GfrqnJk?f9l%($2F!cH| zw0?K>v4&wd7n2U;W4c0SC`un|s0O%dCpMpMC9m>WLk`oIhDUco4mG#vKnmuTjve(a za0|(>MdzI{>gE$fc|eW$6cHKkdL~EtkppTy{ywrutAGorG$DQ_JIOI=e@N-^dM8qG za%>y^UQ8xul1;X9=XSMKvW-@KFI1Lkew=5O%%m(F9P`i5Ib9@=!--tqq2AmsVv&;_ z_X}1hxwhxKRQwK-t&P@#7vg5aj?~;d8;w{ZY5Sxp znv4sB{jY8ewwOmAzv3j09Lkz^T+EuB$XO2`zzO- zw~C%yhK){bHkycx%51(|7Bv?PnB}inG0P$rVU~t8<*mce(a`X;-npQq5!x&(GWw7k zMH9JsC-PP*B7WQt5h5Phee->IHzlf`GPe&Cy~DpqwSa(R8k_MMhdI`k2&N|G>G3>} zOfOY$A^+T~Zfh6uh-3li3Kb;Nu|74BOfO$Vjq)l)y*-24k6bin^o^R7!*YN=Rob(C z585N*RY0HU3&-~I)qB)-pdBp6&>rC`Ff}Q2d6{T9?93IXiU`ml=G{2CL}a0a`zuVc zk+{n8bFKp4IUg$~xENi&`RWV7xp5{K&+5{)5Go@gae@x`r}m?DA|8yfE!8-*wHK&u zlHS9MVd!$Lj+9$+a_&7^8ezd=r9Ol$- z7Y1AA)W>(&kK)DW);?%~E}dv#YlD6ruWny;(5n`(Q?4F^?{Wk+SA4)tM@^-yows}3 z9GY7cn)8H%RBzgXx-dobdoF0Qu)!>KW?DF>KbR&yrMjVo68^7}}ky9B7D$hcH~cQNyg;f>`{@$!%Yx z6##{CvFUwLKR0Ba9+4GoGm{DAzfeJ2P0$b`9&R+l72B>Gn353GYgnX3`9hULe0bi^ z@LV`1RV?6gG%qDm0}h7IXt8@mEE0O|DcCgigT16>Nd0Ge#_l0|b?Tj4ghz6~fLsh@ z_nTpk{TfeA8VO)PXo?;BPivA1{r45)!7;X|NShe_RL~L~Cz6C3_>c_B&z@~6h`u8y zpTe`usn4=o%1=h<bA`~X$CEThv<2vj>XQGs8)8H(!fZnB-l<1a-Q~Z#X>**5w6vMf z#mVr3XNF^vg@}PoI{6?#Yw6ZG|m_(`nzV8z75R)|Y~iCE}4IS0XPF)>L=7>vAf`wTL=o)gdw#lcOw$B<1lbg*)O7 z10sA3N1BLCPQKby@l^Jdbpf?WvJK_vstuVo22i|lGVe5wk4-COW8~DBx|>{eC5*9i zSlYE45EbxX^E&DnY%PD~N@xXo9nUQ{C!d?1A7%_j#ITwZcyQt@(xb)@$BoP8lRjrU zkh1{ma!lPx&JKvW7jTB}IHcKodwC24Tv_`~2 zVYpvhNKnADv;0yhU*s5zJL6DHGtQB5 zK{t>ur=S}}JOpg~rsAjUDR-x_Qn%B*W1%&!luc^qWLce!^DbmfS(dh@zgrdbNv3XU0- zC&ihE^eDkFW=;o)0u#L?W**JUl);>?r2Kh_bl`n!!4SNfYtN zvAat9$k8cvB|&x%d2kxdl$B`Wv(RPh@T4Nis^;0a1C?rkU__F0xH^l;Vw%&3;yGRiMu%xz&U+K~rwagw$XQ8&l+u(`eW=*QqyloWm>M zbsgq^kj_tPd{&nYIb)NqNFZQ$CbZhgONy4UA@3yZ_!?|rp|MkZBs@Gj>tT=p+ysMMM}vGCsE8N=*@Gp6e1ZbM!ull z)Gp#dF@3Oq>6(Swin+I_-g*26bsnK{Y0ge_$N(;8H&Kwr2#=sTmc080H4U#@jf)%8 zXKGi};5*eVJtUZMWyeg9%dEzx+`LQQEG!k;)R&_IR z-bAmusU!-?`hdweG#=DjkTPaxoE{5HayQYd?kZfQi5;kbMcyFUJ+yp_&)QL@H;KBm zs7;Id@OHfs;t~uM(?b?+QMYv=`tRINj(ZRJ-)d7wkAtO}Rs*ncMvT-Ux{^4)hkX81m90zjBYCP3euHa98NPS+fqC~UVg+@&~BFQMj1blwG zmgl@Ka_SECzIG9H`AM#UT=KzM|3>euC{dcbE@=0pF`Cz+vciPIKFxWg6S$__fyJIa ziW`EM2gviaedTrU^PE@h<Y6AN91BuglzjF+OpAyN{5(AC|K_A=Tlu`tQ164SgoO9%bulxUPwL!xlS%F@%(TC$LW)M$pb&4D5>{XJR`%U&1hAk5@h5wMPp;^=%h+EWp^n2 zh_Si;vp6QjWD@$DWG}f|cIlS#E1#w7UtXfAmO_>!Fgk)cJ{*wES@OQ|Nn@J0%j&*% z5t*F)DI$%IzPqD={71RANS^uv7Kyy{R>tLmjc0VcdD8Arct*zaHWgV|ge(ymqx3{y z`K41=tf{WsH%gdNS!oM~N@!Cu8cX|Gn>~&oTjNM^nCS1pV2h|ERR6`j<-6}u*Tj75 z1e&8PA-Vr%Q^lf~K(8|twa7zm-h9>nKS#vMm$HioF;?4v8OIO}oJ5F!<1iHqSHlb?=D{bNv#u;}~ zsVca%fw_4bOTPLETozVR$?4myxRT!3gwV53sw=f0_K<^%>YddU>#SR|8yC|%T7I_f zytU(X&c^%e|4gr?vYj_NO1sfy;Zi?tWik^?VLp+c2zlpXp)h&oOK7r~EI8O-Iel4o z+4<#)30p#9bX7SIX@{d)equIf_a)Q%tbwDeqm!KXMRjM}N*?Lp)OdLB>TN)!?}MAm z*M5=8l9y=gv@omewABE3Sg%!=9rF)GQNl^_9kfSG#%srKE+EIhBRt;kAzyf+qSa{Z zv@jKlG3k7QF^#Kc3JULpcaGfg5VV?zO5DFc0W0NK?nZLz#PP;*+kkazRU2(7LmROr z8vQKX-vh%s8#0{cot6=!*Ng-h^1vg|M(2Mq9Ky9N6A$WU>L<@a^#se_LD~+sIBPVp2RRpOEg(sR>`q0 zBo)39^H@RZbj?a<F=y-vtXV7 za^3E=iN^n||MMD6-8<<@Pr{2>x_J4=434;YgiRRCW}QLDPLImSJDO$P zyGS-~3k7Bt^2tl)E-@R@$&8(wA5R~=QBk5%*}|gDGcyw`t5@17)<$HAC69bly>H_= z)FTJ#`4(|9j@Z|9I@2NXF&SAln z(dp@tdC`-QA}`T+Y+)x_W`IS+O-wqilML@08&g3F?kX#(#Qpf8st5PVZ`3TcBj2ou zqFEw>sOg!hDHkJ^&c`Qa4D&Win%w#rhF(l2A$EITd22~`zJxS?4c<7u)DIcL-69jr zgeQ5ka>3>uP1vk5^7v`!82{JcjT5m5^V7Tg$j84{o562<9nE1&eGpaM%HiOQmq})$ zw%Bw!RhZ;S;z`)I0WrCJ_mf!B8q8qv5}W;!ndxFK<6%vC)bkhy!lTU*iUeVXbEUo5 zFG4E=;mO1}K>e)YNX{tJlOxZfk?;GqdUM-K4mooFEB)jr->$Xs@Bamh>Xdq_r-(ZG zNXx?Yej%vOWbG!TX!%jG{@tfw46Vvsu2Byo##S>IoSqDfssIneV-BfVyd8-5jufog ztA7Y{VRbIji$-hag6(N_>lQoWM1!!z97u7pr{FvA2c&lWP@3ePhLF{{gvl1G*4=Jv ztu+omh4t{x2jIrHn=Hj3HLE;!m{d>W^|<&G^@i@%KfxpNyQ)pvgTnq62t2%Xpsy44 z@@Yz!6v_bsUPtK?ND%D2JWa|pE?8r(sC~ja zucQ*X$QNIP`(`DJoLssMNB7H$hKFBL2k;DDqG>;Z5b3ncVdUekuz5}u^g3lRGW7C2nSB|Z5s}FW?#{mQ zsh8DPN_MD9JpS5JxxqzD-T+cP(=tywoQgY~NZooBO%Rh|G3xi1zj~#0w}iMdc%@Ok zrta-km1s7GAjoW+RM-KB2Ee`HIlp6`Jn$-(_>ZCc+C?nl{sim_>i#bOE2o1%!?SRB zD@rsWLpWXxA)YNTBQAEvtcyG5=Muu`jy{K%R}l{p23PczKlI%4z4@`{)jKW1gXhK6 zV!yrqsg@r}{;_V$+NtMCe*(G|>2#%i?1QS~Z=jNK3Z17j(o z688r_b|HD?slkqN!$0Z0&|Ok3Pls2PP#IaTJBE5Ui81Mdl05bXM2N`baqV4wQO_=$#LmWIO5?=j1&Qd`PZyzg49MD?PH?da4)bdB(#C?Lkwkit~9%;c79^r#_`_w2OQx^1j zSHNtZnWOg!^;?Zh@Qj?F^;s8C{+x?iltl9i25n&_nVf#&AvBU+%0Kg_x}7Y1XXp_5 z{VVGK6dnv7IfLUO10}hc&&E7eDyDt zn*mM25pD)!VyH@CPKI8`oQQZtOVV&oBnBGD`(CeIH6HjY1o9;r1PTZ6ye|_iaM|fZ zJeaXggcU4#{S3M+B9mR?C<5U5-`f4T@Tz)eHF@Wry0u%{OpQi7=`Ysjn_rd?$DtLiS9m5xUy+ml2;#o<`r5|w zeLFS2iq4^7-Ga`E#b*;JnlQ%ugPFJ`;YpD9w_s6;$f#UOSxgaW=OK# zQ987&MHi$V#^9Xsj!KJ6C^<|X-=^s#g;vexwv`-mrayx4_0L?>L@s{evd!h6wrXh1 zXz5b4NZ2z|nL@(EjCjMb(SqKT=c441W=;P_F&VSg(1*OoCi4Em!A_KSrE+8?8dEPA zJ4$KX5#wa>g*lrvn;yv|Y0tXIe@irQ)~w`_GvC_QzjXc@yzN#VtjzVA^L9i^h*+;i zp;>unVw#fzU{RMDQG}V0pvG)%8l;DcctYmTm)bN&47H-9g%Cj(PIF14oR z52X_1P$Py~M8>n17H>7z+|Woq-l(ZMBEHsy2FXg7Eq89lFq8oXv)336jsnBosw6kn zW01sTJn!#^7wX16jpTRrnyMqBp;1$_*oTp5y=HgaFjn4A=xb=>ef597bNBn$9U~<( zeoKgRO~;I>7@IMKefi;hdIBcXD_by-Ki#H5Q2a_>#bhEm*+4^i*LDp8C7dOimmr*x zz;>H)vS!;fASR+pS+F9fzgmkQf5$oG^4$lpK&c_b>yWX+=^S~d!#B$3$3|5b6)!R8E{RIvE#XRbEMQ?5 z`{GJKl1|HV>2TZ>^N*9icWCtmY0UnB0)|jXEa9QNe7phR1KSF zIWp6Q7OkWrLiu=K`N=L#eRb)+-i_9n2;{vP;m>k5jQeZQsd()s=WH!MP!8eBQ5jP;LZke*T&lN|7wRuh~ZdQcL}w; zkJdlk^5b>e;r#s6nl&Up@@CHtJl*>-a)JuckFd(2k$EOB5AZ4A*^q)wv#)I>kuY=q zedMt>4|SEFw_%;(PDsP(g{5k9Dw5^}Z!ph}59j@98TsXf82Xh|a;%f-Be(Zmw!Q4U z2tx-Y=0<0Q7Wi~>hl?%xJp4q=YnV~;WZebmtcXk=zwIW33tZ`GAmcwC++4o;0!`)2 zr;+%=8Zi47CS}afm}|!F)hE1@4B2)*5e=OQhTzB5uK<3Y{4cbTdU;_A(2eO0} z?j9|S!cg}}-A1_s)#4-MCwrhX#AH&5j$rrJ*0-mxGLbYeUr5Ry9ao{+ryCebQmH96 z#K_3~7i;>v&mjxXQg`puY%h}~4Skk6pxHuS$`3%GqC}(fg-!wls$gLAnUvJy3|dTc za$?(uPKwCnNHfAmjv6`}$bI{27n>*dW3kFgG?rdita-P~95Gql0jt8FD^8}#J9a^o zh>EMGt$*o@yK4IW*Sj_6ZRbi(b)_`!xLP?2?;xHZ zT(y<~0uWCZ80KOCn3~oMA|k2Bk|7o~1g*{`XXJ-#BeiW%)7FhjD@8aeF&a+26>edg z@R-aH>80qLZ&1^|>D&*FU(gg=ov}(y1IjPYc{p%TW@VSwXVDF;M&U@@2P)|zAf&d#v+Yv7cOoA%Y@O) z4x2`EvPoGU2=nBm4p*)#92ykBUdbc*n_s9NTe)|^+4vO)?n>0z`BuFDY_i~D`1BYH zJeA?;%v6ee(yHle7m>;73;zR){yiUTcz9R?3s_O2QN_Y0o|!g`Bv4bpFru5uCR5Ov zCt}!nA~GI)ZtX|v74>!PPH1+)El6_(1QEbZH_!1NRorBQSKsO) z<3oDjVw(|H;~SNSV?=pK)3-4oBGU>ZedO37O(m{>4|!M%Im!~v77;v1o`54e&qYUb z?qGZ}F>92O2?N?AA|p`#cm3t>7?wxrj8U_DJ53f5q;Q4IOp=R5$GovQOWbNtkpI;} ziinKpE>vzfZ+vSL85yb_E(P849rCKWx~s5W--~dh?eI}9*1xodrR&wW174rd@{u|{ z>hO$5V-c%uS|xQv62v-z-x5*D8ROP|@-OR-M)J&=!A<3_OjK5?tVH8e1=T#qNvAA8 z!;L*KuE=%TgG$77JAC?z0ASZr>+D?QF6ZN`YjRh+l!81jw;Iwv9% z?N6f@kS`@_r^PeLiWr(pA&7}ZB7lRM8}oXV0NF5xSaM+)Vnk$e<|Kdu{`1VHb>y~i zt!tl&K$fgT^B06+lIn+2N!A;)O-$!xhP+!vwvOYl7n4cHc;7x!7_W8hLn+ANO2}BK z`UUl@FBE4j3*p3MI3csoWysShv`Iu3yjlm+wXTh1D$PM!#`1wW$)s6(e!>+q%16@$ zmfW6!n0RglnLPf;)qP8U$kfi|wh4$)mT2CYuwsLAIycY8asfS)A4)6YDw4elVnk#j zvHYx3@V|jPaMdN%Cy+mdmhX^3T3+hiE#F_aY3*3!$LfE#=0YO<(+xuiFE34Dy$ZIr za$+)R$@l|fv6$ZIlqZPlD1J#qB`51Q>?a?7b+EI1-%)yZlb7;nY*lH@4jDb%aKYfx zsiG)xnIVZeOo2{BMjfT5zNN3t)jIu$`O4VQSX5yuS=721i28&0)oh z$Q5^S`3JdW<@1+3 z4LS1C#B#sJ!(N}CGkIbelrgnv;lF*h2svUhIp)U=Nve9Ffec+;yG%x}sWgg4&sX(y zP+`q6#p$_NJ~TEv#74+f*FjiPL`LlR`Ta|eTvuzxP?LavP-nf($->KZuG93Di^=iJ}Dpj8B_Bw9J&RP9I2741DN!7y_SOuM(RLp zl@st!R1&VVt8x)F_ouU??{){4?~k4cV4m%OPB&nfqDa&UaMX1{e7Dm3v1BL3HRc0%otGJ z-5B*G3X3Gjf!j4(0qlNO?Vwe^JpT13Dxq&Qo#u9o7ba`mu1Dz6Ad8={BNl$alBlAL?}m7<9z+2G&S|9$}1p^;ukKHqdG4D8GWfp za#ZDK<$e`u`2d!@hzwk(1oA6>d`lB~AadEJ^3@;E(8OSQiAGurI?ps}bUL_+5pyiz zp63{og3f9ux%ac0&bF02^3<8#{iw>ftgklS4^wWqREf40!eqw$fWI6aRphnO(X@P= zTy=|PGdX-eF1XQ^EOO#y0#m%}vL5o4`)ik`-~K065%LlZycQbgh>SW8G(s=s__`Btc`Ya3{t zYWYI*zp(0N>%Y2YU7eEN3U?y=YKg``3n{evh2-QIw-DCPXSG~*#!Z@j4jn0?BJ$=n zWPR*0!NUA`Z8$&v3oI9QiH18XDzSU&nzF z(MV^ZUq;VZQpqE_F{QNS<>9e3;eLwNh{+`6eF({TKh< z=a7Z>AN!|;_n%6TDpuVwf8}yvqV!ygq&}EIxn-clkBiL6l4M^T-+)e=zI6U@DuZ})9bOY zZgg)a($CZeZuGO&i(+%#-%*>Wm2WxRJm2)eH9v27xUN!T>serQEFl85T2U>MUx?@# z&)nqvaMYxj&J&4$a5Gu+Ab#&0*0CR@50*m@YJ!rD4#R{?%Z39(v%?9?w10twt{FrT zme0f36|vyG{@;CY!rFSv`iC?g!0nh-!*Sli7W4DIFdoz+nDu(|E+d;FnJ-~UiOH}sf{yZ^zC@o{-AhgQ?W-#aFc=B>7=y|& zG?AN8hO7#5$&;EMGH_DU-nNnjrzSjm6~v}nPimT~o8|ML!`z3LXsU-$Y+yK?w$B1W zJu_rf4&^e)q#bz#%@LDPdrjde|Kt&kThifjOev#`!ERS-g9Z1fj3dfN>822oiPk@D zFMs(_&1c?j=HC4n&ZX66t}MN=8wG+xU(;MplNY3pqGKG-cngjq0xa-!W>5K&bOO7{ zi(k{U(+q}HJ|Sn~b{o0;>zcPK?ECqzYwlfrVRVygzoFT0EL{j%+&*z781uDehY%Y zd>MzwT@+fj>jh2w=G8tSCwI;N8-=E^ILWmyYFd$3l3<-wyvK;=UOVr|x)CxqlqDx# z)bt^uYgH~03KX__I>?1DX@=fr8ytBFy|=_CCT*-~Xd>dvgr!(lK$^Kdi)hl z(4cxogp(NJ^2NU+J0QozX1M`jZtc4pKXBkixD zFL%8GKd^|0lG%-w4D;UdKi`0Ftk=0jL(K)>m~njCqYYcNj5#QqUO>nx#30jmC6(+R z??m}g3cGsKYt*&xT`OXg;BZhpwhnX}<>^1Hui`r1}f$(bjv7pk9mU&r6?7+IouHG)&z ziVAoJh96ao71^12iz`LqXV3%@nP|U#ezkbuf1j!N2$$L*LKp|T)8oqUVb`436&#xM z%Vp%jze0qFjGfUal*iuxH!2~#M3Zua^NyAIrlV{kAF%|a4xP-$kSqRy!%IviCw_6s zaQVOgLGKRYMOR&r{x>!4=PXF__!x6(`SWk$@7mk=rso?w>JPTgH-EY1BNCzwo!?!S z=GGpB-*bt^d3cp2jQ zmflKifv+kN=O#V*w1el<3kuTq8Z^>>whVS`Jco6Xxf`XKw;tS5Zd*S{tJE#gTnk~* zPMU{}7B)RJfm91yHn$)X7VWyVgB#mLJaY23C{ph~TWUmc^zL$U?I0fX+)G`{vc^q; zkcqKL_2Z`L(S_`6sv>I_z?@XFv#(yF??`B9Zy&kgW<_uLbSrJ& zzOWG;74yjHvQ;)-;spklj;uMK?^@hW)5gTvV2 z%B3ynpkVsh%p-9fAD(u`C;U#8Rhq2sa0wbC=8+TK8>v%?+d>}u(cp{ph5dXYZ5?bN z8&H5@hk0o;#3m}&yo8TgDDtjo(%`o0bTTa_oMhS<`${nvN@mCFl z+pDScVVX+sZ+U0)NtD!Ut(Qx}R8`R;zpf>k(jhFvqS+Li<6}CNP8%ChdQeU12U`Za z$Q>Q{MG>!3O{k0nzIV_KPO~|L4Q^NF^fR18=^qa+m=&X$m>@#c1rZ`1Ik7vpuY5xn z72#NVE78Rc7nF>*&vQel)sVNKvRS1SiB2kFC9hK6j3)GND}SqV5W2>>MDsudbvHGg z(Ym>W&&SvR4ig@&^akm-E6GT#XvTy9?6s`jily6YUpf!!PRO~5u+arM;|&Cc^#E%rldr)a2L{s$*7K^`2e`67huUn1B=REx+6gol~vg zUaV_Pw0yWt)%@+I*BZ~Sca%G#Y*f;VU!h4D!moHy7(@x=p0H^)o*OP8bs1*fLl+Ki zZWnWoT=`Pp@v9H^mbYFsh+>yC*+LMJ@Wo|X3|~T*jfP`Mg`B*9H#u81p5LN`|*UiXz)k2ibyRx%-7h>C}psNm`$08m%LezcaPp2>I zL3uT*(Qb4s?Z>(h1X+WL;xs=KH$}Y@@|?#{ez1QK*<)gA=(XZr^2%+-ZDsuhn8xjn zrG3jH=ComLGMM%{#$6F*)4y!17U^UCu}+{ti3nr_|8Cw7Z&`z@CF7+T{k5^L3>3<;Y1hL1xxAL-)fN3UejS3GQHwIqv?ldU?ljOWdEkIESEq9z1!cS0q6lo{;Ycn&LcC!Aq_{0Hhgv~9X~khuP- z-X@fbZRQ4d^^PqeqoIoE87eCE(+11@jM1b^MOeJ9U5eorQL9(8OVOn3TN*B`yF~KC zy7q_LGwplZe%1EDHd|Z6hDSEcY`D1fxz>-hdRsTF|K|E@*Rw6ZZ@H_*-O{w~%jFBS_J3f~K^p25I;7}w}C*Z4|B_OE76n`2wwxYRH}$7;vrzYNiljDO>{6GjSK*klLZneKp0Qr`Gt?Q38$Qo!K|_ION+UPb_G7?UvrNMYgG5HDrp%2?w|!q-4R zW#d4m;;uFjQtapserHyb;?H96Zf6Z?&-rw111oQE{xx&3XmNL!8?O}!9_6C$e4@C z*H%B}qVf>S;e!wbP~}x}til);cQ}F-!-S*Qz#D{5Ba9*#HsMn~77Z!o*v$Zh#zuxr^w!qGBO}b0?HPOM7V~4_VMXT^BtH3EB<)H*a0Bc1k z71RpAfd?X3adch*sw!VYKi#{Rjv*aOInYqCSb&YH!qj7|LJI7Ee69#Jk~6=5ZTEgg zb@<=G>8vA?El18*;Ol<}aI@~NO3}tTd)=DFw(-_2q|G&~CBugX*LMK)WptQvN#{Iz zcU~z+iN=#g+~2M}g!`L_N6RwG%fH#R4bc=MLxawpH+haClBxRGF1qa1E`qOE-sU1$ zK6MpyR6@QvJm}ifb+piY@aBE64SEmHh|D?gj%z18o!OC0T^muHx6#zyxIrknE8^Pe-qoL;_KObG>-x4 zqXR-cJi(N9!Jai{9eVeiJ*7n`H83@CmF*($Fb~45u-X^!D&1NckL~11^WfXLy7pNH zkN4V-<^WGbhrdfFx*Jz+%-!d~m&5aCnUA8cs;}*zcMjV2-q?9`5^dj8nM{OkJBksw zZPEx#_l?syAXJ>1r)}>cPTOD`g)Cj=6B7Dn`u}u^(dYJ#>*`uQ)cmccR~vWLyCm14 zVoLQj^`3gSWIN1r)v|3pV-Ex)hMA#|&o({FkYjE%;XPLjcC?8Y+Ma)*Y(LVj2-2>A zb$JDScd#ufAxMa3bWh5H@qpFInN%b5Q3pA(4RgO4j_P(X=ke1Yuclv3`{^r^b4dXy zf+?7vl8?`td{YIBLT@X^;({~d$}6!3MJx)u31k1v!JhJ$uNl9phMCt zTT)}#1v^tdlPm(ydBn`m>Zbh;%-)NLsVcb#JKIGpa&q^My~qE)xq&2qJXi^QJ)dkI z9X#*)mbTM%AC>r;+V-tGzW$>1oh^TFdA99u>#lG4Ud!iOKGt$e%S4O6^;2y(wtcka zvX*@}vUVlX^+kU8ZTl*hc!|NQa3+v?TcCNp7{SViz-H>d4rTJ&gk2l}9 z;ReYq%^zs}ndD>5#pZD9nr7?z>1MY6sy1)?e#yga-)Y|7T)+1Emp1%*?T^+z(w=K; zTd!OD$#seKUs`+H+L^Uitkti*cx_kHKij|1cChKWrYD;oZp*ZNZo_{y-Q9Fc(?pZ6 z=~Br=`>CdVP3`O7+xSX7ZalK?{>Jgv#~R)1Uu@slsM_#A zrDy_0sw+^^!F&uKCfLFR%H;n)j}mUUS77!_vxN`W{vO#J2t;C;-BK@GIE9Y6W#TffNnA9I1Uxpy?{kG zn}>}1s^o~ZsAY^3S`)M2voh-0b*+LN8|xnCW+z?t@l0aWs$+fs6zHSF@&GsOzaHgL zw4s709`gNCVBl1kL+RW^hzm{RT}5uoWR)H-7&%4My%2X>W(qTk!DN*lX3UH{oeEiE zY6Q-j4qeolsnU&# zI6IdOrhV6AoWli`V_uMNEsO>7nPFQfC!J4uqP`}9JSNTAoUqk$z7dsSJl6YtL5x4A zDDX3pX|o=NR&pfOab1-@8DY2)mJf1yoDBM2ChJ#?t4#yZQ$@sf?MHj*M&Z`|{j)@6WpH8Hq0Gmz%~|KBJs)*-Ud$ zOJYH2rf(`-M7=7LFXozYCF1*IRkD53QkEexZ$Y9h8pD+u=~CKCMh3b!Q@oY#fM zT#8<=!0@L3KgPa1Os=ZhHola-ygfOHb;FUV()CgVG)I85~fts4&fW6(_u2kmq&c;rpFBr&hwB`ux%Z@xX>s8D%b&?2=4O%;D^+QYZ!{5n+3(YU3! zkD`$GWoo`X+49p_L)4@LZfT~JKHtx`>-ABCzFIuDiz{vC`>UI2KJi z77d2P+}(V4Z_)2d78b?MmbF@=4!*>9S9ZE|Bk-IXmerIfWE(#1j*K6EeU$?m_aZYWWTfUer~mdsRQ{Bf?otL&jEMZK9z zwE@8CWp?c5+heU7V~$ijFhY1+uGr|maqD&Y%DqIM@+PA0Xf&(X_BFn{CmEC2?PY_x ztJUbb1?rD{yI$s|ic9q{RS&xvLoRpO1W%9~78$dJPH5t|VKsAyZ{ymXMSYj9Ic-`P zY%En>>Y|5M+Qktj%2;HYMmra8#V);%Yj-rnQO2Pu2AO=-D>tPkBHTP34nX<3@}63< z-e@glm6z}$)j`+Aj3e$(D8uniE>vWG&5dJ^8TArv)~KZ!za*&0ZM&Us_Z1>^%nSjM zFiHzzYM+i9-ww0|PuAY8DT-yiu`scT>u$C6qIAyHk$9|8ZL*lz{}kK4q{~_*#TMOk z8uc1oKv!_m8~OQL>b44H1AKnbxLC0V)91XO8^}`hT4{qvU$rkH8{L!Mz@Ji!Yf(#S z+%7F+GrDd5_z*9%&A~uBYoe;=0%a&RVu$|DO_PNVa5$G-fo8*wbCWnv$qjGTmF$$a z6>QfjI@1WrC-?FFfxOvKgteAVJKpTcE_jw}HdO$Q*7bO$O>HREO-kOzjbhUHf;8Qe zIRX_X8FEX`Cw#lO;imj_%$sF{)Y|!_VI4;hB9BgO+r|-`7G0R`#ph4s}fJREACYM7Ahc-@a*QR1!7b>r1NH5S*AoM%)cFs zkNr0|4O%(~)g_gC}g-n^f07f0oc*Gy$ht(1H*kh$~= zT)V!jGtvfW%ausI z|D9VI67D7Tyn^wWG?8dNwR<1m-(`|Xnmvi!8|XAmE~)OPe0NI=2KJ^lSI%{_%>s23 z->hj$7vtqR?Eu496kGnljRIW1D(&^zvmHYw=nF5U4rTcLT&!w6WrVw@Ivy>RF?^5j z&mJHuRf`%Nl*#F4#teKro8s54ic6rK}^7kx}+VV3ZWYbf~PxNJ&~;3QD^9|A?Kw{DYJs>ZnDO5jJ*Yn-FVyOm8Z00 zT)Q)rk;Ck^)YchY39+6|U%8S0K`02hXV=)XVn;mcPA`0fYxl=ZT1hVyl1cnFhc?YD zyn}1Ebb?xj#iP^5yWv1dvJm9jjXtj#-_hcw;8RP0SNxoBE}&psQIn%xnp(z? z2z;CyCEWAYX-eV>SS8VJCawtI%C+l#hP*`V2q`MIP>-=?0;NIwQr7Ru7^sFnqxUia zZH|%$Cb=J2JaH}4Xq#Y%N!x%t=i{dt(Hd%uJl?arT8apq9f!{2`bX%DMA9~uJU!F_ zOxZG{xs`S|Kv{gQ9u;VbbK;!jM_hY2+$qw&C6Cc4k1cA0PWjFoc>-<+RI=yq$fCF| zbe*zAqDWQl_{7h*JrumZSqc`Rq^?iGL0e|PP=$%?oKM2nV@Y;LoKT!$k9y zZ|$E#ikRC)hb3BnE$H_bl0_SwU#=6o$%N}e!%Jbhs-)|MR7qE@Yon%u^?q(NSF++{ zG;>_uK-i(!(xgNK>$haKgQX=g4_RLA^F#p$sEj^`gHeHG$Rj4K<+n?f!*(_}s zJAe59Zr2Z8fI=cmqwgAdWQ|w0f9}EAD9kRNlPmxc7ZD(~`@%8CTr9^59XwxMaWbpc$w;^>sWG*9PS#~YorW~Qh4p^FgD^oM4YB{<0{ZNsh1tHe zJFgPKS+0V!eA6I|GgY?4<5bDy2}MInu`Q0e@~|*o*qWahTT4Pj>YoSY>}UILZNY24 zUwV=S!QwJw{L*?wOMB9bI>r{$>UvquP?>AM9wne5AOJyv2Y*d%X48K8I)2}6&I9)D zB#RftrL`FJ6)Vj+^R;NEMny{LEVt92s$r*vG;;bro%PZ|Z2H;nx8;BqyWm#Mo|Xd z;rF6A9kMp_s8sO9x6cDVWL+u(`GaR9C~P6uzjGc5n@Edw^iVS{k4z5KKZErf&?bg1 zx$~XuNb6DooOKQ2-ygoBC?ef=&rj~k0|S*dh*6Xt|JXdz2p#cTIJ@m<-#xz*nFZ@~ zAV=MALx$!JaF>YRaVf&nub)3_c>4A5DhN4;=PJt$>u?ne=6*Ij{k`*%85XNFRaS~D<}T-SqomLGs*+IPW)qdk9 zoV&?%-YYRN?Ut$GwN{LABlDf$UN!{u>g47ZnQmGUkVuw znQm0t@>2}wk2+5(lPRb(VYtweL^KkfaI2Q3#NLH=WifqUs+=MPVY%@QlX8@koFn`zg( zULc@+6cLBQW~69cVMm@S8~Avg zdJuIT*tvy#@bN1q$ivTFeL30x{`tGONaa7ie}1J@>Ny)k=Zwv6mu>#)Xk_?fBX8XJ zYXaW-(}C-PCs|OpHxCqz)|!&J7%O8dxvGm|v9d@ycVNweW}@le3arJ?PVepi{*HNz zXm9AG54uV;7($-#YFe^%Nt_F`7Cq$169^W2;S=*yV*-L`+nsad*6R+>_Jg<2TSc>x zlc-P6CmYrx_IR+I5L0fWE#vURCG;p9IWxCml(i)C=*3r2Wa0}KP4v6Bv4Lyhlb%(r z8T6K;y0W}1k>;f4D8jtYy&Jqae*!u|Kq627WqzT5%Ly*z9FSeSI!Y&_ohH+bDx-0e zHBflR0 z;O0R>sAB(HJvUwhHF$AASZbx|THfMtyPP@Y_V>-#$0*-2YbZG2}Dz z+E(x-xQ}#@QPMKmnQl!%w?1wYNbU-KX5K~q{<(P|YQyu)77v0#1mr?Q>hx=Y1rd<2 z9}GoC*P{~ArccqFTl(bPXLU>e<8CMr;RojUfIM&yE^r01H;2 zps-l*GRT?vx#@L@Q0^Ty5pQu!kW0RF)?IkZm#_;0c3oj*>zCJOWm*5=ujc?4w*OwJ zQp61)jZxw-1+#40Ab{S0)rM;adl)VhGt`;_^=y=Zus6B(l6PPH>NM$n^CM(LEHTa= z8(ocoFt)@&nvyL#o6WAWt#P7?+c$9xANwj4m4Mb4UGUC(kU04DdDlL$D)M-FRuu@a zfnyUx0aH)gb{*ALn2)y(Sd=zik;jF=oD{+e*Fi-<-6$_gi7c{eQt5pB42aInOky{>^ z4*_mN3v72lw&~egT*W+`{S=FK$NqX3Ir!lG_^$Q40MIl0PyPSo%@5&BM*P8|BVWvd z^MNr#=-HV%1y=|!{T;%}dI;YYuXg=^CKHpS#ya%Z@n$tQJ1 zc32d=`wqBKKqHfT0781>cjl0wy#HaGOBXV9oqlf#fGo&DHc&uB5hI(FCQpB2e%B#| zl#-p1=(K)kLjCzkDBioHxmR_w>*5`|JuT{vzH{W^P2u6^hNSGxE{3P;RVRb1A=?5@ zT;b9$|L~PuO2DNua^o+Q+xq)|1kJZEax${2Kefi5UKcRa@(_>^)41+_5$f~DKLD$) zrI6U44r}`A$Jv*n{3HwD#y#vzGEGm<#0olJ+g*||%>*m3W)2`PTM zR=3MevPgbhut2QmRt6Zk%Pa1gTGmvAoW2K3yzNnhdI(75X?x%h`L7o*pAp8SPke7M zxzOt51c!z@OS?$t39yuaHaJknPtA|_AAf?~J;g~D&6LY8>jWYe8I@&{op{AAZU^P; z`wvLjYn#dQX4M=rht_14{pa@wQv#YPzh44Q2A8ueN`gPwSL$3BBy5=0Pqj$nFoG8@80J>L5<5%|SW2=e511@E zX|}&S$w)o0RQ*|qZ_Qw)({mC;)lz3l#&vrGKJ$9&Rqf63 z=jKNyhGrlcGn=j$efP+tqBjh`z{*7vo4=!A8rm(LsX|UfAvB)( zAFN0~LVbaMfmps@IZGbD&7tnU_0RKTqP+m$An=nC;hrUJinX^osbf{ASf zD_L}lIei)Xo~dT);zn80jNepM?IOJwv0VZZ5xw!th=gOUYLCB&_3e|Nd>N&*-tc=V zD%fgi#2z@x$*o_+oA748w@h^^lT=c#1caPV{qvP7~OUI|iUL5=7*muV6 z8T;ti+c(}nRvrtFUAg)4v5Uth&iTtZPo49?Id>89Q*WN$bjS7&5b?oJ?OYNyHy+z| z{kF!o*KIRw`;A^wtk=J-Riw z)w5N(_57`)BY)iZqmiG8J~8sOk$)R`^GIsMF(MUxc_Y2iIIK2HyMI?so$RRe{^8TkJ;%g%QbGY5Dl0F}Fm)mWFGwa*J zHOqXaXjfldY$t2VTs#%#T&gi^$X25z`pi{KnQB)v!yPb1w;l@$e%qiN}40PNw5A9VH!tdg@E#7h=GOR%}om92T z#2t%+_L-PpYpzKG(O3kL^QNL!?vQNQAlkzUNq}h`dH*>>OEFKN8f1d?S}0oWmTJLx z_+f5LjXvQ*E)OE?>%EvbnGJuQYY$eOdd92Gy9E6dmuwXj`M&YF0Z2lRW4_7s9u zSHmrn>te(2XZ?pux|lCmYx^_qR3sZudklMz^Q_c1f{Q ztahTVcs95w)=E$CohxA!9+1RZ^`uho=*|5*H$!j5+oDZWNZD}NOi1F=9_722J&ZS1 z%2~CkB?>inCbfM3TqsOeT1i(a6t5^ti7TJu+q1O-<*npV7@=1Udy>ik*Y4?g@ojZE zL(1=LSgP5>w{YWo5V2K`HEqFQUSa9dCVn~|w@v|{y*3pM$lF1KWcIT&o0bq18uM5J zZ91-TdUYm?PG3|W;C!wzk2$23m})&gyhCA!JH127{atrGi2${BIqxj=49Ntw{Z78U z8f?)WKb3Pd@*d=Am=5smPDPBVgp~<{ufc@f)Rz0WdAb?@Qlvr!J+ecQ96>`)9;NCLV>e;qKe#L5*HEd5Umnd>0_n_N&Z8c4 znVS?HNjPn=PuP=%;=c3w(dCXJZH%O|@o2Zc)TZh2jU2&QF{LFvx!jYpHsW1f;!^$x zPA@Xlf|e+g@71#Y1~bDshht7p-AY#+;aE1%Dy9^YF`o0COc)iVBKmYE)+{8A(#yG6 zftaJIansVM%b;wUth6zC{zLr!I~vg@9TVq*xGg3b4?V(vFo(_Mr7IFt4mHWMlruBC zGLX&LVd%0sYKth!ZH94N!Y#mIa9AlrD;+BuTH;nUy@%gVhrEi#cm&^s^ z7iPK7V$WBrs9~wp#-tIHmA>#l`R;O8QL<>#)3RFABUcm;@w2zf+6^j$$dj02vAYyD z7UaA(vCB|STw!U;;@)&TrSpN6T!o#1`AZT-tOQ-!2Uy0n1%(`0Gh3lapP*3RDE@#jF`?Rua{T6M9(s zWR}!}U}`9oxBd)%~PNouXNqiLlzRXAV5{lMai)ERH7X33Ot z(Ofuj^i3_|HB?$ep_EYur4|xlG1m^1`M_ z+f8z%@$G!~Y><+;B^py#T+uO0I%Ku35Zn+_sCDf!o6GS<*#a*G%uZcZ(ySRgen++{ zW0*-U4mM`igkqG$yBL)^n*b0gP*3oGS8QomI|);j&bD05^o0R#cvH0Ai66+CsYuc#eNg74 zDtVhyJjXGu$!H0o`j*^5b;?w5h6~J!nIwJ>)6`SJnzqxzhuf6nMlp8WKDy^$s>F51 zxFn#@ZRLj-rc_Mvr`qTZT9{yjDd^ofsZ1|Bm%l3*y~-9G zbErT&(~F*#B`VHQnal3r+oc7KB;=Gbi+Pt=fuNW#@a;_9DADMBJ(tHE=!N5#{E}mF%+nR#OLow3kR>| z+iiKsE!_B8joeBp6AGJO z91Y5~X?2oo2bQl!;wk2>VNKSM&SdA=bI0z#rewF#$$-fssYbNw?|KP_l)$5e8(Ka*^G!SJKcPHt?Z|q5h>1{OkoQuHuB14NtU){B<8Sw z(Pwd2GVa2DF0e8t^C_xyd(oTEFJ`Sdvs}xIF`1I~Ga64wn_^m4af(vh&Fzk~=Tx{Q zu0}+bE6@!s|FDsEQ_$a3p`1keVycv#{Ml;4=xy-P?Hb+s<_(S&C*4!;l+AjN?Oip~ z35+AW-Q*`5RqNYLc&Ei(n^ms;Z}lGoycnNBDzJ^PR+Ed?HJJ3p7gXLZB3ErxImtgZ ztInAzc~Otnm_v{UENt15%M_5Z?grMtF+(mNQjPCiuLr4K{+EkjT%VsKcMPe{mLa)m zSjAetfRMynz67?C6+6m9!&t9?Hn5}gC*JXz_lU^9j;P?O%Uj@_0DOE;i@+E-EBp=y zwQV{BQ_LX%MM%#G{93;=5q<5UxmV?)B1@wx_(y0@8zA#JrwIWR0D**$1b@EJg^^{N ze122~tKd34h^W71H?aNZ<>bva#p-0 zW7ryeFvPyVy9$FK%%j;zh=p@?^jKriAtjAR@ykxk_4~5G_OEVd24OH+RIV6(_x9{a zfA|+e6F?8j_RqU(Ozpv9H!hOcYbp7 z05@;jK8%D|m>ed=#lo}zb2pB-7TEV%$(a+>IFtXax6MgxCF5wYM+dqe4uL z`y^Ygg%9t^g&KKU&(Mv0(n^^%S#F%mrZG-pEsdOL*ircKv*vyM_f2CQtSqy-vRqv3 zZU!~Imfh*;$`RdzmF*&%XH*koYe`&$Pc_sV>APoCLDn{j3M+glhP>Lepva%pATDY` za!C=k$xBqz=ZR%<@tRObVLx)(y+=x(yIH-x|Jf;(l^qoDue=3M&L{&Orj$>oOh&h! zb-ZCvcr^~FCdLIc&dm5+BP=2zLY~2>l4V0y-jxeRm)ch53Qj-SU5=`oIkRw`_9FLDl4hkOrjLJuE`)`KqfYwQy~en1HjM z@g%gBY78Zm=CHCKoR5_WXhieZ3l8-UzTkYnh}?Oh>Z+NLN9yut;3Y^v92D3@_BKjz zm)H@e33Es_xoiC%98l}6-#ddP>rDxR=M=!;?1x&TVaMstHh2d7j z-)pgWARY8j*{-$c!#Vp!`I4hmW+m%Ut?uyb9DT`|zn!HwuPbp|7r;Ax= z(&_ox{wJlJq^Yk;n!2Z)wK57#E)zu?FeGiRY*bA@+5JS;lm|Vyiqs-bJbA#@4oy znCK^fM!k*N+kcT#Aq(Gqvbs9CM%(TcBg@c@@bYxSwa7WKf2C0E92bySD!d5D_K0Y3g*E{<(`(2ndo9}v7=15s}UdR%wvgyR`O^=bm8%DGyD4gHP3F6<0Q~C z_zZb-(dw)*un0)Ha*s0AlMlr4L4{NT`|-<)PbcU{?!R*jn=P;0(|?3fA%xR;lC9#y zrSof2erti&o4e^&qh9l)M!`VqeED)n7a@(r-uC2tfA*BXZRa9&dEw8r5cUi$b-6H=5r7UHeNG`Bs#N?tRyG zXxv*jdBJk7lO6m?ZZD5tliEeBC#irNW@=$4Zn7MI5E745-?2`ViI@ML8y^E_;i1uQ&5EZd9lsVq4 zmb2vkpTqC}cO$q$Kq8)&gq;C^La#D`x%RnEwpMkc+az}>3IRzio~CFQ(1FNrOgi3NR^WRRe5sWW6Ry*{(uS06{bHd{qa>Sj@1e z|8qOb2Und$9T^^?PoNQaZE-G29-rxE)d{){6bI)^q%5idN-hdR@TyfH$~g%S)#`+# z6VL`?o(~vsLbdLPYGv!vaH>_C&*y-mVr(P5%t5!r+#cPeQSF>~1?i~zW`L!oE4MMW2rJ2Z=^ z%cFTclxE(CPqCInj=iSE$9q2H!<6^gmN%iCDTifY@T91uJsh$6T4iy_PHImY?O^!c%`L4b;!rq*0%WRDmF8f1giIpP(31#vYYDxnmV@HByUE4}dY{&ED z%~FIU|NLrJXn2-4VDmWXXDHJ3HWQ0wyN;qbozO#ru^wGh0EbgZLtym#4;{ZnzJ>hz zA2d__lL7XM>NvTC!MJth;LWWuE_qsR$u)Yq2%!R4*ga94IspkuBp+tcR2O#lr> zq+J$an5zcP+(gzWsnCl(ZLcB^m4FP#&1qi-U(7l31=R0C#fChJJLC&p^69K<=6tDGe1PQ50sq%?jp-uS0zE-WvFW;#-g=mi)XZvhLkw2Q5~8PHk13Ge&3q z6)fImwmc4xA#U>rO;p3K_j_$Em$Q{8qBcZ;V{J1zI`eicjD@>hY(pRKcPxA9N)3KooIn?Lhzlj~wv%DE&ax&Oi_3CUi z3ptlcL>r|=1uMp<$(MUrqku-9ANk;+d)}yeJ;ETD5j4z)K_=xvV6DjN3IuGW4Aqv5 z++D-M1kC_h+B<+J-b1c@(0w_XSTH!tbAeW#D?_4EgB`7tNCcP1UElRE`0_@}HWkSGH?6j2T8xj65>@;?Tu- z99+A-(Le8zYjdzAEbqVyI9q}v-t0ISZPe(lOH-(ykmpX(#qYo#2xvs~T$o*3WU zNBQIkZfwhJDGJ^u(bYNSl)34t!39_{YFHJ73)6MDb|u!5$mFR_gL?6^{a;?k-gn%~ z2uY-E|bIRY)U8%dbVyI13gw_LhNKT}BKe&vQ|4O%jvjqUD;E^5n9- z=sNOVSbo-$$kQkC$bjO(xpwux@?Lgb*EyHZ!C2hQxKp6L-e@r$a@nONiz3d=={+}K zn*}5iyXhzbxVB$0(|`5`_D=6y9@HKgsOY3}(ch9#1$icE4|q*Iqta0-aRtB&YF}NC6wR*Uapwlf)r(~Cy zDv(U9Vj`7es<8SDqxB{dt5a& zE}#J@5LcATerw)K>_o+*id8;@nc0`w+7Xq(7xL&VEtABP%Qv+hv0Ua%a|7v6EAE^9? ze&BC&U2wpN_Yh9N=xz8|0vdVx$Jg->i^6T}Tj;9gb1}}AfvKf#>)2b=q7n{T zL)Gr}!Cd)8tl*Lp;35HyocHU`@(I{CoKUd|Y0KxWK6CPsdIZ(gdwB6v-da~iPJa^9 z`OPOFan_PZO?opwisg1yNHiJfmEs-RP_V_7)mXC>FS0+Kn-DgWr+?sE=+B*0g+-H0 zsmjzStv+Eb#}u}h3HcH1q;I_!=9-hss-46Ir`7tq4J3)>*97qCs9hNoHwUv#Ud%Dh47Y&l#)_$IqFZaXGsK(d( za{MTFeolp2c&O}!vbdcwzZ z>hy{;5#&986Jp?+`=FPFw7%%JGV5CSDqIT!iM1ll9{cK9q#6Hy{nXdNg@CC=k-sGH zdb5QHk`SGGE$Uh)QHJT8s$Fw3Ik3H7Hf5frGkJbkXG1>PS-;Fn-%tUu_SigoYM@G{ zbttCo2$@R&8=!kxdkQu2z6l%f+E(&tY9k;4xRQ7ez}$|UEKIe41VAs|*vXvJkJ5O0 z)Px)C(zy@fWw~A#^0Qw0#{V@LW5AUUsm|GzPly2y+=H7T?+C%oU_$am&qHo~NOjTl zx-{ZBS!C_^u=ia2?Xxcb=(oX`9h*S1T!kQ|p+R$dmrry3s@(8%e#&RhS<^w{@RC_1uy2^27AtkU@!&SotU4plE88zyz8Lf3OjWg-%&Q0ZyDvqX-8MyIpjBtcU5{d3 z0vb8`(w&FMdbX-P-y6&e#fA8JtvwRlL767)CvY)XOB$RO^3?BMvln@1+}sYW&JD4# zX@;uEitdD#am%X=+3^^3uCSS$xaqZr*fK{m{Udu^qfop*gWdb4AK>a7UA_=saogY? zDCAb2lY>vL!^y<+t*VMVw>Px8-+xl&5>47SY_KCbW%uaP#!rm=W>_E#)vK~lz*H*? z_xR7x!fvv}FkVsZz^R+(t z%vr5lFFm9B_=K<9a^xf_Q^n>|2-UMYVi+zKKq6N-kur6 zqs*_wqrfh~mPz955?PtwVx~1kgK|+W>t=IohB;&>^Cw6>A&ne$>QGjma_#MZ@K5mI zOvH=s0!4Xch~sXgOmaOrF{<84hW?Bv(knO>1jZ zu$(Uh&2CSu0I`WloQDDx3g(Or(Fyx;U?>M4q<8n9dXcqCxR=GND?ns68uJ!Of~w>q#vIFJPkWd=$4H{6-mlCT@E z#cq67Gut2kJ8N2rEaL{xt0ckUT{+l+7w{Yv&;|#a^^5KA_g{dMVK%zVR>R`Nnc!IQ zC(ifM`X^4^|LjZnE(flYFSDh+ID?A9rYM<_g&0UCEa61Fq2$!_&ClZt3u&k?xYnRD z{KBe1rMh8E3WLfGaJfDMm+OM4%Btcp3h~*NufUUwb3)~n61WH$uiNM7v=Ua9BX%8> zOQdqi8G=YB>~;Tl;B~&05zq81Thw3<=Q1vyyumAJ?AaMf0SI_`eKVs~0vPR^kdb$f zs;4G|G%Gzzx$$x^d|{Is`P%}@{pWoL>WZxy`F}R4!5yAu zIY!}ZybRMYqkqa5Z7a))<{;w{)46&~y<=QJ<1!u*39+yLl`)Ki;)=_%)peQOiC~e* zHvQseD{nRG_`P|01nUyg$m#FhhzN);D0cVtTe%srNd4T5ypam3n^bf~Pc$1sJUJd@ ztQdILcJ<`AfJV-H+Z`A6AK9+HTD0G^%wqDV2Aa1~uvkKLxvfiPyA7w$I=H1zlUqd? zLO>%Yo`WzzA<8PzBc^Fp#z(2qV||&dx2%OHw+ffBIa?T z%hJ`AoQ%@cbkmZu%jJV%g8iuUw0g&ckVcNGe+WdYhePsj;;rBKmCzksn`UX8ZR~VU&FftCPuD3$+9ta!8WWl(d=f z4CLq(8J@wH5YkWsfA>y`XZGn#kwV_JyfnBzKLDQk9Vu5#sxHR z=TG_g0OcO`sCbrDt6xzT%;iuFM=q~>oeHrgKX`qBuMS`w0gX`aILa4+{>p&?U%8g& zF%Tz^QOqEsm1KZ3YL0iAs)Aq5yJlIw63|HOuc8b4kIaG}Ai99t$D6Ub&al$YWRdq2 zcOya0$zB$w$Q^reRs`oL{6R5iVHTYqey8t!psSqt|#ccr$cJd#jD>$YoLO_HSfH^B0(-bJ1~U(J@NS+57KZbg)2Ny%r4=K}TF zf@)7)pgz9ec?@t_{M|*1gu^hc7wg>0R=16icXlJDN%caUQ~{0Lzx&@;?s2*~HS46r z%?hdY5y0;{^;X>JU>t%McCeS^fjRZ~uJyaXA?N$2_m&H;n?7b)*%jasb^%@o=ppug zi_kiMv4l*2c2}mzRTryw?p&_}uvqr1$$j5{ev*9mV)fYo_6{FbvyXm2m+^a|pisM) z%3BhVaMCBPNQp+R-nCyLMHR4@O$@p8;s*ZdJ`LW+-VI}iMs6DZ)@T-G;V;~75_$XQ zU3>8r2qas!;Use|N}JEwZO|2|qLAyDE&3LB9gZ>wW5;1EV3CbSIF~mw_C|Yr(Wmf|`w(Pao zf^^u{SWKq8uC^J*vtQvJam0xM1T^9~CYd8&DQkB1zwA`&q1;`|uGNp0a|Bu%x+k{V z)BbQq=16e^eZi`pm=My)>8bjm<5yii%vSiB>`&X&239XRF&KBdk)_JWud_$ZN>{lO zZq%S(*;!4Pz=}c|8^E{Fub9-Z2UNwzXn~RqrA%gKL# zK+VG%Pd+G7k{BtM2c}bP*rBM4yKW8k&i`jECsD>lmg&} z?5^4V%vEZ{FE%O>4*>a zO#H1$88thzbafF~rn$VXC4*B_4OO*0gxwR;$kF=73kOcfelEnai+eeUfw&84NM~pT znMN?635CUpLL1LMcA%6G0|{v#IQp$K@IaBepxWGjz{j3NNy-wF(P@pNoCAs*#qiTn z1~7_{2KJy)T|1`P-M=LO2@D#2Z7YA0Vi*T3s)>J`ua zv~T5gu;HZ*8-F;qcf(8DC8Lg!+~zxnuP1mN{EEDIM19U=O;!punYvbM@zr9otPU8Y z*Qj^zm!0|g6!zgf``5=df?X2={6rx$xAS0rCg zX?q#+wk$NMpp~3BYOwdWqtnmMOw%2l*b5o@j7Qm7 zy7nhuP+&?2d+IG@>>Bk}n8R_;VYHOHA%kPU9@T!bv-+R4%u!0-EqiL0S(a&JjSH~1(KK$O9CC7`q@Z+3 zS;`wVg&Gb|j@nan9WVTui?#yLo0V*ejh6N|Qhj^Clc zN7a*KYe{5sG)xV^74QD2+9MiuZP?)Ayh&u@uJ8iu`GJaGscyUe#y|e?S8jYC8xJ(X zJ3paDezW&j6mM1z@_+3fW9JLEf(_TU_ObK$aq#16Kn{OG4UdsN&~x+(l1Rv#i?FT; zzqSz7YxC^(;E1eCg@XJkJju7K^Jj6|{^NGYKH;wNJO02Yp`nDdzUaUu25W=e_gtgqT!YGzI*JqUeUFJ)# z1F-9-)!`ZV@ulqQ;qjqSpE!rr7oEKTx%Ce9t~pdYN0scCjS%a1hAHTu0Niq69wX!b zn~U@HtNbYtA}a#svCo`E!0^FCpZc77;NryHhi7yX>ex|Kt>N_Mvd0s=IU;&AJ1oAviCg zD{sGBeYO<*m+l6;mXt}IpK;oP5qCP>t|0^w6Pp_sG!McL`6&IHKM!t=BGEHyVxyyA zoiafI0uvhWz-?|>2fx4?z}D?TCO6H!>L?_bhb%qBZzE?l!e-e^qIqvA5{kf6_(kw_QvRS#c;PSeX zc*NcTewq7*dg`1t6r_m$iqB_%$2af>+jmBesm_IHN4w9NYHJgUY8ucF>=+L}0G(7{ zOCwL87O{F7dHUi9*(a($5!DyygwiPK`ARKC2QEaMV{-dL;CLa8)GlIw{Dfm)f9Tt4 zR5^Apznn`NPP@BRD#G}?aZAK%l?_DJ40-9B>alSFjhtX^LR|H?)W`+6YPr1n@(`Y| z!RebO*WZtOvXDkZkIyaipS_=Zc~n+4so+F#2L+n+J1|=bXk4%^ho|`+R*_1VOL%>7 zK`16owaqAumS!Sll$l%w_HMh26uyRG1SGg2slx=}zEkAMgEw4G+{dq&CAU7SyNCSX z>*|Ah!^_20?JVHZ0sDUJUiAK*uMTf53@$G^oB9X_SXU2`ZL2n8`{3< z3Q?N%Gdb~W^(-Sdkv9^w#GXJyk}79Q606o#=}5@YNAWxnHlvQxwR7Ytk#ukW&yV5- zxVMLubNm=h2Fm$p#8)*kx|oqxvIFcQzxp9oE+DZESOA<(A%{TwBla2TT4r+_Ij@W? z=_osxaE?kRZHzWkhcIB7GW$K&y|b1^sBalyoqKR$Z~uYsvF~};atG7l?yvqtQSP7{ zc!GB_Eu#kUTI?|Q{20RsNaRF%lK1%U`3Y;7^)9zD9nOH0pxUT@WlqI3O{2pbNg>pR z9cS!uj3c0t(>D;@+kn+Tj(m%m?$;h?2lFg1u5NPCTWi1*Q;-yWlw1=Epz1g~*yWF5 zFaZsM?hh9c@g8Px|6d(M!R9;^GH{o0Hg8HAp2dXHsKHQPPaJK1NLSz z!5{4Z4qISeOCzT}4+%=AC@4ESyK6q|X;v56}sO}c1zagm~%v1l`f>?Zb;yzUQ}kAOxdBPay# z4jK0M@BagQ=18hP#io^V1Ies1Xj-#TX6X8JiM)eoaJ46eU%&?;Ad#cLco@haF~w~E z;a|W4k8B<`p_ChjRw(KL+V6}g^XWL=Dn#^W=&BvR#=T)lDS`e8p>ifXK{VwhS3j?d<(IWbDP|vH;x(EEchEg zlEnEs#pd8~mQJx-Z?Sv_ETH1dt7R;Bx~1eofeIi zN&pTNm0<>RdH;)W>aHb`)5m6cpVV_Nvf|Kjip{>`MoA$($imc%!DzLb4Yu9$p7{?0@6g`r~9{AaV>D>1>j3b~C&CEXz z!%sEcKlpd{YuZk+iF=trx`or6X=)fo+$e~R$U>9d63D?PUh6}Sd)N8YTvzp<#S|m!+kPA$~$JSAn%FH z@8dM?t`}CM*aqi@ji1DW76o=TI7favOg6v78eU~A=oVh{{Cz*m72;g2!$~v;7N%}G zy0CLXNa>%x@h!ORM>Z~8Jt{G*1v%i#p@j(q#jn=`ZUvW}d}?UnY%he(!wbh}oyUNE!TW~;C5PO>(5bj7 z*+^TQegrlxOpynM7j}*dNF?@)dsbj*K02}h+nyi(Ykx9}ntDitMrr{H*8z%#o#d|b zlydszr`>uz$#ZkC%KTF-8a7P)n$ZP3cTumvrAG}NwpI&mKwvgv#ero;K0dl|XxI8w za{v9XNe>L1muy=&TO7e#wk>>oLejJ7Ym`5lipUx%8LRV07Z51EePMEJEs0$FuxG_P zeqapS;DiyAEtkO7qjUKaJvI{^-!4nuGq!MOdR;1c-WYn{SxgRG3A&YMK>^Q#O=?kL zdtqpD^gSbw4gWWLlk-6lxlWDYRB#$LCcuy;2VfF9NXg`sMEUYp&h1*;H9dvoTRwDAa4h%}bMDp!WZBFvjIDcY$l&SlquB+RDW#{_>{)JB zi@jE&A*pu)jKeD}rS$`A6>#9D7k~q|mPTr~iw>Pcb|0VE_t{;TSNIeXOnLA5S~gwb z;Lw5fIhgaI_YW+%L_6NGVfgQ3hVAbeI=m?)ddKM9BagB^^a_~FernIEa$9W0f)2CY zYBMV3P2APV){7v?1g+%gff?LkQ|ev)H(s>h6iq~uNpGZ8(n)Ih|IgTWz{yrr>A#+w zXI_|j84!4nDE1AVNYgpz+zkSqbDHTa&?FHP%0sv=B8n(DPb92iR@MNnSr$P=49J36 zQtTYb2%(4obba_mk-PjlnRo!Eg)xm zw`bqF^R#7LP;jo1luWveMFNh7mUphG!iJzU)6m8GM)2}8(M1CyTvEVlh$P%S>rb6Y zs`0LoyhpmeXRyy{vziuLMan?18o<@B&tl~;9azT7ajZ;WJ~ne;{rUsT7vq>|Z7+I& z9y7V)zLiKyS7qIHPL@W*M|Bo@V4zgcgjR8ybJnsEtDk?3WYPBew;Rf)dezM^I$g?` z_tsjul<=nWmv`;wjv?_Gcu3F)cj02*XCyn<=T2N67l;1rlQ8uB+R_o__9O0@@wLLT zSiacOBD=43(lRo8jwux+XJF?<63PW6l`p6J87+&xq+#adsI=dtLCf;nc(7M|=o( z>!W&O9sp-8QU%T!*yV-AO&<}i-1UB3asKEf3gOM%>ze=1aLWX@5*s8Do6*9{SHi3z zmE|>lg(l#V(WYL;FE1<%%GM>9lX$O7zKqC`-y_4}8y0E@i9(kUEnz^PibFU#R;bOT zxY!E>oqxCrUbx&p?5b@XcDek(d^7>g8o(t;ivY(SGWvi>D$J&qcL`;l+HRk{c<%F}B7j{HLh$ZQhSip?P3$x;YDbWV2tp;g_spU!GlCzg*aqsQ#pNaU9 zZ9Kd|9=mw%@&ZOF!$nFUlgkIB1j7V$yF6~wF?}@$yWUYN(dLh?-|!6uJ&2nS=FVT9 zUJ7v05?l*?q!q~*WQb_X9C{obV%nUtV>20{y4h&bUvTWT?PZdhESqv}d3mBb^69Zd zL*FNk-G71QYwfjk;sNcWnz<odFS%_DJELS2}kM} z)N7gW9y3bvBR`idMWbSPb^yTb=9wZC%EJ zI9qpG6kH-5ma%EjTi_aw&yH6Hiv^ABW&8RQ_GQ0hp`oZWOo1rViP=IPEpCjcoUpkA zrIhvc0Vlpn7`yL$)86h8yED-DbX<_$=|<-a%GPiH?=wl5-V4Wlu=B-%dBVHNz^vc@ z%<*{d6aM83kgby>mpMr)Z_8N%qca<515p;+6ljAqu)KX~^Cz%&eMKZuzVA#oQkDX* zYp`Aoz+Yvpyg|w2vyo;d(2Av-f~E{}`n4dGc0dHiwaE>?{gyE76s~R(x)S z5z@@hs~eBCCG~bAbG*-?qIIGU>Wpco2$I#!cA0uT{0IYc}f?-S0@?IB+(kw zVqM@X<muiI+5D^X_##L|9wPv4S z#{xPi6C^6f^7^0iXw^RX+H0AekuuAG#35X?6_~OT`M_T!?!w1o#Opg&M3}4(-t|Ik z!!h2T=r`w-Bh88GGrUOjmgJhcH?U#~Xc6|RBx(l;F%ie+D1adRmkuGvH^99t8<9=k1lS@cM(+(_cE)^uB zzuib$o9{j4IC>3yVWz zwi>hF2U_!@DdtENLX8mi7toL6RVo#C6n3v};4%0fe?4&XTh80JKKy}Yocvs{b|#rf z{m5cVt|$^5AZfLvDBButaM#0(KKOo^(E*WAd-RLA5c&uEp7oReg&3X4+M8gEX@C-` zqRo)e#kSnINm8{H1kcZ4D1LD>w$R6lgxmk{ymc2`?#$1GS#B+o%Oxv2oK(LzKEjuzMEmn>N746w^DN|ZGA;pI-X%U=~3&JZs0K-zCE}3)^Fd9eOrm-QZcx}n&S}%m-cFn za+%Td+hBhOO0g8& zaWajyeCD=gk7S!~%N8Gu{V+&n;%w}y*` zaBr}SOPz3;-Vg|G7cTzU^0*-T*z&@rk6aW8@`O8muW;ALUeA==d?zf)z!+|f?>Fvz zo$(dZfNuRbiT46CC+asMn+psQ@E;vOZE<$3d8#5OtdXenrjH2se}3$r;2R*m5! zXLbMxgm`Cw!O@oBKN2Q}5;mpGcENQUdg0#=FVAoO%-rLQ6IYvFuLp#yK7r`B{m=wP z>i`zuMcsh@^tEb9u-%PO9}x9bOS~_0+&$ zUm3c4=zY@{4_!Kx9CApSL$aa$GhZGWle{4LzT}JZznQPkUpTLyKXZP^%#9%KoF~kk zpPu{R+_m8C49=Y|oOR#d_VlJ(GcV5Y^AAWak{GAHJ2N)@!u0p2zchW<^n0dvO-rVJ zGxd?FcTBBJMW?h=r%!F0d}Z=yli!~F^yICRZ=Ebn1}4v&Jiz559$B@>wd)~fq}Jzw zDc4<+i~E07^^RhIwMpZSE>qH~{Ha}(mZ+*rhV*!|x5=x97~8FABC1t=GRUxdX_cjf zU4hd}hqqx+c^IczvHxrIr)=p6%XuPRZNg$pH_F`7L;doKG-G4AdcxrgTV>I*iP^q` zKHmwhR(P+r+$p)kGGoupFTP9#?NTVf*@Jm)lU2n71?Bc+pAQMlZw8|*-Z2#84pTrC zpAkP1?TB!JVBKo+>ND0_eCsr=rtY>ftR~ZSr8pcOm$Ew^rq!&dQcYa`mVracR(JD~ zv-^+t$`z?Gz}P*BQm5mQ`pV40Fs-MYRw=ncK~>V@W)X;qX1*kr`wTTUoOa4AuCS@l zNKI3sp>naRta5gJ#T++Pd{%RDY%6^}S2Sz6qS6@%I_y$cEk8d=%K>Vi<4V0`%`f-b z&^Bfp<)16367ew56*aO@(`QhGlalw-7ZL%7n<=W?zKlKWS~aJ)T|>(w*_@m!TXh+K z&=yEUbEChb9~@j=X=|(jZ@t^`rDUn`8|mYIE+pl&Howf?2nNEvMsoh&sla3Q_&89; zwe<#_T-s!Y-$d(imz{~YHr-&t3VXg>n5Wc4Wfz$G_-GCMNwT0j?2=7AO{;NaeHPX! zGp9oWdqviQ(p+J0@! zYw#v2^^7iW?zR&%4f?p&sRe&nujUDOQ>@9FPEY-SKCjAT1GZ#L+HNt%fG#!nIa;G!0 zX>Ucj9LNg{%~cJ?y|-AVf`-msW;#l@SKhEoeahT0rB*7flrk(^;tUNwZBDg<#c|4- zRa!CDImVRJ2l4BPZYyQY{AX&tiM%pO`zA!IFbdU+&TcgRy=Q*KI2pDzT9v0^%s2;`03P@dm< zDSbSb(B&9oHfc9=#bkz!&HRLxC(W`7Q?P`!8NI%(aLBjK(eikq;bh7_ucGI7rCYi@ zKTKy!DIP4YaE=V?Nhftdxu-DyEPWxUPcgt#&DLenP9@o7W&^Z6K}D$|FLNGcU7o18 z3bX697-#!R&e5&pIw6hK$q!M|yOO`-Fmhm5j4@!tD^wGs_x5P@esHruzkQmDzMcq$ zRI{tJ+}lKoBq03RWIC%=^6{k{E%$&7kEzy-E@yXDZ`Nd{CTO`^ZVz)dr{BS5Esj-J zcI*?hJ@&M_*^aGfb7`r{Rg=vn=;QWquUi84XTX_n#0t(re*PRPuxUIURvXII*^Gi; zb;`EiP0J0sBp87sfml&%0>@)U{%&M+cfer!;Vl2wUQ2el#Dc?)h43` zQ!68%{1mN5r%+@$x7%)U_8cowrzSB*N%aQq_f?7$Kc_FKEJ;5TQDtIm$+OaI=C_L4 zhP{cNFLi?U9Ivu>*vuAct4hjXgX8n^kj{o2Ia`UJeumbgkjt8^Q)`OW8m^42mLKcU z)uO}|Dj_Cd2vicCR<5RC7sU|+!B84!L56TDkkx@9bB?mol|bd|WVMk*(iIFvTKf3* zZ}dC52%O(cL+&!lV>PK+S{$3C#jTn-S&4&U1FKZHz|S8~i|gexO1@&)$b~HxCX|nj z{=a@Ri}h@7h0~T4TwI%XG?m;)VA{0hb`mB3Af+>|c9l51E2g3;SGlV-bBS%q{+m^d zfSYCf_DU|+WOIqsDDCm;YG8%sBTU%XX$3RMv}`m(pI-@N!kndU>gq!2ytI~F+}Cee zwbtw?l|FePo3nY$UBz^oK3>bG(tI=DlNP)dg)@<5_MAbVuNI79#@7m!W!9B$Ew}Jj z`h2C%Ag#9D>_$6Mc`FuMypTR#(%9@sD2aq>GPzL~+kG>AyqK$UY$)r^=&Oo$As^pe zr{#r|zs}Uk)_jd?C8aKTZ}fgD$ajlj#!<2s6M!v6XQ7%@=*_Gy2I{_US&>gO zdrJN1d(}ioQ^U#-pwrQ;F3R5v9yp*TzP6)BcIoQ*DI+bf&dPpQev{>8!2WkOpJ%Jt0~iY}qrMi}9z!&Xq_>%Saxk<-SNV$kh_K7%t=Wd?dHyIoeV; zmtt(Wm9i_~NOi691sQ$Z$?6kaDsgVSXsEZdL7RM((#BS;R;7bA*NY`L!{%)H)I41u zs-~#1SkAgNU|lS_8P(jqGj_pazG}~6RaxwYm{`tfO(+awda$^w z+y9PoBbN&?woJFX!s(+B7%yiBXEzEqUUtZ}1j5^M(>-bnZ zC+%i4JHAiLneTY1biu47m5hU_WPKfz)!*#+ z3bQ%do_H|XZPZL|rrj)blFB(1tv`~r1Q>(KZ4B5}^Ql5=nD$#G6l#?ig_JGH`I^2F zV3#!X`CzH(W;B*?y_ZWx(#Ar3`wO)GKwI0i*OLvMX(g&nCMA1lu~!u|1hlnUaMjEk z6Rd=;XBAHb_cNWo7}juErtM8G+G+J}ub1J|wGt<1FqlSWTpSjcfv+(hcQ#PXaLKSn zIXp}k@QOLDDe#Fz!BBGsS&LRFq4e?o8%wTNAA2D|0(e(6f^aqU6SQRJ}8qU4i zQRL<9{7tl6A5A;CimsI|6phhzg_-fua;iJTHZ2~ntIQ~7sj5O zQ;seUYb0fIloG@R3)k8?2shDNP*T4~-r_;MB+s}S)`%)AJo0Y{H@*AwICdD62@f#_ zps@u{y%b6q%Wg$PPO3oa*)gR;?Ii^NaOrze_}$$XEv_3s zNA8+<)(9*YtwqjsO9tMotXAAsr7B@c3zjb;S~XBCNPde8ipXu)yZ*&5BBDvYhG1#Y zuaVUii7sahnyndQw&Lw(h0{KRItGe`E3Z!?wDL`M&-!hjK_GJ88uzhnOJA?x?IUgO7<|X3?863TMkJ=ge+n%29Ecn>kLn;{p8g zKrvwAt~mPY`|f`yL0Q)tkG`bWfK7gDRKtXUqF3x#(s`alMnEI#z4OzeLZZc7AI4 z_}cumK*bosm4wm>rIXRe)LD9UmiU?dT6ve_s!Ax zsBM%R-8(uwzjf}}k>8FyKJxD)cZ|GqWOd|%5#7icBio1nJpA+F{~Z48@P~%qK3to7 zWjH#l9X?}t`_P|Is1m$ zNkn9RIP=iV+RPyYe-dZi+n>7HblKY}R?We3tZDU?wjB9q=G}Cu*QRS$kPOLXcE;nB zI$G(?Ut~{tpg-re=~#nfI+Z}h-YGS`VTEHvEO+raHq!1o(t4jFY*(D|Yq4B!aWe)4 z6M_zvP1DY8q14~nvV*VE^A{*JzoTmhf5k_)-Q1+KV~;ZC5j7HzVoYjK)(&}S|ixI}_KNZl%J zl9$H${Hm|fvemU5ldyb}_IOg7$*;7!QWI;dtgguRUQCM<9j+Xx2Lhc+NhNQ^<<(n*8US(CHHJSILA8@f^~H~OorKgu=qCP&*JOP($h z>sNI;jFVF&S9MLfHfIyNEumz!Tog!Rg_^Sx^(0Kx7172U*rP=wy`+bUo0(i@n^-+? z_?vt;9FA9Pf{U#hULLYg)BJEDos@ z*1F2-TlKE;?%0WR8PUf5OgC!|WFz`QF&9*w@t&pO-kXMWT3|NR%}mCoDrW1kxN7`Q z^h@JLr<4zLWN=dQUUoGxk>4oS#c_q*Ds8&S$E6mcv^>_e6*-SCo%AGS0ezg+y-O@# zEo2yNE3WATR;?yqa+*3n+8AFi(>8K6w2g|C&U+uh7=dBI6cOytY*lm-cS|G z^GP2QU~JKql0RF~C?tYd&gD(4wq!0k`CJJbkb{4t<* zl7+2RG%F5kT_#r~*z3e{M!w3HQ>lQ{-pYq;DfLZsTq3KHc0B9u)IEi+y-_sXva^S1 zmJW1B+74s1#lrb&C!n;+#;8B8jo73GE~(XqB8@6P9r1eMSkrZc^H(Xvv*(7%) z&-^4U57&J%4p>AsFPlc%DnI)Nu^hyvOxj&{aGsV`2I)d7e)>CGsCR?H+Z@2+XI!+nTwIM~y%O>6BmOL&mdh~Mp zH)ut{6;+dydK#LlG#wA6(+6pUM;lC;6Kvj_>{?fvor+VolkT6iL2pFH1+pz$JLpPQ zSCXSjsu01R#jo=x3K8BG^RC$B?!99DI>!oQR;q#(E|k-hb3?Dv=L0!KxfluPBKAP2 z($lsTC;8$4}!>Wz=m`h6*5hUw~@*?QO;FRx_Ie1}*K;?Fu4a-d9A zwx!6bE)XA&gj-WYKCa!Kv>8u_uTkGVtpBBsgT@!C9wc1vff~gr4XWlE8 zySiqk7^taKRX&#G5|$r`<`bz>gpj=F=`VSFOrMt{2O_iU7mQx`mJId*D>sY!q_3MOFn7`y z+^tNSwbu)YQnBQZb>%w?VtFZUy4<@v6cVaM@N`nGoHsYfI^xgYy|>sYp|rZMW4X`uin=P0Kkn zu_EhAMjGV=CoTgeovp$!vRJ(7umyRy{Gq16=#|q zbB=2VY$Z?X{FYb_Y$=4*T}5kGzp60s3+K}E0ruDYcG2I-l|Y%IaWa0ZCS5K%m?@4v zpUd?8IVRCfrr>?(W152XgQ6g&3a|)>C0eO&-4o87{}!=45NmRIE?_E_tGQ6KF!wTT zf6l;XyB<%*msge|%EEa!i^aNZvK&Ud$`~_68(9sFwraCUdAIKMyYp9)U(Gr*e%8I>Ybc}oBInNU7k$L6&D3POvM`7f7_Zj0B&tqU z7j&>~OR3m(R1!ud_b{y`;*riaZpJ<_}b%VN41xQhOOtCr4ktA&&y5lOil26;f7 ztXZ8w8|MmvLPr;})H41p;#X<2I<9Anc6uJ<#FGp z<(W>}&LxejHMXvZD=O)8MMpf-=)^gFE!5B$Wg(YIx%g}G`I^(fyH=7gHd$Gd$*Uh1 z%iV?+TP&FkxvE>v=sgPQ8B`F6I9M(eNclq0ayDP^)oEa*v}NwBnTw|0Iq|u%UybfS zV5LL?D*=Qe+-pEQ-bhe(7F<3?mS;>|Tg76kDug$E6&IR5^bmIP?6ET8{s*@qFZfnw z-}>JkBEc2cn)XOQAi?5XgXOzk)^E!-oo-Uif%$<_L2?hW(jLA0&XJqHeb&1FbQkUA5H7*1*zDY-+lvESO#Rm8z#F4fL?*P0#b_9sDh>xt+Lfd zi?@X|Nd{RZ6?4A-K_@VrT&g;XjZ`=AoWPs{ELLEjgGBs4NVLPbMu4(uot(Oi-}7x6GXVpK_;Hqa+-KlhRxT|IBs6S= zUSxaoBgmHfJCQ`SbWnJ2L%nDHp+}aNaj)3Eb{_hgCK2nsMyosJWb&p)moJbsS;T?f z^)Rk}4oa>(?i>JSzs0zF{r^2oM$EYe${?{h)woCLNLLj`KI2v4Fk2Y@I>KScmJ0XZ z`soA0y>~Es*IQpl1!DGgnLq=Cr>>c}XY41V^RLD1_94n;JE9VyP9&dUlM!cUCE{6C z(oVbJ>E#`B$4UgrX-CnX?p*)U)1;|aTi2`rN1+J)p-iTdj+fH8w$4y3RfG@!2s&DL z92c*Sl?X2?-+1ym5OtBfZC$gVDKyWyk&C+Yj3MXB`dq#onC(W85UFK@oTESSW$&(rn&K+ASyy2@~=*Qtk`Y^#e zevF&PTNQqrF2%aMt2U!M-O##}^kc4j3imw+WdM7@n}Z8;|3 z%(hG`xoA99=+|?+l;fGB`Ctbg15(^5E=k^~-nXv#Aru`|>W@?z)py-VULTBQD=ux* zX-H6;B0Pqs4akHWd?^tW;(s1PJxkPfb+^o{%$cTcoA~C~OQQ#d-RoPEY!a5syGHP7 zX(%(=GJ)qT<2B+6u-g-;WXWAMU@RY73=jee#=3v~n?J)KB9=>_gJ~D$E6HSv$Hg}U zc}h_QAQ4c-qA>R>G;}~FXzu!(n15LM70ec}0X!HAIw9pXxZv%g(jHXQTv4FL^{YAe z7qFoNBH^*KmynnH8}sh^YfvPN)->1VaMW;e|k<6%Q7?$hX*e$OllpLq_SH6TNz_fN0o3GZBA z{4G^8f%w`u8;^X53AiLEgo9jzx+HvCcL)$kn-w8~aBM+KB zy*G<&JP>#ni&1}8kQmh4g-b`&+mRBq$rE7o>Hf1YSh)Ln($(cdTQ?FMBZ&UELO|c@ zW{~m;QlV0?0M2mX_S^B3*$MS_&@^uLgz%6(y0nqtIHg_yuD_)PBB>T&=)hkGY=2Y; z8iJzmj8VNyxMWIA@*6jM1o`YgJmpglUX}-{=ZqSZ@3>Lt3VB#^H2Do4vwDt$AZD-)>6f3E_9!)CU&^ zi-jvM2U2rCM>)1#4W`oYTI5K2)3LKdoJ7LYJJj1||8Cx#FQ{eCk#+T=Iw;vXpq`={ z3!h(7gZu7S6(_1I7fukelk0nTs_igz@ihX@OmPEN!nJ6SGjSoyilSLhCso3=yYLl* z#UzE$u|Bz5jWos8bhzGO8{S&QSST0M`m9jggI5NNDb&CVd(;3FRzxH22Jf~98Jvdd z6D?No?!zmC#W&vYF*7Jd)JWgzhmwzuBn!&p@Wx;NdfDj{{5FY$E>>n%VnWGVGb;mvil!EmQHn%XVb_svu)idC`v@lVV1F3ff z%Og*<_vqywypG$G{TKi$y>sr8Jxf+lrhxXy?Pw8Lk)~%#k zDK1iocAYJIqQMGR#$YtQE>~|~7!-+6#kVTe;YB#2t%yGW)L##Z zAPc%V=}{AW(?>(X4HMTc2@jsI=LF%3(@qKh!#v5}+3J~{(R`-e&)_x%U|wJg^tk+= zN4_XAbe}mJhHmpGgcp}|cH#7MUbkDWJ_p@mJG2Yqc~ZYyY9(`3rA>u`{!BH*dS%24 zED82=)u2i|RwO31A9uc*fV^k{sa%jEvl}^_31m?PK-C#7lDBuBtdJj_ce44j!X*bT z`iE&${RAQ(0Xuo)jA`ttsp}=aiTg&^nft#9pmbyqowM)i;96|rjUqO09llSoly@hj z(t6P65rz!vgLB6g(p-=}V@2CQ&C;8Xn5AQtR@7}lrBiR6J66=!XUcnViw?D5Ckp6t zad(8PT;U2+Uezd5iA+&fNcNXn;hSdIr~#Sq;{TjL+vKe|zhYGrrq8uYj`&a}HfT}sh#Irqlv!ie%E>~xC|st&Hx0;y z8&(&OcA|czRiA)#DqyW{@Oy4L5sy=;$AnAm>bbw0jTGMfNjq#f7Lf~&Q`ZzD08LmieE~e`WqooQdb>?L%LlKWlzrLO=KWx$n(=cJBQ{ z*}3i~|4#g9;`0-? zO-zhGH~#SWJ>%~kUm5og&5g^)ca6O=_SD!H$38rE)mU=OICkpLwZd5sp1wzT^ghej z2}4$-W6TV{F#IUeFy1%Zl>9e{=x!eR=}QZN_wd%$Mo%)3H;#8uh;pHOL}9YvZZAtG{xtbj>} zW9ruy_uoaO1p=g=b&{M(6OuRyN~_+$?SBWA0vdP<<|h*BGN+s z6XODi{l1@4X)+rLfx@_(K%Pys2b6XTGRqCpeI6=Cf0S?u%J0n*qEN6<76_olK8IK} z8#Nh`uw&s|{w!Q@FHp4%-FPt@C-*uUgBUJLpc8!Qq9yq%U zN`N_Qkwr~tyxv<{xRXk=0Qm4=pJ0$Wv4UbjBEKY?(?Ht87-!)YJGiJ`L(p`k1a|{D zr|k*9_%eV!;92Se9APvEY?chGT6ga4qBMsg>NENx#SGO(NlvVE;=&_Re>M-Qt~S9k zAe`Y5^w^$%6{Q%6o}mkDduRZ#1iB6&b9uUZs~cjMzlawy(g;S-Nj3~2V{!KxR7x}; zijgG*=N`cmfI39F z$^7tVH(qvxKrrSnu!IrTq4#t^*;N{kiqe(~T?_bW7Wuf)1`Gb{EN=f7Q3@zCYy(&z z%ygl`U39t0nVr7rh?K?9`Uxbkh9eE=VKkZDVt3)p8F_I?R|8;M0$*T2mTfY-J14%3 z`}qkz(uMB>-G~w(8#Y>;cZyOlzC)`?ULE*ui6)S=w~38+(RbLq5UlW$7r&5c0kI*s zaOVDAf0idPxzLFrFLLF;%^ivoF0SHEH?2BZ1ace?eFw|~@o5aeCe!9-z9C8pO#;3L zY^^4w1rvr@ptkJ&ohZ#l{eZB^XP|o4LO+Q(6zGh6YeU+@*mj(HWC8-3C7Ms-yQ0Mf zFBK;+_bqJ1A87$Wn#I-&Q!1DPQBJ?niLO%*vy>-LF$MU9zyt?p!|Vm3lz=l336v8} zV+lY*gx&S&BT_g>a6)>hq|kO@6r*`-e*D0O*x8NnNXnA}U8034g>KjIOZg*G7T6Dd zs2~OpPAG?z=hnpe8&Zeg!#ncMoD--z@WH^cU|<$4q7)Vr0P{e!h!CoBf6t5EUobl^ zj#C0H#=n>a4nJu<^tK!6&Ru=vWqm{j+s3&}7z7s63HmXyCQ4yuqebA=W45E#e1ymM zb+-9Lsm$d!NMU?nc0E#;3EAAZZ!p)pVna-@-(fTgPJIx@*Z@Nk%Opd z1X1ik2gjAG1EccPAAmU=g4fA(%_F z+=;Cifai;Iq76U_d>#-5U9!SOFfB1rSx;y2i}YRCK=fbKZ{Zv)-iLz2!tlGdZ%BdM zl6Uy=!O(;r7Ea`T8l*EHJ|c$dfS?1*kA}xo#B!2pE&NE7BAYh|N)|030<>A8Sm>Ml z)cv9q`cOb)0p<@(7N{?=_57|MZb&gd2n#lVWTIrg!P*#lt=U_tm@Kr=d6NhG2K;b7 zf$8Wi&7@zGT3QZNjkR0`4Z!}!nBDoO4XJ~m7MKWPAyzjQ3BLMbc37Md=-Ew}{wBUo z-tF~S{(x|WMTQ|%GnmhP4c`_Jt8O7uf~BL-LQ*iup%ZADh28Q_QHn-p@UMr*GK{&B zfzge$w@z(H9Y8JsYz*0Mv|wGbz@=h$Nkl0RyoMfTC={f>CR^a2I6AZ6J0d20+^}9Q zqB{B{A!CtA#4(Pbmof<81SpUs3>d&E*&Xi|-({QtO+!C)U~UPU4*UsgZeCQ(Uz6j9gaMOGPO>6GIb|Sm;fD5Z zNF61->o>3jtAVT_SW#uO&mWPRP!jTB=M0z4kICBWTG+*}iDKfLU=S<--5>*!A&Z7= z>M>DTi00uJ>9MeMkxz}ZZNS+VcD-;!>c_GQ%Lj7}XUvP$Aiz(H6E&EJ!-BO1dIjzr zRbwj+7ZT_N!c2=_ z9KhmiK~vzkAhw6F9K6T~vmmY!a69!_phL*1)?@i$i3gM{O&i3T+mT*312wSbFj>HJ zQNa4;&COi1A%^SN#{88=;A}#};f4md3DL;}0tkz-#Vl~>u@u4KBy)O)=$;TMjxkB-A6-D2)B;tI*`j6#`Owt}k55_eDLsBeE-y!}mj7RI?m0DN8Czae#*Fn}fE$`fRONDtnA zK{`GpiivxHrUc-{!0ck-#eQ8n@<&n15G*#RO%{koSUfSUVB2>6*M<~`C@@QK!~m=6 zB(@%2(D2KmR0`)Fz7UL0m*|%TjffV9Bt0rdYq6qX4bLGDo+RoQF=N{!yeQ4XiGs<^ z!qs#@v!N$sEq76=r;9JddPx=+JcSL7)9)(R=a0Zw&y94^?6*b^w3Mg}FSmF20Nv!-DbEkOdn)eH0p= zVW&lNi=~?kgdeLs+%-&8te@K4!p1%V6SDvpuZQe^e+0e?xSgPelcImJIRfCsAH*L< z=NI6FfeS{Tkr6MDEI1O;Vv^mChpeOwHgZrjcu#QNci$+!i?yH36Kqki8b*5vpJA3u zCqK9$CJqE~A)%CT$BBDwk#4z{O5x-CF+5PnNWO@56R3JXsNMC5C?!S0)ohk!{<|t}FY;a9b|ivgJZy%B^n@dFkuMheWrH4xo z8w8I7>kTn`eIHdaxLHL#G2??f8q-p`|<)0a#u11Qu_gA@^-;hQ=~Kbdh?;;-(J> zTOYsXpTofHk-$z*vTt<$x~Z3@o}BvJ{76~#Z#Km=cY~?du3{L@>e5C8jhL& z3W7Xl5|o+tO!6bA&S*wnnOq{FnUSfv@AbnoS4bY6h?Ahu^sgokj_FCbX6CZ#Z;n4a z@RYxLpK zd&UlqeFzC7Kc4H%T`>I#Bx>~IP&1>mU!Pr@edlax)-}sazk7E3bYV-fI+0#Ty2(tdaR4~2EIvxA!F5aK6T*n9BA!0CsT z+Mhr}yt(avp)Y&kk~m>J;oBibgdIMK`?DkWP^m>m0J4GEiuKG0>~JvkVfVN_CN>&V z0~QWDN8qZ!YeXH`A#Asc&B8)N5XOw~H>^GQcJS5_?b=4YKkRaxdc>|k07f895zohN z(9zv9OkXy@q{4+Jmfw%%7+XnvlXUlAsniQMQv>@Rfz*NHM{LKt#^To7Hlz-$5-|2z z#7**8Q}9&J(VEGL?ILy=`+hjmtPxya26UUJJr)+Fu>3{rg^UDp5J4I20r16Rbk)GV z5KA!TuYo7AFKptlLA9_$r-<*Ocaw17Z~*H^%#84;W9eIXGo*+DK?4vZf;S8cuE*bS zsj*#>jnjQv$cZ%{Tk#UCcL)v{@oeD}P0{MF^{}pn7L%Y>rBa8-gfd-XV+ju#3Zv z4!)3v+4fB;CNyJ41RUUMm9U=&*~z+K)xp3`Vp~ebQLCv2@wxCl*A*(PO!6; zj1z{*0VfP6$bJ&A%R&X6a6f~^g`ZO?!ZYyr;H=;YG*Mqbu+AghEou+?0oxI1010|x ziv|}i6yX*gp-~`!*FjHla+Hx0j~Fjve-h2@5oZKhNUQvxb6*{=C5 za6yB)ox7=&c#cp^y`cwqI}4m_I1Tz@Y3ZjMKMcnSh67lieHdm`4-MZ=t@j#?sP>^ku@xM<%ZZ69&kzCgP?TxSiLERbxYBgnLgcF~T00 zIQY9eloquf2!48m9uVrlRE6(ZB)qCUX73YX-3SvqFpCj*L0qhV%fX+`?G@*Q2iq`W zprhE&;d}iV8T{ew-uuLN;a+2w5I-L~JVZayY7aZVZ9|G5Cf|i=2bIP?0k)GJf0alP z1;vkIs)2YAAyo&q&(LC+#&J<|QJP2K880CajW2)$i37yx{>#LDCE@mduoWRy2ST%O z=sUyL(H|!Jf&x$WjN}3begRM8hmE2XbHLLhkquaRXn0qHfI~L7MeI#$mIPQp!HWOF z`z6GKAT%96L|-OnnPh7Tm`XH<*og>2)+2gRic^&Y!Pf>kUjXB8;7A~AW?qz%xHD7| z6S&kfz*0F7)kmwvL5BB^?KM_A_-5d})#JVoqI+XBm3@!;ll2}e2^8@{nkxFQI z3PCvh5URzdlN<#j#0BffkLBqPlM6T+>=Ce1lt^F`#;u2l#L&~C7~z8g7GunH?1_mJ zj3`z|BI*aWqX?x&{aC?Za53kxQ_QfVG)~xem=RncQE$WxaWs#=ouvu7ttB;)jd&N^ zF+|VMa4c~+N%$6x0sx2|s}}9eI33m;4I@M7z}R8O4T}z61s8!ZXW5~RR$+JEBP4=FGzaz* z>nVD!J94S`yCkmO!AglPAuA1bR5(K!`?e^>roWhn>4)}#PXzsmiNQ>XjsUu$OPrwy z@b}2wAOsQE2sbY7)9`zMvL{DRPWT@TScMU1aCEkOs9!aa%#CP$Pr21mfVIsBzG{&&oGt_NDgJD3ieZ(f4C4P;w zK-M4G^k3(GPrr&pku`m=bZqnBZ2;4y8|ZG`B1&QEF|{!V2|YCI7uM`-cI=l_ie@5C zk1z^RBaDKhe{6J|TznVt8!VeRy~4_jz$q3-jPw4U=)gd;u)iiZC!k%pMUf%eBHd5p zF$h?|fJ1i**peZB26%h~FxmYZt^hh4fix4o3_$Y;B_cxS&F(*k{xBiO#LX=Nv`6-) za0Hz=8r=5^mG*+zs-kL~ACRDjBTtNZvbgU#Dux3`jyC-L@Te4?7tX4ZxqZ)4De*4g zIGJFQS?Dj2?@82k-%qF%(*gg7V?g+E2!D04sfNAU_Z2E7NcnIv;eTK}&^~Z(lR(!# zvDHvEa-K*6xiAgzDS*(QXz!yjCaleb3;03s6MabV3dJ%r|AH_GX~&n3hy#J64IFThV=o6w772JM2&_$CDZYz=BUeG3{g5bz7{@Dy9y4*C zD3-!IM(lu0cf^`Vpc>8E^&Kk3;U_WSBr-|j_P7K|0=)CjQzJn9us%jF3Hgw?9YQJ| zmd-XD=;608I@rFzeL?5~Dw564R{ItA`eO3F6@y9C7p^oyO}ow&YsMrXMgSWI95!Hb zaOl^L=-dPmvm*AF1kTC!38z${NO$TbvB_DK?12-5}Xmo@&yN^1L4@2Y@W*6}Vayrmn zIGsv87@a;_Fq|z9>?e+#5JBJlIF-WI5_S!2P{@{y#QrhYIy*!KAjdg4=FS%ooJ6nz zflc`T1?D)a)G$t%FPMo07c@hHWSDo_;^O(QRgJ?&6AoZ8eMx8)$F%L;;tmHZ2-&{C zcfh6%XDB$x?rIA=#JDL;CRqt-)Ew(4DA2Kq-EkM zuJgOxd5g`P3RV)fY}~A&*I#o9^^Un?CBp3=wusmkGIu-ABwGqC zvRHy?Uf8-7_q^U0LnX&b01kS~Yak=r*I$mQLFAe}a`(uhbxT322;2Z&R;Ep4ks^TW z$tTDG>3sB+{K3b-Zgd+`SU#oMyROZt9UyLRH<=EvQQBqQV7eY|CrCX9=Ld>~`%ee< z@+W+I*B1-;BIJmGM_jxGg@mFEa1q0xYfO&1Kv>8j$swM}#YGQXaql<+A#G477O-{OBUR zWvmejDOp7>C{L72rfNutt)hp|O{sS*{Jm)OPv;7^rqq9?pdp`6tB)6x3$EBQQhetgr|RN$IJAboov5Lg@>q-7Y+uTpke~X{z@lNePTOV)jT~)7IFTu;1h11Gbfz ztAFKgQE08A`T>~`d+7#pH4K!FPpp#hajn%bKJ<23fFay}7DLzL;N4bzi?(uK3)KvW zz(QZeP2TOYee0LCa7hi-fGt-X=9DezGqRPGX9XOb3T~A~^&aS|cgzonKpOfN%F!zH zzIvKP_;16XPZOjU-#IV5nmO=c`nAiK;%gmiAoLZ}BjPz(&Bz6l;Y6m5+^ixa{HP5* z94Hnvs|UplEPIDsqjRp6j&zuGr4&}NcAraCt8=DygcaJCqKbiHd}NLE6__i3bE(=T z*_v-OK!aO|$F;=pyP01tW&CYdm!-87ZiH1Fl!4i+dWvvDM7nGJ+c(l1jBR{A z)v<6&?ryNze3lC}rMe2Jsr${jvt!!6RU!#ki|fzdN^Vtp)(G=1%}a5}e9jIVjdcL}t4f*WD$*o`UjFLwCN#Yi{=Qi&x3XN$-*D+tcA0^d^)HSK>$gLx24#Xr*n6t*-qC%dg1dF@yl~uq zzUv%e;cx24gcI*jpRnI?xX;?#pJA?g4akxKKBtkFq}E6<-mmrzayhSLj=Gwy8+=Z< zA++seL3)~OMEH_Uvr~xOrT#0ObXR{I_f>6&x1i;v{!iGgikyYDr4;}a43=A7dU5>Y zhhgFdM8Z~soTf1eNMqV2OngH9Dy{U4yGgs(dZ@J4uT@scEBd_u+wQ`QSA>aKt zJcwf@!eg(f`uSh`1o_%V^CE}QJbvvmG;g_ITdGj2t+E!Q%^54Lx(qG3aPb{5Tm!|z zl@l(k437i9>pOR-Mc%lde6;_mecs=GT^*Q{IwVOP+Utp- zo0UL73a}o7rpO7`Uyqsj%vWG_24uoR_g{5_Zjpc1wqd{)b z$H==og)e;#*Wm|bAf>*Jxq0o}`Stx@Cz%^vTqtq@3dU8)DLfs8PAviG9H6UbAg^GjneMziS}XDQk9@laAId<(~-#}<;L56Aio-$K&IzDo`h zeql;LsIS)Sc2`B}u4k!P=l;Y)&+1DR`n53n+R-LN}USDa)RD7DL$5}z~ z2%0)rObNF>_XwK0|7!2yQT*U#{SnP&ES0#kz;V`&KG;sh`^TR96w0H?CXRhZxS#n! zpRsWF`gyT*U$;A@p^s%^(JDuy`<>R-2s;%y`Z zhOR@UQ26!x0E}c@^#LxfMwU{RZGU3_i%Nt~2w_b<*4;(af5ZJ{f zW^(-$fiQ$Gu_@+BQ+J-IR4R_Ly_-ENT=~5h{|TDk=aCa|`8$v*M2-s`C30a5aWHbX z2N^kt*MsKw9pq$uQ>pOc%}%>;+B;vjN3MD&&a($*HJ$Mwdw3UmVL;ZO@$2`Q&$t@A zVb`m}yRh{q_bCwAB(Y?2)`Iv3?pqO~aq`mUQm`5o{)uC4eEH4qRgZ1cZy9@R?!@86 z8NEb5b^XZiC+;JD-T~DgP4s*fb zK3{F0vuAMPiCTI36Prv*N`3hDC*V@;j~)gou$b{;X{MscBKJ5<+PcCKG^I#`K+AP( zv2g$Mk0F8l72Do*!w-?!IA6}lEMbG&7_B)2S$9}?!&|XM{L+uG&JRkiTp2ofaNRrQ zDfO9KLlu7@&Uh?3UoOa&fXqcZwDS}?bU+4-&X>fW|KU@}ZNV3SVp;rxf%!-0=D|&; zrATb^v>L=VjxAdpNCE`=*U(47{`J0*KMQYo<~q6Henvg>I)jZAU`~DvAM|DeFY>O2 ze~NTK-ys$@$ z?*Ao}hyR5d^sSpcAxN&i^L*jH=j~gCkN-lgU3BPWCjyDVXV$PXx%d|&{OuQ*+XDkm z^@!}6c|2He-hK;*)%h-!^hKcXYWJdQ7J0+J+-9v0#5>AKnFcMEi8&}UH0pzy2 z3KV|Vs==HjOU-uS6ECW_%^fQeJU8$nfbPuiv2EL9JG>i~lI|qy>2A!_@K+l$OIhg< z)K6poH~S~`_Ss_uf@Juyr5m5Qdx2o+?p`nbiNvMchj$V8y>F$ux_HCE_+4Rp*edl{ zlv%n)U-1X*W(H-#m1iA1O}OMHkYE4TAIOe0dKh{6qO;m9_Ig%`h% z7D->mHf}&9cw!G65FUI)v$+1QmywSQtBKTJ(FAMK_C%6#$s3^z5Wu^tyztNvE(7^r z!aN+13Adj)$_NiK#)b7yzXZFpS9X|iSyLu4SIOT5mb<*DZ~EmXEA5}BUqK%qD;}lJksk|DiJF-IJRT%GqV&rkQ`=A=T`n$t*><+Dx z1&>^o^%sp&mT{sWQNvEAD5 zI?)u~J)(*3LWmtPcLVOA;_%G`e&;SZm3CrwjA@n*s1%%(c?~3H^M{2On_xEm*r-PT zI+pC!QO!rTCemeRm#?le*}U7p>j6!KUpP2FP~1l%+Av}h|DUlhkCUUS_MgtInM`KM zWHMPMBq7WsVeP8wH9(-MdS9lO>7B)N_w>F@_pIH`G6qBt5ePiEK9?sE6`ct@qhgB- zi@qo5QxtcRhlJ-YDp7HN`upClo{%Xf&);A3`P@@|=GLuy&pr3t^ZgzkmHx6c0~dFA z$c#cx7R3_aE>Orc`bT!J=liy-{Rq62iT@j&+pt^Re9tg0b#Pxn(-V-nk8}&%1>wTQ zPaf#z$F{63Ji}q#zu~Meeq;k)TsB))W|FOkUwbC4n66&DJ#ZDsj-eN=xObt2XOSU+ zq!q3)8OOlsq&nm4oaJHEwpIR9E7nLre4oP9h5}bNbBFSK6Q``2~9QhY{nO@~1-+t$7DKQSe_p zAYVS(Q*CYUiS^hO5B6~DDm^>aS$coec2iGl-{89MZ20AdZ*KU^h6gviz0KRY=-4o` z;i@jp21D2V8!qnJweE=xTe|<={S(D6yT8_5?|xvNqWiY4E~$!E+qtxkR_hmNC9RGR ztpCdTPxPJNaW(2`y`}Z}*5$4n*XP&!*F8k*YPJ4${l>1>6sE2hyS~`+KJ;-_~Ag54ZEZ?`=QOKG61;wwK$!-1f1ycXheIPW@QlvA(zUmHQ%nLhqvu7P%ZM zE7{|yJeB0wgeA>}ek(O=7kv4J6w8|@)01XnKD56#xiZg5zI{q3A4oK~CVwhE1o!WG`DsnSbj<+@S>s+%8(wB{a zNwv-~8}q$QYIlaiac*I{>u-(T^{7f2Ti^#_k<$Ty-$xM$|Q?5s(W@BhJj>=x5 ze^#3-q+?fnMAD+of{RaOUNo7Dg3)d&#hlMd0s;A3T)Z~rHhN4EizjzTB3#Y^%EYM5 z<=l+Y;Pe)B@eOa0^lO}DgU&b+_9om(r!8u0_TJ=;xY$V(>agYK%lc&A*4=!3Ms#sC zQ@~}Jz?Eox(Q9n>C#;I9BJAKM4($CsmrCtUXSU4n zj)*$1FHSI1dCN{ozg_g2l;bEWw~+UR6B_eBnvdI^^ISDQt0`AC)v}T^OI2oo`n2mc zDxXE;_Bce7nb(@{mwup2l|**7YDKXTL#P@}nCGN+n>Q(_ay~0^##||NL1nf}?V1Uj zo)tX0xH~#Ot3ss+iBC0Wa^|v}XEqr0n5v9!UTfMdJ+F1MH8x;hWZbS|)LUd!#$%Ge z$d&?}Ay~Fg&nZJjFJq9X0CRp?9C~6ro+xG=f-9Z6*daadpK>Wxwwc(3B@RY?l}7o8 zW_#A9Q{`R8xK*W^bW~F7oB!A!sOH$BU+0`K+4IgtzuLB68acm{&j+h%Ug={sHXnP% zzc=;hJyVP>KR(APl@n=3Z~l?g?kiUEs(Gz;A)*pyOH-PQBwpN{FI7hI6d~vFR8--) zD06PBq~7P7aOe$USg}$n2scM zk$A!#Z~b{wkA1*?B!T{QIUL8my=cb8{2PT53k;%UzLb>ak6-ny6o^ zETYI=TI1i-eB2b}xQrTQYFxQ+$;xbMPB)!Hm1HN&)ttdyjBu5h`=`?LPGwZXxD6_+ zXv%=iRqI}q_~mmN+kBp*CC35_Nry12afPKHxILjHqnu5JS&eg6nbEkK%gY`Tr$N?Q za*T7Ps%;KgM$+@%81G<>no!kMi-o+iF{i|4p7SPhNhU1JC?iVEluI4sJ|I26=#8?X zDx;sODM4Vlz$cYbwX~eqKf8d^L*|K@@lstC$j@H z&Gs42&P}IcmE4RoqK%}6B=XsuD`%Qg`4%SfW@MO`!f9sl$5MY>&>KnS)%IG0o`X^9$2f zvv=~cT(9(eK&#QFOS2I@W{=*H?LANGrPjKzSY`ZRg-#Un(W+6ezeN%_U2)Viv<4%Q z>SRLHrgeXl+RY_i13z-yuQoWN6?aDWQuB3fnKbL?)YW*JF{O&C{_~sd1~I4NC%mDF zFqr3clcOtd%O=CqU<|JnPm zpUR`Ua6_}*lJYRcyf~qBb7o62J=!6)J5zcS+Z-$>PRt{ZEvk3rH#QfGombCuX(kyc`aGF%lsTulSJ*O>Rz^^! z!YNl|a^91?_<2c>%^MFf8cT|q*6|BvpQ`uHX1gO`W&}qOl_M7mmP#ObKqEOOHcc!d zB-nX_!JQ4o2AY=KngCr9mlCIIN1)-2AjA z-hh#xn{t@=wBVfPdN)eFF|j%~SF`Gio?0d9R;t$tQoFIXFu|&4{h$ZXxaNZK4Hq`s zS68rJWH&$36vP9f%BY&PGP-fEkdE$aYqmS%A+BPZbT}M2>lB;43x4k0$TS16(9IKyR zFeX(CN*%jDO006~>|F(owf=KE@>nq_U1V{j4b; zD#w{f)m+W!nBnGrrY{BqoKW#hgxn@%7ikuU?b7Vg12kMT`A~;5!&u`x$C}!;95S;r zvtf>j%|~7FmTybF*E4QYc3NN^O7A#MuBztL*E4E{QFFY?&l!9fPTkjhDP67XVeIOK z`6(DgFpuw*xczh5;3CJVL^d3cGij{Kfnm&@&H9cMS z%uLx#apnAcx^v|K!l#_f{Om$RJsuLu^ZK#7rEY4bMUhQ~C#I_vK4U9rMCq+GrSTFs z7s^?5@kPE?QtNg~MK5z2-}s!$1iJZocV(gGO71<>{DDE8QUzSzfYDYc3WdzMF90?t ziF^frR%KS}Ro0Nf5f5vEUzPrKa557V)B4F&I_*sqqQUnyHSy6ji|U1%ST!U1Y}{f% zDm$7pEG#6I!I^nebOHIP@xaP4Az_$81=n#yFo-L94;Q#mQg3v7)HAAbZf-7|E130x z=IU}J^=Y;&%x7v`+y>VzFd+TgAdeDxHl2YLgBkCFlIy-+QWIFLaTN<^smvzX^0bn> z_}$X;u&^brG;fytHuGTB6PWWZkb!6Dj< z;L>iWSZqW{9q#PBN~Nut+}0_b-yd)0~HcYZ@d)D zpxlDm6qwWsT8k%1W8uT+=+yc%a~Wk%kv+G5^2`Ec&kdqyBcY{{(=2bRLxIg8;VzX{ zsb0nMz5206#E>$+?X3T9fOb^7vmy_cXj=s>vLW2>pIdE?=rUTTtCtI%hrW9Yui&RJZ5bd^t`L{tLw{( zM|-YseXi%)uJt`vc5DDIT7T=u*ZrgC-1ZY~|J(b?p0>6h0)zV7w$z57YtddSBO{yZ_L6wEKJO)!mzKgp%*IlHj zDo$;@U2#?0E$cFUx2^wq=S-)+Q>(bVb6dw>JN~=liH>6%$3e{YquzH?!Z!Th&P&%1 zw?5Z)!BKu2**)NIUo<;`6ay}v=4AxKsxbJ+z^kj?@d289OmQ7Zz*izuo{~i%iybgV z)>_&6JxL0*3a}2~EJJ!TP1iRf*W6p!(f|a4a{-Ctl*0h zC>H^N1V6N~1`)s)*2=~PLkg0dYv>kkz67L_0|E(99|b!0Ht;&&)yRMV1J_BQlm+h! z&|pB}1v0(QG`j_uAX3l4$^^|IMgU9-2?D)oNlIxofF1x&9JC9IU=jhn3!nsBzS#UR zE|nyS02QM+RG=GFJq-XH-WcQtAUkWYG63=i z{0w5=*`5ZNkp7mkTv1*w+?gTmo+1JkJ+!)tL6rU3&{@F<6yZ;X2>&?ZrkBw!qX zrU1cL^DBp4c;Ur$E<+mM2gGy~WWWMapLKHJQ^~Dw_8LG|a5Vr~guz6DJf+J4B1S%!)O7+fn^y6F^H4dc5?#+3(^}f zq~UD=U!%wj0QhjZ8Yql>uK7+Bq66$w8gn1F78F|!=-j5qBq>1BfHvUk<9Zsj8dx1p z)|=V(Ye{MYT_9kwV5awB!8fu5v`4yil-+F-}}VWRxao3CDkU8LY> z;EjPA1L+H(l1ObysWxqpeox6&c%b%?^a9WyB!ILTnaw9wq<~|Abc&|I0F#aZ7zco| zuen%psf{VoK=Z+Ni~~AKX_UH-H-8HPE)O+YphN?20hS{;Fe3TQP4fi69&nkMkQAef z_oEbX;c83sQ-M5(f+xXb2*4JsE&#?rzqF1>swt$+2(Td_)PN3CPCH7eHuP>u3f?A= z2~d;m%q~(6Lhy^=&4+XiF+K)n3_b(}@S+nG?v8K1bx@LmR1Ca4v=t@_5F^UPVoPr> zOVV@>ygU@60stiiUWT!FJ(bPUnlaFDA||U3L{)&@QeJ@ZMa+WD4d4~*B8(0NKGNg^ zuyKLrje;mQA84wE5vIh4Ihbs8zz_!`Pq?;T8V?F3r|dScJrv9aP(28Boazp9^OYzF z6<9oAuIPnb7N}T2DSz?q2yZ60lg<4nY4YAQ>2c z5J>ekAfxy#z{}X2fM^Y~;Bdfp2F50)qk%QVD`6soh7ld6{{f?h*#}0m)W-3ab8r}G zX(76YzqVr$ZwxpO>^>95P6@6F%E+VK{)d%8g{cJz1l}GH&&CZSAX(eLE=eg42`Flq zeJpm24ZWZ>Ww$pCAh?_hegJa;Fa^av_D_6nE4!hARzv5JZijS_MF8zE4S`?=wH#lVLFs&7UaG~ku;46XB0*q+jNuu1EV0J<8I~t&6{FY94 z`jr5b1DhXkOqRxBT|kX|8ah93iX98Dzv562>A z9U%3XhKhYx`1j@<`vSBgBvP7OSr;>V32gMtD76zdH1R9Vt5w=Gx6})|3@my01urab00IdZ<07z1>hZh#ZmGupD9|h#W4aOP+KOUv1#J|EM z%e756e~kABxdR1J!yTaTUrOxNecNd%eI8I$3^DM7F#T{3HXLk9VWB|cfuG;*^rXW-Lp z`j3r2BFw{IJ9j%!nv`F)p=A=_S&&tLm7_1wdv!w|z`B8%#9D=Gf$$J^I!to5@7hN9 zKov;Av_M!=dJHfWP$a08p;gc)0O77;wt%$HNn~vIGCs>={Vc zJ+R0C5`&TgiLmf(!_3C4Bn20!Aprb83>77t#f$=O-^gxEN@Bn$sgDhRn}RN}j9^`z zOfS2lnlhPC%r>=0I2<6ycRah}-y|u#)dDOlW&LS9g((W}b?d#7)CP|P1A;^~m+vsJ zvy@ykYgBG6N@D8xrLa~Z#(qHeSW3m(+p{8t4TCELQX-r`uuw3Qz4_iYDQXV6(zj^A)`jcuY{IdVF3O1DR z#@PjrTBY;M%=;}FNyY6PA~-S`QRoK%DdqTU09jkw2NhBbXqu~}tz1Q=E+^)#QLTug zQ?wU%UB(ae%VkojsYdm&S1yzKg5>m-P>@d-EHV>$n~k%9N+F|_6n*9(6jfw0fRt>s z0GWDgednb-h50RwLXnhUEauG9Rc?lH#xvt(d)`LV|2C6r5AlP2G7&lUDlj1pAl>H< z@f65qUpfzZq-t83NnI$!awWS3DdI`Hw>dbk=rA}k8By%(k??|byPiL!7-5$#K$PtA z22jAPMI~pSo?~^0OU{@k$u2EF+Pk`y4D8!U!&6!c;To*prRC38^h+~prllv^eP`F_ zdbxW4-M^g#a&?J2ooMKdtGwfCr6}5C`GxUhibO?ztao)Q8F>1DRQ#w8_)wUBJ|x99 zKVPM6h?h8}m*W@a-O;2uOEnCUyB&OApG-zh#3#|mQ(xRs|Fwe#s$5IV=|P{hdF+0s zz*V!;R$F0WPD)7LZpNU?L?mitM~O@OR6DuYdT6MAof#v))3u~Lt;_DUsf`R1u=1kD zUi8kyr9Rn=7HVJ5qmYoWBBjovx*epi)Yu%=_&cXJp=7sptxoDIX)LRH-#A zduEt#^<(6@{Z~oFzdkAOs028^1YARN_#;JQumTn;RL&NnQb~S`G&r*_ac)NdmW zE8oNo=WYB7dXsBu`$210uSvo69PYlp>%NXghU*S24$qPn|4=eM3v9evP!(KLY6r^f zM)T@M`XcE|@B{sF8R5;o%g6)wUe;EhN=Oq&eR@dU78t>>RZN@4bh2V8p+7%(`sXv{X`NP8c5BlX zM{bfebL10g{9N8lp6mK=XI+!wClvkO(xl+va`{9xtjp($Jo(owe({FZV-dzt-;v|J z0D4t~X)7~t*D%w$ye3$RlNsm7{6CRel*2j)Nx4%S@)54g1qL-Xg!@PPuJ6l2dp~3Fk>wxxT$DL zmm%d6P3&CVT0geig=#!kPa{>;He>fk*=la8HlY&?rF5E{xDDa`A5O!%$YkW?F%*W9 zQtm%K%U`t>p(eNkH24?*p8`0#;FiM$!$i9c7|6@#_}-y4A0a1~wy@;Q-`{=BS&~#0 zZx!w${WK@^U+4MWEhs%eqb4{z(O?ePEGYjEOJ8khubNRS&j5ZIPqF=4x^oCsBCJmknJevlll@SFQ&A`-p& z11n|CG&MfFg%9$9)tvzzAHOP?~VL=V6njb0)iJ1!h^xi zOQ{5LK(rO8($V3wNb8DkTL8rP>mt8l)2^0vzi;~*Zl-SQF?1|Vx<>Z0?8E>zD>w>CvQ7BoK?L=N7)N zUoIm@_eS`7{ubQ1>_DN{W+K0A>8&iwi*LrwjZD^9mJ|fFqkiYjJgNspmN1E%$e-$j z#$MoTQLjTkkccv6?J>-_Akbk|ueBhmVe`^b}@-M6i7xs^xid~#}fI>$_U{l21T zMke7TUDsoMvSz}VUv2`A#@>dP03HFAW}E+BwosaD=z-hUUPBu4YR^R*>aB0bjoAGU z@WBE9B$5poozEn=XKOKyCr{E3V3Nq2>xy_D_H5$)uxIk&Z4Ui+-j5weE^AgLTmArS z8NhZp1>-IQVL%)n5%#5#?R1`;^Fbb*zH3Usb8GphY3=9TJamtJr8*v_g+P zK^hOmxet`e(pUNNhxq=%H69@Y4|ZQkK6Ohd`yN7qyX>2;eD7;Me3tKB z@4xlJcPI$6gamiWs@32#MPvr|9td93h)uXkJ2$#zZ7DhVm&5;GLttJR0*XSysSg2g zM0gB{p5cs#V;V~**AQ_Yhhbd%5pt?y!a<%mepU;<^+pqA6CxW;xg)V)WfsSu=;PR;KKyYkFPVtmj5knBJL^54pvKg_WQ7{ZXJ*0f>|m2K zCXISFTpsr(q^|htm^3n(#7WR37uj0>WF0GhKuqVSs%&IIZSwLH8h=b9earoi;rB8b z+4J3Bjn$th@}mlJ@2B~lFjnT%)*|PUrAX4nH@r*7oymYL%Adlq*Lg+#%Fj@fm95OA z)hsYnMOFx=49It&P6B!Svlvvlj2!!&cmK*+u2(_!Kh7T*C@Afr7?*I($5J-Y>VTIK zdmJ`T)=W+X-n158=?|N3Xz7`4R15w?`<`A)t4DDI-TV^R{M<{lVz4yezJ-!j;EXEu zv`HwHS>q&`{Q^JQCu=4HUqTsM<@ev!MwE}~hU-830zFeWmb}m-Rinn~*|)$`c&s#dk+fm(?JBkj-5 zOfgw8U{%`!<|$uP>f?3KqK`5e*)x1_v<_^ZNkKXuFiniy<2y|dpmOS`D-4r3#di=KMj#s1lyJ3)=$M+S*g}5!4dA!d zegqEtjsFZ~em}8(i{G#nfo|Lir*I(xqF|Z@Kobj4zlU7=9e(Rxt?o=N`!ydWiZ6V5 zh0A{D^L!_{{5yR2Fhb!7f8!3(h#U*VD#2ii{WDFqjt#9TBu8H72!%RBHFlTqC}qvk(1}zgsmj^Jsw4R*L{h8XtDI%|V|B$NmX9mQCw_=6 zG11a{VNa<0=B^VR|J}Z!Ri{Y6wCToakm;(^u>z~QDn!|74bs(=uK9TrIs8BT&~81a zRcUo+M08}2k?0p5JnwYCX$$fEoc}v1eG1Gn@F-@|*{l;Oo?fwvtz0S?Oy3uc6SrM2iAThNKjYdK0WKGC4Cr%FNURS1u^?p>#18SE{A% z+J6j3S1tpsR`-7L(o?Q&_2WOLAv4cX0E#3d%vd81QI$>E!$s9pdM2Wi6g_Z~8qd`- z!u-!NNC)4Y-|@+pVS`89OMZNLNsV!SUh4(0%v_6ld^JsqY8mU3wE`FaKj+s$U4ql$@Ma;)p8!*vvN9mVl(d?|)LN|OidSO!%&Wpr?*+_=UWC+XiI7Q4EY9Q~WQ zNeA=d@A$t-lLgIxT6_PS-*uE^2p`=B7hR&m>3muc6bjX2L9Z8hlGT z$Rn?<==;haFjqWFhfjY5tty}|s#KXMm#;ChcBzCP#koCv;5Kj9R7^&@J728@aV~Pf5Y&vZY6K-)$b>di#(Rr-&SUS|KFj>y@X<|%{RnGnhB08 zHO^9OJnkwciR16kw7Qj)Ck*Hlg5l)Jzw`f)KIF-N&~+4BqV;v9(%l++LRV55bF48a z1Vx)uMQ%EUk(W11;l;M!Vo#Ph^jiMZf}-e}Zg0zs?aRdXU@u-I%6k6YbJj=Z@3P~FfjI2AiGr$Yd;-F#)I?`{>=-szv64-ojI;*nGIr3G9#b=o#Cntr?Dg##&CMV-1gCH>=dG^33Irk*8kCU0&bSDMY|ghigNyBZb07dn7IR zy?SzcmoVBdZ{eN)QKmF{(I8eMa zCA5+4J;H&0%e>ZQHn;=P8H2IFR5N6v2S1gyVx?c=sDGA zLyiR~@sUS}D}Lf2m@P@#8Uy8II^%P2R``pY3d-V;(_W54(6A)2>qMadW1Ze z{l*m_P`LoXiDBWa!HHqv{R7h)M=r?u%M&p%!R6Q(-2LrvJg?m<^!LeRV7d6!`St$# zMYkh3v0Vtkd!wwrl+1*d+(lTDMW!999a0seaNO3Cf~DxT|06i@&ON~uFAPN5_#UXX zhYTEv(H-6^ss_+`K1^IALhsO;kC3DLv%?Z=$`d2P**F)r?!?Q>7e{jqaavAu2D_Cg ze+x&(y+IO|u6%~58JdDGoYl$+(O54&*CZW-*jF|;4 zq_)jO*eHF8LE;$2oRrHz2KcxA_y6EOx6~gV6%2|U)6gP0FQQr#oaEejA!IBDee=G? zIb)DKbH1>tPbMQCkGXj?J8*#jw_tpU62nTpNljHs^LlfRD`>_meus{BX6PKfM$Mk- z53YWSD0(Lv$Lo>$P5WRJ`^#okWr|If4GDYJVw|y46E;YGyISz< zifd`=^!B6mRe?oHdOa15BRXeLHM&BodtpyyBBJ;aVUSRG$^6z`J$ew zh-#%pTeFzw$x#PP=?5^peKHX_^~vATF#!#6`?&&cV%envIwD;+7bXG=87^cPH|6d6 z@!4?WY_wCaInybWJwuK>zVSSIB;2DQZ5Im{uCbQ*i-plOml1j3@qNSfPhKpz6`PVR zy%#l{_>XnG*xuW!S0w2aLV0#fAxiuzeKaIqPt2+Gt|S-m1^H4|8t<2Ncu$##oOE2j zLMp1qd+wl=qLLR9U`mAoYngFGCNi0TKG`^C4w7Ciw8&)S$i3frJ&$5by{x4}=2)s? z$Rwg2t+_f=Mu{eWCTCBorYEI2eVH1%WFm6pVBO>#Dapv}!V zCMssFq$15>Ld#_2)Xc?F;N|{H&0FhV=4fx6OAF|YbW~8rv$aU7FppBF#*AwsC#ib- zWx`cYG>j3Iqeo(aZb%jef#7=jFe19j^2FJ7^Ugn zUf+7DfY{FL=?TD8Vo?pQyrT<~iK)4uDkEvR_7JqlWaQ+JyQu4@MdahBmM!%s4hd$( zrnj{8lo1Dew&O4D2U>%;s(uTNpXTX2Tc#|q(madn*tr~&)=g?miK$R2D7hw&^Y||^ z5pI@2Dc&HT-YGO}%(4QXLsApW&6gcnbyi3!eatlWyN1F0hXtQwwTK*X-vTW(KjN?z zA9bg5xdok(rdR+->;$9L2PYF&gH7#ds!^JSP5p8iQQV5eAIdCRztc<=xtAJbtc}|r z6jhiqFbiBzba?fVU_2r9=YtNsmQ04IR-i%IUGH>KHIAhl(H|+e=bO)k87>82WhN4E zffqnhbGHaPE|-yGJ(rD<8`L0$`i)2@nrn%&uS&ziyDZT#o1GHXs#!s)0{d!XeBNY4 ze`GR=g0;b${DhHq$g@P5SEUK7EHDKhW7d^Z)~v;4T4)&1LGqjpdSo)PCv!6f`h^?X z$g6+3cx#=rQ)QZEO5iI|L%F>RK31jE@D*37RyC!Xqg@$?GMS7VIr0uEJBA=TX7l|8 z8_1zt!tXbCDR#DWyu0m->rN?l_Kx)Ex+l5{)SR_rnz@%d@xLUqov*OL2$S{z;y4}- z1k`kz?dy}Zl5!#^G1=CGiN;!8?l}GGj;ea0fFrz14+k+6p%K&V*n#%M(Oa2}Moj5U zWp~zZiA#FgPwNR=VzV=>sbta_DzOxkL7aN&pu*(6k;MYxLXP9yfT7 zC$!|&G<;ooGl{Anb=22qu$)Jt%iUOQ(t(K&`M6LZtxinOWpt4wLkd~=*0NS|?0NXs zzsU*~kjpNw$B!j)S!<@EGyqhu*6`wtL#HFYJbo-|#mj(P_B(kv=KUNHtZZm5=?e*_ z@w7)p^hNwY)+!y&K3&AQWz)fywm)@zqxW3J!5(AxJ6gAO{d;}So0WS(aJJls1C7Kn zX}8T~3amP$*2h%Ui~(sv#W%wf9iM?GDwEONpeDiD!!z_?bk*{v(|UqAL)OFuEL>{7 zG*`{f>dDmI!j@eq4WKzQR4jXpocha_25sez`q#@;WndYMmABl`upTsnHmeFI_-r|+ zP6Z9pnSg9q5PEx8%ZTC!w~dhp9(j6uJ+&avE9hlP`6yjM3sZs>P>}qTry2|=j3T%= zm*B=+xM> zG8_(&2+-i`{ND8f7?(AXlFH18%1}OLb;N9fS{gC`jqnd;GIHXD4P)fVuei6@AH7lV zD7sxOy&HPAt$V2ZCemLr^CS15=0uYgST>!csW!IeEL)+)yh*rvVD&dT{r#T5Y3=XV zWS{%!TZC)20Idc51uEm9h9pJ5AjiBA$w?!jzeN}rT;l=qQe-1T+&??-+OwzR97Dnh z%FzHPhH6qM!-bS-l#B#012;c(Zhh^o^oY2|Bc%VE=W`OHFn{Y=Pf72(6{jTGKsP_a zZZ)gsR`Eg0o@;!N`rWUL-Kij&+v#x;3BM?-1ym2MM9$ONjktI>!cNkje&%+ee`w7| z$jRFi|134>ezN@zVZ&BjUIQFLQJ~1|#z0`ekw5LJHRkiEo>880z&Xpa^`k%f18(0( zp69zr@14SWTrUV<)&g^T);e-W-4rtd)kXB4VR>x$DL0@A|C?)wmwSW8Hr z`}Dv3GdAaU?#Zp3-6^C3@d{uofz@DX=_=rfP%*G!smNFFZ+z-C9=W&tZdlJddbScJ z5hl(u?cYf-DP_j3X#~mPcfvBrWDUdDBz0E33lkA{VL+VFifBlGHz120HRu82R7<^k z>|N;Hnva0He)m6}h*XdoCv*br}1}=ihVIK+g8}3iM_vdHQBaW>%XfcbAGm*5w&DKC;Ie)^{c0;(bD( zwG*QzR;hSfBT&LBDXLAXvb88QO? zJofrs?0Y_l(8hL3{VHjiiTl&Gi5#lbnC%6>2m;3?_+T%67{`UxA~Mh&Y9vjJ)P;}0 zfgN!zZ$p11uR4^@CnB7AR&Wcfa%!qX9#}#wp!Xqo=Wh`0$vCd4mmZ>CoO}6o+SiyR zWO5)QdqJm9TG9mvyg_Q6G7n<6lF4xX=SCYvT_nQoXC9>eaV!txt)%0NZ(+JHUz(qc zPuN`%Pe~)`dgn3dl8F%b*IZtI?HD~ex|YHE+I*v!zo^r2#afm1FjCnT36b2(j$?QCEQ8&)soGoiPOF)?;P&gXV0M~m?$Fmh zA`JA)Wu)xC3W3{F|zQW&oZhL1dTi>($SzrLd%e#^K*WU2ER$DR2 zzzva`Phh`YEuseQQ2nJ7aHY|^y{CJZF0lFu*5Om7l^&+D;K@ky>iDNIL1i*>tluGB z@zpne24R^2hi+1xW>RymT)-aX;+5uak9-!hNiHLM{_8yl$lXJlq58|8rBlkgOt~YZ zOo%|qT&^a z{ph0tP5xiri3uy6VG2=wC}@d}3#zPARh-dDTHf?=VN>sF5qawQTN~GYNcjIaUUgm2Vo?bWKS|-&p28+46Om&xzq+D+@#nGdu>vU2NYdcs za#lBI*E^~%r8Pa{XCxJs|AY#ejGQz*JoY+rio9#c>>#f`rQ1hddiqY3==sBWO(XF4 zFA4_+7$I4Wqq4*-;68k{Qi(~5oloOsozL15!Mu?LVjj&GH3MAVn;E1#Pm%vAM9{rBse5qon6cI5oeawR~T0 zKl$Mi&rp5wOTq<;o!m0TD@lRhg@CidvpUcSPNXKYfn-ja^VdBK6CsnKv;o3uNHG{9 z=X_@JAbCN3sLAYd@@vBArcg_-spsvOdcW-KY~R~@nIcr*^YwRPZ5&>v&?D)vU9}gg zX3MzWt;w1z&RCqxJcqNhtd$)5vffdD?Kyf2HpkiH1}>W|R{Yg~IZ{=V@Hg>}@@Dkf zI}!EF>ytN_o9U{BFj~OPDkv;n^LjAi0 zLSi?3A7{{kjM8p1vB|)KsZ^SDvf8xt+uuBoNhFs^Ft|pz(fI@VV?me^m8=$AEcqFC zB|MRl{I@4wz(1DB$R7PIWA!TzhyZKse^J)Cfd0z5LkA@YMlX1yGir zACa32qO?Yx+;omA7$(1bS?Jrm))VAp_x6A0tKLQWM#Rp&#d~JDE`RHrwp}zjh)gkH zsg1y9B9{xy0Kl44!VQ*O^AmapsyQP9zV@TE$ll5w=}j|4JmmsvhhIu?q@H}D}Xr>+Q}t9!|4t%WI+9atfk}tJ_>&YTpRUy ziT7v1dBbOs){pML9p|}S&x@Tq?P-zZ3UlEWsz2+m0+5^oS%2&>M z_TKs{9CKuQowN^b*`?u-Jbi{IFMF)9B{okypZE=KDft!!-|-z(nHlLZwf(6(-Su%A zlRbc2%HXmJ3qeYZ0O4;i&BPoNC6y%=bXPgD`8Ajtc{3SM-+rim>uZ8du_LssJq^?d zL?%O`F_xH276VTE9Etu7GrV{TJL+l)nCEFW4+Tej?G%mj_+!;st;#4wl(ERH*9!~s z&E|a;){_tC4Tia_HAlYsC)mI6>Q-{{D}_;tD%`w!CwPq5{(@8oE*Hwz zxK!L;jGJ5mBhYz8agZq6#dh-UzX*MAlzaG7SJeOf7aEoeE$i?`Qs}If)|Gl+VaL7eKG4>zt5tezbcg4j%4uu1`hzw;_3(X*V*grS zx@pUN>%^edK2FY`IOmdKg8NsSyIn3a}8A1qGBgAX$-SiK<=f-@Minr2N6Q ze-=J#Sitprt~(vKpoCt?`+zN>G$JVA?MKc9@{cg^$hYVa`;peL)+2=ZRjpZ|>#|Pq zY)J?Ab&B_oIPa-p9QR?e4T-D2qV$20e9?uGTrFyR;O5z!=@t>g2!gbM65@b!09g`X zYeFV2!1}bO6cVwi$rj#80)FoSx zP&Wl)foBIURgk_{gwAvCZCx32X%nHOHMH6_a*r|Q$f-#K>W-!V)h%K#6w`f1{s_Qt zP6yI`&N}(-AEv`@O@`E*FXIdY6qy%-2~zHdseRK{vA<6yBPWjkW2GV-yB$*w!9sf3 zA)^urS0ojm+Aj8OS^E*>S?B(boS()b9Na=_=^CVUNcaUA2c2x#+;Q)O4`Uw@H=pf+ zljrZVlP5>c`rg}iitm4;#cf#R7k7%A-yo_ht~DXM=h0o_M1RN6d(Z93APV+O`<7Ot zV!FQPqrXS~$+Cz&Q#wb6XT38XHsnSXi%2Xn#ZS`F7$Uw=%ww61?0FEljjtd7P#cN> z57s|ADgrv>Tm~?(87>;Hxw7M&JDCedlnW(WOq$n6_F`VkL?rr0T)#f~am#T1rM+S! zW(1^TvrG1gD-$}Gm-8k|j+j`{maGlqG(`TqUj#RWOhyK- z8X2V?Ixa&)T4#8k0~?V`U5q2p$ceRK-^;EHOH@uA=4mT)B>&4=QXIm$Mi_fx7 zq)V$uFBTDi$kP(0SEC-wClEUA1vgZ)EFLA) zmidr4*e{n6K0Mus*$mb{cZhy&XtLo|rJxNv?{ZWMv7phCPesd`oTTX8j5ydQ6Om)_ z9Q6EIySe^nMl{k~3yL_CI)wTP#|yb~bmv7Bf!P3S1)YMiF1!TA$J4zata?oLMszkT3^58AgaC zOYtO|QY)po|EYtRaxxJ)aq3z6&$V0Y!f$YxZ>vh$(Xtr$|cRNhM65CKhvR0G7+*We{`^J)WaA^Nz95Y1$BhG z-`e%Dj+5>EtyioR0^fPFXPM&Fq`;0IsJ=XFt*C>R%V3WV`3I z3a?d|PDLh?1-Er3;F!r1#)x?{Y{pVsEdu`xGSd62_;Rymyf3Do`}Fh+irSKy4Nuop z!AP+6lOeoMh4c`i#!NvB_vc9WHrHSE)Aiz7rhpe|(5KT` zJ;O~~^=VaR${8+5^YDoY%x1adsXLxIpHe#w)_3{nm-9o3WC&+9N`s5B6=o9oSS6#H z(h+YEosl(@lkd5%0sh!h|9p_z58lK^RBR~~OOz(uwSrPb&I{vbvSt#!<>Ar$H(-4K zB}_M|h%N81vGG_N79==)}>s{SQP8@lDf4%VAU!Q|4`hOtae9^Vy&YkLI3OACnHcXyqO~=kyz>(ye z5j-;~lDroCq`VnOK?+^G7K61Jdy}c>j_z-*-`$yL$+sVGeQn+4^g`N8x0LAVC7rXI z7tXABLEd~A?wq<%yZGj4Q7@9(DJnwq4E7^>=VTjwqKY z1W3J&L!6QGxu?e2?1Ul5XCk$Qq-3#e8FBM~T$HU(WyC9Kgz-dHykMX-ZkRGMnt;Y^ zbcXHOq;y=lKS%9=Oho;teRW$-#8sMRnc{pd-F7Mdxd}(NB0CxN^;#M~_<-WUMIe!mlZ|M;eDhc0pCp7MYL}g<{+`j>L)>23cz(0ki&iQM4#FU*FPe z>A9=>JL^X}C)*!s{oOi!%k^}g#m>1|zg)nOSR28XpktbMGuCtpQ1!CY4Q`xcC3H*P zOpaVRyZ@oxFCWCv(mAqs8Y@AwoQEFiLo*&V9|ATwY_AB;Ne3cV&@)Ji(-(1_??2d_ zf%nYeo3qP6>D;2-rpB-r(mqRwO{-iJ9u@DlSjedw`t{-*zPVhKuD8x(72%tk7sLzt zbu%fCNfi+?d^tNeQS*?2S^V<81-#K4Mb-^t^%oZ~V=yX6D`}33keaK;I72x&hYYNs z%d8^@t9TJvGuiX*OGnA~1}@u5ez-7jDY<;pW!ouV{bS^@ns}h!n&)TTQy!%7YA4|r zsK{??bOo$#MXk0e9 zNGmAh!I2T9{E3JdKqKmsuPG%SBR5vR`^AF@Un_4DJNIl@39yHK;4eqc6PQ*(o$FDD zDVue{SRvDI5l4sCls@|80Fch;P{-cVz1>h0r2%Y&&uMfX@fc9(g0~$M!N}%8YRTkV z#j(LPWJK{nF4&AYTymQ@uyveH>*+ys9|e|6cpi`q2;1N}sZWY`jz4xCNBajkGhcc2eTn zAm#Kn<*2@~O>dNu!$01KEUv~!#2rN2{YpdImh~+nEZe%_o_BPAqeWal+<8s=2U>qY zE!zR=yS!Xcj@bZZ&HydRTa)=Ze-cd&yEjkJ-{w=dsJet567z5e0% zV-J=M$Qk zjy&-}xaG2D1QUKfTHpF1xQF}y`b5zMJeHs zugHaG?bGZm4kYi#oBm@7hcB57*yk6<>gMG})FEBusw})<&#WVWtyWJSI*u;}B=?!k zlwNe-L$5x%vK8%rMBKSUwOoW}Ck?Zenf8v`H49=Q=1qtZ5_<%G&+0}XhW~ILdE$_* zz5diA_}1InKityQ!nD9ie@E+g*R{7W-QU2}I^6!@qu^{izbrU=O^$x@;*&0;Bd2A_j>qt0Su1L?^o(M0v=jHsE8gOJ zKi$~(DV9QVa`MJ}vaC|7{1uO`n%B%vk{cd{Ga_$Bp4H6<>MuNs4eOknHOmyuBz<`` zo2?qzf-c0z1Id630Dz^>;`j1q5C_4p@A@2G1m65YW3A8)uNFY*Gp<-MB`Zn3mU5`b z;4?^SZ*2u-0}G97$UVPXb-SnMDZ3t5i&C$C%^szjE1Zk z0Tj^C+}(ao+xf;@l9nv?6hJuMmfE9C-3k64sPmqPDu^d;oN`-%DP^kXxr>OzS zrX!guXEX&xge`IZqao~Isrl>12spk|U-0^i#C5=MR7oYMLXJ*s! zti`Q0Op=d$1+TEWl_-L0X&l22#Gb_~$ePKCJK9I< zpM6&Rq+-|rM*E;qiP9~o?11_&D3$=fB1hi#b#ZKHO=10L=&emxY0u`Bi*;I!8z~Ak zxDHhmG{D7r9+c6%l3e!k`;YI}<={~*^Mrjcw%2!G0TjEwy z`;NGA_$-gqk7-7r4mUI%dkgmtK;bowBnc2+qIL^PLKrbQK;4aec2p!tli>G6q#>*= zrP(V(O=3s%Z(s|mtRQ&+tU&?r_vgUrj>KR?gqWWf_YJNgBhUTf!4+?Wx|C$(1+jYz z$`_z~4It}&RFI(g#m)+V=8{czy&!HLTJr&N^7;H3Ng5!Td=ah;MRKDo4JyJI!L1LR z3L62Xd-$}n4q|>0V|A9t>PHT~R~oB!>L~Shv|q8pP4nf>!S*ZaCvHFQzE-#;efQHS z*KrE2X=cqitVQHkMl6$4+Pn=sHRNCZ2UE4Wx*6bl6@tgaw58tuBlrneA{$OG5dX#xYa0|1uMIBqS8!YoKgURR8kS9(eF!145 z5T=vK$iRVzN9(_OMdZwiJI2OsV5m4)|BE$y^dS1Q(zKr<>Kyjlcp861S6o z+-w@It6zrE+|hOVi4IMNkS<+GDgjqkAn=5!TDV;HwNRiKU8^-$O&E&*Ugf(CN z>_A(6#|8tgsoci_glg)TpPB|9-loYHeU<6C3QwZnfiLpj*WioDMC8;b{u7Roc6}Q; z{{rJ+{co>f3hf*}4%ArFt(nfn3JwH{5*2eLlJLtOaM}|{7b;oG}`sIy4P1WU@ zpT*o{=L4FuGX-@1Zxx2IE&q?O?|_!9s?zRyIltFALpOFH33WpyVpr9@m2<8Vfy#9& z=cGf)pkiQ9?2)U;D2-WPBZyLnj)<5e=$Mg_F`$eh{Eiv%|8AYzZFkYk^jf{T*WTxz zI&q(U_SyT}FCY^&;O~>%o}q1mJFK{zqA#i2Qgut9nk<&px=P%mcA30Ux~0FEQ93Wb zLA$;kKSGqImP=jYnFwBbR6N2JBP#K(NzC9FSyZ^32gN%+`+=$9;?!scRqI<$_BI?~ z3SOpF$|I3*Kdjd+62{Jo17%XZ^g|qqN9ujGESDPIS6(?(3}>pZNRkrV40J4s%HHh z)I{_;tzGNMQMN`~7j~%~RajeZycV4uBa3%Gr#f%=^J}>)@ws|^A3i54M7^aiMwm>` zO=rDnZMv5i*HZX=j4a;s(3cOr|B)(Q^kJepB;Jzd_Uu-#pA8vBS^*!0VglHHoYR@@ zwt?KXhub3lIL&QdIh`Zwh200m)gS%K-0;E-XN9n0jr~5O*D3|8&sMU-7W&#Oet(QS zvV{(RlI0N7t6blU))S*+LmNvQ=wyd4w8M>DMVk|!$#dKGX(^5BREUf5V#At%al~cp zV|ng^HNUl^vM}XX$YacJVX7F9`o#zXO`Tnh;+ z?O9qU4yLgl#>vuC=|6mZ@tpg&8SZR( z6_c3?n)QtoV`M5-udx_ZYg1x;4Ff(#7UOSy2NvEB-aIvYaE*i3m`t#pD&sA={rwK( ziAQtdo=s@rI9WWlZ4EC1ueKeK?Zofe%1IVS1?D!a?J+_mmYgooyRywlHUEL@4p-R(v)_7LVz_j=uI=c$KwBq%9@X0ut1S(JNm+hU%33oPwK;t_ z8!d?Gv$%t6<7DYs{NV7xv$&5cb|Cv5GJr`rzL57XfGj6S7lp_*rFfa2gVl*S1uOB) zMaAo5pFCB$+P~+7A}V>l0w@tVR;2VVS>Smi8WjFWq-u&fB{b{IMa3t6`9|o;H)}7G zy<(jQxWz5V69e55ne32t1qp{>_5?!eqo37m7ORK2dGU1zxTQ0f`OovOInAf(2#UkW z2jQerN~nGge~}dtDb;{tPK)tFoTR^>i94FyA$*!%0a(Y^8Rz!zM3;#_v6Kl5KCmN< zM`RAezsMJ-?~0*wxr1AfzUBqo;hQ2iL61E9d=Az^E{i-e$Zk{$GVp~$5=aT1Su~x` z9o~9Ip6LC~ak%K7w7ZIXE<~52H0+RoCqfFPJTid6s3<{7`-PpR62+s@1#Vg_#+-6$k2d2#6t5JnFw zE}8k^)bA#Vx&?&1H5@>ZbtSxU6r(68gE8S|nJTRc1jDhIhGnI>*de+YZe?wpCjkpw zG5jFINxre`2s@B{V}rU*B%h8_C0$D6^q17)k*hg4=Th7n-n36+iBD+HKQjCVg}uEu zxlThWl9Uf&q$yIfE<-+O=-arYRt+~`Y`<~x2#sraRK*1p8~eFn*GQ!;s$Qz3Nts%V z_$M_!87GVSaKka|YdD``%@T^H89I?p@PSM|kW7h>X}QBMq&}OQaSpH5aezU%c3sL{ zLV_zA={jwu@Yo@^(<+C~D1Pn|{N4+wPyFGSYiPZc!(*Rz{iWz3QHpvoyRu02JlS-n zrFJ`fTJeLIL6VJ;Mep=ulKuv3!OZ2HQ?apbu4LUzzojZ_+J#P&2jcS@w^{65!EIh0 zC(E*d)sHTjE|gze9!bd_bNVOq}N>TaO+*;ddA-+3=o#4HAaO zzgbFa35z?j8A@%zlc@pQ@ysO%Bww|$obn*Sa91-Wl^DW%M2-{3bTmku4Lb@y@MMIDPf(FD#KE!Q5 z04w1sp%9XUdtq5PhX5P>+m;s{m2~om z`*!UUUv=K$$cuzoj}m^sA$Uf1OM>=vj)Gs}7OHdqHuIIKKTaM%#Afv(g?PlvExp(x zu6kd%h(#=7wRr8r&n^$Yv~L+?DFV}3ofPAWlI#YJqkwB(Mq|k#=&##G}g#a zDk{Hx<*wnMYgjEX9Y}7j?=y;ICK4_2Cl&*4x(vfP8w7Au^ah|BydDqATbNle$ zTGE8O*RMoHWbNznt+1MD#B&B)E>Owva(k}5j@!64&J!PvZN;?T4#2U8t{dH1-RsEl zA=hMz)cPs5-|y$lHf`Cc!JSpw12?}CQe})M*0w6n6YqG^x<$PEkEW^NZ(b?w2FLp4 zCr8Pmb~O!5&{Zg! zyvN9}4EE)i-8+nzZy(MaHU6(v-$*>mrdeO}I9A?33NIOa~HL?q#Lt|v|`iCEp!3#fgvuriwP7bWDlq;(k zV;t8qtI?2YrNs747}#+#z$O6Z^yb!)UBmyr36;oesI+0_;-!}_ykYKvnV(N@f@AFn znJg$phObMGwPZV26YhopKWL4RN~pMAMEv&KVC)#964Th|iPZ9Ta(qZWwPgCk$+Ehf zH+pC;sHgNHM(o^P0}Cop`Fo;RL z@x8ZUyvE4lvB%(hcG81jxa}Prd?F>cS~BWtyVK;M9XU2_kC+8NY&WAVaphaFCB}GS z?fn;>;z97Pw@OREvF=8{h`7vW1(PAt?WqF1CK5?zNmb>esA`OLifiE4j*{VVogAKc zMIC2^aIvHfx(x})ZL|n)a;H%xv3=;)0>5k66tOdQOL-;8^h686NR3JREe>NxV^QVP zqgL!=R7#3E<#KKuDj5VP}QJ6q0xGRf(}X8VC1~^z0d*2SmF~)FF*PAyJPt9dnIWRTL<#L3;+=+W&|tE zlsToRVxyWZ6&b794`Q*6@x(_Jcq3SQ^4i_Q+z0VSu(4I<%0Y@MbwYCa__=LaCPE6EBU4E3)gLM%sn~t z))Ntz*Is+h-oQ~Lzm*}&#@C0ucE0yf=mz6F8P)pu$D~_g;3$&C%9V_*i&NLltL}c0 zbt8vw20zNV#pgc8t!zU!V`P_(1|*{j3|gfi0>TVMX?hNCITKHM@W9L6#{q`<{*S-d zW$4!Xa2Fbz*AsL8rTboF&gGcE+wbSXxUa!h6-E|uv$yXIL;*`1?ZI{@FPnXz;MTUB zsfhT@eZKz{*XsJ+{M+`Ock-5OcHz$HLrQa4+>lG$na?svkS(qA&Em&!`P>HAz%!Hp zZetHPPLCm5*!iF2UJQ`?pFfE~7+-1fDztwJLSmdJrvf?a)3^*Gku{#S5h-hSDy0ZV zDZ@Du9Ck;G_#Bl|dkXZ~naU!S7x20MmjsaeXZg3@`WbF!bkf zUiw+-ym78yeNrk@#&%6>G8FR=l^qSBC`Pu3&wT|_`E(Z2=6(pzn(4PpiJ$%>!Wm!k zRqi<=qPVYddvU7192=CJswR_3<)>RQp^(<%7OOO@_tbXt}26a%bryqpvT0dI{b z`Ca0(Un8}jCvN@*w+A}TRj8euwhr1JK^CWOAp}@t+KB{Wq;>`=T~2*&880W^Q~T1n z;%5%pwhTZ04S2JX#{cY_+#cy^B8mFR(}bEbMlEzm8xL3tPEXcMk&(UoVT|k;Pki>) z9k^azb$ELC*M~W{#jxv=e?JjZOh%gvSM^M>!UM0}IvUx{qVRbL>M<5Tp=J&a4`0Ba zqY%IS1xQIx($Uq?1zO1Xa}BjKl9#%;S$xSC@$DE-JofNY2gPe%quf1w%@?JoEPp?) zPO?>VsNagF^zooX6k&8ZoO#|n`|YIomq z`R<|jI}pt{CnbMma!%Szk$RR*MXPaT)IwSMNlD^u6TkZ1(Us~nmU#W-Bk)MNt_jz0 z=}q$R_asxJcO3wf@;dPwk~~Wb=3vn)H0hL9CsnpxJnP%s>dNUnvHJP^9>=M?Nj-x9TsSaC&vZAar=FO&S$gU_>nt3I%*g|B ze30Y;EdAsR11K9#_5a0r_PUR%PMR}yQPxmqyGna67;9%Vk=$q!&emy^r@gR_6%()j z`7!uBkI*sU0|5CQ@FMSGp%=~PfNl`&Aq558aBKpZ(%nDjR=2-M5pn-754>1ZKZN$J zV(%B+BHX>LI3Ef)7+m2XX zI%$w&t8eYYR7{PM0Gn~reDhCumMH&{TLy&W3ya*!yzk_5(^K5q4rd9TW&t2W222tX zBO9e{1wg^b)m-}&x4iAlMUYzbG3gP-!Ow`hevPh4E>|u(*nt(8MSe3OnlB=o7|)Kj z{C${9$N^1L|)iE-(Yk)q#g9KU1n5&!S99kVCqpq9r6nhtk zd-vI!zf=5>G=b$=|^Ta2vE55H`JvS@@@P|&o5+37 zw;W0OWE^w1gSQiet8Px2mI4-m00 zYxZN4hPnL3B!A|)93GkCe+_@nD2o6YxaUSY*mZb}jw<0{*%6I1{GlypVv1{%hyGVY zDae{*+oLpGk;4eO$pfF?Y%4}fHaxr<#G9oh`rBE4b=#Rsh}ZwcD&G>Wo#S8ZE$I_; z{GBf{pZirTMQct83Nen)?NG5|#A8x$k(aP6asuE};4xX~A#?^{wGysOv`?1C4;T40 zymg991F_ zyYl33Y~KE2C8)|HpBu2cMkUki#OvvWsmC|86qjvKbSG9OauYw9%FL=~cg*}{=CPSi z&)hNd&oikR)6BUOubukL)SZftDQ*Qg(9-17laEY(bn4ZU|2o;8j7dS#OzxR@ zer4a%)yuA>+m?o8LC~r@0@_eQNHVbFZ5C?9}f6abv_O8{}&Axg1?%DcmU}a*{%2m^$Y3<7Yo8C3`+|=Vzzi-j+m{4>@ z>i9SJ4{$OeXC~$33IHBL@?~?7mEK0TzIE^9^8M9k% zAXTGTW;8VbSf4zO%z$*tnS`~z{4I;!(2WJ~7|az1Sgy!})eq&jxMVgQo^ijWr3wHu zp2s^eAPBbXl&gk+HLnDC3$k4yr>B(Bl;c&365)p6B@u+rGZ2+Pa4$pb`i2%H$^TGbS?gSU9tqUVKIZQ1Yj?}1DX4Ch<9Za~* z$j2H+$X-560e%V|@!l@7kt=6EAb*^b0^VHkmUePh+SS)1Z>X!d;|{`&0_Gg(J$bxU zb7-`bq7*vL?1>csJB1gZR(PqTfjA}kf+K!!M?(GV(iQrg!Pz{?>UfI2^&lDYWN6ec4E^gA2IBUgZA z5>_r5aRK-T83p%!#7_>;FBc-@kW`i0^KF@pxe4W*W*#AaK%L^SLrSK?p3jh~&zuo< z-Y5Ssy5NI9KaWK%LFWM%93hZ<4iYXh$U@CRBG-ZhqUSU_*>mx_#70Q@=%KY@WkA>5`%}Wj z!sKE?Y*4ad!(=hxP-X#ozV|gFwi#ocPXc*LFM)Nz4axwS?JDklDfw8B%DXX?;`nD5+DHj$|GE}kJW$0n2m-eqZdV|C-efENYKK?syZP^uZZhmml8*Yp42Vub>xANg~!?sLG^ z&#E>*bAk)GNMW?_7z4PbJT3yXYanbS3&k89^#LE_LmO^1shkV$TbsX1K8Eyxh>%tp z5V&AWEW+mM%58nmNp2vCjU%O#E8slCu;+P7as3G{Ry3kZZ4!D{9)YlcYtu8!uamd~ zHxMjiW>emkhpaJ2Au_P-fyA}?snN#)$!`P#t^^P_vjjAi#ErqrPEj(KLWC(K7$h?M zU@*%)r`c4R*ei39gAaWKWF)*T(48pOm$$!hK)5#K>GKY-EwFq87z{3oU277Si-c{( z#_>r-dQQkDNaT(rIyM$gaPbn3sAZ%s;H;47!9I+c^v18tT*v`0!~~KMplMQ`W68uh zd#B6=Dwh;i3v*;(0P81GA7h?X6aOKzv8n-d3EAt)rx4czAqjt#ncvG?%$f-ven2vV zU(Sw9V;=^EX!?T17NV$M?%o(JmL&wlyh(mTo9xapP+QY!Gj1UwP6i6xc zVXm}9)_lN(L<|Tk3S&H_02fFwB#!RRihCyqqjMP-HViRWfS|*^4CoPA;}fO~x$cyRc{j**uf5$G;$wQ!&Cv=QJBrkY=oVAQ7v-6Kr@R53LUh(GaER; z#frval;XH>UiW#N-nQbVOJy$BL=lS-%2fcTJ|rLTYfEe2l)2c7NK=v@pf3<2F(^C` zL!F89Mr<>dn;G{q2oOZm;k^dy7pK+ckH{aRhd3D_=c8dHlEDiG9uE3D9y(DqRsaJe zTl}yS3Q`D7^c8mem~fHR6qAO%&%)}Giw*KI6!Qr??vg*oS!RGXCMh>r6;1%89Vt*d zh-QYP2Co%T3J&xa$~5i8*=OzTsK`}A1#$Mf9w3U&Jl1d?PQi4P+9j_K z1NJ={3LVEChV}#f9ve2d%fB))x)$hg=B&g`>TlPm;>9=x}IC=NW_p z4xk)lU{tj;y>gZG`8isw4Gy=qJal?!G7^Y`q!jNYim()ZY4%~1B&26)v%zoKY^8SU zSKc=I@!e2XUC2cbQy$hdq8gz%K+w?JKfUt*Mg=qhG@FB#gyy?Q*dyePt*~7ykDF?= z>++B$Sl(zEp75gm?c2qD7achV$0sf&oEIxEhtt(olw=s7MRQx9lfTB@017V*Kv2;b zv=m61&i+I{`9z%gz$V7D(ohj3S72vOhCoSV#v`XxN+lW@USrY*bEh*g!ew=aFH%Wl5@Qi z(Tls~!xi1Y1xOlf>6n2k4e1?Zb|<8Gq`3`Ff_du%=IsUIrfZ#-itaW3#Y}Yj7?xp9 zc}X*lTkD4Ry!oHuUK`oOU$rrzs+LSNR}~`Wq9>b5vEoDfVR-uCCVu1EIB%%9w}9{N z-onR_D9MC#)*yj=j_z9UEya-AfchhSuGtFX#F>kTxBR+>$f6(Yd-;pl3}B*p+kPWn zGY?8$w6RjKgCGO}s~aLT3rz@T2UKp!ptn{0#x{QArWY0vA5yA!5b)|Nx4)>N=55ob@p;Tp3H#;O_QFUvMjqKOPo&{FoA<4~3z%KA+m~_+cg_87+BjJm-ty~> zuZIJRWBnC)&?BxnVOuup()8hl*sq!W?VNbzFu(OImer|F^@%yXlz7jcq3o`=bbtq> zpOhz-Ja%c-N}6G8=~zigAMA=eiC?Xj9I z{+t|wiicF>`u*4Qd7w|NOUMl*wk_pQH`;V3r3!a~j&94U8Cenct8^MhfeWs|nyHgTs0YhsKg z-t(y$R3o_q_chXHNv=!DW=ZHysci66*+5QbY3KZ57xE8ZcNrG?I9b%I{^+>xa%_`5 zn)QFcqVUNK<)9*_ZWcZhOd~{OLHi0Gh^VKtB%sj|BI-`@$d^5r4A-vYLyC>OOJKEZ z#OdY(CQB(=P>Y=-`1NtJ{Jfel@K;{;`$Hc9n`|{OWP%rDxyYUCn>?40t*(5^wKly^$%f9S4{l$OLV8CWgA&wUsxP( z(~7ObeUs*%LS#)mazRKcM*x>A7#46w;i?Qs2Vjeztaj7ZGZqn_nK2_`?Rl4!=wjV8 zEnZ~d@m4DZAmSjFuHup{!Iif{xk>f`wSpt*jNIWp&wNyZ344m0+iy7$ap;5rM6wNz z;InYQ!l2@E7Zap5a` z->BR*yfr9oO!sjq-!9phEF3`sj8Wyzdp(7s(?F`Z){kn&Sfb+T^A3n4d$XU18;JY3 zgdriz9ktbyr*w69*Vb-Z?QnP-N!FXZ5Qz2Dd6JXk$hCU+@V8!U@DYXtkXYxdgdib@WO)3k1Vt6Kx~gDS8UePm zpWh;WBqp`xbe4F_=GTwHGWHI)yi5`{uH#Z#X5vb#vi1yB*45@(4#r?@U}uf`^y3Il zi*X)OZ9jL}@UrMg?j4^-9b|ZG#gHb%=!{0YuSe&L5lQ515$D5b${1_pVl?!G`IkfS zI6if<22ZUXtWqkDqE$tQsgl=_R>ZDG6=OW{mSlJoA+l@u$*UpLWtU#WvAlFCihzTA zM<~o!{3DLVeO!W|AT#LHdXOnCs8&YuDqA?M9WAKM;>Ij~XN)Iazp{Lu_^O|pw+?Gr z^cbV|5BP~fyx8v|=3B7FebJx*wWLaSjm2 z>_5k)#pF4@a&j8$j(l3l8e08!!%%LUQW~kEt>QIhY_u^R!cosTD7rNdL55nd*gX7H zS=wzkc#b3gvb?OUVKx?G_-Nc_EoUMLhMZ(S&EX^)V~N+l6VOyh`nG3i7NkbGk4u0x zWX@w9eUWE$O4gsN@})B3aYv0RCULDB=OI3WJ}kNpTegdze*716!*3^f-H8>Jl~&lx zMj@gL|e zJAh5a|C!{gyP(1E!#qp*Hc20PSxd;tI^2D~x7u>`vZT^iG*Ian3rWxFIMlyv-Yq`f z;GZM)J=f&-VWK4H6S8A1Nww3@6oNt|i&%pOBe&AgLWN^I1c_J<-FhjrQ#{_{pC|Qw zy*+B*j+5=9T}fJ}Pj=hsnwDZT@;cnx!8$yh1(%z^A;~Xur+8iGM0M}%j+!Uoosj0` z>yD_2GN=s=*zSATUYhjx=`NZ##uIDzt{xPxOuuEC_>y{h{NG3;D}B`JJ1*hi5Q*7I z+wvS6jYg|pYpWmZ38dBs`&j1VJP4|D;NkgB)7IhHui)X~S-l_V@rGBTO4o4-7Kh9> z;$c}OUA1KVO5~+&R<)$cx4aS!9pj1KKMJQreu&S$@s)n11A{@iuEobT|70e^6lcf;gCg%`OEUcT@zb041h z-qi1<^{T^q^&FP~N92{D)+mjPD(NkS)9HFj6(>EoRex###f z__#NM8;tQ`wh%D3at=CYV-V}-y#ZJFF{(%<_g^-A_y&Bu`|9KSfeqOi{c^}SFn zuNIKLmQ-6j{2F{aPQ2#R$vtS{WUFj&YgxEC}NADwt&;q294F3isVcK&#c68s>(jfYC#Ig7`qtC~iyvS3+|;|L z-Z-%|)tI<#>Sa^LsSBsJOg=Z^pZwY6*C#)&a4w#^__xI)lm9mPn#r=_vB}Wn6_baT z-=g@Z)khTR)%yoa^_2sw$5vmzT3?MVR#%Oy7c9POxxc!3<*zG0UHR(Dy({lnxncQ3 zz=QZ7#s4fPmTk-Q!efh(i37{KmM4~;TKd*vVDYlW1F%<;Kiem%38TxEbgO9rIMwBZ zU{T?H?xTe6?FW@~jrPUO(U?uI$+&($kQu3H0p8=DRwCPDXm8x`2}0L|wK^&g=xZxJ zGn>{W4Id(OZL}1onubE(>|rtm4{O`AZSrFLuu-eEGhJ0CRb};gy+(g0DefuhvP`-f z*4m40Ypt)<=LtR78gz4%Bf@67?Lt=X&f8u>81`O=VmtL-Ow+4dlQgBDA@zqUEg?`; zE0dK>)kD)uLsDGVcIw!SHV~~iZN8pLu*uDL@p{}xawbi+5pA0(o$Y>7-k_qgY$g%P zwHJJiX0NC_vVZY_1XsCh;BxqVE~@9~CH*Ozt?N-;`7HTHt)o?xg>SiRX?4ZN6m35w zP2z!4Zfo~CZK|b?G3qPsBxJRttFoF)k+dq^s77hieWVs`vDBjNsZu=BwM12V-4!`f zT+8INye3#2lq#i0uCKfNCPMeBEKzMPVkr&HFk>SWR8?>8xZJGbEu znck#}w9lTj>SIA`EXOR>Ni`m0OhqX@x+tgaSE|O#UQUX;YuXa+ai;V}r3a@=hJLHO z9^BDbjdf*1eG|hvnM_jsXYzr|-Hp?LFSb~9j80?B>e8fsmpy3AnsY^8vf66&)0$t& z#VrvRrLw!6TnQJ@nF|@2PI*I247hD(UB*nARlB}H=njjg zMO!o)cLcsqO>g1?xxBrg;pk4k<+co*kirS|xh3+u_NC{B>=gHG+$ps9Z zo-1CkSZZpIYR@bwZpk+F45MrmlqN?rR!eMowMfPwY&q zn$fv@Z91U6;NN6=U2S5GKxZk3R2d(yyYvq-Jzr2$s$9yz50oX7E0doJZ=HN8G8V$9h~%PA3>5Y&3cBO@wapHYh3?3cxR+9`gj!J1>;!mY|Mq zR=wmoZYgnPQpua`gY z`#Y3IAILN`QM-+&wD-z%zTjZWrfMP5X~wm_41Fn~b9uFa>1x~dMz@~O@r4~JGQC_{ z2+@^Tx=NLk>U{mOyXE4V?jTIFVO5K%=3DI?yKg^X7#mGJl~V;(#T?hxb#)hglGJ15 zBj#!)p$kVc23;`2zLgX=bUJaiqpQ{(eUpQW7SC_X^n%61C<8W&&RH?rBJ9$fOph}q z+U1GqOVL5el{Tx^-Y7GCnF5{jYCGYlAZ#%f)w!MWzR)+42Fid04BCPv7mcShazpikk7E7qhDH|*8{I(_y+vOC`Y_Gs zl&uyUGNyB8dY6XuS8t6)EB2OI!}N7}XLjdJ)K>Sj`NU*9%KDU2?i z&j&Xa4JGIcYMUXHkWVQcAMw(inlkQYw6Uf`cW#d~Q>QodIt8V}BV?4`jKIpfU0YYh z=yJl6@}~kEGKXxuf&8pC9tu+lXUwklIR~wPIloIy>e2e_QQm8d#A2$xI+DMjBA3^3 z4b~D)m4P4Z47T%YYcgG%^wL>JA=mc=bfG$w%;`XgU@H#r1<#lOb&NcG-O^(GgSkx2p0{RQ8A_fnwV?A-ZJIBdn-)vjnA+4J^{5l} zL56X9%$&)nY~bDTyzMf>@t9*qMXcM8UqCtiYr3;)hV{R9^iSy2r=^;B$ zH%f(YBcmHe7{C% z{0UvR-fx?YjOV`zJ=o$Xw&c@mjCDq+1dC2cnbG*`z3n)w*VL1~lEW9YXC1Dk2R2NR zk6hiVK-tp8W;S1k<4ZR3Afdaxypnod}!?~TjQ#}QjW5RWJzq- znKe|psLyw!nSR5d4#_8v)oLg+p?uD!s|GN3g^=8Ovptuhb3s$lT<&;s2_YyiQCHtn zXFaSVH$bkJR3WB`JWHBsbYlw#ePvswUvgDL!4@I&QBPN$&ahSsEtnc?fFrFpB()VL zZjT2|HXG1mDgWi9xJd=Esbd{Qm%htcDBp9WxG!L)=!`+AYD1AOAJTZA+)j<;f3R-v zu@-^jTzsvWD#yL@`NajxO4jKLxwUz{!57SUuU-Bf@K$Db58z9g)lj$rIdYj^Qss*? z6XZ9-UUi8n8|Z$<&3!}^e)QMby;YBJPJw^g%pn?lt}g)Li3Nj4G4;Nfp& z52+`lN@SR(C+Ny`vZYitZj)7u5XJN<|DamTG!5;JsgP3sEBPSUEm9Of6#U&lwq)rlLAZu0;y4P33AwXF>T8j-Rm#leOuE*-kQ|f44nTQ%I?F_4t zb$8y^Z?mdMBJZ$k9A~+6T2pny1~S}u4m7c)f?pZ4r|nh)cboXA``8Zg&BgD{3@nwF zp3Ui9b*skgPUR@hAb;dbwxbl2^YtnzRnM(5-$H)gXnpWmoERj4Vw9`3^@X zGHQFIs;VI|#kLR2^<@2Vs!^>1vp`o04K%|1`7*=Pj?wr*4eKi>H8%EwYY5$667q;z zqddL3%V<-wOYb9xkUtYkGhvH?u`^+ZO{uEM#e*51R%wcsR-#Rtx%iwsp8lY{L0i4S zI#qT#)bxQrjfxLkerrNSwcN%;-x{n1jk{G}+`IJK)kl`TxAfrB`={Q#^rofG-20ZUQLHbSmoA<( zPJLi$`~03c^WxtXj>RV@UpDo<#cwVSS8ktt!{WQ}Coi1)_u0tGR~If_ zef`2qRt~Qv7vp25%b#lu}X(hOF`SKT*Z$0gXFC=?L15_Jbm@8Bgg$`vWH(Md- zV3LfZ9&B5}y?i&ER}zg)C^1nZm8_*ThC`%$h~g^#TEy1$v>Q>i?!pI1`Jh|tWQ-}kXVMsZ z$tZpCR|&o5N%M4}QH-RF2%1XfHOn&H<+syxUl%X5C~Li*rin@-)au1D)~-ziv1M$T zuwbOmkq5d?Yy6Cr3EMltNVsH+Pah@?D)u~WI+<%EI)=DVvr*@NbNcKJQ=>Cf$nu#% z#FQzj^vz~CW54Xa6Mb$bS?sU2zg1KLZ^l1Ew>G_Z-Z$z8E@N`nY{);*+r8bX+< zW+Gu*ty0R{H9Dd-3)!+(P1_PhjiU>TP%Wb+5?82M926VY_?6b6#nev4mjzPKcxKD3 zP?}*25^731+jKbdv53yx2*-DRP%1t!3e`%Aq1^UjOzrd}=vra&52T)|H>0O;8%-qx zF*=^1CW(41RGms2tu1TVb}8(NQn|h4fD=~Lq8?ITM4v_9d|U8 zx6#gyQoRr&)t9>cA`=`K;c44ujq$LsgPhPp!e4MPm0ly6(+5h@h2%}7o@6@4n)1e! zDw9=PDJ>@tb1)vPGFEN4;VSoSR!j0iC#gS`t67+~rVjVR5F2VG86rT1U?vo%H3>bg z+`e33UxdDhoK!;HZn4qEUcF=QJ4z8fJN?R)%QpaP?O0~(K&TX)Ds@{|^oN`kOCS@F zS64k$Q?o&2*l8x>T4Ouu`z!hJ3|FkMwsOSh4Iz_YG2#0ip%*kwAVnoBz}(1}`|7;! z`=oDKgDLDbHhY1%CF?0o&{Lo;ftrk6^49q#nx4+%ZeO1YR)EEsN4T(}ZR?${yI;mu8%jrLv_ZpI<6`mBIV z_gjKYEzqlJ3@Mu~ksPRro+pHpb-l&vNp5|4-W6dJ@Ae~7?m`clOjF^13xIJUKnb0$t z1kV)P7NafFsfBwf{;#tUG6U&Ek1m!beWoAPzLg#2$)8_kvVa0c-P2C)pKk{R|)oUw5Bs5aH|DFyAp&k}kg z8_%%4q!#94-Vlw_`>&JfT%^P3S)E&DEc*l5!o}qBD>RI?JnfEAgM7Qs;kzofU2T-Kmq<%u0P&IbGJaZ}th$4>u(qwtp8G}8;bf&~43r$6ZqC)oYIIi+ zHC4!@b6%=c;XsdhWur2|W``113`MEK^0J$K^{N zeuz|`XeFEGfl^=BW-F#rHghGpTnjlzT*8R(9k`GE{LCv-`K6R%_dBcsuOKv0WDG5~89tr82 zdXqJ8O6+&Y#S`W(Jojz7%ih`m{%IEVbhEaJ- zNtd0Co3+ArtxR`YI&1*uS+gw>qRgqyMEezllrg~!lohukcD?O?R14Tg<7TNF{>BfO$I1iT zLI$dhn2p_eqg;=*l5iE^BHQCa-E?BBygai8Z2+dzcsK39Wul##`!MNMrW`TS*`VHE zt+ENAqpj2>I>tZ4==H2g$CzRpP_u#axbQ$3qDP>$0+3GnJyUN3dh(} zjNhEC`qBq(C-tZE*%-#Z<;Y*|f7GQ5r{c4EmsGVt2dxrrvJDA8(HSwp{EPpab_Ri~D&km;#bjd5!- z8mrLg8>8{ff0yaOP?#|X(nVb|ZPmvUn=!$X6-G$lQImCB{A|J0VH!f>oK^V)uiD5M z)Eb8G_PlL%X8Nl#-3EQClGgguU5nqYR_*=>nX!b@(+uhREr-hsK_F~?k`#{#eTHKB zyq)*8I}yEhS5~HnoaF%>MyPYpnsBKN!r6Dr410)YJQ|ChG14iAyRcD~WHEEdOl2d+ zjJcn0bxqk#3*>jB$$nDnbZbMtNRKjS759^BqFRfOGSrn0m&VtLSqiIrv@Z=GQr|UHPe4^F2=wgd8&QGRWN=2^Si4)140gfc$i%8fvh7fQi=mu$5Qm z!u!Zrq^YjJ7^0j}@L5tbQg|Q;=~kER);xx26S(lcqVi($V@0LD)2(D_Hfz%q;)2~rDvcpV z7m@8OlmsnqV!0#VB6NX6gZo^#q_@*tPFb*@n2%P3qG9H6sS)wg=@#sha$iDRKbElj zGN!&N2!n(AFQlG?DHEr>aa|c2mc}6@)$-158muj<9&r{kKyh?)YVQw6;VnRAUfI3G z&fLBbntEuiKLO+q5ndaAM>4D9QpywJLg*SdYY@NH@7xMMfia%=L|-St^X?gHM7-?7 zQyd_Lay5NZLZ6`Gl*jH6a-Os`NvfH6D_jJ|d4Q%_1|a9Xz=}=2RdPcMA3qoA3W$5Z zx|KKd`k_*V+082SGP%@_1i(Ycnzu_>})`6El)HbfQ%a~AI`JMdBw@I1!r1)|~@B=pnxjB$~ z*vp8I+{qu_d) zi-`9eI|OIs6E4!T`~4@}kr5Dz@NYzV<$<+_gu_w{yA;DJ4xWXR;Md+aijz815pnI? zltaAY{V(c{EWV$=b&vBXAbnqV7z<>p@${vD1!DWanHPv0xWjx1ATx+I>q`(`2o^+e zFM?SSBad)bMtt{&Mv+Bl;EIZS@A|)?`QgouxTR8*Mf4)FDNx{=FzUi3Q*!<~RR);uHM)&Hq@k^x8DPSGtLwBhYkAS-|m55({A^1 z3Lagg4p)(@xvVCAtE$T+>6)k*!q@nh_rtsFbPmwEJqWQ_f8UgNN7}x9X!`_0Qr3D! zt6R%d19o%CNf}E9(tuAsz;9X|V~sq)@B1WwmE=l(@yVY@La=%tA+;uDk`7pqMRF8~ zaMPzS5@Rel5Z`>R_{?7}+A;j?r$)gi$EDOK#Ko^~QH9%V&#p39b9f%=kZQILQOy`j zeBy!X0g||&Gn6E_{6bVj+LP`#Ll(+wO2iGpM3HsK6&XH`295E=nkpwbBx?Yd_@rgq@ZBGW z$L(NY9ADmyF`~BSGbAvC;-8FaX+;wx=Irp4)Zr|Me z?6b2!n0;vWgR{5H_GaU=)>&$H*X+d1f6sh-=94q;o_XU;W9DTu#+jGSY@2?5`pM~U zPTxO$$Mox_tJBeG!}JByTc-Xt^^2)*Ox-v2&Z*ZLnK|(vC=nw)q8uuc67G;M z?hmJvmk>n@$zzef8t zy&P?)gIdNWSEG&Am`bj#bH{_NdZoC7Xzt|z6IL>Yfjyvdv_e7H*bb0a)v~|m^Wg(e zoiequEhBy9f0K&*ophS&)wFa7X_Htgea>!~-pX63nn9nSEq)FFXWpk|deuZT4Ry;C z*82P1sOIu-%k;9IV*^S$h6Lf7f!yX<}+E`+X)OocWY0vlVG%wW=U7W|aM^u9C{}cs|XmGNypWLG!R3k*YdaaJqrt$~9#Z5&2FZ-HN4P!R5DW|fJq|TXDa)kk1*I>OK zO(*U4db7d8C1;U_`qE6D?pxcAsz0x@$8!he8S^E4`u|Vao5#sfRqf;HWHOmdCbJ}& znJkl#5N4796T8;#3L&Jos^0gVE!F$J_w=GTL_l0X;RSLP5DC04AQ=)7+Xa#67eQ1O zeSJmTh>E!2!i$O^!tYd9Ws)f-$}fN9liYLrRMoxbZs(r!JY-Ts`jRtRh~tY+NG<2K zIcHhS5=wAsDwWG(3FWsWMJC|24qB=+vAEmOFvixoq;ht~KzMc&H!F7J5tWSb~pV67p*PTDhXX&HJfWW0HXLG zV!5+wq$)Na%N2`3@S1PAQz|ZHeOPElAFPpHwbg49k3j`z!5)nOI|3F|Su=&~_U%&b zWT;}Lcw-py=o=)n;(b!FEgYD!TH}qH(OuI~=Wgh};%vcbhDb`DhE>({-yaXAVRcfsfJfCq*{Yk2i*#V!X94}@lzcc8dHb`G( zug|pdO@ESUwHPagFH?0dVG4F*J?~d~^6`2kPsNr#CMvOOls+QGRJFQzoosN)&7zy9 zV4G1gxGSd5=uH{BrNmD^B>FcBwv-2Oy(qRC&Zl*GhQdYvM!^<@xRsEGXxph;)>lgQ zT_!#Na^P6PRJEF2tlQ-GCwxc5a%(kM!^%#|k_rYPH%9FdPk#k#rlP|hPZ^jW0`7!&nWV>@Es?Q!RymWM@zl+#CAUlUO&+IO<7_bcY?#id zRezDH8w(_OA9$yw#Lx+UrvH6XxjN&(jmC-%=njHFGqUu0vD{Kp>9B+bZ`fz8SkaQ? zSM!n}t*H~LOiXK6CNhmoddam?d5U6j!NVE~SXoXJRX-(_Cqg*k3c0mWlO<6v5Y&H5 z<+i2?YemB`Mmb|F1`}I8CY9^U719z^nXy2;W{<-B_d7|T%T_Q89&T!^nYI>SkRK91 z*j#p|aMEtIrMyXFP3@EhmN~`+Fg9$UBesCC=FeU5F{yf>;GnaZ$V3 z+j8R6Ot!8w=HXDr4~v1W1+!4`2GMU{ z0H2Tw&$Svj4e?86V`iIpiB~X_?I0G?H@TQL%ENwW;*+8tQzLC7^e%8?nCjYmG3$Fx zd`(lnhIs-+&YGRgHAzRhSLzoNTv-w`e7NO~8&ugqa-Zl$DwyJ$9O$Cz^(NbsYTfj``p4rh1X zCq_sXj9w#)Sqqw|CPrzBwb(lGTBBgJWWt_UQd_HpqfNL3yF}E()c|uF)9K=D#$9ft zZ5NcF>62GjXCtHxZi#Jn-Pc%N0^Jjz);#;8=WlB%L} z2huA~NI$Rzthg37CatpSIJ|oyarGqPQ>`qA#PDO|iP0{w;3|#(X z`c_KiR=1uAmh(v}m7#);SkHH*aznX=rCoU?0ZG=FA+n`kEH||3K0F#Cs^C-4RJ^gR z8>MoGi69I<0!VGb%>ota?GYm+A%`sh@HiTGu9PzBJn0J$i1qc6K%NMbhR9CG=sA>k80Z= zPYSdwsVTdB?l|0VCK4M&FLps|GwX>kA7l!paNF)uZC@hQrz$0^!Bx!Za@@hpWCpJm z%K;TChmmTBvT877BCUw&W8zw&naQV`d?{M;7lP*Yq(`U?`#()iRmGxoDCDkKed&DK zA-bLm8k;FeCY4MzP*-Z{AicgNsb>KLGNnoS;=Gz*+c8?&1ZY?l4f#unENN!lNnJ#H zo>X70)nkDgaK9VCUq`9EKNOpXX=V%NSpx-&aSCwzGMmI3@&ePu;5IZFFu{Upk7P0% z|4XW$O!+J^UfFCw6s9h|?H{6gMm3Wlm_pN|r`mRpH}Wp6R8DCEM2)Lt<6whrdt%jy zRF3ECL~F1N&RS6iZndvR|58L(Ybe zp!1$aGGt>~?byiOqQVes$r1LbEkd_aep8g1(23>2V%CEPZCtjbZupcCRQ64&T&pQy zUYAYD>(yqhS3Ul5@qL3DV}?`CT4}}^shMrD)zZ=#2+(Pw>BI?>MO#X1@bj(_^#nXc z3!!boPM=T)A?3k4D(VS%XgBVysl7Vd?I}?%hg97fbYq;8PSE9ejLVUxC#7;T7A1{g zbKcveqgC^4(shlb$5<+OYFgG)$~Q4jM)5bX*k7$QHD;f?)^2$q%VqdMQH{@($l)vi zm1yhvN+XjDNE;x3xtRc$c(hQ+htzppYHCufua6ZVpw;W6JpQt+>5KTU5Z%*jfDZn= z0Y7BHe!lnT%lnt96>)GFsqKQ3JcfobFP=v~V zdkH)&FMn%O=MUc%d}y{KKo5D61d;bqKmbuG;rbsbp+C) z1scQ+-+{*6M1dCZ1|g9!R+L0JlSsx%jfM+%n|3W4dJG&#av3-cU*6xTJSKFH>j*io zqg<%j>UgYV3faA8vfRYQH@WmlcoUfn9m}P5pyw6T#?IHDgfz=F*De{T_21q1RPP(h zcMh6>dh6QG@jHi#kO6KvqJtI_-CL}yt9InLw2vK*!6Ah5Se8Hr}wl^TH1V|*Y>?C?*Zbc9Jq`^4e`SK5imv9_8#S_`it21FD7N^4+ zU}o3kv!b%kKLg5SGIVebaCEvfhikqsdQSzGNYV2ds-_)&%;xu{GFfNVSHna-pZ+Q6 zk;%}Fo-3x1@^{7!ofSU=J)3MtE`+pJ(borg-;OZs>ysE&DmN0MmS>(btX;i8f?oEY z1rAiJV{?c8i7=vEM*zTHvLAC9)<8n(PGk}g+7xkjziAXr{|JV-OopC$==VF&(FZQt z)cNR-U{p;IM+8dGi@G;CbeeK#aTOD4^Q6gCro@+N{T$TDMCh1v!&K+%KNqa$Jxc~E z{de?zyZ7(Qw=Z)l-ZRJvUh7ylwb?x1UM4eXk7ALiwvO=@C6$h$;;&%D%8DUj{x4k= zoaN}PtJv|*3%?Qp1O$3WvAvqbIs~w{SSD)r7R@?_7W9m6C2>NjJ{>PgRu64k_Kj}h zd}sKVqDcsBk)ldHu1b5cILSK$I#L}{M!G7|xi7-ZCYPZb18V@1y6swaUFX^t z0Vx3{7H)oG$tKcKUr^_8WGJ;QXO5s7UNVfH#i*5P@^mDlh1JmU_4l7f!qidz!2ra4 zEWDyPLqw^PFNJIH49jS><${{(YDNG0Ep&}chK>#VA6V^AuUL*&z1uL_x#V{OmV@(% zKqe`g?%M*5L}h^&K$%R2u!akijZXBS(ho0O*LmOtcrUO$fmKp`v$DRdw_ute?{ebF zoYR^WluZrGi_zg%cI-sO$GCB{{)6AKbew-Q^eBc^K|{-ew;SMp;~SA|LTLCg)c%uU zcyOTz9ed*OQ|Juq(7sB~9yEME_Y6AmXT#*kWq|V5cW>|iE?)|{NS6V#)@QJCuR>rp z;snq7DPG8&p{1$ddS@xCp{&4>mqdU6JG`yDSR}0a+QY`tPU2NScY`@!V1*P@>PvoC zLq)_~mO_9D+0EvJcxATdZ-(JvxePtiHg%Kq*LH6Co7fMI`F`-%ON}TIgIrw~<+j*> zm80HHoS2M1R18L7jigdpg`Cp_zXL4O0pQhJN{$;k;GqWh?r_JumdVr}vw}{51}%pZACt8t2_W5^vIF zybiUcX<^$2O$;C!DBjgk8SK6SFjevrocRV3>GQ2v_z{) znj%EgY%tU4n3-LR)-PuPb#9>y9ej9ImxTtv$(FMMv&s>H=usraEVC4x>5VQ`w4gNw zB7mr{V;MU&Br8Tow_EpjZeIq!o}i9g44))I?-g72h>rj=Bi>sJ*)SD)*A{jhz23_X z4K5TRzJ7EHIaSAd1bCQr0CKPwM&B!9cGcGQT4Rnlkwtg(!CT0R zVQUbRLIBpTWZ^EqmBgDgsr4mn_PQfZ0X=-T5kA@vjUbZ=bnrCbB&Jq&{?gCd1bg$( z+Z%wyHFyAxb=R^s5-{i!C^*1Q4ahW9-_|MQfm!e=|y>8y?&{4uF^JnW$MlG0xs~CfkUvXW?pi zq1|+CqqFtJsrM?7dL!E2qlRK6VuS_-uA$SS|w| zu^gD+{pYaZ^#B$P!1+E*z@ram++YiUYX?LhXxk(Uh<9YCdFb{%?Rid{3hXoZ`~w*hzWbpz|sosUipql!m7&8ZUvcp3%5!$w6dh%qr%DHT4T(1FQ33m>l+5xZ{ zK&k=LANUShLJI=S?z!yXy2WasmlGHNr)K!rw#!e(>^2w@o=XR+%9()(; zTC;CSe`4_Lz7GuOd%w_gV%d;lpRlG*!I{8zL}26;cTy@NoFnmcq?swR&M3IU#Uc78 z&8``i%aBI(Pr!is!9T}3m#J95@UtI@z)B|W;OVptysB}HuL5hSi$>*PSWOS_Vb={V zl%T^mJtxH9ZR#w$fCU6n#}R?nQ`{8?DW^|KHXY3-OXVp?N_>}H6uWkCp$L`Z|2^3$ zQS4>Hw)y~kji`WbG(#L7@&PDIEs<0LAYpesgZZ#$Go@aDvAVD-I(GXlQ-^>b8Ua7_ zSO;T-R|_AxY<`)S4_aYp1K}M8hZNwsj8om7Z+6&PB z@_Zjmsr(392z|OI7LSBjKjfMU^swPVpSB?kLFxQ}%y)*M*U_h9ey;MbxC4gDV+NGcA15q-@hoIilZQ#yb6 zAXURoIIP-QOwY5Bb}SBtqK+LNmdnubk@2ZR7RRQ}(>gFA&?69Qisu-M$r8Z`x=cG9 zO+1j+q=nuaMIYBdJIQ6}@UL#zg_JA7f$}d6dyxPInE*v1u$gH_l~j=ibJ3piw%pz- zI%;Oew&El~GpBRp%Bms7d->A?q}(PJTurVc0*9*jf@ynBt0CxY!JY_}lgVV)yrza^ z#c1TJ_rihgCDo?Rq(xBSJR&fsiWbUgwT2{7DB@17-Q6+)(OuUJj;COP};!=OUlf zIp*973m}ARI49gU<>tdeGfXT*7_xq!&92iXYcceQo1Ge5Sc=M@**zt3gMZG;0%orX zm^1_se}O3kh#P>*DFpNt!f(eA>4SNF(HiK)hu;4mw`|+8CzlT!@CgX8z_2CC191-! z8o6Mb;p%?nD0;%rj;vd(20F3+XZyqj^uoXy7tmV*uzJY*OzO`|gNyX1#J`P&+2A-( zZs33boVM#tfU~O+XhneUCXC8A!92d-!1ka{m>mM({>7@jqmAp<0!2Xe z0Zk25S1w@DNFhZ7o@Ks-UAK0T3h3B@k4eD&U%%vxE9m-5p$%knp*T;Dokb}b@^t!S zS+(wz*%`j}{Oc9y3zxHQ0b%@nfKa`Z92&)s#u*2I` zbf6#{UlvNx!3XGb&?CQk1>DC4&>}z>mgnb~MyMEMu!IB9NtBgxNRbrzf+-Lj(iBdnJ>?i~fh;biQe#Y-an#6x3Ry8aruoSv z+WH!hale#c-cg^lGkE{&xP{(%SEf}VxN=*F$PgpLO+`JL|;R5*{+=3fOXRn$H#uQx$j zV$)srq)@mDDrCjz#^eQ(pa01!ESHca(S$6CWupIRk#%7Vt#3e!EV4MD{gb;lb(#%u z8^KNxI3c736QGPrZp;j!I|NCFf;z?>_~+>-FfsswDV(X4${5`NWbzWB-@? ze!F69;Ci6bC@Vf8+!S3S%mH%(>4CVTPhw~SR&3bNNCG%qT=>Kafelc5`L z8k`mdPgpUgWcnkoxfbij!W8heFU_r=9YjqkqD&P(9<(mBVTo-eP*Y7h7q)_Mb2ws zPbrgurv`2&gu9at+?~M0MjjEE5=4vCGqIMJu=?!=d%jw#+SQ`-;oTpBx01^sjY_)% z-M@D4TJ)rI0!;HQ7A^ul%1*A~mkjFr?&*DQ`HE$Pf(M3EG36}t$`PMD0^!-Plg+71j5IeEiIoCJer0KjY zcUaiDjiNmWtVt#VEcI((o)NBR_I+EwrgI3f0BGE``Y(U1Yor3IylABPghlJZf&e3y zGcb8)0AS?>wW~f3M=qHR?keAcX%J%kQ0C(&?dUHtm=~_Um7SQd%=N<97w>Vac5ALs zFgsm#4X3G^Fj47GZUqBfC_?--^(l1V8s&P#+{V5kzGUEb!8Ydvym`?!qoE*V0vd~z zY_(u(Rn1vZ-#xd(OUh*E@LwF@M?R;vyo*S zU40X~?(L%EpLH2Kf4K=J+Rf@Y0Rx}wo^~ris;(jMWYnthlSyBY6z7M=9nhmP8B%PR znmY8pz8>MeZ5{gg*6a3khCV5ry{V!Xa}YCrKFvTRth1&*^Z=}aAHEYttxSZDT~fe0 z%IdCb6zITR?8WPWhZ>kGfJ+Q0kiq36P$psy;2i5}_}yKw8D6{wdS>J1e@okR>~8k1 zabWla7QY<)4ct}WxC5R};JM79%zv{}ql*eVif?}JBML-(nq4!V7g#WDK&UA2f&urX z7f9Ozp$59-)9lo`#e|2VKRn6PvFo$!@R%*&2ZlM|#S}OO1F+TCyCAgqxG1KKGd(8C2HQrO9J0=pw{Qn)?~PKofn;O1VuN(ZPZZtS{EA+1i} zQwCmX@Dl@%i8}}H12nN3T(n@@eeCesMXI2upSWQ^I(i@LIRjDH`Xk^=eA`Mqzfy0d z;m_$u0eRJq;!iAat$*Qu);Dm|$-1Nu=;&IYe?!NFv$V_-yGA;-sC}Y4*V;xp zjR#mDrU}?xwFDNl>MP|0hWlzf`uP`Ne9DUjByd}Ye-L(d6X7|aY>@Ubn9gKV5=~zS zv)0uGV+m<~4kPr3UxX3*Hc@vALv`4&VkoKe+CwRGJmYh_$}S*-7k+i@OW@~QC_yj3 zY?D}?)_xg2au@&s00XX^X~*hTzGaA_cYg&Yd|4@^fZk^7{Oc=l;WJXT)`%k9X_U$& z-71yRDs_&#|t;;9GWj_65jN}7KL9)|6Jdu{+`+bg;giMy1}q{AhMeBoMkDxDDw zbUnK4VRmqEp$I+mIy2e1^IPOGa@iPO^60Z6XSz*VgvJ<0Kl=vk0_CF4;pg84zKYNPKi0kla#)-5msT>{5bb7i zQInDGt1kWqYd`cTI{?IT0-rN*7q{WgA}^$+0{>km+eYU+%AT`sF)2E5%e6P0VaO=H z#U5S{#Go(~frb!p(}3F&Qe;`+B{$)MF^{6Bz6EZOMXLaf!G?Y4==siJqU0|rp2%ey%5~lr8hkgWCsE%g6h#>-!(Y z#l3$QwpQR2yed4m5eBw+BkgwbEJg4^Dx3ferdSe>+`6P>4j0B7_~Kpt|^;hpd}(^#!iFt>~vf5IL^htK8K zqFq0Nwpu6xALC=v)%J&fB;2x-a~og+&~zt&nQ|@)aG1O^A5g{9RifLKD}M|QngtT1 zAXZN;IBh+H%FnS|HwEW_*+WXTuTZrB!P0eyIuWl>X`yk)wTynpD{@3iq<9e4sj0&3> z12E&o@;0vtc+>r9vA2>02G)wt#06_e=72gB(zjA+FS_c3(qZ{Wfln7#$aD~w%% zFc$cLO+eUdqR>}=13RY0gh;XMqcEji!j2&Qi>&qx54i0`_RuEV%}eJq?H6{vWFMGH zxqvcsVWke(hg*U6KRy*f#P7S;=izKP!MABR~Ju+4HnJ8Mq~{MKmCOYG#@MWkp15WUb1an%I+#!F|M z*f;(WCU(b7a9WnALS@F+HOcX_XaXWaP9v0*)#{pP=gJ?pc1ex#g+H_IHMfGlW8nG~ zWBo__{<>TX>=d^O{*L!`{TkY%LwldXr{=trXR~_iqsNAd?~9FnlT=ZoKo0zk!EmkfRHL zIJadcgbtef)*}0>?AY)^ffJ&X9|mU^;D>DLeBo8W5geY|0wY?S!t*Ysj$x%T z>#(=0dZR|1!k>Q~PFGLAESx+S%F*HTLsEd!?*9{FbJTNN=Z{h8xC}%It$7W$QSxGR zqQ7Tnr}UcOB-MCQtd{iqLZ*y|t*C41Tgu!R`t|E@Xp)K0Gtaj7bu|BELy8g7q$PB~ zh>j)rm?;m}t>|-az{r;si?NX>JrG+JXxE$U`6GC$3{ZJ$x4~dhIcm5^+Hk!4O*rex zWN6!q4@`C*d6T_UF)V9`)7t5lYq{Y?n@O6hE?LT53;-8E`wf99!VxMgoSJ}29q6`k zbi9XKk6v8LtsYyvO6SJD{cseUc#i8sclK~A0Uaa?!3IgV)rbmU7H!xh<-?pyDQKDm zV35V6or53x5gdcA@8w3;huSVGtcMW~u^SLu0f#~#+zt7&(D0+^JH6cS*y1&$c%Dz~ z8%O(AaA%6=IkbYi>kOTGc^|aXBArSL;XJc&+U(~75MAO<13U+8hq4eD1MxPT37Frr z?XFpTsh=AfTf7FkG36UWk8Itz6)zga1(QtWlq2(N_O{9#ik<)iR%tBQ?6^(nY!2z zheo({LoyM#9bb`d99|pYOp0M%59EVbEL65CH8x8VrbM9)<7?rkG7-9Q^aEWE!A+gV z*K*)Cch2pcpA%hp3{dA=L^$gNj=zczm7j-*pD%9YAoPEs2%UI6A~^6*-dK-s5_CD{ zcEC-aJ2jeyEP-V?l0DJYX=vK&|&2P2)nsOy}6^`AZT&SO~QwXzP%(Kj5YuO)NIlP zY?gRHoMi{b;bmkZ(Y4pT($9|zYHV}oz{^N|9ntFblscjV76lhXUWr|O!6>|pXMqTI z6wd&9&GP?UgKijw%!u1Zx%qpcsDL{Ygfyc2dw;roC8QBWJKIVtAlB41cM5jKY17+^ zSW0EKI1NQ>2GVw5I}DEP9UMf5$z)>g&Yijo$2)}`@EmX$3b-?(!*GUlsY9+pMGNdp)J9%gowV`v{B=qJcY`*#8^;iPvcOq5Vn$+{LRCmc8McM7} zHgXv{abIMzb96g*F_( zf3th;U7$lU274)}Ba&Fzq&DV~#Y9B-n5iMd!eWHIxCfSNlW}ur!+G3(7_W}G-Sh9! zj;8=eVaDXmWP&Cm=aek!vfVIVAIGRA<`_t6aj^z5w1<9FK-Z z4kjpNlU7$)o?}(w5V&L?%!3O>XyhJX5#RsVJ}E2Yk$v4Zbj}IcX_79cSxsRkvk^}K zcmO#=qxWMRpnS=S(KCC-b{tx@XT0+|K)^xx`y2y9N%V`C!>z2vQw>CTP8W(68T1wn zJt-@N>qa0vJ^F(S$2vt7Xn-LiWTi0!BxEp$xfRJPb45d~(JU1m{$YL|gSt3r|-I4mxcO zr2!PF`x5&pZg^NOg9Fq@gsWyq*ZL&I=^-;|j+&oZ%E`J9Mwix0DC5esTbRIi3@$80 zyy?%-``ejKo%I($pTL(08EN8|0O)iwgJ**J05FG?Bjp5oN(~JvD@IqodGk(mhXGP8 zGz>JTWI)L!;AQCa{(3n~s>?J3{3(7<|C|mUaYc81$^yuH05@~iWLj5=L3*&bdD?H_ z28ZP`i6DH{WVn++GU6 z#-r@>@MJs%`84;L!I0&}2)pNkUFhg5hOy2zi!j5w<}L&sq8&QSo?@JghKxLhb0h%G zp`{!*HMp=C@ef`JeeVI9)+Wb6nq6G$4w1OJOth^w@ZG2x^dlp@ysQ|NAN|y66rUZd zNf<{5=Coiptu9exK3p}J0H`!mu$!z(9fsa(MT+$5L5va7nN(-Y!g z3lND$sw1Iiq5NpEH1Ayt``{fIplL z8?>2#+gxQ0MgqAnfo_(SqQg&o&C&VMB^*$As)_~&iRl4Gr`RM^4Q(7TmkGaESd0$8 zUamjlC0IzXjr*@#@Itp}2guD1m zefG1+;(bPUp5MChN(Fi##$7Uw`-B+yv@Mg%+r3#5F1aWh9%_nRw>QoWk1kpR@sDOd z@^4Nm==KEHKb~>599|z8YHLWiIfKKBhO+6S&2EQI5=tB=Pm7a+OT@R=M$fm0Ff@GL zjtQhsa%Tz%|3s2IwAp?$+}cPUbGe;JHWW)OVnZE;{XDqDQf1%>7sAcCP&<}$=ph${ zGr+~B4{}r3lxTuq%?KyVMXR72pH2SfGaOuLBD5*T^~0Gu2fq1G3rL@Eh;W49csHD_ z!ISr{0=IsrxvHa9pL!WXFm{>{Qi|J}IU^d9iTguG!elqe2qSI`RfbQnB4a1lmy z*NI75iQ(93*@BDKhBi41{Jt+~*Pw5`htr(lkrP*Ncb#Eb`1KXsuxwfAK-$$w5APRe zIp6A(;)?$3df!?;-S^D0kl;Xw!!aT_XP=K%lbK)~-FEQphKY`q&$_TP_&(TkZW59| z#eKL_n<{%STij@E_~UkM8}EMnHsH->l&5=N<@KPe?$~+gs~2tPeB&Bec19wVnWP_U zCX!wn!v@6o|BiNi3+{oZU5kyX`?WUejbpCvmu%lAVx#6?KC?`E|yOpt|HCgnA?S+CbA*h)ek`)8` zfMu%l{9Xq{qZB{Hoj)8eYyD2($Kcb|mQx#6i=*w455dD1iV*gz&taY64+}?B)tqhq zxn5fn+#ZC}$s74xop3{rW&teqj_bIgA(;#*cC+AZKyXj?wFkCbAZ(3(h*o@r+qL-U zfm_~%gQ`1N&?DbY?8bJu~!`p}U7ZJX9OHWJo`B{?NL?HwS;SZ0q2YgI^rH zWAOchg+c$|K0qWLT>baeKL@&|`&XmYv#XP<9jn!=x32CR_{+ev1IGvM9r!OmB#jN& zW>148{h9HcuS62LF#Wz>nx8mj% zSFDJyu&tn0Y+2FU`={Rj?R~iS)4h?8_BMJi@8x>m)jPiYt>wR6{><_(FF(BegUibR zN~&4DYxzjeYfJw$k2Km`$}cr7#g=YZx>WH8#s4TCQvA2#Iz?S^X%`8G&lsAFx?B#s ztQntWhV+w5mMA_a+$DSl0)7N29X@MHXK`STVU&E`Sx=+_A~F)sw^$$MOH^w4gr3VK zY5xbhpfG&cX|Q6oAXebb21hAIZ}my#dZUtX1G!uUcX%N?)AG7hPNkA$Iuef3faR0H zv-WLbc_al`9204(`JmN;MQV8yL=JhC zG&#FUL_p$$=9nvF(!0Zu3|=>pTmL0$3HX6B2E!{EB3I3{u*tUg(15F%!y_8TY)~6b zH6rFLO65*hku>EKq|Xe@)~bX;q=w)FMjm!YA(I-&>F5gC+mWiPXYo2wFee)k!q)^= z!7U5v+|5;7t{g(lJeyAK?3gWY4=LMR-w9rm0FQ=6CvX zMB?lph_COjg~}u(-Gr($oGl%il=`Yh5H&Io^E#umwMIQyAj~2^0ACH))npz6l31cq zF{ToZmqh(lkKc;hEPx4?Xq$9obghVu##aqiD~{Jn6yt945H7jhDAupEF`#}-=xjQ# zisoDqr-)(5SE^1^Qh`csCI)UalUWj&n=zd7q@u`L@j2|EVr&Jy?g|J}SQ84hnP?pDb4oc;2%0R|c&A@D?%CoUX zazHZjk}<8*Xn?>?N#OPr!G1}q&rmVEny%T~VH>8krTW%M<+Le5#0@43P@MquR_dbX zrE;YS$gUH44=_^Mt$fxdVoUNxAWXo+DXl93!7iSe+`#OB_=94h86=FEQlJS)n|Lg( zep57{V!|Kd_!>~$gs75IWqGeuJrFMAGuF6H<8vteGl^Z2K^GxLnDFX!SxZq_G{>kR z5r>#BvIRd8kGmSd$c(e(B^XjtKdWUM`ld47cAFTpKeDTfZxcKz|dA@4rG)6m>X>8dft^iY)?oI0v2--?PBS9G<4tU9Z)x zrZ~Sw8m5JCpn~BuE;|;|l4&Dl_es^Q1fcwIO}9e_LmuO#uPSi<1Q7s2)3!1YDUr0t zAVN0s1+2l~I8$%b7^8(RWrjpTB|cvTdV^JQf=mJ_> zOPAa&%>ucsB}N)dTm}p10rxYqX^W^omsVX}Bd48#k~aMWfB zyIj&AV4U6>r`G;VdaO$2Fc$K)Or_+;X>yOqKE`K=O3H32kg$4~ zj8%SE1R3Sixe7rvgBG)1Wsi8u>6QCL_32zVi`OtEX|eHTm}z$2C~8mVG>)7*8?;B0 zN?#z&%w8_l=bJOIaQTZi+7bpc*97A03m<#dz5O{%oZYsiLp zOWYwX-lZd&{q4&_U$qbiOM;OB~?U6IrcN6Im*a|2Pg1vLx-Vv&<~%4g08V2gM)6+IBP1 zaA})H<4h=?WH1pbmX8&5MY5Fhxtv&u*Sjf7YUEhJS}HM_qN;B4DBaXDwWP+KE0b0h zOeNoR#Q6**qTch-R=$O&YK~BwE7Y1z!u^mm|36~?kMRsdmu{K#uj7z#@ECjM1nwknPh@CWu%mAVf4=TNaemT#N(6Y zgrks&DTDmppj7S-@feoFTZR->b6H5oZ=`Yu?In!yXeh;Ma+z3Ur%f#9qplQAH66NH z2WGW!d`f??3#-cWW=7S{;HDU92?g@YBsILTRf5JOW^_4E3MRAV&q-=Hj=-wcBoPex z@Mb+WA&o8`NVQ@65_Ni9kz_oh-Y&IUxEW?~Hy=|)wZT@K$?Q2GLgw<}Mp79V%|9H~YhC_olrH&Z z%(19CCKU%Qj;7gNa3ue{M8wI3OHF^YW+_{cuN76aFFZ2tMBRF ze=VP0cJWDALLu4g;(3ol)0ec$l@KeI2#TW{I3cSxU5mJOcE+I>P`BQKuwJ|X7{m2wO1xsGvCR_eGm4vn_ z-whW*3ro@S*V*@VetoxanPs07aFxXNP*csi9?(eRF}TfPnHq%K3m(1c&%hhVWavb7 zlNi-@{bz*caLft7S)xZMXUS+wenUP>)eGr7T#0pWP42!Ad>{)&;nuAWTr5#@KF}oMRjGi8AYH>PYPX+h;GU?csW}JlBNIX7>OY{L$Bm=&NO6B(19#Hr z4g?^h`hnhG!kzR5C-0=;(o%pV5iczRj*^!pvXs84F92vU&ZCjX;G=)}CFnhw2m(%e zc8aig7kyc1Jl9+V^oUn*1}~Rj@Q_ET(<$wyf;uT$!RNmMff)-$kV5cn$lT)96P>kR z6>gO6bNqZC*wQ*k!&R&4bR}PLwOd(H&E5yWCS@{o;y5nEO04hP`k>Hqwz&h)a$;8o zN?KAy(Ao&WU~S5#618L>04*|6Hxf_e$@$&`!i}zN4j@1z%T{KZ))_3LXL2TM8LPUa z5pvrxaLUPLrv)m!eoVaNyllReXW}_q43BeZK0+o#h6pLX(CQAnkW2>t=WRQYGQMxD zlkac_#l}nLEvw>+nalvh7jK!2DpS5KDtZ4yphPA@niurvpy3vvV*K_Y&HI|^Fj}|?4D(-mga$T248YB0yk^8=itVJ7IcCc zpCobWa)wbxXiSAoQ&CS{tMC+a_bKS<&z{wT;}J#~r+6%)036xhd(-2k9Pm?sSnr32z zdYX#IX%g15m@)#l4pO%$cathWetj~t<(>5l+kFlVZH7l-Yo}5vr*SIIK)0x((>#Gw z)3}o2X%$68d0ct&F)C)anj|n(-qXMNoju1OJ%@z8i4ZD`0mV_+u8~YUG94k*__Rt1 zjy;TmFO6cSJqHJx4zY92y8Vh%ouj77MeR)AeGY|_m*X@Zi7-4ljq}PlJSP&L2Hjw5 z5sV}mhG6(pW~Nf_20T>s@*n=W1#P|kic{u%rpM^!9}|y8R0NzEr-7OyI!)p{HqG!1 zJ)KbEQ6&l17K_Xe8h8w?hNR>CPE5=%tXr#}X| zT8&N|At&Bht6enz92n;6NE`$0415H97qprh{>#T<>=1FVGmuI{M@8>uC_;s{nWs0u zGb7kH{~Vf##CR-%Pt&nD7=bV)sAEyEiKvRim2lUDC+3GJJcq(Cz@mGrdiJ`LQ|0M) zhT70H6i!?oqoG$L5oi{eai>WYOfTvv6Q8D4F%=G$rXYHjz=Emq%~OPm!RH5u z8qn}hKIQZYd9T#x#N|=&0;re>1_njL%Mc~ zd1sHgVE!>U22X+anvO+ak|EX681w}ln^rOEI8O5# zqcQW3!DF}z=T*!!4VDUDL&LDgvBY#Vs)`VlDjJCc%;8DPB6q`=qT>#jEbn+Sb7~Sh z(__HcVM(TO_?kGaq|^lTjfx@QYe<;HA}R|0iqMn_T)#2ZsYWArQ!uzh1Aa%JqniI5 zI;P^OXbct=iU+e*VlerW5n@_RP<$-LfK~ISOpV-)!#F92ZhwcLLw6rT!sqaDwUQxV zo}?l$l>zk;%mB2KpJvDe7Ky-G8dt04TaAF}1^wj@|2*rR^$j)OXmNEk0u3IY2BlyE zDpdr=4LmQ##Ffz~$rG@ao%R%xfq?^~aq~NS4mtlEoQh&mm@r}1SJLn`U;}COF=dQCHE@XC7+B2zkIn(}2P2>aBcP+vM1p|HJ`o2a5DYHDV=zGD3=st~5}@EX zwKC(oX%&f%-%E;}L!2D@i`tratZgqDsP=!d?}^^OF5kM$0chzXU{??l?3z1;YNvHJ zk_p^e%SQ9Lyq9m&;?40D--MmET!s!#HYN{c_lyB9uc4>&vu}#K|MdLsACS>47Vv{d zOPYE^rAvr=-G4j|dtI3by&V2O09gd=luqE=!jZ-~mx4{ZbdXE=LL3pM+qtYWR>^y% zJ+t#sIB4f&GJvc8uo!21>`~!NYjAoatE7n(oPt>w3Tx^iI{k9``#1KUlgykP#E%OcdgAk_|fqi9yg%3SIWU-1>6> z-TRbToS~{fT{0>GMBG6dSD*|37b0@HFQv}{mYh2q=FE_%ZGgl}110F499vw9PW<-6 z{>~#?*u4sL-m@G)O#nz7z}rHwP?P|+V1PUhDFJ$dK#%+u61B3=a;rxdtpeGL5NE!1 z8F!^(+t$7d-yel^;I)wN1-V&l#tsmFcA#6f;Q-?r2cLQ{N4l)7c zUoBlg?Jeoskr?{xui^RfVv$|F{(=y@txp4WA+9dDjix}T&U-TGx!=G~5Ck2DMaT4tUvLIO;5-~5%Fxm*m4yNX%~qO{T_ZUFBYNL$N#`_ig9rfUB6^-qUVW$ z{k@;*k1lRGm|WJ(C%fRMOO0>qf(~@S7ZvDek5NeZ1xnvGgr34G0+T-h zAfzOu*HhirS1&gXL&oo7HGs8)J7ZXQuko(&K&TA~zl1&S2RQm90Q1MPz+vAO`UXO9 zdyT`Ri`GC2$|x-W`&Ssx6bAnB6~?<3@AuKIVE#0TpSA)lW(ZOSE7fld0&I*10;mE0 zAmD=RXLH5@0R0f6t`uGsB5?bSgMc0L_A2P$p6{&x&&j;K#*d**14c-R1{`!-I|={> z8WJE2at^NvHW&stu?u$R7%+~EEnWrEB!gD;je#?^#-`QAyUt+F&#yKvYR(d@>w`l^ z*P85-{_6(~1AN~@y)P~wflG+2umpNw3AElX04R#7XaPdFIyYvU9-F%0PS<1Nd(W&j zt{s-k0H*O(xa)Y88t**2*0>M$+V=~%iQ-;664b`yq%9FBuvILn%weLU->o;U9g@kA zraE;x0=0F6QP{ZOFJLB$%0f&$vYV8<~Znq%%}Il20_exqC;USN^oVnTkVdrL<(Iw0cvEW zB8iP+vk^#aRC59>qZndbchPnO=69L>Y=$Jwr5uWFF-{FGEJi18ZSL%ReGB|}jb}-J zrSFryPYmdLUL8Dp*$#zAFr^E?l$`eqKzic0@pgA4f%{EiBGWFXyj4PIq|t3ErJ7+* zOB2z_>%m0qxUln!^Nm1nWxc;2zENy++Rp~qYRFMbn9T)KGu>5(s7aXlWFmmNcw=wp zhDjsrP;608JcyaRF*9yT2h-+^@Uy8QSur~JW)CdD0KVISOVOZWlk5Io_z=-*oMx+@ z#8RFJ7ET89YQ$e=T!-#C*SKy-E-60%5We@{4XLdI=Lt6KxL-gk6t`G8CSNFFhI}KQ z*0p2GT12#&AMG@*8IsA6;@uB*FL^h1RJ%aWg#G>=Xa-Ra5%o|>FF+huEUtiAPm5{} zY=;?Op$LetAYblOTKe(r!YhUE2b4!?XW?a9TpVM~FSi-(f(}5mlooWdWsLYSe@d@z8v`y5c5YoAzTL)=A(;&Qe~f(zm>gBL|8!=} zWHL)8Gm~YqlLb?&|Ao_o&k9G78TY&3}T zJ{P{tFxRvG^CMGG;pR#-e#~e>K{>TAlM_-skLkH+C#*o2VdHq;SmL9G?2GQ&&y zIZ2I8uF|6O-0p$fWoIbxP`P-`)KOyTkYw{28?29(+s)n-K$Y>RHjp%>Z3yG^q7t^q zRhz(s+aw}u=~SoO6z);M7AYC$rEd^XpW+*ci7Bf6ln*QeNDwnb~_I0oy&YlnZA(UhROfgp$UOy{9tOX$r$Vl>*#~h(n z!p++IoA~OD!3a6sioSOKDFVzU2LT(xnyPj>HxK>mD#!N{6n|O(Bl_S zjtz%<;lkA0oKSEJKr|fWN*JaT(zYY2nLSFDa5X(}Ic|idNkT@4f5GFcLSe}c z6qXFgwoEK91yxSr_CtYtdnoJ0G!6)pfPU;C2poKc?+>beWiwQI4VJnk@ZZgyU+XCz z>3d;(dEs`zO_l~rQjE4;2vkC0h-=~B@AF!CKM4( z2@f4V@fwdWK+JY<3;#l@g%OY=Y?)RvRpp2xtHyLzl|o+XF6Mk02w0?~JP7@{Wbd8# zs0MlPgb8%Zm-K)eeCyROqF2wO`p~cK)b0%*?*VA**9Ip>&HWejrez-=xrI;AI1I^A z?7|ip0wI<{+bCD?x+md;o`yYmxNE$B(+MN6l7nP)%_K&ySFA~-_kr0Yp~NU{cf2 z6Q;N&H&>s^Xo(X{MCgCC37m@;Q_MKZb)1793-}syhkdiCz=t_UlVp}`a(9=W8<&zH#OQ3Hcx30Y3fNU(5zT@O!IEK$T9=Vj6`NMS887&`jIiezN}yI! z9*i8=4p8@Tx^sVtw+sUdfPyB1(9+d59VJqRx;pAidwdjfArgv%YcQ3M zEhdzx*oH@>WOV=Cw^}>zv?&VwPYXOgnc#n_D=pyw;cLqy9+%A@0gMXo74W!}%)?CE zIzPFB0{2yT0ie>v4yQObmd8Urn=O@-2TI_X-+v`ME+vbV1h0e+kMy{PuO2#Y;LbIl z6Z{hUw|#^=3J@ZqXF)Pj;vl|!HJG^)7C(r}j{F+xd$MgGaUMM%(u##jga)&RHIdG8 z$e*YbTuSiJya(Um>Z{;8NLXSKx4_ku4gLKi)W{~tSOphy0?ZI6pdo4%HUPTnBJ_1d zD6ge9Y+S9$?V)e&`-eb?*HQOxvVpZ_Ya3f&%eB~a0Ya?9LWv`=jjm*&6G5*ME%u)?(s|(s#qdkcUXUU< zWhMG7s`}15KB($&F$Sg0cD``NK^{mVLj#BCu{Atmxd_Fw2dbPNJ+!>eNpxjNkAC#PDfFoGs$=tYGW5?6 zf+zMPuA_!!5QUZ6vZP2KKDN3di5MO32PixG>w~c3vF&IEF3fUp2bbcjcmkSpmPaz^ z>f;;)eL#f7`yX%h)~Gc5*Mt8E+F1tYuwDA4qbO8o1*m$!k}zaop=IGdF`@vN`6fS; zpbXcisqu}gH9=RM{wc8p)%g#fav8kiVORzwim^1fmwW~WSHkNmO=t10Gd?0i*ykw! zjLqy+Kv~la%Xylx_5cv1u^qro!kqZR=cq}5fL*NxI`YV$l>ZQEkspK$mIr}Lv;k+g z3Anp$8|NefZMd2BfpT^A(((wk0r2}*Ya%FG@v-xj=qrz$au_x}O5Hij9zD2>jJs0F zm-PP^kFKu&qR0A+3zTa^wrBXxQL`*Nk{Wt`;P?I8dTHLx#(|qHumERW(fGkqMy3LZ zMs2f3SJwCfF?8c`I7Ldx=*0fF_W^2?bxY^($0`11o?_V+9;#^?j*?nqfvSVu_iudx z%vLE6-H%1#K=A^;x%0{w1b-C1d^GS>aa`#tk#1|KnvYaTLC!l*!27Laq38C;1vf85 z*>CE2zXXS>S^EM8k_3lgELU)cshqY6SqG6eDfYjz0^hj2GWfZRyN+_&2jJoW0ziT*+Bb zRG?6W#T?KuZbGmZ9(;G2O=g~nf`DE=}Eu$jcmD2bMU@-$vNh4O&G zHw|8r(D$hz;N?5pP-+&?Q6m5;4VIh12E_vbg8#BvdK3E3?^EliS8vh*XjIX9*lAsg zOyCP(1k$dY9c~qEW*flH2Q%k0dsqFoo!c(D0N$Q_h4Rh#TuGZDL$H9s9e^kds9+4y86F%x@Cukst1`jY z5~~@jZG1J^wT6 zRM6j>e@@-G)q2zf3!E?jD@~L4ZJ568DhO^p86;2|V$Wb+K1>>Tg49*%FiZFlH+lVfEliD!;0TzZnwhzfa z>z?U6`z9N}R$88k6Db5h5=R;NThK*#ynL3@Q@%_?#555LV z#a0c75)QIOTCYfutj!Z{spD}Y+%a_5(p%pEQ4$`1(Ey9!Q<^QE-@n1%;@B5>6h}dh z%H*y>WQ&|sIBZ!%SSh^QZ+-(y@&{O5WKsEVDIQsL;e8Otx(ZS@aVOh~1|jy*jEjb8 z@mC;2%0sf&&rXM%DcyAErC-64HS1bXLSF=zozt6&Mgc@2M7k=*mWoE9dtscv{5yVh zRS=5Mk{tR2$N)|fdKV9nf zMBcwpe-SEGmHtZYgi+u@9)-cIdfoX5p0HMYJ`JmAM!S-y&{zKo{w4_z;8DTd`{LXG zx)tsDA4;rBXLt_;vI}6uiaoW2+D<2t(feo)Zl`Fft^B;zkv%z%0nkU^TT~SUgivX?r%#HPyC(Q z!C(9FFp}c#8>LzfBIYncjY^-XloCZg{WiQSv62Tj2o${Q&pzBI>hXNS(c*{v= zNdSK^glw&1Jkou)DRkQ(pifdBdhYGQ!Orjh03IP2@bi}k+-l0}4J4!0Cp4*wylNC} ziSQpmVI(|+4L%Ki-cMm$I$!-G?=7_`0ww|yFX~vSSXJe!q8h0F1kXx%5WRJhFMSF* zW-i%}?EhuliY_}a)Ip#6Gqqjx%N^l8yuThC>)+oS9i?PPM$ifB>Kpl}A#l#w7hpRP z*MO+LV1>fODu>gb&xKR+M0e5NsUiqS*n0mwpqI2mnE4(7*%Q6lON(kV)=%?#2;04= zhaq(^O=50kI12gXCMOo*E&oZhd61qQlkfohxd;oD)jo?pJV=Y>0q-3GfzAap2o$bH z*`Ov|#M=!v%0RlimH=pG{wVS05Ir#_;i1ESwu^P*>}!_<=7+lid7wu@pe5uf25>Uj z_IdmXw&8}LeO}v|ZP~dgq6T&FHyNTAZLK#%P#Mss#&37j7Epn#Q3d-BqKp8LhO5OqSP& zxp65ON+pi~IILLUZW8_C3){di{O*z_9_poc%#sT8ge80X&1r(%~!SL z72(o;dgJIy4$=u4F;f)?IVx*fnR&cJh-nBirg(a6*}3 zK?;B``LVJ>nQ?$$BdJBs)9LB$74P1^6y5a{JK%c=o?^({RB=Sc9ElsTa3<6u(C4S& zdq~MV5-Hn}&(KhQEVN*UArT(0RTc6U-e|E6r^Tp;sF>R~(Q{)GssK?twV4JO)5{hB z9Z!t%2)iPLujXXp8K>G}SENyU3p^~LqKQ-xYKd*3!AI?3lZ8CSg7xPs!@;_M@dowbQW4l5PQC%m^n3b)%N+K4|dHgim zKKl{JQOD3ZqC}|%@LGay+zB66!s*<<^QV89Qf`+sqJP z4IWYO$v_};Hf6(U$n8By&p@3fdUSgACdm2m?WeNK4_oNF&?o2UwKGAV4N8nLDLV&- zKbZSa;Gq@t1<-^F`uW2-8m`$-(c+~izivV1ee|iKA;Mc$w65)xTKHr@!?H~QO9jnBfS3b-15IZj=stJ6c`-t=_m*>`E^@yNOKI=+xe z8xD_rVGgKW#urA*v}^`|7CrA=dM{tYWEC!tD!S}^K93&ePaUWAPmP#{|EX6!v>=NO zyephKz^vvG8U)MS9Hpr!9!aHq+LS&C*+%@ROd(D|!=3F49(uc8fijr?WZKj@uAsXY zRsLnKu~Qca<($?++!A(@?G}zMBVaN~sOZSqf6#VbCiunc!UYd3UP4(hg}H_`aYZN* zjOb#SSOMG`7_2-}vJj~AE=Jq=D{CIDLfA+grJ|R`h(^BPR#rmogi3gYeJXf`l{|D+ z{!equf#WCdCB+XjUqZL5>22Uq2iOVG!;96pBG^n0wb2s}g?(zY(@4*3Q$hafNppE+ zBXs=C3lDX48dxx(lfLCnM*Xx`hZ*$xR6b}bMobC*Q*PP@Dd#7Nk~Bgmo`mIVDWKtG zBdpuqGtZ~bm@qLGg@b77{VFS9J;^l?K7hfzYoAY#k4t&T`HkX%&dcZ1LD_h=ps)pT zG6c5;uvkZ+TI50aU=k{tpx=T^&ZqWm={$ar1`876fcYYd4?z*dvj=X6IAGBieU)`? z)_L@z*7{y_yc zc=!8fSVIO6=3p818RdK-BZzx~b;`-F`IE?Mr6;FXZ-GJ=J*Y(T*WEMdc`JRY@pBXsAfnnfRoS?buxkT( zC#5uJ%}9F(49O2&a1N2M(EYvdohGJ*J<8D+PQ!u^P~LnDx3kR}63svw_N_D&Nv1a< z+(S=pT&)4R?TIGw56i^yx*A#1)u17ohA8beY*sB6;`Sh>5D=!pec0{hx4iTQ*j-j@ zBKi;?I=ByA;5+4)Lq1U0h%zIO68c~(oU8^s8V^K~@ndkYAI3n!1H6|o)>-_f39d@W zAPunQ;4OuWGPuX^g4dKuLG8dS%SA*Hj|b@qh-Lp^6ZFZC{pNJE^Ljjaio7_`+Bv;f$TU}24We}bMT>%s4KSzVGo(!juSY3a+cT1R{SQiWWjv#Qc&Y$&+v_-yN4bhIMKhJN7)%k z2(@2eE9dcXgsuDo*opj_K8bcD_%rZITt$f7s)1qr$hS9ju1xTIxosf?hOr>0VMur^ zu5>Y0WBeJXt9!VaL|;#X7zqoVh};Cl$N%Kmj5_D;+=_~UFP?{r8T!v~jJyo`B^)CI z8B!1F*ie7#z@;^E!howo zs#Yx7P6BWbf9m>p2=@7vJmhd)3`cxE>*y~bx_gPj1LX+ak%#KO5{Y4^XtUxCnF0_Z zbr5#UKPF*wlJL-x$;SZ&YWejhte-3$%Jh! z%S?#LI59%yt~KR^vEt{qlS%aXHhfDds~a!}<&b7O8!o3IV9vRaUjCLw$RE^T22I7C zG-6CZ4doMgIhRzRpAsHAe)gkXFYLC?S1UB!tg#F4=V4ou6JWOO6-w z(*= zbukFtNgmxez|faCUBdSYD4>w1AZ&t1#Ev~7V;cNJuqtaP+Zuxg*Gn5gN! zkWt6W*ao-*Cs~e?MnZla@1E|wc@4j2xE6{aP;hfw>}5c-^truUSRc2!bU1$!m_|<> z1{+MuTL#3N?rgc5Hp;eH7x;8kAq%M;rkf02%2shl-j`MqaG}C0EO9+(nuG^s1l1RG zK6X6~p5wCI1Q3Oav{~=fM2jleMY@mmew5xYCgJgWM>k4%wiEj(_;@CQB}G_;XI*x( zVY5NPdPo@1pWFxoD&@gV+&JJK7&jsLyB9+#p!4n%7Z>AAu(;@A3bIPpg8(v4Dwz~i z`>i? zET6V~DK&}ycI@|jTrvID?%~n@?Ez%Ip3&Dt1pMnq3!}c#3r6>ij<5gA`V(Wv&<*l` z**-rK8L^BIBU?v$*Zt?Ze_!|Ib)Q=IPwQ&yE?#F`ch0&gfV%%b!`~f#eE5^YHw+ht z{lkZbPahs%`&xc<|Q2#^7ax)S!HD)7XoHJp;cPcxm8E1M~L}+&EAk2oC55&K%g# z|JVLs_5WM{WBs4#zqUW$@9jU>Ki5Cn_ou#J_I;yop%3-V1JM5yeThDMpQ>+1-(c_W zdtdJTO7FwHM|#`6;a;Yf=-t}ex8{vCKUnkBnupfhvZlV~(lyi?`I=2@dSt%=D6}VJ z$7DCiiZCwXUw;n|UW|_K&P@v#l*Xhl+-AcifR?rftZaN_3-H(IjY)UJPGo#dgWXmP z5S7Sj|0dEMcnpwn4R%tcr2+6qY_HZcW zkSAgqOl)78ZyiSg72CZ>G1+oR`ql3vd7v~ z2b1`JiF8}8jhU>0WU|#XkXJr^`k90@Ga@-sOOTwoZj?i!Izb-#s3=8J+k9s0Oz%8D%yC^K3!u$muez!lDk6maUYwCQME3IKeq}5!fk{XrJJl3#B z?LMrT^0I|sBXRI~v3am$#^&P;=L~ZVKdp{vuMrtawoEcHE$I(5GZ}sIL;o(wiKfYl z0nen^6j|_P6oY^4!loLd5xQ=QSxw4F$!w0w)(b+S!FnBc2f|K!RI6(QRo0)0bgM3d z=b~jLRSu@q`S~Ozpeh?9am7;u!i zyg6~U0Pt!A1Q`Q)Mfz2RhGgn zITekmLYv|9@?STku&9Za)ltnTST%za9syVu=vso9_f*IP=ZU5uD|6sG;sYdJ!(0x$ zO2J;zY$PTzVf=&TRMc*Ec$!4DVv68ut)k!6=wYD8tE<`%f3?1#g1jibi`W zP`5^EX_Zi?!5Fl&O~O<&sF+wxHLr^$){3(|Xl>+he<%|w7|NAwS-syX{;oMv$FjPZ zGwQ0?xR7p4ly9hqNF$+e5>;)%kkfd+Akwv17Axg*IeY@_fnur+G z10WTq=RkkvVSoa~25GPQ>NZEj+)V8kYFHQp@w5XY*=#)D#uQ{>t*GPye>{wl9%2jeZZnIoBA#-AtLv@7cw`M-$m(-|Lb zOsM@vI_jV}(jdSR8+{RuB!aGjQ&-dB!2~vOd$;|((HDTM;G6>VG?=#OZHaS&!h89g zk*2kpHfaimxUm%)2#E3>20Ou+<65!-W!y5Eg96UB(Pt+aOo!QXC5RAno8mgXD8@>d z@feph6xtqAS@@6u@@(`mCIyiT*yfw+rYYVc()J&V@--$4X5^fHPpg!vQW29li@aW~ z7nc`mX{RIXC<7YV8G?MTHJ+hzEoUki$QN{>QK1Ng(M!<^yeQ9vwJAs5s|~9KRAr+V zH-zz^6{l1_r_G#J%&UJQ$nhjKu6!y_+Uf=_S5y#J3*GT>`Z`v%guJa5!#R?P4Wf2( z6;Cc1w56a>nLMDuUAWMkV~QBAtp@WNt5xmR6KB6BNaxH2+*wj9?S6a3lvYgKCpI_F zuSBe!35yKE)xb+ByTejNVn7le?XaJ8QOFbltNey%2~Ij&RUQJDdh{3)}o{kv^Ym*fD~n%K1RR z?)N7daT>W2YA0q*x!Ht6S2ia}dYkxw1oCP|z_2&ETu~?)S}by?s<`sZI-cEJmG|ZMnlz4p1xV6$I}%un9_$LT1B+xO`i5OVb6EQu&C7! zl__hG$!XmvZn4f#s)ei4p`xQrmb|X)wlhR2K3$yDB*+AzH>RLm(N+-wIUwK&s;2qkEY4u7CPco=WcJg?zG@o;j3Xreg`6hYec ziHN7ra5MucPBeWS+Lnve>Tzex=ZY7@=NuR0+sjM_Gen6H3v~xv)-Z#M^sF%mcP>uG zpDiZxf%w^%iS!hf#M)T2md!ER6oXU$Esnn(+~gR|S^$}zB{QnTxuUIM*ZYka?e-Bx zg0-1qG65Wg(r*@r8nyFid!*xw#bMvMN%83!=6?oSRwM?U$2nl<|88A zVrvrNwyxkIeMU!_(7i6wnHWZdE9Ek&qU$)oM{X493Kfl4>;CvW?PHYHR{Y=^k%7r$ zq_^G(lrknu%&ek6C(zldgTSF4Mm1Pd)>t}i{fjUVY_aH#<5bR|PG#gRa^3SHIqfvZ z?T%W&1{Z1>)z~LQDK;b2=53nYoHLbUwb}7&#qnoxtbw<*A-5vXjK}5C1D_Ngu%`TW z3=1V(nmm+TDul@&iFAlFC7SJOvZ^<@E8chy5`Ndpk$!EMHYHsRE)`du|2LtzrCx+8 zzt&ndp7r=Ma&o6qq?h%oJW(n&y@c9Qsn|m6+kzYmtInB&c2Xf{TXZCI#!<1oDjULs zq|#J%go{zT8h->%bf4mHEIuhzG&8a-pMl6k{c?}4>9S^Ve@%EYl&+P@Mhk8xQ;tMB zr}hckztNYqSg@$pq`}G@tXyHAM{J+WvQS)w@&}Yv!s$;iX1<*;NyC&ud*K(N88uMC>`Gh7Wc;O$q7d&PkV4cu5#B9mlPw-wE z=K`QOi4J0U%aJZ%SyEvSL#id<{PGtMQ|K%No(?Gw!d10rqT8NRPj_xYyjRz`P+u10 zOcz}ROkRe=X_C#{Vn7pZQix53?X6MjJOJ}XlMp(D*EbtRH? zM2&`|FmBEJz$qo+LF(?;=eod{>$j~rAB}&KhA2PlLJedUx}7CMa=iohX7!~os}GqB z;H2j-e|~f~yt#yjLdJ0+nYpv`9(odr_VK;D@Lqa$ei)SPpL%C|z%%mV*b`&N#%>rZ zk6k#XA3F<5Aif9gpMM*DZ1fYO*N)~!J);Lk_l~X?3m|@e{hjNt>=r;&t>3YJuv-A} z*^$qT+&0o2xom_U!AG`?tXcQFb>Cn2!`~*C+IV z=n~QooHa1n|3Bao`nKp2%JqBt5A^R9T|(dNTkN~b)OS^1vd__{>D$$}w)gGcS9+iC z{ao+IdN1#d^jdn!-r24{=!a{bS@Y?xKj@M*<~8T7nUVcn_PXqQ%l;t$5$$B(3=~D| zJon{qJSWyfNxPvIGH@Z{G@*7CH}B7aB7z`) z!mY<43@sS;HLI>vWJ;*i#rYk|G!enG$#&UA1j8m_r{Mf{wH^0`vT0pKUpDw7uKR`V z`vNqDsmtJ#R>>7LvqLDA$@z>#3ilEr|2$hz`<&{tg#C~6hS&gJPQcY?lHf42`fTAa z%z0`xE7bg>G$t(>GFG8VkkCs{R;ML(?x0=S^s*XxWR0+$aGrRziBkbWu5l*J5NUAc zbz=KC?&T60`(ZL5+I zyI>b`T)^dcm6o3|j=xDUvZR7u6{1D#j@cr#qX~kd0#9QH`3C zbu}i~-<%u#Hn<$Ht#rAB&1+Tc|CZ1nH(SQ>Xvp9TIpu~{JT`KIN+X(Z3x|2mC3mU_noQL7;gUgJ#@BvNkmGFW%2*pJ9@XsW zdO#m0{w&g~z7#IEmy34F6)!8WfmcL&&KtrM@v^>9hT>KAkW4SwL!2|Fi$S#nBNw76 zpCb~+MKyN@Rb@=AcEJvsOhod8am~iwb7XqX8Az#0!L&W-wZ@dOve0>_n{u&uMp4n! z3v!!g-zM=#oe-jfX>h$c9%c0Mw0}&XJDm0$KA#BGsRWkyyBbkSaCLAFdjZM~<*gRK zfq*)Xz;Z54+~p}-428&$IO{B#KnZs@w)d@=Dcs9lFntzeQnA;r518qk|G>ijeBy2I0Ldn29E|xD5;G)s}Dx z>lciEjtOfrIVd^EH1L4E5M>Vt%^7z)jipp^Z9SE-rmV`r3q-oLpdl56UR`!mbVf-! zdqlcE87Ai)O2Q>CW5FC3!Ngh0$PECn(2NJ&ZhcizPi$d?2WV3*Nmy&vJZ?=J!sX=d zA(3tX??TZ8?nQ;aR@J6#DdGFl1_&ylTtrFjG}zP81Bb=t3b=hpw-~qqz=`=}JvQ4C z+mk_m+v#eOfnX(HRGjg;NS3oc3Y=d#yq&bhq8s-KVyLVqh?$DcVmletv&Qru!S%&a znXFckWua79JZH_TJ%_~RK|Do7)3iPrWRg*TeEmne(&srU;2_O%PE&>xiJip{JuS9} za=w^Vui(;o+GQyuK9m&cb`y;ygGy3fcN2|JbPFxgZSD+_FZeAM)?&b`nW=9IbTdGp z6HLp6R~zXX6p6B>MY_JK!V8IcZH~<`;19<2;_NbOSODC#mLp~tKtmbQ=iDa@gQ;y! zI%2g_-Jwt!(jmW4)s-_<>y0*)P?cxO>aah&O`Pl|*oLvZscLmKn++lv897b(SyR#w zCd*lWOJQ@#6M@M5#yOD@gc@X3rwdbS(o7k{wh0G0&g3UUWXzOl`aFibkxljq9z)LL z3v)zElS-wM1!uN~@BXzYhszSAKI-=AlI8?MEA|bE-G|!f?NCq&&eW7yqZn@r&F76N z1A~X7S#!qh)wdgAQY$cwVWScNa8qT2+u(>32~yN%V?dF_=u#x7uleBe3g2z8E7YXw9xw0NSn2L(6k%S_ds&(Q{t#{R(cvVyJ=IT(o&=v7LBDPn! zXxtcTQf_mS3$iLk)Mj12<>e|4g*IL=`;*yu?^lHOx;$mas5ob8JF+Qj20wQ~q-Qw| zS@3#QL?dDFCqkowr-Rc)0|XW_kSR`WplWPHd6wATqx4~gX1hR=Esm=wOdl2LcrHs; z!l7idnGR{v*u-#`KF?`6W0tU*avGn4Wug{bCAb_ot)u0{>~Qy#RYb|4HA=YzL0X%l zKt!N2Y*Zc#TJ0INxSVKdc@4Lfi<)*+U-hYzdrucWyjBg`W6v6$iF8Wig3{Z97!eS0 zei;#QMku$*Y3iOd=2fw3z1!Hta%Z0q+m{VK!Wi)6%r=ERXwD9*M0zHzAz~%U==QaE zC&~5!;b%3firG?&2S41dZG|?U6iXT-lSJ>>vQV1*^Q~g+GjEOjVD`Qo|$F zgz5)^95q=|P2r1(}G2=G@LNBhJs2LjpH6Ij>eyZ zn2wu|L1u-7hh&@oc`4#E`~ZCsWE7-$oEb=WNJ8p_!UmT*UBun4g#Ubi9-myL#s44R zE+46g=m#MQ01$(S0HF51mmerefj{Nvs$jaWy zFoWp)Pt(Jj>^?8_*+T|!wh`o!f(=YEXfS1YiF+a9aWyVFoZr8cR&XB04D3Fdg7o%F zH=n};?|TRUm;g+mU1c8(O`bJ)AxxRi z>^9;-4z8(kAQylvknwZ$UI^%1g$p$h=zX2r{$|U{5cH~l&(zVxQj9BrX#lDv-L&Og z89N7{#XSB9h~?cT)5!4%L_V+90)-yC1X8tb8rg)7eSK~mJ^#ol!(6vK3W+K9qfjd2 zhBLZBo|4cfAtGve2MLIUC*#yensp?xcWdXm=Rm})f3bHtJwoqy`Lm5=$PK8Jl)T*S#Pkl88iFg| zS53X76*`i=<3Q)Y*C7dEg4MM{;ModVjY)?+X=)I{6ny4iA*@QuL-(J5!-3A$Z}89M z>jABn04URjt|pIVtr>LPHz5#7N)|xP*1kZy0c5?{U_!V_?XD3`d%K+^QSMvth?FeA ziv9ju{3EUy=FnhfOdGD|ZB8vmBKLRT5h+=C1OVhfN z&X-B3k@~yvxReaY{|{L^U-~YDd2O)utbcT5YR#vIuN*oDqSb9ew7Qaq`2pXe2xq3Z z$O*Wj4Teh|GHlkz0dn$9dU^*2m7Pyo5%iK~=CL zH@^J;%B$d`v@1(d+JSa7ZA&Mb5TwCpSU^O)DaRU&=&*{JMBn}qyAwkY{*x0B1-p_3V>{Cg zX`k*8{{hLVTh=Z|(iW8Ij3MnLJ#s9NE99g6b~l3puS2%(N)`Zh0Ym{LUT^Ar@paw} zA6)EPUN9vSN|<+3sQnsv$tAq*WJ8YI?VCD3eT~2EP%I8XZv-^VxXEiM1cUbF4`FI=I(Q z{Epr@CSjo?5APA+brHbpLLHBl5uJ`V;1)o!$b*3kiPN4`vE0Bc$zV(qP1Uz6mj+j$AHcg1~|pR3QkESQNla-=z1BNyunIp;(Fy zev^JmHe<-<0x;FtbcA5dfhJ(=kgOS!Uk-l*lDF@93zA<}YtcFU#1pp)2F~uIS1g$m zK|`b&^f5dN4Qcc7xu1~l3aCDUu$$kZH%zY51l{@svl%W;3Wqw+es|(SGITBlW)u4^ zm`#D4rwhCdP(ZK*!OfY^3F%Z?ISTzZfC63rF1>zg)h6f!lLv&Bcj=GH00xo;FfJQZ z6oTZI96aAnU@RD1yo^25t8+W|d$&T(D83`RkG7VqE<4B9V1V4KT!06BguGJ#f6T#} z!2OxtyKyxxdiBZJ`({^jX`BE)2$pay0p+K_Y%`_pkjw=DYAs~?D_Dc8bJ2-!odwpQ zjVa1byJo}D1}s#&zyg}#allzvrD15mUZvXrxGfLn*oH7&9q-YAo3v^Zgk5~Oh(!67 z_fDAzx9NXjwUX$Npjy*A08dVN^2R4=)>XA7BkS+9YogvWa>?*5Lth^F?I_ki(`%5S z3ERd>x6IA#HOwLphMnjp`DYxyZ~7Tk9DK9H+4*F8Ix@5#Pafq(Rqs; z4;p>`bRN8HycB-=&Tu`HQ^_Uvqqsho}~oVb;;$nnc8zG`6*JKf{Pi z=u^WC7+De?!Ww`FwD|7_raIH>7)rKv6vPNwLD^W&0zsx;SGkl>7#abb@6O&a2^k%J z@+rV?+ylrv5A-u;+2-{yoB{@ouiz|mB~PpD!<2Zkg5KT_oA@Q8%*HV(=ee7{*{vlv z-Faq|fzbYI?29}=wa^c}Ib09n8jsVOs~G)W9Lf9Pv)nSmOpJek)y4UJ)v4Uld2@sT zaAV8jI6o}ii^_ttR?1>rxt1Z)7K5Rb?GEowC?AZIC#MNW+953pc9Sh;(BEXt--SEN zy}iurCgB1-$3r~@hi@F}4E(BpviAa64w9~WJ@68?#jVRbQqthUNo!h7xXs!?Fx_1w zC(+|u7=Vsk!9tk(sV-Q_OlN8<13QvqaSObHaLa6~dP`9vW@VElu27(&aBur2Yz7x^ zXC}uaJV*{di_eIzhE1 zgoTbjd=p<0eY&IH4BgqfX}L3SNf)&dxuC~a!wkNHKO%HyYKEB{m-5iz3O$Ejm4TSb z4F6X4#TgJJd|->Ud+*r@X;| z3rLvGH_gICleN}D>ro8^buzQ|*9i<+BZO96~5S*rzS&`YL;7ekdvkfUG8 zLvMRG!{@peg9$weazy2NsAu@;q5m4((ogrcM(L4TWDoIn*UeyeITrUUe+g?q9aLdC zZ?RFp3$!|~Km%tmb7K-R(ylqQ7s^|@wszWQz$}9?+qpbuj1Om3NyY>&!J5ibhVTVm zu^!q33L#-xAI`z!hCO~G&Ls{V`GM<1H2`^BzkTabVEW0vkfNu zW!K85I@oUh)7cldFOOKF6!26DO9i5jDuNHg_y%fs}2kMIMw}2)L-4s}2)Z zDY;XIWX#Zj$}9hTHZwOaC8Oh4{LdNa#ryB9}S_)sb zM4J5`J%M89f?BVnqKRSu-p*Ifg%7iFz6Uhs$ncNW?ift=f4=vRYxeid^PYtm`mmf? zKLJ6WO&4T1MOCIoj*DAk=pH$IEeV;oDPiJPM*2E`l`|HoRc9|`8@R(*_oVz-O98Mi zV9!jV6b_mq;qk?g_I4I=elQe^XTo4;Hme{lDD2j&EO?=z@sz2uI*@@w2+7P%e1P1! z_e#A%wg$t|O$z3$iIT_ID&cyAGOWbS6~F`LADcoySHNtN@R0T!PXdm@mm+=WlCSL- zqhKf%bH+qdZ&#C~sjQ6Zf|0n*nnqWv;H@QOR8k~CEo$ffO<3;#u4cAvB^LKBe~U&f zk~BK(rDV+FXaOoGY;7BnRl_fz5)Ra^JEL=#hM{E>W}n>W#>(=HG2B$QwR9T2vmbt2 zLPm#gd0yyy$MGS?3L_5rfOR}vcDrzYIYGoD=+X1xF$o!!9_m26)r)KTI_nNF2V~IQ z)0Vp{Z-*krw8tHGSaP&cgQ5qSeWNRh=+)rJKJ??4FA`t**B3B5r`Prz>KUch%#PgF zb7=VGwL1qB{h#aoJ+DM_=tIv^>n9W*GLpp#Ni_>M&T?lhi2~08=%$2>j=uq0Xcv{| z-<|~^yK#5D>BUUu97Sj$NVgV39gxbabL@&NaZs~mHc^(*5wWt6c`q1VN?VAK-Nkeho0|Wf;2Q>(p5jRwB_ZlFE9GR$>*x zLS}?VU;a7|sJ4=aFdw)=cl;}0F;9dV&0LFcK=`A(O_4AW`P0SRn1l>97NUDQKm7)P z2f`P?Ar($IYvH9f9iTWLsN}X;=w<$_UE5DznmH83NaY;7pzg9CyG57Z1tP&n`bq)#@DN(N@{)T-RhZBMj>Bj^A+ zWMbBBvKs;b)#FM*iM))>7ihv8Lakg+i6RWJ~8gz@Tpf z$bSQ1iyF2Z1CR|FA^>lR-fn}6rzvK`h7UGDml)67vgB#Mqi6ZZ$7M(W#)lyf04PYH z!Gaf$6_jb>#ZtZ}(mEfz+1xj}@4jI^n( zuom!WlCPd%XFBUS-qKPnzmPv?)P_i#Nz0ToxH@bUSHG8?umMSU==cP9AYc5Mb4y3< z;tf>CB9DwJ3{2SQRH`vc%0`qju22;Uxpi03t36;St>mGJ&BOc9GoQC?>ima?w~^F~ zJdo{y?qck#7V>#AY0X9z(L~$QLazszedAJUXZwY)3&JX#x(If2Q=#cE;c7hW&U*{~ zEJmP*E&_{4N=DC}_#|ZU_m2&BhAxKl>4aJpDyxZ1${(z`y;L=?;k!IHCLu$tZe#Aw ztB3lL<3E-*@n2uc>?GIrZ0YI0bJWuN{K)OYKV7>=_GZtP!8BOYJi?+dC`p_NCvlzK z+Ah{}sd_Gi4mZHg_+>LaNXqrA^8CFfu@}F0+lURx;?BG`zBe zjAXaCK<)m>ZW$pIJQ^hYsR%GlX15(c&-%zS&{d}yN74H0PQPE+C45|;N8V& zY9&@MYV4*+Q_FcQ#;68Sc`z_nQqd7T_!t*z$A(b;FYJcSQ+ep^_G=W2Jnp6FR;+nz zZ7friryaCXS5QRx_XecCm1MN*!E3>=+@I&Z}U0X+PzX0ry&0}6wSek`EX)Tl&E0+dTi?Ho>k z2L?3qg(L%*l8f5q4kRJ7mTp(`?wZAIbtht|KgGF*&1 zVv&cC6pl1Sx)Lc8T60>1 z8?_o^8^vw`O_5NM_B8{*cD^g?>wNVV_|Uuv9!OFU5mi+zDT0ltZEV>Qg92~eZhYk? zSix4Z0O`O82J-Gt^mT@BhLN9@FESuSu~`B7(#|JMW|m`JOwJD4E9YVqizf(*h(M75;a(DFA83QygD zpp~1Idg1d5P^Ce_&Z!#pP(}ma)>aH5JA$rAsObLvHn#J91e??r4?Jq_p1KKu z6LL8lnkx9GYB&}`?_LA*c_kIfcHA)6v3-R1kKu~|4SKC=vkJ7zlGSU=*|4HqYI7F3 z4()=Oik`og**GrYs5`G;3+pH-)j8KQXN?EsDPs{Y==?5*PT3j29=RH(=oQ!VQ*XBHo%+nJ`z?Y68t}=KHXcjNX2{4NKBgtFP1AY&i(~ zsA}93l-k8iVpU8YO2iNRg=@{quIqD7xD? zehB@?$C-Dwk&8SiDY%4Srs#vF8cwtsjXLPkXd6YSLVY*5gg!v-oPLimPxAM|;_E0I zY6M<)LNIrb3#Z{e9-e}Fh4+GUZY2**eCoq9Xz>@r6G(LrGmf6D-Es(dKEb>#YUQPZ zR(^l&=AKIjFYW(y?;C4yUMr2;;VJ^6enf|^9Aey);54Yl6iKhnKt<7k2S7U|WaKpcs|KA4PSYSjLPj$8)v%6z7uK=u*C-cL z%a7Ya=Cqw~Bou14<*0b|Sv2+_JT4(4*_RgP?!4!#{hh*tu$Yaft7?6mtOn$bPyw$d zYUrB}!9x-%(z^dIWp4r}S5@VYr_xJ0olY<5bZ6-#BtSYO(6Qc9TZBNZ-BtBo?K?|S z`(EAET}xLfgcw9bT#!kw;zmSd5MG-}!%Ez3L|Y z(oui;eDWdObL+gjoO|xQ=brODgXfbI>oY$&8xc_zPl|K3ui|GSxporV3bYN z87^o{#C=nl98ibugiJhik7fOUl%#C@`W{i7_T1alcmlMZI8pKVOqydXWgB*{oFWvY zNc>*3LsE?0ONoiP*K(f>&U^f#0LRHQ+2Fn+ST+niYxm%d*P{de zb1DzF9R^U%SRyZB19<;eEXdWoTot_cZf>=ST>5};PZ!?4@ltQcanI&=!ZM*n78Ybx zZZfJqU=iS+m#xw`{P<@+hS%(`S_Y6J%m=(^j7dgFL~Y3m&(H#9GVy;^u+}U~g;^=q z0!ha3bS(@IUaToTla(Vg_AKwo0g4(f{NuJPF@N2%b8s0dIez|K(ue*|GV&lgXUnAW zLcSlQ`AhSFT@DFp#r$~ceAl-u8_zu*mwow~0PHO;;y8Z`43Y5*&*4eR<~Jc@j}y?a z@SHLv6#_%_b6F}GIC4$X)KZd}Rf_Qkw>lT8yEc=vXA$wN$?Tht5V^# zt;)Dc$uJWx6diT!eh-0(b!n6S!SDsR>rCTsp33r$jt;NAZ{!#(Dv zM=iVid6%jLqzZG=IK$dAFv&dnD9&d~O9hL}&c?Ry3QzUc7xO!5(qSCMNT zLm#EZ%_|Fe)w#d3@!VrjqJ1HtGL@nkdTKo6bQiPa)yD;k|MzhulTuD@rbiq9@_j*v zS}S=oay(a=nK+ek^EB=ikE3&vVsh%qB+kHB?CNMZpAarM?1}6<>de7ShuP?O1}1Ay zF;`ELyPw3)$ViJD&p#=uvJ0NFEM)3TE%6vH)<0D)}h#@LSNDxBUkFlh9ytZr^!qB+}7%`8O6gZ`n@>@z|mO zCG)dt6YUN~^NhSun$YD0B{4|;a>}x2Jm&_R9>wGTA{&*LJEm$&!e^dd$< zQ|=P&El-8Vg9VE@T-1n7I`B8#?3R+yB6=t3TX{ie-mWI8@qC2qD?!=831E<;}pmkZWfAWw}lX zYkYHn$}eJoBs9?`k0-NLr1x#-Ao;S5h3VYG?XCQHlJdB4j1h)JM0df zQW!04mrIMu%`-zg8`eKqfb7Ru^Lia)b*qx$V8l~!CCQgwhVV*@VXSN0+35JA1wev; z`;OAoOoHVD(*cjpm?Y6x@DWKdF2^-EYNj`}H@@=vi+_t(2#Ts78F zYWte(cYe6o8uBn1kFWOW16nktKK>br(*kFoCIyJV(Ck0f=~S}^6K1| z+Q~Hv$NI*XUlo>!wwmO1%%r&xpSE~{IjG+5KcRh+VnNUDY9#(741z;zDky1pbkZ{A zR46@x71QuFnq-lv|NMY?3go0tV@F}eBm9Z>6US`xAW zHX7He8NDx13}o$f#-%2!{(`Sciixx1S-6^f$kg75|3!FgRYU`NH$6@nylSLE_0@;2O|0efPiH zIox>luaN(i3xaY*FV%CP`wk>-{AK%_Z38l80|(=6GNRsLT{~cn&(bQ!Mk81jskFVeRXa&YHlskx`)ZHF0k(Glava^1+H;mw^i^=Pv-R=%2SLel~eq*E=H3__TY1pV)zsM zc4uSjg;vZe>s3v}*_hX8n)O=4sszgEEtk|Ivcgrn$wRL@H#T0s$O?I? zhw0=LYf=|&6E#C|vKkTijP^;2kuM3>sy{x-ZEAdHul4hIfwq>b89HsLrCc_noL5mq zYqJiM56P|ly-R6m^vj5wnc4#{#)Gu=a(F=^KgPHXE}2@E&zKSM;X^WPq$mZ4A@V!g z+7DOA<*J;PqBO)<&z3OcKF0d_0nbz*&M@_0(r%h?dg97f^WMu^`}-s`a-2E3vz3_C zuC&6l8#y=ds>LFzr4A^6xJNo?kw+Hr=r)M)kCoQm;pMAf$)wJjD&=nDN6E*0*3R>f z6pjuoKI_$e`H&|{!G#{VyQ6eacmT`eg7EMJh9axB_74S@tI{~NuZ{=DbM{%+Z5Zcg z?MN?; z=VR+}%nf4Aiv~uvIBiqYwzLVzV<{_x9PPqDo&(=dT61~~&eD1a`nlo)@^tR9kw$FX z3UF!L+&U~}@%&<7CZ_=_NE;Zf&lR`W1dcoVB&B3-$5x=#3RvR`vlTCD&N;z{Q#?q` zRLi;vidIi?KIBWUQ-HP+W_QeJ9q5Phq?{2ZI2I31`<>IJm|Q{Tj-xSl zJ$OiIWX`ckL8k7za82Wc9=ZaI;DXs=v~-a#D1dD=&C;j6-0PQCYw7|a7-^(&Qfsxz zM&O~^!jpDq3R;HNspIC9jN@%3`{=e*R{Ft*M3P`e;#f3h)>>4M} zy=5I~JYcgrkVV@O94A2DTQk6CR6dpg&V@bVt<hPCjhwvs(w!|$ z=5txE7?2KFYcPN6T4pdC7|i=+zk%L%TLgTl@ri2FnbT_guOk8*b zY3~Dq`h!~mTms~9D;Jar1(QJ4jz%?E>=f{ZmS}TpO~k-5_LS@e6sc zo$!Q*^7DA9ATHj*52d$m! zu3gbn?EXyGlbwI*IKRy$yH?2M`Si7E*=F0^=0&Y!RZSN)m2fN{F9FPwoct23z}H5t zLw!pLPIB{k^!~;RQBjo$&c3a%oSXs?^L0gi+VAtIEEKLl6JW6?X&vmJmC%SbIE_TJ zt2G-MA4*#BqV1d$Jbp#x21Go@%2W(>Ac)osI<;D4bUX)(w1kEP(E6sE`$(fLFEq$L z_m0D_tu{XHVKgC^DanL_Gc1m^LWBM-j0Q<*WJj92v@sAtTek3Xf|IYfa%@l?jTu1`Y3aprcsAO7W%Ee&~A=#pbjaP<{8k(gc;VpvVg<*TK;w4S?e|B5c;55e~NLfg9TRF6TnU)VxNaW{6%owwNP zL@=iGR72MBkRzT*!HtAEDr{C|>p<^PlITV9Z$f6#o61(BFcpIDus9XILNpHCRNj{%62c1c-tqK3s&;~ewi_G$?-8d%a3L0_1LMa|P4u=j0Q-1{W^!or?mpMe^Y(3*ROxZ~YBW94OA19LmTN7mfX zJ$a@OW@a;Gb=={n?IDU>Rm9m_QVf^r_qQT=|Fei~cmzJgtxeNZZ~<({l+{xP3tn{0 zae=|`IT|G%6yEW@(o3ol*?lRhne^j8)ru5lp}DP#93{KM!p`Bl<}5phm^{JauV4LrnC(Sl58{#@;Gjj#B~CXWvK|izX;*?@4DVP z0Q*&z3L~-Bj|J3LfGWgN6o*}XywI1Deo&D(c#n^U<1VPX~ zb0Z{GQrr}*)>-1Zn{bvuNE$E(Fzy*VS$K4C$^<}9UO+E^n3C=fTM@dtY!w*ZZ2#~C z(cCU4MO(y&yB_TPZO2fXRyNt#@#;AN;ShfzR=jwKpA73#Dtg?J;C#kFULFuuJmQW% zi_PT>(y6~*c|JL~+p@Xw?ax9N2^S2(PhC_U)5xx;WW$=Of844L&iawYNZ|D1C$Kk2 zXk^Fxza)BRkf~=bS>G^z5+;VtyBAgDjG|nq)(SzRAyk}pyAl2)a2g`uBq0HPVb=wX zgTxxZtM=RlXpH!(UH2<;dM4&DMjb#^*Le|bBe3}N&0ry+ksZJLBeodiJAUBfR(SLB zbGyK%l^0wiHyWu_%@Q+G>2bbDWCWA*;H}oa{)Cit__G)6eBe`7IPKWxM!`YU_HjN^ zK~m`%q_3HZ`*V5(`3jpx=@y)!B{YP3z%Tf~`{kP&KfFa~iEVD@;xyHCIlqo_n`T4h zgf~jXL^dD(H1?jQBm_mQKP@?O%y!Gnw;IxMinfHC-wY@}~50ky-u@Fq6QJbE&65&9wiJd~>h8766S z8kH%tduFm}8X6>nccCp38XmT7*c|ohkw*D0VQ^J*H28>Tr?}ULS8k2g9nz^C03xNu z@%Y9)SocyIITh-`8wS+S))&RsOqAxcxxDG~)uC@rqA%DrfaghpOF zW*f!3FHC{!GRV}{^;JBy96F0$hJkkk6DHO68!r2JlG#;Fw6 z-5}B4Z(ZLfAt3?rZ<_<&a!mRB{la<6Hn(q47_Fr+KSc%E9L{Zqh`vnP8&J=ZQsF%x zz9n%xqP-fzG0Qe5cp-~xSf5f`a+EV`8TXnD^(fxu=*&UR=>D?>Q(2 zBVz+I$clon;1%tNeNJ$H6_>=Mhhli|tkzkMWYyzIipUdoxFKeSP%sE z|DneC_c2)`S`4$;ARC@9BeZj-WSDiEflt*TNK?= zIW-v$TdHQDg<0JBX3vJmHy_6-Q9>ez+Z?;di8eT&Zh1mfIhUe6Vy~30*(r|p7*vyH z#1SRvV~=4I(?2R$Vk8uz-Sy?>n|A|m-abJ9_b&?Ilw-o|r*%rEPKAs!Wm{4lom(Hq zOiF3E{I#{-yx)9SSdiS@CFqs7sfNM@bxoCz6;!3VcN}jZ&H4JslbEliB;g5UlpK1- zxvBBWlfo{>&0W06Whzy0#7eoUOBYvjF}^kH2c80#r6dF@e4zPsI?{Ofsdsj=%_}-T z+5WwiulJ7hu-$gq=B}(DTPq=3-Z{b3_3Gv|#N>}F!j!M7O1dM}N-9i#_G@VCrKRN5 zcYlKqJaZ008Gj?#0-bY$d$*{`6qYzwWpN#&<3MK305zi7Tk|RFx_&7QpiP@D5Fa4! zK7~od1}6B~i=$Qv%m5K@rjS*5Xoo%QXffLQ0`#qfhJys2j`AvaR9*c7jJB9Y!OvdQ zBasP95>ZmB@f=^R2GbQ*Y|!1m10M+u$UWagF!Pr?g%`-dM)&W9L&?E8D@Lc*e9Lj0 zbsl4QrfSgU>Uym_Meh48w3?(88v3@02K6FF2CqnF{8)TN@`oZpr75daX9^i@WL!zo zFX6|MQgZy(k8+Jaykzyr224gPQ)7z=B%HKlstIM5I9|rGk{09bNMUI_{W9Ln@V)WH z@2T<`E=Wy|b2_`yn8G`#>J@xXQVO)8PxFnhzk<8pI?al<;ofuG-{>)QKHZ%`hH#A_ zAv6vqjW4~925#}s!Lhq_U#?b7 z-Vz(l7UP<%U#$p|xlV4F?0y3eixLu~V=WGd0%X+&Y@$azoKJO%G`}RFKImUSHXlnVb9GfS%orI z&T6VD9nukEW`>FHZ_vOJnvjkV{t$v4{rX|JK1B z8{v;$w3z2tI?B!Qf25N;WBePkYjy)j>DDeTxWND$dnO16K{Fey8x?qTO93WjRut~- ztGWL5%hezQuSYhJhqiCtPOja(D{wX}sfA}pa&fU6zFwV`FWlBhLN+YOVSu0v-ew5G~yA*$W8p0jVg&V6(*7+napIi#0pla`{n zrXTVkA&H9S;PtbIWhAhUeB-u8^jly2E9Ffdj zc5IkT-G8x?d~t|7+Z*}+4ROb|a7S4P?oRmZ4C!O=nf5A_wXl;9>Nrb6(C@?Kd&B6l zgw&9|VuIv;Y9r_0C}2H?{N5^$rU3d9(WwAj%0w07ueWdF`jAL`xhmw;o&*2TyhEW63vU}w0f;$4im1@?O)-`W| zu9DIkvU?}c^{v|=w1OEDP7DIJBruMg@H*vbG&9>&+M{wt$tX{I23@{3dF{7D)Zb0p zzOZ_aZRb|^jrL@_Psk2+{jlxI&j0Orx3EtqW#rHfZtZ|AY4=vyfXzTD71pBDg|)Mf z8`@4YDvCZGhEY-vE|ibq!Jy;94UNHbIRxR?xSB4?7*jdtcyTIa_KO?HhtGq+N=W49 zi^>$aZIB;m{OLT-C+n9Rylw?;NXi|NNInrpgruyyw$cb4WpmfX$31g@I%EpG0$d=7}+32k(maZQ=k z=A@vB2g&n$xWPUN4aW?wc}EhA25=8l&3PBuSlzC=o~33Zd|gwS^%`S>KHES(cM+N+ zp^<^_e`06joA+9G$w=2;ZtE7`93qCU?`XQyN!DL$X$JP5xirbZU9*=Q`y|`m_}X3$ zet!Il6}+hHR^G9w>y*SQKdZ!$YvkNO-*QsY(s3S|yW%WT@+0~zQqqvm?0!G?W|o8R z&p6N$;ZThQQ4K-g2R+dD0-Pm(7|N@{I^H?FJe9~g{(vx=`!60P7rgtd zgL3%Y+~?1-JWLm3#+F+d3%m1vF0cV$!+=5nDm6}1c26oD@*svGqb09hz->IAmb2_T z?@Y^AC9i$u(Z3J)xv1rY=kLUd-ivzt-Pd=0rSn%E-EA6KLQr(Jra2^vdyZ&*$dwHS zMKv8Z#j}jg5eXBymmBSqlnRgE+Qyw;4yG=CP6*^^-7;xsY?3ymltH7u#&acw@arM+ zasW%JvXn+n&ES@ahvLl*OAvhUz#9f1u@MS~)99vWqXw^?rtLH*j0u9VLKsyEi5$NP z@F*wF(`;^xT+TI3zz4xbG~;tdr#AtNrKr`B_vaXAvok|v(v2-hN<);H9=h{9-KNG5 z+#G!MZF53|nRx4+PQ*D46-mZ}K$yzfClus^PK=7A7_OmTZF-b$Y`o><1PAN6t1zx2 z3%M(*Dpzgl*^q{*C1%xxzls~}U0T|N|AN)*iH+o;ZyDRWm9$*=qfp3+?2q9~h{I~# zLmv9t+Fo+m0q!9r6Tn!&_u=3ViGQ&0FcwF9qr`W zI}O8)|Gon4#2ft;i$k9*+Cpx|I_2il(+O8Rks#*`LAj3jp-{}H;dca4mNGHnZ@>6Cul{5D%$chp~>mwlv3Q)4o5k} zYf4F{UfR~gGuzzwO;ng;=bR9wCH9+F^Qt&l)n?6QbyiBDf)J(@kK7ly+NN6NHw5thcwyAMHGB?Xcl8dcT zP}5pu4hkx#gO2K?SrZev+@1p$35~p#;b0B85s+#yf*;7sE&16oAHFQA| z1AGQ4YQ_WYa>A0{qm%B8KA8KXNpJ|&-2TEemBaz00+Vl}5<$0gN>EDir= z`S&l~3>Oe#m{oH^goSv&PZvWaHLGxzbb4kgnyk?zTHr?erNuCjz5rX+PK14&^T#eA zv`%vWyRNW8R_Hyq`&ie%_oO;s@7UUA5d;f%#v_5b9CmflqN1{=#&N{mWm@mamJ7q8GXMFMp7C%{>Zry@}g;^vHLy3 zT=H|pMdjf~GHYOI&1fgQmU#QqJ>K5}40vqkj7>AHs73U`bAqPqoU3GfjrP-hj> zW}4;=tRM%#2bUC+Im@a`8uwkp!ByP7VuibTs=KD^gPmmMzjhFa*Tq|}a~=h3#|^ui z7f*=@wWRBYYtNLfhD^T)_Lr;Phr6riC@iS0JFvQ@vpOi(csZ1eQgBOGlaKur2l4-U zANEKIt@%3Da^AS_IvnzBv@Z?62o~_*42}v2cFQ7~&Xp5bY#^7spX(i7z6zP^-=qAy z=8QG`F>>qm91xZ~(JG7taKqCA&l!ixX4GG>M*i&vZo|2XB_^Kb>XO4RUAeL4sQiH& zxPGKX@XiJW2Z}oGvP}mOUD}p0$_0i(T7>1OIO+uu&e2Rj@Uc$5R8jJl0^jdXo11mIrkncHgUhySIb%xL)o0j zu@Tgc+hQdA6!ryj9Ct7Y4KUP?H6QV|Hr_ri?w3MVQE`VdyOCm#$z`c%HDwN!*__Dd zs(ZmlLc_V}z)te*H~5jpx9(a)uBN#97?iQmD-2+Av8lFg> z#DSxH+bR(c=jD5Z(+fW*gw}~WR=9$M#}w_FoUDx33&Cl?%?Z7`><%!K(8$eil$!7K z!;R0}!P#-stwoXsYTOVlnX4++l@*liAnCi48|+<5g2(9%aQS!=Ch+2&!nio+gg7&C zd;!3iEYp*TR6sXfs`(JL-ei-zom!NGY@!q~<}31?7asD$&hhJih0>SO z2zBQZnC`!_8ymX2FtDxTTvQaRBVG43#Y!!UHg-&{!p+_}FGQw^y^gCbRlvWSl+%vH zgii&f)*SbvuvGL(XyTLm_7|xx^07y)>l$y&;n=aoKEHDD3Q`JZ&8C1K(4;B0R;5~V z`0o2L5lczraA1!JJOxyV;l^k0N2^EXWoVTsT3V{=t21H9xk;7P7mDQIQ#eIE@O7M` z&LGXTt;Ln^8AR`F_(txFmurjvd z5g!}p2sd{K{St-KHI<4P-42bu9O8?ypm5?{PY!$w-C9Z^r#SC!a%kGJzVWSZ31{4$L|x46mwTEPT0&; z*fL8w>`Kp6$>PiFS`&8TgBTkrjXXSa`A*TX;P(&Wyo+=5dl#EyOeoS$da~qj>ZaWZ zUZW6azQ2LNkvX+_7o+78HWf>%em`}18VR}tB%|2anp zob^Ff*ylU(E%D@$E4oufN)u2Q>SjQ7#1g`{hR8FILz<;D^6(XNqhu-wTiEs|U`E@@ z&3Ay2=)+{G8FhB166XU>pV3rw&|;$>co>bA&~Pv8ftnEFuLr*)s2j(8`(o$yM*oDI zt<)6ynzp9$0FbCD_7^<{J`$RUN(9Mhh2Y-wn83_3zXr^*O>>mbVVfLhsVS|oP_!zm zMfj~j#r1;DyM#)n%t`YM4M;6%iJj!jyRCIx%n9y_3$8qPaf~ zkt-j?aY#ZV#dx*}kK2m%{l=r*|0g!`m*3^KkErH_FhLPWD1v->GbLo}RO`IjV9S0m zgVn!w356Vf>Mx_sU}nLkV?EhFeC0mU_XF;=W{Tub%6{C|cVpj7D>d?9@7ujE^ghvh zU+<@o8oAKx@4d9|YrVUB2iCr|_W89>ti6BjXI4J4@;z&>Ut3t~Tf2Yl=*pk3?d$n- z&vQNB>p9W$iJohFQa#R|eLd&(tXcE=nqRDWWX;`c{$HcHi z=T}<0pXomI&F(w8KipmEKF~eh{jTl}tN(BHi>rUIy0Q9mt3R-Ma8{* zU2m=I?0UZI@vixmw{(4~>qu9&%iZb*xbKIZcXi&}S?dgUnmeh^O)Ix_$~u1EakArU9mhL9*!TO6qOBv?q3gJ? zW3c`0_7~cpl>NB+Q>^MxiXl_}M@Q?t$4Oe$6` zg)1i3Y0EhDvynLKO>Lu_InFA+!nn@vt;nOEOf1508*U~+96Xgp!HCiEq6BwvlMSjur#tT7Zjen z#Ym03BK|-zY0@x-K)m2jGUbRaJ@S=ic_ldRNzhP`lm4`?%Da*yVuHMi&lzV}x|~P@ zpiS=$=SHq?wzI5AB!J%R4ZGO##5jN^4_zzrA5WI#?0BjgcUuFK8J}`QOaM2lC{N^& znKlqbHgdHitXy-A*iI%`^)utM(R>Y=DWj9oJ~2VwEX`D>s9DW~Ei1QM?JPU|Td}^} zHle1&=0qlJ!t;ff8Ya#1>Y=8Gbs#=3P(EXjq#UMV}BR4rzzXLMRquB2M^l2~4<%^0b=rsi{2c#Ua>-6&=|t(Im}5vrUF z9IB>L*?iTa==g)kzvK_*bdGnyfDqy6eU;Q6X3a6vgc-ze^E74 zqVnS=hAUW&o{FYT%w}7ioK5je$~<8TMilxkD zBveQhWsX-Y@r-RE9?5L{p;(R!l#kJ8w3@0*J;RtYo&O;=Cd63|RjE>`#+cxTn@Vo# z73&8hj&UkpRhw!w?!P?UKhr9gJF@I_(ddaHQBjGHuKlH0?vEIJlsgsBWIg#=JFgt< z7WwGUBea@KYn6$B4Nz3J)a4a#5nDHG7&`3pXvFU7?DL%ZaHPB355nvpQ$*l+!!u(`rrI@p}O4Bx$ z)!I@>LKv`4agnaa#Sh4>R1t1nGuhb+lBarOePY_wO1(A{uFsj1X#^#IZ}k1O?I{kXHdqNQbKb$Sz%b9-uv*-|)Zq1L|E z{BEV{%Xz7sZG6&OiyCZo)k-lPX{Dr0C#V^#M;%d?^sIeY)P|L!%Hd?F46T@QW;0oy z?o|vOY8zXruN0>3HH|4~G?#43N^CeUHYT62kJmHxa?uc1dfb^oG0A%+i?9sVq~)yj zz(j!4tJi%&Y)qC7Bv_Z0o(Q=t%xpBhKGZ5__yAL#jmd)%izgfn%SOfWOu^`)4@KQ! z4X^eDtoit=54Q-Z$qJ+KPer^wnpI|0owtbX$%M?=@;F=fC-a$jFg@@)v3lCgQ?x$J zno`DOJ>W_A-O(yH6p%tVIhCB2&lHd!rt1@8dD37^FbG7A2feBCA%iEnUQAM7NhqrY zR_S#n(t%9IqD-%pi$92)*)%iFOr`6#u(#&OwH+7BqdAp|R_V?5m|mB3=p$=>Ew(cp zXL(&Ll28G;i7#nZm&EEptxFE9osfpoQh}l;Df<)3ks-MfDEg)t&7?aR_5~>;ome?6 z{ve)OU0LrBIT!|GQ(Lt{-ja4=Ep;A?~>^&US%b3(j+Pq zh8iEsBrg$bdpz+eHmb@LEWv_J=V3Z!Vk=!$b+zy(No2-YaV6Gs2R(KP~dH zTZ~5FMQ8QJ6jd!nlY>`@<@{`kK?*{DDPea|Y*Hh;tyP{F$G)1wE}akA!62ji3a6diT@*r;M!6VRwPe5h4EUIyr!(i$vfOfh9S+9_r= zt>~i31RFD|r>dNpHdNvRgJOMc3C*b$YIR0AO9hzZkht0_s+e|`<}5QRYrPmj-2Ezn zk1+nKi9nr}tNq$KANEWu)oZ>Zj*v=O@tf>))xp=ZQ`YQiQL9#zfyhj?noVZ8pg(O; zt=unuR_Wk#Knrp3st6JuTQUO)v0RZT2Pn>DmJl(PjH zWhvP%<_4}%7ITc|5L8glrDq(zI=m3=|a9v<;pHD zqA5~p7ds%zTe)a0$l1aqZP6ux-4vF=rH2xH$2qaVE#&Gcv@1a+nClc~iS_4p7 zpKZcfi#w@s+oNK6E>l!9`9PFTQqh9ZLa!Zcj!!wGDMhHdt&rDgDurBh#jRp-IyY;Q z`$ADR;||um>cNkTT;k?hm8N*DRhtWDVA|=43gw6NO^pMQkyDTbJ4b|Tjjw>iM3GSFhER_6=SmhQL#NC zojacNsAeXpWF|bt3~v>S{Z`5v%^uRZ%Ru-y&c;_=D3<#ox^gg>sVi+IHl#{y`WKPA zFKnyQu3~DoSV=Mg1ufeymV32k1>>|&X!ALpGN+;YL=|6l)q;A~#TwEDyRatJ!{XvC zI~@TN?b0z}x8I|6#t)^|9uXPY%ri(}>M`?va@BE$yGN-3${qt z|BByLtH*;JT`dIIqC8Sc%dQuzD_DdW&t_fqiL{3Ucw-yYJV2Exr!^VzYr=;ZhgB6y ztP)R`rFuH0Rv`khS_(((ibNaVnC!uy<+vUHIjourR3uiOssCDWFK#Sv{cdnQkR~f44HIVXGp0T=e`HUkf zmzR8Q=W20$OF*cOGgI=}DLU=))~DlZR)|eZu~RxG9W)=Zn&rVQUMD>{>m9M%>*+gnaUXFDBL@Ww#w}`oGRs$UX{hIpPD?xtWk=Dpq)w65i?LKqc*iJui5xpu{;nj z`Y5ifvQJL9CMIq4@JVqP1lX5UJst;EtH-QPtl2o+M#=Ogf2sm3(R5K23ujc3sg!+1 zvwFEcF&;Eo08FAP+blNq=7&Ts!4jn~Q=zQISc%udp2%iqh4_O?-K(2&b~Nj5djSA9Vj=Lb-c@PFX_d z-C20~`NMyn<>iL}&SPuC`V9QX2G{_lb21a28LdJcny!tf$nlrZmB)XKXL$*Y%)JP( z_lKT@nQhNcIInCVTbV>K^Q>`vMoX*Rjy(K*eu}3sX>l_JFgf^_V0&ZL&p5chADr)n zK}Gb{Px5xfl)JxiEl{`L&n_(N`ZCxhirxOPSpH zP$HYMg^BxFG(cL6p92&6nP*{Q#J77Ezisf9wRXSRXPGt9`Fa4Eet(5;OG@D$cn9D3 z#;-Ul;-zoXnuzT=Zp}a{WtlWmK2Gcb07X4W{ne=P=|F+AW9QT!0|)KF>Mu zW(U;p)|;JVmPH8|U3T&tPamX!!+H0w@mvQ4N*d0`z!OD2NjM=Rb#@g9LafjTWZqtm zdhC{4=)dc@xQ7444(mdkGM>HQN|i!x7d(OCQ%G7_2dW4F1)qme?(yGp{lm*w5u#dJ zC?6NUc-FVDqc6gbQzBiEye9K2e+P@7gw~Y2Rx(KHB{*Os+Xzz6;O2pRqX@}HkKuo8 z$qTYOI=nm){^9NqpY6R%==}IX=kfRm-(A6HDp`eRv%)rRrg;p2Al*ZRe;J)$z6y~k zCR*-Y-+uY5o!|IJbY8kfnoDOGSYS%kX`b$SX|;uHzW>d+)?K-xqo?=$Hmb+eeRbCZ zvMW1Z5}xG{)O5r#zZs!pqN_l5d|I7KXw0r+IHqL0gnk1eE-frlA9;7<3vXa~ZSl_o zoud`Jp@73qoW^a%J*no(Qx;NvjoaBLDJ3UQ`VgXcWcTLAA6|oF=h>D<=Jn;5hMhUn^R2CyO`9v&^oNe82qUn-iz!SZSukXEjW8=MVqW%3| z#%(L9<3Y{j#MHQ1i^n!WVqf|*JQ|jgi0oHhBwaePv6I~MoUE^5_zQ=`BvYznW|Go+ z^$DdZq0iWxFW^Jl6^xLF;~l>_y`&ysCvHYe>s5sz;&_{HZ}h*7=duAlTXQ<_mX17S z9(8@zl_810q6?B@a&q%lY!NRW9BDlJS78(a^FxAaZ;ryG8gGX*Z%z4=b=?Gq*U+Y( z3I2`i?UT^N*U(m^2i_f(n^qiI(HH6c_ugG=KiKn!9)8Wgtr_T^S^dmvRo5q1y|wD{ z&IdcUbsTDcu3g)9dt2MesO%Bhc`J?x+nu@n@Rq|d(*Lu^cPeSkfv7y9jHoI3m{OUb z##lNM9aC$f^q2yEWGXcUEFE=%Qfkyn2(MhT7g_sQvcocV-jIB+f>p6{B?YHLYT$FYAm9RCKS=QJW9u@)7Yxyl$z}LznQIMzh$iR z+y!<^c;~~pbTmC#ohBR*s6crhl7iK&_pR#9g#C*h=qxbv1~Xt7EvW4W09yjqNY_bN}-__zoXu( z(5O}9)R);U%@6JV2ZOcw@PXBb2QPfr&Yk4si*KL9s1MK>`$R$>A7f%F%nhRmkEsI2~j zrBBYb)Zw^#Ocm2GN)-l`Nid6@Q|{Hsfdd%Q{c~U2eE4$7ykRJ#bX21pQ)v?D zTQts$p(u=xGc-eoRhqb3aoX2dhB*K5-~ZglMh=H0T~mjV+Et~Y$CPoQYxvrjS_N@o zA~Y4I<8ie*p*-zla;Sylcb)UkN=fkauR%)G3d~Lnf*6Y{qhoAbO^vA&QEDt2*1#`7 zP0N{tYVm6dh#gk(|AUkSB%e!YD2+0Ll^lu3p!8x1HRdgbc|)h=j4Hus!l!>ut^hFK z&0jo66w1?9_OfeW^I<VX9%D3%dZQpP_C42C@H#pYbk!Mx#;3Sj_&IJSvCgh$I*&bftVu9#bon z=pBrj3z~ycYoIw;GI!%6|Kw*7<<}ZDj1VhlHSsY89Yr5h3`Q-Qh>lS)NI1jB;ocl= z^#;miuabh|T^zOb%Z(bj^>RU_D-R^XYBmvN*)b*@g;*=FFGZA0WDJ{DOhtti;izI^ z<|(yeFP3q$2fJt`7VqLDpm_1$?=cGAp~09%us6i9yO?V6N`+gW7q&8(uy&)8v2cihT}?kEEWkvfh^1pvsVs9A zcU^bd>OW2JP8T+A@jDtpLnc&lv_BF?cjP!aFmer4fLev)n>au=_RBr%S9rUxCjBSe<0D5M@NK=Y>Dwx~F<6ey@CYDS zdbwy`BU*Rdt5)*3OZ6O)aLLdjn_5{A2pb#5*0dXnTY$# zw2h*Z%l0Hd_MNomKx9~6sM&|_p#;cnE7|Pj-YKpZ~QW1yOY06HghF)QL7F5W^E;teV{+wgm`K$URGan&^?O-M;ZOD$qACQsYx%}nJ$it)O zo<$xS@*~5*{629$f90?dNo11sAc6()UwOzQq{>a!1!3Gk_U+{R*PU5`6kpace{aRg zM)}WgFqmsV6=VhN7V?|&_HkIjGtpV{^-+Fw-I+vk=z`}riO%ZUU1wdfx9);wl1f{W z@E0s2gsm8Bbq0olIp4|hJ*_2u?g z8#}I*pC{YunHRA7YE9#O-Rg9B8E!IG4NlihGgOMau7tcuis23V7a;8l?*wrb4>NaY zekb%tN0SAwN~fa~-cQgjd(0Azk`M(Jl43;7!7I0k)cpfW&7c&5bWJJffhknBN0Fea+=-qqPAYlXKPFWs912AVRO%l;_m^K);km zPX6wiOUSF6{p}5%hKF&{U@e-|v^o^6nt_>CurlQCeHaQ!F@n5*xsx39-#*gV{%+nR z>-Uts4$4}6+}v;}~29e>4uWF!|x`KP+GjB@M9bgzLA zArBS;pfdv0s+NIp=Ye*LyjVD+GzVB=Y5e zosa=Kz$1h%C4pvP1lqTgCAVA9l;x=;?Dd@$#KI~lQyUI=$y$&`_BT(Gv3ZcQ4N2k2 zK8_z9T9!y;yLv7m^BnIw%K&cT`OlxZ*W(1RVY`}AC{K5umYxUzIkN{Sy>2`Igoj$oyZz z2L9s+4?KjWG%Qsi*GKbh>E0M`6L3`!cG`NMlBkB3+Sm>Y9IP>?ozx`tL>2Pf(-#37 z#UJ5qWz6}6wac_^UG**yj<QF;LICke^4;tC ziv~hPon6gv{=jsOHYu|;1!?;Lzq3zLOy+Kiz4KDk*{FVi*CQuJ6lV|w^vbP{i8N!Z z=ExH_V6%`E6X%P^vC(vFYd)|@FF1oKu% z{iko_`}!m_qU}KX-R67ITQ>?rq0uL^6O5a(TW1W$qR#}gmY_8%H(?khG~%4!*ZS>G zZxW_JBJ|>d*g*Ur!FMIJ=7JF12$0$1BmC{M0i<6k`k7#LK<8fQ=mC~186>W|^O z5*or&US51m|2R(L644L^XtYmK+?1Gx{Il0xFC$<67h$LL`;Z>OTZcUW`807Z&s#Fc z7+Dv;Odo|RTE2?-#QXO`Cxt~gv$zPs+wO7Ygas(TZ~#Y~;p=&I&?<+y1gtB75ZVzpspi5tv*Y0T0m143-p<302`qz}O7BJP^;bqHI||&94Lc z+cH&<;pYZg#E<#*r_VY98$W{)kjUnO-2Un_XOY_l6T;_ULWr&CRd;Oexl$JEzPal^ z+b-_>b7P16ue^+8kMlkK5uj{OFe;z2V6oTYu!1yo^sUGF^=Fa>6gOVnc+r;wG`V>*K(OWe>6Us3hoUW-T2F9R9bAnCY^A3B3_^H1OV4w&sbkxxG)r7uB0*)(29 zn9dd|SyPGen}f}h2{HpOEha_p%dPYK=-vE2!7D+DPKZz9mYL~l!m82Y7+%k37=^fI zKXMN`v6KWL+l^wJ^y1-=b#nDs zp}di`0pCrOqUu+mG=s}lA&1`r0ySWdc9ECAa@K>D;eK8~xI@m*78cY}kzA10x4y=& zTTWUV{mBb(Ie+RKJV)eT6^sQmOe*6@P=tF5thEXuP9BhVHLovN^qGfEuhR3D^B5>kY@mJr$s3KeV2}qt-rW>Rm1juUIX;$ zc`eL;3os#*RR!;uw!+bKA`AF^p^0SuWBfp`ZSr)Ih`#@Wd%oCl?1{a@jhV-Iggo2l zfxyt>6wXv9i*(2`8;bJgkkhFUw$4HFsfVFdB{XuX8;Nd_)N@ng?T2wO`FDQn z7U%pW_<$Hl@2Dj$9z-05%XLnxuNj1`Y(2T+Deymo^zfDKI zET^AgbGe$im`l$pT`HlafX8@TFiN9goo}1LLeKoSdR&DSNWy@JZn_KZndnX{VveZ2E;T$&Pu; zA|sWmR6+D}Xi~!)ayE@JB{KTWPr*n^BLkOjL3WAw{^5rHXS{&bHE#wZacv-A1wo;7 z#;UitYFR4`d1%ovS^pE<6eKj!n)lEPuWxQl{{$Teqycl2 zWQpLjcnY96yV~H=7dVGUEv}bKpTT@dXfT^0UByCXrwxtIJtM9dBib&C>6FV-^)Yp$ z*{)I8l9oh^*-g*#{ryrJ($u{QF?v(6q4CnQyiL~6>K!FRK+R_hZp1H6E5(Lf`712k zr6kx?SYf|#ZfSh$R~Wt)V8m6T+#Kopx6WsQGsnuV5*!{)5FFP$fUjE)k2y`HO8fy!x9RSz{eEk|nfCZFsJ;3J_4 z`O!zoK_S!1lP?HjW1j~Ec5CSUsR{ceRj!T)b+gX#m>$mJLVE^Z1Rn{F9CtpAJ7zP( z#*0u^BX)2RRaM?z&Rb|Ek?>>__H3+(gp>l8n_h+EF3KbM!)$TzrIgG0{#bl;DJE3sbTuPAd*_Tl&Uk-WMPW) zT8dP>HMC!U30;xU$l=$jf=B{)YV#jNy$gWyR%g8R6f&_CnY53SXQn6NNz&922Va3` zOK8}l*1_BJ{_YO)>Tx8pc=#2})4DIL=pFC+)2eM9=AMsqKh{>3eL+YYa}!>}`1#AR z;fOP+(`O4*+FNl&jp4w!Rw*7JxHqxsE+s)RGfj{Vn7!W=^-yTBv5~0~WnimTl{1x@ zoX+^+EhJn8e()MPEuoR)_uSURvlwa6e}egZU?$;nPSVPhO`l{f(`sK@JYC%WI({pm z9sU0q`|db7iYtGOHfXiG+Mtzol~4k$2m+?VBtT(u?(WF}5oUU3dZs7mU|=l_2R{2S z*haLN>KDG>BUhh;{{0BRjST-**mO+Yny+Ife<4b_$|Y0Z?$4m++wckVK9S;vsXe_X z-xkg$&+!0^Ts%6saMDTR*0_)M+Kg5sM3MX7=R5uv{<=&iz|)FAI=#aGLI45cc9EsH zol?WA-1=Ojsdsoac^fIH0i?oZtw1aGoai3uK_cyb#WvOPFeni5yu8T(9d4M46&K*Q zL|f80zWzse5z9sBST4P%R|rvn&U)Uv?sKLiE@w$k8Vz$ZqTQ!lhv~sS3-QVmrYPW>a<)2 zVdC@Nqv+n)dwha2^v_oT>QXeZ(T0x9k}ajyoh}5-lv^iiduWu}FewxDM=C;ytRJJG zxPd+%gUJ$iy2)N^G%QhFIqGi$It(tVd1-{2nOH7DyMEb)tIZN_j(#l#xH-P#SHh6Q zau;nnM*>H$-^O#noZc2jH*cXfpml5D`D7wA{ql9E0Oyp}2&z2C1;9&jEky~c#$no0 zxky8puo@6maRZ=ACPLU<s{$3c-?hOj$V3%64U^Z(a4 zygIP-0>Y&@A{t9*Xgq>B^$yG!w5FvIT|7ihPswHI$n{n@;sg$nPYqE^S0fS#ABP_X zy2r_hEu)u>U!v&k(znil6%slwKpigh193U4osSbSr_&v*Xp=4%k6xIi07`XvGb*cq zDF-s+xAa_d6u1+Z;{u$dxHvTRHYELpJ(+5ZtGHQk*MTwGhz`t9Q=u?gThV@pb0ugrSLPI~dN#d@XBJBj}k${4_NM$H{UTimCR^_a2<4z`Rh$lS|X) z&y)dTAr?~CXfs}M)cPwGe4opkfmIK@l|UY{xi`2KW**jhVri`>U0f4S2Z0m4X6Gm> zF22FT+hMIQ7onTG+P!EAj;8nZ?UWH__tN8;r7)+8wl`T)r(x<%RgTfN50_T#o^$=ZOG=Jp^C?h!A~ko)RL3D@l8|e5nQjo9oV|rstxj zL>7DUQr4uZKX@lgZqF&`rPxV(*>ojJ&(F`TDFz|X;!rl z?1HShzr-ZZ!1fC$Z~~ixY1#^fR1idkiBAKdwZOSa2&?ogc)pdSsGNK4z+WVA7<1ox zR7nl5hk8o&I6aykIWqhi#p=N)R=+6KQ$~-Mm%N+uWyYfKk}Iq}gqe5m?;TQ6fGvIL zalloTG833aiNtZD(Q&18NiwhG(4ou0nhg-t^rTFNFzct_ej(I9CJD-|*aD!c(l)g= z!m&K*cWSc5a8zZqp)aecy_2$5bnN7|ehuW7-gXV_P^c#?ff*8O8H-Fj(a6M`RXz~_ z61*I`K@0OQYXuUr+g!c1Itr4m*y93>s+hCImbpL*S8*N}uVIx9J&AG`!5qk&f&A!I zSMN6$Q8wY{g{7Y>Qx#xD1>{dB!YQ7!UZ0za2Gi`9%jxP$^&(j3k>3Bns7t61 z4DB+*8S`TUoH24)@7RO8!9Lw@qUi0{`Hlh_m}H=2%RpQrv)h%B7=KC_Th^<;SeBAA zC>s6AM2&9(n*_usUWgZYbJ4uO<;n?|sY+p3U`|$)Lh+&P^oa-5ZM()6{fU$*+oo_x zM#_5u-arqA!V95W;C$;Z>F-*oDacq|sSAMe-6B<99<)-Yi`(92rNGI0bact17_c+( zJQQKE5o4C}Sa{*@%x;GYF3qW^yUTl_leb^1?(O{L{51+hIw%Nf`&mei6`)Iw(MoU9ks{irn}YrsWRc><9qS48+V#z`dLILPD^I1S)q(M|Htm zuPjB_J3ohu&qv3>zk0823Vp+MTC=&u4YNTX1t7p1&w(Yq(J0&PHuN3$X>5QL(LX^` z0mWIpQHJ7SL+L7>Bpz1#l6j?-31pM#dtq3qpYp&;mCMkv@{awz-+8F0Vv1L0+V&F0 zlw$UhBjk&V@4D#&^Cc6ZJGSjV*!wph1x_LP+VAfRAfpYeurH8j+J30_l>h}{-ik-1 z;|Pnz3dQ&x%uKLoLkPC5tQmQRnEodeqnI+ADws2733NI-ESmuCYdDeUH4fEbnamau$GSl=BZ?oL%~qY ziCI1AMBPbIHfL7YV{-sN4>u>74Bhb-gpB%s|3`-f!yGm%ht(${nc;T#uymrX` z41$HwH{I3rEw&4#aJ8O0t?jv;qwakFT5_dVUQ4~3pPPr|S(1k4K z1v+oIfx#`RzYyop*LW~6D|Z0{ll{wlJx(yblZ(bTY6TuLs|U!of_X^GX;GaV1g-HWM6m!oY=R{+lyKlSifC&?Ph-e{*`wMR5OvQ^>5EpJ6fR8Uj>{a+v4)_bA~A8A{i z-BnPDE~3 zF0-C87Ay_pH?Q-Pp1AYC+xI#_C% z2zS=?vn=*#6+%wA9#Nfy1{fahP{iag$tQ&}_;O=0}eF5n?c z7Ex)%nIaa*5PrZXQo~ogxZ?xYfR8~g>*HMJZkYt_YC>49#JRThK6?ZBn$BRlYhWDWg2`}BT@5p28LH+lRih3lN*A{A z$3FxsUnWD(&kUX|1b*gvZ+%FZb6;0L2Ns{luWoumc-Wq(P?@HW@axc@Z-g}?Zx$n$ zeWI7zhvDmc8{HjTTD&T=F&B$J_&{{)N%FAWW%D{nop0sV7t>&58F zTMukO{baFoZlZRcq3#ZWX3@8*Av;)^sC$D^x)3iI$~kd_ott2UG8xjNXg?M@*ZVqn z&K2n7$EZD{kQV{RCFDh1bL*7byc2RIuJat-1oupl-(dOr(WbpJ)K|FC0d(5S=urfhQTNd;FlFNLKZIRIu#`kU>T802B`154WdBZl@+UuGj;e z?4(Y69TzB{CO=KBhZ3=18j|DS5OzZjD;$a;il_Ymz5;g-pwIX;H92>hF6dHv9N#T+cO+Zsn3#e85Q-ue(dbOoq)&}b+yf6HZ$?KByl_cx{wtJ6F|A5B zLPkt)_hd^(dstOu(T(>~05`L|87W>3!Srq1Hi$|;+%Lg&58hAh+!pErvXhh}wtRnx zTW5ZyT_b)meD!{~@K3X=Mjjdd1tiC46f9&YTsqo&<4e;naC$J^O-m0J2*nKrBGqZs z6L}TKCAH{|M`6WW{y11*nG8~W(IP#?L!R#3(re;*v%XHW(^RRUt5?c)bjK0U z^Ye$P4O8zEo&43cXA42S+1{Z?gqikrXF-p6I#nw<{S1$6!D* z8Qg}ifaH_Ms4Ik32Ou-js#8&XEsv>V;gB;J3uN=s*UU$b!GSH8fvx%VIcVxm=f>Wz zj|r!otGfZ#jd;aNMoU1S5=^?(1l0KOkec@;YU6f|MoFB)Nn%{y3*BLSs~@c1+*Pgs)u0H%Vgk_*dfM6MS_t}K13;`AwIc*8bptO zmD)Nh0?>V6)dV(v+2~y(-yi<{&{+eX-mdDwBrHO27Ya(H7Zz#clu0}aTq0?cKFR@m zd*Nx=UGiph?3VjPssaR51si%VJuSq(=bu-}Ee~kTr`C`^>jXL+GYw zoEv%{c~%&Tx4Uym4{L9x%w)M9FNPA4pb6r6{R8#Br{HEQmkIH_v(Xcm19!sMH-rIs zx6QdzoF--9a1LES*u2_9=?0<`PF|`oCR=)+EKso#W)VDEYv+4 z#x2GfnFN&k5muYc$~Wyk0uCeL#Ll5ShS*}3?z92a z%kn&^kTr{dUf;jlGD~=0lL?4)5|O|3+|e!rao@jqd=Q~M(vw&bpmY394i)0 zJXdGU7z+Fhjz(E4y5lDox&Y>o@+*M%PKk3hmz$4d1CN>YgGJdgQ-{@rnqY$lmR#*}nU`a%~7sBVKSc%${L$agMmqD+r8Eyt@39NGA zWeO0@qFroBMY~-t)<|ozXlVL;L=)GbJ6@q?cPN$1Jfi$9O%u$JCQU$kNgG#T%RWxxDJfU(Knx5OTzxUKh@Swu?4*_pg{QfaF zg8>Tjdg*}ArB-|B47%`LxGcZ>pWteg$$*L&T#b+my7>K*cm=K>;V!=9Z?wf+E)VI` zWipLcSrui4N1UIOwTk7Yv#$zI6YVOOKJoRTKs^O`_&{I9F}`R>gRc1%{94uw_3bAm zf9IRO68x=ni>Tmurx~jSG)BDz@I){H)X&u#ABBd>wSXp~tsF*d$=^_NDky>+T! z*me}QjTB*)tr1NMJ^SWqmX7rGckH)M6i zbh1z)8v%Ae!0Gfuv>6KWA&k)!UdcxE{r`a=&dOa7cG(9Yi1W80dunoa z;})R35u#I_wm%%ayyrq1uAN zhEGr*RG^7>skNKnvr`3$_CyqD@E|Y-B~`&JgyXV;#yuNWlA#&w_7ezpsB0q z!B5g_*W3rL3Px~M(C%rOsgW$wt=G|0lQL1?3P}OM$ZGoVw32iO+oZWzZkb7CTA$G& z{dRg5{cJV-RwhFyhrhQN2RJrJN9RoG4CObsX_H3@)Qgx*5|tbi1u zMTRxB;WUMyf4_zn0*dD@1r%jgu5bHhcc=;Vsl0?nSufx>G@pQFIZ6jN(U1rNKnEC< z2MZt%5MPBd6Dy=^z<|NoKT5-HU8xJ)oz`K9dF8CjPczgbk_%(anH!Gog{`^=Zg_LB z@o~EE(Qvl_Qdb490TVJH&}*CMxwAB8I@rg6X(?f?wKRWWSYqlw_6MVWk_|A-W zFJ3xtZAC|%Btv|RikfqJeI6-7^bC4%n%*!e6QN^FLJeMp^Tv7`*32@9Dkv9JNb< zj%}iMZX>%oxLxb}SN&El7i7|5O(SF~FnlBpGw~t=f4U0%7f{5p(aE9M|77b8fydxX+L-JL}45?x{D2#IhzfBZ!A`Z}V zy8-m=y`yq7%#rxnfb^ArW3Ez+lhQ)3Yo0 z5Ivm_=G@chz~0l^&Rh3_?Q|c7d!yv>m938c!hu@!vtfEy}&gK3_(F20R75!Jk-JicbFIL;E3fjrN_!9&b9IzH{YeI=fS+R*|P(Tjk5Pr+Cc*&wt`Vu!G>} z-965YethKX!@nNdGGJPC^rALKk56g6wR{}6G}GF6Q(5r>mX!_O-8~pRJ+WMbK0iAJ z)Q1?&DW=5*Z_lu4c_6lV#2e$NHBxt?hzk07$Es`T^ ziJG?1Xf!!e3Eyq~KmI!{JvFghgx>fE8XQDt>bCTPIvTP&>e;xbfj6uUDqd}n37bm% z>31%IwIGv$OYY%wj{fwS+1@!9!vMe;B9x{{aWr=!0W95JIu(Iy zPMzPJtRK4NOkCgVsziMUmh^e*C3A%|L@k}P-CwTjfi6JU3VSqQq+~L5M-|FG4z1ZW zh(36?X|{KrhK9hJrYqE>iP5Zlq)t9b z<)MuOMnysR+!c61Jzb#)O`JWmw-`whOg!qcGai$*jR{XXgZ|bdXBL*EyK4h2VhCH=Q0v%2mQMs3 zmqt&6|5|vY+w^c+%0%ecAKyIC`<))f0Zv0J%!>3hA*(Hdhjd9hQ`6MQj5LtTDNvDG zE`wa%nLX&jS0R}B1O+1j+SRUQNm1OJaM^G}(VWCMYuat;9|tq&VFygFOa^JN0Gsi^ z7qG3p%}!xrsIGZwdJW2OD1i|*eVS$k&yKKF<|mf7q9f=cNKJSQ3W=b4t?ywV7$YY!}dP=6+_;Y!_TR01Tlmn)gH znL;{_E(p-`Q}SkX$FX1Z{ra=LI|DRSS_qYAVl1cRan^H0Qg7#?Zi_|>H}QW9!$@S! z=$K{oo}My7UnY1z->W#&={ltX88uY_%rxjMg!>j_25p2}=%h@Bj=T)`CQ!GwxmORt zbHM7SmR5hzWhQE_gqsMal##3wa9V_Q`&blK|8fy}iX9U!NARY%UMlV(_mY+ln@N^c zoH|UVb?&+wps@rkS6&WUmWxpNE;m@Ohcr+GdpRu>!7^Rf(v*08F}{NH0lhJgQMRf9 zzH$UTe|H!jN+v`4cfecpWK6rQ_xfS_(BhK0dewMk^s^)1ny?JN18#m=akXH81V=yB zy%heAxLFH~!CWN+m4rnX)~EBq1bQtEFHhc#V%?YKk9tFcqH{f#5zV$xd?qdeLTS#m ziBiz*j-=~st*S#e=Rl9V86As#O!BL*&ch;r6b7MuOI!v@KJBjgvk^V`GV;75hDt1~ z0$D3yp~eoK6sHXA8gTaI9&sHFlXQm4#KmD-e7|Rw}El22|e&HXI_L3yhKRH-^n7qqt7S&IfZ4_`}){jV>gX8$F3Z+jVZ@Ak10l99esZE(a}3cKQg*d9ldnaIJ$3i z!`eTseR=J7*FLoNGp8^KPmTO;$ywQJt&a|qwR=IEMh z)}+=@Yt(CYtXVVs-@`u|eq#9U;g1bBhp!yA4J(H?0e|qXhJG;g*w9@=e>YSgx_rno zbivT<;GYM7Irz_my}{2Z2X9bV28-{p2LpHTKMfooxE;8Ivje_?iwDje7+d|;>YuIt z=IZ-a-@5v0^rZ5u8x|A|g~&Rn%94y8D<-pPohOtr+O^@!`fOFIl0Rz1%n7$OYNPxy z3%@5MwVNTC0vLy~4Nuw8wBn&}O6|%Lk0tU-ea4ID90ASwA{V5pSTj`!ZwWm2cIQM3H4Ik-FKHwX?&*pB3gm?@EOTv)06DD>}}s;Q|R!QQlds zVnm}=fh$!f)JYiX;xy##rGSaISxiB1RH@5^aj|=jPv$V4JK`!^*qS+(-t!BoJ*ML@ z8fV&h-~bKjvI8R5rz#gsDai#FVKgQ~UaS*|o$-jMKj)y-hB6SJHxpKp$Y{@$nyt2S zi;v-+eBIs5XeBy4RkrQU61FyO)Y2NpZPjksFaFtVCdAsb ziQ~^?T%l4?i#sZ;r5sM5BXU!!G8D~|g=EX<@DOfRpE&pTk{Ye5g?AP@E|R08T+9b4 zy^?_BBAC@{V*qcNOqt`Bj-($e7_n3#l*!}ySi^qdpTzFVlTwQ8=9{JVs*fgs?Zz1| z`mB_Nv#%4?r1K3emcg8Hs*&`X7Sc{>m8Y|*QatY?F1>yvb~K=KGQWKwZf^35?}5&oNEb{;H%OOPLGdTqqV)*(e7&Rh7Cc zi#jsjQWfJ^HXqHg+HZ*MT(PPpGd`}UQ#*83mu5=j;Z#A;Gej7xxwLwr=+4!YIp?(W z0|%=kfvJ+Osxo1#Dlyz&Bt})L*~GDMGw+WQHlMnZoOny@pNcYN%vWjET~NP@Q`~`T zrS=e&#v_HK!KJNHr3#7r#qp;+L?E2xJ-}Y7_Nq0Tj3V)?D&^J%2z6dXxbt33!=XMX zna-3$pTy`y&7mVQd22^KL`(W{x1C7)BH*5mx6%c6ShAdnsx3oe0jts)P!=qJyD2TU zL@J%NEmye`-Lj~L4^Vi=O6O}zx@NS;&-X~( zllqd0^8jOX-4%{&*NYF82pXtXvmMsj6GBGucFBAt{0$m6I*P4a!xN{Q@tqHdV^278 zZlYc76m1%Hd;xHi&lFi=RS7Hbx@GhFU^ZaHw7&F(W6}@IK@;xtdXlYp*%K*dH~qKR z&bA69Ml(q^9S%i&F?RJHslDlMLDB_p$SX>ae3KXuE}nCSL&}%F>rvV>q^$)v3|m+Y7%=TEsnI8C|A7Js+A>63jyrhq$r5Bp@>dHd7)(8YBsir(0x*S zqmsgn)rgt)VRf}XrEW{@RX0gc<_H|Dcp*}b9gK;ik9OjvX2FwZ9hARO(wv9H?$LTE zPUu{$JC8#uU@)$@K%=}L3pMtA!wGf2_5i95Ss?K-y**jIyq>dpv9&a<0H1I%qZ;`r3 zYCg(Y3NYnHiar+DWifs&)a+1 zN@_nWwnr+25|1}{t2RdXfm{te; z4c$3KsokwHVKhspynrpr7>IQ`Nsp6I30#+^h}xSk$M%bCv#M~rT?%VeX=SM5E0|In z|6A-GF0n4m7VznEftH@)s4t7k!;uAJ1rM1WYJH>)Y_Yis>8=tEmTI^+7|;YfrGTxR z^}Q(lfGMc}A*UJh*MiLyO=zSw5~^B_xLLE5`tTWI^ zhw@T?LjWUMNqvmS8=VG!Vtqr>uTyg>z!Ydzah2Q0&r54CgsJ0rw94ZiZ@XT}Y9?}$ z{SE5*GLdlko3&uM9%fZ4ks?_YR5!{bAJOIbR+Fifw3NtHtO{iG430o?2k*=sCT*3DCM_E4gw$QzG86iIr3_f#Dq~SI@n^B!$GQlj1qsB)l+GAzYj-Q9_Gn#A zlyk{M9Ipk8ENk1oAnNz|t$5Sm&(*x%x(7?myd(A3KzLo_G8sGmS{f>^4xTBs6WSKx z;ElY+TJURY8O`%zySI{~Fe{S?bX+Z{U(W5gLR9Z98C{&dMbQbO9^+IOeoJc3bryoQ zhSBPvJART&@2pDg88S#T!#C7;gpKacUYjD_~JOiCu3u>{ug7y_B+t1twhZO8=?;BFQcqOsSR~IkGZsrdm>wECTA~wEk(3)~8B6V= zu8=Gl(*Ruh6ukl6SOWKyOoa3gy|9S?ePsoLZNMbcgqpV|4a^7;Kii=IUmXJDK=Ai* zaP+@YfxLtjyFe!OHGh#`=2(@6;zD3)g@Qr=!%YJ`B?lZc91iIRfb@Ed-n1J~X5I_s zt=JW+S|;auI|r<7C=G1TQ!reJ*F!A_g+q+c1plppHU-a{^og^0esr4J!$IH{VD?x#E@%4YejF zH;_uON_PmRQK&QFAx#C+E`(oiLYH>vbpWfdQkNctpu~cc^>ZEg9ZU@EH!CA~;P?=7 zmrMbb=rg0PqNg^j)B`DIUOa#vyz2Bpx2qxOCJT-f`!N$pKv0p&Q*%3I-TE;U2|41# z0tDXJRTJcR41jZ=9DaRh*MMEY_I8!lKssBzE1)BZuqEmW4`AoG+o)9sQ}MQuK$Rol zag#R#|4Y@?`|S}S4h?TK7sQOJdbSf!n+rBvoVe15=!r?0Ou%E1P;Q?45DkzD&Tb6; zbiNwB56VRQwF=D}6oW&S0 zcbxfx4k@pPeRb1EA%G^6p14Wg-wJsZ()KDwxM>Ly4yaCI*iT(kWL)$`F> z3!{p7rd|%$NlE9{8z9EHT!fAs|LA-_u@zl)11(igeD+2dBi$7ck?MVQfm*GOk+p!W zsB_wl-jY@r_Put9UnmxfAGwpyRN7IERyRyX@S&%@BR(FZJVuo7zUZ? zYmH_ZJQsB*9r_GYX#nV(`zDCeEN>Oy-T+?X8t+E*^_v#eo%|TRXZ>5NCbo{+t3@xx+<=Q%tUZ7pM49=txSXz4_$ny zcjGN|SaBL-Irxdw7)x|$&js6h=}*v*+-yvhtqE{kMO1WDgVh|6%z6)O@n3!tR;o+} zC8fYr+%Hf!-3otpI)igM10bSug?hOhCj9Zfh1~(HxT;eU8jP}TkXH;CbA2_t5G3hr zyRyr{6pH{P8IK{2hr=N@-qBLAiUxi7Hh6EcR={C;$kiMBdts*mH6LAoZ=QgTR5el# z9fpdx!{(GXiDUC)eHMN$Zx#Va9{nusRgACxLZAEM}eMy?u%6cHXhbtg=KtQl}8AHjOc>N(d#e#sYU`V7c1J+!1l zwos%sbj{~iUPJ2Mi#xYKYNG#6nnr*4B0atd>H{Iq4j99sKAnOC2{48s{}XaXU??*P zzl&ZEa2YFh`HKwYpJHy?XC+~pz{Br4xcKmJWoQ8hO^fyi;A{>84vPnHivX{v ze?f8I3m23XyP#6;wM9hvdr$lDo9=^$m+d)eYoZtLgGC^d_4ngqR^9_}C>EfKY{D}7 zk@3v%D?=Lw4!xIIKy?AKND76iYpgLyc#O(MnDa22EGdotA(&p74BhdMXTFz5G1t5I zAt9vCbStp!#poUjzT}ENKs5jrQQd@cz5YzJx-eRq2tD=DZyoIYs4E1CnJxe@Nnx=R z_+u(~#pE!l4HXBi)`%*$_dtbAhK^kDTZl(Njs4M!t($t+^k@L6bT!;1Etz#V14q}RymhS*s{PKE9`gvq`5>yFgQpVH4178>n-B3Wr>CgQ;Z#z% z(aldRZ-v2hK*6syTYE#tg*=657a)(;jpXey$b?w$2D zA=fa{1&}5QKtCQbv>bRQY9JdWfCP>A4a^Ms^kZ;V$YepbZBT94sQ1Y@Jhun zsjsbx2MMiB?{5XHQCyW4Udar)_!$_gOop%@eOAg{`OGsy+}+&;6!yiHT4mcoyio~q z=8CSZ?5~U&bj9}|Vy<2$Lc7+&yLjMC>*n6$--CA{l&rOvhSOl04g;Ry9UZ-=lQx!k zaX5eX91KS$Lr?u`Cvc&)HQRc>c}@(z0>-|yQdL^7nI{}%A)>222DQ;dSo)B&uoRFED=Y1 zu2*|j(B;fP4QW<610#*;(SM?6rsT3d;K5NRy|uUfJAxjnTL(R2 zeBAD0m^fJp)0Sqm&?%a8;I?*M3W7e z80oQYg@a*ICPQy*{4(qvNFC|D_!L}7q+FKbs*y**a&3Z~sN#fe^rmsXx9jyCVfZsA zRxSORh|3J+4S+_k))$l&H`EOD7uU{T!k>}JMCA0(f5ErCcik_A>$Ru50D8o?0MXLA z32WJtVTUc!DMM*oUyu7`&?A$HrE#yn0XUQoybLo37vO7Pk&1<apZ`M0ETFnqFU^0{;1AgFOrA-na|zNMm)_&^zk<=o zWT<@ot5P*M_FuwinC?|e_PEs6mW}Zy)>hT=ln$`m`ww;aHBciH0b2Ll=OASWpX)vT z8mQU+q40^-U~Lrrv@w-DHi}++g`PbF*PMDklyw4_fwM96BxafFDPHO)ai4e(J;dnJ z8T3E}UnDgomg9;kLE-$QtQj&FfIY8&#SFYEBVdGwxf*2g_zgrv1!?`joJRQ?I20)uRfi0 zbql=-1sFD~Qdz*MMmlBT0}j}LsH9+K(NErl)Ge6|a&rG=u>j+N-_nQYtZ;8IWuZ92 zE^t+50PqKjO7tCcXo8tTy0_`cjVty5Zk`i=8T(MUt2r01E5NS3tFt?FO10+Hb57Q+|CXhT zi|Y4uWEK~IG1w;DC!y>jn1_sFs7)~=&jDrz^?ncIT(N^d{`;2^mS8r})<4ptbAC4v z>H$@;-vEpxaDM~u2E}KAo?EyW(|@FAHmuYGy`DaEuRtC$kDmVHX|HYD{?xCrfZRf< z#zJ-)FP_vd{s}grOx8cC7yTN4hASMiYTP`rd$cj~`QdL5zB8~#!3eooTG*YQ6JtxZ zE1XK15?J0|)P%Ifq#uKfw0qz|7RH&GNtq0+&IULd>z^MH%D-oNFOD-p2I2_;*hMt` zRMKu};gr!5!8Odx)cZsy_3(`h(7`|zx`v?uH~~*5NX+Puk{*pMN+%)1 zP8i6KMws=JG8s~w1BJm)yzSoF)2?OQiYay5?bGAFc(KNoqV{4(_+s9GzB~%gAQK7q zBG}K*U9hD$HpU3W+b0C59r3c^13swF@!3brTCjbyfLRv}@RdCmr7`&>Cmnuq=TCfZAld@(2J+Ka~TUfWitz*_{*X>+4GXDDb3*%2t zK0p4YH9sG}WxPEeA9sx7<6FlE$9|)rA+76)vAYLXjom!fg2XQS7&f+LY+&@iMt?B+ zwb3t(esr`pdU(_{c;V&pvqsjfL2DM)aFdS!evtUD@BYr_0#*+|LXk$I z)iQMos_2H#}NX*{Sk!V*hF-Tf*Ft znif({ItGi{YZSYO8cril*^FjqmZ*CY%&)}m5nY=k(}7MbX7hRMPAwf5+fya28f(P^ zkpvFmE2v73O6nJErZVm@CJdnh=5bshP@VW>hT>gZTHKorG@Kd7^*6z1~j z_31>YZSrZy6;it=KohmHK9%EDX$MEle?)ArH5)O4!!v~2nT!X@#P)*Jp3T?Dw1$Mp zRw*8}6;k`fT!}1{A20;XtK+t^FHfme7$N;2Zh`t#Ti93OyiABoIP&5|)Z&Cmp97B; zAM__WnC^>GbA<8ws_m4?)yjv>>I?oTX$iY^q`eX?MOsWdRm_YnyeSHjK3;`cv342D zyR;rpoH|czZxp>1yk)jlg(xbMCpJ%s`WuO=-cFWzLtKrUtcmkBOWgrq5%!=zT~#-M z7coxkmfAyZI~HzWTt}DZN*p)#h}6EoP!KmM>I}Ti>#(J?8(xwG8jgm1CU@GajwTZ( za`;o?->sLU#dNktnqqj}luR6$61&$+?hZz!jc$rbS=Cs|eUsFljrg&Et6kMKbM_z} z(|lS~Q(?1Jb-ZdVE!2{f2EwM3VtbwmQH5ki*=V#1#!kZZSy4?zoATpK)sb&UVtIX1 zM_HZeYIBrv6~0>L-iSH<>bFzLorWHajI z451{I-SIV1e@$<<5;dbbovb@uE|=9Kc4y%Y61h|nvsPV7dn08oN$t_{0!eyORyz%4 zXL^ll>Kl?E9H`*gNTXTk}6j25zm>%v-B z5XX3_S+90?3Qjv#D`=w~wN5LliB(A-o?(ruN(jQ6;l%pI_FM-t##9-5%o~9KG&%cm zslPi-V-2sd>`$9@9#?FxA532`W@Acc8V@DC`JCQqN_M!dKJf?9HkQO)d4eMv^+>^y zI4B1Eve8n)n&w$n8LpI6x$M|S#bHK^woJ2a$XBDZS4*icn3bAsZWo z#87%RijgJA3Uw@0wGOVrA68zzKIdnrZ}U znr2)tW{YH7=~4`j>$4pVrXXEY6t_hzdcF!v9;da!JP%&Zi0@KQc#B?#JAgd6#*`8A6 zN;y;5pALRq?B9Z~)Oagst{MrCOPz2_kJYk-Q=~B$Wz5A))#Xc!d|Mi&IvoNO0jiV>MAvGak{A$+9|| zj0VlQQpUYT)Kk-$_+qSJaV2AIiG}4$CPuh*SFmKnB6DqNLHQlbeHR(=0 z8?cck{-O_x-K$zIja8@xM%U4|VqmF9gg`eekxI)#;7(WCNgDDY$gbS~g4EvRc$^QL zLdFzXj+aw&q|^@e4n&J;1zEo{r7N?$UY6Pm3`=;qKrtH$)wEXijmdMvvD3pY;xDwMR(y6%e4Dqj)7w}pc zFO`xl2Nt19&4Ygy`HQ|iQVkuZOc;25q>oZb+T_J=A z>s-hgCTn&#xn0c2$riIZ6P7V091xBUm>oLR8)E;WO9>T5)~Ihm@5l6|X8gRMB+zH- zWIk1lJGJR7ql7rDIM5>G(q_Y%BCljft{OY*b*Vc}Ye<~0>zpQ!fpM~$!(w|Oqjlm% zGcbRKozhDte#p{DSy*3!!$p zWhfc*s)~s&=%&R?lx%^vHfW=_rqp<%C4F2gCQD}v#z+mTG-*fNRk9~J?XIguE%~-B zTn;%CMjdA_YBQ5hiGMWT2rhUDp7Y~e$icu{FqkDlnuPBVGtW98503N3wif$YYJhZR zE)i5Pm~oXo8M8GmEy29eq9wcq#^kB9blRFdqbgddTq_hz@olfl;_;O8xO5ukf)*WF zqV2&}gsCkgqQpfHh@;HWS~iYr;l>%YnIkFfE~(jV@>zJ^mY9xRMB{mTT-_@8;>zDi?RdF?nT#<$;H5dc&Sb z+F>pNoJ75r7#EX%vsrtR#VamdSZN~aM3z6$75{8j6HQ=zArXir+xB#PRJu0u`BV%G zk>;A4PuQt6xkcJ2nUdR&Q(imJ&}l3=Rc_#C;&3trtrbht#sx#dYjeipiIH0*0bgtq zX0NVPWXy4wQg?n*YG>Oa++lTb8Dk~E8RK(Csok5a6Q;Bia8A8dwL5c(WZW|@Zi($HuQf(mpN+S`UoR``&H5MmT zt}tP##em{P`x~j9t)(#oT!QRy*U4-63F-WV0G1JqK38FJr<$vz*RPTKyMRyK6SKDi zxj@0u#`gSszkMOgC4DyBQB?DeQpOmLs&&%A%>~N_eX^3(S?VMt79aS%sE5;)>o^wD z5n;N@6B=@-_#U&V3>yd=X_{AQ-8n~m_F3_9Q*molV z94_Q)@+VTezwE$WFp)M*quENU_DL@#Y2lN2&KwVxo#kwSC1-34(hn@r3SRTJ4CZDz z=5J>PFOu4IM!3nQYGlZ!>v*iX-O|~V#B>@0$Nb7ji02cGTK%xtKhbbxh*Tv~QX5i! zolkvexAU`I^*U@@5OtwujPVFtaq2^7d=fNACH2Lp!DgFgVA$-rjtP@Um9 z0bu2ltKMy4tpUtg%BZa>Jz)vzL@!fi29(KU;MV!Ce*8+J?)ujmK^b%6J$O))!H~$3 z#Y#rgv4!*S$sj8G))r7Elc8NVe05K6aw~Hglp~%1h)*dHM21R6z?Ew>@qAgG(L*Jt z;PkR?1Pw9~I=N{aa)go)bGc_DBLoRg0OG0?B(#O$z{f)7yxV1^Q~D0f(YfG2zHOQT z2l8?mdg|Ual572)Y4G)c9zcMV+(kLU424FRleD{X>MZ3FYMH@}{Ml{H zL+1C}7{~Y6F@f}IE(26 zZ$SyL1iU4iiN#sEe&=assrTYk>TeV%x|^ZUyJs=uo7|x&Wo!^MgB5YBqM-oc4tas(`&?!t z`rbS)R z)a5et{L`lQa8hS`Z(xFzpiT%NyP|tOl**M=xV~IT6dfu^U6kVfaRPRzOa|DoxjvHR z=H63;pvQY+Bj^!LdNSL|nDMGFRgAf#z|;iHr-Dfz)_@+F4875~;ynP#^*v4_INe<* zHh?nGK~85>DI?B74i!&%+Rds~RCe?dP$rY1r+#vSm{-?(^AaKU5Iq5yxRME!TLIBP z{8Y>bbvR*SKwVg)S9M`;7A^;xYsboWKzAeS{mZo!7V=*h?SZtiWn zSTLHl69R%RCng%kbLt4;>ll?#-x8{-r0GaP$Z0Adlc8gWhxefeJRb;7uR`>N}_N1@VOqI}yym;x-e#fK0iWC7LKSw?iie}t^ z^A2eC;yZjc$UxX`r4E3nQ3jyFp@ZAd{t$Dz@Zzl@*zxVK%SaF=U70gyd|rbcPPQnV zke7$S(8*+Q@Vg+F`q%R}0W?vR0d6@yns)o4ShbS{taw%x=|liLKL9u?QAR-BUr7qd zwDYQe6^DXP)C3%;?015Qw zgn%x5bw9*~8`GqL#7#wD!dsr1a&TK!@9`LRX^Mk>2w$xLs}qIBLm& zXuMH8O#}-1noZY;<3#|3>A+SwKM5m|$>1pbE#O1=_HXIkl!W1IGo297sITao1HF#1 zLrqbLH>$&xdMznh{uk3=&txL>#^0<5q>#%CfU*Av_izvD^Na%3dDQ2@OhnY}Ze2Qc52HpUzZ72wJzll3=}9rztLx z=Nhm-SMGwQ2j=&SWDy6N%;~TdQL}$7i!WWvytJJw5tfoImBHCEu7>+x2d43g7EGf| z2B4El0G-4-On45;GXVcoV3o4B!IWkNmJdKqL!a+3^Rp`p|4$RK^NOX3;DNfX<5ofX zYli|(sc0z3(_p8V`{6Tzx{8_FxMBwsd-(>5*6)d{PCE^ot_CwDU*gj8fAQ)SmOl_> z9Owdm+5!`pJaare_=nM}M!ExM4F6DJ?(N!HxpfZezP>QI;byQp; z_u7s+2&0YzItb3-0?NQJj><3yBBG-BJJoL`CQah^_sQq}k#pWY_10VOdfs!Mhiuuo z7;r5&J%)s+9KHd@$B0xp`qX(V5FDS}J~(y*j1M>-U2tNG=tS$4D3&g9#dKGo%`&5G zxshL491$zW?%$|auGjgO2Jg5L!V`9dSNB0B5FGi)AkfA~_sAK>hssX0bMWIMs3sRe zP3DG^jLRVOB&^Vp3W-9i$;VjbrML6@mPW;j@NN0>f%vyD)9tdZ9)MaP(n~g6tW?So zn5oRhkl4*DkKP1LF(Or}o8t!tm%f9)TDK%uTV0k7(8XNdEjZxh1S4zfZUbvLIf(1j zLh3>D@L<5zZ+U&L_GYWgQxiIa2kB$d-$s$Hwr+2gSmV>sLlsY$kj3xRbpP{k@xT`XPr)~ zJmqR_(^9_fd@sMeHRw|J6cDo&BY}4&=L>ova0&QQ!NNA>@%QozXPvIZ;Dyz1y+^0q zatFV>&7+1g6--bG6`wgvsYIKxAY`Ep?odyor_+KH;ir&T#R*Hw70Ma63yK2caI`D2 zitBx+>0txilPZKGaVPAPe89(}zK^;;is62^;&7D#$`MmOdM8xqv|1pOFD1@FqHu1vv2Hhp<$#4r$LLTKe zEO$k{lOkgdnXbr0rIscYYmV|uOQSmF){npY^1)Y+@;=?JYgYkU6G#|*D^7FV z6%)jAlmaMZo0Cjn%KneS{4*jQ=D8>f@82^$_`*kFce3m;mN+ZUr*helK$3M}G@1W6 zzp^wcRYZt`Ljm*N$H7TW;;OMLMYFhoYA%CY#}+@StR zJ_x9f!5(HLT#2;VYH3tbB})0xKS0+R6@!0B@C>f{6b}hCw$)2u1BE819C*na7#3jg zppVsuN*VP#198u(V&&*wdEXsxo1Pf#`iwfoRDF794Yx>Hg0?g;It>_+>h|rfdtlud z)v2gj=L3x1IqQ{&_)C`tzq^OOOt;IvdNI5+I@1Y0yjzG?tew2f<@FHe4#%c_3#Ure z0QY@^dp-wGSEjyzJ9gdy$qd>yh%kg&&Q8F~P?cWD(Jd&qJ`I)m@fZ2!g;Q0^u?HSJ z5zo1bJXR3=uT4**{Q~uwJv5Ljo*a-iT5O=Zw+JV>$QR)x_u8uJxKhJ5%i$s{-B{cL zsXS#hOw!s>s|8V_Yy86I(-u(@)&k5I&jD}ur`OInUyOZexP5{6ZOyCXWfS2Dmh{Bk zwBOSV+O^kz@Jle=kLZ+Rsq}Hyue-hslL+iAAi&b4Mwmh>tf%9_1xUSt!LGL8J_b^f z^(S#>oxZd>@c(KWPWAYH1_;K0?>7weUy#jPw!*P41=zTdh67`Blk%mn@Ec(^e|-_9 zQhJ_1Gs}fvJ>$%B!&isxBA;lNKq>FH5_Y?vjm5f6E|Wr!aeNKV1|vGfcsuk9#2&i) zzTxBwz_q~X34y+NEMhA_DlKe5RXVhX`K{-Z1alJTwwmbs`m%qG7!A^zZ@=SyeroxR z07E-|Xx=)xbv8TwxvAgil*HcO#TEVC>ux2Ke+c> zJS2C-R#h}^lrZTvMsRCR-)xd$b0%lUl?T2LH7b9DS1IOBRw+jVpNAx*l}iBA`x|Pg zB)zI4a3dhQYA6@2;|`NMW|Zw+Qx>@J)IPBP+Yo>{qEn7OGqF!O&I6=5u)qFo{@1&x zRTYXG8O(U1Q87;y@)jp7Uxqwd+W+TY`Gv(1m7@E-0rosvlsT(gj>Q=(eC7<-GlfIA zu>qtt>MMQtA!y_go$|mz@$le}55X1>c1iS!UDC)nJ3a>A^xZRzK@=+g_;=OQb$pdP zvC|ysm#EJIPT;9sdDvZ%iM5A$LEUH_UQ{+;e}zHe9^vQD)NA^WoT1kY^yhhwz`5}I zylEADe0j_$MKJnNYC%)GngN;&9l0#j9t;UFS)Mh4u{}u+szQqyo$$YnW z{z&znLvFr`2wsTi<96T(uv=A+R~wC{JwJv$&1p*j3ixCH&$xZ%`p5Yhpg0Txzhe;x z`kaC~>BAooDB9pG`MBz~I;~cD;DMaBWjgT087HjmbH(WjE02Eq!&fSMp4h~n;XdK`gtoB+ z6B;D<|I^g7lUv43y3)L;Zpwn-!}711VDKZCHs!6gF^me!!EUK7=V}S%*t75vN5l%2 zr8WHCmH&lV2yO$7U;=@13e_~wg!JmkI9+1OA`ozZiOmZ4GZ=6qI>ZCC=l9@0`pnN@ zkGGuc8CpTSDpW9MQ))TAS@hdIKZm{Hs7^Wd+%s1U`ag%?Eg9OaMi4jXL)mCVsKi3b z7oLS_;y1s5Jr{5t3?}Tu zbDiE}Z{>)ln)~JVdhi|$B((wWd=Ba|s#A{LB?89qb86#_j5IU=wf-3m!P@gMO>K;=)5R9fpAXJnKmFOMpH9w>GivWpA)e!_kddt|FdeGtD3RG#G}SE1 zET4cV`q!Xl?|2bD?TAh}dOl<>E&b#Eg~88XR1g2YRTYUFC4>5VMZJtQ<22c>GA&0_ z+4C~Lf9ZA7BM1{Zg(IzYV(d7K-R~#CRZJZcr`QlD-6Wc;a_ZhY_7}?DqR$ zIl1{K+Xw9L)mG+KonQyuw*(zNn-j}H9rP_=u1cg;J1dJLVnvs~az(jTHROP^UL= zO`Nh#G@n{VdEn87Av^KT!P9?)o(vlkz~R>13z!-Yi&;4e#s%l>km|PvGQm@&$}!h^ zAe?xO2lxU1y0K3$Ec13@^+HORA7s8a8g)=T=UbEfDL2s|Hn;^N=UQ73G2_3l=11y z-+t}(H>_-e<2j`QJ3%fMO!7_~oFs6c0n`DXoffv9&*lot2@5u_W}q_ z3@(?wc5hC-Xi^uLJ z9_c#64z)#b&%=isQGqYl0?w4P7li0mJFJkAaLE$^+ySVhO3)1cAwbS~4YvCXL7ucg z`c7L`dGU)Mpq1+{*dP5XOJsj`zP0XyI@{#z4YS4B!0cshGqSQ*WHI zPW9g~wR!SSlRul^GWqc2mnJ`?vn|S#Z=bA8MkcSA+&{TA@w>VInRt5Q!HHuN@1Hm_ zk)QBS9GW<9Vs895<4=zN%lPNV-#32!;@#u9aen?9-QSI~^S6xe9iN@Q1i+G?82iT9 zXU5(;_U5tl7&k_a?OOcu*o5ve-E+FH>6(iN7MB)&r@N*<7n}d5g{KxC)H0F^3;uK3-6Z6l_KQ?#MoN?~Lxs9{0&OS5y-PyI- z54k?KWqcSZB^5gnjL4;=T9Pnxgqu_~5MeGg^Z5wo&h~oXq3}|~q4%QVja=W|#{IT> zneF8Ww1~}1Tn%g?hm*! z>42jflnbu^Tts#niJmtbZnet>Hk<<#JrtNLHPVR;o(JCFLZ3Eal?1(ik5(bxh2h3* z&zB*B-dH(z=?9R!o=SuWd%9|tBbY$-NFz!_lIjVvM&zP=E1Su{G;Wwg5x7!4nza$E zmFWelykyIYIEoXL>Y<1Xbf&l|Q3Fp@0NdL?uHXV5JeXvPO*)FXW31(i=mqKo#*n56 z(Fq0UR3^6`CBjIx4uFmuJ#}jZ@H_R{tyX*qSNb@Ys^HIpHV~wW2kwi4B>S$6}@Q zY{T8)$uSgHEY%pXjfacHv?p4rB}>_z2hdZiAs*aq;dC-(tvCreGmfGmTo+vbTjgKg35%x(J_dahgz(IIos?ur{t{v^h9G;zTpVI|S# zh@{%qc5LAX=&^FDEfBR{uPm4>mNh*Twif2$|DsEpr z8IkQ)vIL2w)I|dmYsk04DSH4XFMeLLuD69SPDu63-L9YyNZ9!(SXz=q14|T( zhO#BcxC*Y+ZVvrG3YT4&C)DQabktgl7c3|#N0I{8DjpTRl+zcr7n_-#+E9`F6(BV* z!Un|^yDVKF-rs{Fd8IN#5dipYfxQI89EUR(A>?GKjC%-Y z%bE)Cd?Zjdm{1_HRFYYl;4BqK(q0L;9Hse(P&G?Z#Z30h0lv%ANqe21|BWUu2lY5* z@_X8HHbpxa0}A|=`X#ne#cE}aPZy%;LTee}_DLnuZ31A3gs%-esU=oCghEoKV#{tO zJ>H0k^F)K5q+z;;>=&D!B3bsQqFrOoX>b=7A4APw^!V9iub^*+jZMZ{SazV|g=oV} z z1mS*hvF!F`Mah8QrOCsEFka}TF(>7f+#Sk#+`b@Tn8#GZDZD~Kl0lzFsee+QYk06Q z9=F0l$m-+ijmOXn8xZzq5HZP;vh`FkX@Usrd=MMI%7?GGf8x-cVpY6nO%*)pO=oLzrodwET(U&OA+xf@ZbCu7l1P#X((Mfx+J2wK z8_7)ki&`GWf2N%%5LBiLNIo@RuEdgBBV=l&Zi+2eoP|OrrpL$_vY)AhNysLR#)*P0 z6AV%peo2$3l2NS47^z4rU}d7|aTGc)WsD_~pu(QEFGh4QTXydiT6sf(!7F_(o{aJ( zIC$p9SCJy!2{*Bxx!@)w)(fd^>%OYV6NUsPFeYO=88Eo<+$C>D&6Bp7+E}h>&xc}o zEw&d{P)ui*Qq^XI2zcu>R=3l|MiS*3N-4Pz#Cu#JQ7$kEhk303AINwrNr*O~mCS4w&zyaIE4^S<};ZYVuI9ggZ-8BjPu= zOSCw9qb7$8Eu!1(LZ+vM3XpN^A_P4wB~0BMu#$**U_pvwRG$Q!rpT~`>BjXL zuPvv0C$bao7Q1*}YF84eh@s_4?!O)tk7x5H%;d8B{5E~Jhfiv2M?9UQNDIc5Y0jO@ z$)aVTO>1#7nZ}xxZYG~Bge;!S8~z5_k9AUETn)Z2O1M2y#1|*#FIhKyL`CnW-7bLz z0+X~WAIdscHL=+hGQ}#9P*`l0f*E3mCZ=oluGnDW-jF*MPaQ&;QBn^w4Jo`PxB=d@ z+qE}Kd)nv)dX-d<@b{Q_N@j%=5eT6A^n6T}$O5pa=w}?kByRe+R-BA`aYMQo%T{P6 z7oXI2H9b6-Bg#3ahp@*jIF_QdMXTB1GI*Br`nvtJE#4E!$mfwAQ358GTtG6%4MHrE zkDP@b+ii<7B*QgpZhM}`8Vug!!| za*mV&2M>{ufnBgF12S;vnXTh}NN$tL@m_)mc$|JufcAE!Y)JcDIj=W>J9A+p)rS3- zNQbKEu|-0Xund>tnoeVZYg3^(lGiL0OUPKjcQO(AA0!te1xR(F^>*G~$~!7~ z|FcM5E!&nmc)Mb6XEIzqZ7cd8U;Kr#{MgTT^=k$j8*WmjMxc|cyE9R(LGz5oj@Odb zK!NGHtBs8BRb;8z?fG!Rn{m-(js=cZAIg%Ix>>=5hr0T>uZUxKntKEl?}qCY(r=Qw zWj;#TV3VfJkzI~1;_je;_01u3xfagjpV59`2$V64tC6!7%pIvhpC==ErwsAgT)1EY z%7|pB$X;C2VRECJnc~g$(s(O>RtgNF#5lC(9NxTT1THri~891F3t1Gf_nh z>m@S%8ExOtPPVI<*iGbRNz%77xKVp>I|gpMKtNA~&~w{ClLK~7bjN4PL`$jkPHlQ?J8B)$P-ZE><>nG~X2)+)`F@+^IN+}BRyY%u zlY=z#W6eHcwNc5gwUmUrCqr_VHodiK8JX;f%~;FcNS0*-b{VqMD#dMhDq@6iIv@BO z@D=TSTQQ@N$oV2|Q&XRTaGI@u*2)J%66Q=6`nF1d%Qt<@;ZJG`A4frwt20*>iY1qW znf@uNPm60;g4w9QE*UW=O>+TFY-IDHLNBPVvmw5gUivt)((L8Rm~0XP$##wM`lxB6 zCKs_J=B<`vv}mgt2dAXG3p8a)WCFzG26PvH54`zd!$#`H#%MYrZ~z z)x2f?;`y`Y{y6uuxrgTlb03C-vOE{l4$FUl!}51#@14DC_Qu)rY(F%6`Rt13W%!qw z&&}L1)1S%e{zmgMOi%xM`tj+1p8oXod!~ES$!XU#KD}dleEt8f|M#JP;pX+t^>18n zUH^vlo2ULX^|Psen_8Rt;M9#%<*Crrq22%CQ4u%evp|{!8~A-MzXGEIy(OD*SskZ0^e*L)n0PJzSPG zhOu@h;d>;>qYkSs5b5Z!KrRm1)ijVe5M)Ru6K4`Eg^hhQN6M}OY&->qYvyfYw-+jIVUQtL!48BV;SMjC z(&qP0SHrYcpU!xxJ} z%HNcug^SQhLw3e{aS_XPV@#!OMCsgNAv?n&m4iRUax02;vT@?+;F`n7uf`cCG4~l z{CI(2$#;(?PesB6j|n7GPgC9yeE}NMvLjy06Na+D0bEiqQ_uGg+^zi}WC;+thA&jA zSR1%0A9_WTJEC<$aOJ&ivy~ij|>6NXP(IRBGr(P zkESuobSL^^_PDJi;uorCyWP7lh!pNpMU*R(ze>Ha{+62mWbFoFXEH$>A zOq=O$aU4y~vaMIHV0g8U1*8ngn?m%i|3LO_H6K+ARdTIFtLo}yFN~q;*s=*0izf4_ z7VP$`JyQ6kCg)r|A}FXAZzVF<%@76x8l*><)T*H zVvk@PfTs{F5Ag%kq&61Wu9OB40x2ZgqDCwt&V5^Jf40<%V2Qlfm13;4;Gi~r4H;s^ zfDMj(`9g+qSqL)Wk-_!yz*XBkc%>D?Z*Y;?}}}*N_pqmZUMC+ad+AUZG8rt{s|OhP-@h zw&BRovA*hlU(_afT4JKOY>|QZstCJ7ayqL0AmmKqMA_Qyl)a)MPuea(%})nA4YOqP zM>}zWZ!rhIt`)~DCc?>LaweCumjvok?6};-5q5AkC1k+Uk#oWOw~Y7UfCT$;;n(uOrvlZ}|Hml|RNd<=Z*!h&W$NhbPuvrw0d3|$br?B!@pkf|sjaCGWn zF<%cA3*O`oZMabWl#OV0U6P+|ad8WCHf-3zT_aOos~+bWXS*5~vZSqe8EPI1fa6nM z7GwN`Yz#s$nf6$cs*-K8YEDsZuHSa%1KJ*k?6yjzjc~crZMUEIh&Ig*?6YdNuw=9e zUf^2G>(RkfCT;dEPPUjrFq=zuv+S$|*(VJKACb#Q@w%zfOeJ&U7^)7*I=DIjDOmIN z5+i5K!|Rm3StjWWTrKz_O-W^=Oy)1#rbyw6A% zOQ}pYh(pSOfS?gN>(irmB?65w;S4*imOS`_8shRh zG`TBk#!XbBMR2XMl%Z_sh$a&jM~LvHS*(>a)^kB|y00yBc(!cp*}JW>BP%-XMJKvP zka4jRAhM*GbN8D1a3X1b7qX8>*aS@NMKfpYHuI&7fDof(+zSNWbUyB_yQoHop8Hp= zxHH)xq_l;Xve|67Ai57|a&x~c5n?20A?+oYN!W|d(iB8Sj|Yta5S6S&Gj?)Dn|QFA z#ex}xS{3W%9ey0URO>phK{sG#1Ldsya_wLpU)qT5U@3DG&)AY!-4%rsYl;YJ@|cw( z$-E`rXSo94yAivzZ50;w!I?K!ss$nZs;4jD-`9Q+aEnC7*A2y7xPV(z=V@y!=Ha7w zUCwj$mf2eOP}9fDbG8^}qdkE@t!QbI#Y@ncQN~=g2v&C_91LZ!CMc?Za3^|zzTUFo zAs_3bs;y8lz<9N}TwgbESfk+1bOL@y%Ooy-ODiw8EQB?{RD3?BEz1B21XaNj_z`^moIK)tB`luLK*GiV%UMrB-q770r&2WQkrQ zZ;v`FgeP9yUD4#Wco74)i`48Ey+WEj%QKW$dUZ>eNZRanqFV$2L+0$i)#PbM18b%2 zY=sg+go8Z%_nJH`a(FG?C%6h`DyQ_!{3DuzkIEQ}Nhv_bw&u+R`f^Q9nSoZc(x{aq z>24uZ(4mcI1=8H?1VfeFU65m$)J2+|ZpdaPcyl*^bA-N^%U=4;;R{!~-eibq`y#+( z7V}_zW(%71D!?(A!X2VBfVnC*$&)@ji=Nx@rDz=Uk%em0#1@+5RwQbC%(#yk*|JCM7yPg2Z z7uf?lan@2K5{F(I{y_H70G8#8aS1&WAPu2B{eN0RnxbnXsGKT8p^v0m;qY6jowmrnn?@Q4e%Ma(az z&HEuu#P8ZZcxIEJa>K8x%x?^_xb zLwKL_fb!JSo-NAfGjBVjES)2~01+nrb??zR*Ue|=`LVZbcxv7-fA0M3+^^@JnEQtA zzPZono}asI?k#iToOh0%J9})t;0P2lVP<>dD#zcTre$#+fG zC$E|`PhK>+Y2ww1|K9Mg6W^U!o%rCyjS~{kbzd>|-iiGai{r11|L6F($G-s4C~q4t zjQhtA>OQG^_gH4bZ^t~-V=pcK0-Qx%W&XNbxA#A=aKl0gU~ey5SXo$5sl3O;G4B{X zcJ|nm?s?shboc8%rMp$v1=QH#P=$K{%8Su5C3DT(vyiYA3?`kR2cCZDV558Vw|zY@l8|faqG|bcAX}{9fD+#N~lP!mHKC zk94S4c!7v1;3RaG;Cb@Jh0(#zo$F+Y#| zCUFl0!ocSURh4sh?1FF$OTKRCf*vGmdqEakc;$;!rgSKRGPtXy>oSjCJX@yKRbCx-( z{Xhj&&B$(_%~diQ+4LLGPB!jwMpy!mJG-2%A_Dg6#i%ho1nGnP-axRJp{h=DM(b;w zU=HIQ!P#`hyQY3LM9rW(zBp$BKw1|g5kfI-ZZMVrdManE$fRI2(E284 zwAjc7PPhCnPu38?*CQy&IEN)eEvoHgyp+|!l9wRwRNUQa%S0|8v%76fpiCtWPO9en z=D53N%Mj66z8hhEo?bb1DcW|$-4Pc_rqV9RPcX&VHf2X%w7A>Y%aVY;RRgBgf}SE5 zk%J-bCVFLp=tWX3N+f#4+@af0{aqc1C<$3DUD@8s6LfO=QmrpnZEm5Tsv1q9bffLU z4xs&N+*RUSIB;z-U7OV6y`{}R*6fHGpi&mBxW$!|Oo5^e-BFGt8)7?ft+h!my17-wNl7%?7&{o%7>PE9oa%yszr*q>Kf7Zqb75IGWui?h@19 zxNI%>EV%zCzn_~A91=2QzH>h-Sr2gM)zt5bJV- zayxTZeovD-vJRXu^o2yH%Q;J}{ERl-t&{*xXR+xqwVkkkPC3xAEN z%WF-Y^-W~R(sc$2A{y-B-2~sI#m!&RG~ltmSsu#F~R+iTqjU0yl1I<$OfC)310a7a^Jo7>RDIlj>$yG>Nb** z7%)inu?wt7Vf1BNgt=qQijAC?3Xwyh#`q3QAEheL3FE{;BsVkx+R+mX=vx*R zNXt`{c2f(;s9{^)R$>bPn#*SFZ$!n}xY2=EN)0jK$eOrxa`MWdydP)%;1bB%Ywcju z5pQI$UFfhGXB~hkPcbCz=vmsCbe`Cv8FBy?JZ|bGDy)}F@CL)xn%tgs;Wj{JrhStN5<`Wwq;31{8r?EzjGZ%j;|jk*s@XVbA>y&r5=-KLu9q8BtPLm$moDqT7Ui6y{BmiBMWpU+BO&)4-m>p+QWlk)$44DJZqh3z8jlGO54DjEfj4UQ* zwcbOwWR5U9*^a+b?+8AU?%#^+&`n7q4N^7C6w73}OIZDyojU2Z!ZmhL$Oc80J+M&| z1GTxqSC^cotc|fIr#_*Ht@)|}h=ZF}Q?DIKZ~iaMxTzxHJ`p!&Os-5Qjx(39Tc^W@ zL=1y{caI;?DUbZ>BU1n}T(1+!ip-?>s)MR$quL1MV2^@T^;uKfSjwdgc=Rx8LOK#J z3dRm&_4?dcA)T|O$e?#?hiPe7P|pw zt+dr98V)0uLR^q5M%*1T_?tGrwe7^tM?rFNA?P#}n$1`n{5d9ZClAK^Ft-Xpi-)L{ zJ6_sVPgseh_Yiujz*%SvE5-_T2(7NW3ZdiXT`><{VV&iY-(0U6OCfEuBiMMBY?=$K zF(4a5OwK#4*`g zAUBjcsI8uSLTVM{s-=Y0GeSueiT7#coly+j`z3dj%2+Guf}y6#^>BAr_S$7jMjx=n z^OtI~y{~A>5;?Er;sMJWYveaQj65i*b@LJ6v^zHSG9!@S^am zaX3<=%%^UG^zj(!#%Mz#pJ|H)06POO%GWOhFUp8cxpjPYzjEEcyTU{r_cO zQ4U`$?1966?8IT8^O(wMT9%cxmeh^IHFSt2UYBZ$stUt^1{W! zYsl!*CBh!?K>!4u=7Ru248|O66*FSg8uJm|r`RBKv04?G(qI%WB7Gr*gq(gc0~Jk??2 zTMeJEBilx9Zjqhs`@znLPDy;61L(k)J-Y^P*)Lq7`fEb)lIT;ULnPckWP$OqD}++L zl!C1Y`xZx}%8|Mg2#aFDErXA)2mp~0Tn&N+1TEBP+l(e()$DiXJs}bJt>3;^*tc-1 zR1w}WwK8~WuaMF0yh`l`L(fV)XMh{_q`p=(5(EGu8&EfR{s44?5uFMbrZOq-7ULQGU3dSGQ~RII$1n*yq9La^%~>pcNYfwJDq zem5Z(95qYZB&AYV7Es&3saK?+$DFECo_=n6hUcGZ3vRwufqVq@ zXZsdM#L99J2oaAnKW`j_4B&vM;_bMs)|A;GCz5=wOm?(3ZtRV=W@OjUV`g^at~FN2Req5}6D{uk`yZG+!l z2EBB*YZagzZ!8XbN|mcNdnCbn+gV$~9+wEUr<}huDpquVy99iZKt4UV?=XCvO}g22 z3%lm&v0qHwKO3F;(Da*hvkLT(Un}!Qe!~(6`5X{l=BgU>T)O19C`XQfukvyuVCTI~ zrTgK&D+hNQ0r_pI4ymX?6A)UE9nNj&W+9Vsld{7MI2I!s07DAzw4*f!{z0RsZC z1+pjdYDaS))r`o^%5N-?@H?tfjONni%9WINVi2;bSQ4?-{0RUEj_9Q=tfdq3uxSGw zC@M!?!j`jf19Nhg93*6&TD+Vv5td2;Pqj&y2H~5Mdp115lILjXc8tMzDZe8b@P?o=0r4{#;!kK!+o38{f z_-Kz9+x9Z#%qMFD=b5v^exU%_OJ3!YpJR;d*@ChgW?_vo|sqBivirU z;3K=-^2 zQa~}65ZxAoEYx_xTk_h0Y_VtU#)4r0^7jwxwzB2)T7X2o>5R}f+UsxHihIa-A=UNT zJpg8^LNIv97{E9Who6TNmN%ca0OSKN>XoI7_U}@@&YkgMEH@<(}!peMp_OsIuu3wzIe7vlC|KNeU7mp0LPb&2^TC=&jAe9J+*b5Xr zO}PISm16?T9mNn#ts^?+#Uoe2rO%81vUBiI2=)+=JYGAIJWi#nOepH9TBQzGt;JO< z`xZ_WDn}0g_I%~@AH{YK_W1=sqzC2;LxkwEaWdtlfcsrkyXO|=0|ChB9nmSbnx9%x zhDZ;;52))4y$WzZ+EU3`j08*aQI={Lz&T(5Oj;Mr7?(xV9owloV9MQi+QssPi1345 z*R57y{p}9Xx?+4goW)GuIB9gY2zOU`CJL+f>!jGXv)(~ACJ4IaK%`+Q;C=v62}TPJ zUtOKdH!DxZg{7rY6>J>GM=p3CRUB8tQce1+H3nEnN@Ym$VDV~knCY$Db+xd#IHFTt z{GW}$!FbOnChqvoC1)v5-o`wuyznQu2U~xQuzOcz709#SzJ9pmIWjGaQ7#j%UMOHM zbhBzZ?^_&^DmsJbioutz5qRBlV%>(%&u^LCJALWY!3oD$V4br3g{(`t_BuhOw1=?F zptBvrojq?4##Ik+u)vF_+;E+mM1ETB;Mn;)AqkyJLK1qc3~=m0FF?o?J3fmMAdx+4 zR(4NmCWRG%-aM^#aOCk%yjynxWk}TI8zg1Z@%(soV)I&{5;)-e;#S;Kj=?mP%PYdY z&;u%>FnOMVIVnf}^yQToU)-`q0~I7iVR@@11i*U&=CRvyfXtcmMywrQ1Q1`2Tivwz zv?UbXM;8F`*y}0*!EH&HR4&O0bKBwo-{%96me{bd!ewxxmg5#DrU*G`u+wYTj{OPR zYexav3jo?N4**elBGAqNQRpqly6~r0f4)t*svvAoG2BmA1RBi_D+1JHX)D00>SK6_ z1f&=OQ15ykiwacWQLcmqLGhM^MHP7UG$jC{_XfbjF9~PFfiFXvzDHSrMQcBFw$0{| zZZ+&|Th75DQ}<-3wUJT--RB%IU9VPP;>xXCxMV&Cr@woF6k~DxkS;ga`|deGJ+r8U z=IHE`GUgc%I4GO3WP%M6bxfUcHYrPOSPMpV%8(=V1sAq`P;IM|2fx}oF#)#HLbgX1 zS+hj7I^ImDgbdyEW|%xibjpz@KeTekt7lCr*MHKoW$?>4tJk}}Rh8BpRSH7GdpKt6 z+8fcZKh)z4$kv@zur;Dnjz|x|WD0!S$_szEWb5D$RrOTnSyj2s5sUTfVm*~4#s^>9Q)yoD~g=ub`74rS?!|kHI;@Q9W%M27~u)0A)c%_ygp-6YvWCSt8QgZ z)u91%e}dhmH2zlj16nrkxJlRzJP$)Y`r)$KZdC1nw%h2oAbro8ak8kfl_OwqM5jFc z&>DPu2#8T$IRYM=;X1tQ24UCM;}ky&m(E``d(-qPc(i86X^r9sxGvWI!Xe!v)6pi8 z=_ZSu!cQtM}2VV-b6+l&OB$#WxPpc@9j{X zC*KEVMpVl6^>6N1zWyk%yB~hP+SB}N(_ltpx!|y}4KwO}jeOY^%5uQk0A{ZG5PaRt zsVXhX=_hX)(hhANeCSZ#Z%yTtM#fxjA|Hxm@Cug5dE?N5heLZ#5tbKDRiXa-7sl?Q zA^<%#utRHxuu@iEBONWL)f@175>>#0QYQ)KcIYT0I^{(I0-p32P(wDPt%LX7KAf-D z0NzNO_k*P@$pBh;ywwn^dOEE(`xZsK4JMosm9k7x`;`7;!uG*8Z-a?V>ucw(n|j~G zx5i%5ox8AOo|yGcgYWd*Eh_Zn%V*!D@FfNDF$Ysh6fKtor-4v?LA3g>iuTxdZ-qeRx2i}CTbV%4dxa#BT zmbH@O0r50dP36FMpeHFnJySOX-}?k?2u5|vi$6H-+qw9Y(8qQs)>NV`wDC7FCWu`R z2U`W&XR^hrlydVwfU9p*tfKC^26LYh9O}=3`bqn_WawZ7>B&Z%1uX1M0y&KIX*f8H zij`#u%^m#e)9S&&mvIw73gVLVbUOyzW6%-rfhUfN;fe3_4F2OD0kE<>wy4L9CGda) za67mjol)4&!B0lT%F(YJ0$;`F1Wvaxvu@$S`S5TGQn|(s>N2q2v4D0dtnGx_qeL{JR5g3p68Ga3-fxOPqD9fj zs3!L6|%+N6q@22e#nq+bs-WoQ~*J zqQTJ(f=d6b+GxX zFazy$t!;r*GXjxI1j5yJFw19RxuhsqRWqBEYwv@BGpc#?JnQ9y`|pD>qfUq_hY+d? zlMh)TpNTXA4X&k@4{2uk|)Uv zb`kucIhb(X`8Dt|ovKpy{xS{p_IqKz`T5ttCA#hST@9>l@!7Y-+V-E5bK|ToHP|b! z2XCCP2CN|3*DK3Jy-bE7RYCIQ5>y+WqQ2{)Z^7^!)d4@os=D)|whun^Ep>JCt(^;o z&>q{sL>nUJin@$$%9U=FQpnI955NnL=#(SZ0Q1~%`|`>IXm#6rqTz@{wWP?-c<>w0rFH^kiuP746F0@MNZrtj)N67!kE6=0 zJp`2*(J7Da*fb1L-8IXPqf@~s zchL?wENPEJg^dL>@A?Ut8PS0UW*K&4`cF+N4{s9A8a(?GbyoGPseBWtpEzTbwN|Dj zim2J`Fz%79>z;%i%c&~m$l!zfl)DMQoxJZ!bqL+yUE2?4&=_(i)A^je5;BtwlQqb~ zAp)v&jvh0R`jg=BAouFzV#=}kU;kz2vSsk%qpDqgZ6CZUnv05~Jh7Nc!DiM$56#iZqPjf#MHZGj1QJy|p*r&XEZFW+*{~6=ff%HST zF4DSNf1R!m9qyXhn*sIqe=;b^8kUru_BBFX35I74A}sd80&s|=8e}5wRDSw9@SmP41ed|e z`O5!&m)kzze=h(ZL6gQiZoI}un+{(pX7c5gd;S1DeMAgop3kBCxxvD#!Zo_(w!tF$ z2}7W1YBRlVx-ncxH!1J_Bed~|PQiZuqZQ@PJFrQ#)q3%df=9P3)S?9%H~3ARKnP>Y zHf;({z6J(Hbjq=>T%=LWef>3fXE?;KU8;_a;Y(Zaq^CuOx)NY*g)=^&k{K=v&6i-F z8Px$H;qC(iIPz@Pq0`l$egnrf&zj12fUbZ=J01;Vp`bU?hSw7b8d-C_4Aw?<%AjvEOx_&iVrWw_-;}H|8$#07I(h_FFK-wd&h$-3J{a-Qu?n5 ze?(RM=DEoGPTe~8LuIf2XTRJPSYx3pb%zTv+aY9o!)`FR zdrn6KK)D~A@UJYKDpjG^wKdo_>F0Di55X%SL)S?L+?~(=&kGaE_=11;?rYZo_5H@?@D`yGk3wFs-&(9Q|J7&uZ2x)g89v(pT^FvN z@4tGh#Z>SXQY4V(l>rVm2j2J&xV(Y9;jn+Ja(KnRxcRgtz&Bj_t9N97{{#Pw^1*%n znQcCm!Y1NutKM`^*+T%&4&cTDjxF?w&HE^V!SpA2hfiM`_)>hFV%_gQ(j7DY1zf5+ zyML1+T!83V=MU^4bFAJ+PDkHZa_+s-J9V!VE>=V&QZ} z)Nck?6t8*VisFx#`ey;Td*Qr!?`&`SV^fb#{0YcdW9llW&eXm&6;mAT7~-{PrG>fV zhS65hXIec2dJs+dH!Y3oZaebr;jwVX;C+-|bw;n5U|69IOx;$fQF=hP1DyBYS`eWDrf*kMY)Qb+nA*Zap5}Zp5+9&E? z=09uURF!h3DT3Kt~ySl2ox)zltz_7_EsBjgLAu=E&{Qqvf*G>A_8RyGKzHrZdx9)oGxo7#Ex)8H>l2F6q_)iWg ziX{!~OMh?!`TepWkl%AuD8CwN1+i3bG-8U?&nDkL6xb>L(G;|w4BpO9Im{t0TGCp%v^ktDrpR+sV9SbPfUfU@ z4&Y439?|9ucHfT_w_V!F1-maa#c_InaZ2BI#*t+fM`n~<=M4@ID{17A&3r!D_nr85 z@!z~?h(0tZfV(uN##E&?%dpLyp~TG3`1tPO8zr-r;I<(JjU4|uWar_wenNcKLVM&n zO0nA|39@MQM0^aK@}9vv7~7Oz;bc8T+jARc~!qxO})6g#bomi77SjagsB zC@gf_*g;G-Y$64X9G~92V#OL0AF`o8T#UdG6Q8x6;=7V_ccU8O>UJ1Uj$G6hC@Z4-OQ>l3C2?l`-$(%H~p9o-`R+I2T|8F_y zcOXdn;yp@ZY$b;5^&rX-P+65}hcWA595VMgCxX5xXi%p-kM*WO$hSo(5A&={e-*F_ z3!E?MDHL-pL`=z7*&>ft6f|<|=lkSm+sk|qX(tM{RJ+RfOj=~-ZkYoGc_5(>zE#j5 z0o)|N*6uoH7!}13hBK}|8pNbXxi5Ua8Hc{04*{DiSzKt5!!_KfbJqk%hLn`M&t%UQ zAHRm~HF&i5sjgo)FyDW8aH{W_jlbV;5dNRn(|a)6J@eGfR66q!cRpa#6wSth*&8ETp~xr_cWzNq%OC`Ir1!cWA_oMeLDsZ zE)rcCUD{TyCpfn0*EOf6g8_e0YUlPjw4iJ58(asf_=>?0y zlF>+?UERQE3L3e4^tMUzwE-9aJ`bZRJr^PTymT%AbQI9DE?Zg?_GbYYj4P(^aoHy;$b>2j@4;9{-XlgkuG)?#=khwN&Fg1%TkPFyX}mUe|iTdS4ks>cT!UT zeUxu{C%p#sDaL7KQ$bInoO3Z%Gjw0H6Yc9ETPSGc&`sAJ5aA+fS8b24+xn@2(f)mX z7f_Fxb@BB_2)2*;w3~Ty7IIIV2Z3SKBIG+2mJ6G0e8T1|)9BYvZVc|&xpob5JdS(dhVSgV`V@%^ z-V#ckHwU-Cu_x5>So7sr$6Ss_;3`s#F+QPOBG=p!+;x`5aIzcC+EvM+O{!7Zk4AS( za2WYLP4EJA70_j^x9BQ+D{y}ia&6k=S)*%Gkx2LbW1^IA;+)&4sB2A^<3fyyb;_j} z>ng;GC8YO`m&vp55AGtx+k#uiPEkcX^qCWX+x0r?+rJMULo_Yoj<~giT)uD!6yT^> zOqbz^1oy~PTWapAJG#xSSq1JiA6xN38YQPMyFMb7rW$TFaDoany{x?gHygFLW0#M# z_s$@aj;~n-c`#<+TXVl>8~Ng$LGvkAY4_jaRilu?B;jo5>Co4)CoPLbQH@Y@xhN&S zJNlkrVA~t(2FC}q{l31!x;J`1x$#}=$%$jx7mLF4q-pKmKyeGwYG}^Q;hExi6BdkzRAZ&ggUZM&b zIiCOTt^#3P%)bwYz%3`wr z$)8P$8$K9}sJ6AtL930enP!|8o-?P?9I4!gPn5;P6q$30|9u~{EW>K`Y%|W5W}20B zHmGSPNbvsP!M`k3J$tFlqB)+J|A=np-)4npjfTtmHhUn zPqC6R*ZSn6!7K6N2jT*7&U_7%F93EM#0`(uil&BqEr12Glr%FUa z#NfSqeFT;PIW4Da#>qz5O44jti0AW(aFYHEvWkBOPY5LqskH^_hy2-Kd}pvkefVO< zKpUA9khKn(eT6`qo{oc~YtqOGyY+8R!4{U8_vZZvmuCTflt9y=`UGba%9S>h-^f<# z(GtUB!O4-esN|*3W;inZM`nV2;jvRrz^=~+Kk}DHrhA&c_xUwW6VmU{T*i++9t>{x zQ}set<;Mf@@W!9^T)1Hi6{`$TqF;G5i=(=!`;t~}LTP{Aa%_$LNls+ndnwuXIbW~% z$}t?i;e;i2wcsWj3*+CG89vBaUFv31YR38`wz`4_h58quf~8O3k31Pfnn&%?0=TECtI}@gbq+u4 z&;|0Elr!0E>&fP)z&#bk-KUfI`1L_34sZQZ@SJTK-9kjiSYnQLi7Tk>kmiql35Q!* zOb$cg19M%FR}Cji9*>8~3$gl)H)i6B5_|jXmm%vaNQAld5R~v=^^c3EeTDL?zkrqN zUh(9CuLcK)l{E5Pd~|X-#%+YW`(G^=k)dmY-y)lzfvz)lG`%u~%B?RSi|8|J91C*n z)zYQnqt8&r=Ix43>%9Hf_np7-ee3_emza*fcZ5Fj&fI%*kRXAwEIzGXPHCkNthLBA zX(b$A<6jRV_ZNXSR?ZyeH+kzFwlZg*%TDK837Vev2iPnB^>r+=f<|iP*L31bH(Y}3 znGb(67>9J^WZ}h&W1C0tKuqmJ224-I*^!zsd@BeK+BK_?zz0wJYg*Fnka7@4z#{t$ zq#Umm9=@y%xZxo+-G-y&ng4_kv33=5ci$~L$?VZfkWBCSQ>sQk_&j)+m#~-$$xBzU zr=|T4HORM5vEOAWg8gnViZp2O0Cxn`9;*}i1cSvG#8I&NymVwf^WEUk*eR-z<9lxX zUm4oa3&HIW=W^{>F^8P)z(lZ?7%v;+yhTXy^wPRvg5N;=F9Zi6KCV#>;#3`hjz=%S zhJWFd)3N(|;Ao0dA|Id^zlYa`g48`g;$5#Efco{(?}Mv_*9};a4zt$x;f+uC{tl7Q zVanAm>zcP{Y=!hJi`5FI0F%}^ta*(`ZLH#5bR3KM$)DpLqNL%G&R!-Cyh0VG(?^j2 zTUHJQY=#aJXS*X)2*A!|AXFZQO=xu~Idr0lH_RhbrL`A^>!WM ztKEStzKT{>lW6$r0kW^{-YdTRDjkdeXm#aXmMiNsd5xjAFmEfwLsPJ((FOg_pMuN( z1?fon81zBE*Y6UIKcml7-_aSgBfS&-af5S)F_i4nQ{|@3&z0%@dtg{ujO>K(?0Vkp z5_3PH3bXjpGMJT=>sWEzC01}?O)fz8J^#xAQTzclaK(>S(1avkX42uZne)swwT-&L zKUYjktRVavj*x;zj@|c3Ts?1Y+$BEp8kqO?&bom*5aPbH@pUM+ysFNigKnTCHjw}5 zTfXU*ljEs7k&gMde!PYMhc2GyXlrF31-Y=TS@-7WoBE6+3QGg+ z3JJY|EwGwIEex{P&7*H%=_Ue4n^-z&BbAXxX@Q;22@7?5J>IFo>WuC9i4!;xe?dC* zDX5#e&~RIRCFxJ7JG%75pHXI9kh=5c@1Sx}(BKF7w5)r*_V*YSRQS{#UD6xI<6LB( zsUrZtk}Fukv+@x=`?qLEK_kcQM(7P6Lfr6ezr_K8=7hSVOXJeTGhB_S=e2HEh09G9 z64D8|;dKm5NfQsh9=uUCu02Yl86>Hp6EC8a05 zijTh;JPb_*UrJALg>a&3EII>zYw4aEe_%*aN?mE7O}LJ^i{`=vs4@&(90K$z2nR$O zdmH0L%o^Un_>XM!EZ9p?_VIw>2Ly|7LWa+xzcUnGyVL~*ePoK)fmd50iIs{ zh+Qh$p&Y?gS}bvKhqD6{B=V;J0PJxZRdDsMRfYN}B6KpNpCHEu_)|S!c5lV#75qr% zRj2DYR&z2VQB>=)E&1L%I>ZOIXV&qBRw52ALVxpwN}%J zsebh&fjiM2@^_>BpU6uu2hS#7*vaqR>szA16Vkom1(f#`%fLmcF{N6rp)+%Omr0XqyBiIiq%nj5H8P|i5!KO)>2TRSuPth9!2*4P)YUF@6g?Bff@I zzP}#fCvbZrd_=xI6^BkfkKxl!aUP}j*3r{=_)FikuKyqVzP|C#gSHLl0HNWgffcJz z8Gdd{{VVHJ)0fn(OeCAq>r8V+p)8%KyUyfy46Y^-)o#ZD0&VsqVgm)rZy+1*{f5vwHa@^qpG&?{sCG^N5GqYEG! z^a-)gXw-0;ldV>YdK6XzGBXt6I2 z+;u*`ZE!V7@`qXpnINy7zr3xsUw}4!OTB1Qy32i5E8pZCoxHuusgb!!>aR}E!k~AO zkfW$3g-Jc!*sgVh)`4sL-`;nRYS+epS^ulv=ROLNPempee(N^3 zF9|QvDSg8?V^o*gnk2nPcb%p&p3I$-rkE-Y=sJiWc^?UZWFBHX&=E*o85KhtUE$g?{Bz_7BI96A3kugL4^S*{BPLzc15 zSt>L7M$-wnh@%F4qAaFvS{~70Zu%6t_pUq6 zAkSW*J%h&ce`h_}cl_5I7XvM54LC3GZK0fiIAKC!Z;xh6&)%L(*F#=`VF&uqVoU=g z68xHM9MrMpoe`OeS9XAl7d>hZYIuY)MM>xk{k=@p`UEHA?Z9!XXzO^b<&w{8FKoPR znc7wIE-JLVTRth1H9jGPEa8xDtiimuSZc;$CE2=DrgBtdgxv{0ngU=&jDd!@xphjS zddo3bp*+?gvWmx=NEXP&U|ZRJY?+E~wLL{o)7vq%7cpWOt3s{4UzEuuZ!t$@N_AW? zwS5i`l~A>+l1weaphlCacj69vF$QFeSTS7eajsCU-V(Gg+E~S2q^2-$(Zp^2u}m$* zDwt2eJa~%E7R9@OD7~295|GLHcrgtlSFqp{N>IgO$^>&|?B!*uhqdF!18}yp7eFaf zEr!Y_QIYMk6NG^a3)#WgI_WaT$Mk(?nd-ATv2Zbj&D+Z!)>TG3ovr6k>LO4++TJ20 zR5k|RJr^uyc?6p0*pZ6-aTCVFl27o!j0ktJN&tu$A#P$^rotRng3cJvf?^uo0#=4K z#P)q|nTj7~eU31O1~;=}xQi=tT0y45Z!WaRVltq#^0eT)SAfE%wc|ON3^Yv-dY#jH z=xB?1xEeY&JIl*dx(L{e*m5Zd{n!nNyWe|{OvMs;u$jXpZzO=>1xs-N-i{rVsp`1Z z1-n8R|1H9uu!t8(C!py+zD)LFHsBnGU5$8o!G$&X#x45n^_qxlD$MQ{#ndpDM__f=Po%Lu>1A-lC>p zF9c#p5$=DT65vQ|%z(TQF4#+8;f;7;LA1f->BROev3<8r^jxZtzn%)B>Uc%*zahl`mjJgNfy|!_)G| zT4W$+VVLEpjT@Xv8;gWXgKx@IO}yLTSex=IU&M+3cNO;hYMF}J0`JO~Jc7OC#c^1~ zQ(Cj>GMUVJaKi9ocoBDxG+xR9&G4^fDuZ1K^)dKPCtX1E9iPL=?4FdVY6>6&Ph4Q_ zhFB~_3v<)yk$ExQ%XA^~SmrPc_4Fxk)2#cSy^CEoPan?dO570wyh92*FO35m((ZU( zYT91$P^*3gm^Br2iv?0fG1eYe%T$bma@t%65F9L;?ZmACW=!Tx_5y5p7)DML!`?y{ zJMiGuY+7!)un0Xs0hm7>Z^WJlw}o24*4*%EscAF??Xb_9Vks~7c7QVh*0??+Q`@l! zm>o0#;G>uiCt@MPh4u1Dw6!spg|6$c0IyuIRs^ojk){1pZ^a5F=I6T1KNta_d zmJ>1~w}G3)OYw@U2%{iCFDMR2t~D%ArVW@qB`7dld2Bfj7o^7Lh_!ZpRqht}RgCLW zyDSmh35tmcw@k%G%wcZ@aT2lptcx)Yho>;~&Sf&@g6i=V+3 z4U7LQlc7bhbv&#SAEHW;dWr-(#lf0zzu+5SlVD-F=3zo`)X=yx=Mf!>S zZ2>?n9q(cXY^7)~#KE#-f{EMnqD+R&5rYik!SyGrP>S|qpTq;O3Bit_Yboa;2IQ$1 z3AlA<^eO4v5^kI{#DF+uJS`6!#-THpwsSHS+m3qV;GA__`9&yfILi6Pe=d{Z*&POZ zz^LJ?;-NWg(ECl&4T8JYBa~XWJxZQp3T7pk#;vjD$g}ddEVT<`#5ky!=7vLY;k4QC(x5Z5{k zPUW2v<3eUxFktWu6PnFwFefmgrCVm`w2W!2!ad z8@yhoVihr&5c9e>A_5<9qpG)`w?f77!-2y+O&K~^lTcER{%DyBo&gC3x3P5*_m%@j zL9m&gE6GRIp>viT0L*^2d-4U}glv z@f6DdZ^C^6#=PkcnF>UA-10a3}+Y8pA7Sn+s! z*vk8;)7%wkM{=4|K3uzxTHyF8-n!((@5Z#^OZ)afKOHmkUh-!vKLD^P>~<@jwb<<* zs~J)b7%tuov@c`iA{#$AvQ`zM;=j7$L3W-#A)I}>X6r> z811umerR;fD)@iRwhl(&i}xcoe)%3IyZ3LQnY?pstG&Yca-zuv`1 zcKNW=aR{*$aeISLLVm$hFkO}&`;WQ!p^>$!z!J`L|C<{jrr}<)XPV!#3kF-95D40k zFzM3?d=qm5qrin;e%F}>-AU@4wX0Ga!LpHI(93Tg!zOQgz?Z=C!01CTiDSc8g5&}( ze_-d@L~>%IW7*E|Cm%nw^}vQ*15^F)>HDVYx{beqneFpVxPC0{fhJOlo6E$s&IZ@^ z1|8Xstz~tV$@KxKAe6=A#FutlEdCZIb6gZnGQkCqM%7QyIo(EPlTwNCB6iZ23d8Q2v6Cy$lmEKyDa`W zyV^ib&tNy76XA!3l{6A~YW7m`rU(yc&IG{41-6qyu8vBw;SZMS9-SOg6cdEIzoox5 zs)qTfI>WiFZebyWj28&WrK>q%)SetwSYB0$>@QgkP%G7bI8Q|RUUK$T{5ji9Nj}(Q z4axFMMeSs=)dU^>7-?U{4-F}3MD_ZO%)KAGWLW(6RlHj@9$p&ldz%bq*C_}5H3Z$p zI_h*`9$pXEVCGjBlIMPU{iWg~*YL2k2G(soGO%m?$NCS!HTT|if!;rp{mTiOi^?cu&U!JliV)HQhI(#8ZZCaqTMP&>hdqw#CQGr)1E(D*V0UZes6y z+ii5ZM=h&&Vt0E2KcxZ%`DzLr125|$-tochv+D+(8($wN_5aI;vA*YeEUH=R4G@J{ z&9_7$G$h5o2^&SD(ai#5Zq8;yoF?5Sql9b1uBM=oyT6@7P~r=ZY^OdHyT$i6dH6s0 zmne*eq;yaCkPMKGrMzw={g_Udx;uZAT-!iLSJOx>^mk|9`=Ki)#4k2@Abv-e_5oN@ zVx2;&Y5(cou*n~?2=>2z+U zsHtUL(^Hlre04eUUTVo!6q7@JQw(`j<|;%(i*>`U*Z{D!>Y@c*xxF`7;hiIu$?cU`iDjRRhA=Aj!@=O}gmC`nS`}N=^3KHD=2PWS#H~3!_Cdm&M`7`=tP~wNk z;6C3Kz!L_%`f~iin#=Y58`oYg*_-#%H&cmBAc$X*-RKkxgY}xb;S}p7zVyrFEh=*D zjlB2Fo3@h>PUU`yD?yNtc=7IvL70a}T?MLXhYh~4FwfjDhb!aazu^bLnbxXC5}C9A zR}W$Ezz^)_mpK516ovW-x~mi(me3Iuq4u?!n&fl0@RJb#{*nrx$4_yRVcl};DOul# zZsn<8a1iryPWR|57dJ^fx2>_}vP-b`4(eLK!Y{c(wZQ@O%|vAzs;N?wf4GC61Y=r@ zDtY|2HvT7>p<_92J~l%Y>V(a&tml~qdO@cf33>ohHpQ* zOA=L|xbu{paN=*f(}B>k<>^>UOc~wJGFrxPvfQc^Swz)~UH9Sl@WRmG`9K!Bx$j># zzOZ3a533@H{lAM-&(K$aoVWBA=1VIw%N5y{7OB{+rP*|bJop40X!;4iWB4yfs(*d- zaVfZt3eYOeB zNGa`!R_jURcj&hD$bD!_K_lCK2!Dkx)X~U?c*N!%Tp1Xy2EL=QM3T+fRuyXNywr;J z9<-vMk;5;%PsVAy_a3yeH@HO6T_pDemnqz`GEE!9x59iY5>H9(T=@VdNJ%5ArysZs zK?rDL0v7qn6^p!It=5?5EUhVDvt;&60ox9fbLZVK$F8P;xiz~mUgP3xchh)HyWNG7F71K;TX!vD4`CJ+w5|i3_~1kQ z)o_1YQm-`8X!<)z#_BX_r=n98VV>Mw!{Bc|j209ma(r(5WK^1;9_HbV=UcjP#b(}N zrnRlIB|1Ojj_cb2h|+YI-TBWvP-j+?2m&3u`AEmbU;MMQ!zg5mBvKe{(b+2FFQiRe zt}&%SJaxC7fBiW6q@dBDYQ&yTYsSTiPhj>YrkCD^?noibA-7|uq~nlWY^H!@fI!~t zo}Ev@(PA};FcH9{biGXf?NjItm2l2~t2_B=PnzMQ#YVPe_msnUAklVy{7OnKwW8untrC>N^3pwxlB=Nq5q?hj8>C~N&FdX;pa!k#o|XH)C@~nl91%j z9_qjTo?(w;f*`(9zBm;fSnk}d4@2Bg&}iqV|9J-f=U0CketU?3gYp8JK^klZPdP-w zK>?X3#~$T(k)M1Tij1{th!3AN{vH+Ccb~A4Jn$%<=v1o+JsU0^m;;K`-Up=^WN+FI zE}S)~;tk*Z7@jN_d_dR;r@bpz?p0_+p&^2a4fhwUBrr#Gpz`MEe2tO+Si=1cJ@*<_ z=mC)-|1T9!d7s=X@)TG)4(Ua5SzkT*%jGFk9a>tX{s0tc6 z9C-GvaQ89sl_w>3tzY4LaYgP#JUyR)Sfnf_ri1X2rip>bLFd=qQb_)LzTz7uiy!Gc zDCrR{ev&_ZT({EALO7f(a7@BB6H;d@(>x&Bp5RCKX&9r1J=t+aQIG8Z$s?2G@i#m` z4*MdN1H4OGv?+NVGR%xM!Wo)|XnQK{$N{;s+a^m>)1R#IP}Gy5D`{~2T~AAFmZAVj zY_=U}8WNi9oH1C9^U1bDFY&djp8{V~(8!6o3nWiQ@!y`J?dX?)@Fe>o*=nYCm@!%T zc0+9|+O^$R&M4{q3YJAdBdXX3S1?j{kYBuU8%-lEe3Q(674BDtCEzs4UVUmV;14oY zi^Ee-HJo@=e)OyS!68K{?#>@|0f%>zD=xnEB69hqf${Fc=a=D7FFEHK{_JgqRKrka zXBOC8v|5|WIb}Jc@eJexB~6OD2JY}K@*kEn(X+4dzuCTF-TLn%!;Ze6S8eF4^d8yx z9)ef!e|AW7&ZIpFPGW$UJ;x6YDQJWt+AdVq9`S?E(YKYs zT?9z%Os-V7RMc%VkoZ1}*XqbOFnbCT+5i5E93@}>23>{tl6mF1S}}xyHBr<>Ebb|9 z-d)j)I(>wy26H{7dE@ju2)W8}-JEv=O zM*YbfO;L>;p5Ahqc-r$+q31O@VjL53&Z&dGg;>U!Be#DWCreo@MU4%7hdNIM)U{%} z?$*~su2fsdX35NV@pMy^O5Rq#{4PG&mNc8ZS*AVZYpI*_oKV#f{ssJovY2MYp<$=C zv*7UgeZ1e^{2un%bxW5*Mv!oIJ5_(j&(GFvChsg~Wpl*vB30b2DkY5e-BaSx7pZ4h zuxo5s7wo^OkKOpe^&j6rOxrf^Ch8le&O}fb;+5q~RWarAa-7cS8RN;*sHoOm8To~K z^oP<57olu&n+vJ3UeD?+PG8z$&iO4#GXD|=tt=LgymUJBfY-jv`_8;+2g%?%IFr6^ zVde%R6YQ|?t@m_HaIZ?iJnSI{e*~@d+C-p|9QdnmTJpe;`Tj8&;E~>tgX0hshcG~Q z-8rDp!tNO*-~2JZZFJ2VC+V~7KRM;C`*%OVE6zibm4~ z|2ZGq0Vg9*Bwhx@5u}Ok(nw&N^K$Y2*Qsm#l}msOlG`X~ zO;MK3vkS#kRGkc3@XG8*8`qow3sTTvN!ZbidL0-4?Sy1Wu&uB%<%Uj@jc=^6&q+WP zyh41(8{l9QktO#^UKt}ZmCmsC`Px(}CQKuf8b&foe*YWvLO~*jFS+efG5lL_tzlrv z&)C^uq-;uA>t1b#eBpPva1^Byzz2XrcCXwJ-z1hlz>Hw6CTuCD(Od`_7Cg~pHA%-l zcAC-1o~%?*)FOe&Nor6S5`Xmvs`xWI1q4_I+xhu=RvT+i!+`TAm_iiA5LCCw`ogdM ziGCKV7n52|bE=`OScS;Eog;=fF<;7J>U;{=?KiF>E-SbOE=&>w!i;3I$N6_CCMjwx_208fg+>4rv~ z1mHk`qeItj5>CKsPWzVWW6jzG$7k&SVjca!{?f99Oc5~PnF`ku6QcBOaJ31->B^?2 zi#JNXyit%qGXAm(QT0Tp$t9bFQ<+Hb*(7{q?M;CL(T8bSYbz{UAo>ORItas=CWmnO z06d6d@DsqZ$Pt1GqF;a&W-ThYd+Ngf;|%1MX8O28%BJ7bjh=#=MR80I=M!*;$XEFe_IQHAAu$YWZ0ATie+^za^y}x^g!jm zN8Gnv00RpwQM@kcfl*4R-FY^W30BG`w>8s&Y76^dKg&Tsbh715S&tm)*$QojO1o41 z+Ngl+p`IlQ{v?U+kzAy1Qfn>KZ9T8$fehZ=TYtAh*fzMDM1jG(nxHZ9Pdfx?%S=lF zAn{&}yW45uw6XazYiHa@4(^QC2sf#Il4*0#mozz|=$IcQCjIK!pULOyX%m;*7)xMiX$=vc8hW8oN z^zb)>Djlu}H1S^xqG-B7| z-zd4}>{G0ttmI(M1sn53!qi*}BeDmv0PtIfdmB6}VbVHRfM#b+Dv~cY{;Jfuzq&H~ z4xGCxfLO5tV5A6qmm(tY;omIX`=0YD6JN6mIq~R|%eK_>PtD8TCQyyf%!J#C?e$#HtYbDX^o0uF^FN)OBBgXO1;ow>lF>t z(rB}@v4x683zQ;yP{;KGRH&*O=j0TgA=H zCsO2Y2KSj;i!Lf?k9P8APs46DnxpPSflsFCnDA0tRZ5Pin69Z{m)OJ7IicyKr8%)^ zpi^Y>oTC!eBU2r#k>(_I8STbu8luFupF?vHj3CLbAgP1j!h>T zM-K0w?FNhQ5`S@tU|F^iRM!oj2awY{`aX-e*O8tpR8?{RFHesG$8!m|SF#ekqOoQC zEbsA0g3VamkxO)s#Xi=cH|kHm(-ifH>W#xlNr@Y6!Y!>R9$)f`GF8U{GJMZ&=3Vj*vowNoxLx+GK68!DyvY^yd6^NB7polg=xQ46Y`T z+VjBqgPwn<_<1kp5t#W)*RJe$b6TA%)|(x*gLPNu>e}wQQlN6fDiz!6YJ_>ph9+MH zB*cGD(ery0?kvgR9xw3wZ!Eutf7{u2|Dd;DU_!z92im*lM`PyApzTyp>a_N3PA5nRc9O) zHf1h%iaJA+hj&=_ho9y#@d_G2!UnL6>#yYFC=ASz;PF24G2?)uPFItL<>Q z%u07kA%b=kG!i)U!2{yIM1(jU0hBiKRA-x+e1@y?Y%7{%&3fdt>pn*>iqSo=nnn}b z9TcH!zDl*1Tf*b&Z;ZROXF4r;vu{Dqm1muC;4tKD&J6j~Rgj+suM~#2{RK_D;7V-6 zOBwc}gE>DHc1rxNb1H;N<7#`nqj;OBFP2*moSTfRy=cc$BCo}7c zd0feArwKnONQFE0Yc4=W;ggXSmGwyCCo>1hWw(cSh@WrL3uhs3i`&_n#ko*3q^h=H zRyqh=8@o?IBPZhD#3A|?z`)?NAjQTC@WPY0^3E;$>whXMdREfM>T7>9RtF*!cam=qtpQMiVl<<832nXJ~6Vizh^ zW^OKKniF)Sb_2dv6qCabUqWvgwpaYx4RmGoOB7Q@3fgu%Eeipzk!@OxF+&7qGTOu_ zx$tI8i-Ja;3v2-J%~|ss#P-bsg1@;Xn$-2u?t*4xWGitq?60G^D!PGAX`%D|W%SdWquX zXm@j9M8S&D;$|%irLZ>TZ<$G;8QMXDw+o|yr(8vu<;2$Q!WAkNLq2E#1@hd$D`PSiP5iw={}_v4E2wT^ zg~rnikxh8r(V#=Am3O~a*fF|h4f5Ri-wlgjc)Ana9}q@?KeGnCQx^9>vIzjV zu>K>BH1b!|%o~W`q2Q260u2QmA_0i=KH;pkfBctz?9c7uOEIrrWxzb{!VkiaOE#xTTbGoKR zPg^`NxVjXmnPYguzU#`};*FoCebR}&7@KtEG)tO-R>K8#Tx2Has~QZ1dkSMy6q6&z z$pP`*Phn;zG-3~aUc#qoo;Xp-Q zkkm^5^q4R*lv_;#Q1eTZ;x8T(Ov_UFm)8y2H`zASAvk@b=fj)#sJ=|4@=xQP;}f^8 z>^)by9-3xCzG`YdRSOsa^7|~NW_2ksgoiO7RINx z!)jX7PB-%8nPV8FqL>_cH4dOO{pQ|#|CktsO9Psj@QHnBM%ud(tH;Z6R{gAVu4%XH zq9pJvnCs8JjDadhFqtDO`CYef>%BJ^-6^`iLXSZ}q(~@Ij}le0vB9M01*BQk*ylJM zz2L?{b3 zrjr}Q&3mstT?Ghd>?)l|5q_jb+J>B0uhE3+&XTWG2*h>d<6p&uD~idXC!R$LgB$02 z#TPeSeVU3Kd7VHj_g^;f_AQ_5KREEd{-Mpk z-TeK{U)p?R^L?9d+*};^#OC1Ui#DIJxxepMTm1kG`C{M4``$b7dS3^yA?`k|Z@jN( z(<@tzJ$u$$Hhp8$=QcgG>0O)V*YDVL)h6qv^S3VEuxVuD|7`rx`YShnZR2M)KB(e1 z-nOx}F}BgP{=ALntbb+emW|st{9(fn);~1xUjy8RuWWd9!~Gj>Rz0$zyg}G-$@;ks zlN+}7zR~;Q`p*qKq544&+xt}Szx0ycMb#gBbG<&*OAOWLPu4qmjlWd)Fan?BY6j<@<@#n#mQyd9THz^M)Kc*k zFMdHHq&-eQ%hXEFqBpsaa^^yxk;*gP1t(Kc$EIy1t68TvPCX%&M|d3+XPsFca19dL zmTsycl|w~o)zr#t$-q+V5W`enDi4>fa}2Vbr*k$(Y;mexbjTx)rhum8<)*v_btzJ; z7ac#AK1h|?^ITmYjye*4VWClW{F79ksm+_&wy9N}EzdTKe98V*sXWotW;6>HHs1C* z7{YLv>;dg~NxNhDIK&WyeY1fPRrJ&Sazvk_r|ooCspRG`|iW>S`;J9{ofc^qIV znohPj8@8G1X4cXtwUe{h)tao|s@5iJQ%NSd`?pegI5($bctgOLYSlZI3}Y_Hzw4{a zGY-MfNKyaYt9dC9jP+aho5`0lzv(!>&%l*#+w3KyM(h%S@!5Lk$XH;(9 zSWa?oJKqTyix^aflbg>p3&DWCImKy!IiA#9_AaSUHZ9*)uFmJRQ9px<_L-`_p zHWOLkSk|VVHl`hRvqz`iB7YF%IvQ7=wYR1%=7c$a*>!TcD?G&pP3b6KsLZ;j4BKbr za%;fP@a3e<6>x@%#>`n0aye6tAepNtJ;g30_;h05@1^0UXX^gNSkch&C+4%6V)3jC z<#LUG!55v2=BG-Ts=Bo2MyZ)p+f-xpCWf7jmyPjS;rxCVmIWcBKh;b zEH#swZ96L=lS8YCH<}6E<(JFVg_?u0Cml_PwY5-Lj2njTmkADaRZ}hNG*iwh)$lRMUBUxgnVmBrA~wn_(G?KIN<0Vu}4fl-fzgeFdhPm`}wFTGzZe zvH1$AKgoc>lbzMuHMyX%)hLZTMyoGcW|O|T0yp2#7t%?swH?*&3Lu7LQX0NW~i0Xc@}*pF09kfHL_biEfeyok|x)5m8+(J*HXyr{;bq~ELG`fO}4O> z4K5@#?AuwC8QugwdIx7YPp&ra;vgG47OGk0x@+R2}s!G^%#Dx?SLIkXvzi%vEbD zpfmcjsj^}C0{KU63mMiJOA8gN)-@Y4UMO?6NL9^g^mCQjwyv{~br!cyN%bSS#d(%7 z2P`aW$H9x0hTkU>;yH_EX4bzTxU(AVRQBADO1~R%HH}7-)5U5`^NB!lzbIE%duKG^ zdN`2NCOY2v{J9&Y@^Cvd!`hn(s^XL;ir9 z6TCTRq}`q|hf8~ZEtgMMw2W^$;*V>RjdZd!p_9smPP)caEah-DQRq~svjTE5@joD>F$dhG)Ld!IjaFpt<)J3dR&Mz3f ztd2D|D&ASwlryKkS}u?03S2G2dS*1`P&}93EU!EtONY5y3W*c68Y`ql^-j6IKWov{ zW64EB5~nd#F|L;{JKn1aFdALcYW5jj`cCGGw)}yUb1|m*IWKSF7TOKnX8E?}t(hoe zNwzq5EnldqwHMDx6B_J9gRHKY=JJt@Rvk7zFBi{w=2&g0;m8|}DMzMv(Ic1Foi+Vb zQlk}wX53cXFW=!{_jRUVS#X!8L)v;n%RM6XCYVmu8GXSS()$IW?Z}_=cDdZu409cu z6KTP{Iak)O+a@(1n4K|c=cikRxmqmjDPH=YQuTm)u~FtSCTA}0vFi;U&2D+01T2X- zTaA>w=60jgnMtZc(g*&mTHrF_l3wdqGi67bm9HHCv=B1JrZd@&-dl|`#Ygc@=$bXNfZg8c}|FI^%`aZA@y%H#LVx zDpT!r^fPnzN@lw#wWA1p9G5Q~pFv$@r(4>#KEo6`sl@pomYVVAa~)0Cp0Ah|OmpT? zVc)G|i(OgIYpvQCU0CO^d1CHjHb45J`~eFu%uFg-w#~QlVYhBzL@Ed3nUi%ntLApI zI2-UM4MnLOO8NrJxYKi)kiC|(Ck}3w%L}s{8_5TA)>(b4R7_qmE|mu=iw(5~ZbX(; zkQI_GZRCXf17W90C^(Q0xT-PO zc&nZ%&8Nd>$mN`?&UhPTZO9OaYl>O^HmN+2;iuVJ6|3W~wX%^sFLTzQIumB*b*5=I zBlv8!a_}2cecly|vBu7fIT&BCSK5ZfU{oTc^#xAjak{6S&2oFXn(_ZpDo;8S4C^c` z7<2ik$Eq#+^HO<8)39*C8E?)TLAU{<^?gQ~hS+Gu&L-bG=j^X(kzVdJ18fWv#nhXWh3-<+;RknMsstopvLr*3B{QL(=b-GvQFy zQE0>#ZPS5}H{-les$WhUpFT8$KYH2g>sd z?-b@d4WpwGEvV%US~j+en)!moXbV@P;Y7)PoBX?6wms8q%}?c9mL0)s^Thv-#Y7h^cuE03kG4I`QneH%hJK z%HFso9<6$#08P{y&Kbs!UJKDD$Iqv@oPVlbDp>5METj68)SH}drpyh!n9^YJo9Cy@2$H z>9v-azA*=H#IEAq@OA27prDcGo_ife)2|Cz)wXoLk*#PJTBhV|j`JI!#ry3ypeRuk zQ#Bs^>|PJ;5{uuYmT`?Zik~*_*2BaR6ATR>6M_PdDKJ)BEl;wq2?w_QMX`AQYxtC! zSv^esLZO~Z+B4eo&U3YOiD<_gZu7Q?p?T>|I&ox0jgzS}^YfZYs~(uo8k;TFNWStd z=#rGhglR?&ir+h!gDR*CQ{sM}8d}92P%24=R@PzByF7D&U^CG+I8!=u)AJamqV%34 zS5JyBJP+mI1S4+8w-~=={u5iw_R@D-lVH-hR)*7j|{YgD-<-m}lm>hcFL23un_lmy%qP~O{$6Pe2 z=|rn-lPO@P8LB?<0wzFNOmq93EpGlEG^2Z@ZRcONem}O|d;0%#^J$wh8;HbX$@L+q zorB^SR!Oqls;&A+8*p*{n$r>XyBQ=oe+ddRMKL-4Dk7Wr{e;;lKKl~2@##dMEXex0 zsw3gdFx8;OXNVL!4S$KG2SadLSY1qxzi=bWd(S_$QG9YRbTJf%YH=^tN!zvg8@RgN zHy1T|%e8bi1p~n|KZ42sf*-;Rsw9ctA3|>lQ`>ugB%HU+7)|AMjLWJm1vK&5xm1~c zd0;-X7ijgkTd2R^Y#R}c>xjhCiu1Q04br~%zb+k+$LT11KO-SuW)1s1;F37d%j*TUwpSR@WG zV~R~h;WYtA*g-ID1?UrJ!peHnuLWe(T(gFF_m?h43ZQ*|5c*DE4=Y~+2YrVJSd0|G z(n~>R0GEdhT>#r5)n5y{N#{4z#P}@h3W0Kv44m-^_#PUUmT*5pG)XomM@J)1UZ7L!$^73rGKeTa#S=aMD zcp<!zb7Gtz+&sjqSaO7b$!~v+K+?&twXEP1IvfPw~_9jG62?CvtmO zZNTUirQ~=q2~VBz^}XVm8$(y9#&zOZ=(XfPkxK~+t(3u*Ht1)x#u?h{5%RuGp&eUS zQQ#|mEi!Js@u5xP%bP-%s&Ijxi8kcE3$sAg;EK5_{5i^v3b|x6CU9zXDPnzoJt>mS z==Qd7%;cWsnz}?bkhj|!0hYYcADSFe6q6I-YY&LNEg|qoA*a)+@ifdQ`9$8Yn=eSW z(c=S{9tDjYxqAYcT|V~VeKM;$cQ7;|``H~{hY*OVo(8tnd-}iC_Y2iwYSFtLRw}=E z5{ARHKbX^)H8Ul>H=k-VW%7xOLX*P{MX?mitbY2co#Ob#A%rRT#PcvGlFVh*HIlZ9 zufREtMs?X(Apfx+bD}6EhnY0Yf@f|d`^K*t5zS|W;Ih;4&n##)FaT5`+gN500{@XS zF*%B28J6IRJ2xzy6@r(aPo(f9(#5UuGHHv(TJ2<8PM0lVGm^$6eq2#Zj`Z6n#b+i% zaF0uh7vgIP-@lM_dFxy?W8gEbDc%j28tLM{EQAnW1&tj3cmOd_mtpj$K{%tB6OxTB zpW&+=O~|E14rD_`i_BZUJQrP16qDyB)=!Gg^B^>gYekAQA$`rb+U|~{lxC;Hv3w#z zj#waheC~XlrPUO2#uxonWMsq_krD6rzS9?mL0iR&7r=>h*Vxg=D1XIYw(&uu+8Is=sf)r# z7B-d&k3V-KIP5OMT-J;~v1#+BJ)0E2+O!9oquVEwvmf8A9)Du|35<=uQH1!FsZNe6 zTe8-aQOR(CU!S4DgN+nR$ZKf9ObB<}a`i6pZcP{quwMj)g?z`_a%B)|noV$tMq4~v z&I%7w@H0{@yzqZ+2VC?|KvV9b(M#jgzfuT_|NO%J4h%fWHRtS!o>l8Gqzi_4GcNQQv}UAKi2p%> zi_*4ov-lk*%#n~t66&RI2R5ok5^=3=s>Y0lUe?5tu3izQb>Zb5FSDJAC8{Yrby;{1 zu(bsy@mc=r}$S zF1&}4Vxj&{#}RR}8}k4?cKLdbQIU#|V)Vv5<55vIoNx%AH{-8IiXocz0bqXhb5r6u zmatv1)G73P(W;Nl@~mE;&nL;_W9n@v1xhiG2Y=?ZxL>zoRU!lFY0`;b#<*rhLR}yY zgJL9IXDDadRo1n6POFkT(_;^BTYi~MtlQCvc=@6ud_WHRk8Ya0cEK`!tKv}rIX*u9 z{AP;$%>Bclk1Sa^V0-F@SebR@up6#a9BF8}Dxw%|{}sdF7_mvhuF9*!_|Eo=Cb*Dr z6Q*b`(qNie0QtKCfb#Oh1%m#@V&TxtIY<$CVe7Q;*l&S$?M6wjdqr>$$njf;;H{*J zjF~d(+MJ_C3x^CCKF5L>J|i|Hxg9!J_|0X2A-xzx6yC29?eHV5?WRN`p~rPBQ}HY9 z^)5b~-g-T0&&Fc%;WSJJm=M2y%l#+6l2=|A-gn?8r)Yz>^6*o)RV)RQtlDH{Ra%NO z>S^JFO?VqAhRD+UF>%syC=9j2G9=m34)5RZ7On7AANs0vLk1h=4y$`!LpoAQri2Um z@R6m_V!{8fMiL&PE8_ipcuXMyoIe|ZH??SiH)**r)t&u36?e8xmU=(!9jHmaZxcRw z4OXmCo3MQKt>=i3Xb3Xo=(XVsmQ6m^lV+QacEpz90~&k@4LiGgEjoL|CVdHE$WDq+ zTpRv?VplYT41I_-AR`OZ(SG0niCP5MHQsbx`0&bUt%BmAnISr^uMh%>@K&(rcua;I zh=sv<4f!1k8CF&UZ62LtA1=6 z{*vU=3&~~>hP6|m-+@eo8BFX@7=eVKg` zKPr)Dh<*ah64Zkp;n1TPEmu~;o6pv4fH$7DHel@MD0Yy30|)g&B|NhWxxVeBZ_I0hAY8tOGaEB1j@{)(nqTf?C?q zVAx`^9c6S}z>*dGw;*W#^UdMq<(JvSr*B52Lu_8TC4BypjV7H zGQf9}7c^o+&ex&C;(>d}7Fi`m@!PuHI-DJ+jXkHGP8c$|jIvOsLHu;cjtKG(LU`-) z%WUF@1T23TTrV99pTC?kc}r<35_GpH*2ig(JTv@L`#)lUkJyGOG{SX1x_Lr;>px;2 zf|Z3w6D}P#p~0z4Iwq_NI+PVAWc28S7w!!oS$0gpwKko{qzQSn z%~qly{rF?|;pB9qNl^R{V)Y-)E2f1j-WHw}v_I#s68QVWe_k$fxk8ZYbZiZ#ZFZD< ztdM>?`hBz*nFYT&D*o%+F+C34cyTyCN^xzq&IY4#I+E_XbuEoBdn-oDNU=cu z^qa^^tnCzEb1V7Ew!}dZ#dbCR91-2l)H1?1-;7@!Ef$_0*v}Dub050wlD`XIauO~( z31$?<K{ChDC_VHqTokzu&uP7U7yRBr)CzZ}p zMry&E--i~An1to`_AVE$vL`0Q=ii5Tz3)1aq*Y1`OD27~)oy#DTBbmS!WFF$co?Sx zBc;OeJr6p>ryoY=E#;IkkBKR1>IqldtWD8^=7R{dFDpI%?Ta1a+6TinjHHA}avP-x zU{=>zGga-iD8w+J>nY)PcVbM877O@$m)L&`rom2$Au%ZFNW2d^64cZ`ZVH~Hc6wm^ zENDL*+YYi5N&8{+y$#>);ib`H@x&dk2U$w=L*Z*)>2-eRL$B~UMJ03aHidBFU&2=- zzX8X%;QN4H6!s=jX2_b$o4dm?C0z1ocyZ;lRfHRN9s7UNf!z2S4$SPwwjrCIP%D9# z7bzhHBt4jj?j4TEO-cNEmLYF{$JuJF_7n=c)7KTAe)!vRTD@KjzY;;pyoM%VPFqiS!Qw{x3)xPu z&W_)+DX%!VY4JT&dJahX@ZS10%fZ~c7c4o)IN2Y(j z@Sl><^~aaq}IU8=FH5tH(C075}+;*VIc>&rCfw^}y8Yr&448Hf32{TKu=E zbH;m9vy;zHenl~uJTZCKWP6fd7)={Z)MWN#Z^)y_T5K%UKH<3Iih?&hUOP(Qri48nH zL!!q!+P*RTQdekm4x}uc`2O(N$*KKS<9+Gy%b8 z3hts<2>M*OX2SA0~W5?1>jAy(*3LZ%RIaZLqrBz)mO4;?z1#eF&1HRc@o z@FY5TX(y5tilnx8Bw(C!F$sqUi+yS#I#o2^3Oo)hlrX&S_)51A_;D; zs6BGeK_3ZfX1M($33`xGD&bBrm7BTxuXvdq$#WGj(bUB&Q$ zu2*>|0SNI$JH7RplV<30fnqBLF+NCo@St(W_1UhWU?Lg~fgtd-5DhG1Axu~hIGw*l z{#zntN0?<0^88&wA&4;8+j5I+#Y2+0hdC2kwc|Fkv0d$J$!CL3zDc4 z;@|nr0oe*gH#=@TQ&@8da|=C0U^-iizhY5^OwC+9VWJ_QB$CfMXbvQmB=X zLkJG?V;JPCAk*3UMfs2O81K;M!@C3L4Du06M7wP3P{R#>48*J(vQ$KPl6>}~M!~L{ z9cpnBWjI{7LPa$O`8A9P9wz`eWKjHv~#{?!tQ?4-n z?RBe(Tu_3>5t1pGK9CBtGfTJ0R)mq&08~XVzD$s{1D+rM%g=vJHj~S4qM?c50jVxb zV$kw*Cx<#~WL6Ga!@Hp=h?{6!isP1duw5QJ7K8(GFI^-fu8RnV?u?a}hbnAQ=#k+{ z9f1?lhpQ0Ig+e5lAU(Osp)euLp!&y)M^Yxj6efHWJ!UA6|5|F61wjw0xH#$n?=$|E zNQ`EgokiIS83v3tqQ!?UB?_{Te^bp*OIBR}Vn~4{5z3S#3)NAC=v|;RBS%kk6)vWR zq>QHQ0LrvI2z!=y3!=<;++Wd_z9vrmncr+-+Zu*Y>{-6aZh zvy##tCO3Ktijs&<*n2~-h$f+NQ7Qi|)+dPE6-qeeBPrDAPm{m5b#)jMz4&9yV}KKg z1|=j}X+#Pv1}pcl8)W;BP0uMHrkjA;asX*{)AIs32cR=gr&@$!)TEu-N$rJR>vBDMn|%yP&a zB3m6@4y|ZDkRMx={}xhrcwp?-2;1r^h8~nl^z_Uyyx=PU8$0m96V1c{NXUR(!3)XF zoZOoM7K2R_QI@r0HNoD@jUC7I?_}4*4Ff@jKs;E9Q){9gr=0rdlU8gXF^iCYPMGEq zEwPBisU5?4j336F$CE->8X<;!HXz^Lu9~OiKPF)XZxAlYe8Dakdo1OWUa}(7Za@|d zB72H$BLFG*w`%L7i>|Rt$Ze2%4D{54Nhn-Hl9SLkBK^Z;ABtNd;4r&SZfRgeZ-j_G zogJ_zvh)WEQ(q-NLKZ-55V29hk6@~T8Xg-SOL5>4BAkH8DD-(llH zuz(HS-diOr_STpi5ZA*GgFzrho#XC|kAIsLWi zPfovQ`u6G0^tIELsUJ*VG`(~4UpN1B^HZBYy7~C#TQ}D?$Ht$U*fG8~^@Z^V#%~?_ z<9K~MhQ!qR)TN8jso>bzi~7ZLCo`+#KV4j2_`||;iys{~D6U`l!or6a-nMYlLUAFu zaOuKX3tQ%YJO9l5XXZaJfA{=rH*cN%zW56Sq%vCa#^ZOkA{hT#+K1=;1#@IJ2u0=|=UfP7YH$72z`B2ZpF+SKiwJlXW|# zQHEWKHqviCB9%AtehZ~vHM)ZayRGKd(w4I%Lyj&EXuGG#baEE2GQiGOrSi6#^Dzm) z?VF8YKk7+bT9)f`VG|V?So}Gin{zc)n;w?S)y@j548?+0I#)!B+88gDciC>0rgTbL zlP^%KT$(XGJSIIsF4qid+I?>}>GBk+anp;^AJjG725V~Oqk&|`#kN`FkEHxhSFZ2K z;F!LgGsYciZJg2kLiW@2^s{;1rG!Y0%~#y{bGf)|kA#5t)&%-7jg?&@;CbX*x|Nk! zhRStx6;CT_Xhsu;zZ;ie`>ujoU1uC+=YR>An@Wpz=J!&I3T(4Wnayrhhfh=jeBtuv zrSiPBQDI%Y*~SIDl*W;==!VI3t~}ducWZ`}pD%RT%2{_xwX2C>b(L{zIJd)Kp^zSX zm4xy~X0kiiQCCeG4;xUHnJXn6yQ^Tx0{3pK;&V8d@7W9E4@rI+d63(rtC5mEP-2sj z%wUjk(BG^s`}z>*5#<{l&(}MU}E+ZB{!9ZzF+rR+u9=K zVe&<#ltJcdsJlff22w8-(tW_e92&m#i;b=>NXvq3!5WEVZKgCG__F-7zHp17>tTZ- zJ;=1n`9Kk4{-B66XCNT1d&~Ufs;k}8WT>dKSIhV{t*VlaxTQa>*D!j$RUOiYEOB!v z%^#OqmUntee1a)@yNzyB^{-*S^1(VmnB>k02HREC|rJ}DO{cPXR^f%(B0#dz_ zl|s=c53Za~&oIh95=l&~%hk|$rGCZU$K7KCD*r$q2-H1n-m@&ZujP7fs*?8EI!rR+ zbTF%Kc{J9_Ho)yXrg(*GLq{O*mgmhN(TlUzbg^dWG2u>?b-!C~XWCrAiFY|0wCdQ5 zm3983RGzO;4K|Ro*fhZcU(suwHL3l*!XR04w6yhfu)=# z`Z`S|bGR(K_p>@CU{B@Tws^ExSsjxSiCq<69>{TX83Ape)~IIxMRsGP3zWwhi|I8T zHJ?bHEhVwJ%6VsuGKYeFnr`J=roznoCHLh_iycsnxX$MEq#|)PA-O3h`)anPrfPgA znn>E!6aOTaud+z5Pu0UX;X>+YMt4b2GL$$+o2i=pTD?=NtcLOyiI>1t@|QTOnRijF zH&8c^#v)YWUn7c3`CE>Y>8Quq+WGqny$$>sm+;fBEsF>y(tdA~6 zqsUSXhqDKNCYST+C~e4_+rDVJ&(@ia{WNK!lt^h zPA1byQZ|)UN*;0*ZT2Kvv*rgrYoV++#;=l+nOsFB+oc*hmnv7$=qk#*u_yT{bkZ>@ zZ)I~ywZ-qKXs3THmsjIf%4pQ;{bjwQs>>ag*brQ+g{n0$aQfOQ+SxJ~wc~fl^NC6|pFj@uo7~>Z#9_0;^le zqKm>MFCMt!t7diMO1VBoSLsN$7%7-F-Wr>|Ra6|MrrRG%G#<8>Z#fja(z{| z3?c!quAE6kV(rYz8>RA|tJGsdnxZ-x)f?2h!s^-b`qgt9lC;ARt7{Mu>r9H?EH$)e z_b1Fb?V#3+x;oI7|2N4`w}=g)zTu|3ye=DOQ{yhV9Cyi7QD5<78p;$-4lk4!;;y-; zq1#2T#mlNY_&C?dab~sCb4Hj-#L`xKGG;%B9$q6k>TvNU)AW?AN`Js+&m`Ed$>r{v zmMuD*VWrMDXjS98e!-y@gPX+7PvXKOmUKInI^mM&b99sn^? zH*imB{$8Srb}ypp3a*Mdfukme6w7hjTz~R zu~xE|yv=Tjp4=ywr|o9i!r}pK>Y$UMYiUm@koRT}T`1MB`TS)n zYv2mLl)DD4>Ls0A?xEXs(;v(0nTm=p(#xL{p7tK!A9FP#e7Z6yx4MOtHdl#Xc1)_@ zZl$ACHJJ_%daWvNOPhW(EO*l>n~}CzOZ|K;Uam)rm)6(*&0&s*8o1l0S=<44PE?)5o z0!4~ZDXX6Ct8JyCy~x+Cg8neKO*rQ>;q8kfCgH?SkxB{*V8~m##2nBE5;=6G7Sfel z6^AjbG~no8zNo$NOZf2-(=fL|_mw%N#t*&) zbZO^0_K5W70i4IL|BXY~8Hu9{4JLcf)u$3>pP>9Pz+<>=o)j#{!wZWec0q9ksMnVI zntkHCj}xqJM9e~5M=`{+SiDA`iYX}_`mPPUcs@qB>PaBr9{NIfadE^({6GkXvMh;H zUnJ;|h?rm3qbye}5vQr-(w7Rn!HtfEnm%CY??!JHB#A%L4q9M6Dw6DR1nErDi| zQqS!Y{{AU|OHW%xcrpTsvq084(P=F4^9}#wUiS2Ryc0L^-9RCl69{g|7T7 zcFOMWhTr)LsHpFM_Z3i4vWUf_-w*q@775XQboSQif0_F6AcJ6{uQ0 z8Y-YQ2gLRN%d{tSrEQJdfw_Ff?PX0BNloj)fb%PankCfi^uMeR&Y9ZGtQ zS(8;Qg{;4S9{;!qQp#*~R;b}a z9bhz!=2TeD###cUIdLl0_NRUYs3eG(MM97*1yoBdSt?RoG}FzcYI%)^mO5+qPs2-# zBQ|0Aiwbz1MC314knSxlENwF#cf0i!Y=o#n z9*=FII#$FZpy;sg{Oayv0D5so_o}WT=DzPh0q9+NWbt~vYhxt!b2@N zavLH{lFm6eZ6n#J_!?=+(YD`V(2v-J8}BY15thDw7U(uVdd-U1_#Mf;_ldoAXUJLS z^K@ij4zjGpL3N6fvtuuyRiiebo!@)TkPq~CFGzj}PqoyjZYE7~-I{|=-Q_AaB3a@G z)Ug|jp_g>uVc{>18>U3ifASfI(j_7~FONa$-}LP{-j_A@$rp{8S+(PmHY8t!OTg!`WhFE4B~33vYYYvAkkp?%_C zo`V}XyXdu><{As8*$1Y-JoU%PqvL+XYe_ImV}AP9#@D;BP2qZ(1_y@@M?np}BTG

    TB(mPEQ&B{7k^5rwds4OxUGxXjW$95*)xYjW3M>ApF{e!M`YU)X37Zv63aNG1Ltv`hS#6%Ik(BVNDmBoQ!q!~Q6jC?_&G z4VJSmp22j&Tkjj4s&M3 zo~iY22%F0eis|YK9gRifZ`-70{f4u+?TaHO;l#f2bMLu2zEk|+S!fA5laOmmv#C?G zXA=zHXJUgI6*L9qLHvPbZrj2}oABJfYmW%EZ*aTCxvl7wz3R0|xRDas1}QVBF14&T zTPqt38sSQUQSV-a7%^h8ki^-u#m6qKUK*fdvPFwfpU{iUgw5P`yqH;^0c65^bD zjj-HEL&i07Mkajv5;%XAid$aTXd)Ru(8IhBEaIO~kq7mxZAA+uFP)A*P-E(~Kpq~O>-m7)!_5I#8!bv1e*A~rn875}#m)I~9j;4yl(UGOm zV&TTk_=J7xn%FLpz7#QRuV-y(eYUzbo(qvzw_Uh};kM0hun5W@0+0N+gv(zrWG=YZ z7SR~#tJYz$YF)J2XfGL>&2&qxmOtWp%x>=6F>5VySaGLzz`_a7BrX9({Q=g%b3OtUr*KT`gu+tO&LnYJ;`vbCNc`tI=q zSaaG}U~G?=2!G8HsB@9wbac~nZ|dC>Pmld|VfP%PI6CVl5oi&^DYS;~AUTi2?C((& zn@7rI)e+8xdGhgwtbozdE8cikD;DZX3J*~wTU)IcZ4lE)mO`>m$6ufkDaDJy)~ zf(X>5%SsGMyjK?JmM@E{E$&{NhK)>;pkYAvUkEhmIoBRq^0BN+<`u1I0q zExy($y|b0|cji@UxsaCgl@e4-XQNZXJ1B1D44qm9-r!SmOEy*$DC-Zf=i~>I0`kgs zia|4R>t91ogB;#`2}iz7Y4b6ot*qB84N}*ipwRUrCgDV4LCV$=k*x)_vBcV5xRH`C zDuF~m&t~;(INLGwRQ9A$bfB9@i-qG~(AmVFJ2+mk+;BI%T{yBN-HbXI2IH3Bg+CcB z#z)EnR`E#}esMWp3e#oQ>(J_goXx1}Cj^ZLe==GO39Mgw#E*M8hhm#TEy*BXHa<6d ztwKHh?x~>+@&T+0&0P^BeP;lwK?7E8NOKR?R4Nr@ZyiYJ%Qax?DK;-Xjy@U1`p# z*c({`3(6bEhbKWjzdvAZsa49T#Yvfz!qcC_r0vDI<;79U3!mF|DWt^CofN+nhnM~8 zwKLIU(h`tsq?2W~9nMCxX>EctBHe=Y*ryA4su3F)#ZDY1YrqkOa6yUNkKQ?m-q|wT zgD9QRL5Hg4mHxD`f&D*4dS^u#ln~N3nuuZ-)K-6S!5;BjCC)`U8Qfd4o0djxO)%yV zZSsNAGg(D*Dp+GT77L1N=QYB!?+ed~Vg<7t2}EoA*2i$7p!9aAUQ!v!XxdzyN((pJ zFuF#Ih2tN))FzJGF}magBEOVC^j;(oDW`-@{z(CG=#m3(2pv0n{g`XyMV}l5H~U^; z5QtAHU;Rdf@TvfJ^(zbl;d=qZ>(MtaDt>qr$wwa!aaZqhBO?HacmUGf0PO-@OWXSZ z#0|&aig0O|TiS8@D$+2#;adk^^}n3r2={T^43d-x6cPY9z~g{&Q@Vja2TW=}x_`$J zEtD)z$$Wc-%EAk8yv8Yj67!XEhVJLNd-i*dVerX0LmOYK{I+)p=?J$t^2$ZL@}NR^ z>Z7rw0FL(P3IR_8@=idyp;Flc+#i78LLKixSc`Eh+fQc~Ug*5~e-$Q`5{0he=5|`6 zzyfBGG-82BF*)=D#0}lP9!|FHIDHLq`L|l|QcYdUEra9=h)9x$fg4T$3~`RB$03~D zNbfb=lwiGgL>0&i)+IFP$hOlMh3jta zGQ$63pdLE^Qx1X+p@LcEk<$|)y1z%x0 z9P4uLTuwNBO%pDYRN7*s<$_=%@w(%HTBlN;dSbS*nm`@B3~%d8N5CwH)MXw72f)Vy z@d+F-<`bG~Dk=#oo;cend~CoifaTzHRix~@|2>)QT|2@gr3#sAz=o1k9xGCL0I-)r zuJ`)k^S`_Tgi2P_!W}EFox;Cf&lz8#6ZX6olhk|c2*%a9i0muI(?|A$N=Cke%`Q2;S1p*y(n}s#H5wPZnxz zLoAz?p6T!{Sk^{t!gG#`4hsu=BfG_$Zov+FpJ(m7^{sl%+_!{%#jw5u7HNw=A-VbN zo8e}}1fH-Lt`h$I(xnYSS-opP_~72h9uSmY0*Qj_Hmq^pwZHLPb?JP`#C9`1rdHxD zX*DZ(UA>80S{$(n`gh-Vgxm-17N5C^Y}Pz$m}K%c(i%=#xnM4@EvO2%jw>^CbC6Q1 zl)6)g*hn=YKKX|$#S=G6`x3mLH%<=s0i$zUn)jHrYTck&lWIo1oCSuMl6ljf*Ol)$VMiggZu)v(qa; zZIB(V9KzssZgFwMCLDV3P1yY3jt4n#Q*;fB>lb$0%>o95 z+3IX$_Nv))#;l9Y*`=A^&pbQx`I!&R+&llhnVS^1&J<^YGpm=*oHh2)%oas#{_g4D zPJd_miRt%GUqAK_)2V6KG&{X-dSdf0H-CNeW1HWz`5!iS7v?v=dNULK`=_;)}d_Wtp^#$PiI9L3`Cadv$F z*rvswjZY~)I`*l>ZR^T6_YakC!V8x#9G?FGNPr~-V@c;KX_!PW(;l!oowu0sNRX70 z!^6f(wN6V#x9bjzmh%p8mP_DKhsIaeQVwVBoK2Mt|HH7n*mn%-tY2$0wrhrZ#+Goa zrTSijFUx2GezxwhH;aax>ZejU!+UIW%(bd720{V0S5COp!z=ufsZ}q#5^0;s?T__~ zC8uD+Bd%85rVZqrPfFF9UaXq!C2IDP-IlPi&U+>Ij-<1}(6(%G(AN00 zJnfv5%Gq={z*rpWUXN*%iw$Pg@m0w{>jO^OSGQEtV1sv7avpe&+-lk}PAQBfPdi6b(NMP- zsHng=&s-{XgNM;`Ts*}#Tb-gyQLrA51YrjabLnLXXo=i_JVy-zYD2Hab&C#qj|4a>xz({EJqW8I zy8%TDKfNgXcMa4=CYTFVX%JyYs)eKSny+(7mRInzLs}ka(7FOk3NJ z;WN^0a3;^(GK4LcT)LP!U~6S4o8HR$RT3Qf;Ru`mwI{J#5^jOZO$x555 zDo?TN?-yOFJ&(!dNP1wrfs7{+kHoD()fu0Wp4M4dH9$$ITvW9y`EoP2GbGoK8&!j7ZcyiU%prYymFv5D1!}VdkSy7`dX>`HC`h!_jH;$;xgm9fo$B?i zu4psU^adhfN}i&&Hs^QdbQY%A;OTqzfX_=dV>rq*`zd~)wi9L?^1Q2K#U&bz%5Hm_vKR-0Kra9H+e&}-7p{k>eB za%gEaX#eeAzUK87jX9~@+}AhowOK3bRj&N1ozCufT6$h{H^j6|j-bh&9k^7?l@eI9 zWNyxn9l>IdD2mzNh?>2xsE~efg&pC4`Q^!Ur-1BSuC3PpY@+Zl? zX%MP24X&llYqfeyZubG=X4P22g+K(_Nx44T=(@Rh_OgGK{F@AAD{D&YQh6mr#GR$X zAD7CFZF`;S(SBvn-flFw(%CbTe`DL`r5qMl#;IjWv})UBa`jBjK_x@!fiK6`ODT5o zy(h~75n@(NgO<9V(Nx0)y@bs!8NGG~Q^H$kis!kYc7{O_&d4SQ-?S~CfZD@{jpqW>?5)pI?FR^H=XXLd;O}bc=Ugy za($y@rqTnAsn$tElbV7iAeX07F#tp>g=Wy!gRsg~-y4>%mh`;6N%_i^l1W|3*PS`_ zeexgZUBG!+`Wki2>{-E`hKNGV&1 zoj1#W0F*dW?k0R8Ba|wG>d9;6a&s5t{gtq%W$t-n<-}PMwz;G&C*71Y8863-t)g00 z*erL1*36ZeTC^7^1=Tk7YLa4ZksN7R6JY3#f~ua&GyoRATqBoLT|Hua(&02Vin$79 zxKMgAntsDj8N`FMDP60^Qq=uYb&ZZtb4Q1O-xtuDe0oDxq ztrp77)7tU-rAW?{4K}~E>Z)?Sx*@xJRYFph7@sdmb+Sd5v1zpw>&bKFx5b!SN^n!M zc2`MV^tiHnwo2|9RlCdv8+3#X>$r?wXOtHZdXQ_eZQei^00ibuy0HnVKHaaCSk|3w znIZgaOP*=j(3OscH4qzjIiSD9muN@&ay6-vA4M#61#H}#AY1V=4N><0#$i7nOa zN`1}-$XND(QvO*wuVZXJXUIi$DPxU2q>{>&tpMag7!T(y2Rj~3X47}2<|y-d?;y{2 z^eL|AY?PD|`n{yg*|JPP<#TqKsy|=OUwDCBJ;SW_Q!%HnO!+g`n(m++nw4A^dNHX= z&Dk<_`r5cw3aLfJg9>HQ`vY2=#hj?bm$E}Y#R0F&o9Td&aTMczWp=AH6N>|5LB$Lj zDUU1U_TvC?r}WM@u6Ur%DF^%8j zwH8btCaBc)4~R_5L|bA^C#KRCbX`qE?rmQ`ZlQ9%ass#gRMf;y{z&RPbIakQGT?+r zg#&7~glw@*Qg>)lS#5wxR}*?G2ezGvycu)oy(QMcrkuzNOPCTFUfz=$jb`Kztm@3h zq^H!TY$fii(hvC3&N>q@dtH=2>ZqBLvp<&0Z8*kHB$S3;VvuYmRcA?P?vfYhij)<= zY;Ce*F_h^sIYfASHa{INSDAb~X{$x3D?cmw@ph6}2x~oaKk2Wnra8@ycSsN5ji^En zi@Kk57@f*w>C!vp`d-Qfp&?t%8cVgD`W%~<%RQ+S6K(L`Dic!o`)QX&F1J;(G-WOG z7HeFc(5J8XzU|Uk+)_l=kqMo8)n4tJd6f zB;!vMQkJ~El?bIIM^x0&0I@^dU&-~I?PyR+^C?lBYQQE#NrNM$;ybQfpe|Ksn-wEF z7_hajN0(2f0@CO$VmsrpXjbjjrpjXu*|LEnQuEz@rIs=446TsAtBem+zF$dhm}JP6 z%pu9x-_4nswC^WUbtj+9(JddwJl!jB9<^5vKpwyfsc^Dn1T{g3O|agI1Yyo@TDW-b zRlxQ=I`!=2-1xXoktNrM-XVa2P%%q)f8MrA*I_Uy(}`?9WDDfUnaehzco)v?M{I)P zC}0G?At>fA-bD^uylaGxTe<=Chggf3Zby7xr?XwRYKBKZ+l0&R#+~`74Oj;HsPLN` z>nq~Dcay6`-x}fLmhN25tX=X1a{3?J-`_n|?fHsOVru0BWj$_;>`{QN%R$hSsl*rf(B zEZ5{2v&nC%g)$CPM1Hal--`x~*g&{-M8XG(f4&!oKe$Z3X#IlIUh;Scp+VVHq4_^zc)Z2##LY}n?(I)Aw1$*H>vK+ZmvK=V3)r~B1 zwjwME0Je;n0Bm{v`QkMK7a|9WI2D%<6ax`Wtk0-?)=s6BE~b;iem=4|QVgl~hal$i zEnKq)ZbdU>tkoMgO@D2(V)DZAnBt8Krny^YA0kMHib8np32uH_!&62jl}Z{I7nj#% z=wa)&2_HOxd-GA7ux#IgA9(cLyTthq0h_STyGCfxrLIq?pa|*m`$KfRmZp31*!;^H zdVa)2Kvhz#P~<0H>h5JgSGI8=AzW~=ZWw$ViRusk1wB!<@-AkXOtKYgxy_g zQ{164BCPo;>bO%CvQ?9kGwxA18?gzBpYwQ;p9$|1Kl-S25X-Kgbrusj;0nA3vnJrh z(FrfP5$?qBe3>c!;^1=e_jjTxd#+i#bozX-ka`b8U6)FG`u!%YHW~Z&obc(7aYyDi zl##n-n|Q^?$=#-IjWBs%x%*NOdNS>BrcI|TYGfBxOs=#%H$M6aZrk$9Y~pu6fvZH} z=wsZ${n|Cci7tVwDpa^$p&3`gVQ~9&3^%;k+$MA$Lr09*0Dzm25Q#*Pe4Fs=yB`C_ z>QmhBww4Gw^lC(@k4*h&aseblB@(1U2vY7fBYsLwcEC+;iSZ=e33Wfm*^?@ATd+;2 zK7rw0*=Q4m#wLinh2~A4-+2T(#w5 zB`>dj5?(f%gyXl353#r6C!ZwK0`KVZ_0IKX^y-1O5U+PjVaRpMUT*smylgZHCvJQG zi0~;-bf@_9F9C$O=Q2EyG`E5&rVgF!h_281b55OGcnUX6!W%w}xbZU6o&46bhk#P? zD<1}KM-EK5OSuTE-fh!s!||kBzf1A0IoE$Ckp#|>YPhoMjyZ10R{_T*!-@YI=H94H z!aWV4duv}K5A9zgG{DjtV=*#DE8X=59pF=l$Lw0k(M|t>DKKIap8LY161lqsqWkfG z;BD>;tPzrUXVr>n+m~K$GRChIm%d5{xNnUx!%O|w z+qFBytG`7?WW<#L79>zhYl`iX zI}d=suwS11HkPQ3HlaQ#0;&MflY7nvnDpZBpl2}EEbF6z3)SdBx*d&|eHyc-FL%s& z-+-r$CgE}YeaLV626v5OuY1kBu6dTy1~^|VrlQlWa>|^MTJp|k@b?=n!qX>Ifbs1F zjBnz*q!peu)B4B`*TQveI}oW@ICIL(4lfzE32%EGUN)Kp{r_A)1hnoE|MWOs%noS} zbpzpMZq2@P`ioP4m^?fl5S68WDq!4u)`IK5q4RVGD%xk!d;6K9*N_yb7qJpIf6Fb; zZ?FjZ-#ss>4Tw-10GQajMo7e^ne0l@)d0m*8~SEE-SjC_LoWxxf=+2py{j6jCp@0q zB0;ppEq?@@1`CyceK2@5bTq)kvSD`(a@2jZ{%n!;!@OPE0AVq29IW;;g!;H@?{K8R!Ep#U9kwz|PUI_I(zn9+8j`#mzkH<$$f(RU-> zJ=vNPx4eqquMnR5K6iNQN&;n`=oql+V@GRoi!KOm48@cVc`Aw>xM09gT(T>!a>{vP?m9Y@qk;E(>c zM7=^~fm+P%5$-s#G9^6nu=>FL=W; zGf&O%I(ItsJ{}9fbk(1#-t2a9y&1 z3xPHcgp31xSq;aS=Xq{<<+L@(_toXXBNv>%Bs~87E5ZUN;=c2;ZINp--~0 zRJieG>$yYJrVyCn|12mkM*P8CCe)EVzvoynd7%D zY%~cczWouPX79avhwz&@{x6cdZ43N<1lsU=8*`kdl4Ui1NP+i^@d#3ChW@TwKqE(N zQcevJuzQ7nT{!vBKU(CW@Zwn`r14V7?U`FvKo=QJx}q&-0?;8HE-LB2Aasw|Br(#V z%*zvh;p8X&(O)@uOsxG)K7jV;H5$s3VCx;dPTg#&gl&^}qoc)=jM(A-sshRQ>>2!o z@Yoc8?s8w*3qv$k>F>5RT8G2Q2*01gACDFbPfvf>Exu+me?+07=}VFxDsXYF5q0Fc zji!w<@)xHqp`zd2iY70Yme=`B3w!6(iuu{t*e|A6Cq6TEoW#Hv3HISyU>_tj=V@c$ z4#B*QUm6XB!r$*9zB!i35z#n-Oz zfL%t`68Lo~t2owbN21U#2!c6*tDBS=;kbie5em!v;^K%+h`)#(-Xq(Td&SQ#6F;%F zB>YGyP^J_rHknLSUFay&J)WW^KjJQad2z%B+|5CmyME_xK7u5V8ecH6OvbJ9rw0~i zf;`0z;qE>B;=)Fg@LcS7@?ZY<9{lC9GT`$>s6pFhQ(NsZRUtcE2KK9|Q_(adm4p+^ zdg`9{UbZMcxergVFTOU^3>bcJ`m(;#08AtHzRu?JYJ7s`0LH<~N{`1VXweEnGa#pS?6%OaQ13@dM+$UEb9L=C_ca+d2EXP2TCB zPTe!{=dlOLK+)`fL*SSW2)*-%2)&UvD!=S+oQYXDViJ!(docm|oy~j6dJB~;Iahn+ zjh=klHyy-V8nF%Ew)j--ygPyKJCpYce?FU^g9a-&Ktaq1f>BVla|GQ8#@l3%yt2dF zPiGY#e>SsAc;wyJX@vJ4=3fbWrZ~dC^A*Oy=a2A9ryB<{=>X)G5ox=_}*A8Y|-ef<#nUg8v}gafF`|UUwcpzjFX`*fRL) z2{kT=#gS(XVpKr13lJDi zH>Sl$Z0Fyk5Dr|#^MD1LSTRUzeh=Z{s%`w_;nAJa>FXbV=C1#h zUw^$%-Wr+O`XMricg((a(}$*iGIiI)OXE{y5Z_B+ruyj%-*oP95GTTJM-!J-<$wkx zE^eW66@O%YL!ofv6`>>IQ`b>Ew0>60}{2#?r{|Cp@G;ln_$uTu%7PKOqu6Yv7kw zPFqEYn_qW@@W5w|ED1s5E56G28}TYN4I8wb0ow?st4e*LFZ*tqcpMmx*u)#(bUrpQ zRtp~moEFr!*f$nRz?6b;eE_0U3^=J}U$XGaz|_91hVcEDUiZIZYS-V|+1S-xb+Q{k zk^uVFC^+1~FdYJoXCVxlgItjWa>yZ{&M3sg86@#fUb#;=*ZGP)aHA7FFtP@mTp#SN zS6Cn9*}dO`*$plO3bJKNLgPSmw7_>t=5l!ZTFaiIB4XT7X*h3%J8nF@TYM}mZ4Ywm+k??TE=_<# zN=m0wpPKzNS`V+ybA_nCng`I-*snpT)vwpN%Jpi{0D$T+)_(dLOrlYnaN_y~PNSY| zO_Fa?s0g!bX>5-rxu;w%0ziJ<=W{W9%VG!$scW&ykCuw}UW*0(a*Dph2`Qq<8UW$cKG7a(K)mE9IZ3zBjpL{1Qb@JaoqvKN&uRy+S_pO_seJoyf3_ zDiTGyJ}ntOI6F@A+m>=8HsQH};i&M>+b-K7ekIA96nh%z6v<85r89to&=B-gOjMx= z9V_DHCpqjcMohwq2NUw`mMM=e+EZWuFlxjyyjI=j8me9`Rc)pvC-=tTWW*%gY5n#2 z0&Z<~h<}Omz;L_Q2z72~WY%OdbI!C-W}nQGWU|cyw3LD@ zB2tmQEg(`60R^Ne42c_Dt_z9^Dxl)!w%+Si5s`{q6%c;kcg{(gIZUtq{@~LO=XvMN zyFBmnKJT-9pQk8Pg=lm#>&KnFsy^105A`Ibh6PDu`gjuk$Y{uLg7NCo?_OL*;Mi&_ z{4t3!!4x`%&O}ov;Gd@TtS}ZA9QwXg+E_fLYsl&-I+M}JQP&H|hQ33$oZP0qsHHF) z6+5Ho6=G*YI&P5RY`GCZ$tB{cNJu>Lb8)b;oJJU}|I)(x1U>G~r;_MH6hAq$(x2dB zp%ga~kM|oQ8nKTC0b)Z&BQF0u%xG_D+Y4g?#v-xT6|?{#Uqr5W4RQIL;)=r7d%uC) zNyk&CkSk!h_uAQ%$E+Rb86O_>GUA>#X7I+4(O}BI=iCYbOO04l+g=$?4yiEn7_Uz zxnI{^Ntw&})G4S6zrU}KW2UT8ju%GQ>`ZYB@yJeNKyn(~L#=qX43D4!ZQAQov{SeW zaTh%*O<2nY4IzCvqMFs~i;tf*>37;&43ucDSYR&ApT-4!EA8h!x^e zd$Xpto&l#p-<(^;0k?|ET64)m;r{c)Iq1sVbv*DY@n- zN`*MiU}S*JF~dSe=d&7SEd4?8xp@CAU|t!G9DF;8fj%+TQKtG73YUd4BnJ@`*lSZQ+UQDN_v3RiGQucAMl~PL>Nr z`$O?`Iv&;dMW(ps0GL8XBL{ECUKX(~{_6nxf#BM=D7Z{h!?{4xuZ^coiFhbCDt7b2 z&FDr(5<$y~PNMTZPKV=sYA=Q(GKIM(lSa%!PrphfcpM?MB+_@@fPQ2&a_DX?+zV#W33u5|IC(ISpF*k_?$3mL z6M!|18>R)*WKqnlA(1I`Qc8k(Pqh>R~OvkgIOTpOMkvow=t=M2>j%b}x_voO7puD`tA) zfDlxxXNUAzqbVdXlu6f+P8_L584W=Q8c0}LT>E-b+|Icbi{puohSGymx?i8HGaKP_zup@51-#9ub@P2Z1op&vH z@F2z{BN2wcbA*!a8wx8vMdhh$ZaKyz9>A<|d~}=(q`gxC&&1@U3jM(Dvqgt|blp-X zudE&MUw`K*FW>sYSMQ)#+t3_^xex_)j_>c+G5vZ6lMFjF`N^bsvhTYaXHrfhhV74Z z0ibAi>yw}H_R)SQLWS5*D6K&iaBKf)-w5ELd;3LgpZxGn^dqN{qpeF|V_FO6-bGi< zF;}&ym{?8IGd|9c8s(GYLC26*9MmKGy}+a>A;CBWfUiZzU;VY{>6EjqAI`FSfqwD# z>aI$+=q#hGw`Osx`=fTm99nI;piVbAC8*-$x}(r7<)6ukr`|(dOQ1*;{`V+lJNw)z zx|Bp-ytxuK?)$vEaqrJHVJ4FA-J#5Dxry1S#2^3*T&_{^(fNsoA)!5` zG;*}bijklaci|5YgZbMj-i3G+`!m5_J?BIuK{n#_OjxC->--mC!;sO)iCYGiRx97| zC3-74=Nc9})0n5ch$XfGwy@7Skd29x+WjadB_m-MA1pfR))&6z%S<3;SY&LO!W?fFr)MitAi-kX2~ZP4IR}TD$P8zrAp^$%;Di^l77A(J%p=op}eGD7V z_Am+5Jxcn?&;K3kHdy+ZoQO*(8vWma= z6@|i|ZV}cMQV-Cx5tus#Q=#?r1aqn>T~FF%&!|UdM#;y%hk3|9lY{T0MriGG-eE=4 ztWiIa^u?^PfibsRkF4Ir_vs%k{Ys9WZ?_iS_`cVzXm%LGoR35FwbAde#}YuegLMgj zL9)-pp#H11@YCnXp()@6TkWiYhmt3-p^Gw^@k>g z!z%AoW-v387)+(fu{-%SWbaSBYd=CN96P=l#$4~uyuNj)XaqZ_8I=fO=Y$y+_AivC zNyf>gZ^B~m+Rvz|s$3H?asJ=71J&_DsA?~HPnV_t&`Z=%6LU-rGWz(0Yoaf#%fdvA zzFRkI7?pmBXVoZcCR&TdG-&hBsm%sfSQJM>fg||YQncm_wcYdphw@EmXwU!LOVgms zH9>Ok@U5rGP+l}#ksZH;F&g-msB&Zg5T`+ns%fYxk6J#kV3CV|YXDoomWa3)lEQ_GtyFdksHE;Wn71 zXe~LE^?_X+8Q-XulpH;EUdiBV-ul+^?Z~lnu3vB*zyF`!x@J{H)msf`RIaW!DO7b) zXgh_izcp@zn&X?Jz#C%vuirN47-Gj&@Wl3MV+`yeTiyW|?D!3CNI8uh{AmIi@WRjk8& zZw|m4QU~R^dHy?PxS6;VLzfmdeHUF|4BHmF2wN<+aa0BLxS8~5FRN6Ow|e;&GWcJZ zjGRV}IoGSnW7XaDg-8C2PDVQiWC=;fbWT_Y)l8DtCnNfal$$B;-@1(|-4YlJqpT4* z_Vw$E;c#tK+0-eT$4$P7of|i1B8gDRCyjT@7cakPtfn_XXwhdkn9`iM@EBhDOt4Y(+}1)<=Hqjpvd0UT<&s-2Jn<*2|W z+>2m=H+D6V2j4lJZTZmuLSo4_WMQ+u_rIsvtU}Wb=it!a{Wpjy__0v^3iaGjVG?!w z7!+lt*uMGVes}4VfJj>so>aayIT#yhB~NeJu!UT+b36Y}W!JuUsUr>O6@nKv+48tl zf!Pa~2*hOIiBV*br{488wU%!}PHOg8$yx86R*D~Z&r4w(5SS#vILH`nfe8oRKMfNu znBG6|@@=%3w2((BEfix!%{vtBf=`Kc!NP^>>a!ns*R+;z0aWI|Kb7Ke8r@N2u(Tf* z7JZz$$#<6VoomZc$%)rHFCof4 zdlRu&@~884exZ{8Tyw83F_C1<)A7;Nc>lymR!4*?OjY)o9DCpvpo_fGg$mR?HN4Pf z>Os9i6dCO+7B@xxGt}!vl|%A)4d2yLmPk&#YyYP^K^;N-!n{!|5@pnSP%k-|bfC^K zDk7qGtdJ2U^5wOB6P#@2nh-_sB?;5{gz)1Y*(T}=REKplv2ksy4 zn^cK^==dtWxk*kdDC{O0;nT=l&pfc^um@w_293N82s^a+DN3E993HJX8As{mK3`ny z%3hB#mv2IttAqb^d8kWhb+Dr044{~N87L;ds$Nm4Qv?fJCzd0Cz%_R^G+go3+OMAq zd!}?5*5VmShVwCU#Tve4GlQr!ZmG6j+6=Fi5KvDg1hUq`@OmE5msT~>S>+8uK{F&gppWgF~ag2JfNF_4{tUL&5`z7~FMLn(#0 zRLj6-E&QmW(HzN*=Nwbo^pqnK=?RH{wY?3$DWwp@=YWP>#H!!h#^a^N&vh*#l*vx4 zmR#HX(Q{0i+csPTXT(L-g?F2In4Nudr_e}b2Lb2f`i|3_5AyW$&JBfkJ9w+2T|L){ z*^2>;Mwfrm-9OzY@Iow^^@%f?*~G7Hlv56VMRykY1vj!fs~%ewS=CYhllmL$FJAc<6oS8EWozB@b=TJER=m05^DBHSnrgpOdsQvF z{CCUmS?*q5SMzkuY|S~RPr%@v`C;MNh@wDjt<;@rnPCbMLKW z3io~cym1;qbU|$-$WaCC@0V=b ziN-3wj`K(S`fj~C9PCyp^?`0Z8}N4r0zrL9&qTo6VMP@=`P+AjeRFzFt7CNfZe@_u zqHiVB9nh%)-N9g37twNhjZPOJ_x@Gvn++=UOjxP!*6D-lZWR*>ck6V1e|I>b)rLZ0 zy-pJdDJqM7)1fe7wI&c`nQkr;!npNZxZ595N4hoYKsd~?Ay(^;RD2*cXZJ)HMy(BM zl--PyVY^kKpt9Q^)N|cIt)A8DR45O^hAZBenrrujIE+rI4tHz(ehkL1XS@9&CEJbZ zht)xyQWXw{fDuY3x|7rH32HeNIu3NRfgslnpfrECU&}@?B9$_t3^6JuqEl=yHs6ls z{)mQAhC`r-^cZ`9WxMs93ct}~q4bPet%EOp%OgYEijB2?)DL4Ylz=*fp|C29LKDF< zF@dlj`MBYbo=n^~gbmW}(FTGVl`f*{4g>>etj6EaqhYry5{js}U_c*?Fp4u5$E{VW z^^D#h>egy7WL1z;b^F!f5PlP8{VE-!)M{0Vor}#?Tu7@zji_!UfGE3FIyTrHz^Znu z8Ex3F)d%#PE~Genu{j$?u#FbID}x#g1`FM-i|Ca2UmbRnVU?_3tJonm*X)UCRNyaV zxH}jLp?5ZdEuzcm4`}oeWhAT#GmK(mvH1>8vnQz2YA|f9UofZw_iArPKJJDLF@pF*~#)9H@n5hn9!Ro27VVF>e31dTbimi)d(S)>-2&Y9$ z*jB*k;9);vhq{C6NSM)wH24dwVq3BKcJ!_ZG6AKU3w1|=x&W3v5bV|mLh5eTuhyWr zR!|l8>qygsbdNN9RO%o&D6Hv5p&GDaM2kHNfsxh0kVd1?s~A5H(dNaWaOw~^F~D@Q zoHBxQ5z%(*gJ9pVCZxyV)C4&-r`WRCoYkoPx{yZOji^toO@swov09v^ur8<$0k29Q zK?tkVT)ijk$Hdh-EMOoE&SfJQd6?z8m0?u`3>}0B@GI7xYOYg;)B!Dy5f{Xk>QuUJ z+5zMN_SvrtXs}X>^^48@I23BNO54q`8ZaRw0Of#icSsA~Q0rJ6ct+7$Y`&dS@4=$_ z{Sok=TBXF;!x4YCj;mr=b(r_?F+90QJ32EZ->{2~y72#Zig zS0lS0%c*Ev9Ev8S3+SnU?8l_gFVM7e3XkToOb=F7xeh!TS*d&ahJD}ur-D;L&SqMKB6V@r#E;d(c z7_A0>lFm$rv1@|e*fabPTOZM>al`^TMT^v2wI>qxLq<@cqGqWGz<~~E{A{-xEE&Q? zBSCdo(YV+=tYm^Jgj0YA{b3vrNH86PQyTy)g}JbfjcAmLm5a@FNO-^|>AN+ohO&SL zA{ZHC-H?cZ5C*Cb=roEIi_JBX1Ji3J3Mr?4V**vH1>8wTDAlgn$M@QO_#rHi0vBSnqBKI^f<>@u&_c$ct~h0}-Rz z!vZr)%`p)yTnNk#|4BE*GsGDi#vO>&4Ei}mgESUyPcVqH8Nl9vudwX;FwV8cuk8*; zf=WLJvEawhYZsgQ156P6?eB*8p+jc_xLv563_{4Nv=Kk1rKmX7T&MK2!GOA(iTLTs z!?o_$K!Bl{QmI$zLMle3P%JjrhjG~|rDkx1xG?rp#bTHAK-0jV z;MD3!fPuhKD{90*>6zhL7$7TF~-dI_>w3i3Pe#D zAlk?!+xf;u8Hw!Q``v{U?(IB$8n(Ia#oVo_yk9p1_pIMDz&aACqLNQyojmdhODIt6 z{{pWdtAlX`@+`1*2z!G1%+lBC^qHOW6CF7=5^3NNkU;l=RH zowsN(3s?lJU#0JJYKHsOoNqWlj&8-z<)5j&?UF+48BmTls^@50yy(I3yPQTHXPxN@ z`$n`Gk6A^2coy_)*=OPp@8~KZJ9?{vSkB?Mba>~KQ1X`-ogl0UMzyKw(Tu9cYKy8y z=>UKicn;sxP)dT6^&pM7ZYaEa4iC!~<4BvQR1?bNgbH4b5FZp5FncZ@d~zDfYyG(x zC$yRzzv6=P$y>h}X+KnV*^}hNd3qO;_?&DK1tkd70&#KC)txz5PonYF=<3_AhplbLc{|Twip?13->2Y=h*O1{2<^ z`)oGwd`cw@U`GJ9WIT zH3~zvO^uRHsId;4eG31&k=bLg^KECU^-EpDs8(O5E!frePv6tz>ht-AR#fmwc}A&a z$;P5&z1yI4xb1OxV)*TA%Fqtoejh6qjM{O*X^ji}FW?V#*beVmtfE!Qi3?0RaAA2S zl|raDUd;3B5N*o(Od}|1-xEWu1 zT~Rk#`?;DQ*Y{R^*s!f~r@~F68!m(tbj@9`C^rTIJc`w_Dq~P%F=tq#U$k+&+RryP z%4h&uc(a%UD*-KBXrV%AXpSbzi}nhuyl^A!tgBJ>8FCESun4H?C`9|vMZ0xQw^+?- zGMKRHL&I79=&;(!CB@M^HUME*N+F7u-8&9lJJC{T7=%EDyIQkor~o`#2`H4Q5`5>^caih- z@G+jSQpxI^Q(;Y{=o^h?dW1C!5X|Z!ry5xVMOVb9w_!@=5*m5zeIIgjDgMDb+js;* z2ynt#xcs86(xrVApaF34=0H*2Sfr1CRKKLai(!D%b#iT z^w+mLH1yYfqCQ@|78nFl7%41Q6oNp!j)q;FI?SdV+)Q26& zqD*2C;O}F)sB1cGPKAoQwiU(*L}o8pZ+Sb?eD*DHjs65t(BB&2&5CxKtuHRg*q|{n z$qceSRBMXod#sGe2zw1+OBoH7AFf;qtMMNO9{IRHGLV>I*4i`d_GMgCX+TD6XG-cH{by(a4J~ z6$-0Rv)Dg&W1*USQ{!IeIKr4Sx}0)$AV|WO>$cqXl>!rR}*zekQ+yW z+<))k)mD)@#tsdrv#?>HP@yb)!?$E+}<^0SgMiN2TMoo9?4PA*n`WP1}fFOm*Y z78O9P)wYyx)E76C@c_U63@x|BXJ;$dvT%@}2JrT|5x$l<0{jYGu}Bq2jpTgAtO-k2 zaE~Y*Uf6*r0(@snS!&^$U;gG(3UXnHr#@fya?ai>K%&N;!ze=AY%fHn}eoKxNXD};kUPxr4i<`E2ZQVa%PNgT4#rQ z--ZNaTik_eim_3j8wts#AVaJ%45K`i9DFL(iZICwHRPv=Z$FI}>YP#j5P3Ak*Eh>p zMq;PUK%&+x4e^&XD{|HXw)Z$S!mmCYff0Ud(FhOch`b(^Wmii2$O@EAfL_1N}aWB0vBgG4oqG5=~n4L^dTG<5f z&rGhFxHACd?|itHKa<8WmeG*2D|DTTzI!iCMcmLF1;h~V%Yn(UQ9m2#9dbkk-2{^u zC5jBRZuw`jf6OF-Hq2(|WoMhSEDAbbC^i&zj_D^{T+lJnj|3YGXA=hlz>*|2V`(dL z@^@z-mhYedtpR|Kj?yV`0WR1+8avAk>@DiHr7h9*ZWU;W9nHSaXg1_`iJB zg-utAFP+}S@ePNQD9M)zW>cy0{N%I|Diqy-H?rtUM!VxEhO`)cH<+XAZ=W-xEAasr z%MSZy+3}cZ)C@eAF|V3-)kea5@q&}l$kB)I6~SD-wU^$_2e>&3oN-CXaQ1WRlvERghAoe(ZGkUbo z!8a_eXPWg)d6>zBCK0kt565RTVvkSXjIEK;$kyodJISx!M~53fzR=;tx1htJIXgNO z4~R1n7=Vp>FdWN}1caP~=KU#6TWc0`u~XTPYvIXkcCJicJeM29v=r^oK|JNFFh~l=mj4pv;w$ zNIDE~k75Y#52xsv9hjpaD5)a9j3-krcWfxsn*(fj0&e<)`_aoMZ$U4mBry;ev5@Nv zf4qf9&VX%>qM)S3UV`f0QPrf*t~I-S>b%!a=hf9XUiuk0_vb7PgnZ=yf6+q9#?=)K z%6fm@1GUf8{IPlys`V|_fDF#jWcaI#Y0N{)h(*oirUyNtWLE3#Qt=~93;n?r%=K4!yh%0FJJk!tH{%Ts@+EJJItTm9P=7sNuN>DA&9zSL;Ve#i&2- zE*{~^nmG@;5S@)VZG2M0c$Im^I_MkgN4Rp4L%wu3j;5Rj%(>;A1(bHPE1ErHvD66X z=pVHBXJ*y0SycO_oE5ru7#wQa)D|q6txW->NRyk%Z}I1R(-4HP8yB+ z7L7*T4aN|oQPWC(!XEWG9n%?aW&qCN+YjZ@{N3+; z0Rp9z1cS&v4SCDjTVL4u0EUlV{ENLr#sWIF-)bNAxR7_uh3M$J8f9O}(T=f;3Y8D> zK1CCtmxo3Lqu)7haJXEC5J`OzKahPTM>pJUExh?fuvEttbC+YaMKl4s+F*oRgHs~0 z-2erK3_Xk=%f2G=SYt1|{4noQG!F_Hn^u+3+2Tf1%t^Cv3NA z$i@`6?B&Nlx@D5R?a{CDK=;X`UJym}0n7l>u~iP!KoYhnCEYFxcT2hPAejD}Fa07Mi;CO~5Rd?hfVzvWb@1~WuvQ-Rnb-UdK7b ziRFK&-&1d>-&S8;8(jA6%HLML*zmKJ&nYfi`K6VgsNA@6eEAPox>j;4TbA8W_t&~# z)P1cXU-uc5AX4_`!-tYRxM? zS^M|p2bXhC+35Ae4!|s$(F}H{C*Ry#}- zbt4u>@w$Ck6vD!DbA(&7Q6%FJ^rpQ9uuo?|8)b*%7bji?@9sQazAn0;0@mE114hurMPwe)Xu-b;{R=5Y)WD0nv=H z19{A5a;Y{a?LeKZ14jktGMDUzd#DNy&(Jw}`!y7eMnGv&%tybm9izU?CE z$FL{##2ltX4g~`d(FyZL+^k-Hn@F{wLR~cDL(Css6D));;1*ojR%y^9d2kP)ReUkT z@2UX3f#KO>ZO@6nwIS(zA7%lx6^t0cl0fHh`;x6+63Ic#HptS&cbH=608#o_lh!Ya zR8LAsVW52;EG7U;@-}RwE8n_Tq=ryC4xy)R1K?(oDO<`6<{U^?M?@-JISPwm&f4~| z0%T5t^1rI(W|0h7mOSzc^6)AE+rys648XT7ACssm%5reNAeF*GYb$~k4a|mVk&2CT zV?9y0&VhJf3NI(1pSAxGsrD37FTfw>oIMWM8TSac4|kP%?Mdm!u>N>px)G@H38w)8 z#%^KMGSqg zxvhCbqGB%KW&|YLOgJm45e9L+`N|h0Y8Hnqhn$9-0~-nU1>Bp!RZB9!mc{uugMDmR zCJ&C1S!u(GUw*0dV>R{|3`H+W8wd3ba~x5w+9FYLbsAtX!p>8~y%bn4?^0L1wLlf} zLDkm^m@ycVuuK%$~;EQw>h50Z-(9kgRd4NNT~k`Wr4N7wEIfC6K2h!%!g z8JqtqQIkb}2m9H*h;7Dv99}cG>?VndXkS+b5x)%hDkH#xh`zWgw?vIWBxR{gwVPt2 z4(~qHoQwza&98`L3sON4GEAepQSrn^k7GQcZoWgJLY84zDbyG6Vxy4314Nr-w@5+9IJShF)49+pw4Ydc{;B0R%{)}g|<4%!^rH4-xc{>>! z3XuZj5Zo}7=olBN^mo0mq2j>x`KY&)wPQ^?k|GsBzFx?Ieeob3X!??8Ho(5 zDLo_xhF(KJ(TO3kN4;EHYTTFc5f#<|89T^Jz)gTto?j;&Hct{)jtVCt?~B8ZOhfb$ z1HO)mTS!~{y?g>w!K86l?h_5QiR{Loiey|JDS$Sjdz;&XOf4H_!~D8tkvahV7Vug5 z9vnkl$8p?ntV^}7R-|HU+>n~4WD-IeOKyYo9La9lDpEtZdR$rX4ToERfvFrkHn1_r%-J6n_ip&_@Rik>rj- z^+r|%>r1vvw<3-(U>+&w*xWJ1R@;-WQo@(WaZ9`^#SEIY6$X+2NcU)}yistMp#DGVC6Wt@Kow`8V9 zx-*fdWs2>CsxSaG0=KoBYA_?p#;o*X)ZV1GTQG}k3MJHqB(kz%4Gl}EU@RN{U@T6d zEGafv<+}@1$N;b(1T_vSPCN?Fx|rHIk%|C(2t0=yx|L}kmKyh;fPAzXNpktX7e3HFu@oB2Z-RNvY;q@^2>fH{uZogf`-vIlC$S=*Tj)AmxM5;s#9;ga^Vj{w@V;Du$QID$pt7BP;|tB;P;`cLY=Mp-9C=M&D*} zS7x7($5r6A;7SwaU2I zH5MvvfzY%;*T!n+p?%>{tdQh5H3mTCg|NfjguF^zop2vDsuq5`Pn;<|=-`|_oGhqp z4NpmAa7!#@qaeE2d9mdFGgVi+oel@-Vs>LJV1qUhu|H87gSGdjYOpy zqz9)7kuUJ@N$#-Bdg+S5GRK3E;gmNmU>+)76UsFUHy8LK8HX4JUY!Lmy?w~W$(vPc zr9H+o56TPVV!Zgo@ggf0cg)&t;+%pI{ytm+w01VGJ;)dcGOqpaA{93`3;hz8AtWs# zlyHM#5bM7pQlsDvz!|$kF{)bPJraj!GgG(klOovywY7MfaD0(BM0HGef?K~&q>dE5 zv34&s>Y`WHhK{1@_0l27eFEW+y9JQTR8I{;3++v;_ey^lw~rYbT2bl(nvUuty`z;* zF??|K6&2MR8qTaAt-P@A*4md8SJeC!jzAz8!Fm^8OiE#A;>qz@zhOi_n~iZvcqS@^ z7V`BMsVAU>M4A)rMK}D$!ls|_9=OkAj>xnsl(jf}f+3sBDcT>&PhrfGk;uuGhl)S# zD7^PmcmO1tmiu8P zZU^X`6b0apnUxw<$i)iUoNLG(4T`hqeg*boIStq_wo3}PyaEeq^MHFeZRV!Key=f{ z9he+Io))zq)%^mqFQt*A_nz5RaQp(cVTAj|FnTfE&yw&=sD~_it4`IE8!;zH<8ypl zhhD!lxT3TTX+G;>5oz^|S84pAb}j;IwdiBW>HGXWjLkZo9pK{AoIy)H^y@aldbT81 zL)M7+e*-7kTQ`5Y>d+aLRpc__X_f^AE`JR%iu@d)-Xy#47?X=9P^T%?YcTg`h9lyV z^RLk*FCmfruKzg;^<`A8g(qHvF%_24WnU6Q3oG2UzpptWSw=S^;}ED+QpTZd_a(;o z<-hT3$})x&1o8O4^9~B_IHfSY3 z{0>&MlvLb(DWLA&@4;>g*$B{10hb4bP3@&m1iZ)wii~t-OIhme{$Bz}?FrxLY3!FG zAOK8)+mOJRT}WWWt%|D$IF@mW=RSlt1u7zXU1aNT;KsUFAykpCeV=b!Tdo<||I71t z;4cCw;hZ0wc2TbXK{3iOgGJe1G$xnwlE`LAUVk2ktCUn^vqDp$`(~IKa_kFOw0*~s|5r*Oif;}xNb=@BrXa$vd3(pu zVE|7_=b}`eE{NJ+{JOlTm6-a=|IJ_C0(ChGB_GcK*f4~AB13I(#Lxgqt;P1O{wSR& z>SI!1=tI9b?UpV3A8eW92oT7mtkbZqC!}NiwjpiIV(L+w2-7FDlIQ*hLo6kc$6PnE z5+C3FJ8YT2!n{Lqb^D+VyP-}LpRWUPI?A?ffG$`P-dDCQIriK9C;u5olYOtl`i}=9 zEN;{~g-{w(5QZbDlXxIesozHCUq={i`6lGV>`?$dEVnh0v;S~fugHNv6mxO+Ev}0E z3X!gtfj7!rF9pTrXHgHpn{-WJ*mJlCV2q)5W*Bi0D2tK+@#5{&#UNveT_V`awIz(S(7tf=nocRZTwUxZTC{&ZOc(G;i{c ziT5>5{@Ra{Ui7u#s-=a4DwhceZRO`uiyA{I$4h6yQZ1}0cNWOgOm9=+;c9^*qt8v^ z#ujh=NljX?Gc&_LW$g*N#``toWGy)DtmOjY_DX4Fen| z(le|Z^LRYY*_rVnRznmP_&_UH2x}WkDX7DQq=O9M%AUm{cKZ_zSf7mtG;+$*LtPq#=aMxeMQ7{rEgP;;klt1SszA$;`i0vMFF$I$L_j^T zvLQa8hT}#7S~9wBA-6OMtJjumKmn39) z$M77+3)^HM2hS4PI+1I{E{*>z+m@u0Z(fXK>ov}QDo?N3AOJEb<$^CD3R^fHH*vfv zy)dPuM)LGbwvf3E0-w=?WbLy>)NqA14owQBBT+KEymKLDIHo% z2P8--rFdv1;Em0j1P}BA*h3KpN?+M<+aLyy$i!fl22+-AOiuQiKJm}i z1+uhe^`44)d)?mJhiYD`uBbe>VVhzP4WvXo!hyj#sD4sek)e=r#5XV;4)#Y3JseM- zi9rJW451her4(|^`X0ixy@|F0w^IPHw0$mzPQ=izk)UfT)#pIXRxZ+`n-%58zH=bP zN-0SELG8;I9%ie=x|P2^M?ln$YmOqhieZnlS=)G?bsKck=0Ja5J1**XH*OWyHp)m8 zqX&Ia{M+Ae6;KGwHq~dHU^O#o>!>!Ai6RlK_!hi;o6y`OrvaA^Pr5614ggDT8)k#h zOA6mAj={qC{gWztATv0t^KnXRq}b6GEfR9|OVj|Ptlgm%w_j55Zx;~VXq}_ztzz94 zf8Q_yK0K2iqa&U(jz+~N>Q;>kY12!tPoumYIkx+rP6GUgb%onHafxl1#&V1Ccr*Rl z+;FeatahnV!+L}lVWP+wDE&&dKDX)|a>;srZQ@-qxp2ES3DHnd5HWlS&P!S-R ziE1O`VZw75rtC907Dqtl71|Y5hu-tI6n?-7PDOJMXADfL1_WOwA4w%+;Uqanji1Us zll>91SI5=gd3!Ni7mav}J-ltL6^b_9~W z1U7o}LU2NdZN37Xh>@v*sAWK<8bgMAI*NhC4{0G#zIHyYuu=*!eD{pbCod3C4$eA9 zkz>Wwm4t;iPiHlJV3-N1hpluBFb(MN^HK^@dbm?S)hz{7_d-gKbM6#)Y-l9Wr()o~ zf$eWNF*{2~($y&YO8h-%?j()7cC9PSYOx+*!>bqB&@yG~9aGJCbA8H*tj5?AL=UYb zbTJeb8Hp5Yz7>-#pSf7L1oFZ&cU5h-WHBhY0mQqZtMpnRxE3_zh3B31g~GY?VBS?x z`^NHh)y9VY%B141`YY>*!O)^DD32%Xbh%e7E_c*uQ%|dMBl+I2-Ot6xsq&3T*Z~39 z`=umuQrC^cPeZ4zgIKJN;dzRtDn`^ghO#qZcFaDUQqSu8yu;!vpv?j~@DY;#?*M-& z*0;=9=pk{LRZu&L_ujzp;v(x7M?+n5wzmE^KMH%-2z7$E|2F z`ZUUzKQxgS1~VD8a#*}bOnr2WGRleh&jJPbdT;9kNBab5_fTBPbN#}`4%Iv^St*xQ zY0-K5lRegn{-|;)pGuIBUFd2k{fg^kM`tm0=+F?qmTXQr;rl$fZ;(pw$G7{NuM0I0e46iTz){jGh0W~e2(U=ZE%m%M< z*2Jf+v3_!_6|2Uol**DKZl$fr$**9aic#3NhKslDJVlcgSv#QyDmG`-WcaLZDl;)r zd`h*D%YwLy=R%caKBeIp}ji+`Xm6BE~}GK#e- zCE>VTUQ8k&{;2Sw$bUD+gpC`0^Q%rhUjWE#VNqu|G~gIc22&C8%n$^oXAHv%%V?ze zq3lKEQcIw!04#pHf>a+ruc`9WRqv6l$8XdUn^RcXoS6!bO{#M0>7kUHw^>6`vUvoD zc&`(OPevonFP~gUGo`?%YYZ#4i~YIr5lXkOCNnMlx;%%)j26B z^{ic|U5#sZVKw9&B5}{)?lRm{P`ud-lgp;d1utq|A*3Ns%U>HYbu<5B{e*yg*-y4EQxeTuS#YEo>6gb4_t-0$!K@% zzZz8xPOe@~P&>Gp?EPHy01UY})Ab=hcIeshKd92y4jiZx+@xe}q<8^>LwJ zps!hJ4``Y@Up?Sn0HdJYD_v`Q(z> zk&fcVt+`b=r#Y1y)=x7|exTpOFu@_SP86QuTfvWV8rgpjZvUt6#UL4@npB5S$N=cAJk911L zCC4FpiMkOXh~OdAB1TXO0xMyEL%b+Qd+2N}PbDut3}4)q8`#+YX;G^2)tq@??8v&s z1aBIk;D$2?AiEAYOAt4Jz$r6JJcse85Mxk=S~ysH>8%Q~`A%U?D-8*t$_V1a5affN zl86${lm0t}?Q6@?3j2TgCseH5qVv^|4R;GG+h~PKL~jAk+kp5B6pcoV8)8hzx%UX` z&IG345|z7rQ?m7eOPAz#*N|2B2z6LOU(AO%2-xIUgdC-i_JFXto;Z~ibP3B*$^O^= zV>iF8pswZmzCcgEy6R&sh^8gf;ULJ$&$aGfewtB*oQ^NxZ z9og~(SV?shN?a+495aB4E-h@YDjYfr`%AlLz6&pLMKSNH3@f*g)%OXjOIevP<})rT zOx!2<6wPLre>BHx@`-Q4XZ7fVLi4H;3M%}*Ty(v+6;?eYcooe-ckiH&nbPNz*|<_Q z6^oFWFXEibKa-QO8e8FSUldULf}h{M=qM>=e(_wiZPcpRrI8Ayjfy9P96yKOSoq1q zSiFtF`A&!(F`H7Y%WGy?ZfbZc;_TP6VJ*_CFdX@35#ImJ*H@v)^zknXTTmKy9tfgR zGS^ICESzEUAzR$;$fv9*T(EyXI+1@C3l~&giwBG3lz`9nemEr-io-5K98Ju1b_^Za zx~S}za>D|nT=Q62MuE0pbRKvf7j~D~>1QAR=uQ`~(@&zN>{szVfHNIYO9q19Dp5T9ed^1HXZ?XEgwx;?9C{K8aZk)1b+gXN;Tavg;+!*1yM=4^ zNujY(Mx(|w0M{1rk?(p6k`4F~G{6mx4+Npp{47LlBK}V$9-A$5LQ_lGCIE5JvH!gK zE2JB;vV>Kw2$QzwLr4<<7Bk!j2y3HJceu=j?JZ?#L{Z6G$jxv#|4*Qpi#Nvlkcs_$;h{9lPccyf3AS=6o}u9yZI4O#-KHHsK>je+eaK^xJSS zeuSiWrR$Qy_rEQmNThctIBjNKaow2TW=_ny6GZi0oHO}nax57}oX6jrtI49 z&d0weoYUY}&jyCrfIb}z^6EkI4C*WsXI|XcS@_nEV66ls@;u<{B%iJ9B#NiBh5YCX^d(e!f{Uk={^bpYb02`)R!ljr za8^_}A=zl|=@$@TMXElaN*KaXhK>NlS+Zf2GK<7U`(G%_Mhj9+_=(``a39&Z=w|&0 z!xVYx<)4({rNY6r0<^hDekSZfpvM3J#S!!#N7-FBR68UOz#5PthIeq0XLO)52t;`Y zI>MG;z|&i<0p5|b{{qNLQP%wuMi7KiA!hfZQR9@;UQN5Zcxp~kS$MI6jGh!$HOGg>c(Y3B ziT8QAq#>R`ku{&Mh1`7-TPvfHV|Tw@4Eby?ynnJ7LNc$zSrcWcej+sEVRP=Z$uT_R z>NUe%X@@k;yp6Y*j7AO)hoydg{xHypNdallan)Wz@tOtOIM z)h_Y08)eOk_%7tJHOltF>VFe#)II<-I!O%7SZDQPY$!A<2t7jsX%{C>vGcE(qKroT zyFZWA`q$4{S-AeMQ~<@2&an`eosB|~pBi-aiz5D-<3bfhNmDOZ}?5zF(CLiCtdU46J7A88yPFwBT znQU6`oq=!V0|;K(XL902T*^fZuO~hb+=@F^7upa)R{RNB?j23vpw@0W(zY|S>{6*&uI=sqcWH64 ze-fpOg*kLwsHw75RM<$JQ){H5P&gG*D3nYdF38HCFY}d`l?!ZG(ROcsVBu7FYXP?zqO++$1Lzjy-k;E_=^1pM(6P$_KCoB=y0*fV3%;??P%Q zYz|1TFmtpEI6lf!5gC+}s-8Sp?K{oGhA3)$046&W+pBYXZ64O&uO89IG~@ohsCfLHEnsUIjig_>Q9`bMw8e)&Bj-HD z))f5&0o(XMg6WTEbBW&2U<#3fMKSX24Pa|Ijhu8%?hu1JI@^5+b{U*Ez)LJuahw?% zb;G|nHI?FHs0CH*=IS-Rrd5MWDPlRYiKw-s@E>c?$41*cpeUt2!m}J7V|sn*oOK{P z(?2W?W?LI3C8NRS1*c3yJHNiLzm4`|ou>esV!YFsCfx5}X5zVMdU!Y%$t9`g+Sw@k zOqdL+#1=zzpLmBFyM6N)FRDiJBQ2hG^4aDx$DO#EEteENZ1$mO4?lm&;uEU$ye%BX z!yV<1q8M8Hw+{5uuARSV(O$088kvM~bTp#!xd!#UqB1kJ$+xzlltPZaU;%{ca}(9% zh2!qEhk7=nAn0b_Usq38)P1`4Tfp_|s2osCH<;=XDs?<@82||9Em$(q0p-rSd0M5x z9L^`F4ZR*c-M}^EtsOp;FE6DbROk8JqDlEneXcv@{4SK*H& zz@L<~_i4Y&mt?uIlqYWpnsxaI*|p8r)hPQ+4sO{g#eToI&4<`#-8_Yz6n!x{XLM+W z8BG|YLned6ZcvLWJaaB~OGYCnAHNG?_YU21a+~_1)#S?$oQp`8^L+o??5bGykZ4J) zy{U#&xT@)M`+VY1`c^gjHIc!ns-HK_4qKe#QD*{ByS~=VoD4xy){LC^)wP|{Ma;AG zA|5^hL|*CXE}J0c{VTn%v+TU30O{{s;2YX%LLhUorkCKRU?>#L25J6CHw0_~E@w}w zIJ9lL(xPtV8k45`t9SfME(>z8ie7c_G$8p9$>7iv`)IN-tt%Q!k$}qA36P_*)WX)U zEJrm#I4f$m8sPN^!iBg74i#h{!CQrE8n1HX_J)A%0*ENL26{w!D#e77yaPK_{>cf% zbYHp<(+%AbsmB%$X|GwpG619l>DkDbCKjEqtEDUv*70r9_4@+ssHbt-?9>;pUjP*^ zWHOCK^g1q)(5Fl>?LZt*!Ovgh>uMU4eU@@Rp18y}h&pUXE?(F(2Qun4#nYSu;%6JWtHbDcGD-fNkOhO_*OMdWSOK< zHSFt+1YO!Rp8iEs&zB6owT&_oIrhSqC9tKddLRJWi&%|Cmr20Yi?UUz-heVYIy5n< z1J!|qAh+GHYklEKGwy}voX+era>Jp?q{qaiJh_ng;~jmtAZ0Yt z{QD22$kdzqAjcpLor}`Y-8(&-$pdpynV8fC_<-2WHAdg+hEfWl72wG6;gKpD7T8ue zVH8CoMfwy);y^g-%W&z@K7(EMVbF@|c!^yfbw@U3o?(SR0T-FfH&p}n9Sq>JIT7=pd3Y0k`yC9GqpTqXV# zufx@iG8%a?yiAI)RoJLN_RU)t-_3F!43g{4DZ`pH>-ADpn(!^gAkS1Z80!;thijj$ z`BU+7ok7gX9hcK9gJNci>tpieM+_?7HkNZ`G=UyVh$@Y1NWB*#Rz@R=(H|FMFgF$^ zyyBKo@J#Un^M=N!#>X;)yjp8?d3sc$o_zj@uX$Aoi5&MqJuU{i9Uk!^oYXNdU@&4Q zR=YPjz)TurVLGsf|tvIX8FURFxN+MfV zDhQTAuhKfHPLiw(Ba(eZTzm~S>Xswx z3V(2cA3F5&6fe_KjPkGt$57$9hlvfD#)r~r7rDaj+ukVqN?v^N4eZh|zn*;aE1NDr z$f)msSKm}o`;!J!%|EKos=uXDKnmIy#N;#Jan1+Ozo^{WRGHBc*4yJZ<_x-#G&tc_ zKZYp#3_W}9!or7sQKbUZq@+?=vSy9i*zX->+|g)sEJ`j9`nnoQzoOJSBAbCVyP@!t zAUXgG?ZKZHS%?Wa6TK=+$}t&WGCho;_=asE8>85J8I8Qyfm8R`ectxM)ltgNu6c?= zDJq=0kdvEaQkmJY$uYG*GDVm$W+D43R=KA(wZd&--!A%e*^QBiyYBONM)gb|m$xK` z+3bWdOt*avxp6m6mW)RH{!fW8$c5kSrd$}952Bwdi>S7NP+Xs8d-+T{mmZwXTNv_h zah!koXGnb1emCI;SG23>KFfO9!pT)6S2B;lf*UbTT5opVWW&hnD3f9 z$>z_WTSEh^){x7u{1cdH-1p9!iVrIq*4L}+>=hqY6>2A!{i5d6R3H28rURb&DCT^1 z@fOlfPAB>~Pw$}09E|qlY-+M2?c2Vpj%Shzd!@rkO85?r6 z8-9Lt@zuuUZN@}8nH`)_&M=HKT2u?kC-T0ghEfvQDx4`Rdg&^kThYV>2h$9f3|dDfGQCl^mgx85M9991(E#&% zeZ4RU1m{DGf6z7>QrfwJ9?m&6DY&&t4S6+&KPdl9j^6o6YvHm{aB))+5`NdY|GX%_ug4qJ9}o|Gb^;S@5yA6NhYHZRzW^gkdGdz ze0)>|+~5NRMwX<;-uF4r z1Bx`@b`Ywn7db+d*9H5aVzAaNG-dSf<)-MFN7M597&KiK$W#M#MH$Fw!3dAh2qv6; zgnaA0_`S7nISI9_x;}WSQ;)Y_kKmo{cI?81RdR!$3NC!<4X1En0ei*W81xTgGeh}j z?4Y6o?HCx1z}1sg^L^l<8-p7+u5|->(d7P@@j6-~`sEq{J|RO1+`y{_co)bPwBT+j z7^SqA3=!K+2-~fF3!(;J#-wsnFJklOItIw&H=VLtHoqU$V!2(nlDS*m@Axh`bQ%P2 zq{@>s602{kcTXW4{qP5a&h^Nt4PuF(XyLlw*ZB?P)L!LtY7}2kTEQ127VIj&C8$rE z6!C&xMs{3>LFDdRFr2TpK(V5&zOUX=>-Ntvj?ADOo|QUR z(C8JMYtjK>3LuINIkNrk;K*qTsq~~UrKa&N^4fC)7m!!q_+wk`Y7(5l0y}2}OVR91 zR99sk@nkx}H}c;g03{hcxThq ztT~dIBh$AAhslvcSgWnJkR5-$W;c}^+FaZ6ksz=SlQxyu%cYewYE7annMcU;nmbUz z4VU?7=XOE#dL<0@ENQ4A6jJc5YtP522vGS8VTsl5Avn(EcdhL>!pJu9(O`HD$NADn zPvJPV7ag0yi*f(QgTWEXi3`G1uyBEJky3Ah{0K)BXnk%V?A^f)U~pLL4l;fI>;GOR zns$8Ga>qx61YA=tI^=?&DMg1w;Iz~QQo9F1j8j<2iHQ$f$RkiMx%ZU)o!lEdxYcsI zbEUtpb_Bsi_J0C1@M=rlMFf>O_EQMdBc}rLL@;W3kZXay4v6HyH-)_6M?V$Zxp6J) z!Jj_2>EC3CMtmN0Ft^*5YXme^Iq^RY(0=u=SEzyDPInol&VM2AIC|Ag|$nXOliUUfMc_`y@VICj5O z#y}pGi|t{t>Vx_!R8N)BB>n~I)d)1P^*^Nk|~~zS0W#86+FY2`d_b{>({@aMI5Z z$o;{0nEj}y1Z3o)tINfqs~d|#MVf&&w~XPStu5ss4hw-<;R_UdrE)~5E(rb8qJ21y zC_~XnnVgCwLx~;I^LwD|%)*PHZ5&G`ApgzA6rAGZq9G5=@QtwDu&4cB*Us#6?Z}|U zkPs(gdlCsLd{hCUWi&CAypvLh3@a6ET)EQN43HQMO9qYI|MU|!cbTD#%j}0pvofiq zO29FwluP1KbXP=T_lT1mtB@EX-_`m6#nxC)DUfCaU8%V&;yU5DOm}`yd_eF4C4+y zgW(`{tz;m7u6(=aO7=>mPPrO~)JvGP0Y zUZp~!wyoWYLR1)W)OwS}Fai~+r7oeVb zlEbfh<;&e_44C5m@u*xLk6>0|xFlvRv?Uw|8r>WtiQ!u?P$b`eWd=jOlI(Z`lkLA( z>#5~hXA+oOuuj>NWF>feIVZ-?U>c*6?hIWE#KAxE_S=i4a)z9^4>Q<5shKekK7m#4 zk6|$ZU3!dVF^rlLOo@Axari2ScoAwQp1?@FQZ}8Kus?kov(`nXlcy61rmi>+`67x2 znb`igI1Ycp2n=0&Du|v;>`^i?F`NY>G&(4j3~vvZ;=L>s>B)|Npn5Jg?P-@SPlC+J zWv|SLJgew+O?}#yXm7In)19x0uIt#)rlMiqf{5JoI5MUQ!$fI@HG5|4CErBRosN>n zyF)|dvB!fr^xa_NMYy*;L3c+UeGtLeS*Hu~@L5xdVaW7xYy=K{3Bkh#8#(^-GwN8* z(c0g>M4y%0^hGnrstnP|s#EKQa5nafL*(60BF@ujGUJsK`_|&uD zETQ^DPd|n2P{U;qOzvDWnmYb;@Z7-wSk5Oni8^5x&v}%IxPor;hRC6(QHhN~<~Z0?5ir_0(0G}ii$WgZd~O#?cf0APCBIcj&M*-w2jg*KJ-}7wSKy(&(Isg!JIF) zzudODMJJl3p|b$I-m&yH+fpf@H_tN>!?;OTW?b``G_9;568sKL3$C`2!>>T54;Z4& zwayE~FFS_T4!3_hAHlpfS2OT}HXH%{HM|{$Zaxe)A)5)r4hDqh3<4T7?pYZU}$#b5? z`;=Fk2=kZIFtku=vJX6qEa&KfBcM@TR)BLe0mJy@q|6hX(`0-SqIdx#tZnsGvg65@ zA?Nl&J<}jP@*cbdpYZY~%@HFbHwRSXscb?!$?~&><*R7s1{*nk=om1jU&VLuhjT=! zroKJBVFX|wYJah9UCRZc6!j!KvapUNN)yC;Ksn&lPH~bMd0s!4WHUlA?Srq-?_6!7 zVc0s%VJms?X$|ssfsorEI&vV{|WZogM+9SCr;AZmtAC|rD%|F8H982r* z+I(vmV@XZKA1OuL-dNn8gDNX6(E2Be|6FAPGUmf|;Kx>S-=BhYm0qlE=HPMP{&R42 z)VVac(!xr2+HGel6{(udm*Qq8KO&9(1wEs|L=F#FFd_kYaqoNnvh2opz8>5Tj~Q4g zPs*7SliZXXWf>SY=U4JA{oB`3xeYcl{q;w8z0L1LoPS;Z^5Pr#a{E&MN`vX8M$JUT ztz-hqoY%$)YtdtGVBTGAg1-Iu3Ls;Ioc?A|AT&|GRWGt{#U(3pNj57{B(!DDo0^up z`47MOExc!g37W^(@!U$kduzEe2mW3k5x`+2csMA6f(a(3op%@f4u3VlfA)dDqqqhW zVID4>RYyOOFa16E7C*wA_(u@*D2}CGydUqQliqP`XE|o7Y)NYs`D~Ie@z}4>^%`yD zM85f56v;$R|MhYms$K~$lactFApAVreRt<`9bIiZTP_j#YdgO6VazG9rLFiqKEZ4r z&x1_F?sumqyw#a%k|ny95JWi}E|a>h>{nYt;{ZJ@QT7@h^pIhLQ(2DnWs_zuo!3mo z$vJI!yzw%xA^MrNkXtm6nV*_qlXkVu!y42EE=Kx0Lc97Ku9Cw~DNVHxbcDR30r7;} z>SR=jf+=E=&4JSfJDClny(_e#Z?y@@tk1)<4gu$u>m#llRcQZa{EH!qdd z_Yoi)Tz#3`a_ev%r?Rys>j_;1Dz2qr+Q4-fj?3&X##l}#8K0h*c1yu3O1DvW_l5=s z-eDU2!M1nRrE4Eq7s6UZzBGhl_?3J@?JX;3Aw3zjI{cg&JePf;U45&s0+<%7J8@g> zSYK!#Rz=n&%A3QBGiQoc@Ukf;<&wFA&lX_P{4j9eYnUz@Y(PZ+Re-5<{~l`^e)wt% z*0WFD+mU-xwi=p(%@0sShngN}g%YihezIZPG|Ns(t6pnhA|e6PPiP}~-#}z2?UY7;d{#jn8hi(?{43V~-A za)?B`B?L~AHLc{tFaKkrcI;8O4NbRQwwzo7MwqHRQNc9m#87QUnrOoQqwdDGQMAn3 zw~)iH+Uv)LM#j(Hu>)lR7|8Z2sJBrihWS$!3f*xv#a zXNPl3?f*m}3Nl(c9pME2e5zh53#J+Egf{LmEKCL$(nP!igH+>XBvmflSG#9N$S3MA zO*?dY&KI}M*k^({9XW6vy217{LK_DfECq5xarVC2wP%EI-on2Gej)*h)X-h(9qHiC zclIM1eA!ov?F>PUCAIxJGqg$FU}-G63iV}FB*Jox;Z z^^@~kYJ+EmKt$?a0`JCh4&RWLR^^jjpL*o)!5;W9b?iK4mo`Mqel;ijgh&L(@)y8C)JB2#{O=eg~-HrZPV^XjDvV%-;7 zH`v&2_2wMjE|JJj=917f-d20?*f2d!rw)Zr*}Sdf2kKDYJKDG=(wvP)KcfwWN2rpc z4+@+Renbp|N@JmO+49t-5Zcg%`Zun12RXcJ>+XMv^~Y$}wIjRScc}^|j*CMs6X|lF z6aNn}CLE}vO*llJ(uW2{PH_u=zW)J>Zh%~5IA!O(%@Cqz{s37MU_-0jfcF*9SB{6k z^7~E?5i-M!DMT5YsL&MEA;r+_gJ>WXx&okpzUt1AQ&`D~8{Pku|GQot$>r*x!!+2c zsQeRhnA506sHU}Suu(=IP$WSzi2&$lM5s# z57|Sm_1UJ*hx#<#*Y_sCBHfRbR+jEYUD%B}m(IZq&adMo27l1b%8Qj;RXZ=A$0_;i z(4#AE3@Yz1i30arT>GJ$E+Z^UXJZ+`pN@+&0k>Y}%IkIhxW%K5@g4CmezeeP6A^90 zF0syh>r?YrgLrbai9Buz0x$D?a7%4>D1<7cl>LZ$2);z`f3%aT)>gPYd(n~O8FoDuSoaHxNv z(T17xii>K04u?QOWl*QfRW|N%=oN9F-4=!J$z>Sa8ZHyjy|>nx7B`b;n6q)3Zhz>t z)4Myq*%T3N7l|GbeOOd&zNh(y=4`X2Wm`*A^G{m7-SSY&L2~ClvTL#bC%ql(zSiB< ze^1vpy8dU~FPgvH@nG|S=)1lD)#2;>ad)iyi>)t;F7EPnp0)0#)+bs&-um9=y{+lq zNY}5s|GU-Ha$(m@>$#%sJ?_@Nu3I{O(=**tX$kiJrRCMm$Dq({=|8W3u>Xdh4|d!t z`hEYGJIbPP-yix;?@+Fr?0dGa)^~f~CGYOq+@5YXwV&JG*Y;}Lx7!|SJJ`LutK4@&GVsLN?Tb{y zT8+c_^qdq08aXR=gHE!guKfzN8jdP0K|Ya!4MA3h#aT91*<_~bYLr+F2a6z!2R-bn z7teu41Sq0SdwDB`RYE)0K*bqRI@D+&;hO3B(6SX;lZuQx& zEpVAss~D*`8|cr8f&fmsa< zYe5fXSW826GME|t5B`TCHR!WK01rxc5b0cmL@dOG1C@1;^5zuCTIm@is`n6sI59NO zae{fBP#+VRU+A$cymU1OiMtdy`}76TF#qfX4qHLn69U`;s0IhME=d1brJG+~wgRez zT8>j9J1O**aaVjXw|+lwhF~nzKEVpbffueWNDP)JcKug)D^<#cD4<83f%@J8(6Lgi zLd6@~gradjr~`dEd@*VRWk3PA(w!Ep^dL3_E7dsm4MlX+7QkKN{w8W&guo#nuP$T( z^l7M@1O5*AQG;<|s90Z2->7G5jmFh_1h#AD$1BDyu0(P;zHj^I8R`7>|Ex*rHHh<<^o z7CZw!IH$*3-CCFF#!Ig`+4sJ({KN1iD1TEHUepH;|3LyP*M1jo1%j6P2jtkP1S{Sm z5BEuDyEX`BtQ}~b#E>9>_$H3e0g9Y%7YkOZ84WpUh>AkC95ZME0=Ci?8*fcP3)cye z^}2R6$aNrUiXPQ^*|HTq2%m))fRsCxvkfj9oJ_0m#VLqif;1V&7oqkJUJR;BY0Guo zAUurPK`ns|qW)j}1ju#fo30V8_zdc*LFk01A!&_i9yQR})4`i#5CT!d8=Yb#JET;L z9ln_9an~g{A!ZLXU^EoOLm?Uk=f~kYh;@%jmmj8*#+01WN*RrOP$9-CivFTtT&P5|X*`(72S7$Th1sc@hYWkb@9 zI@gA830A0)Q+4OqA~dFP*q_#{Cneq_3e(Adtgz_(63V`&g)A>ZDC|EmU*`tQ65%sEE84>h;-06&l@C*m}88 zG)!suO%9c*!We^r3L@s)1_Uc)-9bYF2Z7iqC^4x6>!c%x-nK&U*b}Hry<2Ht#OsZ| zN3cS!6N85~g*&KBtEvv1T(|guV8$*~hd&TbgA`z$e}r}AhSu>`4F6R%1~*FgnWN&x z7!Yi^P5;GPY1j6G&yJoiRY9wpYV}$rn}l&K2Tl-r9u|$6jUoFNkm5uuvn|R$tH59l zA$zEbqe9U7RY*M-oZPm$qAk^h1#bigPF{}Z9K}&uXci9zI(rCn-#539(qp#h=Fme0 zJ16=frD}l!?83%>bQ z%8Vnj)f}P(R@61dN-Vht|C6`IFp5G*)&S-aItf$BYUDGAj|tWVkg=nPb|ERPdS z;N-UcNGKX(6coF$ccQB05Ur)3Cmp<4cz7NoJk^=SbP1hos(g+yZ&2BN71{B4?P9b* z9Gn??kgG$05MBvyrgP-N@b|laRR8b`(MFgdFuiLrtx=I~3@tz!=ZAj6{{pm-3s9@m zf_DR|;+RXI6s{8wKiqTQ$?Y>i7b-@07bJqId@&jx18HV-Lih;qC{EDb81$mC8!K4h zp;l%@aDM1r8;lSxcVhHG*V3kNxhYlbrOmWa-)w(0&Pc;RoD|&fX#H``5;yg4JZAXn_-v%}I+?LPqp9*fa zD#ChMbTx2i2J52BPVrcw4|{R+iSy~lz_IWVSg9E3#0r%xw9If_uO01GUyGp?@Vc1u zp=*vsRC;WtZ(sd+`kGjo=%FJ`rKh1IT~FX!***^<02k2Ll=DkRkh^%&IB5hqVoaZa zNoO!W6hyc4ubIa=5{!LRK%3IP)D_8%;`Y2?#gAeXsq^wuu|{ZoVkFJhyXx{SF!2z{r^!BNhvsev#tL1&y z4F^uK?-HOPmqrmQ#{3NJbt@LPR5B8(>h&{G6KV3TD59HdTghul>oUjjp?GL;1XWp= zxAa*tjAKOs*;YC^(=s-ZAI1?1So;ppFW-ZcU>`_^HVhk~2pK~cieW6Gbwb6ao%J0g z^kS2t!HsL(Kwg{JZy^__LZ@OZAgK^#zM4i|orO5wkfw3}Sl?R?ll|$?z&rMqwW~gS z79yfdHWV143j?$b_C;7HBH{t6deAB$qLK~m8eZG@?*&vQmjfzr8}tq@2td&hvDk)Q z1wz$e07EDX`Ncd9rmuAix$4ZHjPMj-kL6EU5t|C3j}A0MDup2Cj|-;=VhSOpho%ry zIoQBg|}UStcY`oU5Tl9r{}Qkj+jjgv#g;Q2Z#U>rw!!J z83bAzY;_PpT^{R^Sw0{EwmKmoVREaboWvFN$>MniGL$jCm|s^>OoNTw@`wD%bTj66 zqcG%F#VhZ$pkh1>Q}$ZDPWWbgijUlu%J}F86VM)4Be=05BKKT5M31B|fu>eS2fCBu ze8M>CO8drhp7C^+JTi^g_v)+U_%HuwXKkPq0%d?@X%F6mN3Rsn#bwNRJf&sleF~FR z$;W(5^N4CR+VE9Z?ylWDkB}|$x}Z@NVpdX#L1p36T2(M#)%c|rA#UXGB5t(WhBJ9B zNZ?bX$OB$lztSZR#qd}Umqik>fPN?_cdGy^o(AmzZKf~22ld-vgDRkd=e_vt@u3S3 zzSp<4&egy3iqN@(YRlw!n$1q7B_>b8?m>bgdIbXcjhAnm-n#SP|L)&R_J83_kjpHF z{=EKvz-#i!S3^)Xr{zjg3m384tw+t~lX+r1@Y{EU|DJO~U75fS;@90G_!Dp44Ch3gh;AvbuKO z)rgX9wJuSLNd9dc(OA{RdNl?k!;Tj+e9Ugs`%p-u<*GX`yBLZMG+t<3a2E9`=TuQ) zPi8bm2|p*THTaIpwg0;* zq^DvLyFU;*ZB)7>M->QQP?_H4^CO~=n6^yWv{L?SDj$Fs&#W?$>1Q8AkA!|%&Gv&3 z6k&h%!O-dJ(@lMQ1>naCppDKKrE5EG?s3var&MZuHBXxY8e}>$6^DA>GF3K6$!&)a z3~aaz+PUxTsv$=mq#;pCpvH$pHaG%CAMh${sr~F0)cNLpE5lC8 zQmK^KV44khXEMncxhsqG*LOaQjQeT}xvKVG_3GMMlitn`s^IDoK1pF3&qmms+i%j% zC=-kaxhMK6zFR{Z1{!Sua10_pa{KO9vVCiKeXVvY9aZg17q7gMalGuFVCK|5g(FbG zkxRa?vu{IT?=U$(RKSY+>*3*p|K)3~z5g~i^q|5P^Kg<9XDut)0`zCFk71!5_OOw7$Q=Mwr{XP&?Np zH`ki4MMDXc`G0Hb+tMrPc6H{O{?__H`}>>84olxJ#;$QMjpJ(<>ck2qr%hjWdOd)t zFjhq-#;DrghqU1`?Jxe*!(D;WDJhpzu8K(t)kD zwof7lJ7`xXvQcibXp>pTmGe=Hj1)eF(Z2CAPet&%PXU@Tdf5`CYAe_IINbi3DPO>* znl;V`Qn6Bmcs@g?&Q({*UFX|uwIB4Ja|T2a&I`4Yzuy-+Yp~)J&q_H}*(Ogyt1z0E zK~Vue+<2M(u(h^yKe`U|eU>OS8xM-n`Lk{}8xLCDQJX~-vqF*KPCVauS>Rx}6PaJq zcICKz>+R6873gzUw-H*d^gw9mS}j*QCb>7KZ}38l3Zp zrO?0x0CwY~`)TLR}j~mpApjt0mN{@4iWNdFTD@(5t8E%LLMw!6nB^vMpsycmvFY zb|zxvrY1o{x&6t|$ae5xD^EhoXx?#G9aQn!ci`kmxmj0Ao1T@aC9GB|2Avzcd*^(Q5jb9s73*&JY7nv!gvss5Dp(4`{&=uSF zLK_DgP0^M0!RNjoI%jawD^*$9Y$m4gRkQ|sFix9xh_wCyo7e^$ICS^Dy(%zcGVvy> zCdO|O>m_Nwaz=rpO{k1*EHuGS0=zWbMW&y;TcC?M?MGN>50ontY`Gw*R3sdN-O)JT z?sq;P>hD`^A`gm~owXOArwgOtl5J&REs3Ws3dyA1=u^9@#hez$nP0#_(|DO2zVHT| z6uVc~59#-)ajv@fK8^Uwp&7 zwRYycXii}^v(|ZEn(ywuvU5-Se>Pd`NDbN8wVp#j^e+>@tmQi7hfiQIYV;QYrE&k4 zLv`L{fZv5O8k|CKnA31VTz;~Wb;E6S-x0zO{wG4lUqdxF+G?V`c0?N3r|RGh3>shnM;?qt5)Rzs2pu77MPGA-eBr4ObR;}$ z-a<}nx&B`vI5v!+h7nLkxEo_WrW8t3P304!Kjry{`4uKE1SO&qErt! ziXezGtaeqwiC_4}+Dq6?cuuad7lU>sds_p^0hX@2jzPlzsD zcjLNz^SSG6ox9eF*RAjUV{^LqxxTRIAAkHz zzv%f|&!;-0Jva4C_BeXjo{imq?t7&B``t&n@94gw`#`t4`(2`got-VC-R)h!?0Tx@ z{I1V*eW0t@A_*KW#9rt(K+)--o>-%trr$g4Usr`-S zkGDVHR}}@@A8o&@@AvIjH=D=<4;VLXZ8^VXwE6GNFZO@A|DOIE>S_IfK2S3BHH(Pq z@v}EKN;axrct;72wSNm8Wr@mgE?9BdZf56FPkXQjyy@CS+CSp~1MY<+;u)>oI&Z6;ix35e`BSM1qlt zN1yZN4(dV$n1sPg{mvKfTv$O_XGtOpVHl^A|iu;Cdb?pXA$eADNbt?&RO`6xUD6g$8>ps5!+mP>|jA;E^UFU=Lu zOoBD*$`3p=*0KoL3jiO1D$vOWI2zg*DN7K?r?VTrR4=-KUgX1z6yQNwde{;bitzCI zoq`pu2w)77Hs}?|m*z3~7}@m^!3ys|FVgB*)EabybXesJF+j$eDW#_R0j+9Lpq$gAX2Sj3RBtGyI6mi0!H9as8IO47u8JhNZ$E=cG(JK z5|;itUf+*XKmn2v%U7jDQcRko^UI(+4*OXroV<2!M*Bsk&?)pe3Z)k?e(|q!zXa?-hiP z1EEC07RZ?c&Vf8bRKqyoKQwDw*&0gu{AvM6b)ZuM_6F^}b`Enfq zIKg!H4}@n?)0kAVI7Z=FM8doP7smUq7aEenhg=vfF`Gb;6&XrQcCK{GuY`vwg%^M_ z0i@9=l^2j-)nKOSsuimNT?O??5eoFRXr^iXy9F!S5yv6`4uRLvF@3?dn9VW0f`6ru zZ&hP*gZL^P)~Yt7Y2&$}P5i?^mSA3@Ieg5jfG3zhRA}Xf_!K-2fMYoT7!3w-02ol! z=sq#=#vRMg(&4?1r=$9i6v&X(F>M$m=!lDl@gT*xp;sX@Nt0iIn{~Xo{4max<0}Dj zGQg>^-9|1s-+7*31sn^*nI}MjeSnhS1bQ`J=n>{841>r_;~C)VFrj91@Wj;oW`1JDBct;RB{MSseSyW)@FxT-J|{$~fqrdoQ zPlN}s-i7sl6CO^Z+v8g(+QAC+O$_t3uDbq9yfubZ2^I6km_shaFJ7R?LjFnean^KB0Y4spx3HiC_iC zb@I~}taR~2XD^EHzzPM9ZCqG?h43u8EmnG%(@+m+M8H_EJ8OMa7;)tG40NnsNDHcFntAqbx908j0OlDhi~ho*BO=V&_LN|S=TI~kGW!7gVD(kUDUF;aSUJ27l~$tbBaE29 z_fYgv-)99geiXEHV4?=PjDk=p%B<2;=B;4J1AL6)t$=C)5(NlLEN1$CyJD?RcknB8 zXZiMr5g=Qsvf!o*JE7ONymh-3oAX~YJk9@%NRV5Ar*L;v4ecc=#AB&8;e0;C;;|^ z8)B5u=f{e?nQj))kStDl00;|j!rxulu}s~H`JVbE&U~N&fk>uEC7@@<5MAX z96UDIzTRIyz|!Og)g!_pt#>uwPi_0gu5}&iSUGIxuEZHh$r>HcjT=nkb7^woWdsH~ zeu1>qY7=>Iw6;uR`}|8G#~G7{dY6yHVfTRn77GEiZXHt$z!v&Mn&f{H+O&g}o)n#1 z>sGLIk8G+P``M*eh=}ngp`J|`5ivhQ$N`fm1_i9jQMC}9qUF77cx`J9>ba1$-uugN zJGtm*v=9oVgX&rxK?c79u8;D{f)np$MET}^7U~~4#VzFcktfaMrJtQL?y>LZ*!x=# zb*&s*vC9`KKBZNro)F`FQ32W`2wVK+Wn?N>TgZb~ePdav>TACaS;@J-#G8VB7U)Sj zq{7eXvK1>OjPamu!kfN}QAkdrhF$w!94_4duj1bb3$-tYg)oH!Lybw>P)C?xF9IYP zaAP$51l+|dp~0aw?>L$I_LWl~X88>cvou5=`S|4UX)=XG{I3F(LU81v-vNU$)6{)) z-@AHqosU97YPdx&nt|lc&0(6kq{;+*<}$VrFZsAEriYTE4{Rwf@1{;~) zdHpVO^AOl>YJb8}MVxJ+$^`t`7I&aHsfmwE#ZK@>*&)L~i#bgO+BD_K0lw9@@rn#} z{icE6(=?wkKAS5^Cd`?M+(I;<@e*^=)wi+03LP z&FPbc>^xfua4JYq(Wu?uUdLxO*vNzX4i1yz(9Bu2&|gE~|Iy+^bc#_|+>xrLJU(u$ zN8*Oax8A_B4K^J5{r;Kc)vKn5YJ1+KIZxk`2ccO}Jqx&c5Lg}`3eT=RKJYZY-*^^T zK!7hM&_F!+!eO#tj}UVv>=h-FxwAQP(_2WtHC)DN)*IHqU3C0Cv>oRfy({73)qSeo z+jg(j(fCO5!+#Hf_x8G`-eUKio!@AGy-(M+yTvEEj;E>`yT-PJqsM|H6^+4aFv+AB z0`jSOl?8%vv_I@`3lH|KHj!I?|88UopF5+Kh`$gXsy*5kM#Wi{-WE5Ag0=$NL}fP5 z8C5An){(0iCT(5e{{99NI1|8~1o*<{TBIwirpSr6RSq--!|b%jBo3NObH%9&pIdlD z6yDh1XrcNhHPB8#Tfn(QRSx(gUq!9El9xf5>+fp`Zy0E_fdS)8 zs1>z@A*p3ux(sFT{bJ4~otkHo(_Yq5HP256>Y0)a1BQyq^Ile!gSzW8f{?b`qJ4%{DX_v*KY1W<>I5LU;_V9 zvvbN+UXrTJ`eqlb%1B1e7qt5?NX0kW$m1teg4WxOf1zDWzH|Tu>FP&Z(~FA<$Za1H7%$kZ zVS%{CGaBAL=30Vsfgn6FVfDwf5=P-MXoJe>5^y!QjD~mhH(VyS)V7{XcF{2w7MLk^ zZwqhVYFWxa`HpWNn^ZBO@Fapsl|i8@;9N0X3rI)c{i`kHaB>jID2f>R&k-~-P!iBT z5c*IipNQC*@p)NcKBLY|A+w6fa65Q8nUkc2HSf6Vs>=!&ko~DZTkQ`U!XQDiFHs2s zetfrRDrGgRl^7#Yxy5brf~W3D_;7Rxt<+!xp9#p!DW6I0i6QELj->?3;gKmhSFK-;WNW1sZIq%F6_Dnz8lN{TxeFp@1*P$flV*GizjG7E4xBw&eJ7 zKHeL~2;X3XKFS|Jr1fpjNUdcZEl9RR#VdGF(3~c2lVCrSSKB16NEMvd^$(lhh7W77 z0k!ivyigeAPv5w8_(F2U1rxmJ#);FyJJ;`R>J#@yp^kTd`-`n_v}_dZr5-q3M+JaQ zT|foMa?|=bHsw%GX-a{-Js~5bXM}eRG+yT640oOpHc+OG(#qrU=&WLbEf#D_c2@7m zPb-LMCmwIS45p2{Ew!t6hTWjQCxU2Z$T*x zbN8K%p{3Erzu@RO_`Xro(j-RzLVYkWN)1*sJ7>^Te91}agq~b^E`GS-Dv5mQV?f>A zfzkSp=Z2Apbu%`{I8$_LqmiVllm%C`V{dq8f5T;9&wf!yI>9gZhA&3LSe8JSFHn4> zB{64^^#>STYAQRQ2j3XK4BrgLY_RcsV}OTksU?AzM#q&|j4`isl1{--$^`l*6-_E^TYf5<-%|3u+sbVLQb*Ev&3ZQZogYCOsFK$)?Pnh?%25 zzpHQcRjizUETpdgcs~8%g?LV_<02)WQmuEHC#JxYwJ!`kL8+KId9B%S8xg&9A9L`N z7xvYTUl_KEMk7mQxG#_S(atE-a?Wj5xLk^fipEZq7o)4aoM7NLU?qjCl@$dP+!Q~X$cilz|M13s$_ zUpkBwQ5B~Fu$2xX>{TaoK?sXh<|cBHF5JIyts97_?brWW1EBx;%K-n;hr2dme?{{% z2)Q8fPN^Xwy+_l+b?ullP z5iLTgEDnv(Gj50>V~dG1E7)41z@0;D8tc2t&)xiiyokJM5BCgOn%4bK?{Jf)dyz74 zG=IF6s7`!nBM~1sa5|iAWX0JUhZNwdqiLvYo2U@7XMwstivMlE5c7^Ta4Nn+KKJ?szj~=8}BOa&1p+m%! zk;|gxY}&!ePGY89>sE5}I7Hr$ZQru}Ut>Gq#XGjF?BSuhjkF#jV>By;pc@W5BCtq> z@WLC&*CxX2hj0|>owpFtmtMG-SF*Us7d{oO&TT$;Z{q-19~?K3kROw3qYZEl2R%3v z3`2h#fk;G=;Z&dyLgo=cU7%f3Qu=BT318DnZaMaqe*@k^t6+G!3Xmv4T8UOYP3Y6( zS2%)+SQPp1Y#4kT;c(yZ+P9FwmR;cE2!~I}$8l*G#3YA?Rw6vBM{|CR9|qbA0v2!g z5Y6hl>SO+LFk^q%wf>5xK3(sBbUxF4AEfbix41=D&{bLzivj0RNI}NAqcoeU`IZ#@(5cv7q-Q z_({+X>qf1oRQA$9{tJ~=udCtMwCj4^0MH5dN_{sHP3dJ;- z$YJ;Y>?8vV^3mFX6fMSjl=6@ATgV)n7Q0y8TwIse#%-AlL)&QQK;vbQ5ohZ%!Naxn zxiE<0LQCKb73TSd?uf2>ER6+P!{vG}rC7bunk<6_2jFUea0xhINi>_AK}cPq@p~mj zA2_MeOLq-4UM7#flDnw(xk*g1W7o)*F2`r^3-*$na@Ea6=cOunVZuE_ikP&?MQZ7!KsG3rQe+G(3GgUILjhtY!_mT>!+d=;9n z;YRY{x!0}Qk>31?a4Y#H8y*!Fg`TGFQs;m7YWq%ae+IjPT_O+lw+r!2wxc~OL6321 zaDijTUA73z`lN**KY&DLum@={k*hBLbDiz4_QXsWk*-O-ZhC>qI16H~FsWvAQL>|q z+HAZ`wV%(bU0KGmXUuVwQjYT5s42@r%F6kxahKTPOB&5d`uNZeF$)IullO{^_mN23 zUoWW*yqmtlG;j|kiPRGaI(^{Tg$^jn*g&p+4~D2l8}vRpc9QeM(}YCp--{qs=}mI_Q^9%U}83Erf=5A~DtLJ^Seyqa)0j_aD-rh;lx$JP2=QHk;8TN* z92Os-3(Ef5!&iizqE0uTG;ou?E5kadRUbMHGvzs0^$%$pe|`DQu3Y2I1VDHA>Tqxq z;63z^A5z;BG|Wx&VaTfLICA{+;SIZ$d!e@>J2}L?=KW-lJAZ^OGp-bo|GpLrIpmvg zZkVR{bU5=%0W`>@;9zdORPvo`!|OM$bqjfX`=y)6m3>qDYR7(yI0LBa4xPR{pMWz8 z5DYKK0VoUu8Lw;(nHC+6irolTc-v<|9>nl zwk_8L4j}{Df~-8yW=NXizj>_a@;N%(>=HtD_UZ!_*uL$fw$9ulebGYYyJ*A#tkEZ9Go(5+yCAoYX3$1 zGwqMG-`ReB`&7HH{gU?G?fq?kZTm^vQ*EDZJJfb{^G$8pHdosPZD+LgwEm&>`PMJD z-q(6t>*cM9R%@%Yb*#0m9{XGG0p$3%Oz2>Q&zWuNg9|^bzhmk-Q^5MnQ}lPGbiLA zN=drrh2JeIG)&r8ngu(CK|R43x>FZ<(P?5H7zek zXCkR{3IDs!xY5MLorwkGxZGH%j$A5SUVU0>>}$ehvlQ}$Cdfi_DYH{@pB{t|tsIxN)3!`kA5w82hQ%u6( z^_mx%qDO6vSRWS*?s$}8@(N`!V-Ran(c$a)4|CY%S|)8X&%}(AQlDFXnsB>qp~8yG znNm=Zm|c*^byxGZH;7S>dHLJzxfHN03vOS~075ry#vvJ5tb3|G4TYC7BiAp?j^|bW zluCFVdrV#CdclqxvgLe}SwseMHg<31)_w^SERtUs2?OYNpfX`EX(EEr5N3!5wkQeJt^75{xc0nTabG zie77^LwHM@j`K5fWzT|56|6>#sf&b8XH!P=98=(I@fo?)r(rJH!k1$$+2@%FzdmN= zWNzSt&#|~k7wgjs*ENL{Cy`ZW+ZRo4rGlAoxTCYy85>qc=L`tVD5(*Ux#SY{4UTPL~wp(L`GJ72&#p z%}Dg}xp8Q!TC!E?`o9a;mBk#B5J$C2ql*_zi zqfWTpB6hM;Jv-}@&iQ;5>mx$xYHdW4D<~y0MNnyHCFa#JMKPJ( zSQ4%qYk{X?{mdAt#RO6G3(iqQst+{AA z%}51*&`6Q`v0HG2Iv!6a&GFG=!h1?2RcB#BIcJ`>EX+mw4)DdO=gS$UI0^inLoLk( zlx?5nZ&#znWybQN(OQt0QmK@h6YkepGTiKh!Qe=1%Z6%puh1{l+WaIpUnu1w7OQR{ zB02qG{(hC(>1LOTC!IlA;8zgKAV~ z%H&FO@yX<>aM=Fi!rcLTj@9@; zN$9gxg308tM)*}j$yKt-Gk$l_EFEW^e-v&v$Rq3&qsuNL>gADY;$1iK2KjtIC-J6z z6OLJ1M5;+$k`t~^M@pIhAC>~F$#KLlR1R%@P6U`iMb3r&J|}pGg{}Yf^#T@>#jhMDNWn*_Bo5mXN-*b z>(>`cGE2^fA=@3*B)A+KO%3IR2h8pS4Y`T6^i3UT`VCkC!@RX6^ik2GDk&L@_Mz}!c=_GAS^1R2AzY+Nu6$2e%6GX zmgO~}9KC6ZQA#|q05>(|oXU3z!#ThUG0u`Gar$yO7jsK@Ud`VxsY;7XG9dF!JB#9o zR=W2g;d;q4%lO4J^ZINtYM9Mjq^n zB3muRl$*aSl#>cTT2-pe=~Uh+V<}u+a=Uiq(vv9kooaZW*6tMbJ zdHXaYo#3x?m9&woNTjDvC+3V1xh6fdn^)PJZt6`Uvwy7p6<)BaPfDYB;Cs2oadiDk zFiimunr5r>K~>V_oR@+VLJ{6bF1`&>yap4Q?(#yEFl(dohas$E;%>7V8DmaLT_jnMVMB%y1OR)aw#;Jc8RjJMQ2-Wvf;)Td0m_ zQuX-gc1|pXj_XNThlcxby8fEC>7mvGE)sr=9Q$48>E!0yE^Q^h|IhGNAwFDa>SN(s zw{$)RaOFsgT2!E(<*nxHNFH8~Rq;$W@c~0JKEqkM6je z<`V2jH=`Kd&n8kCNb$%FvO;lw&N)$1@Wnj*DY!_3jU4~gmjL(l}WQEGzYSVmPYi_mm-TjCdae_GGIfw3>$daJt`BhpUZ{zuf|K zS>4&T-x^+)0fJN-RjsD*BpMBdWY>Oq&9?>naFXf9 zvVA4J5@e?f7G^4yW%N~-X3EYN^!}rGody#G{LJqn7|%v)zdcGF&UqBkccJfy-Nr&p z;hTZ zm$jaG@IMX=)iy6tU$Y$@Td7uu%N+HvZoP^tSfut`T{aoj>_8yicQz9IuA=)xQ2Q#OZme2N6irzR>ye zj`bkqD~RquHWl*5SKmkwynJ))8tc)sD3+@ZQJPRx6e*oNhmDjsAejI(fQIlleHF-} z)h6=VbC=brtVU|HU&T~}tR)p2;Io#oNdOrcThx@*$24ZGD?*FeK#n|xmuXFk*i*S2vhOl$*r}=o~aMU zj-xwQUW!$@ZF;7h)J!Myl~{%Ma7?sMs$m=<%!B3dc@Nc`RmK z(k@lyi1A6l=o&5)(F@*PwPTlgc8JJVzJk$9e)Mb6l0DCbf5#88s_y~7d)`qN z#mVcHI9HsROcbQ?Y%EbRR{g~G?eNaN)fb7#X5C5d{r2)O{nU3*i?XAXh>}lnd+bSn zo{Q>Lvnp}Lm2;%YE#HFAZ~iXYv%yBLBIoa{?f-6Agwz3DU|jcXy-6q$CEp~VvK-eU z{%RDf(*KXKH;H6q^HySKHWXt)0;?$ zT*L*1h)@EeL@y$WT!P{&Iy1mUuU}jc+z>=0iaR36MMRMMd#c~gka?Nh`}^dde9oz^ zskiFXsZ*!UdCrtY7);U5CPw&VGHO^mao1m-K&W%OpY=aFxN}@KfBw>-{Jx5+EY_9E z3TM_3(~F7x>4STRc~o-bA2!6;jZXBEPd=4gWd`nIM%8iUpC$306 zGcrw99LZ!z>NyC&yU6T;%iUT5`Sq_3p0NWGbl%eXn|+R~RHc?`47Pf{;gXS$J&NaI z9+jwWMCAD&A3gX#+$XL3_Q5l6e*Rz?P+2G!fc#R5T0pbfkv4~1euN%<=y^N|uFNI7 z?z*fUuXUAR*SSdGia~J3fL0G|dnbTm)W|nQW*Rb&krv+|@BKA8TA9n$9=qYwZiH=} z|A&Kp#P-6$HJgzIhxBtA@&jxMnhvN3LbuyUBELJhm3;7pgX>P$g5C9%zK;sX&Oaf4 z>(bvLG7UM7NV%km!8Ey0mq%hD;0u7TTY3Qjfvw-6tJ5@LkF@Rv#4b|7)^DO2WNsu{ z1Bw9|bx61dl16rtJn~bBbmk8SH*8$70RXNp1HcsqGrAcdBmmt2MlDUVqlwWi08pTw z_R-hS#pQp(-&nZ?d*AAZxP-KRGX5f7tPvbWv*HjD1vF+LPuPIR0MHTiME95dMcUJf zP1vJ9mvW=&C4(=~snH@I5YXqy*au2H62+0T38;GUQcvAP_tL>3Jb=Hu9eL%yF5ky; z%l6h^4-TxiK;5n0HF!fu;eD~|)f>w>DM~`lUko|tbi7mPo>DXZ+1YwgX;-A<60++J zY-2tdG3r+#_+u2XPL4)|M^D^|ooyd&KuEpbH+T;jS&6a3YOl+@1J1r*zi1V2V zvbY#VKH%%H$e=7K?%~C4?IsTDTpE#3@2O^NCcDPNt>VLPAsL3p0?t(z47<4l9b0tY z+ikr>VOBZ4lr-za2C+w1(s=4Yc_1qz@wc(@cx2?DJiLcpcpJ+5jH~7I6kV13xlEH! z*chcOs!e1xBF2>@KY0~D=aEqa5&QPggRySbexdQqjuP>|1|=e!rx2^0!kx>{*qlk+mya3&O-&6Rsn8#>pRr*`L4gLimnzB+)<}?Ty378#Gm2pH2;jZ zWtL6}BmT57F0;ySx*`PAVL6dF)K}~y4_|rt#s^*s!AO_S>z3A2B+;5O660*4s-4RV z)AB4?+l?N0WK!OUh^{;S^9wy}raJ`3iFeX%^fJj=ojECzI~7tn`LCW35^$E2kze=1 z1iPy@WD$(0XQpx~M(*&antGqmUg75VXkTcwIjaBbx$LcLLKg|JvMNjwCuMSRO&rYvnWCK6#g#brULC+t zc~p7OGt39OoZ*DvJ+}hAfJEZfMEy+imEcB=rGboP2o@-SEiRH=p0b zKJ;7?R@(E!;U03{P-q+ze(BPLt7YoAL8M}Gh8mun6LPpV-hdLU4~52tc|3CbioW(` zubX}9+S^Ya#V-t_$E&6Dmn;n}5z#fHB1tecr33&%bdv0R194LWZ{nWCV*%;)J|x^d zeQP)Cdh_7LTnfb+6ek_h4t`|dM{Bl2*1oVR*!3d0EaDbZyKk8KF@PM{xr(@p?aPBDQZRq3TtrzYwXf#=iMk&c8TS`x6 zs_MqQ41H|et&}Sm@u|UY?`p>$cwx~X5GcsUHipg}4N8N$2qT@*L-ymI5+KuPH{@3v zL!%>n9&RYF?qeUG(VX09=FOoUFv86k6lab`4I+C?oXpI|%q2}mm=}|4He-2tWb(-I z4ayg*t+b!zWOCw9t_k+0t=NrF z8pih2oR6uoHcJJyST|DzsKaDTXd-v8LJp6?;;>KRHB@4kYU|a8B1;lyV7xps z#v6g$T;1Ev4*Vds1G0T)Xy=Zr74v#-RdFMTi#>9@`85KwlBUI&Y!J)p(B4gas+eN- zRmj2a&^Y_l`1T=0Gnm8FD7uX$Iy9t0^sH*{E48R9KjY7Fvl$T{lYjjq|JN&Nt?G_Yy_4n;@AL5fiw%0Z=*;PWNLqCVk50Y@-8M#ikj%y zPHmHS{JaqCIutKJ-5mfU;p>1x6m-K(L^(Hd{(;bz-6G*B={zeoMKF5tVZ`bdT`3A()2HFmO7qR{7fw1trjzZ2BRYrB5aoBR5H58w}-t-L^YUX-UnG%Zk0pU zYe+}QNXl|&QRbi0Yg;LDLL8bHeHWQ68$6Q&GA)I=n$%kWSgK4W(yB?vWI78p1~Jst ze@H_JCtuDZ$Di1_hy3-~?LF-CzT3w;w!v0;=$z4v!E2k87;}|WGiESU>Oe{mhsH=! z9$G)b=Rw&I?P0$x54HUb?xoRZ{3)R0={2Ti16ej+hm5RMV)XAKvnnM%9DDQH3o!nY z)EU!>Yfa;fQ&BSqwQ}<41FQ?hUk@FsTqk&GRo|-dRYOyQA6+%x zbv<>o^+W_OfxHS1&C4M(ocrC=@|N@xzgL+w+2Qc1k}qh`J&#Hrd2$H8Oj=js%r`R| z+3i|r`R=}P!7-Y5e>;Y3oj-^nb9V!$Nv+U};>KFC=ru-XjSRWo46%4o6&e{@&LhX} zID3LUUmXGjgnT}X9=H?77>E}b$)vxKnUVXf&X|l07%*vkGKx&>+Q+607z~@ZF7zGh z%A$Gh+%?DVHr6$w>Z~YfQdTNcxdgdw{;6XrtD)p z)nX! zB|?SG)qR`kx<20aeaDwXMH=_2t&MuquQ0?Th!Z5^PKf?;DoyQdKeP0ZFgv}8J?g}M z+eQ%(IK$Oh$=6V0$KGn1>a{$RAa{GPCOj%l&75F+y!h#Mn%&R+bhhL-IGA)x8kD&4 z*sIMEyB@#gk@3VbvWNYmo|+-D`6T`@CsI>c6Y3V#&E=}mW0NK0TFR$nDe{c3~QyKy?8{q2TUwNKmq>#FeT@ zVf7^{Ug(mSUC>v2G9dh4+Q(Ym&;#wK!8NOdNLA|kIaav`2Jx1@XwThb)cN)nY6sJN za_&7ZSST`SCTbJUn(7UIMUf`=&!KldnH-%Q-N%m9LbTw-{0x51DUw{ZUW&+v8(+xq1}|&#o%8__$>rh-V$e;Sx3Vb4jsDITci9RLI*L&{9UiwBWw12cAHyI{H z1&xofijaJmj*-_|_z9m(j#La2?9ck{K51yrT>(Q|HebZ(ISDW7q)N3|o@*H0jTz@u zP(-J2BYE@+oToe`AtN#v962)ZA@pHfP9~4+IcI`R zd60> z8K8&A3!xR!fc+T*Ha*3Gg-;ayO>9_+Nd#SALgArP9GUUZz-9`xiYyC&z#)AVz=tRp z3uMANDaBzOuE=DMDiYjC`gbZ}Wk%YbRa)K6NAc+lKn6uQ!UAw1^*U0FhqjVdGBgO2 zb)^>MI2At=y75`t`!eH5{D58p6eDqh%>6kR?sn&Qc&vRh{-X zF}4De2!4FqsZPxe?p3SL8PW}2x5^FQ(Rg3F=f18tsQG&VN#77!H|meoRCs4LYMQA^ zUClT%gzF`B3O!KCJ|LcE-Zy6 z22Z6Dd*6CEoMMF@a_{5e_3S+*dcuh3uRtH%bz3J3G<`Y0t!@-0Eai%bZ1@C@$K_Na z7}D<{H{AW#UbgxP*m@%kvx&*2CgU?@h1~0N10Lfh{Af89iF)vG4FCJ;9(MoDp-Tii zg!4dexJJ5F47&6-iC8=yKKI;r17d%U~`F!Q;oV)o$)f{k^KW>Wd2j3jl+D- zvFp0_vc0#%?KX-;5GBLp%=Ls&rST<;aT5PD^evxEUU|j~ztyKhdcnwdaDnQZ9Q^RW z6Kl5hl)7$Z9ec-*L*v;NXtp1BfJKXpO2gD!%92i}i$_c%61xi%!6TDLjJuI8_?zji z?9c9^*AV9dP4?x|Yl9hw-67Hf(Jz(*yy`>?A|Y7QXpozdvL*$sVh3OxHY9zJ2GjrLoDHb z`i*<2!OP>3+!O$7rSGD#|6kvP`ayl=YT;gd91D z-Y>roQ_bVymAZd|z%|}YUVdwOjQz%aAt2iLg)HdP;yCg#X_Lb1Yx@AQC{8s8G+s>xG zidovBSQx}4>D#X{fk3H|XT)+VqV~lZCwzSEQ5*r^w6SfEi7<1JCJal(6 zV^3FwQVUFN{PgT$9+@+>54~_r4{P}*Rfw{Me*AT=fJ>?6G)6`Cg2>>E)(z!Uo_t{* z3h`ZJ_E+;EuDIJG{&2BX(Khi;uGfp3Ia5w7C$UBBIzE{=Hg4U^KD-E33Ug_JCLD9- zQlOl*6`6u#GMI8#lkS|1Nbkn)`DE_KdgI-&*g7#V4?;7o=^6ZJAJa44b=|;E1Vq40 zZ)cylWB6KJzibOMK8({({hL~69l~DW7yM??}Rptyo+_DPk@Srhqkhh zeuo;_)`c;sd#;;&#T3tptcC{S3WVlJjr`;h43tm3G4gL`ktgQQ>?Y%HPH$!n|4CJy zZGlFpa^2K&J`^lbS7-fNb;Iqz2fy#zxT5pP;Q#wY|jtU}Tj2pP$lWNwP4GL2-_Xd{bx8i`Ck+IxP`7Y^6N8;aR+r$P{v+ zNligq{T&(GkMgwG?7R4(7cGQYsO zcOyIYd-U7BgXM56yc5VOs`$!Yab6>_Oez(&oEj(Yvsh6cnVbkd2r*I(cC#-%i_7o0 zXkjy^hr2Y^n1KGfD4^+mQ)G7_R&N@8Mp^;}O*xXYFAv z-@{hB`T0;TC_tRJsNx0&v$oKutn64pKmYg2j-jKhf8W6}hLr(`Wt0KQq=D7#VsAQ%*6mY48xm*+$`nEDA3ma0L*u=nr8< zD{{#Z`!$^hh;dnDwzRHKzp77gVpY#ay1oW);l~Dkx@N23gy7HAi*(Xk_~rJlq5;61 za@R_MKrbn}Qr5UHS<{vwwEF3d*AGvP`@v1kxLDjTl;f$ru z=G2p-3ZUc5WmBLal9=-3;a9Q2g0G`99*;cv4}>y|+#dt}&FfSHDHdqlD`(~yT2&^< zq`Xy?RPI-}{jg=9!dB;ziQ|#W_ORc43j35j@RH_7_%g);jY;M@(fO?Ey0~Ufh*j05 z*I>w#m;MRe$|sXY9PfiqUfk8k+TRQr1fz`9Se1zx+a$8_WwFU(mVEIooL0-pc=dKsKvGGiYKAD18_7i9G@ki+ zWOD48^R4XNebev|99nn}KBn2O{@E1HiEXpVz+|ft5!Ml}v3AY$#4wLa9@+PI3;VG( z)3EF30)D%l0XC^#8*`g#Rxus?#0Z~^_lN#{tZnTy+>qjh{rG#FH$f^BmHka5_10oj z=?IQWsI@V&I5<5vw48;wgzv&OS%>c(mn_hjX>NVR5gl+8{c5i(k~1ppUJ@U|fO%B% zh+y_?BFyaVVILiu=Ij(2FwJ$LXqkjsaa7TY6e8Y&BrPYq4EO{-8OTMi?_&=e@cT|G z%DPoU+XvwY9|-hURzK5wlVBZn*Stn99GzY_qV$?GHle&&an!Q35-c7dR%pjuP%xuR4HFc@Acz?S>8FliCj2_et0~3%WN069cFJC zo2F1y3y6p7fb_VFv%CYD#qnv>bzaWG zhp)wb^ZWK~?33g8Ya#-(CA-o z2k7&T*o?>`noTjus=QuL6LrrtUNU)P)Y^O7%6_|NT6?mhqjS~J+QF@>zc}#zex~=6 ztDHSVHM(Xi5neTQ77zdtXVL-hj~Nq@N;yPd~sFKGvD@+)Ugw?P0Aw$bT_w{F~; z;$E?QsoTrR3M=PaBOsUWp0=HR_4-@QK+M^N`|xIzt`S#-g&UG(T!M7Nch38jTjMq3N>t<2TStg?@AT;)06(>N`m?8zo#?*P$WEtxtz!SQ7vUom zHwadwn-=zfXP;K1L*XNCzs&E)l&su@qVxU#ni5p7J#U(pi$GB`ce~sd0x?jx3+2Cp zS|{uusEMRClG0BOAhx3G{Lx_^j~u_~%{}aYcb!i$e;(@DO~!l9MP{Qv?%X@5ulabPC~M<1%V!R2#FV?pBc z8682ZI$6>np5j$}ACF8_PsR7JCtf{pa$IX(J8&k;TB0M^|(Jw~o6PXnxeIgcE>@tJm_ z(q{J8WoRE5kTjl6SM zanoEMm59kL73pFoVIpcs$3z*fk9%6^gU=&JdVUTw?o-~a?7H{Tj_eB;p(8G=K$#LM zCMA+Nb=8(_IO`fE*U{4r96CH6Ha8BhHkzZXiI0N!<3b$qnf4ht*N7Pu-l!(W=oGD1 zHqCY8uS_EmX&H-@E8l|^_nY(<_JImUGag((#Bv9tE*qPPl_Urdw5r{CpJA5V@d^%< zH)~J|JQjt@yNo?pr-$F=3kab8z`C~cuvMvLQlg|aTP!7Ae!UFIey?DWoL5edjqrKM z&>Fdrz3<9tJ62l0punVX9<*jD+Yn01CPWHmor;twMz<&O8#hgljPQ9x@E9EE!38&`jB;7T%bgXI!pKQz5|)b5DquvXPZBIc@^6B#ABY;k(i z88Wf_l$R_GuN67b`#6%3OZyS??~P8|X!&78d!9s@U2(>Gk}J=cjD7xz(h&jqWop{7 z(~T46EPBGwqM`^3!-JiJR$8MWVJK+hB!a&182LqXdJI>ym0F-UjOBkX4nq%@OXKu# zL6I&b5(up*O@^wC_)|D+P?d&Tol1OqJx;Nen$V+BMsDx~Hj_WZPkW+VmYAmXf*qKa zbMQqQHTSsw&DGsQ+S`RSpt6(>g6bN#PmA0^ppQii&YU_dyYJ}@aQ&VN-X?IRkn6x+3CBnGyfRVa!8dXX7ocbsC z!y`Ylfqm@8X&NiFFuA1EHT8!-h4Jutg!-qsx(1lx z)70HD_ST!|;bB{#LHpclVWo8deVb|6@?}}6C2QM?W90A^_%I%i2;TSvB0PMPJJ{b` zF}+k>AWcOqFz})N2OwgjIC<0Tt{c`mQ21kkMznK(Ml2RPYhvJn>8hEEF7D($eE(gL z3LcBR68s6S@b7nTWj}HkT}he z46rTGka+H^WO{owAa<0QnOe1McFW`3Z~}K?@_0O?Y^=s-B@n6f;GJ|4>ZesU;iTXEe3sXySo{MR#N<-e8sF^fLaUj8c&;z$(ewVYjnm{NQvz6U+8&;`v z<#*#nLf{@ucZu4%>o+|k)SRPHMZpCe5gl8Dcg%JUW0Lp^EFT`PeFRhF=k4sbzQSF% zT}%CFjCNU7GGiCcDtuXE%bgDDr`{VTHZ(E=N&zvZvre?%8k;oln z{E2wLZB?}Ic7Oajj5$6FhPrz1&1(_(s(X-=DDP4?$|>2TQVi%wr6eV`*$g?_%`Ul+ zkt*cAautMVeo1jWl4f5$!VVGQEI3s%+0f)vwx%*sHyAxpqRQhSnS;U{ zTFycdry~A<0CKIgC1hGb6-Nf$vimNFgxBO&!1O)()76FW0q(-39 zdJdTlX;goWXK7D(R#<_H_wbGT*!zP0NS*!I&(K96iwBM@DxqspViON0F!4~*QH8B} z94@Nwp$WqNS876D`RcckarwYS6XfEjrcYOj;^wDdY4F#wz0MoS^v@x_d>$)!NeA;n z^vpDHhYL;=Nk&Q)>Wm`c76n{U!ncJ)qqdlQ{h8@u_&!!_LQZVE_WvqFu^tQI5uxBV zl2j1rg~AcmED}{<-coTw2*9)W_LZAJIX#GPZ(CW%O(_o^_vCcg4E+ zI`cY7*Inzz+xWvj9b6c^bMT|xj}Fcah6Z(m2fFVW+`RUGhQ2%ehqb?7`@^;D+Rv=L zc5QL3Z}ksWUn6*Z_>Q%g4wt(Bws!B@;eme)JippI@YwMFf%}JU6J!T&12Xa9{LuZw zfdTix#j9^0eqvzHuzFzKn%CC+vil0a6yLYzmNoBRlUsdh_cKFRcYk7yYt4mg&RVm! z|JC8I_y3~*(f)e`zv}-)*F*hR^e0yTOW^Fc^h^8C=+ij+_nh8QKo_6ry1wVJp5tBm zo?Cj3^kj$E_c&MYUHw2;y(`>vf#6ob|LfV^GvH`A17?{=-$u9!M)ks-Q=D=*Q!%+a&vxLpkNMY+&o44PFD&8Il}jHQ^B*kp}> zRvS<!xJ1m;!VgHZKT;$O zQW}@cxFlKi&pN}2+Z{}0*5cJPY{p75t$vuJ$09&}bEj2Og|uAuH8bjObcSOUTf`Mf zFsAg{>D}+?&>fOl#EmG``KC>i@n%*% z*XhWd)`+#5ytXA&)bc@*=>r_yYj8+J4WG6cue(IKVBA#Z=qYs|EkSjg*-5#lu*Q*B zniNC1Rd>>dhGXQ3zkas&aNJ^TiR9&mR;?+hxoaMkR_sJel;k+~%g@{CJ0M)aS&KxZYs*WlTkl>^z2}AI{eTVsXmqn3SP3meKijCKrlsW~_>GG;`@cxPH>jR)di{t2LoW-HIyZ zmwci_PXr{4H;Oda*__WCk?i|Yhi*$&CGm#Au8zf#avL50eTS~BYf$L+uqoqjSe;Xb z#O9k$GW19=5zgjRV)1M`q1<*kH=eXCS@EmVnz^V_W1oqi`**H+YObLWyE4g!Qwf}N zCV4i82^vgQvtsegR3q(AO6$6ua`Z=BHz{W{&oGR+FzNMbD)z&DJ39TS6E%r6rPit3 zNk-|AU9zr2m*gkKRZGU85l0LPS^ho0=lV(JmYkQFCE9Xzhpv^+iAtq1-ncEncv`-@bEX_lG-N?>MxiK+;~w*5E5B-<`$3|hR7oPU zNOzn&Xt?la`6nR$o%CmQK30o>IiKSF!pBr~+MzOo2AQCn}Rmz)_ z(Q0MJ87xOu|BV}eylAzgTG_){e^zGk(_}#JaO4L*%>CV1#LG-7t?HRlRS_}D$2x~Y%;C{6S>bF_EW}%hBe^ER zbrTI*GlxYwXK)Tlz?rN&A)4d*iTW)K&uqYAb!k$`ylk-3ebiNnnufF}ezj)mCZLfJEr89Zu~@ zcG^#gb*+?HD78C_VwZCKFI@W|vKuAUnx$n_OKkB{Qt9f@y)zPt!J}=MJQ!vnzxm|J zBKB38*}Mn$`i#a~l5Bg8Yaj5T;F&`^sSOJKT8|;RlUtO-!GJ?GE0IUN;-FqSIa$v! zbDba9A~DA0kGp5pjz->+Qf}&x+z1X=O&Tx1)jmc8vy!8cmTrAg$SD za>aMK3G!Q0Ngx!)W)(q$ULsoEIb!{cE-rFNQ%tSko@o|jDjnC{hbOF9Mr>1hBBi)G z)B98I&-#LqoY*H#*Yqa$q*-=Yv5JG54*Gm92NN?+VL-`j(!yNKDM+NRL>O_dSaVyj z=E|~SowL)C1^6MUsJ)o5DLjy!i~q^dy;Y%2g!DWyrfk zjgls@;~=FU)&#vCuU6vIO%<~dMb0N=F1B+Y;Ptrt!n`e&v@^1VJija3>Brd&GIgm> zZdFGONk{ygjsoyXrFJGFD-<<}$wo#R71+4;o?IX&uGjT-jcal)-%xI=cIatMl93+H zyOMc>sGQcwws#~5`?DaiI^upiE})KD;@k^5KX3yZF%GbMnLIKTH^$HYZilXmrbV-b z=v+h>acWx$QO6W;w+cB%)pUxQ!J;jgmY&@aAXigc6Y1*C$gEuzJghV-x;Aqix!jhj z*b*q0rWy*jM3xbERG7;UcZg+( zn-;4m9@qI5Q^$utNJHSnhl4X3Yk*06T*gc}R&S}4?#@{l$)s`NC>g7HuiGY4DBSmR ze>v8$E5$8&QY*D);#QCA&mA&Q?fp$dHEj?{T#k&Zb7BPL@u(;=RSp78TWLxvT>F8i zv*n$#FyvRZV*{Mg8z_}yl1gPp=5Xq)MX%Cv88`MMs-G~z*-Wl3DeD^9i2aWoJyvM6 z#7@POV^&eh%k(1qW1VkJ_+^a29qA10!v;RAXU;KVr^{zT_tpD-ew@@A1D|r7q z!@&R819x;yQ(q}f=H`5*j-U_KHX?^@#LO16EHu&7GImygiiW*cwg}?JSl>QAIraT@w^4nt*EV6VC3buvdpyD2I zm6KCmX<9vN^p?z1RwG~}=|C=j2@a~|EOO$*ADAH14<6daF1$ot+ITNHh;BH~p~h;l z$(houp<1q6HFFuRn`>W0H_KTl#rMZ{@OBT`_V1xh>>ppmC&BAVv+udNnVo4^^GSO$ zT9}%1)KGf5J)(8L#~1Nf^xYJ`eB|k{$kPeXZh}kQRQ1hj4b@I(i&IgZKMAO2`e7&j zfDtWcA@=C!og_HbAEzA%335%Q<47uSicMyzs4C~&{15yIZhjsMsS7f^AuS%-#E$)$ zKDNjg{8$>!^=FVP%oefFBtjjNSvB&F+HXh?egoa`Smc$M5l_+24tEpe5N{xFpZC5C zNU0VYZzs3!o1Z>e?(QnC4Ey(c-{?8J%OSXGNYCzi;;IaN6`)z&oJgeN3coL>M@_)?D25(7UJlVlQHRBDX3&L7MVwA(kZmQDD841`QWQ? z%<*|B41WYc01Ue~Gb&MRpSg;aH%#`<>8CG^G<5cJA&9${{QkC`Sp5hOXSXaD;I6*lQY3X9IgzRJCsf>Ep# z&j@|qx*B0@?HO*qjj)I1EK*MVd4gSh8;icaxT^n~L)zXy0vTH+C?bgGdUn^#XZmSw z3{9No=BjEnYjq+?RGLL_sivAFk$E`JH}{1{N8ZKSmHYZW_E29qCK%P>fK)Rnlgyf& z%ha97kZXH-|JaY;@p8Vf0yk=Y>>N{TD(@!I(H?U83g)gI@l*MFmVw6zWXNxsOP2Gqv<+)bJPps()j}9$o zk)u1$>BLPR>j}3XQ`1W#U?^&ofUxn$ibZW9;nLEH86)SuPWSh677_TQr)GhC_;m;q z0&!{Z5EqCmk$Pt(l1#3aa?i>%O<>+$IT%LOP9B-YJet3@E)48l(*iB)UTnvjsO#l` zOJ%7_n^LDC;zqbGR_LLD@aXWnIIr&AOMW?cXcO77HrxT*R1JoAjw=>27)&S3N~bQ% z8E?vzvb99|T$)^p;1JRnLVud&ELs|Q4~tY8qhNjaDna+q_@HvY)ji)oxB9tWLfuX; zqCWcq4Z7m$vnw4`3Io1x4-NxEBhJ8q|HI@9cBJG^kDc4sSX(`72!5?hGALQ{! z~;<1hEgDHc)6H{MpTVixf8?_&HJ9nO276e|80-uWc$N@1a2BLKm!Aq zEgsVlvJ*ghj@4~Ulh5xD)4q@heJR-u(@~Gs=Z9679Qgx3cjBqyRtvF9RU1%%F zX3S@`GiDS*)QT_(qY$mDgyE5)<*aswUq_-nqOgs;DG38u&TWLh5;z?NYZmanz>Wws ztyx`$9F3tHsgz3SicL^#BmKV@37-gma#!|b@D`pbg#jdZ!K0J6`n)KcisJU707Hk1 zXH{8vWYfw`Xi)YIrwJ0fSq||m#ubc(fw#4(H@a(0SB{&3umbvy$Gh>!>qw0H{seO5 zL>Ghun|z*n08hO@B>~Vf&}R#f&}@)gW({v44_*)+9$TRSdGZ^d5dR+{`pI3%cfQ*} z1*rgxJw#kn48TbtgbJm*RbfP}T@)VLXw$FIguLAAvXF-_3ZL#FdF#dacAh@(==w9| zB8BYKw^Uv;s`k^Y{q^(A2wS@}>{uUK)pg;}S%XFsMz@yCXr>}gc}2pEw>g*3F(w=0Z6UOuHiw6Xd8~FR3-)<)7$GXW{eZoq zvSQFYGTkQR`G1os>>>vL>RoR)dC%1G^Z_HQ$ zooQ`3#E2BhL#>H|1#;|G$l`ar;SHNtZeS!QydS%W+;`8^2)V>}+9UU7ANDm*5IOnW zM8bY*G%lCjwve(T*PaJVAyF{w-wf@V3%FCzIzR!^BmKe+98PVT4C|>@3xE|_|Rb1P^a<9h*)N*G()u=#96s= z6ROh9&9h()*Bd z=i9{Ip9)hK*CK_H;4Ywgt3Nv{k=3hSM>C%G*dlZ$CWd)r^2pJHNJT$^(8TU|n5N1u zu0j{wRa@*c`?X?GQ0{Q$d{JLDMbC+eq2*-q%C|2740Fc|vx$9G6`mAqTLh9#=gz_3 zbnWd}NrX47xE;yEjBbSeSpwR6hitJAW8rS<@J?Ya#LqFKA*)MjmLv$=1&u3 z%=MSr_q#m;vTr7gVkCKk>#Os$-z=J!U@oWTO~d0devU<7O+L%W#^$w)E$_fgxbbzdIbu=>t{ z_w~Q0_YKf$b1>bf0@R zd~h@_tXee^#ywXml-+u#2?$EFkQW{qLUh5&Y=(QPxKspyD;7kQmd%~dBG`?wAPvA; z02VO*GB9aZY1q9IQf-M{02+& z>yhBFQWNs>CbgMdTtDsBzPTR0dE9&}0IWVpmB>a-Dv;8n#&F)P1FoB-8liszny!K4 zd^w98(X17+_kHr5e}kfHg?-44pOhj80M>u1iHj9ADG{j`5Rzl9Fip`|kxL?;{ih9t zgT=bD_RbstDVctI3l>|!AVwx3Dm=ug&9Q;p_eC7$wkyIz_&X~%d!<)nA`e}0+KJfm zKIk~!4p`b9?>o)z=;ZW$^)Qs%p;ZGP89KZ7>7KqWiQv#+w*Nn1v@I9~I2M;6#h;5gP`}{RfOXIf1L0B7HKc2W^GOk7C zN0&zz0pJpdZ&_G@O3S&CUSQ+?nzeb9nVs z=w)0tTdu{|@^~bodhZ@GwB5grtzAo%q;ru%6menclaZDTsJvFUx@eS_615c9&mTUB zet0}`{HDcD5WV3;(AVSsMc~hLtV!Pf>}=f|kDwbKtG#tOJ^AVpswXdB1ZL3(`r1}4 zZ@+TecoTUng2S4}Ywu-hlI~#lM>%~cnrbwAY?EH-05ldRqjNJ`XbZYU5??gX59${WTlgl}|;Z7WydZxRa{zPk!VT5#<(hjS~HR&%V1j^!-zP) zZ7VgUs7n~ltXPwqi-_BnY+Gp{Ibb=9yQC~-o{W5nb`@A0g>-RO9$nrUkcs93(m9b_ zX9Dbm>Rznqwa2ic%UMKlu759g^ZMN}DqDd?06ul(BH~s`D&mG%H(8vC1T=2suN;G# z_1_yF9^v!aNq*$z3l8?O?7d+FO#)aPK~HPj5~h^5k>2^w`-<9{O;2 zc$mi{CmI8nu-iX^yUQS#<7c4<=|(bmnMJexR$RwADS693OyS zt>o=bv~LqYTgj@kHXjANgf|GdoEEo^>yyZDg2Mt(ohvjUM}MB$L>}I`Z6~?voW1_j zpSNW9ZL60Kn*y!)WWvtOrqE4wu&cT3acG3fv}Q`xI_6 zmKB?jW54O{M590asncGxw%m>bm?yEEG~*3XiP!#9E*ZRLRIp|2&fia5iHpW(a297* z^?$YZdDPRqNRS=U4SZ-2Nm(=<8c)xQ<4`c1R&Zp6LbcK3QTwYROCjD?cVpz+@L>!s zXQB4X+fXnEaYdN;CKLj+CanR>Y0Y3$s?keqeu+LFlxQPDz(XdWg6$7L+wpkhk=R;V zl++G_l7U&j@J$0DOY{KjN>^N6N5m4vz`L^;MBUgMSJcg<#%X#er05o%O3;XO>sCD32 zq@ZV<7SDJ^0W(vm6uecH#v-2tx)1%Xp1a^h;PJ@u0UgHl7M@-ccR`KgI6hk3~-CloKrS-SmR>37XmG9XQf| zZ|^UA2D&Z~Bp^fzE1jjiOS1&H%Bj3K;ME1>T4gjlDp*+j1_ZBQjVmZx?IW_@N#aoLyu#)JQmF@?t~F6K8|kaMS2hV z;e=|INtaOdC*f1bjd8tGmZW0?#`|(IdGg6U9T4%k@6e%G7SCQfgDb))<1*Nr+PuM0 zbR{CRhfUZBtdIaWcFE236I)PM~*F>D)Ptw z2YZUoBTwFwIfnziH$2AK7Zfszlgvp+p;nVLO3_57WcDelajv6peix#^(SBTuyU+Yw*NDcdZcprKE=iwa?-vdiisZF_cNlB#8um(*`qt#-#4!1vz4tYGh z|G$3^g^nC2S3Vv77uVq(&xCi3+ZW%14mtJ1n9E|3#9eaaL`GTAk|(=v!T|sL3}lzb zYL`j^fa+Fa`UPH;+v6)fi|%ZTv^ru@jldm!hxC(lT-}_@&lFM1-giF)GBVP9ttj!Ml zA_Z{b#^Rm~NYn63#R{4^pG?~jabkD<_aSyX9yy**BNpYw>22)G--pZ#;`B;<1Q8bpAQ4#c&9zefyq+_a@SERm755PAgNV3Pv3& z9k;ho{W-dYcsz1q%ODryM6rlBkVVfq7m(p!g2lVL-0Pl^iI5mhciPbx(IJmVc75r5KpH#-2)$Qc48O%m^7@zBJB>ky zoYJbzDuWJD)h`tLrliRkV34&t48Md9c{~b226Ll>7Yp0k|JW=16CM!DYi)>@dBk10H}m6wvZS97GAe;#U|uv5|_09 z%gH`-+rUY1OZ)*mamO<#2a&b_cN4%D@JiwRF!cBEma~?f`71Z=)K8WCJv_Pv9x_yc zMFp3F2hRhD91sDs1COz^vppME-rWQ^G`kQv zbKT$;a^HFO5%S1er@bp|{TJ>EJgcu`5uT|KFRv2FYt}XnJCDv^{U6*FcCH#aFgQK% zv3|Dq$?iXObqRJ-ZP<^4H@tW$_C>voSf~+MA~F$U_nED=pwd_+BVC6kM&3nzGW()| zy`k%nTQF*L`C79Qq(g~jXKZR^F-KnO#!vWUeD%Ls*hbGG7aZ*JNZG~ArPP&Xe#Qnf zo;=%&pYX|mT>qto4foNXxO8=MK$KK@Ji?Y=+c3w-qy6{^pG=N@S7~H5YYzDYLsp%h z@s^EQqpO@xNr>Yg;jKFq%P!Z!Dx5yQV1d@!jYmuDyf0fsgcb_kX$fSty|Odar;&&v6H=nUt51@KP`)S z?%1I-Vct{Nn{s>d7@0d+7EfjDacv=9ax;Vx9Ku7(=0jt{JQg|P-`|0CDQ?C$jcDSE zs09ct!gv|ynz>1sxkF>*ms<`2=w>;Kl%=dD$K5CZ%nM_KnU?8ce7O zS!zlvo?uHGkhj(74h3^+lqRncdE}mHyw|Mx#rjlZL7A9aKcFFC^a>)KxPP2}m_E37$tbi@D0 z*muWCR#o{=boc-M5tFe$F8m*QXqnu5Jcvw!zv&u7(o_G zl${1wcKKmgk(E`9h^``tU_wFh_kHzV_soe%@<$B~T_=iP92|4sjdxfLgUH!Y`?$2nGMPpH$w{DV_qZ`8uyKE#clb?wF@o1moo zh*|J{gM%7;Y;pi^%B7JjGR)vgEh7jMbpA=H|HqrOKSn=r#)j3+Al!)qAlXg>7!XfG zK;rKzfYbyaqalC z@+!O1`K{sgjEcC7Dz(Dv~9V z1fgJ63WbuS*@JRM$-AHb&F;hZ(BpgM2k{{-hf#^gqSb#Cxk5IcEjQ};k)XB zzk)hS1*K9g$|*v%NF%6zQI$}n7HN)3rjSaSW)M}s`YWn~3OSNo+86u3vU!#93BSVs z_2+Ix*OkB=zOdQSTNOVBX#TQvN8C#@PDn%@oj8no4tp0}Lpi0ia^!#gk_#b_e9zSkq zj_V5l{a*+}Ltmj##S;mdN-PpIo5Y~A%0(`&Bp2oKSS-OX@l+fU`o}oa_+S3!kDs=y z&-=K^J&yPBle@m(et=!Y$ryfaktOBA)MB($2@>OoB@$l5v)W1IF3_(Fc`EB`^Cleda%(fEh`E z2$d?Cj4Kz(gj~5u$0=%&i_x*gxSZuM_-sn9VvplbG5pov%!vZ@&wgX)Tc`WopwNw^ zoQTr|%Pz7p4$>6om_-#qGm9~bNhGPHicCQXtV$DgkUjiL{U1uH@&!psu_EQlRBSQH zs@O#uW3d=hVHI;qsG+z5ngbaNkMU)oY5L=His}6yuoXsKMRO_WHFi;fwSZAqu#2i> ziot9rV+m*@Hl|Xnu_X_(EX%78-?952t*hp*1=iFR@py{lV(5Pit7{Q!OS#A@IOSq8 z6_;}qolIzkYjWdLtTcncEH#7;E zVN-Mhf=MwS;vkj-ul`2vA9kT9b%BLOBvo=|kzo?dBAtjs92MAKk`SUe z9pg9_!PTqtNkC`H5mk22{I34+{If3XeCtSGAZd&h&8a9Z#X%sMB>Es{V^BdcZZQ^% zvk8_+(FAo&IS>aajMSg%Vi*4T&kRe;m%4()I)b)`_+ZEuX(EwaRH-;_F&R@T6A1{d zB9>U|kNhCq;zc#_4`%zqA!~oO*(4Z2doEHjVK1af0uz8uAf{5KSs(cx5bj*Q2cMIyxs`#LKZrU5!mu8_-FT9u%QwXKU{A^*H= z$hzkr$>^JhCC)J-4h76D5^O@yXJ|i{O30xS6atNpv^l+ zto?l$YEi+&l1Yk8kV-DKI_~%#lHg_RR`F*PYu3o|qrSGr#2DbKkXCy1 zf|=aZy|Sw&zCFHe_%h-6nd%=ufwd?dKV5lsIF0kNJD&=9O&%i*bq2>qvp%{oKS1N} z`^9wH7?^YHrsZ?9zE^>ZlDtX@|YK)R=+xbs<+!3MQm45$)w4UZmCs{IMs3l zuk?@QAF@Rk=1wH>k9_De$8!7~yI21XKjw&@vk+;7V{t0(x1^V?Au^fIBYXjOBLl@q z$~=29|JnuTUfTPeBRY%ACi z)2=v6#(!l?bl21|)MkF_-iU735j;^#{u~1WvMM~^B~Kwdl1Im9=%|3zd<5P`5~G2s zm1eywKgFy|F5y8k3YTy?D!7CLRnV6xI)H2DFh;TtAsz`X7Q%$>+jNF#+g%vWi&t&rdrXv{RMef##0wW1wYA14lyPKBBYQ% z2!M!4+XQFMq97<+5$6(}6P!6uQUx+={KwH)!qI!n+WAxG$su79<1iwK#%Iam9++~F zIO1c838600xlKp~@OM@CduuNsgUADi6bN^To;utm`dlBl77MRB+i9py(Ke&hO~kBdIN!aWLn03?T^0R^?Hyq=Do zLU~E@_qjyWAuz&I^lF@!r&e$fMpwe$v9*}A8_$$UXwz$>QN)!G(0a0X0oN#@Sk%G) zH31>E3)v5JaRQNUNZ=r(v+z?$V1dx7B(6?QP8D42|LN52+PgY+h!;S@VMiA3#K`n( zMv7$hE!8(~Z~Mx0{h5HC-k@&e%l>FD8I_9JJ&-&dS5ORnj& zdJPtvzoH0O466Qqut&kd8a_^Yo>&Wh8n>(lZqd1D2t(okI3?VEi{=in*K-gv;Cx03 z0<*3Bmvhm%%_ptGU$O7nU#dS7{zv;UDJNd5^PASGai_yco9Y>JUN*a!VZ9?2jw(Oxv)$#Xi1GV~_$*TWR zIqF$RtV8&g6Hz*!8hd(lVpu8bEu5aVV@r1)4GLG_{aajnDNJ@qS5X~{1!KzzCC8Hu z>=XmVNN@X+Y}j$ReTdpO=60go%ak?LY* zJhn7LTC!rQN196BeIrbX9Zl>i10;A=j`w3Mw)a}is8+VqyEY2BS`|1X)`~k<)2M?g z1dT`QXv07;a>;%L9T9RaJW)phFaAV6ho=?&F{{I! zxb4kRL_vp-0=-usfD=C?E6juh zd(elmw;jD4eU@J5H7+=;l-0B*uc&&p3I5J^!bGs2P|81Zr51w*zt}Il3lBeV{CE>O zD?Uf(?TVU?4u``<7w4_HQw9DTH(=NYiuwB*@Mn}~jQf8{mcGEmA_M?ZERfA!YOHuipVjWFttqi;k*L=N(dry!t$h7HsbYeQ}p z{+#RZfHhdm-x1GW*!$phc>h^%Vk6FF;HwoBsb#;MR`Gwn9(_Ntlt1GWcOnXA6+u4# z_GsU`SO8fO2ar}Kxg2fC=zJ9hA@W*;6~lnN@k*F710;T7D%AIV-`;!iN~}QGo>#2d z!GpVnxRabgDrgmTyv7);$G`m8#tY#tbiy( z$8V7t#;+VtjN4|qyT)WM=sH z!#^B;bojHwhh>)!Up1T>b_^?q_Y98>y*TvL(8|y!hTc2>%c15_bjUnJbcePN$z;z> z|9Xa!Jt2EgcBky!vc~+k=D#?9`^-%8)kRUy*l^PxyR?GXMZ>Q z{n>x-!xX<|HaTmb{?5#*QWTQ8oJ>k$*mHY1J#b zSWHML>|yq8lGr$#aI`D8tS*)`s?#amV^XF& zR~3TkOfWaIQz{R*HI$*{sUMOx|2mP)$3U2e@87o_^hdXr$0FQ8D#C;V*eQjJs|qZE{j zPTT5fvXTs^-*BH)uBxTzP9y75JKbr2K6c?d#PV)hsRDegPF;2Q@{WRrR+yv@NLq_G z2r_MT80;Q7b(ZwOVDhRxB1j#Z$`zbcVM(4f6zvTgkvRA+kxwcdN)om}CI>b;i#@R@ zLV&W#WU@iCp{^~b4!3=JMN%$_c`}sl5Ud^^!0C$08)w&jLL9k7As4U^-mD{^HafI% zwMXQi06HEKsh8N6x@gCxvw4G99xr;5q@DJub#jBUQ{xVOMr0F5Z@WUXPB@V{BgRZ%-cjzNj6UUDwK0Mp7S-z3acVE zEusmtu?$_HJV4t~*POA2Cnf)g$Uc_vM#!R78{q7OyP?i+_*b#K8*>A;)}Sk}ajh-u z_A?5%^nu-)Cp9*!EopPMV%g03uZ!heCzK-{X?LcoFmUb|seW22ub51fx-F*y+9Zo) z8e>+e+~amoS(@bF&%_Q#%8gjT;?odpo?8xh$=OpXj$S*BfdHm7YU3Y$diR5qf|hcd~qDpaY{lp=FL z>J=aiNvco}I>QBXH5Fv_~7xp2+uQi}a#7qTJ>Ceush}FX?s!ntoZhJnSZsZjQZWXzQ z>8_?kx8&BgKeC)shB8|UQhmA3806$jYEQOkst||9#rmP;aEU7CjXKJj( zolJRrxwzI;&{g7k5nZ1RIy{V>(1#K!N4Sw?El|u|K^F$uA|OpeREDKf21kbaxyU9^ zMLzY4JE*H;2cb>54S$r%%hn9((*#(JCFy7?m9jTU*h8$Hg<@-(UE>dBawO&xrzRIYB&bdjxlk;Ym957I>u zI-U)Xusw5XMMS-1D%p$4y?2Q9{jH3OpgK&tW6CG(ne@CQYW_0OpdAfcPT}t)yIyN* z;&0LiC98#sc)TW^+?20qQo21-dBz%qZmx#S&752pQrUhacEHd2svaX9C>!cQf=rG6 zP^wN)05qinR-#@F6-?<3*Nf%Q6mo)HZrM|opw*Dd7)Y?`V)%U}eLhey%iS8LsLT@w zjZ%F_UO{Ax&19&cmuq#Y@qJRcEd&6eLbavfkQm+(TPLX!p9UD8YI{JJj++uGjpESF zVtsGM>m*t&Mne{A39CE1d$rt>@Dkl-!A`eAos6DRULqMjUWLCvnmfx&F-?cF1#+98 zlo-(&KpCU4F<`hZCv$TxaU49=LNM=Yw9M5)GM7#s)QiQF+!X7i@?gPFArc{o7bkHC|jzXO?tm2 zvfxt7Qk~X<*Z6g`9Sc$Pq#QJF)+tjpz(B)8AUdF#etY2ZgB$fAiTOn;lX4c`5X)0m zdx@^bedU0iu$h~j^VhvMY*dcP_@88IW8F~8pdy#Enns*fS8|3zXutSXJflQ97*?y! zQL&EMoe7PIKaOl22|^R9WUK~-s}>9XSgamW1)G%BZk4Cqx=!291|>@%W+7O*VPdMq zOp`1tQUOUlRGT3UlDcT(Bnu$(3J|RB15r97dqHJ3}Q!9zyk{CjW4y~JQKUwzU$oK(#Yg%8gVrT)iN&vD^wa12p7o z`?MIBefO=xb(`ZThuaD9(lA^vxD74R=w*Y2u&qk+@4XGzFDI5F07eL5xGuH5C;Jy+ zSi(osxHA!5U~Q)Ma*nc^&AKJ!$?h^+AiSm)?OTf}P3P@Gy zzRppokYzH>x;sTz1ge4Oz=ps6-O){RCz1gEwjCH$LK^Vr-i-zwUa#@(I)ZpW>4j{d z{i}U@>7G;cO?sku^ixsSnWZD=uZ9^oa(*}?s@slEz8&u5X$01`Vec3D(i4bhxaoGh z5uLn7?~MD$-y=Imq2g+lYpX}j1H(A(l#q(kkwM035-=QaNVFhyx{!4uEoh(N8SrdB zcG-Wjs=V`qdsfqODen^AA4okQ{*ZM;2QSH@9XxR)2}byrKZXnc#$8clzB*NnkE^Zx z|K4@VEBQ-4hWE8rIB$>xt)5ZKL%s~9Bm@!J!cTl0FFgY^eqr+d)yIhMe*%vY$P|Wr zq=2={Y4ULFM5MS7vXRO5S?rU;`|P+-;*(eA@4Kz`kFl48m$v<@&ovHGkKlRXTt8nUhQBDk#b4 zqMi*+JVZ==a3(+T)v=dHPaC$$nu4yoqOa=&5Lr>zX|qf=K!w|uR!!qfQ?7=JxcSd;oX3J4@gq>V=lc=WLN$7=yVA7ck&atLX{tF(7&=W;uKmu)`AO#K5{)T~jZ9;1p|0e44O-Flt$Snz#*VDW|@O2-W$~L&Jrc zcgt=QVpQLT-?1HSqOoH5GL>xQaETKSh5em|H3?W5tlh2rmmYx+{s2vcm5DwW-`d;s z6+xP8M;nj@@rK^TMGPf}vP$S2wxr%GsP~P0@A2s7*%JuJ82DQeksQe%W23ztUqjCk zM7p#l4YV=IXeqjs$hO^?2vrwD6+(|jH?99W(i0bKIl#Zpaa(&|epJ|o-A93{CoK~n zmk!|y6Dfw=Nkx%!DaBXgcYhsHH9+HK-+W^~SaxUcg|7><={i~iA8{WpHcd+bqLHmd zat3wTNdY5Nczuq36SFx;0|?g^1kqfV7~_v#%Wdkdd=stObFJ%Wb&Z`bnGPl>6Ok*Z zbk4*sVQT`)isQv%%7i*N3|^FQ&HvS2Ue4OvpN9J4SQO|t0|-!BgTKXhq; z#LKoDv84;R=s!5b?UnKQ$D_NkA6M4)ij5VX{Z6o@*a z)+@nIAITp$Ecaqh?%dT!t^Wdl&e7;;2d0qypex%mBs)BQ)9~T(+Q{|ezH#OF_OaK- zemM5<*qvi<8%vFu#?IxxdG&QWy7M>8btZIk7t11Zr_T+|{%rO?X78ST=WJotF?83g ze0GDZHS_zKr)Iu5^P!n5XD*+)bY}1T!I_ci{~bAh`myOxPQQD)H0>I(Op~&Io!&I{ z$KjWzzB~1$soRFXJ(8KaYAQOVnL2ACHk6qfoBZYEPODq&aeNk&S^N6_Ae?ap3sp-_=TZBGrrNnR3aF@~3T}LoX;jx`?29a{I6DaPgiXWQ^{1{+R z;JX9&2LWBgfpCT`zZa=)0*@r_T zK@rlw18&i-OBBbR5~&E$G&=HjWaYH`fL{VMHao%{H-A<7wk1SqI&uM^M<$SG)K1!i zT|2Qy+b8D=MMOW!BSs-^#m|J{M-)c7&&{8lxLW)ip_aaM2Qe*u%oW7AAPCjp+9@>* zzBNURLeSiXj}!bN@-XKtS=sZ_x7kS0jp@K-1q0v%2uqC4_7`?{`?Kr;SaSxDE{G7# zA+l5FL1d`AwcuU-7%c_Ji=F7ldUoO@^3pfg=R~R-ju@6AJW;a1YJsnW9u3Ikwn~k5 zx8OZdKweRpZ;7HH3qljuZ|i@XOB3C2PTh7IJsE&U;)el#gH+qQ#zfY3;LgDv0|1kP zXbO1Jup(PKe=Ab)V?LytFX|z@YSKYMQgWW`&VLuF=B9u+j1i*kxdIvh7aG*uDT%c( zxe#_^xZ440TvL#53^=)?CVq@mv_U;2)(-ZLEap(i1l!*JS&?ceM05z&CIJBCQzHjo z0oGq8zkPnSS?CTzcFmBZII_sXLh}`h+eG2ZrAd1ZV^Fjs0LlZ@x^BJ`(Z$JaVxMw( z(xKC2!lWO|&5Zd%a53ay_TfHj)T*fo5SEDYt0KyCEa zA%I0uPNN+d)_H1^^l1}BM1DauI%qq9y`4e7d~)Y1RfyUS<4A_1Q{HJrlyuJC>W&#C zGVK%`n@FHK6(dkzYG_nHvDqd4E`Aehlf**Dhd5tAKjm9jNuN?-p9QBMNCqTG029Z^ zP#ZQ%R1A9tk^vz2q7Z#ePrH_hWz1WSu@cpfSzu=|?51TsR&9nF{+0WB`*ChPocTRHQ-! z_{_Au+rdf(Rxlhy1rcj4=-0?d8;3c^GQqx=D`YVxq_Y_Ue6p?o-w z=lsp_FG}J9&;swF?*s zXe@#peQ6q4z`}-0ZTJ_7+JsDEEvcai(@jSwPB?UF`S4!_Y8U5u2FnCPjYXtWL(5~c z>7+Z;@0UJCAB05|hr&!0u@z$`)y?TAB`PMukqhTE8LSy>ub50Is7>M`#!Z2ca{xYq zuq^!eVG9(sr?6475_q}7*IiO4N$Fldi|ov+5$OF;2HxM56A`J)akLR!>ysL zM1}Z3WeNHpmJcQZn$1$2{fb1*J95B@HUh`Z2Oe+-h6ZR2-z!m}>aY@ok@9u18Tf#R zfY+c&X^QEWTP~}*b;r95CB`Vf`1onZxW5<}_ui(Q< zu7~RB3Pxss;IT^MNNSG3gkL9?WL_q<8Xx(fBcZe~+?Z_v+&kQn-72!y(vWp@Jh>TBuK`)t zUUcJjCyu5iAO*r!;>c~dPx=^xX@LnTSTzP9U;uC%<1u`$L=_fS8&(z8i?Ec#0RA`A zV=t~!!*E1*K%I7B4#JK>75tQ}Cz0_(8ThNi1+}Bc_Jo}s0y@55qQWT^_iI66A^^jy z^V3kQtuaYMV37*zr6ag{yRniiu&gxs`MafW(F`{5r_EVK8G2 zW9=imJnR_Av0gqc8j*s5TEve*9rYnKFuxe~+^A?3G|z_ z&N}*=smB_f#f-dVP^bpi1HYZpoWB(yhTQH|d>~b9MVPNPmr~vKwO1!z{ZGlD9{px;c_xhgbkO*RuT~89^vbW;xr{uv1OW}yy8v4s0Ox58^9*?+}rz9 zAU5J=4i-L^F?0y_d|~0Wrn%K`VW`2#>w>K>P>2-K06^D|Oo|`-Th1VaD(J>?M5}c| zz6?Wtoh0+Z1VHQrMGYg;sWV{Q(yh(6N#9}@O~Cen(g8fNARn+8sjVrA%3y!NdeI1a zmT`1-_9phP*6=}*EFe(|_Co<1MFDoM23Cq8x9wGtD#$E8f+2~s0yb?l5BvJo&g!?I zVzeO45MT7Zg+>&2M?@;{@^x;gTsI7Hm}LlxzK^*HJ^q?Jf zOav>!-r4-Q{sYYhS$N%yacXJe&arQe{AKunEIh~GG4YG7J^9rK76GSx6>dJ#eGlqT zxnPJR{i(j@BQ#5y1jq0C4&G=6i+S$PG9=@gPHyep_#NSvNyr)@Ud4D_o|u&iH>)kX zqv}?dGrZ}^=vngv#rz{*+OeO1!{ik^dk;M+-sW7n#=@9!EgOhrqg8IlmQ5jVf`9%g zcxw(61I}Pd1ViBghO)I6{U7n_^UZ5lpPEjYG^thgYPGFOxD*L~<-52PYX1P<$0w2i z67WtD4@F2*wz2oU9|+f8J|GVJOdSWsEt?xR{=A&;H68QbQ(52W>K+;NStQ^Xw zNkiy5{)#~pG`m|gulfD1GOZhWiJ9?l8NdFo@d^%JtOPR~fkU|~IBsz@nqg(iUeu-?Qi}`zPZloc5 z<&+_CA9@8(bb~S?%FpS90>Bo>enmT2P09zNcvT1+!s8)c=@90W#s&%7wu7T%5Rq_w z@&EFx(e;~7R^{-sPi_0>fX)aC0*iAlMO%`$IQFP;!l*!;8sL8+K_2~A~ zRLrr)o}?z<-GMi3DJ$9Qh#VAb5eI1&HZNG)d6@gyLHQ?Y+(!PA*Q1*^os8bQ=IQfq zk@2tnEjlgauK3){mZ48fbp_C%)!Y@g+PT?2=~9+I!^myC^(t=T z`~Zn}f3&(!dO8jaahI(x29(9JqC~k>aN#REk@|KDYx%oF-1_+e5>SD*BAo5hBivu~pk zYjVgpeg<|aOiJM($g5_!{hLop6oLhjk7wqTecm?92|;{7ZIq(cj@R*h&HuGo?qr(( zrWf|#2=t$M&Vw9dquUUqmLI-g>OB)r%HA~g2jOK{FXOLTfGAqY6aYK|M9HbP`pg;& zQlaD^;h$T8EDq4{n)B+}{Jq|bcJ?-I;QX>vh%x`}ji->~KHzijHyb%b!Gu>Pu$_(e zt-ArimF86b44x|oNc=My1X92EnW#gy6R2B~PY0O~waP@RV%Ag5)N(K;^3v}1tA zt8X<4$X;{3w{PXbvIWXsPUvXL9;!EMId6-|2^#6F`GI2onpbY?zhh1Ezxnj#3v0e5 z|BV!z+&K#xGUHMZ`i#G#&84eqq-?*Ut)|1*7x& zIA*?ruLHz}Oh&)#PUamfhGieO<#Y;g4#)XrXa}qH?t6F(^j2^$hcMi;IAluHsc{j2 z`&c2rR!39lKMCM|Nni)i%ac+0XD;Y${lDxSA2>s^x_;0= zcX&UCC-Sv$TOG>@E_f?KiWTv^8LaDFX);`)btRoST-K{ZW@!pt9iZ_yU3* zr)i z>kC{bL0D}FpvPj_%J(kd=H~}!BKk)^>)_@Kp_10C5%p#zvK-UUgq=!ro_}NrCdMs? zxP`wbJ@e32XZOB;h=U_WbY%fYT+!ZVfU}lHC;p&sXhoALQTG4E#1KDBefQ(L&xq&VA~*G=6$ z@zfkMK0ZnhCuXjc-7Gk>wDF_P6+jM1N8lKo&I43Mp|jRwtU0R&I+L&w#`N6A^@B7x z0v$bY_%&{G?-4zRv@y1o-D}P)4AZcfxQ@Ny%DaosX5Yp_*H0|vANe}Mq<_NcxA$%} z3UlXN*|pXZRmNd1lXR+W)Wm85bqLwljIf{nP0b;N{fRVw;pcCI3<%NEJ2V{JH?1o> z(Gt-;M-gTfg^auw@&qE@Lc8A*AvHRXr;b^|+JRbP%LK4z9$?Q4y@wp=Ab?m`gv1l# zrGqJ3jadnK&RV8y1!J-t7uz>sM*9Y6yzIH)KK@63-_~BjjP_xP2ze*OCE_yI00YI8 zmy?#FHbJQSvJPxOCHM@`cTd*q+(E5J3$D(uj3#{BL{KLPQ*vkiO+-X}yPvq>nx$|ZsQ#VXJ&`(x!0h~ZM z^mm&NEo%mN8fV)dfw^d9@*twITOPriVz|(nHXtU zwpdu5KM`n)?A~!1*bR{QI~2Rl>LIhs^z`;GAQ>W|U` z5pLt$i6p_%tDpL0dvD7dA&1yHgai|!2U|eD%&Lfxi_~g$wyJKK71>x9eXz-z27vZN1XST(bq?RA^Yg)e~pwzzc|{xbM&2~wb96^cJ%zw z%_D!EzhnL#llRY8=Ogo);UCSPD{IOO^Bd=0n|pTdYjgL{9htj!ENb>`DE@1MDH@(=SbbclzO}4byjbr*E2WO-Dz*F>RWbPj8!EH}%V@Z;kwX>cOcyrrt4C zn~IEl7(QO-js!3wlS3~LeQ)TIp?ijI9%>J9LQMJ4_W555A>^_f`*8)ebeM6GEZZ!% z?d>InJ!cZ*t!n`v=OqoHP}8Q@>BCjx(jTtt2S(I3rvq7|*G0sf>XM;p%o$&t;MZ;D zo$s67(yhgsfWO80utNHkj^#Mx{igUU0iRY)>r551*%R{RvN6>!q;hAwK(j$zs;xnM zs4+GBTk%H%4u7JAkVv0_s3i*ur=Ko<;4hbyL>b;v4i{0*HCS6zD$my1WILd7 zCL4`v$(TC$9r36A;Yzu#v|BWVoN>9usE$b0-D(%LtXFH(^;o;>=;XG)DAiXZ-i(Qw(ga`DjCjwsji$I06w=y8O1QMgBfKpAkA* zoejv_o@|Tu%0>3x=2DDG1<8uT+tFC8ll?HbuD0flxaBmZuhtv1mZp5EePX0-%}W}q zbVXOJ#{5A_+awKQkYLSIt82Xxm!oWPS!#*IUTM@kWoLmX_{@qpl}#X-)49@o!A*uG zXjRbWCF08|jy~^)Vskt>LZ2&kJ7ulTXf+v$(dWhHdopn+sfwgaa<@6A@)u+mi1kB7 zucf(6EE`P*gDabJ?-i@3T~(4$n(IbAOQnppj7yAJtc9zHRWe4D&RDi>XoOSF&x!R5 z_N;|eMw0PrLT#mj-MI6EA_3L2L_I~B(+;iQQcY1}AaAXhb}SL{wlz@F)EiYQXAuLJ zYc;j2PO4jOM<(sy*bHmQiG1R0mcWCG-I322l3q{2e4bdI)x<-DtJ)~TW5wQTDa@w{ z{lfTHlO~hOZwS{(d%P1%nZ?l4TGrZjBX?Y_T2^RO9*e@fP2^K?rz&JD;B!^;nY!AQ zH*b{6n^qr{RyUe*1#Ncg;^twoJQ>hwiG<#T)e=!KmDD&dj;Dwd-dzI1AbttLRPGyklMF*L{eHT0C!K6W$h^^)fE1ui)pcX zEZ!_qCXbJ;=1KvY&Ksph#yEAiO`Ek1ZM{&6wd&l|`z1aerOKB##hOJ6ph`JbT3Ios z&?GqTlBG;?>RK6jTtxm{lgLs@(rj=y{0%P2>TeL)aI}|=hnDggRooCT6t-L~7Dw8} zg51ug@(lymEjrR;cZzHx?Lv)qEtM2{pHW`wo*uk=tY-UKiqUBNP@PONLRAf$R*GC5}Jc} z(OTFa(b2)0M^k7t97$Ry4RY91EYsmwI~k9c0(igQ-v?Mgb%Pb7U^H3u4Z_pRW_DjI zb}OvN)$_q%xmd9&Ez78km9so zNrY-7KpCl^xu#rRN+sA$-xc|Xif&stV2&kOTiBT}7rVCb^QQb->TI$4%7y?=gn#^e`5YVKSl5LeGY?p9c-zMXu@0%U%)>3+h35zx4iCay%U{ev21hSYT zyreGdw+4NQvVjYVao;shehCN*Sw&G}uPyrmbg(Wqtw2>&6w*@^>y=Khlwg8lL}snL zRPYjo5F2)wl;Kh=<$pq~Uo9o9Bx~#{+$ycllmL47-4Y>bauR8I(O8H#Y?cH)Eyg6* zs=ij5HiznjIhoaXoAkm@#W||F(pDm_%ck{}NLrse^ks>SOK+fp2}j*okL2}5#qQgs za)U}wH<*&qY9k%;L^rSbl*C78t!8Ls+E)5g9=Bq?EY`2olW9^@s)ZskOM-GL)M5y8 ztx~rtsDdp`IT{RSRmRTym{dRKwGwTIzUB8Y$h4qXFNs(s5wQ^klQU>>)okWKT=DsS z{cf!iGP{XPhl$X>nr}&$-xHM>c?)XV7A`Jv#!`bd7WN*L$}Pq^T{p?eh_%&bmk5=l z>?>?5MsyO5YEVOviF$UbE!CH|B7|8^mT`roR93PVeQ&j#RnT0QZ3c~2Rk#%_Z2P20 zC>v}ADpM=Q^K71NRj8d0O682pPb6Y7XQfl?#94a7&&7c&wH$?%D-|o68t!FVe$V&C z>ZN6ki*ms~*kbh8Q`Mw?Le#pYYQ*79S(Mq1cexbnvd>A?i^&ubGayVBxnk?CnCy^L zZgZGOZ@W-bAzGhVQZ9T!`c=|f_NLR6U+&{<`mAhPtX{NMG=x>_kLaC7Z6wSwC9%BF zNE-={KbG`1bjB)`*m$v6-YwLX6|!gu6q@-kT~txDWa<=3mJYexY}txceXEkp7|xOy z<&8=r!$l%CgCnG?q-0M?<*5=P=>4gDx#la={>;dv*xf?FR#9Ml1&A1 zcTqOI&)v1M!7SkT_kKZSlh0;r^inqD1wwzKP>stUkjj%a8{sG|Ef*2bn{cp`(#p@r ziZ&wLNVbfvtjnimwrr5VQ@JHay^vHTZSiU)t6Kb&_?y{M zGC(x7bwwhutWPkh{UQKHEnA`;1VV}oRwWYc$m!D~BJ*s*s_fRpZqlxS7he7~Pn}i0~K*cdD*cm#jWrhmhID@^qO}lPZJS%NPRrHj^idV!zVyWJsIK zsf%roP0nR6Y@xca8KymED`5)c)$O>e?9LO1elPKHWxQ0Y+|nn~u57TL-G8RYCk22G zqPFDI8Pl2upqwRBA(gbTL@b>QhXH)$G%?$xO(5Aa+X+v&7}PCAvL0o8qX?x@OGaD; z*LpIYDYimOI5ZFa6#+md9(#lC@V7?B)?dADraJYJiEoX)HfI<;d)VKT7w*pWZxP~2ufd?ppC2gZ)&KdWe!$|k9+elbEQDN%;*HL7g3-g)((8lfQm3Tw zh@Im<;Ko1>(D*yP9mfsImDL@+Ke+`yik0)hN5Y2&!heZ$r&CIztyERz(i>j0ggG^y zNaOFYO~aF^tsLdA=)nzX&-3vqAT&6mBmB?G+%*eo(v%J&B|${%4w`IcZJNLNKFrd) zDjY7b2WW8Bcq1O0xElAyZHRSh32`e3)++$&Rd{a#X0D+qe*RpITfgaKRe0{v{S<%o z_fCJ)DV{!Lir8U*3d1|ys#jBwWkj;#;_1wThb zN0?i@uEXuybTTUc<5wM0p!tD*4EyFIhGS1r@T5m%0sQlu!ZVZuiT>cm+kf%f%sZ~+ z7Pjb4T7!S$OOIOlhp#;4gZlQj;2CP*0YrQp*>ai^nEJ;>$7=_w_1{TWU!=Ntk;(~a zgTqsAo45~`x(f&q$q6Q|r~j^?gkXyoj2-~;<*1aolup=ny0R5_)Pl0Q{6+}&01a!^ zeZ0Tl!#Cnx1tFj-$MS1td|30qlnWBoLO9sYBZ^bt_T_hi+W?Kfx;Auxf9cbOEyx7V zAp*413MvYOBVJAcTYlLbSBT%f_uY8m7^LwF_k82R-ml*+yiM3wX!J(B=rjhGT1#}t zqgU4&ZDY}c$XMa`x4vCirYF*P*+JxrzW3S70R{VZ&W7AuO`F9@F0`?LaL~w@R9CIi%{mlUhrZ}N{C(`(8dgnfV<#I$rFU0UHB0W^8 z*3A(}Q24%yuZ%rEIy!usOeF}^=@5bV3f||hdrLn-A?eGikQ6y*FQ-&Xm7+e*AN~Md z{RfMA_h{1I+x|fgu6VJPi}CrJ`=6_pf|)#(ptFvM+e9*@1b^j+@cCe|;EQML{q;i} zvH%9FsaB1yRym@`RhYU0Xz;h;lfh#Cj%)Px-p_915LVx6I|+C=<^6~bQ8kjC9B=$E zp6~{W`6nKGu%B;mNAJrY?mq+CRxT6ywfZw8Wff}xucYg!Xb0tdP;YrlIx26TYN z-*?CUeyZ24y!Te_b@BaW`7n3-F4M{d!lv10XfY@JnNG&n0pMypV3y2=y|>`5|3ni1 z%;OLAbKP#`ufAoK-Ay-OgZae!xjj3CQs1sgqvluhEG7Ml;kVz1cPHzLkmIn}=U23-OcA0(mD&kQA>sAlNlaK?AHD`l zbdbiYw>JQ_EW3Qi;kR0FCE<{)Ci*@qwd)gTu8~tXzr(Am%pBx9EH#89{VaJuA0_ zNdEJOx&3n|mSR|5u_IgJ75m{@@d56%!|S#FT}Pa2?m>fNDUEaMD-h8^T2J=T609rN zS2@?-(h=XP0fbmJ8rwRIA5R8R3r&QNAdQ2aZ#~Q%*zorx{-x9#C4=VxZj}VI8}BOG z4WiW$S1Uwm=#hF40a8XpZIPY~uX`M}&&jF1+qbO08OS+(UYn12j#(WD$AEugKcvuy zzeOSZJR!KFL6DyMDz^bns()XFzvgM}0siWbU3@lgeUv*@{=$zw${pVAJOU8%8_t1H zY}O9U`KnN4{sX#WfYz4>$sOpT$GFf|L}>zc2BCmCBpVb0WQ4rFK|6o@RBRIuvD&cZ zoesN6#G& z&vd@vxvnPTThG8JNN4dy;=pB1c?oJcT*(pQMBeiZMtFe6KV!RcU+<-7pxbuYSL|3Y zqIygR3K@<}7K3)KVzI`Gc&2Mu(h+Abv%Bw6Nfe-+29m0y9)042n~{5v>M-t>pv z9r}lBB=lYwO7+e>Eizb?QZM8>I2F$y*NfzWO3} z2)mhL#RMkeAyR9xxEP|U)d53RUsdM%yV+)b6pk$G2WhlnOU*VvR9E2n>70hcny&Fg+E6w?Nwe8rqZ?IUF%hoRTtEh+Lr~;R6U== zHq-CbPyYlK12q2T*JWF7`N^l}55FtEy{G=OxNtmctN>umRFS>~c!Q;EwHQ-~tSs|c^;ikvE0zE7B$7>D%l`~S$)EpJH-szMC>xRF8#Q=@J?+3BIN7=~X zBbRUKJ@*%(IgS+$FyVTjcpu#ZS>jEuZ`Y6dSvw4Irkhpcg@`1xhWCj ze*T={iP=xh-ZFco>{p`~&L(A%S;uTwIeXgd_{>W)-w8gDr^4`|IB#m>dYg*G?8DeL^CE$=QiNO#DztBOt3yTs4uJa7aESFO9r5@-zL&*GK+!WNw3Leh$D);rD5Rx7KQ&q94PJjkYH zv^-8x{hKSPQ{>h!&8?eA3&SIJNi1ge8!c`?{f6wt$|7c3qt0cdF0Dilj8A{ssjxGG zSJ`FE6cbm641VLFQal#Z`)|07yWHoK>I+4&RicrGJt4(otRAT=WEKU60)cQy8`2LA zTie)0(iCX4MXHGqmZ%dMr%k0Wvl$?1p*G`mipNzMNkVQ<1kCJ$d0J*2(1WFJTx`}9 z6Mlu#{8R(0Xxx$4NJr&9nKI=!N`;Zu@3YS{4sQEUnsM~@#fvgC)6H!(q;rEVkr_m} zE}N^EnMlcHudw&06EcG&tj=nsBSD46a22=Tm5!_Jl9023s$D{3q17x-kww{ zmB#YAPhvA9%vMKMyzpVJf|9;LiD)#daXQq}ex?699ecgl8y%LKoO-FqG3HCz0)4X^ z9-P%p^D(<-v0H;_p;c@VB@?4V5*twMlM(l`oXVIvF4pEGLg838pvy(w6Wn!oFfNT1 zZPMhBL6vm--K*K_d6U&GacHG_G%ZQRB&mqc><+1GxZb6p~D&-{~m;KUs2BguCt; zGfP}TVgGo@BTW)E@K`*NdFVP)eec_QtRw{V+l zIiW-*NsgO)M~XTNYHr25tfFjTs83up4`!u(Ofls4sV+Z%U4q;Soi*!CU=CysT%qT# zj}Im#8b>bKI~pG_F!EV`*c5zZCQK>XGnKa;Z zGl9C>+3Vv4SxA%u>k87HCwx|QsA@AOh@=Y=IGs}M&f8N;@d}oaAvGQn%Z*NPN|Vcv z6{T`rXQdj_Jqk-8R~&W;Rf?gkKXm!Rik5VbT(1{-^dH}Sr zeofFfIuz>FyCrKka@PlQPO(BiWEvUmv6y-#SN*CvLQZ?@yC>4>ajOGo2SQQOzYGx1#Kchi!zd5w@9BWo3)62yfsc1Z# zH00x{kb&I_Ov7ac#E~)3!iGiiVA?k!V0Zn~O7E~n%;a>jtUDbZRfap4u! zn(&N@?G|&|RFpMvX60Flt6@*qsVoqZm;bquiK&at#-*ku~>&0Ear zH|K}M*>E8%SEgl}s6uuvce{STJp}Z(;W5*wMJroU;%*oDydrPEu^3J1hZMfyYbV&P z$+Rppk}HgObXxCNYH)CP!THW|L@_Q(hPe^ zluXNpC04N^Au$?dzQhpbdbe`7d&XVKf?wzy508$Uq>I&&=JsuAXr!Qxn2 z-8;NI$zAt}g%VBBu5me;q}J$L-OF7c5*s8=O|Q!~I>E$2k}!wO_e)D1Ii+0amjyj~ zRW2D(|Bbs}o9z>cH8w}D*40<+_g&S_UYEqgGEvedLYE`#hBI|(@FH~046O=4@v?#$AH7COc$K8MmBjb zEldTG#P0Ke0MBVlq-$8NjkM4&8tk(bwDCUs=-{w#*%j==2vs3>!k8`=#)gOe3HfEB ziqTXtV>U}fJr1X)kTx6D@d+8%uN3{Rj5s437mF0I!mex3b6ArsGtd!oY@TVzBB z$n`m5?)vcXsC2A9k9}N=B-|gI%k_T+?|4E2IQ8E6fUCD?ty{z0ZjZV}Myskf9kcWg z4i7i2tvqI`r(iLU8Z`-xL#`^0iQ?D&iM>A$@HUY;EftzXc}AmQuKfXb-4@b_?5h5Z zs+g8|N1}78o1d)&@@rH1(MXSEFe-5+GZ~4~IP846@{_bU<1LC(i3~92(*}!H?s&ec zs`*!>?MJ`so}ZR`#-bW&F0F{!n5;MA_)LqMtXT3-V|%JlFoeZLp*`&K$|8wS%)Xzr zJ!Y7EaKj@Ft(X^YZ2Ww~^L1x2FIEYd(u!ogNw8#K@>a}`GL?gzA(b?lmH0zSu)^ue|rm0hLxJ%VwdgHj>V;s zdOv35_Q{PGW{Z;aSP1OP@?tW_cr$@PZf3tt06jbz3rAboS${|1*HJx`?2es9t3AO; zL6S)a{KJ~KfeCXn#f{B)55A1z_;Rqqdz)!}U~2EZFtv|qMn`PYU{DDxsve1hU8@wi{3D47H>>|#lYd?dPeyjU zO>pA8$-j}Rpfq}{ikM8A@FP#%C9(}hvwjb!BJwvZ(C}qs^U3-vNKg@dx*I{c4y}_RyeoH{BjStZikWaRXOs2%!a*YH@OLbiOTc||F~y#F z`fcQNv2PU-&c1bF>2y0jM0XGm%_Dp^3ZcAtBgEm@;rb$W^z~)@U2ZqLhYUu(ANn&Kw=pClY+R1`0d{e%Rv=xr4O5dnX80a4JogK}PO)Q7agDW`~iLUP|?R2feOX6k=^ys_F=dV4YZy1omqs}B{Wj3hPK z8;u3krl6y;S zY+k!>%o!qWm-|<>@-LH})pJ)7>+hM)(w56<0O_BkK;SImQHo6){y1y6;<-zeifNb| zyt{xQZCu6TAAM>yLK|u_a-k;2idrwyfzt&`G?%uDC2ZpY(~nAdaaHne!#B19tLG<6 zYFP}TXI4OOw`DSXL9bPTrXVg@BhE3Y+nl6pkL}<~ z1*T_rr3(q8IxO<^$i2Fv0_4MZyk)Hi|-+)J*6Pt%d ztju_N1QayHc{P5{zf9CCU+FEqdbJ-LWB$p+g`cavQjuS5>JdrhMuT6U^AXiG_&NVF zfXOYU(jONc!PeND*ZNns3*=SJi>q6k*4Mn<=o82ro~k=aU218?r7}>@x|FS80y>#l zo{ak=V*~E2kG!XcOYtt_7~d6~OGU6iMG=3-F5m{)vjvw-Yz_7}viX2cgwQjL7H;i9 zJK~AR&aq`Tkk-pgwWViz{6H}BOr|evl8#w5j8_~Vb$jI+gUcgiZ zoC|*GhSDju-zwFIXaxTpR&;H<5GCf{tJkOuQwWOI% z5%_rd&Er*>E1n3sY!>Xc?v(mLg6?<(gAoo0iT`CQUwzdlK6q)zaw~rC75f2OB=rM$ z0Z?r~U&V$f;0hC7fG+?wFABDcO2sN={??8eZz0>lx&I&N3v&Msn6QL_IVrTdfgDI- zV2ePRHJC-Lf4?I4w<3XUrdzNXc#nu>{Z=ddm%@yBSmA%-5?^?^QYcp_F9tB0>1&r- z@45O50wQ1MA3}~B@&Vm;3a^UHG;I-@3pf2C$+Q z_~aBEP)k8%UGPpUY5uIQljaTf^~7fL zH?<84W2ua&sEvBFy@TV)Y?%CDHyx>oKm~bmmGbT*I~SK$l}>FE-4ArE0sqD}e#GFS z$xjDnh$f|-_b-Bb{=nh)0usbSVS1%VIm`oImIc%WAamt0h{8$TX2x5H=;qu0;|{q0 z{0=w(w~_rB2RN~gW@-X1mO@v7n5Po&PPqK@x-M}G3kUM}p;fI!?egZSKTQb0 zScyvrh~x|-LTOJ>HtND*BSk;XoYTm9%Mhj>JQ+D{mm+(!g7G8q!ZiU&8wT(sJcU9W z^#OVxDVTsZXH`7!_0Q{=@fNa4ckiWe#x~znX`k?MfQ|y19>Ad*U|kL%Cj#xW5(2Cn zDCvd3||hQG0??cG~VOgR}wV${t$3S zxB3U>VFUMa#O-Rg6FyU16Jnlp1!4na|j~#0s z{B*LT^r6p>^ZATqa5N&x7YByICi`Gg8>#$sg-C=XRPjZx%D)eoT#@U^rhf=)OJ^85 zc(+g9cHzB*V|E43#D(QPt;waf1QDC)dv%5IUVIs8yJ<1fx~s*DO1Ti7>zF4guq69l zdTB1gh)njrzUV+t25U1k$RRU)`ek+sT!D9ZVwkG1O;Surb`&ht`$iQ~6O$V6$!4|V z!~RN~T&`3gNL)Od^k3a079 z2!NYeh-%Q&zU}FB8GPJ!>kv;a|_t$(^}O zK^<8iiMsTbVR1S+W^slR=@g)=D$aJi2t(KoV|1yIAz@Pvc@-hecp z>JJM&v5}$-eLs8_Z5|Voi~WRm9~m2tA^q{JZ{hPPI_a;1LbjeWa$UwD9&rd2W8#RK zarjt;QmIgNG5Z-*wKTpn1_*c#|f#9$))v%-PWX=24s|BVe9rZgY{LWo&#@sXWuywEE9dKF5QXP{p{uJH{TT+&LxKJ$-bv-#2o4OXq>)cDmg6kE7;C5u*KijJY7UKe;E))n-sHa zDqunfw$N#@r%aLU*v!$0!(bnmXcK{~OsEPP3<3J>R<-ahlb!DxF)!J>dSU7L`!I7{ zy2V>=fQ~tp%&LKYjYcc#9oP1$LI!#Nn1mf9ZNDA0#gifS-iIkDMW_4Vc7!)>isGyc z0IQshcaYW}3>vy0!HOM+@iyIo;9Fz&`&Z56Rvd=q#xMDC&<2q5G@%fq6!4jVp#fm{ zz_XT-sRz&$Y#;b*$Zx;oZ|@>2=C*u-?W3=@({iUPgeP`+!RFo zu-}a%N))J_k%0pzOcCNK6dnjEWMs#~e!y7HC?#iK-y-@y&L=&zB6z+6z;XlL0t!?M zC`(XC0q+|lKsDzz=IwOEH`6U78UM4Gosdm#zvPH-!Pig&Jg+6vz~VE4Y>f`b?|Tv*El&oV?po|9 z3?o?mS=-DI0@)Tkv|1#Mj3ZR2_dKZ-rK1GA&K)DU}*}W9e zSV|-nWx{Uo$GI}&e-Y3cJXl?d#Ew>MSA!j>dco z4WaRAe_PupWTmU0MywWy$k=!MYg+>#rOy69!4a!x}?!yz?_l5F`4fnB=RnkvG|`W zhbI@1)&uj`k(TfK|1od8s(B%XXa>P}Q*UDit95@at#~trd_ilu8~WMdNKC3SF(REX zCIlZ(u16lF;c`_A?=lfQcOAQqUIG`P06Ff*8deg`UJNbmWr`!l&ND`Ig^W|ocqHi_ zSs|Ko1lZX7z+QMdPe#tINq)ST-cJ6$*Z(1_b^d<;^2L_&Li8`}Bc>!GVSi+_x7hFO zvzjz=R%u{A`j_bzm?X}lMqD$ zBS;T+iLB#fY%`kBz;pijE!ycKvU4NQ>E98&x3KigbLhfaW7z+cNW`jCP8XEsggC3? z#7~!%@Kc@$n@x5Ovwuqoqn0*hCa5Zk6N&zeJl$^|)Jw^mFQE1DFO!`{Y=uj|Zg3_oJutPT2fFjJ0{X3w8f0?MCe8gN*KY{gVZYrRtYL+zl8@FLP z@Qa%Fs^<$7bV#-g@ySyLc`$ca#SBonq}Y@e=Q7GTT2_!Oe+^YWbQ*ralYyWaBcbGB zWODC1jhgAcrM#-)Q`~`$kh_@4iu>Xor@LopV1)ep3|y6e@$A8GnM)Ht@&i?UTvy1( zq^2ImnKLPpJ?1bu`(ylqcNx9Oz5Qg<(NIlk_$TydJq3+NA=V`m@qtuo*r$|`!#_oB z@GoPzBW)}he&%-w+I$M6c!@j)rZ1(`>B2#Or2}22RLZ0mtzq@>ZX=@Kt-F|EV9C#E zI2Gwe`-7tFsHi_;$SJZIdeY8#1?a?;qKj7r`1ipxF5bH!M}6u((mKg>lTG5?i^=+B z&)>lwn`(W-e|4KhtH`^>QnxH4Nk%hSP`FYn%N0_kLUu7=BJVzy&b6|wQGNq%v~){f znIgKeN6tQhvBfHtU~}nWo&4L#j?Pw0Tq%*oHP86hBXhVVT6L#jnV@-ni>c+BIrf%c zHE*mr0P4%%%({otU)Fp$S2(x5>0Lpg=_gIQnjUGoqv_VB%bV15zuEY+#yzv1Z2Vf| zKLGl>uhG|hW>%!;?&eu7t&Kg6_07fEvRVDLi)VK={Hx)yhRqF3gRZ8pVRgf7!E5zz z*PpEaLCb&7Iw+V}R{y2?@#<&mUG>WPMRgz4y-`;dJV)6%XMd6Mb2k6A?yA{?bxpN@ zp8HbmsoG}*H`P8+o2?z1{d;5*|E?xfvv$r=kYFyanJYL~{g>*~b0p0V&FN@dS@VsW zH(Tx%5Wx+#>l%JOdkp!+-<>l$=jo=}mKSGzYF112SE_T>p6cuBs+Y|AXx7TXJ$ zSvLVH#wZqzwPvtDg3X4q;efcL{(UtUVH_o8HAP?flW}RFEO~G zw8j{I99euh`(tngVZ9Y9!K9@|LKUdVa3;IELbe5#81RNs5+?>HqX7;M;v<}I7A@@K z9t%`3l&%m|o*?Q3GZ9#ZT#?pus? zdT=ShD5%#!#}!_1kbNv13)g}zjk2bJmcKGxfZ?c zB$)8PAB2xr1Tz+0X~*&V<_h5vq*&yPS9}W0LI48rpy~$_^%Z_WNWmZGnZOed;LFp> zp&WWT$wHRXs7UJoU$8=HiFb8da3bF$?y7J|f;$Z?Ym|f(z`)={0`p)Tq(%9*HS9x! zq76GBAi)AD9_3*I51CshZP>v{G3W=GAcCE5Qq+6}lv_6yfvZ&>p2Hq=)BhYgrQm!yoDwB(eAsXvg5j@D#dOUd$q8X{5CeSO!2EfCY*!$j3V}EOBZv z074DQ(MBo4%u+8UzrreY$0(~B(>UNbSU{skSsKA-1Vv`ioQl)qOJMr|bQJJiR1QeD zz-fdDs9=z*5d2F6U&ZM{}&Z-<{1oae1sp!@N z98H&Rj&Q$4V+q0EEfc6v%*wPO#2R(3rkNGTz_tZO5RhSFCJcUucmzxf`BukyDZ&HZ ziBg3@g`q-hk(kBOCW5b&@^4U5Im+GyCMayHm~(T^$2IsJWsIN{auge5f{`MAiW^wI z#v*b@(aJDU1Tiq82YCD_LsbhG1Y&SywajY(3mc_AOW;$1PPFw}?y(S!!(eix)R*{V zAV&nvn52OvibNX*#UMf^0sszrR)`r97#k*r*&kE>QVsaK(9$So1trW9+l!5Nb5d{( z#}Fnlfsgiq29k1=nZ@l4C#6&@pqi!i5CA(Pr3ka<>-?M)PK`k7rl(OsPO1fw2w4B- zKf+2Uz_5iDf`EH%e4^W0tS!l`l zeyA{=sDX120FEI-B6xv^P$#rZ0EHh9UudcXMYJGrMT3$MWOitClw=sF9p1$JN`UYH z^%Ojllvxm~H1;AK0hJbrcT{|f60v{^2UN|#T`?fW(?)@=sCArsEVvZD4nh*8w?(C+ zpRgAv=Dfj)g&{)O5Du-RxL$K1P?8x14m>tzzTZTF7Aba z(h?2jC$JR<*QXFD=m)W_+n8om)5wC3lSUOS()4rEQUN zXk!B#!F()8EUo6e2js@+ior9DULLO#jbZeI&bs@8=4c;y zctM*B3$O`{o(a3O^Y>Itn>^YVLK8a6D42vD9>C9pV=WarKEz_ImSNNa0z*2cpNEtezMM7tDn& zZg`?bGX@Dbwsc_>Z|(sv|X*2yTxNB(h!((IUiopn?O#KKoOf^$> zQp)XPnZR>-zyyf^D6Zl>la5?~9R&Bo=m(9>iQ#!j*e2tCjKyAW7@-Z!hZrbCDdDqO zIBO3l#Yh;-!JxbJpdnJ8P%HYI`n{Z#4oJbTjULDW)+?MypP-|;S2loac+KEtpFbwm65+GT^^=n|ejH1V*4IIQ+lqQ?@ zfQ#N@ReQj0O8Xd$n<~?)0A?x9{37lv1)}INY3CsZm@_&?cpZ9~!lDW>CJbXv1|SA_ z5R!R76inCj`y`9LeEzZEiwFZT^i2a8y;k^Yg^RdYj7aN1$bb`=9r(I>F4fOXIbkVx8#JW^u`869Z!!(0-m_X;kuoEAeGIL|J@60dx2K#Gt^ieQs zX&HUv~L7bd?!3U5Gq&Q)!+-T}>|~@^#>XfXb&F9dhC*Ol)d|T@ z{_0;nevh6wn z`DmP}Bagi2pR)j6eS{JUgLVuvtt0>d2WT2^!($J zI|+?wGdf)HqGEh!q zJDO$~^DRt>igW-m5T_ct$iDaeE$uVhLEiMX|3|R5b5}ByjgG!KoudN|iqfltZ5~4a z&_!dkcVU-n9yV-dx}|jgZ{9ng?*i zSRL;cGWO4ZipZ(GOXilYoJ}9g6HKY~BDq_kQS}&tnLa<+)`(i+T_)`b?ivscB8WNkNdsYKcT>Smsp+08qNc`;snCSNbzzkL+R zu}haSLtPkbVwnTICn4o_?&_)yP?poK5lxeiV-usaR>s#Dj6?P)vxYp&z_o!L+u0LRN|^5CpIZ`$HwO zwyh^Js)|dLE~P$IOloZ-G4`jmDl|KujBH+dEgs<)chr>1-}58I{;nufLsILQCEc#F zl(IEe0?L@f;mY)T+yIV?$%ivUq(;TOc^Ol)Or?+uFAl5xJ9qwJ;>Oa7>lhdC0S5=e zS*gMnkZVUq(cg!KB7{RFI>ZP5$}4YrIjxu_QS~=OQrRUQP7E$`-UoSRh73n($wAfU$cJD@Ta;* zYl&JkubsfTgp?8(DW6=*%XBY-Z)KOy>{}c$qVFcK2_u z#@o>d)6v8KW|gmdauvEPo}?tW5o=#B41yF;D?zuI8Tvojs-+EafB|vVzgO# z&^1>gIL&+uIc<7iJz4(qc3X#8E4vKc{9vzIER%Ep2TtQF889AW4vnQL%mJ|!OjDhU zW{kySdGhV67$CjPC`CHFMnpFJdf`HH?b=JmzI)fA3ot%{?BIKsRqBB6D@wBNYG&mp zT&Q$zRmV;NS#}NM?s8*!*^QZK0^0&b4P7M{(p@R)fU7!Y6e8Yj`cLt0!Q7Us;g;&E zDs^>o?pNk$XMb0)prNz&2*Gge%Eg-px7RgX`{^5&Em_&slXvUma_e}oFpODpY>0?T zXp*rF_-K5|7dJ5XESy@O-4yAu7xmDY^9jB|VI-+qiu$9B)OX(iI_J)}r?q#m21J9#9bb z2;SlEc%0_xlFHb#v|)FCtAHFeFz!kNL3e`5i3`*CK1^Y;bdS!FD0|@;v~7G+iXix( zseR#c50UTnF|!w7!h#h#v^gynTeTqZHkdK(#UYqVhw!UDW?t7NZXxGBv+;WJ&hmT< zaT%FQ5o3PW$UM=i9f+j^;6-CZeHPc4!b!j2e3I@*9r8qQ8^4Gfa~RBMb{4u!iOo>6 z1Iu8Q%@iz5ICKT}`Hq>Hc^xy}g0!%t_&=qE(N4D-p^>aGHJ_%~?DKYD>d+K#e6Hc& zwLSGKs?&lUH23PW=zA^Y8_`*@2}fFq+9;Ih`z0bdw_JsWu7<&C;e~ z!-2*}=|t3r>5I7xSXa&sLTZglDNcAT*3q$%z<@#!*k|8{!CW6GId6?H zm3&;yg?wD`P_MXO?-pqk!_Hw%*hj`0^w`s{lCv+pbtTz!PjNx%4-6C_aT)lu=M#E` z!xn?MU!98%4v&s`i+-{wgfA+aewnE6c@ez9uv8lK=X-=c(o(>8d)kK<#S@Wj zx`Mhi*N;&RMn-`77N?;{EEVa72kpX`O6n(%711cqM48rBzKl%04S-!y41>_c z@-oH6WlwDuf+4q2l+5>-$H!uBvzJEbPV&7to`NSLqF+D#@ez&+K!3A#@5!1Bv$A7GDG}a$TUTlMmyv6E+4lC2 zp=`}qIR*bR_I9ukg@tD*!bTHWl*1STc@v)$BJs5K<7cVGX#}RJlj7xLC7y2nSm<1o z?#VbR&9j}XC@}3EGu}|?SJZ=eCYw=LnMADdTXq8)ASd- zIg$p@D`IsIH4qPzFWia2z|2x|?xjU?q~U&}lgyvEWIr97U>=z_Qq_DlP*6VCP^$Y4 zApbWAMrh1(2}pD^7SG1QiC9D;6{+-U(~yvH46}XkBbyNuc{0GafZU@3=lSo=G~AfW z6bqH@`bMlFqgv9FFnhyM5svwUsh*ByDw#@tak?AtHe%NSzye1maDL@Js&b39Op$Ea zGYJV7GvJhCf>x9pLoU0Vs$A8=yNV-WpT%MS!cCo}@p~8@J=H)#Y}u?+sWZ_tE*=(| zq*8;&;vAq|YCG9*H%6H}5jp2QgD!a^@}Zx&n?8xPOfhU(HKEZ=)PiA-eMn^<84xN1 zm6rp90op51Mtom+WaaapXDB2@*@#zRHAKy_kuizHf%6(l9J%(g3hvtq1w0Xs)W3HH zNxF+Q#P-y!U8O&7#nUV{l_`WRi|JuX2eiEaT=$M^^fv9Nkj`d1$sg~9E}n?&eEs{Y z$Og~O1*N{vGT^(ml_~HnTf5Boa5g831sr)M>G8x0?C2Hbi|s8u5t&kNr))CJ&FA|; z99X=%X{hlt4L<;l1Vz>vhEGw%SzDPR&awu22XsP{STdSV$g}dH!f=GXbURu96%1(j zGMZMtmh9i+n^$`DD-6ZgDO1QhHBzwUT(scJzmIIb#dkv~NvL-XlqvQsn>9aJ zP)ZZhk(4|?6d4f>fkviMPd7b^FTsMrej6z>OM{4zzJWk<1MYo76o<+1UA z&u{bgI4fk+1M=83}3vLDWoci{vNW9{{X@?sOia33!A zWqdfkjQDg)w41BHy|8rr%V>Vx6nU0a)8Fq8Nu^`5p{zXo;ph>x1f@^?Bu(vnzD^gfL-aM+O^d~g1ei0=?Fd{AP?_k=C+Ov8I6qHU>VAb zldfD=N=iF1PMUs|tT?o9WeMr7Q5<2F_7t)bqb3^*XRyj$#5yE(%158YyYXe@tP$&5 z$Y@WfWYf(}Eo7qw5t(g`(7e z&>#}06s)3$x1mMzM8qe%8bDJ|-P}=ne;f34OUt(+sm3^*I!3kZ#?h{&T25rn`)c43J%mX(dD#G(wG+CxuE$ojZKYp z&384AH;*)joBhojn_bPe<|5htrhk-dONvjCU!L_(ESWQ$>NkaIjg3LY)y%8C#^~G^~Biv!1WU_iT~<% zpGuI+V|xlAzpqYAwp|ow^+5cTRPqeEL*7 z%5R>UgYv0UnEuxP_ba!deDakv%CEl?L%HJ>2Ib?g+=TM6R|Zi|Jo-vM{(S9~9+Z!~ zLJfTN6>5OILJd6l3N`SRSEzvpUZDoQ^a?fb#aF0-`%Y2=UpPq(Y&}U0eEuXg@Y$2p zz&$6af&V&5^=~;z^>02&_1|@p>c8_O)qlstNowHslhi=rBsGvfNe$#qQUlqSse$pA zse$y%)WF!w)WGP=)Ij28Y9RhHH4uB58i>A34Mbk12Es2>1HqT6e&%JW-}f@rf9uOs z|IIH`{WqPMpa#4rr~&s0YQS-V8W=c14cJdm1J)DNfaL@=(0_s&=sQ6T^q!yw3@2cq zy5l#aTzA}oQgyr^-@jgYT!T_^ zd>wxF_HhyZUwV8sO3Cr%D8R$Q~kdET}d`O#r&;I+flz^jL;fzyZa3F=NAUW)SM;SQ89A4Ytr zJ8>9}Q+Mp8BFdvLjiEg9QUv8oFZoa&ddY+Gz)NYHT8KZTm)cN1|I%!f&%Pu;x${r~<@XO!1K&GD4SeSiHSqKyYT(<4 zsDW=Dq6VHkL=Al75H;}iL)5?%hp2%ahp2(a4pIGIJ4E$Aa)|2x>LIG1yh!yw_~HaL z@W6}Iz?Wa72EOznHE{on)WCf&QUhCGqy|3!A~o>27pZ~IzDNz+`yw^)nHQ;n|9X)c z`1Fg^z+Ep=19u*z2JSdW_1|`o>MtIo`U?lC{@g*TKXb4T{$DqKkQzuIq?JE*@LH6~ zgR4-E9$bQQea~sONdl1lS_w0$G+`WfExogi&D4*MdfL8nLo_>_i?CC){v2)LL z`16B3h-kIn-9rsLy@wk3)*fo$n|r8%r}j_-|GkGA_{MH(V8?E1;IZA*z@xjVfv@eR z2Da~}1|Hr`4SaPsHSpkWs{euARR5QDQ~mevrux6Qo9h3<#BOR}>uze`^Sh~m&+VcH z?%hQV+`Wq$`1CGnVDm0&;I3WNz{DCQUYMW;qAySbkr$|e&y?is|4hB;^8whfJE5HlKPpIL*l;mmTB^=B5KtUc3;vieK|%2{Ws zPzqklqpW%@2`eAH7KS_2fA|^<)c^Z67^r{$H5fd_}2I}8^O^EXE zufah5UtfcP`oFve1NDD?trg{;UW0-9w_k&S`aix31NFauHHq?fuZB^+^(xi>t5>Q1 zH(#at|KF=r{~NDvfdAM3@>Oc!^;d-`fBGsl@RL`mfgit04V-zk73Jwysex0kQUkA? zrUp))PNIDIG&OMiG&OMSG&OMav<>Cq)6~FAr#GNHbQ-Or{^03rP#!qF66MtC#V99F zx5NMI_n&UWKlYtQ(5T;giUti)*^N?Irp@e{GHqs`D&L6msxlPSttr!Hwz5o{*%jqw zC@(K}p&1`v@HnU}usMos1lR1>#lW1mjizaC+TR3?u%C1SOzjKo6pO`;M4YW^E z1M?=Sf!0ZCpm~xSm^(=gG)+Y`{8~V zsQveT7^wZ{e(10L$A0LqeRn_f*ZzG!^w<7vKlIoBbz(mZ)V{MH25SGZ9|mgwv>yg) z|F{nZYX4^+4AlN^9}Lv~b{{qH);?G_F7BJ zKin42aB)zYrggg#d;xlaQ|-!@Kh@(=(^0QulFKUg9tNF~4Fh8`VRW z0g-RSYRLkXF98skJ5S)}{L3t)<3}gx&*f!+aov4gCF8<8o>zDzMPI;_^*C~}Aq8Ph zGOId2ahdK>r%Bt-Hg%VF;|9U?BJn!I+MWTOF%-#|g#o2I8C2+V1CjnzO1xHg!xlw( z6O6D}FoCSlKQ0;c+WjsjrSEl;t#@MWxx5!^;hzwxSATa6`O62l%qRc*_+PFgkN=)I zL$2D-EbgT4R6omB)!bb3&8A%Al?`8-Wvlx)oz}0L1sK5XIN8qa)M{fkpGF+WMxv60 zKcnjpk^~5Of!a9zGPlv|K7+J{>3)(S2hPmwJlv-4(?3SS0^sJ5KCF*cHcQ1w*LPz% z7AFhIlAq88@tLG#=QHzH|6dEdD;Awkg91JWj$Z_jj*GK1NDIgIX91bkG4jKo(o}#M zrR41Hdqw1())kA$x}RM#9pXzrV;)>=+>WF6+^%#Yn;QdvWhOYNP+0n~T&8;+H8A}u zQ9t+7RossB)xV%S(%6bcniev?oj3wOv*>Z~5r-bgBfmfz*d?UMRT%saX2v!dplcL-<>=x3{%S62s{`URhD z9K%xfhqYSjFJo8&^OON&%NfSzE zAeR#N7?NbHEznN#Z)4whx`a&qVL7r)Z_l@ue(^Tr1a86jKmv)k!$wdU6uc>Sn6{WM z;`uYOD|s?3Q5{*u?m0jIXS&(9#aRX-?`Ntjc~H~c6HfcL7nzkaIW5(&pfr34UyOtL zxw&fY_nQ_}-AvI)?;5c#-VT@uE`0Dl`FVG^>#vt^2QG=p^>+s3kK3;}PyR^r$gS7` zLOv%wI*GF`NLWmG$er&XzRoP9sWP3VQ|~Z$2(H*Nw*B(+J7zfMh+_;m(d_o%WIz~L zJ)ns;7~^E(9mLUF-^U)_%(s+IU;X+v!5W3g2R6y}?U$VoEXeb~32dD8L(&LP4zc5g zLpBK=QU4jsnm_+L(~bw6=?*r%((>*l_syPqw~}VH0&(T?O18^%SKyo^{@%<^QYyd4 z{7leAkL)4i6XzCjrWGfvahy`(P3Tz%JNQp#-u#*F02T|dX#WE}IZbt0vGjZuc#5uw zm7aU1XL@l`3@1>K&E+YQ>p!3yXfsNQK-LRy+&Je7GWEeF>tNCUV(*aW$MEr&{}&?y z-sOsWa}o82A29>-@>NX?Fg41}in>1`XTT)L(|xy12w1iHwmExlHki+5NYKEHBAP(*r_}C!-4wc%-bJ zJ&n-AlaVQt7kYjjUQ}8sEvzr@vgTt7YIK~WyR6qkx1r@8uR0};k8Q%Dh z(Botll%B2)U=P7s9)})w&&Fv{56LCEOxBc(#e7UJ_g-6@0`1MyW!TE>#7Z$uL3q0< zKrtQ5sSB^wZz*_@O5u|0ERnRZkPfi%d})24t%WBef;)XHNd?%kSPwnee*+dZ_c+<4 zTGXfaNmWkK;1DwuX4O0;2+W&1O+q%mwF4Uwk|&T4KP#XWbSLpB?CN(~%41Jqb=>(D zVhK-1cK8mWW-jFS{PHdA)hyPP(|8`H67FOJ@uI6Y+hZ_Viw>m0=g>xy z0}-)0r*LXPJrcn;RU*FMjUeAVT|~~-o#ggof73?4g{6E4DuCTaP>S?LrPOG&gS=|o z+XsxeimMhD!!>v^3KCb@D()=(WHG7{+X%N`sK~4-VbV)gdZEuSYK?h)B394Z4(Q>@ zi27fbbNfQ?_>v1s_jOP|vz3wh&V3ay8cBylLvi&0J?xj$aDM+`CzSDI$UNAEuR^zY zZ|MqH1#MoBdt58AYeD8C9MXaToqdqg3-DW>j6Emu@vf|7VE`a6uAoaP7Y`TJqj`5v zH0I(IJh>>)-pZGeDW4zNK8F8ZP^#}n>%|AkU-&>?gStoKO+IUh<|!XQR)>BFGeRHrpgvP}Tx(aQt# zTX-U};{zMrLkiT<4c*q#(aTZUtp;VfFD**h(;7p+Q5qa3JFW_JlJzSCt)CQaUjI{^ zEb$C?mL6G2z0f{Yi|1hBsU((&C@67TGA8XvAe_%4B2Z_3?kdzdUq*K1X0LgEZGbZ5 zPSv2cSx2_I`ue~M7Es3u-eiGMvKqd+0<}F|gfSDgCBaX!sPwNDG~!yPC>kjn;o?0? zgI}cYu|)gb@t%--m{s%ZHBd8MMt<;}k5&O+a$!kxC0?i7G&KuoNbIxpgd_0*i(aE2 z(WU}6Gppm4YoKGggb21|uOMJPqX zFF<6Xw5*$u>QQ>39go$;t`wxJ1nFjBQ=pMF9I5-?+N-NeZLR$vXW3$%YQSe;jd|>a zA(JI-H0M&ISy3NiAhq?mtMSY{5jZ05<2DoDzM49Oe+qb$oY!lzaYI6?Gzax+bKb8X zk&w{!0l;4IE|VQ?B}?g#*9U+N6=cM@gvj7^L{kdQm`+_W-LYJyP$`9?i+1pN_mLfG zR2}w_7nP>g2X4gc7^aX6%&`HxdM&z`F_lPK;x^C%1nKLnY@U9VZ2OzMLUz$fR;U6W zve8_-F0gz_{}ja>O|WBOgL7~MNY8_Eo1tIPXRgHS4sy9H(AJvZ$;dY5H5GYh+ld-- zmn`tVti~tgf#uzOQ*&s1sc5tb{b&h;b z68MOHz*nV#%NA9@M=Osf9~&KrBy+{6CKF2LC7jnyh@fn`2#x^s!A+s>H;{>EZf<+( z4N*YAYOI!A=n}g?aM2{MDK`$(J=~C=^+!P$K|K2iJ#09VkN26>5`{zL5f1iSa|QCD zHn6&dcNLvD9{c0*KuSj&o@;6z)Ub3L!!jJH73(w##x@ujwGK<@e4vwD--GbTmtnKK z63ZM=Ho>TtPO1u(daGun9fRqB&lS_%yWZo57`Z(OobZ2RE?=SBcT*=P*#pb2MHaM;?QlK{^t4hS*; zjp3Xgpp4kB{v%hQwPVIx$hjZO*OLwI>bXSc4qWQ2-lOgSU8K75!Xnjl4`Q8b zV9_s6A%20(8^*D79EKi<;KX&FMu!ELDTNn(`5A8|V^7v}vD1Ds=N2eLS}l+e0E33( z4HnGv@s|Pt2+6g#1Xgy;C?#iCJ-(WLnyg^n7poedMymPk4X@YN*Ge&a{32cT%2mc@ z%i#a)AR?YE$in?@-*7ZHWU)Bo#6FA)Sr(2R*lh?%bHwHGvga} zgx#Ptq7Sl6C{wAXfgVo3jcgvFry=OP_8dcdck9$*JQzF563R#8MTve;5$hS2daZ6h z`>~rM=nMHWGWM0&8X}Ci=a<5ffKAZak5f%)X;2p(9oMV%gJyC%ADB;m5v6m3=_0aI zKMT)5=d#zuXyurvD6l3weew@#bXkc!u88+D+4v}i`IWw6Z!eyKFC!JQ`v2#2be0zM z(ZQZ{Y7wf3%~wi}6i1jrr%Ngs%KLnI`Z(?6={Oxi^CX*ZslB4~=GI#;!}h{NpazNP zfh*gT9+fpDjg9o_@&louc2v$jM`#4!nI}V?{(+k|o=T6^l#Yx9)(hGqbfoVEqusMe z+nigyPEg?`FA0aLuI{ZeDT0leB(`%qrUnm%> z^k?m4UJl;ClM&HB-r%OeV>vidTS%lD>lbT)3MJRrhfNrvR4U{xe7_c+j2)s>PNWJ8 z0T1=&%Pu@aDC)^FQoG3j>;_Y54W=|ouYfPP1I*dhyiUYDf-8QLrSk#Le;El zo8k8v~~ z&)WS~Olfc5iawclxiX!tQ2UkM-ij}em~_pBC)N9{{W6h3sz}H!!~LdyACcV+6}-!+ zr}r)z5|+MsH#@2M)CD~XM(x*&@;152j1RjYBpdx>kH((|wp5@ntmSbA73NA1aOxJJ()#7QMu$ zQ%EglgQ%eN51Z_qL+||@l<;LVoK>d5K)w7tUaI@53(wN09vYE~trBZkBm_WSlJld* z_rQ;MGBUQ~^vVbS_`OA?JMN)_SMwA);q(25FeoVmy#2O>$R0E#5w2-7fBW9Ryq5TM z(U&(LUP+c871xkud!p^7-p{fh3y=+*TUn#d;X!0+_YHXlt=W)_s~s{HnAggefuC>D zn$nwNXdT=tmZ+*>bKUoA-l(2KhwhCwfru_aEW|neZGpM1Ub8C^6BV42(O3*8LxSYG zZ5U(ot`fn>EvqjY6@Pad9Ti)raIT%}NW!j}#rf}q& zt94O-6nI4bOe!gi_?$^h)=LksyZgFVi1L(V4G zWo0C=1!L>!SBcFmuF&1pFw9KnRMnw6H>gzXoO7?z z0xB30T_}Y?0kdlwb!bFnxz~WWD+{`;%3>HrMb-c!iwfd*s;g$0+uT{d`_KLT&Ux$f zTUBqp;e_W=sW*Rkz3ky-7v#cx#Y>dJv^fWgQckbm!J#o*TFTu9w=gIMm}o!M`@?NK ztyzWVbD|w@c$0-Nk+T)DDTzJ_mkf%f=Wcz4>OFpvw?jC70jlrS?RhY$E9Jf36t6>T zv_mII#E0O12c*(n_gxNPARppAn$?=iR?KZ4`P0lX&1F;U#3zT>kM*8g5cj~YC$@0; zxe~Jm-6Y~(yre66!Zo)=kji($t|$5>IG-$40jJ;lj`dD|363{g6AQ=A9g~6%j>QoH zC&QU&Dq#vpH!n=Bks7C9Jswa2iyo_&9=vv8y7$B>=;4;=f)VBkD&K66Q^RSYq| zPS*+nX!HZ%*wUSbZY8-3yOr zK&sUK+rPp?(2aGq!%YNZnr&CC7}wD{>C(^f8@B`W_^XEr%U~lZAZCvsRgRnYn zAL;%0ejc#1?Lruc>@C$ypqat#s9=zGo|fOn1F$*`=-^>O9T9}_w)O6N0LIGp>)8dU z(Nu>gk`~ie#1-cGSe>;qqE5Qu12EPG#nN4$4v@XCJn&ID0mBD7B=k0ZtFlO~i1yEQ zL!X_xZUPy*ZAElc(wzCz4oQ3U)w{RSCowpKTnsO6on`4LQ3lZdWyX%accRPzUdrq4 z=6ze}lb4<|u=M?^Z~iBDzvj*N?t1i0NFzOKI?73>KguW8!buOwq zfAT0e3|_bCl6`9+0|SB3Fu-zv)4<9B+BiVZ0avDU>2_hm9zA;g!FJiEy_-`AAbjoE zEKEq$B0sf31_R8?X)};Ck_QmIP6|-tAfctO$nRgfoKgxr{@MPyHm8xg?-0hfU3NBr z3y`spBEkdoE8s15WC+L<_yFx!0!GWd@Hw=;!LM4kOcQWUoVl#-mY)8`1^o`DZ}$BT zFj=d~F$2?Tf3jUK{q12MXs4IX!zxt9Bmc&e(xu<#r#HZ71MUWZ;|u}9CBQd&0oe(l zEagvWjl_SO2W+%uTS#Z@pZ!0{Y#^Gge6o8Xu&+P+P!fR52*{PKKF}MWy#pSjjBlCh zFLV2hK=q_O&v~?LYw6U_|82vqKlrRp`ue|L@Wb8mUH;WP3j94VmAEv$$4*SW4rcYh0u*zrZqgzdHDMTo$E*PpokD=R?Xyq7 ztUf62Q@1H~kGua{aRu1HhT;lvFaRQeQAH+F5NQsG^rY1HVWAulgF`&3dJ}&9eR;#{ zU6AX+l~YL(LN+8un;O-WiE4*S67zd-2<-R)?7m;4(){SS>P)!i2Xa@a1uNK5wt=LN zjfPN18nb7@Y*bgo`;*izaC2bDc`wB>*bXwfK75h%-VHad?sFDlOdH9tA$?7wcsOmXV=iHFBt7~MA<(p)!Zl}`>?dB-gm zCo8WVeAq?|3kO0B;pRQ8E+^G~0i$nF41_LY=SQ@j{)HT3r531j?_EdKG6+f)8hU-o zXD&8%(nrql`&JH$0hJ1vcAmW}y|K6M=kNfwk_&Q8vhtdVqP3Ai3<6rnT9b&LmL6-s zuJe_r;q45lB+Yv+R)W26_>H`a_bq@-De=?{2JA(5%5d@M}8`S1-TkoiKBE{C9H&+ zwfShc7IrYKV#o71Je2_zB=j?n%O57O-~%%X(^7#EeNH4)Zq>cGz=$xq z*x$n(F(B^KmiK=4_u5l`;CHX?u9zuLeR$%Lv6n^<42R}ynyx&QlKq)Xu4-24 zk(zNUfd+#jK{=af2u`E0U0)}C;CXNc76x=u`K`Y{D7{xM+I;bOh<%;72*N-cUx09* zZ$Yk0Rz5LLzF2mmc@|i7g`mr4?a%OQq&+Xfn8d_g1UH>8k5&Kp@@@IZ0 zycoGkS$Q%3aKq+C_@usCDR(ct# zdg~Z!?--M`-{1n0K4hz%J!qc(rnwtQy;P%;t9JNpq+Z zHgL+(^2%SrHg-S(;ZJ!G-GZKEfy?A%H9UP!8>8Y zka_{UECV{J{2Zise*Og*)v9B}uwv}9BTo!ZY7BFi&bX%diEHFBDN{3f7vwr&<^Jn6 zz(+tF=~66{({Uy%Cy&WB(zmCCHS+^HNweLuzXvtV>om&UJ7$EPFvrQ&!php_H^vhV zq)@2a(TLWW3ih{1YouFegf%M%b<$%RAijli;q}tB z!cz_T(iI|Emsj025;G^PUFjKAUHi(xe!1^@X>m?C`-0|$9da^C?A!nn2^x)(rc$1A zdyRosO8ExA{T!UUma3$Mdw;4#pL=`$$ZOPlwm%Ppn_YMV^ic7M_{(*F2}3iKnXLO< zwlFIhhK2nr2gTBJu_%(2qeQMkM?AeJxp z_C7o+K=7Ac00wFG*O{Ejo5uu{$LeM$X11iIzmLJ?gJS9CmoKGy*NzL|k)f()dku$Z zm_uk1$xJDyyzv(&;EfOHpxOY!EB&m6*rae=9a(Ddb87DdI(BS?Tygc#X$eM_bK6@2 zCoQmBKGZ)U`%;#s-X_#5rb4h(rqj~3yM%Q+Pz=GBu+T4U2AQRlzW1|duY+SqYPAsG z09+CPHV=UEKq~{-?SLH)@WocQ#H<(ANTtKV*dEk)9@gga&0*{G_W$#gcjRedOd{6` za5xJA*9=4gVS_G1+yI;@1WN&WPb#ey;BdCAws-Rf-lZIG#-!ux1%N_^*seSk&>!UoyMMya!2m;tWO<(dGN!CXJGsvL7hA(8mRxkO@MyM)6Ip!h^mz-S}W zCIH5APJR*_rTj)=e*Fa+K&}nYO240NYowisxywy$4@mkM<8?qtfQBaI;j0PXSa9BoYHGct$25NddAs05-zu zaMNz%d56R0TS})^UewRkSNbbj9X5AV?gc!`7Cnv-f;H_C0>yn~qLJ*| z*{;Kg^G^o@t)x@8JkTcv+}!)#9(j(4EXZ{?N`gqU>JThQ&FTq8i{M~u>-z_Hsjd;` z=Ld9BS$7-kKHu@rkeKxmsIPiNBS3vrY=J%JIbHg_DxdX%*(Kk4|0BNjkM-%^i@W6M zj#%KKFUlsXV-`vl)Rc>cT69z&g}(H^iLYKH%*_wz`h8J%S}VQ6h_v^xaA*~mZ0ks@ zoFdZZTHX{xjml%L9u`)u9Mnmt-m&jk?|X;kPOuAdwUat!*BwAf&WHxejOpw`-XIx| z$W!)!SX%gGz}dU!h~U?ZTm|kHY07_XXzNMXz^d+*w!2obp-#dTqN`yq@Qq6Us)twp zUM;-x0iAT$XYSmu=5`3EaOFmsDNX*Iy|TM19{_&{9NB^ILHZ#I6V38kc(CtuORvL( z3#Cfjg9(sxZZNV=B+Ta-gsta-rks?<;qC^-z30BQ8sI$rdLgzU156__xdW6f#Zhn- z|eL6Qo7dvR^W0yok;&*zC?Lm-FtoEr1R_~MuC?H$mW1FiB1E(2%tIx zELk21eItahZ|!ng>1X!=hKf3UT?W%v0#Nniz?lS?mlzN!jwGQu{@hrnk5u;2Y<#dlO#vu@cIlBW7T6{>&n z=mp=xmMh>b430&0oc`j9WyWbwbIl0`$}=Er(V(R0?4G`vH61q(M2IH76(P*Z@nbGglubp6LKqsT~L#O1N z6qifrdw-xfOx+NPZ?OEIx5071!}`APz;4CtgY&j6(Nqi-y4 z?rpwO?u~Cju24~KDxWtvJgCz^o9(Gi)KBGPJL{yYUk_j2fDV$wC^fC*Yp;hvB_BG= z=Q^Zq@ueUdFqvWml&F-o0GA~jdiPaeXh0{OdJabUxn!4Tu7Z)i#j{X?ta9ZHCxk<+ z&6vdkS~hA+6SAfKvrB}M=KDDn%&+Evd%~d>f5itiPiW?UGjYR2X(BdpV&dS$%JIL9 z|9t#A<6j)Vef;|I?09he^6@?6(__z%{rA|{$37!{VdtOMbw4qB(`a+_4Wo`x?dZnQ z74whIe`Wrz`M1xP=i~FH`HSXP&;51o=X2kg`{LZ~bJveNJ(nH%%3Nsfin;xBbF=?D z`;*yk&31c6)2->NHBXGZecCmROmFT^4{QE7a@W*vr~Y&5{;7{ny=$sI^|~qB)RC$6ldnwv zdh$Oedn1*}J4YUyyb;J+xMEz^w4EPyN9MUKh}Ip^Eu6}nrk%T z3P3*T{|!G40Ey%4N9La%H_At;l63X^W=FgEa2@!htqpzMAL`JwgNdElFpLaY@)3dL zu>u~fm^mPQZ)Kv-D{|3e4j{3Hn913Ud4DvyVO*8l!UF1Ud)fk4+)4>6j|dnh>lV ziW=;#VoU@&leMZ`@D*{Qh~q&9c5Fh*LaK77u83q^F>}&tZ5b&2p%1Pfz7%eZH|3L6 z+-RtTNgdLS8&+MVw%3_WXrNuJc=KAWC5n!gDo0`4u7%vnQn6vm2b1U)Mb4$$9Yk+0 zLY6`v$5XujX~jOrxk^>sQ1n?1e1pxHu2Gu@DjnQn^rz}tvMGi!{8MuCt|iX}G8Kor zVh{w2-rUaO`&2U&Y+o#lzi9FW0w#XzPgOId!3-{5x^6Q9VTaQYiKud0tAQ5UMBa{< zVnhTxu~sp|)}1`(BJ7EdLC|&h{m&}R**en1&1Iw;bLB9nsm-3)p(?U7AC57SGl8a4(rSV< z1VYG~EX59MRlh`!%L#OH%~p~}Ypz&GH~)%i-xO%0=4iTxCJlJit2_LgvvPkGx7Bi? zlGjnn8PmI;QRPNYw}rdfqMvL4$4Llr7F2~c8ANRvgmIB{BpSxu>JPYcp)%gUU7;8c zWx6fqNKfgfJ6#R7ns#8pY8BB)#xbOdy_K*zl8FWLE~^et={G9Y-EJ1aSz4FrM6oU% z_3NkWs={hE<5_n#f_k$_rlT8rN|h7N1OS>A+Ppi*2kGRFdsR7FN+4+1kPFi0SPjng z+ZDNsqieW5>M})YjhL@2IK8TzjBC*tMTE5#uLFa5<74XccR4IN6v?JY%;j>}E3g8o z7hw7*VkcaUvO8_>ScR#dD{^N&Qbj_1I1BW$O&u$2_^NWlPFK24JJanr?D`6gjFwTG z+mcPx+VTc$hKN6vVCO%h%Jr6R8_{+;aY_J=P=knlQniEWospWuR1mCKF_s*2Dq=^j z?E?<_NV=Vlc6iZsonmI7w@$8aX*F}aGRS}>-w{aBS_wK8gR^16ba?#5He zQNhYKWnhu!Z@YJLKfh z&nn$y?e(ZLp0+YApnasp6CYHXGc8*Ziy-X;7B%aOF=5qdkauB0V3?!`oV2D^J!uZ* zkrWYC>@e}N2{8+;sG(5I=+j4CsvQ>*Kt2AB7OPO@Mm0A&r#3gnqE5zZ#xq*HP$kyg zv2OSh*}9<^_g2Acl`{C;I?EMmW1Y`WnMiLpf%t_iA?}`2j3-)g5qGw&Vx-z+14)Bn zuhKqIwYe}fpDB1VVr2Z{k;vTyzSo7$p9FrEb?8>Ox z9CfsCd%9BRvUP_!hg?o5ayb03us5*MTuKWibGhTFVkTCJW=+++J%jW9gut8Lpf=B# zyIQ2+#K{hB52qrm0aq15gGWQO-Ow=Cg`6epey3{3;dQjFxDN=R3MNl>?>p4ySj~p{ z+)fXnEwdb{+xU4!9<`MT9OFAyylu6xXy(KZ&&uNo)MCq-%EqoC$QaUNEmeV(qe!?` z6vV74@Am7q$CclWYO#(f;0^fAtvXd=c0ZdshTd)F7gdzyS!A&<1b>!7xe`!K-BacR2=WPQE4Bp)WYEF3;JQxkSN*=mprbR z4`&(}>h=jqtV-Y{cKJ@Vd9p)e?WT`5n;g8incHAco3lXzqdLWOJ8E)!@v$4!<{{FL za{eyu^XM(LL z#sdsuv9s9{H$y7FI&du8`M+xOa;S*J3_(-TTH~To4z6 zMIJ0T+Zbv~673|xb+qZJJ5+fVYT5{_6|{u-M2O?8Pb$9~cQ_$sVm>a$Zf8DjWq|G6?E)R47)nGlEJg%<8v>xX%J;jBxBm-L^cK$JS{h@UZ8{*?)tz^4k zw^{jB8pTk+ZpffzJB~V_%v^^nZ2O07)%p(&3r(9Ikmzvw7^wL+)yHQLOLs`+6<;(0QpJE1zQAjM8h&NjyJK`-} zqV7R`yt#=G9R$rV!B*GNG;9)8I{}Lpr)|-C%oyW*D8Kuos@&5kq6J;pq-7G#Mjp}s zL6til1ymPcYH3?JKxNRC>O$i)F;2u6BMXR&Vzps*^=`F4CQ}=CH)=Uu%gg99a~}gU z^7ro}Dg@HDh7fy=G>fEhm%3~9K}Zs3F?}FX7m~FQfBcm4yI!GYMVg#Y6vBaaA}k!b zMwQ1&4`w&l3k+wgG{d<=@(+N0su6*aY)OYqX?rA4$nJZ$(jO}A0s^c$YRTwC2VX%( z)%BdRCek<)siYvYAsx&Mhu^b8xxj8^swRS`;uITCBZm1GlxphAin$|DwsRvCUHp7> z^{_=#>FxT$pCB)sT97dwlo&AKB$G^{-f=oJ7T)gy@=DpAu{8<)wxuc{6NrV3a(prFGOm#Uh zF*hHGyR38~Eyn9ET(+`*ZmCpa>L#VUxHrtoJ_{KXLUE&%gQ6vc(9KvR&|-*cINR^V zPAvlHDEjl#ng`lRXFmOVHNN}R0{ENck{=lyLNRLUXiWqX&FB51JH-{zzDs3|ROi6Q zGoX_+k7&Tq*~;SHT3r3W&yyJ)EfvhN={ zFG-`fJuCZ+{0r@KuAY*B6r)%>O7Tv#!323g50_uoO*sg$59<2G61QH=Z|psnlfAXx zh1R()6_duI7qiAii!&0pg+*4eb4LI=HK3D_UtiWw%-Gy}B>-VBHNRkZg=Tne%Zy&l$;zR*|0;0V&_Na23tvIHqKme z>+S1Ddb^tfWV|O()`%mhDbw=!9foj{kZx!}h-OeMlbkwxqiq3LmI^6Hv<_uNX@k9i z3NTYh`3_t%D3(s$#!$UyJAzzCu{Z?xt)v-Hu4b}UFzZTggvuLB87cTiVgLMqR0`ZO zNA@0nqY%`rq_t)gxpG z*1$<%^-yyP240c!_I6-K96K)uz%tOPch?E;X^nKxTZF4NShMYT2CAN{0bqxgdA40Z zX-%Qhp|?VyYgwgIvhd)}%{%{L=KK*ki{RwjgxL+iz3v6>bRa#~`hXP_a-AXS71l}* zz72k6S!M6$iMOdK(mMmMR%$~nb%xGEJT9F8T6@SC?f}cE^sjFdHc8*PQJ9re&X;Kc z0Ak*=k#NYCUI{cYS)eH8WE{Obu>YVkNj$JC>y*)dKQsZZnB|&CtFFJsEggR61!G-r zeW!5iR@X@%ydsrMFqQU+h{K2w7K$elxbhR!yWj&$Emie2zz7amHK`2balS_gLrBz| ziRaz$c5=`=o1D#`^8)ynY+}Q1Opoeboy?bOD_#3U^58#!RlG@(-_ot`6~mj43yD@D}-| zmg;0)A(+GtOmFVpaEsuAYMn)(Zc^>geA8;?I5@H*M!z|bl$hsX>MqgE^p1W|{?TNNw74+A#{_NeoGk#s#gE(u)6Jk*dM-6a_V(Q_I5bh^!AhRlS_pF0XDl=y7S1JHuhdR2~TQey%KVGT=^VB z7;O>1RWF4;1Q#up0`TI;&d*Qy#)lxLwGCbtK*OlFJ21-n191P~*pp7V$FJzY0oHRi zr|HTSv!`Y@4}B2;9q_R`VD=i59q|?^{sm!nr5_H|Ewtz>7#kfgS%&<@8{x&h{R;vl zL@rfHH?O-9IL-Rg7yCuw%9R5zR(2Xg z-VT)BbO4>=KYk|w^3iF?_F2A(RKD!b|A;$E`39uh?}2Ve#%w22dgT^uv=Nnlk zqWlDRFYGdxssL=OxlbiqHrxkEV3`1(fC`3$18BZ7RGaDm@p1=HK;=H(DnVw*1NRB@ z>y~XLX})ytKO$RIpU39=<@_(Gb%G)dT_R6ImX%Cr?S{H1cpk^@m-D}t)yj{;Eq(p| z3r><-zb4$ha_I*LpW!24TmCat@BGXED$uL*Fh|W4#(p#Peu&Z@*W@Q2l2e$%Fh6-0 zWgr=4dudDN0t}WbwQ`19O00NLDf@L;-3P?df_pb?<9?Ca();PxKkb;fCx{9^DC2sdXpn`Q2PC~{D$7)f0Orn*C!SM)kfX$4SZMXC%5IH3w(0& z)CXnC55Y!cn{!dd>QTbv1Xp7jgf@9#x98VW5Vybln{ZzPVkKnXFBkaCH-(p!N`Zg> z7G$?Z7uU#L>WAFpZl)H;+%0=07|fSES+@T*Zb$U`^A;w{Kr89g(U;VjRr6f|piA+^ zRnWWReTx;lv6Mx?d1p1c8V$sb$~%OOQuh(ah8oaG559cmejuuT&kl{$&xU&HKZLFF z%m+|5XJ@|UJ}~$`mi@lu$$oQ>k)TWJex6$~IzH!|`0`9{>_=1Y8`f#K-mcO(?4P}h zGF*sqEQ0zjXFxzv0}@ELu?Q!BgX^R}{16U&OH~r`!ATYCgZdGi*TBm5b5>$Ht`tK9 z>6R&h>zpN%G8Mf0F*w7#Ms?xSMW%VJr0Q&gF59*amVAzsRXc3)Hlb~wJi_g ztpv4ZZNwOJN^c$&*GXT00-owp6(AN&s-tPof6ME1zELESn8AjLOgToj{jBoqAAS~7uGO)AF=D@J79G2NMQn6LUOZ383BlaC&HKPJ)hRdm?w`p$UHTGw z@VH?mH(nl6r|lzQJ@P(X{c+Bw*jfU z16b7=2xO;~&K&l7C!ZEpF8j{a1%-G<0M>GAE-R<@0Zun0y(Phc zYSKZPGNKHduRSBIT)SKo$zT8QiGRRZt}dfnek(xfFcce79bj+Igi$!Tc4jxsN#FeK1$PzOeka_zjXVhn@anE&V7gT%<^A&m;{GhGK8MqP z5IkKuW#!#NPY=z1Z{*35Z;pI+M0?bORt zPfh*%)R(7DPQ7I+KNXoeHoQWbIq}q%?(ZjlF!8SwpPYE_L~G*e3CKa6*fgOTe`fr9 zq9P)oP}S`fq5(ieX9fpWnGdg5%N)O126|hJrXsv87y%v|2JrV@&A#IJqbUwsBhu zv!WJP%wy-HiVu|wBE<}raNyBMC2J`bnCMMPdjSb05CLJDIx!nf`i0256uHM$HsJwZ z$7ExpWHF&T@Q5mRbo6Me8|5NMGVCtva|e}B80Rj>orun7EHu)lwlBszN#z1}-a$c> z*^HAsr*|;u!9S^TI;z9tR;FBULW)Hq>sY7C9jPqh4_b{TXDy-)Who`L#knme6A~jF zC}m-a-7+Ht9DQdj=SDemv!izzX~9`Cv%3n49amGd;pIA8jPmh_)hTYeQjjM&1!R)L_xhpZMg{0|N6=+Qx4tvymP;KrprZGp;2M>?YYcXN{KdW*#+D3x$CXpab zb(fRddc7()H3iJdHhIiztD-qwck(Z)0&N0sD_tjxc22PItQlPVh{nPRW(FMNVTdQ^ z%S8(=>{6Nwh|LNK>5a6P4hDP-dhwqXIbY%l6wsdXT1Ug~(jgSB$_oJ-;`g@8**xcU z#+b>9a$8+K-_E{9$pHO1+;@si&T{(dZ@~cuU4<4WhI$5q6xk)8S zhU3isCd6;uxqK+#t454RuT{*mZKjMi>v}trVvBW=u>4k)7d#YZ%2HW(vfMOfab#AN z3w0JRKBkC@tT|v7Q=2D(#V%GrIm+G27Tsj<1+{%F z#beH5C0i{}?W#MwVN{hz>k+h$F@**lO=nw1oBA!r2_XA0*3-psnJQ5h_LBcm+atO# zLg59Ht8iLi8nLUdH&&qns9Rs*Aeh?qB?xxIt;z+lEbTzt9?>Ya#a!0Jk6oh5*+>h4 z{2^<-SSyM`W{(nB=VB2Xh52+jTQXGl`Fv@O63XUcRMCR*oT=u|n2h;CGO$LqV<|Z> z7hBcWZ8lva#jUzciPmy4qq~iHqDD{5RI`SB%<=zLE{HZO9*o73F`V+Z6Z-T9C9#o< zrd%eZ>CTd|W&#aY39mX0MB^z3?x>M=L&O|TWRatcYR8g}VuqGkA0>iuvceDlm+}T8 z{w{$T;@MV#vjs_9cjyUK?jpkGs;eYmMJ7q4*Il8Q2{$ks?h2P2xfETd^!kYfRW1rO zOxubjYPf;Qmr%=ts$2*gv3%YaAW|N;7AGdo+Tnu{tllg_Xto<;qP#e&PQu}Y#fE1i zo>bJ7v2zqhsk3%C?ziDW%kGV|<1Ngmr_~Q0a!?sWpYxF6mM_kl(B1D;emGPJ8nJeV zro?UPsuMC>^9b$^*RpkeNuTERO6~*~!jdSGOnbb}ip;%jT%}~pav{{6MO#Rm zt%`vVL1$e`e3}c!yCequ(n7Fpux2tX)}+3$V7L=N>q(?w>-d2;S~q!A=}^!aK_RiJ zLljLsiKPvDKB3%L&>rN>bS4^tY>Z~fV0@z@ri=a>U3I#=X;^-}*^{Luz}vWk(8j(vJB`Z5M`3 zslV$btvRfXVwt?R$wh-Gey`G=%0cELTkvY_cAU3naGknZQ$jt12`=1WN)}LkOHb$4 z4|nC|mx8rk8*bN7B$(2b@ypbHQe@SIxNVkHF_hploS^?t)jsAE@LCy3`;0W^we!c- z9W{kkM8pzLrx-m1abm(H>RTjB(E#R1dcu&OO2KMyJw4>Lv%!)MALi>8WzYyi+di}{gl$JC!CjDm?}DuE2%X$Z#s>Lfs7 zVi4;9R*$;|qqBng)Y;!t_Ly-q9nSF$o!b^q&sG%s9x9N)>?Ra=CgN?VLS2QcJ8+&g zifE@`G^9NlTRDkDE?TkvivIq`(JHsZn75j#1$3rtcKzR#4vAsda+Xqhm)X%u$93VC zleDa_29vmYrJ%&N;ViCQ~_qwgXnY=B;HzS~Yawd;!8m13C$D+}?*K z=zZb^0SFU>4BLug#YT`YxW$sICSCnJBphsh5rPf_Du`FzsNjTjUX*>pzQuje0mawH zr^mmWG?vI;jEhq zk#Vn}T>q|@!6Ug;1$Ye|@X*PCrN4VwjwM@KBp~A$TY*A8+qRiWOuiH6y)!=@@OLe`wa3Djy!cyUjt8LKLxo8SBy{Kx|;=~V7zwZz8t z7w|NK#}WvP)Mw$S==_9{3TF){Zw|*$xj*~omP)0YU(u|WN{!d9|03X zcc(NTUvZPhzGD9AeyPme^Y5Im&R;oinZI~`jpjXbFU>tQ_wRFGp1Wi2t#kRg@Z2%A zQ0Awz56yml_5-tT9yZRV&M%eGG@w{UaZRxOVj0CR@t@Q8Pk(g!UDLJctH3XDWO}{k z^;54*{c5WF$kaW&gzA^FHiCZSFnGh$u6Z(nm6XWC0j{k7{L5+RN$wPegzv9OZt$2;pyA7%+;un3=r&~CK`BPjZ>+!UB zGavhWe`?`LYg$BUM(cCNEoD;3L>Cpgn85>(rI%`Ftj2aBhrhHu+@{@KEHOwnz7`%`-CzA#)lGK8mrp}t))1T0IK`uD+5FKqL5=;03 z{;+C=Ets&R$z-G=CPDA*itazC?U{U=OOy$po$&eH$QC6nju&(hA7VD(gvhoGK2|uS zF%hVVNgtxr<|OzL98h>?E4eBGin+L?Hg{{;Lfc}Dbc=x~YRRp{!Go~7cQyustDv(}C|!Cg^Mn>)M~ zlq5)=68%kQfV^Doiy>P>xN0)d&R46n*KqmgRJpDhLJU!&l5+*3b{DEu2QpJ`vRI8m zOt9}Wy2H9HivNLU$`v2ht+Ha9Hy9zXoUL>v6j(5wlH%MPifV0&v-E(<_$aT zPB$82yT#05CBc(tC{MQFuOjY5&hO-fV>;EmgQTEbMaM;%Rw!FWc0HuZ310!zTf#xN?f%<7PUBHXHVm z7~#!?E4||FikVm`+D1G!)M4>jLM;{_{*)?bEII_ycP-9Z5bzpp{O+q&MYLW*fI^+XBtJqnfUenHigENAEVr8t!z)2mHOA)Ui#f9W?4eaUoO8 zn}wiXCm7YY8!qdh+A^9>*i&^V*u#&1O=%y_;aQXw(|QDLBK3fd=$=p&SqF}|v{c%g z31%CO%+^ZSHc^q~~2Gz0HP@(`sW}=d~p}wPG8* zmK|=hI^~CgeiA_o&PJ(SFE_0@o7(x1uVe3G(L5gq|21uMBrpFbr86O`gGM>gV8!@) z&8yFmioci-8GIFlv9-;1YbjmQ=Z-5UWj=(l6->Z$o>ES9cw&4&+5PjuS{p^VP#_+( z7+ncNX0PJi=Yt7Mhm%MZD2Th!N*&SL?8*-Z?dA$*V;WXn$Xj$VC>>GcbPj6$o@ z=p>SEM40$5RUU`fGM7s``C_mXb|OdAIff48^;o&amWw%DsCIIz)Nh3*ylqU(=J-(F z;>vjt+n>6sA+6SmxxpnZ7Ilc9PHvWz=Nu^OIwlX!)MJ(`&`|zOX$`rZMkJ!kl|qS9 zfyVJ8cc^l<12jKA%7L>rYqgoh71s$LU@VaF?<}+Kde!eY@E3hWZ67jrI~Z)gqbQXs zKfn+Eg zWT$RWoBN^m7S)wA#aPA|D2j*GLGHJCgJ`i@ceI6Wu-Nos#@p2kbVdTo=2KLq?100G z5PZEN_hs_|tU(nEdJ0Bu0_JUH!1*%%Tq2`)aK2KDcVjNa)y4ZF?gCQogbWdFsU|j8 zy+^g;cOnSeHUY-JD+8V-$193Yl=pJQ1XhR{y>&lV_L$I+;+*8YEU-}31XqZ_lVsAI z-159)$Q$=$&~_wHta>=T4ka$ROOaFML=iDNbu<(9`C3?VTHRz&LV-g(I9F_OoXWuG}w$r#g9WOc#i{vmIm3 ze5GQC41?1(BQh~9L=~DD=7>j?lSCA$#9I}*Xv~J&ocE`yTwiUVOW3Zqhl}Le`Ks6Jvh`23ZHW$l{pjC_RfE}&uljc1xHxD&7zDV95w)4&; z`6l%OOCH0F0g^|VB{~u1$x9ndAL+Qn_2N2Rc@ty2xlw#0`*Qk-4IS_RWoL$UVj>_cCJ)4696P|#I8j%KQ!AQ8OA=VG~h2N#tzjE9EBmGc8C$@C5P!QT9cxLO6` zvy6%W6}Wf=Y$=E9rY&HumXlEbVaS$nz*mJN8esBTDh2q?T?eE`IR=m+M@1D@bKSVO z6VB;}&Yja?tu%FTs90e1DJ?-ENoi^lYz>H|GryexIz)ll)O*vU*iUgfc+O#vA1D`7 zd>?l`2fmX56`+cl4=LOje}7KKJ<%`91SA#(=B1Pt%SaSQOM*8CX)8%7Fb+K-mx`q` z8FpXqXD9Ci&YymA*rOBTwynCw!_XbYj?L_dMs<~rBj^_@I-@8Z|1Bhvw&z4Z&RwFC znCfArn58$L6}M`nGxH)qT;hu|5s7h=VUNoqfJd9c9HAgo;OoN8A|w5HO5DHxHR9cn zu3eQre?7BV`pR}sNc!2sm)<9xm=QN<5Gg(*Uc9R40z_vt8_C;|s-s9k7RoI%;@efw_R!UB}NmfG?K7dl!@0MKOVBr6M&sfWdI%z zu=ap^9#<~@-D*+BlV7fh#DpUkLK*~`%3CDQT5)zmC;<%9sT`HDXCcoWO#nW*42UH$ z>&1=I4Qs`@HOsUB_|d;?>^=CD*wp~apg6TL4*9?k0BL)p0VI)kr(m0}g%e;)HX~D4 zFQ)~9lFZr4fJ<*oj_p2~It$I^lj*gs07#a}0Zh3K3K(RHI3Sxd?GiTtz@Rv{e)%T7 zn{ULSbYbT^l4E;HCzD{0fuXx5o=IfA9iZ?=ZMt~J1SED)@txsRdvDk*&O!?Fa!q>I zUi2~)e;k4CNt?EcfG}v4%P1&>%D8|A+zqg4fXxUzLad|T-hI|pS| zrvb2fajSTtjOESSL^)$wIG3@!H1|$T%iDn>Mu4?`wG_d!v{^qz?`#h54v}7stpGYx zMyB%~dt&5I!*d!;&f(nxIlR$D1AJ6UVNx)v6ZELhlJk`*;KE~2`MCqr$x^ZO+$kBz zEAZDXz0>W!aVv4>Zh3xEM%?NLKp$UUC1*L9wKH_$`!lN&1=b-i`Z2 zk7iX4LDNRe>Gy<4q={Hcxb)P1`MLqIwCkI{argKGBG8DKwS3x&B9#`bQ1*td#Yx{e z2$u|srNF2_^{7K4z>fM19UfRdyim*!91Si^FMZ)6xMWZ)t(vSH>+QW*1V=8ph{E$J z_9sFp?kg2=vw)HSU0K0nM(NFm;rR@RrSijog9s3{8+(5|ERvd4o=nUH@pGK_xe-)s zr$zZ!*Gc>l5m;phbkbvw=3(l4{PP=oi$}y`uvC$Y+H)O1JUOn7SX;C|8Y!m+yV5u5VNeidm)-P4u)C&)Z$ItR#8CJ|~8hL)^is5xrti~{LL!X#tC;Uoc@rrZV zq-A@S4j_z)v!pvFaO_E@W8xa=04A3DOU}upVi*m15zUIX-teWQ&3ojJYe1~rX5*4tl4)up6>vuQH2Qtr~pE{dd1!`l(r5`I-R$S++ajx-VPB zt2Q_iP~~6-a?va#swM%r7S=o9kmx^Y=?a@TzjnD6lE(7m6@K7rb`dJ#mQzYM-+SqLK$zTxOJ;|7A;inu9pc@~yk4*K0Q8|I0tV#mFB<@YD@c z#i{7jiK&BAt0w<4c?JSarzUUHd`t;74bM$pKD29cPj_-=;)RJHPkgf&FhNb| zCbkV3hu%CfI{v$%)cE7$UmO3}_`Am&<8K&u41I3sC*#_o!1%`T6=P42Jvw&p*qviH zj+Ms}W9G4o##WEM+>bn+9=&6Bms))gy;A5hX^ zr2}^k%D^VD5upqvWNxL1+V&Hac7tPUn8!eQDu!%@@^xJ;F zZTN~I3I%|aXaGu@0C_dz(n6(Z6LQd-+xY&$u4Ob^NW_}*q1lqdsPl2#6u(0&+QBGH z3}n-K#*WiTT$DbfPXTQ*cu@r=P+MS$4~Jl;#c$FCpbZ+3PT-0NW|I<-Y#C zbqFgJs&{RzoPhXUe2v)hY2}{1RhQqA@q2Z(T&3bgx7?_h2?pvGB=5!=fCEhELgJQv zeR<1c4&g|&R&tult#~bpZ5dbE%ehK$JZ=PA^bfl{7QmWEFS4Dry zie59YA|}xLKGmmpVVdFI_YXd^JkP18Pn|m9IZyaL0Q{N{cD7@qRx98XqXYyWq&bx~ znAXI%o{hWZZE|*sW{hevO-HlE!~lM~me=bu)l`f!YIYDtWo~5}#}&2QNmm@go8!5d zJL0Dj{PsyK#|_sBiVQG}R_wS8VPXRN{aS8iqfBwiq`d}sl2ldPa(j35TFz3`mGD{s zA*T^bh|K20Sd3F!WC_49_PSDOR-Y9&V%uA5#o@1bDN`=Svzk)D*?WAh@<=05mGvqFLc|Op4^K8WBfgv>fjvMCa)fLo15jN2a5J5WoV%l?HA{u(3l4B!L`#q{juMW5`D^=F)CsEC=Ah za7poYW+r=FB4)JFQMoQQzzefRz(qC&JCo|8T)1aJu1vI>IssQVKzR4IC;yJQ^7;qi zv4ATFSn(M-WfO7;+oOE<^#HSjb5LG&!fB}67%`BU#g4&FwUHJ`-jykqcz?vA%5L!D z_EjsC(#$myoDG!mrj;Ii5wEqfBkOAW)WvkeRV13?woi2J$(@{c#Z$KD?a>aX=QY*T ze_$z@bX*HDhW4bPYH;eR$>HOBbd{z`=?IZ+bet(yKE0ug>FF3jz?f;$opLkMjM8)1 zhucYqDtW5qEGBE-M7pBii~*QBqSoxv`FVGg@WfXP6=njvxH>|~tfP_uw#pPr@m!G^ zIuVN(oUs^D@R)@{DXC9+vRm=D@9_4phg9>OqOIolXyU@;7jb)DYs`|QUd-wIQ8pwJ zqu3DENoGqaGU{siG$BIk?WAO{zHD#=BYsGrO(s{!PsRhh7^!kOng@(Q zl`)%~xeJeG$Q|?eRK}FsZ7LEDa`-0P+;0h}>1ZWj4Y2Nxi4=#hZ@S}a!4;`&i-*nT zq|+7I@;xlYo2(1$N}7$TS7nE`l66``St(1W5$rTmlLNRt;fN_IbHhT^ zbTzFQ&}`r^UD<#bPqGw;$}K^wj?QlReUEMxI;6dz3&tGHN+3zhfg!#-{z^^DNl{!& zRfsXH8qlur2Wxj?sW#y@<$MOC7_%i4^VrbbZkLNS+L9{jn|?plB-K-R4{f(g8a>_2 z5*o7yY93L-!k4-~+-`?*9Nj23gPFFCW%8MUZ+E{yyJc>#l2RO*~W*4Iu}AyhKOYe(Sxln?1zr;x2$D*0^CWuhJ8ybm`o zYj`V_@|F0Sljk%Be)dC{UUJb+(p0WxeM*OI#l?%8vHc&MyTuw6t7r+Ms#Jh8VrUG@ zFPOE3YBubTsEmkL=`JZda8iM zB(r)G6|d(9@#_av{pnV(elw)Ffeg-h_Xb zvzT(U8A{$$woWji8d|{3Idk4jaawsA;^|*JyCAdU6{+f7{WJXrv2l~z#veRQCk*F zX#kS62~)A|c?U&QRRE{q(X?YqTO#C3rE&9>0INzvNOCr+W^C$GS~d7F%FzWZ(_RJ*Y1#N)ShBe*rS0Hn&!4LnWOJ8YgJANeqPt=rEE6$b<@!4 z3IlA+mKGE-Xf}xw9ggFpx7EqDy;M|SY$1=%tKySmJzc*|TL3iHmoqs_LYyNKi}*-x zHT`KSm!VYpDkJ!OYQ;*c`=hNUX;Tv(Pt?oh<1qfIZ9RIuoc0iGEE6aMRn4+BHTSiy z=FqCA>)8xMA+b)urd5x1?mlXjP~PA#O-shq?%JPBJI+^J~J1IU&u4pp17z5G7=Ce zHL>9?OpjEH5h9s$W|M8N%1}~IiFn`ua6{#;@$HlgT)&Z{Ib5w!Dh^RhRf4K{%lUAL zn8I_j70eS3%9gZRTeM!st8U1;|Sm6W1%y`93fv#WeI+0>A?Vh{uZ$K6M&&XLY3mSD3v}Rv^#6+9 zgN;ccFs*<|r31bQ(hbNYfQcmkg&&Hxy8TIj`ZPoG^>0v43?$0 zd7bePa1nlfwvUHy_(NGGJw85q37D5+vUy2%rWjcz+#&#YiG#InmNUR>^O%}Wn}neifUg_H(H|2cEg zbbiP=!hSFnFWEz}-zNZ+)^vmMHbbMVdjc-<+Fu754JU6MGkqwfqKvK&K(a9RSHkTwwo zjml^=SnYrY3!s5rZ|cD~I6?Y&7&H*7scc>g8}Set=lET_B8Q;nY!6efZz0)5yh6f- z^%vQ>$aCd`!_q?q@LbGyUBEk_4E7Z=Y}4?aZ@Pd1-m>QcUi-C59{<=C z+tHy*-f<|lU)uEs14?NRX=3d<=`Eq-36da{Z{7daHtQ}YY5&8mYhepqfi3Xf0oVX@ zlV2MD&DgFH9~i9emE&SQ3R|H2kX(xvr`{xLHnm8!Qi)L6Qx+|WG+q)9T@Fj4kB5#t zwE~E9Q0iD(yn^=txTGz>nE-mY1~AuRwqDbq#+9&J^pT-paRGqJuH;3;p%R%%NFS?9{{K3PRk)DM3-QcrF1?`2#!cdSJRno8FNDJ z?Phf9)vzt}v7pY$;*wOnnvW~yQ%034M`XR$Aj7!C3RKR7$Cja-&l)oFZpq>I>y~ns z!q@Ox+2bhJBF6D3fVpn9QI3|r=uhx`x|7DIpO(~;#azE!e(T#j2}56LBGarqxpxdSCSQ(m1qZ*41!PBetz z?0p**y!3meixD4F>`|A*cbxUYb`r56$ zT+7IHC;&om!d50|ZPbaNvXwEa%svQ&M;Cqs-l30-ZurxC;2j`6>gH=MUXZ@`5qaj@ zyj39rg@)sWV969T3$(l`EYJ3l(F4~4qSV}fod}s#4_&ZPy8R|_xR3Rg{B#yhB zJtUX3#d9DWGbyuVCTA^LlXZZ>gPOpy>f`t_KResULk}GI&Jt2y4H;^m`!a8m2jIeE z15k`7EIwUb?<%zeCVw$0i&;Re2YG-PUduvzvR^qFT|9Qty!3+yc>t4?E8ODF6b;pu zk8IlmMxQ%xSE;&E7ST=#7GWO`fCE1W8c;aDS!zo1#C9LL;MmwHjaj3CNa!qvoP%-* zCiJujAN7t0VCde)ir;jg8zi_W4S!LV<2-aeycF(_vr~x`y)KU!$+o#*G>z_h7&gnb zRH(illk+jRNZY?EPfT5bQF$mOM;YoKvy!W8(0d+%iP=X+56qpobn`U;k^P596>2zj+S znhIvM>P{x^glouqZh#t$UUb=&iOtdw-sbk?dcGg}947bn&q% zL_7SA6dlNC;;FU}bV6y??nM0kS70Lc@o;HYz$sspEDy=^S$#;Zxrg;|kG~iKUxQs+ zYSpy5hzH+j6+htt26Qb8&2KO7l^j2TA%t*Fx!5cY!>mK>iJQpgW2B~5tRzfvwC9_! zBp&+)^rVjmC*{5+Y2-h6$mgxp($zMVBaIqexaF;Aur}3vlHWAn&myHWe)*_XF-S7# zzyFgzey8S;Tw2!BRp0#@eTt*ox>U+mGkH~ds6Ec_o$aF{-N^Gx(jx_fT;TpOh{5~p zQ~cgJe=wFv(@tMG2L`Ytsgt+F1@zKW5MS^%mTvFom(iu|v;IfMQCvb7e49UI4vZjF znY1>QR8VKO#w~d0?))~qcOMHq@arp=rAN=W6=H#2DDuN-@w@y^EuM!v24=QTbBdQI z?;O}M{_2=!Vzh^2$(ri5D1eICEuyOcvFk|vEG)IPRHUmfE#3V3rV;e`qq#-to@ZgI z9CtZ$NG{2z>y9-`2LSOunDVFM9jc}C(@1-YusqjKMi1P3&t7TAzvThe@k^%)r_Jl* zIa7*?6kT3(i7A`XT6E-8VR^QXj1G@}SN{EB$-Pg2Ft=zvRQ8ixsxBDYM6sjQ$WOt% zI!#!Z>*qnSMkA;ypFHSB(bI(^JBdRDc=xlrz3xY@Lc$rs^2}N)dSd>5$dj%fKP(-* zIu8-Tr3`$fU!5uJIPP-wq1>_65;Z8*4Bdf(mnpcd`1M+J_fJ6^=qJO0H@%D=zb`W^ zP5wWKy4yh=%0Pc`Fj*`V^hcCAx4?S{RSI?ydDb<51`DpAbHJpB2(q8aVS|?^4yBo-BShjtvj0!|&f0(JzY>~@X@qTpbL7+blPH$eMhX&?Fp zzj2Fe{U+$ZzDilAomIoPL%{Fw;fQjp$;wySIWE>GSmMX&b2Fl$sfNV@dYz7E{ zYhE~%VJ%=sB%?I4{*GVTv>q27_`#8rahK4xKk(BVS*Ya=MaV@c72l0Div`gB=U?80 z&UuNSJVC|0<-Ydzmf#|j4rp%qa5toR9L>B0gUv!=Etk>Of%s}BX4H!icioI-f-Q9B zOYm;%bCE(l)g7mXVv~Dd#tcX24ecmGM=yx2o^kbsZ*lCNSbtE~x|2?UxkQwF{A5769N zuYj#%EeqZL!Z}Om!y}dL(hpz3$CO-T0v}V}Ow!Y!eCAx+5cHG{Wk7!TZ&-Lgd=0ki zJ|24F_KnNZ@qgi607jY%cvw;yjPlJ+f8XZQ?sk^)=`cM9iIo4HhkiHDnE>J>B$nf~-*1uq<>1Ro|yc94h zAPwU1|HwB))uGC50vQ^JCGGgG0XtXeHM^5q8fF)43ii|F+sVSZ*U3+?&rmCI-) zEN+#e!-88eA9t6GW-{0DQ$`mF`H%v7Xas(|kBs*CDfscL=ZB?<{9SN1b~S;s#)MtF zG^+}DlXJG64VftM6bZSKv?^3LYw18N$l!ilJtlyMqK_xtJto-XF@J4b*f(FWyDDlj z*KU$3N=Vy5C4@Ivp6w%JZ4mT?QS|7TFe80x0>*kiT@~Uy-R3lM^(%ceN}`u0;n_Yi z#59+eBUOSY7N?wA(#zMU!`%+lxv`9ODeqDhkEb%k)C1o0FO z4skQ^8+~MS6U{>lYfQ-xSx!O zExTYYJ$U1=l>Re+&e6H#8W=obz%^rp`Sjext}$-p?x8=!TzZb#=~*3tC4-BH(>k@q zV+n;km7uL*2Yr^>2nxemYFCq$l@;{(_tRUXJ2wiT=DSvhk4?yg)s;{Zyt9??MZ8+4 zFLRR~-nEYkwZ5U7`|r4U1Qqw@HhuZa0_fJ{>NH4EZ)0FGv_dt#kxCJIrmk+*nl8Yw zpM&MQbCa+z|2Ceqe-k_pv*C(Gm<`cvgUV9Dk~vYcbYd1LkJ5eg`-{TDY#$Fj@w?qi z=!L`05$X8N!a1PcuTDZ2&fcblF4)aQy^}1}Jk5Z?V9LV2+1?^7&%cc<-M>XJ%fJ4& zt-|p;>D7s2+gBr-bqCEBbH)P&vf9=-qPGc4Gi#~nz;R!PYwjU-7!B^ zu~ULGr$%?|gm2MDMF(Cvc?muG(w$!9-zEHOo)2ZMQ7WRNnRtXXm5OPUI1YZbpNtOd zuYqcR9K1UkRtkm9Ca94aZ9(ig1iS{xC}bPCjd0Fir4;rqtiwZxPu;quXIfu4sx8Fw zF$m*>f-89+1eYhXEM%9+SwN^m3SgsOmy4j<3dEMr6!))Dt7rjE`aEbbd2nFnqcnJj zMF`9WJ3U9ExJrQJELzyGdHp6RzS!z1eQ3W*mXryBZYApvGY7r(S!D&3}B)+)?cc($AEj(Lh?7JrBN5u>HdTbyx<4G_tgHxsW;MJ*tP!9v!b} zCrG;Tt~A6ZLtHwH6&VGU2C6Ao&jLZ~bI}9O+|X0`(6)C8;DHT5`E9~!-V^lFG4k4~b8XBTJwIrFQT@6JdYUYPmR%vCd`naI?;r_3^-Qy0$Z zdk|uOn<6|JncUwUwWlV&c!O?XaPlhHvB!3-BZMc8SI zO8B{EzE-yo&WtAA4P!_Vx@3eT6Mlm=VlWCE`Kulo>YiC>HK%PA6Zuw7_2(WLF8(6l zVH_?V0u=@G&#`c2)mJA9Y+AdbjYM^YSoQ=Qij`7|i8v*AU4)+ZLLF1B@tatVG9e0K zk3}f(&ZH)l-Uwlc5Cxi2`n?Up3;Rl;V2MBs#pYXkbeFqCW_=+WQ}ZibX6-50cf}+D z8JVXNwSup1U`iA-xDCg0Bs=N?fR1#`6@ya8P>kxNtz9|Ec8c;7Cc90Uf-vN!Qnl~T zJ-R)TB&sGN8q7AJ7$-4>!z+_*iz!H$9K}L~<^3)zO}^Y~Zy<~Sfo=B$O6j7$#LRS& zV+_gGO2<)$lAbM{+d&&t)JeN>`&Qln!J97 zyL<2%&7i#n2$!~&&YCua1Hvqh*H1P*q(4Z-G-BBgcuyjY_Kew_YZU10o}QRS6zV~e%1QyshQ>sT zNFKma8irz#=tS~D0>Xd^D3E(~kFHGAD1XeG2yqp&HJICdF$VNZ*3&wU3Nfx|Ih*z5 zi<*s3;?Gr2VOAVrl__QZT94t^aa!wX>lr1e)V;z+{DHq3|4=_IPYnn&;AU-^J3)F%IBoNrynU zU=@|rr@*kuvAoH$ogra7Q)Mk-bMk?d@_oGrY-$}9$WJE;1fw zLZN(B&63%P`|ty$QnpGrxFl0`Bn(PE!w~p|OG$u^)MVIZO`DIHY%|SX^Qfs#z&(X= zR?HQ_5#NQQUX!J8U4T8T(ALD-9;?Wmi39DDB~z4#O1&+eBf3)3wX>( z32M>7l8Fp`@->)VY*bTpTJQ%MqOK&IxxpSBMv(&qCNUr=>s}?FC(??a;C>dvVyKbM zL0w+jV`4NjIQTtTG=!ssrctnzqe+U(XofE9&HqB(>!TW;R)8r}xnP|++kk(!5ccIL z0HCOrX@P3l$^AWai+mM|q+10orvupiDskKyxOqOBWT_yfT8Xis+c=>DLZv>5~1 zU}uH4W>}T>D8sI+)1otJbl7zv!K&GhVb_y6jk=t3dovb$Qy*~g3_cW+*%nVIbw!g- zDDi1CHQ~kLv+*hvCZ?ErJV~($GC6f!kM0x&GE=VA1HrOWtq~R=Jhwalvlfb{N>Qqr zY?-tX3#FaMPy7ILL%;vGt#I+%6Dx8g|0WIAECK}t)$ zVREGsZX$Q~MOePra&rW&v!;>-n}Ls}&#d?8bv{owTDn9@pgiDq+;Ls+G-_r5f4E|` zk(z|ZBmnebyZ1n#si#vmPn0XKIMT*)YV`X(MjsaFo+bPSV%B2G14MYRoiTWA9C1~z zd5BaJG$C?rzL-*HM0y!F7i^5vQVeLI8gP@dsU~pTYf@0lnnt_fcjlcoHWoiw=#9TX zWF16{D`*6`(wOqeoxSalZzaG1s`5ItZJ(3n($fJfzg!N4bInSeuC$DmQriFTxH}~a zWC|Gqxk$?pY;ao9@4$2+5)#OSDH?RCU0J^_vw`i=wOnCp#!bR(lB zl&q?vau!)zirfF~9-V1w$zmp}*Q}UTF`GI&G~OF%CF2g)X?0WYs05XX$!l?Yp%Yzkqabu{`5=&mb%rT9gn1oqx30Y}EX*RNi#yZp$lTtbXirVfm z*qd4%Ks{&NpU2`G4z@I*DR@kr(f+PMPR zG2vv{;ix!kY4)C;plY~4q{{iY#hDLv0wg<#f0*DC1;Sk^s|9;Gn=+El8*ux&IW5r9 zb~)`Jos}3vIk1+Qtb0KxY^2Q16wxte^eX!|1_l(|o6b!5mvqK$Lp~@%dgF$Xm1IW; zNl4Z#E5z-b8Imm{Jv~8;gc-u=;M3Vmy+*M@qr{W&LLU5Ta}yjCc603t8lW4MiJ z(#bb1uB_PVC`FA43sMof3Q09Jr92U^6?DX@IJP;(G*|;^(o`aew4T<6G-qDe{g5f9 zloYi&P#rR{ilaiGUBF_Pqzyo%Nlmm?h1AWJFgb%u)~6UV#cBj&F-!V031ezzvL{C0 z5>>QdtyFzMqMbH9(-Wg~0cM$A&3XLEqB}+Hz7f-DPG2TMC5y*Y38(T&+Io7A4u&K; zZP)o2Ytom>QHmdT=_@JPRWcLpTru1>CA|%8TGQ)(pB-`!Mj=m8jY1-qOJ^$XqD5&D zH{$Gu6y-GPX-&& zp4v=^a5^AbSwp9CtY&abQW7YaTW&NN)e5iKO<(nPFFJ= zjcd&B!PZ*Sz~I&y)AY5I-=EkvcHw|&O*RnFR}cF641Y8{nGB`F)Z zmgoA(DE{CtmeFGuikqcp=VVJAvnrPf#MbqiKIk(Lka1ScCgO2lQj4aH!qRLX8Qoww zaY;%VWqWVT;u4`Ag;DFL>)Ik`Qlqb%p!a=bwCC5FCFwY`{6yRAwSsQY4ALRdP^=UZ z=)D$UX|A7)4$S=LvUJ_mcLC;6*E;+^R^gO+D%z+Sh)&UMY9{>IHiS87ZSZq_ zF@1oHdTDI}V6$aAX2S)(+CPK}ISXVm-mck$VVWj%V;GKO6jKlYm!^pj@ zvRPsSU^WE{@D`ARqqXfEQ`Hkrord#4=?n8&>zC$N!aHlo~!T|LyXu z%H=Du1iiN4R@44a+{u*P+E9x^$^FoiJ~BG+QmogLPklMJReFBE042@Ut2;ps4$r9Z zB`!u;1KE;CtmhJr6uKt}a{9>V$TA1vU!NTW*Fs2eDCYb;Wj2RXWh2xw$RugND^bC4 zH^aih%vu(>oFHyadHLvw^!RnhoD#o^fKx)f3Ized2rN4#QehLTr&+H{U#f80l1haI z5>a7cv7dz_5ci!g?35mIoiwXJm&b&yU>80Z1FN*MW>*4wDb=ykQLQ%9?%E(1&>vzj z5&C)Pz=fABqZdB1Z&=cv4{tS}D%C4Ss;z2p&7{!C<^^=q1uz(WWOU>&*DXu0TmVD) zW~k2(2C=vD`vd#HTbUTSbIq|R|Ig*#)f3@;u?s-yR0~kMpcST_N}rzfq94Rz0`yVQ zGtc}1%;xjUqiFV9rHzs~Ay^gLkAHIxusThLOcatfch2pE&>Fh{LiB5?a#YPS+W*_^ zHt8_|<{_jFtR8nvM6%y9g6`sAf9ofs2i|!7TxnOb`@Cv(8J@?M@1R%7q=_aU>Qt;s zCf?4XS09EE>m%dk3dZ*liT&!kclDNk^%0l^s#O^~9}A-`l}?z5s!b&!CK|*>8r}N{ z2IEZt){wh!%l6t)p+^&~LI;{XV4JsS#_l`4;+l^;{C~y({t}xNAiS4Z zmBH_^2wjBK+Om~^$(Iil^mPv1l>-TVROH>}SdxbG@)n+pRU>+$9FNy^q9*9K_6_^41mktlc)TF%R(P7{1QZzD?& zG_jB8?=4~999p)b^L8&3F^_l7X}!@epXLD zHp0fd;LDN__+wyFoV!}&(TW7Gx|WRM-~Q|}x>)$axQsG*yyE7EVExdmdqE10>DJQa ze47sHl+C!q$;P1g#aR!*D8G#?l^+5f1sqw@!@_YlUnZ0R7B5Hw)*KP-m;ucvlm=`) z2yGFw=<3UarNwo*=0WlBtKp_J- z2J%#F(gfWnecx4lj4EYG8-NLBTN(X)F@nkWkB8TZIOSzaOT`?i)dcSj#~V?39*o ze&6`8l)F&~Lrlf08f5fBcfxRM*6M6_lGfGY-VA#1CUE_h)=<%b`##y->PL}sTXv&# z(#=@QXJFyrh*`?+fs$?^#>p8|j-u#Pfl>flZ$BAuP=B-+U4PT>wn?Fn!WssJi~<>0 zAuD_BRENswluoY6i@c9OXI~FHM;{sKw)_vMLt03lyYG4d;*iKy6}$}26a!C+gQzm0 zk~L8_Rn!@|7mH}>lMo=XmW9fTiY3YONzg!cs#a;}13q&i!BB@LBB_k0(`Z5X0y=Uh z4C!OHfCAme>Z)bZ=t245AvC@uLAJw2DipRD^(=AXk;+r}xh49Xj}MOApxY{|>VW9i`=*_M&K3p4Y%x@5 za2>jmKsVeAgK^<~5T4M-L-B81bPC#Vg}6!j+I{d*cER2ZnRdO?FO_!K8l<(ViIF*H zuB=4g_>6q2^iz+t9zPj9e%*~D(kY)6&X$#I$Y<<{h~)~71YycsV=Qa-Sw#X}_Bohe z{bZyY8$L<;@#o|Vq-s@02gIM1Xwr0!NLbrc6v7snYz}GffXDmEppL-#@btA?hNX|) zAzz9DG^_WLIfshUs$z5|Lg678xeJD%kB0~ZSC&7%an_jRzYDa?d3((fwGma9weC)Y z+Z7Q{#ywh%mLcgkHxomDJLJ7-#wnd~52zQX{ykfO zLnG{vAm0Y-aB7EEEzqq?yQq&zFsQ95gn=%80%m?689ngo8_US^fsbsHzW)S#mR*Te zs6^b0v~?2!U6b^+8u5rDuGT=f(LeqJMD&r-6DKEF>5?Y}KiCGUX>XXa)>=VM>vcI? zTJ*wy%5$lYjC4!iVB3c3 zvVIGm2F=<8I~3NegX$=iw^oA@$eh+?>>RrH+tAxSDk4lLoGeX#N3bjA8`&lU`2HlB zZ%`U7-vV9yyYNIG89i{vwV+5l2~ftr+f~N3tB{*~rL7xZ9VcyKk!(jH!-<5dm|Ojw?f_a|twCFrpE`-X31f{fPv*>_dTtHv=FJa@Hp^u4fe`5n7DXXVksX+Q? zg$w4LVWS@EuSA=rrrQD+H!Xhn(6g}i`gjnU^x9Gn{PyM_2$3xTNJq=WiRl3))8 zbpx>Onpnct=io}bZVNO&vd`Y#AYVIi6Ylp=^0w#hKaxhPbbjY9eHH{Wn^ z-6rUPUwmuJM_#yhR(j#o&z+_~C;v#;ycK{600uJKgcxYZE``t}qY2_#d|4Fwk*qwf z$3-tZeAQ8v==h^5kz9!f{sR;-6IgX+3;;kA%LJRq`n&+u-`D3#5a$ip3jlmPj&}Z3 znA+@B#*7d*WCS2dIg1vel3cRt0xNSX3jS1>oqt;c6koD!!x2(w=4YTxxr{CmP{<&7 zIZL=QawapxphMkzEX49NVZ-9OO_1l~$L*D_zb~0npf_IT$2W~D&Ka25F?@LXywS%d zxuKcyPbkijQxKP6BVkv)FvEMAP%003M)8W!=B%**lrBXd`vQu97aBeJH`pTk$N)$DHMpeRbmK1RU4NG~nAoZV z@+?QX+gaa~K04o>t1xBzc-`rauAl$htaRThgkJ6pud>H509d~5Dmi1NU?!DM1Ar&` z{a;|)T}zb%6PHoxS39>$7yVThU|RLSisiZs-p<8oH(%8nMX^x>z$0XR6$GrMA|1;1 zGF%^eRd^j|&HVJwa3hMWx{jrecKYGVknjc!Y#$j6I=fYHaDHh@`so`2K;QN)(4&ht z_^)?Zyhu56;&$oZ{{=hVahJzeJe^+ZZ6sHK!iXq0r`Uz`d}aj5q6t zAN|>q0zL8{!tUNF)Ebz1X2V%S-<$f(gm3H-MQe0Po;(*Tj=REt5U#AfO#O_9j%r9x z!0)PSOpTZ+fvy@6m*)D(lH$ZHK($xL#FNlvK7QX$-@(1dvi;Y79Qb4(SBQ|lv*tr~ zKUojzG23%IlAzi$Q! zCS$ zmuWrQZd5Z(k_n2)dm@~x^IOD)**+fR>4Qpl|ErL7UD_g=6g%YHOnl!`MT7n#owfU` z*^0XkFmqVS&GR6okB11e2v%^pQs&?0MNki%t6|t|@ZRfk2ue^7qUmTcY6v+>Sd6qC z#PqSiTgWSoq|G}-xF)z)u}&>v!3LMF(y!SXI{LYV~+)5k)GL(f7)vwC9q=GWtk z(o+kfS+PS-3CA6ZXxz~{)Td>+PQ(@Rxi!dfoVYyKPezK@qmbBk2V^%rcATh#{mZ-R z2O-!@?TU+Wk_vj8hN#M-sj39D`880z`pHP~vhwa)l@r79=k^6F zW)|RWomFExozLbN)Hnh%`pMv$`uxeDy@xkRzc~UrTyGDI4@`R|FCD*U^hYBjL$o43 z(?!3rK|kHAa1N zBA5)lzE(*?JnQyGxk$lgwyCg~kM0rYXMAf|=GZ>sK}sJB>Ha#rgl6R` z0IE~uS?OMt^SAM=43~6VNu|r$GBLUp1P5WaGgt2v7iQM7j^#pcm43HVgnVq*Y7C^{ zcd`^ykhf3M9D@zDHT zLvKm0J)o99A-gK)G2?wMTdC4Ps^w~hxPXJ#mhn5e84%USLi1N2g1IfHbKk?jrVH~j zd2DD(iF`Otrbxn|=G;Y7wAZCeDRJX$9}m3iAMe5(Y?ppY$@`^iH34#ZE6wO&OGHf- z^4L;r(genOm{PDS^pVlwt>B@*|HTWpN~SDQh^nNovxGk6OE$tTO)80B zsd+ARrH_SlcYxWgTNwDVC&A2f{Oh@CsM2$uc>GSd(Q}}>j&wCor>+>}GiI08*YpHD zZuA{i+=4DWO$79+H5~NBkxg)6eI&U<`srz+O))12CyWn-2R3|hddEO`@(MI}f7Z6+ zAQWxtX=x=(%$zHT9-UV3<~)QJ-G3HrP=B+*2Gz%sZhz%8K!y8`1I{c^)K1%Z5R8mh zoenDcqQO=VJCl?t=n0kDwSvLNpm{xvT0a@86l?<#uN$z4Q%|~l;UEp#)QPe-1;EZw zv%t#$&@&0yqLhn_L0$uZAsyH+E-kLhy?Nnd|0jU|iSQfb(ch2(yJH!!l7pR|?OKuH zN*4~IFPsIc;blf~4lMZVwE%ApBtUinmyQ_UQDw84#Lvu8nIuK0#d^@^^OL*)l~G_o z_kfXzq~8K&WT^JFlN4v13qbx|?4=hiVg!ucQ7Ac}>#!EMy+U9RlrPEw%5`3rw-sfr z;)X5n&;*co{2%&Xu$SafKjY|#K;ml$@cba#Mn^z~Mq94t0wCHHI>#x>s95W9QT(;# zb3lPD&!AQ3JC4Ql7oDh2E z_TQd@F8*t2t8{`-UboIwIbj}eMG%9m$va!sOg)wBka<#8WtV5xQjwP)>}FDKmtOOW z09sbiyNn#2Q&r1hcPmo!tL3K_kr;#()W<{K=PrIT>uphbGAPQan5#MH0p5Mwfk;j7 zF=RD%SdkDwhLve`7Y+B-h2%~kQ7skYG=Gpx)DkeL@3EBUSu_U?26pKK)MTQ z?`+?)LC^f=z2`_Lo-G~&S8@zY7G{=49~=JT`1M0Or=1FiwCDPF(EuW{D(6JwFAc>m zHE`&Z>lvP|i$N&laY{;Dn(ZT_1JXg*P0ROfN4KQJH_-l5lW_WfgC9nZ^5RYq*gPgM zV#+q_1XQ#sT8*KGA(BF#0*rYd87Y!y_QGC1{9IuXtrm_-JzNwaci6RB2Z?wpQ~+Ls zp-MH@TIiTu9Y|^giHp0HluAp!wP00WJDlZukx$qvy_Azx6fo$>NzquSGFNQ38rpCo zQc(%K4T5SiFvHhUk>Wx5Rw73U9sfF{c<#=^w*gJ3aZJ-mII9p_<*>MQoXc&rYGnu( zc-cNOy8W~f0+miYeg?p=#POcCQ^<(BK^Wvn_pCepX9VO(?}yd?mONr|t)a$@l#af6 z>RvFg;S1AS2QHXAfaXfPYv(~I5Y{^{`-TdS;3E2a8#awTUUwLK7ToW?=h(qnIQTBG zPhPa`^rZ#as|_F&IXERCFHvBi&>KV-gIRF*4bb0%C2?kP-4@dAS2$$6hO^S+d(J*; z>||w}SEET5(2Qn+3}j*E;WTEjun$*6*~z_L6UgVh2-5fN6H5wYt$~3c20*whl(Lfn z4IvK@fc{+IEQbVZ_!O!qt*aiS-`Y>x z`|8K58AhXgi0eFsm|F0#@zIRM|z7YJ-^8rj$_1 z9{uSm*g)4((fm)|*NqE65ErlsT}Ka|g+6t)_|N%ZBv9rkRoa(z8l8bkfIy%BAncoc zWc19*=gW73=XXdaTm$FYydl)Fd&!6%F!uSZDoNz9j{cEr;nn+j5PN&wUZlLMx=DKZ zS`lD8^bH|jBuoCJnQ|!I8H&aabJxMc{XF!*Psbs8_0}x7K&}JTM2-dOz=4FLtqRp( zxI~pWQXj8)X&P*$1rFYQEg4<5@k4v%sJ^X8xqR>}H2b}~p2iWqFDJ#FE0aUp2R^I_ z3@NTqY54i!L&J9u--v5g&6Z{^n-OO`Gn$#*GvkB% zh6Xphvf)RA)eVntxO2nx8(NCMhKn~?HxL`PZBR`AcKZ9%U!DHU^fiOmOjoDRpEgYI z8{RR!F!cMON2cDG`qk8TrdGZ@b?e|)r#>+F>{M|othiLz`YXHA|kIjQ*N#H$lOnOGhC%*@9o?wz=4;=L36glj@Ias2El6Jz5q zkNpMsuUV(Q`-lj?Rw!b>xMSZ_fNePB$L9VW>Tn7_twM zgXa$#W+Ss3hqm|Xblo<474qD;VR41k)zfMKXGoXW5U*qnTySqU0G_22ely+hx;r&} zoUFM89WFk>(xH5Y7W{@%*6O#5k(B2=+}<45xk+;=7Oyxxe!r9Qd;-&5xf(1r(Ht(h zOa5j+@P4x=Kh@Bas+B5KWeEpV)>6`S8)n%2B^6;#6)F*vC*t>J+!)xN^{Xfi8_j1S zRKiRLQtlu2&dSIT;N7cMT&(rIVB<~1_SYaVDM58Q z&YB}`@dnCqw$~whkSh~Z#*uB=Tuj)VW6$np0i9m^h+ImE+sEJ2j!w;&WO@S8pIO(MAk)|;ndIHmpF@K5B zTJmNA%DHDPLI_vuVFN{)B^!i`159$h-r_@f{31q6&94iWE81o;8cR_joK?)a%jyon zIUz|^pkqZd$%k-SG^ckyIA|jM3ne=fu1B+Fw`65A*EhDG2HapFPk?zS+E30HZN|ZQj$5o|Qa{I6By>Q)^ zC$vP=Ve{G3T2n^#yB@t}pb1C05Vu>JCJxR=oO;BnQsz1xRM|M54trueM<499_mm8T zHwkH}DRY8y68nFP=}g94BB@9gka<&-!L6PemFX)6mPv)vw5H?aa(ss?BuOjIePNkE znxWYirMFS)vMoj|+};!9ceTkF)D+ zyhL6pW&n${EfzAHKaammI8nDpSDKo9Bw{G2x!lNeJ-S-RkU7#_4Vl$q%4EExM`jFe zvrf$vjG{GV)SmM#EIlL^RAep@Z0DnCT4_m{apDy04|NAsF4o%)b0{1UxFr)76M{lK znOK4sJqDL4Lai|8_vqS^hD&m3y)~=PW)de|(IacNyTSa?Mng)|}+Z+@=FP}#r?U=!_C zoy}%vwR7*qFW^(xqDLx72rwWD1q(K=o zIOBO^l0Kt|>E4<#LHOetRUoEig&_H^U*aTT*2}v!q$%V#aAJcX8Rp!(dJniG88VsC z)S_hD9Z3kPU-jq)D@)~^5F~3#Fr`%PG%cnBZcU5gyrK!}HAn1r?bcb`dr#AtkC$B~ zJ7eRcHR0T9uX#hgqJtc<79_gna%FRB{-GX29nsQexL#BtpCZuE(AQwPyUmzMQ;`gZ zYz;%QD4y0^i|&9YM<+bZpeLp;hE>c0PRnIoX=RHr5Y22o$LL};@;n~PVcSJ75pWhE zNzzhRS*y9Ri+hY*szjrnl@}!R;L_J5Q#p z=DJ`=Iy9V0_pctE_tohV>1x+=l#MQH%((0i>j;D_MAc~wzyff)>X}WrHWcg76I?Xy zaobzfv@1{UybF)Ny-AXE%cjX@I4DO%Dn8jG*DWh$Z41Db3xF+H%&4>YSM9+lM;Q2k z(-QYZDn^39X>P3D=I~GsV@B{tg>1->+juFKV`~bvf}Sba2{x}SW%l5lO4j!OQTFD6 zaaCpic&2TZrfHV8>5`_-7Hm9q1$e5=o%@}9(#Tb1-)AX9$-(E&#%Y4*5Zp$b7hO=DTTh;cG+eGvJk;!s2 z9LP=@y5Evdi#^F$(`jcQYC-DZK;zFadlbBK**zMwwv^TuWBx&(FWxNUg}Ce%M}Xq9 z_K4jw8i_=;XJ1(zUCUW0^OV}!S7b3v%=*6EZYwg#QH{q9UStf0`VCu;Roe>%Ei++` zvg~NlXO3sPmsi_4I?n73Cnm?$zG1aFqS;;*8n(DSNcE%mlU-wEY=efb*6I(2TxKdt z`+NP?ytAxLcHLZU5A=@Fny5x?@E}F9Uw=xgye&3;*^r|w6U7Xxbq(rPoh>)lz?1HE zBsNud-P%6@9yjR*5}_$0XXhK_Oi`EBW{A?7xHW1V%IiZe9VI6eyDa69yEqh2^!gl` zj4s*q8+mw3zBou_V%c)YoOJP1W*Lydg<`!U%)qD+<=xak?-1P~>kWHdW>jyZhV+yn zIcj22@pAKh@>iMpVwTN12P5=k%5T-vrt0-)#tjKk8y<-llGf3vp|dKJ%!9p2+G2yA z)i=g*dFu2+bsTkgghBSD$>7EdF~PU$<#tmU#e@8NBTj3^>&e)rn6;`ZA(x+E`-YOJ zMC2SCE-`1m*tz&zl^JC+hlfkNfXr<^->*(At@a*b;&jF_s4v6|!`?!2{oktXL92mg zM~qy=5gafu!bN9S+r0w?c52j`;KDk};NPp!{as!+lh@);jTn(?t;P@Q8nkW_Iq5qy2q;R z*7PXt9HXZu^jWiIB(-r?^ECh+#H|JrjJZGWE$i3Gsq?s`E#r(^AL1gVUY$RiTv@$) z^#kfW)4R8KZsSH*_j%d4SSsfT!tBb3x)de4QrQIFA>K`F~-EB8Iygq>}^bq zX9Jk3K#Hu(?P zk{LDaPWnpY>JflVXZ_3DhKR5CBVA{@oWgj4HTnYssf6EZc4>WbjX)PNh|}KORM{f% zxrCnc{gN1;{`Q8IF1@Ba&J0tUoSuSDC>#rJCiy#!#e>f;0WwrwtGcC6Ro@(M+S71w z(W^_Il+^e?ow7eTEkWU3Ua`ZE>58@jqe+h@%GQ|ARMJXDG~gH4Hj}*OGuy~jzMprA zpE!^SAUwLyHj!bR6V74U$y;KD47vGJFm<%viYL30Mmm<}FBFGw%^*~5a2n8aRpVuU za@bu&UD8mb-__?T8>AtC3R&AKrTtteF8Oq35LMO3^J$J2+(KVw)UW0Gvqbm|exYb4 zcis0XxA^vFG6Sj(FUt;P=>DP>IT(%!CWP3A+u`$5Hp?NqKfXPK7~x6QCh)9V+nxSxD zm!ZJ*L(Th}G!2L9hU$rtTCq|>+CS%%s{?l+9=K}M9U2P*RAjifJUBXJ$|QAh@`Jmv zgokL1#`%o!GW zC=fg#_{vtPp6wLMBO{3_SR!ZL1DBqAUMit}S-NonpW*Q{;y00VzmRDlhdwXab?u0& zlS-{2#x7jOOC}JckR?LdJ5gU3_9jnu>P19a2TM=}tNs1KL>HIq@gaI`+V`y=isY?w{&_L25GD~tFlg)U}Prn%r3YJ zE)yVTA32C`P&7*rv(ka_>8&RJK z=4D`sf}r_3*7<@*5UnwP7pd6Re~e=N;4t6*Xr^T~1V#~&CK|-=B6ku=4t5DilRWik zX8S@kz@}GyFjjFvS$0UQ_+XG#Q}w|pw=+Y$k6~ez&Emf6&Vo?8c}p=$bWdbLYbDQK zB-B@QhkP{hMG+!nEk^=_oXja-djf&R^K~Idu6krGd1hnRMsn2|+lM|>ysv$-BH6Ig zxjullJA`mK!a>AC4)sxF=aUG-K@P*oRB~YL72D;A-lI=0xEftw&)nUiU`X)k55B$t zpUxKAdKw-m0fn|yLQ8Mclg%G*cnkGztg>K3l+^S}2)4ZyeM=i0wTH^#L61{UA!VN! z-_EQ)mC~wfxK7zAf9z8iimGqmG<18X*Fh-AA#TxNnk~}XNGCJl^r6TzlGzbwvik*qV~^)zZZZI{#)rQbkh>3hwS=sxfG@t za_w8#HAOSo_te$%_`O~r^=~66gtw>%fzmf+&*V`A!Ze{JR6Vzn1mA`trl0}pwhMU= z-zUq&$KKBLRz%&3IZ@Z2bMy_f6Jw=8b~sUpYiL;>Ed4H)R6!#L_9Gv@5)Q|G7moQ> zS>6rSEq|zG-J%Cb>+_ku4S_olS3Il2nMOTDim?tSGvnzv;0ehQ2PXOdp2sAIYH3J{ z{5@)}jh=ZxMK1kO#=Cyt4i9|MXMqzt%}OSdIFbD7N0_04A|AfzV#v@(evG^Y3;g2& zE0Vx*@Fd@G$O_dB;;u4<^IpoVM9ls?J^p`4yW4((10F6TS<{Y649M&TB7YI$HHRc^ zb!9(J*PNqaD2nE@IP>xS)L{6IqQU z^Rg8sXVXPV%1L4w3MMTx%;T?QR;`+^139)M_Teh*x?f-k+yUegAR8 z6#*8r#7S$mYSo4l0&EuOizxRS`^YzbvEcWw|0TX(!H=`N`o=F8;MLjCw_hRjZBJdR zrvBW;k(NEGJ0LK!PHeD|^{5dlO$Fkn; z0HTB);I3oQY+qVOM&8A-Ry5;T^!^F){I9<&h2A=+*F!qUrO}4{Q^_P%%IoRDWX#G^ zNokl)a>E;VvnXlE=e=b+d1qgKwfOrtq`2hx^d<}>Kks}w)}fUZdi_zz7NwG5S|-J4gptlPf>> zg&pLw+je!!(>nHVDMrjbEuj-7D_WmB?xa2Rcz>yon;hy3Olm8mZqjHdt>%OyY*zL| zT=(a9is$?>bKYz^11{KeTO!TZH9gYs>-vtx7pMgJf<-#RG*Xae%u^3X*-U)+ivJ{%~ zr%`f38fRB4*U?%_BFCQn)K>C?c(hCWdMhWD7xYX^z#{VP>d5DVdP+#gti_Bk9I;mJ zluq)o7OuTbK_ip}sl1h3n?JN*IvZTm5?YY_B64Vxu0g649GmL5$MqpkoTwVP)7lix zD9QFOvf+}Z%~>})=tyX!Av!nGIt}!X52UGC(T}`v z;KFJmQRgyF%21g;4P(mDdcD30bDSA7`3j@9qMwqgXz18qo} z#scoqPsK$n zXtvfRYUNB*_$$@bQybEuoMWt9$|sYtTva#t<63TI+gL4$ys%?6;&1B<>qO@|FvNy| zX*Cv1jsw>C<4%St4&_tkl)*e$s_^GZV(i2?3L28~Z?AxFY!L71l=(pd7LxhFo#m|* z;|S+^S*_bVkr(8z{!9nPQP9Zo->j%4C9FXXmoy*Gv;;3Ce^z1CpEa`1aBe(mAD%GS zv+_7McVip{jZiPIs+7)KFTUH&;jQhN?wK1WGMpTTGlmI_xu-PAk|raM^HdiHOp+QJ z0I?p1GWyX(mw3v0>9d^EXJeRZ4NINcA7x_9#6TcFl%r6bp`wDtPQi5gYiZ=D698?M zJff#gk;cJxo%O+X4QcxeRA0d}WY2_oTXmW5RAD+}H6)@s<5p?6^4;R1MOdBnXU?s$ z*6FbIQ6YNLkIY7sfGiYDW?P%0S;|0x31V4twRm?u=27LU@jBGL{8-at4Zp!#z^)o^ zrNm9I371N%rk`6iW7?84(<8aTf5pB{bGVRR2@3vAjs`ZKF{ixfUf9$)-oA8BvP zuP5)kIk|!C`tx~rk=Op6SweoljoYxkZ(0k;k#yzx5=lfyoRgMNI-)gMN=0e5+gfWI z$&sI^PMfQnvQm6!i?lcHX$dk$KCgLKz*A!Tdd(5fRA{i6PLT&TVObT;WZ!fB)hPDO zn>mE{dZs0`7WpfqeN#R!UYU;kR3v3^Bn7f%JBCm+lMbf78i9UrJGK_DCk6{8=jUao zvLiOul`)JX+nvgL$R zog5I$T+631%*ynLj@`%gMz=#SOk_Kl!z>ZrZ3TJRqAY}sfG0HeOHW-b1 zok^We;)qW2i!-6VC~2tW`S4D1Xkf(-(*8ff3&e6ZcWU+dcyYyC*1QGJ$1^=-x0+kl z5iKOB6a_4=u^~@F8?;g6ay58O*<7`lrD*QrwMe)@^>_d|05c;T5Ey`&F%skj`5Db^ zT{Rz-yzt817mA}1BP2WCYEP+3T@%90V5+qMu< z-1pe=k0U1hOum6!sO6Rcb0Wc`x}gTu2r1+nG16dRl+z)jEVqtauH{;QIWbQc@$k3W zZ&8s8f6X;)8NOp^E>=AdL@^kYVa)l;sCWi;b_0xJAdD017mJS90tR{@K9wuALlShZdK{ zC0X7BeGK3=0KsOZP^pKnu-i7ZR)<9B4>Y>@d&6|zP)&0G=1y**B=_#~xr5!VJCJ2v zH4vWkny5T9-Z&o&sw7oCAC-i$hcDy?I_ji)s+wlcqF*$PEqT0wsK}<9kNsi8&@}9i z)x;o^nqv`q=*)AI1_#UHIhwx=2O#Z(zO10hrV~6CyTlnEhsUClmnm|NpWAv8i%a(Y z3&g{IF0AVCIEK{26f-e7nKqA&SOHslRRn)-V-N>cL6fjcFA}c`aV!QaGOQfHL;wV-^In<_!-t>^IT*wmrE_|Z0nN&)PKE8{?+jD<(+Kk&k zE>GGYOopNqGny$mGFe?>g!qjR0w=X@`dh{&zHH>+L(REN83$w11SdxP{bOpMmh3R& zC(34W_%k;-#3#&Luj=4s++`h#y^{A4w@B^wR<^Kep}Hi-U9!-Ayc(N-KeVEEiFF^0 zQwc7D>`X*Blzkf^90~!=dg|qcB!6Vh>^nFwR!QrBJ#Pk|^ixO;q1}z3OH(rx!eVx2L(g zI}}_bGuLX8%y4bp}wLt(>3Hto@)jC#e7|m zO6vZPW~$0+bY-y`fW43kalyN4Lg984EVT%zj0V7^omp<{>iMY>*ph=B%`W)mT{(QY z;w0dJ{2;f$0TDNbKJpPT!3gK=P+bK(e2dWVe)CODKd#@p*e|NHU*Ic`a^IZ#NTYbi z5Thwtc@wI)*kfAq`gIsv(M+Q6f4lp9HicYoHO-CJ;=9344qgO9yoc z^2qg)DqPb__WcWqn6s(VYs51@1_cnKzz940`U-3LF(DKh$&EU->XEAS*>Wwoy--Uc z9qSfvCmVHNS|fhsT1gWPPdgzrWk+XUuR&*H(u0D7pGuZ2HgezvuzY?$x2jD+0%lu| zA~zrDTrU1-Kj%{Ub<=?SsoKy3kpTzF>J4Z0hI}fN7^5!VJT@LJjE{4<MKgdY62&JE|A?HtUt*hqiLJq(Fr~gvi-8P8>?nag7a4ra2H2#!?PG+f; ze=d{!C|Ktey8DS~YQaN(+Z1>Ayv(qg#Eann`8Yy+rm10%ifGE*5EAoz zfNezp0@O6D15l1!z*HiKk7My3D|1rj-n<=-l~ezPY}>=NtnQ-$RmPzNw;UgMd-Q$l1|B7GUIJx^jfXqgsa4?>?a<#tvdp4 z*vk#9xV*06-3lznBC2Q}6 z(5h`F`Q(*|^^$PTZn_ups_O$>oJ=q=5uh{Hh}}Fn=}YIxvFo^1Wau7lW&25_eGja! zR9Rmwiub^12!ov;=T|lWg!-KEGL;|9BZ=RFG*?A3wx1w2c(BZ_tky$4`c#ZV#j!Xjpsp^qXo~!Da+w<9Z z&YTQ}@{7+x?L+ulcrJX+GuWH8QYN3vG-xgrj3w#Z0e!Nzm2|vFX^_49jb)ZkLByd6<>z5Z?}c}%M%$VqZRtqQ)9yk zl6-*M+FIL6j@%BUjw-6rDstERJCNM=Aa}fKkmBoFdtm0gp-F`Od*ZLw$i10W%1+&VVGX0w!E)-g)Xd3?o?v zBs3w}UTYk1I)G=x^y!AD*nXX>vc8=g4G8*WPrSDj{eb=Z+}4WeeDvFr3gVoWkcH$S z{kgQ&8yna3S^JoBUx||MtNRXPX0;@8R0Y8P3KUr5-O`46rX!e`yxL(?VAR8mjxup- zI2oJNXDY*N(olGNo#+)%_5$)z`?( zZ^9i56GvJQOD>3ydRzg7|sx8-5oC<5mKaVYji*x$2s*Cg3uegn?E7(B0>y{q@Hqh?o ztDD${JC=N55jn8u++Hav75FOEa0cZUMaf^^oaaNuBR6+JgL?h9oCh|a@mZS>Vo*zn z-BP;)Ry7_i8dnZQfh8oHeXns_*DOF4H+{8n))3`=9fm02?&p9P01yFd$rBh5V2mmw z`m!XAf(VV*p)1YXg}nCcS+n4$7yX)R2e1w*CIdm$6F`t9-G{=>@VzcfVg?bE}HibARNVn^xX2Ivd98vP1*~ zf)?@790Crb$D_1}@3Lu^po=apN& zb0dpNWsK$n1DjdVO;qiQAv#VreEkp9vrJvs1-3XUlw&9KwE7 z|4_9?=Tt4q zP>PLa3jMjTlaA!wbY)2L*m2wuwItH|u~*`8e~{_b7rs`5|gFwRuP`xNr&j8iP?&BYQ0Z#+AN8&7(K{Ohk6NJ%5dj8hfA z%Q`XoH|cxa(-MY}EMe`eWh!7OIgBQ=V9r=%0ULRbTh&@ik&B$&RA1;4pL|c6&A>F! zf2y9`Aj*W$tS4U#1l1Fxd2?2t&09ak%%DdKIt=>D0c3=d56bHhy7y@g@q z!1x1hE1NS_lZ!$-s6Gzt^)JeZ z>l^m>Pfy{SMn$fm}IITAkw%c*E4zR%_>79^Chx*CB-dzbFnK@RnCvsdJ)Ji=|X(?A5O znnrZ_{(OScxOxlGbh)?8zbB_^D1cM_-9_JIFw;6n9S`YE$4Dwvr#6QFbB8kc>514ui49}eL0 zzG7I4Rk!JBo*tcoJF`DEsWpbRfg<^I7sfcL^>Bo8i5u2Kh9C4! z40RvE8dhbHH>{0oSYy~bHdz?UPK5O287)rwwHM)}D`@1%nHN)46YQlX{^AbBc7qGP zYg&K{svzzUTlkCdEP$^guvnOZpWd;P(@{IN^NQ=<>UPNv_>dR*upyL16PyhYAje#+Iz-ROJCHvNXYR!L_r2*H_(oJbv~Ft= z78{#yZu*HT(LjvHZdoO&@A~=j?NPOg|91%=QnjZ8 zIje)>18QSTR~!eP$abu#JjYg=Fh{mGUkME&?BE34Ml-Td(l`v+%mXsffS zJ(=>M-8SEOC3pR+VXesMu*J=C3P`YS(U(c{^CM0&bQ#~$uHcI*%UpZe0xVN?s$Ul4 zk@s!G+RmS>$>SV?OHgNzi?u#<~6RQVv zE_-mw9YWzkK7rH>7g96?wLH5m9KUMC$sNcGd-mP@pF)-()}XY(zJtgeAXxSlJ)tlP z0ZDZc)3nTCPx5?w=e%9Wf$P$1Nc);=HKa#aP~cx9@TjJ7s1aMWwPK%9aO*55JF^RL zvbb@3C*0s0hM~MlVMbxzEg+ByCaJ*;;s7*}+yL?I2SeXE%&%NEUk{SMr0>I>gOaFQ zQL1aTt4b|G^FvL~E)F%kUC&6~gs6&K>*HJ71I1vJ(q{Xe!J;P&7%_5>kKf)}+e%dH zz9hYhuUapz9{}5T56!gU+{jwhpfzQR(Fly`A20jLC?Y$spWoJ6+bY+P9sTx4yU7Ei zmo|z&+z-8=TQ}2z*N~hP#xPWTgwC5h0h>E)jgHG=w)FaNi#)zWy3ez?--w z1`!`E&1hjP_7g-lFz;^A+287ChqvCq?iraCXfN9 zXI+Kd*mx*B1P{XXxT+M*hyZ`LPdxQw5JMfQ@o2^qNPw9t(hO+h0E-aAyCyLclM z!&CNaW{?kEtp-*qhDN+}dayS$8n9&br7Srw1l3T{OsJ_ZZx>N|`!p4KVu%je`#yp}1zDuq$(bZu*eRmA7-x>ibLEAXD~fkPb-5@%Hs*=m^r ztn%H${H#(Hi4TuMhIyp=Iw4;v95BLSndK0}qQ(P?CZ~#cdtNYsx97ZF;78bf0cro^ zGi~I73Es4T$f%!$ilX2PnP)o54<@nh3R;C{s-Zh~7NMs=tz_}wgb>5Dco)KJ+yFGd z^uTt&N0^uTp~+>EYPPX`Ry7Nwyc813kj!sF;x0f4a;_=hCCC!uu`<6BnalI_K-mW9 zXJ=i$pcKFQa(ujkv1Xahxn}{UtA6|`SMs4Xo*~*djyBZ%vBg2v{-&di6|4+V{rpuCxN~NtLi4iGGh;XU2Wh&j zbp=P51c2M68)OYR_*uTKO+h0^Iv#+MCgsJx`&k}ND({SxnJOEqGKIVr!8wS{7%c?6 zK~Lot>m>Kw&v&#dX;4^?Umz~|G7np0WJXFTl{K|Nd%hT<978$d$avJBu|~#NH+J{UbYc*pqPS&;Jt%T%andQLFk0@_$QQQii~P#gS`yj! z_G1^4=ok5aNTtg*laJhoksLFtFp?Zr@5!>`IwsMl4y4DOBM>PSee~(W7^#*dUqL{R zSVuPA&Hqy#&h%LfH#mcw?Wzu^w+`8YNxOZp&%gweMxC_w+gfW|N%YOTDrvmk;^(e` zmEqt!S9dP{;v!M9S=fQWa;Os$uSb?w^Y7*Ve0u)9tV*q!+j#Gm;X~cC9;*tn2OSZl z*9#(nQS}fWD?}}m=hq6I+bA`V*-!8p%->s7ee(xE*S6lmqd0R85(jYDZi|mXxC^pb zCDkd6;8Tou8pfkfcqGo-nW(zCz7a+o!zcKTHB$9yS2>7?XDL=00XmY8Ef6Hp zPw?AT&rc+q?!9Oha^&oTctD5wEHF#LFe$kaBW{(-mm$QHT=ofmJ;@#9TNdh|y7kr* z3`z}~53QXQdoZ{m{u)Ya4r(DUs4I2Baz5afNC#@yr|?JT??U!n|8g~4`ngXnDEzj6 zy7FpAUVQb{Udtw6o*&*ZKl9Ay)!xbX11jgx>e&gq18K>;2ap3qa^~O%Kam)?a+NB)rh?pN3oVh-Z{7y zV)czomw3y)l50devvE$WPEy$c_-^d^cz8VSa>Hi!%oBLTDx1kB&UuD->eqPGpLES2 zb+?){lGG>lF3L7MsAZ|i@<3dWe%?tgdj!Tz1&thdubg;;*<~S`m}VA$q0hlq%MK;Dx==`ByL~@O%`5=TUK zju|P3T9(i0$*?(0mxt6weRkNKDl_t8{rEnQOaoI0ax7gglYbt5_BVjZpU2w~AkX6%UdX zNr2iRgzZt(NnF+vg(E$QXQ$pRZ5TDTVQ|TEQM%WkF*-^XqjOM8zVHXkPSH$`HQy^I z7?SQk^8Y;eB6m8u;4OXwhLX~C<>eX~4Gj*_qv>QnD(6tW=_KiS6GJJQp?RJIXS0-` zclb?dt-Lc*hOMms>4x)8fE=>LUQMqbslNi5dJED)*-Vao;ic^d|IDow|M-?Pgny<7 zL&%PA$Doa|Q`w-=PY)#6adYzEZ!rl)t5hcfPuRvy_2Ol}<)O?D%t(2)a@w(xAB$xv zZFHjSF4zZSu`EWwb@w(DKP8Ev9DB9?(9>^A%ItpM%vl&nj)$A@gn&h?q13^Ve%c*` zZY5b1o_PU>@+8u}i^fsc{rMD<_I@M{)ITHTFUvZb$&t!Lm;qfrqqaHC18SCB{06>B z(F_l;l)g7x=mi3JR(*Wu*AP$687WzJq$2N50tT&oA@>p(yOu;$XANy5aO$ro-+5_P zhy49d_^QiOrKwxosM54jxDT&u`dq`&B|n!e8yj$SxMxsKtSX!=<-$~sO8dqpS*kRt z9;L|*$1s0IGwNQ#%D?e{RZGZ2EAe0Y>xA&=^nVl1S2%PO$N`F&_$; zj1;9OFaHkXDVoVq=31-=3NH}n@2fmJ{09sbn~}0g$POTGobA`gf*NYVkqU8Un*97Pn24hF)&uwSisAQp zhpPLs87cc%cH`(BwjvcOB{ZoF74avcF1K@DmFrOLmx<$`ypD(`7A1S+eIJ z_^XO$Sc{%R$ekhECBE|y+~D2)Gpr;PD}Oo_u`nEy&Kt_5K99?nC9Z#A1Vt-3a!CVX z8-5#rvE_TCE5xV&h1iCbs%|8;HGH|{qD9A>6H9*BbiJxu;+G}h7vGE#A6HE`PT0y8 zMi{s1fJ1^1TehND!zd_pv}J2)QX$BSEo!}(Un4*iL}t#PdkGfJhG8A6)uanW?NngU zAOGa2(78#cGw3xZszJ(bQepY?#hW_?x2iib12D%~7l6?}ZlgkiEmY#v{a!CIo+2Rn zq(fNM=B*_GTB2n;@xGT^C%)W)Vb&w-wQ8(0kM?N{RBvcJkQlNW14fF_$FY2hW^&}B zgR6=6#o`&_=a0)Sgp20hSQE~P)VNSIX38Vhz7VP?U&ROjs_POuT5Cyi_3PJK5X%3&KAkB;*! zaEnRXyWn4CvjqLwD}MZ4oSkZrMWAlc{jFR}SM&b5K+{_dx79C^o{c-DXCrj*>a$U~ zqteE2Yge|4s?QF?PJi(t;gSx;`eR$Zvq+eKTSOqR-K8R5T_RkJzyP6)*A}oN5qM|` z0+-W=R5}D7ZmSozu9}ZZ9@_lYS{XL;OZCD+0U1jgguCb2EwKS}ns=ja-nk#I(>t4l zp*4X%7~1;~REejg-H}1fCKMVBQqop$>ztQJj@iEa;ae!s@pEbe4J0(zjjkAIcu4)kTZAxGC}feoI2;(sO2lL zoVG>SHXpZDBQH0!3gI=pP0Fz=x!`zk*=@NnZ-Q;#rIFZm+sb)}TfRkGI(%(^VM~srav{@USBWq;DsBm9yoNyoT=5z4`qu{hhQBDhAe$vo?NsNr}VYW zIHk2DV*K{zSp?ZfPZK;Fz{*gGtE{Y$ELEX%&Bg_Uj;P+h8i6mnHVdAOcp0BPyIrsg zvM^U5uMvLtP>^z!Vd^>TD6AyClfs(a$LLnd~(-IBdz4Ytqbl}<2FI^#6an( zdSZ%9cq+u$i}75^<{giZ#N`ivZX1NRf<{!o56wE??>t>VwJym>1Mn_*%h)h1&aeYY zUYV>s#A#;;uyV}X1$B~#|0@oLV+!%HD8yND@_Q`6N&{$Eg?TGd^lN7da7@kDg+!ZG zuxZ@TvXz{5)`AE3>a)PSjzf4=Rc#uz5_wiwJI|h9SXUzvPB}*iA!!ZBv6dhLsa!}! z4I`l{IECyoFe$|SR+=*C3@2n3&fA;p(|_*2j79i+o6xf26F|wRx3uuh4=zqO{iN|! z)hDFr$UTtVo*AT_SM~gu%kDMM`9x@}=rQN=Nv(VV>2*R!yOIVxTkYxMRXSlva_ZaW zu0eWeBo^cZz0A;j6hguOVC7|=WQrC}IhxNsL2{6AA2*w*O!ilIQ5#O7inGJ%B zngmaG;1Hg9Rk^6(k}3oJ$}~R%X~owzb|Lp&vc zOymM9B*45~@N(VOPad!?c=#J_606((VK)>s za_k1jY)Ivuy^w`2GSU?ZS5kP29O0qbK8`NP!kDMa!T3uwxkxJMcvk;{%W-wT zfQrF~&YhEmwP&DuL>x{5)!l0jkF0y%eESG8Mow`<6uNT*S-^fv@FyHnYt=5xKn6D% zur#G<;*hOaHD4F9?-l*&WaG7TW&z)0CC0QO`EIJK*DQ{ZYdON|J91 zhr&JM#i5X`Z0gWJqC`&&j|^vQ;Sn}yAleWPg`ycDkZbVpl!OR zQ4?T>qv1l(5%mxeHb7{3=7g5w zD9FbIvZnU*R8EL2GueyrnrRPcT~Q;I%Xulv5f$7(V>=G>%9k$@R-H`R*NB*?tAdd= zWbb!P=aJFd9{VAA?LuJ*S-%UDvCjY>plYu3YOIh?=5%>{)aSSLMLB7M)(~MA-be}> zp+d+enZ+zvDNgUgcCEd{tI@;|9P=u9-0YjBM&O2eiZEtY*B( z1k1yT;#gARzhh>9#Ooe$cpZgAb(s63kjk|r(ov74 zZ2wBUOI#L{c*`?0I5!(_F6|kn1HeV-4eQPRF`axuH>Dw#6*O|h_gy(3PrM>6NQnZ~N5B*szD$l*<+RT#&Ik^*p+r5tQ|jWa$&u|$Ul z-IE0*~^`K`aiIcmU(b(!*9trSeQ6)^B!|odLZ~p3dj}7)C)t z$y}7Cu6SaW1i(}B+gAnfMQuw0;gVkmXm;0P>n!-7v}7E; zgSkP!0Wmb-EV2(Ap`a1fQ-0YDN?-nm=M zzx}!!u!c$+Iq=5i6=UdX@eemh1G#5*&wYH^U_pH)d)%T4^JY2`sV?H{*Wv3GG;-wS zYd)x}zEU)PR2s}RBPA@$8|(J>#b9&um}BL>U_NNB&gz0|Fqndde9QmaDc*LCv>Be6 zOTq8594C}IUoX)P%@>8Pv3}fq?_g9x#j7d%JdIVHeJc$990ldD!HX|h`$14JPg!XuI)Pyk7-|GktWn-1OtR>lDp|wpxBgdcJ zD?1xzhJ~G~y^Fnd=c)pAOU_*U+Tw#to@#rvExY{h%O6^vTHf9Aqn3-7{iXi)mg`l& zTclo8T->zindYlePxZNF_b*$!EY|d$rYo1OSbE9Q&o6za;Ty;~EjG5GO6p+aAL^Ux z2bPRCoKyd6)ge`&ZFB2STW@T&sG94ZshdQqY90RQtJ441)sgLYE&efi#&+}O)0y3I zCY92n7*S75qu2ManpnKYpl4D&21=cvV{}ZLNX1n_a{RaNZ90QxcE=1_jh<4|J#k%% z>R}TGbx%~A()VcMDV-t4GHM##J;e9PH#Ti!c57l(QmfT#dsv3W;IvNNqX)chPl`(D z^)Um5^mR2k`sWKbZ)bMv7>bU?G|3)}nL=Mi+Y?JA6X?stnHXiz$C8OPm4VUOfWJ;_ zV$q(YUc>gVv4p$0saRK~^O?-<1pW-mM%6uxJ{8BjV|0&!iE4XjmPsJrKE))|^oCYT9qDNAHxu=r zFWhtnqu*`N=ry!1rtQ(jDJ+W`lZqzenjTFosZ&QaQFStnXpdf-Qui2AF+EMi^jbPjt9s_TYvP(DODCc|sc0Na!z5BYdUagaqc+5&1_PFn zPH0r;%X{yv!ly=At+q#ve~kmqKW<<&D(~FrQ5v{VYKHAWSVj_a zr{g^_O2_tSSRKBIO)|8OR#9`K(|Sr5*RyO-EE$brpIA+gA{cPO-=NcAm(&`a4pV2<;LA9E ztTv>gNdwB8g!4Ql3>Z0mS**uXfzhnsa)0W^lm+sNXBBZL=Q#B6Id4HVh{h68x<}6%(4D2Efx++w0~<@Bz>X$`J?)?C9#zvCb(}@_gc|FTz;+rK z9cGl!8{$blOQp0?m1C|uwlqb>wE7-!Ay!?RWH5L9Ctw>WwE?^bU_DjeT=%FxNnt(c z9x6#=Wz+^kk6uTyJ-QU?iR;vfcs!w3_0DxqMH8v0Hj(JTa%!+ingqTg730&BdwL7(28%;7AI*Pv@ z1rM`2bdTv1Opk_&t7H0j3a3h^vd(n}g1$kg#iGO$+E@=82bUStaflc;iG5-WER#y8 zES2utS&W|0)4GHP;)P8>6rjv6I8%>Pl~Ai=tWKLm@(tPe;J}tM&{-Fc0tO9-2!{_- zp|r^!y+Lch%xN|H#c*&mD%0FlVo|+TW586^Y!V!k!oNjn$UO+mWLz6hKyorF<6L)a z4Mi~t4VGDhbD9JnMAcYJbqu00nqc*;Mz6Z4+FiXn8pVN(Vt=RvPA3~>(VdR7J$gzT zgRv>0i^pQB3+KACdYwLos**iXy&f`#(M5Y=(iW@1>}(tr_#jMG7tD2!X`_ZX4cQx0 zOLLDIQj&;IVHw#dL}h|9s43O?bKR3ERJ2HdMW_^ul}SOy;3!MXkV;^kC`hq{YUf;c zoEtR+i>@cBX29(+we+c2dREOQXbKZDq|~bO=DH_iESpMEIH_7n8Xa;8Vgw&e#c3M% zjaEZzR6FGEjA1vrCbS7iU5Gby2haEDQS7rvjom~wL{)~l?#Y-wnv61r9$Leo zyC#a!bx{hxiEE>AbqZTftMs!nhNcq+gC?QI*`RPXn3yC6@DGIR0PiG$n<)`n`@z^0 z>W>&8wJ1iKN>tiY2(+Fg{y>6>qdHn5rqWirZ^z7|`hBx+0puGhwr zxNS5k4Sqp39tJm}GnE3nX~4AxMmlzChQZxS8z4$!bOM4Zp^xcR?A%n;x}-jZrIM}* zhzwkPJ<(VSa$B8Z6I!fek}{|?mF_(lT@A>5nx&JND*nMjPT+_5;wTH=#U&m$L^Ub~ z`oOD_IsKJcg&?8B$T~{Xqs1+SFVM&E1vnyVHCCTVLK-LIs=?}{^t%%jqh*qqMM9&+ zp)){0Mk)LT|A{lgvW8eJsye&U-H4kHiEvR##P?`$3*d}uF)1w#8EY`;F^Y6KQ7XEU zWun?!*HUOc)b#yUTf_g>Z(QtF?Ui13X?XqnXEs#(#G?7MaQ ziK*%TJ|I|C-GP}DzOq^jF+J(a43_Rr+$Cm%|!Jao~jj~g@0c!ge6Oggd8IeF&+&THMBVv30V@OR%$RNKa<+8 z#RFVPBgViT+sReixz*zEwUXYgok?OK*-|C@P6gMTC4`ck=R&wNp1Nc<_$6eyV!-7M4O-rx|@@qQRZ}g6_R#f90b=ya?22N(E zcRz(sRnky_^0w_n{l&3WqWja*rblJ~98)zN4TXnB^i-+9j8LT!=q}{xM}^fJaUs*X z6I>ByMK_?6`;f!=9-;|GKPw=RAv7~84Ow}$L{b*r1U)*MPYlFdkwgXz`Y4$F-Y;No zN*eJQkDo6t`6Ae9LwrWU%#aI>xcl-0F*Yz9LAleh{xL>Fg!^DqQ#Mz!YQ?wi6Ocv=0c|Pj0PL zGI`b&WRRY4A!37b7lt$==~M{Nx3}XjDx1lX&qQ6~U!Q$$8!%BGgn{bp zLqhk#hpr2*Kct&8ek&GO-Uss0ha{U%?G{zmzM6=;>nm_{1H7S}V@yoY%}>B+Ch+8Y zU%|;yG?T;e|C{qkJ`6`UoKG~e4s()64qjzoNTV2~C9NT6JR%^;VqPja@XWX18~Tt^ zWs+N&-1(@mY_%1*geXpij0WV`!<{|=92++RJRcRdubPjBfG6i%)wTt#(1*l|Q63>b zv!Ki;ah&%tY=n~8fJ9nhCIIn4Dl<^NOESZL?Fq?k zFkcs<{$=T=|73t(`6Mjy5q?0B;;ez{jn6hARvlG7X^ejEQ^LBNA)-$SYsuL!!^c)jBEDO-u*I3~=n}7cSq=>XmPu8TDfk`7;Afv( z;26mBci#iawLUsily1OE@;}cS9e9h{`~__lSEE-g7xPa zcQF|j9FD?d8HGBZf~0%n6`WcHjU3o`My2@58p&jSmK1?AF&BZO9V_)YCry#@{$Q`m z-%kRQ4s*`@V4z>kX^8lFj8NN(h*BB|b&&>d1DI^JavORrB>A z`?^xV2>uY?P(?W1{w-lCz?)%Z=Ow%{AA=MyD$FAxpNFUH>)(O^oS#Zm@s}vluDi2~ zn7_SX1jTLNuEe{b3PlxbtadB0!S3(Ozrocs2+gx_7s87-<*`IED0Qhu$+=v_0t^A# zks z==T?t(Oo~NEW!D6OHj*;;LsoZV15p*F2Tb;6b4r8t3$5ZaAQOBqpE#PKd)yN?-n;* zmf%(7%40%HN01lv4k~Gn28Wnfd{WPn+m1<0S=&sG-f;B=V(aTdMAb218P03yq$xH$ z7%B|q)G1PW1HVu-ljwVoK=V5Lg$?36ZwOMQpKk#(rK))in_LbH6NwHPhDRf1w@)Xr z%bE?0{zO1DMJICLn+Qpt^(w6upL$c$etk20Fsf{n=NYP)0)kC`R2LqmeL+2W^LLn- zq8TBW^;<=hfZQc%Tzls}ukA2@j`Q3Q;|BUbR-h11}*sac^_WDRreKI#qL_`Nd`G zWs8>m&$7#wy}az{w&&X(YdhTb(YAbBxXsvhM%#+kzqh{L`fTf0T5oIJ-zv2FThD7f zt+l1)^UMEt`7f4FFTa2JCzoHbJh|MpT(f+`^7@vyTYj?i^=0=quV{`m|6%F(mVR|v z@6y|sUcEHCG_dsVOLs2a*7DTS*5w)z@|PvQTJr5>>y|vYge=+HY+90D;#s0= zE3{o4X*0K--L|UrpRK=XeXjM<)z&XZf|W{{{He`E&n!L0-svG zZ#lQzx7@IN)AHt)cUykm^39enwcOgWrzP3qu2}O=_(yYL(HoK<{a1^~Ww$J^-|H&a zM@DGfpd;dQq6%6hbKa|K7E_DNXvbY1OVc!Ois{B->OU&C=O;~lG!+>RxM;uDH4;1b z*=qZ6E=5fW;Rs6Q1>{KqHohYSLE2_hAgRUf(F%?+bKqRwQul7{?51}LzUld}_fTo|( zXX>x2wmY~i%E33Kv{TdVE8gC=A{SOY)`?X?DyD{hwCM^f}8TNu}I{cLYE zXwYb1thR?t6R?|2#W^)>C1%4}wA8-W>>Ba=wTvTa5u6zzH=fWh`CIh|eQ_=0vrX!T z{rtFVD9S!wZ8sbKKgPZUOpdDBe>$^dGBcSa$;>2^$qF+Gd)Lw%1W51uzBeJH_pPdW zU*$1C5KsY$NbX}XBq#!cNCYWG#2`AOJVfw`q9TvD{BZ+`%EJ}@r@AU3Q<*%?_vK5z zb8g+Py34uuo_o&kSH^rk!YnnHV-*#-Nx{pRydjHg>M@HfsYdP$d7Ck{2Gc$$$Rm(|Y?Ib>A*nkmuPRsFE67E}C0k8`++vAi zjVwtf>qcNviz?>?xsiwxiKHRmH7c$0P-4|DCc5XikwpQy2@x{qfTvaME2fsQ{P*VD z;PN%pEf$r|p9r)zeVVT(-*UT%h^{OLH%Gha$*r3d78~)u1Yl0-B$^}n{+wjWZ0!nYB3@bpSVycAMv^| zSh?)>Wsd&L9V`s%1=gld8Y0mNwO&O zISHE~;=)IT=1JETY1}Vwk^r)A&IZX#o*nN#4>~sayq_vqV2F_Edxnfi+*3jmvRf%FdcUrFki@!izx$Mx+L@c7hfLS zxiy@T=Hu0*CRo!c$NtXC=Q1{Rjqs^taO3GprCM3^;1nKhnir2o%JxsflP zlVMTPmCkDdc{ydk2%9h*a%#OAr?8|sXpdltcFHQ)+PS1M7$o4*$^^-xZatOk|4-q4 z(jE&=wmh05sUZV}oNGXkr@T$PRRrA4Vlth1-@uoxTAjw#qt}4&}o$!FEUdC*# zYzmme%D5vrnC0bhZ!(0LeF+P0&W3;oVDd&mZVBqivY#x3DS4*oko7#xzh~S``&9`U z<+kA!M}98r7Ul%pq(||L+}89G(um0<^F7Ab6RS4ugeGEem1W7eISfclf;^Q@;aIgs zlJ#hXQd17SAlHY&c(|C==sW=$xKY-AUy$Qg9UipinvND@3qe-+9o+kXC5#q5mAu{N zAeTF4fiXg0zv2sd9~6Sat5V`F4mj+|{yft`)$f#->&#)6eqdBPll!wMRnv zN(RUSXkwXFkbAK#p2H1z(4lT)ZKdl4L9PLW-MUO?^;T3&)t1wLMv$vwMZDdxCoHKZ z#E(TM7lhwcs52E$Sc9kJRZDa(zx_VGe7LNRl8lM8Ru$G9z@SqX(`T!-i7XLl-0E zMBm4R_74LRzcHQnRSi+Ishm>^?GTnj!e~lLT5<4ccU(3A8)8{Vev@*QlZd-TA-yAr7Ai05brp!su_?jb^}?bYvVxVE1|YfAawFx`YI)&S{}cba9h3WHtS z$v0J^a_BGyd9M&5JI#J#lHx$U=K*3)@Vdm(7J|Z+PP*jBtm#HY#nm}GDi))oxg=zA z`}33R_$rEvf}97yMZtMp!}QiH=CJ#)OxfwAZE)K)Ma_?ESWf{2cP~88 z-{g5pO}!p(R|=&>KIjh_`S02UAR#BC`fEkSP*nY)PKfLj8(l|1M7eXm`$UzwWDQRf zL8h)T=rpRJM}@xfTeuDpi;+591`3mGa1DF*@3<>a*?bSw!FzE`3csm=!&;?M!oFVP z&!gl<_$-kalC<9HM72($_YVHyLiF{8D~_WiZK431+b|Dsn?f*Sq?R&D4}9l59&IQ|fy`;Q)9EC{ z!HTk(LZ6tXW``F`fo?$|1g!UM;731))5lLJZ7S^0knLp3W6|K1xGI5atKl6)Vx(^T z1+GI^Q<3AL*r;om7-|jN4_R`3kU5fs)FSY6&B4I3%&+5KuXDLw(JCB?MmrghsuZDm zEREzcc)i6^xNz@*#2*=zl#IEGn7V@FCAB(fY5BAij`|evHX<>gjXg2De|>R1d!>Rh z!(DdNLa2ZTzM*W^2(wE?p&u&YDUled*@H7IHHl^=M5K8K*Egq!s!Z@OL?WZrR{P?)2Ouro)?MH;pcw_L)%zc z&%U*T0=y%~JO@Em>$DPpB$_e-%n~j;weeOi$*tSqBbP6VDOg+xD5jtKAaH$xJ#tBB zkjv*+L(lSI8Ce2S=`gHZ)#hw2jSd(>U{(V*!(uT{2(q&WnBp(_A$=j*^T*?S0o2(r zlg;z1;5B(nA8opfRYS_G+~QNVJk}VRI~O{0u@naDyRd*9$KYW9d@i*^!sGaK{gWf~ zl@GZ3>8^kFe5voYWk_-?v>8bccF%9z8=U9Rh~_%+9+`5G0;VRjUkxV@rm6#uJ8nDl ziUDkfScfD(z7&w>hX1ynz0gRRAjxtb(%=QG0V{1wcEZ}O{?OJQi1>yfH2Rtqoqp^2$CiV#j*Cc!Q%&&)E=dnBN&4k7%H`BP= zt|UmBM0pIxmPm@WeCs!M_Dul1l8jaA{%Q@6>!eASyjj4BJaQ56gJLnjeaKAg3k3Y& zeiyZ8RMbtK9^AHM=Wz*+S4+??54CGd)GNn(>^0A6dh9q*yN?2}Po0{JasVzSAiy=c zTd=9dA=R#lN-pU19e!#QE<2Yhf=bhWyX0SH9e%uzUXJbxP{64Wg!m2|xFXwWfK5;X z#JIfy(IuJASeS*VLxub#kdCEGqeHLW#?i>#I)ijU>U4ktcL%9^$He2RGvou-)D zMXj7j!!Ljj7J^3rF*y%6w@vt$LKp0&)}g>IYWQ>o4)%8Uu-AY2*o~djR6iQtO~EBC zaA8H@)WOl6JB)BB0Cx9?58zOtI=G}=N{f!J{TT#*a3`w$d#K*kk}BM!b{mE)lIp;| z-YxxK>3g5u@_PPqZZ8YS1j5=Y4OuD>PTJChLYYv!?vr!B089+3lkYY~h0vi#cXTcU zr`RJkZZQwe18SF$(apFRM?9uU)v%DlmSZ6DCj~=pvlccsi&a1_a{)wlaCwQ>Xepay zYTF58Wde9~NZZH;N=(J&PWjL?p97P(w*n(yq(afk8)u`}wurNu@sFdMtGog^!DdqD>(Zh3W7%p=(C z)GE@ULz|<=;f}9@T?a&z%mY%I5XF}ZJCY@BBARN^YAwV=^VZ^V6Lj5T6)N4w3V|tW z%uvlJ@2v>(-iqMBUNrh>-ZBMwi2`Er;+{V~C~n-d^q>#`KzGNeU8AD@7KXy>vC|9% zR!VHXNrIk8P?t^GjWA~bDAW#Iwobt40mcdn=ylMeZE7vrnWTo-EL8$M^R{{IzsLO0 znfsqgab_@Q2TESR)&!VJfNIGAJ|zLr7bMpcGviBY(H?)GlYKpf4C&Kay#r|qDC`bE z#;FiiBI;1+Y*&VwS+bu`Fr$M31U?^lIXCVE!w39zusCp3!2smmnVnDOzyK~?1olFK ze{BHQQP2nxAh(5>KY+UcGZ?gF!FxkNcD@vCLDb|{9Fv~35-e2~mCkitibe+kY5G}; zIvvvV6iso!GX4{ejKxD!7`2;}kW50H^n=>P#X2MSc-TpSau0Ux;s@_8ZtxaUj_CuC z^(deeKtOU(MkpKZJXvWJ)3gljD^U}hlqw(+`G7}6D=LPbiM-W8EPw?)c`dbT!snrZ zS}6xv`VBDYc_(xUkjSGST}y3Sy@U=uTF$Ixk33G#Nwyw{0}3veAh;ShJSaO24GW7x z$Jqw3(GjB~i=MlVngJf9Q?+R9*$=H{uO2P{kMsp5x)~+7ofus3JR+sL>q+x zP6lY1+L{daY2)Yz*Hfe8OBO*_|IG|kR5#r?gY-9?cG!OE1{k*X1CY)tgll4953M82 z7I(ssaMnxp82>wo8(|)cbl`gV$#Dz?*+;pt%K`oZ7AzoQgD1`alS@wkgbK!2@#IIj zvAblEe-9CV#I=dh4n`sa(CDz}>HrH0S|>sSOC%Wh@ma{SA&8Uud+E{~GpH4P z-(sY5s?l(b8HP9 zetrRCZ|W1=S>G{#KJ1wJgLcCQYz~moVlX7UAs?aQR*2Q;$9GbzhZn2RGf#eghTVJ@ z1=|hhJcsKjxW1x+wv8ydLKR=qV@}#-d=1O*pjMA~7V7{@69Ue6{w6=gX6^tN+!xP!hf+-%E9X(4ZJ(0O$R{0W_B>j$6-L^?q5d$WT8F$o-#)QANA@*ZlMJ7xk< zldxusCXX<&He)IblAlg8PNH(1NyY_+0)=J+-b%<#zqV_r0=Y5IL2k^uy|Vxpe=X-} z%X59mp)K-#Xi(xsg2<~wcAu?bfz(xQeym2j?}L-ASceWZRzQkOZ+RX2_4_!tjeTAT z74e=Yx0TQpu|%avSZS@!TT*r=8v4=aV1FjoA$Rim9W40}=e@GebNGwA_o-o)w=i#k zP}Ou1Mx};?beOB?frr7ah*ZEzPiv)CVdOt28I$2<(&%9t^02(FuXH|V z9NqG1s6wPelB=Qu+QF|sO##}0Yo3I9_(7>l88b;TWYntsQiYeY;^?ghU{H$0=o!ma z9x^)qAlDx5c>tObJea0tN*=%ik+Q$ykYXBX4B2moeoVmQ8TGR?c2b=u~>?ZUB5~ITX^#}nBuT$mcdK#n`V#KpD{u7 zk{LG?GbTC2<|iM4&k%{xmTl+Fu&+P=<*i(T12ww}xYnhBANrC0FZcbtcdYx;<6P^2 z2|2Gm@rAO4g|ZW^O1ofE$YVM{(N%v5hR&gsa{s;0pn80fFm;Dnhk@{GeDz;)XA=aU1j(!}@LFa;XYd*`(X2(3l&kH^2 zYUk+~W(}nh;eeL#8uR>q<+{h9BC!s=^wOWUp+ciD!T$U)&cyARH$(gJZmP69Yt~8? z&L*6Qvn59k?fo`P>BUm?(vxSJ_pf-Wk6r#9$}Jg-R`fO-j#rB^m8Tiifk!<19GDWZ z7#*6r+s^*}ISN2!tM-}?$LmR-q1DKx$`Ew!dLAATi_zi8K|A~3&vTEIYz~VW*GH_4 zqP5|xnPW)t0z4uXqhp}~3(LL$>&(Wzs(B8c%-lIihvmwmmdsS-grX?7XmXv=4)kMB z!%`^Hp=a*={5G^_GP@S-83b~UBX8uUQIR_j|MKh9)>XPLiLQIo@R@zzA2JQx((~8; zN4YU_F8p3_-U7eJ`($0Fh+0i(t@$jW4i*Ab54Ic>S9BYR(W-GOVnX06f$W0Gte1}rLg&#+QHuO3@rYK$rgso?R>j#E`E5ezIcSB>UYzaodi_y#2(cMNSgU7RIRKfue~i0@N3hze8;s zUMxjw{kLEPw~qnfs(1Jr+)%?H@4KKgsuWH@q=Z#TNvp*ydhsvN0@PwLDjj;MlQuHR zs{cyul8l*+%1RwiBpDikMKroHHjh4~R~JmqVT`y9un0X9BUB&O(`ixA=!(sYCC< z{1)i|BI$dAdxCurX2U4Q=-U+lGIG4{u4NDNV6&HSK%eOo9*V_12>sfr{bMhJhhnjc z>)hkVy6E>Q*9PAKNDmZFil=tacfY@M2MIn7_6Ojt<$yB5TibwOQn>wxzyh5cNZ$=K zI{Rff(=DY%FFp6ke~ok6IoTZeA?KfH`?abKT2Ws>Ke=Cl5hfCMx=1*GD}F)+;q2uHk8GNR ztQ4R~PGlhr3K9t^p&!2b6KWJz0gI5YJsUhFi<>VMzSVqr|h{Wg+ar<$o#YcN+$MkjX0|gl2XLagWY-i%=dw-!O zZoiQpUCICnqjT3X+KJxlp@-H+=s-SV1O~)h23!w*F3zU`hvOXD+Dij_^HN&4jhe*K z)j!^R`TvzR31f8iBqWK##Q{(#15hFmctngGHMWK3Y!l!t_R(V#OP4@L1GnrzcivYY z0TuxIbTG_!ET``s6InRk@QrUKAzcPL=}@l~mFrkS_SWZT&y%1X55Vb4Hb4WaBY3#r zYK4R}vbH^E$pMTqxc|(Mivn$mzB)jUOe|dll3i>6I#-MLNDR?~6AoV(1HU5a!1cf? z~~kw8p(R=yr=&>VdvOz*0EN$8uS|dc?&SAfwh{P24IhqBa{}E zL1RQOA3^l~F>XH=nFlmF;lwYREHH$z77%>!1Suq>J(mETI(otA`;P9`hK3~Eo) zaNt`c-hb8%T6qLa0_aj=iv2tSBAk`GaDf3qHRgFq9vJD#i~;UxRbjr0!5G;HR)P!YeG(?lvZ4A;r??J{9y$lFWMGH1R^jgN>FXdmo)I;}l==AEFN@xMG4wbe67zIF3 zPOw%L-HC*`0^WqLNZ!I94qkqTY&&OdgrFB4D$96mTmJi)bs zM-(|=8VPI5225^-h_|^NFcu7p#aw{f?0)N$>(Rk?o+zN5pRtXg4bRf|p|zLLK;|-k z`HA{kQg0!P;XyJ~h(zi#JI>WNz8MGKB6jixpQs!x{Vz=*=^f{f0*1sx>)EXr(GW&w zp64L*u2^@`8D_1`WMnLOIUULtZ2mYTA8_9~J8_D5E3Bs#boF?4ntk9BS}D00!!K-R zEJ|D2XG_-nRZWXhyF3*OQL$$ldFjP_t@9l?z0P#Q+~vFuFrnNYN7WRBs2lD_#?kO3 zJvJ)Vp=+4)VT?bL>p{1SXIHb-B+QgCV?|#x;sK}GsZS_FxpoG9do8r5NDLf=5TXS+ zmTTDy*U=Xr&ytRJR_1{-`mw$pJ(gwut~j?c16LVy;L78qbPhU@0fKSBJI}+i<%b0Q zFx)l4O7M}L^z53YlwW%Ep8)L+akKp>qM-*S0UZF?bpb3LmJy>NS%z;KUE2yj19uo0@`Vy z2iDpFJs8#)oC~}Sw<7@4YXHmvxNe3T)*@ikT{*sF5m;wN;LiDyG*IBd-NGoKGRFyU zq33~T6D~VEfCJGXoRgxUiJk%Ox}~)2zW(bWlz6j+9)qY`JI5$5wFmW(Fr~)ed58vf zH;~x^&o8Y-*F5)5fIafU*hQT-=|k&n^x&i&*TWVUDE+`q8wO@%ds~wStP8ZIm!8-L z$VjmAf3Vj(UEyQb@7jSj|JSNv^i3Omy2ylSJI!5o)L^$Z)7b(qHolxqe!;$^O+J1B z<%C6*=7Jo<1K0O|5gceE;6S6fMb!_Bs$(8@*Mf;j#&d~0VN*r?erwULvdefI)AWLk z5$QPpc?YU;l6~1ryC4(VZch4fry-c|HmIac158HT>SgwWofGTOzGFXEvG@6T1H~Z` z2?k2*F*L|v6=GjMgtIyZJt9P;vGX;nb%(r z6?0m-Sz}TIAy%iZbwRM)i&Z=y)}A1J8Rv3M!rSm$jC7lTU00UI%ap@VGs9(Qr-t8# z;B7=YaG4PhI2Wd`;6aS|&q?FHXq+r!j;1nG4-qAR3Few)_inC uTSd??zPO?w! zhF0PBI`I=P0{NJUB33k)%%zOm)&{3hr=EK;Xj-ujJbK^V4*VHctYIZMZIrC%(2V%k z0Vi2Ijyt7=7VdZFHrXWYjI2c)x7!34pJ78H8?8|W&39tkM zB#}^sBA`g>Al$uK(Rs@iYg38#xxvyu5T(aPL^^c%{+l}P+)1`4#t%;pLx^v{mb|7c z;bFht93c{AvsLKNBROb5kq+W7;eC!fn8(5Jr4MI60LL9=zs5ip za#5#wm>fKRWR9vE%UQ@pGi1C0hc&|wg^%x|SB;2N=+Fd&u7KNg4f~s2T+6!WbI>9J z^sii3#jvQUWVWX0(W?>+x4b})(z$^_FEs-d2O8z(lKOqvMWBb>_DEhr( zJ?qHAMj!egfLw(BuM^6G6q2Gt(UzjwPB96zJPlQd#OUzd?}J-PMNP8JG}ra=`8HI+ z-&>T-HB3oX(*OynvxogM0!>t*3XvE|1|Nn<%kfqZ`|1w=MmW{fsUCEDjXrC%6v{Vj zfGh!&8AaS&a0INW$2O?JS`HVLk}N>R;!)=9)EaX+w{3( z>VQ}3#qzCUg$O7;kY>-Z2ivWR(Doj$Bsr+}@S-V|&liG(XH3zS`! zN<57|e7wvAi1XNPKmo~*^SGJ%R(c+?w~LnIC!JPJy;wJ52^>x8XOy#`|H5bf$t0)UN$yx=fJfCxd9L09iK5U zwBpYzUS09c6%ViYxP-=zG8K*L^SceYx*o-;I5xzHpzq@2tMD-oN%9 z?R~EIvEI9Tuj{4edVRe+de7_~>iKiet3BWBdAR43J^#^@>~ZwSdp7ng@BTygE0S#Y zk?se&Z|!b&@98#mOS{*0cP;z%vKNYIyIeNrrk+udY^a$$~a=uiAp zg@6)(@7$T1Dq)q;E23i-fxkYkbvasA1WVzLSIJpkxI<-mZmJiF88NG6uiH z7mxVJ5@B*UJed|9C`<9+N?snSWfE8=j?LBMIzprJr)T)2ct>JG(`=a@Fx6-uc%d%+AxBNW3^z$Quir#^2z3oR*}{a2BzxN+4XU$ zHMh|sly|uO1XhW7D+DCz+vX_DeO%$nVX=TSlyxQQB|~oJN{W-Dk)=LMcFK#Vz!Tm&2ZFxfVxT7${wnmH(KWMy=#Q>4qE~@sx5I<3%B_y zlyVLKvvq4iL0bdad`aeYxRuUlh2l~pMaGN`xlHC#MXk!&i+Oo1FHhhkmTxAkAsTNb zyZ9VqM=jcv69$FOtgYC5tzgcV>Xe^zRGZQe*79UBtybOG`g_D7Bc0-$<;hSfTNN~1GqsTnr@exAw@iUmN1nnHgA)l6**%h zQHcfe>G41F4OG#UDSu8{v|;&p)1ufZbZ^<{Hn?4GL(NpH7-18p;Y*jLr9di!H?*;e zHJ#7R?G$>w6tCnki`Lz&v?A3)6IbzQ2#%65Rlyw*iXwehe@UJ2@faA6k|sivwu~%l zWEe}brC9$h{& zM$<}%nljrmjsyIQ7JUUQY-}gfahfpNbO0YYTzkCnX9F`_VT}5^k}Vk zOoc0w@koWPE7$Z0a=W2O#wmMIo~Yq!i>gnU6-7h5O*pJ`F^^UO6djp_<1*oQl@Zbv zFG`boquIpBx?bSLg?7jr@q3izs=Z?MBzFiuTd0?um@?zg)lHFV)FRAVhA^vxtyjF}7mcuK=#NH`d)n!#iGh>LND?MZjeBv>{^lhBe)g|8yW9PW`CH92ELs!=Bfw+h7}i;uKxjkT~X zm#xJIui(Wr#91V=K;;v3`Jz6RmB$Tn&}G_)*}`R0H4@VVL%GQ@C_cAL>!2BcUu9%% zzdam?lCcfK3PL*q07~qlm_WGZDmvqr@&FqSTHV4)z%w;a?NYl`&&mZuNY&hJLL=8h zOlZ8`wh}uoYvVxkXEvJaNgW+dxUb`D&s8E7(wI<{ zXj`#j$YI;&IXSF)(*{^p1P8>O9T7erX?ReDU&X)rDNxpctmcmJ!FXJ_rWaY3%cA-R&=QK6a zHRqNwQe(V8$rI;)Qcxr)$PFcQR+Bv?cgC^p!pf3$hO1aU)^L_vF^Ztb?K_0>dQSsS zDx+nC(P{{2a->I)1Ahn^PuVgJUE7$9$u*zm<(aY}iq(MlGH27u<{}wvbC_?qOsG~S zoj?PWQ7V~8de|qFH`j37Rrjb2(L#dK#kzRd97nnW?plRHEi)IrfqDklEaR(5C*tOo z)*KC%u?U7yW5Vc3dkRKt+>w!$6ViM#?S?x6AXZ@1@*|gK& zAVUrvL=0L>ZV$fpN4z`*--*jq&J^ucd$bkhj_3KGO%>qylPZQ&3Qt0wm&vXWio2-{ zY=jaCKW#Hs6{JtF<0)4yL)tBKg&2dmty%E?3JX+9n;{vJY3C{lrr=C^pXTdHwq0Wv8PaOKUBx8Y7HZ|2$K~2MoVvXxSt-_Nx5*vL1bNY?!rFey zNn2xeV_+`R`xQYEiR;No%}KS$lvCG8$+rsfV5ElCl)hXrkF~943hV6Kw2q`%)5ING zLo}`S+YAY8YCtHju2EzOKyy{5L^h$wxZHvqE4FdBGlRP#qlEx1zexf(oYA{8q6e|IKwWJ^;|Tmvo!i08c$ zYT^Bob(^hRl~VE)qmkKDz}t3H5nShsr3m8~+oT`6Y#sYv5!@To=PxXS3W#+CxHp=K zV$hy$81i-^BU9Bf=%o*XpF%8U`>%&9EpTpFZUE{#?f6j zfagx6Ly|LYguvGuIENpl(lkxX4!+c(vYekUl@d^d52<*Y*YPI)Y%hdA$QC|;9npBhp$29vR}#)_ z9AhddY5==&&UNq-A{CO{;(_7$6wIX8wx!`KJ_$y{!kegbf%Lfhd%$n@9t^F?<-5Ah z?LBm|=ZydVUdO^3cy->?xRPO82untD;jpY6k}6_Ic`rRPA`$~Y$iNKx`Xzu|@xZ;@ z4VHaj^n|sNW%8*a9khhQnp!(ugPV_oV67HQ;T~=ZT+YepI`)-=P{GtNJkDQNXcbwd zM@y;O{;*C{%gNE3x549!rAYGN5%_41ebaSEaf03RNp6@c7RKQ_^c_#Ktx)y^F|*TP zGo&4~0`B4)_rnkni8;jWS@!$)(*UevBtle~@H*usPlI+6kPd`D2v3N_d?wJ<{x!?l z&GqyK33~K%Fld~GU?EFntGJ57;nKNIpf^7U&x*uA3ci1aH9iF2yPjAWgNPn}M%c1s z-QFl_67FEGK{Al20Ux|r2p2Q^&qTL=WUPl>K|ct++;P!we}q13%;lF>!$iJaa`{ZU zcA~68u}9#yMPjtYi_NlMd!#c~8vEOurn4R`R)E9td1%W-mmzJU%ABEVrCAH}FCok)S30^JP(tSL2 zFYE&va6H_w)8UpqXoql5eG8}u8mRq6dS>!8T6E38$Ne8%ZZAjn$Kk#{>;s4`+}()i zpep!3Tx^p-hb~3YC*Z#RhR5lZ0Nb@x5%w_tUp#Era&+kv+|7U6k&kewQ@TvX0Vv=R zE-$dH1}2y%;KF@rEjsqayJkPQ_3ztyPuKBy2mmXmplzD=AQu(qfi!rt%o#MdQQ*tm z{r{3$_Rw`!{+;@_%pGqmptf(o^*v?R1+svKjzMF=yTN_8=}CHad`V>|VeEs~T8^fl zqE|qK93ar<^6;=HZ_jx$@GlKPhA8?7y#~3SqE|tX-BKmcmiu=CBng*(iB>)hK^9Kn za)6Xs2=Cx%jP;Nq$idWW(D_fpBDk~?N#0Q&k4*Uc*XhAEkR@Xr+BfhMxJ*m-KHQb- z{?oEcxy8=~X)+5Oum!(xHPXNxgcpM9klLD+%ONCe`!`^mi^Rao3z>SwV7mux!b{`q zo!{VQn{;6#*caJ48SI5r_I6#FtC&qjudAJOBkV!2tpD>Zdd;XvgR?u=q%{(tc`_}~ zn>NT6Ho&{^GZwE_oiQTm2aFMvs4nJ_a8=apHp$=^`b=wCzkrX)_qT z5fwUeAH1(fjMV;b&Y%l4m-n$7KTBV9{LE6$Gzs-%Y^SKQc zz_$n+EJACl1qhEUnW0nue8Q0BX8dY2@=bcp@M0B`e0mt(^uXmS*ekwCLl$BO(F!_v z^9I)fAj}9ACXIC_gxj+%I;pP{z$wL7m^lIqxk%SxtYsfPLhq7nP%QxNgAhU(_nHDY zX%DuQ1$DwkWEE)i2VkJZVieuiyPc(f!0o{sL6bv`5k?!5=|e5uKy8qtw;=rHJ8n>M-HU7NYMMQz^BR=0C7Rs8YV4K zlLL>Y<0eD1;8K`W=%OFPkBY?T*kjwbvmgKK1IO2}Cw~IrdBg$)l)>hSo1cNGFPFiK zHH#;OH`H`q!8cjoPwCZTr|8(TehMoZY^Ir4;RsM^r*babS~j+$+8`5g<@ray_9_I= zEY?BB+O-_Ln4%Y5^iz5WE!;M-6ZwBeAA?=k7BCh3ZnqM3t22eV$!slUBO!p&>5PW@ zYg~1UROrwrem%=R{TgkMOswcSk27d+E?m~tb>52g%VWI{bice$y?P^@49|tn2 zN5h7!mc-+Qutw^w8Z@RH_jcpxp z+Du0bm1arH)iOIGlA`F#Po0VO{PM#+>=)kP0uqc`sk22?HA5U^h<@RkX47vV z3Q4R(rM+8c*z|8W(?u?v4IcpedH8^;UYZ3I$ZAR3Fcs>FBsz8!s%X4LuNf1oRIsOq z<2x79X*fq6JI7LUm8?`bSV`2&9!*RdmeGx%`Qp8b1rCyh->c?a6*o=F%s`b*`U7DP zj_!I9zDy*B(+0O?esNh3`utn;F#7E^Th++)QfJ5l4vWx8HQHFrJIhkclWLFw$d(O! zAF2{b0XJ@Pmi^-Q;X8$>Vxnsp8>$c7*8gzdeD`3_8xn#Gv|A778s7q!o80QacSWtT zV2U7JOvP7DVCgL2;tVruQQ#OoJSx^9i67g+K6;D>K$Xw}WEKlhIE6|!O%Tyw+iJ`; zk{L>gUi@De3@hFNw}MEA#`5c7m%k4v$FuLy0m)b(QpixaTAHbAf^jWlR&dYGj*7)R znVR-ph>RP{E88VE7`H~fpws4~fIIhvzrZ76F;dIkwXxV=X-MFsrK+L|v)L$hs;P)a z^c1@NZ}5m%3Y?BJ~?in8AJj(aRorkBdRx zYhA#ghC-)?T7e2Owx}moA@f>0iSZM+_vc`<7ON1pqB?`V_p8EMHt};92?Cazs|ymt zrn+2!t}E?B%O2=OTVA~GqUn18EmX+o67|yY9{lMtX6YUj@@5YAFis#-x(A#ILPeCz zr1Jm~wN%rLwc{1wj@@}KGk*JCs7ItiN6)_Ecz#)U8ROjF%M6W2f@a7A@#LLBh|{Ib zZATC`u@K72YzOFzB~&?pGs^wzL=)+Drti$X1(4>=*96))|aMTHM8EAfp z1qKW;ox8;k+!y;8fZABH2pauw>|#VLXS}CL_PJ|0bMMlFdK|_3nXywww!qx>@(Sij zhzhpQP92p6Dzye60b@Xol(XaRCihxv(bor~nqcy8B~D6rT)HH?@5YPZD6?sx(2s_PnSsf+x@B)eq7cMYJ8~I_ z?)Gz#M8F3(%*?J{Lb*RZu${ein5j!vZSCscH+*K#%R|<_#|8?Lt;^o!?9>44G~ElA z!W`i9&MhT(Ql0V_V(y@=RiM$98UyjGW6YZ2#Ts=56;c`_MAbng&w`n(v zaVz0g#B5p!0?7Ds=>0X!?5J3b4r%vY%2vl2NcW5^Tzum3LJ_zi3AYjMCjm!143BSJ z4Udb({NwvqGY-jmK&TLYTQsGF*@n*f6Bu5Rt~1@x+lLPhvN!z+Jf-U)rC&&`DHx>D zBCbiOfqi`V#iFX$JW5LJJq3`0Z9nnKBVca9dVwskl;$_Dw;*1~xKlMo&?V zJ=j#UU)cy9u*%m-S?KaXGT}+7t~)qeG;+cgiMycFGZW~STba>QyXV+nCS~l-QXCM& zpFERsa5b$yQIohga;UL+sZQ!t^7_>~ppw{D#)0~0V6H`gg$ZUs!R~^PoE9ecIhJM=!LQW6O^lC(WcL3hSos#U<<674A7=XXAs;UaAOY~ zx!%>tc`h>nbZ@7sok;SF9}0AD-#V8$U0UVF^O*h9_Itp+CZs)_GB7)1_UL&_j9K>B z{+YuP^!NpgZNH1@UDXAQgpdW>6@naXtnbccU+6`WqkrCnq*t5H*x-*0W5@Bubdc2*{6IDanlh+i{i%l2{H}7P|h8Jtl znECBlR=Rfra%~bC#&O2p)%Q%pN_j?SrPOJ_l>`i(Z8szn$E6WS`~hlJ^o#-K>FYGp zGb5GDiIZ}ypre;~07d<&f8CP@4BUL7&8;x>pk0>+Tu&+ou0)v~)~k-KMn5tzqidEb zf?mJy41ilVp0*zk8aw^C?nFPP@gm&ITdnR=Jyjb{Ra2wD(xorXX3f&M%Z37Fkv=$v5s94amw$nDpw4H%$o_oN(E(~jtsfT6Y z1v@jljZLhR+<@B>_CS{x5gS`+nBDhFiYjwsUV_LEC?xa70)< z;)JpI5%*Rj8GbBmqf#A1iptUesmDSa((+-kN^B$E2!{X}9U(E^j+qr3k( z#NO|R^?zEwV1i9Vyt9!u%3`Woq|z#ahq`EpD9~__nH^p%MUvM4~fWW9?yX2Vz{{&|CN{)OMXz zI1bzSZ^Wev@}x{J?c!44p*?gd`}Qtw{nagS$Rt;E>N4czSPnB5GEB0dRVZy}%W9a{ z+1<>V5s?b*`{RdZ*hhE6+ichyS^%sgVf!GOE5bDTueGO{M(E&seQVjX*TI|c2i2}f z*UB#rtzY)Yz;*pZ-`!o2UO1l|?AB}mV+L@mH*V`>^*b%Tm@Sdi8WW~~)CV~T)jiD2 z@M0;Sg7D%V3=G-s7<1W}Xl(F9W&*t)gI*KqSQs}?NYIxOOk}N-I~C}FITe!hV3!Oa z0Fd_rCj_)D$pF^D(psecmG0)#914z|75_Nu%;!5(FrV!@Di5nZfDAY&K%*q>IX_&G zz-rBnsckB`Tp>LvRsS@l`GtFPesUP;(x+Xx?@q&UL^ME;4_=_21W1v^1G_VLh3PHN zF`-G=RmdE`9}R@HINX^~@SeD%4WJ~P{r_@~S$*0P$6g8k>-JbjF)JtA7RaCEz>4)G z9Qa_91kpMG=-e6CGbD*Cr6&;^IF>4n4&VBQu#$g+I<3iDPs0jexd&jmZ`=Z-e_S+2 zgqehXL4#R3b^09N(tN4FxL1X`dWXU8g}d>A|B!_GAMg7uyXD3I1c;@;f&(TOkAoAC z(WIO-X%rM@2%3X35}7Jsu|#6zUZtCbtlZ&#$e`am%zmZ9oe@F{Hke_Oj*o^2mt+d8 zortI{5yEW-2f&f*nek1eQmQ(sVYH%RoHGFO&-Ig2?CT|d-wjwx0@(WEi38Kg;{{8& zSlXFRJfHM}mwP9}f(yQlH>IYC2`dow8c{XN;&HmJK+7BOZ6Yzc<`K9qflJ+9H2n}9 z$=VG@#hGO136oqgn1QPpcT|d0nXYQgT&Ht47K@~iQ#W%acOkwUJ?FY$lvTHwi@7G^ z5QBJZ;G)H%wBx2KMY|x<$O^FhToa)$v|)&gbQ~K0CG60L;ESe>3moDR4|-s*=0b#) z0eT{Xx1=NDsCFeZ$zmyT_qw*B&p!g|!W&nDZ6B*=y><-OMoB|PpKgbIS){oNP6lEz z+DF}f3H!uVU_1vdVB4)mMPIes@8 z_N9TU2yOvkhZFHZ{x%K>>pBa1=6|8$pIyhShRfHbNHyquK!(LT-WKR1E?IghEqZ-w&Wa2-oYt}(xB>PrwtK+kDgg3`x*3Lm>qZz# zA~Dzd$7izqqfBsZm!w_k{-Vytx7NHQ0~_^C&<0CufhQ<~p`E{2w+;xcPHWYsZUz%C z9&lOo-J6#fhpgl^wfi{4$;V;$c4^n}^pLmbmjlhdZ}cDNUM0Dd+r4cAC$V!O1e2Y= z*wBQWEu2s=si3+|Rf814k1g%(u*QpY=$XUUL)z*)Kb~ekdpk_AQC+SLi9-=@HmW1i zjK#=5I*#B`kqRB^{>Pd7FAA??tB8TD$H)SJZU~-^6s^Wvc!N+Yt3cRN&by0y;CSbJ?BLR!!%9nWuzt~d8OND$SS61iR-MK`4iM16^%w`# zCN)sLN5Cy&$)fjv%}k=5_c0@@PA!36v@F=sBln$lf-V0nbML6Ahdccam`$Gr`z%ti zlB>>!IVKGqiK2rKa25tIxE$PD0oi>d2n+{+^#Dg|3XMG2F@H;G(Xsj!|DFSgYXIr- z27q%j>?+l8N(3Vx1TParP=i6sqtAYhnHgVFi^gu-YenZgblT6q?jf)*i^nE6fE5qJ z{(G^wGh_v)EMKwYO51Be*VRguMru895(i}?Ruz1Ka{#mp}Je#39(o>%wXaPGPHoqNvr z?de_BD+4ambqsjgN`rKMufb_%qY+N8bwtB}n3eYX^ByV#RbqokJfivf!CvK|@-+bA zIVNG-$W~ny6&L}jkL@}RF~*K3A=l9U3{3NY49GEmgkilkjo7}=l>6bQ5`2w3x{Qi* zHOW$o_DXDlrUoz9^Noj5&wxyP;jcTfJG}F4`+MZ4%D9rf?pSo)F2%epLq4UemDOxl zMVJ_o`y9;3Kq;>1Jl5XBpDTkS=N8kk2wEY3Str8rV4EmpV)~}g5Yj36l=Aa;;Y)Tv z1a7Hc9>hMgt7m+7`I5Ek(xQw@a@*w5@t=&%ja)iZlr+hYozQVCi?_&79-Mx88LXV@ zVuXz?ca7nK+}F>36@49$iT8enJ=7;i6G4!+t+)6XRBEpTF(Oyx?IaBmDpyqVbq18~ zDRD@I`$_vBsA)hX-nrwpgAy&-9`VVuJZ7;nojOlcx!yT1manGo6(0|lN5wCHxx9bT zc}xNwk!P1kHcBZ?HRC9!?5U6&IK7g32w#MHY!r!Sn19>HPubi1<`-e^_e!`UaufaL zVjxNwE1pU>o76cB@|fQJD8_U^1j?;TB@)2hy_X+_qVD${OQIGTsFyEvOHtBi^3>Dm zZXi}m$xZp$DtbB~6OUe12l{ENwy$UX3fi(yf*z6EVo8>*aUvF6juPsujZkIeT5kVZ zdF%Xu3@|G1fwo?MAGXe~m2sQuJ|rxidoN?8S1(FHYV^Tdk#OuBR56qwp z>U!n5;@{s4xQIu-fr_M45wQN15jNIRz97LR<7tPnP6(;~3fv*yauhWU$`E5(K}|1Q zv!nOSQ4ElBM=wZ9ch%IJfi3s!*tQYPkkC8hcc+Je0DY{oK9eb5C4|pNPY{4xWHy!- ziKo!uYk!2TXFw!AQye~9P8j&?kECUaIN;;pBf$t^NFte47w=dNbTBB-rtT@s=72~% z5|nP~K@8Rd5=sbYHpj|njyw@2vYhp}vmRSIWvOKly4`QiZ@&lYwNca$-xk3Yx2I?S zzN8eMVxWr1MidT#$ACSg!^0*vwVKa{MG^O%G~BCnUMnRc7oTv%&qx8jX1 zE2~%KNhs-nNL;w`P3MZUk5#t!ndP2*5>@SY9Fwp})h z*$fi5GSY!*2Z%bU4V01tkBLV|EQdryx9#cO^Ybzy&LWjoj-=I`hpRT-wwyaFRdZ;5 zpjcekTg9gKQfyQ_Acb?*e<^LX&STB>sn9koWpmDAFw}$Ew6mELuY3+);u}lFqaXdH z5^etV=is5;)4eizd>AnQY#_EUv=t?x>Pk2toBC`%baCBf8bf7%j_ z381Jihr|y(k5L^gJo^0Rv%xGVoINC-^V{;`{#)2%HS|UfN8+t!CPZ@0Dj&7in+dPn zkR}FZen2F8Oj?ZV9f&vhX67{)i}U|o{?pc_O_Mi_e|Yq%;g^S&=Jw5SQyyt=+|l0~ zU$?II%X~gpCH+Z#HKR@>)6I;y_r>yATLz28qjum4J^maL4c_!3x{AHxdekBB741eA z9vqdnQ;D;=Tnfo3U-*CM>_Blp8Rf3&2gl{`H0DoGfJOH)DTPNi^1))Y$xu;)RhddMuHH{jqfyj9lxtH;Sfl>*&)86~k%ebHy$FHa?41Gd`mKdZDJ%0T|FH|Tp zS;81W4w$KKa@xd&9m0-x-YzW64@kt=$fwR$z890j0=WMCK#w*V^Ui#Lc7gH=SH`%B z1bjPc*e3pJSlEhNBFrIMK**1<`%DDX97i2I>7(M&EjWQ6cze79NW>{&0&zsbW(gjfargtEXaZ%E z3EiWns>n9VzL?vjAxs%~UztyK93;cMib%PJVnf?0<#c$RR%=e;y zl>9=W)k*k;WFLLOVhq@G{(Lmv_6o*MT-EwfCxyh zi#0@vP&Sa{i=8r@Y+{vy(iyi2_z>7A6RSRb|F?U4AKWH5;NMzBUaI2X8dyL5m38Q( zt4by#eB%xQ7`y6KL;)(hM3>9vGJrbZ14fsl5be<7W4nceTLz1fH*_N+qkmgIG$h*h z3g^wo+HJv=h-GR9NIEiEPCEKhwsMI1oP0$ z6q4jXempc$o47-~?&FrTS0;8({(180$|e(29IKB7=I!%`$JEnr8QU}ZKcoLS`uWi#qqhM3 z$}~-mo;P#N==A)T=6^c!o0)$a`R2&cneU9eed1Rm&5_UuKN%l-Vr1X&-zIMy{_$|| z(c$+Gy=M5<;mmY-*fM;<@a*(QhW>lz;raZ~{`n8gTrqRz%;?PZ^IPVAKlkmqPtLt- zt~+#Q!Jo{g>s@X5kerWd1v&C8G{B1*@7<%VWYbY|oPKZO1TfqSMwYQJ2 zM2m1Zmyk+DNa*Ic*hHvMgxNp7f8^5PzR@Zf;572UfWgI&kR&8qwRh=dX|f2ARXFfr zYLFI$o4RbIgH%s-`vc z59?w*(5BEZxa>L+zlQ+HDmlGJmLlRI6j4b`Ws*&ez%}m#=iq*qERALnhXSIs1j;RK zr^yNzzJ;1KD8KDSLxB!%Dgn8#)yS0ba!4lS&ST@rI&pBN4jghC>}joSRgnp6s6 zj7SC@xh)_R0NJ5OHNRVtww!ug3?oenNFP9fMJQ!gL(jDpDdPaGfn>Lk6V^c;2x!%; zsAiptn087gtt&ML|L=m44*6}HKf5LcU_XO#!jMaOVc8NYW5z;?6tsg55-f`yhaNDz z`2hBrXld^GHK~KNAWJUL1t}rQ0WPaIbSB>^Nmnq(Bsf+Vg+w;TlCMsca64DNO(t9rkd&gWmjFMM^tXPI6Y6e^?RY7=by|Ti_Iz zZW9sPq}Oy7-k?aO!v!J5fZ=kELZ3mo>0zdp)}=_glvEa{EtOLbcYn!4kN>M8m7>+4 zaoX$(@)kP|7$KM5nVo$5n%Lpj<}k!qFtBZU^a`}e3s1{ZOo7QMg%Khs7Yi1>ca$9D z#3PC{k9j2!;{}#R5Mk(HOVG3hQIW#3NCcSR-vGcxq?=rUq8M6ZA6OH^?cH`EAQP(r zI*&`oyrw<*q$15q0TAFxf!<3=rp26;SUUTFES30IEl|AzB}I@x@3G1Q`64#}i# zCor<76}6TwE|REEgYky$b}`u)_dSCATf}|)v#`kEa6me2pWP*7&CdTqmag>07=2t# zmkd~tPEb4qIunZiNXXStYy4O;>DZ|XFp}gRuhJ|SLCIPHZCeT;g`!{xsGa{$mIk^} zsaaiIDR{T+d$TK2_#|4=*{k#k^fV!90Ou6bM9(DSIjme94JS03#;Bi9Z<_IYVdj z=aoid>o9aMjxZkRRtP~v*pqjEO_4I#_|O!|FnTZ+AnDB~R+uTJT@FOZCa`%S!2pQ{ zk^;kmWT!dh$5<^0S=2-MLmnIvqS#Z5`BBA`J19VuV>^@J-%%|fsih5c%ar_EDK7!a zjtefJt3z|74KPA)f43yX{(~S%682J35?oHC*1v9$m~6&xOp6vMIXsqV!@5Gdt=ZY@lo#U*3x^uN1AoxtkW<gw%4)J;{UM|vFJ-a-6ssSiq0carBXZS}7Q>j8a4IWdGGGGnLEGN5Pmw}h zu?jF5pfSR7*J5vWkPDM*QtVeWlo27-#uCCQV2Kj#sUIj(SYar39x3x(j27PFSV8M| zZ&AcB&Iw$N8t@g3%z6_JDWo?$MaWWViaa#t5j!sOI6}yc@h4Qfl=Xs9%44`;`lWnz z=sdQQU~%7N@^2%k2{|RO5wOOvZ%{+z@a)^Mw*O>d1XYf1HjnQ{EG_6fl38{sMiC<< zWxSYB1qs+HoKj(LiCr4GYAHTLgN7HR(-lmVlrWzy?O9u>=r7g`j*u=8=%8u%sx>e> zz9|0|on65al2ixO*wXbY4k&@nOidO?p|_YP@CabxPyj7xJ7B!Getk{q$Y=05s-Z9; zXd-BNaWY%@zAVMDM~Y=3u{nUW7h%bgRW9yglow;kYtgg_xq=^Ihk^A2Qvc|E%8#*1 zv8PHWiLOJ{KRZDKcHO4D7{)z;alnS&KkQkhq$qmvhstkps`4OA8llmc5Nsugxi)kc zl@*a_AzTqhVk1V`0Y^!21*AsC{GxJvae`(z0iDM(GWAbafN2PH7tKnmp*B#NZlWv2 zy+FI+X)qQSFPEiBY-^4#PTd`8OTEbhrIQ`7MoI zgK*|ovPEblfgzW+?9OO()TXKYvz6F9zfF@QKjf&~L- zYYbg(yRw%fj*NtD58=~=#CIEp85WS)UYCE1CSm`_hE3qZPx8Ql6eK|Gam&&uoJtr8 zsj1y0j24;&L%y<2sT%47a}v$tYXaXJPAM4#t9JBf%8#+rOO_!4^}`O(1+zsrn%%Ap zCKe|UN+R6^4ju-i>}4eXQ(-47|5lRXYs`xO220yfU^av}yRG;?#9{ z=c4Bx4ZM*uSJ+0^%$nEcwgV^k+9=-0Yt9s|JeAkxKhHdc*GBp6LubR2+212c19sCW z4%#@65(Lxnez31v^y#gp98!iHID&1soWFHq-ZhefoT1>voWhz2Xt^#;0F@u6XZN z(`SnpULc$*XXn-ng!^9Mcj~*PtQTT}1{_v!Xn0VS@Ap|PINC)-^M>inh zU`uz9-lCjLbRz|?7F=6fcbx1QC8Ow(1A7mMH=cJ+c!xvJNGM@GuzoPC@;5?U4+pfbE3x0+By(b>n+q>X3 z0zw|9;i8nCq%PXmrYYLm?bPW;uwoJKA_PDxZ7dZZz3ms5^){0NB92X~ThIbIz=LW!-4b5iydJ_luq@>zyIY*tCCr_4 z$%?AnJEnW7UGQkGOwGP-(_4m2Bg6F2?Zf+r$A+&T{=!Ub`1doG8DeJ7%!g<0oc{Lw zz4N!tSLVYr!_&W>{`cwkPrqflIeqoCVR~tL$JF13?NdLS`o_?=r#?A#_tYDwD)U!N zg=d+mD~7I}I&W%W^Itaqbarg`9kZ#;U)}t#o8Pnf^_z>E{WG1-mu^0^d2VRs`N{t` z`J>4%PkwC3G$~HrIREfucG5F>@#LA4(-SXF{9xjX6Aw(hW8!rasR_pfGqHbSZ2ULl zPmO}O-&7<+i^$k?04s$}=Bc1IdIa?WE;mt)S7{P=RRln_eBMwIqCOr5l& zkLRiLr^}W&m8k`yxfGy4$&6hFkoD)=L5i-F4T5W><8_lk%6^TENa~L}+$J(vYZmBi zvFstUo6GVG;>K{Bt|PwPgCmPI`5GCX*&oY<5uZ~x%$b8b(ND< zLoAbZtG%1$a-rT7$cRHzaVPV1gkjAq7s`UTPoE?xBxi*K24^sy+46O{JiFXs37?~6 zv)cn@qmeY;w_{{!Sm$q*J$yDpbTyh*gXO{vrIwt@OXW>*bu1GrR@|v`&ymY(Er62c zEG=ujXtwKvS(gl_>W>#z0@{|fX4G0^DXtUSz9>K64tg3?!ex$R+N3>^$Q_VzYyE9? z8u3F;OQP)4Mu=8o+9QuntI2sg0fV~b3Kt9MH2ZF)7&x$%Tgxl zTFO8(cx`2+N*aPn52PGbfH{FGZMXS`X$ zs*S2Lp}bDxOYb+!<;#T#L4k0flZysjw1?esgHoO-SqZHr*rkO=)83#?*X~*Y?yJt< zj5HI3Yq`MNvW_t8r!?ov9cUU0KwtJnEGe~@wkMXR<$9Xhgo(ti#yETYPnQ#;#odA(AI5q@2vn@+frG?N{gQ_73=6&=A+Cb&u~LRynzJ|(}m zp48=>PO?&OsYkkm!Gb6 zB2D<&jm^4?(Q7I(R-=?x`4mkhVqMk^&Ih}ypz11u3TvVQ-jZ8Yv2nCNzH~+(Oxs_x zA^^Q?Fn|T2?4s1ku`VK{{|6vHQUszirgh$`hK;89ha z?z&xFuetNwX-~=JLQPeq=}05h;j!oXVyDSS-F~4Q;V5mb-VR6Y+Ol?qzbGL8pj-)b za8pB2$*@sJ+X{PSNO6C;5Xh4etI?Dy**fMld04SjWuL!5ri&^Sunhx^bn&7mikI1wPU>ZB!`DOuaq?3m1nu;MS-YfYjUFWTGoY~AfoZF`;a z19iGfk%dUWrBXT5vG|S$lya&ZquTixESrSUn97elu9OoI zz|*;CyWZ`J>5FQ;Ot#_2+&U@!iY{XCsf180P?(f4) zR5?kxcAANB9gypHDbHtc z&PY_F%Z+qZ#U@u$du0r1e=(^Bi?ETOxhvUgf>PfE}Zp|qw6p~sfA~eEIM{VXTV7V1ZANum>Y|L?n1aip zr=vyS{^#BJoX?HQlj|>7q2&&3*xv|59n}K4s2HSz!DlDC$!tco;!66`)%4f_r6R4z zL1e4}R$Wc!BLbo3U{^4VjFFw ztlH&N(PA{V+Qa>&uJh+=)-uUhn`Ig|0>S0t%sUkOo2zCWKtW;~u=6!*gWQvn>&cZ3 zO~If~xI+PlFG*fZE5#0jO=qqZ4dz-kqbJUhISc$b1NL&Gy`^Syc9%~_?s=Qs_-waC zQbDc37c*FL86CU#8M&HlFx_48yX&!XBc1ox`Ahy;dEQ8LsAVv|_+4JD%0x`c=;{8f zLB-NZ4;fK+JYIh$vG{AH9!?idQjIEOrV_w!Kl7JzH5qu$sO6A48*=4D0f7z(XXI9)zlK81yPe!jZTIz*ZhV{kVri5yrQmk`OlwNI0SKPkkXmakTQaw*) zNNsRAS5_BWygIp6rW){PSXM>ky4kodmUXj@+&*P}rb~_nX^Y!hCP&Q8>C$Kat5iMg zZ#oQ?GOf<+4do4SJx~8eu0PeOWBupdYDbK1NAl!lwKUJ#HlU9O`r9qtGH8#~0_XFi|wU+Rv zq7^qjDYQ&#=?j}S$$~^t?I7!nMrdc6M$JlTy9{aXPd3ewZq4A*$265xI?j&Bk0;aa zFlo#zo3bEavwPh#4T(Pi=Nz4Pt88v_jxw~0dkDEX39SGo2|kcm4#kqubZqEpxjf!3 zY3P!p*sgHAzTxFhJ6|qeiRXkIDbzIpx-v!@F|}XW>+=R4jER)h=!oV5R*bZA#z=ru zfeaGCQYci7YlDfsikVH|+KNo@M!M@OHMzEWdsS|KyI8Q~+VHRD>U^xr`=66{%W@>h z+gg5bzW4;n759hbr-gPilTumX!>hHyz2ukaF8tY8Fhd6Tj!C5kaR8Wkl~HJfC@A9=~7U$|Wl3j+yfTyDDPjeMRNKne9Y6 zq*`kgx>aA@n}~UTxM|bS7o~vP&ku>$y=``E#h)>h$^;o=8VyY}rsK%4atui(LLBAM z3N4a|aOrwN|803>lL@Lo8NJDhpN5Ol%5V9AQXT|JSkBIMqDFX*3u@!Xm2w+25yxgB z*%q|1YTZzsagR)@Rm3I+AL7k446Jc8^Yfw7hbaW`f*Fl_p zeK}zZ5Qa15EU;@g4gVXmz!s<8xar!--;Ey`o05Y3O#5H&xd++Bid)T44%;%CyhE_z zzJyFs;u$Hp8&-{QHw=h+cW#e7G$h__7M$YcdSQ0UfHS}%UZp>|i-76<BIw=CRa#&DbtU&k&uXW;#-}FNIa=je8C8e zfE&Mm;ObMf?YNsw$`s3Pn!5<87H^#FjsMr!0(ghBy)*8Z_6#lhR(He4B!?d-yXvx? zEOw1Gol3({j2z1L5Q0GG2SkXidN;gWZz(MH_FO4QNeQb!?@=Pq!OKz16NEaSW^f%H ztkL372n*o3u&}UYP=-ME2hI^6sn_=Oj1l2-L=Ue@0J(DXu&t3-he*4d%`=6x+koD5w_0{h(u45 zM#fSmxwrSS2mY!3_EiZ*UZ$UK&?Ot%9@P2mC5m$)&JImExMi?d^rRx^iu0rCoxOSp zPQ?A5Rp4kT;ndVJPsb@L=U}ydXUZ9r{g7wyIFaxtV9x0VpA$8En&*nYTP*JGy+0sG zd2p*+*ZbFwHJm&ZiKUrTrQ68|#R?_tJcDK6XgsmbS3GvpkG_XGV-?_+Un6-tZ*iTd*YXUhc@DwXC4 zmgfK(Lb9sEG{I5gogX-TQM~#=dg4sgVTM-IDwd#Fj#&FgDOSuSaze9?_Z(h(50hY0 zG*}>((y>H(iKde2B~F!4FRA!MjOTeGMkblH_b~inp2y-i^5OYc_nv(>FNueL{@({_ zin~@#s#!9fB9|z94KL9wA6w$sv}%b@$3dDE=U6g9p70`uL3if&_q(%Wtp^*rBepNS zl4MacTu&^OO4Cb8hDFVMGQI@5u(V1BwZz7m)!PsK2asU*Mt8uek0#e1GHFYVu_CPbQ&9X^l4qCbI7u$?6pa_~sszOo48x^~^**qNNuVHnC~?}WoMI4HOAA_k zZIYsR7K~R*Y%IoLig^<6Q<0eGSc*vi>L!&qu1U;cHHUn9X^PMNU#9rP6^#UDyoknh z#}h2gVL8MTaZCw=j`7f=B|4o=1JNoI+RF)WoG9)+@Ko7-` zs4_*V&?^qAjI~EY<6r=iL<$ph{5{lRo>5^7har45{aL*EfIL0ywG@+t8pMeul2XCo z5^41kpGc^dQf!h>P%1V-;kIjS#ZZT#ed41RU%9{knnUY`@Z{aud-Lg=Z`yXA_{{as zoD@c2v z8dfDvQf@TF zI;>JL;?PIw{pUitL6m%aZJc7zcCAefrvic&Qe0uM;!v}=ipA6r>{42?kBpi`C*d8H zH$<90jK7OlJV>8*$*Xx!|7&?DvuVaX^}5Li$A36BIl|4IJ(Q8I_g%Q&cdQ;*KWrx3 zU0YMzG_^G@8?9q0@n{!c3wOj2g|bm39(nuIfKM>h_w{}k!)X(D{1OR@e8=wyhqMIE zq{`M-Az@59Oi}R0Fw)TXKfNW03s>JUiH>r}+d)$Pt7&llwmO!3Q ziAVCt%^55f7dnr}b^3aG z)_~)q?<+Vo=nfHyhYnoP6H|h9ErGkVY3|UBf9egBp9Dg{+{hI}B}sz<_*`+VN)!R| zq=g-kQrBS!>m%AO6AnXX4&_Em}EMEtGX3Cy=EA8{U zLA7<$^}@mVfntejOJ-seU%Xy;Np9En8~Wo0j7nwP5{arN<+5k^tj^C7;C$$>57JC=ojA$9GEQyOm*4G%-Y6(QuMFvx*csUbDi}70#(X_Exyz$xH=k)Of#P8g? zrVM|10|wo>x`aWOS9>?=WNpj14QATfSURdCUjFdS7^eXd#_78A`j`Xa#s9EY-_>t{ zLO53?-W7S^5!26WDIT%Dyv0Vl)oD3$?xSxJw#*O6#5-RE!pp}2ARumj>so~u-riS# z;L<7T9|}6^_&D-7mLq&P8;eo0`X8-g3I=2#@nB>$fe$X!1Te!$>d)5EV`lXt^jO!Q z(n_*ib4T)A*Bxu5Q+bfuy%A%#u~fXNS(Leqq-63f;@sP&E*7`kbM@mgTFk%RCY-lW ztJ6$@tfk#Wzsu*SR4DPScMH2u!%g!E5m18<^|jW%A@g_tb?PpgdP8GRf`MM1; z5!P%zqBVt`oQaov+P)n<9gv9&PXYAuk@sG?>#nVrUEJI9k3wYVB#PC&;}nXegj1&8 zhHy&YhEh_PZ9m)|F`tNh1?W|V5P$PYVVC&dZxiNrp8S#Co$bpc&_iowQvC2cgz24# zI}d^P4yi=Q2D*gUS8SC-T{2K#s2Xg;jp@o*yByKz zg0ZReez;r*i^ZcaebCnX&HJV0m{?Wg=Q3P`s>!M0*^lTDLLN?*Z5h#XKW1mJSUmDi zSx4{5`vvgiAo@C)r`lzr(QfiAtHtEU(EPz- zF~(eYuK36YubvR`^NHT$9~0Q2t$Q{N?U`E~{pO5j{K2Wz@C%dwASuld&g%YE;8)!G z+Wy(dZFJfi-lDPFWb=M?BrC7y2aX^}b3h~>ePk!_cYirIAwDvcTIfyOC+&jK)yvmG zEt>(2g`qqyv!+zkvPGU0eMiyU!D6xce1_3vL5+e7+ z`G@f1!D8{zXA_t8Zg~i30eJUu-jQgg+2$x;E)7!gxYbAiRq7M?`CzfAd9r(X?*pGe zFz&wK>J{t9ih#}CWF1~hHtI+UIGj`;!JWcAKN7~p&p#~8&21EmH~n$qkc|7i_ftZ6 zXu%(`G6f>bWnKDaOz+2*h?nmW-}Py1+5<9qOZ>^qKkx1R`O`SuECkt-O9u>4LL0AW z1WlV4ul)=fK3FUsee=P~d*A+y0OU-k+D5eKuG4NaP^R>9Ixk-QIs9a>ScVAr^ydWU z(EKJpE;)Bk-8B5b!;r$Imn4@d1+j?iTr;68|CDWh_U|=PQ}YG`em5-f$3PAs;_$ARs0RNLcAjS;;J5$7Kzbb6qjhtPipeC@NA^**9 z1k-|)ng?Xb`@bq2MB>0JrFZH6lajG?&wuRHyV_&u@}Mg5BKx(IXc%xl&-37n_UAUT z2EHKyz~~FeQbiV09=TUi3y`fUC6G!Ay8A2@aRS58$sYwr&uyogjQ(ZjU%!djoIN1e z_5p=XQJ+#g2##Y%h6Lu7F35TcV*PP!I0MDvqX*AB)Kj4GzlHpjK_f$oU;P$3Iau5~ z>OKI4d+6IZXGz3d$gjm@N-2PSmMSDsfpqBHr*Muqxm2PZBE;WqIb*N*v8PU*vhp2V ztUK-j*q_2hk&Z-tZPLm$BVLQg90WGvL}k19*mtlq4~Rs~JHK*JxkMtvDa}s8A(B#|JcRhx9|?zcoKz@!K3F{Te;%#=`eR{c>*v5d zKJ+nG^0wFFqA zMx)Y{cBk#4?&rd`or9w6NsbZ^{sKpd+H!}glMaJxIa(_EvCGM(^rc?_nr2WYF7Pvb z2(ew_WxotvEULbA-9E80oB5=e{*`dy7TU=sjigy?ZaP%92yd4+%ZGjiP^njlUbyRJ zNAJ+DrGph~5Bin~LYLLVd~H5$V8k~)k8vC*#^En|@(;bA{2fQEso&z`F}$i<&oUWU zKFZ1p{`M3rO9r6s{T4@;({5o`!TO$P-T#z%&^P>!{#Sx>PjeI)@>cc552dVl;9 z=@U=HC*Bic{$b&C1(~q0X(m2(`y4a*>G9_fk8#;hK{{^v@EX^uL^GiH@&avboeI?Q zE|pK0WcZ{w_9qNNabvNlY5n<7@47z;S4y5h*ZQxyMkQdULd}ZP%WG`bC|Fzmh;v5$ zMQmOJvJ)=ypLkIUF>tR+L=LjM!b5eLE^XCVJC%sFW^s#0o`pjF`p+1&0g+g>T#p=~ z7&j`17C8Qby5J3Spf1@P<}+3b44unH>5P_Zdw?L0Hi4XdpjgyA^mUw31BG3^`~N7# zm$+9!2%)qm>1%XIGU4|`d^+9|Rp;e?-TMOiH6RnKJBIp*yQlR=elLZWxL2*~^$0Xy zG?IKK)37!Q)v6&S*Yl2-P|tu2(CQyY$EqLO*ZaduQlDI_7StopQo1EWiwID&LMyGBA2gfsGvm=)r*CWTOgkUdwqIm~HmB?%vbm8PIHN_y1j_E=GrFQpGtL# z|2|d0ENqm4Wc|K_pPa5-HMBQ~-^*IXr8?$iqEhF&PH(ePDoUH&Ir9Uh0NeUCJfaeo zZEFH8*ymaWr2U#3&8)K2t?h)VLS~z;hCFDRvC6i&*aitcU!PZkmEJ#A(GTtOA8*96 zm-LeER{#4rwSZYw1`DNR+7ZqHV5n zXnvp=9U7Xlhsd0o5nGFB`8dhBu0IhE#_uEc4(tSkV!@OsoJm6Qa4>&RhAIY% z#i5@+h^9!$w2z!tk+^N`t5>dfrcpP?4566T#ZWP;waneM3rpyI3s^z}5`3vV16GE& zCwKJzydVvUb2W<2$WB`;03l2isVgKsgy7K?WCOizS7qClSBUQX#O>$xuH97$N_JVo z50~vSr^;v5q)q4QXt`#gRm(^%IYY%!xa~W^A3FG$c=Y-jF2R28ACoV^zA;iUtSMDO zGEJeWTPHs;{-d$!5pF2aJEJlI;6Tr+geWe*H)gLlSh^C*s|kxQnG1+d?8Z^oe^v!) z${R)EO+WfOR`EJ3_d{n%!{A!YtS^8}C+c)F34u(hDPEgQikh=3fbk_&+=fuNjgN^7 zW7r|U9=_Q7=^64Ar`NTlUN&%6(#;kth#w4Or5F*kOnmtenl~VmY#hAdkCgWHV&_Qn z>{*qN#N}S9Gd5$LHhI8h&csdb7A@Cv-a*teAQR8X-GVh9>W+%1OZdQVI*1X4y^#RL z<=NIS`a+oqhl;$>7;qS!0AZIJ_4v7{Y(OR+J#t8P(f2Mo51oV7BrsgE&GD-QAp^24 z(&;4|d|c_A2812P!! z@5)zhz3*Ho^~AM$96~%F&#UyL#a2l9yD42N)St0!;&Z!E&wxxks`(B)<`>rX_Dp*) zyt3ii^zx>;y)(?{r=~oUrA;r7-#PpP5yz;XopwuPwTwgGNZ)CtRxNisbTQVjsoQa< zz^BE}8?nrI0?TYbCdTR)Ue*(d3jFa_22LJ|b!)P^n9j0{!`Bdn^*vB5zL2+LeM^9r zEvf>3IsdAJsx7mBZj6&*L3?ToG4t3-VBsV;JN1BZ!VTPa@}fi{m0gnwU*)Ij=0L; z4)BSj7`Q|lijAcb0ZZ&N*x{-LABgBg@s{mMYpjf== zrau9r^0JBVc9tp`kvohHcCc7Ha+AT-d+0DUR2;ja zl3Ey;+qHSW1K_+Tn|HRSdht4h)MvDn=&lf0nSk*H&kYct054O5-yXm`vgZ6oTiLSX zq)&*k)VZL(xw1MZUahN~5^Psjxo^wHsgq}Qmw1D|vgKs6+N%U7(KeT{65i$T7uvwG zWF(rC2)^|t;2r=pNosNEl)^K9arXZTvU{PqvVG^tVa&vpBJ{0nuFP+JxJkI+fc66{Dq!M*^CThO8G}i`(puTJ?IaI~Klw-&T-YB=7Kg+g_6qK6 zB-|5#|A8Mx;=+@V_wvqAv?yNWtn5CUSD(Ncbc#oNH$D8qTa}BgIcH__jwslsfPDsF ztt23LGysMvmLg(odv%+5xwEok=Sk(IzVTFA_L8eoJGnvFDZbNP*>X~=pxn~sy_KtW z0iMW(;fUsq00NU>g8={pI4AMrU#;vqi{Vc=g-b|AuY9z3CwDn6#_so5w(bf6Zw;74 z64aywCiCs>(AmH}KjBv2nE3`78C z0rn{8ln3cs!O9Mxg1k~L-t=Y;|{_YSz8?9^s-|;IS5uf?ULA$tg zW#v?`C~vqD%g*Wy@tmVeR+`#CBf%BqN*z~K7UnjJM9r~>*Ia9-T~mRB(+^ZiAO#_v z1X(p1FilHoCGhA<%|fs`;=NAL&67X?zs+1Z{^PM3oSfE@HSDWx zm}L1JT*%g)UZPF0j%Hl%kLpEr3MP4=R2(|%22ck|6gnSHNuNF~SXKEn@8SYp4`~D{ zyW6g*)bZ8&U>+3=6wA0O_ul{9V(-jCMK`o>85PLqhj`moNYKGz-mc4)vQ8Z@rW2@O zpjdq7um5wf|JnQfgmeP&tTs`Dd@S-93bckUCPNl)Lfy*ou;4hz{4>nO{D4T*WL9Ly z0z$tkQRyIaoUFj(XomAab;;$>l93C4);!QV%@!8c;@9ur6T)6}v0m0Sk`fbuiy<1bsud^ptNeO~wvA3kgHn}1} zIo~n-z^3_M%s)Q-^!&r~N9Nx&U!9N4Yv#|JUzq#L+)w8ooBPDvd**JLE6n-kB=C>v z*%xPjF#Dz1k4n%Vv#D9fEHk@*c5LQ1Gf&NYcIE>!w-0}DW_kF5nQLZ@Glyq(PQN_; zv*~Y6_onZie$#YyIy$YJzF>O$)Js$UHTAWrm4BOh-_#qXgsITf6;tO=ZQcCW&ChOr zZ1X38kaElB!e-y*OE#aqd1mqtlm97!qfFj4dBbF8(mlyd9+;e*_}#?!CLW#m$i&+w zx)X^B+XOYSI57%fl<$mxe*8n@cZ_$&W8;=_Vtmi|@Yt`$zBTsgvHQmUVXQHB)tG+l z!m%Bre;fVT`J>+${p9G~!@rmDP-HZekw1?-GxC*@qa*Jgxp^c%;vKnokYg@4QkjH+8|b%y{d$n$vIemAON5Cb!8HZbb;9VRh<} zHyo;vK^Y3fWOAq*wzM`I>MYyobSC&?xf-JYWDHY1!V!8QAFixq_sNN_CS$zXr2Ij9 zE5(`9I)DBWIq%+NjFBB$$oR8~0`CiY)I?GqA0sHYC|!l5cxyec%MLFp#lZWBHOt)? z8R`@R=}SK>7aQC@$`_;SWnM^doh&P(p_mLSW<#Dxu>!?~+~6xO`d*fsX<&R6nln1O zRiW0<<W)p&BJoU?7xSF|O%WRE+1 zfp*;J;QVqSWxde$6N37wFyL0!h0~O$XVu$CA0rUQ)`PsxsMb zM8fHc)nqYd=a%J;>2Zr%(zrz` zktkbL{(w2hth`&UUWW{5LNHbJ4sX7>Y|DDyuaq|}Wr}UuN`$}D3X#df%B<_^ZX@7C zJg!tM!dAiz`3<>#UAkdqJ*H+cT?^QqF^^v<_Jm1I4XK&VVk6OE_bGF$^Q;&%goR;J z(QL~Sa%9iGLwT*Urly2?jx@WN1ky+hFDm6`Jwvv1*@nJCIs*}AOa{#`>6nm-v^I1B zBWPx#nb`TtwCm`uI#9PDn6TYsqWnegQ>vj%I#TEG)WR!WeXG4ptF?+icmCIk{Jf?sc&owXe5=tgSiL#>#9Fb%vE0%$Ewx6= zRzzC2QruC2-9;ZRGPYb`xj6e?rMS|fIHRSJNEum^tFXN!zf@E5)AVwv7!Uv;=Q76q z|Drse<|^z;#aOJmVg<69SyC*9CTcHJ0drBKv(RNYUHs1~_4vJM8cSUb))Q^5z;1m? zu7_{4LZIv_s&ql3V`VNlM}C}dMO9?8<1lx+@hV%*n7^QuhoU@fQO9-mL=tG2W&W^J zsYh?qz))m;hL|R5@H^zZdlRqq=dB%Y)DN~FHcPSwxf-r*tdbNLH&=kbqprqiIZNBb z)h%_R=BaBQ)2BP-+STo#jS$MZ6^p9jE^5@pt;#|Kp<0E=5VXVX@Rx$VjE|A) zS0@qV!c!#YO_l1#)CPQ{>OxUEkZ$_iYR)X@*PGaK zyG6B29+TI$9C4?pT`OnE?O_YP97S{^^-?BO&V*=fQLdl$0f9QHuR zcB+&vuIsAnI;Xk8oU5!K)@ovCZOvmTs|@zIF~4m@d0x}iQ?Y{1*K(Iws*%|C1EqY0 zEp~~3Ev+s^igezbJp1jkfGN9Ubhw@K$LqmTx0XLonMNiVHjsg?FYHf7m{2)xR~9-G z=bO=br-E3ziZQA_YgMVnX)V!YsnW>#Q`QK_8}3xfb=D-UHAKxTC8Gft{R!1O`!EJ3 zx|L&fDR(wN zmGUrx5_~SU>TQ)=lq-Lh3@l@!+?1=dQYp1F)J7Gf)6Rh8!70{QZ_g;r*%+4#u;tc44f^Mn!izbJR7ccnjK@M z6w_z&)C&7Hr94K4sX{mxc9-;4vUt&JmBs`uYC2o;k=>M8W7e|UeJNE_bTOD0CIF)Wv!Pj zWJzR7-`DT&im}7Bm&5v2$Ont)>~cXFILO#xvv~@HmuW&Br9xWr!k6Un>8LEtNF-;k z2K_cwjyY347#Q2#yn#|@2%WoCBj`$j-y^@aT@EzJSkuY0$+9u*V21ywlxO1vrS8O5 z5+<9+2(Iz-mlT1$V5A$WWr54^JmNLKa{00fqxl-!T%PlUi&iU?j-#0>%B96a>rFe`>bEt1e!lN6=hlF%4VBcd(}hGWm8F1HKl94 z4TVU#`olr-<40?I#2puW#3F8)ukI6XykK%(yzZ?ZpA}1QjomBu<33iGEBhB6s}kj# zd}orbM0kGL-wJ{0Ae?p}>Yxc%()+9U#NH?pU-*DWp@SW&N&X7Q>J9J{C@vS$QV(NG zwsUcVhi^DV&)x7>e5za7zNPU08GG*lIf`q0cxQ87tuo3WBq0!ZI!po~n4EJSOqiTQ zPo5zxN}w#QQY+`2^B@UhF!qC$jSbj1VjdVLFgC#nW5D07>5WmdaOi9KSU`@I%kKX;* zL$I?@-TN-UmIo}Iph$tt(g|oWCWW}#Dlp~XtE`}87Fm})25S#>Sr8IESKa-dPFx{~`Y@`lDm9aTP@g)vD&@(zS&wzRXulNdrcSH7$0?!5QYw z5Ip(esr3AJ$HPekdwgs~6NYuH+P?MjhVD$Sv~y4UYpq|l+|~3=)^hZnpMmui?GOYf ztJQg4sp1vl9IV9U$nrWoN>8KV;U8Q94}W+T{c-DznuB56%IcFFLgB%fCr2dgY7>!4 zQpKV*;`4(#z_*tHjB9bKe?)yA{f?`9MrGGxv{I!RYQ1)=E?-io4VEJjM}(`jM`1ew zK~&~LNrq?9yZ`6v4)~Y_Xt_#1)bdru7c}M|Mp?0fU6?aEWibRZvoAF~8JyjaGugF0 zaAJA2IS(~os~4?Jkm7rN-mpj!6-8kIuv(fqPeW;jXEBR_)ot+QPovUkhnk=?OsDW= zgLVSb6G<++WF_sqD6>bhbRo3px;%RR*(r>x7K#Zyy7GsGXhjjlrDLj?D-hbtxW*`_ z_(VQil5&~Ok<9>9T^@}|RzQQe=)I}(S_Tz~H-v(sF$d_NQdA+>nh(gM4!z%@frId? zpn~d>>G`^UGY*^;aNwK_(IU~2vEQyvO-gjKo@!XbN-*nc-)dY5D{H%|D{HPkQQw@t zF}+{({;v0x-t)aXdY|e|G~U^3gJ@(kd;5C++4H~cPxidrbE;=^&jQx(SwHHD^q6|? zZl`;0>FMnLr2CiM-|0Tmy{`MwZg01`o9Ld@-P|6c?>{v#X5c@af9!m<^J3@j&ZV7H zr?XRdRe8Aa&mC79$8?-&YU$Y0v7oxHc2CE2SXcXd`&*4~z{=XmVQXs7w;gI*(^hPA zx2a%FZDLy!>&w;;T7S|gZT(j3{??VPxz-0;rPs*}UufBhWQJ`m&K6M({#p2{Aym#afo&O>SfM7fZiD>SE#AfpzsGE;+GDxH?$ zKFZ}bl47@28?xfe4>FOMkkIQDs)WD{dar(qu5o|$9>?UID6Tzx6D8Ryemb1w=(aaa zs%AZub4oZ0948X6n4!a9^-0I*?d9TneV+8dGMOpoP8Rba-2{duniYmIvqMl2XEN?6 z-=}?@xx1KKP`2mH5vwjvxI~zCHq`geP%ZwrR*N}THbC0=v0y4I)0ji}TxRZ-%b5c* z+?*!)7G>1M567gv3{lR^mSNnKH%Ey)a-LT(mRU*2<-}4Irp8HiNG9bfCGIg@OaXFY zoKy0I9UvA5I|lqY%nU1+&6h!sS29rahJ<;&jtJgnVDMq_EJ`HPd3!Jed&gY-Rz|2T zm(^O?AcvDC@-j-!(USLZYuBrSHcTE)IU+HRS19pLV?J7QS&&Y|(gl6WniUDTJg?$a zraV~=yMz}?+JaFn6~_j!aX(^kGRa~VH%N_TEFcM|Fg}^BrH2$sf+&H2wZ+1*`S5Qr zA0@er$1Wokp&Z{LazV5+g3HVVa~VRR$FlmkBcCt|Z60`QGdOAZWWbHtIER9ufmSWq zRehiX;#@irFJrNsN#hYv7~e$RHlq5G3uB}jswK_k=6MRXu#fqq%B3xGwK5)a!&kD+ zAmQHJSwk1OOoYhn3CY7Ur!*g!{YfpIABy8)ezNEZrWBccki&c-<pu#4k@OSl>{=OU->C>yMnzQl9p>`5l^>D1K=Tn6$1F)q z%&cPO;s$$;R747Ffj&w(@b&F z&Mcnf;u4QE6H!_7rYy8^p2%0bDT&35`L&@OCE@A(6zA@aS~|zbB@Mc?+>)ijCL$*5 zsilJsE17Uu@*-)Lf>|a1A7h&aVBsnkE9&xYoQfzCDRwT*ZG3~dK9$|ZCOm^Z9FCN6a38@O7T&tXz)94|zl-~%O0REug%Vt&$bJ1KvLTE*tc+RR7 z7V=mZv$T|prc(IfJ7=NyoF0ybjZKh~;D;*9pAh>6LEu9+&6$AL7L>~Ei0Y|uoNspvWKFn>mr$RjY zfV?1qCHq>2ub9Sk8i7lj_C*OnV8)1Ax;;dZc}F%Z4L|@2PLNY;g%Ly8i&<2{l$4uy zS)C-#EQjVIf~*HC>k@I1AfJeN8<@qAT!e3mV8xWF=%bQJX*x9eXs!Okv7(G^b9u># z*;%sk=RC`_hOkR7!K7h*$gDSq@zCfYrZiz5+l6^Jx{|jbEW|*wYYvkhie&Y$5+YZM z>^{g4wA9|5AxB7ryJKZa829sv!RW+b?Ru42K@3FVDY7Kzm4sSvzlPxr39VwYTub`Q zgsHGEfJ{fZ) zFk7_jaVP}iPc!8Sgz%Ik@8xMc5Vuc9kRLLa2SiQ|VYVcdl9<-aF^0Ichv(+E-}O-~J88xoT+!a^AR2kEP473~mjG z+e|UNF1??~kb#&cCKP~c7{=(d=RA2KKj>CFyxe#>#g2#)%;lbhzX00e5bjoAj%#w^ z$+y%Z@>=7zSEJhAwLJGbz3J%MYYu(F(IlZ_gVZvQvdn}&k z;uYvZM-gyKN#BvHa?>2Jn zIKiy!(6SJI}8R)!S~7~UJGbw6H}N?h@8_XNy6-a7n9`!c$mwX%!qL3oMJw7IfXzO`FUg>V*Qz zt9S;3+wLIz2KdHcr_+jvkKVWq77OZ<=@+&fzl(l+Er^Mne0}=e^n>Z-B*w{Y%nkt5 z4pn1CRROvDg2hJ&c|N;}9kH97IDK#s0PB+JcP>$|Ecdy)nbBmKxHk1AQ^I-cQnyU( zM$e%NXLF=X98hB6ySs+Oj;kNZlb@vA@v^y`rVCC znX;iSs7%K3ND?RsG6Akurf`&9nQ{nWkEbI$QoX&yvta2JqCdeih7(LXswbFKLn!XS==CF+ z;s-km?SriT)}zfYHNJI6XU;aqJQ~rQN)3z{ zxHkiR)!^gM+YX__%yr51?juH3Wzyl4l{KQ62PGCl=ugCiIeSd4pywY+&HC?DIDM_S za1?RKxpiB-bm$mx)F-3!+KS5WkHI}n)(s&^VW!0iAlhdD&!SLH%7|Q$2mNN$Wgj^K zUA8WdzWICK`brt3^85){r=9|ful)cUKD=eEwWYk8t2LVhyM6u|sRfp8A^BP{Vlm zOiGWU`aO14h(He!9U%ZF2oXSNSqTJ_wo4&6y9#{UP>Jq2pBg###+T6VEPF~tA3y)K zXIEP)d{Bd_9f*y7YDa`u(=9)$|iCs{NLo#jBO$ zv_q)pIE1nV?HebGyj&JR98y!1-hU|tBIh^CrRQ&1I*SQ+c>CqAt(%3HQ%IP;aLs=_ zW>WhkL@FxOvSUFTpHFk2g&l?Asr1d?7tg%vJN_K16uTDG;UVZ}9Q^wuF?3WLBE~CA z^vdU;csI<2clh}KQ-l3#HMDMgKGiz%Avo6Ca#OdeX>Ml%oTC28dZ+@eSq2@(H8kzo zOUW3_Kv=%0T~`Rp?9z-tK+pRgbl&=8n&sa)uX5&lDNr_X4uR-k&DkaFkBY%ZpHTY< zvpkqG`Dyoy(2DDl>3%7<_D=iRiz!ey0sX+*OL2IYxz?TN7jE30(2H?m<fsVLm*GU`*OEHdqaot0Whiu%?g01;5+-^alOBypX8U;TBJ-5<>X0gPvU zk^Sub^~Kvm;w-wJI%P3`GVB-t`6rZIZsr4j^# zO<)Y}kA4cX*t$F#J=5GMow0ti_SQJD31m^N11>a)MBR>6%fK~qSK5p|jK ztFNtx#lNbK90S)zj{1gQ>lB(dZ_p_!tSPq}VP|Zp=@EMJTi|H2QRVfo+ygm9?&R+eq*UxBcpD{?;^Oo>-~!0h~2OY z!M9m~95W_XUjHk?G!7y8P3GHAoh@fg7~hhRa@;bnB>=9EXae*8r{Gasp9lTMJ+Gqv z7kYgwhLE&qusZP*B(1I_nF4KXjW%eNrD~HPKMVtXb$PVVe&wor#Fy}KF=e5B=w>t^ zRe|dIDbt6?PvQx#dvDcUQ|-&l`*+Pt@cylRT~H0}7hC_>GPX(7E9+d{9c59dX*sJi zR;13!RA{b#(~9YcQ`@NizPdb`^{@3a=w07CH=*)G8wHhU7@7k(Od~6&?KltPV;0z= z&?e%_T0>E`P@_iF=h4_~N9};bkroQYQyKb7lhYgzc>{P}eQH}lTQGA=3OCc}i%nF2@9->o{*>=B zr!D9cgs-*oizak$rlHwzZ;W^#7gVPdSVAdQO0Ae6X0JY6_{JTcOy9it$n79Z0>>a= zB)tosC=&?T zWnCUPbl(s3===l-Ka8e(U!MUoE`8L;H0#xcW9f0bo{&y$SY+M>=Q3(qRCVQt+j{e+ zueq(-2gFMgDgE@suI~1GpL+PFJ7K${# zOX#;! zYg$}o&F2(2YhIX2siwnZr}e9XS|O&pvEVFwA>g|TJUG3usb@nk{n4~$5;YPEd!sAh zI8pxpX;#6Eph5-UHPfB-YF%uV5-KT@4d zz)*1;^r*T#7)oEP^{A>Uhk7;z9*JClVqUyfwYwC+T{1kcHW@+*1A$(=qv-T>fU3)* zS@S^m35h@+rpfJXOjhh8;-}*dye!B72s*rc3 zFpHA1CL)#8nv_&%mslLyhe749}zA`3;DUu$Mn@Q{_){C>d)4 z0dHOg#pp^n%6Jh=;#^ROl1Ld4@eC--e`VeL-tJkIRWm3j8U%1C2=nr`)W?2gFdn`O zFzWN@cVciq)surS+(m)v(L&7-28Cg&*=}?j3L2};=7{oqWr#;I$bxoUmr7$J?|~tC z?K9))53zMh`qV#Pyq!*Y&iBy|`=UGPw||ssre`-%lWHUD-iG!M+9vjLTU1Sj?#Ebr zJ6}Lc%FAJ7H4NPc_rQ#ZL2giF!Gk=Twv@Jb-I*{m8!vKTWUb4iPiy{BQ?B?a2bu{S zfV=nFLviutK@~3J#8O;vhTTJXAjTm9;4qUdg`BGilI2WUQ__nR7SJH7Hv8>2!;`Jgqjyib z_rA)1ZbnlC-q8Jk!F(&*g$1^afMB8u(j#{mjYPF(r*SzPf_MEQaou&a` zl~V8}ZW;ouzS=A%6A5S|m_CbJ0{)C6Wyk4HM1WJ5OtXF(hq>A5Bh7Rwm>FFOh~X6h zPf&R631-u}Vu%d5V81nz)a60)pj|-C98sT4&(A1l(jR^hhuNY4y|3IuNc68JlA+MK zRJhq1bqjMmtHMLjdt`u7u1kigaz<6TMNU~*{TbMX_F(EFTOty0NYa4QPb=Uj^~to5 z^G{8sLrHk zh&F5BC-uqnY1b}Q<;UP8z#8GOdyKq^ z-^ARFpX9nK%Y+n&nAnHZu#zmpm>4Z@`0*mar-;=0Qi z4d9U;R2S(Y=2Kw;2u~J)$iQWpy9zdmu@pXBi z_0&G2q6?$eZyy3VzS{R$$g48R2(Borj9_tae8W(sjH927QN4Y2dGzz0PuySmbqvks z9YdhRS6ioZSuLI%<_jr9T%KFuQ~8(&>_|W<>hd5U3!KpgANYy%(5S(Q^f%rcxV7?+ z1l7kH)!=AoaKLidO`QuGPqqIEwhLO&%j14nx!MKWbG4PLx&~8gOw-r`HivWlCuQAr z)rM7hd)fq0VYz6bbP)1&S3j&c&#vx4)U_F=Y0=9KQ2x5Cnuf94M8QJX$X%mhZiqsM zj&oX+C9OnRRr3G|U0iFiMO+eFglS>-Td6)!=(xcp^x$m~sOxx0?KWyp zf8E1i9@H2Ji9n4QQJ+`&I6wY0i{9;^P;^okY!L*@+OiB{ek*a9QG>9*s9H3nDSM+_ zQ0w~j|Ea5bbs-EiWy?0$G_k^+o8k~F0BXSrvtlKI+Q2vnIz>SMgBxB#&o?ZFukRJG z%X{YoUwi9MJy4y<_g$OF*EOiCjZOQ_uW4+xos%gKQFbURXx_pHluHsUKvfh#0GJJG z#)WEoodF;FBInb$Rse59r$Bz?3tr*2R@hEf;~Tbup1B#P1;%v9gDqv!{p zfQeCk9_`-n&3TpQoNxw%w#J(PFJnOtAK2H7X4cP9%xhGqC~&Aiu#=X=!?{C;6Xu6 zLVLgu!-HgI+!{Tp@WA;se?o87=KPlGn`0FH+%kBO^?CH*-i&~L+x)++m1)b-R9QRp z&{seSF&@EmYL`pM%X94>FHh%pG7AN$+4Bv)6iKaBH2f#L3vAM35hA9E@u+loK;x}b&7gi zVIj1Lx;z^D!_S#7LV7M|vxdHZ?L)KaHJ7`3>4$%_16?yJ#YFm+k<$NW1X z{w5L^9sMX2huNfJ+RR>f7B+5>-J z12wXDcn(Bs8Uy;SIIMtN-avi9p#6FyeAVcN0#Fl7`CJ)OQDbGR%#>d4a>Z(`_;wn) z#qcbey8F}GQJ3ZP)xw?F1aPV$Kfp0@#yn}EIS2msDW6Oa-XA`uVn5piaKp1`YuDO6b`EkGDP#lx|-JPdxv+=IZ(m{lbo`u)p1j z-Y&)=H{deg&qSCPPmpO5R|Y~2l)F$X=;{@4=XH6YO^c3%p#WhCC+Yik!$(zpGCjC|&3*KrA6qoB^26N}hQ2zH ztRi#Ypv0~B;#o}K@e6Pv&q*-#`S1x?$f(bwjRg}tp{w7p2fuxSf+#fAxAjSC(&UA@ zq42e4E^^4rIzrFp1Y}lzJS1meFAqX>)@9MVn?Ao4X{S!4C#}8OFz2mP9|2ZFWmbWx`>!=+Cu6P-!A8SVej2{hI#-N@`WYP)#K>p zu;^}=k|53(Lh+-ZE2m+x^$aW>-}n;x1&wPgqtJI7=1!*;QoAO?N|2*W&!WI_#a<$HEfrzQqhvi*RIKLtH4)G{o{@z4v2tL*FtJL*B|){ zZkl(Aa*T_^ra&2$%mh0QzBq*O2YyS+WQ<-DtvR1AQD-0+M(ES z6P%N9vLRp?h5%t-YL+iF3-C(!uXa>7! z`(t1?Y|nxn+#UnFdb9zefF0OA7wlu(NwCH3bHL`e-wHOp zeG=H%c7z|=j_^I(5&k3F5dK5k5dH%L+Yo_m8zL}oLj=Zch(Ns!5h%AI0?9T+Al`-u z?%jq6c-s&GXB#5;#$Ig2t^t(DKDrAZYn~D-g8&YwKvR|Jd3M_T#NU(DIipK+y8R79ePO ze+v+_ytf4iTHf6P1TFu&1qfQ++yVqGKi>lQEw66@{FYa?0DjBR7KHzuEeQYHTP6*_ zU(anp1kY?i1Q)g-f^(Y@!O6{t;MitFaAY$g*uNPO?AeS6c5OxkTQ?(uO`8z`y%`Z~ z*o+9)ZAJuxnfcV7c^zUJVo^IIE%p!v;>K+ycg1|Vqu@dhAher*E~G{3q55&UoiBKW}uL@=}g z5xlqo5qx_CBKXz@MDXkeL~wosA~>@F;h)-o@Q-dl`1>{>{2l8N{ zB3Qc~5v*B{2$ru$1WVT=f~VIbf`#i5!ISF|!Q<-@L4G|V$gM{N$@PdJz8(=o*CB%N zI)v|Ahw$C&5dI_U5WZs_!Z)lNKm^)#h(Ns#5h&Lo0@*r5aQ`|)FmD|q5UfK4oOOuc zu62mu&b5f(jx)u>kT#E?CuSNJ{*CPDBwFtjwEyC|wi}0J*&Vcsc z%vuWsP5)U71Wli=1%jr3tObImzYPLG(<4FW;a9|nP-={JKw z(Dc?I5H!6x2n0>P8U%u-pAG^+)9ZsXz`i<&@Lw53_}?Ey_*VuI{!42fhxXs};u=Ko z>>5OHc?}|{tU&~4*C2x9YY@SqHHcvE8bq*d4I-e|AcFO45W%W7h+xGUMDWxaMDXMq zL{MJ+IM~c;giozT_{r4>Ke8I(hgJjrK$Cklbh9ScYUsyJmetUYn@p>rA2+F2&jG7g z4gI)Dwi^0z)BUTVA2-cg-3^w%8v1b)cNO&GCUR94?47G(U}vv_Zrn6$6?EgKX{(?c zH%(cE@JFpe_}!}ze&;HL-@Xdr-`lhb2pYd!1q6+suL6R`Pgem!<6l<+LE{H2fuQjZ zD}kW#H!Fdl@$HpB(DbZJh2=RJhmJWl<8C7r^XE=mLt5_a)cLIj_^Xu5uR^3!h2*n z!h2{r!u#fOgy&q2;2g^koMjn;(=S7C+GRels%75O)L zFGKiuEkpQo29_a$+m<1MnadEtt;-O>^reVk>QY27VJRZGX(=KYw-gcdFGU1>OA$fO zQbf?b6cKbTMFh=D5kccpAYlDxDd4ldSPJ;8e=Y@l*58%_KI@YufY17H$!s8C{c#Bp zu>P> zi^X8si|+w@*J1+foW*y5ow;~A*jpD*1Uq%{D6kU-7I(p4V-`1o?OXIH*q%ihuw9Fy zVA~gY!8R{?0BqADGg#IlHRvdOz6b~!{ zU$Ow7ZCd#Vxa&rX)X{y+b| z^IIqHhU+UQaj<7k-VXM}$y;D(=sb3E0@(d0M}pmR5)te?i3m2GKm_y&RKRs7B4C%F zKm}ZS!UcBm2~@x*PpH5?b^;36Sv-LVQYR2W_yi*Gowx<;11Au^?F7O%oIv>M69`{+ zybMD_r{p*yxbHY35FAGYyyJ)fKaL34#}UEp#}UDdv;16_sb_@tQK0O8m9e+Ot1RWnA z1A>kZjsZc(`^SKw;Sign#BJ!asf#;U77Q@CSAuMFd-qB7%)a5y9Y5M6moQB3OI` z5j=SW8em7^2sFTs>=9^y9mylm06U^bpaFJ-jz9zK@Em~#*kM0%4_NCFXn!55Bhdaj z#7Ch0b<8~i?XTmWBcs3yj&y>a^c_Y79fuJ?>tRIDa2N>MzdQ^C?Vle8g7$wO27>m#9RmFJPYwZo`$vZW zzx};KfZzUyLxA7@yF&v&(EipTAZUN{5D>Kg@(>WT|LhPDwEy@J5VZgB5D>I~{}3X0 z=@26L&LKqb+#y78=^!FFcMuVrIfw{O9z+Bu4kCi12NC|hg9v}mL4?2iAj02z5aDk= zcn7rqcKRS9Sbq=^tT~7XRvttI%MT)g#Rm|BIw?S2wL|cg64fd(DubXAZYu19}u+ta~}}2{dFG@w0*n} z2--f{2Lx^J?*oFi-|q#2w%_grg0^?}0zun5dx4dtjhyJF*7`s zV4!N-w+9BQwmo}bplaK;2L`IPEqh>~YTL9&0(RY=xnKwPkYLyBnFDs&o?F2#*@N(( z+Jo>H??Lzr2KFF=f!&DU(cOrkyc-ducO!z-ZbXpSjR=Cf5rKa_PzwQKr)=zc< ze(Q%j0l)RVoq*r^`<;N_`tDA^Z~gU75?%VMopZqcVkZ!^{%j`@wElD_5VZbeXE)d% z?F53>mv$h6@9sbZFYZ9U`qmCa@azsmaA^l3IKM*!_RJ1MaB2r4IJ|=ddvFKBKd|Fg zn%XHWLXYcv>sgqg_x*j!WTf_?q^%TZoT|C*fp1PU{_v-FMz(MF9*ObzWfl_Coh9G zR^Q{7bzmR6EQ21`m$*C+{u8^*1?#_j7g*=znP5$qr+}4T9t(Evwl&IcHog`5P|&} zM4){J5h$KP1ou6I2)NH6g1eqU1T&sN1e2dZ1f!op1ijB7g6?M!LCZ5h(DV5-K+yBI z3J~;sQUQXVKUV<1=iLh6_qH@--UO@Qb3kd(-3j>INcL5QwFCc<%TtEb~FCc>H=Mllg^N3)~c|_26 z9uYL32ZHV|&jUgC-_8R;_b2Cpp!<*KfuQ@%^FYx3#(5yg&;nR7z0v2y~jzH=B@ z?>Ueh>vo>I8La)>O<;}Z`oYT2b%2$fV}YG_wgeVCi|}thi|}tgi|{9$Mfl^-8lnAn z_n$=sy=M_Y+gTv!`tmFgbbWpn2)aHy3j|%Co&|!gznukwu8+?GLDyf-0zuaYXMmvV zy)!`2_1iN*(Dn8iAn1DY3=nkv?2HlYYi9tz>-%Q_zia3W!hhim!mpeG{DH31XAr^B zGl<~88AP!A3?kTa1`%vHjR@A9Mg+@GBZ8++BZBg2L{L192r{P;LF_al@SH{jj?;)h zdm0G3h z+PeBr!KAIL`xH#tx;jt6q^+y{6inK>8cxBSt@H1vV9wV0;i-}ECTeJBaiFJk3)&ZS zKHPeu`BzP?EDqYfnhYl*v_mLx46`w;Gh5XeTxqnXv4legH#}Sgn6R+xlXAUR@@Qe8TL> z6kL2ZoX|#lBLDM8*jB91qv!9qttucpp>o@M=%|QuCAxv@!MNEYW!z!89 z;-{N_2itme$>7W&g*|r^xw-f|bi&X!l)dKJDNQ@20wp1r2|%q_5)#lWzof=Z<`X>p zI$x#X7t!;d1Hsvt z!8X`+DnrQdpM6sG&bU!-W$@+2;6SnKZ&d$ymmNY$MWS%bN(o`Eln{2@2>%wA>7l>D z?{Az-vwnQ;>MqE}e}Kmc=(J-HLaGGLG&qDt=Vd^VRdY;iVT| zeC6ua%<506&T-&jqO&9Cl_05=OJUax{$17*2yW)+8)ZTtXu0Z9^Y~{_A{Qvf>mpJP zM390o^03JR+i>7rTBi4ZhHmSIx%4}~3}KAJ=k5Rg+5>M3|4o5A{I03j+~J2eIB1pJ z Tc!&9rx5c#eAjx|;rSH-nGq-K3x-U}~;xb%~=XF2|_ zgKeMv2hQ?lVG!x%b`G|Gt9lwl%Bs9}f9Hef6?LWI+AAuJIYLTrL>)*OA_WN?1)SfV zp4l@jm44^S(3N#V;Nn_)#pT#>hZxUh6D3UP$#F7K1TcpFZf6=?_=e}v ztW_rFI9p|ES6YhPGm+pk^Qy$M=1>$*k(LrC5ld%n^poA`vGkO-^oYK?EZB4gvF2)M z-pAU~;3g`?<#HdUm+DJ#p#Y>fgG>=VYKJ1!<5t#EL!?5>|@vG!J&(mTdNVk_PvV^7s-aoP!PsZK;y7MBmlp^M2TfQ3FT#A zLcQt!-r-qv|I+V39aSS}^}_9p=+5>kK=}D5Z4Ds&{J>S==P3&{SK6VJjHEawiNy&# zn6pYkQZ_$p#ORO5ry=Y$#^M1d15uOI_{yJ0rBR^fD@X;JsW}cCVx^Fd zV2YOl2^zDMK#(*0>XMdI zacK}GsLP|>a&W`Bb`GX8I1bv!WWyD3I;T=e(7fr9cz2f0pz^8p`dfGr|tGHn!%hlXEr*(A8=gr}k-?sdK^?J*>mhG%PEsI;? zE%uiCTW)J?Y#Gt~Y2T|z2D+`W`E=iszEq#1@BUhlwRd{2wEn3UW-Zoh>7CoOw)fWF z?w-H*{JQ6RJtulL_B_!OV7=d?>*4lH>1pf!sQc&L&vzg0UfVqIGAKd&x;5Qo_vG%D zwh3K-?s}u^TV4CRR(9pO9&A!~NxSas8pCq2mUVv7`Mb_nIxlqY?0mWwaBX&Hf5*Q% z-f1c~zuhs^ak^u3$NY|Php|J@aZ5*M`(NANZ2xZi@%9Z(MAO8kmc~Cf{&>~zEI+6VV>X|RE3gqv zdO4=l5d&mY%e5vml946UXv)1EheM_zJ-xZm8a|+6~U%3WzpdrP+Of* z3nObPj|i1PEUB|@RLA9J z!ctJ61ZhWknNui{LI{Oah!tQAHMyDOQZ^DT=Sx&VWYZ=Re&ty}L7`|$F@2WQ#@O0i z4C5%IUNM`2FNMoevXF^Tq($fQv%~i>3fJ;d7*m0&o>|V*2VFenoGmr@kjQ9Ng=J=G z%Bs1K>T-yu1zqcTQ<=hK$|^Hgo|igB zY?sf5nQHN!$`mEQLpH8}PekIPOw>3aVQ}&uPL5OuwZfp^@5e1s1CL2h=nP82hXh;goEs5dLh%ShMWU#>(5ip{=3QQCQ zT}U66EJegxsfKL12QdtY6&Sx@BMkaz3NIB)hP>yBYUe}oq(B>f(}+d7)5h;l&|l8bc^`Z;713ps6m z=DtGejFdFa;~Abyn&ArMZo6hRgHJ(IC2~HEQzmf4+4(Tpy$JQTCrc{&RxXQ1Q>dx*7$xjYmS@kw8j%$iI| zb4DsqJX}k+@)NjJZ4Wxx0cB3)9ha=78}c&DpDQLyW=~$>F#D!HR?FbqQCx+TEHC%? zOp*Y8)75mg9rN4LMrn#jOTvVFK2!T4PBCK*StN>BHlc#%-prusi#Tv)g(m5F%Hz^^|3k0{*;h|tF zQ(y(bNr&xtK1q5EL4g~5>Hc-DeMxR=iWDKFeG1u%e~w{H0+Y*ZL#V0 zS~}sj;BhQX2-)07ILM!Kq6R~N8zkGHH)}XNS4toq_z!bE?lYKhyHGAvazOLe78NpT z;0oNT@)LF}E#T&ou^fRJzhArF%2R{9fZh_42gyj#JBoR33Y;v;2$N4BP>YHtFUKcT zFuXYFPpRyjs8o~jMGS;q#w23{;G#o_;`U_LA|*{u;|2yEOZf^!Rud@jCBd977ZLxt znl3LXZF(YzNz5rC;ODD7V|uDM@{-gD155@2l;x!oLE%p3uH?lu3GUoN4#^G~(%O`u zcR6!;QP1I|#6hiGF(8gO0$3-b^)4?8GeL3O=M$$5Wuef^p2x5j(vC8bkC_W*i6B_C z`tDuDz!aQbb--DmoH@M&mj^k2s$Fi2hX}og!wt&VVYiUz2-MQ`xCUdVajNKwseNT) zMr2&m00zTLL8B7mCayT0_wmYFsi3zu+7%#tC8i||Zb4Efkmn-G(KR4`GEZhGRZx_b z##BuV%$2ilG9BYaq5+jwFPwWfQ<_{LFZ7jg zT_EO?l}tGKD1(x7>Tx2^S33-1ds)c$-g`f!qtQJl@H%mJ*q@FnakF1XG}T7V98YHl z4P01{Amt9d)vsg}eC1i4RYc%6RZz>8Sfc9iEJn9ko)wr~n89j*H)-0batZE(=ZhY1 zrX0wTDmlLlO3ikqB_@ZNST#M$Q4L^W+-*>32pi$!_b;hs__!%76pzRK0YA=Hc{^&) zH)A#U@C?TmHVc#>5JR>su3c|V_%H}R38Q8x;&$?Hy-J|6a|x3|6BNtDa(2|+(O0`3 z9ELEjrpOTo2MQXGm3LpNmLbi_ahqPLm-_gQNI5i}(FvEQ)j2axS~)HmMPUUQcf=B= zrqd#WQc^M#25(+%6%(UtLuXp(w&8}LFd-)?uQkhQ{w4#T=JJIki1_M~0#00xg~pB@ zJ5ZgDr8&@~wALsO_lc|y{N|f$@N9)c2_X&hYL8b$@ml6pLkP$zN=6YWmy8?D=f%Rj zpq;sz(u**{sZEnv12=&eMoeKyDNv!oN!%O}g~_b4#8cMpl~Sl&7;m7EG@6BC8@Te^ z{_7f!w3x|Te1)V+Dh4I>hRwBPwx5&~1tGp$7YxVvGZ;y9c`B<-*`kMB zTKj>V^r1*Hk}b%Tsi2Y~ z?ibELOWFeDU$0)(RIuQlbE(VM`vIK-w1WO;=`Xv!&uHYSOY1Uo1<`yr-$0u!*t zGx*VxC75!#%|f5WXEp>{KV&YC`pro~o(dv^^|x-Ur4Kl)c@m`7<7IU+WU_kt zYGX*$X4DZ0kuINfTeu-5m$+Q}fxu-U*f8yk1*LIb+$YG^(s9a1@N5}>)~QRn%p`9v zlO9P#c|;t7di@T$Bg$a?_%^_*%c8M^n%iiQiyl|u%!VbB z3B3SP^MliwqIRV&%vRuREh(sh+%W?{*u%5Hc?koxj}Ox0D=TK8r8nahqz=uj=b1%r zzaC>NycW0Grp36laC&+)eE?SW`|7g5lXL703bAVRLnnZ4^EKX1JreJet~k z>unpOmGPB#Z$>v{xPs)y85n6cnJ^M*2yt8VqzQI`DGdG47=WqE1D){aVI2zv#(RDY zEYOW(HZA_$fE>4)FLWB)qYeLVUEN5tK6Xr_!O!r!Qx-a}jJ>we1MdTc9?$sjEJqlZ z3i2U(kPpj(1cq@1*DC5|UKs_gjFC36DU%QfFOW2riIR(r`KlWflla$r zm5Ya81F{UGtA1t^D|${^&6)__Mm1Rll~k5@62*|(K}B6kHYi@ejm{iVpG@~3F5XvZ z6{KyfesHek=81wBHyS;bSk~{Q<9EYP>XT_>i(gy$=5n#kX{dbbuC#(hx14%%MC0Zb zTG-!l6KWjOk%!idYaUv4553kn=wFNALDuC}8$@lZ>#QUVa?<8qAdy#7gR6V$OpBOt z!^Tjl*`ig@BX#}Yb*uwN6l^#dmD^2%~)!p!t4f7wb z2_qbproT=TqFI*S(;tz?(qf|E(iSxydCa5_GVS&UGPvEkJo=r8rz(&NJ99e~Y5RC^ zpDO6UFUe`QMf4J3QTzWf_8stXRaf2`b;+{iCd)-O1}xbWnR#WJsiSF{-fIXjy-PFm zW;6wYa2!Gc1aMfm3CR+BNg;#~yzKHqSwcybSb|BWKWhqeQf;#8b=uJ90CcgVGZV1~p7@-V5KHYiW?SXe| zgU^*L;hq-u)YG&ypYVy_T=Bx<-UcFSl5P6yxAWii3WuR>aeU=qu1U=WmE2@a%Z)LY zLeZSYD6#nA{#gw|FNe;FJ1-1w=kN22NOrCu$;Rj`Gm}v@!Uig#)MQ1b*b@Yj)gW?8 z4)6bRMaQlDLQrs~=of{O(_)ncO)zbB(GgmnRlC$hHcN?g`TXUeX&a23de|+@XpA3x zcgZN(sP-E?4rq^FU)C?R>Y^DEy8?o&eVCju1+Wx%mMLqxD~1|AqC0TvoVr`@&U2#vy8G`;cVa%j-_8dt}|Q zbst<;To+oWS$E#L&4Yg#{K??b;6sBS8$3Li8}tlbG`M$gXyEmM{~q|tz~=|<7 ze84s!AJ{$6+y83+cl*E8|C#<<`>Xv|_8a=8{oDH`eJ}T&=zFy9p1zy=%6*sj>H4Pn zMtlF-`_tb4?0vZR?%ww=^v?GBdoS%hr*~7&pL>4Nv()oY&&PV+*OTk<^jy@lw`ZvP z_3r=f{z~`fyYKA2wmZ>n>y~$)(cRbeTGtP{p6dE+*O9JzSGddAMRjfOl61b@`9kMo zo%eL!)X8gE?b1vz8f|$=(`w$|*W*O`8)Dm0ecM zT>L<5+?p@b@mQ@UjoTaL6lFiy8nx?a=0VWNTrtO7BB2v&ZsT2adWBRP0aeJ z+3eK2#22#uSskUEXZ>MYE?Q9}w~LL3xUAn}_3De&`Po`BCTDuY=H6V^Yhp{3g3Vhp zQDsHe>uX{0s*8-xO>10+fLw20h@B^1a=5Ig081;4)-Ae9U7K~eTF<*HMLO?KtE;|* zL*YuhM7ukewM-iss#2J@mkqOJcUmjnLAb2Z=%;6^npmpN+1#e=7Pf^)=|z)n&3wS= zax#^9mGS!K-Dd%PH+4m-TFNI4_GrZwzF71eaG7)?$Lf4DdfLoovv&DLO2pG%*=_IB z%j2pB?WgULY%r{~s&eE0CVnpCu+~lPLeN!A+7fE^Lh*{mrRS_1t;JQ^Sxr*P=|b{A zL&TGg%T=r{U1b6?6BnYxqoPflOM6u{8r5&&Xwz8;ndQ!K>v@;YjOOsxavV+W6Y1zi z(U!`k?eQ|@qja{UwmMfSMXh7veA1LHp)dKgGH;Pdv#|x;XGA=yvbjb{E#-i{q2$5^ zde2j>@r;?Kxq5iUS1!7|<)r5E*0`l)VggRRq7+f&*mP7O7xAaedJme+YvvSl{aXX{8KptSjXu z!%RS`Fl=s(%km*wjg~yx^g>}qp7PI9>X=Dv@Wdsor3h2iRXv^R=EUK6i8fGby$q}+v#2y%4~V}SkJX)& zJfEFO=Y6vM?_KTCZU}s+M4gWh?WPjAniLNGxPA(>op&e>Rp< zYUsqArJ^-3k-A<^54FZaS}CP+<%`pDQ znpHE?4Rf^Um@fnjxeLUWUR>0hGP$!RZPj4T!+tn=mxw<)Q;ATrWMrCB#S9@?c8}=I z<)YJ^mw|5~?lxJ%iezrGMV?5xf=*%!MR_@to133QFRibOh$0y+`de`JhQ3yjSEf@+ z(Y?S$LOD6@Qo++1g1O9;9pOc?MXZSsCF82|{<6m+jSY$Rb1pK?O6kH(!Y#F>ZRLV; z>oOWy8eY;_&x}r1o6RnGsS5_g--Y!&!-i#Ug{%=P85HS**SE$~$vN8Vmn+;pyKRmO zUnXmfhbsX}Y4-%uzO+*lS6q5zc|09u)%H}(t#O<4iZuJWIM1+Cotm4UF`A3%P$0^j zeN1>9^beaoGFl%sOXCq^DoUq!w{};U&DI#bsx0#=jdUWPzO1!-L$!pIa?0m?N)t*? z>J^uI#NQ3Y*eYY4$ z6;g++@68rKS!*yZLp7PKNF&jDSSK0<;e>ECnCZE?nl|O#F<-7zv~_Yp&Z4FqGjWR& z-F1DD=-Hy_o(qPBmagfLKU7v`f)%CpWBhyC+GYh2@W z`*W3=)~LMTMG=dC4xR*g&@nx4PRwO8s__|N9Q5~RRAI(oa9B)iBxf!tFTSt!LNbCS zNHBV-*9(7+{0z~U%K2gDWYFffQ0F*(1I=w)iiST>n4!30%@nLjqm&_T6npq_epifP zERx&wuz{-LPF1PI5pNcPdGhQDpbLwaP(wH}u&YTlzji-WH)~(j26ed+so=T29 zxje3-C`(e!n$dMI=Fe(c>*!6+QH%+#tTWR|{hTvBd84>6-blpg)X3_AlwYmQXZH#F z9j+YC8@Ah-_-tCsd9t~fGa|pSh2LWbfA&+NE0c56_9P`sXPpkzC!&1e%YG})$5qz{X}#U3Dzc7x zmPOx4kq)kMq{3zcGs%qClh&y(5nXSbE2oaZA*N7NvWZz~P4Nkj2JM&J3)#8Y&vvK3Ui};;U1IzfbI#*)0Q1!6uJ6g|&&@!!3mU{gr zuHj^;bHrE;&gnDx>gl|$;?>;GmHN6GwB_lZH*gXg^N}^aI&F?v^sw9Zo#^`xnJ_Zj$vK@ zcY6OeG~aXn;AaqW$)CD+V+rOs+v0v)pv8b$kJ>1$(6&-R)re`(&ow33f;N+x3T(>l zFmmX*zP;qC8;U#m&sIukFkxL3I<$z@%*<{sh5(gf$WxjRP-fJnZ6f+o12^$DShFrI zLG`+w{GO`?JoZJH^ICRtU)eQZXA4?~B_~U!eA%X5b~Cy48dy5oVC2YVsuc2pF`000>uNXK(ynm6Fn3&^*gta$hk&o4-g7%T115QgrdgLRcjJu#O53M z*^G#=%9S>4Xory_&&*y*zRxWq`%@Xn6pLp9nOKHA6`a-;8AYUFL9kYk3O6ljo5^oN zSpIexDPI5TezM`QD@X5~KI0(S^G{dp6s;lezPz+tt@2RE;79wv-21y>`B1v&tS*P- z5P#-Xv5aKgyeI`t#VFspKUCDHeTFKmz^V9jn(#M*rmIKEam8n0yMN~A+sS!1mHr}> zKARvjH<$Ln9EGMLE$(f&^N}nYnbFkQSxX_I5Ug5T$wzO7(WMPUoVN@8(}d%7-z%)uTk+Q$v`qf!oRd;;;}sUa4i0 zHA-cgb%l+kQc@QohU;NXY9DSZlgB@Dy%4YLTs#+_B)XdvG1iixVRD>$4xb}*aJ}&c!6;@~6nedg^fgCkoalWVFqcv_&vb)Ph#V5W7K_>rBggk$ zv+vHQuiC`_$F%~U!^XuaP(tk78j@DiHQk(3DvQP&X+}owIaHb$UOh@AH*CX9go>hL z?_K6IOF z?dU$$b%w-><``F^#`wLxPw{7NctI{$B;V@Ppv}+L=e>1LRS})9Sn3qH=HtM;dXzjR z8N?jXSXS^9ZY8gMywof}iA{TVY0pmEBE7Qsicn6M_V_Bvvc~9^D~aXq(!SxglgFhNGv#mC6I zK3HlNvYa4|8?jBJi$d>@_cWa*Y$;iYGagk`X-WI)dP|mEd^@q5at4GPk?9S8rie60wX0k2{?LEY{qH+^c%d&oVC0C3qiUku(e)tiPqivWRdi7yd>FSZvY3pBre;-G#}l9wq8KW>CxeV}%`PPFlKD za_7-fq1hb{ZFSJBE|o>wNE(INShVkvlE410w2d4+T3SCQw1`{d5&qcsB_EQIGwv(( zpUJG$;)CDBO2dDW$)YK3k_}~$%z!^0y?k6iZY(!e&m z9|gWM`b^N{mBIm2w;6>(BPDkV_$@RkiNIHY0FxV@V9=SLZLxSW+Q4KW+`+cm4#3SFJy4S^#qDTof1*J z>%Nju197cKgtV#CCeug8?=KCGHL_@2mrB{R!J17Qt=UB~Nm*9FIyt%~kR1E!*}jK27cY{K zH@;9B+$8Jh{k+isV$gvU&OV8({{}IMlPHgu)^D_{4RnQynAB_qSBNl`7QTKPnFVa5 z4MvXNgBq&K?v62j@wkw(G3$ymCAwjpw-nqNl{uUe5R8(GAA%y&4r^*?%@%S0{E%=e z*(=sug3?5BrLjz_ee<#AyL+Vg=XAe$`(rqz5XeyY1DcW*{#`hre2YT&6Vc&~%jtZG zai$ybY*-(2M$^p&AXguOhpQb%j!`ju(Z|Q&OFANm72V=x*vX>rrpy#`&TutbHq@m4 zcu^+IZE~b-RLn&Zyf&L25xh1&cfb^7XEdgi!Ob}R&M3(}3Q^WROpYz8%>1t&Eun>m zrew)QQBb(*a22xt)J&W>AIB^0!{peb7h3plJr0-i_*IJsF-=i;>L`WR?@%%(yIC6c zhEzoP1g6F4?ty)8Ms(SM}dL^5x$BUDf_b zPkC^9aAB_`IM~~NUFUfNzZluD{@$VA4J`INH*#R${*e!?m-fDQ;Fgh3ciqvM94HL9 zBzFw316%w5*#E=z|1S?#`};fZ>3cxD&NZ8xT%;)GQCP%C7i z4xPdT$*0c>PIaq4l-V5?p}M*qZOK9zUkaI~bu_cf20cl7`y(yPDCucrtqY!M^aAxV zHcu{X)9UJ*PPAUGK_W@*25a4xK?o%}7z91p>h>0DG)eP2sbD4w*^QJ}tq$?c-r6Qg zd>4gRwK+&xQ$ConGH9-lvgN(hrtK{#3%SeSgQaLH%`5~xrgTV~m2G@o1f#5}CyUas zuDso2%h>Y4dN8k(j&sW|2lKwX&5uzJP;1d6%@bwDO(N8Zo^V0h<_R+Jr%UZXZ)-$r zo4zGNQDjz&_H0^PwplXO58;;4FQmt>Z@mnsJUTiHnX7mi^=TQw3%}9Zzx>NqLkKON zy>*)wL_vc$q~KOJw$@3H+!z58L(y1uJ)}h!b*);qQ6au-Lh}pc{GtaQP7Qo|4lAM0 z?Aigf)zzNUkl5hN=zFEVuPvMBMtE z6(w3xKUIcy6Zm#@RhY%DcZpCdxC5nOGhV5+IfG{QF|+k55$dFaV>l_`_D|b9Iy8({ z*K7tav(>WxMnZl5n|l^)nV`(>2Tjny6`ze$0Q!N}lpWUgh!}inaBLm%5}-&Bjb73J zR;#Y|KGA}v?4D@V<`K?qXDws^6d}T!FIa|xufYUZWlt`LLxu&>8)G{}C{9(w0?PPm zlTz?nBP5*DSoR%1Zh@;%EU;yS)~!K2fv@oBn5~<}yDpaCbE{~0njfhs|40%LvaPnW@9UZ_TT>_hNg zKFGpYlUetk7L*EN^>IYjadxvfY0>_}lwW`UGSrHGz}OO4KQAqu!$I1W9{sim)gwz8 zhj$|=4K{L_kYAq(c@|QsU7r=f_!_?s=%@4Oaaao>j>cwirFXqwgj!LXH_Aef0P8im z2+U^7Z|@YLJ~X(U&S5HG6+s~6uq?Lp#w{Wg3Ex_DXc5!`kCU}&ePA(fZJQHNfjRNN zMhv?OaVkw!1yM2vUw&tcgVZvxE239~TE50Qm?RHA&F?&;^~30@tD{31wbY8;8p>E% zbVW}0w!Rp>711gYjZ#ot8R_H5Ko91P)Q;A66lCH8GRh4Qdmsvu?D5sU><+Jp8ZriA z!b%4jhzF`E$}&b~$4(InGW)$UabxJDpjJ}_-O(#TK?eaN+B`x$V5w3$&?mFKwZx_j zuvL*RPT3Y3raYKPP*7{z|66=n_(mhD7^CoV9;9oyz}wOKcx%4}k|rp={SjTkoPlb0&nP!t|gJS~IE40t6gAcA5Axwn|0^ znFMLkKtoMh=s)kv4K6dL6ffg@)DV5s_#Uud-q?^Z;=6d(1Fc?*cbkpjO(}d|qd(Mw zqBAr)H8+wFh$b|g4CSDS);G9!Ei}&{7viCOc{HxZf2~*qOa#rN`=1kEcH(5g&TXh! z>@b6mSDr6S6Q&b?a zpuA(vb@kpBYM~(}L@CZM)Of(eaV8n`nW2{0asrbJ=XfZKAH@-i>Jivs5>*Q`=!mT> zw9Ukk9P%$96b&V^*Il^`wtGS#mq3$gAW5aH$OY=zx(vmvAzIWZbD)Mi(1G==(w;Ah zP@(8Hq@q^f0v!saqhF_A*BE}K1%(ua@{vc&a;?C6YDkGF-M>(5ft#cit|@{%v}vJ* zK)!W$iBKF1hGwB~FeP}ylglH1tUfT%g4VIoGQ!yj8G?-p3glh+b*&QuU18DZ)QYV&;(JwtUaF7HXW6IN1C;G)h%NHf9^b#u=$D zL(z2#Ux}99P%$7M!TVmS^SdGx8(W)8L-<$0ew39qfrFg2kq@+>*os~zxPT;A;am$D zAlJ~wN;1|0r@&Atn*kaY_As;wXfUDlKubax(H0daJdO}7Ue!hi>-aXh_gCV(#wye% z9P)xJ(BlcXkMd60x-*xdf_5P+fUuYg!gjEN**d<~0;4r7E`{2t4D~+JLd|>}ztWC- zT2K^N2O+hoEVd-nD3H7ntoQe|pg6&8D7&tM;wQ*PFdAq%{4)`%lLe8#j&{1x0%Mr2 zAYE(=sezU>M)7y87n=>0La=|~`O88I%DUfdy^LBY(6u~9DYTP1PDMl#T5BUMy$e5x z*0@k{pantyLLx90B-mh^8-NgO&=Ohr)m#&IB8M7cD~tYC$~H;0-3&z?RCJa>FmSpfzX=sGoxK zg%%dll@38k8J=uGF=^)lbSW3g--``>h4S|jOACyPF~V3gHt3XDNOD2*G*;JtUW9_o zv>;-^>kY_yx+zeYovowX3SG=uZJzLX6X*fk2(8cUZ0U25ET98w!q6fAjI#mlD`my1 zZ2gglS~%;RERErCt5wFUfe4ZX&wkO$fb?i)M5xBN}PMhHCX#BLX~ zP$&fkTW+)kg^GqA%65-YhL&;A_<~TsqV+9D#CM^wW*~5c!=(YSM$iMSXsVXOSpk9ESkTd%TNf4R)##~!Sws3j z<8Szy+i7=8u3^=o^*}elh7)3?A+s~d`sVc_YBlz83R8m&@IXh&x;p8*bWdN@aF6w|s^y*oCiHeyi&QdZ5mz;A%`B4PZBBl**O2qbES*n z)G#kj!=590N3@n`K58mgXB$BiUChz~no;t^Vrj$hY7n9R@T1cMsmGUu390c(Vn&b2 zp$U5^jkTVTr(;Qbwn^hr@{@-#q17OA?2Yv>j(>5S*YYq&ZxgwxAar)SeDEf;+4@<} z)-J82AlMB9aL_sy9V>*>qdQcdnN4}~bz?nRFlNbypJKkh{61Ks9YzlIN%r1(Q*+}mMJ;s9p=(J^4aC&g71_@&s5U1a#b_c_UDMiciyPx#_?GBQwqmla z)>sY);wj4Wp_gIp8+T8T+dlQi4*s*Dp@u8eG<3o3G&yAD&~%j%MaC`9fLzdg zs|w zedS=0owm7x+`Pe>4ieQ*Fv+%2&|*DI(<@1cpZ^IAzdJoEbT!Pj<*Jg0e*r9Q!zBE* z9{|g;XOTbmWkE)m7u^tAA}i0T=kuvrxDYM)W&@^%uzM$mR}T{PPqllARD}h8-%kbZ zwJf?Y4^do&8wOm5OBrUCvnSJ$vQpgt*Pg^yXoHdCm(PlA=lCC<6nBAhW$C1b`DC4% zj{DPooGuAnE8`7v z>mPxD{Vmc;+5m^1ScgSBGP{Gn{kL$jj0YFd`m%*X8k?i*lr9m{`Q23uWhc|8O8Yjv zZS>@wCokpsQ%K+26^v%4X~n#HaZGX&?&c=eS~C9m!nyF6ntM6NxaTN5QmqEjZ(E#!PVVhX z#vgz1EOcl4T^HBP*}G^tXAiap+^AsWMSCvXEMPZ-2M{T1!pe=_aVxiB>)KBc>c0_f zu;CA%-*Kme)BK$>iUA3C=Pv8f3o+LTEbOSJjR`~s*-D=4v*Vk>BrYNJib&}DfbV^W7B zbE+nqGnEX*s7{NB(6m2?RMq%?@}xIA#!qhtQUnhrfmC!9r!P}3#h=_N;Z zaQlZ>4-!f2f@XFf*|d}Uvk*FWHlfG4GsXjp=#bh%p`~uDr-W?sf4u| z$#JcO+`6Azhlm%iGzhB+j2W=&>0sSO*B-m?VFMwwUUQNL#nUo5vFh>64TyA)D%}2;f2j6EV=biWWCE|J9 zziepZv=%3t&ganTc{P(l3|d_XD)>g%Rb=-8h(ScC`p;$V-jHKbC%ZvDn84`X9libW7JIlDr`OytoHg7Yo>tqEeeyI`j;!cN#NJCGChB zvIL1T6C2ux$%zxcZ8hb-M<$30*P_srw-unPP(~cIS!qyKC zj2wS)-9BX_%GjQH*&2k~wjj2!Bp!Mj4s?d=yrb|RuRw_;O> z*Zj1BlUw~ci?<#|$>-)2IELFa(gp&{-Myb22%=By;7Z4cdN*jQ9ObrbcpK=@wSTyT|L7=CvT=OnjUHJ*KbpI7B6T z#URt)S-4h|&rK}-l+E&V?9N`E#qyb08Z5+x1w86+p`A;t* zPurG}owRdj?1JH?vNAuDL9UB2RmY6dDz|4G8sglH!$M^MYqWvL$s2#QpFDpUy5pq6(at+4%~)F;}T{jMjAItm4by%&?>FL zl9Jb@O>#|cXdfoW#xK5<|Gfr04{8@zsLgrX(rCo}8@&XRX@`*`(Qm2v$1lO&-F;ZL zSOXHV5U{)|^%vP$S4EL7=M|oyN@Ri`nuN`}8b(f9yv^I~D7oZi|AplF+heWx^X7@F zw{SaK{C9cBFg+9<{BZww`nq~{b;%`{3o=ajY2Q)@ep-xUlcx2NDjmv3s?Nx)Ip<`A z!(xnF=j4V*+F&Gn`6pWyTV8Z>MhRkbh0^6>Y_2O33&$B*LFcum)Sk?Af=qg`-P(uA zsZ_6pzt;;r0{3a5V!3#qRs{<65}T}g+!0SD5rS!H$dA|ChlzUN3M+q$pF;_jkY0x^ zjziNPr}9#r78Rre+~i2xFgfxQl$mK(BT5FjOC`Hhi`U>+jZNjnR<}7aRK#Zwq#d#O zA`CggZHIg>1g>m@wX8WXl<( zDXE+~-K^FA9NGA%(0+0T4Rh3~%P~WURH4xLTyutDzb|Y~P&6zbIWB{nmN3CHWVDi2 zo~CJNRzJ2n(0h!3`U>t6EW2s3j>(EK?GafcET_F@ZGy@Nf=Nw8{PGbaw*h$}t6@YE zyaf99`PkSwBQUl2%OTV)VkC~iK-Yo(YkR-aGbr$vQbMv}ZvDofwJ{rKi+MK+Cj09K zHA^-mLE5{+AZ;6rocgz~Gz%2%;NJ{$C@d6M>RGvAL^AH_*{H&zvbu~Z)O;sLjz9!A zqBsmzgUH4nN%MxWlYcQPU{NgfgN%kI8MTJGr$NQ^X;nVyi!@+8N^%H~Uo}cj{#Yy4 z;}TXF)kdb>uFyQ~wR#HqS}o@Bgvo!Vz+i2|y`$*yT*p}5B@)2UmaOZ5WJJMCp zbTXXxMyh$OP%1>2|3@;I|7uXPREXG6<4+k5Wt#j;sB`}Qp62|O3X876B#H@@x+b$4 z(Hp!;&2kRZY=glj_*=x~_nf_he<3H}i7s_w*~ML2k|}*r#u6_v`bs4mb<2oy7Tc_S zSgdsP$Sh|7+eDTmcwgM6a@LY_(;kbqBJ~tJu}Y4p-FUx!STL(t`Daknw#6(Rp^lEw zaC&I_;Cnm&wf|SWpXli)V3uhTD*Sz3`B35S@Jg%hP_zUKi0i0v<*KlnA(naNC#AJ{ zrDaEXtjxV@3~@jR(K154oz9~FJ3QlFRB}y{+m3KsCYS?C6)RVrcA;G3adKsRmKA$k zJXHC+TJO+2wBFV0zRVIQ=GSHk{H7+m)x24sOxGn^u!%q%pWmX8pL**EO zrzYz#PptU_n!$hY9g7uR+u%0g_5g39M^}T-79kK;gzF)sAF)FMt8FDuG`JB2&9C(c zIrPI{Pm-gTuiHzeuKv59{{E|B1F{@7zy@?SczRUR#<$BnZN292@N|n1yRQ|sf4HuN zKodl`7~r(0b-3yU>E^bWU{xwPbDHM`7lF4wO%Bam^pCAVpiJ+b*Kxg@;PjN?G`+R| zvEERG+itGCBTc8TI!-(V?cVEOmeoIr8urCb*iKuAV z=1Q{_#u={Brn=5mlDCk2@kRkj8;qzGf4Pv~dXu0!+n0n|e3HCvYNCYOd;>nG4Mq;_77Y%3@dlt7cPt6D{>1Mo$CZUVr7CA_*1(J@Ge=H*0E{$u7@E=B zKuyC3lIphb&mI=0<5&{v{fT%=?vPW;GP)vHVKpq{L3Woct1Ueo=Pp`4Ig98LH}vko8{zW& zanFXXOC?3&NACinb{IKS>fHPA$GCUFBegUN6r!q~R7B!3#;2Y~sb*JE zJ|i&17J?pLn?~9| z#=rb=kY}fLX%jRIk+~{$U&E-@DD!FSylvhh3INR=z|szBUN|qiBeoSeW+IV=vVbBM zL%5zV(ouKWP9^eY9~BXaeACUq(*`5z^v=mUm#!M+e{nOus-=`cObM*@!Tv8c#neh{ z1~$|l{EE1t!WM-+$IctHw7gh$DwM6Iyy5};N*jzw&Ji|LD-&%K|JVbVGIFPv&RCgq z%vbZyu_28ynU6OdR%Z*_BlmHeHnhXY$!$Xu4}T7ffz=f1mx-&%M3iAYRglky7_>T2 z%!Gx{9wooH7e_%G3<3wnV0a0~c>IgEBDJlzpRn;8&rrH(#i~^0%h5Xtu2&zrA40GVU?+!cc652`qR04G z?iV=2y0imW#7_$;5*jz1aA{O*-6_u(nnG}t6z&0{b{IKy?V^fbyhr4&?JFx4b(V~N zCLW*m$GJJZH{ATT$&t2Ua&o953PAqXM>wB^UElRMYKv_}n|2s99veU()}EU>wt@$Q zw0DtcYF)~apj0Z(7PqAX(MpP(cnBie_#il{4MvXtGK6xB4+@6-!;U2(30ve!jZqzo zP>oqanDDauXdi){J~q(d8soaA=yBftJ-ek))23_h}R_yYdaM>aku*`-(#QqFZv zomr*TO-mWC$2;qZ>GaxZr8uXXc?hg_n9yKvAF=<}<$r6Yo8Ng(xtsjui`@7w`I3;6 zf8lo3*+z|5s8vjbOsYsu?XgA6QS$3Y!KKDWxQ$!i20IIOV2-FCLu&L*k8qO`2}K@y zlsj)@K*3a#G^6xNjqy-fr)32slN;KHiR3%%J+t1oO|bFb zDA{a45ND)gcXno$0>?`uTj^q*;8_B9{~4*`}497R+p+7Ajz zsBmWF(qv{4c-Djx>OEJZUtg0b+n?ozwjo(o@Z(a*QmqMD1&BmMynHT2E_jaHewOmI z29Ik$NltxrN7Ko0orDZO#|>;j>Ih0ZwvpaUE_sgIio&jM2U|Tv z^19L|PzupDJ=Tt1$tOFy>U}#UpByR=J~4ct>%)?#1SY!~M~idmtttRYW2vrU(q>f< zp_wzDA}ws;Q4;%}a79=RBgb=#NY?z0Vh8`s_XLg2u_ToD5JgMUU5Q%|`cDT+%9?|! z%SBP}#eau*YJ)*zyKC~{hjBu6_Wzm>$CJ-V#+QVm0wSh3SBfU+Iel2Ea61&$`J8}h za-?mTP}R>&-1(~~y2^yW6W>QKoeyk^?J`J|fZ2(>SjT*cOI6B2 zQ@ACfo_Uemyzy-?{%0=&4dlqVKY~L~zH}bYXqu8Ptnqu&j9ZpY%mmG|b3sA*Kp(Lm z!A$)&Q1SY!_w!HxsA&+gElmN3D8bE|awto?%5lG&4%Ezr2-*7sd|2BsdFuYJBc@P= zkGkUrFohlzoOc5q;~kRMh7ChE4}QD{7r z3?&0P?+s&L?)fp6pbbV2UGcpM^8X~&9sI(N1^=vNiH5&XoM+fd8$zhwV^BKn()v8P z@FmQ$eelq=htS=iQ?w`Z(w0e}B`u!duQ1hamZt4IfCodg3%XH^2xZjLlwIoy@5c6-D6q2W; zPKzP!E6L|9tf&~C^)krU1|nyEsZgS(>hWX*E@6}64@t53g*w9$KFP^6;K<~@2$vBk_1zH_ik@rBsB(U&Wc#K1`g+-TU~bU&V5vXwR)3gAe!r zxNm4!)1&H&OKu(FC9dmhP#9cGLgcCFI%_1PD7~JE(J0_HTb*{3GtUA?{baDbWuy&6 z4sH4nf_v{!_K{cBcW>eK>&imA$|WHSTfCa+HB{7-wibgqgK|3NR*@5fWi;NDls68q z1`){dm83%C%aH-R+Xf?tX8$1Gj;GkS? z@t*hpf{my(M#_?18Y~GCe@o2D|;xA126O2dg{zXM4(Uwb+&r zsMFeRIqh`bz-r^FSX!zMPn*Tllyrf{Z6I>uk5yQSpF6yjf4xf}jACgTXhhygm(7VV zGov*Jm9dITnueeg==<1E8D-{I!_WgaH%b0xx~_-sU0*gyHl`fboQBFc6kNW>Whet0 zKM$8tDt+}ZIp+RC^R+(ync?y!5_GVJU{ZEKEd5j0{~P?_z*(I`ed(U#9ZJFQxEs;M zOG03)NGuBt#)OAk<@C?Y#Feu#LHQUZ(LI=68w}=EG^0Fv;645PgL}$hRGzmclWHoO zGN6KD#?JW|a@JYp$>G(*xDC9W?%Wd4Gu+O#%2lD3f1y7f?eX|@IK6Z^(Z-X$!in*i~BHNNE2A^ zTGE8mRS}ZxbeLx<6=OAzkob$wDNk;E+b~}~2e0B6A3e8x1_ZGXoG+eQvj(f*LQf;- zre2xJ$hgJd`gqAQD(DRHJUy}^r<=W z!1?8~N7_b(IO_?%cM4kCxNJ#-m&MBw9$k{YV z)HY058yKO+Fg|~ey<$N zvBSNxLWyiG?V4O&^W|y2;N6~rO2+zoM%p9F|>vIuRfxJ&q-Z#=dcxa+J!M~&^qZ&w9GZQy4 zT(<0&)#q&?m5f}f0$JLIN%3Dy6Z}V2WvgU^KBg+VD2u*m5b^a)(+h?_(IpWJ39xq_g&RcvE@*22ZiB3bV=?c0L+%aSe|^`OT!$ z432375y^JL1bOY$UERFRTsBKa3OUsr6)4S6A+$I^IsWFGk6Fs2!>b{P{yuX*dE&Zz zZNy{6rz+xfjR@udQeD>MIIoM z%TnZO7Z9xt6>gZz_jrq^JhTnbW>mA9&afga-g6+7xynYm!r?`uw^hz_=oI(yV@)5~_E6O{F@AC5S<~88x z=kRpX?t$3B^;eV;J1E4@Az4?b41wAtsO2IgHV5lOdPR9JV!zjd!gz93b0YJSO)qo| z&%iKP?Yc+u!qA5XzlF$2T<9N#%5GgkyzsI*Y1gSNp?q4W%qZ<8W0Kq+$41Vr8bwNq z1s2|y4{hgr6428jO~NbE#Hz0`Wx5uPsvJ^7%5PSQq^~BS*0#YAEp-qA;f>pN@ZUon zJH%BiU4@B=`6TKT8_m$(WWhA;57FL&h^8k}-ZH!zLJqxl_TD=`2X#Ll!C9~|o3eO} zlrwCsdvo4d6CyI2YyaISCeQ{G!!Z7KV;ybBW5S0hmxM@TF(LtOW=$6TOI-nXke!Jt zV+653lOt`z^GkBwIm>fU!pZMybD&)y| z*PJ0CF#estL6*zJbCk*&v=sHxvMx;S&z1MRee}?qTh8Uz=b>gn*Si99y|k%j&Ca81 zBpvmuBlH})n`RJXDe!w^w!CSi4Th8C5Y*$}PW1C%n=K!d=zH$z=!CD#dth7N6&POq59~fE{Gh1!%tdFBzbZ>iOXp2)r=L@iS2&y*?Zb%ex%wP(-Roc7 z#)r!=E#cS_!llJyYfd*^tWjawOf%(@O>K=3T|vOnHry;l$saA06S!%_+_=4=9=NCC zkIzWsX);#AEA7K5R`~eEDAox@MKF&(CNMe=%Z_|0k6#y+OLM|sl_AV}j!MZ@dZ#Zz z8dacbA0{WB&rk5*sS0|DR@OkH=hC#z6j9179+YZj>v*Mo7*4wG{rrdP0yD;Rb0#lM zF-*+sv+L$i5b?D}d16ERFgfNjV zYjD!E0h-xe1%IQ5T*cqGiCngH|3Tt?Px;M_vT|&OMK3UoDdP&I)4Di`T?>|M8%8z5 z2PcSqZ@HKM^0iQkn4SoDVjJr6LQp(9(A6jH*w*za$;*%wLX4lde0i$wmitYnQaM$v z8It7GjZj_YZ-DBu8UlaN>l5U_%ecLM{|133-kiG;X8f^IBo;t>j2K1a9|RfOhsje% zubJXM`oZ#yWFsoZyJs00dO$LB>55@KOMY`BUTGgD#~z1Ssc_ag-Ms52Xkwim9fE=I zKPBV#r4lAC>N|ODX)eq#GL6p}47W8dkgw_m_vZ zpdbhe1ECm>P-Fqc%8;m4L-yMod?1P|XDi2dD;t zViPDRl13qtG?YMwgztuw0-_#bctD`~n$JNqi8M8nqGWp?1AoH{9bKR7so~0WqvVBw z?yjdg*LAoAL(sv_{(lwZ_cc&dY)j3!%VsQ2YCi2LYniH9KgZeYx+GD4xV&%uszGwH zQO8j?THnrp?!$t4#IYmDS6En(^Vj%9WcM$4Q>1{hoFtO!N|!Mart`b zTa}%B=)E{ob|{vr*uw=tQ(H6nwLF9FkV8$jrBNA~=j>gAuh8=|Ru z@UdmL-LAvT($y=nB{k#oR#OJ5Fq5TpIWA1-k77%>bS(Qxi+K&mEi?_^r=a_P+9JV?P^_(*zF5(wI z4nsmajG$xZBro}A5JDx~bhmeeJ4UV=esXxv`s;>X8oF%V(RCezR}DNlu&4jJzLS0G z-ebLzo^bb5-Dh?k>O9%0mK>8vI>^Qcll!|5jlXw>Z1}kf?}d!MPvmzdq5$V(WH2AaQvKi z!k!Q3($Vx>g#(RrO&ZBr>Poo~!A*xjlyEFO#VYVq5oL^-l2K7W!U!U@G`KSj%g zn%elO{VYYXtaODit4MbGPm!md`1Yg>zXb9kQBfM7ipJ!TDK;7oPpPC)<&=z#%W0NT zu}mVi@=J)nR4R${e}4^%y~7WY|N4xu9Qcfwl2*iI$|;tOu~Td!OixAP%IFjulS(64 z&A2=&I}N#vK@|@F^zNPSg!}4yh1H<0R7Ar{N)=5^p$j=kM9Je*N|juN)u5$78;LWD z({W2>3aYgl?|}Vu5~){KBNA51Wh#(g%ElG=4E!lfC#WfToQ_B3(O5zrXI4IgJ^TB)lut#Z!dgUBiK&Q8nE=1CVR>8@qf}C%3$G|Wqz9BV zMb6ZG=>PURJKuW|Iq>sePcqUgWWP9KV0$ z9dUnOz|E+x1m2iD7M4$iRVv_Su+U0|!D?emD-?-nB*ui7=PhRrK#CwV^V4UHpTnpq zMvg>`WhssiUHQxD3y!>iA1qF?sw?9NNQ;LV)f8kLen}R_S17_1el98xN2LkK0Q$6F zk}Ksz@@!_;_&fa&8N+b_*@mMirl4bVWQq>U!AuG&4rYSDl}F+f+Po)ZQRT{pz-O>D zc``J;`~UnA^5#d#@DUUh!v>a3A?p|)5f*l}99uAsFNrb2k09QvwaoY(N~!`seV*O5 z^Bt%~#@Tl@KSHXAD-&4FDODm8hsaRMroxc~JH<#7Yz)zI=-Z%LK~5h~GDLmP`*y!G zfgT5LVV$W2q^JzCTg3?Hsgz-+R7zSk6;nj$7!zS*%E*d1lG6udc(^(7eeW>w)0de% zwfmd7gdGd;#K+pqzQTI;Jg08Dqk)WK0dN<3|huBlmt&Q;R&$FkAz0>)YywSoP zMyemV<;rGT^H)SC zhO+|}q1!qq2fx?hgd;86^RHch60~x~uEWk}d!S5<<{)3yY+~tRbpO!lN%o2KcO z+7_CYr7(Ay4WV>0lUb6P$xJeP(K7o!$s}{{OhzP>0#;D8B0Z>x6a_c7sxSgR9w_Ql zQv`YFbA43wi5s%G;PUYQJ#%jY8B=|KJ|Ac~=iD>*p7T4ubIx!1ev@GH402@u=Wv&; zFD55$z5s#LzbFk=@B17*)2o(f+_&UtnsMua)tA#4<1tW$YFQPDJ&8W*i(&5Q0d4)0 z)ZchSwM3JUB%9Ev!OvS@F|Lfq3ZamXgnoj<{H`y+|3mXduG7r`Y_=IPlYaTJqM1a8;-)MsW4P zk?PG4;kdqyU24R)YHGnIA)6ZTe_Crv9iEDZ;qU+b!x*ai(&~ASNY3HHmx|~0Tl}Lw zhMgWY8fUHAL_*7xd%gsV#p+`6_+Q=v@CLZU$R&>yyQ`c3t*BIN?*{j6o8lpO`xOs$ z&34|}{`D49(|a1WG;HZAHO9JXlZBm+y2fk7q z>|Rwt3Nhq7PFhQws~ex7LZx2ngFr|V8l7;5XSjmEjA~Sgh!u{7$DhUM))m9RacDPr zbi1*=de(P~Z>3$(oDZoBYuRUyGj>~Y-s%ooMPr0q_;uV9-}6=66YJ`TV!HtW7N55? zlZRhqk~ni;7c`bIGUd$@f}ljq#P zzM7j93~7y;eD9n1z4~Hu?A4tk3sJ?$P=wyWYuG zN-oiu3udR{bxB+6Z~&2k_?qLvi(-A3`x8_#^itd^@)^fB}?ji`-Ot zCSslC#DtJni&HW3=^s&#?y6GKKL)a@=T4W}$^IV}JIF81*Bv149~WOb{#>!JiDGL5 zqzEYMQxpUnu;G-UC7348odRP1pDXrlT)PQEWFs|S+=5~+ADWvzQn)>{Yytza2hcr0 zqfpB$qsY2?ppEJ)Qm60#X|Zp^T207HqH`HR!}7CYAJ8eL01OM*^9m5=Y4mO-!UEy8 zL}q_h+znugHEM5q`n6@Sk<`lTRPZW33h7Nze+GfnQCdn`tz3g2CK@h~>rN?hR|zlE-(vZPSVw z)udQ|YeS2%X-07?sI|(Scea10Z8O~}uE83cTzVrrWfs1e0t1?8?@TCFnX$#mkN<)- zR$oj`XB*G11yPV6|LKZ>s{OBY*|?U5v1}yWoDFEpN!+i3JZ~}~$307qzKTUxS4@uG z+))$zE!Drh3f0`_6b!xu$C;xZvo(@X#mQxVpnLf0Qi)CQv5>a;_+LM`x%$i>u<&qt zp-h01lATL9lha&zraTr+I8z91Ah8}{q_?h^oV5KBq5nNX4PbF;7ao_`ue9m0u$DDd z%Bg(D9xzUFg#8l+p}v?re)?nQ5a&bUhU%SvDk|Qbfbi|tircnMF42S!sY^#Fn&UaM z){-qx>C6Sm|Frqf#lhbC8tQ;LzV4nD@>-WT_{l5&T$KAg@t5L`ZT!*>s1@lWIpx%J z(mI}Snr#JbCB~Ec{zlcxs#0=n@F?uIU;b2cwflczD;>5i(PSnm-#$J)Zz!>2w(!i1 zD(M?Fg=r6imU9pTJc!6N5Jx}A~rROu8eImom zGR};BA~89qjF4Ltc)q@v(g2NDhZ+SB6#s+(%ZbxzP5Q$YH2|2&JDc!GeKFDd=IswQ z3)6^x%1>yc6_0viV$$yByjl`zf!x%U0uiRNlb1V%0m5|%1HE;1?R;m`W`&tf@`acr z#}bE0k|Wkjo;i`tEKF)`V}^WbhLJWC-I&nd8(LjQ3df=dAG?2kbCrx?uOD_UvFJxS zu}-8cDHod^w|Uaz4*irXLHpT6zP1;`T3<(=u3UC$b=Ntx57&|seMlO}5avcBT*MWc zw6bcOZ@kvW;7+BIV^nX#jWg7@gST<+Ky`jM?Ju}=K|62>YHpH1kS~pK>I%zRJUBMu z7;*Sq?7sY2__n&b+F3$|n>SCg3dU_*y zYMX!W@zf*D)z{92{PtxR^ikG4<%k-mXKhAvoV@LPVWfLiDdKltMZAB@SzD`5pD$Py z$Cbk6{dJ>-kt`_jlXb#rLj4BR(ZJXTj+8#o#7;0wHP*$_={f@_X) zR=_I?MwbAML{dt#cd<(7A6&BqIeh*1<8(z&CDT|dwpcYSGZ-|WOgr1FSHzA?eUglpSJ-%~X zY~OYJ>@vg|h%UgT1F8=2Vqg&P_i=#UVR^j9S zC=i;9g*|Hs#4^0We!;f^DPlN=f{nuM#YqT^8^G@;C;l>t?7IEJ#-X*ULCb)&KjnMR zfWX=BUH3lnmrI4N_4x+iw*RtaV~?rx#;$DBs3K35mKRFPxkTgsC1o=zDC1tnWKijY zWtG<{a-^7rT-6l=y!ANESVgAJ3t54tR4ma%8>tI*-VS^o{j4Tz(WIt4NC_PgHj*PY z2tZvGIej9%n>c+}ZmIs%hHi!@m(=J+vfPw3O7|R7F_oS1gmqF3XC(FcV+$3e)pg|X zGp9z5|N8Kj>cv)QX>>!gU!-na3~wD{B5^(rr)&@-qu3&%=!TWsBGo%HLly?Dn5FS z1m0L;P5!Kv&rKN;QUSUJe>Kby|q*GTPYj3>*7`1+AFhrYDJ}Y{0LmVtFs^D)xBtwey z1O&untXWGQe>|xsSDmxR|IgO2q`b;+C@;`yfCj<=UY;Om!jSZu1!qx;+!+)`1`rTh zUr7#E_V1OzTFyOq#;-qeP&mGA;&#L#$Y3pXVih6k%P^63rB%h-&jnU(4Wx1S?Sdas zGq?Z)eG}XpU`_?099{@vA!#bFh$~*RmK^@ckAZ3aE;jj3hG9J)Pi15Cod^(EP<*eU z_ouy2ke>UkyNL3+YHKKpr#lxrL!E|3 zrgL{^TgNYNp8fmAX2ti~uO>$ikZq2}Tu8vn*Out!KPc9Dot-|y0mF$$SQQUFho{{X!Q%qO4=LKG#C%hKB;lyC###DFsfbqwo4ND!|12rfc+ zP-%OOb_v`cU~-~6Aq`&&l)w`MgNJ@$xJE!i`C%wYRnQ2&7?90?Lj)4%%?;OhV$d`2 zajca^3g;XIR~h1rL6S6;9Io-AAfN`+F9621=Q2H3}O14J>uwu0pgk zWxE4^2!4Ew+xB15OM^-YN$GRCZeFgXJY+%qW(^n`yi8c(nci2HYiavHn*JVmG{I*^88bKjg4Tlj z5-d{mOaPGwWz5ClP< z5#&yQhNabrjB4U6lP4+pKp9S+z2FdtX2Z)k`)FJDEYd;O8}RHnXA-$M1B~8Yy}p93s?!DWpV?`9VsWxvQ`7> zDsnYyG*y+U99&VxU5`_EcI? z(-5>4#~2)6@U>VoF!$m%;$hnpa@W{6J&;;(VgaK9`oDt1j&c(#*J7kV*XPEV(1itF zEXpRh^;Wqyxri@CHD$81178}sHQ<%)yhjphur{VM$U;G6D;5T*^sqsJlT&&Y3{_b9 zK?rt`Qo*G`?+DxYCVBh7u11+xL4JkV1pzIfJRsw3m&wmUZGnCYEQE^yl%rg>2vQwS zb*h%DsZE;_SfUf?KNBUgO0^4eEofgUpBA{Q($)oVjl!VrNVe73;;{0;Oo#Uc%m;QD z@CI9H=qum0O@0=u5Zt^V1H@NRhJZyhwU#?G%hjMf%VMVl&_9()VE(!F%%+%JOV<&; zbSg>dz5+flk;I>m>wNEWHM+vs z*Lc7XXp8+Lohfa&M6Sg=fV&bJjS4QD2o!9O-CQH8#8*&iGT?z=t>fg01a`XsY@&9! zBXHR9!uVP&?;6@oU}4i%`B@-oQk-^5ZwaJGcz#f<_-q@2=%q94V2bM->uA zY>}RAz^1w-{YEv;L%^y51s*gpi1IKV%`dOiLWr@}O4xTG;0dJV=~WHil50WrY{l*Z zLQ@chLS5qY<4yN%kZa4>m7r5V_=!*t5O82TGyGzQEI!!ASjt-x!9t)R@^Hf;i(sI} zy$RAoTpFQJs4BogvvwE&=X8gBNdRZAL~lx|6#Nav;#u%gV$;JZ9=kO3 zy9YF%rgW>i_F9XmhRjy5Ghj1^WMapJ7c$#?rTo^|FDSh+C{I8_fJ-E5z1a;PTdu`g zqwLGrop1!LfR7NIq8pxFuEi3;1V%xw06QHvJcwdu(|)OzQbk5ni<3CmfXorrM!MU$ zxaQkesYbv8`Y0fsVy}EL?pM;>_!|aT{v|_;LC)g6=Jx4Q0^KG z*r9`o$Oo(6*eSfc6n$!^%QQd`^nqd2HjNLsoytz6T6G+wG*k!k3e#isMX9n=!}Y&R{N`BDbeuL#ZzYV$$RLs~a+s z!HvSINER+_Hk@~|UU$i-k2C4K$dkXsao4Xa2FlF8)lfq=S91y4#njRPbRi+LxZD%& zdA8_G20S{kkS(f-C670#FD56qy@>q1!LM$vK9&~_;4|z?6ih`zyqnQw5NE~)OA|OL z>-D}2@kQ_+b;aaZS6PM~`C3GvSr|+ES4P6C#2JA}%tt-b9zBf^CD(+|MP0E(^i{(f zdMzZ4#w9DG;SiPPEFU(P)GC!z7n;zLJu!SreK8>SjC;xbM?SHs`q3CZ1zs15#UgoK z77Rs0i7C%cm0fnXIEzrKr6gXXu9${WfhJ{ZTPt~Nx;#)lkixrcH7^;^PpoG4%kd?x zfhl_P_VPqlrzMAv!5rn77Y2LlYZTL0kC4|pOB>0(^UGe2r;EZi*>QESp{23u!q)#% z9PHWCm2Llg=P@crhMF8vh!07Q;z{>{i!~clo=hm0699*NTEwT<7X!F@uLMfsEx|vu zZE}gCnn+z}%&IZ_OkrUz7AuL-WQa;4ys2eaOIKHs(_i~Jtfe%^@TDt0)kbEAO1;%{ z7bL-={F#zq`EL64tEH!;?~uX!#C~OL*BpsqeImz1$a)k`IbyD zpeky9t2zs0lq9dfgw&Oi$H&jQwEE*KU^|8Jc6`NntDW`a(~M2EFdbwjJUY0-udiTS z>Wc~Uz>fXZ*DKW564+wcu_b>zfV2N?3) zt@+;S7jF|Rm>HG|m4;Ii-T^)J6A1Rp2_%r`2 zxxJd^h2gE9B@0HSsU}~mjheE#b4NgEAqTG%de*Rc?yo*@rEs^RKR0Fo$gC>h31vqo zxU?VaoHyf5-gT7#Muxh&>PhDiOt){l8s4k=A>+t5uU=y$tH(A3@W=z#2tg3#fEWiM zFwn_3r-KHI?!(4xmh8D!ID6;}wdC|?N>=jOYtLx!Y`zXID-%EOEi;oE+jvIHlww+j zRIkI^)E8G@7B`(#klT(5{vpaLj$;e5<#8%X+p&*;rb~G&8eX(2O#}e3xlgJ=M0$@6Uo6wkKp{`yp3~XGx1@(|!LU#Omu$P>F zgD`pq6YG&1FdTKVxGbj=?>U2=2>+%TXM#YlQzy{NNdS6pAtrTR+o|!%F6-3!6cij%1;Xc>cgVUu9D_1SOd}d zw7C%V2LlGbSw|kf1s$v|C84MLYRFSts;UoR2ZFnZV!lY5X)>J<)$w@B6;fJNR&Pl1 zur?8lVO(#|p&bR6z<((_?CV!!ZKaOCM zrz>xT=c%raJl1*Tf$EQLMNG!9b%|mcrD{qBi;S%>_DDI!dKYYNRf>-3Ai3ojKBc}6 zo^s>J@rkR3$RCd_Z)2Np5{9?%OOqI4DduOgIKlZ4%;FkL*i`d`X%h!X6nIKKbrmOV zr*~H;Q`D99-48CivJ^$&RUD3LTof2 zh{HtUbCnY0?|0#y&-*&2ab|TLVLo};ZUWGUP1U1c$LMdfEd}tZ(ve0T^BR1tKjRC} zGIqTxEp_wAXV6Vu6)7-avv~irrH$30&r+e9T=JtEX;&3hhG`)n@EVhLT%+S-w40Ic zRi(tKeH~sDAo>s>`V3a*J}Dp=&9~&iH%UyR;ixj;;j&X~GN>HS7lSEs_MO-R>xxOp z!|x;ayGjGq58a7a1qhROMVKlRexH+x#Zr;HT{X>`)x`91bWvAKLi%^?uRio~>cliH z1@Qurnji#(*tCXCrqbrbtj$+)OCG!H?-sy;xVj1y)NhgCiRi}+RDXFl_QGD(jA=f? z#S>mmNa-pwU7SXoaM)}T7OET^-ZSZ zxS2uXt zf8F}w7NR))`?pZV^p@?{OrJn1flO*Qo33R2h*})aMm+O+aWY1FAA&$V_c<(r`nu|g z0}i_TeL-;0PLLKMcTzXb7=GdYwTE9_eeQnYNr2Q2oakEKL0~Jul^>QsnCI*;CE|7k zPmh(8-sIv3guabyHz9|e*CKxIJ&2>Z`++m=s4Wj-3rVG-h$K?ZOil#y?qm_DU-(SW zd_E}j_14vqll@;osBw+!;$vT=TPtjWxX-}=6oFBbhMOi~YA}(WhlG)hYgYngC$W({ zwqwhV|BD;7ZP)q}?HG-nkj5e0rQuUR;ym?M=3p}Sd2mlnkix4_Z(n*?=t0{08ZAiQ zGoZOU_mMLW!;weeMqWcwhsea2uLtSVs~!lZ{^>6IKC!Q-{Xe_1AcsBdu6haK#`i>qJwDm2ZuiKP(Km4vmUo)HUnm)^24Ws78W zCau)Pli$Q8V09J1=5N9!;DH+kt9!pi_0{Ck<#-cm3lu`in3qc%HIBKNoP&=fX*Yns zSzV0WnJUoI=E;`o&%Q!qKkFcWokO}PLAwYny$vc)=2l*N;eP7zH5M*8S$NB()wVC={(!iD@NdfJ_BoqphUI3g*+NQZ z(IDlc7OEip1YrfMtH^Wb9@`aRUfO=dzXW6+c|WdOMA8Bq+OA^N zZ;s}xYgJonq^1=Az9e`ReQa_{IXP#VnMw;PpMOCoZA+CWg}$EERpjLPuZ)lbR~OsJ z_O0*lBm2LbyNK*a7Ppb7HVY4u)87`}ve?=FgNBe|e}m!`#eXUuY_v6A(6qg&q4B4U zPc+`u^itDznv>11w>;JIxsGqPe6U4q@wZ&mdTwi1YrMU^K}%p()t?wXQFAuW!1z-PrkX^LX?5%{|RuZvF&boWAhutzBJLv|rWKKwqu< zQ_C;c`$WeJ9p7wDcHG@@W5;aAR0rR&vD?w!{#yGF6g%46kLkCN9gm;89shZI>mtl% zAXA3T4<5?^<8Z@+2^;h9e^aZE9S9(BR8fC9d=`3`B9qk33LbQ+mYOaBt7eA&F^|E# zh?d4crRQ9^R)vx*HHO3f2YWINESSpl)I6o=5e7NE%D(81QhOus=0Jw0YmSw5yJwX zDfiSo64Zm?@Zq)6aEGN$=|%WDfGuKGZrm<+4O=ceQ5DYu%;%gVJw_u1nC?rZT42h< zKZ2+P*fWE0$pcO;ZOXQ{OSSMdz)u9XKOEUmh-thyyghBN$vwm04Tp}|gz-sXan#O(l7uF7reQ{Uio1aevsP9Da0EF)=CZZeDgJOEruBOZgxxw z4-0kS!!A6PS$~gQ3x5M*28?hQz))Ya{JOK*W-YB!gPRFefJ9<${U5lEg4iA?DA{bv!TCBKV`?fb$2_1u1}|9RVQ`RY%PZN~H(>ObkAP zKWb*)EIhdxRlhvahzLk$7GWgKz@Y4+esB1^?aG!N@>?UM1BT@a#12H-a1298^`#9L zF4sC>K*e{$Xi0-V;B|tFr={i^!Y5&ahHns}3y%jSqAtNPS7|&be-a$a)J_g5aKryt zb56o9(OC1OQm^n@L6?2A%Rh|62b_yQ?lHR{8~7=oBia0*R14ca{3Zy^phR65b~u8N z*wXi9sTOWBHOz@D0 zGVZZ>EjW#+soIDm6wLV>-X%Tjf)^WZB|!O6hAw*=tHSJ3_Q5W^NLM+Hf1qAa_&ITV z$Krue+FtIsUwRlpFcmoY;D~WlqVUFLAxa*$Umh(hb#uY34`&MX9=TyFM-ox*vQWb> zWP%QX=f{WFGXe_`uQmLF)H8&5v68^NMj#~AuYs?Cn%NMLs}cWzKp!)N5~w}3sGM|U zVcR)UEyM>7a|jng1mNBVt1ztS*}*Yzo8Z&L_Zkj34DrG z3I7lEY9ST~L*In~q2mE}cm@6$8j(~%R8DOjBVeW$ra_O!7(6UT{AkU~J_<+bRBltv z-$lbr5LSoz^}>}t4tb~ce;40;KXhaQ^55hebu{6A?=HJNGkaf8B;qAb( z!ozUrBUY#Lk>%P+DAS-34q8kX4XuH2m75CkOGBWbz!AFzt%ryjc*gKEt@E6Q!NJSca&?9?}dkqHFp(*Ma!Ax zo@rnYv@~_$B9{QaOR<$Yx5~9RCsH>oJQ}sAhbUHLWTE+DsbfcW5m-)Gf%Jr*q@YYx z`DJ9C2eG2j8E~$^L4)lA4wyC zh;sOtR0}z#n3zWRN#HASu-J@zc(&%Vrav5nUl3D4fj#lz)HOcFDP+Y2iGXt)F)7%% zs1_MJ2ivAg*;sR>LU`Z`*HhOty2qc0;IU(tw>+_qZFq^s?EOaCv++I%@xtx_ZyL4@ zqa8Bm;Ko%xsZW0q&QGQpFr$ zW5oVshFYnNmA5Op-rjJW4*3V9A%`sDT1u~^G^7B)ZFDbX24#VvF2DrTek~Uf(gsf> zT)$i86+#z1jz$&iZ=fqjS_5V|nHj7(KrvcnO}w!zS?B+NbE-mwkO!`q9K3q1Q+`3M}rW`PmeDt2E_c0OL+j~38rkP2+jaKB@m zDjDRrCYXWOdm3vkw6%9Y(k0ym5c~)~F~Um_cC+>S(mOyGB0p4O2$nTooaz7FawiyB9CdO2p=U`rHlgBk{qh!v-KBQ0p_v^t&d<@A9G_{698bOv5WP^!c}H%GeEPzwMeH16#&Aj*!|X#N;qA;GF1W|>HZYSzHW1?nzb}qc+xK>McQ)Lju(aR?a7EW= zd!~CXS!Y;x-nxO#zjgksbE)$SIP+iIneX%}-q*RmbENCl&YrGq9e?cj?~bo`+}C|y z2kE#C7t(e}IBKiG9s`{EVt(RO>gs(rY< zrR}$E&$d0#lDrwH<0Rw<+5;wKa6vT7TK4==oOnA6uVpeHcN=H?$TN-)+6D zb*yz?>tM_Ow*0*1RLcV`A8om=CEwz0+269KrLT)`ey#a*^EaAL_6D0j+JJ9pjo{^sCdp_Uu zk***19O=n)C%T>Mg5A3AUEQ7Qo@r><*mPkdz(nUJM+4(dyCtmgl~s)MZ$nK?ipdXKD6`g>jj}p;1pb%iGc$@0QB}KEmeo3*$y3Z-_af2hwtREadMlUyoBc(C8XtoEknF9s6B5aE?$#^0^kqPE4rOfC%mdp7xYnkK5CS1m8&|&Dm zRr`QgB^b~f{EoEN>h;=+>h>?m#evjRe%2gStGo+<`Z{o*+>382$W~Ob>0+Fl_38Q1 zvxb@$siXm2+s>KY(}o#F^)?znU3nBfC zsMa=oTPj~jx<~mq6Pk2nRGJ)@y)-A6M@V*`#=(J(43W+vF)&r1E2w9_nO5UgPY z_?W`krmsuw#p2``XXb+*pdBmOd}PC2Qgbmr!B}SnyDgB;BUY>LXL9kR*2U?>q9#27 zja<;5lzZX)NyZc`EZD|lf@L~AEG^r`n2;CdSap(_EX<4i?1FCef20S5XuQBX!t-id z!WfDsV?&J8Ka!NE5G5aTx*B1B@qJ`yVSm(K5X}=rS|g)W!fCz)k#an=bBIN+aNce;!;fBXbg(u7Qv8-_S_>kH_euT zpQtw5`~iQ7)$Njt^{%+rj$N73Zq_U zQEv#P<`JX)hSz*q|EvUsvDVh*7xx`NBd`4l2 z&8CfIM&p<;`8n%cl2dib&0V~o&6XlXBd^5Wl{@bhxqQr1;L9l+HvA$x%310T>R z?~wa(Pfc?=9w*U>oS2SAIfvYj6+nzRv&$Fs>68=Ufq#>mk52MT!8A2v!WA&gWEvlm z%eC1MGpo`IUT(&aHfQ(B(vX{(4qI~iGB@XoRQS{oR6|Yw=AuD2Ysu#{ex;|Z*J?U` zD*bFOoN=aR(^IIUg4ZR&}XF@<;l(HGI{LUQ|5>&9dWX}@+(sNbhzx}X2fZ&W;{M? zEoOE~n|CZ7wCgx;G;Xv^d*X`=%GiPD2^xRsaf^hlu_?6n6g#xn`{Fi$SBDJwmY1W`E4*e%xZ+(daimF&A;`rV{hoa0AT zex%nhnowomgxow;ws7OK+RB7cmox;@=iMxq2Q?vX%2E?Wf*klfY zm{L{7Vsx@Odoeifn9FPCRFh{(bX;$; zYV7w&-6TBb1;!ol;<&{oSan{!&YSc=c`R*1d#_#nVG46&rv$=FgBA3rB3 zZDSF6_eqrfIWC!>2u`cV@_uFPlDnne)y5#aZx+sM3FoH~tl#XA%2k5i%6O?oZ*sIS zRS9=~MlPqk%g(Hwjf?}FI2yWmah+V@4W;>+sjzav70{~unYV7PmB;3l&_sL?H-;I{ zOvt30xJYh4S+X()v0NFQ4lv?Q&80O>pu<0pDg!!bgu)qf_#<^msGOB5OwAMaWijJz7k~?PB z*~V=KJ7bZ~5OJn7B*V4(NU+rMXOSg(W)dyckKiiLJmr`(4OL%#s-Z`DfDP4koRv8cb;&JlBA7Iq$iV>vs z1-RU^d|UOBA0o!4Ul1eK8OCKajE4UkRKtAvc8xo-qly*z!<7_{8+en8C2&Z z4LuKZhnikp_sx!lwx23K(mFxo5{@XyhfWLK{XPd2H}8!u__d6FJX%7G=4td@UtB$T z|1QML-0?huOzVbjd02P->okh)56kpkQ8vg9CpiRMPAXy+ETT*J?se|JUax z$h%)SV+_hqUqC2M-NY{o#ixFG2BDCnIj{IN()feOy@F*8o})43QzN4i8R$ssm*wj3 zzZTYST)PQ5`K8u>nafWCzZC}hD@seE!j9+lp5R1j&JEfY2<_lbtxC;tZ;oZCZ%6vy z-2%3#NyPxU^gi_ga^8!=ySJH7bhlr4%`gIc1^}HlHl9kTK?FDJHwWEe+V4ou>QW>k zaJz3h@X_X*`hL_$F8!VG_#%ZCxUezb(EDI-ws%+0fA!qhW9o&qlcy*_?$6CeK^ILw}a!ZS& zrMdax=Go>E800?CWNCc8@xjJ?D?HQ^weEJkF|O zN)1a~f4FqlIe3#eua2^DGzMZapu!_jU=Aw*2pr;~z_O0B0HY5pt|Bl0;txA%bC4@= zY9&C~0oly~{#X-{fbz9rl~NN5#g&>!Tyf<}^MC%G!1K~Y=FH7c(XP=J9|@X-_`aAn z28?s95?yOBN8o{oM;NVEr3+~k;!4-CxRQ%&Fotn11mtfug^_1_0I!u!G+mfy!S z_{vZm^Apu*qfA82hLxJA;+-qa0r;+r#u>~XPZ7?MXtOV@2E~Ay!=ytjG+dNb6jz$7 zA}S5gt5y3z<4}k}RXG3@y zEyj>xwGk~2JAmwtD9B5{_ya^sdx!@eKpgS|4hZ_C_-9`T#NCtVyiYPz+0n4?$jl)2)s% zin%wMGciURKw;?Akyuz!kejRNl8(oO)b4 zazcHCv3k&m4+Gy{%Tbz>7zZuILQyGW3c&55`5s<<2%I6Y5F~pa>{J*T4Sg9fnSh`H zbRIFaR;7um$&Mx}?CL{d{2mlgbRVk;p)sTkoE^M&9|KyID5nM@yGE-33z+;WU_gn1 zH3Z=58X&BLTL7{Xhx&?!b->pICxk{7Rb*G1tK!Ny6N^9yBRqQ7L2Ps(`~<6F!7>Ma z76^hOv(lVVg`yCPIQTE9uyY_}0Mt1qAsS;iEe^IC6{|?e%~gk>;CL0)K1z;7@8Ku_ z(p8k(Bm|ZY2D*fe#1yew^F6%kP>6|Z)!_8NOopJMwIDFifn8#sM$2>Rm`0`KLt!%8 zLdQjQNEg*cI9-&1f`I~qtb_aj+ywYgHDK|v@EB!Warw%tV6TA0ahiRYS_nXdg3fDW zcykT36h0H*!zv;x%^8kYhVViApzNUplwl}os0+x8E~?h>+8C<}D}caQ8+Fwo2Kt<% zoCRRjpp%48#>Zm(Ib9s-36W4Fu2Y0onk!>bhK(sh`&8ggz$9U5gs>3z#ljH~b!gO~ zIHOfW<>vgMDAqJbH3g_t&?jL2p_@R9poxPPgV(C#s&HI!aHTl_?~%}_j$_#kK;k0fS19$t1y~Si>S~+qj9_Dv$p$Mn&uQXSMz&S)&WT4)u#9)1d87-cP<0~lxkq)~0?Qb;Kfujby)jnO6au}5eULL?ACKS}o{d8YA|Th{!phoVB8t6N;ah3WK<|KG z1M`9(hY)~KAQVP({1|1_h(yC$t>Us;b3M-;0y&IIg)ML&7h$kC@TM3@4$=+|nFxec zty6^*Zs|_9*wCZx%C(HNzSeoN{aGZcF48+)0$|$CB}(-tCE2({y_hiu43_CYn9qWU z`)w`aNYCn0im)|8F4w$cOZ7V~BGNo3m*!SNgV`CFS{NZ`&6v_t#@u8=iedNv0dc)` zb)-g=Rl{?C;14u8#<4^R>!dV~WL!1pXWY(;Z*IP*ns92!+^aY%t}X`ZABg5b*gI5x z{#BZA8dw5lo*W)re-B~E%`dNUJt3!$pT4x(`3lV}^e+`wZf*-vch<|9%c}8Y$y;J= zNqW!NME3m&5TEsRo|HXNm^nG@qxBBzH370Nk z|32T)qi*pvU8DGX*FxvL?a#NJBcb<$M|O$QqDeD_!*JPa6pXft7eV1xo;;v{$gD0U zAwe%^jnwd%M;b*0rcW-3=tT-{&-x0b@yxWYn65Z&f}bNto6yVZQgZULKjU`0^r5ZQ z*PBG7w>p*tbRfl~hk}``Ix(ru_QaQokM1SESt<`!?`nhSZc{J4 z10pBG@NorAg0uLhqhm#%r;sO4y(nxTr3=LV-qF=nDlWv$baWD)ci%EbMniOC4@^oYBA>x#)?2lASn zR^&xJ(Szw&|CxsF`;c(6)KP9b(sHcnR>fzkJ7?WDDad{OV%Ly)3}Jo@QU5K)}o6nSDmq|DfB z)!uygok-%?zb+@^%jZvQS>|d)z#ByfLEJILE2sZ;AtY|BLLM5db+=Y+_5DBl$yU*_kw#wvG!VEV2v)+MLD&`n7JuWCupEJOOfcl#FdosYToEjFvNMEOXtA~%Cw~S`^g|~=P{Tmw^ zU+z(LO?GD5uWP+Sv9Xyv{>az=PA=LhcJ~{Yyv4v~T%lqhCdAAkE%EO}pY_GiCbt2> z_|~D#)uo-HSJ599lCx@NcDiKqL}%DkE=jnvux{##0q*|t8%Wn1tDicHuAbm2@Y~3F zopvD!$Mtk+CQwQ`LP9t~R2+W4zL+p$yDqJMhQpHGcKIm<6xqV&$=z1NtTB{}CyJS1 zJfm}m>{-&f8*fopN=|&{7F+e`Zqck54xMVi%9S2APmYTr&M~j{&ARl4$%Qoe^$32u zzL-4z!lxb8{2mdI_JY=Ah_k-YXf&?$d5Tf;H&N8;YUBQ8!(g?3eDuu`QkbKYJ*>x<#2s5=jYs-2@OX+ zbUuEru9&!P0=@4tocQ``=RWab#qqwfXDcA8xxIZSPkta@%T3T32+1)-3<*eXqfU& ziz?1+lGTen87X zU?PQ^tI$`aw6<&264!^e-*|?1tEGAa>~vrVi3bRS1&pN&cz%coMi?i>s3M;n7e_X( zT}e)l&sfR%6KDMLYbR=74%~nF%R|aBLzpS2b8)wy6|z>Mwqe(+DN0;_eM=)gFK51DpPD#$gK9+|M`koZbApE^AYNXRiJ8t)~># zo%-^yf}}#wIT^v_ndFKEeLRcUgz*GN-W7sa*AE zWY^g^4HpYr42k&kG(+BZ5#)KV3i4c6M-H!l?+AJSACQ)GR0aKkevpbPtDidA$GY$_ zc$K9`R2t`IYM{fX=dxH~`yOxktpSqlRzk-COpsea9e_1e|pE`qJ$j?6H z7K1|++L8td0}cu)&U6E(=xYx0t8w0dxaJ^^HFeSpq1Ie>2BBWYnt!_puzh5uAq|3|sU^s^PysUy zNVQ=7#*)~y19pu!rfZF+JKA0AM_OhDV0kM6wL`; z!kkWWGi^dI2$|dpDM?ESr247hHp_Ou$|V` z!Mt&gn%w_-Ye)6H2@xDB8I3++XT&1HJ01Sff~b?W{LU0zyQ}NS%MZRXQgx>2<=HbO^oPtWQ?2_Ak|hMosir{FY`RjSgRbuo-(bkPpGsdp~}5J*ZGuUK}3wp6a4AD%k_pT9zBh!8|Ud^~;ig=IoMcH7{Cab3lWy zp}_}4g)N=eG~U<#+tynp1$Qa&T?GYKFA%b@Tz}OX!XhKaUw*ZC*_y&K_!gClTKM0P zcEcLdQ+?|8cOApw>>4q+3BFq7Hqo>nr2inP0;wHJWRYa0S>AuG*f+Rl6LLB@0O zT#;V#?01X(gKM?`CQh44{C-MQBl6vC~M!18^=5PL{`spxqjAF-FKtI|z+r9T#Dyzh^lM4>AenfNxV}!jR{_%BDEhHA0Ywz3y6~$5 zr->%P0AbV^Aor%lO=m*@G;d7*+D(BZb>+XtYWmCjV6ba_x##SzRLfxJ^@>>glTA99 zKDB_;ah}=?r6U=j*a4LK z#Tt{~%*sL`W0r@#cv*>$X_))G?h=M zPN-a|`SLugvQLxT?c&gOmIMCY8v|lk-H4pr(WR{ReL%bnCeTyh29&!B`->)?H8^42 zM_*x2m>j(cx}&ZbJYk3B)8yZ7qDLX^sVx{5Deh!?&X--_ZId&jmYhEp34(-+ZUW;3 z>$<*Z$AzPUM*UqinAVLVb_3=p-=Bh`O@Qo!ZXc`JU3H`&-6uT2&0NvAPx z4YB0C_hQ`CD(+2kWT8+c+s^ZFXa8SGWQ{ux=xS&QrIxUPrNQgwT7m{{y$KvT*4V|skDBm>dYqtfv-H-lt zJPK}|9Xqwl$2MeQ-P#Eo{WJhMGhn)A>Gi$Za zVkqil0}`aZ8}n0FToW1jvORpS=--HABLMw@9*PWEWXA%v204ip61t!?KyJHN+%ULi z1ETl_I9UHBFwCUbwfo*k%_ijZ!$%P&*tc^FIqzF%9HArMs*TX4EBkaZ5GaoGoIhMhEMy%q zmGnCkOJaY|>MGK2eR2i&=t&q>96*r|xJNHtaWlfLNE|6^5aY>b6p_%^vd4qu1ByH;t)WYIHg0t95)-A<;KUfVgEEc zXW*mcl`rB-x4M`pjV}T;QFe-f%kzl()G%%_5Ae^13X_{zumqW%AgUqFbw9d{lHO*83Y8 z?}aL*CK^AuvOdz%N>%9r;(rM@n54@c7-!=Je<&EYi(_LE^6!7d4tv8(kgK{na%?)b ztVa*MLiMQo#MsJ4UpL8;EWo0^T10Ad4;8xceF|dxqv#~}y&|sLgd_l%YJu&a2AuIjgKIVc3;PfDNK{guSI>Bxx%XA^IJy6S#jgISQ5*NONE~!T zOCAI*L~9?rL(609*1e&m0VTVt9qDgTEGvgE{9Uw>kNgpyJ&LRXup}TBcyTW!K;eP{@{S(J>HyFO96C@R=yigp3vZC5 zU&Fa*%_ij7(F=yK^X}xy4_-UtNO6D0iD1k>XR0t0m6A~8W(v%VTI&0+e+FFJ>N;FS zJ_27}4KZ)&uTYvudI#tOP|#t>qA&-*7Ri9GL3+F0NCVNbZ;GT{vo*PVu>7xgm73y= zH1zE5a&=zW{^{25x3qxTHUh_M8|(=7Q|Dm?N`CqU%eWv^=987Nus)ZyMydWDAlG-5 z26|Rk5k>0TxDP!0j?L9yb(LVru%9}2r57_-8r6B+er;BtLO_v5>gD9G#DSjGRb*#J zrN-R1rMmvtu!rEXbJh}W)XjCLv0>NMkrd|6&uO@Kk4izmnRmsRuB9V7r!kd z=t&Ach#+|?$7^!A>7-`T;YgC5cVcvX&x-?n|4>B<;E%ui__pf9&qL|=M-!E)D5o;n zX3ObxmLHYR0O$W4Z&6oAm>dRm$49bTtMB@T~`xV zsu;IbA9@k5FrY{_^jy#t{C|vH34B~txz99B8qzdN(==_8mX?yVlx^<4v$B=h_kAC* zboPBRlUeQp($s z87z3KPJXT)=_l8K6H!Fk`{M&M?1%j%ylh?bT!mSFy7k78B}bIWWVqo9$JG%)hvcOB zGZJ!iNJK-M)%VP>uS>|wAmU_R3c|yGO~k5=Ya3zzT-a6A`T$YA&EfJv;2l!|&N#&db254bEPA#Ce80Fiv%r zKBLVy66Luh#|Gf>Ma?Mo(9c2RbNKwe^(5f)6Z03qxA4|@ueEMWUcVJqA5QBNbvsIWomYkX zRVKzoX02H}uWA3bja)M%BB9M&&uwF6kF%GZ#fh_h{t_6BfR!DJC|zEyD&sT+8N0d2 z--C8d!)8@1CBd%f6|l0OnC67qInUMJ5N;rNkSO9>qM&dEAsinn?cTSUJad>9HKQZ7 z%i!jafm-rkxwJmUt~&$9vq3q}6$0TO6PgI6@L;oULK^nXm8A6oN}NYReetEu=-B(8 zIssL^=8;uHu3}X&fh@CMC|0IDeFAcb+{(e zUe`JVI^(v6L9b~To47H7AP;^Febr754K5|2!;ha0iXLKHQICWCkY_jJBsYPwKT#Ki z#40gAk;a2zk4xUfe0h%F%#f%V>bUj+O!OGNo;_mVR>d)IgvsO=mk9*wY9bn?bB;#E z6o5!ucxwQ1_|j%1X5)!t2g8&y@n<&k9e`s*Pf?*{r>y(&HtjeNi4oaud0F zSWH7NNv$*J$q(pp_R}U_UZEbxHP!YN#vD)u!+0jH%;4de9&pgxcAP7Ag1m}IaD{oj z9Sb_aetRc*39Of8-pUDVn~%~KwQB4RTQMWkk`5>~@U9uwYiTQ2Yyf<97Ba*M7d+nt z;qu@f8;Rxev>&fzoK+vrZ@s1ycCd(sHoy7MGE~x<^WlcRJvp6{4%)?r9GewMKpl1 zzZF*RypO{D!vhE4hQz!N_vv(eB>o+VyCkCF`#`+i5s=L(+kCs~Lt7LQc9lA%iO1$V zc^T78snPvW5QU|!;Mre&a(MEF%Q%hWoVUX?)!JMt36peIHd|E4%$88h6w9EiE+@AR zE^S4JU-&7A!!bxee*1E`DDoA4x^{LAt^}LIbRW^Rv-hs$_GJ%qRtF!z2J$^Q4izk|syibn3wm>|X+rKQ~LRUe`t&hWIqV zp#+?IC>93cbKn*xQ7B77_y~tZ{C8A#|EE+pNzkS|IRXW30CpFug#s)i^o0M%0iGCq z49Jov&jfpHCn`GppTld}J%h7XO3<1jxq3VVp4}3McnM|A+E|qw`YEg@?CdEfkcHNB-$@h7(4-J;d{&9d92CM7eRl(#K&Wv>=E`}C2C99KNJ(~v4lq4Z= zP1`>U@4FA!&Cwx<`Z5tgPK&)rU}z!K#eO@vyPeqVb6deK2wE@n3#r+ypgzseXh#$@GtTZOL%)H z%nXa0`I1hbuffkDT;eiN{d^R^ads|S^oGJQT4$&!HA-GU>AT61!KEY=`{g}Z8Gp0noxwaQQkAqfljO_qZ9)lv#vSRqciZN*$qlMttzHl)o~Y>r9i zLkyN`K&=T_teGKEGgs;ZLoYtDVHNuahSR~~?I~>C%2n{B5Yv!E?YNk2T}9d!e4@dw zt|02)biJLkbwcG5!Ko<{js?Ma?PI499KreYjgOOHH1!>fEb2e8bO@4j%^tWyh-s`u zw;jTAFaH?n;>u`TzF-n;*LCht_L&#L3$B5Zf*rdc$$h6my!v}zokR~@L!K&Lz2_6; zfl1pzkTfC4ZRs)z3;5knbY8%PavGl^!J`6*n2>J(5Ud=~G(ggVHwExxNq(GXTnkF% z6kYzcs!X5@S8N$Q7+#ncs5(yo1UG=dLQF7VfVN9Kg3T6O>tIy=kL$=m2(9bX1?|1= zRUvfw?CVc?Fns)aI2c6I2SN$V$B_L75CjpeEt!G~ZsSd4XdNJtLLdwnN}*;e7)`nA zm>eW`mXqu8GYL6%lG5zl7ZR|l|4JwbIk39a)%O%wOY^tp?%%g zTB>siS-N7FBTadk3!Xe}g{VQG5XCgKf8Q0Cu!j(LLHEpa)iwlMKtfv!5RjCc@>%UM zWv0mUK)1nIYD;P8@I{-!>~{OD8`!_x2AXlC9?@z;kjd$)BTf7~9E25$O zZ>%}tEL+RAZs#sR(fP|4HM7S!m$YFaTRmZul}zSn65a9=tnoMZ!y1cd5VLfta7s+v z%4vA>JXgph)4oipt7KS9c;yk9jxknqc42bYeikN0Oan*x-4{U-k?L}m{w$cfMgmm= zGvS6r&X7?^3l0MpAOhM?)C@OsmFQ;vGIHDnRtO8NHOL97q_3LHK|@ih=0D-Uf>MXzat1*faMOnfTo7=s&@DJh zvkpM3Mz0=%yGds%yZ?uBxSPOLU}PMCkvjoKqvt+PLJgjdL_mYNpq*h7^eV6j%=|eYvi98K54FI!S4=yVx zlnf3SC@ISoxrnqGa+wC5sO;XypMbc%tG)ss1qk=>JcEM5Q1g`oO9uBk2fxjog`n<{hL8C6}twd10U(X4ob@YqGuRT z=!=|U^25v4F%N)3!fV~Gam`k+gggXs6^Xo#;jaz5TCkr*Bveg(Ot3fqM~mCaVA06K zjfPinmY9YloX#|*OBbAT8bPN#{y6Xvk&tF=;vBvV>f|@U7B>Q518NtppS4-)xY|n1 z%6Xk~(-W|L#WYB5+$3`VRO0yk}LnYQdp1X`iq4ohumRydHDO z9kNAKp^Vq01+(7wVBVhkF*&ko2?ZUF54H^uedxhW^$~XCfAdEam-WpbQHmN}s^E1~ z2zS^l;XtF%X0-{&F{uJO@#4{m`avG;H>T0eW8@V3^3$9_)-zvS-j~W0 zrKE7by5k6Zy@DiJb)Uv=lIkFP4O3ar|( zYTK&efj>bDrcn2;RIAfrH<^Qhy@yc(n-2Ii6x2|MX##dTb;wz_C z_VoX*|CRnH`@gu1?!T#@?7yPl)PH{ey8bSx|McQ%kDhkVY1f`s1?(s7Y1>a*-S>Xq z8-3sHd#LZuq5tXI*H`HC^thjx}M^~g)I9DiEoW7!O*_V6Y z>HQ&~M186EmR_oNSFfcP>s_DfmGr#T^K#EOd+zPIzNgl6nZ(qi>p8n;&GNr3|JCx= z@<*0`Zs^)&`fSF3hctrc?+ZeEvysD# z8GP24&CJcp^TTnWy`-DPYi3W4w!|?eN+|i2XppIb3oDeOxT-!o7dONdAHYICW<;dW09TzeSx6NDKRo=v<9ors#%e8 z@}QKB2Hhy)=DJ%?DU9Kmtk`>gyMNPcYHA5gud$TFh9s2F+VN)l?>5Z}o1JOc?CMe# zr@gW5Je+pZG^@+v313i_kk6^ZyVWXHdm?mAlc`Z7>Iz$=o;M~Hjl`<&@O(_#I&GSh znuC=P0IjIbp5mL0Rag{jxggEv=!z_H>7RvW006cH8Fw1XMX5@`^?QDh#(XM`N1Z7q zk@n=1jr2u4aA|Y5F+S_VGWl8~9FK;HLUub3+1WI@RR&qMCda~v;ACr`AGf zY;q-?4=_2mYek@VA|?6 zQIoZ4t{4>;3jFo{T8&UL#)7^)7moQ9-Jjt3=-mcD_=&4RPM40(V7cwT;@fq!*-bbd zxFVyD>%7X;C2tDtrAPoXs!9sGjEuOAGS64}_T2y<9mSf?ST1W*I?c|)#r*ba>XJ?w zlu{{boicBXVTv0T7{v+=*(`)J*#X^}q6zy|{P=b1N->(XXRT$wU#*Ev-N83&D;@_K zh*=tSvrXwst^5=JXSHRQ0ZY$P-rdsjoQWwE?Q4bpIX8tH6$WoKSKPbT@?!2)zuOt6)qRr<%A9Q zlCGwgu6O~h{`}qi=4xu{G7O{3G(#vTEKFpiCjJMSydIa?3k+$9JF4&sz4$GDoSH;6 zKt|`PC3}(}?6UKEh2|*cDSJu)Dxy=^0`bZF1ukK!5~C_Qb=hv#mEx)X5ux3-yBZ*@ z1!>rt#4WzOs_R3Zpst!I%%Rj_b%inJ%w_a^rGut=mWkmm9FVqC)u?+`x#n`Ae?C{m z{YiZ_qf8{zjm(z6@$IUx$4RK^QlW~K4I!&~_yeKcUw16iWt_<6O<*X z4fi^O$h{Zn8Bs05LB;;`R5d>$x-3&Dw-jq z3n$%Blc!=Utoe7oyP}k$uuL;ItEf3k3T4XnDZaZR9IugNAycqNLOH#1dAkG(U?RI6 zMcjnB9m=@dh+Fg9RtRityWH%sZY8ajUdjY7LL(;%prKBS9k0EL@aDGXm;tyuzknVr%zsThF|zQT8xmy&T@ z8}=r3yPaW`OPbU2l_~xXDRibF{2=bd2xS^VhO7<13&&>u!hf%*8ud(A=&r2+Dr6%? z)v=fp(CW6oz_-gvITdb~hj4A4n5CNOZSvhbA6YVM!kS(mqw|!Nhh!haks$6oo~{V!dxjeYFT?`?e2E1mZr?DvM|L+ zKAo3237Jh;Lz$}-Bz70w%8bh30jX7w^WfA?nJY~ZiBh5AkE_zkWV%lfDw(kW3>3CZ ztlTUqP1!Sg_|XugEQ(j1bsMR$X`8jex_5+j)vS~Vn!z=oq?mL$xkZ>{LRQLP39~$> z!8NV z=G+LOsAo>wE3|t6P{f#3L<~CG0X1IM@$lhI+*!u)u&LrEZCR8s*0#)f!@$x8b+?s%~e#ne6(y&|NLZR3=g*g;HDgIrX{?LNnM9vAQ&< zGGb9OQ(5V5b7|~mn1TgY5@f3GkK?gOQqRwEgDD3pc+sm#dM#d)p&_^5%m08WM4>Kp zwn-Z!VT~VCyLp8429ubT7aI{@NMRzimh4Jz`_DEQvngV5py06` zjOz+;&tRB*cH=jBHWVZ&VJSHvgC?64mBCfN@sst zBR$%6>#Cm7rkR8LOP5KiuCeEXky!A2bnuF4``JxZ&O#DpN8X`S=A2b~Ht-D|^p5Q6 zzhTfY5bJxQ_bpHkMhVH;)UE)#k8Pd<{^DbDn)0REls7*<{uV@?h)76tyLslo_4HbH z{cpHewqu?{{Nk-ObGdRVh>^OQA{lHNlJYcK@haFCM9t{zFM%XxnF@Ny>p7pH#N1VmUIZwf#<^!u-C6g+TJ9Q;k5s|iVrTD{vO0C+2=WAH~x#9A-~I9 zup6|2h`GYl3Eom}eFd!DA`+DPK5Hv-#p`R>FTTQ?FzPTm-Z;egWF@U^&K+@PTz=cE z8$#l~2NNS|Mw(~OnBikGU-=$quG}@>1QujF%0-&gmaAAoIv1K#5;Pf(q1``$m`rgq zI(UK8{>V=ud}Kr+mxi*qE$da5>R5o(WqG?v^EI$}h-oNhx^U*e8Q=@M<*XYnM8i9t zJBoNm@XyFIR;RlL&l$K3LZcr7yX>lNwIt2SkP{q6u2wgUkhdK|1s9_dQ_)_1#N~6A zWlD7Xj}Rs)YDSVjKfe|2@tzOBaqn`0NAA`#V8NSY%?uIEVRKQBFKoiW5~)I;JO-;M zZbsO%;N!VzMHAv-k8zUVYe~3?YMTt{5LA-FEGB;;sdp)~Is%>dOPFg>GaBg+3kZ() z{*nttwzawz&17?i;9Q~VpL6NLg){>Z{ylGkuX|}LAKc#tUTnU}+1cFlyBEJh8zb^2 zTw5|1ow8i1kVled!J1!u1GbZhgpLQ-3vp@lZ*XGcp1*pLO*$BXI&q9tSB0W<$#7hb zUilxG4skOi^z{Ii%&#Fr96}#I3ZKF632$Amc2r7*l%DcQlR96Vek@fd5eWGS`@cw&dQ02axCfTQc58<*S<6XT6mOs7h z?ZL?bdB00C-iI`?Ga!lSp6<6c?DMz!VNh4Lm&cYPjcS>vp>0~cO{s?F953t8fBzr3 zYDh#v2NhEgP!e<6xlz*6z@6?wowrc zY2I5tjfOtItOwn57~;jBI?nAaR}1ih1j)tV)?>j{T6HO?3t6F>1;=a*$^HP_Ttoxx zGjI`Zy56`PwP74@{sU=}Oag9>z^Y(K1a&fltZu}u&5t8 z_FumQPen|%{J>v6y`CNYGZ$YNZ>=WQ$dy}v?S+_0aTRh#6xP%V_LRJBAAsXhSN5w-HbZI68b zKGD_IuH}Cloaz1HfUWqBbFm2%=*#G0mS{Rc$N%r&Ilua@fZVfI19{_Z>+tN$~{3;a$TWS@^BcUKtZ%HfKUmJt1_sgjX z_P-<)#6pH!9LNg~+r;Fe7zULQR5=Db%wz;$=i$@PhrQIukcfsPx7`Ma*C^Z1Ua^7- zNrr1i&#cUtOw1*U_Ifp*LjToAZ5O^jx5#GcYVm70hOQZ=MmjB|z~-{mR6CHT zxDc?y6|3iJvP0fnA(DqOw@}O+>M$3%sT@NWj#0yFJ9h!Bz5RCdz!-HZbf)ENsY9KY zXbiou7UZPUItl6icdw%WThH%-Qq)jwm*Hv}Cv#BN9tr>lv)s_ew@8($ld>l}_C?1g z&iLnPeL@INc40<1z)c9>0Z+7na4;Sks?KAOBTBTD0eXCbTD_)I2Nb*f^9pon&&U`$ zdy+a;WYfM$iUW1YEJijh6{`gSv`m38EG4xiP6%z_)f=~mXc!nlO zxjF5ci;=TdxRg!9UKBN>y;r}pkj?v(t<;%l&uZ%I4ZefmgcJCPbfKU#Ig}#lKU0}p z2*_;`^xWB$dsBU3HC-VHlK=!<2+oB9%3N7-FO*sKpm(OJwdlr8Al{vOpjaRXfojjb zGKoIibV?ZyZUz}wq>Bnl7NE>hW5tv!m2vLV$I!+zK*mKh^wJ$qE#ODKvxQqk28xY` zAnPBGkWLe%*+TMa1hW2l7L7Aue4V>+*aZJD&7TwNGe!?q7AHc_)tRn!TP2HQaZ0~Y`yMCyOxX!yms zr#Kn}*rrF$r>tCvVR>P|4u61j`XQs2D^nf<#NjpyX12tiG|qD<0GjI51&t*3{Oj^P zFhX|?TrntvB!X|k!*!zDBDoK%_DZ-LWgOBETa$}#v{@|0#5`JgRoa|u+Eg-bqk#`U z3JP~A31ITd?R?zz?1szWQZVIcO)OrPb4Dm_p-wg#+69H)0n7rp%nUAVMSFK{o;mOv z$a?C*DUD>p-devnib~98Dk}YS+2Da%2z6ti-i}-n3 zyEvMB!W99}mrdoIGY7269M5K>5@vfT2_1fEKirh>EKaezmB3|k&Ekd5$mBz196%o% zdG}mMR?hHDEOHo&h=vYcYT3#H&=h39npgG&nMHo8do={(P1$SwCMBO(5`36b?jXYkdF<{7KdfQKgKkSIa(qDdAFRg&EbY( zTTDmMx)3!wB%&dSt~rA~=m$Pjh;m9ss#GNdiIjC`AQyb!(6K1<#T!yv>obewvM z&(w8BxG{KI0QDhUq|5bWEQRMXnN(h(#b#p)o=?>WV-V5M!85mQMZ=RTdfBIZR8X?P z-r~S8_%IS%3G>YoOn^?fXXR#Bl;HWqcEWhXG^l9@iC3?8*VnN}c2YawS>kO0l8F$P zk#M<5DQ-ws9p(yYnuS>P_Ltr1ff0#le6Tu%xJuhaUoZWy+3+OjtYdV^P zYM}X;oZ~aL2})N$jii&FU7~)ddhbs_G=B2Y<$U(;@yjVlZg#e&78z@1BeP*FuE}In zQirYtnduy3WDbCwiD-Og`h(pN1^cA{d?|nTlU zW!97{Skz66FsG>+wR%`gYlDcvw?p30Gc|ZLPENy@^R^g;o{R=ClR{-`#$};wM3DU3 zs<1R78mb0<3vZe;>l5rBtK4fV+~RWb`InLCs=?nt0CDkZYN+EigvXb8>}m>>eLI2h z*lr4-EF&$zP7pxd>cOJHO&F`Vu~IJ^s9+KuyA~GZHxxBIET*9&)-9K?7Mki4*wq+n z6AWo9@U(o31V)<%=jrg&~cBrLIrhBQ4t77`I=NeVD{Wi1YhfzOc0d1|4$ zw&K=AtaFWIRd@nE&A@z#NT6Vk&9F~h@`+6_CNAAVdKEmIM0b*f`^xUCU>qV^`@X_M z_x|)M7{`I(tNl|48*tX23r3bPop=(233}~DYUJ-Gh&_C1FagnOJ|^2ba63-kXbr0&)PG%0Z441lw!mP7}PXk{_q0*LJ3&W}y~79N>CMNJh)SJ4NoqA>qNFEjmmFikGm|r>NmIow}f(F?l=?gY`R9efe!BH z3@1w(k;VsT125k2s|hrIEAb&DFY7^L{IiL;x-1S#=>M#*2>21+`#x1k7hjzLY>iV6G zuqEmRA@I{@qRPY9kFjsvMM;DiTy;0_cC^l0{O-K1qW0odMM_5N?M`W)AL$=I1KLYO zg4DWe`Q(4(|Lnp%R`1}Hw6n#5aPSu%CS*6II0)lR)or2yL%DsVZHBsi3e`!_h&pjU z0Oa_?MeM)d&Rt;Lt#g1Me;zq!?RL1gx|;GiODq)$U z5Lq*X8)=mkczsIu!q!{b448(yaP<0JMP_P_~pXOFWc;DxatsiIT}m`l+VE z4o)_(Spq_bs2Lr+{k-k$p8MeE9hClmf2o7gM@Rav-od)R%>6}0i^Bxr6C|5qL$wa) zT0EUE1-x}8%j=&n+z%@)qM^MvC8t^EdKyX`4SkI|UBE}()z!5N^}qA+z{V~x{(;Ly zFq15uJ($zy{{tptX)8CUTq%yNfE@YoxA;>R&dc(l`fw*IbCety_LE0XdB(~g z0|ScnAUO3tbvjJrm~N>^bCUk%W3XYCHn$~R$n1OJn^X{BV!e>$6d@cXxOCv~4^$)p zgt!8?O~$v#mBdNL?2dg=?BP${Jm%2L&wzJ~&#b}a3gQ1S)GkZXK6mM^LH)qB-3|%e zf3)v6fDp5p({M2^r?0gG1YbybfdZ2uJThAdrqtC)BbrCbXF-2hmNo-S(=WH8OV7G> z0zL37^;cefeD^un`0myvi@b_m?z)RGOH1|nPl(AWhuKbR0 zQldMa2Ys}wrGwLrFWh6L^frC2MEIjRI_Y(1km@zyCu&6p_ZrOXBd@`h<{Vrccn$C1 zn$0Fk5sa}o)vCHm?gXT|uO9)GAZ|tn@3`5{65pmwP;#iHS^VQP8E-Z!xvIO`v=H({ z5uvBykBeG)&(-?>q`*5yQEtpd6k^#%y%K6_6>;>@XW;LNo6(UN==I@c&9&@1?_D(j zg}na@=26)?f#gzQTv0P-_5~VIRag!=4#H#Rc{n6QG+?%ShLwJoI~r9j4poK+r*!4* zn4buy6Amrlzf0Xvv1A(VQ-@xF`;?f5HY)+;27Kr1*h_6R3}{u0I(?jv6&df6j1NvO ze_>!p?^pVh%iiw0PvX4>4oQDY4-+N$Z)Fa5DV1PcGG|E>ol~_p?36-!@(skcqz`)O zt*6^B)^+T^y#yYw4Uv|0@hPXBRhMeAsHvjLm2zRVA4hL|A0}SZjACy*0`K(wS(eoy#7icVI^AHCzHyKq zN0E&*K(H>Qp}m9Pe{N^5vm0p+eI(SfaKmV4f|eTwb%Y26>sFIjpRrcsX!y_6IC}Vp z)X=b)hK~HUpkc>;1i}l00SFvnFxia1A;mMEqBN5WH*iayn~gDa=!QdXhm#)Q^P~gU2ZQM~XufJp}%1fuDF? zV%#)AsjGM3MJuMUhi{pH&31H$*tmHhu2a3P^iF$Ml zQq%#}I|Ki6>ECbxU@}Y;t@<;y?G&V4&lLXQ+3?Z#snK!0g?57f!l^G7;ROy=A+-4j zoZh^UJn=p?GTNaB`f%Ax!XbIiUru>QUh@|?BpruVz&cI04@r@@38J`3fkW;0lXBQ~ zqJC|$T)-6nfP1Afke?e0LWM)FS_IUC@keA%KVY=}fLc2(hfR0#lc!^6wCkC(|KZ%c z{~WprnKBmg-)w483sD#RBEvYKmD4Nk)3GgH!BFkrK1 zZm$3fQ7c@HRxVggE?Y)(-rqxO79U4 zf`%1+wTC{HM`(F3eQ2a9P8)!+f#0{69vK#sKrr1Pn6H1Qdl$O9j|RI*9xNHA0O@7+UDWK$$<13xGI*SB@a}X^p?O| zCg+SaXx<7M_lbUbXslxoB-uJ(McY@Nazgg4gb5KTYf$8h0az_jb6bZmczFk5E}VMs z@G=&;%LFOg`d|slcMx#3%W}uS^jJsgKNrX$dH`Vl;Hi2sJXOEmy{qpBk{eb`@-Tng zMUKPH;xBR@S(t`O$;n!#DV4``4F#{mE*ql(hhQlU9slCQGz-XQAK^}3Hyj##kqxY2 z&Ec}SWHXa$IqnPG7=I;h*fgMDq3h66C#a&YHXJB~{v&TSzdL-&lp07Rs= zq@#DRJ(H|tHOEHT;=sH3$DgAd@?tV`DUrjhR3+t+qofn2U(}3_^$)f$KJW@V=Az-5 z9d3CRk3TOsqs&+_;i+IU%pb1F(T$hTY1`>L*e#QE`z6YOYVj}8 zlEKY5v82={V?5ck8?X?ror2F7HA9)Foe(M`f$+=+)Ms6Y-hPIhKrgOuJc4>Q(x<~I z92*fYTOQ3xJFVvNKaIQAq?XgG;a&OnT@JkQ1K~*ds{E9@ za=8L_rKdP&(#hfhwX|4G`-lKUyXrVSrQqayDUGw7N!d+X$37-OcdKXs+DZV-iwCT` zTELsm5D`2egO?@AbJ(J$N5(q#K$4!{{0r4MIMuXnK{WxE7*z8$073$sR3)y|gRun2 zTO|6z1vC^<>rCaKS1oA!g{Pc>eHX$Eh{aWo6c@pQikktjVf%uT-f#)0r1gL}!CiCw z5jp~uC;(B0bOJsFw)9`+XmAg^S{&FEuil!{B?%4) zOMy^6rJ+X#mr~IF|Gg5t>5*%v*v(pC0vhTB5|<&W!HQV5T+*6Cu~-r8hik#Y&$ul9eTO8AusQ%!U*-HLgf;N9D}0xS0=zUw8_tB&XVSciT^~ z>(D!Q+&#>GV24Ky@9bPCkhZRWFBC|7tM{|~+h7NGmj`F9a6js>F#gU9BV4hJLHhFH zIKddTgkPR5rVTO(Jwu<{4;tawAPB`$5}Y^tFjiVS>l&z<9j0AdMh=|`80uz*1*$rb?6K+qdF6t(?A6x7%$sC-r1?U$W$ z8uncV(;yacxL#cjq9|?_+;batf(CPxIA!YLlsG6>&OKM;)(KAaouI)wQPGj7uK8E% z*n%1xsdo)32I3G}^jPmNdq%r8685D_`#&O?+GlAcKnL;g!*;E`ggdNhlD61N(JHD+ z=`|>RH9b1Glmh;W=fQG+ECzD>CY`O=A}5X2E2pVQRV!;M^m;&4Nx^v5W$4v|ODSmY z2Ll2y3zeb4rO&}=@oH6HCmKOQrcYqB#$_r(1uYoO*1@H%=-9zLU^0iUo?u^2z#zbL zcLi|ZJ$HprHiO}E1F5QH>%kmU@Z!E_6E0K96em?ug}i|!{g7w8D8vG7E^vC<-P*Z0 zs$hw6)@3S7yHv9+}VJ|M;2Ky@wr$5H_}m^lZ+B> zUlQFI0~VrY6zl1S_%AL%LlTEkOc`63bIaXU*R@$ym<-5Nw9le3%hg%rEdvKpYx~SX zuX_}e>~m%M63Oa(7s$|?J!=4%`^JG>_ob3NXLj|rqg*(|A|8E28qG0EEKDVHHb{_B z`_%kB>Dn9U(IF8HNuKmURjk`pE70#XcaO2ZyMdps{NlF~C4C<9g(C{Wu9r6xaICd2 zU0ZeqhkA@@R0qm9`Wyb3F@L1o{T33~@6$jNQGJy{AE^C8szW&L%sb z4e0fe(lC2H$-PCwt=!@}LZp@#RQA=iQ>bio&y$k%>}xgdaXX~`O3{<$q!|LYplTF$vPoIg z554r#Z`;7}6YNtrfgEzLV+eH>^cV1OZZzK33H%~sIxB-Ldp90##Ph{+ zLD=*cUIQCdOhbFOp0@qKSFamqKX(niSd8KmU41Y1egK)E*Y@Arv%Nbi`2=TID7R;h z%LC<42)o&+R1on>rtGaYAq+&xUpKzKX-= z&+f{UZF5;r=j|KIb+>_BEG6+Oy`4h$tJ^sFbhl{W!k;ugKf#1+RhJseFk}jkaa^W{ zM6GE576=Y`@Qr;F?3!D-vkpR_1i`ZA8+o-XYnZF*a)ex?0pI&)KnBFk=vZ+XI43Hg zi4vdXWq?cDVy?7Qg=ppdxSQC=a%XsJzuS$!r)BNB_22^s$#^xd$k zVj9Fa?>UQg|M{Vf5>%O>IVfQIjMcqe%YHUEF(8xl_B;FX%OC2!8G&m0{f2#k)^1p` zkG4%hv*uDjYKWurpQP8J9S7;bArT4f53PnIQ0!w6DSHrJ50mcJRf{Wc zv^Mq4QXnTaFiZmKMS04g-`@E=y=HJJ1y!dXSj?H5V1r)(VV?>gUACA_<;yE;@kBk; zu;NOxD8-TFUV3J5X)8pPz9e{-8u!BcZ$s!PWV8ytnUdO)^kWfqCWeJd<(EN@H^h&2ElN*0N*8E6S0-m;iIBSKh@;Y1KzhW@=yzD{30BAUE~iFH17iis5-N1Gnzo(DLTjpXb* zOn``#zzVDPU;zG!@oRGtOAoK@+yzGQ$$uEY_P0mq(Q(EKF$viMI{rU@dIoL#VP@crL)#VtIl$aP0mLyt9cKV#6rhg51p^N&3I!hpJAP*> z1cw$*3gj4uTofqx$`s%uArFPo5H39z;9ww;`Ekz3)S1fe?Z5dJ2|DjlsuxW>L37a? zStzNe0S*>9Oj|LkH$Vzi0B>*7Ei&~PpzHG!m$NUMMo++d~jwVgyXN@qE8#`igpd=mVJHT<^GTN{jMvzBFGnb)pBM7 ze9>$Gn37mVRyBK+B_rtxClhGyMc756W(YX=a3PiHBQMkLN$(-3F(riO#6t>vRgZf^BOP%S@s8C1(s3flh%#e#F@;qTM#DeEB_FySk$Dvd6?E@&ckvTP&+@zLmv zS3s>SZH3AYzgnmgc-pIUc-+LTA%wW(H6%A(U@Qd}q=QB`J`X;On_s1e)^zHDb{W$D z(1*o&O3?3r2nzu~{~U5O2&*&eG(p4<_ump!p4~sdjG{As1SZ)|U2fY2MH6rN?Y%ST z_8-xw%8vWpkLUw11rXIJOaX4896>B7mHYCwVxXqs|Hwl>hTDjk#2yb;AC#a^{sbl= zUjS>dhN}h$j!0vvjrfa0B2s&Zr~Q;39qZVG%T)c>oJOel8aEYCW&!G@LsV-P0-rco z-6+VXgXH$`D7xo0dNmX>=+p&a9|6GlOW#<(9%VC5I#sdOG`VTkuP^o zANb1}NJn_){`KsQ?{W5o@KJDs3o(1RAs?&Z$yhE{RFG7VN}$8rVR@TJ;65p$0p)M) zlWl_i!4d9I5N#CLKbJgxiv7bEH~9L~a3D^GjxJv`h%VhF!u~n;na=x%OLB&n$1~jD zR{G~MB-Cb)v{+$*1@R}YD3aKb=N2Bh##vc+djYl*JL(HI( zX3)#e!MH`u?V=3aa|$j%zUOJEmwI#scN1to?w4*(*s`$gI&N7c?b$NPF8eOrNq|Am zA_K8h^CElY3mpU=9r?_$OW2>jKrdz=2RZHbHPCK*``+pbuJHHtaF-`Y)bt;MSW&?! z>ajTDfOTun>PmIDKN-%T`s?tOqGrH(y=y_c?fg0I-rzd~71IRmCK7-J;rQv#VUk6( zws0&suzx{A3bXCdMXawjSrd9(lG2EX%Hu)!UA za6aeZ=!bksE|fizhhPD)67oWI^jGxi@l$j`$DaF%6=~l*rK-E*O)y%DByvGocl{6S zG7+sUt%74%_7>+D&O`NAuC|Ll3CRT-2wq6Ei?s4%W8VVh)42;e{`ET{Sm~^-;eQnD z*LID|7Yw%%FkwUR1Krl9xPy#>(+#}yQZzfoKyV>M+nfls>DU)S{XQ-jv{%1Y&$;k`yoP%~mf!*DIeG%CA)m~df;gSdmIF3hAX0=>HSYYm zrkfcZ7SqtNbzo6~+`e_}ueup{y#bDapg60txKj>k%X4v=)Z{bh)I6KeyCBLU8q_%Z zivall_`6^%n;3y>H~*ToqzfTm)t+lG1!qnJ2;c3oyzo9Oqlg4qYM+OI?hNEXo%a_S zU{Ep&9i<>lim24C@>mVc9RJ&ce}&(QXlU=c6cZD>?N%j|i;H(G`lp@TAnP^6IMAb?v<^ma|1;CBk zA9DCOs2?$n2WS|2xv`EN`Ck~#g#PF-WJx62deF?cv(;pYsCmp}NXd`op1;z)Q}QLo z7Ew3OQP(zlqFsNc-$PFgtvmx=^*+66gX-u2jFFE)tV?A8)}Sh8GgPDGD%9FH=26u6 z047XC0}J*2)9e!;fZdGC@~!sY)7R?#YtPx;p+Un*S-ui2py1$Y2A*^7qw8Uayf{SMD!Uhh(w$zS;x;?v32qu^hQ-ZDvtreBJIl9s6$7?v z$I*4bg12o{ag$m@R5D7Jb=I0xnc^G^s8K~oiIYoo=*0cF2k)8amIrI=*qx_wOr1x$ z)Lh;MR#GTzVZ!Au#hbLu?hdzweGEM;Vc?m$l!iP*u<0RSSscv)+4n*(Yx(ZqO>eX*Yz9b8I7 zuiH-p8%{SMpc5-OHp-(Dz=pS6=!!ac^<-^+TbXWPVD9GGkb?}=q+CivM>KcOKoPnX zD>(b~2)g9gp$pNT2=gL3HpEO1U)eP{(|=$f-}g-K|Mg6FyV=dP9jUhR;*x#&%~~nO zLuxEb7A#&%088+Ce{2(`B%mtz2~DaK_2X|Wt~2YC=*W4@2k6Bly$uR1GEMnj(6ML_Z&5_Q8D&1?IS!368>Spbp|t&iFqWnA zC~oxX%tWN7r3(ChzHE$HGgMtlg6fCg<}9$|=<%_I0seF?vtfhnD3=|~W58*0HltPs zfX^0pLIxT2I6uDa;~+jF8dyB9;LWe-+HvMD{P@1Su06if7bVH2sKir%-_o=@wE2R@ z#q;~Wb@06+5_;)68~D(w^m-Ip&-{(&M^6Ah_t6c&kDow$Qmswd!=6~utu&X27#;OFQP3RV7HL%D5p+dt}L+6K9eft1C^BgKzLDX46#g=oH)%d)n$%bVE`h?M6^hqE_U2wz7j|H!@Ju z_2#Y>y*-LSGvM*vJkaR>eBZ0wnM#6K+K+C7(ei0uk=$IOffe1e#)=D2cZ(`?`84nq zHKUQjWZMF{4z;G4zw&eV_6&Tv?!!&>qOnq5y@N|C#(;- zQDYPxKWE|VSDy!iwH!U08*F=lnxsPIBy1KVL=|NNaflT2I6*gvo6+${0VrbEo8&t5 z>*pVvK+@}kUZ5xJt@Q4~d%5=E#`~29h++TsDkVEV?{y z2>D`3z+AM~(P0%_`+k9gE)tQrnzRZ5T;wqs!_@*afLXv>aOew^lMAPW*bKm2q0w1# z224mDsla5{KeXi?P%x{(5TFHQB5yX5hfF0XeF$}S7?(dmpr;hTxib~*W&dr#%ypfL z83rZ+(qRHCR|qT?9Q2XiLpe(UImcujdS1n>0#2Q}AkVeE3udm}7qmH9Ae2K}a>8>3 z5R7D;WiY}dAdN={Tky#Xn87iZze5+uyv+((RNIuXxyruEp-aHR7z2@p)Vdp*kf79}Lh_Q80&s z=>)U{7%V$dPqv!uU``c%T-d?fxw@Of+_3b=CEa}=?M2I8TmA(168_D`eW9c0gDCHA z-}Fi)r>;(@Lk-8A-tSA;GTgU7OytsLbW8&d7eEJ`Vn3;4%nXLENF6(%nITh*x6Z}FJ&Ly2}6K{q@!FSvEcMEVIj3l3HfbR zaJg_M`QW~(vg-|wB)Y>2KM^-0 zP2hJ~>}i`uHxme27SJrKBKU?4imhBl!_Og%Xl!gVD8B;A~XMZ}l33Z{_03&Fy#5=_(mRNUoTV4A)*__<1iO}*={23GXixr@ZRnmGJ~e~Z%rd9K$Sce;cdVA&+SQ#N zJhMkXVDI1G_sWXXCG7s#U01?3cOT`F#`%X%F(ysfF^k^abTJCXCQWiHJ&MZvK+r@q zbR@B|4VpT^zPOKj1V)cSPO_k~M6%7x{Y*!Z=dH7U^f4R;N$nT zqfK94H^feO8L)NYM=yYT%*E|Xk~UrT(#487SdKNVz7j84s1{&GRxKf+gPTHI0SS6c ze3#gCF9YbPL1x=XoXN^61l5RQX@X#MP-zerW*nUxVupsrG<5vlkDLXdDEB}V>+7Eb z4xb4#XN~w8Ax#y-8bzH7_c4W3k~?o@G#D@qF8ckGl_fLG5gXGjL2t*O_vmW|}J%0#1X>mPJ=r;1VWkWe-2K z79#Sqb8!C(*$Nb6GOJXMB8?Zk3iQ1>cpEKkMF(F_ENsxn>TvUla5>5OEZAoQ#Qzia zFmUuU{|dhebg1VljDBEmsMB!Evq zgha$EJQNUpuFuSfxF8QfKb;~ zO5uR3LI2tqxv<(A9$UN#DQ$UYAKCVcHO~LbS9x2lwRRm|p=i7$cu?e|Z zk=f8KOnrH)HHzSPAe$I$DA=gy5jC|j;MdVdvadqUldaaOb&ED3qqkhuwZP8kSYV~Q z?Q@yz^tBX8`Z;^R1=GoltU@!1+`e=T`RrF)gQ#|WTukvIP4P3r{7>^ZJF%bSE^n<| zpM_R4;N6NQ>uYUId%%bKi^yW2+GVHgT#-y9J8s3=7i*5pA01|C^BF^A&4H7u`P=~* zX1OIRBZJp3=Z2)q{$KxS@4lWK4L$Q9jKOh?W@z)eE?~?Tf|7VqsmhnsS-3|!s;+bk zd^!tRU607?-hS?Dx3og^QH*A4^N(WAd@f^Pc?6%`t8_7^EXXH z&6|+bs$#vrXbD&KQC`fa4?>K9MP6QsI)^tuhw_B~IM_m9kLwuCf#*FEmO3j6u@f$X zLQ%-+WZo<Qu-Wa3qm9|6*URIlXo7%2MTy368ZSfjz5X}*C7n}CgfYs zIgz5#2``%kwr4U?GL-#fHi+YTErDfkUC1JDC2c#&MJuk{!Zisxv)OvgIR8auUo>iR zX{60yI-t^y(=Qr3O~EPwfBU}mrCHbtRStI_7vlZYoh=%;=r{)BxBH3qY&l$(7~&|< zWG$BUS%&|_|NIm_QNSZFTc^67;LV@LJZ!NX)1h~~QwFH>cKt*?8}ypgDOI^UQo38I zn1w7p2c#2;d(W*@jPsawen~a$x{R5rtFn2O(&}_u`K9^V?GPhik;B*bc0;SppQK_; z#|(6=I!Eq!T~uQwW*H(k45?UE#edWdcVLAJS+_(!dzDF)WwIvkGGkV~j8KuV5B%G?9&S*aeK>{A{R298;a5Hz$=O75aePnBP<+SuN zdxfoxhir)0wdk~+4y_@pKaaT(@QCX#Pw~DsZv6AOmTq>;e^x-`3(8qj+6X^)$Y?iq zrEm{GihxIsZt3k}`fdCIW^}9jm>qKXfcBWhR8mP?j+ROn4Ok2Cb>XYlkYC*gIRYN< z>>6oSH*)IxG0a;W$7uQ^KUMO4DwdbHgT`XHCaM-y{ARr4FgBxrMGlv(o$G$50PAY* zy~DIm)?-LWy}Hm@W#M32l4cUxdX|l6q~!?-->2d|=#zj)UjF^{)E&N&%-jQacxRRU z`QFwX494)1WuNGKa_R3n0guCj&i88>{EB)ikmA)fxT|8{gi@?$qQS;QP+dmwGVBOk z@fVW$SmjO~gZ{@_2_+B6T3O0w3M@o-=BpY^Ucff*Cn0^I}vQj9I^>%JjDCn{{H3G+L04j%;&Ah4zkoYa{C{}Y;5w*OL0Yf zA}8ArJ5*|CO&dU@GF6P8qnHZ;i@sFym@XU&DujBr#EyLkVx~KFN-R~0w<1Z)T>fZG z?FdMS?8VlukrSwgA8?sD?nT@^HX~A!X8!S!l6fW}j*lz!iL5#75Rrp#p%2rKx7H0W zWTc5IP_}S?c)aDs8=_pIMy& zVJ!uZT})#}I({sHwVo!YJd4F4ppwxQr3<+$o`oA2v8$KP|5%|+Xo8Y}&1tiEQ6oA{ zJ}?V=ej$|{ef8>YDS>-taT(kkoxe@0U> z4EwnK&%pr(H5$W2@_RE}&5OfgpVAO2G>rwlGD-q}hBrz`CWp7|y^#C#_EC#|6oA&<-+e(gf;f}c_gubhZCU5sozXUvTICoJ+D z`RwmnW2Z7wx%4={hGth4s~uc*FWDHS?o?k-hAQc2>1H) zbY)0T21LV3#09$jX;m zrqh-z!Hv#8f1_JCb(qldORXJ?O=uTM^WtB%J~S$rs<~-=@mGsaBT&VzU@5BDZ}8hn z$(=JYfsjt&WTmL6DyK_e=ZKKZ^<1Jy0aW;*tNy5xWJTX<{``JaOApedx<{6zoKor7bVAWm zRajuUMyQB&$7o(&H@d*3&j(m>PHhQTG!rSB<3qosG1ML%)-2@F93KSAN&(IE#?v1- zkBkhr-=xofH0!I>u|Eue=T?hZzd2Z7=uD_i(u({Uhzfu%w*P2AQ(8?)K`^jtZGsjXi(ENPErDLJoQB zow2#+zxe9*{?SPp3J{B{6ZNXMlu3AM5;D8GjmmEe$w+Yd+FVrhSJ$=?%dd6S!vUKV z?`muaIDTQTI_n6)TaI6^L6ws>4dh$22~oYGz2X0IK3yJeFC(8GYp+_*qH+j)M&T?% zu;H1f&T`}nG|ABo?G5CoW9^}}i?!g6tp3AIJ%|fvFDEx|Xs=jLldrM$X*x2JrPGi} zJu`W7WJ7x=Fc}wPlDGbA)0}7L$T!-{w%&c|TxI}Zf1AM1fkZ$&W_=% z`_rpGv1IU}A^r0IS$X}yQ2%+o$(~Qp0Ea19O7>&rd2L|T7@G;nWIb0;8_V)qke*a1 zesOMl&4`eN3*wpdV!w%d^4vBY1n|XALJn_CYtxoiqgr-Y^_fJgP)qPe&;9{yX925| zBS%E9J+z+t`am0M!FjAicXG#YtF+94h9qfKOtjo$uQiTG9~e*DWsC?9XUE;{h3&}E z{ddv`jP^$ErWI|tiY&)yq9Y$&;}CgVtk|rd2b>y-*y8^^%zaH)O567kQuK? zS-mqDt%U3qqfJTvIN07fA|#WZjSubOoGT8@Irj@I+j~a+6+>0U)_iqO!xasR0)WVP z1J3=YR7k@JHz1LVK3%9BR+q*)mIpJ_y|DYf#PM*GTEVsHanZ zjuRCJ_M$xCu{Ju)2f!#I5lumykl0k3aJHC>Dd~q}vF*cR6Y@G>KQw=qJhiXg1!aEu z!Zt!gVg|AdjXHUoJBDNT=6%O{?ps<@yME; z=aM~Vw6|=r9;5k>yvs}~cLnMJwWv96E5&0qDKGS~v!II?vQU8NXWi@my0hDJ_|A%R z+S_o|Za^Nts5OkqT5r0H)s$5ic7@}-JmZe`+EoiUK+m{n2Y1ts_Qo#auQQCdm>=$J zpSrn@Pv$$PH0k1I2EiMyNmH>TPj{{tYsl-nF^EDQpJjXVa{w8>l_Cuh*b?K(ztKY2Y6uDTTC z5=B8XX`S>k4O?deuOZi-17QLl%4J=FlkA)}(6MaCXzC~bg?Tlb3W#MkHc?MBngwfT zf2<*!cHs+!Jo55=&z;BBcVWwSFNkL?84|6$c<^J(xn)1y)OYf>m^5f+o@N@W@xoc{<>~*nhOm!t2O$> zk(y45dx>0({VOCRpXn~#*TrpsXhvperA$7^ArU_@~Iu%rE)qo_G6dR+3l#DK*n5k zuzJ6yrE=n;s1@@fURPjhggi1Ds_)}0N_tc{j!i>GwIf4e&9X9yUGJ?)5>dUv+wI1G zo`-G-cyNS41<#jeJoWsx1=*77@qnCF$t|vwtEi~TyW8o83-EgZ57ExZFz#eIzkUJw zF~Vc5%9adm?EBNoeZ6bBkz##!&z2dQ<-^B17h4IlRuW5_CTy;XNbQc26&ehyfJ}OB zJewiKGfo@grZhMkwuWbb!`KyZLVb5~INV-G-qAw83wY${6U({<1w*>Fy=P-5?WJ=P zF0}f(_TWXT#qB|gIKF}VtO_EwNM=sK8c}t|+AFP!Yo?Oj$h1<*IE$2}4ej-$Jpm;z zVBxla=N{1~aR$sOc^KKjnL&KkKu1J%J z9)bn7EpPI!As;hi2?%%{yO;m%>t-yUt+AQD`5l;Qq-qMuILlNEo`AG53GbB^J5Wd_ zhrjnVJNKNmt($vC?xYnxh;W)Km%rXgDjulI z={(7Dg7ZO)FqpWzZ9{4ia6-DNMS>+`?hcwnDq*C@Jws{)?K(@V>(Jo5?GK$eNuBwV z`WBf#?%=g&!!hwvrY}NH3A6(U#51+<9F2HzT+ah0Ae^OO0_zy^a0Dy+ra&7t;}&g# zT4}fc``7Buh2alDTo`D|?>LNmR@ZcBRm~7y#1UMQg)V9DT(>9_@!B;rxh>Q_S@hc< zL+#tPTJKI{K=~9a!Rq2yA@F7vF3!%P>t+{SvmaxCOA^BTC=6!^R|gsiq-p?)v&HZ3 zQ!Z|gtX-@LdDCzD_whxY5y)JE5kMYkIO~Vohd#NRkZ}y4c3S-o*D}NyNt6odadt2e z<`!v93*pV>QeJw}amiiU{uHfbIFw!DU->Lu$x9zZf?OZLak&q5HSeB)1MTe2DwcaZ zhKSlK*9QY4Z`mRzqfJcvuP581Lkn5tko4-gu&~D}Z5kFfIUg3*Y=r?c032K$8z|839(zll6RD2pAfsv+e!eS-9lm?5<(Cj$g2oIOoM2*e3 zeJW`(;dVz-WcV6rVgZ>P{lWhrKHPfKmR?pOB@d#UJh|-kd(R?A{;nJ%7oK+HuG>=W zK63xH?X8<_GpljX^8T=}tSqtU3aU`fmGUMP?GTa55j#rM$c;b z%qYf-chD)cQPwC<#**P&DqD*HNeMc5J@KVrI|z6kI3?nsAt#?nwNX7gFf&5C(=i(a zTXJr@o{~AqcBN&BH*xt)8xI1JV#pL?f*HqzF5(O2B1}gMl2^0skzoOksQ!Kil27`t zSx+w8=)fiQvzN~jdmdMvzznkax}6bji_V5zM?RZxkDjn)$f5kLd%1V>u)Digi))uG ze{o<%zXYjr*RIU=MhCydZGYkb zIeg>-8M%y%Ekj@nY__fT8Jc&+FC~j2?rlg^m5GYmnPd@hLHFc(^3JswcmWT z*K}T}mOk9gMGwryV0QpI;nC>EPAAokm|L8MTd`4{4C`u9QoRdmNDij40evZ8d*&K=v;zEtuZ66I7PUwh^HPPJz(DpON{maIAN(B={7=;!Yyr{CXRGq!jO z8ep`SIK_z}a@+kU^`pLVf9JFXnpF3+6)X{c`5;~N0jy^Mud{r*u=*c)upL})>!6I} zq^QCN2X=fM@tDnU7WI$lHEQ`6(bdIU@K65Ru3^*v*5{si2*++1F`qbgVWT22yM-cn zEo2h~V5`H%S%0QXELXnoM_s%viRdQHWc9-*KXxC+vD;YE(-_*>Ngv+1GT-YT{470o zFT=4Lo`c)+Q9wm5y;w1tFQ99S!6YbCK;nt=CT?XadKQjdLF~q2*_mn>rWmRY*u-U zxU4!FC_EY{jygNZshLes0h;x&6nlV>8cU& zcu=gd%MI~>JX&$ZsEBnW^&-AWz=KBo3p8sNigFG2jThVdFiWx-n$F6*l2f+4L@mya zCz937WHo7tlBW(q+N+P_pcU|N-+Ei1+nz(vM|&$yLF9{e^{hZyNT?D(9??R@LXMgT z_HzGv0v60|Pqn{Ki$i9S0R?;sAoT=*r_;)@xOHa9ub=8XtSrVwjl!+CDy*F<_jJl` zb&7a}Vb#*Bnw?^!BT2)iHHo2)n&fBSpn?|Va)<7l#G_MjOMBV&dzQ{c7{gT0+F28d zAD{q&7Ig+#KdM2*$#=im-nC{C9&z3Jz;3=fQdrJ+oJfEguSjc2)k^lH!d&l~daJfUj`RfgM_xeG5 z6rYktbOOM8P=5lrTqt8gE2g;f=xY|)dRgcrgE<|- zwZo>>iBQHuL~i&Y?)Qr_Nl$NZFB$p8#}P?=?4+7HcdUKu{=uHNmo$5vy**d-qa&n*AK@=q+ES{`3+T`pa|wddQ*`v=|__{qT62mWK=rh&%5Wdp_m(ZGg*CCh%h zYOtoy!fu;VX`txZB%76`KG3&W6r&T zZ*G^`WMWywFqxPT=f`!5y?66;+kr+!EMb^HCFyW7l9aOd)-I!>Oi5}IxxRsr0=+sr z&>d%6(%@y3d5ryd*b&KQM0a)DvjGDW&Rb;(qtPZ#rA)_ox^>*Dmnik3h@s%fg(J+i zsV+U!DvG7G!U0`UA2zg7id7^02Ux9>6;WQ6oKQ<`$w=mmx%MWFmz~f7c+O<3J7QwL zrz=P835Z)0l|n)7a5<8REl-a1GN}J)tVvpOt9=%4ik;{-mt>=?C>SZL%E?;X zDBp76%`QW1Pl$DyP@<%YyR?z~@B=*EQXe-mRf$Z@8Uu-jK5fesVoIm45tUu^5uOpvDlB40Rg%#gJdJWu$%wl2bWzH9(sqki z zCX$QWv%25#9gXA~E~m<&)h8;-nwnkuoh}*g?do_mDGz1swu*Ayqr8~#xVkBJ6zz!n zXsIh{+3v3Ra2R7!tg4$%x7r5Gl(U}ewpW&wjB+w54OJA;a5y^hr?CSaZ6C^I6AGux zB=wG`q^|TiU*X$_d?}we6_(^08N15ujP^a>rK{W`wxA0u85I*Oc~gB&zMH{X%jvh2 zq}71V>u@Pn5An@|Wkw|~PvoRt*6D~iQyae3rI-B017c;t6N>mlz!ggNb+u%$WY9~* zz_MUtVL;(acfQ+|Kkm2Hq9$M6I-!%8BTJv?${DxkBpPK!FDly86Rzy)GrM#_mD*jB zF8#RLhX-i!!(IBWe7PghQe#1mO9HW0y_i!+wCUlliVQfdBF306 zn?qumMrn>-G|Gz)*d#Va-KVrMH74kPwDsmt#9Bj^X{iB=D! z!~vJi8O+En3Kc7k^FQ!U+DlBO%({#cLtSr3p0cz{Pb*c7x*Q3JLY`(q&I~2H^i)hG zF-vP@tHm2g>13O?^ZoaSQa&9bktbcIv>~1v{c*Rs!X0K0ls&GhLFyc@c~i^2$1{Aj zQk-FAG61E+-6Kuy>+8~saTVi;=2<`qi5fv>w0DlK#Op?+qEE`ANo!HL^bcKnCT?I# z&aA4HmR9XyMeo15bgQc=_Dq_K4pr_z$^m`(?RC8$gwpoOYU6rkvS!paZSicXs|&r} zL{SoxXD7^|3A@@WUfES*Ua!S&^hWh^r_-8G$Iff=4D0B9Tsuk1R(xqpSOAt%wWm=hDTuC2DD8Jif zWU2+ROI@67*7B2CSybO0I9H@lWFu;gEbLJGCUTOSyUlf?9IKu1R&z~<$Z1OGYhAh~ zCX!eKVMS6}bQ`LY^Sipl+0xX-B1<;j(l@etXKWe2NX#{7-6EDWvvE&CAI^muiu1dx z%~?0A*-X~lQn^}bO)TOwjcT54%B)e*QDNi0DVYC zRT7)1>OH1MfBtmcrYkF-%p$dfSS8-m?Ty0E4v%S69!W*= zMQ4KcWZiZJ%b>)<`>rmHupN)qx9#t#&79}waIetkA`0rmJFX*@h(RP#iNzslT&~aR zBOR&ad(Xr9E##4xW7p%+=#kHD;?DjBb=0_KC`c3EJvZ(U5k?Qhw7jNZR;P2kpshcJ zqej3ZF89T|cqGK>pVD#C&QO3R3N~ZXIAsol-kp+LbSk4J&BC4c3OqD-zJSM}g)BsJ z{HPO@ww8PQ1$cV+)b}1l>7BbWIQWs}Utabrq#0khAWF|Y1N@b)x6JQV#ZSl-gY5TSrqZvm_$7u*0cJ!d{WL2)lI+0)Cqay=;*i3<9_%1wxMV92j}}g z9!*pju{D@6XiQ19d;-q3SK4O|3&>>lkOBi80D#Y%Q}+!ZcecKgJNybnZ8~>e)TClE z?qXU|ojH@6ti>k~+uI)7CX-6!%<+p;(2SHk+V|t^hPki3f#q=ORqmM&Krrvrl;#vn zj8$9AdYiMAODQ`G6yO)X#!H5PM^vc;yi@av&wXhV_w27BZ1XwuU91UhL4GUW@iHU{ zc;w)zLlm70F3ERa#!Bz5ts_fTEEzbbKiGR^&ygX+%IgO?<_*m!X{7OtVt%7fX5tq4 zWYZgV_?4_1AeFb=(%vz&klKN#oD29`$Mt=Jcje0GzdDqjtV~MW;<`Pi)uF3yI zB=bWbbQ$e7))T0D98HUC!kr|ETOmR~CU1p*+zDe_$31&1?S*XSe2Cy(w_=a7=wkD7 zcQs`S=Sv2bB;SJw0ht{3JiLSZ`g>5Gr(PwWIS)VQpLtW0_Hc~}SnL{S#%_}|BIJvA z&=4pAnO6JQ%?*C0joeu2j1oWR1I#Ae`kGGcMO;|Wz}PfJmR~!~JF#{IJXE*XzJq)6 zPK?3WiY3k^SSU9R{%pmm1M&VZ^uD!Jw!}#fSs9R=W@s8TALN)d>*HC8-dkW3E0Gil+zIy6OrpyV@}`LA;Z;?g)%c10?pWUFp$MabbdF*pJ;H0EBc z>bD2_xPQHgckoez%-t-BHBn7VUe?%+6)D;OC;Uu6CNGyaLE z*mz3SP=uq}NG(sDylcpw|HWVkc!a5cem7VCU;J#OWi7;P4695eonf&!QY5pF<5w^L z1@DRi7ID3u!8!P#ypK3f`HYMHMG}4-?rjz*XmR7Wpm9a=Ap;B$eMb`gwzlPlVkM=vGh|LLAm|V2(m~2M#;=F`B{BGy>3&;dkKXl~jpXuXP{j`Jho!$pQGkv#MP9j^%~!Vui%O2^5oltQ#*zhl1a(;*`1&N;a#Xc+3BoqE=Lq_B2s!*+$}IFn$prrgb6HRE9iiBSW@wsvZ817Z=`umMk027AuNBHYUB zV-QP~qw?_3wJ4X&KJh#MaXs6{z z{p>tGQ)}S#dzQ~Vn&CG9VDr;wHzb&hIyX$mpIOmqB{_Sv(yl?C;)}9-ErhR)4*|G)mfFv!} z5kO%IEegETKsO-T10tbrbvba7YfD@odggJF; zCkm1;!X%=L+v~ZJ_3i1N+qO+DTN|gx;SEdT&{|stBK@Dofr!irRG_1`5(-7Z+b-2g zt<{ngw2fF=Rdd+IDRTKX>>UA_^z7*A;*-3!4H^f^nW7%>%30*l>D+9%YAndIId4lQ zCJ8%42*~8{Ezj>D7j0hJ$30`8+6$${&iEjMKPDoHprpaV9~+Ss>*=&8PseTN=m})* z&V3ae5i;_FGp5cS9UqUWCfST9VhNSyo_bKmkM`y>p)LhHq-mOWaKDsSkT`Mmj;U?f z#1v$N-^9AgxT(g9(jteV74wBfV)FD3e1U*W4lXzHUqGC{*#91{5LCOMy(BXL`|6HH zU26^(*}TV5i=xJ>N=4ecpbt)<&N8>|BL8BZwv%^uT(g-t|JHtt{9|`V6T0R#p)#z? z1=ER;B3LXVpgm2bd(bTbl^oKI?k2@+_V#gP5A2oEc)pN>$DkyV=fb+oL`zBDJPTbA zk`d1RogJJ#S2?|hjGr^L4Vv6O|Cjy#8k_XFw85ApBC*L6iPD zwS$BoLl(|W>Zwjl$9{B+zy6dQ{?a(BlKIR*zfI}0i#tNe{)?tYM}$1`^vj<`v4hp0 zS4!puJwT}EuH#ItX0*`w~hdG1I zqcvbbOEub(ot0-xrCLJQk{VG*!+@a?knsjyhxPu^PxNsw8m5p($iynqkl3cON<-Ds zxH29g7nm^PLNY;Fxih)jOgMyK@T0c&+_9|*icBnHj1{DlT0=4=A%8aGuLc*A$>_5m z?rvbGWeUb=%wlNC*hV1cXHq_MNtP!MTJcwfWLg+v2RC4wx~Rv*8&u~k>3w#{2!rZJ zD>nE1YsooOJstOW-2Kn195V?_IIpJC{>f-di3%qEgtOvICCMf?*5g7dIru}%Zt~_G z2gbM?+*7zS$LH5exgtvV0|u!*hJZT<;tsV=e4v2Z>F8}=o8HKM)kznJbB316<^O)& zFSDo_YfPU|=qjyNQbPXdq1#$OCWoGVX*Xx{P9?AnQ}Td_sWodJJUg0f;Rt!ghd(MH zlb4sNVU;{_4^q+BKY1RR@K3!rn$0^VwBoEf=QoQj>hY|SOb75&0ht_qp>GHIpt9y7 zyMy?Z!RXCk6@*0@ZAw|52*-##G<7BrXBUz?c{$w8A-Zs!F0ISNnB^jODlqAa#uMa? zF#eE$Oh%>Bot)`I)KqL$VVtt5mQC$-LNTP$8B zWbo$&+iaPPjM40nIO}n_CqjpE9cf-NH99O{0T{Xu7raX_nQKi{w|rvo7b~_8r28LQ zdfF0G@Bh;C?1RL3+0?4hs9cmQNRlOcU1SP|vXTrLjzenuGDsEh$jh%R-$_IpuiVVN za2b@>X4ed@6x#Lu$!r>_#1m9Y@~kKzPC+(r6>xSBMW=wf z=Jh2Ncx)9_vwBZK6HCZw7j_N{$mF71mha~B@hRL2?Uo!~;Onib!)Oc0T~QhNZUT1( z0hvVJzF`lyZ0|?5@n*LvHMM879!m#wVzp9gRlEFwa!E?AO3?)=Afv8#|C!Y2?IRaA zuYQ+5vzBHcAQnwjqmqfdNg?;dY}rzjT#%u=S3oACd#>EWeL6E`?ipqca;JkeR`O+! z-w^YWryqr>G?1HGcLL|29b4X+n?mgF2WK*vd2#15SWFsS*_tgE@nl6MO({km&QI+a z5mLEV^7tWC;+_ep#Hg)VwXnKs#I3A4&G}%ABqq>LAsM~^97az~Ons?mES*Q{5K0OH zUXs==8aGKoS(SubTb$apb}=4#>&xFd-hL(fC#MG2vt}e*=z(t%Yauo%YYVt&8TAG! zRHinZAy*z}8`>6a%9s9wL3W^r*eWosZP^&gpz9hAfLj8m5^-b{lLf{wB<>hnoQs&x zFU$p_jm{Z|h;KqELvt?Ff;H`hjSdh5yTK+U@fxh*MY&v0`PO-}dSuS5rV(u6EDa|E z1TiqjY4S=4(O|^ipvL~9Tw2*^u1CZ3Jpy8at%Vm81aF1B@pK2WAb?_Ud#9#0oX*OQ zOE3cJ!ii1E=+%#Oj8}}+<|&L7(vVg(_`0hy@Y{?-S$+pmM}A2kQUVdNQCd;K7X%iT9ZTgozFwTV&4{5h-E6_rm!N%Tf&At9Mo27&|c@{9Y(ee9EV z@}_Ik5njq~ZkjrM^`lFc^F^C~IPih~5A|Nt^C-2CKSSNxv$Vb}{}48whZ{!S%uDKN zucaD5qTV6s*+*}gS~IkeMX}D|d^`BX&D@4h(Br%&4DI26dfly4Yes}TD9n{-lYgCe z-5Tz9x6+ecZ)w)VtSoP>=^YKD1QiAGch`|i2~JP}uTz$jy!iC=dhS07Y;!!ZT#ljU zpICIt_+*id$)hf&;0*cvaQPj=PzlLMDg5kN==?X=aN3V!K_fu>{i@RzgHA z!%$G=qU5Ka!g5?lB}Xs#2ObljfxTw_G&-?)8eQP;a|Nlsl$6MHxIAl3>2g9rwtN!n zML>p;Lf*g6^>LSfa_RzV$xlHJ?@EhAgE?G@l|h>*TFf^Y8HwGAPZ5&I?0I7-*L-Kk z6(^se@DzMMj15gt%T8EB(pplbtJKBh{yXq{A(`}CGlGlMXK?CuU5+e_o!+0Wym{~^ zE4D1{9f&Mp`|m%b+CW4{VCtA9Y?2ilylPb0a7#0d46z@9R3Vvcmw#Z_ZQuXoI_{|> z^dNT5BB8u%&Ne0^wvxmV^QWWbNJwTR%!^oJOTRp|c38k7%&r-X@)@^o=Hg$bV(haN zxPaGq`NBBL6#+5?5tEIQ-Gg}hskMat60Y9@7BHv=p#;`nznnbv?DQ!2@h?$Xl365! zcXgNnF=+-?TuRs`T)~>6LB8?m)UIIxl^o5dcX6kEg{l$1zBmq7C0@OwjKSrSr^%a- zV7=bV;l3v1k?p^@dN=oTjv8HNM5Htsm8p_SiJ=sXaw2;SR)~;Ho*vz}le3*t#r61+ z$EVI2O=!l&9Z$6GiB_IP9*0U3EHXqr}8*9ZUaHki~qUvV%JAE}x zW?WoIFmgi}Sd$ES;0bsg7gEV#)qlegeWe%X^Vg;>?AaonMIr3&Z7pmr=`F5UNu~D1 zD|Kkkj(Vtl9qM5ri)v74vvphgxTn943(Z>f61cHHHaNRt-O}{~m-OG;`-dfJdXDWz zX{%Y9*T|c|qDsUe7uQ^NzlCl2<&$tbd;{xCNQOt{#@$Gez=?FehFVk*` zyKZ5<GWbn;=UYG}M^(Sr$tAu?wO=HY59inlBa&Ebk&+}XC(nEf6C@zxGIRP4ZtH(R z<&D?^HB(&DGMP&@v$d3~(N5x>UoJ%|{QIsy%?Zs)%#Ay_pM4uMvsE!WgpcOcMIo0< z8pV?yi%Mh|H|Fa}BK|H_I}6DGA3F_i`?r3upZoZCv5-e9z91W7N{zfqu1XafDY_Zg zZfDPxi^RwG;)G_0(nCNrer;$OXa7FV^R2SkmFUX(8KW2d2{CM#yO)AHh%-&@)nY;8DJ;ET8FzCCALZYClItamqgZG-tEol_iUK6uz@%T zP>H$Rf1PiXoT&(G(){F`5xI%Pc&+9)a+@=q{eC>KC+$F#_1 zfi(1LF(!{|&u7J~n;WMPz6fIj00*B0L3bG#+W5+xl&~*Op<>4(T=G`Uzu`F3nxVJ) z8{wngG;nGE=X#%9!Yu7Oq*@Q8`dON*$s0tqL`++kq|(8LCQ`6XsK{Ht!@`KZG_`i* z1XjWq=t4kp-vG}7+IOdC}R_? zmSddn_m5whT016WDNcvJDU)NbPHpBk{=cc6bW5sU#g_ETwaGH0W0LH+&uq#8VrTkQ zbX-8D=sM6yuTncsn#p-eC>&XGW@Pb(NRc9n*YFDgnM9=D#S!z3`}(-sUZYwlm`z2j z43oDbjMs^%O4?cY02fm6c!!F`me=9#7*>W9;xf~!x@@^vs)`__H!&$+`#nqu0q54E z7w_Qu|3Leem{8;+Oi`+;`o#rJ){rNOH}F>kWTdIB?Sz|g&%6PfYOQ_A5OYw_>#UV@n&(F)6XsRCMX1>WEj9A@V;#wt#%=VG&YreIMP# zJ@_Zc#>u*4{$#a<<*Ibq9a6JNS;ZX5k(K|817{(Xyu9R@03906N<4lfR@isncA(b2qp2fdPbN}-;J=G+$G?P!cQI4ZTq?Ajn?4;c88`rDS zNj6TDf5%aB0+}oR9acEj?N{Exx-A;RlNqsc++~eRm{y{kA%A)Y!yq7&qt?H|$odC0 z2HDxuFcW;$nnER|2q2WOXjUmJ$x4nq_%1rVkV;F>?ckRE6L*KrlG#)7TmGu2DCgO{ z*If$f%S~Nmk{`3$dsAzN7IFylZ5<6@f%|>!c}s@$D-XfBc*=mY|JL6B>iNr(^QdKn zTyOa-4ZY&+d3(c_n-rHcer?PmH`Z$`Ic@3mI`Vw~^ysjFM-Ep1w1Ycs*))YYouxrm zJg_Kqu2sUy17)MzUN+@*Wc%sUYY4M+dhM`)MMlrs2lH+JZJWs_mQHssqmT7YZ{1>< z?Sxu&mfM6e@6<_T5p5}JYq&CDUS5A6A z9~j1ClZ5d{8==X`T)-bey{>_2Kw2y$qrUPFY0pOS{xC2NlUia?`EqR96+(3_cg*R@ zk@Htf?-&-4Z#f8`@Xgh=1Kg)qOz#8U`)nupv-24ZO<+>NsGQA0)ujqdwi35mr+1DB zse~aP-v!*(gBxyrdhQEe>6zZTm7S#pHufLl%eIyk*^^aL{Z zfm5bCZpP9|i~%#d3x$>W)t7h0JW8v|9MH#tX~QIWaOL#Qp@l?TuHHD4>t8i(?-?b$9{70+$~3e1)<= z*rH;|RcohLuRlo>?y!CjOoa=^rbjnG0$%JXgfg;By)opsgv5B!Z;-^;^p3TQak(pY z|Egh*1b^n5HoWi*XSr_sVfT*?zKT)AT8T zm`#acm^I)!mBKYRj%Wul@_QMwcgysK?ULi%jElA;FX_KH?`GUG4L4)J4Y#7IjtB~X zr6QXZUuti`I)FU585iXqZ!vD2vxI110#acS&w+H*RtO;(Fkw+5iLj?a(BfQj_=Q`J zcQfXw61owur<(^7{h#dp<LWeX}%Lk=N(muwAcX>K?x(ttw1-9k<;(HAXJJ8;_GhPJ}yf zH?Pvabpke+*SO`rMP)X1=aM^xpVIK-a&$a?PV|DeYZJ4=Iz`E4Dtnu|?|DOa5Eh+KBL zDM7CJJdU9g$lTXIkJALl(9-*H4AphgU|3xBj90^jP-GJE9sBObF(e?9m%q1j2Y37Z zFbK9vXKA!Bf0P8R1)H4-#v2uP$t-Q?66Ea%@M{4X9^E55$&(YRe(s;uYd7;}Z}mag z1(I3O{IILM8BLhcru+ewBvwgfB;<<^qW>q5xnDiVkNNJ0(EkZv%Uoi8%tTJCmnY@Y z42eI48<~(yn9M;ulsyDz=>=yl89E0Q$(~&P=76NX-TTba!6j$D|GIirboL_jiI0WU zuz_-uRrw?1DIiFADk-ve8`Q3ljKT?N2ltI_ILk0R7tRk))MF@kSY1e3F-pBnn?6lW zKOLuqfJ_ekEH!q^OAn54PwusyC>Zfr5~zgy{2BPUfXr7y zzWKV*e)9UQSHHtsO2Hja`qJ6G?{_7e2#VSIxJ(%f26c=RRo8dWt}G-2Q|7`Q-0yZk zYmcVOF^^SjZOFaxs>IaF$B1bcejy;^s{1EyMNa-JTaEp^I>W5MM^YGT@f^; ztq!HGCN^lJq<_!!&Q%Mj*&yJbPM07qsh~>C@mKQR46O4w9N6yNKLy4jsRRR8lJMz{A)>bFYUh&z;`7 z**UAgY1i%?y{?ux^8a!*sNP05J__@=ro>j6zXHRe6 zdTrY1HE| zLL`q{DUyvVv}{0Cuv>vMUkQuJ2RWF5-;+&`jtF_=@CDai$nB9&`%&5?n*t!a(j0W< zm_kH58Kqs>Ikb>WihuhX-Z$>34RL+SX+Xf29I_D0W_8kNC?x~>M2h6k!zLAy=_a*t ze>`tm-?QbiSv97Duff6;EqVnjcByhI*d{s~abJL6pFlmda8CHSBiCJoffn+(o>(6B6E9UyJI=gn%{^x?-+T2LSl{d6H4)Q5 zKZ?%|fCz*k0`)=*5TVYT?bS_>j4j@T97_Af$Q6%nho;s|p9~9fnSL7ZdH0+(59lLY z0Nus$-}*%s2lv+hTYt2N+-aN+t#83n!&@$mYQ&RlosXIX6mX}TXPBl(*Dlrqxd0Sn z``oVcaoG<0Ek6}w}#sS z(_=*I!^Kg+Ath-VM$kMU_C3C7n*TLxN0)dVVn>&`5b@Fdc-E4zjkQc2Gq8hA~sc2on?NcV8eTIR>M zQf|2=tgIPyRkMDZ*{7fq){tKZr&kXPctGUuha8%-rw-xj207;U<&-4NNj4YA%O)kw zaiuQD%emx|={3WZg*^UZz3tQat=u;*!A11ct8BBT`A@3IGK^MI@u@3j#%Fcq>~J%LC^7t$?r>%MG4Zye4nCE1l)MhI}Q9zb@dBqrIkX zDZGujX~Z|Vbm_8)u?LZfS}u*36y2%1A&=h*cswX2a_}~BZ{)FPP?>BlS=1EN`dZa$ z+~F^?W=7fl{Jn|kHA4$obp6cP@o?NX0Z5y7Q` zu9}zA=!$?xVI1f2w>EM53|)ctSvO?ykC;}KPn>5Yrg4YFR&_Ndfxty&4X372utLD& zAFXd*f9+~+B1QL;ZPqova#B{yxQTHvg+iuOO`0s7eYu8QHi4xq;2|sRuk#7DV+dP% zfA!>-EPrg-EB$K+Z|c1e&vm(;JY79rtWwA9W%ygXTGHF1mL!|NqifjYwib#VQv%^` zS51!$E##4d``$*8xR2@kIvFS2&#!_y8jY1gtdo&X#KjGR8i|D6xwKx50Tl2E>Wjiv zxvsv2J90JEMYdTQ>&h#D0$a$r#eT0OZj#i*7Cee}2Jf%eLXLn(Uq(AQXX`o7b+ixG zX2~pKh4q*HCSO=g0uVQkyEXch2UhdfpY0y zohO7ex@!-@R9i^pv*=)VZsOiONKHil?4|Q~WvZgrk{6e)UP;xT*C2@FaV)COJ~Z7= z?!10_cxWM;L|(WF@SUkEPvQP~J+;BY#%i<5nv-#RxTwoIv>nBYM4%fnHUb_|>F~@u zeDBhJf&zYP$RFRnp5jAJ|7GQJK6NRxa?{{dWMo^}whi~d54-L;2e^zpnE1l)!B@8K zTKp@!CR*a|=`fzzVj{pXB9sah;I%esc-%#6?zG5H@22jYMY*I$YQ#GKX1Uq3TN#-w zURAn>opTR`@Jwf?AZ7-i7*C0KPRvQ|S@$^k?!Az=I2Utgn5%xXcWioqeC9u>+Y4_{ zFkHs%2A#yt+A|>(s=h)&*^43T8 zUqH6y)(?@hzc78WqC8i9VfwbsmV3^{bW&4yoo3;p>aIECgVSplS#D`=%AQBp~bP`f-()M6->7Q%y`k0m!egzsFOi#+S($!er^?5rcxD~37L3wmW>q<`Pa z>v}Uix6^Q^D|)uzz@^p0c>UYV7|W%m!kEn~Y*9^&T=xhph=oLQ@Gk=$$IvozBz9pR zl+l&L+`EtP22BczfIk%)I*%An_pHJyRh0`C1mJz;C=40_8Ch)Wc5owKng%$neHJCU zy8Vze#JK_KnK{pd4^24Q|me*Yq9qWG^t6*5> zxW%i{FKmWLjN8s6NR`;k%|40~A2B+Sd6BxBGV7}uCn9zR3BevE`O)Lp;tQ#y=j%|- zS6qE$6Q}!6YOPikfxMlOXxT=MPWGnhWNFi;SxO5{S`cvV>|rUL$t;;kX3b1yp%x~SWcKXIOa_>l zQg#8UN{=D}rA3rQsS20Hg`y~+0!>5&6{(8)`r}240*buw`<{DmLgzA3|L7?SeQ9hW0-S*N~N@3g4< z0z(elOqAUI3_i2Cl^m~qA0Cj9wvse_Gq;g#{s})>^nyJYbr4d58SEA-q9L<}oDT^h-=Bp2 z^vh53YEE*wvssfXGOKXAC#IZ3W6^XdLAgt&+U=Bf5~q&E)9OF#zjVcT}+#{uri<*7!0PMr@O@X{&YEW6sFC^^PR5 zK6}~rwMC62^!EObV6N+cFTu1TL&32ahQXio-D>rOf|)j^!i>IKZt6{vnV({dikpdU z`~ARl{PeQjODg#|E#Y%f?Tt{$X{rjnWSrgl<|%&qk(uR>oSros`Vpf&+apWNS|$L@ zPX8JoDQe~r*<@EY(p3DI{i8su_mEE?0}~cElF$p^ z*+yh9-O~2Z0zMGV!8we8f8FXD%8tqHUdPC^#;=<3@=C*>e+l*zk;v9R|1T7xC^;uI2Q#7Is5N!)cD|tJrW)a@mpycSVT;1 z5s8bE;-HEwpo;D#7CLQJ)h!iImAxZ5P1;e{T{}>dqGD(bCx$3ul;0@UxGb2KyN0HN zHrKQ-F-a|-8;JJ={h4ACk<8!HNu-Hu+t_cPfb!TF$#f4|<&m-UXu{Dq9X4plt`k_W z?SI39iD_hVJK`~)KbG6XUiCN1MfPJ9Jj;(E8gQxSV*NI)delB^LjD`BpMU-x)|Xw6F>j zz`GQB^}4JA4hvUe4$*Y_A%UDv6=|6zR5# z|Eue(dZ~7@hTVVZC(pu$@hwO&2YkZ*_;8@#s2ueV*xg|ishChub+Lt9BFRY`#57cB zOA7|@pG$In7>e|RjD}J5q-7q>a5q9Ij@9JW5l49rw)0{VGLCO#4wPNpNM3KheG|Fh z>OXH|Pn732Ng6W~?tuZh&(Q0eo-msg-Y{va%yrg_nyC!oY6jG>H&o_Oaw@P;1sgYC zIl?!e@~7kz&I#Rw!66%k#CHwkn#r2#Tw}e6Mvh*8g^o>B=V0QVNU3G>ie%Q1^82Uc zgQ!5ZP?N)I6gTs=t{V=QRTN)YULXUtxzii^rsJBlGN294j*huz#}EsQpWdQSsMRM2 zlJtlkqv3ly*$-=TKw)_oxUyHAf5S29)p_l4nX`W`Ha;oW5b35|3(42zq|#y%+53Y> zp&oo^7;#~BIb6be{8JX0+?YuqC#zv(YIc}RG++*V(p+PMn1;&PW9PFEN^>p=sgljt zmw$<`dvjg~EZWLti?(P9h1I>hVTILYWz(mlg46D%+=V3;^{FOIt!PnMEUHIBoL6*( z$+y?%f-Qk89Pe^!=S2aT6k?d*>UIElNV=MHoy{ewB=q1laLYqn{z8!zAHB5 z4z%|jI%oOzQ9PUcL~kHJ+mLH0HPJ#Lq}y6@{`I&Lq41Ffw@4TM((KfTKsk8NW$Vf2 zO}S=dvHv*P9tYqugZS8&wtQ-ZEcSxcTeD>K24)hm^vLTU*P&FiP8ReSQMJ{S;#c+2 z)?8zA$tTE>A2tY%fHT@woQ{2MxjR?ln7;NB9K%Y^)__^K0y-U=bEuyyN1z(2+1LO; zz_^eT0+%o#U%ByhDwOJ?Yz`%#Ca$-?{BNrYaTl{KxvD1Lso{_H*Tm%pYG8|QB7Du zLem)0&dwZM79}4cq1}hoaO2#Bx~iSIm9Em&U0A)LjGPHE&S=UU93LFdPOACNpX-9m z6VU*(7+NZRd~gR{JfBO3vP7~#$_S7z${@*MEr_EQIA#o3nG#g;>K_mN+cI91e@|I= z=z=BwwR>P2k)z^KmZmwU;2!uzF8&1~F7mr`mE^l;U=B(><1mopw_M&w&i=%TpMTXS za(9*%yTo=TzFs71*%Lo%g5PTM+1R@%&;fs%9>It@)PD~s0&!!89Bj?N@HvpH>V(vm zom3LH)YCyT1sDHYQvzHzO{1$SH%L(zqV~%2b87C9j8>hX3YZ;duXBM09`N@-kJB+e z%0$Qd`}~NY)&q%xqRJuez`w9|+4MJT^3TS6V@es+@U(F> zOfF|~UDD!KGIOk~Y;s0~8Y; z`Z*Cv+Jiko|G3?6cBfRNkw6PLMUz`EEvAtD?Rz-)%qF&=$!R2w&e@S9a(3DSCYMf= zHjSYSuRXVs{8pQ*uNTn>qd6iRc;|Q11FyH=q8wG)w4+wfP*4%mb(2Hq(Wu*N3?GJI}+ZtsRS)x}9^efzAc zyZ@Y%F8tLyb7z*=hS)%< z0+Y)AaLlP5RSxSX#{{15!hlxtjDL?XxD>xUWj)^Sv1xV;x*48gmxpl1+Rd1N2T zMi2oJK>{Cyb8sWvW}#xXeq(9}qq zL1Y9fxd#y4;Nmt>=lW7qQaIzf9pv8>)8UR>XRfB9cCOA^bEkBB)$|4g^lQk zzx~_Q@DC|$PP4((Bb$bZ=KJaPq8|~B=JkLnq5m^&>=(T`#8GZQFT811ZU`$<%!H<2 z=kvs8hNecjUbZldR--xD9w~Z`Og`X&T%o0N)?S!1;&!^wynH)V#bW)wiE*vmIu$le z`cbWj-Yc%yookd9lgQrJ4#FsT^JhEQKkm-Ky5U@)F>1V+4>PfDiz49|3p#aPzuhrP zyMaxjxEUEThPn=1d!U_tYJl&dak&R&aF9{Uv(88?9o5>D!@yV3fz?JW^%0yQ!S$Lcm6G!O`F(1xgf4^Pgzfo9qyh|v@w_W ztbb3gp~Rl$WgfdH=a8UmQZ1=@vg)nMj`ChQlh2`U*G=rJVV4xc?tt0n_ za_j0vG_v*3WAH)`+}Y0759MGaa4pbi9G*M9(U?cc$mIheo!mTVQ7ZU;PK%%)5sm2n zjvR3xSPLEO)e+i{W8tH~Acew{9#`}vJOg@}GNwpH_^;p$P4!C#wV06U3Y92D%`*vKRJtWbR!~>6E&Yd$#JVp&<#T)e)#RHn85`@;W8>y zakE*Lb;$W`H!uRG64S`hV;yI)cZ}o)09aetvJ6-=d583IW?)j2O=Z%-tYVb>Aqv(O zHIw~4uL=r?KSmW0fKYC3o#w~rIu+BnP;NM&b0$gC zMXPGQBkipEV`W2KOmb1}4dv%k5oLym3N9dzu>hzuj?YI;%#?b$D=`b6|#c#!X(&B1f;UZ8O{ zd_QT|w5LaI&h*dfrsZRH4R@;m5~jGBxIU-m{Kc*0FPA=5%f33DI|ttI1sW>D@3D!D z-q_3dv%0u7W101Mhq&=mV^a^Y0U2AsGu1?83=r9v?< z+dXA*b~8X$Ur)8P9JDkMjT|}j6wU)Wx`%T)yQImps_Z_hrPc0R<*9kSYRObW!GAzr z3Hp|ZmzMbK#=;7GMr|cX(-^*-SKI(n5;_v?9Bio3D^}Q0g5u`9D(Buh@R8Pruv7zl z)F_@D^x31fcz{9hLyYJ9|93fbB8R!uBLL^k_L1HDR=jq7dtZ)%2Z2QqssR?Ss<7Co zi+lr4$6^|{;)3S#?a$=;$?aF=P$d{yAW?ufisE9*Aa@HzSczen8|p^#@>Mx0oVleQ zA(C%B{BNsjLyI}sV#}iTZq|;-Q(E5_1;1#j7nI~7!E17-tuI9-CrtJW$n)3aTq_u9 z)Yo!T0Cbx$1tQ)7U;X)7x?08T#<7&}`OkiuDsCtij`(5ZtTa)T66&=#3&l-Nxw5ml zBo(OtdWJavylu}4W8*b9Ts_BD)qbJohf=d-tS(jcCeGP@Di{YPB)LDgwsEFsd=UG~ zG;Zuwr!`4!h+MZHw2uNWbgOhKqeRJf&SI!s8Dq-&>%Oy6UH5yj4?yja5m-bb@z{kc-?dEX zZYNvL{q#omNVcIqu)_QAXT#?2a$t zD1x>?W5WbpRu%9nl!GG)1L{4^B{Dpvn~ZgK7A{!0-|OFa`Xyv>cd;078#H?(?UZE|(~nc8=1 zx2n>frX|26hFX^oLSIuu~zF+r?nu9g_YDQ}xt-V-UCf%}DR-0RM zPfc&l8FhQ=ZdvVKGq&cBwN-1IYU-;0T79hgThdQSFR1@r{SWKEQh!Z-yuQEw?D_^t zPj$LFPp<+C-U9XJ7dJQ+u|MF_*dJZ_i_-o)K@IJNX{)PYzu z)KdqD3AIg8GZ3~r)rKx%&{>Dilt5;!41h!_nhYR_l8Key5vcRPX{!S9uq@~c$ZT0R zjB#Owbd00s@x?UEE#M1e5c!YttQ22uOIOYaFRNgAMuZqeHdBKpemw4)U$0xDI$%XZ z3?NePhGmHN%i27;`Kn(oQEA*B5K^$Y1rxM}B=Q6+>noP1$Rei9!!(@6$Pvjl3>&03 z+kB@$R-k$=UZxe~k?j`87%DeL*I%|o4R|7`qll1xM8O49NPXtBrJI+&7z4I&#(9U& ztFouyP{<~jRr{CT#T?*}v;s!%$}8+hz+m$v(hct{lMOZoDIH>Vj}Cclv0Pb;yiPAr zA4CvMq#wn_suM>tvmxd;-15ymBBao*9+juxywoiDMZr`LGvu(?JOu+EbeH~G) zZCN7Q%qSx4p+Tb*lV^kH#Uk6ZR-htb1vCrToe;1Jpj;HQR6c{vo;sf9dO>+p8-|a?Ms_@l3IYi+9$@b$1Zp%GM*s#*=MgtyY+z#S(bmID zR7Bv?y4MgBI>;HYg4vR8K6{C3gY?NGO9=+(MwRL$1Xeg(G0u|#PQ*$8cE|*LgHQ`C z$n`NCYvGw6gGQ0Pa)VuR=s|S%H=GC714&$w}E&h zgFU2N&F|Qh3xmaKPzb0T^Fb4f#I4cRdEs4(q*P%z4CWF!4_y$h`GmZA6Gz6b!}lZA zpEX6xQ$sp3z&$1^R|=~U{8xu z@?GvEL498&s6jn&NHKT}DR(=3*3=%_aUOdyg~h|!Wy4NK8Cv8`L^c&w)vf&RA`!R; zix;<3EGpOp3;-WzO=5`}$XalpaAR8`QYlMQh`Z+37Wm)AR!-UJPFI4%aWY0^*xGVl z+@~yZ8}?it>2_k+iU@{wrKu2FBdoAR7BssdX=$SKD3s#JJlz7d*Ym#%&PZ91L>=MS zSRfP%2cFlIsN~NX?9reHb%000UczcMJD|& z-?dR?N3u*X5Ax6>yxn8OVHK8_-@o>{Rc%P_BJ3J#0_I)@hdmBC{G88@^TU;CeuL|S z9{Mzd8irwHcgG-+fCubaaT8AsBU(EQ<_jjk19H0@k>G|%dc&1VRCo$8(Zez9Iy&hP zwYtnE;gC$y((c$bSsg8#jGZ%#ofBs2|0KMOS)y!d!lZ;nqI4Z{#gE+;w z&~pqAQVw>O^3lzHoR3e>m7O3#(N1?$XX}>{_ec{3kSYs6zgNj2k zWkkk&Y#FQ^*d9L|0M2?aQEla4Mt)Q7dk~dxhT}6HQ9v)rw$<`f02#1~IBy^;Fk^7s zquz9S^BKasG0YaSzfvwV;;?ni+vP^4xtpWLQDoYaN7^b6j_-H`@&YRY;oByNAnbe} z79tLG0FtU=uR?PS%i6BsUmnIG2~Q_Hv5*f8V*Y_8@G9E`nQKHYB}ihVpT+*cVnCW? z1G0_0VhH&J$%Du{9L#x~qm)B!S#NeTulnIoL%M&A9B2o6KqAvZ0LpIjgZwvPS7A#+ zNP(-pG^;JNF|Sf`wI%AkrQ^U$>A z?K}9Fak@e;vl+1C<)}!WMHva`o$c+y%QzWa_{tB?(ab_6W>rX3yUa>oqRKFD!w2W%Yd*(^>_95b7Q z(;3()1M>Ky#yM(`Vj_+64zrhO50Ncr?>a3XhmJ{^B5Oe$qmibn!0DIB)+mHgLvN(n zY>oJ3$VCVbh?{xo4|(b^RKElYUBLI0vd4lxK>XqPsd|~84+~O|h2;=SfEZwtLf!|F zbYhcmphIfLgQ+~t4nb4oLWqFFOtDQ5)$?!L6hSjsQjXkOPzi7gfqV(3R!4Y=ZUalA zfB5mimJnUg^-}@WG(W5;?h(Ka_%M+)QUG-xFuZ7oa3{gl$PBp#-oRmy$M;wvHoc0D zHvZ*=3MU?_(jy0Widv{l&_5%Y_9Y!02Qj@SCBbr>w;mdpQPHxCe;1l4HW`=^Glt?H z2C8jaqb#{9n{0Gxdfk4C=?|`p5Ag8LBJJ#4BP@(@& z*@hI#xb6g?WKg}aImc5epMqae&mM#3R6ppg^0v4@g&Ity0)!5rLDT?;#gNt01KkG! zf|Cux5cfyC3f-ciD&!ydV*6_}TiJ98HzDh3-8iYJ{N8^jnD!VuF5^2<8`04YU9 zxuIK-3+?V)L9#Wt6bwUMq4W^PO5+~p!qH8;L(Y|F4#SRBl1ldO_}xafuxIb35<PW?{B4IZ~aXf%~AS3md|A=Od&RwQ@rtZBFzRUTgMCTV%o%kAOX23P=X@Ad5ZeH!D|dgRb<43? zPz46DF8H+4R7}k^{}G@dHcrhVB=ZsYDT*7( z(K{|ZoxS*xT#%ahQqv?k?k`Ed;okJcNc}8%RZ2ulWENW(|+sRCf zd*(cI-9u?tgbaTV5=7igT#uZ#gZO`p*uXuP{1pzD@8{lWLbSq}br;rNhv4)-SFS^0 zO(9yLy?(lUwt2eSQ{Q$1vcGtpA z42O52ji;^tzKPLLS~e1&GpR?&jYrXqs1?AUAM)v5`51w+C+M>EFVH+LF)ndPaL_#; zWYQ|1#;zZ-jJk%&%TJ*nQ8U@Q#{q_vd=a&1pQbDhxS?Q8k9vIZZl`3?OioLudb}zT7C|@b=N=K)cc@Y_C9D3Je@Lz^ofy~bg&n7O@8o8{D7#HNM4X5 z3(l3F-Nb5N0&bykvd^NPU@R!rogP6Y#lQ$T@G`ht+)NHWdTu}4@~d1gAo~ku{3s9E zN9AR!F=QIB1+*EjJ*gp={Te?iYDI+AgSLl$L%jig3$)-`it{`6ri|lp#^H_W?D{#A zO3#qFWB6%tGikiGvXe!GM6-lEUccs4Qo9HTrfq@N>*F)=1@-E{gu-j=(y==Y)z`I>#};!R@O|C%6gI-|ex7S@w=U46H~h$C@)4y{IXF0Pnjd7w zTxQbt0{yDuR&ucX{cT)AAmB-I@ALf~`31&iU!YYc`6QB&Nd==>wanK0Ez%X8E0zBUqmacOK<{Stj?7WC+gkHJev)YBtM#vJJzRhfpSOfeFE1$~K{ z$^Ly?PA8AQ2{h^Vyr(08__w)tn-r_0trA6@y5jZP-R07nE32NNey=tO`Q&lNR|qsF^gb{+57~ zxa2j8lh7>Crla>opX;*xVypN^Z5A$+Pc3y%3Su6TfH&So)5CK=*|45y9yn_efA)LB7F~)SLHS z1{mCf!Pp93>Jwkv_Zf1*wn7z6dvwtfXaS}RXtl79nsGZtU;(1nVH`E4$yeUPb)*!P zoH(FI?7)SWOUar4S`o5v#lN_T*t0wl#T*G{)x4kUEXAiwFv|~efsGt~05%1hGa9ym z0Mb*!Gnb@{-ql=^NcOjkZupOhj+W=*^ZBZ#iB-s;(J7gzi&wVSex~Mys&}dMLeS^F zzJ&p76JFy8jq6QmLq-UC&`<{@AWO84Bf$z_R(ua@Jb#(`Mxj9f7tjcW%|qZWBqOL{BuTcT!i{C5W6u8uUL z&Ua-VLQlQmgV5uV<^4Toqeh|72XsBUS^sQELH=HYE=0{pwW{Jm!dsRd+t2fYZ@M;r zdSj2>AId6?x`fB(@&sp%QAAbcH*Qv_6er7m(Nidm{zE}rowg?LLCKL!FG6{ZQ&yGV z(~}rO;h}5l@}2dfX0GCp7?k8(oBy3Osc<^O%v>bV-!pACk@1Fn3-L?yjrGNZ1e5`) z?^T`#0FpHSH2~d9E!hSXU(Gj^TsQXliy7oK{Zvza_s7@m>88@_CIFJYwLX6#aK-Ry z8gwvpz#?Rz$ZwYtm(Vn#u<|scd?_k9eh*No2*YY6_ciBNid?DKkVo9n$CiWLfHf60 zbMr53!`oW&ekAXQa|$V9scRQjC^$)Bje<>#E+$RhUy2H4)4tMGczOF#Q50DcMKI!L zVW)!8ikfh!`4Zk*WMiY-1lh(~^9>tUcm&t(2@5%+Ex%F>+P=2@oh7-TuYCnBSdv1U z@%gYr!NRDAnU-3|VXH8}ex5}@7#-L)wMH&iorKye^)zaHb^Y5Ip5+<&e4(llF<0LZ zPD@|S8&$YT>zJl>M0Q8{S@gu5SUxeCVdUmfs-iAtOdpu)NA-py@%%b+l`OxmK}=&0 z?z#{s<{o)|cM0k66Zs0#fqk`M6p@9jG9QGo2Y`QMB%xt<@R-206#z8fo8f=;JXO94 z0Zbo%gcNohYT*;)eO>17cQ(X(O+3}%MCQD` z99X5z`>=B&aLwysWe&ql0E3tujt-wY#t-gsYrc}~=+4(+50!cj89#0R6}OHrb1NLS zFc1MTLJ!aY^@CE72t&Sd4)z4B`z5I4xaoe_tIl0<60SHmPt}L9oAc1kl?$};ET0m1c*qTJ!MxRC8Px(YtRa8v#TSTL z3Db10$f~n+cv|zPudo}wZ(U(G@L2y-`|?)Q$5{wsC_Ku0C^+XcO@!jIArljrH6(a> zdRu?KQCdtQA!7q9g2kpP9H5Vo8hgG2SC7E*)uWgL!IxmJ7811Qr6T4eU`{pJLZY=S zYtP>+X%sCY)^^&t!rBVj`W`n#*6@gG(81_6O6}-SM&lS7A@u>A3a`5J4Gm%%M4cU? z?m-V^792b98`0e4aIs-0z}yZjKtjR4ex5hqfXKv;KSEwTW4(ejym&_|x!=3unOZrB zGj-Y<_YTTcF4LG#HjJo*IN$Zp263{8Xb7X~UJ_cj`?-_F29ymVR}jZO*B2rvgx3cmtE!J;I$?FV;%H<;&4>?Ix{ zCpPq)PqzH)3TXQmt~e1_T!@JfZ4Yc6&2Fr$sF~X}LMqSAd-A@G@Z(TS71SOt$~OW% z<)IbP6GUf+=)ZkWe%<;~PmtgK<(ixR(@p2V#d(BN-6-v>i`P7gc!lP2!;*~@X5}a~ zqj1*5;mKe)h%{Dx5oKnyA7zZ_p@H36+)R!<-qeNcM=!LqI}&+>nAjF*PAMU5MsAFPv}kz>;mWO-Un3|ffLi->c9X0YO|g%Q0Y>|ylY?$Mdv z*>QJN&UH-w7R@7rh=@kE#!xKr@p2?P7>Lo2b}rB~R(waJo`KL1(>D*?0Q3;w{0Qx6 z9l11|M|#C#8kzi7J>)%2?)jT=9_CB`LI^@v!q0!n&Amk>)2dGn9~19$a%A$9oevG+ z;?k~JpvkfLIEKkYR6FdSjVj<29W!~9?GtzI)j=!Ai4w43`zrZsm7! z3%PI%vR_2wb}}z;A0Es1N?L1?GA}RLva0Ukx?AclmFxsWc30i0W!Fe|66XV!_Watf z0z|vJR$sfVEM8l+`p>JMS$!WcxHqnzSnXb|tpDBW4K@F)`Blw#Yi_UETlPcAmYQ&l zv1WVC>gxYj{j<7XRDYv-fAw^=w^~!ZY3+}y{#Esxs_#p7R~@X{S2a@ATXjZNUF92< z&sTo4^7EB*m40bi}Ec;4@RJx`7&GLovZ?CnN zA1Ke12g}bZ-(0?`?00MbP}W~|c3FeuEy>R%4@tft$rdAdrEf`pE`3P)g|)J^O?7{l zX7}q_$(FrWR_4tVBp8M-8_F>NrSKd>{fNxBms9U5KpS#^Na5{t0icB^0H1{t&$PY9 zQ2|n;pf|X5=YbSMSq0#(fVF7*I!|>2tU*DFKw2O%9^jdXF?FTaa_AypmH=&WW%KY{ z0yl=ddBA7_TA*0Nxz{O~3OWQ~$Wd4;hJUnl6|;_WbJG{$x{l(yp|r^fi*lY17}AsT8!4wc?5r$phO&0kRgA^qwU$hZh1S&h9~BG3r#s zuv&jBP~oaZ6b8$yw+ItI|k`Sl!<0X@TTmk$H#MlXy2V)z1p#d(!$DY_QJLJ9-~4x{!5x&}%D zAP`)om8-udP!XO&Gb{#hC;}_!vjM(hQX_f!H>tDFg>Tb&8uwY#Lgk;$8zqh5{u3hl=aw^FS*rH~mN;BgrNhD~pw< zfk^m^gElLab0YM_GO$qN}?yTSf3ZD-^OT%C6ftEE( zR0<@*jO8(jSYw*o6!^}yQ#=_#MnDAu^9Pwop>+5zz#BKbN3lIX6Jf7}VQO}P@2Qv? zMy?KUgzzdwRAa&bb2pn3*bEAaq+fT6Km~j77<3NK5+BZEsdb8$*99__zex)D7!a&T2Hk^sq5xUZlmez?r67AKj27GqgHRCIMFeL6!>LO**73h<$^(H)q1hI^ z3`8Bo6QG`%=1zf(?l4+(PkE9P2@r9TktHgPG69=IG9fG^Zb7(4FfO@Rpwc;jgoYdj z=F4Wr)fuR!jd$}@fcmkE?VdbEpN1(G3!vUWw(22)Oc6QIX@}$BI6$gst#fz0DI!qQ z6lTN$g0mC|2fUKcn6Bq=QV=9y3m{>DYldJ!8A#wcf%IH0a2^eAEwcXDD#AP62RSowF8VWqFDPKj%rB4=>WFQ z;u7Kmz!2MpvV7C&9M=Mv4%9u(ghXQ$V21~e35j;{v%dD*mBnBy1xnU0vrS&BaUil0~itA zj5@`7UbYzW2`nDq%h*)-6wGu2hSNZ%*3Q37d5Rt{fN{o$5y?Qo-QoE)y!bFA0OF;9 zH4K`ff00%KyGq_59JdsKW&&=vH!gX^OFik_L81bOO+}0E|QNGNsBmuy@c91=uf&Fe!@Nqd_MWOB>FsDuwBa zLhfVx(g-bVbRc;F=JKZ3@Z!_}!NBPTlt&<}amL%?`b5nS_+dqx@e;0Btxq zqp|Yq1S-XmQ=lsldO*435VHZ|+O&~U^LUWPQeb5Q48;^e*#cTzrz%^=zl>8HDk`TL zdGJh@uCpaw{yl*T)sz~x5r05WOsWyYqp>yLSfWCw0EpKLwS|VVLW4l8RO7fnMZk?Q zkNjY;ibF(0rK06%)$p);vBtE7v^jLxp z1Eon`@8_vFp0PYoq@jpHb|INIm@Qo{C|pPum zi$EchSp+lWu~x0`b6sPX1`rH~ABOe{#5+|g!NVIlU^1}dSa~WLaIkrx$N3N(1eLp` zntzvShS>MmFM#$!*+7^L`s(227Vx?#3dc}A0r3%tn1cq5Xt@s3QJ$xo9t|1;ZaIz< z2vbe*-1ur)JFl-B63`6kk3o)l=n3S7ATlM}U*vxnI|0%G3Op5d(4O@;#lnjAqdb)+ zngcKyq7CV7Ff_W!1M}^-@l>cTc@NH8if5-GDNv0twsd=s@J+x+BSr}z!XSJ&_tmI&b?!FWSbpsJ`}n#vpqFa&Ex^02hqqcvLvGNcy7iy4s-ko6!VA^=c* ztw04c(lZ4jmnvSkE!q*~((>dI6-OmaCytAW1p~(90(D=*?-w(SLx_&SJrXPkOuf$y zoyn9~eU+ep0Id#<9BK{cHlp!B5E~Vtpt!w$EpGfZ5^v+GI%{o4x~=A}s)b5P z`6nb^cI%dBQMS^(07s30ddp}`hN#jw*r!yFWtCZ==Qu;j#nUj9h-e&y?!dp+SCETI zwuSw{G&PpE7ijKjA(=(MH=>dE7_E`PsM-tEAm3NvQuGBikqo; z%t^-Morn&^OcB|D(9P;}zNubBBa>g;c2Z81SUPW%w9>@Wd{0IzqfX0>HZzmRjGGmKoQ0O`H7o$R{y5)^&B1f8}GF2rii5{y#{?Nr)2KWv-p35>_0gJgUX)}-P_a#S(} zPXzVZ|6!8)(ftd^i7h1N@G4`Oq%sin_n2qW9vO19p$B9K&A~n_qLIDV3~{$KW>4#PFqVw*z!DPuIy#a#jW5EX zjYAiP7^oZg2O|!@WRG2!uZOq0)Faqw12B{SqzQ!>KE0xueBY;GCKs*w5dstcWt8oq*O!J}hR$#fuDKjdSk+fDhm(e9;L*(+^%Pp!>Mv8F=3GcG_u(AXJFSc<=}rw!&!y*)u=R~EzydF7Ci}}LKFR^n%!a<0 zN4=p@i`EfPq~$@sOEqKFBK__Yx8V21%>cpeJC9Xi%@})|ZD9s@c3yDJO#)V8nY2!)Qo)|NA+m|& zyVe#p!c&R7U??b1ao}H{-^AWTsNk|KOyl!;?}6Dd>K%|9T;7<)FSi?ehp1nst6tO$ z0UF`*{~-F}vk(uB(^D2zl2K_#oGD+-9|IhoJ610L9F77Jjl$viq(tl=K1cnnss)-n zop)B+Ej?-%6H`w|$K5kFjX%!!Gk+WU5z)xOAN+-;{n|h-nmHHn&)f6wHsx2L>iP_r zHx zKYr!tWgFRV-IYh338fa-f92eGwkP4TO-%&JO+U@ACtY{rRS^lvnV;_>j(4x##9n|IEckGvfupIvsi>McqzNkOyGPUbA8&x zusNh*=0g2}fo>EKrC)LIJ`6=fA}0=g>U4r2hK+2+{q*#8EL@6i_)XJo49|x%e(hK~ z7D=XkNxqw(-GkG&m_)W-dC$k<7|y&GXD2q$CHOSHzX|tnc#6@)EMAS%8_F*Cqw{zB2bf_7*Vds#%-5^ty_sJ>2Jq)??LFL)y0m)TTwy~ja96aS%tj1{htrvICCnJiKcF1IiL>PZ^ zi2v$+KfqUuXykaNmal}sKL3NfU($vg=E9PiRb$SO(w~WWhNcHo*{L|+%X8157ZD9O zk^4Ijthv964@_WwLRqYTu@ZgpFhOfr9q}_B#{_C!Ic-L`x4CtA=qUOU(Z~@A3R$3# z!A7>}2~Hv`R-hkYw~TllGG)NX4A=wnLo{s``e{D!G?u|qOyaX<-E`OMZS2KQQ{|<6 z`NMi~c3Bl;9wv&7({G+pa-9(Wljuc6BS+5}g>&=C8(Z0jpTw4HRGNE$F0#1|GgH%X zCCan%@1FHzI0?lx659F@uPL`sC*=9L|o!mGg#f^JI@*rwD22sJa@&&C4Yoa9216 z-Lr9isHbP1@%AV}7Qc*%*?H;g%Z5}^P69QZ$vc0C@w?DhxfWx_PiJAW*Ay*KtFtuhY^|GF(FU52Q8|Z0h!&@ zO~zlwCy1MAo?sjM*2`G2j?f~_(aeW`cr}B=Nu|f-n9FEFrnG68cz&JlY!Ejii}bBF z_Jv>L_4bPwSA%c(*G=X$>c4n06TXr0c`tU5_7%*7sFmx=A9fQ&inv z>#KO8=902MQk42T9s4|sP3ZL!&R0D)Xi{5drU&)o`mw$qCd4VJZQ7Il)WwgGy{~MB zxIO!_Huh7m;b+>A#Z|ak1p0!L5ruki#F^2X6lUy=`riZBDr)982bV*7-|x{uM_>`D zR|Tk4|DY?OP|REV^dYMupfyFv?SBUEnvY|tL^Plzhq(}kR`x5$p+2;7IYqgTGWOZD z$Y$*A#j8<0lr#u2HG+KASpok_cv1GrYzZ;Q}_-Psw zRMbpEB7u_n^^pd)`G0VjHfrs@P+0B@3?K_o->fFy4Kz0(!QJvAP=n|xWN58`grPMT z-uw#yPGB>d=huDb+j*L0 zu+$?of3KB%{p}UOht==kb|P9meo>prbMJtkL^N(?1tibGf8+-@!X|{Y)i6rJ%St`3 zc0|j<+(($>`3+>-KQXe>Paywc?|%cnJY2m5XM!mRAmp%;B7@*+jnn)l$O4f-)B?T0 zmZS=d*s!$~aSJP6(XRLxCPBn}U{THc;A~Md$CFDD!yf>GN;4q=@W8vd%`{&atwlhQ zmmg3_Xh|xWY=7_HCRAL$jR6_lG`MQjAnXB~YA-Ll|D%MMJ5i0{Fb)nOg}F$4K&m`f zR_H1zRoE?mvwv1X9;+zW+R+Cjx6nt(m36BWv7VT5#ABbfAU|ng{ms`E*42v%y2=dd zFZ2wc{zAB{U?(+|g|!=Lx&`=Ds2PAO7!6||Tt_Hx(^_cmQmGJCa1tbnTGc=PG&y$P z%Q#nduh~Y9R2Ejkb=OuEkQnnYk}L~ZA$|QxYlIn{4h+jIs`1ebvY_HOw<;BKMs~7@ z7C*zCO$j+{$0MH)?Uf-FSHfPzGEcDiBKkwzd)%`S=s$U{~9Aes0cMv*O%b zwFYz3e;8_xknBA*+^ZUA5*EKcVlZShHmLT$$5COcD>T-NXk_p2pIrhfZk85&NEKj2 zt_$EZ;LxPjZrE<&V?+c1?V_t&rc|g;TGG-_|5p(KG$7~dRY2^;%EPrcARx6}a&_e{ z8X!L|AvZJ@);3HIjj4_DFyLL9DOGH4oZQn0?iRJ8K;2n_MQ(Fb!7uq3-%^GqUtCw3 zqc33JTUP)u*uO~AE%W(x2QvzH594r${BDI|bXcVz;b#1&U#ZfC{@LWePN2u5^uJ+GG zl+#&_79|5?v&c{Tj~0wT)XXJ(F1nz&+4txv}YYQJEW`Ay*bTx>Z$-&(f=d-7_ z6=2fTF48>MJi<i~Dtm{Spr9Q$Qf%|2dJg?u0neX?LBw{#WiC>)pi zmEr85E_0fNMo;l;#C02{?)k0)2gm)`6Xf_+xBb_!v`?2X7Z~Yg_UBS6sL2?1GHt~co6MYY~t5WUttroyB^J4FCjnqM8Uri zHf5k1fN6sB6Rsh+mf#9Z*~qa|F(m6m_yV?8UO+g4b#VtoPlQwO-H91@XbQ;k zxqg|s57l!wX$oD^;#P9d^*nTJibcLwQ=s;$MWh!OZn%R3*)c{r60*qW1_#DvJw%to zxBFEX!^cQ_H*f4b@DO4kA5o#34(B40!V6bzN8FH2C?dLH%}mG}^Ql#2N`VCsHIrkm zN&zhVM@0d(PHB>I{-&L>2m1RICjIPKC~TZcdz0J&Pu|xS8ezgKrqN1ooh(XlMo{W5 z;^`S+dSYtEW$ejLGFtw{hrg|}jj+xx_#HB6d{#~n)=;MOIJ55Pi zmUK_;^)-)G{RtrUT}!pzJ7C7338Hz+q_x|{#K-1mk72q!{R5Fzebhqkqz2y>e(r+!(tm&(q202MXd-kK4g}Yj@XPTk~yN2U&7qc{i0M zJrZ)E3$i3M?h8)J=lVx_bTBXu&e0WGPp)@SMW~pBTUm;`@3*mUxS#>FyBBG8BHjsY z8Z=Jy%T;61;jpzkqmuK-!@1tV`g#$G=pKaYD1`Ma6}{$GPi%^LfXJi`zZIh7F;kV(sr<4=B!LqsEz(?8dV zy3jD^m;-dp9gB+Paj1RCo*{+874${*3ctlNOzsLoyos8LB=($8$6@1zJmboj88@IB z>NRSoLc>N�DL4Zg-(;ZBZlD4uujGukWU#p8?_yfl+$Kp7B7_2!~1E9{j4Pnd}YU z-1!l(;OL&h-IA5q;o=q8fqi_J0r$m`p+ayyJhT8*0;mPMZa_}4vo#0k=WD2{0{sF)V0Qe}{2i!RPx$suL{*^+@ zX^iG1TWaY?sT-C{EjA$`w~Q9*T4?G+J56E@m>)1jxQJ4m7F^2@L}`!mlkSA29~E58 zcMKP5$Y-L3)zAfyJDKx&1JOe>7$bu>)sMarEp$N*C`BZ$YpaA&At>wcDa+aq!X$uG zQsR;c{1PDUSzwQlij~|IFKl05iiXm~9k>-=e@!R(L}Ep?XJ4XlXJc3qwcx;$O`|&8 zKt>T8BI+cVLez|$R{!i0RGp47s5)@v#{gRdv8ennVgO!vi_iTVnjg|%4TAnh3pm6$dT6{*iIh* zU|%zP_iOy08Gm{V zKHe<&LDWi41l`EIbr4ve?Uz8dG-#tq=a{lPqVR>g-5NE=2TCn!dJ5YOJ)BrzKyjo2z}S=KocG2iD&fjfPdnwqj)ccCs2tISqU1Y!3tbK3 zW^!-?;(WQH@JRR8Oqk0H@AEyn_Z7CZX%6F^YsQ9mY_S9qH{$Bww@8y}@j0;6J)?aZg>qPFVIpDga7@duU(eN8 zKM{=_J8pz;@U)v-$>FP)2KwYR_;k&p4juAN!U!`pX;ZiyW8pqeT9<;V1omD>=59oX zA{vqGyqI%!wy@tAxqOX;9REzAv#EQPR8bd(NP42`m5P6quaj_U(^d&NcYk4RV_;-B zF(V(Dn4F7`xV(|!ZtehSmupYTU?qA6hM3cEOy9b36Z_Ns1%#(7CL@zp#X#6Po1M{4 zq)Z{A_#9S8+)NIhWAA4l{9M5;X^b0YW;4p(OnOM^7-2F=hP2#_SH#VH$@4GW4Cw_A z7!pJY9xz`|Y-TJun^HL(={eK5mV9sk>@8}A`|K_&nt^d+iGH?OO`l8pO@0 zAIz(D=_=3+GEZEQ=O=PK?_d_UYk>Uf~=JMY59_q`Zm|_icsF25~bv z$WSNQF@QFnxD9G%qZYZ%D&DHwS-!q@NTRK|wu(J*baX3{1Nj#RX-z)5XIvBBc_w^_S{O;NCkUHT` z6X{)r?e(HovbV-T3%S>`SKLKSa)Cuugc3%e&`!&z;C1m#nd55rC~zs058$9OA1X97 zh-pMJa{Es9u0uFo;Ar=QUHCl|n~%tbloJD?*x;l!>$6g|tE*nrN{$^H+(yMbylC;S z7S3##>7EbR6q@;{Ejl<8h#)!Bvk>*){c53JT1+BG_8-G?e^9lF-SjoOA*Q_prZnS* zz77`A4*I)E;U4^;sF_SY{XJN_&#v6WzI{&t36cEau^=<;%m%d%y)3AXabJ3hoYBfo zPQ!wnHYY!Kz%JA9X$X$pM}K?L5D3DMWAwXhqcd);PC>L^2Rn$H$+4Q>z-Rb%9EJ5| z_fjY(42}aZINnl8B**`L3Qfw=L5+^6S0@-9MT^EQG1wk==Dh;nS!f`*0z! zp>(Vf9o^Vq0)Rv`o2?WT3f_=57}h{NG^FpRfuf<9(*aN41u^0 zKsS-!ouWzMTS8y~F0FLOZil9)l%E9RT;XYQ{JMb~{++Ywz3&(5nu4oV1;Mnfwfo8* zfWPp|l~okcpzpZCefUgRxIY2e)7(=mrXaj#9{-r|Vj;Xd65{-!DNHVYqTpzEABN#c z=)mO|8Pe&san(Ry)Zd$tlb=3;4vJgJkz}+B7V`Lh33>R31^BUPpcW!R5nqRt^a%e$ zTq|(s3DWR17UzN|3#f5i;t_K6O^c9B=o?S2xIQ&MD%{x+9&~CInm{5m7B&v_D^;}T z4dnSB!D=TWv69>wE(zK7RN-Ny-b1h=D)}OwmCGT7Y}UXLBgqlorm6QzQNb_6|JKe6 zzH9;R9D<^`Nu6xf?UnfH25yp(*Coa$j(OU?i!-`NL-q~D|O7?5d-T2>S*n97}g0!LL z1?l$cRYBL~lOcd`$> zP(Y4p`{Jk21%D|RW*nJu`Eak@FclBm=8dC#7hhb&Sj04P^wQ)R$nJa1I`-W~YTR-y zUWkr(n`+c+F!aiY^ke$I#H4E$d62jx`P>&V77>llh6I3cB`iz14eTv1(o2GGF#rui z!YK&Fy9s;j?qj9*7};gq*uu6hQ2(WR@nVdIPvtlG7ei& zGdXh3CeHHS!tVMNbvmY)m^&dKQ|NmJg3+1DCB5Ryzs78cX>j-f>Gb@~pR7jC+RK`X z?f?&wnpdDKh&CR#Cs7Ram4Z~fCxLnjozFh_3aptzo?=+R&#DU|-Ss0?uT?f8kUB{X zn~+M$6VT9^fT>R_cglw6V$-TV^Js!hmhW9hzI*}~01=HGxwM8uWYv%dw#=+!KRi*m z03hGR2s9yn=@4fc^k-e}4B|GX$0k&KUl)E*SSKwe5oV!Gh_LzI2VejSEF8t0^VWkQ zpJPnV_?SL_)}wc*W#9lhrfc5Em_#%ZdK)RYFAgA?)nDF+9U4}Mj}o?|6Mb&2Qa?Uw zn$KpvLmm`@r~O>;Hu@3KNa*)~V%~J~>mB4bhwNr@NB8*YM0OF|Kz4oq-rLEm9~LUe zkKVy;%(h7LxbVBi9&!1iik=~NR@-CIIV?i|V}C>cA{w0dxs$BT&;6~ii<+#%=!=If zdZ&7l-O8lVZPuoH2NYIvYzKz=+COk1{upWR*;t2Hb^A84=6~Xw+lJ5!f30@T4@Xi8 zb0iiVkH@C^Mn@043uYCyqUP_nkt*}<8#l2t@6z4pSVT@4p$DH|+drb1iKgTIhPh}u z86tfEAoDQ<#5T3C&Huul6Id<1s&1n8mYN?`{jGAd)L7mxN%Q`=j(x608r3B@ zO_X}SS>7%0O~s>TM>0ipmH5;LBzxD_4-}JVRcX!$-o~yg+shfjX+Re*aFCr#rBXPv zp^UykUcGl+y@^UR$HPw4LBlbsuSW$VuN1^mj{(r{4J3y|g`aj!yOR{OZ2?;R? zB^zFyd5=E5_dcM>o8EgDSY}p05D_d~LBC3cmn-T~6!{BwUvuwN7a1MCqo-rUo@>9{*X%4< z$axYMekdVT=b#jo*W*^EJdqG2bM=9t!7~6qsf&kXw?{>5c6$KifSZ9&=n~uvgwK+5 z5E2ChbQz?KCXMhr;8FkG(I(gcyIDQDB`75R($co}fid_=^R{Q=D?_7EvKE?x(3()$ z5~{*gpd;s!NtmfF7TR^^Rf3iL%DcX>wf)#+^J3W4(q}RtOL!%DTzXxc6rn`Bl=UFEhCYLVX{NP0M>>e?+J-%-8KnJ(~zXyLdFy42550Y`GZ)#(? zA$YS|p5ZfVgk2D~WRaQD8)u!SRyrkoT z)j%azq=l9Ke`mn>b+OPc2MPK|#JitvE6x;_X?bNXVo+>}Che@jTqn(Cwjn{f1I@kD z-DCikb)Su_55H$)`_TjZmRYhtQvxBP|4CPfl?hKEZQ{+UW)=GT-sZk3^=c}bIqSl` z2;174YZv!5A=$79BO>fMT$(3yRoY*roqCne&7nKbf+gNXMUTI(5G})-&gOrH|ckndxqxFdQAT@ZWYdFFL-IO6w+xac=ZRFr@zm4C&gQ_R|-SzLP(O zme;{|gk#83cIpdwrXUacQ*^ncpwVZ}ZSI-wCZl5yWnf1iUEJ0_?L1y7n4ei(>8lB& zt&m}%#)4cC<4QFN3X<@1yU6Hi?YrS*J$m)l_Om2EX_jaB>>FXkyoA-kkX6iG!rc0V z%fcXvhKcVcqvj{h00-NTuin=F6wNCH^D}(*jUdC|NPB`7f55IMOg^2PLO*1n7hTko z$`BY?z89uvE`weOdm*IB=@W!1Qwb220x5|SXi(aG$5a;?_54)3uMMUoKX1o>_sY5{ zU@46?s;bFoZA$7abNq(fJJm%+++RU8^7hp>*jL^B_xS`H;rn)(TvjI~8JbFl<1TwG z)!EZKX`CeJlb(Hwu67Vb{t3|t{nZO$RCX-spQ(dT!5p4dN9`pt*RbGTiNja}KWax& zeE57&6kR;tkGl8fvmf5vK6ZZdLh-;`_eV&S;L{`4{c$)wcunt<{rB+?#UG=;Ufi6R zkr@fRh8sAyQ%gH!3W$F==UvS$=p0#da;l354-9axc7olnmo*{UTM;MxB$>tJp`0tH z=TixuQi2K_Qb5nTczi0s#qFq~31I(rGFHwKo)Vc{9fHVK6sl8v*pKA?pTbW!=j725WMt_e~3fn`4NM)^-X)vw2ZJ6$VRHF2`W_zzX{Zd5x&<&h3DX)vHc@sQ`58k&~gua zui6P*ubE3+3D+l$z8d2u2&Z`To6RuFT|6{1bjZ+t$lN?~%E|eFb?wQKv|qTAfk5Ag zy~)4dp%NUQg%21GkSq%*ZGcz>kRa&EL~}FxoxRDIkYB3_ST3&Cqjx%*rwZzQ(9yho zjRg>Qo?-!rA?Q|j)3cd}dg750ARD<;*AsA4097P}j>(&w(6YP92gk3~0@m&Fzemr9 zXZ+CVnLDN6uRgeSVb2CXkNd)xTI12&pxzz4=Am$z3&}EY4~%)68)w&Sfb!q$+jPPK zzJ3xd_*63MbU`$=-N0`L5;&_|1b=KKU77G5GqeAQfsW6FQQY$^(%Y3GgaKbrQqr6U)k~OXn zh=n~Qnz;wWoEL?A;#*kF$s0Q6gW2}SqHw6so0j=ZFhMy-an710l31Yt`7F+wgI_lr z&{sIPL3go0AH&1p&@Y=?+w%ebjIl2B>0m;4q8e|=hzD~zw=?QXMd74_p9QJ;K{(jE zdFY67kiY+aW?TDrK~U^-o@Gd35?}qSovG992YWw13lj)g>(@B4j zbaC1MK%8ky-VnMr)!Z}HMMm7Wo`Z94yxK7qK>Frzrg`R!)e2FD;E9M@&0JWUOGJbp z@5#WA@8+SIPuDJLw=+#k4;p-`In{f2FT#ItmS!Fdl;^M57gzsQaTG$8=EgNff!9$4 z=%@>8P0Q}gor)7%6$<$gU~Gjd%7Ews_1|T%O~BAK^L04NKALMzYy>Qpw=_Xdzj{Zf z)*ZyEV3lS+G8dW?n>>)!z*iIn11?yW0sYhj=#wUtFEsaVSc8XpmLA(87T&wC)P#a} z09NP+n>^V3pzH__vcVxrDr?0yn{=bU{@CbK^R-<2C55GaQ8s+#UbPx=b4~kgR zIo@i-7m~3q?}VQy91c}Q*peZocCSz83~A#mditZyO*?lv~uC8?|sA-oBS6_#cDR#=v+Iq2|+s#5@NTYKxrcq4&nna@rU z&SGb(6!1Y2Is;)y`RY;!`rnVj<9l%&?k@jy(S$*z7hpwzhxpAvo^f+=R3gacJ_ET!X=NiAKy|Xz0~$66rqy zedr=18A`&$3uqc!+K+vLU&l+f<++trsP_cO0$y?8s+e1jN0j`zxe?uZ6U<~63&~X9 zgrKFHn(ykFGc0d|C`{p}xSaW-UM*2!_LNMbR-u304E^XP&OEo{9efP))^-uWl+2r# zx2|l+jMe1#RE)-OwWPK4PwvGg+yLJ9akyD`v7k1{k&D}}eH?y;xQ;*-ojvXvy>j@z z!RH5t`Xt9y5lj~!(JxF_lnZcHsoLwWnDT0!Hi+)O7e27>p61NtY8JZbkEs(Dnf2)E zdz$}1Pu+gy8R%1=YJwejnGf<8ezn1s=cJU$7Y!FO853Ph3PRub6!f}_Clov5qpFbO z)6IVh0xS1|K+7^8?k{MR96X#LJK5qXX9}4@A`s^V?w#r)qhn7jf>jg$^&HysndaXG zS?c>hmU)?v{1<+(AzKU7aYZH1Qh9T^WKN>R`#@F~867#iS1@CtWA_O^^h~tzbIo~J zXy98H7aFb1S9LgNFeXFExFqXgcv-VMDJjdG?0Z#owL?eFx5v|bU_K)tBQgTFBg2NieKR^89P0lMT>X94XB%kjy(%8D}0z9f-t?=_KSD$o5H?) zI!F^tT`Fx}RwkVhxx#E#WiAboI(S8tT!UZ)3o4R2WURnFvaK^1>p{I=BIipjB5?$9mzBE7k5QsA@?+0;0 zMobx^AhVRxVV8N0P#+@0tKp64Zx4Zv=whK4U%S3D6kCw*;pUsd@~nTUvv^~MME-zRmH^{Q zI3JV{E}Km51V7{>a0l-qBb!aLuLB{0{`ko8CAsm@&OSU7Iw$NyodYt$36&wO4d-)Z zdmd78d2JDV6ehllhq!?o_6W6L?|%WRJbvxb<1_MqUxi(?#4Ym~CxV%y-eB~mq{Aj} z_MqnXe?7~G<-E3I z$-K;GEC}jD9&;D$xL0S17DItpK`r5L{_A@sRBc=kDz!F!{d8>vh|*6vPO7 z+f}6i=&>B~m1wH!49U>+*TL}IMMZ~;#ATxOYoe_rg|{0y<8-%W-nO)kgQ zF`Yczx$w`gI`_NUfTbOvqrjjB$w=R7@C+FJ3-vMje{J~`k=1{OeQ8KEOGY}1WG%#ZCe(Dq>CW0=6|F?O`W@VBFpj3d7=W#7{ zkn#XeBfw2YKm6b3-q|&o?VDonyaB2?E`y1t6I20+`T(5_6$&8S1ps3KGrEetv)qJQ z?R>~ZH@Dr~7J)>I3rfvl^k2_5M>hlHHK3(}O$$mH04y&c$wK^y8_v@of!2KX+2-Wz znl0Kly`mJl0qF}r0>cix=K!h?Ao8FOV4nlS4gib-oG>p4f>74vqQmYvcl)t-HNjH_ zFU9FCCO{(w08M~Y1zQ>q8te>${Yh3s7YwvEqeq^H-mKXKs_MMYfX@2yDNTP%KZdtq z*Rq2pDftP^Q5U(h8jn|L`)Sj=2_SeOzzvE>z~q>r{1$*30&FUJ-%p$SPR09=uooVy zw+3%M)EZo$5wh^!2U&Q(9@x|;@5%7jdob_A^`5V{Ehq>}ypl7S%NbcRVzVltygBz0 zsF`>E7Sv1^3(1B6(*$zywznVqE!_Tir_G6i+d5Bx4HHs3Q*{8WwcQ%v1?`#YBBNuo zpWcU_3I?~epM42*6+FiHlbK zn=iR#OS|{yyxKD^^Z5(H>82=>b+gy3(3=}ZxrCtwN!PswPmI+pbY%Pw;;ZZzuYu1E zq<|qul+q|EqIO%!&4hCt79t5j%9mbkuAf}ZLdR}>{-g)m)?f4eu`Kh&w}k^Om8)V*+(dT0xXM+iG!j96%fgAVnhYn#&XpI|Z2SI!7QFOq%X|rI;ZABPcjTrVy7tdJ9UfbHfbfndJJMxJb!n2ww*QFY&TB_TFHdWabNP(lHwRgIkjE-D7xPWd8 zU$MS@^$_%Dt8Aq=WpD>(agR!AE6Yj%Hg)hNI0&B{ZOu$~aRBpg>EMO!{bT&^ku39B z4ML1nBa>u(IB5B#B4^jh7;(c@CtK^Mx_IdDmAn<@3vdVg{5=N%NO7w525*DfKkgm9 zYWV)apA3wgutCAw#k%rCb&3jIB4Xy0JZa!CIg~Q{)HayHE;3m6AjbpZ0p{BCb1g7$ zkY#PIKsXYPbSdK18Us*fejfgSfl4*h_{(x&V>QaW&Gtp%%cy-v1kAs z9_T$Yu-;Zvc~mhGC-bi}FgkOlm2L;C1&AuiVlo;tl;o9Q6z!jd`ROLZ69%AkZ!BNA zrTxj-7Nl~Om6@=TlFRh*KuymyIDUuho$jUzPUA(@2e!4#n_GN9%d!DJEhr0lSX&BF zstU`Naz$@W7wBxVLpxxVb+M4_J95}$*L}DjJ#{|R-30i@jqR`PXkFM*&ia)fqYsu0 zVcb9&O_5kV;>*N45?|c{61!N)c1L~>I`JekZf$|J!n({SCJ5uoVwFaTQran%-BM68 z!Bj_9dIQMnVxe8%y==db8utASFgfB&tiZ%b zt2wB6-Aa@pQPZ69>atL(>&9I${as|#snUf#ck5hx;BTX%`PYu7}Gy!~tw+e`Ze$06eR4%4n5)@Dk(GndKaTM)$$uSxrU9 zjs*CrUz%%Qv9Hx}skl}~N#er_8LCXi{HCNE57bB$-VOclBBSOV&+LWV^yb#~bGxDc zU@>vR0v7roBqDU4mM5z*c_UqjYBde*X=a!S=Xg0LJcA&Ee^~+FCT6FsB2)8#!dL#y4h6rjjpvymdR%`cE7g^Bd zo%FYDXTy&X7tO%B-WMjfjZ-}Xqt@X>{}%^uKyaD)&5k9{@}=+v@x5Y>Xp00<)svJ4 zEbd^9?OZp{!&{S6hSfa58ryOFe-v-Q)3$ARe!c`!%Bq}VN4J0g_ z+-eroGVbfV^0u}MB(Fd`%LiAyVe)*c;vij7Ibri-bt`PG7DN_Ot&NkbIcV3n(8X;n z-GaA{cNs!pMbw)FuHfv1tgb0ZjabS`r_kpmpi8>RJZ!{;?bD?#$Te|m>S_y_!(2|Y zqwI^z(X|Zx$6Kf!5W#V_<$yFx)}(1<+`3SM)P^0>2+E$z@3YlZ-jAcazcKdp~MK|7<)n-2U2yu#|-7^E%JEbsiB=?7rb&pU7%CbZGasJB{FhJF}A_ zuzGyOk^iZE&5;KW+zS+V;2v_eOgu0doLu7LD~ds610na+Q;vKfOeCXd#s>=IeO5SP zyLn={;zRaUC#}VC+&9I$x4}^k?-x0g8v)pIfMtQC?z$lALRV{McFh(D|9^EHO~3Kk zZRqo^)~S3`L+;k?GtPXzN&|XzPM1r`GFoL=ko^NUEY~g`y6L5j$8oX_dt2b7g6buF z3b)A#_3i))&%_sxfY=CL#GVanaM26r?xg-L8aMw2;j?=z$AuHD)fVc}kxHQ2( z4`od{E;?Azvrx~oHN9btCg^GX|CrFiC9PA1UR-@ii^mKz!<6j?)6A@*dvA2M%qC>M zv^D*febYYnKkLC+x8q$czza*j?{384sR`8~2q?}6rS||8jN*6P=G_D%Jt^^i&9)FF z5+?qmap}Cx4z3&6Ho2$of^psG4a3j$931=$|2EUWvF%@u^2Uyi{YCGQnjA#X9=A49 z<+vgsL0k}q>!TdZY!?sR^zpkPwCGFM%(VZ;wE%F^w+u1PqTR*JNaYriBf?U(8ep(w zVc1=uioTkFdtMh0?fTP*#i5Ge;Hzw#r||JdT~R%99v^Up!|y;1(=aI+~ww= za;a#(QEIE+20_OR^*}aVi+JD$9RzjLMMgL6FJII?8f-!08ynBaz&GNrWG#6a9tF&B ze#z{V61apqX;Ktj?Rfm~v)Vh)zHtYDXHK>H(N`j^?GS6g2dN9O26R9lvy=IPT~pKq zsT@?o4rZV$U1Yul_NsetwsmaBl6M(`(M2td*U}Ly>8OWgn3;5`OXA>;MB#DK#X~mT z99(iA3C*{YQ8;wKvIQaJ;?Q($Rbd-%LARyg@ap1qwy}UN`j1pg+cVjDtgUmc>-{XR z9MR;?tQPrmt?`+zRdRdG0NmdWuY^yfPK$}V1K z35nLI@4vfc+jYrtEx_-1D0PBE{1I=+;j1b^v6oOxSk|u=TGJcXYJ&19(?w|K`=D6C zCB;+f!Y>v<7j`WqVSQ~vmz7%6Yb~TEtxYQSFpU60diZq##w#iG+J0FJP&d|Wg1AfX{Lh95v}C_z>$GP41j% zj=wlA8#_GKGs=xTKC)}LIrQR?3<}Ej3~>FA_wVX!_P*FF>p9%hvo6424A1Cq&b2sn z;FrJKOVI~$jKN7xB3+;fOtL^lC~hGTV(0~mWFt%f4|2f>i%VFj-YX?o=>aK5pR8^$Vs9B1QJ6pewKP$*_S@S%cc$n06``altdP!3>{pch!D5HQW0_?f^#7Pi%5gv zFts9Ea)2cIjn zF9aBjT?o?=EF2D!l2GJi(IkVOK7Vw_+si)pdkKOD**MOyK|%tf58Yg#Fgy&SA7uDX z1p^^67z!}VN!`Xs4Bd41)b_U*{=6tW#8D(kaO^^Wz(9C_3N3IH%z-o#j)W)%z8E+$ zwKS|679IA;cg(%b;G@R(69hlrQclXU7$aREsX#|Iv%t|3Y(YwffWcA(N1m8k`T*Q4 z*h^0PkLT6bnOA;*xFEcJ1EI(QEtL`r6dRB%FyR2Xz+uo!se}zgBqzQ@9gtEK0PA1! zZwBb0Cxy|MU^o$!!02-X}6Ick)5_SQ@Fo+BY)3D`Ee26%}VDK8g>F(3!(QOoalBzg)_o40I z;I}h*Fi1usk}$vgX@*&#=s<9RWyr_^i(?@GO$)$AI9WDqSwc`lZzKCFqU9Le}|=WS$fzcbjGaE1xf1jR)b;IQH~c8G;F3TGM)Ta6_^X@?^#6TvVCC>E54 zW%NHCAJfYCFc?NNWB?`{rV=&;e20sKu>~d|At;9CxIjRJU+c3*%D1r~5P-K0FK4-30SJpLK!0XY5n^*c`yI3<;= z9Gp0f11Pt6q@p+P;^%=lh;sxN2yw&$L$M$m7C&@f3hIfa0uegQ(UBm$RD`PqBRK%t zQrh_qZ!i60ck?qr9ON*9#)1?`4`HxULqX{ROG;swLU8VZQ4^0yR<<=rCnXY5eZO7T z&$~wu4y!YQ2PB|HLj>$M&~N;4&n)n31%px`QcQAU_~`>IO(WT}Pi(*7?Z#zgXAAD5 z03Ts^X!P!$!0;1;FF_LYMf@{Y56@iRG9++{&r_GYYANF~wIv@Z7(!$zfUa!9ORS5G zdfxp==ViJL-QE1lTzjh3!g+%)pWiANOtG3RRw3dAfP`_%?3Q>!xQ|X>1NYi49(ww3 zEZA=EFK%sTuK_C~xY|x6xax_NpT=>s-R2=VGJvDo?rm*Ea2bbiywxlSwGq;Bw?cR- zFDAImCteEG8SDj}K|uw&pDfN*H(PNMPs=wX){ubodNS670R>84T!yKvvQQ|xronMtI zS6SYkvjNp^Xl61eFWM4K80jV@i{PLF=XW!Z396cnl?&$d@4wU4CurUxL`k zb*ZS{K?Ok(1o-s2=nKwSpz6PU&R$*RD_lNoYE1y@KDZq%F{jpO%Y~S-S zc=31d3vtgFKMoeZZeF|Rr!v4z`90`mwBr+C_Jb1aQ1lt9IeJ`Bq}5mB6QrOTNVU_u zy#(aSGbhjUnytYF@b+LTD*+h?`GAZ|N3S0K!r)KAT}t;HJZ|)}FY`&%g0H$B2|=hp z)LVCyLUEZI$`f{sb<(?9>!-VU=xIMhJsy(2ds`db1xjG)k%lMk|+x7K8UF<9(ueP-z$I{|IZz~|H!t?r&0@!IJ3N3<)|u~D;OJUqtcfW6>`sP&(}q1si*&U^Pv3Nr z;77mho8>KS#izlK2&q(jX0_;!G^DdO((KP>N+x&880D4qCNv4CY?JIN7U~%Z?7R8e zo9Elvdq4=ptQJ?sJT3Q;9@1?pnz@q3UIu3~j5#>TR+G`LyWT5;XKelqj1wOK!zWk^ z9U%%4FNf=m`bf&*WtG9s=`)KCeh#!&HxC`N6=dzlKi9elgcz6k6l=lNhRf?F6HcoM zhq|oR#;cu1lXjgnmj9hv3KIo0;C`+#c%#mvWbL5qQjg#j<)K8jUWG?uQ z?I@pOEzD{*FEhodd=>PpOyh8RarE@J;Rkn-(P7#5!7a)M@vFbXdj-wQi{K;^9E%Bs zJsZpvtx1NJyGj5}-&v-KueUZ#u4V}}CNBEbka&a%N3tCi8D`~3*tT92- z1>b~Dt!AN_ZTU`W!It(XzR9n7<1$~IP?!Y8L0}x;hO3!TfDz_j53cT|9K`m`My- zzVf-&KM;2BI4F|mTc>Te9329I!itM(YK{QljioZylF@9|fFBA3?&OQ*P$#R9u6BT# z@=q8NNN-1-2x04wkAETelh$eThNJzke1wUQ=1hqY?hKWbCS#%&E(+uPnP*^lx>ykL z#lAy8X&qi}0pvfQOf7WN0ChGoJYmLJ%1(O1T!Pl)vg=bmoOOs-}j+v|_*K_B3O&(Hl|en-$p`Q&t=6pYgqDb)zAkHlD8 zRO54|I!5uGECw&PlZ@huu6C$rtELlHunE0iH+LS&ez`fvBdk7%&iH9-|4gY|VGAT> zEM|=90HBphh4HTa6vn%YhmJh99`1P}PRCUH;w-g~I$;l6O6sZY|kqgUHg=<)Yl+gqD@W$LM^ho=rtT{l&j@=wX9 z&Ys#Z`R3$Hli!_uVDi6A1sf$(ZR$IxSCP3%wh0~j;KaaUhNx#bvgoXF_EhoY7I;08 zv{Zs=wM?b0IwJEgZ|=k4A4!}}6OnA1%Mb~pJslnTN{61Vt2|*Mk_RxTk~SG)lAf(X zd)!7yscJn9fo~;CP{X*QoereyNo7Tk%NHXIM#^z{!etWV6nMZVW5dfCAho!}Nu9qC z=w&8hC3RV{8de1oS(0>Q1bV()3=yo$;wflj34o(<=mmOKLFMtRuTfB`SdBC%vH!Y5 z&*1rhgenES#=0h!wl8*aunZ&@sBR}H~rtqH$ zBZxu3D-M+rL)BQUCMB&O5q?+AqA)TFcUfOB>Ptb+Iw^Fg00_M#L&ynPB5I=4DeI6x zU#yf>F z&@;GKg@FlM>LxCyHIfzsS(j=2E?jBOal1IN zy{eR?B5I7S=WLiQnb2J((xq`X7*a`&t=3D$T#&s&5L2(DwS>*Cs}T@NDkTrRA~dgi z4PnY!@#JGFg)b!w?P!SfMF(5LtzNy>jpISPirKzhWN0c8iqPoNI$uo_v84=Qkxr-7 zR3;KPVb!$C;g8GD66m$EEsjH+tlV7WijipP`sV?V!leLLHBC zyx>o$WmyXuI;|k~hmo4Km_1;?G7>CK?0iimV-s1Jgn|o8FXPGD|Rgn=c4;$DT*fl58Gj$h{F4HNep`28b)Wva;9Rvl3r0z~;@| z%z2v^d8L{ztC9>EQsi@vWYS%+h1QGxEGvu|yv|tdlClwVF!A9Fh3}SXtUL=Zy{aoD zwOAr@L%^S5(|HXR={Y9Qi(ZY4;4C$RTSA6O z8N=Kle79&W<*G8DN~4WPQc7GWuGylpm?K%Yy5vvh7UjwiGx~-gr;v^kM4D8UsfadQ zb*E-TU0zU^NL&+Fx~YOo0(gVHI zWb}(7J+Fu2!C^U*(W;GffI0BEIR1IAWF;ImsWTzxV!;ruy;J-L4{0X#8Z2R{n{y2^ zq7YE<$lngT}||9pvWwL^9^!LWYJm5|ZdF-sIUo6QtxK;XG-x)i9qcl-Jgx z#s@{ZKVV)Yb@5PyaqD%QPcnJB$gs)7ghv{yHuM=PN^xhGMLJnbQ*OUfnz6(tba#b65o~WX#V@2uDIX8#k+QeaS8JL@CBXNOa;bXEk+-2EU^Vw1h z!dacpD$-f9ggL8*jJ0ObL=F^$?`9Qo10KiqIc3QnO=!4bR`_lv9yAd$b+lG9DYV%{ ze@kedv8QN&SN8@>`noaTp@&}=o2$JBWy&Z^B|LHy9iRIZG+%_(pOIU0lrzR^D=~-1 zOcR?f7v;!eYBH#b7pp`$T?q>SPgaW(jW*qr)Y)GY~mlY@QCv3Pjw&8GJ>lqw1BM z;S|KAeOV)6D^e1RnoO5d?DVWiH!DiyBI_xe3QDIVXo&9nyvUHVP)V^8jbfpk&E|*< z)kV5gV<5CryIdV>c&w(>&OeBBIvFS9A)_wez;Xd?RR5enPdTk70`qw5dX0yX1@K)p zk*;yqa1|?+%W>;so|7bu-w_!qy9rO@x{#j6-BB60?|s4#PB8>0ucxSL4D_2Pc}7!c zp7i1z$vP^yJDxMAbU5`Hkq#wgNTtN*FPS7^uO`0vQ-YYJJH@3UzMw0iZg>*Z8T?Vl zkAKo8*OKv6%@vL(nJm;4{)#AvEry9kLoZ`D;SnkbC}PHn#ua+uA zrJg6^u?pRQWTPvDuf~IlIIfO`j9M}kiV}<5cJV3@cUoYW{V~?UL9Jkno!BD$L#$A! zlAIi>a8%r7($8)Dvq*Ppy+n+%IN(xk)oNq2qLPeh9Ys8quWEA2fWr_8o-dwVF-;^) zI17bzNv19Oz(M>XFK1DajwwYOdna0Vx`tS&6kg-q@czWaJX zOq8qnY008Sp-XvV+9)HP7u#DD3cQ%p>s4tfUEz{*?-1#lu!2gNwc4OkqR7`1=Y3z4 zqxK{NrLaflqO4g>YMp0D}x!6CGUu<&RMr^T_^JUI^ms?&Z!(>%2Z~hd3niRjK#gb6Z#d;sgtD2 zLmEuBWW-xyJipiWZabA(dma6%yqt))v!q@wJA0?IAo+Z zr>c4EvWS6*_XyXz45`=3s^OX|N@p6TLf9c3&48v{a*@e$+8&QGs$@92Nzj!U@=R7@ z##8xLVH_w+y0`%j43Cwq2}T6iPm7#N5=M|l)1AzVL%XR`$| z>9XTS%H?96Qo+lRco8BVyLf<{_sdRN@m%|VUgRSuZAW?3D8W1y)m1!B5)0_1I1{p_ zEg|&$D-crNO-8ozq!6o*OuqtGQOC%XeHDyM)}vz}Ot6=f0vS_)fV%2T%EMIMB? zt01hKjG7nzXdjOOuodn4b?fhfu!~>oSgb}tm|zNWVvxB)WUE!Z-c*umLLqe7YhY&W zBBPlBz+Zfq6l^2MUOO&p`nMpotvNq;wcoaSfGXA!;cVZP8y^uJz z5Apdh=<(mS{weh8=f7+1*s*lzC=X*MBtLun);hR50=NPfDTc~QS5UN^`?7-3nwEKY;l=oZBLQOLm1AmWSIoH1C0Z6!*_a24X zxuPRFW-?L1fF)tehYH1Vj76R!km$0S3gr`RVu17$M_S&VX@G!9g9;4$0VbybN2c&? z)feI0T`Wk6u!7C`_4L;Er@jcW)${aG9;!)j*%mV<8E!O3Nfj$EClyiN83?sSR#Tz& z*Gp#}k7_<=sUPJYYMnV#lm;RgA%_y^v4Vs(CLr7O0kH9X^&v16cJa_*#UDEn$aC$} z9)?k#cO9MOe}2b0Y@-V144!k=?PjAvUQnSQoV5h-u3rMXR5Cjs>c5Wel;8f`l$AI^w@g+ipJ!(d8S~`PTJ*elo#VjacV9Q8hxwSB;3RfU>Qg zMVQ;pkGuZ&UP)cc2tM?O)}^PI;Gg{gjFf9la2s3N^no7K{uB6+J%F{Sj6zX) zDCg0Docso47bH|T|Lx7YNwAunaD188YKso33I_D~*H7sJ9sYCc=6S=N3HX^p0>oP; zs`E3S`turd2sPyM_d^Z&zqGuYpdw=m;1)5zQ=jld3^ZUf68+KmE7X-q|&oV)4LB$KHVs zym`tIxaQ4HbaP}Sy18qu2}=;t{{9ZTp^FFpV67eU1HRLD2%Yv%-X9Dw2_~hi0bcnk z6#Ga4KqmCqp5|Ba=F_Q@6AspF%9o1#_gNq?9)maUTpAc#=UBJSAr$FB)47C#FU$jB zF=9cTF3lw>wX3F=)>djztON&;&3CO|vTk?Y2~jbkn3|Ezn(&Z?fTv*GBu~cB;_jtQ z=!Nx5(@=VD6%Ul-Yx~6Y``;UvF5y8_YXBfow`gzJFg*P zr|9LePcMA{iA#2H{nhLGLI9PT7(LQ+_3#geb_~dQ*Ix#1cK)N=SI%R`%_^5G|{=uFlf6q)Hl`WHGRUN7p zNl)I9)np6o6lH!cHVsy5bDH?p16_=C1qiap7r`UO9h~6E?nA- zM$cTDnq18S4<&%+Kwi*XJ9g$0Bt6B_Qh6RXHuMdjR4d6V3I4=@k_M~EDBt|S-ZqpG z-PMB(`A+cd^vW$O0bfs}fdlaW-FvRH zAGaX?fu+f}>_>F???X`Uoy>i4FaMrgGNM6jzMjF?%+x&E@0k{&U4O!>ya#Gj1EbV))*{=LY%#1Fk)De^lRtqOzrl z8Glhxs*y&FlmtThs;x|;t7I@|U1W6Zy0gTHo7ZJa5bI$+%3~3VktZI1R6%8O){4^* zp=fOc6^%>#rn;yI-@JWK`$;3H8+hFDz=OgQR&I{^++;af^~(c63l0$;pU^`Gy2wIs z2O#jwwKp1;z(sF5%Hs_R;TFC|-6N%p*_zQ1$Oph5h1`mzz0=)f^x~I3*(m|FzWr?l z{D`>|D1+eN#Itx6?4%M$Oc&2^=uI_9=q3a9&KnoDvzjFyw&Lh+=z#FpEo%v|i3P${ zMTsJ;zPuEDU(0Ks)nxSe;q_;u+wQtyWBVc<{~N4FdF(*p@oi9;{C*-6YD7({NG0S* zh!+hNXy7hh2hjTF-#iM)7cW*ewLhlfyW=?u;DMs{?b>j#4`CN=L6@4BCfD4Ig8qHT zyrk_}9OcbSy+_w|Jm(Kh-8S{!soa!z>f)(0rlu$VGWo*fwmO~7#z$?V?C7r1v5`NH z{AA=CBlnGbc;vE?@Q8UtGO}Z2aQJt_KOBC1_|wBT4cCXcVf`>UJU84w^qZlhLth!X zYv}z$<)L>CsfW%P+C2EL!CwykVDMqcm%DDTFz6qY51uu+e&Ef4mj=E+@W8--4O}&l z9&im@FtBG}qW|^&|F^gQoBf~bzqx<0KiY5Um-e65Kiqe$@43FO_1)X|!M;XcpikdN z_RaApKO|6h0tPCnG$$ua1yYtzge-Dj&|B|Vpek`!)ki8ExGA5?<|8q$;C!lN)OndM zNU>F;U+1m`y?q_SR24JedE8wsCTo?LU*Za#{;!UdD#m00P$T6l+8ji|k|duOo6}_r znYKo8w0v(xE_GO_UkB0V3jlLbvlUyYaIwOq3Iy~3|*1QqoxWils~IOQrv78XA!w)Zny zLZWimoCUidb5lB(*xn`2SyOgJqM-<>B&7T)k!*@P-Aau!W^g*ZWL*1_C`I8>6Ut&t zla1BXgp9c8Jb_-%s^D|3fX~Z04B-@W#-k!Vwpde>IS9v7d$kG=L$hBH8DU3*q})DP zLGOsk6~x(Z2;YSRz>8X?94k*H)@_MvvPyN`@=Jy;MT(_^Q}m!k9^ePMw04 z=?WC-eS)u~QYk4LgeA;@OCuI@>+xZ+eI+kbQuUHqqma1*x=L)lsbf8^R2FmK%k-wQ zQk9=2s;Zw0;w#aJhDwz%n^azK2jd}oSQyVrDC+_joXTl0+5DOyF(oz+Y4W%%0|@%8 zGg+V4y-~<2mqS%PYECO!=fpx7l-KK4-T_RErwgCyUIl7a3-imw*5WO`T3@ zuvBzjT>a&;zD_7?AsGceO>J6Yey7l%GUqmFje3Kcm6qaoWaBM@n6kR!CuP=HjRJE( zEgL%TsPJpcvXoTsia}v%0K$sclF%9)MwJr8D^nCvQF|*ypj3%kcL`!jDY*iV#PZ%k zT*GFJp()F8I$gwFltvnF5anbpv3HwDHvzDi+Nz~ghH#0MMKywJqEeDTO{b#43F$#4 z1!bYcEmzFLP%Wlq)wGh3E2@(Cz*)ktD#mj$EJrpHE-e`_)9VHQcBSYFB`90PS4x__ zA@BrSIvy8ArD)Fk2|Ay$R0zfoD1pP`Bo=jGsBx5wP<5#oHvt&!--T`#YOyL|%ca!1 zRK>d(^@h*AOk}Wr8&UFNq(@6fGP%@gxX_=1G~(A398$N3!yx(6{Ip2MDz$u88VrWQ zvY->c;A}xkK2wd6ac9}02pee?LC^LI&GV_C*=^yhX^%7b5V$g$wZ`#%;#`I(Va7|6X_8jPO0iqiL$N_ z<@NE&--~p=G)Gu8aZIK#Bpp=h?8W;<`7+4Tq80u|!J4V*Ej{~>lX0DzqgWU2@CLoH zoubyyNz5FCUQvy>TI-B?BZCuy_-w%wBK49~##t+rYcgun29chVK|qJjM1-6v6;$TF zQ1HG~vVldZ7Z2OadUaf3QOF5xQ21`9mb4R=JPxJk696S<_6c$_We+%;)TSz=bl3e! zaz|Vk%uK;jXQ4Qku4I-}LewwB)&(L!8Z}0Ri>t*wa{8P*M0&XB!2Q8ek_<%_EsTP( z2_D)?CJ?KU{uFMC5v0~)OHKVj{D*)yg=f^IL@BNd=F0)+MIzl{PmozCyzVi&Q+OgW zFte!-?@?6Jc}$IyxW7_00b&EiE($*?9kFN{iAFiE3`?Aj#Qq>i;rD+Uj(yxCm({#J zIm8*!qx%K%X}PP6o2y(MR3t+%p`P~~r{hTqZmMow6)zW^ot30NH@rZgn>3r;k+kp#84s_Y47nQSCm z4fVZOkdsPU{J6vypdtp3IqXT=#U-9f#EgVS!b(b<0%z?K*&||mhr~;InT9D7jc0Q) zb}S-{L$d0shD{biA1-AUEplevT|)b0m9CQ!2wABBM1G{k>=L|al_X@+P->ac(C})# zMg?=$o1&bg#iiD$6V@nYtZTVl*NS31S{WfP6}(D$&1p+Yc8K~esfz|kPo4BPa!_L4 zk(lp?_WbxKm5v6b0<=1%DV+nzyVHf(%u15>L#V&ho|SmD8f7E8!y|rx$_D`|%A}AL z>=I5dm7ac_?u}4(8KL#t^<*s=KXA23Crw_mS_@&mfZoXkxn4r(KPVpGV%ADUJ(Nrq zj|b<(aZ6-Wb|UEDSQF#)8q(qEBZ8bnEL$O2PcGnc6O<$&op?o*GxK1k=TXeB`HDJ>!dc9(kBuj+hU?5VTB;NN*u~55lqk>&Km%? zM;p+|h403_>L8WP+GO5ZBv=hg7j}zuhY6gm9How_q7APzzWWK0ZonatmW~#J@*-(U zhsVWr8&^4;q@$50Dr7vZ2vM8i^05fY9UQPq7mgsqd66kb0x|VZ#m>PvyLx|Vxozd%V4I`CTI*iQe=%&F>Nfg@ei}6^(go3NCBP$e1%eCeppSGSo6uVhup~aylZCVUg|%ddRX}qAHTU zMo1=|5bw2N9Tg`FWG>z?bFR8IH9Rf0S1*Q?cv4bP1ry-4Hzr4(5*e~u0oPWlnuO69 zr9)KTs6Y=DqE^DMtI4yffV5za&Ll=BUt0I!9$&8z$K8qHru(+{4fOuD_u1Y@d++Yw z-E&*ddxuTK^zioK0pXF?yLsrY{&?r1xA@K>)zHGw?BG9o-!=I1;FE(74t{d*n!#Lu zbI>;^8$5GxX5g>=;{z`ae0Si#2R;t(z081n;KG4@15^EP^#82)hRH8Ze!TDhO}=L` zJ?WafU~jE}w`@SSFaB{KU?Q;qgC=KR^Dp@q5QV zINlf!jO!Q2$?>_Vv&Z}UZyEc|*wNm~*jL8xntEmIhOz3{!7z$d=(6D)1Xq@_!MIx1nGp+ampVv}BWZ~Vr!Wga z3BigM9MqsE>5zkd)`dKYGn;}GOC+tp6owR;DdZIDh&m(O&Mc;cCd8Ce_+nnw$ViK{ z@p?hL(V_B_G@1104IvJ$$p+!5wiw}6h;yEB0m59MZXm6DRfr6?0EWJn@aI`vm4JAy zK+yY~D5#w9l4YNls%D~enTdIYi;qPo_Yi6aWR-;_5|3TF=rs!M0Y-r%U06gH!zGQn zKIvH&=qi~}g-2Pl!tVV4jC~1|TveHWD!ruB^qQp8SxG|Z4m#t;xn7?d!`xFLetEsEoiQRXj#2s*AP{J&T4rJ;+? z%;cOtIp@3geRbcx_ub`Nem~$DFNOV2i*lvC;=#0*dJ400aMhvwgeaF+QYwgks|F}S zrwgUy>!&2S+ldoqea^496O7BA+$WyU=2*Gifs=U+5irXQDRn%x_6f1)2qYl zSVd*TqdQLNk;iKUo^V2Ll1|<7U>l5G{cun9VnjyIkcm($qjALt#V^a=a?=GO7Pk5z zmdBOj60W6w`J% zCpYQLMkLAUT8_*nfKI$2Z@SDWS{zAxOWsleY`nLqP=y>tlGJ~^Tc0%rvuYw03rF3J zM9nfsa{d9aKp9R}NM}J)bDF{qj>~wT7dt}LP~|;@RjZ7v1Gxg}eMl5jwh~4{oQ)+P zuBELNuMm#6R>NX)0|sGqH6lpM{f0X3Ii)32aXO3sR3xS?xitz;P1G`HG3JZ4RI2G$ zTBsQq=Cuje)7=v(t1Wt?DPG%b z=Dl<<;u8CkHK`0y(!w+{J~Efq`ctkWVk0d8uS7bviArrQi6^T`+;y4M2bdnitG>`IzwR1XvxsDHp)H%!^HY@D@x%SyUovl=gmY=dkFEh=w`#OvQcWE zTo;UFBRdzR>WNI4EGsgOs65rIDAR)`*ph`_qdkcRk@ML+5w|m@qUn8N&>&0O&8kYx zsmdxTcRiTC^e2*fa|q~0*p#@ylKN9SyL4d4KmVnjhLp4(W8!!?+r;UZ!>SFM`CrzP!_fbmzz#OP|U z5(yiqQSlheDhf?ld{S(_h4B?dE4le|;yWoKmhR{$n$#r^hfAOD+aH#1Pj5h z8NA46jI2s+4xcq5)z{}Uc+jAgyV!6bZlNy~O=K*gB}t;>oU1u3B{=z3s2S1Pz!Cxi zu$yz%0CvfWTd}EsmK2d1Km}`75`@<$Z>4aDOqAnIZv|I54CP!(S*cYc`l=*PdEG=S ztZ~y7GHNqK&lc~DEN;tcNo7z@%Ug0eH)o0%e=0p-EEfqZ8V|8aK=E~BlTA^MRc&=5 znsNa)nZl=G@S)F3@_brBdiY926G%6miNyFhk{p8i@gQbl%$UY!NXEAwlH@?jhr1dz zE@0tkr6s;c7y-Bsu$bGND|#(SOl2|DJ-A$q%w*XdSX^kYMI8_GwFbBC2cjAl&O(Hx ziPaprT8s)Sr~V+x%|VW!aX;Z{#)ybKecAXaxd-N_$<<&8Urf)1&lGKuEUT_r3B?>$ zBlUDPt*NTk{!E;PtX$`J7x*%hbELCn9FsOWdnHsOY*MMr3hOzs+R!;93`v zuSN^aCP%5oQ#osGHWN4#jHmN#A=Xl5G|!0Yt(6S!4w~v2LtSIE&2bk>6T+HLW{76Q zAFF!t5N5*9N{afeURX@SDRZV)cWQ8)zCbR@EwsskTg!ewU)O`_Qn5*zxMp4(#yog2 zS}W&kMmBNDUE=SWBV~Uw9^&m$8>tRNb-(SZnPbfnZveyHA<`M3a*0Z0n`lE|%>j81 zBdWDpLQ~G`vWc?{;_sUM#V7#=1Pf5{W@=3I+?|qsPuLobX$(=LPwr`j_kLTd4uo%H zBxvL?9Ii}hZ2EFZuHc%ufth2yaz<4fLxgW20vxQ zBCV*`lqIcBAEuPPY<=DyAc9mTrMAkec!3-Gq1e-UW5p1xry@Be9}f^2`3<62mo$YN z2BldYgEWvbw_QxrV0BIl?16f7#i8PXgfBX76q}rCimSxgA4dfwrmV zh-QK?V`iV)7*lF?iTbs*JeEwv@RGWjXV?_AAc-N7&7t+FGB{Nva#772k`^o8ARr0B z8uk(iK9;#inuc1fyG|HdNqwG>s}}m2fn$-Kv zCbe5mV8#qCwNjJN0SR)5Of{UjnAgt{IZ0292oVN-TEnsSWZI7J_@pEcQ8~ONx6}jn zlGSF85!SAJj@97sy(Fyl0IA8bz^;05UVK2^GNp~=RFZDJor9IPWZJLqh_nLB0`%33gs8YUSoJov&sdu za~>-0wP%R)MY|)*q{>aWlxE=!62U^;86TFa$GD2w$kp@4tRiD2FOj|##(-C`u$dvN zR87lashI=fuc{g_l}e#Fu7R|~jE30xAxWNs)Kl7B;?iIzRypFAUM`(KR53nGnR~R%+)rr3X01M3jmQUu|KevjthzlHB4;U^%}r6|C1Wra-Qh_6ijirwM;qN9Bs@ zK)6H=J}%Xlt4o-cj_I6nv&LA69C$>OE9aV!H>pZ^ymd2^h>(#B%~CJZoe5^u*ZZNN4qu7XLUfsf(3x|(#$Cx-dNP;6=Tg40{dV9NGOgE zzBn-2N6QjIgfI&c!q!DOc$US?{-P3R(>R-Jnv}VsKi&7mOU!3#%W!qhg7lRrRoW+o88mpK-lUD}AU?D+8E5yOY-SZnKdP)GA?)Q5nB9U*o z=OHEkqGd<9rAm}lM99Im!tQX<1I%830dS@(uA1L8@t&eC-Jau5AKcP;?5cS{Edhju z3n5fij5%;+>Hsjn7&GZA%PaLt^rjEOELKX9?A(t_02LWOv;+L@0;!znZ!ZxwJ%eY$ zWtJk8$!Lv2wL{?X?-irNGj)i07MLS{eMofs3q*3F+dtiu7hFWhLl`L@&l*@7o#TbD zoE|Ycdf7NYcYN-aZJoQkLfFB1%L;IcDKogvr}e-4fKf78@^r8hF58b z7P~^|3Fo4~7bk{K7&HpM0XJ7PUOhvbLJ1B%6M&vrDMq)+@7^cC)9mQzg7eGlmDh+A zH{Tij!@ya6cG)#!hR&W_?}`E=z@k8-CcY#_cw8*5;?0_P%-INektPPg9X(PY^;m)- z{~^5NBQc?gjzu6Yle#(=%liNhH5mvIygugfDA30<@RmJdg#Bq3fN=@*ihz}}u``qv zLL}Hl#d1r09-NMnA%BjLXRSn9l|-*5VaR&L=&0<9edxqn^HZIxQbMeXbCF!`t`MI0 z;h3ouQe{l}npK-X`3TJ83lb1_*;|INg#1Eu^}fR!IyWVRc}y%rOJs~ypVN|5>4|j7 z4@U<<%k1b1DZ2k>{j-QYyRyCW%ZM;@9E$?IoH+Z+VDKjJe2_QW!fdFaivuD#yh^Va z?fJ`9`_S%7KeDAmriJcsEn=WU{2*f*xZ`3N9VM(*Ls;)qpigqptvzD&+>Otjd*sbe zZ0U@Lg;ppQ1)@C>+M-EXwQ?LX;Jo=VtJdZdD4v5>^okL)wYm>oKlSt`^!3FJ0F(Ck z{EyHt^Ydp-HrD``$rEF`!8ZnW_E}`j5h1cDEZaVBUpxSPB~BoD(U!1ViwVB!acNBG zo;~xM&||InO=CR;Mep%*kGuj6-F1yHgY1g}J(l>ja|%_iOq8^?V7M8#Mw1ytRpC{8 z#ORIcZ)efO3pZ@*e6b3%9D4ln|F&Qck= zYKL|49X_m}Cc_%Mif}4ZDjTY*2>M9_zOt24#4UVa<{du9j;#sr0U#@vKqEvZOLwHH z@ndWuP{zwHe=CiS3Z3z}A}qx{MesHJT%u(eC<*UkTU3D>G2SWaVi4?=;YT4nS zqiCoO-O(cko{zP&=;|L|ySdY>3-5FFqQHID+{(_FG%7giM+jZX>nhbt4pj(U`+lJ} zdZm+zK~v}N@1F-szZiupQr_!0O%cg{l?R8JXlel7#+>PtJeb*`NkgJ=!QLA1Gu*XF=7Du-Lxr$HAw|1i8@ zuNa;5?cCq_)L{sqg=7waqUzdiRt=6*H5ZX09E`u~JWvI9h za+sdIYkF&E>8AMsV4wfO$PD`X&GWl=1{RIbqIKOAlV;GD)RH+(MdOeA9ho43ZoUs< zV*lEnAD`$ggDvAjm!sFu`$T^yurLovL;-KHk_V_xxXUL(F}U^%-LmCOl?s0+jY88~ z2~B>!vA=_Ta2}{jOq{nEBU}lpl`G;N0~bS|{LuW&M6Vbfee_a8XX?YkBX%5aS7gIt zBh5rrMV3f(?Ts+tJ!16SPrqpDym_NA0O3V}qDv$@F{aWPBVH^4XBgiM>N6>%x&;QH zSB$!REdO%L{Fh~uJ>z?7>~FdCG-EFX%SJy2;rcdDqG`{Xvmy9{kPU+Mdz-*w(Lg`` z*gU`hu2zaT9dAL0K7QKR&WAn@LF&Do+U@x%bnPc#!{{yRym4d(qQclC^MOr4zZ3EY z5=2O=P6l}!#GFFL$I+hxsoyh4<~OfieEbJ5Y(Xb>Z`+NoKX+f?e+f!ow>S5hIlxtX z-_{F(uA~Jd9@ob5;LH!b8#5A(eQF*!FtrdB+tQ~(Suc=k>R?DC3Si*m1+Bn=xoRmAIWRvp zuLn|5$DDJ=vHs;q?B4G`jvDu@vMh9tzIgFNG8F#w{GrL9J3tc{t1#Hv63Z&wCAw_fM?tsj7B>_;`*Az?ftq0J*CQop@rt ze=kYn@6xvF1L!tmb{bv(&>j-qf9$lgcKv5z)>gEn$AeK3zJ}QoaUDQ)3yntK|19h@ zJ!M_`Dk&WM-hY}8PUBv{z%*xUJka*EAaw}>l!5rPDQcMg{QSmEtJOfVCqFU$f0?{T zx3Kv6_Z~6FPS8B!?I&*u9MZ)K!B>@T>+{c(P=pt7(6(5&fvtrpTS}I?STgd?i^?j zWClC~mkrE{4$J;;_WyI=ZT)xjU*DhXcl0a!clQzf>xCHAvHfGSede*Tz9&ZiIQsL^ ze;d7T6!kSn=SCCYyrla+Ke}sl-H7hDBR?K_eB^T@A04TWyl=!Xa`DLY8E=n$?~Gra z@!T1Y0L#RUXOz#l;tWmSjt0>=qiz`PE$eE1(Jms_uD+qQudjVxreFKS+Ru;u zeeG>)TWiB>&1;FZJJ$BgUX}ew_BGkD@t3>)%ukQsIQ9@YG!Kny#}>vfT>CtlbiGAf z!~}ABEukq}D0w*Biee-?-Mx@AVZW1X@ot``!)|SXXD7ydvbqqTTLu#Aqw#?`#&5yW zI;z?zCUR!8lMehye9)0p#W2YF=7Z5}R9y-j?q1j#7hTa|at%cX!sV#kko3PUR_7oq z)?K&QXnP~A57Bo}oi7)3DT3@rj-##-(=|0iRG|V_mh7tw#Ao0|Mhzcr>^I$4v=SE^o9&H&Ega zI5L!uP?f;B#9CsZT1Iub^jaxXl3{_inq_^(7D3I4R%^!Lx5fxnvXbO5O&0gjYon4L zm4hd}N|ijrHKWcdX}L*~Q;jlUdb^drg5PS=aN~DKFUD1PtYqR$9^m~9dwEtgdogT) zisB__A{eo9OeRO`Ul7|f$2zmIus+Z#;E^)rNg1z|^sr&@>#?Dnwm}CRA?nlXYrJ(qnG`nY+1UbOdvTikgb-TM~cQ9xUXU zEbgBpVm_a`5!V`qezOj1c-^gJ-JdBtrQzzOW;-t=w#IHrw!jfe#?%Q&k7i@T zNlC8CB!L?v#PF`VAyOdLZ;^hLt^&v_ljih*9+lUyiDbqBO99?OW@ZE-qA2IKiiKp6siSaOqHMD@oEA7@d_ZiEMQKphnpFlo1aKk8 zG{;5t=6ckHTg{BCno|Vl0)fbcMJlK?vzXIo3A5E`+GXQhUzX%Wb%Ct7ipdC;&-k3! zC5$AGau}A37`T*6m5y`CO)p6DfZ9p;)f#83P$uMc#igH-#F#xah3oaW-3TG!@w|fiv-o0WmjXh&ifXb(X|?gx zK2Fqc%G+yzY2c!pt^yWPVjG?lP*gdxjV;_-ml-J;fiMywwJG8a|2Ri<23T{XtrL|-uzQM&-r&!DKsBC%*W zpc>yGRi~1csKr;e)!h_?&z=1RQG3|!s^iLVCYP0)u=re_+kR@Pgo8Y#G&mFqV=@)x z#>J>cCQML4b*Ws?Rr5AZo$i|z)o{&h8qd}J{+t`*V@!1I{gNEK`~((`+vd90&T_*HJ}8xb zP;5;okEihp0GiGbW;R_Tu}gk06-2XnEEKl`^ikTxail?XE;At@A||s9y}Z!mb$KOz z$wg9qmP-@iq`8<3w^~iN!s3zS22UDGG~u2p=d-+AF?x$6Courg&|oBG2CGb+o7?pp zu^`xNc(9l^p;3i2L31>|jhEyN%8BIxnJeHfW#yIh?AIiDq2R;-RWDhO0?k4yruw5K zkEfahfINm{>Wm?h#CAy^MKD}WlJdHN^8^$sHk#fe`c38_u$Zk9^$Nwaq>cCZ67=6h zMSya{5w)bp?DbU3)>Paqtqy^Nwt~m4MTjY<8Hw?!lAH*Z$#7||41pn42yzZz{544rt}>-d9-S-e$*HT6Jx8Vb zST#+WLN1%C;Gpc;RKHfN?l0u37P+EfQ5VW}mKsQl)%|HRPY{KG-sQDatnmb*?_C#DjK_zvY&nGQ^=vFz zfc>VPae{YDp}qc;SYaY899WZlE?daC<%rlwZ@J2l@upAFL!sqKFi^|8x4xvTq^5UCa<>8QVv#^8VW-U) zA2B>F$=Rw6Q}UEOq%8#vUTzkX{YP&lxOQ~OWpH#L-as5xh0Qn7Tk#wHGk zsCbMk;llhx*_*xs7q)t-7v453n+V!%7S3TEzYqZX*KMC>!YxA-uh;-Qnc$)dpj&ty zyj?#Olz#unv;Bh`u3Ix^lwCKH={q!h=g{{C-yDz&KCQS6U3(m|ReLYl;$Xf@^ma(!7?S<-fIeVIgZDwu|@^s>|`W@9(fe(T0LTPICA@ph$nQ> zzsz@Wxo42=vH9KG4U3MU3l~ydqh2DP$CL$v42A(OsbELV2j^$TRtnMaJv+}v@|O>9 z@BHS$d9!RXm1#O^cqCa4*VSCAXvUE7A^80sF=GDo6reue{_4)o;}3x^ZijhMAb8Jq zf0odujCt0?6@BiQC7s04whs86dZg%y=XSyyynM~p&dnXsgxuwL7p;*RyG4l=0n)la zcmp)0Kreq48qr)S27;7d+0w0 z=)Q>Tqrz3M4j>GUMS((H9O48Z=>i#cnySQ^T3DG+ipGmuo}Aw}wz3SJcyt@URa|uK z5W0VNWkcsTPl~P@flFP~6^u6V6jm)l5GKT{w&+{BkY6FH0o%{Uv6V&W=$Gz+krxPhcK@p|Zox&@vVGhV zmZt#Uj|#Xfcv)%4N0IF*Flh9Ofz^HQ{?3V~1iQ9s(F-qQ>JED?6moJzp{i~=Txwgb zOrW>E1@^CAu}Ccg+16Xp+gIJGqocmy5(&iuI(85eCO6BKLDCi4syj-W@s z15>9*3VzfCT;3$u}Yc(vAnfz_2rsi|Ni;>mYo##E*n~J9nlUx z@x|l)9ohFFJ9!7b=!6cvy!$Sta#mp=l1vS(>Tz0aK=Egw89h>TwC`^-ofB_;YS|U> z{rMXvd%G)&u6Y)^p;z3IJvj?z!1xd54^4x8D(F!IOR6hl*9r_VUSNm;tI)IOw6~mv zzl$nGuw=crreGlg^X8A|ub1uFaEc8lly%}k;FJ-lW+2!T$fwm{y=9uBQjB;Pg2}2? zkt{L1uXF2FhchySmgXm?J+3U!sR9@Z&`q~=aN0}YAwHQz$Dar1#gCWf$EH@TfleOf zyN$b1HmywnKANckY}I_olL6xHAS8eQ4g;u|om#aJog5yUm0EG#Pv;2(fKc&)~wlnK|sxU&m5wE2IJN%?!58G9S_LR zuAk5Qr?o+VQ(zQ!tsTbA*0A9^fUQxdg~>O&X|+Ohyp#l=>;H%fbNi7O=LZE`g$ugj z7Y_{nY+zjnnoK*tvKW=nBX7P2$vU5i(O5-Ad-Xf%f~x}JA} zk-!%s2tmmdO8o*{B8HwaaV6=}^nCjlf-|07Jhc2)dOV8TF?%%<%u}(1rPf_qr*_jS zCH5{`xTd!nI$B>ZdBscrPYe>cVp*p-=EG8is-Xd3+F~@`=q~+J2%Q8cQcoFr;;a85 z#fSXvq!=F(0zKlgZ}eAKu<(cSx+X)q)etDqeaQna!Atg*q34die4umpOF~;5i@{|b zIjWg);yHUmWsGO}Xc?$xekFJtdc^3qy^{d0(FYhfhL>T%m+=4E5S=lm8~)VLcL)DE zaBiPp))uz93=9Ul2(;qT{0djd3I_oVc(&!n^Q3}8yC>UI=)=E<_w6Y|vfw9YJKz8P z{1t+C9k|vd?|R9VXERvFW1=E}+Uo|^x5xhqY~=5~NgS|$|fZ2q0F&Dj?1 zNnBsl5Cu{Zbh#B`b3XSs==t6vFG8m{7CG3e#Luo~q%77})nWyhaJ=c_(B?nER@Ea#nE#{aqN^W)ce&|L zLZ{G+K#?v{wwKlJx)-PQ0c$R=u>)2wio69Xdc+8Te7jKtgXsRqfqqy^J}`FVcUvw& z<8ROZZf^bG*W4)6%hta%URnRl`iIwlYW)rCbL)NU_phH7*gS?_9QyXq14DNXwa0H7 z$_#mjE+3j18eR8?b^pHZsde|QL+j?&CDyU)=yki+ts8uO@cF?LgP$LNdGNNu<{&p{ z8pH;-4z3+|W#ESc|1xmzz)b^{fkOk@feQvU_5ZE^m;F!oe`T)!uKtDoY`?ev^8T6r zvA#d{{k-qr`tIvPeRF+@KDJNUw_9`*tUa;zpVr>Gwz2kVAo9?!#nx_H+b4TPbP~vJ zmQ`g}furED@z0E3F|JuA^mtkz^ccHgEH~x@N65ah@zFnzo*ezo=mVp7j?Ry!M?Ir+ zmyOPhj*k3clAR652lHNEpNqA7Q(FP-eo`z zaZ6Qqwi?O@xsp9~jwpuk?h@{17}lFNRoHaKD~4g#bxw7;m?(SGbh<#+6?;T0Qe9`E z<_NsniZ!czBEfnOimlW}14%-ujPUNTX|6>j;unV{HRezO&$t1aD?!>A<{XzKmKQ4;b3k{s|r3ECA1nmkcsN=2Tx zTaeFb>YA`EOgbWl7^cH324l+edFcUNAPz}U48z!*HBXjT|5=hN6K*`9^rt8@O*u1} zvl&T_t6Z3+2*BpK5G8MfH~(FftBb(^4v9WKcdcTw*3)J&VYaT0Dj0mO8jNK^dXqzu zq{)Y+2RI0uh7_D+mM1L`ku`juB=;Dy1kQ)bZfgz)sF1PS#Ewu~LbZ4^PEwh)+!u@* zelArvyYwW6TgVoh@_FQn4G~Fh$ka&QWVLJbw0+K4;^d-Hq7IM^kR#?H*|MRPvhnx< zF%Y}XgqdV0?X{;I5oOkp*eKd2>x?zq!lJwj$D69Co#LzuqJGAZZV}C>LmA;>)p{Vz z{7{ms*g6rcmLpz3GALJQ%lAMIf#G#kH4`CiA&<_cG$bnw#XKp#mnzqQlL6$gYf4lh z!|%RT)T2uJA(NYMrJ7`oap%cP@0R48gCgn*Uy^5n1)Dp8%}H{f-bknbtC>q>ys;L2 zmT1$et4x%gm?IRmP!7N}90Aqv8Pf0S$skeDx~=M9DV)d}MUzKer3Gi2%3W30=~gpZ zp|>5E^fMWTU_2=z*es{{0KQ9lUzHp(RybXYNQB(gDi?Pd#rn#cR*5?soI2(LWP2Y& z9DGeG2qvr;n;`O+4 zgJ|feD=pau=?RhwQ_aMc3z>_h7gm}y1uSTV6(4f|J_4n`Q*=bsl?H2yM|+e!kxLa#UbRNuv_v=lgQVV`0d#I_NnDL+*86@`i3K(Fu~fC zo~6WgQoOR|qMcz#K;-f!%-t5NQz-!X;X-n|-^Lk&M0~?GNzRqxn3d01J@#hK4(Z$i z$C5Dr0Y0C`JPsNwS!olYo)9hJb;@BSNk|bb(iT_ILnQY~?Wcgi4x*nNSWM4Y;1j>- zyOMr7V<4R=c>!SmEmcQ!)0afKqJ{%sH)G2+lJcNatFl}z$*Z9{KBrC*xT~%!xw-Tn zF&Ck(DEk6<1kVCwx}7iBxQV*>zKQ^3%c@*jS3_H7)4bC!i8V==%^cD@qj|e7uH1Ej zsGh7<d;yRY5DBjO&|X zJ4tu6a1eU8B9P;3K#=jESf5D9tyRCv!X|Of1zhWY zlf-_k9!Ups5v-DqWcdAWNn#ack*gz4Tt|`iDB1rDNvy19oz7|~izl6O1)=WmW>?e+ zrCm>yBWhw!?{rXR<FQke5ujLRrq4GhR8wsBKJ%ay*sMlJ$6lC}jNl7)9^#qwv7wR#-UR1c!w%IjnWN!#p zir+{;W_4?zUIh?5M>X!O=y^W8FDL#KFb+ELk~f;us>=>Tgg(0@$<3xBR*8inpRcIP zu!`NHC$MhSL40;fSFfeyat{}cD@3P6-Ad~L(?(GXm{>kY!(n8vq=!m0iNKtRb5;D# zqD@JSJtG!a$~qgS39!i^leOi^h}9>)qs3PxHGtv8RO?PWgrEJKRNZRnRNkg8Kn%$+AxRV~mPG4Z|9#5TH`VZsZbJ`uc}54#g8 zF@v~nv_Z5W1L=XJzgV@Ub``|N7;UyD&Q(=)M^UK)SIG2(lHAO~i&M#bjG*EU1v%-I zz7L}@Qzlz(2$4yo*_bjsDEiXtMtvmF(iGGjP~w=C{Eo~E1HPw)q7%7#)8>I7?p{6&^5pq+oz|?HItdbw7 zi0Tcgpp~F%re-?c$OKH`_0qy^aByYZ9QA}V4oe|mOI_-c>gx&MzO2~;O1;x(i{bLy zM7h2}XCWI^o;EmJj)q>L{IsOl0pge39PSNyN&T1Bh$R@Ncj94i*BbS5FF`8( z(wa-uEehO?YrQo~AQse7K54Pn6;ePPs4JM5CfleeGP3BVzVl(r(?uFArmE&3)12on zkQN)*dJBN*-Lkk<4vkqIreK4-0OC~YR9Ru8qMAJ0$nnjH!na?{G#Xmd|Ipf#z-U3q zhK5~3xj`gzExfUF-n*EEORg9*?KI>l+U>8Cd6lKsfSib~)p2-Zdu(iF5jy^}{w|}% zmQG}2J0P2EH1v6n%r&bGyPdW}x40R+jIf_OK@W=}o1{J#X3|3gQ%cbKU*P|&lB z0+YI!b--{d!xYf2$@aeS9w~Z5?*LPKb$)y2_Q^I}+QW;09xg>N3!yf7Jj%!&Ts9Ek z%INOR?R^vPk?wiwWozfr*GjYCqxfyRA6d7wcS5Lr9{NQLwU6?EP)L+h4i7NTRh12N z!P8;4U!c_#E)DrnepF#P_v>vPoCPU9Ev5+Nz8NEOi@|5Ulny6TM={!Z>I4 zhy@U*mpv&W4J>uUaQeV`b9a||yviXUY@7jP7GfCm8o zx6BBuwl|_Zs`kdstJgp$Z@d9R*Z*Yqm8Z`WxMR=sDd=mvR!0Jof79+^Y5R0B*X>K&M|PNxZHB?w1Ae(F&B{3fGl#yc zJ<~IDIxuri(NFB$-wsTNJg`mqoshU-gCPG<8e&9v;2jXV;qLv=4Xf8c$HPGS{l9r@ z4z@>S0Qo)Iq|Hpm0)6Tthdgyt}v9qA( zMFy0xTAL!2A)Sx(In(}>w2*yY-<}*>S@iH#`cu7s)YuNd_u*~XvidZ{`op&oA%gx; z3PvC;v=h=tRw+gQ@#u$cJ^jo(vUkI=T`>2A837s22`r@b!uST|;2o92FJN{)p+L7d zVP$&U+#cQV-YV$Cvzl#Uvcmu@Fd5TWL z-VRO!$SXKbF*`)}+dT;YeGMvtSueP#?d{o3s}-Wd%Fq0t(jB_4!in6PvDuMaA2a;1 zp&t+IlI1$`*RKr7P{G+Ao%B}SrSz);qveyYr zlT$E+*Q73?<2Qmr)(Z-IiqIZ6w!d?~x4m9Ue0#wMx_nD(mUj}`3J3#SvZ2UU(nXI0 z_|x66ldP1YqUrsxjqONp?<~1tD+1rgwadN_OpT>|ct)Pf^FC`V*8*+^6?{Gy`r+g2 zEklQ&Ib)`?o4R4I3>^uyFPJnabEYid@g*{iNV?F3HUDI)y&1h6XitpylnIMHh3Z$7xdYv63ah66NEUdS(l&kb_YgqbjPHl#yf#Ji3- z_El=5*K3XguodkZLw($7x1uY!?t*yU@`AW>l8IAq3hfQUg1EA%JO88w;SUj55pDiZ z#@5m)APypF=bb>C0V}sZs1TYwjou$^k8N753MwAb6aU+;ynElNjtP2zGq(lVP<|h8 zH|ScB4F#!gLBw1IUt2iY-Z*`_8nO>gn9ySKv+$Dl8l;rReZQt?pe? zir@Nd71qX`wxxCO;fh+)fQ6zWiaLM5m9(S?PZ(YEepp_6#OU}ALJGS2&HDuv_9e(7 zlN{v!YQ`JJxQHX&bhRw59ErZrYVR9cDMfEk-++AoKYeg}XZJO2h?R3L4S)vG0n9q& z48&N5)R4d%PGY4v>aT-_l~Po^-!pUM%}xF2YSh}&Y1P|yNQ(8fbPilzU=t3Dx>>Eo zA@jUFGu|Tx_N}ZC>vwo-$I^tW@OE~o5BgCIWiVlUs-{#l)73~MrLhWUDp`Yckp)7?E6Z?o?G+1nALpPGufKn)^K7}T zgLr@?8T`1Ix^D)c8DU`0oM7R zGE_VUdEeLTUf7Plx6tnLV9uadZUBY$rP1ZNQ%!vIL&Dy?G`zewhw}a!Nz{BX596o=>jC6=ro9Q>b5ncc#CwV` z-C6q|zPUXl?ak-i0-S4@%c6cO0FnF_dk06 zJ_Lb0Thac_S6+g4SFYP3USxMJKm!#^BQWG5pJPM;H^)jPRy0~#CNoZor`?ec!-QK| z1ZSEJ=XD%^dGJg~)%zCU1T=1J1E(Wn@B;*MDiR^%_IQ<{k@Feh@Nrjr0Db4i_Skq& z1;o7s@seE%seK<2&JKztfjU%#xG-BBRUqni8slo8I->W5QT!H|!o6Z>$+uw7z6B=V z2H%=BKHyZ`I{bm5n+NY)`(=^RX}_>F0(^|LHNK~(yMyrae_Uk{PF+OrZlC?mMtde` z12_;#TP|q^uz_q85OG`JS~+fV6B# zbdRP(T7cMu_&QX4qP_Jj`MWmt;Hou|?Bn-JQITl>k@os65H?8K3<67&54PPXPv?jBT)f;Lyd9{OY>;#8g3N13BIng9h~dP< zd6l@My#e;KRjMG_#yc(OCwH87lf^#?n{3Z)JT+ba{7K=Iv~ntUXR36{c=}G^lmUKV zKrMiT5=gi=z-fbr^M)4gU8iRJ z*d6hLx%0msZts8Y?J|aag=KWj|o_Y(-Cg z{nQVfe7wEu%z4Wa*v+J%e}9AxR!c0umT$o@8JBiL>l58;oH1!m5kxVhrIjIT!H{hIly}k7h%{LIE&fy~3}5WuHI|KHd4_(`}1vB3+A? z853FL!Nr7Y4c)ci?6H+nbo>wIedyWW&u{B|;~6-+P99n_`p+XB=58AU+s}>?|plL=|{P47^|5tw4y=`8yeA_frLEazXi<(3> z9rWf@DDfk~WWGX*ZhNvm+d24X<0cuhFTobT8uVG4#|Mc8fGr7-7&b7103M^A5i`zSj9`Syk_0=Xf?+NbO|FqrTez_AE6?6^6Nyw8KhclFZFZRcEh z3k1&d3qyOTQ&|eYd`kdZVjVISfEgH|WB~_@)#?aj_$jn-)lwvT@V@EJ^;aE+E9Lcn zZLdSyf7V_<&H8~{3#e-WT1K$40pFt+?w1L4_}2F38A62<%6E}MuUZ+MeEtCodg5oN z9g}VU4m)zsH+AZJd-2~-^Sw#K@sDmi4*uoDK&SEx_@v-;3kDkLbQ`cYl@>x1D>gBv(qyVCq&^8tLXQ~u0`CB_ zRQnBQ%g{Ie6TFkYrG3i=DTAs(<-IvJBiHz_rdc7p$rSqDf5CmHrwE00)?W87bREG1cN7RdPZNXd$~#m z<$etZ^+<}o;SqF7EL=-=5n~Hi6Hl@@JO#1Ag1oLb(UTQ=P3Ll zup~;q$j7ZA6``ybC`#q8YW;DfdJP`$6$9Dkpy1$bKOmdz9b0MKZ+(50aR)cRHduX< zziWr4ZG1Edfp7o>1vo%jTOH2JP4Ky(@BVjt>t0&^t`w-%Yj$q^5JOM@H+X_y z1pXlSHvPU7dg70uWcAX{ZNJiWO8*aM_m85#zTF<#Ft=t*J5m_FYv?`!Mle;AKi??YT54YG?q3ZpOpdN7Lnptp;T&{Ob^Yd!cKw1u zwq3w?6|FsSe^kd327sC=8yg8%BO&OR9q$o?PyCf`p5#=gv~EFQlU=%SSq0m)+Zarj zHy4s*si@3gVl#9D3lrl#Wr!)yLh`2f#_7&I0}FcDcDSFPYDm;r%3*9pNoVzibh4G~ zYS~T5DVl!QwNw*dSq~k)B|0nQ%x>;{ZEOK@Frc^3ha-@96Y(}^r!HY`OwYK1v{V%z=$hA$cjc>jfH{qTVJL`dxL3BB}0qt`RwGv#);lC zbbRuuOFC;eh!abIj}_;poboV$tELQ8OGR%p2hlLycY5EM3y^`kq6jAVLl9W>D!rxi zwKKc3z`8`jED+m*79po;`#ZMj@s4@xf&*X`twu)` zlGA7w=*@t_BrHDv^=n(=aAIC5ZWN zaLa*Nd2^>R4IS~$6uM~S%HfX;eRc3x5Td9(HHCKAmjr}Sv4IIoG^}s>D@NXDiYJOG z@io;m@R}=&&~uYq_tpVl@yvozw*A2JOB#*ECQUTFlraSeG8!i?DtYWYXlhRxfF!?9 zuumR_&N^TCf^19sg}Y1l3aLrk(+bK9fF_kDTW@AWHJkTATUHh!tp4S9^4lgmm3@LL z>ym&YE23$0-g2Z4>}O4$E~@GjA%2Y9Mes596rtNRFLrOyn>vqO1j7e;drOxszZ&7Q z=InSNX^S>gDI8eP#5TQr&ccR?-ZFIjMMw-i1&ut>F`O&3%D!~za%V^Mwo0<)&1Pa= zg|$@fPKJ%>qZce}8e3TcOD}T{m>Q-!zr8@1Qnn=lomQOKA#b3bCGE~=z!Bs_&YCo{ zi+kZC>n-d0S%t*AO`Y%U6~0#cl7LSuc6UGy=qsdCophL6c)m(YU)nu;VAy)f&>MFQ zgX?kc?bDsV?|~Vn8eJDzGqh&=nt|KK^nE8}zg@F^tuHOM-Sc?HDR$8H&VVhq= z;6+C(Y>>0|LP9ufY()2729514L$}ROL1ta&#!a2Im&04b+|Vx1jcB6o1kaEq#rvFQ zMJglexqybY_7tI$TSfp-_cNa#=(Oksuh4m#<<4t(GZ2p*tHhcX6U{4VPSo?mOBOba z_mrXI*4Jmy=%s*ndGV#Ne{N%z$FUkPwuoBVV#vmuKwa3~wKk%+mC%@;BH)luo`d8c zxqegUDiyp_A4GE_8Ftn7&a?N7-w7KRv1A0bqVqbJx3J}~zhKaj8D&1EK%XWSX2(`a z!Ak$kEc!dK@HTRU+Gn9XiUq-}50JXjWg}HD=PbBgsfn7DsW@!yC;kYg!oOhff;~m( z_)UMB=^VfpWHM1#j9A#clUmY)F409mlPzC>fD9XFwioeH9Co|R4mL+^oqg2 z^5b*Rql$&Ui!J*ZwXjP$Dtis)+_p7+OJkOiTi0wG{?S_5I{m;$Wv{`Mdj~kgOgVKV zu*9TQcwWyCW*j|lhON9ujE*xe%%aEd`V!!n|Kf%X9g78~HMV~3nvDQ-^6r20&LulE zUp!jW-GQtbtC$0(24MZ=!A+zyK=XUW==h1vvz>bk3x|Y@plNw*czL6hBwP`jL#j6L9T|*>!HxonuW8+ zR!Y&)`!9nn@@M1yXrFfBEm4zM2g9sfVxd{$$;A;dW#fdoRBdI|G{-~<^g$i;SdSPM zUFW{eFLcY(WxZixSLdSFG(UhfQ@JF7mWb+_sc=$x@qyGSSpM=IKQO?ASSvEt#RaF6|!A;>u>SRZqAL%524-$0BH>dSPa4r4*)J0lMo;^Z+WV z7yc@C*R7g`U0X+o|7p!&-!*I2VFQ*iZQnH`rJ+~*o?JV)2JK-QJJ$|w$zDSdh-KP;TRWoYtGyt(tRA9m$4=jkQqau0?bF&#lPZ8fhhXjXcw zY4jO4G^9t2j^Fi_+0NVU<$;~?b|;8$c|_BBAfh4thLD@_0P6?Xq>mi}Jw0O49?jnV zp@EL={C_+(66amDuuJwG!KLwUu-w^~yvwVo)n0KqfhsK=_d2X$CW^vdSngIzyHPp- z7Jqza=O^9;Kv_{PxtE*e1J+rLjON@eh^1Af{3QB+A!t^Q7(MsZ-_0V^n_qXMPh7F^ z&*Gpa4=wCEa`i${h&csgo(tSqzHA8MI{-&k9`ftt=$i1t*0X5hU7oB}Yj$pXUUTZE zZ9a9=4tW5S7V-@R0AV|B=j|ELY& z2(r=Rw7&U<(6yZ794&pr2??;)bAF6*s5+E@XA$}Nb;a&C5Z<7q6T z`p-mKmwmK$sI_ufL^`swtKjVgx^^-GtZrPGCgTZf*(ipCR!SSA-ri-n09Jm%_n%HR z9nQ@*uhXyS(6@i2?WZd@uh6gB)N)zVT@5%w_Mc6?0~C9NJH=TX%t%3MABDmcONTOQ zC3*BF>DGTKR{Lh8z*;EyETb+)Vf{k&g2`Fc<7OSjHSMCVJGJ?8NV zM@cNpO$7@cSvu()$?L6|>1k`MXx)2Ic9eoXaQ)S%CXfsh9b-Zf&v;Uo;(jB3-E4Qq zQWohx;{u%XE-*EcdvBfXAdg-*`v#{>o;`#ykRH7RZF1oZj)Y6+@jK)WztS=7@x{r9 z^U!QdspP;nzdvx-i}_i8`)erFl`h3^;kMCSwlHdC*u24^Lt#LDNKT%ZL@P_lD1P$T zKs^}g^r=OYa43(K7Ir+S1Jh{T_!5Y6rzNaWFI>eP)N=4oO3GZ z&BiCfy?OKO2Si&kc$YJN3wb?CL+S?;Qsm&73KMB^|Gl&QT|zQB zBDr-}t^K}P+;_^3rtvyAksbHo8---@*gKk?*I(2DEBm3We{&Xb8v@PG~oI^sdF(LysEC@9&2B!W^Y}Qi@G7EQR7oBJPvu zbb*oLv|-3*kdxRKX9v39N3PxaMVJzMu>id3xH{_AWn7936A6W~=82MRqHK*0j*Iug zB#)zMPC7iEqH~0mDGTaxi`g4TV5FX)n*uVq{b^%=?bGDAk?`G5;B%!%M~{!(RHBse zNt6nME@aQ<2d7iynj0|#LNYm)zGoMC^~OcJwvEi5x`o2Z=r}K0Iulh(#tVs37WFra zxcOcAN%Tgwlw800tzGoV*_Hh2Ie61?S(PIyt^L}D=i831+R_qf`qIi(E98gNIEUDe zB8!K2drS?PCxeV(Tq*Y(rbo2eFnRMK+F1dagl;^rvu6F;?1-p4lXDJ^Fg``RP&Q?y zF=>dt(nA)$4p)wVhY~Y4LA^cu%}q7=!#MSAq3LSe5{X7EV;ZSpm~kQpaKdQ~kzalu z`cXh82To}P#?<5cH`eT5pyzh+(J3?`+r&Z^7~{Bdkcml4qs5%dI+6^L3-3oquK4C` zclY~vwcEZ4vxy3X#T%F`q&;x-#dNTR<7H+dY6+&t&Wug&Jt#ejL@<6Os-;T1nvKVl z(tu;KFpd%^Xn&w%DVc~~TsKhreBtixyv66yLF57D9!NW8nP)}=77#=@&|*mvfPh~3Ru~LpP>%DB^+}5 zw_n9Zdr_!~eC#ueisJsy*1MHG-mRcS767;d>kL_Kj<6H426x?oZVActFoW9B@9oDp zIrh&sk==LAZaMtuY;Ggsm04sk;Eom8ZAqQjt_`rZa->M+9)*#(JeM3RcW&VADA#d2 z3ML&Quu#VXmZmm_U^0YzY2!&!ejE*1m*oQD>P!8#>;ByeOuD)aW%R$Y)6p2@e z{2oMVkB7Cn)3`s;k;|Td%~|~pjMC+wKt$RVe7DHHCtyGY5sM9&yfgsrkfA~ANa%5y z4;;SG6EL8b<&t9qw;eY&vv=6>b@iGlG|&oFS?H~MIzWqD7y>fXO_37s_o*$tEEm^b zqtqz>;cPdo?fR7&Y;Y^?#&t4UC?k*|`XA2j>{*sax__qRJ3=-+3Cj|RP8k%!05DxN z5%j@UMMQ$tZQ|s|{^Tr@o|b*0cI=0j^G5^H@f1d-9wm-zd8;;^u)_Yfy5mV(5_b5x zPhnJ+<&t0j!&dLixJXmqi3jQ?Wy6o!o>|q~@&VC5nm)Y(2m$~3gZ+30GRi9(Hm46t z0NMhCuMxY%#*%k_1{sYC$aVC$n&VmOuCN}Z86BLbF>HuUD<#=T!DLGqrehM8gkHpw zQT`NXP$7@pe&adtqUWZ1Y9Ie8z2qq!?}aJta-(RQQsq@gbatCGMs9orDo;QrE+NeoZ5@zlf|&9I22WcCw;i{^PkT?8~ zBWO!NCZeZAT&=&F?MM6jc)dFF6)1Z7(E=Ld42ZCQDy^2}Qcd?a{B7k0D-KdSGXcNGd@FvD z8)KO&rp-w_Q4=GXnlvPsFxme*bYDOwqO5J8Hvc=EmHOoKEyrg_R?-DjVg~rl{^nWxDGY~5y% zvxQMt4zM6f4c1~NLB9VS6oHUh`}cD&7DTAvGe3J~_pnJiRg_L9C6bKI6=lj8<$3(B zfK1fYpZ3>|&SRx*kx9CXhAConWU9rR{cyCWraj5s9@D@*Qq z2OldSlh8W@JIPoHcLH1f0xh@IKHrWn=C0CY*04J-Eyst0!`6r@>`9a2uQA9%GEwiu z<<*;g*Ywn0`8CyXvU!>=!HwFa%#;V-)yR-68%qbXF4SZDJA`v7m56q>_t&ls>__Ta z-PC#LAG5o=2E%SiIX>ix2ehel!ixahf55@Hl!`;=ANt83uesYrKK0MpxBH~?9mmI8 zEYA#Q^=d7n991S&IAP#@2!eB)Gf{Jq)j@Egys#H0It#^6HjzjW z^KWJcHoT8~DqJ~}#Q*YaU+wVUFYgeMt}9kHkq2LzT@T59@}=2r_^h_$pOs6qqor)2 zI5iY6WbJl2X?+=P@}*SLz5BlY+GQ`#A`CPe(xiiIDPPJ>X=TIGpoBdBTYQLsOdi`Y zi|y`D{f)Kl|A*Dq%K>nF73bvEf47|3_J;7;ep2mK2l0Rzl>ZSonG-`9C2YpfrZjot2 zulxz8W&w}FiT2mTf1bTWw1q}1bN4DKAT$Pkf4uOCVI;rshvi5G2WydaiDgs zQ)+`1edAS?{&man$d|$$i(b{>;%OkL1&D&%Q?zDmNK!kTL%1S?+v+w7U z@p~`Z#Ydc(8!L!7OIjr~$_&{cjMaynbL3px-BI{Lnk(=<;}O6^FZW38(8jvmjlfj0 zuem}UsfYk`>r+9u6CI%$l<-2A(HXRa8gk2W$pOdgiANJ;viKGc14v7iSs5qI5s4#0 zuM|WX!+;NQFW%P5z`A9awfmob2(=HlwN<(iY70a|>ySjcZ zxR`EoD^=8TvYm3!I=>mR$*B!gVY1v~^opSei z2AkK$O2s~P2I&ElGNetNQ9(iNB~;>Et3~b~b8&Ocd1hq~H3PSy0dASP5ip%#yllvC z9aH+8N^i7z?p?JHZmL`;;yu6TP;c6yhG$l;SaD9<&*A+YX}Xu}`1O{aKHL0GG|z2k%(OHy z&5Vcj7V~JvXS9*ank(x`T8w!WuxKtBB1vYi+F1Lcn0};n9s%3DbV>uNe2x`+6}IVN z#o#y~@u4Tyk=}dIj(|tO@Bs(?+0C`$Jr#?ndm@LLgKXLoV{Lg^$gBvH=RS|o6_ANK z^1Hn?!x!*IpKSh2{4i&BxyI6fB9D&e!mMU$$QLF`Rb^+VfJ(aW@buRXsVd0#)q1Q5 z>DC6Ph8zip*q&m@n|mt#odPm^yIgtb=9>My%8;mAH!fj9ObVHt(&>b1NX?SF&qpr> zWHO$99V_qcGa73xdn@~Za4^5?xIJTF##E|tc&LZGgL$(PhhREHg$uAhEoG70yDZqU zMTK5+pKAAc$0jD^adyx)u2Uz=LEk7Um)=_$=zbr$ zw&u(a4vItya^@E++hDiSxNzQXO?lMgtZkUlxD0-|-W;VZ^pMNHSn2MZT*@QQlpjKz z`xjwFY*@8IN^cgfY5QsG8!hq`(xxjKzO%CJka{!uz`n|w?wm0)HjaZ+D&>s0@;QH! zyk)}2Ub7GKAmDLMJNqBpP2~JQbwlm-eP|ymh}M+nj;V~_qCr7Qj~wW(&IuXHsMi}a z8!PL&ggp3PKeVfM*obw2HdwTAUj0T&I~}!5u=-R=CCm7fNh!3B2?O;$a&4!%qNi$a z%u=D|D06)J+>8wOIw7@P2l!iYGE5ujA&*)rT^&nVurQf{T9dV67j;kPf{GktHzdSr zjX5N;UUQWC`=^H5oM_h5) zu+vkD*Om4&#n=3@0HKlyWuXW2uJwPxZtqF8bKqYG5q_uW+qJlVMmrGeJNEG6cu)~qDC~(SpJ&892 zWO~BF5plfKShJ=oC`JVIL|H=WnHn~g{gaVYHc9SIV=#qea^%4G25OC&3Qz&!h+|N& zt|3XxkRMS@dtxM<#VbNGA_OOP)gH}4&1^j=n^)q~xaCqB3Fk{1vsS7xO^!?yWW+v* zjtZ!CVE@|Z2dN@g%+r8kZo7#~trH1}b22f=vQg)dBTQCl@wR|W-s-uhzZTYFrEX#8 z)pcj!3aG1ksuCr69`LD^1kOCmn|L*5L|&c z5PjN)xCm=GCJDIVPS@&_Tw?`qr3>jK%RNGly*iB8lzIglB#Jeimbv3nG|B~oAmsPg_NYKQ*jz7~dgu+qIgkaQvQ8;DaGD=Zvj zpD{Wq$vwMfJ-IGaX(g8hD{Fd}dj_U*P4wIl?0YT@uMm+Vr)JjiegXSDjhE$4($kW}n2I%K z%)W?t(mU$r=jOR$rMpYW14z^zyANMq?5)X5bou(`_o1DcdMI_=mKF!tAZwJXCku&i zK18Pjt6xCI{pQ;9Yj1^M4{Z(1BTSZ0<{g_hNE2*WR>~HQVv9PRCYOB}^7glBbVJDF zQs1t7XIoP(P=K;RL+axV2^J96RdfC%>x$%l+qb!PdA@?|Ip4gNX5iItgeCT}KFLUJ z4yP-k3+V-J{G^bKVk_qk)gB(fPj=P)Mk_ok*4*E|Y2_E%K18~nzDnQc zx+95v)iW`bJ(?k7LGB-R`Fto6==9npWc*5upnzICa{sAFW4q`>6+4A-#H~CJHzk~{ z`b-YIZxZ<=Tyv#jCtvsw)?3*L0EQG+G%%nLIu^hw*P8T{>5uo2mp=r(v+NV(*e~M$ zHEU}BM=EPK+TAEloJ8LX% zudbX7?D4}_S8hDz!`3?x;=ser3B{x?LP(#iK%9lV+FR2bkBG>p=PJk}b4L)r2e1b> zs&%>bIOnUO>LX>^&;IqxamlYfU;QtDd)E?t|0>dV4K%w?hxou)+2%uLaT1YlJ{?>m zDGAwoO=V#Ha!e9>;7T)j{F;+~_?C}WKC_J2KlRaN#J(naQH`8A@k7^!$b;8b9BcC{ zS|4wIvuRs{NtEv}wtc)kSKA@J@e%+e&6}_$I6oZ-Stbz@sk#v-ra%rX_bPrlbF1i(#y?}=j zi;Y}H+?98Hd2{WtTVa$_r^XN(7H9-kz)0*N%?E zct8vK<1NHX7S))+JY`ai$dg_KY}LDQce&Etv6Mw_KYdsK;Xi(}5jC2oduy$i)0X`6 z79{I(Ubz?|gzDGnR0OdT^|crnjm#{7I-@_(IM2AkG&$;%5p9R$*s-##qD-G=lmhefDOY zHJ7q@NP<@m^pZ}ObPutQPHm~5H9K#uEM~NguV{U^`IV*(4Vn&Z+sE3IqH&rk8NgiH z=4t6e&XeF6k0_)}ZU}V~Qc~IUM4ZzJKl(bBs*r~Suy60J?S2@ehl>~*_RP&>WHLPw zmlo4GaaJ;!R;W}Y`4ubyAsHLj1sB$S^%d$XvClh>zdly-TX1lZrOhQ@v?LjckTnDv zS3pLMtsnd+ZES7r0HNKm&C{@Y?o&$RHkFD=4!XTlionp=1WV4l5#11y$zxBpAguEC zt9onq-3S-`W?Dd$yT5nZHF=vDp{H@5SYnN`R5$dJD{iQCb}VJl*!+I7{Zr{JwdZf3 zg6*FlJ}ykgKu9tnpK=w{0k_Pg2^0JGD?Qs~GKE}mLKdt>@ECD^w{*dSU&c|Q&pYov zo<^SZM>D>p#AuEtv>_|6!8GA_X@+ dih(GQ@aBz)*NZyyz)rf!B$!G ztt$deL@ilcH>%F1dmti__&w0CP-)AInzdx7r`+*ODoVy5#V-oT6(;8SncC?tJOCs`=hYcbA*LSD^^PIgH5;sF)s&V7}|3Fd&qI+FMVo#da$H zVa4C8O%-fD)V>6&hc%fhVpL=}JV`ha`uYzm-RqWl0^7)*UH=0*nBP{nJXu-Q8}uQ8 zzZ@$Ban%4U5n4tPaYM$s0vrH{zfyHVV)611FCr>$?DQ_uZPY;!WLe*Krt-w+$P~;eB?gu`Ka?CYqm;~oh zn3Bi)5GVysSM-q2KZBJn;MEldx$a0$XRYn0RLgni5p&J&zkcy(sUR_HQ)6apETs)8 zxHbRj7b=}yLLP@9`_C6DD6*htS-+Y!7>09pogz0Ll9A|(&{YC58UHMze13B5DO3>r z_5QWw+zt2aA(y^=kk^jCf_9u<(fY0C*N{4HfIMB_J|-gFw)Krg!$?aciQL$Z`d#Ggcs(@PbA#Qgow zs2vfQk5Cb)pTVW^Nq32jDU8{X!D11q<< zD5ETfM!A8!^EKG&LLNEh-OA<666DNwk#95^&m$N7vGOLDO1{Ed$9h`%#kK>j(&k%M zc)5xJ7ZCrO@Y0*q6A`7vZyq+L6~l@#ZIn#E36T|$sXke(6cB#9VxwC$;<5QHS~w^Q z^3Qjc87m&N{kMOuxOQB=h(i)crjXhMcNP+~f(9dYTrc3gB zetwki%XwQ5h{%)wtk`!Hj(4-HPuVdFfijJo zO(8jpI>FKz;{RKvzt_4v7i9{DKl;ChVrzc!H-dnOr&s#*`)@;_Y)3{FxlCVOPb}|N zde$$?KK7687V_A;C;j}*|H9!_s2Mq}xkJT@S=9-iJB{$Un&=WePP32xu_Z(vc(3Bb zX}0aA*6%m}wW+^hxWgdIx2O2iY;YbqBfPE`NGJri&`@1ga4)F6+EBI8tpUQtaj z6H2qpW1Et>i(?8`ocyD;+TSUl)**ArH=n|FXL?nY!U4=Dj<=8>D|xN%gk+M{CY8BR znB-o9=1n$LyE_Fea!mePV7ZX{Hr9UBRMm*Kz_-C~=7XblX@Ut9%hpltu)=RqaILt1 z3#BLEq1ZbRCh8fdU;Hf;FFF%D-kF#po0yc0pvqJxs5DN%vOs6HNmVlOiMex{rH>)~ zNDd?8BOk{}_TI-f*4F(7O0ds5PqRWeTO&LHC#EDG$}$m|FOA-6OGUf+~Xo%x#A&-2e`gc;#sXx|PJ$%N<($uBbT~Ii!sli}tkha6yJKFzADdnLG;~rxru*CgdE=4U&9xU!!|Y?@ zrP(0d#v3h-u)`9a$tWHvDiQ^;oOJC(69O_h@)oSY7a#jzb1k>Ciu6CnJWcrEj+yFI zNtcs|t#Sko4%@|JqqGT}5XAs|KOvMwBX|xV6~C-!xooX{rN0UXv~!+je{f$ml5L`ssdO71mGT8v4#f}17Z zIap@`9*pKc^B~2wbE-y|CW`qnbcnmv5{I&>tTe+6iKj}#X1hGbb?8`IbzPT`hn5<4 z5hS_wkggB)o=5htuD-!6@>)CTV>t5fb;=>Ep)m_UA zR!uy)8);~vwN?Ap;X7AiSLIyC)1?tq-jsR+>Iu_ud{D!XBf;uA@~gENK>?49dyb$Y zL&Jr@<*lu+1~%GoptK`X8Nk6(To{!AjE3FSmg1T?ucx}UXW2){flrWL^62)>+sT!? zcl!UwrqW7o*-&jm#96A0x+7(pBn?QiI8ru%KL{lJr}tEQ$C#yE$bL~`-`w@H&&a; z!<(yJJyb+fWI9$-ChUU6I1wf1u>S_VX)LtsV%fvgAG z?rZ%s&ELNU%ONn2xPRWh6-dycbltY2x^`LVB2OR6ZmzwzqY8*c$2`iS@ajkEw0K>t z+8-U9QkjMw7?^{oco@WK}qzP=BLpDcd!n|<)f2+b)44F);O|J@|#`Nookj5fs^na zTv88Q-BWY!t|GcbHcxY9xI62lOlT?IGI54dmvtpgjdF^45_s;+CGB#rnVPoIS++LZxd-3Cx-j(1YACU04VsvTCZd{?pLMUnWEh)Cm-C0@e`2AftQ|IgjJ6Z zRxjQFXO{t&*zmL2aNACA$!!LGf;>N1-MRMtJo1?1nvMT|x@kyTUBAJVv>H6XB(UPn z9p%WhrZ_BK8JW;lcdlQKS3Ba~f?N0V^wn;ZQ^GO9hd5luia_1~EnLLHW+oARb)aWi zCJA}c$n~PP?7QTliQK{Loh^%judv`#b@&E)%bs+~aD9&mQNY9ohS1!yOb#V>x2oP$ z?#^a36~e)Co!wwcqDD#yj!8HqtzvqP!3A8Im`&Bw5tF+dmtN~F1_1P0s$IAl8_d`k z9V~yGwaW0g0lxwFg@wA1?Npp27E4bw9hQF_IFM0Zk$uNnP?b^1<*3UHmr19SkXNf!=n`%3@KZQh@;RUokTd1Ge z&4yew#(2FJ?YKmRlC5d_K|MQUaxtqo!H=pDKF5JhIj(}8?+jE$qQiI1?jnU?b?a8! zLIYaoY_(!09vMQV#+=1y(j~=!CPeG~odPliCxj{c+|?WI+VO!Z*OdMuG-X}D*3R42 z0l&^L#$+d@&Iy&o9FIh~<$c3N)wNwh9&zS7`VU|JxlQCx7ggV_cWwP8XwSYt({(sw z%Ml(&Vw^)W$S8(}8FwtgwHLYswvCWS4on&c$eOFK+CUz?r21aH!Iv+sBB;>1u;O?R zLwQ;=)iv#R`t>=tN`^|K)cDw-g7G2Xkx)Mnt?&1IZxfkT@jWDa=oin^WJc~Jp)y)n zKjRN)P#$R@ZebWg+t-4(!W&tc|tTSZcLL7HB@#2kT*UfOQ#x|I{iojZcm;QImrF#akWd z5|T+s_JE~U^g*M}v?2QJ!wrv!I-hC1zO~%=d~2lD+{(6YX>DwIt>w9vZ!|pHa!1QY zTkH@5V^umgfI!eyaJw=3ASq&122}=6%h(n!B6+-gK<#2TezsZfba> z=|fG)rs1aZnoet4-TC#-S2{n_d3EPx=Lb49oo9Bg>v*^0<&GyizS?nf$INU;ro+>5 zLB~Kx$C|&a`PG{5t@+X#vSz07hBdJ@_BDz%+t#$SzuCUf@P|gW{n7S&+7Gpt+Cz=z z#>?A{?UMFQ?V{DMuKwxjha3O2`g5zVSv|G-qSe~fXRTh}_HNtDZBMp+we9A%54WWo z8`|8B-)=jFJPtFBlzx?z=Vm3-Bt~|w zB**ZUtR~i`9Uifo^p=!9>0ZmxH36NE9T^VT6d`F~oMngiaCFy*c2wdr803CCGm0YX zE+DzOCQn9v{jg2g8z_F_g0!MiI=W&gCayDBx!$F+@wI zWwzm*)2+Fln1-mXXmX7KqBQ~yVw9#O;=%piJ zgEyMgPK&LP#wMkO8xK6fFe@Qv=-$kWY+Bx}n`RY154sV$L}Tmf*SURO{vnhAq?Xvkw=r$$ZB^UrGn zc7SBhSSQAGSz{`nHvW`nP+jcvJ5qq((I>|eqAzpfpl588QggvGA)CxQlUCK)+~Yc& zOxdg^H9TcVj!6eY+Hdgmba0w=WmIwXM2fNaN0@7Py44Y4GYMrjsnB|SiWz3lZ#agw zY`3sdhuV`c`9>_V5m}P^U2WEB$xkaIQM=BPQZPNdBG4MxaY-zN^5d+h%$Os4OZ?-? ze16a|=1m*4#kesf{S)6hs3N*tCL(S5G5@%3IKVi@v;}t3=V9b2qn>+w zaAG>`NXTT`5wCWv9N(~-dprHJ7F;BBJAe7`Nze1I9?KFyTd3clt)L`p20otpPKY0q}kY{ zC0EpqjA~x&ooSG))ENEAOo~wkWjVFcJnqxTwP$hd_~RKrlQPJ(?p$Qp6NxzrJl&Vi z0RAxN08mwFFc4n-B2PCK)vQ-v&@pBW;{932UjBE11(wf8?Oqgfm#E~sc$MUr#Aag5 z@YJ|%Fd-Xsx?}cft{q=S0@q(w@0=Xf4Lc`8hSRuqeCgbzG#JkYGqPc2-eBZafG?~X zVH7T9VHo$uE=Tx`3;AZ;!+B{oA4{o1x}ee@KZWn6&+gE&K}R&t7H48IX;H3s@GnS% zURD$#(;XlkP zHH=Dv8bvNN822kDm3n?{A*FCynp6AK!_k=0tx>dZpWzzv0PI*Q#--KxxW+sfl5OYe z*&97#{RlfEaiubfsnMWcb?(o(=iM5eo{dJmd5p-0Da4JzyfnS>A3R;<)Up8`g>8vNK~Woy$SJ*btA$8;7pm$J#Nk)ANuj4PlnFjjxo9+{fV#w@CB zuk+0)bR%U=NYDDx`anUlfnSZzvM{?>=Go}A93k4bk7 z^W*P~Iup`l*q#_EcoJs6lI1_k8Djhli{x0VB{azlGu?8oKTeqm_CQ)YJuER#=yYM* z6i0WIRB?$x;TyImCvl+2qs4NfFyYWlX9gXX z_=Q*U&zr`IOj0}KVMEh8nIXPQ#M31Ru68LSDVy4HZ_tS4WPjwBr#!|1-(c)G$h$&TjI2CpmR zRaub>#?u)|j161jMvbu`(@l?xXWrr%wzNSF;PJ4|r-&pxDz^Ixo~|&nOx)@TjVt1; z*&A-WhWlWfyqIMDh?7y|3m%hJl;j?_7NilG^{(+Q(< zI>0JFveEI7E?Gd`u;?lo-;NX8h*}|a$h3v2 zqB42P5Kq?)!q1S%jGtpRNSZ49&GVI#l@y%!)Csw}L{0W*-`-f8w`W9B6jN&jTBok-s z6gUqLUAwtvjp1ftYj6R`5sO7;hGMK%T8^rK0&f|dXkUq+#EC|ov0G}p5>-^M@-D1F6I|SAI3vmDq`Fwh zJf(N5hBBy&gG2lNG!E?o77<-=nVf7V@wVD8)3{RVPT4#`JEJP6gATRVEp{l!{) z!dXR1)l?zvPDpcOqf=g|F)u@U+U{YzA|#XB59qA5dxz;OscgJF#iaADf{a19N@k+Y2Q1khQH;JNzr^BG7FPE|iZOPx^cRm1?&>k;I9 z(Nc^ClzqB3iJOysd3tlQ>?3gLrT^T9-bgEYX-fySC~N660&+};D3D;9IErvpKT@uCBC%yC#Gk4{fGWZAGX<(?SzJCnrr35@5eS=>S{DLaHm19g>+RYvp&zldivY-_$T9_d~`%JXb+T_v65?8N$mLX zZDK(Ao=|^GBY3KQl~H^8nktfrlnWG-g9|#gXJRM_9U6D(B1Y$g+oPg$*L#XWB|mYo z37$eOes8^I%BKH>ACucYaMjnyzdr=$WO#wX2XT5UAqixr8D}yd)E0Ao71~#R3>rm9 zChGp5*lLe_47W$89P}?h`1#wKF>%byuu~E1u-_yLW(^X$ei3uNluX__yircXS0z{1 zno@KVku7wh3)~HqJvYdxC5mFvl2A?RG?6$7htPz8jBlz9kk`{!Z1_*4KKD&8hpT+3 z{t84^qqN_O0K&c4=9^c3i3|5q6W?{!HJwXmo|lQMu3KIvc=dP5_0@}(mx&GAloF}p z#2H;qMo>w&N-w5AUJdq^k)i0*6)CJBjvj0PSFpeXEKmVMaKMeYmtOV>a>#r2!2gUR z{`g_6cU&WtP;CnZtpKKoiw!%fZsDdxLcV#pinO0)xa88`R#`rRnw)ga-%OzLOm}WP z9ziV--nxhnbPA~a9ftfSD7v5<$({xmFjeBX2*NG7FPO$4l9R_cS}yR;ImZNc ze9}E&^DR(<0vYE-zh^tkNby@I1WpT{t6?qB$mvf*A&SOUbo7hH+EY#2+pcS!Zy0PQ z>SNchuK{Do8O)7Z$A=erZ zMu3MxjYDKM!&KUJ2i0xMa1pccVU}F^^X(V^w^*JV?}X|=0FT&~M1?^uZimZ*fM^0f z5@X{h``J6IT^p8vgdE#5Vc^XS#`PXKLK{ok#_d+A3fX`xjB=GM_%0px^I zh$z6ya<`F=|!o5{EDJ*kS^avwfiAd8D~dh9-&$^^W+obo|T4}1x_ z@d^sC@{xv%+P>8KrzTZPujmSzS2BvF6XKkJ#{g8=qhsTn2{k2^oXO$y=%&$nq!s@aZjnhH%zX;_hTLf?b$g#;0eXjTmI3^SiLt6sbH?xTyHN)C zBQUd`K3qlRh6k`m3HSicc?Xk0QGA!gK0ZwjKUn1pim!05pxN##+B1*jGy!dfWbDnuzbK-<; z%hYQj133ej-R=MbJUd=8_kI^@gdW1*{|J%%vHV}v$c;}_*KH`r0HL8116Yp+95P5> zD_E0GB;!CwJ^Mrz`S!~_KtdON4kv=|RZkXZdCT{pKZHV57qEf%$yQC&p*gNNe@M^O zWn@zT&jU476FBCg6to(-1Q7`*pAY}A{>jTdLJmEYL2$_bPY~$3C!s@8ET;hAaWO)y zU}+oLAH!@Akn5(= z;wk$lRR?L>H@cRnyH{33dj$>wDUm` z`O3>wB8Trh2XAxsfIy*g$`(0ZOLcHv&+<}z(Qm3Yx{b4o!iWqHY~9f`PzO;%Csl?( z0@u)%CIi2PUuJnOd29Mo$^YEQZ}`9Z89-MGWV~_A0jvXEA(#Xjq|cS4y8>1}9@${a zEcXa`W-}6rZo6pp>16PCC!Lm0{SMPIOt-umiy|Mv-S?Q8WtT@83hS_L`+ zL>he(C^`6kU9rA<3`k`%@rgh(D9g0W)36?rCi2*8Cmn^&f5a#VHX(k4+Rm~lvwq^~ zNAO&Iv*M-ot8Y|Y-Kfyg-=1#$a@%#yzie9Fpb*u%x5up5DI8MTb+Hc;a$q&v2=ypEKK&r7I{B3m1mhwy{wN~KN)LXjjPmm!YkGxfU zbob#cpWIk`{7+S+>ID~e9XB@w3m5Bo({pg&2+2gPNncp|*mH1_ZP|U?#u$p5)EP-3 zua+0o;)#M%Ne2H7WgsAv9Y4|_d$Rp=n`^ay;{b8WLD>QYP~;9@Q#n&QE5_zlw0^z$ zcTH>S8OW)IeIj6h+}7YnUo8u?LN8Za73rMzNyZ*E$s_TY!#@_Ks{+_U0y1$vuHkVF zKGQpg0kd~BwENhklo4Snf&1`Du|8+sC2%SLa88gvguH|kv^qgDQDd54% z57uqo&9zh4&edH304e0nNgE=-a+0vtosr0;LriLvYv-0ev?Jh=BR~B91+{nk<^c1D zifM)vD~%eA4qw7N2F#GUawwfL*WD@Lkt2UsNEnl9#v5o!ZTv zhgW!D+DV#kT6u315gq&UHoAjuBfjl(Yq|v=viOm6+fVY5i|5!==RVM7jIbr6#H+>~ zs!0}27l=qPw*ke%S%v(BNB5MY4pgOYY+ zcmEu6E|%qzxBjo^fA5`#2j*}d%-{k774ZOq20IbSGf7&GB_-u%;b(ZHXW2){WwMf) z=yuMXES2TfopUr0S_wOX3xpO-=Hf(0b}c{A^4g=V&HI7HaK>Dqx2!{f7C=V0fx<)& ztQnvYA%~Xh@2K;j%Nlm+e1m<#) z>^*C4pl4Yo3FQ;GIQr{-I1!&Uce2EmEoaZcczB=Aed_GF<#jHf*z&-+bLN@0w$oQ! zF50%Dty%N|(Oav2zv_pp?p^h7CNVB1N_eyi~>dvm! z-*5Wk%Cnn((sX2Xw(YW}8=CS>z9v#gCAPjr+!E<#xE_SH<=LdVKAFRyuG&E2c7S@V%K={2^FXV-|=tZn~u z`_cA?+HY##-!@2nQ#(l48&@{XlmU-db{63NkytZuBxhW3BwJ;DKit}|ccrZi>^OH! z2Ga^4;HY+p{9YVJ*p1I~T;OOUQ7f3iiGX4p!XXV4y}0qm95+TY6biU?WNZd6Qn>a?hX4iuCAM*fvT?wGFU1A`4>iOyB@MVunPAc=6@8cI z;{MHwAGMa?sY>Ag)bK60U&J>JlQ@M|qtyA7s)K3)?_^_SvE^V!S3nscShVpOn2`E- zAQ?|J^>8nvwoejOhRT5g@+@%pFyf@+k@Ze-+z6n{kqrh@5KEb{L5=}uF6-URH;toO z1liCwxR<=hzJ?bp<4vqJa_`doXk7`TB?TS{NO>k?On|`Ek?RH5;|;1E&=vo z1_eUv5fZgiyLljWe$f>MorT{b`YF_ff1$ig=^Oxg?swkf%ByT;$ry zGsrukP?H%C)r}<}KCX<>E#W$BhFV9eMY#|8WhCdsyHy zCSB?7D|jwO3JTqg8P8O(@zzs+hJMUd&)4Es4 zcf|cMq#8w1ZHz0kieC{i;NcmI0XKCeM&ocF7I5>#G_B>|UGDJCuB*$3ZJGP18G2>4 zZVUf%!InXyCCQ=}k_|F_LX?LPiGw#^*{jiWj+XxZ*R^R0QGG z1cD}}YJ+Eyi}i&B9S_RL(#5JPL%!JVd$!KhS9wef1@gYZ+4HHkRA&Sma{%v0m_Q29v>H)fa+3}!( zf*N@k%&2VTg?$ZsMTkj2VjAKS%1~fhln?Nk5&?Il#D8!Q3xWnMpr{0Nx=o8{4iuGG zJ6_keAVD=5F(x)Ba4$fabR{~W9TVK|;?5Jx1RxT)4Gm(kr&H)vp=Xhcq&Qm=a)ku} zUzJ-e4q(>Sm-u&4(130tQ4C`giNxrLFCY;ua%WJV!it>$^(pG+5wr{wU>kWw4mm7G zfj4Qz8buXkx0fn&@yg5jre#naC;@@{UpIyk@zSWwmhAa8&&7|zjb?DAu|BC026Z11 zH%;?gbP_7jJ!8W5XTt3GX?luKc65q^Sqy;OM8RxR4VT3b_Br{E%mn06W)2lP*H26&oS($bBY#ipUE zCCFifY{6u#ZvyFL+d-b2vLdSy2$A>+x)ER}!EVy41^X@yTcO+TOw;;BHqgSbg?q5UVUDTIiaX`if8n?uXl5fMAczg$h9Dqp zU%1X$wS(u<3MC9x5J7huMqU&P-C1aOoaah07PzIRVz0)hQIB3U-rZd1&Y+x$HJOG` zrGNkmHJ-$tsnusze~5n>+jxpaMinlqFdlSpA&P6%JQsTkDl%uB_*zULa6};=#rB(d zE|eYpu>kEB>i$s$sAGHh(W0A&H?^J?;kLmf1xyOHKZ=c4w%tr5_x)st4=uyBiwzlR z=x*SLxxH!pTRP=zuJtHj*08P6O%;1SO`yc6vsXUCZT1qJgA2o5()?z{91DJ5BQ$RY(Cpe-0H*F;-ZT#1Zp2`{ub9Xb`k@W zPZIySO&GU0jFD(!^Zon}!&ZdmbYp8SbBl&9oW6H?E@qMjTc~k&h3n{VT| z0eVhB%kVb(W`MBmreL(T_||iHHkL#Rn>9+g&?@9f8+4RWww2$c($s(faK48@aw@{( zJ#b-1#9KGgcd;fR*%25&CWr(*q(mVRrexoH92Z_cTK+N*}UFpwBF z7Ae3$tX!qg!VBR-Y zcrHMdba(=We}-DvFnXa0SJ!2WE(&aUpbVyFkf)63JEs^o*zCHO_?Ka*V;jg|xkDRK zLo*1F^j6;@7h3@~K`dev=s}`5B6@VCP4#_<-r8b`VwLEj19X_GD7qC)w%6@v$Om@E z6qdIU$_FJ@eclkD#Jx$;nOxIw`oiLY<&?&vOQ0SQ%&!2`wSsanuh`OUP^j4L%har= z=ZSb~bD8fJrU#{w5U|N@z$pN-M+$w9knQK}J8cHAh0w$(QWQXF6BQl0>ja8@PjF4s z5KP4XV4cJIhlLCA!*OHtD*lHN0~(D}rv^p|8UhLu8fVk@crM+)VDz8@sSlan5KhQ` zVpE*!mKx@PQ9J|1jWZzv15?vAX`%FcM)z98!U6JYfy^1rojY^p%-l2Qc}`D;L5W+78D& z&6l7$#DU&m0K5sMhk9n1sR?3w8J)_uE^KO8DIrJh{$KbYDRtrVt@Pdc4hv{R^{J*j z6S)a)*4~>m%`n|_A?>bv)3$}?rg9kqHh*<-VR9SXsfZdqujB|X^PLr4YLTH{^lmd0b&6{*i`_yzfytjXq7B)4OiHPoBcNTdI z+X{m+)dlVI=P4*5jS(`gNWSN{ZK^JH%tHecUvcFRq3rO-2v^uivV8}c-m>Qkv z16enHJL0<>s$MQ5x3@blC_H*OdbHzu_VC5<{9jNEyNKGtgE?->3XYw;^J6p7r2+07cM=~SpM96g0a+m-(Tul zxCBu~VH}ik(x!$P2Uy(BVjBj}?+@O;u$i21S!hI*(JEEQX#2n4o$2s{)`d-*ac1$F z;Ozkqeab}hWMlI|*k^HMe`tlT~3qGE4 zG{-TJx>Qm)V&O!CFAa4G_Bj?>@QBrFAVlsOT=hCm`1;$O3m2J|A@Um&EN$8#hZTkA z6n%)740@iA;lB{Ss~2K1E)+3HVFN&@Z#9jOQlk9oL+{x15}Fp!v{4Mnq9O|Vm=X)= zc~+72iexnC8CC-6Xov;Bb-2_tk6sIiBRIFFz1ZzjmV3IQ+ZiRD3@5=&u)poP8M61c zf9~La__TpJMl)TqBXuoc%G{HO@=3`Ng(aVMy zUIBmfO4!Kh89u@(QYdO|T)<$`2{)rW)# zrx!Sbh&$Ji$VJ%Wng-Y$$tUf4brw#bJg@(Qwk_^6GEqi~at6JT5$Ozv(RPRx^{#ek-?Zzy){aVKEg+N zK5FEmvLYPUI%kx~(?)q`+dGUH`3c&lgCt1NNI1kv`UpeyRS+b-Y{c4=usoD#Q~~}* zUT&L__ez2R#Ej6__c$MI*JX=q4o{LIY&a5$U~OY*;4MNN9wP91P_(1RQNdskxZ|G0 zb22c8HSaP++y6y}NZ1!PgrW*;n_e&ocny(GfEbPHLy9D!ZOJG`N<+j*du0w;+0VOV z2VR&FSVKvXR;bupTDASU^oIQ{XON>;y>bdC?2|)mln*OLy-^g6dY%bm5ynEiJ`$1{ zMHZ!yXpEHJMA~aazGl408Sm{`?bi)!Yh2i8j2U9cNC6`l=J8fC%&n{_oSrqZ49p2^ zG+(l`cq;~4b@YKpcC^3KlSuI2bmoP9F&+k6!sZY%hUk1S5>|#N>BB4+i^wukSJGzG z9fA?}iY%wv+V}h($>Mu(cobt)BGA&9-Vowot2hR;j%`A3j6@kuVigQn$)Mm-EIIk2 zEhoLl=d@jyP_4SKFB0MmVZ{*A%M9Lw4>5{f;-JgMD5uB*D+`jLG+YLDFJ~Z%fMxOy zDnS18jZ{&;LKqQV3Ptp+s9+{yn1oQ2m-LJPmF5J6kAlWt9V}Ls_sWcs9Q^c2?=lnj z{%;C1Vcf?cv#o+*(8pM#qUQ~vFjj^Xf%T9hg2+oz*0^jvXyf47QVkV(Ie7eLeY_%* z3%;qg9T7O*$nc6DP&#xx6p{4UP^0>=B7`FhHbEA&es6W$AW6u94Q(y9{nn0peA{oW zi}vdxnh7-SGejc{8#O3;qa@-b7#I=-MoS+Jg*m#VD>3G+5t8~B2LspXJKB$0@i^Ph5m@xYOxBSRm=Lr%Fyzs z!@X!i{j%+xwTH6|+|gr!;jvDR9afuYiZ3)ZmdVJms@=%AeB;Ayg^~CI&5v~0UJCp3 z;p8STgVuquSf9^tO4DXK8p}$_p-ZcFlOkjGrr`x-hO`~-0o`)A_;H+OyL*)JseVbe zT873)i~TssAoJM!j{BxvS&Qud%c-ZStk?HM(cpHPI7)pnB$svP__66;rY}C{Nipg{ z|4)8=YnO?T40~5G9Ze;^?Lu(jkv8FZzCF@A1tmhV?Q2?G;Tzw(|9B08>IMs$|1 zUQ{^cl7&(f-z{s_udO_%;&P-weSh_jYYypdq3(|feEqr((?m;}%W14{Aj!ms`u*l` zCgrrN@BZ@%y!-S@5jkY~X$NVdyr~yW(ylrW_oEq=l@D92$;HmtlU7@HR_gR8)%X60 zve447QifciPr|i8=~MryP%U*Grn!>T-ej_-gp~_hk`puRRAw4Emx{x8G=bqOlhMRW z9po2JUtLN1AHQ*9;o{_il_pJE4#nff{hod{qKIAT@u^;Gka`-BSuBeeD-$7ima9l$ zy}j_&ER=Nzh#hF!B$Z5|b1)o>umh%P-Zs?F`v-`70Ta4*96c%%k=rA;8ITww(^QC# zF912>KkUU^t}l8SdgBv`QQkTkGG#iG)|@R(+i4}QH47UX%VgwsQ*V)Jd@K3y{a2kwKKiePACX_pFYMMmOllq;8*F<3 z+0L{m_Oe0H#^(dqo?v`5Byj9HI5QAq2mCHv*Il?^@ut(byG+9!JxrFaQzP(Jk*=UK z9ecpOoYa)w8sK|<27wK5@8iM;Aw=+7v*f!spsm%Vh5ct90LqTsw9vd2_Y1kzZe!GG zdhw=(CQ!MqT7?{aVzh@?Za(2x|9v;Z=}|Vv>il=CI`xH%&%E{)9g!9hpNH5P+_K=Z z0vB2-H`CXJ+k#Y_Q+xH5#f9cgtJMGt|4-gMyKL+G5T@utq!KQ~5IBS@72KiIxBw^e zGE)B@MG&keRbhJ1zVC!@yyN`{QFJ^2x1W|1soYu>Em_Cgj2OVYyASEeqqou+y@qeE zxl7ky(QtRo$u%{){tbU^{J#x9srmMXXEr>v;f@Wt4WSLay3Zq8uU$94VO{mB)h||m zr7=+b$?EslHdRkmUk1=Rl(c$l^_unnxBmI{|5KA(fB*W0wdbuLUGHCivF^b7)7Lju zy;gOk>RVM0SKZavTymFQp>$;gn)4D6x_0+f<{#Engb(*BMzT$@!PgH!Y z;+Beuic2awE6%EDS^N6hSJr-a?U&Y`y7nV$uU|Xda9!h>HHX&L>i$+E>wdb{qf6+X zZAdn_8{~#l8fxnQI$!^j`mfi2rv8KVSJsE?d+WK{J@sw%>*`*u`+qgB)je7FiMsdK zP1RjiXQ|WIwbuTp_BXZ9)jn2xU+vAcBb50j$IcEpx+9~@*{)x~D)Tr?En zecn`eBGGM%Go0% zFx5RdG&;<_s5ai2iOsv%$XxdX(-ocR@}w*(gPOfFov|UObUI}Q7I0*oZFpS$fq6_$ zaT$?|_H~C+Q!#pXD=C^eyM>z+GIQqebi%M#d$84x zyYs$S)H^>hV(g2ADpZCuduQk9BpbHK6T@>J&f;f;ZQ6t9ge1!jj(X=T?Bw8B?4;+k z@&pQSb?RY9o#9S@SZdJ9BiUXi7|7Wsl7Y#|0mh;-LfOq>BX~hw15*=;Y!Bk;*Uul& ze$YQW%1goiI2)K5oS8_~eMl>}_)IJxv*)sjFaqR^)}UHmo`mPDSGDrg*dQBrvlBL} ze^MM1HmH1+c9XwvfKjrpzG?5MnDHvRR7xxRylH5*irkiCWaTHg zID&Y?LrKR(LjH@^zQ~IFKo>h@x0+`Lxd^|gmdg`i8)F*bU7qmNl-Mm)3~1#Uf0mo> zoHmWHmOjB1v;0ddkKiuNl$)FH^$X5ize#HQjV5sCvP^0=n^IEKQ~d#HyGllAm)%S% zJ2%Nj278CB0)NKCTJ`>MD~J00ZnjJMoX6(FUayZ5{^{M4TY~J6; znnS~$Df9HK$cUy}H9^!l#LNv&%=FsAlFt=BMVl2Nkn)97W1aELa9}VipQW;?+6A|T zXQumyWp>1B;_U2M4y_qyPU12)+bC}u9~m1JP0wrPX5Pw;WjZHE=VxXjqqBGt=HEA96TD=ZQAKj>m1*pn0UzJux+{)1k$zm7B*ozHgG{dL}q`I3ZOJ zFPDeLIYX>B7|2Y{3og5|Su<}u8)G?}*9?Ysu#V0qPtR*VFr-8_k{$4mvf)q`ZvCxl zIXBA2Sw@_ZnZba|m5rS7q*m^iBD}*nk+9kNt>!@N!tbl)>}W2@j!50iw8Ytmvr+C* zmC@7Arh`U?=^JqSIE4!_@iRxXANbvIh97X`EaT(7VlZY^3GD2wFKA~NzciBY7=;wW zT2+2pJ8KSG7#?|va_r=6Pk*XKQ)ia#?PqOMrr|-UYj$vkZIrb34fCBjzFUe;O*6Ui zs3}svQxz~%kvY!l^CF8$%p1;zs$W&7jLA&eFhou*(o{xK1rMM8Y}5x~A=R!DQ|9$ek*or`^yQuyN8LVoW&0 z?D#-J_Nx6cNCDf7f$i@M_Kc5r@n?dTkLrI8nFUff0@pv}ALs6^a z0|24MLC4T^pgSm>D0{R z;9$5XI;g&w-IlO+^5#U`A9Q8Bc4vC9Le(F}oSF@XxyfF6c5ayAz01{Eafln}&3Oz` z+BX`HdbQJ!U>>%yxdFqdd#-mxNhCem8A0$HB-Sw*?lc5u=KZrd#dC++p`KwSz=TF7 zrxRGfvqQr>=hf%-LzU5VlH$5tYi3BCWv#P{ z$;^&1*_gnn#Jlz$uQbj3dYrssllmqHm8Ls3SInOS``=^k?d~795BR3$EaRN9|52?S zcHGIvjJ>1r{@LMit0eDH%e%9wUIY#f4TY3Jvpgl7r1E6iyR$u0Y*;qh%u2{Lo|d|_ zvq^U}Fx%rHoo1DQkd)?`4E(y|xvXd~L^*BO@3tqCtjXYzk^y5XY>Nw* zs^iejjSRXNxpyWKnTZAy{SRsV;Y@Q(*3Bj)PjWgqz|}^yas$)L#(GA~@v+RLcbvcI zezn{-=umi1EaaNwrFnea8+*DmfdhQ1GXWRJ2c{y@tYFHi&qXxwI1@u0MLHDf&6sp{ zt-4@|a5Megl2dSjPgUAIrIuSq%no*RvVX?g*=ZRb6HnI0!5YqubBw`j?4O&pxcY>O zO`85&{o`>y5*Sqsfo`Td7v3Dz8uE?t>`=%*KJ2oX2Bt!rsdF_nfcjyXAt(T8Jx_XpMfTYCpbX1u*~;eMBB>=G;VS~E7uF%SLeNt-7oqLYHq z-lz&JnJgkTlCwsa**+j2@Y&e+cF?7dvZ_$2W#ei~*l${Z~V?(h} z-@mmEb#@zhzT4@QtpV^Q#gvvW6<-Vyxsu78;YP+Y2B$KSa-Y|rzOXP9@#TX3eTp2P z2_>2SI~qsH*cXqs&kL5$0Z!oi8Oh?2jguzaUiGSs&UW52 zHqEfzmXISl#Te#du6tFJXzz@fyT=A5UC{xzdpgQH|ERVjiHQiurnsJn-#^agl6`r# zLxzwuJ0UAIy^|5s_)sj?cNH1?sA;yCRN>57ztc{?pmIWX%*^*DY*E#5{WZ!ZvrzNG zhIQ+?%1Ffl-PfpR@j(Puc@EPY#cB=}e#D0lFQXyh33rcM158Bqoc-hgT!JfQM0xQ@ z2XXzuTS?9j+`P4L0ij-1`{7IBRaN8l5{!odsiUjklf~t>kW`y`_%1ZHQbZ1ZT!$1Q zH|DpKulC>AP5$!YEp4R#m(Mkjec$Km$*mt=c)Gp!@Fi$i1u?rrV%!trl!2M3F)Y}k zs$(T}`$AL0N)e&}!BO~>=O5b(-@2U!YdH@G(TW;!H#ODC8s|buzgKimq(YL~O3jBB znj2P%$k>g)>nQYpXyFoFThHMD9NOypS!0Rb9=0bI;C+#Pq{1%x2G9NALUa8J2?9)p z;HiA@z_tSUAngQq*pE(Jq!J~XreYaxB56pQ3~X+OqaK_sJ7wI29Oo17Sy>4QQsDah zTGmuq_|Ftv$IX*5U+*wC=;;a%iXfZsiK}rx!!vMGmdQXN=;$aMY0saoBTKW0#`a?SCnsiw7-^YdwkiV%l)Iv+(8n;1sW2Gq|Rqwr<+8)u|>ge-T<-HoXN*FW6Zgd1S%0QB4 z{0~O8OjcA)jebmc0%3a;K#I;K5xWRP7(kbZTLkQjEq0WA`H6)l5Nf`?3OV}wlir_l0Kn<8EviGYCdsw0T$ zuiR1nXw|=UAsWk0*$jh+GbOV$?Xp_{y0;B?jwP6x$#9&^{s`-)yqMhnqu~n+ul@*e z)?kZ>H{SE@7GB{F4dMWR8+!ui=X8^Dp2Er%Xmnl|L!Q_UsGD%9X&p_3=6bh>|>4}>Q&S&Ij>n(Ej-@hK>L znTXt;{?LVmZJ!2%MpGBZAvx1nZ*Ldh1NX9B6v^lhb2zlsU{`$Mp08i^$M&?w!m z7dIC)A?)#dXhS8_RyL>Vd?U~AN;RNUEfkLI+J3E$T=EQJj?3n8d5(Yj%n9arIp+A; zg-f?kC;GL{BQylUR(ZJ!L{gx$Ly*4@YY|~~+24*Ck-#j64#7DllaG<^S0UVsP%c-)d z)Mh#St+&r|LHDw$6pj2Hn6)A?6h&J4K#~g>It)+73Dk_HDBoFVYF)JoQEEU4ccsqWOes@ngn{a)?oYj3L^ul3dnwOeccUGuY=uh!gOb6riO z##(cFP0fZ^H$1oDVO$YTZW!7iZP;G@M)k|pPgQ@c`iAOQb$9id)phItgbTqhuD^5r zG_C^E=dN$BdK346&me^QrYan0s?M%zsQgRi4=W$3JWx4X8LT|N@}x@Lx>weHW9>KB zetPXKYcp$IYninzx_{_i(mmeztnMSat9AQyCf%t;h!fz(m~+6RfGD#KB7mIohJ_8A z8=tNC82wKAnNFqN0BRlV1OR~pTjm8l2H53+I%anc(^e=NnTFm|3Gm0jV+{glZBK6a zt|kRa9F#4?pd)1MK%WAajj5!F{(6;a0y&y-a}F>a z9Wm6%3{fKPT*X@YTRe1*;(q&Vpqj|xI6+Z>Hha33B3?ng0Wp0T*iFD?Ue!v&;;<;KCbWMp3 zC^Q!q$%!Pm6qb#Yw*1L4l=n@Xnl(HBM=Rscp z)B@H-eMw5!7FHv8oPZAo+!ye9u3qH|0Pln|L)RFEK2uN#;Obbn^?%eJjIje&8!Ylb z%!8!@XiQ&EuK7?A#ES<5`ECIf0Qf>FrwpLnSS7g{?VUj70yJsBYX${DI^_hl3*|y+ zKVNGa3WN1&!)PIXgJvhjaW}W|Gs{v;91z%aPYQz31tZ7yW!ev@Qkbau)oj$zvKW?& z0oxadp}^}2O9Ke!%$f%^DM(JBwUiSclp$DeAi?P|v~Dj+u>j~&p&;2J4FOm?wmhUs zL4JejOC>V%PQaIf$c_x~DZlw%O$@w0jR69g4U8RPf`GD5C%1e;lLB{&GYAmoF3^5Z z5(;p1r0N@%rC5o;kW;3bKEx7%LI^12jkjo0Xb;f%Hfrxcui+b*hZ+qsn>kgC!2)9p zwI~#@4-Eh;)tYI0epw2XJS>wHVMQtnBsd<7ThA;>>HOxxK+02g7QA8Cu(49sq@W#0 zQ^uVH{S9!&0MA?ITEDDPZ-7n#vkx1BnS=(ws3XoNFw;`devB_i3}O)%4;(ElD1h2C zO)*VMaZr^1fHDmLv^|gvg1}*`ip7Vz0q_o0?E&4y5GD{C2wHDk{w+ZKIJTild@)f@ z2ap|s=4tz<)TXh(C?f(i8DDDnt^!97CZf)&NudF-#o*D#&IUj;4uoL$*i^K|&-6%4eS zX;4XU@P+8inUVSc_85%-25z8{QMK9}Lt128h+~wnwNMy1p!-!0t!1o{2v!7+QRr-N z9yAyrrAfB^LKA~91Q2feWk*R=p&KAoWGCjrX?))=@8?64%^T+3^k)QG{uxriEh z5S76ygRq0&tOD_INC)o`_FM3U(WK?rfAD;3a_#=*AJf=6kRE`kW7yb-%?p`>hAW?0 zmcsHP8j(`WMqq&`{Z3-ITIE4w!F6B*0Sf9PHV+II*iyY9Kw0h<JgY;jv{Yc6Vxza4w>{2L>(Bwbg06+C0tFPBXWI9wOzYOgWg~ zzTt{*X+Ne*8=NYz9+U+DiQ=)$+1egW3bF|&2nL`eFp3yQoaij<`kPcKATBP#2GT6zCkfa0%#(892gB7eyu71*v+u#pgTA^QbsE%u+5s$&Qp|} z0aUz{9ReU&oKF$s>CV+ZptX#@(bEBFQ^4CqiD>9o>29MOp`T&5g9v zIRB)R)VGCI0keQ3Bu+gzb{T8MqIgvbb0^<&miERpSQH8kvZ73Ya#3-x2h7fM)ZbFh zHAr)qfSd^j>S5T@!Q76IslSB|gUfCsju=1|BUKql&Zy3hnhxZb(JK`g&Lp&RzT-{KqHGscY0@wUF`6W(a( zE-WDSc3jut;{aQPIYT`~TXq|m<1aIyAgk3SM~6PpL!No{ghSBwM+`xk8&LBQ9{J-5 zJcP@1?tflzZ@g?x!=Ad4nta8%)t{^So9?p8Ez~J%fm1ecc(UXYjagH!QEqBBH7?t* z?M-mx*jD%;e|!u?Bjqx}Ji6<`g7{ZTlTfapMdj^yo8FS<4PzG-TK`VD2>geq@K_Zj z;PN=!B0DtWpSDo}9xYWzeW?+>ZLn-q#D~AS$DXTTqt*n^1XTXU4 z*qd->(nOA<@CmEeP?7$A1L&BIW2q5;N_LOL$k2;emF30sA_*5!J3rI`U+k^$#jbq` z&-PCay96d35PX>=H#_4K)f+otQ3b>C!%5T|T%8hMYrmHp~S!g^V4$pnHxSTwL5luHf>xAg|0f zf#Tuqb%I#((Ociiop@(ee&bf`1e6#Ey8@Wjd_jCgQLdh_foj^8Qv`{Vj&mliQkRT5 zEHHq#Y-}K1>+>ff=e=ir{$tH$TB>O?iB#vC8_Q%x4c6!mgql2P9_Y!Xc<9BaDp<;} z)#FeBdqo!n`EpHh5LT%|j(%qs`>uCqEp-?Pe1>9A?SWejJdOA&z_|@)P7pL-P?twe z%T=XBG0xe^Gj;hBku$f|Mp#kXqx6qrm0-#BqF!wJKm;>l%xKzqEFfJ z{uFVYo^J(o4lDr2-!!kRMoiy4MPq|`p(S6mSyz{A7H^V*GyJ4%;D=cUMv*BtNxrrn zvs@-4PoI2a@xr>ju&XVP>l(-OY_Ffo`mIw!U(Dk6CFt01A@{cD8yd@Gh&K3EG1|aF z6V>KQS2R|ud&nmp!reyiMY(>?n-P0SiUm{Qnkq><|vmz}lTx1ZVa7 z4C4;YGBq*NIi)1=?L~LKR^s^QLUZ%mWF>UgqpwkP)Pf0NSuh9$p zmBoayU0Vjs`g2n;C})j-P5l?^+SY!d<_6L8f0=YDdo9o!_|S1Xai}tKt3cXw*9LEnC36N4?9G02vJK_(lW8q0hpr zn)suRd~@rnHHZ>D{Q|OUcnfUVo)g=$Jy_CZnyhL$GW@Mn{-S~}UwfYkGX`%KzS(g^ z#^*A9L%6T!=trE|voD{SN6xWTtEg95?=5rA+0?AVX#f`h2r()3BL0ma0C2d?(&ez_ zG=y~?cX_sYT^v697&Uk0GiRUJzUlKccV!w%aWbNgT02)RGHw0s#HEx$erqEst5sZz z%UMg#$q#J2WKDxjcM0;Ae62!8=8`|ChqBJ%P5C@5jhdXSOjnon`1a-#=&?#o_Sfb- zuFQi=YfJ6)TYA|ErZ*Ee%uYtky#s)oFVgkEU}r9u5nc477Z!fQppEwarApWf6_y?A znG9K?+5RY#N-E=4k&K=Xvm+U?7FLSL{^|_QW|l|V3wImy0GIYJt%JQ#!NP;V9PsI4 z(jf@hAu%u`tIZsdaJDFy0o{G=g@p^{JVN7~OFHyKjXe|0{i#4U4lI2=P4Vpz*$NZK7^ z4kYhrEW z=ueZa%kE`TXm0^R2KG^{Ko%CT2K2&ToV;nIF|d%j&WenZ8p^R=I?*-x6T z$ac3skc0I*16c9a&S)Uq)yJ9R(ZLi*CxsD-JnY7qS~h~!<@hbHtR6Xf&y^k2h5;b@ zcvs#*Q#VbQOlrBBXeyMy81GspE8PE=vk_pVnDfQdO;^4Z9t6)1y%M9`*3=`FfoH3+yn4g4_iRW`3)g&Y(1 z!6<$g2Ry6oghuf`Tb?33XE7qD7VSWprYvhwxcdZJq%D8Jp7*s-w;jzW4i||5cUEw9 zg~`LGEVh#8tvK;MVW)?^w^x~Uk)sc7e)q%PMhD#?;&3A&w?PUXpcI_hUh4HioK$fq zbfLzk)oPF<(+7J&=ygJKxZR1pp-j1#75|9y1d6Y15RbU>15MYishg@fSp9>lH!Alu zbXRx_hV-XWSXli_^(8A|i}vzSc9QLhyJzD5Xg8~V zZQ5N+b+8nwwdw3i@}tf%B{kkV;*rNhwVAd6Y}QHpz_(g>u4#HBkxt2DRp6_wHO~yp8#}q}%U1uLX zV{IZ2T$*obSSi67zC+6ywf?ev7uYSAs?i74-1YnCCP1p9Bs{`Q$`r{;XW@hYckK(uWC$pSohK!t_-_uxDN{-s=b{}|s)4BtfAT`u)&d-D3 zz_nC`=c>#EW~*T6;_L$>wwNKo3DY6fR5ys2gfba9nnIA2Vd?I+LRO^h@JqF5M~%|; zXZi*?-a76Kdu@sEFo=2Lm!tpX#bj)c?zF;Fm*+3m&C_6tbJmWpS$BHHk&3%2`YWo| zKH2zKW4iH_hQkdXXy~f{cm2clvHJG9AJ#3@U0D0~+J|bdsNG!iJ%mI^8~(K66B~jX znyUY|`l@OcNa*{JyQHS-sjBI!vnzjDc~@m$<+^oGtQ%cBzV>w8%ep&tcHNpak5RO6 z=@0qnRp&5O70=Lu!ohEx^Q4X#{(8~LXBhc?VPi}bLK3SN4dEClQovLLDje{;C}D$a zFc=MNOxAsh9Q*A*P~89~m?&!qgY%5Cr+_O5q+}sQVf02eCd#13is1*k8{VpJG$=xd zm%*6DaA2rWSiK~G7AykhDR9=v5zrdx7Kr;pubjMx-zS1WN@T#V78V(BVKF?|evl+y z9}9&*TqK9UEhV42Tv-q!F$2RI^_*-3#Zfp$d51vR1d^B#2%Erwr|_pOR|any61_2D zeI!Onig+fXS0eZ;uShY4!6OZFY*(>z2fvSvfgA>0X!=MLY<0XbV$drxW$=-}7Q+HX zCkrBJ{?x!Jbo`VE9|CWkQ7?xDw1=aBUJ8q0a0y8Ug^R|FA|KIxQX3FdH-bLOpu|99 zB!IV!HQxB|J5k&p2qNzjoO&cCbJb&d&PjPafzQbJ$A zQUrQ1N|`57$}ZU$mZPHXp!H(7c615!n3J z{io7lVWJX{C3wR0(J&(m5it~rMM668Qqf^SZ2=FI4QNsfqj3@1twd$2Vj?(? zWDHqY(jCj2wOEf0Lu#7-Zr@OCI9mAoBArOi&GKh$H zPGUe|XAIHxMmf|Zh-BSIOVvRD$AJ1z)N^bEbY!vOjDjpFEQRE#6y`X9qI4fAR^NlZ zqdlw@N!AMyC=Cw<)Juj~49gSreqn`|VzPW-E1e>49~a`IA<$-l5-Ea?GgzQ_lAw=b zLCK)d6GcNv_pwq>SjE5_c@`vu5e4%^3GrlE!g>pXTuFkVV8RjI$KR^XM!+PARb!0t z=m{{rlrYbLwage<5GA62vhE(OI=c^w6$1PX+;nug@e#_4239dW7Yd0XtUhB@W_5SH zRo#f$kIG=662S|{%UJv}$AiTX+=xP00@)xN)!kXD9>%MHxyqn7$Q(KoqRU?tF*cO3 zFd7brWG)605!J}C`;-uRAj%>qKqYl|A6K0-VBt%87+$nqw75|=s*i*L?*Z8rMqbfebN3WUHa zM>`ebjj#-`0J__?t}y#x%SD)k5L%2;1?OXWNkPw%vNFs@0j*NPQQd8&>T(FyOo@c` z0uUD%7e0(h!iqw#dENkWP>BocK3J+QVWD98#z6RKfHjIn&^jG;P?Q>F{7(WqsqTHH z>PC^_`LGOg9|>cX$_6l{MWFehOk)M31hgQ}>fT?hPM&w0*X=e&u_QwZRwrdvW5NPB z6r&M6r?5P@&?0gq%<1kZHIH%SVW>H@2M#u#?i>nBiAZH8!i!NBRAyn_t;OnlFp>=3 z3~Xl+eN+HNCJ!1ny~0FTeN4uRWAG1bOyuI46o%cf5A=jlMZvN|Dt0IW^l!!jU zLJzRnU^PW_H)~xn?2EvFiXk5AsNexSzGE;jVLVC>g(LVeCW6;pU#xyQS_d;^ghR4U zy}*Jv4g-UpV?%>N7+LIlY{Y=2L{9$mKVZHL`=ppLf^m@bVJHXe5mjE0d!pkp33J3s zydvoGrM`gL4lHp73>%m&p)phiu(b4)+meNoK4geQbvKo&^SH(k@I-yo5Q7Q;cBRKF zN3q=rV4RCFN=!8B7K_zQ=nMxUJ<-U(R48bemtgX+$zhyi0UHkkJ8q2XZc!m=lWS`3 zY3SBX)@7={RrOlsX%z#7laCBvu4`XvDt-5tec`EJf*p-z#l;UlaNGCp8o-6J9x+VTC+N|V&N{o?$#LTxB-(QV&^BcOT? zH@W*J+)Q#V)!Xm%$yq;Pd~iSfEs@{USSA8I>mGb3E7H0Huiv?~FqEXHNykzPno{9w z!{Kxoq5J)k&CO@~gP=|-cE}q=hstE+;9mgs`it(vTM7?HRY%0eQkOzXpWV#OnK*~& zOY|~H&_z-g;WtxoiImHTayvYrO~d(1KmoSYfHqVLFyto)CV6FOJdv9nO?ooX;`hZ# z5`2%xU)GdWBL~0!clegKkphpVKhMCKZwVG?+iVVPzpbZo}{S zr(2h?0D(*M?ORmU%CD)Lthv9zR{i|?HI;iSF4Yx|eX4mJPjM~nz*AJk7%49z`7HGlN4>H#g}N)b6}Gi-uN; z$o^NJJD$<5cMc7;JC?SiDRo|Lb4kX|1i~Jh=!yr$9<{0Y2{g4*M6S*5Mmo^*f4IGH zbOI}VR1O4>Q@j`SnS zeP}$F5T`;Din?H~4r9TTiO8Yv{T$S3wi~wuV~{qt`q)K%x4UPC{qZ@7!tJ zN;#QM&!pn)o(_(Q33cr5xC$$>T&98^OH_CbU~C0mLdG8v%*f^AL*=n!Vw=E9+)fo`C7@H?}L3UlaYgGcLRAk_|0vFzrGJ|(mWkXj2anF zqOaF$a1AFD5jumdyI3QDG@bt#-QgV!h%VVdT!uqn^tl`}9iny2)#qNlXxv}%?#8IrEH2jLgjP?KZe zQ}J=;{+NBh%JoUJ1OFXjx{*u{kO=VKjowL}q^n8`w)D42xQizX2inD-`wzP%pyBjU7UZrqwqkC{Tb#Nz4NRT0 zCaJ5dzP{?-wZC5XG{tfMeaH2KOJ`seUR|Va^@F*3&NMz@Pk3kC{6w6-a7SZVDbX!m zggo8rUui2CAH-VPj@G5kdz{VU90#UA8 zm~ss`vo^sQA=3|04`x|0IoO`Ppzyng@`$A|O?hWxoM~{jb9N$|1q~G$_$+=>UQBL( z;~e0cKbs%WH5yo*J!{IaN~oLNT0_~%8QA+G72>F=W%4&as3rbr(=v%EcB4u z1G1&rNQ6&FrnF5Y@7tf>-B?zNP=rSvh5GCAUS0ESXByPTu8b{Z9#4jtE`c<^QjZ(0 z>+>6%%4Ou>-M2amf4@HOMx2l(Fbi%xQ5@Oax+pAtdO&g1HTM&tF6YO*h9WUN*ywb0&k3O2#FeRq)#*U&QTLxlD_^dF&C~ zHW!y5Qm0XzG2lx`MrH*xuP>uM`oc%^jp{0WTNR>wW8~d|*RW0-$bFCHH*5h{DWY5f z$3w_JqTLWN4D?UeFwy-JXXh6l%eQP^y#_f-uN5qX6W*@eTfizb4|sDnAV_Cs?JkiS zvmpA3zJBz7Fmz=ya`JDb-P*N+_(a|hs?soegizKLMZF*idCmkN(IC0@mHcM%SynM!BiZ9_9yc-TPS*og;hn;G9YM>PYh8y^pfcZ-^sUj7{Ip997jGu!zX%)T|#62kT&aj_mUB-PEF;Niz~UDG3klU^6?&DSSY>(`P9=G?lKWMDxHawM?Sx` zQ1uL5@B_$<UD00&;0ZY{0kny=%xWirqo@52qvi#Kg4{N(F6=;Ct2P&)M4 z2Rz1Eo=J|HXHEQs6ezZ{l{gO~9;Qr&?H%8jw>>4Uj^krfwU3)%j0oI%TFP{HYo3Ris`=YHHS^CgSx z?4Cq|1#v9rvj$y>X9~H#6u6 zb=!Mq=A_~gpq0!$M~8T&j2wF`S3Gyq00RHgIiJE zH8CH21;@U(Np5b!hvCuZD#`O-pWjsY$17Ahd`st-Lcpey=~=5`C>Z8bp1|CoL_Tp8 z0Rt;b!Ml zW_Mxqn|Tb7Z|MT6SH(lDdmx>$b3iuatleEWQl-ekt2hLd6_XeK?+ds_t2}jE;q_PZ zK3%iH(mmP7j^*qjB>S2HVHX|O7Bc-OsAIW|ym0piE-3th`&SJDO8=bSMHN9RDS|CN zFzshdJtJIjbk=3bMCdDQCL6w;Z)z%+(X+rsg~Yd^knQ}EfEh6rUt&5ioQg{Q?jEBz z6F0gO)LeicWJM`f*Q>h^{PC;nFd@^M$bWyd@mw<6<_9Cu)r*f4*Y}ov3~R8J0{Raw zll|39)!o=iiSFp%Pa=jZt~jNA;K7Zh-E`$FVeTfLUw!U0{Ql)X%wO8Ha#EJ(>lZ&f z!F)YGdL|B-kNiKnlL9Ab2?d8bLOf)}BT>UpnF0_MVrphm=om zaq2tXHtWalA;M4czAbd)qF*1t@dDBfY$EWqh$c`MV&NwUAXu#iIkNa3_)CiWY1_~8 zwVRP@)QcqO2+YS2049R?T;vv|CUeVaxH~$|j|P78Rq7J=hj(g0Tu=Y(gafht=NO1G zJ^Rjas<(s@|;BSNL@|P&SZzu=FluYq^I7%k}oSJhtB@%p2G8QvO$xsS^uT^`y*B8ri-Xk#QxNXfka{&~`c+ zR+f@O&CkMWzAA1neEc8zK3%h~&(SNfQ;FoXD>ji6*|hrfE&qgtD3_6^-B;ts6J%Rq z>YsT0c2nuuj|NI;8P$nWz9~-%_u;q2tX>~CMPTfm_0c&oW zoAsMhX~t@ZdJ?L&z3{haqD)4bZQwqGPjGwT-rv%829{`AO7(P;5*+?9uFp3Xj*Reu zF-Kf&C-G~vQzj!ve^QH_nj5YI)!DD9H;`Ytuw?eelR;3dO400ag7LZ7B-PE1#5QQMBQ$!lY{AQCTh*dF>An>=~Kv+b&H^*T3JkV zr!Htt%RkgDB2dM(WG_wJXn1-=;eF9wTPIkox)IxadBtK!!^&c^f2XmdlmldI;r~@E zB7tY$QV*I@wb#YlgCWjj56n3fXJ~RtB0sK1Ps)lBQF-d_f?>lVeDeKE-KD{BDu%9U zcEm6f56P*SR6r&R$M7jxR!ojM;E^t7GkxQjsyH?@p(>7VF5(NY*^H~JZ+2{YEGLrS z-!S84#pLPFA`k2H-}`V|;Rk=Cfj_-VVBgo=ik+s}u>sGN+hIc&VttW%sMHG)`UMa6fbb03<;(YwZ)G%1U!JIZYDaDtQEqcY=;ISoT0wNa#&TL~vBuZN7K-@-S_=wxeQa{VGr(X#Yb zik3jg(%EycjnFU8k#;9G|G9!^SVs>^17;jwvUx<6K4_i-#O3cPf@3 z@tupio63vH{=qXk2wb|YWaszacW$BSq(xEJoc6LHOdRfHrf`*NwZ;>qu@@F6vkMld zOhyj9@1O8Z6i-H-rz{33U6B!hYWVI3d4Q^c1|0^>7e0pNCYm;{UWNJ?b{CGE`N^|& z#B|!?=B<6+II__fxm;K$K(s*e;@^E~qI4{7B{!e8SigDoD&*MozT%U))AUPG78RUA4xehyJ7bU8_zVdvNn|Viu4&umC%9I6K0I0BQrT3`h)e z#CGQ5Za7F*lNJ!?N}Zf%FE(!i0(b_LDnJRFSPTRJvX&fCA~&><-m@1sZ&^(Y4k?85 zjr5SG&t5zcP-nY-@ng+pUmW-l`Mw^;wXC@KA+mhrIcITTW6hd%kFEVx!;U&hS5q@k zovylxU?2PI&g+Mkf>2G>(P;_EKwW!AW-NjJac|ZZr^DCLSXNBNURvl-`6^w;MG&g> zE%{38cVcu1+>L!vq1zW8^4kO>xvLpXlogW~-1t@l<>}T!%|Y4?H8e0*!+sx5Sxg_bTuD=Lc5V>b^4IbU)t z?a0PKjI5CNOIT**#pK|*eU3t%ya<=%gx~JBaf)juEJjm-U@uJ$iPc?ROb%}UWOw1u z=Pu&=P7He-A~)EX>rNxJh0QAy-}!h-c`-5V{(-ZwbpE1Ew?kP9pp&ZCbSetsFn&hl zowz8@TKiaX-i7#ic`-2=|LG_^ap58eD6ikQMEO%^ikz3>Q3q$9iNvj)gW$~ckn7rE z!dDiOgTH^Nukh0O*8!$@*3QL~v>Rg68l9=(v~_RP*=ugA*jfEp7115@?oVk>L! zi0rxYT6l<Lb(>Mh2LGdrTm+``trpc=$caMnpd74 zOff^EQ|k0sW|<5*YJ*u0UcT7SSSF&-WuuB6EnJSJOkEE9N-l?qeq%~xf>VwbT6;S6!Hl*?^?O+&J7Yt8RA4Cv<9f4MSU@ghAr$8}`hwAfHS zVa1vJyyRh~J3;m)8PZ4Fb1QZni?TvsPVu0uh(1O~oMYyh4twD5q>g?p2 zt`pkTm%0|guJ_<6a9OCpfU;4_kdvWfcw<}Tn_wE zln)Ent?rr4wVD+7IN(R3x6G8Ww+qUU8cJ;c!m`xW1?HuB+!f>of)g40hAS9OXe#l`I~u4usOmPpDm(&M3rmer$#2^;~aZi!3iZ+{ob1s;y+Py5r0tczdAmzcL zx8}G>A4+ZTY0?Cklm36o-aJ5#s_Oqv&%RG4lgT8RnUDZUAZ%S#y|VW{z3;2C^uBL1 zJ<|(F69L6(R$0miK@$|Cf(RluZY&Be=%b<{Fm8aThzp<(>f?gH@2#pCNi%sL-@h`s zr|R~ty7!)Y>zs2x2Y4SHHdJJD24E97FGC!M%W8o04DZ1PK8DQ$SVZ0m1)*=|XFkv0 z>;-BFATBtVh!2}%`2s^U#j%0FQ~`enlNS3}0-eJq6hyR8c7WqyL0Tm!JkX)ga4QAs z2mmoU=}b+iSsKI}1{ebeCUJ#F2M?aJI`=SR$A)q)tFaY}WW{%TFrWfJV z!DUErh+qhLvG;B!C3C{q0%Z?l5!gv$2L=8~&2bIqgdtC)L~E-FI8cmXkGHL(CN2_w z7=%7B3BeW!HV6|bizyRJZ~AXRir|VQfH@c%4G;=|D*-`~+3~-SHoLe*fJ|dhqyYe; z5pZw#P|XQ4U-s+wE(IhvIR7$)Xd|86t6gmrXW%UfGT`}r2x~C_J8)@Qk=^M ztIh@n7${%p2yeYd_+cB+b9i9%K9D#ZnX^gIoZGtin<3T$IR)+_$q|X8$GBM~o&55e z6d#Ou4=T(;FO-A|p)$d0FNc5wZVvdjBpU7m$_uDPKk!vxZ%t=}dqKg&df&jH1i#V- zrV&xCv(>pK!4?rOfdNzuKL>imIcH#WaPtlhTLn!Ex3{VW943YjGWiiSCZKU6!mtG) z6y6Ifar|SygN2aLwU|C(^uVy+h+!JyUIMNm2uhDFJI6Cbf&6L`loL>g_=F|Bs0T^V zNsrh0R$HN&07At2N)B{`V+r(8v?>zDJosM#LWKzO3eIx$a0>O*Mmd-g8V&smejifJ zfy#j{hVmo8SW2iF9S1~z*m$)6RDkK9-|ZSgus#E$1v8(xqUU7 zm=zBlCrGj4pw^5H7%2kJ!h{7Ca%*#44Avs_6Jb{+v11EDWr98T0pVs08yyA}Su8Q^ z0G!1VmYSVglM+f7rXmM?!sw<6`nFf-CJbl}F^cI(VAo`TBXpvNgY8)jO^`M-K=R@Y zKcHC>aMjSYC#GHc_h}j{iOaSG;;Ur^%FdLx{ z30P0O`B~v+u=X)rK`cak8E>zGZkq}VQew3NFoDqLNB|2Idd5i4#`tBASZvVESX&6L zsY&wVV)8U5kNgcebz|PB^>R24Iqt zm~*`)3vl#HJEpVw+6r+$p($tmC@1Lez7Jc3}>PoKnn(8*ojxI z6K{5KQY|Q}&{tS-Frb011e=yDIYaM)6#EZ|(QDXZ5>ha>Y@QSpdMH0P!Oa&fHh_4M z(6xE8r^5SyYBM&vg_^Ms#CnDW7{8B?fgo(Ou}qg+kOIaDvnbJdxCa2Z5~daA1}MQ8l$b$CT@vCg4`;@SEV z`F@RQw>g-Os5HD;>syJH$+4qF?8SFY?iYwtA5IZtgCFVwL3}m>mZf!4s0Mr*`Etaf zHO=lzuZ+Q1z0oD?3kR;g?*9u>L)`nj_pd!a)?q9g*t>%ANdVm#YFL4N{PRDQS=l-_(Xe_Vqvh^*=NZI9B?$+_4GKc-E1O=#HW52cGS| zq<=U0%D)O;z0h;%b=zXzta8?AwLe{hYPEbU=gY9VD*Sp!m$HX_Gh86uj`l-U`1RoILUt9wujkG(>JSxF zn*I7E3j@pwF`7)X@AR&WZ|;<_2Uk^adOvg1&h{6*sAwm0ya;Y8iZRVMBt^qQ)#k3q zQWbtwzSO{@bco=QE^y(2+t}uvXPwE8zk2=mNB~n0>$nt_N#?mM?A5&QYdJ5LEn%}C zakv?=)|?RxYnNgwc8J*5L$0^DzgW1xe#j19wsP`>t)Px+B;rC%W{PS2dN_Bf2cZ-W zUANN9zT>i$(eaK8h?^Ijzspt#=TG)r3Qx$NiJ7R1P~_QX-c5XG8%f*uJ-+#R5qs!L=q;Qw$dDbh z3$`GDOkhMJCJ6SMSFY^ex{(af!xMa9JRCe5@8CTvo8h|y?Hc(OuqDM-%!>FP@+qUM zv-e%Svg3HgTgZGHU&)52E?e^mp6+Y)v)5m}G6>2kS!S)EUaLXP=2lDqY;`oLbuTEV z8%W!iAGj3+uuE6q473xhF=DdtRgDm0Vl{9AAjs+Kt?WZ9D_f>Eyn?;BH*01Ow2rB+ zuV}#m*D<`-#-H(;mC22U-r8}4x$B^?338k4OtAgHH&YI@bF%OnCF?_Y%j5=^u+RGr zOa4zlAXIkWtwdEJ;8Ta=e|HXi8zBfMAy(xwVt7wr^gEvew^MLso5Ky4pIWY|Q`w~w zllBR1P~L^LwNu94ct~?H`{BE;+uHuGyLg{CxT8Wv)rDk?mgwBtQi&X)WSz2c>PvInPHfDW!cb(WXoB;mJ9DiEgdrU^B) zJxeQ_$2(+f*f5JW9Jy|1`X@e4K_HP z<{+`3A84%13NbF3O=G8z1c$C1c%bijL`9t~%8()E;$n*5g&*eoG!T5OkbC!GE9ilCnz~Qx@wxQ=jDem zQafer!FzEiR{Z&u3q*6~=Pp4Ve6mW3PMp-z2Bo(U(aX~kzcAXDA3$3=WbEMw=JvH8 zegN)WtgC=>2~VTYP^A>JY|zO|ejDwn3!VCr`%y)QjD6~{t$W!Er1ba1A6b-(SGF~5_02wju0UEpcaKu#dztuR4hrUf8Y6`gDlLZ-g{5i|$^Ma%2my(Cwg1O8mKUenN4Nm-b9V@FU;hlma9K6hTb zbOb#u45;#^p=$;{-}g%Ij&7}}Ja)#&#biJQ@x=C3VBdr;sH8Dpg?7OgL=Z`6gK zD1LQi%jQlQM#3|D*_lIOr@yn9 zJ$QQeN$jKFX(FiT>(E!T*42MQ>|C_Pq=`r5iey}=DKgyXo?@^6Hm23lBJ3bQKwCfR z+Wy_Q(VQ9c>L$E7KH?#-&S{d%<^+`rY8ERdvajC8-t;BxiaI4PtS;w8kPx96peHWE86WQu zA@b|%*b6`W{h9W)Pr(;H7g;4xG(IE+CJ~FD$*baWItAn)onhbmEJj^tF`qGX@VOP7 z($Q!Oi6Z5f1Zq^=7dFXdY;F~|bQY5Xa+dZVR#)7jiHt>2mP(`wmC;@Inu3We>-q_9 z=`2PB)s;B>_Y?feX7_vhfJ_$+ z*_?}VU0hg0?|5uw>*!Gu_NjOme-@hk=VNQ_JMOFN0W;=Jea|2_=G=%`WFESq=kEh7 z_1y#avj~{E0;k|t373Ljv;%6NCoNHw@~X6NF;h^)+1Q^j4Lgc&df^4`n`wLd=|5p2 z@BBCN!&0H+DtghFEGdmDx6{hL{(XGjyzoPO40MRt@?F+*+v=xRY&c4_x^+EFCcc;y zXAD7!EH$6?Be^pxeFF{XC}m&&>-72UyWha)$Xsw0NDLv|r(Q29)RJnJQs^C&JkBK9 zSO1FOhyEX6@6sV-!|luVBO~D6?d|vvNVrd6b!t6$#1Qq0mnj$~Omx*$jp^9OwznqP z50ABa*+>6|iPIs+k_o29^CKVK+1~Yce5%dLS0~Yj{0=6zV9WRb;z?19`f!R$vRC~B zCV`_%*%y8{uy;Kn_gjzFJ4TzIV|(9R**)W1omdZ&F~t?jQbk5mF5=u89bq4N5jxlZ zCbaj_687Lt`-O(J-{eAM{Hq{!2vIN>c?OXBgmxx)+eFTTx1j2GhU#|7@WzQd@pWB;1axK0Z-7l`#*}uKCGJ=!bNjR#= z0UOvG;jX|p4NQl@D*Nb*D^vRbF$44H--lo}zM2(9pQhN&&m7vxe)N~eG!gydmn*l< zn2+GFnh>9JbPoxA_xP_i?mNL?cI(S96OjW!Tv9WRn-2FA+=Os0v9E7yZDVJCvqBb#OfX~ugo6O_O0e-}xp91gOe~hZ z^*Ai&o;vz!_VQJH8Z%McIZSE`;QlWUdTJ~AT5gZV_dOuIh?NoV>cC}92 zNaab}yT95(hS^W_wB9+*xq{$Z0BnI|K!l49-U!5MS#7Q96KTa!NlG`omXF*zbPc|} z4)?Z>6}S7h-qxL)qh(`FMZ3hoN;;d6FY3vdn`9s9Yi%9x5V4~AOZ$XTd-Fgm02DdW z-JpN0T!;zcNJ!)h+~#c0U~BKTjiv03DepG+KZ0>zdZ0D9=e#vrFC4}jrte|#MyJ^O zhFY7qZgdH2|F2yPyE)13WcLiWj%Dnv593XAXntX3IClhZqC>9u4<2Ss5ef={Zl(CoJawzbBjMULB$xUPWf%``?__`hLK2ww& zx{hoM?b!F&R|)ut-z_J#5o=JZca)_ST~c07vW3|eXfa2ZvQHiU&3Ww?XIqF*wyw^Q zO%oRmE3ev}QAtXYN09X5a>zxo)=AvmQOv5Q|HV_V+54Wqbh7>EB5jC|2hm(bC&ys)I1PX(R) zZbSS_7*hwQTjQJGCO^2)bqagmW%bSN$TWGT;3}X;!rq~CwkC0O2jR?}#UwBIIqko_ zj(y8aV0CVN-=YyGDMc}%H+ss&w93Hm7(TkQwRP-h2^&^ja&Eh4rp4`hwy$qFI_8lu z#rFOMOJj$Kn_|2{_C0@D0Wo9AsZcITw9>j!Z)bFNKST5%0RT(Jx1MZCCGZO>XeoWNop= zeNe<+e0+V}u_>5uN+drbA$ zzpr&GfZ)!s!E9!pgKi7hUKu*H^hHquK37tElC1nx%+`)#9I8LCrvG=H-tu#9 zK6r%@?UzDIT|^E*y^%b}?6s$pR>8yfb}3t){oA?h?jKJ&j-~8AamDrQ->@uiiNm!u z;vKqt;GVvp_6|bb#i8sJHW-Ok_pU1%qcOOslK8@i1CZAv`g)eFFlc&5G5f+}G|u3E zFgMfw4Fl~kYhFDO>XNr|L@1?KPTA5pCgD)UA{O?K3e?b1%1)#QP9!F;ZS9D%r5DYd zfF|(jb~zo;MO85(`;~8Ykb4u$m_}nceTu5dy8({R2O+R^*+>lxc7a%<=$Ygy7xfu zmY%=$yx8+(&u4mW>v?xirpMKDX3vQ|Bi(Ow|Frvw?oV~!+I?AfqTAlB=-%Bu(Dho^ zb6sEQy1VP9u1mV2U6w9M*X;1q!(Sf0YxvsXr4h;aL&Fyg>qjmfJ{?r>e+~V5{MPuP!3PFEIC$k?ZqPG$_Tb*Z(Sg4V z{Cwc+1D_sX2bu%P0mp!1VE4d4|7-m}?*Hn@&HZ=x-_(C;f4tw?FB4tSzpKB$@72C% zx_bK_8JX=nBJ%WI-&gIs2(jK`QLb-$-=^M|d%rhg>Dn^>J-z5}q8CL^iasN{ZM-}l z8dr}W7~eAX_px7$eQWHqW4Di8HI^UqAwB%Qv9ZxVkN#}*Yoqs$-a2~uXnNE&dgkcy zqr)SA8u`h{UNKO<2dlGy0mee?dVlETsxbUEW$T#RDb&KJ9!U zuBhi5l4ZL%wj2%2PIpsXnsCFt$Vj4DtxTQFoAj#OaVHDq4yBio+g;*@VaXH^Dkq=i zstGsd7ifj2A&$zDA)7rV$q1Lv%NH=Wz3Jw{f^8{Ok1ErGz@|0grd`KA~8g@Yuy+7lK)O zi%>2$t0*0TkHJFTacAvZNIS)e@i?4Ij|dMt|2f~RJ*#l)#dRoOcu zT;6g1_0;bP5p#4g~k2kx=XAO{TNZp=%T>eB7ZRQG8Z3)O0Vp;m4fm&}c9!l(MSaP@L#nTaG7 zu6boNPdS)PFAL>MCWJD^J*H)q->Ih(6FO4fL^V;RflfODX1&vCGs?mfyM!CO3(GXV ziWL@}rcfr|IrxZLko(DJlT z7A@or&5}Q{_1A(x&qydBTbu!X$pgUnshjxnN|E+ZF_WR}Yv|k_U9{^JzWz!&U#$6) zI$4~W4_fGn7lg~h2C+oNFhOZduFvShC+*|PBl^(1l=k^*-W(k+P0y7g&P=?pAK2lPGuvP5W5uBC_wwiqWOs<^~UD9Ip*-90gU!$p|6JtN&tI;{r7N#ko;x)aeybSuj=;}3r zOhK8`HU=!paHSI2E)&Xi)I1~i$qFWWJ+7mf9dedXV6&bzT5Kv^yG?n&KV=wd7sOn{#%Q?7%eph)$6qch#S+wfycTNs7u1=eV!xE{E1707kqp$874uRK zhA8nz`OBq^u#EPawFxR82qra=y>+3ylm`K!lnxl0IY$x%#BEE0z$0CxXt!6IQ5cuz z1Ij%=A}p6)3x-hFp{OV#W-EcJ5>%}xnP}750`{$Y;>Bg=PT}%GwGOb z#P*)RmrLsIARP-kD`JgU?Fi8)w3>pzUnxj}sfA@VP%aFeKKlgzcbSG>&3L4#TtX)S z5@>&lznrP6+)PNVt^|zKVoV(C9TdtJq-r{u3eDFt{#sU(5D62ADYz8ShSF+uIcD_8 zM{2_5$yl>2Suj~6)%21Qns%@7Tuf5#VX}s3LPtfi;W{(@J)t=vTB=r*(kYeaGokH z8w!oQJ07=4&;ONBo>s&eNkbLF0^ql2WxWpy<;hf*mRBfiEN3tqkY+~Mtu$gb7p0RL zHNK!ORZd1VPjT%DHv*B&xT0osR^3@|My}}lDfXBXt~Z%xM7u1tQO0@TAJkG~B_?-0 zAUv8pACnXm<;EhTw@2)ZYl1J==b{=$y7@-5Asz?8nldx+cgH0CKWU;%FTjC z69-~TRG{I^d8BaC259pXOWhq7-}>4s1DpH1de0a$4m>lG@4isf8hViY&LS6CfCxOn zcb*fc=97#|>M&QCqBEUO^XAT<&$qzUI9kTu*oKq(@~iHfVb3+T{=q&!*E)&4$kdvf zv96wi?=#*DC>Muwr%dwS+2y&TK08CYbzT*w>3H5Az~*!(cZ^?_aE=u$$s_R zwI;rFUTYQsB&++@KSC*gJdBVysb$kI;@{1VJDwh{NPOA|>Ckq1BU# z|BJI?b{eT7Y)AvMeP=QI*nv0CYkyaR&qt8%R{^&b0z!iee%F$ODO=mnvJ?0^S4*h-T7en6~dSK}Gp(}@SL!P0thfW+C8T_BYpA0@ec+cR?gO?7* z1}$BN?(RX!;M`#E!0!j19{BRWU0oM;eR<&8fu(^92S7X;*gmkS|2O^L@Bc#oo&Bx; zO8-0ib^WLHPxbw?@0WqT@AQ4H??Zj>=_~dH`_z4>^iB5uz4xWwZ}&dfdq?k8z4=~W z@43DEddIr1?fG-h&w9Sz^XVS8r`eP2vG>S(cJ~Z)zt;V1_oLmP=zf3Ka(AOU(rxPc zVK>ta0>Yv0X%RQsn@MF+nnScQ7FR4K-M{9mm+EXTy0Ku^XFTaB?sPvT zw322P=tMCT@+$2TOFrqg@#PjX_%n8@SWK6f5=L|QBwkS`EkE}Cg+*@QudY*F@vjNh0hEn=sSDwgSpCYSNp7qh+J~-Po#9*HDSLQQ5VcF#nxpCR=!FQ7hdCOvsyghc{8lk)#FfxI%&0+FN#2RPT z`aJ);#+1V*Szx@BtidR?Y5QM<%j4c4<&;aD(5Gq?L;bF;#V^HTCF;9}~(Q2^keu#2OxZIHT4_PZ?h;_ZsL#L9fm&$1+)O z($23SNux=kMWQuZlBN@G-GY4jj;7F1Mr-vamfVhPzOhiuOz?Zq&)w z$EMiz3}63z+65>b<%&{t+NYB9Rl)Z7syUCR|5 z6^qSgkQ{g~UymUWvry5J(dS79b4k16!01|eI8JMpgVJ2O9H=N#T45L(l<7DOA2~+X zTu!?rl2aAJ^&Ke?PQ8n7j=pG+s?*h&(^4udx?>YUx9ijJlSUPeMxF7N<(~AJ!rav- z!ZL~4mMwZCdGmZE*Y|6ony7)IeG8$A%vF*%B7>oA-Ax$0lKSw1GOdf+7t3{ZF)Vdm zI@NuK2*sgnfD&6`xnL@+aAr;yD)HBx<$$uX?5ER42|aNa-*mmrNlA=}L?+MdXt)Z&g>I-{X9`0jXzaJ@-krHZnqp(;}a7yWtaq<;zZOM@mRpHyX~S(m}6 zIPg2+dODt`3!$`H99QHD3B|4t^5wdMuEC^qrEo;)tJ^J+;i^#X(^7Qa8_C9^@vxQ2 z%)B9#8#Fq)85P+L)}S zWHM8B{&Hl7(C|}hw-dar? zj?p<4f*F&dck|b)5=AYuER)uNKMW0{gP7K~Aln1;p>}hFFN*B!f?I~x1FPASg z3iP5YO&1rm#i}K$et;iA@>+(WVm7^N9R4yC9Iw4Csgn1!H zYCXoMS}rb2TxHq3a_=od{qA_0mM68o7!_Wwq?H4_c_1mPm9&VW43!&6)AIaM_B28J z$ZBG>Bv3J?Evi)97K!hCAKxBXHK0lBY93EB=m;2#GTka)zbsj#XoEUsk6AMrwLil2 zua$$#nw0yj^#xBfyqG@m5ux0v^D_QY-DWlW0u4ku@&>%5OoLcygDfPrD4ZtUa(e&u z!u8^LJEfD=1HOtP?2N|D%`h*J20}L4y=16Hn5tFpl@1FltTbTBQuctgP&Sk-a4O93 zc8{cV-cpgMy(Muy?M#*>rP{Y`_`RXNQm_}UAfG0H{(%ak; z`cD3GNi%9qx#f*ys#rDzsxi?;!u6g!O)q6#Qd6!*EiEdCd1F*k;!vd-mv$koPN!p5 zX~G#2uGh^6=qR0)#J!1-XGvlEG+)lt89h^5E@lnlXhDp;hvy6B74e_%#z(K|i4bVy(K1fz*Fn*8T-lCCCYbRn5{NTN0$ zj)G6P`TFUSq#!Yyo#kbJdBL<4KjAUXsFkD<5@dH2T)}K1Aofw;60Qz1NUP{UYL%EX zx?qhB>xJ?_6#I{m$*A#L&2fKndaqFKX@;Yc5(NWlYB|7^(fe7nE6AfxAax)cKfL%|o3abR(rr%Ha$1DjQx|p%zb{C(KhySvJ#Z5N%{?XWYVM zcQ-%6|E{>2(^GD3$m}=f0tLq z$>i*V!sRBbMq-*)J8@Hol&hJBK~-Dw zl%$HR`pIUO;SsW%~1*iQJGTzLVXt-1OfG@^WF_kX~%Q1C?eEc>=$B708 z`+wX2-~FE+f3g3@p}p(}Zdlpf(|glEl>O2TE8CmH*Y%8czuNs&_XFLxbXU8B-DeFy z**(|wudWxmzS?zH*L#OcUFj}!*J)kjqSr+~7+MwKaJQ&F{o8|<4rPI6*2f*S)sOSDN3ax5yeD+O`}*aI<;3S8-6BZ{X7jO@O( zo2>vUafpxxQoU&PV7EjYBfsLMpwRn6EEL#RPQ=1S36clA z1p-!y(wja=?rm~npuGUV;RqTWNdp9po>zpb>j=;R_z#pDK=IK{0OHuP(;U_d_txz| z;RE(SFk2}?xUu=I%pk|0AVFC8Aqki!K!xBiyFY|ZbY-`2Odldez-O}tx(cWl03G?k zu|W*)7>9&{7(GZ>J}%r8Lrk`lFu^1f*9*;Jkg5Rawk!ogjRXjTG*C*^v{8`K7}R)b z^l?K4FkBR|(N<=dV?Lo~8b?zlK-i$0nkq21NW1iz2@cK{GN8{41OySS+b}pW{LnOK zb$|m{5NQxp8xEo5_k#FEuvD)62uF1yQXbouLtlePN1hP~rJk3$Wd9uQVQUn3L@oIw^()#kdJn5hPEEohuAZh&B9f3oASVz zfcb>C#vxrqAK~u}HtbD+MhMsq=r6(=!)P$&de2%DgUy9O1@#1y93~Bvk5#hu2|ss1tJHKFr&EZQ-Tx<%Y)b(2LNCJEnvm?#zV;tQdeclb5fF@dANz0lzAP)O6%08bBSQpGY_P@r#yO8VM`3fpkT1Fc=M~F^(le?geNQr7p}dHQou2aO!@)(2Kqt05)R6 z{K1&T^ZfntPL?gzCq?_~x~6`Gah!nuLO!JGlG#aJhFw@tqh zq!|ELq|m7(91*0Ns5IEnXL>#+NP+d!nt=TRRtqP|c@?40j@>1Qfs-opkWF`c?4|%{4;RpoMFt2VoiXu2qG{KEwfNF!_z=iTV&g1VTQ#T0W zU=!#-LUr>*@zgqLFGo=%5FgM{z~%FSMgpyu!KGkz?c#3+ehL5?=r!~&RyLruK;emH zX1~u@4Lyhj&8AJ^RcEWvhgknysa?A{DIum2D4PLqD+4Xj#8k2YEI9ixFUBMTHwla` ztZ>jzT5PTX)0*ZuHPB&*>?bS%TN+C#SVLrhTIq?!wR>$CavX06AXTC*v1l`6%Yu}k zA^|)hz&Z?husfkWndT;bmSgH+FyTcKm5CulAe`U@P4POBz||TmEFWl+AG#ixb7*#E zR#@o)%p&MSfV6-D0Lc*l2hnWjdxRebYY9V^s3q8u$z+92kWRm!lQucXB*tw6E42sk z2DBRIZ=^F13O5t78!7;w4cc?017JTY`_{qrIT*e8tLhu z2seXXLH1eL0C0of$zWP!`#3fehdzYbvT4)GV(Qp_51-VHX1a zB9wds95wvR&b6%|MxzRYU60r11X>3@ffaivN8v=10HMN8j&@;z2m#PV$WO7%&ad(7 z4`5Q*oQTPCk2VpWVvX#Zc5?1KCoR}@37C{q(hCwiG^iE#iVh2KCqS##!7#`*_ z7S4t~J;#yG$o>^iig0607=tT^MTS5v#XA%H17ngkX#yL>dI}mTG%<*YrgSf_UkL7# zgV1HMS+k0<>|?~(ayx|W3s#m)5;_*m@~H4LDZF}&fOCYZ!RNzjo5v;?e__%jhVkS8vDy44f>lk{2finWp}GNu(x!l( z1R;wg8UQtQgkQWofQ$jLLa-iIs6KMeh~Shagb@H@8=+|8KCIFh;h;4EDYl)XPKF3< z3=M{21#1v*9G?mRxlt2K{QBbo7?}pa4FD0lfsm=ZKyEvDAVnHh%!W)ZhcOTKU=Ug;SRDzhNeRam0}{J2!hXX(Hm}d^6sEDUi6DHC#teYU zaXec+A=HTn-of9D)RkCip|ZdZg^9w046hkqrvF4iiZ7QSb}ZQ9a-UE>?6N|czH0<2 zNN+fk2PCQ$;r)2km>Isz_Fu0_v5Ui_G>Niz;RFEY05s6_#|1IAaca;2ag>c<4WWAh z$4w2cPerJ3j1AIN_-+Fi4V#>LZ%Me90O+7LF(?UXwSl!9+v_b)u1U#G4nq=<8%*gY z;qKx;+rPdp2HB5Lno%X@Fu27u$ZutWSi^L}!iU8H$0vZD!JZroJNRrDtO+qLv9OSp z5d*-Z!pBUqzP4my8-%R`77dIGf*k{@FWKnp6Z&6=G`e_J@cl3!Fo>`Z0RdOUZ+$&D zR}O?NW<8*7P#_t69%ZtPZGYvPOjaK3T?k%}1~C(GSHgIn6LV4nSsE}~8d-dO;-iUh z67#P7%ppF#{Cg)h4Lm)zuU|BhMMl9>yWb&tFA1tB!h!BsmBN9}2kg%W$`&b=&Y6?6 zCZ}go686j_9Oxaz?7{0kj`#v{ME~C8TJXbDDFi=QS0(H56hR#=&$(?yh0eSXUUbIT zVH^(}JGvAU5j&ryp1nN17WQyB)0#u*J+mJ5P_u?2Hrgy+u%t^lf8HbKPoKP+L8wQE zj14dTdLMhkS1#Rt#FA~{$PWqiDCbb2V^zHVm=%@1p=RW6SiY7G?yxpa&JXSz?gnrepyuV?2;*_M#p$e0stU2x)Yv3@oeFUyM@v|h z_i=DzemT3d{kp0Jh?s1ZB%b8SRvCF98<%ACewo-;)4)K_elmv^brj?HI8svm?6G(C zv5wDQHNhTt$0cWyoa?hJcVc>9p>^u!YPyy$QC^$HSd;qez&fek#9{QM0**U$h)5o^ z(+I+4qAfo88zhAxIUn^>u{Aq)g>UtY^>f#eFzxYC0kxct$?Nrof^}Yo0~BT*jw>B4 zVqbU>Nr5j;zI(X+DP3zVt-z+prcDtXv)Vay#lUracl3Ost4-qHP2@2>H;$HYZ&AqK`?Ytp948cxxRC_rq8+F01&9gTa&q#LEU?&-U;_$u8N`bP0R;ul~HF{ix@f%S5cr)gtM@iDH1|0!QJ=jt<{PSO~llQq755HZU8{VNu4=pRgf@?9FNvG>-{rgwQ-BilB<1Sx#7Z^3L$ zOhe^j{^N_yh#fq1CHXW0=aa9f;A@RdZg2(r*u~!M?aMDbc&Uhe*UC!&9{bwyF>Gq2 z0GyI~Mm1ANy3`nCC`M4z@^!1{*q< z&(Lu6P+1#AFI@1pQPjpLav{zn-ydclyr^X+hu*AjX*F~tR!@Q&eZtth$T4!s5DQe&k9*!AVJ`|U_6#Tbh1fH5N~iKr zK5;tawq|n{#2Ilf?QdZyqz)M$Y{UUlf|1rgd4+UI6bi|EBVz z-hcaN$)V8ecd$Q?3)=G5B&v$6BJHVwEKxHxSA#MsfD^;9jCB;#w}=FVb1clx1ozdO@Dp^kG-vlp+P z1t3?(( zVXrpIW-rCf9i@Cy^FLhL0t%%X^VhLYm#J#8THb0bvyRJJ`^P&ixG%^(GdS&2X&)56zBFgT6c3lx#MY=^H2Cp1W2O`XTMl+vwdNdkc zjNM(vLv|Fi6W{y*&XV0&m}%c!CJRPzRgEh696z<3C9Gj8)lzCnA2V2G4Ez0CQAI~F zd-x_W&$ui4HKNnhi$2&^d$4>gQwcT87fya~9$($OAk=4h&Rd3p)W`_>76a?YnSwBhK(ZhVl zPqF{~?$+iFd!HnOJ43{t|It>2J$z-01A+wBYwPH2jDg7I#~1_c`z}9(jQ7@ew`}Zd zSGGm~y&zdF2v0*rK;HNY#t~g`BG|205kkR+Quc*V)5QMQRmVIs`^T$VcfPGVKk^<- z$BsU3htIwdIE$OF#u;I(v;lVCHQz~w>_;(Vk<|ttR>Ud-EIWoOF-Q?+DEsLTKqs7hS8MashL^CSuf90V zZk~Rxl)de)V{Tafco#qym4XL8a%AVM=x~m$lH#lW{Kr}oV@HeF7l!_^w|ztEIu@h& z;~2#-I>VL&!z{izNge}y%fj&@<}29oiPpr_hF7o$SDyI~hw?>hLz&ntiPM9S-7%aA z%(id43FpOk zn%BSP;;H4zfwrRGZ^S!c?co<9U@lsORbdMOlODNdp}QhF`-o;BZL*c zV^Rq7<*^SOW4@48ezv{$zfjGbWYxO9F{vez*#zTFOY^y?O>0p^*=-LJ4S#eoOBpWT z3w^k@C%O4^TyVW*eW8|y5`|@Yu@I^n-G-#cCFP&$(0A~?*ZdM9>^m=DU)UKwr~TtE zkriLQO41GMxZR;$QMa2JWzyrVnpDZCB+9GL`~%qdcF0(#YhXWn$Z*y4+SlcW@oPW% zEUW~+Rpa`{<ZN>#2-gw6GsrcFt3z7c@G>nh@4`q!dgwaHFnVPpK&Dyf0^QYL$ zZbZX6WbFNi_jQE-KgIs){jKA0O#X+P-i0uTq07cU){Eo4J^$?a`M|#M)5kZD{c-Gv zW1s7u8~eamW9*$cD!#kxt7Ba~R}K7i^ra#7z?X1j{Ntl51KQDC&ncpFdMl&0u73?a zIVv9AGV(uzFOU3a2gyFiF|)5e1SG)<_tRV7rFPp5DrNV~`vJQkdbuS%Lus$WN3o@I}6`!vayx(PC*K@9gO@)ISX|S&NO`B88}5^{Jlus02efj zhe)-Mcf#+2z}ZZ&Hu*~~n*khfa82Vw4|Z#aq{J8jq{Be<-Ma)SjLT@7U|Phwi{-?X>M{#b znCEhY+EKT`=L%yz%#7B0-}ZGWja+5KV-71IoC0v^z=7NMQ$dVxX?V-{Byhwe48y8X zx^?fm6ed!bSz#O|_m1u52m86V;N0OU<0=@A3-HA$(4APK~!G&8>R=xM^uRXA;7btg_D zWGO~e02~71&0PEhZYD+$I5mmQ8`gdjCj&e0HqIDJr10S2J>Xlup@!=YS;FvMwtrE0 zVzR2h{e;0nnnwqbl1)cVp2s;=aC40$=|TPgi4_zaGy)D>S9Zty_+}w!1LF_oV^jjO zs1{2TeC(5aqsho73n&+XK=P9izfZ8SO(s4n95CR?dO@U-y@akh&l5ABw)}{o0 zG)2tvcw;#Xc-W;7y|i_SZx->W5?>q_5d>ETf@RPX{hVhNqZ%GMxcflUN5ha}4|Oyf za5J4C+zi7evZ)a*g2Y}{q9_qSv6=JC<7VU(BNZT?0ht})F+vJPBi+jnYa+!vAP#j{ zHZcwnjs&07wq>DaWaUQ9uzkXdL{tm3vpzEhuRcO(kaZ9rXg+8S67m6*bslL zOqK?5l{l%98ecPvpUn(h=76LEtjFcSgp*u4`>Jp=gZV^WFWh!`)eYh=%%wJS?k$W3 z#AHE5G>9{rC`97rcS@&w_^QzyEjkhLx8!Z%8mhvo_ux_e>3p} z>M``-+QPIV0YFd#(#b6U!(RCLk%LA{;uuI?J~R=5B~$!V^kbOPBpxgVDkgkQ2(*D) zH#NlvLSb;>a~+wG$dZkeOvLRD{YlN;!B>sxgLeQu0Mjgaa+0tq*x12EZs1;o%@B_$ zCRBz{9KCpJvCQZzLbH&?5uE`SIGRRkM>;2UZiiElHpw~wYcHOS%d3a}Lb&AIQ@j|X z81Xus4rri%wMh=THFpmu&0rbevf+@o1#JpvuMG*-w(IzNk>-_b6EMFpGZ^wsi5St$ z%(k_fVJLvkX%dZv;iH8@KuG9L2QRkbLliMcn6bn=ipc~2r;yY@?T(}9OcsnFVEEYs9(gTCuMv_;Je@|#MHVq^V21&e$XoMzmVqqB7Mf?jv z2qB#DXbyfNk2Q#7n?tzd*fYY-B#a2b8%_yQ17oj&5rWEwPUag;az}B2VbBu9{tvGq z!WnvnN5WXab`Jh^#Qb2gBk~Jg)_QZ`yTZ-T0f=HTAY+dQxuy^@g_qixND5Lc;E4Q& z4;h_-*#UnCBGN{L9UZb-LSMk|ihvF5AP{^+Vzq|()!I*TrIBzmtO6uZ4?bw34+i;# z58G6XaU{LO76wBHuN+%L1TSoUod01sYqe-fMulmJcqC45d+Yu4f)qg>B(MRlZXk~E zUa&uLN_sviNJ&&L<~defjD0&ggXGj2;e5&1hGM(plpr%5aSCCEll2H5-rkpln^6@B z$-p83e?L}DbVevWni8bgw?fAwBq#*`IAR;|ZgRO%&gGA)u_HxLDgtxJ-pj7Vdx6Vo zL{Lo_&|Eq=C z;|SX!DWwo7H*gnUH6oC(WMR(Wc@PnVEghz!q^EaHij;p)#(eHIIFYa%>8Redni0g( zjAHkUSB&^QE?@!43Mp=wA;5H%W$6&_ADiY%{# zZ}3tmA`Dfy;V>IwWGOVpa)2B`V7CP!i+$O1e%2i8m$jIR1#ugZA^RSq~sHZXgz2;zH=j`nO=k?6hYI2CwtJ4Ub-@j1^sWAlbh7x;MSxYkvpuPE2ynEYWF| zST~w&*}Bms>_tyx|9==Y4{qwdXlyUSaXuqDIPgsWQ13bIJr~C^1lHkNHzP)^^g@Et z1k16W11iN`^GzpxuMQ` z3-xW7{*aZy3kzGCGyNG{-sKwY&)8HcA~yWSjR-eFrX)gCo?sWA zS*!HsXJP2{ue!-|a*Ztd^2-iNWeil(@nAxqjga>>wOb*R$rSQ`qwO^v*Rl7X{deT0 z_)=`9{m{?gKiqYNbk&KLs<=v}v5eP7Hw^ZCMQpEVj1k_b|Bk0&TkMdrs&A^flo`|P z&lh)}$-ee<>(l)6JHCLi{f!?XwnnzTi9^^f9MOxnE&i+w_i5i?)oC0`_|`M7fp1G zD}K!F+iaeHi=MU$scaJ#6?orR)o)z0)Kp=yK8S66%R!BuwI< z1Bsf%f=G^dd9mK7fHO|AcfAZx<%UA`g=asrzkS2ct|^H~7)x>8g##0V4aNwBU2{=N z+<_WI4znM8g}87wkh0I8IcH&a|Mr-gzy4e3y^e9cHvX}~$(gtGz=q>r@Mg{Zf$-~z zBNp31WT%B!*oO@U)_1=?!%e3XF`dM~Bkn$aDIGih%-zRtbTwNZ2{UZzo2?6u6?5|z zCuHA5g`_8Y=g`W)7y5pSj8b}0`>FGXF2F>ztzLlH!bizCYlW1N$(jn1gwJ2Jm$K}Q zBIu09pITeSJ7lb?|2KQvkN&CkPGnqKh5u1-61iPQz%L86M%@!Kg-s#2)mO2yed2Wl z6m-gfQTpZC?Y=(}rtv%08?l%(YRi(id7`azI%Dsx zf8W}}9=hfBZS61Vo^JdHmaI-0tJ<-& zpZ)aY*<0Gb`v*a~TULXph=(?7bcsfs@yRQ0cg9@DxmCU*%Ny8~bjaA(`?z41_e`}v z{zeN~plqv%F8F_peR+IbWx0PQd(t#Z(-luas^%LTbe6$P4Hq$pQKwgQSMa(~Y|XA;S2`276$dER;E zJ@5Lw&+>g5qaDh*#2SjA6e^-PBZ*jr_(RA0SY(I=?X3eIucBAXG9p|HBBqP-WQi9^ z+8u5&R~-`6MGT?0UWJpB#e>2AcpRBu+c!*adkun;Mx6^%bb(2~l`!!Dw1D6eGEE3g z%|S<4WDo#{B>428EZ^MC+vm%a6`Fd_sV}S_xBszis71pm;DD}6>nkg`@E7rDEM1@! zR&ge6R`~Q>G2(PoCi>ZA@Jl}cKCOIdB|X(qk#p9lkAp6Ft-lVeWmO9m!D*K`=Sq=N zBGms3Kz%9ODucZ&2Jy-36X>#6t{kNAYy%mvJpIrQ#)lb+`tn@BAay7MI&EI7Xsqx` zPh~|Pi-!iz+*$|uT1Ef42jqcXass4YU+Np^N$@P zZPJ!0&Y@mqPYnlD-^dx;V>ljP=wMnJE{PS>;b|8?sE8)eSH~)wdlwTS4EI_Le_kD? z+tyZ~LY)413`ULF%=t_@l_#QEZrWw{yImy${pXs>L?4Tcj&dMfd;2{HhiLvNUQ?Fi zP~o@%T%L}pydEkfS8J`ZcqBoH(1)u)1dEK0QrFi5r&rU#)mVh#cmzZ+%ZXRc1N3gn z?eW=s|=kbyBg0XGuj#cg~M~ z)mfS7T}(wAX1`evEFY%jU9b=#XgdU*U}DpiD!<)C<>mf@-Dz``vLbx?PxQ0N=w$h^ zEol4Kb`8>;X1thr$CJDeL ztg4&_T3Z5o!f0*9fH}aU3U*si923d;!615U5Jr?mM#Mb?=z<#$w4z7(*EZDP^M@+y z*WjmWR})m^)b{M}ex+-DQ>??+_Pv(BHeZMzt7cq55m!fL#!Z^_XUmjT=i?cPuxr{8 zKnKr;&t{VmA^goYy8E08px^V4;}VZdU;Q$NW+v!S3i#?Nz0gmfwP#eudlysD{vRiY z(Sxsd_tS+lD$R}0zT?cwX=CRd&x0sxHGiWxNNfyd!3}U@Nca}?gUc#J+IHkPvbjf%mej#YtIrvUyYKn5TN6rhV z0|_a(tJLZk7C+Iun2flaUz)h*vCWl6AK%ylQzJe;4N^39U0oP0sjZ~h7tBb?T%JZs zp}WRmYFK0_t_hXnUYfhI?chYE5y-h|Gkh-Zcy?i}v%}0eHkhGYJI7Y)b zJ*~O6rSWN>4ucf_@$|v~!L=0h@vOdBJ}uV5p^l{emCb!DD%$Nna~!>R=e6zhp!4u3 z2faj8+t7awRL0hl$5S9nSf9#xDnv~2tO>0`=u=NgY+@8%SD6?%g-qYE4(5?Vpf}f7 zHm$s}saM@o>HbyM>W)j=zT5I)v$*L>ykh<9_K1$-s+LUcH;nxyBK3Jkxa3sJV{p=Q zHLzmYWOVd|WP-j~v#`&OXkjw>$8l}T#*$EpQeuLqQ)L2BbjM#3A(<5Kv&Cd|RPv2+ z+Vt2raD^8fWAY!e%G$Nu<5z+l{%Q&qt`m@!gQQg?_h(&cFV~eoQ6qfqDP;Q2C$HVk zxsXSmFSi;p)AEFY3g{(i%2Lc~gTa~NjNNXARm(e$E8Q}Y!_xvQ1hPWXl!5XJh@vlq z9#z1su&8Lmr%4T40+iy(+u8KhrM$*7_wS+9yqis7YOAkMdYhndGA@>na& zhQYKCnSG{u{#Ffk2_yRr)smca^+yiPc9ud!G9;kCVF6MFye|5|N4qPICg6eI)VWOHyy zO@f00qAtK_4H>s}Q8>(ZDK6T5=4VhbexXyR-&2@>Nn@w;q#WGJOjH559k6LQ5JOIP zWqf#PE;_RR<;G}jn3;b{<5E5Fe1>ttNE%SU4_^4-HY1RFvI0@ROEICe^8HZB3BRS$ z>WeEqtH4139xyOIL-rs}w8R;v;N?i53oovWuUv|Y-k2O*)tI>6ODa&c9^55h+Qt=w zz>ftG2!Nl0hY6i`34G7eTnGqWUhl^YXXPX=+Mbd}sb@PDHZ@n0&fAGX zNT}6$WOj$dhkPm6KrAxUe~0ow54OMs_f)FVsPB6sU0FZ2hnj8gJg0F&OeLK9j35y* zb0tbsG7Q-(m5Jqxi0I^BYp@f4cDM~aADq7_-wDATC!B4Ao02&ov{{LDQcb1v=B&sJ zs1WG;eh{>Xigw?IMiBQ;@d5PHaIPIK56pM#sVO-8$sj&iXK@8;=41_n(@;byL?Tzf zDm0iBe01G*_)ZoX9roPJ~bg7(uPt#=I$3p%E%Gzu4gtcJ5$G|K@o%oi4Y4!(*Pj7=re(V#kjycL+n$Muz=eikPPCXCiC zsM9d7pqy=lBTzWow9q4`&>V~r0k3~XV)x7hBx3ZQ7QT!{MjM{fPoNL(9%w}d-Tc6( z^_BU0%1<=)ayy8gLYudx*8L>siLO@sj=39hC=9cGFfq(SD{h5?Eg5-KWt$EK48{=h z=AqwDmf?B3n1zmuI0IH~0O}=aExuS%~GZX2OLxT1n>9J4*}>CCfeT1MF{gvcVG967Tl8SrDF6MZZ)lH3EO z_}<^RcbI-Bg`CMcz4fs|Kc21(^s!jz(8aJiIJx@#9Oo)k_wA+PUUFDRXhsZ1*0WuJ7kBAstuQpyjK^s`+cDO=a6Dbngy@@yrGAYhMJ z#3pn`7`~51MaOQ^!Krg~t^=(b-M0dLGd#a;k47r%#mhPGH+3|PHZ_gHOS#g03@}BX zXsdDF2Qr+L12CA(BhMO+k!DI2<*D-m(xXU<>X+#0ymLh)$^D`Qlid((E(vF$>T*M#T9%0Wd8u>&6w{Q;SQMb2?*@S^GCHQd9A3uTM_bXESI_Ta{hrF{ zqbnCAS=0J>gom?V3-Cs;=3)o02SF?T~f!B>LYhTv%)}ST!@7k!)&y>4c_X=?G?5EDY96*)J=lc?M$~5S$&;Av~K< z|7|f99V=_L(8f|_JLllON@f)}A0h3<2tkUth$@Z<22=}hn4=r^;Y)c*E=~yoCF5nV z*KcT^S2DoM41pd1Tw}+6WCetH1Y!{GQby%lK+w`$dRO^-`|HYBCo+B&R0JF)0d8(C zD2R~R0Qe2^I1c9EA@9M;Ds=r+p9n4S;fbRhCUNG}YClDKvF-wCP(4y=Qmd-TCL1?{VI1LK`H-wauM0 zedMN1+ghNK!tB4wuyPXtmyndEtO1=ouJ%d;$X|h_$s!}-m2L1q@`~C}{|~PkreCeV z(E=I^uExq72kyAfV5aoS)TFPFmk7XMdlOuYj%z_LW3kYo|J*oEf8*K(731maV7FX0 zy9#y-llrRhYSL2POiE}f215>c2J8EfXkV)g_MgH!)bl@D`X{xD3Ji{d*|iHh7tkAI zc_KVXh$yoO6j{lW;6!-*KF}{%9I(X?_fOF6_u~VOH;ZfJGOs;(#-`N?f|Kb;Iq8T; zC=_@AE{?@ibcp*toFX5Mx6-Hm@3reW=)?~y>uKUD$1gx{Fwf$exy*T9a4M8~BBv3! zgDF$NWn_lur5j*)SS+|eS|-r@kAvl6{f!j|r(q?#1Z&tgcfZs%)NxVMC2e*6x92(nWzXo^)Oaozeq&KPADem(MOo!I&)#T^dZugvb!cVA%~x5 zatct1hT&RFg>12V#_6>9{nH!T_@_Uvtc7KC21sGl!ca-&mYYEDCB33Vz7RsxPe96I zDmv+04~F9JG`G>W{-mPk42VM>H`K;-Mq)-K#J(E>=z~Y$lxCCB$>Yv(TK8DR$Qdw& zBPPhV%!DU-)5dUw5a9D?5IylYtT8qZ9ph>z&{J3CTIud5DqA5FXcku&W!AkQtbme- zI-WwKl)wBZ&MS}+Na@T0bWnjd5r` zL;UB!%)6M1j^6iQQ0ny$L_1y4ybqhUZtbC;ubeReYu6?r`3W;O5sw)rWdu6;Jp4I} zj3loF#*t}LuAOc-ypPRAd%?Ik{X%67lvuzEX($gC2uO_kjT%QOQz%ERadh7c@cE0W z=)|KpfVz0&g&p+r|E^pJS#PuF!rBn87J|Kw2s!;zM5++=O`C$+6qP`s7r|b43Yq@K zi{NFzR%W}v?T8=qUS<59&z;=MzL{wgGD~!E~)bYx8G?8 zKb`)E@S!X+I`;O{Vr4n~3*-C!jp2IXAs8-^DHflh09{2E);gjB8-?0` z1dEqNMkn6>5Ek#RuWP6Ok6#}yY@NLB;mX*-mnu^uB!o#r$T-}hV3mOoxN;by2lCP7 zzpSi2UGzow`jRct$?sa`HJtHy0gNPwg^mv`$wi#OHyR-d zNdI!Bepi)V1Bwh}#6TD<#2rFdGzK2@ zLqt8g^f#5wU&cE*b7{k@vvE)AaL2rwgTp_uX$Dd*pgRUo-f%#m1vy@=Y#v&Y2j}CZ z^CQweKOzPIw#5;-5LpYRCR~CVvJfDM8mW)Nh%CuPC(5hlM`ZOJ7@8m^6EYq^83lYd z2uXqT2?#ufy=d-MPH1pSh^{_|5bvCZRte4uY)!SdK<+4#{roWQl2313}gQR z{$UJDgou=-xMw+{0#Kcp@S>w+MD>n&Y#7oB#cs#m^K+iWZcD_GM7bK zzFmxV{Q*BHSY(9JHR$7iU>;o;z|SvOErt_;Qu5>xvdk4Zl&V}b;X%Sbf$@b+rBi@_%{4Kn+&&A$0mf|!?fwo_)yM; zWZ?uEBuJ4lC5ua`2)geb_#K;!ju7u`rn}y)=r{uzi8;rk!m?>$G?H+I6BG)*2LsL` zqoYTz+e{yQud)r?Zm3scaOt$X(o^mJW!IVx zZ*yCdxa~fyUV(j2J*xoqC|F-b0-j532~2}i%@`1Sz<=@qs7H&4uxY?E@qzomDth*V zih(mg$Z{q#$@Q5?y+5w=%c4m9A@qnvK5&RTe(>~ttLX24h?k6Ib{mWYQ*hgrOvUp& zE+is)c>IFaEJT_&Kmd!3I4@oVBQaN7LqGlo+yL1R=5y%zVlsN_ z_WL&@^QK%I{q*N>b9vwf zP|cTD)tmvTOX=1TdUwX{j+HHb2+#HRRwsr}A)gKw*J;!r8XKh_O^r=(wu-pq`KgkX zj1}$Lu*9CpPlY0(sk5fbQ~Z27?Z?^^pc*s|Cu4$7nMtcASK=vzL7gv*mVFF*4~qb~!`qP3whBcea9oE)QORWK|Kr)eN3QgOlAZ}UthUGXq_<}V;+dNGwjn0o5H z=~jBajefjy*F zSc-z+fiw&}n~IKfd~?ggFH}8P{ltN9jQW{X2B0WTgqx5NjyTsA5u&GtszYdOWpzbA zn?-M3S(W3tyJo0*R{vx&5)n{p0F|AFc~6Hmwi6y9O4^DP(4`{C%uCN~3!&01ena zRvm_KO^m^}dU>*Bl;@Tv&Dn_BtM;IK#;Tk9SX9Kh_0|cxWi9S_-eBZHVJ1z{ZZh%R za(J!!*TJN)$zW4dZK02@gZ+zdMjVFC+>B!IFy%<2(~U4~>5FeidZ5#W0vZ39ahA6}Y^ z(Po_g^6Yl5?VH!OG5!FgeM2TOBy8bKICwyyL(ktZh=N8+zx5 z3DSBYs}u)HL*^iS3MBtP+7!HN)Mr-5hnD1`laE*z6z;QOl)#Z3!x@MWA`MDAM(fsq zlU`9k=bc*}85eQ6UxYwfx-F>O*WkV#uXLc^b78y;kl6+C=~(5)s0)z3ECDQ4O%cn4 zhrm)?H1Lsck&C{rcgwK>;bw4Q3^lK6l6PE;&mer`or!(Emn4y>+a15m+c>+FW^-rc(>yKPG;W_ez-&kG9QYN4mB0liqVJXg9tVm9r5lxgEn1& z4-5V*j@x7uo5{G@tfgke{1jBW)2V_K`Whd8&L+d5-#Jcy%*TgXq2S|%$fDerQ0p`y zF?jXi(}z%4SRLqN@vu{WGlJ;OR{Dp+>IJanMYA|so3VrFO0tT z6&OPn8D+=sAE%oytXen&+{tNgi6_%5c~fqp9Lkd@uoZs6BBP^^Uk;}usRdPNYZa?P z!dV=N%{&%Jo(JkNNi>vBVb>>=<^;N>A7rq|D66?*oPMXjYUT`Bbh%QNG>N2zh&9I( zaec_JqB`EsCZl7ML*w*4D?m+X+-B$FwY0zc)u!{i)^`Nk9%%Wfc{yH7r=bhYRWL`z zNEe^VWce10C7kmG6L@nEqLjHh*vI0b-6sp6e-n{b^q^(m2>p^7uLIvK4kf*OwP{=< zlklw&&K;6CEz>-u$j<1&0J~)KmR9Hp?7gq=S z**s>2FW&(Z4l6vcu)=Pc86gFz80*m=v~YLl(oJI`m_+JLu1_8DG(s856_f4Y0-O}8lODtDsrb{ zSOCQRE~26nXTlDi4a0p6kE(x#U@EngQ=gym%K`zHDjBJ76zAeQzs$ zAc|LCPL?fZc`|*^G`WR_ncPjZC5Tiu9#C!1TiC z5213ZI?%hAg&-dQ)>R7D)w(_8YyvvM#Auq-3PM52d?B7Zm^E9>5p=E<9xSJj>7bQ) zuzb%}T@P~?Us%|FsF0~4#rbI3ku_utGGr0Lr~K7cUD3ygOALSh-XSw7Yo6D)iK8YfeME4&3Sf|Kt&MB15j)GXm+x z2EekwXz~E@2s!N-El5*FnOt>ZXh|l0=o;O;7PD$zi@_i^0F(ouG!PyL@KzX92{O^5 zSk7v6`AoG3^2U~Ea&U7GXfl`VPH+$)K@W_42|5-!c@3z0>0-5ac zuT?@WHu%KB6bW&17&f9@7qXG}#k8ZPo6@_Fzt8xz+tKJ1)nyQ1i0j`#;ys39!L_Y0 z$^(?xsc-HH;kg2e$N$0vFWDS%_J0Z<+`5Om_bO1Zz=#bK4DNb>(}4+wyfHw40dRii z#E@Q9T>-xPrJA6VKm2;#0-WQl?BsaiN^I+F;rHz2c)JgG9&Mkc;cUZ|-p#W(l9YMi zaRrL756}yQIWFPJJMB?q*bSSUO-2J~qFGf2n@N+g9NydMnra!B|O*=}>78VXSUqNpZo2)P z)nQbwfqKX0cn_?AG`t!dvTNZnmjekGtiAv&BMON%5!VUGu-Ran<|=%sD**q`rqbI3 za9P5O^QK^RT_f-2%%;|3y`!Bs_DI|B>kc=6#yJzOj}@>!jB_~ZkBL|Fd%6B1Pj6Fc zbumF;k_(xOIXHh`ysbLW&*p(1f-a=b`Wn9aEOR*GkGVkYskkFXdbCPaFsUo4Lnxht zO?%b>cyOM=I&u5St@QN=;PM0OI}Q)uS+|?IJZ65Lit?lR$zr)6O8W7h1=V6P86DaE z-w+%2{p&{Q@U`&4Ydv!i<<|gu=1)e{St@O_ihVNwRL~|s1FyiTS=^@PZm*r3g+TgwG|D9pa`dg+Va8a8H`@NI@^+#M3p zmR6IbY56@p{mozNE_JSJzrIO=v2D%fv&Ige4v@6xz#I+9B3!Q3{4c%z&qQ|W#;zr@4_*?bQ5&)!@p_Kx%X7%Uvd*)e^2$UFIzK)!%MB1lfN08 z2R}aR-YP&rYjG7z2I+`tM**bfNzHs@)@i z7l`q$0qO^kBXNO33?>YD+;w$CeqVKP8a5bAu4p z|B#He$Q$eb)%#)Ru~_x>|H$P(ypDr@^n|4nNp`O3Y=Hu; zzv_6b<2xOdj$Fr%4n@Z~9YgJ(xBqYZi|voJ-_d?ud#c^lzO8*rdw<)fZ715EYdg~R zwYJ@D(KZVpnx5Xato7r*V||bI-PLzf-&EgZpS15xD8l;p-Zy)n@BLx#?Y&p`#(J&2 z7xZrI-PyDJiTWhvt2*vx~*$hSES3_CF>So!@Ic(fVBL4_j|Hv|imBYqhps(7LI$ zr{ym#uebbX%L6T_WoJvc#oQup+0fF}{9*I)=ASj++k8v&<;?+(rdi+2Z(iHn#(9_X z3g@Ss!<>DbBIpxMP0ay#dUp)BHZ?(1C~@Wk;GT8uGiUhP-e*#<&k)&3!1P` zB@o#kYtZ!)E|2hg)A6KKSDcA&{7Qqa)3`|6j7YsR9tfJ1q_-vAV91?XiikVODB+I* ztiNCxLnre%#4Ku@a`V&SkSl&VQ`gx+W+#o5348wJUZv9{8lISmh383#7RyqQVTFC|kt5h(|3^0mK9~ z15erpy`(IWP$^lbw@^C2QsDS?gFfRj61J!`<)zG4SvjhBw?PlsO++e?3GI|B1m3tV zOs!=)N@!wMLZc{K3_P<|URZgOY0sUpmq?f2>M>8tv*LvB+&dfeDZiM@_c2y`wN&yb68 z-6Ec-PPdoy?lhT|nZ0GcE;OAFu3cZ3V~5P3u&v)$Vrq=@mfuTZr-Vu@zSyEG%3+)lzu-EX~;KfR7$c`l<@>w zpDV0jiptvo*iT5>Q?`jjNDzn76;D!Pi4S*ug& zLI!If;O8>S#9k7>1UhAgoMxvv>Qh9-E~Xqj403LokSmquyxbvxfS#>>ra#3j)VP=| zdsAMuUZMySja9DI2nD1sF5pha!=@<%)$&&Te;rzt)7N&UR zDUGa93aRyW@zBp3NMm5lS!vK=T;Mfklw^J zSH&VCBI={UJQaUN9}!E}Ht3NImvDOxUa6zNx95ENBMo{uuBO~mMt5K*06G_f#JY72 zhGaSb>3QjlMV4>~M1kS68g#B9%LD6U*`9>#Qx|{L3Wlzn&bcXXfs$H{%mn^y$AJS`($<_yLtvBWDag^lt;Hh#`s4Z1QL zry?emT#|5xD1P|D+ZnpFV9FDag_R9W=>k;FcV?nNPuOROf*~)M&dwMuIlknzk)16> zv&rmTzRCZD}?+1 z!q6r8$r)b6l8L8n;c1c^AnyCyP|G>+zmn8WE`ZUi_3;ol z@AY-}F~cK?$Vz3IJx^ur))}SW(3o^daEjuIi}5_y?F>4Ler@AUllbB)DnFAJ=qE#Z zpPoE#{$FiGoF~`V2z$~KF?a$-86#d?aL0lkA}J0C4LfZ~!7#=2QXCb@DKg{@@?COO zSVRrI*r12SO44Bos{H1#n_ChMiW_v7*hukh1-~Pa$!mSy?$;W0vg{;;P>QH5u#gh3 zX!&-AE-EM{2`$%Z4r*g&J>^%x<+T$Jzer`0QBtwDAQI-Ynow-*s>ToaU}bYssc0n3 z4Hdaw*RPom5ax6;u2;)b=Vnq-aeSh2n+h|44(hl0)tUgARm&(%s?pp-CDqdoHz4y$ zVp{)(XBg>1XCT4bX}6eWib5|WxChSI+hCY&YSQl{Vw2NBLpCIo?Q6)91yg=$k(4@S zjFWL{*+-4$e4C6+W@HdlDO1X&qK+Gw=7Ok@@0Lg{rb1#Wqm7<<9@AXl5Jjkv!xYkn zcqze7fv@Sd2E(XI@`OpXCg!qArlq8UZqRipJ}FAfICN!^D5|0^+%iwsD~P->YRnWA zo|y>I^l*bNFBf?wf66cNr3x`oU`6A51w3Vm@FYqGQzlJ$^Z`v4+V6znhka-v#TJh) z4NpLkB(ULeMi5^vOOg_c+~zJ=h@d~zJkg*_bQGcUmVIG+UKjF3)QwYyFUZ&kv1n2! z;<+uPBH?OjwC4qsgvUmi)rGQJK@q&hNbsV?#7>@P(k)Zv3U+Rie@2}70WZqs@#5ej zSBQDKpn#N})1Vu&e#)ZZ>Sw}`xldBPTN`wFKtmRt>5Rvi&u84C?N1K35FD9E-<0wJ?7z>T}PGM_i#mN11QLl{5j zqVAhJA8voMZ8=mz3t@AM5nkuUIh<_9*wggWWretGNGo&_3EyE7A=Sh1I%iSQ?mM=O zqn(Pqqx9nsgGFu>=i)J@7KI6-D+!H3XNiyoUR)SPxreHomoK8C2e0VZjP|{?dzAju zLtv{}Ynkg>5TFq|gGS02QCY>49)|{kgVxa4pv59XNbc3!=)E-j`kQN%-#J3R`#3gfS?6#*ZN6^m5xZwRDJmUT$thh- z5!6SK=1CX>78&jT@Ny=%{W6I3pr3dWTPFAD=h|T?8HewT#GeHa*{N(&AD}2b4;_BA zIgLfooUhCbhfXKYYY3T3=8mTgT00-GCT@jqVUZ#3H(n1y9Hr@7VK^EF zx-=MYyDL4hPP+XMZG$ZmPMY5E!Fo6DB~CD7dYQH)6afM-dmy3Kme<%xY!@0t(Wk+) z$>JgJ?;aVaAAGuc5dg}};oLH&lW9jGZ4f%GagENC50#V{Ucz2Ve`=b zyZ3FQdwvM^-L>wyUXamIH`)m)bD1RVZeLPr*X6Zxz#_vYG1rS=5@YjFy?A!W0ZULs8?3Sn-^EuJFKdq0Ln#3Cc__~R3F`e#3#NAE~JT4ho-Iyw2K z&L`Xd+^g>1+mmP;22i*>y@7k+5(to(8-;;qR#GhNR`aYP?l?Hw z7PBCA;>Y7ORARgs&)k}YnWJWma&yvbOQrdKg8~rYKmc@eF%^I}Aa~-8WA}~FdtPCt z4(EU|Q#b9>^3`O}BG&_ko6J4MV+>ZNU&D~Id1(KgvMuPT7k3WPKln8)NH~UYE-164 z6>cJCrtAX6j7n$Dxf3Y!LUkoNcoe()7qc*E6h`j&%NqKVqxc9g%;7{(<_J-mb^I8w zY>Zfoa*-sNZ)}b8p8+{69xf>fVFR464bumo!PaZf+{l9I*$OBw8KOj}AmY!!6{JJx zSZ8ezP5lbwuy|lY{~uVA!quzkU;YYWKwvqoT3Ak5rQI||h`dI<(L%|RGdxDl*XKYE zi-$Hm^F#xQ^Ph87Ex3c{hGC|dP?Y#&S{*Hvq{-0q{u=Vhn3zf}6 zWxp*?DFfNOF)Fc#(%>mSRvlW;Cq(2IqLpNyP>rut265dJ+Fgd3#* zAOjW`@&E&+3ve*);bL7R+Wc0ve|YI8;Dmqv-zq28wc+p?^A=$M>4%aA0LrWaV0$?f zGXR`;fV4)E7vVg8?0>5(>s9zpX#h!W(_jz&!>dzpmHWW8J{Ha(GOSuVlq0}c>!Gg zpY2;i=RakR!}TD7ISxrX*E+)!`PF%MJ{FKAqV*#gKzO;}Liz&Y1FIc_gZF{uT)@(b zR)*oDRJQE~_X%c}#kU8uB_9|SFEFL;^^bLq-DEx8_?RpJ+ zUMJ_q7OqIv9%QyEWVT zxgp>FJ9LG`LxkSU7uIa=+_e_X_!j8?J=9ss3A!}POhy)&d*`0PhstU$9N(A$mbBGwjzij zRxj$l9?BZOQP<>ypvj9slQ+$s1>eQoKu$wIAmDM$X-9O@Aexak_FAH)HrU7Fq5b1! z2=jibvX(y9QiG^L%N(4BjWv)KiGuG)< zZh#7e-2g?cdus#zY#!Qul^ibQtM;y>pXja0aGb&1X6Oa89XwK%RZ5wRGOgWI6a{9) zjHJPi+CU$R2T`maPM}@SKqksmM-9?RcoM5dM7f3Ltik8qBPW;9Of~ z-&o;I7a+LY%L zj;6M=dzCF0ap;qW2d3(eK%DlDjo@fnf_1f1opTv2qBAnjX4VGNBCw%{E^x~ z?_w5{gmhWgZENUTM{4zxjk_?FVBL%pBp(t*ZEl&ENXM8_cxnI^6pIJIF`RlH$|${I z1)j>uX`dv+Qwgm)ZLTQLXwksk@M*UU)>ihhSm@9PrbZsrhl8*d`{mMvDbG_%%W4VN z?9pbKpZbR2rz{p|Eh}&`)EfFfhHCJ-G|l0>Rc36Xd|pUT0P?YoA{BN!yt*!fD&L8USW%08)GQ!VINTDnZ0KDJ~KenV-oE86mfEV1^d6(4ntbVJ-jV z>uc$Ma%vFTCYU3jFN|WZpVT_6R3NQ387Zrr3gdOX5*60LII>vi(C=F7FGNV+&e!Il zsD8h`cKQla)AH~3^mVW9oM`8^Zf!C(e;0vWLAVyY>M-#)oVEVE%|noT#|5QY8<;YS z^v*QpM-n4!<6Wo0#4lz+J#h298s$8_wqpdm#!wLs0?{K;KmdUX8@R3z;7Ngikxe|2 z;0sXAP%>3B$ZT=-*|mY8C0n2)+Yb&iy4R1-u6(}Kg=fKW6<+|K`!&&nI2@juFv#j7Zwf~^?cuOaT-^=aMcZWK6W9!#i zxFk$-!iCN0a$060JcGn1F_n}&GvG_sPrm(MfgQo(p$*sG3!y&Zzpp_bex>#qbL#bP zt(^v@4Z*@b1xzo##+q`Q)X8Z>MC@baUA7hEu~_KHulAh*0cOMKXIpFkWW=4=R$C8X zCv$x0Afu5PN;Yza3g=v0i8&ecr5ZUJfhgIr4l;~hTLaf3i-mS?eehp_=_`?7wDvjEPv;m2_0C-YpAGmY zn>8|v(LWurIr26yACUZn5%d|aHqpnTq9c=cYUwNZH76t*B!gNd74ziNQmfqs>KOW+ zpa!-s78yX)&x1nkslVew?Kp&Puc)?m?6NsA^Un|)AIO;_0q=}0qNH37F+YT!6Tv^T zsOV&*T~F)8H7F6UlI1liN|4tj345vFA_L46{p@@gQ5FxX^S%js(nGhbrZ-*ydQ!to z*5AbG?_Je?xaWfAce=f;KkvL2AAo;DV?+&LO{5Bal*&0(Dsx1hSCwP+O}duP|Kd}U z)d(H?ub;ro#ax@&F%DeRJG-tG0z<2x#Dm%5G0970yd{c7ZExnVh12W_bXteSX6XWyKyUh zjRLMt`0>_-A1^+%=g;$~Wa;x9o%UvWHT|3fZqYIKoD6@UX7VRv z8g#S@R*BObwKjC8w$|5w3V;8Y;X?W|Z4IIropTZIt7?hF{PKjeLb#gnocW zq^yU|Easr2m1_v5O2%lu9;@3Cu-96#Se;M#qkSUxQv6yQZDKjjAc<1KKWZTK=7$ zo~8@CbDg8@dzuflzJr&|IJRs+5_#j^WY1`QwkJ-RX!_80BNM0XLtnSoO!)FWf8p|F z&1rq6hfu-{Tb#wBPd48L0c}!i&5Yi**Orges~TzncMGSa0WcJ?>BFTH>oWtO%~);uF} zC_@G)qfo8B3@K<3dj{dyDi6i<^8U%%!0^&7Ag_`8|0}Z8P)d3(uJsN>v^7-tGL+#j zl28^`4)w$A9ulwCK_t7lwsPfC4ImCJOQ7w)TfG`ReDRlFt-U*H-(Gqn45L?f)cTj& z4FV>*?V(F+)B;^dLrEqbbib!bgXJ4@zr`MyeTHJn{dU=`JyJ92*$#It$7u! z2bBz_YB38ijL(Hbbbo4;{;muTp0&O?9c*0YehTOvZVM3$dEMNsF;<9qQC9)38#Wnd zQ0eK{FMeqPuABd>wW5cMwKMu7LFvpCRhsnh`FXx5pJKj*Qvx;Q6c%7RZlnFBnhP$P zU_uljP3mc}$YYL>(lE0~-Y7%Y7xU0*h2DueQYE$+e1$VAn8PX8ptHl7Betg$ac4rq z1#E((FpiGy0G0i=D?ssI%z;O&t!_DmTslw`&C`_LM%iqXCpRe-;8C0CW0BGR=^?1Q z@p=1d`r)f;*a;wqYDT|5Hm zr%-k%0x_Zxg9?=l0fYxsa2}G}T^pLR*Q#PF6j&H9GmDXa0ZI*v59<6@p_k z7UyFOJyX44wFlH`1r$^UsG9m>{YeOpg{51d6KjeZK;`_>&3bhhHY;o1nCTosx(GI9 zES_p+PWQbtA*HuJd$WUsw!~_E|0;Sz?|3=UcVzu6tOEtN5 z_pW~{i)a4eO2EMdr?(tlY-Okx57iHGA#p%REa3ZN^U9@o=)}DN0`-T{8uUowOAqkg zWbNChY6o@g;pJp)_}J)p6Uw zD13C3-u5*xWv$iC>7h4(AOpRLJ8~uk1kn0}shD1BiiGiGj-Z3nwZ1+U4-wQ`koLF{ zEOPHnLvKKl1sD&U$^ddy5H2X@X@owR-XE|#Q(`o=9}W~28SQ_%P%nnJhW^8TtUtQu zOmG=6`lG2-R0zv%mlnbWTp76!UA7ApKldFlE-V&0`c8Zs{m31l!j0|W&lzA$z!L?% zAd)7flHlj4X&=EW=n)}<8M-VF6TO&&j_!`u2exhi0W^YLHPZmAukZ=bfu%p8ah~a} zuI(6ximHHL0BKv0ClG*w&j2_Nr907)Yrwwno2zSmD^6{IE<2O6ig~f$culQ;6|QRw z1$6-gRRfi@aWQs`KmhRVAY{|<(p(JRKK{_YT9SjVyskDl4As}6PO=9|of~mw*ch(4 zo=DYD3eZ?cBJJ~Kl|e*>IQEEeLNYoC9qZ@#JK zft0ocR4aqh)%7CKFg8$=8UQXRW^y06sn$2VbQ6?KyjS}YjqhastMjK)1*^4yQ4h6t z;S7Ybyr9xT4h$}khOdMXq^iJQEZqW>inInjT=~+E@2$eepP~iSRh^fsa4@l1wD-QR z;e%;!%{EYK>Y47oqx1P*P5WQlHno^J_Ym23c(&i!;zNZ)@Rk&cB|#ox@Q7S8u3vA= zz&QX{7`pcmj4F$VBrXUnXhb=zrhD$fyU#p_Q{$O4#VXd#xG8(m5fu51L|hq0`|pFL z%OZmY2{?hf4&1Vi?z$hWhj2!E0F#LkQPyw;N`m4Ux%!|pIaTk>dI5lPQC}>=y0{hE zAbhVLIkbl6ejnaKqZq7(5vP&L{ZnLsCyjEsuCyOQ72xZ}``Ki0GPImY-+6Z}z!`9Y zDKS9I2-4YTo|_6r>Uzx}+HwyZuq+;ck@RkcxBJ~|=$r4sN1A2M0e=nFc{l{*GrnmD zH8Uv*N6P_47Lo|-2ese;sB~-|z=-dX(6=AJGOTkLiUlk)AOouTLIxulhlo(OsTfuZ z85z630W#P;9K5uh{@pk50Zq-h;4lL0Qjjs}vrPx|Jc~r76$&h6(C_hmQG5VChs8oi zKf4Ih@g9I7T#>-;AW!#ooj+9_Hm{Mf$ zTYDw?-H$;wi-it7Xa*F3+3IRq{uA6q-5jn*2F2~5i^&L?_J{K392~l0vjw0rY1%n!GT`$hqn9+KN6F4;|f= zguA-yrcwIOk281mr67m78|6G{C`Kd+n;}e0+o#}(Tkp>R4dcV&p(BST>X8;Bbee|# zfTIV4g)sf$8f?-$0cjg?NhlbPrkG)-9|bWi7CN?H1eW>hZ(L2UdJK2RGKaxJm=zgU zdO}6Qm4-YKxFNhwis{bIZ-X2b4@nRNZ{fmk2OsT?+YBA+lr= zgiUq|07OVe)Mtl56pMxSpL`Q4ZlU{E(U*P?92X6rQJ|^!?4C*RH{!^_o)#g89yl#* zsGCl4iaPTzkcA@VLEOJBDk%t+COK4ndJiV_k>}xWSUi-y8=NvPRbC&ZSN$9o*eHg! zV7^-yE$SjXv&fcr`aL-dL#}iBed)}e8ySl8uij( ztxA;Q7>~3oWLAE@$kj;Wj4<&tAdJOBM6x_VgUjzS&Kg`Tjrpc{amsEb3s45I#8vw9 zaJ*nOaL0@AW?`|=A?m<5`Yi^Uf9gf-@`0erFvwvRmruk^TB(FMF)j1*AVY+a6L}is zuvmq#aMfD{?Ul9l8}N0N1_mPd*8Y6#G;$ z-UiblpCkw+^(abSE{G$VSSrjct=o^l=40{DiP$-y3NFM1{No5nYZy=g8TzaqXZNno z``TY^Yir?hF2M&F6pe#H#09~aK~&gMh7vDs^%SCdze6#@sA>m~!633&0LAla!*lnS zWBAi8bGQl{v%->TSu#!Kxb}iBWrhmu=x7oT;v9%!vCy&X&tQYvz>W9kxfpY( zOxVg+o)m)n9Vv=104^}I){kQc=^_@Yg9E=bXKBNDnyctFv-sXH&t(?I&>al;N@Sss z4@M0_a};2w>#{ERH7rsVuMR$4cPoDV*Lba)=P=j>(<6gb-~{8fj5{gQdy{gw!s=oo zzk=(B%|o2hFE6D3>sRb_8d40qs(GK+}cO5!d~0gN&^J* zBt8Zc3u0`3i8f8igz~W8S_~1O@zi^?{8_B$e#PWk2L;)9C40PJ6VDhLd*+hYp z)ZDliP%*o1TTMUtI&^6i!m4wib~5LHA)NFkW9pKy0B<%u)1#hOYAcs7VxSG1&uIWq zCSSp4fN-t^lMTo)a53;Gvv8)Ab9z$2)RdEq;IRg)|6(cxSJk#)FdZnU_~5zcqtm?A zQIyf`r_qV`Ynuj}K4|J)-9vQin?C3aH^0z+Q|tG!{r=T;d)#xlf*!yIz(3{fW^0Iu zB^5%h+@EttqRcCA?4w$5AB%@ho*V`fzyqKn6+XfSLw8tUagmOg(V{3(8ChI_e)};P zDcNLn^mqQPwCyjj8rNR*KLDK2cwg%RL4}{-idAVpp-n&<2YTYK@N+g9WxaQ7r^!!1 zDO>CLAHYn&k;Bk)u~U)M5CGb$@J#Q3 zX5#eEnE29!RV|6i5+xa+g&^B!Fvct@6e0$H-mgCcM_j)ff_zibK$IJCdnIX~5Q#pA zAF!wxLqkvh&I zwpG9@_7WDMR8oM?)4?hzzXRjLCZm%FKR3|-dp**n&U<3k=UJPId<$iQ1wihs%n)eQ_T&e}SRB;1^`q5X{AVbUEFY{*H z-Lm)F1FR{TpRQEv-u@-0tKr1ZwD0v`SQ@AaZh#DW2c(8Z0B#4W7nUJNwLas&Xy4mE zymXU)CrGvN>^`@1FN9VkJz!jgRDG8NinAF2bTJO4*A*19cJ2k_zNNS{=b;DoanM-z z-T^RMg0Ukef$Dw$cmUz8CKb3rAlv{cy7%ImbxU#4A?GLnC2n1Q;X)jRVLpz63C8sR zcn*Xt*o_dC3I$=nLX0lx0eMSv>HQH50FI+P(DL5B0G2~Sxj}g%3bD2j`(P-+_Z0x+ zp@h!u1tCjw5%E8zMsUYY9Nd8c0`B1KXkPY9&J#@TeKXa2qD8!rfxoi*v+mzR2L8j{ z-|W7&JITq{bMUwH-Pk?Axx4G{%{tDXyMEX8^R6HD9csR{cX!t}yRKb+Z&#|z*|oK6 zqN}g-)81I;iO%ObkMvqQzt(wmXROoO{B)nB^Me0J*_+45Rh9qaon~$JG)@0=XuV3miN=Sc#_~}o!uRO?LV#mzK&ma ze5d1%mR-G1cU<3bN#FaBm*3L+?cQrULLH_KamNWA?d^XOe5(By?GLrzzA@OJ>-Y7& z-F|I*xjoo!YL~R{Xm4x#|x?+1bp^c`vYK%2Jr zLv3fa4Y&SZ>kGZ1)*o;DQtLg&*8gh#SZk)$)4FftSnH{+11)d0JlFF5jUQ^cvu|(9 z4K0`TKhY9vvGx^!bh?O$4;#reKCUnNO6dUbkCY~xV`E;Quo|8ypO39XmM!Q8l zJEvq~5|<`L0F&ts$HPZ^2W>!A@HaC!L!V?yo<4L2FiI#;-bofSYLQ{N_4Sl`QK8eB@5_VD{ zbmvjRIw*^bA?qKBa+ZWVDr0rCi{)UzXiw(cNlBx>C2DmQ#9oVrkxC|Wb_d&aFV`L} zOQIrYn2|f|z6Du1)yAbsTf$7X%-XFnR;nui9YVa3+eeExnDH~Swz6MtRSEsl_+~DX z&|;bJS{TWs#jHuANP=ro+{NWRTM)dOWu`UGG$R#Hu*t}focrO4$tbXd=9~$QLNuoe z%eo?5yUvbc?r8(L?%B_#W;czi#8536~rAC!|`XX+0dBE+##os?E zb(rU!`b0OE25*roG_&FfPbecbOU9+BrM`3oVf@ zvIoOc4w1$vEKGOb)#z_7&H5rtC?%RSNL^xGG`ew|YhTbMy(pBFV}n71Ke4bF@4lZS z%*S+-qN&1+uK*j${B&^Ozqs~XCLLiGl0JVapH9c+k&Rp?wmIc7Nm+vt;12Wblv$PR zd!Fl`(u)G3P*~@l(#t2M-caXWu02_@+fbz=k8*nQa?z3K`YCM(|0n$@YN!$U&E{e< zB$P?JIRRu&$lPKPlS*3=u2Nz`k}fXQ+Z;_PgW^EIAd<+ZofE}CD|f(Pi<(F7bGE3o zNu2H}i+qSnkT*w4maNI2btS^-c-fKYyS1^w=15#>Wu_M;s5TVPB^M-#Ja_IwxjCnI zKBJm81WO@{q~}xI^aB$}K#fWmrPX8$Ws~8}&F)@x#1+@MyqV&xJFbqlALP1E%!QD5@h`KV|=&E#XUTpA&XG{f?J5v&EzGk@PY=IiPkja!#q(x>;FUOBE5g++T}1PE{Z0~lDtu#)*|P+W0E7t;_)B@91>LFwT6tr zVApevc2gmVYzt-H3@eW!8W4vBmvHU#CB21NDEJiaK-}chhP%1+X47ocuVypqY{~$s zT1c@QEseJ|$3S+W+tQ9_$b$&wb|25ROL?C zLgsAR80+wH?K8FjAU=&bg%DM?5tG|}HP@c9r`*hJ+{B2jv6MJD-STVhcM~&uM|sjV zA7UrxRBE~45SNT@@@0f5Wf>05qV$3(?vnQjxN&@*yq^V(iXp(3{rQ>T0I&=oJ5643 zHX)vm3uU&FS)>HgE7#qlQF+;zuaGTR^}6Y(qVMxuyW5@=iAu&vRlun6$#v1qoG3Rr zOH-4J%&b3AvMcSWoH(?BJ6a}Z7Uh^k)3T`E>(VQ-(`_9M<}uk9g5?5e zH=PfO+>%T@F~>?(?jR>JCuhuwdGQ1aLWbo^t8rqwH_(_n+VyUx;3(=H#`y*0P!GJx zwIhW&$@u2Pndt?E(W*=IbGl$MZ8T)W^Rp$lI1|bTC2Zf1x3((e>{8*by;G>)UA&RI zPgzA)hnY#SxkPHhs!$oH`ySyY$v9+FqCh|-k(wE?(8_M*kT)!u;GAnJH4_SnOm?;u z*^+H^x8UPlEf!{qi&A4q?a`HGLtkkUMB)VN5b9M4eL<*FhT3*6Pn%j|O_FrnwST=x`UU)ZR^UQXNm<&bc?mxJZ8B<)UxNHbBG zOS&_-^oSN)xy47tDubM5j1q06;IYSolJ;A;@x}J(SSVKTO?gWRUy9lO%SN+#A>$}2 zLbIi;c)}-7vfH^WF-vV(HDeEHHKMR?T4Z9jf2T1WlQtg@i1hlDp=5ESbFt~|%}W8h z7@APC6Z%vso(-gPzT^mZpEAu$-8Rv5RHUEHPnCR@>5*99$=trkfUu-6<9H%RDwq!T zqNXm+kQEYvb(+fQiAhZ#L%&OJKxHpiM`cjKKxD_(z z@=>iwtnFZG}erqA6~LQuoh?WI~r| zdfpe>@f!C7u33?d3HYR8Phv`5@{6}|O4sZZnkSfGyfkl9TjI8GblXXd{*!aL)C41v zdPQZ4Hf&{6+ct4OEH*eS0NRO#v?3s4&c(JiCzO}R7DOz3xXGw+0zgabR)|CFq$M)5 zkTylKzKF~bk|rfvInFgFjgGX)$r$s~K1Mwu6m6Yp7_2v(w*g=Av7WxJg$?I*KHL7$ zW@s?EV4%`F5KzsdOtvv8E6PNENfv(Qvns>zyURqfWBspdyOARgZWh)b9H=}cIN_tN z+u*jQn3;%tea}ZFId`P;UMpe!NcAHt0mgeqD>fRdd*Mo~t{LTLk=Rl|nO~HQ0~(_< zDmFV)h%ds-$YYx;1KW<%1zw@cjO2o$%i0CEDj+Eu{6OXTVkD!WmQ@4ZxV;QrF76_ro6iT({XDYpuTc2?Rq1JnNG7DJD| z>zd9d1xZA*?4iy)@Xn39D!qg9tUQAn*$8j2=IluyKvC@1zykWiT@`p9*U(VG?QJAm z(D>am-dCYfz)NkbQNU}NyLkr4xkqUv+nVFi;Cr%P`@Vttr;pMoVAE1JY{pzHgCdeh zSw*QiVO*Cs&zqPKIe1b9Krd^XQBiNp?mBAEqqvZ72}n0h1Gy-enbwMn`b5$u%S(`J z%e_j=Y1joGjVM(!(nI$>)m@LAR&fgkRFkZGj@3oyigFGMP4u^rg5O2!Td(2}N7Tt}@y-PruX~yC4nXbW(Uw#Xo9X^G!BYAK=LRe`S7_guQGj z)9Bf#&eE_g8u-oAGbPV z2{UplIp+P+-U>j2*X;s7Z649#7j>UZcAQf=UY_2=bgL$$%xhW{|Plp z$oTmcAL63R<}|>AHNK)hkz_4pxFbAf&QJ20^DA41*6Dz7suTZzNT?#>?D{lapY8l% z`}MwA;h;L1*0`7qAgIZ}La(1jfJW1zcTk69&oZEY5!95#erwhi(V8)Wx zC_;3cVe&ysWw4(|L-7yOsiZ17u)Y4ErLqtHKl2jBD2g{6t#)%b1{lAH#ylU36v9(U z650*v$7{asz?;x1Ph2`u|M~6;;03b6aJIyX_3^C7wJ;mE#EAG5JjH7!2yy}IyRICm zKP!5>t0_3|J+-m|Zv;SwGkd&9$P>kZJ-lj9ZqP@J86aq`NFCPKYLoa}hR| z7mA2`sEpElV*oVx7^XcdGr93Gz9AWq7AV zCXyT@n$-Mm%yDCW!Tq7gdl0PeFt@UY=Pfh4icy<*wsC zi8~=C|8QgPc&#*C6Q$3uJF%Vo`RdwWJ>$V3MaaRP9Gcv?0Wm!ke>7}w} z3wd?|oXjJU+B<@+lu*SvsY3BjxIrzll03}L9B}fd4 zd9Q8eDnTMXZoK}zAch#-wJPCE2Ay8(HkjFPY9UaR${Uj+^+aW`cMXZ$>Hj?rA3}!i zO;)0UK^Gs5nS1b4DKG+$MxHNrHKNb}3zDkPP{}01%JjS@G?|dglBNK8 zD}oo`H52C6UL1sv%yp0x#;Sw$WEAIXhhquA|4o7K6lR$)V<;oh)H7G&g-0LI}p zL$FRY1D^)of5o=?YXQm#mL-a9!=2QSJ(E;0Zb>TZ^k*{;v6!6Z!olD-lOscK@2%hH zqSLT10n(=VI#!K|Es7RkP@i^*q6t(AyWEax@S16nuttpTNc{~vX3*rLMH)i>***tO&_lOlRU1v<}~vDODj9T{uCyLV}Dfl^QqWKL86j49AZ;6$qjmT0mq0(BZAW| zg1)@2Hd?P1=x*AUnqV=IlHS79oQ08>5`mcnD>flEpz(ol#Vp3*(E#g{;v&ZgBF9GR zFV9kuKBKp(bBs5t59MZ@*>X|A4RGOnW%B@^MwGt%sbv2zZbG2ZJXLY#B?=hB2}g-T z<_B22%wkh2V)L=Qj2oz)gSzF@$dOYnIhEXb_gA;px8?ClW4kd7r{PR9zNC#U%RKJc za3~ZJCCJHP>?f}oh??@<Wk;1nGn6zdJUm&W?$5|;VhTCFFil{?EmsWQ7^P0(#Cu)1h zpTF_3c5>n;uO1{H{L<}vN#A1St*RS#cN`3J{SzpGTn5nsC0#7Y4( zcrxY)L-ETC5V=||DDz!ymlK2mMZ_p4f*jh*wnss29|&m7CviA zR}yF3aHpv~3+h;t_n$0Rw)CwfktbgKDk9cTIyg$iAF8}V$9q5VUs4&vC!`4DrMdJW zi5Ow*@qkuu^_LYYLxh{5{bSf0W-SdO^dHAY+uilC3Tm7&!r)|x&HJU2DXARz@J)W- zbp;(@EsY4e?|=yF*oDG?w8Z4%6%|x0oXoRQ9~1GpbfK~%6h$Hj7JQhz@d=1g9*xW9 z*suTnSl#u>icv5ao>W9#3~&!D^HwGmb~S!{n0)t2Jj=vQ9&{&0Ga`0-5!=sU-?h~mN-gfUK2aCL0}EXRJ-cDc6w zOM!?+|4aq-r7kxuN$@egrmx!MwOE$$~Ydo}4`^3}__W;W%(P6wO*1v3G0+ zmjIdRJzM=iU!-;M@Qn{cgbH=pTp~-F4E_P@wez0J(D1q)$l#Om z^U2OHjrNi2?>Vjs@YQ?pT|J%7X>81N8s^NjWkDZlzUDpmBF2wL15oZ;r_`&)>kkS@ z_3ITM0uarxO=?l^SeJxdLu7T*)IZmu`w)1yE{!}_R{neAXZC3rDWWTeV2cJ>h^)3i zL6eZ)D2CMo0eZ0{T}9*--(Tt5x_%cDa7B>y`{tKN$qD~^+(lUUUo1i-wh&N>WkzR7 zoitA7=cL>gUGNQT5ub+K!t+;h3&$Qnq$3I=vk1XNF+n#H9<|87jIw48atrA;?_mJ( zDL)3+aQ)u@Hq8)g(thZ{O8X${3!mKnRL?}~-?}maP3K)Lrl*^}U)eF{T~fndDrkHi^IUd7!^For`&}r#wG{lq+YG5586E(L zEYuSMiZ7s6zQ!PdRK}G;6&xn7_NdGyH4^k5h9u!Plic$+Al3F^T*hFtJ#W=!%R7i1 z^X?P@BVBxqAzsbvMvi`e=p3^1zAM`5%7fJKC|^=x*|<1vXiP*^c#X53jL$adnj~NR zVda#5UMm1?|F+(J=1Fqeqm`ZG?xlTniVZzBrLjl>*K3r`A+^n-l+za+CLekfVuVK` z_D8b&>d!n{L2X^$(c_NgHsX7%(!cJpB%gagu)SV?45Ajn;!EeQno;@e+hpx;9a@jI zpLp@o^XfYYHi=WA8_uOpqj=9iS8>C+ozJZ}jZPkipvipifsOuqUvcuD*kSTd;@)Ppjj ztS;&IxP++bE+L11j>X>n6rzpS?}GdOu@=rPUp_t^ zW)mT)S!XFu1boD9ufj<6bJ*~BByv>x!6v9l?Uz(gXlP_It*5Djt0c*qSy~Dc_&`T~ zib-z!6(+fU7m5|c{9A7cM8uY@K@_1klwr&T@`69*PXIy&rfiPqzWQ`!^Op5G96a!0 zd^=qYgvAqoecXj8{u&G6x(zjKoBkpm_i~KAQ^H6^Ys$a!y43?c55SkUW10GmU|pwT z9iMqc3$oSy&KP2_qexN35jj~bX2r)K0j=Aa2u^zYKLYcuk`)QMIliH9k01`j+`U~# zI)B!-z5T8Fu6=Jg=!cpXQh@tV^OxslLTr#tI468|v&xO-e+a^p*Nk)yAQ-}pv#tL8 zL)5mWUlnXDuHaLm&=jJBrOMb`Kt{wbK(O(fX{N*l_1j;7BWQph(@S1^5n6uFA8;$; zkvP;e__0RoSNwtAE4@p=p=ml!3R1-^ihsf@9o8u)9Xc^N`XYXr-%O4eJI<>IU#g&# z<9nip$)hjhZF$YK5-UTVyE!vZSG_`APHw-{XkxX7uyZnPcLk)}QNXpNjXd}&1Qn0Y zP%F!K{yO%Ur06|0I@{VEigud{7tRs)qIH8ArHPBVp{Q!5|rqGjb z*dTA*4(B)4a63HE`Vzez?xf;sZdF|IH&RB7udlPe$NIP>f2(}pIGcR$-;T4%$D)c~ z^H#;N>qD#eq6EDc8N?Rk30TtpxVfxlfnJrQyFE;1U#kobuiFDSqQg@1VCT><`Q2;B zy%wE&v_f`xZ!52gJwE$1xN4ZR{srQhPpdQ6{}E^W*}qoIWa%x4XE=u7siH^Sj{FQj zRKQ^lC`hR5w`o$ux>SI+Wd0+e*KyL&Z3V2#E^Pibzf+YmCkzEMU@TD_k`|0ij)}xZ#_}~AZm=i0aY!KCuPj8xdm)g2oq)4K^GfDyF>`PM+ zWt@2;H_uqYqWHqRV$!1v>hb~Lx>oW1(NZ1k=h09)1a1|Y_D%NJuiR39w53XmVk}Yk z8P4*Qjfyj2#v?Xrk|>9)LIM~D+daTgHTwuGgt}c#JuAS1bDO1i~OhjYZ7)7GSWIoVWMLPFd z8fJ4FSDfX}TYd(AQD2p&WIL8D7>v7dPvvKm26kRG=Sj@FWPxe!CUkFCbxS{wME1A6 zy|2E#yQ&k6QrsBMCZ{nu5@|N?OQjSggV@FC!4nl?p;&%Qy>0c{ZY1~J7C$>!ewECK1DGzMQ<@f#U)1UkEzr6G80L;atQn6)c3pAryH@g%`oLzo znbsvA#^UV7CZ9x=V|7~DgdydC_6u>>zcaUi(|I(ad?~%>(1$+1y?*sJjwd{;Qwq+R zls+btjwba!ZNU*~GU!K!z*=i*L~zXj06-qSajgEr5FN&`gm{`JH^kE-pPGr~wQhMx zG8>OJhxzYutPqbz4rJbJlx!KVx9*@TW#xvIH9_^pGN{~O(Qjb{OVzH*3SpeA^RMa zl|?e;#?0-1iv~_=LH(q^o8l!Mrk(r(hniyTdf;_r_-ZP0zesEa!HQZ9FCsq6V zd318%fhCxckCLtRS5B%n{CX6LgPW07q;v$CB%_0&+iX*s$U~yWE5GkH5!p-%hF&GK=zF@=ozj8yqHJh%4rsZx!F%BvC?bEA!`gzR_0Z8$G+Uh&sPlaD_iDIU3*36ky$m?O_c1cVQFQNXni`~}GUFP>Yq z3i{Kfh4ch#cNkDb3fTwT6ny7bxAd*05c_pfh^9N>5c|gYILFjBM8QLvnkrPDkBb6c zIB92cIXBa|H4c#@d$A%@YiZo8U3wQn#HZ1)c2qC)g?#~2M(5yO z=NUQ1;*p45uR8e{K!pnwRA^e4!mCTnIy9byXx3WtO_t@-VqJH!9+nXJd>liTafBbUxs7pKH0G;q%Nx9CFeixKMQDSWmcA(y0xKg(>oLH%<+& zm1@7;q}p-ASl#5|I4ZX~(J7NAXE&LN))#+68_Zqtl+UI1 znOvUqRG1s)0WXH(k>F>}!;jT+aIC)5hbL~!esEyQbn!?hInU~V5v(dO@#kkbq%*LD!a~Y0OQT3F*wT&e3M%O9iwci?A z$z_U94c5Oc;$A7WI>^j~Cy`4hGIM?tu&-vCYP$v*ioDEkl)DP5q*_7b7gu-p^IC~=_fO3A`!24U1)JXij>Cp`de|;g>(@K; z8=r1JNIxNePfc_4SSk+30m1V+AET3+r>62r&Ad2C&dO9rcF2y!+E?>B5yrC@m!QPY zM(Y_@by6_yU&1$9(;=l*YQ1u{FjZoN*@;PQ9v%y5r_HleJMl@4+HUi+)kY9(an+z| zWRht~+!Rmvr_597Qh+@EMSLsBa@E1UwIq@|sz1MeeGW1S5v(7=95{#vMz5GkunJ4b zqVP@^1EKh#Sq$*iB2+eyM18`{y`^eIFrZD9)j7L)Iy5V`$HKD_?pLoWR|ooeBrIZVsXui|6`-|tk9j64o-OCCb286l z+$tloOYsQ5nLPB%w`}!qUJ9N(;qu@TzWSS54rR*JGfX)ewJIm{&iPXTHpEbRhJ2fce;AvHiVe7K7_%WosO6lpr;m8 z1wpMZZfBRKt3wo`V4WWD0DaVm;Fs$0f+}whR&QB<-FHgma+&zp05JX@96hvq#RFoB zRDIh#D7%$VCH;CIP!CbyL2oZv^uAJK7xy5!P9c@Q8x?O^w>MnD`~Q7G4Se`^oHTRW z;=5oA@C!M0albPNw~H=i)tDI{jf8c^s(Xfk?EPNiv4OCct_H#atO7yn7$aHqIYShB zo0jSj6Mdoz`^36bBDn6lHLL-oV2eHE5`)wNX{dFA?Q z54>qg*3!r&a0#)H$g^-HeQDrlU@EW)3#FoCqS@E&Ob*CzZWdmlwCvPw0Ml!fa7nro7N-$7^6)q$>~PG& z{Dyh%8D5u2EpPvUMeF|Rrd=H?Rz9Sg07Vp)Vf1$3yihl*0bu#YbVI6s<)$jlf?2l* z2dR3(r;ob;g->Gvcp|wet@qu09BJKr|MAb@{jIQOnKkYNMOg7u36+2&SZ^W!%2&7U z7Bli=&;0s*$qI~|^E%1DPb1y1DEN@(O zOseID;!G%&3#1*{U_28bhwp_7y6zUd6puuduJ{G@zuZ!V4LmjNHk#QuW3^;0QmbkX z*tvIAx1J~j80j(6OU>&>j=cH|^fApSdHf5|{P0d*vZ_qio*C{q4U@mlLF}(3HI5U> zzA!#opPI)gJ3Px2bBS{xz6UXczRyI{+3K2U8Nmn)9J zI#;jlNCfeHjTw#A-?@V-?V>h5KP`5}E%pVoW)h)iB>WXznt9C)p!s8s{9mmeJ>hcS z60n(?_YB_gIc?mnLYjMvBP^@HzRk9R=;pVc><5K?2iL7ohA0Cz^o_VQ-#NJ-7Zat zN?KR)`g@Lhy8n0&PB)J`ys(Gei+d}txxqBebgtUht3K#36%gD*6wO$Iy9ZM5pa~Bf zKRHD1ytmpxM((TjZ(FYqv@l9gX#RZ(itPQ>%}5%F3jMH#1EVU2 zT&i$cRLH>X0^72}?we6tb-ga!wmi6VbSI#VKj%G;E1>}yy=uO{X+xi0a8pmJ>(0*C zJ5Fdbx2%FQUw*>n7cQe}cQZ=D;CJafY}PZGlf)w8+yeaChjD0l&G>i(L}m7oPmb5O z{x>f6J8a7|FO4%gNJ4sCj*@AmJLyt0@~IeQv_1X2W-_Q3a5nDGeRqCa{d-SU5tVPx z$8BDb))rfEc}y`k3iC90bnh>4M0hk>X$_F4zo;Uw&9S@*zs}hkW~U`_xhRowPG}{? zOwz@0LsXx{5Ih=rUiW1#Af^7=lhke|U#6AVo52}@Si-|D1pT(sbV5{~4|4nR%+vU~ zl=5gqaQhjj)*n2pda{5_K2tqy&@m@rCfO+#30ZR!DQ6Z{IdP{TH$8(%@Mz?rJ5bPh z#ngqm6CKOd9pj#56k>0BSq+M0InTPqCJ7TkVfQRiF4G-Z+X~RZ*YGYhG~?doDvB;$ zE?I6}70AA9SnFk3-Go{(pOg3%4V`Yi7207f1zPGmjkxS>b5Fb-KT7zL$Qr{k`J~WKmj0?qmag9fLIk>G5ZWc?E?|r*^ z>fn1w#fs32akGehPGQu#BAWQE14!uXOOU2FKvU*+p zVHG)U->Y^bpo7A(QDirKTj(K!%E)!oKn{KNd)3{;>rzn@bz~bRbfsVfLKP_Xv<^iQ z<#SNqMx&IN%jP0|8i{S+ul5eF+XX|+oWd2zBiSETX=a-$hAKgEvlA{nI9ILCXxZn{ z0m%6y@N7Ms&{tW^?!yNSJ}wuOB5u`0yYx;+}9AN#j|JN};t ztj+KYWxM{X^ZV_u<0__k*E56+pyeSPQqI$$50;}yM$PLyext(gMyeiGYluAlGOR8< z8ckw_RZDQ=_PX#DnBT_D%QVf6Guwt;3MV^ZkZ1i<)}Xos?S(}@L7`al37}rviwwT> z&aocM<=;{fVqd1&YMiwUpV3kqu-d##-fI(S<8i7KhY)6g+3{#_L8DCYz^{*t*FX6O zYN@m>(`+?Ppw7?6CJexY?0WH!s9GWT_Ky1gm#F#Oy4;I#IMeh*!8Hdw z4S&HbTqsRhQ?QrOdqnrI;N9WV$dSSCo>!0miW(zr%RN|cZY~aHN|ym5SXwm`QRIvW z=b%H}|3r1LcMXX=fApV7x}o(zMt_Rs9hWcDghEb2&s&Q58L`Ql4^D~1j4VSwcW-qI zS@;uOm9-?o$d2qGi&{i+eoi~Em;8iWI=+I13KtR5m(FMaIDZ)c&Mj-wmzKv?*H5Mi ziB#;g+Rr4ZkH?2R2Fhz!{u2s;Pa_WvZrek?6`ey`$3H1sSe8dI5XWo@CJ{)p5s@b} zKcmTn6~KI_0|ozzf%r6%d*h9B$ZJ=BvbFx*zhWoG?aMU(ja$W;NtZ_^PT3++$4rz_ zi^#4wumIg}VgYz0a^Nj1*n(ovC*K5HfK5kMhgpbC`9cgJR@02$Z&M^2+z;sUzhfL8 zjU4?OOv4R4?QQ>nM|o@;M&a1PX19xFtY@MavitBc>kTk&Z`@X3Rx9{S7Y zx7NS)4vr!m2FqJ95U0RxYF%!DUGOcWeUoWaHfav@+*@=Y9t}Q}&x1dL!LhpLZF+1R z%QQ2N8%R3q%laArL`G#0h72*J_%+t~@T(YzPlH?Zlv5A=mR|aIDSxb&Ex0E zX%y3pFYk1P%66Af0xJvMuRETHFOo+ixiG-&8yNjPzrlQ(Hhv(4pWfr?`e^4@+kXXw zaPhkc;f`gRAIHtNV3O$=u~xF+HCPiqS(H36Qrk+REw#aZ9tn9ellT-|h2{Q1OAYQ* z^YZ&v1)4IXDi)0M(;|u93J}`jWBPXi2KI;x5rUrx&{&9Sl+q%CPI@1Rf+?iLP{H303IXCEYKCJ z2rv$hhVa(bQvs%b!}j`L1U0O@efgN&IH61;6d~Qm7L7|?c0|H7#<{2u8FCzl%GJ~Jvur-(b=%{jf<@F&t-wz2!Du`hqU}Pv>yP);E~2uJ zCdY9@l#mrSC9+LroffZJ7!o#LtacPE#i!BSRXFDUP}o-g^U*3~mt&cx$#Hv~EXJ|{ zc3PP%%NU_pYotf_l!5oO9m}@zK4Z|JFf2JRSlit%S=)?R)|(Zk-x%c9pXQKp0w$|gWwT6BqgQ#{ z6G00rr$Y?ygqc--ETVv#*AJIn5#F38>g2a!%<;+PJ>X0(!OB?Myz27lMtbdYZCrf+ClK6!PKCY2I-LCk9BgYjTKoY%{^aemW@adD9MlQ`1|SIEYt>}*aL)*-vqC=aiQ(9zmZ-&zuRBD@ijxZ{RVGBQ^CKaz!I zgq%NKLptIzO-JN1k_;0Wpe>sc`f^6i%KVvRW8q1B2(o}jLuHt=sVul=jC_Bn_6|4T zpSNH@%QDSN%r)j$G@Bi)C_Npq%&KK}JIZ#`og|+cuMH0HX~bR-oW|v7y)<4!MfAoT zhfb)i_;|xt2s~zl?4r z*)|6D7khPU{hQFk$-8s%3#(Ck9h~N#x$xsI{ zxp{bnF(2N#!bKYt)J+g;xCs>RW=8Fz_I+rQW~jcT^u(2zgmt>jkEV zkebaXO158*$XAaa)@a8e1(fqilG@;L=%n`Ib_2OiQaheo>{UtamO=THEK;> zH0#m{B}AaWxx7b;bIGR>!KJ6e8FnkJgLtjH<^leS7GJB;l3!y$+~Pqs@Kf#B*xLgMKfZgC&qTL-{#zOz2BGjHX$CR6*W8~9NQ)v@pI?JhWIZDCN0a~F@rUsgboGYrh?os?4&GNINeo%p_-oN;QJe%6Qd+34&}b zjqLxz5F+b(K0j7}+EjxtfPa=Gs67n%&u>Nn)4+LT;7dnZ>tDA(j8l~+rc2ULqCA!a zr{22fIGjp7BV+aPQ)&jmP705|C^&J0;7I}ekAl+1cz>eb)PGk0K;K{bezvin?A#~W zNmS3JPT1K!-1TPHue$yhIQffRfi88|?yinaFKzl!|0e_&3XTfSBbV)yY~9is+<0cE zw)2$EO&zav{J7(*{ofIsNDfu6JfXe+H*G&@J3=1cCmG$jakBq^T64cLwDsnW_<^mFtVCc5M zcS)<)Y73*^T%lU^W|4JK52z{@B^-d;1Y@AML%%|X(=!EdH^??4?0go$WEt4uw^pdY zS;BNs{m}_1sDvdAFFMDZwwUcyljGSEb zC6uTgp=5WAa%2Z8NVrhs!4D@tyd^Zf3Dp|L|I(l)l*s%-eF=|Uf?5s$$D%*sh>suU zo&^${Gl+GhuLJifEli7~sBzMKwv6=v1{M`t6iv?BuwrkOhK~Sx8e}MVA2%6n63gctql39k|Q*n9VIaS{CUkrwbXBVE16aPC?ZtQSUew z@3J-@MoNuO;`e~p%UT$G;k481QrqkAQZck1_;nrw+gJ~eR@8lHl?uEzE6OGTUlSK8 zB&IlZiSE}|sOClFC8CmR%mQn^FJZ@l(H7coYLWr;rb?PIJwI3v+yF^oXGS(Rsi-DT zQ~8n-Kvg!NAd#Le8rjyQB0|W3Vk=beAZDjgy~Zcrc6E~qF{T1cp1F+kk4161AgAo5 zw!KX> z9ukjc_7nhi4Tr8f(bs$@H-xv6W~}1}5e-y^^Du3e^opC$;s|RY6;vqQOZh}A@}*r& z|9(!qz>R@TK;;I2{b?ZcA!2B8-u9m6!|OUZwlvw+Rlug<8MtCJV8gT>@hYnH&?zkB)Lkc*GMPYqqce3raCYc2!D;U!Nu12gE z3uh6|LHlJZR0u1GSyj@KFyMr1F@dD0=lv^GM2x`O3u#HGhCgPHSvayXG6c5~=VTGf zT!!9bsj>+&z0&5xLhLJe9?n@06h$J4QYYHC+oJ&EfV`(@M zp2Ik0Rbp}bf#$?5n=}rdsJ4I{2pjJAjA$`wMvEL z_d}pkH#S7I1PO!1EqA|5rGm>2O^PzjRK)4c!Xb|H7Cm-a$r;Q+AtI5c>qKF7r;F`- zk$V`-1PuZ41XPL`;4<+wqH(9Yn|o}BUa&wT`Vh)RpI3@4&~9BKuuPP(_d!lGcX8#R?bvX*&)o?hmYM5t4`s z0!w_u+s%gyG?ovi6`oCSH53J+6_ULRO{&C<%SS^}dQjrp>4NUl#k+27QpIL)j2|CB zR*eOc1!4yGoVLF=srW5qD<=F<)VKpUX$`Bzq;T{6c*}VL%nN{(kX#z1Oggpj&YA&Y z=}4U0d=^(dJO_UABcBqQCx+RvqdS{ahVBEF5DLCg*PBL1GMz)KR9qk%ViAW3*CJdv z-09IXD0LCPi{HfIWT|-fr_353xX>Wn^p%x|k*ST3yC|3$D^1Zu^~U5ts7V#lGwM&c zp`*dM5NY5o$tLY872*_EAuxar%b^uRl!$uITcv6&i&!ZXG^gST8VL7^l3<)8!!PU% zLK@-nT6W{c6-(nfz;xGEsL)st3=s1kc%Y$kEf909&6UQv)Z-Lu95HhOT0B9y*Iev~ ztUPOGkw;5!p`JysE)b~U?`8Wtn`CGke9r5A;77c%#s$^xPmf-_N~ID-6T*8@#R#DZ z4coplX1QOO)~Oku>s{I zHXrK&aAlyWN=C0;rD{-(3D+Tn%RmlOm}o<}?;9&rh)~?a!F>rT7Jbmp2JxtnqvGO+ z*h1(snwtv2f($9>-wx=e#{C1u%xQ)`ZsBIufy)m)@Q&1&viUF$1jK;ej!QdMtFc{5 zam)29ROlS6lo5gtKU{|29I|}Vz$%p{Cu8^hnkYgCEiq_vvEacKs&%pP@q(Lz25LNk zfCQ&YGWf^}8I~W2fGF4o_mDIMJ7RYQzgnewpp(G$(8xj@8_2C_Ve_+1D$b}83ILx+ zIHUM+h}Ed5=YbU}A{KDGbcsb2)T3ev`coI%y0TniT7(Vi9McIwG&<7sgQn$~=EL}Q zz|9kQI8d1^xIkhCvO()-npCi?5-11u63z{l8F~%Zyx)(9V)_t>oWKsT0~pyzj}p=11h9nT{zB| z67F*4pm57in^f=;uDp5|qDt+^CC5jQ)0k@WHt!#He7I0`MU@oT4!169-WfmGco<(@ z;E5968X}P@ZThibOpcehp)n*XSJ7ZqA1?XOGq^TJi{nX-+PK>zaNUd>J-+L3Ey8Vu z9s3stR)5amhKB z3+xQhhSi4fN*Dlog5N$x!Ae=tF}C#M^oBvBXe8IVj%$K@*##3^%oTU48NVELnq)!| zxRUZJ?h=L$L4lO{9^Ex8~o54>W8vwiJ4hhUHRxcBoo9zz7-f)%u3l?Ln9i z2md2m+@@WptOO`qXi_`9gJ_@}DOgq7n4q_E&I8LUr?yHbLi z<7Y3fZQin87n17<{Cf!KRnz3hH}n}gpQ6!x9UI$(Eq=kr>koadKhtmks#k53a(mb_ zBMw=L@d+hr{J>lVbJ?DLUNbeUo?k!tLoiLkhfBeUI1gn;AzO%u6q(|bMpCv+Ij6Z- z7%jlk&!fSIDB?o-8qm)lE>IJtWm!ob5Dn-h+jKf%3fbnTJgl>%m_vvowcEW`#GK@U1QZ;)2nf=xu|J@s)nd(`7(f|R#IA((@DK( zeqlyx@<&Y5CYH0|-*gF_b*{BE^8D3C>a6?l2zkJD8WKyNz4QrE9k~`b_LtU9TmKyH zS@#H%=brvqcfEco42&mSE?Nc()5p$f7%3SBSY%9KUXhW{7y}V^l>Bu9mQH>%A}3mQ z*MAD)OK;tw3{?cTS@{FRa6h&rPnQkgs z2GAw99q+pW48o%!oflyvT)FMX7KiH}xdJ{agt8bh80Tr$A-!M4C=)WXFy#^z=BS@% z3;EFH7>h?D%pVYXy7SYi9rdNl;o}F>8dm2N%6jHuSDwz4DFaqZ_FDsP}A(PIUM1iz*CTDAoVEGtE;M2%~OCPzQe&@%ibK15H zK%V9pGXZ?WihY3ve{!NYYYH?O_0cQwHar@6z6apz4^F)?T0iqD8iFC!<#Z7?XpXot zVPQENka9c zx461_ywZC}f|tmtWZ#XKZL8ll&pEj@IL2JGox`jzmJ~iyYA(ZO7;!_W4U=1P;By`c zzWdhQhu(kRwtMp!q#3r5+tBr?K3&fTJMU|Mv2CbDEy&TZ1t0j=vP>~Vxag>mP>o8+ zNzatMWSE*$mKwTti1@FgTgao~SpEV*A2cubzU%Nqqo!rYYN2gM);z~ry@gC(6$>tK zj>C`FYFm2O5HJJ)k$>{&4|ddFsnIwV`?4K#;keR2nb(C;=__9H$gSowkUOE)hREp$ zv5`C)MeaN{cloM=*v$bpkkVV!*;v#lQCJmH)Mcm7|KA}9zO^J$yAIW}8_2hQ0`K!E z#SP(hFOg3#6vQ$6f=iPMS`|_1-`PTnH)9Sw5;^?a)>Am3?5A(0Oles*t*&cqUcy9K zi7ON`MI%C~vB{KQI)HI_G;;VgD{ww;J+!^v{SnFp!DWg(!grXobwfr;%dS~X&OIqq>OD+)A;O)~dAN4_ z){@Bcd(#jc|3oP5`9DwZCHt>pTFHmU@LyCizn}cBQhVR#49&~;bzRkYFJfYb0Pvfk zY~==9S(h)wv^nLG6Gx}qjCIa4S&(Y|6PD&yUi=ljK95EodOm@~{FZ~G^#{KKmZ1De zQA9ZYREIpuH0#Q!_)B!_?8_c3JEzixa|MrXE)5VT$DEcyg_XuIpS+_s*teF{sItPvmr>yC z`YU%p7mpd2-8fua6pvat;rAO7s)9*4B@Z{QdqX5~OKqsiwF{X^SY7x4{o9A z+_p@?MmWB9&SZRYkt#o1^!iPzj7q^RLs1a%&)S_GJI;qDs1kmU-k5%o+H(>h(L zU^1h;#V@}`Z)|Iu8DKiD&iFEHHhj$T|q0@&KPk2Dbwb=+2?f zjMm>gOz(V-Wr`TWF`FZ4TyOz*B&2q-R)=?n6Ts(up*9S(owbx*9XDT4|I8QYR6@%X zlZ6YqaVF>3xOjfSF%fd4^%I6^V*LhgGW=$8)Z1mQ{~_>Cidy{HT042?o3(L7&ji3F zT=a}sD|BS?)3dp>SLw7&DTwTW+Md3(t>o~_y-2Bl01tB!BiE<%m~tU&9SN4X(>{p}hO zu-5HD6BZgDE~CWs@NqxkKL2oyjJt1VS7ZB~sLEmW7aUSmY~HVyqqqs3YWh1k=W9vC ze)q4K`u^Yj@oE7vey;|YMA)qS$VGzX2A_4*_7!Dd_+;n^+fJ4%j>QXDzb_FC-SGcJ z6vIbM2RZxuweAs1B1Zk6_@1L)Q!Q+w$V>AWQqqtFC&^g_b4+-J#q-|I^#d>ev5I0y->GgQy^qy4A3p4Q)YmIbG^f0xRwK>@k= z3CJz6A|jyLBDG*T#l?pfbiIQh2=9( z9*5<*@1q|-S@Q`7y|L-2o1HGngbPVE%Cg6a>?xdGels~5x%Ptk9Z%t>$C>3MPAo+} z1z@=mrP@`ZLRgfM6m#juChqCywGw4V>zYrP)1RrGHn0%YXd@z&sSf*Gv3ZS?44!iB z5LtKz5o0_OsfhrQk3fy_`qR(Ui~=NGMOTxq)*ck@4DDI(_#nyi(thMzVE_O)EK__L z?xLhi#qmj*4W?s$gTc$@MdZNOu>|~P@bZ$m-g;kc3h~#dtUWE3`$Cb3YszUV$w};f zJi>1#hey9KQUCq@2-)Ej*-9)OMHyGXhIM&sBjtVvqIcHNj%#^F@VmChTKXR$V6JL7F^%jePC* z(AsNBq}EehF=f37+YS6VX#k(Yst)gb88$_jvJu}Q;szLgiHhlUyHNYme`w5-ts1l7 zL__);+(Z2!MU#<=M=2u zrTz)afB+Ae*$fRkE)464zks^{wcp6qf2!>sUYClwUBL+1~H>-r0LY?`6I5UVHD}-uLx(_q^Wo zOwV_FzT9)L=hB`?kEKW2b7D_N_n*6e(fzINTf3{>rS9qO$!<~iSa(a;t6e|q`bO91 zyFS%5-}QkmUDw%N+cy1c(;qfHzUk|m4sZJ8rraj~Ce^0XHw`Ure75tSoxkgRwDX?M z&vahVIn(Ls+}C+(=Rn8X9nW|Cu;Z?dn>s$y@&7UQ=3#P_)&6)Uvm}{JCNtTSNgxYZ zSPWfDZ-gZDzIRt|)eB*%-m9zky<21m5kdBJH+d12OGIS3ibO89fTGdsf?m0RE68OA zx$d|`FQQ+$_&e2AnPkez&-+K7C(k)=pLwh5yxV!t`Fzq#JWDQHvVFM!_2UC7$2S*9vu43(D#SFIP}S(+lMMc zhlcb+mkg~Le0T6?gWnze{NVkAHxK3q1B1&B4(=XYx%iul-{IqT$05^NbK}S~E^pR| zYBU{nnGM;BD-{&@hBXCm+K1bWO@Fgd&ae(uaAN%+wpgddm8=ZMoi)tsmDTBbnqDc$ zu~4}V*n%FrPj13X2GxN*f?QV08Ay4goWnz`Hmi?amKEhJS;JNK=^_gx*(52)w_8L- zjMd{~(#+tkl-A0P?2+raGouXE*>lF@v0^i@Ki`B}Qm>DZs3%cCo!1Zl3&kot=tnGuB{iaqzU<9U(m0 zQZZb&%1I5m{CA=mLn)8>E2&o6#;~>Y7U8pKnrh%u4{2Q4jL(%<$W+r40w=qs(Q4%4 z?gkfd>p~pK?7L4e-(ac*Jg7{0W9nK|UrKnd5X?6M@iGx^I01o@v%B1jcbpc>aH^_y z)S7|1HyPV5IH9KD=L~p6VXPYyq?@bZE4GN%Ez@P-A~#xHiA2gT&!ugj6719)*>bAI zc@6MF-6{5xdqr`njMw~0w<=0R{CH%&*vWcEjl+8_)RO|=Cj5AGV~3t8(PSv|S`9Ip*Q zZ|EB3Tu$X+FZoxHPeXUA?ur@YA!P z6vv}6AUO}xfl@rZSm2Y_RKkud7A4tC%$(-};i!ue>{Q5XkidgbfK$$=fG6^zKMV45 z&TN^+ysXL7Dp*veK-~IsQ4!-XTpom@a8Rel^69-YQ7$iXWZ9fDY2*=ST&LPCP(y3V zKx=@h9Gt2~7*r{lLU+B;zEn@D2~AR|R>%z61Q#2;QMe>V)tG zN}iILWf6rrfTxE3M{KUtXJbv8$}64nSU9=z9ie%# zC3oOmSsAA_pHJc%l^T)G94H(Rw1=AmXiX!YID=0%h3jh-fN5Re?+t*S2u8` z>TZ}RYr0wGrrlQwihMPz#w~8V;?l(k$lI}tLoQ!6r|?=JY-0k9he#Q}FE$V5gIGk9 zOse3GWwqSy&7z!EL2qeNtDYjIwA|wJj{jv-yyX;EKthvPH!TP5I(a2xhXGWHn?|G#!zK zm(nu0I1sZiACX#FBdc*)%8Zgc@A>u9{GzVOh6*+u;`If$9&^$@mJ-P1HCazCgfpbY zi-(+Hk0m+$bCGVhqdEP-mdms{G=3%arO-qC}=) zy@iXeOl(LT&zYEdT8AmU%5d7=GRqq2Wevf8#!b)}W8K!2G44bwzJFL0o3o|3pH&p? zSy#>%8~KJP)*0NMfDsnHhN~J;E&Kgxu`ZB^>goYo$?Z1tFmb*w&QGn8hvcUkEH&f!;m#zfUEKVfxIxDL= zVw1lYny1T=3#dxSW9gDyI`K3 zwi&e~TrXItDA{7%`0fV;`zgBNf?2;|uKO6+^UD82XrGd66@*FWDd_^Gk};^CzM&U#}iT*l`^GIoWc`% zyBBY`lI|?gaO>(3`?rNZn@BWtoW|8u$LkiWKXTrS;`);a)5*M5>rN0p95*RzG7V?W7f0I-{Pj?=EkhVdxZMCJaclo8f7@hmtJp9`Bq&Q0Z`I-&_SmxahV#_;*$*RagN|nI z*?)|EcBr@YZ%2U~%E8s`3>I^`IfE@6DCX4YL+`=^NW|#q*MQFTG&}9Yf_HUG-#fZx zGyOVX0E=LAmPpd=HMkX|w&GxFB@SudgQ)y`DLVRgWfxz^wW-&8ub=9mdOZuTMgRaQ zD=-EC9&FZDnjiU$80fy}NAPkaIy4!&Wmj+Zx}#8Cd+f*1lfdf$-7D60%?}Hmju`#y z#}F@{ui_&{2hfYxoj24oy#nQ7^P_L$qcw=Wy?&bGuV2Xu*(>4&g2Zh^?*if>`Mgqk zNwdCp^(G#?W;oAlc7Dc0iWA6EXl(De#xIyOcO4$JJ+wwxPsgfyU^K<8Wu%4^15%Zl9~<_1DAg z2N!fp$Tb^jPfSR?vB%iI0qib!Ep7AkCVUMB5A_swF3MrR4PCxcS51-LQ0_J zqyKqaE;rgh(`hqj+kng!nV`upcDTunHG2MI372C1yxiUX|< zf3@)WO>Mwiny*499*XS#{8SsLvf%Akm>>`8$9P#S_k#*0*6cCR0(k&GeUwN-l?CxVisZAV%8I zo}7^C(1}Cu?C)tewt=&S2k{oJW@E6Kj$)+79FOHJxm>5NJZeu$1tLZ`F7B z8+Xs^l`~JCDsU~r7$)V;gx*Fl{qL}LtDGccva=Tj{rq-_8M_U}w*S_t-Y4EZb9tWR z^DYjJ-U3--uMe*n+&7TqFQHs;3qs8Rq^P)jWg3}g6%Ud=BIk{JQapGj?=g>TgI6Ze z@tB!n4$Sa&c=Rdf%wkA55SBp*303q}9n@6@IZhK7tWZ1Kt5?j^pl$y%xf5OWd}UMb z#Ll*9U?UGoDkN?MJxOgoY{Brnx>EC%_;Crnd;Cm7kB!N8MPjj2<{nrlO4E6f;@F;>Oz!kWsMrf1ON;MPDKni33 zoxZcDy&7()&Q=L|i+$FZ@P)h;$Lk-Mdm$#3OY6imIk_nv%z7HY2*7`tk4&~#jn7vh z_fxOJ;yKyAdSDYk&Wc||tE7xdZ!%B@%xYcL0SM0g&kvmkotUpehu?fb1Vwu8yta8@ z6;Ja%ZXCUz=lucJAJ-Y0cl*q8urFkrMY*WXTCZsGD%wC%)dU(;!elvLir#qXSux$E zri6jMg_;?ibG-%;cDpc3Q>zIX@e~>7(53SBTJ+`1+7l}!Iy6ZPixd{;@8j*bW_UzN zVcOAAb(aFGrlZyXrlJ^syl-cl9GA%yXJeO3+d=O2cMkMkB6xf586H_u_<9K?)hH7V z7nh3^QYHn5^Y(VGl!yUf>2(p%=!pl>`rdVi zTIdSEaEq@9=*?veQFqCJXBl_J(h0#CcEZ)`gj5HJPu)EN<^9dO+W={%m>GtTE@Xyz zi(I8r!uLKFbvtN z*Ni@RIw^V!%tx!?4+t;c>(@tX-ki#2mKTdIR>ALa&|MmMWfILjCx8v*#p^m#y+3I9 zk>i}<0r`Zfgi6~z79we78o_EdiWSj$CYVb)cCaE*p_9i~ok_S^hyG}916_RO=!Iyt zv%Lk}mB;53X1KIn*Pt-M#rbe7XGsF}gTo1*K_Z5fkiQ8;=IEre4LtF@t^anldFuHY z9;8n^H7K-785wJsb@_%~t7%4%^8gsD%@-s0&+dcaWBU0fbn?KQv4ic+fFCo%qxA{N zUM3d<%os6s#$R<-b-@I>{&KJ-k%G5>a$oQFm-DWnnpp)s5jN>^$bj`?WD7SYqg8b} z$)WR2@N0<}X?lP-c!nJQZd3cRfyrp1K~#ZY%&o}A4GE__!T)wG`hyu>v_uC0qb~vy z+>`C8p4-ws0O(9J6Yu~6Xie3X@s(XIO0QG0WluxiH?x&gVrm(2W@oFDG=u%!FyxFK z+tk}`1B>Ej|Id8x1+n-CqmHGCp%Wu_F8VWqW$$$~&a_ud<|>pG!!^m4D^B>Fp)5e{ zoPg|ugADkuL^Uvf*m6EJXKl3=7sVO+E)yLhej^*Mw9I@J~-Udar2SghZ~{ ze0vDJmu+7-Sqb=?7Q$+>1e}Is0x#l7m4hEk#XNVtqxWpC4d8}HA~S2@+Y4zJZVjEq zbpEI=@NCZ(ja6gHZ&mpt-Ue>k!113Mj%&iy$^mr=2$F3~J-@m+6b3BX2N5|HWZdC_0+;2N~A>yc-n{7(c_kZp~fQn4>M>r^h zg`!s;_@ZA<3$=m(7Xo-xydzyeDpY3;#)aDo09F4d=xaFEL7rK#J+_`N(*^cYKpBAo zXW&5w>;%Zh!;vT0-nC{SW$)-MNjPs$h53VF8p^f#1T{SzJ0URyYO~?!86}Y+%pVLF z)FNgrRDn(0)6EWSCzw*5MW!U4R1|WVJzcEL3zs{s(%Xb@N)Z|LXSWR>fJQ z9sk(Sf}=NDMcpF`U_ z{OYG5qwH_jv`5i!q3t`@%=Li+oY5AVxq1^%-VIrUzEb!%V!3MO# z(na6YUOPTtgHF5#6r*rV-PC*frZ!*AHnSZTRN>HHC`Obuyxh#$2-=V|DC6kp?XY+q zIRZNgi4L8-fv-8>kI-)(;qAC*wt*dS`xvO;G@kX-tjCto`y5HZ&ZRfQG15Cvhfcoq z#4gCv2Ewq1fa&Y#&3rV&F~ftT3g;W8!c&i8iE_MP@z`C!YT93uzjteU&BQ;bPQGzh zznrE=+$QYa&tRl#GlrZ8r)!0XKUK0jaZZ@=A3qFFCefi&BRl)_v{SwD8~HsgHM3=I zV{FoqEv3I~@lmBl6(Hi#&th=gnlJ6c!}qR;!$A=Ccs#PIu*dTRlfD=sYuKXlQcY7- zktlK}EV2?YI(hpCC40Q_0rbXQ?el?eV+OGLM7|A)f1dVTaJ=Cy>UnHYl9qi>Mqk;? zP4!l?ZL7HM4n%l(XFgEzg^`~Qj}0mZBD|mVxr=8mp8K*5yvTa-pu&}o)Wd`c2MEvm zz(e-k1Mg9yLzwBOJ9{_W!@mai43F9=I0s`e2RPiBsJW|_u#Ck3l$1Ad+sD9!M2FsZ z3qVQF&>#QuWBkU&Gs7cx3La|>m+2Vk!ZR{gtfh@&N;H3Uy> zsr^PfX7$6}iqc#ws(24ujedGB*paBv$)o>vpr`u?_&S_zc0pH!O&#Lv> zAju|Tf{Aei=R>IuNR(eY*ef9D25jPY&h;XoXmT_mPw0~w9TTNY{K$ix;Q3N?eDK{1 z&{w|pg-yMoJA_`G0ehu#MhL>Wl`4`_6>4NSAq?KZ55xD7=+KED-6WK>{=xn2jlI~1 z+Xn~M3wKFjKJFEOI4KY2JTxd9K-lkZ2q4)5gKzOO7cuw#?Tm?2VkLLbiFz<;5yvVS>G!>%o}pg@JObDkE)XqLP1bu(q2yDg?K0_7`p5s_?QwM+NOR0 z0%1Gu+1&g1L%dUXW_Wm4!MREeK*7W`Wm0Cx8d0q_D%g4R5wIiCA1*`-mQEGRoh_zU=2gd|Eo#S9fqJ!d&JDB$L_%fJLl zIR{lX?gzmoBw_?rHX`=v#jL%)uJ`p0 zd>_%Tnh+HmeW1^UZ5-Y<=opxzXo>J=`!kr6kYZp}14D!vQXX|JDv;n8=C$aNFT&rF z>d?^#zjP2S{Zji~^rH68U1;}n?XBQgmqEt`$0GGcFL2D#aNQdZH)sct67j}vdlG_V z5*<{E!<^M;^!(+M{0nf;sKJilR}p{B1fL^gQiaM)D{lhS_7m_TC1U)m#5L zVI>0~OVLE59%>{ByT9i4WNh{@Wc_dH!AVal26|y&iS3u?wR?hlE9Pv3DOt;g0rpBk zAD4NJVHR1Qf^JB}a4|%Rv9%k9fqnT)Pw{qKGk|_6eotCiZ`CmumIogQn$_wnrEItXywtJhpdS*kKuP@vEH%WJb*)C{e_+`d zqF%WfL;rizUHw|g9(v=;?F&{9j4v9;AUM`odUWLJq3Ae^`3K(;F8 zPy+HZ{9Gy)j{Dd*+few>WVm<@a|9I1V!-P)MR9b`x7s@=q~gxehpfFd&%-Hwk~27> zL84)e+3j}DlE>5i4f$pgKP#RiX@lN)_kQ?Ve3jmBzYTF{=rmu%FLXNER5+uU9K*6D zwKq!_;>i6U&}pd{9e-w@z4z8L--dhSevIOOzY8&nV!)^K5%#>VL{xJn0|V7AFTjtb zVkFeVzQ9jHN1QYJ;g1XG+>px{DwB~?ITG_$16o2@DTbbgl|rIIm=~(w`z3?Pr}=9o zH&)$F6-D=zM&0x5?7)+yCrq z(e#TjuSj*h<5xKOS`W=vqsaeqI}B$)9!oDN2Ph&yCxhCifCaGJAhtcA>#Rkuz1*IF zgWy6<_&E2v{+V`=RTWzS^dX+b#=R*eooP_%uP)ODQ z^f&;tgDDC|*IFo3<6qH&O%O8-H8AJ>q2$8H<;NeH3iVcZ}^HJp%iv*M^r2;%Bzy_8A^!LWn)HewWHY=wgPZQK@T2 zLpa~3)oAfwVSgaeK^00-ymGzvuP`Z1I*K)|1;@fUU{&)f9Qlaw+n4?y{8pkv?w!KX zXj2dWn{epkQ6+@6O=YvV)i@J!dx~cJuS4X!6MQa6npio9@G!!PBInpZ61PUfId3rv#d!pZ zzXvOdM2sd!&ngr?$BOcI{^S;!;ejTELfep)3OC87!{00iOL=oXg?{%{n8u}IbRztK z`Pg4y9O~u1)`r?;iFcm%++Y6tIXw5+quq5q^ViRu@BpynePhAV8<&0tw&a7bCBK?K z;R&;>7e0ZoM^j`hoX$%tQXz}15i6y|uQ=8L)PZ>_I7h;=-Unm&`B(?cxMn=?jDi(9 zrFUp>HeF)#MRVL_QwwI~!yTYeny-V~*UQ8-gk!@UfEnSDC4}v>FXx5HF_DqUD8I~K zNn`{oA07ZJ5*<2Gof6MxZw++%r*;aSNpMXoql~FBPGQWH6S&zXnz?2Wo@u@cz4Vtl zEF6c9P4!L=LSJC>#zRa9R^&wrcCH?y$JM}!6(ScCdUI$TdLz*RdHLVPWPmS^clz8t zGdwti@K|&?&ZywB$LA?T6gZg>-|>^9{L7iILvNe_aD*Ff`oWgo`sH8w^P#&ku z87yU02Fhx0+2_K94()vhMx0cKj=q`Rjjnj*jt#xL-x2n4JnDt;wd@8$<-&{!THEj# zoKcN9bU*bj7?SGHsn)amdn5k~doUql&jaCHH0B$*Q47GT0?`gl<49DXu=MJW{ zTSe5}E^9e$BDtUuZ5!^aLF2pO6U^73<1bqJ=c%b)es>2hKB<}T+=q;pHSPp$47!s6 zWgge|*WT6W%DrG^z6xoEUp;eH+|c{-Uhyl0=Dvc(F9X<;I0k73%1R;}6kYVDOTgHC z9n|bSw;Nskd}U+r=a+O$15?2{BdMs)WhPAJFqtuBX{8J{^cTTOzHet|azd&@Z)|`Y zgg(90M|Sc9#yJxJLn2^?%^R}ea<2m5B~#w48EBX;>g-ynn=eMknXie5yVVzW;OI}y z&|pFgA2_`p7e-O`bS0(^%YwoyZf^sxQqEUF=FDFqVQ{j&q4&payqkMwc*F_8J8i{O znI+xzK+>e*D02WpD*PkOF6~UNl<3eKmn7jWU-Hs4?iJ3TY7Q4;M`Ybv{vFnjDd zBBR5T7EiZJXrDwPrghEUvj<%6@PH=&K{-gT*Hr~2=rAL+CgQKju2sWh}K3c z9$!u=4($WbSBVa3lHi}RSMD1=_PO@D-g5`wGn{wCJ;TfyBZ^KoL7KuLMxE3#=8|aa z=F2;)C!{*q*M0tA?^l=eGnRAaT6iE~L?#KD-RSlKmxi(F3q=z`e;5LuXub-aI(+5M zW83fE)H_Ll5jeG8104|@!b=2;PNIn!Dn_P;sZESv<;lySBT^k)noR6O)AGAF^j7Z! zmw?_}J=YsO5lVRcfuJ`|MT^-=f6ufU&8VO^^Hu1?AiSK<@}MwRs5^#%O;^o*qO{&9 zZ}~E2bs%d>mu%vkH?s%cutbHhz&9XQ_+fxl(Ok%P#W8aT%n0M89H@mHah=;6$W$A8 zi#Ssyc0gC=t6;136x`Y)=*l;DfNzTKG`?u$?x8P_Z&>`_W7w#DX?*Tz=b7Q=TsLGQ zA{inTwmQ`nt+IfV!e06pdKdx{9dKZ+f+4`i!A%B!CtA{vD+}- z=B||zF*+KB#hK52=-ngdA1^wS1{1<*kWBgUAjUe?fvCD<@nFE6W$x^PJiYm1bn4i9 zj-G72W#<5zuy=;hUTbH|W@d(kk1FhlA`}th2t|cX#`CgbG>B4Gu=5YnH~xIw(R<6< z@eE9=TY7sCQ!{D1HCjo^OgM7c;U`jY|0w*Q_6}UHEBpmT1_vh0R?|SIFo@48obU^& zm`4o&gcE1SF|Z1zo=e8A8od=l;{QFo5_0#%Tu+$h_{?)*x?~|e#*Wp?b5qCCYP$$q!dRSHuT@AmIsQ8@(%(3;CH}$@BHT-oxT2`3* z^M#$u??2kV4}RJ-Il*z6^b={oCBFAU>MqCo=} z9@=^AUmt{mvn%<9&o+|<_YqD%O>eA`v8g>Wy()m=p8jci*Z6!Xz*TM9#bd4Y$~yQx z%#)e9hgYZNg*qPM8i`6eXDd1S53m;LG|&x+4jp~h)W00s)H|*LJL0U8Tm*h{8!S|d|I$DjODphOU^_?>Jr{`rHT=Bn1O|Lf4noXQlf%c>j#y~3z3$buCkNnrsc zP2nUJ6~FV7>CUPNsSZ-mGy>b>TCM}2d&(w5H1If9ZV-M(mzP6&DevjGWMDaw>d+g^ zFi-<#I#=G44V zrNSd)YYEa0C@}mpCA~0u=c^!-?&5xaCafo3ekQcf^mDHJIX~eF7WHA7SSXifF*T*_ zyWncHJPD5_)uG8pUp{~`$9g|$E;M$Fr=qV^Z}d#fD);tF`}IvTQl8CBS0a&x6P`fCk-CJ{rP z$8Ir9Fd-2mX6F}o@%#8qz2~k66a2RA`ni`tSu|>l zboxVSrP_j*xfFV#0X8IJxP$_}#r`H<(}cGO&cx>mi_XMiIUUfC2iPp0Woi~-fTyD{ zkI3h%z?*hnAlw>#Cn`M6b#pzz@Fu}w0WYa4Rjr(x!UQ|BDL7O}b!eat_xUe=`sh?o z%ffMKdUWh}i_n07(ddcg4~%|f^ze9klpS@CszWm}%)3mp-)gj-}Pn=a*guR7!i7 zu3PfnlAkZ1Sn|S>&o8-u$%mHYme5NMF4?_gV&pGlwUOD8Z;ebpG4hd-8%NS3o{`H& zwvUVs|7rLq!(Si%%xYxWu3_cy`NKs_qd|>4* zD+?=wE3a67#mYU)_W-BVU&eQg&o2Mv`13&1__^`>#&2Blffex;jurA1TUHE@{SLVx zSUF9*Xh4S0dI?WD9!r!}EcHYm2!W0Qu&3PWvMHlhomOrXswU|~Hj=_L8C}b%_BCN4 zT>aaA-5#BwRSG-~#qW)PF3r)AtxZwxP*|`Ep^+u1yv`gV_J5>bzep#no-)aBwP{9g z^~sW^@oBNWMI*yPksuU>y5*J#wzwelCSiy)JWy7cb?M?9u}Uji(Yd^wp_wiuLJ0%G z4IUQ7Dt)wCmKV54!W0j%s~w_PX)hC6m63H3tt6e;!PiCt#sZy?MNN3F>~ogo23B1s zhHeo05>IHn7$*;6t!7NcH5B{3qMXQ7NHZ1;MDu1B6N#?>g&>b*wHnNd`w|{kDy<1- z&U-1}I581@+b)_O<;;K$&NGMUJqrk_7#TDUD8jF!J7kMl92AV(5UV@aijg(@|+@7))jNMpu7QkTbqC@Pt>bo&;XkWI5%I z2L*XJpUU7GS*oTDM0Gifa)(eSPlsbcogo6wl%pNCYGiFsZ0;(;c|%Vnvke!Xim~r= z@$zXM4WMUEtR#z6^qjfsB`}TnI>X9n7Ux2xnAc^Nb47gMS<#TfYR3(hxX+e#`xync z_gjKIl=sxJLeZ(UF+pd(r5t`(ct4?NG@gYbYc|->CS2*gJhTRU^^nF^AnMaly6a9E z4OKTj^$Agd8Df~Zq>D7I29l=JJA`6wI#}??NlGcN<&vz54$CjNU1%T77f4JVOh!u? zNGWot7Yn8DbkLhDQeF{F$YbK$B@hHXA5ytsfeRF9YR+FBit zy34HYxL}8Fqzj}>Rc4iHeL3z`Y`jBgPS@~+->nZuNrrSN<9nQ9^E?s5YKnZ3t;%xo zlwvO}jA)uQS6roOWh_->10>vlh|Nktjr0eN?m_Bx!%1F)59}$tF__ z{)^b0QZ#WFR`!y0Wzb%Ts*Z?q!k{P37N{4|Lxpq&8`~ks{pEBWONDC26cq&&0QI!; z2~m-X1&EwKmD47ZDMqCl@{967tBJ`B4NXvI%S6lR%bpVY;}3X~H5Mn`2}hvi&K&HB zVz50<0art{=0f4``U-d}UJWr>N@-9wRhtD& z4BE#rax&`kmd$W~3#mSvUlN$}8%ZzYt`kZ| zl*9cSAqyI5Wz0gD@w7Z5$^$Wg+liEobjg{os#IzLv5EG%IgE_uye)$j?yLjk#p2ZI zvso~VE5|vy5vw#z{g?av8Zjg!l(kZVj%tHZ2*LT%T`DC_O*%tTes&O`1jw}^GhG_3} z3zoS!W5H{*H!ssAE__(9P@ zEUB>&<7=|GESsQ-onk*dctAs9bxoLrO>w@GT=S~X-d#?rNJgHFXDW5SKF25@6zsdb zL(p zqgg^5H*<~5in~O)Y`Uc+3bit4i(nPEo85f3pl~#kej=5!nyqFgr)AZO=S6v$wPK2J zEL60|^JZ;opSTt|k{UTyi{@LkM%76t6~iA9+s70NQby(dY}lcy>G8b+CJgNeM)f47 z@|l41MqMmr*)8Iv>abT!BuDEQc{*rR+T+W`eThS3FO!a1Q4@2ii&&T)G>LyerS=mM zgQ8S$X4I}?RQ+W^ZZBKBgfDKW`JLX3DIHsMrzkI}V>nk~qns~k4d}V)_1gu7H(j#g zCXLc$ugimGd(!0=^AQ*JiQ44tSasv`d;(3kIApkefKD7<_ zV`N@UCLBvMxwu1|Pg1%#03#dA8H}y@01Ut(&Y#oCqRLE^t!g_Ksbb0!<2WY#-EbiS z^@(a<*c#La;+B-7F7`*E#&I3(wz#OG!e>|71vDKxVWVS2z~?qmT7}aeOWPendwYos zVe*{Hl*?)3@C3F`3vw!_DiKX?x*D;PSd&mCY~mCVY8EoMs+=jf<80cmj#;l3evpdh zRJg2>jF&3)hCIhu#ZSr78Y^a`bpW*EPY1Or>vD03=?X=^-eU>5s<}!=VG&pNU<`uw z%~~)LYvroR%5=i}ieTT93na;63W(TLC3~=@wyYEEgu;Pz(Z+^zHMct$jGD#w;A=V= zJYG#IOtnymi$=^^!HnAxE#j4;1$c`RxQ}J24+`?Q-xVdy5YAI)s@0mEbqnYxm(rdT z%V9J_;YG?VryUBn03k+4VJ0KuR!u{TMYbz;rroVd6xH^qmyUqyl6BPu84X zUkL-aD7h~rz7ccTMW|xta9x+NajeQGpvurLUDcnCSy;W@9#=+FzSBcftxS@PQ|paz zd8bS(_YDhX(xkUY#2tn-Q;w&d&CK*A;{G&^d*nDSHz+L}9ZI<6D+KT>ngs|DO;%~r z87d_}OS?coPN7+fC9y1#RYp`{;6lO0-DWCM$`O@D&1q0L&1ELDbC>v3?w|z+s(B}Y z**tVIvHzQ*d|Gn*d+E!9B3bk5h&bsFCagZ%L}s>%b7QigrwLy}TXcj8h1ss26i-gc zv?GlJ1?51bJHc&c^kza zP%0Z%bZCunTgKuyMs!M1PQX4wu1gt6FQy@)3POCLiGrNMvLSWEtDy6)U`j8309T~J z5%Gk~MpF)3)Qy>3LYl_4JQ>I}qjxO*(#TuGTLRPy5{}ROU{j=+0`+VQ47_;d++aTKr3#B`v8fKF9+V$qi*hG2PV^`9V_BmwZ)~ZY3Q<-K`-0_ zp=+ra9ly+J?@=G_K+=|Zmaoi>_y4LY42(mB)ojUDIThURvgpZMA+RA4!+psvxX$PC z^mp6_7Z8(n0~0mFCa1tL3X-nsS@eP1;jc=?aB=a`gS|iA&PRf?^+22?*%+mXRW&lg z!6E0J@RuZFgrUu1KHyjH>>PkFjB~bMXWQ>>9xr5Z(&Z_qb;@c+4~ai~bPKVEA&4T; z!Nr2J&m6E3ee-bVJt3U-n;Sb@w>V~p;qisCMn%(&(?rgm(P_%wXhW3}4BmDfL{p?X z#F+L$*z&p#pxgI@b7R+cwr;l14)GzLe)lSsdaO}Q<@A-D&044X#&(U*mjYh1qo2RI z3H^Jy^S^?nUsO8hckfy|2b+#;cXyUgs^jrEU{wX}X-%lNN|sKzFGWVpWW-(>WLP$R|4;G(|re znZx2R7+MKK#jAw0GP75aLdAhDFc@?@YgS4$y`$g%5`d6cj&(xofead`+G1&*95)Oo z-jKot%#AVh^s&yab1F~$IIthx{r1PHwGO>}JLD&N%^F;;5dVjvQ`Ig)m)_ffJT<6w zgw!%%qXf!F+yFGaKrh#dWs&FJ4&*T#$aP-_s?~t-4LHMqF%;p->Ig4#L!^U?r7pI>#lP|ca8frymn__PA<3h-d^rqcdKe_-#xWM?5a zFWeLjD3`Ajiq%H$?@RzS7O-5l0PQ#ciGccW3QVVg$r9?+?(ggbR;+*2LXn!P)6e4@ zIrczjWMZUWdOPY|{L0euP;cZI!d5H)06Dj_t6@k8v2%F|U`cUf&{=hPBQkwSg&unZ z#;HV%Ui$UdE`(B9NEzAsD1;WbglD0+TP&58dT1Q|$EOx>Ty&y%{=uH+VYutra^>vg zT=Hz3%H?&qMd8Q|2c1~xOZ<1k+cSDRSVOH+{T+K8D|IhQ_;l#h3Ijn9{& z2cFsI=>2BXxA=6~&vv##y4WmVq%K&XvW=1ww<$x_mNr=_7ZPaCkf@0Tu z|E+Tf#xf8jrlGDc4Mnb5U;z#QD>zVrqOqr7C@!o;*l$}Hnn2wt)Oo6-J;!|U>!&&o zP8PhO7)=zTK!qqL^<;=e_kSK7T_Wb;U{WGK-CbYk0JwJmcy6IU(+Lcqz!3_ZseTxg zS`OX^V0$m5M6zt_;6IzbcC2|cdAhg}2ycNg71*i48t_O0mN-ry{^(NgA^q{7QUVN-u8`pm0vQ8!$Fn7aqG97_;7d4Q?Lc zwrV4o5c-iadOc>Gv_rx}#Ktit0RDkB@h3m-teN-+Rq<`0ntCGok+r>jukh(G8|JQx zT1rC#NUv&S%;QZ%iXiyy+NEn-151kP1QLBC*+$hxw29`4E zB1{uQ=luX2TOvj$2S#_IgYov}UiSz54JtLe222Q-RfUW@Q^C9zU)fPro2o$;ZG4a) z8}r3Tv%UwnclSKAsdvYN{H@{Ixj9@qCkWGp>-a*`#c|!ygT2ol=cnwz>^goG5jMoq z@d+brJqo|h?}z8B_%W)0+B>wo_l4IxP}X#n0K|18+?BpMJTeGW49vE_g!=_%{DzV* zjTOF^oFXkHEbeeYE*49xlW}zLXE3e3`%C`XeZCH`EcWi~UGb~VA>M1Yg9*WF;7pOr z5)2SMXE|fO9#!!scCD0%(cu>!h7`*S;cb8ZXZ#%}HOrU83U9lb2?5@?qZoJln)Ntz zqVK-P-|DOxpRYn#G7q=ar|#R(8~81M!AQ++1+NjV@9pJ^HyL-*x==nAO~^UnQC|2p z3}}f89si;NM!^rJ0iWqNd=3C#3oCRb;tr}HD=BVnx-3~Asn4J_zko3y6$2R*U+ox; zPW5j61)qrNnmupMeQ^yy>ICp?C8H1NJVh39Z-V>Im!g*@nX|L{X5ZxfXAAU0co?n- ziIaG}K;tq@6H6r`=zo3)Z&e}&Cd13bRNC~9_?uGCEEK_t!$79>!mYQv7BgiPfK%dD zA@ldZghY&PIPVu%^uF{x7y)7x*|!#r8ZTI}S=`&pv57h`uS7v zs1mV|Ons(Ca{nLsga^kgUmz+B2UX4AaNF~Cc{-Jgb8xqO?;Bu7B1MOiGg-5NEl`-=twg{5f1O>E{~+$oyw)`gAnx7H#gkDDAfA)j zq}5>4hLy?$fgXMr{-Q*Tw*4yBFMr&C4*uqI`+)Pa`vY|0dypt5pXF<8g|vJ;o=9Zl zvap>71b2CnK+*Sjx0@%0I*>d23B()FAKtm{GBmsP@hP4N4~o0~-hotnAC{{S3RQ-Y*8aQ2kEL0!NkTeLB|Q zqcf3mfpL0RhESlpN4sm$MZ?|6l@b*X#MCPccll!L*)xT#77iHnaLySDa%?#03n~Q* z^|9{cgjC1pq8{k|aI6a--8IV>u?o&h#Uu6>j8iK|YSOG9_~W1#kQgyv%yY+yr~1L= zU}B1|UKPd=%f_n>vQeb8p-Q5v@MO>zmx2L_7@e57NUVCqmvv#FJ7@QT3BhZvdRD0= ztOlZ@$TqdnS_zaBdp+e=i!G=@}#g}__ z_IdPv`8Ld)Vs_7lMT<}Ij8r2Jj0Ofa41IO!^$)`~2j(09EMFno>~Bz9YDQxrN<~e& z+QLY8i$Jn%UD&!y#As4}>*c*qZ0lMfQ*@Sup9?8wF_J6#u((;3Nr$aPSx}CCGt%9; zQX)nJPKOxlIkcn;&lsMCT37L87s%E_FqejGMKaAfl`Y6bPlMC_?*-k738_vv-W}T6 z1(4wIEEK7VHbV7chQyrumO82SgspHAQ*_s%S9gKmN>oq@bR(1_ee=VcdzbC*+6FfH zXZHb=lCV9fRMeSD1vg{*G|MW`1L^L%tpL~smlJ0l=jJyu05%hKdG8Mw@m&hcs^(5| zbhVrVI3mp8qryoikwi}@;HmPLbSKB>s}R$>9!O&Cz^?q_C0)oI^(mB!9A<2~sFX@B zv&a~v+zX#XDi*?TPw(xT;FCsY`6^i*Kr?23owNI4F_mx_hc*wf?i zd%Q0A|Ui!Bv za^YPH7@+`#Su`a1Fyc3R5kJQ_JI#M}^5rP{6xqEJFn}N=Q{{gKCp*s{^zD&`{^FYafcnYFS8X25T2$wG^=RYWqal4Qf zYL%`Lxy|Lu?zy60cPhI)5^Z5F`ZeD%PWwziwXo0h?zVRC89>BkT^@&*gZe-?(*~R@ z6lOLZa4#Rif#JOGbx&W`omjI_6EyL?i>~-*$4IpCa(E5lbP~u1lMwy#6FlrvSkK`O zUy9@Biw)bcvjR^Gw?uBwRbt?2%Y7X{NjlI4lqA5K0+Pivgs@sp0JGu2bm0t$^^Ib(>*llz!W7X-q4w8y`57O{V8<9 z)4gD&M2t>-TLaPDK2KX8)A>GM_t1I=4)CaHI_1*48!n#%d?%F-1;XfoJ>4~X$h|6+ z98)RI%r6T!N7wGW`k#R&BRKCjPoMXBm?eiEaJ5>1kktauZ9(9&1t)5F=(Xrsx(l>v z3pNps(S6M5iv#C$-46!3XiM->Nc6ph=LTG>%h+>PBW`qrTsnh4lQu?@? zfxW(D@7g=x^ADgs;cjpP1SK#CNB~Qul?y>^(-ojOhd$ZhZLCM14R^=aEYt-3{j1;J zg9=Z5I(3eiOh1OZ;t+T*&|(6fgj*gC@RLTe<-|h-d;}<;f;k=;4|P|rKSvYv#$$C0 zdg{U;K?0rccGUGJ)`iH6$6{ht{E?B-oaycywUc zRg}*kLYID+TGhKI32WVE&n%!`i~D<1LsL%bvay)1L;;0*lz$U|EHqDwieCq831^a8 z-<#z4rT@xVsLdDg2qa_X^my74KgW0y@C!c_??PxcJgc2syEzYo>qu6eZ^<+XV_lO# zUIvycsTjRMZ`t4b2GgYmrT}YQ?1W?l3IlT;I)6uZV!_eLul!qjH|&770kK>jTwzH+ zFyQysD`A|{HvKAhqF8{?)i+YG-;;>@QLBEP>t!r&Avg<2@?zvxUL&mxVekT~n9gR^ z0I5KKdbusrUA0o86PN}1h)8c`gq{HEfY=l1VCma|)mt*Y(8;&BE0EJ-+SHR>*u7Ld zXfE2fXvITgD;Dh=tuEa-a?|4O5PHcCiNE^`Fab*6XaZeXSl~tXj?Z4|g}|`;&L}dK zVDgI?p^OEva;S*KNIP;V6~dx0hdf_`p)J+*j?O;#)ByUIO84q@upGm52NnJqCyx%V z4>cVC^oKNe!kE6O3M)d6G!ZNx)&Z#a zVG|9gZ6UeK2OvQ{O%r{j)dfP?g|+CEQUA~Hq{gr7j;&970ILzqn%sbWXQ_wM?nbDk zks<85?yl7fDACNVW&%yT^O;SkcU|{fQQVau=sq|pan{q0{KF5xxR&Vpjx4fN{@Zld zv&yk(oE%;<78=|$di{W7=@TPA?`@lSS-}V4_`-dmN=<1h_*#$?QEr5S3S%vrLHZ-` zMkQjjO+N+ayE~yY`spKGxY)jO7Rv6$VPDf!NDOP{nk_=nz=E(-iXR3O60xwerryqO z?7eyz_UB*%s^UcxQqS#sHAJN(&JNV=wS&D+MfvT$an=UYXS6?I1XFn?TghilwtPC` zi$&0jx4`r{Uy3xJ;LBCNc>WUfZR*mAp60{d0|Q&EvsV82)VC5gX1!)2l(yJ?#ROD) z$N3Mq7Cn9|3@xb+9X0)a5Blum)P~;JZQXtRX#;=^#M#HeY2A%XG*8(Z@odc=L9yGR zJM*PbNJT(J$?%S;-Yd8B%Ryk)IA_3~D`}cVmkIdvFekzGhv}~I`BDHAHjC7}y*uHP zoOi@LtA}S1uKmpo8Bh%>u&^p`h-Fgs{)uNDVskJROLPc(_z=7pfMoAIk%J@8D&3+L zpBfuqq#Lcl#_cAcBK;UpeV=&W=EvZkUOX;HzAb$6tL{F>Cl{GH%wrIcp_aX)|NUpU#=WWAUB%z@HXOJ$xSDX10MFJG7i8e1y*mE&$zm9jo!FjTEk^&Z zob}F4D*=PMMv&G>rV_5hrFuM#jz0n;dhDDI{n4iRv?Kpg``BI<~St&yk?b>ATtW5HR#(Gcg6G~rQeNkECRN0V~kYlJJv?)oiq;_Ulu zNgH(hhAS|EZ~KprbprqbRpp?{L}$yfVQb6SQmch-AuTh#7+3D5e>>a3~WjF1Y!@iyPwofx05Ls(tE``C?3 zhtTGKrPlUZH+NO1!zTL|E$)t|#(0|V{Xp}5!_cq$r_L=O^gad``ywgO{4WRJGxWs5 z-&4G;)_?B*W9&WP<*KUv@l0-;dvhx{y@!xO&73kVK*IFi`$(JKdmoTXR6r0ZlDP*F zkUUfrcuGD9gNg{Es3;0*3aNJzLMkaDB8a@-+OtmrcV7IzKc5df$y$5X+Gn@3&t7YN z*XHZaJDw1IIenDbBiFZny!i|B5YDuxE{!6~t|z780Vq%n?5KE)TK?STvAO53@wtz_ z`=9%d%jwv2a6IT3{q_u*!#w*u%&`tudtx*nJM#6fL9(D1&?N=zjDUU(_jDTg7ESQs zc*sYoePE7(tI2to%%-^G|NOvPIs3_x&%SyCHABjo^roC~V;nvvQ}DSLmr!U1jx$gF zbn^vsz(MGLS7EZrlO#SHF8SGieE#y!;Q2deFgv?9zIeXb&AH{`2y5tH^ium+=t15| z@IT-e%cBWn3eqK!)&TPr#1j8ef9sk3YeUHd9!P*W4}4O7k%;N z|F9Q*{_4W^OE|$>W5yIh8U}Q%dNg5@2kJ0N6^1k3n9uD0C0wwbw*rRfx|k>MArR>& z7oGzSLw-|nIIPwI`rGayz-_B)K-rv-yp;m-b8lngd8?w-PAqsc^VQcjkD}KH&t!*- z4S+C*LlkLL0o*l$H+$wa^maNg_cLTO=BD3*47k&RR!Ngam8RxNX#oP<7zOXH1d;(z z(!Yhn_J63--1PBI05r?IzIkju^bKUCx71M!;JGMBARmPbw>sYa|NHgLqjSz%h4D4+ zAdzp$LT2gj|Kqv5{Ck*qVMDc|q%|^A-RR0I!HW;c1`E+2;C$7=15D2M&w@uU`r~Hr zyp%Hr2y5_ag)Ct%YYM#BDjqm&APMtU614Dh5bv;j{&!vG{;#h8|8-}I9V{M1AY##; zs|TLu{-bZKE5UgXWm3Nt_G{DB7hu1}b{>1J>Z(#^txly28?3=#0QP}7%;SH7+1bHj zBv1Sg3dUd5ocUK|vNBE~h#o9OBy;NXj$|%MRqZ+%7?*F{2FJnn~L3=)ttrTlpB65Y+E|B?z|qH z)rqP(;3(Pc?OkP@d2!F?@zG8eYwTRTZ}X*N<^+Vm(IJCW46uqih&aS;FTs&?q=N@B z{-3U4Zunhs?m3I+8DyPANIcj&nYGA#UNYlK7^SsRy`J_nKiUjy;M4DI9vbwe$^GP-=IaO1Sed85 z&y+P0mW;A28KUj(nnWAXM`R)6=-h$RZAiIUpGN&#ss zY29ECL63HS3p%HR$83?jf#H;IWa5InrF>`_hd^~iR z9X$-DxlSJQ*6XiGnz_SZ-dl7XNWiAptgS3Ik^)j%N*S}@5)Re4gr& zW$wp|n@{dQEfGy!3vw`)xuzyJW+91iMP0L0BtAFU-Yb^84PrW2%>AEo<}z>I{equa zZa1=)_}h1FUN$iRF&mF?GBZYwjJ!4SlaVbWcaG#ozAz#ixpZWF_+P^Zhkrl(FPoEZ-~*=i9T0Sqo-y296H=dEjRQj}J`TJy0CDZa^_` z`M{k1fA=5if204o{zv+6>reN)`ZxBk?H}d-liT9{j=Pon5cf;mIM>Qu&%Ka4(D%2# zU45_iJ=OO>-%WjiK3yN(x45sn_eAesdtdDRPVe2lrQYj$6}^}D&guDg&!L_-dYYi0SL*4)2+|j+S`?ZDLKkT0DzNI_dZR!?xujuaY`dinou3vUN)%5`L z=`*f*YfCe)o2i(2#mu>!PdORRyPQ9Anj9DO8UC*wzfh@#DY$jscsICqFJXEoM5kJ zkyGr97n1~lN0lvtST_#4sfx^y(;VK+zC;*cCrp9W#da&IB6Y<|#=Mn@wA0D=2})5} zlVyl2QL>aYIFJNL{bj;U`R{-6TLWMvMO}u;)F{Yq1ADTO=Kd8 ze`38tokl^XWG*=C)ahb0ur$l+Rk}zAq}=7%Gv*LqumZ=uRE0`;lvX%(v>;ul>t6C= zoVd3tq~mc~6q1)HM1$D2Kthx1aXUQ)t z)S@G-0zpL!anXKdR;bi?3z{f-9a}#TO_8>|)L{|j6RDzaMD6FS1GvpW3V5Z^!g5st^K zl60a#iEIh2rW_WFwZd+88Ie>aOH{>bV}fVWp9dZSxJJA zBXO&|w2Y?XHEAtdQx=s@-+UbQRprI<9zsp4eJ;quuC(|yNmfwUo}iNHfW9WM%l$l& zsGp_V6mhcXb3v{zMY2>8Uy@+yMo4t+(}XADK4pb=I|x3GFs|}+S+PKChzT@7t56tR zwYXisQZG^|2>3K<%prNys7_k({#L2yyhe(aIkSRY=)o^lOWCWgt+f ziN)7k#mW&U!em13BBW|6le5zkS{2J6avCy6L*~hVP-OB8);rJAsVJH7rBk{@P$!Ct zWca}OlY!PTo}mxnB>>l2l@({3(G z<2DSNQK^=+QPL&K5}vBIS|I(yc) zdn3zJEIrSQkP=VU#VZu50uOcN0897NVX`XsC)GMlSnQY}F5k~GoS`~R88U@}Qx&O+ zNy8f~-JBvRXE3a?`$Wn*FXX_GE0v1UQG|UZ7ZN92BEDz-AKB{C5=GN>!cAt%x`HXW z5bvLra>-&LYC&Z^E|n;gMd28R4w$Hvg>_r3Oc#V1hbwB2T!RB^E2UbFpab!kwq_5D z?WM@fFqU5`<&{KSp3T*)l}HxCR)n~pOM$4uY|2GLI&&>66wF`4R(F~+gd-R*ipwH( z!7I3WA6wm8la<8w@=lQ@+N z8aAG#3ya`f<>R>$CZ|LeormL~DL*GOcO@E4q$*neAUofRITaj!i?yr?kizL(mtrDKa@iUgJs6#3nS{trT&|;}ZK(V_ zB$=1;)gEOmQqmN%DQPL>5sHFWU5Tp$at>f!P?TL_o={qH@ey_p%Lxlb zBBfGN`m|1AFN=FmV>vkr?9Q-2c~ON}6V8kElJ;Svk`0P-e7m^pwOGxxXd_02sAL1R za-rY|; zSyCY()2c+7U#Ymu`nWcW>6vQOKt(lbrN_^AdDYR&7P9n+Iz(jbb*tE?%e(S^Y6eU9 zW|d?@B}r4#KuGBqtbGIbLdK)a+a}5?w^FZ5%W3|GXIQ#D7pxlUK4q;Y_Q=ArIjk6C z-9jm{0d?MLmzs2biHW6?JSnL$R((o37$LIs1&?8RIu{KSbyDk#dNn4aE;8~l7M~7V zXtEBNNI^E3?wYw-~?27eleK$`-$yKsoM5*#=Y>8PIe4~;Qm#Y*2Pw^@luT&Tatp5RO z5A=UZ@O@2B=XiG+8*%)>OCp2Hd4FxF6bS&-BnAC2ErolNTRi#a|;*xN;MZa|ky$bHs4g}`|6rH3qEHo?tM!D08vo#LX3&uro}#+mT@aDmdngRq4i z;G^*Pw|_!O?aP~Z&0EXHjKWEFuj z&67K`HI>infRt73VLNaH+S0*eB+u<+a}vsr;x0xw#kh<4JdYkuD+X|HbCpPnOkz3D zAA`np@)*vYjSbDY$Kgtly}!)O06d1dkTo#}DB{--+|7LnO)(F&)i9L-9oTE0EJx!Z z(o0#aa0imi<`P)PP+wzwq=N_kP%s_ZAqJ_w2Hf?Tr@)1povO;9&SNFyyl`9qDOgHD z63dBpft(H=vsM4@swRMGB7oGX)Var1OUv3AorvjNCau<|vj(t;`_DkPb?_ij;X)Qz z6LO!=Z+>tFo_j$O<`f>rB3uI`B}6IXPUqxeEwkn0&9j-iK7lDUox|LJBFDxp9s2}C zfJY31H^v?@E`>LxC5k$mt(x`~9YFzV57@AK8lzx8pT=V(eV^i}0_LHf1`B)e^WMgC zh~z*($2g0Ry5!J%iJUOZ&(Ic;1R_$}0{3$pW22os6p^x#+0cJhm~Q}t8K!cm!`uEk z1fV+As7y3Y$Z8sW+12iFNXkB)%t%5TacBzj0q3l&`CX0W5UT^u-fY9{Ua!Dz5qe~D zl}BE&GPiOXbD3uc8eskC;B4C0eeooKzcb^r8Z7FBaIkR}#C2@O@D(uCYTPZoKkwc? z^E77+nV&y`)bx@fVzdmYc{&Xoc8UUE55N0r* zE+UOeWD4oMzJx*PPKw%74^ll2H^zsjv%pmDg&=G3#|xR4hR@EJ)<^@w$Ba|Ob8|Ud zbH}t46-+yP1!L5$pz&h8V-VJR2aoZE)*=_HdloTA2hU0z9BwR|BW2VBg-0!xCU71(nj%p8&_gPE%`&fI#<=J~V# zH`5qz-akJKS)A_s)#m;c7oN2bdsUVyB&w=GQYi=o@B+Stg95-29+Lwx%+1oxLvzks z1pq0&0y&d1^+w;y%#$n5H7n)eK~o^SALX?UKu%{R1lL1s!4<~M3oiV;ogKUc&Qr5_ z|ATj*ZR7H@Z8VVJu#|$t(+fCETzqK*tj3lW2d%}n*{>3` z5GIOp)#`aiE+f+eAUKl4tN=M3JZ8(?5QOsPWiKsmezXF&2mFiK_IN~jGoR*#O4*8% zie=*zmUF`uAg6=JY<+V%oS|$VEQI_ra29}0nnIY=xRY$gXdz32XKmi0g@nIyK$Rbd zIdo_(yiq!M3}>kfvi$J3FK((Xh6aH_{TA4?a0kIj+wSM91AbDLckm+#EGD_KF*ZD% z)rQD#LMBo;QkbW{2o1ppXm6$rSCn9O@G9-rd@dV95+K{-bTX6M@)o=#LxIK3$~ZdM zc&2WK*A;fh@0gA-OaD3>M0Akbvy^%H#o*$mW=`XCHe^WIxrO`3-j93M3@adYHETmg za|&T&;qLM!0x4Cl7E99!JRZ3!2x7@%Rm#8$Sub7n>=g zMC#;4e6biHJfNiuu}cCG`8l@=S!X>+jQ#P|&HYpZg?zTS=j4fabbwDNqf{tsGucfE zNQZkBJbDM2IU^Zg#Vr3;a&fcwYM7df%&k5cK|D42QGX$)%9#B1nA}HanES43%w5hC z3u(dU;*4aSweF{0WYO=5D;o&4zSWCfWH?GxsV=HKl^DSO#lvnYiRb8QAzFXaS@=kN zhY%zzF}4sY7XILHgl#4ZV7l>1xO*%l1U@X{f;AwbgU4(gJac6;y`}+R1jZJE!eUph z&n7Lpt74(PN=Y+x6ic}KGLR6Q&SF~e=$grI?f~TZ%h1#kwh%fQc5*1jONAooFWUsd zv_>3_i%|d0VX7P8fZ4%gw(xFje<#d`ar$V0!|Y$z=waU3*tqb50M1^0JNL&BjolB? z*n#GXY#*GMOs&sgk4j}9zXpl!h=53)H(0=O`W-Er#nZ{mrhl5)6aHKsJo6$z7&^N* z7zmAy$|87Njk9dj$C*!*jf+M+)5%PZA7yd!(<(TFECkpic9K`%I!a7i%SN|IX#v+z zMq+8qX2god_~`#)ZCaXTv*3J7fkw~L8U;CcM%7hiJ4I;nQJ*Bm6K1jmW0pauU2lZN z(#eBkdG}go^wK-#HD5BqYJnq63vis+d0@?1y?&B(2Fh@M;i9u~Ea?FW>{1;(=9Ocx z-NBde{N`y%0}?_Q2v^BNxU8fL;Dl*6O{3qg9_=K4!H1DGO(!$H@4_N&e>*?JhmmE!5%n_$Wdm6jd}ht?0*)TN^JwTOS8EZd zz)=!ZSZdA^fvB4oD#vv7bOIeQ=1n>pBO@Iw$N;>KJ-}Y;Xn282u|1>IukFQ+S1Smep{$Xs*KQ~rtxZ{WWYn8{C5Y_BI0i3TztWa6QEr=D;ujf((n5mylNx4@%L3!w!GnXi6(53| zO-lnZMVdr$GfnaHIYU~gm$~I4{M$=x@Y@a^WBK6a_HlP%^G+MyQUN%IZG(z0(*|j& z!mCax6&{y1faQEm53{$E$F%PL0YK>d<^CndpTnSla% zYg7GZ?iLPncb;57v!}@1`j?!1X3y=-`^GoF3mF^gr#LfaaDTCT36zTMP7wOk8T9vC zcb4Gqw)aM$w7%B|rRBr~l%^9ED2*pFP#R7|pwyqZ0ZQ!&a1R;KoG?MDKB0nAbz&ow ziW5R8Whd4_DLt_UO38_3P+oIl9+VRsP9OzWpFj$(I*t@vc^oNNe;g?g9Y+cT$B_d5 zaioAgjucSGkpkj4Qn2ngQgFp_q~NmSNWrDYk%EhlBL!=ZBl&BNBl)Y3A^8^_L-H>? zhUBl9IEEA~J%$u4IffK0K86%5I))T1IEEC=JBAd@J%$v_IffL>K86&GA43X8k0Axa z$B=@-qe#K5qe#KPQKW!-6v^*9isbhmMe@6kBKb3qBKb3pPJn{`|2YZ@`aeAi3i>}e z3JUuFbrclze{>WS^#9{1DCqzDQBctT{t-~n|Fd;M4{@_pn%I_aaK>5U> z0F>W5^aUutd&mamcMj>GeEg6M%Ktia<%}5<{f`}@;2+;UgcLk_2q}2v5K{2)A*A4; zLrB3l4%2= zko-H}LGr))4w8SzJ4pV-?e8E3UwH>9`0_!d;7bRQf=vgJf{BAj!7T@of-fFK3T{4# z6x?(WDX1Sr3Tg+Dg6ct}pnMQ1C>=x!3I~yb+(9Hidl1P_A3*X`2ax>a0VF>@aR4cZ z9Y6{q2atmB0i+;w04WF_Knel}kb)ZzAO$xZKnkuufD~MJ04cck08;RU14x0lg%o&N zNP)A36xdowzO{wqTUtoIxrO8#TS&g4HGvf9TS$Sfg%oI7NP((_6ewFrfue;J$XiH( zbP6euOd$o=Od$murjUZGr;vj6Q%Hem3MmjwAqCVFl21+{`NR~G&znN>*G(b$mrsqO z*?#F1QgHDUQm}SEQm|$}Qm}eIQm|@2QgG3Jq+sQKq~OB+NWt>`NWrrGNWs$mNWqf* zNWtR$NWp^rNWuL5<514qkL1tYkL1tUhvbj%L-I%WCD8mI-iH(n?L!I%_aOzd_8|oW z`;daZeMmviKBS;~A5ze@4=I?r4=Ld60|ngw*#`=^|K0}*xF7EY1>BGJf&%V8_a>nH za4*Q`{$nr5=YFsk;(nf<9k5?_t;)g zF!1D=IZ*!K3|LMEzJCVZKLbyk{vwp$IgQ>CkDpFKx#e^S%EwM$2j!!u9Z)`U+5qLl zrxj3s>ohFpfrn1>q5S6Q%b}b+y$Z^S#_1*S$L7;W!8cAL1^1su3hq6H6x?$PDfs#+ zq~NYoNWoW6Aq97wLJDp_rHAs%r{FmTzI19ml$%ZwP)?j$3*{}RmO=T&Q}dv_>D2Iy z8KZ-zkmTCQI+T@@&_e^|iIZ{oqjb^-W$~mN%EC$5-3Ia}VRswIorK+OAafFSw}I42 z*xd$_C)Yq3KZ!&~Pa@HglOs@uPxe6>dJpE)K;XR!l>YZJQ2O4BKzYM^H$Zv)doC!i zdk@LK_B|xu`ySf=2R!c~1@8Bd0@r&;f#W@-!2TX6;2znFM)#e)T~Hp}gGTqj9%wta zwFiyv)Sdv8`}d&H-MhyIzMdq-VJT%{%SXD&)ipc!-#TU z*$vw>_vPIndgR}`FNDAUd^c+Ji@Qgm{Ml|Ult0;pw7jsZ3}tf{3?=vZT`-i~=XPBO z^Pl_dE*MMhGrJ5>{`W2gluz$MqMzKwhw_PCmqYp8U8|sceAf~vAKNtt%5U!)g7VQ_ zFrwT?-u@z#55HZ4@}akpg2}g$g2vm|LHWSjNd7n8M)L1}8_B=-Z6yDmw?X~{_wKim zg1g>E3hsOxDfsH!NWtxIBL!c18!7nGPNd-Gok(E(ya&RY-?B9tbPu#cziN1bE3CinsAO&C8ffRUmAO-Fn zNP%kyQsCHu6xenk1=by?+buiLh?;kxZa3~&0HtBa7?k=QsM~ehQMYThqi$DkN0L?B zgD^}VZ%1=QzTFI^Y+}0_{*Z3J21?0x5tP?#=Rvt)J1imYRojQ#s5fyDm zq6ORG@X4jNRiPxeWufG4i$b|>+l^3Oz75Tl%eEl}Yquf!YqlZztG6NftF|He7j8rH zmv0jy1xvOe1&g;K1q-(!1q-$z1@r$}g`S$hW+Ypyyn`&GtUj{i~U$nH9YM z{?`(33xEaBVgmc4bds{h!g@*GZ0};3q=-@HLj@fW)Rbm!3V-fVRjzAmn$3ZA< z&wEILPLZowax&T@Y)e^A3B|n6gO|!W>M^f8eLZ}+poFfk1kk5~wS`a|u}n=(kX6xo zQ?};U#OmP)AiBX__!1%ib8tJdj!Mj!xY|w_yr{V$h6K7>%g@DkmJQ&FMu?O4crfKP z`QkC$W#7J~(X$l5sy>6Ek#*K=-k)qVIAh=e>QNDytSoE_dd(?-#1p3B2_|Hy_o3j65YD^1#%QvnCNE!!1 zmV#Sv1%ypW_?|cl`1U}s+N<#Sx+mWlg|O}OR%ve8$pO2;(n}_LFU&uA$yv*R5zxaS ziZ1R&F<21X4K9;BupBUFE|{Fnyisgi06^g9s{vUMSDy=dD>qQkn*(A8y#NF50VfKG z?gTh+Xd#bzrrZFu;PY`Ia4tO$gMQys1rY|jgoN-zz~xASX#~M=C;%Kd3TRQ~#scQW zYGZKj`KvH*9r@9!XYacw#bL7b#u)Sx0QEq8y%BK2Jt=F{=mN+K2pPn)>ghT>)%mM1 zzT5PGsf_R_mfh6&Pk0oSn;MUgbxuTf%5JzBF0nd!O`rZXK!sm?OT#@M;naKWN(eR7 z)D3oP6!1Y}5S~{(H{&mud;Tg+Zt=(er{!X_K4Vx3_soxSU+?`0B9%2hd@jR3!1YFOfav$u&_B9LY5Oj>mu0O@YS+kAS;9;?wYu$ zD;$xPM*n{5Q~=va~+K2o3uA6+0nxiSkK}#ii7c zNF<~qpH7AV^iyk?H$VB-;^q$;$O33=eTEV0iSq$yp-xxBp189j*9P(9l^%dA+72Eg zDFMhQL=i4*zV!f_#nu)A3dJw^m?D^UlU`Lq3JGxue}F=A#+f_rhUwSAV>UG(L6*d~ zmNbvwji#Tmbs0=Q+}$pI(qQG~b-{Sd>Cq?SSj@9`fw#eQ7L!~5&vt9tF^%(^bH4_U z#?C%SEOS{qCGaya`?zo`-Oekc|#s86pco))Z;IJ)D9lg z+7f4-FAP5cSBW>J_pD}8KW!|BJp%AN*=CwekkBe0FIrM|nJEkQtM(xM{HM^n(^<^@ z56o?!zk1p}JIj7{R^-MP;mJ)cKrLklOqS&3tdzJElepugzXWmXZJGDJ*tlS%gNLHl z+sTyYGbdjJC!ls4M_vMfmX_e$Lj%--AWvI~SWTi==+q>;$=~o2Jah+-+4Sm9vC)Wm z`K7Z0Tfb;5Tk>Ud3t@@km6uP%VtKk4bK3&3OfZ?lZ?F>&g1`bV?>EOQX8FpFOt!{2}Pd=`7~Wy5?f$uDEY}0IhU@c02nLPKXm}%3Zgr0{nOYvXJ8= z-0@$*wj7$ygAnNp+UepKHg&%Si_>VxXwFDOUbRP?w>d;qlzH+s*d#ir44gf+&5M82 z01OjDUgeNc{s>9NrG8;iOfdKV7MZ9z$jp{q>(tGW-ytU{U+Ws^8GJgHf~%{ApD-Au zD)3y-1(@pVps$0rpZ(8c8`T(D_3@{Cq zKQxAirg50u<9p8fJN=;nASlrq5deq$oXDiem#Yq2fD!%?+T2NIEIlDZ^J}r&S8#^|W$lV0Y5tz`Y*7v{W&zkZ1}HBZ^p@sRy_+-M&G&$t-kiN@gkC}xMM>S*QvXR-tpA5e<{KoL}!`~jhV>km5zSj(|9UdL} z=TK|tcSBo;zB#lBB77|n;k$BZ*5Lbty9a+Y`1FW;aP#2JgTX=lAb)V_VDGGx?HJ!5 z%({P8jiW+QzSClSzcX<6K#2|Uo!kFu|HR?`KlL~JAM3xfKiBW+m-JuSKhFIZ_aOK8 z+-JGp;(nQ%+3z$yR-L|-XHYd z-&^nX_v(77-o?G$Jtum$_58f&yFFj;DfL{}qv*N3XHNIOyAO5$vHSV%N4szD&UCxF zH+HX?=pO0%uxqO8w_RJi9_sp1SG>#Cb!FGeu30nxK5}H{o|(Uz`Si@qGjE<5oN1UT zn7MRjFXtp@JLe_N_c-@*Dv-w-#Yo>ZQW&`w#{y(Tl(9fcv+_Vt6L)EiwEH`4f9s6W zmeZ4v#tjmlRkY;-;lxSMG81-*TtcRV@^Hv3w2Dan>i)LlcE(On21iw5Dfts3RfL%T zDwbobMwNtB5iB{4x@5+dFzGPeTCi40c}1_+^HcSVoIeML`DLs*9Z99i8fm~9NLI+; z2zGbRSRLUYA*vT9AQx@Kp*P2DY=f*unVAr2MD`+~NYVh4^LGu3u;;!AiHqPLdH_cB?)`Jl%V1|xjdJg zKQW5MTau8(7?Qj@l!jkSo1>O`vQN+ZN+?PMH0{a?D>T#Dflv zt&m)h#q!M_QIM2Le0hi{Hc6DRtDa@)Rx3e=b149EQ`m$`VhqP)Wz0H_ilC}0UQl5R z5Oi_|&aay>Q@*ItQcD{hZII3bhsZKb%U0GTtwaXAi3%jjJait^EJxkX})5(?4s->~v!1u0Q< zWy@xnTr5pjsdHD2l(VLg7(?V@_6KkwL{*ed5oE#Bd&`mKI1DVKDT}j& z4IqO_SThh$a+wd;*Q6kStXq`y*L0qmN-e&KVCkNSmm=K|7%o$$-L+)@pK*9tMgtE@ zCY&iHQBY;Tw|>PX><_esEEV-=!XYQ$k>V#Pc7QdMGD`c>#cD?DjhM8AnU$lic_25r zAfe5ec$TV2*v+m|b;=vq_tTrRufP=_0YF9j$il>WSy}(k>B(A{0g&DODz77)7bjc{zr?NHv_#_@*wW<=+ zX(B;Sv0yJ&BlHk{DmBfM5CLOYR0&L&gq|dQ)t7L6RZ-yMsoel4ptcvaA}WmQtFlfC za+~NfMFk@6Uasv_~8Ix8kAph>SnDNrlCFBT3EIQ;9&p;Ft#C2I|lgJgTm&}PpI8-R3GRty=JE96gBvQ6s6<@(_g(_o4 zN(PlmsaJ1vTIHdxXV~TlEn3PBd8>o)fu6V1W);?}EJd9DoVA*UOu7&RE-~Wj%A|=; zO_+tgyxpU$`@P|X>>i+umI{Q;R!RBQW~sp%U-lFB2N7$L%GOPUTVT^yU4e@~V&#Wu zo4{@oMMQ#njEEEa*y?<-loBSYT6;BZReQ;$8J5oTWl3pJLYWIS2#*qwD__D4Mcw2k zd19VYq2L!HmgKArEIpK_NLp9S3Wm*%R3kA(MHF>i$3aMfW<12n?35xu7}Q4mXUh-*e#5JS9OPD?fz4HY!yiY6X2euBkIbp^Oj$S9O~aH~^>5*M;>9H}^0rua#h)f^Mj5`E0}y|$Q% zjHD=a=-uvG&Y$5Ml(DOC!Ez))N=TH9d02+J7+n?#KgDV#0f)Tgj~CsApw%BImi~yX zZj18hh#tbXykT{gC%ketODFRNGELjH0$H}2(1%uG;D(I27FN(gkqY)-zETtP@YVNY z`QlnYU@z#TfO8&*%Hmfiu^e#%!jwsGMHi@=BobF*^+vY3uUyvZ5)yqrVhwu2s_(L7 zlTs4aDJY)`(x_X*G!6^Sh{a-utWc@RDkYbv9wC>p?>{l^*AQ-p*ThTHw!AGNQ?Ocj zrUDfycr!e|JP@|VhLxBu@<-&PK^JvJ>Qc3yPA*{Iiz1(+MA);&nq8={i5&tXkFBrr z>nW?GT!=~xHAgnG{MRg9JP{I58M`^0^O^~TkG_K4_k~4sj!b(ft67^%$|{8IA^Zbj zR_rJA5wXmem*n_ln4F29R~QFO%@iq@l+3YOIVOI9tsbDj+(KqTCel%e#Yn>uJY$7U z1I-KQ)3_Q&&rWouZiWCju( z2-I>#Mrk&iE)8I^AfAxNEwqCNAqtsva6Wqo5Cq&xN-2$Gq>$<*ZjKD0^^DfPz+H~e zg}P8gsK{7}3SZ1FP=Sc{lRjC|?F$p3TAem{adQMhtA*5(sfvlrx#dxE!}XZn86wBS z!OIzbHX)K|B)q(jQW|0epWR3JHm{hPFxe<=L>tQSHQ|l7v2rYV9~n%0!aT3sWvN6~ zvn!gf%!O%z0>UojnrI;;TKh%(ymZ_P=LM5Mt;v|OLh<^i&XUDWbGcyQRp636O)D%| zI_(qsX+CL|8zY5WWulfKYb-;ROOc+s2(odza^a{zvy`QalS)z?i4?WPL@uWYU8Kcy zs!oHGXhPw3m=bnpFt#2eW@M;*LPg~uaidrqii-TCm7TPdTIL{C+Kf5O6PW~t@LWH% z6ZJotuZIdksoM-N7|BRt-cwjU-~rjGgjC~?DJuX*66j(3tuq-gua~W#NmwbToepZ~ zGNmgE*Y3vsKsr4}k0+=OrW4wVmn0_H>SlG4h)!sQu7cQBu$zc=Z?FuLIYpEb8J$|| za3}q-3)xQ@l2>yPrL4W0u-THrLelsWmQTcEE+bE1$oh=|Q#w57T9zE~dz|r{+fs5W z6B%ljoF#|qK8qBhf6Mu@PDD?vS%kF`fkKKdC8IW}Ebms3#HgO7+X~Rj(2hb$$xj5s zy-#2|FJ+2Q-elIAaS0MGC9#;DoV*BnF$D}Zx0dfstBA`+aeYWw<0i#fQ!ZD~iEGKI z`|);rCNhqyw5%@%OEOj7D-8x`4&rt?0J25sv?eq2Z0cw#3STNqkM!>)?g%i?O(Dl@u5ju@_PSE@x+DW&t5MOKML z?@Q4C#td`HrX|!wTo{O0OLQsf`UbvmhbzxZ2OR^O+L`^h;LCkBmA18|gIgqgNt?-8 z6#-Id3M6%vFljT>%v(F*E<5xWxJByVFz{SynC^0)C-uLiC|@KvwLXK-pXR&PR|cN@cy z-VHTo860oKV*clBxYMh(Grgfim5Z8Z-U5km{jWZE(I-(Q<6(j_74u48O;wA6i~p-| z34Qk-xQp!IF|G9g1Ku{JoY;e&&C~*9cD7|AZ^|Aff|-=IRQJ@R5R%%KbHhHkG3?;A zLsGFVv^l4(Nax*@M4PXab9D$AcojOjgUoEY2U5X-!|vi{`Bh}oN0{dL7P*=?d$OcH zW^`8lC2`5!ewsOq>=hXG4&FK3xwXy5UV(dv)HjFg0A7U|pJk4JDy50Vw5#ClsUBc=2 z)vLHMcYV^BJv^PmY~9X*+tQ1_v8egpC)i|TJ~w>URLY#9bO3QnyHZtus(tG^&K&$F zw5Ef{tT_G)NZdLPAPD6jAwPdbQqPYPPES}6p>*+blAVjqk74LLdCV)8FT$PQ%Xcqo zF8mj2gr#LXH+(#?L`G4jv?ik?C60JPgrDWQPoWVVJjPNaGON{Dr;ik-xZ|Ak#(@|ezIdw(4>D zz|W#RrEVOa93Sc6F`PT*vu^h<4^M)P3v74@UKJYv64H`17j}w5lp=182qIWca{%OY zu$Z%9%FP9{CShtCS{`_EY&e$d06vP81`L*rOea)T@zj*`fRqjv*zBIghK}ZAJ(DmF z=9c^1q_UU=VVVxc^p3LFUX-ZVJ>ei1D&heG2+bQuB{gbfQSz9g;gZFY-Tu5c< zV9j7HIAl4g`s`jeI5|Gr$zxjc2f?iI%bVvnPYg~%fUmjr8FDPF6H%G4IsIByCcul+ z5SNHH&2$&Er-R3gEx3yf()m*tbPqJhajro+ao!Rp36nz2PnMKXz}aleS^oh{_)Z?f zi9K*l^N|mb717wTgABZf6s0xz^fl}48d4|Mxgpg_TgHQDV6J!Ym@^Ol2I3l5{BS|@ zpJzTZ{arGHdsFWZy0>-p3@;j_IhPEy(;{Ecj!W@_9vqiq4fthwDy2+_pzsO z8J@z% zPIGe`qojv<=EilOGE-6cD#!^dTe67%^e{9EygblT*(`o@C>yFfg_)Q>f*xuvQ~gvn zHqyx<6c?^)zVxXKV&GAB>o-sUYaQ?tbF0Xfew`zua=8q8E!!;<|0OWCHvkhcv8(@Sx(*Sa4 zEcnP6vx%6T!`!)ia%^ZC3lekQNj9JP`@Oeum>Vvfylx(VsY7Tx)9?DddQb2}+U;_NhDv*qg@WK}-bN%Yc z`4@?(&qb#i&tJ8<>4h_pj^(~$qo28Y_2j_ZxE8?L0}zHEg#3>Q_@;%Be3yl}ZuR7v zIp^gyH{G=ZzydB^J2^hr8a1il_wr~AV(h`&5B)t*LHpT!Cb@QUWc)l8m`w}AtSjBJ zOD2&w9(cXM_oz4JpdlL-&rnZP0ZN{ga>FH)gW!^Po+_{tDAqJb8=JwEZuVu9WAgxk z5|XS?2D>p~s7px5Y6U>@;H?I&nRk(3nhUAtymgV=8k=AdTGq!5UoqJ~4!R-#lmjpe z96X#XD#BP^SU1l6Y4&8_g(M-MKliCQ z)_uB*d8?s^9AuAmjlk;nw8G~ym`s~!>>ONup6SQjw{^~F^Fso5Cis#-I868(r_zaM zhbHkj^S%hS)eatHQhAK^%5{j*p~2dU<6Q{M;*?1kGm&+>I_@=A{DcrNTaX+TALMlK znB}qY)sug|Z*lV}{v_mlSHf$VCSz_v-Vo5+m5@N8y^fX%C&xxQcsQBM#txGp(Y9=U3Ac%*~HaJG@FoA<4`cO{4E-Y|LDsJN)i zWJ#Ht$ixH&jmyWpVt|$C+Aujf(!pZ3T(nle@a~KcG@suvi9Rv>tq?Q;2OTO3R#C*Q z^aovGBcy4hnQzU7eZGT=flQXnn?$Km$YLr&8KRP+(!mRh0a*V_^WhgAWM=ENa}CYz z1(V=+d(Gta^NlWN6tXD9AirV-HW3OOQ(;PLD5iYPBxGbbFSp5|?!Aw5k;n(>B63fz z2Zvc7*!;&0aV=!93{c*9Fz%HHV~{bV!aNpcW-~SEJrN6vOs$jkcAHNP>=v#VNp)bUnwTVpM5c(ziM+U?>qN$m}{hyz04KLNt8`e zQ-!oe6+k=TLE2epnl$DiAz>3pTm^|F&&zFYdgysb7qL`5IW`}52-ssau*Z68M!5$v zIvA=(mxpFl>Phh7Js+1DyY1P}HlCi9`6mTuU5mj_8TKB?2nTsS4Rt^~Q9+_6l$v$D zc5?Nc^D-HqBYf7Yn5&0<%wSI@y)Ff`!~;26Ac<^ULKxx(3eR{2RGEFgD$ETZtlr2h zU$k-tcz!j4SY1v8u;D7R?f+RZw_o4 zhz(eVZyOK~r)R!4uwr1MzyD1C+x@Tf|DgZ={#w7UU(-+YFX-oRk8!@o{qyj{+@EqE zhm27F;1*{Zxz}+O+{?Lh`#$X&?t8cIkA2VgJ=%9iU#8F1x3O<+-)QeYds`e$@9$<# za$f4)+WXDkFZITIt-V+FuI!!F^M23no>ymvd!Fifpy#HZK##76>RH^=J<)xldt3L< zyT3d0huvTAE_Ywwt?a&{dv4dKUGH}NvFrJ+N4swCN_RQCHgv59r;QrNH?wy{0?r(_ z0LcBDBQK0RHuBZsuM8)_4`v2-;;5R^MLikFsVzdvmGH&lPHYaSx=bZ2W#h+H>0sHf zQU=w@IbG{G6SAsHV=V}%n2kzCMR}jF(7t@Dx|B(QsTi(>;I<**rj}!KT2*Jsh6tfC zB=(R}A7JrX>Gs`Q)l{ThR3T8&RQ#m6q>oyb;LH803~p7-G*!{kj*v!1+FH22(wy}W zN^^K3Yfd;+HIK-QO+8hYU8N*k@{G?Aj;7p(u#T zGHsx;PEnq;^GhWvI9J8eNx6!4yF>9zG8W3XLt|{uIa1LWE%X=pddej8@%&PD2plOw zM`?m;b(NM*NW#Ko*Dx03fR@ssVyLFm2;+RA?@}2{4--+^DxiINRXFO+lk>1mqw4S$ zZ4|#y&Y6?pXud|SyOOQ%HB(efu83CbYM#*LyKo~*_hr^BpgEraI5hs|hB?T4z?** zZB(64sV$ChzGM%>f|HqWeXB3#q(o&!E)h1C!|sH98%sBfOOzm42o~ZovELJ1K8K}) zVVcsLs~!zuDHhF;;02p7tAGoZATcmty7nqQmd;#hx zmSYMUeMBbiOL|Ri8|4p6<1F0}_fW9t_~K~Y2+1bqvU@c6RqFx?u_fY(1oXD}l|N;x z^U66Yzzb@NK6ipDL`C1lbYt=VQT8Qpc2rf~>7={U>2$iYZ{2|e$O;`_ZSPefki320 z_Xh&?_I=-3nh<6Gl(6)DEHXq?ltCfG#0SDKL_`D`2V@jPRMIVihzL523*h&idbiR^ z7s2uS{m75xoO-A3a_+ge&OPUU_$pz_Sb|WFgCsqvT`-zc1gO8Q>a!8%Qjw)nCU-iV z*z+N7r!5NKz&Tm235Z+}%fvh?%JBr#v_GaymoiMkuSu;D4UNrMHUiFagj2;Wo>rOJ zBw9pkp%9^sPB!OFS;{#Fw^tkn34zluK}HEKpH|h}uElVkxUC zliY|qlFa92W9s;0ZbS)Z7+LJ*j+e(~0Dbmx{7#)~0uzH`D zR5+T9ev!xsWeBnucj+>oxSnKUL!wnR`Eyyql57`!8iO0kR;V#9cGCn=*A&-~=Svn< z%dIAda8zg0sBEQ4UEE2U9qn2r8`lhB`9_knP)sCSSLdweDV;*0-!C$VM1`zcY>Ha5 z#QAISP2xsn@YtKAx<=d5Mc$`#W>3xI=M7*ZiLi>yt2ny{LV4tyFkSC4H39!yuP;Yc z&ZLjqTodUK+e4)i6+^S0^&6~_Ps3etPyhAmwufTDJqvJXt$LlMJ`jJv<~f2k>x)r3 z7l^dj$;(ALX`v{>53oIet?COh>K8FxXR5JOE1)f#II9O+S!%?5^#*6 zrebV6rfZw#DUL4K6OCpw=rL&&MscUr)*?E}%EfrAy6C8>NCrngHMLbe7&b}~%d@$- zE3BCCh=M9@JxRNRP!Sc|w)9=1OHf?=f>{t`zBPB?i?;sFFNO$U{~} ze?6valDwH9pgu>|ow2I;^x5K$p^3=@L^h(SGNd!h#1adqo)LfGvoo~A6-<;eX=^h? ztvE-dd!s3`%o%iSqttGhB73U1l8eUJVw9nRrWwsSX#SL|#HWpHnTXe2A-G!7nDz37 zSBi8)P(#BdepUr_B@Bl2WEIoZg{f453YYwqu&-Dy)BMEMA|p%72zySSR+Up>LL)!x z-nEN}K6O(a(@?aYjVPHI88@)WjpF0}GD|2OtwPPI^g}?xj<1V!r#(lN3x!%DK}Er7*N*DPD`irJ8EHq1J3dK(of@&N<`5UGaH4OVhftJgN#s;s6u2 zeuqfs@&NkAB+5;B!{c*DPWv~JP6y%88&X%F{R=A@yM$OhdPp2Xp94g!7Y?&6tn~Lf5lv*B?lgz5*g0Ud(vp&viTdD$Qb=&;B zg%0c$$rcyH2Nx=eoDK>ZM*{?Yv$>_UQk+7m)HzfIsA3c76ZJD0Z8LE$5h+-UgxCKL zews6Cl|)&k)yK6^@gz)YZ^W^zP(z0d5&=j-mK!~E!$)uC#2@G*HIiTqscNyUx3r>i z(K2!Bc$!kcmzyhNshD)}H5g~UsWkbVWW3nsZ8F}W^?Gtxj6V{t(2=swW>2LmjU>cd z!sjADQ!H438m_;cHPsCAbc{3wtolS=S@UX>WCZ^(=z?j#F&hDbmdbhU7guK2^>Y>p9+bsz|4G2_nc>G$xHztu2u5n{jAHT*!qC zjSOEs^zh)!z_LY(zPNyuW&`Jz^=Jj0Tlfyg;mI3w6yNmQMMuS z&;{{MRfW|D0sg9!pfH=PW%EhAb4Bal$Sx=#4<;nmhFSu7L6u4I3&I!z9Yu)LXfivlD0X{gFA;XxkU_aP#No85rE zlRwtPUlpb&g#6ydoXCd=|tQL9*Gg@}29ucX|a;_M=r0h4nWcNk#ODYFM9xa%A3m42!z{0vKlr z3rY{%xMTXax2)^__5xT1VmL;8!N>)}*A9Ja@U?-_MOAhV55V z(-SZQM=zV3fpj)ubL!a)Sx(y+y$uhWIX1m|bUp_PE}Sanv0gEN)}aSt#}>c~ahM9n z(M#vFusnAGi_=EN?oA=C29oAe(ZLTLVid#uHL#wd{_R>YN{`rv>qB1{{96Bu3;%E5 zEfl4!|=tBN(783i+qa4e%2w zS-2K6b$@w-@DrV@>?spk16zv|)=b3DA>HReCnaQb^sL0z?%kiCz8K~qJR`s$;}{RR zlqR#3!ER3*v^6?QhtX9fc%zhz-U|#{yN`bUTaat}+Nsn1h^&Cd7-j@8U@UdU`7fsSl)&a9Zz5_Q$5h1zcxf0oKcW!@w$h+2gX z-#!hg^7DBR&iOSs9Z+8y@2Ma82R1Md%2YbJGE^#1bBI zx`uj(rFGqR58(C)0VP;#!%#{rK&Tyxa5GJm6(JVO`OIA)N5VtI?6K3+zuhG$?S9*g z5KSUR^4euuzq^>ODD#d?t^zxQ(66&^g&-#TJQnI3)r(QLcibw7vCjyRHdsm|oHtu3 zWyYE@B}xrQd+RN4^u|@N6eT=#@O!7j@CYFCx~qjVpe>^+705)YN`=eLgwNVrfNRjV zuYrSsl!xB?{&{=48?QaS{n;0c=!Q!}UxZkI|5xX`d0mjB)#n$-2Ex z_~n$<;c=VP1S%e!UW-2bDl|{RLNB}ySi}JOd;uIYXEuNYY;4%Nx}u|r2$hXk)XGFe z4*2n)OaJjTXr+{Q>!Htpp&Yq+eRtQ_VdB8ju7~j!@t<3~A;HuQ0h!)cYI?yA3gaER z2j(p~pM{*%^XGOSxkotgx@QDLV;se)uj|0y zHs1a5{X$C|Gi&F11f}t;O(Nvy_3jXxYZM@|3(f?0-8a2*`NvpCzxLxEHv5Kd-#-gx z*f}Gh8)H>$c;aO{U24E9uL4Z8kL7+eVt&i^GCnG2@JyT83t&>_c+0B(#& zSZg!I2r66wKZn9tCpl5huR1WoQXX3I^&g$vRoy1^DLk_gMi<*)k2{;?=mzAlR-?LP zokj9*g3*vr(ZP*hv34K%=CrkMC4AtWIdVRH-~H?0QTV<)=h*ihd>+jR0B!iBO~}b= zndVZ;bkMG=SmB`A8}jT!Fys;*K5YthPrCo{5X5V4I1TU-uo7mCM6;#0Kss*4?h1IZ zjEBDsGNhb+ww2qae+CfH8y>}@Bp|ZkQ8E!h@Vyr`8L!F0<>b~B7PGPoVkA5;L~G^_ zI_tajE@;v?K(UF9W6&&EXPZC}{v3@cXm6Y#?ZOI4HR4&U z-DiFUwEN?%NCplEi*DW6z2PhHIS0qx3D77!^-0=FGp$NEUr_tBNe?S5`)#B1sZcq7 zhj21-4s@a1S?Jh4w`#%QP5qBAe5Y>}ge;N6rlAOeeeMH*S)UQ0sKjvA0IhG5M8jbs zvS~}s!=s;k7gW|YpNzJwgEMBYMv(ETX@B4Hcz{uRDcTJ+W5arV!;ZW6-S5FLeT;P| z8-wn-?^xSC?PcrT7|xpilIZ_1G9F=Ay~W;9#SGex42mU z>+$XfhXgs+nKM8RHfxqvoM=!1KT%@RmXOLB?a4V+rl2_TczBCi@)*>wvkRyC4c)sB z3lbwU0(Kc*$|0x{6{jppqazhI=T&|v#PxkRsYuDac+_tHGt=(A6_%)-E|cMwx0N#x z1msnrtC$hx1OE$_AM`#%04p%_l$%i9Zwl6$o|~)_K#DQOD=@dko%r( za2k35PD3C4$Mnt>CZkW$By~+*sUk~6J}w8?5@?{5EHu#4edLD_ge>2%AiQAg;?XBY zH!r(lsc+<+>o6z%4RX@SR=!hcB zPx3K_pM)JyKFNpSI*H;*nhr;!Tr@(>y^7w=k#cnK>!)to$^3(_S~1rts3Q;2^;B#! z5+%qAL0>0MqsiAf&7#X_ptEX=I`@+w^9SbL5mKjzNos7vz7$SnACwU@DPR2Ph z!a>pX2t{&p4X1Wf6x9>{4^PIjxyfJ@1WiXcZZaN?(9n2UWRi_C3g}gYlrt_+*@y5tB5y@FrP>A~q@K9m4C z{6EwGxKb?@`ysoC3dd*#Lxd+e9%h+lIan!BBz}_Q0LDN;$YdOp8b96-SQ8}Z?-=w$ zMkwU;-0GOOZV-3pWiSe|i)czg$;qf}GA4_|It)|%WEgrjNh;(~f`}7*9Nv9QI>@VKL}A@=lMz{rnS_-WpXB6}3}!wKE1D%)nwOvOCR%}x z4w+Bc`S*Hp;){mn2294tczKxSCc`pNVmi!|ldL>KPDVL~gF6o{Nz zv461FDdA0!{!B(GC+QJ-XGFi#4(j3?!CSy&c5t_8B)5YvI2zx_Sv+dni< zEGb9~}gRVd~#o;5l-5d;_Uj?iG@4N_g z?-EwO>>^nV3|EAsCu3kWCh0gsO@?`%n1oz)1s97jaYi<`YCtw42fOv>%KswV|4&$z zqdWm-o|a9@c(5-t#}Ke2BVcK`a3l(C1}jOQ&~O>lu!aIT&VN{y7vjmFxr-P%5sQbx zsxaX&OuJxsS%T&#*)Z5&7$p`=!`z$L-LTG3@$BJEXv(Kryk>6eI&pEL@&B%n42Y)V z@+biNC?*L7s4Pt~+$5OA_#_ddqEwh76>(}#qeyl)#mdnUyD0j!lZrlZkt~?&0;H-( z$vCV=64JzB1A(0wR7e4va5PGW<7A8?!Y6crAZ6$X!<~Yz@Tms>*Y{jGHTNC`&&gRH zhAK)3LluL$hoOps^71sx#7UZq#^>In*v%@SKljmpcc>nPp`u}^SOr1JWh^mCMCGu~ zqY5zaoScJMU}OrOkINL16GbyLdhog@Px*V3aQ^!hQcklMMYuR2i&3zAj2}n@kvnZmXRc!s?Q#tK#%)Xi%%FGlAW`@C(Oc?m-a?Scu|yKn5dki zCKa+csB9!Am?|bZsi43bM`IL38_bz1Qob7?4;XadtEc{>FSkl!5Jv zf)^=xYLbn^-m3^JWUwsQC=0g!*rJy2rl3Pd{#x18>(D93)#_v&ntpzoUt!@Lau)%0 zc&&s_t}Dw@=!GA_Dg5f^;S?_6p?yC*b?b>}(VzLzG@wPNec7Pjl?vsojbK`p75;?$ zR+%6N%0ix$i}r;cg|yeh_b2~emBc;&HNA43Rqt)v+AhG4)a|^gCrJb!w$e9=z^aJO+G2N z+Xql4eP~k$E!naMqR%hdFu8qIP{5(qcx5(^0B#*hLxH7i5dMx_FGDQ*Nx9vl?KT9| z?@>)JhB)@~j>WOtJlQnlytHf{YunmRH0%PpjYpM5+E=Exu09zTt=K=cUQAEfWSCyE z<=kVfvI5#fNFPet(n1%l5F8}Tj8le)BM|hjP@M2pbn-{L2VN!s##?A3TKWqJ`nRQR zNxMedf;oPVd|A{5aPfWZ&`J+Or+Oe4X4}Up5vK+uGFC4yZ=rEL!TMDoP zF>u4OaJ6ln5paI-cU`6$1s}UTEe{(??wn0HaSy#oON1zXcDqL? ztzVb)I^!9&S8b00P!!_U4}*RJbo|AGYxn7nw{3psgRPgDYWzgFHZhhYAC>hqbuff7o1c>a#v z+pdKy%HAZpX4p9`O0aEBnka@LH7Qc5vjDZ)lQ!}vkS5`wLpOlmQ?}%~@oxT4f=Vmq z+Emh}-A0mkco{lpbVisMmU8Wfg2PL~L;JQb*){#o*MYz5L+IOteMSyLjr*3ix56m^ ztZ`Qr+K}^DV-EinhI&4$*Ouc~9cw>;gyiw#fV-(`uwJEu$-L5IZ8$w4aj?&R9eO3< zp`*|KsfU}ezI)s2La*q#Ud0XC1Wjr5*+w?r_9~(Y+^gxMAVtDM??qsxKqb*l-M=0^ z9!zn*fCC*Iz7kLdembydk*x20;gU$*yH-4ot!w48vKHNR)-9D_rlbvub8yij1c1Zy zdFVa)MQ{4%N3aSr0f>*X^%NEi&L~>rc0EA zRdHUg>4Wi>@X&j|`ZGY6-+y3Z_qTn}AQ-uUqcg&LC{2r_xDGw3rUVssLs9$M-;x z2#}&$uxNdsYLpncc=#p&N%?U<>|NrZs*a7*Yvk;U*anA@SK$rAx zaMj@;!x9yT&f_B*9;Y&i{%{7`Iwm2bgB6SDd4|xffj*3n{Dp03^QQ2O5rpA;<)VR< zfua|y7Guu9HuXuw?nYaeOUVLMwV``>H!_2Qnq~y}AB^0r3TX5>!dq16HEo3oU@);l zJg@@>SHeTYOV9LfmDi!AJJCnDLA!TBgRCN@R{N8qIG@Bp|1+2ZD-#E zsGESMgAXZTv!i4p`Aorb%WeiMX~pJ3J`51~WLV?7x1@$SF7L4C)qP`{_I2c04L8o^&G ztB`LC41G&;o#$|oVC_x|-M z7|Hju8@o4o5#(pHGj8Y^fHOc|HCwkbUed$mGE_`mp=uPmFNC0!&wMh}mTkjQd|R;r z?YZQ!v(aXcZ5$QN2fAp-1?a35q}fcxNR_W;gzw?bBksM~a&DwzD~n8&Y93LjeQQ1C)Dwp_|X2i~@w+dX`tFa-Pg84GOLc+F_& zR8+-f6cxQPpH4gA9ycW5?LR&YXjvA)r=T869_fQH2wn;bFlB;iT^6Fgo7ioj z&7$RNPyPtv2U;d{IEyr&Fy5m%7z3#W_q2NrdMSrid|bQtU2|rlTU_y$kT6|9u9ZOu z$QV6ixH0tQ!RPxwT(r9{C|EZEUClWo;6q`vl+al;38EQuG*f9cp$4}&ETC2B#Wrk$ zQXa$+esynGehISmjajSeNYHHcS4oS;m(ZajUxe?!uU?8)jn3ylxt*LCJhSLB!6rIp z1T-joR*u;UfWTh!)a%A3rEaJJ2TOSQ?gp$p2@f5;RNea+9q-=QfKwwxP#lMYvYNcX z2%(O9EPCD*C~L3+K2$=h$0RIt=wEJ^#ER&LU?Cp;fKuVp^3dWJ|XKfE6j|_caw*Ci7Vk zSr2iM&wqGiy!%!KMrMMY;h`gVgQeTGOpL1f45=cZ&$+?TB)I#&a047cKE^tF-Jf=# zy|-Pl8vXu-HRqt>4?epQ@3J5KA2^srXD$S(_|#f+RV*ID&l~8bD`e7Cp!)ddVR)ou zTz&kJ&m%op4#kXsmxZxR+D;8e(~Lf1Qh0cKyFlU2)h~xn83_;dz3~mGa&^yJP~~d# zegqXmrqGsE3(O0aeR*VLcXgOmMdFEB6s653LHgr0EU=b8gBGDe!ELQYMaIGMu{ zuP0IBMzn2oJ{5{+b+?IoqU$Eu6GJ&&GUPXc8`H>G^`Q*x0WG^;OQP@H1or>rT=d?c z8^Y0^x&AYsV3FUe-Et!WFDw8K-GYYKX|#;6{lRNU5D!~mG-qw=(#ScD)}#6@Xmrg< zpXeS^-3A`d9n)yV`d~T%a2>(6l{6C8Tqp@pNHUw=3-LeG(9Dx_(NP@?C58(+wS$(g z4}otq=z#`kz-OAyfS_PQ@R}lhN9gNGx!nUv!KJzUcC>OmI6WbBH$ecp6IATef!|e2 zfOnHYXWx#tt~n_e9o_b&V~|DAh5@wfPBgNHgmk<#c(1^X4ERR?$?POT9<=*TwBr+4 zecMN13%v7_x4>r9IGTeY{GhHfs1V)3ESX5!8Qm%u9Fa0CiusG zKClE5hr}RPVH*@MhOqG=qXsiiI!U9+W=sMiMjScsfi-r)H(@7|@Op5p0!nDFtW)># zZwht?LOIj0>hVW)Calf*)jGOKask%jgZR07pvm3)pve-J5I(mZU97liU3bktBk=#E zphb9Zj3(V#3tX02)Y-cDz3e+W=PX>6s<)YW(!F%994BKmRPK2lJFsSK5x>O;R zCZjF_2V0>bzxo zj1KMkNch%v4j>4=0+hu2h0V=169+liAOp&mD+ei{iG0}(SQRQ3U2+gCj+6{pJ(?Y8 z`I%QkyzN23qS|I+AOmkTHCZ;LCemb4Tg|meM*v&r;(oA&A7k~BSDruT{tew1_6s)E zJ`)8wc#iZso@~*DgeM7!@ot|}*zVV&-(3T9Bw?WgPmaQo;mOah>zb~G6O6bsa!}fN z=(@p2`+vP?bsq;cYDr;d+yX|@KO^LY;ixjXx-N5)iDuZ7Nhd>UfNlEezrxT-$cWf} z7Gwgw;9lRg92P!LY%@Yi818XZn`$(OK)|V!+c-ZD?q!(8RY(haz;Y=M;}U-55bR?s zOu3fIPv(7rcw0w7QXPZ?3cp+T5U8|-hYoH&PnbH0m25pE9Ma4)d3b-U_odmC+n|(3 zO&cnBvPoY;K z_AAgH2@g{3!Xgss?O%cRz|3V~b>W4fwB{{VTc**jYuo`%8!WESt!4MZo;sg}Uikha zussVHi@AGYaY2BpkSU0x+Kf?eI?DtM$+Fo?MG7=>JO=Y3p<)=UcUE+_L%i7+P(S+H zzoAXAiI#==?YVwvKum;^M}9@1(AF73_83w;4k|4rqa!>12O?b`hqKwr)eA;9j!=VN z9QOA=KGa_LX5VVG<-sq11S{@%cACkPWofEKsMtt|_W4R+LZ)Hm+MWdUlV7bRT>YuejrxX(}btNCOJHHzOl*u}FXyEG4@@1Puf8vM%$1T%cucCs^od7~&%Ojl4v9*Erm-)BOH4xUX;G6AMN)!`F=@A!L7M zVELj?_a%fK&<=+o$E=XihRwdiPgCBQThZinc>oxJ(yy(H~3pZH8 z2IQPwIJa@cA~7~fdjhPSG---DpS-F*sv36H5mvbN{I#o-%}uOGX%CmxY-FG*^=kL-F+8q(pO)*zI)zp1P_F57OLKh z$BA;h77r2Ssz;+wsA_V^CYc5EHlK=!(|^)S1DNPOJuB>vu9@R0lMN0+PpAgtOQw~< zqSc)c8nx~e1q9cg&?L!IsPF5lt*{&)*wmeUTR4V>W-gm^B}fecHWFJ1iUH(~6J$!C zL!}q5KCgT6)7XyyNtmJ^p;)LAO0wOow?i$NyutI>==k4(JxRht@3A`3nb3VlxbE1` z&Rh!Pk3VNk?KVJQ>PfjpSBz^iZseE-kNRWJ!UjH{g_eK)zqcdDkEhm2KW2A4H|NBM z#F0;pe5RLp`})9`ka#O-p#ThEpB2&`@o_I(&K6Q+LRrd1xtcZ~LdqY47XJFr@KG;e zVIRfae}beT-CqRNam@;uj`#$du-mvSWmK7ZUf6YR^GKf)MDcxd0h+<-k3 z-5>lBIr^5@)rA7l4&)Nyge3&wSNNxU--lzAgazNT??67q&2WhR())s@S!ahp)3EkN zlNr4}r*vn%t+d){j0j@RfX{+?RCMUE@AmS9)^)3Y622=I&y9q`SmQEOJQedQn}u3B z&EW-k;opP>IiH6Pz1qKR`nUTxcAtRMcR1NPW(PqIK8DGny0{JktkmARvO#3@VJzpm z58+rU<)NeU*LO_c@$5RdFNgk&+hzymR*t+0X~DKu)Xv0m@|F+DUKOra-hkFfIY&4C z<-Bh04dFa!o$ZH);Mj(^tP%+lF^{7jZW(i-6rS1#-h!!>u+Y)_UK0aj#(oP6aB6so z9WW(bi-tYJ9}b_h&XN%+Wg+uUhi{ zq6LE=^tlFShd(>`-0+?KxAx5poHKZM@QZ_24dw@@e9IDpdj_}n{mU{mxP0I*ed&Rt z1J4dTv}|hOn*(!o6Y8l)AjsE{0@GM(A^81mOhqEI`M!r6B(@1+H zGGZRyIzo+%k1Sex){>tu{q52hmp;1mo~73>tt_$k{~Yno#jB=L0DNI16iO9j@P^!V zE#trtKPjC$58;TxmXaoOtr*AIG2T?lm{7onoRX~6Q}(u+=X4m|Da9pgeo{q}GL@~7 z@>ms`n|sh8k^kt;87v+R4VImd^XycKhlk-OzT!bvecql!Uu-AeixxNxFaLhjm z&rhjStj!mpbyO1Y%{7{oi8%+O#ijH_o+pW&gF%NBr>c-i;RRdEvD@) z8*S_;#*|7K4QZaXGa-W^NOI98wc<)qzT8Y$0?|-5qBX{~{165sO6em?o=`U_15?wg ze7W#|8;jQmc|Bo~X;S)%yOpb_SKTVmVf-mSd?heC(vi#hL#`IB!a%Djd(#bBUAcV8 z&w4T{HoX2uEQqaHd_>9(?qQ?B((+`L7^EwuF1Hy{7pqj;P$sXMW0j-$d54dpXgZVd zru6P&%F6Hfp-7k8_0*IzlJRCd1(ROKY+a8#M#j>9Wm0Fdy6wrFmDGp|=O{$;qz$rx z(>|uiXj41?jOAEUktCs4CzAn7KF=r>+s?vtqYnzXnxK+j3+j$m8q6tPOxJj=X-d^L zIINZkKSkt8PSkWqHCrRC34m&}S9rHMJ4E9j=5`$!HRg zGd1#HqApLL_E+(7c_u;!RmQYaL8oI{Zt<`2Z zl=5u0rp=Zu@qUbam{O}#DLO$FIhLvDRi*SIQKeJ?!a|sAHjO134$Bqs<$uQFRR$<+ zY&QBxoi>mwL{?+WtCWgTPAQwga-a}$uz>J3jA6%8TnHi_k{%_WZum&ux;qA7?3i>QDu%O7@YcQJqcxc$))1TWmCQ;VF`uvnFd=(M8a#umBl*M zW>V*pM=bFvGi|7(R*FlAb->X?=LFSZNk>GV*@_WOQ>->`rzl@8YDrhEenQ?as+z*Z zd8n8%W8oFCa*<81S%({{fZC))JRJ=uvuTZoiG7L`=|tE{XpGish%}hu{>1LQIR5fd z*2)K4Y(Sd|^Tx=;|H02QnNWoC@`iB6);3fF(OpYLI`1VZ2WgKL+GROq&urC+bY*}f zlVm*|3CO}OH9Icu2@D;Fd4ckc6sh%iEb`qLqcKI*rWxffOaI;@ zYSP}__<6hE5vDQ$S6x@mg%n!Wdj_UM=DD6~O_9M&TusFFR=MXR%uv;78(ERnYGIGt zZ_~4$Jf_>4X%~@^7ipzUmnj?L?kDlsx%fIw)aurfE@*1;S@-?;aWYg$Q=~r~H&e;1 zx)9xTyGU0VS;7*xq%&oYlbK4VOrOOJr`2U40BWh?f+FDtW!C&ArmLeFp40|q(KO33 zWScdAU!>>bdcqnCSg1Bx;yBXuf0v1q8L&mEP$Q+KN-mnoIRX9~K#5akaPpZ=I>MVs z1p+$4cp<>GZ8)G@gD$>l*}znabSd4CRm&JlAy%t_!psHy8il0*6(=)IaE-yqEENxk z`f01yoF>H(qO`e2-!=CLLgH7u-+<+Qw;HHQp!g z@&JibCgqx`OjfT^1r&v>`bYQ&9ye?iyx(R^L`VszS6SEy;TTuq<4 zS)>~n8&y(63C=>Otp=2`4I*9dtWug>w9d#lsK6WDJcjA+Y?&q$#Q?>{TC8s>N}s+* zWbjb*yXj#8CDdPM%TcwcNN#O1N}2O6%4}iCsv>^MPx14vOu|o?bTSjA_VUVTO#8S< zHy4{k)#yuE{Q5MMi5)SC`l8hp66tbH&pJGEKC+w@9*2F&MbzA6R^Rl(3aLB1^m$tR zytCr3s)`O}&{VEPOYC;hXgYHxH$f=fDMDA(wk;XzKgGw>5g(g(7(#VznoK7Yw~J&| z5*!%-+}CDpd|9#K4ctgaJ0Pdre)|+ur7hbuA!6vL$f*02WR{6TL7k@AZl!jJrzWKa zuo`O>S+1CGX#ly>aBvjAz+q~Jq28g@r^~0y{DN}1vw3;IgHz5vzTgB(W)#a^S*{J%>4{MZZn$z^O_46Ot!W;nuu(w_UKb7 z8^dR)B-d!fObVlnU{sf3Io5g+kj~>!h%A?O$p|@yl1^EnTn<6f?TlBRbhsPowW5`< z7J_ZU)bi9#nvAN=D|Y`EelO*R(BzQEX5b4+8<)#!FoY(UEk~^4X-%2J8LpL3#hfqU z=PiM7ifHPY9OH-={Gp`!VN6$fjBS`!xw)?49C<&h66IL^G1|}&?y9QxP>fnGu2QSF z2F@6n#S-@f5^`&7wYXJU+SLZBHMrGALoS@O$)^?`dv7=pAeFkLBcBdrIW0ZB1P_D7 zBJ-&XN?oWN;j;~HskquLbi=FgI8ym+KAN_0{a+TJmU&a{pjYmUnzCj^nifr*IiG4% z4M#2$hcalqgJ0VFCQ+wMnW<8Q^jqmD6Jx6ICAL~zizZ7|LpO{Dcf#q7KuyJkqE?xN z!+BC4O*f2Hb+Dct{2U$~lQQ5WqsCy8uK~t&D?vUX(h0zutu+&+JnwD9`0%PN$LLB2 z6}2X+oBc+OEWyW@PGBI(&Vr%Y#j8fu1A7*wN3QMb40jJ)`l)^3+px{91eXH#u>_ND z&@opGzG#~sV~gShSJyfyw$&LMlkm`yZ+~NJ7b4Hs^r7cfpNAmHH{qV>&f(4k_%N4) zMC=8P8B7TmnK3p9(rp8*^)ULvNN3xagp3ZI^Fa@8a3ktp*7*nvJY%%8dBQO}Hs?{T zTHASNt8G<6>Jh6*v*C-K^acCUZ1NggBy`?nykt%r6Sg>(aNBzz zLBd0aj=l~am-lX8*M0vz@I!%|RUoI*yU|gVV-PhGh?ro9kb7BG0y`8^!1!{rqtGs>5eD(Bx~8F$C(@3bQeAYr+$HQ#s*HA4k4aci^rpG9 z`@|2YHXn;?8S9i+R2c>1B9(Qo9#T{NjWPkLL(r;AmqV*0Jj8E(Y%X$TW#O9IO7V)!{9SA5q=_BaquIvA9_{zRV@3;}st2?XK>7lq36x)J8 zO&J7>5Vp1u4hhM1&b6HlsIj`UZ1u^WKo5pT*L5G%-PVTtjh-5iLZQ8w*<8&nE{n-ifzP!6y{ezy(Q z+J);oqiaw8NcWIu{0n_MWgK5F?l0eW;n2BPMPTAqg&+*auJ=MDOfn->%?kP<4hCXc zdIC>_)cg}7=uY-5Iym#YxuQY6u$GAql=$&L4IIBwW^0Eswwx{pm3j!92C^E#By3%K zaxQw|%?F?i)eTTE^6*6G6GJ>Vb?#Xq@thy?s=u@eltseBUiA}VT^~BN<6dbOVE>}S zw+tN_`~v__%8%i0ow7eNE8uS7E6i})sgDxvVp`7In{2!qMvJ$0wk?;EG2GmBTRZx` zO`h3}@bk-hOCp?Um~7wyQ!D(k0tku=V+uc)kkP@{08(u4*6@bz#oIx~#Kp54V68TK zSLG&cDylcuTD-|+WMlv+^xYj`0VPx%ZKmJZaRDZ6OYh8(N=~jYs+)0uOh@v&hOXIkX2;yOTuy|IGTO!2%Tb%xmQEn$JK#{h;j9igl;^Y1ft&Auw5fqx#=E~i ztFsqii)PnCYjN5_K~m5gS$2bwoliyY4Sl)?#52+T&hE~6aOGf`T{9;ksWH|lB3@Oc z@~Kv`nnBZxK*D?~1Ug(JhA0g6cfiwcm|YD5FtT65Y_o8(g3aUQD!hf^QDOkPFQFp- z)|Dct(8~jzISAZygz9W`-#Nqnp*sej>i_+sap6|v4A|$+p9PR7@m^nIjgDEW+nk?Z zsqo$WUz{Ddn|I6#uw3{qz%M65HL_xA%AABZCSy~AxmtxR-p;D!QXblO-UH_#*&Chy z?gQSAa0@nj8VJJoD;aBogAbWnJP_up#Zowq1=Za!dlDYHc;GL4x-Ypqu&cOc1zavH zf(_d|W+G)sS}Qe;hSQOPh;7TIWVG*;;&!z8-p=~2F9;jtCU#apS-|HK zBN*(AJ7gw{x+r00yo4cZN~CQuBVuaH%= z%Bp;ucaxe}u@H(PZVM=egbLtlcUrrTZRtQXLRjIA`v`v<>XJCUo`fZaHlHpmUkMpU zsoZmVN7r}DN1oH}%YbFYncZ!uDV75>-xku%owO}yZQ1m?B$|2whULbKJImGtPxc7v zyLXAWXY7z+Yn?uBtz8)?83m>vvJyN#$YHR8#r85inWxL-C!{Te(kFWqIjTwj_=X8?*sJB10)V1V#kY zURkgWb?2b8BRV(TS$`V9`W(N7J?W#}yA2DWWvkPjRco~}yWa{RfmVnxNJ1o)5)wXK zDM8Zq)hFX2h^{^p19~|7i96bgTnBCP-v?24*C=4$SfiGx^)Z$IY3>tLzI&tTmRp7Vg^p`w zOn`h30E+hmgReqbJbNrH9%W0Nkrh@?UB}SXG8ypEB{!Akv8A}P1eQX=6VkwXsRJ9k zAC@R!Q~)D$~kgWxu^U1wYcB1q8lBIAa^P2p;Gb_^Dwr+DtN>w$`x0-vlQo)xLJU!*FG09yEM~R| zy^-(`Z~T2Pn|-{iX+f9ZV`Ur2!5=Fsr%V$j)Tw+utBJbX5wS;y+aO26LkA8+)pZDl z9q+EaqyvE)u2})o4x3`mUdYBN(%y{MLKQFD7Po~{{V+089y)l>Z}xPr@C$vi&7J`= z#9$3WG?km<=L*T6Oq=MHM4#ISA|zx;fP?J!yYB&j-oNY<7J_s3 zQ!om6vI;JBg|DYcw^vb9L`gt1?ra~E5@GM&Ieq56>${JCzPAn>v&XR%Y%zbRM$}kO z+MglXW@8prZh%pclF<<-Xw36Z+%Vq#%?&V95JodOHx%}|D_kN0Y%pJ}7J>#7UXFWe zpm-7%1PQ;}%Xwed{bCI(-dP|9_eJh$R9i%h1JFqg3lJn(tTbZ{kR#!teb;>z%1-aR zX=At4fIf+e1F=nKj)aDq^ z^eA%fM5mX2^7`6<>`VTLBt#3q#?fh>cUQR$#z_ZbG&#%&l_8o$wbl+Dx ztCxR_b>Kx8HnN|56*OML!o|&Rd^$9M1YG+r zcdua2oU;O80`4R%KT{ZhND4|SZmmL8fpGj;hranWaDPd7h`4PDL^)Z$Fy0;cx**3t zD}Vyv;CGwBSg8}1RGqh0NVhf+=^cDdA!)_&gO6JJ5abGd@x1Oww+pA<$gBXtfWKh< z5mjA95|H_CYg0#x6aE~8Co%4PGHz-BXr1$Zm@5et zgAl)Xzi>|WaHJv#wbzp1Su=ZzYz8U53Ga}SQQtG4wRIo;CVYCFvOhX2pef*J@V2ed zP|@{9R8E22Vr3O?oh0x;N_zV3?639FD_H*1~) zEKZOB9A$UpUBOH~AoHPv-v*WV%;Ru6n9o5+`pRdZ=g)e4qWkZUgX%(#%dCJifTvZ_ z2$vJ2p=BzmBe^KsP6%=UANsM*ise!sA{w2&faWVqsbf}v7r@$SttQ$QvPP*j$^u-D zxT9Fcd52*gNqCUrIxHT$zIYfG!MJtSFxR6fMR=n*w<6LolL-dk1cjEML!A}N=5f%0 zi3{PlbL&l;x_>z&tVPFc4_TmhbZeVj4T4Iwi58=VX|AVwQZ`dEjv`J>s+T+miRj>@ zfc(wzZn=w9UjP@tW5h?>HWSrws+tBvJs3-Hg3N7W5;A-|zJKi0^C)P+xByNe4zk|m zEK+XTX0KT}&Ml{ewX+IM-UAC!F`tJH-uwzAv)8^e(LHbv-WN0=2OIU4QXAHgdVkZ# z`l%RS1t+T@Cv*_xNO(}B00i^$lfsxfXB{92&rQ`- z3*-n@st%V#q_&*lv7n7lLuVyC$R+FaiakwqFMk^3z+Pg9qY`dVGb&d%39YdV^oF4bqp6z_Omt zLMvW}qu;SS(+%Ch?+86}%mNyOxGWW{*W#e)WLUViiqL`H(q4s94?&Y8Jg7r*CoCzU z`qeWJ2~D!h3P=cemvpq1F||7yw3H&eHd*Uw|0*>5Ff?gC3+?+wM+~J@J_3tK#BfOo z-)!d(UjtQe1f4s#4=MT6)^=sZ#penQK7X#kj8a>uKvbP7m^3P@MF5EJb>9ACXt0C_ zUbb7dPk;Kcjp$!~+<~G-f|9)W6VN!vEM!E81K=^KlVKVns9mx$WU6^0Sl;HBK%Rt$ z4p88n71Dyx6)zprx-Y*B=LOrWkeZI?xWOlV9xBrCGd?11v{Z#{cr|+OWsoOfLD?CA z%#yu++j^LyV@sm)N^eOBDe8DV$IU*gobZ($DJNAAQHC&X;1jQaKnV|(ZcEIaan_>K zes-+a>Q_OiZPq{6NGBhZ7l>kviYc8`x|$Z(*^RG)PzetaSMLL%x7{(0{_tw&ufj0y zLaTn!nE;g(a@etXcPc6-Z-%f145^wWVE{~2VclNz3z+};EVS>PhkK{NadhMt$2$G1 zUkXdtJ`1_$Vz13^qn)BzBN2C3l?ioBG%vsZJ}g}+59Z~uUM}Q%m&?!g=EVao z#N$|T1Zk~I9Sxb>cAZv{#x4B!XQ74jS*Wz855p&+EkEc$buB?})X#M$uz6hY5qL=Z z9~_~FZ9~Zg9}Ql=@Kxb3_Bz^hw6knQu5M|Bs1!u0XzLZF%gmtzZ^8!UI11aGga;M} z5aE01Di0pTj?oD8ACD(p*VXG(fGrq|I<+S6%%Fe&b!W|~B+1RoT#!75jvV|sVCJ3v z?xt?|b#P3>p-M=*7IEq$lqN>DGEj^qN_bLgD0%e)>`<=x5kc9vgcFa1jB!)mc}sBX=P4!?B$RS9A7^5DUj#0m z-tKH&E+wOb_jRn@7vC1H5%}2)K>_d^3%VHXhQfqwf|a*ZL>ejHfhJ3+2!P_@g!WGF zgcg~-0NRUBk-S0a=Lyf#F_I=-r&D!_9YefkWK~O}IF_-E_B{GNu{1}2lF^)Pg{1jyv z$BfRXh)X8jE(|{v5s_u|_r3Kh-RVb1C!bIMk#k<1ckg}Y-h1x3=X}p#HyvFzx_14< z(CFGwu2Od##cQv`;4fy=*9b}jnTwKVT zYakDa4UrXZ-5VZf!+BdL#MrdxFbfn?R0y?ca~;~saq`i(?%lX` z$tTF&Y2ROmZRuZr{`L>|4xjtMiykhGTycwTyL{j7P$!6FQq5^wC!K*`Rf0dZKh@90R97e$zSxov z_lCavN%(nJ{psE_##vL_7SI9tG@il5DxAHzb@T#1maZE_^QU{qwl4WZ4;ZrWKc8jp zuKJtq@TQxWt*@=Uf8<|>-yPMjI)8<`C&_;yi(3TyiQN23>TOlhb$z%KDMpM|l`cib zR(JQ0E~dhD+8)^Ox32CwkW{QI6gyl!(~>&WI+c2AurR(o(nVtGVjg+z?QH|w{n|C% z{yAbHyS-GB`U`wG6m=j*Xv)WC``Wk%2=RbvUl=Z=%q)729DnyS1GnW9s~{6+iq!m> zLd{D%3avHCYYmLinI-8J-TfOD5sB*gv$3#le)!DZ@fF>xs3$l%zxUOW8oN&Jm#0~! zCmoZJLu1{| zOg^%!i(}bh9&sJ&E?Dgoz5llh9o*$QQGzhxJQ9eRRV6-S*MvG&g-d28hu(mVdEJ?i zC1SzG{3+Zlm;d{Y-q+5A-qV9U&CnO*#Pd~Yonzab>YLapI9i} z+N>+fezul$CK`;&t#l0<@^?cJA>yGX(i{7F04biY($hb$UXSzYlYN(~{N#Ccm*vEb z&|Lv!$sF}4vvPIX;wVd5hZVJG_CmFuzK||Ii&^B@rC5IYSOi-y>H^nCU6C867)=wk zngYgpCMS&chcE7KelP3UV;{KS@Drch*8A1PR0A9*kcU2)g;7r8K-g|uo5}~u{%kGX zZ^9ml0+G6>`n5#Q0fbKri|ihtaF)(PbH-Y7eqY=0BfWp6TaJZ2OvnyBS)XV6Nz}!TYFzUfR9Jj zs4=fb9lpdCxPnB>WbBHDJQx)OUAB)367k59qbDv9a6Ue}4|v+ zrsC3KOwkDm1N|v1r=yEG*j%8}dL-Lz4} zBastNA=Km{Sh(NZ+&x(YbJ?Glt$bwp4@P$^`}2B^x><*BqGsAJ&b-BUg67(`1w;$f z`%UmxSu5}HYdW1Ga&7J1iCxSomX)Tp_!)$cO%BjEKgM+7nsl5%rtP4=;hZv};~R-Y zrp<(%GWB5K(&s?!MLhEC*yH`XfSu&44}N*1_wVO)mDDRhYl#ZekW)G97Dif)B(h~^ zRhyvdwSROmmE3(|i*SVPy}q}L0EpP^3baNraapTeF~v5^DK`>%GSXazd|KAsze!9c zcfSiKMg509OPsC*MT6!22lny*a;V`bkE+@IPd%+lQ zizR$a!{5;*;s&iJlP1|q@nbQWymt6cw%%{EGx+hA%e#Aa#b%eyx7nturc``HuSTAi zBmyu?$K~DgHob@1fB&(|yGCGnoVW=?CiJ*%aQh5AD+@=R=7OvoA+js6Pl%}G$fb5` z@98VM53LwyZCt2B;{$wbsNiGlh=jv!dLD@j(6*1NyJKg(_X%>z%Jg<2{_T8Lh-GM> zjAZ~^J_oCfMOr>@_v*N?H-?a4b3qVzleW8Q{4|gB4oyD=ApP>g-C=UMzT3Z{2UMXN z*a13VOPMov)`zeNorK(=?*h)r5MF`{gnA9&oX$6P&w#bB2J{tB2m>w-5c;fL8*AGE zk3fIFo#c$&_1l(ygd8efdNN=DX5<(^6k*qPTx=M43cxsQhHwy}H3G<36Nb?>=I$9l zQe5g0@>=7DZFHm#4ehO;93p`5!=?`*sv_1xVF1Kc__Ov-ejv?m?Vhn^sYgiVV)^-l zAP=+()p6|IHHebTp;@{%uJ$rO-p?V(gQEakbRMHVz!Kcvv-ekFV!!=ogbsv-z=96} z(fXxTD}iWDnBUwSpg_Z~0%&-aCXEXQhz*E@Hcqa!Pfg{Dv3MFLGVMC&!@L&p$g$%q z`{3C-d!O?4jfPp8H7-nP1N_K&UT4-c%ei0~sn>#>kGmj8#3TLMZvFbWzje`--aWf! zzCBi%$L(bJ_Ef&2&ZKl$p!@B)<611xVjkS8?_5c2KTNFc{r=kSWw2sqX@y*&K@Lr+ zA?Ni0vq|j%TCj2O6`l-3keEkaYdv#yZ{iwk7yT@9VQ7#$ppLO-b+{tWH#HS5E;MCL zfHp>#Kt^dM1xY{RG0N7(Jly7^wDbLm*sk7{QnYB7eU=u~ z6?QL$Y>Kxh>ndxDRmZFrRuHqA!}hh9MV>X|G;zNVVDedRehV5x%mJ-F|6%yuXAzKj z*~z#Se9C_8bAJm8Y18!r;}0r3jt?#QE6Vjir?7X);G zSMvC(yDYOb)?Kjo8jX0#$C#&dUiXwMY={Y+OUCdq7PAN=KL+gOhwdNmeLY5{*k>1N z>vH+zR7RK1)st}qPqzkx{Ztk`6R}9;Q@Qh=%E2n#<(#E4^MZw~^|J^AG?@(cO4uu} z%7te9GzbAA7CCzHo97>X=Wix@>JS|i$LvDjd@Y_T{{XGp2+w*3C$SsW-r3uG^&j1|u@m!S@2pu-cYrq)bMd-F zuQ!t;;qDglT!+pmG3)Mo4xM*+-QDBl+#9?7+noJG`~L2p-S*jW$P>9o=eCpf@{ z6!}ow>dDY%ZzZ34KddqlkL*?6+PBJfkl($(+jqL|Cu283plg;EycI^%;8$d9Tq&=P zgmqFr0%WrOI`+PsFb*P~fK2xHC<#iQxvAT~BHB-mAMBn5({*<1yu?~cQYo@}Swm`Z zDe}e6K;5n_(ve-vBX{q)05C3Z%m7onh>?ZEdUgv03A4$rLb?|3an$5WUqItPIAXtP zC(;lk;^7|gKd{~y_ThV|s(t@v?(M&$ zi@L0de5#{k9V#XjL;eKYBrYSi?)yK|-SS>mAGd4lqg{BK-Lq%)%}SaFQc^0FK25FJ z)->y=hm@iw)CBq1o!!xmA{IIN{we^y@9e&hu3l%-t)%}Q0_LPCY~oeAno(cyq9}r( z=XXI9L@dILKY3N}pYOt##O3Gg?)gutGlcWNJu1hLRGf^Z0iWNO@k9kOL_DE@M<4HQ ztV)lVC5xl3XDz{&oqFh1_JQ4TOAWsj@o?V>basU1jQ5V$;29gNH_>HlZy!CUUzlh; zh0a{xhj=p6gX8Rlw2l4EENJyQ^t`Rn$OF_dn?#%k4C&3J{Y9)eVjiv^|9DmJM_;6~ z#x+Z$CjLFycjI)J#DQiatu+@DmWR%Q3qUM44>ot8raJ zrYvXkB{TLfYR;b}XOv3msVBR|kI}7cu!*nus$g)@fJ(v2VR(hD#Y&WxDX%*bal;nq zpAcUBGUkzpM~#6~D=JU^qp&W}s7hgJ2{elh4X+97G7Vcx#sYS#FYMeNgo${kKuvwH zN99~Ii-^cU(0NQua#@;O>dVbzy*_C9&2OA-5LFG5p< z`1V|=98&NttvZX$tCT+%r%l;R>R*Fmh52CJ9bm1>$LMAM?&$Oel^ z5r5yd2N0?aITPd`ztG*Vb;(B#$NuA#CXG$tIwgnvC4kb!vvkyO4FtU4c>3`3*ux)t zxVvfVl24HLef=U<2>3qpk?!eIn3|7t9~cvTXng;R9$otT5AJ(*J=P7PQeLVV3h0qf zpw5P~0Q$(90iAE-$eoXMfjhhu7gftUf4x#c|E{OFc6#{W+Mx%R-7}lS~H5)J5 zxETmav!gGLerfc+(OX9gqdtnGv?4va0Z2+e-SGT|zu$20hMPB}H#mpt8x$M%Y#3Sp z+x0)}Lnht5zP&!W-m?B65R;Za2h61ZUiZCqUs?Cyx{s~6d0lr)n z0WS7qYk#?7&D!s*eR}QvYj0m$UK?DiT6^KzGuFJb=ERy8*F3rAGiz>JQ(6;PbM=}F z){Kq3J@Q{8FN{1fblu4G3fIU7M{*c>_eUVU(NYPDlX ze{i*8`R`WmSv@lR+uZ`6>{^;_*S^oaz@#WU#{PJDPR}Q^8^u3|44n5dU{griibE%MV=&XfKu+vny1QZ)t zGnpvz#k|>Tj29|qXWS{kCdrDDi%f3Tm^amu-l|KNP`Iw>r{>D4dP|Yf6%@)qK;hxk zNtb5XGQqrf2uJWC0kuF@#`O}f)0n+(SwR=^V9m8`q27&-X) zZ7Y}|jVx`c@tmxvm%0E@lIFAaff&6j#x;y6HRo5EGP%UYia<{lQY~KRRT?z*&Xl&2 zKmV$ebfuMTB)ooSKpx1)IqNk8dajV*io7A!kQXvmdv?QT2lRu1w2Cd5Lq#>)2qUuh zOaUYSdxb2)H^PBfDd*_4Rk`h-AN;^+NO5*U!eekr+NgQHT)<(GrR*w(t!pgNyiFf> zMw7~q51uzmO>9#cuQ!UVyqV#&zZ=kXQ5Y<|?x0C8k=V?h#N>klBbk>0`J-i&=*xyo zp~#-MUl_P#FzL#86e(%0UDt=?XA9sHvZTtDU@|!T#AWGVJd&_qI}oF^WDc5yd~{io%QP92(pxWtTeT#oxLWv-a@LqrvI%)C zuT`e?j5NMZ0CbVF`ns0Y*E&v{#9Pk0(&q`lGjdj)m|}I zYf7RuXKkve(JPIue!mXN8Mj;-RJSatf+C)6#II@$p67fFH)U&?vNChJ5{_&U0BqzE z;281w$dpCiirP!cPU>UC3l3%94g(FZ4?;DVbV~J!JCK)oE?Y65IGv z|Gjca24yr9#)ELiM4K6H`og<~_e#><1m7-ajkU5fnzbbDg5t_0k$feTXU&~}tY%Kj zCNCO1u2D)@eUo!drGrXGhBpYUx|vTqAtOPBf@c*ljtBzM~5V zq!%9i&%PX4C!%2aD%;U`jLkCJPVnl%^S+w4;l~PF(S}g?W&t=TUizWFaf!n+rDN%Z^+BMxsi@KeJ()Sq_>|npy%>FCgYacl2L`- zXjNYHF`=EUY`t1kC*w_R+T3z8GXCIzz6hF;Wo{jiH5q%Ttq*6l8Ew=jJ!8v&tPV9L z4Hie%PTN%F&beXmQZ)i{4T_8+XJ)ceS41Z>NQchd6SJK-CQ@Wl~NBK~}?~noHLtW-9gZ-`U(bSl5+Q7<{$%BPX#QAAK%v8FA zGT3e-59ku0)@&BAs$^3!jh}OAB#mIo<&@|6?XM3W_ZUJ+X~kd-v@3FdZrm(1a>`^? zadIycl6WkRW?Q=F@ZfQk%~-P<3w+67bMpMUT%UYUHYJN^~pntq0CMh0<6tq3i|4~{l60)ueD9qhB`cD@d2g9!kqnv(3o1$ zndbD#Lbl1aLY#`({e!{damc8Li{XQq=z3mm%nazUwx4ZO{V82l*_Oz+3yY4d7Al9C zu(7B%N#Z7q(j{95;zQXO7f*z$0atYjb=D{D8qiHHY){&n#^I2wgT|QVW`SO<>kz!^ z)ppFrK*CUsY}6kdFtP?8%i1&wnLinAYq;$v2K2Bu$tskZR+9l}m!7pgGoTv~TAB5x zLlsmdiRTqp=!N!Ixj@w6&80o{RH)*W4{sSf&gog!7*5(X39SrqdSfpL^h)QTugvQk z^>Q@Pma)3rxJi&xDY-M{W+$tzr^+oZx95%l8I?3!c~p9kR~%uhY|F8Mm=F$+`A9Rb zF!@zXL%#By0i91+*pLcXTCtAa5Ri@jTo6+(x;3l`<(_TnKgLpQkln9t|p_hpA6{gx{Xo$-SI}i zu1LgVdj)t%SX!JOSSKE~uJ&izRoQB6H3ymH8d<5OYH>(2u6a^nb;+tQ4GZrrHIres zWV|k@su|Fcbwv;nz__nrXYPZ#1wK93uh5_9n4>37k zJl9Atb)7CZ`Rsts0Nec__9kmkR)~hm40pA_D7I0|J=NetQ#P4J9!fj^U3hP?*orF4 z2`}qQO1&widE4Oeh{Db_J?5k#)ASl695*(g+btYhvMF44e-cPCiM6W-bijzSs8X3l!w0;GTAH?wIgT*P< zqE7qerI0hI&yES$aI(CQRWfRC!KC ziugM*U0$WLvbNrUP9re_wOUc5v9$ehX4l~X-4amn<&dWYOr)~fo0>dRXiv5s1^jTd z6|t%$rhH>Kx&&}quGA?S4#|$kdY;ti*?cfL5vVzqE z$7ae3AmdI{|D}QaIG>4@6v~n}tEk!2%U&Bi?#TKXcSh+3uAUa1q<;CdvmB9~e9hM1aG_guR7nU`$rXk_I8C%8{ zN~nBQommEuvTgr0Ae$XIHW&5#fcK=7F!J9I$cUfAMic5pc$29j-8NAE49BT?gIn}2 zcs`uWli+hW(Tm9BXnp5GfYW&IU!TL35{!+9h%wkHMfzgid>Udz zEHd=^2M71kfq$S5Q|ByAlNGLk>ro~YW4%Q;8`cE!g$DgR+lceY?%1aHup)0feMRrF zCm~|s8b-L*B?txl@JMg?=ScOq{A9QmZg**dtndaq7IrIF)Z^Z}ITca3lY}`AM`Q0L zXn=@EUJHM3kTW^)Bl_`NvouRq=y0ZD_gGlAqm1P0jHy~p2y#yR0CGe;64`p*AX8iS zL;49_vouv!kRws#n{D0^D%Ne%csa+=Pq>*}`5zD?Vv$3^3;XvXJA0q~4;q_~1>?Sp4iF_w?eYaCiQH`xk0Rx&8@yLvO2S&aB{4mbya~KU>M<^^K;jDmUiQ zrmdv(-R`DMViq~1L#Y5HMosiy{4P~X*DOtr6^5lF)h6;>fp2R76j){LN@D(Yci%=4 znT*Ld_H&|k^uGFS`h{+>&GP7-FgrADU$7L(DJ{0FGF5R!$bqk8d_+_-_N%V|ErphT zKJs;RXP`?`T1)AU;oi#G6`O{nv^)-7m3E`IfmxcCDr7$BBzA9<4|i1BO2VD=$rOSs z^qHUILPo?xdE=k=!?nhH+kb&eH7F&`Bo&l0SkL(VT(jl#MXGux#pbCp?cXFO<4Wc; zSM@%BoZh5pGI?#A^(1q+nJe=SMMTiQi4&OnVjg*I?c-PW+9&9wwa?O$-NFDh`Anz7 zDAK@a)#QA&R#uSl$}E&m#3QaJU)tA0O3^j+iv9|S5Y|(*B+6#kfJWA+HMKIEZ!n$6 zF^CZH$e|Mx80ppbBG>sHlWQ%WXavsd#5CQ$02Cu5V`p_8h-p6gdguf!RGZmN+$(}c8t7#<+qmq zk?P5E=t+1MC9DTEH1oV)r)8wUa>Ciq@^?nVP zB)e?0mU)HNMolGMu;Y{aB-N%Wf;v;LV{%>g2E>S1NcTpCuun+;j7W$#=#t}{HABo` ztq!E^HG5F)P$dHGx-Ck@?BB>OruL(CdjI!z8q0UhEYeX2cRhBQ)8^(@tf|aNy)GkXnu@gAGK|DH`M|r~jT=QQ zQjtz$|NTmQXYWVv($A!>8xi}Ykw!U-uGN$`QTXRiSQ12Ja`YI=#yxZAXLt9W{u9FT zcHa`4rMa+zc9=RE9;w2GvRYe^`FtMo!C!XI+bE)@2 ziK}^wv@q3RDkiO$WM4tg-$P}dPuY6Eegy;fH`CfN(f1WT{im|iOMm&nz0%dor>`3m z4{3%xwtV`%BaLcG4i9d^XeFfSmD6F=a10m1**wZ0>slz5*bZfL9h73`NqO`1)_oFA zDmfMAXUV6@&~q=JN6JrrVjubBs_E0^+Pt!A`hhXgSL=V!t>lZt=%9$z|De53r0*g_ zoOrG>%I`DelQ|#bnQg3g)~$tIi=CineRpxeTwA%1*f(Ug}|T=-{rAov@u&K1WP;9 zR~Zu8Iz2YJm_?Y?U+o*(J9=tbx(HC=gJ5)l% zB1a$nbKkh#*}Gvo#O$=sx{y30h{@$!0UU_iZmHhosuYB_e0K-hvY2zvu^*f(B;-qX zLIy72o#>DtLsiJ9>LIi&$jnG1Ix^Br3*4ulOd+H(Z+A(L&+U++eq<+^nKv^=5!Ao0mpO z^h_wAh>W}$LqDEi;$-s7ztP?6tZ8J%%4ccDwvdFAE2%PdzK|?MEsAu`DFMVB-Cmw~ z8$nef9*N8y>jyn-Cs*D0l}pJUuYKp?SMKYP3*POXHL##!6tCu*KG4xmR?$$6SZ{B6 zHMRri>_XDDBogAJY&aRqL~T`P$(bN;?Z+A?CX?ek{so10&cjf`N~Af~!cJy1@H#j0 z5fR6VlYK3iBaMskb1|7j-XMUExR@%ceRd(E+7-6?RGd2xyQ}U(Xl0W8?S)W}#Z>az zp=$>A?zW520PM)Y`3X~Tshn0*CF@n{rJEpw!$;(hm3kZ+9lJ0Cxw+bnw+#y zU^D@u`V(xY_nkAnWuu6N@UG7fl5L(lhbp{vmZnAvk&Q7$HdW)IT+C!-%mqh1LGIZ# zy>Fw4Od=0j2YL1@cGD4c&7xTNpf}Papi|jUF`>39rtIY^PsYd58!;KNJuD!Oe)zG8 z-ksx+F;JP(vf)=&O{`E4m4Fj*!`e@bJlos*+p|zY)-ihnULl+?@+Eab$2M%`6yJzB ze3>k{@p34=h)j;XjYJMa>Fp%Hy?nZ#qrabwUOBx7)+;SIJ+NMbT4#upH_iF5l=0>Q zGGe)suHcKw7?|SZ1AEbT zF_|2H;kon3&s;MTz2EJfMnauumL>xWUy_$)?KLj0Gs<%rpT+2ok$*iO4HA)o@VH}e zpwwJIzoKQ9CV1!i7FH`1;S;PmXfvdWs=7~?CYMVgLPRD<$8d^6bk+9W-%F=0h|CIw zB?f-Vri(Pf%9>i2C+p<+nTSkW=QaDuB0G8q<P05Mum7ws<*>ir_Xjs?7tw zg}kJ|WLQi^-q14(NCG{FavB+E)>)dqEd;2k^U7A3lfW}&HJjyni=fM2yA--CVv%Dm zly2|mFP(K6+A>h0Rn!Y$Tw5FY*ziLupBY-U`~=On`G31%kZ0!&a=+XyEJ$9Rdz zD24jd%X|9+)7K1*<)pG^m2K67RaZ%7Xq2MllR@Z*m`nk0&Al^1)383HvouFiFkKTW zb-JT9t4k@3lZ~sCq#eflL{x%!Lu>Dy@U(Ae%$aP5IIfjShQi*2xe&^b$hCN%m`qd; zI&Hn#Yp3r6766D=v(w1^G26MM0?7$^d=E{h z=8};dH@$C@m`qgnj9^-R5jbf-<)*J1I{b-yEIS|BIA2Xv^ffgkbM zSJp8hZ$4x5`cSwWmKsfV*QyKTn`&64r{R+0{=3Y?t~sr#{CUkZ($XJ6X!{^7U8E;a zpOAKG^%+Dcne?!jZNQRtc#$mcwKZ)>qY1G8XU*ugISqtw6p)8q4oFVoHlo|7;r5<=-zX}_?>0|U>}{VEso@#GSTkW- zhBX@l_I8dZIx}tBl3a4+8|V0Y&s@3T@}UbDj%F~G9$AlQvp&KrO%n*S=NYzSpab!^z6&mhAm zPbH#{G%D`B+}@$=Lqa;#s>9Cd;WOU9Y<+c9xAw@$zYV{&YTpXy(EI6uKMt*T&eDWq z!OByr+eHN{lj$w`qB&Eor^w9}sIZt!jve{cmA%(1g6T=~j0K}W2YfJ=)3!^Bs%=VX zl0@jww~{Y)rpGpkc{u7z0nA%(Z|j|L<1}hYJ7+6&N$y()O|!Bk=fZZ2D-bM3`64mh z1T7O$f!1{RT(YSx-_iTZO=t@Bywm(*VUJ8S!_o*>t2r$?y;74eWXaU~>B6&^jQG%R zEd-lx?fvrov?=!45}G3H+Xhv~WNS24byIb!X~}1Zr-t2OF%_u_w_?Rjd~$p58#Te! zDnfv;zecMzbKdNbS`)#JBHvMv7h4dpm`aZSmv-ObM;<^y)HWSd$1F_+78+2`Ix{iG zYgUzYvPRe!;>iUbbVNkPbh)Q*EsytRJk#*9R#PQT#VYhFk5uo^wWT@ot{0zDOeRP3 ziG97F?NXhMc(Km(D)IsU^Z?jpsPCA*78pdm;o~rcFPnEvJ7#a3Z(fXV=QWJMVUM;^ zN~zJzkz@BFg7l+zPUC7~F^?R*bUSvwH}Bcj`{kW<-L}nk=7%W}H2RB~a;4aGD||H< zLmvFd^uE!>RN{IlKk%Dw|EOTY(R5-#XG(lT9)%CsskPHe(MWPP--U4!k!h0q!d1(b z-ap=j5560k)0)?ue3(&90sGY-bV~H5H2h3Pbm+fs$5t+4A?;SzH%pPDatAuJ+crzH zi3KOML=tSp*}5#zW(~-hsb|P{ZlB(|hhgMW#i_syqUUh7{8ish-PXJBR{9}Torbl^ zR3r{ds9llP4RP{6x1nDm^878w_FnnJP$3*A>+|0z91YtuDDM@n+Y0_n)=T!)v89Np z&>~X`7vz|2i_i##A)=s(Dwm!!%WJHDO5BHK(_XF6NM9yO#H1C6J-k zT(FRfG?VKZTyZ>woSRK6t{N)R)yI!1Yn!9_w!(-d%~D&FOKR;|iKCz_6_Qky_HPoC zajN>;OM9wrzm0Rt=i3-{xSDa)N@|+C#hj!@+qms41*2G;OfGuJ_0Tu3=zZo>bkaHJ zXk}wzA&fV0YtFHfYSA9nB9tX9X!Vom_C^tp9Q_3{bzrh@?`@r-a_n<79aotAW_3lG zyilBS2LvhP?&-~&-orZHdF_0fmcFg` z*4=bXoTXXXLZ>X=NGHuy%(j}BX;)FRR**A&2y(YwRdY{^n@pbo0g?6nV|*&-G>)yH6mB& zB7&eZ2n30En9dhbl-h}2h0rZ2I=2pbAQ-nrS;FGiGP$fPAmj2O?DAj0iXx(tBZqXh z-ip7QhBG=oM{{rmXwH`3X;E`pV=-masmd-@mZToWEESU}aFnh0tB0q(Lu0a#y}@oaAOvWi-#sL7)>HCoG zrOSsKoV%b*tExHH8cdK&{sY#>2Oft5PsAfb@k>rti}5@`&F4U}66N2}6#&Le>9E z_;w-|IsWR%zJc%6{M2-C!fr6N!+@wl`U4*}*xC+lim@APtkArFdukfF2TMHy+=;3G zWt{){Ps5ysD;uW>eIB{xoE@%hhXKG@tcxe^r(q2*&F$SiQi8p@^UL_X0|j?N-W0H> za!n+Zz*Gf7z9G~mx-aAROLI}VgH|M>)d$W$X-#iAX-(T$Tn2dk_#UX{qYZJWanNxD z^knjD(>u&A;;J{rcM~gB|G2=Y~DPTw}0Ex zO!C?{b`09LyWc(`{=>Cw$TfP-`pZWi9sd5R;k7rfkkBnnIYi#Me|p2|bn(EE)950u z2J$<4cO99=4Xb-@A-g#m*VS>kmo`qd3U+rW#tUD3`WWPhc(|@_4FVM2K1TN;+Z;_v z7Pi)?A}lF0dDKLmsx)<{=Afm{k*0t619< zlgXH)MQ2P(R(u~`HW3-clWthBr^kD(?@v31HmMZ#gwfiV^0pD4X{$!b_kRErcrle6 z_h@h)xD__E<%hKSiaDB^EqIJ2fuz69Rg9%dyXAFpB_+A>Wvm8bGCBUrnV2_1iq*%b zSCaqv@$>~_N@XZ(W$KYAr!u82MTL^ce}W&2$$}5!AAT~8iaoc4<~Gc`Ohl7&FmIpw z{AuPbd1hB`XK&&mY$JnhD@t9;ez=s64*$3xDio!vLTiyY=5}IH7EBJAu@b3Ta)FAw z5SF>}5%RCU#2_uE0z3u2gOlmv<307Su(U&Ac3`B0V^5=HFPGSGCz`Kw-bz)UAaDL0 zofVS-0C1j=TwVAD6=9#-4iUok?$Jn-1y;+|8H1^&v%sa+Iu2bCkp-7pnY=X7d*wJ4 z;hbAYoUX@JmH?BqM?4NSXN(1;#B>58L}YU0(fiSxCa{>ka)OF*%+XwFVb`^XvZXS^ z>!!+KN8aUeMak!0K}W=7oL^qQoRkA!UfG-YZ|LkU`y4GjB*>73YE7Hbg;MI?2&c5g ziTT%Pg@}rB0N=T?_qAWcT7`>yZYx?KXuRD~Q50CGEw0i?oV)~BF8%$a{9VjF5sw^y zF}45jH9tPH_r34JrGtq>6QKn$Dv49k=Hrao323S`D)dn?`!|Wnbd2UMGDcP)3$+VHUo`#A3 ziFc>BYv!fG0` z7Xx*-t>L%jJ8G^dh}r+<^yUqVI7A{piZl6}_e}I|eUs|9XO5;L3odiJw}5JzY&7Ih zIuvYCnI}`PLODfblrOqp)%(?}bU_Tv?ZU5x2%cgl(^4b$KAbFA9I0ecNp{WQ*CH}z z`3EqXcXlUwAD>%TkKD_K+_tZxMO`+<~kkM5$`!|Wn6i>;}`^c)9;Lupg;kOldL$T17+I5bkD^Fe@ou0c%8Rz!X&(Zg4J0;MQ zDc;E|<;|c)$x$);H!Px}pv@PNrwsJu-an7d(Cl~X98!x1_Y(z^HH1J%n*uR7b^{0e z585H})*rE$iFjnl@)!gu-`>#+zBPTt$z6=4h0s`(LHpqFqbq-~Vt9z{?cMXwyM}hn z(QsE`53{(Z@~Hm9X#7q`$?1i&>yT<@Gx_kvGeEvu%eX4>xvj%T$)ejDmFPE4+B+> zHevmF_^F6Tj=X%&g0Zr#S3GY9_k!*@8tN)6s+M4Q%EPo`dS5MBH`x<;LD)41Xnz*- z$f4Jo1N-Hx2hbn7m(Yk;VH1!}6>+Orv3D3r5=nDrMiBJH3n56vBdX@xSM@euG}E8* zG~!j5^43lc336G7H|c3KEmm2A*w4Z25t9Lrw+`0}bk09}4peY=Y>tMz3J1S}KC7Ez z8G60a@?UH7p%a~ z#bg1Z;tMNgOhbn^%>>7)CU@3IYtecvQO<{~F`~K&x_8qiOac*)9MQZE{D<;|mkg2n zwNJ!|?~Iu+MX8d)v(MXD6FpY&_D-B4Rdob8FP||(Yk4m92x27C4B3<-JBV%b%;^Gx z9^5?hz?eZ(bL!c0&E-e{3%nd0G_tq_jTG_7klmKhcn){By9d?d$nG68n{du^Nr2bZ#F-NCYT*ph z;c*M%<4=)x-Hw?JTb6o`{OpCB2S8#MFuZX4vFqe{tuIs?2l#KeK#x-ntv(CDkCveB z_FXe)Y+L#fgl@gCZBP^yO&}OfYhcUfalS;gHae%zXAUqD zsZ@Ci0O``tpIX7~owH`vodJWK0!!Vt0LO9CAa~8tkZWPiA`A-`;r%ut21}N9j&9i zvdzgMXmF|wnwl1%c$OHGT_21)VpI@Lm5a%!4tmBQ@%xUV{p1^L2L3< zQW9gPW@e>AQ&Jj?i-<+TXRqviT|?JJ=bRLc5F{w<<&KTZS1dt9A1I}`q3JL9KRX}a zNyHQGY03`)qDOrJ;E`P4$YFKI=2B4;N+qi2lq@)(}gn;&bYQt~# z&ZtgW>Jgzr+HE6G;FPxp#ebO~Y1HlC; z8F5u{p*0%!U8_E#Dozc8q@2 znolla*?7sG3fimQII58KTlQ)kEfevCQe^#z7+V4(fU}kkEfCfirz}%YC8yenbS$8h zm&wg4EW#NN8nBoH98duRjf%}OM}@=a|xkhZ#1wv^C-OMRFjA|65w=lbD6 zJ9{%ex%UEyC#reIt{I| z!cPSiK^gJpp*|uqIokQIiIg6EdR6cH`5E|}Vsi*L9~fGdtiqqRekV?^t=s&8@9zfAZESVzow@MZFC#)&(W}1;o8XCNm_NhEZ8j6 z3$e6Xmn18i7;-ULD9nBHG0#M=(VT$~FFc1()Iq+4$e2B8=suIg0wm(~4P8=x{*K+f zvr|+~Xbu6ggCH%Dy(!qD2#{TDqEa(dM)tf}UEh29rWqqvhS;2y_NQMY+!u+;3!FKf zjO(m%O{OI$ccjrDF_}F31(&h6I)jtKHo>voS+>58NRj(T{$==`Rr^=CdSh{x#))|5 zX#A_-yf7v?q%#JCj)X=P48ZA64j#fvyWzt#W21|CB=Y3#*fuCkdf~%#%w2N}aj?}+ z)L&=oQgUg=;gM7?=d~HRzMfNOQ*bWz zn{&sVSZ&2TTrGa`DiqA5GOTk!$PgSJ7G=reJ$hAxDouhSrgay=X_XbK# z6yV(ML_Xn_)A_M)bTO4gYQI2JEMvRCdm7?J1!-gK6?{tcwd6U$?BVCb`4yb{X%`=wIAu1w%UkN zvO=Lg6mOi1;ibY_6-<^=KBi;=zO*H*jo3-+KA5;7Dmi+buG_F|$gB6wAi^~~gDved zGrQqwLv5aup0>8l*XF~OP&21grKF}9F@FX#!7d^bMh6gDxE=wJ`I(c#W9nBsGYdL7(Zr|OJ0%bD8If{F1+Gu}8^_aIb2Oorp)K5Oq|55jSQ z`|>RMDy*d%f2!5u&GA4v!#WwPcCUXPpIk(xwJdGD#zQlxm+5SAnFz-#!;M_hU`VHl zYXUpu|NFwsmiMwEzRz9RbNn6kU0Iryl!Ea(f;MBw;cy{z;r~307m3J1utLB1>sgP$ z(TDGvqMxPjDD-EX8J-UAqAmxPO9fT4 zi(J|mQPnJ!qP|6*{V^2Z`|X)68$~P}^l!Yf_oZ*+o1^sWTw#8$>QYHS%{hYJPSs~^ zDd51p;t1xdm<+^7R6%&=2&UVZOCOimxoTL^W?NB<5gDfY9>7n;WFaKw3lHGjDCo;F zEv-d1zD&FJ;K(_{cP_tgE6xxW%kgQX0Aa}V7_42nj~R^KMx0*G~_k4LxB*HybK59B~QWu zy7UudNNNO-!;_DuPw!zQs04L=g)bPLDA9 zbbp@hZZGvHc{~MBc@%5tAhi6Y`{2R+8a$YGtvc@r*gAGY7?mhO&2Yd4s8wB? z3f;GDX)Yo;ZaP^&;%ffWs}4UiGd$K_w!Si|T{|=K4eWD!S6GK0Vk*N!6h}I`3tK8J z>@)C(8Elb|&FZXaVxdl>NM|6hHD1BtOd;YN-Sz9MdfWe7u%>2H7jOZ-;E z!@WCAMKXJ~{7+j$f2}?SbX0sKi5kNVfdH_dND(CuNLym|?j$e!-pU-&S zKt-otLk_)op;5R(XI%2Bnv!#}T8XTY(q&Pss4pmW0)j+5#FZKsu7k#V-#S5iRFzel zaked!+xS{NpF|BV2pA_<&CP7wDB{r?T!RRlPtQ?<-Z4ibXoVj6tG-M{W-eM$Wf?%~ zt&98y32JoRH}463Y}OEGFovaNSX?J+tbVSOwnlV^`-`)B0s zgKWwEDqneFX4j?kShsyyY}v-h=(D4HHym1je7$Pjk#$3BBWs>rbN0vwSD#p|8Gc}R z#j4oK=T@Gx;+EwnmTQI{7+SF`Mi;{iRvy}Q%f)2V4`0~FOZgjON<~t}NFtLAFN;p{ zGP!(GDT_0cak(PSDim^F5{)o2r9vi?12^Y@Qik&IN6sW?t+uS*DmftK@qmm`@;r0$ zKcxG}hgd3ED#zVCiZV_z_&3QboDP`k$p;VEODWx%GLVn6?IELlO zYqqt!{!$md|LBJRJ;L7*kxJtjo8+XDkwG>qkxnW(3=Yk`RYsCZX@rf=%a$Baax(Jl z!~E{QB)a*3KE%>y$D~O)P9E%}ToOy7v20{g5sfP*BN!v4L?T6a3SK%GcMJ!^%E-`q z%Wkq~wPpA;BR~F_&}<3nxWyC_#bhj!h+s&fvdL(IiA_oqvUpOVj7JrT*h$$^saC2FU=aC;%Bn_OAWQ1G4jPg#lp_ z3O*T0$R;^C^qY^y@D^!;n~cbm2?lYu(nvyaifopZlOu1|{^EfAV_!6P0~?WGTv%?B ziAN+5t&C2hf~|CtjYXpo1->H_TWGfY0LMwm5EcFDHH#*YM6ob|u6dBQn!ACE@`Q0;)zL~VbI{1R5qF5lv0$=WaVV?<=m|9jy7OC6!`oDbS(+?TdEaa%R6nJO(bp z#gaU)#0TPJ7%n~%n~bu2d@`v>BxOmwj!Urf11CKok&wvjr~cxn-}N^i!0N!=fJR57 zF@g-FNt;Y)*n@T``Hp7^>f2 zg%fOIG9HU_ED|d)$>w)I$VSClM8K@UqVtorr|RUXvQM3369b)OZ@`)vjm5a=q(U0U zG7*m{C-G6SZbqZ>Xhg|M6Uup2;baGtQu#n9>5CRd{?r$d%Zbp57}f!W9IFowA{hB7 z6Q7L8<|EqG)U2@g;X4Z~-QE87wDTyo! zJ+p2ksK!t+FI*t+``*m{ElV-U(1YB3PzugVdoMXzumK0$77G6%rh$SN&Y`)*3%%8B_1J%Uiu9ZbH6=yIqJ0YpB_G^_{aeWy>9#Dd7EusH6Uy3StJVZ zK{rifmp&z?_0BX@?_gEgutN(0uGBm6kI?-2!#8f z()DF8&FmXL4YzmbrOzW7mo|xvzKpYWSc_mLgRAM#nxr8XxyM@6@XMkiAkG%&Zd;m* z2${Rh?y-xbn7Y7W-{Zx^%w(KPMHlYqYRgC^q7`>9j7Z1 zi}ZtzAK#4Q-q&BJM^4Ajm*bQsxPk2fS4z$Vd_`+I*~SG7P~oVY-rF;0Y!dV4k?*$k zw!AZgEYhDZr0waMOtQ>ZEgqxF<1d(83PH|we?lmMm`9Ec0cry{eyD->r~bLo{d1bQ zCtNEwODSW5DS10?WyDeqAZMZ9qW}6MdM4u0%!NT#s`f1!X*0Kww+F+b(BUi%k6B$W z+gnaS%EmYUKV9D)AW2p2y*)YY%+BUz11#+9vfx7Hz`{c3T%DsJR9EPnb1M!(K2T8s zACzGR0Z|b#AZi;hV0b>!PeII&r=q@D6+{>DsXW7Xs;hQnn*HXF`QzMMr|-RWQ=Q*A zzXMu^iZt3BK)KH9SN^PGIRE|n^~MzPR=$b($~7q!$16nw5Lb10ZuuK@Yq(57Z~ngK z+5g+Wfg1P*y>|T@wCAj$rHB=%Kb_UMm(xrGZ+`{=*Nr90sWr&z_b)_h#daq6K0BXcK=`@}M9{P+3RF!J4|2eS&9DN(hltq%%{cicm6%}V* zn_2I5jCPy-DNESl<1;RATOYhvjf0w@BIVvcj)B?s5r{##b$kUd7jA7DnxjqiDpyM- zFsnNda>ynrQ_)Qu@1FrZLuCs3U5J7m_#%wYuE2~?6Gm!Uuv$FrKrMDt!kWdYVin*x zwNqD)f|j8&<*|FWsu6s9`=1|OfoL56ni}M&SrgJ!x{P9WQ^qHHb2(E?pPp|ttZdsd zT&5TjCjiD#15|%&PzQ%wn}EU5R-UWXskA-7%Mq>kxRP1an)B4u%C`B9Mana;gIPWx z%veOBzyW1 zU@dQa^sN4m=T^W`DX|98VY;tekp$8IZ((Ozi28 z?O9P>de_vjE)CjB@%DOy;JxV@#c*sGz}>=GD~GoXi#2fT_b=6!Ac_3~;0L?+tsGs1 ztRPJawFaqFxa$uU01*l9gNKL3szbl4|J{8nV5+zJ6A?fxOO3k6UWKmH3Vi?`85XPl zG#=%|*Pff|KXzc{axm%%YY>s8H(E+~^FZ)yFG5UP&sC+e3Ox@>hQ%61%xCAJ&s%QU z1T=EZnfs@nn%p#gY&7|);7v8q%B}5Pe=DI@r5VKXSi8&-c`*M%eDdw^cFk5;nnPuf z>+hX|#jvA)j};a;>^Env?>A+{?24EYglIVFp&9NKy2Qsv3B z_Jh^`+lz(4O>s)Oj938=Xvka*S9g@l0cB2(%O+Hg8n|040Sd11H2N~|?~GOZhNtd; zOY9Zc%7k(ewKBWg+w(%UXD$oTuX(Rs&9v=A5)cimDg?rtGnOiWcOH0o(+*P5(E-~H z#LniRlW+~T!q-Njpz>jIVKJxJnU%xa&QJ&;nmb;Ok{l#Y->iWSF9!ilkj5+ld9A%& zE(iIobEblF$tBRRGnXn4r{-UN;a4_as&)~+6%w%k1a#*K&aOJ3M|!?6bP>5!?cy0r z)h+^v_2&g&}rZyc~;Y#+56>ivU1zwIi+-ZeFxPrE0?D#~$$V)aS@sJrma#d+0m#!w7~z#m2^2VeNT zTPeTx3wxB-A=iR((f@h=TIGt~I}R&%-Li7dUeDS=xB_Y|v=i+tWtRLINQBdh=hVU7 zr9Aqkm4(e4N|bxQ^4lfla_NrU{he=C7c4G#tTsICHN~@ziaBf{l+LZt#9^^=J$fZT z*EhcrNO^A6c1SglPun3)MJsR+c#V7k^NERONl>1;1s45~Sb6ex=3ju$w!YVIJ>U$qrUvn8*RTjG zhJ9#BtjH#aEX=#p+L7@a2OJqgWy&+g#Ndj$t8aIz{qe4;;e6WeCwG0AjJ1rR9-QW3 zR{+!W++zeiLuHU=6C$i3RBc!P@5U9AVR>f!#Z4D)x?$7AmnK>hubK=`VUxe!{ISjQ z=6!SDox5f3#K?C?P8hBk-Dh~w@E~MZ_}HjC`qIn|Be%@%oPBZTTeA<&UNgOA>ffi6 z)6Y-6Zibn@fBd0waeUv{_r`7=vuyg-Nt+@2$->s z31mvO-yi)v2q& zL`9|Gd;}0d)lS1dfJM+_D3!tq8Wj;yAPt|>t20+qkfnnnSnL?a0PsNY&<=*c1TYh0 zJjPJ81Z*;fudQnr;b|7CLRVFDJPYs;kBh`HMrOcPNn@l)@`le0s-F)7NumOll2R!! zwDJJp0S*JrX60iPSh_F)I)&n*K{@EV?cAeK8#;s0DM>yiBRsSPl~s!*yd|6w1&K_d zEZ92@U)I|KZ;6C~R4d6T8O)Y|W&k{++Fmh6A^?;DWI!}Lwq9KZqp3j97`$|VK)}8X z+HtT%rUV>pc_QSD<5Pw&DSs>u!0DJ;if~A>bDFg-kY)YVc0pLFoB`-K#83XS)0xYV>07!!Y zK}6^)0rq1GkR=v_-+-5PbWr(1@@hl?XoUszjU`hs91P$CY)Xc?1(tA;O-XzTOC8?) z(k8Io-!n=m$P1SrJW7&R6EuLbV2(egs)POl0sx4W3M=5Em=eL}4J)ay4?1}@%ng`c z47__nfF?n2!2Am^5$GT!LXzRV(uPm1R|gmgx(iqs!vdf{UgKl zN3`mLWi5emSzQ|7{{}MvKq#mVPg7vXhBSXEn16=<98^DFZM%qJ1YoT2h5*Wg`6a55 z2w=bhyd;4J;E^Q_%JrAL<6L#m0C*M?Y4~v*1r!C0zJT4rJcNaWQ-CQG6f25`AFnr^ zM+uo>Wbzn8tD67?LkXZByf^?(5t;^LE`=FBIjDXF+QQ;+5UQO-Rr~}n3hWq|!r5cA zAj>I1CRK1(xn|q-=N%>4s|6lrCzFDeprYRd;HLmn!L~s|qeV=Td6uUQ-_@JKUd^x) zg&+id49-~!bW5pYDVTxBV1Ge?RD_ff2{SyoULECAWJ-NAxB$2mAp_XJs;IaGz$0Kp zG6_ht;feL?EFr=I0yG$g1vWvWMF0;$2M91< z16qX2Fy~?S18f0q;k@D7gX-rGx=KRVMCup`n;2+EVQ;};{8O?Bdoe&ul0+MnCq3$p z!CoyBJiH^QO{G!{3_1bR3z5}_)mJJbI4CfDOK%HvHAe6VMDfYTB!ESsEr1fU1P=Cf zHpOBB4KOxO8NRt*T_6bPJYW~13>zpxQ*dC&u)**on_>_Ihpmb>JicC?`OgW z)M1CCg9TTDV+g_!uxSdUgpr1CtXCJL6feM0bPR_H0#g!z3!Z@^OvRHCK#d4kpoahW zS9KaF=kOG~78!xI12hAeAvhJVf+({D&%zX-4PRfco`Shbi|U)_0T73k1kkTKF(pX^ zECC=Y66X59>(!~NA=x&x6^4&OW#}qQPJqr41jZF5V8+1ai{pkz2i1>|)YXj43$RrI zW-Y&L+?j=~@A_77DTNc&XOI-~c5zIbtR6tTHR4l^+WOxzI1e}5i05A=} zk%mv}O(CyNsg4m0tY;LCV0fo+kg{-^!>D3#n2;hNiL&9N>(zMxxMc}ZQ6IJC5C;UC z3&9_QRB5s-0y+aHv*F|as!m8eI2w@0BvL)^WLSZ$3|p{FGBktIFqa6-@G(epa`B_! z@ASguhfctTM8n%aj=|v$=Pw)p@B~XhZ+IH6vLp?Au;GVVI730r)0CLGY3dQk(=-p+ zbqamhJ;QL3^Q@`V1e*81y_8Kt0vV34${EBHOH1kn3?eQzij`+v7adl@Y}(5uu-aQF7@DxvO}RYnTmm6YpAC+%jCI7{jXr zR`BipWA9dnz_&JFDj3|#O>H#QAxe>U+}F*N6Qc6iWnc=Z-w0nmuPA!>`kyQ*TV81F z>_2g%dZ+fUL3Ve&L6#t75W}+wmXGHurEEjc8uZ@l;WKThOfmj>Y(0izd;g!;!$tor zb^1(iGHn{!0hXgT%{)21dy{GM)#LY!o>Y(D^C2R44PCeSbX#3irX8Ja$pkN*-yMvRYR_+ajcgQ+_wV-AuZ!>2!<)eicu?;Rlfedl|x&G#XxxR*pdFZ z?_UA0^J*)SVF`C8*-2vrYYya<>prluG`~>{`MiF3xPS3|&qMb5f$hZb!Ik~{*)^53 z!LI!>QZ@N-TccenIAj?-L=^Ueu!I5|#mZy*0*Cu|d{CXYM5fbi!9_O`$oC+TA|@y= zJ_uie!(!D%{8jz$#2(mVP`1R|1cR6t-j$l_1|#wgX0 z*uER4@Nk);PT~F+?p|>iwqK>%C~uv4YI@J)HRJCeeQwiLBZzXa@;VDx2i4G0?b|oy z_me2czB{c{@+oDJDtz5_v~W1oSUL#?U7@tU%v(U_~C{*I&BEmQ-jJTPu; zQ~aNS@ft3JsP?&~zVewBaLu$fL%lNL0+Kp8l4H>fBo?BeAJd-$Gx|`O^5m~Sy43f5 zZUr1FnH=OKCcF-xOEB9bm4cvr^ii0oLt-GVe0Hfn{doXPV1cPI@7e;3kpO&QjcTO< zj%I=vqLtHMfLSsu2IK4{NBZI8jRX36`PCO!_U*rsT%*=Ck*T7bCQMm>-5dAhBQYg> z-^!6KuaI8*g0XKRxng z!+SS>b@M};@7#RtW_c_$_O8v`W_t74n}@7!Z^%O9M(eXchr%(>_AxxI6v zW4YO9XP+AT`0VFq?_aoJ_SV_P?3J_D*<-UiX8tj=HulWSw`ck@@0qz}raF_DG0q&F z**g8d)4!Vj*7PSw@afg*o2H8+cT7hNpIi9#^oi-i)AJ)g9z8hqKT|)Q`uC}iPAOB% zQ)xqU%0JSZVy6yHO;4V(P5xx^%L`jaMkgPfykqjUlj7J7lio>ka{uJ`#P244F!9BS z4@|smqCIi-gx&D$*wWbi=$}V_HuB);*GE4(`p(hoN3-)UjRr>9+l_lhMpDY+_fPI! zHdh*GJ_I*)XT=U|^*PsdgQS#ZsYuYlvdzauJ>bWH2bDoCNwXaGbg)!55N;IX=3bHx zYN<2LWh4PP!7aYHm}b~)TMnM1)tAyi$OxKXi;T0DLuDp_YVtT`l5umuz3lU3I|*Am z>$_Vks0kh~Mw^WGaIL|TJ<*@gd~;fa2zmH7Gf}bpp6-GSb9nG_lOeW`gpUdYMqvSfbs} zX}?>}IO_zR?^VnmzD_{W+V_mI>H}7@IUbA`+8I97Ed(7%ExUVE*Kf5Gz_?a0ce|Fb zlbO;|ubLr&wF7mxdRZTD#gRJc`sDme1|W($x$6VqNDs%$z4G|7Ic=l^0W{(Cxw_qK zP>BCRYekODLDym(TPex4?M*87XH8!BmU;w==S@|>hUHo=s-+1wr(F#*?g@5nf+dnD zSLNu#x}K;vj%F#B(aFr7$XQ3>vFM9$h-1D+;6>xJn$|uFC~e zTC{&pm)op8obse?Va7n7F z>}E;dCTSUDVd(^-9N#RYC!mpKK&eZG6e8%gf#l>P=Z0k254@ve?LkE?4Oh z1S(R?n%sFSu&iA^_}OK1J(A`kLP!c(uwa}?AA671oI2BU#yeS2Hv038kmzXXV!X@6 zIkSs{B&uKxy5KTRd#&Y@h;Tg;PFSLB!%iZ3T`sjHJdscKxVA@VV$ybfwbVQX0nNJF z{^ejLAImtTrQ@3ZnkiT!8~~-I9kx2!KJjB+4+>eXymU`U0ugQ&$&KEu$*Xlfj#WK= z$(<7Hm2isGvSgd9nNkpSpw2?T$0WE!ipDhcRnaO3vT4MUH+k(%_Och3b-6EVtM+P9 zh=FY4#r%mMYU(RRV+s7nfC@cNnRz-py`sx~co(X&4@0|(x6(dY^^dX&7`pvyfxiAH&fX)u&2 zoZv6}vL-KP+-)?3;*n|xwKJ~N;wfD&k`=sL%UcnVl$&POpl>q80Pw;&NHR(nv&{%O za?h^iQAn9?F1k7#*hcg4Jszq%W72|_?%7;)v|R}rtA{!zONk^bb6WF@_C_`ALXz%U zt5WWy_CKSGi8>DyRY5BjDAUdQtM1eqQ|P&4Sglj5`4bpg&a%XeE-#x=Y`Ih~xtiTj zpw}XI{#q}{8A&Y2$#!R?o%Va_neS=(3qnV#_kc?&n(hT*@|>-UH}X_s_vl*8K&G5= zhux)a6D3>1k$36UDW9?CwkOzVHIA^$g-hS4*GH;Bn0;AeJcp%#1{mpU@_fVUMV*Wh za==G(L;$^z*7W2nQVq{@rEr7bd<|;iI=y)ucDHch3BA6znm~!Fr%?_hqeL#Xd%G^T*SdHe^$J<8 z>MpqQJM^iRw`R(CC<~e0GZ20sm(Jg-H8WSLkoB;s6%*m%ocDa%GheXip5`A&Yz<%#^F@87;KR0+RX+m z8LVk@0W9PYE%2z;udFp3Eu`udo(n?oH-%ujdNLcu6J1xQX7Z)+nsBy$naW~G94{j# zu@b4ccs_r@q*i}9(~6`qYm_LWu4IHa_7ywzMMBO3om`Se8!md! zvs!f-Rz7YMO>D^?#9Pwkd-UoF&P4PiIp{KBb%7Pno6*<591nnBwI|`JW8t9CqUYWE z11ufEnw-BUH!v^Xq$d7b(=SyS2g_OLFvrvzsoY-u?j(hh1x!o@v!Pb1VB^Hg^|>i_ zU2)vxFvdN_cB+=mE$-6Pi>=0T5Y3y4W!_u#+qkTKPA`ZVi&&(F<-^e+!C}mR0sta5i zfRI?GA{A)T=}OYZXHFN`MBEE`QRG)rwUi{aw11qe4v8 zRXFPW=N%YM0$?j=1w z{F2}41qqTtfnPBkMcd(kF@w4^xdhJXm8{u`ZvhkC|DE13dDZxRBjejQT`~Gw)k=35NJZ9E zE-5V-lyc@0-fFcL^bp=+%q1z0e+BHM8>L`i7(cB1({u1y z(IhLD(wMXCDWsKqz6LgfA+fS}!}KxbAB*>G>2Ljau(9qV)@<bRZ9m6CO-*XBFfd@RLJg$oKKvrT&|~ zp?YKzYo_&I6H;6wYvSYa6wRa)a8dv1Z$W33rEjlXxJZFpsuf2$NS{I# zQwgwr!E=!6VMweTOuTTU|AlX>cBLDswaejWHM0h5>12TBzs$D~d)F_v)W^Z0{NrE> zdPULVj}IJDzW5Q>ME{YGuec10c2CBhBYb`@7Vx2DGe|4*pMVh?5-ZogbspSdpSpak zU-$%ARqlFXC9|6=2J_yS4fra7U^3? zA+Ih9q@7(Ly38q8{$OSIK>~Ss7KAfY?LT(i=`aT6_z%FP43bE6y%xxK5%YGSXAtME z2K&2;s=g&45IsYwVtC|TM_%TecJRdM#&O{!4442Ji}R2SIe~k7);5fPR|)<|9k?@> z_80%ioF2H#)(6gF#UT!&m<*e8$*>oN1aVn#RLdyVpQv72XDn3$R(!*tUAo?`Tpou^ z6m6f~3BF)nLS+wyIQ+J9(N9-)okt<`%d)`$ckC` z{^wK|BQ;sBhO0=Wa4-bkDlseOF1B)_sNDA7FsX;c%Hp_TNh$yJ?%n;7H5F0e*3`u5 zn#CA2L;+g}(Lk)?#(+`f(O<$|uu-ZJsyy-ZwPRq~z8^w8eg#_gs*H46Gl-lJqA)(; z$hjL~ClSjj;z=<04v8Uz{_jiu&!1d*jf&|wpat5~*0we6tR$Lr5ctP3Mp8NX476aQ zR5|tWcZ0WJ^c?JNK68>PVLim%22w+h7fz4|pM#e%Bvy|QNJFvfRs-Ob;E=6c_&iv= z=`}aBK-=ZANG;aDbEwk=w9+X*BP-(bpl3*|JpAZp7|rKboQAExRFAl;48H^q=HE;n z8*hw$T1|xgO@J{2YXQ)!9dI4q1+GF(qLSckb$bEa|33Fe*nNk^%42*Ac(a^arxhge zzAgQWUsTUHD(n-%(X^2kT1?FosKHG8le%>eiIscX(@V}V1F8!aCKkg&fBJiFy zOFk+(nS#xeVyd=w`7^xdjZ!7B)dKtPR~{VeKlo>G&0egaf*A|}wiF;Zaag2+ zGWk~+j3KdNl$gW))L+$>_Jjn}z8%!%V1!q`@)A5TBvz{L1DduWGO_`7W%(O8 zucK|glY#Ey3|pgcQjnC_{|#pJkQf|?qcAI*H;(t8{+oKpP%f{#iTl&xu)W+(uyM#H z@(*>ChQw+%5w8Eaf50j_a3iy(@(gO=OMtQg@jwnYy2>4MGFKzj^}Ivz{sv&lp)v*i zx)ng2hp@5!Rn4K4%kTbxoJdj8(+ef!udTqy!;SFKO3 zDwD1fs5fdVq=I~?M=7Vy0*rfpWEHr5HWn%Oz87{Qc*Q{RIs$4S#zQ6j(_%c*2}sX} z0TY{O^yhqSzzH81hvp24mD`POfUAEqKcW2L;XiEc@0(a1>}s*~UCnByl2K14&T$Qo zw+;@dCr_z+$_AsZmP`ou;5L z)6ke9DFhPiUh2PndKEyYh?u0RnCK5zEOm}4!G8S03_LL;*7oBk9-_zk{@GQ4Zm2bt zu25SgoYxn~5Tvi?Bjj)*Zo-rg&8-3<-H;e?Pwq&6V)H7jkzA~q_h3w?YRgvLZL3RE zgn9VYA+cg?F6nsNm!H3B9eG+@<6 zOVu{!?=Z^OcBo^#Q4EmukI(O)yK@zo>F70;!Ax6WWqX6-5l5V21V^~xVwCH4!NWsR zY>I|d0#0#<)KOS>5(ro3<#{P>VqG3@!!lJe8XuAS%y_O3b&Text+Vn$tL zgO$9T8!;;U7Fb%J-?s`Zz8i~_d+U(KTn)|ZPwiiY3=@2qZdtH0pEmb;ZA&jJDB=P5 z#UU|pO=g$+U%dOZ2T#M1XRiXWA+x4(3Tnev2ZjqDW(Uqt7s(gnAynNacAO1#RmjVN z49r8-)GYCb75@*vzFYajkuM%sj!vzf(p@LO&D}b8+sqHA_f7HuXa8p8*rvMrQI(19Vb^6;r|FZJ&^cNM;jgp|2S5KeI6OBNV^ zmBa2j1P=^JmBnw$Fi9)NC;R*%7^p4gv=#DKC5db&P?91sUU_tB^~n52sd792nZx~E zhheXQ^IGL3(CAu;AZu?L6MQ^pDy9_d=<4CcSBU%P{O|J)!*T4AC>6*f_N39lSTJk35sYSA7iXLC zY&sdZ3_K0;>r)+fm~dkavvA>tEd!W~^85v`*fvU)XKXCIp*wFG>w7PRNeiA6Dzl-s z6$xFrWp4P*b{@5sN+AV3s?NJtt!|&+SfUs{2pp^*8*PvEr;ovYwhvv)f)a9YpYrmR zU_I~kaJa8-cc82yUj*CPu(W^oiH6B=0*DoJgi>CfQS@m6`1@?n7b-E#9}({~6slSD)N(-m$uGdB%|6^mapN z)A-ET3u8YSxo7OlV-JqKeeAVk!kA}_7~3~CHu~J?_eLKby?^x9(dOt?3%?%u^}-Vi zpZOQ+y>P+8*7=uI?0e+X^B&h42q%>HKfyR)C2y>IqSv$fge ztZDXw*{w4#&HQ5K@tKd$yldu$ncPfp=8~C1Gjr1~PCq?*Z2GIyAD+H*`r2t}+B;27 z@1Gu@dVcB$Q(u~TVCuF}>r`jtpHtUNIi`@QJyRo-&rW`C^3lorC*LyJn!LI=X`j4! za@WK^Cr(a$XQDsxo{5_$$`i4P%O{RZER6qU{O9BUG5)dfcZ^>*o*DO#v*QOx5+lZu zqa%xkzZ!mFc--)a;oXKCVF+LL2S%8I9VS{2pjiy3Iwmw6uX~bI@S^_3+vr)ta{w`_Q%)h)+zj&zchVEHzgEFPB1Ll(?@^!|apC|VS&o^IQ;jOWQr!0#kNw+~FC zF~kp~1ny?MlWsM9eDK?vmPR9O#Ed?vDW$O_(xHMkY4T3fQO95du5|oCXStaRzGfhg zA!MWn@Vv{{Nf5N%mJe#yt7tJ*LLix^kDy{cB3xt_mjP1(197zIu(a@EI|javygTO< zbDI95trtfd**4Q^$NcfQVEK|Rw}zUSJs)Vr-1b@~$zG<}5Tiw-SHv8hV43wdtg#Mj zt!niP)h3B2tu9)Mm2JFCoTmYs(ZX`cTSZ+xXQY%iwnO36!n^ecifIn*1qx)KQbWuL zHuIP+kNIji)-@(5qdSg@B7UPTcZZWG+7$6-I225^sY^bh4RgWG0qp|#Y8ovz2SV7- z*Q-122$5*`Ez4DymcMK5&-t8*E^kX_x+ES;NT!De`eP(xD`7RCqik~k?O!x^ zsb+c_?Ek&~K!m5Tj#Khb@oe3Oizg&q9%g+Qfv`P)KHe+U&~yGx zm;2xZlZxq0FJQ!y$&{kIr zeC=C=RdTf=HL?}!WQp4~J-EPSa5L}m0 z;c-8X5hliE#adpskRg|k>xyDMALgrBqor<_c6IqZ8aNQc9SNFnQ_IFxqBgs!KKdm@901x5)pn)lR}W67wmZb`AbcWQE^ zYc!!1(MXnpLBF3KJE@B|65nG_YTA*qkwGKnbS)d=jJ86?py7Zqq>y9?v#aXz$DJi- zK(as>*To~|7?KYFO;FyE43e2-D`T4j=o+@47$V_KJm)O?>gkFx2Lq~C7x@m+Ftbt; z(y&SRj=$<+A(E1+rIww``eld~5%tDI+X!B7hX^nlWf>1m{Ese=#A(c#ain5w!ofM1 zBj3^Gfr5RR@OqILmc{8X%M?le}-q|vT3Nl0DsxV{zkB0y?|yTZwCF5pTx zgv(Fsw{jTKCAx0H6t}fy+NyzZ(Qcly<6(QDn0F_eoNN|Od{)!nsdOT^t<$So zDZ43_5GH=6%cX1)?`DeuqJR(uBX)^v$LPgyc6H*7Tnl#?Q$-?+#;BHF+eh07D{IAz zp;E-=A!if1-0HI8DaZ;IO9YeLay>=sXVILyIydO;xF7A$GYZ}bQ7pc(ZA`FIew z$Rdd!JzXC{8-RH=R7%AhLLARrsCfxR+wmrZ@|DZE7#b+JJh_R2rl%c+c%^uxX_kv6 zONuINQNdhw{M#WwUY)*dBL`_>ff9{;Tz|mrBCu+^9ON2hM>@_N9@phmnt&sawB*u- zAX_S2a=9)iLOfQA_b4A#BE>}h$oDmQs}A7^$uiTl#GElfr2T)=<>eIYKPZX`KBDb( z8}pZ3tQW|!1eP*0VH?@OdMWyB&F?DO5@KbXkK0|fVksmRB&UA(wnC*mniA2RSmQ&^ z40AHq9m(vh3j4)dLW~D9QVu3;eWYFy; zP?m#*06F=ey1Zz#pi&_nOF;BNqnaE2hc3?*92mG71D$vjNmGnT z+uNc|xlr|H(qXx3_BH6jE@ju~GI(x8n_=FIQ{hf8SIJ2kqj+4qMMax-p2JP)YK3F` zl2st*Gzd7_h$SIo0v#YS0k+u;S?*jnxqfZ%%yWI7YglS@l_0epC2tw=l638dmk3_YTOlF^1us)5^k){)P` zcVRev;tSf!t2gc7o?$gnPJ298rnlUuiz{uZSmbIvT5Z`=>9h3VtV<$E^sL2DJ%}y` z1siG5S7cq{8IGKn&PYpxSEC~ z$*B2aZe)jrkUPy0CR(%91)|MS399aicN;V6cB0Pznu(6%9>G&grOh#`jX$B?TB6kk zYbF2?@k>;$5<)0OU)j}o){T0sbrbL$QGNysENb1Yg0D-+?_t{=s+zPjqy~^jtCq3} z4_LCXR?N~#xAR9eAGT0HjCL39>T8B$ETQu0NABMIpb>ui^ejSo2=-1 zAZ-#+kRcK#E?bTE!rWKxLRK@oft{iU$;FeI9k<~rQo3Yi++r4L~q5Q0ugG7R-ak0hS z0Kn!FxqLfObP{TMM`$1FjRo4umDDP5UEnVVI?q(~Q;&S>G}Q%5tcpjoG{=l5rniqiZurZlLzB_*yZ>cS0Gv}L>ee8_y5CuB;L)N#3x`Rr1%_k9 zxw=ES(6qX^FjS_RkC*xt)9O_!KG*^k8a^nuJWU)&A?KtNkD@kF8`$U-tJ}A{qUicj z{}JVj=DTsz7mq0Cyz|JIa?ai>7qxsn?{KgFaUZo-hpuRb&qNiKL#~eCO&7t9320{? z@T?x$yg{hkdnE!vkq5>ArShs+MLb&QBv3n+Obc0GBSQmJ%)tN-iIwUO0|Y*CfFG!K z=qmJEvqLwNA)^C4NQich;R93*Q{H?IJU%2=3_mDBa+@pmj`jcZ1Gk=rI_Az@-KSfh zJu2XF_S_pcc_4Ie7g(S_F!~48`i!ZF$F=Zl8sd=^GgSxPqH7q3MTw{i00m*RhQ$yK zR6O4QU{D32ylX1izBc6&MF4{Yx==|JU1YLMD6${gIwVydc0p3}0hYzF_iXF`#IHgY z_{kAaLu&zS5P=sgWlIFtvV@C3Eq8qk=Kj->)x|B=p`w1(8G!&cAaAzDRxeycx-{oO zeKjtUV6(nV2@*=ip#8(*w?FgnA?5c^?;Y>|Jhpnmupc|AQXK*u4v5q}+r|$}^rx>< zA(L>`9W0^_Yt)*nd7?C`q+YXnWMN3ET>p^@AgGrf80$awnpKrXj9F6?9cVL+_4$fG z%Kv$}aP*kGC-l(u$hBW*SXT$FOlHK2P)3^@=WS+hD6$~`xJYG?m%*Qm$?b5bQi z)Y^y?_(Bu)*DNN|E8yOasO%9z&yZLNy!S%LdjItkw$LfmR650mYuG81--E&|D=^k*5w9dV!9s{~Py(trvH*g-Lfl`@!XPVO z%B^0w5ELWLvZaG~!yT3fj>DI7>JSbIpLr;Cq#w=0L-2blC873vrA7&Hqi6>b3<`F^ zO^V9L3-Eid5chvmP=D`&5-g^gnTPCZ@wPoDwoo(}5EQutzc?fY2eLmMR{mUAo$r6A zw2G>e>g4G93yT(pjH=3P7<3GYHGFsg<7LBur!3FR|8motM<+%G2*iC0Z(690c2arTNX9|Fn?U{9k}Y ze0bp~#NfStfJHEXMa;~-F!!HxU!8ks!8rGCbFZ5d=R9-d!msD{&yCOiZua}LpPzmI z>}|8lomqa?Ig8HjfxHmEnfdO_XJ_u4dDBd7COQAt8Pm)K5PSF1^e?BsIsM4=yQgoQ z&QFJ?k58XBJv;T{)PGHVZR*2Xyxo*k{$+3mS ziRUK1H}UAi{S$8)Juo@}bVU$qr-dN8AO`V?@lTK6Gk(i>Wjrx%8oywC>)8K}{c`M^ zV~>ozd+f%Me;aw-h&19IAxHL)j2nJu_`c!uhW8oXVrUs&17r5-g?komS*Qe0j-Ch9 zdXqcH=6^Z5q&h>~Z_r#~8w7>>aiUfR_j?z@=HVl0a6fL~4FR0&;ku5{c5|Scjy*Au z*UKgr#brCy@>r2%v?XoPK4a@;7S9r;WY(E7B}Lsrc^>At2%9@&ab9(uL zcj)z zHfnXkiD#_7ilSbl$JAYX1USPsDS+^Jr#` z2HmKUxIcrYJk}V|%hTS!4jzC@V4K2fLNg|}n3vyb!^6UvA#nF(K+4YFwk*Liz9lXheNE_)85RVV#Ko+wp2(Y7B#Oij7t z8dTL-CTTK=8Cwy%h{>^b4Mp$P9w3^|CdShaGHa1K2@bnhd%q2$=oT?FY7TpfIO9Wd zhqPdi29X4tbI)XM#xqonv@iiJd;sKtbBFUWgm8Gp@M9R|^5Yop0DXNKC4dOIK*E!7J7h1`d{N(w-_hO8nwYx||2XRBx>ALAY=`E{aA} zm&3O?W@^(Rr%ZZGbm3KXO^y|9MuKS+dI1N=VRg#5teG7euv8jEw;i#Ex;9_eELb$F zb_0vHae&mi1;}0$Nr?GR3M3qKdcwT2;i;4Be^8oZb#bL6YtdY zqhQ8LWO>vc&SEXM%u#xEGEsqqGS#*$`&^|KeVP7xQM3nKTxnA`+au$hQ2In(Q-dU8 zWvjdCZ!Bj+c9J22MqM7x)M`dClp$kPSVS}b)YKyc0g*6;OuEx7`ttR{ky{7V>%FFE zvKf7Gj_tJk{`3~jq*3pca#740=8WZ5tZVM%PH3jndau~d5mYVdY1K-Y-AH-gt_5|} zdveZ?xoh?wZ;q9c{``6O4NUv>9?vu(8iS9zFkim7PaB(h55jD5)LbHsc*JR{u^0Sf z(8_u*>Pew_o1O2KA{_xmom%))y@x;~e4Lk!U{6QG*;jS6#&?@cF|zD*djz{Hgkktz z&EjA0)**f@6)`*5hEuem)Z(i(^T(F6CL)b)DQ#zQu*q%Pr^!3@jvbtB8IzE&IhOs9FhhgW>YY%x0`XjEERbxWLalJ% zp#FfR*d;Q>a3szm4jCx4Vw$|&CUR)pR&P7AP2d>IUA9}7H%$%{V=8d_Wzilg?Y>>> za69jbr}OPdt`lhbX=&~QP#r9T^|mL7V2QjRtL5doua(=TpEzxI$c>o`S%%IT1*(!U zKcee*l_1m+YZrQU6B%Zu1r4zPdKapNwu^ONHsbOJTkNh)TK$#~PU1C3$%iD;UXz8e z{Y95Y8qH-)uppA3>Xb1&f8JSofhTIi8;)SM7)c1;C_19y!1b0J(x!XSkjd>!g$rJC z{G?vr-hdF}M!dj+iQQ-HuyDUiW_C z@DW`OwlchFt~8^LIOek!Jo@Zuxa~A*Ty7h)O(0cE*|XcP(I0S%JqWZwX)5B!IVp9X z-rEM7$f20CXslY{6U-qm?9tnUNYR)b@{g6gAz!v|zP6**>$X-B4`h2%p0|ksA-lwC z>T8{r8PCZMhG~;N$8rVTp+#`jYt3d0<-$U}jB!ak$R7Tb{y;5;W7%R;mbwgt($VH` z=<-4cI^>f%Pb`(~3FMx;wD#2eg;cNWHM^3WWJ4JLxw@FMCEV5qQ%Jb#oSocN8faOr z*PLVlg%n@@Vk`@AJAJgO4SvloR!}F`aCC)0!@;~x|4}1m$E_WcO)?fziC%8|oqBE7 z*`{(1N6uU9lqyzz!>iUH@mbYRXB?iq2oLVi960LLa>IptY_?i{IbRaPEo|{?S|h6^ ztd3SX?wH(6%T(K_VF`7xRHsoV;%;!V#FFwgSge&7m_(u~_R8p# z297}pqN{`YeN?#8a7BwIX7}HhwQg0Sb_(7#<%kKpg=7<+BR4Bewt#=zF@1EA$Uokq}exoU9783{!%xIdizh0ICK-gdQP$8dC%sGXN z^f_DR%fSkGJ)2u4LX5Lc>XJ`r`pb!2mjK_LdMwIGb~bzN2T#ib6(Yb!<6MXYI_Avw zq%L>3vY5%w7L0s4)#a=6i&ZOxxm^|9 zl`b9KKhV>_h>I!eZ39Jaz$*rJJGe@w6Zp4BnfGw`)3i>^ER_WcmdT3!ttng260psB7s$=~h-mID= z5jl{FzwK|E`V8Pp*e<&?gr_nPyf^89h}S5i2yT z5weSVJCM`yP0*epvGVW*5KVLCuO0x-t$|Ucaw`~ga_*|lN`ylY2=5OiA^uo-@K$KZ zuvoeG&WjHBzsP;!v_0+vZ+s+JOARSCPqw?ZR^#Hu4c1fjeY z3_}NQWKXI|3^cy4q&Y=&v5b_I>eWCBSQ(Y8QqYcJF>oip?N$9Rq+mSnssQi=@ntG4 zdL}VID<7xN-q zF#(WDzN>13XuI0#<{f9OqWt{v3)chM8mo)DRZ4WodfNl&3SvWn0p1SLXg$bZdSz>M z&%u{Ri=DBia?0jCjg6@-RF1b+fxI2I^F$1Mufj$=3AF9NR6%m#1fnWk+J2@|ev zGBc$yV4){`VHf21^#aD@CDe7kO^Nqbw{AaE73G-+&w3eJH+9f+x=~yYQX=IN1oW&8 ztnxXo7lcnZE3RDh`qe$>vM&#`J7Z1dnV%HaTR2FZ`+69=WX=er?a`bMa7C3>-e&oyg%*&tOG=>!JoZtRgFf1ltT@|VK;Xh zk*XzVODTKrfQ2wDRs!h*OUgfb_wDMx<&ITgPoz)oUtf!be6v`=s=O=d%*LE`UQ)ht zC#=OGv9g%B1>&}Tb<7?P@$3FxiUFmh3gc>nA79q3SL%uy#fZ$SBU%n zkFhTgkgKZlPW7HnruE`NbURbYOf+JwO75`_XV&Ckxka9dhv+CCGG^N+*5 z32?s0Y-SZieS{m(37ulJr*S45nWXAzeXjwIkkj^3v*TcdbKH6I@u-K;RUn8}s&X1h zNY8p580i$FV>?!#+1hwLOliC`K(?f7qU{d&+0r!-f_`83+>*94U>ous1ZM!ogrRp0 z6_Ya@gc}TR5LFM(OpSJm(Vl`1TE^?>Lz9MsD_ZXygkdsinq?X5Id@aB-^uMuQob4$QYJ`c z%&yWyMibFj;qlppQZ&}Taa(KYa_0s%O--W@J@xR+nPc{1JP$m}1&fw+DGYD}hyL?n z_-%(6?b~}TYg+$2S4HHTYydO`oUeD2D{M z`Cy0@;8U5oDYc&eRL*)7R$s|1o5Fx|?9dg+fkWB~F;T8o2&y3pwcVHHN5Ns%p+ozI zs#C3RJqqo)O0{HI3$xkJ2j1z&dduD4>Jltbv9sCPtQUf1#N@2ooGM)ob2^fdnm#Y9 zLftoh9bUOZ%vJR{Bi7Tp`s?76gfHq-I?S>)Mik(BRN;<8znklR^!gKEqC*UsaCSmG z(j!;(w|0Dk-7|@1St3ksI`D=q)iN3NN#qu71rw$N=u1z+FzXbfLr2~`v-SRytoNGq zD?%l_VhVV}3@s6b8Dwn1Q#-^+*7_q%gdg`q3~7tq;NdbC@Fe)sX%D1JC`aQI>VF!3 z)*(jz5(We8rci$?_B4c?jn(qWw1QB^{AOoPmeNDA5$J@iqn%=O=;6DJEyc6&lS$Dm z%ht<_-qW}DwFbYcR-5q9a7Cl+kj?2JNAnMBp>hSi@*;67lqvnYWCK&g+T^7jBtw5S#d3JutR zHCD0NZiQTKg7?0D-m=5^>`Q|PRj9XblObTvTm;OMd+&P<$+og9d^XwlY@J7#Ye zAo7PZE7q796>tdn5*7zdc~dH(nV|`Q$s}1@XRKaai#{k{KEHurYbAUUYGtZJ3OWZ} zx3~e`<7_zxRR6^86D&OqwOMYL#Ckv#$ZX>VAaCpN4;CRl;r*L@lqnjLm=08oQk z#gXdAuq9kfi^iV6@-th)&5rrq7vscWLznb2ko1OSa;PUDr6la9&wFWR%@$I4^7d=d zqMe&-wEU&^)>Q=wHdT;!2sTByi7;zyaUWoUShIi+b1b4odnAwn=46;sai(|w%QJl| z9%WCTH}yIOf7-og>6qZr{_U)5Za=KPmRXh$mD_<~P6L@I1 zjB-DCU~2zQh=JDOU(7gwW?+_tFM-1l;rUdCP$~^7q0Anadw`_n80_H|O3@z3O@*$} z6xOv?{hZyt`Roo;kuZ6|(Os1|NKqV>UV+DUh`EsF_vz-k)*oMC1N=g>EGO*MYc1P! z3Udh3evoooSw;FSvUFO4dVU4dNT(PbTK9ml_4Zl6JQL1y{|VpV*I%F6KB~vF^*El9 zXtA<{&?nN!|2Qm=|9BlxOP^64S(%?g|J*#)-!lIiKoDbDTUwOI;)=2%VRTaY5``Z6 z4b;6uj6V3nS%5Nl)z#bT|97bS+ICedV)R;)F%J zDDXH`tV0a>79W5m7mM|w!@r$b-ul_&Gq_+4$J;)!WO!}Qi$kKmgM+&T69dy-AF|8b zKR4|4%ju?O86ip<5i7ubm{S#vEhX(bbP-BLw6h*A8CF2 z_>2d_W}_un7&FF_Vaf%$P3mx3`3IaBFM4xkc(hZ8_I&jBU9AIevZ2n7St$&+TKnmG zDj(ITee#TghO0h?LO=Nf47Y_+bV%_b92qv#Yg-r1&bWZ2CgFm>;}+A z7YuB;e0B$PZ=pTl#WA(biD%qqlPF391G5NS_}6*UTjoCS?p#6^BynDri!&v@&`C1KW`Bs>W(`&POw&s}?JPa>+{w zl>O1omyVm1)akIdgao#L5a<8G(4N1|Aau*0XNFeSfmzKFg#$bA_c%gvNH`3K`4BWz zVN;^139o?#OQUp}8Wc;QHZ@ge&Q4D5x{_W0m)2IHU1 zc-H_8H)N=bLH1`?(&vCf6u?r=Zgrd;TodS-PiBT!FJ1&4JsJ}M8^A%&so(zIH9ifP zWPo`GD8pdk1hytUuqv?&5`4F(L;9spcjSu}ZNcgU(A4(j%<_M*E1c3v`5bW7p@9vM z!v=NtVkQmHAc4WDiBo7>d+vD(tiX~?(V9UU={tx?q z-Typ~eF?V-rcdkd>wB+FF#S;99evflEBbVOSl`+{LGK@XkM%y?d#Lvdz4=~WucG&y zo{M@{_562_vu9=mf{}ZMN50u}9Rwr;9Ehdio)1X=3BZ4*XNIpEP7ON&|FgB{$>HJU zA1{An`HPVG>#pV3ERXf1mRpxgmv3Ia6!^DaA9{Z1@X(z@pBst{nTJF}8;AOry}#_W zWk;8Nb=kgUwKntzU$$;p*WlX#{dsoqzQLP&emYnj+&!osJg?`i!HK2+TspV(<)zv|4VRl#Woh~%me7|qn zlZ6D91ydxYjVKC2fG4)vSKM?`8<3uu*%a(AL znKz^gdhxQOQgw&&F*S)hF5~0@ENOy(2wk@BvPZod++pP8j1)+1v=LRYg2&vJM8cuv z<#DHv@X%UuRuaqxD>27KT>U-b5aacOgDOWW6lQ!{7vP^OlvPP>Iv;f^i%BvkCQJPL zM$=5qowHT5PH|NolWgqTXmAT@2QIZmKR@|mclq}Tq5UJxf#4Y0UINSs6 zHe@4MRvz*ADN{7(r6wD^^=U;ikaaOilPOv)V}aEhIXkXG0>?DM0%MfB>7-wJ{-1bx z9HNJ7PCp!I0rIGePH;{=+7$_8SsWqcIo`uJ{gb z#S+Vr3Jqg(Xmce^o-vN{a)YCQ7a>U9DJ|!cMbXw>yj(r)(%?)^leTB=X^G8G{GNZT zT23XUwwR7~)p8-RokMBS4wXDXk}*bGGehP(g@5QV-VUjTAViPVVlb3)8ZkMEx80bu zL#WUg>Y1839gnJ+p+9h??IpVc#~eahEizBnmC@iz2d{`&0+`NUmZvb4Coc_dILgbl znhK#8Gd8hRA=j8iXK;>m+Adav{BO31d#oWo(a zXj?Gt#$|+5sw(D5sUUSS20BIR#W=7^D`S}&K#ZfO^P@ZkcTq$zWT`n4P9IYaY58_Y7T`9btfQy|Gc8Gk zbJBH}at}`CHNcbLlnRr%2n6r>w>f!vC>h5oIuJMO$Xv)s_H%fn&TKDng5=BV@uqMow#0{D4R}O~8BfB{}2?(pg@pLY2aTn7-Z`;lHOTrMxaj($BFql-UktA3BjyErnsLf83 zHD}TW{blJ+{$ppdw&@He%ok&km>wwCBolw;$}<^%iZK=Zwrnk^)W$a2xW_UfYniaA zlQo6Ynp5P&n`_)KXUy6Vrd3F@^_Vk|y!dx~X+vI%2UNL?#i_LVu}IH<@WxejOrMjA zwKkVVI<56zc%n9hxqx{@c{R|AQz>V#n{Q0uezy~HrCnxSV-(VhyQ^iox}h%XJ;8j0dzmgG4j%|(bN&8OiF`O3Tus8Z{mx~Asj?$4W|7n zQ_-Of+Bg^$9Tyn^J%mx(ipQmtrtr0|a^+*CN`ll*DRO2v;A#}$s?}iMAzq%aWXXuiou)MInnO&=Ijj!N=ERPtm`F5g zE7h#QuJIGaA=!^clTJJ33VDep`uK@Iq)etEk%1myU{aY|8=y|-=ii_wASdwI3 z-j?WD&9y@y8CE-@MyWoTbZDaZYK|eC4v3@E_5k6xRl-zIqzRwHLG$PUp4Acttv4ao zWE>?8c~PD-<4@K5H>LF#)`4^g%b)`7sX<{VkS+2L?$@#4F6mLBKExnOH!JT zF(G0Moe;;uE^kfZ&M9%bJ8Fjk%g&`fh$hFYSOymFts^Fv zn@fy8vg7;w1B^}?VM|t>&JvBwgAtrx=DgK>7?-LEJyo|B>Pco`Ial7BFN?A1Vz@4@ ztEDPOF>&!O?ghNYoRUt4g=LMNP-=qGH+iw%B+J*GW+LeD7`(xC{A0aBLPz+t6+Dsy z0IeozadYN98IhF$h#+A5AYRlir8&$G?J;SpL?u^IdOQ}nZoOaJy@|UC@-G<{4qXQ6 zvcJ)HymzQuB4~|09@WE*f_;|d1}(MkV(Mgx2@}Q`t}Daz;dO=3w%!IfVLQa=sNlXc z_y6t7Yg>)p22cT7XVqYWyFFBkqG1uCU~+birI<;$(Xlh(P#x}WtQzT1!G+o*ThSZ- ztJk$&>}~*sF+HmSGaLb4)I`NaWU(NTyL0ubQ-h)6Py_f47mCpb``3V1;KAG0w&sQ! zaGz+IRe}lbCe$wsL}5EhOYP=(EeT0X&?^J*GM!=|z zZcfWgCc0h^pnvp14LZa~b_3ily^p;!*(&yPFCm{d;R(XnAae!C3L&F1Qg0IJhQUOK z7?Mi?wb&c`o}O$yH{93-U1FYY}P{OrXE5 zhKBAGqaz0*XQG4jooiaTi3Y^(*=AXSUXIVwVJy)~ET5GC?SHVSHL-UwtI?&WHO7V) zs?f1RX8|hdH*_z0`Oy9~t?!-&rr0K9nQ6Hu3p!GipQsnBRyQ6EQ${JecU@!K@Iom# z(0>eGtheBWSFL9Uv1Qgce+4d&DO@HX6-p)Rrc6*RLC%$pt-}kYNU;4&;Iq5$p0%wP zS2iHv%sk6d({fc1(GHu6ByB+e=a=JDI)wI)LC<%Hp+)`)4mfn@y4J^IY>QZD_4BRj zwZO5QP&$JNjPfU=3bsX7p&KR}D@Qt1=*ZafFa|$>n#@kZR{+j#9lQ!xlRBM?OPxxu z!Ko~#<1q=^J`NS>kfNi7OTgRurEjfm9T;avv3*tx72zfYA!fHgRu&ng`c2hTaR3Ee zC4lbj6r&?oeOuQ0Pyj#Y2Tyd#;4K5KzTfwbbYB4Ik;?_q7F;u0ptr2E?)mo==_NEl zLLQ!InKW6FPKv!J8%Oaijj@pq9ingQJDJ@0hg+cCq0t=hw%oLlH$YzMY%FKgJ7SnU zpF|Iy1#jCSMY3&Q+q&Q8?%Dst1FKr=&t^N1p0z`bI3sn+mUIG>QZ?l<5sFA6jDCJ5 zI}3J*(Xn;-*8PTS`dNzml`ZXd_Pevp+U7@*6)%tqOHQ0)>}KE+qR`LQG{!ed35awM zeR|KPSXc}RZdfyg4u*r1t-?0w%=Mr05<_|iYmp@CX0P25b;|UYDvwBkq#j)rxM{JL`Jra_$~q?9V&=Z zpV*G>2>W_CTHo(n1bq#p(X*fO`eIU75E5#WstTQe!*DFgS-bv1u-2hN$9HH?X660E zh1^HW^67FPZ3U)Lx}+oZkt!*bgLk7{GcnazIlNHCIXBwWyjE0N*}9v8X#^(cOXfeX zoEqXU2wFs0nWQouErvN;PwZ%{80pX$8va9Sq(-5MQa>lh1=iy z?<8QSL&pXTx4re?@{zKixoOrj-#!XjSV((lYq%DdLvnez+TRTG^Fk>aTlxgJUS8U} zy7j?kFfczU4WB#YhD^rnK4`T2f|DmDmOGbQ(qbk&FCM^Ng4kTEyko3|UGH#>A_ z^K}nz+keTo*P{20jlZK^^}DvB5p!b`Oeqnt$4x2fw7X~^Vw!|pmiAX55dzl>mz$wS z7wXU(&)m3m|INX5=s9!aADp@4md3`(y{6gld;>_`QpkR01Bxdp8Bv?LP1ZZw#;W0k z8W?KR{7`EL&6{-W_^`~fT)W&{Ks(e6FUh!?tKq7TBt#X-TM>L!)Tp z4}Wry16KS^+1NgYtLrWoL8t(oDvX-KRGh1uR@E3A?bIQ^N&=mrLV!oN2kmX5*#etPD?S{N3 zWwh%rfWaOV!+7XWq0K+|cAM9ET`M7m*5=3E73@yRIe6{B*ZN-T9q1+nSHNQUZM|S} zHUkggMxECdaMwtSu_BVh%Q&gxM_tVhPwCJhdRt|x^_;yi0e%#A$bI5yY=WgQ4L!mQ zIgQImgc+X%;tO5QR4~ZBvfc?JZlMb83Enw{9xEMOhaPb@{>hp9sjIPRy>T`L>8-gb z$s;55ks1+9X@!n-*vwhm;BKrKUZ_DwHg7m%|KC>iAQm%+u6Cao#0^jTn_vljxe6xB z`Z7bfi?mwe1P`*3|0dq^Kn)k_0H_pz9Wo$BTYwlHFWtK@fm(0m;_bOd{83jKHe-Zc+yxTL`w+_f7FT4tH~PNy{#0GO=?l}(qR6jd)j zZ0^_%(^ZEK<(%(MAwcm@q7QbTm&Mn`-HwXH&!`#DQ0!~b07@m28}WiC4-GCgUGpw}afsZpjw zj6R6<8C%|H!wD&e;KsB}lua5LCJDKOIUIdA20M=qF(mSa!@$AY_OET>aoB!L`e#}8 zmRj3QPj`4h(0&FMn}t$@QMc(@s}ckA?tumbV@<=-qw_U7duN>=XkWjyAUb znQS-&qg0vFDM+gm()~zv>3E2n&&z3O-VPPu;7)G?chGP4HU5G|3wLip$207>Fwe4V z;JG$5p={H-aH15JRWoIK%nlf`_6FiX8s@uB9op0T+BWp^-uy&szy`<9{n>{16#acw z7B&rw^>^#>YYqZwls(_r4g6Dd&Fcp4DYq@*b%c^829g3nJ{$BxzA-g%3N1SH<&SSY zmE-!#=3QuKu`vk1HhmJZ0fA#2U|()$#fzH&fUjrJ<;BL-_@dg@8$Z4huxw|R8!ILN z)J2+b75G$GkRD*->U7=Y)}hOajkSm=H*UDY@h;$h_K#(k$k)4Xs?rcTw z1PklkvsVqA%Ud85l+9Cu+dwj`pmY*+Y=2|x@&!V4{KroMIP8U+CR-W=)7E;??C0QX zkVZC6#0Z*f$}nX7hM+CAwu_V|=7j<1fiNKkiSy2y2LY_G);Y-uAaG0s1v6 zo0Dc0v8c?EXxC;OU3CC%N*1aRT}fWt`t<>J78TE43Dx27wpERy?jR(X1;VDHwQ^a) zem)b({H4aoNQVx6F!1HAt?!)IfY_;Tez|e_dZ7K`t5L0y8W#pk&nja!>JMT8u323T zm?AoKNEU~4g|K(ahSoP54K4JpXBHT`ctZ}lCeLG#btYD_FlDbIfYt_KhVBrf=iW{1 zYTXuW==crQl8cute_&{M$;E@^fpvY?cJ1$J=c?O=c3uPPRY%A2eV)4Jvwhy$_r`rs z3Xt;J2EE?;NN(WV8@ILLPYb%2>+{v<#cLa*i*!5>V0wS-t{`fBzTsQrOZnnlbP#;d zZXIPx!A#>&C)klQj;5|_jE*l_1o@x5@nT3AG-EyWT!^-;dL%or^SUiC8emEb#aOH= zprjxh8PLr^RwAD$~Yac`jf|r$l-EaR(V{Fx8 zB@n>S0SW!&W)hwI;3@m*`Ul$swK6|Y(=}HiL)zr&TFUC7)K-#REyj`gAvmfmRKdOJ zqmW@Nb{i6)?GM8^H7RXCE$NB@y(I+o* z=GwKWb@-HxGWxX!nsht@d)OO^_Sd^`WjL{D{OW6s(M1*w(NkA`9mdEv9%~r)-_ht> z;e}Oth#tIh;K9CM_I7ojC-AbXG~6TXrRP{`GVW~Sj~fg{+)YIyDW$z)aiFoc;J*6C ze}#eAp+ftJ$GEU6>kV(NZN2-ia9m&C2Zp#)uuSXII`9l|)92M5YXo4euwX;Fl7(Uj z>xC<8aJ;NZ)F02Nq zd@)BVtzw7(Yww1>cofWZsL;Odzk;Xb!k5;z{_7}vqvDwZxTDL{gL(J87G$ z=qT6zKlO(WhRA` zx#eJm8#WohbHxq1XvkYEIErvqZnyB|zXdA`Rp{8}iy??&{O-xt_kP;|KFPi2xgjva zUChDg4e9J^vMkZ&by_2D=KsA0W)`YY?#cgv6Zb@YZAgv+IdGA) zU^kO)V=%=J8|g2g)jD)=-4EZwbACw=xOUgH4*UXa!B;gnKaLe08Q;0D>I=VtQ)-6_ z9q)tdm9|Ifo!_)Cx966^i*X%EWUU&XSB`6O%1*{Iqzi&VV|sDYnhT{Y{P*$zTz|mL_W~U{ zx^Fk!K)x$p-|BmZZ9Cf>8(GWMwvq^#NWxNbSruWIoH253_p>?n0%f6!b4>n2f6dYs z_?2927qGFl+}E3vOM`K&9!mHv1~TT;C}2bpy2-U=jvGy}^WH&8!!9A2$MhmIY7ecS#Ez&-f8wQ@UN((B5$Vnmma1B{+MUroIQW;%2Tdld$J+jskT@ZL48o8DrLS>{H;7&qwi z#(bH^G!~m&uCcj-L54FHd4;{G?a(3rM&YRgN}XD7~dqKNJtR$ z>79Y1qa5cq-XvbTuJ!Uq4U=HQC3B~-6MVY?^}s?9!zcps9f@jXdo76e?S^gPogYFY zbm-7=7hoXThu@DrWKWykIf&4`zQ283^%_$`H&L;xV^JMuSLNcI9m~gHr$dL1jrlS3 z{(;Ypv>yAo0ns*+IX1SRi^Vl-O_UZ-n$qclNNv*y(b1i-&pq?6@BwwG5T^OcR132B z(t@#=KY(d5QG)U7!g!?YBiWYOI@&2_xrKMOlz)Re{}BnG)pcQ|iJ{c4XuimPsH-1smK?u7%R-QoOUb=Unj2hdk~niep0STJv>qigwYzcbrhyw^`Qrs`^1 z(Az!Dp*1GpQ3oCk;O5lTff$1Ts&=>z^d;I|KSc>C(aE9Ti+)WW{}AJ4*_<6zSZSC;aa50ZhH>d6>f?Ij_Lb``kq+v9KoJwDhRhI`9J zil8f;uK)EW01Xc{S%Q9*5KhyOD?J9JBydB@#`dr&zu_Fm67(;oW&MJ1{2e;wOOGsv zm+qMCPE3TaEr-$2p=(cs{8{Q7BTdK1@HuTS>tlVt?(K(sO31(YFTQqS?hSjbbKBtK z;1;2pKI@Z_ikeYVPzHmP7|G6q&)UDTxoV_C#fEQ#=kWQ5*SEgEve{mQwt^XM5emgz zxDX?;7$jWGgvCtz-4yIjxOq7hq?tUV zlM#o*3X#0lJ`F>9>RqShD$OR~2EH&4R2@6@5(Ht-s~JlVWluzu5g4@YCULI}c-6|@Ua zCm}C3Yhm>!3JA|mUYk0LA;D9{ZD@4;!8NVZ{{)-1>A|5jOKuhH77Q&}Hn;5Mk(c{a zea|j`XxTUWO3Mx{yJ=Z&nXm8CWr}5IFI(Ajdfz*Pe;<6S>p%Ou27fyE~|*M)bj>+0&A6}$~Z(uaGNjU4Q`rsu_hh+y}C zS@83&R|iA`rw#P=zt{iE{_pmGwfCR>`}%AB{(fCQ-oLI#+I?qltGC&EgWws#y@D@v z_jiBTE$;qx_wzlmp2vGH?%mcq((`d|rtjRoS4MU%zhmUgkw$c1HcQzu6c!`=%RuU4)DSsPIYO|Xu1pqL-L_Cu;y2A0DMP5$jqC~NzPunc1 zge#RC=ja4&HeXUq$}(wj+R4P-{4s#mQ^t7PdVZJ4ahl%Vq! zlUi>R8zsV2a_Zmt;?5!vRO!y*RyV)JA$O^~aP-B;8?x>&u~q4DVCfvyBsT$fVi$#{ZJ zMyD-?g0dJg|D02p%_S$1sYHv>irii)h7?@1gUuO|`x9vhF7P|+Ho1g4z?rw1h)i+iluA2$niW_=(Ltzp5yYK~{urlO;M zETjr2WUh$TNyy>k{GQ0`7J&2BXotmgn75PD zS@598nv*4MikvcX4i~{;vuFxdJY-2YEG{xUE%V2=zra^0Z&L}KvRtKXwP|EQ0m0dE zSi(t2mPhDfmSUmc^ONWCa=hjvvZ;JV!W1o5MZ%WmpIbHnD8%nE#xgOty2PxwhnE*@ za#9geNW4X*R~HpI9tSy4)!MWbKjbUPdb71~)Ss3n9TNTlUUwR(Zr!F-ozx36Q7aeR zVY8VOVmv8NSn>(AUd_bM=ex@$sa7ztFdVR2fzeSTI-CD?ZIC&d)TeEBW|V@HV5O=VTw|PEXRzRiXl9* zg?lYEZlVkFu-BZ)RBA3t%SGeaG!(FD(sZd7i@HjFPlEmdXCH>S2?sWN8Q~Dg>jmP1 z3;9N?+f3<9L0Zby7&1#L-{6YVg-QUIKoUoHxfDy{uE4O1SLD=HEa{Uwa4$_t1L4iL z@$z842BBA#P+rMYBN5RsKip`W4cNRZDh95GPcmHs{LODbI%eoOOc^LR7`JuxC0aClZ=cc!hvh zK)z*6TU6?#QH{uuBQ_13kV`apNDuRrOCQMVvD0?*a*0`sC4+PpHnor*n%YKla(yiV zc~Z*?iBOzNhom^6;p(HWL<{bWJ8ZAlRapWbn&v`>ZTgA^*te8fMI>ns)@pd)^L+WD z8WI$^M1Cr6GwBsupW)4iVsS!G2bh#DKmnKBxg3RUC%QOE9OKK&%|cA-ui<8^I1Tvd zZVzW(H=QQxSdOWON=85A4w)F{%Io4rFJ{-0Mw={Wu@(}8C0=fJ$B3FSkgeJvnKBdF z!LK;LSRVD+BPpw{;4&7H>Mm<2}?AwI`dQ!7@53vOxA4VjB23H;m;XGT+UtH@AAmUn3U!JMBNyqYWCaXn1( zFQri{GK5to7D-D1MJXztfLWcCMbTys;F9o2om;R<$h0S>TO=0*B0SAr(n%^^Io%Zg#QwO#RM`;BvckiU>z*y15%u8 z1Z6r$;bD0o?Q-WmDPd#_moL|*j0%<3LRb#O;8Zv!?Mm^*4W=ws6uGRruqmX%Ey>OQ zk5ed;Y7n}^g?ajat1V@bxCa`>@roFR7spc9#D zl+l+(E=VbDUdGG4TAIjYHCe4(BGp;LG#3zPa~myg%&YPQqcVujo%U0^_}S8}h0GWk zmCl?bL)xG{r27eH$mKLZPGBaS&J}A_r#fun-`Hg@Q-nrG)NE8d7n4$3ujk9#Tw4_K;vHCpTD9X)LI&nyW!~IG7_Z zN zgu&%0F|#+{=g(g{I4KfR9(e79Ra>cRRRo6CZiDlBhZx8lwH%bQb=x*Ls>3btIrGQs zB&~Oea6`l=3mMCHp6j46a^2Z)l;EDoEgs) z+*@?$(B}KE1LqEVYasm5njQqe@)fP8r#Oo&DIaIiZVFkChoIHRG4wI6TT>%kLUzuXiq)J8S+jx@4<)6{L++#?uzHGy;&N|2z|#sYBdGE3wei z^{w#sCfq}d=2#*|4uoav+-|ciJ&qdZz+F~{4!l>upvhv?TYypDBtQe_H8)JU=FXj` zeu6|QkhxokStB`d$Qx=`XB@fD16v&`M8A;T*?RK4CM`gH*W7l|K7A=B4=!4kQ|A};p1$`{PusO6^=_G(@ngARa4E<}r3Vu50QXhjI!Ub}swCr{5NGOP zy18PcLx=n?{A#KNtbv!Y^DhY|xJzHR-Ds*qj$0ch*F}gj-S#i6M1S+Z4AY@QN2j)f z3%GP}ZOi9{ssJQ{fcsMJois)%ky9&dE(hd~6g%3Uu9fI#zUGSIg{n4i<)lP|=U>9U zm3r0a|NZM)Z`ipt=c4&F2QtLy^+a4o zXwBt>B_o2k)GEvcZ-k&LJ9Ow6-3zHnRTJx4yTVPN7<8xtDiI;C#PdqK(i$P6+;6`d zf!}uMkiYf0ZRp^41Z!HSMVoHHm^_`KJQx|R`r}qlKtj&&PBA)q=ATWirSYZ~ zLM-MkgjeTcB;t@3&5Kc0nOczwVqzd1PBHNFPBA*P!)$E5$8bMqISIL+(>aWQJO%+_ zs4htsEEx*flJN6RF&n&~ZyifEfs0Y4^(zQcBNta(!K7N26d_5vIW^iT=4cF`NjGh9 zg)ax{!7Y6^cYUR&O-Okb03#1WP6Zwq+0ncwn*OKxQ#3svesEv0X=S~cfC4zN!kU4W zn;;xIWlHCh+JKfFI{}SXuOmOcS6!{rx4;2AgsX) z$YE8T8#v!DH^){jRstRWWYUPJ$|+ZdTPv_KbPPFeI0D3a;V5m7#MT}9FW)IZcpVl+ zKq*!rdqWk{K|mM+Ei}Quy^u(TtJ62@uqZBG1nsfH4)Kb$-;1AOz1nkS^S+5X&Y z8Iw{ShiHb1mx)qd2AGA<`&@JFX6Z>xgy75lY)SNf`SKG{6n&p-0(~;I2tv%phTc|?E_CZV{04&zF#;ue*AB#YOO>^4|Fzql6`tPT~*JpoA);HML<_xFNx5Vpg+=BK8Pq00~JO(G$H z@1!U196vk6ceVV%CO|#Jb1drzw^9K1J^+XLnAK&>)I$zqi0k09Z-B3)LkHj_NRfMo zYGp4AbO09Y{WmtZk9mD^szwM?F>xW0G^&6j7Fq-t$~(m9=-}sewiGw9GbB!0Tuuzn z6l5N0Ss#rC*lt?0fs{y2s((izv~T52C&MGoxdomb45>*aMoN_WoHkIZih}5|FG6oz zc?&owJ9TK^q-kgCSGR!27ru$OQjZ5hNlilIQq(JOZephf_igPddVvmranH5m7uL60 zw>2#S9+J_uZ;*v#>{+s-=Z~!8?eqs(=6-rYp(|nLyaCnK(lvB2W6j z7B7pALuS4IZEL$_)!{WKW=WX02#YetCK(YzDw!Dk9~iGq7an|Mk`_w&r000;!KyZ5<| z`p&))^vwfJ`6=efk(u`Fy!T>Vmb*&GMz&x_v zGiQN$WV*d`3&gZ;CsvTVjUHh>4-m(72gi}&NwCtXfeb9|{nDD&!%xEGwhrh@_^OnA za(g)H5EsB5%J{Pcy5tG=pubRxuqQWN(E8UWnpVgIFvpU}aJ$rEES)Hl3ZF@z4W)xQ zp&tnkHz!cv)6J35P95^!xqDm7_%sW=@aj|c3>MVH{RX>TL^-ACk!Rqk9b(|>o%r-x z0FtK{od%*#rt)dLCo@UBT9v<~3j2}#J5YlTDLS;f=c3kA-(k1Adqs0vIKgl;crcW}MHQC;3n_&L zOESuiyon8Bq3C3U#lk{p?DqrPSe}N}=<>ujcOcUr4ovQU`#=l5etnaV31*{M?jIWJ z`qE&L4Y7iGt{q|p^PKZAAVm1hTE__C2T$Z6OjI4J_Tb?ssyFr>45D54Hm#HP!yD%3 z%#MC0(AVz$Z11-Y?Ro)1VeYyg?mi%P1#pT%3SuRb-ntGlC_%6(kgy@_Uz_7wg`^Za z834I>X>{cKqyM+y4VdgUotW&*5C{UntiVlesz7ih%rT)jFmYAT{r}ROTD6!K-SN$; z5p93)l=IxR54Nu{HqKvTbaX#tYkBCigQDd>d^dZI@i05tLC!6>Q-Elj1ZHB?K`|xdu7+(y58*iN!JryU+KE8E7j%dx~OYw*RbHv zg5L^W5IiQh3!3nx|JwKGjKm%bV}_!W2}rZnxFbY+IJq`mu@YX|m(5CqWp}ENvc9rp zNmmPdPw_LsgTjN|e8PA}8kR^ft*=BmDSz3az&wZAzmL}(<`Mz0)1{#66RsX=1Ea-?1rKcw%YmOD>f%yM zGg^1dr68ttv|MCKVX~N$!vir&QYps*A(1gqGC1VvsJ+VBQL0=4ENC_5=yXsT_l4}7 z$Al5ZWMwj9g+p;%u88{Lwis6)PpC3@BII<7%I-j!5o5d^$l{PDba+Ln^T@N(X(HOs zx$zmSN|s59kJP~RNv(<}tpCj!!V-`)+ZDmPlnH||{uCY|+@VrNnGQ?C z=dWAUeRh|E!NTTRt$>S^ikdDqc>!-k;fK8BHBC`$6eg`y@+=PW!c1ebs0s5*Ay0QT z9f&I^#TfSkVYMD3Y(cvVa=x;uNzc}`eT0m#Trhj2gd-m_rtp%#hkq+!F;&8-0;EO* z&$A*-u6va)4ix=B&KOBb3_^`7rsJ~5GQxOGm&L4E|FkZvciRJNujHTVbl{{g?SpfZ z(`r{lS8?8DNPDZm2!n-4Iw0JxrWWftr+K^{kkh!(QX!~R3RAd4I0t0_Ha|;@P=uAz zI>1I{PKp+_s}rw9g#j{a_s3m1eci3!{u;->8?Sj&GArrK70k2;(=rkc`~+g9B45Vq z(TFzW)`mBn$6IkTiGaQ?j%ei?NMd>+=XsCUZ21)F)0;ApM4qZDsimA#I9}7+bWv}; z1gnk&!-#S7jgK5cs1%OLwX>Cs}j(WIy}~UbGvQgRY^ET zTE&J^O5u(%X_0=8lUE9918$ZmLIC88RHL!8Ifs9|l5yb?i`?wMHF6CR+`xg5I<9%9 z>wfY=-i}S=1=3l&Od60#B^rXdf~#l6EOc4q#Y#$Ptax()?W25gquzosmb9i^DjC$0 z#72&1GhWf8g`^@vWn7hbOl$~k{0m*#+>PS+2ZR?Gyt5L`A#Y z!LXAKZs&j-jFtjSOAScky|D~FZM2JbI=CNbl6eJD@tLZ|fF^0PM5osB@^A=XV|i2B zT(%@j2};^(zW}3A!g1E*k?E?XQneOR?c|E9%L*@6kdo1yuvm*of?K%>l2Q8=Mck0V zJ#gI62Rxz;4?%fw)iRKO*^j&Rk{m;mlu(MF$9-IkDx07PYtk*&XtRo%K6<*Idw{Z7 z0;>Efq;I!`v1$_A{t_?G$i%oz63M81Id`}k7~wd3871wLI8_O;IwLIEWXy^?x#}xT z`Fe8N%czAx+@ZC_R&$qr{q$kdYkY>Z!10g6V=aA(6_RMT$6UnlDZ}b7WPVB6VIz(kqOeImpT7 zrM#6W!TcQqj8LwIt>--Gj66-Jh+5KF^M;BJg@-t;4bqraF!G=i!-~R?HKr|?gDJ_- zx!iLhM|8Cu%VtSMMXFOrbsU0)k^A%nj_1Nfq0Z%E6v^h z;+qGSH$vlAh#{4NODBq4ROgFBqhOi(bV?RxvL3aN-1ZGlAuEe*n9-$=NNYJP;Sr6! z$;-2m2pJ}WMA%B@l%~i!05$~m+LBU5J!xI_V%RIxo;bNe;daOI^TFQH1foF>TB9W91dL-KcE`DLV}(BdF$ zR=cTM3hIef{5mIzRW%qEl;$L~A)Qu7bT4zYkyvYTGLph6X+Gop|BQVJcwAN4f2UcR zrs*VUnl??+(v~(Yo6g+XSqhWPl4bVHk{J-2%uHs_Hc4g?38f&26{vpn0HU3liYOMO zvRp(|sN%Z4+`q19@-ZN);&wJkUF27f=QmF3X zpU-F=!JK?Zr}moDmY%p;bJj_opqc0nF+Q(sNZo684o_(9bD^^|`dMwrBVOt0%`yiq42T7@D?B8oR5P39tLzSq0$MmCkzs0U|Mt1cG^!Ld#z z3N-H#M>v%4R`$Nn|E_8vB6noM%9!7wo*q)_gk@JboOyX5s?i(OLw(6~@U$C+*KIDK zicBLwr)N~|Q?BB{l;bLy#iQu=_+p7nSKm~Z?yP_DzdEB#+54I3U^nUx7|i2LRCjE8of=c5x(f>KKjPful=jnpSC7 zUBEZ57|iM9@wCdT_VmfKSw;QK5Z{i%n;Q4)n5;773q+j>{da};T{>(Q{h%cnQ313p zA#(}O?YfZM*kjkL)#Lhpv#N&Id*X^dU4n5(P(ZKK*JtcjSMVWIafLiP%s7?fV;cVm zY1GC)HzCT(FLRzq7k5#Pkn_ z{oRbxJe-I*kMV9hEti7E**mEnK+D?!Hd8wQB1i-~fY~>lo@Sy7v$nsxYc!W4N6#s& zBO{N%N+lw3iN>cIEW3Vu(AnlWjLND)TVi_=EJ^Fhqd!JdVhXh+3GSa;e+q*DuBUnU zDYAAmO*`{L(*jOY9uP{!7hv{;vU^Gr-{S953?(E8-G4Z`gi#L83t+Gu-Z^IpKpH<9kxu%(rp{rHj&oU0zk)mY!3 zL51^le<-9o4!% zP9;zO{4oV@`hDQZB@F}hzdU$o2|L?wehI_kVkS1h{(0}O4)(9HQ0R(S?UfP>z$>1q zT2^rub?7KzKD+n?0DpyCR}p^-tb5(lORz3)|2*+DOo#2x6F!(9`CO@9XHQhd1OfwL z|ClZ3b`sf>2iK9+&!ZU;i9G!@&;qZx=}Q~g(dQ2W_}O-X!t3(+@twh5Bp!IRy%VbF z@N_>i_V>U^6#DhSwGAI5Ny=mw`{=J>iEWI^2fN1=Be`UJJdEQJ#!t-sdUEb>VEh!* zPJwo~`8PCh%Xh+!*{I+$cKf?M896h+#6~oZp`M;8p=S78n8NRAn8Lsb2VF?6>*Bp2?2`_5v3=6`t?Y&Dwd}z;L@CKAg`v0@ z5cv;PpQviCxJWX}Zu#qJ1Av}A@oB6MkM1y(HI12=cy>aOQ=!C_g+>#9^b$k%9v#E%BAzXGVFE8CzV>YaoVTt_t-sT_ol*H^0nibED?!}KU#qhDC2$Y z?D9WQUa_C})O_fQQZ}wsGR)X;KHBRy0|a4k6J*XMZ=x9yiAYYr9G3ehZ)szH^d_32 zU=tK@m`@oTOLdNPnLUoYp(_&CjVAeaKK};ddKQupIrKwtuIdp~@O%SKkT(=w`OiD(@ zMEq0zqqz`2_sPHGcSJPOSpM)M{Dk%Ful|lsLv{?$uVV&Ur6%Z2_CF>@d^*{6^4jjVqg9TL$}jfF<(LK4xJBH&>fJo~T40)l6qCq^-3{$!IUg7K7M zI?>lTnO5tw9){`;&1CcXLSwy%M#a^s;O3XFFPJ24BWQ{b%}P7u&JlTLx_{V)jI1f2 zoNvn7jHX012v8(QbKvIpY@S@h9&Rpx-K{55m_(ktCi;T9e!nl$n~lcJ16d`n(md8$ z03^^t64`TU)i#Q4zJcv%qs`b(P*`4mMa{9SQjgg25ubZJ45$X1*4=jigx(1^=9;D@2DX%sqju`qF!`|wqtmUDgX;f@Fo8BLiX!# zQK92M0Ze28EkkFHMthlQr@1fF6?8MI5WilxwqtfgG(HTQb0@yrUVuAMb0UtO@Sf1Y zeD?&Sb?0S4btGW3b6dDWy6`C(4}X0-p+GaVfI$QK_x3Z+Wu>Q4+kN8|FMZ;)Wy=uH zfS6|?o?#)o@SN1K7!wKVc<pAg&;?^6*iFPw-#16 zFZu>sysGbd3AtulVGRNqtO|b$>UEwLY4vAl%n%&-GTH`>>sgFSPX6s3R3PW-qMwG~ z9;oZGIdwfi@fh=-Yykc-xD0cM>rw{X0D0qf#={+jhINa-!h^hVp}6PlC@d9;eUlhyd;m(QSF4(fPbdgp8!P8m`d$n#dK3LM1VuU68I{ z;yu8>T;D_PKfACLfQIy(!l6cy`p9dQ@a~<1X%Nvk)pAaY|74+m&1K8#(o$n>spePJ z?^ShFI3<@+Q5WK%3NrITN|7@ta9)W(D{X?1~H8|N!tz}ibq>W zIkh?PE>i)%W_g=Hytk8*6CUizfCu4dfjJ@Wi|TR^_K{T~WKSKisbya_2RCQ(&1U z=|U1YdUyqrPY!=$1AAOiKzfJm#2CiKi}BIqxNBIh&}sESLwYRk;p8}CxS9$L(uFi4 zsrdE|_K~K-#Z=yn&&#_`Q*y}c?=mpM4n?Rd!JSVi*t6g%k-z=&b{5DV+XQr-3kzEt zFJD&uLDlvOm((D+ye?f^s9_s7w@1KPjuV&7ub<3r%UGB$WjNWXak;Wy6}JHo^b{KE zMI<86Y{spq|7-1JcTeF1p0BR#Eo_9=o}WJ_x_q)Rl~?6**upk*PzLB+x{P12U>QXu z;*4y9jLw(V-!W?`Nci>|Y~a)W6954fqRz9CggmS08_?xYMaiGY$oU38WdrAnX*Z3x z0b=;mt>j0x!oT_U{$ww-(*XmMS72Db-Wba=nt?uB+8a*Gdvtt*zdjf1x{yZp{5srm z;5`2ZqByVcA>W?w{K9FiGjz1vrOa!L3~Q}fv#)<7EuXNf$W&LMqh9nB=76K%j}IPb zVar_wTxa{uiD8R8me!|ymT8xwPr(blON>-rETrKueMyL<|A7&zOJh%p0pgNFJ|@f9 zjj-ebAe?GFpEToJ5sf^3LcpS=}?It07-cnV%gL)1LlA6Dd?F4bhGFN}M~cf9yY^b`;@xAn50 z@D)(0Vt2U`(~{vp@naU5Czkhn)Xq?EvQHByHx1xp(Np5QNorx&`wRV&M(v==VpPUZ z%h)sF@=f)H$!7wEjt22#Qhew<3;QqN|0A)YOyMs-!!1KTW6pIe@}16}p@>JB@h8aO zC57z`;>Tpq3fu~h?L$?sXD%tYC5_$LF?E`;^}ws&JKg0)a);(p{H*vfDIR~@%06@{ zbk$9JEoIr6S zS{UQ_WWpuu>#+?-iEJNO{Ik0Y4Gm%%yT9QE1WY-H3J&s4s89!sV1z+f5CXe<5g%&J z*vx*QM|UQ;HaZjvwOn&b(%9l}6L~8CpHYAl1!^YM&gor#pC2h-$pm7u8K5)+vdWXA zh*;#l;R3+>7o(C_?i}eOy2z56#g`(SvW27@VJhp-%y3|&<@r{m70kl~WhqA?` zUm2la1~UkjRr>Q06dCX)$f0|J`%>dDSC@h87#+l>6g7S*sawZ$4Ock(?JudE~Uk?SMI3 zj7pB1?wV7H-ybckTH{+*wHC4NsycJ+K8dg9p6b6-rRqZPf1r$13_&uD`h1xbz(1Ij zS~+f*qBp;%aDP8MURYBvqM?rAuo~6u*446g69vS0_rhVUQMwEOhctC&Jcw`1#PFN69ZrcnHTQuwfX1N*zn zXjjZ*_Ou(0Hw7&IcE@Cv=r1qq`1sSKZzPbkdO2>DGqsiRWf{rVWtEn?iz+{{im7a< z_}l6~RXkhqfb`~yn^#{~k(XW~xpeh6D=w+Mykgg?J1aKVRaPutd3gDsmOr*~o#Y~* zW?i>Dx!kr~R(sp>HIjd-wJVkN@w&^T&q^Ptd7<7? z^Ki}A>iE!`f4j0k}uq8<1pxJ6zb3QGpcFgx!q{S~oIkk@H#q82@cFiYFJX2V%#KdAlLVtbS#Vid$G>#+vU%4k|#x9qE(uhnEpL?B z3|6#inu*!r$bm4CNrnY7vVin5YuuQ#<%2YcUWUU%QT2{M#gSr*T9JtC$9)osv`C_L z$|}#Cqar1lL5`0ykU}{xH)a5_s?`&7RBPT!ksEW!uF4~dH5YKtxMFof0$C1_^o)%` zcsu$BlCZMN{tW6237 z!_$qRSVIKUrkP&2^ zPzBtWhkR!Oi$YKEXr*nA3ZB53X+%&k*w)<}1rDd8cKvGEviAM@7JgSDG2QA0GG{)D z*g+hOj5md!%T+U68@^ur3rQ<+>?lMp+c2+ILl4t*fj~v8E^4(wu>#b2@ZlY^ExK~w z9MuXJEZBsx!k>wup$bHAVh!6~ae>6|qxmSw*o@5`MVz)bZb!_vAB(!1|F$QORYt0a z4cRL}Ou8v$_4$>}g?VZ`iKKOC1vJpyM-%R?%C)ZxRM?V|6zo)HN7xJW2kL!RHDv^< z5)i21>t2++uq9`#IH|FEiJH3v@?sIyxpnRHRG&ABG68vPEG0Gw%7}yzRXk5MfZMS* z{BHc8@hHJm`9^+Uz)pm{kbr=J=3#=cfxK`BW|D0ug^%R{qy=%zzs3-N?aDd1Dw8#uklB z1kOVh2JArUw6?|dDsVn+I^U${n>He|2ewQfvNLJ^XCC>AkXBVc6{tCERd7%zgbe19 zL27_OpR0Lapk@(6Mo|=C#GC1)0r?Pdy@{GufedDfWUy9AFf=}NqFX)kc44XkrGqdA z=#E%lD>c)B6QYT>N#WZ}fCfBZK7sg(F{4}gP^$UbIjTSJ$9A(qj0FIiVv5;jFhP|M z&yi_y3-BwNryoMv8zT7)_s>!3_-(M*+TupkxQZav!JAsWhNnV67(x&%kN{@P3vyv` z8p@>GxxMC2rf47l)ufSjg*l~C(wM2nr&Ow<##YLeM5b7bb{PzcY7u&sWRz>!olszA zfs%l!$m^Ma4+=Bm%r>7hM@2m`dHh%n!8PmcQ~;fcqMPIGv1HKTa7wC&U}8zDW2M$5{_VOK-wIf z8q<@lSuIfUtsi_$2W*QY7A7@=)R4>u_Z%6EhCR{)^@AS2CX70oSRowB5TR}eX|ol} zgQcR!o6j3-_(1p;jN`-}#V({`#NY+ca&M~c#79&t5#$d#i}RSCGWtxDb>j@LXJs); zdb-ekmc<_mV3OUij{g{(21sO^yE6$L0S6y!^r=9!xk+dm%jBhJ4{Dl$p`rQ!NQ9|5 zi=%Qa!QYVgXRyU$0G-Agp~Qw8gl{o^2yawO%0uwcy@R!i$X6VmZyL-D!G(hdD+>7& zFgWv72A+!JDBp?nZ=@{a3X8SIaqrAGe3PeAfdE#;bO#WAgr!n~lcMcMII7QzqaM%lGobQe3ZWHPRd!U-L8oO6 zJaci?rTlWxkU{N%s~~`r&z5L^h;JF-&u9tz8w=ov?lps6$2+67yl6ts63&(^H&vL6 z01DIMpp0)6nl?gC1)vpKapVUfVf4s!aw;~~^4$vHAjG|s6P7f$5=R8C^X)&L`(bQ7 zP=D}0UYt)*p$uNM70hoGy&_%uO*2G3zzuh}fjsR|XeaGGOtFmQqaqXzn4qJHkAP(dw61XcoSh!^@FOf5ct zwq}%U{+eZLJCs>$80g42cLPwd0uY^0TcWMIq<`aneE@IJvEUelYKNT*lL3T)0Vnz(b>e!;IO z!AT%7*zy!!9hU^0EUho`Mm`OnAbBGaBxxeJhED`PjiOoT=goa0Gs&C@C3Xew>mnLw zLSY}dqVUpU)|0!hT*P|9o?KpnaqpI^;B7_lA=Rf5*O2=HjO!zfDy2DqqUTE2$&7*5Eua$Mbko+vjnW}7og zn`kC4eiI%Q5si;+ZBT3>A1W{=$1ick1*BmYyl1hp}75yRa9DkpSzh-x!c zj-pBWc{AB|Q=wt)Vy^&7r|F{qwo~D6=$?~QGzuIc$v6~o0j9<-)Z2q$NJV6i;&&cC zP-tvk^bNpXpftwWWXTPCH7QWEIrDs)wrI`lM0fMzE6HUnBP{!@TMGm0Vab5b519h1 z5+pS&DYOiu2@Xlv*YCQu(6nyxH^~0OZ>#@fnL#SD8g7Hgf+9o#g=pLe3{VLrqQG&H zfXjum;hSzNtZ82K72fai;B8AzLE~3Bzf0G=-$iWx7VP8Ce-$2RF^!yju06u;{#xN1 zk~In7Y$CD)60G`9kY5)`64VLN570Sh8F}!+epkrt8JpcaKI9z;=%*Q?uPQc?O>AMU zbRmUEZc*@s1+TdMyBpZOEW}TnwY&)p@w-0m?vG|24z%RNZ&_W71 z68|3Dh_^l5#@>BD-S_q~twhAjFsnLjno@eyJ;7n6&k-07^3(bFL-eFtNF(F7vs@jt z7IyphX;g@_+&(W;)7`NNuOc=uG&P#)$_$Sn5{|l7GWVh#5sk<-NBDsi9-V4oU$~cx zpeWO7QvASN$q6RS$a7)3xij98aO%Y{<&R3wsC^^ja>fx$^+nQwKsue| zB*SK(KDLk($bkD49+E@acGV+?}|dqU$#M^pMP8PD#I|Gcoa;bWwuC)xAa z9lxMK3y$&@@Hu~6YaDteq{zv7lgYHp;z3C9Q;>Q8cmne%B9Wt#LpxFLZv*T783xmC zE7Qs?JX879VPri`#D~PZM#(PJWcN}?wBd{|w}zWZdsCuxZ2O%W&K843H``gk@b<9B=dslwWN5s7!V zZGKH&h2mQ{Bx}!Gw)z{WEqz|?G-)_Sc5VhN!d0%rR!ICaIPd$y&SOY-KU3&fY)C?u z(_i&J4w74+E!gPIz&U?2@L2SIw_H9j$n@IuKBhlHJjXCF(PJX{R_FFp)1@wY29Ep_ z&%%)p3mNsNz+}-GqYi!Cg;hXkQB}l6Wp2I=4_#340*H`tDGoD}a6uI(w#08305sRz-?c$3Y#hGysr{~TW zsIwj>BiPh%OHbNT6dsOR?U1c>^9$5jzZj7sF8w!WJyiV{>A8t3o}WVe!QO=np$rD$ zEK~;tk-dmeg+-}E@{>OZ#ftBLamf)&U*c4UzIoMQp+KCImCwJlxUA&s^4|MqlOt-QyU&ny@@p3VBesBu zM8=;v9VZ@*kN(9UX~Z@~nC2TvB?jb!D9bE9g8vLgC10#7BA`R`m<$>pK$QIbUvFV0tBVwD zx2#4R{0W)q45{?Yls}Acx*iAWqd^B-OLnX%qMqtP64|}wfnDr1D~dERr%aK9`P-kz z6CdeRW(ERkbH9Gv(WN6dONx-13m;?sk$p8^=Zyxiu4U_&7ja-a$`nJGXYP1kpT#9l zyJP*6(Tq(WjF8uAFeLF~RA#K~Aiw%Gilkk<5*=!@mnrBkKO|LFrW;_G2+sTdfX6_N z(Uo*p71!2_DaQk=vB|C;Ze{PUDjFoMavYL;KhmS!YIQ8r=wgbFJ(jE6@|1*fO-j_au~YF#R4yKpP$JM}3bd-^wk=!PX)YMe03=6vCG` zvhN(H8i=Y)0g-vE^t{Sq8|X^wVD*n!++GCOwda!h`r_LS z`DJwzQWN57e_8!57|PBzh8QkjyL=($jo*bXtwtG=I|Hh)V+ax|6eVXhV=qq=6Rz(kt+SGu7LvQ>ey_Bay&RUn&zL-lpRAdeLJd`TI-<`<UBB z!TjP!4ddY;6YX+DRGz7nEetqvtlVoY;6)LM$nTINk;j~FXL~o$^{0Tl{L1AVo~dpH zKrklzhAa~yr|Q6Z3_|pj9IusjkWt@3=r`->s@cou&9D8a&Ti5V_Zby~=DtwcHH-$D z$<2*e`h^s7GVm;>+p0Z_vzJ7*0RExog9+NGv-3vCRg#~mPW^_;Vlt|t@L&hFE z_La{`h;M5#032HcjhNxFq$YJ3so|)C+oLy0uGbdVk>77E)&s|Ou~*3P>pu72REAr~ zMcaxiX`N4KVeq8FTaL^U_@ojtn5uCP-d03(<6=~D{O9#^2)1W;6dPJ#Y=;I1PY>r{ zfDs+OAPS35+h`%lj^gU(MPDJ3AFkcOXSiSdYcu zAjKEIEK~zv&n_;NZqjg0k!&0|jP&knb%^0@?h+q=G4hjhAmhc4*+I)=0MfhnlSS8> zW&cwG&|%qlje{PG8zEJpqVU%xOox z=rIoh{K^*R26n%^h&(M{8KxuQZsZ;@Wvt$)LSr$b1j$sC9C2aq|34-6{z4MKBLmoT z`vJUZQ57wcc7K@y67xxZq7BeV-es297JQlO5k=81X*12M4X9e@cF3oOJuchyL{2%S zqC2CbUi6qeExD_M&;W7>vK!jS4XXOn*^6|=4U&ew&@`%>PaC^z+03wOaDv3n#RPxs z>B)gwEBnT|MZ|W8$}k>X{aG%SJg=T&7)3_Wo#`30nfee9?KmHwiys5n;6p3>%=!4d zeX!h#Im~gNYo{k=VIU*eG>OjeNN_>{)6ceD5J!UAmC8!7`!S@?19Xc7g! z!a8GUDB{p7QNH}LcKo>bF&_v2L3^=RBISKQFriX#%>6`qtaLUx-%+e<93Jf(NGP<( zKr zeHO?&O?eyRZKc*W~*?4LRoG@Gm5;+Ar1|tB_T{RaMV!xnk#e5;8Ej zG{0UqxCFn#{GM!OX9tVG&kkx-BMD~EEjJ^_COl#cll~xjC3=kFNB8hzi(K+8b33t@ zwM}F!S7>5ahKhBP_Mx&J``GzNy#%FHBL5y3|M*wd$b^H%l?k)oMO zQro=MQ8zuM8t}z6gI?#@I}|H&Vd54D0X|H8+&MI=Ql=a} zzopx#HS`C`FXH%Z@nf_Fg@=-Gg6c` zh-qa1ALGb>8!6H{%>(6bdJE<9R76{1ZoB+Uy~K9mafo+nigV}}%V6_@JcG?^vZlTI zs^wpz5@`jcqv(TQSXgP6u1dF3?fagrPjlCMk_KeY~lwp<_!;@W8VD8h&kS)}A!IDM+P zX6<4xkdya4`kygA4ZryKE9A)2 z`{ktJ`2s+FGR38mgs;jJNxS=S1QK7tsVE{o<+!(*ShK~3kFl^s+BJuKyED%TJA_Lh z+6B?Z2uecWhY#UP2>7F2T~EG~FG?Zo7JG#pf5`LSh284QiYQJ&f!zIw0zw!B!fFvc z7e{~+Lu8i~JDL_DlD`}nx{z#cJ6%d1xNON;kbbs!Xz`tcyx`A*vliPqb9uot#eQ0) zjg=yOr7ltZXH;rCcfLxSv+Tp(=5LvS&grOK5z3BQRlSPg&bXYsaxHGN3m=n{wfPS6 z`~BZ*V?Cdz_cK?S0`l+%2cso6V3*4WBQD*DlaY@Sc^LkuzN>M;7mj5&3K9q8W;i^1Hq04LsL?=Mk*( zW^L9q&M34)-DAD-PR%$#&M(74KY3kob%U5jj^mwgt6;sewG=9)KviMOn7NOq}>)x(6nMO0`}evt_g)e=f{#=-c+uzAU8il`%NngAevW9fRet*wy&yycv_OKPvJxxe}k zRdp4*Iq;T^d;7|t#_#b^Gh?1amm*+NDq<*YZa2lzIk3iwZx+``7m~>F+5YY1qB{<3 zV9nnGXS7i$Al_(WVTR=>xif|Wq5VA;CZ^yUX}$wy2oVj47+1gy(F_ou%pFDeC0*rD zp&g!0vz7^Mm)xoHd63kKKP9T5#06WINp{!%;pev$Hpy?n`hf9wO=-XPN# z(3p@J5VqMud^?@Dqa6{ANPhRY;NL9XUNlKsFUHL9W|85PdcYV~Cjui=IeoyW<{NqN zP8cK>lE~9X{{j0>-OFuk>$i)r94EpNYf>SPjE8ywjGER9pYA)1-xtvU3-v6FVcKJ@ z?3;(_w^2XiNGqcK_PpFPC5y>o{Lk*b8{dj(uz;N=_(6YkH|7!`FJ+4U!!HWcH6f47 zl|$Wn)aV>CTa;94G?UY>p$xf@MvD6?XwLUrZS0lT;9wR^s;Olh?$5f4PDu)uup8>) z)I#sU?>Ng8ABUGt@`N(#VH8=1N*4~K;@#Y2H^a$>-x1M>bHB3Vz~>LNvw`o?wRe<* zXojC{`&7V6E76Al^5~ebI+JwV9S!2gu-sgKA^YmRbjfYyA$-nz`n>YNzDY$+5px6$ z-L_7-l78My{P&|5A{sgJFtBk7U*6x!viH+&*vb?dhi_*ni1avSz?|;R8N!)>QDB`8 z7Sk`Hk;b3h4AvRAsRe#|7>V0<&(Db>t#bm_YJ9jiq#l-AtSWvHQ-{!sh(=C+!wKf0 zs8+`gVN`9t@^H;LLM@5ukqLWFXYw0+fWkQ)B9fnBOm`fCELcdP35XZ6E56GMB_J~i zI+Zoii>z$7ymw;AFYoG>DQF8V8-c8JO5&dAC9Gtn9&zah&_*wRq$q7#lUYylk2)JAe-O6N=n!#msHT|e+dOmbo|a8 z&A>di}E*jkdBv&n_)#CnLluBI(=s@laN^)v0<5W z7!?y=#CHGuufhKdNeJMm+fIIU_#3V4Yrm#Snzj59qLh1hAYtt4?CN&;;>IC^j_M)n zH!5`MQ?j(X7QO`E(7U+fQm@Yb=cx>`mw~?}2<8!GWXx;|b|pH!VSAs69DM=$LEtyV zwbF$Ya^(3-0E*XCXk~x!8>;d-%JF&WK4jJF0&% zgWP!2eJyP0cT_Ul%eZq1=b6nK?g=RRHM*(nWGvhR<2QGcdGKj4v4}>k-WU&c1+RUE z&X21cMLWEb;g7|-dK8I)@##?79O&_p{YNmMCmw`JIw6LJpa8OCV0nw3M7hIEFXoT-=5mWV`-oV(#8B(MfDvZfs&Kfk~B7){r% zB7gdQaqF6W%YX>94~Tn{wYS$izoM#2#U3rxPvX3Fm&fs&86FSK(`_;_hOTaVKBI6C zxs^PdT>2(7wuK}(5OK6n@EaDs!!-zDq-=NmFU8X~?zNW3u)_SA=kL!?52vkzDgDUM zWP)M%2A_YS*tmKDi9E7@1CFZ8O6^4Zzs2|X<~%PJH*d6*GjyFeMOdR4H7n)nTy9jQ z9_$Hw87d@zqWQ;SQ-hd>u+Fhv>|g%~n`Wa==FP|y=}f;e7iD5vi-r@1n{|vzr98#N z4|tgc?@^3Obc#CH9{DrQzsB_7U@WNA+oPfWuKvE1CdRe1Nuyv+ZAJ7JIdTuckKmYU zWp8{9y{UItH9Dm452dF~6V^Thzp(#00j^(2fv31ZC}4U?nQk3*IgN?siyHM9v{O@^ zj!|#YY{*7?cuxD}EE-uzA$#`zyn`KGU)m-i=e|)qyD_TIPK+s?136iC)ZHTooDe4p z_Pqg#C8CincU-ic!q>2~Z(z#^*d70-z>TKbk(z5sgX7_o?d8koFFV0WiU1&sO{u+O zjK?kukz*|-gsq-L+aek{8eAnH>Rok`n(PP40L7W})a&F9Q+%S6vB+FDBvW$DAofhl zXiu&EoLKl8Io?vYi@oTrBG45^-KK7>Vk*@)H0{zmErSVi=Rc{vO!Sx(FZ+Ux{lweQ z&Nl|jmx0lEYn!pt7K$n?1BU4I;Fu~D){q+ml`aNp>Tlka*b9v{zB4Yb|fd~>K$`$rMmS z()Q*>iR5@kp^vCnl$LVc-LRrW+C7Ieu#2g%dT`w>YKD8C*6aL7-S7H#w@>KzgJsoShx5qNWy`U=sy+2nxBW3y3*?P z)F_55Mw*mFvsJn5PM=>%J}E7=Y*ndFxhznihmXBV8n3>0&JDamT0$XH*ffy{N+CK> zf*otfAaNCGgS5eI>lUZ7dtUf63YnhPU8+9NP^w-NSSATbPp@i0A=B$CbTvn+|49|E zP8^08&n}x6W+L_k*Z#l1VHb-Y^A1cdbZO}C^p14#ENa*b(NB>ilbvAHV|qIiHYg&x zA#!9Z)Yu@V5$B`1UF^4;ONj3b%mUjvN@qkA++p17h+40R?HwE)qqa; z{Nx)Qr4H=d#faqiotGooWXF;c@#-Crh~C3c90Y_b(ds&hZs!tfE?mUUJhSA7Fa#_? z3bhiE00{hl$QJJ1tvkcrXC z&(AHPD&|5GIlBFf4su1+^BY;&c_rw;0N)ZC=^9TD4lv^uN4Re&XdZKO+o*~BQ(FR1 z9om{C7s2x-3crL8vHo<1CN`rdQ9~oh~MDLL! z`^a|c5@~0@t3tmvx@K3QP5v4<7;+`Yl@?P}5ldz5;lVh+u|A`K*ca2tN$12a_60@B zENQEq@0Cw!H|m*iDl*+Y=4b4E4BsoILWRt}Q+g$O54O6kbjpFVD!HKKkTi7Kf=<0M z>9^%^1nyfeXsIv+yl2&w9WDIK=(!3s=C3+0Q zv2zDIwjOhG;6~Ede%H!*xtCU3vjfa@G&il*rd6GB4LNxwPQ#gtaA1gNWPi}NAgbTp zSwi^|vkAZ$Tyi@=Igrf_2n$$na(p{4bwX|}{t9kV!~fZtH@{cUH$XsA92;QpAdtfr zr}dhta0HB0l+x8@?nV=uI`Lx0F!O1V|h- z77y`!a5N)R5t<_fyWsiUY@rLW=qo^|9e`!+;?4EsdzR8tg`FF$5NZQ=Re*E&7&VbP zF{f($*1CkM!QOcO{(T5mvzJi&wC15@K}owrG9Wou@?FXQEU#Ps@`|6YIK1Ne6=N%0 zE0inNRligHLiNMdU#q^NdI(icJF07{W~-iD>8h!&>HG*=ZRO#*i|V%4J-1pW1-P4( z0=rF1-jp0${>bvu@~c)ov3z)W&+@aDe^7OI)s0mX^*^n0SE*NjvudWL^1aFzD}T7k zQCV1dedU#vp-NNb&dS<~H&!ZZcLOW#sfv3lzEm+;;jPeCwAS5P_h7wc#feq>>MpCf zP5SK0v6^j?_S)ap>|SlFxxB8jKEC?8)sIy_T>ppKP73fQ-Ml(k`%mevk2+ufjoOE# zf1^XF`^TzRtDdY`c|Ar^z3R^W`gLS;qo;Z%MB#UUkm!^HQ3t>ho!C>6+{PN3(htN2 zAQbok&IMo;3O5Ce65uqb+CL{y0kC1ENC&_YpuiFlgpN9y3JxJ;@jRD^avg`q1O%Qa z62#^H8I=10#1z08D40ToY5kqhG>`=V%D_dT24EKVAhE=mU;QFa#q9*~p8gb23d{g< zqL4lDh+O&&ff^4`OszON3YA88prhm*jq5jQ}7!3>X#{6kKGL_AS{4O0&xR0I+*P_kgWMn%>ZDb*bH$mJ_CLR z;MuDGCQyM+#Njsq%Lzw6+y#ipm{Be#b7Y`KQ7{$2Z6WLw3I|0(YT>X+FquFJf~gw8 z3BY&(WD3B_5COaVTl}|xEd%`=D>#X_N|8-76fwQ$%qlnU#)jK+2$ zb_{V39;6W`S;u_W^nZ@L_-&M^P}WalK;wpZIPCfhvOaM{`-Au+Yf>&`fV^ z8He;kKZYDp0p0`GIn<0t<`!Hcs%j2Fk5YkY0>F_FJR3b(dg>z&~brLW^a!73K22`rTjeYrP z0+mA4QD`CP$rKlbLN7U$%dVZH+6{o-hcbu7;P5+e%U9Lrcq&~QIE(;l18@!410Zo{ zP>W3Z_8i#?pd4Tyst|}sLk4k`^~P5SI|68bbP@0&mM2FMosb!xTy<3V7CQ;HOXspB|i5 zp%`XMwo)NbGxix2XoHUj6GI{9=YY7>^1PM2kZk3GKyXo2L>Qup(;B0kDb7Y z!_v5^cmhldz`mfcM;qp;lrQY=1VE;GF&6-*!9uKmO86E5O2Ax1M`tkA6bTLwOtB5Z zm=M2&Z3sN040?}^M*%65$;z|mKBj^Lm`Es?hH0j-Z$Njd-ZoFAz!wxi3o%y^QTW!V zS}m}x6H9A?Xo3Jj3^!8kXDIBNtV%0RW26>B*_8sH$IJ1{*#?ZAMs8(i@4yW;ID zW`vKi18~#9C;@^3&O`@*m)Twxs8}K(*Z}>=2CzR`01dk%yMlwOge1pB4hj;Yzo30V zG=WKh!&7}a|E&#)`&c}j6A)N*v#acYVOoBrK%I%vDaOh{R>LqBw*nR_n6FpOeT*Lh z;t@7V3i${Ong(Y#e`=me@epXO3y39piU9g8CFS6WAOoP*0OAsp4-g{?3#p(7TaBOp z7D2yp7v7(N(1Dyrv=&&%C|kinw&A)9b_3)cMv3!}N(hK~f3|hS+{ci3I3o0rmH;C_ zH!Wvy@W)DVs`4#SX%?7ezV(xboW1awjk$wiwJQ+<_a+ zgA7O?0QhjIY`|>u;p6ez%a`S;@nD)iwJCOz2UyhD$k;Go6wJFvwuu9m#A0J>cqrl! zG2cFl(lfL#nbvXaH{vunFKxh(GQ;%ZK7kf_%ePKv_K;1qg_v zfT}&1SYu`_hrfnz(JkOkVmkt%3OgVEUxiy80L~Ar z8aO)YrK?^QUhpe$4D--+U`z-fprG|8+6L<`4*oaG*s1o~qSS_Ybb|843;xEG(eZ#er}EOf5(~#-ms#s7w?D z3Fcp5P0`bx!@~j)UhPkW`2*k~aI`3}8a5d1HE^e56-u7!0WU>ylqO-_M!ch$g4Nkl zD;=wo%g#qKIQJhp>nN){7w1L>D7(n90nAz)+9EYK<9C;TiEk+cDMAtS5RIRr2($DW z;Z4=wEg*_vop4eCH49<_NT4`<-4S^5dz5V{>GHW%04`$`ONFx&n~q`-;g78SDgbxU zrG~oWh4{rf0dx-6D4N~_v1dxGAK<$HO_al22L>fwB%sn-^PxmFhqj0A!z69O;GKXJ zhCHI!szA;%CTbn$?X2PFVU0RvFbeC^|W*CLR@Sagbei3kx2R0wE0Mbn=8KX9mFtvE1I zyq)r>6OfJ+TnbtU6rJ{8kEJF#QyyBLYa2dB+9SOlA&Yyz-pt+-#?)IjosBsd_ro3B)enjy|03~HjsL?ShVulC*1#y%0G9qFBIMMrovlysMVc)(#b z%QRD}(Kw@^9qFhSJw+IUefxp`eRw_l_d#@GqiuEr`oM2lyD~ZvmJfSFlcT{wxzm&6 zhw{ZFI7&=A1()UZB(}*$=Pbq8;a6M}n6%jxvB4o_DBrK^?&oZtO=On`)>sh@Awe}l z8N#o5u;4;S=m0G+>Z`r7=I-j}t12r#DH&k59J?9)?VqKvH2j>IqWZ9kv1hvmMl>m3 zK&vFqG^YOCDOiF;H1O3`9ppPr#WwaUQ#@Z$C>p-Iz2QCtKUlRaD8eVY9VkVuE$@Zxgz3ymGjYwYf2f!bB3|mAaa>Ksu zEOLusQtzJyfQv9Bm(ir}l8@%Jy;CY2^^<&80++)WE+Qf5=2|}JhP>E#u!;S_<=_X@ zCYn7Rjq!XQv?eD*ilGsk%w$5AU7VYrCL+y%&&4!yvNv!6o65jY+~^D$k|RLr@9kr{ zbb4R+5I>INS&TzOBjdM3a0F}#ZD2cdRJv@LpAEprs#A)QP9{HWvUW|$hWS=Le;Ha4 z(a7Li_rt<_8D;~v^UY|2x19$g0ec^cNMyTw8OG=j>i8z^$F^?})5!S#Isr;yUE(7~ zs$N$4-Q~ZRwn(b$Nc@V<*^ za2AYnXbY93u=jy=?3ean-LMTQ<||v75$A4Gm%%aVn1O zM0K{}diEdVbUz1XQBP0s7K`lYyp0_aVWH`rGq3Y_8{xerl(P)Z0wzNUUg__(CZcj} zFdvqwooVM(f?RoRsiQ&s7%?TPKDOfXC4{dGhDN$Zm19Yd6J@0a4K5XlU58J^k4f=P zr-gm}I{L{}|3I%&J~ZZ4B~l5;U>6v5A3hO3CR-jYTiIv#!9CI*nmrSpLl-5xcCs{i-<(VpTBY!`@KU{COc;-h6gWNrsBTn zxN>@6GG-i}iuNHsyI5LF&bl3YKtv*2`r(%1+%;dg9sG;f0XbHZ2T%-+jV02`>0n5e z?i=co4abT8Zt&O3-$YMDG;;iiL`HTSw>Gf5zE!eHT79!h42TDqaz?C5z1N)gYC4tP zBx0lvHIsjT1KP_10@>fB-oY0*9l8V41wS}2Mdm#HJ*G~pJk=MDnrvOlj7$fpA9Uph zcjAz6h-hU0Wtj`vjo&W$AXIv-QyO_7qRu0Te_GJ>RGbl z?$Sp1^_h9UzGo_7>{Hk}`;iJ04~znr;%@BRg--!dcWBpvyOvk758houLiJwXEO0=C z$n_q5XTT?q8+*0=DtBmLm|xoK zQ8z!LTrT=j$xcrE4?=G!UNwx_z%~TTBV5d|TmeQMK$uv(4!KOLQ=AfIj{DalZ~yli zPVaAGMHsZY`~D zUi1|n#OjgFt(*TNzU2Ib)ZIosiLk%n3Jn_`@GD`3#cdHbO{<*eIpb}Zki}migMYpT zsgiHs)kfIcmh_ZKzsk+Zs`*(FF|fef&wq6h-adI?`&_Ezy$4JED0x*oR`ZqWpVb+q z+baKAu|wjc^6^4M3|eL{#O;hfsWijGnsHBfsL$_G1%n1UjwZ6_N!-pBQfNi>ZN%}r z8(Y~wJV`}l-|Q~PBt9|BBI}N;a_&xrGdbyZ8MxVKBIi7cRu+-~?C{3<>=z!T=cRp? zV$<-4uP2_4SmZi$pT_SAyK-24t{?yV1ca=JMweg6!aDb7R1LJveuN9-*H|1qp~T=+ z+Uf93#6x^DfuEow3rXbYt$=rs<=$^+fAAArh9L1Ns*51;C$!NN;);Rm7#ZtMPg9A% zj(q3mR1;W8B1dleA;P}TetIKY{|jD)ruZ^^GlShxuUzR+>diUXXqTdk^N%-?tBV+v zhz3N!Sq}1&JytByjKkUU<_`{^V!)wbl%3jMBQtI73j&R}nacdfzyl&0+4I(l4szq3 z?HkxnJx&A924(@>BZ$eY%+{@C2789%gQkpf00q>zc6?8v9TAO|Pg9eIZ(Xs9eefx? zL#mGz6y&^PrB#i_p3X5X(=)A2Os4hDK0}n~H=#GlV`xQ0BYNYbb58$Po-W!MM>-i;j{guy`4mFCFU~YN(e!Il-@Xz9&ZyAmA@9N+t4_a&q$5hAj|#FD^L&(w8s+V$DO)N}hjdF|9;$`56(mu(eE~ zAAVo59B`Cs8W6^QN$qv8W4sKcK<#{bw0+h*FK3(%t!Y4!Q4Z&Ny2s-^E-f!0*1wG{ zDWVZ))r&&vU-oTkM6%ABAn-ZL7}`bWp6{Sg)4%7K#@lZZwd_g>z?+qB+2NoBBWmIBl8?bvb|dp|Rg4Gg-Y z_AoHI_;&Pf;ie|0k-@5WFJuqBMMq?t?L-^=y!85g?l|L`RP-UFH*Q9DFE=rt{t$f; z(fI7%!l47L>?0pS0&jxauAgtnIvfjT;Nys1S1A=x-zwgP>TEg zsvSUT{;bqU5797s>zcLAPhF%_H3U3@-l>tO-JNsw4wECb5Q^PZhY%MmqQT=oBG{j%`$0vJrPR2DpWE{#&PiSL^$NT?`eF=D6Wx0Q+Y15FVS=y#)leDz7 zO#u;S=FEyvI$LJR?3tNlhDBz}teLE{WJF3uL=>?F=?4f%nVH}fid2Ooh*(rqaHH4V z%SEdq+5~QUxm*dB3kHQZtNHtt1G=)hSc=-meK~`$vQPaDi%CQxC%dbA z*@3@5a5)XRcA+bLP_tSk^$jqJd^9lVOAJSC!b&Q%R$vaRr=dXeS}x;mGrM=~!xZhU ztmtNX@0MVGYG<|1HJD;#cZ>xTEl-Gko<1@aAseIXMPT1o)Rh-l9&($iF zOOG^z=qWPM@u$6P+r|pTw>w3#6Zpks8i$LB2`dc=y@Qb_`vC_3;sagV)Jo}+dxAmq z6p_sQk6ME78|%V)CtuiHId`k}6veFI z5p521NxBVA z(=a}ZDr}#*w9?U9Pa?;z{5$p{(&NZ$msb9XoV^DwARG2pwqjL<7FU&47Aut*U)mNh zsv=Q`Jk0Uip;9wa#nKRe@pC9X@-%1W>LkbaR^H*c|MBt)im`i61;L*0t+D8{*yJ{5 z$X(8=EQ8hz-`$uDvmmCCW7#-gFP?oyRIrM5DFeEw5_MHAjndq$*V zMq~rZtm%Ptj{Htl*|c4$Rv=$;Nx-o9DGu_f{e$#dE;&U39;{qm*wm;jFfI$r)2Pn+Toe>dH8gJ1e9oa1?m*Ldd;%OzFsz z=q?&bj`(Ig%-N6uM*mXO9|?GA*2jh5s3T&wgAHIQe1Dzvwf8gpai_<0do4V z^IxOVEnG!*-7t1^+X8?A4I$v`U?TF*Oz%Uq0+vHc?h92mlMkI=Y3*G0334Fxb)mfW z`PwkhGbfL317ojZNXtG#tyKWIzoosCJbqE-Z17U8@2^yr z7oPxDdOv1OBttRayOTmG^sjuN;@yBChn07$oHAC{b>UWrSZ~B8(Et?$5F*LSflNfcFFQ?@j?QJD zfUWD0jofZJ>n4~tRgjB#^a5-GJ{QrgF=ype{SrU1lNBb61kPvUNY)lM4 zphs<3Sj#^`;nD@%vTXxrU08(yj7i|=?nS{+FT8n?-bpUE<0P#oadMr%p!YZ{xS*qa zwF7195T=W&YP1q7%m}_jiFS1JPGGygE76yK6!Z7||DV0$u)ET@Ub~{9vvs#b3%~xY zP0uv`W))ZMeg|$X!>1xR6nIZU09g=DMmpRdP{*u{MV{tY(REj1MT=#@DPh7WrcHDCD1cI-+I`k)G$n0 z@13%19peMjS)v)F%8;lT{--()O@9N5)_v}biw1<*-H7;Z8HvrnVMY`(i&Hl!_n@THR zk!+x{?JcSz0`x_=DU?k4Xg}l7#={Q7xI3>WvSJvHz+znw(29s7MB9l!S zCM-^4x(I-;_Bd1@Q8SP2#UT#g5T`7Hr$)ho&x}BKmdy3+j@LtyV zSS+oT4Hcx}xHe(($J4~^q3?^DiSC@M9qdm%6|-OlSz%n!+T7B$!q~jOX?NqNSKhPg z4Z4ah+WIly(f2Q!bl)>0++!uN_*E?9)Yqr_^*>d zKU^W?mO^FidPHz@6%r9Xjr#6-piq+bn>TGFW49tL>$`EUfyINTZdC{irf-?G!ruSqPk%~6PkFeOj zR>tAD{39fMWfk{>=RS4S*=*w9497}CAr;SM=tgj9Hm*86SKY!ke42iq=hP$yo4?RU z%K;hEOtq6ak6P*rP4H*SM{lTXY!i`ioqwLIg4x6V@di59>QfUKB@=gpH6=5F8HG8W zQs=xTy&3^tw?c}GTFHU0sCJP@HXP|*wD2J5ReNe2z2PlI!!}w3y_lVlPAE)X56aLT zPgZufiJG|zbZ5N?-#%Vt$-d_+tB4_8={fx9*PPu)wb-kCwJbwIo@W%6Y+fCl(OTl< zrJq4>{>VY-i1ierWB;Z0vOM?73U&>!(l?xYHj2=o!JCKKftTcpc zBgF#Mvysnw$=&GE@>H72x};0EyWWGlE3yocWP#G?2zEy*1@do@_EpZn=XDP_El)+H z?)$h*|8Da5J!idLwBCzrt5{>;H4E~~dvO;O)7V2l`v$Gp@cGK%`jHi_7a_LtMy@PY z3$TDksO1k1U#NBavDkS7u+b?WPs)=(7awLKxX+OT$0{31rczno{vML7>pof;Z!`O& z3Zw#@>epfG@lrvlN{kIe4!~fj<_(PQ|sI#lQ$U!y~Q_Bd1Ms&9~ z?LPdzC%V}Ff1_Hn=M>M|63sPRW1IryfR6L^N{d%b!E6CPi+3 z?O{4k?o$-}i655&AO(#w#_zG@eEI2ooS*KuKLIu(5;<_Dh=|=^AM9bTz8L~raCTu; zUEC4^3NS6U)>^l!=GH9!3@VWgq!@2L8|$|i6xkWzUSU<;aSTUIJ&8z)Zv#Ny{HLw# z-;dFw23RvfS6wz`ct&p4x%^U{(cuGrA-5Q=dK!Hd(KrA@&e`?Nr_oiw(ao)1JUb)a zNts<{98T+X4ufYJ1!(9A+|Hse^(2%w{tdCXX$EKwb&u!=!jZ_Nj;KMOv6rj=u-A?M=;w$dVzUGiy0vM_c#7<)!!O+O3ba~ z#2xl-7E0MB%;oSL1rg!R5$T-NtXD|W5k)i{vns8``wXtOqE>Ri4L|t(%BOqS=boup zp=!(_Vo#U=g@GBD$;ZcM-1z+gGme3vlurpE^ z9nh8Xq4CKWpkTSh`StH({6!@4%*oH=4*d4xo7tY{DjrEkRz8g$t2AT50T+tYWHtP| z2cO5gA{yz)U=6(R;%|D`|9+l|1lQa-=mP&OR^6B;?sNDv1CvAjQ3Z-E(EYLgS?rH` z5|N!V&Aa_3pQTP|?;HgR;R6GP(*v=DyijzdZDnb{9pR!Jmy=(^fQV^JLb!EL&;j|- z976nV%=4vh^7&zn&rtxbyi?I{ju7pSE4$jt^{s@foAcz4VG~*}p~eeYvu)K^n?_gu zyz!t!LUtTHIY)X=RMvKse3M>;Ma5L3Zet=pW-&m1L?Q_`hOzWe$t=sKles`9H#`|jkf(kD)l$?}3`cd+tbQeVyR9CC^T z?B#mRj??+}ET``AA=oDYzm@z39pNr zX`r{Aec~m&4jaTA%~;}X5L$p!kIG!}!hpOWEu#D|@%#|)i<`+azxtb#wSP3ZTS9(2 z2E4L={;1N+pHnL?5sDE(u54*M093BOP;10_Wbf}P>pF4+BSAUi33~NW>%d4phdQR0 zRy(&#^jQxh!%td1}L{w%A5-ER0ff`0G)W95o2 zBitNvcF82sI@Wp8X9r~hI&T5Ca@s$d|sE(qBq2L)4FUb+2 z`SWrsbxA1d`KKyCCzP9zWKHve1Hj)&pi~nwE0Hly?mPvTz_L^#G5qIe&TfD}?b>;$ z=SY}`bqDp{ zJ~zJ&L0?ZIJA%774YC{2QjkOKL0{A`#7u{zc}r65&-%$TmsK~AE8oHWTtwpFW6AZ( zu>F4O@F5`oGA7%o5@PQ#zEGo< z%a{7F4Wj4Bfm{EG)BVPgEoA>sEC0Ct_?LE)2Y$BTgO`l2XeIz0|KC=lWV|H_&~X=C zWy2DZl~k7#g`bpE``X2#kH{X|emVP3Nfl;q&m26Sg8q_pkJ$HLX71}k;&f`s7=3FK*Dz~AqaXRan@MVy*Fps#| z-D|3CZ6X>u^7cY1@kiHGVM}t(owvBkQz2^!fz+vD*lKpCCq4Wscdo8(XcLim9LV3D ze7Ku^WOWtQLkH$|EM_E!z2gxlP$XTEWS}6`^ITqUs%~hlr_kD(yU6J?2;Lk#2TZm) z=CpClrYV;$c?<&EA<5Bp|I6$iP-s`Z)_Q+cDVtSbg0GfKV( z`BuCuq9J1~hGjIb-ojq~;inLj=Dr2yt3S3?d$%{QvaR@#WbX>em6HFK{7mw=>{mL#W|!!)a1J_{sD4x7k})O7^a_ulwV=@2>j-K&!Iroa?0P*0=mm%P(4< zXx-krxAkW&pKJJP%ST#1)S_$I*|4o;^~%|`uQdF7!-}=fHI&vqwD!|&-&s4h*3(*E z%dBi)+u8ir=3h5|z4_ke{i|A=!>x}u8=7~wrB|k#*PQd0bABKxpL4X~(p49o^O}D%&Al_e#l?6k%ZdekVX3;1)(s3(jZ?O9j|mn2FL` zK25XqVH(3BinKjoZUA!vpi2~2Cy;J$f%k5 zfQle<04Er*MF2+f$l6|7paSJ?KcGrrjR%YpFb)7e;>|WcE0B`_tU*^0&<@-vml^mO zqrqY$2k-zKA)wb~WJtuJI64%riv|KPYk$Od3t$5jff6<@ha5;7DB%v9UbgG7z!`Q# zTE7b?@X&q_OkoI40eVO~hj@eW08ob?Jw>36k%n|5%v)|Pb#X{4P8dm?X?XB~M*{Q) z1hyc<2B17$Edpzd5Ig|@WpL7z7?{TZag$x~INz;hw4nV^gEoDOe>sRSb%dCd0o4Qa zF90n8u*sxcas2`nf&DZc2BLE@tvz4j@RIONh>^!Q0F1;j1QZ{N^OH^}dJZl8Fva!)@C?FL zC|(*x%}Qpre4b|wJfTqxHwRHgv#^i}0BpS8uL|!1ftA8wVMTFZPgc}@4HmbSgl;KZ z`%yg>fG%=;0T6slv|Mee=lud}7*Y{DVFm^WwOoz@#szcT!@(8-@e5EJ04oA;4F!Zj zAQ9kcOvTmwXc=wLte^zZb%Dg3|6&JZFlOML*WctapGdMTP-_O1k^otyiu* zMk7&=t|aaMb$#Q0AmY$($M8~cjUd7`T;@=^CBU=Mq0*!uT?YP@5n})h5#Xzq*KxQx zG$JVkEDz{n*k5pcm1*TnQ?Y5Q@b0qlN}KKzsQ4%#dF=qHR@6f`Oh%fRKw{c)U=oW+UqB0WLW-w7oj4M#- z0@Fh5QJMs_E;9|jd!7*tjO>V{4iEqxl4_i}(PV2!cUQ`jru z5CPl?kR&0qwbVN(yh~wAup4MxT@r9!QJO#_?;NGn{dgHd0$4k8z@z{t4MK)OQI&eS zg_jlBJ&0m+0`|#+wQd92SVq?Kjz9%kQWU5rdPorp+XS2)pHAK*j3q^qLM>zp8xE)_ ztP^a|P`3SP?p*}U0dr|T2LlA~6nr1WehSLg3(Lm|_?j$)3~*s6@*gAy(tpaW_wp}e zL;JEA#8B2*rr%2mJO-$k+@#1=Lq z1IdUdfwY5>JBP!AL0}_BIDWDyqPr|<{QWqQxSU{s8~jzYoVkoN=PR= zT6xx1AlX1p(2|WtdRkD(7-#03I~J)v;3{I)F~n3#A{47XyW)*SDwZDrcpztDD9D)s zmX=Aj?j}JxT7hljn4yU56x)XrRyclE-zmI|-U1s9aDE{ps?JgcJ9o)sHnGMGTDsYp6NCX9TkK9Xt7%5@4bi*p1N>2-*NT#iT^uu2O z6JhF#D?cqzu^6EUUC09aV|lnUkU6z z3WY}}5h#6-CS3w!3>{88Vr^4fC)#` zZl*zy#ro`iAkd-eW(X%Pkh~D?i_JRISrJ~w@rdj;Gd8&ouxdaAqYJzxv_OTlrP>D; z56&nvo{$Hn9l{*K$%!FAtBm6PVHR;lTW2%9!2d9!eCdis?Rwy!;b$PZA)&UdUZ7HC0LuwaVWeozoZP`| zeX8|NP95#VK`MvpmBLdHrC7CPY#U&JZtVr)6;)U-fh6GO0oZuht4Mpqp^WYpdpW>2 z%oc-_p-7{R;p4>rHVi;exor;*OLesdz+cq%0>MW01z@`&aKlsT6*e8zJ1jkDp1@em zLR`VWiQTo;vH(hj{-IAvoI)t9L8T}3Hy4U)Y<2UXRQo=M%)5&aY538mN0E8Awm~I{ zvOC7tAf(SV2OtaKHlET%>=9W!G;A7)j(fC2F_PX;?Q0V?6Uo2La+yu!w;QT&k$qDr zg7A-x)$O>KQa}qnqF`8q>QFLcN*b`K%$i9=a$eF2R-$I2yTiiQm?B^5tp0=N^^;9i z)X|!I|KjD|s`cpythrLuI;e4uBi(6j7g&i}$w}FccL9Vt$o{ScexKhAe$Kgz7H_Ds z(LyjZtxlI5YQ}5zB*=ek20u|N>DbbM+t^ob>n5%(Rh0OmpLzU$aU+}TuJ*$D^1j8J zbJ^^R>g7^pQR;}z7-VTVd8iua8LPgtF?`#tqxMU@1Pwq;Y`pDyGc? z_M{H(3D{N;BfqWM(f%INfk%GH`>4n>+ZM*{H+kRMg>_zc-rJCt+yQrHzPZ|T zYRv|!;(i1cE6<#KaUFRTxk6AjHs(utT~l&7DssIFN9L^;;rc8hksYhQ0RM~ub&gM8 zwD1k>7h_P|bF#%x7@ABtl~dlJ(mj)z2`~v_zqs1hTHi_}yCujf{iv^p9KU#BrcQpK zdM>hH=A?^VOKaRSdd0}7T&bNL^Xrrhxw8Y)E@~!{wGYFI)pE}kvTprCx8A>jn|6wT z@)0g_#;c!9*!uMad)N{Px`BY=QB}8)FYK(YgP*&O1nV3OSdUJ9v4>r?tBMjzsyPaS z!WWzM<_GknijqO6l7>r+-XbR>yQ{m~M9t*b$zH^+nx{6Cy}zJ|BfoyQhl`i_eIItQ zV-6rBH;!@LGP@LGDaPV-jMyS52(8splXYLaxEc8KKiEUA|99Ue_TV0B4^qxiEEK*^ z!E!u3IulW-6ehV=1rO(I=VQd{Td8jobNADGyVz?ksA?n~wnVBwD$mK|x};n_nvO-u zzg>v26*UvxgZ~tYb@jZj3h;Yr^=ib8l zu@6g#Qc+!xx`;@w7^Qf(xFl16Se%_yx8P=b`;z$EWgmR((SLjfi1K$MbWy6Ro&&o& z5LI!=iuTWDpdzER{&qYi;DQORHx~9%{X; zT4@&<>I56!&n~NOT-JuSP}KYK>frj<1P^CZeB}=tKe6JqRS!{D)-Sf*5SrTy8({;7 zZ8cfWI~VQG~969s-4aiOG%&lf4hAM)PubAWD zAULLs$7-FHmxfE3NT%O5GD6xD7}4!INIwyY9N2pr$JL=+H+w)=MUYW&4lW@fHhOwE zJ`s@F^J>?a#cLTuDiiwF*CuKv9X}X>*P*4_&Gwn8?Gn|SlLbaT70V=~7R7W#PC62B zI~=j#=S4JBs4@xfHdw2}k~U`y;76m<(UMLX(|MC5ZNsLoZzRV;_uJS%+c-0+&)4r{ zh8%^AGmtLW5H94lL(phM&9r=*jeWsh4M;kCQ`sqlOvRWHMm#>LHVF%t9Hxt>5`_G8gE#vH{?5tTx7u|DV}C52QRpbn^{RTix_LJ-q1b1s%tBkM-^{ySx1urbXcxSjMXP7|&ql?Q6Y>o(6<`?zR zP<8#Lr6*8qOFb<+!v9Mz5R=oPtweV;{f2B|zy#LQT5>XE^Imf7K z*zLB484b_p-U;v#(TMJQPvUwe0kZMi6Lk0;a}=^53++2tFbjnRvD)xZbCW{MN88 z_9m9qs3)>6PugrN>V3`;p3N&Id{aFM*M*n4K-6y5GDCagp0g~@ltndco0i$fq*+&3 z77ygOq3I+)Nmtw3L^PsHSa*{T%)GUYm1U}zF9aW6#bX=a$U)GqZjeeyc*oyDTt>*& z8(eb~k%AAONXPtslWep&Hth}>i^&Nh2|^n=bO0Khh(tjopbTC6Ko9#r2jDU9K+VxX zt1OcC7o?F$A`lTiHhu%fOhh9ul&u%Ah(Enj()}*xM|@~z+Bc^082jT%tEnigqmSQ$ z!Kx>b1Fe_fr)jC`KiyIV&`Q6l7|AnAkJjomLY%r{{5XehtpXEUL?Z`Yo4)|jBM$&w z`&K&AHw?}V;`@2iKwvOgipvXXc_!hJ&t#D8OTYh-PvZMUB;Ks@!VmB2Vb^~O!nw!0 zIA3FlQdGuRG^udNpHR3AO1?Y)@d!01o-gP706`naa)**k^j48)68l6=qoeVSm z4peuhUlqI#UnQoT)DK5w`Q7Y@$&@7fu8@ zv~wRqSNWjTaMo;z%LmQwoNCNrEu5%Sl8d$DVv2AG6v0Iea;W@T$cjOvwzo zNhYB%236%zjUKT99Gf?&5Yqhp+j-ed z;V^jFJ)#=U7UcF}pE5K(6^o2z_?5c$Ch!r_$fMbK9|hYcm;dG8o7jn)s+UN%YUi#1 zFFvElmWU5X8TUkfvY^d|T>@!z&J zT)y%_dgoJbLoy{KlAz>I>B6}&rZ|%>Zee7UwQy4@A8lENNw%v&vz3?rFu57g<7RbdIpaMo8JEk z24G*a^jykPmzTcYk;j@B=Ye5rS~@((=f( zf>Sa>ykDpyPH;IYaeJ>?$a8|p1{DC)S-7VB)VR-}Kv$YpSb^(|A*L^a$Ffw!-frB( zn?x><%fdk07(41)MDRdR0vrw0&H|4|06wN{5`OnICqZ_}Wtt@;Km!=w`z(7*e;3R) z`{dOovhER>Z4h(>N9pSP53=HQye4v9a);lL4=db5xdb$`r|^on znIb^}7W=6xYQQsbz>LYF4u4r+)`Z-XYNC0%y1QN6Ov1{?9PE=%;|!*X_%#qnydrM5 z+2dY0Jia28j#^@6+4kdVXcJ#d z3ANlHbAWR)&zz_Nx63^@wy0zH$8^4;EN!#< zjVXZS=E$Ru<0|#)uP_=S5}6n@azKCGtmD_b$^*;@K~i7xsIDnNu`7rpkERNL{+0l7lZUbEg}BFLB`S*Ifz7*XK%d~F2i~-Jh!E~id^(!_1y0CBJM@~KEm$8 z7Fl+8@lmdizf`qBwrS@mfCaB?>8;LGlyQ5c`I6t2kgJm9jjuwsiJMU$`0+m0{TPOW zmu-?1Z(6ts=&&bOw>4Y}Or`L7n^@`in#-vEO|b#^o8X`sl{@4U!$WSfvs_G$!d6Ik z+9&5BtVA>-`{i@cYijd7?5TM=|E{^hBA>jqi~yvu;*`mgw@#assAf(1?0XsONJPWc z%#5ov4Ku#~Wjce-xjgvrcOhrk?a0a}$0wvNMJcTJlOt#7&HfKyBO(EluuHHq{OAwR z+7ZXx1bFcJduA-7HOf-Pm<<6$ev^$Klnt*`H?FIrpb*rn zePrKXZb$m>D=-USqmScjcw+~n$%JH#+GZR{B>fs~kpG(gpW|ypB#i7jV2e_e?=Suw z_9P))HcHo2p!o(N?m@W__t4{<+m8zr|G5LxvYaVl3?>{gy|X;S|H!Go;c{P3Ass)J z;Zk_ZgHXT!zTnGke+Qdr;!VT^c;~Le*Ymg9L4(^6VA3w9E0k6`P>Ysl`i(cya}kX< ziyz+r$Mv~yEx4Qay$x5aYwq3D>;a!_no-P{Ck%<8VR|Zw8eMd)9()^9BBqfO60P9Q zKmGQSes0HCUyHHjcTtf^NbUI{?|>^Q4|@T7ate#~ns?AaF$Kj>_L67bS>SZ?pENMQ zHAnNbg$zBv*Z+z?wzEMm=%JIRy?56+b1u{+4<_A6#9rjPkGr_``$!>9us8A4% zj?+!AVe&l<8{?*;3c97 zhCf;b{^{3XomhY4idJ*;gH1nOvugDR8bXpATgo)NVHC2`Gf#7@`SqQ4rF~|I$ngPh ze%cd5&3R7vyH?jWw25f6&OAnrB7c5qbxnvLd7-g}xSRRaiwyfs;i<6P=Joh2@tso>f_kQ#YukGV<{Pm3cw81=EN=;xCrvJ6ST`OYf#_|n z^|jWw64@&-rXgfzGugSeCdA6@HxSs26Php~Y>TWh^rUGp?ETUgSmLRcm*YJBR!QN@_d&K=90=W3Ne zSzcl_8mxZ|B~^ecOwE7fcwxLENE9O^#3xDp9pa8W&5zdcB6OoA7Zs%9$2mXrHDI$@MRMRfx z=WizWo7w@Y+xF-SgggB2{adwHxLN#zdb#;K=%` zVl`ggfz>FckwdkEm$CPD)Lc+S=aJ4X+)?G3NnKWMQI;L{Nok-21%TsG*^H$lqEQ8a z^Kc{XW=jnhO+RA{*ce$RAWzAn>3n~TWV&m8?c!!!k6(4N|J7adBCB_1$`WV7#o~lz zESSrUg^9NpuZWvb<;iJbU+Aq3OWFhdwk#07M<;Zllpz*K5Y0A>xTuw;0oz!18-@rz z?s=LO&il9v@nLITp`J2I%X0mYZ*YWsQi9h-&18rFEi2o!vSyb&zP$#=zj*k#q21MC z5Vx~OPJih!3Gwc%0nclc)?){pikJS9LSwkiFJL{&Q!owd*X80M5H)B?G%^ zXN%vc?y6O~$_V{TTNzq_7LZ}6D(XRq31Ckb*#qO|ERV>>UU-&V(^u>25Y6ereBax5 zw)tLijhZ>X7KDuof!Z{$C=I7N0^lj^404Nr+CtafKhLkVp|s3$kNn^0nIEnkBtsY0 z5KV*JCBA+IV%bqg2nj}riM5jJFRbl8EAfb`cNhD+3u{oODQp@dz5#3NL6uS(Q;Tp= zpM$*r;@Xy-K>v7GdM*E?fIiEC2W>6a){u1<*I>5d6JCHIgv#2q&^IbKBMwSVcQGP! zmZh=>E<6n2ueUx>TTA`U?`s(b8qQZ6e+T7WOa0FGcX=f}^Ryx=uSeS_XCm;f4acNP zSvsYdA|FsSXohPKTUA0NZuQP1O6KXPZDSlGaOrANi9;f%izy*8l(wb4yO^coKUmZy$%K>X4 zlI&Lv3-zt!h#g1UHNl&E z*%z1^G&j#Y1q|R-gZzj-sAL9xV^(95h*m%F$NECe0>T3Wy1 zfu5@Cf(pPSAO z28PW6+f4W<<0DKgZ%6vlUSJksR13n zOyf?+qwbPcK9S*gZD+JfjeLn9L+uE4$f!L40}7uEozAFiqF^?h|Ir04`1b5q=esJmDxhMeAIg4xB9dO!)hcr`+Da!AyPh45s&{|I- zhX&*5$%~%VHwIKsbw)z#RWA{sdpIF}FkXTNzh z9iAH;^MG|1WZ_USFsz=KD*2Uub37gZJQm&KEko!>J&A;W{^IV#=b_Ts=nz&?uVa4u zA`|PlV{}YD5pl;d*~oZ!kZ1C+4xJH^$cZTl&XP{tM%U>f6$OE`VMXKZtG>1J)z+RC zWwW~}xroObmE*;CK zJ?@BmQla6$xHXC|7SVtY@c?(F>SD7|9DR@p=P!0at)B9a$p#X`rBKqvxB#2X4gc*P z@Db5?*yQn{G9vuhF7^!% zd98)~C}u}5jI3T zJ{6JOh>dyOIK)Ohi9Pb@r9KI{p8OR6lasX&YNt_jM%?av$Xur`3*_-}@Q)ma|Cp?` zcP{$~g?+@qaZAf?GB9;^b$Y5sP)h-@oq|I}ADv-x{%OB|W^7ceDw2J-LSxTO*V@-WoF{2QqQt*M`j)9L`f{)Jp(nmwT4{?#cK*;EUhu zK0AoaL2`bnwth1bdrJrimqX`At{n2HksXV23Q6KE)!;Q^M1bGCh`ut?a?md7- zfq+3Q?0cvsBsZKarx)V-Id%Jr6-{3Sy8IO_mga*13T$c6Qk{xct`5y3yG96Fw=1k( zCzEg_VGFS`9()N@xgJ#Fjv^h)p^g*Sm zYlb<0BUtF5M%QlSl~9_k!b{MAZQ9f?&z0rUv{#!jPBQ$CoBsqX0%97@dlz)026;DY zzZtTtcX*x_tK~gZ_1kk{=RP%p9Z^pr*tsgUJpmcgtC*)bFPC%n9aSlvpUmk;Vnt)p zRzfA0hdv1{ufCP&x{$mAkHRK$@pr#KD;<681#=_IyIeS<`$gmA{y{#q5|m1uWx}^>KU3x!qWnF$$K~Vp5^v6IsR0vhkg9knp@Ij zU$Mg8nrc}`S`R+6ulMNGVnDiRVespvlU#ogof6TwMYA*_-G5u{%1uadM@lqeDde^c z?#&dLLE-R`54}_C-lk`{Yi*fO6uT$Lvmp7BA?yRk&=8xqbVGo3EJ0!V4&QS5P;b;Nz>N~KA zx_}UY>|UU40M;Tj6rcbYKq9d+{5ts3-7qyQ{|JR&L?AIe1-5;pAkp#m_SAd$w(?%{EnMwW{v4E?5*A` z&?B|=Z6X>u^Z0*rG3-5n^o2T12ltXiMqwp_Z)GN@)Epm>8(gI%&**DkgmPX_Bgen? zTl9xUL2rJD-VbuReq>N5bqRkwtYP}gG5*z0K3v<-E~b$qx2rE8-)z6Plbw5*zqQh& z9bUvoEDp;g6AA`WBSQs8QXvfJ*bQJLrjawA$$jj<-++^5)4CNaRy0XIyrN~g`SVRb zXf-wdZS`)7!!>m|EfeXUr>PJ8b52D98g3<7T@8*`O&SdHL~w9&rld>RM(L;YwTW8Ek&zBKq%XK_Gugg%6%OWa*8X>WVnyrw zkw5=2_>o^k&U$t#2h~7-SdI zP~Hb${B})3r~L4JU{v_Sh?nD3IyM!{1jtx$);Uci8+rh5J{7Bz6VyKW+M5+1u%P2=i*1cC$PHr z`(Wjsw=Zsugw}$%MGs^d!MT(#=PG1UrD};zZ>WEc?3li!kM}Je|FQ7pzyC>X8?|E6d` z6F57aS-pbt?rRe@BPIft8d`UkM4u3*E6uZA#73FAzV(LnYsT-!Hpa=g(_4>TpA} zv*2)(>XFteGsCw~n2PIEnHV|LI}7|rl~k%-YV#01N6!53c3|6n@w|3+@~5~xK+{HE zg`jC`WCe3UHPt^dF)dSgHEFW_1Qg}^R&w%GSh#-NaRO4MC$Q+hWAcW6hVhqVF}W_F z?jO;RgTI256*m*l_r@<{8-86wu%~`tRGO6!MGOVvbh|MeT# zCALQAY5oLnS^#oMUMiEh$}Wwz6jw1(GWa517dN9Yb({k8!ZLx^Y1Rb)x;Em8WM%!v ztTt+}r#w(lG%w+GaWkKE`s7P6(jjhi-o5y~C8zStFadkm<+A#$_6aSy@fo}?ZYH|j zKXI^YzJ>Qcd%UyZfB?Qrqu2K@Mz4$JNtjRaz2DamE?Pg=+#Irx{?BJ_l#tK;vF6_T zvB9GshW+4uaO`#(>ZgmJ#7;8yJM6xC5;v1e?*yjb*N~<9$68Al#Y~~7Iw1i5g^Zyz z%|i#O9Kv*QncTl&b~WjHxz@UA`Nv>W{Lp1&`xPHWrs~VJvu3KkTmw?>BXIExb`Ogo z9`wpXIc;Fr7afg^MYsh`9{Ur-kcdVQWGfS(V-Nnh7VH{D@HW!r0rvxUBx2S9R^~7x zf}d^)()pKKN9VFn&;b7bTjR~0s%_{33=%L0;Aca~W;zOB8jp-Z!q64oNsgYvFD&~6 zndp6!E9Tx!w$0VfmLgD?gZ3}pCfx3U2YnvjFQT#6v^@Qkg!H^d75}oIqK^U0NDuru z;0eM)1yryM?OE3@wOYNTI?3|SlJJf8|F2PKJbb#=xPD>x@XXUJA6_*~hm<-qGY}v0*xl-IL6so7&e;uQHx^L4mer(1b{O@i)C}`+q}G?sd)6v>sl>j}GK4 zZkeZG4^EWA;{hkC`GCujw`&_)>nX%zVuWNt$v=3t3&n8-rO#%urBZU8)UHVdmFXzL zLb-|m$(xuQ5sk)$3PzEO-{Seu)E8cPWCn(&?1|BdeR${g@=a5ljRBkEuK5uxGJZy68(Qm0w4&jKRCyi*QJmW4+5*bGFoE5h+j!pX-uo02Su>;@R%TBC8KX6Np zpeMX~?=@t`3JT{?DVZE|$$bl>a!U(Xh-h4)M?O<`u4NW$$~zwhAO7AoWtvX-nVBiS zPCn|B#;_K+uCUGEBcf564n6;zk9M=0*V6vD=V^ilKS}BA|UvO|IY>XH-1&mkV56QzLQdHMYYOa`=J8r9AVLbW}UonaiYtZt@| zOKA+qa-b`tuM0yUqTO*sDmVl`-ZhIt5YG85=9Cv>Ze4ynpo>~P!)BLlW?bO%Lig;( zb#)XnapVNz0>~ZRtgHu2dNPZX+V53j9uyvzzGzJ_1~(i7v?q^r%&u<}(Quz$1smqK zzt+vRuIHB*V$y}lP-$Z+`Ly5SvonzqK(kUdo#Y>zXFFQ!Nzj|u3C_i@jGGq3u6dsvRL%H;|X6jlIyM`O={kI>&RCaHhEZ>VeB(t~&*V7RENGq{YCn=J7yV(Dg&@WQY=fKRs8HjT!lr@t%^pkR>d`vk# zLG_%Cq_7QBBqH$z*KlL$BCmCQ^Aa-NbAK-f)^zgR+1(vID;jTG^^KMDlAhLX1n&(r zu^rnJt2n1B4GHJ>){JXv3~t4BOjB?GIj5sg%LqH zW-g%wL?j=d%uS}#RwTOi&Gxm6n}Iy=z1=kblHIw7eyL}khJo|LrW(x_V+!rWKxinT z)Y}2%-Gn7@`HtC*Z6Xp)T;Wq?@87{M#_`3Kl(9tIDS0a9DCol0{B(dE?48}y{+`xD zm2d20*KD0d6nS)><_qvzcVZ%FH8ImU`?vuciDAfr^YQk3TA?&s9=~7~4vyG7O%mW8 znPX0cI>4lgsjR|TC`}+~CV3&oK-^4@{N@7=_SA*5K1oMvc+lc!CVcQf>SH!-BuZQt z;T3T++?StouwQ><809nCFM^8u_WNhI!jU+7^(U0WIh?b}>p6zQB zwergT6Bo}qBuzHKAxT<~zqGgaku{5!du6yVIU+Yq1x>C&SzhHEAt@SROeqZ8=GRykFB$@k>5eH)h}!i4DEOSV6>yPde0S>0Lu zdNpRY(lIbSk+sMe)i6_5n&K{bmIM_TC2=!3^WF6c_L@gN?MG6oY8Hhm(#a&n_;vXb z$Pq<2AUuz>h6nk&YL?cZT$V~avnM}&mfjqop?A=^*AS^@78q23Y(<4j*#2n>8%3c6 zN;m@2$)IL-*QVvE?4hQQ!!glw$t+xzK*2(&BD8fx$RSyl0%(SOu~A~W1pPY;l|69x zOau6QEw3FlkkIjP{MQX?3Nu%tEDXaB*G+aUQCd^WEQb} zduM41Dy`s&V(%zAXJj5dlk>>no}7ug6LMlR%mUA@z8UH076Ccsn+7U>9P=Mp6n+DVe91Q+owE4) z^O`ghBd_=4_eHH_;*C`_KDviZnyI2SJWrDVctgtYkWxRTn3m^*DZ6n*WlYdf+Dy84 z&bGFTX}ta9nqx3N7I)5a_7h|#2=)`vUc(lA*0TH-+{>!1vsXwuv}u3DEH7n)u0h4{ zK*~5mDmJ_!Y9^zivs<^S=V^Kdf7%pXI+IJT9VnJmlg6S3gK)DQ zJ5AiojRG}}iI18_=j=txY*&MGx$Sy#bIS+WuR3SFTzu9=Eg{5bJ%;)!9YDNYz#8(r z3dtm_kV)y3qo|Ne#}g4_&Jr}ktq{ivv33Y&p@>F~y#njq_=C`7M~A59=YI9wa&`TQ z$tkm9d@5#`i5sQN4B{;)pR2A09}$gADDM^`^uBpD=DYU>*Q>N%9lz*Y#=@8^nTX3L z^)q8S7dcr1o13nj-Pl@BK{&+xlJt@JE9uH{yh`&Wc!gs$r0^PL1%uaDO!uotA_;Q7 zAJZplCLQNM^8xV87WQsGRXN@*RyQ+k$lDmrsKYrG8kY0VxDL)k%>Q`8j zd5upWk_XZZ85%^VMa|^c3)_XO>+^&7UChJ^d^bOUk+3q8QH<&e2ukbsrm|sD(1C@h z8PNbuNF&zGUb%1!L$22QTKvrifCNKr?2EZtz0OzPO+g6B)#<5_wLd&K;+H!#5q_4# zIn1(%L{5Y{IhV*5@=R{_ALL;F>;>eHW3#<*_`KS>*xP6(9LmX^1BP*%QDX|KYD*NMZ=QkKi|#H#_8f~UL2PxKa7k_JeM*~ z`7+s(o51qhH3_O7M7t62hFy;oON?<!hRJF2Os%CWtB z&Ov(rdt2%zz_si~BhJ@b4yMAo9RP1I`0E>OnEPQKz%@N`upjEcyzk~#7S;7LxZ)6@ zbS{dqM!6OveQA42d8m8z+=U@3AQeG+E|eeL)!+9X=>A3rE=Q}KM#o+*2-Y<0K7$9} zc|G)bEo-m?-Sx+>oYw!Z>*1u`6gM=>EMaj`ZGWlO_IXG&ZP(p!baCS_4=(IC!m3ws za2~$_KAX)WSFM}hHTlFGIdau(Wc)v;?-@H;0doPCM{H#moZ=`pNNzSs2N}izoYaNq zBFTiZ_f8nqn{I<1uH^v~)C2GoHEim|+u+?`8$09V2j1xLMoH57(?r(qOPX<2%KrJa zRAuC}&ui}ZyY57rtQw1sHrbLj*W$2JJ;fKT&2qzwDcl{fG=|BFd1@TeVz2+~?*0>Z zs7GCRMXj2JGO~iL2IcRBY{r%+n$H2e=*1rf&1OzHIzPXbr5qBU93*1x?8^#__HM(9 zTGk9{7ol!5B~&v_lhD+6yiq~9_Y?3cYpKen7vBdr;$U@H`^ zw;6++Qm9YEzzmZ$T+mOe6LVNtQKQ+>=Sq>yY=)9$rfU&t(yCltfn_^PyzNhyIQu`Z zz@P8B@o03@+KE58C~mm%)QjTnE|B1Rj{+djUn%dS4g~-Lz4s^p0-dsna{NtR!=_{p zAN^|yRQDf->(=o2p>bAo9_<1kM-bn^vi4WyHK|51qagt`}Mi4wK!3)fY_=G8(C zwia6a&%XaClsrF06Xj60bwDY9`3v&@>*{sh&2VdivJX&&2jJ_~tSTHriLz?ICxB?c zvfiQOZa%tU%c+_?BL48U5oON@k8XnaP5>!_dm9v30Qh}X3Lqjw${3Px?FWx;fFRFP zH5mj^EeB8o3HcKE&IoGp907q=oCQyd>HOqQ1k-o@c=F| zB&?}5tDr6iR7D68s=$3)PsvqAp7_;v4LkbHj~ty-tBGF(y7VoO>+mAvPhIv_HF4j{ zxv==rAsMPU{asRQsl|Ehjg((G^G;A4ez^>1*APpo{P^Po>*wyiE^IEBY&ZEZb(TSseh{P#@nHRhwUhQ652{<#VgHJn?SPK{Myu@&VnG3`G&o<& zUQq6R;OI8xjw7(*-oZNb;D2A)fBlH6Rq-oodIPdu<=Y-(lk9pMMwbJRkOfGPegL-H z%kPITYb{Ty+}VamfxEx5qyLHfp)0W6s`(A*P$yeDj|WTO1&MB^J#e0Zlzj_BRH*Q4 zzOujd^Xh1DD`%<4=pb=5-s}<#mausJK|50ebO*HuAN&H?{f0Pq2(ZZk66ucq%U@7m z#Iv#&UIYmtLPVa#a9^m3x$<7G*@VPo?gKGHJZ0~9Sxvcq@;>Mc$T{<*9CM!Zn+UmT z%hl5&9x&z5C-}n0VNi#8%AqL;HFKL-A^)5csQ$|inG zZGgC_szR5Xe3lM(#sau4;n&wpKDRArQvUo1s4hcf$oWgVM#l(1t?|H!Ik$NgXa%XmE%vp zOT$ap^T!uv9{IbYm#T`?1<(-`kK?NqX}z0?<={-H1ZqnAYjDD?C7w)6+|ytEnyQe5 ze3euhZ*>ic9K`V@3WVbN2Ao5~WM$+78$nCBwFfbG-%xd^!`#YwCr1De=ws%VFP3T+ z`4C@6A7cNja1U6^QC>T`2OLhR+W}4WF<3G%25Q*`GzOBVBnQ1U*`229^>}Eo@k3Hg z52UPRDX)Fc3=8jUFy$9|pe$&5^Hu9+h3OAXes%oc$F_`IHNR)hpz6&BMwE*lKe}NP z(F_*acqrJQc|9K>TRFx3I1KR+8C0$x>_SA@9 zBcpucDHz|iRCLpMT22F<&05_#F`@j!KR_3T$bg|Z z0ZNRDT6o!$>R!dIKqS1jPOIf)oW=4^PlWM8Y51_HJo_ko<>V9ac@FUu?Cu%(s*b>I z=k_N+``BdgGt~qx*SP@Br&-3EQ-1sR@c1FJa{OPxxUOc*DEA(IWLrP^9o5?9ThT!u z(B@qgO;HP>^RdRLy;=%a2YmoIqP1k@cobX|DuzLy{)#F>Tv4O(k@7BtC9lM;Ly7TqveH5s%0pF9o5>IJ{u%Q~}7UxD<63jrO}`-Z*`6JL`jo&86ifxE%t z2(@m0=WKM2n10{n7sr1wHakM8%i&DWllhgmLUEaT#;3Ylm@00wr4xV^kUI`N873=7 z?u4rL58d&#)B3+St{PChD{2@nnpdAlkrL)kd20TYGZ43viumf$eH(|#u(pJQ{hz!F z-#+ZySDgHK0-<(*tWvpfC*lzy+5V+}Ke~Uz8lp1tI?Ty$54{Wy@876P!nXq8``UCs z61Eu(h8>CsI)m{FpoKm561>4MSvmf-8_rdp-z4woU-B{x(8fU5$J;ThGi74ge5)cU zAN~&*(IG12X8z&I{^%>v=RJ`X6Fd~DM|b|7)x8^wSR~R@C@fr2OVm zn8`@sSWp*>WV1=HK`DL@{y$7sap|1>SHB1Q++EKe%>n`%#HT~?NhrVuHJ0*FjxeNV z=y#PP=l2$sJD)wOBA}h3N&hyv1)7rkhoAsLEhkK^h6t53pvDrYnL!tn@Cs*;jGLj! zmQyuRp6mYTzzO(9y`ZM(Jh$zHg3&IQ?HWlv-)IuomW(~EJYkzWd$63VNbK#-t z-#eQs$C>5{^EvlJFrQ!X6Hw=%{Fok)>M!+%3X9-sr$B_n%f`IJ3&!B z|7WU$Aee)Z$^*c=T0IYX)pfPiBB$y?*`efrc64srshenChTT6`g+R&!q&uhuHSAftlOlc+?vg~~wdKTkL4Xn9$olgDN(#WFYKcfYB>Y2q z5iG*f&cfb?)N$&TZ!e*8`Uh2a!!HKvFQA4-{4xj75KswA&5?i#YH~)o_!lr2k3f7g|1N zO1bwGz0geO#A@dLa2_xuhSFH{VBbYv2;L$*>W8|BaH`Et&nirKd? zL{+fSd#>zn`J=k;*q{q&7Z)j=?l2%M54s?~4hq^ZPkHWpk6+b)>UEH? zQw6O@+a5(kf;lg3^9yv|F2Xmw^cuXw!W*FSu4RGttp@(E5AW`m-%z(N|B40rft2rv z&3{1qsQKi8Gy@!~BR%mpW`OGNA(Iik&&_{=0U72Y z75t??slDJ=t^yfoJ|beqfDyhxq|HQ=cuJ%OGS1MMbmZH^kA|8-m{;%0{uf_>b462q zlWL$(bXJ9!`z2(In?_WBIR}f#x1yrhqZuqW{S^z5&=s210-aA$8RfdM-d5!!bG=O) zhk4487e0DmaG)!zb3F}}X<@zxs7xzrJU5bPs>$6ZL9jKi)B!7TK0lDS7j{~m>1`jC zWw@QP_ctFt2uMOF1Rr1M0g@26!kt{G4x2YX1O&2HG?hfEBcraaPWLt~46$I2ehO;K zp^rms?@SL)THlHq+KoDxGMeLV%>b;*@QNRg^}tS;p@JNT zWkk9WV{(B6+tz{|4&YU|Jd?XMQ@{Kqhp^V{^jnZPO1-erNm_qi?8t(L5|8ZbgmNMPE)jDVSSWA=#A;iEb=!%_(2p+1q+1 zt|JY`w;Q&G+JQG`BYaD0RR5m!JqYK$*C3nYdS&}! z4*+C`$Z*N@vHiOjd!dny@s_@hmqOOO2j^0@WK#L_mfpDwLsXQHeQ0YhFtRb$qKyVu zAugHPUMx=n9BCpV$JSgJW3$MmU_6->Q_6RDKnI7( z%Hs$AhwHmf>jg(PmL$AMR_n%$n{)~xlU^OKbLZDmmC9!sEktGSE_E&O1#<@{6I|S$ z?^e2%W=2`s4ZR#91NzC?`|f(>K`02Yy9bxEbRnLs;qIizCN%V!hRD%dyYoxOhg^OHZB7#}0wR;%Fj!+{kw7!_gl8x1nkB)x$= z8=^$Bpiik<%>IqTWaZGgGw0v+`44XI@3;Wu?_pQ21rg}ZX($I8W!w>L=nVm1xe5qr z17+%}eLbibv6iRdq^Y$l?%Ah)DEx{Vj*7NU7hNv$xSMX_Mw^t@0XD-x&aV!DoFSfy z%`gC#gl+shwLiWUH6RszE}4W~5-^`&Dq;?ck<9>LpsL(`d@slu;whDzGH}(Q@7dY^ z!`|NDMt=3l9gFD%b%hFLY&Pm8JsX#im=9gp+dRLPr5yR!J2dn6s~7g*bn~vf6_09U ziggo_H3e~3$z(1-ChDL!^XEcuhIoTa)PZxqe6A|Sx1xriY8x|eq=E$8EQGcMph3K* zZ5Gb%ZC)^~ zHQYvdZQD~<_8;2RbB!#`j=sFEH4+>jIXv>Kk^IQ_M;;!%VEWsmpPl~v^v9;JpO&Wi zX~XpC)00!HQ$L;h=2UO$BU7!Z>!zGjx~Uyg>n2~Ce0K8D$$KYno~%s9Ce4%QO>Ua_ z!^H84?=9Ri|K>sk++M!~ojQZJ$3j@ptS0vi_y@&#r%T;r#i#*B=?B*WWT4Ute7x zUr(<;fBoX@pJsnOe`xmUkvC_*G<(nNO|ymB(CiiSrrCY78)kkt^NX3MW*(Zkd*;yS z=9$clZ{(8;@zLjIE}c1RW_J3&rhh*1-ihplf8tX6#90&TN8UI8!uac>=a2kq{9hK1 zj6X5{`SFj9Uq7B4XUFy9d(=@GpBP&i`|;Q}#*U7Cc&s({?)mSJImdKkI~HDAcy?@b z;VX*w_6=K?>h^>=fV(3VT*sONj2RDKxozx{QA?d_VZKZSK*0k>+!+u!h$Y8Vawfv# zg|N-Y(4~Mog6)0}qWc|%I$0y?E{catI-A5jhv+7Eq=9+eCR3x4*WosSKOc!V;i*zf z#Fipr6N^UuiH!zLe$B1NT{bb}4(mHXvv|cEqVp`0-P z{FftkKdq@`qL3@rNUyV-42z31 zsJS%=QHoO4$F=n>eWsjV-_z)1Fo+q%Y!lBz{fk%xzt6! zJwcD#aEDZPidmg5ZkF6PY4lQNV%Qx(08OBp0hS2b2Yz5!)1J4tpIw<0kE!qB}wv_p*=(@3y+5T}<~Q)SiyH ztVDV#ozhn=oK=@hV-AfG@>{S-xn0X81i_y)?Y$E{mu5Opt(Q%3VH0IZXBq9iXnRls z+=_^<6HUg=rNlvPzGxfg0U&0bhm$h3pi8z@HSsok3A6bqC!W=H^-HFtUt9FFspH0- zg+?n;q@6|DII$D`!Q3{pSTyMKks)_g@Z`7r*VeI%V6!j>WJ<~y-TFu+Xtnxp&{})C zG+_*MnRL?;5Ui<-bg1`cvmxWR#X}~m+1#k$OdFAxOr01<7&|gxhSy{1{CPh`VoZLB zmCIKPgga3c4KCSzEu#CgB7?bg@l?!L=wvGTac#2v3405R`CXKuA?DM``*=ep zQynVT3|5;-0Xyg28a-xk5V3Z0$;v$ApNQLVkH7QwnqF5uxxv_Z@-=FuQ~J08j3kz@LTlq`ieeGEzQ3XG#^5~H4^ zw-fS-bO{OZMp_L#B0zzdWGZANP1CzIIvcJL=~~InRc!fc4LhiH-b?G28h9b;bkH@7 ztp>@har6gIz}F_Ij-52SO}2Cj{a#D{><^&+^Eq!+EJn&1en~FbOF82YwDy2aLKfRthDo=h zWB@6AOeBjH4v#vSd>C6C|JO7JZ#AXNEfIlrc+T zA2~q|Iim*J;3a%+b1=8LvwdtyJ@&Xp5XYOTpuN+|N>xTaTl*5ZJm)16k*qnW6M1hY zvEc&rSWc8ISfgXbJ-JRYz*DE)pvjK`_E()2!fdUH`LV^XXw3uqE@l;c`f!wJdm{PG z|E@J>vgsv<4Yc)SSm2v_`e#~udlbW}GHr`=Y%R=1E#9WlEkO#;lMYYF-OQ&#NxgR3 za(J>%q-e^KH0Ai3(XtISXC)_#)oM`9Jyr*IVS1M~>u%hYB?}!_(uNDRrD8UP??e4@ z>-23r&Adb0+VvdqYeh&}rM8Qp&WXHHW}@ z(p~DL+`c4kt7Yf^O{4qVA*?`jvQ-yT2sH9rF_jMcFGE21h>Z=~a*hnebTc*v{lV3( z=P;|Toy8rUiX&&(_D78_r5aeMR47IAO^4lSwEbD53poMLd%ESKJ#7ue();45pDrWc zGMF5sJ7P+k&GO9Mi0qV-)lP6JLBXA_6^cr`qezT1>NXQW94j_+;3ujJvp>}6-nNcp zED5feE@bq!+{OQ^(cQH;?x;|PsH2&(S`!yEHM+%I##|Xo5G(r)tyE^G2R+x(sW&mw zP%SwV_NcUEI{oLUy`vGXk~v$**UXtAuMD%>HG17^$7+>8#ww?*tpc^h>zsror2- zaLG+$kz{IQ8vVhG;~w1JjPqPH%av{E@K!{(XS^iQ@YNx!4+78xGW6^D??Zgy)GkMz zhhfKTLZxC05ng@G7`g`ig>$xAqzgBD89;DJCk-JI(cPpgf$0J3UvI0|vMDTh)w*>H zo0W?H&-m85U7t>3DY+5kLUu755*)P!$e4iVY^{U!lq1rntdS~OvrfOk_vFG6Wz&y; zvx~0#`H(4`EU`h0-V4C5zRzi$c0jNn4$v$PsD78j@o)^$ZJlP0WG!N-#Tv^NPKHR% z$|Z$&-}UVH{>~mG@MjA-fSV2>!gdg*%4?O z(ADb>46a^7Eae#c^Yai;;O{WFP=Z@h&4WW1(@w!vD|8t)gRwz(v;)9}>V5K&OM8p+ zYgx*%$00~;kQ=o9GPq9eOu@Yi896zhCz{2RS*jkxJDzAlx%d3u7KPG-jI}J~#*0_Z z?cb>HLB&e%%3B$5zN*O^$C!ke^M@d*FAnICYA>!m*jwB<%!6t^--cwy-mxA1Zyr>y z*$_vn=D?w=q+o3|MKPkoYo4}|whKtmEtkWn46&5s;;rEFefa*J{Z}tnN5!|ICc+^x z@k-1lV@#)(^Osw0LrFRGEJSepiUKi1ETwW=a^S7q)wh^H3|ws0JUAq#AUmWK0BTkX zb+fY;gV-*3udT{PBNzsUc*>#Tm-Z=VelovXdCx6ZyOitxNS>#h`PmmXD8DuKzO(B( zkco`z`9Ov;z?l(snvKPH2O_lxGOxQBWDfCAr1l`J_?s7lX=rn9-MkKZ8saHOp1(rNg|oZV@!?mXh>!O1 zhU;OUAM+*yt+=Dns5t@1RDH8sS&%ctQ(k-NEG<6d6;^#Sc16vqLsl+VfH#1yYOxyB z6!Kt_L~>*T-fWl$^92#(4-vh{iO2*1>ipRF;{z}ZZdx9FQ3LAS4W8&0%mEs_nlH?R zI~njj7)85eP<(RlH06z8Z+?C)2Y`ouKCm~P*7t{C;PymU)GRQR1wvM`U4rQPLoHJ& zQqcP$Rdj$BdG;ZSFcw38R{NYPTW;B}WP ztBsq*2k$$~gVaC3TK#huG6+BGQ#<5cQ8VJu%5ss7riqNne z*Z^r1P3=;m09lavcyIswTB>s7zLKl|a=Ztrbm9uY$7wcUg5)}OT+ng4qS-|Uc)jAg z2CSmPWMs7d;Wc0r-ek#!@H|mZw>x>SRHzZ8V!RgqGE7$Xe&=P#fw{K#;K&Xr9-fOu zIEc72LoMyN>cE7!z*t8){yEqI@4T+J5rET9)dbvW*PVc4bSHWn0f!Ut?6VBGk7I4{ z4+GAk4OfxtkffWT$+lBBQEuCDeHehYH$V-etCGDQ1(tXa)l%km&i zxkl>kINP9qTSLkZ~5IG6nYjE7E^3L6I zDxPv|Xa_^JK4WgEqeG4rXqxvPPoPQ zWMQBHHm?&K0ABDJ0MhIXaN&aB5kJy}O(B}?ZHC&5r)UEH_5CNE(VFvq_lbUaA~Ag& zw3k=`%BuzAfQOkTAOZjiCBm0?HvV>mzf(8u-}W;Lj2T21%qSa*z1i&mrwaH*ZI3k% z3nbKmBI|j`r-LxeVsHPJQ!$n6es`jO${$O;ffpLV&^-(#s@9KP`j!{kyP_t&p>LD+ z_=7P*f-4KeHit|VI6S)WRSl7q=Qatj->3!9cf6-Jh@QUzzDuMW1>&w^Jk#iKE;3XN zcA)x*I+DlRu)PkkAlZ0)kbSac7Hv{LESN#D<+x9vrMScO*5RBM{+i{K+X_P*=yaU`GSir zb-U+Q)J!yVI=4*@v4LZHXQp26I@nGU$+@Zla)x-yrkDQ={aJ*(s3Q$^c=(m>$vr)j z3R}DJgj=$A^`Qi8>Vwz1`Fc2=*Rm9!@Kwzf@$&Vm%aZrR;uVrlhr4#zcL)jG80v^z za|85Xh^JKU?}No(#Vh^B4KO0AmsrgUL>iWv2^tN!-H!9lV$>l4z}i62KZIc?ALhZ> zUVUZ%Km>$nj%Y!3M5}mWs-8Uyxla8}52e*gYTnf;cm!HU0&8g1u(V6E2voBZwZmbd z_EkCzeI4Q{$9{SZ96I;iwY&e_!vpW`s+t;yy6WqSUYZaatw=L$HD}A9o2qg?a4X0e z;tg=vPNuH!=)ZC+2;0rAs_AiPDcJL5(#tZkm*#vO`0 zLvVcUQZwVwi|Jfoxg%*c43cS_yB06LpZv`%bSNfAD!VwOB3cS+Z)wgoSSbL6jV_7GUOLVsG zWwm+z@TWlP5KlRND>!lorI=Pfbwc36r`5oTRW*4Gt=v!z%B>KhuNl{Q2ykKy26a(+ z_oqSN5Knn+>)*Z=3%uC>`lov%aQfCp_AAFf(>nvy;8iu545?v;T*FLZvY$2RqMiyQ zjiLp3=}jPah^JO#(A3~h-lQ%-ZgoMOu|blPubXI>aJQjqtCIC#5h70q3;F-t(c3b= zmZe6Ys!G_-{x9wTy=YT6;DK~iDaVwX;0mDv+CTX_VX}vL%4<(Oe?WQu*nK_! z*O`hpWy5o|d^BmnZEX>>c=h`^LxDdJ^OW13C_)s)c@J#q-=L^F1G72@{YQnUz^3Ui z6P;4A?y5q;9w_=f5VZPn&?1L;YSC{Lm(XYKh9##32aiGK)EqhMnU=?ojf_qH&FC)` zxY)h2=Wuj&D?A2i&s-2z2)ytlR!6cSZlcBjDTL&9ACi zbZEu`cB?0pbk$P@dj`j$ii4`noq_2n!p~~8`08Wqd5N*jhVtQ5Jj=lKXvFT6M6tMKmT3o5B!cQt6 zd8D@-EXFrv?f{bxHDVZhPi!_;4Z zoPgq6F2Kb0wba$PRr%sqdz-eLs)cf!6g^kD_nP(RC}%v@`)gTa?Z6AGNG;j(E6b+vW)2$NMi2v~8X;cbCXr)~>q zPm_@I|NoOh_U1QxbEw2r81l!zI6%BNo`4(J?Os(AFOk8a>h&0{n9RFtqN}Kn1k`c@1Rw{m4IrKOj_~!4xDKyME_PX<6|Fho# zJ!&_*x*G%_g}RUy+Ht+XVR7Z7vNNr9<160-2}3LedlI172E})Fd|y>w_*KYi)s#B9 z<+M8pxdML5a-FGQ7`o#A$5RlMvzDbi_aZ>wLGjrgefxJ+F}_tb_Yxh~Hj1%T3Bln^ zrYb?A6(^CHzj+$;s9~NOwSPtbm8aEE8sF+^CuJns-Gm*l)^k#Yj^;{53CU0%2R&+t zhl)E76!bS9M}66GQVv7vvPL{v^he9Mm?#nhIr|od$WRyg`9W0Au72o#5OL-#AVuFb zx@FzM%L~sfd}ZOt!YvDx(F+&iV;3yY3+IEOez(v*Z3)6?Mz7xR`ICV(Xsk zuc9cLK@82i=4^8p&23%(zw2LI|Bvgxy#CYc-@m@JKC=GG^#|5(oc;am^RrLQJ~aFB z*&Amwv%Xo=?B3bgng5#k`OLRx9+Ub>i^aEp`9erl(Lu0kEt6_kYbM77cHx$Yd6LQTiW{Xj_ zqCL|zyK_IPiOEo*G{aY-NkP>!laYTxWX@eSmuen| z5O;Mej3M%&En^pqT4G|&K{%RS$|z-ZL?k_MV8rB7ynKS6Xpl!c%iCYUhfoI$QB`HYC3$yi)OE?Q|OYmT@JoJ=oi^fYe8 zE%8Q>?FRHkmU3T>UMi#K%H5@oP_vqRJa5FWdM|1(SL;>MPqcW^YN0WXJfO*!i-rc) zv8MvLWXqDx<}P_rYad`5gg@nK@$I0iLzuAJwL$ZxT{>Nm7F}YqQqvYWFN;LoVy*=xPn_2!Ee8hlrI=JT+c87L zNSiDUso_eTc@dH$C42_LTP=(JL_O~&xJ!^6iGu>J2}7$lY~M;c_k zna3?U#^%LCb0TOuuALhqYQ`eTiP1&q-is9Q*E`8euM(oGnN zG93=NF%kf&ggF#b5=&B432Rn#yfe@sO(JeY(F?I8?q&&R4T`zNlBsUqbomh^M{Lkt z+>J*$S6i~maq+VK1Nu@-EQbnsqC|sbH!VQ$(N^TKj)@r>(gl*vjz1g@7!s+)t2IFh zvw@69EBZVZ<8paw)4ynRhqX#}?e%&!=g4&nxcP6_?fTMdinpyr8^ zM~9*jf|@mSnwgRJ%x+l86L&2@68_O?rLvSlL-T^x6YT=r%-wf|xyC{}Lgp>jIk z%(aM&-=01FR*haF%0#A33$B(k!I9#nPK{oG!kIaY@v(XrPjY(4cQtxOEMd7+#6&P@ zYsMpQ(8edGkLvN3eo60xYUF`XU0f(=e;_C)(FG@Fs^m?Ak7)eIh#u{b6{3>J7&=6x zUDJz;-_+>oN{t|bKB$FE+f(JdP3vehVe;b9rX}lfg@R>{yinUuqD-}g!53qYERiC) zB<8)-njo74e1|m>+_soo7Lyl_B6=h#<0RXz5uHf4$XIhbKZPbf!h^#}*LD_~LWwq- zTwO#Cmt$l`EV6>FlC$RWQ_~umv1Su|AOMcIuACG%XtTZ)cFM&-sD}Hqwsz2yg@|Y`dW|u|man2NhGam%N_rA8he28f zOE)Y6U;wEhtFaIk5lJzW3{Xo2xk3o?wvQl2Fptv!wwO&69p#)iX|!sqA(({<;8vUx zjGdI+m2=yFskIj^5uzT4s+h7dln;^mdo;R}YvU2WodiEWMt4n)J2g7h@L-|1xdAg^ zwN>O@ODIk+7U(vm8YdLY#Y7!K4M-Hn7z;#=1m@8@cu&>ip<2fCzlY=md{zn%L!7BA zD)B+9G{tFjYbK9*8X2f$$JWG-@v_IzaQcg4sUSAoZqe8_;sT~ktv|68>5v|_WuP)m zoV4YM|3q^9AstUp3B73WI@~RRoSD<;zK}%3Xi--x)eKO~+#+anwwNYrk(@DL^wZAehUNfE03#Zf*N8Pa$7gD%6c+qLej?8iO?INVnOa&AAI1YXqlW zM=#*(L|MMZaII>oiMix6Z${01`BDaJwJYV4S*Ht&`VHEG@Hrz!tf;e?O*SFvPvl4U zA~D`pIE~SKoHVB}Tbet7}Y+OMrgVep{GdLdR5*N2%% zwbF3cBPph((d}FY7s`>ezfu;OLf*AequUI5!j+L~@wUawB=h{)8r`x~DdTB#H{^=> z^q44^wDI>+tRJ)C3?LqPot$1g_ipqDPfHE%!niomHZ#S7ab~YZ&)Yj>F{}@UEs>^0 z&R+Zljqa}52?G?HuyUL~-Ig!cb{~&PA0@0IF}H;2g?!qQCA5X*!P_k1fcVa?Sjy;q zl>K2Oh;R5?c)}F12%c)tL8bS+SEHBhNdj{VUbCkq$XUJTdNgo+G7sT;wRF%PWTkq3 z-FLL+f=(n-RZ0x={!mOZT)d>c81HjC0qiK%mKrf%vTR)c2kj4R0Iqjt!r3hmd^(>x z>&KdWI)wR~HHy}C!%<6Sz4l@AI3LD3Il`Ee*f85pdlrxwi0w;}l|rDKcSSl5Gr14N z!N$0yq2fM<%d|h#Tw%=S%GGTwfOeJ*)OXNxxnx;(g3TRISo6kK0@v0*$Jl+ii`MbU z3|)y?aHOOyZL!850ZlWxE#ihC{+~nD;4uzh^*gBw1@lL4( zk4ROT;@+2#Ahw{35Uqe+PP?#xt&$3!5TRZI8=u4>=7~V)0C^z1g70f^?-&;SGGC zo}EE@$WjdA`bwAx$@cC*z@QJANNp=)gnEo%+V*N7P$;`|iM=PT1#zN`VKQ5>%Uw%2 zLNS}s0~l|-Lw2}Orxt}UxsrT|He&!ZPB)^#YSfdb1Ksrghfs4@(eA|Ej-^0ZU(#3N z32O0O8bh*INw#1O=1dk>B`8dzP`jARV{Vf{sbLeF$)r1)c79%K@9_Ewqt1iX3O-X= z%ANC!Mu-04erK&?VyyP2n0EdHT0t&bvs}z|`D!##;n-dISqT+aN}vi|ho}GVeG>>p`7I(3zsz^0ROd;Nm zNu;x5mBO`F!k0FpH@oFk)fBUq2N73qfKAKsg`NFZURC{T{?)TVj^?uUmnuOl(PddW zP)M7js;zvBa{MI_BdukDb^B8TmliV%fI8g4}8@gPYQ18<@4$GiKjCqa+~qTXFMSDm-c z-ZTAODA{!mlcbc$ z^qtms`~l3}yDmN{1oLKHK0MF`Ez8K5ig^hMDZUOqiea8|=>ELsQhECI9u(m9bn}4@ zQ7>c8qML4~7(Mzk{X6*cFb`rLCe9f+g6{hr7@WYjdLeWIE$B$N=yGADY$`^RWU<;- zm*S%G>DRz^{tlKeeLBM2{@>Ts`SY$`0Ai3;u|X6HW~^YcxFb2Yk)lOp58nO;n9zoJ ziusLKHRs-MpZ?PJe)A2q7|uUAFks|{P?b=e4L4)XxRKT)VPAg}gbnc^KnqI551>hQ z{ZX~+@v8?w4)Pm&qR|M3SxXozGZM?QgD4uvA3Uy((GXABWP0radBO`Sr{{&U|_1o|*SgUp{)~s4|_MDb9pvt{nBuoIA5| zdT#pn)6Y*oHTB@sT~jwqNmHIF6McO&i5r4eED$*F&v`p)z@(}$)XT8J)OwQyizJmBUm|9b9gbDx{LRi8f-9RswplBnXHHWjvI zQYE>Q-J%2g-{6FxtxQ6|+cMP#SRub7LWWQx0_~#Q*+4kuY#FQ;zytCioneV~b^(no z-4R8+k!52oY0GDj9B0b}MVx#=fnt(wC|mc}AFZ{|$6Q3&5EMO@wAEptcD<(2Wv>G( z)+9@~s-x--)7JAfdX%#go~5oQ-4X;}DJoA@H3mo3ut+%1#t09etm;QzM09;H-o>p! z!IEXUT)~BhX9hD9{nu5!4C(>1lejxT1rd2Cm%|QtYAhKG}<1>#t2Ry z$w|7X6ci-;H_%(zc`1M!$*jbg5?$V#op_H%w~B5oN_EVwe85VC$V*Y6J#Dwzt5}LC zLj-<2Rxy}pbf=*02A!2){3VB^lLs?jj1waMvV9lg2K^{7j?Q-C3+% zB-_Pc%U;Q*CbJq{%yuxIwHhGJ+)*>hm&MSF*&@*h0npkVN24Us`8lW7Ji-(EbqZid1{P`}q?Z#{Q0TeVND`6-D;+=QEb?J-Y^O%Hi79iw)G0WO zrLs$Z5qc}yk}G1FP}48kgs8)8I1PR5v?bvIGb^qSh9dE}ktDb2mXH`rlyq9fPM1kl z1R)~tN9Gk8G~o~!409e&#MmxpDWtU07P~}{E}z2}m&uCk64rkX^_{L+bhr`lDDyRM zI~K@nMMhSdt`u{afo(O5COee&63<9!?bFPX1>?PR#h#6HahHBBsxgF^gx8Hiyqj}+ zGklW%g+>p!8+bk$NqT%ucRMIv@jldj+GimmInI%kJ0;4M+>l3PbCRLbX}6xq=2K?S zn31iPHYZ3gCX{?8i#4)jX?R9&MAFSseS@$ROm4_7O@XOQf4@d|C(UHBS?0oW&RVb$ zi@P-Oc2^~t4zblvJmY94=CzH@tZ!v;uQim@VTF_!6|gQ6V=8)#WFRcC`ijRCZWDX& z0=oMBo5En6$yL}&)1vc)OycPu(*6+i8F9vzB*R`QMR(<$$Yw`Vt&*KAhiF|>^mhb2 zeb!Z|J!Pr-FlVVFv$>8v5*0Rl67`cZM?*xFZ@U{*Lbe6m$b3Lk#$*^@@`|m7o6vb| ze0ECP*o?s>f$N6k0 zN@ChhVrXL}tV=db?rtfHIWcENlM}>k7$hXttCBv}Vbif+=vZ+K}yrc4eRpOuZAKL*_&}>>>^# z6CzFGG!slqW!lpA_&CC>+o`m_8k4)zbz;D8WXORNE<-OB6AAE0S)|+d_bTSnJk{g1;jPE0I2vOzzjtAR^lZAQU%NV+BXal+K?$ueG>hVWutTkGSAb5B~c}rSiIGhe1*K6%I`tB{50ORFnX&PsWN0TW6E6lXViPV zY{>G-m?>%swC!DTmv*4zve$swpn9_@5 zH&QLA%-Sv2@{vms-JSR6Fs{~$$9a<_EoQ^oY}z`m0On{eh0B#jJ;8;NVQr+W2?@j6 z5u3Z}w^nVHRCpE%^5m>eykjoX4QCddor!Vn_!ta!T#Tf z&gTG#8|%mbR>W0POKfsV(@ObtEKD?VtvHf(uF(&fo}*r-?Dt7*?{(JA9g*^*4cw&DqTusvTyYl#hr zjM=4Y6beC~lg!K^{|wFQt3kpo+eDt`D~vI9RTDLLx4C+{QqN=!#dx)l_iFRvE*T^& z#L{{QpDN@<>Iw{Xe{H?gB}y;^G&y*M}L%0i`auW*A<`)M_ zIE+6NfJAh>mG;KK>7CUZN0EJtW?VuRvsHpde<&$aY4HqgVKFur=t60akEm97%AMJA zOnZRIktegoyrl-C?{a1M0~(!*q%m-;rt;vmwBgw0+I%s%D~gAjAsWI6YQ?ZlI1Tyv zX{Uw3$Ur27IT=y5ONlXL$pJ2m%_iT zJm)#GWAJ^`)@VCVaAnGy%vii&XY_v={fX*SEm#rvke<4kGdA_Urv}!zbuX(Wg2`EK zS{i+7@`iOUkKd<;Wj=TM;j32-Co9s_WVXr>0IOlFCX9LTdMU)n^8SS(GD7ni;MgyZ zEJGM$A)2LiSkXzcUD6(s!wF^c*fM}j4v`hrLZLkL<&hozo5q#_W<9cMgu=fQgTUEZ zT;S|-q@F8aY}i@JDz~1#yhHicc%CfA`dKbYzoDU&#aruYrh_4M zDl{yLqO?@xq93#YSKjBLVtg#21m<9rhRBfW>fri6np2+#9{xhG*<#~x+0EIYY7sRL ze;A@FX8jv%|10y$4lrklt11kvhMbl5;D8%o8k~zO?hJafBX}` z2hF27=hm&`=HnXWl8@mSbfu7j}Q0zBvTZY6UYlw(D;t)gVA~}d1b^vwPVwjWEhuO1TK;Qw zid(yumEEBSFM|5Ydg%IA%i0eDzLg7hFYiCqXVU+u{9y$mFHc{F0>w5RpJil7e1qh- z5R~}}1Lh_Ks={}+f9olkYMd&jl)w9-cm2P>`qfCwjW@5Gx6M^%KQsOP$v2_6<<*b) zZ>kQmA+9_b*(l&fDQS<3CCTS#HldKmU-m<%*HYCQ9s>;e9sSC=%TRxkSv?2>QUlcW zyoZ(&Boz!t5^YCAFesPoTi&YNyLTCY-`B8|Bj*4hG89nS0%&6(1p@T1fR71TRO1G^ z1lyy8n^QEC3dM0%%>IQTvhv#WWrNhu?frZAEkjTvx2oa*BN2`qUP%(ha4l7j@uhfx z9Q0%_W;9aN+iC$=hTAE}7XM)Cf9>LBH3!$bdKm~r=2;iGbn7@>q9iPW3t6wE{L=yG z(-2wN>s$r*$4%1qzV*Ci2+ihKRh(aBOl7&C!Hk97p_n5bqJn_a`<@Gz_bm*Om1Ed5 z`vCcDd;gUS)q(M@szAf26RgYRWN`r7F>|FN%QPvacRqAthztV*6_229$BzDK7pOC2 zTvfq>ErUHgn4^6hmS#c*V@1lwO3J2NHZLlF8DCyp7-FfZ>id=7Ryy02rSH<0D(~L) z8C1mbOk#OlDNQc#(y|F;los{=0m|zJ$gew5F^peTL0-|z8`B=62ZvionE_<_EF`sc zFNdxVk=1-QwKUSU{>zuc9=p>H|3{u0d$rp3;=!aj3$R|@XiGW9EN@Xt1oV4|1(=!N zf+OtgJGb|rCe+vGS8cFBkr+3{u~ugt+^Bfj?;vsI77SMSS}K%rSQxlRw)g*tsZ-!t zwVvz;9SEe$ScVnIY(}Po_LSm22q)Pv8P-u1O!V8kTlW_hn|2glFXq1eF}j&ASYqepM1LcSuIRWPPF@RGzfbg_o55TTUiOQBOkWXO;B zh3W>oe_Q{w%Ty8GRTc3Sz1KTzlFHR*tAjISs#I&AT@HYJ@R4atsG#~GV*{jtf1g+! zyK1DM-jhOu?a6bphj}Q4oyYaHG*Ri`!EPC?-QPKvw`_a|OD&;u*JZKoO3=0Z7nD)d zWR}l_xl|Ee(Hkdirg|GUm2#epuI6bb(~5_O?dnNp8LGps04Y!vGU~dL!S#j9lm4?WW zAp7n8%8ehmWoy50Q|TnpwAN-Gnl48+&5zL$g1fIde)Hc@0RAW~bspB4;jG&uAyn#7b=^879+E zTyB$JoyE0eR99}}We@C9-tRv#-o3!`nXunPPVP5dW0)dw0_SXAU7_trDK7+;_itE3 zRUUfvIryR?-3jHo{s*@xq2LK=%@C|F@2VeqhQ6=7xth0OsjkslhA2nTm{mS@4fJe? ztQ^vV!}OsizQ3(E_O26ab^o={Gxw^Bbc>E^x0y6aq`j5&OKu`p>L^Fdu%TYySl+xa z#8Q)b2T5dGl=nGKtkn5P~Q^x(7H7lTb`nA*QO28%*D5??-lfo<6!LamYW*gd47 zX;p*=VJKGP%UkBxav&c+wqKEB%bWU+tC#VS|Btcn0F&b?^4I35U9DC*SeETw$zkQ` z+->79Ip;hMa!>cgmy1J6?16`>ao@_on*wd-dv7*Q@%~UgnGwCO|$}n*fQVBwdZFk_p9&EF>ul zH^cCI$Z~!%oKA!2^VIEse&3V-crkkJ@Y23rvUDEWFr^!KcJdwL&-V9^?b>i?gdchU z?LWPHE99IWhBuTqfRM$b>T7W7dkl=!*D74moO|3@&IaZJJu!1SuDgL85rzTf5Mk8cSV(UJyh@joSj2| z-GvRc&)&WSDZWOieFYIYHKnc`$u}c;3R&MK3B_76!oJxL`Ndls!|hMMP5N1cZA2oN zF6Pvf+ySdONTcyP;b%Q$DAo&b4Ud2AFSVc8-_?0HymM(U#8*g=Sn?$2*?^*o6+C52fN&Q$RT{njo$&k~GCCEW znrr|1ozj77JtM%c<&5Z{>s)ATH!>F4-VI+SJ!GVO0CMYYyZxcv?Wf+obR8IHiZkI= zt?T9u7JH+dR~4E91MX(z&BL4YQrmasC9V5RVQFtyif-O8Wte=|__xO{7zq!xHrzb0 z(oaZIq>S%&fXQToB1?bdygwc((J7(j(N zl|-gsEvFrzGd>PK>mj4QYeVzx=*MAbd+0Mom=}3_xCBP0CliKZl}INODhxS42nWOW zKCv`AwYCY}7Pt)1!M^;Fk@oy2K?0}D4nY^g40SxumNa&x*xA~Gjy(V$D{C7P=%pjK z!P)xMp27BiJs=5^Hk9+l2v1&XF9fR=p^`*w3kKXnMn|^aG1q=?3l?$@c_s^sAnT); z9j^*nk)?9srjiQd=y%I-Fs!Ab=b8ZV@QqI~gKgroPh0>J_4TDe&J0nHxFZqs)!mM? zH=lCFyk4FIS9Chl-T$*-Ox|J7e<4ZX^7LXuXg^{B29KsCp8nrl$?P^z+Sg?Z-|^pY}(| zGpW^=w3;gV0#~;y9od*7luJr1=BL(DJF?oo<h755jx6mtacn6Lb<}-vyT;qJ zX?zJ=6Dkfi<8hlllt#B5TY^gO>$kR#eD0-pL8y~{obPCZ*vS+^zAP%+1;2sTxaK&=EOMhv+=C^;6_ zZGHIEpXGsUhD>oUW(T-t8xGcnMg=}NBUDs`S=W9DX8m_(SGRt4>tSI@JHd5g5XgL zW~4-OaJhNBfbRqmvU+X3!{-2V2%{A2`9&Yr?T=13lU?uU)snk$W8cb#kqx^xY}hqr z7&tLm9=~Vg!l7v2O5X~ovodHF*@D9x1%Ck(A{w(j;>eH=#D5J|xO~sj7T5-BngEey z3hLZdj_z)M`<^9L-{9!?`W}#Qx$o~oS3I<|aT8-Pajqt~3dsbfutiv8dP;b~$`!`Y&d^J z@UV$g=0hIH$H35;e*%@%Lx#xY6a?NTKDE0od=};r^rnQUChN_LP;@7CQDZc2h}VpH z97P_7&$KmEblc7Q=i84z4qm-2BLlzOFm(UGFQ;^q?}n3W_sHS?E72|cU)J}HAmz*$ zG zOy!LG%rPhq{vR+;J!Euz_RhKXUH>832+WFvb0d$R4(cL7!U1k4x|xCUpaOdFEAZ@qSFBBtq+HbIyFk3mrqVU&Xnbr`IvzDH3KlZiGsX?E4Gdx@# ze>qhRB`|d@l{OblY@9|h=$Y%sZ-6h8l_{7Td04dC>9Jz^jL{6>?>0>=fsUVs?R?XZ;Z*BsgDBbhTs!)F z228mheSK*NedQ-$$}uZaO?r8tdTT)?Vnoxgr37V^Oi*axr%MN>)>08)!RFdG{&dL! z=vYmrng!ToEa9pv8h{Xq_CE|h-EaJCX?9a@8|vepI@sR*^CfE^L?;_eB*_;7u{c+> zyBete3owv-sIqSfT!zE#@BIR9*=9r`8}Z_}+Mjd~!G?ms5&1l9)U{-E_Cw#7ToB73 zhR;i84X!Q*O}JC(OXylv){v=gJG4VZ6b-$?vwr)dK4?k*M!Wu&%*>0RwPt6MANLaISsN zzkt}C_{LIVN3a>hY#JwS_gDez5B}u`pbx+u0dQ0}F4u2G&+OWJ4s*ov&83;`nh;nf zTEHI+LRDlf0EGZ$*J<|FgGs&+da=1LOL0XD3wjOIwqn1Rx}) zty1B*WIPFXd|(TFduhkTEOnlBv3^%5H*@&hAoqS~X#`#UZ7?yco;27hUI;CPE5D4f zY1If6SPLnMEf`hnx3-Ub|I9IPrIuS``>#DWK*=z$Ypj5;B7iZaB*3t0*fLruXDrEd zr<=#?KWjc+M# zm@>kr)U#tdMs6Cqci4%AebVDYE$5W@Zlqu%;Euw!~# zj(lxmu6^_GB*jdxNHA0K7PBc!f(lcqtRkB-#Dlzu3VUWjd;K09kv(mwFLC``d+Yyz z(%VGXIX;5xD2vS$q2u{5s{8?zR}U55;fr%^!wqk`xI6rpUtYR&hNA4E0*Bfoo+5ghhF>>FzO}0 z@5qY+2ap6GCn21H) zsagTAXtUrwIt@B}Efo&KE9ct3It^At7pd;6QhdtI;|~nnKl3W6EBB4Gr{a#SoDc~aMC;&wts#)C2R zHM}mKg@%xB6hi#l3M)%4i6AM0o&)F=+s6+t5n~ z^Kv4(TDT$&-y1?n>Y2g!Bxs1z;>Q!LGBQ-vI_>ybS$ET zGb#AktiuqhYLj>}hFX)YxlO&)_75jpU=1CdYF#$tE>;Usj4&xGRYqvKD{&-DwdSUK z$mrCIAut0!Lc!`!wXTZH-mT6 zyQ#Hhx~B>CsjDEXzyHCm_9L5MiuO8I=2zKpN~k7I)>UP#H>pu&T{zmhxdnBi*OH+I zgOZ4VjkSAYBfy5-}op|)*z>pDrGFIg36mQKdQ;VO|)Ix4BUfL$mrf174ThiK}*6)Wmcqw zLiy(*E0j>ijP-Jufk3$;c=Uz_VFr82=p`L|7V?Ae`@PhPlt##POg3L#Ytj-BqQ?7! zu8^%1mNw-4%xlQ)KMcXVOGewZBdrTgT-Zu%4<_S)kme;IfT;-|_YDAGhH#xAy6wUi z*iP#ULiV32TyfvuK3rw73$PcK*P}dQ=6QuF>i&|S}*J(#* zA8~iBfQ!2(lws8hXa>REAV4&dlMH&CbqE_mr$%=|4(oht{37OjbTlv%dbl(*n#~Um9}Se1@i>w5U~7KMdW}#dv%YGOT-K6M?sO>t!~@4ztQnL7$Y3-f zjT1xK%UW|=)@wzl9{S4;blX(!dU+)0j3&*w=?ZCJ4l-IWn53zafb#$+&?D5*p+l`5 z`)TaFQn2fFZ9jE73Pxhbo3-%}Oq5k0N(FJrNCc2;j}iwfmIV745T*~cz|>s7wS8o~ z>q#0qp=gb62AA`@Hw4H3AE>dzLk|qR*ndc}ldc1o^NN&_DSITCY7@|aXo1W+c(syM zGpMS7{nJB61?mM*wLfqUqd$M;!OiVoC|VHrbJYq4e2kq-B7Km7>mepA5(=F1#zg`> zP63}DGQw)kIW+y?p`rF(x&?OwK5q$PUE;y24pR2ZK7vDUVn6|`C8H-l|LOVmw;4(0 zk*u<5h5}xSP?N{3Wo;5M96YCoELRA4sI+geefOQ2-Ce`z;j2JtL4ln>8mo$=AHdGD zj%W(4Tm=kz$bdEsi2l3pxLdl6*ta}{a&KrIoS_1aJVmMMK4)` zz-?dtr6<53>nO|1u7&4@!^I#=n96pgJx7S;Xc~#v!gG7b=u~C*T>J5BB}D^Y-Sv)N7lOVSbAe6K(}a#=mmLJK#O1B+gsbK5n*q>Hw~o|ciDZN^X`x7r{M*y+*6gO< zHn=+72FB$-d}>GgdXHpHRqzyD#Bvc=Ibq6M2w21WyHjGnypCJAlUBW z!S=|1-@UIZlRrJ&+9Mr>#OjC~fKTMd!GTu^xR2Ac>ehcvKA;ZVdMNs&e_|xw8nOjLDX#`+2x`eT!!hJ#q3TCps91pE9mkuttbvsOhOD&FLD0m;|g& zFBxH*uZBCb1Xvq;*_G>HDrC=UGFqz9xW$qdlGc#I&8N|ClJMjnGU6xi>RMX%lr)>{ z%C)O3iWOBR2NzmZ%xiRnEI5Ncl?E0)WOU?twI{{A%C@FZ$=Hp! zf%K??kxZ<~p_h`NFX~yamV27ebA_PvT?!ne?|LajReq6>OMoQYEF02T4P463rBNNe zzovW0Fop2>bM{#OVEfyC5V^(i>AN=E-RIsgU7EgeS~Gpc^p>etrhYp0^wh&scTe3u zm7VfUT{|^DHMQ{%8-KL%%Nrls_zxS8Y)o!+ZM?eu>0eHMY4TH(@1K0r zq&R7rq$c-H4o&=e;#(7sO?+bFT@#gwnIuYgJZXi#m5|D?AV24qoZd>zc>2SXlwNNXk#=yY8u5yca8Rs{A%Rc zkuQwgKXTVdY2?Nc?a0E&*5N-7|7`d_haVokd-(R@%&>R(n&J83si8j%{ix49^yQ(4 zhCVoS+faPSF~kmCI5awVcJRA{PYt#Pj}JBm`9Y&*5F6YHkeSa9JTvg0 z)B{%xZ0Ucc|EK*=_dneK(f+sf=lg^Gs{YIRH~0Ms%Kd(&?=yWL>O0z(0>IJFPv3{^ z@7=g+QsOpaDeIyGa$a4oW)%Eb(pXbuM1@{KM<#yXNxR8a8=@Y!yOnq% zNcocFAt~jvA7UhmjUp}@igjI*POw4VE2q!pAm&R&212p0)|+*iA@6QWx4*9x$HTQn zlUc~xG8#@i^zLp0TwW7ls*$Z5p{#B?eR-ErC9ELGbjj#&vHEbcL1^DA_pj(1IlK@x zdZ}N5?2P~@t3P+Myro`BBVJQ#uxcF40q`<*00U^ z@+Ku$j+RpgKh`A&xOiL>V~e=p;<>a@&Uwm}Jw=@+Z4naIxY&z7WQ??c3rUCB;zHBUY>0R4%g( z(>1V*=Vf}Kk<=1tRkq+{uzIFUUoNA!S9l*_xbJZVU&LX@6!Hgo)Szv=c@V*#89s5xKI zVhz&74!%oQ#7WF<<)hhxuiz8o-WTQ6;9M>kW^lhziJ4p#gQL!yY54~^Q&hkL#&}w^ zE4Y$d)N~~`XY?4cG|9)5fM95d6O(cdTrQ`prpc;Novn%uEaw(x2IUvd=?EPeEBQPH z*6I`)^-z~Rwdl)`p6gltTc-;9YfopeHlRIIPu?XIWe0BKRj2)t6QFo&+_a>vC0!KiFmrFGHj zY&OG0SI0n=z&ugVo0?5F>nB~+|JI%Vj4GbSQhC~y3lPR? zjMpT(52mYntQ64uwRE!xhcpITM$)z!%nNlropHty;EY;6<}ID0E4)~^T(&elgr->H zu6esmPZwO^fa6%Dpn(W)FG=R*2}&>K95kM*L7G055*+1yGU7xoopE~NE>YKjl$cZy z+w*LfjTrFb2`81IgRxL48##2kOXmx9Toq!&4UULpl2Lp2eIa}!goUwCp-ei`xDF#_ zz>-{A!%*PV$gs>}gUiOP2~Gxq$)#18jVQ&!I)gc#0bI@z0ao}52S z>VxugQ>mzdD7wu`g+60Q*P;izXGkhUB?*Hi7%JDuNHfctQ{DbVT#d5@z5oE4`II-l zJK3H8WYZJG>v>UO4{Eeog@AW8SuzUOPElN;jTw1>Y1kZ-`6MGng1|z~V3f!UiGaBC zV_mwxuE#2Xj_6Be14S`LeV|MCfHz28wdx|GyP&I*(=whwE~#JSA-P;*FuBwzkN|ce zA-`|JQ+KIU_L$D9#EM~T@IIMO!UI)16_tX+Uu6SoWy05;&xDJy619R>%KYGmdxIdfrcyOluw||OsII$_ z;(DKoFk(fel}*_TG3@F^zsx9B7cj!WCisvyM%vXB_029l6bKNNlGf>=SXyBs-Cyp~ zgMtAsMKVsi1IlnyjP0c^-9}k4bJ-eenCv>MH9ESjOIPN#M5dum@Pyfj=Tg?L#$AkY zbv5QIsCE`>7u0&A;S1#w)43=gcfl+Kto}?S9OW*p$laqx z0Jd^Vcy zrBhN-`yrW6B!P>V#o46QHd8pzBwgKki-a^fLQtDbG>50GmgLpb-Tr0><>LSW%LS1( zaDS@b-leP58BA!9M2bt7BSd=9D5ERnM30M#I}^@u-5sS9_;!cfUvv>Ul69r%vZ74k znW!t&rP~8eEUu?rWer2vRODoL=ZP$4#d2|XLvQj_8}8Hvf9&>GXzHZF?;yo;C};4+ z_OHnFMWM`yc#hDd{fyb~&=I2%xk1PmbvPV$0L>VW>LRh3JG%5Nl%b%afD~eKJN+eY zu6rU0S-wnE`AD=;ahG#u&fV_z_Y+A>S&VC|9=G3|B(Iy5=UMPZ(+58^A=t9LkKDiwM>zr_*-3Ym|m&wa5Tyfxm9zXB6G; zs%Vw4hpmZZtgdO~le_*?rZ4g}e-2NgD0^Mzva<4c`y?}%C!ecC`q5!lhSA40s#hm%x;G#kBS!pZHc%j`peik@_7Qza%72c!~qmyAW8 z3)#WUP$jZCYl0W*_~qT*6^t9bm{#x5dEtvAl8TJZ$ZUckg`O;1wJ=Vuq|ySAR#*QA zeIY2PZP2-FHD{C3#D0^Fc7ATWV$a? zbzn+kpqz*V0q!Kc;O^25kc`HQtjTD%I&&&EY&h0!&_fQ9SF0>IBdjr@i5NdBzpqc{ z4skrz@Oqsg6U$&-?c?J#6sRJlK3yj;zCrCfik?~g@t$C=7OF%DXVNZYQmj>*OX+0v z=3LEf#4xko3l;4xjY`r+$n0yT0Kn_jWo1Zi|OB@i@do)PkOL#spVZNWkFp5^i(CCVxJiQdbJts!Y+JvzTLN@GVgoz+cvo-&EjqM}N)_r|DAe0CyUj`|t(Ww9yb+|&otsZRy z9lEu(<04XVUe4#bUD0#j&#$?2+IVYgY`ZkOa6be$S#X;Li*Id0(!RzhyPmGUwKcnS z-5%(PoQ9@`#VpN0TGjBRYql7A z{B~f}OGe6_l>>0s0e&)wdNHrMIAaN$-DXqNU0l=c6HdRva1{0=zl z{5PEoB6<1kt-X7g6(g{cy>_@iXO9qWT;q(Ts&N&E@H=5rdZ@5|4?)cMozmUMRVxN~ z4f$%RjJt7?AmXKn)moxe4ho%l2mHE+j0!&+1W)kIp24=|F3CyXq;vT)2B?ZT#t=6H zvihrzxJr)tR!vq>tBJHEyz-z{BF!@Z4^N-alh;G`8m@x$4sE1azG0GewKw+?K24OPnbL*MW}G1z`E z+`8tRi~KOS$U)}5wc#*?W4Im#)%7IR9}VVQVJB&lK*peRuI z9(dCpGMX_i&!ZMxR63y?lYjTjC*UHarwyGNFdjfp#LC0%3qRSqR*DdE zug((dipD$`4lu=ZHIgtw%6jtwDGp!_89ns|c!7t0%Wp@2xo71n^u(7B??#(`vh;cM z$0d+Adc_5=BQKn-Mim6`toXu&IUGnB5Yd7O>7ha%{;w`UiW>}r?c*)!Z74Uv)(KNm zoz&^G9=4o7E6eb+9x^(0d=G@VJP2aC2Vb$nGa-Bva=6Miz-1S*{(Qm~&*^e0)cO=` zwq9!c^rzq!3LQMzx&U0`Hu$wHCk>m@Qe#3)Jj59^UYbI}Ntl4ORP>B&+Tk~@;>PzL0q{BSiE_s{Q#t{rg4{*u+xd4U0=|aoC13Ai!f8YWTgDW zhpp{}FF{n$USUPbCzJzwg1A0V#qC8g3P`Fv<&B}^{|Z0vC8K*k6t}i#|4q7VjK|U< zkGYD*dL!#51sH%Ypex)@t z-P4BdedrByXypeGlX%*H_ulS(UGizT@M9bfZw<>4Dt9np&Su=5C(okx)3Duo+7Lf9 ze&CV+Y(aWhg-NMx7!Nh7S-e)NMns4xhb8MFqh})h5Y+yBY6nux-+dLD{(9>V9~gd* ze$Pq&DE9Wt0r_OBT9;229Z=h*LgjfEmn!k-nV-U2EPkUkv#GbOed^dQHyAu0zblM9 z-)!9grMOiIJ7nhoHccV~St$_i0hv0^Iy$v$c{}>yH(OKN*6#wbl7GU`rWo3Vtk1U8 zuY&>eiDz5)Z?bwz1mIc*p{Q5V%{D@)@B&z6x&PPN^qQtN_Woagp%0n9-GX9(9v=h? zJ8_5zA%jqr5sG_5vJ+G_?!4aDzunrjb=@vdit+8&K}^@(j@KE~kvHCd3}ye+8bMcn zw>1F?LIA}B@wHYx#QruR!KWE)SiuTJfBA812TFdowQ&5I_vsQc_3^ zcoACF__(y%uEP>S$@ABQpke+s6tEdwi!(zhEqcaD675^oN`pJyP11XA${aYZlNN&Tm1d1Su2ycy@RD#B(i6-(LTU zl)M*1L5$~&*`><4iBu`!)_CG^ON>J&e-2x;hYZ20zwaQ9?P*`~ ziw58?x4KW>04P(k)>*rH-F1EPH?1w}t!o!7 z>@4;k0e$FqE&ECaO>^qRA3=R3&qDa@+7@*0Z(p1{A9w8f z-?SX)`QNoB0r)EgAAUv&Gz_vB0jo>XDIVGc1+~0=j$j$))z7!r>5E>vi3|~5>SHEMXz%~FUaz`q^?zIUud^X8d*yXDL>F6Z_g`8; zKz56#?0#DUq63;xt`-&tzCb;;w6vXeT!drPd26#?S9I^T=>z{~O;>pL;rA~O(mOYV zH%#9$_2krr8*iIDJ$e1aJrf(oZy9@XZ2#zyk>^H~!}kvN4e@XfzklFJ|8xDSzWe(6 zH-se#KR9?~&rvPf^u4dlQ51Warin03a`*zy3e*D0i_8K5st5~F7Uyx6W+Ds`!Dx=9 zX@+3PLj*;kQ}6iV-h&j2D<~XO9HK~uRM5DBWmo@^;nN8rk*k#8N$9D^|KB`CF^9qF z%g_YPERX^&E|3H(EU+xaErba{K}Bd$AOw8%LHHpSBhXV<-LUskioq2ay~=ydQ_p{p zy7NjjJPB$p;o(R)ydbcA7@j0X;2~UefsVkS1sDQGi03_tpg0EYf5Ex;;NSJ6-A7gE z&@WczNO%$q8)w3i=t5M%!{lMn@B&LQiUoodg$NbKIEKeopM)J^=o6FX3;w>x>^Z7j zeIb@2xQN6&8jdO!NJ@b%Z~_-z5OFp_5|Jn=u&=%lc8H)MK<4--_wD(+=kEH|M@0#o z5J(1JU?ItUffPx2BZ7em6bOzMMLG)6*{g4)IK<*4i;j$$|IWGFbM(5d;4z0;Ld0nW zD~SRlERYNlUEnzuTY%bV;V>3~6%$^aJH;WKg~BZ_m;QcvxOVkPBz)RYG)6DrAcqSi z$x#b@l!56}L`XWqNSBS|xp$(uLkvkEB|K@*-;z8uW_%Ye2^$MbBhnuye9j-%_B-ntL%>o<>VeRX4=w|S7!^e%8&(}$xl_hB4ngQKKT zGw=tC;n)I3hY1p{i4`KG`JQ9U9O4wHukw=%I-DVX$NrgYCeJ zpic;z=kN%{)6rLX(}!phW6(?1@jZXn{Omr;bo2*BQHM!J;8+}#AgEn@fece1JOU+x z@+CwuEHWGuesz6mNSFuY4p3Al2G4s1jAIq6+7Z3+{Y?{LlO$aKS;{YSzU!S&p{vlq_he!IUV? zk%mnRA^GP-9?nw*dg>Ez{hOTMxFnC6gY8dC!^L<4q>>`=1wfkP78qb07NW4~;;WpA zLoA1Gx%vi~^Z&h~iq48k)6SC-9+GjWg$N}X1W|Y(7mZL0QHo_)m}5|OudXO@2#!HT z=LGm0LiuP*euHp?<|vjRLCq*w5EjtET!e%@E8=isQz97=qpNd+AL4M-r(gJ+a}!*a zWQ9D;M4*Z%Ou<3~q#6btWdOeqa!5C;0y(((s`rC83l#zZB2tV0N&I&c58UA?jxQ^nC=hnL|q zWMFw_x~B~t`4c!zzy9pKJKFy-unZ1I`-%h+Bj=t)>$#9vVk&+$132P(fF~S=fvlyX zKJ&>Ae(dgcc|;nBbwvWLl6`rWc*6uWMwC!tfj7}C4^X($Kpq>1f%LQ?3{jAJ=Kb={ z_U?&gK=`t)Bw!%&3)yUDuR5lWr(Ht6Qfi|8@Xd{WKDxYRy0=A2k43k6L)+Tgv1JIx zx39!kr=^q*V=6q5@q1(Gc)myBj^*fWQo91wT6OFses<|@MHI2!%eDP3P?GBJF1XwQJD4aUBN@EKew0K&NJ zA6WaT+5HH;duDmvk5Ji9@#mRkD`32?NMIiFoR>Xri&!e9YXN=DWM+BEi?$Uxw!+f& zGyxRSrVdK$uJ%J)L56laR?5IeeqTCavP0pOu+N*J9AIG_>4VS9`t0(SskJTWUdzOM z`^nkmn*pVArL;OYlX3TM>fGsU zama6(gpIJ4ijF)EnMb#M;Jtg>XD62dc_Fw05LkDNbn-xYKBc=~*=P?)a8Hx;l})$L z?pgK%h}KFTh9F-!WGzOwgH<|eoF)~blK|Rr!SejZHB@wu0+Q}e-~R&SQ2uD&@`26i z4O3T6-Y|aW=;wxi3>xQ}zO*DQ9*`F6iUjE)UnmxRHm{h)GiHwtD@M|^p9l&`fPm`^=W~}W&rbKWNjPvFM9uB( zt(Qv!a;-FhkE}$kDu=5`*79005o9pV4Rs0UKz?sJv^=w^w+%h>m8Sp@=aolx0A}?v z+;PJENXR_${DeqNHW6yj?i?N$U78LfSo}3qRQT4ZZu!5D&q+hEt<+&CG6O{{9}QwL z!l;U=>p^vtkcYD4!1AW)o;I}qdC7D5&L8e>R}V;1=vb+(&M~P-HT-y-#nL*PfwR?Q zHJG~?gs7(p-TTz(4mR$t_BStj+_GKx@VPeCE6MgZCv3+B)G5grRjs4>o8voqndncQd;jv*j*;Yos zGy25n1Ea@A>!bXraTFWf3CRX8jC^zC^POaaG9(*lMiwT%)k!z_`S90N+}0pi$ni2^uwWl8#+1mKSL*mZXJpa*@oze$A%X74UG)041QTujZO-}pZk9{ednZU z+~5D76IV{$-2ZT2e0;9|?*7~RGyUHFYx?KLKh{6hhx-1|_oKcqPgMH;abo*)VLCXi zn!bEBk>j%-$mF;KGC2ZM*H0as+O+ZIji)#M`^JZ+f4T948;?wUa${mbH-6nlXD6d$ zeDXKrU!VN`+793lzP!fo3J1$Dx4(Y_ol;!fJ`qXstLTA(^I;b z6|4K`Yd_fS&sz(mUGT-jCAhmVBoDr=OLqkGxFxY@^VP!@t`fi%U+Toa)Qgrt%Hz-2 zRCEn9_)=r$E?Mm=>Fr^to0BW~RdIzJ3{@}0Y8qTj(3wz0Ww6rxMP8YGAqvIt0(pH^ zjr;Ndu{o0I(nSRntMXg8G^encisItl*=~cmVaGCbz7!D&6>lalk@ExU1zn-B_JxOA{Xhxx~1CDN9U6!@fRD8Ftb|@hpK0Jm6yPDR;?Z?K{l}@CkNTpvp!`I z(<)MyqQ4w3v&!dXHd$??f@k$AD_0D0icoZy97R^oDg_^=i8h=WeLct-7RhVhD!*@* zfZD5OZ`J1o#Jog&*Gn>=Ok6M!O;z4vG-;EH40(kdOj^%`DUK*HiBLFAy6X^FeOP9b z@d-IgP35oE16dQn?LE+CV|P|y`b|l?ugZ1q>EKP=irHvP2KJm zUQLv1`FKSq>a8@fAjcNh(*SHkL>sBhA|DGogj8&!EDrTFW!B(Ls#)~=Jd6qBcKn0P z2ykjtgw3Y*`k;)n4;CUL4>N_kT%mN-Z?{kxBOBhbQSP2hWOzbfD=Vp-FB8lOo8<`2 zdNM|+FpVLm5vsT&&EeCFKkxp)+f)#&NoRy&Z`!;;#4@G98R;gUqSx2XU{aLJ%sAv2JvQgaW=r zjwP+fje0-kQP=blI%n0|$?N3k>w2ulG;prQ)e54;7sg`OzAW>JrLa0-4lHsFOT`&X z)iAQrZSbhwm^wjYPOZ9Gz}QPa-lY=>NSrB0LUh(o2XImGv`ml2Qc=R2prB5ZO=AIv zkyWNg5^+DK)dnN=s@`DJ)0Zc@bi2UgnVKyfOIe%3Vg=WJT3*VCR*@|lanZ@v!|Ecw zG1%=-Vs0$!DcJQHy9){x_d8^|SgzKIT%^cXJf@n%mzsK`%tp-nt+AReWhLSiSBYQz zmTq@<2$y6vR3x$>S68fyw7L$(?287w9b*a= ztgHWp2A(Aahf9c?=~|hkFZ!MQSRoM$F=a(09}Vj=j@TPMAwO1#1?q${8B1oFs)~&9 zV{#TxJzOgmu~H$o=!Tpbzmuc~5kS%?yb zKrERIrGyjOb3bm<;xFWEaQc+$A{Nx7z+-;!qunV=C zd`uhTeYRxZz4CzKiBc)+s1ZTT;!jYl@6z$^h}3x-77r)XHo=956TJ3K-4{@?u23$J z&RFbbYn}6T=Q9L}AXwN{wPbywwv>o0s$DXlY?%sRfMLyf!yY!LBD{W?o(LLMBuCam zwIn6fe7si<7p}*c7%PMlTtJu2cnqB9O1XQ1CKW`eT4Ab@ny!>jdnTvlp!j+%ohjk& zV%=CzMyz=pbJnC^EUN2yI9bSY)6-0bLRlk0JLQC|dd5{rVvS@BAeNFv7u5E6tNaKa z3ajJxvZ@mID}8(_>G){((RDzn^KgK6!+V`JmT_bzx>KQXW#dZDLgnhED2W?CAos6} zP>JSXE~P9bXuZ!A;O$+R&ZyEx++)`#trn)Kbf)dY6BEaf)9{vEi}g~v5WpfLr-{Sq z5EBLKZSphnKDbH_C5lz83pa|S?W{%4aH!`ax;UY62?1lk z8q7B=3b}hp%O!|NK!5_E4Zp4&HLpzna>K;0H*D=%j_BcgqnkAKTCi?YMunWK(KK7C zarckpUndJ(3M<)7Y?*`9F}rB)3awZma!~!%C{_ip+v!W2_f0=4p>5s*#*f;mCL3HR z3YMlft4jpTGAllA1E{vJG8^YurkGDSy4C>i0EeE1uBY8Tb+eg`VSnxRH^HT1h0F(e zT}hwTh6$%kZ_s`dUQ_URP|bVQsnm6Hp}Ts6)cY`e(UsO(@-ZGfv&5geKOpENu4%Ho z6^}F(O@6w2uGJlwok;QVN;&VZs_5_mIoq^e*X4LJ+o;rSHpW)4#x8q7=2OQja9!XQ zi;zT`h8w(*eeychN^k>aH#g!oYeTze6BfQG_pfDYIkEv;BOBm@4l^~`HKSmvV}wOY z*H4=*p$v9qyUWL&07z?sR+Xrj%f$?sx@`2341pQ1z(msjSC@_(8O-4bI)w~x zis>WQ@0I8v{M9OCsic8@Jm}TLa;Zt5{DW#VPhvcs&~mm?ozO)u+tQ^&h&kl&WYfxu zKW#RMm%P7ACkh^{ZYvd=O)^vR<5zu5rdMip1)*vP)|84XFBpleHHI(#Z zy>zW$h|GVuQ!}()NmNqFd`M-r#Ecv>BPVawD>1tZtCAj_4UPtNCbCdx+9w2>-qHRrv&7b{wl*rG0cu0aRDC73sz zayJbck{{~+pd5!3Fomj-57UW6B!pl5irl~KSA=k?K+-`)G*wVUR9$PVY$H;bAF49Z z6laWa{YYLc$QH8I7|fo)B8jv%e#IBNIE7WAfLpOn z0vuaZ^}MYM=js{bEldY(*&2`yty2IH=RiWSXWJra!uDXgehLq%L~ zK`q2g-+^ts{k)Grbb9f}8`bq(42xsMoX^#WRI7mutv@G|ny3XQOM0Fbz=@i}y#FJ+ zlW&pS$-eR1Mn66L-JyOsoo@l>&SS>D-PW^1tGKsoDE9>3HwOjY zx3w+k)JOh0haUUdNytf{zyktI23MIRG$t<;JFN>&-ou;fvJ3BJ7MQGULB|L3;Jmov z@jdMuImrX&Iyaj`k=HF5ErN zv;DwD_9o_|C2xi>u>q(cYjYdbatPMN3~=dbLdW0tZ}TU91@64JGvJWfB?0)#&OE!` zPa80yDSC|=(&F^V@AGB?c=R+O><=dooG|~>w)TG$l3U1iRs!;s{YxIDjmi;18LsdY zk&wmS3FVtbU%hI1^QPW5bnidY;M@KuYzY16#(&)0K6v#q#4zc+>TrT^up0vZr5LmPV?{E^2jxk$IQ8M>*}23lu)7#tJsQV6V&n~p`2OAWA@?w z;Lz!5lWLlEYTE2-|9L<7g}Pp4C_Sd>i%-VK-#7Z?@XFB60d0H#u?c72?%>&xRj0DI z2KCllm?`7NiKGkAaU~!8aV1E>+7_fl4?xxcvvXJbx5{N3xUkM{1W}ULuSt}vHC=*f z1WBFB2t{RnU;tNa4;5i805!>LAKcM)7~yR}jwV;N7jr^XASa$=UH$aZ1N&72MyNU0|h`i>bUkAe|Nl)YF8X({Zpr_WX2Ldr1p3GgDVY zAu%(Z6)X+fqX{cmG@@Ug-_%R))IC9){_Bq2?KkVC#|O@iN`*{2p5;Kp?$JZJ;buK* zrL9`Gyv09yGsItpY|B$qYuk}h|N8^zp1%z5Y(HXKHc0{AXNTccSM^|i` zj`hXnTx{KOBp{D#`Nl1JTQUSyCT&e$0uc74_|SL=y|fKNtFQa$@(B8&Yk7L>dVMqq zd$Z6*vOCBEp#0I|$;7z~s}KO`TAP6Lqk)Q=dKchNLcpw45cBh%WkAtizqNhjLytgu z)xOaON6~wH%Th*^E)MwrH9*0W(CGkP53qnUP6c|%w=88ut=HN<{@ruYtovi?K2n71Sn_FvHLb>18O6=WShzrnAd?_j=B50cN#MsIIMQ zvxvA}X%e^wZt;}T$e4wzqqSso+h0BfX&0+FVvl8)`(Q~WhCj_M@7a6Qads9s$~P^3 z0|9|}CIeRxLsb@#$-sR-i(ZZ|Z`t(Pru~l`K#D&;x}$wV0u%>mzs&#wFCT-H7*Xam zF{h0rE0#bQo#3TQ<~2lg@2Q_$ieCB3gWKB^Vd?jlvooMQ<%=3zj0FzkX_yoFF!q{L$~2ba8g(7O-;j{-0kN|4(>-KBp!>aaAna@( zjY)UI+*t{GUIuD2sp1Xz)`5s@JZ}}$0Ri1^fkp2nBTReIT>G>Itby*?S=%tB?yEsX z*!xDmIWjnO;eb)PV>{fp=cw)M_SN^aS9Mj<9D%e3H_uujHcUD^Z@E=6IeJ=-9Qx@& zbQ_b}3XpQkP=Bx^1dEaoxX!G51FMGt+ep3At zQ1qu)T7&5O)#XcP8XBjeK;%s}BcaIg6()+d)Zn*0WOV$uVEEkfD3oEny#^NHUd!2C zFy)!fJ0wjSh=33Vv7n^W1-O~maSWp*8%7R3Y1v%T^|HfrNDt3eQUd4$fl{7&BX{y0?7+eSu zS{!*^LV~)dA9_mpkvX(4u@lh#q;$yNyh*ZgxwG3=g-A&$vsp~Y`vkA6u1rBDowUqP zCt+*8rs>FmvH5oPVc6)MvOZU(m-lrgYH&j*5#h;kA5#eJJ4U`(!3FnGLkmiY)RXW$8skq#~l338k_;iilKH1Q9_+To9>`rjI|}7>|J9hG50H3r^ZE4J zYp~>_p4n3wJG3n};*8NEQ5K{QVI_j1Uqo>$INWe8tTry?K<1VU>A7ps_c8D6HZWi< zrgX+C3x@v@OVmpSR`zdL`gvURcJy4oM7``CMjFoA@=5o-DC>3gM<5OBRGbxOr2)u!3x%XD z2q)$om~NcDc$m9pLh_9p7geX&J7sQz(3(-FAOL$MFuxQ% zgn!HQDp)OxeMVXbE&o0G{|XQ6tm_X>uUwNtQh^TT)L{k!C%A6*!cbE@eA^oG?Ss=J zYZsvg7_-1c#ANzp2>{oVX)@-y7ZD;?OCeM1R0|g$B5~hAY$ormh?rSOV&&olQ$~0j zOc^|n2+dhX!t64j+IzIW*Z7?WLLM1`>ndf7F{okown1|(L>kuS-ycX4#Gr5%>vG0o)RYg1MiN`Iwb zf2EL*uhvi~lqF;sGI{umQE5b--PksQyAR$u-Lv}KC9A&NKd|)1zH;xTo=+?}ci9_^ zaDIr$?wnpVJefD@ilU;PF9?{bHF=35RDWX)N#2RA%Ar9|Z&;8GqxjG0- zvKijD43X`*K%KSq7Jc6pcOs$f)-O%(VG2}LECR&T=?tg^??$JNTGp4C2k2Kng5?&Q30 zJUxVzmBl_`6A*X5vT-9h?I-Sm)%^iA+18-?uPmZL>ENydNI={tAY!UbSY-=UsA^nRBYW2`g_l(b{^BT&+;8L5^|0h!HQ5r?Y^K{=_W zm~M}d&pkXnILM(9-s=~_lhP&FME~Pq);Gjp_ILP93B(pE5Ur~mridzA50S%P#{sKe z*h~~x{bUEh4SEB;?Hi0~W}Dps(~P}@nElF{O&3qQO4^`7Kbc~7<%TgzbV7QgYT-Ai zz%#S`;6K+cBQI00Y@#Dq!q(m#m<14bCn}J$=Z^2kS09>Qz36^qOomOghK8qNvw!w1 z@L^-w6e(R$M0rEw9&brCVU%Rpjg)$SB+qa>j$xg98gm+fM@H_SKBbe?eg#v`p$z-~$35?LpWfx9`I)bz@FUh) zF~-YY+Tsd@7h&@0bWtKQm2p%a`W1fUl^;MAa!6#~1@D|jwtgRF3L z?afECS^+!gn~!4991@{)ziSt}-$cK26pqv}>#SgYSQ@n|Ei|}wr6NBbtcpTxch3JF zhQ%R~mhZc}=`VbbaeJjiu>c~$>)!B`UmZnCF#Bi2PvFluG{Sr7l1@}`;R)u~ZL|FO zLFiFzFe5F8R|34vtt?3J;NsAQ;V6kg==0rZVNo77>@v z805+OVUTl3z^M1`LhSa?d1PqtzGumOpPXJse(}KcSmy!&&;A+x-oE|t?Ek8}r%Qa? zvky-=gLKS_g4Syl!&hh4`D~$(LR4V~ANeUd%^{IP#e-~YBKh{fJ>B$^KV@!W=Gk5I z6Ob}G9ch8KW;NDiDU^i_GYhhg48DNAb7*9^aU~lPn0tX?W1D4=lUbqi>+I%$ATFwS za0L=hs-rBM^PUGA4vidmW$kwQisz>Gi*67Sk~+M;}<#o1|)4m0(hBpB&d2G6AcE?ZeBzKp!|XGJM9&cJhU( z?`)w}zhrirZB{lv7Lg_zHw#k=Uqa}2S4TK?+uvF9{XZ^X?uw`yNhAYEDQrrL4 zj+%bw7$dFr+1>NqiMTVOG}JiaoZteRvWpomJ6A1eB|*hafE_CQaE#Wyj-?#c&0Yv6 zUa&0^I6&1&%B14gYErEPAP7t+KJyli(S;OT{r&=HF&FCRph!3*a%h(WVbZEQ@v`&W`$83AqRaz*SNGoE^HTS!E*Xy= z-WoSUc5Sl^b_~0K{Jba~5=mn*LByG^o8=wZUG+CiJeNjVKSw^n`}IjPf15^Kj-;|? z9T!$}DVNn_cPUbxv+w1M-La#mqLDN?{V$`wJ4HPji>xqpRB za%dY7|cekvrcS6cJBCQrMxOIi<5^arQ04GYR{T47b4P73SExI2(F#j0VJ&4Zg7!>bmMP=M=ET!x$v zZlc$YHrguJI^UUsI8#jv5>B1WYVai@DDZ~PjF6#`#^4Z_HeW|HP#MtD1=&3+Rjf48-Y6lR9@P>tglSe;~)z6PNddP2=Hdd`){4;W7{6#!*KiEwC7x%() zvTIpmC43k_y2%<*@+pz@3ygR#1muP*ks_BaYi!3$-Xc``SiSxkAa%H=S8UyT{H+o7 zzbXNpALxgfY(Qs3@o%#T^+Cxc%NiR=s;99E&!3Bafhwb4h398$Z=;Rin6P;LC@jVR z8EGnJom*sfg(;%%ZJ@H40LYLZpwb7vo&}B%)0=G{o9|7^UJ0O}g9SwaP$!k~CIaaL zppxhHff4YM7NNF5B|DFvTYBLf8|ZKJkEjz_zZY-BUc1neY6CmM&0}tRoOY~Rl*p8K zrAXW5@=$-{WS+voRgJrbxtH3`h4<&H8jDZb0&vP z7^E@+-~_w)!VH-eK}pQW8c2}h(1>E^%r3f5j=hbe)Hkp3&BGuA%f=ZN zI|dfElGZ!dvu`l8P233ahO-E_h>6Tz1>(t+t}K;cmE6xI(7hZQ{DS{L7G&YxF`0a&_ovZoGLyutDu|6-4-+Ou2V9%qBd~D#6a}|wM z!v=H7pci`hGOC<3*vkNuJrIOuNh=_ATpIJvasmCcqJeN5%Pa#}#jbHM5LPSgo?=*% zcbAQkFrzLukpI;-1_lpQQP5nvqBH67OSx;{=G^_yDoQ+~u zS(WXAt6C~>$k`+Z-k(R1uCcHIG#9o#sN&4Kzjv;O{165_B-#WKp;0?3`{Fa=@I@fO|1GYnF zZ+0JEG5_477g13UswtEel1W**E=dqY4%7Mr2d0%vqYn&y2Jbd^xEi)CpL8AWo`>4w z%1}qXa<)a}i+TKch(~mehK0QCg1$A^Em=#}0Ib`v5XizQzstZB=w=ST^<<~JF|>BE zFUY>1wS@mQUIR{b06(cwYZ7>ImO4|?+03`BFv8qAPeB|}YD?KVV)emv;*bdM>bsl zgYwt4NxuvA%2JLLfcWsQrZcfKfyU}Ji+n<^2wZo@|BorKV(YT`hlUh>#p`COH)bvM zv>5JuAp%c{y$2dXy{EAThv#Bnz%78Q^X$;JQB;C!C{JR03|-u~>x28|@rxJVHyw1W z`!8)cS0|V7k^`sq-P9lN{Z`ML-J81f^tRo9cQ9|q$bj#>9djkLBfaCQMWmMuuP9td zH&qQh0$XMohy+%#)hDwOfkj(T+AXn+Jx_+OYOE!jyD~y>aM# zoL-sv(@T>NTdO6VC1Z;Dg;OCpqfpk7@n{2A_yr_#*eLzL zmCQO@W*GzyQ#z5#XDiBDyk3l9OJ9e%S=dVK!H1DCEk~KZ<^O~G6d2&islz~H zFa)(4y`hZkyeXYE%BtHd_M;yh5_?I1cI+pk^s)V5gL~p6*s$YCl|-SCX+jzBRrH~} zgSl#~C+}U|7#dheA&L`936?cDa6Me}wOn+>%`T50;y3Bezl{ear_IgAEu-Ud{ zu>C6BI2Vw}(F0#Yjc^8%;OeVjyNym@ZdrMeD1D9$rL>1+*`lRn)5};MKfV^HDThXm zjCH{~_c*Sa{70 z0u{`R%1laEt|Bx4J;=w$Z@{{6Nc0ig#^YGA&KnySkGOEt@EU}cdLre|8c^8DUcoWn z;qc;(jp22RegOpW{r^39;m(gWd&qe=H~QD(%^AEs0J#V3salJ-QRZAk4e#b!Qn(p< z`XnE0yJvU%vHn`#h*|B(ARH9ey-31bHzxdEGXf&C#D1``0}6Z*B3=U50a^ZzwHZ9s z-`W_)Rn-neNnFxWhI+tj$p+f^_X%?DZH-M^?sh|@{dwA9H3mgI- zV94VFr#2vV6Y-o(EUp@XPv_m%*uHi#DtYeO>jA;e_N^C}h3PYs+;@FY14x|FQnB^xx25>ksxD`UU-)`j@VJ zWBECQ%AP~K&o5OkJ!|P&-g`@5UnW_$Wm!+x+g(5J`gYe>x^C#&TOB;J>!Zt>%Wm%d zOYe)zKHmG?-X<^GdvovQy^-GWUUARr-p#$;%imu9^W~2&|MKz;%dcNvUViDoy92)) zcxvGOfzJ)>@A-Oeg=@vG6{juNt>|B7 zS^C_vSoaURALzcl`;*<7ZddoN?$f&am;GfK%2*CQJNS*kFAiQiI5`+tdJ(zzP;6vx zxaL=t++M3n>5=PWCW%YX&YB5NW{heflK3)3r+u=T5jwZA?XjGtE`nb=k+Nw-YJF9n$9?IvVcuOYbVl(f;Ty3m z8Ocux6l^AXc*0UGQwj}odR>VOzZBl~VyB-*UB%1KrbFp*zuFMqd&-`6Vihutl%NCeDT9)(jHSWnQ=4Dl^o8&BtZ}hU2=pMUb-=CtUoA!h|NVJ;C-Su0!pd zUUQh`*lBQbOZ#4ujY$uo@gn6&ejmkwv0DBd(A$K&qY_c<~ zoK7VOD>L>AYxsd#9TLtBDfvt19o_ia_HBlH1m0ETv#TgoT6eFD274X;CZw z2%9Vw&U=$6Cn?r?B2uMPZ;!3p!hWB3Cv1W^RaC~tos;g6yqm?N2lb@FY&59M>GNjwt|UKL6N#2?J>DKJi}-3!zNSOD zFW{ZBIbdN7#UL=)>r>XSBa)bkbp3|?exg!CGHg_3uA4FwzMxq9R;PW+Bo=w>VYf(D zj0S_j^HOYkd~Xqn$TpWypPy9a_JtD$_OG6z)tl;0XunOHHIGy=9e=8x%2 zs;Su2&dz2jgzYwA$&j+TCk$zmMzowweh(K=;)jyvBEqUpX-uYNr+2zpHsmJ-<_TLe z*@qG`zHv%<-im&5;K&~~?hU7ELKH-cqgam1nsSE1n>$mKa>)?Fn#o6y4qcDbGM0{@ zr)&zNkSc{s5?feY5vI@D$c`YHN-@#sA+pC?h9Slr2>xex_}C zx#2FhJ)zTjg?We7@1YbE*+}aAdphk}(S)E}SJo$_-fU11Tgz5t3@20xB+sdR#h6D$ z?FC5PN7$VFaJ(iS7Zwt-q_UJ%_yqE;uds}YrAk3$n)0P`5$rx~sD=g*hzXfTW3x@g&iOQ3WHg)( zxiUhJUnKL1ChN7Z`~o&cPV^0gF70o8u3kv0%?yR7K#>;%rM>=RyroiiuOvO-V#z&UrA6qzRZrR zt~a{{lT$J(F0Ev9>hw5U;WAtbJAIyV!4ua@G?QY9iOsD=ja-RYIO)xXE%9VdAQPJ~ zEEIwaXH;sH&M!zoz1d zNzZuztNw)=x9mgv+JEx1*eCvm{i0S9dRfLYD(0LbL651 zNkHVu^nab@Q>+8JK~OMJDjj8tJ7k6;JFa5Mmx)ncugyO0uGgcYe|A1cK)tA%$@6nm zF(Z}BKm1&$U1zORnY~qD*%YTt$-LayQHe!?$|dl4H8EoZ$!)siGBNuHlNEzlFj-GW zbOvA1T}+)Z-DyvS973fbEKi!lR&@boG&}7!`=p>4pUi|jmSTNM!ppMlg<4omxhfM? zQ$#1-RxHHVbQY`-cgF<1k+SeT zNW9Frpf`Q*uw#!K67C9687C59yQM7lUdsMdO=*b>1vV=s4yklGP2BSg+n$^hAy-PK z_GN?VP}xFxzQ(ra%;O14VJiz`HnC|cM|FL)({9pv1upeoX?ap@jcT3Am7TT7Nh$)A zu}T#UN}bPybQl5KpPV43D*4>Spdm0GlF6i<{^Tfqg|dW`o5Vds0V+)rhqHI+0o0n{P!sp?L<3HWj* z(?qoVpqo`s2C*J z%eQyFw|WGWw}ASK5@8rv!^>aod@q#;QwCi{A~Bb7cCFmSHkYf8g1{TC)wC*uyzD%C zj^$D=E4_lO->!4$C)C9vwe*5cdzi04N&~73`V$4rI^T7PiJsmFZn{JU7ytp zCQHKDq?oS@Kd`ov@TuRt)XzHcGSA$_cpD6} zm*b5*+747HPU<3g%3vw!Yhimy-{weeXu?gfkb(gFH`{?K8|b&2@Ox~w&NA45tRu&1 z^=q6$l~!pH@Rdcc9LXO!I6T+i(^x&op^;++er(cSvH?L1m6dTM20JXS$(Ykw@8>i#Jm~VXKV956lvZK-0nQUKGdmnse&M>c6XF_ z!)?K(k>Rg??n3%YceCEZ_pt#B24^lM(zz|tSVAGIS>-H`OYa2_E{z;{uTNooQsRdk9fQr~z!On&rrcq%!~D0F1&pc-8G4Lr<@wHPD; zmP5W)7P|#nk-}v1A_d$UA;w4Hx#TtzN*X-<;D^7pj{er8%-Zd@wHPD;mWS6Cm?%?r zRXrI%;-JOKzWs|IY#YXt}sY4_ueuV7a$Br#DU+Yi2ZFP;a#%JiazXQV49+UZyt zj~@0(o}UgWk~W~wg^2BbC=0$!E)}0ps6@s24llccb}-T=GJB-)uXYaHn)@5abKovn zGVqc9i`$~~Vs|gVEiPg76v~?Uj^b$)W#rvRev1~hlVP2A$`&K#qZm1-nQYU)jii#J zjXk{0&K83pz=lz3B@%B);N{EeLa8oUR}0DP_p$QaW@4`(+U>FMy_@LR6BzVnTWjU~ z+~<;ft3u%R2NF_6V%)82^H@hNeFjU&p^@P}AKa%*aLl96V9O!ppv9mEu%7>jcU+JW z$PA_u;v3Z=Z4{3uVockoU$7XvAxB?wz5Df(MPAV^m%0vo-eX1^NuPeFa zaq!~M$g$t4x04H#%~AT%$I+*;@fP0GI?;Cibh2(T1tMAnP=}bjT1GsG@OxmxA(7zS zf80gi@I7W!xI3XItaj7!Ba?Zd-DZkrCR}xeC&IAUF~n^~?IPVya)Wr^M*92r!@=AM zrcN*Ed8>O}*KS@KQHr6y8+#vTB*}@LY;O(Ek9MLUWk6l5ewo>Ts(y)f7!bMWr`X9K zAU*fE8hMe?!|Um9{*+NF_SVompHeyCRpPO?q8O*@RnZiy5q|j##BVJm5#E-ob|5%y zl-~7AX28zYAegWM%J;@BL4m!dm(`>yzE~L}Tb_q_bD9Zt*ApkkrQP^EvxLqTlhe%d z$rgP&g&=6HnmiI=RH%@V&p(BU<2ECa{hw#h$nw63x7pNU^5E0$om~v2)D@wzXsv6j zQ<5oVg6w}0-QYAc0OHV4B(jly=S58W=J6Jj{m!QNnng0LOc;~aZ6-CPl8VH{_7Zx) zZD#RzAG^J|9%0WoO*Zd0wAL^Z)b0mAE{v7ZaZ92q&*!AN6vJa3>3e~BVpu?8%WlnQ z`;x>9jrZD$<=S5~wr)1JR-<36(sEF>i6AwZ56C8}Az3OfAydzxU)*MLY?Gv&j6Fi$ zc&@{%|EI^5)RKQJ8Q9pb?z^lhMsTbt)!J8M?pa|xsnD~ivz z7xBMC|U3dkL zZDYRH7}JyXJjTXSLvg$(d2-3DGpo>s)A+ed-@=S>TAAO|(=Wb-QI6VMBQP{C zYmZW{w>vEgN!?U-sLSyL(Y)Q*v1&mhIda|KAhA1FZlLM65pJ<%f4IfuaI@(|rkYl% z6hN4d{6U9Jt9r^AYv>}H^j!nOPJl^oOzc9fY?!(xd z9Y!4SVWnyvNzZ~2ht?LYPT-A zJn~Ls054*Qn)tvcr1g;Ve6riywThhix062i?EhN>$%2Q0yU>Z|@Ku4@UAIm+jLCQ{ zBxN4W))2$r8*5iBppc`#+Ag5)eC>Zejl!w#HUjI^C^^Q24I&xFEN~<(DMi)qBDRBg zm2AA*Si5#HI=OWFCI7uvWBYAz)q7ZifXkRdVQ-X9L*gy|heFs0Bn3nZUNKKYqUd5& z68!6q^U2nKesX|3^j_m+@GJxWLI4M6Pj|Na&;E6??S4X1^Zoy6IEOD@GO)etJYZ(u z(EB{^V!YCmL%n|-VQl$xuw??RQ=wScasx$0$?6jLQ@N;8m$7(sapLc4qOQWiW>R?J zYDD!jMG=40)ifg}q;<-?mgEROyD`>~|KT+e+_iAiv^NG5aJGs56R&CIjc%XsNY% zo23<2YO4oNy8h$4dfy~fBXC>?d8G0gpn z?7L*5{iyvR)C=uzo;8%tS#@Qr%2DD=?SVXu>Pv4%;NBhm&4Gc1q_!PR|F*x0gaB`A z>wK_WCYjR%l2`$UZX~U6WNxnp2qD{?El(fLPEW8$HKCPEtbds|!PIV{*9$G6T~ zzh89gklEWmK1ADIg*JU(9U?P)$+>K1_|ls?>X68WnyZF6k^zDFQ!mtDdZ;S2v-%_peIn?=ZEKr*Hkgq~Z>~GA-{KXkIu1Q#s992RQCnb6 z#l9wkKmFu?k7aA`_AAymncc2H?Rh(X#a_iO7Y9&#-k-Ik*`a@9eUr%z zU+fc<3m)$TDxWdZJXxUfCq|lg4RM6CBe(huCz0Du$ zHPiyYp<;T6{P0aph0TF#ED?%15b#1~5}y{G57W&i2=FwaeI+xiS@iaT2Gr;GbcvARxFr9^-Sbw*PW<0EyZ_GX294h6;wj%APNoo&@aU% zM#SuiB*X?kf$`sS{TQ8>HsM042P0**uuz(;WK3=eDoip41b_q=Hj^X$$P|6{@-L3k zYIzghJ6~%DbL6xQMRU4nmJ9PGRVi-p1(9{HF8N-l^}m@c8h?o~#GQ$~K2A~%df$=#=D4i9l@ zzykT=h4hdT;xT4vG5OwXbQLACMKi()n^GsRWYrm@s{IT0%NNJ7p*bYfjED2}&btnd z(%t4Ju2A+ClkLqq_ADBwvqDJ~u2@m(HyJgZuIyJq-*RZE@nVIy;?!G4$=gp~Yan;t z4Fs?&LLVO_k3QM>BI(gIw_*&N@f zW;$qK25D6m6~dGr@yu z<;0Z8WN-jK+G;69kwc+DFF4JFcgA*TD<*OHAq~V~%-lK$w@h}b^Cq8JZje^^#+Y6x z;m63MMjV(6TVZ`Yh}6<;_iUso6T`sXI(vSS6)~kQCoIcR4^O9-Pe{qfsOHW=PAlSB z?}tRb_^UDcFBB%CBS}{RfV1~Gzz3Y!#}B&41GzU_Qm zcJQC{2>mlBvkC1jCe50aOra-J@(EN^;zGz;Ox7%6mem*RkW3DZ96gqTwSqj@ha3zW zOG^qi?BXRVL1UfLyP{R+lvPv#z*_rWHRc5y4vp-41)l4+2mCTGGq6yLNrY#!Kxz_0 zc~V$6O2)&9B;Nhm8UD;3XvGhb9zM@VzqhA}D%r+BHWd>YTv3gZQl+F$iuw69qcbOma6HdmBtd)iwb_dJ+-!cs=7FpBZniClw1uz#);~ws%nG z>8#(tSmdjk%gFDo%?}ONmh|WQzA&Ka{Xx%Px=&dEZ^*d1H1kvLHx~^aloUvpG~-sa zAx{)HLF@h_fiZGPw;Z{+1A7`svSP$!ce7LOgaY!^-1!*Z-J*_~prbwG7&3=M4zzx^ zi~dxc*|hc+lhe(vy@QgZQB%;_VM( zDLEwELMGYQg=1l6g6*yM^Ri7YMZH34A_7m&F&UnkU}f=}0qk}T2{{pWp=$d*&yUiZ zFJjn8TTF^MTQ|(DrNUaOs)=Uv@cr18>|JIm2R0lMITFGgBXNE`z59pFAs(%<_}x{*DE^^DE76^73SJ@MK@LwEX{$nANs6 z&o4Dsji6pQQ?46UcEYT4Wc?`xg;?Jz36`2W)-6f|KI_@YQarQVT)i#;1Xpw2lR

    ~$V=~g_z?ys>()lksky^D5G{N0#*ge=6Hq%6 z0UbOF2s#FmEkKeInLr9~X1nUm4cjCq`1Kb3lJM@oZG=Ja+Q%cK_2$a;4w&n35@d}@ zi%WxWX1f@8v^9p?&b5ot2=$xVj^nYn=o=ZlyxBh@unPm~Kn7vFfY)VMWzuGKCdtaa z=JMv6b&GyMj+}L6JH2K*`TFH2waSM+)+C#Khv6%@S`Mpgor+^w9k;rE{xR$^4y|o< z(Ki@xz6J5Pdz;SH7cq}Q-o8)t-V0omuCB9q7cur0^C)L-ndf((f>N3aSzn>-E2JDX z6=0niWw7EZ`~ZhU4isnF@Tenn>MBO5I9ucM%AlTfXX64@J{uG1lOZ`Dt~!Q~;L7Ie zAubJ>_0*Zb>%4a@edCo)Kvy_h4BP;#RYa9^&?Kzc+=isZmI)Z}!pkta?^@>AUPuD6 z$rfl8CK-G6r>?adAjM8~6)yx_|if zQToDbSZm9G>0z~Q)}u#|gstrH84bRapu+a%s_VdpLn8b7K7%y>>zcr5v9}ng0oH7{ zPKngnP);LP#4I|h)Yg*g$R+!+`4^H1@3Kcu0O0=Ser9SMEe3Re|>v|};EqG4Wf)i_z7-Ml)Kp2s`bjpfCDgmS? zIBg%~G&2aE$W!mW3Q4q4OiTxOAiyH&?}J?Z5_mfj9-;npg_pq71<*}jivb^CQ*~u3 zMFf~TWhLr@WRhCg2h7ghA{C$DEmd(pB0M*>i+=Am#>q6^Vju|OEOdunQS}OJF^$%& z@Z;zr)a6)D_f3#5A(ymIqlDo)5?W6mxe0PH>YN|AC@9VA1t#HyIH4$1&E?KHT)iFZ z$)S;bQ*+ztM{jTLVb+rY9bhFwU$uobqWFZdU@sdLDLpG#r{02N_yeTEP9DIi=J8ZN zaSN7olmQ-Kmm#I9A|%YALscwqjInwtZ052{LMG&9Akbd<5)&XXLZN57xiz7h^ z#-k;hLJ*(GtJ+JshP-nSBjV8TVz}nSv|cZPV1U{C-~%~RLaY@OL>h(PJFe9!I;O#s zw>H-dETobA_j;KJxsCMcpJfaKdy7FHU}s2S(8{uuUa3JEhrNyGUSRaSg`NWrDs&Gie{-6JeGv{Tag^L*_f zheYf*Nsxi~;*lY`>#L0ItnmocAwghVpqF~>7F|kAQq#@tL)>OkxZ+Pn`t@n%PYgn( zQzKBDR9chT6salkBG|-jkJC){ss3Of&+gIn&=2Q+z60RJUx2Or@0sQq!^Lb`hVqHy zv2pXbh#xP=i0oecCbyX!+H|*>e)!%d-c|PpTOMdY_L|_%B*Su*x2&ELg(&xgfJpDa z?{ivjI&e4e=I(&EV$G8F<4`}mp{3r9J^Pj(SoV77amaZX?xd^FXd6}B)ou&H8uGob zK_hT!$Y&ZsKGVys7sBN84>T=IYAeb>UF;K_Pfu+iS3I~) zM9!j5>KMI}hGUc?%N;SdeElS1-f;$=`Eb+6c#5+uL_IvVbq%t_@L;A6^V!bLJltHp ze(_I8Ywqv=pQ&O4k1!5mwF8M+b_DAC#eq~JVfDI2$c5rFw)F@xJklIkzxXH24;cyl z$VsPQ=v#1&`VN11-U#FD$Z_LY{s!fzuj)_r z9bUeoTiz9AJQWk|7om^N>ocy9bp-GmN1H<*5J1w3-FP9r;XBNekgXMk(q-+PscOij zp`v2GFd8XWt8t)dGvYAtB+da24Jd*7c8208oqv)s0cga&LvwbJl`KJ>H$SWrJ%`fG^)d*NRZ`o?h`l!xHP6X z#%b*u;-7m0N7AUJbqSOQdq#SMnyk)mQ^q_Jhe9i4H0~NQd{=Yrz(NX9Jb{eVXPH=_?CMbid?nszY)^t40ND0D27d8_G{lD+u=sv=P0|c=~tpC&N z)k<=B=+-zV(`5m_MyN;7kfe6Q64V4ZFq!#JbhnMer%&1L}et9bqKr{O7@gOC!(q@^E*S-?)kX!t;#vU~4g{-K+@aQzCy=R0z9Jj!9h!h&oGt z$x9F&4h^p~x52S@)^nTbqc1g)-U{tc!QJkl4F;6%mH1T@&s+!nm!n1hn4y%Y?*~5GVEubTCa?4qM!OH zGbn2-F+afyWy+tXd_kE^MmZ+RViC*c*5@!N4vpAX!`0{daGofABqQ(2o1`QdY3`_a1HoX7YKLG8aQ!HgGXy(#cuJ zr!JUtc!h>k*y*IiYO$G-EJ($x&2<9{De!@#lKZUhmJ#}MuQJo;XqCW)y|Z|f!4zLm zi_~R&H?pC|5qbI={Jfl2Qs}<>0($rB?4%XvC(Z9bZlB1caHP_vY*OtNkWU@MzU4II z@^T@nOdP|_3xYj4KUFalBZ~l7(-tfiBVxd8l6U`rzveU(>a#0w%X$2Vqx8fd;hWl2 znE!ca(hBH(Q*Kfw_Sy7#7b}SOzX3tykjQhVU(_jRzUEEF!DVaZ=h;xf=%iYpa3u^* zQ8^z|v*zBOx8XwOl5RS7Waq)j&y3KIzRid;-oAjk-dTBPHk{KWCuJ#zARnA6vOE2% zw;(@U3hJ|;ad7mr8|k;+!m8u;lAE6sZ%l^xs;I#*Ri2O*mE-J?hF@UR*g_K7wi6F= zjQgMT{7<7mPU&(Fk_)Uq{37c`z3msx;{dF9*g3o3-*;v2eR$Ye0Y%k$*kPXTJ~lrK z{Ful)B}mn>VnsF|oYW`DJ@4Yq$!R7$`EVyVa`c}NCMdhh!J?z=%+|0|7%_MQfm$T0 zl9D4|hDcub9wsvV0n(nooldqkGHdBK-(wcU+PZ9BzxdSg0x&HFp;cqa{N10f7R{49&MuAh1QD(#; znL8p3WypWt!P%7lGi+Zjjcohl^(ZYe{-cfbkN(V@_m&nD4bM8br?LW5NR;!r%1TYC zP__tIMiZ~VXynky@DF1cmH1cS^UC{bX<`Y=!hEjxiJn&XXqOsgVkYQqv#0p5r{|dX zX|}(GR6uDIPRjj$aorP^qYzKqRzGX`%#%0Ndnn`LLm2){CO%rX*5U4m-}XR3~`&uzT$TQ4zUivZ=)+`{=+ic-4AAt zIVMb=Rd>c>#OW5grCCo@l+l>d2;b`mGj20*RuD=u57~LooBcC9mgDe1nXF$B zG4gpHhRAIuiZ#DIgDpTbymSU{8J5<^!Gjf+;6$$K6Y5iWZ#5w=3L;4|j*?D;oMv+5 zxdUv_JN?+daSm?TFP~cm9xM>KK&{j01QDe~8<_N_D&8=8y%!V1X~x+gV_p#LJq(KE z8nXM%YtAKme%N5K4U>H{r}VM#Q6>Z=-qP1l6Wh>C-|)E1I1v^ag_aTkHcU}1P-&O*DGed(M8ciwZ0QTfwJ%czIwH={>VF82E=TF7?fHgvGGT;v4uSdwst7lM~Y|&2u z!FBlmjtu$r%xB5&wKFR=m{Bvp4A4IO2Hpnz^)><_ywD`Lc4j+}rWU1=eam_4=$9WG zuJg!Q>t}{GSWxIJpf=*liVA9VZ8iXCBy$}>%iyw+WY^F1uU+gDviDtskKTRvjFNZi z#9;|s^_McPdelnbTXFsH*Ns`k2T=i?Cj%UhG&z6M%*GF$=&E1*OPaU;Fu)hrZkie1 z5YXYR!>dhOfvjlJX#oqxL;z{qynu4JD3u&}Vb20r{m|IV$_;pmNLpQylvxc3U0^=? zvmT5S4+w3Qp&y$W968A+5ha&H!XjSn(l3 z#ECzML;^COoH;hvkhf3A6mv+#z7vYS?RN!+A_`%hfgWrgpJP%#*d7=Z+LTH-p3JFX zAqF$q7@0W}N{rh~sFBUv51Jkxr9brHne*Y0p6g|di1z%M{Muxq>kjSkA`yInAW-lT$m8wcj}# zN_fqZ|78N`1%2k;=+dWqu3qxL%NmSZ?0E#x&mo7P0~h9=44{;jUL4k0tQzr%;4<&JB>RYLIL(8$rFi3{koa0Vq% z5p&&%3Jn0CAxt@a5!a;BUd@=}Y)77yfB}cb)CuS~OV5zbAS^VJl@v=t?LpBu&svw`%Hv`!ckqAYwRQq{X zoLs&QgH|qVMzX;d4D`F(AV{6qQQ4AJcO#VkK;Klms*sGWDzue}fX8EfCjwqxnTiQT z{9vGJasqhQi*i0q?4Hc-nKgqP8rinu^aa(0RLU7U02L8g(_zMuBUZ-X(OoEdZSh(V zN~*>Yi5PJdrE);MN1)nq@VEf;l=TC97X3M$I$JIiN`&I~!|50Qp0p&F{@>ohU(b-O zYY*=}?lkq|WgFoeC|PJmZ7jG;5lL@hpQj&F&UBM+YG;PlFZz*}MFHH+R2%xR?xZKe zCv`J-4RhrBxXhdNCz1KiF>r=)#y4Wc6FXxs_*3bcA1}*(p!))QnAn|Ir-pH6&HBZ^ zV7m8z*BruBkb!X=h<>k~@Ao2{pbql{hatjOlNN!yN~rM}z#=b3CBt14Ci2kuNyj~C z#<)2flijcD$S=$=mpHWcrhVwLuYC%y)K;8+@N%j9t_A|)*Lq%tmrHuw%eC1yhpeEE z-KsC?)Icy7=%dO|GF|c~7=5sY$lNn{bmP#-k%Dk1;xZB=^sR1evQeb;blBvi<`_kZ z4CPq5TC#@h6wBr%A2tDpM(p=wc97lI{9ue$__5Q6t71u-FQjr#S2ZtIOU&tE`s77v&=D799hfPnxYIvN~^H@t(mB0N=I&x&8#O^?SX)B zNT@OX#*TxdFRZ73w}-Kx9dk^U5Nix*t91ZnO5>EuR+*$k`82bFBV@okGdReh5ykS? zaiNX^)Gq6V*#;#)GOy%0JO8*=xXOMKt-$6Zyk?(aG63c_%Jkd7FapGP0LWX1~hC!1q3iP(s)bUf<&IqsdvFy4ua`>yGIs9nTkH!s7O zS1$azZ4S8*9ntW}l=hk^E)W;;wYWTi>OCw${gn~YRD~{$YWuiwxm<+#6)&>{}@;35N#oz;7t%t!WrHqvp8}&36NdzWJ&YnQyvrpWlbDb|)5N zBtElxU?GKUYp4)rI#S<2PsJf(W7av8eeCojn&R_o;fQcbRh>%s5}j^blEYXQl34V3 zgurg5AIo7Z$oZbzIzJq#aom>|2FgypH6F-|j6`t>cFk)EY}^l!_FeGaZrYS&gw#BD z3Rtj?NJA(zp%RtkPN|l!pDZ#+#>~#UAp;&<8ba_;ZU=GSvl(;+I}ZsO9p{m{T%`n) zW=}ZcGlx-xljRbHb{$wqB1f;tcHF_=ccL?$um==_ISXE{{g9(qx`(>X<(*IrX3RYI zk@@L2Xa$y{$W(Dpii?2RHnTr8QJh&l$RQEl{xa*9`Eij^6plG2(w*Jn16{|Q@ff#T|g!8UfKiV!!S5ZnTQn>73hQ-#HKTR;bQ5WIM6Xt{0BH`59C`%# z^Y=MFvys-;7&eAE#KBz|ZpUyKMOm%XZ%>6nRFz5y8Qr&*D5uaFF6B^V#rA{0eq@9` zG{uONWA6Ph_`1W4a#)FAnTpEH>8KPq=1~~9->5@{a%g0q*bODV;uD+b4VN)G)H=6w zepE&Sq(Kl9oAPm6H9e`tGXwZ+mB?jM(Fv8bRh;h-6@3%y7NsBiIQqt@5k$#%c8w4f zCq*KM%I0v(<=LqUsy8s5`$7<%Oh9jF?^AcUA8L5VL_UIWG!z zB|}X)+njj*XB2u-VG8+>hWdCpW_G(0#J?Y=BBvR((e7i`0;%*r+RwsMpS zI3#k+sX~NQ9u?m4`g zUi;}81p1ifn0R^iSv8mrC+vA++-E@jH}=?HOFn%abn-$9Ir3K^^FG#f{|5T?>#$~6 zb|z+?b>GPx32{uQPw>s5KrtOb1?sjYyzX*rL@o_l;i1#Xef#elq2In7lQl11jQ$$X z^j+JZfEGJZyxxzTSJ*NVjZi*`9Biv88YpMT&@GI3Eo>%K zOXvD%yJ-gazY9nQe|g~eOnR214wxv*PdEh>#Ma^*h!Ik)))U+25~81W9w$zdC@(MA)K z5s6=Dw1=ZcUDTJHK+@bD*e2!Mu}wH6a^UV8;AXjf20;A&x-%gYT0_o^JSDYFRLJf- zus=DiWM3~zwmo~@11k|aGsBc>l+MX8gB^=1q>z~FIg^1Zw9NOmRIHV{i5&TzS~!QZ|PZmAMg8UpR(_?zMiH3 zUh&$pm%7R;p6cma(Ohx;(!|p5tjMo$bU(8~v|@el-+O=6`$+E{y;t;xct7b?_wMK# z>+K!<-SRhh4a+B&yOv9qZ|FLAS%25t-8XhU+x4}ccY9v!d9=IK zeP2)bP|yCJ=m2lv{K4Rz-zAp4w&+L9U1thg+0%(R0VRRJc$6~Y1QrZ z<5KMA`|Fm(rhj(+xN252`21#!6a{pcYR7Oo_q}kOwVx^6jQhKVDQ8eeJhje|*s}RJ zYt;IIlNvXCb+~3hln%=LQlnFyzopDsHwt0{<~hs2Jfj5eUH}>|zqL))1yIBQ-N|}T z=LH3^)piuc&Ta{fNy*J)ku5=urtij5+ZnH?G{=wHIrwLkyS8EMN)}n^D{sG3?0n_oOzw z)cNDO1wprdxX1%p)R~o=*CD(0bq}y)Wfr2ttUluUnW?hCfua#@@Um15g&z``1x7p@;D=Mpq9l?V zc63-%Ru@x&0$*eeLMA>dpbk?jRc)#+kVYZ{Q;h*%D3H-=-^+w?@kdy)%K|yY26HJO zHedj;GouF6S`EwEf^=Avk4oW>vjNl)M+jKz|1tL6fpXPV{+ZYEdP(xq6A~Z^ow;Qi zeR}VGs55tZ?+tV)qN{>}g{!#Bf~dH{n<0n{MP0BgRs^wNSutW|S%kb**8cn4x%Wlh z@K}H350Z1f_ssWx@A{m2P!I)U0x_(WWVBvO~Pc|zH_I|XhUVgGm~4#2^S z5ld!mP{onocX&3JU27F%rb4q__-0%}M3C6Oh39g1D=!R4s1%V-G^}Y(fU>#o6DOYK zhFYUV$BoTkI-9n7yu?1?hm|yx5w(^uN!yqankYVoFS+jy{#k1Wiw>3-RGP;8r(uRl zBD>%tlrYev#a zTG6EhX~P1B@*ni>C+2uI*QZ3o) zvAv@gim)h>$Oq>p3&G7Pd`|RBmpM&%6t4pZl}DGgw(+A_^=xTIvgey?Tzn#^sttwN zbvbKCgITXJil>eUY_TneIgF*jj>VXpbkGK3=lwiaE5X7c!K2U`)V%T_FFhU2EmHy) zQ0N&f>1T z$T{Ji@BolDpt~ggFAjM^FxVy9)BhT&YXZo8k%EC<7fC^z9aAL%{_p=i7DuJ8E z4+8+%D#5qo!0xm7E|Se6ftw6^R4J|!8oC9uD_#IUj`AOajSUso+u2+PtA7({_IMb} zjK`GQ{BI}N8Yc;r0j`G$4nxFQLfDv~T*`Jxqe^qo8zGOj1)ayB`ZAmTn|~IY5(58_ zP6Rv!xAzC+~bw@3d&cox#Ib#Y?|52{sz zbS3P64N*j3Q*f%HevT907ty?JFaB+njIW8txgd&hP^D~sI82dzkA*0=`D4Pfq*Vj8 z8_fMs4pSLr?UU(cUVAWQ?NB|ggaQ^F)V>Q17P9dPJlo;6A1?a}ORg5>X|g$MS_z~R zTUvBzAe!3=fi!4^vD}8wgT<9o(AMlpC%AeomRSai7dBgN&g68-MgEAP4+5J27zJq0 zZPpVk|N@u|7-Qp$))+4N1zVy7X*EkWB0I+R6!m@KlpwOU@hewy&EX-Lavh94>Tr*-D zca}*b$~>piwkF$aqPfgKZh^oA!H%NET4a^X-!kCparPj+_%SRNZ6~(EVABR?!}i7b zlUQQqTL<=TRN#Uuf3f4{`AY{a_M-)o^02exOv2$DVWquKQgX*(O^dj&35K}=k{z7-RhTZXXw zQJeoFaItJ_v2o#TFsHCiU?{Ni+`Ps`kU!Pon?!MD!UBrZ{NyPD8z&m>5Qi2E{3A`kW`3a#0IuEw8rI*`uN_M zp}{M;!&k$u_Y#|)7uYEOmBi$Oa|h0}AWk(n6=kPZcrNx2?opCETSU1D(7+4O%UwS7 z<&sTvchAmjx@5XCxnrU;_Rf(HaU*>imn4BaXdy{r!)xp^Te}lxnxSiK|E^bhp8+z@ zM^{idW`GKXBP(`+Ha0g8wlAD9+1|%ib{>44X&==&IryldhW)$VW=4YPjUQXtx`W$8 z(tun^b2^P<5at7Sm*ONH-nJ2wef5`TuGMw9<`aX+65OQpCakgCh6OJuj-@y+4KC!% z?4zH62M|||4Vtjw*lB=~y7Z)Z_RM=$-V9RZhI>}--tgMKgSCDVj<5~x?#X^}=|!)I zJ^fQF0eI)Q+hG(300y-}vAf{!Sh!(3xnpJLDWv#yqqT8U*7@Q6{~w;f```)WtFLnF zD2~qet!kAdc&+f@qz!oRK&V^D-UkDcGKij0MI&h)G@E0y;*ea z^vC-LpT0K5MQ~_fn&AylxC5uCm|fsjop51{TR7d_NR^pKwmsK5ds1XMKhVU?F6bXKiC8w3aq?Cx9y zf${S&J`VF(<Fx2E`en8-{-LxJ+RW_O;lSyy>ei$#2ZSo@N)HK$nNeNN^4#j!Cv_cmHiqa6VW6aWh_;?@CT)B{D^#QZ&iD)wUj) ztk26S$}ht03MrNouw`vmQ(dG>#;{+fi&|^}PRcU-x&MH! zzJc}3yBrtv_dJP?Ant|BwC3Yha!pdACJW-WM@QF6mROd3+gD(!9HO#!edxb{M_FtJ+ zA^Gw7Z>=2JqTMtd+eu;y>CIQF`GNX8d7+4Uce|EA0AH^05Iw9z*eP%7{K4#H}1TEgw#3KJCU zJV0*14H=hIL^wdNmf5qu%k6C&HsJ#u{;$&7T=>XM-@~SX6KWe4DjKIc&S(RR1a6!j zRhHM8FMV%iamyQmFAml8aIC*n})Av#~8>4o5mZ|4jOs*4a(TR)$`b+ zB9{E&N^mC*6}Z_LVSvpv0q=nGo3(*MKfpOTU4Hn7D~rn;Ho>YH`@az=f3$M<4i6)- zwQ&&FxH2}*VwD5lChmQ#;{}{xu>Ji#RLQnM)BY`|rEd|jV?SBhf=$td^%FLGbrukE5Ojx)Q&xR_gAn6av+w4XyDxAYU;#q1 zo=L0@>M6MwW#1`rv+Uw(X5*EcFJZ45=CQZFWV?`k+H&t0;Bm1!?UNmMp^tpxU`-K$ z@yw()la9KxlA{5+!0FVfzrgGs;<48~aFY;p`uF|iy}w*JurGKV%Y_gXDHT_B$X{?+ zwe_YsVwPdqei`aLOlA+V22=oj8Iea^)H|1<&quvSvu>}9G-^BwZ<{ux0o?>WL}cW8 z@&L7I4X#{p>^%GPL06EbFLXtm4aNwv;I`Lbm6h?sLp+qx&aJo(xX7uw8kAh;!q#;H2NJY}vkX6E^(i z%s)IqpR%nNSPLtJVHJP4J2WoBFtUd9rWBWUJeVHrBfrPevtbkV*m?WR?CGz)X;|I$ zuOX~%SStp~vdo(Q7rXN?kA3xfdlUUj-tlgah&}R0tctLgp~x{e0A5@~Q4rG)^GBPz zPP~jT@B9C_GPiA`COAPn|9=B@a{IyDpRpeR<`;MCBrH-4{8v^O6mV^YVS$^+hmbz- zMlSnX>6I5FE9=k#+yC>*n-x@^{|nxINCVfj^ZS2!Gwoal$h+d6zHks0yXnH|8oPMs z9oV%!z009zXAZyvj24^TLD(}TOVk|pT4nGqk92{Fu$~O4_sxfeUG^hmUHiVbxqIOg zn{_zuP{gE8lC0ACY+i|vb53{pgSqa~{CW;6+I8=m6xB! zaONXexm3`ci@G~bkw^*p?;Fd8ZBe$=^^bNh7P@-X30?J=HndJ~ufEJaHqk{9*Ns}R zuO?3sDubW7x%*}r5%BG@d%e9YF+7sNJ}xU*DJC59ShA8-K^ac+KVzNjE-ehP*z5l3 zOjHIx=cBj@pE2F_Be!2k!&(Q+9n49b)lhGx5htAEMRcdTi_04}VekLa;tuxl1G^8P zitn9)H#u=!H;9Lw?V^sV2mVL6EUX$>IQ35M00n2GkrmH&4+CCyBPO=sw*pvo_D#oO zVXk}k((oQ5>_6X|>u#|B@NYlg{e);saMP@5{s=&TKQ{3#;HaJ<3Ud27B3*8<9={w% zWc#)h|cw=N8^plKH$LVEt5{uj4$QY^YzfnzAI{m*;nOw=4{?*e3|>5%zxSz8(FGcXbgY;XEEX(V2?D8k7+=wKIZ*vamfO z$hm$mdNaghmp+c5E`Xcv@BeCV7Znt2$FUI!Lqoc3E`la>j&w|}v8D@xoTIxTXNboV zn;*ty_ntd<^cVMVujM!%z-#f*QL0irB5|pzie!Z>mmEOF!f}V4*@4Nup2Z#vo{Gy= z3<>d>9bJT&1&{l%!-@v+ZbQonR+)Q$jm>(9JXmG;``O;#aQ8FsaX;>7qQQlEXsQUa zD6oHnS;U=VZhP$AWBo_>cP*kV$xTQqx@-{l`m^y_#49HI2XC2ia^n>{F`e!|i;KfNAc>!cynut>tkRx!Wdb%PA@(9Rd(fHt z&cL{a*Rci(8|>3B$#(bW&V&q1P!2zXpP+$=%2kP2R8?K3nuyhf#p1n7kg}e|9{lp> z2GPI>7+b=~2mxcZO|$yx`ur)AcTIeK?DwN5i)`GIBpt*(axfJ97Z8g}Z3z{Jf2ri6 z?37ygl9y8Wne{v@Gp8XGP<`jl{$mvXAvq`tUW~3TuA}maB<+p0^f@H}u?FwlI}hvT zFpqV9d(UaN{k*Wfzj!{TFP0MyiGrWLHCs{{LW#a&PHK1ST{=M_&XwQ;4Dr~dBl`wu zkh}Z0NV*OnEa~-L2`O>fYMzuvP6C-0eL%?A5E--fFQ@k%vTj_o6mA=2WkTWgrpjeo zE!1MTN0!+i%P~ubc*rdLwh%sgfr9I{^*DzS!GEi|)KsXTgrB1D{wr{EgFM$XZ`tuKbaif=v2ZMf3X+nzUOpJ_@2SzK)n#|2I&xy zsuOl`#-sE)wS{z)JC+c?y6xH_pC$x;svf zGCVLZ3LqRWK{y`~mkwn8K{6E3SM-I3AH@#YD;(YJ>?6wV!om=bN3k7TAh)Z!xIkKu z*G>#q*-=S)2%VG(Gr=Nl22jYYS!{#}EjFJa9s>OGT;%A^{+G49vTzU;yt3#sijapA zON;VsLYtH2qWm#Kq3GzGV}P_Tx132!GbmDaOR!fA4V zT(PVFD}s{}JPzm#;S2igS(Io}2aEQ6E$fr0*>E0X^Al5d+rkiwElFO)3>ZHJmvnO% z*>@p_5z8rU%9;a`n6?mwrFXWAbCm_(XNWhz(FR^k_f*_EY~8b#BCfJAN2c z+wDT{8#cWE5RZN0*2@t1+4|K%5qs`=$ie!#y?gTH#av;S*-aO-^WuLcI8z%oE8%iD zq#L~6Kq=R&(?Df}d*Lf5f1F{BuI^rpSdsjf1SYRF6+)OBc2U~=n^To|yj+Y)6FdGc>?4SDd&u4_wc)AYYg zehr?eL-U$Zv#2#&;kLdoU|DR(uQ@T{8Mn^Os9b5kr{pO#iu^n~oaks!HVsc`3z<%9?cgN-d4?I&a&slu-*=l0UXm9xDKTP8v*ZdS&G|&ZO8v!Vbc?~ zIis{OERU6gv1Gi0l#y)r)Wu;kd-SFIFYJqQ{NmL((F?aH>&`cI@`zsse{_Z6m*l6@ zSiIJ=Sf}I&4$i6jcJ+x2C&hJ~0~6srU+Mrs1}JeMp|=6w#AV|xmQzNk>kx}Qdh8cm zW&x0{vqpYDeGA0!DcY2#*({LdXvnDymVh^p-h?r#Lu6KD?hfME*|A7hFqR!*x(D{k zk8_wWd@Qxn=T^%|pH^eo}*yRHoZBjn5P+1c;KuAhb*q0l|DCC=gS zUN(L6VG`_bx#(uQfJ$=!b(xj355|boav4E>4XMfb>tQqU696qC=A82)fMrm3d z#V6wn*Ey;tZ5YUfmPE1T2{;J$@irbFqOwP?`ypyN9DQngpSl{?izO-3^f9EKaceA1 zS;WMU++qcv%6c+;*JWbB$1ia}tLpHY-0oIWYlz2qQI-lst!E*h=9NS2NvT~E zr~-uR;7XzdDKEd&^+`kQY5-4H*i? zH70MXobe^tr{0cX9VWA)A6$&%%V$uTL-h_E`u1JA3P1?K#@|xaLQ=}+@%U*+$&ajI&;ISbxOZd-2HOb#)clU3+fjbWdR%f{v z7z}z-nTbj$QtI=1&88&c4Y^-lW=DM+b5-K^<Y-*RIP(?3KK`wnaD>t~Oo3XR5UXX;hE$o6DWg}P zT&af3)oLmiJNdi=v{XST=yPaVPRd{B^-&K$#yK%9{YT!@<^1T(Du)KbuNL7@nWTtn zHL7T5jNTA{dgp5xtsye|#2Isz{(Ea(!x~nAV$;Yi^GRUTS2rmpe>`y=kF0u-Gi>4r zD;P(IKGom@F0=VtxP5c|R|Kx=E*SG)dE(m)t9@VhvW>sucJ?dp>n?8iDFx%|zkHyJ zP$3h7BYioIK13875q^jOUxd)%7}?+zY{!RTI^D1Z^0TDd z|9=dUx3I{uLWR>@T)r1ZPbcj4?W1s7+|Zq1d$+^#xlx-CswOR)*^@r< zrX$h(2u32%!;M`4tQpc^LDAVu{uy6+h{tR9>+I`$?&!knicAYcoN`z_DK1bAA>Ihj zg!P}BFo#K*bX`@%ja%bt^ABMh217G(+vDBwsZEwmn=DY@1$O@Fr!HYF_jhNOhE}Gv zRqHMHzsah#b~AY5R)+OFfSUmViMilg#FZg@4&mU4>$T}k8TJ`@4_EjHx=Y(OY5~9Q z8nB z0|fIn;u(=qfyhNp$WHdLhr1}ouwfIfWa8^?DNCp@hEP#>{t-isOcXE0U2}q-413pY z*l_QCw7YfNMlIMUuJQ_K!}}k5Q>|<~)@Ap2d$kizgLDxqK)@Rd*`rP*4zfqzhab7{ zvp7tz=dhxSLP^2fwfFN~4tE$q#%&~_rsHb^)a>|uvx3W=P4UHsg}tzqZB z@*jEsPH5xAmQQY)KfL+iY;OAKpyw|_uwHG@+emZR{FjDi@v~J3~Z}_^AQZ%?xZH{Aj>U-p3E_>NDIY-p2U!x z@m0tf;<3*>u}y&Eedkv>laOPTs|w5;ISR70)>+Sy8fDFqYSrPtf3kacemxZ_;6NN2 zRH=XXNgT=daM(7y%R!p3DG9QsHb=5nUDOeYa~Eg0t%t~v@ZbggV_)VD;^(abOz1}A zU}shvUA6|P5mVk2p>0N0gGGJEZC~#$%&%v$qVE19C-AG5PMrRpWz*k)b)itQxC?ZH zsd=j|akid`4;CBtv){mEAL6k`zlJUOb!YJdH+9F^)1T_@+bdaJ#JKRGWAT)`%E9y6 z?HYGF6*I8RQ`kp`sBFpmU#D_b4h-rIzSVi|s55x4^-3wI>tp}4p}I=h18j1-zyF=M zxCypZlx;r?2){R=lERP1$Nyfo9mN_}Iq(zSqQqp?8Z~7l6mFxhE)O^3yb9d(W2nFo z4_0#70D*RQ|G$6CS+^ale@8ztIgJS)(XhIbb=r%V^%(1X7RRHjeuBMkn8zO7T82(? zruu*XNtbg#xmNd}NBs3H>d@NUWT8^iw_@%>!^Th3>F;;9Exv(uoy`sm#&=)6w_o@^ zdbHQR%7LNqZ)TIr87JxoWs+@&N8u~;a%A6yoHw%m{K6&uk9?P#AI?<{35C~dpT1f^ zCPy$*mnjt5w2R?h>hQu4nSFI)_rS`&yZ@zUxf`!z72qX;y{+!@m=Q{@O8Q-STauAw z_;GpvGf=7_9(&!VQE`N;kjH-hJpm)T=m`Piu&$X0>d5S!>_EkKJ_{9dt^#C5=psS+ ziY}sP@-!q4YdKB>>kl*dp&#Nc-@rQhsH(6t99egd4G^F;ln0|_gRm9Eu8_#OVk zGGZs~BO94=%96F}Of^Dj zl-W3v<$RuKo8TqA`z73}*0b1B?D~Nfb2s2>@#4@B4h@CZ5Qj;dGgCgD*&wazl;#xc zT!jhe_G9=oLoD{#1PYY_u6B3-565`bKl#M?Nu1fDglH)Aep{@btWa{kH^2BbuvcJ)`|5j+_JxkvV^a_e`mk+D_EBIa40B(Rk)F;ipgTl zq#|=>xddL{fso5z<~Ee|JkITV__i6;w|e|#Zoc3X?}r@z6T31It)DC;T5?y^=QrlK z5#7rE^f{PThFI*O+wjB-xg%=~&sZ}!C*iP58VjHbN zWba_m7hZ#yVIGG(B9vb%y~b@oj#Ul_g&#eMDU}Nlri>z0PFEO9FwNfe$L^^MLu3Hs zUm?I$Z2J?p*xOgnz)r!7pbAy^%jv4Tq$EpmGRk#jnZ4k5-NpI!ESAv!>`)(|y;pKu zIadIb-$SE5(r+f|Sh|o?#oP`_jFSLFx*;)yt}Xd1LWX6j+}T8GTuxn)j6X%!pOa@po|~V z7_?x1J&S$fzAFUJ*ng~Y-^ISl0iE!@NjIfMib@9)IY&DTKi!?T;dJxxi_oHB&J(7S z4?Xl>a2j`}MYT=WiY_17{M_cpH-8c+0L{(e&8E%N<~^H7C;n^VyAz+A`1r)lqwk-n zOqoj7}9dHk>AzZ`#R{GstX#@{i@jDBIfFzz3}c>Kut!q{u0uZ}%G_T*S^j2-KY zCC40N^7(Jf|9t-T`RnH&oKMfY7T!63-u%h)({sn?emM7qxlf5Ym(RU#u00o-GtH56 zyXQt{Uz+{S>}O{`Hha_Py|cBkDc}NVXV014KJ&Mk-^@HS^XSY+XWlhao(avUX3m(| zI{l~VpHF{d`ZLpaOuv0PKkc8sWcsw}rLlukf1LW+)YqpzJ@t{Pw@u}yyi*rW9iEz> z{QczflTS|eCfUi(!mlS2qd%N?x-%WK6b`W;*co9izmE zT4syd^MuKw^})ibX2OcV%{*OV1mK0cm@#P8xQCXdfg84uo{RQcZN6>NOR0J>M|i9e z-*bF(nbi=af_0CstgRw3G3?#XH@DUkF-0NLkpsWqQz^zhzZTlJi3(9pITccwoHmG) z?(gz+ZNU|!63BE&=QT}tQs!oPImQMGKcp-km0Z#`xYO<61~# z)ae2}rc;xSwAR$fNgGNd-I+Osmm?1oIc->#iB%gRL!3TcDYW-m92A|5v@>2QLnEr@ zn*!Y(C&*X<&#z9y5h(rI}{LH?Mh zcjQDnNM-W27*2{+N+mVF$}?oux}GLN1qEuy*%Z>`E|Wm7gf&D%+^`kQ9!D%iTOV7a zdkcg)5ojV?m9n=Y($fTbtd=Fxj6AN;X}wWH`0TboXDBu0%XK1=JeFI=89&$+7=f6V z(8Q4YCoLOeRhdlqzB0NjZ#2|74dYQ16q)%?@y(@;R*sY@jd@c^MmSXoYfYdhQ%SPv zji=>_kjY<9tAy_;O`7Vo!=1Hw<%}{c>BOYZ3lF#&3=yxyibj{ko_9;my_5eiQj=Ih zD(a<5B9|{%Qx}DW=EkIyuE~gGEEA6tHHG#pfiCu#DZ0k^+@3^$F-awMo-S!+f`qFM z_##cyQuW5pe`G-K$RtGvoFZCnkail?l!?CJKH-6|sZP0kDRG!c7>a&+juhx(Ym)Xk zT%^b7usc-Jopqj0w|xPsZk0H5wU|>Jr_R)^(TNgObNNE{d?c?bWp~}UJbE_f3ti)K zw>kxtv=&5W;-X$?p0Cj zB+i)^+AF+H3N>A0dYwZ9m*Cc43iJ+bD-ac`DhVb^Qeb{9J<2l>`Y5CF7~^b;@M$WM z)6)VyuBcFEpDIwNC__j^s4fxcZkL^KI4o%xJVW9Db*?ZxHeJz7kxG3e-*#%e0cPLT z{QKIZ3QgD@m2?32Y_{g;?FwFwHJVUR&R`>*YX{3s9W%8j_jG6`1Y1ewnbT^S!Ju9Ps!COX-=SrLPFh;1>sOi)gXzTBV;8GpuSk$b%U^z_rb7;`6O(o^+H#16l=p&21h{V!gQ zIb>2=tmbTjRsqODe)wwwS)Z>HWvzO*ONIu2V%r%x%%6OVL?DX-)a6 zf=Vkqq_Ln-=Bi2Q4|y@BoQx2AQdXb5QzOc)jMc|?X9x;Vp*SG4HyD+cSguNHEP@DNSdlD!dp&HWeqT#xT=})Qc5K;`HAO^pv7aryVpA)B4+K zO={syr)l5f4Kj5$u1qsuM+SM?22MH8iZF50%ZEQ-YRH-zSuP?oaLIwipno>XSn z`9kxer%fPkt{DtSb#*2yHVX7YQA*WN+M<;3QKm?&BUcHG9QKct+fpw`^igx3+`0CE z%UPt{w9Q_#Dim%hMSNLkZ?B7~R4QTB>5WXRs4&?Cxu3 z)Q`FXfk|Q%Qx@niitcKEye9Rf7DV>Bvcpi%cCw+*L6l7t<1lEvt!0V>=!en%gaEpT41{lfi^uDnIfLp*eEY ziKJQ&q?8VjS&8gqglA}LRvVEDS-nYhrdG%*jFY?^t+A-0QI@0`sF`4on18F#oGf}N zi&+xQdFozUF}+3jwpy`8Mk*`~O(qwsNmY{lpXS?Z+NjcykQm#NtW*&Wg-zleoxxd4 z6QxvSM2#iYLg*Sn`MG=e-v#xu~^HXjFRYfff0|z z0jKE)+!P?mjI_Bd(8G}$mDDOq4X&3>9!~$biLWmr3Nxf-QQ{O9H)RHjzrE zNUBVAja*002$MpUt<TXQEK5(qJ$lcAf@^+;c-~)72=4LZ?CB7GL+n@ zVbXRSQEifiyg+9ZB&CnHT=HVbk!#9C*KHCOawSb@344OcHES`ivdK94bJ967g)&AH z)}Y+47Bd!GF?-IX{6|)(C2drIELEEhHJu?R4=mid={=ld_g(Dccg4rI%ap}Ju|(A+ zWpjZHl_a)jfq-D(8fXS5`!i)$yUIhE$b7=7wyT@bh)p-h<`)4#^2}K;%7z_9b*ITu zdJRBwuX$C1OCX;;?JhW-v9=?TG%I~cZ+UQ++{%7@x(BQBdKU1SS%huB|C#0f*h~+% zKn_BZzYzm3h*VS3gx}?D$Xf(|CEf}|bx0ZF4erG3o$r5gPoJ9V0T$G@N})6ST{2rM zAZR-*Q(1{hQ|jU@65H6fih5h;)^XTlzaBk|iuT<-{hx{;W1oAK1CivDoa?P*Q%4mG zOkNi-sQq#Yf2}<{j=l`>*rT(@aXWtD{=NNw8t2}~zDk_99a9O$p$70oJT4|f6*1oz z*C?b6a|XqS52SXD4}t;u503Uwxz4&Oo;+K4EqRnHg;6mk8CSCz7CQ9jiQbmEbsV;I z_m8>olRf>*H={TET&w5et$1TiNzsT&=tMov$jvT8TPYZwYO}qqi^Dwjy7A|Zu(wFA z+ueU|7Q+J@B!?Wy8&X^bzgSC4iq2TZ5lMwLy!YnPzj9We^(^+*L%@L@fQEkVuW%f1 z-SjuU?0|VPI@a6tw~2R-{Df1(U!m;4>iH*v2O=`NE=M;?GAm47<`xi1iKX7*g&{JJ zNIHlc`1n!}aRb)X3o-P(eFUMP*|b}%3PdCRU^pq|-Diik_Lk=)AWUFn!gsc{ zhxkk1>UogDM?w%TfR(wl5nsNpDwh?4!|PAmdh_$^S?sY=5SHm9Gdug<h;aoW3!i|Uwboq`l4Mu1X4O<;vh+T zQ$}~AY^nH=;h5UpJG?kd=DhqU*1EfgT7ix%5Gx5~prkd06Rvy%x$JxK$S|1|ef4eD z{o=Uc!4~IJxhb|Bu?llB=x#%)s35SAxmox(83wL3HGML zJve1ydADgeEIo!xMFJKOkYjSFO4B>sJG5;hF8j>ap4=(8WZS3p5HqR)qL_vQW&wB; zUY9GA3dpw>Ct@f2=xKP}jhnFH<+r}BM@vZU1AvJpgJ@Qi+5uV}cJeF|zY(VkEkz}h z9!eQ(*aXq%A26}|&g{Ke7FYeu9+!>%7C2=2Z0z+KE=&aW;USz9tb9&_F#PT!*v3?8zeH0-Zb+Q;B#zz{WZYOp!H@$*zsmt*$U!I-Ha{2y7EWJQSCQTLQHucl7^6 z^tjxNRSpe<--Vs#L{>pqY6j$}O6&d{E0ST&9HO$sJFe%luXglHG6>kMI?)YNpz3v)}#5*tOZCe;( zVI)vp6`4{y`oFn=8&3}CMEELJxx!0Dw9<0XmQ~nG4A%iT@z#^srFVW|;3wbFS1B+O z`^>8x$VqGv0GDa`>`t<+v_|Ujh}1@s{5w3e9q%y2L)`hUfuDR^|I8g248a*&FCK#zf#xD6W=M383(&8|WPZ7CA z+Y54iwVddyI+Ja*DLt(cYjie|+Fn+TQ<-g&Q~PDhJ-dyS3tG%AF!DV$SU0XjS|` zx#m>)MFUP4!#w0Xt)AD{8L@-xF`np2-I+GmXeOqUYNR@^V#3=D@mP_~ify}vX}QD9y^Up64>|mV zG8QEMHpz&!_Cn2(4QNxmoO_j!GsHvs-{%Id^5y;Y?!FyZ^%BStvjsN z+X+vKEY+318f6SqRD`|uGAPqmL)bircr4+54yVM+mf4dp?fs2iWVRk=HJ9}cz_kOQ z2cg>~2dPX_2BO_^xPm3KkzWwPS8%7rVb*m|efarhE&A_b?Lb0QAb<|8oTcozqR7Jza45tuq5e|`sA`5_P_r9_g}JuJ?W}jXFJY$#r(nfskv8q@7Frl*U0RPv(L^xHhcHTyJl~it`$Gk=-+#mrMP56#>$^Y)qiWMjrRbMee+GfUHdm_9cB)#;0`93%>1f(6-x|E`%5@|dh z4rEO!?<2gJP_7zH_`XbWUR``QH zlT#J;e2b??qcJ<#V2}dXmV2BTsayEjWTQb+aXLzS5_$wgFs7gK@{=)1u$^_(Y)(s_ zuu)6r@nVvpREyH;{AzVmCb4Ry+dJa|!&t=4y-;JEQD83Br5E#N^K?>{aR=2Fd)r%3 z6qK}~$~RBcWf4kl3_6T{dnoCa=pPj5IkkuIlp<1T(OOnT$(?WKyOT)iRDoto;?c?i z0Vc8CE|3Eq1MN~t4PkAdRFG%R*&~Rtddp;9W|L>rAS)TeVS#RDk_4rU<)T)vNf{z8 z_zO>uR~k~%V#zXTYe?)4XJx#Z5blR+lP(9#36C*TleE%%dD~1n?z9x?Y_hG=cB}z$ zTTh(K8^Y3YOGrV<8%3#9;jd}@@iPzd9gQ2kKGeOTYxb1VP;@N4BK)p`&Jz*6QXDTh z93geeo)VhV1w$}EC=5YyzD8w^@E+E5tf@fmNl6!X!0^+^ruQ#z?{KcvbgUjrs5BL~ zQCajv?J47vy!cp+Oi+H@T6G$g!tYX?GAhs$Q5)gYMN3S! zp!AR#Ra=)%**?y{R!nV*X%zN$wJ2|eilp)(K|C4A67?wUS2pZ_(HyYq@|7#?uyjx^%VUnGoj_Jx9LbTr-gOTkrR8#ggYCaXN2}?? zQ^)+#Q^UOch~2CVhOG^yH&kt;2+MDT=06qaXs`QdgVMkk6HSTh4Uvqt+A-#m;IX^OIYip3T! zq3nsVe-h|QoGK~G=${g$Xofd~IT$d)KR|@in(wr4Zo*s;8Yjnl#)kLg~c%m$EU(D0pPSQn1 zDrIFn;H?$vS(l(C{%T4}5GDr};aXGMlDH~-e;hSy%p!|qRsKeqNp_;HU2DJV)00dT zejTH{4CBk@Ilg_c93%?4cF9vBT&0$D+rhQ&z&j~V$viQG*{V-TE}0ja+hQek6i$Sk zQZ0)!r<^P_x47FBk*NC1`9@9Bh#23=(>t)SsK|IjqLR2=v?Y-_hj;U*11)KROw!VJ zBInemVySJj`~&MVYi*38B+z5tAX#i%sv-E$OmxOD&G#n|&G}K_&Kyl?!q!yw%!+w3$pTn+Ub@Zd2wGozR@t%887>NvaaXteuEV3oDhs zma&lXW=WSSnHySDlnU_ehtH^rZwqvnr$M*9ws5mxpuIWfoR09de6Au*R&4QTlrZ_4 zWO!zbf54}+#mGvrWb-C+m9ipwV1%c88wwQ#g|aD(X4)Z(pL(W1uLYB|mC3se&Y~+7 z4IfGgbVD80nZ(UBZbYt}C3R5P?>k`~zXnNdo55m}NEtHdp( z?BqKHx`YsuW{+5GGWr~jLVQsy(CIMLGv7``Nt?PrG1Is6H^Tcm z!okFqsn%&-yG1y4;hN1BpE|<#$AwT2H4)Lqd?mLum!7$r|6OM~WT52Dyxx{{d+Mdg z=~H}jXIxy+Wc3=tm^P>LY02e6^N7KK(z-5#jf_!AP5Mk>g?Ab|ZZE;4>-LPvnY56p zQ+~of;HWrrw8W@u#c8iE=ps+~H-TPIw_&G}p+a)a;MB>jPJtdx)Todn)ee!#nx`tC zx}5Ki!{@P-7>P8Wle)>E%qkq8914Gd2%BSeX(tqGhb*#@H92%pPC7hpTTQO5hqRG{ z$9Or2?@9SGT6a~Z4PkL3gyFYWlqM=GuNA|_fT68Y*n~CMo>kPzlHA(J=%uLrD?R0p zd^hcBkDin!i)L4?>cq7|I?)jr+Om??Wlbe>B%umcB-^G0x*FfHY@%YtswNdO#V#Ou zx~(2;5t*=6VMT!gMn+ulus~1Y_?mYp{fcr-9H>S_ykjtJb0rDV6016tWTH@1%jJAH zLfY0bIJ9J?ma`@L#1FKYbA%qmYF$Kpj+K0q9`pCI?`|<>>2s zr+K=$C09~5SElJG)*R`!LL)3p=8{fJd)$VG$>9z~HB^TZe!yH*xX6+;Mz=H;n>Zal za*iO#Y;h444{{Qc4V#il(85XEY_j<&oj;IurWF#cI$`*;&|a4!X^WXK2N{{VO-2?z zDbPupCJCuYm(aw@ULtwY&j$2P+SJa4DeO`Kch%~yMdMp;<{vOMC^21Ci`}k}h9Ii) zMcy@=Hbo6iLY>#S(s7b>I}^%Fg!XP%hSas}rj|U7(n*Z`0)eiJrfHuiS@xtIrGP4S znns{&q6qHG#AQusE$xdSNNzW;>n2KSsQEL}q^?@x@#}e9;5lSsM3%A_!iC9k%`_=fshQk4B@uskp&0?xiMXR!y%=;R? z2q$$1yD!mOSQuilxB3Anu=wHow)Y!}o=6b*k!0@xJer{s0`;_#LCCONnl`A*As1`q zUir7l-opHP4nWTRgF0&4?lGm-x|d52y2k-*@%EF3!PSaTUP-#Zkd;Ej&DncVr1kaK zrRw!h@~kM&gcuCFN!eRBgA@FfEg z)?~>{+Lj>P-kJl*G!Hg8SLG0yb$)Q(&?j4iM z>(REQzxV2%SG4FfQ${yo(q^3rah>*2+>F`9-hK^6dWgl_ey@6jS?<4jO%JIn*3~O9 zHaz%5#O`hvNWGfTC0o&8(!x1+wgT+{o{=FId(Z=HGY+Dl|M|DVbB{pz>o(mcN^Kfj z9sAMP7su`$*t(d3t!v-d_~^@{-yi+=(NB)vI@%hIj66DOT6kvR(NS{YqYLj^C@+K- zRD&?_KhFPbbYyh*{MY6m7zD*<=H2t>&!0L!JNG|xKc4&2+S zpM81ud$XUP{lx5hMmm+*`s@|6Iw2VT*E3JgJUnyP%)3Uu&4t5{d~^^Hzh(N5(?6U3 z+Vlg{w@+U`ot}10pO5N*b5p;Y`p>B^PpwRSaOy2n@hRJsbZY<9#N=;BG?ULwK0f)$ z$y+9ylUGd|CdHFGVG{feOoES%Y}*V=_a;+GRoO*}Ml z$Hdzw@)N$lTLs6T6s2Gl{LsjYD_mci{7m`20Mj8VD&bY8lv95NF*Yed=6OQnWXJM8%!&oJq$aE;X%cg%#- zh)?R_cfz>BhKqW{X>7^d4ymV=_PF@=#=5&m=R8^3t&a!vQi;dP(*t!$iOjZ&PLs~( za2Dhqe#efhODPFuWNNX1wH+qxbjQUX(⩔p-yTOv@)4DR(op!5bqeDjXHm25W>ZoNEL#krX|)5O!|4U2{GGHHDr_9RK$>N6=gQ% z$+csp0O@#IXzn8Y7G*JKHQ5x-X7a#u0@-Ah5cYtnO-FHm^^Sj5kYbWnXqh-0Zk9VX zq{n70FAD9AQdKSKcH(W-a+Ac!pD5$9REeSd9;I9x$tB`JsfrKt1>Ka5Rn>*MTwRjp zncckUDlT&sDN;)oJ>`a{q}4>v`~m;7GDovQS?!s8q?pu8Gvv9jo^+6%5tlg-RojS( z<4P~B)GN~Zj|vZ1qAJRz@VOfaLRreDch`BklxajsNdzbKj4=vB@`e1tIxY=l>!c;% zk%X$1Xrz#l2*V)tDpgJtO=#d?=WNC`Z{goI7***zq%x(C5_P}HpP6;9(WRb7$gB@J zV)3Llx$|!RSA!vUlQhX|L6^~K@Wq%@c^gtZ=t$wirGSx;sUdq$aXxQlz&O=vl-g)h zNwhIk6{2g)LUf;l;c$laAqgurO`7N;uVkBM7#F_l5I_}pSf}~#&GdilWDxD&C@fO#(FN5Tj zfRdJk16FOZkUGfOuMsjF_eE4$d$VkDv^+LvPB!u!FW(m|7s$3)U6N3_Xdogv{8xeQ zAgZ)ns;wht(`)yV^c6han<87J34wWmcv0^UMR#5!&>1)Creq!BYz8K5HF5U+0$uA2 z5}gq0HqowDJQhjpRq_l^BWEF`RfDG;br0vQq}Z#BrB2Zgi%_5ns`V@Ta-U_}0!Q<0fk9v@={qx?Vs!%>{%* zxHDR%2#s6j)H%cM7&XUVTH{WyTS+-Q=?;;%_-u`;Y$PwpF^Ba;!3a-K-Cwa4$&m*H zI;m9?vbe5bHbyj5E^N4nr#l)2FJTVbeL##4tJU<_zXR#&N<#%fOKmIS&R z;7NW{g-PbcPF1kOSOxWQPzfzr))R^VCTb)g6|L|O*xRin5uoG#ggDwviKBaXqg>ox zPx^_R*c7(6n;~0+IlIBXu)Xe!lM-7qQuc(s8s_Zt1acwi0f3@8A+J_L-lUYjI>tM8 zbu~;VqOqE$XwDUx^qwvJ&)OUaHi_iIj90JHmNPQ(F`jO1HgvR6Z3pBq5L83>U&Zq15IWYrbbMQX)B014!Rm<+9_T26l_uTR8N6$z>R zzQFLt-K39EG7Z|Fab=|!3j2`NuCo#0blF&{Rv0=#iysx*+Y(kHqN}yMWh+4%IK8mmTWiE*YbiSff}K{ZmZJLn_Awwf`SJ()K!$1OU_NO^TdH6qbu!L)Qg zAHg3t$3b^xa%x44iiCaP3l8zUGDb2CUg&yW{3;*LM3wLs#iG&P^kRsRn9@Q84>d$qry`})=>c!WU37m zDvPkLnN=_cR$)zui1MdL5!3(o>b@T6+Hv8V@0&U2y;Jwyd+xdSo_o&uxl;^h)UT-X zb%(!WQSa`^FEkV_s>@IjrdhG8>*|YT>&b;oEvjA5xIFM~vsCW<_sGu&nt3MPXcpD6 zh!D~7bFvlYl+HGjF}ehWyQnP}GxQDe^NOg3G34xA$K6y{wJWL1Dx^nkjdZ@@voKCm zJ5@2$+iqDW!$DZ`q=B9jubI^s+(^XO1Wkfzbu1AY>E;?|+W0D&u5m}1HmZ$c_m8zI zb#9A@v33n~(!y$;0eB{DsoD3-^rPEXB%nLjpN76?aWYwH&o3tCnq>RojCR2{QH-wcpb5 zYVyYY$yS-pb6wiW)|1I@uW2h5%s0z)la^(el*MLjR+)k_ z`zqqQ%2?<~hzbT=;kJ*_W*F7}`^X2IOP&tR_nZL@AB<+hXRaI|a?C}Gg6_1vT|+Rf za+i}=J|WWucZF$ogqqd@423##K|_`kGM1x^pfps1o^YJrJ0m|Hh$QJ;yc8{#?3qxN zF_0_njM?E+P&NR$@zGdZVbW}ucR1!1W6;hdbCf$)RV9*2cGEqwAeDioW3_Y#8Hw3? zI==NPLN{fs998ROgm8~aH!Z3|ve_^tLtQqT;9OoFAfG0B;<)^L5*g)&NH0iHg>;_M znoKg?N2Mrh22iyAY*^uSu?G&z42!DX zjQo6zi!y%3ZMJekutG7L-;l-yW47*STe_KCL!X+K_W~=16jE)pN`&G$1BOBf7v%B_ z%4ChM89Ad$U*p^=^}go`UEfLi7{TJ~b(*!9sg*cqS*CM*myHCebTv~gD}4O99HHyN zMus+9G_hQ!ku)>;i{*yu9JpAHMRWD0tzA;Ino5_fDmsgzN>$UgR@SZ!bah$Vsw_yK zV&JQ0Q+~T&Nc++kzLWH*w(hOCHN3Ispi4GZP$gw@RjAUAMks4DdP8O-V-_EGAKiQF zW0TV;yFV6PI5c;~?3+*><4IJ<7{ci2;61$Rh0KW%cT1$#sxeWW-W4bZ-SLh_R8-+f z7$J+RcfSK+j;1~P1|O*+#2tY`D7q!PqNq|Mq+tSBhV&l3p73x>u zJs3uw6UVmRI}CW=H+cBn2tHaWKq84p^fQ*0g|XJkrGzhI;El?mMDb_uMd;B8Ppp1# zbr`$3e{k9R5PG!V^@3C}n|QL6CJW_el8tsSg&QUDuy@x^@yaSB8!2@?7b3h7*w~3DHkIil$Q3j$T2#3EOQbu?~MUm^@`QC8s z>b=ok7VzKZd{hA3Hj2MVrK}Jq-WHF&2_E48e#5baQ%?TK;D{y-l+1U&@z{>N!2Oay zoB>T<0G_6VkR1Y4vA08nJoZKiIr$@Eb@`=N1eqi3{Y_HXJ1YO8m>Ce@^{7P#5E%(* z6%b&OIMgCLDR*#WrYtq*tYceF-@G1{51>K7L5Bc&BH_gV(R_$JpX`bsddsncd;SS` zaQMd`JA%?^Z#%Xf9|nkUfTIIvhmyc&5j_w1T~u5i4$~*zhM4!0KO#PViUHuAe|h7A zct+z{o@BOJ0f$t+@E~~>8?>M&?fex1*5H`Eya!U->jl)%=D+ zK2m9P;!aOQTiOO|ujay;TneX5tr-3==E5i$DH(sga`5Pf5e1DvQmG_5@$zR{Y%f7a z+bVm$+|dVh;`T4?L}dAWh>{;+iAOI$7LDgeH}4%hc;7Id(ftC7kjruswzy77>unlW zF6OQodKvM?qcE8xWKq|C>p7z08$UW_@ZwR)ywxCp+=c|*IaP*9@+lr5$qkK{7r*sU z%*qEoj$s(#iH|@2EI}#Rdyka<DBX@$ff|!*E~}v$+>i5VT#! z*AOEc^%$xZI;-miZBeh1O2&uA`cy5;z5+$gF!GdG-4c{*SKVpP{(#xx3hR;_OlRnU9}0l*_HarKsm4h^pV3=H~ysXR96`baX|$|y{Y zaK7lsX1ui6co1E`kt#kPy5``mzrAn&;OPgYp0~g7TD(s}x|LR?+m1VraJkd-np3p+ z=mU6vBNa7%e}#zt$Sr#Ymwi_1BKHeYUdobapJ+u- zk%z~@WC%JsDNdEa?8683?6>y*p=ABcwUeSYm?E?MJp9ArDzxV zb}EsI=hEWe?t+XFvZxd9J|zAj{*nE&DmBAu@t+#NA+cXvBwl~+18VWfKi#!WEbn;x z2gN^})t?e?{phh}IqV(Dr&4jKw-1X$Ey6gZaSyA(F37tkmAWQM8?(3C6^746Eq1fo zUsT4$fB6!O()7dBF*((nhx zD{}WP4Zih7Nip1O<0m9g!FZ3N+8w$XW$i6piV?s2RkUJ+i~^5d42e{4-SRak#?lxB z5VdgSni<^S2YA1&s;os(81cqOAYgzT_vo>Miz8(5siOh`!1&#xl68Dx<-|vHDpa=4x+>Y4h6^=Ht)w{q6|`Z5 zEXJph=P;}()%pq~V2(-Uu1QaJHQlm`rWGA~9QU|_hY|mLKSYd>rJ|iOUPW<$u9VG? zXVaW@wlVW>(~nO68Tc}u1@Y+2ulEcPwS9(kf4??|pCR_sMP=9wt4+6gg}|Vq1}$Fn z9jpfXzlYUegeQ6rzYmw7Vrt)@^F67#{rUU#pdPPF{Rjk?EgWYSiBK9>*C6-7pT_2UpRLPjyw&mhSp_woIM z#~&Yd+S-;ABAP{Gz)z)}e6wm)BalxiUiV{6gHf{h{LHVe7(D;up;20sN`8}BlxyZZ z1y)(l2|Ww1kFtz-_Ycv65wfUTyAGz`|C#-Rr5{Nj;aS@Z5yTo;vjxh+vWh~xVlH{> zHm&%*@1q5yWZ>4K>fwp#g@Ne@(jx6zo5r4<2uhplhHOsbHYHo-U^gb-^>rAxjYMoU z{&?2?-#B*7*m7cR9(Ix3AS-Z3W~wV#DyR~S_#>)*ijNqfO82>r!2>_Vacal5VK(yg zEwj$CZ8O!$N5+3I-QB&2quSbz6Gt_+$m`T}&7%>lUR(~>Xfd9|fhPPEGGRt}V)Z+3 zzI^b&Q&KvzYi&1LMs(WKY9W${Z$=zyb4Jx_iZA{GEgPYVI{!|@2`F(A%KwsduT;C0 z^h#HaIy4lY?L}fetCHO6b6sUt^gfGD8KH_t51Y8b zW6w(Y%uT<^)@F*qdEuasHe)u#NUZ7a5 zo}!d>WmA^K^xWFy8z-LI^7Zlm*mCcdn+qlE^b@+fAe3SNz52$4vk+hGc)hn z{LH*!^P|(V^BcNxARs2PQ5Xj|nDJcgE35K!x+7jdmh#&PAIG z+fu(3HJ6(fIPQq7VNz=av=;*NlwqP(gyKi2_+PW=wXS;h=KwhX@x($6}Om zuSlqpC=Bkln0XL7dsT#u-0mI{s>4oYR4{ej;b8%BYVU4YbPiQ=7`G8es9s(fL+-Rw zh|+uBNVs0)b=#2N9c5iYNGd#zg3m$4p4SmBN^uyoJ*Ux0RJ|7PQ(>?2l$&MIv@;OxqNZul8F1yC zQor_`z43pO-$mhWNCteRJ0L;kIHj7~E9~z7B5W@2>gn)Js5ah{z6Yhbi$Qk(b%g6x z;KYxvHX)}Q0|K~Kw=u}>{s7?yaq`vS2<<93QE=TI1`@1aLGh=&E6hoq4~R>2D7p)stK2P+m!lNM7bDLDFxSVsjOGIFG73u{ zCR``$w&2H&d|v7YU~BiBNMPUn8p6fU_D};}NadUY64C*ri9S{ARuC>Q!h7bGVl1FT zwtKecmg=h;eTAi~cOWe=ybxXV}!`zxrUABO(omT}=M!ZzavrAP2B z7E{|TfjB{b_y0iVqF_J_I-!G-K^p>I3Ns?N|C@x1engs#tCvN?vw%d(qEf%9v;S_w zm9z%6m1!IL1W4pa?~kn%eZ_s>BW#lr--2QXE)0eZ#RPPWv*=aszDDNa$Aax>PmiB~ z??;eI4d9ah&UG%D#XD&eg#zbLEI4+0`oj2^*SRi?K7bRbm=XS(fQfPSqKYjm2PRge zS&sVr;b_+#2o68d0dXFs4}6z!p{4;|Koxm_ z)S@2+Xn4S@IPfjPMa_G>E7iTnfB+Q%x`y%#2fjhLdcnEUi?-1%k`X}zbd;ou%YTr6 z7-|#BBP{{ioI=;}Ip8&SmcL54=p_I^I0K_6cdI^2;uW2 zeF?J5?fxuO#x91L<6tNABGi} zwkSd2>}*|@xovlV=V7=Cm=Un6c&cbpE}Q`skTd{(C_w1O!Y0Pq0|tEnW=8Nb+n!$M zx{Rg{z7*a=4ra*)FtV7iAe&nWIa;zGFtxC2E?Vl(Bs=Ak-$kV@Jq%A2b`?Ktv|&Xt zDaKqfcZJ6E0|vKA5e?fEC;@>-UB&4qWHt^4~gpsqdOvGtO$ zg+7>EG#vO0i|3GcQSv{)V*s%zq4bsuFx2RFX7eoJqS8hf4Hj0Qazij-8?@BPEXd{s zs{jB?F;;N8<~u;ER)EV+$)W+qCcxQ9qfdIMFW!T4S)$4<16ed?H&jn*H1Mu5g((++ z8n&zwF4j{cS8xLg9PbIy6$rq@QS90#zYI&|q=Bb~*{;WY4$>|Jq)o^(Li!dbeiZsE zVDSw@=jmW~QC>5Bn2K4fAhr%>R0my-PqKBk|At5gk~Cl^Tt#V0N?H^JoSLb#GR>~D zoklMMkYfc@jzMR_JIwLhzE8MtsiKR~7c71_2Mv&PzB41+c|e@Q*g%VbumC#(6@(jE zvEwoM-8SaD0t-6+mmusgp`qk6-63}cY9?87fQ58X?ggErLmiY*VfH)n%fMj9V9;1F z!!Gxoua2w;Bl$h=OguG}<1_NGN!Pdj*!PH_fj8Wx|FUT+FvHIf)j9^bH+JZlU zJhlBFG8dnLbrMxgoVZE^h%~TI%!Ms4$XvLprM2G&dum#N*IWkx(BLq@)Zz0+SN3Aqu52!lcb#qgO9_(;JBnopb{-2GGbJx< z5?AU&ZwIph3N3M0eEfuLK(Ox95F3EmfLVzKve>h^3Y+C0#!8PLb^+%m3efE+%&seJ zV#j5z2EIF%oTyNMr9^Ev8mfl{YU``yW??myRsrm^u%W{sLP?#9okzf3f$@b@+nzBJE^rhBE7Ff*wZ{qts}5Vm=QsaaX2V*+9AToNNs>Xu${(dB zIGKxa1v;S->$$YSG@5{c;_PfWu+DX1XMp$6JZag&qKg$}R<;mkX|Dxb9PFJ}ie8|L z2eC~wwYQFum$5hq7@siAOc>iwY0-tXU)IQ?@ncRb(q60;5RGjLCLVL@G~r^$gS8H8 zJq8i`X34bS#%Ng{2p2v>k4-7&KGYRENnu9XL@#fdFNoA9zIEEgF(HH>jOCp)RySi5 z4FJAN*hDS8pNL1ATMtyD)a6)wv8%%zC@kGL|BK=KF$@j1YGyQ7+EaL0tbx#WzOZzu z{61_559}GNBGN<;aDuecUXnj8*oo3XEN(uWN2FnP;eW4UX>Q@Yn>x}#zA-$qXt*L4 zDTT}Eh22L}i!mM}+*`hg`~+44Kt*CJ3KIpDl&n04Zl81EyTc~#m-G#LLl&D77&S8> zl~8fX5-RKky5EIYo`DT9_R2Vs;OtO@0f!;?LJ{)a@q@KVk_F=HtMd-3T0VPurTEQ)t4hte| zv7p1slV`^F$uCpUB6i@?-V}g8IO1S2bQN|ip5O|@jV-VlVC-Nh@e{f67iF%raAE<) zc9}L|&*FuVjViaTuXfm}<|UPa!ps$l(w0W*zlB}5KKWgz=>7vrd5t8W|M?W(rhW;P!EulbIq4jy#G-x7^g(29(34{{=eeKxZGc?RAaCc7nsQA=vXRL#( z9*Fffi?^>G+k%@%?0t$uTvY6VLO9@o{)U#D)Gvx?Yl+opZ@8U;gLTb6Ay&?i-6Qp z!m+a3FycH}cdUe8#I@N7Z|GQ&t7S1S9gFOR*@iMph-Xn844qgKv6fe+IVtmt!Bo?I|b0t13|~tcY=kZb~3yzT(g$b*5IqyqpSi@<+wT z&ly_>n411Os+nO^ox>qF=fwQP)=086*b3*{lEj0%Ps$aa{CMi@!OeHZ*8sagnP+Toc)va->TB$X~l}hpEx&EQW z5wiG5d}VkKxHOoa?@NyEwU-fV_>#w9X4q6K(#?6JS%V;n*e#yFxxamJgok=KUpzRd zZ0=tziI5O$h+i>}O3!w>Y|{I*sH9y;W{HT%RDb)nQ62{OVmSV_@7h0jV2XT>gj+*C z$7ar!7{(ie&n3{#s>2!a^RxX!+eXPEwMVL4BSHBnw)Sy3=30}mY2*Z^V#AkXUEWfW zsiKa5QZ4>w23^wKNETOx&!YIy-TMYtZ$XbNyVp*Eo0K>?k&E5**maI>Lh0xQTWayl zpC3E8u#qYrzR!<4l=QonMW6`*Hm7kLGR=PfU)#io-}>_pir3x-5Qm3;aSX^zYs(N! zkePgObuH@6`c2JJP+JHjNjG&D`r8*avcx0IG3nxWulPaJwoAlqi~T?Dz&#YX+PrUA z1XaC$4<(kj_vg07O))0VGLCA^lJ9Xnmsp+X?-KuQJJe}}B_4Sp1aQu8d~na;@7tx$ zbFQ6*&Le8cxfotghlOZ^wc=tipdxDdx&4qc!UM?XrKrL6;aism%S-($q(P8CZpa`g z1l}HEGMvI@Hzuq;pFrg7+XFcxJn`}U2XM!zeQE#TwR`$kj_voXoq--B3ZZFt(}=yV zDod4KAu1lB@KKeW{ap(q3@RL#67oKDVDSB&l2UorB$yjAoDAiyMCqK_o3e26qBbu( zht0eDJGPDTV7Nbd`QXmoeOxPe*G_{BxgC*+F3!gJWYii108m^0p0_Rcf!Z>{6LkaY z<%4IIi3|zuhRATIdOAC8&7y{Ch4qBY@|1t|spyjt9!e_xO*i<$srVFJcCJZKH{@GN zzJ|7rJW+K!?e==J!93~L)iKBz;bEdZhbubMPnHHd$010*n#z%yaBrUZ)b!7$7AGzr z6Ls-3P8ldFn=g|-`DMJD4p&yE*=8!uyZLCUz*D04LfC~{F2JN7<=s+UlJ11=-7g-$ zp#L}V$;tk?;@%7U2bP^{7ohD#x3W6mhO$cBi!=m(-Do5#nz|58A7PQOuE&;tv0wbp z3;Qn-dB3=*zkJ{Z$J+T&4k9p&vMH$lYPD+JF5V13{Lq9}&V;}b77F#?zUbM833zhg1H zktN1WxCT{x?4JFDf1EB&9{1YIpg6ID!|tJtr9z~w4!fI_tZ={Ci;o=PiH9TS$*5Ph zeVE9y!c{g+7{@Be2E7`UEFYNu?UZ~MdgY6-J)X6TPV{G}RYs*0ilUQlwr#WP%nDm5$PCsHm#?+Wx7A2N~jVuxfa{cii zEe}4b>|ZKf=t*U!2_~~5>T0kmzb=z1J3W4XMv`)9VIviRkG~>d%!8I%ngEqR(3zop zfsW1^x8!SFlKl2F8cgg_o;ddF51f7LJ)hY#uxa~FT-_-Q=_aKJ>Fm~w!;rHAG+erc z{M^M*hY_B*x{TV^>sPG12g{d8ec)VEp!Ec$+Ulh1yn>V=QEou^==xKlXV!Y z7mU~-jqt=HyWc_rw)`eZOla+5hL}A|W%7*6UqwNLm{})ehldGq+0b8D9N~%a zKR<^h@t!yBA9M|UDZ_Z}67(9$Fm^G)e1s_!I;ienOvTdTjaF=LMyN>sy@VS~+WNqP zPOWLth}R9%la)S8GDz7_&njzjMXJS=C~(l)QL7yi5>@DA0>-Ne|(W^@Eu1VRW%c9YBZg^uGEHnU1u?6aYl{ps!OD9z@f$F zg6@oR9{J&muEFPA5OClI>zWD@vcqYEe3_y-opm^Dj!50+gY9N86d$Gf+ZHym#MN!* zAx!48s4+W1!x-J_>F4(1$ctm06Al!(p^ZKP-Xa{5fyaE<(?7WDWZc2F?;HmFDd+3& z*oy-+o=(Ea4ZqvagPO#_7?`+td#CtjUw`{4Cx7IXn7CI2APEP51bRw$7Vtsh!Vi8+ zNH%rEt3&<0XDF4gF#0Eb6c$_9aJ;-E)ZZc{3kn zHe6?%>=Km7cy+7~l-`p*BF2CDW;t5-Tn5#MD>sz;yAW%8&Axv*duJ5h6$!>TD)1OJ zTqXrjNDUVbWGZ^D?r+<5vPTAwe0L1dw#%{pj5z-q^bzj2aPca+?UG8|4=JPzTxZzU z8_GGTP^f6?6_E@leOmOq@6`1p-(RljZ{1Pew4fN4X}%woQBOgc=JMe5KfEe3CKlrT z`E5l8;n03 zOZco6lcK94LS9|M%o*Wfr*RtzxO?pAhY(v|g6rZ6fi)+|aji*}n#oZm)JAAL z-31D%kS+MMCHNF2^Zw2PmcvmV_K_cv>aaercksIcR-z@x+U4jLB8X0u6CTEp zkdsyOD`u?d8#&@rpR1fj;$aS1&>DH46qn9-5#($1ft))%K_hgvpXIQcIoG6G&16?s z3KcR)-K_WAAz$1dPGjwE!}^bqMcpl5J9O($9^5miw@J52m6}QSn_`Z3k&eXk@v^a2 zFVs*jyaNd%WbyH5z9=8=OkGKYcTFnPOw=)<)8=U=Rcc$U$w)Jm}t;bb{NB|G)< zaLViy4Qa?3;fd8F2oL>WI=MW!D~-7?@0EtI%%R!CGxtt^e`@??SmpzW9+iqWlf6>9 ztWt;Qyt|q8){M<;fDFP-@4(NDu*CS!@0VgPu_Jqjw5LRNYc0j<)uxV;1@=@?LwfAm zn{cQa<%!StK7ZNZ;hWGp>2T{m@tKYyTUSx3Y7kd`E~h@D6%QYVYL1Y_G20J^(W}dY zKOQFI?}G?3{+VJR7^BrzjknQN*V6(}aSvlMfBtPS3L`w&+iNkG4IkV)*!Om6qv2ii zLJmv6{4Ln%jFQEt3gc%X%6n;Gek(K@BBavJM1>+i>__}x~kNaOK(I|MtI^=*BQ8$L$oQ?^X)_yi*?+ zh!p+?=@dS~6OX56(#h6rz_}K%9X?-GMhv|hr;?3SaqLHrohv?k=A(NDkG`9XqEv^9j3VmAChb&2)77;L2uTgH z;`K+M2qR>ijGh=CY?cOpJR+?zSDpA+y|QDgvq8RWK-fvs63s~hc8j}2eC!BM9J?uo zPJ85@r9nf)$HEi%a-k`sLT@xXR8cJzP7BB^Ct{v{FKqfo7Rix#Rc_xjfzGkMkEnxG zWs0anwdE`+8BZsmskQiEtS%5)SKNYu9Oa2mJ@A)v#G41nNjN$0*)h1|7HK~qRhA-S zS+W>ZW;)1oAx$e)jBDg}z2kPs8s&*c$F7o2aC-;O-cAg8_(YpDT&kI%{Vu!05w80H z=Ol7>pr1#`;`V!P93Hlp2Vb}YLnWQDLy$qns@q!+gO4ADO28wMf?ATblQQXWyBXB5oFmJ1DPg$VzV*&NP;@qM z#KV8O{ao?Mqj&BeTy>|^Ws$W6+Oaa+J^52zWr>OUT`fKvv4t8rXEk9pf-VsMdG~GogNq|%@#u%gh6k8^gT3#U zS`lAMLPUFb4s)T9XqBynVEp4LOUa)X-}2G^S=&a*C{m@wDez-`M6KE^Nklny47OOZ zW9%5sw3z=meszQ_KC*h)HTd1f`+>3T@mMEjrhW00I;oFzds;#C-3uEyN){h^`eUxa z_wVid#^UR3m4AChK`|MP3@St zY)p{O@V?<0{^cA~y`okE)Kj8fqN6!|(U=n7xC*%=WN|F49B!cZ4_;iwqO`4O;wmjl ztxcnLP`=p?i=j{T&t4p%il^WBaoym*J|&r5DR-2po0iM_87iSG!OyI5u)4yn1K5vi z9_nw~Hp)UBwCRInllss@(m=r$N~xp77ABo89is?#8#LwTl~r~q=hqLwfNbQ5&zn8+ z7S-}uNs4PNht`n&h&#jOLQK{xAaA(KmrQC%IkY%J6<2kS91=Zu!>?Z(NZTvN8h=9f zHTj-9kq(veOfr>=@xrhfpZgq+%^Nx5<4+%xbG=UaJO*f+qLS9Tsj7vonPX+I54*(& z`lpC*e-Itc3F+vs(-|%%9^P(e!}9*b1cCgu^NI^)B(jufvj#a-Pb39|(45zI)H$z&Fqmtn^hh zgy?Q&G#y=h^CM`;2wBb}vixdk@YhF(!c|TTnE{1DRHzV;_Zu6kwz5?ayN^ms_y)45 zXx|NUUKjTbo_!Rb0>5z?5{TYwG@7!JDtncAjjn1{0_OgzFT!|?lEv+R{tIN>P}_r4 zB&ijiH7OI2e260IN%vS|CD)BKSbe@Jh!=bYCToN&o^JcJZgBK78C{eZpM zJ#od$O5iL z2Ct};9Vj0o^KM(aY6#J#4resuSnK{Nx*ogoS5V;q`WadkUEM1_^3(NJJ@vCbYB@UA zdM9RmD-f`|tbv4C4WQuypA@h84$f&xErsm2mv6@nBaexPU-M4nu694MXE6TlzGG~= zztZFyv_lmtu=!Ry*Wx8PSo1cL;qM(By!DdkzQMP@1M>rqLFa_Wz!a^tS$8Aca(R-L zPHxx^arpQMTROF4if1*;w}vH}}d`qj!_s%BB=#LUmpO(SG+wSPKs$BRGt z`MMJP?H5oe_i-r~kW3#TZ!H^G;ID^NJ#R`~;6?2(A!~#zKL6$Y!;G-~;=RA@|CK1z zH-0sgHE}{#q(=pS_tSK?=}@YbFXqIVUqjXiSv)d;b$l}Z@B75p{(4=d-v2aYd5%lj zfn*>mR%@irco81eHkedQS}p$Y>Hfimjb!ogbALPgWzWCp_|3Y!!ZT2I_wlh4LxMO^ zjkTrnh12y8pv%?b$DTpcMyO)-Y;1*46?U(<{M+>|yZl**avk3UQKZZAb-vqls`*|s zAGESYL457Am^T}#V)af)>LYbb{Qa}*jaqz8YSh}wiAK5O;dnVB!BdtS83Hs)hp)s=u;x4-j2oao;NKGjy&JDjUBk^IFb_IG&S7h+ReeX zk4`wVwnmXndus3z##eWXTVKHWVw5Lt-?RV9LH-383XJUZ%blo8#~YkA-Y#2_*63ix zTb{yjxHnM6qwko&b{+7i;+Fqe@56I{4xNh}pFfe@)yq0!F{h&Q~5WoVQv>QD!5u=&r@G3zzQ zx4>>Shx_b=s%^D<4Y*CVu*s@P6kfvmGfF(N{9)VRH!tC;WjTI)1|2}|X&M==-{eoK z%FRZ~Zb>FY&tIWMBUJJE$SgoF|Jp}d^fkvfdkNPkBLuGN0MS_eD$imQicmMPY@8x^SC-e>@(t)k?SLk#3|y>##a|lIr$^vk$e9{ ziC6x7-#*bbvHH&-8thPBAmHiu<6GJ~9}ac>JBXm6%=KzSm_zo)eO*5ZTJQjVTC1 zN}7?&5h0P;)g8M}`iMAIzhnIt;>tjO=Je(Ds}cmFBAo%DcgRsg@&b}#5OEj|4X>&8 zoTUZG)5~VzhyNFy(Mht>t~KlKQXmsLUqFJ?LEF5R+Q}3SV569P%5_~ zl898&)%LKDcZ;{34t*HmiBEBJ*kIq7!71?cRVl^!xRkz1)(E4u9M7-@wWk|vx4d<) za@ftMu@`D+O7lvrw2cpnN6!2#9AanQvNX`2yDIsJj_*8S=;DG}?Y5SR4WU*+O>UNq z+?y|0-MO%lB^6U3m%~qAunO;-`#7?D<%ZeIt*(_S=zB_kfvu^`^7!Y^T-~`i!V||n zyZ}$Jl%M@p4YkW%Pch?{Wn6V3zG;LfdcP<6Vjt||WOd=H%k$FYH1nVr6C(=B7Ri7juPe&^U1raRN|X>RlD zrs?VZ)8kXmOnrOmbCYkG`q0Evlm9mL_K6#2ZkzeqRDJ52nWv^KQx`2hjWX1qT|Bz@ zRurMWYSA$6+^in^!QusryB7Ys@QZ~<$KJW{>4gt0ylL{>@lzK{GoM@tAzStA$p|u8 zGYi}1|2+TH{L0rhyXQYSf7|>U=7o9R{3Y{ePX1$l>)Z?Dw~jqG@#ncG=DsxdiMd+iOHZ}MAPAKH4?)|YZl8U}*xj>@*{f%bv;Q)C%9g)x`SnFy)(|!(Ca*kvNESMTN*-=%M&@FbhSbADTR)Aw+i|s#f^`X=hK>& zQX{a{a!1F~3H85hC(rxbnl_Vdv`c;^&1fuXo0dGDu$T?1ggPD!sTCCiWBm>R7vVfv z&PeC|<*w4x%H=tg^)p0HxPtN+$Pd=%O{Or)by|aa(RBZAaBxr-rvgty!ZI_xhwP zFc)WSEt-p?dQX(Cn5tRV=Xb*&Z{V`QpthwAgrnhVMOjn@hviARjJ;K6Yn0nw%lX{e zii|PDr8}`UQ_Wd)2A`!H7BmOkvu1#|toy{(2%O-D| zwW!GB0aLq8C1U}l%i5@=yeV^FMIM)c*5pB9XQk9l-un{Ax_0_9N+L2ds zIOP&Kp#trojhbf2-!kzvfijUYhFqf5(NZbi*;SXLiE2q>I+uv|Sx{iiz~qC4wu0sh zMpBZQi&`oxN!G-Kb5YJ(ZMzf3pAz~0Zn{qEyv2As6ac(V!bqxzav6ssK-uCEOV}b9 zlWhEwX(HdADkl@>Y#^gZ#Id6@6y)A9w^dB5S;=v(lr7Oz8WssXj=I-$S(ff&6mmZqoKbSpC#+R3%6LTi7SNEK0~kW#ijesiSwat zPHgUjC=eUXuomq_M2ORl+M7CeyrwU=dL^2kp-3k<94HjTw`%4*XQon_^gMD#kQ0AhHB@eOiv|hjAq5F&?YjvT1TMAu8pvwNC3 zit}1C`j9?p4kgYf06?7GT~)E+GHL`Ni#yIJ6|&CSZBjfh(vZ|)Uo_#!o${P4AEQF6 zJ?5?=SoWqHN^0MXJc>*%7*5lGJ>p%la$&zzSbN;SaaBRx)^@ap1|PR*ROgXGyBz1P z1Ajz~E||4QtwrwU}=W>^WUTQ@6A z$;ju)dx1>FuZfj?#d=0zZ>J+JnalwkGl`u`3y7X(Uj)%7Qk(2%Wi-XH`f$cl4ruZr zQp%c3#VrL!)h!!LoRD=C)1f%|WWH(jQz;M6S63QzF>Ok3-YYW%%0VN>ENpYQk)y9= zZj&mX$;7^%V)4wHjfMh1=5}npz))$3TQu!&F&S%P$N(k2tysg}2vi8@? z^t4^Uc&g1>OIwK1bV|AM6Y>FB15gMp%7jv_b2+LEN6H;zb%|G4zHN!LLR8D17slRA zYCQv6?^PrAMviKza}L=o z`APzUgU z-DH(U(>NT>9jQb*Le+{&IuuN%OYXG$v!Ya=lMHp#=Iv2jtl+Qe_;?|q@}Eh5jbi|# z?Mfv8AQf^dY)StqCsc?6<>OIB)B zGioj;8GR=gPoDc#A|@GU-I=-;r@>YO^;A!POqQZ;XX!K>i==#9AY)cd$g?@A%0{Sw zyAlep9;eBjJ@>{vE5J@Pa7krdPdRj&q>t7%sapDUxjBipC&{#p=6Ji&&AZL1i3#!p ziD*y3n&V6xcDv_AoqNLpp74;XH?zFe)0I&8J+9gLPG;skT$L+p6yl`zt)E!qPl=~i#$z0w` zF=~IaqhL(+$R2qX#5J%u$bQzRd8)uf)aR|Qdg_#x%B#$UdWN>zR|*%&ofcOLVa92$ z>&mTY&{tHQL8?Dk(k4A+5Y&E3BY$fw+pDvU zj3pH;sVaf+&X3BEyYy|kg^ChY;GP1He$(HF^c5~fTPUh#3w6z1ilyAtEGd4@MH`6z zlak2v?P4yh&h0v%2#ThP6l;nUb0u{cK&GlwuaW8DfI#~ijJ=mf&Don8!u>={P~FK=3SNQy?~=1-Qg0!f))g*L2|8(2 z&|8kzTS-fvr)7Nz6f`W;rSzI)j17gVG$mWhK)$7?_`0bTiFIMXvb+CIem9VB+Il)$ z1DN%mikaF!O@23!=Fs#Jjrbgan(E2QEv=kqH&I1^O#*rL}p(ZU6NBHvrrEA`%5 zIh1x~lcD%I&&%XwR>1u|SFacg>2PVktW(|u_8P9BJ6%^tl#O8WoIjH0cx}9bj>RJB zXvNhHczHIwPG8A}sJ7F`x7Z+Zq0`#iWrkT5nvlUY7q zDP^|*iL}SlZaG3hXEL4+@L`AcGy;skc_Ka(n774vx)M(*t(koUe1h`?UCpYl;Q(%S z#1=GWHD8d$_{vsB$n{X2-RsPzW?bY~J%)IIGB~>#RW6lv=ko`3gzom)Bb33cQ>#(T z)M{qWG0SvSkzuQex<*0KHk&tpYMzL9g|!-IkFGTJ!A4S(KdZWD;zG&%x-@m5c$akf zjMr^8`ZQBtA<%OP>AK@;T%dg#IYP4&>am1$D=)<&dXGyfjO18e={9p&s++6!_;Rqx zh7px!g5&F56wdb}Jn^vW4wPGae_?rWoPq-dzK>d+*@=%2m(U_Ldo^5vH3BP<)~;#GLuzyQe8tYWkH4poWp> zL`sz6GoJYI(x9qdMd*-}4oSW$s>p-PcoxUZ6KVa?iA)JF41 zxnzbaq_~u)$OKJ3t>kz?0Ncf@+qaGK#H0T2UNKm@WEFMel)WPBPv7>tGDh-9__$g>JxvlUSq5&6`PB|iO9ct1?RgxIoVQ(ah)#E5j zi=v*lUWL2#J?G=o<$JQyCImwN>&)k-e}k>4et{V)Ns1Gaq9TtUgvX5Zj5n>Un9`M= zw-K~az8<10P58u{9T@KsmROy-^YX#(9T+0C^UM?N%w*kVnh7<6aes(U+DmHD>%v{= z0m~|KDK_#%R98PVxYn|IwdA&wG7HJ48cnW7IOerlyd_gx3y&fiacE&9RXqJ3#O3|r zhu_#cxXUE@{hY^7hX8U<>!nOVEu$AS(Ojn!$b`vPJj7w3{uisddvN*SfPGcEBtI@? z6%x&lyO>CvrK847C*H`X%t|tYKA^)48sUj!-CyYL*GpRFJTB!F5`SN(#Q;F2Ke=!44MzGZ+i@v}l;mhMl6uBU!A(#Ob=@rmt&s)?Hy<0x;@JBb z>Avwhdk0^1tzHI4-K=5LkumG0+4E<2Zu!fWpKtlbmQQVY|CSrJ6t{%7T)yS(EsHaM zT728glQUnPS)F;`%o}Eet#?VTE7@`N-O_Cyy%X0@@DrX1&BST&4t{82%lPx- zKOX<$_&wwA9=~opHSQQ^$Ct;a#-1Dd{@6ofca7aN)*ibSUc|cOKU_S2ap%Hc7Jk0) zjfKy^Z+PQE2_C~M7S4gM@Wqw+C+EL9-=BZ))@SFhpXcX2^O~&>&Yw0vGxvwNAI?2I z_tCi{bKSZ4oNbPp+ovcMfk+z6pG|xQd4-koV12Fe?nG$Qrr}~Blv+#^@E(-CWDi7h z3a$J5!^I%4NZG6IXsB1zRGdzWdeTJ5D+&N6DFetJDR_L@igFtflULXn15Stj|LZ56 zE}24Y$>m%a1_(wtrg2O+n+)~vY0+CYoi|K;KD3cVKFX0%a$ z#aW4%H5w1?km*%*oQcs*wILhx_1stfi!3IiC{dl1V63I;I(wR?UMJJz`ZOELCtV?X znF-Y6XA%%Pq35EkbShYlV%MS3wfN=d<>&P+B^~yrQ!2mH$|beVmG_h1?KWA8*X5h; zf+8C2s4jmOc^;db2;=m(J9&k--Q$`0x=hd4Q>>|)^5Rw@<4#kCdt@U5dO zbqxZ0hD8MPXyR}HN* zl|G+riG_};!Z1QKTlDne3c*fm?;>*Abu-Tjj7A5)L&4xmUO_g4fP+zM>5Rw3sWZk% z#6?>Pu#M1;ne$9S8{k>nimPaLu-uEXAaln=`Sm)tujUBFoT@7wgx;!p!&Ew}uf=K! zB^6Un{7I&xo(omc>76xm*2)^P2Z(1=Xql>BDuuFC#hTq3HLJHhB0q0X#pz-bwS1c9 zLN3i(8Y@E&ve1H4Mu(kB$Y!B6Aw!8g-fRZzY(4=DvnHii=2W|$mFZQliEX8fe4uWp zV~(WZEiygdc2N$Wql*y!x}O!c5~LuZnMP-!hAQtC?0G#`a1tmSp_z2AcxZRZ)vko} z&Wwjy+AIrF`?FLbuT15VHHWsyGM5p0qpdbk8fPt3P$CYuo#M#3TWA2mgefV^fnwMm zX*AXLhsn4%G=>b2juh>9nQmm8dwH46CKC3tJ{D%0~tf5+-YCEb+6G*bYL>2MlQzAb=H%H`>jb@YwQgXo?xx36 zV$9^MDAcO{CTp*Fg_>R$*5vtD`ALInWmSR=s57lNx*=W9P5p;VFSgn&?`;K*g```X zr7m*IbVqc>OzBnnItp@iv)%M5#1SCWbQKfLwT<&D@GsGl%3auIUn9CIZN}j@?(` zdxbq6(s9*>PHArSS^-4j#gghXJw$#rSHzlBC^0nGt9A?QjNG1TB8`1_u_W-C6-$}Q zX!m@Y$f@)~#Yiw6bEmwV)5BRoYJ7!ZirHzjhpc)YgK%aKBk&1ced zG;NFMqFMcovK)WOUNrXDZm6lu*62OtR3(&r&IFS!FrmL=L;=MEtjk|%)CG3vh!z>1H4eEHE5>SH9MFJ zP(U3S)wS~DS(n$M$FA=WXm|6f0tUa6QIZ4~`Yd0P&fKgvh$C+kj;>Xw?` zutJ~{IlnGEJ`|T{Ybc`c;SBn2sp1cC>X5AIm6p@O)Edevpl5|dj}N|fI0%woD3Ebw zVl8t@-EC(A9U{EuPUqqF=Bx&Kg{C?GVIp1G*6CSy4e|TMuDRt^DX*02ErwwXs&=HK zskbW?)d6{zrz{}Tf=;!%DbA4dm(%BMm!A(C5_Hd7q)NwUD@v8GJ?y&PZnf31}aT;Q)*j+57;B_%p&pk=am|dfpM1g zYD*zj(z@AG-ylD)*81p@-sZ6ewe4h!I-Be&@=8^^Mt7Q#nzyX7pr`|#lb>gci51pp z4N)Gy&`L!4R}nSJ!}H@~;$dI9Y-(n?SlYgmyug+#YR1)R<+^l~Q+ZO8$#r^OV3J9x z+>o}XaTj!Cwa&9~y_)g08f8Voz?yX7jutrm3a1K(=u0v(!(|Up_6S>u zsJ*S2Dz#(%1+61VnG|^xX0){pD&aJ;@5;jg>7`?ao+IG`3ZkG~Aa*#MHio}j@$z*lY#l+NUy`q@IMc+YLJ!xLyqfM=psbEaGayjbMP2_RfukY!q)lS@2 zQX1IgzUxS9Xj?t9LbucoO~T~WHeAeEua_AL6m?H!5<)N=>DK+3se{Ao zR&llM@IswMo~9BR6%%h;!s#xmxh0ZU$ZAMA3n9v&Z036j-c+*E`~F9M-s}qhf6CrG zzOCYFAGfkNj&U42j$W0_7!d3KU9dED0`ao0PV6;YXpgrKOaTQp(amNsH~4t-ojPm7VzFyv_HYO*CcfkMljFgHacw4p@^Rhe0-~ zT_WWXDT7rlSNtk+(`Z$fKrTH6*UQey23($HrGj6ll5wPp+~dSW zTtUNyUQbam0P59AZDIN}oLw1MR86d{+tD6Fs5!OAWxDWF1r1?7Uy=P_#XodSG^^H7 zP#xJWGQ>xboH5;@ZD}3qi0ce;BmZ+D+?nQ*$X;Xn3HTn5TqOGtoi%GyXlxsTe?2^_ z;x27i@00C3Rpb|5_z)>+WY1;KY#}#k_SA^mE}&jpos(zI&Iwj;EX4)%{p#@{Z==p% zn3FTy7?^@a_V{mwJ?%{-tof1~1B1n8>#W6QWYp@7_=JI;zL1vn_6zdR{?&`2%_Sks z`!+eVh}$E(kZnO{WSdPQ=58M2T3kaz-X?Ffz1=6b($S61C}`w}cN!*+BM+_-4|Y@Y zQO9Kc>^w7x;buM*G7k&`1y0{6b*6f~L4&P$f`gt(Q4RAnT~Gc#0mI9$OlY!TcWWpr zZ(Q^uuumGwEPKOlWMdhTfT-GlLkn?L?eSx#y(*fQ$X9P@uM9DjU4Hs_RYr- z)-&#>MyHNR3iu;WWj_*t8u)leYfsAK7zud6u);)rg|hgTBNLktf$>1CctD`5;h&@^ zJTjt4Pq#ahX4Fk7W3Q<_=0{ZJRefkeSxk&eFSdzGA`=$+bAI;c$sqxG%tNecY>*H1 z8d|j^8pY3*#bp2OU$c_;+IE(R|BOx`BEl0lr-FQ-SxBTZ074np5l0NaQx+3J^RP|4 zFWMJaViVkESitxdqpnlZRJ=kv|6IcM!IykZNvm_}8#N&hDIQ&OS;#S7h?$&G_t3pLkc)pP2%aR&LxL*2iKCg z?IDpI*^P-^9KUCU>Hyhrg;iU35b#k2&tVrEu}50NX`Ky>;>KS2+*PpAULJ=%c`k|W zm3o@<4>%h=!xIj8z9aUrt#UaiKVd1<~_+-AiId{{I11chU2XC734yMSvb~6R~22?yiRcJ=W4s%;S*?!qX z?M996gqVT(s{-rgB8v4=IX%RQV>AzN~d&4bp6VkBYAKcrv(P61YW$h=dj!lWye4jme(i zNSmAKl-Frw&&0~*3X%*b7=L5!8u7P#COilMz+>1D+Z*ohjW+2z;(VAK`5o4{>q=}D z1&t&&BQe(Vdk5Eu`70-oJjXK$@S?9Ql!7AWvc0?`>gU@GMEdyGufnqo;uy5pvvTOL zCF1GUaN{Yzen2qw`P%f-oRjwg6Xg|38rgFf0-2@o3~O)#IzsOxAgv17ZoKA%d5BAR zf~mgIpr);}Pae_h*Wh4P(%{r?KTmADcA{5R*)cMn8s&QiMv^URy~St$HlTA0CY$v}~_N_Idcq1OmR_Ka~bme_zWu+qvZYp`D z_=-hu5%A9E)_uAA;MtH84N?q*fxj?C&jKvM zu5W$SNACDK;wBJ-&`%Q(bWnK+ASFN+0iN8WrVCbchMGAs;n93`$)3m0L6Fg6gz9|# z)`^oP`aF88Bp7kf7X+h{2?`97-8UbD?78Obu(<2$uey-m^tK6a4N&EgCx8QrQ=ix6 z&)5cN4h174^H|k4CaPA>SA(doy<`iCKm1_df02tTAbR^D&w#qm0!%v74J0flvT*ds zTl#_9CDA)y4X9IN?d0@3PC5@`cT5~O3489i6Q`?^BSoe?`vgSUT{LP0sbXmU0f5K@ zP8ty2u0X#Xog^FX0eAn;U5LY&w+aA&FJu2ttm49XP`vN%iQ4Gz-UG$y1UxFI*X|FqJuR-j#zy;SR0zql^oMVQzmznx z|H|*2FYdS>nj7@rowNFHTrUug5t4Zj z)2ApVl}j$Mi61{W(XFa9XxoAwHq)Z->Q1{_2W=YSdkDW!6q953IuRZ-o!g`$N4__) zd4-{9!PjK*R%AFX-ZrfJa_2!DOV^w!i#NB!6yXh_(T;9Q%wQ8p<0%&coQu&5cbiJ!@3Acj|OwJ-Q4rmSb=S zAHin+4C&Z!*CJ){WnYJechjR2o|+8J_W;y>WQalf1ps*?FOIp1ljo=Ev5Bgxd1{b7 zFEd;Js~Fqanq9ggCEb!`iPtM1ys_o~`Nc6hzVZq#uy&Ep~LcTb|7C zJutC&6Kgo}=$^km!i7TTlba^L>G;1SJf^02-yy_xA*b_pTt=@#`gv;YFcdQJQWqi{ zHgUo2z-W)@*kMh3I?Wr#4N*oGBrBf50h^plBS);r`Y5^Vj66fPvVD?*n#niPuHi1+ zrUUxUKww~apwCheNZ&Y&b`&)7LgI(@`@VC}YVpIv)NzIhc83gX#+|kd8henTT|S1Q zPeVOWkjM)k8i0-Q`W{v!(%6|&%z@`Nh3#`eP@!2{>y8C-9TrvW0Inl$)Yuc=Rvry zaZE2a8gJJnb#g;*{}c{73L2Sk{!ET(YyBApgMe&`S|%?_i__-AqqbEicwh%j6z*2S z0jhY-CCQhnLkn}Y;^70wts3#7(%VX&DgMXe)5}{_@v_)L8@(Fz;%eZT?3&ffTjq$l z83Fjs7baGIRsfzae)0ko$2!|&_bfI+BFb|V#A1 z<>jw;{03iF&;XlPFS*XG7Qgo!ta#mVXs{k86CdWgO!^L+F{-ne3*3ADk8u*rrICr- z{{ZYgiY~YR$8^1WCtb5j{AVPxB&_dzWjgHTKuIG^WDhl7-m#Kg)NcYh{+}kMR*V-dw5rA-axN;pspR{`?=4%0HNPGu$rv<+XRxw(Drs6MSJ#1ik~JUGsjc9z9w#L zz-SBjG&Wx}BDc5e4J?O}M)tpclY~NEL;m-TnHGQi*NOFOTPM9}QFaPTJ3?N8b9N?d zo^c=4eIo3Eu65&4Fvn*|##>4-^AFUJcaKhdB=@lVJ@n8vN#WFF_-%)yDZwx`fIbHYEtFgn^L zp9A}jKw2qCWY4RBd{p1}n>zCEBQpbj{IxRwJBrHBS-h*Pvvgm{%S%pQ z*sr=nJbd@^D^+WuhzB8iWD%(dm?XOwXX}^EDa7n9!ty`5R{YK4EbOq($pG!LWRbA9 z1cGsP#AfUojSh7Uw`<9D3$uWNo?DDu0{()n|I>w8aI$xD_v~FG<+Ap97{fqI#IH4U zNAv>WmSpQIl*Po@9oZ>13Mi8kn^Pf&;NI)u@oOeQq(S{7cF4*MTbW z5>Ixyiri9~J+q><$>tEafrx%Esxx=Hb+R7vr_$`o&yx0>9+#d4R*Ab#%WhMx(@zQ* zev`!Xh`Vl$^3DuDV%K(B`{O#9N$)7jRxMZ1$i$%)^r@tl?E2fa=aP=jiGm5VxIDWa zmx4=XF9pqG+K86vaR)kCy?fl8h>*r|j80LEWW)kPUb}O!LKMrhFwb0Ro4go%TV^F+ z#E5j5rlc*Hb{QC>M()?e?_qDxC6Qy?ghdyw}FH+~nqrvMxPlPEG-wZ+I2E3@_0^Ag1uw!M6_id?fQ3nT+1V}c5doOUt5 zAkZYcMj&cI#7?ZrZmyn}N-DW?XK<{)P@Ao&rJ1d4ZkS4u(h;7>eRc}>oIw}RMlE@= zHoFXF+4-u-9XXTJ2*8bAdGP!h-5fdlXjV|xQqw@Njz8y9ycJkd`h6 z%m?V^boQK_owdwCPgK3xbh%W zn}-3xzjs5{t*X?v8`WM0UN-(d-B7Blg`uLYnv`$MRxVf2VAdH2yyQI}*NKB0v***3 zmSV@rCv9dh6?ZY(J_{oL+L%}yC%5wpRkpH1Nu%#XV#R{&MHI|tfT|^ulr;GSofFu^ zj?f5l16n&c^0Q6YO3GrwJiLCVc>d-rthWBi7eM zb7e8j_H7eO&dhcpLAZwt3B1wgfv-~&;#UkLb{2l3EGEXyzqE?)odx+(chO`7heA>U zozb=#8WG>qqwyqrGpTmcwJp1Oxw3Hobx#3waU0}0KxZhCRELYH^ zv`69zX3qN?vlmq==aM5erg^4V+`sD?WLR6!l)bRh?a=h;_>5(Itj*TZ(_>`mH>=5) zo4_Cnnhf|XJ>bY@%1bO+4>0sQ>4pJ5y%Cw=!btxG^n04#0qp?oejX|qEy4X)Qyng_ zD{Ab3m`C<*$RA`Qbaf&{B+>`F0>pSR%n$$R%`PTav}Vg!&0me|tqrXr6*X6D$lqH} zDnBf3*#niaL`rMsxP*2TKFi_J{vi3NEn8ncw;1M^({Kn%4_FV~0Q1JX)~p-Jn z233p+) zD2j>d{zFpeLyh=SR~D`kMkMa(XGa)UfNSgM2evlRcjIe{V!|vPf%WjEzn(5mbZ03L z-h3OSnrw7~X%#eSqsUK5UvlG~Y*p->|q8c6fue*K_2DvoptfXwc;Nx%mNro zvB%{7S4+GXXP3>t|D^OO6!(ZPC9L5@Y4k)f84beL5a;VB{%0hJBrI~GggQ73 zy@=)u#ls790Y7pPA|D~Lrqb-Egn1R6-H`;dpQMVo=jD6%s?OxJRI?a5=$v^-g=jz` zPNXuJ9o6z>wyxDel>N0EtEZG6v1bmhmI)b~h9^B)CBO zOPX#TIS8Y)sm-hAr=nYLKyUkfD!ZZ<3CfY26gEAoEg`ou5|sk+$-|OMu7XIdO=l}0 zsphMKOawr@lF+%XNoP-n&UGZ6C2PA6+F^2*lS0mAEijz)od+`6%K5mifX(%lFJyb^ zG9WE`6YoKmc$#$C<3c7={=fpMy@W(B%bo@mGK>Vl$ka-a zxuSTIMw({i{!K~e%O(I{>J7*7ujZ{x_H6xg4Y}gs4Lqs5{G_uIy*zv8iisjTmW50B(nGQ zOABVXwy$PkmUB!}kWpC|ijR#3GMv$u=B=$moS%*(tUb6sNz&hBV*vrQVgjj;#K!=SM;@}(^nQv9?q9x^MGi9k`+`A%3$R>+mSz17 zJfdeBe7Ydlz-R=GPhiynZGcz(ZMHA|Kq$l*m{0?!_o3?o&ovnIe5k=^U;{h@D(b7= zDOBfnYjqkVlMDG8LV}vMj*%J|#?TPp0L&ir`*@a9t3H_RddScFFj%HR>Ob%E>ly^w zbwO=VV^HWEuR%V>kL9kTgaiDIrhygE16~L*4G4+g8bUmv&<%oK$AlQwdxgF*yF+@N zKL|;HMbdH&ye23#7&HOC!5?6>48sLOf+DF?Ax_KcFed_CSe|9DNSr>{AZS^i z29q8LG8)z2XIuCC4QO4>V&Zsp1CJGM5cGabCa>mw1_SF4X#A?b%(fl~X#_!!>EQGR z7K^0UHwZe7u0iYbvpS9qAUxZzdVjWc0kwUChHuaZ)abh&ts4Y_8qft_1FuEMh@Ro~Ax5h@CRN|6Wp)R6STVVvra=?*@mM9j z(4ZHzng+Etz+h4WtS%H(k;B^Cz%ktJP$=XxsI};@ph4FKR@-3USj?lE^PzFXr05N* z$=R;!g95J&g}4UJhsowSMraUNzoCKkhlEf-2nBg2pn6rR4j$YM2hX6OrOd*G3=MqH z7i{neYITF3;RSVo*Dwaor~1dT4~z8lO3oAYKXz`a_X&RF+d+NKz-s7PF%1T=BgTsX zGaOJcv_92u3tdw076O7^2pDwW#QE^r z70@Nh1R-qk5SUesh8RCK)E|#m_X$D}e$ov=Y+LXdnAoRf4Gn5NHdG*_R~rIB)hn~r z4TzI6V70+mkQh96DJGUOj-SyQ{Mh!4hE=^>sIJ|O(HL~BPS>E<3Fr*G#ZeQBq0w=A zzglnLgKGbR;@Rp*k?H5Kq76b2lZXKXz(RC-{CaG79wX4`7nBvMQ$ZHegn|Y?It#JE z^L~8;z7~Mw@u`Cv&gU0={spSp>Ufdiz)e^kgC6rPO{5n5%;*C6ZII`JY-quPLUm@h z8s9YN{A@!Im`q?x{NqD_ANpE)LPgg$C@)kU<~vu|7_t`n1p&ez(A|TE7k~g@vbG*Z9De*e7a;>;S};J`m(o zpUhU*(@oFnS$y0F9x&+e9bS*`_|*6X`p*iS>f_n!L4820)@lscLm}EarpVye`5RaW zA%mZRm=yG?k7lbwQfLestfD`tL3N*+iWz^ffi;9Q8V#>8s38qLJfS+4lv8UOuo{>c zKb2`f>%g@7*nk>AeOk3a^>3;AR?H0cBp3=iG{i`qVZl7Cplk5!f_|+Iix%>QRD@}{ zNs(Xb#0A$pbtLuy`)b@HqJbi6tcaMVTPjH;-30;OAN$I;-}fGdzCi^YexV zpB{bDusDExde!T*)fqoHMiasjpbJnbqrocaH0lNos|nB(DgcqJdIQgj=RB#RQtu2w zyBnz-aEj=$r+F>5Ye16o0*23kCxU9NHsE6yl+y5u)kQ+l@=MAOm9Jm6r|d|X@wEM? zsY->VhnH?B*|X%x5@YfHV%1_{(cwiK7VcSaWPwq&U!^J{NU*kb(Vn$eUQ8-}|MSfn z92KV`%^|nwz;W_ul2}$gAgGu;dK&b`28C(j0;YEi?1SfDnuLBSWJ}eCMLV zcOarqLFS(D9moS>{Qsis$nLkCCw@n(p7%Q!9{iW>b&(H9}p)5wDidEAwCSEE(m#nc*Ph}M^~`?g zRCJXSKEy)PA{$P9iMnS$#NmuoYl1jbG!U>nt2Q*~H9Baq0VWXCLk$sp-0X+c+o3AK z?e^41u@bSi3F;X9ncu$=|y%|~yZ>K^Kphodp<_6yn&ZZ}ZPq5eYGraDlF(=_OizAM1u znqUxgv!Bs#*XoetSqqWy&9~=>9+sb1^f=}9!FTiqoR4apg1EooSjKUHqk-oem=I1P zPSAwZK<|*JjWg)CGdMHIFmoQwi1RT*U1C2+c znf;J%JFctbu($D42h=e;AOjx==rsX-14IHC&JR8?gcx0enhOO5)}U7hg6b2#gIlqV z9Dc{S@dUYZl1Z~m-+*F+OB^52Xai6JS*#Fcs|J91;r=O51(MaM*&viiiPw-Ee!C8= zMtR`W*2X4%hLLzcgEbFm8#F$8p}^$>8VUrRFBIT(etpOg3?AnJE%_hv#SN$U4eRW( zgrIZ=bohqW=YtlfrAoRQ3L18+V8H5g`0VUZG&p(~a`;1t&{G>rdtq7hyIEYE7_}zU z5ae-zlyo%%l$Qpr0Sbp-2gO!^!d#d#&2|@ZU}@}>>M4nYlI9wsMt`2)VLl7A+%?{1Wb8oEtCOH@k@1Awvz2{{(ZAX zqu*`76_O7bu=qG-uy>#<8#FKisMUIK3G3Gc+2btDZ^uu_hSF0XQj0Vs9v|`tA+I4j z8xURze&e9dLG6cG0`>yjwjk^L$0v{9&Z^1&`~0V$sX4{DvlO@iAJXxH4)M7SRIkNB z2h$A{U3w3|y_OdY5IV=_jsqS)gf$M-t*81WQhDt^>$Mn>59hQlK!uG!FJUZ?%P+M& z1fjrcv_XT9UM&iXq}OdnCJf{VUE02G$EgfSj^vFOl?6&~D%X`f37oU)g(g*8_Dh5- z=M+r`G~-2?8R58Iv)$V0vzWWw5Tm!i@E2;EQ%ok#x}X5Z_Ul`+K%%2LfMn;OF~@j2 z$0I_yE7TV6Z7M z5&J=J3_sKjF)eTC3`f1af3h>UW>I-6az}`asC1c56iq)QNZv@p-Nte6fZo!T=mwNEWW^KuUJnW%i4 z`YqOpKX?dh2>-_^B=(tkiHNJmnz?a{u4UZpN;rA~ax>RFn60Yd6*Mw&bYcf_q@P+W z9(@q~tUGOX!b6t$FoMK&4g~Nf&DI{R+{}&pVIf!0$dS_fz?xSbTqFK{KQ;PyPL-ma zLhjJAqa6he$;Pji5e0VLPbH#ts+w}J?7V9n z?DCo{?yitN#hP%Dq)sMn4`<;fub`;Xuj~}R`!IDy7&3PCsrj%~r|$EHTH)dd7pDPQAa~qAP5>qmSaZ3L0_VqAfU&+8zU^ z7F;?OQ<2qD>M!|X@wXQJK(%f0X@g)MHxG;@+j{-vg&$#H z^@s5l1qs3HXPhryeK>1Jgw_-gW(&RrOk|`l#>N^4d5^BAg)zfP=tmICiegfEKQ{K= zpBAqcn|=%r)r#KH*3pbTpb2I=hSP1VmVEao_?4nmis=`(KZ7U0b=^}G|MhZdHO$uD zPAAtN^R>1mB5qeKNMGS=$pb%yKf_!axqCw#?~pXf@8X|j;lv)&^axRYsMDuTJ3V?$ zZ$F9tJiEC?l~o7ba6H|B$*r-u8sUTC zOyg?^a`iJFH=J_KO+4k`YVy?Yvdi(c&sHI?T^F>HZNERM+rd@8hufH91IYWLn%G~4 z!=8dBZ;lh3=gxcuei(L(lLw>#oFfpIY=&|<;N-k!C!FVgl&#&sXiq=^n6D~wSbho@ zpHuNUr4vJzy$Z+OjGy-mP+tr$QpdGL;MNNdnE;fZ6!R2m;Gq zr%H-_YU8Z-Hl)@LThgHso!8#o?(s^zTTOPpiDnceV!WpoYASVZxa&>a2iBZ{&d9zR zwqzpeViOrnQ!<$jC)&yLKZ2L$&>Lt(K_V|?9)+s&(ic~WKYxSjDYhx()+;pA-79n@ zna=k9mbl*9H;xSE5=&OSjdm0?#AN{{`~BWqYs8_qX*;?p3iE4{q=z%?aEoGY-siA@H=orVgbp*p)QqNm~ z0z-YW?mh}nGzAInf9`tmwQYYqLq!g~g}BP4?`7BF!~h<0;lyZ*clJj3h%XY2j0G%0 zI4bXM_j~A+l17gF_MG#?{Cn9>6)9f-XWJPEg&F5AFeiMVyVbS~0!TAb4#Bh?;i5#i zK37Y=_CDBo{widT_{|ycj>dmvSFGwBfSdu!hBs!j01Cv_t+BgW)lxef8SX?^B-eaZ zk;rIh1)KwIC^Ut>&tF9X*pRz4>lJs=%*5GP4+LvJ z{OrPr9|)%q2N44_Y>e#q5dQ4?6aAD854ZoDseVAQ}5qmOrOE*wU>`}x7 zKz#JXFo!&C65et1Qjt&9I5TZaKZZjufWrVez+z3)9@abHb=j~EodfcAZh{D^p0@@$ zR%|(stiRw(<>b+iPwL8B@re`)fMBOWD1egF3S9WRPv+x7Rk>* zH{F3!=L@6<`d-@YLUsBhTPNvD-YjP{eeX3kl`CJNl;qXeyQ~`y00UCj5 zI%`%mC9M4sA3T1nHp58JI|R$KG^nRbb1RlBXyn*!rG@C%Gft!JIHtB9pPZ23NODYD zQZIN+o~WJQ&%!@9d{m zh)vbp9o!z0Nbzmr+EKGZ-igLjm5;^?x)tgEDnfzLE z^udQ)$f0M(w~|Ai$12D##aH*svi-f4xplA>aOj_GEofukG%3D$Umd&^Kd3|>>yU@6upnlyx6jJ*&7KVKvo%d=joiv>wYin$b4g_4`T$t< z)|=Ofrqy6EoaoH#i5}Cy&(Yl5Z8JKWy?qD`z>>gme@-bmwiOqI*Y+G)E7sQKU~#Zd zsb?GL1-$vN%g`HPyYM^=)e8+&lk3*zD$3`Q;I!WZ4n3-?6W?Bo)r9rqoY@&?bVxYY znDFvLzMipYP#R1%x%l*4W%*nZscd}?gRvynh)FEoH<=)&{maAN@ppiZ0R~1rl{G$vF6>fwbMP=sFWXWB{KVLMpaFeQ|d^Ke;9lqn7 z+A%x%ot8n~$@QDDgi0DwU0s3e)yGfNiPvqGr~mV4NZy$pT=P(j z^;pd6&JJI1s9lyfzubzAsUVTPnya7-{pNeM;yGtR`oZjTE~Zc3oo)I+dmE$n`|PYU z-ie5LsXP16LNf{ysr%Nb~8gb#-U?_+ifKwINel%qq>E*1^w$}Jat00&Qd;Ft% zG^3yq)#<>)lOO>v+=AJItN;p9p*I5_){^3zBg3Qq{!vR~OyY?uGPVuvC}_l(te35P zFKwedVVeRXNMUZ`NUOy553oJf9#h6`lvuNhT)rWLAWjm{`&WbbAe7$hUfH>=T3oqq~pafSG)4nt&!Lzb*z zp}%W1X&}yW91N}7a{#-WOL5GECFN|Y6*WaAmll6}(XSDsrd{yw(hgM(H8A|=^eZo( zYJ#$Nn&ekKJRBFgIA&<9vD;Wfla0igeOa$}B^OOxPY-J=>wV_9c7QDZSFDv@K?orRrA4FDHua=4KDEfMPg zE3`YDP5p)pLTlwYdr1rSR?=Y6ULwI7t`YUR9Af!R>Sh-1ZGNlK7v?!N&>5u(|BfCL zuAoWij8af=xdCzo%t&!@WEpIR)0Ced>`D)}r0qQp%(&D{=SK8FNxNmwGn+}pFCGQl z*+!}u_@~UX>(-kX_32rAf3iIl9Jhu!7&Fez)mJEsfe0Yj#G~itEYz6M2qr9KKkw{~ z8Ckt$+~4f+`pik<*nwY=C}{v-%kL0ZwWDW{7}i;dVN7>*jdk=|G%f@L+J`lA6GvKb#LXoU z=9#9MBsr_e+P}RVC+A%L^9nNfrI!l_T(k`bT*p*9`X@`_h~Mvm!(loY>hE=%G!a&A z{5mT*KtY2NUIlxJHP@%A9ML%Vets~K>KS(o^qLwAD*T0Z{7gY3&KK=~Frj!zPui&% zyRv<%6=Mradmz!*8X4q;RC`-{D#nfp^5-ip7~5PD?z)>07wPM^tm9O@x7K|b& zwPNQ0FwN>lOie?vVW3eNBPwR-vnlW!Z!^*55VEjWcp*wsKf< zC5<>=e`=?AEr*>@IMn*7-gH6fbtR7#{}opBU8;V{RxmAvow;R|u`w^Ox`eKh6i zx3Gn_Z*!uL3L0Qre^ofcKXlSQI;Mb|QDDndrdx2bJQAwKng@e!p)g^)y3vk;MmFf4 z*eUMsrcKzVy3mAt9A?~sxQp!`jhnk1zHz&{zyfdfVwg%A?&9UR)bD)}8L~Y&tEyt$ z;t+6&54e0WM|-^2w$GhgMV|0txfB$Ya5RS)535Yo>2t5G@I4r#tYF81&P2; zwNrfWLL3y8y8h8{kZCgo9Zi{lS_^T9`)l zp7ONUkZEI0{fUT|^+Ze^{j>p$9WF}R6O-91>yiEb{`174u)G2n%&tIhpU>ho`?R*y zs4*2qoYGh<2fO*)QbgZ8gh!hfZdolJjZvkxW6FybWC<&zk=BEWdEx$O>mC`8lIQx+ zf})h{|0f_V{`NqfXpYb!Ij1PBhrC}KoBYu24!(^93N%~f#!`|D>H1g z>H9kp;lh@_a1aZxph>_SG^Jgg_|zb62OQKhI}!1WI+e({Y@DVk#EkHqEOugD5T$cT z#P|VVt*-dZOKZjFx{mYDB}J-Bz(E%S5A~_yzb#(9kOTivtniMhi)Y!iXVfLwI6&rQ zqVZ_351JlbfAVM)TSh^XRXx0ntr2Vb>AL%-g6OOq;+~8;aI5T!dpeOxJY?j_tr^Un zqLgg-@!M_U%1d$Ff(a!M66tc9OxRsvrd8cOVh;uFrp5@l^b7RYbBoD@?tUoqJN{fJ zzW)U@QR!~$Y!7i}d#GnH!+?*Y#CjQBu(`$Lg`YkqJwL4#e|TB$d^}vXP5CIlN}uiy z#TYmyo3#nMV>IO;PCr!3L;`a>mqHS)U%%3{c{m(K+H&?7bE-sDVUKN~?~?Nfjend#b)Ej`X#jh=L; zXDBt;9HEU>uZRC8JUCDAbLgI1kEjknHs93r?>gcf&wVIE)g)56_1I+qZ7K9L5b-s) za$fhqSd%^I>tN)8uO5Z4{|w2v<-7C}g(ud`Xzo99ga0#@E4&aFO&68dmNBKCl92_! zE+&g|MbiW)+@BEQJ4F!`RMLrV9o6vN{Hok z7feO*a~XiaKQ!8|;d`9^ZeE`Z!oQseH-Sxcd%&g&8abwK2I3vEl{N>@wIh=;M7G_L4iYiIjVn3{R(E0o1V^?M}Z16T&)Ag|A1Py46BSX+57 zrW(gw!(3~pCuvIesgXLI=x;nXqtPzp6j5mf{+@8S3$+P%REs(FFO=~C#^T<9Gd{` z5}AQ^v1eMx5yB0-ZW9o!TT@%9Sg&%n@h9wB`|}7*f}+V{U9q8VRgjX!nj)#=Fn)!V@#0!FT-?t`+?lb z*#DV2BlS6Z_sJk6H!x5ih5GgO&We(BR+Qz zy|`JYfSpmew~cBT_^3xh$WG<=wJ}0WUimfmgLxD*B9wiV-nif>cz&Y7j0dD(Q?z z;@Lo-Atv-OQSWg3FfYl9&(WBj6ZK_9Ei%!zYVrJ3# zMYaX^k`1q2qb1gZxw1-cJC_;YxQyFBrU`MG{yuW-U+D2=2hn2%4F>%Zks^$ZO}Wvyw-i%$*EY zWBF4#3ab&Fh1F27oy?r%cTa(D6eN-P`nv!w&;KCTSs9_Zx;=Q?$rt~5@$!Y|A%0vq zW0k0mFFB7|uD%EYmP4$Fv(?Mb=g9i9EnN7`Gh!I<3iSD!`G3L4pSY+Q!HefL=^3~f^skwWg_aM&O0 zHASPwfpn);Ekxv2?l_EV%3Km*+`pxxe0jC_(P3O_E3}PXU5eGE`n>M8UaJ9ye7a(T zPvbJGAQ9tz|0z82{_<&hb~&af0);#dWQlDIbB^W#f2?J+yJr}A+MmqTkiR{UTaJ`c zb7(}^{3Oo6t3qo;%XiR@4AG;yh?-Yjk~QP^ix(|atBA1SUtS8)a};Yjecb0A7eEg( zws~!l;dUgN?Jf-VVVt?k6*RK{V+Zw!TqCafLk{T0;qgvqkP9L^Wgz9?hx_2sKo|0w zSMXB>4R)w+?-bvDh0f7{p7oem_;R{NBYJKCSRFsb99{S-ex)GcSAU^bA#tsE=vB$& z*P5s;D$7e&@uXPyuj8Sud zWstE_?&dafP;gDyH zyg&Nw#o{YRrFWQV>f0{2q&I59U96|Q%fRU)gGg#i_P&EN{DvdAD=BI4&=>|Q7~mxT z?hz{AmZBM1dKkj`;Sir0jW~=Q&Tx0XPikg8g0+}AI*Xznnb`4>`+}+{gp=)&$E$3k>$Fw{RLLY2<}tJaU;_y>FGsy-mABUEXB|>&pzaYx%)6r{+5& zV6mG8{6qTk!{Id9lMGsLs#w)je zl3!Mt7>8M!9gdhr8vRHB9p>oCU%L)(6vs6QlcEyYv*!jpjcqxtR=h!#x2x)^X3ZH2 z9d1UyduLI8e*KO(CI{At?ThnPm_??mXWOx{0ptU1vBc7mxG<3L^pmLt`T7cFF$~OS zohL>X<~vktd!|=X?`lbv9UP5B+)R5olNn~sb`2+~h^Mm*5JXNG*4$b|b=rdkPifWC zJS-&5I!`*yj0|Q*(oO1NQ@}@}rRamQm>laZwTbVR=IJBfbR`%`e&maF^diS-vo`H- zGqtPzG2$%C*DqI;lKl_dW)=SvyK9Szy!Q9pBJ%07{F#+$w$bTEOv`90?o9Nh`a(os zjxQ^V?26~O{{HQAdjh^V=qh`ms#dz!34?oFmk1P_O zcn|t}Rnd7x%kC{(zF=SJc**I-R~MbP=-d&k5gQqUs0+BEWF0%t(ORL5PogI3*hW2Rls`;rz2wMI-%p>jrD}Wd5*Fe$E zz*Sid>jn_h;Gqk%HMxIPeiM8g=c5u~vK~%xHF@Vr3;wRuqEY}MI9 zBMdRr=IhJnmg4?XySac5cjlUWZ;d^J&jZp^Lc((a#LeuD0N|4xUYD;T-&vEdS~Y(S zaxDL2*bV_Z5^KHM)_QyzH#5##OOt|GhE=Bwu?3-?^jk&2h@ zUPB&Pn?IQ`r+i(WtnE1naK>wN*rwH{xf`&sP035^@|ERtN%G#59JSSTUjxc#{&RU} zmFkN{<@F1_Wv!(*s=inIx2)Wl%A^K^&Q!nKX@UT`+nHZU#A7(E z6a*)o5a0CL6ewW_LctmWX`Lq@TIKbA-=8C8SiDB zv7sd4r*m6ATY7@q?rVR_EhdltE4Q^$Z|=wp@{v}jSKs8+4Yg{h1gl@JD299XkEACX z@z7;tJ+{a9AVHEJ=FY5e2yA~p+uH4D9!Yga`{8us1e5&WLs)hcB(nFnZY_EKS#p}V z@gqoqb-L-*5F`aR<`nBqbIHy|yW40QH5+2|^16EM94ozZZXIG2@0MPiXABL+pThj_ znXbj0%Bh70+X5Ch)9h{1`fTo&k)9act~JE-DO7F+jU4;!#agnS^p%Q_d`dfaWzY1g zSt&nvzhD>Tis#=&v($!5e_cy{zA0Z`J#P(ir1`ri*bV?Z zjvQikHw|boNCGfWmFYlqvGCc^rBbvIt@CZ6Qf;~K(f^4070K(;#}=EbC}Mvgr?NF8dc#qXb=Z-gpho8E{v<*Q4N zEg5NJwBCRxVGRzoH1AE$s5)qi$gLdJV}uHt?1vF={3g^&1G=-$F-^le3ipn2W2}XZq~c?3ytdcm3DR~T zR_7KI)!9u2N1$(M@`zTkPSb#l!hkY@P1n()OBt*N&Ljk6wi)5_mCJfgB<+jrs+Xff zp66&AwrK=n6xtX!^ts1?Sk@Uy^JB)YA^8a3&*ZBrK0}(=cH~^~6DHq;Yv(kAcnY@y zM}O;ZjEncWoxN(_>vj3$e%$s?983xt^gIs3dFFTP#1H?8n^?haF;-MIT>8zDpA}Cn zK4YP^yh%kW?JJX#-D2I9ozv8tUUn_+(Tr-wcwtn~`wY!p{cUn@4_L9q6(sUP)gtNE zUPl(&@`aeydV7BTy3T3joGi4LvNZKXxJWqJk{XM-TWo&P)PzM)6yvSZQZL@!l)soR zA$5b7moVgUM22AUjy6X7M+e$D13B7)Un`2q;m47zRLaHUYXvW@>zJl4<1#ljds@cB zOmD>EvP7FgUicwM(uHM0$QnG zt|%s|$gYA5%wJ8E9i7wEgsX`v?CjM7Vu*ySaMCudT=rO z9o$T=9Ih2B8|g0Yn5Itk^618U*`a>MG!*M;ifKn9305B6jXN+p1&vI^fEd2(zI||4 z*+JXUP1E29`Rv!Z`wZQTp<_5^GOz=l-Z1goF+N2xwA4H65&ZaI4LSXWk#k8!s=H23 zpuGMbC?julvhdN`)kZDTYfCUq-JNP&;Gs|9 zBA_fr$lm{V9(lbhUkG4c&@FKnk9K5k6}mh4F1FpJ8&w;+6KRCsqn&Ef)s5jRXma@d z%oVg0_Qjt3`nAq!>RvCel*Q}_``Mnjzp;_k1$-Ukpf|sYY;vPf1&Qq6f$()2 z(@(zSo@wtuFM8>irjGV97YAE~SPv7?ggY&)Q;WpoWWtMHPWGZf1r3?(@ghz=?TOoy z|4@$Gt{BWOA}McvEo2k*yO(9tP_IR8^$s~(+EU(B(tyYsFBGD=rDXrM#j=w%*?d9% zBe^-#g;M`$7IV3OVWUTHW}AcFgwrr?QjZ7a{@r>Z`lq0g{fA$pPFQQm2N&i)k=t8& zG1{|F(`@GQ>PFlMdSF^PCKBYE#^XFIo$@4jG1^nmi0bL(a!#ki7tgeJWOp86>dtBE zlrJwxz^CgUVf@LkH$9L{cG?l*4Yh&%rY&Dtp`;O``?h+bUVU&i(X`Jr*=^0wAOUPE zT3DpoR?YweAX9Qn@#BkLq}Pa*ILRE-y4fj72E1k@rR^L@GOE6Z{P z2@>g_lGo1~vZ`~YK}{Ft+dqBWv3#^^Y|zX)8q=-aW~Z*l9ww*zv73~|2$=4(iTnL| zB<=Ic2e&@?8kSR8l8Q(?|o^RFdjw#_Mdq!5Q|1{njq>qrUu><;p@SOMOd( zeom)J_j{PmF=43LoU)E|2kBDadK1L~s-z)B*k87in=}V�~v0GgWjC_^c*&WXvCT z5AhCtk37{k#qitDkoKJZ2E$!#04+#?HS4a%wRSEE_cs8yAcVA59KSjbht2*}r&`No zx-99K+iz(xg^>jtYWmS@^5qpu8jkf})QjqC^GKd{!L)Jq%G#6hwujk7Uzka^dih|Q z9R4FNzSr)_S1nhNNafp~;%wTBjNb3;fgKMPxSg}j7_^$yFk|l2xqDg%EMDL@NTY~c zi5;t;QTzrZk)MpMAs1YGUL9Hf`3pCROTL^hSFP1dn=vi&V|CkrWoWQ*yjN({>&FB* z?>ulF&J#r`ajtH!7k^;S9!UuIrvyG;2&#tjo-r{c`vuYgX_c`ql{Ut9V5o zM{+C1?rw%vsat~=VITn@>@&hh^!~JR#SQ<&k-SMK%^Q^1!-rsWmqu zsuurS;QA+V)sM#Vc)Xvt3ORhZuaJg;A3y0`^oDV2RhxIsyHY1xb2)2F`9rWLahZHC zeGE@|qdf?2hVzs~N=}aSF35)^_3_aR`Z#|TniPxqKfQ%6&HryLb>TsbZUia45tWQP zccvRt0NWbf;WTJk93Lsl+qR1Jw6-v1mjiFQoW@DTZc8VFm0 zCO&3wY4Mx2rbIeQC#8z)z6)YSK_e4~e^x+(dg?B!RbFYIrZFONL*2HqPD^Lg;80j^ zZj5IPayxhJMLP--+28f+UH?C0ZyqLBRqYL@)1B^4cc(Lvc_0CjFbQ?0I#nbPYM!T4 za{)@t^E{Wlwz)w?0VVR1jo=j`azU>Hxum)T5ecYx0nvy97Z8XOgUBUvG2MvVckSAz zJM!vud4v_OSNazqJ-*v;y-TPER-zgjhL_Qc)vN^^TEBR*HED_3uyZ z&wm*{vxJ3?xmegMy^n9`{r8u#7{^I7C_+pejYTkcplVfxrD0)F_Sd)7==EEVte#xR zfxn&$h3Gj!S!wq=qv8r7UB0l0))VDFMpu}K34i1OWyy?buK zdRR^xK@SpGQnb_dx-J_`r&xtrV~CIrdH6Qy5D5zn1TX6s9bePiayy(QKoP_I>!{^b z8=K3u8nuQ~+p$66K>U5mH-i`n3k|&X{NCO#ZiXY}M*aNr0b3wucT^%glXNBQ`V@YC z4KjQRHm!v$bl}z+@6D&lo!AKC98+c)~1;TM*SK(?+vvL9;7p7cVG zk@s!X^^Fjta;91=Ab47E_{A%8{Qe`WR(y!H@0lN8+I#GN{I2$sknKbqLuH$@T;QuL zoy)jfZCD=q?>g3lca^Yk*a|WIdbu7se&N6nVngcUa$AKp$5m_~*ve*c%XTxcT)g9rQqUujEex!n}3VrS&7>x@#ubFM-x)-pl1h);o(BM;)Sw2%b>r0e0H-u+bwzx^KW7~!O2UQ9<5r5kLO z*QWgrD^-swNC&_8U63Q;L8Km}FzX+*RS%HPITb46X7b7q(}a0puF&-YVDI`LYCVF@ zO~UJA@6eqm0S?nbppQ79u30oun>38wKKhg4x0h@ibPimDP4gJ^o%7^Xpf8!qCMRT~ zqO8GK%A0~Pee}q0;S;?76VO)5!Kd+lY+(35u~)!)5(kWsaal@2-6=+IGU6>@hIZb16)bHU>vM#4hJpSXQb@4Cmqa@puT82||%??WWYkfp-H zJO0=aGwzR5fgVnIDr}$vL0QQhV!Y}E`TSfL z59$RhMBVjx{|wnX*oD{F!kxrnCwu#MxoX%o%@BMVa%)?Bzy^8n`h%$bG%OfW9vJ(# z>_%^{`vEv2zIdJJh&cYUBlVSGl{*Wm6@%KGTLD3HQNXC4-Gy{cKZijg;lVupn7p^` zvFkrMfP`OQ)5ssn1!*WArL_aXO`Y%KiM3!F^+o*GFOIBQd-^8-f9#_#p-X>xWNH6$ z58#GSu?|pz+9)J6029nFAm^`-tUm`FuphX$#{@RdKLYuRn#lEQd^vhrZg1Zc?;IFFTb_m6PrCu0BdL(U5DWp9(bf!RTr}Er z{Ky7$^|MDN;D+^dP0$J7$3#ueRfM51Smp2p;1_YahSh+Zgxd^tCfJ8GCpkN9&H#9v zLYF)TN}ZmIPE5P!43@3W0vK)C3rEJ+fpG&jA}+93ZGdnO0zOmMg1TOK#e;b6#{eyB zc;Uz-wt-I53?2W*C(Nk(!aubqCx3h7uG1Vn`ZMS^zl9ley7LFFTnf1JBQG6str{3w zG<5&smoe~S%swzQnjA(0!l(X%{_!$^F0^u*O;cJbMCrmNPud#8eY$hGgbWFNE`a?4 zM^Jy^_z{RKa-76rE@Zo~w*pZw6V?^eE!rukTygZb-+>4T8PZfj0*`)bvh?rC_J<>+ z$o6Ne7>Y%j_nAX3tE*B9rO*$a01*;$-&{PHe|STWc@j^}D^AAe&xn$VGdHQ8|HD6- zROqe4cP{H){zq6Rz*~XCq{soQVPXP7N~?+6gLX?sR;SSZSK)vqB?A`cVq0(cHG;Ij zp-#kokkSV=E+*4}1SvIJ8G1AGI=qL33X$Glw)ftA9oD$bk&|J(#`R-DJQ01M#a02p z<;t=la}2rOfQKbi{IH|<>o?$GP#i}xk%xtnr>&!P;dt5Jtl9-|Ml0R~#ie9i%+%QH zzInvePiVSx;;cviwghog|g<34wHL+{W# zaQjsJrZ8Od^`>h+|skm;vc3BDVYKCwzE8#yp3p0j-Oq3CIjW7K7iMe zwz}o;RXYxT{A(L}TmO!Qa7~ZfM+@nix~XDa)*7V$1_ie9Q0IgFK>US9(heQ30!R=X zw(HT=8yv84-0_K@qnGZ01?2sI9NDrZb`r-Qk@z9CH&RoxZiBKMX<77|tP=6>!{?Tg z@#nVn9(W(dDZa2y%wJeL*kahMPRNvwPOBKDAiM#0?}LAWPa|QWW9Oc^x3~F~Q#aOj zjLn%G+c3Jb539FhSpA)Y@>{IkWh;$Aow3IH6oHzLgOcUhFrseguDNBZyK=dN1smk8 zJH=zacX9X1wSe&epg63_QMe+Gf(IZ9F+(aekOak^TiiWk^=TTQW3M0h{|=71=JW>ZM&{Jx_!+YgdR#P%50t_6YQi? z!Mqm$L%wVX5)h&y)rBE2+Fb?(azESz?aN%XzW4GYD?0;ZS1TVr14M@VyP7r#kqIsi zQiWvzjtm*JLQo;s)#{5pi~qp69(JnJv_$32?=IZoCb~GVN=VyqsoqW$`VMk?L9_sX z>QiLYXeOX@{z(&b;MEN#)Sc-5v#a~bWnDnx99}h##E}d?ab*5#S@%ODvlrfcFTm^X zU*2_-iyhzCeld`H?qUZY`0KEik)0~YDwAHpYtN_XmRhOri(Ug2fMIY-Sg_&kIu|fr z-`#-zd*Eh0y8Me@gJ9D350|62)^#5R%d!SSiKQ)MxR$RzK z`(_;A1VGQN@2%a`g^NHOwM1U9?tlbKRG?|EcBou25P(QZJgs-HfzFfgkn1Si2KG}- z+`a~DBb>yMO62h7Z@9xwTCY~QI?0CC5rgEwSk4t&yO54S!b8V>TVP|4e{oaq;jLYK z>FzjLn%5{3jf4uUHI-`A9m-I_0+%CL(si3bBMA>@0P0%^8+xy9#u~X!7C{cN5b6PA zI764|hQ3<$TX?y+5B+XEXe8yKA0jvk`< z`wHED0#-f=uOHKoA5@%c2}w+PfP`2LksL{U5X4!!gp)XogLGjq zlW1D#u&ZwL+1O;9hNQ#z#s7RRC@kgSgkt9%{2th{&hxtBJy_xV?lw43$~fra(QJ^+8^Ez9Sbxa%CA3 zEA?eveGwjZ3wb25(&ew+45^a9pp%OfR;QUI_L(@ z>O!i5R+=^xnXDt8b!u%?G70yDXLkV`u#k)fUNnjxxnG@)2d(uaj_4rgc)Ot@*RvX> z)==v+SrcVS4Y!diN1B}ui;gS0J61@^=!7|RDRL{jVs7#JB_PK>gQF{m&B#*Cc#y8u zGb%?z-zh@yB&f6oJ$?ziw}jUZn1t|>_2``4b9!m_z)*G0ESeu*PF*qEWL1JZ+Ddyn zDyTVoHVpln_rO<_un^^bmIP~{clOLprPY^#evXqk-hwQX@<>6eWOVY1%&GMz&0%qQ zi(CeCQ_2G~<=IQo(aYwPJHEGz)0CgYVHafd`@K%cXW`L=^*U$RQ-)lo{n5X17f6%x z&@pph7kYVRY90Fct~rsnp9}9Bo>>B4l$;_|T8{5T=tjMwv#XuXFw!$H@+4Gr=n}iR z_hY7uPcSoZ^CBJuT1>F*qUChaAC>#`<_v=_F?Wn-{HDCk|la{;KD_d z=TGRyt{%8>^wY!tG4xVTcKAORLyb4Me@5r2PHWp4RG`=C>^gM0Zr$46cU9dh23Ewv zDIdo|bqrV0=1EtzXrK)XpcwZ$=m>miU2mMbQm3d$@iJE?5W z+q5XL!3G&Lj4+@iJSgaXNk6yz#@;#;Ui_Uiis!D3yv@>U;qh>ZPkA<n#4LR{XISQqj?ST}H?w)eQ_RR|aKTgFh^* zsf2XiSVFwLyX!;5{`vGldlycL`-Pcd__dGsU0B6h!@@%lpC`^*plV?l+l4!qOQ8%!Gxrbw7V_k90};IE;TrRf83>gSKT|Ysv9PqoQf#%kOx2;3 zqq{;NT|!2Omd;_?)?NWiCQS7+=D$!};PV{I7>g;Vhp+k7=vWG-`tJfT)g>%+qP`f8 zoA11^v8M^*mDf1~!5`wB)YlT=!qBT*;Y`%&C~7mPekEukA*1r$13UW;g;%eHC4U8z zROw^1y{Jv=qkPI5CqI70M`0p=h=sAzsKngAvG?#t@i2oW83$aD@yd8DIZN8@smbIe zx|PYH_k7)*lMAWnz%5IO1Gwz(f&f~+&ljT>UP)_}=+iDxUqVLv zUYzX*53TF{&4srthr=8UGd%5QJZ-4_D$63D8>YULjP{KT^uw4o^qz3zEz>oF12%}E zRSk6FG-HyR1x8=s43;cU##PSH%5=4)ugBti5-m093Lrv4M*FtD(+6X0>^)L|6$j5U0IiEJA!y813$5fB zR^x3nYJhOLCj&AhWRk%5YQvv4^)_d_wt*FKYf2wx%~3^6Q3042q#nb|@C~`{8OtRs zbaXr2PmvBufO0T2H`!;_&cA`4=@c`pPLonWvcsm~U=r5h%e*i>B@7(=x%1#AxbM8f z3$Gv!j$0RvJv92t$jV9G#0^U>AIuHhijzTn65h}`a|%VAfRsZfM#$zh$~Y8r_Vt|z ztI?z7?y4119y%~MySI0Cg{%M=K`idd&UUIy#n@ytpN)gxIf_^2)hJiTyRw7_6X`d* z&`n;bc>mKnUXg4wr(nYo)?b6d7O6@@ol|=l8p&>e!}*(??(!8MVja#MJ@?@A_pj-h zKaQugFtZKxA?ABMR)d18xr9xtbVup3mPfKUblt7h?#dNX9t`|{oOkeod)D{ft@h6^ zGZ?T-=BFy_X(iYi<#X2S#Z1!#>5s6Sb#2&jBs_2}LpD3O5ZlsgxAAwh&TNGVNS2s{ zqG`28z0r&z(Wy|7AFn=~p` zU98X^&f?2;f*ngThVH$lyL07-$i0`Yfr*HAeWH88N+FqnLg~duGF-z?el&Wk5?AT2swz7 z0yj^R3TC2^Fd>#ltxtA$tP7o<+uMHs$c+Q%L$Y^rQLt_PqQC$y6i5mWu?v(+-1rIpYE<)=f@!!kRrhoY}q{!Goa1oApQ%o$XpA?O;1iL$vSwjOc(uXMC=^0>B@T z1*0F%0l8-2s>e=;vUa~0lCypeUhMQ-F|Ay|)HK%2wPy}Al@98i1e}z-%3v|U{Eb5K4kn?2_ z{}ucz5;A_o+I!$Duyd}u8mI0EfbshuqVan*7{55lpKAt##>u)Y)VZjNa#syO!K)7h zc{uA|3;Rv-F6cE04;@fhpnf0s>&?9<@51|pa|VOPN#`eGWv7|;`3tguKh%oU;cSZK zT=i}Eh!P$;e(Zbw5c|zgLk{HNQHXKkM3AOduj?qa+*%NlXo(|N^lhXcd*1ZVGua!oT#uJzIGU1>qD&VuN}f=0l&AVH}D_W zD00py=ikdxva4w-YDmZ{TuSb&fR`DM^#c!qu_xt0PL%0g5Qh2t^}WA7gqJ>HMgf9| zl@?aj7`U;^Wy}FpN|#8YtFMLQ=h_|&E(r^&4xBudSz@Ty>0za8GZ>{$EG#$eszKl& zr82q7O+fxa$wRDE<$e$*;h_^5tLW1I`TcmL%I9Cr52fY|RHE*V%gWi7-Yt&z&wdl6 zNO)-bEBA{o{nx&^V1!)+BkVH}x%V=}ynJwk>E?e%AJ$}AtRk#U=Gj8nD@0KCF<7o8 zWY~T%4&a67HlddvoAciO?+>wOc?P4a$%|(LvH(j*^m6FQW-1y(dwv9>Bvb@|x;^OI zKbmubJ^kapGZJTd7uPRN2$blgPvZ*5Y%V&TMB|Tx7|lX5_~`e;?yrLi760;hR}4wH z<0l|Xm{Ef)@>xTbn8H9aIcv-z$n1uC3_br7SoEc2ICp(&52U{M{t$Bh=bU1tC*bvL zGdSrvIm1Odxv-{|s#D5VEf|2M<6BRFzjYy%EE@O>incvDC+YI1`mcET{3}|ibTLWM z0l(Ydc2-oSIQln9>faJw>kCva>zT)wpVZWw*24l^|v#P$HbTUd^#U3VCO0!VZa>h7c z)KV*J${BehWbo-VZn*X8ywKgbYylBpcZsg+|9)Za2bRAGukV^MfU;zRs#G+FIGu^< ziZ*xNuMEeL^+ixtLPjft*O36BM_%lTL4n6#!Y}TcIhBmOlW^Bej3*AI>D#_?7IL|K z=_tsOka6l3Sda#v-iRh2ozv^0$3U;x31l7?A=W<21C3CmDgUYV!+VD>F9}}mk$TaDoP!1`T0UIBTu87pX=^eE}`OlueRQr=evf1gD-be7%mQV zu>`n3hg*I>oEG5pVCz80^(SBM?tokG4|99_#-0E`*yh*a2L0T*vsuXRrJ=+Y13~Oi z6)P(X!5<`%lVLF%&<(%qPOLqBlit42_ii3ISBB4e#lySiPL6=9gD`nBTy&@49&)B7GVF?QeR$yBb2?;V`ReLkiEf9m4S8K${I^pzfjW_3qBqr(quCN6y6{hWvb| zojs?DLz|S@GC9B+K=^z=D@Y0?CZUGn4D5IIH@W~yJZ%%S@|kP-cg(e+V#+rcOv3ZQJl+5{o;RzDUXQH2;BbaQgQ1$IJWxdhfrxW2+K#MFM*L1bn*( z5@5v-+QDje&0t74Sw|xJj!aFrRgFYAkj==_3H+;YoqqybS`r?j*1^qpKUwzd32Y)o z3~jxJ4ncwDuv*4-TH?d`w_y#I@E|une;#`4sUvH8Pri-4gpL`E1}8Qy#UyeZ9oF-L zB?ozy>N%_gth@`!ka2((Z#s0d*!XbGU@$m&k9IVmHqlf(ZnBmw4P9AIKE~(X1G7QG z1FS=Y7^di3k0m#wm*0NTk7RrAhNOExd-4!kF*!YiR=(doZ!+EXXR;AN%UHM5-c?- z4}2DImGiQzyRKI`i7hqzj0093(nl4Sg=2(*IWO}vNekro?GLuS?|?oFS*ZMrvqfO? zo$rv-#3@*K%TZ)%jFpoEI>G5-HBhlY9J9m7daSz)LjM*tK&syWPOX1vzxUWFwlvEEN9LLr}UI zJ8j<`n1-{HedfyfH)@C6OjF{hwWhK8q3EJTECB}vm`;4;0{WT^Y zsyXXyQ^Px;J|*tD-Wce!kcZ0e+=helUVyYVoo0} z0$scYChCJ5ry(1|LLNGNWdVmbZ|JStG!4s_P7{wu=oXbras^jX7gCZ(uip%hN_a@+ z{bAqi-qL$>^K{>Z5uNYFyobp{kcB;@WjP&VaP;NuTp=anpsKySudRU*x+ww=i|2d0 zD-8}}w@z#4*{se3d8Kg5ForQTc_bxav>Q*yWu<+{4AuM+&T?@?)}!8t6`LqWs3#v5r#TxumDvFx|hyJ_VD`riEOc(WWf1YD}ogA#q55g#PPF7@-m#tjJ%0 z^drIh*Z2Oh5=JPj?5D8OdM;Rw(?vs|qEh566-r$B@`E5p!h>XyFw*Zk`<6|;pACW> zaU5-5G};=zd+6BWe_%)E!1gft1DtmE8ra%il!^d3hgv(T`*LW;r4Z3_gj7bR(QLjLiqCbCoQ}530 zc$IO?B;os!iLFalswg z#`Q6!mhp1drYBM_bxNW(>(@=MST5nA!;h?j<-t(h)N8K8-!M9p2RX#7=iO0VmGU^` z+Dtu|VHHV~Js)~TN=AqF>1@3>&z}bLZgeI)|9IBmXM&Wzs*E<86_Y^#r1*vKxRi_y zc5Ck!7fwUXb58A#Kn-zCC?k(n+W{_t_>15XDS5888~ma;SOlE0Q3oXh?;QT=(9Gbj z0in13ljrUp*zB6AgF<8x7ov`4l}bBhmQcAQR8;6tX!;EFdm{`<35#Tads%hQ#-7%M zcR1S&hEkHXtD=os(oS8P3fDtyGs+XgIIDpjWg!b4&Op79zEAEc4PLsMnw%lU<}^7< zuvsV@q!;en)R*Z%0|}3$7w(sf{HhKQH^dpH21_ADFyj@-vgg$-w00ljlvYTsFJx__F_8c6iyBmhD@XUglb+Tz1y7 zv5B`QUYPjd#5X5ynfSy+V!|=OPn@~<>k~`IPmKT9_|fsNj~^KCERKvv#x3K__@?o} zv8g|gJu~*bvAae;Id;S7tz)&ZE5~$W9~oP-^dC$Axb*3z(@Vdy^wUcVOMOc(Te@@U z&SB>kB;^54jXUg<6&IK11k!RWixsqEnnn zOIIuLbk^%8avUA58A>Jf29sIHq$tnpq!I4DzcGM1Cmx+%H!4fJiB3*7*Fph}7pticqF*9|Ub?qQEpqb)}9c_;CYis6|CLHJlGD-5Y#d?-2`na~o zuZ>3d(Y=LF3 zj<3^-bdEC7yPdxD6_G)y0#qt1Gscy+dX>r9|3v78vNgqO*p`tqx*4XG zJ?q;d-IWP2iiC#C%4MavDaGAJ^vP$eL8@r5svUA&DiB-$IB5>%uZB|c#Zbpo?J~1V$fecaBXnu4x!sO6gCD`OrNDc+KslAtxhOR~RuNkRK%Gh(%2cT- z2tq4;-i;!C-k~~0JgR&4&M|}lWl;;cTv`=U+Z3xhgq|@|D!Qm>P!TTa%u!kQcL_b+ zHVU*e5-+JbGS;MKK2jCwdA3G-;zq07O4%JYcGVjq-K&c-N>&AVQ?!+|H@$J{7Lnmj zMX82N-?DR@KV#*%*F?H35oYy%4=Yo-TTT-{aWkQ(z|;cAxzXjM)NLreN;$}fPdOW9 zy6g?c!-irr=aV$M_TS?A9NV@0dvNWp6xU2?|^^s^!GblCY=pOtNFl z8675zEXGcXYequd(9kghQx6s53SOfW>O{)~ZOVaqf}_ysz)G|C4Dze-MyNt%19_#_ zCM(%|nX|U7o$9Zh@r=r;sTTBnOwcMz>2v=fwvU-xj9OcT47f&(ua>y{GLdd7+NgFd zq@~(irPPdERuk!z4_53}v}(}Pag)IA5Z9_$t5k=yUNR;Yjkn7Y<-{GNeT=nECFr;% zq>NK>Mb;_baXw*0i$aP`rix8fiOq);;dS34?-ebSZ9LnyhXt#;ZBveXQ6#4*Wmb{V zcy)r`nvM=PiIflp4is0wQ;-K8`M5vf{;Ei~7MgT5R?6r2>XerPMq88WC{sO)-snjrMUV@CkC;#8oUJgZzzhS+P-&+v%zyEBglNpK!tKY{;tRJLOzimdaf? zBhnezA^fVksgP>xy=KPz0-*;Qd2WhfvhG68#zh)Nda@@nBn3rwcgPC_;+$5a)GLFo zIwLFQ&isbhJO-N-<#KoZkdkfxXZuMD&?$2AwY%rU4My)n) z#g)~Gi<>m1;qGsewap)7%}$3q?8(sZO3s$AX3I@C6_<4)F3xALC3n zB0{}bOf=-SDT=iBw3U@+LU6U@)^J_RuIYDj#jelI(L+u;AFVK@YM`V{CdQu^={a7(YTePOE^iFB6LF(xOnatcl^UCp z1+#+LS`8(Y7qj96QMyFsGqg%mNXKKD*hd}_=@w0#b_i9A-kGSY9f~tV%gSRar)e{n zZ74c|sRjNyytu*Ka%W>kChZFsl^K)Esm*SDPo#@pf~h$-!Ja(n2)El1R$F;}z%TPu zE&RC?Vta?yO^2g8Su<9y=4J9#tHkDz{G=Gx*Gw&_I~>n#{V8cKv@&_h<@bcs%1+WA z&)7wKQOK(yUM&<0UK~*y<8xgul zZ#-LU?+(UjW6RyLo7pBOr!+C5k6`j=1g|kzNV62h@d|OtgBns4FQGo;Q$H5U^(&Za%Y1N_9B=N)?Rsoq6?)>&+YXx>q;L3RgqmX{BF zTWlUp=_>)XJK2h-UAFA_=R|V2td3Xtf|3hYRS9}82_x; zUPZ^4w#=N%RRyaz#vT&evs{O%S?qzdTU%3e?3quJ=8lx1Rt%K$UWb+s7Ub*S5XqKy zg4Q>}I)$&@p)%U*m%$NvbO6dkeFPGe?gy;divZTR6bOqJAzk>aRisoD9Pe?Aq3DA5 zvy~dt(wAlSQdzAx%F(_YILAKrQE+Qf3wcmTo^@QUMzQ9^VyDLY^3H5L^P_t-!H_#9NW`gqsx>%Au)4T76yy zu&w~;(F=hd5*9jk%y$lY`OpKKdh4zLx5>s12q8`+jUla)F>n%zSC#TwDTI9$fcIEP zg?zJr6E6XN=*E`-wi#Rrig;-SGaNdptPRRRlqywiHG@R}s>?OKa)p%FuWpQMqp$1z z)rI{xIBJl1>eXJTa75>*vZq*6nL}!th*{wWF;X6OUheIc{2&27O>_R!I0R=p0Z<8( z-Q+YTy(Lk`^;d$YP{Kp|J_;VkewgWNS7JGi85}}LdRAsODy>Y%YPYZuuhudvh%OJ9 zK^G~HxGwtz4L4Z8h5bQ<87}NYE~n=4KbxJiIOL3Ue!vy9!V=B%O^4HL(AH2T3Y{;Z z0@wzJ`Y!#Kjp$F&>Gx6Toayt>SbTcRX4~u#h$3FRTEHC$*Yh$(F3~XM5>cdy!)RJa zg~*#8fI3z`z6pIdKK(9{^lSno*=J8hHrk7wfIH+B6qTB-Y7ydSRT3mEq@tBNc^~Ay z8C{p0{yUNM^%O{Q&Yp^FEE?f#L`Cg@ZI3$mU=BMdSEF}Q(`PJ~u+V^}0Z^=w`!=CK zdip&gualYHvc)lrBOJ+RiAL4VCRO&Eb9s-;Q3c1^{TY0xu#ikpK#)laq8qbw{bkJc zW#Q;XA}g#ZL~5)z#TRLHw$aYS@GORE+zZL*=xvZjTK1*hdi2-aoUFA4ENkXeWTQ(H z@;7K}m`^gTAeZyfWJQP-U?xgONiF>>-0Hr*1;I8lQ?S0t`%Y&HN`;tY&-J#=y%LXo)ym-Pm79QY1}) z`EkrHg#kmBF-=bHP*p63pwd?k$e^;rH#+c{7gGDR9I$gAo%!+Ue~_=Dz6RdjISUCa z=LDJIT9l5}jZRgIXJZh+br;5wrReeOV*(vVsmvRnN$+ z{*u;a6OsU?wtWI*Nyq?pefQjc`fK#)C+0@WAEt08I%aX2%GAM@O9GJR*dB-W5~$o86_XXV3&1U zc^OZA0EQ`Ph4#G<(Q^HZnr~O9jc}hZi^D64L$_`C1iBSI!*v#J$rllvbkjr3L|fv;Km{l zFa7g0tLxQy}L01ey#*Kjv} z3U9vlSsbZIR!bjmg9YB6_j{lutRez+dix69`#HF|knr%`30zG*5M9?Bz8-H`*4b46 zq$6@Z`MD0sbEQGYyIX3-^|pWd-TO2&onZN2Y( z9`0SY?vKpkh(>}>Qxt^fb8vbo6r9z8nl2jZ zp|HVBE(NJ%pi;Gvo|g@PuG2Qbncw;`Jpj78;MVCC>p?Rpi3NGjGErQV8en2xhk{?UGb5eA0cHobB^E`1C5KEU~@+ED+h8Opmjh{@uxob~9c z+oqSTJ$(~&{MGAyy+^)s#-#)2id}fYTo(fNumj4mcBrijWx_c~b_Y>xsty_X&M!|x zLGIHuL2osjA5d--E&B@enGNF2>=`o@+6i)YPYnK>b0IC@@$fX-36-A}^aqyb)3=^4 zw~H}rcK~vzk1G0f|15wbY3C7Zj@d0Ryvg3el}&<+(i+5$5)@O+0F9{fGuds6xo_yU+{NIa)^;3a<2R~Tsbb}A=jEWFckkG z9Cw1n?6=Ntf(1ZCc4;_kcgD=lQ96F+(A^4?eO#*2n?76;mrbzWhTdn$Ax*VdI} z!KghHBWnEqUJxPSK?*R)gwwabwO_|q($?Aa^KWCV1pM(rCtqu3Vv1BDOvIo=AV$JM z$2%(keUA?me>+6fSvRkasqPCWsgyeB&jhFf?NJgrsk>mikn&Kux&yY0`@guM_mjJz zUpC?3TXHgKd%ZF{r8fp!;hN9wh$M*^?|x86!h^gOf7yxidT!`V?}tTNJPc%TxXG#L z>^%b+yh{r34ehf#;H}A+YDLq@5MPtUONod+?-YL~{}_D3g)Fde;TF8KuCt-{^kca1 z?6c?0OYx+9iH^rv4Hs&OjHjwZ1CPUwqWKZ*C=%Aq`yL0N-}czX-d#V!8>C|v$KMiN zz#ULF)2VPNkuE6oAuUu6#$s-K3Jg#w4`N?-9sKys>w9lJ1n9z72`ucG&jHF~pLIYW%e}2Prn|h7M z;RFZWdFFg~YB^uBsA$E*HdB}nsUWZnR=ntc8fFPv)_avCJm@*{_1j^Ss>s+4dY-X_ zO*wHmCyqhSEo7mUe;DnXmK%DH9|P|~zs3&HB`MUZJnNGCv}JFRbHmx9zsx@PEa)QP zkpo5_`m_1J@H<&&agZhnd2+WJaVKMN+Vx>mERluG2Yoqz{xvAGkcaNOW@Kj{o@f3I z2BZnIxUvpe2pX`2Kz<9YBCYc}J5jILGw3Mvu#|^Rv>qYR_ zaoWauR9cyy?^MFb^#WMj5;D5;61$~$?1gCv7T~#(6D&NPF37q}8pg~b#fxA~Ny*q6 zgZRl8ry+ilUo_^QTtC5#?jQd4(DQ?113VryXTqRy%;Eq_GSAs$D_>zai(IKM@v&$m zOstK)zlT?n^3Z{|kL>RK>+fN81lI!#ADS4!Og!#2wQ{9;TyHdSdME*hjiKCe=-Y)X zbofCCWV-2=2RHV9dK{b5IBt^YQFI0sFnlVM$4~MG0oK=4WWft<#)qlJbMjeLm)c%Oai*pu7 zOp>w7LB(DJqY4@_;XGf`*&(Ypey5vW2X!Po$g%|GYA|T$udm||9hk*|iUiJAk*8{9 zT3*t6!g5V2W~8y@1o1Ho$>{L$&9MI9Jg?QVv}x)Rob$E4pUSG_;IYH}e9dre4&m+!xi zdv?Dti=!dQB%)kt9~7DEqznm*-o?4mo$mr_?UobJvl12>__}%rx}*N+mfq|M=vo+b zyXOa8rR+>vsHirb)RjU>U4|%g={xY97qZZymoM!b8k>7}z5`M=T>`3*fy-$CP(u|2 zJsS)`8CC^Lg#2y>f8~Wds6tT?QQ4Qz;+4)is{~z$@fA_{B77&#dh2<=JDZXdG1<34 zmxU~F=T7c8_$0vao_ZUbaL!pA1WATm#@-0FschJ$v_XD=C{Gb7%TIzb5+0;2n+rKC zoW#mFXL(SDESaIIqfA$d@p8SOjaIx7BIYyifieqO;P=?KtM~KwrmuorBeQZi(-K9X zM-u@(#6qZQHGjfFo`2;}@ccp!L54%f@#dcS73kPgwhlFM)!6lriRR@c<6u9}+d7t6 zTp~wYkQGW^ zwk)v-3S=x=W*@k28NckzWg`=BO*}jC$i%%9H%+uA!V{(mdSc_m;_=tVe=+{x_+8`I zPc9#?j$b*h9lvn=jIsB|{xJ5`*paa>k6k;K8}p1^I<|9ca_QfezPR+qOTWGJ;K0*M zrFDT*(f=AfIuIQF`sjht&S+$G$}-A~ZXO*P`OC%v(BFn$8v4oP-l6-3ZXNpMP-@6Iq!`*ZG&=a!;Io5|4Bk6<(_nir zJZK)I2R9B5F8=f4U#?pG{l#}LzHxDV@l}g;i$Ah>?ZEqJ^sVtN>;84%&dEbb0gFPCJBV9LF_f3x<1rX72w(ohP2?bC&p z*N~@;L9P-=6;pnm^X}_kp}TD?MMp9=wSp^fsf_vKM2eO&=V^}tqV&_cPPrWR5tN#n z3wheCK5LOrMSMwpq!#h)ClAQu0Ux8QE9~Y7UrL)f&lQAjwq;Y4BHD?|#@@YF~))r^`8OAxY(x;R}B&(&bE(hJte}9ZnakarUw) zugG9)kOe$LQF*%%qdSoc2*SW^YH~)V5b`-;|5nywnYEiqdsCt!r|60&V2aeukZRRJ zU{!9D&zqw|)l|h^Qt2Fy#F@v4o+gdWA1HO$jHMQ67Bc63Pb5#NJ-TqUsa54V8kH=y zo**IICdx~(bV%uJsUj_oVb=eNv^O?mp;Cd3WmL7Gwj$qr4bjF}hTb>o%1(Q+#na~Z*AV=Hksb~mlS99^4)+W*$ z>JaURQohy_Q?O{MO_g<1_%7aUD7F=JIpB91?44#RpW#l54`dS%mt9rm{nm!SSQwUE z6T1xwwVTpdO9>{Hx3}A=;p1Zacr`@vHh(*pj#m^>X7ZCFJsM%DIBWH0{Hc)2MQ?kU z(DltJYmiQ;;Dp}^KqzX0X)Jz9d39nD#O>X!#JKcyzH0 z#a3lbj|ys5Bm{cf{}5$#URjhe#qDxgq*`|P`4yYi4Nl?i*I8mZnzQJWdSAXAEhw$G ziw_v>F1nR0l*^53N9W~L1UBT>mI5idn2Kl3Ms+TrQSABw(MM~STbwmBUsF0=c9r5H zf>dy8*+`A1jZDO;C~BxmY}HjnyjEuEOi{F25f7(g&S*-0K0yk*HMLxs7P1PT9I(Ct zUE=H;iF{2`QB~F*9c_(H3vIdM(?pKOYYWl7Of=cU46Simf)R5$t`DV0 z#QxN9i9D@k>XgA$)md~o`b(s}I;T=nd?r^;ro;7AmC=i9m^!Ls>9oO{bERu^OrcyG z6Z>Bs@lj9#p7f8gHZc zMSmB6*Osy{ikMMG$=dmLA}xGIr0Xah?Q*#2cE(iF)iTBiS+Z5(h-#{pNEBsZyWHDy z&XVRTH`}J76{yGjEz?~ca z+Z^4QrK=62EMWpvq=q^3hjVn3o@P>2nYpCXW~XGVPDL2Xn1`YQ{<^QishcHbY>0q1 z+)A6FQ}CH$9mW`U^NI7t(W3;QC0on3!j(uW?q^cxFDGg$b@!o5PDQCGB~i(ZVER zg{h*_+pe1}IpxO*LtY0^WJM8Zn_W45I-ed^lHZkAs;&Us6FM|?WwXuG;#`+!Emm6A zEVT?#XS5cLuDU~P9!->KQ?SW3EUJ!1y}~3)_nLjQ(H<6{|xr1^&2{!=2Kiz^|6okbRnmdgUv#N8q`_uC>&)2TI= z>&9X(Bp1Zj<@EIkEzn7S$?9NaPS!zCUT$uRrxjEMj;axj3?lTCLR1t4K~hXX7t}_I zT8%Fd6W%0rw&RM>8M#MLSd02(fHT}A($j4xU56qt_Cml^Y{$1HTk@E{CA=lb-+L?X=6Ti?Pi+w2F-N1j5!jI zWZMeGdeWY01hSMq>20gbg36UoUM}tvOr?`xbw#0C3x*p8d*m!}X<*89f+`q-^^!5& zsx?v*Q-h))Nu{jaPmAB~P!dWdct z>Iuf8G=`LEzLeOSBkk!%&A~w0k4`(SsssbnN@5ne>8dtF!95WZx5nM6MAmqYD8_G6 zR6E6LfQ{Fk`pl)`beYf6GbN_!*~5$ST?v+L*_1_P+CV4LiZO8wrYhMa<>=^af}-X% zcQTW&k@ghiU8Zzub-SbT=xai3?Wjn%JB?JyrHzCWs!B$#*zy;m55+otZEq=IGBo2t zn^sJTtCB2RsZ$+oCe$#xYo$hN+X!hd3kWW@2x$crTrzFT+C>XTruP@vn%(48%H^s; znNn!T&&rglI9v9$^)jE;lYn%CoBDL2la-aIdPvST%Y4IF4{x-H^eGDJ4zTs6wq6g^ znU+FF_DrE2(*>Dyj#pN>IFpI9XTQ?dM`&9^=3F|==Col`J(M0lM&z_9mzpU+PcYGT z)S0B^#847ijdq@PDYN!qE$z(fUF|91+2)a~U<{Xuw>WHQ-1S~1E%(^sdwOeC) zdya|4={-LMB;3~#c!TanS6lxuJVjTb+K?lW;UINeQ;|^yK1E(!8Rvbp!^(2rFmDUF zBmNzPt~Wviq`#y{gIBqlNOQhhNx#~Hs;t|VFQ?UU9_qH)e@mL%^jaSkGxKy(=C%YP ziN%v*b2eu3E8~VKzcn1J+T*IP5W2PM4c6tp6vRLVWLmlQO_5x%vT8^t<*c$bP8PN- zBGRq2+D^sPkt`=mFqAbmc@?2sI*tJCOUGgrpV1vkFpI<;&r(SGf=n?MwKOv6EOY4& z(Ok879U3N|wyItAbXKKew0|UW%#ARVb;?xQjMbt``{L&in7i9t(YvTlk>wp>ZO&;= zdL9tlm*iR|+qQVp4ta!jhA$wa!fh^g$}|@*X4N`>GVE0j=f(ELDHsjmJXKa}U3s%1 zrWVacb3R>T%(6VBvi8tH?bZWgd$<5*jCE(UnHG%h3U#qK>CFL`pQ@-@nVQ2moY1lx*QNc}OnfGis1zpxb zM{`YcESd+XtavGY<~lh0OL(Y!7i8-NFwiEnZ{3_H;?R0UYXx{~OKH~}aA7(tN=H%_&+*i;zub{xjyeyT-3nhmFuw-`83HgQ1AWy=B zWR!Oi_zXI+c~0Q+tsu}fdn%t&zzoJbGg4jJO3YLZvrP*RppPT)16MI)9Fsgz6l{DEYjia3rnEZSNp!RzIyd)-}fqz zCKC|`5D5%C7Y0F8To8={uTW3{brk&}I65k$4jD#qaAh2I(mMJ-ukK5eF2m=~@cHoh zbk4nX?tOQ^_k7RyC@)Sz6{X`EwGy&j{LKoX1UIS>@oHq@xa-JAZ0d^}RbZI(r0Z6J z0HAQX6f^`(4GtCW-V7f#lBPWU(oLE(`7ZS{o7E+Z(VT`cGEB#(8k4sU$*tzJ_2`e9 zAw#2(L4(EKG~|*5AwkHfw5bqpipo>_Rq&i&E>;ei*6JV{>}(ZY>;1<=paMP35uJ9r zL)s(hdfnMGH9L&5c`v9K5i5tLAP~%ujO3QRD)4_}?S_-V!@+(I%jZgl46PhEsBYWM zawqfijbu_b9KIevPB(sLr+W21tsbf40jLLJud-+5Y?|PhgvsR&2Ac^I<}#0&C6*b;gS1N+MiFg(n{w%=#){h=4b9u|9GAn9@`+wvY4WpObK(c z?MOb6QLa26eljZ7oZ%hnkI&aiA^A)fBW-D+lrcmMiOvv<12~WaDg=mMo~Ar--Br3t zR76vPM+yjrlXbeH~iatlMZI$V++htBF#SQR%BU0t{*fhA|Z-8IlgQ>YKKrjU$ zAPIP!;y92AcY%Hvi}#fUOx^!xX+V>(1hctNo!Y~lKn20IxZ^b!;C~2^D8w;{8wjzb zEPdq=21w6a33YbMsdK1@Ui#>fv2)?|Xvkp2E`eJ5fITsLa-amTJ05@;g&~r(ABb(5 z>bAYhKq&E3W(6jV$jNn8E@D)Gx0v0OJ8z&MLKhVeW#F43Kx8NZBs8G*ES5Uysr*f{ zs)zCq0e{!IoVsBfR0{W+Az-wSfQVXd%w4k6@jQgF3~(xtSDi9di(q+Dy*2=wveffN zA=F|XqDz`1B{u<07mX8&Qwd6=br@HFTK&o6O9Hm!*I!tcOkGOkg{ZTSIWx&u2OwK!*X#GyJWwQQIj^;r`91 zOjN{{;RJT-&zGvxrwy4wnY7#u9NqeRi=W0eW10nNy^ysmk(KQwyGbrs6!*;6)?}yy4)`lxd<7l=2NAb%`B!VlcJ%Xb@)9A1tJV?QQqxRflGBH1y`OuN5Ovh(pLbj zJ{c!!adReZ=vHD@Ub)!-Dn`W0vFxu-CcFKUL2C{Fag9p|RfV+WEd_$9V~wnzs1u2# zV)sC6jEaHb9)guX5EYFX$$MO55keb4lmoaIIOStGsw>+Ky@GPN3FXE5<#bVnhsZk;lMr5&ZoQ^|3wB8oJ#JY^WCi z;pZ)2L;cyR4d6p^k_}acPD8bnixrc}W-0YkF>nL67nGa*P{N2*IeKpz@XcfY0B0jV zYHux8CaR>{-!v!jpa^&11nI*@z@T`{$Rlg;|m^q32J`VyjOo59VQp zjfw$X_UNVRwt{xHsYP;0Bhfbk4?+oUWZk0DEvoxxmy4BSuRWzSMjlr!0}&H0mS7xo?TihN3BH4pVQEGBT~%|;GkN~Xuaz@o`DLWVL}-5 zbqU^o%dHk=YT?D4;wZzfN5sm}^KTs5rXe&<877=|1WzyNfE$%vq+}aYaY=@%&BH1G z9D|P-6)Q)`k6ol(^XPRGsx1!n&_~Ghipkq&w@-X_hM0CvNh^OcHmx0i|4S=EV*^6f zY_$^2G{gWcW~xoAE0`s;L&D}g3<>}7Z|tO|(R|90*Z&weQS?YKLG@v7M0W;Sq z(i=(|!muh@9U0|N7ut7JjHsO^dMa=;6~o4|fk?t7+f3$snZBgt`cUYISh@c>-l_g) zUj+~rc%}iisFN~-p$F%zzyapFPV2-Gu?E5d-uvscyH5zKM;W|eiiuse+9-B`_x^hL z$*5Q(?Ge;RuZN$kg&pKE;4_>a=f>0xXJp*Nk@SZ5VLs!OvN&mwODT8QVMqXy{SZ`p zM64Wr?q_h_+<4y(_4kKhGy=fmI%q6p;172DT_czUv5Lt6_kU$fQ8y_+yII{dH=1(f zE@0CF&b}?G`R`R=R`VafcB#`!SzEAy7i%4%YEA~7;Bf{O*{p232{w_DG|lg9pK__j ztk=9r>$<@4KIlPsAalzN&;FUXPx6P2l@yuO#v4%hABOAUNSXq1=3o&v-4CHjR^2|K ze)F(~Igl8W*+B?q3-ml@O4JHS!6i3>f{`@k^`F594IwM{->B`1p5vMWB5D?*x zLpmz^+>(W<>U!RNn|j*ZNSb0;4PmvxCuE2EtJ}0X)DnHXL^)ctG2^OMs1BNZXYedW z(kD;8k$lQA2gJ+-UzhFbmv4tfOTz=Vm(B`RqnYhS9qouCk2}*Pb~vGxgEiPEmnSKr zpaICP`_NAHzS+m&D6d*W@N`U!PH*?6D2Yqx(+l5_Kl z>pmFrqhfF={qtqYGxse$TYON3Xq4W?aZrSgN^yg=Xe4`4d&!%#I}%pqd+$}xo*R)W zxcbz^s_;IzCGJ=W--Nm{S`WmSaMG6O8-X~VPAcOH>{`pE%AsEiL;T4$wWYw8v)i+% zc^V=GhCniqAv!T<)^4JL-43bTegr;ZR6N9>{PxH%x2t1!YQxF5xB^t5c1^p(=^zo2 z3{r=R76K6R^y<5yVMoN^+_~j!bguaBU8)-{*|vB~gcz7&+t$XdDOhBN(@MA-rqxIq zA{xYg3Y3~3z8i`M-17BHgU8|uQ87c(Zp{WdpX2)pK{{%7jn zr=FYo?9}_G{%$I-k#;Sk?D~fxWtV$3y?XcRRg=G({NChKlOLVDeX>1y)ub?a!Q|Fe ze_i$Js&8wQU90|nRc%##m0?x%+*KPUjt>dDJ~#0JAnYnmgeESYIBR0v`0s~gU5||4 zGh+w3uIvfAu9d$9O0TEKS}Q-X@~)NFu9Q|fSCT7tt(+M9<=A(}o*et|*lj?5_M&px zH9Iz6^Uc}M&3<6^@N8i=G<)&vzS(u_{;=*R>%O+`k#+a1yMA4IomYnq{buI-GhaFZ z8zPEAt-)x=tR1%DqpA=u$p#$Ip+3swv<2;j>Gy0MU$J)OiUZoFd>#VT2+>lIqe_4U zGzBV#j1)nti4RK$%Pb&5p*~UuA@iM4`Tgxos1ido=_$16}udd@FYU4Q}>6m0f*SBO7)U# z|Gu8R5XnRQTwvrWa&px#?n9gjLM&;IkUa1OMT~)lrIg!-$Q^`eyU_+V0)Y$KOqE_~ zp+F(>0wLP$HmQEVVyL%zLMgzW{^;<5UWhh$xl$HNrIydu$`?ItU0ksS2%u`|lrzqf zJ3k@l;t1zuVpf-5W-2+0WWEg5GD>$zvKOEmWUI~!Qf^C6moH$^AYR7`mSmUf8|?XQ z`%yw9-@<_Gpzr1QuFQ}U6VT;yDoMmSi<7Yy=st`4f2PYN;F%~;Wu`)#1$!Icuv(Xg z8Z0gVz|hlXfCYzkNvNJc+KKlP5$A$CXM42oV=4=M!9=Hb=rGNg|OgQ;3)o z0ixmy7^9TCTrjXZkdaV`a5*&23tGSP~0E{kV@iP&OR8L1CuDm;a` ztR71uf^|&f24uPwg0i=Plf_cJT$N31IJZilqrqTFBARKj55{(ia-}?arw4`C_Epi~1eywx?*9Ef1sW`=W$D*W#QUMkb^A?4=2$#^*2P2-(+9 z#&LVEPcUkdUi0bk)8$VSv)yUnWIkcqaV0BRx25+Lm%SkZ|8HGhgz(UASHVt{)5%aE zvIEw38z~DmOQA-!AX{EnL7?5-Lk>5de)gkRFmL}V+)0T+)p^AvMC>T z8&P|@+;z9$vsNrMsb#~mr$HhZ4hgWxlQ z(`ABVzQdfUl}Os<%^7~KXSb0VA=ysbyg^U9lvxPs8;H|dF%UIRFvB`Ip%37I7g60E zU8xBCX~C9L=ovdD&iol&UMbq}dY#P0EMeMKXV-r9gxn4n`9g{VGJ{0B%T3*l%5{`F z4Qsp`rdW&(R;m5^5oN)V%i@Gk0CTkL&sh>#o4!>zf`uj?uE(0$6jyaH)MZJe-`qc`Uuc)C;;ECnXb2!k+PWGBMdkp07{)R0){Z{2pJW+BK%r zLD`0&3qs0nOA%5o7d7NeS>V##`qEI(f{+6A8tL!Teiz+yv_ggLdXGx|jFX7etNjk{vfgx(B5J1PQcoQuXBLN!?CPTPm_Cxv{*O$OvbgMt9_ zw4iTpN!;kdgXJn=1xFvj$gM;;H9_o^YJ?PQdcl0}jNr+AM^Np>av)0D^HMN~(`MRD zFL1xt6N)52tg&9IMhD>7&tLKZU0xuIq`M+U%7D?r^XwU4L-i4}ojMSJS<`sjS**%) zq@F#I#_?Li6Ueb8%vvQkm34WX?T|Hds~aFBlPAqbwjlX}=yDYBOeK`+8S<`XJco5q zLZTZ>l2XU%H3{B$v`U)vT|3d`3V4IA(TQfuNe40(PS0QBgJjfcH_LH1C9vt$zeDv* zcsYLzYsM{%)e$n#(+E~2BwU#oDOrhJ!CY%4Axs&CfJ{PyX`9J9?IK0D*IjEBcYi_G zPf;Z@+Ata{O-}C7*=dCHfj~FeoZ!YC-9pLdPNc?72vSl!5wCgx9%t*}ZK9~c?I{G0 zU7kgabOl|*BjqC2!s7-HkuBK09YI#A55gUKL=3T?Up!|RNLYF0!4ueuv5x?7!Lz8* ztsq@ZuHgg@5({9RH11%7r0Lpx21}AG$DQ;(I+70zDN_gt^68J9c&m8+qoCWjs4=jh zyZ+z6tcJRkGagdc&yA!(gy{d)fglSHoq)c4@MA-T(@P4OUPW}_&9aY9`01(z0>cd} zOX3*8oMiMhjpWlJ#erk^*fYD8(8tx|8etFo^Aq5LCJ*x-6F}Prr5s@{(45`|yd+U;oJP^WUHW@;AG2fM5Ig4lBlk_F_?SKLXD$qhjTd z1snul*z?GC<>^OGC_DCP?IFptIJxu`5=`0Rf>CJ2^3h~Dn$9U7e?Qb~xfJ}*XTUyb z{Kp;2?hl+$b;-Tz>G~7=rWGsya~7MiPuHeyo&4~`Q)8QyJ)imT|H8|c#&UyRz8Zm? z7tC5MN8edm?slt(J~y;HEY2>C0zA==I>=19;o_5N zH`}F^`yYU27!@o2eUBVeHht(swW$Z8IiA=$E@l1uW~S84V=DOISDnE?f^>vKlGB(LOop`bmB-Q8_AA{5E&1B z9v~(oX<#J%oenV>|AGcFkrvl4eX*^QsI+h+7LetBBNfXPl=PEO^r%>Q;6mD_zVak| z>`vF>oHmk<_G;DHP;N#$4`Y+(7H|!3WeWr&B!1@h8P-HZ9Mk98xX>eh&5PyVb9J zQN38V-K>bLn4O;4I=yG=z$73tsKQ^0e^$tr1QY|wC ztI76hrS<|?T$T&Lbn+kj)EBDfT`;Cx_TgKT%9Y9Lt%)^mcfSl&LpXm)?l~!6j_y*KY#f!mNw9|oc9A&W4TEc+$9T;#{k8T83McY zfjg&U?_83gXWV zWvVjvjXnE6cgO7|00WT-40O>6TuU4xx_L?oAn*aoBH$a+Xp1~iM|QXz>}5|T3_EpJ z^~gEq6D_yyCx8QjIN=1qi%OnQG4BqN0?{1) z?oRcE-wn;ji#tINT2gIxyb{IRMJ~}RS{lW$u18%26a8o!I9F%i4!DemH>q3y1lFpZ zJ3tNE`)QNRH}L{qE{L8i1y7a3>YRa*EOv5SLDNV+jQ8YAJUi^j%&^1TigcqLFa`=rvr3dF>9k^ z&$W^gn^(U5KhQk4{u!EQBu%Mp9)o303+(pGKWmFJTr%Y*-gTQ@va?&uMGEM*SN#Qk zJCX+GE}#q>q71+I7tKBa_LVJ5+jSn|ag*_Omi6|+CA&Z(J&vPbURs_6V7`SRXmY#y zv7_)QI?EuCrd|M!-nRkZ<&{-)5aCuah-Yq5vFhqefShbmse}VE<;z#*Z?>{&Vt55b|5p@bqOLK342{N&cu``<@{BH{c|H?WzR3Z1T2{k z-LqZ2Z`A-eaeRv!n+>W#xh{1p5DWlbi+imG!z$gG!P#>oQs9*UPRk+MI?$vL%at~; z+Q^xZRrK?TD&S3~1^~Gn5uXG#v98g+#JzY1v?UtJeZ~}Rdni-X6sYDnV@^}CS^2{B zV8iV4B;_dkaj=!154e|IYX=&s&EgxRHm0J~l^cCK-iT!Sffhg1ayndZSn?#$ooRVC zz@fcY4|H5vt+kJPQRBBk5SVH$U#d}!GG+h*J1%04+bUUH!}J zU~baSRvB$kN&o=naXm(4M!O4mHN*F!Mw){9(AY?GG~sfZyks#HD8T9JJLe4c&5ej* z*}HlFJ;wWYsMd3#?O@iOzoY>|oPi~k2IzZ%CYr8BLFt?ieK;b9Gjw2hK;N#uc0Q=s z>0NyL(ok;Kv39psVI?Ug8>Eo(=lz4TXO|0MO}HF>AN^YZcwnF*Nj!_^f(|qQ%-#x~!kcWg43BxTAdv==jv=KEQV?dGWt!lM?Xa`YaXFaxH|_xiBVsh?wNT3H@jU~u zOGX{}M3k)NDONoeo7}=?j=b&lq_2)WWG7p~J zmQ1l+1u~|@IE?;Lv2x_uTh39gdFX*H>ht3;h4e9U+KS0LC%(M$7Z4VU96N2=H6<&1 zuuuJIS9p7FYc@TI7lD-sCf%DMXnXRli( zRE}9SR$2|^^^g0sQ7$cNj6UeFUn2u-kf;hROQcfBmc6)gn1hZQ5i1W&uXn4f_yHhc z$QV^&a8E2`l){y=8E8=Q7s6+ciV@Z0uPz)2W4n@zgx2iay=U7^!FmUR9i>y?DAP#M zZipXtF_bqVRYdwRxBA_S2O0_LqDHiXer$ABm^2=C8R@9ITPjMN!X1QPkBAk+N4{fM zA3Hd3jm=Fxxng4S)fJPkf*VSF`bPEWEoa?5u73HJvy9`r5Bt@FpcjPB#jA8^_jz0jH$`nu6zzQ4^@jij`TEoEv^){J6)3C z2oi9M*<%cER=(m7!(P2S2@qr-grm$|r>|D7V=b zoQ!6RNLeWi%0|+ZV;90v{fh@9Th-^nVJ%RZdMO$t@NK@jx8)K%qDUB%;gFBf)a;*K zE>(`=&+k*d^n7ztS$k!4gL(yVm}+-Fm_N|a`(ep<6XQ2 zYKx|9zi-J_aIb}zrAz{N71P>TeY0}9Ww2pxBn?i3aDN^G!mhW#f&=qPqx?bh3Xj?3 zIw`PZsqNq)3@wZFTx$S5BWcQ^M<5{N5X$nB0fsirEsgUB)yL_wB`Jx)gb3klOEqz* z=4~XwoqQ`B$pjVq<3ZIc4E$poA|*?(1<&ICcGM}SUI8~bEh&!xhO?~l^iy!^Qyha$r${>QFPEx|j)8Yz0vgR>6W2T}RWsd^2 z=(q;Jvb8J;nh;1?uvL3^s6TKG0EAYA_zGaysORZgHeHV{lzlIhme?#UZh-ZP=R=-;=0_dCN!%~SZz^TSK)shj1Qz$uzVJ^J$L zLH*wPfzZIW8*ab0rQ2^KU$oTlPQ8>7yizM5Du&x(lofq2I!2Pzqj&58JumwQpH+Sl z8q92q=iR`=8V9!qH|32&^y+?wPMGbqredqIKRlS-a_TIw$wDVzv;CRe|IbBuYVW3_ z!qg=^a% z@lDFSF*;Cog^pUGWk@J)vuSz9p6GK|?9_d(-jTf>zohplRD371>R^A7ul-Vl=YqtW|Y7dGb+#zcLoN~Y+$KHwe zt;*9^4z?)PD+Y5w5PPZ|z<`_CqO9L~6RkXc#lZ9??J;}h;K5UjUU=QutbG59j;n26P!LY_3-5PSB;NfFuQl`Ds7#!!aC<(w7~j=4zG2p z9%|w-tkJRNt4X1m)7FKJ%HLf#*f=+mrW`#2P`j$~5^&L8r>%3oMU5y59Z};Z7ITs9 zWKJwKLUak-u!ed*-3L7*Y09w|zW`Uu8pKWAa4piKaYP|K^-hmB;g(t;<#!n2hL%_M zv|vX3xC=94Bu#no=bzROcvyr%|wM$!PH zIW`P_yhHs>O*>Nf7qwjr=@D9SuobsCXUu1c_6?k*)o1_Qh*-ge8#E}}|0mD!29QKZdP+0Xpdd4#e=Z!qy7Q>2N{l~ zWOKINGI+3I_iR=?CRjk1C&9_=bZFIQ2Rqb;SpT z)W@!eJ>xXM!rcu!<(DRZwQBpgFq0W;se7=yuhQUxno}e?^fkOLLxS+Pja>okyyYyV z;8(!<^ZYG?*}0K4SmQqi9k%s{JC*Zp9q5!}w%Z1pu|o5uMGEU=h;9IWOy-M%+Z2l@ z(MUS`CT&D6Pg9O;d>nROjf3l^o6tydfF3lGnm8S=k}15_NvFMzGTM1JDjz=tdPdUF z&O5yRuK7E3sa! z$w->Ap|BHnKMfT5bVD1++@cHgScZG3rB!S5l)owGAzB(3M)e8$-rGRWNE!?!=kP&d zyL#!hPtJ@f6Soh}-$2{L%@*l%I_yG&^fVzz32ZbF(04=(tE}x3_0ii0fwA@d6*JZ8 z4^BNdYnlA-ReQ!g>V_1N8s2R+=T+2AKp=1I<4t=u-%Xb4E+UPVY2~iLX|v1Il$XDi zfs5Tk-`k=5;jV%1q`UR*fo6%(JXz5}DQ}}YHKNz(*W=j=;R-x#M0?IFhDCGC+4! z<+t~qP`KefXhQd*7e+i9a&+8D(guPHn&V8M1ZT~mKJh-#HUAg@42RhB+ zwYR_*vx|OEXc~@XKR~P-q@StUS{)`VSo9kH%ln~*BWcQu2`~%Z5Ke4W7QSJ;NU45c z@LT;}y<^47Kg+KXgmkpyBVTUX|cM21to z^f4IrqhjUIedoaC`rx;Bs`SSP5Jq=sf4tv1m{6|%#9-G>_hMwJeXFDlP=FYC7ZLuJ zx1^mIHY)#gWUvVgh9{>eN3VMw=HagY*rA+z=Ro&yx7`JeAuV1B6-3uaoQb6c+>|%V zHF&l5%91ku;9%eSQL*A*CA-zz9)w%yE^+Y+s0^}H6@-?Lq2f8S$S2!HK~P@*Fnr$M zNRRA#(4p2pG645!f7_eH@kql!*bPo&KR_x!_$d5jRIF_HW8R_09)gz!C@{WMU@>nf z$b{JF2O4?C?X@ZI{RI5_Z=@SClY+YClW+;yom$jfC6Tua-|D-&M84Pt&ti`SEAr+;gH z;$3YTZBwouKwVCmLlM7PI8m2fFM$WU>kX3?5R?g)o(CEYVmb6YQ84|5irJyYy%-S9 zopEL>mpb#pGtNwyPnA`9{cAf;I6hB3Iam)@DNn&IM8IL%O=@8%AaDesm4I$z7RUlu zsZ(W9#Ld?`l*gVNnBSydW}kv%{OA@r+&Q->KX_`e{%^O>*Z*Z#M!oE&TSIV`|I#1` z{KRAMTrqw3)Uz|$$=|HnHEz>ZsUWOU@kMaMeAn3Unmsb|(5T#~7#@HXaU^XxDz%&T zR`tFI;Fto(cp0XberRG`40y2Bop}pJ)MFu58D1BmV*!jglk)2(#rG`vWLlfkg5$Y+#e zUx(Mx46fO0>zzy!Q3`=SIZJ*emDa%FFkb*Q@IDgO87G4JER1EqaVOkke=d5~Vl} z08&cnyf6SJfKw%^N2V%ZbiM35gVVNo1z<_g_$3HOPW!0`EVypM-c|D78SL9~>QrEG z@SK=XFy~h*mwtD!W*Y=?$%9cEi$^0RFfr%6<_sB+h9R87<|j5PjqhqN2B*xT9^o!T z)mgJAa$?p)9Xg4Sqmam3XfSu<@u(a3M*V%HE&VTp)3&}z7DQa3obiLf#w~?jA_Ru+ zlA{ohCUR~wykUR=9H?HN7_sZeL#N6Lads%ZX3EZ&;2UAJz_iwamyoWzpCR1@Xoe_| zNFzy}j1)L!RwkkI~wue&GAHC_4wEoAiB#n$AG_*D=Km74v{VB(ndjHSg4Y1Tl|83w}m>#(~0LN9-p{x;$0KviO9skiTx9^<9`_cxAEu3KRf>Z@xL1{j0fjlm>bO9 zKX>z7buKn%m^*iF!|dYhE3=wI(m&4LI9r+x&t3u!Nwc~`(x=xc>lW5!MjVnJnt9Jm zXXfg;pU((03m436UHjLyude;}T6OIQ*WR?YvNpQ*(zR!=otyrj>6fR!KK+^L_fFq1 zot^ei^V4TeuU+%sYksumD;kmUn(NnO#;j|6Yq&Lg)=W?R*VIc>&rE${>dvYD_(ect z>;x9$om1nhf4Ta*z+wE+)$du|S$)lF`)Yjkj`6*#S5E$7@}I$v>m#YjcaJ!7y|C(u zRS&GXWmSDuVwG{#dEjrjcIEF@{_DzTSAKHIGmFwav%WX>)YwPIZXaupA(Up%V(I%x zIco_QeT@JBQ=%FS_^TQW_-P#m+yg>EHy#nY7P8Ux*4>%dBSYL_Phh)sGG=nMJ2pIQ z^Aw^#LUODd1}ZMh-)XU&!{H=%#fNyu9@Zkg^>p0Q?}}KbCco`ddiH9&O=9Ml09aF7 z6VEshyt9X8$^c>VEp$>ou57f>WRTZ?Aa`oGJ}zdR@n*1~ZclIz6z@~KE78HGQSGI9Z1TyYn80jTKxT{m)1qxqiVL7`Ae^@2~@v9r$U4tY&vzp7_@xG{4)Yn)YhF z<~4cTHnV&8X-G*ggPW)#)xxNHBT((pZ+jMXmAezh@nR+_1#Js%-eVqr=P>^WIZ1-J z7(tbL?qr}z7&=0Y!a|{pC%5U(dVYh4BTG)w$2NohVv)cRrz1pZuQc&stIr7@x5G=& zlVMb@tJeto#ag2yw0jAgeCg+rLqpHiGfEICwdfaW)hw{lZTq2~ze!nrUfGj1*z25| zSoa^gI9;)p#Beg{7h2hxyz+ynHZFTvB&CEcRbh(`qRwoY(dEWwiVAbJmMpd z2}0x%2VKuuFDA)mx78y>uG}DVUc}kkbC!C7%@g)9d7@hoy(+)`Jjo3 z(tA64C9w`2wN-tFV5Jw9q*X1X+|jIC2peY)1sY)w8Kw6iUz^^7qn5S^7-saes7j+H zUV6EnznU;m&_+VTEJ-w*rt~(jy9L45O*EQaM@A4i@;EBhR&zUz(67d_&5^-4BZ9K` zY{fQ1Qo)Q#v?tQ>E`9b!J$tgk2J}2-(uxVRowWLE;eQ3#Zo>P zj?|60EFXSA*Mf-!GMg%q;e6g^NHe>NL-|6_+^prvL^HvAgLSUa%d9?%hP^prcd^a9 z*X}OFeW87b2DE1m!s|euZ{+gcYK+ZLr|&@O&3;>rtU5e)603+UHqGrswK0>GgvZ%4 zTD`e?u_SwtZ%5D6FG!>S-hB)4e#2TUu6+$non`3r{vUE^?3p;hLfG9#xkxnIzA|^NzIhtkObuvc0dWftm|}$p??Z}=KzK^} z13+w9s<6!j&Lba`p0U}95|kWs@Tt1Z*ho2EMD;Wl0sI@Zb`!01Si)1=KBB8B5(`b- z9`ymGCY2K{N#+-Nf=st?9y9iHK{xNO`HVYaCA{r`DYN0Tx;*U75zStf zD8vjMV>Gi;-%yM`$%)f^JIZ+-%?ie^xfJC$c)ASf#+xqlLPWIod)ay9?9(&2oeqct zl`whpk+{{E+l&ardj{AYsJ1QF4gvwM*iKJBp)0Z^&4du`dblVli_J9t6}y;;w}ixo=lh<$uJ|b_MPYlT&s|y z3}$mLo@9!NBz`IKbLnvvu}8=>6{aw(m1?H9>s`iWJS;_p>-K`Tkn<;)oygs>$65R) zGMHMZ7b9k}6zQdQ`%wXG9^x-V;XvhbCdxKjc9*`*u^xuUvzdM@(YMjSV}9W#J-;bb zBxTB4_4PTcBb@Z<6=Er4im)eAHWw3;!xVY;4^V!l#np&-*kVtRsk(i^ncJ)XfC*Q; zxVu$q=G)Cw%}mVeTMpyOXTq@pl{B3Zzoc;9z0E-9PKml>IRQkR<`uxTnE zwuk9zs@4+6U)ALt?!hyyWUEg5viWFn`$x37v0&=ag>1OX1Dlc*HE=E3tTzyyAxmT- zW48FxiEON&8kbKI+s&pg0tyH1tc54?DO`3(h+^59E?9FL?Yexy z<*{keU|WVL1pIUo_G|S7Yq3pI4KD7IyCEWv81FdeOmCxr6>J{RhSdwr$3x>WW2t>YY^df}U1_~DquYKb*Z~`3zKdB{FISmx3 zk%J*)MH49PG2GCxwaYEZ)HQ+i_)|Q^mBLaQ2%;Nv$DAt3s4(muB}-`SBT_I zT_NC+O&wzrUD@yWCDdjlO?i65XD(KM{Yy=SZ!y30=4D~CaRPRqTs2iDu>f$Y4xiw* zz6vTv(ljbn-E!S~6+koVv+ZOzRB1;$nOr9RVwr5SYO9$79biDx`v2hXp_q|0<>-am!P5S_|J(^t)u7ck1cDygL~uDEEw2<^ z5jlr`d)go2D@W6m7pKO~zUP~_Z&e$AL=E3q`chITvst$_USzw8dXxh;D6IFQ22n{Q4jP^j3>?(10E~8G}O;88cGi|!!rF;q9o(37hlG$hECc_~uo^f08NOyT4J`U!IH>;o&)OLFELK4Wnv`h= z7UxJ)>lSTP!$BBOQ+|LQO`}l-KhB`5oHuH~&d{{|ziwKo7E&S~xygqY808T{c%J zZ;e8FF8>SY8A$`XgHLA@`r=%&DPs%{VLEh zlBVH#kyEEyU-g8>#I*PZub3^AuQo`!V>0vYLa5nC1M<@GCpNDCnMuo-$5 z+e@R;+)7F!RS9zzfy@jzkfYC3PYR-gS^~u>MY-7y!70DHI*UWx-_KbBm%)C5v+1dxzj!lbe zo?f$O>d@+As|^qpZETe|@yx`T|;IAK(ZQQy%#E+%Dy>+~up! z#17CDOJQ)1WjOrAKT2XTC*>-w1{BnOqaae^X^ugR zn@T57Du||dOnKcs{ZL=Klk2orRo zAe=eCa*T5HmS=ar#Sdx@%b}nghJ`v(Y4{)!ljbRk!RC1!=jT)K)F8?b9SfRjsT}G6 z4I%e7fBS83v6zPbImFdziAqAt;PWyoLNValG%w;*YF@;6=pC6#GZej440(X3Y30kG zklv=;&tE=yQvZ;|Df_3sR1QyLvdCy(LZ)FL$VquVDPq{Xgi|7xf--n=sef?t0L?)7 z=x^nB-$N}M25(YKZCDJ$5LXjSl7?Qw=aVdf%~P02&+|NyoTnHV5*$u(X`DIfb8rrD zC&xZT?RqQa>^xjm4!ruCeKeGlO4FjqL7#w!DU1SeNS_y3nw@8o62X!%*a=KpDu;kk zz$vv0r{7XByAD^DS`C6;Fa%3TFxUtf)zHZE9LdS^B10r;h9*)n{zmT*2MC^3#-hfz z*lOjaR)dZPj<7U6Pl!|+#&jCmkCI4jF40L|+Hg)0NoY0j z{h3c{V;UmANF0SHWq4R$`W);4N7H~Se|YXK_D*4`oFv?6$P_`&!vdvE(KG|YPA2DZ zTBMUAfu)!fby7Jbjj{iSX3H-%o0LkYaUM^@U`uM@T(~qmTHkn&9iA3$P|W)^CBTJ^9-9x!D_=XNp5NCKq=5SPk-c{ zZ&QA9;mI=;=b2M31X=xK@T)nRqA)p0&0_?i?FcCrhBQyklME@6T$+_x8s;e45ug~1 z!IUw6>+ZK$PDbw>{AyB!bu7(7{TU1zjU<_QjuEkWnU-jhmQ%9Gzflf%fZ=!uf1>R? zZ|#H9O9iDlR+34QnomIx+j)wX#d)4i!G-{Rf&(Q~TI80tIE*_09<1bW6uhN^b{>}X zH3z>Mm!QMxG%PY~N`xhphGl`Jv3Z)HQ(9RmPJE+-xC0o@D|1r5iE^U(M7JO=9kj5Z(uO20AW z=mRjBlnwUjw>pQeUMdInHfTCnuhXy#!5o5vn<$FVUkoFsF$zm3i8tDfK0xuja^$0P zsGNlp=QZM#BW`-^>J9pWFiO_{2SI~*ZJ37xNh&dwKKn)`O(Z*XFfG^_slzHF-Q`Vfw-8TPF?!3F{Tp<}qPs%Tr&UxM+zi^{eBb8oy`! z`tkI*XPg~BeSG!G->m%p$}g?__{uw1_LqoKSB?E@>|e&dI5fw1pb>}9R8gOySSA8e zKi2A5qa+01<0n?ESozQu3F91v#}`pEzkv$a9@go zk+jsuf>QLaNbdEd!tgri%9?84Zdfctf2^0)_fWV$YU>jzA?j<=QDo+cLTnLAu=_k! z%ESi}Qe+lo4|E}_q|31ot0w&6FiA7v(@}!e)yxqcTd!cQm?O4~97L3&(Lf*{k@Bv3 zsYei{b}qOIWjER44Z@M}8N7u^8}sv)pX+iANreu-DWc2SszAi+eJYwL zmn-lfx)~8|MNMqBP2~E924{#^qc-`>-0%~H8v!YDS}&Yy`4qETbRkfE}5 zcPA1LxT2QK_6>UWaL?V2vRG`B=%*FmtoWI27euMH^8N7jS1YQtMT{N#o7>51Qr* zVQB?3@r+&eqAu}?|*gNTFJHSmQbh*P*A_|Re-(WQ50}SU!1ZYv7wD6JV6GFC;oLcWC)u1?U3m19jWvHq~0ooV*mz^0Oo)*!GmeL9V_k46=_`1`}` z3sJTK7qvh<)iUyIp-ddqhd(Q^O+3PpT|5xVM_SCq$bu4O#e__n+(e*<#j;f@5K*!!r?ORv&YT70Oo1Ch|6^SL4Sg#Ooe14Q^|$E#ed_!p>l&Rcb`h+ z1Gv$iCfoi3MV*jC$X^i-Rf&M$FVtmBpQZt+2_bXyTv>Em3hhu~H{x%L23)QT330|3 zh>R^&EL6FRVn~s{moejfEH7h)1Z6C-=Od6w)L(99$z+C1VSF%<^%U15uu9aQ4f@Ee z-5Rw+gwmctoJB~7s9*GTT;WJ0R$xDd!zy6U&tc&{gG?T{DhqrpcnWLc^&blMKLHxe-r7ycII_qHu=A`!_8 zy%I05p*duvih8RdD+y7>E9P>}+a$!T5-Qf~@RE4nSj&5gfsWgUuhG|Xuc-$wW)8DE zk*MSn_SA~oka`bbe~e<^Vqg|LNxw&AE<<`eH8w>7D@TmO4USX?-(S(?c>yOedp2OT z@=3W%;KS|NOpi#^+&(V1`B%EU=vc_$=|((- z+38BUE1r8V((g(q+_KM_j+^bhMkKWpp=zQoCs5vyMmkjVy2G9rdD$PfjN@absLMu& zNX!!qWnG~lX3T6v>YdG6gNi3|Ny?XP1Ol0rcOdP~Lbos2IL=+{5etO?bM{a4{8_(+ z${YEd(GxKSeaw!3)#YhZ53ZMvexO3r**ar>O_$qc3OAT5tT6?|!vHChlSTcnu;}3c+@E%eAPUjc%~}do zc>>uEqmF>;F^-A8{S@251cA`!Bm|ZXFauK+pvkAAo(ZDnDi(ruvV&h_ z)w9QKwHRySOd)TX?J?AYy4WSb2SsXvn>6F*@R>nfi#1%NdZd&}0o`rPmszoJr=DO6 zcL<*)Wlcp*?I4qM>gR_4kFYO~ldGuq&oKK;GMUL_GHXHtOcM6K_x1`Tr1yQ_n-J-J z-}e>`d8mLO67!%G5QzwgppS@fneKT=f4!QF2j3& zWb*l(bNk%7Ri~;>ojT`x)MCGaTcG3sd8A8$4ZmK`Jg>^ABSc&g@t4bdnI;wP{}c0G zRU+-;1~MWsV3)=$!Yxb)o>OJ#gi5uf(H+YLCAIKcZ(9nr8{DWGl_(qVl!T$UK-g9t zWz<{d5;`g%R;m3`1z*)R{*+O51gt8pOH3_p6`~tXe1*R!p9%pLfAVMvmN*)DQ)&)mlk;3-$n? zlW)`ADmzJrOc9GS&C>>>D|ff89=RFre>J{D!BdXvoxvEVJz#QDAs~cRi_8s(z$va^ zODFSTvQk9kw{k3!Xs#S1L#w~sCg)@+r$rWpk25NTyp8*q*UIz;ijoO3YRF7h@Lkk& z`>oQr!%h*^sy{7skN(`V{@#2)==^EOag2XGtVhZIMg_oB^Y`q^;Qe zEt%-eb#Rlx;z2zm$Zo#s=5K7Ewc{XXTEEZ<*AUG8S~$grfePB4zM@243*9m{w`Dbp zhO%2a;4%~!Mk$Wrb{H2GQDl0V0jIjU{j6XjyH#)SGg$~{duq`c&tM!v`yR+WEfXjt2 z8EjBMk7p+ZIZ;>{5fc#ohfFhYtHL59f_I}DJ$uO)y6NX;@V%Muq-#8qN2Uc3!%8{$~n!6+hqt-I1g@@ztXB)w7PT0iApn&0=a2>Ggc3Bn%KoE0NTh1p-5VIIlT2*N%iD890om-*% zSY&jl_RMDV%3eU`lAn#0Nxy)xSsA5{tAms=1X+D~z9?^sMj2%i&w?^7Wue1Ac%@Z> zXp-JPi@(UU&<71+?myE>f@3Fqg@UeTqhz@}+?uKBxCVV$2(`Xlc2sk3SHZdTmW>i^PsNcbxsHgy0wA9VinmnrkQDXD^zAe0!`LR^&LA>(#fKm|MzPjG5|VAgYpciV7kT>{Sq|?x&2~=4V)@2bCIKWsmnwtgf8LD&8}vVA=mCFv$tqJ znx-G*!5R$ej)7L0FK}mbHE){FO=M~owL0QO`-r*CLrbZ+?%OuHo5U-oY2hR~uCknS z)u>X!TDHod`mjBKiswPA*<`fm0ui7?^Bx=rJU4iMTdkBUR;t=n%|GbeI5gRz#4!yQ z!a`$TSP$)EAjRTFgD6dv0j%G}%>|7aq_V;XvZ!d!duPHf69WXxdFxzPJMH;3TT2yA zVp%G^EC_Mb>x9u_kx|EE7yt=ZGQZM!V#scHfh@}c2DD^G%q~@AAx_z-l!+6L5XB3l zKe|8`i;Omnzk1Fs=iWPkOzsm(l=grqf6o0KMx(%MO2T4gjF_ z3mEB=(K1O?&W+T}=CCy;OuB_}G$a5mTS`UZry$Y!DnQ*s|0X!muKhx2mwy4{nlf9g zI0dy0iDEKsvJ(`Q%J|Sm``qj>n~ZB$Yv}LTPwtRgR}4+BAZ|SpVgISan%Ebokbvw@sV7{dn~@FJRnEW=y>bQWvL05>KTN zs;DzAux+rMug5?Ri-){V{jqJ_ycfe$)v|!mGZ}R)8F+d=#rG<6!4y>7kqa3)8SmWM z)hre|(ER&$`dRNBgeIC7FnA`@6dg~Ss}d$tJj>Ik+fulE zy&s)0{nTOnUH*lQAdDGCWm%Xmar0SCSW=KD`4HY`PPCSerDUcA`EL_*){YVIYY=6! zD)w4=?n)@c2_Rt#e!?c>bbCGBNI~=0U+rDk06NG7&18e6Y$fV2BM z78M80=;{Awo>R1!sn3Fs#sFH7o7+yuPidSvo54zP)sR}A2t%-1Zf+gAHZwOow3LMo zJ@DdY`oXL2yr~0So}1e_4&cr;z-|IyVLK#~I->5R8oXoybo9TVb6?BNjgBq*#4Qg! z`t{F9_GSR23v&PRCv346EV^!vc$Bi~IWUGpC zYH-|W(?c60o*;Zkr|v zsr-OI245zx;dU&`rLVe(h8pNRZ>wwgf!7`D1*)fb^_07RkeZe_~Kxq6!?Zh*4q?wYvLnrK_$`j!O$ z>?si2%Rdk3nAf)xac6K#nNwmK1N~xr);XxvFxn~ZNYk6%JKcrN#q&YGnQg=u4f``> zHdylrGCnn_LFeBLJ0**X4jpowg-mzdI!S-$W;{g<3mBf2S*3&FiYrM)Qd*CdFHgBR z0I_=qOc53tDp4+g3Fo?boc_-{U|s`~*TT6Vg9&kTmndF}vO46YOcgGBEkg9dH=!9U zGMs^4+Dvo4HRr+0-8qYEOx_t2c`3*o(`mTAgcdUPzq}V(z#_Mj_36Lto!iwhqg^-~ zdVo1bC>4Z&=PjmcUeZ}j*hA>vTVa=3N=18Kn`m3@Q@3Gb$gr?=u?xi+zDQNINK+2E zUS`z>QRViz*`cLWbab;HV*8|bPSWq(j+a^U!j{GM`y)!YuFF`AZU-SwCjsjMmg~){ zS!4`w(X!WP=rRHkQ=6d$%n*P_$N&{f3TbsUqOfqn`1fOIGB`Ifw3G!{U$?bv^+~!E zJZY=9;Ke-y*MP15O7|+LU>k&84#SHZ7kJQ0MpF`!N~lCBY$mtTN?M{J@HadJZ&`aU zyk#j59ew@#5Za9~opbjxdlPr@V|7k$#zE-B*#H!;_s3KrRDJ*!WHuQfho3qdToI3q z(?=eFubrkA8$$Y^bQKjLQ>KE;nj)hDboUQH0-KCF-ulxvdg6Z2*J*O`$Hp>O6(tlz zITBHdQWmIo@!a=exR;XA-i>!{Mt6R=Z-SQHheyk_fT2&BLz>lBfOEBFu*nR zrp$R%$9mTSMj&N?hYD7wEJX-iCQT(z*>mL(vK@dIu*m4B17P340H30NabQl1yZK@e z!E`g3%5lOZCu!t3lrm|t8bVjrK?IA8j*gxMB3^oNhCW)yo+8V_MIeGPU*z(Tv;yGP zfr3JrwDTN7bnl}ef<*?TQ5S$)ukAut-TmW9dcz!a7c3Bf;MravJQPQolDas$XhdVv z3kaTW$a^DY2^xvTV*>1_e02TQ z?ghZ=Z6mENHFp?GXbfo&!qT#o)v|<8=JlB=`u>A+?v7!fUt5rsvZ{hZ8{w@<*_hMxpI0i_3E)i%;=!EL0XunIvYrQaZwB*A<07WfPZh}T?Fe}wfM8u`<| z!D91C&jh{tm(Xh<6CfqqGNmbd|^Szm)P8Z7M7bEM_+q-ZuM#w4~^XSa!bx6 z{pQni02`H!_##k8i>EimYEr$!gN)D2ZTU2H|BDyuFrxI<4)pP_=gu2(iBuVg1Stj5 zym-N@EJTptH!#j@GCF$8Cos;x0h@Qj)qw?!-^`#~iG>b+fyx9WP@J8cEc1oPI1j&P zld+y?=>MLFv(|9SURfbsvFe_cLo1{M5YN5wPN?GXESwLP3}SnH$58dzxsheY_tZKo zhUeyXLIDmrK%3~Rkibkq%@L@&Vh13ncm;iZsy=~Ud~R;ly5%3C4{&b(dI!4Uw_r9J zZGH?+%h5YAqKqWswgI+GQeS0+{Q9>oAtmWY6d3`48L)@3zM#inm>V9$AX}e$1nu1#Yh$Even0nFuua$fe(tUjmX0mzq6k7D zPxW81o?~?JrX!mrZ5XEuUYv7}D;;rs5P*K*0uoo;lk~(4Nk@cf?n5umjf^e(1Ug)g zZ$~$M@NLuoapvedW91AuIFEw2UD%bG;Y1RFzt`t#iI@)NApIaj38LeaAi=Y4v$HK^hiLf{b!?Ij4;4NkBl9!Vr{5(V@3tg-X6Yw|4kb ztOMsAzKH(S>-Z3DSkNx6PkJX$YE*~?yp$}W3d%(2+SkCsTuKEno{w7Q;S~MxYmCjJ zS=@p|MwJW#;JG14jt}y*d@p+V@Z6T6rBp}`T-P=Zx4sGzW=sp}MG0J;Qq3WCVy8z{ zi{$)}RD-|b(l@{pz+wTeSY;O7baQ=*-v0)+{wxbh5W{TAj)>W%CIwa~y-R2^IkYVHarEx^PcK5oU;kug zU*>y{pjZB5t_z+0?%dfU4y9e_qJ%Y<$|WxO6aF~zzl%R+DH-j37^CvtUdO0>f18_K z6T&t0+;A@Y30T`JJ4GEK>{BwdY&1K3CS&KBEpnFx;8pS=700b`l00T-`|Cd;|A@^) zCoDf*vB@fK-X!1$qz z7+EEqRS_XER}~i&Jv_)%ZEe@vK7h6?<)NGQ{TwW+OJ2o^iujXE3m8L_5#w_U$Q&70 zc>_9q$QFWv4=pj5e**U;Y#z$yacPUuJD@DbCoM}@zku;anS-Z1?y!0ws@*Ax#2hI{ z5spsSewh0hdYR2b9e=zOO#1sCnxv-|u#sn8FoGb)&qXD5HG+hk4+|%ovH1ny34q1? zbfFL;t4?}Mq^!q~c^|)Zr!+<9KE#vOuz;aQ8N;n;%vs{xs0n~pxh|Wx1{a-g!A8m^ zqodaz+;Yp$u2@Uw-U3B$`^gI{0Q>lz?y*i~M`4Iq=^MC--tJ zaU~{FT$2hy`YIqa57ajgv&nFsJHHK`IaqJsL`YZGH?G$#xIvD;l|q=ya4H@G)`v8u zR|*7~mYgwk^UC__)hr&$?myJ3_cMXsTUl>kE{HZyU67veWN;IE!JM?Y+{c026 zt}S6fsPzvZK@lGz-)b@=i(yZ*Eeu#|-Vjg|ikPMpA#_5u6e=R%##p=I^H@AshTd(R z3ufp?y6cyAOlub~{%Nu$M@4bP)>>7dt147ZnE{RT*0-!?6Zd?w(DJoU(bx9YH60@v zo)7ZXim`kqF5t&PRmiTvFaJj$yqv{D2gSEd4*=5zwPwiK)B%T|ur08rS6RPY+pdG(%Y;VIB^(xuNau-Gjq z!_SY_jUB^$4^&|frc*>Y%}@do+q&>2tK1FRMat~Y@cpVo33Nz+64^D$heiYi2_s)tc0p62dVPrxF|dW z0+v$Ip%?F0-_k$dL%%aqha!tr6Is*{!CJ}?C50JvBE}4ycLNL@iwCJC|7;zLr|Bm) z)VH;^769D*a=xWD<)XusChP&fK~xf|@*c=d#2T=t69ln%XwMVRf-9&0-=^qSJL@OX z(pT_sb;QYmGy6C_7j-F5yI}=yuXsInZf6&r+fjcyA+;rSrb@(64huxcyb-=|DHZJ% zYx(rXC$7J$16^`PedjnJ7Xo-A)P%5wxnQqXjkW+ddG*MVtO%I=0hcyt4`kFpzCJm&V2k55>J!!A$Yi17GwYffVCdEHxNnZX@dhZ_y083nd zPQ4#(+gu+Qw>bd45lS`6%oV^$Od3F(5&X4SAOKS?$Ar>ot4^RJp0~9QV6u)Fw1d>g z0K_o{kc+W6K)|}W$hNhnI z6)B`Vr#`!Gc`nK(-aXNZvGeM<{9?<8o-jad5swpBmxz;abpRJL?ddtZZuv*hfkS&w zfZ9TH`p~Ki>irYgj}8YF?2ZTM2Qy$B<9}j+rEH7qK7-_(GToPb9vv;2PT=k~FRTxY z1Xc{4yV3#m4u911Qg>e`)j^MJ4C_ISwF?+MgQ<5&)yg_Aqz@XZTuWS)fLzhmJAK>h zYge;a*a+AHMLwTcNB?X)EMz#qC4raY*7l`~ar0$DF4yx)P-)fz7E(*l8$y^5EFL;M zb-ZOGPtht-9dJ%1L0+NAjoIDRWKof{gu~2l=P#bk&#J7W&M^__rl-Oh$5b z@mg8#(`TW=G4tD-E`dFX%|qF%&zQaC^WU4Kk6uy-bI7s~#q+t-C|H8^5m;0(qTNEeI>Hw1e`@&Y|K%Z0lrJbt5sIzWgl zVIlFcD_e#&#AXRV%JfOZ3_+SlsL8Cy>r4UYzrjEr+Gu5U5IWlgSDtKU&RsR0DEY zJY4sqRmxK*(mJ&Qe$5RfQ9urqjay1)s-d**g=A`G7%`3p zGpodW8$?d{bT);Q7j)@-JS+mj#tik5VKxtqlwaIV|EB@E1rTx;Fo*_YM7U&yPzth~ zy(U#KD5xqRGz$wEQ`U!9vv}YH1*`3fIsZ7FR@ULrs9#8doVJ}WE!rJa6+$mnVw=~l zY^$b}2mK;n%0v6D5WLvBsk)O_UyNshSUC>FGhGX@a<6ueoJ90NVRL=eu!_(AO0iih0uL*jGW>70|%U<|v#{9KT9 z1*C*XkdD-BvVy?N$3GuKH}0&DtY-1h{O>|>YE zO)*TRcBR#>6<_6p#xbgkq<2uZjHW#7AV61%^D3w0Wr9q=0Fx0m8g%Z9@auMmdkWzo5s_&Gg^Hf*_Q8eHuKMh1*-|o8%aFJ4Cm!2{MO^J} zb}#zxmzs5qu{VZZ3)DxJvG}&r;viV|>-|j}T+Cc9l!Oz)bwEysj8v01A4wWF} z2A)6-c!;i$+NpsYvJkQ)aG$ftts?0VihQt(ejx!?_%PpYP6N_$Lg|c1Y>;aL@g(>> zvXlx1$_+YtE>%~a*phrJhN3H15B#NH+2QN`k8Uf}K8Gzy12D;Z>Z?ZVs*FELXv|TE z)#P&&^$7b~_j`MhAH}Y&UpB6=WRtyIPBUU#fqWGr94l`duS3U%*9>0inX`E(duP9c%`;bzk~2 ztmJGSTno&G=_|hY@AeMly{7KM5e_62TZp)wnz&vD25b`Qui5Ylc?~vNm*t{^2P1rl zAHUP}zj}_ZtB*oyw{Y1gGeqEjuED79!mX9qldMZh($tv*^9HMjZlIZmhe<-LWtn8#EC^QqMEm zEKt@WUh~NO%(3Xs8|x!u%RYgwkY9W0|LuUkuHJjgP4%8N-W5ZeJG=lHbt6QKybi9T z9au%xup?jA?8P@yEn}0Vjwe+0TYEo4Rhhbo|J+-LZ~}AlWK_8)ED4slys$(ewgIk% znUDKo6ip*oTG>2w;F-JOIJ+`BNneSu<*IAqpmJtwCvyIX%xV&a@?KTkhi_4?hd$Nb zTpwArgoQ>dBXAPBxqca}e@z@l&a8j(gj-xAGhPaiV8vCvn$HM$>Q?w577rXl&p|tm z2&U;Rx8X(5+{97j%$}15$U;A<3aPDxCap;6A?WV<`uOPriZ~@?O3Ho;c^`TeY|G{& z6SVnT*n|=^`#~h*rxvDlejibZL#%^N9S&Fct@A6o=uOXF6$LkE^JLhz!Cpxa1o)(^6_wU)#m^#=ndE zT-U_G+02%2)AE#2(pWZ&Bpd_9^Fm!*te2m=8y}`vJY*gNG`$C{x2>b+@5cI|Z{p}| zMlYpirG=pKMi)P2=E(?2`@8OW02;*NfekVT6}W!?g>kz3hahLh*c@Ioh~mYpCmo3w zxKM|xC<_Ld_FR7#7(`21=ui-Pr&Y`K$X)oe%+1x%8b&*78flEnwU7#JgkMMqZE;4- z1^2>dv3U%d;n(i1E3gb4xy{IMB-Ba{*Ih8l!bW?zW`JTMxNC~A$E;@YKm>%j!u88E z{lY$MRSBCo=$|R)#z}cZK~iM~{8<^P;QHG=Q~D9eVe#-~5=`0;A377thhAFmLjUhS z>SwIUVF%>Sf$RGk;NqU>lyv0iO%EQs46h3~2At{tC=n7>6Aqg#Su}?TDP)IS1C9Oq zJiLU(LSE&?&~c;Rnm~V>uQzYmS3et#JXT-7-qOS&#Eg*@uGFAXh9m2DDN3ZLCV=B2 zmbdFMkjLVogI6V6mg&8ZJy!2%iTi&)t zw>;95bd6@DOfE_ZIQSZgtE2(oYono5Yj>9BVUV(v1*nODL%JjSgGu@a4`V6%<^)J# z&K{;@KwZ;n2unb1%%>Azb>p@ic@(59Wg&4M)T4FNq?^Mh0DW_OQHnLB)mAm)aE_>m z(+Mcbxc2~@V3tyua*PmOHA#2<7_9%Pb&DMf9$6(^n*nfpm9LF~i|)X!&H?s*5k-uHN`a1rlB1=96bTbr}c)GxGF%4nq` z)#w0%S|+s>B|IOx;N|+n3?-yax$;^1447}=6~1%d0)R9=fxWs$fYDJCaw|V$kK{dO zcM#1!35zwGjP}FGI6-fp$NI7P^kz^8FgC~Pk#zjk;OwD4@GcBA5^u! z`YBkLN90bE%t&dJa0ge;*6eY>3dLje_g}zoSv<7AxvFLIPtn$2Vh4e?iQ~HCtuHUw zvVeCdm5I|5qk;$&+Zyw;r$G*jhYlR^v`)NJ^claxHxN+PGUMd}d^W(`tGO|#4by7F zP0zq@Sv;s429bCVKJlvw`n_ksgcwm))oB4)RwT5wh(IqP!PkY`@B0n>mc;|#bsbl0 zhl-NFft!;JSL>P^u$Hvip9^>@GLn}Ua~$PV!RT+d|EG13!{Wge480j;#%mMw=?xIX zXvhjZ_JNNNZ0fsUg}w)MZ9nZEwCR;=`RnZm;B3{dwG1Hj0vDz8>yo~()G1eZQQ}z` zTsFB~A9=_3uJ<9wbM>7NsqBb?Qx?kRK+)ow7z*kbA~^H{J^fsLcKkEA=y2>RH8MW` znKteBpReCF?6Fu?0D~zag>t@J5fY)xehaf}DHV07|F9XI5(c7u0W5iU62erJP?*W7 zri?N_RB2N~Fij$f8ZXq(8vhI~I{a1Zw*S)x-SUU}D4Z0)m7H{Q4N7}OFN5kqGEWl1 z#1m-#&H5yY|DnDTjtk2@0?v9KcGi0uy=UeQTzR7ElDlT+xk)+HQ&xk^+!EEt;8H*) z=V5sh=<*lqt4Ei403F`^-L@}!tH9fe`u_aMsBbx;htPPvEY8u(0ueVv72*h$*0ev9 z;+%4=V5lwkC|2jCKJ=Hd4;`N^V&gEi5O%Mh6bz2?7HQ-I1=rIUmv^7 z*PM@Yg1H0wj`RC+J#^Qrohz~RKGw3{&tA0N*_!7?{=>^CB=UOC-bVlKFg~VRn&-o; zVKzZGDUoQYSgDv%L$wxz14^vD2F7;tuV5>)c<88V8?39+J11z*8;m7^W5yXvqT~}t z97Mq&(8@@k)I!D4=<9HbW|6^R4totmY)>O?^-VQ0eg2iR(Z*Z8vKnpp$6fo;EB^v} z;D>*OeOl1Oq2!FsoE6049Ilbf3siZV4&W>Ba6`t%QgTalJ19f+cKy6hPmAK)pD`^U zQV$~R-o`Ene{(Cmm+@do2sd0Jq>>h$ji)4YkSk+40zJznr;3AJ86zd&)obG^Q=ZUx z5++q3h=&{Ukv_m?!4ei4;qh8`8`JbXAHXgOCoCND&780j!Cbz;CG0vXVX#PiK7tXm z>l0XOSv(}ZS=Bbp|ML@UH^QP#L30?BE&$~moKe7b7U!)|D9Osmng6(DrJTw_d$vEg z`IbM;k3*yeHZOEda#4t>s;Q+ys-Qt@N*KH~J|pC7O=t{@g~a>%V6Xn*YKTE^;>K8- zI1HSb3fY=Vq$SLGp(th42^9R+R2W5>_dyPe2dRw5+Q-J{-iN8siUnsZrcyd14pWp` zPX=rWxx*XAt%1<}4`D*FcyI{*GkATiA578Z51}>FI3}E#PFy|5#NlSkxqz9d%JshX zwEXr_kiz1jJ^Qw_4fEqi@i!TpC*#5;>Zl|~7OGB(UF-`x)D&*b=G81R+GF}Mb9eLb zYjFS2HkbgZ{9Lffuj_jR{NqEA?;D{v-85*1%aZ1{MSZH+2ydRNHt7=1YB0x_qK@&# z=G81J^8Rif%<<=MoTQ864QQgNiKCDiU5XmTaxH|8`C@8y$rdXC)aiI*3`xftBdb|F zrZRRb1minn4Jb@~GPwLxHB=ZWw~c@l77rab=Qtd!M;e#o<0cL+XBxs$r1e%xX$Xgj za7IvbA~Wn^=<*GXwX0byw5cE5-OnC*6C#i{G+MFvO%cdprkF}4N%^1#K*V9=cwL?l zz|7-0cEe0#bTx|yR|lYvt(<~)XBznCr-`G?894=s!WN>!dMBsq3V6h6fWF6a=B7Xn zi-*j!v#pz-DSB!e8Z@JA3Sfws^KZD|QM&SJmqHv#=fJjQ#JoAt7#&*5LI?Li@k=<2 zPteLqkOD_V9CXfTq(~P{iHKav?a@Rl)|3`1&EnR)`A?V~EFKIKj<&Hr48iLkfky5g zSg~Tob)AM4Z4kfj0)k&|wP&?t^*IcJAK>@>WauP*-&sSeR(-JQ&#RtX^}|)Stoq`r z&?>_!{;CbDdRD%>@`aT@UD>X`2i5mZ6yJMx@X^6L2d^8<4SEJ8gXavc8TfeM)q$r6 zemrnnr(t0C)dPtE`@pt=*@0F4AN0T6|MPbJy->fgU(mm?zpwATzCZLGY*pX;d|#kX z-^c4)-`CyyZtn}dkM-W$s=fEQUR5urcd}i1uhH|po*Q}!Jv)13J?HhT?QV9z-u>(D zhr7Ss{pIddx1)P|_vY@Qu77m>rRx`656*ObvujURw9DLeQP&w=1D)@8{;Bhc&IdYg z?)*Y$5C@oYPeYII4|VUZW+F~e%AiZBtz}7$6LG!P0u!lmb*?CxD^|r`qf@3S3x>bY zrmM&zS4gQSWvyhdm4oBsEs&8KRVbAeQ9;$sRY=sjxNudQoD9T^VUIRO)@gn6GGt`UL_%Q6(C8RfNl6sM1yRH%+`v@+s1aJXl1OKyA!EQ}N{gd}9DdfCOJuSk zzL9Rz6(%!L$V9d3f?WZT7EH0M8WhB{l4V_9%&R6;Hob5MgA`Nal&lU4oR0!^&aM)3 z<01xmtHw#E)MT(=&K3m%skj!`G5~5dPFyY}Bey>HZ)(Qy|X_Vy3 zRY55lvh(Z%ZMr825I6FKMJkH`u$OP^>UM3Zn%XKPM3G84Z7H~2f#}FDTkoybgc^O^ zYL?V8{%kqUKZnD}sbXGl&w~(ObR9$oV02+;}22ZtkvPR5fMQpsJXNKd`2kY zmg9s_VIlxjIeb0?Ct0mJ61)A}Qo3x9Rn>Z4GS-erFvyLvT1^8f5jtL3p1gLRa~tGvR|34_BI zx5-q%n+uuv_ECW%V_K(SIoc zkK@{MWgnR0(X1(3Qd2yCVvD%_yqzDVEJ0JHM43`~WvDaQrkf&iuEr9Nb7BQ06f+wb zZqp@(6qV9e2y<5N&T9o7urdJ9ShY-f1Ef74E5yA9zs;D~)qb2K))DdDmTDj`!qCQ| zm5f$ZOH~NW-^j>zhJA1xzU&; z0kGAr8bt+ZQ9}undPClm&hx+vdv%*mDimBFKz4Eh#x4WTgD6(b8URx|Cb2mR0=Fuiqt5+r=Dk^QBu;tsK9$r5_~T~YCFi&4!rdVi6|`hR z1zpH5l!nf%x8KWm0x&A!HOAwWFi(5YKN)fc0O4wGzEA;2_qbd*&@PjeiB-UG)+$m3 zKu-&k{tb_|A2;gtDxKD+;F|R@1%JcWnYU&PTpcOT7UC9;cDLFPif|cZuWCjnh!csF z-k?nca#}*r!yqnJGa`$YEV>|+MrG1gLn3{8qy@_yz8;OI}0 z*>Wtv<5)c9qELKZo9=Y0DN^Ef=K@N#0LrV~-ClpwmUMxFm;pk@&!h@`Ue7PvKQITp z6u%OZMf7fo&Mc7sj`^^(4s!7&nvgsp_X8xa+1e&coW&}c$_DLXVWh@)Fo28IlrP1j z$Xckz_uHaGfHFVMNKff}#BQ#~&krS|01u(`S)OL(q!gl5KJK)-_%fF>M-AoM&l4Ix z>E~8Ma=)Xf5C^1BwdtHpfa{GG`C=j!$r?i&|HjY(^w&s8efDssCz^+4Pke_mdJ@B%J7EvHjyOrP-r_XmIv*2pVHtz z^DE4I6B(P8GFdY=gGKKEi8V_nJL@piSm6bjz zAtNm90f^gTMv4Ly7b+vPYa-;-6eB2Z5)ve!%{T(-ny(@c4u79{Z(OAVr=llRr1(mW zQaGq;KQ8eE2#DX0s**LKJQ^G^wDmturlMShy_l64xjw5oIMVL8IO&WKKAklK<=mX6 zDmBI!P}NwemLTntP+60zNJDPk_Jhm|Vo6bs(kfy>Go=%FEP=jz+w`!^1y$i(<~Wh| z%5uJ~KWEw*v+d65gql!5mGjjcdam*}%=1xSL{21CPO2Ocz)vIR>f3a84$3E#D2d18 zhkD7B{mC}nB#==BO|ong^TT>>kn^5;AApfAK*Mi-(T({d@Zg z8G5aYk;4T3C}VTSq7-XI0uc*lYu+uA_$1&;U|RFM5X7)}40KSd*c2tgovd$O3UU}% zUA~rzIY_z9AWoN@RcR&0$f;cdeuSkwWP13;7FxtO{fA5NN12=3K@8(ZfIFrzpGzgFfn*5K3Op|)%C-b)PS}xu;P=R>rO)* zM_n6n4Bk^S5cHt!JHH)+R}N*vGKE_&EhN%@krZwX8>48O7n-}2gS}IL8n!nzMc?6V z=&@?yTu-LC8bQXari89^5~^C2bxI!uo`aZw1RA5mY#sp7E$pCOLF_tlHF1h06Ab8) zIciqYWGVY7nOteFa?ypm8WU)vzcDn-=Ak{iy0_C;`Wq0!;cV)_&Cf(|2r_&CQ8fCT zDcJip0S&=?&Yck$MHUZkQa|2;?!2ITl0GfkfWSDvBFyDdF!WqyAu4b~D0n2+fINQ| z8Ht^FJ^fCs0U%3RC24Sz9CN`1K}s1(G>nW1_z9bgqxbambBPAHy%W~B(n^tGo*gPR zs&&Bx5~ScKY%(O>d{aZysRj;1@-=Z5C=>BV3JW&yB$kqK882!GR0K%4y)iq?CIkH0 z!w`tK9o&EIYdhnLp~00CICW)(vFDpzmz?%J1deaP%$LkR?&&-K+Or|ZX-v9w$lJ1+)ta!Y8tc|-ySR;61bd$Ev7+v}%&A;E=fwYc>djiL>8Dwg>Rg4n`QV-cSa#C+I zB$&4Sx1+HJa?h7}1npn9dJD=t{6OS?3&}g%)fk1#OL-Y`BhHgkQ$#z7$8%{C<9!i)_n4K8YAnLf8-P> zB(!#CV|c;?+2a8CR0A~ixI1R%z~vg;1VY*ko>gaZN$$z3`sE)*2X&ssJ3CLK4-M^V z^pC^MEDu`1^(f6%00#iXEHwwh9MJ{48ne)}<(SC(WP0(+?sJWS;TjH)y1nlgJs)(R zIVA5i&?5md0D5j};xu4pld)>};3tVXbx`jun$8Eg%s?H;;`Mkb4;^g20NHxKdUT3j zlVcpRw#Ai6q9&Xb(&?-@IVGL24B;@X1TFB!~n@373Ajj7`@QuF5 zdfx7yhL}w>VpyBUyW9~Rb%ZldnURQzGocVS2xZ-ZCSF#i4>4+R{SDA?77rb`;g@iM zyXi-h^pP82B*13b338ZwE3RK|4^U;7nJ5-=8M25DT??kz?Ry%-!=GXi_rATI{&)|F znASEggAJFl5PU8_l?s?O!CEY8uX>n!Uob||NB)h$_5dy!w&|*fZ1bhvLM~X_>d^nj(>miH$R#+u&zP&L#w3G!l%NPWq zy|oWuc5iQ-fZ4sH0eHa8D;9M$6SPn@E}S_P6`fS#m9&<;F%-B1Rvi`(9Z3A}QuM?f zjdnu%;qNp~p8-Al9JGzG>>PG8UoN%*%8*0i%vhNrxo@D}tP0@FL8Eo{aAP8Zycb!~2 z6n?CzgF3z|npZ%k9`14T%^>7ctOG|5TtYv1GdA+|%>ZskEBMJP5eqbg$S>5|I39;U z(pm+^&@6(UVet@g*Hf*N%QXEZ1ZL(4KnE89#9yH>6=ill-{ogU>4R@JMuyou2IuwJ z^Zq(TJHFM}cESYv2m@d!2U304_U!MfpZ3CvkFW`L7^jpZ7gI{g9w-1r6be;J;VFh9 z0L<`5P~S85Lys?IA%c4S9Q4Yj;5wwb`+*(wf9-Fq>X^BrnSillLL@w82(chs=4h7Z zl*h>odg^;%YJQ5k$NWDA`n>W#&gekHE9bjW?w-ba2=RzRw=p3e1%jyg2vJy4jn;Us ziZzVxzXt@d$!Pzr5j}nWy7L#b_o?7{Kdc2^w50` zcgKh*R}kBYq*kBs1yVJg$BQaI0JD}&#`z^G`hy=dTphy(VIo;1wSlD9RZ+QlVs!Zf zjV-HLRJ7@rP^lWA)~4y_AHXJiN)7R%RLSe9T7q&x+zEIHc(Un!1jESYF?M_XN1)D- zo!4w-YPR&K4CYUkTNF!56^^hF0KD4P8nb&}W6f$74`IC8lPGJi?rWTY6Ifw55lDC8 z3IhbvZ9DC5tPXrgC;#!#VmkTKF=y0a4DEgpHp-=}mO9YG58ZS_2eSXTv2y~zgdlsv z5%VbJ6#x^88f@4YbeFM0jiHx++!$WB{3EEt|2qQhcx`eL86Nsfi~Qb)8g~sl!V=5sYo4Sd35GPGC)E`suYNLa*HGd1o7VUZfjB=Fu}y z-?tY)>&?v~ECb9|;PSZg0GZ;{==g;&Kj;Uj7rZpR@gkTCEFRiJf19x()qlb^q^ViJ zi*PHEMi5k|^+dJckr7p1E>rd~Vs3sO#ISe}BJns_F3}&(&>uaI4O)E@a*Eo!rruPR zCB0cgM#EEw+=bRcxp`hQw_}Hjf5fJbrHONf8DrM$BQsFAN9B$SlxbU0$!%%x zMn06>7M&W%%z6$Y5dG(%9isF&{mk#My^phpnI7`#W!eZSR@rMDg)1K?Atwjs!|4>4 z$30ab>oIh=dB-feH24jG6L}7AS^Or>Ccb!5bf#LG&`~irDdQ0)t_Zv%B9iH?#!HRS zkx%jHmtTUj3)=E>%l!N!b3^7M6GOh&QiaYz1dHuIWH+uaq zjcJ@BlUhuXVa;l0!UNPFj}(Yb>aLXa7@Uq$+vzLrYAjaZ$l$0c&%jsv>OF6Pr&ZFC z!A6#=6^8c(7-Gh152a*@9N{jS%}&0jmIvFkXMPmb--f+#DGPDXp&j(hJ21pxc$~~D z_Q!p;1m$pZg@A`&tNPLYkHKd6>zj==!=GXuo)2$B zJ4ujHe>qqym|d`I;Fe@x1D$2@&>q9>5IpzfPp0TYuVDjM->fa_Y)ry8QcAB>z$I-C z$hg`AN{_BT(pWpRlmo!S5UJFP4SMGY7NTob!PI8VMUR26;tMrZMObeDa5JVUm%rN> zUA2URI#PyKXyOe0_`5K9a2$9AzKF4s1M;Fg$mK;XfdmzeQ4y%zfhY62H{gp{JaqKv zx^`lC;SJm~`XJD`i5 z59nfFX<;7>0+#P0x|rd3H@t`GI}XnPF)5O)P7FmT)h?pddt-?H7yoV zcbO%~7OduL6d5xK^j?0&9V3~+yrv1C&Eg^AnmtU~_Zv+xNT4~VEjEW2@|d!OHCHL> zqIoaezcFIIbrfu4HV++m>EmtmM@Ml}499UUcDrZXQMr^$IRr(M4*Y;7z-GcKKKvor zG@PY8C`#HroPCL!XMlU_mvm(-lBF7AN5=vHek{{%XQ#Y3B{R4X$F1D#=+uKA&%r7T30 z&258J(>;$9+K=PBM@Aj2#frQJDYOPNQGzlfTCgke7_8}>2dCFk9wcY{nXxOcK#-tO z?3{0@D6Xl)j0Dda4XX%MIV{&X%_5x%PL){Jj*j^?!)zYZ)OqGo`p%AdyzCu^oY%Gt zKb0uENxxU-Nm=v-n+&|AJ@cD~mXg62{|}gtPyvMA+&how_3<8%z|3o}J1&!xf~=SH zRe6xi+tMn?kpCw>aV_PcJsbL3DKAsBRsChL2RUIFM z0cBp836`T4v!D#9VrtUq<08S({AM^lFQKAMPre0S_M!Rz=omNJAYoeR0dw12fg}jh z2mu#vrycDcp5OdgO#0vzL)e=6b0+3T$Kb;N3N{J71xTu3T!V28c`t{yf}#c|=Ep{t;kT1srl;md$7P;4d{Py# zM|cKEpwW|NIN=zQi~turF}Cazr#hrZXXZ!7Z7^(rlIyXlDX{J#)x}(eWFKy85<_~+ zDOR~**+-GLC_d%f01#0d=2wnX-GF%IY1Mpyb63q@MSJT{!rj`2`N?H?uROiJJ$$Hn z`uxBeI2}%cvmn=ZN6)XiKIlBX!+_TvK5XOq<2a?1*?y(qYQh+91-(5DAO$tZrrZh} zQRd9~kzqCuWk2X@*8+Ry%z3DXGG$bnB*hNR?U21B2itu+Awc zclYt8c}QzE9$y0!kl6uZ)gqUOh~q_Lg5!2W3OKZFc4#RTCw~K^LGfoZwBl^Mc$tpl zJY+^d$*PlSC_^!*D0{P>Py&~41HHQZ0$5C0Jk%jAF~^mkUH~f?9D9xrgB)fFb4W$L z5@}Vr$yCr4BLU&EC5Ju-l4l)^O6Y^T6ZX#Mv3 z^We8EUdv9n<^H>-=p*OhRn&hRCm=Hp7@jf~lTd;@C8@|mIZ@t^uI_`ij7`S5G6uS* zABLp8d8KeR=S~POV8DAW?MPuIa=_-LKaMkonXR7))$H0bWYOCFQEk-=X^FU_#sttv z77Jy0bKB^G0B<&i<2Xr}k)X{}q6pyZYSSDGN0V~2Mr#y(^%4-l;-SL>_rjoeJ_G=f zmw=pU{qgC=mgvh)eJskc+Js)GH4MO?TflmtFPa}6TFOCt{5Q8U0>Bl0@jSliIF2)e znSr;4Gw!&xC{IZ261OqZni8YvHUgw9Wg&C;IOy?tP}%Mi0`zZsa`A%-gcB}<`IJ58 z5tYmKGQf7=KKZK{_ru0{D6wTaz6sqvTomQ*@nFEDb_ z6nqzpg$^DXn#I|@GxT#5OriDqF`I|V$#F3zO+5gQ*DWIUjOZRG_ z@?Tc|1#R$?UqmZ2^0r)IfOPiUIe4Wk5S1 z+YK2p{DBJxwhn9>m>L)zSUJ$$|4ILc{qOa^)&FY$pZb5>|7*yU`Dy>7{RjGg(0^C| z?fp0R-`Iam|5g3f{#<{&KhS@9zXLL8RQ=-qi~6bl^ZIA|H}sG95BK-?pVqg~cdYM! z`u^JY7s#wR)c17X6Mgf25BL43@7}&U`@YrpjlS#qc7Lhw3w@=&bYG;;+vn-C_UZcM zecSs4eVo3t`_AZ_?pxcps;{T_U%mhAJ=*(r?`yp;_5QB+H@#2wKHfXm`{UmGd%xHF z?cQ4;Ip^BmJ-xNwd~c#R*t@IO*=y=m_ey#%?&bEL-@Cc@^xlcyk=}vc&Yot^2R-lh zywUSY&mX%dyVu0J2fMqvjzgBt-@4xHI^6YQ*YjP^bUoSiSQp*(VAp+J-|f1s>)*S+ z*7cRH-CdQgY*(zy-?g*L-eu@gcJ1gAb&*}?cAeF=zH43A>aM=7j?RxEvFAwV>zyxm z{=W0s&R=%^3`TubV$X^do#WW)cw5Kr!OjoXuUIkI@xj=N6$AhJ00QL(KKTGtWZ?L* zFTmgCu_F9kIF^LJA0G?C-;a)64uAi7%npA)Jf?@g|2QUxzsHVkgTL<|@(2Fs7?ywJ7?%IeF)aV>_p$ulZ@rIS@W%W21^=J0_kfqHs`kfodvEEL zo&r+llxYyk^gd^Lqsa8$`>5QU^aMnTa(u#5A|i;02?7In@1?0=qgr^VNc4dU$RmmA zxs(6evxg*ijQ<~>4|ibgeb#rMbN1e6@3q(ZuJ;chfd4&!0RD0S0qi}10Ny)*0Ny=- z0RD6U0sP?r0(j>D0{EW;2;l7l2;jE|5WsH^Ab_{_BY-#dBmJ-MNBUpekMzH~AL;+) zex(2Bllu|CEBg_^Pxm8$pX^5fFYQMFFYZSGFYHGE&+SJ5Gy4(1)P4l;<9!I=*?kD$ znSBW0>3s;`seK6G$$bdmiG4`_`5k*J0YATCZ@n0P-ePY(AAa6sZ(RmIZ?Lycz|ZUK ztpo7$8hdL8{JhHUtisQ)*_~PV`4zh}3O_$*cOtx3*qsRPWp?Kz0{j`f69N8|-H8BS zVs|3I7ulT%@C9}!0(_p`i2$EtcOt+Ub|(UyW_KdMDRw6Ue3spT0H0xZAi$^C9SHDA zb_W9d5xWBcKF;nyczf6#2=9mN4#_0^KF01qfInb&Aizi29SHCdb_W7{nB9Q@A7XbP z!0)m<5a5IC4g~leb~^%mfZdJ&zs+t(fVQCWkk(+YsPJ zb{hg@*=-1L1G^0YPO@7O;Fs8~2=I&SRs>jMw<5qQyA=Ue*sTb#%x*=1C3Y(UEV5e> zV2<620JH2?1ejsB0^o3(-HPy1>{f&~nPj&jz&N`V0mj%Z2r$ZSL4aX)3jz$WTM%H7 z-GTtU>=p$0d3Fl|youd{0B>ZsAix{gEeO!VZb5)9b_)V@uv-wIo!x=}ZR{3=XJxk_ zJj*1z83CHu%?OZTHzPnJyBPr**v$w~&u&J5T6Qx6RI{5Apq$-|0A=iE1Sn-UBR~ne z83A6$ZbpFDvYQd$)$C>jxSrjN0Iy;cqe zwd_WOw}#z_@K&=MClTO9>_!B59=j0%p381TfakCq5#TCzBLZB>ZbX19*o_Eq8M_ey zE@n3(z(wpv1h|mhhyWL`ECQU*vIuaTWf9;Q%Ob!LmPL5b%MjiW%WBa08)R7oIKZ+9 zu%BfSU=Pb8z%G_WfSoLh06SO~0nTGt0315WvH&;?cFI>2twz|Vem1Kk4}&j;)V_$fG1`V zz~i$BVD~Hncx)B{{9qOVJUWX29+^b|-A(L3(*La!NdJGIK>8=|JAnZ1J%IrJ>jVP$`UwQUoj?HhoIn6yJ%Ir3K8^tHI*tJD zJdOaqavTBNejEXO`8Wc&?KlG1c^m=kIF10eA4mGP9Y^{hIV1etd>rZDbR6m5IC&fa zu*VU=EyobRmyRKTFCIex)nf>td<+4Ujv;{JF$7RJh5&NM5J2V_0!SZ20I6dLAbAV{ z#E&6>*fFF(at!GYA4U2@N0I*EQKUa`bP@shk0Jo?Q3P=FQ3P<)Q3P<~Q3Pe9q&b2B)JG72@(2P@961aRG91aQq^1aS3X1aQ@11aReH z1Ry?)0ECATfZ*`e@RxrW>8B4P{nTNkpE!*4UvYR5>i?G?MgW%`MgW%{LI9T>LICRy zA%L}q5Wt#42w?Rg1aQ$I1aRRY1aQG21aST#1aRIV1aQtF1hDcD0$6cq5&T_#2>F&26LBt3L=9YupNz>HGL{JcP@Th7aC#n?mMnhH1?eVo&vvn|19E@!G@uL#7-9|i`x|v$`s)cq$hgY27Byw zF(eQT8tUWUJFvQgyW$aW@!8^-x_Dg4b2;^K(xl6zlnOl%vCTMOuhu3-3@V2DbM6m2F`v850~fc8QML(neen7zUB^o6EJ`+t8ONwf!sHHBD`6(1c8cME1(~k7oj1S% z%iJP-z;gd%FE6iua05CBNR@2%6alf%%CuDE9*|CUZm((fhWhveUj~QqdjnIZ zb2i%^KL>PtuIavCB}ko(tdTlPv63&wVsNM%g>8HCX4tm3m(_Qj$5=bKCij-iH^p!t z1*V39VoQqh`hvrYBgWW_ad*uC*@v~9cN5(31;MHLkS_RaHGuAFtCss}aOyuf@c%P7 z^}u*J?N;WjC6!C5*QMk%9P*;(JsASia9a`Aamyv2xeMJ9nL_^i0Z23)NPw?Pg^`0N zlg*LpeSbBpR;{VP+zg`1iJK4A!6fb1KzI|*(`kU)chDy6FOU@Pno1Zem;Wm7ggRH6yU@C&A07**ciqA+J|56cI%`CGN zsK7@J@wg`FCv$qSizlawR6K?s!XBaF!2>uv@!FCHMMic`-!__zdGN2%Cz| z6$!**!5K4rTQ!dO+uMjIN4Tth?H8s*9TNqU-jS!m`LqtQVrdY@rEVT?Uw+E%XKuHI9*aI*=ZYx`n9I+&vANZ_eIJ}F;9kG&iJ^MV3MwZDy94vS z)?w-DIobQ;-UnLDFdq&J`+m~>c(=Zr-yiAuTlYCVuI|3BPY1JIZ+AW4|8CE=u7~?g zU3YX->A?>w`~sKHYhL_cwaJ)w#Vh)9LEHqW}EP>pIu<5o3Sv z90vxPH#?5>?eBQ6ay7(fK3CM*h;18Tn%jV+b^R|7 ztd^OQNxzcLQ$d)H-Q7pK_nKfcbNZiV^y-{CG!Y06mRfQ$DkG|lELt?j#gi_-xN9#i zh)djIBAYkILoTb@qKb^%+YD1R#axMsR~uJY>`uAH6dSu3i=!!CE~rr_)KNcAmk15d z$69<6SAxhB@idS@xuvS`yw|bZTad`k+yXzJmbgv%QZAn; zIz?k0_yThv?kA&#O3-gD=z~%5h!x9Cc1lI(>~>x}OeiD?YG4hP>jjw{#aOCFWx*s+ zID##r50fh7O%ZUI%Sinqt4fs^a^U(ZHv~jaDpP9sF!B=iI5~_1?oCQD1mkHfep2Gj zI$Ww)-<$XXxi*v_ECM;?w5#$ev~S=NESLHNMaV`4DU38xh1KmFnOEjR`p9I(E1`yPJhlmZMf8N)EvKYp(!diEog#dJ7#1irBQq3r zLXvcagWatcCUlw-ltk;J>6}ri5JmeQ!1aZ4rJm43A{>ah4_6G)(UVv%2#^G&Cgl92 z#o#NIx()C16kTcQN<^S{bd7X(lBu)r|UVkRHXnL?$w*%nQ7-4{Gg~=%NWvV7-Olf^kUKWMd;OY@sS)d3Oa}r3in6*SlWmxP` zClo+DVvssy)tsa{ipfV9hujn*fp|VwO+g%MK{WVj_b=!5!6<27Wii$0uvp@VO2~|r zu`r?qm{!4TNhGxtcp=x6YPr)Ai7ogleijNHnJ09~Ft1VwNOczR0z8};D-cSMjAJ5pgLH5#{o$zSUG`@dtP&QXID@+*NZp zzzeL3VYxK|iEoT0X`v#D zMCVHsz*j4_;tDK>#W|m>isGIqqz9FnLJKbKRrRWXhWLYJlNLK643iFH$V?GlbAZoZ z)o5PC1c7&puw|UqvdBP33Zhki#Bz}@QlQNlS;?&NnY`Y_D$Mj@mM|49;Un!TwXxz- z6Y&MDxkMeN^#-Y%+;<0Vc07*+mi|W%tP^ReqPuofRbJV-^+0Sn!mH!s>UGkbVm|H%CX>BfqTSB0$>*m4b)M@>-~Edwr1CX}_p0p_yz@T0Im zatRM#pn)_Hfnq_t?AiVe^EiuorcQzYjqWC;Lsn@u8 zvPz~{uzMF{z91$bi6%&kP&BM1D{@y*9$WmS0oY!zI-+Q@!bz=iqd;c@a-)LSWHw4f z3o%C$Q>`e3HJ4LsjHsL$xo;sR*06|3eTJwKDvPFI;0e;9g=+@6U9Wuvr^bk4&Z-FU zWp)T|HSjWCpE@)?(QLC-W{QNhQ8BQ^@QV`K-$OOqY?TO2aWY?0^FkV<*CL}v-oSDy zONNM)%3aK;qm@D_(o@B9(hR(06@xe}j;hE|RMazq<-B;VNYv!9Nl!^_Eo4fOk-s(z zEES0@KuHp{icdpniV1NCW-+l8oVE;YN%92+OGIW3c?a=evJ|XLg7Al&WQgxm3V8fZ zd9(eNjKgB7IkiYt`k2Y9C*(%L9(0sQm)|=%{uNw5P?k&meqkz2h)q&+ zc+`pO2V7|-eAP4tLAInN{G#3=Ece;O4oVgYSi%yK$tdTKY-y@tvUZ8x7~`4rrD!@! z3MVjCoyDgWLy~x3-kGTsWkw!7-hL^UN$g~q0F zeVrzfrG=KDD=Veqs$#J3L{o0o7<@2W>Lapb!DI`#!V_0wc_OEh(LTGFm&k^!la$>% zv7)6&WK3VBW6}_2Cg|E>#`;NfO*VZKX;;K?FyB->h#gm1A+* zrwo+6x?qCH&|ME=d7%;qqCc@tqEeJekuA|Z*}PwK#sitZ)af+8TFl4ur9K(1o(LqO zB;V|d8Z~q_pr^Z{SRQ9I3KDpuQjD{Zn)Faq2mU0OW4fH0^eM7w#x6H`iBP8i>xb|w z4OL7hRU}_#s`7_E#d;#ea-3GnMIxS2S<>lZ!#l7%oY#q|xYJmUDxHeFSUlc=)dYd5 zt)>>45-u;FwnuuKUvywZbLui7A|nlf*bvUT`NNog$Lz4XqLjpKjSH()Z;_@uj$l2u zSd7-&713%T85L*M z_9o5xbV%nj)8MQC>WRnC3uAIc` zVeL|&q-7w=u_Op^*&1Aj<+NMGCnN&CRGN;WaW$`_?H>9R{8aYh0){>Yx@ zBFYRh@*@V@bqL52bozN1Js8(sP z1;*_WpLBqi{N4a!m~jui>Zps1}3T=K5~A2DaGyS|}3 z<^C+cUlheLd*GPkafp*20}gdg;=N#TotNpm8hK(WPCa?Qgoy}AN}MVbZ59Wk!JXi1 zcS0vrEHxUE^>2WJwlZ$lr%W>xW<`C; zy~v>z@lxSt__CH9K?k#nkh@yTSqlNI<@4VJEp267_Myv>JrePDe-m|NaO*_ORM@T4 zQBVeRzy}&t$D^ddW8>~%r`C?nl>$$})Y^MK+O(qHw-L@#mf{)cqIvyafJmC(bj^d* zkQWUL22E%N8iwxan$>}ROatXp`Q>Vo$}#0ixEib$ARENY)Y4T#iax{8*j9-n{I9l> z%UtjfisUfOYEIpG)fBddNL|+I)@qX)NcGJee~%!;uy+>twpt7WVzpFTBvUeHMCteOO*%ejeH6|B+Qs-#@AXH)MHGT; zwD3$ZdaaGzniD<-lVY0`T?|xMk4-(^0htZqSPEqciACZDh@plg-aLa7!r`aZE<9Tq zcg2lgSo)Oe#To?JTshr$?z+!{Y!EjS@G8|HDx7DGfg&fwp)?gO=Wcr(LTt`f0cl(J z)H6SY2pb-buvzPo2C5z8e3VAOfDC{Sze{{#~ zNjTSA2r)&gKWiT21g0iny<#A?$XyFWAxNpls5At3=P%$CHU9L}$l|kCd2-Jz1SqY1 zc4|HxKtVFg8Uzr@AY97egw&WSJ9pX4)bjJsI0ip^J#Me^2cHGnG#}N-3`8OsNDJg(SMX2>7Ndel zc$=Mq)+N!*0a=62UWywvi9)3i@&4C4_RSmnd-Hf;SCe@E`Z3wq=l%on{_x1ZM*i4F zynpUU|L~{7Zx27;xqJBG;X8&aoqryNq>{tL@bcl#p^w0I`Nv&rJENWAp$CR;8!CXK zvSR46p~=OAjlmBFUmbjE@SB5M2h)Sj!D|QC4vv9?@!n4Jz%K?KAGo)3L+eQ3s?PHV zE*cmHm*GG4{|uaj@9Dp#Kh)23?CTfxpWi^K8$zdv5J1^xW8^?75<6 zN%u+c^nIiIneGR=Z|%;5H?O?&aQCI%i@IjPZ}-<-Pj-E?Yin1!%h`1;a&LHsyZNq> zo=GN}q%)K@AD7tVifAptciqxlkTU5~UQJbeYGWi01_Nctbu*TSVSPyp5`?Ih6|1TS z+J&u8Xa4k>t@C)H~5v&NyZ{B>q)gTXvfJ^Kf||Og!ROwRUTo~8+8_;+3u_fESQRxar(0^(ri;y9PykgM@B7+u>Pb> zs?vGA!o02UGjDHEX|Q6*2%7p~gWmgq_f-&c{ACw(b} zSQ0V<`@c{03a(x#SBeloP{^x!B9%lOymG1~&)RdOosLQbNuJj2@GZheH%uW71kGXX zB&~6Xd|53O96r>#AVpXy+ASqTU@rEU;vIOO!xVIs)8$i}6=6L;?-Z`V=MPNYn1`d& zbj2&CL(m*@Q7=}Li>ETA-Re#-0$NR^gJjF5lyg<9sdUm$0c)j*p(ihqx9W>(Qre}G zIqhDWfnvdSEYIdCK4p`LTuGi+le77*`%QDV$7FLsGT~Gk@`SMv7YSRPHXF4{C`w?; zT0)MzN-fl4_Vad2*2TbG0Bp!imYU=jwMKa2F>KNK2lyZ>uYwUG8_^2 zrdsl}42WB6Y9gFVC$qZ1Rlme~GI4X1&qz&ziqL4|hnSg`I0~*ae5)plN)dJeJJaM{^UT1H!Kk&+TZSgGiv;=BT!b1ofg$!V{f z(7M1f@`qhgGrR- zp$MfhhsBX%LFrv_FIJx@K{l>{G+D@H`c#fuEX$JO^fq!G>BU zMjGH?Eoe>@%~qM&5>^&kdI)H?Qet*9iJ-Bl3W%3uJ<*Delz1c=y(39$6XEM{Di$VM z${38rlq4Q9o8(2}lIvQvy>YuDX-MXP_D*aJcm4pBgAJ02I?Hf;;0~8ng`_Phk9W3O z6IGf8lv5+nRii2aBk&L5qbMdS)>uiNB9V;qcoqpiz{4gKCdv=VU`nH1F{8O!&Wn~W z#JG_P7@g&Yyw+z;n`5Hh2U=ouR5^M2tn$3S;F}GXok~KJ^3=+9u|8G|$V@GHgn=02 zOxQ!`jo}C(xUBUs!_K74UgBFJ4~DiZ6cNwi>Y;>`q(os~UZtq1G#=p<_q62xoS$%o z#8JP+rXeTuUeO1w0&Ubmh0QUEidT)K6v8W`ExC+eAPkODPOph4Z91C23AaBa5!6I6 zZ?>GU+pJ-F<<+g~!b+Yj8^U5=uvAN?VyiD|RVRU4ui|D56*3YC_%1rWsOyRj*(4Jz zX{2Ocsj3)Ka`=Agv6i4UL6F)~Bo|U^1qPc}L$u^N%1D~EDW0J0rc*{H#4BF zIUTixIVsCm90qFXH?f|8vXUTe`dqOrcSdv8L{FwAZyhgvcDlrG4LEyGDhIT4~9V)bUOHfx(s@gF~aSc;fn; z3ru1`-p^arbxeo`x^!z$q~oblKAi{4fvGD>ifDh3Cv-%E{J_WqSnk$X;Gh$d8BUs$ z357TmyJ8>K@0P$$xy%(@e&|OyCo7Dnr+ElPJ)o934KHx(i`=0;W})_XMoj3O!6~UU)Y(J zI}`E)t@A@)%WoWsR&v%%0PFFG7QN;Bf@yQ~e1`4T6C`0=Re)K$S1ZEtbIG^?fbD~Vu z6D4IL-fj4P;o(d5rhp_~^<=7k(RrI&;<@e(7r0yM+uR$LwU)|ua1SFrF21d%n#{N* zba=3}_O&O=RjQ&FCA~6h!5ZcpupytZONx*+AkPn1oV=*GOf&CbTs!Ud8BH!*O`4aR zU0&%AF|Mr~_EK=nn~zuoevdz9d>mJ|LEdJQEH2VUOcEO%Jpbb*U6TY%z&2|_K-0kt zBz(}x8OCDD2xNSP)-1lF)lp1YIz@&&;Z#IyGYJ^7 z3!euwrkF-&2|Ch#UBsuB#1`ViHW2e8L@e#%iF1LH(#;=hdEc}h3a;LYTWRw7X?oO!ErIJ%&Q`&ozyB+}&vyTB*LcTzWC^?o zEPO>D9Y+!5|?KLg`ZyO^6e>RHF#zv-#P_3K{-+bfVjAo^!) z_ADmdRu3iBD~uL_Sz;#R+{918cv}4xm_6IdxP85=fq4`N7~cLBvH@FW5nnMj+oj|_ zXOi+%OL>_sO_${y@jh7Fe*MbS!m+j@F8g4|8ekE6Xhog)Ickl0)&gp<)y}Rb<2gc> zmHG^BL4{NWnyopHA}N{>pJCo?tH0e;ANb*_`u3k96Cg8-$ffb|2uzJ41F4IHPfUPGNW>H}=&T-V z6Jy)x>tBR~+P%L-M-#qT#4U}(5KEp=EQY*T0uw$bd=+`v&y^xOp1%I{t4-(9 zn`e!1HKr*I`iOGMPi1XpzD^(u1i0-F!_{q46o;U$_kIsdh%Iw6P{>_Ad~=hD;KQCp zU9!(8x)11=`!h5S;%y1o`K=W%XCzLJ!C|dz$lE zrek<&vSK1a5x!1V@20Wj?WoCfp;}m$`LOEb2Os7;$HmZGvbQ9|2K86b(3Wl(GBBSLmt*S)r25Q z%OgSBo0Rasa6!J{%@qpKWblG3&*M{kF`vF%$RhKy$z;-A zs@k0y#)77{h1{~g!9hY>5%jS~OvItw<`9kl={oe()i5 zk2dMud-q(#T^D@>^2vXM`j>I`=2MTo#lR8n7|itV z=>2y06tagl&{r%B2zcm~WL33^G8#w$?4)ECVUXMKF@${qy9_;tWT~wl_riuG=E&e) zY@F(1C#TLuBrAxC7`I=9P)~n0jr$}LO;u+s$#^P9T1RjL2jE$x=1RF;?_6Q1-*y0nRtcrGNQ89h zjf{{F4jIM(x9?wo-Y&*5WQBt$hAc#zC2}fcONVHQ&*sahlPw~HZ6>JDRFa&*cJ9879=-a#lUk!r4@ z%V^WW=9vul<6{s_(O$-x7cGMW?>oN&yh6v};_+h2Wl@tRC#B0&gW|H6oBVic@p*iq zSU{c0=-O6|+b2@C4ifjBIDG(mGtND}ssD$)f9UD$qC0MeWzRI6iOm*Ibr*%jBFxe< zr`{Q?Dryl!m}7UtQe)@vG%&c#E#ufvAlM9(gbq(PJ2qn3#T`Q=mw97^BS33ICE&NE z_*l==gP^CajO*C86!UT}9h!zo+dP{GHF$Oq!ZwH|{iRf_7}T2-VUl~Je|i!3`O)c# zv9>a<<6SkZe4hLvO#Y*w2Mq&6wu^^>MG`S3sj6E+C+u!*+zAXf{nKm4+Qg7_`ubKD z48;JtCDSZo*TpJAd2vkwURV~FHUfKKA8_tNTh60+V)BfGBUyVjM8+6=o1gJaU>-M*vg}}^|tDnF7U*Hp=pGAzi zcqzfts&h_#xu8jqx}e=J!oA{K6VvlY=N7?J1DdWo4*qd@{p1Ad6~3@VmW3o8qZRIKP+iK}6J#L#1oIlc%A(i$OOCuFg0z} z(9_Rp_H_O1X=dF@xGb!a;iaPnJzO!uzF)8}bQ zU2{bX-q})zBH$8LiutS`>v{4L(9>4NP3(9P4K|>{UGzEVPp}iX1%?TJ&}GU=l>Kp6 z%1;#He(+#v4z}z97$$RzkONE0DeA2SFicwgX>?xio!w6Yxg`O)>B60V?HEO?rbFPQ z)gfx| z+r@~QR#iW#o;JW%y@7~|@m5_e6WTOcQzacp$0GTfn2TzmKekCZ$?Dg%^?zug^{WC6 z#83RCCbp)Si{yxMF=U7rq*0|X!I|_hMBBx%)Bif;yVFm@64B+em1C4NLX}PSlBU8y zzB?ma(k@1q0F$n9THnF-@TLPxZXk<6oVeG8fuU&BIbqw)`zASaCh^j7tH_n z8r*BcA1!Nn`@A#VcRuekZy&c!8TBBS6`LjMacaTo#9m>XK&ji*ww0V-u;{EcfG9S; z20Q!^*x~1j&pc`%tpsI^A+>%!$_-(JtPmc^ea9v9(@QVp3C~!OoV_aW*b?Acv*OC> z0q!cn^Z-P-V+LDb{!MrwYaXP4iyNR>NaK==gkrJq^c-~dx?INtqqw=;C8FtxB@obV z1UDGSK}SFmi!!9E04E@zwS`fzl#7X`M;D#7Mw89(xz!S+& z!hcg(&y813k1RfW7086)Yqe*=dT5U=5@BqKh}#zCxoc*^D0dS^r!vtTQ|Ck0h12(E zJWEwBJ8V0{mx~*@1|FKhX0CwCPr_h}Lz~QSzlt)rZdH*^aQ!)ZX`Ov%8vKz?Tsu8D zA8Z1b4!eLMbx-f!o{_GrJ0kV-?-(+puiGN%_joo^f!iR=yao|?1=y%`EzX?`O)om1 zB*nZrf!*!(AnH60bITi$Qy}X^^QgYD5Jn>Y-U&mbCSeW;EljFbt9rxSo380KqjRO) zo?rdxGj35gD1a~C0%#SUh|_*26(c0Mh@xb(I(0FctK0xXt6dCv#FiowPe_mV(G4)2 ztkO5;gN~MStJTk=sGvEVDmdKyWFXA#FvEPHm@DS?`N06$%#?M^jK5EaXBSUtal#i8 zP~Nf%b}TUs50>TM@jx@$#ay=M!K>>_uAhe7P=>}hJO;d$jQWcHf{G`}iNa}RG92PA zvBP7SD}}|V4!(~s!7Y5#j&8x!7(4YCc;RBo0;%Z8aMi~sDrEtuy$NoiP0X?V;2OId znLuB-Y5H2UJ82+-UHm8&VsMh7Wp2MZ$#d8OGK%}196g4)Vs2v4)mnIK74R5ZAG9Q9 zeYv$oi7M$xB5St239;%FguiAfWyrF}0u;L?H>2@#55@qZP0X>Ie$o2!E{UTTZfu-p z*%b*T3fQq^q>!mqn9};i++{&f(I)10PrY(&eOC~@CsSj^sRk$uBom|~dAXIJmwUmH zl5_jv>NYXA%K@K5NN&5l{%b#4LNE>BC~0j{az?Qae3g=vF_0JXoic*cr$9xUn3McI z(ERSNs=t_;z6Pv-hQ_i}?^_m%D|nPLAQh)n7OE8Fwt7KDo0Qw@?YXG_o_G2N^aK!{ zF77M|S}Ds>$y7N=8%#x|DbO5<+&?0)ENCm^_Fg&Kvd3zou(n>wG?qXk@cT~stR=5J z7Klsqj#^UTM{3rL&Xsa^T7#`sem;x`@8VN~SCwWWF%*HK)MUb%EQQ;Vv`$Zq&Mo4+ zJ-0UvnoH}yutL|xj4&Occ`)6KqAV3nBlcJN>vw+f3I@4aHxNlJ-V<7K6~7kZ^2%jl z+$hZkxgXZxQMF0A?8FDxa2I@GdY0S0cxDYJ{o?d_uzoxbo*5pWVzJFopv2;GO^)R>gZtJ&KaR8k#=Vo%VA3)-fW)RX*(UisD=>eD3KinQ%0l%}d5pDjg(dLW`|SHo*p=t&H32Iow)v ze|Zyn_?8ADrNSM~m4)C?GFDL9GNe8p)I;nB((}-E(9>21$#Raj7T-fVKo6{yKX*!x zf(q(GWHe~8l0}&(mEqVupyu_h(+kJiiXdJ2!Pex?--eoFZd`KewoFQ&zedlQkR^*Rf)-%4-eVi=As+hZs%kPr%Gi115l=7^Px z?SwZ#wn^)|c23_7EM1Lt(1O;QTMeYhbh--85VSGLSVNrYw&~Sl>bYX>eEV@j{q@_X zA%4NvSPQWDY8OqV3ppm{E>XOslrQ20w?kKMlOoP7I9$6Odht1%{EaoIu;mh}CZQls zJZTr0<&=luwq>E!?P6rr)z5}yr83o?kumPqVUM&a|N z^7tKj9|JXQMcf|ZH}I~l_b#bF{}{~cs6EuF_IN8mDMS$}Qz#3o%pw6f${vDID|-;; zqxLdx&xzyL*1!EA{>qV{15dk2NOR^RTqU{1AK{eR0{CH)!OtF_uA9&%@Xl=0+N4vn;>he#_jsr<#2@mAmk;g<5>v>B;qF!unCzQ z;Z;e2m z^U(A{F7*JYX)EFOC_C5Qa}^kFUw`2A()-GJgV*=(?0u&DgRVs#SHd@rte?MucVWjW zX9L9n;@nJ(C~wkJ$#BH1Pzc?2H^sg1v+332?P6|%zjHlz^R|C>*99+wwnCh{?-l3( zZDQDUZ*Lh{$A69%zJ|uNr|u-<&r~%@yF|sOJ;kzDz%73X+AvqjdH4Nw%{|ilm)CE9 z3B53D14aK~6DiN)a`?fYGeHT2MN!;Iqk##Vt+`?pPYF$cwPRiN3>pLe1_}zr-!n6i zG=)ePnXze{ZaNbYbLL;cKx`Ky8{T%dZG{=MFEji!c8g@kP`?3x`1o2sp5}sPS1xhrn6Q7cDUO$objz``67dye*w%? zR<(rW3tIn0a1XsT{lJ6@Lh)5}+^!aT)isl-62yvAzk&I)y{ztC`S6cBIQ{RYolBuT zF^GDLxFOdO7-V=Jxw{HEk1F``SARD>fAQI?aM_i|ZvPK0+I#WycW@WK4fkY3!F4KQ z!X1;)M$%3gV+O*Ya&X>rW)^axx2Go-pS?!CW77{IbZzB3(~vOLW(LC*us=bzRYs)+ zZY2ffkxOV!@y_(>MQ1IofBM8vzuK{`WniOD8Q78r0om&M+5w&Q_P(_mpMHX=@-i^6vED5(xM60MipPKe>}0h$D0)jqv|XrJUm3>9NIU zuK^~bmypTm&tNi|j~3I!;7y%>?`OMT?tQRhK6gIv2gkW}d#8sd2&Wdv(5fVGT^L14 zXDr4k_QC*Z6LV}a(V`=Kb}#z8Uf+O#)vZ0vb$DC%{H*J~_W{f|ZDq}_%Y900SXr0< z4OweF4Tz-O+SSyfSLC8z3RuuIRih=Djrh1b*TWF#dLO!3dl_f`Y4w`A|9xaGb~PZt zb8Am?+W}EP#wa08Ny@a6uc2ww85VHUe}^@ATMhC*?dbSVz5KsE zJWDU-pA8d zA!{{?wZ+zIU)Uvb5j^m2j)bXVJ`&@EpP*TzO$;f-M^*J7eFE5M>8w08QK>YQpp}#x zNvi?U_VUbw=X0v)9D& zn=7838Q|{io*94$O-b2cgXs)H28_+b(2j_~>EM3cJ+o%v*$TNA&bx7GeZy$_3mx3{ z-kF7q9TA8`trml%-Z??UIrV*jV+_?m-=VMmojn<33v(c!;XP% z9}L})iP`3ea}V~l4pv%}XiS}<{Sbymnb{JsT{_FD8 zGL?#pDe&Sl!oa8Sr)15N8DKV^Q^a))J=(HFZ(cG33=MftCB!4lg0w@V)nu(oA-?qR z(iyN8%q;`kYZ7hQo?KpcEt_dBYLII!UeqM5lp7d=!ijXs67&TK66;|XfS$H8Zg1>~ zHTQh(nI-iOIkY~zS0gh%-&d2@t#LSw}xl(SgRR(5c>%ryq z@%f+t%ml~{7F$0IwYXbENzDmTYKvRla9H^C@)nEC6P(f z9+{m?K-{<2=jFbE%rluZQ%B`EHj>9*Ud%NZ;!5b}`4^@-nzbY|1U=daj;n8lW%c)?Ne3Obst6 z!ySw7%^PUSsBi~EDl+BHdU4~PAZEtL+snAU{@d2v^ULyz`XUm|1_H4`U7#xAoFnUs zC=0dbr+yK)otl{#Yb)a<+um&Eg zcn@u5z?`!Y_Se4!Z-M()&wvk+z7a$Zra3Qw|FJnk=1hdCZ1CrjdJ^5s0*(-Zp0+Y> z?`>L~?)na4^H$_Md6WPvhs%`K23;v3zO+M(dgRCv;cl+Kva%i&&j5G6uCy^Jx=7bYo4bnJ!abb$oMPJ0=*@0A5tahdw+ zp8949QsizVKv7@wfqO}bDntYoMLlJgmwbXC_plN^2km0K-d&-B2Mv2;LE;aQ#2FExwRfKw^_zZ{*>Tog@D{lIZ--h;f8BGQaEb;eT~*9sb?$ z)5G5w{^IaW!`BU8Fx)-#!O$y1j{wC+s%zzt3331~96Z!<&*(LSZx22@c;DbHkl9b# zHTBxOz-`@8+!x2%F*+>N*$keeYJO8 z?_kfzJ+F40)2Z#*-E&t@q4UxnN9TJzqMqg5C%WJ5ejYOCZSD?rtGh4h9`5>N>@Qo#&2)dB&tA;c*&a1EC=LzK=^0-Hm~8$6)CV859h# zjE8K;^r}d!w2CNCA?tJnJWyzl+yV9mM`FcNTq=zM_e;kbp8#@RTjItfsE7a z*c23`y@rj425LgaYA_qGd;pg!p($ZLY@U+f92AG=3eVJ-T%m530tJsJ=7@rCPZ>60 zP+~8`GntGp-O?(iAnA440DBpO6ZU9mFBFR;mnN`k*twB*o}m_jmA<(Oq%>97i%?6w zxYP{K5P2dQDC|7ruEG-|m#)U8N_Ym4JlYlpyN7}>*nkVDrXg2GQRyVG@KlkP5V$e% zJV|ZTP)oqZP{Uu@fiG6T{rrE7eS3VHRsDanUe|TKtZTci+t`418#nVjxibb!b8FHj zY0{)=!Wc`_+>^Fxo2!$pB66E^L)igEWb)+;C@N#ZBZy53B8oVNd=W%MCL$n+O!SKi zuD|!mla}>a_w)M)tgrKVo|E&O^EsdMIiJh>V?(j;D1!nKS#!jUztxiVH%nBp#X-NC zQZXzbDB<46w%@~3Em2%AWyL}hK>Kh<>~RE2vF)Tp1r*W1o|r|8(Yx$nt2UVR7WT-N(Ls1Q*tld-kVb+pEX>&|3kdjc@dms#(j;y_xr($}Mi)(SA z4tU%q1^O^zh4hiSV|RsB`T~y2uwpj6MCfA(GX?Ziko<Vb1ws9Dr?4Wa65+Mm`ube*<+%g&QTGm zgm)Wk*7krVTyrwb1U8{QL#)m#vH*F9LxzMrkqtf5UpJ{N5%FHSzJ2E z5FKLNESNoeWMz4YDz)r!QFtXw$Q&OC(Q5Z*Sm^3X``89+p9N@I$d$)v%`P`%hV`#? ztn@N#&cP-Ky93Ihqicv4mo2^I4<#z%^B^T$*e4FKAS{TmRIn{Cm8cL)YHVFKv&XCr zN`O2ShOEjqyv&oa=8k9%;c3_jA>dmT_j0WI?0Mg1Ak49HA&My}+E7xM(#`HKSFHV)Rjo z8TAGz2ADZF5E0$Dr$m;xBl?gTZca}eafl9>OEHMDnGzMPC=}zcVV6U&#!XR=qbpQX z##3pPn<#?$V8DTQ7>H`l7V{wwC@eB*=cckU55_JzO#B{VCtiDd> zap_oEn5XH2xt9TO7I8kAI1Vpy{V(UKEJTym zh+_!BkT{0i*nT2wiCTm%bG!DKFlE#@jA@JL*yW|2YQh}EAY7a|NN~u+t~i8pNc7v% z%V8W$R75in#1O0&EQlvw_B>CeKNtdV8-y{=O`ISM&OcdoeTkZ(JHj2u8RH0I|Fe3q zk|*9eULwn={TY)Oce}tk5G`)ZNpndCfRhm>3R%eF=z!hJ1}QikZMduSEd`{X!|$+XS&6IlC2#E(=G&QW<5U>c~Y~^^W4ktXstOJ3t*cBcZgfRqJ)w}al2r2|?Mj-0JC&i#j z+49{*>K?EPrVGKTMXWoBTOH(ekZD$wUY5a5k3*N1WI~-HthdGGi8cJOM8%;(ZH9L6 zK2Et@P+|ebUH!9j)Z#XVRG@PL(F^mQkEt&mKXeYw(mgmNs2>E{3q9$glBN=KK{n&0 zw?K$O)`S0z5{pAETe*_&nl2CI8iKyuSX*?22^|iVmxk2^$q#DIh&jtKl*g^C8@h3R%d02!!_&>pJ%uM#!nak(K?Vj<*tqTm%h3HI2eEvI<0ItS$e zmQQMk1)!k=!qwr4iGp)fd{YF+N7@3+L=S~Jj1Rv(FQ@RlbZ1>W-MFdTJ*dJ$B!BZ3z&-TUzSE0Q(YhwuCkPVSca1fqs8f_ zwP6upJdcE8qLO$~!}_U*{BVllWW!Nxk7BLG^(Ao&fI)0S6uW^)!nEgnIN03c*3xdG zH=R8ms0Ljaj}dxa7r4}yTiR0kVXzBTK0*-6MmV4#d~k5q@JdzO6UP~exALRgwqga*WsnGne ztvxtRJ;13n=ggTs&{vq{&y>iROt|XsgS2cLHV;lHOT76jC8`83LJ%Y9I*#CItr6Pu6N zld|}Z6NAUG9H%;jJ-oiO#7=fk@y8vINkF5-df|t=!t3;W*EC%KLPJZ7)IqS|>#>sT zy32WL7qlH8L@f3{pf#!dKvYe1T{BOG5XNnX9$%Ofe616*#4KLRFEQ>_kcC<3%6o7( zv1M@cff8;MH~qWxGRQc~=UbSwGVa8JJ`;&{e0VgrtODI ztoq`^B66E!8dVdW55dn@^3MqkJSF2#sBaPD4=3`)<{Wfa*r)r*TaM}FZ8_+axMzd6 zpj#qM#ifs0ap&fZNar}Gn_Cur0^Xc)6FKNSs|V^&&gr|GvdUyM3^%AY>mHKFJVT{! zj|{*NC!i7at=$ZF*IQq>Swy}#IPGcE1~XKV_c#Eu>T=33lei8dWvgi2YIaXIuUza2 zGIr@dHvRv~1QxwaBOZ7Ip(twUB^ie!uFq7wf&pdZHqSHwc^9FLjL&oy|rySzk zcUB$RHC@&8g|hndYM!eL);>^ms`BFUD@Ei)_h)Y+;=9VP33UYSnhvL+wDM2CFfK_QJy z?fl~ALsx!j1^0mut`)e!CScCvodAOg8EeZa6M7&q4cS}@zMGJr`tuf$;I=+N!_*Y3 zxTpQodeQ1}^uZgzUE^K4tSk}e9kEJ=6*lsq7x5pGM&AabYvHpBAI^R*~)R+<57{!T2$g-}ZvB$_CMyJ=Vzt(*UIoc)Tu3)##?Zj8LXW5D5wL3-{xa~UF zTuZT!6LUG*k5v5;Ioev$1h?_E13Ty%(j0Am4SV8~tcDSXY?I@otaijj*AS={$?2xX zGf3)t|8^;NcaqM0G@R(WK8d+-H)dF1i(9$l6JSDk9dhV{cPjhU*1imD?H_mb z+5IuUR>k*mcLMVypkey|Sxk>u$(>5jeypdm=!bXf8sRP7k$Hokw(ATr5j zY4SBc-=ngAk4j?gmzaVke?o>b3rXzQRo7$T1tdh{epGZiVd1YYPWLQLz~-mhu40oa zHkui8S(S!>)mB=z$8LfQ64Kz8TaWpE@@K8ws+;+aXeu_}k=LQkq$G)eM(VRnI0F+> ze*JaVVf_U(I5R&k!UME&-?$E9Xq{!2=411`IE3WeafvrH)ZZ=kdW>B`zMp;j(2szI z+78I}8Eb8uCg89kG6K zX`jB8K}P}_IdT%!5#UB|<#buFW+?^fS;|^F%MXj5t^G#LpQe!JJs*9#T@4Y9=?_flwC#i5z)+c?bECy0D6S>yBx=s7Y*@G)WlNsdDHO zQl;K2;iqcnofw&bMi?T4@6s@VU3+J7*UDyT4)_&CU)os4kK$K;zcYf$yxpwWPoDe| zJVkoWI{%Ri*abu2ETmNtg}kV?ptvd37g3g zQ*{UT;;nSarL)Vh`a3~rkAKZpt7B&;LtFnW$+z$6I1lBCgJLh+F$T4K-lIC14 zxzy2P?h2IV(0l-MD4>yzZx3I}-G2bnx7IRSh0*g&uQkhK-L_sf%xK;Ip)N1K3UA(k z9t0$Evi8BvDsxt(49(Iyvmrt7t#SbX?d>PK5r9y4{cdVjY+H26e#8W@$nwzxI;>#-(H}D!p>j z1-Ni`v5RK1?iR>Y0gasKb#{>H_1Y>fe9QDU=rgme=!e&5RFf`^p9%QK^u~062_i6O z_q`a3pqU2dpn^@`edm?f_v8D(L~^xi)WD8P!o5!)f@Zf zGW~J)re=Cn({#dwi|akSMz|KEg7$;ctH{j{P1mnn>QDel@^9@YO92!kXqz$tCA4r*N};$k4#sdCpjG;Wbx+#3lTeQ$Ykpy(@R&u zZU<-s7>gXkNU^6iI^1HU$A8lGiq^#+A!oul#gf(`#jwH`eRRAFjJu^jcAz z5%0!-c(~(tHH^f^|~heB=+2x%NG?(0&dBnC$Nu%t%wEOLQw{1)^N!u zr~v7kU5zeyahOv%P*bx%INaSOkGOhs*ho)dBMF*u4LaIMev$r5HF?cjXyDfV7&_3} zzFC^7%nv1|OFJZ!T2sH)7|it|K=XwsAp;h+(%8&S@^u4rPt%Vez}r=`G@aH^JVjGd zuP(rtRjx^OFo8&4(aL-?Iq>v!OQV3|Eta6c&$%TJ*S2q`#7ahE#pua(@_eo7^wbe1NsZ!7kK@~ZFnCz#0n=_({|6@txM=xWO+Z5$_AHbP%gzrky)-oH7nO z+W{*EzhH4qz#3Eq#=G54HPjjMgBLJ>g^gc&?xpiN?&&s>zi=cP_{bJV^=0)RLXWX z3R}6*ufe9|yDv{)*ytLSxy7t26!H2dvW9REFSGvr^7P6xNwhK^r~eJzt@7E8Sg@_D zRrt|CdDQ4-2S%+LClXoXgEC&WKl;jabJH0#?zgYt&P+OA#c!Ls#Y_(yFphQw6Y)vM zIKMe2U&U{qK{|MsrW3fR;Hm9f%Idr8_CpA@Rqv?$die>_$7NeS;ickV*IH-A^W2~a z^`#PQ0+~-(iZQHglK!VcIBKB9@Wt8`Bpy z1w7diokZ#zu*(NrHZ86r55IvC3Yv>I5$^F3&G{vUQN9U=QTH1&O4gI@K}KsdnX(4S z_?viF&`geq4t8=sf0M?ZOKhfSM%q7Q?3LNZys>dPx%h1`=fdVgo1~rG^>2esAVp|8 z__pFwXR>maiA{^WtXt!CYNAo{_Mh;9XEbvg-oZ+d$h*_$w998{7C0}3qPoFJ-)Q%c z#yP2o#zW+ucVTK4HXd}X=-@jVP!(*P^COJd!JNEhTfa*T)v=@ zY`pgy9o!G=+c87Mi_9PXGQCA~GpT=n+R+rZDtjiRLlU`dAn6ZII)=%_`sv?)v2z4Ry)R!_x^>x1g%6}4UuB}i1L|omS&>!FKcXFDK*=b zj>QyerGZH*$TvU6+k$3t_%eGZSMhHIlQ#~z5*CfbHV_coWPTenNrq2>wFIr?MD52N zT>jMbw?wdc2c>WrA-c=n@6tQVnpuX-;&mLOW4ZbsyT$1l-U7Sj$ZhEn#cFya`t~r&DI#u1&zX=yA6ww^iH283UWVy2{ zzxv$Mfsz(~k~^~G84ONVm2X;wl5hxYq9|R6CdwhM23}&sP>5+?=d~K*)u|jo=$(S{B1vkS`dC zrirc=eJoA|9^f!;Wb`gUR@CKJv_%jChA_C|?;|n|5jU*WfJDYi>hr74WyGiDaKRUL z=A)cw;#Op)u6=B}hAgko(;O}=HSQxwbi&fpuoVP6IDEub1I=!GeZIMM@h8aP9pbrx zebkU&wo+YIZ>YN&r_j13E!E!2d&}P`Q&U`!O~}!nrPZ!qSq$ip6CpQV|@e3pyK<_+i=xfqoQ2HlEb9hq*) zw~|<6zNtY#B3?f*z>m-TsGWPZ5#3;0spq$q&zrJY7X@TwATJHxm8KKXdwsM@=c9G8kw2eu!(!AEe~r4 zJ4;I~D^|-Oj)$EI86(NM!XAAnX%4bdqF9~pY&xTv8(E##h{(}3`3oD(jKdsC$w##c zi_|WTOUQd`@bQ9H7W_?~KTInb| zO=bRi`R|u(E^|=Ux|Db}NAv0DYU-+6An`Am|!WzA;p{&Oh4CL>7&qAaUUJ2Jru zO;qZTl0paORM3nxd>hKQes;2gTi;2SB4*8W+gNWL1|2W9(I7)Uvk9*Wn#p1H&tai& zUsA#SW)ocsc2#cm$}Qp1()R4Ve3*H2L423dr-Yf8tac`C6-AP3|0`|CHQGU zGwjKaVZoi}S8%sHdfz#7YS5?h=dK(mtJl zGu#(4cx^6k(jg-m1)a!+&49c=2b=ooJ1WRk+3P+gyDptRkNjPkzo;oE?X&kvLcT0g z@Zt)2MoCx|-WN2JBlqqrapD0L-9oZinzN`{t>`dnd6txu?o)f>t~q-mB6SemfPgWV4iSGedN+g+c#6)wJr8?gSH5w@nRKKVZxUJ) zub$VE90p$!}V5CXMV$ZrNO#mZGwhq$k=95I!rbuf&!8jU}HdOH$!; z<+^L-vot@pWGsujbOu)9>JQlcQNom@9xX5Y!nMgC+c=~aPRiz^`cdCN`X%0 zQRvyhA%)Rp^!QROV=H0 z(ZXgjb8trocclZbK{9*hC38HWbNX3RwkPW!3U{;0D0$3@w*}2a{q*-yCtybf*EYZ_ z3GPpn1iQvNER}`i5|zd<;C7Rw3ms$^w&L2g{Cu+OQC|i3yer=;YU)X()RU5UDykL_ z$;U>3|1NgpH9<3leg~RN;k^p(i|#zq3+1!4s0@FeB|<@EBsq~WPfqswH1+`blLy+# z!d7z91IVyn)LCk{-YfG))UA-Z-Bw09;2e+}GKqNHNB(;Uepk?pq8T`fAAJ3Hm0aaj zbhurLUe%CfBsx4C4%t&9wqY`~6R!!HVbcZDXi=Fe?8Mrx+zvH+$;!HYW!r0?TiODH z&*AbnDd%)jHJg@D;ni#xFw2JJ#?V+lJ29YhMhP=S1;Va8;%*j@AgtcQ3Ay`sYq{rl zL91-H&Rz`@1K*1cB}#{xZjEXz7jh24dNzdVSl9?i{^z!H|2;%Cbop#xeku*VL4cl% z)keKdpH|8uq{S~YHod4b`-9pnC$Ki}LS zpplbDhB~-)fqc;@p(>hVVgZNB%S6lrX z8O()r5(PiuRZ(b?LK;bI62Va$#m0e!U>7zH&wbu8xe@64I%ChIV@wlK@Y^*X!)`x= zH1(Yqahz(Q*DQro~$1Dk& z$;RJ&t&{Y<`ODSZ7sjErHu_ze0S_YT`qkEmBf<0%CYxVLW+(D18U!S=(Xkfh$0vWW zhP!$a@&WFUAby=UXQ#RisV)hlRU1bJb;F3#C%Q2(=E7!V>c=)Cm3gL>tG0RV1Uct4e=$@61s%$aou+lM@wT)@V z4MCDg<26AuNxTTBK~cr}RhsHL%2}iqm-N<={;b_D84dM~qcmVJsbLA5rTn$9nIxP? zI=Ip5Pc0Ggs@8+K{06vIBiLX3A_uhoj6CSGXpBKXfPf9z6)ocSjI*>+m55KnMM47^N`w;_P3PN<>e- zI(PO{)hRTmI$4kk1?vlvmypH=&~<8OLfve4{8g#9C} zteAyHQ>$o}!+h5(FawJ`f?VZYbC#zIZh!^_y#+Dzh$2VU5Fl-kQ9_M00I%=A0UGGy zRC4g8-E$+lDc{tV3(;(kEYeMo1*fMO1yI6(v!lBy-`TP#5yjUk<`t-Yusb=r0M#Bt z__Z3D5CaI(Myx;l%Vg_5SUVOca))0ML9OJKrv3TaHUknGXyT;-e1IekVC*24JQO9D z?9X?uT#N|&2A2hMCbk3d~i(hlwzp=zCC zb^@>Su8uLYK4*}qn5Zj})2G<+0J-FLEd3eH{MowgtNC_DF3qh9jPSMUvjW+M6kE>qoC^N5?Y^!D2=3`|76{$Z0T(Hs1jvg6tIQF{2j2x!q%d8OCIz+ zwVD*ZlRw2X*!xZS3i8Hx^X=zctDM?fhMDC}8D68+JuU&LnlTs;d%}Z0^73JfRM-q$ z;fepvP^d!cVlCY^i zG6bg(?Wp{Ie1w2TnwDarkH6ATK?{m$O-uyo4NNMruIa!$>oSkRnnZ@Hj*;+xLIQ6 zFn@w(Fi-;ey6oZ#?pqutV7+{5FAe$S1&o8yTjIoYxGv1Sjz^;?#J`zHwc=^iD!db5asvlR$$Q5Zw>}LVHvCHSDM1k@qVLeh?uAG zlY(Y4v+BF3$mG0fH8(SjDPDHC=Jo0eDo4tXiasP8XSnmvxfZiPD_HQekaG3)ika@% zgvl+DYgFjfQ-B#x&`f*fufLBJsI*c_JvN37jbz8fX+}8~laZBAVD5y?ejfUg>6h@Q0+9fa2*|-k zfFbe^k!=e9BN89!>#NAVUqatq{1I~Ef}2bDh7xZv^l)@e+l3Nl zV3TvF$&O#acPNpZh8MW#quc?dA4V|VO!zD4xJcte#;qqtO@vky7_uV!oC0Ie4&fAC zl*%0(xEV2Yn_r?I>4JY3zFiCpS;j7oO-N9M}*ybRkQRY$2= z7U-}@NQeD1PSY&yz)5`>BUqeTtUN0S&y3E^5iEm9pQPEKCcw_(6X<-gx-_}u)%>cB zsIL17Uie~dSikOEasx5V`m&2DmsCi5tJ2)4e~+ zPcK_x<*kK3ulYmON0l2<=flcD=T(T#xpsJJFO3r9AxhIqcd(bShNKeRaB@;3QIhc! zU{YZ-MfdOK-ai4cvkvdmdMNz+UY{}TmD(IBm)Ii7#72nw_57yBGg^WD)Xly4dftPS z7SANAR32H}{n{G1~PQEiI$Ok5=E)t4P6X+M5_+tQP%*k5s&k_l3>m@H47z zZt871+_+DdNwFhYWn3>E8&nQR$h&{S<`*;*HHjhy2(L%qg$geq5%u$TZzFqt+67#%uYUhHdF^Th@^5)BzopTfb;KuwVV6bY zcZ_ti3_^AwF&DNH^}{d0*?a&lyTW@=N*ijfuRpgoP^YarQt`X;Wg>2)I z9grt`LT;NWW*h+yf3c6yN%+(SB*ccf5ELXiirS7RaTKjLPwhPigDGKf4kc0MwJX64 z8e@`fbrvcJ9nA56priOg8nM0c73dS>P7B3VF9) zDOG*4?=-@P5MO!q<(%jvTzJ-druHJnvxHd;-(*i(Y8{LAs&vwXyq6*BQ~8z+3W;1U zJMC7l5j;mWZn_xK|KLbFXZsM+f4zHZFG5d0FDe2d503y@K{D23nMg>3l8lKx^mp)( zpp~~WZ`ZZ8a*4m=!)O<%-c(Bc%cNPOg6ZpX+kA1aDQNH?T3T2|KK(Ivjevx#NJK&u z)<)a8mp;xTqHZh}9+MzE(H_)}DKgQ>5d9<^dkdS%$$`~!a(u@_%Q)^7etw0rtV~%S zs;jG=Tymi1m8!iJZ_!)xhV`FwJT#8f2co5{Co3oBX|e}o)-Hz6kvUR2dW)-Nk) z&hlfaWtac~@9-?uO19Tw*#$JpS0Qef<=;-6arK2kq+0;cK?@Ig5#q-TXCaJe4kSur zd~F+9Msb=>vBvjXn&2Z09apT|n9up|Md&qxra( zbAdMcT~|)+MJ=lmqWln$arzk(tQ7&>aD2evCCx1bAfXGIiP{;yf~X#T<_hlVmO{N~ z{ovHz4%$i4~Zw;aHsogU%q8+t#nS%(n#wSro(9>Iq$YL%g^sXXbe`52cWW$$tl^{Wv zG#Ad{ukmHu%9eZyGIDusvTR$;Z>z4Yc!$c!j&+~2KLk_B4O@ybGS(gHF}fp>o~$F; z>qc(P;Z988)8`f%>lcz}PR(2$h_9Z{3rE-*O2Sb%SzdDGhC;^~bI2Vzu%=%`-aklu zM1L+s<2&a=G*YlUSg8RQ2tAe7900ht8-QMPEPxs9fKXWck)mQr?%J{JeDdXvvr5H3 zcNEClfuqP)Eg_Z5CW5w+-aeNh5gzQ*b`R6v>8xMaN^A$E9VOX#%Vx+%3IJsV(g<~r z1Dyks0q9#4OuaZ^tF{yx;r(Ca5$vgzSNsP7`3)Gw-N3oh$AE@~&o=>x4KOCaP$6Hv zfQsHlsSv$Di`a1CSwB2`VS%i3Jp`*%>B9w#2qwMgqC$s|KRNK{?^ONLW^Vv~SL8x@77#$f>sRqOtEIX9}HyBsRzCpDhNEq#$7 zqf5zB%%C%7W{RD3HVT_*0d43?4?NV)JuN99?$|OeP7DM>Y+5rk(G!eD_}{)vR%ohU zNP?vLsDs-pE1)nDg!skS(7cd}p~QhKAd%;8>Ny`(g>G%< zbgBaM(B7%Nv~nDu_G<2O>QtzdrVe{dPP?$&06j+mr-Gi zWumzQ{4)9MI=56hX*EsuM-hV$FGaDV?_Y|J1hk^Bf@}|?j@0U{bg2|mdue$v-u7eY zlMMP9>!{b}usgF-09F?}x`)B}Af(NsR^xW?tN5klz^@-DNy28yoFo+4%Bqglcho#k zXQouFL&m5ECmD?fC+KC(qq=xh))W7tReVup8U@crv>;ZT5K_){Ng z>-~DE!{doar8#|~i#)GK4}w-AdT$GO#rgDVPG_Kux=>utN%F_K!Ke#KMM+M^-dNkt ztuYqdu+_+aq{J#MiJX^7&k*v7rsTYxQKU}~?V z=2M?9FP_f}r8_V4TZqeob8aE2DERps$|Dxc>k3s_nTkI~an<;3)l|jX^cdYpw)Pd4 zFEVxRzOzgn_u${Yc%6u7?FH*P=g}$%<%^3au);rVLR~)X1i(4FH3O3YB635z{m2ga zAfRCrwKKvv7B#M=5cQv6iHv&p+(VPDT&83$5gP1CYW(3g_+pG3qiM z7{n3cfhh~2Zt$`KDGz9Lu-L)ChDx9KOqyx17?sxg{7<)v+s-{&Id`o~P zVRTrgipDpZTyeXH{>GwIa`1r<8UDl9UwPIKPhW`}g^4o!?pQ+{JqN%lvu z#{|v9mX1-(6&xu`qPTKUTM!M?=YL_SLenqN%E?wARKA6+2;RB}Uy%Og z8tywjdTGHe0T~*lTY_LK&TZ37>@3@q3fMK=i?MOCY%D-7oxraNn~5m=^cCE9 zCvb$V#Sx}Qpj}Dl8IOOj>=#)oa)CMP7r;cw!I%8@S3Hm~OZxRPzdI!kWitHmoY$aN z0f~4!Hpvj3mV-85Y21b3tDCBOoc~C|n4A~iy{UjQUyD3K4!pHv6?V)B0$j0AEgw z^PAhylYmAxzIhbKl3`{wxAk@^*>JGZR1}#kh5YzMwjm)p${2nre@dTX8H2 zXe4nr@C>eb0UaH@m7b6gwq|t1OZJE(;0pW2I>h$VQTNLruKG5uX?t9`t8z+;vd2ed(=lCY;o9%=;7k*U`K z!*%@RkJoZ5zFM*vn&!VU29zL|L_I1Uh95-}9~&Yc9D)iUXeKicV9t-v-~)q%&J^Ti z5BlKczl#*VN2Z{kd`tPR;~9K;2kitc!bo#6D@zFf8fuX@ap~hgT~ng+#+fZZOC^4sip_hFj}Xb2KUUM-DqDvoNoL(4nqzN3TR|%)6!0|?pygb@)vL6QnL43h(Rn?q+51(;ha_q zL{?MwPFek`I&s-MwT7CV72l}(EGhip=@-^t>zLY0OUh-7E|~V{uDaNu6dm#IWW|fbh{%txn)x7Q3S~0N1(+oY$XRjkQXbhwsUP<0VSCtT^R0`%qfcM{R?$+BR)~J8d*9~k^z{=Pj$1B2ST7UgTqNF9BPJiq{V@gfTTZ)AdcvKpmeEGYib}wS-6FK=b1uN%c4(^ zlL7NKa@Px^5a~ZV>vW`lR&;T!oOf|7+!OpxX(8L6#lkNn@!O?XiwQ2D5i@VIj~^B{I7MA!zZzCzkUo#+u~2aB{B4$X64YKU4@#)`g1E=>h!hy%4Id* z6pO3fznw7PJLzr%m{OPu9!IU;MQbVD;lMxqMI*krPM zD5XlvMi_k8DstD$h2;$b5=t5#K@fiBdF|ZCFXIBa77j;0P6yty5a^9+dIRIEandMH z_-sV_d|^}l!bWnqv3GHQ<0JpWUmS<$g>-j9-LFq6asz`NL>IB|zyu=MZ`u$nB;q;i0+y4O5?dSTBuE93rBTN=9K3Kx_+Ttux z5{+HIF8~z(4~07HFw|p%;K5}Qwb>Blr;TQjt;6rI^=}k_D7feoWUB8vF{DDA_Khl|8$T~&-mPr=r3 zZ4X)Z&RH+5sdtLvaP7P}6mVaRT=4E9JbCiRD}trNq5VC~0`9G-4TbvIsPyM{sNwE~ z1sk<<$iDYr!(Eh0Uc0ILKY4qL0U%A+msM`7@2rc~eou6L&4=YzRg=RtZ?beT@oUP;hb)Rz{MNm%34Rr<| z(6j#5$jq4>!X4iJ^ur?3wPfb1vvJ5%OJ@spFj~e0g#uZiGoWxB zs@0(O&;TsPm(H}2&dQnkmPH>yCf!KMZT02KnX?7N{kd|6s)?KD)kGnO@r+0wshVkQ z6w)}R=OOCEs+sY$u|VEMC^lbe61AXEu#nc3p==Cn)y0S;vHNfP&l0AF${Fxpb@HjY(8Re*^li+#mk?#KEqQX3JtKfTe!R72GAOXJD>^L4+1R;C=1lwB6Rn2EsvOf(d#I-7x6W zPC8p=fXBX&MiRFN`5MrlYng$q2K}U=MDYeaRc74pk)$IEdo0@L>Kfp?IlKnl2uNf` zG!Do8lPF1D-cH8@Lj$5rONNH7UfH-q(i778EM1m_Nm2SJTQfQm(8$c*ILuuqfROsV zW^_b@2$C2O|6${HyR?fPHTN5sfPopO5sVPs|7yj?6p)De4J{z~?>)4d8*IaeQNI_0 zXiM7jaLlAmN<+QF+8&d7AlR)W&xJ5SskIo8fJTn2EiWm*FRh({2OeT@5(DCu->wl? zIwxhsvf!x8GbRIqb<+%@8Wy$^^(Nf^7c+Sr7@VmfmCZA2slJFT&XT?ukg+39W{4dh z(`VGN{)B=bo^w5hC!mp;!z9FQkzTKhvNR)l*Nc;qsTy zsBwFSDA_YFN;FAXASF>dZ3d*``H)Qk!#&g*i40RBpb_THON)NkHQcST8Mp=@+h{s1 zKO&i;N0tEWN@!dy9Upbz7Jlgr;w2Zf!sZ9_=>f?vR&y)2q6g~9EvCa34Uo=Wtt2It zr<5^^KN3$d=z^JPAs6%wmMbnL$C8Cok9}(( z89OC2?IjO|o2Ks$)K1lWv+9M)CFK{3+|;kaE)GK@Eok`PJN$8agX|Q&TkDa{SdATFsW21mljNRyiIXrJF~ zPlWi6e%nn|6akGKDYU}#MDbm=8fV})=%1RRRfG7d9aasi9YRWadQhqvvAThDQk0;d z@5PV=G#>7x=t_IL7ej(xFtr4$&d;_xEHjVgvfc@;%4V@BSiYZ~7EHE)grwECw{btT z%os&025D(77kKJ{s$W%#$}bWPavP7|1{fRb)Kt?vN7+?9h!zQlZ6?2EbZEFZZ7t;W zLFkqXN#x+FKr4WBUb&Fdy78@R8s|4_E+AHp229?7X=KcAcY5jgTF8DI`dCOJ%sq90 zko4cu&i%zkmk_+rFhBFTzHT5?SbT1kT-qNE3`O~V9`#_;3ur(D1w5zt+N#P!-zv0n ztFNR=nQdyS9-Z+5M1nG1I!PFqnz0_SNvkdns+rWeF!=%+X}Z6>h#a*RQ(V{&( zKN!tpJt|2;Gcwx48sbW8=^Wg-bEdg|A&rREr;ypdX;}sJy0vgW+=* zs+foEO9zIM0iS(n*w3%!P(Owxpphn-4A=8{$6KL)rXP6FHZ>c=NgwQ0bcZcH-73BV zg%ceJXyoKk2(;s`e5Q&#IPv2)?yF9^{VY>cwHOZ1S$zs7;FBu*0^`zvS;Nd7^80q6 zHvx^D&?C{L=xlp;2RbTAE?-&wmZIc(pz7C^6^Lsq>HU<0SI={Bd`O>kb-Tk_Z$>Tk z*aM_*WTxdDDZ?n`r)B487Cy$KoE0OE6G6Jbrl~2KDe5bpPe`52vC?sKuUlrE$V#&j z+Gj_DpqU(*`Dro5W)(LxGIK@IP0{Qy#UK`TUQ8uhPK|60R+;H5i= zCX(_@*5zU36YK~|Ls@#$5myfa#b#Q`Ha~_TAR%b#QQROddUOroX?wwG}vaxQ5 zxv0#vkRL|qHe5&pRMK9cOo?t^#jT0bjv$h00i{xGc2pN0VKip3T%zkq4g`ym6wu`h zn{hsT2>+$ux0W-6@j<0xUR%p*4pu#0@pgHWXlp%FXRPI#HU!V-w-YSGrCn~xCdIvs zWW>iLT_ID-p&)y5Gc6nBGOs#UU7TIxyL!%?@( zXBZeN_CwxEVd8`|GWEgrYR;4{O&qc^OB0v&k4D^*5kTTcyL-f0phIFXfKFZ5jNoZF zJ0EO*dJXrt+|2f(45Woxct${wL${nkc!|oW3P@OsKC{l_7zr}Owj19eXr(vmNbbz5WOJcmRm%( zi#{#7s_rYb|GVVg<>GQtdA9ud@`o#LtxPZbW~IAwYvsC%*@_btPgdMhaee)Uif~0w z#l;m3%l}Zfz3$w)ie-OX_LJJKh8vbXQ~Ov$Wa$G9jkUXKrk3tsI<~Zb=^okAwz^-{ z{IljawNcXn!m48`sW94&|M@3gGTiNiVB~O)~tXVcv`&jKAwbvX}w=XFd5$4;!*suo( z3t2O&Cm{q5_2p^7Vib`=baQL57(4E{h(MZRs59}Ed~|kkE5vn z3(ziYC~83wXNuNPeocwG=nZ=HkvS^LLhpfD43GnWC^e&W6JC}rD^^;j7i@%lrvW|& zEPPNLW&o+V(@TCi_cF?}$0*Rf+kqlY5#SdiK5pr+c`C)Mjlv5}Gf^p2ni`o-Hrc9d ziHeHzs5_4QPj_UG8kcDV{h^L{!=WPCL4Bi90QsXj7gAdBZyYstr49TyIlAKJIA*I@ zu6-ExJX|SVPPUaF7GP@;6^&%)1ROugc*DK{ZnCA9`S^EfbuU_{+XI^- z66_3au_b4THNIPVH|O57NWFvA19N0pDHz0LqO2GE_^3XHWQcg(`+V2n7!+}bqYcBN ztXFhrMH*B5yKXECMKrO4b5Na}I^h9tvBWh;#UN3|+b!Gk{}_AEK*@?~ZFo*TbK>N1 zW`<#anIQ?iLnnlR&N=4>kp4z86j2!tlHU%nhR~zWd?9z)z zrM6*{fG~$7aT|Em!Q7_f$Db0#7$=aHdkK9QJUw18pd%V}oS{;ZLK(&vlkrsn1P~14 zSsg!hz9_|KAR$4Ej6-;a0LFsx)^)cJNzVye0;IT!(}8&&{Rt9yIKA1)iJtf}ayc+I z&|4HU&|7Fkth@f}q7<`$OeYn{%gJEmfF^9tEe+Y{Q8fUJz)yzISpchaff|A|a1*zE zNNhip0(J$nAWxh{$en<-aIrhyKCIbm>$PlN%wZ6)!G{FsL{PW^LUHO(q8QVOL=3yY z9v|Z1fR1HiZ) zQXl+?e$cMy*!5y(=@AAD8a^x<1Z^9%AAnDEb*Je9;w2;`>MU+L*iaTfjOm6cmtK4` zt+}TMZyz8Dkku20=Ga*@0E4*jwD`k7w*iGam=R%>09>HL5c~MW-Bb#R5?9J>HrhZ60iuc}&hZA=2-^b80}hM43w zgN@%V>JDCIT^PqaEFyx=dtj^qWO;gG8+{q89SabpEaoR`!i9{AgW_>hX;GR1P7_%x z$)z>IctW^jQ+3BaDoPQ9j#UuKhIcTD^I(q&=cg9LW|6lrd7-Rcm>&b4#G2Tf(Td{E zaGDq}0aUZB)ft`slkV6E)vxR%|oIE^6nX| zUF}_)=(|KoVTrT$3??tkN~()>yq8_Mk%~<)7i7DFR(E0Gff)k4kjzS6{9&@1plQgB zz&;Hj|6l_R7gl(&YMA{HrW)*Y7bFB&8ZmRYm2;_7C&3JnA{+(~Q!$b*2P+;g?EE>A z_Q(o>AIAKIj$yuH2}naZJ3F5kzHA6%_kbS4V&@>4kbp6PeUQwJ9g_|LO~?iSDG~tZ z!ZM#QxH7|bDS>h{uTXUvbw`KgH{T3u^3FyI`q8Z>|9E0 z7wmT)mJPdZZ22)xxHWR|d!84i*jXabAsfS3Lv^s^0~n#T=NDqL2(JS$UoiIx2`UDX z&_C_zQYo25q!ht62H0E7e+*1(&slW;3HY243@mAz!wY+WtWp?}>?U!X+*$0yu?xfP zSvC!3DnFtLV$4FCHj4yzs>$XMYnu*D3PA&0{BF9T@`BBw01fD3r;bAaw!|RF4d=It z8!Bv-df1u{SsO4z5s`r8P9J*`6$7@JSX!)G+DnNa*Iqsw-`onIrM*~n@4#y>O zw-m+}%GKTFJu1as4SlHM5nzQ+Gvh>J;&(oIREllZ@M^Ia!e$?PCxB1*xLs$8Vyw|B zY)=tqtHnCO;+wE`Pw9rz6M{3ixSemHQtY_Fhf5YTENNI1VSJE_dy=?R!?OlkgB=SN zkrZrz>HzfLC*5$K_%aze60g;=v$!MF;!zCBrmrmv`|e2W5jOnpim4tMA@W(+Pr0eV$DXeu~jO9V`2T(EDzGCNt?WYaO1Z&sYdOelWWfbs4 zSnUBzm`y>|RMJfdh+lUS`A7bQv(LF`(=CroPH&Q~TRMH=qPgJYQ?uQPx#=&BNy&xC z9{3I5?;>D3)Lp^{WL6!cE$5VljKa|H3MYRM{;s`O!Q(L^5+XnQ%#fLVrGNQV#B~F= zEWyd4-eO)MH|aQ8Q6HCCwUtnr7x*jT@)#)wRM=OLAoMu$_dk3kxi|=~t`azziJ?PM z8#0^Y~)n=?Zc(PIR$!!}oEqbip;lEB94I3W-EUWVU@XdDjg3t zs@gnl+qKuAZKE<8=lRSvM~3n4s{q{*26DciU#cay_nBMrFc1w?=IJ z&tH$L!IQ4U)ygUG7rki+4bVccswdOrYx0sWkOuPn@V5Jfw;WkoI$lKK=O4*_XQl6X z>yarDu;B8mkL(T4Eq-NPb8PRr#SbrDvzUi-Xz!wAc9pn~;K$J|e0Jg1g*Pr-I{x&( zoIhh1%-=nK-F$K0InT~-S^Cc0U*^6~oi1~i&8g@1&&{lVX8l9s%fb~GNw@Z5vj=C_ z&-{Aqv6=sw`NYhPGqoAtjC^M2SZDgB=^sshY5I=oE2k678>S7@XNy7vn+({0 zY^zOJc75$VXAdVRHrTLrJd6rXkFaV1IEN5nzvtAUw2Px*7p@HwSc=7q_+@NhN8Gba zrPu?){Ng=8!~=f}rkN1z?53`Ot__SrI<7|mJqc16tP9*5DQ5R~>C5mcusAQXZX6`A z8z3GBtm?bpL!~;_4nB1x91@QU&IB$NnETn?S5heg00JSPWfJm0G&lfS9q@* zDmWElaJJwSUkLSx&j>L4zV04+swO5Zo5J2DoVT&q)d1fNXhE6XTWQrWab0Xz3OMj< z3F#8?SA`_I>5iKqh2j%%_=6b(rJ@#fbWPF)x_*$D1o*Yc868_O7TX>y$~|>@7o0Ni z$&hUn4ji;UuzVsa4I5HsmxoHhDuAuWup@CyBatOxtv|EpOG7FAQ{+sAeLP$V*vKO0 zj4U_1|1Q1@fI6~R;VIxuU~S9-^uN1h9MT?s7-t$}oMK(Wu8m|-U@7T_m<@D$3hD45 zR=_EQY}Ux$7CyL*bbAUSO*lQecH)l#fzoi-oV9Ut9}$0;tdayG77-bMPspZ_DiM=x zyM;=zT`Ba)rXq%;Byoemm4#jIB;DI~$zB+Ik^ob}dWn3C7`jX+-RPn(V;~AXpfbQo z28AT+8(ahVjn^HOVlBizE5yT5fGr4i0nmVr`$cJ+Y|h|@?AoxnVb_bT6;xVWB@B~cQkOSusx83!INE%r}v#6X*&m;_`I({UwCe;Dp> zxOhW28(?n?eh_$Z4X*CW{81@!^x+snpo?)bBL1e3bYghuA_sDO63z(NzhyzX(FFm8 zR@Is4y;po0T8XouHpGGa0*)?{eeTXoQ3qESX9I%`XEC`|)l4M)^8j$|-z#HENc_AEU`bbCmhhj);8Plx_9;!A{qoxYsD z40ugqUa+{>yTF+SaV$9xPX4DTh5L#eP*Uhn%yzKX;{3xdJt9is(|}SVN1eQj1b-;D zikqc}y)KTnU91f~=&DUiV%zXda0u>rNqiZcC^%3PPc)Pg^BAYTTz4~l8HR^UpD?*9 zf$JNt6Zn%t%$~=OzKi$J55)CNlI8)K1J~k8YAA)*2&M@A1vj%dU+58Eh(nt%tZb(* ztMlkg;_bsYgHt77gUiyLnRxS2DV#k7AOMaA@YfB``@Z)4eWDbe92{tf8vd?Y=}F%rB9?iz;feU zOE~z*p&WU2gyGq%W5>h=7rc1Hy-3EEoEBk7urg+*==p)H<-=n)j_w9CGyvzHY>J&0 zH9!Smb7BYGxcneCm27SDg>lWWS!7uOL>Pt>EoJ--zvjPGOkguJX0F{79@C&K`1w zhC5LBCg6P|^C!ER8gi82{s^0c6g%7$W4A%rhh~RL4PP8)Ftp7}{Bt>Mf>LOfNivxi zYX-~*ZbmRE!ad?o3c%a0wPz-%(*`eNe~HB%x`#eNS7Xh{NhWU5Tyk56S!dH6p!6Gac5&ov7Y(} z3WTu}eF2Xh*=P;jNiYRl&)#z(*?+*nj1>{i-Z+vGaL1*E@q(FOK8IFKu$JLRhE*ZE zCip9{eU0(kPhYogY>7Ak0PZmKQ=si|V&E6_SuE(t#)HnnZFy3BSPij=xEjXq!?K1j zsj*z46ZgD}O5wm8nq*=-fiFX@rm`kxkGP*4dN0t~|`i zZ0Y=1y5mFvv9Tw+i;#5cY*C7}hiC`ceY%oKWi_VVd#CvO?QlN<|K!Ft1y#f_uB3DIxSyWs?Wi+*LtJCH}@dnXB^ zCvHlE315h*gWETpEn$FDtnl@BlJNHvN&7cmodSEqJKuF=(++4C>^#Y)B%g)D683Bu zd^kMbb>y^dCzc|{d;=wx5X0whIWi9@T1>70pxQ{!ci{>i-j3??!acX39Ve6msAemn zctbS5>{v8Eh7)eR0=C7(?~d~*VYUam8>&Gd{kxAWZX+Z9?~e@G-Hyfd&j_7ckIZi) z0r`3?v$!MjrZ8IMek0YTUYAeYdSuhq6Fwk3|CUS67o1#TNjUkvM_vsvyZzo_AU%I9 zkbcyIBYJl(y6r^XomXZ|zW)dT$t8E0Fs#@+W0MODh^-EeE5o)P;21e4e?`9EiJump zpEmqoz&|$##g)PIEw>**BKa8$zPZb1KQjIOsi}!`j>e@Dj~oFMr5?EyCv_KjRmmN! z=<6kUDnZ%<@Sl$(?DBY-@Ra$SGlYwN@b(@3`#+8VG7?h1N|0!26q??o1EQkYUqTFc zveME;X+>}O7#vQcGU1-5_6}poSNgyD7@UM8#_!x?F@A||DB~`c4RM*&--*c?TG73C zqeaJyKo14@pCPW@=8uwUtgB$KKUd@?(0OFW5?9l4dPY}Ox;w*a_HpOPc{!_i1;xO~ zbAapu5sve#kAef}P7)0XN9b$tmDCaHH)q=o-j;B5Rb_8D)0NZ4&3*`hoFg(o?#!Td zSN?o=KldScF;|e0A@)_ksdjxDjYt zI&Ms~>Wy<{ZzsehCB;?eQ5eo zAjlpVbNBaMar$eAO(g)bV(LbVbJ@8PQu%e6q(WohXve*74Zp)4FB9%~V-Fqov!Cwj ze`$>b+)1jSUI5j3Sl!{3So9+FUFJc&J0hcGt;3k}n;t|P$>_<^2s(Pox+#(5TwF_& z)L~~*Nz#h0J^~#bl_B)``v(Q5@WA%|Ge<~Gm^K8&l}?*53qcX4zKXXxk<3nQSaK}1F=g8HMm2-{ukv5v9i*`}NIM43XVrn6>q z8CuIF-#oHu!>Ej=lmJ|FXa9@egd2SMEX2`YHG2;MVVq!(!Y|S!AQgT=RC+)=*f@(r z=Sj60I=S70+e`y`py&{F_vimmeT+PH~r`%C4Jz0m-D4XNzFhS6f->8={Uj$0qz*8lQj zsDyml1;;+kYYaJggT$+>GF7j`#?l5YK8{$=<3$1p&$kJZ_nfnVB(kjZ3y1D9co7mK77z4$-z6%F*1Y!Es2L;PaGNc|q;$H0 zR>mso`3;X^)J9~&jUPG{cE({Uz$Sug)Ik|_!bMvt%R6N4kX9Q~GDygJ5lxBw?8uho5s~od zi%OAD=g7~FIL0=(T;43lX&gCEDq7U!Wc26xUyylmya@ZdYY>(kdfT4!-$aSgfSd)VdZNp(&-!4S!8--8P*KtLS1SxftHyl_)q_e zE*zC1MGAD|Pp!Utdtdc8+z9R>fQnQx+O|?D#+zJO3_Je| z_xB%p`N-?XcG-^gOCoC5!O>s#B<-f8tOH`>VFijmqk<6`p*2Rz!;R1F>N(A_jevw_mq;w%b- zEy9zN1EkL%FA`Q?xDD$&VS2c5YCxwE0sNzTpG+8DOq{oPn@^ zHCa#EE)TgK?SPXJl5>LtOUD-rcU11ij{M>?Ci~CMk+&+Ppgq8{k*dyWYA_~!TCgt+ zK+QT*EIfb9KWzO+7Y2a5bAaPO%6V0aU_lZwRlQL`zJymsi-qTdbGUe48d%3Rowsh? zdDM3>e&fGryG|jXO2FzCL6wg0lB2zq*>K|C5>xRn+%$0Q_S}2uSS``GN9VG#rF_~M zC=_h*TXqh%?Ul%-@>eh(YDOOFKR^BfcqHDvWpK$3IF;cW#PO8`$-(ghPd_}0Ar|#) z-LD{Mrmw)eIN`&>s`30o!pSeac}aNZ*1@YCz@ObZxN}2NUoc46cFWb#_!2Tl2^1=W z%^+DGY*`)=31iQIs*WbFf9P7E?B1|r5Zr+fJNRhKNc+cC9O7)?`^UYAzktR9ujzzB z;l|INyY2rab$xi&-n<<#u<-rE{Ra;jyg`V`fosj3C#nqMu9d;&ttWg!xM#zeBFg@r zT?6f_WXLyn4es2iX*kLp6Rt4QrrpN286b<0x-Zy`xjP~gR)c4z`&a0Pyj>@u0}w$6 zCmu5PyNE|7*IBrc#^o+}#m*UQKaG_uUNKlFewN@4{y)1Nrojq9Sqx|2fyA<3PHY%c zl0|YKbr?ioM#N0wjJ2a+qnt!jGIFN8MJZgt43JaC$Yrm@OVQYle-7)@dHaREgkt2> zGep~T*)iLc$cAl7&L2-|jUHdJBS{P^6}Imm0CeYgnNYdvrQvaQcfY-V05JVx#Tb_X zcvx#_b~}MuCPm-<%>leSA`_m!>&ju2)9$|gAZY}a+e^_1y4>bf@pzciJB!(x$JjOj zaDjZ8pgk28jmQY_2F|*Ks^kNwl8SIReBH4ws`|YV533IbTUMP`7s4Qf_6-g!j}&81 z`tmSbYFGc8`$PkK@i7BCGLOk*-zvQOOf+RgA{;TFdZ_=xnFFAbj?64^(lyS0wMjQb z4*A~M0{~-i!`l{86xN2MT>`F9 zTx}!WYRJfxn}%Yy;7KH`!r1=77U5?K%z_b-aAY+j5*BEb=o50jN*t@lAvgPKjJu^) zHu+#SQAr4oC;1aJ?G=K5gDc493n6N?fij-K;o>X(4Q3ffj8QviE6uSk5)2fww9xP(K>{c z?s$)VP$JV})wu_(j#*6;_ zv&0q8tsY#u4L1-7ma*e1hFsWSt;3C=t}T2;Jvg}KM6ypG*$Dsp4cfuR9fU9vQ6ePf z3b(_^h9VI-+Hh9*oE8hviKW2T{{`^%uhI`T?Z6!&0)lXzPAJfDVMAiD5FS<#KA|TI z*a@XVB{8`Te)ns}b|A_C(M7mgLo6!7RdMx;yJOt-kk@wzpEnK`!83EBM}}zM$K353 zw;?==T#l0@9jy7dx6YApGBN`<3wN6bTehC?0RmNT7WPz&if^4Y~cN7BAk`j!=m%y;;J;bmbFB0xq{U0nCN2DwL z4|xXE=R<)1=y|4AGMY22+NsQ|BB?-EB18^hcy15FZjXqBd!7fV{AKcg0&45x0q_bC z_epRSDWpbA(bOssFcDEF+;z^c5M-Y_ad4Cx!r5FUtqbbH?y5Upb#HBswma(F8`09rL# zd?M@A7?QMicl*$!5t%UdYvMq9(lsSqr2Nyi{^dT=Lgr8#J-5kxYDa-ffB@SbR&}Jx z1g))sz2$~cnXvJh7ccBTehJwl#M~Bll{3ndHp5Uohs5fMDTNyWkFk&EIXQpag~!Nq zFwy%@7asV>gIoH&)W9%Ym0HL8y}@UrU0&0On2D|-+L#D!p z+vZlL%5^k0arRgfXwiu5rl;S79wTnb|4NW07;7NGsiSLPz1{WND_XZZn+s{JU9b<5 z4{H=*PmUJ}s<(c7fB)}~4#q(s`o6&d;pe5nDVuuhre6j$O?m3T-1{dyvyYDTh}BAA zAMRK^{4Y=~v((gx^Kp=h>PwPFJ|7`V_GaO(H=?y8GU4eg^zVwRKDkSnebeA2oWkxu zARM@SK$sL(3Az@wgIbR}tivfV?bfJNO&?&ohBZFcg@a&3ChU7iL;b1JHw*yMfDI8r zf1*>KbI3vr7jCwUv3#S@Ez`}!K3w2&jO-ORc%#qVT-inTHML#+O;xg|h6aL;Rn)+$ zvSr1Er&-RL>`cg7RZxAFw4l!;GU3r@*Wi~tihgrLi;R$Q^)TpCuSyN$`w z(;jszsLk^9L&rPlx)G6Z&)H8aK6FWEFdU(S!dtq7-Nf^IIceCiE)A z78``26}Ykn+dU!zwbaQ&D33kD|JDXC(jlK~4E7LAE`lsZQDB`-SH{MfrICh|w}%_i zp*;XR;pJ%Ehzv)FX&7W)StV{(a*Pts9DtPS}2h-!X#6~8tj6CxiZFx=n=73K~PUZ$#f#+6V__bO;Gj@n44 zz9MaM0cXsVk*VUzmYmkuy%KYLR0i;lzn^i-uJ`N^ethN88vp)g)M#5hOdz_bD>BEI za#=1GQ@fQxWmn5nuf;tS-By(_;8m zwG)9opwwJv@#I>9o|!;?5#p^qV!Aw8CR8vGj{C zyB_Tuk>RTAPk`ci+kGp-k?W7vxZzIZ&ivvXgI#;EeL75_#pnbusGI%@Cktm}*j*=^ z0HYg@_V2F7*o?}Ah)w~+x%;C#`_8u!!(m-LOc22eLoM}WRTeXoE;5B!lJU6#tuw6Y zhU?J65gCQndE~iY;j-zv!J(tDIP2FfNfs`dYs|iP`rgTh#(x2zk9)rUhuv2ORu69k z*znlUE30e=RgGBQp_YZM`l7IJ>)K{PapPdi!Yc*BCvW@b>4Njmg`NHP-Z-$0?T)M- zCXim8Ap}e?=+QLnd>5JdeA3_-rfwP>Tspo`7<=p6ZT+inB7Q|#ISMrTieKi_D_u?} zqIiD$E;s~6iiL{iXZC*OX1uXMQ|(GweWF(HR@6+rpb)-y%i!ShNGSn~G4{OzajVAJ ztT)9=<8f=*V`*pk96c#~@7;r?EWeMExm8) zs>zGTf3{SZ)Gqm!4lNyAT3&o%@h6L48$W;Xp2hb}))rUCA6m>Tx);xz{KDcXi}T2M zdU9g(!h;L{wQ%#on--D__66C(-i4XT*UbNJ{_*)Q&3|~lcf)*p{<3-FJTt#@ethoN zbC1p4H}{{Q=Dl{VG55MT{n*WO=S;HHCBkMmqe%kum*I&K9vOc_C zz5cBAn`d7d`>%gW(%{v*$c)}v-@Y4X8tnPoB7GOcjl|e zml9@rGpQK|GN$&<%uN5TH~szTBhz?$G~Dej-%usWc3D{B z$umAVE$^6>ZZ^#ON)dItBr&DE|DcUg`aM-vB@5fsl{_o;MPNY8t{__(DfkMgc?gAaNo?O27^evsDRjO1Iqq8%+({Fy{Zo%OGy<*iV|&N!P| zoyN$;T`|u61T8N{n@*;vuFD#ENe#geu0!+(*g#UwYs?-=JEAK1jjZc@`g~RyKg*7iC2yB%wz%37_)I;YWjn#YPrBuw7jGZB-yC7AZvRZ4cfFHtO}B+2Xg>WsE;h1!Yx4k43}P%%y6Pls)0M((-N~9%Q*@Q7L1x zHkVTF9~+iilvP)fWgI%AG~dvtS*hf^qJ9~xU9RKim0f9rx5i)d8?jjCmgx#jrA?AF znhVN3=k{ndidM$NsU>cQGA2)}mFyupnifUHmtf3FMNDPLRl26h2gS$Z-ZrnQ7wc|k zlC`Mgr?1fJ6*jBZSkKE_Y}sw#S-DOuMzmA8ZYpL}_I4vGKYxN2%Uk|ZugiJzcBRY| zSMip6#PVuI*^I;siMqY1bwzgEN`F*dvUmAT-sXvVOr1zpaf)6nmv|yvlxw)X6=0o) z_*2fN)nH9ZaMDQAYEx%(D#yY9ppVP^1u0*w2N`wH&oMo9ZsJ~1pl+p^Y$lp2vzl%t z#IK}jJ<^(|Q{-BHZ7kHPByx*8>EqIn9xGpyqCd-fod&L6(3Gq3 zh|644yh$v!ISUD7@8c>-6|O1{YH979SruiIe!o9xXobURR`Xi1+@z8)ju_V|cu)ca*;P zW;G#@$)@xgpRQ{u6qP%FLLX<^VD<5+1BIMkQEsF(E?Rp}63AHDhAHE*gfdZ;MsfBp zsX!vbi9VQDxe>DOXsP*=-!LpUce@fq>R_?Zmy_C@C&#=|ERW|69IMI2T};WP$>mQA zZ<}DoH0Exs?BI&>h{YEp4$`qTw{j8-V=RO{rc6v_ zlQ8FBLu+q^d)_o7z#6QwOGq)mogonH13ZfNI|WL%)XUAUeCBPtUYS3vN~NV+T~TLL=CfR>tYee8 zl#MsXH(f{TsXIdsUpb$3mkgy)oV8G6ZLV8FCZ=XLHXPAFr<%_0`yze3Rxfv0y&Zugh$uLIw>2DFsExrib$(6bug<4xqr?*}xmdm9kPNTQ!%Tl#H zD#oSA7T0VxqPm_fvw;(Tm*YFWPKCF-UD9YMd)o7~o@y}@VWWDtBNbAV znOtV~H^lO!M9LY%0YfihCp+b!Snl`K`D&0;nX9d4 zrJI%v$F`?2S6m5I(pQSQ0@hBckT?~iLI$Pc(8@T8JDE+E>}=GX+a}JeiYjPhvs{_= zg|#xjCZT>eZGJ`N4jZ{r!&y-{0sHovtHf%gMit|*MJ48RL(Sx+r{6`(%T|DMkO&wla_LPkuH|zQco+fvUYQY3#8rFsEe~+L+dZbY%!-E6);u8-`@ZN*H)NW4(NzyulbM8UL9E8a2G~MW zt!ReR>4-nN@^e~V=zzzy=np2ldM?F;;!H^_H)g|ZJI~|_PHWWBQk=$b>ygudxnL+2 z;lGQh6^dpg9eeGU>GSz+9NP<ii>lJ&Qw3=)q3p83?wW7&zQk5!supvI)@LRmv zGUrCVBFD-n#lgxJ6C4v`Y88t9+)k=Cs=<&e#K5PCG7W&wx{9tH#zWy4%Wl4fi0%kRrzlpZWkow2m(o zm=}JG=)&@u=fbsk4G`xnCy0EbC&+t8-_QAm>Tq>UE32=SjuJe`;zUp1) z?>>mT&PuK!aWE=}S*eRlaQcV|ciu&!$wrF%H-6`fU|4$BhX-KdMBX$3oC5q3QX>h* z1HfdFbSF%Ggj^w?P%2b*zxe;dv2=sbyK68lbnYH3ZZ{BcKa%JTSXE$iki2VTi*myI z?jG#ldO{(IU}uEiZ`ijYobu6E4d3d16yaN*oL}#$cAc5Lx5Ji|Y2h^=8|+^mDHT?) zJ`2?7*Z&AXTYEl^m?eVP83w7Ijby-Q5w`^JKa$ZZy#3>Y(~xU+0;zDtizYCBeEMVQ zR|%v7vlRX6TRu6M-pH<7I&F+yFiie_E;IYFi4D`hz23bGH@czK!<&xm=iPC2!j4>Xe-^}j2%Y%JXK=$XB10f{lj%$PgG&f2-C+Qg zi_}7%fXC9{5_Pu{aWgq-MNr)j<=cHPoVFt(;rU-~LU7ipdzbo`-;4W3&;lO@AiT&f z2O6koI-YKYJi$&jgh4}7w(n8k2IUp^C&xb|sA>lo!TH!~^ZU6{r#p+>#Y3h&^@4kL-L!P{vQbgrJOX{Wq>D(8t@3VJ3k) zPs+2UaMG5GwA)MuaqBPQTi^S6xP3=u!lS>s{80bp&l5-G=!}U8$@}1694!{^dA4_9 z|A+UH2-p#|8>-U|A$&hvn38>Y#}G(NQ*GaA*4NMTD-% z5jQfhM+g1OgI62$PyXp0SB(j`etF>B0}@U|*NP#YBf~3>eC7e-x;|bhh9lpn^{55| zr||5Tht>-qE6CsngbILD01*QK38W_9^7X-%)8*$#B%G9e1r-3|6i@K9z`X7aVr1e? z55B57d+x!3u-kVpNZGHJ!t1(KbG#l=W!olv<|~8crQ=0I73<&rtG8c^Aepbh!T}uv zd98qKM64phD2MszfNUG8>uK9gEES%Yz5f4>N+f3Pv@5sV3-9Mur=peHVdemRv&xjszbI85;AX;^|vR`;p1b$7$pVag#-o-|{t@bm8@ z2J3i{@M!m8T)wT{z0%kGU;vzdQ$AZ$vVnFsp!PJGPCiRt{oD^R8%AV8<-EUA>bPxB zka!kcg%P}ZdetNi=i7;hUC9__PN~mCLe|lO#mCWt<3+;r2l`-$x$>di{nF#)&ey(r zn9vu{3u#<{DD<4#)Q-i>rGOzZtY@?E`X6IZMrFv4`}+Av8bT$*+sHkrg~l#4d|G*m zNe8g~x2MeJn3N8S?7NtnBQk_Nf%@i=Cx5uB|L*USTVq_H5ds7HRqmwHsOHNmty-5b z8D+TFC&vA4Pr|s5h$#QcBdg%Cd+tf{S+K=~#DLo3OfwXb@U4~_N2rKHZ;lAD$FP+c zEf!Yon$!CaTt3)0Cj8<%gOm55l9gkXbd@!2l;P^7cDY{lyO5PWg=?%&+zng(`9}xK z%Omn(&W{*saM^kHpDJv)X>C$CPAg*ro_epNPl%zQw zJ_7?wM?|g9(XZ7slVca=6I37d}t9pdEJvMNJk+(fa_cW<3~eY zyp2#J#yFZer6p|(%Dfz{XZ;Hpk`bBk^sQeR22Sk~9;khJvR`_E+!{gK4j$7s7N}IE z7?)I=mGuWa$J1*E5j*uFl5$@rZ9*-;02I}v6D($&T+PvpFkYrs zil=Ecm;M878j)dmPr=7M_r&i01OGsCh6=a;SWVS(Esj>AG$mu z6E>a!));5&+h8gCGmUmSOuzuC=DN!II?K2;zD&+!bfpbL&D|=*|A^^0B7^!P{pa`B zylWEqA4j(L*ZznP+>Nm#pn!Dj;;Lqsuj@0ark%~oGQ#aI;?DB;LgCSs&FE~B`@H=n z($DhM!>6GFs<-k=tL-o(o{?GopUk&S$$$w6qG3F&9F6R&Pu?~|Ycl!NxE@F0L>s+$}p1l=}ldIZo zCo{a1m%lPFYUD9t-B6SHfZmq%p69cKfL z^78K<+1WpD{hD!X<(y+5*tOdl9mXzi#PzXaF4Q1rl`Vo4GkJMLgcz-7pmHR+^5&_v zVPN#(f2Fs({cgXUl_sr`Zpu=UN5%OxJA;ZwWWv~oZbC&L!_8@WW(|2_XQMTA-RP9k zxguL>W#dwbJKSn0=r>(AhFV5s$blfCdL$C^H)H6WT_m}k_OYc>^uis*g!Ltxg^!1a zn}N;3RST$PL?#^BchxY>sQ<{qS_(8Xjh4sHN&|^>+#^vm0-|}jcnPnL$OPu#*=WG? zU)kNie`(D;w!B1=kl#G}-$?MAfeTrP?E7n2kla4;+({&CN(m*VI>jd1nQ}X%0F9f` z)|T_af2^!+6@I*9ZR7HYNEk8zU9b}>w4ylndA5*@moiBSZ()JP?XeM^+#+0Z5;W-F zM5`xVb$*@$wcce%w_AieVBWx>r<}EMr+xnY# zt>n1olKrki|u&J?zJt;qmrke zJ&7bu4tDpS-Muzs%sWgH*=fI+3W|=IOH{4dNH$QFI26L4x2+x6Fj_1yU)^_x@Xxsi zxAimIQHf}nK-Wd$N3NOu?DS8E0Zt-a7Xk$jtMD6iqU4KFbAs(Kg+$rf*2zM7;m!N- z%_GG~^G2fYQ#XEPPyeNTYu2%iS##XzVl+j)JDWt%Bi8KTsc710vGC{}&zy0~Ss&Wb z|JJEwYLR4h`n#<-qw}&dvqtBSl^kI?BRqaOes`pp!fOo4i!5iLn~C8fIqFpPkgdm? zVR9_SrUCAev`jc>Kk67M#&%&ziRH8Tkg-pt)Q`^|%575~aiSMV}lq!uXZjkOR?%nIS|GuI9*9bYP_zWRB@I)5&< zv%mW+V)HNv|H@2PSQAkd?k`R5m_ILZGuXQLG(#ln$$-m+g9(vtn=>^0Zevd`9L zY_5RP7fNX~CNtf`U3Sje=B48$!X3YNh}>QGp98DCX>Q&0^^^CF|L@X{vAG3y&O8eM zgWD(mKr%iL>(RY5<1-v&^l?C}VINZP7CQxW@1<+og)hj~mN$&bgfSm;et(;M4JgOh zifB;@)!||`Sl4jrWF}PA>P!KA+TU1w+DI||v>{7Zkt5@bF(T>LG<>Y$=sH*~UytRr zC9B#fi3kT7DBEZ;lyn1>H1ejE{%y?Kg#?S>FtRShhDaL?khZpiDWfv1kn2>!H+j_Y zZ>5hi&th`VgLzUbB@KzK9yXyNZy1J3g(7~rk5iv+j`C&S1K*)wmT+`3z_rq@@O$$zRlKu?mU?4J&4mX-~(td z6CX)va1$!$_4+}n*^YQw>m2L!cRR7WQv5t_o>yEX($aYE*uI6n=-1(ZV>f!~( zA-q3YOv1*E{ZAiSvy9zR{-Ay3-b;_UMRS@ED>d2V=}B0ce!i62isJpH|iuTCDA{M5|u$=hZ=y8e#!Z=>;OGu-+!*KeAA zarURP56#{?``+0rXLGZj+1JjVIy*n}$C)RV{xC!ir{(I@xrNc|v zCHGA4rpdz6c}u4(%`N_6{O-jcEq-NLwfOO|+RWPGE#ngt>nE2MdyA>@8y6jm^2NQA zKVO_#`2E5U7X}M=FWj{7hKZABEDP}k>x6Us`N>0*z6E|^&-8B=rssb<|Gn{D^Y_o+ zHUEyWJLlWWkCI@!<&DR}?Y=Yj#ksrYuAgg~=UzW&m^*iF`}%*b|J6)v{iDh>>3>+GNZ{xBBy&DEe|K^WxiagWQ{>t1zywHfLQJc6u5TOWX)LPyd{^E zg~W1uQpQRS)oV?AgXc^Mgn>{&q2aD@?g*#zn^e+VA*QCWR>^vxpkVTLd9&8YBm%~m zdVca{;l_J@xwDsyut*LnW)ndt4sfb!W`#z#CBvPfj^kr~x6B`KX(h4?|4aPsa!bJ% zO<;;`M?9sh;-nc`UaVzXye(}>Y8{@k%%QmOOEfeonRjtHdt8+_blmQUI;Z=*SRV2C zb-td_&}jLKKD|ac|1Mfl#Hma&4ZE_~EGQB+oRsNBW3r~~s`yIW9Wdmwxh(Cc*i&C^HD>R?Kos9hnGv>oORA6 zV*LrTj&oJz32i-Qt!6XxHCmpLI!hd2#mlCIy%vvUOmtx?gC9dE|6C$ zLJ9pjw3)HI-6J*XYL1*NlQO1G{qJ?+=h}7Ebfc%%;o>=?uI5ZM1|eAkiZB~77{cXt zHQ-Chj4Z7`+f>%MvevE8*>wz(LXBt9dNR6{rQK9}JXL=*?1~vw^zpc{T4Wq`1aIlV zJ>E^9b+-6fbz6*MQ$cG<(oDx<@{E;6eI{e3LW2(Tmvw=NgEzM4ojk0QkG#gBp^4<@N z-`DV3*;*-;i}gZocSfJ_-be+NR7}cPECx-k7^-MGtam#t?{rlOUT;WPyXvI1#K*ie zdMO!+)Nn%6O-j0hkXfwVXB2^pR)ByvnrTGWwX+AvGz} zoHyp6SNF+e(OcluN;seEp1hisPt%B}WYVHhF>+PU;q-@8?z%0%&rOFcX^|S02Aj85 zkm(p{;*76|^&6`au98ir61+-f2uHVlnwBSAxfX9ta4MhL*=U&~HX3d+O01E)NNj&X zs?+nRRn1X{U^vHCJRwRM2?1UFSMsWjJbZhce2<=5Nz>#(lt5E$aM;r`9^#HKmFE zY%kfhs1=No;qA_-qn=MkWM|TT=qgJ2!bgE$-y2aa~iUENAm2b1TW7 zPOI(42>aYfbH%<;(y8m*CRCFQZS(`L~G)+TC7beC zhI5!&K4sn!_bM~fhiN^HOi9hii&@^&aq(u;X0fW2`#0hGNXh&8unkl{)Jx7Tugbk@B$R#Ik6R$|VLj zd6l9wp_h4b4R&*kK3)zfl}&Fe0JQgD(k4BPhVCWHfvT3P1m!)6G@(!B{mF^@>Ccvp z<^UtDIy&-H1c=`0+1rO%2+6XnX^m()a!D%UPbfD#Xzis=Fp+NhGty|xuByhi(P zB?}EhlP@|o8V}OlJQmqT6RoD8>aiVQZmJY;cvq_&bLwNXo`Ni>OUQEJVxyx%=pO&X zmWi{*HOag`UC(Dj^^AotN%!h#C3#gg##c?opsSF`D7&$_GiiCQopG~4i=oYUDsjFk z+y9tYo&-7$TPR7jmMXSzR%X|SM1iK2XDv-o*86~vK7;0{FNgqwc zHa{qqI~7f6T1y@bdptR)EEj^c@5*#EQi+ZplLC}55hB>Hzx}U zyNqioEFA!Bln_Af7!xZ0p=#4DN|WzK0Uj^2#tvUZ>A9)rmJUsQbLx}RPtJHJ8Z)w) zXJ;NB3(b6dR=d=ly<+xM@L=ns(o9d}YGp#y|#0{#LZa06~4 z1!56*X6`3c3cAUHJp=v~AfFR746uR_uIiQVQZYd2Ss&stKzoSvUL4H<;~ma!8*;CJ zG6ihefD$o)kpvV-gmZxqKg|O(fHVu7D}*`{bW(^+!;zj4K=`ENf1pxe$QQu81DJmN zLJtsEIYP$7ue>P!FaWQ>JWB{w!Nve2d_w-j&km^pQ8gg5!BRm;mI0p)G7O;L+ggi5 zEOqc!0sI}F5>!pNS3qw8ZkkYcc1RfnGD$)j2x{3BAph}sAj7a{d#2W`U2HWFPv9y6 z|0KE?NcaR7%h#DZEH(>#eP}hvqJW2umdK#T`T3^*hR1tc2o&g`0` zQUncldjMJKf=I#(+KwS(fs5U>j*3A*LFhU_-~=ids9+i}{N~(Z{FoF?AKI(E14fM382Oy!8;f<+W#M6Umhn{QSG0eeI~PH zvL`bMiI4;kV&8jvW$%5a*Xey>?S1d*?&+THX@Ox(6a^j<5XyyzL{yZANDR_G7bMKI zAR>aG2=b7Ks4OBp7QRHFW=xekMlw^j*K1Plm>>T_l*eBvg1Ax@Esga2A!}M8TzT}a2k^%8D zWvv1Q>YDF~mWh5rrV7X;D7hED%RUcw?NEM=*djO|rKyx)@WiKr@rY6mZMvtApSrWCR(o6SrJr6sT05$ z1UWUvBDiH>orbwlp1=+7B0~~>5BxWr< z;*bCnScX!wIYAH}1j`R)=LptDwBiq=^Wg3%Ul=HeZ6Kb-0FVw09+QF<3=9zPdSC_$ z&Qn?l@H`FhjLNjR@S~I=6O2Vk%B>E%ByDc>&xDsjhz#B%@XW))0Bn>Gf~z4~8#`B2 z4W}680DFXtFpNtOhENK-Zl3l9E)(n~FuMlaY$FTjNdLC6^Zh)n2OK>}V8Gbq2ki$Q zg#yscr1E1t?F&2&#$FIL#y`qv16U*MVlbc3UU$9hs;x& zHF#FoJmqO~<=63ickn6baWK4s$_6}D;AO|?z(lc5oSl+<7r|8FD#1Gg(jjmM%GZ8b zP>sP)D+{t4q~T^j@G3=D$=C6$7_bd+PQ&A6qVRl9@b6F_KJ@A+&)ibAbG-t&l9ElSV9z-fU|2E0&yCA2_vd?45Zu_V~v(evO60W-YcoY{2Bu^$FIB8(3FX|NG$zLcVR{D4?#@D~}; z7GM{fM~|RUXsp3*Qi?Cbpt6+i0@JlNkMIS=HNnO@(E`v?dbEQFZUplW!XL~yhWhw_ z3-7{}`6&w)WyOQ12X717rM4w2{xCuVFsoq-3g)RVnQVZ6$jJ_h5eT3zX^a63HcG(- zW*+d~ffu`WtXh;w7Y&NUQ#5r3tV)R8wth=g4VX-1UsB>}FuG%U!~~T~Z(6njAhd%`(Rl(R3xs8qDbUHR6AcsmQ)oaM?qDc^?FBSz zsAsy16Tba^%nmGsGK~8`l`icDJ7Ky86BOJsP_cq+g#^8q7<Xq(01o;Goab`QOCHkd&$`z3QkS_QIgRp@je#jhP0?BtuEcJ1Ail#tZH? z(65AzU^=A;rJ&i#Wh6Y49)cPSTLg%3wKmEy1y1ZBf-A|>!n^3!2K)fLF7+KY{d^KN zH!u>><|&;h7~n8dV|e6Xzi8B8qia@p8P^IxH3xz|bPtWa5J!QCvFk-qiq-+l9p#aS zF9k0u@Llb>4$UA}0+#7HM^H_f zi;@_-bPfk!xE>*$K07B7n;MG&A$9-}D_t^Bn)zU@i)VkMu8H1@;7=|o>nWvPf?-Ow z37XOWbTxpn2;MsM2ZD6eueM!`6lti0o&$3oMJ>_q7|Za5uu>>8ne!XOZ-Spk_=z9Hq5y`5nE-(q zv*A&Zu3K19!hbi6XedmKFc(-bjbaz&Zup}hr96%_qZ?~Y8iF9cg~O_E{v0+6PC(afTP3j#e`L@)@bSJod!9zd z6v z4IHCl4he0SMUl|fCOd{>^yJp&kE3D^;nZ@{NnSk>HZvu=Bf%&`{)RFuD3Zk&*Nn8u z$iiV{VDWk52jVot(g7`EY7pQCoE+|)O_W_8t-}(bT6T@pRu&^q;awmqnE>_mha9r6 zXx0g?l8IR-)5dDj7b&^wg&3QiL2eNLMbD)cM~7F6gao0hyg%96RHbQ#9MFVpP$Oi( zgl2qYXUy-)%L1jc9^jF@n!Y5|tP~N+3zvW{{LWjpG!scNVakdx5)!6r6-_BE%U69V zsji}M)#c=i8RUSp7n7sr?p-485xRk=ODS^{cU&}eBmGpwNJjuP~& z6cOg?1wi>+{=4yJPnk9wa+v(f=H#w~r>soDtGAbJRcY2C*5|+KNR(`sk%c#2Kff86 zgA$r(=3D+Ig^IJ9^B&wUk7kXy?JLyf;N_^xN)g$4#}9Uq8@OL=ZFXEC*2TMA7e!1H zNwaFbd)CB(cfcwpr|hhu_1k1*r)OMD$o@o)juAADd%1BYW;~i%)*ClxblGw!Y>klb zHISIqRt(}M4h?){X}r1jI$8 zn%}C@njrn(gPMqU2vk+8k4d|Yal_;U4l#2iawTe#URf-p?0nhu$<0maX^*T%X4Q`$ z>LP!bU)-_2PjaC^im|WnTRqS5IkOj1y8^jN@WA5mXw)6F0t=9dyXTbpOr{{8I))W$m9C`=c#XADMII;%I7rSa^V*?Hw|B){f~ih5k5*#rA_Nnu|k03O2)7$ zR23_uycr+0QbZ2D9^zA+w>7_X^CCb@Rns#-UbidkH z$q+t5XioSscbW}4l+z`PQjzq=g?6~~HoV_1BTVmO=QV$P+u|fRc+Nm-^}fD)dY z>^yUsj}BjzhHfEc(Gr)}(oCGG1!M_LdCtqb4NOCK&}nF;jFeiPJQ^jYp*zGOmRfFU zeZ}Thaf+FQ*`&8Q7`2>MaswH-6N=hor1TZDfT!5Z-6=Y<A}OtF%#=x3br zhD=a&-(8ENYuaUGfw>6ju7A28_a6Rj5wLXlw&U>SF0XEaWiv9Zy;e`=bOxo+Zdcz; zo%c!^IixuPs;|4L0YOK6x!0$X2Bk8iD9S9Rg3IO#3o0(W2P)b`LPjRfSM{TN&^$cs zXKc9>D{S7Vk*O-VhI0a#PBY^8df^-B#C91nfy*M%)Op{eEsZKs+;XAI8b-6y!s(nr zTRP9ER3JX!(+jz;p-ycwN_lYlE&ul5<|g?XZ5~Y56t!G1D|JY2NHdON$TU$ea1)WF zpy!%{(9@e?E_Gc*=ri=g#g5m zjb)5XAy%n|8kyM%cao~#Jv6-#da3_h95cS zelCy-*A&33jLO4&Wy!1GgFUy)z+Ly7^P7|ZPWv3Lkm5RvK|;nKo8!zi<)qw)(>`^Y z{L3K(Gs(8%WthfI&G!#M2@R}ruw~)96i$_rqGmM2T~h;gjNn?23si-sB9=O zW%G%{m>kwvL-x31IxrQN#T}kiFbLj@TbZZ?zR;s=IslEw9}*Miw7GW>`mmK|3q9@QFDnyMj-8 z_Gxqeg3K0)PE7?J~kB!5UCJ@Y$`+S_?7z z_+<;9nC&}L%#%(^mE~%}<4L=01$#a~p8p9xy}j_@H9xX7FMD{=1Gb2CF=6LqT&7gZ z27_u`6m31SxNA*&G12s2Vr!ayiu`#xGz-MQi7k1t6;(+3TosO7@fcodF9z8n*ktZ~>Ze{ z7X72Spn_Af8Egehqvn8HDb zjWr_nt?B-~@cOgAL?ZTy9|6+BJ~OdAwfJH5FkgLY@s3fIwq~)gjbK6*RF=&aU`p`S z%05je^fs9YEHU}(#o%VpT+{Ol>}`SR*aO0L?32-bOyTvP{~Fag@gp?h`2T<3_|)Gl zg1>-nfrBsrd!--_z-BkL>q8lBhFD%&+(NRySsbKU*C%)ce1-O7NzKpEtZR=!O7}~! zGlDjZ;xvkG<;3!WqD!7z9NhFFk2Dv)c>e*(X>x^-cpW{KcnxA_Ire67oP*6B?5N_* zB~8!&sP%6?S%Ix?Vy)tAD7U485>8uo2u2*pLQacUH#lIybU7RMn6( zUs&9;;e@j00pGP?dieXLi-T(&tA;m89D`@!GUIatS9EuE?xk_GQbKG;5l6S1myG0& z!fe}%$$_ukaBlN=M`7t$a_plp--6rc+|kLX%$w0U%ps#w6#%U+HQi_bjM=qKMhQH>mRp(Y4l!`-#k7uk!Qv6Dc3_ zzJ7d}5R=4g@|>RodI<1*8s-qN$@y+N^mkOMT}BSQXT}QrRuHkS`v+|!bU4M#7A(i9 zO&HU%tXUrS$Gx)&@LKSiKK&LtyiG=lEkv%{SKp%d`zTJfpd}WvM5Z{|OwO9IlxOTZ zu|B{3Z(5%=89DIOi|01a{vX&3Ld|{0p|PbZQ&GXHww1-i`Q7K1 zFGJIrpKXLQF~6Rhn=VZGlr`M{eTOau-bJ9XQbZ2U+#)QMlkW=Vwy$g1+;G#)SWr!s zOmdmUY!CBJb_2QQJ!n}eB8Q&5TD<-I+IzIu4DnFO#3alfX9U-eCspFBm%fj+NSll> zrmOfZF>vC(Psbi^o$l*E9faT_T9E~u6Ygrs?UQQCxGl_g#U*cJ(YI10To%UO0TxGZ zLys67U%U#80KS0*EW!km-Q)LLX&AF_6#XUqQhai{5SNALCQ3lN@|R_zzj&c<2}tiN zWrXRke1OpQ{Qf1>8`WL|Wx`0UW)=Aw6LOd}W;RiEU@^wmd!QG}+GN6F?1}eK@oeuB zf9r7H$g&lg6^VeI)kd=Js&=-nWI!rPolm$EirQqjadYo(a=~XF8E>{am#{ZzTi7>@ zh7J>J^vzES~t8>g#9?&R>GFRrsnICC4OgN-_UWJ@YW}4 zjJfP_=7MgYOe?5SbfY?!l_DZ}ehE2h;h1M=P;`(WBE|-kgswtT+ z2GUhppNof~s7*!==x}9P`qT3_H-9*c3i0E9H8ct1UgZnT8aZ38mXZR4)1T*u$U1U( z0GirlAUOp$Chk6uH8-qY!k!D42NpSNtk@zIyPjoO5Tw#tTr;?|ZcV$49AaKSr}@et zy6CuVoyObNy;$H=0_Qf{+Oqt$mLfQ!*+$e{)MuT>Fz#pbzjM|G+H5Ojh&14Ov5MW& z{Ne`K6?S;{ZC)M@R;48sDAh{=lg@5+04bl>^TKBI;z|((%0G=<_Hb=e^ZYGTjeTL? zrsZC&)f>~Asg%|@n@@P7v8?#n6d4zrpVRqqgzAoiV~eB7d)Fva6@1Fg^#rco7 zWAyP>x^}sxz?MA~W|_%!!Oba(x(4W==@%Z}N-eETMkLSPbwP9E7+OhOh$SfHd=OOO z_xHSn+tp`D5;Rgm#6z7W#jgJLt+m4cq;>8NYFj2zl?`KjcxI}dJbZvH6s zUg(aKmb-&hMj9a|;*18Qe4~5tX)8s57-=AaN&}jwyoVaTd12o+sEPA2nA2c(DUp2YXQZ6j zDHW%aKc2d@c6g--)6$ptE7Y5sy3>|0u~Re~p?M|}X(lU6#wHtcIb|eXR|#F2KA9T* zN*OtH=XEf8`Ey&E51&li8AeaxY=nTYp31QqW>N)^T(>tFj% z)iahbyUI;LFk_Z<<~f&x3wpu!z}wPAdr^TlnZWk&;Ntt^%^&YwGD$|qR`t#Fd>IT6 z|BcvtY;f;Db99ZROG36VOT(ktx+3LA%9DLo!OS%jQY;MYOB;!uSy}_YvlTM3&^IAc zA>7R@S?F%bJ__U_44#0`HI4|&63S_BhAIMJz{+BB^!xvH-YxsT)79)#FY#Bg_no{vC}x=1 ziCo1y7nWO;s#roU81o(uma|es7H;}AY9e`PTk~2Dowb!BzzAJ#*Qrz%t}ai+iZV?` zBMyjPD4=7dh=gCh9k=F7011&QX@^G__ML{W5pQ%yP5QE|VXRcjSyQ%=XG#35CEVz4 zE57Lf$SGbrYY7pvTyD`6WePKAsq5s$Oo=15bMQucF**3?kL1;r^f+ql%f*@4tU2eOAkdZb6wR74zV+gMkcD&4j5#8M*JGbq%NoIbHMy2*rd zaE}*R#Yp{SX(l6|;lhyXLra@UW@2f0{fV9cNXdpxV$+$I)@-JWab&R})5whfB9+dA z0G&-UD69~rVQ4QvAaB2uG}O^sw1q|qUFC51dZhHBis{zO8!s*mgu zh!o#*EDfwRts34ks0W$g7keJ=`fKM_iHS~LAH(DYpTR7TvG}Y*<>b_}6=lYP%*_(n zQH9H>IpH$eM8NmboI+30$C}SLm%t`i^Wu_IN*l0D=;k;%CI|jii+gEwXoZMewYPx? zx%K$A=G|_*II3X^nORN~D@zNpV$n5~C4*kLm$qVZ^!ZQl+XLI0`@D2equvyXNbq&p zsfaenO(s235TTZ3-URtU06N-=$-&DlyKm9n4!;njVH8wQ6e2-|tx?kl*m_!CvIYP| zq*IdUMNrXJOiJ=sDJ>s$l8C}6{E!dbyAw4_g$=vr#6lGspF6;1?BDbD^S8|4&_xiDab&uw;PQnR*zj zus>f;;}1FNE^I8gr_ZU*ShrQXSy0+DCzhM9X(HYB94$rZZ`? z;i@Gm47>XpOQXZt6(Vv}6BHm1M?WsEDB0z4pTRxzQc%s-WicemI|YFv<8*T2V*R4L|=Fe*cA+?i+9tUYG5OxnP-LEilonz*f)lny?L-(9AV%wCOU2=)#4fxTV~ z6RRW{viq59$X}ZSBgFQfzyAt(@ua0LlDcMT8}(J^;Io8IpUq`bR@S6Y zD=J|fqjo7s?YgC1BW=ax;4h;X0dy1LmFuXFfR3}5>m;3P_^p*xF;G_pqzN$pnXgBk zR+bXxiYWGlUII4G1J|Q*>1po1vrrA;vy_;!8OFh>IDQJF=Nh=2PbzyK#I}CwZO+G!pq>vu+R<~Ge?CAz7B!u~#|lnW#pZCwU!PEwqh))plBPNU*tDXQ96EsH znFmYvj5j}bGxalbj)-2$P6l%cby;gPmczm?_Y;0Wyh28pq=H(|NS8oqnjlMV$!H+p zoDIwD&Wdps_&I*5LQwF#&(jEerHp_XcQ?7rbZD%3!50ud(AZZ-t^Z89DU)ibLu@-b!Z}_#Fz+B>0_*&!erd{)Ww+RNGTl2bkia zZHGe2aPkkFKIqz>BL~kJfq}~J94DJB&rFaT`hhUG#-|!4XD$)ZR8_aaR51c6l9Mn3 zYwBtaw?L42X;Ya}6^%lu`o*`=s;`uh(%Wb6CTp(!_*nCS+jwh(ChfAONlnG$W>pQf z&SIGYt3_7ObjeN7)F#8yIwtOOJb2S_i@R(UaQ3{I-wyZu4z5ZmxeONfBY;igcbv<= zW3m{hHEhZ5PAV-bQv>Y5-@Xftz5PxYT)T{bJ@|Zb<(*6KlNzhmO3EC@nEp4NN*s(l_ zXG#TjhAGx9{zNsIP}Hb$1RX0&u`(;3!f!N?Q~vFkF5}&(DaME$-z|*hQoy1LbCYt$ z5SQuMhLj;!-3?`J#pIxMH7xzQ7skmucQ5^2sMv;kpbXQJ4a$VQq;O^?Qf4`YG?sMf zDq${8rtX1jXfGy5!`-KlHxInNg)H8)^bbMXAHKabzHJ}euN5b}qPkiwU#^3Vs%mLu z6FyqA4aEF4Omg8B5^_XRK836yu`SJSe2sbm7(VhCMZ=FbBC-rSQRWO5r{3-MlS}Sc z+Oy`LN}YE;a(?saJLp`Ct~BFyF*37-EgWmKSuBc*)R|ZCUStFL@X*}2Vu(h-@CM3GV0alJhM#AR#nWDX5kiqh)UOX+Czw(+GOPD%ov=};n$EyaA?UU z8FgeTDg*0Mxj>*$lV{>UmpqIHZ7&wi<#bOv zB4H*<7j2uj$ybm+w>^Yizam;E^YmDA@4wUK@?=zHo?=~<45yiiYG#}&)_z&?)doi|7-#(}LmmgApUY<%Dy$s{FHS`U| zq+=?~55<#I3YGK&U{|`f#}I$r2(R>?m95Pq40!&-!SONW4#Wo7cM6+E%%sj`%6Qa(SqTe@E`1z|+GJ!w2j9YHW zwC=n#qcqh(q#UD~0AYOu!>3J#-P?z?&A%MM+_&|@Wd#BGbUDQoV$70{?c^ZcFQHhTRK<6RChucY`BZMES7kru^V~}R8Wq&1A;X7g- zx$Y>ID=S6h&_xC8o!xo;So5z(#eSfvi9$b^ELLy}na%oSDbLBRj^}4oRfKthrX~vWgfFBw+nKU7QqgB8s%{Rr=Cm6QzY0ZdGNeXhgYt>zo!#UD zKnXP0zlN`;PW5^fn!QV)HNmg#KAv7TbqoOUPfrcr+ydy1oPPLUf35$ zwW|ECvahHty4aX9nU7TbPAd!acUrAay-usOQbvxxcN-MF1#Ht-U&r?$*>NAuQ4|`= z=uuYVY$o2oJv607V-~FB#Xm2t9aZ*LxX1N+P$p8C4)cuHb!#spS!E)mQEkS$^g;M8YB3ul1uWB)c#iC(o;OsR;fOlpX#%>eVhIhkF0@)LVXb80(9Fz`(}QorUG$<1#pt zVJ2pXXEnaWgqQ5t&{|KP|8I<*l@gr!MPL+XJh`oT!T->1fEJp1C>VuRn>H&svkcUz zW$ZN7amYrS>6*7topu>HaJ%j_a@ET~=Y9Pxu|spvBn%&w9^fL(Y&0LVOn9ctS{y@C zO`mxWn%ZR~eDhk=>AlCdHeY)WCN`E`u8;*^Gs#*l&S|?dI%Sus1U1Y%XzVr_*?H$z z#C70-cj#&W29{Z_&jcHraarw zK65YtKX!M|GuSrbmcwdE+dTl`BMc1 z>K_fGO8n_2%}NwjTB+$k60qK!t8De@s!cGG!kT&vMcOSMRFQW6K zUP7jhw7Ry^Bs1ZMIC}xP&WU&`0h55aC7Sk>*4WcVH17`Gsu3L zV$uBB53|q@hqn z<0*oJLHOX$j-noIB2sz>Ga1g?HaFiGrN)I3dFAr=*erE(f{jn$BAG5`QAI^Rdfhl| zqFqLu+!No5yIIplutdg|GlD=?wuFgS(x|fI1lG zWTO9#tZS`Z(=H=NuOXP2zw*tE%_HlU&1u!UI0EUqYfv^|?TfE^x994PX9&#ccPH(; zaA7|(#zYRRQq~sN%3M-)I2~bg+Ng@G-Pyt_cx5qJc>GRm>@Muu()`rU7U;L;Oe$qf z=8;;nfoeUMNvg?FBU-8ZWPE6wj3+Y@mUfAgTR2LdvDe}iCMqpt+{Tz9=#P@U=e0JG z=TB*kjI_y!Ca%Ir$vnNasovEBxl|;QXB#qRy3WcYaW1VUP8ELkzTK_$BW)sbbns&M zp&!P^o16Ev%=E-ye-CU|I5FU+6xC!&6E{TCI(4j&B3GT-+C99ol)Sa{x~>sjAjmoOsg9!%+a{00WA}KMGr9GUf&QjpLDxCw`=PXlV@? z49CxEjc(%MJ^Z*04Kx%`Tj2sfP>%FI621h+=s&BqZsUocpaI3ogXWoI2hAb95y%)p z06G9C1xPPAw+2WHz6xVw^GDP&<~Wty2_GddK9@UovWr7;GIU<6e{&Go+qgguZ~_~c zzkC!5i=qPXN_VY4k(B)Ix!kGZIqLbXp<(Snw(pjnhr0gKIVRB$lZBtZwxJ20j?MgJ zyr1SC3X`!RHO0nRzg+K-DHR?!7o+XDdrf;W8C4HrJRil%FkqrS+_tcPWO+g{giO&{ zCZ~-%W3CyyCrov0AU~gIjSjCAk)4~)f|~I^Y;B$~N!3g(>>oy5gxED@GKbTgwQ38n zk($G$Bw;H;V6zUcsZB(VT$P6&${=;Oj>amEh5bX&Bh0hF_FIYCEYzp2X^oDw$;hDv zBy;mC`DZjO8Ntj!tebCWk_|17P0{KelFY zdf*FvOFeIOZ|yWl%EP+m&U^oMp=8{?u%G4^3hitwxT?S`s8~wIX|*mxZg8Tz{wIL& zYo&xNRCDMp%2E{y3Q^pC%9$widfDKS23VQYJ2{~)cr`BC>+8tv7va0wL}b)J4=?C) zUve>>d0h+pkEa*RH(=SC#>)kKYG1Qh7bKC6w!6{r~K3m@mVyz zQ24C4&Z^Q#WmAQq0atA2qEyeW;gzN2sPC8jO=#T8cD1mZl~;%KH5r%BQ>H+vK^u4K1c3rU>(nrJVtCpIsP?w>@X z|AYI$-||vRf&J6;LE!^tCyi-6qpe3lXpo8^pPFycpNA08wuz8d;=^_N2xCm`YJ#W=ETU*?nr|pH zwG433Qkha(^G)X+nP@~%@nQQSdBJM! z5PJUXIPLj1$?^5}zs9N8f)k|#dP3yrHDyvNCLQ6DGLwAPno^VZ60Kb$ZN<3w?1bSh z;tGBtNmmB&pfuZ17)yqN)vDwe*KE+4ny_dTNpeSqdh@no@|JN6mR0n?bz>IaL)|CM zG!)FoUTjQFvT|p2PRAwj==^Pw5)ek=?7PsL~#@+zYVztq4^1ZHgV z!mP>YCs&lvV*gZn==J_n$Ysx5v99@Asb%EnKT3@!d~7mUQnT_or*gWHVKXxsa&i^l z+E$9Ifg5)q|j9gjmc2p!pfj3FfEf;%7UJ2FNdBs5jpTqMLabA>*aL20eX&SPKH4Gk_Ihx z!WszH0||4QSg&mDTGL)koUaU=hK;aI;7g=BumIbCGAbjwu7=+gVjJ?fyOQ9FevL2? z?r)$n*rWWQh`e=Qi@#Dn-rVwWIuPKQ|EBj=L&t6Tp^xH0_YPq%i^ru*1(7bM*>fUB$gaQd}~U5X^~|M)cR z{FTK*{y0tbB+k#Y#JkMJYoH9{m!^ja<5#0HPb8RzBH*iOCmn8|f_&>5C~GUm-Q7Ed z6)4$x?J;E+TnA+sg2xlZaw?{#VH@74*`h0FQw4@xc^#Cs6~inKAz1j;U1Q|!>ssQ) z=rz~3cF+*-jAaw|rWHxGtO(X}LoSjjl!*O$=xQq!a_#5}oji2?v5Fo2Yzy~xQ8Su4 zCbWD(V^k^_RWXs3nE^bkix9^Qrs^y9wE!B>CL>1^zg9PYy$^$qHvH+!4WFNr=ZvyK zB5jk_@&_bFkxR*Aa=J=KU}vN~zQAyP7#B*k0t^2$=|>VFb* z7d_W~`BwVtuuhs|Hp6Quq>6H;oQZj@C7(7jA-J)NZfmU{UMT^u;$ujCaDQdIdE~a% z`I7m8KI5vK)GFv=y|W_g7j4*4GctvuIc#nP;SUR{P`j2(7Fz5=PJql{pG=Tx*i&wf2Qx$?l&ao4Ss*{*3P=5 z(fjz|l>=AxJlOks=bPPUb$osBvfdkePVcRBr6d=1ER9$PwIjcm{O3Sl$KH{z51s=0 zpFek*yT^ym>w2+wYtO{$M~8m0`tDv;|6{AK@4umQ`|9Fq*GL9cxxZi0zq#-4-B0wz zBv1D}Kitv%xxNR68y#!0j0#qd1LQg> zrQmabo1Gixfi(gDo3aB?6Ck^QBy-~CH<0jv{kM@v&IA})8iEbwvV zL)Y_~Da>5BrapgQ(LyIxAjYiiBQXp#kQ5|I519cgx^56ppIN#cngdaBGGYm-5rcVI~8A#o> zd0-H(m55^8zBU6j*#($LhynSG?~;%57?t>@3@ES!I7JE;2pmXC{I!LLs6?d!3vR$= z58!rFWbOt<=(b5W@({@s02#2QJixWBfgh!yrFrk%=)P^8^XOx!1{f^G?F4cou-<6m zJesgSFMe?bjR`Pbpx6NskwWPLyqnw1qdlV60UHPuV9>N-;|I`+HXtJgWuqSx-bG3} zB}T(%;YX2<5Aa6#o6YZvQYJL-@#P$TK;|K1pF+=3=t+tAatI)S^o1xu<}_e{!!3MZ zyLSIxY%Sc$M^zdWViHO1bW00xm794;M(jhu)KF>c^-yeE8;_4`lW!_6R|_bDxPBm; z4*{r&UYZzqD_E-=yByY zUnr`U0T&RUi&=n$qfLO23S7s==*N#qvGoK5L0qzD0Ym6<&ExWeh8_KkAjS}aI-ozp zI5YrW#5E3>-=<#*KRgM{QfioJV!&_WrvW_dWn?RMyOUM zI$wh&1Lqg$=_WdAf#Pbir#J9mp-^1|C~g*jsX%@Owq=H5G;8XcpA%GPVRlgI0mv}$ z908z;J1XAB8Xj>RwggiR0pZku&!KRY0BJxscfBFB2Zk*=+-{o3=4=K)sMr$-0e*bs zQL(uIP!AkveG;3tIUu&eg8^uJgokFPs13meg;SjbY%Z|H^-&mEEI0Cbp<1yV;1+=K z0C-xMA^jXcc&55|yiZy!bPd3H=>;5AY2NQdAA4&Zf^h+w1I7VFZzuW)_L~99F)n-z z3pNi3R)D8sht&%kp{T`PsCPC-Ey52|TgN3D3OSA2Cb;baFlMK0!!6<`p(CQaAp^J- zMwtY*L$E$SCfd9i4g^TFegl9=@H23%HlXg0b&9Gv;96rC=JEg;#gNRxl#;S7JeVx3 zhXrH=fVnX@0Phz*j&lGdb#ROD!*J{L9u3;VMr{Mu6w=2sgTnkW4>iF1#mEM@J6t6O zR)$g@tUe_CFo5m>ISI5@Af3jj_rv~eDzlnLZKV!0L}9am6pPzQ_@)%P40!cC&?u-5 z@T?aoWk7odA~-k=fC#GLR-Z3u&SDt5G8?IX!pi`Lh2O_bqrqPf{XsHJH$es@WXJH) z9suIQYJuZU0mgBYDuY?gWRPypiE5x6$gVsWgBKGSZJnrWI}hI~INnJ)ykZ@b7`%xM zIKSrfcE9j05TX6}Wl$qfd{sLpLAb%W?K~bfeHUItY6l=WEE)EINg62FnQb=;FT+RZ zL71Y4kH~0IJv%P+MC;q^yp+z54T^$F=S7PB>H=Q)B)3iIk_;w!FdCpM;5R{fKr!T@ zYg{x@kS$Pp31H5{BpQeiqAb2|Zd`OU$vL1IBO<_KFg{GIvJfsijsIAvRt`=HIQwV= zkRLPv;SMa^pnO~$@7S;cNG))5v9k|PfHMdnD(A*4!n;wxdjmBX!xlO~KH-8_HqPhA zGlDpYFoHHBr8uDK0hjAZW!L{jlmfFvgYkiO0ZM$xkFXY~$Q{9BQv47si=G9*%~37~ zU>|FEd?_(Rb&8+6>&+9Hw78pc{f1A2E!5=Uj&{P2~Yp zkFkO8qBVw32NQtFoaz!H0`#H-p$mcyur36tXH8*#l=chJ1cl}X95ql}07i^6N!E;C z3Cg-A_)6!^a9{R$Al6bm7C=nEV z03_$3_JM0n0}qUgOe)=10uW%ro>INAo{t72-0i~_Yx@!07yc>u8^Tn zvK{KGiDX=_32279iP9#RWIVF5ALOvS^iRiSBKowBFm^TnV z_P#`a7WSV+(}6byY%I7t2Mz$(HONsqFA{169Ar-vevQYy21Q0z2A9Khd{&eKAKwQQ zef%EMz-)PV8+|U-#qlmPp(FKQ2kqUWT@;)V@SjYBX5S#*3O&dG26 zpLaTa6UPtV@6QuurHoPizF4&P699%-IGhPq>3LtqF#Na{dL=vtFO zzIE*gXmo}6A3*TDf5SWt>&Dnd|G82fy<+`oNP+ndlS+d+5x5-S2zT6YOo|v;q>2HG zy$8moPh})`ic&~0v~c1G&ks0qjBBuBY~_)KF>4^gvTcB`fn%kB@bKcnJTU5qN0w;a zFW3wt0<<`MH_CxlO@s2hfg3u7?AUw3N47!%j@~Fw1_deyMMDM`H!+|Fe{;+2E$@e| z(C2PH!3w>3aEHS!As2l0+6ZxerF9XG_t2p*VjdV-4<~E_b4^Ag7gp=P`3gPDJmDkc zt?zt^Avb(-_ZYF>@uBCqU%R7q$A@hN>@EN{zQ=k(cjhDz5YZ(GV;`ZdTd&j zoIHK_fCU1`;6TPkOq+v?^-Aep!j_LPvg1d(Cw{Vdpzl*az8X8L1>~!H z=y@(!8W7XbX%Tq+=xh+w(Ak7a08Ir7$0z3c^}c7hYhA*eW$g4!wDZ~9{95!pLE@Q zIEtqW0L(I&ZNN5=F=B`$Yfx1q_hVak{fVTvJoQbXmC0xBZ> zgA+)}!Dk+!)w%+g+VxRH`dJ$P!%ri4#%cy`o~3(s8vuUUS_25W6FoxS>Tz4i_zymG zFjjwn!6++ajCO8X6Pz?Mv#y{_E$juJ|3hTXw8_ZAcdirozsUtxU;8&YAfsgb0h(Sx zSvs&QK^M>1e4UKFKs%z89QkC=rc6q{QK?#5BCi38ptvdj%a(m$am2!d6*>lT- zt)8{!Rl_?6Ed#Z_gFTORy@O43b8~0$436fQ@29sWg{^2CN1&?@YPEA0vO3}^9a1G5}A5z-=~ z3tGuH9)*u>m*Ij_2A6Lsnp)q_=#dtV6pml7^vCKY7i-r@oz;NXV^bnijcWQoKY^xp z8F})ojkw493~n1-@-RI;R~n1S0vjtO97cc4I*Tnu{^h40!KP}POxRdNI>DAE_fuL6 zw9>iDtyGfAr@^OHHqR9@zGzH}ghg75D;|TQHW~7^PQnf)1*m%AF{%h#-}G9gaO`7N zXk|vOl-E^?wOXuL4-@Soc4ym*$>=LTJiGaw#g+?qk!L51W!5%5l}>}xD_~`i7l<9% zwqmk#&zbmHF%N!I^V$|Yoe3@M$6d-#_4B)>|ZEb${@s!oRwq{5S1VSZw0gdG;LU+&2Ob)@Yv9I##z1tyGQbUt z4RrRu*8g<>1O0dQf40Bge_8)TzqEf#zohS#z9;*>-}jZiYx-vTF6`6wogq2gx1sm{ z^uFBt^WOV=zubFu?{u%fSJQi1@7kWf_q^2ev!25}U+US{lkM^JoYQkk&tUi8y8olQ z)%~q*(mmgu>~;h}+P9;-uj|dO-*i3L^$p3st{b}QU6*xDb}?OBx;i>v?R={92c36x zUe{UaytvcQd1mJZ5dXd0@pwnGB&lwD=wdK+T7T3uru6E?LqP|oGlDR-RbZmg<|x&-Uj#$pMn z-&=|878qo!DwQc{Wow0itc0r^=}v)~wW?BvXJtu4F6#>>Ynps`e%&jA8s&7=T1&v6tIgGQn7&J?GyY4|qMi>2xw*Q@3f_@D8C%s|vPmVauvOb;1!1Y8~mV-w~ge8gMCH zk>)Csa#>Ol9X>47M_%%9K6fx4nCGSpUXS9V0*7%`K5bNUg+RREPjc0WHf`~W&nFUw zS+6(jl2s>6nzVU~pk5xDinCs`xftJ!WDwrOU zx#_UM<~5lrlDSRuouCb^%B>*>hkRgeZel7>lgDJIiO=f|1#A=4$}VfsWQ}+KLsTyd z&dBOnS7RdWu`)AUFDsTa@)(;=`0SQw#LR?qXO{#uvRVcWnsOMO>}<&wK2xA@uga=P z|2#7loz-L;x$1;fF7tFlU*l@-zoXCMRqjsmkupjxiVGLeQ%R}D{UQw~+dAHU#T z;di-wUc=xbhsB=-{*N}Q6lhGVoVTFnjJPUNF9ftR&eWb~#pf+iJ(tN8>fX6|pD8pa z-yn7uXHmMCxY^>FQMsno!Hj27d_fg3a*4S{8EKI-*@kRST_|U>iZU}DcU98nqLoWz zmERRUm<<|0UtHAsZ9dDiE2B$`kNakf%!Hz9@Vg^Ay)&hIS8RV)Q!2;;-de$z(?;rZ z>N5mh*eZjFhLtfv^;CMMtT89YJ9!GyBYt(5o3bcFi8Wny}y>*<`-%yoyj@oLk?W^mrfg)r1}E!SEc!Yj;&M*bIfF< zDxb-o^1p%}X)di}GHlUM$v4=kK!k~l9~*4xaFOKC#g!E-WgfEkivg{<ACet==!YkkE5sNvQm+|_ijWuH>YLA^+612}YdHVQ{5owpY=L&$>@YNGg&C>CUPC- zjh&1{SDDp@6|y9*5zI=6=Sxv$TFq25>WtErVAf^C@{DvwW=qQ$s|M^Y zG4{N5qMFonIBc#>8oVj9JI`!>P<%X*iEvZFs8chqtK};u<@mxe0fvy*o~oJ3=};t| zT`vrYO4T1v$qc3m(-iLhS)~fDDC)O{(vdLEClU%alntNt4N;9HlH=6VjMOy2#Tpi- zQ=CJq7I~22N@h#ETGnfo>Zuz9*6d1UZfaKMmb>G+ysOH24iRi@eWTxSgv5L8XvzqbQ%wE;0KNCJ`rdpg~)pBMI6zM^4 zIc80Y<(X+ar=E1oq>f#d2>=%FNErc@jQ{r=(T(T`ZPQx%FIpLYqxzee8Tu znmB7fsL;$r*x(Oq9da&gHWyTSk7<}S)Fru<7Jg9p^fYoCcjF#TAE0hr$TzhI-QI$Q&sw_^SVm8Af1kf(uoPz zj4fVBjwXcKl+#nmnc0FO8_0)!{@Acr&|dZ$HMrv~56go=f7p;Ue^Y!MM6~|0(KO|a z)Dy~Z*V*FZ_IgT|2zkRcw9;%Nddd;8+?FaKOSwL8#5ir_b@B7NMLmjoE-8(bSWfLJ zX0y&U;`8!+kx9uKb$M{2CbP+{XNl!f`!uWL90g|5VUTJS9$`wXlw8>f#ve4OrdYYP zz$y2AZDiPG$XxSZ9CWMPp2z zFa`aw?HBOn^Ofle-QBL`vUA>~av~wy@C%_Krl;jrS+MA#GaWWnia{oJazOA?h2Uh7 zQP#$b{JK!heB7g!C7q7^ggMG8!-|wp%Y1m!Se2(Vo})8_=xW)VrDRs66v`{a$8+we zOrbZ)xcy8%Dc1;tV96>UnKy&1*t=W)|SWL7mpr&}71q@JBu`sL51k zDr{udtxy&w)v1h1`Wdm@eO4grpG#r+>sP%Ng*<~!QTs|`ul}alBYf zYar8OR?!G+Gi&z>>eIeh+8DQG&8CXXpkunfCl!K|mC%+LUm=tAO-wn%+4OowAfo|7#a=!;oZ`6kV%irGD)_`wimW8; zF8PhX80F$7P0E!mN!_@4{~U6?2cE&UNt=l5{3;T=-W+`k@Yv6Y`!5sAdaUL`r7W{J z%$6Bz-WHYurT16Ja&0dr;ZOeY{N~NS61QDU%iAu}sNBiOk{K1FZiJ^Dz;na<8_2cK zW7oA!CS;5QhI*{|>hp9D1^YL~Wkm`ZR^;4dK{b<$TNw*TP+Cw91`gdixdXhXQ7l{ z!_g!EO=xau&f$n9XFQR)kUbr30Q{SN<)u&IHqS~C(OmsYq>gTQ5@_sC(fmxPp@2$a zF1p_#Gc#JokuT*-PPY+PD(P<5#V=sb&Cn(T4)1UFkPDvumyOLIy?_+$lYkw!pCT#= zsquP$(65vEL$z4NUY@N4vVy8>pMrt35y_>i`WO1s16TJu z`_=tB`}_Oe>U*~Tw!R~M-|V|_`mBdy>Uq8ASHp*Ue$?~zp3nBwdM@jk>|uJg^hmm2>HcN+_q)F$xwQM5?sE5q z-MWEh_eZeHX;GETzW|ZDw(dV^?ovVh=BTt5U$L52ja6Zgh96EK_sfq-x*-62#1RG4cV)D+q zoZ)Dyu8{W#krl22x{v~!2)V2BNzRiAtA(Itg?feCDeH3cjwLv!pRG^mmGXuuJ{_=R zKek&emP(CtHl=DlBaatF?b}Aop z>$B^g6U&*xjLhxux)r`SF0d9XVO4l-Q4uvp6BR|Tg&-KYV~jBpV~H{T+z^8x zK@qWs-|xKld3Rtg%P;@T?&qB6p7$x|Y3DiTduRe<(RVv$mT|%HfbRzJBE>MP-$nFx zzZi36Fj^2Y*%qt^=;o7ZSM6p(s(bNFF3Q5I^2K|Q_;wLf2uM&=$XZS5Oe3@ZeuJ*M z{A4Za6Iz{6D(B#q_8a2kzKFTeZ&S6nPmHoxSB&D0)oLHF2@$bquTm^a+wU{Va|M#_ zfD@i-vhXT%-M<*+8L~{)e7TsZ(#~Y99EDplGlx-qTE2#->u}LU z+2-(+@q@oKiW3w`hPh6pYYmnoIg&G)+bl+%1Y`&(TCJ_TtFZgaNJ=x)%=7IE*rG~Z zzf2y7+N^?!DbEURVFn`>Hj~|Su9je%Y+J~5u;fkJ9T~19Ur;ybR)EbWJRFsY zI6bv)Zhj5X>v@r;I?fhdvPKhdjyh;H=s6KkUS!5+_pf%HLJGg)Yp4Nr#o-1=OTaGc zm-3yE^%|pmBHV%qGM~`QMs2NVY$ zEabQREh=B@Bt3*97x6i)O>eg>Ee-dq!ac{5s?}llW2j=aA9lI2!nJ>Hl+On$cqwE{ zXQE9tT42sSY0z_~5H2$gYnJk1e1$sjyg`rIz!(!H`jv2yOFD9sPJ`}o*D0)qsnJlg z9SY^yOtQmLOJB)#<17;;WWa#mh2uDpzup|wFn_8t<{XRhgbSMci32x;P4m4i`gvZipm8CCSpEA z4u@N0MhT}K5E&oJ?Ls%hqX1c)EXgUmn!6C0!BQorMo4V23chP}xRswU=tVic$IB!P!gq8K){-J-aJZc3>FWx;UW%em5NyDY0@aj)@%yxQ>)La618 z`>2dUNLT+45|np4Dg;-tVGX74uF1qsWbsbrEs!;mkEPle@67TU_EKaHNablWfXq`} zHIFzkcpx(cp|l7*mvGCwjp>tXdntj6CXjvSG&=O6L-2TrkFV;_$`G*7Y#xiYqeyD-Rc6*z^C?+oitMHt{Hl)zE5WOG5vXEJ-n=mESTBaw29zxBc z#k7MIB9R7{G8c%HJ#80oy6nJ&q#Ub;v*-FptxeNW*Q$hB%XA1V4r&v>`d(BX zo(g+-#F7E)7u{fU6#DlehCW}32=bLk!vsSsH?Y^B-XqvB-0 z7{K!uBALw8G95aLpD^fZu0!B?12(n-5^)L`Plm{t1c48Wsmhc6}UG zGy6n~GW{K$4*id189(XuCv6?2kd3s2nKOa{i6lVN#A?9`oO{xs^%6!e!fQVxTYVnHr~i#dhJMb_Pg!=3j? z7n7pS1|OP0!b`Fvj$1K05H6E}zL^MKvh)wy_VA13N~#wxRSC>$@zofsij|4Lr_oO; zsy9K#-4P3&r0V&m;(Ku!(qf(SJ2(8qTC$ViozbaqWX5A7y=S(n03Ibvask8RWZhBA zdw#wAGj02KpM>jJU&)txBE?WPf@d5ojg&Ffk7PMAAV!Mtwh^pACflow=0yayK$T)~ zB}6uT%;oPj`p6V)klqLxiIAyg+RR*GNAzB!+97h$PAuN+x|yuPyvLwdx((7_^)84u zoar(cJ~gjB9=LDcz2Bam)lo-L4!%!A4z)P|!&*lj1?xa)-8ztP5ON)t^BFNy>KDis zp&kCIZcBLvOdw-C9i0E@;M>nUcGJkKCkQf7pfIf9-4-ErWx1)QJQ&27k7R6l5-b%P zdD`n9e)iZP_~c{a#KFLN9jbDm)WjW8u0yivc+d@&j-P^0%otgFbl<05mcQ+upX$gH zV9t37kk}>L118E-=~n&8Osv-v0Zs_oa?7*OmNA|d`ssVXxyS)2)c^L`k)Z=5>1f2r zu_qEJ)N*ioWYY;b6ab4qk|aL?lE!%2qhI(xBe1+ZgReXRrYar7!V5MWBuEK$q%5DZ z2r<|eRU4|&`4q=e8&WQh71JP{`9<2NV^8fKT=x{XW9fDw&$?X*lHK_{=0?Y1E<4>B z4DdbmR{r^EsM{C|kfWZw4zNA-YC-$lAOhKhk~TY}iz=ynldO8`6@Z$3`mqa_$EbR4 zC&&`@+vEEOyMGR590R|zGF zx9FG=gL~d@!R$E3)9(9I@THtyy9T%YR`+EC53~eGL%LeAkerDMv=W6z#+&Lic;rU= zjX!`1Yn-P&_x0n~4KDwqZh(X;#n!7NFcGdwblTy3zMXaFoB&m)Pny4a?y+s##(4lr z^{(TC*`|=o1d*Dl#0mQ*?-?4x2-kBlH12Aa5 zgq4grT)hkh3Awrs9&1?LNJk%97=j^rBTIYy@%V+G-!i;uG{J9PpWwKoU+|M{Kh26% z$K^C53AZc_w=ZpE0n#{t1^m+Vn}dU|EDiM>DKH~nLQf709q`yGSR`xT)UjK*k(~2b z9Al`LV@+=?rU@U}IRbs(H>l1Hof8Lj6lG%tb64PvO(@|tvo%z51GwX8`sJpeiy|9& zI=CaKnDqRC!PlpT2--piQAUDje^4k=gpKrwj%?c7jiC>--S36joCm zLK)!|*t_7k5gKJIUfiasolEA$ zH!OT$g4;ZpeSG>UeepUUMk9XWP8I6=XCrLjPLi)V9pMfi<@{xDA+H4v505Qvq=JF_ zkE7uA1B1UiJWNh(R~UEPM3|M7$LF_&!EtJ&mFE*2$FeVTEVqo6(;n~w2oj|AJ23d* zks(H*5tQ=X+G6QxD_!Y!LWGW+DrrMe2lCbS$r zT-xqn3Sbh&`>94LlPG5rly;vT9P;0bgT9aPw8y{jt7`_o$A~=~d$`mFCDmD)wM8WU&u)|%;V=V2y=bu49KeuT8J>&gz zCpSD_AE*iplx5^)+zbkCN1Kn|d&V z^Z)M6uba>;=HX3e*O6ndP>;cVKe-a3lzw^Y9g_AJ*5M5hZvbI#eLXB!570Id5bs=o zXxT2(%p{rk0hY{OSWn|#(b)Xqsh2vCG?0 zcDEj^q)lk2oI^cM31YuTF~K2-5QFe_fGvQawIUj^y{_Rh#3`Mvh<5tpfQj?Jflopt z#E!iXpruFA>A}7o2-*Vh0|*QvT-tqifxdsjJ>0qH>?PnSx#iZ*^}K2)bUZ_d4mq2` z?9`5XVeXIdbcJC)|Ju*I9sn)6K0~#j8+M+avArgY4A%$P4KUxMZbHl=$AT`ZTX0||T8sng(pYwY#`OrCE3M8DAnXnSYh{+|e zuaHIGB(`4hkoANk>MCYB)_Qg%=mPQz zfZN*ez&&0Nw&A%EAmjeQbD`k~IQmWkju@-cng+Q`yQ zdvAqISux}M)m}dmlrUd7fLH2jJ)U)l{iyaj0gfmCk%ShGv9wc9T&gF{*gLpBrEjxz z$x~_IWV>5$1RVWDA5KVm=X@?b+_`O>2YdaSjt}+Aj5rc1I&n3G}I;!kn`3at6GOVm)JPo%#Ya}c9O4&H}p4_yqpe1`b?DYCrMXX1Q!NN$dc58z?91J(I z0H*z`BcR8FgS`dN&;2@#Hu6dUr!{BKV+Qkex$EtLS4tW*;A#arZzBh?YkwC`%TIjs zz~Cyl2`s*Du_b+CSJ zyy-SrFUDA4S=kC_JTD~2eE2rKLa^|hoPsVw3qrEaxJ4oF2?atBp3)tS*Rka>s&?u- z@40TU`?dNl9F~(ws0R9V-zm}}>1_v-xxR@HrL+kbRO828=$A2;cH&D9U3Bjs*UlMO zd&BF_U=7OpUKn4vV>5DJV<12h)0-k;nCZAEe#{+>D120)FjhfC(|kY7bthtI*zwX~6? zg+2oy%h*$20Q=dSbupk-%TOJ3ug;kvR-VXb7*E^E2g?b4*#eaOHx73%ZRBVVTzbRk zN_=o&ebaD+7}<_PSb*IANtrHMtD2D-J_Y{tgf{#sj0b^_cd^kzXDf{No)k46w?aT!j8XH3})I zpp~?QSy#nEgJl?1=#6iI6Y>~Kd*FMJ^lX$>;_0^xA>oz}E2mXF+vdyuX3E@1q3L=7 zaRr6*%!YHuSV`^F&d-mmWMEu*8|*UY>FTLNHlu|(3;_vvH2 zkq24KZX8)94r$N7Z}>+far^s`#NF!>DX%{Pk&Lbm5zSe7+DD?%7TymM$9V5J{qBpk zPak>5UhUEM4-FX4(;pa~caA+R{Tf%u*)8G&u?Anb*``xFYUSm8+ruLsl2R}JAe9gom z_lc7`0R0f1$^tCWkbMa${1wwJLcpmOdaE;zb)lU3YPiCv9YG`S25k`u)36g#-Ebd)6y!nb* zZrZjfKKVELb@cc-cSarr1n@Ur2KK7m7Tk=<@TAaiRNUYN(c`qoKLi`X8$PI8Avdrf zQ_lO~4X1kPl?D#RO&=QGxKGFAfV&wWPU%qhrd}YCf|qT$y?~gbyU)tiPGvj)dklN% zsRy}CuKd_=3!p+2 z0B8#!^&mlyAAs2ad4 zr+gv~AXNZL2ryPDfcZnRZu0qnP@baM9H7(axEBC$ z1Hg>{@1hIYt0#o#UxrfwFl(ga#|PLK0c-l+PY-8zJhf?Q-y#7?Ql!bhpFO$hsp-Ge74&gEP0Gph*VCl% zt#%MRIHHMEKj+SvcwU=+04#>%WbJ_?-fIV)2VgfiCw1Z^fP24wYGje!sK#eB{P&+Z zyM}AuK2<(ANPQO0uiJf=e78syz40{BRwFhr8h`CUut1HGb$c;n9)EFm|A6}({A`=g z331AeT(p2^#abHjWW!w8t9|kF!);3&S=!+@RUnt*K>wDdYELsH6=~X|B|8K%WVF|P z0VeuJGVCySxWQg#ogGYn5hgm=%T6AGrNXe@vT7x7k96r6;VGJ{1ugd_sI9b-3Ryd8 z=itdNfeBIn^}+RDXJTGjB;rZCq*7uy>C!?EK`+08`nbFAAAIj2{k$xlIH{wBBe+;_ zcWC9vOg~YJg>p$5ZZO=#@cVJHR(stq+=Icx!*@<>A0I(pyYZ2;4D8_4wg*2qp*g+^ z%MC!QfOQ%WIRTRq0Q+FB01}HMUerGMwc)-a^vf54vlktl`T-3fD0hAh)&PJP0YebL z*7WtHCw2gZG6TS&i_nD~-E(%Xb|U|akqTcsp}{gRclf-`*Pc8A#;?5q0}39xAuuWd zb{cFQaLg+J3S(dU@Njr+_gR_R=^sLlqixzd4``RJ4K1&N=5hNP7?{R%4pfo(`m3qp z-On5|4*+>2I-yntpXcKXu7|JSUh zFV5QHH-}sI<^gCWT7ZV9NPu3#0mY00)GiY3BDQZ1x9>h{3GGA>qC7tM7RX5Qxo^Iz zX>I8rhaW!cY}&1T{~w1t&N7<}!`f&6X&Bi7IlV3)<@EXlk zOIjUXxy5(v#RTt6*R}IsfSc`Ij}Lck-M~1LcKb|z$!8wd->GyEdUW`R1spL*ehX3X zZ42WK0Wio5aQYy=3w!=XmUiDZFKpJ2LZXp(epk17!#PXGp+^^*CY6Raj%Xo)QBGf{ z4|plMn3F#OF&kN0O#$%dQHGHJ`jKuHf<_&K*@#ZkcFfdcNmH_kHz5)@Vb<>ZJcxPC zci_e{#?tWn*NzV!{*HbQ3ZFQs1Jk4D?s7lC*2oN~uo`BaQAj#Es>%<40Oz1Fo}P5{ znDzn3$peFH{#Ca^z=29frbkWUvvjXQSbK#$)=m{#E=6(uh>Z6BAHwpukqjOOZ-sMlY;FHw`@iW|RuG|s z(jyUlQ>kyqZ6#M-ax!uUa*67FQvT?0R@?IZ;nKEO@J~FnR-1^C_+T_11{lnJPt(mQXt?btG$HFwEMeicDc*qFSczC%v@vVv1 zZ~5q!ySH?gcW$|5>YZDhTd*zrmOi^>)522=k1u?2;l72t7U~P>1OVhuZ{_*s1;`3AT^rxn^>DB4X)bmSsOb4d9sehY3JW*bLYUzok zKQ2GM{N?5Qm*1@U-@bM4Y8~?jBSf=GR{~*(@;8e~6n0uCnvMi+iS&pDDPrYnA(xxO@`D7R_-}26kGJ2wys)*KyotBAsD#ImUNP$v7TD zjH{5D9RlmYHfQK-LR> zzfqox$yB-mnIHOHfR-!xJ~VR9s#VQwD46LI4WXEFrt^-^qT=;(StR;+*;G~HOm{UW z*^z&Htz$AtWTW8?@p)f7(-rNvp&vADLCCELxD(5%7s6M4mFceC4Yr@_A$6 z0;hx|FLM2>mHl255hK#gXdxp66Nx9wsu|H*cBULz<_!kD=H;kzz?CqE`_+P#Jm*_TK2~%DGq$dYb{5%a zOSlBN*VnNSFB2&-XYvF+K0%?D5IzCSc8FHDxk_Ntp`}1Fw>pQSKI)h~2ic+X4ojSu zt89YX`^@OOwSJQK;GqV`mjhnb&alVv(RXWoYnqqx4Zs!dGy(*9-cv?##wL+%IbpTA zeZ7QJX0AZ=UIed_9gc5eo{+tQ&#H{v$`I1uT0U(&k5ot5blc;>RnsF0>rau-> zmK|Zdc+p{lo-YQ-92rpJlH#a))>WE8+(afQ*uz9WV5!+tkO8+)m_iYAwbm-`hwPE< z7Vk;eC3{`C;yXw@cm|lrS|>nZ;DB7g=_7_ZG<|A^s5W@KW^%SurtGq@nm65ihzQq2 zo7idBxg1UV3^{&JMyS}wbAw9HoM5m&Wwka)g8Yy=tXl3{LKR$J1#i6 zetz-Kkeq6|6(uwI92f62T^$d-eZYq-h~DGj(WC{ zo%x1A2M8OyjJZM_AGLWh*(<(a(4#6iVzp8%cqjg!psSyc(j?NEWx0k%*o!Mjl2rQ zoYYD_nI=MV7ozyYl2w&Ap(wK2YROsU%}OF3%~TUanBIlpZ)(M+2!{$U=E1R+-`dV_ zD5|1XOxW8br0=ezZRxznBVL8j&1%JXs6nK?RWTinMEv-cccbbQA$*GDEf!C>N92pi z{2mm;S1X1r4YJ8srBzI#swtYg7A^m^LJJGvrhuEb$(SeZl}x)(a|>BcPPVcnTxZMn zD0PX1plM5%_M}49UT!9ZT9uPldw$jGrc|NXiIUWnFBo(|ZFF+g6ofV; z%sy&<9(^>Ij+99nmr1gcYdPA5qrW!j2`)r>gjU3#srY)m?75?(6)cVMu%E2w+6BDo zE;?9Z$!nCS2oA46yiPK)+U*2_)Q*22Mab21n6*!OZCMd#`$@pTGpd;_$146<8Nj>n zM5#he8f#CsRLGI=qG30AlMu(CoNpWq0amL^fERuP2TL(Tx9oWlwJMw805YTN12136 z5>~I%RTCn>YFQCJXr_I^eBa`Wr}1kaG0MAgWlHFJ+@5ZcXbV@P_|jU|Ud@wUny%%= zj@6vW?Oa2x$};^LUh?~`iK+rdE15&_LA6XP#&|R4D2XXpE==vEQSnTRF_Y}7+eAq{ zPpie`4;bg{j1X@Uf+AB?825BB;^60u9|U?V6^k~*oovKHcIcx3q;e!7 z%%I54ni7fSz^EKfTjAAJaF9zQtQGzI?T=Y;N7js)I6qsilYfci$X!q>y3q&!VRNf! zRaek~t0q^(iemOuvtc)z>*QzudQ`klaNRaZ+Y?HFOSjy9IT=D?YBjZvx02a9-SUP5 zLOx+APa)J7Nq2TN>B`2XE|1fRYtau>bFWGX&4@1^%!W%m7yobc0g@r3c*Ilow6V5K z2l8>npof|~9#ng6YgK4sK_PCm7uIBqtW&;rr4PQ~0Xg=_Ce+WZPFPlDHSbr7II|kc z#*8UlW8z-C-XwiBJR({v*$9Gpsg;V!9z~hV5ZPwQ*~DUG#SoM$F$t*vSTdbP)bA!@ zHlspSrAoSO;ISGZ>J~~q_5p)l&e-vyz?7Rdleu6f=I(O4hZ)%{D_Fkh zMe0@utgQxBDkyx>;j<)D;#d2$tJ-xG5Myk_S7{RsLbt*1APFPs2}gztfU z>GBB;|HbPP8sw>aX7qlHuiJ*=`G70c6YS}1k0ui-fcVgjI&V7-MxBi;ZQ?Q;7(w)m zjK4SyMiAYQf~^};MBd}&@m$v)>J*}3ZxVuCbU9c46kHO zfSqcLr=8mUMzGXBX4*ga*)w{b;Pv^Xly>!+owHFbh@13y2|p%7AcHRG<|n|?xRD1r zFMkK!a^v?73?6zyf3X9@nV!`S8P5E0mjMr#XrHTu9hAarwI6{+app;=&lpP+PJ#{Z zpH6@4oI&nMFa;V35O3PFbm?MbVRfWfGgIV*CLI1<+E6Ue2!6dA{UJG3AmUuGC1!dg z5kdobi-@d4u#q?)WZe2U0ft}u@>^)#D_9RavPX|l*)u5p7L1|$ z^)z-!J^W=)O}2HFVpViiV&FKV8~slH2_A(vaR+62if!}7I%ou)_Q?n+Pkp zP`TPqgQFbGik;fEb8EY{y@GW*{lnvf56rE>0thmWughq8jh-3a zHMO>Vd5ou>c+K~92az8h82n~x4YE5ELfT<+*{W@mCmjJ3J(}FvnYEou8(G=|&%>)k zK>O4=gMXM=gM8vwuYaE{Vm%MZ*G0DCEv~^F8E0+30iv(I^}es|(VpG=m8-O$v>r2p8;&il zt!(Sr-1dIFNveIDowHPpmxuNev~7%~ojS4|+#cTYg(DN%PyS^%t^Mcn+6CKT)j|%S zpP&7YndPagUbbqTcSrKXNgWJqb@U+X7CJIPRIpy2EOxAFCO>+;JD28P9AG3^%Z z>4Sr359w+Ox~>C+AzgQQDzuGgu(hDAa&*GhB?S_c&Vfox65yd5o+*u=uNygUr6cSI=ELj^?j*y-j^8PE{$c7li~g zAuL+UYw?|HN0-OQ;LHMXt*@gWIWYM9o%+;+e$k=8P``9zrEHF3#U||~0~P@jwT~Wv zHDH{qO{9)P_^I^n-GjXcp*0XQchbDR(=e5e3h9O8&7hmY12s~+c=y_|rHxcgn1QIp zZJK;w@ZR0ftE&rJ|F8+0SlBfG;e~H5+`hmqe}1{R_0wC`t%nx>dGU>l$Kk2r*@@`H z!c=;4IPtT|TW4;W`tbDalf=}v>2GfN_?BPK?AfwsGqL3scnx`a?n85Fz1|6^_}C+x+M71PzwaCYwQI*dIQ3=?`_*+9T+H6A z;+!A@cH)XiQPK(}veb&e5%>zNvMk5IV+3scle@L&o_yi(B@BDBq%su7W>f`RkrV=3p)i45;RuXd!B|RASdqqXT%9~> z6z6WnBu)jS6MO|DRj3RgK(Fu$kFO9S1~49&gkyv>dH#BF1*EC~S+F9h0u(1`YK3DJ zX+@?8QN_TPu8{KNdF#a~lA{%d!&VeQp!LcqD?F@5$Tm=CvL&_^WsW+9RW#~u+zQZUIhtmvPJ%q`F z>%}pFQAvT|RwRaFp(7a#D#J@F0!`wCOo}Y8l9LD4i;DuUDy)F7D2j~h(v=kvfHYTR zoFNokQQ#};c|jI2Wpdwoahw-eS!CoD zf?yPVR7t3ZAgmCo!bmtkCrdmvx%Z{Y$c)Meys(1fGV~0Mvnw2Irz@ny;sS+XiYTg+ zhmGR=%>Y`Qj^;DkA;sO;|ZC;Ra{a)r=F9=W3yQ zo;Z9FbF)gRqM&y)CF0BqB@pb2Ku)^{Jze2GjwIVX42xH1C5@?z%)ASW* z3gaS%i2@9VNUGEd#R)L&NqrnSm4tZ!9Rhw>X9|P$mQ*fLQEiNpB!6Nh?4XL77;n z1S4ZBtSEubW3mdX%H-wi#bJ;oSrmm8n699z3d67Pn8>e?BFKkX2EE8lUa?-Br$t&) zWqqtksJg_0im;&LG%QyPgX{4<_~d2l#o;0Vk*$IXiyAB@luYulL@>~B=u-v)9Y|G? zC$B`s8Rlk^q@YKj9-KtO_=vDn@f^*rs2nfjpot2PVUx=*Nyi075Jce1Boqg=f@*Q_ z2^`#+1ctyVRhc}~k<87k2w+VB6Sx8$2P+D}L$w%KJQa$Scv96R$&*_~(l3U}P!y>W zGDuf238n;2z*MJLv@DR3-ixi1Z zUSzbBzZtrmP%v1Rp^|z#1r{`b5?3&Z&=(%i4_27e4*yN~2<(QKC%O7#JLef}M_1smYm_ic^9l zs8CXXsSf?3GO%C4|45R<7@2{$1d^HDY}A~&S%ea>PQVOhNN6Yllaq%LUIFlBg6DXc zNR&FM-S^w;pwpR~1&qL93DLI^m^~CAc(3pbt?$vY0xJ+tk~BBDVu(IDCmd0b$K%_5KuLbYUq_m=zxS z2>!65K&YG|3i2ej-eyi<0cD7TEq}Bo$nk8gf zTww)$(}jI!g@>ILmR%TQS_MpQft_3$S*tdUd@b<>*JfeUQ?qwWu1$YrKn!_b*%++;C(qII%ytE~DL# znXAEK*aF67*~Vy(zj1A+w(l^Ud^d8m``+M<$A5Gt=;A z>fo$CYQ`6j!EIoSXE>|R9631Hf06#%Le3jblTpH*aE0)4k0-R-FJ3#kZJex`=-+w= zQDeq1g{lG-uy3+nl6kZ(97<*;U)@%A{v@_ssvy{B-79 zGlR+A%m-%PI8$BxtC{4?^)naGY@7Jb^zSD=JpCWj-Cvucv-A^|h(Lp1No1&n8bT-#4XB`KOqvb0;4iWuyASBDwjt zEnk}a<(3a^xob;(%VnFjEs&8l0^3L$E-n$v$f#_dgba|*+jnb^+^5d0TG&*t-+E=C zb|VAHn-hLhJ8o$cCMy-e!c;la};^HSg@j8rYuT;@;Ew9&O}(z zQ@^=t%8Hbm30lP@ycRT6Zx;z_5#|)p?J+gHR?Ry7xaD0_s6riwGf>3psb10gft=V*0>M!A_=wQL>HEnLK#CNZa5^mpx~S@NJaK6B54F?c~q#jqYHcw34I zJ*!y=dpS!e*+$#$=|v%X@bxb)BKgfsEl$bKRw#+5I|3DbYE(@KU}^LSQ(P!zz$HG? z%v_A#tIVtAM5j;T7@esk(p9>6J#u`qaGh>NE&|eVxGLq!!j+S#mb9r)XUlb=Z?AR0 z2bQ_=jC7?=_8VqMgwoEnaDEqZRj?3|c#rI5MVBSkv|GBF9q7FW=njHRs2E{ettZ-v z6h8g8NIv1y4;sOQ*WXU_?&f*d8S)8F80RHlx30>zmQ9{Vk9-!q!@*mOH^AH4q{Av+ z{AE-eZ-#jyS*n&wZ6QKAh=sQs^s>`J6hcBXrL+`>z#Y3CWel?5F>e)51mWq7tT8Mj z&!J~K3m$3bsF0cvls@3bX0kJA(1G5Hk!}a(NcdELxh=8J8y^VgNy-+=s=Y|mk*=%P zBVDlIE^nt7a<(#FK%Gm=7yZsC&Q@0)M7QD3l`L2_KobXFXE1Owh!;{d#nLL8joMgf51WzfF*Cb}(Fj69} zM%`)dx8NZ-AMo~D!PR(}%}VF*L&^j3Y)%vBtJQj(9AxD40E864Zq0qQ3D%Q(+7@*- z<1J>}Z%4H>L$c%&8S~dOA<0~+3i!@H7<5-FKsW);tl3GXRWot;YJ+agWywH=uE`-A zUghQU?m}pe=DyX8;ZDJV2V>E$N@X|w0{x)Zast9_JZ&*Wf(kTz>Ty(`o{$8{Gw_+l z)V9N=Ocadbb{bO7$Gz6Hi?PITdHeR!3$eLp<}kujj+AWCTE|&nE@%pkmFo7<50jexA)o=~AwDe>}xp(brpz)Cd; zmz3yssIEsn{8}Wa)uDJQz?cY&(_7};`5D2WJ7phffoM{Xt=nNc08wqwF*T0cEwm}! zrQ^XidF*O50L>N-zEr8aIqNdXS9B z3a+gF5-w*Jku#LJmGmSDt4qxH++9;Snoay*B*+3j6G2i5dniknDui0nRCHm~E{n;T zPP_8vju(q?O8&~YQ6B~J4<;pWrLZzF&YZ#DVN~Dm1?Yf&Zj~rIs2V}fB3~JE-J}pC zj9tT%Pul?Le)$PhzE*?)$XLcqgwj|qC|r88K~_aNY;N+|22rmCGknr$tyJriVUI}p z@l2u-lULB@YOb-4Cge6LF}{Sel`9nSKcM`EaN4z2x+2{MTfVbhpsDvFIaObkCj!ZM zk7>ASYF6BxN1v_IV$Q{ImZYa-_FB2!A4kP2%?d|&g?gYD5zvYGGOI^1aEv=p^(3TxtzdUxWmcS zv2cxtFav7KGe|khp>m_zk0%(snu*{Oj~n7cu@Wi9+&NpU-tOn6OOZQ;xf~QaxYL|0 z;ZfM>ywa}L*7G;D^jk?ytD0_~U2R&p0FfjCMUf7){Aw;a90`Q}@@tYZm{7e$RKjaw1A%iL6&U!B&5kx0)c{e(U6nCDJs+m`#hdH(|AbA;2#`cWLubL|@E=`(SR5z;>8?8DM zx@^QS_X%?WFJ$^yQ}J-Dln?Dg^fnHV+s>}7?x@>RHghhRM)WS}gLh8RoeSDby*5Dv zzCEH_7|tqE1u^A`S z0^PWJ&bdZ?iV-Vi#VdYXHn&M{4o9x37A6l@LNe==S6if+?NaPTyzzq|-z2B&B#-EHU9}Qy&Sxqlk`-TBo;3!T&LtBhSvT`i;aZYf@c$I z&ha_alZ1;&ccRst%~_&q>8#@es47Ii8YY^e(u}#H1;VRNeB}(?4GBDo)vIicmMI{x z;=&n5x9uj0GB^bXEM$qu&VLNqT|PAm!rt_$g(v3&v%j9XacWjy;WRx6`@;1g?2Wb+ zWOf12zzxQjk;TOT1zV)of`{%5KL}B5Z@gp_#=X(BVi;Zi4LiHhW$@|OeGtNrA0*ZS z+Ku$uB7{}?i~a;SnMZ9D#B3J;Dyx@{y0ge`au2<>ZO_?@Xs4d3G1><|cX+op%dEXx z1mkO%wfkSqD030}Dn=OtAZ&_XOG2ck4M4kMU0+|XSB6YM)TXa5mr(uAzj|%^p0k(G zPTv)|R=fL!zX-lca3w@Ceh7lW<-9+i!61sUA4r6YX@@=A+uR7k+8+f(MVR$E+v(`2d84r~2Vi8p66E794|c$)0w_@ihon zC0^z_;y-KA!Krs)5Ux6Xd~N66QaYQ;`>-^eIMWF|^wmcB04zN_`_}1qO@4G!KvzdrS4Z$yGcW;)f;ZbrIAUR`k*Ek3 zSqnV@wzu1^2VaSeEba8ImNS?DBh2;3to4?@eg$u&!+fkO5yGaN($QDWt0a7O>j$ert@>1zx!4>|8*w z6ORqMsJm0q#$@uv7w&+Da)Z5Oo)H0sFKsJJ%NXoV|#4YTvCd3mo32M<3%U zUD=``JOF3}zNoJoNW@D3TLGQ@3HRELU1uwz-Lf!o5xkFo{1|}Jz3Pl>d)DrMrHOQ8 zLcPWdz6`Iho<7&!moZ|75Bk?qd;L~u8JK1O+yGD)Afh>%)=}z^F&C_`J72ZLb9U^1 zn{oHv8(f>+{`O5vmc_fk1L^eK)){U}nHZcB-uGJYP6Nk-6u6Zk&yHvVb0s@5f49uo zEj_^N(|c!o3RH0;M|<>*KLg)BJqERz(mfAAN)kK|koQs3=gwyw0A1ae#;A zYZ4%4BTJk3*B^|ca}NzZkO21s9R)>)fJT*x+p&xfPjn!qt1Ij)>h5H^oUew!NoI_v z9sb#WgF8iRcwlfOtowCA?#TFtu-InQSggbYp6s%cR|jw(;X!Om{=t$kPP#g@6FWKe2!CjTkgXM^AbQ zN7`f#halv?mo1yJZci?*h3)$a0F6DcZ{WTGDzPo5SiEgA4_R(P zMPD=GMr-9)ZiJVDjV$fkkH=p^*53IF-=o*8oex;1C&SP;2nX6(F+*DIR$H!xnwgxP z;zp~b_Wvk*6EL}|YHc``bUK}>hs^0tAQ6%PLacL6jZC5Dxw__wA=ErqS9Mi&4IrWA zlAs_E5w;>K5xpoExx|4|L?ohgb&Cipm%#xdq9}MZDh`17zq?L#g+7Gu=Fju+gzR-{ zojt6*&)#dl>s?n|HZwRRkdf_oe-5MdntXF>&lL}?oQEUr1snS+BTRU&5zThdZpJX%fDp;%8=B+-(EB69fN-+_WYIRhqVm<8p6<|CYu z3OQ1**)*1JJz+Hd?XAF3q|C}G$rRcB1KNY@Qgt;wzp>yGPk-p#j$cvLGN@l z9JU0l2EZ{3ia}-fBRUGRqpc0u8LepSvYu(G)!|@*t;oZnX4dFP+d-^HEsBf7CNY;ACyeAM!!tK#)UF+=l;giGXf>&}~Zf4DpKt>Kf)DKkd(I>XFUd_z_tZbLzOu#CNjq;SzES3ejv;NWo zS|X4Uk==&bYAAyRs(^u67w|vT&lHVPaX=WFW5ym2%yVXRD~L zKt@KgV;$0}(bg?hD5B<=?Dd(>Zn4+7NK-xGmH2gzNxo9oU5RP^F46RTf8Eo1^~!F) zCwe;K)k1ZWm8AgFDo;s@4Uk9C!8=ewWdt(NdKP{gC5t*%;plJQoY z`bblwPe%C4{GyH?5{PKRO<2=cpBZbZ8eMCO^?E1nEBf?Iz)?5r$L(glq%%#|l7Skw zxC=$(=*t5bON!*p)#wrq^NvCfzw*YN4y0~snpD;)zc+*In6zQY^l%lnp#mAD(gUpS zCr@u`J#y6y1)gKPBE1@EG7*`db5@#>d?Fu-<+}^VWo2j*$dIPs4;Qu`Dr2bR^jNTY z(dCPVE+2ekaNFvuSG~CEqLp_d{QvUhk1XFdaP_hmmtE99T_w~{!!$=i? zigi1V*$qUIoE)>Q*m9CDTGi_~F`y0{-~xc6hykaFvaxfZ8SjlM0AP>+ZGn8q$6o}5 z5jirxV(Ur1XJzj_Cxd3`y+^!T#wv;E@yyA-XGQNltOCdw1>jcz?f`HQqp%4j;7wvc zo@4+G$-p7|j`uK94A3R&lYP(f-T<8p-eUeeoN~8}Q%Xtc+>;)lfnI}vS^PgiChvF= zW(x`bm*iv{w5<1@lR>BS-lNzpk+XoRlu!0O{k``voCIJb0I?KuAQHhm%>a4?{E<}7 zDWYP)V1Qrhy+@8ELGu5{;Fk6V=wz@w?|2W3{6^%+J<+WvyY}>TTO{2Zjso~e(TA}Z z1!_eAdJ0pxs8lMKql5u^HQalXY`0V{A*vr{ww@`IvYZ%K!@X7R9ZTLjSGgsfH%VmD zy-H*Sgi^^lTs)3dAp&%eA`WB~2S8YqivYq1L{@jQaV``JTnyzLW07 z0>y#60x)0T*(kgcNF|w)1r81YkkPn=15WoH?-2tU)meQ`x=EtmtHRNQG!X~#NUQ+b z3fdI_JYf;y;s9YvIpDV<$IU^yTP9Zm_D_fDBpbD;_a+(O%)raC=dfX5^Z+~pXo&^v zOe#(=oET-22ymqQlFCVUb216Pq@HY}uG!anRTzQBF-atL4kM$;)Huun(8RT^g`oE;FnKpoeU@3S}7Ct8-4JVWUZL$%7G3Q?; z*^N9}*tC6V2(OX=9ISYU^}WLs-(h{%e6aH>sZ6pr%&@X30LQ>La=@;Nf$EBc6=5Ln zlw1rrGer!UHjcjv&^B`9Tzt$=@}cxk9VJ3Dh0U-1MIvMufpdD82xDc8~{6kNXG#Jz{7XEN-PJ%xk8C$;w0bH z=rt-V$Bg0tro=Rb`9)a@ro_0hfM&~1+yCjbAliF&V5G2kC%il`D; z&rbgV0FSj$eohp)ecLr|(p zdo{vL>K$qSWL+JKkRM+M6@pR(i?%Ol={`(|f8SoGiamGrnoJI_dpp=ZH2TmuSt$uea zdF1VLmbLylJ#$_s4ldWzQ^>P6&NQWqx*ZNbDEh$-i>|!jTKEbUipa>%5F9%Ev%_0j zpSc#tsx3I!-m7Y5vQ~3ZkSm=B$ON;J_{}f@PU(Wxz{fz zG4G$W8tK^9HU%rk%5$8nR3mr}hPHGEdGV#MjJ23g;;=uA zd-+L+SW@x?QxkqYGAO}BL7%yxlyveXf%tc>0UEr%dZ6)jD@TWzkka zm)tS(58OJlW^kc|l*&80K~6W^N)MPI!fc>HJOET$R~PJD-D`4HIFMsemT!7;Hh%_g z521|WGp()PpEdJ-5&89JXSSS5BXeo)jEN2gwx-bq5==#@QmJgtDNjB_CJ(~o1;vDU zW|og2BfmK~^A@@M+=ovi1Gm7fhWK2XF(cnmW|B8>shN;)&6-nU&VwI0dIun*!eZQ* zkUiwtJ7(VG75($mGu!Aqq|jxa-GT z$faan*Hxc@E>x=8t5l8!u7UI0{YkZI%A<5p59B%$yaiqcfe10zV>?=R-ZHa6#8>Q* z{WE>!#gEU7@xiQ%-dr@eYt^0={(*`94=?^v-X+)P#cHtGs{O!mG4xRXRg!0Lb zwr)NI8{O)k-jDnh-TXwA3L^zKZ`Q1viZ{X@pi1c_%V(beweTySpBWrnC?|)va2RBY zQ`UU}IOSm*5;sM1X)cDF5vMy8Ctv8Y@1 z(kmq&{~}s0EGCEUaavm&zJ%3}+BHok!P~VYWtT@e&Sa`jXiKFSmm*i(gWn5_$>GqQ z=GGhc&=5`ho~DrCe;*X)5p<=Xm~6l6TTJWzzut7Mh`7HybIGQ0zd2<$m~%l7 zn3kKNjLl{Ci22}XI5`G@gwArZ>)R0b*4-lo-AH7`8D}G3AByg>}gd@ zC}Wa_{6TRDX^O`EPDw}WX$X%xz9gRbQBwNxX$$VXKKdB$y=<9K-j?^JZ5efX+@nLb zr67xR;aPJ3V>3I}pHNDUt|)Bm-oiE8Gix@2E7#skWs#mq9BcxIizx0OrFw-5+*HI{vP|57xJU(+Wh^qgLj zEc-kqh0Te~GJJi0iTW%Qk?^CxIfK8%`pz$*hB|cjFX=T*7j+o}Of&A7%BITW3Xg(3 z{wx*(K`}l=XLN1|x3)CT(XT&7iY6rCJK3Q#F$Gqyh^KX>QpubTlh^+TIt0ZeEDb`( zG_ESL&(N)^bb5au+QY~6b0D9IW+sejU~}?8HcGC43R_JWA{$eV6vT;0iW>Hk8LPzIa__QFqwXDC5V=bi%nb3BEK zV^X35TGs8h7HpvJNp|5JikC6Z1Tu1T?h`v(SHC=S@jOMyUY_LWL!GR;14|^Lz0{Np zm^ygJ=H3`gCFQOhBdNySZlg=j;VamggCBhh?-0ny(a=;U>-EOgYj4p-3i~spqv#H1 zO69kzJeF}VWGTy_Hs$ra^bc&p7mD~Rus!jQZE5NLiTI|mjlIf<-Ky_m5X zGu;K@mSd=lKt>Km{kTYb^zALJza66s3o5grSDA{9ja9g~T49JOv-WaV&*0xtnS~;9 z*a@DO;@vlnwI==!;{r3z{`FA9FLbpDPYFDL&9J`FKtgY1U&S8x^0!eNp=9Jszq+XP z-M2dw4yegGG>Kp0QgXZ13v-b98VRvOu21v*a{lX3B9M`T*K9kJPiyt5*Sm(kwrA*J zUq~mFo29F8mTVY06I~S&b#ex{@+g zn4fR!$%Aj;-b)~(ldgNEH~J=Qyi0J@&ALRL4!=MK!uhOAHyWyJ z+&q;e&L!>jr^v)0&^x~O(JXw5=Ey@@q3|EZT7MR`>D8~+6xVZ_Np%%W>dB-V_PC_I zb4XB(>vY@{cFu#3Eomc*(73jt4|9zqXJ*VkwJ{F!!^_EeOWPwu0vQgVWCtmd=Qp)J zv9yh|B!(P0C%QxKc1=1E3*}Y2eN4sz_y*Op4X#MB;vMiOjo>j@<4=_2$!i|!YhARQ z>Vyq!?OCJ8YEUD3v8cY%l;y!*6H+NaUh`ju@gmr%2%XG)g% z6d27KtTisq*5npd_w#+(V0+!*LJ=u_pI)R&pWobico5a;%=xk2G)pqkkb?_ro91LB zU}S({>CE|+%i7>C638fq1qtD2Y8zU)Wwc6IJ!tL-eg(HrIBf|oS4`PTUbn`h>7Io? zyb79xGIG$r=JeK+tJ;^$FHzeT4b=MY>if~+H$~e9N0Cp&LYJrk_^^D_`*))I_{7Yi zSS|0?)kB7cJmFH5Go5|wR=JdWr&TR{hUc6q9=vI^CEnP!iAHzy2BT@nIppeMfHjU= z%iJJaz@JQ(jdoF9EgX@j88?35VnA(T zgCTp6@fX1GDks^|_Ksm;FYwOj~cIQyJ{|x-Tdnin@#VA+NsLGzicnG9x#IdD~ zL!qFU92&jD-1^a$HV%d1>HRca0{?!l;?0h;k({KGor+IRgo*qV^o5`lDNpRy);CYV z2##!DG`O+v=qjaX`-+PPKC?vBPgJV)a>}jt6Pk8rKPc+Y_;M+Fnc6 z?r0;$+CmvQ=#JwfPMrni9azFn2~F<@H(l4~AUKTTjH=#_$_R=(XH<$tUD^8T_O?TG zN^p8V(~GE<=gn-8NgCu9UwSg&H8Hd@>&ahtQVU!tBS?BHBil%7Wy`y(?T7U`?Zv1h zqd~q?O)aF(MCo~S=a8V7h|=4T{q7?l?*m}s(QSZZy#OE0p0nC#jilXSnMwi@YR`Dx zKc$$2$5P+kKyE&(Jv=OwkwaSw7m(re?&>2iJYKw@wfp_;%?QjE8yN>DaZRSiBR-p* zo?pu7%RBAurKET^J{-aa$aZ49p!I{Z+sLlNh24&VL_J|qHcg78ZX!WsyJ2U-V$#WN z{*B$#QWhx}4W_Bnpp(n_n!Z=b&EY#vLoVm`>Jfnv@V2p@6fQzn3S=DvX${}?(VIj> zt8P2DdcOu{wd>C5ptc1zz}v^p6PiXh^VXk^+#Dr$XxkTWqN%1r85dBQUItzQ4*1aq zvb+GZeHyyueY!S|s3&}c$82A%YX{x~6a5EW`>qoY*v@y4m1ws-*}D8QcY1-!lrnbk5?~zbOj{VP; zdF1R?dmC7F;GW?d$pfp+(En^&q$mR1xM!{->reOyncnn?|2r+(d^aq+&C%{(bJ0AS z`>OsM7G2c$*TtVC`1GA|%71vj21>K8ky#MNV`S}xT7t<=Fj;x!9 za$ofM>m$VEYF|3y(x|){iBFy}MmTlc&SmIt*OSLx?UBKSGII526!1HBl6rs9L;JyC z69YAzw`F2kK&;`>@*=jtoZ~f|<82RbIPoL!K=1#*P2r}$wFk&YeeG2nJv#WKvXYSB z3q-c5ZrAGJUqTAD`+e;l>rNyj({DuQJzM#=+5_8l^WHam)0Lsg!EL~1hcJ1NEF9SE zU`N*`@?fC7dfka0K_=P5XUt>GL+ufoE=?NDBqgwf2K<7}aRbdVXRGro?w3Qf?I(N$ z(D!sV@A}q@+wbYASf&=Dbiw zjs?DVVe8{@x;KLxfijlzSCqjzQz%Q^<6gJS7iU~59A2oBkA(5P7syEX^{bJq=$3~@ zTd#%N7f}f3eraz<%*3S43S;weR*N$!F(-+m++Ih1k%At9sB>he>9|K*d(z!AgQV9T zlAt2vVR92pq9!iZC%fHoNuj-FNFX9dp4!?;w?5kXc7g8D=>Z?E)ULnBT+FCFA$T@G zJ;ZvFGQMHg=1?Jlh&**Jh#DQwAPLiNa&4rELl05DQoe_rTCrZnxcyO1SG5N9Tz81S zl7S+Dj5wD%Xx8;jt&uDm*7a>&PH83soqVdlSh{?PRCGBk>D$;BPVc9TrMwleHn+yd z1;sTaMsYWi4t#!^Shg;|3UfmsBh%#Eoy2kADI9XH>Kt-lPn2JiKX@Cn;;0YgW-3Fa zQqah%a$eJ_8Z-%HOY6@iy4{BroZsu$aB8w#X2$ER z%%^pL7NV=?hAYt<0vUz6qhFISgIBMl_5}A9Wm4sR$QI75im(Zv&lfP%LZMX0FxQh8 z>+O+Yp$rZq5VGEU=Lbex7d4;>w~_nLMZfX}#oCIIs#}~?MpFPgPr>6xTc)hGhX)sm zKuC>H2>73V#x@G$BJUD=e&wOq}>;7wT zG#NpNw#Lut6xOMdJs=6XV`St2ELu>E?p%RW5ltR`?E&-xT_q`>DBlY`<>aSeW zuZi0-$VyLV`JFew8U-RUz2YVe{;e?UB_E|7Ae-K=g&s}kYMiN*R1#*YpsE@ylYx?v zU)-uU(&1ewA|>yurz1<<2m8s@UwC9K`BCz`bII@vwI|7oF`PqweN%f&*T>aZG-z0r zS#jIIcVSmsmsmu1Go^kIgWb6#Lj7EQqt2cQTbR0~nsuxF`K(@1tS0$G;v z{`nghkZqr9|BDo#-2l-2UF~i3QpJI>wUYBW&Bec$RF=&zsajy{RODRl06QU{0yrjceIoswd$ua{Mml@-JYn3S|gV z{mXgep)a)G=C%FeKid>NupbO#U2P6kR?ke<)K;ag8P{p$yfX3K7&Czg6v}@;ll*DR ze{LclySx3*UW@z4SH9TZLMN6Db>t_O$Dpam*@>hIx145&o@F~~Z~Ibvct{{3M-Fa= zMZNaQD7o}Y^Zoe2d(dboq%>aL^)eP8pO7dfBocQxrAWt9d_AAM2ldP^lo8RHJGuy) z-TyVO(S9#92B!C0ppj=ijwa)UhNM(e7g8Z*CO94@H{1(@7Zjs(K|k++K>n zO*+hH+}A#5n2jKBom8WbO5KhLy;jN3`1*bAHG>O9@M`|E17g}hF5GbGxnytl`&(`) ze*OXS;(xbyuGz7u|MPuME`CF_13NPPipvL@bSJi&ckX#nTmB0wE`XC{8>5mX%Ty&wb)&8iPh@=QFt72ZhhXbM z842%r_(Jl>hvu~nKFrsThMn)_Lz#%;L_v97-v_hY-~!dRI4??vLQ}nUxgk)DLHb+-)yaKezgsHIJI06 zDY4E8TQQ~(Yhw8nIpync%L$7qR>Ro()Ysd9hv-r{M#oiZ&Sq1?v2{~-724E7^93^8 zfFgsb`0l62TFn-Gi^DvWa4E7m_kVWPxqaVn4L{OeA{q&}vY_td#9E~-DrGdf3^~le zhU7<}QXnITUc8_~C%Ce8`w?25lFDi-BS0dVmF7yh@OXywJ&HC9iph~<>pD)eu~y?z zIBm9ir}tlqZo8u6!OJUU#irXD^_q%xaCU^rcOPr-99&q+e`b+^eN#&^)3$c}cZfdg z`tJm1Wd7*9p8Vr`SOo;K&iR@5-}$~z{de%ag?qlYpbN_<7gR^Z6BA`wUB-~lw9yD$vf zHb-4|3y;t&Lx%!X-zo4>sUHk8_B+B+JhTT z{0KSL?>Co%a9}y><652A-n6G| znH)$AOo)+(?UCibK;2IK2yuS$l>Zz1(sA6Re~C^Q*LGMD5c!@3#z_w(5NH=NDc;Al zQvwEEx$L+b;>1srr(XGQd@r{Q?Idencu%ih=7shhYi?dNsO!d?uR^|yz4O^FDAsv@ z8mk76b*{2Ooy2S^s{J;fWx~~6v@Ve2JG)Rso*Ko8xdTeMLrz@?IXz=WctFxtH;wy? zAok&VY*>kzwopb?2Y$DcAo0s7t+JAC?y;>s9>1BlHtH-pl}ZMKCa|aZbG)A0IlA{) zC?ngiy{8kmx~267*FCNs58^Bd6Sq=DSVR{VlS6Mg&LrE?k8f)2VsUC5qrsc})=y%S z8p2=zN~Dns*6opDH%VrQPG+@!(Cl%N>ldMo`Sz&5|1U;CVf- zoC`ey8NUX0pfRTNa3?#gx5TYF&KGsFPGgB_Sjmyc@Dcge`B+8-B69Qw^A2*=(?>Q6 zH$H#FXZ6er+h+}%nS2H0jfQH$r7*}jC3O;RB3E449voaKB1azlGQKP)*yz7-(`-L^ zc~5)WTG8a9LG7x-iaQ2ofZp1=#KfN+FYerzm(Yp)eYsw%K$_e_K%GbIUYRcx{9GZ|Qgj|~16-`RzQ zr4`4wuL3v&>Y!y*Rned$-Dt>EvvXMc*N=gre>iA_W! z`lKfTzV%!^OwN57Dg>ou`ct9*Jtg~{`$M_nx^sWYB&CYZ1`n%Q_~on1?6 z|BG#?PzIo(bQe%MZM}%}Z+l)xY=3I694WGi2{)INBvO`URqP8#$dNx|nqBoLtkgnT z>+p-Gy1U;>&!2Ih6!=;Yu6|_)@Td+qEjiAqNyMBnsaFevekj^GBq-+7wcq^OPIZ^@ zZjRK*6Oc)dM@dy5l1LPqZT;7Q(FVCi4G!JY}i zryi{Z^Cm8o*D?I3hTMPd>^kzDf3*8S5c3Y){|TQ4w@dw<4t#RMKibPT*)zyMt<_1# z4R#Ri1jROd!$7)|C13tWdk0>7A}LZzt;em!6C;!*Ce+5M{tbMXfcTW!0p}gpW@~nX z3*CYL_dCVpZ0RhZu5YwgZ#eNIt%J`pH;PE^t@avxM%CG19-nxF4nNjs?YK*@`$H*m z+gt4&>rW^pjQ2M?yHME>t~au8qgf#>?)Gq_WoxQ)xO{-)p7O1|}MR8U(T{Q)G%r z0$5=$3V7R|0F=_RuxLjn=JY=1lbxVLF;$t>?}qCpM(jI(CNk{UCqw1SFPt}KX& z=roM{Euz`ALjn<*e&W=wyU;~QJw zIR!mUfx8D5^{NMcO=n%A)0Q>k<8pPt7$tX&VzdOs01@YK z*816uDV@;51Bw|0ar^5%nZj4@|lw1*Iip3-fdJ#x1kMLjoCK z-UE~z=#A0VAGXjb0Q;r!8hk}0p<=Df1#IPfEaT4vQdwTn?ITbmkP)Zr(lg1Or~P(A z>mMWCxkLju_z_l%tzeXiSnA`Yj4F`{bZeAdi`7FQqxmMg-t*bDv%Nc?4T~24UbF%C zKA{!mf$QPF`Zj?ny-h=V4p8_uZ|WAc!5u=95qnfR)pRGoiGS}-Sb?CJ96J4sPJXG) zty6bVL$^;KSlpW~&T!sns7Na{cS&PQhr(p>X|p>A7nYKv{c808X+T8PPD3TPMy3xe zhXx+eq*D34+D14VPe-&tb3{h2J_D5yl=5+3-+1EXUELG&?z3jk8p%{kPMu^brcHUu z7NmBLB6Yy*j$vUjIW(si6p&)QoL?w-|SvZ0%oqMOSdXL-tO3^y2eF`KPK zw2pdEPR`zr77B{Vk$W%e_=vUu1ULJyTORrE_wj4>%=@rb+olinQTym9blL6TBcG@x zE6JMLU8}^%Gp9qLpqP~I#@$xO%V^p0PKBkNv-7z3(4v8sC^Y!KRS7IP!%NOx@o~E3 zs71uj%nrWSF6(+`_T9TI;{1N&!q)GZ*^5OZUb(|xAl~f$-dO8#4z_{K<^c+M=RbW-*Hju`l|;0Z24S_*#_*c9$notH$Vm9*1Nbsb zBQ@yNa{6ttP9GSAk@0g=CNC>Zj4WwljoxfyN=fwq$)%Vb8C)nL#~%1Ie=2h-=~5Ax zK0txtyhoaoT4EX2K9R}!JZ85ZcW2n&06n*`nBJSACYhg(wGK&V5!Hpk8#z9B`6@CS zdxG*Qr1)iuh!yX2&iBtnlUxgBMD!?5>6D*|oO#~t8^=w;dOnQbl?oXxT)0}PsWbV4 zb1F*?oDWMD7L$YJ&!12B{+H%lGW5sx(`4X6m{V~205JI7#36#sF24ufKmr$H-4e+7 zjqr=BK0n%e;KJF##TzsFdt7JwuqmxlQjwa;4+mh~SAHz3rB} zc6DJOUsTVo+2GMq;Au?QZ|o1*HO1atdxNf;dl?8@M+?F{nPVZ*fh_s*_a8XY}yzC#eg!+dnI6K zL_T_q$X({yo$F2{Y#n^%5-MHPPj0i$?%4Pq z($@6t4;&Pcs2u~?G_f|Vvk}t9@)*dbEpL-T4^oG=H|$h0a z$;usM&G_tlq0Tbnvv;iV^OR#B8u)Vmb4&Y{oFnqn)e8q!y4j(j7W^V21Gb?A;yqh^ z%CD0r%j7UUIVId!jou|Xm>R^bXBFGaSvOscT+;_OK@snlPz#fP@Kg6DCo~CVUFXE( zM>e4y>o^QfC8i*Tj)&NsG3n;(ca6@Frf^Gg4=hJ zKOOriSoJPL!#bPYHBiNmzjjihs4{Gm3n^WRhQpiYRh{QW%LFp&*`rRZ=f_%icrj{S z2u*Mi_T?W!a2PeS4~T+;VrppE|4~ER)_al8Q8uKxNWB?~RuhuCl{d8eGkA|cL`u>W z4>5T0*mIj(>$2V9IJGw%F+;)(YH+vJ=W=E{dK8#ukWTf=;Cpw3#F(9mFb)r!kO2OM1vY{HSWh6q; zr4a~TjPpt^E#O$RP((zVzuLw0e5Wu!7BrTEAB#}N8gp=qVRs=_%+sgC5Ph;RYXH9ctr)T#gvxhoa0t|TplubWW1v1 zQcxt2kwf>NkMDGNW~_C7n(mM-(+9TGuIud9e13TljDA}6RE>=~%U$bRnnc$v6oG63 z02YdbA@SrpH*D9ZdK)%?xz0kM;xv}LXW)K#2bk*sjWOV-vMpB%m|3w}HXd--BPw-w z51d}n;@ z%Gq^;3nk>Kr+lZ=2%*j7&sWZNZ=y%8;`Pxm1b#o3V>wTHDx_&nWo2$@tlKG(tLQO% zfruP_>L3vEqEBujN3NRfqBxH3o5jsB=HAYpVWm{6YMd)*%L+TEvzkNXSYmbqnJDAP zBoL9K&*L-*&Xm#C56kpaiv@KD^zepWc1xWsYYPSg!Mw|ys`7LAwK_&!AR^Nn_hYsI z7tyjc=n4-#r}y-@69rR~F(Vs~)f-ckJzYE8RD&Xcj2wLFtnTr&UZduNPsM5IDSpOO z4Q`i#t!Y5g;X(jvcP~v!=&6MwGChz7z$N~%vDO&rW-xsQw!reu%gM;|d;(r1Mu^Tvu%LeLn5u`W>G#pVN z-40~M$QjOMo2IHMp0PO6Io?$Ma2|v| zVv5yPbvQpcZ6OUmCg1)DsxA&$Gg>Q`MYPd0 zJrgf1?VeGmaYi+$JXT9p5-*xOsi?b=b#Yg`uUrXFRx0Uy{C($cLy}m9T)JBdwma!N zbA}6lhLiHQ?X8EdnRSbXD>-$%$$AR`Q^gz8TJn6abJwCp?-Hq&UuMJE_m%nk>>uu* zJ!?3X(Iulyp_I%NEOD0`SZ=!S8an{XT__@l?|2NBOY?$Xd0=)AGVcwXw&+UHr~4O& z7ONM3PW1I9ixSL>}SQTAmS;egyTYUDaB`aTD`ID93T6x#X8$_R8yl(N2myGspTYACL z9ZOgDz25iBzM1}Y11p#PW!cY`eQ(*l%l3VI*_F#;E32Y^Eq-um9+~oZ4^@UPS=KkC9Xfkx-I6aYd3Nxv!CwzPKKS*%fx@algo39o)}b-VxU)%UObz%uLVPxOs1{rc+Z)#=sF{!97>Rx4L; zU%h+@+yD6`2Sclltx)&LSDdqA!(z?yx0nA$E~6w>TXu&Tw~a#oUNv`mQ6g-xEcHMZ}(m%557lNwg; ziZgXdT4T|1oA`7qT4~c5V9N?y7_meB&q@vbuq?(JCsWX8S`965Bk4cFLIM*BYed&eJ+z*acigl zwK{vnA95NE&VsI{tg+{Qj<4sGTJPa3Rh>hljIm-Sx3AW-4hroqt|eE!!Epd!OAtVPQ+@@wDM({=G;>lCJm_He?BpvHqCh z{65|uYQ9vlQglkxX3m(8q}Sfe>rsYcPA;S=CzOGRDJ+v3_>^Q?l{f6+^tz}S_&q~I zEz{5O>b1p))a;KnC(QArLlfSock%kQY;7_Vu7xM%N~JwlQuLAe_b#NUQuAq2w3-N$ z=aLb1S*Nu$65fRF@os&p&KzT4CxR0(_?>hK-Ccb3>+V1R>9@J5AXi6{nx((uyJugm zs?u|e-Dyq-gDQhPw&_h?kKCFpO7h~eLas9+!E{6$U&=Rto0zO{6Reg~`CM_cebdLf z#leKj>kqi&j%X=gNq*p$yc$Hqux!xh9k-Sg8d+X)LAU!km08T`E!;lFQI5(RjqJ8P z-5+pejwx9zT8Sy&P&*@M^I2-N9P3Xq>bg7J)KrZ|6Swsl{&|(NBH=tpo;F?x_)~1y z_zS*V+DtSVyK>T)Q7QE1P;&6|opMdx94#=&8B+p>5HM@|vS(Ym0!==`8Zs$a+^%$_ zJaJEVfHk#>kBu3sl5$3G)oVBxp8yM2*YsKo*?FUdWXW2IIv?dby5S8>gtJPEEu&19 zoMD#F&8Dear4tfm-C4+I8#=X>+kRT-wfnRZCMjhtRhL@|=JP-x?D!(z0F5!D=Nytu zJRh~zs*HU6Z{2!^NBK_UVg>V9m=k>{=qQH+lKN4H!Zl(V{GKIfX8jE5E6w(ig?bS5?H zaDF`ZtTk*dh3h(-auuJ;Oe@LO18iF7kw+`o*x043yK`8Qj;WPddD);UWHOE@ zW99Wr{9%xUXFWM@u`(5?hDW2_a$VWT#%vlI&$aGvx~{)A6t!7u??EeEZ&@&te28*ql5ADc{H_hX*kYC%WPd&v;;Es zi2v8TPR+PS$xaw1%e87I8F$A0F@Aa~YYe8z_*4;jVN;5L_xHT9)?~3lFd3K0GX`_s zE%6TWPfI=7DMdqW*{2*&yAmp?=S{wx4QHK}kVYam$;VTLs6@xVl=X!Za5YAf6Op9U zR?Dr8b<5>x4-=P!9e#~O5fn!@w7caDSLAH0#l&W{Vo6Tw{w80})Fv!k3g8o4*rluonBfLw@^itvi<-Exn^&xp%Ov)52`ic1Oy|IN}g zm6HWVRjq`SQGa|QlC|(3d#&DM%^$LH)Lnq+bMj5wJHZ&RhY67cf;&)XJp-h)P!peHgBGkfsD2$ znaZxK@Om_M=M-0zPfY6LO`|3h6LmL98Y5Sd6r3fy+L0H#W4RUG2CH-9Rf%5RG^)go zpt+RYy_?swPpyt+B@>frdD9rkBQ5PHpTkb8R;hv^OCTN2j4GJN zikjd!gW~=F%U2()mzHR5D$nWSdR7`8zKwrem9wNd4>M(uOerLFW29f!eLP;NR_#Fr zw=ctZyamPB3*F~cRyR|OrXm4ka7O}B*555>t4YStR4|1~zK|Dlr#{Z>QC7t@v&COd zvwm68l3mrE7Rrh)%=)ILVp4XhF1M%7TEeSQ#!E^jYO877MxCu0;C2snhfx`8csQ%i zuCwRM#j;(ofu=ECtkEh}O02xjtb@^8**Myw;mZ}NY=copf-0FVtW$`SyRPe&2ar55 zB%Wd|#gsWN$)4UF7I{@!XKXcTw60>O(ppAw4qt!yzLL?Rtl1Prov)TQ z2Qwx01R`QzX@Zq5Px8;psu5j&Jk6PuN^wq^9{aCuvCJmRd*w`4E0yP+%CowIB4adD zhGw}Eo4~cJG^||7E0>AgI=11rdGYl*#psSmK2YbO;wrE(tU7N+V&LZfZ}c@-eERv4MfsR-5||N9SP)#PIc}hPDR#i@dAd?h0jqe&Ysr3Tf43YIn?p4hq}U8 zLkjFrt>E)X!?G%`j#zG)9UfdLBlo`+f+KDEiLur_w@{B9u9}a>ipDi^CdyQ0PHfLg zPCKZMI=3#Lz8yXufsD{}ABcq9+Y9N&LE5WNF@fZLY=vcwQRhTc8;?>wJBI|t zM0G1jLV-Bl()yo+&_TU2G)$ClQxGBA#&Ky=5drO#vMS-LGV=-CCoU9`>8t(%|G|;( zZE2nHN!m63=>r_9!c(l2YZkYK)#TC&c}5kL6;mX12dW|{CaR@i;_5)|AHQQ3Sbz7p z%bQ|iW`{DM4!ERQDUp2!SAW7{o|*C+pP99b)_CR}hxZ^o%iBxdFY-_WIv?H}cs*$x zDDU-DD9c4$Cde~7hmQ3~3LI_NT5|tAIQ0u-+ww)E0H8|bUx33#AS2V4fnK1KS%-X~J5qakBV~026KRQB?TI^BRw|P+yrKj5 z!tJ$*!k(U{+UqlM%2?8y$zp9Rc1CIN zgX!*wU3wpGTm&*iyCQzjP^bNCoFFN>FDS9?I9bJUQv-*mS;{ zh&L42V-m-saMljZVD>B&5z+5{i$0{mq4^owhZqeS9LgJOGHprc*`N)(sj|aZu7iB) zQC!2G`+Y130vS1c_YD}j~zjkC{l>Vp7QOh=DmuHE>!eL7+?e@;M1fvy7UR^ z$X*}%jBtDloDe$pCY zV?e__`TLe;Kx|M*qB5|zH^Q!F3gj=e_rLKx6bWSHkob=~Zu`OA0R8<8D=9FV2dupf zhQ=3hfF?lG%;B?>VZo|L)m-*Vs1b;W>hEt}(0cfns7mLCfW~$5hQPSY1uqlxOY9Y~ zSuS&QZFA@u*rrfMM6;hcg9pkLpP{Y7lri@-r4w2%E%786LuEWXQDzf-bQtHDjH#4C&gdkM2v{-;x~!ABYx@$N^usVz*E zB|()lE6cf(TqRB+B%8>?znNVIT-zag2W|ZJ9EseVuI{?)-l} zyKYDz>hAL>@=pJ9xBF-SCtsg5NRW`SOq)fvcs01ua=e*dcob$TkddcG9!A6de#@rT zr;gH{S#0`1fcDVl@m(fONHw0E;xu(#GEqs{r5*|S&@0%F2#d+~@Ba>go4>=H2GjKc zKYq_c0F`O8sv*gnD^u07lu1`4B=dXxURX?j4^p(>cYp8e{XV3piMs7v7HEM9qf#y< zj@Rh>1;unf1X8ruC=O6BamJKPD3KnQlyIGa@2~uS@e^S&IW(;^w_5*;ZeQa-xaKPD zisHbh`XBH6$CA@U4*GFZ@aB!k#cr<}Om4G|Ex|*}dc_+3WSB(X!k$i0OqisM?ocs?Mwv`e?npbV=>&z7ttGC%U|I`A94zBk$m{GHwj!#qPh^U~NI zCcPx1s~NPaiopn^^I52l>FwEd!|xI~m&S1u_V(<3qD=tB)omUpXJ-)>$eMFt_sRn8 z#SrF+xlOlzVs7<@6F&h6qI;f@{L~e51KU&c@H0CL*qKKSI9Cp&YA+l~R)Kn?uaU38m!NS3dR5 z3Xu!@=az3o>TAS&fU>J;Pmd$!W1P}g8G^()FgHr-{d23{>xtH(XGMtlKy?PT$LHaC zK@YgY5i=P=5QyEALKCxq06LLfsfxai56rDuccMqg^z-KiT8~_~`g{>VU!i?|5K^Ig zf}UVKq(wLRkpvsW>BP8#w(o?}*5P$SK)`h>6rHcoxF=b&c>wQYO@R0ze{oYyL3K@X z-YO_Mv6RMhF6gM?L3Gr(7I8bs=#0G9KqLmyOv=AzCeG8)G7T*IJ)d}LK(wA8ysaH5 zBLB^b(4$;v#kB}Qd4A~t$Y3LM9WwLlP`bAcnb;7v^WK=sY=}w?dZe$|v11PDD+I+I zR9Nfk9dj3VKJ_U~9)3T?1S~ZaDMC2)8;T|uu(|% zeyzk6!K627@YxkjgOv@Ff9}Mu1*M%p406$P9|g(jt~u<=v5TU?nEWoPk}rm1oS~VP z>Z=n{l`%#>xE(qK#l(3~g2Qn`KH56A9o3-AP`tMch2!a3fKypQ`MA;>uexO9hi5>C zpqL!`adamo%-P&hojC`t6>CXeo0MqF>7Xl`up%Wb`P^A^I|mmQ6VWLL5PxX>5q3)N zpTl++u%9S8AlbpwNnL4)4_5|mqu8sKM>C{$HeM_!CCrYe5vl0?-Ga4y{j_V`U|-0Deg`>~Y92w`Opm2-oxf?y}=f z80G-f!?vDAQSxRI3T6OyQwPFwJxGPzISJLXV@Oa;M4BmVbC-N|Q)`W-Yb?hT6%}P- zMMMmgyxrDhI4{K$k5Lk?kAL?d;+=!(|10b1+<9&=BSM36ruv5dp`CfaBh}x=g6>FlV&?c+)D)Q&je#vT} zMIhr5K#!E}+t_Mr=0I5+jWog~wpNwt!>PzbHG$k_^tTu2=GG1iW#rh-^%S(Xru8Wu zHCuEl4YKTdP!!Jb5Nou>WLbub$g?27qKZDLLM5ULWjKlaa!2b$6`j8@{S118pFSpz zu~}GMUKV@%CLrhba@C4i%EID)adg9_vOwuSh{o=U}UTqiA zTrzhmo%dDLk2i&eAzex^MmZ?4$1TW6hZ8;3ck3mnpFq}$!v<;dBctT6m(161{bh5f z()nEJO_!oXCYCg6;*5Q~8i*G_n{^qwQ&0+g{P2$3#-7Q{T`PB{fB+7BF$ zF_T(-`EgFF@w$CAPuz+;xO8-{aKqjgiipz>W}5q#9vE%?!i^<{E|ABA%v?$>ZX+!g zb;?_aMQasMtx-K+aKcIiGQ#}!*$&{e^(W_CNOTIedku6}x`R+;i>$NEn#7Kj$yu~{ z5s%x^+6QgH^DD4UA9@@^&<%t*VxJJpZh31x^S``US}5Blf! z%=?OVQij95E1Clz@Beb&PZs}6w3B|u20NB^9SwKmEzK{^g%lEvxny<(Oa+rO&hH35 z5Je*eGIIE}-*sHJW38K`n2*CYBrcP3E{9DrG11I8gXCCjZr6~Y6r@hD&yI&S6{mgd zojyRL+!{PATBEjy8C$Ag3+F0kLm@{r;kg~dc0nH z-c@=`KVWHnAU$UkZM}T@z?HDpTIY=^SgOkrw>OpknsN%X?6+oMt%6c=@ZLYzTbr|U zIDeR?4_tv?^9CVP*L3MZOs6U_7JtCkU43rKq00p#u-`p-LFMmHCZ>FWldh+iP;CRGC|_7YCk z;=t8qF2O7M@Rg{nP)3-I;H~Ho;r;$fstHwE)~ix7Rx=_cDT^CqJ943g<-Dd#%g`j0 z!Et9hgA{-KFv2p+^fNd3r!`bL)oRB|38S zCinz`hc|(Q5k^a0x!2K^ z&MLOO_;7D&r4G=cvrS(|GraKbzFMRl)^etBzG-b}y!tHI4rzU)*UqgO63ED*$B>Dz zlPc!cYtgQ;)zHGv5sjU#g;_-@;%PRV#R}J*Y?t1Mo)OB(;V(o$>rNg)491NZ0vZp0 z-754?S5@9vGXoM+cGnBqg0x$o>u#7^w|aquIM-;qzTa1FpxYvJ&&po+Adi|+CXqC? z;*cdL0YNg~tgn0ovtJ+snEnnVxZwVug}ni) zdfGofzYZ-E%6K--4!VEOhmRW9}ra^)s{r?zy^Ef$+YJEJDOeT}bWR@h8WwJnkBoGk$U3x=E=zZV! z1_HhB+f47ERx-uHC9Ri{p!sygR6A{JMv0&d8sKo~OSiFpCQ_=9Z>;|JJu1U2u{6}AUJCt-Whl~8| z!5${T&6nH?1ARMj`r*OsCxu>kNtHsw>2ie{I;9J-iZ~(a_22&6Fc2aZY8l;oQRn&F zgefzz&@uARls`oQLNk?_Zq^tT>6rE0A8vtl5wZBP8l)m;M|~?S!bcO~3Fa2omwQLlgVS z(f{3BI{$gou|4xUIQx=e%}{ah)`2Jb|GI2jpM8XzJ^s=}2RN8#;JV*3yZ>~I0>6dx z1$A|{TvposQ?gLiN$l!c&U@#vbt8*801tXnI6=Pu&SQY;PnxodC{u45g0$ZoSJ)EV zx-Y@25tE^j-zVFx8#i|je2GjVbo{o3j#v7M7BdredyHC%F;`Y6x#D5iW)YdA?!@iV z9e3Wmx%2zO@H94Wg#g}4>GDSZ6q7XSrrhv?#1*$YjQi}NTSC!kU66;gz95ItKn-3A2xsLn7*GY#jX7Q)tJs7_JZwPusGKY9M zv_3^OnSjnxsYZjL3^FZxt!dtMYNu#o@Wq^fl zkz)hzQsj6!KmIDdO2p%9ej-_BvUC2|h$_Wq_iu+F{#4v(PS)L&KU()uHYdxta-95b z^sk7_9sS`yP2AY6%a?Z^xEpTRn!hg@*)+@yS(YB}|H@!t;MygB=ipcWj-W{FKL@JA zTfjicXi87}BbsC-!734WKn^9jfo~rh8ClHYgAaP{aqQb@;}+lSep1ziM+{W9^kKc# zpildCK^0t|HAjx^8d*#PU?9$kdv_w&9yx||=u2kzBX36l42-K{)dFQ~6sH?c{vq_4(?mOsM5t-{N?vvg8-Jh-MEdA~=+!!!% zN>XO*F;!JA)zB7mg3CStpGr(76-2F_mmfIh>l<%pB|Z(4joA~GkTugt(wzH2Ofxb0 z#zS8+c7FUI%=Ne=;ihX;%@hc!L$S2G5$6;S;|(#Hly|`~^TWq(?;8_!RTRZI@i8K* z0D|<|(PIw-XD0@HeViWS`p2Gi(KcGg*aIP&qxQ^gLLJUy!#LhN)gztR2Oj(^&RH** z8{|I!gJUZC$HE1_c6f# z1b{)5HMQ(olmIa3P{mIAh(t#lefNITKsk z4K{;I8bbcE4P`GvZ57HZptyz>u@)-SDal5<60;uO{!qGOWeRv5r5fZI&s%$gZGu*9RazuSfE_c}Z zSs-KFbjQCcLGn7Ok~#3?v9%jfUbPJnC_0QYc?^aW@Qe+I!G(T&^4N}vQ*t|pjAjhO z-u`0)!oBE~q|D~$0P+3$@-55EBbv_k>Ai`*Edc)8Pr;qwm!F)mlxpkK(-lL~J#FSY z^{nUNO^6x3XD;Z>K2Of;;EsG4lb2sBT`j<(gz1*wSPmN8s2}~ni|9TP6$zzx!`SNX zUf=o9OTsf5Zl&x77;0fG*v9G6^lhO45i+*0H%VZI`*C3cfjqUq*98Jgn?EDj`se-0Cas zgPoPH;0R&d>DH&RjK}Bn$Q{`VgNpIdS7GABWRx4a=xkuJ;n&B*e7VD`dzTT*ksQrY zfBATTpmx7Zs-NvwE(}#U(vT+Dx`qz79Hwxyo!}0?4dG%kcjB%n#)?Fvtb2!y6&!a` zt%CQ{!uCu{p^+91O=&*fO5u9wO?V7LZ()sI%;F9|*MBZ|L-dgio!nc3+K`Y$evOXC zo5>vG_N!b8w>*K{Ya(aosEEv+$VPW}KK>@W#myuPQP^8IRq+-TQpl@ObtcW=ewVc2 zbVk9l^!rPrDHlK2yYS`iIV#=UQT>CA8wp6{=YcMyl_=OiG#*#R%S9!sx%Iv(_QtXC zF)RBGX*b+n!;c|1N0)oM;+N5O%L|Z4f?QXS;uLIOXZ)U&xsTsOsTSHs zd#4SQzL}ReFHCgzO7GD*9TZMb+D@nv)4qaqg6=gzaRA$WX}8=zk^aT41x1hk!Y&lva5 z)D8e`&Kz6Lz0g0ml}uU^qR7vfc1qtUGE%QBr355 z1zjLwaSGlx~MVD*|Tj88FLGlfuZUWLOH(v&OLqA4OC7V~ciSYp3kJBKTT zw9?kpF$P&7?#<|sl!X%=@~(LT?}~WbY%Sl*?e2VYVh(#)wKkQlvPiMgH4Q3B0msd~ zSGR4LTQer+@yFC3-9YA#b#^}q+~mO-6xEuBV$-g6)N3hMr>(*_zq%2>FXD0AcYO$( z;WKaA(s6E@yYOTL8KQ!iA?v{Y!Fd0-m;OeGAoI-bC!vY8-bt#Z=?hO&RBPH=us11P zPR7lu;L{GDiJlenxThuNUPQ}er+6l81{rn|qsVKfJ7d;bXn@Wx&}WiO0WXJ84T` zc0Y+J6D)@Yf@mSR%~ovzoXxnUa|(1wi2Dc8x41@*wTsyZzTl zYX9Ab=lZ#KKQy-+E>hI#pe@$iRH|T$)$0@|KOes=CUdj1Zy|2%{JA52C?4jbfMS(J z%{8f=)@NYGSj2z8$9omsb&F(f_4-pkLh24Kgp<5DH@Lky9|#1T)s~$`q>DEOyrx(y zoVB5Jnm)@t{Yi+to`%R%Khim(z7?MS#q8YpMq4)3c6h@8Yt^+7E+Y+leGR)e)#?d3 zgJzT`p{GvyDB#HeFZuD2(v^MOwioACa(iTRWKZZWAkw858icxV2noXOk`6VwE3U)t zvMHMzUVrLGusr4FA+pX5=k4ljA9Ph@~3=+tNi55 zg?_t$NXnX6;D7-)JtT1$0BcJkv)U?(SNuyZm|KH3o$8U!k&AEs3~<2M2ynor?wvjv z9Hh=;Cxv13XKYz@7X5>5H0r_i=C%Do2n1g3DIVcomtFq8rVVmqdq|%Z?0LHuXtxFg zQ?(J}McX70-`o0P%XTVm=g1AuV<6w&J2$)rCC5M93kW)bT5;qkdZFYvmSGad$}htj zNj_d=H3 zD&iR8i+l@T6p;H83|%iY%Qjin;Wp(+VfnO_`bdicg% zq=THrtlq6Ye|3Gkj+l9@ZElF+*YgaW$Ocqtz1ik*q=9|Mi^*!>FD+u-yzJ=>ojWvh znRzd%S26CAp=$-FTs9wXPwr4ioGY(R&5&D>qtc;jh4H(iQ7^+C&Z5ucKDdn{9(Uq% z|IOnP_wp5P_Mz{H3rZqhd6jZY+_^%&Y6(@8UQaEDpc^7Jw1@ZgloMWJ z7=rkD8`HF1MZFGj32rJ_HwxeL?J(N2n8i`Mo)WI|)?I>GE0p=dfx)@BH~aYDH-KQZ z1Q-1$4-9&{zRe_pk^iYuL5&(axw6b%3NofTZdE@TfnOjZ^EavlajNrLgtQlmm0pk$ z)fWKXYK?~jUKG@E(JXgX0y0EoZgymiaP@X`V$RuT$hq`68LP6_q*X)CP?0D_csdG& zOhTQ{QWPtFANION{2HozZNqj{`tvQFVv4j4+DZZ(`7!YpsE~|`J6NmM>4<3aa?TNh zwtgxPt0U%dM^C8EzWJS_6P*|GWG{L$#8E3otLRBNT`psklJ~bw^c;8O-DioPdFy0H zl_5>Tj-Z;Ao z`6(@v#8JDu;j`-GQT`JzFJeN9c&P6=B!DYFQY2QMY~7;^l4MP_M2WQKj3Q^IvQihB z2kW`}vk)X=akJOI*}GRGz?c8ie9J6) zLo`oKMauDDRpSj9GTepJkR~E?71auSz31J{og>r2Vwqj&#e~fUG>ot%Zb|#X`h+&d zr7CkfMnz=al=LpReqA9(Hafe%0vY_Bi#F%ghiPS4uc%cjdR!lIqcyZcMCPdJPZ>L( zstMjc2^i(Q{i;k#XX%Dt!YXi7ly|1Nzt!PEi^-(amaS87%;CbuDR)+h2gP1(q63JIIz$Ai%YD;1{321@d1&Xxggu4@+kAR-gU zT>hlB^MhH^mpC$OLI!_imdF@W8QL3)v+y7b8N@xpgU6x9HBf62kB@u=8t`PNd<}6v zFkwkRCO=_yfov{7>r#rK&J=eVk%H3`bivgSB;uhMgbS|F(I0H>+;%lIggAHgg|Dh5 zrm9vtV38UZ{Iz4`#_$W>FYZuk9pb7%4Zralow;QaZiPXR1DM7#7B zztdN!TMMK?J4Y51F;)N8i-+3S(OpYA2m8V*n!;;Jr5V#^*+f%j^BE|a)t=^B2Qlno zGWYt;@7X%<93+|&o61JrjM@}aW^6Hswh|+og&m_JGBZh-p!$qCdnF6pB zRW`fQE=eMS4Wayc{F0bVwuHvceb?jEV-4az&L6&XX#e215oobx*S$z5wC)P zZIqCm#fV&bJ67DqEZ}z@fp2tFii*Uyqc=|@F&iY5kzY=oL64!vWD60qF_*6EfEC*l z6uS{;2Vx!|Rp|>m-@lQJ3Cu7FW#qr7kZDxwbiGxfF|(v?oWS>lTz?3TgosCu;L#jX zismneAc!17d=y{BD{NBcQ>k4Jt)roL134P0d*rJIIegV(7J|F3#vUT|!^uvL!`eJ% z3&>MhI!`;M{d##ip(Agi67DTnH9x>Q@#4!Db@tp!rVG57EAbh;Z|s$&8U@CxS18gZ zIO9!ucnn=m#cqNcsz4Vj{nU_epAhO+FmR`bBm!$*AUb93uP z7IS)l1pKYd#OHAyDL6xyk<8WrBGm3eD#ySwNgo&4{`YY2_Jjo793Uw9ys>FXb7@~w z>G5h}0hOYL@*H2sY+6j^UOxyRNgRG74DK8Jl74_hJn|i0t}5&<%3D#m70GfV-i&ik zeii0QL`F{70aZuyHGVoDSh1jm+GMz4q0F>ZU6KNR-p|?YBu0NRl`mQ(Bqnd@Ja#7$ zW1BrNu+U+(xVLRi8i1`~0end=%DwYte8*xccjUr(AHVb!@*U_265GhDain2zs40pm z)T&yYtRYWw?Zaq^h>Un+8IDmO!xrn+!(z8aMa%ec4k`k&1eJ*9>oH}$NhN5meitl} zn9R*S_ie#RfAKCz5qz8&iFge3s>c5oMoHNh>ufKtu#!u(11BRM)pn*HWoi)8<5C?UDp!@R|(TVAz%v>)iJf*1;jkp%><40i;uJ4jXbTNxNq#Flr!I59A z@4VbazriLQSiLZQipZ3$X7kxCEq5v(v}SoZonzRAE@t)co4LINYjwjMF)q+h0O|`G z8csG_PCCI%=dk{Tn&|{D=iN6&l3%j@$u!I~s)s zbP9i~jR;(P7_vAQQTf8e zcJ9%iV<2}ug9eLO+>z~D&*C1v^X1K*Yo8(W8w0rx4dPcRw};Q!CmN zbUG`i>G#(p(1@PnTz^EA+3%kF*5=N)o)!j!#0c_@%P7;e0IjBhtZZ*&yf*HUpJOTi z0QJbOtIp=G_{!l89rhRGo?<%Sjx&sva+WN(1+%df_u2n}hKtA?wX(`@0y-;xiB)bq zTuT=7blj~jXvz^YjgWx!ukf0P%&8{cKy1@(@qy0Eznb&(jn~@koQak*jYQQOr6b54 zc0LRHAtsXmB4g*tXK|Q5rgz!o(FFR9x;gz3ptFOhoB{?f`e;pXN{zw5>1LX%`(rsV_&sTnKqlcTDS(a<8%7 zja=hTbE_v#`ABE{nOPF-!p^Nc{iE{-y7mAnMQC$KKTYRsfp8v$52UC?#<~7Hw`={W zd7ar~hYlec>czS74dE<~r-6;?(1!6ZN{?mrIa|TUJ@|K=d0+7&j^j`L1h@Sw7tf!0 z<4k^V`<3$z3L8*Rj?@%2ki&Uk>$_@5*3g3lu%&9BW3tT8Sb znM5Xh2|=ol^}oDqvd>7&f&^v(vzY`i^6P_ATPf2_%t1$@RNAI1r@0&7hGvP#y#T`= zR@1;cb0`XGn|2t&bj_I5s>;EFHl*MZ@6PQQ6O*~4)0bdL2p-?q`Ng|rNpQ~|I1N9| z@2gmJ8Gr>7o+49^H~c^wdH(<5r$uCfG=eh_vZcD@tvRFtlHgW;Dfg?B!0Gc@Lall^ zQ>_{^+(mCdfQXE{eWd;Lf^oj}23a4m&XV|6UWTl$2lzUI_y8h)hbD zz-ya$dUNO5*Li>Yz{%*=pl>RcXG0bv1Gu0}-WuoDz6lv3GB;a17pn-lsN4T0=?t`k zM7Hwnu=pBg9~JaPtD00Skw{3165-%rF_{}TAxIe8!p$A}AH-dc%pRD8W#%{ic2zE` zXA3zGLhln6lbVyi2N5DFclgCytex+^H)re{9s1&u{uS$&jObUaAFd3(&^dDOteci~ z9zA$gWf^h<9waApu+=+E8k@B~6`>sxHWv=DZAB@=DX+b3=a`tx9e(VLvpY9kds(<| zGda)DZ6YrR)rLZX_Dc%Yn%^d?Aun7>9%+Sh3}?C?uZze4zxdp4?uxg{I1#=6GU9#69!#MLsAh>KOaUi1 z%H-PyeGw>xtXay%18BdP%#lEW&Le@#7M!(x#QFF2>PkF|JZ`pcADKm@d=y6SoQ2WL z7^q@|rqZskTpf%x(Nhqe>y!+U5YYh0t1dTQCwbW)m2@^VgN6^ukGJ$cQj zS^OAx;s`|c?tMxtx)=An*c}V~Vo_S;QPvf%u|cn-8LMy~>+7yZ7JMu5l11&t)3WxXzWEof|;W784t_+S?qdm=JC*?Z1Gan--A@2FRHdl_H{&Olpu zza?t5>&lvGM^q-&doze9Yz}vKjx45bxeu-DJhY9-AR8SL{K+?jaVyz!%%iZ| zg41qGM!~hl@u`ccT;DS&K!|#Kn>(+Lqsxg-lh{vQr=3w<&PC^Sa)Ums4ZF)(uDh{& z*2rQqcj)vx&*dcN{BnI~?BnBkw^0#z3A5Pg@=;FE1F2>|7{wNa0>jGeJl z+s+m}0f46xQ?YYQOy-Vsaq9L|_vpsX`psyKph1x(!!5y|)5ZviFzdLcd9Ob7L85_}a+>yRRs4}_i$w}_D^X8?GpAYF6tdqf- z8AG`eWZY(hx0zOllv*W`jt%Q#GCuqt*hxel+QfbT{H}08aN@&VoasXvyD;^Yk!8}n5?$m){sz=(;-Fs`p&*!kKHqB>AN0wBpR?YWl5re?fpNi{5Y*&T)~cinch zMnvY0#DJ*w+e6>o-03@`i_JxG+Ul{IrZ6u= zJe;z(c5$cwzO2FPbWJuY1i1dW#8<9JqVAl z^>VP=wQ!?0ZK#=~akCah8h3*bdsE1m!#JpsQnHzfahKslToA*APkMBPhp>Y!$(KybJ@yDIr zu~Uw5XY9^TWB2BDcQ4%-CZR=IRVzfBGbD5do0)dl0Jz%kdApm=c>l%hsh{KyKYOFF z`#MJ^i;xhX`&P_vz=qMogV7rP;je@UDgzrGYLvxF{`@p5JrzHmcYA zyC{zBwKeQo9c?$5kc^T~BPyz4&&E+u#oyflkfc*`JKMj#;?uny^NKU4?pr?JD!dEu za1>n#xHE|GLf(!YHM30=k+qR~FxW*b*(o3C9Qpo#Aa@6?8rP z!#OPr>ZXvo%g^OYp?4x4cf$Ygviq<6)+hV8&HK9H4cZivirg7w>QFX=tr^PNTByC) z>;i$9NvvFds>NUTIDK48h&q*^+k!CoueW$=h~3(Z8Rr4&*jk;;IACe!=&>bx-F>J zIUM15tWs4;JvmNQ#20-sf-e$tDsR5|k!@P zgvAw8Z;bpK0B6XSJCY(Ff~A{;N%Kp0u51Z7C}VSKs^-t>&CMKlOBQBVMCFd;6L5kE z^wCJJi(nZI+Q5623LFKgVqtevpVLOPb$(oan(nR}SxzA19ZszVu96S5w z^{0<=-(23R{hZI0mMcNHBvv@wTM40y` zB{oftdv=4KzhcUQ;Rz@k9LfPk0sW1uq8$u>YtA~JXM zJHN&Hc^3+dKQfIE*-V0q`L4h@e4`EkpJHt)=62=W6n9z;Q{%b{I$Xr#R2zU#g`Ad6 zotG+tN?8{^hoMzWjY>$T-C?8BUG&L%g0@SQG$nn1x{mlc^v?@>I%8LM-B_A45j#qi zq?A%*ek!I=RIt~W{a2weA|5yX^VfIr6+~aSs*4K-OcC?K6p59PCFD|;m5p*%U&0a( zIXg#1R2~)WsjL2HQ|G1{e0<@qu)1WpNK*1fbOV1~ej5Dp&eInUUB>V4NRTJrZ|bx< ztzj(TmPbzIT^2)*n8~%=7p}vGM9c%QR}z;iMKicO>Iy6m?xCm$cWD!5kOA9_B$z=K8+&*hjdB zf41fVZtRh(pW;q`th=21!)Ll%W`;(;yX5vh!;;a%qX$Q)M=u%GjGjBXcI2Ir=TN@v z-jUlzt{EwyVA-CLvq`}+Qm$e!^ul(f7;>y6vy(@RE936aX@VA3c4Bj(%%izZc(}S)-<>2lWZ)|UHw-ift{5;4&;yeL%a*^i{F&tsF8|W< zPcLsQk1RJWr{4@9tl-?CoX0Uv_NSx0Zcw*(a7| zm${c+uHAsV!+l={Xl1?c^3kW3 zY*^B()=-`@*R?e2?geGClp_>k0{`gMe5j~H30K9RC>51K8(Yl#`GOu5^^7x_r%IZL zU1w6cr!~=Y_)0DnwKA5W+VNZ@s7FCAM~t25$*-uUk&q&B)TRu$l`%FWJKMZ`Rno1t zRT7a1QsLymqMKczni}1iHuTW#n~Jd?xLTu_lYccSvAZP17tJ zP35HdNWNrv#{IUy@HZ*OqVc60)oMHxOYB`L&{duYW6lQs zl2%y}jOUg-#M2e23QO7i>U`84@w8M~-$BTP8)Z5=c5?yYJz}%S*;0lQu?F)0Rq6-;~j>@p9xjNiz{h z#^f^9bk>{S%$I7a$g?>K>!7FQ#%Zrr&*b);D~R!BGEBvd0#zk@G7`)TKPS-H!Zc;E ztJxWOQ|(rUq??pH1LxHhRMc&S<4QU+)y^rN73foxnVMG8>V!2|X*T11XA1N}pvp|C z)h16RB1>ze>-GusJjO|{Q%Q|QdD75~`Cb?3Sx279XbW@_ko4|Ma>gzUq%4znF(EVh zG^;L9lwwdANSO~>tdlG2&VV{tYG%)y7vwYNSroocOEivjKoL3p6~2RHa$|xjx}@cx z)r3Ma7MlNEX)B6jp-`-9B4xB{xj{h@XQb77oOZYs@tA#D)=X#D@FjC9(vqUclygB7 z)0&z}+alxl3WD;@9G&(U6b@4`9j7A-hd|F(B$Q{$PRENLcY0d7!XwaA_9mmzXtlPe zqvG%;Y!-oTOoiy0bq4pSdK}L>*#0*KhSZ{>;+d@04I~V0RneE2r^`#MA`(gz^}z3p z=5mWE6hHrit!zJ!0CjoPJ5LyC+%iNT}OD0h9fSI@A*s@&x%NigWp z8SSCqj72GsS=N?}%1TQ26m4^xuH%I;(|QG^)))fGk||`V=eOO!_cBwlv$R~3&L|TS zs-WEdPl24*I21_PGnR~LGtEe1f)uyhLzfLToxhYz7ai0^Qi1L?&QzIfD(%RrDN`|$ z+xcxlj^3fKPKE3Zr_zx3CdR%aJg;FAbb^)X4O)3M?uff7;c;a=KUK%&m@=bE1u`DK zY*2-+>sU5Z(@P{azsAj&O}rGqMEa?zoGcf&RXsD=nrzFD=NVEzm1j%oh@u`<+Lhbf zym;D^ODk-&->4}{tafJNtHR?3rHU!17?FbskS1i+|V-q zajIIRX)SPVRCzY0rc-No6Z(v%LIn*brd>2Qf`+Ix?v*Of<6n?er=}Pa(iV{u7F zeNnHO<#tmQv(Piags)}Dd1UcXlR(c0y;`Mjx~|CSX-z`G*KI7f6J{+NOPh)|R~2>c zqGzw{wWiz-nP^7tDH~+zv@;lqpT^Gz(AB7^$*KbFx59S)kd|`B(sE~4qG*S_G^L|N7zUiJ-%945tO>6 z(p?t`bVWhK<`dzBqu5p(nb>Z=9AddGX;#`^8za>vDHJIDh@XGFHB*=RXg#a4SOO`D z)Dc&FLSWP~DXNvJw9_RY!fB}s{zITo8xu^V(Wn?pp<=NVkqz<9Y$+<5XoG4=YjjfS zi*I_Df4rG(`WQ+gOEygLfR4(09uVk>sF_M6eA$_NxNM{)iM^i|7!mChRj{^WNkz3@ z(o2Wd2z0g1NCn%fths5bd417y_)=!&raY}<>IIc89+ldn*~|sM7M`c_8rBomCu1&o z#hhifdiZuWlEGBi$fR?@ayVE??3fY0s}W8mX-&Fib(dRo3#Bs|UQWYTM72V_uc(T7 zLu!Y7m@o5KZdl`Owh?d}8v!dy^2x?77oN9zQdGr9H3F)dE2Ph#b&WtrNlPlHjD{&o zvJ&%UhPL#~PI;z5>B^>xqb8w4m3U?&UnH?yuf^MpD%xVLrV+hrc;56tCBDZ<5G8{I%QN+s81Et`Gg`P<84N{ZnQXQ z%4;oUB6S)moWls~sVHcLFDcw2+@o+i*;<`Ru-M5$SFJM!;AytoT36jxi)ER~UkWcM z7RP03g-JS{(;`N%s*IZ~nutNVdX9g5+BZeBAu6bEHTK9!SK8M(4H6;?{j z#aiU7wm|o#kb_e-v^9ZbR#J&et`x**Efr_h<)&hx0#(ajbS+P=)LROLN0v)xEG}bP zKDmoXnbDLhQ+^AhEtV)}HkmO^XQ^{|@s(0aLZ_k6i zC69wsez`1Hkflj0f+1@|>Tl|+aof4V2Ph&Xi$bn2%gctWJ!0cMp>jo1LYZx6+!dUb zmBW?fZr+72m&?%>t*mKuMs=Z;sHB!{=EanA`XJ?L1d3AgRC}h9*`?syQ}!59Bru$D z>ve|dR)W3YLV>O=TIhgWfmke40fi;Uek90|SN&eE#M=&{qbsTB;ePma^?2bo76zWsK5cU{TvE)waPR^}WKsP^wZYy4|d| z!!3!d5s6U3N>nPg-Bc*=(r2k?&=yHadB>()%7&DVcGT|3N|jE_=o^BRh^NWAD{kQN zsO%P6!TdYl`jU@T7wd_cV%x9v1hq1^pj0JkL&Ahi1?iNzSZ%hYqyNJ{Uu+j+9-p6O zg3U;z$)5f>UVO2Uw9!n>;M6%Rv_2v`_cDQ=3doR$(YAS-uCP-V9aair!nJ5RU`}Kt zsVHrucF)*_=M9l6EzwGv3xBpkStv`)Su=8&Nbgd`@A z37L(Rh9kO65HIg7z3oy_Y@r{y{g3KYxi0Zq`5#nD#p zn=Zc{M}i_AIorY==$nYDdH8lT>9niyRhObo{K0zxaW!5_!8AP@Z#?Xc#dt~A--a77 z5s#aV-PB7{T;KWgZRj3yV0X#F$3?dWxAV1N2zcVtw= z;|{-z5TM>ot@=w{0PU$0>5Q2vCJV|&I*SUWJ*}QVOg|bR<{|RuJ9|5)e}$+M`ibNu z^8IA80QQT*jI9McUbE4fCsSjB8@-d93oqtz+r3-Rfa_3zu5>3k9gNK$ATe-!rciyB+6+|ocs7!ak3{Slj~wzXW7@f02q(Y9w3>dd;z8wYtjYiMl9hE*el** zInSlOj`zi61o7Tt>%8!Fa(C>p_#7Ihkg=*=wMVmQZLctuR+RDo$*=O=e{y?tZV zXxik-mIZP4wq^A9qdyq^^76^0BYi*N#_lm~R4@JH$mxCejx1gM zht>bR`m3uCuFkKvua>M{GyJ#VpAUa$_;bTo4euMixIa03#&G|tKdt)Vs;{rQZmD@y zah0?G-&WD9)-C-$7rn=HhPVF7Jx8qnbI;dTm9^5%NxZ=eX-4%B){ayd= z6*sJyTH)+@!Jn~vfrt?Z z1ARg#0WwB=Yk!Z6P+`CuQsICNRf1xG?6WmO*?eyD3I1JI!*0-{;ta4a0t7Q8oUygd zg)Mu8cX3~v&&}AhF{uq@WkNJ=X|pC~%Tk`5LdhB*W7C?mAzWMI_M3HhUDC~Yo*U1S zia53`!kpXrEH1Z6gmGqbfd658CS0&dfRYG^3_Sv&%>XIP=eLds?`FttJ9!=-J3}GF zK5q-ysLdDi>@dQ)LsB3bQh;1UM722wD89nxkMN>#2ObDDaoe21696c*BaYmj-uf2L zMTI2v4ymz&$ZOygxTJP%xUkjAOFq>l@QkfF`3d2N5&s>=w*WKJ8!p%ZYZ3~Cn91G3 z54X|kY&h$JcyroTFtLcMmQHTvxi;En@HHI-{)EOAxHr^5(I0AZwIDfTZ|l(~J~GU$ zFnZi!@MqUt1@6pJyA}W}1>DDH^?8RD0s?--RqG3@yZp;BX&ATj=umW~I*pt9mc4Cj zEO~C8YxBnOd_0X?cnl;^Knmg9%7nmW>;)iewsRCPOK4lbg}>F=6?X_++U}jf$m2FV zTnI_R0dqQx81bPm2y8&kpc4Txi5FR@5BkT}UPf9?8jYKDI|@>v&JqAt!rnXzQ-vf; zzQ=RPvt)b$TjTXL?QI_e4Wc(*EpVYVew2Gab7rzJ35h z0Mq30!^jmti2v3X_#ehB!i)g)3IK6Zt#AO{jmft41kVivI~2oO2&2bhEE<8>et&*N zck4{AGvoNdaKWLCK?_2Sa2C~_Fy7lt!pk{)Kk7cEr1nCHg;qlq?S)P2_(r=LwzjDW z4rBMaBnWW;_KS&G&rde|pA8_M;ef8ui}&#AF=<2ehWU4;Ghq~G#`q#=!-iB0pEQiW z`}kH9TvL*TKn8)1;UZ%L$l*(`;khfAGNur?Eoct1R8jyW(n--5KwOHo24>vzY*b-mF>*xr+d!#BeXkh3^xp+8Op6(* zE{GxW+OPt|07Dy+4Ba4bF=)Of1`^3D_)#>=fqa_P(RnV>2Y7|F!wV~s_2(Q~cW%`- zo;zb>$z&m>0dtnJXH`%=7!aYWZ4}^~8leCJjEHS(rzDtC>6O0~L{lhh23v-rWN5gp zfX>zG8sqa^NjU2#CXE;`^s-M1d&;iAg?|^i(Z;l&$*N!~0fB^QBs|s{XBOC6tc=iG zgyWz=wycZAdk6?axk-avcfLBjJZ$rBSgTB@iVq2)My8?-lP{cI$2(*OaC`0+Y$=v7SWS#`h#siUzY9giVG+?0G8IFNZAP0f ztmEyxK?kb^JT+uRz|Uhsh|9xDKy4880~VZQmch-i0n!@lCFZn`9^=vhES#hgqn&1S=wz9$fHhkqqY5H3$B=b=eGYGIjXQ6zsIGZHM|fy!o_4 ztIw|gY42q;kT|Bq3&c}!s8S4aQl$fYS8Ma=ofO;)IHs6*Sc>4rs+!A|2=C^B!;J}! zW(DAiXk$=LUvqd!;ATTJZ51HUV2$Cek$-`1mtXn{&juA>-l41-s%OJ^!O5b1)KcC; z^x*5TA0M=(> zdVW280btqDqc(vn!5BBOUP4bWUkv^Nx|$lC;JIlyvwmRTxeFnL36Nzygc-H$-kEu} zy$xrZ6sg370kk+-XqXA!_tmDcuwWV00(`KYgZe@DX?K1ZZ(g)%m|HzOVi$Y>m|9>8 zVtLN3T_#9|9ZbV2=%9AwJ(AhzPp|tAfjfgm65E8V8;Q<9tb>b9mehei@N9VOxG5)Y z1>8p|R0*rLjav5`fs1{BJ`FAl6>f!5t`qhiIZ*RllXav zU4d^%&%h$n(EkFQXDlVFZWLaY+OsKicM6!caLL*>3Gw}g%>oySm4kx8G89NuX$Wo? zJRhN}Q!rSthR__$2IzYnTNQu0|7PJ`8tywBerN#=S8WEJ0c+kE=beb&T9?D_#fKf9i|`L3}T*AnC)?Rh9P#i%!`ggvC+cjvd)6aPbW;GNqtkh@r)%6AfTT z-W0fSs<1B#0C6AQ6O1@Qon7s~I^lVCdnu01z#UGD^uTYgX1^{>uy zuDa(GXE~k9#?Rc>$GN}Ny=(*aC3dYH;n2jT!#YO8VZVw^ZxEGl%D+{kNe%uFU)7gw!VX=VDg}BEpjicSXl zr8&d>*Zqjie&9RZ)f@iBBSI=Mg0l%KC&A2gLD6(@yU3;l6E_Pf)Z>VGyZeFe=!Sps z2zTOG$;55_-oFgWu79t4=UBj!)U?o&U$1skJba=v^+LZ<%Fmi6tDAXi-@JVz$bpiweareh9f?uc0FBSAg^U$a}vra(4uN25|1uk4Cw@ zKmPL_d>CNkSa&NBkPi^NGyeFQD%F)bAn8`5>4LM`Rw?-g*B--%i+J4jA6bzQ;(KCK z=b6VyLP#nc&}*4i(_~dP>!=eRCGYMW6_J5bd4Z5+{pH8WsWpNc391<%)Ht29s!^1* zR<1j$hGNx|;Xc`g3=x^zuDk|SPP<56I;95hI+gP7>D>Dy3ExEkHbF(X2B~fT3zQxD zeUO8vU5x}f0_nvk(3#6q1rr@jsGZSdressax$Qs0=w1E{Izz0B_iH5iUJZr*F6oJDCPkq@Dsakw)}iU=cT8~5i{aO39c6( zHyYMg;y#MXM-~2JQztV5X`Tq$|14T0;&H0y9T*-0|MdK`BrF_)2(A||s7fbdRTMDw z89Xh$qoo1%{m; z{0bK^i>X}S8zhIA#B{IyHIV?dCRJ23G#rib|yk$`pwag#i@&|8&=mEM{>> zp1zhxT~hs$+)p5^_+x+MQ zC->o%mv8P|@z=}nx$=j0p_P1&dkrOu>g-g}8%(RF%8`nK+iu#omV3p#Z|#_v$GzVE z-p-E9vJXHC@|fJzKqQtiCr>k43kuKQWZk!OR757#=67`dV%?|f>-1+*Pok?IB1zWJ zV5-jW`NsG}=TXDHg^bcmNrrnEa71^b zsAoSW-lfEdYx}q>4ju2`OhD53aZm1HN0CtU)M6fY_#Ry3 z^fHs*Jb~Pg$%6zajaM$AiAeN$m)vZ4G!`Jz<&WFcBBCh_?l+ zaMiI*ogY4jVcXnBi+EE>S@TSh#gSSuU@C>SmoSwpMA<7jUBoJze9twZEi3OF>+0>f2T~SiH_}}^d+ub#z zA{Hrgv5ULo$denmGv4XGee?BQ)O2_kE2n+-;2;{#fBaOju68ocoSilseAB3-#tXdR zT{K+G<4#P@?cqk~fkEyc?{?qlNnGrL(~FY$`^ zFgPL}_w*#GNh^JH3-{Q2-FJEd|M1T)YC1sTz=A}7TW6=)7TdC*M7zF`lyi|cpub`= zZuxG(EI98^sA%^F@r@j_2MOXDKSCK@N&+Ak=d`NemPJ@vNrX&r<~O@zV`3fbl?VwFvWO{HSpa#fa>v*j(w5%IY3w~$lvJCgN$)mvm{;-gLit$Bf`F-0j9 zZmA=hPQ{A6?f=W)yKBZiz&i5oJ9|5hf1qQ8RQb^*OP?E&3>$_nA8ZW#Xa9HmMoIqi zTLj|Z;5a^6$i-==!a0lF%XlRzwI=|~WwIwx_Z?q5qF%%TRPuQ}&uy~v#lGWcscZJ& zNfa+_i&je+lgfv~AHO#TIB>E`T|RPr?Wl;wxo!mL9Vu|g9UVFTf4owR9^bO<>d5Rt zQmmH8a={+ZnxUPNhPs^A`@I^nL7CttmmMD;`v7Y^HDKsmz3ezrhn)>;vB63m0Y@_y zl54X}Z)3AnDtmt#mFOYv$Wy0d!e)QExf5M}9KKks=1J;l&lIchnsQ-9CeJ-Sa2)tl zA~LzDwss6Fj^n1mAX;e9cgQ%T>lcGj*sZX(zv2YVoFy|f#ZB%5ncg@DtnD9BU% zPHZjr>0$K0h{ZiUh^UG??)(A}FNcpW;K>Sgh_4*{>cG#CQ+nQfPAQpX1VoLWWpS^^ zX{G3*v0iS~Dh(~FU=Vfr4<2YIRj zg#WdhA%+;*3ABedv{_Bd1zf_i#hDL=(@HmH0O=X&#PKzwA|6+H>_L3h^H?BmnjnHa zvj+(*9Pi#Ie97q?D^n(A#(*B6oe2LSg2LPIVIrPTc8Sz_duSV`Btd&Qc(Pus-q_a5 z7)ol1=X^$JmoQlS)?%>4JRou1CxF}@T?XJW#Od0ekz!^OY+^v2GQ&O`?iBYry6i#OtI#frE^l`CFzB68W+ zvuHa<7E?LuOT!pTQsMf|?ZOw$K!&ZYi1kMs0)&MWb>Xunl(~pEyk}kth`Jt2(J!{1{jHk_{rS zI<~P>*hPi{izUJ9;`_qtv%uVLG11=QtzdFmSRb3n@>b$_}~O?K4hkZ!}gCJUV?@jb_6;u)w@>4jd zJT)rvEDwx`qdr9fDvI2D!DlZ>L`4KkM4lo({jEKFa+5pceLlSWk$ke(nYG*6ZI$o( z3boL|WIBwXt8im%p}MP5(l&jB($LT_;B|=hj3EwA@s%X`ggDo|ZzMUi_rN+o3$CgX z@QS29l!<1DP(JSK-UdE<1*~&R4-KVYIM`l&B^+g2c0y&b!!tT{WlaFq_u8XDr@Ihz_f)qQ9u&OX8LX~K!DR-2qhQJ@a3gF9~KE2}raO$BU z^yN$BM_kWsY`<_|0YbDdTIS-Z+L{#MZW79Pxh7do>s)`z1D76JN7*VrH38mlR|z28 z-Fv(3bgJvG51i`Xp|G7vb-kmb=sSD{b1GMAuvS84E9+|RTuLgF@stg~z@m z*%J;P1)pb|D$>JX9(C)&>Zz3^nfU94U0>KAT2Who4Z@wmQpvHV1WQ*rA`wl;VnkKI zeEzNnJ}YT(xjeq7eaNto1T4}J-)K>@hI%|+RfeUeh<~+Ygx$A?CKpc`AR_xQNOFC- zsoM*LG=-}Vr|a<;0WpxRlFI1w+T|VVVNqP9TUfWMm-OC~$9KwylAqe#zFCJ>x-@?n z!I5Fd$AFDfl}T$vJ!|lUtF|mB^LALEy~P;8<{|q60IzRF=={o&+?a9bo`J9T{rNN| zEmkTBz#0#;4%k`Oz)yOMW!0`FYy0VI(B+@VsT?_iP}L+mQ!|(0kq` zE!?jFU|2Bufp-|Pu!AKv19o|E+_2H|O*bs;T6Zogyg19JO*wabePLwB#?yE^VD3k5 z4`fISu6E!&;_#Tj{U?$}yf(>4!V8ld|CdkN^MC&lz{BRBSQxq>|Ih|tc>Vb^d)5Ln zY!bOcflCnB>eFCd_sXgp2iM8z*uv<=;0AuihH{Qi!MjXWJYzf!84DJ$5&25^;U=&P zrySs#1kQ_KIRZa316T-2TT{L!wy8Ah^XkTIhtWMx461m(G$fekio05t3Fnr;&x4^>+ zl=+}ljZIk=1O3MO)1_~xy93ZrP^R+?V+Zrv!Sn* zj~0PZ4-FEWK&Fw7k?-YV_Yl8gSsp54M6A=gddkjPAk`SC7COhv!73aty)=1#@JE1L z|Mt?R_B~Z-(izxKltBWiK7Tei3@Y|z*iU$`BETx#WL33QD3FAdh~+hm5SBU;vwKx< zG0s=@*|$Hlwf(KPqk{~@7r|BGL*MMnkX8t*uKL_HU80mCs5UIj@6&*Bj!wdsS~STjmtgNotPP z1X{@67EOb$A9YVYd>e4;r2*jbH?C?we;b-oSP%%o3NMIU(wFj)saAwAG4`CL0ohv6 z5}$l0T=RQrva2p*!(Z;5s8gEdQSn%-wFFtzNttlmqqUQ9%;olZ;L=NzSAXgE2LXHs z9rVy2_43-Wmkchw%jwcrjQ~SfNnjq=ya!hIN|JnX>>r(n_SW{--UDxr)sU718BE_c z@*j|vq?6SBth6L>C2>I=xVw2eCHS1RvP)S9R~^W`*y*kKA*f>|3Flw@6Y(M>x%$w; z=_FSlUI0K$SfmKO3NKQC)hk&DPtqHV8GUTBmBbwX-%;p!FHJt#IB_+Ed7)hi1QkJ8 zVL>(VUWkN?oAUrX1rdfN2{ZZ4-LOD=X!6Mb1g>?ir-t`;x3@DeR^e7gld_S1wk|(4-!k z{PfYQF&2^xNi$9IBahej%1@299*}==;liMN_uUKIw;+5g+*fb5R28WfSn6C+I-mD- z2kbvTfHtF*G|1+0*FO0p7eBwTz3qe0LNKZxw!l>4g_Nx}2{rAkBhzZuuLbP;w<9Id zd*PPaLz16<+6Q51ck~UwCG)Wj?Qgwz0btH5W{NVAI;&5YHY9m7p1Jk%Rd=GztcL~* z@qq*F58Me?-0nVh@p+JC;uXckkjd0IcEd<>=)=fVINpgxJnUJPH&n2F8#lZ6 zBbnd;m%ecH_ATwN9a{i!QGcS&+9-#U5)3tyCd_j3#UF!hwzpUonTKrc7dQU|H&h9)%V_eEF-9J{7k=DZEEC@k+uHBG7j}?s;rYWpm^A!S$d%L) zNH`s4Asb$XDy8K=f1>krUr`D=n49hG+IMfQ}1-^cD+tWsxDv-k)mgTS@1Zz>Mt}iwT2#ICAQS`!C zFTelGuzGrFVEZF?x1aqosDTla>zA2C#A3-omBX=SgcHCuJcF5-9|R`7G^|U$PGsf*#H1t5I6 zhe7OmO660DAxK&9@PbVt4}JDY{T49DylbWdP1`F4Q91F*IfSEq?2z5902sZ6hc`jk zlM=#Oz_nKeu@>M44&hG@aO{V`%|-BOd=#Eh=l-O9l)nNJq}=}Xg*9uD^Cko_fEzb* zR|kJPPaLvLer~P&z~;q4`APT$TpC~Z2|RV>Q!(4=M+tg&%C~)UVI15NU2yS5;e$4K z*+AeGa$1EzH2HyVF6;u2#B);Ht6$~;eiqs@x?|hv7ae#(LUfD`;v?XFl!CYu@P&7H z5?RCv92~#3Fo_%`U-yYT{{c^+{m8+|1D)saY8a(B1b3m(C*(xvOMtT^4Gzr>`SyQ+ zCgOo77N%g7&h-hr(^F=7+jkbU>(7njTKmqz$6hZW9oaeXo_K};0PY$bwjt%tmP%6kXqx8A%@ zUiITAcCoB*Ju5&q2#FPDSV1CYXfDjoh>Rf2@C-*#B1^|2;9A8BJj-%4N9^YXo|KP$ za(b)$uYZ?@FH-JjXpUC0B+b*r>HlQKOj1hbt7WKY?{Y<9o);o4&CbL?EipqYmD~)^ z$H*C)rNpQ}lXQ$ayCRyQ;KuyME85ek2&{3}Q!z*c!LiH?uT(NKG=Vx37Ni+b85Niq zMTBXJIIBklDWAOiEf>7O{_I}v4;_w?Q6&|bVQESU)ri~-WXKKAC?zsXN-PPEQQ~qn z%Kf}jAZ5kDu{Sz!kWdn4h=Kk@!yLoLqRJU5NmH5e?tz4za?1PAMx4GkAj5pO&!|0w-I4 zavzC=8PJ=FC>LR8n3xh|EG&d)0OgFFVF8ngA_W+zFntzhQecSx%be`!c7eY>9ARUu zD2Ouz5s_wSh5%uvXljO%I6?&3j)ud_bHZ@@Szf;3S9e~pkL5|4AeR>kNz?rDf6lC$ zEjMqM_dowfn0)?vrNqbRC{4^LDHtJIfXNr40x?5|l{8H&B|=F`r+dUu`+1I&Pua${ zzQLNd-h5$K%=qi0AYQSsK+i}q5o#hCdWPqs(oBRV!!acv5x`uyT$6G?0sDaXt2?*7 z;hHX3u1O#xEQoAmCPuL!&}@XC3G1Ka6YHBm}fJx`|I=-_R=dGm5jN|B9GBFV$LSqjfLDOMlxDf>c_AhWFh(sEG zu`m~oijuHAOU!;H%Yaf9$@m-W5&-LTZVKG>aBhncE()79O@oYwIU2@}Bw(-QIG&Y2 zZ3i3dX?dXcb1bYTycfN}s@5%6CB;};DG(wo)F@1oq=c&AdN9MlLW1*6j4{zO(?sv5 zctQDp>eSlqJh9i)G!-KwVQwa>l+YqR9=z`8|C2(|^9f$d0O8PvB(loKEoJ;m_LgGcRWIq(c9 zUIDj-H&)T=Fw7G;ZlFA4b0eP~`rg1l&p2)%^-pqH{Zp#eg{T$MvNvO{Y^f+hcmPs<{tTXg zJtX9v(8)auE&)G7iZ0-Tplt9%I8cMM@}#;Hl>9oqoAIK^2VnHYpDavI_s}3W0$_)C zJcZW(6sa%aF&l>lVU=~OrXx#qq7)5s#S{ff_70zCe*^~Zl_aEN-v^#ECpNb=KSu2V z%{PL^!ED^|Kvhcu&Yj8;tOt{xZhHz|tY`A_bzO)sD`%ZibINI@B%~i$ zFJJczG^2+Gj*QMruodIsXP`eF*E4CkLs2eWj1#p$A;x=2Is(R@4yVx{0;e7tw*GV? zl~O-M0}P6)Fbpu(9A?C%mCk#al*g>p*-e7#0F|T6S3t(_?e`!F`E~h6`dcP(O@js%GW;!x}9DcX#GL8 z{m64@QbECsqP1|-(-PUxQJGktFqExIQ!R#>Jo8)71NPA1iI&BF^*9UIp%)N0n4A3a z+$5?k!A&M}b+($f>B0mASfD0RzXonSH2DPePEhjhdu>Zw{`CR`Sp-v*F+f@cuhBFM zu!F5A{_W`V(4Afy7!CI9mG8Lo^PAe4=V9!Svt)L80V*>Z-d)v%y`(W!u9@ZS-(OfK zKlnS)q_3pNCl9})lg(~(d)lR2{F4z#+h`NS#U(nFI^d}bKT$KYbu9{w|0H?Xyqfl+sB zt+)$rqRttT9=k@N1C65z0}fKJA^~jOkPJ(J>W=1c zz1;XG2wM*c+>+qM{^!a@`A>hn@e29b_4jXiZ{g!#ke~epsJ(ynuZ4?NuR3q&=)j4- zm%!bK9J4A`jmQvH@~S+hSe#m2=k!Jh<_%jJfu((nFWu3BZ4*{xm+tvUKJ}aRQ01QS zP3;dV7Qr2+A!-VCA`wn%?9wb5PKrookt6=%>Q%io`PA5F!Ct=asZH%S_bceEvAFxO#F0MJBSX4oc(Zwta9BrW1q|1>$s1Zg^caXxd>6 z@(f`KYoi@D+bJahH@Gu?6`H`x@8qM;t%H1DUy{ymUpTzzP^@ZcYh)0RaUFGu0UtxP z{MM1hJ+CkAm>T*<7r|NpYTG%OLaeq`GgZ+*m4g>5Z$VLV0b?cp4Y>W)hCE{B~{1O^2jI* zDn9pFrYh)ZE3YZ|f}&W{Nmv#9%%;V)(>*l#s2kE6bpn(Roxcb>vU~mriZ;StWF@gq zBmt7$q<2-lRZzeoM(gE~jf>zoxPm7C=^bmpQ{W`TC#NZ7-Y?E z)~r$(UtZAd#Rm>?P>T=C(0xxIO zn(Hor)|gh1WU;D(UZF7Ohc7^EAOYf$LEwWoBhs5|F$`&ez~6wT2=TTID9W#0ySQ#@ zC8e8hC>~iWJ0Cx>vHi8RNPcbeM+TsC*!bWLb1gTOm&~RLZz!0fozCriV5+b!)EwxarBNX|qQm7Mlw zgH%?Nr4S#jG`R@kv{ok9!&LXs09&*Vd?H?cVN3gc>lc?#I=HFt2fO=C9XBGyia?Pg ztD&EG$PA3#oTbTZp_24O%|Un%bn4-EK|MV*x%iEHp|{Wda&!CcU1;!~^G8+zBRq!< z!K70WCAH2F)77#Nz5S8Ri|gducPy@*T1kT3#XG?*5gqY=+_4BD*mOAnSwQ(<7VvW! zl`VjODP0UL=po5R|Ebsj0U1BLwEfMC(U8IHPeBXtmIGL>o>?MaPR3JKwLRYKu8!;X z1EU@qWQF_gZW#Mto!@?BKMWc28#povoUmk@HQAU0auXT>f;?K+x>I;i+LtV@nOaGc zPkxgJ^E&dZ+H~n6oUpU=M^La3KGTAMc(F`T9+wa@tM$(>*lV<$o0g zt9@i+`ws-_H_XGP<$0iz8b^>UhXF%Rt#7EqkPue`i{NutzyS7;U7Pr$IalMzU#o^npM3td3F6K2iw0r0P_d8=p$!BjyMykOo+bf zY+37+oE|iNd!|+v%8K(1us=R{FDwcMwt!V(BkQeG#keVF)PuF8f~9$k10n1o$%N~6_6kdealQC>11<)m%`4Sm&soAbHUwaTb&`U$R>%sO{4uf4#P${TKy{t1CYudetF6Amm&&($7L%?Pud= zSbEUlGvP&P&PldNpM`Kba^h@`fH*HS<$pB7`1R1_<6pVC5q_QSp;l?w;14Vh@|pN zK+>$uTY+>F>S&%fTb${57n_Wex3mY;AWx`8CrJg8MlL7 zLIanyo??0RcVaLPFa36N`+FK_O!qZ7iQNB*G1EwX=+=RD-$}(JvXQ=mLT``kTfUyy zX|Wk0(qhS-piFc$Apau__qo@VuKw`_JFzmOB*E2nwM8BBLI$J^t)Z&*s$ECO-;F@a zdWz*!p8%kZjt_((3hNHM^pEUWp0;w5u*dWzpO*0!sU$7$6=4TjStzeQ|1cc?55Bm$ zeUAuTgDdP26mWzuz@C=fWYCk%hK6R%VaNu4UkuvNQz{>u*BRS8ue2>x=dsd#{DW zz?RbDx(#LkY}Es@AvFiVsUoP9udOX^+942Uo=4~W68x$lwcxXltZph~y0*A_ zBcQ|q&Yu?$Z2=XyWZ7iyt{v-sVzWNSWWPrVn(?#){kNv& zM{Zqw6ur(+q#8c%tT9KkPNt1oGE;AAl^Xfz7vV&H=WTF@=pljc@5|s_irmV7cN;o8 zpo24KIv90GBAKn*GjV`5ld2?Y9OM99SuCIU%A4VNfMTWB9qA4did4gcWN=2D03p-# zyUewkJ!6XE4j!3@^QVU+Wd+aSEpM(gH{?{e(J%ZxSy0<`gUPV(yM>TGST#G^`4p;{08F(jL zHH<51^6IyZc5kA0-U(OP&HVBK79co#*%)e)8j~R#^~2>2F}dcwz@&#H12Pe)AW?+o z*WL>aM)wjFe1;{#%i1CDDwj2yQvO+0Sxw4+xeGenTP)8%_h9z|n2-?@IMP^Pg70HI zTPhjAGd?H!b2V4l9hVzNK@56|A@8Uf#Qer5wzOY5x_EV`At+o7H^fI4s5nXM3m$(& z%FMEYT)77t(p%h#Kfmk9*Ed3j3)Bt}0~&Z>G2lF=Vv;m7=^EdfH8rTH{Gksl?poDb zET0tNg0=nC_?GtC4|e5|0w!1xaApuS`uUzB~EflfRgJeDL_>1Cw`mlC8QXg`vp-*W`}=qy3*$)F(#= zgn|1f{@nM8iJwldnfUs|XZo(2c;Cd0edkX^Cu|c8O268F0ur$PVEp0nPmJF_UhfZ2 z@0!)zw5)w! z?IdRX)##IhZ&w&bKR+lRk8eDCnP`?m~Nhp!#h4bKc+HN1Z4fBIWPzaCl`dT8k1AZtYTPbUvffHdaQ zgi9NUQ&zjfkCU$kl(wdp0-T8Qda2?CYa&x{?*-Enj8Qq@5t*?_&1D$4F zp$H9mo_tZyFm6q0Ho$tr#!yRLfNH~6b=YY9&7yghu?U%#!{M=7(+75AE;YC4B=u^Q zs}-+l9g*0Tr*JDdkt%tFKyr?BgNvbyxDscP3y}U;napYn(R_gq#_htDxYhvA+cR`E z?6Qe2dsyRD%yifXXhXzBmHh#x*ebPbJULn zP=d_@3Dinuy^6Da6VFz$oULm`gFcv16$B|_!?~-VJ*5PZV^ld;p_&Ntg|G@IE%euv ze3BsjCNauGfR+*6fXlVf|O|1P~f2=8EQv)@aUa z&k_2|@aJ_G?E%DXV>ptd^m@IZd#U^R%5zZnMLayGZ4g(UHdg3xPO$)ME)i59%jR=d z$odx{Mk|<)l7bL~bT|N@9C6AM(>exEb~-TQF9g&kG8nSMwvh|i{hS8pqze#WQlmVx z&0tYY^NbW$|7FT8yViblBlOvx%hJSbhB1}hQZ2#wyHZh1QylD8jgX0zEJTX-TX1Ws zhESrSxh6bI46HF1_N#F@5BN(2WbM?EL^8@kI>O8GVB|$RN2wA%r^Od61=y6YD_w+A zn;^xxQq&UXefmTt?t2*jpq}@}X=|gXsi`$CaQ*X@aRq{_kffE`EMsxUje0gb@s)15 zJqVf8&Gn`ulr-=$$%ZE_AeiX_;Zmn;Ie)C-bOQiu_j_Z3qP(?8o=I24IS3}Z>T6vB zm(Y-Ir_C8DKt5+zZ0K{ioUg@NbchiQ0c8lX4@=y=-SSXUMR@~tUZwFWiF)eNC%WZ+ z797XInVKZj8bp-TzO7sC3ulNFj73ZI&bq_Y@OL-%&k?X~^NwJZvg>V9D`5A{I`|#m z>;8byD+z5<=`*tiz7!^y`*ArJ_l2pD5cH{~%B&~HUEUp1E>_T!jX+DJOBt0#U=C@z z-#bC9%M1nTNVSIWu!A_mV1Tm)=U^kYw;W7S3hE;9_1%%+jF5Pj=Ys`@RE!5);uS}` zj0A0qR8iJktpdLC>Byyc0R}j#9w#Z@t29MJ6`hve^>O??n>LB0FYnNJJ?2t2z+8O{ zm(%)6i%QRCGVENKA}cYPF?9)an4wFM?5~uda$+z^eWY8ij93X{f(|sx0mvdp4{gBZ zR5T4Z&w+wJWGcs6N@2@lw_Iw*X|pLEsHw}OkBslc$piyba8{&KN>i$0Oyo!_+c)>s z?hm-CMES{CJ`_;rqfv4EA9$&et)vR_;uHbP(O1kwc1Q8&WLlRZa^cyazvk8ge&{I9 zsTd%gZl0o#1jO#7p>OPz3)Stl&oblzf%r?nz? z>CZafL!ecmOjIE@swfEt8~os4w>$vZTn(Y}oDeS;>lSdPtaJ$`m|!y9vgc}6UEV=W z-P$cT@IkWRZ_T!HdZNY&eRwMU&1@h`7MulDLF-V)czWLu{vHr`f@BWBzwM1;t=Qr& zd%QECeu&wKlaZjkSqi$!d}eMPP6g_3>PsoQT1&+#E=?%?slf*}^b-m=qPawo)CxsS zDnV2r896>u{Eeyvx%1SL-srBy>`G$HirF{xri!OdcpUkNn6q(f@d@p3Xk!*K8Yt-t z)|}cGrMKd{k-t7y;Ki)3kqhg>wNybG`T=fzJy+AvnvgD8g9NH1lOVe{gL>3crN}A( z7@3O}eUTn3<7(@=LZaaJnstzVH?IkgWigwYyTXx5L(bxh>|ni zoSSV~W^?qV-BGJ*i8x&}y11;q?g~VtJ>45$rDkQ=T5HysOw2Zf#0buY=&ux8CMxSQ z)ia)uvS5}jd<^ri6x`t0E@{$+GT%u1h)e#}Ezd(ZU&5M+Fp+r6(j+%sIfvU{$!YRN zeTX%cg1vzmm0szjVt$1c`)AmyL`McljiP1nF>t8hWO?)N4y9MJW0N#rao6%`))bGKUKoCY#~msLh@o;7RvO?Vmk%YbuF z*4%6@Q*Lm8B)0)CUr66ZScp0;){G+Kp?%cYH!%OQ&KW0z1zMZanu2*9f8kx2e<`17 zmRvR37<2`s40YZ@w>WNR%Cm4WYNqF!J}S-}@0L3aAzh^5gmgN7woG62IObk5)FOmB z4|!b+213IVqj=5vOGGY5<=wG#S%?;$5;OKq{CzRjDAC2DNMywVQ)c5A;yuP+^fefo za>UIoo~X3S{7xS4|Nf#@2ou4Q#~W$6yh?_+d>w92p(@rqo`hafRUyj;w+7PPq9sv? z2Q5_4m+@1ns5cwu-i)g)gz9!GZe?oeLcyGFMW~CrKN$aP(pSwz)qPJP{gBx|C%x;>T`nJ4d+uzLl16K%61TdoM1`{ouJ_Bu z533q?JvA_dqQz%AR%;wBezujdW9(OfQUmJ%;&w+mfqSCGP29dfFbQ<@Av415+ zKKdho41jE+;8J!!yq!BroI~*V#u}E{7NJd3bhWOnR>4Bj0OxX~92vh4lp{Sf`S^Xe zfu_B9|CV<4zD0nqx_X&QDdZO1l;2Zokd2B;p8*#J#3lSO;L<~r6`C5d*!*O3`>~H9 zg#sAb&R}39XVY;%Vb&|nl*TKnA^;nQ7#;o$FzTVns~HC3a^;_FYQOLqqzME@2roC zU8gDhy`XUGp&^}J7ivtt7rKPZu~#g2DVA|jX?sMKF*IjqMYa5qPc3e^P)SfLK|@!5 z)%8-Ue|K|R^+}lhuHk3zd4RS0v4N-h{;AkIwGo+skY0Bc*32M02;B6NzUF1ftVii8 zmUv@03jQ2uHZFM(P3uaUtk}1!i?DUugWxE$SqJUL#?z)f>Gp<;o=b=kIG zfF2JaLf~FG>)~jfvX+DTa44Nh08|EQ&Ue26y;?~EoaHINQA0RrL>t%uXx9-0CW7O+ zTi&WNK<1iNS5~Wsbj-XQ`!XoMdW*r{e6O+nt1pAM6f$rbp&8h~r3q(S@r*a3gOouf zI}?-bUjYSNPboGcJ^2-6chZ|}#w3v!mCjf;m5KQznSB^4>@Aj$Js}v|pMQ99RCOatF2X~rOA zdiC%Uz@2?-an*DW4HU+ku5OQh8~i6A*#C$fx`KrxB|^pnI$lUa;6gxe(aO~)V5(kM zdMrfP+OIwVhR9WXjM1~9MkH$pgqt2B)v5FXnqt|rAr4l4CC~pAteMKei?_6&dJ@?g z!**T5K!;2rF_$Tc>1bRQ7NOqWVr({TFD`!cf9>tuQ!sny=q=mc{@9V56tefbi`Q&K zw#5)iHIssW0m=)qdx1eNA{SLl>*S^HEe>8xP-po}p8Ipiad33Q7asp^OCfLjz|ye% z!S8_u406ap3K}nD1cXd7C=-~rllLzni^S5Viy?6L%zU2v)3c+%Z~Xx>@_8UXqsIhE zuONw67TVkb&XDLy{@f3ck?$N-xp><(r}5Bk{1LDK+%6@+oC7+R)P%Tp64FotVitJ) z-TNc3SDu@S9RF6@Q`bIp*~nG5?0^9OjgY+-a=)UyV9>jk4zfEz8bS{w{{ey92)#UO z=Fj~ptS2iWAA0V5fcN<6;{O&8-uUU_$IdNZ@}Zx>;yQ;=weLv0M~0B_XBLBin+9o* z;9A|u=?B(dNU8)W)a08A;3k)Ua&hP)C3RM2fpdNh$K(AQO?u_2}dxeXMPKu zdT8=-1p!7r@$oI~t6xA~rGDUo&!?CzO&h4D%bzpE!GD_pE8*{;J-5CDTzY8o(YL=1 z%qm-dwYmMF)dW{+DkE-ZGf+==7;WcBhFal)-18lvlP!S_^Tr>Y z-+uHt*rd03mpjCQBdj5eC0k6X%OD=Rr+bQJ*B*edzJpoqQ7AxQ<9FXMqq^huR`m zDpJuv%R66L+jSU!j{2R2pr&w0lZF}UKssL`SeH9#=P{r4rsaVrex=6PJK-NNL0>N9N zb$R3;AZ*e~lKiym*#qt8|Ir;jK&0soAE9!UlC&-4GKUOWotuE9F)zbR_ZG{iF{n4S zzy311PQbkcA)jE0jkEQDCJBDe%Cp`5;h!LFD@hQM^g9>@l&Urx+vALGp&p?V0f< z=pgt^px8j{GZADhyo+!ZSR44GW@yX)%qn?{$w6b%a+g#_Z^$q~MM zlBn3rl?w0E8g(fE^M{}J6wAk+y{h|k?3-MIs~>DtXF>w~QF|ssHf>Q&%-|;rr>{yk z^)EqK(@Gk;D#0KlN497Bm%z)c7FIG~aTCO6P!E-+tHd(jmoGYW_$V zLPoCcAnep?g&3O&Wb&LYB#?Dknp)aDwX#q?`Q^e+*;)VYCi$5Mw_PEx`rh}uF*4Ij zJJ*dU_MX>ykG%%(v6%@ypmxIjaF+u=_888SgCy zzsp}=C2zlUsp}DW$Ga8>WX)wuTao;niE;Dy8j9q%Tn3ZZQ!JlM{2omnglWBe*-{s7 zZuS19?da)_!rXAv+|k*Vld9$kmER1hzjLr+_XD$@VhAt=e}ZR^eQC4&*#6VZPF}tQ zP+cGsDAWy~gDsJW)M?5$JDX;ikl2K^yC1I4(hiu{9-3Tya2n3#kKMJo{pb!P6GeYL zkfFlqK$>mKYsC2C+y`&0Tu*)QkhtnP zz6*ZcQ;HsBw)T5=Ep-68j-Z@%_|EPyOJ#o|2Kc8D8{~5+m;$dSu}D z{Tmf(BsG^{B~KFu6YmpdAsfh1HL%v^Nu8Z_#LxwJt$ZP~w063OCLjM<7$zG?nq^Mm?N{iy-CH=nTRK=F=fCF4w|xix~CYq!R@{4wL8vl|BzS$ z^+aU;2nqwl`Be-Wdx@hUh=Vjb7{F~IEMz}G1a{%e}CX#AUtj)Ls!B*d3OFb z1#re!8cFAXdkhx@AUTH^g*PG0{yO;<6^Kv|NuHm7clRKCK?TDMd(Lg=Ee}#t$W}~* zDOqD3I*TrD=dmol%eu5?RWA*>{6J)a6-FBQu%Wm%+!!N8*&7L^)8V!k`5ZU!dC9vW1>7w-9)$05Aff;d4ZZUjzvJ(;W_ zu;t`EZeKRrtO^{&XrSg?qk&%Z(BzY553B%`j_|7*BzGXWZw5wquS~{bVTj6SAZs*fMfsxG7=HXrI-Y8106os+JR3G z4Z{s=kN*{HL6gPrKMRid#rrq6e|HUT>TM{34>wiN<#`|B(^Qp30K1~d?%1_MFblmj z`P3J4dl6LUhW5rcL0da9e0b!lY7_0I0uF14rdm$F2pO=@6vW-Yrk5rYyS@)mz}^=& zv>$h)UC1_n8;aq>r=Kd+(D)qDs;k^E2O_$zL{9mkUn@!S@i9HD4s_kl`_XA-CjD^1 zB?5dt;bzzrAaZru@XG*ujkb%pb&3wZU=k?c~UN*@fg2R%-w97&9piBs5R?b+gG_Nbdqnj!wg_ z@B*_QntU=Y>T2O^d(? zMaMmI9h`G>V`J^}-lqsD#y&juuCd}+a7;CJ$=KS_*G8Wk{m$rvqaPf7`)GR9J<%M! z5}fHKM*cF$fIxITQt zuyI&9ylMEnq2CTYHT1;^5Rg5gMF(a`5wm_YB@Vm>Kkd z2j9-YiSZW){xa~hfp1J~9=Lztu7SCM_<$2!3U>^Qf~Ve3`XBB8bpQMMZ|slsTl?w$ zt^EUizwi6OM7Zy3efRa<-dFFtq0iJu^qt?QP`sdcTJa^tF-2+mx6@Bee`)&I^x^69 z^qZzN)0a)JoBGGpucn@y`n+!Ho~fIsGE*Mpn0Qp{Y7YUi>odFI`I|`9#9p(nxArn`H0C?CFq;AQQP}L0KpGLWViCs#|VP@q|7R z7p-nG=!|naPk(Qyi>kBaqRB-?zdJnW=k2sq;_B0Ezfftr4KZWCY!QVDJCy?4mXF)I4Zn0#+Rg$ zJyS`lzSS*`>*i>p#AL;!PO_z9gYW9HamN5}Hl_6jT4``|Ag_L=`@PLr3>XSRg`~)m zGj-XG-Op9EA{{9O88;nQk$!&YZ}@YfW~i}ceXLj^=vh9+db`C^*iEENQV^`e%DFtV zPK((PdceLnn_X5%qY^TOx$ST1mUCJSS*@4#)>@6HZD~Qm<;r>*G9IK%wg4T8cw@0k zu;rasrV<=!(KwoFzM8I=;yZ)g?_>5T#eipyRhb2Er^H%R?;LCp%3zG43l64Li8!q0 zKy1x@-5<~r10qgE3vP$Uk&Y?x@Nli7SSAvUpe95&iy5=nhuvDZRwf31iFN=tA(Vwe zjCNeq;ls5|p#O1^X+QWernC`q;&W1#;jx z^Q>Me>E;r~N^%6d>u^oZ8O~@!E>GN{&BujNEInM40`&WgSC`?-wyIDac^eHwS5mdGaq z;fODsbh&e7>B{c3*Q8*SEQAYyOxFTPA7W!)myg|71&j@~=%5QVQbo>ayKFR;I_W4> zBJo@!D$#>@6(jB>#_S5 zSE{6qluvJ=by8g2v@zSd<6nvgT?9PP3JI&t@2N%i;iG~p#oS4<$z)*=0(3GKx%?B| z3WA0j1eyo*v_25@I_QDZu%6ESIvPRj9V_#XBjuH=bliFCtE##6D1RpR=8 z-(_T`-6UhRC9Gbyp42Dzoh~;fSRz=CxubcdD%DJEP2dg}>kXgTM7TVJCB(*g)y{5l zCg-iFVhze&jM^Dy(}S3MF;%M)s!Y-m%vT+Tq&8yzQI}vTMhM1cEQ#@!u|<&=VXr!_ zXts*UnA>Zv6`NXXVs)X*o}^Pm9H5c(b&r(x9Jm8>DKzvVp*B@QTB8>L(8=+?pLd@8 zlxx?Y=6H3!(1Ih`=8YOeUbIVr(}K&#%cMh$*$c{o$r9!QtxgTR+7@gzIi54Ll0qdB z4dgmC@XBTy;y-zVB?vV;WAT6yH>hGW(s7sI&6L?$wn6wO@aII;r=zNB<6K^2DjStt z+J~JxxrWWHr!qRS;7c=ctt;dE3GP9)6x9(0Hd6{#*i1te^ZpArhbn;|R-#nTRlEVG zoA#cTt9qeMh3hqz(&EBNiCr^#K0_Xl2Gw^+zlFvbVDlG$RFRNdoOZFLJ&JYC`SHAvmv zijB{AhmA7(v}%u_oy`d?iki3uv!7EnT28VOb;d*adblMCS7HA)UghU=vqg_G>UV$} zEOl|WIVzJK0COvBAZ1pG;k>Xbg88VJINba!P&W@RqGtTc!?;{17dS{Cm(n?Pq=(K? zniIG=LKN_Q{5I#D&Ek;^hQyvItGKalZv~y1AylcbUJnPh&7Zvd z`YwB-rX=FZl%Y}0(v4(7{Um0?S2I4nsMX}tac9y)tnuT|`Mfzq>EfcR=(pGXG&zx) z>k|09mdLx9G_NWe88&@IzFW?flMq3kVC#i2AF+kU0^M?&FOxM+a+R8t)$LDg!%n3< z*KlR1s#l_Qg}MkHEB)9Vk>|=*HSG?ilJ+b(KG@?My4QPdE+2wLrHVNd^{}W96H}kW z6>vGXNIFPBSF333v-KU*fl$@$GgflKCcax9QbSxpS!nsor2^z{+l-yF zdCsb9QL$o7P&F8vsV?rix%<7TZYHf(YAzj6g&hP#4|N|poQ6nilF1m{^etei+ICg< zdzDV4(*<=VFL61uBwW34s^%AH}FsQh3@yML^xcdvMOga-B5De$8oJ}BvYiV*_O?gp#nu+ zW)dG#JZrL~sVW41lr_3k-kv!`V`xf9UyEXOZy9+2G%zS{)(xj4zuNmg@>Q_wIp%LW z1AG&6CiQ;OWG!hbR90)VAa4tR7D>UAyoUs)AFyjdB5cSfoJMbZ;Dc~)um&Xn{*x`j z7>YPjtR`FnI5vj_>euP`(&|;cH2L_R8~4c1{_N8m+SxcVz|4|TJm+#1qbB{VsA4mn z-);vKRe%dUxA`AnYIslkLWfA{(AL&>gw5y9YK&5&F2LxT0Pu>uehqHdP&Fx@@1 zvKTNrUIyG1LW3$m-*P=fo`Jedu)Px*T+(6Cl_BS{IZ zuu!cyYP71OpN3H83^3}U$;S`fwLw;zjBDkm6z^N#em(;;KR2ehFoZJEGh(AyK1VSqxo%qzm|C@O8MC5c>WuLk4#Q5*Wzd!!f z@q5SLJzgEZcDgjK8=o0pKlVSp`nP>sroS|{G}Z=X&pXEoV*y2@qwZNV`uEXa zj(%rq?n8=CfX?Th>8JYsIC}GFcGNq1)#$F#$xZ;}TTlq)h^_A^4w1y#p1$VrC#GH- ze$Q}i__|^J^hf)s;r+uK`u=_BpF_Xt`_a(S)WXmg`@&t#PiROzbji@#!Pf?VH3({- zsfVTy5B}TWErVIb4TIjntENM9gS!SN`}zl78F)tV;=nft9vF~8|C8wGe=ZsroBIEB zy?4A_Rhc)=O|LgMx#pXjvXSJt%pINY1BnHcyd|RXyV=J@zM{Pj8y{@Y{+8; zThnOur(JiC%Qpn&$k@UouSme*?AKMjf-5!gO@WzAuODl6)&~_utx4tY`?+4Rmv<>$ zy2;(bfkVICG842RCkd+xSiG@(F|W21ob+rAntd%d<23-zHJyxQd@3hBMS^C7Rm+vN z?Tjf?_W6Pe8{M0OT*sVeH2P*V)vlMyuDtCh<4r86?JN4>g0>t9cC}H&P_}4KWFRy6+W1r)_+Ps+$7};dnN~1r5>Jnfh3r$nQq4u}q8kJQ|*{ckJ zeBbV7f!7%D7UC9qVF~K&Q7s#4MdLPG#ca{4EL$dNeObAaM_Q`}7V+MwOyYO>~VBjpSDjBR(~a)Gk9 z8@Q%D>EMECS)?FKZh4j#+gbsuyOFCa9p*%*89VKtju+4Piq2MAp;Pz@T6b~{;;wK{ z3R-*aIM-C!sz^YT5AmrzUl+@p1|wVUv$DKbozd4hg`D!S*8Ekax7{cJIwNA{&itKN zJ>PBdj+6_zjr`GEUwP%1#p?N_#b@N(Dsz3tVzy^^dMylEeK|9tAtQFgGi8!${#+_u zL90j8W2~{P$s|{q%P#rqr6PZ|657P1qn!$QBON}o@}nYurd9-w9=rxZtz1sECrFDe z{g_p4fn%x6o>FzQS3C?Zxbp|0O+u7+DDRf#b+&#tw~7Wm1T7VPpq{RH`dlw6W0E_k z=~pe~R)$Zg`U!{E7q!~s8-7X4%~@ZJV>*Q<*Xo1WMZb2i9WBXyT9(aWdK zSua+Pa2_@|qpTInWqng#NbD9{Z+03AhzYAYi*Alnrq7~Jx1iZt*YTBpG3t~x*-A9O z^-{{m)HAxcsx07l`dX2kHg~}_VtEts)R9OW5lL!8-kVT=RxGb|0Z|+-X)4W_FFRw1 zo&9N%5Kx6VRX=PFBM)maQMg}W<6uG^TfAuTI*NgW_C@m98C}rOR;!q>8;S*NVuazJhAa4zYS#8)q%On624I zY9-~_pQ61ogk*iDq2%NSlg`+Vr>4fL4t&*b4KnHajM1KEm0qM(IYTf0fJfGoX2X}$ z0NK-}&tF^+`OEsws4Z{SmDJ|4uekI+T3w&)WO-92p~7GWc}W zTu`P?O?`xNL3-4lSJ%=;J#4KZmoJ$4H7(cG;yq72nCYq;#fGo2<^jrG7thBTrLCuF z8&eToOfh{(EcfE-o6g#u+Puu4t#P}l8Y`$%$J?yWjQFxtIL|7%J@f?_)G3^R?+W4# zkO~-@Dt_8S`DkZKAtba?+B_LgRn<}^cfThRilH*^0J>^3%6k!ws-X&>AX0=?xqvOw zYgcp4ra7m-SF9h)%h+DBuaX6t2|S!tf1u@>4kDB5-GVCawi%30`O@#va&^vwQC68} zVj+#$XR7nt>E$x0&Qy#{FdC3+WR7Gfs$Afs1ElJzG6rR#?sW$ue6V=N`IL{U(yp;8 zLqFHcWWyP=Qa%#Pvps;ErsXnI43Sp_^@UNf+!Tv4!FEfhNb3rn7(c^{Qm)c^dVGeJ z*Q&jYI;%*lcaDDm7u{Nu*YdG`)Wt*!-n^S?xPr|60Kd1iSL-YsAh9k@rW%-QPma9gh z%B}QG7gUxb4g`!@v)MwgqO#NcrvIR&ipv7w-V1>WUfEsbov1 zV)J6TJC$dWGqFTlI=>PtmlVe&0Xmv%&rQ>3CMjJ=MFHLtw zeJ-^=1m%5q!|#d2-tvRcA%c`wJ zMSjkYC>uWJ_p-4@v*YuovUW>xJ5|dDd2h|D4X}rUZ>!bu?QPl~p0V`I*-X_RP^vAZ z!UwLU#hjsJinz7upu(#$aw^p;ls#MLlDs}zC6tw}wjZ&Vewusx*dE2cD*5!0{Md7n<@a%l2OlU{y_ILb`5RAS8y zd(@Z91=VT!hQ3%o)lMN)Sf8kc5XccKet_Byf(*80uEzmdUvGA58J_>SSbrv<(=vG_ z?~w&FP)Ns@-6#@VjV7n^1K|SL5stik`b=6bt03bYqUe3CwACVuFl&DxmM1a_UTf^f z+XxNjva!p=TcIr0*KvJC3HC9&&gRZ-6%T7!M26gM7QTw5J$%X{u{OmVMR3_-RyuNp)DCR%m44VHGzI9-enC1 z8&K6_%~HI${%o-oYRI5(DJO>_L91gqpRd_V$HM-gEOyarw7l0vuyM~~ zPi7OmF(1w@5Zl=UiWjS>@a|ICYRrb?Yp4Pw(Ct~uTruNLCbZFJt)^N+)r)~{rz2+* z<)A*(?j?)}dz`wQexRE%7I;Kac5tJHPgs8Xzr=DiVu5QpPgdqLg^HQ{itFhFbd?@M z+GY;0VTBWkI4``A7I(@;bD`*WYvNgs5=O*ts3W>xoG_1pwVb)@iHeOv+b!~p~Cpi6dT&BsR~6a93kA+ERZiAr^Q^? zo_2I29=4>2l-Rs?f^t!GV?s-`z0y_>H2s$q9Vg_npqd;~xhPNim$b0Q3yc*KGs&&Cnv89-Q4vFlK42 zRnKe=6*7#ro>R%Q6+I_heD9IX!h0V(GPy=VLcHg#mjSf+%Zmn)o8Yub^iTxpm3F7! zNK{K)y<0BTx}4zES%W&j>Ahi1u0#b@_!0#oWzs&AOANJi6?@mhsm z>-H#w{H<{7lNJjH@BWl?@b<05(K|7_cLRP;ol1LYIV>!ePS982oj{C}3+}!6y|h>u zXN`UI*>CPb%GpmHStPu-@5t$h7u>rZ<4s!}^MOZ8#-yaNt*0Bmd^<*5UFUN`OAb z;3GZlC<@YyWv{q&Jl8&6$jFnjA4K0R?hGRpx)vht7u z46h|9k`8?~AMtBT5f&*p{nnDR@9DZs1|Yk>huAJ&p*W#HJayHG+WVvwZ zokvz|@+S+Cegs)Gk=xVc;n3P5vT4E{>pf^jD|a55UVo|@!mRnS-6DwN`F9;zyE&?N z7M%Sc@?IKb5!S&*@`Vn<#j<2^Y!>o&9a+8c)KvzD&fNw8$L)8InE(?rALuyp$x_r5 zEx7!SjzjP1Q6^X4ePs3esQ&#`ghMa(L`2E+l`=YF?C}wE`m;Iw1D2V1LzkU?L!WTnx&BmC zVK#pga+tod>GFx~q>Xgnx{Blg2#?j*|9A0roceF9O2nA&B|ym3uT5X{0GOv(^csz=ZldH7e*5r|jc4)5Xr)x2 z7)za`8hCyVE^Z`j>%c?UDTp5-!9J!DJK?r0B9J{=!R+t zsf{+q;P-?By;`AZPLPuZ=?xx4QzSIuz&k|@_c_QZ^UViIQ^05|nnE@E8iTy+ifcRO zxK*KV_2MF*$BwL>oKF%wuip)|d=2qPk39w#>2-$FR%wyJ`ZJT8mwXd$@>?eigB@p8 zFCP0lo{xr7{#8Z55@)%Rq1P=r(`vvC$DYB;-~J@j;}V(>d+U=I&>TqDKS_FwF*^^8 zs9Y#@v3LtUTk2XzRWWCpQ2Y}{)+fM7LIY&zd+?Nh;>d?cRL)+4d`xWzS&Ko(aX}Xo zV3aAdSxZ^;52Lg5Nr+1P;@D#n{^W;=c?Qd67n(wsOQ4_&G{(3nWu5mu#5Qa@caBxPSO(@#yVJFokQSs0Fn}?ucfJc&5*h^q z7y~{Ao+878Hk~ua$X?HRjEqL-@M$gPD)8qhqks867)fYI65&CcNKDnl4~Vm@fq@Q@ z&#`HPUg?X(L+~Gd2IrTg80eW_AYFNB`{2cA$j{_8IBGF~{Bf6=TA7VhUlkBX6zLN+z$t z9WIjfiVR$@99h3cLJ~BMU1Iprw_d@zCqNu~3H~jWzOb1yr`VF0RmHuwrmC0{W=BVM zu8|ZA2Y0~H76zW}gFlVP3PEEC{4Etc563!cZl}?zO8V2~YMQXvAUyUG23A564&3+6 zD+Xu$l-yLX$WEZ$rprFBnPU=`02eB%Rgn}K;A!Eq7a+S5nlN#p0i#U9{{Hy|(iRBt z2j&F08>=!=ov#viR;^t_WGr~o!lz!wMmC=$)BnG<^gtdYHhc$oM&$kUMKOv2=&+fetT<9!Cvp&1VVe{4+?s_rWSI|!7 zoJJ;&p8+^4OmE&JysPc8bx!gD9w5G)fBCKY4=ojn0CYqi67n^$`q zH92c9$gK#EA%p++uQ2!$ns9jYSH(Cg=dTgw^*iqoY~pX?x`$a%%*}$K%$bs0C>4#x zatVXSNf|!&COR%535Rx^e(o5iLfHPBBmW;|c*R>_h`mh?hIAP0-heV%GrANlh2C$o zizB)3EwoTVf{pc$mkC#V;){!gV{aXKmoi-Y_L0-cNp%8;Rv)gq!wgf66WaHR!7!#bZhOvDFZ1@0!3Sp=ajUVgoHT;|NG`=>D_&? z@ISvqxE@4MMYf1>n4vuYS8T3TVB5j4OzUwVl>-rvGvB~!m`_4-B@^}`PW597Q8#Ln~32W`ZPQNE#%U)ye3N}Rc#px%}OFi?&uqY|Mv%s zo`i%A6Oq3UJimYI;Mzapezfh%x&5qb@b`>tu-6VnwAxYu>5;}I8e0GY0*lSUhmIYYoSaV*4)3@L`_NlI-8L8;BRj}-vwI1iP-ly4w?(HZ z+oBDR-WW!Twl0#_3b+5|$hm7IrR4o)9!&oANOWRtmG8BSypgk7lO3Da?MMr~cX8xM ziwQJ~Y4E3ak2nbQ(B4b&!4HooyIG1^j4gRq<4>3Rx-62&yoZa|{8HiAF~q1N3)!dZ_T z**^I8!XXYE^wSJR^oC-E184@`()PZgUbiWuX<^6W;fAx+a%2=g`4%myhnEhSEs`-v zyL?D8-n5Zdm~Hx0{*E>PQxFp9fe!+rhilhJXo%v&!FAT>il+~@t{g%EfS#QIJ!+a- z!8%_s1U&76Mj0|8@grgM$qB+}K211w=Vl~1ofuv{z5yE0DS8lB;y@?o8MmfnQ>PM+ zG?EJv9{W}er`AYl!i43=1c@HE?^VMw$k1Mbc|`ey(|Tvm*{FFnY(Snw1kRYvb(2G& zSj{8R0GtN`Pi+}IHaWzNiySOE@S&HBVzQC&D8fO21O>CHG!knr9`2f)Unr#>WqYEYkeM7jU45&T;_LHi7|_)~_9sB`#if|x6FBcA<;@L< z3H$LWaNhTNFkZBMs(zzyV)fOo#^i}9?R8GLVaIU84y33@X8V(#Qqp=P*Ul9K%@)#Q zbeNzC(G$QDa=Ggh7~36AoRr{v0?%^4PZ5&M1@;+|q_=%9oq zXgbT#!M!g7(qo!1!uqp=5nX>hN2dWu(xh8s>A8ER6ae714tK4Q6bpy;3g96=4mJ!n zY#Sn=($jFd>Wn3nW?P9&zGWNl@zcU5w__8K(1c^N1Z9Fmh`qI49A$#IL`TM9OM6>< zm38)7MdX;Nsl?snjN!T|DGkY1&%=UwVcXzaXAA+ea1DjbBZwR?FJ8V-K5-2>)QnVd z5Si;Ite0#VMxvUFOE;?|!RF%%OynEqVZbCbl3-Kxcr%_qgf0%VNN`@LXgQgPKgoux z^=>c5h4mRuIBzEgOj1mPV8{20&+WvZlS3&4NuWGpN`1Z2^yO3LP%IcgsC@sT;m*nV zrNB_>h-p6Gx`<30(yu?-R)x?cw5x7 zmTF$vY$TEy;cXsGoL?#&OIQJo^G5_o#^h)sc>og76v`pxiYrwrbu#Md!uK~pW&BJP zLK)^cRL-v^9Lhg}TeWbW|aA2Et8A2vJH-`n_W}VVxXUd zp#R?Tz?K28B;EhX$V@$lg1oejAxJ?RQu@FgWRW7Z}4i9F*a~bAA zQi?P}57`FKT{eUz0lM~U&|#`;H%4GIWXtx9OI5ce+UY}G(4z|`$|M)<68xN}M;DHo2~KeB7^zzv_jZ9?F*!>gy@!DNaUt*oQ3Y&oq? zl`vtzmh_MoTatt{h^>0;zbAy-^uq`s!U)C}5<7*W(11e=9tuF8D_nWaaEq|nFq~X} zstR{bzsd>K?|t&>e}I}byK;1!P%#eIZH|TjYgTe}TzU-$6bqyca`d6#?Tq`h{!~=q z&~rcCeEX|kS~Ga{f`9+Ogs{sz+_)JAgN_qeyH0-#hKEMcm^Kj?JQ&WYb z#xIKs<}E!t8nXZ5rG#S^4mUu+EO| zxI%$`H1Cl)@|ljyk1SRu_&NfojV#VBXEP^VF;87nI2v7jqD@PMN#_v2a(?8}>LXQC z9>#}K6!2>vK9bkw2-D4Hb0^^hp1S5>;*Tn1S$fwsT(#DH8Z-juuDTqFC0|;+c*Q?0 z6f`kEJ3wN|r4xd~Gn_nycojVm=u=6TaHV0>w!zOmL)&;6=jN8NJFHNsdA&W7P9Vb> zgPeL}Svw;DS(DIcPCXdxwhlfTAQ!=YvFUQNwYIZiO6F?Ha$5LV5Z{*+3pJm9tOeda z2!ycxZX+N;^qi6PWQ71Hi&sPCs*_cC7~z)aaOWCHv2gU=pa?zkUX*NYIIB`v)bzkJ z`MFM+ZG}~KAeaQrVd23rR^|Ij4_)>8<%3-jvi&P&_h#{P-S|0`?uR*ZydulR%R!AF z=#uEd2H{%YaNX*86pAg0Tksa)ce}p@oSy$0QJkI|{sep4v;N`fKcQCKc0Y@>$XLsWjjnT1to|z z&Z!5CVcx<-LyoS)pXfXDBn?}!K)HQ6F+LuG?_RDwy={CW_lwN(`3@S7)%ioFxN%4+HW@$y;;+ z${px7c(rUitROHSO`KT%i_fV)q&qQ)B)MJ^`>=&`l&mFe0@x_6l;ib<;p&Y} z{i$joapw|ZF@#-8;7i!%93clwlD;|o1^65|bB=xih>(FUU82h?!>J9YtO7&YZM%if zU$ydF;b>|2k8m3=DG&b@8gp_)dQTIpzZViBJ6FDokbg!aAf=z5s8z z8^_Tl3l@H0B0ShJybCWJ+)8U$W%RNT2(+qguHvqF>s+H2Q4;n*G`W5_JvpBw9RAWZ zqE6sj*W=DHR)$xxs_0^O8od2BFAvA_cAL`f%8u8_w7|56(^FE~_&orX_;|FJSqEF4geFYyLS#=J$Vw3ge~+whgZQgg5~Nw~9_cw2@8PSdGS1 zRJ7yvu3Z%DTleCjE1?Oq&cC6{U;4rJ!T;_Rl}qipv1@w_vI46w`&)&cOXenE;J4x^ zl@wDP@ah-$ZyRj-q&WVqIUX*y7ih9-x2aLishaH;QX}7riIm?oTstMD!MOYMp225s zBFDHZ&pNDJG36E{zy1xG{cfyp8vJG!Q**L*DKd5#_{rkM@5>^%k3d(^-Gp}{_?6YP4cdYakPH2y zC`k8W_9Qg;2Cb!7a>C(zhhrEt%8KMpPE}yDgP});jhO+$m zU1-0QCU{=^=J;u}X`uZqQJXNSI_qJYc_!jEBmYlOY9B#cqHKgk9yocW)_vAJ%Su;)ud zl3IHofn1_Pn6qRMo0`|Kjdsq}*Tux`>Qi3=M+r@c?fv99ufsOs*q4TXBj&YT!kVvu zBicx?muMR;oT38}bZSGe z5)Q@+!sh$%dug#S@x6~Z26x{#3{0#|v$42_tyy`KG0$qd;RJ4NyQZY2=)hCR2yx(3 zTL-Ow$Ib=Mw|xYmi{8{@<{Z2yO+igP% zXOPSsDax`wz$ktDKk!v)v7lLgjbrf9r!qSygr8k8Tr5=XA8r@-C?tJ9f0Z9e-@gnE z_!7kA9#8u2oZUxaajDEZg4wcyEye@AQUn>sOi<60OLO8u%#nm99C~X+tp(qHkepJE z*?lAymulkDrmVHcI`~E+(d)M?r6T3C_Z#3Np+PSQ>}YroZ5h1v4Wg(9qcwAjkd0@v zewQ(#h#Qi59y!Iw?YZp`Ep4z(y;OVc(-unPxfsdZ251pD}WOT%B50_+?4Z>Hn61**9$-YIyxpH37YRA zICyM|&_4n`Fyikc5xI1v70E;^)GHc%s$Pq4R|L=VU~|o5xSr0Z2(<%A(GlrekBQgQ zeIz26HV29wE227#)pVqTOb38kA9qag5ZWW535O2C>tk$Hyz3#N+$!~(dGAHdSN=anNr)OvY+HO*p0j9_H9E@aAE1U&NRb?_SzTrWS#VyxnCs$zz#l(8`g9 zZV-Ow>5sP$@=p;)SSTC8h)!Qa(Y7+YAr*F2%ZX$&p&(7#H6<;k(A_sY^ouQn z&patgCGn-D{i<}LtrX|UyAq{>%3(m-;&H#e_Wj|yH4>6|^B`d88-4&ra821qTxlsI zf7q?aa|yPX?bp3rl*;6_Phgy-lw(i7dd1-I6IifBtclYy<>2hg`f9dm4bEx}Wv;>{;;&!ZHhBD5a@vvm2=Q8`CwU49{mg9E5v&K2Hgk}poNj&w zEA4%xL+@E(w0s6v3Q?fodP$NF-MH+5B|jZwH_o|UqP4{JlC~D|RP8ghm@i&5R(U1x zDo4M9KwS0$rcpwpc$MQg^v}IO_9-wrYmQMP$bqoU2Z zeS~gEX)sj&{=7Rc{N~2NJ0l1ZUWxm*gAqOTW!=1@$_Cv?ck2YAosMiv8->??jB%Ba z1kH=sm+-jQI=J#Dq(Kk@;%P~Rprf+rs!YV*ve_B8G7Kk$@wPPiA{r#60dnB&D+ZMp ziA-XR5id*Hm^O?qCZ_H6^>rSziEUFJSHA)t?;}lYd1lYxTdzQcJ_QL1;+!Ko%q4K% zowLDV;!k*3hSW_x5Qtm8OeCX2B1PD<$$^l14MQ)X37$_Z!9Fg3eCy!5uZfL3Z?2K4 zekPZRt9pTQh(jg`QGjkc3O*8&z-&65x(p3|f0T?EMt=9)$SYJvbDxdt4Vh}z%xaS2 zh+XqG7)faGQTh87Nc@1=Bi=^)h>s;5v1TcsFL7Kf9CI2BT_zc$y}IOe44ITB#CAS* z`QYx?Nsqu}=iFu@H}~}}Mq7q-_v)>3R-C#w&=3hpV3d#V8C2dNPda0%ZI3fK#*dWb z&92p!Axjcb9P^8XqZ+)z$F@lQugPk}?tH=>6Rwb_sU}!7{*9KyM6Z0SSAO`+Xnx3Y#5%H>KHu$q+?`ALR)47(SUF;Hr#SLFF)CmD5)dt z_~MlqwB0K=4`$vWcUaZzKH~Oipx!xNp6xUJw%nT4`D;e5ApGhN82IM=VmvIcTu-4) ze)U_!MMCaR!wc5>lR=rC$=OxCs1dda;HQi`HTV;RM@kbsnq!v_HvM@BUm;v=FNW~Y zt8F=_tXL}seb(vIbfUVH@K1k1V-I#J`63xR7Th)D3*@2|G*u`Lp}O?qi< zdvdJ`=h0T{@Z+oJ6>&Ng4{aUcAe7LA0}rZjYrW_3t&14BQYBpX^Lq@!b=!`@BX`{c zYlJfvJ#tVOFZs*2k4}eY@;((-AAPgMs^*+dgAl^3jANZyj(#OGJ(`}JPZAEweoJ3| zPfm~Mp{)cLdIZ(N_Ij_$1p_*(KVA)vrDwNqj5 z$}Of+I3-Uts)%?R%i?usjMh%hCn1SNZTu`EzBeO0_YhLJPd;}5#LcRLo>4^+{=#=6 z8oX?Fj@Ap4n=oSUBh5|@FCUaQjc~0~O}nOB>5oTxgYeqs(b_c!7?FecnnOZRya3J@sOSV;o_V zD{e@eCPv^d-l^wl7tA=Kf|=im9$`!@~VWkyK9WS!kd@=B)0lZb~$qTA|g^m-lB z(mR;(9G;=NSS>rrxj{F-mJoaWX2=E!2&pQuvZwmNAQB2N3AIjVOPC$FU6T#rH5D53 zK9c8=b9Ucpdu8K5r$%GQ!{&rbu1BRu6XKnwsDveDg ztN3A2xn#6!N?Hu<*bmPWWIy@F=E0^*(VA^qaG)#K64OPiTv1=>7K+|@+Xw$mviz^z zgDpf#Ln_iYt{i-84;I>52Z@QRF1u&R_ZIze;aL-oNn!Sfzu7?CPIh1cVP7ZCv~(q= z`AQ4wE}5sFYUvtjOgkfC_YYj)ixMsrOtUx zIi<3u4;2i;1J=>*HIh={=u3zO1n}T?VVCVVFTEYSFoe#zA(Z86ypxMHwTQB>`^=1R zgB`pirAVOo0L|qp{N6tLJJps?J4Ymk(LUl;OMB|>YLNfD=Qg(b9gCfFh+9R%35k`` zgrn&n?Y{E|`!@)OoulKHBG+h~$Y>w&uca%pnyNLmY!3%pwOH-skH1f{@H-jmFQ$`Sdg@7HCrd`;p@GSA=c$|e!3uqj1F7Je3CFa??ZU;K9blncuGek z7fXqF+EQ`RYXUJpeCra{a*sFlw2HCh?oeOMAz$4|5x_c0Md3hW1MH*nA8jA}K|{nC zuK?n|OL!S$w*;rOn$<20C9WH7N*mwa~7 zcL7$gW3c14=@sJ>j^t>hm!y;1IfpXsFtA0)?_Urf_UA$buTG(F_7g@l~&-0d|C;R4HM ztH2L7o8dq)Zpz>NXv%yNeLs$`D%S+afZ=vY+;{2i(x!_BGHj#Vv0JUFoJx;77wOV@ zJ}fB-O*pW#j}2rND$!efWIi$S#D$lRyaUizJOi^qNFA{ytO(FO5XQ($i>d$7o+sZz zbkWbgI$A93iHTPzgwa#^7p#dt_cg|#1oH}vB#|J$~~|3*i~@%xYX z>C*4p@}`o3F;`LwzcSAR^@8iF(eA1Dl^(oAZXW#bsu2WJ;`tH^!#Y)j?nQ( z9G+M3Z#3W;;^;d}2KYG^5fX3d3ynA)ai^jpL*mcoqUwRFL~sa##~q&>`2y$c<4qER zJCzA8fgwW&UN$|!b7-{XZ1&{jtEa3vIJEA62@FAg1Q>!e9yu;O+=$=>L~_DLLLQ`b z&BB|?iOAAJqs`|q%9C^!r>-g-YhNoSixtk#;?3y{1@KHVmK^$w%n`D}zsQ4>xY3;8 z&5m|%I3;!P!1^`tQr(`%&+&2Oy7lH<`asudGQb>}S+wNo0ZW2I^4t=h&pjv7%tZ3&;dl+Wi=(Lxr>r9Uu6?cOD@LYNSY5_&Mg0Z> zDA93-jA)?;Ius8R)q6T)X1f?Q6xAnfYp1R~nEn1Ai92Rxv}zq-bT7g^>thHf_$i); z%8BdnJp86*Lb$dzT0NDocLM}dPRE;FEw{TYcy7dv=C&Hnhxd_S6T!MY3UJup*KiZr zZkyeA9l}ZJmWG=-!^^EMn=)b5X>k$skjw4$qv_T2C@^xb#Pi|_Y)0R@e*EIXjz&D4 z>3t@}a7red?#qD@UkD==>X^-|U9g!)LO}HMaJTwgar;2mBbyP<1mf{b&xBCL95V2x zya~#fx~md_VvV%smXDxUQkrn=M^ifo!;j!%N;bx;!9+Zt0;UomN&rQ~gxrp*2i`@a zjY6(5np#tvPeK->KZ-Be2F8UPb0<95J@$+YAhh8{ecvV=rM!5GkU&nKMX0%AS=e(9b*xThr^BvJI0p6O<*!-UjKxmG^xkM>M3A%GE{TphG> zK8aco#-3Eg4hCL)9wJ*7xy;Wj`_HjmcwV-weJ7lDV_ZnB;IwH2V=wfWzGnQLY2l~0 zU}B^+;Sh5#oB>MrxUy(56%-(Cg%nIL95pnQItQSsY1frEq3aTwaHyCi zSGbq94DP&1oSzIBQMqMw@?w-J`>gtwET?ni=>k}B^Jv`~2}wA5>yya7d-EtdmK5R* zOeLk-k7)I5g4cxlZI_bi6G>Swq;4Fon|dFKxGxFM-uEMmFtz?W=Lxr6x?_znwd*V5 z{J#0I(dp!fKaol_mQZ~ zIQ#`j^QCv-E+U~JiVJs3Tv3td>kixnwi1_3I;&jDA5C#Cr@!83qJ3>ac>D`k|JmE| z40#{v=>3;qQ@g3Qaqykn$r}wMzd>v@-mV&q&-F5&YD4_`l-$UHt zm8nl}8~pwNnzOAu*PK?$?^m$ZgrQK=wkmR$xHV1+;3Ale1M*ZU z&5e$%5%4)U)+aNUnlfwGOQm&iH~2_MLhOnEL2G{f^wzG&inot~QS zrgV&hQV|!i&x(Z zsg}~l2CqA9kHSuTFL_84TUCDUz<`&YCR5Cmy=qM&Qe?%kJ$e^j5%WpHu_Zf^c=(I^ zx4>!bgjAh=nixC&R~Ty86*v}0ci6XzQWcurN4z&Fu$SB%QEQo^rdo^@>dtsBBfS1^ zqn$8j%_|m;ec?tNk|Y``{O_Z2(89hGo{r64&97wawyxcp_H?T{hDheL;5vvglhCMT z6pzJigF^=~W>Z?1*;i&_*<#vmEjzj)vVL~2k(3I|?u*9H!mWdk-$%B2Oc`-^q*JDm z$C(0~)mNI?K(S_tsL1DcO-YM|!w0^0`GEf-(PcUmO&!nJYUP;K)G;LBIx}8N|K~rj zmLxRlJ9EPe_ir04|34$=#M(wX;g524KrhQ88HZNS3)%beIcYI0gTHnResli_eo?i0 zxg3Wfs;sG|f{Jb~A$Yzt+BqdHrm;%Teu-Sa>ps?0<%J zk|Pwi38ROxlT1BCUPtpNLTuq9=L+LTR^_1)ESaW8Ki%T3CRIPJ#Z}s0BtJ#a*8E~& zVvA{f=x-eu24v^JQk|Jws#VS!*0EZ7tj*cmr84pijz53dgBW}XZJcLtaKnS-8iRY; z^;jSjcc&urCYWNY(hjA1$Sa#6x9$zXH@=P@%qIyu)SnkUsJ1>rrq6A)c4VB#swe~% zop#far9a*OD84SC0RpNEsXzRkZG*QT#o{76&PUJ$dL8qmqRDWNacKOU%sl|U;{OaQGEk3mPvx~mH zcy@7av1h`&SiR=!Yd*i`mNivmLkzFEa?N>brY8S7`SZ!|Pd+&Lxyc(Ri;JvFzcJ}w zv_MRS_=iPtnhbFfyKE-0`p(tYuTHOau2!x-b5VcU_SH*Q{dU!htG>1Bi>q#1bpNXE z(zjM!x5_+m_rxz2?^wl5{BYHlRTC@UT>0Fhtt%g0`LBzYuld!=TUXX69$Fb)satvB z%IOtQsa&);JQ^!gJLmcV_gtP{7}hhrUY@E~{xoVCQQVgE{7R%ZjXbH7(CKkY3Ix)0*rG zXS8R@8!laV8_hfrDBFEj)|fB`6os-))nq-##vqh|qPjHGbTk6FR#nRueKC&+09w$r zYPx!(>y&q+GJV`jLDZ3#!eHZ^TAwNz$ww3by)8p(@L}EedT#p4@EQugZ1tX0-%x>ALBu{6W1_!mlOHd_qe445lwn?>iXs0UoJ>J>floqwT(j>Xa83nsPF+KCxDzTA?3 zr(@PJWddHtTJo`6-kVFQ#MX2SsU+Kkec0->g-j++_MFIuFL{_&GSZau9e+}jy+BFJ z+qh`5PJ3`B(NI@qx_Elq4@E-03ieLBgX8%~SeM@TSFt>x?D8_NKG4$gPDfaEInCA- zXzN2&r#q1D8PztRuqv*h&1~y(C9aZUl%^;X4>RX|Y$LMtVovJO1{=z2+&y3p#ar_0 zL>Sb%t8Ugq6`IEqQq~*UFjY z_RX}sHpX(^VIam#gprt`%&Lh3E&Y>lr(3cP8)bFjUOTObhLzU+w7lU=m>8Rvv&Z{&r>C8@ zP~h!APHRK*D8Jq84Ar8}lH7a`tsk|Uw7eyhn+Y1&y2fnf%mGRWyJB9Zt%|5D(N10# zPn(yE^X_8I9#y^6;#sB97hfmJPbtwUFyXwSz?*E1b~|VKC}kr>Vl(cd*J{ zvpQfkR(esn+MHvTTPgoYM(t+O-lkg5xTEmyP3pn%~m$a3>q$3hnBQF5#}ba>c?raeoNM zd=18HE10V)d$!ZeT}m;|17UwH!6|ayf?aR-*Zs_nztedMJLBz=P19{ftMz1rlYdg= zZ*Qv@Z_7|rce71vIJ1`K1PFu;ZN6GnJA-va1lZX6nX@RHP@@xJ)xK608QOX|%ZfN< z6M|?mQBAB~Fmmp!F1_>)u{^FVbLoD&l`P3KnUreFU1E8_?dN>zs-~{1W*j{c}JV)UZp<> z27*S;P|Ji=y@tz?&n=~Cw*rB#2gyHG9Zk({3ucYng;`p^W`J19VFy*$0}h#t4^fct zK+(Ap4TxJCdPCc1y+}VXI9{= zw7lae1Q{1pNu{{m@9o6`;!cpUt8@%92q&{hlHzKr0~E7A(Cp;PyuQ{>^)jxS(mSK_ z)07^8s@&{iE2V1JuCn*FUVn}9Pqp$c1QE-#Z9~D11cSaLEpKbsEK|%x&DBJY*OYkQ zbz*xmKyXQz1JGiIOO9xAJEwP6?dGQp4UVX%gml$Mt7`x*E{3g>c(mHX#jy zHMZm&DiKYVRd{Pa{Ejuti6*~E1kG;L6EQAh2pB@fup-|qOl_s#Z4}j6-kvkCi4tc&PBbMjwMqbq|_TaD;(ifOz6gEE40FEt}@XWNMGGLTs+;Qb{@dsvapHFl$tSe+} zrM#Tti?lrrgUrkNVmbhuCLGZmlMstpZQm{rG*z9NH&co4EKn}>sHVW0s>_RUI#C z{LVx(u~R&itAU!Tz6w#Vdb%2s5? zmq>a1>7^eN365Tew`(FjZ=}*K8*`UlN6*cQ!)0LQ6{e+8r%k{mjf&MZ{tlD3+5`Gr zIKY(Ca&dPn=j|;%>UB5FwWdd7V9#{W`sH}T!}#p3mfhjYCc@0pU(e9dEXNBnHkpSz zj~NM1Jd4D;PdTKDuo+da(lvK2z=>QVF48iGl&tw~xTHd&om`f`_$cLH>L+8Y!`Uu& zvbK<#%k6H6<#D@?1uj-K1UPwBkiYcnVtH@|E(!_cC@`9v_Ov~_h~`KMlpIQ^K~iy3 zvXQnp{p|V!w4KEq%=@9XzQxCxK!sJ&%npH~uMZ7nvK~){8+mt<+4)Dxzo;u%nOMGr zTvT4WvYz_jXDFM3H`!->F10x}V=w7gpZXZBpKoOBjM`*VMgl2s4_8bP!9HJ5Ss7&0 z3}B;5AW8Dsf2Z|x)q01qWuqx|GV5$LGMj0xzCccqQS;Sw$!aLZ^W~bBVzdXcIX};^ zSVS7u6twW%`P(a#YI^#FU+-3)CLTL!pUcBFyK=VH^EL{Kn2ciT z2huj6;VW$sjX9G~>9OiQB7RrfEb#tj*v-fy4P#8M7Z1%;9<^q8AjzdYTeC#T;VBhFpA~+ zZjLWUlKM(LX?HgjdRAnkGR!3PR5h=*99&upRO#)16^l8Snd6*ELt2J>$o|zIq+gBqno8cFjmqNDrq^p{Hi&oLcmu-I zH(IM!Pnw$vT9d2AO)p+lL^ycj%hHNos39+I-6Ar|7g)w(aA>leE{tSBtHdKD&gD$J z!D5pYY;4_X%$-}I^ z14uw4;^}$AM!z~U)e}Fg?EAP%!fI)%OjT|DmGJ0J{WhVh|XhLxcUhw`Xn@H z?fXa~`REU~Bcg_=>^!skNo*n2okR-Nj)h6M9R3oM;sQX?9W%P+Fc?W_0-$uE;e7JR zt%ElY6D157EuCZJ2{ckUp7m9lNX665c7@raFjBnyG&HX7BaP#eZ@c4768uDzfJQIt z$uV6YZ*#%7rLP`qf{a4%q-9)EVM`Ss53C&8+8h+CO@ti{<&vT!Gs^B2^@!I#jXk3R!W z?;~kKi=m#1J+*D{t7k}?T(kR6#HeD}~Cbm0g_b-5giCWO$g5B_SJI21F)UB{VVfZkN1@b3HYgf;s2%isbLtI(sx$T2H zpG2QT^I4pRRbIdBenh|#U${7tDl4SQJ-dG`x=f8;>P!k5bCtdvQoj`(G8>FlW2t%t zeU{P$X6FlIjI)h{Z@xmL;YRE1{we4+sah}(>uRIt<|FNrT+u+VHDUD7OHiB7rx1kN z-NNwDiyH?UehM1^Y^3{1TqW&wDBlYjD#4fYNkD7;8o zVxQeV2^Q4;Cikn;x{ODzsI{_T9&U(Z7OCf9d7MuI%E+UzM!W#c`gfnF7R>!5ppv%4 zPzpwyJm*hUjc!f21XQmvALR?s0!wKGWbwSg4KF}@OxDP%IqB3T+f6T1(3UDON6Bq; z5|P??mP{^}sZVly&`GKZN58-8f-$b4@XqLdi}3iuKU^R@{>bV{;f#l$|5qXT5}dLy zjVGclE%~yK<0@fKwW77A+6{3z-SRSqO+o{31u%#Z(YS5!=F8Niw|~Xl5|BAO?jo1# zb`|A{C24AmmAk;C9zh&ZJ4cyo9$bREZv{phBVvDPygWH+EfeYEx-qHDj_N}o^b3X~hq;uts@_7SW zX=w|FlE+hEMd`ckE!bQoG-0BQuo{96C;aZM;~b~o21iUB3CN_oWF=)YW*D_SYxUZ# z>U?nQTQV(N_cr8tJ`G+p=U`bp@q;bG<8Q-nZrsFQ{B|@(T;5M2Gie*`wq97pTCz27 zOJDHzSQsM63c2!i46T$V9J}T4ZX_&yZsXuzUMB*Mwvq5m+O~w%i#%fyeXQ2%DE+P| z-FV;l6^2hjA|5`X_0RHaGTGp>evXgYTsQg|vooo)gfu`VNYWPFaTJUsG~sY!C1NYp z?`|FZ`6$`%Ab!(eM0b%!My-c$zNM#9)J^8FOk8r)Z-9}6ChS<=-+AZX)-MuXJ@%8$ zgZ3NZ`E(*qGghrSDy-FQLY||FEYlT5u<#m~Noc}o#}%-35JZw6zIH+kr%zk(%SmpP zZAE<9EdV8aWMW#t-uE|Q-L2m;@UA|IgT)2gp@b`QzzydP%R@S0D={ zgb+i$t(F*))V}X~fk3VA)xNKTG%bqAk_HhjDuXcS=pZ5yNg*nNf~YV^s-iN8NCezq z1O)~}2EXUleQD^T`OWXIbk4c&)ZOnr=brO9@4!1q>|J=w=;J|}4Gx}90X`5t{O+;0 z#VPX7W2c;US!DL`R@k}7n*>{~)YA%|-dpy!a(WAcMqh(Bg+3}$`pee#Rj=X4EsjeR z8m!Nsa9ZGA8#OTKudl-+Mn9Q=_E+9G1|j=lM*-BJhKEX8%iy5|&@|v7wjRCuKgXu0 z7V_W$=nZg}cmT2z+24exV}K|)j6*vKL_yV%x2b5x8AwGd4W(7bqHnzgKiy9zPjT$u zac%jCl9N!JO$iDMXUWSL^o6(KlYTO8psBs-AIJOyE6Qq5!r+aU4OwqO!U4Vz^zn}A zJ}Q8BeD2)#-`+WPVBm8d0bJo+X$aDxg0zvfrc~LGMwbqGye+h?+F5EHmIYM8loQ>$y92H#qn*`j7cGDx=}u<68SAV7XEPo63Wk!_l#&a1 zq5#~OX00@Mf%cYJV63xh-Qq>i5z8|tF~4x7pwB`l`wWH=EI(1orip^ZQI~;~K@uDv z)tkF#&~jSw9s=^>WlyFu!ajtPQ_y904*-wptr$F!vZZ`U?B5vj@N`e)>9kDxKJc_f z%cAS9;7^V*c8kNv;Mgth6FrZmr5`{BKa7KX$p$W@bNMPA_SGzok{4{eaMQ$lkYsIV z^>iN(@Kzzc$K4Nco7UFWH0Oo@9f>pwd`EsnHoEVkcj*va@<>Aqz13 zzCj$y{;;wGkHT;c;1FL@of=>Aw&Fide!;XCa6vy4{iI^fA2&P6SS$l zW;3o1Y>7MPFK^hC>N1&R8YATCsB2_I&hUDW)5k)^Ga>l=S~s9x3F|wc5NH&k7$Dez z@4O-qF@~iO=7YQB*Bjv5J{~&e#CLD(?R#J&)B)eU&w$2|V>aS(6ao||d8v{mkY*uV ztS9LF)tyz-eY{@07=B^j-2VRR4nXtch+onrMt>G^LmF~AXE~vDJIjC_jjQvq(>kkH z^z+cRe|&A%jW0b4*W%M~b-PxslyVeF1b9j_N2DLNbq>^rs8V6GqNrl5RfFCbuGM`>0EWZOUVbK2sGoc}|?Vz?c!Miz2N>{ri`^u`@f8N5jL%+H8uEs^ACPo6|xW$fGns!QnAnMfiC(0 zYxeLj54B&~Bi3s7ybOub8Wfm_#qUjUY{(n$&C{JL`pE$M^X7r}+OuJt#H%`lcz$Fe zH1=um;r%T@g0t_1c*49=fP6BqGRFo5Y)#**KJ6wLxrJVu7aQ-@C|on&U1!iu=5p){IP z3WzVNi`(az45r3H7TT5sAFQ6kXG(@AJJbpXb&^`yJdTiuVoT1XRB3l7Jb)V4TjTqo zR((8l-SfM9H&z^b1=9iVpE%JAsgJ+p(1xh6B%(+<7@sCfW_*N!8Sw$u>@8T(i*Psn z5d-~%Z3oP}pa@`YDIx1LBFG(_Qvlq1N3`84_#OO2H4h4Jhh>{$Jja8Q-p9pCRr}<>JalWnU+r)kO%lmMU?cG z4tlMRhmH(_`*aUdJgCRpFq|6uq4ULcr_d*o6~EldF;oojUr3E^Ho?r)EMVb0UcEFn zo7?|1;q3uhhC?z*%Zdh>60#b%3bCYFtIW#8Q}s+O)TfU}@Ms_=YJK}tTIeE3wQ_jh zd|#)eK~IB$gvvfT9IQ&@XdBmAhbk6078bJ5iKEx;L2V95;Gp2(v^hk#BpPxc^`k-Ch zLNde=-qJ(g*wo(Y@Av_O+FQ_P7%5+KH>&QI%_>J%=QhGdpfN6Y{9qJIm0j z^E8#bf(rWS_1Bu5AV3=+QV6>ORBSSJ&rH3YC;0Qeb9DD zbP9Sh05rQ0N_BRADD%2MZZx7()1424Qm&;tw=XgicV}P%FE$C=xBl^(t01;3*8zl$ zl(%8k>(Vv|!m{}>c10*{^9P%F9zzh;VqCQHwc>j8;MPrB(WN)s8u)O0jcXxvsWX8y zp_~mVR4)S*re6<@f_ImQ!h~TO4m;=1zH~)t)H4;eREPsol*NLVGGrZS!O7CcLMxM_ zXTWcN_SE+Je}Qdt6OIWM@4$k`mS^35hcanTIE=KL()bFfr5<*2PYrK;lD(X(%^T5 zD3v{@Z=?Z&KNKN?#_Q0WJ{~IEklqC*@n3FiXX^O6YK1-_`&+0iuNEYRoKNrPG`S{3 zs^jhL$|4*|3t6bheE~EB?7I7M5pQmAqr}0!0fP%tuo^3#@ z`go8Q`wc)qsv-a!ZsM~IT4kPZRodiAsMxf}2&Mo#&%yEE6BI6kpgtZx{zXURhsyY@ zg&LXW8y1TM3x2ll@;Br)Q=kHgsBnd@xELC?kcIyGHsliPDV{G~3}Qqrt+HeyGj`MH zLsP2ZSB5r2TAlW>Lt~Kc3g0zxfG!z?d^+Rf_=?X6uhe;eghju*0yfo!R1|(>8~nh{ zV4L@S1|Kj`PaK;|dQQTnq&y|4R7}c|FR8r=6uS&oRUaA6KEHvy9kidi435whIwzxH zTRf|?Q%X1)088jooinEvQqhqWph5MNxjR24-Xd@$F1bbMC30_>QdkA2G|UGp=_tB> zwsXdG9~qFZt_GFFiBsOM zKJ}MFM;?D2vh!U1{KocWpT8mf|vWxu7vf`$3p|=yLy<-o7;P? z!i`kS9>$Tz`X1yJr{W<|TiRJ*(nT%pE~juK!5rI1M%2G8?IC)=;cR?mAG%fl2uYxD z(Iz-ZUzqD`#|S*<^whI^hMyanSct%LI6U900jJKLptY=|0#{dUiB6$gz5r9AkBm;d z12=^qtiI#a_S!Gv(S_FIoIIrUtUV&IkbF^Ev^y=;fFgp7*F&ZI$?&NBA^;;?kH3d8 zxDdW4*LZNbh#Dz29V*-O>aY#KBDdTCy*GwBD^~RL&}~r|hF%KN6oT%<>dyr*nnaR5 zqEGQw#uZPO*^H zf$Pfx>h&j1z}@NBM@|DwW6%q6J#c^}sRyHWYvtZt(3V%EB<`S;)Z@ZipdJfZsQAXq z&>W2B@xU!mkKW@d4yGg(k+y2J9965^Sw>=0Rbwm>bmh&Rl`Hyr;?wjy_W{_>%^=DN zPnsd95m|u_ug2?weAN+sh;>?niGSH%u7pdKN-`VYzHh6P=4hJTtDrba`uC6%#w zY|Wev%!I%G8ceo6G77(WjR?Bz_>YbVZ;`vBvlUw|6VM{E9m>2Kd4uvQ+*VyV#@id{ z&O1O>9~B+><-i#j-eNP__Vtsp4&K@6y?)||M$*s5M!;&KLyBTc3T{iRSwI)x2{X8# zj4$11phL+!Hln}W*%1LQrtc!sa8x6a##b^BW2B1|sJfr?C5sVcy$huElY7_}=JG8WqjL~$(Y@}bm9cy1O z{5Z~$41d@jXRSVMQWm00L0vP7VzHw4w#`NOx4Ub5_`0A8^LyCLAbV6ftfAfL1H$U`T72QT2gERKio0YeqGD!dn4>9vI+1&UFU^2Nj8ngS`tes~ndtB;Ix zjKLO;BiCi^4uCRcN6)!@um=kiFod$LT0G^INCHYLmq7cDz+f$;LRL~MSh-$2WmEf` zM>^Jl(}J^yAu#juk=`-F1XYXya(hN~CSI|wF)^NUHCoF zsQSq0Hq$|C`?>GI^uX2u95P7~v4-3VqmrkLjKk;6$I5A}iEIGS=+5NSLKbMyZ|-cv zlVV~34L|swhE2)QbFMfWx^1m`VFy9C@eeNEZDMvX*AF}ALqZlW9fEW}L5~kq7ahE- zLEbNoD}#RgL(rra=fYiQH-5019oUwC@0kxL@Ct$^76UmvW7EWv5S1dJ?>vk(GW}xQ zo@Ezu)U1IVH9g(#>K}t{2grb+w>azY`~@#@fT*a~0+2&gg1-43;r@q^U(#_@r%KaF+9?jM~UyM64cvFg|bW4f_(#@3JA zvHYK-$>o1o{`2MS<+m=sVtHYCVELityGH)De8uQnqtA{0Wc2R#kt@%*VX*z+m1i6r zL{EO{_2HQ!XDd^+XtYFCoUw+A4XAr=g{@jP6le7wPmx!8DSa^PCEl$qc%o7Qa6zW# z(l*msAMdS@@O)ofB7Rx7N;o4QqLNi(cZWoIPiq9tpaVN5p=`Futm ztJa#yoS;hu@-qGXL{1BWJD8+DqHolVxmr=!G9c2mLY}f~A(t=@@8Fumxx@>))l3Kc zltv%SM5H=FV+aqfCgq!EzQNY>Zm3N@P&4q`w)W^Vt)?Cvh?EMc%&2Z8OjS8`6ZxP~ zh?*Iv44lHNMo#dgPXF#nI#ZxklC0lb@#@2o$kv~T^i(ZR1yuTU+QDbj&E)1ukq&7$ z7(-dFGPzm_d6fUiQjs31dg#Cm+jQD|CZ#-_TzMAhh(@p~Wwch6I%bpS6;3S)d1y6Y z&?#FqpKzuVHDgq|g*dpj>VUsOF(#+ar1zPVrRZ6^iTt|0X<%9^r!m5N0edpdeuB_z z6>Xl$HKSgrQK&IPGv}@n8Q{A}DZStwSoHcb+1NS~Hqfd;@E0qT;z3z4#X!g;FBWIz zcB(1FB)OQo$(CfNKSHWsg@kk-Yc1!5BqKU~gq!QdHnggtdbO;Fu8f&9m6+xMBBVOQ zz|%3`vZ_1|)+*zLU13oQ&1k4{KA5R1z-e1PNt~2h6&N8($QmkfU9;h?B@X_D6tAdx zm$TxN#|vRejG=e$C*sRcG1^j>n>9ahyh6Jv($_aOt^%xBipUYN(skD{&xVOsD0vIH!PuxS~7h8gxiYA@LM%*o{c|KYY$>y}J z>5}D>HCvvl3x}fQXA54FgVE)kk&IqaX6WSE5mLOsC`?*Y(b5R2J=U`PV4D=r$21D2 zRH`b>1?5aGkzl8`kn(v)%i%7Rv`Sln(a`+nb49YQLDwi_Ii;xUlc~rV)1nxaxk7~_ z(n3{Hs+L%4(^o{g0&;97$~Xcs-AYjOIc7r7H3}X|D(HO_q)f<|n0>zo`pi;wE09mrFt_<#5E6kyA;4K`Sdyg_u}e8Uo9RTbWI-`+-3~3lZ=HqEp_5b&!iFprB(6)ow1R#Tfze* zz@U|hL9QE%&f!Zj#fBx!ts^Tv<8%~FSyQkji6tx2&1;G9bShk=?YUMFUjFKigmmqi zUa!rx02{zesic0ppOdD{Ddoq-@gJ@A1XU6h9gi=~}Onbv0{BSx6|!6H%Fy z&{N5%O`i5ovAo2qW>V1^Tf7*wBUBU_Ju?z3+0dITT)+Y}1OpzG5gy_h1Z?R#eWmzp3 z@~`=p*i1)%1#eybJT&{4rw@UjwrJ06%nQlJIF*uiHuEK0RuXL_z(?e1P}#0N z1}a-04^k(88z8lgb-=6&#w(n4j%e5AgujttrA^x6k(8y48X)^V4cb~C8O>Jz26h^p zgJ=D(vAqbim)gAQC@3oVES+xgtb@`7nqb&|10E8udXOCJwixAqFr9qWN-K~T?PQ=YF;MaS_mDlSw# zR8Y;-&wHUKZn!K5xrk8$R&O%?khR91*W7)f?wr}(A4PjP{BSP zJa=9ydMZ5lJT~DvX6KfGATl9SN*x3t%hhE~Mds$4e&~EGXzUNT&ld9Ft>lff(5uJ( zw62}}12&X^C1M6tSu%(YjZYG=tG#L3E?DGsj>wri0do3S7;O4r`!6T(_`y85WWLwU zA+6m{u|BQN2=@ru9V<<6SP1soLq%4%36k3Y4! z{nE?0Z(we>pgN*8Ojp&F897@nDnj6IDTBm}Sj@Nn4ApThw0vqkj z*iyxk8wVPL!_@aTY4I784;f=!sLw_3T z41IU#%R^TWRff(V(g3hZb7;@dnq~jH?DxxlzU;n(UrXw4S}KQWk^v=6!l_YH0b6YMKXA6|Or(i@guvNSRAtEIN3Z%qGjf(5*n z`)nfgOJG_#eb)3!0Dd_!_0y>%Q=gyu#N?K#)Rb##-_-W0vB}papP77k^3KW6VYHWt zADpvP?T{K;2D3eH(}g8+roLq9H6;bg8IP}eKDq;E?5d-$HAft~s z8bUD#H!`5 zBTm+y*14orB1N4`tLSV<&t(7*Rwie6y(H3g#Ts3Mc&nf}%T<`nIWy}BLsc)inUv1S zz)wl!H}NH<*GW`Cou?a`PQdNgXQH`)8|xM zo06=DYtpCAd_<({)0V7;@@68YP|O|Shz{$J>%+2yrEa#G9BJOf?-S>sEMc%&f{jAG zqH00x?~b36AC-aKg;keIIb)#_%hU9p4I47}YgvyF&$(Q6U%?KA;H#pPV?Cg4-izVKC{24jNuj21NHRg0CMTAsvmWs1N~UApnyMs;j)=X<6>M=zBFWjB z_JS*=l#UXm$iWE_-wabt)nf&Z*TiNO`%fYLz(q?XowJsV)Jz6FA0K~+$mjeD%0lYR+XDC!b1yTsODSng7>e9)1h z?U`UKQt~N`w(#lVbYPt&KV9$v?1MWLs_7CkqMtZeU9v&v?KwrQWwR9H?6y@TF5ST@ z+*-yPD0*UMNJgqm%gzyhfDH(=xgiDfHURqjneD@b&TtY7Z7~KU>PDej@rF5qN8q5# ztlC}#Ba_?4R2hyT`m=-1=O7RyBiOvUJY4qZa{@#R9oNkiD6RxXCAmEjD<+mHMTT20 zrCJd#3fTNcUM-sx=Re>pK)Rli&ZTTh6fQ_pE7pf*9XW=#holy7K~js!WyC<|pfdIl z#nh8Qy~75PQuM0zL_XzaK!0vFq+GbnX^7Iw`rWSBd0UER+DepK8)nb$ODbdqr~4uBfok z*Rpy5z?$fP$3Hovc1SczFm|vuyHBd*1#Ng~M=UR4Rb_R%kRnN^LriIaUqr1PF6U92g6RmK=*n26#RA{`(E*Z>u9dz+FB+(dUadgATPhE~=J z%m9#=p!XLvk-c_OzUh&-m>6GBNpwoUK1=N&wikQTW>r#J*vSR9RFr3^v&qhBhmE4p zQo7#2ih;&n8RDUKM;NYxwGgfN8BR}YF{a6R0}$r+!}2$YsJo7nB`na>4-(n zq0jpqRGdr3c+Ml6DQoFn|3!XQpA=klm}^QiQDey|Q;gp$(i7nvB!mmu!9&}v*Jn0u z7U@BEfz{;}+Fo@Eo^rVs%7<6{PW)k4G(v~r1gw^=S$!=&Al6@J^Mqz-gSRN~1u*A( z_%ZTC2J!ypiYudQRi!D9EGV3z5alS`3~h2nX=SkJ3+PiTzewniXt&NPUD9YH=>?N@ zWWT8KXj4?4ttQmrEaTD?T(L=uSl;L6=%zd!N)}xSi^`GMBi?niX1Yw7v%I8HiK)yk z#hy=y9~h||t&_)-+F}t*vSGD&vT1b|H6vKOaM$Jv1)9S z4mMR-XXi$sKE$dN_Hd1&AmuGl$n3^KqEL_nY0MW=(Fvz;*3o}}_XAic=7#4j6kN_} z$45;*US1FYFwespg8!PkiE z?%dLO833KCwa~$k%x5;rVC#VBD_oh6y$fB_&jWYCFGDh%8=eH0wzxdHMcBHZ;|%<1XZYLHzu+?(hhdP-FzV#{q=ti6X1vTcLuw?7@#=})IsJjpb;w- ztj=LzwdQz5p@hgC+_tAiyAT7rkcV#D1G!=^#d&uX%e%cqTyq$TgIKs4T6sCnG&rUR z&$H5yRW!JLWC#TH@c`KyVtadl+;c-+aMg9%t3evPbk(g!E|)Cw#DY9H0-yG=AX;ZH zH0E|deMyXT!4EY$JGTPrK-{(5Y|9y;Q&NvhZprKT0EccI>+W39PllKZr=@-Iqda81 z+44OI16NIScdxYA>hcyH$X3INjJIglQ0U_m-JMel$$;noD_i@Y6J0n-vau$|j0#kQUIWfoEQl>`glx!~XZCb-bOyK>_`wBnOrC4R8a9mjsK)7|YW zry%}k;vC3!>l~OGEf3$e3~l>^`pqquoi{rN$QqXq^*pZ9HnT#?dJIyB)1ubtl`=GN zR(CDhy1EPQ`U`oGe+?k1A?@v^_RQ+8ZQwKz1b`T#AV3xL2dJpTTXf`8J`(^i6gGjN zLo2&0rxx7UmXv_o&LscPcMgGA$=>L8)`s;l; zm`L&K*SD$lFeC9Uwqbr3b3`Rc2Y{ZYv~s~>&Y>l3=Rt;S5y{*-nAx z_mj!=d-9YnKtt&Kb+83hTjpA>=9SdsVI(~bKItdpz#&WfzSHnxS$f@+Ffln+T_PX- z&G09d{TT;_Z9VOi-h1Ii=8BK>e9HO;pG=H(=#lN+6^l*`FPVFP_o0V`<=| zC`wy61H{>}4rR7>S1dL=L}AZecWV@>ws-C5&u4TeHds@cY_Juitf^ol1fE%;6ezPE zUeX(y9S};)Nu=+`GFYTEdT!q*&FK0a-4Bbwd3i_o_LY4Dd~)#b-T5JdF9zaVx2qf2 zVAmU))~qQN@_Q*rBn#PhjSWZ`)T`uCBXCO{~cX!nWD`e3PWg*M0Cf$Nm z^C_D~fP}wr=J!_IUAwz0)-7HHAN^8v_th)bqAh24)gKb^Q$M?V`v>P}Zw{Zkr@Q8Z ztbt3;;@gKleU%3gK=yV6>+OCc8}bg2I{rSlMP3V|FmceQW_4;55berl%fSkYg zPT@o91(|-YMbH7mH$K@JUiGsjQ<{m($Lo&HuYbYyPZ{7xW5 zgLIruvrU7-sbG{|JXcnuCz$T46(3-&{IAm>X@L9T_3g9Su4`bWBdt;^SqJ2~%*mKU zO&#rhyp7vS%M{G}126gtqT8HL_R_?yZ@OMTr;yYdvTQLV zkQ%*BbyrUPI*eHEa-eFVbWJ~etT zgpG_r*vLHUn|*c;L)hqgWkVWCdzV>%*U2X4m zd2ZLdltMHO36)DSP+`IjPYvqXo0t2va9!!+^(u-aKRvjvjkI_gz-{?G{1Ig+md#V4 zgbk)b+87S^&Z*VtJ`)J)C9NtSQzpaFI%o6YGZb>W8bHWG4n$_Yv=d!> z>pAP&DkF3>ZWYENA+1WWF{Z=@yq}#F4qM-TSPcym-}STjT_3|n z93B4M(CR_eKo)C+-d^O(+kx{rspeJ%?*s0Qy@ z*Z%GWxHB$;$$j>GVm&`t*?Ebg2`{pIms zpmz@EkS9AH82McQjAe}2yq1v0D?^uu;WE9Die{hv=Z^Ms;Vw8C!2-mnBV++G4qJ|9 zjS+p(X62+ZMFMpM&@cPQC|ust3*lMURweO<0y3oYG7PO$Oi7uHd4-ne(hV=ZNUTG1 z8CZFJEEN9LcYBz9>)S77upDRz#u_1AqRQ)C0m_pp`&DX6@F&QHBpdCnneJl&DjIn7 zKtRyi_RpetD}ef7s1b2f;cK!8BR2*eM!!8IxH&QlR`GaK>Ej^`QHt&!`t-VXp2sx; zJ%xd;B{eD*R5GW7Z_wp%CTIwWOX52znA;0ki28UGXGXgVR(e`oS~OIMjF5zn!5ewY zE>I19g;RxMq(X<{Fsb@@ko6d#hwgs za2fJt2j!u3N}ds(O@`aGLk=(2>{PfduDMZ*OjIXm$q&$izI*>f$iC zIh^gBbY82^%N^M+!Iq1KRCHwJBm2Jkz$IN#%!!#UM45rAr<_;yToQN8LR*EHy;!jM zZD~1rvjl?r$jDjG97NyWd*l>!Xyol3?K{ie@qtq=oSi!edqaJr{Y<0Uk*Qf?jkMhu zC>!MsBl<-J#Pkzae)UOfJ6Oe2Av`;G09r!=k92i&(#rFN0IdyV9Dx-2eht3vqax+< z3#{!!^{yTx3eMpq^dv?tBXQ{AUB%#10&ICj>W-j`Td>;u$&i13%-a5E3#*N#nx>wh z>Tz(ecjdEoN{Zqa!zcY@blVr^Ozjsh?wST}ytErwWHKZ#?e17~GKkSe?oV{jU#|gx zycQ2CfhuG5L@6t61Q0p^**kCpEahiD(Ot26krHTj(|>P3m)^ULMdr&sRAu|}WuUV4 zjTQ`I;FF6FqV(v$eCzT7WW2l^Tw~Y!l0i==esO|WT%7*#xA$vWtVW7ULqPmYGkA3-P8nk8tZG3ZPvRN<-G$mQ@qv zY_u0ZE7Hx7Kgi-`xN)1}{lJNfl|(B)bq~&sJ3D|T4|kVufCQxwm=uLzFTMe}bwLFM zRa_tJt?C_X7v-W?r59q1LNVrR=*DZi!>dY5rqmPZF*N${@T)_o3>pSX?QM6zeqQgA zi(zJnT`(BTY5)-hTpTQ%(Z+&ZP`Dljw~tIrf=^xzImDm69vgJv`eB&gBbkQB>!zCC zh_a$K#5`^mefJA6-TTRCHu|Fj?Y&=wJ$92G7AM*9jWJ&E)ao@}$2;{t@R0oDO>hJ* zq~c_MV70yMu~XU~`#d%)!q4mGe_oPIb9#!drUNk(?=Q)cXdMD|Z6OsMxf?JH9Cbhq zy$XQ{e0*s^1ljNEa=j(Vrt*-uS=MlH4s^qH-7{BwfcjARydCXVuj@iyRH%Vwz6OSX zBc@?efMD8cKwAoE_6TUgx84jI{Rddbo`gHlliTjv*k1atxF_ASa~NW$+A|q8@_?j3 zmGVAUGhV9&vQoT=cTV?_(UTGrKvib|<@??nu*q0HJEsB}+MZgdEfk|Hldikjv^kkF z2h%8W3yelT8Ir}up+kQ4=mzxanLhw4=eLfDR?aVVcdqI^v3Psv?@vQ6W%}e3%a+UF zZNv$`Mczgvd^J>KvgHW)KGfX?HHT&&f|he%f#bTLhs}zI+Bba#jASdLhN4wM)x3f! zWoc>)KAwCx@zw6i75zMd=bZg2ZYT`edq5;jg9*}47vfCW#TUa(Q<@05@Gdx-`*`TK zSMAX2?*OjjgLh%uIDlZx+2)VCX3A5t$W4iup%iKPASSWbimPseyTU>iI-*+&a;|=6 zWBaAs;GEfPg{~kA$MT8u^1G=K0hakapPs!WZ-tcwYA4<1dFQetrK#8}>OjIgL zKEC=+Xi6Us-cz<>$jpuHm+!>$2QI)Ee1ufO9ANzbGHGw7RhgCnUdP2Qxg9Fe&qK$4 zq=7r|<4MN&$$LOj9}hAzIz)uP$M1pL z-)0O{LUxz3)ob(9#j3xO2QN_8BPaE_`g1l>);g1@ zmlGKk*nn<aqxTG-7+L`-Dunj7Ysa0vQvzd>kmkl)hC+=gura5h5?1*W zy{&4;bRQYbUjNJ9+t;S{>kr`_2f7Snk`Nh!qEV1j);feRdwI91DQ;VzejJupKM(T1 zzkP1|50B$P1ls`yCLuPQs>2;{Glq=lkKtAtV z9_b#0-DY+U!;*++mdXs?^UVY+&7>thbkQv!PYWZbs(fC%BR_A%W1uz`OJ zDnmAKw-An1C~1*4@q(aj)WivX-V;!pJ|22Vd5Z|z{=gH^`=?%Jn4LQxCPTD$bO8uR zT|(=tj!f98v)aW`{0Xewg&cJ3O7j_5|AX|zKZVZeWqBvv+ov zOAx1U_w&Eogno1Sr;X?$^J8Zr$-VG#f&d7W6oY zGNSI?day0~1^%RARzapDf2Ckh6&t~dpF#ijOZcRpjBeY1#kuXZzrvps0#RL_u`vdl zT$1*uN-1>dQ}9VY898s5GPK`)3TveB(2J2z$V0D2TP@oto7-l~o9QCJj3NGM_`aWv zu6ySkYy0Ipo`;9t=Y9(vz4{q2owJO_7lr(}R;M)Ml=EOZw><+N_meU5p0$1K8L&oS zZ4aZ85N%Jzsn{Yo7CZP{wvaYwk?dLc`~%e6?nqnP-+dM?qc^_V^)J$~!mIFEf5*0O zJM`$i1IYb1(7QrdiSQU{t6vMs7re!2oDCZQ)j8jSee}Qn)?E#ld5e`mC+@$3LWiE; zxDi=i`%u;EE3bj-)jvoKI;4dumU|uUN&P(Z*Wa%{`Br55A9yYcW#M@&6=m#xYtz;W zVi@rT{M$hH{|_iSi*o_$D}4Yg4gc!+|9UCf^%iJhc1;Xm@QgG(Ljj~jCT;gv8C%Ph zM6S0${Nh|RaOT8GRQ9*KfXbdVr2)4dVD+>TyM_ncKaBksZ6NL2Sd&|fi=Jyui@MHP zGNOtdU3yX#3#Ra^An3z>CvEiz8N1$=foIKTZ*`r{N#5tVv3OC4!n)|a3XY)3cR?cq z#C||CgwFGWw3I3x(ikb5-&@C00mgn&Zu`>KFRve1hAViZWX_DND~^wU*p6|@isOs# z7^0T%S#|vU4Iy};4W(S5;%5Ym{1Ng9f>i@*{9>GcYJ(< zjkW@y2VM$13(obBpTNlkVGPibb;ozCTbv7#i-z}g_qNHCbpsTAI^+ShoHjDSmKQ6+ zNw6Dav9OKk`x}l=0BFevi`=OG%`Tz`i*sYm(TUM>KXp1NM(ac1zYM6Db(v3<_{^q9RD_4G?1e)3R*d}5n*|PcghdpdJHXlc)29AQW%@qpxrL}6NV0Y;m zYc9pPJrW133-TL>PJwamX%I-P7 zb7~L@EKkq>GNg7c zD;Xh?0b`%H^}zQzLPW4zxP9C=8gZgVyu01 z?{UC9J|ADRu}R?D!_R_AfEhR+zp-gRWr7i0|4i>T?PI%uAwDpUb&Fxhm zJx-h^aU3=o>!PFRm$9jGJW;E$5PcL!#sg57J~DF3-|ZnVf+Bg~IOtlJ!CQS5ZpY-M zkFj&1h}0WN#Y!}!!bGQY$9GOHAVON3C*XP=JhGvE19u!EoiiC{kY|#Kmft1yy2I5d zdR+<~*-wTS#z)UY4)oyqwjjgbDK%WxOEsmISURuuB?}SssQmbj={_=g=uW^a>m~5` zr~xh5urAsDC zQ~I$ljs9%-^`V`EuC^rewN%gMa_zwUQm!j>Y>=sF+!j@^6ydYz&j#q#J}SB`(bIr# z-q^m-heo?u)`E?HgE@s(2xS?JL9qdRXr`#bB~67zBJqlnoZ28xO_ zmAZ)Cm}2bWm$zGBHTCh(%Co)!iX|xIH-7!Wwe6)=vCnaAHRIU#ytTp5<4|Z)jWR?7Na-p|RcZx&BU9oLQo_*placbp-yCR>XJ*{O<7YhkrhN-|(%&R}2@11H*@wt{dJxyz0Qv z+e6O}JvMaD&=-e3Ig}al4DBDt51lbIvFwdyzghOkvb&buxa^W;iDkBB(q*SD8y(gmRbf$fAIE^Av1WT}X{ zk|{%@$oZcp^q4=Rq|5nSE)j4^L#?F$Mnd;#3@Nq<&@vfcvEYhReiD=?HO8YcCa6r* zT@I;)<>kJcd!Z518DEgHsk241j4MR+o|Kn_f=J``bb+D(=qjAbyY$htM@Qt_tB{#H zD1=R1%w~{9X!liw9*Sq2j8ZQ|0ftHHl1ts&iF{)!Xe|~?E=Z%E^_w6$Hz{s}Jl(W2 zU@pzHO#YH7l`@Wt43i>2$K_r+-O#4sws+b}QI0BME@hlaiB2#qW1g-3~EiGZ5G+)i)~{ zx@oSeTfuV1CgH|hq%!)PhN8Yv-iDcDO6dEa0iW_`hEYDLjVY=upW)&>YnQEy)r^xUF zkWs*y@#xC+EEkC%e3djH?o<2eK-v$OqE;oB+8Gp!+jIBB4%b(e2H5_B4MQfpqYe=guA9^EP1OXqx6#U(S|Py z(b8^>r6G%$qO<~{NqYSsHQ7r{%vJ^O2!q_Li>%lqejrzy7`M+EaHTV*mWiE+5_%*D z-J_M3Bo2+2H-!@)C4rdI2yc-w!9=`9TZ68Uli&2Or2dhp&LcDARd&B%t$QiWKSVJu zLurOpP!*-a0MCD=*aV56kw#nw2_@%R5agxhGn&-$uZVK&^_E_qHM(^G*Huo~cZqUT z5*rl{DATEyC8kNpbr*|tTBUVU;nxCs=6A1ajI0wNGRS zDL-9{h8)dEifL7&=aBd!X*iKnQ?azG1S!Wu#f)6_M^c|~NYgUL8un_yoG!}+?lDn} zODChV6^YtJ+1=F!J#}29o4j>OXoZYngU=)6gk_%<`#-GD>e+(Nq)_QTA^R7rFEw9so$jC!t={QrQN;3jyHf0&!kPL4k(P>i1KL-{8K+RQGwYpd|b|4~t zpe`ku02NGS+_jpKPL7sDx;!JN^74j8D$rJQK&B??!=;eQv&OLC;?gVx!@ihs##c$N z1pgm+aMqf!X#H z`PrZ?%d&oR$(NS_RuaS0pAqS17_)=N&0Q2t{q)=%~0g2NlwcASnf0zK}c9WVVQtGbkzL*eWB0tZ5$=X)wFR z)fFgswGb;1vO5hNMMop+KS$~lNTk(l)7A(Sl{S@Aml>#wbcaMs$z~dsP^c<1fvky^ z$bhI+CJ!B{^H_vDlT!Sc(EYh0MLUvNGhYsc%H<6ERgs=iM;OK#@(U^^U^K?gB5~bP zzaVomc2A%gQMv2@O16~*#7q5r#7napbpirnqcaAd{EP}27=KV^cd6vOP3vn}44IuI z*jDQI7a^vyVJpSG{!FD7RsLQ4U57kGB^&CxI_k?dZ1m~>Ez)&7L*)gzRw9w8Oc`OA zq*s^vARvGVMm$LiZE)GN%%Bg-L%5&RmrTl7RwgUCzXbYPt%*tDD=rqtFSYpXtI4l=3(^c7h5R8+txuqe@^gMK(zAgS!!}(enKEjQ zc$1nxh;%<4Vln}XR_)CPd}+%3FsY5#nb&asj2?!?-g;}_3x}pf76GwaKDavK68IQKWsnR)0d627 z4B|+}u67+Hf&(ZbC@!One&^PG)6g$rzCZFjdG5J=>b`fs=bYc~C<0(0r9+gXqbeKY zVaIGnMNsvMfELmzq&)tnGpgxu>eQiMi~5xmI4BKVF_iZeIuYeruMz$JZp5yxS@qUx zTmcC+*W5^|`&;!6l~TL%4ZR8*lc;;e@?ttpb(*vLHVr0p9+KJh4DnX zNt-nkzPDTRkeGnNd}KO47p!V*XdZnQJig9OGXv1o)+&(zG|n$SYQTu zLoi#I#5AE6RQR;rCPORzz>@0jxE*Qj&xs;$8~7FddS%HHq>O1=*!oSe9J+!L;=er`DG277F=U<1zAKo@U$TtAdR(-!=HGipl51;)=iSj^siG zjXPj!Cx&k(>OB=zjO_;KPLVay<}!EYQ(}1(;t?1X@C8#!FfJxl;t}QXdtr0%Ch~Pt zGshK^jCfRdW_`67n~Q~;I#s~!wsD$&5*67Qnrd74Y+C~htftuVuVQ<2T9w1=F8H#n zHA2P4J}(xl?dEc=)h$F61!FAkI#I0B)N{TVYl^xh;nx|sbZsQh@x}P7P4Jy zc3(jh@GKAlMya}BEygo(L75}!T^U=xUC6_gu@cA?7&}9%yZlBoRkY|Vh5)4&Lc&>J z5X)Wa0@bFYkU*#iZl1&*aVvBgx*ZnIEssl2H?`)Z@)5!`p>P?rFblL zVlO*&jUrXDHDa*@Fm*U$vdcs@3jZt+d_@?C*W|R+Yx%8*M1fqRpu&y{We9lX07bs& zK~nB$1yziv6Lf^_Zr+d(X1*+zSL_Z-S&X$bnrc-`CDx0x(2=cW7{~!96uNvhlTWYy ztXMx&6lk+aZ)?uB`ItY>?j$r03WrZuVfd1x-3)>Kr^f3(MgG7Zv1K80+!QS9Rf5)= zoFa??3VYDkq$pih6Z5szX#;l_!MiK$zIKjLcjM|t-PL3P>OCgvu>zMF+;ISz7}DlB z#Tl~%Dy^_}gDoZ#(bgF!XG_=>>yD8>uoVL#x-NL_zKpfa`?3eWDwd~IW!8|V4Iynv zXLYcf6J!Kz!BRb-GBZW5vQWx!8^puT<}kWxdzMYv!ls*#a-1##S=8s={TM4jK;;JorJ$sVNJyJK%0`0CtY;d!Jj@%^jPE78snq&5je+V zaa(5e5wYB1YcTGNA0nJP5p`J2xXI=QS1lcz338FyTDaS`T}Y^R6jrsSOf@CB`(mWs*B*b7lz7?Mo8l{v>}h#l#=RkG_QsPV&Nca0t!`P=Y;HHiA{)uA5b zfY=IFM=%9p3@|Z#7+ndv$(l-edp>1my%q&}B@9L{NilHa{Rf1+ocG9%-UlLJfZ4td z6x4{>BJ7HJsirETvP4_FJWfo@cV51@X(}KUQ8T;1m~`*I?(D7oz#`<@v(3$8xOje` zC}zt#fbl;i&u0B}!~>|``OCpU^JNd%U?egE{e2}k$1X+x8d!w<5m?JoaPf4=xi^mix<#V(*a;HzXlr_2MUv!xKV2g znpsM2)H^5@`dSo>Q7cQ)bNI`PJ zSYWg;@{v`)AG&8XqF&ei?9^+bbMup6Tqh|OG!1=}qqISPv0yJH^lo(ghQ%#N9$TEA zdXI=QoN=f(A6tY}bB3zR_c*oZ7e zSm*B%$^Pvl4)nP*FJIexya-+xG;;VqOgkQ$1~=ci103&r26Zsrv*pF9_l$Q>c306S zLjwq}zq)wYOr-1Rz(2V|4^DarJB**%6>q!MO}AZI?gL zauh6GtOJq&wih>SIe8W2`P8ZJ@+nVmjqu>(1_x-Ahi~$OOBuqTBXktV9qqJK7GtHwUrg0)&77 zbUM=>G;S};QcC%|2nJ4G8{vJH9L83U6K>8U^6usAg-kwJ9ek8q+Y$c7sFD0YW9 z=jLaYod^-3&KPt4Kso`}NESeHv0D~5pGGl^Lj7*^>dI;Wi@BUY{vY}n_6d0A=79-8 zbfJZsa#fC^LzWoavs%Dk@bS6DeUp+>V2lNC-XK5U@P`+TvhACfKg}L#*2_%79*>qG zL|re(f4>Didm{{#M1wZ8f6j ztm|Qeevjzr&Ivg8UjBES;0+Xke{y~!C?eMlUo-E|QD%4AUx9Zc=ZTRm+kGu)lFHu6 z!~W%Kp|A0vowEF8@gNlz7^fqY(syf4MxP{#uDk{YO(H|G5VyDY*frRvtDc+R3OY!7 zw{WA_N-=DpVK;<4@Rq_k>|hs^7NeuqwR-@`yGMqOe|&Kd&gF(dxz_>M?PuW6m7hqp zJvfsw%9}8dC`&1KN);>wbXunn_5;fEN!X!2zOcA)Vxu=~x=f+8G~JAc}8msuJ< zOPJBy(p<>zW5Qja)xerw_#|kO$iT_D7Brb^J9^qr;du_T62rWSW0&(qA%jIlNG0QR zJpd4N*uEil{Wj1e5dm`HHqlv%Zd(N4q{G2iD2+YJ3F@McDv2L6jvx?Wr3f9H{swdk zrc*8;+yc0hVFWh`;Z*T?r6Z?QdFgVesRNw(;7j7SLf@_wVX!%Aidh_W!}^-ww)1 zn*v5-!$e!HCY{w*?#N9*Q}mB;la>^tqc2~JqtLhZrauiT#7Nx3ILbQ$QQi+gh`<ozC^-MFh@FRfJ5T}eDR;5<0UdQcj+5@(czi+mfoQ+ zV2>%xDU9?cbIPPNXhXCv6lDYHhR>~35k;xHK#@d--u&d4=r(=&F4$alV3;>q%Ur+# zBnBR;mID$qxd3Z<(447z7J*qwB11=XZ|_F~lJ3eqcsOAk-obf8mcT%jE-IZWfv=QQ z8Zx1-yBC@x5uwVHqYy1{>wkgc{9bW)*|Xdt$RUx=(FJck!WM>DCO4x0h>ML%ccSEj1@ijMNlM>K~mFE=;q)EvraMMklP<2h650k6Duhdcc&o%i3PDh@ z`E;d9&Zy~kV$^h!dN`-x;JvlI_xUIA_5%+I3Y3zE1YKa7cE)e1$~hsZ(5h(Ud=?Hf zX))4pf3o+Udlo-L;&byDnNR-SYor~Xnl=SlGE1#akVA@phtHCf5{jRP{~caXQzM^% zmmMuzHx?W%4Si$vs~DX7CR%rFabh~$p>h!*Hc9%!K}CYkWzf<8f?>Pp7<9Ho1^~Hh zC^Ua`^HlG%#})^;mU#>qCp~4NR7yFMu{jM5A*^70Jo@D#v`SJ8K<`n!$-lC_7wO|W z6bu-KiW41KPb8~!R2e#KfFxO_6gu$w;?|uk^)7g!Ze<-1c)z8I%av&HPr5En$DN%LR)XPurTRV&%%DC%FTdk|Ka|b##*j^wpOZ z_sqPHw72lb{wD^Hz_n=pzZS=4LXMWR3+eqr#%zSwP|mKQg9EDZxa{3>av{KjN*1Je z`F&qoAAfleAG>QgK2|ccCx$)r%KHub{A+u)A`KG#tHtPy-7MPCsJsn5a!A2o34X`tD5MYANe;r2nq(Y!Pvn*qI;cb5V z8;fHTj6My~bf>Pd$r`=g^4qQ$TxJ1jFP^Je$Ss~@Y}rsI77jF80myl}xaD+K z#VD2U-isyG(9z2Qn)S|o@aP}#z61BcL$I>QiId`kh9YIQ7ed-*iuD!A9=PXEum?&+ zz;|)`S+{@n>pOba{|VoX;M_mB+&&WnNgtVng$+~{O?^i<=`E!2(MG_gLYXm~X&;RMx?Y#qk#fsqc z!mJ5oKlP=`97L|LDNVy_$fe?7f5KbO+kXZ{5*d=cc=iB0yuEkXf8!GiItcRvkh@V( zsdR)P*gM_{25bteDNYo9;Z1l8N@XNd?EIU@w)IAThl4dczGAUNbCxCz#xTZ}87#CJ zbk*+{CnqH`G_7vKxw-k+_TEo_kB3PyH;)+`bc3DL=d`h^ggK?-+I4pjtZ9kAfu(b0 zDYm15jpa`doC$cF&w<(Jmw#W}eM*SH=RQ1o-^fpfhalfW2w$iU!iCB=H;;kh1e%;o zhIupX3gm2IPdprTacIwQfA5sE7{%5;wI9tlAoBV%!+ml?#z=9}=>ZP7R4H4m8_)O~ zwsagF+1}rTJ|^pLoRo;r^xXlN1#f?QNAI_?z6;o=Z1PBvF$N(10=U^?N&Kf9QEW{g z7)Dl#;5r8|!9h6hx7YM_vYjx2jLYX}y<>D%RGMVQDbSj-1<%7x=%vyA#)*{@*wr2s z-+ab(paoAu3>YWV&|+pAJgu%llm(^LIU(}%*l2(A>6~0m$=_`xk<=qmpo8aNWv$pd z`sLoq1zhz6YtR&$zGjK@TF56pJl5Yd^&Zi}6Zc=*+qPb87)FqjhVgNOPe<3XMx!r5 z8?!n!X_%a&_+3r^qBTdEvkjCNb;q|n$4;LG_ue(79dGt`#jG@ldgg`y%HdKOg z1-f%P=#Uhnqi+IZ7r+o_dK-7(UWDBWL(9o4MQ`oef|P>ws7msLUCS`Yaw<%AX)&6+ z@2!KqZ=4F>i8DyeJ3#^26d8=m`bxVKGq-|v>up)f#!X7`<2RbNtt=Zwn$zLa|m57<* zTT107_@sb(|fXTrQH7-<^S%>pq@ z|9mSfH;D*Q*MAs#(gbf=?Kb=+uu!ba%Pp&`Qfdb10TZe=Q*y*maASY(#L7~1eA<7` z;KBIajqgku{i+H1_y@;s8U5PGE3hw}Bh%w4a~{Nz!_6-OKR|ANW}`{lba!~OFJfuB zwKTeOKYXjC^wx#D&Arpk?nh)(?W#p#r6O!n?qQiwKtMN~)898KDMiQIV{mlb_tf^@ z|D4k|V=|ig5WI#78I4&1*XEY3SuM$}W>*I#&cnYbDO`B=xU=`ld3_)|ROy3FgXVBiCl%67BVqBMC&sjI9S4FQ&@ zyyQ%1oJ0n`Kp;2*U*L9h$C-W6U-^x*h(;eYl6di|5zbPiReX?2LAp%{Q^FbnqO!6W zRZ=i*AnpBjq}z8wS!zEhgO%U~WyFK$*SI?#%BA8NflIPcdlJ2U7AyrxF?{Q}dvCWr zx&u}A^#4L!cnf>`r-{3dALx3A*NWd6}RM_$HL>0;6Ps8NZ6hMQIvqoZR+5eNNC3hx}3&CLU#TIA|A)Vj$A=LPYw|ubIw8{%V>eW*YER5r&>$lNJJ5Sd zsV8PG?DZHpA%Vkk9>d)UhovskHc)KSrimq0?Sj<~&pTs(2JKMxC#R$`bo9I@EoC>?Qk%wGuS?MfM{+!oqL-gj?a*oWlrU7x3+qY750 z+4hE1oIj1f0I;tY!^D)xkjG;ZX@b9haX%=VZrK7hCBv!>Mzgo>4a71?aVhkkv=~gA zSx4`&TdUCApC9b+JH@zaVr+b7_2cI;jUyDPYm(* zwC^*-@6h+g(cSvKd)G(251k1K=Fc8D5#KYSgRg8If)yza)Z z?FVGzZdk+c$Vf1dyr$p`1@kV*)gJY0 zXIuZyt*#LGK)Z=9hBFiBuQv;T;x^tHww}qTsCS-&C$EYD)uMxR#Mz(P>dimZVN!WgcY6v8GGJQc+#o>9#5Tk9{$zUUw?`LMU9yp*PbrgGbZW-o3uQ2e<$r zk(-{a2y|XWo4_ytMt1zCy951=Q&Jf`CqE0sL?8P0*4{M%e5HWxHM6|EI_adT$vB$4 zgHz@dYBM?>gv;OsFwu~wGG-?rDx5`|rbx#PQFqZ3ailzWqHIEUMsYhX%R!MuhK?SC7?b-0Pi^ZhT`t}> z6Uz;1mg34VmGU^P#+=TjgFDPX(I0})#Znn)dhuW{6apnU0wWGeh~d+xHBbiHced8yVJ~U_qZ4mID z41eSB!}XE}+Jl0F#-s^AkPiM1JQ;OD|CB8!uL7eG7ilOS6yA4to+!ZXyz-=8KE?a6 z!JhOKf0w!Lfl}W$9VLFjkBokKs7C92Cp()DgB zOqs!_fIs7k8muXa4C0wu;=ALUHN4rt1FQ@i9$B2GEZ43DvVOf;s26Q6@VH<-H&#H8 zM1&rf{rAD%YZZ8TVE1AP+Cr{_Z7);OF?M%5Vxc_sx?9}&Zuk%^OQ{U(vcJ2u_v(l6 zTMU#Gmz5N3YFnGNbkc5n6U=~q@q>AlnCl9iy zf%8z1Zl~eUwk%~+M%-n5oCYy1S5j;P* zYkt;-7D;4idLKkOg8zJH?_dXaF}xh|(8c7T-AGl6CZ|iU(<^I=dPwY^4_*b6Vxg@D`i0BpWKUHnEvX{-oIS~J-Fi?Xu6V0#X3w&9 zhK^@}L;AUkf3c&t^CoC5ei^r*`$VHkBpTu?wp_H>^mxKyaXi)6f}Y??5rpgf`C#uK zuf=;lO!DUPB-hncT}!x~OQtpMeBCFG*W9BR2AOpIj-ZyT+ittd@p+RKH@L6Tv7tz^W z-9SlQ(uk{W;(BP%N)dYVD^J2rq4Morz54ZVvTm;}w?dIn{%K52Ub);2br2?O~6@U)DctLD!8ng!CesSj5osvNkqu=10dEO z5U#y;Gt5nKM$y>I{LzsIhK{cppV%s+$K`OV`qmEFuE5;FD)`(h2R^ihHWiLiWkz20 z%Hx%q3i*z}lW1irdi*DF^dEj;^Y-3TNBR(V30;5H^2h46K}fh|uf${ejxk1g#OLCx z{{*XADg(NMTlS;-uepC~&wdXy6}zeb0op=tcp8_dkcu0_-7=l1Dg5MKwD3hZ$EA|v z?Z*%H-ufbFz(y~elbhU&e9gMSPwT^xusLF?mdWUW4S7W|y7~&3i?zG)MhA28O89H? z`>J|Y?q?{!&z{j`JnDqFxb%1RrzRybbo`tT!W|QWcYAl<1&VfH^f_6g(Y#>vGc7|| zkyZK~Km}{Hy;q+LoO+(u>VoH$#Z#@&3^E(d9vk8seOxz<0|6ILXUpHNJk#pv#Z;CnqH$ zbkzQvOL`9<#cMu1w=gn#!F961oQsxqoQ4WDBg%{k64E5mpT7cgZe=NOM1rAaU|A3z z>^o$;qH_xnWi5s&OYU_Ia+x~!f%m!cq0^PyW_mY1(0AjwvjrS7PvXwZd^Fghe0qx^ z)^0NG>uWIF(qhQGb%DKi>}!3C zY*%t_0b>uu*y&`~3;<$nyON5wGX)kYzR}+|m64We0>5$g9{on&E<5GoRU7_kd}7tb zW6jZ>BOh6P>(Fc1%y8DOkN6$}0&_9Cc;%47K>y3PPCn4@*cTG$Q{V2pc7e45T=b%~ zqG8I^<*X^&O8IPINFRkX&qME~AA`}Bh|uw|drn;NAy7Gv4t}feMz4IkKMv$m!GhDD z<((#L-l5mvODpd(8MOZvst%t ziiwlY{Pf8upJ;a2_e?)JqqhJJj|G^iENlc`K@r{q(ar`Iee#+9-c2VHqQj~E^#8}= zfY63#@ugl5JPN!9j4c_?$y-_x+QEWPpT=_{sSf$F8p*W)@89{T$VCGHy5N4i41h|~5#P@#nhj=@8%`HrU9&#p>g62wx z20NzJ;_#HTsyO=cak#c!(uXraDqBu8vaNSVpImenCP5Rqa#eM}2S@YpR96UA8=REL z{{w89URex5Pba9NpZ)4%Sj0!c9mJ3VyI?b~{9 z9V7Seh4JM^R7_Q;KsD>|%(2kvt`NtAx&^)RBRD7}GBo%4v3)=r`C|y-`Z4U|Q<4=c zF6Kvm@;-|h9|3Up{AnL^IyS>ROEX+3oy~+Q9`HyFp6Pe|40=&2gPp*#|Mp)$wW(LW z=QjY=IXt#Bj7FdD?*cNZ1%O|OiQH(NU4ZL!!C%uhwN1c_54HmodL9k{i44V3`xWSg zpLEB24?hpK?&(jg8hdc`MPMkuVeRzrC2MlB-a_n-D+d<&1su~(?vtfhO&6s@Rj$cpUgop733Yj zY=Mv@&X1uPkas}%9T->HcjMenS{1#y*GSAY==?wS*CN~R`oPDphpcn@NDBL8<~E9E8KuZvg;9Fz50+INUmP?5rioq4gHn z%1&NIg!-KO$3AA)yFw2^K&E);OLnIdJJ*l@2lilzY_M|?=+6Uxhr?M$qVITM{iOAu`+BrNHx3!Mvav+ zM47IJdH$hiw)W8Q667@U&MmwHoUp{o`6L^Ur{ZaK%aRI`+wtKwOPi+NBRZbA8SD+? zpWW7bV$G6Cw*4K@1f%6V4PcL{3l>VpHbUs?7s2NJz!w?y@2 zDv?a8l)6B)mLrPB)`Ft0+Ci3rWz;1g-yUzaVB%^l+>h#qs+5@T7l&fzn$;M);5_YX{f9*GD&9-AeR3g4Vq zB8IF544ohk=!UwM?a;uiB?t~KY%~u}tBvS}aZn_Yp`*ul4q}vcL72?avLUOqYV=zp zuMKZoV~~|5E*OuE-P+sz#%W>vP+!0}1M)kJ*-{BG0V)Fs{bI-v8l1Zu(dDP&(OfA* z#~%J2Ja%Hg+0pyvse=|n559vm$S`%SnKn9dp>!CsplDKLmTs50V54a6pUS~ z@vGUg-WpX~Oto@D{I=Z2rBfy)G6*@e!wS6jyIXrtZN$^VGPiIxoY^GLVpf%BoNk}Z z;}1j?@w%wzqdS*QnOG@89?Ooi(HlSd?pE~col9aE!unH}PRIK8FY9wP6aljk3h{P# z*A!GhW(C|;7jA|Rl!%Zfchev*Ir`-0B@x;EwJo3zK6C(J89aRbZjY-#XCh5=hAM`= zEwZ*B1P{riM1+piZihP#q=-gab}Wej9IBm5r-|HqK^dmF8~xo1k~{U9$7BV}GPkC^ z=I|Qx`t#OMYqqVC4OsdfS$$;nM^{%?M^P@n@WxtetPxhefGee`Y>(;z6 zlv)2DL$2{R#(y;a*!VvWsmABW+c2%KAGeHC}o>C3oJ~)X3jQUS7Xx>c+Fo)jQXGba{(Gl&~+n7af`0cU%!!Hd# zJN%X5&rH5D^q-T@4PQI<&~RZmux@PllHol=_YH3t`orXr$r~rDqxVim#|}+uC(kub zZXEsT#M=`ut*=cyJMrN98z(+9aqUC_a|#Y!B@2!{dxBYT{jWAWIrJUOE;#lQ@C&Bb zU$((DzIrUQLAl}d4WsD3Bk7shM!;B36iuCc%@8SfvdQp24`>b=8i$={GFfE-oEv(1 zC=qT=ZdpUgbPc1YqNDV@x2^296{Z+}KB;ds0jH#z)B6*CpR?)Ctoj$RTwOKM?M_G= zH3w2{nw=tS7$@?s&qBgcl9b)_kpZtm!w^b(=~O1m`ZXSXjvXP?QVoM4QejLjw(c=! z>V9+XtUrp?Rc1ASsp|@0ZR)1W8@@0gnP?d3n8TqdLJ9?{oacAEP8y>xru3{$aM3jBc5<5RV2OT(9|QRdWrV!6BHVpyx8kd#}}v^IHwaC|iMa&?N)G%TS~ zy8_;O{@e>leO;L=F|iz5bg5XN(qgrL5z7lEHLa;TJ)u@4>Z8@;JH_(ZxLIHwj%2~* zjN6J33O{UZ-R#G8P*{zD{>ZHDwZzoueYkJjf zojw_%b`k=nmDb&w%1qcW8rmS6rjpTocvgt}D?&pxr4#j7Sb!`|8Kxf1d#beEz?QxHr-AqV{ zBnOL`o;Cj?`2nlStfiFIjy&mecfzf_VTqI*1Ew;|)wqH(rD9z+`kath?#VP5ueV%v z$BWrkEVlnOQf^B^zGXGl%>z)?;x=(w!j{-D`Mf5&rOTE=USG$k)ZIm@&l;0H0~JdZ z;=yFVA95(tF7ao>t}N}> zbpaI;P8Q_qL%$*Ao>(Lasg1hYu1%GS@`^)CM13%>ZA2n`cUIx7vr%RG&|y;FRrTiC zoLghDvSEL$o4DlPMLk7G%97JL$~u=Nr8iM)PZ!JM_6Dt^okrH@)<)}!;Wx$dh&2lj z=(H&xcBR607foQC(8+@)iZXcl^xpp_ALbJLHCNZI*C}%~Z=1Vdo>X^* zbTEvR9Fo(}&H$Y|<4dG`*5!cf3pm6z2USm?77t1X* zmI2_FezstVs=ZE*Jw%%C)RpNJ3&d?2YsLb}isL7W&2h6y;95RD5>IfKh_k_|C>WS< z(d*(2F-s@RZJ8m}A;do1t+n((GZ$d|%H4#;uL0yyEr!hoJV3To1T?_N6@-JS;c&{^ zl+)7oyIfpY??|5iAEcS~rn*QclMu$N^;#<)X4geTzrB&J=i8cWw`8z{y!;uDiPd9H zGh`C*)p=_&XK|-D5GtgG-R;e=TDF*1I{QtXIk`f1AJzy*_O^zv{&W!j#6nS{a|xZDmJYzw__P0 zJJ+U+dRIQ}3*>XH?C=-G{*piKU=$xsciNwM@DftN}UW^ znQ}_SnPbVI-Kf5Zkp4B)@hqg5*V$<3p<01etG(n0q(C$?L)xQuHsVy(=+1#xOB;=A ze=9b>$R^l!!)x?*4T+*NzUc_z;B2UbfQAjG*kDkjQsfl;kW2i7WQwD@g|ISP(ke10 zYV|>}JR~?NR!_H6dUM;QqV^M-z=pk6NKur(uE^D!F2SJ)C`f&m#l^8Pg*Ii6*PDDm z;a?PorRAIr`JiX~buDABXZ?i7uMt*zc*A=*xdYKbD_DUot*%t_OgERePt)9p|Z1`}Ej9FPromYPDwQZQWc z%A+oYL%a%ve2FR*)kL*9yVIPd^Y$a;Ykj=iWwCeZK+!F)bX0cn0QV~rI*N%|?KN+) zBv@$s2>DruJ62;eF=wf5;_a0>WBUauw`GbMMn9Vh!V2Y;`IKPo5rHvjb2IsZIh?hr z?6r8@D$f3(vuR;yM>5J*g=CWAtp?JbFkJ|!Z53~|nX0<^nB`)k#$2eBDY}(W<*9nn z6Y45_A8WKopBdovu=cJlr53h`Whv_+0af+-bB=dO!*?C3i0}k)0EUG6I%(tUn5ut zYEB;DZ>g3#*>x~O;@%&u#%R{#X-E8ZSJYdZRiA$)Q51|hTfiNgZC9EZCd|>RFA&RV zD#r+#I$Sgy2`-(J{h5>pI#nmo>=pTH)T|BZg_$*Cc|Db7)4-UNRjF0VP-49}eFAWfa9PrS_V;xF9gX=^82Q(Ir@wm*If}m9hYWgg3mkFqZAQOz*+(yS?#OV+rUz%AhlI(bvWDu$86aIO@TDS$I7kuRBRE#^Xazg+;U-KUHDw8d^HU(qYvhS~I* zmq>kYC!%A$tUgzC8P(~giakdxui5=nC}w8c-l$byQ&LxmUkr=(C1&KshA7$fD+wQ%f_RFrTQmH4Y1ay>XoD?9fbG!E)dB@( z7GgY$hP^p216K$K1o0+~VHLJU@12qs;{dt+x1am#NivC!Lz_2%DJ+AYJ8Nmn z=`^e4-fhR$NvZ)%?X^R_%9+@v7@u3fY!4)MB-e7vgD!2oRnXg8kxCrR?qAwFDJg}Z zq2D-qtIuA7T+gXiQp-^-f6An`TkSe~ zL!y~X+QONEF&}+(@6yC%WTgz^$?n*LruMDh+S{~mX)T2FV#+(selRRS)6Q9LS~l*^ z!x2y}B%*>wnav{A0ce_}6djFz9zgL2mLRSHQpB7$9v!=O5a)@Zq+*H~ob`S|4SLCx z;iyPA#3Z#U2%2D8<}x~RA&mBo7cWguN4}j^Bt5_BLN6&N)n7KpLS|wH;Q*AQ&trHm^^qIXvfp*ocBw zNMxvTrxk+U&b)0$?{x~#7%gkqs!jaCX^ky^;wG z)H~k6u~%D`R*AJ1k}ZpoGq8lWK-E?RC1$x#DErz&ao-3%p?S^xsf58NP- zE!ct$@368i1eL`5uh6G_If~EJ4cQ=9gd{|z2xf42CBEo2K@C3x3f|ccjEp}>< z5f($*e>{i>76Vi;ta$-L+R3*oq(rqymVgEKP!#{bN*S7t+yIc{Cm?`!+hwqH0aLzU zUY_eg9RwM60?MW(=xJpXwhSj#hC5VUURLZw(5<|1c2@E z_uP0n%m%3pO>bKRAvb^cDI^-c98aouun zq*)D7p;IWit#@ihJP&cgZ?ctijP;_LQJDlY7h{u=MLYHtI@KnyR*3!Hh#A69@rkrw0pu)q){;5%B^?=eQG4i)QC zc84|{NFYTK{zO_#e&vzk(wAjhArU6fsb)Br-&%ltjCn}CnRoEuW4^k)1Z1cumG&OL zf78ch$XZ=GWdft7J?_U_|LbYo2yG3HlMTx24h0t$TzkXWc%eY z$k$nV$ao^U#pRDeWCe~J(Euk+z6FFT@PB6>%|ElWbvONP&aIPGMQ@I56sc(j!7Udx zmms(WlLhe_V2pJ@4p0vr4FQWRaKNI=oA8+@m-gnK`NM(??Qbug0;y3U?xUOUL`~kT z1CnV%epyHY8qFckH82Y^?WHNmk9x8yy`!5Zp|5s!m!=`YCd)f;&Px;U;6mU>g!TZ7 zQI;o4qFqpO@+uhRwdaBPTMDwXm1@#k+7rEnNp+nCW7Zk+02^&y4oZQt)j$)a?hk>| zlUM02j2^m0h9Kf*9olde^bv%dc1R9g4eg-4kdo8Ub@{yl*0gaScYuyqCWgQwFQ!)xIh&Rla zlsUBfHt5*Hx4_P@QikrofA@am&O8kp;4QELo(jwX3t>=1!p4d^h1*YuYVo{1=ZL5o z_)&c44uKMKL+w=CRh|hosyctb+s!C4gDybpuZLY! zDubQ z($#}tRWTMi1-;S`syY)`(Vj_3F@OzteCz@%(RZ%Fp92S#Z+ZW=0**?jh$~}(pi*Ae zLGR+}|KN=Lftu44EYLW; zo4aLYHFV^~A?(!u3GlAYfl3j=c>>6gLRfW{qD}c` zESK`+3{e1$-vcA@!CRplB{Fp6XSc#zVSe?{fUD#2Tk+&LygXISb#<{#F-dpXrl?pH zG0fBqop8$nbizs*Iy`<8+}7|#^4AMk38r8m&54IP&K#9;hMIbd8Em0&i~L78g(SrQ z*&7>N8&B9$@D z;mZf~3@|x}P0?#Sb(ZnRSevUD4rS>W`JS8aSel-a%HX+h**=JMs&4E3<_>%;#~WR( zoKa~kVMxMM@ze(2vH5g4t76|3U8j>)LpbLvx?1_4L%nZ(cIi?Q4tp6iiCl=wCLxh! z(k(gTw!5-&K_I)q&p!!GlFERN^67)UgP+3J{pj*Xxo8KVxm6LlQr?xzW0nNg0MHmo zF*+uD^pf7Kx552VoK7ji7JLm*yZ#&qd@huw;7z7-4i;q&)RP-^)>jF{sB}o@%{H=3 zfd)_;o=q?QGi(r28PX{Kx*t9EgTHR+>Arw_AC^KEG?Cjdr48#`j8+{{2JNRd-YyWgd=V)iVdn~Bdp>;xzDz1ZM_TJ(MPB>uZN0aT;Qhun zw}9d2Bo(YFS?JhkkJDW$x3%fC4=!5wzz|4_(b0|7LHOLpUg;kE+JfB=W6w!Po12Ar zm&q%$CQUx4jYI%4j=QJ#MYv*1WWX3u0jtCC4|n#qe+lngpeO;|Ll#`K>&W?odXqnE z^ZUX~j_A4kKImqN2xWgxuc>>Ot z;$5IeDxqc`JlOmGU7%wB*u+b#?tqk^Yt~FWyZWYyhbBHdaot2|A~bPuV*kX{4o@AOnO&GXZ@fDmAGgWAKhBQt93NW$+Uj4gUtIsS^>?rT`0B5&Z>>MP z-n?GEe(UP<*UQFU9XmGm$k>swkB(KwB4e7dv&W{_{r9?Gtb1nN1MBWs_mOplbpcs# z-KFdHuA3PB z$X;F>TWeWMt=+bE^~kSAelYUYk^eh#^Xear)JHBK(XXzp-aK;N$fn`9#TcYJhOd=f z4{1CL!@=Q8R~v@+4o|G1hyJ)``_Rvao*Me{5E_~t%E~@B~tr1F; z-4&&V3zAqJAx;6YIMp@^3RlFS&18cE1HVoPxYBCMKbz4O{6UqmR!;ee+fK-GMl}Q$ zCmbfG60s=#Hw-M*Ldt0ZM6ksa&d2ixKkFxv7DC>yOfe0epXLgb3z7i)7D+QhDYFxD zcmhMGzwuDFQ9Zygpu(4dB)UF%jrAo%Ln*40J?W37s&?=|821XTChX0k62P3Hj zTd`)9O~z6wm*Z}dm{OSKQ*@B#s8EfjJ5)g@xc(si0b8f3qB-i}!a+H!%e%f#+V3&S ztGQ4spieua0Z!#QM5>p76Oj(bYE;gU$$Hfp7bkvhGplzN>lU^O7F{#z{3fYh4ceQK ztJN5s)q3M0E=`|*D-l%M3O&PA6b;5-%QW(-3yDKOsMI4GMp4wn{V_-!S4xciRje>{{${MKV3Rjrb#l zin_p1>ZICcibSmXCOy86{6M)G6KHEgkhhgw6|h_9TqKr9>NPr`uQhpZTIX_evPVyp z3mpo+4WeKuKIo%m4~XSqy314=g;K%>umQdL;;BIg%?f2B#1v(nOs1r^nVZZ;8|k=G zC9CsPOeTe^(Q><(jhl&@QbA{C>KyIOciI)FFS-93u{`5eQC4}yP346^%cj1V#1aUl zxIRroFqxArF+Q!GpZu0sUz;+}O-Fe)!!{E@h{)3)6n~dkA*(0q)TYZiYT~zI{dk*WJxwhYD0v_$ zOMW+rF%a?*NDUhA3bd*0;)P&l%df=xhFF7km8!F;c$g^{Sf2iyD4;T3rd`)q{kdkT z9n9`}gOu~NMwCelMk#6+*KTNuBmP(rxL6&Yo67L|C-S zS!znt9pq=zeszqhsjTf{Q)tDt$%Dk3D!}Y9P~lqH4uP`StR;Wy?BnDQQq@|Wr2=+F zaC)`zICUv2mKSUxsvY!JD;Z7?5X!9+V!5}JV||sT(%oo4K0n6vs#p#eS4LA}lS!*a zS1891SxI@a?zU5Wu3e)&F_+-xHoi#OKbx#2Jc@9T&v$~^R61oOQ656FO8IF`jqiAD zUanMB%eISpj9opGuN#yps$=Cf>=|PF6G}~KFI_Mnba+aM6 z@JI>={!V^3?h$whiE7TOmAY)rz_0o^sUK@*Il8NFT3-e@Yvt|s+k)e6s;3yM-Y zthc+92Jw`NRq_;L;S|2I$&gV+)d&70R?pelQh?+AR=L4xQ5#6So)EKV8zED`n}G3+ z>5|&NlRz&arYcofUj$N{rdkelUAbdXR6`jpMze=+b-a34TQy2zMTD30+!U@EmKODSnf#+Y&($msiKTe zZHsRp(bqym)y`5eb(Cd|#wg7Tdx;lah$t8(&GUkwnazZg@(!yZ(H2739U z6+WYg?Yx@&Kv>;o8Kc&24uv&dPnlc$6zQN)rDe_g)OEh=wl~7e-X^IY3U>hRld(HX zf~Hz#nDtx5a)&hs)J5RdmdANZOkq7TD+)}SETrZ!v=j|>tB_V+N;0+zA%$RPO8<|q z_l}dRs{6+?+0ACNS#~#NlT85Zkd@o5kjW--iIR7d#`sa%Zex}C`pu~$VaOIO)c7%t41o6qUz4%^;Zr5>X{a)-G01hV!j)vRiY0iDrmpp!e#CG81hqLzS(#;xy# z>t++R>M^3-AM4avz?#xV^~RFidWkr)ep9YSN4wTeuFmi}2Xo-HVdLk4P~8p~si9sO zh#Xz+Ty{sFe3hRo<=A#mAy?a*HC~@vO#(cMepcZI8i-)V-VU_YOkvqTtj`2^hIKna z`Iw7UIyn0UVmX~IF$EpflE+j=V2O* zT!~ohsp5V!QRK^UN}6tm%^FoX%A2yvC&lszQw2)dO1q^{+q-$i*n7nCusp?B^)`Py z5J%LzPal06btOUKA)J`B>sW1*IgVEZ+Me;Z>&AMtSIce|H#e`!&SsP@ zXDM6J04L`j@rvf*lQ~9Jb}3DMwNmd$DEAXJo=hP|`@Ef=z5q0Wlyb+tWU+W4M#p}> z#u_pv!dX-OZFh*(twAMiOGhZ4;Z*N4UOhPlN0WAXWd$H`e8R4TZW=&4s#r5eN@J2D}&SHsCZE7mVo za&$&hD<#z}LphqGNI+V#o=7(spFPeb5_ zSrG7;u9~<3pnG2e2fl0%_TTRZlQfuAFzypEsbmV~e3@x$^yZ!w!1xR|-vJhbz=L2h zkVr7;0VFdYet3%@Jcunb5cpC9H6-xGuIu%9iq?lRc6Uyv@x-w|WY>(e7?Vg%ePi0;Hcq5mK z6x@K$h>baKejhYRWJvbN7B6aOTUJMaC$2~75Ra0nJQ3U>#(Ineh zM$yrzMU6lG0a(43%8=};X)x2@@#tnG|KUl6z8`@?Xd(s;BTWp&owgpGaW?(BWHd}y z^Q4IvJcM1kOJ(TT^V@a_)rU?1{LL`1=!@Sc%`1R50%J@i+c`56sbm}xN1k_O#jaa8 z2F5h046w|81dMJEcQ&A>j-71a=z}LtV*Acu{7Y&AeE#F*u}_XZxcp@trS|u8t_7%q z7J$PLYECNLYpJV@p4J#m;cO>~-hTYVuBoM^Bs&h!ZZ-=?j)Q*|Tih^s7_qp;Ygt>G ziq{gx1e**MT`KI#n??V70?f)189H*w^iDLyK;PTPmQ7HE0mO(Rb-|$1Fj`q=@vWWUE-RYI0T@-8eY0V_H&-j%t1- zGO_$?Z~_QSZ5Cs&P8%Gx4B)V)Ao2}mAA`jsEe4cQ}ko)lyJ7=WD7-GpJ{N(Wy0ANvr5PAUHkC}9;a#&dpa7gt8{ED;~eg&|;?|uRT ze#V^3mN}=gXtH|fz`4to0qm~j6zuNOp@$~tpFFYiOcO#x*Lm{bZ3z_k?TO3hfcAp{ z=tw@|*A|>W>EXzOE7q@}(NDSl9D4G%Cnhn2$iG(+7C!kVcsy_V9k@+h009v3M_6zx z_Au~c1jyH&fIT$Su>%rrPJ0voLsennmV3Ynd!Tt@9DVHfCnh%Lqj^Y{r<_1@8wojh zjBgNy&}Ve#?@#QSJ)=-KIF|-TCp2i)cE>4L%3c86rp_XE<~n)?Dr&;s+h76fnM2=t z?!;N({613^^y=?tmw2w%-(x=sac^vSRy){S=>zci|AmFcV{+0K%B2qB&in7BWPYZS?V1PwbvnE-gjdU%z&@@XD(v z@(|pXR)$!b3TKlFkJ+JA(WvkzSRT@1v~W&!zwnzs;k6H^F$O&&r*X)Xi*Ky;y&BEP(!C`qVX;?n_<-LD{UzW&F?Q^oBZ+esP;lE)Y1h^pHb;<=%==dpf zo^=8$i7oG`7SN4v!kS)M3d!dHun#OMTLjrZ#ZEX4KNskD6iG(KWDTW;y;agA(6fIB z_oJj3v-iO!Iwb0P9s75S{?K%7Ix?-9zF>OI)EiU3 zo%+$#T~nW)x^}8C<)6A#Ol?N5ANbwmyz?yOS?8X$a`KOp{mJi4-ZA;H$RWZBu z3T-{%Ev_N&4L*^K_h^$nrm1pShn6Y^7}@YH%sazsKa*v`?zlTp~8Yf=A9aQM-|KGL)_g`s<^;?(?2IP z_IEt+;TeR)Ty9 zuU*~nYJga7R!hnu3#`ZnbE>AREw|>m#9r|$y?(WdZKzVUl24~AMHQF+mNd?*izQjb zd{)V*b*5k>a@nG&hb!r6FSv-j;T&u7D>i*ftS@h-GI6$Tbok^ZW6twiQr*+xVr;sh z_Ew_4IE4FdAqF_!Q|Xl{dsYcqyyZ@>ke3ldJnzZX6Et8cz*DSJDkbLQo{NcoPco~B zXdF?SqY=!8Dc6rg{jqe43RTsySjcTkhuDcL#B#qgNn4azztfh-|DJaiDR*alY1&rv zMXc76C9P)m|L|nFw?*X&x{Oz^aXB@Lvx$Lko_D9CF~;MqIU=2S&)HM%drbU;K+DW{ zqFmD!x7U*%1$&=Z?lC9nO3+p-b17p!L957fns=MS722-t=uKv><5CvKUlr@qEi0Ak zm7O`7t6GZrOMgSY*VU*1y!^Z^9q@*{tsbQm$K4gz%V|rb2-Z=p(O8dZ9wvHRUcN`G z92Sa_%RLP<#}Ugq@A9;pbk7FqOUjxfW9K%I=Q{6lQz6EkO&Pk0nmU+Ooqx5c$I;YK zmRLO>ighv}u;Z@TDhllO0vlG*hBzbdbR)F-GO?jXowFUW2SS;wr=dw}h=+l9>Fq47 z3N_4LXTwr76yEk_u{z|OYB)fgcQzY!W!kt^EY?<2&AKY=Rw%muIJNB?_;xgr86}DN5IEus zM7=DWVxF|VOB+bm4)08Q)fAJ}Dhko4g_Cm{V%p*}=AZ)-oO`}`PqpRbGaGIp>N6}5 z|FnZvKH^j{Nej1bpIA=Zoc1kON>QLT5aSJ>E>*mg-xmr8tU*(`nO#eaJ$yP7 zvQpKq&e5zDLXIf6%|P@(tZ0$Wgn3^xnbR2M@jdfhQQ&rFsbpNv`0DDG8pt;OM7kku zhkOKiiP2TkJ+95|CT4X$tuVD|ODE_nu+DDEr7()CD=oJu*oe8RtW=pwJ;`oni277L zS7H@vGp#o>t&laZ{S{H4nvb`5olVc`tc_H?qqvaRIQUdht1R1lI?B=Xr1P$?6D`St z*1*K-VA})lYOunb{Wq~ZE^pEHq&we>m+7b}wt|>T`DCcm0K}_OUG7PmEe)lCSgQD> zA5y_gU4=E@{24P*Yyw6|0+Ihcx;PJY#`OX5|>RYz#L|F=$O|iP1gHYpb#4gImfgY7EL4Xy&+tP+~ep=ijpWns{`RwwrI|} z#lel0b-h@uXSM2lT-ceN5t|b$q}r4tq*T>HKHt14L0^1~=#Ldb3aY85LX~zqQcY5q zb;R-@kPX?3-k>>|u;t8MmhRH!x*{2C7oyDB6qMusk2cF*x>hR%Vg+?q+e;rHc3nPdgFFqk9O*z}va^*u z@SLazh?*(hok^uzN|)WsZ6NkuK5BM*8HLT%O%?TBm$^7%5$mgaR$5o6<)U;1C>9Fu z5KoXux)`G8t>K79!COnMFgrqA)O;jSXfaw_Ef9`6^Z=YVD}GocnANjoT~ilIhup;o zvxm4f_y_=|P-#`#W$)U{nqX$^3DQ3i%I1!nJ#Jszq-3nrUU6E5%Q-jGaJ6HUpK8ok zl35M$UhrYNj$!obTE>v`d9{|zW^oyX&A@tLR=cQT%BAepi(5ZHJ}lI8YA9N3s<4Jy z%$-+{UnrIrz=&VcHd7uy+n^GKwO=Fc2}Nr0s#|nf8PNFw zEyto#?*$h)Anx#ijuLnv+#Da3TjKLUZ;B@M1MN(Sskki}n+cu);q)c%70Uy1CuKB8 zy0K=^=Za@8xtTQI4=J!-2x@6n&8lEMeeQZv-S1H5m;zUbs1z1e6(T6aY3pZmCbkna zhg_Zv?bgv_2-lz2@qW2qOP8}MYf0y`sJ!`6@uK156-^qv++8M|@HZ@sdmZ@!DQl#e zpjhy}WVdKjd*ymA1Rh%Y;+Mqg#(J0vdQ@4ts%7`)*$XZNDsA!w$xwW4EL}EPY~gS? z1Ec)kAi4;f(DvMX=TCuoGz1}}Um80BX55QqVPX5vKB=Pa*y;O-c#0JGcAz;Uf|R)n`*1@imVUektzcKbWpjd1AIY+R;8%Mf4gf&T8to6 zY`^fmk^V5K?+_qHi$Q%Fqs6LagHJp4!mswetO@E{+g+!A{-mIOMu|Ft7Kco zPFc>Bm9D1ClzXv;FB8>P>>T;~tEQmo5*d1@rzI7=; z^7T)}hh~-mUfmTF*F${hZy`SP5?Kb@{9UBK)|~1ur(ESLGKxsPs}3aHy_5>wxeG>a z{YLm!i3}!#a;Jo=|^Q- zp*JRg43SK_ay6>bsDjpvRvD%&1)|`|>+f zTK??RR@ua)V!|<=!h6qa=Uy9LIJ5!UNwTbh-f}3z*0Q}okE`3mZS~L`38wD1<`zmS zp;zyD4So=(Th-3*+lGC({!|~DI%Zvvaxm_gy5dxuT6sJXf$MK+F~Xcj*m1K-IDfY| z4j77;j6=QZNmuE3(C@AlvJIf%Ad~sB?a+G?8G7n*U^~19koO>MU0ih-kC&`Ebuy|- zQqe|P-PM#F90!DIcvbvyM}N(XR0a%@|9hF>+KF3}SU7~Sl1cJaP-l;7Y2f&Z+iVrH zMa!XU-v&!pT8!=Ec472_KIBE!b2i=s*j4pfMXBYyka3*f1AihdhQRla*@YMP;6Lg3 z{Ys7rH9;#6hreVZ2q+g$~G8w9qk+-xzT@YT)BV zE(W@AN(Eggm7#_G12I~^qQcADws2@0EN_AvS$0kghnuXQv-^jNfJs|Tv8vN% zd7Y#hTDVIIj=5(a*(4m>-zWKphfd?K)^plKm~z)z6@dM5bb(?8ng?6+(qh7{GBhkc z$lxun!kTI&$e-fqW-U}pXT`5lD`196WMJ5xf(CScj@cypkW_)OR!QF&ycy0z*>gTe z#;vWJvOw|4LEn61A83)t(85Rm2Nul@C(aSJyaT4#=B>~#t_=0VcIAq??JHbqOQSZ%P;Y&lv|__&sdsJYkLpP813(2W1{)qWjO$4{ zyr7D(F*e$c#nbI*(PtbsX4j0g7>4ZC{g9=O`v{I23=>QK-lA^v5RBvQ0r*RmcHz`F zT_4hc?R{`iFO{LAx88f1@Pb{`vGbG;wZ+eym>?V0sI`otobVy`y1&byc}{fXj;v}i6%3?J5I|zEdjifB zQFFr;pk}EENYs0v245Urz5>*o<6Ag%5quLNgSQ)8aRp76<+gN=Z8-rNWZ0b5A^0YV z3_W!uFCrk;=$V7v}8 z7`3k3t1&kc&4AaR2(#j+S8LFROGQ9R0qji=)BpUG+vKaX^FeKy-oD1O<7Nco+}% zU>GGbbo`m~hZnqA^ir??ufq>~^*r?CzfO#z*?0HP20ZCQ80Ur1TI;-tfSZOZf3}ov zTLA5rXw@~Kr=>Dw#97dl>zNgz9+pMq15=xSUA!JWYo*)Ydh<2?(wx%|Yzm(U7B=VUfo3dqrQ*YtO+ zKa*7W*!Tx-0+QnQ_16N8O)~G$M{|yRv7zpzTh)Th2wAj;E)XI z-`@w;1jurC0J~@;AD~@e5{~M#KnMu5LsxyE4;k;LZ)0b!DBSeBze0cmG-VaK^aK6X zknjye4mfZF|4Tc1&LVI!(3-ZNADZkEzB$~7G-Gf^?jfb1+ql3siAK;xpDC#VEc&u;d`ZEcE>tYTv+c9JT zdh=ubiM7XHJ*QQ}c`XLRhbaIA!Iadl$OO+{0z0gq=^8nZY zi&Xezf8AM2MCjNgpu7*Wx92{EAM~(gAAs3Tw(OESXAM()PF^R?@SS8T#^q%#q^{?vnk|@@Lpl&ql)4>8Od>;Te)T?LJ$vYO z@eIWfKI9CIYxtT|>GN1zp=?nJ6s<6WW+7)8?lTe*diDBaz~%U-k8cp3|B^WH7|4eV zyhUg5MQC?L-(eb|01Z~Sp`xif;GHCu!MpF31CSz&=QCXY4WNX~!je5EFS5$6tHS9# zQJ;IbGImW%iqUrS%aGKs`NLLW?u*bf*wTc7e8>k`O#yq1^`+x3p5@$jpeY|VWZ&oD zizG4tYVhFe|6^N(TRsQN6pxhd)JSQnnV3IS3WvN2chIR-kq$m|1V(D92+4e4C>b(k zzj_3B473Ns_>lIrb8rCATq2mN**KNb94C67`X3l5i44^~mBAL5$H30{dFUMRS{20D zVj-Z4y>sj_pl^A*EQmKJl4*YkBiWG6KpRM8ycBq25=BR$UWB*7a5IS9)n7X;kqsXQ z0zieuWn0{!fDBesajIb zMlz8jpY+(hxJ42f&h@@j*!K7wd1X5_uWIf{&r_AhbWB#)Qe)6Dyk~##K74CkA|gm*LlgXS_hA=AtmcgZDu6m0 zsyExoOhs(L<@dvvNMyiY{Oeulrn_G_TX^99(>L@X+F^JCvsym}2rlxIXonae^U!Gs zmvp5HCp)Dn1xs8TkhPUy8-rcp>L*|^OJ(TTnr~k!-2Vg&-nrMpG{E>RWI|fnS$~_R z0G}xuZk6aRz@1<%(|uTp5*hN`e&G-!YKu_rLyzGR#27AQ1no^rtVWp<#$u`+?r?dy z9%4l|J`T;1%HYF4eyQ-nIvvP(yL_>$<^YHSlA;BO@|^i*Su_?n*kmDmU`bOYIrD21VzVU2Ds>X)mtEsOX$2akgyi3~vo8z_47 zdz;aFOq1in>&N?Q*~VeQ#Ik=b8x^MJmj7y!#`f=J{~SXy?{&XN|9G-LHKVUoZMK@C zByXqvoUWuo+g1){(M3;zjbf{ zW;FA3e`;DHLq|P7gvMc0dGYDKb@;lD!Wt8ygUoI4cNkKP-{ExtYdGoYXMYDDSzana z3sX1mz~=H9!KR|2ddr(qe3!whE(vz|Dr2VSRYNP_0TsUk5 z61eBV;wmY{u&fT@kI&=ACYxSworn|L6YX9K>$toxLQa@da?Kv>brC zI!;rtgc~xulU37l#ao;)XRM86x?e+V_S2g-p~HXa|EG}d7yr^nTLbsJ6WXkRTjZ=R zZLUU~R6DOU<|~=*g|wDc6mmbeW9t7!R67jjuDk&++-Tmz0^mg{3JCxh?+tkU zSf?HgN3cvcqC4N{Pi;7J6>LAE(2VM{o6))d=<8-3dc}G0p7ohEv_dKVAB8&q=->XI z7SVw>|I;EO;q4#%2#nv>|AT&rlp+d%KI=MqnyxeNfOs844`^!@!^OCRR;ZM3^=zD} zHk!HpJ#*-RZJW2DYd&#X_&>DvWVeicd@#25J!l{drK!Tnb+&k=Vb$c=lS<}jSd(#ZV*;3AGn6si7cog2a>+-jacIWL%rb0 zDs}L78*YyVi= zRJ3ZBup)JDm zBUp!W;Sh#o(vUY;D;KFz`nWIaOGolL@OTfu=r;ohl%Sv)#rQG%lP{^50g49ug5`r|br zB)@IsMRdjX!PJ_7k_EKLNRfBAsud<;2i&ID;l}aN?E@eQTq=W`Cfu90eY&_+cy+rt zo;X90jHjt)28IWg_T{xXwrSzv3A1M~yG_j~A$t0>B}yl$hmIdxKXgBA7Bm+O+_D)* zm2+hx)o{;T(|MQ@Jni;C4=yc*=jz*_2T!?DW-o;1oDH{moHIx!YCu)Z2dIQEVYVdc znpuZ#+cVgJ)H`8RB_a`W4x?9pawoK4O|IB8xv8YN(@8TKzv z>3?KRoApdg!PW!15|isSn|c6j#S`+beJ~*=%STB&Hw<>3&l0|;~2JeNvPZ0F*o!XGI-tHDA88GoW9hb?M+Y08*v0ryU|>99a1 zCT`^z834epLFw=Kz1-rf4i!Hb#1$PK1E|C>o z>KU2^Hf@xv`Km|mDIm?%U_JVc89rAcf>@q^>=!Pxh_m2br&RD15Zh2J1&^H&fFszj zM*}uVR;gxa<}I6~q#inEJrBC?iW2}~sli(vbWjf_1X<&ekkeW4%ew$19jj;o1p0^- zpE*lP(Ls$3G+?jitPQU@+rnX-Oh;TI9;dUYqHspP+{m0 znnU+H2crAtt9{^`b`7@TkvqH$f9>$_3N)Mvm|9-O9`Dtip0+quCrqGLA|p80H~r=D z&8T2{tJ;I+!P$5yaUx!0sMQF`9ceo4wWwpPvq^=;6YF|AXqCuN?BPX%28~{@zg6oR z=U}V2zfBPqkMMXESUm1o{yW(eg8l8U*zH1KQ#-_L_80rb9{O zx&r=0T8tB-A-nmCfdfMt9L9m11kxbbPK1D#ENrsYOJ!fOm_iqo2XpAY;9zQ6B11>E z10eX&ay}OttdJ2O-t=GvGKB|QagQuN)gvWSk$0)&bTG%~LcL@fsjh+^k(6R%zEu#e z8hl;0A=81!K-cL{04_A99Cz^1JUD6=t{&`Oe_UL6M3 z+4DfIGw$bsIy09)NEv9CUzj&=`Q*3QkrBPjrN##=0}qKnoMV7ETD=hi!_VY!l#> z7Xi1Nbz;nNeMAAh0#Ee-gJ;mD?SM$K?YveldEUNl=bf>pAbaq)U^sBTuRo5?Di2o8 z0nj4gaT_6BJD79&9Y8YW=|sR=iS_N=aAqkwIQQ-#Slu7H6g+~J!Ni&?F=x6TIMcB= zXC=O+$F~1HN^a>_9~+Er!2!Z#`4`ptl9iEXN)D@@R<$9Cci5SU2JC(k*)WwC2Qs6V z_R7bFA2$a3Wm{%I6WP+DEw4XBFF`Kz4!`isSe2&|N}J{RZZARfeDK|H+Dl~seev*a;b-q2T#hYrhtGnxkSl|+Xv$}Eyw~V= zTLX?R*{qS!8_Y~gL|~Eo0c??}!$9@(E@%u;P8^m%vx8q2bdbX-|cd+W5ri<>fg zt`heAw`RQSmexWZlXeGj$7*=-^Kd{h>GTLy%;)J+oNHDzZn?@bJOE~qx&_;}RCajb zVF>ZM;}`@gwM0b|rxbM!U7MP%xH6qC%sH!GHEbN3>fq;vL`Fgdf3_FG>q{LNIq~F+ z$7)hH3&Ng1eD=@_&XmRzS>|B;NWZ0P`gVN^U*dxYlgtYViCVUp`qv_ zH^8e+BEv7x;iLR);iVfu6TE*8uRHbrp^}Aaw&^Q0RZ4Kw!IK=TdHVXn+Ow7j(9zxR z9(r46g##bLU+7#oycWKYjGITL$woYdNFc3Ea+X30YuPm|DFtKCcY!?PwdQ63ZijY= zb1Z_xN&S!_^JQR~86CMu7Qu52KU3WchjDZ=**t6>1ycdoU9ROUblowH0<~|2-;fle zSHJe@VaCH|;e}iA4g{UH?Np~3YQ=J%GFZ*3cqiCS`&jhDPr{`_S`1t34=)q;e+sWC zXv66cWEQ!_u(hRnphG?-<#7bt-1cJVi$dKpRBVtHn4#A8f&LG+9 zWn(vveslSAQyXQgC*>2CaRj^&e@3g1fHBKhFKereiK@1Hi4gGOq|u%u&_qcwiv8to z==A(Aw+Np-G61&-Y0;5{P+^V{yF>?L9eb_3+TO;2w(*^i%Rt6{|{aQ zOG_bU0KzdLs%?v~{SIuJO43ZX%=+6YV>TBx8jLCQzW;&Wkrw0VLGwMIhpYCCGOaWh zsggew*R&$`UK-`T0Dtgrr9(H*i(i1j0=mD$IL4Yh5)7ec!p-nKdo1oW7~3u6`VwAK z($XWFe`6IM`O*LwYXU%XYNT5pdDm7bCjj68DZc_8C@Ds=hZ7Fr-mieMYpr3~)TT-8 zL}?t2Juvzb1VR~v?c1ss4Hp9r6DErxtue`KR4rv`XKZReugT#1@jCQh--OdcB7*_G z2K>>lLU8oRw_sJ_2NaGJCR4CZ@p)}obSR?-fIUvXOyT82&2rUGP;B8IoOa1x(vx-`gU5;V!HQc0U{|OpXj~l9k8V ze8bo3*nnD?N)Saqxfc{kWbi13C(#h%<)Uxk-5$2Vy`YG6Pba}r3f5)@Sfg-2?rq`^ z+kjd}VS!3SkZcE5p;y+ta<%j$Kn4p6XkKKOch~3y%;7io~m5Emn%rHkVEv^KkKq zT^#BselS=&11ua%WN6{4_Z$!o{1A^0>`ueb-60u^Ic`@*sHivKfiv9zv8%&rmwpgN zMU`00~VxM)eRVk;?Gx;8Nk{hs5t;Pwlo9xlL)adN{Ag zk+kLl;-a2-7_7z;5qjzi5TYhmAKEMw9>$9rRwHxjj$-1Q`9iPF*UH+Uqg)o-a^)j1 zND>iRXnb$KaQ`EqVrb)`PYqC;?pWh=Ems1zrIg(Oi3r2Bc-N0Wi9{wQB0T=sR$=zX zr*Au8D}Or>GhPb`!HdHiwP-6xk>i8u8LzurVO2d~kd0V_m9qG)A2~i)Kebc@(SC1- z7_X;)3+{m9&}Dc+;)qW1R!~kUEKDv4Y{}{t-}X?XnO8jl&9p3)AAt|-C0ByCeX3ftmR5jvO+Y(Ui&C)T2EsxNL7ZhjP>Z)_}`mNN{e*SDjby)G9w z=ZQXin?#0=C06f3)jK}AMJV;fd4CeacIX<5u$E~ zSJq7r{uJ(%kK;M+TR4mZJV_phH=hGC?|jEpYlf1ZBsd3$Q{ronL3<=J>>L!$|Fge> z?HTtAj`Sq`qHsh~rMw~I2fPM0sutJ&)xQ8e5)pd!#0)00+#r1S7pG@dWf|~$Rv_Eq z>WQ1ikB$9t#YSQKE9ZuXQ{yxrpq@^&lB`!#;>#%p!tz+s-2KnM&q!ntYtR<2u%CHG zT-&GP2wN##F~OERVY^Lf;yq@uy}x}9`fsTWt;xL!Q|yA5AVT*Kc+Z3Wvq1m7YiO(0 z`sEZHOxmV1+yxd6CW$WkKQL`;AH6;?A&e=E#c`Fgs} zkPo@~Wo!kI$WTo2-5~(xM&Y|JgNfrDNOm|pq>UUlA)jieGFpAZXVCz0pesi--Tgd# z$x;y0#XHS}-vDS}2N3`OARH8MbcB%{%1f(kUIyP1UcEI6eLr=kG zD3PI~c1U7^#DvZ0Z%+-xbO)?;>(k&thPLYQ%o~1xso`u^JDP~WWKJuKdU3bNKMmi% zR0Qk#MX<|!>1$ii|2{qV2Qidlov;3Gu=VCw23bgU$YvuULl44Q@{nf0LkK>=ID%D? zN-fTzPrd?{$}?60&*IERF}(lmHwG)WRZiMIoq)gy^m+;~qe2|Lg>vZ~a!6(X=G?_~ z=(^Vi>t@eb1Ib3dD4ITZ1K18`0W6<1@Ikr(kP>F(&b+YzW>qj4M!|L&LFZ@|H=Qr1 z-}25sb4^SKwBap{Meq3Q(99PFxcF{C%)yqdwDf_`#^Dx8{MVuopF9tsXG@ZijDA{T;sjj5UO#{w>&s{KjDI zMj#S&lp;K2cPO0tfII>LHrU!rRD|CE6=$pgsF7!#grXF?FMq20N|5$J8z5*$1F0q0 zxSfUgAPYTQxaYB|w;*qVz5Cy*qBXymJ2lq%!Af-2|KaY_8-UXq!&`d5S{eaLMToPZ zflLjy1F({wQ97hkJDE4}FR+rX#7MUC3DfvhV;>y7Yx%EbNJFh%hpnW)9-iblI+I&?EP&A9WqhTqFo6I!VZ9_CQ2@qEv}uG z$iN(V9jw6`xamG4TZGdH9t$`^ncS+&A$!D$^^|hT*|>SC9$SfSJ_w=5Qn!fu1CL~g8`C=z@_enk;Yc=1DmiOm@*;Q zw8{P46zr@l<5?p8TKr3b!A)9rH2x;n9!t@m_^RvRuvx{I`NV@WFNZnGJ z60T}DX%(mc#71a_M0EJ6qYxo*{^5;6ej}c5@Dw~vA=z+dm=06Rw~Vz~wG~frq#0M9 z19~JfwD8CsaCqV{l>5&CML5R$@abseaxkUJP*JE1Zh0(!V8HG2ZiP<460Gz+Wp1E-iD3ZvC^LLo=|I!*!5e`iz ziY!K5#05!nj(WvVwiH@LqUf&8phzM^F#}{s;}<-7*XKUIO4zbxai45_;;i2+yIB@l zhW5?eyLEn&2i`U7B)z;fxp{K=>gQMgeD$|h-@f`IvU^uImR~h8y880vFRs?F-n)AJ z#GA`EPW*1-C$b0u1f9BfqBId$e(}V95f1b>s~%qU)m3QKHLJ3#+^f{9wu^9}-yQ$L z_@VLMczpRU$8F=x)RFP6*y1s-ygECT{D^;b&qnR+eXJnUKtsT99#bFkmoHk6qeR_84pHt6F{nSl0dMTUS$W$oEA(%i%&nvA%R|3+@ye(ymOQb`rC0nUc z@3f*urCQUd1dU9PfRNcrTu8;l3m%0%$pidkCa4~wHretvKVaB(Qu1(AVNG*%;M1f$ zVXo7xw%`xh*@huT7yMr#<+-k14ZKnFd41fHqI8P5|C2;e&@?Ty+DY++T0I<+EBsqX zd+O1Oxom3awLV`v-%k1dM5-ri1vTr-P>M=8;E#s$zPm{EG}pDXZIp}3+0zlo3hI&S z`C78V@XcbgLn(SCe{$XzBJ~sgUb^SxBPv}lQ79z6Nm4&94*{WRgYtk=v6L#ry#zYU zR%8`UDjHuJNlvvKFvvi!bRpef|wH#FLzf~-kH>|YA8}6idC#Bb^R}zR% zTRrGD(TYH%?a>3`SfVgWXm)IMzs>BjS(@gqTcdWV*8Y*u^4RLWvXgOpyy1p5-U>&u zI|-MGtxkh|B^?PElRa-TW6WH1l>Bau2N!hB6$d25P*LmVHvLsBZv&l9sa?>>4DkRpg&vz@ds^c>$Q))LCN{tf4M8Hb**H{=}W5r=( zlTk`@A?dhUAy5a(NH$<;rZWN6#Eqh!Y$L~dI-!h-E4a-e^~H}4k=tywcsm+2{?}Ikx;?VnUDHZmEO|jo&~0GdBjIGOKrw+H~E8V+e_2Egte+K zc#N@7OhX`UZPj?fp{uLwK1(L;cV%||O|0(J(p18fR@N0+rMs@WL|mhlZk(rd?V6gc zIa^IPWf6_wPd55tV1e{0$i)<@3X&oicdYbhLxIjafy@%*2RcdDN;-(dq zl+WVQXSYG`10t)fls4s^(R70j17vMhH7Yi)kYO4$|gWoxSu)^0UQSr^R&u zdA3kjsSKHEr&tW^FLbC9&UgyRs*Rl>-!yM4>NNFYTv3NyeVbg%&H2fX7HJrBUz{pc z8U}m5kUQ`-QeLR%OAOGhq^rq%BEzKR1a{a~$Om9!1DsE@In1d_@o9poX)7e+jgFz- ztwA@s-ML8u{b>VQ2NRvwr{@FSuG&-R#m^_Wt~TI<3PCSZx|la>?i%TpA0oe-uT(p1 z%2D>U_=L&lV|IN;EH5jHjKw#q+Nd>xVTl zw#Fu1R*FvZx%u>VjH(HvmG_oh41h)Y06s8c@Wz(CE|!~sNzGhIDgCNE71S4uzaZtg zt}V;DIbSQ7h%`M8`l3AP=Um6AW<4!!+v07@HT>=gv3j*(rFehX7jr~om7;3R=ZDqj zZMjm?2G?%~)e2S}9_1uKr?%z7K8A@U6agOtdCkcfJ0j|_M`Ls$+$o-m zIdjfK7p?X{-s%MAtjsQ2tWN{Hu&ozVxb%EJ+RE4-CFR*(SI-!8^D4R>ssv+9{G#(j z0a&(~Bx|Zx)x6xIP3;jCWs98_3(c=Y%0`vKlb-!6`QB`?q;1p5RzYv{+ggwY?U=OB#XY84Zd&TLT@u_Nz zhe@X7I;Vm%DaQ^F_464^)k;U4TBp(OFe=!T{#8-Gj`unuT)p8d`Bf%rqDtzgLmdTG zGgPRoQf>4E(>n=hq%G~wmFYx79fieYE5_+%|0C8nw6#pZ&-haYe>bX4j1yW(TUwt3 zNXCw3J`z%>y0MpCgd9wp6>$P&{o<$szsUrb*}sO0+Fi zc6M79MF>#9Esmc0yj7x_NHb4&8nFoAXZC8j;wV8VwWUH{1#JVorg|@3OsLZ4d8POV ziViS|Q=KrI*3|g`t;vz{WZS_qZG+C)?WDc2dYt{9Se`N@D7o5HNl@0JGN-!eTCqG) zOH%Th!V=-twsbIQ`i58@O?W96o2RN2K)hJeZx51go=>VR6^}tHZy7`GurfI<&O%^V zRM1>Y?QW_9CQcb!CSF()jzF8vwYof=qN8e0mL_20wgiypF%5v`%XajK_INEfPE^3XOwpxr9)`{Cj z+;8^NbOBgG-DQO-tC}bf{c&{;Ml0j?`ITN+E%ALXh~@H}o((C(K&so|OqJxGpOf-f z&l{rJU2PUnP{C}^&hHfusaOx#h6}oo#puszJXQ6^2S^9SYSu)GR~407Yoi#??$|Br zNi!B&=jY4qYB}hjRQm|_sx20%MrbzM3kAX%N5`k$_-M0`9Uh7nWP2%|a__ z|0+=w4YV|X)okgp2}8gT2o%&7X_JEjrGz%HfKnwbgDRa z44_@Vi=%(P%*Tuge>%D2zsMgnYeh4~D8o!oVMw{?qEdWcH1nzuZFej4ibC4$$x=HukXANh zjw%&li#AhKAJ?_!zA35+2V%4_T1*wGXeASj83^Z@t!b@tlsn|-3ZZt&RSd|*i&|69 z$r+2Ae!#8I~O6M3}6GDP1>Q&HEFhD z4s?cAQ$SkXy*M+qREA#p!3oIHzT>tzp|%@r8`xj|&QpejhSi}~QE4j7>q9Q3s*1MH zg30IOV6T~$h|tk@{{`#_e_7lr{B8RpWcg&ct`maK;w^_g9(P3fp;FU`JUZPJ9S(D z(4$FVR3ZqH!CI~p+t;pJO_vL0MpK*84HPqq;^pQ&z*8tk=5)nFj{1Y&604^mwe+di#w$+_Zt*p|S zlBQ?k+a+@*4fas9K!Ne_QU&Odh|p7y0q*0c71%-y-a(vINxYSLbE?EMSqqh~RSM1^ zxb?A)Z4AfCm*mb#>JfMk0Ks`WSIj#i?lD{xhx8z3M->CS0M zDFjQR{lcFq_;Va-fHN7zHfdwEZaZ78vbv7i0ywE?oi2!b0j3JN4BGPcX0$SBCD zQ`rpAgNh)7wvM8R_?^fb-AyIU^Ua@n>N)4;i5oZWe%|w*r9HFxWm1)fSBXop7?kTn zXc#3r6OU9#|L8JOLX6cXl10kc0f4a{T4ucty2P*!B5x)k`0T|WZ0pr^&?S^6PMxsi zup2UjuEtutx~N46q9^q5sUAEJn%KBpg^s-R2Ng87`Fy2o!B|a#9en9Wmie$iWRr2y zsmXNXKmj|bQI3Kd4eNk6=7o!Tk5cejYQI{sV(i|PPtR@}SusORbCcr4m1vjdS1+C# zUA&eR7H_CR%DeHw`;;1RRwm`LF>a_^(h-70 z#u6C%rVR`Y>40c+Crl96mA3b`+m|3_18(q@_)vUaT=e_-1`RVUq^O}#&b72>%`zdXnxFUfe(PEajm$G$ zv(Z2%?JOm@s~w$QL_W{b?zO{Wpc=@sy`OrP0QLrvAQE(bj5VTSZc8gkrVUjoE9pcM z>Adg(hNQ^Iyz1$F!+QN*-~r&4+Vey0f!k^m`k-%V?Md6J_eABacR|p^ogYu4U|{Le zEv!A<2B&HlBIO|zgoO+gaT#dT81!ghY4@g+Yn9}m$NZJ$rV%>v1O_IDB_Ck5!2U9)LvN3ygQ^ycd!Lf)AGF>`owb zj(`jKo3W)en@(P&ckg#Tef`Lp`hmZ4!vl@usq>&#oCOH@z&GtBS;a9cv-vCp=as-? za(7~B-9~U(zqJTDGQG`>PQ7I5?PwO-mn_}6wkpG|pU355tV}g27c{RF2*_YE?ZJ^<^kCp1iL74G{6H00Wk5761<|A*m4H>X2AK|6h*s!bH;`LUz&y2 z-UAz!>Fa02$www$8eb1Prh)>o4&sdyD)URz^K4pdIf-PeXy^D$)6z`i_xLmqZp>jF z@*AEy4?TDHOJlt^cvz{nc3@QC>9d(Cdz?hfN_cHupoT#gmtd#!+blSxmTStTYzjZE znu4bd=^%fmeE{*?*86EnUBHx>U2KRpb~}(sKGAknO?jiqt2Wyf5gfNeIyABbFrop< zvn?unG?>s&gxZo>Z5WWd5mJ^!7xeawf|%I7c36x($e$IU)qz#u1|{SdvkF8Twno$s zSuk?t9OaJXl%H=zH%qW1TCPII&Aov)dn>y5{438x_Xv+|SEvPgXtcES&XacMy>IEs z^Iz)h?>$h054R2|oX!QBxeo&y^x^S|ysyWYggmpKL>m z59z?uj4_hidbu`Uwhkx}qj=d0SfX_s9T$aC-BGoaZFy|y-E}ZDq=S_{2oRX-{_T|B zp}Ml0t|V(RT+bD1EM%L4H1>M@TdE0*`>+o2-#>D3??6-8G=T$G2{y*tSZAB=LINUx zqiG5kSm=7#$R!_ykut19M;|O*+=Rz# zb?;NUAZ#(;2iEX*E@3qneWVtAHd-SP_i`0B1PYQ( zi8jXHy6WjvLzK&Jf~Cc#D@L)Mr#sLE#Q17j~h6)GZYBr?Y2*(;t}pGGt5{ zg>aBdmAMM)3hj45iMGWdM?qUohO|1`L|hZ+G+aW#18qQ8U%j+$?ORlXjpK)Y_2`z~ zZ?9JRlW+0BBpAXo7TZV#E3^YBLd;!VJL^@ag5Fi|)cp=Z|!aWxUv=U zE*?-KZ*dcPijk^^)EFJ1Qnw@dQc3*k*Du0!Fr-8GUOf&?sKhV*VNtEs#PM2X{XU;W zacr!ZiiH9)M4I?7hw(gfCG4q&bU4yP;dMr*{C38PeBZkMOmxrG!CCam7hZZly14&~ zJ?NT`!VC!Qr-bC<_UpnHw@7M>S$n>l_QqpCKXy6nwT8v$kpBY!slEB3Exqqvu56b5 ziw91mT}jpLoJ>d^8ZwkM-MI>c%qz8g&owZfhIIpmKJ=m8hqw0r^%}5r+U3E;14_Iu zhEe((RZ36hc-c`7hU~@=&}xIJog}Hu?$m!f3jUk!Ggc3D?_rg#${!9`5duT*T-iY!R~<(}nXfh=HwM2V21*Fz>COu20{mJ{{FU@yNO?L7z` zcu0qiPM)uV0k1r`qyh|2TN*=m-?(&&(%A+nV+H_2XD~(7C@)7^x|B&ES{bEQXz(l)$pg5P63vS14vh^OijHv0OF z%C*EY6&zsi9vp+vrRdEjKXenA^ei4wqC)ZOyF|0Yt+z8tMrZVTsuVW)xle(~DNHP5~UUf#KQU}CTna~DxTqQ=dN1CwbjiqElgVVPt#FtR&`pQkh_0LN!^ZDUc=lT~ z(!q;*?$0g7M%F@3)w|tI*N=zCU2L+uGan1?4cD zT0F23S{R=jwN^n7;o43rs^h_f4-3~PzX)^Luoy`9Zen}$Us6tgL{8%kkP_#0w-R=3 z2kx|5cfmLr5~D-A{^02S@vbGvonDAIOakf1YMc(X(J@2LqRZ}vhYX7`hr!c#F9C-^ z+?Ajz1d;VrZCTkIiR$qY=CZFW&CU(!(7k6}0+_MAtG7VJ6Kqx1eR0L;irFXD=%=5X za;*5`s(Z$x%BQ~e)DMRqfUU?!&xVutM)S~TJ@(0eanIX)a`iO%d*gRf=$@}FaXW$! zbdS^HE&ssq*>`;XE2R&GX(1^ z40nlqfnbZS0-V4!2@4BhCQ7G$p|`Yt-CIk*Wzr1wf1#E`$obIH>McM~-to!>1|shZ ztR(_?H)9(PT16y1w6uG}$+T$kJoi3y+oh||Kt~^X+k>C$8%uY*we$Y{8_-@S>$d|k zx%bX~8FHn+^6*jwpssOQp)B`?OcESQ^YLgR3#sfiO84Kr`E9iSm-Og2q9-0%n%M%F zVL72N!vkL`z-SBcBA|`)a76+3_iQ@35^1=v{Tupo`H8jbKDlDnJpHwqk4!$ZYHFMw zO^K5rlFm8=Z)S9$iN@{%# zS2AyFTEM!cT`(uy)K0 zj(^*GuYDJs0&8QCcNVf<<$UcTtFe)0w0IOYp0_=-Gz;>9z@E(E!zMnEx@UXO1-%L0(26XPDFuM$kkH!0M?cMgM(jfZ914;xh&YJGk z$BR*-VJZMO8I>vcX!N$CmX1|FstL5hGxm>_pF_JoUt* zG}+ALx@p23h8%Omd>^j3o`5T^AsympK2G%R`QJ}oF@l0WUGndU^d@0G(!sj9@h!QF z(V?Hh_*$OPc)-+&-bB{;wf|U(1J5RqHNr55F$FhCfb)kbK*_wISlEd4KU-S6;bcY7 z;$ymfsB-_^*|#TW{4CH_MzUTRE@~{cEEf&KC0qgW5O^gtzrMfabW-;ws-KeJnSXZa);Sfjt;ElbFXKT`0L2H+JU*my*+Mo=)sqG$>`X?8 zDz8*w_u64Gy8Y5II4@oP)hD4N|#$UP}TL&Jq=ERW>4GJD0u!bs5&-kjiWChj{;QzoN8`(#A?8JU(doJWalx zG&?O4XPOBgqxjg>qfBgmy z8bdmC=%~Vgpk(a4_(hmGx1SELf}dZGGGPntO~u4g(cGXM>Kbt6%P^4-=@4Pd4p=0& z_g;J%&Ug#c)1O#z(}=iYx;6ctY5TNhdh7Ja)QeM3PCYdB+11IZtEOsGmrR+b&R$JU zZJ2z0@|Tm3Pu@3q>*Pl!%ahR={p9}1y_0jRUS0Lji<&v6n&;O%zUID}shOQ? zKE39OHKjF?H5aYfvu1YY)tP5!9-aB>44PS(5ode~GEPjl9Z4cd2I*tI_!a0$?)EL{ zLl^#OVnNWiTC_9j>G~3Wz8V%!!vGjj(3hK}D{g8QDx8)qQQpV^aUiB;hk>%1I#nUj z5sMK1@lUG!*h9izlQqceEEp0jrg?Di6jG(C-QbWJlXhQSEzcXvvwJFp$TV+l}%k*sSZ6PL{Kx)0-O@=4yO zv&9k%Ew*ZNI#OrtQ_JfLJZ;gt41_MqRz&UQ+tu>4)&#^B!AQ&=an;k>?YMZNlGReR zn%*7`W}@{{azs+)1y6=DXIvpxs6;Ei{C13s7886^B0QRyG3>Aga(;Tl!d2=I;^_$G zuvDm6&P_JCtPbO(#6;9*hu9{<%!WzQkw{sO%WW2_+i`jf9RU1fk`@eG9Aa4z3(l|L z`X@+Jvtp^c_@WnbDCWk0g~joOs)1y>eqCA4llgkyq?(WC5;?jZVhUXgYok2bsjax0 zaj{+{4Ms6-^yRs>4lqBe9nmfUOfO_(?E$*MpN3(4Vmv}X8gaH!4>AFF%$(hig9XI6 z-L8+N@>M;vP-ne9k-1ehqc=%;r`jtyYhTS+t!~#WAib|9j)DW~6jd=n8pw1j z%#~b?rf6F6sR4#ajLOXx>6GH(s5urW?c9S4M=b$E*b`dtFu+=03ky>LRj#YcWm~RH zd4!JHLoxq`#StkBu-Rgi(q)bh!smx^+QOwnC$cRb?ULQ_=`U77Z!v(_j}0M~GK{Q*_3u_uVS#bS22 zEHslz?lR%}gmY5ar47+K(hHw}JY!lFdzd5{iP=&aIvI#LP5+Fogdxj3Ddk!kw&N`c zRsK|U_=M>NStN7;Ta9UFtKjHh{}tN_wOgqak+0}{IiDw&F+Yv%go;)dkq>E%NnNMm z$Y)MhM{}sqBq>uN$Qyk1hADP22C0f6*rygt7DqAcPgyZW-?w1nv zpjptUlSnY;GSP$|k|=l^X|J0)4}*KfpdqWF8K&cGCd?6kiPoQnVQFHJHe@M%G)yPk zNw3CjFsZXzkPOkZtrKDEOx%_RZ`t2*g#wMbj`nLKmTI`n1U@$+#f8H8w8U)-6_xih;T-w27~&7$95)@$^28gg@)%{JXdYH1EIrwy^w zvN?5{v`c@%GguDUvO;7vAL(?$i3OLxqw@u@f{U<4+FmMl8LySg_$5;9wVc-=QBIS~ zoow;e5N#l?!nNecRtgp%rks?G(C>65Y{pycXsA?>5Ok4-uao3Y$*b}JaC+x-Io2nb z45XVFt!x@yfItV)%XMuoZ$aiYK}$H!STTfD^qPb=4QLS{6*fkyRg(OYYRAMt+-J7! zFs5sEE~vEyadp^guI_TBL-r17FmckpmvC`bqD@r3C}f(sS~KHL?%SoxQ=*w#aK|!H zK4sQcGKSOqsv@e7QpUX0E&#$k6%^g-bjL;lS}G42v6FH=sJAd@&#TYnn2N=%_h{mt zdN^CyI;)E9xjey%&SJt=?^Mn2_=;+s$!Y0EU2lq3gNlFFoElnt(#jy&Ed;N ziUp@}K?waAm(O;R5Lnu@W$KBz-4!81IC@MBXb75)ilJ-=QU``BRB$u4QwXObrCc#s zG}=-HJ+HqBn*nB_Dp_`T9NnPPL$`SSEvnp+FHtR{#UZ<_37?g5;C{6r=9{Jr8TV9# zPB?5}?RoAR{DXYFm7@I~xcCv>0U?vyi7~fgJ|3Xyb}+=VX-&ymNnP-mT0WZYQm(en z$wXpqyCG*(*R#A$Tk|`OE`QC?l1ka_7)mbY4PBn3qYK8AF&xze%EH7Cu$^3{QzdDy zEmhXK{2C|8;g|q1m#(_W3>64f^{my}O7HlXT0T$&0!6n+BS}SfI%V+u6KGocn=u*8i-F&}SeIY-2iP3=$@_N=y6hfvG9)dG89fJm=b%R}a3Qd3KrBQY+L zi5W)KEst1lddwLvb6Q=wGEtL`?i31EyEd03ow@Pz za78m=AH;fPi@e_!GG;St)CDTTY0PB4KpOKwT{vryrk_>qn@n0twzMn;=qKnAd9$EQY@r71i>D89Y{#xP%&yfCfkZJ}tX)=EXu?XST_s8J1+ZUZhhR8jUamtLOHSmeSUC?^8`c=3m7}B956DGKAP-xH#uPP|;5N~w3$rz_i zbj!_D*QoyXnZLkqhjeKEOQQp5>9*efzd|JdMtwjba>K0r1SB&q({*E{<(gBUf zRRad3ZM|2ID)14wPf~c?aHE>Nv4o!_tsyvCh8#K|gd1FLUG+L#ZVl-$Aspng-qw5Z zb+|oI3@Kc0*ia;!D(Oj0M-*y}c84hqnrI`s;7{P<9M+-R&97h7`_!Mn2%zK-oCTj4 zUrX8b;c&GoG|6n+%S4I6t<*;J?l%Ctwp@jdybM6#CyoNF=aDzS@xRWv0=NN7lb@RS z-q`O(PXX3PqvEGO6E3Twiw6{%HjKNC7>X4aQE1rftRd7&8qxie{k?17B3-<7A0Qq! zZrs{CYpOq>emro3T+LvDARr=OtQM+njX|>EZ`hsbubUfEp^-ZvSBApB(_5P94`9Xz zPOz&*Gd96M^Ma>U>>5jkumQSVfA`#w81lhy9=3XpwHVukgMu7vr>Icir)v zg4Uhu?^(A=p_3t}-IK|YO%qqH{PWn46esK(r(J%@;(?2f->)Po`pEh|+@Y4586rt| ztHroBW2+e|N#$1?(cd>fqYvrOp}T*uyH^?g%jrPU|C6P0l-tx-@(3N+e>{)Sa?c8+ zks5eQ9@^BOKdIB@xtTj5%42gM_&f=SDX~*rtHkTfE<#YauC_q)4vWzsNABp>zH{W% zp&K>t#2D(Ue1Tc!@noftV5=0`q@c2yptcLaNYLQ#G21klJCoK4xH6GW~6fScRD(O-|`o&EK*%T+Li z9)(QUcYFemV5$4mqaYKppy`Cdi>L;PVWO1+j1Qmc}gOB*Lv=_dIWv# zjDBnj8}*YwF4f`e0Z1ta3DY1a8{}xyU=z&l{<=*kF9I&~OD_8VB8IQs)8DWuD}h5E zD6FjDKZnG5QJ2JmUkUxoKE=<)yoo?F5jsiH-aX`xfCj&GcYgw1wXeT=3sC3-y;BzG zs3MTSAR#4yA`EDq7{wr@k~^6e9oh3)XtFQ$Ya{4GXMqi`94UIEPDWwu8f4D{+%{1C zQ|OMfz{W|nz%~p_csOym;&0nEeH>_Ri4-Aq0S$>60Ei$Jyir%t3*K>b<2hgq@B(ku zLTcT+HmgYklJD%V+Z-nWFJJTn1V7HOGPun`kn1~SL*M@C(xyE+y6ne|~>LO=9K9{#;Lm@*JEKvdmTe%7xqJ!!j(L)Cx(xD@- z`BknXi$O62E8U4?&UCnFtJ86>)oS7SY{!(>tJ(9ziU_M`D{Ih^R)rMu5W zn*E=fL-+i1|FdW_)!(T&r-gN$E79e6|hfstcfgLn^fR>Mii1 z;YYVZe3!Dm!2ZVqc5r(Y>Jhh&4h31Wz&NrLID-c-DpLKmb3;0GwDlep`2Kwg3~d9f zn0fL{_51mRn6pzMO^LY9V^E9$nDV0j{OUK!A@dWYVjXZ6ed{7HFhFG}w2XND^k#g` zEX}&g$r9mr=Q>$z<$MO#gdrU|^x(6*djLqk^cZnAB$-gc;;w{P%V!2y?h{ESl%!z? z6#6v$#-U)xn<9%$RtOc-25n1+-#F!krW?}1ycgVaupI0_yKL z1!CiT+|8EAuJZKl>OSFbd@2^;zxsnJ?-|M)2Zwq07t4YsbL&x zU4j^MqGquJ_m7+QI2c^9tQiaq=^!uKgX%u=M`q=lLVXk_HC!K^ooi{RTux+dc4tZe zZ0q2gUSx$nH>^X%svlj{yVVMd@>o*LfppV|`_y_nJby@qZokb1o3bD7 z-_onu;rYsGLCNl{GOyNxnMA~(ulX`{vkYlQ2akW))n7NOU#3F5eTRY&horA=#R~Lr zCAl;14i=e9>J09NpkWQNbZi7(-@s%1dyirTb|)^dg4?2?WvdoFBvcOw zz6|T)ab2!A!aEJAAm7HT7xn&Vgw3i-#-7IU0as3b9a2clLa1eLey7Mnw}pBt{Aze4 z(sW(a!xqn2w+MPFXX6p_!-704M%Ru0bw8R3^#6wY(Ye9?DavP4=+$slfu7%DqV)}j zzU|erA$JOiLDCd;LZ@)pULLZLy|AZ^}nHan+G+X$1vl$_boTnhKwJRKI*5OVcf0_S@ zK_?y7A!73>06+p5JYwU=24W?F>lr#;&%9*OlU$^zi7`QaB&)?1A4xzxm#Y8*It#R} zhS#>CotN}q$5k|43RQ&nR_NGp8#Zlew~s0m9kDFjrq+|{+b20S5ut zThQ+=JyyeYm*E-)j@Phg_6j^rT77(guco4QT*LQX1_p;z==M=1Da|>+f%=`xj#crO z@9Ceu?z9zSKUw*Ah+K(GmnT0qar?+=%8_vu92o%$%O8irF5kf&+uQ|tXpH5m!R8M6 z{#4xByPt>cqJn=`BA@ZHYz;DNYJ~7#c+M_@8_f6OUGV)eF-ma@J1Du_9>@qlQ?$4sl01bXp23HY^7I-1|Mf+fsd?X^duKHXG%#`CGw;OYDjQ znh^TC*A9zeBYM6AJ@K$S*1J;Z1L8Ik?^YyIUzY&FlFNq;Y4maiem5*01b6mwV&9|i zCLVz7%}~{M?RAej8j_cdYFR3;}S4jfNThNw5dumq4LX1s8LZ$Mw`K;tf#!tKJ32LQ%xy**u} z8t{1ps0NOTq8V*BKys2k74Gr|uTw;aTktAFVyJ}&UghC?PU!{PN?RzQ;CQ8K1LqDy zHuTw|wOtizCTVccK%bHOYvzV@=-wn;t?U&4dq?kexeu63r^ZB4T@%}(&Blm6s7IH) zAF97x3WxhN*L&}(_d=SwwU775(c}mFXT9ASEb>9P&^g%|3_W*CX|C7%Ae>^;54;{c`H@sr#lrJ@t{P@>F!{;;DUeFHWtU{L4se^0~<$ zOx`hP-XuKMz-8&IC!TgN{#ULIeFj_)7eJ3cq|m$B!@elT{=*iB;! z6{CO5Ft%%KYV_#n(&(YlyGE}cl}D4KK*Kn?eROo?%Paq5<-;rQTzU1%*2>FP+E>17 z<>rxpjJz=Nlab!YXGT5>aG`I^eRl4ux!T+%bC$Vt<~Gc}KKskr$7k=Gy=CT$vscU( zXT!4>&hDO_UGryj#&a)iAZK2g`Nhn?g1=98iFC{EiG#1J$r|{~HjJ>5U72c|u-Z+b zZl|u*mGWD!Gj2dneCB^A7PRfW1YG(Fi>0XP0EbTGGlT1C+2jg&iI^wPFnXt%i|WG| z1oMA>z`L;-SCkM)DpZzQ*>;wSOY1IBfa@q*|vIVaN1vN@qE7*jb< zdTVNM11>vjL@8`7Ym&}tjP+_4NbGl(of%V&iX;=f)n(8Up3J$%!F9as)M#x41(~Ki zLZn!GXB=C1B$*`TY58I~*=X>`NfU-j$qruf!aN|PfzFVR=?xRuk0v|32^Sd*7kFb+ z7j`76Gq7Jtb}ZPz5i6JtW}^_$hpPGYci?I|m}racx*3x*OC_lGrmx`V+FK!taMrTC zv8d6Nfw1XXT-+}Cbf!v-1PVo+Q=c{OR*Um`6Xnrptz@Wf$ma4})URR>rA(0LzO7*w z(p@uL5iws@e?ZX{qFSnY?S`x?SBDgqSZ+%ilLSxr+@4(4Cpc4^?o#D0otrZI<7}=- z==A}~sJ61rpbJnA!4uF_V_{2fKBX4d`SlcKZRV`bLLir;!g`Fvl5JYxcxe>ltWG1j ztrq=Wj2M%x-C~SNbAG;J*8=-w;cPuNWNpN~5IGvm8*9n1UxQw|uh=Xc|gv(+``SaRU*uFVM zw&=Rfl8bU4qM6d4kHKfM8MtbQ5Et{rTpB-gh>cs+@?NKg(CXp_gH&Z}f@E934s6*} z&XkCt#QQ0^3{er%9ELN=rjpHK2>`Y&YA;H$%P|#%9z}ZSi9+Cc`t^&$R=|p zPiFwJ8#H?=?NnjSoLZdH+7;AJXTgy2RpP<*zr&9;b{IXCEhNiw)|G8WggqNod83{o z^Bw|tx2hdMCxm>eya@5H)}phPa%j_SB4fh-XxW$w2Ot+`LuX{u4IM{lu)kh5@`V`D z)$mn)v6^vvvU?V~s-al7P1p_TU?mjNmMC!!<3?m7SJWwlmzr9l(QZhE6_}|~HX6YN zU#xg2zQ~oUzSO%M*bb0?Bnhff?o=AJh+i}qx8WBygl!(e6%GUlougINzv~NX@r4lZ zGY7@A!vx&09$DIty`{1t=!6rN6ih@Cp02SXIWbwEY_JeKX-`?0c-~B=6PeSoms2)q z<8`v->e!nyStm=xggQY0M_G_4dI-Ph_AtDxCDi)svpJE>I}HnA8^;zBUHS~QN9)B5 zK!_7Lsh#Tt#A+_^SNsBc3ma-$JCZ>7oau(%t-&v#Yh@@R?1Y@fPA^~yr1=l1@|w9w zR2{LnR?xd-Q*OW7&bn$WL`6ffs99_G6C}OhORGPKd2>|IS&zm2wrawhDk|c0_ zJK9d(Yjbz9^mogfMX^pLAX-PEi1h82$KmT!ToJosr!d0t>L;i-4(9o=eUF|Xxv%86KF5OP$ z*@!8TckfYu5Rk%T(bFl$Sb&@s1nMblpYeEOW@Sb5ik?t}qA|`vW^7hFS+WyNsa)bx zUeWlVYQ`c+RFUqQEeWCq+*c%n<#aQD3EW9!NoR|WNbyLTQa2%VnJiL8jfKd0^(|d2 zN&H#;L4>Z*`fey6mi-!7txexkWn|WV#UgFC17i0C8ns8*-WS2 zC|9aUd)QjDWMdNkr9Y5wQ{jp>TXQ86jIDSKaAY^cG&|jKTxJVTCsq>28Z4LpI zwp8r|{fulfc-7(Rw-{)ev8PDiR$li9_M7P>$Q!8FJaUp{E7PjM!wjyLh$+=R`vvf}MsP*x(%`V~9HPg0K zsQ{-jqq^T@tAPd)koag6kgRSpIf)T+z-80siLj;Jwbv4LcWO@kFs!@ILi+FpPtKF{ z>McfTTOU7{by%x(u&HYnf|+8@mC`<@%3(-Rp;At&r+}BjEN)OgfTtU-lF>-kl&Eq} z0C?K3!R0+=;HM=GLdKT>Qre1sA7)RLJy|;gJq3dAD;`3-kkjtAs6R+&41{Q~`;8t) zQ9}vS>X`Mo+jQ2N=s3#pD49%Nn8oesq0F!(#fnC754Hlyd37Cdw=*Wnl_JX}bD6bu z`JF$<*4<6GVe$E#*;vw{&HJf6XAa~GvO5;_5rU9Ql~^W7+O>Nk>JR+BFy$$y+wq!g zs}tF+>V)Yky3AzI47VZXPA=rzb~mn$w%}~XTdGfhbHfu z_{I1L05>l^9uP73r}wVgMzz5H0q5=N@$Xyw)CVcl{<5|Gc6y#LdbGyh)_3L7}(n8%yK})b_`ea=hqJF0Gd+U-@Ew=9VkdyW;eCs60Wc(1_!C^q~y+^L;1A1j~#Y}bj zQq$eZ#j$N)sjCSWu%kC}u)l82G8KC6 zu2sa{3g*rpx@jCcP-1Mz->|;;GnklF1cChDPW;_yxZ!X z!Jvf%$hOm)tG2S4G}?sV#%frMs(%`T#3QMjH}tMVU__~g!gqvU2At+HMF&iI2OWle zKnC4(9pGn%q;Tu@;{M*u^>9Zt?K6XZd7sSah9ap%}fhG<;_1XUJO()j^y5M+btn%Ic@psgEn~u5L;TIBk z=q0bk4=iVa9Jt=QkkP7({_Rd|?<88pZ~WjM6##Ja=K%n~hEi?TlA;q9Ac+e>m}y=D zFTEt8uYR$=Wf!o3o$$7wtSG9^{AtTEFaXpKUHwG`nP4f<(0rYElx=(M2?*;A6cZt~ zqZr-2>EznpNb2buM$iZD>O;&c$&&Fr;1DeFE<1=j_5+(-I){Gu00cgN^RE8vrjr*z z_da>uabmu^!4fMMI*{!P$O;N=ZxNsbQI=*&XBS)gm%ID3o8P8LZ?XR+_=Ksi04Tx2 zLJ~5-hgi~C7N`YS3xxINMH-Ly&wQo7e#6O1ptVnZ*p24D`t~@4uL2I?y(?zl2{?qS z0f+GX_}bA6j%7qWCAxS}Vf(^RJ2qYHLLydIF--&KuC;|;d7!^{Zb*uVHY5bP?Gf9y zUaF@c?YPB*D`0ft$=D31ib60+>zoyPA|&K-?VouN*2v{5$e#Nm%y<|4bX)J@hm?5& zmZb%#37#hcImk6Zxrl_<2GI_b9_`u*7fwi|g{P`@zVN4lR2Bs^%ZR?tXA3C=2Zez!1Kx&)0QMNKjlA$*P!g zn%sja7?QR>49nDz4jpoxjy;sUmmY?de+S?^-VaolxJHs3iSS%C)-}ju7PA>H=Y4#ABai*=GWoH6f5sLZY9Xl1ewgUCOuPPvV#`hvu2qPJ^7oj!cw4Q zG2i%2bq-c|zHluxbc73J8l111NX84ne;galiQWDLwc1mFd>Ec<=<%m!_NKykuMB&jJMAUZQo%_}+-jhrrN~ z4js*GhE@LZU+(DLc?c>DD4T<;;Jxv_%g9(64DE?!9wP8@GOUophMeH+7g1Ho3zqaVy++qG}zkXT*>k{<(~-GCi>=c9e#vlHS@ zpNSM|0iC8}4W;xFTKEC1q{Cu`_{P)I7#>$}jX&v+p>rMs*9RP`oO-x!hCCj%ke|ut zkoXwR8)MaeX^4I70s89Rb zzr)iitf6Qiy{t#n8zV%!!z1mF;c3HSj1heB$MAN_R71d2^D#gU{1-sO-<*8;;5>8> zyb1>_-FTCtDXkPUWh{J_M%+_SsUa~i9(_^WcOH65*+@grSPM4rTmyW{$qd!-g}vFf zSWH)V#Rfoco`Ie*q{9r|&prP&;1qnOzkd)Ae{k;jtYyjqvbzxo`SPUfF_%)<&^1pg z4%%fZ^yGEWRgdxUZR)-9Bn&T@Ee_5epDn_frlw6MNOP>)%4icY9X2-m3)q$q>rizs zSrQw>XW3plsr@+0~o0;5~7ee!A zU8I7wE?zn@-M~rh95|_60Zf%oL+WMX7_*>)pgOqqcxQM^7zg_KZ=gdBiGiTJzxT#V zp4o=nF9I56z_OQnslOAvq6fEtEj)J#MJCEn#RP28n;~nS&7;r11h$66K(Bn)o(F#0 z-vUIx3R~a#FAsof2R9#YcT1*Zsu7iL9&(I$Vg?`TzTDqCyIcsl=$%Sd;Em{iUIrM- zz|!n1P$TG6n~ryd5W~ls6jv~2ZGJZ;ga!1;BmIp#4Gdi3oY*^=hl>H~Z0|nw`|Jzb z&?^_bZxwp%mHz+YM;!TG|1@R2JgD$-;dMc7$Xbbxm^eyPuX>7r=T)A8w!HuycUTAL z$NSFjHD7?PrcAOM;Fa+t3n5SCM%YDA2CAhu!hA8X;rvy9e$6r!@{c^X2jEXzd!PT6 zGUdbDu0Q^^E{NQ45aB2hOBOYLUn!?p*)umJM*chCxU%z~rR}}3|5gSM^!asQ15Yp- zt=Ul_yOv7WO3O}%4q2M9Q{+G+5@_&GX@x5#I@&ZLwO-EEFXxpR#z$EtC;+|x)nh&8(|-YDP_I*te@#

    _jcCYy*|nEq?&_+|PD;Wy(j3W{BI?w+KjP_5d6aT{07FL~u14X5 z_wsauMM5<_0m58^E30CB-AbOWYw8GftW~ee>sq#u(td-dOS3^D?=k}T#7s(UNmE)3 zt3#+Ibqy&g=PTuSr4eEh%Q1`%0B=|M!Iho}?nZ z8$*#1Du7iWG_I<`?^m{(&F~t2%2n|UK}x6q0V$9{n|m$5ig36qgvzhBQ7R@N_nJ*X zuQsaZr%OepASFabkWqD%k!YC}f5!5wh>VxaLap1h*Br~YV`u-17e^A6)AEY0U~B^z zl0t>SEeK^JohR5zAi}ha`Bo||Nnke0d{Q+-OPeiA+62|I)WlK@u|z17O%>&eNozq< zyIpI>*&X~JILay75_A}YIt>ec2m35fCzS?Lp<;4gH5isebk`u3hiQe2$+9UIFq6TO zl{~$OyE9F%mh?HZ`gAxpV{R#8+r7@BQ3GWw)G znWdiR=^lxKZkbChZMohkHi@abdAg&>P_2l~l4LZ^urxJ!4NtcPitu76t!aE^txpqQ z{fTum9R3}_DBA_PqV(2{@~EsWNg4O>e;~CbsYE7UuN72@rY>pPjz3J%tU7ewc1UR= z6;XGF_$2PG2&oH1JCU#{^^Sa7BHz>H>3(aKCIWJ)Ism``+04cpdAc(?Ly#?>hVuG! z8kJAF{Vt)wQh*DyvbwEIVZ$1+SKACZ$XVY}$%N!4SO8O54%`P3O`E73`9k zgks&hn7!0kl~IIkhE;n^vItv9Z^58Lgp|!DXsullbW50I%|IKR{2!=l8ro?r*^N}# z8Mcs4ez8bthn`4kjwp1ZM}bgOJ(qNJmqX3A_xe!iL~*V2HK6P1D=PFY;R z88yc3A?RwYN)$;*C^OU2lqPlVB>q`C6$_DN8>=%gT3884Ed0B)N+ zY0MQ%DC-Est%(thKnIvOMXjK2H)|?NO>M_ekp#^}wHWe#D0mUkQLW_uwb(I&*qz;w zE%+e-FaE>e@PMrEgFNC2{?FW=ufWA5mpgd)MDAdtrf?`o2O;xB@;RoONuyhjfbk(B zqXUtDLQrVxtu1KfU2yH$v;B#?u~oEl!78%X4ONI|%DV`8ER=N>7&J8pH$qq64fh1% zHo)(Gl0nbk%^PgD+yl(OE&%2E8qT>Wos2No?= zxsrAfS-6IkW&H5=+Z(-Py?yW)P#k;^Q^Cb=P;&Xa^+LVKBf1j3UD zWW67p1rZq?*?-Ggc$(I)LiT(AaT@y3{c!u7<&Qd059x0$;*vmg9A}Zv9!~I?FUiylk2($FXpTal7&~XWhm{$$36MY0+A}cfPY)x-gpl5yx-zXxZ zz6n?FUV0O<|4dNJ!lNJm}qKgqMS=H$|hj|tH!K2;PlcFZn$8e>c zUhHf_+kP(0z`n;Y!!u#UVCmwKdaF)`NtI5T_9qKjbopa&0l%0E_4V$Di^`WeP{8jo z;X_wEju#)7q==WXR`1iMJuv{^EJkvy0gHCo<6Wrjy{H8dz7YSO_Tb~fuJFPyyIW>P z`(9kq>~r@o|LyYomw#>f^~>waKe$}CT(bPM<$Znb(Z7s7F?#RlfzgkTmPdo5>i%;^ z&lz1c^3RbM`+h$1*vNNAzA*A(@PFJR7ml1UGB(^Des1_jJl zJT|#{@MnW}4c^-S--90-%nZ5)FBm*yaBOLJ>2pgTS^CYTw=BJCX}tfErPihLrCXOS z8+g6{+KI;oemC%7zk1-%zzuzO53~kC0|v<3_(I=@`?CE{4)lYE_{8MBlLscRoh(lV zCpDA1bs$r9weX?zvMQcOKdndEg3$&q!m2jdsA`i7FC6NQX2muE`_U-W{0?r7rr zAp1?@Yi9mG|4_~9OB~pET&1>J*^(ljIs5e98O!QZv641sahI&Vs>Bd8{Hu2avbvg% zAWIH6oz-{}sRH5Igz3C5Kfd71yFb^z3NC?`ZCt}LMk!6H0hCuRud?O>>3q8XXs>C8 zrK@q4N?HlJlFbJJf6j3;|1)++gDzy%5+fKM5_#M)-H*j$t<{PK>?vcQRj5`KUTkf% zjMwC+DxtVBuhR#Ev^|B{XdAIO)s#3=ti<1LF|=KU>FRLYPMIv@$)+xpbW_EU^?Ut) zT~60z9*w5nq}8`9KaN&B_439U zR-ec!noU9yEUBm*mD+&u=2(45P0>1)yy1;xwMwX8gb_Aby{`puYxacHTecf3k;IM~ zKlBzQOS#f&DAVkz89m$L{Fnr@GSXO#1X_xCBpFSRn|ZpYZK1R>$4o?Ftp&72f;yLP zut>Bt6OSd8tbHoEbffpQAR!_`Bp5I-qySk`W08i)Pul zx=B~^(W+LL^GLmly%=wmWi2Tk;d4<E^ZTH2`!=5wC zGAXvKVqJcvNmB!}6Ff=qV_0^EQK(3VMIFo+y`fB4Zu}M&M^h$DA+4v~W{6BQDm@Jw zovfx{Bq?jU6ik$eKrWtK^+U`@W3$ESR7lTQmGY>@FI$0)Kaj?uBI`jqW=clgL7eUq^xsG8aa9HpYsduqRALJ(TzHvkA>Z z__Bmm%Yt5W(r>j^&6bKkP5E$tRijj=D3zY316~_EfNjD)3#*F7)U=17lDTF$pGzgT z{+{n|jV39xUz4ndiqdFIPQQ!AROx&^X}PU)*<)oX6W@+;Mp>0IFe4!pA*a7oB%@A6 zdL_OOU{%t#mS}s;QKpcJ1vK%gFY^4QRV$(JmowRLI2#Gew14LLOTrF`wx9~Y=H|^L z##!85Sxi|-fDF&Y+g^v%6`gz?cUL;I@Ip=|>=xHdMZ$*9#cn67Wc>=V;c5|*qTa-o z={@i8eAHzxQK0~Lz2Yd?G}PMdJYAJ(lZB$h*tVGCggvtqUze~-WhqFu9Dpclt!CVk z#CGf=uu8ekL&dB`C2i9Y@_2Mr7rWCe)2t*3gHcb$wN3+Fm#sS={{U04YiS*TTSrxy ziYpM`RN(2+G6Z9In{{tygr`3UoJ}2?IqiX6Rd}qfhs_?LDk>)%N z59_v;lLJ-UUr~r@NNu!a(8paApw{X6kyZpuEki3+u@Z(@$)6p_^W6gqJtE1NH&ST{XQw^NDxUC4~ zd^NV1?rqFp4wa8dA6)OqtvLy4i}YK0x(bjQbzVcQYH<|YI$8fZOqW%OIK{{kImYWK zmRR}j_j!5=Kw1mUDgi*SWu{JS@pqoN&$G!s#@CnMf4lcQbMCqKo?Fj3?~_YWWUK1U`m^B_>&tDp zUtk12yA%aA+Dpb_-5Xmj445KjGtiJiDrbv#bnbR~O-T4Y$`X{p>nJ(Fz~C%!q?898891#BEiGK*dj2FAxJQ|0AeUoo@npd0Awsd0SL4qa zS4u;av%X}e8Hq-U(dB;^${m&vS!X@zST<24OsO$JQ5a+1LJ_f!&+hlT!rsJz)vpRa zpxX+dImv(mSWuKC^R%;$Zh$DWAKc~%1mGI{YI%48jgN>aa@aI&9 zO(^BiChC^FrQ-i7O>^r|u)&lOX8TL3m6>Ox^$D77a>KovP+d>j_JkO>B6{hWQgEs~3<#OJ!J72_=zRCg?v=Or}Y<#p-mII_|V4u}Lm` zpY^8*(DRZ$m<=1;B>Up37Z<)T{oofypItaG6O8K(T~nIy2K=sA-WIAhW1%Y$afD+I z=ry$vM+WuEI-84|V-X^F6!WyyiykuPQ$;nYNL3Y0?3WF|qV<+o$&dh$a~JDqn^+Ak zd`&1?q~2~Ma_y4Q8IA49<8pJS8YOHTobqzocE?W-?ZQ1}u2rl|Fw!`nkVn9$kX~UF zzOMz$q_y2is{yV)s3O+&s$p~{*qXow z(v_0tCY!6*)NZRT&A9Mu4!L0X-l0D%TD3|Cj%D?c>t!+$U``&|B7=OAhj^e1oKLbw zHX@LLqR^11+%=;E^2J1-gsYyU7~T5n?O@i*{%Z5|Q%}zM^!)o5_!3IYT^wtUsyabt z18ui9LabpIi*0a zJPl7mH$4weLQ)!<`Se@+&@0c2cjWOG@ZJ5KxvQvAUGUL#Gnn_6^7gLN5XIc$F90_w z4ZKHxgrlz>dO@_k{r7s6hcWL?PNf$*7c*oLmu| zq!n>?lBE*LNg@$v5>zy)prYhl4a8n0tE9kzxOUqAyN+c-Z&8;rNkt+NlgELnQVG39 zDkoWzP);&Yd7Mr%iG*B9olplPOh)Qo|9C4p&_AKK{%2d3&ecOuDozO<169bAleChH zO|nV_HK`)vP!&VR3640S9)gmiV=uq;ZtEGD8x^=vk_pHaJsDSU6jVmDlPZ9{os`4B z1aujfpcHfU$oDFF_wkFiz02k-nHw4^mPjy3f|!h}U_e0n=wvjOlus(Scns?J!Ht{Yi8lJ020nut)j805)DvAUxV-%B7B^#dv_YegPSwa=1=X8Kl?PVcz zA)5Jj?X-2G^3EF@bl`mtlMJX9rDUQE2RCJw0hNVO1vORxZ$(rU;}UTNqms)-`GGB| zB9Zzh*>^h}kiZ%yBd@}8HjyM4S~00&2xgLIh~%V7t{^63Buz!Zl*7j0j37)BiruTA zmGXC~!i$7D$V-#4m`Wj!Dko!%oSmfQ3Hc-&i^nDjj!6*lI2$FCa}yrwki*@duVX9P zK3f|;VXiRbN$2Cjxr$gi7L6xjR$Gs&@RViGD#!nhL*2Y!NLW0ZR#c?6Ai zSSBaXw%K`;<$qKJ9!!H?BQI4&IYO0$Zh|ESl$h_oD9tD*sTf5;tD;FB_xyN8&}s7j zKNT$)R0LWIYZytzSuP55k)~n6f#9%j&M<)|er4pDDF@@^*L}m6WyzW}yX9 zRWb&PPAopDim}|JoQpH^xQdQ5in+Fs^j^6_K_MAGI(%Dpi~U5x2%e$@DD z_FR+XG$6!r9IQPo4Tk`d->hRwa#BITrlSC-qJ)YT6^@keg_H=w+Vk#)rzH%J{8GSN zCs{H^Kxa{~VAC`KvxiJh#z6}dL^KMgjT0-PC<;}=w`@iG-#k&@SQZ@Dg(J>!ecN(v z6Yc%;KjHKwzce1Bxg^WRCY4EkMPQTEBrK!cWE@T#un#Eye{Ae#hU5iWSMHmnev07uS~vsQQOpUDpHNgTkZxSPiA?JfZE!7ZFE#ZLo-Jq z=kdUQwc8UfK)3XPV|eNiK*R}nb^bcI1kt)mGto&oD@qTG-t#t`+9k!vy%@3*oTA*c zVfu-;Ut1=4*S`60;KoiJIuGQ-St|ULOI@YHYOdBYr=ms$J8+oa%CaX$M@T+`sDwX( z&G17XADVt({};DI&^vz-xajrQ&K!$0qX8pnsDW3E-k4xu0l4{fxQa-N(XC_Cj_J*B zyylaQc`a3gn*bjkrIXX;U5*srLx7e1CXAqz2KGSv1=Fv+DcqWr&pQyYwjE#!!aS^AXsEY)?a7EIBI#}Yac|_5<#RH1 z&5YfbBEtoD+d%?)dN(^su3y;p|z4)vCxZ6m!E8^9aO z=>xny9Ur^l@9^COar_kD|GUX*PZke^vcZ+ z5|tnO@O#$TbKzmaXXt;Rrj&djtDE50i&E+DytsmDD!%rB=vcf=z_y zxO-GmjJS1ea693l+f^@)aBh%yShCJ|*RZjDaf7U~AQA zJmp{72o*?Z=xF|J-qZZ?O~|-O?9lAy-oVGh|DeM@Wy!xtsvm4e}XrZO)->6*5gsG3~q zKp|&VC-{bpqr*FT#VkKvv*4qxrnhx3Lk~QgT?x@j}&}W(!5+IK; zr^`?4jjxT1gx4p2AD02ViB=dm-Oo%2aNRvZq`aP1L! zRnElv#DmY_ZgbRqM1b^Hi-vHK&IU^8vT=TsJR8PeLPD}vuNI;gUO8LTsPVnP5WLKc zbMhH=#$>aqiJP{b)@XRMc>%j$S;2^bJBkJO$7PJS#uz5s03=LOQ zvl<-{tZOtKy;G-P28V`mbcGhQM?ymfCjiRN_2);nq8Y8&p9}TC(KdC6N5sQ%SPdtn z!=yQdCSi-#n_0gCcc(|+TeDh9Lt}@2avu7sUgY+318{>ag9pRI?S=4M6Gc0SI%a~={x8zhKYppUD2G3Revha`v#FNm_ ztryE-K*o-3K|8IYcsd(!1V2<4aKuqr9%m_1pqpN0Bowh0ihiNNAF}~R2@P?-`K|zH zaLgvkxYmJXDA(WJaNt11`{fHTG5axjjf4rsBIhPXFmJF%7MZ7a{4Vz%89!V+q8YAB7m6Bv5NoIon<4%-)DY$pcL_)@ zp`l|Rf&?OiEC>%>BKF7cFXg8vtd=~&9u5ZgxtM~FaI?{>jxW_5 z3@i$RS$79vuJ)=-{2f+uX8{({PSEwkU;)}&?4N%S zYPVqf9|-lSc8||PdML{;Xxq;@-KKb@G=6>|y7ihP=c6T8ivsVt1`FJn6FBaOl_FFz zq;fP|v5HkqqSQ4Yu%sAPtRuqZ;Mr?LVc)zKcVd066I1G%g3c6_&441xwT&6XUI!x0 zFGUsg5&`t<$aSKsJn=p(*KxcrI^UuaR6@}uA;+k(49Repz8`c>S`4H6lQYm&${ajq zzF!pVGamqMFuFY07rtwAX>+Jfq*U3Oo^I(wEe1XF0pKPr9w5h}s}eV@N0twYvgJMm z+~6Ku0dDwGNcs{6mZH6}WR5E7-ChbE`VjP)q!`{5{spuCdG}%*3cl^bqI~DEP8??ZpPUL4ZZtNKG|%?&*slI>7w zPR2T!?3gL9&sxnzm|6q!1=?X~HbD5|P@sM9wbW6vg@{keQU*a_FlH8m|m)!&hhT9Lqi;Vh$PU}-|g8qeD0uTI!ZwVQ1J`Vv_WH^`95=kSR!GI-fQ1grN@oR8F_{~jX*TSkg zgx>miZ-SrQm(M9CTS?PKYr8^GL2%-QlnlUd9kP6)H@0#f2|zrqI}@%k{SD~wCqw}+ zc)Pb4{q*ME7M>>$0*0rbj`8K1Y)5HTIWwN5n!!9L5WHQ?C!u3s|BMg>(LrJ_f98{* z18_0y0za&y8hyU0@ya8akSSJjQY7a0k52->`6LV`GXT1_eM)S2{?m8{@!(%rK1b4> zPm?Z1Jnk>pjCCcA8Q%Zt-q>m>4WitCcRt$s8Ijxhw_u%b&*>9juGiFr(Ur2;J$`E@ zB5=F$7T_kOA=y(TOz{jvAiZ*n$a3}Puz)=N7Z$Kyl{-qLmU0#evr{kED3IfGFwBx- zz&l$9M_WD|?4i$zLo)MuyiW4_^fiz<@_E>&DRG_L2IsrO!*kU{tvauQls6I~xk;lU z;pu)M+?kHt+FQH&zerP`<1Yz3?D4WMiu3=h+hC-C<6;;otn!sc%M(w=lUYY1Pbl1J zl(`M2*8EcROU*G3pJkzl0GX2UksfH(T* zop8{V(9l%z#~Ahq*$#;!7Y+|}>o5;9hSyVf#b+WYqCkQpoia`;1db0J2HldyeSS& zK{H={r3@M;mnR*nJ=&H+6V9NQf^8Du92;k|DBDV8c;Dn?qmz77Uc6 z6v-aD);@j4bPo(`oo+qvBAuFQtD|gYl70q#fo6bhJ~+>Jv!$efWvA zn9p%;n!e}zy?bOEvU#u<=}EgT)wcTp-3pQ(fyoHGh#u(eUUyO=+=+7{M)t&q`Xf8m ziH0a=&`yCt4A8Lwce@+wItl=84Y9~PvyJHbhk7f)(sq(hz)$p40U>)2Ne>cGeRr*B zxN~$pX+XJVoJMy$+zq#!#y}yQ%~9w*KkRKhRi!*31Jy}CMZb%z7NNy>anZgX_Lf54 zV#pE&KxB~k7~r7wOqjQtLH=T%D`01zj0#X$YXvFMnLp~S*#JqV>|HPgb^-bfQc**$ zD8i`&7@C3VCV$i$Uw6_kctjep|G&lPZeugLUZkC;8{+`7|_B2@meR zo6w?Phzr5aU&2D*nL4}eEU=4>iX!fL1g#T;c*aIyaiN^4uDWjSxK$26DbItu=zKz zYmvVBGAz{zg0zefnu&X`4FCqk-WUpOnH7wo+_CUDlNKW({oH10{X= zY1jcIG`v|4axs~n5jm!x#r?{|g5iEm`yiZ*sQFSl59QZn2qotD?Pr0bgoe1r*94p3 zmgmHg+V?ze_UgH2*IX(?g>ago6Af|Bk;-9?A9)@)N@z$u{dWQ6t-R!iL+IG^;-)zI z0<7Dx_l?f&eT9g=rGreLIa58SDRe!U>t!zhR|yFtC=V|554<4CIrH1zb^#R(;26$= ztIM?z<^CMNG0@_%kWW!@m`4S}I;>RMO<^kB^ckx9y2ED?Hpj!qU~`nx0RHno=cA?n z5^Fp2ReU5ojtk~g*sBDcNwL;aw3)NjvH0(O6*k8CB=o?O@KSq~v9=jK|EkFE->*S0 zLw8JoboesxUlF*Np`!==A)%qlK}gCn$a!>EPvrQMJ{~t7Aq=al&7{!esB~0Qch}nm zCYHb)CuV`8gob7gzi>Lb@%Gm@qbp{`L(wg-<00ETH)N`mP1Vx0gOn#jQh6_f8UFos zU??FWZpowPBl{bobj3G;7aUkO0WaL%fQAN~gpMUoGc5&~5R~fvH=+OLlh7CiS-b`i zX4~Hq^&W0$gCjK$6eb+0TlQRlaH`m9A!_q^I(W990$#b`X?}cV)%xdu2XX$pu$A#2 zZ;Qf?zJr->m}4Fa7oAE{rS^t8l+T_3SX_Sj+YV_|$rAuHwUW;;OztZ(fHrvW9Z~X` z|G?>R@ZiY1Gu$^l(JG`T5Dk_w`T51q*e&I?a9=+}&;3lCV*|!~MAo(Hh z2K3ybzHqF4V+eEPfkQAy02Xycsa(j@G*k-_r5-L?{Nd2DxIeyHN<&Y|RD*{A07qUd zvV3e9Si-Jw8n6_sQ!%?eN2e*5(@VE9I;*fAZdw9Ddgjy6ldrb~bK&Jn`obIiXGVY{ z%=%M-Bi0K$%XI5hkzfie5vC&HC>HYN5#T7Hp@ZY!8bBdzM%JZ$;h{CRtk368I=llk z7jw*cEpTPw{7QMTn1B?^gF(4(Ssy^L=TZ3FPXmM8X0&yAUw9(jzXCUzhYrC_rt0oe zf+~d?8VGOmq-y}p%JXU^$VcZ_5U5l3Mz+1CL>2?-H*z@=`0Nb=QnqKJ>L$BK0vMx^Bq*JBi;)p$$* zmQ*zh=gWx=z)?a2fSZSed-fF@#BuxVM&JmY$%BdD&WyNiI&d?|g|kLdFRxhyj(^_> z93?ck6b}vV*_)Allc@ap&A8FWQ=Y4nezjK>D3z7QLeuF~;a>dSW?(2G9lvFxi7lcg zoIiob<&3#;@iydECskmGI+>G4T4{mf4HLjoLId{_url%{I&^G86mj)7-00Ki8f{lM zGD=#l%#`hcq};BJVHvq?z)?a&x4M5WVvB4OWt`a#+6p^gR*C9qBFB&K#NEM%xnUis+fA(&Z6?(& z3*;S60fsinxCyfKyU#b2d1pbwqdA03s@&{Sdyj_!Q$;-Am#4+~q#>a&3*+<++%65oJ3v3Rsg8f~1q z%%<%cB9Cs{-G>{rq!>LJdfqa9+UfnEY^+hPRw1Ud65-smmh;=w=)-690VrpFF+hWV zz=~eU?iiXL-P1S7CZbb^<*@MLYOQrknI&97ADas{6Ha75yMOwqv=DCH_UR|j?hjIA z9XWEFK1< z%*DJ>PzR3Iu)pw*)_6DQ2K7b-rRl0!+N3Pj(+R9pcM`AyN@-xbcyT{kN{UOs9twIE zxbcqGm|H5`$dpN)wc%7HJuViOfPsp3DNs=f4IRC2Sa3T0KT6zD-=bl+f*Zy@Xg7Ws z%%tPAu9l}rIF%N_koV-y{#s;XV7Ho2L1QnD;49E!MpUN96<9raw`i=Ma(T|FBtq~a z43XYVzafL=n^1y$5*j-AsuFDc*S!Xhi%L-i9^S*MxlP)U@|29$m?OVYX*3g3p2cHP`X(P@(^b9=A0*!fk;Gt&G_g(U?icz3m6!E z<<|@^9=xjkeV;hXNB09)IOgzf*?7;lG(7Dt-B2gW4n;)n%@1B;#?htwfvbdu)V1Bh zyV?W$#etc*02Vz+(89llUk!)I=NB(u#EJ=8z|eH~xKFH~?d$Z(L=A|!K!2mieN04_r_W^pTk1p&gg1Eo92_y zQT20z`S2O7DD|5<;0MZiLcVCZ%Ey%myP*ilehg_2^RwuIpJN^g&HNBjeGcq&cj!fa zKQaJ6>(pT_$cL}fELHWxJ6yF@toz}$lE(Zt8KGMxBzzcopmuB%>KglEsw)#7{^Jg? zREf&gNRut?%Ela!&|BCt{$c`-5*j*s49w1h)4s(l&hV@S550PB=mBXoY$r>sxsdm0 zYZY}K%lKUjtQS%mn%TI52cP@VCbZQmwtBw}kIIE}qvA8=@@gh;hZnkJ!B%83$B)`T zMhOWHkg#S95)B`-&F#q!kP#*i?*og6Id1RP^0YZts+DVHRjwu|J?8)!r8IzEe(QYn zphIl&j1!+8d0)e;M!o_D?P1A{+yV9A)lOceJzc_D&*%fqZm^gX*3R4AAi0EwruKsq z1i+MSMN2*6c5cEZ9ASoj5il!G7YCZ|lK{&*-#Hv?^ z(9>R#Y0rn5+UA&c6t-;2AIi~Db<G|ylG<-e@TvU3yzI9Pw%<^{L#aQimKV7`yC4%a3n=q!jhD=c9Psapa z*Ix|6NoeTcuY-cy;omP7*U-T-KYj`BMdO?XMN*kgfe7X_3ZJ{}3EPDEdD$iWY?9E> zgJa*@hwi^bWI1ywXzC!afcJ_$H2fiC6~Q_S>Om%TQMY;hGcc zuS0im{jpW^Nr=<`b~nD{ER2dZ?TkUs!nVS@#o~h_IHb*wU|PNk@Pj4|uTS~Zc$Vf9=GVvb5^kk8cw!96o~ZAQ(Ms7yDf zfg?1T_lw0%PMIR{I-v?#eaf_fVY9-P{HHVwm6V2dWNc?l%QOA8!p5A+VgZkP#(LYz zT9c@HVsyhwb|I@57VzFI2q>YU%46S$lgK^GhH%Q<4LPwNRe3xxyn8H`(r+(&IuzSX zk)RV)$-Tg=ultFt!n%(ca1(#YoM}I;LOl_Pw&P6hQQb36I0V zDqPlJxl17D<#6qg6vOG}>t^)xeOC-kKY4i{?1k-Ooe6jHBrWE> zEaAFxW&fM9jf2=ZNH*)ph9MnJtmDwdAq#FGji#>Z?_7H_D*D~#Q#Ve3ZR6sO3~m1t z*bBFc_QG%$lEgw*o=8Ct0d;mrspH{u;=n2Os{Tgw;j8IkTb-JU1pQ!Lg)qM^ zr2H*7K)L`tVe%6u1fQ%w`6o#B!DqlQcSFA{+j&jtyBp`E3W7~f7XWGeguS4r!jR!T(W!mYv&FXWRn96@Um4GEVy3gU$E-*RbwmPSUI!uv6V+xetPBAE3+r0 zxOjHOL&$a6z6}R%U;dHhjpgrIu3tX6eEqWjK!S^(FS~aD@>&6qSIx3Bm#vZc2PrO| zSbERW&n~@gX#rAPoWFF}(v>6qkrzgOICA&M%_CQiBuAVh%8~6OOP2g|$gCbzM6~DXL5@_B7AQPcqnx!uBodm-UF^~@~pQ6g1P9RKaTDCxp5TAiUsEOlp$#Sky1q8>1T4xfmRcb|phaB0`(;wEz=uskn3B z!E6A{)k=Eh=BUFbcgFI`k#7N;0}HjZ6MBx5o4p#&S;vZZ9zrF>9)bq zA!@t~SL-xsBk8iO?2EvwRwTLSZd~kW$}=giCLAv4ItF{pg#r3#M_l10wCZkyPR1F= zkXnc_Eold2X&?fz17=0kZVP4Y$!#CUVmeH6C8=)eH90R~=yvmlDS^MCRQFpTzL09N z>NaN)KiBB0WKt7$Rm$Z`TuZF_t-wYRH;^WcsbQB}!zx>Pr&uo$*V4LDH`z8@^c>)( zZaF0UK+Z(zw9}{2lTLfQ6gA(B%k8m*pJ)cU`b6BQ^JdbdOepts%Csh~fE^%jP^QVi zYN1?JZ4(Y-E}&@VHJwy)9fsqj?SOesX&T8)TwCz^6me~WZ`T1WZI@Tv#+=++3Pi#s zLV3m+0w1|cPFGshxSQzc?NR0ab8xw>8=xq*t4n8$Oe&XUm*r?{(*cjokjeP+kq{=t%xRnbsN{35}LM|0e>WQmm7fW;9tV7jzkd z-i@JKX`8cIqa3khqS44CDNEw?FACo~JwZZK^{Q$ii>9k$R$M5^<5XvoRa>@MCG@!< zv0IpSHV3C6lcbyMG;Og`=s-;Weu0l8m?uN#774(-D#lJ}J|UDF&2rMF4n|DfbTt;E z&wotduPNs#$aUn^)ilXOY{j>Q CgFmYOeQo)&xMJdg8TyFI?6SS|8GL#Y%DaoMHaq%P;rj+47>49zArvqxf(d4|UnsAd0ZmD6HmgILv?9m_ z?hwk$WPwVBG+H|qbwa??IT+`dHv8+ryviTcT9g%kH-5l7E`0B1tN{FHFv$VuP}Nqg z=n3Ucm78!RJe^cg-VSSM(|tm@L9Ztx;V_ekz>$JXEE1-L8FE9Ao;(4dNag~=G8?wy z?@eK6gYt$OO_x!TuZOZrFf{A|+7y6z5jU4@1vJ&RC&jJ7P{g#!-w0AIA^;P>WbxaH z3-!2vOb#YdZI>OoOK3o)&z z^*us)wHqYD$^-gxDw5Wwo0%QAWB$gJ-f5LySy13=crcn0tzBUDYX z9V2qm#(0;d(%Ed)sL~m$YUh`otmo#(a?oVJj4JL!y-%(_{Ml$N@#67|~Zy-BynoK*=ZW3_C zAv)n_xL$qBYbTo>hdfmBfyZUcD(JI5k+M@+^?^{D3j14tV$2HLrrwb=QsGh|m>?^# zP%9UFKwxCFc&N6Uh8?CF_ZY~f!n&cSJbJyg^=3k@E%Z|!wuj$XlQ z+iGg@r-gDCIAG*lu2v)$^0r#prE7(9gVz8_nslmCBGL}nxpTfFl#>t+;K`OOCZdsQ zk>~wYJ+-d2qHHT3dG4xex{3bhMHQQtoeIKH5y9NCXHCkyWbN zm2h&qu(@kP;L}#FNQtUXuswmfWAu?gdO(^^|qMI=j(+yQ?r ztF!0xXP+s2uk}`_2Hno*b9#G_IZfD2wN#k^XxWZS)1X2O7iB(zKi8CeQN|RDlG>^t zb|d+fLUFPc@8|*bf{X;h0qPVC+f8d+9fB%FH7>m;)@X$Y#}SMhO>69K8zeF!2xUH@ zHRx0JG2B{>rJJN&R%JY$j3`X{sQ<%4xw4ufJ#4VeMTta>NiN(hlrv@k`t!#Ps=S}{ znqxyVf;@z!tFdVrzcHisC7-XWZsgL#e-X;rNQNhb*rM9z#( zL46I&0|44CV<6zF`VW|!a17aTols8K%T}^(DcIa4HBFvLV>T*45hsmhYscW0n~Emt z+{c9S5@#ezM95P!+0_{bH6|Q+Rc1Lwb+bh|lO`3ZO!n*p_?SsD_I_{vN(>C#f$ zG2An)^at&Pk*GuZDt*ICq({q`kM3HsWsJPw)ZzF!I$rB?l7QT-KA;Vo$E6C&!Vk>4Nhr!h#t49sEnpVFJVY4 z$TNHPApGqRSXyO^&Jul4w*rpB;pFir&PbsiPX)L_#+vY#jS$=dFLSpa1XFufLYYzg z@jN8^nE1+f+D-T^GBNi|=B>E76y-9TRdL1&ac3-lM~58j^NW%C(eJ=hDW4ejshh+H zt^UU`Gd^lpc*`x=l0iz(>RfD9l>(e{eBn2K0$w7S`80SZ=R@ImpqRs-5bZCI-3%O| zr7_@$ZMLi~TMiIbwLioeQ*wi80*Al?78F+=(k=WpyKZ#|G&dCUA z4HI3$LdboLt=Uk3!EwOx&z}U25*lxCgxAu>D_fBHQ{uB==F^xXA5)B5ZDCyD9Nkqn zv#q+{A2Wk@Aur>1J`Jsw&;X4nEkL<^Mig=1Ex-_LqL%?f!4E2>QdOvYK*{M#WZ2{$ zjLA5<{uX$;q$D(S@S02aqrcrEa$EH|c(sHV`%C9c7l7}qf{ShJNH=_GLCo-J*JlF;XdKrXpBR(v1(eeDp+xRzEJ}g)me;wRJiC~`2 zmLkEH+=Xtu75oyI`K9P60oFnA0^NibeNn7s*KN=VAT}Qnj7>OcomUU3E$uP|fF*|~A|=uFWn847jd@A5bf zc{&Eb?Q)t`724Iw(Ss*&fY!bXB$UvQ`nAgk&hH!1D|d+;*W8VV`FPN9k#Lhry45K( z{L#8I1_{UpBF69TuO5}qknCr|9BmRXYI?UMUJ=Ji#33cCdQLU0SRd8WW~}*B#e=+ z(kU#Tf4>)ml+wU0YiK9>!cC8ELC$ZBYkcuLSOxfyV%(9%w8P;g&FO%eX|?^{q_9HW z{~ZugLPKtj--nL%wm=R#(PVeQeRycfb3_-oNU+ln{ z`$0Xye~S0Y=Yut$1-zm8{!_=JiRn&WP7qqZMp=bKqqU6iT>j+;p=+fycqsn_#C|6} zu^ugXNUZGihw=FH(ZqQCQwdF}MaAv4n75@-!VVxP>BIdstEDt_^x|PKS^YvJ8AmQ%@apgZ-oX0Y)@y=OM;4Dv3f`3N zy2im(TxnG^o@T2xba2P)I9l;bkbFJ`Lbg>q(bvZ16Vs(%&bd;4@>d{wcHexw2@M@>Y!SROH$5}QQu8eIE}R|@K=0xK1GrFo z%#d+1{&+-{!^Kh=k5O*yP)HlnTQYSl!o;ZCH{_kRsPkro5?>K822`+w87 z@F41m(qi7UY@dGld9V}XK%@nh1q&=Zbn3G5NO$=CLkAaro>w7q;#&82w~tJIU=P^S z*Jx`#>E>*Z^T-`x$C!uM>NJbm2m(|5rHNIFPECY(*R z?AZZIXd69Xnq9XOvPYa~WIgG}(>I2$2SetzKY^)m|L^-tH-LGaj%3|kJL!NBOg{s_ zqf8`dK=+$w*Q5IH`>Vm2d9p9i!KYIqg6UZ=_QyAXtq~#}+Yp=x_Gm*I?6u(S>2D)~ z0aSdTvQLm~ z{OcR1F{0|)zkr$6-c9GhObg+cacCGALwNvIqrW@Q=`)zUa)Ku56Y}1k{CfxxOB3kE z#TQJVAO5AU{U0!<+y2_WZA>yl#M$%5zy6QeGkxJpuY5p;9(lPR2CKfA=X1m!&m;_0IOg5Yk$cGd4J?L%;2|amN<_vVB?6nQ($)0#rd!>&>#69)=w=u_&IgUZjWUf%g zy06&O1q#8`z_S8iOW%g`zl4Tv{ln0}|91lY<8ATGv+5npamgG<&HyjGltJB2k|nLK z;s?iU@YUE#u_wm9Nj}2(e)#75jwtNRfB5BJIdxd+9V8 z`rYX45GuUcpAZ5(AzY5fN4gr^NuLFLq`7c8J{ai;AEYc?o>`Ww5oK4Q(@v&+Aq|5^ z{;+HoLSN_8!2NeQA1^m6#>=g~5~`eBG&=!)dPn#uWjyrVW+9TGjXqx`rS=oXFnaQ@ z;6C471RNzKfSP;(f@vRl1j0NQ%?iO|Zx7A#hqNPnP%=KMq$AF_gEEAQ?q;rKq0JPQ z(YBbEaXt-AxvqnwDd2cQ$lR>3J3lcD934|f#(^W=?u%ZJK}!;9Ib$@ti7?=u4bCK6 zm&~pimC(@96+A%EUGUWL-X$W(TSl;qd{8o$u^XnU8Pe4Zl=4K1^#tMM&!2MsHUbQo!@}*+?~{ra7K=#b~otSU0}6Y<7ILl!n}iC(c7# zmW%T3TQSQYACK?>$ymNZqTbYyMPJ*m>$cgV9NoAB7MYK%fG(7f5ZAj0PR{%b-al4| zgR*KBhzFxQ3Jmcm=UI7{raUb}!Jje*Obon{@D09n6>yZ$&<-y(c)^=M53iaP5kE#} zcdfYuyW?L6_nl`zNlDoy{B_&_ODHHQABBvS)R3^*<8C8uUhMe0F@*d6if%SaDCQ5GD1R~#`2lh0l)bqbZgDFYx>4@ zv!d7U;-f%GAm*~A8Dtb~T9e#(PVj=@k}u|bsXvm1e< zXX?mi;D}!d9Y$+9PNw~ays_AFrK7^?{*R5oQ9?tRW9_O@wOY%0@?9O)w56?t+68p!!l8ntJ67V9BGA{c}QOxq2HOAwC)z54azUGC@AK?R# z@%Tlpa#Bk)e6EB%<^s>yLEr2il@y~fy#j`gPvO4!R8dcNo(4Suvy2Zw#wqr?gX~58t_rbSjMi# z;&Tuo8@P+GX004o#nOJ~fkSv8-84tf(1b^XS-*CEp$aV^cBiAVo<_;E+CO^5S^tk)l?YBCUkIS}x> zXTtoPPr?D11Bc>mXNkjd{@Jj6fc~E{H{Wf|P%EsiHvwKI91jKXVtT{b&|WF!;BDXA zgZ|0E`Tv!(#rCe=3q1(@jz=Gd5`iF1%CiQ0S#K>HbHeVy?FEIG(va-0f7yo~*emM# z%sI2W#?~(wsSMvT^ytD@;W~bfZ2dAcw%Yoi?bn2+j_?7(7)PjRx9JU(xn{GtAs=rb zkmRoc;6*GcMh_l-bN}@1)a+tGe?H%yU5tJ~&u-y`J|23jCE#V82*)U^w%D=J@(g;G zo!z}^ele=-%J0SqUpAE}a^YO8kbCA7($UtI>vYnaD?pklh2IT%_;$>$L-(IM3ovXF z+9!^}d&yPr|KMh{?Yy}m+J`xwF~_kLNL2%5zO8VPtS4aT4yNHcbmKnYD5b$0SroJ= z1Gce$?h{98bU$Xvhuz{?Qw7xP5EY`@b;?*xLW16bkf%@#q$)cBxkoGc4iUj~ccTM~ z-r9s7+%IyUxnLHKjPa=>d|dbyo1B3A*(PdkhE7L~xrPO@R~56nMd3JU}xDXk5e|ycc!pP0T4-EZn z(MH)cXyG}qo5SShLyEDbF5mXFjHHLNb=695HCoJ}?RpsNo7AwTNoW8Ea1J1x{^p8x z=pSlPdq%Z*dNXs=(FqPpB_Czeu}Mv+Sf+V~>$j=k27ltP%>N3_7*zOTgdWg}E64A3 zcxE1tEpD$Osuaa3$+p7-gal2XJy^7uY-{Eiyu*B{Vel+|?)Go?d1YrGs^22))lVJHc=7B(TQYdp!_U!Pz5a zsIaPJ)u$Y=286)*#ps~gieYB%pv>aVuzDMCj97ppY!49rEGT*-O52iDw^dhrtM0hB zl*Pi{X#rs+G>oSF^S>##pe0suHtx3J=F8`ruk~}4D4}x2YpRsClZ@st$Bqp+N@%b} zJiP1Xx7H4!FFev%kDj)Po%)7-c5=+0)e>gN580~aNNp;iC6LkqN-ix%w?2Cgc=m1 zx7H4r64F+Alh#LF4TX|L3O_8d^GngOPcDO_1aC7u;unwCj|K1~Id5)~wCaYKmC~ki zrkKUhYAErnn+VR1t(s3lx9;-{Ze?506+v-GZwcWx@MW60t3&dJrOwu4 znBhM|Fr*S1Tzla@ewp!4o8V|7_F6Fl9ARNl0Y|(rWL@^A0@7nLie!=t>3#~lht z4W^`y`|WF`-$5Fc2hTvRr5CM3+b&& zZ@d@;meAlBz?)(DJJ3Hb7Q0~8CBP9TH6N0UC$*#HcPPlRPfu|kzr5|lU2qDiqFLfZ zj2p>!5cK@c=@_5up-V*WgQ@t(OJ{ei31WS{3c~B28n|`@`AZQbx8N^DhPm;y>RRox zzFdzbyD1j|tLTj!sK)$Ke*GLofNnvb@|C+FyX4eU4h1cV_+jVo@ zu8UMUQ7W4N^c*ti@TSw4nIX1i`mRE!Te8@6hLK$TNB6jnN6vakdfQm?C zjxVJ_H6%2&LNI+b<3_$L0f3p(TWz-A}K|(YnnTe%lP0% zbY)9i9^lY9xU^V6WW3{6eBVOvlYG|E0!iVW% z3%@2>H+pIcRkuN~X4(@&U+Kc^nO};I4R0P?RyLq*?-kW?|K(UN)0|wI5lRw_~ z)Td9KI(6!tclo>-UyO^W8MZ)ZmKIz#A%?~8$+Jcopc|iV9lm_Z*gEdnv}RhlV(Hq& zFU@~<_IFczX0)k8FYeT-w4d9ldlU6EV3Z3P#d^*j-o^S}Uy$(1PFlP07I0>G-+Fj$ zeL|-NKLk0db8=rXV;TdCzdhBg5=&Vm+>ZA(VPu>aFPl|!3NZX@rdCOn7Z+PFOKdE}9sfIB%VG#uvBbKF%cIP#4-K1E1 z;yDtIMOWXrV`JyL;ik8G{VkdzTh4HSO_xfhW=ea*weW-|#M*v#dBn4H(#CVw9_FXE z1l#3UB~u9JVj}pQlW9%34&Jq+rQjQa*WodN8`D=)4*wet0qgDdY_dBaM2#kWGPoV+r({QKn}EPrMB)%kYY zm;So+i>1ewHkP)2cXNu*)f4U(uiE^QcHh2JkDK}F;)5G^U32F9XEyG?=FE4@ z=o9qwqfpI3W0czDvxd4<9$0>Y>BRIX%(LOPWiwu=7zcb|XL*8zejM_Z(GkNGj9|XQN!7 zMgR+zu}(Xj5eQms#WAvM0AY3kw^z!ATrz4Cn(FyGkR0kx^zojr5Nag?c)?HXLs7O3 zf2*IwDn2HHOUVFB=eLB6_T^Te3<-6y9!|FgB|_Q#tfBB(lX$Rg>vCQ*SI&`_@}uzE zhS0MG+YlAj^_mj}CvCePH5WQc6O&ElLKq@~#kg#nG3524n}B$4x0Go)LJ7+*=U8r4 z@ItH`WRsYgwdEssfgCc|8bX%n5Vbupr7=v5#d#}9L<8iu6{A0r zAdA6V+2U%jKzDa83e#=~aaj8Z#wnLvEaxbsy_XryeQLSv2?PZzXKlE#F}JDsN{Zjog$0&qswgUTejh6)z!?5i|Eggu{E8Le}C` zc*sMuMVYm%A!Z#hDK6Aw0+GwQEx}Krd-8QlNx~B8_+yk{?_0^i=7$VLlc?aaVzoxn zy=pbj9Jgx7Ydt5?BXL$0$e1Thoxaq;b5G zFz-ZB<_%x6UBz3?cDO25r9v|8ZI9Xy8on@A#M_xvjg=e}(a6oCl%9sqZDq+0-H@wU z#Yd*|i@!%d;1!!H9_y6^eDF3Eo<4XA)#xXwhDj=-Ke(0~y?EMn85i&ts0ofGdiJ=VW~wQ-@dCSZITb5% ziE6ZvPf@tKfO5hb?i5uZu%ML#TJvfxNY0&!aNIstA@F|G8L@;<{o? zFyV8CfK$XqktFvnqcgn7U@bN%1!|cTB$Zl{hTJ6NFTvw7 zrB6h8ZVjg>HHb>h@60C}W-1{c^Blr=1}Gn%v&to|Qz&^PWzqOur?-&8nx?=&@W?(h z)B^LO%)W*mZj9qXqpH?RO`H1+lz`Q6l6go?ATV#*mlKk0<(&UQ-EnlyJf34LHXAE8 zIE6)-7Y#?p?ZtxuudCH^cS>1#_cu{@fQBVX^cqnsUW%9?J(eD%3`GI92+b~T6KvU* zSCr0wvmtkgG->Nb9WFOf@Z_j%D8I4cu-07e2Hr~NiXqix@y?>|*h5(}F0_i?C?l9y zI`|zVW+NF_RB5uHi1QQY2~=3U5giP za?am4Yo5MEgJa5tr@k%nWiWic^Sn`Xk>4!knq;ubwu5ddkV*lw%zMFLzj`B_Cnt1T zYUSP7#%EuA&)cW8pKFKD)Sf0!J4@U5;^Fx-c6|B5#Y^A52ZFzjOO}#30T(d{E5iAR zGY>3SxWMtaj=Oy~35lQ7s|=H`*;+gB>!wkS_{HlF|D$Te{DH%_ZE+>7ff6ZK3z<@^ z?egZd;7#C&-S*zY$F5JPv|CNj!hZOfvuxVFtKa>i_V^dWvi7GN4kwNmq3p8&dVxs<8LLDa1ddEX}hazY1Yp_dJ&`BU#0-}YsnJbb}Fc;T=6L5I zgrk^#?2SWb(6Lu+c=$S*kmydZ*j1g*jAs5cJkSZTcIe4_+#C0NS~sQFH?7%MYD@pR z`0)G-bEiO{Mtx(~XJ5Qx>ZCg}fQqJxBSm@5M9&v!7Af8ge21gu=nHopK6cCBsa_%c zKk0L0TaD#z^c?ieGxQvMfxN)sX)F>d+w3`iEv2tY+q7%$2Jh&k?nv!}le9nFJ+`f` z-UE>E9A3#kYdZ4*l4u2+!M2ZM<4_cD1bO8>;KH5Ifj{Cgh+c9385qg$86!UZc`zu! z^pnBVVi^2nueDC3s(isyt4d5}wAO3H2AJ2&N2wqpk2ZpyZrB)4zJLD$n$CLmnK7M} zq}Po5img^CRj{eRLaKi}w1qFi3zC@7fd%K5OSSv&dvR9Fe{pOMddHUl5?)|E{R}-B zQN+qI!dWE?U1!#l$0Y>$<1fMFo6u=fWdSjpQePh1{o?lmAjE0t>1W70fv4n}h}j*< za;hwrUDeU&V!L+7z4{Asv<@;nexo}nKCnZZ`N|k^_kG~e33pqH3%Gi!PP0ky29l#? zWrxok{s25}%6^ni3-0L{7W2(t8^3kuJcyo-o^yttPPNi=NqAD0 zdP1$)=b&=zX#Vsc1jGrQQ8`u*()sCwW5oacIv_$H^_(*_e=1c|4me%;RHj^u)ne%! zLi9cah!Z;SHlAmY{oVP{cm_TC4KyQ*NBT(77Do(c%{_COYUf1vjj$uoPWh&O&qr$@ zMd-VR0s4*K9OK>cFyQ(2->KK7MD7{8rGt?~#NV!xNk`6{KplMcVR#GwPL=vo|4bB= z!+&dxSbhYJV*W@EtuCIUaIe~pLU?nf4(_edD1P-3=;MSAIk`|pgKv)!VUg8St?qoK zKqZySWGE)gsu)>GSR8o-c;Hb8^f+3jVGCawC!IYyo{z^o26$j$%jyQy(HFIxqPb{> z_2Hp-sNL@{2v2$pIyj-y?%Mhggk?N7?%Sd79Nsxtnrdyjddj(JE)$gf+6bjOSddtJxwfCmf}m7FYQ@c z-#py>^yY6(&uqSHTH5@9HFfj;&4ta8&6jLGbMwmLi;GV!etq%a>d)48FTQW_jf(?i zkzb^zoQtOd3)CMG3)JeL7Yji1Svw$z0xG+8c+o@;fzk7rYDmibPKX?9^ zx&NK}pSefp?wR{npn@vT#pW)X+cUR5dwBN0W*?sY?Cb|-_s`~ML+e{-_s*U^yFBy4 z+M#LB%u{RszP2{=^_fr2ynp6RgPH7%e}dNT@)BUO2r~YNC zwf^|}7uG+r{;u`fy0~s#`}T1&Q(yT<8aQyXJ|^ZRf^8~nb~tLiq#Q;D7&c)lc_IaG zuUD>w)Krmw|MW?lE&}u6Can{C`TPOva9e3SE5v$E+1)Ccl*BJbrv}zxvO9Yb8T12e8A$&{2qWaf*o~$smo# z0!=9R6Z_c8^P7&>e}D8(JNXB{+A?4{bHRhVgqp3$bP7=FnnQh<^ovJP2Kz*LdUG~{ zXl~d9u25v6Y_$Z!J(lNZpF}VT3{McIN|qB6c_k!dEXXLs#@pUL31rNJu+-=z%_j4i ze?s>XSEL$FWm`6XE~|Jk-+v;UxZC2y@`^PcvbltiiSWH>$Q^kLN#KwXn++y1iR_}^ zfH7667!?W#ionSxiR`21vA!pWCu|WlmMPL{Ox-p3tD$H*`*19Zw-PmrGvl`Kn+OU6?kcrUwVbsYe>nxBC%0WqqZnEAy%BXM+z^^IIT5eKLuIQcb?mv&9IQiZIOgk- zv>^2ytx~+j6jrV`+K2p|M8V`O%Hc}BNlhX8F*YPe19+_;$(1r~ch_Tf)97bI7$aaE zCWlp{ax`3GW)Y(d8*I3tgtSjBTJn51Am!Za2tJsqM_hv@Cnm(4+D%F)-;QvCF~S4x zOi!ml1x;8$+44t2?n_xPbFk2iculoh3!D0jf#Z&4qs20d$J=3|Z?PdZG&abEFrwj4 z(B&Xy$86+f$n3%fooXB>iZ*W?!qc*Yg0$y%29BeeQhhB>uF>77E4MIf{H(1F{AnE( z*xbO1(qb;Z+h|TkqSapBsYVMKuS#ERJoBKbQBDK{N-u9CFraWS-ov0N7sLAgu(@1h zd`b>;BI^e`2=v@lGG2_8p!!<{OXjElhJH5C@zYqVAbaANIgpAf7a=Pd8_40krlS`0VSA{UQ`#7efXc9DVO6|;E536cE$hGfH)9mdlNSeq>(#SgN< z49BsV8a?;Cae);aFS#GJ_xpt=R+T!% z8Xe;*b%jR8dsaxK`lQ2JjPSuovgOE~6GQEVL^6ouj!0QnBQ9ou$)58KMJ!{(Q*C>& zmg0N~F}3_%LmqHD$%3Q9*{w~^Rh8MFpa&rEz@A^NyPLI+z_#+IB5n~@z&k12T$3XG zUa;CERQoDw&S%6N){#4Twwnxy#Bn!_&J%F zdz0=^ZFO%Ib;lRA*hpT+In|b^aOLduGQ#%-QVft0GR?Xt1pKhV7;oHBvVckWg_bi zr;Ml4RO*Kcy+-2j%!QC_y4 z%w0AxM$Kz=r}3CtXQE<}ZK}+9#x(I-WD5}`>;+G=UhP-1>&QmWdT}R>W2tJ1wW&?f zO`f+6-Iv!y_z6!^szpf&rWJL(@fLZ~H5E^{TmfsBA=5tP62#WT4m<(6NtOeqx;b9( z^ds3*zlVT4o&bf_SbNGmLso!t<&I*}9cnCm0Nt(|&KXe><3h!n z1sG(GMIJWR9TGaY-9$w5n4_DvQI_{2aJMxrVf}KjUxxYbVVczLTam&Qg`5o7D5lG) zuqp3XFCHR%7Z$GZEwLCX=lyA)bb1Fh=Nbw4v?VG%t2Jm##iWzogPL=BtBG*r5=z5D zH>=4@jISS;bM(oYKab(LOtW2=*BQjC!*WtPg3>M3Jvwo;#Qp^=j{f!|vTPRX>`P->lqeb_X%Z=IKWTGV!HcGgCkPi3a z@yv0?x5ClR$z+p?x4JbKX>usX2N95?(XZh3dZ8Y2vAF`RtR&GuJF>ZWFKtTsVx?-D zGcVj{G|%)EBE~esVc7jCc<}Ph$TPz_fbkD=$SvM%DK)`i zxBElr0(-CPC&XBUj3r9$Or73(njtS|Dp;IMbTK8C@-XxT$Z^Qp^JEoX^FrNQ30rE+ z`PUlFleHS2wo)}Q97#ZRugw)hE)J4u%*^*|Y|LEgX6fUN{@6up0uPB|8^|nWA(34* zc7=9d&V+S3exB_mv1Ak5I*rDGWpNYU2veSJOR^-mtv4ZjTQf#seS1QYx@H@A?JhTd z*A}k1@g!z}irG}AY)R&i|CDiot!u*QdISp=cqk#1_P&7dt=(EE+zR?^YLx>*xAVV& znp?~15Dv))Sj``G*ZI^*e_eaqre}0Z`md4ioAtWcCf=}8bW3OoVG|juqbqr*lqFoP zfHNNNMA~jD_*L{n(T)<0_=|a8w-FLTQt$-S+{?!+1V;u4ju3(jg9VR4&7Fifg+~dQ zciA{DpalNSxDD9~+`iS;nbDptnW0U^fbo92ZT>82QUo`wD7hE_zG3a#+Sbs^7i#z4 znwdM6jW$HDU2^c3@{qjUxG!++!UP;0Iaa*o|Wh2Hb#76x^Jl`)_ zrL<}dkaFa7)PqR43XD-gE?nz#RD?E%OWM{Cb6-D?6}T3QK~-^AE1fJdsw|v}az?>o zan4E{s@Q#c{y(8c*wINO?IS1SZpWVS;benL(K4IzR50zvCm?3xXt7p3kUneU4^JFE z&WLO|`+Mkw-8zC(R_qvy2a1sh?5X@UtF4eKs*Gm-0fdcAinT+(eGAY9=#}se{$Ok{`}PkZhXTwAjU(oS zKnIE$wymyW7WYMg3Tg32hxe=)8A8xCatLN9K|%e+Jfw z37x@A^Q(tW(Z2SxG2)^Bg227Ko0k50@#^`zXAjM+P3?seVED$aH=E9w(i7Tr?hf>* zxn|R;5Jgi>jn}HU>On?a-!H(3`**4XH|$5zMcSRe7!SpxzeJXqtKe}XL^%_!RoH5d zcH1~8t4(Q3zk&&Uv=s8--?00}J8y&PN52|B?puD12DN`=P@NgYmBvg3$dmKAix!g9 zp8ECS-CHKbQ2pe1F!JjxCH!y3Xr?j!Tw;F3@6SYt(AjTQkW7Asrzx9{nXem@Adyi}5iT^(Aox1Vy8)GMb znF3eq1tV8$N-UO0!`rsMW(&v@l`hk+|I@z){{Q(b z$+2rth$kWI3*2`ca6H&`Zz*s&#)H72|L4QU@4|5ND}m~-)l{oJMUM*zoczJVz{~$< z-9KoL_5=WdvfEuh2L%Ko*?zK6?C7B2AAC(MSZ!hTA2~3!bB2eZyfqG<t(Mw;^^wlJboiL#?4g_hG!a51lo#wG1Qr2%CCB$Q$4iIL z+Wwl#joLNO-!OHy;XpNwM=4nfsbT>}3LK|=A4+cbMR-K9qITiShmSvP zv{XLMsIxE{rq!2WnD|Iq)oZdtjfR3h0tO?fxgeDIj*hx}$7^df?24<#!}Px&KD>O) zsheiMKT482bt$q~oWE=OZ@Mpa9(<|)y#Jt1GP5wU{7%fq@l3sAark#LRfCyIYt_5Y zTi#gNJX|n7#`MxqcM%<&hnEMv&pA&kA=Xr{FI6>l3z0OMqp_*swzZ>G+H+@D4gP{J zObv~^_$Q}_r=1GGz_Et5Kw)c3`;;W(-9 z(E1Rfg{l1q=b(Sq5oL|TAv7CyS}l3RUZvSIkEXPC;mmMt?PwJcK$S;+7`vW=c2MW4 zK`Cg0+ifcou|m#csYW=nwWvKlJA~zBLag1om-1`~b3^ac$+7(hXMibaZqx&lSm=X+ zFkB*<4YJ}#1N6u|4A9XUU?c*U%hSKbmNza~02I9!I(-f5g{L1+Cvc)&w$NCC4_X+l zxdgqK6zg0xzKuUG4WZ15r=3zeq`51B^Cho{Pz39WmEl?NRXs`!k*&Xknj=ry=Qj?m z3>{NTD99wZY4u~;(rG_;Ykt#k>3AMkUm%Ks6iS|gP{>li9YYBHU`MN&hA>NCQ@e5C z;kQFX!(My{5e*zq`k`_NR3sqDgAn&T*HT}J6^kq_T1+_WK8vQ2qjEJtcn}A}=_g8VB-ljWrKtt^p*6%@t_6AIwUhMFm8K3;yw@R%L1-9$SOdpDHa zyXTU#w7V}E{-da!l}m@(NwF_8KyPG$X}_I4dU6}n{(G0c=CseE(4Bn`pCxH`Up@@$ z917<^-M9fTZt9iXk8mjH=|TtB;N?a;lQ@v3keoXp0K>l}l!TOOD@^bSDeOV7yG)z2 z4GrduvshSjg8L7?LOoMSxP4_Z;?KDlA>?X8MJmAAuJzdA)-97d@SH!nN89(~f7zk^ zh#eY47k{zCvMB67xB{;$+P-61cQFN798R@uN;Xuh794_i-|ZM4yXEgx<4mt(wL2W+ zh4EWXK=kcDxD5A-w%y^TDQY48#eO#70)k!0N7ws!GB@11KB3Z{8-8`K*5Ssz`+y5> z7<#vKq<1#El)~%*C@`!b?XI#T|NDw$$ryWYo?cOlChhv76ya(Xm8=&*z zpvPdNBFR2(kEGawk1v*VDhn&Te_!&zXJtaCQ&|`ku-@?lx!8vQ7moneiD1)$1v0(1 zy_$kJz!UwfAt_pw{+J8`|#X-jm!E50dOi`_cu9)dJY>%1`Zp5K3PJMdTFM-IxHU#^H`9R8Ua) z?z3eE)>#e`RsDPvplhXepl=(JrQefwG3sDLLg zjuAi7g;c3pa;WD3AJpk*&_pfzGL{@(v$gYmLiW^?#(m$H93Hbiq0{dA5s>aY{#0;I z+h=+4cx~4|4Gof)%l{dA3!|y?(4e~~`H4Cy`s3Mtni&K8#48^ksDg5IGi|E(4M_3) z;^E^UA#-TZx~yFZ=&(AyLP}%9nY;;tUfWnW3^hMGK)MI$yJ)?fz^iFVCfjKTZfiho z#{n?TDFBAHiH&wn;_(`+)18{^t@aowoCshO zV(p0sjy22~Kaj_>_s?krcJdK0C=5{X0QY^ZpZ2P)aH^<-0a=CuYvF`WJ9O5!bY3DT z@A@%ijQGtAdV)GX4SIrYPg(L|?uyW)+dPyE0H#nK@x<(K>)O#eZBU0`2w@@C0o1(-ZvFAsNU?@?j=CR9M=nT02!2m1V89Z#awGISA^*W&;XEw8Es+&%=> zb*i*qbl9>Gsj7GJ^<_Yu(1HEyu#s!})$({nIaC=!UhUH-nlqfyfFljSAMv1-^#~Uu3KrZyl%y{Vp=(VWor4i%imr8^73uV*B+@yhVrBSV`**_ zm!iG-^_QHmHN5%a&1Y<0UVH(9PacBWV}Z&1sH;at*MUG*Em=LnFHR%R6Xbc7OW^H=SmUCz(vi(3WTqDIG&g|U zmUe-sm^^K9DK3YAWwY*{M^T2p@;)L4+FWgU}*^ab<`smHSDjuZ~&z zQl(Lom?=XXDK)eCxWForvJ1!d9b=$`Ay+@!jGG`2K#|Is3n`;{uk?1~k23-Vy|U4qFGiFnW9vN@f}kaW>Y=%ywq z`=hEMhhPA*?RO3WA-BVysp1!0gKn!6=L>mLIATu4!&zCr49!`-<760IXm&VH&FAIn z4E;WY(_zy*!PtdnvsjkXxh#%cnS6&xQA8-fla)%p5EN-U3JBoaZa`5umuN2H z)&cUI^KG#KDc-fZ#Jl?CkeuE3-w40$&$RGXwNZ@WcmaqyPD8FnzU@+FJQ9uuXw@7_ zgwM$s&7H*rmQB`Rh}_9SJAWbyu;SZTc7@LzsTL`DlL@Ng08uTr0j7hfYK~pK= zZ&-w55l}1V^b+9?L?Y#c6eLZa^;SckX+U5K!N-!}fW5_I*d{~HgCo$zlv{N<6fA}? z`+pd6kK8A7o=7H4_zfwop}1GhU>6 z(eB1m!H84z^EEO{yLTZV2*TrtWULqI_9%0Qg`!@_b6MFmcMPzQR3PH|pO@YZdHTQF z*!9Pqi7DV!IH)tNAzp=qjp=3yU^MFZ;A_(p^^Nd$?V&#Gza~^*M1)9dopwOmb=7#g zWPJlVF6mTjXuIj`nY-tQPwd?N)1AEHf zu3y(qd&mFWsy#gzp0@L?a1PM9|7s)qWfF|{Hlk9s`8@SJ-R>BN@lV$D!{Sjo?Xx$( z0DI#xTc7sq|GhA`u~r9L=2o>1`E6t*B^85$*~4Qai^DeUjg8^9Et5JRRQ%eAJpSa3 zLye((3Q{a`Do+qyS3;zlL@Em7 z)(xp)qm%Q_4*c$<4#N4tW2`&ZHr~`30;NDT&v_WELYf_6JA)OQa0=Cj^@T1B>x53L zef+{vb@m+_{@&1L5P?rE>9PFI*?(WUa+;@KG8tif5RSwLaX)Gp>YPe>1{A$Bi`=g}Vfs?O_2@sRmhtG!U^^ z;w;(^-v&p)38`k?{T<&%;_br`quaq(7~MouKWilgF6MURR5#zsYhQT>7{VvT+JXPO zh}*DSJsc$n9n=~Akhf4yOO_1YFI$+rx8SG&l2lt zSb-9i#bPlTHT4Rzrd$ixPl~l$AF;SL{`=aY2$R3cm{pwiw&HR%P=oYXGznjS9X#L( zoo?>lJ)#!e`08~-Zc5JvId3Jo^!8D4mse$j=(UFq>il!)ya}1C&J6D3DgqTFNvBgg zaA3G+%il|%`}x@$U=lcX{BUkSO9?nLjitm&K%q;Fr3u=au6C6)@B!-cr+WjuFq1mq zw|E}j_Z##qkQ>J4k-xkTo;R3BNO<08bxIW+U5mL^O9p*~sJBfbM9=$S{Ww|$TqKac zFe3dr`2O+g`RI+%MR;9w+BsyH;F@wPMK;Y@$gPg0oiy0j^e&#FK^G@=+SCc321h;@ z+o8Qt8y|>oz6o^^Khi}mUJ9GZQZYxfp^7yNtAvjD`hsL*Uy%}yB48S_w z9Qq2SGc9u)4|nNw+XZFkC@^8_oqX@j(8&p%cGq2Z8We-i-aJNJzXkR5q9f0`?Xp-b zWTxEdHm$xwOhi4UEZ|~#RWc|$(G1Z~-9K};UMFk(O*-^puq#P=AtIej_HHOdw0VY} zl5{VmXGHRK@UkO=4YUaq55<8i{%*O@li_W+71olYrP`r$UuUEP&HdYWwL9xJG!=AC zIy4nJvSf$SupzDxgDS!<$(UQ6+h9y4bdX@Q3qGYkzWxO5N4Jfi-k(2;#zZHlLoX6< z=bB+_yjHis_A#j#t|abu0Gv=k5vncVVYz)cj#PT&W9VhN_{ab|!x?uRi>T$CC}lDZ zSZhX)?4*x_y>UW^=-o$k!TKK`kLt~zfbPL0*bCi5mf&788?(EeM8<87m0S#bkwz2s z6Ywq_tpa|WX`?Eb_m1%Zs-J`&!n>){)1jS+w`7hp1bme#U%Dst1-&X5OscPZ65gdr zowoIa83@XV)^}*9+&P|AmmWknty9vW*S(zcSus3Lm}r}`Rr0ifnOTRt?jQ`|gihOk z%Nb{BPv452pgntVjJW>kp-yalkb#>Eh^jPinp9Z{1&DQ)2 zmup}9^!V`}`iyQ?+Dt&cl6QLZ$(v^vpIQ9=;=PL>UA%U&xp>8*WATE;?F%n2{Bq&3 zh0ibCvha?D%0hhM@`XJMTjq!JPcJ<(|M2{0=Wkm2`TYK+o9FZM!TG)Or_V3Xy*T&O z+}Gz0E*~@ZzPUHfDRcZBHFwI~-0bgXf3Wnn`a0h*H{nl}c(fT=tb?lL)(DJXBPG9@n z+6UL(vQ}6stcBM0uAM$uTUvd7>7~`5tbT3fxYbWCKfe0j)&8oq>RC=M+m_E=K4$5q zrJpZ7vUE4f>^TlL%qy>3uK#20H0vs6lpYZe#64I{;9POidgCa-*;PzH?a_k0@2jxs zWQ_WSzWE+NbFZHwbV`VPy=HZIawl9q+LgPC4mhUO{kCc+)=zpWSqD1rxr&V6M&`}A zk~NkqQ~li8A2iyVX!- z7Vs2$qEpSE`+y-&#To?Z>F3>0b0MCU%y%GpPEVNAO6qwiB-fSmSW7_QVx>D)Q@vw0pO21{uADnXk`|T^b7WuaQj`mw=Uv%$txHNl zhq>mkt9d(q3JQ^TWmSwLNt4>CI?Ir{V%fWJ+{^&7%v@OkQwSg5lg&`8NF)m<-+(%l zrRpux&p>dvS8j-r!tNg32)MIE!mqH_L>#>K_)kX$442Y| zvtfzw^rJv}(aWBQ3?43}*e?_9bipdL>fUHQzxTTcMk%rwF6Cpjaw8Cg1LPTd3>a^` zpkQz~5K{v=;Y@Eu=RlXj2@IZdl8$JmjmNO`r6?HQr7*iX5RTTWBg^c zkte(r6Bf6)q27AtL0;x+-kTfJ1Giio$nr(QGFLkm^&uEW9iE&Fo zE@OqBgKIFyB8!bH6)X42L^@s}n=QL1OYKaf_Nhp+i&rtJ-s{IZd7rZH%Z5A*mDVBQ zEZu86y+E+Ddk)#CT`8Y0NQN!>e7jqtlJW_N5C?dSWV4jUd~^cRDNXp9K?IZRH+#4@ z8WCfyM&1+8%zOsticw*F#(E<1)c`>hbM>;49RRUXmXZx1hpS1( z%n69C_vOT5>XOaqzC^1WjPv=ZQssJ%EB!B#EU@Aecm(RY_dV zSIcR|jODQDj~eotkHYe*Hw%PZP9jHM07l!vMX>%P%Ay=7`h^TU za$Egwq}{1zxUU;>TO1qUVVm7vb(^zUGkF#=I=kYX22<-2pY|b(CObOmAO9!x;~-dD4<; z`J*uu_wtyvCixqb4F= ziukCsA5Z4+dE_KIDEbKbLxS&w!6N*oC^c81RC{kOEk7c>w6R~ufuc<=RL1d{ZW4S0Na|x^v z;aXXHj#H|I^_>PztlK8DEo+uE*SnrtX8O~{HlxfrDwxzU(e;*8?bp&|(zw8^v@xzx zZB+gJY{Q+MHa^B>#;tgrZj!IEL@1xx`)i{)W9~zwW?0B{stqMqTyPq4I@lv(zLekZ zj<|g_3yoZXt`b+Q4Tx^OM8>`F`B12tQ_%$_N2P%Iqj{@fYda|$c8&p5vf5iX%N8Mv zC>^8Rio$!HI^#TF7JI)U6bHVSk>^ob5vES}|+O#WPhuZ*BHtIDL+Y+yF`4$QFfg!%snA zmtNpo!=8O}T<1Z3X6IYMxZ^x>xK-k2?j!w5-f4S+y<(ezV5bj|B9>t`=90&f28o-yKs zpN9iDbdfz`u?Z>mIvJ>RiMZkyiv1fmhI`g0WXNa_fi@>;osIGN`^GQ8%|axb4Umw* zhAHQ9n$D3Sf7TsJc_F6gRuJy2E-I3 zJDjiU=JGCt_nv!U@XHQeO0hCNo@ zE(^Ac`{3bDsK8Qrrx9uMzoNww zv<8+EothlYr9?LuO@m7ke8XkBL>bnrlfOCKwtAH6#^r-&zmi^~^}jiuo;N>?%sHuN}KwbYY$3L+WGDAQ-d)X8L?adi0&F#pUNq$9xT^WT@JDa z49n<&M*(p{2er@c0h9IJ5U%$8qvL6{^)cuonAtcOM`UK3WHv!2Ea@>YvmLF{p8Nds z2A%r-kBxhH=sS8E0z4Q&pI9R&8aUAtNvusp-9@zoM84>rKmGvpa6+X$aPL*SHK z^2X+`=`Ji&KgxIrlg#%Mz-r=b7)ws?L0EDob&x*;OU`G*?>S-PClBfud#cuy6D!G3 zWiZ=FWd-oN>BczEL-4~BI*4rU8?J{t9s(CuZfWYuO=TeZS-xV~v3!9}-?O$K2zftB%w9Zu=IqMMi!=W@^U%zv)(!zf z&l_hlGs4;jW?rG_xqtoa>FcLIvHtjUZ(5r6P7~87P0y}xnR;gG2P1Nx>(;ANa(n8^ zwftIe%~ETPz9F(Hr$_`QVN9%`I@18~k1ziJxE5-2>|bt8K~f^nbWWk|lFUWI87v=a zwFB0Csl}$^x1pcqqM{j>id3X16*7X~yp1&EV4uK~Nw<;~YAL!!Sk6OoXCr7PMR&`UJ|(I2atl1G6veAX}_TZOO!wuoL+dnJeIX|JP_v(+-kWB9fUh<1R;f z9&HfhfxRw4NQ4Jcin`@&rb#Sj5RRQnDZu5^Zh2}gKatp~p zWEnQ0ac8IDDYZ(e!qjg@R$19bSM9N$uiebRPQQx(pWb@F%2r_D!Mx6N$r`kJ`~A$0 zKOq=vK8)e26pDHw3)hdspXP&vlnghWUD{N-~+-^Znh$!nBR?EhQbHVBE3-7aw3`CAH(&fc;)2o&NjK1~-fLSmpW z)9;M-e6Wi3v&~A%LHM9T!ZbR=%Vr-N!b+(a$p_orc2C{$XQMq^_TklPDZ%#~qT0!w z`9@t1<8LPFaO4E0BgN}Z6_Vylj2G98w~AQKoTi;hB~guI+mW#c0v|IR6o^o~vYGbA zSc-lK{Qy%3&h>hni@4Qn$6n9bx@h(=nM%PK?ov@8qq9|uwwsOSimONxgQOz%eaS@L zPHaJ^WSQ~$eYk3}_nI*vKxw8o8#lmEW#G<^U|h%VP|6O4M8Q!qLq;8W*s356;;gk)*}MCTqn@5NVQ3Qzb{z!@3GJEFEZL7lu)DszH0Pdfe>_#|5Zw zlb^XA%@YVUh-BQ!RHdod%JDPMT@7Ta8qMKWyx;_O=vvuK?f3>7HYiBYX*QLb%iDK* zaPqtr13hE$6PV~FYf7Tm2ol>bGvqNiZd=qwrc0PH&PMD;1XMC*@yB`{lO$Tfv7Etq z6agiZJ(a~czc7$`1ny{ein#F>kRB-?8f9$UMZYuTxKpE~Ud1IOAiL&SG6n+U|Ah}uBG zZ$%2CUkPA+ccnpvOJS~3bbQi~SLy^oSb3O z@|-)2v8G0nO@_NfUOMNCh8zgEh;BcW$oYcdsy)ARy#5emLBR4E8!yLrvgosHemA-R z&-KGZ!fc|VWGL2_WC6vG%6N{KAowrAeTvSS6SyS#iI^ET3vV{s$E*z^ zZ8tZ=s?>rYeBbqk+*|LGu1r1=DkLopK{h!khi$OE>}(ltkDEi4LD~TlAFru7{;m&do$ZGwF&v;uNm?n8N*@Q zocF0bXST_f+fn~b95`RH$)J^Wg^6-@=i7|trbr$m=my3SwXP#dp82VfTpIKnLIgb1 zjW!wXr#cR4K^oymeKo~4b1lr$ZHkGQ44=w7A#-F-IBB1&t*CmMU5CMv%?;iFwvH` zI_Ze)@ZpgUp&=v8z5v|{t+b>}Ea~I%@YmK8+7rozlg^Vl;PJ<)PEWOa>0qtMgpExY z9hNys5jshhGk^p*~q@p^cYq@nXf3rorYE zFy0nx$_|gc9mw)Kzo z@4^V&WT9V`qBPk~tEFzaeB&)o7zyBTAfNxstoE7j4o`us?Snx$-k|U>F;{`G-I`Tw zdVx4G3Ixfcyxwbn0s&_eItXF=DV)UjEFXVk@6WRvzx~M&)i5%!w>>pHMGrlTz*)?| zZd+Tu9PLpViubso=IO)VAMRckkCtk8)plOGvG)hV#ZhDvB$!Oa!?SV5kB0H7t!^ex=7ISuP=oYMlyCnh*)>1i6KeN z^E{U*RMo9{o(GVoK@=5vgdqn75ky2ViHW{PA#q@EK;R(}6$E4u5eGyfqN!>ge*4zB zT}fSLL4!mufenXGymQ^%rq%;5ow5j)AMO?zSTHp5#v<#`yMrH}cbK*H z-n{8k?&Dw$e5xK)#&wCPK}TA+giu2ztRcN7bpHZjE?{A)OK|J@~x97*Euz~ z@l(#@VA0_U7w{%F!cGw2clS?s>(2camf3+D!{~{>oWX2(i+UDC!<@0i171G?fDgie z*OReo0U)gja1H++YOmQY6^hSD44=C%I{AlHV#s{Heib_Q+9~CSfNCuI{i(Z_@pQ+Z z?&{T9G)YU&jQZkrV^vIi|E1slv;ZCc!ztfHz?Dv!wf=@bV_^Re=o03dAMhZsl0N>& zQ{$`W?t%m>Zn^G5ZYaXZlZJF zIyJFP(l_37c5NNFh6ccZfwx$|fTmp(NcwA*45aj{n3NfiL;xZq!7_uK_c>c{p8n*H z*3t6@G6FR7w^NG&7HBL!IyzFGci!-eLst&`dH#*84sT_380=e|4wp6Bnv^6}VM3d7 z>Qf|%E;t3@X#HgL(1Ep+t*7(5!8H8#vRlGvSLY0+>uN9*sN*!4(#i>AAgh63Ua2q{ zOQSoNwO66s+hCOJZ$ifooS1AKz2Xk2tDye-DKMRJOJaD7xu?a+Knfs1NUICd^)qe} zl$HQE6nhih|MydqtLJV+CqI4B1!(if3S;PkcRo~aZ+hnx+Tb~E0=XsKjD3x==FV1R z0l!~a3529!r27X9L_ZY~+ADCijTThf04N*TKTr850!hGD$+!Wi22dgZ>^P9XP^K0|3izlF921C$@rU!6f4@AZIncK#?CNj zUnI;l_x&e4AJqQ$sU^!lK5uO6XiV_&ZW6=mgX0U%XN^s20Dytx&kx6+pbG%guhp!w ze{-Zgr?R8XlC^7E8y2@0aR+MmLbVVmBWa2e4CysXar_C~2 zEEAp?mdfjgPMp}$4P;-3o?g)IW>a%N@%MrDM%F5S5gdlt%x}z;inU4rLWkw0oJT|9 z&050N={>V1Z+|y*=hONwfX#Yz$6&h)Cei(YEo_)BTVMl+=@R9NNkKybRmhVB%;GA^ zo;Q_(&?9lzI(MQDqBk}f* z|5=Z&7<%h|eDxa|YwwR6P822w*TU@IBk}gReXgAobp@v%P->j33Mh0}Qb--xd)i ziAYSH4N@g@hK?f9Dwq%+6|&{OzYpEFs@*L-%JF)9H7F-Ih{7tSG)1}3OYQ{qNWsWv2Irc4BVa~*swkBsESkAo+% z_KS7sto40DDmSz@ZUC3vB`|#0WoHW64N_k*Au_6KW`_w~wxPXqte*&8mB-o28WZTP z4Sn2}Z^EnlVvrB7ZhcWxm(nJ$s+2b+iq>=(nKyxaJTjX8#9!p-(M`RNJ*y3ANdWA` z7EsyOy~!70t-1)OF>9;}tBlB+M3=4rMm#cl_#_|-03OC_blrEA7ohQf+`9G*b?&Te zZy3WbDFb_1STa&UV-Njw?}p>>cH%Aw34_K|pmSgVXjo+GMkR<+n_-gpWVqk1gDdI& zuYEp*JX_n`VSatFJ+v)%+}*n)k^Z{hjJ6X>S*nu1*-76qwz+yy+tFcd2Q4k#Uf)7PBQ!2M3%Wbu^%>5T01+%A;~ z&p?ToyKigy!S6v?rcY0{SFR4zkn#)YZ*CFX58Q*&&wUj`vxS9{6oxw`-?%q9IOPb-hxXODP4)bN5kD`EDk zDXWWt%42c3U#7Wx)sfxp@iiaP1>9jZJrdr!X#j0Kr@j9}t`@a(+IKBeN}-l0Z7(^@ zMk55jW+;4X+rOthKF)80cfpz%cmG*`ZkxUTu%~<+u=8SYf8Iir=ZLszILp?1%g2v{CGGF!I?G?n`KTC{}hTe$=UD;HdtY%v$S4;ZR8 zS&1-J%4LJmV=9XY_8zkWT_9?+NS%Fc=uYb9z34X48OQJ-`k@%_RctXAyjLY$DG1n> zsue=YW~#aJNz8Fn(q1vv--ZO2Yr$<>II<39Bzf8#=a!1$jC2#Cr7hn-45RI$8T4$oBjIxBZ9C1Kxmh!4`MH;Rd!` z#tz0w$kg@Pg>(~8Sy?;EW{FH9qtBRRC9fX~(+aodAGbH4<>${13Roz%uy?6AaL032 z_7if7a7fe^aaa*i%eptkRp?U}w3m(Z+t9N147kRxf@F-}UC=ioLwiAL>GUDCu#XxW zJzP2341uebFd&#kEA=QIktqsB#N6M82qfv|-AuGzrrLW1to0<;v!3u50>vu$y@6R{Aw zQ4V*UekwY!;t8n)Mbq)&PVsC z+g)TZPLH0{fOxQ$N+2FyOWs<}9ivV4g0iYm+NF#PE!4uP+D}CXl-pROl=eDwskZNX zZ_@!o7(W&+7~gT!X`dlRC?z@}_~f8}Dh zN2Cp~Hemn@y#XxhjP3^2(3Mq2eORRPGU)3D_IT|lBf-62-*LaOjZ>hw&%MwD(!sJ} zA%pR72dLzj79g?J76O4ytq-h`5}uHuY3B?55QTS5cY^Vzxmyu;sNO!8=#NusQ*g`C<3$ zkaXGp-h-#?(w?*mbpu>5+NvjCsFXuyH`6`Bwn)TaggUcSBEKIhybC+t*p>gc23_Z! z9i;BM`i>8;D;8N8Z&6Gwsq>IUot~72Z0Z=~Q{NYWndFmusnl!HrjPYTV=0V=;vy_| z{WMEmrDmm+_9O)b!c2uy99?!1%p{Fvf#?dk;u9bwj4z8Z zj86c$L*vj50YdW0=)`%e;cnP^Z5?{_6SM0JmIK^0!_$XO;|oK* zWmS$+S1c+3sP=p86hij)&ZRsmTK2D`uC>b1HVHOKrVp{u&Pu%dssheDA=73wF^4^t z(#FtRKKMR!KN%ICy#^*4a_3uSe|xWB4ZfBBW8T=B(Y+&{;q3fh4qZR*9|MT^`R-$E zWa1vy#D93OXX1CsggSfyW5`%|r?Bii zabV}2K0E~M7Ia6&8fnrd!j<{E2VhnZcXBC@%!0D+ZQT%T101S<`Y?d9a&~;7 zIOd1_jub}nm6AHA7NKVu_;Vf^HoTM=ZAS5tmNCNe2u~jdG+fRk4rP-y4kAK?({w3h zuxlVyJ`P{RC!>d-J7sOHPPCnZaepFi@BnXpi9yqG>?p?-#R*Z@Qt6XYyC3ahJzAdU|D!v3Za7lv_$fq)3tlnfYV{mV9&TyIHUVESJn$K_y@XogVnp{Ob{%z-O^m&_M5z z!_$yi?QzyWM0;ABAN~9l0(5rsjEBx3%MvU@+`CCwQcw(;&Sj{I-4~?_906PyDrvW4o@I3|2E+Xln7|y zv8J_y+d=`xPCtRJy}S)Lw{x{3!OylpmipR9692D94?7A6uV@b~&(DLfzOAE)kz<1V z@G}cn51z~3Bz;{I=i$Y$Ghh>^#ODbBT1_P(4yfHG*44J<9yqi2d zz^26`qlZs?@=PmuWc_I>u&>V!{>LQJI) z{eZ`hi1)!}^78fVC9CG_f(Z8?VB_q1yKcIny?l+<4Yk76q(2!3_@-FX@6`h;oW6$V z`RNa8#|{i@YdyM4FKt#+;J4L98k z4x-y(&jf!SZArQttP?ii0#CKelQz2osjlKqN(mY~5~m$!bN7Zki6ug0`{VYp|L7=U zchc1?$fj-hrg>+;2o#5JLhs*k^O`Bo*uJryV@sF(Yso819$RvB$rqPQFG(!1FOetXqQ6og1tRG#l_|3(?T>L#K^m^Um>f(zR>lYJ?*De-}{AuLG z$ahEX9Qo`>VZ=Y87}-6td{Jl7?;t|_+l#)m=t?N>>R5ChAZ+%^yLMxO{^xVs4=iXs z^ttVyUclaPPvA&thKO726sfX#qvljrRtkC#bYo&5v^Ei^lX_z)B@0@!vXBFZx-sfp zF-Va$o4BSkIqbINy63q5IfI)dD2j1=tm>R8wF5_VGU}uil4XOTunV$0g~8woNjE-- zQTwGXt#K-50S}{9q)KQ>j;>Lg^Q0uGG=w6$G&A-v$6i*hld@dOnh=((RVF6EAySOW znvM`Yr@2hfHjgBqUeAf6l16=`Rcf~|H8%xSl_p!5k4l&}lM+oz+;p328O>CB7mnNn zz!X!S4oPfwUp5m;2xDt-)<2_6$J1o3F4WYO9!Jm|**r^^1Snd@I6RHG+i$2d6F1`@ zP{geeW2&`RB_t_LLwK};qlb-ZDk!h$O73bi6^SkW0!yD#GV+E}Nmb;IptuT!3H3oy z6#s#|rY+GHiJAyo<8E7Bv~3&@ki6QYq2Rc@Y9W*21S#Ljb*~sJq^cTpFsgvd8i_CD zepenYX9!&_TdGMEn!Glon&kSs=`!V*^82C^r8*V`IKx9+14S3eQk>R1Qw^!8m{u>x zbXnC^p^20v#+cj=D6YN|$I>yfs=-A%B{fmVl_MRhxZ$r{|FA+yMYBZ>qxaRTs?c_B zfMgnfh|&~@sL)wVPn8VP<>%o)kk%o=R&GybUGYZ2kV}lN=IF7!fuidXiA-4n9Kxt= zcQ^EukvcrKKtM!B${9u--Jr(9BemwzWQg*sAr3xOGG2fqIvJ^wF+$WLsV>zOOc06y z{j%GA3K}F8LnsswLT0l#nI6QsY>cF2Oi<>q)M75$A|Y~uQ#XmnKvUwP)I$0r>U>4K z5=SO75(@yZ6>JVV7?MK$U+H!)mPR6R1)ahaRPbxcH7e=uY5YmzOa_AH)NaF6fl@1D zPI5VpWMsraK*fpWbQQOrOu16BVVu*)h&`DgQ7I@{@2w*fi41&^W8`u+$#kQxDOha= zha$c6AV=5hGlaUB)`$`*k3JM%@EeYrBlh5Y2}VRk1C+%Si4@&X zPq`eid>#J*ol8_8(oQE2tCclSEjvygX6Q62r{a`bYpT`bNl$nq4gh87RKZ0=bkcM( zU?>QEP$ZM%6ST!Bsoy-6)CJP<21)HZ7f%?JIjXA*P@F>TO*=#6IQL<+s@WtcA{-JG z0|3pE-0?$>kJ6;4gh`Jh4dMF=GPVfUfMsa8!bJF#vXtL%52YA;7I&xengF5j7aK7m zVkIopIa5;bt;UD8FPRV55I!B8D;LoyK~S zPRWRMR3jRA z=xEfMi2h!V5s^+3gd`aifsfQvq_?lZbfRD*>7ZPik(XGU<;XlvNr)UoSEt+#!bH2> zGM8jGF22bSey2w4NNdzS#^h3kH{OR6dl|y($r5DU+@JvNHRlR1-^cN{)^jAIv#5&6 zFyt3R&&HwijIc&DX~GVtS(jl7!C z)uMS?pEjl0Yv(HT{X5|n)Zc`TjYk0U>A-iP%G_6bra{(7wEr%6bJ?d4uY&gxHu5H; z6`_tWvIS3@QlHA)y>_lb*WU#W5q=xg`&)SS!EZja8ohm2AKMjoW40@MY^8O%)JSM6 zDzjfi*u+vP7B+l0Jmq+8NWQZJh*EdYItRMXjX!)Hb6nBmm`}^S1}ft&F!F59R5o=l zwNTZppNtOt9a8%qDuBD`;5~gZe)k)|5yq3PfPih7>6k%RAPC6OQWGAvCoIAD_=Wev zJA>DTjwQc~z3UJKfg0Oav(W-M8_x_qA6n z>1#qyKfH314NsXsqHoTIM0CI1eF%R$Tm1k}k{wQyBIP0-H0^@ad zfva~=B4qqCOm?%2-!2sm1%53`jHu%Ae*kAxY@FOSw7HnEV7Ns;)+?H%KMGCFqI z3m(vqJ!8&!i$^n(E1|MO#DRp7TF!uyl+(fIkl8${-x_32dR z@vgJ&@Y>#PVlZk%e#Ss6yisk=B~4+r#~%mBaDNk$|MUTfCV%1B2DIskK4JGiiKl0x zH$6^`E)*cWd1;~;U`o-12y?yeNmx?6HWaK7kk+gH12~4C>|?w9DUcQBXbs4U$Dpc* zD%b$-=uD^p*HFW8z2qs7wZ94Kef+)~bh8#c^i*G0Gm1zjsd871zKCBfM!$Xz zIP%Eo*sH$*m*hJ$YmwnMJ&xZ3M^@%}aAY~A4{rgE*vnbfyUHF?=T*eg0JzjJM9@9Y z14kYi9_&!Eb@Q$14NzsZZ$sJtB3=e8PBh+7d@*~ukVsmM$yBybfuQnBUj%zwKb4Ik zXK@4G-hfWN*pram09L#N{9wytaiZ~-*A&;1X|j+As8ktYJrhT!m%x3&qk_-WKI=1m zY1SS1%FFG^W%hZa%8}CWokKq#XfK!)*vHWH|NdoF3!dsby5T2>Sr}q0xlCzu<%zT* zB&^mg0m4I}#B1#xOL=4@N2wj?tplC)=(n$(ITip{bZ1E3(M;49;=k9R*MR~rK%=abEK_d^sPSwt9~jv zaO3iBJj7bG^)Iumx}vGy1ksGshj#%#9F?llk``CaXj2GN8n;11ps6=uI(Sqh_^y2y z5+?q+5=yxCFx+6oUKQ%~P*x)@_6AuAS8Wy&Lhv@9Hd-lp{Qx#& z&kpp|w!gz3_*QQZ{2TVU9zGY?<8+lk)uMshup<&OWt>KhC5onB1v59Fj84Xf3@yR$ z+Iqoi_V8agUomfN$>^Gq?ei7G*A58>zSw&Bj-`9%Z-NvPh!DEw>~6tUH)GQI0iDil z$u=`~9~DAJhdQe_fwk>S$$7mH;e2k^QT1HA&zig9cm@oOTfjsPfoKr@t_@@$Tpwzd zS~8ZVB@Jdyn*D`U=<>g}m#&_>3nKp7B+&lX)~-c={riVn95wHN#gQ&nf*HaQt{75j zT5AqTG4rMWfa@!-4NzJBwEO;_e(eSU`pdhl#Zl!312LOPV5j^UKiEWLP&6@~>2lZx zpwANN879~{dZR18a|diC+myr{?ctliw4(KjJEBxzOIYhXKv;*6F!Bu8XemTPuMAOz;L7Jf+I z)^zgs5cW9yetX$UC^MUZ3Y0>NN)GiNA&G^A`ijAuplILz_uH$%x%R$kUuT-dOBu)lhdf2q8O&-%pJcgDUvcJ)|h%sqDD*p9I!OWs}b+a*6)a%9OZORnJT ztXr3ijJ`Aa!sw%;hemH2{Ulm9{gI85iN*6q{y6gV$OAots=Q}VeF8&nEJ_a_T;y7G z!J-|D#)khn{L=7GhL7+|7CnQ_sSzd-^bjhYETPoc6NXyI_j>nj7>SC^VX~UZ5v7t} zUUG@oH#s_;s}o?( zDBve1aAs))pz^@JHB~c-l7@04NT2uH?%OjGv8G9DNomLiq(XlLN=arNHVQ@A^j!2=byiY174XV5b$_H@rOohW)16lLA z-BJhu&;-d97X^)z9LC1%NXVj2k%7E3YSBl<4Zmpr|8o6BWRcc7vQss&UtCp}m~CSGT~N6z z8>R{_yT~Y3GR)qmaQ~psD52B&BrW%6$_2BC{0v9eG$0E*5Yx%PlM+%#HsL(@NKjEV zQF5P=*5qv!SC}w9!}S*{Q#9>h6cLM=uzHeH@(KLAfxIW}_e4x$_$x(HwDu<4KM>G4 z;iean(sI4M(v(WC;ponaigq_>Lz$35TC{Ws=Xpm0I;m7IGrCkdS3GBvIF8`%{(?ma zIHq+Pa3|sr^tkvEjy{#lDge--Xb?&h9+xP%!^bs*RTfGSi@1|QvrC+l?!k%P5x+SF zn7!JJ5I`Rc1#yDH7O03{Z&Q$wqC+CAt6gDf+Hf_;N2IS%4U0n?ZK~@keR@3x9Etb| zjf2caY*S^MBx?j@IP1UhANVrxW+dF{v|1?9hHAv1o1-(82B8lDWNoEcv*e{0;spPQ z&k-w;WPys7ioR4NCEn-9VLHp;G?)UMJ*;(B#WD*6@f?yY+Qqy;JgT9Xh3X-e;VlcV$C z&^#KBO(7rFYqJ@3Es;;9#G(PNdu$4@OG<`Huq;w0<@)5QnkN3SF3hPM`ulm4P9 zm>y)85R~kSc!X4d@a3IFD8yTn*n*STgd1^3ODV{5ii&k!P0rj5saN73a7QF&0#eV5 zP`Ip|tI{LfXu3m{4B<6JJSKHECW{bjI$Zw%0r7d-hPxOrRE3$K@_ml(QAVd|ncNvr zNNviXhMf2|9tO871kuKnT^RDJ6VlCZbKM`g`;oJvYDu1mzFgk2>SDppgF z+FdkJR&I&9q~;t==G0nW*5WWb5`%AHahzo_?5ISQk}HzIR9fQx2j=h0d&RWQ?jiFe z84pIcand`LX%{6kIH2xpGUAA)$JTe*Ohq6hFhT*KcCoCKrx;!GJZ{t+6%`bVR@8Gf zO-MplrArp$-*x!)Y09FO#~D)=~*Q(VexL-xDQ0gFNMm+M;(j&%l3zjOxC>q|T9yU~VFgM*8P;a!gL z6&m8J`)}6WJ2M*yv$nN;VP`fqzxzaS40krNA$?H7gbV32C9G9B8K^K4q1zOy_!+cD z0AJ1{qdPb6CD7ZqUB0w+t)PR$0_h$P-t~9(YW&7PXYQ-!qDVurbE(Rg38q3-3xqKZcc4fNkBkFz7BA}f1k02$Ls?0g91Tra<@VZv_#YO+3k|3EE6N^wDVMO3s-{Nfs4`Hj9loANg}A=k%&k{OI~u{k zSAM+)t$F$e5t}}r?Ij=c6h(|4+xS8CY2Eqsga0Ey-#M$(pQcpl-Pbc}xCukZw%3sX zM`8`KuOWRE3ab~!J8U%99IdDz8szTkXyb#Og@T zBF=cn%+>W^Y-9rGQ=uKJJL41VYb2n8kQs1(0QX#nngGqs3c0v$>9}Icv{0*fGH1##Vp92DemAQ3MnveN>drr&T^z z9L2T)M;;kX?>)K$y?o%i8_`SKI$UBfy9XWI0Sv(;bOA8L_A#x_7a@rXomARnI#N{z zBhwCG$Rk7A{)XM?idB!UMn`vaxMb$;ruNKahs_!}d_JsdYzIr|t3n;=j+JzBceGMV zpqF=bR-FZhyhM0LXpgeL8wCAN!T8^E9i%Gm>~NXJckJqHVU4Wkfwb7%B&}IBaZ(*% z%Jrhv9F;*D^DdBwsvgnD z$*!d6(cPV8!NYVxiRjZp*bUDR7%~zqD z_P}P$YlDcqYrxDJ{Ofx3?w-C`Uwtl25`4C#_t`12JQycSN=6)NB$O@##j>3o=aW%T z^vDJ1;d5s{xjR9>|7d6HGRT!@{X4iXjd&cO2}GS$r;l}T5Q(w=E8%;w{^v3wpM+p4#(-U13?x-jG$;XXJTkJs z`w-j|xYFpWQA5%<#NFb z2VV?}RNmue7W->4Iu?b?7j5v>ROp`bIy=WdK%E|ZZZFz!{_OJUPRITWKr~Q$7VsCV zJ*9|;B7~`ElG>Btr?ZIAr5C^#^T?1U>47gk^u#*!w+njW?Sm`VioKl;>;&)YO|VOm zZFpQIn@AqbX?^iDGVg^6?x&)YmA_3MRNS!^J-qh}c9YAlpEq*<@M{al24xGvV=BS* zqb-5s>IQZJnL%hg=LLWWby87pty*x|Y*c~jn(xr{N?2IDHWVDZuImQ^$(4PoG_JTM%-%|b5I<&>u$5Ckljxb*=crYH!q{f)k5#^H4Ziy&}bRvc>HvvZ;8J+z4 zRUFRm-%NcvwZejzBnuvlIV!CMZ&~RuRRRFF#RM5-v495jQ;{ICznj~)9=*8YJ{@{1 z^3Po;zx?~-X#docUqLThJ6q1WN-}+zMG(emMB#?Q5~E0)l@NuLT0oydKa_)IC(zsfy6imk$|~@OpJw}{rn6ycWIi*mF3^Gjbiq4I&RfEoGXFmM{OBX2_l@2# z+8hmynnvl-4Wk2#-yGQ54I2I0eAD7DEUpgxZ1E=sz9_hOv1akPi&xKoWaNDS8GgDi zeDs`=6^mvTy|(CyMgKj2!=f+Ge|}(O(We(>7kL)#TeNf0(&1CXuMAH;HhgsWmfn9I0tW+~2@_LRod5 zQg{M7Lp3ka+GRc)rrZ7HFeOqd96Gy>DC(2$a~3Q@2af$=?Nlx3v8L&;QIWI6i@CBx z;`$L510j!^iu;z-MFC?uMJvRn;|pY6+`u)pm_9Ee%TT#Y zT`NS2inM_lu+O`Tedd1!J#=SuaH>D8!A*KTi+{^((TX)8N03nT#SFqOY0jn zn686KmtN{p#T_5PbXyIas*K5((PmU)g(_}$V>SVuRxON6rHn`7%UNQ!e=c#%6SA?@ z+<$13DVC{)+OmK+u%UI~~8y3C|~=}eQ3Zoy%AwRoNpQw%c| zaLASZpsy6Z;79m(2^BSovlU%~SS?zJsWg7GvYgI^Wy-xq+&dak3Mo$s7O}~cD*9sU|Ajv{%EU9J z5G;U{H4b$rPEN}9VT8;Y6H!#CO3-7YZP^NAX7=Ow%NpZt zgh{hlUT5kVv%WxlM20_@v8xG)k5pU9BBdo{JFQqws5}6X^xj6Z=q}`xCR&JNiE9j@ zc9CL(62jPW)_`P+knh8P5UyE06xe}fV6-k#U=7Z2^f*9$C}bj&!tU{w3Zh+U{JUX` zizW+sYe3O#c%tf&&vV^rLPQ&NU4TZ3siAahQnU)nGZ6wM zEJCk2KxyixbWtVClYhICuNa{^x34ueHYe79Ez8T~Sk4}*_G#=Z_4TC@DlMzuXfa(g11-~S*`XuJ#k7RUY!&hv`lhsC6Nes$3 zddQ|Fpdz{kYL_XhW^(eQn7vSa+Blv9gTV`vT_Uv#XRuwrP%7lKMlW3s0ft~BG8f+{X2H1W{d ztsL2HcgDRAiLxGzR)vXi4AflnnCo&A)?c0Jjc9Det6YCY3SbGqx>aO? zZd*XMds$gYUi=)8QpLKRWz338uAi5p;hUXs+`(FNW`1haP(LLV2OkUG2QUx z({Aw^?nJXW)oM~A31+>NDoWYJ+it}Nm$gbX5@oMb>rNRWscqa1#~KGNiIP~Jq(nZ& zl!`oGjM-bG#saMr+wyL$QEqWa*5G83npF;ayUbXti;Jq7lw!mfrMzYp#j>=VqV1Zn zMCY)J=ih?)SnA;#6)0#t_8KM2WMYCQrkfiT2dNKd7>^==wYpsOlti>MLjF6nL;DjJzg{WKsi0N zh{G-o8?_SZ{1x-&%|FNn{oF9W8}D#V&8)6CiI~|+Wt~aAHI#JTj>ClA^A_wDxX0+x z5Wp$@aOl~A_gh;wKeboD8VGFgKEeh9r8%uB(RPWH%u`@!)6#%W0q-Lo86A7E2nBV* z|5}6IzNq)2?*`$00-lFp60`zGYyqM*WP_o}xFv2U>)N0OnLp9lxs*o*$Tuh0=HGp1 z0zLGJzW3(uFYatO>ngw%0E99QSHL1u6-l~b5@#veOgofh*9MNRvxAq1*M?<; z+dEmovN)5MDhWf5kc5N&3IPvQs}nwrM@A0^zNc^fud@S%?Dd(n-%bfrB{~_`nFx3+ zO5E@lJTiVPUVrn0>ssG*cg%wEuqsldlp%Wo3Qou~&Nv$Oc6N^SQ_-@se?Hj-A!#+e z9jjnjTB(E((u7Q{3|rC_LYGF*`@m?#C!=Y#Vn-KurDgGV_6s&>rw`kQKXP@fo3Lzg z0l;3LIhcLxm&{P0l%P_Ig3<1b7Lh#&ld0^d0u06BNi=@L18dPwf;}V5 zRA&Ia5rX$PShra8OKgI3kUn>jVv0H1A(xgz)flp04n|W+7;HPdHgxRfA8?45DBM#z zmhFQKumw~3MZgxD%1vcRvZm}+r88!$R^Vu0oiD4cLCo@{C|Hd7Z7A3lOrk3m%uJvQV|}7t5(mDp zJ^+e>TOX3T*{Pw@YBKLhiDD|S7P5Y#O%!zoT&j}asdXaWIqyt)i6rm^xDUWSZf)o;KPWY`Y`|HN+y}pgIR$Qm>w1)nWxYTIfIlss1(;yt)D&6wyQL z(0H+Ltf>;7Ll#64&tX-kj)f<|D z!F-t>U!5&hiBJxWR+rNV^_r*@^L12!FTV|n!0+18HHLn>(#Q5!Rcu)c_bhAmphD^h zS==a9aX3fiBYMcTy_L|FKP#|FVVi;;1Fs#*@C1qn2$|W|cCOX>P zh9<}QsSs^_4{Six3lr$k%g-2&$>m`-m%%%7_3*cbo*!JefEI*XTk;D{0sv+`48CeE z@t_RhHDS80P?+lKgw|NV(|PZ7XT?~56S~48-_d$|`n3Oo-IC6^3PuHNxh&8fXBdw{ z5*i&WJIx+j+>w!SYFEDs)ULp5Lnj0fH-G)rh1KX+SM^TVZ^2-6KGoT<0r;jtP<&)t zoIz_*1 zm8xmZ38A*9j+1lkXF%n6ZRpqrsOZ)Ofop!IPbt294SYVF9W3%8K05*dNwP%veeyz1 zRZLlJ9NRx%1E0@tgB#1wcR@DC(`%6Nv$K5jkAt|m&w)z=d`yYnvWt1VOwOP7i1QT0 z1NpkTumXMWbMXEBO`yEDbu(PnqfMVbLm>vxzH33jU`*q^F%>DDx}vS=X(+j9jQ`+7&VJ``XE$4Tbg)77gA=c_*I#OD&!^KiB zjG6II-E#nbir0h$S5>#SAjM%8BCjj`IX7a}WdRGZ>Q+UxsRAem%>?Cl7y?xavuxZ5 zEO~8kKpzBu3EWuF^EdWJnbq9)ZURk%!}K(2Ar%M;y_6-R^~-B1y}jDqg;pT_&FrA` zw}Gn&oF-iuxNqFtTM+D6KY0*KTk1(`XH0R5va8iGzqRZXhq>cu9RjwzHUJpOtiJJ; zL*r0&@x68EGSqXBvaD~r1z5w{C<1G|Z)&x^nxB9-p+%LIq`i3(55%8u0oJ@WKndQ$ z0YaL-*mLu+Y_neiwlEMZo*|wwD5RZN(qSSZ^Q(wV)z#fFL5aTvYlGhg=*_IRIBbR1X-i$Vk&iz4WVuM(E zW~G__K1g6Z0xAu`XZL^ebnF?+efJ@(AS}8cRuF5@pkPQ>Orb4`>`?5E#tL%D5f~d@ z8%*STtRww__2`i!y@~u*XY;13Al!?^dBovfaT94bQq`QzoJhx<1|>TARd6ZusV%wa zUu6Nh?Q0O|05?k(&k-l9*wO|El)MUxLxzUB%6P!d`8Bxp@yTrHm#*c#8*Y7U=+~t% zUO4p2L7P3S)g(un#LZMaiGKKXm;fFX*>4`xwa&kXeTOCLIk%WdS)iO?Q!L3=!szaA zzz_1tkR%&1w|3pz(RP2Z-upp)y&9^;no^H1PgXQ!3PldF&$xany7N4duJzg>2(mkP zv=fI&B278~X)OQ`OJ`H*-D33kq`KsO%kEQfHSxw;^`2>Kw0Qk>sG9-xsPw?!5;wabK#yIwTOsfGbSBN5U0X-D zum7*Ee2dVMA9P06Xe}Tgld`%Dao|T-RRDDE)j-vOA9N;H&eaI18vmUD&=^$ip!>Zts;dS+;9S3Jt4nPiH zWdgnMXm2n4HyptK{!#Y;J_10M-1%UTDMUd+<4rJnCz&&O6X;uy!^7M1u5zPj){BCriouD24zfPBc0NGBj%PXJ#zf{2cGP#9REPmG2-@} z=n`*a6*~E3@5aQA>hh=X@xmf(Vx2NI7!yNR^G>@$;&90%01$X5yxU|1DH5Iu@y+Xp zmM!`YixU9Y4v#!FI|8r#eD+G|9l2`wNEeQPI-S=Iy3Aq$;)?{6f$Eh+Fi8iZ`l3o( zlAs$;z}WD}=$QRy?9UuohlYO9`x*9?arQHydY~UmfFnNGEfDuzpmY|CBi_h(ib4{F zp8<|MG77$ag1fUn_sr~QcQ2_kzXaWY`5T4xhGmqL%{n?}m$}m=u|r%(qF;d>ub+qx zEXZ@2^WXecpMX#Oy8Es;vKZK5bx=}zQ!45%){1pfn@BTg_*phkrjLpQpZ(vn(G|Zs zu^L_WY>yv1b+v3mR8Ialiu-i&s@9Y@sr=l&3b^$_V;=T!V@9P~7sJ*N4PyGS- zfyS@sX?!}8ig>(6C!dBG9R{z_ZvxiF8g0S)}Sn05qmI6n-ad`Ziq@8rTO+qJ? zOu3E7{s34|f^WfY1L?H!N2)%WSY|67LukBywQ!=DZIQD*uG3+94v@QQR% z8>D1mVaCviIfb4uy7(lB%p;@yci(Dj-SNy{cR<$fJ8+fER_=ga`>BhadeP!P?gGcUVI)O_=~%Ff9huHbbGTlcBTTga0bYHx&$7NAUbS(jp@=o=kyQt+r4 zNu}!t**L=*rs;B2qasUAE$mZ8QksjS=6mc%^^;+~9^m{oZ@$;D36?1WiCmZ_4Ru#I z?sYn2GGu*Y zR-@9xg}(?nOWk+ZZ-(Iec}<{Hk6(bK3um}=gsz+y4Ff~(^pUN-T4l0eEL#mwg@{q5 zQ))axJUxeoVS0E?=+27*x$T zZh2&MEO3XV^;Uq`E<(9rb{FGZ_tPf9ic&M#O+IGkUeGR-R5%NyrbG%*K={@-WKa5%r?8)l&L)At5@ zk1Q2n^ERO-oXe4B>wB^}OHkXhj!NS*lPl(E{LX>TL0!lTmd`Aouxj;CQ^? zR&+9Io)vAw1c+wN_@RKKAz_7NrEaxEttSCk#&uSE)}V_fX2w>}-37v(lLqwo#LS1K zPHkH|14S;sH?LRZlBb27g1))-g9_RT9{M6+7eBUs#y`=;%m4ucV6TAThS##W0d|lk zR&UFOneo+gcY%@u?$zj_&FeP*C(z=vC`q@tB@RxovknwDpFW4opv)iEz zwnI3wSeO*ft*dee^pvS!_vo~F%BhaC3wRZ}eG7b!slN??Y<{!@eY7#N5&e7143`Gg zUBz3r;SG#M@4*|GxaiG=2_~Zz86tJF9PSh>+bv>|P$WCUfTHC0tkjd^d@^`cL_5(PmBs|B?(Adv#a+M>#&>s5QoT*< zcM$Gy#6^e-B^fQn8{`|iV1wkf0hriVyGdK?kpAr1UGkOxf{iJ=dxp&sIl`j*;OkIS zN7{8Eza^qlg(Z48kh|ON@!i0c*Mv?^uEM^%jpxh`Xm`@~?EzWgFxv&P;=@dD_enLh zD60(Sw1$!>%WdXg*u%=&--ZfK6+F`XpWT4o-ZR4`*>%}2I~R{C3-p6^p;+`r({!q7 zqw_wkEbrwGvy0D#+2Xgsqh$sH9Txv?9eU*4p19Y+7`*<`nJwd&&KoU`e0lh>p??i- zSzsO0w6>J?ML?zDst9So+}OxKydRzk=k;_yNQ@`Agf zsJx1z1Vw#SL>3WodhqvD-|ivZ#_#WseD0*q?Q`l@o!U;F^BkglduBVrs5-VM%BxXr zuoTU)G>&I+^T>ImNu^mAXOI%TsnK^_O?9u6M)>J_(8SmM?|Smu)g8lc#SXBAF3|9G zVVwBoNu8JR)hk+-NyVhNg>JG9?Eu>@ns680L{)rhM_Z*&Uo!(!zl1-E@cLFNREIBT ziimY%4r{_23WgbhEQcN(xm<$k!99Q}OaN^<;Lr&=K|O?~K<%xn~L^z;Pj z89Io|?xPETj(9?(h-Uu!5nn5w5Y4n>u9?KnwAjd`w55C{Tq)PwSrSrXy56V6blpWG zJ?r$s2ATAzI$D35T4;S52P)2KZPswTFp(9w{>cCx>7rqJI?@VVvl!cKo4r{uVIzyK zdM_R}J`qu<*lfgLuGM6|po=(gC?H=q&8%GdZ={z(3ofAc1SGo}?U;*HW^@(iA{rAb z?BhcK(~gNf0fjRyEwf{|qHngrE;GhnH?8Ry11rEY>&R>7IhCfZu-u9j1^p$1S_>)= z4~*sX)wr6i85E)nZXv;T)j0}=QE+Eu|5SIrMsFk$CU@ssYmptTtz)NcGuxIA%v*Rz z-($mT=l>dT6{h}h&j7tSe4}Z8*Ubry0roBEkO7{Q(T=iXal$%gkPf7y6m9;i)~)A3 z$DGp9$?rQ(G>)G?O5;QYv*=ZQP1xuLgp`ghInT1+_M~4XmBzG^TJ_?Uk!xE~5kRTsbRM$j=ng^&YjKVHa}C zC)OkRSi2{hB9>o2)3lMk7yqfKJE9t6d{iltPgrz5a)Wwi^*IuSRNeuL*ZCGv#^eIX zAbH~YxsLe2Ofz51Q7x)39F3TOe1c_cRe8YYHCWV>DbnY{K<_RlyBk+nrf+f0z$4A> z%vjV+&MlMF%7{v0AVL&S*q8J#U@y>s-l&t63|rgV=sR3Z>4a1 zGfg{vGp6SGjmGB+m1Jdlt&$zBn^o1iKk34K@@IqieRnb0^XOIP>DAZH=-V!r@V&TV zkY+G{c;Smp+};)d>Skm%JxT*11yv8Qj;x(iJI4y+6BdzKLKp`|=8@3M%8@P-PQqUj z?rKiI{`@+!EIhX`QvG8h!aPdjY6Z@UiM&|G70eZh+a+}r0Oh*72-Z^(OeI}3isib4 zycp>i?!7T^#FR&)D}^b~sDrVO%eeFEn8F+qnH2&@dyKA&oiv(5c?UTbYj^*T;;>eL z*?aN1zG8-xv4*i)&?t?JGHJ2EY)b+=v2GeU)$`6ya#NyX#O+TC^)t=YFJvAUjkA?h z-H=RcI0M_N-(hqYiMQXfd72+Yk|y7Fgby1?da~+c}(%xYtcAefo(bviv(geRd6EXA8nhhlA;5IW8?*Kxr9A01_)N}YlkcRN$IFbPdykaZU$o$FI@ z_Iv*1TJp1rwk}|Xhm%`L*cQ6MQqX>TUJ=qVfO3v2t+5y*!rVB4&55y$CBK_SUhn_? zMf6r?6**X*t18_}e7}OF2@2stGq*1NTsl!aVJ%ins!@YQkr3E!sLm`KDxXOrCmKLT zwLiaW1NmUJqnYon;q$TRJ5g6*(U%t#l@uGu>Jwt^cvY-v>FpnD(1{(TK_(gll0s8&Pu9V*izJ*N?TfyF1^NvVgO7sLHwVYC0iEI>Mv=T{Ku2ludW6^S3V+ez40d0zmo*Js~r1an!)vjo7!_@v#on>Mq7g^b#ia5 z?oyvh%;at3*^)J#R^^eG)b9`~eFsb{@vOUYE!-+78+CCPhA@C@tYu~_Z!oA;c}YQ-C|8ju zZ>8spPMR=L?t1En8_2nz>|m?9O~Ki88tZkrQvJFG!aW#61Ck0LifA*l%D{N* zko!Nkw;963vTga!c|ALaFCV-fn}?GNf7&CiY&tumkf;^OsH|8<49(?75f*X%XJ&>+x@gTnn(2E#GlO6q zjoRi`uw(l1iE25Wh&f{9oI4?@yO^B1=PAsl_D zH+^x&+OyQ_G!)R#36Vu>o=}UULXB^~8|TJO5?QwH*5=LE`su&kJ#$UZUH8r;k*<@X zi#h5+w^m~F0mc`0To|~khvyo3=T~jFKH~^G6(~H1P!;sl8!Kzv=cex zEI~Bt=I=&K~V63&ZUo~%d)1Y`D+<*JR|L*&J@6w*D=xlU8c7)h*3IVIX?4M%>S67v*0M~;LIMG zAqqfLxz}R!8zbcqS^O{#`klo@xn*}VWz0Hqrj#Vp2b1(-${EX5cTD`c@63Nar@}k)RPN; zf+mBWl;@V$i9$#h@@UJ+RMc0p*CXVPXK{e2{sb#|7l|lkGZ#%GmTb;sNIT)3p9(t< z8onTGXp}aG-o&P($g@}&)nzRqfu->|u?$S>$%S*?qicxu`Hq27_yxG4qiEEEP|<`>R0y#ZS1}8K`>CftOwU}aT61x2YxOSD|l=HnE zx69h>WPkxCc$$Aei#Y;0Vra3iJ2%!MP}g*0`{T@U>C2J+Oe z&lq+WtnBac(SRHGz(<+^H}iWh>+#XK@*3>i&=9zeZ#9HU2?S*(XA7jX8M73Q8lj&+ zWB0#~-9s0Nx_z{anhV}&9~hbnd&!$Zr%}IuLA~6bKw8PE(sFYqR8Tw9G7@_e4bfFh zc1L_Im!#+4>}c7>-@p+EQyK~&9868Dc3dY8WhTloJ69jCNQvw%XjXSI=?NUTh8%fo zZqlIY|D(SP1BwO)2(ud8;u9LHHd4%+Co{!jf-HF()$1z7So*?t^5M5Tc-{98)C@CZ z9W@hpm9wLW88Fu~en(O)Gx-wag@1rqS20xSUrle&^~CnhT+h?m75|Caf#c*H$56(Y z%CMejOd$%D?U-_#3(XV%#4Pe}B>w2naN+pev9;u!nT{q@HH1#7&2>tk=5`qvgGsIQ zr~)CYIzw)3prT#HxO@G+;#N6J#i0q?~Kgz>3oezoNi3 zCy_03bDC-4k%>?Z>rza(c_IB@PC6uS2;fBCtvDmTsWfdEG4_&?E#MHuLqV=`|?_{e14-1AW2)D z?QPKQ`>_SkiC7aK+AB4~bIcI(8SPo7=pH9u?rE$#mt{FbmcF;+QFpyYw#Z(+pt&C> zzv^wYVO6Pwcl#PtQ;xmovR=zM%V}m3xu}b5dfe$?nj(mGL1WoS7Y%;8oWXqC{=2Q&|%}M>#g@GsaY7A*{ z(JIkoy~Tnv#*hyUHnuJ8E+)!FeHW0^{9_x)8-pDzR}4c3F!HF6y1;ULJY&hSnkpv} z6)RC~m9F2bNo2UO3|I19B)&(VJ^>%rb`|qj>Fk$6}fsDG@^^v${u&{ z-ZkX&%jN`9jX1d+pE1fG8$xRf10)`ahwG_AUgS#oU1f8Ga$Q4)Ry0ONx=19n{|{G_ z#EK4u_{2&ywVyvmeXE5FB&9qsDreIAN-h>MAr}Zok3j$$?J6eAB)48Y{mjNj+cU7K z4Ktg-F2Wxh1Uun$Z<6On$Jmr6Hy%yK$CZf5d}<}wbr%cUFzu=a!mPslG3wtg{61hA zEhxt(Z2C~pSTCBS5XN%yVJO^gHYEk$_4+Mm^94&s%#aXGB_p zP{r)38SAWGN~D|7NZrNsGqG3Q+_3a4$C|%naP0uR1{W&&bn|@kk5Z+(21%MuuAEEK zq*YD$L#$6LE6FoaVc%4ZrY$oc0rmXCDN$f+$i1JtB&39jCE?)zkz{PX;V;DvXw zB3UXGZd!SARXY zR+vXD*jd3;LQnlfdkI*al{kIkD=Pt^e$Bp_#bm?#8jE2ei6#Se2doVN&ZbE)^n@Q^ zP1)w$a6T(z&N$Ye^<8rM){nK1^@}cVP-J&q3fT2^`Z4fMtRcowWJzbZCdVzT^vvkC zv%E@P3@&X&&Oy0m7ThIjEL`rQyH?l0hx!jL{BhsEU}$vFUF%iN6aKOHVkV?WN~B~b z#`5{N-zg2&p=H*_>T?-6BR|8`qwaofO(%rQwZyf+!|MM1#78b zlB?oA5r&`@Lr^Wjde})Kd(2Ca)R%v0134h+SiHU^6;|yPm@tHWfHssakBh65A`ZEf z66qXJ3MkiAvc`&~-88hsp{s~!=B7SUm32)1pO=HLgFm($e1)^pm_6q*F$N|rizJ+7 zaXBgQ{e!%*Vx)^kPP`J_I(@mK(Y_OEE&$mp1(wU^SVozo6-b#HyDx6Zs4ABY%T$~PJtx(cC0e*^G}qHRuEu)W zMWa3%mo(EF|MlvQ-der`T%iv%$U@lXMqJETnhWa1KJR!&JqEOL%5{rGEMnL*lw95Y z9@+Dz^BVHxj=4%-)7VA>Fj-v2f4u*pg}+)b00fUVEDaQ7Geim-g9)7>kpQq;L6=cj zV-Xn;S!iD#Rie$iXk@o?w1uENsG1Y?BF>bIx)c5Tj|1 zn-%24YN$vz4Ttm}w16y5tLIvXo>lv_4eED!Y~!3hkLS`1GJXa;qds>OVKYK)9a_}3 zi-a(?CejP`{$JI0DD-nWp*Lw-U7~b7$@G4G+JcJRijRqwTCB!ak7fMWq|T^)7lt18;Hl) zQQL}1V7qRPZ7dlkGEkl<*gfgVWU~QQkvq*$=PnxIZ%1N!B8)Npp>EW zR!@rxi?%nmRH zVT#;3r&57h*r*L9d}>u(UNs<0pviF31%{m@@>066b^1wHV-5&}8VcWaLq~CHykM?| zlTlwd6wm98qkcc&H-Sb(m1)!iW$Gf4XRkyQ(noH7dL239X?Ia`Ci{U`=yjSuS5T&i z-tCGrDQCH2SEh1hbxZX(_`tS{h6_jdz&3AOKj`bw(J%XPUcwIkJY0~Lmd>tzYScNW;$hCprfXRpfH*c;nNyT=3>E`;cR0Hz1E@&Y27h_ z>El7vw2MZTJ^x1>&|mr1dUEcy9m=G>4*i5fEsZJ>mNJ7z7Y=dBXvQV8>wzpt?AFFg zvimx4?IOYX5Rtsi2(&k@>sWJEUN7|iIdi?A@kLWUby5*cB$H0~H54;Po$4&2)R=)ylOSca{{HFPU+A+{3OW>ZgpVVmu<*R5j4 z;WO0PsNQEUNk}w=ZFYAt(90a=>EDMM-kxQW&}4a(m06u8yI-$W*EnK{;3wV1^!Q?$ z{z0UHWJ+%S7 zfuJCl(gtes(2mu^$bVw5yHx?DJk%O*=O)nXT_jTc-8A&V zy34J3`iV3cbCG7&S(YV~S(k?KT4mPiWC3~YTED#`i{Ez9$d*4p(Ta$B zHH+B^H~+_|JN=l@Aen4l$r=rlUYRp1OW0fEJCvs_(n*64=QFK)&?oX}mJ0@Y-aqg9 zo-OlwuO0sB62}s5$*O_3=U*}K{K(RQ#|FMM@R5OV@8q4ye{G)X-QNGv{%F6h|DvAh zzRUUt7QM3QnMKDJeR@%8{=r4wMe?4{FWRthcKCA(U+n$K!cz> z^7jS+Tj7{o`+`8lnTGXhgMyMpf5y6;Vu=~Wsw8dC|Y|%FFeH`{NcH%coI|(6G%7H*@~^{gakLP+`{YH z!UOIoqO6Pn21Yg~#BAY)vOX{>P?3kzXTi<1HAk^XEE*gy*;q&EpEXSp zIcWAL3+QVS0u@*4b>*tMO`}WG)`MjkSH0QPhHv#g+^$-riZ2xhkro$SHfcqc6q_cS z-EgPCz*9#^RN9h59+tc`%=)bY)tjMy0Ra{Y zg@`Zwma*vrqV=lLI}nYB6Sp2;?p9?Nw`vYFU|)d4_lR)zh0B2lSLlJs zB}}VY2#-TWHLwI|tZ*hspj|VP#i=$GB{iJGYgXKj2i+cYthT=NqB&{~&@cFB%}qfK zn`w`=wdE~6qd(Ho+M-tz46>eK_~_EhPq%(twdQDEW32?k1~=!4YEToX_2^nuG5jK+ zpH^%Pfpz0^)UB*HJ$Sf9Wr0kCs6or5&8ah^CnSqSP_)) z;EpC&-XTz7XXUu4s)NI2ok1EUXTb&@CChIDWiG`pj=e1RZ1f`(K|z@QFa0Wqp5 zfxbvqwVFCo1)2{4c$~R_JA)yhMM$MLwQxu4w^gfNhg5aJ6rD!!0U~Q!SzYw67FA-M zf^~$lgYMG2bC|Ir_2sQ^im-s@;oyr=gBFOPI(4hwSnvID>&M6pjxW|bSUQ&g$Okh` zfSdmTff@uLQUoo9PIN1wo=S9AFuP!)O||$ic_NqGl#OPpb7QOIGi8>VT4eNI6v#}@ zWFU?7*t9`&4sp*DEhGSp-vLMKkbi3GES zHEV4BG)diNkTx6&M8~-^J%te|8GKP7W2~f=A{!JssPWV-IfS}`-|Bl?)F#wX(5=g$ zR&Z6pB#7aR`f@PUDme= ziyRaH#yfWgz(qz(n%Wxr1FE0Q_HGk?j10p$8t7`Fy(0-ATR0qA>MJjAQ8QElXqrQ7 zJ;Q+yomSbt3tCjH79OhC;0!pVI%c|bHam1-n>qz0#$<`vq3#e_>!u_{ni~Fln;fKG zMsd@xLWo|@HX zO5yLxh2Ni}qAFN9k*eK`c^or8X6}Wrx2cvi1_L?|U4#KK1>M46A6)SsxjEg7k?Xw< z1g=S|#!(;K)S_0cZmd8#i-dXDu3nN^M>Q*>`*)*6r z)5+BG-_B7r$sBbGvtWV5)B$WRQ+7dXkfY~)P|LJKf+Z7+2lfk?Kzl{PZ>Kz%6CIdC zGqonxn4UI{Gu_u(BRm+oMl1wadFoJ38gGrx82CX;FeVRE2JA3;v4X*I%Zib)aK11S zJq#v)G}e2Q^B%siIbKOt?lSfJu9xx5YV&p#=mq z3h`#j1};rwpw}bZ>i!lv16>qBuc*}+T8Jq3bf&ue{lj1Dy_lw=-`d;U2d?`M4r`kS z$hnvAJP&&zXBsL9Jy7N79xC9*?2W;<=}AEhG)EJ`fLCJOcA#ysgks~e@oVj`r@|>F znpJPj(p;XFbb{Nsuk~AuBp9}_{j*@E!n}^HU^2C`HSuO}FA$hQSK-s?9LLfD=*_IS zsx3H(WfMW)&@W76bY4OB(S?7TqiV9$T@I5Oa@PF{;EoHdp`gu~#zJR|=Dh{Ivl!YZ1d3laZ+P7x z+g~5>FFerq)82X0p)0?(rs?;3OgeW=)y1UMR5hayRebXCtS3RPE#e^8RZ3pht;1>h z{5RH+XNv7}|IQ1lp)*PT=QKI)G8f4Gk#=gQWtn|`(4Xs11He)z^4VM6in$JqYMKGxej z5LUc-y~^gPh$8NEGz=u!XJGC*QG*4clR|-HMM!*H8J=D~*+9Z#To%#*T;Z~iOEc;$ zr!d>&o=B<`^NWe+#>UpA-Nj_fH~wgt{?U!C-_uB2;rID+$s9vM2CHo{stY0;2~m6) zwu0_r`g_atV;^p4dj=QGo7c0X{~=_S8hK-S@X49g^XV|Zvv>N*TQ7Kb{?y3p{D}%^ zukk1Hc>I+=5y#^%{E6%F_!ED^i^m`N6IML_k3XTqI<> zu?>&k@FzCo@e+SxH6Ew=6T^7C$e&n<$FKO~AI9Sa{y3HQ3;sBjH}yP!oC^FIf1C<@ zjz3NX{**sX1^$FTP6hs$KTZWc%O9r#f5;!F0>8%}rvksrAEyGp!yl&tzs(<~0>8x{ zrvjhmk5Pe7@yDpZQ~WV1@Jap{mG?M*jLJJX#UG;rALEZvfsgXXsK7_~V^rYR_+wPy zS7G15<01YS75Ej{)$usNAEN?~;rbnqqwpue<3YGW;c)~$e0V$nCsI7_=Z{i>hY+oS z$3esz;c)NcfA#9sGk+ zRN!s=gH+%r`3I@MTloj6z)$cGQh^`iAEW~Ri+_*`yoo5=6`157paK*815{v~e}D>%@DEUdVg3OsFvLGV1>V3vKm~q)e}D?S zo_~M}d_VudHaxE5AE5HC!UQ-P!WVJgtXAEpA0{9!84z#m?XhmJo?DWd`1`5A9sK=N;CB9gD)1`)ekxGG-%ka~ z`1`3qDStl|DCX~{0y+MEDv;strvgR%{SY{E1%HUjyPQ8nE1qRNzJYAu8}f{ty+ol|MuUUceus0?+3UQGw_2hp50U{2?mv9R3g$xS2mh1#aRG zQGpxygH+&p{vZ{&jz37{t>F(+d8?=RgH+%u{vZ{&f{rCA#nJw{C)@=ewE)(1^$KKPv!lI-%sWJ zk>5W>1^yquUxLT)`Tg(1<9Gc2^YM6@-@hJ@-|+jF;qel`zaNhm`F$8M!@uJ9QAscG z`*L{vg5MX#<9UAHwRrrD-{->PIewoBkDu`Slz9A@->1OiS$-db$20uCi}CnAzi$iW z_C0>zIy}C^@1v5w&F@=`$2a+XJ$QVB-#dxN)BN5d9#8RmQ+S->_lEFzlHVJ^;|YGR z1CPh~y+%B~&hMoHALI8@fsgWgslZ40y;R`W_`O^3c$nWy<$aakyA0!R_#u8T75Ei? zFBN!#zmEz$&fiA`9_8<&0w3h>qXLic_fdfl@b^)H_w)Brfrt3}sKA5#eN^B9{yr*j zKYt$;xR1Y&3f#-zM+NTT?^}k)z5IPt-k16NAa82;OZ*-x@NRw&75GJd4;Ah ztoOswZo$@GXU~o89FM|t`igsdy|_fcy(-0@5N;}U(ttw*Q<}*fP)6OQ3=*2q-NvIl zjL%&(a^mV4>QnrS4P@g-+xw#C7Ur6pgju!EdgNmN;8ktW4^IfUc)pZ@URx zyGUgBXZRiDm76*kj@*pRAa1fL`h;+kt?(&-R(33ZJ@cr$_go@H^?83G+=$B+Uj?J6&E>#YP6oD;s3pQJwB=V6Re@EyOMRWbk zE$yA_>3?BY__dDM%XqkA+jp+CiGqO+JN=kKI`3oFQuKl+e|c;(YA^ps|O zmfhaixVEXt^KA2m4h=3HSl@rqLbmUkdA9insWTWwV>`KV4vj5d*H45vxkeoy8bqfYbxd?IKbwL z7&3+!KG)c~>a4`+-L)Np^V#yXFo^;2jaqUXRf>lOU^`edj1qF?7aChvpPh<(<)^o{ zUC%z(SV)HMZY)^?5Oiweg25QZV_Y)8;!v~XEacR!81SmQ8!J|y{SCtWrOuF@zg@SE zJbZWKKf%8Z-_sx)+$UG}U-oecw0@Pk^Gww`Z9R9-*-u;3yRN?DwjT1;FE^aaucs~s z*TEm=1pHwrQ112gnpTGy7Kct9My)Wzc*b&)lvppZCNwFZ$6asDum|>FGU%ca9<*PdgVqvPVe!h}eHKZFS}>kbFTkYaN*VX2GsB^^?*&M=^qh?Ji&N@RPn<1bsnqw`luN*=>yJ(pH{PYW!o@QE`X>&fuAL-6A7)`18T|DIa^3@HwCNUl!MqdI z6#SXX(U4Kgl(KG3(8**X$XwQB_~|2!rh5_1chRmV%p=XbHkSdT>K0@f`!(FTB=3Qc zV}n4kRfI)HZ!8<^jNF;^sDY{+x-^;O!(C`WZ_rNXz2yy z(uagK@;zh~ByRPjF)S2fqhDi=1aRw3`PLu8{M|((#kXD&ZoSFR9%{7FnW zP6lg_Y zt1US^4Cl8Z(jqFcxl-iRJ@6G-KMk&3B%&k-w@%+M-8m}megquhAw_XkTJASKE60kp zNlwEet@@}A8O*`)Pmh3Oq?1IJUAPJRE(#_+`rqw(p8g>|f9z4goy|D6ov~&mV;;6% z4#58;Dw)&^dU5hmaP1%Hdd?ReQ(fI-@vJg_~4Ug&#*% zyGSIo=vx;P+aF(DP5$TcIURliI=pn=!q4wA_Wr43-I=uY7un{V>+$0*#0 zkbFk0S1RSsWNeaU;*zi;L;n0t>`uB$g$zHU2R^ob`i5^c+MrR*y5IV3q3({ky2r9c zg*nICoJeBn33ymC_5H@GbHq}yNPMPSW#?-o6#F=)j8mu9lk>jU{*0yo&G#`4Lp$EX z2q|%;h?7%TbSaTcuXZ3F4-$}>u&Wp;yZ(70S^80Id|vju@j-+r zp`yp=mgOgHqKqYz$iZ%yf0y)#Ud@7j`#cQGvIrl02zPlK? zW~_$kd!C|pN&MbD_j?=C<%KwpC~izL()y$+Ll%4kzwa)lxoS+)H+`dFqM2@vInfS+ zT{Aopn5d@BUX6G>t`0~NTa0~h88yaPK1E*uzH{PyA(7k_*4@x`B8%r8zYb}YVf@p+2}`rqjP zMgP@Jig#=P9Z zu3Fbjs#}T|B0ncrSBwUNcqkvJ6hIilx1Co)kU@mS?)_Qt4_~& zi>9;*akdF@=A5ep{xP*R&sO5ru?kns+3V8Y!B)8(*+3PgjMd^dn9^g4t+xr)jESa1 z9uvc+f@2OylT)^eh?QR{WF9X? z#PTvLpH!=Hxmi^>6&oIJ@#m`Xs8SjXN~=|CJ|TKc;1eFNi5O+oP(eN^bxqA|7qZZo z!g))WH5)|otWRF`mZX<_vh{whGo7mU`889$%zSkzoOHTzmC8-HN~77Dht<5?`avR< zW=fhIKp;~99M4#at@3y&%8p7#BXXa)KB-BV|Epa-Iw58hO1DxmZq0_+YknuxKTMs% zBoePjV8sDRVK4;zQ8>c4OPY3 zYT7CtwT9BBl=jM2xd*Ap)#0E|6D?>NZ}`05w8|a9EX(C{-nufPmDl5&MqA}3PQf89 zhP+nhri^w)_Ix3AcPS(Znpn5Y9yN!RWusCe5mI-Tg4v9nktS1R>u7P@8s}EfoY-i# zV9Xw4vPpBw>$0bm_UvjQv3x0Lvre+3qA`!mj8g1?7OM3@rvHbna@!P_0`gmEjEz|3s+?l` z(=CEZ<>T0ptq?I6oO(@c+l#GoS<1oKaeUNjCnwx4iI%j=870R!;ZrP)sA5`0#+ww% z{js8#F_&ewF@w`EW@RN$2tDkNaa^(l2GtR$3TUtiNZMf(v>Sw_yJH~OsFM4T*3RjQtgcYXYir)X zQ+U48DtD_&Q>?FULCOVd(rl9{TdnT}ycTZuCVW1HMN*4K)|_hnKrPO4#W9z!G65tx zwS44zLOngnls=JHx~0~H-c**@mkF}b`;UBp&ctx=AtY&s@dPVU$u$aTBS(TRy{)vvFb zM&%*dTP-%)WS;T50YOc<^)d>(WX*0APoeo;b*ETW*2X+} zjO( zA`yw%Ewg+@u)A934XTIF9~kTZ;=*tD{T-k#mNV?G)9+jQ<4b#JEDHrt6OL5=NsY?I zdDJ4AI+`9c*kZ)~Dvmy%d$zH3X*Z3WSai=t)2E-E3p!|S7&rVx*pa>;JcY0upUoQe zaN&qKsV>@T9%SC$g#%&YCykXOT_nPAAG&b*_)i*bpp7QSKmHUPas5uA(}e5yNxiH# z&iU2mO4Y!43|4`o^f~O$yGZ23o^3ct^?ZIUx%0V>UH>EhE7bGaxt(($sSQn}tVMq` zR1Z1>QS#>hHnt6SmXbZ^?r1s*Y$U0lwT~vkPWVf($Ivq&J~K25oaoG zs1?c6KS!wQzm=YP>5i?_=RV)rir4-^uzpaqG=W!$T z8beFFX=G1h5yfF&P8R&Kz4dNZ@{$+8_FDd!4~_y0nvMcp_QBca&f~B#pNwvp ze*OjQho=VSm*_tH;|jJzuv(yX3MZQ>zAM2Yxs3!-466FOS?iaLYhp zATa-A@8p28=VJqx^!#vOdGGU!|GD@#i@&@0EAy}K`PbqvEdJ=?%wpH#s}`R>eDmTZ z{cnz3(*MHn!`Ss6>G{KOqyMx0H}*$+zSM8-7x!=M@0-77(O-s+&fmA_xkX=Jw10kO z{`K>9^Dm#jy64@V-}gK-@(9^=;}t8(kG}l3g_i^>0X3)7IwtCBjb0NC>q2OnwL|>> z>qk>(`B8HMsyoYhmv2n1@Z__4c|7SCR>68Gn;jF^M6Q}AAD9%YvsVk#VLk3D898@M zqzFxViAEwZ@g}m4FAIcN zU2S80t}G6qsjONmcUXk-h#|%?!K7ZI<&?RxM8aVZ$`dM`7Rh=i40fs988&4cn}rYX zOoWs9Of)EATmg2BwSPuR*An=Es_%T3k2vVe;-=7JN9N0sw&akE2U2y)E)vsu2owJfEinZ~`R58U_umNDycL@BQmSBWUhAK=-2#&(6x?^)X|~WtWE%Yk$%zS7lw+UdsK!d=7MzV2il^Zk&A7KLQbWU=|US@4HQ+5hB>p;P;+?f6>liYtrhAM zNyUnigw!uiDlBD7c3o?LL;_(cD@oeD<}rvuN=?1MJ`#|Z*!uWXJZLHAf)PuWa|wiS z#VQeVweecgVU~}1vI~y3%Ev<)RyP?`TdP6N?uuUc{#LoMW@3xk5^K-<(o!zH<}a;s zL(0#nxNyc-Q;SArZ2#U?IhV*X3dU-(6)RHL)Of5%IB(ZOd97ESiB@ygOk5#KF4YO| zhoTh?S1gTJDR7b;Xh8>s?+qEGS`M%vE?qXPC`h+H+bR~DN2B9oTqP{BnOsT5KU!Sa zL_w^R7p;a#O>wLmUMn0z>QliAkN2?q9P`#sY3B! z_=3v>{=Rg<&Ll+Dtfp?)`JA!Ut;A-H|t}ZN0&81@!S$Wbo=18&65W1%s0*OSz!; z*k#+k*)A_=*h0dcl#S_Z+N^j)D)50faRu(csz5?*N!cQz)`IJHP6RkFvi*(K!Ud#Z zVNMHd+zwloahk=BYAuvcrBauEa*dhV9O`aEFvr=oW_tuVc+2JN$b+pPD2)MbtdjKR zE0MZ*JiO(xk>b2omC7PNo1ZK@avEJ3)0Or+!ye*T@y#_;b)Qx*_Uj85VTJJnguRjv2A@f3?WW-QAjQ;+f-jECeNlBmD2EsOq#Z4jX zRSGeuC$w|dh>AE2A6>tu9upf=;#9y`Dr>d12$R}rA9-Zn_4JM;*j#c~hnQ$p%z2&8 zj8qZ~O~$l;f&c@3L33B(k^ZH_qBCx|xi)qrO*wXqLLLiuvH5Y0M9vi$m&GE@W=F#z ziW7C^0@7h-&%`@FIzZbYg=D3M+o>YicaOGG&BsaNzGUS29M|TyI6Xut;lMnvk zjLXnI^5y@-DHbglo@+r*Q5$6$i6VMNO^)iMc3j@VFtT;Hv$S<>%lvr*dHU6M zC!PK)ZUa9wZ&*E;ANWH5Hy6IS;GAA-&xfc(MyzMkO}LZK&!sc3X_C>pB(6wA#w-QK zLp^&|kSAY7?_iN3Bu{#&Nhy*fkwwnc?0YJ^SaCL{q&O$=VgMxFgqoJB1D>avDrFc}R z@(12Rm8G2|q@fM%AWyv2p%lOUJCp*bClqa0uoijTOri?tgGfFs*60+z7Dwi7aO|Ry zp8F59Kw9p2yMygR{}6O7J*O186i{C{tq*>Bj!fKNk_#2>c?WE}Xyn9o`4%Q;=$-a# z@R5HCYDOVBm#WcJ1etW;Zk-M;`GwUb^vNq)UPcUv^~KP?pR0ED`F*eNkobz5xj=5C5MEh z=Fd_Otg}(cO9R7j0(<6ytN{K+cJ$2x@tVd_AvPBAm53(Gz@H0ALyIiy7FvP z^5Q>lSUY{ZZ}!%n6^Nas(Q5GDLcA4XKoOBel;3@8CCP&~NiUooI_oPR{_b0W=_j9A zc2y7A+&{YD(?$>lmCYguu!ayV)`}=sa@D}>y7MGwz?h%?O<-RwX+n|lJzLIg zw^2|ZOd^5~(Ns-HvMSBmNn>Lv)2(a%19h7J?mfu6y7_aBMPztzcF9^q=mF=Q#>*mU zYcq5^0e`nhmFg1k(Y$58mp=71x4JH z_BN+1^4GPqD~3BMWRG`4%k##%Znoul(_9cI*3ULQ$BJ`&UqqW?LYkO}?s);ETEzz*m^7lulVm%ZSucnLj)c73rIX z&J|?W#@Q7kT{Lpy4>xZmr$b*ydbEulY?p7IZTjDg%}oU5QIoyK#?*zFF_9H<2D*T) zBsXjZ*Dexy{r`}~1D-N)q1xQ$ditDMSY)wyQ3!1TmBbs!rz>2-ViIGjwgU7)Xn-Tj zW|t$Sc?S(C1_!Zxk34qrfS z-}?6Y=?7QMDtqWnz{FgAa^9FZ%H_qbaaBZ`ou~=wvUv@v(?z2BJz6;)Zd?OCEr;Ge z(@fs7f%o^9kwfm_yg$$X4&7n?Wb;h{{@90*D7v?4B{ym{zN)n14HS*z8cm2Lj2V6{ z@18fiY`Bv|UOy4W+VNI){q%L`&(0xseqgqbeBuJA54Zv*`eTclZ4l5;sA}TWgx#W$ zRTYt{xXJch3CqF{I?f;hKuJae{4)@YHI^p=uD2dwcU+wg07XQ>ca zcg2OX$PnTivjSj-ab_jP30I_&l#tI}Gz+Mou42+eH8!y3+yNd+~)K@Q=_4O=MPpaiMHde2U*NO=j{QrpeeY0Dab{CVL z>XPOa$n-bgH+utqmR6)CT*z0`<%8C$z6_}A%OR<|m;!&Arl&8TwKai12L{&+Z0Q32 z+yvmy_aQ^`rO=F3>dx+OYsOag?3yus{3G{bx_*b7#ayuR{B30D1)y49*7oqGv9@rS zmLQ2k66*`XoxKQOj!X*bcBg1|>6-uW3c_JE+y7q>pIeNxcU=H<&r91r-tZs?kO+V? z5a){sVgPX_Wmnp zhgY5Tjp-BrbI&uK#4I3nV1K9s!`M3M!nrF#7T3Fj+}^_3^DXwNG^vH_F@hLYO|SR%-)10WaeO6QerE6+wGyB^84 z_k`yEyeG6^PuR6OwN^3ma|`x_U9{%P)!q}@W}VBn&+FMfeBPj9Alkos;p2UO=_Pym z|FC9SbZ_qnVijVSsm9T9K zmy98x>y>ljU`;&Acx7b5fu8CrhRNY_AzjMLj@daZaxCPFT-dOg`QsGjUN~l(+$M7# z228oE!i+|BPNH&wUsoyF9o;2d%0J|qZ3Da0jls{{&3)x@ifJ!YP!UPWaI8_Nm1!IY%{E+F6b z&kl`r(FuROZ5!Dc`!uqk2j*Cx^X>v-2+nTY6y=Zipalc~!P+Ro(>R4psnpq3V^%=8 z2WKx_`fsJp0RLd(OWS(L#n;WAhwatzd2`#Vu91fUnY`{l3`oHP;f3pFP3`oqwRwnF zEWlv%?Uuo&Mo%j@G-DKxQ>=Nx8fd6RJ@B8>NS)rGT;|uoT4BaK^;ifS&@LMFl}A3f z@-H`#bHcOjqy|(0c18q+qFD1Sh01Fr>QFT4bB$?K>S$Qt`l$#`L8cB8IidVHLKGu& zdw2KoyA7O7E-&S$1k4Mh#c!?97)d>lZgw3F{NIEKzM3N<0lC@g0ESKA$eYYfA zvLyjYTy9G#TrMdkLxEB#ZJ|IR?t*EdOA0Nta4AdKDJ8VM6w0Lp3Y5k2_ZgjIB|ezn zkAL`N-lNyEyz|b?yFBkSMN&Pq0)rR18X2`U#S9F^`f{v$c+7-6H#+#U<6tYJkt2!! zL%k*8@r~qb@i~M4Q39Q{PaJASXGQ5BOZvtGoS~nw7c#j*438>sh1H5>G{SKg2!rf9 z*q45_lLV8qo!+0CrX^_)QS5keu?F(4F%#z-tK|Ht-uRFM*Xu)*eS?knQ!G6PBvmCU^xB9;S+9ZZl50Q@4@FPJU+{X$zf>Y{fr*B4sPS zlAGS%Q7`a5fEqP-EO}<}!cP@=KXeT6+cN6Wl$pFWtF(`d#5i*rrRtzk<;|qy!;g28 z#Ury53yr#noH{B_LuX?ea-m4Sp3eq{#`}HN{&<;|B!$u{k4|^2l+(zO>Pk8fAFoHH z*E!SsVNq0ufYz79Az8ILN7?xJU`54MvYL=2yyg;CO-3V%Td&?mR+7ki6ndS*_IG1o z3*kKm?CltcDXpAWpB(@MPEM)8OO^`n+Hu$f@kkRUeq-m~N7Ye>MdRtdC7l~|FqPOCf(B=D6Ue;!+_$uYm zOwwML-PPpEi@;V!BZ>$11IPH*D>sn0FPb9@tM`H}^bG~~7Po}g?Pio5qh$@|Sj1{j zro>4I?gd*JjVS%UJ(v7)@2m;um3`COS5+2B#`2>umfIDTwjQc|gFp(xpP|Ux;-6tM zsEoxJ;}t%SsO31Sz0ynK{!6A$XqS;l$0d73s|I=Hk~y7U_$5*QP~2_ldeGB57!@kn zDnI5_M#jQo-(6pV@(s-)k>Fxfdwu1|og2uZFU^_gC%-H*-Pm9nRQH>QDn0qJ@kl|N z48gWbrESZl)2rI%k`7)LI*llk@1H>SUfP%wx_GyIMHJy-WiE7di43wg@+$}cp zufB@ghm1ya*ZfYhYHhlF&b02nLS##Ew?($Bzf#a}u^4OShewk!WlUsy)fHeXqmkfy zKf!8!f-LN}ub87IJFdjUVq>fYTTz0MAaA#_gMQ!eupt>Jqlzw-fiGMM8IY045vx}! zdHd@t8*}jA^m?cPehxSq>Sh^Bo==YPSvI8)q6lZNLps)eJArAH(MX4;ecKcYhZ<(@ z4V??xEQ|iw^ns$YCD>fSt@iuWo-}>pCI2yT=p1yi!*n{$@`v>VaKFu;kxP_#>F2g@b_#oP6zFt5u4`IBf5V94@jKtf-O z+^hrBK1IifJERV>Bcs`B$rK7%^(wOUYWzgrOi`rmQ{TCoTBFjVxoVl|?;9?1r9eTj z!1Z|zej;zCg=Xwi-N`p_as1)I>9acegaK!U*Qso(gpxBCM>te6!0+VEq~n8B?^KS! z>b8lUI7FefHS0AeTMVYYY$1p`83LcE^oRQ-H9CId^y*GIiRRvqk|!ShWW&_YZk*nx zP%z}xZ%tncrvgfl0PQwV1+twVV4NvDa{(PpCT^NOWzGE5sRPdmFmr6YeR}!Ub7##Q zK)g-BDuGn{c$osh!e|1Y%|MbeT2HR{HjF0oe{#*l#dw;|zMxmFLk(FVj=~%T{5rTg zD3B(+6UGWT|9jKxPG;4|Rq&esQxfdlyXJT!(K+9%8#*YmE)e$s-U&!aMEU_!)T>ic zws0!dad%}@Y~5iLEq&}17=}*24Td2{58O!eS&2 zd@#LXs#XI|0BEC_7Qkgv%t656rYIUKG2T9n;xY3Pp^>)N4J}#4smkC;9+ouCtQiCV z001JTmLPzU0?U#X>u~}?5k*+1*PX;3e`lTd)2XW-{t`T9bP-AGUDM5L{iwGC)I^l; zg#f@_fjJ5Q+?4X$e!_f2^7hysX?j-D-qEzcUCV9+5Lx?!r0tO9B%*vJvushTvUL^N z{YqvFx!{oHOnFk?G})r~fX7&4ZhEKz})9Hv-{U_#ACZWT}( z*p_!@sW7Zm;3Wj+E>Ky$aTZIYTDPG=#UG|%-9x};-WSLY09`tgSs9ebKw_n6suW8* zKPO>}d+P6~MZr$cn2)NY^Sw9}TD|5;VN933x#P zf11d2i7=y83pN=3AP`I`-UfvRr&WU2ilEL__!wC?^o#{IMl0YPJsAh)W5ZthclX(= z2u}0DFbW4N`UfK^ENDO!(98I7UF3iU4Iu-di5_2sE3Ja`V~8GLKCug6QRA_1vlQ!n zQBk5&I9On{0=zgSY6(ZxlV0VNs5~t2<5)y|0l7-q`JsJ~-&K-S1LOoiuM}(=hDt#G zLcq|^H6mg-!mI%kn{)s@J&?)($~pp;$AXrhuc$dXk+n5vaOqR05O~klGNGDj;F$5#aSz))Dc?dH_uWbH2yUK&Y_3 zLvX~0`Gq2Ua#f#33&m!K9)#|qNVR}pSuDZ@SM`7d1#WE?8qN#Ya=!(g7)q|bL*%Th zIQFH0fDYfay$2ZQK%Aw8!q#VI$@V%rErm}`B!IsRlx$t4{Yw%RxXY0Yz<>dbkFEiU z75J&D_IVg)Lw`Lcvtg}XV0Rk;B9w=4RBtU!!0v7_zS`m5|g#!SOlLAUL6qp_WzZ8ww z$Z!0S^jn}@!xj&%f?a_?~9Sjd7vTDv(ghb9?8!L^8SZbm{g*PQRC4|FHi7;Ex+A92yjR8L~n_&xz+=di|S+ zIyKSzCwl$+8NzpH+!6r(fdWram*HvaNn>AO&W%6AujiwZi5Jcslp=uOTv|>x+)oFB zU?wlb(Tf`ci=#G0RY)2hz+d2ctmcoiRRV;0o=>L^2)m@)J8As|y&2>5K#2=z+%T0U zOcNYySyY?{N4Nmzr4r^(mD#!Z8E@x``n%U*0rHXmBLcrm;10%|)+D>lJ6 zzM~P*U@hd`IzApnw6ke!OkE-R$Ec-oZY%XFtH|5ddt0V{`q=d1*%#v<=#v>HTUzf& zv{wT>JD))|@?h2xOQia=8gkoVJfGyvp4%wb05Il6Ml+rJf=iTK|1Vl zxioo8%3n^U`ZF9Ee*k`pxvk{z~W_a5&vY zB@^a`I998)XY>hT`3(juYbFyPSrB4+;HMkNFMczphev)3j(8o@;ymK(Sd;eWGCUuw zq|8FeQ|MFEU53I|zn^YhDW?(l(|b{qo;%t}mORq1@=@dA8IQtv$WI(P1AMjhXJo8D zROQ)(n{k&-Dt&N3AYBi^5BRC(dESuMJv@D8$B0mNnHb&{%<5P^W><#Dvk%i3v#gou zyx-h01#Fg66lC!C)0?^mCJvoSMWb&2NNdKunejNQGe;5;vytc?n_fezk4~>_okJmt zU#!-UEhN!A_57o7oV1Auc>wlwv?W^FN!#O(?L2Y80z^xg8qpFm`KpkI|MVGBH?`$~ z%l9kDkNzxqpHH3jKHFz?6YhC9hAgOuisAq$;z2hK6duVxPCcjd5+%j?xhH819}Cri z3$@*h(+nk5>E#I!_f=G!#7bWLBwoq$e?pGDkidr9d?FmpTfS0Ta&qo|+iaf@tbyww zUK6;Fqmn1Bn1H8SBuQ@GP+NZze;g9x{9lsECl1VcFrWDh)B>*Km3nyxZ@m_11#o<@ z6yQM*uIo-lUEO0*74v^uf7pvEW3Bf zUl+Hv@u(+~qAJo;2ckc842VAH8DI^4x_)n>?5zk{h8#QsX_d7S_pLwMNt$1sqcOVw z0-XjIu?jj()Q|)D$iP59ALRYLzJyw(CW*g5r_F68laqJAK)1HK0T~0+vxU{EPMiL# zsM9E3yr|QPyc#7Z`H`H>YqKh~X$@KO8g{z8nJ8X=@jOy_ZH^`R#=m3B!;sFRccMO1 zWi5GMPpa3{GvFCgYDw^2*ihg2J8YM!>So(ct-gmoBH#&D_3=lX)= z;y1ArvSt{$TSbrkKi_O9S~`8J-x3*81bOj@amIaq1Fz07LbaeZSL{4-yfwY8UDgaY zRV#%BU3Kd(-kP30{r)+NIxT2-Pm`kPUNd<}UH;i^}D_C6y zhvLF>yQc2?+q8DpT#Vw3e{i{5Drz8%i>)854?gY)pbhU~D#LVSd&IIB1gjj>S|Pq}rH@pq{u zelCqncHC7DFx^0&ez(Dv&gqB$5*Pj4#-g+4As-w*s-CLR6BJOiu+G);9zx;flE|bR zUW2zMUf)dad~c4NKl;ANl!D+&cIf`R!BmmDOzb3toZ25T3sCRz?mY#`20$7S^ zOZJeVx6HWIq1>>e5boEgNc9tl)ZAvGSpKMvy!FYPWm#1d2TY-P#ThJf?g+>F0GgQ@ z5tOPihS+Nuu&kLJ>07>?xL!jf@dLHSfM?)~ODsUN_7y1j_*WEsJWr8m;V+|_U_T(|uoSrc;= zGN7-bgRfdpIYybWaCn3%x+7&hPg<7Nwztcg$&sO-!U=Wwj*VnuY3+DzeDgAJ#Eznn zpQ1K4k9eyp&el5|DJos8*N`ADE~{-{DQ_kdcRjm}AhvuRu`fS<=wzh1wy6tOY6|x$ zcG72dMq(~aM428`8j!bkXLD^w+uTN?Nbasf8X{DEMeXY$498FZWBkmt1)7)z>g*vpO*E- zGEAYDQP+3-R*gzfDOJbrBL?|*_BfjM5$7{*qwnm@ZYtX5^sB?k-#_Kw@FPP9- z%;Re7z(~gFbF$<*1(rzGiuqI^f9ulA)=jlG)y|t$s*4x2osHbUFD|=o$>gF(nqE~b zrarj;+l+v+Lk?VX#S$r2Z!F(04COr8(U{UU9;Fw*PI6vHt)p!&iQIhnm3oNP2~*c} z)LIn>PX>hdZ&snp2w9@2p<>8VU#YB#F#%gSA9HJpIVDS)Rzn8l%|xgApl|Au)wKb| zN~cBdXHEU?5nWWR_Iots^%F2iS*z%)N_W=a-YVw}ZUbM@4#k|7if`DIB#*Db-;g(x z1D~92pXy&*gA>i2>5b?)TTyG$DEqW-t&03~9eyHj7E7_7v!4E>Xo~{g0ZHv4pO7C? zRmxYrenlMB1>Gg&j~c<3~#>gn5E zH54l~!l{ts%rV>OFpc;!<0#&YpUIlZkv9OqTTe?kyt!sntnw~c@)$w~&CTgWA1yp> z*3QvjLwa1|YV@KkhAMj{6; z8s9Z_%4s!J{KY%fjX^5vDq@5c%43|$_=WSc$NH_`P83LU~TOqR9TOwY4O#sZ-*C(KFFabA^&UY>_7VxCinP*7bUvG=sN z^n`8wTrIE$)%;Mplt;2+#-4&XpvMApK$wno%{E5EGyHK!B_`$5AB%C=zuK~43)z3o zO@seGOSSZ*OEmX8AR-ige-pe_$Wrvde{4kUP81ELRTQh_Z8avEO5U2!_~5{@FR!`! zl{?#~UisX+-3s#luG-2~c&D6>cgh5U3ZGrvwD62$?-Zyr3Lht`GhdL`r+HhYXt(Ny zJb8zj&iiU|vkuol8I2tM-xG1!DBQJ?EY#ONt{4D= zw?ApH2qMD~0~pF^K=I?mL%|z2QaDh*s#w$w1q}i# zay1#jRYpTCxXVzmp`_Sx;)OEi$!Uh!>bTAs^7Sdrg|OJe*L%TGMk5`U z{kk5ix{25=62r6=3~}eB@NwdGGO9AWRE#!~EO~q5Z2y>wGVCP3uwviJXxO*UNk!(m zY|@a==@WYhkTagys{4rWi)d0yNFR&Ub18{+28rV8uC`3 zbb7TpM6Q6NleqdV<`FfQP`WG5WIi7sNz}P+Rj~rll8)2q^6$jp-(NYTB|qYR zU?bm4v5}u>|5^Jj?N_uH+s|(|ws*I8w#~G?*7k?CskU#mUD}pw^SAA4JGHH&^~2U9 zt-ouXY`w1ai>;~F{?>C_x3#vmyw~z_%WqrmYB|`lwJlyEzL~x`ew!QH&x~<7R{=QQqlJLRRH#F5_1w%jBJ)3oi9+HF3dfRzo}QTtfTZ%b|8BlX7CV;w;ihiW00aa4lqMRX^h z*OE_gz;Mq6Y?bn0G_>rkeG(rT7J&aBBA@AQVWJTkPDyt^*$5L}{Kp5ttma?r^ zn+qlMA})=u-wo6pZzQf4(hh5)kN1v>-1~bXI!;JfDwcHLfTo~5#Ur+RvYLGvCdZqs zeP*v=$d)?mI*AYq4l!|4-kBfhVaB!ms+jn9J$_H1U!!*Bb&fH?8+84j^tsd6%f@0% zMxzWALk0F+rPS^iPI5kTk3Hd36_Wzfe4oSy@MGza+hQB{>H$&AMasw2HhRj`uY`aQ8buBbU_ zGLPHMz`u$VVy-Kt<^gS$9ZZfUdYS&pQ2%C0U|nu!iBm%=qXVox8V@ZK@oRl9bxe~P z>UG%4K0w%Vrzu4)&P*k*aoP4ctG#3H*kJN>t=LOvrUW#sQFGd-w);ztQ0t!A_MsSG zsg!wFus@+>VrPnYSUzWJ)WHIhig(4GRfH^kPJ~SIIg{!b7fwVH2nQ(&?u7Oo>F*{6 zT%5MR$A$)b%8Y8C;z^0WO&MhSVqQKv$mx5^;f1G2-M8MMZRl6j$;3aWN&lDPA+JTqP~_yupiry7c^l_b-# zFX+|r7G-K68uX`)k+?Z0{=nf*rr2P=vB#m|(?&0UZb)F zw9la%RCC7CSl@U$9SrwowumU)K8Jd2gmF{=-@|0GLPE3r#}XSRsWRusqTYR@rIIoy z*fxmm_A+C4`?WqGI2kO~wC;0K^O(o%F%IYALXSRQ)t>XH*hzbd@v>^)XupH^_l2`* zUQ#;tyr;qmV{vw@l=l`2DxXVYlNcS~4QjQ?q6)DC@y)FwHnGp1$PF`gl<4)3pl*GR zS^GZ{|HP1k9nnrKNUMIblZv8et$&4W+c| zr4NdKx38EUO{;CbzMhiKQPApcmYRnPL;DgViQx+NTdz^&`G&}*FAZeM(X3OKG9{gf zfpDvc+U4sDwORU}O^+~!f<9yqsLQN5vhzt%x!dyYQKlFV09`9-3NIHy5q-9_4$4kjDdQoL z;N4-N9bD-Cw*@OPcF4qz**vbqu!}q89&vtbgBjnLp}*?4>QpWxv++;jU$y!B0CL?E zOESiiHEWC*enoCym znc<`jLcXzEYS-z9T@_#2YWMa99MP@PKD23cdd8mv(rnR^GsIi|A^uTot{UTpi@E?R zm{=X2wC5oa5IIEc?SbYmFZiaH6Z2cD5uZoR zXQb=b?Ll0>WHe;8{iAM#+elhM()H`~Fzz*ANKvCihT%SMKhN4j`Ao5|$B>HGADOGk zg<&w1(a6MR)FHm$r(qO03rqKzk0atmi6TZx7RR)zm`ACLyrFMA<5HVK;swzbg>BR< zqmjZj=^fIB2oW%qZHlhd`2 z>b={Y!Ej+;r6^INLDZQW8|~%FC>oJS1MdJK`1Ro)$Y28HH01wmf*0h{C)Sg9G7`u3 zVQ|E&Vh=cquZkg^cXX5sXLfRw}c7oWV)KDBjpR}?-;bbA=HAg+?2w+E^fji51ClUktGk*(u+VEwuPIg*iJ zgt_WGa?*(OC-kGD2xS{0lpiq;JJ{?%+>+tBf~TAid0jmUUNRaveD9w{qaAr~RASg! z5?6>~L5T}qwa3b%#azA+GW(1pJ#~JaBwm7TY%YoDjK4XP?Ec-`9pwJEUbB&_lJB2N z&Yt;u2RVCe>9@#D+u^qQ`xs0{7<#%fbo-btkl`#o)Zx%qbi)th~92{Ccm{wIlne$ES|R)$R)$@EoCam9BH?_YlcOk&6zEVR?LL>!7{5iO+cirR{GDE^oY_$?~LVIwA+B4(h1V%C}@%oSM0 z&!EBxle3U}uJ}wVUHgC4NSE*afkt$Q%-Sm%f}i^@>_i!f)U9h5Tv_{`V$}x=n*P|f zZovmF%I4l>;U!;Q^nEISf2NoLhbZoom=`tBH|WyyZeDA1sS>5We3D##9VA57ObRzY zffM}c6W34GuA8-h@3=u!?>R6N)q9fl==vE~N@Xbw3C13d71iYhH$q*?XyoX1FThg& z(i0oVuWy{)nBSrs6Ws$UlVk(87rogEYw}dgf;m?mPG-pZ18~jAo5_)NE$2;LexMeB zvt+JtL+0Q6+Wa!Vdn$Ex&8q0SVB$~__<|z3k9U07txd$4s!lgvR14(EufqvAw-LUc z@Agf-ar%KB3UbvN?E3u&Yo~Wq!UYY_>H7+q^kB~Hu*AuI2hmk|GnqW|D#z3=QtMZA zXp1Jjj!)(W`|`O$)H%wNTdu`V7LQn0oyNc!$=Cx4j_1otnSgaz4sn{<&U9aH``_T)ON5 zhDkcMoXISo=d7b?owvuBtY%awXokb!2RFk3Ag57uuwA6}+miA=;}%g$E^bJP(NyhC zF#Q8QS2)u*ID+iaI8IEYn zfdVbJhTb{9i{8m;NGKkGO_lr826ESTCAs^b?|~!E(F?&*y!n(W{pJ`mWE`|*hfOIT z$|g47is_U$6Ww>$;U4eyG`s~wb4CINr;cK&S1=uSLQ9YkcK>W8w66; zOeU`0v7MZ)MZt=`?@On0=63Lc(X$L*;=!lpRDJ*pC*oy)pDWsDO;Me?p6tD|)(SAm zIW#hP|B^bE#76SMol@sM`~eu^OE1%^pCg4vf4oWK1CK1ilXBMbR`R9|A&t zjPo&bPpx&${GX5`rXNVB&}k}0%&`m3P8QN&kV65R4YIR_vakkZJ!!bSQslg!Ap{bh zlw-Ex`9GxvTxUCc!p~|QNVkk5qsxaxfHaa|bf~PXPavIyp&Yk$&PyeV%Pv5g-Lc5e z6Yk$L3$cS7nhFv`kfj5k9AF{qXL<^e^4$GkH!qb0e^RoMd+-0uv$EsoH3~5V_lg8D zBtIE4Y*hsEnbRBzkHGGIcErmEaco-+c+*ZVb>2?rT{NW9x<=2wFI{ksVLYQ3KPze3(s7uW_V=0wN zFpUc-Er~w>g&=E2b;w2Ap{WpG_0j_pua6!Sc~Kl3QTGLUQob_d!uvti zOeXJq97p%LPi`Q4ACeTyHy;Ks&%`7}z7gG0TAh(G@q8rAd3rqKV}6dj_%J#qZw7>r z6aHJpy&H(@chXb7@ca6+X;RUcdz~wxjl$TgO9dj?h<=3J^?OX1td(rlymbnND&9c0 zJ|c}#_bB@1n3x3Qjr2M!3+Bo&Q*@?HzLBw_%2z+iwzbQeiTko8G^}wAdG}Fi?mHf< zvpPiamc)l(XKn6dU52h5H^LpZ3d{{gc9DICW#8VO!; zIsAubKCy`$c}iS)#DLU=sHM^2-0+BdoEtam;kdSp4tvz(yr(fMvSxDglL%H(KL6o* za`)5HwEW>2@Ul-#QurM493IT6$8&5Y7cghJfK9EBk`>Q_m#mrS76Z4kZVtNe+1X?G zIq-5#Og4j;xKsEZyKamxx@^i6H>fM=BILQ}z)RLlw%&4I-EPxG9M4NDpLszXBZbKk z7bPgzdZTQA(N}h<-K7H5ks0U3gbNiwZj}l ztz5^;u$su5MYNj3FV9NjpCOH|1xx;C(T599QMlUpmT>cB%WkGhP^eq|CMk4_IB;X8 zS~Rl>!QPwDdyI@B0zC3s=ZOH2*J_V2US4 z#k?x#^aRHA`cR$i7EYt(k58dD$i5?oJ5U_wO z-Y#ncR zkDz<{Csz)^ITSCMGGU&_29oErw*p>nL%oB|A_Fk6FU`Q2oFsd;d~vYnRc; z;X5BbZ|d2<;L(FZ=aUpbC|l<-5;Hn_nTT=F6SnoHfa6Mb{tcs&HIs>D(A5Yq+b}ix zx7sd6mw94xH6Bi4IHF6(rHZK8U>(f_5_s%W!PumQSNeFI);S-M$p=@iA;0?M`O~KM zy;j>f8!vPs#hay%*20qO7yY*BUy2i{C@!sstxax5pGBF`sxm&FHF1^kM4!D^Fh$8k z*Gwk~AH~g8P9q(!f3%xCa8z1~Bky2Yp=c;fj;LtN%7Ai|@mRgQzF*+&Hbf^-X8gNQ zf-)L8Yz3fjJ!V*dCX?*E&>5p^%z*{k-GfwYIjoG@@{P1-F`K z|F?_eE`4T%Jbu|N?c|rw?)w(m|2|%$XMR*WePuu!wFVhZ&-9vOc}u^J#6E%m$y&)( zpPY^7=SMZflnq7fjw-7ul!4xsi&V!##Q6!tUfzsb^#9qXp8SMHPsSZ3JfuP+{bS0p zs@88{iKd31$eYFR(Vy0^Q>0{;06l7ln!kic?hA_-0q-k7B}xa0!W2{d6>*A-saUGW zJ57af+-oqEsv#i#Va@L7nCWPj(TMKSClOZrr9&G?^Qsv!h~|vdGt^8uxve1t>5R|p z=1||uz?I8A)nRhMk86ndUOls_T}C3hrrmYqyA9;!)iYuY&F(vA77<0~3{6d#Jf+dg zoWMCoS$)1I96|b@)xpzsTTSepGk`RjOCwKw717H3-+R7`+}$a0eQeE4T@X%g2trP+ zQ4g}(yt7akwP`Dvgvjv3wUpsp8m`S7B+R!juAQj|fs${p!?1B>0d$XaNEmdibBHUc z3Zp3-;&TSXVZXBu{A47;jBi0gVesOO#Jhe*^g|Rjpo5r3irpjb^prL#2yo<-a9azG zc@6c45-j=~z)(gbx@RL&9F6j{=hu)^HcG=bbb%|jJcaKOw|ru->KS1f-s!XQLzQ?4 zaZ_D0+uLQ$r0^x!qqi*mcq4hgYew|rtlA7-81adX5nF;xpv-awZ6VYj=ahYtE{bf1 z45lRK%%}Iw7Rkwlt4a+_n{K zp=4(Uf@L^b%gzydTwJZYw_-A6G&1ql-y}4rRVPWS#h#45<3ijGhT<)@Pd|)|N~0lP z2@Gm`wW$m_aw??$KTk&AWi)c&n&r}^?a0aE#2(xx&IL^+6|V>$bMLT^8{~(QIbY0} z>raUM`nQ3fj7B=lICAS?bd%ep4nF=pNd42>XS(1in>?fO0tk((EGn11#{~~~)bHR# zrl;%xQyB@^f5^Z3&mGdj-*PHC2yr?c9TdgMl`r%P>_|AC80{G`k0N~+1K!>)YbJ%K zC+nBDjbz|7iC5|LnJuUuGI?5~8c9M|(5oCkUXJQ?aUfv$e>kGr72C&@tlCM~M5Z83c3BZ3h0`E}Z1&KeK^6c$U-8}u?bfWn)P>KJ$5>kHzHhOC>wE)^;!A@3354uzaeWS9iQ)l zu4wyc^B6Y+C!>spRK36NB+qiv za=g!r3YTvzt*NL|#u%m59jvI8Y|JET9w|=|rB6h7b| zP8dE~URX~a*g2~qcg>tA9p-Hd+Saz5-E3JFT5`prpEmtf(MF&r->;wLI~xNK^tpVM zuNdsUs5vME9buw%V@u6#hW{6EZ~IiwY$Au;(qDSaBhE0*1r+rKn+p!8IHM^&=I}+v zlfx0Rq96J~)=VaEn33`$_Vr7vb)#3DhI1R!&^HwAEwZ_UT7xJqHU?AmOWqk|z{r}3 z`==-GIQYmnI*G$43Fq(tctMoTX$;ZoDkO4T$*(f!xKWeR7$#>8&#c?T3diM88)P4m z1N~7NQvAq9vehqf-c3coI5=}!hpV7f`Z3zdo0@R-L^kir|$W}%nudo zfF1;x6rhhF${nyL8DQ4{g(8z7`!AS5L7aK0q;RGN1##*|WNT=q175*6Q1u-^$1x!V z9@sf4RH8AHLTF}3=e)Fo3kPTIpt~b89qWJ;got~ZkU&wt5Wf$g8j2zY$WR=%dm}R| z*UbM3Dg0*PtW}na&8%J%ha;5Yy#tcQ@2=QcK>2tr)jFT;oKmY)A7>Q;y3{;h6ZbbZ z&pI>Fxn*0Evo>UajZnCM)(Jy9fJ^`d1=O9aH9MZ>TiZ*&UC1rEOzUTA=&AwWM+ z9RgF-B%tDcGNU>!kp&oe^L+Y~$!UPc)tv#Y!!vLOSda^XP_8P$1WXpod2Hsc>6NU8-vQd1pU;&$BCaK$uXhl*EBeUTR8806ee zhss%U#FFG-0UJWr3@y}h>cKlSon+~Vq&T*ZikqD#kBV;-SJK;)VUv2T);ti>*=#(C zjM7WX+-AZoMM0UBFHUxm7e*ys9~Q;?c@MU!sL)1C`jR=GifL@caQ`636HSS3)48p< zM!mh0+)MFmS!L&g3$5R;4>s5?>8Mr^9AizP3X(IHtgEX6H5$iB|U*AhoX>Q%0aUfCul zX-=qk|A}kErruzIRz-f}n_C~_#gauF1by!q-QxF)WAr-;+C;U*p(=m*T8?Sl%I+iGs`AW7h5F*zepc+-y3`hptq*}fvt;v~Ji)%ttHN_sA44JT%bE6WJ z5YVb@N}eRI#+t~Q$rDFs;0pL;Y7=?oYUy?K$=5|m>1#-e%V@5IdAq$7*QtiH*(}js zL$9QBTQU59Z9AyHX+62)8mU*092Do#*65W+)7#(2Ig@VFkR?$~*vL{cv!h+sN;g40 zxNRM&5=l_5zgFB(Ry)l%Z&vC6h);}aVZmhrJi)qVRxxnj@)@21}JN#?-D7*aLe__j^6rpuD3D5!K5+4 z@Gc8e;77Hp1f=fb8?b)zW}>)sB}6#>@H+DL4HC1JH;NN)ZcMyQR}93Wo~Sx)E;xbs zL>xCl?B=$TBR8k&Nk%jfLlWR4-@;P>N$uyu4t&p&BT#UkLsGkPYU}>D`xRZ2G~-cJ za7;KpWMWcDr#>~DjaiLBGJFdrQPzx-t7mLGc*ia4$Sb!}(t0a8C2J;(Ke&w+&00_P-74|A={8Z|JPlsFJJuWIGd5*-uvqmD^pU%6pMg*4 zHat6JBy!{mEAD^va_#!Qw0%czN8cbRNXV2%nek-DP3%x`AUT?gmjmS#x%+nXP1YGfS%VSEt8o)S3uc!VoE%`C2Pt5 z-6;*c?Jf))+RusQ5GS$fDGm4ga|W$%IAa!IlYK^sawLIDKmBqhqTF~_J!c!IZC^Ai7UwD6$b>YaeRST|M z`tVX-ange4mhNr4a>*O*C$&A-eouR5@mWi5TC`+I%c8$7x~^sCihm&`>4Ft&mcO<9 zJIjZVW%SsxFSnWS2ao-Cps$@M-`TbGG(o)wMS|5RPp|D(ae}Iw*M@`Lf-0iMKY1Q8 zrZEAx*QRfiqp!VJ|2!xtwE*yrbjLIywwqUJ@wt)*k{>Rd-Mw;=4mpK@|)uxhT(To5JW>s zxd{C_%5;a=2&-XOj^+7K(+!QjXoF#upjD~6;p)(08rf)fD6HbUgW+f}CU9Xc#Boj6 zH$G>Curj2IX}Yr8H+Yu*Z3Tbk%$n~c87#0IuquV-9atS zbh9kN|CB7FX2PMSZ!|uS@!=4oiK)9eI!IoHQD}o2bvN=@!ZC~GR9(2*&r4beb;hPZMRwlfnn6VIw+``u4r%<)SMPgq3&o* zNmoe)?(j%KVj_Hq)u=+6u(s(?<8uwK)J7sIWw%O*fx8MT5E3u|NQ*iYW>r`YzUhaJ z&vBa$M>U#Yw^GY;SXBt6HUdG8v1%crj7B+FSDNl_^gYC}nwUzf=?*H@A#^4pbPHTm z)6GO9swjS}=0a@K<&m|`@9V zod^NF)S&eL>unbDj}bmP>f|6 zI3q*hXcL+2q|DWOqUtCgiD74Iqxgo`L}T5-NHo+Pf?rh?Q7XfckhbZ&(m5PZDn9%f{`sdx?&cu{qRtRCuqhQPnVJhu>up45pRH-42 zEE8$ErOmXUMhz(+Nt#c)Cx|_*20!d@NGH##(5w28gLNTclsq)wPo-XI_h^)?Hq2^O z-5NoQUWG86peBMJMnVxmh(uMaCfsztG(*}ws&FWXkGSqokiibus<60BSm;)AnxMc4 zDkdsunn*_nogsb?itU9223wE~L&xwjA>1uMS78G~zahv(Bk-}N|Cai~@1dJprQw)v zY;qk6>cZBP}!r<_RJVeG`c&V@*GAe2z1Mi)f*| zB2l^p>xv}8qcbraPl5)TOU*P*NuLXQLdr0TG4o+`Ap|)NVv`7%4Qw%%V`6+T42{$D z1L<>q52g#9fwGRMf{=ZIq4SPWgg7muiNsL5KB8z~WDwSpq(u5;}ij1x~b@HkF9*tV1(nfG@(*qph7>%MA40Jr~!VxyeLW6{w z{;SUWY${+uR)yYZ&~vIhg5p^c!#_i@2#<|};IF2G^(#Uz-6lQKHi2eP;s8-;AYlTw zBoAz#?vPrI8CA#lSR{l$ALW|vlm?;MqX}|qr5dLLj}r^)g)Fc7APK>I($?6LkPKZJwi>}BD*2uSi;Sk#yy@?PtKUj zWypn3gPp9IJkjwB3TkliB68@G@2r{n=hLGGAa6Y)8MD!?YE-G$a)SedW09y{J*)|m zTb~-;)-G!%lYMW)um9DrFCswR=$u;r$5EqVljafXdIP=-_}DxauY>8UI;yTrFVf!_ z^8O3xkF1&KKKRYHDc6hWg=DdAUeI=G%dTesvfPqO7yYp5B}Frppm%86(&QH!51_m{ zcI*V2#)8*Ms&kNwlL*~(5bo2_xX^0yeQXy<|TtlvS7>{Fl zGdX;lyLYPjcQeQaaI!vkFFRDwGR9QVjw=r-{vJP(H- zv$x`^4i=;2{73N}~(HYbS?w^?SV<9iD2h-S+qcLm66L)4KMQ6VwN{o-u zSNEJ&(xUIzhGAfwY#m%a*+Sdpp&6nvDsUHUuex3IR_l}@h}hI1Y8;4Kh-_xQ$FB`PW^ zq*0I}MeAi6S!zj#aW>OguigOGNPwr+5m1<-CygJ|+M@1C%a^4et59MAcK84wT>zh5 zuMshnS(K2d0I-iE;@C%R(Ws~a@Nras=-Shu9#^q+-)za!&D<;*BL;T0o0go-PJM03V3}Jp z>vXeJ5R?l+#SEB^S(6Q7{O3W2mrTc2k#9DzL9Q zlw9(Ai9B!0+U9^n1=C2A-nAhIao5rKQklwNm|L=|NVPBU7XVaOYy&{5-Swn$XS zKXMmP{{xs+6l&Uv)pV;?FPF$Dy8&;T*OSE7f)a`|P&3s{lOok!g(nQkYXHt2>fkY= zuCHZ$eZ5i&iY@^C3UxzLbeds5_M)_b*OOgzxAa?7it#`g2a@~jDCY!Kfl3bc@|wqH z$yg_BmNdqN+9nVrl%TGx?VF|20tKkn1iXG!jqpQjLeQ2DG^i}JLl2ThfG1507dVjk z(JILn@c!%7kZ4U99SRfsApa@5a@Ez+k5S16(ALNgL0NCwa}<|Iq)(_9Qo)#@(@-tO zYlI$%P|uwbzOiKU;x6EZQYr+JgJ7b(73yT50t_^#>J*7FN;skD9CQ^n5@Z{QW=ODH zea)tQbv5r+(ef1V*kLL#Ybfr6ot0VXmwt>Q0LXnoeGZgyLhTZi5Q0JYga;%lzDHdi z7RN&stXb4BLLHKIe-x?n*OA(+ou%%>UZJIskfn*jIDXXGfgWm`{V|F~z)6XMHuw{8 z3ZjA+N*Z-ZXA|Twh58zPIt{2^gOV3GYtkFKCDy=hqXk8vLQ+rxsCa?I9aW2WmWuQi z$Z}>Mk}#nFSrqv|m6(<>iHs8idkng?UVq$=%0fWZX?b^+3Xwo*ZmKY$^jH+PG5h#s zqq9_ds$Qpr$84cU3Y?B`6?A@4%$fTFMf&ms>FaJJj4WHIYEpb*3Ku$)7^+1f62wp~ zgVCZ>Yn);YCl)tZti2gQXlX6p!DDn9@HzCEe>j`6Kwj$V(9t zM85?$QpqRzK5I2QFkljV$rQaKt|qpp(LouFJn@lM^5otAv~;g~-b#M3u@lG7Xc*Q$$)>krQnVvCq z$>ptjJm&fxdo}sR3kc_t)25ERFmo;qTG~N$FNq65krBjxxgx_Afn|nusXj|7mNJIK zfgX4XjN~+;2<+T((Dw2ga`Yu>pdBxZJ)^(~V$XVqy+HUJ?&%o}4d>lOUwtJyw+LDe z7|h2Kw+yoH$dRADFNJd)epwp!tACz3W!2}Yh|X5HZ9>HB=c$Am@W6rqP^bja%Ab#o z55?H1F~gKf!}k6hm8VW}%Msk`Wh8P`=!WY>iyZ%juS$REl)s4cLh%yBd12!Lz*LQn znFqC%aeH(SaKwMXqeIqA4%8HDi1Hg}tt3hxPzav+OFaZ_2l>}uApqzg#Y+%7s9|*F zvMbT!?h!1(R8B*fzrnL6YbA$|=ys9s{!Q995B)E=;Qc~j5yaU|7~+T=aM_G(&=qwe zeiU3f$-39@w3$Pv)kg<4r@Xv zG)wvYQyd z)uDCdpKnV1+TRj87;khik{I->m_A!9nNF3891S|9nrzQoU?`)}pwoJGSQk@dwiKf9v0v4QQni%!bG??PMIba5@c}9vkgV)P-_2`RBjE zPey_h&w>3!i!Qr9l%%}y5oQBgselfOUQY)M03*DM?@QQS0*X5!h7a53M6Fh>;*Z;_ zvd_eDKKR`_Z|(YcMwG4HpMW<8pKlC)P(RXJE?u>xX%0E#k$By%Y59 zvAtc^N^btyIeqtSU#@`30)cxK><}?<&z#Bj4lrqL)b3*K#iZ)`E1DHM+U7Qr!v23+ z?`v71uqrkoBE5_sUs#`h2cOr*xrjIC^IMChUKIMdU}oL*SF|YF+UAnTL>s_ZZo2EC z4fp-MMd4Gd4AP3SVVgeZNQ~r)0QaWrcKroyiWA!AlCW%W{G;0OhWie;DRwDVwYDi2 zEM9!!g2flMj5Ys!`O>8h$u#o#P3?bFY`Vnx$VKQMv@6VZNmJI$7IoEZNXREjgB%H8 zRovb-x0Otu{~@$ihF?m~d$H6p^~_a882?m{(!5b!-S`*GB$3e5&kv*$8hao$944_} z6p`{bx0yU~0QIi({_3Ks2YyjJ59clW2u&E(tXH7~Zm1NChZ%##=;_s@vt?(L9KNR5 zxkJsfoc6e=y-$B97BlKNSX@74zTVoVAh~ObYfu&U(rbz*cBvlO+vsH>?yP8dpSS24 zPxKqOal(9~xSBk5P4R@4pCV1X)wXSF!@(i|#w}@|pku27XEOQh#$-`L$^?UxH52Bw z=eA8fNs4;Klp+~_T=BL1qLxL=-doUSLM7+#FMIEJ^VAep;`bQ8^3jdxooYRY@temo zJr&+O>Pl4Nqk-|Hh9qmn?H!+Lp1P@4+^sm5VLzu2u`%a>Dg|B3dX+jM8Zjj!mC-Yl zZcff9I zUr>>RCF~G}9raT8-YOu-8W3<{5jsHy$BmQ=4vC5cWN`VzFv_Sz86CwDP(*PX78Mm0 z5O;9+|GuhQ=T?{`eVBP39|$M+t8?nqIp6ZW?{~o&=VVX+h>4HvdcjNQz2HA(TYj?$ zPiDDi+;RG@7aR--)$`yPo_|>T>=lO}d6Iu2Z{_>^-3NEOVCS7)_}}CUIw<>0{OiUY z2QIjPE#iM$+IPQt*NEwzw_@e$f3nX$G_=k<&^ON~U%h$wf@Smn&mZ6MKf@OsC{2yW zMlTrMTTY-|`;xwS@!YS@-F?nGWz!{@b>9vU$FM_1yf72$;Y3}?dVi2l^ti24Nlg2?Z}2d zt{s@p%<$A6`E-1yqf_aum@(Zb$`&6oF|0M8;i)CckWP(M8L}sRs`S~@hY#r*+FiXM z9XLtF5VhH?|Me^NUeNH=Vr54MhobCQlaUu@EBFn4x0G<;jcP{P3T)y5+Vrqn(u@ z9kfctkm+(MEK+HA#c*>pR*PJ;QQ2@(fr(y%RAD6jZ_SoX73IFL*?E#THD>&F#pF z>0nzbcI+T~*B zfj3FcBJ2M)Ud3J6+biy+?QZ)H-lzLwqh<<<#c_etSP9TZ@SFm=1#K7j?bwSV+Xul_ zv15t%vSAb6%ZIkIV{ZE_d2MdT52L0I)=JrNx$7-6|HL>@K5#*RLfuG^VuG^;ywd^w+W~b7?5Xhh z19uXbTh<@FqFAcl?Y?b0yG`w_Zg+<{>0tJhEoU<5x|CWkB~mle!5vntfEvrToFp!? zmYq=9NkK=0YEFT2cUZYF0jx#~4X}JbbQ1?KSPLM1cjfF!vU~YAC+~jx7ZfNnIsm@pC(};dD@m6*~ZYi=#?!KAxJ7qXB1BcC1O<#%v3|m!26{O{e9DF;LbH z$V3OQoCgLm0`xuM10(cfuN{X`P%#6X*+iIZ9uXPaU_0OD?W6bF;IW%Jz+&~==A_)~ z(aBs-AE}-$78v^Sxvm}r$_3C>YA~X866;VX~vHxLobU5G|eoS zGP^fn*wg`@SIl^(oo%}A?Mr%}%JvrQRo!$3E-;AF zt#UgKOowgk;RREBb>F%kTveG0CeeG!J;re@L&H;hsyXQ(T`Pushx>BVb8AO*EiG4; zbU?BdOEyf1+^5sEG_EY^;A@p7pU^vWUexN1<(6DcdO~T*izcCSJ`$chda2fa7@GN^ zKC^#w->lK02Zr7?v~uw8gP$Kq<>t>*T6t?R#s$@=Y;E!6OZf!Ty$vS zhzhzMqJ>bWfThPy?Y;sR&G5)c+wcLvO%pxhx5gmY1E?WU8pKK3@$dwq+P!Kx2>Xr| zyDmUi$c;E?~wkR>d_rr0)TZ(O1Fh2An{yM~# z+JAM2n_PfNCxPw)s=vjugQRC2eRqN;L;+K!=wY{N-%!IN3v_=11xG;ez|k#$>j3=4 zvyIy+5dP2(YF}5wV;?FD9G;1G0v*I{V<&>rCaVcxA9ez3U;9rr+>gz`_95b=LalLI zvAE2BIst=^2XPU)YISON=flSdb%4sl+90-RK~Z3;ggO*>A*qDCA6_Vqwh1%uNO`Gd z6BbSEL#vaQ3bToe333QtrDxeK$YAWIz^{E(Jquh7D!Q-{Iu3|_AomX2mmQP%CiKk| z?*_KP7BxIH*`-!2oG;|)J zM&sjX!^#U`+1O5OIi?2}zJbIp>aEnZ>@=MGkg93HU4umKaSgXSgtD9C?7 zxH4OP?PH6_!e$giEiZve1nz=Y1$_ovfy9=G_Es_3kP8KYsX)A?g6Gttx^SW{{8`<+? zXu&PZ~VU@5}tfnFK&@j^ojJQPsbBYTC-wi`rH`XFw~HsY}0NGHmfa6;c@;S)%| z?bmVv9wwXcpzfVV;Ssth+RBGvZ8YLAWFx zkdq1_0Jcm%!Iq8CPSk?a8>O|M=EKJ#_)@l$w%E%;9b#=F?1XZow%cuJsE$eUEY0rn zKeS}I42Dn1AsA1z^ZT^pcOWdvAsi5y1(59GcBl3~-A8en5Dn8XNg;Z2J#)*nVh$Dc9`B85;HO{on4?9p2c~!8b!Vbr35||tpk#H5G+E2>({VAip= z6$lJZ9j^@Od}+!MArqwbY{jaf(Y?Se^{UCvwhiqzb(~5x;Sn`;E{%#YQYPmfOgZG? z8?LORX0~l=c~YA3zzhCh=9G>~n``zoFG?<#c?L(opD4N+LM+Bi%Q2RChvp z@r1JDOroj~<`Wtxg05tae0Vq8TwM0~S?> z?A#Nt)1Akmy*Hx~X;sWP^pDSv9o;u`h_a*;q$x{43~W+^i*MH70|)1pa4g{dPaoe^ zEIHPOzerU{YX=;p=A#o9mR5pjG6*7G5eK&J%B|{J(u*jSrEroEfFi`Ip^O_1Exj4-tL*4R_7yvhMdI$S-EDS4S$){{ZZ5pcR z?pl^8hmfDa$403kAWkF>3fd^lptD0(EU%T}7f({qU$MD8nl(3HS*iOHB5fnvJUn$y z_XT5y-@tK1h$D}2EmSfPm@vs5xT#MdAX*&CObD!yvp)A`#Za%BxotzcO`WZrOf+>x$cAq!H@iPUycmeZTkS=~46H%SXcB!Gx`Is_(Y zdx+){86_l7Ei!LrMC4kr;@Xr=r2MC6=gjWXc})k^5M-T*A|;`~$`FzvKtv=L_(WeO z%0p?z4*0mP(|pONt4=fL%QoN9o0Opd=@|<}9o`Yv+?c#4p(YAe39>XUDme)PA?331 zX+&mmd1ZQr&gib3*F+wQ>>rzfbf?7jq#cQ|h?>d9AfZFFo%Z&epJPl{-*e|k_V!P2 zwduAqp*3nkVGxllBPl4V24igYhIC1h2?HW@K5 zX%pGHXy>5KQ~oSq2@~-`@me(3Db1gskEKa9+fC8`A@f3F!6hXoiYhI%e-JH6L>!2O zO3x5x9{JVkQO#va)az)G<91?l(jHPxlDc50i9VK%78O}-I{w2WN)6dv(#@n0JdZEaMvNOcqNW~$xOv$#2BoJA7be>3h`*w=- zGzCBub1G(tDo**dtNV81?y9-XHgiE`h~ylyQtURDG70IEiNNG!_5mHCp`^^<^h@cC zn{haD9fWbz8RmeSRsWJ5{~6iJddaTJkGqZ;6ye?ue!S{PG}Sb8GG!G@d{p^0Ly~R# z)2Lc{qq3xv9#obHDgrOx&O2VPeQqcgOedLG`Ed`0v!ddxJCE1r^YA0|@HFys6;oD7 zZ9Y$8T>r`HxnJD`)df3Q8PZ8Jb`6oAoTM&RxZc^uPgZZt?HM{r8PZ8mRt(|$bZ<;O zLnkUjI(gQLArY|bEuE>{$!*R^+{wm_1N!D3H2b|nKN#F?#sO8fkBHIiGJ3`82Swut z_B*tzqmDWBJmmULI(1ce@lh++&~NQMZ<|7~dh0(f`mKHGJMY}}j{dh#L8yryJc*w; zI4AWS7oG;A@W|9NSH(xS-7}(W-wXMP7yNN{d2%@#z55(uWY=Ff^?Y{JNmuTkeeI&D zMI+vWC-Pebf9t$ME=-QJSFJk#z>CiE4m$nN)3TxSrk3sW!avToSO<({r=BTvu$?U0{ zj$XPvike9~ISkOdy(&nNfqF^|c1+GSF zEGcCyY7RDk8r1vMaH<&8v?+WAHd2~yEMk{FGLY0lY+M4o9oMS&<-^A#DsUdsp&g{; zEb1Z*r|dwTnHa)K64cTnsrB+Ke|sH;TOd2AXyX491Xw7sQ9z`G1Hf&<0U3b%X;KY~ zYyaDQmau8!f*@p?P^+O%=cbfb!WLIkr)>sFhe{6uiM4-phX+j_-6EWz_=!ra1Qrzd zxFab|BsTJXE`?sR_M93HIMYW-(52GB54(7~6Rng&B^AClr4R~Mg8atwO`1H8caqVyU z@UbXpO6kley*bgrao|-^CPfqzp8|Ku<~{&u;AQ4P@1-CV;If6O&%HcBRf$FSZG1zN zE+?#@9ij(|A}qS0e^HOpN?m+N#BOtG#=MppT6Tcv5>l{DO&dq0_UG!3p_Dut{%l94<#XbNH}3)PIl_d`>ou-$Wl4LB1BnDI!xTPEozJ+9EY; zQi-I%6?g2~AJntx1kSamd&4=Nrwf2{N@)T;ej4cCd7YQHLKf>gjMTOwyn^cE+$rZ{SZ z+TcU@qcn*`Q_)I}RD;cqlL{b!f-wiAgFbD`6X9F1Dj_f-FgfYL~ULxD(u z$spvFzkyIK-vmk>v7fFg2NSIDZ3$eU15AbTFB-EQ9w@XO7_CXtaeV8baxf8xnO85Z z4mENYnN3bSw!1?`Tmli1ls&K<40M7(0-aI>spZ54M-V$mZaOX>kcluP_3uN~V62&- z3gna`j6yY6o*tksF(>C472ha6q#PV3K1Eys^oGQzyl%Pv5#?a8 zMj#hCe8k;nf?%2GdYeqNBgANl%mH(Fhn0g7=*1X`6)KM$SDg+^$KgP5mj*BiVrK6h zu3orK>{t7R8m<%b)E-sCbpqJhFV%3Jz^(R}8m<$E*B;M@bM7^D!q3{z@$Nn-dB68| z;RaC?Y0{|ErbJG@gBJv$6eJGoOSl?vshSp7a(!0!sUl=heH2x>ITMjHNBo;N(I&XY z1LzP0QCs)C`j8s#$rT4^1&|3RvrFtaL7>LXi2AgjfK?$~RUcHtDb;scfc4QQmF!kT z(H`k$Zgw&?pfNx{;9<J zI|k`NsLAckrWB9|5A9Bnesq8|p}}K$^#S!Pw!mUY3Qd4r5ZoDeU5rx!<|GBt8?d`O zUcI4)<4qH5LC~;05u#1x%QHoG94bwV#f(5$)Qx;N>87R`AOgz`HUR*SnL_C12;jOw z$DFD-A2uSl^?H%qJzYrSTjnmFbNLHM<5$dh4AS_g1_m0b@pWUYepT&PwSz!o4)$d$ z;@#2S*;wC=1n;_`Zs?%*`nsV5%p9Ue-;#*90`K-%)G~zV1zZc(4Hj5prl#}GD>lHw zWm_bFblIkAytQpR!|P_Mx#(<`iXAW|q^l_sX&RcL4C!n$WyqPNH&b3Uo_5iO*A3)0 zIOMc8XT=7qlf^&3b|kxWQ#Bgi_M$CV*XY)}ph9Wv>WUo-5$7CyO@&IgJqw0<{W>3l zvOwjVoQo8`HQ!2Iy%n7=sA9*0u_h%ojki)$HgqB$Wy6|8dAS?X>+R+K+z=ovtyoDJ zGGXjyD-N0%&EI~n9I3{PFsT{gY2PMHZOO+VXoBe~F1KC#tFvrRJ#rrzG&(t6>bG80VN zq^k2Rtz&0+>TTWarWZ#lJFe7Rx{00Vw^}y>=54OqTXRD|?6`fVk3f|nPP8D(7TtX1 z=!UH_V%szG7G*{!a;=yl#?A85j^1=GR_mq{@+vz}{34So-z`^;=*{OMH6NW=xnc(x zV^K=bo6m)6K00A`#SZn&;%3vC&w{BpclR~I@EY;CvIEBtYGfh1qP5*F=&qYyU|+EV zZKAl`^opbBD?2(F0cD4ig)IDwD8jB)c63q+6+7h2vdg~%KU!x#3#QJ?-;b28b&?RJ z9m?@ucJ{&7aJp^2a-f&x-DZ(|&Rh#!tqc1a7tVgm(3c16GY;@w{N_9*}ND0adz$v^mcyAdSbyHf7p2S%Kin?AAG+&t$XZ# z$0ci=Xhpp8;!}^<|H5<6$nL&@A9%qZXHWm~CG-Zr@J!>5C7-%_pZ?+C$I=qKkmBzg zapIwC?2C_EefHWz+jKw5-ge{FWAk3{r&<4pou%2m`z~nQ@#7n>KD2-S`KyknT#%l2 z#QEnQc+8p=E4(bY3Bxb=lSAHAKbJIDhEs)G6q0@AyG)9DW9fYlnUWyLA!FPd#5hpXt%2C+LNxF#qk3- zj%b@2%}sfx)r7GHzaF3kO>&4E!Hv_VgD8`pQ=N9gyvP(PQ)n!KdK1{wo))n)!A<3j zR9;VYRwF%ANR%OY0FR6IPXv*YjP<3-#0DgbT={8B(0dy;jSlZZYD$8LoEI5+PZ~N&=bupc zG8}a9EZQB)YP~fwsTjkG?SI+5?BE?e`rdyk9-R}{G)5vx=F?^=_M}l7OfI%8`HmzZU*1V5InXYs`*k?cqz^>E zUC0r#14G#*e=gQPp%+@*CRgM*5S~aMkuaif&IB2KFYq{AXlqvaZ7bx^n@?I0JLQWYK*^e)b{A&9J?NU5i_6Go zt23l(C0qR?xiZWq_$Yn`85O_7=0f3uD+6}g1S~>s1&{n3r+R4w-T~2;TBzwKGe4h< ztQsH-hYUD15%RTUbxFXs$ZqAM?6@ZAc{y{nR&99QPT8XOJVS45UJpel z3U7RWX8vKrCJG%WT68odKOIp2=5y&yNb*PSNWN;*PiLN*4krbUGc>W(m)s;DK6N!v zVek(f%9B17s^0zr;bwBMZ@Ot-F`XWWs=5iX8~-N9h}ooxVgz`O#)cf{>|M%nEEO~> z@Hr_R4{4I74k^c|cU*0!sXy_}mHV&OXXY;IM zXFW0JjdNZ)`&+Xwo9)-XVAKbHRzGXzKL!sP{J_w1I((lr)WAoO`eZV-pe@WbbOaIIJ|1$TTbN89^Oy50y zmtnE;fBk>y+aQ_t_h--FzgOPeuHB*7Vo^^@LS7f}7b!)ORi=j9HsN-%wL6VZd=EYn0z^irGwo%9HG^WbYkrhYWhxk7fZTM^uRB1^gO*xEH zzDFQAcE;g=aI@dXrQ=nM_`0|s+mBnaB3VsfEBHTD%uEaLo z##$f`Cp_4fzz^v{XSW)cmZPaL(G`xO5qbjNUJqri z2|DTF67V_rY0~#@HC&d;2cZb8*k;8;$mTKmKWcbjZfzFdN$kG&6wl%|0Z#_36NqPV zAK|2#}MSeSj67L^>2oYeQmZaHA9{_{bY? zR-@^OiqDV&$`Ej_#0)JU2l#aC70NL{1f0eN<>(G9>D1=^pa{mpsLibdmmRgN-iYKv} zz*In^P}Z~)sck|KrfQ1s4Z#&SXo7H?6E@B+N87Z~qgf!oC@Ng61a6jGw_qRzzP`qp<>*#Idp?`btSt>5P&fFFSRf%`*Px1FGYl(d{b;#5HT8 zzt)!1lHI{`r#Mv{m_P^+gph`qZ5FlBEJt&mFcA<^R!5M(F=rqsF91^<5s7>pY>37i z)j!G~?4@oDQGR)RIQ5@&8LUfTcou;s@#=DBq2yaq858*wrtHn9sVL5{MLgm;bJmM?o z+I&Yjnis(T1L03l5a8ovJ-F_9Lu?y%9l?(6H!d$mJ59m`U#K7Q+#LBr`bTlV1(u&C zJb7w`q1m{k91U5A@K~f`h-G-49JxfAj>J2%eJs#wVdL%j=vUcI-mMt`7XjNLpG2JZ z1?C(|$Z44*_-GQ|Zd@c)?_K)t&t`1AZP~16>nGOksJ*OzEq{PJ_2KOKE1ucYGZ763 zaYLAZW{8dE0Z}=d+Jn4rlL11q!;VodC>=-NM+?ctdtV4m;pf-R?0N6_uqr{5edx+( zh_-0g&TgOwyL^VyO1Ein^`^a!J?2a4=xWHg`9$-&CqqSeR$8=^Y^TgI30Baw^xQ|WG~B<-Tvs4 zOhPo86SfIxJFt4}KkiT74DS(57n?8Kc9DHizfGwh0#nw%&k%W%9sT<8j}^b}pnlmh zS$#)%8yuX{4p*81lYSr`jQH>sZr^ta&JiRi@^3r%_1+?ltn>0ngra@3gIb2$;iAHo z!4#+tp;kF4`hfkQu{Cd9r7SUJZ+QL6h0Av|iJqC!brc@+j3NLUd>=S&sN{z4OoFJADivua ztv55ej+`S)#;4Xq@5hGj))7(|hqG{zVidA)p11|r1SrxW!%|RdeB|^UQ>Gsek+qe1qDVJNHLByl9DWuTob$q&O?42!AO`jz1?e1axmq*knFmZ*Hpgl zt$zAmej30La>68KWBhe`Qgi305OqMW;WeRS#c74F+EH8A4JMuJ;b+z^+|du8`@75)uF*#`O^05u3XjeVq;+rpx7UMF%b_%1`ply~IWJnX5Z>qPtUBc7}j& zB{Yw6ryTd3tQDztI2Aa#V6YOkHrT-hCIiZsov-`!hF+-*A&dnRj939NEb)$HC&h#S zymp$Ipm&slOzpm34DrJGBqZUpgBN`4lX8HF%uR=rlmnzK0RxT#IpU7+C-HP$QPe|P zP5m}$3{I>(jk}}YzVw&!+fLKs4hRyC2#!@=1VV5eeE`vkkcrNS=Ge5A-}WF*Wm_J* zb~M{}ziTSWB4Du8-B5iK%exCAaGG3nThP;`P`Dyb?l)Vu7e zhO)aJ?=BWzD*0QMKa#8-K_r0<{v=J=Jp|6A5TH_3t}Ey!4gm7$nv+~9nH~K8 zNSKgq0ttRzl463|Mru06lc$M&Z?#qVk~L~92pK~fLm zdy%}N01>0p2Gy{I9$A9-R&HDr!%0VOb*re?Ntw&yWF>pgkqQ!@mqQ{0)i?3qe6NKf3DfI+C0t6J zxcQ5}RBO#7N#^!F)IaB$A#>J^v*yqG!_e1fy?*GeGrutNtifLl8iOAhJaQl&_{+d8 zGgi*{;f!mHCmMd^p4w3ZFQ2)j)|j`(*k~Nv|HXN?&s#Y6oyO4I2l~(M-=p!4IXBOV zcbT)x?0aXgoBi6_M{7T?Z>e8YpP0K(-$Q-xdEbg*qdrlj##R-nF%M;dmZTY^IXx&! zIg&YOQV8LEs7PjUAK0d2T!a^SlZ0U${U-U@1crl+uPiBiSi(d=d$FeOsN*;l$kAyJjVvpmG$q_ooh>}l`FG@qC5m3_f zjaD(1__58trwWZ{Er~(N+Y!hIJT6`%g(kL7EMu39Lv{g~+K1=s=nJ+%Vc zIH4R(4mUv_0SX7+NHLm>oRGx`K!{X2Q5+h_m!sJm=n3#eGlVCx*n!;QWOosM1?W$H zw(T3om7~eG2)}~7Cs&C)Hy;B@bhc_h-jlo#i2&o+eDs)$^1MT#iC4#6Bp(;wdr0Un zXH=(+^FTh%HL}lr__5uyeZO*(v9wK5+d)E5Lo2H7byXg zvot|%lQmpjj%K&wc#~%!-7M}CxF*!F3{G_OR`ob+Cr_F1p0w6~YZ?h#34a7v`zJP1zwk{}smAEe8j^ZfD zNfT@$S!WY*R2Cmm0;ZUrB}11jA(@wO@RRWoZsg`$YzKyl7UP2h=`C{ zY-4U&?qjn0c({CL9!f(*Ig|jM&UuA(T6b8S@03j`K;ogm-eLVwp`hjo(^FI#Tiw&# zL9CL?SWbK>pz;JHP|2}zrzF5!qWAzIDOKSjb9Ez7!QUX+$_DaNep+()`6UF$ zl{lVy8LyhrA;%4<50UYeTNkgBQ_qlG_)SZisDuKN>Sp=`U4*zUZ!a&qwk?n2lv;sn zoLZ#B9_X9bocpD@3+7xr`vuX=E z?b83|zHISfb3bMPFFU&HuhOuD!^orbz|DYv3|@=5h}NwnKjIG1AK~$IUE{!+6wg?| z0>f0l$*Zb($cZXVXtL(7p0%_0F4@_z$u)w#qBw)+!{O$UX2iLmHbvW*xJ^bAx4iQ6 z6zsB1H{3eS&-eej`}0UWLnfk<1}O)Z8@Xo5p$IJ#+!qzV4&}Ap(}VOSOVf4ickuYt z7~;ro3=yGshvqD`9CDQsL|SYm6siN#L!8@uMWUvxWPdB6C>6_N`b#2a3c2(cO;U$pOE4mOIl7n;g%S77&MJ z3FHRm+oy;~J}AH}cO){kD%%uTB(}O(gn7Tcwh}v5Uw*dt)H7shLZERm(l#U^Qa&df z7|~W~hvY9g_)MUKoNm>h22@ihf_?V4TjgLY`zrehKTYMN7fzE1vSBP8Y}Nd_N{i-(hk zavsqYA9f3$uVRQSS&>Z9vvY86XT$HVHSj8_S}_A^d_*nc(?{fKMOznsDT2a849X6; zH8WfN?q^1|rZc+kpzin0c@mq5XXEpRd5wy)i6mwP#RhDO(mn_@75WAy$df2r{lt^H zc2;#i4>%Eg+Z4GuvPfO>q4WL$y`T}#vZZKHwP-S0PKS0RWD;J)`x#w#V0S_g)cLAg zM7vaGM7LZNfSCtw2c9kLSF(0J)EtJ~fMjU_h^3BL$?oF`R{*g$yi>MW(Bx(XF~Rx( zk>ah8rzR>BG5VzC`E2o4)C=GFbv%Q-{|q?N9sGK4qm8cHzq?|f?MWwtY5>`r>q148 z7DTj*_=+?bn=hsGrB)1SU1>Qf*|gyunaWnZtC)x=O50RH*v8^#b2PF-EE5?70$(K1 zS;fk)3-&38G+E5q9=)sXlsbeiu8sgZGh5TwN@Z$h`q911!~+ z>JC8?&IDQ((5PL!Ol~d`=iNhv-=>gJK)!aoNcZyVQjxL(_7XlKR|K6Wz>eTJI)tD| zexbpFJ_M-V%C95TUI5p2P?0+Knr8rgAurbK1)%_gljZA*eJOV11CYrshayMVejUL#42=2~|b1p_|b6 zQGa%dzQQtt>FvBm*`YLNLjouJAW9r04A7gPx{n=l`ygF92ticr_#Vxrr1zJOoso5~ z?w;*_6E{0-iAs9_8iZvd)L{X+uDB7Y$^)iJR7Rc}As9nxE(NQSI^I$RFsq&-YTXKt z?7LE=9G`gtCCZogpWl~Rzu)hp;%}`frfPwn^4VMY#fUG58zF*yHWhy9qR>fjquMC? zcb7D@Ct(9;r#x`u=yLF)$XP0Xi%rmTzSKit>Ga%^izRN$4lHHK7jdnS{2=D{shksL zpdaFUbk|TPe+W+9%$|Sgy$dxBjjTJZSXB(6g-){wCPMEKx%B}~lE1UbdeavIWT2S< zYb~c_0S(Lxi=*ROGa6ZUsxoAoBB4isN0u(XV+fVtHQ*fqAxNnGlFOpHIB5=WT5D z#;PwV>23!y(-1m*fGZqlID8Z{xz~U@fwC0z2x599+bV|ec%TvjZhg;**Y)aJTiMAz z`=~g2OacmfCnc@PS0&UDQk{HNe8M<;bXi1?0m^>mx5bkYe0iofhqhX*4(j=2#K`z? z1It%M3Lm_=q=GtRI;fnx>M%kF7$iC#rBn>`47HRYqGxitV9P035-)qS>R|%7Ha3_D z@&o|&)cePfM8@Kqjb`sX@wx#8px$b=s&6G*{hMpYfUu$T0q!6n>qK14Hwu`NeMY*1 zWL1D5K1n9})pXx}AfoqKe~s2^J9sA>exAP*i*JR$3v3#hB9v;#V-v8jAe1!;#3<~t zhtq_Xq(DuX$|epUsSE$mx40vAtjE7F%RBEX?= zc#!Fd$={=$NZ)RvBNRK-!5bizTKYy7aM?<@zLlx$zxj31ZEBM8M%9H&*=k9qkwOO^ zBqx>R$ZQdbBGp`Zb};${DPnksKY#Y`x(`pfkCF~w0<}?Y4KRL`J~%ZzWNXRd$E;j$ z15xm`?Ch@3%v*>8_V%BB{_nd#PDqZ@6mA4JI?tX;hQ1|nBQugpsZXj&Jv)dUK~xYV z?8&^h|MS)Dd0h89Gn;ajl2#+xn+kXXG#$7NDiVS81fgO=#in;ycyuF1cR=_rJ6@(^ zpX|N`;y}rJ;o6D5nke9iYlJusIVf^7K7Gu3`;&4k+5G(Hm+Q{tnC^#Wg2tkQESWTR zCm9;hqlDPBn97xf5{eC^NPCMW7#_efu+2txxMR7}ee>>^ch;twSaSP0E>rh7>nvE|GF3?N=ymQs8`f_-FKr)W zGQ2iEFYXKx7UM{fL=Gn-tu!h5fp>HK`Zu%1;m%T-p*%>hIC6nq#dAy zC>Y_&he`cEi_rkY0D5|WE;-7j{Ke}6DFhN6JOBz(LCRu79x{-I8WP0)YVAB3qV>1E&v1qU78O zN;*jT)xS`VrbyPouO`_ET%XZ|X89~>WlK0rrn~L8>R&2Hdpw0h3=1HS3?HQ{>OKP6 zgxkr^=Q_qwssDR9S}tqcHGC4BABngVsx2HdwF_=&dCBb3UZ!dl}!0Q6D zPyU_K8IK^TBw*pVGW1cSP)V}bs^6B6T}qLbk_1&xB=|TL1xiAEMMW6rnT7KaS@P=H zBY)etWV!9o*O88el!4j$Kv!{D`DCOqGc{g0%M0tz_ZGM$fkni z1WXTMaLR%-6J#MiFJqUC@lQqnrvz?%n-y_==v??=zwZJF#@1#5LmoGK<;Qaa-l)(g5E-EI|=HaQKPAb zN>LxrLN>LiJc1kr#ZD73K6{RVz^Q+(98KZ?L3OH_QC^B804A}G3(8j+Nd<%KpjZEN zIhx#?Ag|;Lp&o)O%#-kqfTfDy`vJTrMO^>aax~9JmRCw4((IC1QY=daT1Qn0fgbWGvoh(}KyliaJwib)GixZCv`${!~KPe)I2bx+zyxy{t93+J{XQpb`V|xY7bsizp)(c0mdf7 z#@nL%DIIjn1x4t> z`TvmZ&BY3)P>ST7telW63VsPN2G$5odkUGNa9aPD;z<~d`^@%Wpe@BV`6o(Q6yvD? zatu-vi0t~tax@SG#LP*8Qs3s&2|2p)Uxmbohrq$ZJGJW{Q=_9cU_sv!ATMBA)iUyjCyaZ^;*;FlK|12zipa02WXWqf+NktL~rTxyEDv)=OJ z!8l91Heqpq`eX+1O{EVeB}n{-PI5vynBC5+|Rdg|z$J@h2!)d-yc^?pI20{SAg1m-Jw zLq2#Z&80v|@*}`91^vN#@KJJSk|l`&pOJ~_INAMAZQSFH#AYv$=QzAX_?h^uqORn;Bi7ZF$ev#t0Fb+|ZF|L94F%KD7Ay;p7I8Yb4LP$w5qhxFdaK6U;E!`ZS#RCeW%2c!_7pS>uq5^X z`h{|32)tdea1q1+t}kf(wE68##tJta4KR1{PUiP$=UA35;P%p1)vJLb9`@^-t1-r6+;$Q|eu;Wc-G@FhsEOCgw| zCRKjvR}AVMf=o9_fFZoZ0uj5Ma)niC5w+D0uLgW?QKqN@AbE+SM#>lmgsLF033#HU zyikP%@q;38#T5Qak?ztqb+Ix<-IOk;(BV*sWyeY5WwO5P2}y}_9f+ zNj*>v=t29Vfc2v#iX;qm*YAR!CC(o{B2XP1HS9maS~yjBNj^DnpU{GWxO!6oIw5{h zNz$Iw`O1`B>u}y+d3sza)Hm@DsIL)fP>vA_tp#GL-0A@$cU1O3v+J+lT4f4|B+Z1V z@WH9%RRyAFEWAMwj!3V6V`P%5qnt~_xqwHHkz=j5}2oClFmdhSpX!F?1L1V;{UnZp*Kp&hWrQ}#;t z9ffd8q$I+Xq-kkn-Pzrmh;VLzm=j%cA4%O^AZo-=g1)2|GFT2^FsjHXtujUGjvYRx zIi>9W8=Pqtkt#A7QsPXzr$iKr=Bb%i0!gT88ah+0ok-H- zL1PNnl^KDtAu%XG8>Ia4qlKWT){e$Gp}isZO*A*cxto8C*8qnCX&`WJIJb@z;!O57 zKuVGGCKQJBXd%p^%%Dq3%~8_I+QpXH8M|TmK22e}trxVt{Q;tRy zr_)IY`wh#UkO*NS8D5-Na804}fN+Z!M6mVWYi9&7xICx1p zn6n0OF76LkjC`!*9U&`|X^%+qLo$%Lw#vawAFM6cFkA;Vtp)R2%Eky(p{32^fw}ch zDF+86#K3g36mpSrE<+N6bwCCP=ag%RGMyQhgV{bz1c!wR0{5Zl=8>vnO`!7yfPz7R zr#WR~_c0{taHGNauy(ejz(h5JpQF-`bK2rRap9Pq@|T6W1N)rZI7v&k3D+N;0&v1W zl)`U^!Gd^d@!lc4pcBE5qAiX9AQR+9CL2MN#j#8ksFnfwsc%1XC(>hJ-Z+ z%#4#Fo-)&8tJ6yn0fKrKkMB&bLYle|mO;}XL&k|n3Wfc_8Ng--41+3yut4fRE1!gI zk+7$^N6C~*eTz9tHnWX#0^o9Bk#16dv>Yv>>Ivm@a&=P4GGf}O)}liTlRn3)a{SCZJB`s2mukXRg|4h{hV`*OR2F_(LR z2#L0P1hDvxe8WF2N5j2wkTzj2(=&^=!@NfvJ5`uEgmj+@BikVKS+ zciCkh%A%9nAj1mhs9pb2IT}bM89jV{G=1gm@Il~;QNtD97A_chnXvwSH5$?nun3NM zmlK|Jreu;xInszAjY*2a7qROPm7^)8lIJ0DO`jkBN?X#PR6WRUl28))3#4}HKQ2de z>PTTp$X0^J21L&{M!tnJnzlk{2DU<{{u4Et3TiBwaa<2hH0fCZ(@1imWJ$q`^J_`{ z2jyt+RD?9VZxN~B;khUw;-Y22jlsE0M-b1fKTwPY|7Q}=v!l3X!2IJFa+pw*XKRtL zruxQd64dW2NAprdRs{5h=uAM9lB6vUMnws%Fxg3X+x2_ZXjCO4ZXSvW>?K|mcQQF_ z+24fs0W?*+UH|WV^jOd&)9R%HKqV|34u^ltl%YZ03ZV5GZyaBLETt z5gHVG*x%BhL$nJS1f3QhJ8aYXJ^62+f`&D%J78zap)Hsl5J}v`gkS=&prIg1Fz&zm zi`>@tL?iXfb4TX9b@oHEgIU)OJu|d=@H2yRW}Y$Qn={71vp?2YVO(GTNB!j57izEQ zzo3uZxUnt(tM$9(-WJL&P3}p6oRXH|aN-kTLjxJ**x+nNdjAz;05oI$h*66*XN*0iTQNkN@F zjfK(!xR>R+mUij7kW31=JUVgA0{#G#A|((LeUUGOZh}uEI*XM_A(rwJp6|S%RWQ2%cYgsDyB&ld?&< zMaU1)K8aWi;6%j|tv<5V3+^4&eovwsDX+FA3Cx|H`z7TpR@~!wNa=(LCE=`F*GeC>nR5tIr zO_da3bsJW9UZEqo;bWT&OWK*>|AH&w%Y)rWUdGu#4NI`_Iw zJtfJlwtLl1t|aMN$o7*YY~fuqAK~ZF-3@<-6U#{>>e{43ky29gk$^dS{kY!nHwaLVEgD zXG93gU5@G~!eV+mVn8iki1szSR6-Z@e)yWG1XCr))58IT`2m{~T6H-iN6w%ZwfRQY zBS!d5q*U1wY%d|#QNn~;%Ha()BX9rM26}*GF909K3&7FhLZTy14rA7wl#x#=-+Y7? zWblP|0Be;9mtc-f2Y#9u1=1hMjoxb_^TZ0|l_bse8(v?}HF{ZV8WwRF2>Jk>G;Uc@ z69s-q5e~8?#B@AebOOuuvzb)x3cW$=MJeyFtb9H=+kXMuar@pOYWlcr3-28Rztq$L zkCad8AQSIoPknULLLe#n;1w;evQL$q|2`Nf=%?+C>rO&F- zs-0~0&9{zYMhD%Z%;4+75h;+@Vy1ToY|qTA^69utM+50nu>-L@|2VQYZm7B&+cT5R z-}PP=&88L6^uUyg8FAFkdFVzuTx_WN8{0FJ3nqOhH<5sJlNXAh))Gn^iGQ?Y^`T^1j6 z-RN?->IlE~J{!Qd>R+ncITujEL(_uQl!k1|#b``_^2dChT6RX(j~BoM8*GLK+NWX& z>7l$3q-SV!{aEqgSf~L_k3p)~;i&HRiqN&Rth7W9Wm@2svJ_H3vx{IN^mxqt-IK|NIri3a1-Pdtl@OQu)L(&BPT2zgA4^r~3G`2jj0$q7A6 z!|N9nSHHm9GyrR*DVn>{b}{$S^bC!z&zro^*Z}75^Z+wu$C)H#p~K%pH;#^Lu3g^Z zWz5yX>s1U<3(A4;`fq6@e@j$jbkKXs5=F=;JL=ufaNudqXjtqllOzZVpI~_jKIk<9 z<`WepQj;QgLBxn#2+J($rFGCx1ftvZ1T~W&3zR9^n4$t8S^hi$Cz7lpkwDE8x-;#< z5ltxztAS-tT14QvsW)gPs|sK6{vHbM!P)Mt_fLa@E5%|ZQ+P=6h4@XNebd(3%C)B{ z3NWjJAhjG$B^5w*laZL(_O*6!ZV9%o4kMsvDcgAT%Ejy@O)CeL^9e#EZjp)tX&^8- zu!iKgDJD_zLQR*nv|vZO9ys$sr8p=)4^2Zk*MH2Dg`2*lsSJe#&&WI!M~kMV1IsDt zlv*p60FHb4RvOn`yzF!Dd}fTOPm6|8u>_R4;HGGAhMe~=tEW@6RhGDG(DEr#5888z zzk-g4tw$EASQ4Z~eyf3gA{krR-<8c?z13D`m;dy}Jt<;NO9ZJ{fkA)&Ylaq%qg<(F zB#V!{CZCNCDMZr*iSH?Igp7k>Z7O5S^WX0rI7SMO(`!`nN>TTN@S-*FY z3c`>M8>wQ5nyu!Ff%1|}1UhOO3?^lP9C7J2Cqn&0f*+(N-oEa>ZWkA_%pZWmUKu|6-z$K zQe9VFGg$=6>w}y21Yj{O0jpw$s!JEmsXHNJq7QD$6MEBnfntAwBx9MlTNatY% z^~>prT*?amEELjnPrPmvrjtg3tzdY*x{m_z=j*4|himuO)+wmlf<0#V15XTW95{Ah zsPUD?`Hkhq&x{Wk2i0EP|5X1C{U`O$>$|(};@jVHr&FbCIzbbyIw~A+`pC+XBL%zw zR0|d)s4~zl;B>%r8w(3Slts~nG&l0JqNkc;i^${?Y5`<`m_jm@ug$Lir5uf*mhg;8 z{^#&_ld4lJ)h)_t!oUZL+;-}JEJus*7Rhdy#I#A_uYi;QYrtNh@BKbgAp3X;)nUuaL+zF(Eh9`hKz^Ic+X9j42Q_zDf zNZG2MS+nn4vYfC4(kUP+Db+()CT}d>I}P>(8;Pbld4JGI_1_dvB4RYu3Pm=DULKVA zNoG=k05eGK#s}8}b{%odSCpdxzai!+rGuOyhJYd2eIc^~7ZhX$JX71)r5sJ70X75z zOcCjKoLYez*%Vk?tc)x4L(I!CgkshNI`>9luCVL zH#M3>KEN1JTLCkYUmPMiADA;M*b54 zP%lJhG3Fq2PJDNYf_1F{>QSW58t~=tOBmo*Q-}i5JmW;Y({%jJMe* z^UKjdyd2u~lh&LMt^uJ^V+9Dw>g9K104rQOk@$Ujtnd*+`yMwBsy(xrJo28-Y}U8)`K2 zUtSgpfer;#zA^z(Qz8W&2vmisSyX8uOGchCRE(v~3_`W+CknZM322=rCm_gEB6hgC zP@J8XF<6WxwNJ?p%p9e9o`F@9!e7zIkmw7a&odR$Z_GsEDn)r*#c6bhTG1^0$4ZiuLArMA_VwT zn%NmyyjT{*rtttrK?0zTGmGjay<9|t8PP%{jbQ`8)^yVPKguUzIZze={Ybr!7sLMH zJO!e~VnDrtum#ZH=r2bj+sOSazfD4iO$uETKm)fF=tAM4(51$%KVOcvX=4O-4JZ_4 zXVx1C49TESt|iVapro-A)&I8`4X+b5Tpx%rAFJTB6RssRM))4&C9-vR19tsS&zI)1Yq|ZhCi!Sh zJ8wV>`^M$A4nVlH;vuX_QyuARwVc)u;GZi+Yq|4EaN}0{V8so$Q5+9p#7qy3tym%h z_QDsZNjlR(1+{oW#BQ8*cT@w~?6wVagXh9Z0`o2t}uEPFM2{9bFu5;MO!aQOXc< z*XZ&WhxL0Ns;0oICs6g!S)JQ)_3+^pJ1~oiypfKXk@ZJ)Gi`ck`-&Y%9eFN1`{#$M zX|U~0CzlBy1F@z9(^qCJmW@P9u7#*KpCh^m20eyb#gH9rc-g&36!LO<*|zP?2G4*G z=ss&_gA(fWL;__7I5@I!d9@<9)JyDc&(dM#cGICCRP2zYtk}_*QT!SCe)Px-6+7rU zRQADSd3|nmv8rt??w&F8*}l1}W?wyY-^^$4_}shpxVC=BUGLgsUHy*xHqN`Rf8>hQ zPc~-0YHIDmSB)LK-w7vN6drZnY3HZWIctva_d_H0?#(-ASKPIE=eb+|r|fg{zqT}6 zIPmty9pAZY^U3`q;giNpYwCbq&T$WFtvceMb2ICkJny@{v3citFZfT{qaf zR9OGpbbv0-?EpW5ctC=jXr{x<)m1(znVKn5wRZq@JPC^=r#1=|qziJIIi^1w%#8(#ZPr@@qq; zq!U6{OhFkyWkK^LjjTVnxNfndlbu#}sB#mvAWNXX9nQ(uPLrWtF+|yE@c|R^&6=e8 zdx7y*A8_xR9a&!}Eg)7&V+d%ADVj3U&X!yS$tqI1qLV_=1Fi>&afNF^EWWFNfL?%> zB|yqZEsTjF9b&wi68$`*Y{lj)U&NHo?7k(Fb7*=}eZ>-#^4!N8*Pc=?w!oBhSm(+R zVy{S+ND!<0nnu^3QG83Z4%A?*S1chBR>-kZ_R!f7qwCj{mUN0F6-%HK3!Ia-rPFgu z;L&u7H_8$L6M{oD(OC%YO=F9Xu0O5(mUQ$RDs~*;x5r6frn_|6mhaq&7Z#Dfot`4C z450)IhoSJ2^)gOrnW534c~|VviM@ztH8V81jJqW2bcpR0JCq1=Rd3A%TBn?j4#!=Y zq1%zeC7TBqddrq8x{ot`J|YtGQ!X!6>Fj}KlqxO#A4=AARonYnbvk7oSyjQt1xHgM}e8}X9= zZoH!r7{4_(8OPNQ?*HHZ|JQ$7|483=`#vBf;3YMYz1>)UwMdsN85c=WV5y>ph~_!@ zT&j>Tyo7fQTnX(B5A9FWIJD@|#b{A(3*c-by1?0vR0UN)67-^DE~*A}`Lm2wYBU`p zX*o@+7Fu;tW~3woQyy8nwu`WcXi<2naY#OT451l1O(OA#_z%BEO#!YMGDFg4jao$u zDO|GY^u1#-mb;WTkmRG5O7{de*N}y-A0r-4KQ3BMqM->%E;SA>o&*92!cUYoNkQ`z zWW=GJqg_MZA95MxCMHQ=$CZ+`Ub>8ik#IR7>-#(*D?%!q6@eob@&u?DCRFZ>rA0oR zwkvIV$wI(I%0bxa6m#YY~n_%a{fp z2zq&LLM4K#17*X2dL%+80jg=nqH_Hp&Qh*}5rtBKlsl>S zAZ;Up31~owygKDkWB+nAO}J?9OvMR3U#cwBkqS{(Q5b}sNXaO*js42ew6CL_&6b1w z53oRFDNyY|SObs*TFH5zRZN)X5#<>h>IL`AKX-is`&5HO|RrEx$x8Z{Bx z%E66Hq%eeBBc;qXRZQs<3+D?$uooBymZPCr(=(OVNGAZ^B~@G2TUcQ}6wwYv6+9PX zMKM~UAkp!mfOgR&JFug*uK%*hIoZKaBf#0F1-YM^w1L;`_g zBz=#O#0(rtm_Om8B=A8=UYbE5Go7#6>!lN|>=vIocNW3Og71lL9?Gy72vwSK#wQ*$_ol zs_@2ZiqU2hQOJ(S08zWkYhaXCK_IXt(dYs}fVOfF7(qE2ZEzZxNgbMwnyiV?9b0@# zNV$PDKn53{s1cTAcQ~CJNwGgXzMEXeMGL$YL3OIU3zmHa_~M z=*4iJ&^`-|2@C`+*+F1P4Vy_6cvb1!js;9%N+)8Z$jy45yI8 zp?6IryOfQA;x=!Gx&&YgHVc{?C~A{EHWT|zfy~J zk%gKt>QA9}ni}kIzC>vC(m<2Jz7*Y2C!+?>i=mkhtLL3s9Do!J0bj5LNOt9|P(|?= zH8n69G=W1jh(jfc4O5NAJYt{B5b`WXnp~4e;DGmN^BXNGH9N*cIhwjF?JGo?N_1jC zT7a8Cyq}UPM;f;RYKoBoS4t$ia3f%+qjd!42n+_RClU;Z6!MzT>q6-kwWPK&S&k;S z2+*|duikj28Vy>224FCbxnI~$9Gq-bX^u@t4@XH9B3#J8mFUsF3 z()c3#ES*3(q8z#fq9RQJoc%)=SV6#0Hg@?ZB&_%vMJF_D8_VREmn{WO#LXn^ThZ5X z_{32;LlTGk5p63zrlezxIPdUfxbdm{j~Cgx z?@2GK(Vef{j_L}$+N*M*2;3Si08{BP(wRp+s%#l(fLU>$|>n!rYeS{eAdmbMB+s<$j9fKT)OLV3>43MCA-dNDMc=NGt+U;g&EDJJ z!&eP<)0<$aHE>@QGXRO{_L2?XaBD?Ar20wqtc+eYQx*;0yaoiUVgj9M zXGCNo#yl2G2R)|DkRTBN%U{;&&SfB<3mQSwgU%{OIO)5j0G;MWO~)EOY`|4>Y#(` ztJoniAz8(xy`t{+>S>qc7MO_+7EoEB1ErI*Tl0BLyIyE|TrVHL9`>h3E$l>S@o zrTypiW%Cyee>ivL(0Um2@o07Y-|_(>f6^iqQ6w49{Pb-VG+?yt{-jqe&nN1IO&u3k z*`XvL3z{E6dUnQ(_Xes>!{x2mq3I@a(xaK4m9f$aSN62deZ>m0Mnwi#&&;xN(R9L% ziW$@nyXUr^ou#E6om`=^gOn7)?S+t?o}E2PJ36sT#SWAf3ITEt>DgIQyq=&*SFUMu zh!r~!`U>9Q+*@v|AZY<3t4O8l>=g12aET~{h(@mHAAw}1$pj@rvXk^#X_Hv-VIk0% zwM)T{+)3&7_;47}Z2gw4KAr8DSzN3dv(d<(Dl?Q%eDDz6I)ILyMdhmL?qr{_skEJ1Q8 z4uj>omUhc6Im}6eW2G!vC=2A3Zwio_Q!1oeF{DEjs~CcLTEbN{E$vdiCLOw4#S#pJ zZp5u==oRJK>9FvWAsT2{8-hqc1DbYTUhW1RMqb4Zxr(yDu4(CI#nS09*D98%26QF) zbdyRiE#{=hs4FdnqB{j@GjFM)YiZ}=EqSuTr{&ivO9WnokSJVZIri=_#;{8;a3h6aFEIQtC!<7`Zg*IwmDDIxEp@mJR?^5GkvC ztQ_5j6c<4W_*`jdoqU|g?8(_N2B1Vvhu_Q?=KP$cy&JRPZJ zz|C~w;eE6mjbjzlCy^(iuM$r}ApzM(3OsaaKx-W`W;-zcr5ugwGl_l^mLx6gNQP7Y zfc^s%2tpasuhOKnZG5~OO*NVG20{__7S;qdCtd;V6fBFH7vkL>{bG%c7cYK(y^q8Q#x_95K*@r<2p5(mSFU*fHIhp=trEDDk|b6Fr9<~>o5=4w42J& z6y*3R>B;B9Lj!BXKp!5TWzr|HlSr?&j`4|dv=!4SqhnE9lAb?QxJVYaNQWbCNGnfT zOwobQ_(-<;wwsnNqbDsT97+L*i}M`NA{k5S--oCx`@y$k%XnWgww;2Ogg?!CNFPz@ zv>}|}oS=#dI_)W9(|CU|HcrTJP(S7ciiS8vUB-%nuS<;#S$pc?j`7}NEOn?*dYVzZ z5UFufI!a43N%&s$fM9kMw2TjQ$HMtVsvZAKB&X@=AY4j*m!*e14cU}(hVh|dEWequ zBjF6vkBhf0R-JP)C&mD=A@^3ss$0S>&OCqv0USXkegp)> zn=`hJ?E@vqAS9*%yQ&g#Bu4}_QDjsG4TD5m)4{d{717{?`h@VH-@`W2k!~fnzVCnU zv-jP%t?ONJ;FAig&VR49*IvW_{~KCJl<^e+ueEDGp0`z@cS2w`$OT<3N<}yr-zH(3 zi*BEWP;1()y>8XEr&6&%DeVnIgf?CvBM}ko$As$#s&L)fZL78|#0;jh)cE;GczcTA z;c0<2i!~m`ngdmdylpsGI{0^38V1*!`$iOKjuPSOPk_I+Ws{50?tL!dZ*=u(GF#d^(># z9SDM<6~kwzPUDeTdaG!A*JzQ7Ugm)5RXbUZ|5M2%tN0Ta@@WcopI96(qii={K6zUR|~xo0a^yEdT^w)lUr`0D^uhuM8En zd41GQ6|EV0SgU9OIIYL)Hq?p;VLwme6b537zFzx*qBZ`nwM9j4HVrHY3L|tv*fNtn z!fT#b*m||s6s;rst}hBXQTxQx^xLzn=s)xAh9Zl&9Khe{$4QnB_cV^QE_q zsvX;r@-Pyz?Fa$}sBG-EKds$Vv<5>R^Q<@NeAh7tP3|!JSoFjEH*mLz^*86Ou~A!8 z2KtI~nBCr`Tdg;*2Mg6+lD*c{X0!IvqO}2npC|GWM+=`(VO1@3KFiST8^V*F? zYdeAwR~Uv0@pi`Q)9U!F=mH?aM|jZg^lL9KTKgKp5$?=ge~$hb-Ebig4x zkVQE|=}Kjr4wCpl{<{_?n~-H^53fm9qWIDsL^xAA4YP)-s= zC+r0hn`Bqv3r4fri}Fm=y=P(r{7Wa(e?0u`L+?Ly>H7DsEw6a$g+GNDaPo-(h&xIs zA_@PrI!<}nCs39%jP~-#Z{D?gr(?`;rhEOy$!nt`gBrP$0-&jc@pJi=?(*NfYd0mf zZ8T(4 z{(oOncRvthQ;8I5m&lpI{-gxjIQiw-$bp-uppYtoWKGw<4RSRt&gRKXf69bw?W6#K z%0T!~aP4=0;f2_^siATWDv?rPSd~aU5;pmrBsJ3GR$oyXDytHT;=%IT+bD#kM#{vf zj*^sv&OR8URf*IjG7*A)Og~a4#OBFNj!GmeQ39%J6=}c_77#wi2`vBlO?U2AYxYFl zlky8es)&<<^{T|_MHwX{wI{~OOy>mCv=glY%;{#KCo3 zuD|-8Be%Wz&c^P7T3z$@%z;pqk0>dayh@aSe`lqkwBE38i2@`I*97!c8D=1Nz&JM& zrCS}h=1Mun>0uXfv!_F3<(1UZFl3cT1Nr4pS(8mljP%%|PbtW(N+ep2dGR*APa!T( z(jy6tR*6Jz$~4L-Nr`>h&T~9QF9B0miKI+??OQS$VPc@iWP#8qQXq3>p#F)$^5(a8 zkI0rL#-VaRbkERr62NwqIBwyY4)?bu13WJ9J?<`?@1L zkcXj=g~J8B4ZhES)!{bmRfcRm*_51cYokGE+Ag2};p#DsWKDU*+5I{;PChGNym~BM z$SL{dZK_F*@@{!9%P!eq_0tLGHbC&gl|-WO1Y~~T05+E|`0!o3@*?~W&JWL#c>NelFhG7x7?C1!VUzi#AO+$*`zu+wB&)PzZC zj;(R49QZx3-W$LXTm;s6z50k7z|YA03OtNHC_=^?gUV@IgsU$9hmmr zX?6p(o5il2)}wD(^{Bf8vOOF?C7Wq%T&P~lD#%j8d$WTJzl{ZPydn@loqvoT9bp7h z@tSig*mp(7TPLr{%+O&-`chs>E^d(tB}q!S4+fnjGNOeOyxisq_0D{qJdRzF6zQ9@ zF0sMdanlV$V)k1w@NTMdUZkiZdkQ{|93c_4J9d3m=9!>xa-i$7K+EfY=dK#TZ}!ju z*3Y2I1XXyiLS;)2;v~#v+jb{-7(TU?urg_z)J`pLzV-)+lNvrV9KlBh%D~8^L`FiM zPY$g=>`*atVK0nuhD~6D{_<}>`=IJbYM@O2!MU?bZcp|vmL7>r6C!+fygDQhc4@r< zIX^hzazapQk-*G1>C{lm?|%Qi*_7zB{sT!zC>gqsOY4Rl8XdApxZfH&8gIK_EoZ4P z|A;~(JMXk9k;_25>zCeILjpLMl~n0ftCcgtUh%;_*X+uS-(6TYPi7(zj%%TCN7zt0 z$$N=eA(`&G@<;yJ{DxhRF%ilzU3&&g|9sUX4TAmC%teDcrD17ubCwxf{5CEafZNFxWiaGb0^CABkOn|-YDYEoEiWoKXxEU5H-k1TKcV0F_wb7wYBX4>-k zpd~QzDsfl}WOvbQ3LG?On_@9lq!AOAc=z`sAVIp{MTFGLNcd{`bZk8_#ZBT>r22 zo9ca3(4Vb6t9Id`_4W6zf9Lw;Yad%XUHjPbNACRaBWi1F>o0!a-M3%#!j+YMAJ^Ru z%^lnEiMP56AKo1E*`O;8WGGd)xUtnfnx{Q^97x>H+h|9GDx)Gpht$D=S$Pza<`h*) zc+`HOY|TnjWzN?Z0)r}iDnw2)C?sQa&kiSgm7HJ9S|95Z542Xtk721u?uKOpHPUcR zS1eN%kpk~wnEdbCuU1eEq{evSMAjy=sB!35&Uy|Q5cX5LqQp(xwKo?JqA*~aqj~5M z5Y>qASw>3o_ndaggsQhLYHul8OVqXpxQNoqAtXDLYIf_1QlnpHhfN4}SbNj*y1!G} z4OxQbh_GYenykwtMdfyp6ESdf&k=P@$FcU|oU_zJiFRHg9~63ub|+b3CDO=zE4e7o zi8^lGxcuB_K7YmWR&R$0t!qh;{AkyD67?tPe^k{uBC8S;2ZGMp&AZK&NL724Q4m-C zq|7+ANGl-WWCPx^Blg$6zj&0XBL?)Q*t1AsdoBkWr#0TqQ`XDz|C5&%jfqvxqpmH% z9d7Ake*={*1Txu|w2_AB+P?+|EI3Qt0dTjoSUXBW>U0!)YA6d=6yl9-&>6{4F z3!?ZsG?Kx^+IFhLQfqtBt>O2TU9{gxD_{j;b9(5gQt~rb)1#P6lG;4%4%Yrd@!QHq zDp|@-N&!!ZDT%V|;3LZy1qnN4mg8h1gUm8%yl$AdyhOVkm?emfkPd5Qv@Wfxhs z;F_cC6^Hbk2itv>R`ZF}urdJK*%8TOl}~85N$s~|K52_6-5F5l>`+lQNunqoj=Pv! zETnxO^sa0FW!0A5{Y=$a=@YdI5mvPiRX`YaGh_7K7BS^}^0vyAj?wBvd097{#wSYn zj2hXd1CI&Psr_c&*73pckU)hxF_{9VfKP{w$^)FQJ*Rr?-w$SOuNii^HAe|pkt)tl z;qN}dUu@5s2w?<5=jwdR*5_}(>bT@f54~0aR>^;Y(}(Hja=CD$a2LV*8!O`VyS4wE zKZW_@7UGxHU*g?)0H3geVyiV)B2rvd1pZLoHlzwWnHBmdsz|-yQ^Hi3*}fj9Q$n)i z+HXbMtF}1U61;Z99U_9oBGz>EoCKjw@lWQE$Z)v(pBeV}OF8=`~D*QtXCpH2GDRn|ui6@sD}Roh{!_A5ne)N9uDe%58$ zS4%NA#EUyY97J0i2JyR9`%hWxW5XTV@gZ8P0t;&3w?kIig$luQ40gcNatxrdZ2qI= zbhx9g>0i-Bo~bIwg5U#Flv2wdU>_17XBJ)i_2NMgf+JyTVVP%(JB~ks=6oA61Bzq< z`l8_d{@vD*7a)|&f8200arfJ5VHA5&3ay;u>7@1>d2249bGMKMj6w!Y>Eb6Nb#is@ zFMJMQB{X;^wL9}pqT?Ipu8+eanyFfwR}`P)CKw91Gj;XRu(tffKg47mP-F+_a8tA# z1R5hIx%n4WZ`Ep7AfMEv_KxC7Fgi_NYbY5T&+VD5V!oldYXn$G6J}>oduP#lIGNjy zrta{jy-8(lR4_LMdUHQN$2Xi!Yws#rdyQ>A+cP)sKo<-$O?kCXB+?LIZja5a+I!2^ zE-ZAMo&W7iu?;BMTkE!`E>(SuP`clv+PjO^*z&X-xZ1Y{0T7v6M1u1a z^-D$T_#K6<0fo{b*ti5TZ6j0X;D|44|g9x34l?%d>v?j?Hsk`G3m(p8THG zS=(CU!=!QE+E#NnXkJfziQVm~;=koa#ntw_N-DI`nSc}5N0)AH(e$RxT_&%BfmHrs z??q_m4GyPrqRpv-OxS>pFrtyk6^@A(1RM)0!ZBb9i?SOCLpQgENe%RZtV?n+oO~S+ zkkegO=N7Jb$59NnI%jn5sM4!5=D9gt3P?qkn@jK0yMOzxtq}h;+$IYUP#ihnRm^%v z5Cce}iH`y_KzY*_sMU{TWp*o09lVffiY|qZHxz+%qa7y@6m|sT<~Y)0uVCE(>?*tD zMikJ_ETNn_df!!!o)h30UD`nnP{3D2aKz^WZvZF3;|5ruG9j1~)7Z&Uj>l5_l<72e zkum@eNJRvQAn4#D3KM2F{Ln-ma88*6wYt(LvH&?L@cFmgQ>mv{Ct-Eoednq}NEu>K z*f0~EH{#Rv!DOc_=FtvzP%Msr#dKhS+>|8GZeK6B<(|sj_{@PePChSB)zas6yyb~t zXP0~t2Y||f!}=zLOYp>T#i~-o3C@=O1ic_7%;w2|SN4az3>gW@7mg5?!tvPhY$N2h z=hUb8;$z0F5d9#o;#7^Ntv@iKkTr&J(1_-^~|H@&PtwX3p0mY!hEdg<s&g8Dog`F^gz1ulS+T1=EP)CCGPSbn`n2JmNlo>3699NgufAFp&Tj)&{ zC)sc|JmWH#$uqg^4|cjC5dk3P0}VL|Mj19B$E}X#C(eZ(7^ZUAT1?pCZlf}AJeX7| zp)!f4tWP}`A7&nLiVIMm1tJ5bg)=&LoDt0aqD<84lj}}6@+S8w(`d^2GzX)KRJH>{ zz|`6SwE-A(F?0)>a4VUf6LsuWI>W&-AFSb(tEy z(F34fi~*Bb=zuWVWap+jsT`0rL+GoezaSm58a;u+8Y9O%Bu2{g=(8@h35U4ykd^|2 zGtI$qxj?vq3Fo^VQ@SXpc^I+MiHlrQa-W`?t#>haJz6HJLk`)*2;xeuH07e{sB7V{ z2C1%8BQd$k%(1{=5<9gdO1~x0oUINwo-z1YZDf{H+&m}XKZzmrI#7GmgTsvLuO*-I<=?t26RX$V&vql6~;M-Dqlpp;v z*V13R@KG0p6GZR4gNmGmYbko>spa^U_k1Z(-N69d;t@NY6Y@)$ocZ$Quc~g(yr|B! zUY-8ZqNG#I=c*%f)TC+a-YjVPRj_iyQA$FC>IFO zArE*UHnxlt$hvOkj-7?s%_{E~rcw4M1v^}c6F|=R);AIZ)$_?3Zzur(T?QhFJTeoW z`NWOHnNVAG2uwHu_*;pikg7C%=e--pEiNRX%6VqHKjS8S>Tnq<1vOlRV*Vb!#IZ>e z(NBwXD2ufGq93@YM*HqS$Z;hUuy#fnPwv$E>OHkX2lqe#awU@6TlSvhL=$@zvH@Gv z2~zOfl|W6>91msmPTo{@DFuODMq>Z#gcE%G)WJJ><7!5cXr6JP9(mnmu8`4J(E!SWhmw@?M|?glLNhE)h8fD zET8bEbBcG;=`Q4VM&Qib2p|)xguyf^4+QQ02^VqhA%Pg{F}SOwUiQqz>hybY7K%6I z4!0}kO~)JyfMX8SzALx$6b^~o81lrz{jxY=_fOc@ulW26;S*9LeQ((*wjPm;#1e5~ zbc2)tMObpwQSDOS0K#!M-i_4k4T=Rlu~RQ9L#2=b%2444yb{bw9KVf|H!QDs%{|8e zFjGhhl}Mq)ob4QmU3y{GrJnbs+Av-OB_!xNay|(D!5@-f4=qKReYK8CAcV)|bsxTK z^SMdyDL*8BtcryD*A9u#IrM=;UxF6#vCzH6i`Y1IWi}q<*i!h3#bfq*CrDu5{p=?? zG^;8=SnjTyir(cPDiinA6{`WkoK4^#Rw9APg@}x=F)`BRtJy?iE`dc^M(T1_VU!z* zy~I!(r;Ze(m%=lxM3QTZ>}z72%TB57zvh9XObbIi@IcaO83-9T;7=E&c4+g|MmcsV zJljejH4|m~>=c*ynl39trO;O^p=4Te{8QraZJv5m8ETrq@GV1SX2UB?Tb9^|H+(51+cHr5gfi|5BA*)QVda}j;UAZwq~9ogeD3XcT96Xw#3flIX`7uC26Yjs zBZ1Uf-u~7jG0hVrgzx!?J-_ypa zFUmI!x}*t2^)eFKEXUt$A584hMXMPOBbh*yE(5_xLIY)oo#l(Xo zPztlT5~wdB_fV2R7nFfg80eKipk(Tr}3Vvy6t@Fx2DKzg& zAjhnH6U=(lEG!iEtmx%CDpWoW|I*=qd-$?LA3gK~dogmKZQR~?dgI*suh(y=A3yZ? z+F#awtoF5s|M&XeuK)b{v)3-!EGOx2ZV+ zTun))XSHADY$;Y!O4H45?GK99 z5CpC*s^nHZzYR2wYfOnlZG`v-1E+!C{z%sP7;>AcRuHJc_(Iy=JwO54U2CSmh^i`8 zLFHrlw7zvPX_2&H`ZtbiiG13&>#-9|2ObgO+Ke)yWBq~?i2htxb!lWv7t zIT?RE6a`{t2J`l`Q~Ue8El>*QdIRQasTvSM?-P#NipVpX56lff7-|pZZQI=32{-hR z^239{El{CPX|dyl1en1^bXNO^taDp1bavU`H9#FG5CZE*GtdZL5e)CvokU6vqBzBzu)HPp;jHW%8-=cPyjO2seQU=4TS`CPmW=(dTu045uZ$Zd%?s2 zByt4WG_3u9W$UmJ2@D{W3}Zq#CrZaYNAFU}rrUvIto^s5HR&_JLnX|1xX+WL2_luc z^Aun)EZjj#TebhEXx-~Uv7zsHgCWLmz`e#${dfCsvxDG_GOvBAY;7vEZ1U55l(Y1zqFc911u?WXg-cebveI{#7GNp;r(}eak z5~^#N{15ATPr@n2;7nb=Tabh2-(|+qC>X;^cEBeAU@T}*V}2X96dI6v5psxOsr^O% z+im*h)&!$v(Fs4#0H144@Yw`Qdhpf;FBNswyl#obx$&&$>!9TA*`Iaz++ zrI&7^0c)!KD;AEaB{ggJ6|E^5QH2@9fmsTSpwjRJ_ZrCAJ7iG{DAa=m#u7<+QUP76Gg@_u?VS zv)>({5O$&*$O^@K>4CToS#!hVTKFaTp@7@9d-JxyQ|6jCZXGjIr-7nrL!O7V3(zRJ zropWCCwW`bZUoXAyFiSDMOjG=^Z9G-7jSUg7EaZGv`z09#4ZuTXw6IJ~J3J=HA^l;V%vx!DJ!jxWfG09zXW}iJ-sZ8y zNXrl-0B}k|iI#z6L^yY4Rl#rnqYv%MobDOP^4OWxpx=oeE=&rjvl6DKC?A)d<<1{{ zr~=-qzOZVTl@@_GPGbjxFe`Dqpilh7D>j$Wo86-AeqmJay&h-WBqVMb2HvT?ym|DT z)G(l#p;Z&TNdTZ$!t`j>d?NHmQ@XQps-1sAuuci6*h&}}kmM+vr`+&Xy$K5SK~UW? zOc+B4@AXLDo87|welKU4DG?a76trJR=>0wbvsh^7=OrT!fE^;fh0z;C-n{OVWw znB7nbRH-r)hz@hXobj3(D$^n8lcG$4Syv)CJLg5lt>j3V2)an%w2s>0d6%E?oPt~j z9kYhmI3)7m)JnK=Z+L<{XGT;{AHL(|@TIW9DxGp_%qVrKp*Bu!Wh(DH9Y*eNRWr(MzGQm5~&KU9VS_jig>}oVunM zy%c5BN+cNmRkbE5(B`SD%RZ$ju2v!;&gDiE$=~i(StzB6ofJXPGF0zGOmoULmp^Au zePPdnQLYjB0q_skF50>9UxU1Tvi^kHPZOkl&Y@p9bm{tw*8VW6nXjkvcIun+0YTkN zNeLBCIRM`cg>a?6%`MgIin&xzR^p81%LZo& zd-c;Qzk1*8*R2*Zw#W(W(MlXr#ZJpg_RF+DU%Ohyu!|C?oRvUQZdomJ`9+s~q;gZ( zuR|+w0_36;vSuZY)MdDQ99h2LQ6H(4UiORg)n$KDsI+AqCU;PSnV(hkXZJ9=Uz|*v z0IX~$g;`q(!#@wCBIq$`@8`+oL`b3KRsuynG_P63z$J7jlPAz2&awy6ipx0EcmVyg z(?DW}a^2AwxfC{VB@oNb)pa38E~P`?^n=GDbCAOKt;CVXDh`KnE?}%t_K%@_3 zua=>DAs}({leeSxn;0pVAB{i>6x>Q6HI!U=12xI{a2G|qZ;~gIAC1vV;SpCN!SAh3 zyorIneD%SmagZyK;LcVD-o!{N0aATR;dGagz@P@*;1>Y{Bt_ad_4sU)XiLQ<(7`K# zI?GSI-~WYaC=n0D$8XalU^Xe(3^!&yq#RO zJ@la&2+IH)FMloEE9%ROzx)#32JC(21F3&@z%8z~^1Aqb1fyv(*yqOmeo#xt_2u}A z$jxib1t0{k>HOnAD|^cO2cK8vQ0m=H1iPeuxOft39x7NQwW&7BFXMkpr~;cRzf2_f zmFrra`ts(pqNdOf<{V{g6iw{HIF+bHD0fhbqa#6`gt|y`RQt#HZMqCJ$0xzhcX5qu zbf^F*d|{-u)rCf6@#lluKQHfS+;!Df%lwiy<}Vb=407TU?;&>YVK^~|XasHJcKyn- zbzcEt0X{m*)VMoFWGvgSprZ(+ut6T9Q@^HY9oh#xdo!JE??!Sj>;jY(T5}({iUoRl z{qmyqn1Vi9e3Y>$q%%{}8js2!!&x_coO`qS6-Dc|N}s>)o{m5kRTlpgVk{iNI|yqy zM2kiJXx>^5oBV;-1-RLY>Ss3E6R%3$f&O@B*69u=^)D$}^B-{j4s%@!Dq1V;s&t1o zy+pVy7-_*-{ZU10G7F011S-67b4pDxv@LkbL&*>X;f646*EfsS)CmYE$ofm|tMMYF zsvWCxP`4*57fLMCX8p3VH9INA$xJsxElFjb{sXZRhV$1>>IK}tN2p9RCZ>emd-Z=)wpNA*ccv+))?)-iASYg^r}HT&hA;@OA1PX6t@Q`N zLB?+P+=@pGtQ911H>tbOG$#g9-&o0+n6NMb%6jUwiU;v1-a5cE=Lv6;&9uMTU;B?) z^JA@;-|F^w{3iYcB< zg-HRtOM$67Tzh5tC{v<}RsqDn3;|7I7#&zBRJlO)w)!M>)=rnrRf^@(6ku)QKA({J zQ=j8HLM^{J8?;rU$7`=Do2#2N=j2wD4&$p=bXUqz=_eUM8D`P}dg!g4Dw}r|uoy7+ zLSsHY3FP}>2m&eJgiu9~gh_Yp2g>G7Mr!_;tB}RUMKP1nK$Hk)C|ihX^G>U|b~0O2 z7;w*h?7YAgYoq+rMgLPbbCpqhV;N1W60fcPMMY~=T;HH^iFX%Yr&k1zs6n^Fq7sMcmv-$)j(M!4@D}(UnHA7HX{{`Kpptqr!3;(KD1A zaHGeq*9@TPH*2!k{CiRCGtyRkggREgMG-}+2 zaJ&g=SdlHXQ*tt`dHv$DwY72BROvGtEw)h{&J0D=5;?sP(WjYG`o^%Och#1u1ZM{D7mfYJ9l*B@Dcv8QpXzhJtJ4Oi)yWE@&DUuoF$kf(h^(5%goYXHU zTXT$2+=O7^31Ob7;*NY9=D>W~imLN;*r}gew3arbx`4uKk@w***x)Fx`c`c`iqWls z`BOiqXx*IljW%oqq>mZv&1r4bQ2A7jodr^)TR$&vjV&Aw3L%d~sLOLt!&t{2?1C=O zGvP2#U$R~+Tiar=e0?^G3dTDWe8Qil>mhpN?fL|t>gz@8IT1_dOd4>{eWCpi$0Kj5Pmm$>ETD{q85Ip3Y`CJN|Sn{!UFx(3mqGH^@0T&DY56}2hM(HCk2*KoX$8_1^+KIv-|T) zsyAK^^Jh$m<-!I%aZ;cTl{mp&&NK}F;*x5rV81xuk>3!bKMBB*N}M(cj9d^R0_|R? z_6ro!2FIWixaJ)U^eE#fRzxZ>BWR{|Xi>hP6qHRRkn%=O)lGXrD`^8AO2N=n;fM!48%!+Xq9ou1518{%D{5t z;njQ_owPHqrlDnE@iDU#FjAE;E~~ORciy|XJo4~r{_xCkHcmY!OOM;grC1II|5O5X zklpV&avVCbS|I^IICJTDrMMn(5`aUMIIb>vnRF{Pl+y2OkI|q~s5%(>R7MI(tmWN5 zADa59fxdOMaJP0+z+06_QBVwxo#fGb=4wSnWKDpom64i?%=WyD2a(#TXOx{vL75ey z20cnUy-?cOd?@ef!K2G}J>nxZSIdJzb!DiIUJY^)lGILpOV+8F++B+%vq2e({gA=&y zxy$_z{>r_(H5>KMGcHl5bHM_}2s;v12cDA4I11{SO@>~ zX_Yum+p9e!sY9o7xdJy8NArWzUzI=-n5#gK{Xk{pdJ+<6Sll;G-MFerlJ%VqrY__t z0<%o9HS|BBq21^4BSusv!DGunHj%&+#x@^uc8?QhjuU0VpSi4m%Uzl8= zpeIZUpQ8+81EBzuZSiSwR_X-eq;NJWaR>!0$B%cENQ?85)rw9RI)QUiiPLfc4E#Xi zJb3Xc4(4kDC!&ngp`d40>yMpR7QW&$6dBYrd_bG0zBdact&>Dxse~emW}&cyl9)7=P=rN3kr@xA zcItb|PNnc_Dv{c%|Rr14ZdZ#jt(&$tI+o=+XT73p`w<0ADUoKNB>%8L{bs&kT5(+xH zckYp8q;PggoYgm0zN9FC_SRmymPFz#D4ct(+Lzz|t`8qSK9F^m0hlDfe;%}&BJuB)q*Bq75mo!EGnTLFT*B+u?h5)%xI+Ng;(b}8VpOLr4+rqh# zKE@k~tT67T%q?|mD)DS<=u^oGKPPY7r?EQb(yaUw_Cy?dBNM9#OJh~RPvLdeu76wJ zmh(neCRgo8{ZV$Gx9tdfkKhg9@f@>lG@jR=owsF9OCl~RG;#=$v&D`fp@{*xkl-aj zKkN4D&y2QLZ8^IVuvyFkwX3`uTpDLFNqxl<6;WlWf%d6aW>$`lI^svNf(7Ds^bjD@I|}sgAiXOY=4rJW*l%PPeHzR)2cg8WB-eo*sI~U+K;z(Vi=i~4nWFY!QFysN!<9cmC! zr%{cXMvi?X)%+krU^?I zJ0yuaN+aq~ig{iq+VRMbaB7%N2la0#TKiW$EJjt=aUc-P1oc0zKW$&sl;-B5-(S?f zzHCjj)RgckVBUHh?-ikz>VBJ(`LvDkJsH-&u5685NMut9Zy3x&ivfn4f0Fp*;;T-H zw_JZ}-nu7cMs(k4j{_MCY(5O}e!P2z18rCe;NtnH{^X*y^ZASmpYkx|yn60XX{3uQ zO?ir(r|)RK=+>W9v{tfrVe)qH4UJ%Uj*Q0W1Ff9R>rX6Nhq5$FcAiol6VSl;>U%MuYW7?NIEc4<^(Pdq+rw!nZ(+X@ z^^Wh+GS#@xi{#1t!;`2Z8*l%?K#u{+Xik@YUjM41H68k~ zYpog1M!*Pqjl-tOR1&~-ovk+LACVn~RNUOH0nXCJw@G4}f+gne* zGHZLyEQ*Te0>(mkVAvYC(JAX<)T+!Xs1Lg{NRmH~ud=%{Lz`|g=rBj4_7^PnFmlnu z7S3jyCBSS}=SdV#L1&!gnd)@Ek9F|0;b)-rtHAW^;Y-8$j4X%LfKGzP|k2d*f^Dx{+YT zj*UPoiq)2BYb*BR_DpUAnKpiUT>rBCDVk6=oDtN$^U5Y5i}3clzV)5_01@DE{qgx5 z>EM^>ZZL(d>E_0Qur@j{(|eiNk$Sj-?z~R0Gj^K}u%Ti*heRR>!Rv*ZfW?S$W?^Ru zfFByp>TW1`YgFb8>EPoFlZ9a~s?PBlZ2e{(pfqpoA&@emLZCwe07I@FW0sKzO^D&Zd-w0_gR*sB&KS}I zmp^$wkqr`q-uC}JWXL}`S zv-)<{`mqe&0a7N&5K$nHCsDd}>fnULev=o&0@$Hb-^!D9zn>-R&i>Xz?>+Re_3v3* zUVQmwuTz{o{mA78wtTEnFutb@M9*Zv<2q7K#|Md#zNF|<3SO!biFHkmcTJ9TX?C@gJKafvp;SUywekeY zk@r**LVE_XJav0Xk62w{(;z98IPNR1djWpF{5_R?-M)ctqZ4JBWIJ{+mZc06Qp##e zS;0BNlq}YL!#r%aKM8=GN+4y^{HC1s=ioq>lz~z(F_l0T@m1Y4ZQw#9%Hy!Jm5{?%t1?^P{MfW1l3vMO$>Fm{43kRQoo~uME z^!MOJ6GLU%@lmNt!HAcU=v|ZT%B%KK5vwe$m5;0XJvCMfYZ{2G637BhzM&|+9ULeZ zkB=UuVB0Ez+_YCZXi2rV)3vfkDFD4P5X=xDUS1PR3zTceM|Cs>YhMWz{z#cIPQ-ae zvC8dP|H@ZX@>sw9!o8rqZ(M=)2$?iq#m(#5+Ryw89xLkx$F(CLIo2D%(j^>@R}V=p z=7i-p6P8_`c-zM-Cjs||Gp@_6{HzAzmT$GPiZ}QY~B+Yx`dot8O8?VUXanbw!$2wV%r1SdgikCk}QLhbXo?k5~+tkk?)$R zk+zFIrQAy@kvfz^R%iCaK0PLj#H%;uc2$WK2hTkDpVp_1(~n+W@s5ul6Dj3pRz%`E z<2_}Am;RbUmI0F|DXm%wBtyND$4%?f=IP_bYf4EDS0drtSh;Svj~PYU%-bpgrQAHr zKme%@#SdlXZJa(9Z|Qh@?wTo4E!z}n1sN21K5nZn#o+?lY7b^E#JTRfEC4b4{7$+h zNl>|l?&(~)L|WvI=Cck^D}jeoi35+D1Cwuh8rCbQ?@ub(_RVEr#kRE&r6H3dHSk+2Bb08Dp7D0Otp}n`TjS4d>1&f?~pC; zxHqx|Y0R!NP7i_zh%USEMx5Q_MRj4V&VVb5SChiqD&r8=3e|ra)=95s^YrD#u%(d6 z$}lYVMs8H)upQi;BY7N2mIPW<87F+!;CjNUFgf+HnGam(Cmc*1DlBfduka8L5B58@lfM?z?;|F>7>L(V-M>TN$QzLZUHO(ogNrqq0ElCI;BS1idm4 zQta}t4nO5cXmanlQ14mk%Bh{}?OwaKtFqhVME}{w9gSx;E~wvAe`)=(wNKSvSNq1= z;luAg{9T8yJoLwhZasAE`u|*i`}+0k4`2Jx+D-4d;jU3tZ+E1K2NgCWjHV99xtOoE zBHl!4M$R17NK)N(ug+ioJs-|UnNwv9w5;GhN=zfLC{_B8kT*m-RrW*@q}H&s)sF*}p$4NXQRPJ)W)q4Q~-pKts&TqeHJcoD@OHArOuDQe!! z9tQ_SHH3(wH1^wy))=Op`GOjw|1jR+8mzu;`%_464%N&dN9u1cTl;qlG%1GiYRG7t zDxm5^ct%4^8Z~G2-uhctti0h)h{hUgVvwo_QQgvW!XF^x8AWT z(l`pCi)c=k81ZY!z8klVt=-yd%jWou_+*^NM^5D`G(=kiOURzNGgG~d^ZRV=M|Yd^ za3@nm%rWT0O52gjR;d}NOHh;@$Yi(IemrZw)f(>j0uZH*M7tANb?-o3JJ16(EeS%; z`8RjgmRCIL<|~hDjkDz~s}|uO#|u?5^?Phj`RtMy9xMj^-rA2XTfh3@YmSborYc1# zllD>KJP5v3Ki)1^PYh1{D%t(FtlDzJ#`QI1gK!gXE1I(dqk2j!U}l!9$+qf0pSKIEFw!IxFrmRA zx}Ex)qiwjhbIYb^fklW&n|mZ!cP-qnR#>Jw3#06&DuhM)Xx%f&j6eY&)H&z6)SXQy^*f5zj?8MpVbItn z7mP~}{|XoZ1A>ul3i$qJ^`9zQE7ZY>tDc!R+2=b}AH;)fnHrX;K5gYr{b%#mkR1zC zF_sVAH$M=BOpP#+r}8@X?`SFy>pxMnR*uB(w(Mm>uqwi_ka&_Q{(5MccIN8GKUuWq zGz$phU2-bNl^prLIJJXdpd8?EhOyeB{@SATU;yS4Qb0;pzIC-ePeNao7%Ho8HlIA? z>#r+XyC@E6nftHlgBw8 zLiQHwphasvLOxf?Ht}Nh4y|S8v)lbP`E~A5IEkJ5ZFy^qYW|#-3S$ySf0I{h+-2W6 zJz6~AF5E=@$BWieMZ0!RUq|%x0R{vl__ClV6liI__J{Q!E?eUrD~qGWPR$N)N3Csu zl}>Ax$9Ff>@W=HZEn0J$N74+Og9&7NGCCu~en<_v*4AW&)J{EHLx?WOX5f7XOP1cZ zG4ZsqPEtC6fdLP}2c2~5KT`ZQ8G9Enq)w|>(5Zb0Mqy}7OmNF|&)ls4P|;ek+wcN_ zn5I^!uo*RSQK$~#T^&~PtiL8}O{bjrgR`9tN6B0-!!~_v`7jXxMkqB}HoJ8@$Xl;E zK7=Oh5@IIStiTI2pf#pGG!%%Bl|}WrrTAMvl|Ko?Ca)~xeOuFwH!8p14k2`F6i~Ts zp+Bgf%vxU$y{fQlWbGJidA0VrL0o{av_TH~N}Fx1Z>=P*e(l1`E_m7be{z0Rf%iMl z`t7rhHC|o6?~IA7C}@6tcD$m7n1VVfj#q7WN9T;3V|e+C?yKA!$g!L;bMXgUiad+Sr78ijR0-oBSBcrAK%1w(JRdobs|0{n8Hj@qe}Gj+Au-aI zWsy2*P^n6!NML>J&AjLn<1EKN^nh6hlAQpvs>E>;S=qLyMtWQ^b}3M?N~C5;<7G~E zsgXv-*rkBo%1DSWoTI*K8{;%J&@c_}4(Dza zk<4(H0+b!~rjjeJAe0nW)es@%fHQ~GowIxL;dZoHv-aNaM@w-<3-Y#sS!zzEQ}nv6ldB^cb+CHBGskInp| z5(m>`bwE#x^V}j1W&waa?KlE#arq69gP&`Rhrc zL{*}IOXvK|t<>IlJ+u*mq~d0NFd3(eh0Pcu^4SLbdoQc52h~ZwyP0g9{+4`WpsZ6td(n183 z9%QX3P6|h=5(iCZdHoId9oYiTtfWr*XU;!uoPKJ)tjRwmFrX@N;EhS%E|0wEzFpDn zeS!oEjLdsKkxW(wQRQWim?2B>5f1K6&MUoft@abOZ>SwQ{Jz8g{_qvMh0Ck6!sYFU z{%GyD58cvu`r3`_JBOaI{`vK{tv{@BUj6R+i|gA=*Y1ATTTdJxjj$3C0r?&V_bIZ` z7$Z0p9V(l11;j9BY|ZNTMac}WwAq}Jfb7XdXUe#8y4?7h+l2Qq;SjE5{^}pk%WEU` zvMHvFVjQI}#|SJBOhBYM2_s2;MX?3W(I<=6sF>(D!Ezi2PgCODAqppunuZf5`9E>% zpD0?-0Na&4gPD|NX%%H~Egd79ve7ejo8S`tRo0q{<&-fO-jbv_Jq0xj)gLOd0g{=k zr1&S&yA*xHZO@3{r_MYwi%02hBSLc2Gf^jOA)IwO6M5in{V(IUsqRADjH2G;*dRL} zzKN6ovsCv&g_mCNY*GJlc4VdYcm;W~A94cBNhH-1?vAJq!su#4K9D zgoLB08s@9?9UWzrJ-c(0d}Q?gQ{Ea1Otpx{rb<#if}p(=a8PRll=r z?PW+ldwXC)j@}4cSw=eOtf7rNo#E-dw`e_>;dxTL4C&O!wkubS;4FA?HdPdvZK}uC zf4OLF`Vu5n$Qq2JEFEM$QfE9CdAcHbD&*k(zQ1UVj5l_Ia4zp5M`Aj9k9J(extV9(2s9iN}yU zHw^|n3#qR5ltb2jvTUw;V|TzCb6l66myTE9CBA7~!}o90A!WSwGi7snBPu%@5zP%Q zDg|Hyye5kZ?ojzuC9Sje`rYQ84*RL7=#DU_Oe-ZN!qqCEP1UARIHq>j6t`kpQAJgT z2;)T6sUTRHuw#m+L`jEKX3RAb)PI(@^{EVqcVfF?g8KjzEJjR?%&ktJPABKxPP_i6 zd0VAF4LXCTbKw0RMiwa^*<_F`|AS~YVHtQ9#fl|C<3|f7&gz86?_n4#{dRR-~;YB^*=6JI~usS;IsyBS1&~g z)!euzb?vh{yqMSTEn4&boXP@0Ph_+@YPSfQQG@J`u|X&Jqr-9i5A)WcLOh@L0ZOa} zQHb>-qF}FDg*dG?q$FwK`Te5xY=X!-z*1KYi}7|dWCM&7-(tdR1po?|)_<>P4d5{+ zIBN#=40=>6mAuv7+p)AcYR89P|7g*=XDP;zwfa)Pj$)F!H14)Pn%I4nX;t9*?`Ex! z*<7uY7AvGqx^kA2kli(Q0X3l=FhivuH&NBMFS%-Y{jCqwuIUB=S)~m6Li4`GQX|Fq zSV!CRs+($*A6Z`f-k7Xmk76C%rXlOaTeN(S>fWQ#93d6Fu0u=wxAV3$Zd)J}K49n% z700-d`wErJRWfZQzM4_}LwQ@rs2P)=nN@ocRaILK53<(w3`}OmG;=m;59|LWZ;OPj zDr&&SotW5)jCK#DQWmZ_-w#eB>){|x`-Htc?=ddVXz;yRsF^QY zpTFI1KpCfrR*5hUR}*@&YJ=86*J2Dq_kLfZ9j^Xc`Ad<+rc_I`6(Jo1R%<*;%T;U& z?ZH^r?U2LzZxpSkBctByhJJ6T=CWM1Ls|#P4)kC()i@X9`rSoq($8~>^!BATkV^VE=4aGE?S~7O)b$YRC0oEm}i?3^M5eSrUIGMhB%j%I}%`(wJNKwEina>#2{Z z10ZCf3@zpmKkxzh9Bk_9x_(|w`qzrq6urS6ZPW_6_NGjCxPxlCK;<0zy90w>|3J~& z?@Z%!5Atp-y;*K5MiAZs&wI9z!K&YtwZ1+ST5)!1PH!)~G@p8$8lW;L(@&j7Xt292 z*MEIawKn%l?eR-};N0uZDUx*mdbRdt%kcxBIo9hq)0ho2ufK`r;OWrZDM3SYslDtRlotdrKr^Z0uJ}HnxD2HFHV(1hsDxSV(c@c=M zDNo$YN9ec(-sIR#2vz&HdvV@8{o*20D72%$`z$RezEVM)L4e`fJz#?-_yDhm-AEuG zE=^xBc8P($Hy^tYA8`l{Z2&u~Wr;kBsqYJxu%iz_G@N8dB~W-KhJN#x5;jQd(u>MS z2;-n)){b_Z0)WflGN?6p?WO{IG{=`pq|h9FXpwHnB6YkbfD}FiV*>I)%y-i9nyA`? zp4bT78k(W5znTw-l+1YF@Cs?6)GocS=+Yd;3O)n2q8aC_NU)lCgj@h(T0&Zhjw6Wfl@^h?N%b}dz*i|a2dm5r_X8ZMsg3o_l3_?02bA`UY*`A$okW3 z5uhc_4@`#U9!?3ewIMm*HjZK0K#8v{rCao;dBS$Ef|^I1-5dLUah9QQg*Lha+UK0+ z@PkwFK;rUIMm(6sN<}Zk%Rw`L5IV9Lai<5GB;DB8rXHClh_hju)eVVg+sv zQj}x?(B;J4a}}j4{V-Zy@ssR&tiLb3k7tysgoW0&bnQCev;_h5rIG z?b+_xIsnk^Mp4_$nFbLip);XsrP#1TpklzI22zpAfgN8;)wRtzpYI6o2#PIEOS@s* zy1bf@k4&2a-&st7d8L#6YxgNALL$;X^YK@n#N`c3uP3RfwvoO#4H zPCsvX_ut%q47$9-VVs-=S^fZ$+JM}}px{`VxDU7KixShQgkV{9_uJtApZ{R>y*Rg( z>-O$k-Z=g5vM62nUzHk&y|8bHt14t`oaK4BgPpq6(ZisuQFMey8lrB%@|Q1ou=>fI zIn3ti@5slii4aV2r5}3!A=2a2;q`}A2jvE4DeePA7%E}RODS8sDKUp?nS;vGnffCy zlqu5>o6Oi;rsqr;z)XEJ%22M}0EreE*W(uH=*7Ge$f~(Y+NO1Akah%T;iPg`z$mpota-nTpJuh z2zj{Hv9d2-Ps=H!@cv8b&c^9kF%2ByL&wGWlrN0WGp^at)b=1S#ko_cxlqLE3{SvW zXGep?X)w*Qsh!b|gIz4ak=uw$-o$jKl?Kj7>&1l>x`fWisyhmX^7eoG_B)R(qwe+8 zvN~Ix5apcC4}O2JcF``sw0GW*o%^|eVG0pGssFeQb#45dIIsWI*@HHlyc`){} zc(A^#H5ORDZan|9_gA)#pr#hjSw5OD7w6L^4To8YLu50rnEqd%y}z;y?iVIh5}ZG6 z90%i0D^a}6JKj9qTt<-H>hFF*F3RU-CZT&EO0(edgXJJh7 zgCVDtFxZgmN~YK^Hm zR*v6;6Kr}{TjJ*Dt9yKPo>$j4iTyl|TbwMFb)9^LGm-RVXqAyJlZTL)ZjGdsDm`k# zuViDlOp8-1;)J1{!-?wzbv;`zMvQAL1oi^3 zXK(K(Zbj_{%8d+Nr7L7+G7;A0#^`%>Z5Lt(N{E!7 zg}fLsAXB)OSlyBaY~z--e9`Id^speZlMvcSB<$nnh3{itJGdA%Jg417r*{IP;~~74 z(>Gc&4)_Zg0XsIaQ=o_w%F8(J}F-4HCvy>u~B333NnPp9D^hlIBq z`ii725C|lajNxqep4UAQMtm92Ah}O3FZv`)g5wh>Jms*sQ^e3ojS{HD!BD4LIEnA} zNinFGucC>$rtixFb!5-v9aTxx?OanL6DX^T93$V!c5fQ9p)wUZbmEsczwQ;A+v`0f%9E{SajYVhs!xKhi$!2=<_^3%j0g=1}r1>VFy=zVpypHUYg8jX80hjMkjwLd4ADv;)bZ6zN(^+Q2$VuDtpviyExx71NSj%t4#Z~y zF|`tjpwM*>e&%vgXi2YVdHn;Q+3KP%Cs0(&C@}p46083!%ep59x~v$v6v}TU66RZT z`R-r1XydqZM^cv_wY>QMy+7R741qzrgt1U4pmgWz3vHFo!gJhqI6OSwPh4| zPk@DNW*OY#n-@QEvN;tH1mF_Q=G(ku=T&%un| zN}Trc_BT(DxHTt^+at0lFb)SZfy*cXD{U`7@uoZF020GIJP(sXl&*y7Bl(2oOmdiq z+f8jt^b>~-&=d-k6e4ndtQ0hm+s1lT=At!EIiQUhuy>&6ss`1av@3+W!?r` zkUCM;AtK&*^zx%WabJ+B(W?oAM6nidA?`UL-=MUCHqC<=aaxw6arSO&cVbKlbsDv1B9?}od$StK~z`Lc#gO~ZPc>X$kZy2 zq$_~>#^LP^4grZn2|%G$sgrs+KtQVzcK25J&b3MgzzK)BUU~4H_{JQh~^*nXtXu_n2l6xa72{ z_Sv|+Y)(ppfIcijC>8j1cOqaP;29UD0sWOGQ|`uBz7v0+- zE(Q$I)zlkTm(78L7*R;>(3&)mfnQNAg0$(k#}q=EaF4wPQLfdq`?DHSj2!cJiH9g- z8gtnPP>eQ`%3{)LTou5#D=E0l`b-o;?f`VsjF|yKDNcGSnRL?gDDz-)naWDE_8X&F zm_3W(w?kT7`bQ}$Q-@gzXElOf&}jg1g6;6noS2$7_BFs4&j!1;9T&1GviAcFVI z;}u6ei3}H}keSm~lmi9~C7`vpl&vEJ0>2d>zUP)KHS*yjBI69kqY~DeuH7E5{wh}U zC~|853RjjA?^0SrFEjXwZ*@LXee>pNYOPuW&#BQ**jR*JjC89!l2watc+Vd|oI1k> z8L7Or+IVk48i;BO^r+u9PZo-o9ZvvG778lU1}&((bwK36G(CwNgpV0a3_@}!&AY(x zHK}Ca8XHCH5xpVTOTY`jQoU3|o=k^up$qo7EfPb6VW&Z%EC202;R=8#tPe*|Q z0h2)pHMzluO-6$be6+@rakq9(*Gt6}YqJhcq%36?6xuLlsG^J-kH}gdqdYui^+LAa zcn4T6KwJ}*Eq`y(k(Pu$n>1;~jxMnXHR(JLR0})cPY}?NzV>0T?cnQT@*wtv4ST!s z@ZwQa+@~XJoEL5;ayBr*Ih|NzD5A)vN=(ih)ZX(42YKS<5uPNOk4|h8ayjOfWm1N+ zH$(SrTw1h-jvJHm$yQ~nC#MRS8CgxZSl80m(#}fsWFMur|tB!A$_B4qJ_jiq@*}vc-^twy8); zTB1#0BN_%c(nnBygT}>0Yu@aA%M@^rEyrRN>vH(WPy9=k@I)K|aXgFgCOjXmu4!?9b!M z{-gj_D`D)XgS_mY(x1&+z{`I8j-$97J1MB!GLWl3^^I$9iwaEA3v!>z;Ly4TfH!pZ{b`6uDiilU*qUxVROb(T_DLtON{-~>OEGL<+$ z8DYV&jNTj^rdz(86cSM-Oh+0pn*?cbeA25)Fi0R2RpO{(Eq~-q7tt3;d^?2L75YOY z=Rl#!GK_0}J6l8*JzTFVB^6wOGlORMKxQ3k1uf}7am^yqV00o}de^`0iL&X5k#a?L zT}n~fECVUZH}gX2@zg+%&AR01tUz|K7HJvD-t8)%t)%IF%0$^CQi6_Y8OfU6E@0oO zo!TznQ;Mu<8Opjau=->UBWa;FZh1^@6RuY&%CBW8dcu8}Vq5F6)EP0p|9*S8(q4k% zX%VMCIstQR(SP*=n~zQ@BCbw=;e_?!INCjXHIlSY69{TW*iq~kB*H%RS~K3Qx1!RI zaIstT+q067?|-fSskXS!9mH;{1Y!q}59C&2pl@Bxc>XB~+_*}lO!XpOS!$$bt|AR~ zQrK)|Bn}ZIN%M2p@13rkyY>v^?$}*+%QKdjzvh8s9sIonMqVXO0iFHb(+})!g8M`X zgcZF5h|DyaU?mLc;~do`>?((BEXFb1)&Wj00O zRGc<;XPbF&^R+){*wUDhMVR4;Qd}>WHi|HnX|PY2Z_2upaT8k!+{8*CB0u>tC9yvt zd!TBzlfvDsgz+VKKLO)Pj1#&CSmV<52}I5^5G-W)cUyRl9FslWMROX@Gapl)T26!% z4rnD%556E1pGxddNFShe^1?fqi&+UH5wW5ojrhS;?)rPWSDkWSzv_|tLIRz%3`OJ< zqHhIkNeuOMStz?EHG_j$u9Z-<&KSEL!5~fR)7NH!`U0iUQ!9a}jF0k~a%!lrDf^Vd zZ7oC5-y|gTq!7PLjr7&!i%Q}0RwAK6WG;WllS74i=@u=-6q0Nu5VY?dXFVmll$Z*7 z@~TT+dT|F6Y%7uQd^4!LE+vLqX6mK#TPbwgGE(4z0Ayn&dQ4KJ{n2W10ZA@Vj9@qd`c#%6nXKlux>K{4^YLc(KbI~4>C+GHCZ&|}_qn={ zciwQc*KUR#lw|M>_cv7LBL#~hC9e~e3>-O%`WUU1K(K1p-Ez-n7G`%F*)PlsitebJ z%3CWKOfz0lsPo6M45M0oLo%LkLx}|)G33#?@AKBbWjPzak(6x409#2{*-3l&&I}R)@g$FEZ z7RMbaYNYED4ys3-44TU;zJ7aSOF<;9PuOxtc`dnEHvxkeGU{~aq|8H2Ka^d9nTaVE zl~PXQMV|)C3%~4A_43p(-&u4>X|XwJ!#49SR+9;D3_6Fc5XtD`)Pt6hy(puc$aVG1 zh4fI*%R+V3pa}>})H3nal{<3gyk91**PATZPAL49Nas;t-Iss$=?5=QeMSE+3xhQ$ zn@>A{wxW899wE>Mm0IyYE`=;eYkHx}9o#Y^g+2%(SV_$k{P$$eTBeVWl&0JtKWuac@_6a{O*^boSA7(W1? z2yXW3L+S@EcaSX&rbA+{=EZwrp`gB}=7!7fnf`ZHXuM_4lK>Wff4tI&{M z^hSE1S_fNWQa^?IzVo&Ymug3?h5L;^HR=fo6G?9+60fJsx7s>Es& zLdl?*%ipLbllM%->fD=@fl>sfDuIaluLvCxs3h&~8;CO5YaM7Ql_p42m2v2Mh6UB9 z?mx1H|5{0J>>KC$vO_7VR+T`+AoHVN;>hikfl>sqDuEO|ja=k961(*6Wuz1_tuj)W zm*=*s8;M4q5~xG9Cm*}SK+jo? z9jrit+*&14D@eRi*BmAFDTl5-evO;yFCG53hc7$y(L+B_Lf0O(5|L{>y>V{+*XuXb zkJtXP_G7iLJ@okXzg_?N^=GeNwD!TZm%is^cXjqc)jTwTF!BsgSQ*MH?0tr9dtHZC zOds$9zN_6J&6;6}+B?Ka#{4tDs;05nwxPMm#{g=y2zPbh$H0ji&9XT=8rNKvb9y!b z60u89C@*b8l(L^es)KQDw94kpx26uK@Ik~dY#I)&ye9%ChBnM@O2vHIV5PZw7{@WH zDxuCbComAu0~#(MU8G%9*Hxhj5j1#wX3d>Wpvl5Y2Z|>oc7Qnu%MiBl3wERSDA2); zW4q0Ru{`ta`ltCMxYA^!LRYzCRGLH$rVZAV*{_3s@b2ls^}!#7TwEXE2lj>r21lb2 z1*?$MYCJt_9u7}#-U}dtfI(!eqmboL%-?R2VDl>w6P-3J+#f$W&~37vP8?H0%Yh)v z_~9M~G|aJ7_P-_fLHM=ttn%0GOl*5VzF_K%3|kZE3%Cf!FEVAe5cTB7^7jEt!avH^ zPe4OMXWKw%z;8iLi8XV&fkK%~=KTiU+^na-B9wq&I-nGRrObi2TFiA^`Nlckv2xTL zH@>lKPI`!BG&Mnh55Mlgpe|_cIp|K!3KmuKPJ`RX>erzJJ5J!n8Eetj=LM0Bb6lM? zr<{61abw!Ju52D?DrHn|NG#1@QOw1Ww+|390F;^&K7_P;%5HP-x*fi1uI_ep>QH`gT%}K>W%Y-RdI5L3*f=1G%i#LmW=w3x6ra^Ia_3KV%M6#Tr zDAR#~WQJd6^tNH7^EDola~d?BRyH?M_+OY(;ZEhS65@L(fPhX5mjIA6#%m33GJc(( zsN4(zFy1&Jvjv9+rxs$3Q^3&xGE$Ii_F+Fi`mPLai4*ReP28H|20)|n0Aqo8rL$$4 zA$^VgdcW~itB2|D(1eP!G+jZ!M!)W&L!%1bj!j)a`Jn&$jj!Hq4wh<(7$O+c|Ld}t z^DwYx0Y`G6q{=?%Hh8*ZBO@i}rb(#*3X#B(ad+*dg&tQcKpNCA!giR}i1lWb&Ur{;EabA8*ArFoO_8+$%4 zIjS@+Fm(3DjVG*{cXudjjbY;hrbjl^^t6Zt4zCM(HnS*`Tv;?2S!BQ7h3KXE!%)Xt z%{YyogUf)GU_1w~q#o*e+~D1iO))7L%1|-!EYM~bg&=cg>fmnKhqp9m{HwneVXWG2i_MAaUrhxruZey|TF!<#da>7J=7Ut|?1N;zKnD%Qu+d&MhpI4; z!;y(akIraXhhW)=#?iO*kr9XM85!>3x+?Fq;|2xeXcOq03_fjgCv<5L)u{w2eDKm6 zwHqh$EY}}KDRc9ZSMqVsbT$q@`_TIjUAq3FwLe^5ar@!dqi5b4$^ntNvBV@G@bcpq zqOH4nv%S3go3h)PLx_J>Fb4+K+42vSo6N1}#O>@jvCD(ecx4<}SU3gF6K-ZnVK#0( zJBrfRWL-*O22?`XtmC$RkS%I4Qh@ zN*tv83|Ds9GOa(gB2Egsq7nxlx4r!C$DO;8*q_5ioHp$=->w5%#^}zZfa&#+;UvqNvlL!ZoQ+!#Wiu|H2`LnivP*=BR>{J|NbAMiwi&SUBlTgOpo3>o zvZYa(k>VIQDvzl?P74LRtWVA|d6zEw>jx{zfJk5#A8vKZE$@C!wk&iBV~~HP+X)kF zuk1QoSu61%W=IhOh;b-n*NR9Fi36_!>=Oyyf=N>Obd()A8?J`-ef%LEB={KRMN0P3H;0*k-y`+CF5v6B)&`(PJf)MQGtN! zn*=`K93vrG3Dkl_Utas^2R9SP?d9dT@pqNvB3(L+BXc`Q2jTB(8=3p}?HSZ}8HXzo z$wi)WspIy2`M5DZ>i6(csKy2=L740?43kciqr>tTFu#!BGz;1%P^|KDh-I7Lex(S) zXyVKen3v@}f;A2D6j{1$0_%<~rj@m=LEmc71sMQv*-8KcwpM3yiy(o2g- z%y_xWp{_XkI%zteIUqZ3*p9I^pb%Y|%1EuSIqE{X;a_KpM# z2U~(p{%;=C;WCImB zc9(b5oZuIBLW$V*!;NKk+?ppsV|w|y-ldzjedfVN>4>%Giz>q;6Bxd-_EU!+Jp8Of z?>qGH^%t%!TYvMU*Vk^|xb@0xa|yBBofQ6EF&b@RE8M}}dF03ziQJ0%78d93sjz%X zXU;2PFo3DjScH{0k#ESW9IhTop)Sut+2eK=2@J$aD7d;`f9H|QQ@eB|d%qMxQYd3( z7-W2!daKoIG{D3yH{(6ss}9~~K9iUOB#^u+k?0oovK>ZJJ1Njc(WMmbStU>#h#ih5 zmdV6Omt~RY5h4s7$e^o4a-<2blJr22D#k8_d{+jdy)03huU?5gdSua~6mDH5km~-$ zUv}vx&SYYs&=`p8n5 zd!}M__ARgbvkx6zKH-xO)|kv3%vr3&>NhF%Wx$WbP!|`SN+DiW0(HocK-+EFG7|el z9(2{G6lP^5lB1}!f3p-GY9)}1ONlB-?9&Ai zir--Z6|@XAAbT3K;i8!2iTR}SSH~hLGSsmHwIeFA2<==!WH>d{=B?*tT?z&J1DUgx zFz8?1>@0dyQkTwMzjW=fYrnI0;a6Pnzy)u);JFuk@%g`X{>#sAomW5a)91bZyr-S} z{Imc5+z*_4_1V98&TG#3({rA5_N9lObk@y{+Z&%f>vzuTA9_vW>Fa;rICuRQ5B=%k zs}6tH;rG>^Qd_V6-?i7CJ$dv+?@>Da^$YJ^`b7oNK4c^4g7yLoNz|9F6> zL;~__mjC?GM_+M55n%^E8te%4WPoJmD(0pPOG8~7Z@t?j(@Ny1@y`13>R1)E z`jYhOuXAa4=XMzoexAX7qj(Xb&x2v(7xQFmdqDSGof?tut?6Y$vJhJFCesUG^a%qVo?lVk!!ZwWcQk#eVo9mKa&F^wnRLNXK*1i7X*$=D z>xm)CIM1%E@{3X!RCyW7EWiJ8KXKLZw#G9z5hBw3Z^)4-wqjbg z?SYx$gi#8mh~>o>hxP*s3>Bm70#%GCQp+ zALEKQ2dnGItV?A?(PXY-(GR2FPg!4)(t*oN$( zpoyA{HKcA9!$spw`D=yAUAQj>5#7ZuG-F@~)h=B2NV{+~VlP4ty7BYn9P?)hNy%c` z8F3?2{q_RX;?zf&SCQ$Q^%`$1o40hM1HcE47^)&F@LJ0I^<^@3r-gFgYTQxIF;(0d zsRISw&^3j}ln)5cr2+LR{q=zDvuS?NPP13hW zn&4;3U!U|@#_*~lc@as-Orm9|!YbRrLyKdHtZU<^%jTg*LPw{`(?-ie z6wLXn%ooT4=38^nY`i{i?ll>x#XOQElmkpmJ_XXl@kh6C(l$~}(?#RWt6!IUhb{md zG=^F6jRTjzsD3}14J1Ivs=kWNKT$U4EEjbuAb?28b?1>!7zf(J_dv2`>iXYnEX(Gk zKO?!N#00OXgOTsDwLz6gtpK=q9plDrWph(TN2C55hR763eN?dsDjvg!bR^Ea)z|Je z9|EJGU6}cyr=%XJu5R5S5Ud(Y6o}kP5?vTWY-r88`jep0dY z>lC~>==rqW?SgabKiZ93vgTWD^K^f^WiZd-4t9gT8(_2Ac zG?#uP0pgSEPXmwRk&H~Bfcr|N0S%FtYMd$`hBsiZJyXyP!*ibpKoR+j5d5Jc13o+< z1Jk&5)jULVi9z*YiR^(M2JhU)YW8sVT!ab{ly-HbNkjTv_s4p>H@YtsaJkt z15=YmO?%OJW!4-dVrSms9=|O+jCfsg_l!My3qU8CXpqPB?6>OBjj)USVyX@wSl=RC#?B1R(yLA*4$!o%MGYN7~ z#*$qhK9oqCx2nplI+cPCC<95Z)8fevv0G`KQn|kSllP-gw9>EzWhgi5Ugq2lBhjJY zw9C)fGnTu<7d7&CzC%?QB67 zDw&x2s^}r;m7B><3QDt#gwfdThEk>M2md{VvhtJNGaL6z!0XLIQsHGB%f!ED%onF3`ID8ZlR(+B~I}q_&#zCNT z6Irc)iJ=}-hDyQWRzmfhvLZddv6cF!Fw*ajRVhs_vl7agKhGCXiQH48*)tjU%s(3L zd8iao$ubo1j>~esDkVlD;_g*3+T9r?z=tc52LFF$_a1CnR@Vo7-`hRA-`yfcCdG6E z!!UEl*j?vw&kHBQ5K7Q0MG^~0#JQYv?mZELaTF6JQG>~7jP}Ke1}^#!Lq)MdCIl4$ z5ri=)g7TQjfPjxMg3*{nCmKk^VDkB`z0bP4V{L$52wdVZxT6?Xv*ZTdwkHM>- z|BP6@g@Lx(7iIK9aDW4cdUIH&tQ;@{eCFQcMBnGUs-V#cgb_162uQ%~Wub1mdRzMX z`p}d?s5`L^9{K&}UPqs9&3!5n^UQG&Z6fuXJ|2am_mmU~(=Cj4kJQraM1prr+o>L-iKA6MJE6d1n-c}O(rc<|*Ub6uG=FjqRU-MBLnV3jrt_0g>JM%|pe*Dbe zJahiwOCG)N%FUb4-1yUtH*PF9ZuA2mxHhp?RU2`MS9Abg@|6rrj{5tW=Ka|Y=4`MRV1|>Grh0ogc+BOqU>h8S8ea&yj3F|5MxRtu}xp%!FH{S&qhE(@n2?8}>9^-Nh>hH|W834lQ-aMckRdeh`V0Mc!t9AVg+e2=MqZe zmgwwgRewirK9t}JRw|@-NMXvfl=%Lp(StWyyAA6zNnt{-KqK3fNv(dE}6=B zSc7le{Y?_goS>G=5|kMzr1xXqnXdLeD>O!Xb4XyE&Bz|O>P{oa$!wlT=M3U_xL1E$ zei%t-Nflo_dK|uZ!48m`0$vS=W7L2Z=lJ@Yb93&>%zI(6-ItBKBoOGfw@P$Xwo%%V z%Ub=i+&q+OsfWsua27W*=*2)z66Z5Fdtk8`wfgVn=0vVt#YuUh6c|Y49f?vec`}zJ zlT-;=jQU#-n;Tbjm5?%aBexSssRczq;u@!640=1A)PFZOcivMV0LR4v_EvZ4t&&{U zbKq(jlO?;*Uj6sm=J>s91@j?{Og zKZCCj6E_l&OUBewNySmUci4RDTdBGwi>U+9KH``~b}4RF&Wkf8h5GLtHlM_T3~^w$ zROuk)5Gv78dguRVBrQ7*P{?o7*-< zHZVWD47K9eI2MGpyCdX4Ubn{ik%u=BOSxw=CdA}P+(m^U zl1E(9#?$KGq}I1uN+Wnml8I8(;b=edvva&4Gv1E|#+$JD!H4gNDvP7z9?jaB4+r9e z#+*We4HeT8VMdk2*I-fIzkZMjQFm-X*+2@tR%v9ALzR6XVMiE81&4a~n^NoB`a6m= zPM$$Lqt_j&bs4fyW!~f1#92*wXSk{k=8ugk3lHSTP7knxK!ANKsA_vXvXeIG*$TA~ z6>wDj+x3(9(qhfXxk)lubHSOwi!vqcHuJg2EPJartXr!a^~Sr%7a(^AaOTr);>+Le zAu-Wdb`G9aZ*1PBk1rQiG#wh041PTdyq{_7J2Ral*q|E*&!B$MVRLWSCt2;u^0FwR znuN?AaASF8YJ}=q^R$LJ$J0&!`PNX5ca7z3YcZxPv zy3SLULuWjSUf2oM^HFaBLS@~$c=c=6n8-5PW)8-h*+u8qUJ^;3(h;PPbsMb;y*ip> z*$G64{W=GbL{>Y1C4|dPCpQz4Miub9l;WIZVu(9jm6n!lnO`i*=?vYhG{1hJ(4w~1_%OPIqwkHtmwn- z;^Nh3we%8nR*a7$8Kj+Hk{j(JE)4Y*DHOhM8Mifua@jt(?_a?hm-R{Vo>CTsq&Ov% z+fE$X&FfS}QJ*edeP%lW%LuidP|iDzSXRJQ3f@$dB;NIKtSfct0(NZ<1C;n1IvihIn?yZu%9fgt|t_&`(|2{u&8sW3G-K!w+1^~ z`m+9NyD^m!jdLtq5I4q@>MpEbUb=cm4pl<1&Y>_Mm95*XdQqt~rr;0#NsM3_A3BGM z9N?&tOuH)-l8!FRHiyUus|!2l|NnLq*RnMpjI7>|lB&C!M7BahZl~lbw|>$Qzf(KF zBdBJ9zJ;VX{4BT&=YJgT0GF;Novjq9T& zE9d||-$!RAawHbhuqN&DFYVQC)2qU4YbO>y0Fk#RkRk#K>3|oyGo(BFmN`&Kp0*PR zh3Ao}%aY4=S)^A7%UXv@61+JM0W8P`96EQU!Z@L{6?IRxz6H7AP9)Xv@MU&REsR8K zD}Ck4ZsnawP)p&y97p29P}H{4k$AQPh<4 zsa6>18*-;gG6S7Jas|!xrF`~<;#M3J3}8WyBgYC(FR9hU5Gj3EG`G^bDwD73gc<_7 zu8#@8ke#fckpTGHI`6g`r;1 zPQkK*O(zr_-@(QtT{a6tJwJykk)_I^oWCvNtE8^f31wk5jAhzfW%D8g z^`$$?gugnGcp~QQqA=9grC!O1?=a@0)ulEe$tgFv7m8;}(vqs<)exjpb8;bCu6 z^#!T=i69u3b?V~Pzp=hRmkE@0LV@6>P4KB@v7&-}W%HHQ@f(i4{n$4jyJhp^o3G4j zc3<>YmM8!6i4UE)=ftf3!}?#=FR0Jm@QXKm#|>AGfBN{39sky|T7Q_L8{a!Ai|fF<8}M zR~}p~qyCxHd<(~eD8pWe`l?buNGtp)v+Q{`iCUt`>I@{LRKq@hAE2w|(D0#Ms#?Ox zGr*#fxB+C9WLCgb)Y&C|^@jZGOhU?&0_ z98{}Vf&N0%miZ*?I>NbFX zYOO@#Xn&06)q9$@{XN>WLkV)PAPT;LhmP`w;^%U>grJ6Ht$wk2Gn8~ymIhSoxPZd! zDu487h6Q5T1mMw%fI+~p{!nf{HyP-1(SZp0B+3F*_zZ;7{~YEX#<(|L)ekj8?bm0j z7WOdmSj$j#iXtHxuSz09gIcdD%4Fe1UJf@%%@Ive{Y;Y;Aa)dy6ds1EGL!y_U<0Wt zsn7bs{4k1cXx&Ufn%) zDpO4RL=o!`=jMHknH5>UC=HlZa}f0K(WLJ|gI#3=BWADuU<~@rTMWhmXb=i>bn8T* z?59krMojXJ2jhTX@pN3hbKP3;FIb^!QegT@CjOUs6hi!{nh+9$XR6+@ZXH?5FqNV5 zIPu_9*m(epkSZ`F-04_#lSv}`Rn-s|*ZP+Z zn-eS?lS(vf!C{(2<;J=+o>R&NBdTQm?fQMWIf)Unb?m)A{DE2#q6-PZCEiGHRlhekhZ6BFLoy?P{ARBLmj}5#SkQUv znUJJ9>R(OGw{#VbD||I=B;gH76HJ9o0g^%``~^{CF2-aV`=3c01?65mN~;i8U>US0 zPQ1!s0bE&tYOIt?afs?)ZXafjbGQQ_ ze9-f8Oc>Q{KOB-N6V}n#B4|;g`hnaWc!n@&xZVz;^o(F^ZG;G>?QsB^fUwrD+l4xu z?u;jlUqixfZ>|cP_Ajz!o@g}WP#PsgHrDUTzYdR2s?1U&Tw%+wRMg|tHr07{?bN=F zi&_2ea&r)QN_AHAG{{%nH|;Q?k%B@4VPKI>hpYNMxw$VVI1k}6zP~n^XdW6$3VD2U zDFb;`gZkZVa}GLuV#&1;)gu9DuTvLJh3)Bhq-<(6d9C%&<>o*&J|Di<(M<0l&>koLcLzA6BeSVHQuACZrwp5#K^!~j3_R$0swuWH21dl z*?G{cqVgW>hP_nvH620>1+*yGM0>~*%X$5#!{(qYW6RajPsFs4*9>;r+$Ur}%5XUz zj_bGN=3ogJFu*Wgc&t^>l0_g<_7HU-4bU60wSG1=f4(ySID@BfP>_(;fvB@9Sd+B_ z&EU-nEU;MAZ*J0F4^%1tb+9b9mQVBAw6Upb0NKg`rD2?@vCwNnZol1&ZY4}PIW;sx3@HBOa@=!@}D}^e7`Q=c334G2t zuYO&uslr|*$t}r^G5}&Hl#Fy+t||?cG`DVzH#I5%0OnAP%?|GSveVb`roO%1Cy+7< zaEzTmgo|1ovC=*z)va3{A$CgeY@JYj^ZZ#Xj0Vn(-R%A~3#_}QlI&Jwp>|4OeCtS~ zneqqMJ~A5#@K6-$+tT<&s1o>MCzPJ7=R{$zUY0_|_?2K8JE2BIa`-rwk6-c+vZi>K z7T_8?k%mZBjV?vmtGamgTiRTMSS4`LPAoXw_4ZddfOqG2RRUzqp$Le~2IDq~SJtm6 z*z*!1Mh;$AfK%FguaRF}Lb!rJ<6gP*ZOzfVOr*q4PF|D|eMu(VA1^ zzi&>B!L@A=caNU_np5|mI&<>HC*FJFDgPJO_E6?H&W}lu%afLAbgZ9r5@fx0P`1EC ziKymd$<#eL|D&^o?zfU$LY3%ybV51FxB5$Ep)T&23co`m*i@2AVp~4}2Y>Fj^Amw(nmP04j`nsf$UKlDVbJ=d7 zg9>yYawy!u@wE9gly>Xl{$md3dx?rfC)i}D7z|B#9sLS*E+^J91&U56Zd0ioEL(id z9rK!X)?HdjoJ%M|GX>%mok%q7*9W1(P)VN4@q}??f$&8ql#Kns18>-lBY#n-i~Hx+ z@2X6wBFBP}D5G|8_ft>1 z-4>1CC7+Qb%pdcwKy;)NNq~d-mxW+pX{aR3pC%xB(UBS}do0EDd!szp4^# zluoEH%x?4{N<$@iejC$pr-aJb2}R>5Y3`bUg(;)D?bUFngs9jFrPMZQ2e2?y(&#q< z%lMp~P(7si#2qN@)bZS@5^a|pDQVhDgf;1v!d@Laj8z~E(}|_t*eGoLqoQs_*>qIB zwz}|^3oku$;lh*7{KWZ>p7~qnfAIX%Pi>xl&*_(+`qZh{oW64EtE<% z`_C=T-FWtcXYV=t)H9D(f3UH=@!cE0viZWzFWh`|^YzC*c1}RFT6U0r~X?$GTVhp~> zSWBo5Ryce0r|E#9p@v~C@RR2D?x;+0A! z)aOIHmrW0IpKVFo(eAiIHD@BA>*d}u0o|+sqVX2MIBMWwQ5Uilbyj5g;s6n@<_LoGSqJfDdC)| zmVlN@l=qg^!_9AN4aXkROv+4A45q1eIqc&64KayW`QGkuR(-T-J>3~#Pl>oEyB`%t z5_O7So@vA$X2?|rQFXie59{An4f1|a`FhJx7?oqstuH3Rd_YV3|s@F22}@@cqT-o@mG`T}91g>_dz+<89>G1<*I@sooFJdY6M< z^;_%K^vk#=cqcO6p2Qa-h@h;c6pn~1juw1(s^2_#?yElaB;tVju{&i2ruKt3wT&Mt zdyd!_1?om#Dk~=ikMR`gY*GF0x-};5gnXdd zBEPw)ds5&F8=j$Mpjz$q&-&GW%&mJ~yXy>Z)|j>7cT2C03lDfCgo+&SbX9#iwZ4s* z_7bi;O!H8!J$4lM7kIGNrkab|2z|prb@0GAKmfBHdH=l?a-M1%@j=#LQKrLLB*XZIS{UnT;l+Wn_hMlU`;ruoQdDvyw15rOGX*jPQ$*mRcqKwNMAh>zvj9zl6 zAhn0xN!QR6t(pzuR^TIbHsv)Sgiz1g-VJF&gh}jKPF5VhU;!ovulTBa(G{Uzkg$nX z;?B*Cv?-M!13dHaOOePqD@{k$Z!`~*TFX6nFMGUgvi1B*-Il7-u&_Hv`FRc5lu28)+--A5~Ujam--aTT>O)p^G)&363Iy8iz zGF7TQNKp0lj0jR|$J@eugb-Tv}9Rg}BP%&W$W!Qlv=8Cac?j$3a zP)~f}s$Xg5qnqr^ibhK&I~t~4!RIuA^j7hiU1fM;EvjG5tz*|)sc_@&L#FtDqZ;jT zST$Ms9(y&Yel54A=ZYoIjc*ZhbPM2)ML)neeSBSCYEpf(>V50h2G9zR9~*?Sz&Pl$ z)a<~Qh)dx8?ve$q-h0@3fq`##AabE%40NMN>wVc$!@EL(6(;&qyXeln%Y#v@ zx*;hCPL_N%LR)q+B4}!F{^i^naw+U9K?Pz1?IBNtf>4nplz>o7 zQ40gU8=P;pItJW&n%liVE&8xdz51j1ZSMB$iBt>tGh3d(8l*-M(!=l*P2Ts^u3bNz zo8w`7AMu-9EG)YC9756{+|$W4x#%h^>W}2+-VgmjTPIja^wi$SDAU$ucR{&aKR@`jm*G)2pr(|HQFVso-=@B53$F^!4scz?~`BTzT{o;eCtEpB#D5)RD{~1 z!n^n5c+__ssNVG#NW4*q{*g@LeQ`_T{qzmbIDX%;KRP5NFp3MOUDqj^QuNWC329RP}q2_eqU** zMrtg2RU%BCLjeyAXN}i+X{1JJEJd66=<-nyfEUb#oyYph4qa0WK$>QW z+Fcr{6&lm05~yUSPwK>NeyS|g#r-d7lSX2dpg23RoSK@XQCX-<`;F2V%c3H9X^sS! zPKl$rvzLb2YS(X>vS=ri{b4=-WEDH^FxSlc!>NALexo(!bYG@#+=(SSz&6SHEsAt$ zzZDx3s6-yS6Ugq~3aFKaYShNu2#ch(JE3Sfwo;X)p>Anj6{YwRS?*3K5+3cW0I=$o zhNcPyd5b@MRhRakoI;V9DiWp7p#T+ReX;7EcxzdlgV#O${-_5|c1qOjJ8|M<+K?hj zyY!^or4p6$PAK-T3Hx(|mF6h^w3$IpT7NKN)mBz#)#yWW-8+xJ_Sol- zef{RoZC+b-ZWJk8sdh?W((MB&GGB3!Z}Y+g^l8`U4aAZAuvpvOO&UcC80H-o^+y7@ z*L|PixF7@n$;;y4Rv78o&D1G`TX!N!%q7>`@=(u8paN{`?;xVzFHU(YUt*^+j zN?_qR7LIxF7sCn=0=?{AwUQL^t_raEols07TS8Z9s78_kpKzxH(w#$XBZ+TgwT>Ql z@pk79nDWCJ*qx4tGw|a6UrYO>OcM580opvr8eBPe#g7I=vNTX5ND-o~c9f$*^Er?& zXZS9s!bEATJ5#4zh`|2~@cf-vpm#wEE*!o~`%iD@A1Aj0H2pfzbasU(eL@Ibx~=F% zxw(cOh3ilmi6BSfofH;=ut?>RLXIN6s1oi(CsHCwQco(K6qoiJH44`CJ01 zRRp#*?KQbD6m2`9R6UBQB%M&cijVokPsVI7jN~iOcB+Jl+KCi=v6N=`(xOn!LGi&j zC~lov`|UOgE|EeEy@_#Q>7;!KX6#qOBr%;++|0hP;{o(cQ6<-~?A_9#{os zmrkfrU=ownNNK1SHAAbYQc|+%gksh(J9ypw_k@gwZ8i7fnjUsL)d)^tV-;07ppqg}Cy*jg1G7~AD(RGCK>cLnhd{$|s zR%=34rKF^mBO&TcF(nedP1b`RU}vUxrhRv&w^|cIm6YQ;p|+jj8=_8WsOPuKw`Zp~ zx|G)m1w_yOG?s5+r=FK1l~kp2q#@8*n^xH>?NpMQAoDFaW* zN@{1FP(wDRY4~m{96p7bP>a#2k~&%^5;fsgEvB?nf4%7xLVgL|KZjCj2;g%1dVth* z6BmlZhZ}r%raw1_D&hWjLT$4$O!T9z(on5ntzMM~0dztQde-lC^{Nr9W&T+tuaHA2 zHMrT``9E2WP(vsiz=LmjTj)XxRianW3FS-Q+>NgzRtVNcuS$d$I-xj2w#%xtSFK>J zP$dcyITQsPF0D;&rZg06x2Pf9&)tPe1e2=T5!p)auktCm%Zb z{U^Wttv~exx4i1uTi^Wyw|w8RgWi3|e)pjF$4`6G?Zd&2B!x3A5CwsdfU?jhn7bpe z2ZhD*Y~Tg`>dyi{keZX|Ub6Gki1Z2=j_NvV1l)S>RAQa|#B5o8E;mQZ<@ZS{eqee< zy%89TE_{f!kLN2w;M^yx&$rDT%sA-{C7&+u1+;3L7l2Cq2sVwALpbh&!t|;?K5Raw zi7h-)ic1w%{D9$;038(>hEN?_a7XHxU6VSi_?vboyRH%bKn1OuRrDT_{^w+Web zRs)PQs@4fkUt;6MWz5?pOHuU3+W1&01y!fWhC^TSt1M7V@KMVBL5V~gxlgL6M ztO7x-U>|0y(U7I@lx#w;`tPavZGL^kCy1;HGYXcaa9AOO5h@YA6_7s64snFV!PEcO z)1DlU;=?+m2>`T3DGde(7K2p>$Op><8W&7iSIg>;@}sbm0OJYKn@Px2%%Qy)5knpJ zmSk<{iGcc5|1CF{+8XZd!Qhb6fKCbXL+C}K0Dv;!7_0zR{px?@=2+}zg-2x?sd)(H zPs3D{D-7`s_7p&;)gR{OME%_%prjz3G$)!A=u7X2iUZw;z#_ySvz?jv4>NKA~ z(hy1L4+G=paXmW&WmfD<@w|)GUiJIAIsZ>WMIoHxniP|rKukbY`cr_G71J5stkr+c z&3S+N5uhOWKhGY+L!Ts2vSfbXUtmP{sy|50ZyWZax<*K!i5>5%DrAh2i4u9E@TF% z@YAzlu0Tf#Z-m>>BSesReIyX4!P9s-q-Aa?Vt9+D;vkZ=i>gdt=JX9t@9?1lhkYOptqD

    1;pOL^u71| z@zJg5&>P2^{>VR+&hK74sL*0zRzfMtx^kq~qGPn0WZubZ(TzvpWI7~9x1Rw~CTmf8 zdvEFwefP+Gw_8a80J0j4#6v_@*AbBLN2tZH7#-oqff6fs7etl(5tg4>d5+=par%g8=u_XYmXiV7)HjCx7Vp=3Bnc2Srcq% zem-`1?^~ruZ+wI8CB_ejM%MD>dR4bor&{b%&B>Md1;XQLhQosXGv%M$o_ygcRo_){ZaTJ_BeAavk zQYG5pdK&7Ps^$ooqOO@f3;_T`VkP9j+grE#uzlpz(Bi>&z*qjj0F4xlcf&6E;dRpGA<7<`6YrRvCo#r{aRl}0N-)9d< z@w_Pq{C#km_o63nJiPUE`ptI^CoKt#Y&(weMnUaX?K(cP+9g0Au5CKJZe#ppMQ;4=W1D;TY&v|^2=J;0@|-=c@rGCp8;S!*KBNt|vjjFF zY&pDc)5(h<{#REXYqOo(ls3ypa*0r)z>)#Dw@}#G;{=f06UedcFx(8BRNK2(b0>s& zT)Y7;Q??yzE?~t6ns{p`4%y7PP)be!d7Rf`q|o_0z|hIHs4BhkrrNARYfn8qy*Xqn zLTz$h$ODjo=n3F8D|m|lY=dFCXX8ngz3cXU;+he(f5YL4h3PdrSKKfXUa@9s=IG4Q z%%Pbt&0Iet&!lGDE5A8XoS|m6&y24A?dtzn{qRV5^_{D)Ufo)K*=pPBcdp*Ndd2i_ zrk_~()bxYXw@rU^x;mYhHVqI@e;Xj4?jInYN>h=k{Zo6V<|bbq`Q_Yglh3WR0OskQ zxwwLQ8o6(7;Ryx$G*_LSQsGa3SO$OctfJ?P%K%WHm}pL1Hes81=g8v<0BYqO-x^$Q3I;J~u!6*V!YpKb*aH_U75e+1$#;tbf)pyDOhJ zm2}Zd2Mz-V(?};sBb8wgcm0}83l41*2q{WjO=@^gUak}HFhYU~;PhgSAdxo&y7h`h zrY*294j#s41L<;$taB}G5Q4-@9br=*%PqDfPi51Epw4GE)pe=pZCLKMI7q@BUZ^@N zQ6Sp!F@7Ufm^CCoVyvRJY_#Sya?*c>`T(oOLsI2VQQOkSxU&>mK zyTN-GOL_l}&O%&t{|~OGJ6Q`G>>jpD6?tD+=l+sv#%xLu;jWF~ zih?CC=+|Ki4u`*KPEqv*lfPE6b%KO8eY)Dv{&+J>daI1vN7g-6L3=?J8}bJNkl!du z$j*YRTi}=rK7ya?hdLLloW9tI$hur%_FPr$=k-m!OK&aGm3m&>ixEH$KbvGomq*9P zDZfxnFXYd|G&T-DnW<8Ah$sUvz|hg2hXD#eso+nN$!NY+E_t;YqjnSaJv)4#f99$3_ zf94wHl!Y7+MvJSk>({}V(@`o@^9M6tOV_JOO+Tp`(kHt#VYkqMR^8@zif8&&xlT?| zR8wjQL_U)A3U>7~a*V%1+VqkKsAVcad&Z6(m=2E87Kr3R&T9lB4sb#;1_~SUihf8k zV4;nH9AN{Bu5)t77~%MnVDCBTlT1HehP zIy7tVH0tou?eaR8TAV0DK14~M=t|bQ6xLpd$tN6+YF9^f!dgd;qJ;&spFDd%{(+;~ zh7@gGy|+$#i(D|Xf1fHZb6tXE+*+R&SPFym$bYNyp}Yys*HyWxlq8JpY$T-NV~I@R zB8-V~*nvZsw1q7lL#XI?Tj&)}sO@i0NV4BrOftMN9?Bc0v1{C6w*eQ9D+EMKHJTPQ z^oR-Dw`)BjE!SmFmoqs+(c~Fwf3VZm00k_c=C&S&e5^nw)bbiliS&Yx%$5(klHJs{ zF)X+FI?V;j*cSXjx!KHCv(|Uw_P5zhEnhe92*#Z)xEgfC)$&?Xlyq1*NtSiqVnsYd z9T?VP*hu^Jz|Li8yKS7X;kUTF)nTeo+O(^j39>B@n_R8-A4|vTqT2a_BbMWu;@yFirl`t`0F@9uK4VrQI;Ki;M_QF< z{UIs?!S%I>qvY*or!WtP!vu^|`h{Fff^3?emYA`ub5Y+QB?o+%wB zk60z5j(F9o3q{;Sehw3lfZVEwl=fP!Un~0T{C>5Un2a(-h6#V6RV|XHByr{n{8q-Q zz}6uIw^8X1+d4D{dXxhU1)CzT7FqVP|vppJwtn;KMUm#*b_{cK=sf{1N$DK6g>)jTk*wl5>b6Li zGdl^lySox@&z@yf|W5Q4Ci9-4Tv3W(&nof^hCu2iC^9^wt&rR>*g>~=(v*!jV5RnXj&bj z+L}-x8vy#^YVNpGuOIIYP~8qKZ@0JIty)>*a&TRTx)syLEk+_wm(2czJ7P^{E>?Fe z+L)_Bc*+`y;|U>B(lHpl?a+p;3oSC3_3GjQt^@d%i*e#n2cVfvRG6)54Vj$PENr?^ zttDHlQj*!}v!>~&q@(w*R^`s51F{xNbv6iKWHYt)6;-a&m? zosKS9O+>o8Ktp2F|Hs&yfXP*r>Er3no^*HieUX4k*gDo->ejt1A+;}ERo%6Bl|ZQF z*51`!)k}4k4&e$62q7!!lY}G$9mjDQC4*QFItn=IIO+_HI-*_87#RmyL=ka8hWWpz zZl#l4lx#HG@b`^jUcaEmMESKB% z9W{S2KQzqgt7eNdRtS#N^f!;U(tG;{`M@4{21uf}U}B}MA8ZMn<{>6wu=ECVS;^*L zmtWUPcd&gdXK^J)&0*18(MMEsEJx6Yoj#alL&|?2qZya8N0f>gYislB%Z$pL-)46V+H_7^ zS`7cUs>og*9^*W*s@*;AwC5c8aH~M(iExyKU${MBbVjSLM0m5>2bLj&&*jgCBmHbI z4nUzH*iVrk^ggzV+;OOL?jDDkGZ~q&f+scR^I1H(RPdK7j%Q*h#k(c1P!S5n0ZTgg zH8tJh)SDOwTg}*W$?8~aI2h>Zn7`;S`E&A&PXXgE+ z>HQqL(2|Sn{MB79qB}kNbux7JCv!G1xC>HWb-`Fw?Pc(h!@2t0BgsfYy>5Hr+Nl*w zwKDS9nU{?9HP=lwUEGi8W|UM%!4|+)WrxFUDfN^RdR58v)lj095#y8JyQO~1HB;(U z^#`Cty+XEHCDFwCJmy$wC>$>&462fkUXP1Ejf^OVx3}ELU%h?`_vU!Fpj1Wb1#+n{ z4yQ7(`cx7e_%eHVRnbFRphzQw?{gK;@6Ug4ef^CsQ|ika!3q<|e-l`d;DpG4UobKiQOkXB$8ek$N#+Xv|2wPDg zjf`yh_?KI+q{p^S;RzmB$CRo_EfCIMVw{~Y-1`bdO4lz`dMutmx<1OTio7ZowFJ-6rwq>I| znNo(c$YCcQHw^_DwEpx`Im@BpG%|3TR}pTZ?bw?7H#s`C@CHDskJQ&8CU3Oqxm3a( z9xx?15s?O)igxcrDYP=8eE*v_)xWwEN~pv55lVif4hZug96_0$v0AP-ZpAxOYrcH( z258aBNcqWQpkh*vuBxxNaSHS=Sea@A9Kw`GZI+m1ooF@b12^H1wKDSj0=%q(0eu6x z;zM7YU;ph*Q#Ukc3nf2NXA45k>%ELHWC>M0&a|b}nk`)hG>t}vH;KK?r>2edAp<&y z+PqNmqt^WO4`3zXct@oajrR8U6W!*imEPt#3OF@z!zPpzE*~d+TYwvhUWg` z9MB8U*@O|b3!2msHR2S)EId;X$lIJB(n+mJaGMu3*T~?JJhy4kva$X(FN)mk&s%1y z9v|Vj5k8U%_9aKEqx~gLEz?VmspU(xGQ>0e6D$KmudJz?oUNq-bWE*AjD#$H2R9Uw z@M$_M@$QVONwT69FP0(J!!Ng!=Z49;`f)2Ar>NV_Gj+37?PGS<;1h<&b0NLWoK*Gf zH==GD8F|e299-c)`jvI{UmLLof<58LO;{+@M#{;|c#bngE#{ox!CP8-I_)UW#Uj$S z+1zBd*jO*yr(l{&DUQ@h!|HqUv2e4XBga^NEOCZ{+cD=jM|YrdJkKJrB51Cyfj?oCFW@?x|bPjjqmFFw=PoW;&f+ z>tVLjvjBW?r)R%S=KH3)mZe60{lmWSehl>k>^eIXH}$ji!S(@l7Fs zuSYpznW>~H$P7hY;oyiXR;WZPlL5R1Y0^-tuk5Uk258MNb<8up&c_`w_}^Lcne+fm ziCwMn^G{)nX{`)IT5sK0-w;6))1Ep{p5nJyJ)?ZiSn-W|mmS%-OY zXFndCw8>=4H(v47+oE`IqHkT4l1F{(sv1W06Mak|JRUEP#)f#3j^W`*lS=>EQUCAQ z6oOBU1xL(5#@v%lx^YLLAB_|5tpL;}s|GjE-8$uL0@`K(WARciH~|yJVAhsPk9NF_?Qc6?J5$5CQ#S879%|yXwUZT{_V)J@GGhGrLelzVhMLY8!zbwQI-I>8PHm*v*dQV5n?PwhFYQI< zMx@4B!4YL$y;PI9U2*FyKgOy&h96$+22XqmyT7+38QNA=N(p#3)gaeL8l=z z7$jH7C`@vguCo`5$UzPUs84er+fe_;@D$uF{7|CK;vz4@6Vm1q#>ctJK%vqatY^ou zh+Hhgdf$Le+p=G8sGBCvAHe%(bzRdDTy!TQ&C+4j-PT{<^4w7r7HuD&Y5P9x^>AFS z70qEb<PX0Et5udu^C>=g#A@o)8;m)Ri{mFITtW;oX}VHr^CZ`N2{eC*oz~aRz}WT|NCpmfwRX}!wZLM z!uYrqn$+=Oh;r5p8!?VLOW6rq2%CAcrVH*vn`>oY-udk<_56Jp9P26Lj@sZ(o3(0W z%@w=R;RxBe5p}q8_oBfyBA7_Oj=^!DeGVB~@jq+ollP)Hpq@DrgEIAe?-k&;$vCW| zUY9K3k&XD)Vz@r>07~;`qBGAwzpK9bK{R^nOn$?xIj_!Mja~7MMf=)rSn$btU#oAq zOLtYJ(Q_5C1BH5z% zX(ZbtX(&)bxf+K{4kr`H+5NR4r)ZDJBzO>OrY2c+uDR>p$2X8~ADn6hvHif*9P-AY zDH_N12xYiYBd+Cq29CgV-hhDeI@6A7j)C;S$sr#w=S)wVu(9OFtWo3Z=aKz?)l!g8)TF|`p^ z9q-Kgz^p&aTKLAozgfI`(RUYpWXTshAMZ?eZtVDvj{7@y&YjbKMSH$&Z=0$83$y;v z_MfvIbC0&aH`hD=7Yo?=r{)Lejm^7$-qW)i^B2t-n)|cahvsaX^VH(sF8=hw*y1}D ziD0k!=7J9|DK5FP>xHg;T^4|S?!ud~S!BoQ*&mpLWEcG)uo2yFZrO5;f!m!Bb(}$$ zFmy{C%XjlhCf+Tk_;fcb@l29WBJ68IXt$9!Uw*rpU2o9IAnxb7878go<|QHBEgBNK zZoO;}O@_;^?Y`gXJsjo>Q2I4y_?sIe7D4layO@or`UKJ#&7XtyQP`^Y7{03 zJ_j8q7`i!LOm*{|Ue}$F<4m_+(4$~+E+Hq9IlLk)g=0z#l9hY@1YLXPt0=hUai|xB+vdc*}p~I~e$|0j26LFziOsC~;K}e@X zmXTONdADu|wOj zZ$>+(mt;918jwju1=6C>9ft)Cip5A`649l2PHGR%Xip0|*wyLu-HbkgmSNa5dMSy9 zN~cqj#Kt9fG`IU^w4>EiavTjQi2`({lNd4>D&2yPNpop7k%|jad#IJ2-JKRhSaVTEk~PFze2vLG4cR6BY8({w=UcZ&%z6*r(Igme;}n#5=k;|Z=i!LSHnggT{l zsdj&>Ec)F7XAl@hz+6f*C_1aB*^^wiD4;*%2|cHir1svK>=L{n^+|NUAwrLsjEE+Fgf-67Eb7u&A>-}LOkuD^=_CdV zZVJ^zH>FaTRvgnUVIHt(27#00_SIN+N_^&!#FD4S%t*;t-_vNv8)vdhGH=icG78Ic==qc=0Vjn`HNnNfy(n<)u_n$g;K(fYzjU)9vElPfvlf^F*j&+~a)M!! z>2_Xy_2VhWKeOnA3+|cs_?#DKFKnxCF^+G-X%ZiBWqO)y#vkb&gUb_VPxOsv%cWt~ zfKT~XaV4_{wzAgnlG!-jhmIq(z| zX=LgF8}CmW>u)|qzmafyq@)e%9Sio^l99_8jglv9lm%~ERrHH5LXk#B&Yb=ERvJfp z9Vw7~4)W8(_anN*A_FL)`q`9{##})*V5sU7!9mt<$*Lv1=?PlGi)F-U z{l->;&;}dpC!c6tJe+5D$PZLl7bgyxvgOf{p1uN4d}nZ!*Cdn2zIj!X6>?MkU(V2P zIDAh~ZU^;y#2A+>v3RU(FY0PGXBe)FU!h+E7pIbEe(@=9{Xf0}*Mw!>nrm!=b;<6b zF;*1p;|LM(ReXSGlWB+mZ~e<(#i#n@b5liF*@K}TJom7t2T>K`AKQK7Ac%)MeyOpR zoOo`k6Q=fmo`oncJhHY$EZ_GZQ_Gts|Gkzh*b)8NC^&;*c~0%^i{xE@W8D?!J+-Lu z|DWfhEaNT5@~g#o({g{?j4681$VLZ3h>#u5#_Ya{Xas%%tSwJ9uf0O2lg=xT{&`li zOqBeo(a2KeZJtZy*kr1-*A*Q!hAAZM@Lea=F@=|ynWIWK}(KFY)f zs1H0s6GZ%3uf|?PR5f@!HVBIfZ*XAofT_|>&2;# zm6ysw{wuch9A&|~|24H}8A#f%2TA+AaEpBrZn0e3d6IVZ>39M&P`yWq^gGjFElZ7# z=-p$(1-!lkYXw>OGCo-~GV;t*e@`E~eRIh!>9?!v`Io1_&XTXjYy~bM1+%=IPW8L@)y||)07wVc<>$iFmY&w|<_p*cFE;p!J;xFMtS1TiD zwtpCl(_0U(u0Q)y>mF@vMpN0I6U~e~gn+xcgxTjM%!{~*x%~|kMaV>{mpAM!!!wl%>jtb9o(nrO zrLuK2fmlG$vu%kc8N4xYNpHS{ta^>=z+zp24z)hL6BF4elQ3n5ioU*{0FzeBBK~}8 z*;1{HJag+A+zx*Cx%Ks9KcBkg98o*WU#^Gw%SUj_{=+7b5n+CHSEOn2LN~)n%I=`{ zXTpQ!oXrh~Qe&neKA;01!aEpN@wd>QS{cIKFWokIBVIrG``Q;dj9vV+EbDTwe~r4DQ#ywv3@sKW6L=9 ztBQoTQ6R01C@(#6HF^5`e_B&N`ZnEFan(nu9@IT+phuSp;1!XHJKg>;Vuw;qtH|Cr z(We*7$ie$}tRcEr3d@M@!GG9T|J9pR8LlzU(>=swLo&=-q>;f?G#i}AHS4#E{PYjl z05vjl`qnurPt2}A(ur3Q1Q=T(rt}bk5wl} z>ytw!HrvymM`#%Y)ovAk-@8E6$jCEWzKa$mKUrIU?Ok~9Ei2Z_o&?`#P1sEOWTEJl z)vDj|9{yG%Bg&4N`s(r3_u!Sc91k>1$L)(A1S!bbCMn3w15Lj&Ntqn>G!Ie3L*|f& zD-H?qQh9h{L?3Ui#^l8Xjjp9y8HpcRzO#PA!bT5$FPmI2b1ZR>=WEHLYeX!|fwBv3 zvdyvg#YK%3T^EbUGY4-cJY^)!i z+rUE}bk0WU)Cro4j`lOGEyZ{ROE_B{FQ}!veRgA6*Tpj8`$+qCn57^<%0JCU;o!tS z*^aWQPjmY0z?jJ7n4W}pOr|HnW`pnTK!aZ_QV)U$zW(p)>%Z)1>^yggzI0aCx+YV| z?s*T+d9wXyZA;m=On)%KnTLy6VbD_?(G}_WVHH`sqOo+TRz?m! zvG1n($cjeuad>j+Of#B9V}FRNc*lE2#YEN`P<6bz68)hOk>`iow$^p48n@DUKe+_u zP`BM&&SDKB@M2`Z*u%myzM$$bEo&@aq7e}$^6gvdA6tfEU_qaxCfM|Mi$Z7mLVQo74<1ggA}Yw-y^p%+T7nb^WPProZMZ2K7;=+}|8jE65YqqCAO< zW#r&{ZL3kSFD<2HAfW%bu7NY%N~luDxLb&VJ=)xx(Cd4AAxouIqy^j2+*%pzwOlxG zyw0tKX(ufdW-aAtP-iW;)kQxSkND+5D{PBnvRb*_S2dO|)yn8I2t8!}_qzJmuA)mI z<{f2fP|GwTN?8k61bw_A#d)%>))07L3(BOGQFs3BlZE;^^7Q8C9psMJ&R$FI`mL>t zlsxM{M!K$Qys!0s2aA?&9E_B<6!a%XjJ=390qMMBNg+d9)~k4XBbuE zFGXn7$jDk1$+sU(v;kRJqmwuX0$#H6rpnb9QI_M_dEppF&$53t!xBRRH|1|Fxb63p1xh;=FReaHYy4v}%L}6pzHdDDj z<1JQ4#|Aq_hek%2ze=j-4^p$AYx}3afIFX)j>bkhgSJAg+M^Xd69uQb-cqm{LxawW ztg3z00ks+#sQI?5rxD_Io*N@YmpbU)KQrhuqqcaG6?3eO;mdhkQK}mM$pwuX8F?nT z7!w251>}7_=L)*ht!kvy3+lu`z&Ed(vHR?n@wmA>oRL(G``yr}k-?tm?IsT;UQJ)$ z?I26<`IbmZonLC*d9Cm^XndW?E79lbm>DfwP5mQdZ0~p=G#X$Es_M8Gy?3#QDE-&c zOTMQOS;%{?tY>@aAcVqeXknXgyqUs~SYg3*UIkf%#Dd|Xxh{OlNUMLbj2a@K`ZVzH zA``Z~WkakpF~XHnmcCLZlL_ZrfBPXbmNTsk%h|tPO@=}*t*yUkZrs#7er>1KQrRl< zdC6YxFAf|1@F4cJmXaPTsuj6NgfL*?=EL=x`lqZjgL2k8uG#Jv!O!Yi#SfIF+2awZxES?9)R&RBbap3#duH`dN@kc^w&EPV}<= zvBJdYAWv_iwk_2rgUoa8P4$65BL?Hfs6Ciwhlk>WkzBay0b}h8K^!8q$)rv4++25s z8vSj{#`&5&!B;%YP%u0=E)9$1i7-&K$%sGn33pu|X*9`3CU>9>RfB{m!jYE(Ap~{H zTgQWfo;=czv%V%3Olv+zeO&NkYSt>BYy)JP?at(34De{pRMb{+L z=trLVoDbr2h5kMDe`uLgSiD2ytUc}>OCnHj4=iG`x8m=8nqXsPgeo4M+>oFXxwYJvh;G5d_LV+yG7zIpvt>cRz$zP^4!(gedz}1JnYV@CjtVE zf#?JxcIpsnkoB^$rasVlTv7^R&7Xr<6PL2{uUc8}UU2ihS7A=A@dUw&iaXxkV5$(! zJ9Qoqk;d`}kNSyhW9#ZmOUc;>91KW*9$rtb%QeghF{-~3_mBaHk<|;We=+3lT;t=H z7~qCH`dd4|>+zcoez}cYU2H_x;j$&9?Q0|N3^qFG9YHsI6YgH{ z_`E52S25>|IO)aQq%?D-R)+KbP(|0@-)nVvqy1DnH8I36)k@-T*I*g=(mR{#&)$hI z#pW5F`nssQL@Z;9W_fVMR;-5503rmCEu%Q>EUq?|E!E0kAGjGSFLhxmRB_B*Z9-xuP1FNME!*H= zG+|&PP9x*;k2?CsVZ%(z_D~sR)5^%3?|iU%POZODrUzb}0;m&=x?ORR#BhS;LV>bj zA{qc+ysGHI597e3k*U;V%>bsae3;gehZc3y?=NNiWoDSoh1t+h*4_`Bs>Vvfk7Aqo zGg18I5^Rv={p;#SM(K$OhhPp%q*^a0=m5fw+Q@KiM4kx4WE`Ehiac3EX*42IX4(DD32|~|9(_?tPMZ+E2k&$bDwg$jGw<&PUrA*uW~w$ zpL>+kh?~%Lw{qHtA4NIs#Lr#IX(N92D5oX-+^L*q@bh8i^fmbTkaBtpern3;b@-W3 zPA|jHxN@4}jVY%o-sm3XQ3^PsJW2s8%A*vptUO8qhm=Pt;Gps-1sqTwrGQ1{Q3_a4 z9;JYJ;g*m{A_3fNAAX3YbzJrGQE0Q3{w)PEowLa*E>ZR`#5tfVV5B zDBx|%DGGS2a*6_eP&q{bW6CKC7*$SDz<%Wv1q>;tC}2=IMF9iKDGKOUPEkOga*6`> zDW@o4uX2(CdXJ?xBEA(SO*u&ct;$IXXi-j5K(lg^ z0-BVQ6ws)gq=37WlN4~La*_hxtem8PHz_A5;El=&3V4HZf&xm)2?{7GCn%mlIYIIC z$_eKl{PM~P3dkuZC?Knxpn!~Wf&%K46BO_R$_WbCt(>5M*DEI|;C0Fg3V5yZ2nD=G zd4vL9tvo^jw=0iOz-`JS6!87ZBNXroe{G0LIF1@k5It% z$|DqTo$?3;T&p}n0oN#xP{7s7BNT9za-0ILP>xf;<;rmixJ)@t0hcPrDPX5^oB}RV zj#I#e%5e%fUpX$}XP$DL;>}Tx18+~)Y~?rwY*&s`z&7PL1)QZE2Vm#_DaQfW`JQqN zfSv!V90OqIpOj+&?0iQ#2EfigD#rlW`3L0~06TxL90OqI@04Qz?0j1}2Efj@lw$zw zd{a3Fz|LPQ$AH)QE9DsQI`_Px90OqI>&h_-_?mKz0=}vorGT#}M=9Vhl%o{zW#uRZ z{2%2g1^l^klmh-tIZ6S~Dn}_GY~v~5eP;Iwj-0ydPR6mUv8N&$bO9Hn?aR*q7< z7xpMeDd3M3LIM9%Ar$Zj3Za1CR|p0C4~0;`=M_Q$pHm10{C9;=z<*N+1^k{uDByP$ zLIM9(Ar$c23Za1iq7VxBO@&avZzzP~eO;NPc+V<(CMn=E$|MDRTA8GPUsWb4;8&DM z3ixGZk^(-ZOj5u)_CfqSsZ3J9FW@r*KTqJ60YCqsOj5uzxbDQy}Jq;iA;o=}cZz(>IGjh|!6!xZqS@-PLQR34^)N0f&t-owhn6z{O| zun+UE^N{i|1w5cUOab>R4^zN>%EJ_JuktVjd_Z}a0^YAYOabpx9;SeQtvpNt?^PbA zfcGeeDd0zx!xT_a4pYFpl*1J8PUSEK{43?K4?iDL4pY3Ea@aV_G^=w$IZOe^mBSRU zsvM?(W6EI)II0|`fFsIb3RqDNQ^2xvm;w$dhXB~NpPHdO)V8N{P&q`AOUfaNTvQHG zca9lY=f$vZbQQ+H^ zLlpQ{K%a7u0`@8g zDWF$5NCDl-K?>NT9Hf9wt+JouU9IfdPXV_p`zhcyWj_Vns_dtL?^pIyz$=yg z6mW~Op8{T??5BX6mHiZOld_Kju2=R^z;((#3b5ChbUm1@(=}_r91?{j{j300$|7gDh~m#<6Y$;;C1{-d1wnJQpY>W zLjdgfqw){{JN}?N1i+5pD-Qv%<9Etl0Cv2s>;+)QTgqMlcD$+V1z^XomAwG$_?5C3 zfE{lrdjZ(-OJy$wd|lZ~0bf)0QovW0y%g{jW$zaJysYe{ct2P6E}M1Ttd5tIy%g|g z%3cb1R(X&D{#1Feyr}K=SrcuxS@U0*vvB^?^Z$*lSP z`=`18J@>nFzcBaY+r!uw$Yl(b3alEqtA_7S6eX zvKH=HJi2)IV*BC`EMB*`ebK9n{$tToi$1pKfkhQcTDYXYMO*mN!tX46V&RE}_beP( z7+QGq!mSHC7yNF)e=Yddg3m7?OO`Fzvmm>muj?NchzqV*uweeL+iY_p;1;}P&h|M= zX8(Tnf6e|DI0ZjHo6Npzc6N5(Y;pD#vlq6%+5Y49XWDQ1RQsX!T6?11)y}nVXrJBo zTH6o0zTNhfwokO}Ya3hgT-VtpUutqu$iC6a5bv**jgsBtFZJ=^&vbpe{WEmg`D816 zmn=l$F`pr7Of%LVb}${WsekEAkBXez5%>4P3N>#{hQF((gHtJh=$5YGc+KDrj2W)J zx0Rloh%gK;#@%jv!WPzFd#1^{A)DQzQOEa{qE?mvI$ic6!lzL5;y{=0MOOp+NDdewet7b{hZx2VhqNz(a^~Imb9|lef`WxIiCvqYX(y`KVRjblZ`b~kxkmiit)0~ z&IS4FC)NDMQCFIEmWyL1C&E)P`dj{4P2Xee?Hgx%1C>ahUoOfP>6V&`YcyqR7ME!- zWA0;9Mv2X;`K6(Xfp_*sBKb-n=dESt|EZN;oEYSzxk9fOx#v+; zj~Gw6OUbI)Y#6eRaQTj6E4i;SI3|vn#^X$Rw3gni^3@^mVO7UOZ9=6l?FbtLaoubc z)=(&Cn6dt$v>0OfR9UhnTj?%0%pH=Mv>rU9h7C_}@@?#IU@q{(&%Ia&h*w6QMwR#lB#Au}a-33u6(1F-Pqa1umzvB{J(( zraxI20-J~>DSGmLW7QXqFH{NKWFcJ~;76+^aZgRCjSJrVygOR}a#+Wquf*{Yx7RZv z?fm;zdTPAHxCRV%vuLy!dOe5+EaVT0nTY4pt>nHzlN@tI_kaQ{ zgutk}XIpB_Q3L0Vd2*E=OMibTcVlaL^GZEtF3|5EO(ukbzbahw12w+~q$T`Ne>GQ# z^*Fpn#-cL)$)0R@j4jAj4BJ8TsGMJ1QgJ;Q(BmhHXpK~9+|OJ0sKi&YCoyK@_~B8f zaY&97&GEH=+sfbHpUxq8hQ(Qn)}-8esRipn)ZbW7swW$Y*!MFvb)w}WBlHX*jMzMOr_$++tvK;J;VGsYxRUhFDto>Ip*erEkV{6=UquL zC02xFB%ioxjanXerpji+yiFW&X1w0Sx>PHBV8F!;gocBHE2Ph%1ZP|6%z%wC>Uu|V z1FlfUom+punm!ZEZBHwjo2%3kl;Vie4&KS=@USBoP0nr2VDJoN*?hUrF%l04Mk5ld zk}b(Ssep|glzkNg7dCLi{K{Xo^hlWy!vrV1qrFT~4skmkZ>0;Yo$vA3Oc~sE$2{3R zi$0`Q%r$Pdnn>$1Qm?&WTG7&CiutP^yBM?&nTGrIjTWS?uV;_hYp~jSasf-S z@c!1=aSoPbK0e_ngUm8g;TdDAPn?5b@8m+`Szk7nlH9rLR7x<}883$MDwy%xSsyx! zy;0>%lbuc&(jk^$kSXVEtWLkNH5DBNN6hJVlq*rjy=Nejocp?3dWS3HXA90M!v?&Z zTu3knTIp=G%!1`o=7z^Y8K+?5)O7n;sh{=aCI)0g2dxF9t6FQhJsGNTqb6&`mF+jf z-glQ;U39hiq^ZibJNt;vcoLJNgYwp;}Fb61^q6Tf9!C>5}bMpPdcDaKj)O z2R%%7!K-SY*oMuSoVcggnj9MpO~h`Pr>e1~BnubPyQ{&(=umCQa8qmNvW5D_Kp!$B z+wF*K0V-64ZDiWavdw2jbT8I7BD)=lc-qiv8=K3>vZiRhcVN8Waa&SL*0j{yqh)Y9 zJI#fvBd>Gm_jF9F0_#|>$QcKRtmC{TrVAJren+jXby$~T-J`=XHadZI)1xw*%GQFH zG3JE492R>lCCQ*t3d>f1DZn_4Nxd)aPQVpuqsr$eTODv%8=TNb!K2$3fwSHnEz~{M zGNMF|4EIG~5m^*+ZJ$;JmVCdJoygTfy&jh!mJ1tZx6)n7A+{$SDWrSG;vmP>eWsP} z)VsK_*_a8J&HBC(>HS+<=~iKYv8Ae6qdl(AOfXlxtyaro@_H+goXgKnI17P(nVHkd zF9=1Z;B$l!wkTT(CARda>E`hsCz~*(vuRy^fDN!4eyr;0%k-5wbWN`?Y$!^p@B>S( zAYuoi@gUpBmvs?SU(bk`@B1~bfe+9(%Dt1%&6&6S4$6yk&V*?8 zY~4)IvL4*L;OaTkG*2AYk0UD7V1KYjw%IVF)VGKD-MD+cSfmC>1i#f<_~=usKwQdG zP9*hG-YD~xEZgVQ*@t?BOm+|v6zChqJ_TMJk{}F$p*GAs%OD{(4&!&v)Nzb0pq;!_I)jTvh%D+!`?_B&v6D@a=>A>Tk~Mu zqS|iX2W=V|dFD7w!C}b_JHvf=b7;P-P+lbUmcL>s$1AKe7xp;=evx;9Ux{jZ@&3lj zB^nW2VJeipVH%;?KH7kdsn0lK_b`bGOHaUS4KZWQCjuBCJ%CbZWF&5Sf79N1Lw(hQ zE#nNzhon9e==vf_cO(fm^agTz>sN=!{?9zO zlyuEI0TX~djXC70ziw=zk2B{flH_4s4xd6XKGHK78jPQ7_K)sG5jC=Av)5t#HA9gU zrUNaqXwQOA&HKTe|C@bXTbNpJv>vA@8Ian9jtQO};)OA`W{G=UUJkFKwD?aR$CHaz zMi|4>JL{_+!86GQ2Q;YlH`k;JXz)fyVp1|94<;FQ3B3%MPS%Uu-};&b@A?2QR0VD6s_z6TkgXxMYb75Ola6@X8NLdqjkk2c^^2{ zXo>b7M2R#q1fKcMw#nD-24mpC*08rik2>sK)?&rYA}+Y8PZwrO{j#d(r$?bjBO`68 z52(})%?O*OV|3I9lt~MejW(xrW-JvcGgw^NsMS_A%rDi7L2iNzWUcu` zp*kk0b-C>n8doa=qtqL>)W3ELPyfqYvle`8-oMZJ)9meC<~A2%ppj+XmBZ8&|LOPL z4cm!cR8X~@fC>I!p6@a9W}U+WO49^=8eg;70B^?g9xi50E@Di+d^0T2zC5R{`&7f( zv^@1dr8=|%5too>Cep*!Y=7Aq>XFH^Pr#5EyvBx$lxp&kH@D$I4x9&T>W#*)9BR%%sq?LNlJQowlhdv7n5=|;4v~bk_@Yx0^yfU7M7~ya$P%T(ETQZPo z_5`VZ4iBmt8EN~JscE#aj{Neic{h;f3|R0EEPkO*&VIgem9TDBa@LYNx}NU3qEqQO z+hJV%*y6TDiG|NDymG-u=KpNIY2L@?wa-n=d3Mf~vp>@QvvyP4$J=JlYSO!1Lw0}s zbJy^fNr}L~1y>N@vdZq@MPmGgZ!^dg;57<=+a2(2r=GR~3m4GV{|v;7xnyo|bXeJV zkC80>@xN}>14w@vWC|AmfiHkO^J#w5Wg>03XBXM=@~^hiDqRi_!weF$Lk~uqcZM$) zXyZM%G^->4=yDhwE&$SjR)K7Bb#J`PI&HjX=M2>4us_T|>2`3uo+WR37HzuvGW+S~ z7SiQ8E}ug(NIL`&c#y|FwPYjtuTLcBUwLi}Tr@f^91u6P1_ZnNa-5Pc00IjIc_wDs zbeT9e&Q$1fT&rhr#2u1kfUDN!R|uh-F~S7{yZdt7rY`^jIRi`Db}qWymXl^$?sB}p zF970nI&#+2eYq_s&Q$1fh&5(#3_C=I(KW~SWp4i%!LP8S=ObNR$hkxJ#AVyD=Pu;V*3A5__(7pf$qR+8DfrT&robT@H7^43Hi}OxIl2F0inmh5-H_Fc%3R^N>N-AsIk-k`}?Xk(vSGcZgtPY%@rk$nL+p zXe5JzHRs=~5FM~5CA%Hr=kVs1DxGseeslNaRfl6Cz&E)}IH`7BBK4O!UKP4_x@{%O3 zf8qvEpXm9xEa2lz&l)u|{kcJg(p+N1sazVnVB^%mwe4CIT5xpUKhOE~Y+`)o z+6{Glw{*3^SbWX~kV*b^Tl34z80(G0vpnl6XA`yBL_kk`UDGSb&>4IhX=UV0-#R^5 z>Q;Bwe|QFl+0=iC(tfH=BR+{4t?=fdtS4M8d1_@r)%3eB;@eCkgHL_}Hya^1DTeE~ z*`VJj{rH?vzskJ>wcd0p$BvdFeZhE8QuTPAfF6xVH5lC`A6j4k+!NH>&XYGk)ql}XCD5S`vZ}r$Z{hE)2Pu9 zFWc~W@^6iGIZEShmYk_B*Tp+Oyv0&U^aR0Q-Ifq z;6xf=$WKp{mJo5xi(oI_{x4hW+rQjc+qNv+R}w4SL}4`H;+Y9fOq0H^z^GoEOv7fiecY}_}+l}SI^uSMBc)ETSegBh03xD17O4ul!_zR6vjO2dhJ>Q8;Oak6chwx3&L z;6qPeVhq$V1_Fqx_%{zGNZ?r*m?JD>w%6jy^#-%K=zwb=7If0sn3R@&dL8-cvyF~b zm&`(ZZ=c*=U;3>^rHvf_=f>i-y+Kz2*3qz5&s3v`7Kvb!FbYRp%*VgkSa+phIR71e z>6~cM!Z|XF`@ab*bFg8cG*%sm9>8c3M)XP_;|Ug;3c(g}Nhuojs&IYRr+#vC8@a+U zJr}0t`g5k{(8YOc9vF1T5RB44-~mHM%;IUa)|dXJv2w*FGLWDCt7f+_0zw2=t0<ugH9t_3xf;;;i@dA0Yuo;dk3r_XQ31Mv)^qj zUw!E;BradgkfCosc-vnnS=)d9_yC#zZ!kKKBIqgNZI1T_qnrm(Q(*iLX8`X2ofTVG zT~b<8;h5L(%@Qz#iiGAl+vKP?L4JH(|MY*ysDSB8A0dhWvs$Pe|SWU z`;w&m6eiFuKg3Ac?;^qBD9B(@YojSz2qx@*ko7G%}*R_(#n9 zw_e#$ANdjPm)28aSM_paLdS7MP9Jpy;(hYC>>zzz(<{k8{sf+88WApuX1Cls*G|zJ z!Skf9Ba)x5u*J#%hiHaL!I@S2VfTxuf>uV(=CdHs|Nakgf&C(krzw^6BqefHui$w5 zc)y+kl#jrIh3yK(rVxF1`4W?k@63ZHXT+skgvaS zuB2yw)pFsal&k8j9GF0i7@oB|2b|Gyd)il2Ra$?JqH1O28Q)*w{_#hDwWj_zKc`cJ z60NGeKJE$HhWWnX0nXFw95h>6!|>!;luRQd@y|X8BLBUJY2EfS>TiL*IM1wW3dT6R zP-2&iO9Mh?!l0I?@)BmMMn;~0W+mJ^KR&s>{`^byUK%qjF;k+n)liZ-op0Dr9mBQV)}^B_4b~>p_9Uen zQ>*UIm6!_e&)OV@Kt573(uuR0eCREBn*5na`6=iOo_?#b2HWgUezc7=`}w`!Ha1eP zUrIct4)3gxD(krFSSU0+5*`cnt4pQpZ4_N2BJpqicx(N@+cO&f^>^xEEJ2w%7_)hs zFu;1V#!|&RZqOH-hc|c~{~iPr7t8P}wHi+3G{XFce}B&7@{vElg&41I12cER2*Sd} z`G}R1jKdSdp{m+Lul)g~(}>8~r-nf7L#cn=e>|tK@D56dCj?49ramDUrBKMkjLJEK zF5ru%-Fa2xm*0U#jf|A_S@j8lZ2D8E8dd#P(1WTex^5uZ9VxoGotJBx{_|u&M<26?syNy)5ys4 zKfkKw4g2hS=QN)EzsCDEgGYaoa^0!kqOq{k$Ft)R%U}u-5(+W3gFpQyG-^a}AKQfr z)2F4yziHgu8k@7;g^R_kcRQSmQVTvj?@0TP=G5s^?0+A5Z@O!lB~`Uguo3_GfY(;7 zh-Qu+v(|1B#S6|^W=$rtY*9bv(pPQk>j&GW!|+J7!={HRm&#tdly&8X$>&#MRCmsv zUbaLd!VBwXQNn|z4fTQ9)9^fv!a5%xA@iH3ZC$S1XJc#eN+w+{^+XWE;qjHztH|qf zphzQAgE&0>mDGlM&)jK{(%?0qiczP!XHI0~9A4t}6NZqV9|#KM3-hM8EzzW^T-Cz- zX}q|=xs$S5see7}j*Shmqa$Mh*e@jVu@pJ6V0zn9Z8CKZb=Nm7oQ7-a9m?b=(5vfu zw>!;Y6O7dQ3#L*uJZ_4`d2;t6pledqmx#8-)9{70guPiiUlZc4VNb>v^`uF@1Ay9O z^`!rcj%j$ag3g7qP34;HW-zD0L^>ixJa(__vOAk+zHLi1$s|5%Y`q9Q(=}~vTPnhN zrCsb8U9@h2GUwpDSE!lmmF=7E3DxoZdVe>*3s;#n{nzZ;?U(G;`g23qexQx~)VD85 zPOP5p-F#25j`!~SuWRaIE7qKa_wr_W%n>f;Oc`R_fvz1`j;__nh;sKGLj8)bKX_Lg zF|VBNC9kcX?pPa*_;>`jFTnpahd}Zyxaq)gm(5c>Ysj`W(_O1BnFUN$wKe4FE7o6u zMf-IB|KAb!QP1?e_usv;e)GALz9;YFqxp~?&a8S*-l_KtfSxZHoluA6SJqB1U3JMU ze9!v7F!JjMvik@Q{u`%1xY}96 zmyJFe^cG?R-hvmzgfSfb)iQo=XKOGEZbpsm8#N9#;d?;TpOI#|P8l zs69R+<&9DOkj_9(T#H3VlS<9 zJJ2H^XQpv^avSCB}=t3Qoi?%8z(>X^ql%nxM>{2 zDVdns&XTTB>t#L39;4d_Wgv^fR9i)UFJiQ5WaO+n)cma6P>)F1IySV=)TwMqaRXd* zWH?|hmwRnqzNzI3h69uMg=Yv&KJxqnvvGWke`{lX_RZ5UMRNCYi4s3Pko1^*Ov0b% z)Y6RaL}@fKa^|@!nx;q~E_h-Sp7DP0!*h@8w@i;MGlmjFG7~YIgk&)l8JWNp)Lzu< zuXaI`Mn;(G-*2lwe%EQ-Py|fVx2*|gbe@_K3#u&-BkgP~5@MpYB5Y@V+Tn=#EUDGC`cJ_o5WgmWVdA+)Bu;1)(^g5hVTB>w&@jX z>^{a@1J6M)$;4=oLrbCNvB$FX&)1T?4O`(QbCAaxhqtL$ZC4G}&F8pTaa))31hLZ% z;Myv0#AO?7&fy3`9FA#R>Rd`%Z~OYU&}7S9)63VeP6jlply9~gt);S_pq0lJQH|W_ zn%=hZQbH^#8=E(NBUn@1(+k%|S+Mi6plz-Bi?Mtv7Y(|yp1cXhL2fk1rKLo9$BBqy zPj1;t>h9^k#NDvOGyU;PuU4zck3G{%FS%sZ54ava(nh|}JME_|3D-9xIR3-DX^^|> z&#@%X8yZ5H?$inCl7yZ-TNSMVNk3xb4N3BRKL$)bFuknnVi_^c3BhBZvLJptFl}$! zuoOzvt4Y}*J;3elA2l&CU9sRcM@MvSLDjZAGQE7M zRz}*K`>!Tfe5SavJ`|a5@-&c+nQ|HXq`o{KLhOTLd?Mu=ZI$awF_cRq1OLujTPOdt zat`Uc@1^ziO&^@Tg_?zu#Zac+Wh6^p!NXM|14(ZtR|4a^TC6*6hcb)wfViA$5wTTqwKg5FWk+2=Am1mNh2d=xquy?($oF&R%lu?6X{sj zygtBZ3a$?f7u}2YD}=J@srF^=yll;LOm-j>upa zsVSeHI#76@v*hJ;$-%My__%${qV8u87O|gcMC9OBu!E>Pl119F*cVqrkGfO$x$`*# z3xAv*zo{~Aa~jklEz6)tS{aR0)ub+4TOZC)P3Tq1sHgU75k7D%JCRS91BtM1Txgz5 zVC);mVAIOTvURgTkvaN5YwN#?;}E&5SV^Xbxqv&trF2ZOk8OTipk@eQ)IrxrdBLLwXl^`&9s%4vR60mC`XHcQsP zsub3W^IGH9TwYzZCOM_gCKuGo^Vy>l;|o#b$dm_yMZ@a!Ic#XbE4Ap4^Z`(|(ms}4 z^vC5NTl|BiU!phvpPX@Zbe5csYxff2?eF9V=38|r$detIr25>}Y5x5Un5@%hj$JT% zLF|Pr(pcH*FqqvAPFaYPm9?WNJhcEy4(q zgm%&+`@tC~KM@YL)sL`tTMJwG={8&kxcrmTuy(@bUv1G^lrpEf#Gn{^*u$#Ghda1{ zh{3cjm6extkA@^uA&V~1X5EIQF&Wa$_!M!H>)|J2F!4P7M+g664_Y4&b%a*76CUc^ zEk{qIM=PP}R=usHKl=nodifoqSRv+iU#^73!j|DP{&v)}(UUgoYl zigHjP7?FAh3^*)>zJSNcOfQ0`Sh@{R4(g;>a_HtdZaw$j02}JMcebHEg;9&P(DCi{ zvroOl_8R#ozW(W>_M6;Cm#-2SCA5~H&~~q3 zZ4_rXho&%-4$JD!mV$ihASPD?CNKZj^ss9&9tHjr-aFjH$*%dExEb$l0kz5Q=yIi) zJD{X9u$DM)!-ak!3NL{FgwCY>Jnp`Y8bPq8&IK#NsUAq$EKRoB?pBkXEaUbf-GkEk z;H@~5#JC%0@m6-#z0Ysq`?u0l61L$vASBp^aaoU5Fe#VLWYuLOmd1#ovu?*>Ai|MD zp6}sOBzbZx|FPTYiKOXR8Z{P8HC^d+HXtt}KZ7#yw>!Xu7)NIJeEq$A_)EBHPbpd% zZ5#%D(4~;|3fd~Ff>CYw<1ZhbniS(`_wI}N3%)`f5D90?8)F;IcyC7QZL>7o;W}I_ zZ@&{4OEHcxEB5W-mwpw$o75)M-7e$gl*xu}Mxo6KH<2suIyyeS5JhSkIBrli|6i|e zUpu%av=oaXoY0X}&u(V@MybByjHcTtDLf=`?L$};5pKSu@HGFzLpY(g!kW4O_0a@_ zV@BpyS$f4tKAo32QIvE@=F^A3$wCZ~bf0=J|K~$+E>PR&d~hPzK5AEh3v<;dl5@>b zg}a&}o_nxV{rj=AL^!nRxQ7a?XPM9wV$TC~tqXNk8rfD2YpENFl{6_lf>8qZJ_rIL z965HOVOZ1{IXvH>oIp@%O+!IYgZ6qM!pO@iQ@N~7g=P|z5d78)!6dd!MNQbBZsi}l zhgv?^HMDl5uxoNHmBq*fv~`=oV>aaSIf0o|`J&+^pr!7io+ z5`}r~`MM3AEa6bMLp4XP<|oqY-~{@>!&n~?3UYrpLhTRmoA`$xhA)09xoGVE<b8vyWC->JUlHLT zNiUqpZ6PoJ;OMBX@6?Zuo=I)c6II~M8Kb|#`I=>!Dx>Hitz4iQ|IyJk6CxaKyt3n_ z_dSTJr9V14Dm{Gc$461M6f1M0B3w^eDO=c7(^G3Hl{!ri*+rC3(|4c-#5gGRH0)yu z8g|_N9lFMldk!NO^MIKY|g9aAYd*Pg*7V3)A;~i#lk+ z$*#r0%EJ0G8%yMRxw!Dt#-kXP2uBWbuMgjor}_VRl-lUnGHNO#Lo+XsDz)NFK^Kmf ztKnd*HX6;=$H0RKhXZg8UYc%vYzu$oV=&dGa*3`^%NRTAkiLK{E7Uk1^8d%j@mmp& zT=n_$aMOP7u}!?=doY3~(V5NU;}W5?sg`qhl8hiy-+Y2D_Cgeybs{!ocu7C~`?xud z-gu3)Wa6bOzp!MZ#5nfA@~4*mfgWP#<5q<6?SXa@F1!khHf^gHJt%CDwKh^YB7Yj& zNCZXX$a5F*w>?c)2+~8-`2@jt*?op6C+7;$nk^Yi=42#!1V0yn$+mwljqX#=9HD0y zY*-Cw2sW&?8E~R`mn>@N73&U@G(%SW1O}-Xj0do+gTMACN6}s>-!wFRTv=-LmqNC1 zv!x_|{wbUfVla8+4v&qmJVQ@i*svGR+px$npK)0{ic-z&R_4nx^3$JzYY|j<^YZ^3 z>UhdrNo&Jg62T+!T*2m23dbUv9;=md_U%q{@rT0;Ab;iu|8gcmvmQMPUHGe`=S?Lv z(W;DXTjJ`jx|WUBRf1q#|0}Gn2uF_m;ZbO?JHNk~|I@GV205irMOi(g*ZENLHr;K8 zMq2y>ef(C0BS-H4%c$qWBYikR*Icq_)$Z}lcv=1Q@^3DEe#u(NB~&KPg<*qLr5T38 zs_M;hcZ*T9LOH2QZelHJGWhLLbc0YS-rnCyC;p5aeDvNu{NCs2{>$l-g&1pyNRxS$ zTF#;iI!GX%Zy|Wt0G$Q^oyG@$2U`TO0>p$>5)_`dgQidsk4B!?m>RA`Zpa1s-t#yr zL?~3QMP>J44bEM^hmf8IpNdc^u-%{wRKmdmLkVHeEd-O7@AIJ{`#sNW<$rpN(!lLg3uZ=TkGt-O zhl{vE-XIElcw%aD*^8i&SqO&P{~J(k`#!yu|DP9e+8_&!(6mJ1CMT^iKB>&24us;| zOtq2B6ZN04@x)-_`OLVPzwb{+y=bPe3z^U#89Rh3tSgqtPWTrwQ8c?vn5a(3Z!$87 z0Eju#*-{t}#GY5cn+S~Dy6^4bzx~Qcr?~NRVY!-?kSoc#HU6UC#vwWZr}8UUuNz;+ zJd1GT(7vtk_|RPHmtLlGgyWs2Hwwr5jN9Os$s%2iE|N7W8+8N#y+SRoS8))Dapcf# zaXf`A`N2m1v#(M^0Y{n>lmtmEI=yuZ8_2R@doyNMp%C$q(zS1bk{Cy3f3yO!Sc7xp zg*U00+SaIDZ7$MkBm$+pqtS%PL)rMiTiCE79ASRDqIrQC~$b(et<5@Y| zZg^%4rIvv+Bi@Bl`t{%Fp|B8#df>=hzMLQpTlYG~vjs}uHg5;20!cZ_1$1@ssB6Yc z+^@h|S^e74wW}8(h~)ZrjSR5LYjjRv3R*EIf+-kIdu=gRty5O)F_SV{g(HA6bMG5q zMua1p6~Es>2KyeMorXYYo@aT6k*hEq7+Uppbfk%L$4#q?9((&6zwjZTDY(hzAuHuY9C0%W2ymYm#M$XMXE z9#T3s)?Yg*#*stJ=g%ST72ny+>rd$mSFQjk3DRZDvAT}T)(gsA`ffhj$_SLy%Rott zL&W`47xSN81|n27`R7%WIvcW^ETXUOKz0(*N!hlA^803Lm&7i{x6cg zV3zyl*CG|u&e%Ck*d{Yp-7P${P+r!PYghHBCPX;0@BY#Tq4U(?dv1Y@uId{l(=-lS z7?x3{(E8&#Q!mNQ6xqgT^JSOx(YSE|3NOrm9lb(6wxkc~z!5^@>T5%@DafG$2BXn8 zqp6vCsq8`vs+E11=L^B)k(UwYCcS$3G8_VrZXoMU?f-*JzB1TOl&kt@Qtu)Suon!m zWHLV!S1`$LM6Iipoah3yvcH~;ujo&$UVtKpGQFK}q~E!P{CVZGXwLDK`*x8V4(y&F zu5aIWg+Tp=vHtN69SYQNU3K}&>(MyjPpB+?xxn<<4Y5YVC7R-#drs+?T zEn_YNjaAFpSbIGxN1^tu_=y-yre4dN`QL8EPbN8cx76}D+Pb*Pi$32Yd5)hB30jDP zMp!)zs6p87>DU-UJCKI$3e&4)gHbh?RdA}V+~5l}1*ITeiybCH5y=N1f>rU#W1Gpo zwf#4R8NFv+fBP01yDM}q$folyKkHQI!)j;BTh5L)>`ymc{UT4^17XHCWR>liKt& zkXIP1-RUuFWywg_oAYTBXj&`~Tecp=L^xQ!ufG@FD*A5;9)R3GJPVBH|KG9?Z_zVG`uon!mPQ;)L%zB?}n-oV^FZ+i?|5AdH-hq7w?9? zLC-;wnb$W>tFq?HggQ~bK3vG?;GyrYCC2UjbrWLD@VVhkClV6~-F9Ao&4dU?n5P!QrdoewnqT%V5IPM9D~-_=4pvXDFk@y5 z`L?MbtLDv3fuSFr3x-4}a%c&jP=_WSvkQ|$O)46sE5un!gBeAVtri_7k1;!Aki`Xt zUfT(I6XD29kI!AgN6zV^$^hJXG(J~w=XFrxC(0<>SsT}Ccnx*(o<04|U?ZqF_?B*KpxBa{jW(-8b2a~ zraYB4n%I_$QOOuh5Z%Vg2&slIzkpM(#y1+r2vRV zk>8R*wg*C=Kx{L)j_t2rf6_0=p>I!aAXkl7F5wUVXlgfNcx8QbPzV`h4t=KM2q94; zpDj?f(42rFmn!<3wxht{36J^7KjruBzYbvlTQ2OMLM~GDPr+b49f!#XD&7)8vd}^n ztz`4o9HqEp<2zva*(dg)i2_&}+vb~(13)uWXRk=x+cGq9ga$xF{05eIRehS=aS|+l z!`LOC9&)pGV_t)Pvk6Ri0?j2HZ6})KI!%EtFO}j(BCY&S3vob^Y`@8XhQn7cCjb>lpKjZyyPHnz+_)zJ+AS$y|{({y`7peP^wj^7QvBF)HiD-dpu>< zJ3P^Dp-67Cf`kYv#M!%VzXi4XZP>;1!gnG#ywfnKb6hH%h^A+{A!C!goP?VDj0T%n zgc`NGp-?uIME_~Ct!|%TI>nf~r(!IHh@hErI%p;lifmKgGBT5YpaU;-OhrtKpy70Bby_D= zxXZn)FQ_RisbX4B-tUAxwGc%#8OzW}-ok&=Nv8&_EeLHvEvQ^gFlsiH3elEaS9AKz zbZXX;OAKH~j5$_>!hI?H!_EAE8u~8DWTKhyg@ZG-V8*O4)KNwO9PAul2qlsT%9Y&m z+Krp}h6zhM@*#~%U(F6P1?YwEavX8r9M*gx2!tL<529$?E;cOF`fEYIzko-ky&jA) z>%$Qz!U@lzhvz2Oq3F&!{yRQ8P#BIKj8hQBvPYqIzw7J#}`8J7J~Qe zxv6hV^RIa5S%4XDgB`)dZ`cd2C|j*mL*}d}=~Tu9cCNb=?1*r%Vey_lye$0T(h(~& z^Q<_GN_huwgq3c#Sn0KM4g$tR& z#h4(^mtBTaQjD3s?DweOa~Y=ojH@AsO^imkWZV$r>4?`aKF70e?nM$kD}|yGevnOkmpPmWjIMrPhhMf@Gvn%@QCe8&_%=E z|Ij=QG~mUh-`EK{8uExSnIqp#_s^LSLE$pJ3e&aqH`Dw@8M^gB;);0^Zl5JlWK3E) zQ|u*Lr7qq2>&RELu(tjMb?nO*LM48*wuxVrqml?hADkzY#50SB38b>!yk6Zc`&eR) zVLT!*+4eg;l(?h#8 zpv_$~DM})N?gbz*a5;tLKdQs!4Mst|ITd z0?RG}Biv~f7&cJ!cG4NQJx-KYVhCa|(koY5dHzbAZ)-9% zu`;^yV`KL&pIf#HLHZdgE-pb_Xw;)1E_!J)Yv#1QSl1GZ7o3fhu*%PUoO*slII#7t z9XEaDfob0O391O~v-@e}qY&og@w>7$na-5=`pvbLsXmfB97-q|un>nxjj!Tv%l&dA z|JPYc$ThqFLBfu@@A>k_RQqFsG%|x;5{FuibjMZo;HCmiX7g^f8nEolGuMD z1~O3c>NqCt@ARq;V%eVTd)kgdnkM`jeo97vlY^=RJeQaJiBU&P428 znJuTU2z1_meShuh1sL*@>ODi7XDfgB`k|K%Bcrj8!d&ZA@i5Dk4Eb=mD^Iyx1%b{d zuY*@&A&zLS`Tb5*LF`{D*=n2Je<~Oe%*kZHV6BBTiljxOFc=ttz?y5o$N~(aD_qzR zG(nTC>URQmBFHAy>2!a(<;iAY(gNDy_&AM2nWCI^%wI`Tn!?lQ|mJH z?pfs@^$uQ&da##K!7{=!!-m;BZzhz}vS=_@4JK@?vBtE>RZ`sVou9#eS%?`%c?umW z@A^#t&6`YHc9I|71m6Ux(SS$cm<}X82_!lsEqQq~*UFhkLUB5Qbct}NZ+AaDI{cek z$t>x=J|y@b`#})e?L^q4Mcz?sxRk+O*Gs*~iOC3a@TdKl12IkrGQ2zR`;EkPp#P5{ z#mZ+v5vxlBAcfVP(Ux5XCSB=xrRBP*2UCA2w}(FqiejALL%pTd-AuNBuK&i6;w3i= zJkmf&L3bv4s6WWoTPh}_Y?sRVk-Y4?xxaq(0t|^6CWmjeTgd<3-2eNK+?vn#&xF~v zf8D&<71xFpI&IusHXBpHtc|Y7Iuidpgl{1RK_Ts(M5=ycnmqdX5w&Aq=;J{fGk79E zQj?dov*v<>SBeT~hhOwqwi04Zq;?*yMI5y^15EnM4HE1bV zxH9W6S(D+JQhX@o>$fRUUq<#euYyke9Xa;p7cM5-zA}R|Pea70bU3&` zHQKH8+#Xj$*p2^wCyr7P3UzqjM4Ixy-M@+a<<1ekHFpWJK0Qw_6b%|mvTU`g?nH}H zOJ`^stS8C4Kv0Auo?G!;a`@I4k(YkgacTNm|BTbFj-k;Mgj0BRi+1y^g zHc0Rw>{BrirkI)k$w9%tw4e5M7EC!gdL<`iGXYj%lZIoeQj+Ys6+ah2i6-zzC;#+A zgPjucyDwr$Fz09|XMsjYX7OfNYrv_^a*AjrnIdQ3hLc$YCWovqSonjt!5|x{!}q}7 zx$*;&_pG{b?32sCzVz2iR#QP-FCn`Q^~a~;E~{Q6tG0r&j!{?Wre);V&tSy7|4@Hw zQj8<}Zo6R*|InfS`w+(L=K@_$=5~bgF_%o?P?3E{V8vZ@5A>Y~Mc8hm* zKMjBrY$$mWZJ#-9J*rja^`R=pG34jP`> zBj^99zv(ok>g{__^bHxhCoA{%hbhbZcg&|OCo*xRnRC>&22(1bEuak@UaSABXGfWS>x@+Dhz?_TMRq z^|nX*w@!)1I6wYxpM3m^`#$*pJ|-d7@Af0`g<7Q1ycYgAbb&>yRwp8{;4wrMGAiaz zez!k~xYd(=f|Op(|JfyV7#6$h@&4M4`a~DWunZz%rEt4SoqmrTVcjTsM+GO1FV>&* z3nW{q;AP$VM1Ku}oQ*lB$-^RCmqiXNGOyr|3`Nngm(qwl(VyD*4xjL|`P<=TUGszf znvFpf8l$AV8`0coKg$x(2% zMK-&ihPi5nZ-phft*4H*ETM?sW%QF+zkkl^1u(Mj+4CS^uidj90q=wUnWGafLEnPk zkHRQIe2Y?Y!dbq57!f#3K(RR5G94?eaVcdzV(4M=+^=9&l~S2PC3~A;B>GO6Ncb8z z^Oe`=VS($83actyDr|68Tazn6I#O+t5%OoZ=!J%6|MW z9`aW8x9~T=I{N!3f=AU{Sm)uA=3vm;h`QxSA{r99?+p+V;mEec7idNl?Bz{=ADIKR zov!}5DFuaF!KKUl-h)_2kI|Os!>FZJR=}o%Za37`}g@tRV)m!$o zw2nmC7|Yj8jBt#dq2{EFO8vIAUicX~^w38}VM!0a1$WrQD&5NJ*yopjf9YSBY?nC4 z$?OkbSWgQZo&_C-s|IcVAZ&+BtL4%$J+sN2akhL>U!Ht=15{l*sl>r220HM~y*y0&XvsmC;w z6=~L>M&|@IQH~FGPKv=qv*X8h{(qny*3cBQo8j9rHka@=4oIeqN_{U#RT;5tM$+t6M2;kA@E2%dR7Nx$CYWfN(oo=dixPQ{4O zQyT_rC&f5&=+fml=?RFJ2rs}5suXEnb^Vq zdDGysq2rN8R|<~D8C$z#W?C`@$C^W_4id7?KYy^1yuNNQF(JZ{eLu@=AUDV#-o*#k z4~DsQ`)RzVa8Keq-k_E(HzV~i# z+m=2aH4yP@WKL70?b18Cc*vGJSP$z&mYhKCnzIILHk|wuYITncwOwj1RLF`Hb9Ya^}eUcMedD;G|go$eWMhu4Zn5oC&H4yOea7K99(^L z^>!JD{CtwD>W;3t(-dL^;3R*$`hyjzf(SY%7;(M zpW>CcPr2}vvnH-R<W3VS8yw~tXR5u*YX#a|IhM=mVa^ib<3N}FI}!*{_f@Lm;GbebIX3X>|XSm{n)ay zWbfn4g3B&mcFwYiQM=i@m+qHjmtM7W*l>2~nM=o(ytL$JOAar&W62FmI!i8JVwPOB zM7m_tl0}Q3U;O0a`xoD`_~VPKi^GdGi>EM&^ZyLnPANEfNXH;0~IP*hsv#PF#vq`EVKNSjG~)>VRbUityf_X8=wux@qdGPA;;;bUYiy=ajjyUr z<_i%o@~hT-LqHfC0U6t^I`SQFHLbVCw+np-6~>w|%_bb_KshDtRnv+KhE3>n3S*^+ z#-Vw)xo)Vj@r-P#(5_8kEN2;6CeaA=A=u9IP6QCBBdlRMM}ZiUd-Q(;J{GBT%y3n^m=0yh+` zLVsKZZf+WxMx{|F8dAJg=T_@Rbj)%)Q%J@foJ;A^>@8)cR*ewGaGqt|Os5gbW*E0} zv0Q-b+tC1HQm9NbaakxENuMJ$W>Zk_0c#0)%ON%-v$wcO_vrhSFURCFO+z*)FE`>@ z^MfO}RG(v54I6e>tf_EWc`@z$xOcHmp_`F};Rm{=I>Y(u1w$pC z)kXCRiD?8crd*6#5!a`3I+pRJPrq;kPurB7EGe@vnM5F&Q|k zON(2kAHl<|>Rv7x=S=0gUy0xD{Ll#DK>(VmWU--~kW-(@DMw47?I~?cHmL7(ivFgo z5p$j+$egxq$d!`@O^vaI!a-Iibi!3=8%8_VGpn_pT-NU4WT#&xkbk>@yO$ci_B|s+ zvMptkI%&G2t|N`SXc+A>ZB*G|l^ysrtYN!4nYgGu`abL}GFneuRcbh!ZnH{N8S&%J zN6LA-zvSqY+B33u&yGHKpt-W4#kDJiid3UhU4Z6vdl@W%rjz1irf4z4X1WCro7y%l z(9u|9CYP;M3^>%DdQtvfVG}DfW`&&dne91gOJ}x~lB+Kg=xa=dG8a=uRN)F<9P0(` zNKiEDiixdoIlIgoagZW&zk|W-_FI;`e;ERv@BJq9p)z2$<%|jaMsxD#V@{mM8>YLv!;?YuF%F5 zwUB!8M@Mi?sK?qprkaYI+1u(r>?zx52dM1&E|ajcs+>Nq%Q_3ocW>Og zgf4)}XzsCby&+T0npsU!VZ2=!F#2a(Oa5-#ohTR`nxsbPjjT{MixH-xQQ-E?w8GM) z^WTNfmCa;D9a8y?T9=e_GLyj(xS_T%ij0Ld2MXO8weI>6IAcwsd!jh8#s_)6I_5BF}Zx z?!y8ddC%M6ycUN^pNQuhJ^A#k@OSaPP*b&yNm;SeYwndQPaBO&-clQ7c9pIgjKpFy zhJ@i0BRZaZm(jPmjL{N_$O>u4XjSC4u952^lGYOpxMGds8S&Bg(omMQWxdK$lL@qS z*_}eeNQJCx@aR3kmQEQ^#)`!yuhY->>J+j@S;kq)szxzoXKan4cBIi|b(w;3bh?Zu z7twP$_LQpy`m$&|#G(va$;Fj1O_`OpVLMQTETr}%8&yrunN&xL?-?l{nZ1Z;A-ldM z^;i8#goun}O~!$8S+h40teVSJmp;4QAxsa~PJ62jw@IZ#^VU-CU0095>8vLfRj1uE zN?ERunz%$@hI6DEOd{)y7uEHIyqjF}%m{93w^8NTAsr8IOA7U4eHWBM@Yhg3Khw$`fYGfw9H-gvIZl+rC&-iE5@wO+kOFkUeUIkMzs9nZH zN8=CJ3`zB-kuGG4nT$+VD67*}_!`Oy%X>z2^0qi*4z#T^kw^kj;ipJO@OWO!bq!II z)?sV)s;P;2xJ4@Ss$KP@GvLf;QVbb=A4;oaoxonN#_7p$a(#O3lrYhZzpapYxr9b* zZM(CoQ+JNON30iDwwKM>Hge<>+~jE^xGrL5gQ}R{TyVHECT2ro1ZUbYRPgdP3l3Q+ z&`WO+EGdPwX|!^6x5F^gvBho5y{vj<&`2#v*mK0)4J8LnE=?@^r$9)mby?XNo!-Uu zWEz*5S$*Y@PkC>~smr0gJyS%qI=*%z)zqQ+_c8d)Qv--Kw_pUChu{I(Zmn&mxC{~^|WJca|c`Quc z(5#0l(o)Qnn6iyN*GYp;hoV(ixh#&PY?si}Ro>$`R)$W-4W)So`#rN#A$;C7L=duU z(aFMli=LV__pWOM@?9PJ)W=N@E@i8Al&Xy7Pb0X}Y-Pg*7y%`p-yD~#r6af;vlT;k z%|y_r=8Cd+rv!MXVfQhpGGWXlTIzhJaDmY0Sl+?&wag@EeWtQS@0rP7aPD4#p-!Qy zWm|2(&y$Z<_2%uurjvIPYLmH~HH4gra;%kGCCI+K6SQlXHskcF!}TP5l2bza<9~TL zwVyd+M~k9Roq)yLSU{6hfGWFr-WRUdQ9bLC(mxq}z}?2I>)V`VK@u`Mmc zTmg2m(6U=TV~RMq4wpCTlHV~I-zr6g~4P_)=!sRV4rlG58qk9}R>vxUBtOedT% ztD`EVL8H+M_J_Pxjj9=)LlKbLj4FL7e)?|&`pp^!P;eG3*{V;GvlY);F@l$?by>~X zW2EVjLThE%uZ`eElZNY7%1uk%e)PS^wzt9P zx?OFeWbh~b8ONUmMw_-uGgq;fWSNXE;p42MaWxJ37N@D&)V_kv9L>g@zZ}s~CVCtS zomw--Y{lEluHywVjf|&kcZZN&A9m}_$xFBq*y(e%T~2?-=gjO)N0{-A0+|L^iE@P* zuglsZ|?74nJd zK3Rt8)+6pR3SvXY83nUYUURciX1CYqb#)kIv6Pb+{CM;OSKh?vqnThxpJwe$W~p5$ z3KtWaBwsytH}VWtB2t{6x;tZqdmFA;ni(v(rh7qU#K&1m(FPOHmO>oz9Xa@7MPRZ| zHwRB84etLoM?IBrFw*p3!NDlgvuZEv%~!1O@@3kHJ_3#PG=gbcFv*4d9+O+E za0Zg(P;{`498>f-`igAQ7AW|G9Rgp}x8(!qm6Wpb=YDE+&=Eu8aTuOsX z5X+9Fy8RIhQTR*hqM9jcb1IA1)NUC}DE>m-ci*%QkT<&kMI^SnMj>8j*arW&>FNG1 zqO}iBqpxORFfK?#6lZ{gYsjJrbd9&wJi{f%p|b@)njB8j`UJ`5*v3h3A71%X%4B;rC^1p+wh? z;F2Ms&uHMR7vtU*p7u8leeA)mL`SZX%<0NrX@cv*y;BK0fH0AGZu`A1RU<2{XORJopKepIYDV?8{41UKJF+eEmkaru4Fmo0taNCy3s!vq3Bli3 z{`+Mc;nNc|+38ouXZOdzsqi?E%BNL5RmY`-d0k4_8S-%t-su)X$s;PIgJ0<#Ag;L{ zsFamV#hQ0I-ApClQj?kw`auLn4Do(c?OuLMJ`5R?ENCTJh_JiC$qNC?j)lO2DnmSwC`REP9Otxg-6)j(0b5(Xn86xk>L=r9^^ zn)gTOTM-^tX_l~%hbv<`o)QzU24~uNrLt#J35+}zrK((n6N-CY{*$k5=6AerfM;(! zpVJmULUynsQ&QX6nUp{14k<%L8vS@FrdI?O0w14z^V`#8|3`mnA!qvkdM>&A=(2J0 z)-^Bv2bsKVa291SI?rIo)NCsmcQ>H4)Mrfc=;%Evei`I#f%kKT9%WghZnyfSx=wu{y|G6?WeiHf~L+Z>*gdI3QFS&tI3mYA^0temDrlV zN{Dde&?G`ukVm_PzalYuug!wcD2zhI=A~RV=4%zh9j{Z*QbK4Cy%0>MzQpe&bNdk2 zzC1Tl1{u&0ltHu6sy0})oas7ne+$%;!t>7$(-^E6hd9hvcaiG)=Qr_8hMt5cI{8>? z)q0q5&A2M30hX{vva-^gme)O%a{2eh!$7#qQpgFz5LtX%NP1Le% z#H=x~fi^coew7@YGa-T^d;Xh{^!)!!^Pbe`36G{13%j(5SkNA)Y0Q+RZDT!VN|AIP zPk3T5Ir!j3cK-SN0HrxiL4QNZn4-9Q&M2%sM5a26_=y-yAMvdGkBaz{C@r)<4#hAE z@2p$uZF$?R?iQlbHo9>r%UFo$La5M;|Ah2~0NRXwZCJEfeLQ`E=Kt-lA*Mw* zQoORbS`E-J z2uBW1+Oam&j(hk@DsFT{W$+@HOr>@=64r)2N`uUU1h)|{H`YK%ghDy9@4c5)H$JzN zf31eSPsc=?_6TFjgjJzpC{;BAMGiJ@!ZOl|Dvw-E2MiOU16BpCp{;7NahX-&*2lvxRkShM?klf>))3>c zj>vK>T!Xo%LPb+H1zr+drH-ibY}=jFX1!74aJ;A`b1h^+ghRP#ltrR3`~1dF(h~)Q zX66Z18VvLxa?DYsd5 z!z+&s*KsWwe4J{25sn-@^z6m_C7+SnpsluO~gVdZs^tfr{U$jb(K&H{&a*18FV!uP+bQOo(s@#Ltc* zfR=v+EYpOfy%19&0;t{cc6BYae`nsvU=#V{?hlTU zC;s#cEqT)L)GqRpY1L{{`q146$>Ev7Qu5YU2d8bd&hEbwe* zOqz%KWG#u_iWL*#h~{_5V0!Xq#G-!VRw~fAQqf#gL7&X%VuhBhqGA*DxeZ_9e_C4I4d?i)u;66;V#BEy>wBtq0o7W8RnyI z=6`!|r2l*K3(KW)Y!44Aa;3qnX=ZFAb^D&%up$d_L`t)3UfTEKX8u#RQ96m)11FMF z-AT1kD+|?aT*%|=p_4FC-Gy^j45lX~DrMX?uuImgrUh4|OAoCyFTZ}Quy{_gn%Y#a zQXj(snieWdeYa?~%DJF6Z1Va|?&w{gg z)QJ`wG&dTRt`*HN2VaMAzYvJnrRR6^?tAGaI6Qk`DgM4-wlw4EW|FnZZ3$J#-s|c! zh;$xoB3temj8BSjMDp{C;SXqhd7AIsGq6$v=)m&%8s$}eE@#p9S_UKID#W1_58Veg z7DA~yRG>xKr^fiR_`$G7`GFPlHOf1T!-*D%8mp}=N2(3tK0snEx#fPWx(G)T=|E`r zcTc(R0l|(sKod&^JF2a*BXTX7_o7<8I_XrzNcKU@sThpwJ~D`Z{~#_rlg`jgkZqdG zX+;CENx2MhJp}7b1SJP&4G#V=QdlJ9^=}T|GnL7CODM5tvrCJ`k}a7)h}^^YLt-!u zk%Lq`45=W?5AQQ=;Zbm5R3Loe{0OtQmRxxl^0^Q-oVroxF8{X%NIvi<^Ny0G^t-r8)hY(`}lws>qZCSUJ(VIP^7yQL{)HfC=Ma>0lQ)&$vr+mPR2<;;rBiNep>zI z2@rAlQRUn3EJgDP^yK&DD!mHCF!T*pJ3d%m23Q+$BND)wE4r zVQ70Dpt;C`j!H4qL6;?;tl)-zr?L_*nvej z853+!)8LYNRnu3Dx9qI2xo`S8PFN8N0mF!vM>DXE{QG|n>jL)kfr)wh*;G)<>uf_A zH8d1zQ!FG1(rv$jN$@YI*sHxAH`(slz%MyUHM(c^08K&`tQ6F1U?U9UaRuTXXRTU7 z!;_!j>LUV^Z7=*cy~iG#=I{Lpc-acGVHJ20jysnFiRY?Tk*OJaWo3hGcm_&C42-RK z4A=J8_N?cxeFo|m0ow;oowpalwUVr&?q*zJuO;U}SB&!0P?`&&$NOR2wUHk@O|32P zK$C_A)5TiROYN-FTH``luRV_Zo6jB@oIN1|lh~!GvvtEQ7i{ELJ_Rqf3r#&1#N0iT*JRjIw4k-b<#Jg;DNx8g3kqT!EtI9u6NaPuaS#I-H3}H4v`##u#0f;p&`8wru0Vsm1FdD#^SCAAz^WK zoL|+FWiv%qT`##pNH-i3+Wj2nN`w>A4e#Fm8I%NljuLXu9#{uLf~3|NrH5fV5r;jX zFey`L`VB&G=q&^z8}?On{&@KX)H`|sI|g~m2i8JLgi$r~axOaKcUWQuzs-{(npd%G zgXeKOScoCBFQW?}?(`e^J-?@%VE?WGCxZE!W|i^+=QKxHu4rlo8BW;1lfT0T7URgV z&wgFS=YNL@9y#0#RKzZYi1EvRyKLQ(i;uUt8`|^R=I5;y@+Im_R1?+a>`rr*Es)wP zVD_GuF>fLqd3pH`+DLj0nflA%pF`>5UK!A=^aC`JRhYhj-CV9P$}FcVwdL7-FHY(0 zoDhLg9pI_q)nLQzzkX#TsmopkEleX#XcZKpH_hZ3uEE-M;czyYiYEo$0+`JS5sn;^ zz_vxEzG^{88|pgY86Vi!|h9_?UlcQln6zRc;+s=-TnHA)ZPDuyGr|w z!B)BvXyUXWGC{oavUtezSX}O!!f#g!1Rs3^1VuO$x%oT1Yl*LIBxnA8@YZl4G;e}I zY={#H(>{YOX<+3xW5yUP)e>dYMaEI|Z*PL02!$I~|DxOf{N{+kHE)3w1aTT;6&x`w zU*7Gq*n4cC?3UKLqpg*A3zpYH6nR8*GmMXoz4heqTO-bf<9+U*gEQAIdVSH-L*tuQ zF)PhumoI*1(d)}ULhbxxXIvebJ#a2;TgmX&7SGwWCe{(nn|xNTR&}e%>5{pf6CyAw zaKOSw51)hRZqN$R=mQ>#K-4Qqjn*VJaXsb(870qe*^jN z@i}3O9GjSf0uId{*o6@;86F}i3>!8efZG@LCnNF@`prMHbPlda5tuykV&Nj*ylf7c zx@8{%7Z?OZ1j>1N+UQr3dzRxTVlXX?ZswU4bEr9LLy%LF^X7C0g|u7B22} zOddJ+uV}`3%G|Iz(1EitZsBg=aa1inP8Qcjz1B#oi-Hwbuf*@g;9=GS|Ky>^Vd~F) z4YGZ~s=3opkNN=Zry{scTfK6i$`-wvq!;gc2Bb^oR?Y306oUmyzh5=)HTFZ2IWz0pzZZI+6K%_L`b=S*^xEwP`PF3glzkAZ{WsIrtPT zvdhVa<@{f_&AF-j^Z-p-7Tl)+Q?@E)!ZAlo8)(b@%{WPH2MrOJmfVHHc=@|q_-D35 z?vby2{2-NDJXR~iCACGS6%W{hBzD={TJq|-bL%EVD8d{#Wtg|MnGfum8~Q2_TmU+P zwP%ZVN)1`CtO`r5(Pp8QB;)5$H6Q|`iR~(6Z@$QF;y-*2<>Y)QQ^B-~T2eAiJ7P8G zlI}(>%@XyFxt*&QK*`I`-ErQ~>2l`|aDecK1MivteMnX8$(o5`#*W}Vy)i@XJ8y31 z_(CWiHW5NK@vgZ%S`0|z4z0|TX5}H5iY?>G`Pz5S?U)dO>1#9IyimVJWM#jkpIb^! zIe+fF$%MHTDeChspDh;cHJ|`>=i?7Agp$}#euan7W!pFM_nbfHgWF;9|CzS(@Pm(Z zk7(5)40-9l3Ih*ez}_A&XN71S;obpOC4mubfXZ8;*7z|H0!;&m$;Ji~n*c$AEk(6uT`! zh3B0`^4SZaAWw!RN2c%O$Yh30lQS=RN3GqtXztd36^wW7KDl6w8i;M#GZ)>MPhb(@ zlkgWyD8wK~$6VShmLu2gncKPUWJq%Pt2UsLOPzfj{al`3 zwtk6LQld{g0SU=z=EkRTwR*A4*n^#RCGCyX(-~Cygf94;1{R12N2VUz1;-=3+q|xs z!|fG2ktU-HJ9)+yPE|RzTTw`qn1;_t>Fh-E(|kP@uQQZ=2b zaUM@c8VMw8=FVtT&zmtS5sn<$24fHHAU5!N%N%Z7*4YDcICTX=buPg+gI+~an@mab zMS-L1>~m{ZFTjv}pMjc$$7K`$f*nNYT|)+LMhVHvZau-y%(xm!ow;Js(t56#=g)M5;OHZ{6-tbGrIR(xd{F3 zZXP#`J-+&{+AOa#VQu&L+mx4|F zYA=-mEF8^c7e=V4NBzhqQ|mfyCS@t0J)157b50CKErBO@^Y;WWG6_&0X*kqGv|7Mi{;Y=Tn3qcwB6VkeNw6;u^>f~*bU$6_#zV?(=v%;TH* zYeIB+aLv64M1*T@I~orfxNNv1kJ_3AnU)scg}8j!2jLar;F?*Fhs{qs1oO%VR;b_N z!g+4$EqgA-DGlmuvX##!(R^k|=-{OwB*F>JXNC@te_lEV|CnO-z;4W{Zg{Cs6f=dM zX2usx=w@<^dn9))7!BhKQDmF>PdoX!TmNtt8ee~YZW;N_2j}wA~2aMY!U83{3jE1^)Pod z|5}*4Y}eyybCqn<-frbI3a6ahm<0_Hm`Ki#4ZRKg(i~M}U_(DILY-ZibEgWvMw262pD^a-D7G(|b6-~hoV^Ax#TE<0Ah-vxbm-o{PUS)3Q8l6zaH9dCY^21ACSh86HBl?yl?~)Kx4H~AAwU~Nr zCYn@+3#M2wr6TDXR#yZ@lOQrQd^htyuTfdX^1A1jx7^Kmv}~X&jk*df!zRf@3mRe} zlrW}WpGyu0>g)KcTA)B>%r!4#j=Y?S$=sQOHds&;jqsga)WF!pV8T4}o8A1K4f=bW zb58tT&@cs6q?6_f`I4qusM#yfahWUddodWD9iDwJ|MM%Te!%Zfg#5ZSy`Y}6%QK#6 zp_T0zGUPKo%z_Av5>hBV|56V(e9FFko_$TlY^X6>t`LbaOwv^U(zy;}6oF~)jFCa}{B`hAOrHqub%ko#64S0) zqz0&TPD7sl_}n?;3!!9cMFO=KO^uDb{uA`)p?M)Q)YF=1vy*UHWuYJ&N)X%i5VD0( zqDiSn4%&yVr@QxRSRO%;5InS;Az|s{P*JPlQ(66Zs9AOmNGycXHyXq*JoBNoeEk}5 zu!TnHj%*H-&5dA$aw!s?smKio&A$EGxpO8&P$Jp&s|yhmgFjC#4ccQ!IER}}i!R5t z%*li|oV8_pBylz7PXr~J=k#Y&V`V-6)YWvOK}>0XAwkUZaVCmj2A+1e$SNQ&c9szm&lVH}T_&kG6UBhr-xWb&L*r*CvZW#67=(@Bt7tLhB6XJ?RZ9dNitMShkKsw`p?cT$yt<*h9%^j!%G8TWV=}% z2wBT&PjIH30y@USFayh0p?QgZLk^xYbV2>QhnJ91eHzc5<4h{*F{nfKLTOq>PP+|) zPh8x>^|}6qa##K9w^1pK6P`NX3MV|=i!~+ISM!uYMXh}zg0t*))FCbw++hyh-nPP0 zuUkR*%B;@FEW#tDb277rbI2p)FJH#@;$m|6Db+;1bO$y3mS@xjId5hH6GpR_0;c2J--Mg3Wl#Ebwg-z?^f^JjJ4tI_~+La8jE;4`5(tbD_ zoQMe9z^-NM=B|g9*6!_DwyMCkKy4pYJ5r+C-GK_QXW%OWw~de7vxLMt|Gw0ZoHHl* z2^kvCpSGMe<{L0}YLUjpt%h~R2}ng#)^30&9_$z7(g&7CPf;+(>6Ac^Il)iiRH3C# z6%Q>TrOpFO>$U*JCJl(pG;-0y*qMa+G@G)MdzHI}N%n!IEt^k7CrA4hmrbx2e`Be4 zZ|Aa0MbMz*kQ9dt!XRs9Db!__+EuFL;8RcvQV%W-Y&qdiNaJ_6t)TThv@|rL4Q2ry z34EOh%){0ypk@FBWQ6+~t>@B*mIk++@E2skah2fiL1@QzN|rkosHv+k9%ZdQk2IKr zov4POn$ZKp9eTa&io;iYw>0iUxHNb6v!@dBALm_)9f zj15DjJ0B*k6H@`)^Bdp@z588Qh|Sa&P1{%Ky`|^ruD^Efm6+>$KX*Rga)~HlR|-be zqRgOkFd3P1(v_Vtxm@t?e+t*XcYZ)`ZL4X-*$o5Z#;Rg_{gTJ23IQ{59u)~@Vnw2w zR4_8+3stBJMo$o4ceJ7(Jpp@)m`3h>`p+%@h>^PVNtkGNyyv_<<4ol;ypvCtr)*KZ zB?7cXT8-;b^hZP^3lS((NMX9I{_l@M7SmTl>botRB9j3wKJAZBXVpoWQLd5+_3ZyX zZjq}=q;RXL!>|O^M6b(*Io_^v1&tYp4G{Q3J=Ld|HfmC0=ujsfZQKxM|1jm&od5Kp@ zv!P1Sma5KWiQ*ZEU~w^?uf70yw`Z2%`wx2_jWzmoE7oZ1@%FrG+x8 ztbEpLOp{L>h1?Sr!^PlxEq{k?^>>ca8OB0U_iRCXHd%_balTY5_{}pZW=4@B=lmSz z)^9zxG&Crpk$dmiyYGQtFJ0Q2U+SDK%x^`hDkq`BSiO4LtS2Q^(JD^eC@!Yie=n%t z@^jh+s6f;wTTp@Wx#?M!$tROpHGGT|ypnw2r%R^}ii*kJJ8o^M(A((D>X%MN&H+BbMJR?HgEKN-_nL>&UImo&fj0y?*g)QeWAUZGLW+Brk5Vsg3lDaUk_9C#T#CoU$(p7Y{t90`xq zZ+V%jgqDRx>Z>hGZm}5E<``8Xm6PUXJr0$ET=o*xJw(NX*>oPPtBaRxu0Q<}onP$2 zc~l~BNj4XsNO2B!Dyp?M5Scm zCV=W9!TOf^E3adccTgW|VUHkACuQZPD>?whSi^>5?D|(|7gm=dc;vK}R=u^Je}(RS zT*Rq&wIDsDinw0SdvzKBCIfp`o+O`YU<$>>+d$G4v4+_o@+JU_{}Vv zoy$bbNbYTwvBdlaIwC422e15B+;m@h5m7a7ESV%5dp_IsP{%6+2si69O4j#=2{hY3 zQCEV+Ui41@5$8M=1jQBdrBF1JnlW2cEq#N$`sby=fz>3KuAagm=Ab0--LlYMxT0nhnefL|!s1`d{X4eo8AZxbFk#?ukHebvXA%FiP zz84oGEy)w-)u;c|{+=e15mqNU2W%fERsf`hCFiZVS#stv%!;U(gkE}p9#{V{Qa^Nz z))8JPTBOdW!i4e~tJA_o5sIwH#>VxqIemDjv42ohOl?kWq4Zxv zjn=WUNORx_b?B3sa+2{ztk{R69u$-Pg>5M92daVZT@U!)$Vf?AX* zMlvONxMaxB#B2&zoH&N@@#<1?EGT3b+E)MGaHF-~7OAhPu-}};IZv1=)uQR5*QUxC z8S=NS7=x&ogsz%x=`bVp)ClT;QDc$%XbNNSNVA>{60NAGOEbDio*}nxM-`${a`aJc z>%Dtxee;e6_zDB*U+G4ok_|dpW!%SxlyZX(TEh=V8*o<_6$`4%h1=R)pw6m77ZjC( zZHB@!#8{_l%A_K5JJAJEDg4xT@2mfKXCnm`GuL<(5AbtVX7kPGl#u`RYWzUDNPs=#hvV@t?6U+#@iz|j( z7gW+2ZOQML$Y@44W9Q88hBA!rN;t0t$O*AO!PXwGj?7tlrO7Ae#z4m9ixg&H+>x{x*}2d}$Ufss zmICc1315h*6w%1RVVphG;6{#I*buTNH7;tj{HYhWqeemMvD02Y%S6N{G%w6{lM%}p$>t+*1WrB-~e#?XOVgP_O9=&dAH*iROk8a?kl|u zi!>pOpz~N~CZ@9%SG*LPitzdwq~pD;F}f3p1&$MytA7Jnm7Q(f=QHX?P_l708&cJL za9;J;a$Hcukhe7Gq^Oh}ehw=%ws;ywD_jldl6E{F&gG}2 zlOdaXRuv;JXmL)6i>YQ{t6!mOK$$2@XUYjap~;tH>2g7aypNCR@rk&YNS^$twQevp z5W1evbLCksJ_{fWT=sw!N4`GM*tbz!O#5rCpJQyeB}3!L5y0_`Hz(8Q1Cuq}oj-3v zE8=1rr)8^;nrX+z3&AqW&t$FB-rAf_#)T;F43mGe(2cR0Mi%}`LmTe`558dm^9+SO zl_D&qQ*r%F#b>bElft)G*zm20MhdYnK|To}_nYgF*cxAvj3TQc%rr)hnrdwDBeJoc z3S0~;ubk0cT9gS_| z)2;@*u1@%ix}^Ix7?Lh>H-<;pfE12~6}uKGYSQ`)pp{brHkczn`g~*b6si0;ixm8< zPViHVuxrKG7;LO1=Xo2*`&@%-6s%InX)Oh$GAT&H-o5LVI}?P>(ym3O^BSfGAm%}LFpbnO zNND*q4z0tJRfm8rQwA|_fEx#BpU+sPHBxWZ z6H(t=&YtV9X!HzyfL^>k$oO}6&vV_~ol*%2?fq+zAXCHZG|F_5`fUow18^!6Ue1x4 z3%h2gr{i;S@^%~>M_i1kmPgO8XA|_mhblwU%(UGt{ZfmL%NG+4x7!&V50X=2kSyla zrMOf5cl3tYvb%!S4$XC~o|he}}fT3t*%@F2+_+*#k6ffR-*aFM!g z3QCzh?+WtLS@&Ed?@4-9s#Z7l$QWM19G56)T=cV+QcH7??yNr+p~n+u_iWTDbW2k< zOxUy1Vxa1ua8DHFtvXNQ;0w$jU+3zd0gRrfk!44>*Dp#@)yTE5NHf(47SwzJ$mgum zAFz~V-im%EDood>Lye(95seh?IIy2w9J^+F{k2g0>I1LecHcr)v#r9hQxidRKsinVBK3&~XxcfVg&nvU|US64GF+E{sgR0Dg+?mZM@yt6} z0!xXD2}6!vRDYs`Nuvt85*-s3A`qUoN4R8=wJWCq5~yU!hYMIsQ8CaQK6!EdPlZOy zlWdW?>gR`4mLOrZm)mm!ZB)Z&X8L(QQ$p6Km#k3hO7q842{zUMWup! z9yICEdag{XfI|6R`k2z3LXmNos^ji*Iq&pm$Z4|}hp3bc{p}rSlATY(=rD^3r8+%L z9V6)UEMLjaFs4F0=}iYSnF#q(4Y%CYrKIun)tFAtRwh53PSt^6L7->p$7KuA^gpp@Ur??8>g!bX~drto6fv@ASRY_aA-t z^&RTFvNP6~>HJXNWZ(H6U+tUU-__qY*yUdL*L6$lo?LhDx*Ix7>lW6f);R}1L6P>? z_4WR-Q{F<_zpMB2y&vq2_F5#jc7DB=@7>kgE&0jXH`YG8_PapaKe)EKHoVr{acv84 zzq9N7p4WPQ+HtJsTRpe+Ts^26EcDFwe4s}+80@t5j8WwM&c`VB{z=^rbl=?l@$Ttv zU-v~_r?#;7|JwO{SF`J>uKT(Ub&$iouZ$dY^bSZaljvza0(W_^)ajw>pPyWD&4%uI zi#LkgwT6N>RCQ&NQFv9~-9j$3*qjp@J{qXHQj_Wk&#TPO3FSUnJj0~&jKv8z%2YIK zKHUDje^$c;rP+*SJTN1*$jt(@vBl1Xr;r#aV$}fq-j(Le9~FL|;FTe^IJQ2nHdV0%cAnO8*w0O9UEobt|^T+X)lC4FAHOER84VyGEns7 zvhH+L&3Jy(o{U%|#rdQa|6Ex=Blqzh0Z-fFO}K%^ZJIYo6ERal&bdz!ejjn?sw@)@ zOFiSvlrk8b6yQfKF(ngcjP_t;l9$Ky<*e&}gx{MrZVej_nzX8kwBA3%x&&Nwi;Eu* zz>7GivYMu2lT)l~ukicmbYzB^vN0Zq1(>j&d4*Ge2(|<)mTAtX^XRKS)(ebd=dXkh zToWcUqbRU5x{AYY=R?kK3iD%E#m21xDNuz=+G>$^-YWdu4%A&fT}v8^v0%E$ChRv0 z<#Btp%w{IEY_?q0O2^Z>yIa-FTjK2Gl-n0H#^F3`_sYkF3&cNS!E zu5Y*nkZp-Md0$E6u&C`b^4aQUjnJ7GTPz#AxvIflE1RqQhydztiPrLd#;Yh~vT1eL z7fkj3y*&vta%5==&nT4hT6?~vSM45c6LPKzZYCE^hpV|sX*?;}(=N{jl&odelc;(p zw19vcn{St=pyazF`IITGE*0YPlSA!tJ6~kORZlfH!7yc~j5$;2XH=z$S^UmW6ilAu zLZ^LEfDX1qWp=CzTV|$x+`|V;|%s%aR#Q2!qU7Sg(GeRvvlgGtHrzh+-Zr-Kk63hWcAOva#j*+>& z9)C)e0lL-3yV~V|MdS0aXlW_~_hOH757#dD6@zSua~MNxEm)k6>|2%u%AkVDdGqCI zcG{?%l8v@ES3ssIuzHk(?TZo+c_SQ~DGH&tn`7}S9k}4ckE2j=BHVfVHO{wxc5~#}aHF=~`P#$<*sKu9^ z^YCuA;K*0~v21ATZS7)bS~joN$i|KKa<(!l-+gwwTsMW-8q3tAx8mb%D(=R1?OKhW zO$OkIZ#U?}3Dw@G+dr32D$M>=GVU?y#yQo=7qoxQ=e>+YU5I*QY$QDqzd*oGws>>t zgu~>_PR0vTm1904xkdQBH|ONo%8V>!S7qgMQFgEe?K^JqIx`$sHJLRblQy8#C(gLO z{d*;nSZY%~nLVwISnTrA38CCG=YSJmhMn{Jr5dL-qDO)Vq$jX=q7h)mPGG&K3JPhF z+tr%1c@O|V#>SY0*#&6w*|2i3&9okkF~UvcU3uy3gmy+7lJ6EIfJZZ-ahK9wRXjgl z^>w!8n!7q_W=g?y)v0!73w(6VABAS!d9RM;!it2!?=h(I;l97L%hSNy%;@Lck$^$w z)D&aeox*g&-^Sv#6ru)oWy&b$I|a~ki(Bf^BC|!Ir8P3fABj)nyenpd((efMy8@h&SIoJ>8QH8gnBwF@8WBMHDuM;Q z9j>ifx7i}s3kdlZ7g9p-8F)3aYI%Zps9q7~(m6jDsU>yX3=-gEH2G5=720&FpduJE zWf0TZKjlG=fXkYy+@?-@gysxBC*(J zT=P!3#v6{~G!CnyXL;Jc_hn5?aXdMt<-#m%#Jd9Ra%FIiQ%}U*DxW)H_hmNyR4BK) z2aH5a=tv5lHMTH zVlGJK3}0cR)reB<$!6E`?ea`i&*YMsC@(9{ArqY9#{zV_#hkLnkxFwaQHoLzkfh>w z?GOA)4_nKIk||lrkzr-hwq!8dWen$;^ja&4v?o%H?ESg$ds7(~DMNld9+$CFOGVxh zYnM;W6nV4VWG-29){r!`vVI?5>j@9)({_`tSRKO zrFOX@Wn|59MTCoar^>F_mNi1Tan|5vwX$3xI#rnB4Ju7r1vgG1p8%2%)lxv9DykCw z0w%r1Xe)Y{k}=?vr-HmuJ1OrvB+RH$kHVXrumjg|CCLi5Ye}DOcFDRW@Eo_}knXN~(>9vfSh?X6+t3>(>i? z3l`GWX{pnNSqaIf6FvbJ-{MC09bOSg&dP#`@fma4C*%{bm;uYl8k2=S*Q_?(KUmAYm_(%j$9VAE`m0w{^V<0k(>u z{kxx~lS&``&&41Fn0Um^0QAg_6>?k$q`9$ANBg)UZ40R`q6&Q z+qkCdyB)8?!Gx7;>@xv-FGug&e{H##(2y_TxusCG&gfZ+8PgLnpAO(H{Qd>z$L z(8MnuL{Aavxu{u*^fXuk(o8LYObC&w@pM3_W#hFljIO4@Fbe$Pwv+NmJ%25ox8TC! z#7c<2*5`HFm>lc_{*1olor;sAcYzrnxgJa;q5;qwO!VV}Q#Dlim_%Vyshq zVSGGaDCx8G+tFPr+3^ohq8|ZQc}h<9kYr!|A75y|w>(jm0-0VLQ&uvXuu?A#k;Ec6 zNL<`T-dm*4K&9EN+Kk{5TTGsr)Eg{uV!sieh>OXwWDh`(U;QoIPzG;ozzyY#ja|Sp zUZml3f*VSvg7C3$#j7igb54sqN)$I?MMb4T+}Ag6YM3RmZEHen2Co=+WMI#RkMu9~ zU%dVn@$5awG|tDh@DGg^YyW zDeWRBJ)Q13S$aUmD|n<3S14F!`5(DZHWf)t&z8_oaHXM0EEeJzJ~Sp*s+chzwt%q^ zRHU&;T*)ej{5d*);ZFgl@~ho4?G9!`G3iSxB5PJX!}tO%)MDt1i4^YJlWCS}Kz zoHRBTR`7B-R)nK+tk-+(a7w9+>@|(;B=4^w?@B{VL>gnls?ZqBRXiGsN5+)#czjG1 ziOE?m66Ry_=y456!7IWFy}yP$D-Gc~7mbA!$}voiY>bab;$zB?G%^NWi*s=n9-wm7 zN<;hs1rN*r;X4Q4?}*$h4RJD6EEZNO#*{H7i-wf)u@DzWlN?_6B2or#9LG1rOL+x3 z_~nz{Z$p!nUHdfXTjzw>^hLNar5wB+3d=aDYI#h&iaWr_ROGPl|HqhYD+{HP zE0wYcc99~^V9zpP#aI}b?8mrJC?bzQ+$vSl_Lz8;^neooM#$XY&i6TeJ3eY92VVKF zeVDAvBT-dY77lS^Du_{VHd;|hdD&PT*VPac4aLGdyWEsgaX=v_*j?{`_AD!7LXdeV z7M07#q_P;856d>D!qekeR1uLYl&Y8_#`7x;$q(?zZ_wII?{iE$KWc6-6n}Y$lVYa8 zcM5Pk_ATUIIK=W}FQe>tNFF%d4V9OID>pVE`eKuuiH^p5Z3rXWr1*;m9Vok>Q zPz2(S=adk!z$0fu^bB6!xU?xw&I=52x`Jb6s`vDTRf~4~I+3AI{%OBl!Cf9!!q|=D zbWDXrdXRfeXiOOeQ?M$YiSS6I%!TDE`~dOF%lWq4d!H@oRt6%#QdPXT^a^=d-RdNTAfEnO>IGf)8ppHEJv;8s*N(QIDm?|6{i$q%Ix{@DL z@yZxoxF{QnLo36KE;BiIfRh4j^v;vO6Yq0O<11r|DCh*r6=NLV5)qKFVOX=qV7S6m zhPd#15|&r82UM(_YaQ(S-d9r(+|od-qDVy-)c37q{_e)$#&Hp`rN6gf;g*~a;`#fw z#-&4AGc+gOH09CwlvPdM&XJ>k#g*jA+u&FzrqvH${P_J6a`^Vf2S&6=I2Pp=t00e-`B8 zO;)&IxS&NwMfqGFH&e=(7kwX$DW;Jlm);8}_8TABUO)VO>goV*3G2$GTMbP*t_s&m zau<>f$I{f9Zj|I7Z43;oCJ}Z04=o3q9rYhRO8rMJSy%*)#K*c@u0-P9(B3Iq9zVfO zA5#Vhifnpwd&QASvr_4Z+_DEZVBC`5^O+kL{SJ{3Uq=i<{>*dQ;B&s8 zG%gthVj~mqQ3(Modb$^dT1 zkt3r`>cV-P6XJ<~T0f{f7fy&9&up$EJD+RxjkJK{;S1_Ba&~tTz88qgX3<4dII@pb z9giqrJMnMp3(tKS9;WDM583!UM0|inT?S(n4xs=jRoARO9Sh&a_V&_0-`KR}gg+r6 z&%BvD`20VW@Ix;&$S&W5qu?zC_;t&;h$ol%^%pNRHl3JXKll26P5p|SZUF$@H(qR5 z=KFfCT=QYcNs_^h>)G|2`~K1~*!RozQ+*Hh-PpaO@57Q~eOGku>Q?n>BtPxHxcfi* zPVMVi_j^fo;Afpj*FDuS)?-+A*TALgKD(~4ZnEdQ>tyRjdjB?1>pXAZf!<&Dey8WK z=oH63pSN-WYqBsU!tsL?FEmwDSffDdfxK-sFr|5;aVoJcxu>I%*Ot9)c~r&(W|ve1GPjI9@a9uR-f6b7pT}E1~?_VjTO5)!U8Rpr^y$# z{8pes{m^C@U@PzxFLEBf%K)~t;qf{DhQ zaPNjhN_#T^BH%avK%gc8Vu`(9Gs-Yq*`QWe1)dH&v|peGsT;G=O(;&B<(?YEiKlsZ2v{l^_r?QAf^(`P}&&rOqRd1OOBgNPGc*Zmlk0L z7GO3mwW|gML_&&u8Y!%CI_PtyFnV^RL!d?&Nac!EtHF03{1SQ)LXihHwyAJ*_JBtK z)1dW~0oKbv&`3A@xlOHD4S{(UjV37=ZqN;FrCqU)zlZ`gBAB6=7GTWs z&h{z-U?J^7juAld)+nS!1U}!<-00zU)exDPvJH%l)EhYf>`HAoI)>VvPNw0HPZ2^P zqviu}&IfnaoYi$d6+TX4q+alRfW^7f=3#Gopv~0@nbkm9NDYoQ)&SlK6iqAJ*QNs6 zA`Q;bCZq@fkXmzks`=LXPifbT6D+|1rbTs7dfPdSKA~0tOp>Q=npY3^+uz z^kBkn%7Lk|DTnUc)j3ahIW|aIhYgm%fk#uzz||d!^w6U4v9k=oQoM-b|8!hFy2crP z+dr1Og)Sk$01zBLIwtTvkVHpzw5iFU)&|AZgDx4XaH7Ye=rjGgWolsF=gQcy&H*=g zHjO{1WXL9v6YzHN=I{Yl9xOz=rj3+0nFMN(N(K&jaI&^^1Wtc}sui05mQI1{0-xg- zXxIk1Ve>(Fp_R=?1u9esw<&3>>EKjT!%6K6aCY2vwk^xGvfT~IWzgYcJ(L2Zfk{VG zyUoJK9zNjH0p%Lw(duNFF%C`CHcJI+5)wj(>gg_`+n7SA7;7U>kv#`4J{h|Wcqy#2 zMo~h7Ia)&$1JkFr9T2|uBEUeCw1EX61Tqj*Qozubx1AwSGicd`-a0v}JB!VNjhqYA zx$!dFTRxN*OCUkHt}Av2b5=pQjvR#A#vVdai1dp?sh^T4gPnLKF#33|DGRd!ZswQ39A>cqhBPIDd5L zxV73F5x$MkjbFtPfG%ZmB-pZ$-RVBLK*ep-t;c+Nq&Nm@;KO8a-e4`SJ*`c~Sacku zC^m6G3T*KV^8LtqUCUGmMJzvb8pv5H^00rh5^bAGMPvoi3fX)iQCli%K(@})rY0d8 zkm!fbG9(a77s6TTRkn8w;RQCu*{V-=z9D=Z;BdxZFS-!(gRm1U1SD&v zv)QInu~o%*aI`^AVSE%feEnMjmCleALIdfGa^N%6Y=;o(dVZN|pEr1+NE$gDPbon6 zATN_Q-E&i$j2+{|F+f>|0?$A~V6E5uTbl}jm_;-U1R8z?jN}wVd$lLJv-1K8mIf%! zIxGfc5>(Y`8j1*xR~)?b0PO_#v_v)bnG5$5O{Ud7be`%2T|EL7b)~U;Sq}ty z0`W@fGLG1)WSN?shZL?^ad6tvFKB1jT~=Pw=DgOqj~feiVLF3}ghGbs8+dqM4$p<3EcqG&C|a?*|Y-aO2_Pa zbg)H7zJMUO8A1d>TiESr6|ytexw*w$K3&bmIQsd+%sd0WAfQX7Hk0 zNgNd}{7Ro*^KOgk&O+9})aIsBsm3p9T80SM(>^ojTcL^2Yn%u}gF5NMS(fwg8_sTj z45a{Ff^-J&fkz4!h~q8^t9zTR1z&v+S3tXnzeLixH7wDg_@DFfhybpVI^y;Vz>2-gj*33D5muWoulAV+YbB6yO*d$~1GA=Tv|#LFgVWOSF~NUTL< zL9HG(z#z3sAnAlvx~Y9+Vl3JKhJhGIpvfcc2IPo7yXlJ7w-7qm|2Ug)DRU>FxCF6m z(cJd^lnVXBma-ba(e7j#2NM(|YLnGfhub?fP=?xx>T&#oKd|3$im0n20?)gXh)%=) zgY|{pZ!l_T|3=wvex+d;EYT?RdK@nXbR4^5NBcC+;HXT@W0xlJ6EyCF^s9MuyXM*- zSA#wsm=RY{j1)FD>{d^C;AVlU$0~YoeS+?bI}XGPlm(}3*Oe_Q&LyZ*IT(5AHxR~I zT&%q5ood162_%Wr``vIXyQk-cp6<1sasf)hF4?iL7=TSq2+l8fIgMqyP>P19bqc$g zG@gK=vhn-I=7H4|vher6wBXxE>*_yHGbJL%{VTQD^C_fxkWCt=%o*__z6|%Y z7NVfe8fdO86Lzzt6)VQOn3 z`;^7*pPu9uQwCXCsOGXa(3jN|45_vuXwG= z`L_nfC88nvIdca2@zpPFs~>BiM{QrT%PBUAukR{E;Qp$+3lX@NQ!BbbvI|K87DFq{ zAah4Gh1s$ymM_Y%qXm}w+`9lF5K}_eZGz4Es>imGKfc?BkJ$KkfIVRR@4?5W3YKDy zt!n%+-)uBem{bwxKy%AUQYFJ47sfp<`WcZtJPEhKH=o~5j{JQY_u(HD_W>4viYF^r z{0(up4}QMM8Iwwz&K5LyoS__({1YZcL?ibq?%ZF$=TB|K910^V)Dd?~nj);vREi|0 zq)rW7+UNpZdknVq|3$j@+mBsP|I;z*5Q!Iq51{FN`jbVb;R2J4ia<)t|! z-)anP6w?56`;!an#kW?VB_!w3P~A}9!QMxD-stY_JXvxc!Y zTRpmIe<(#Rku>)Yib^RY6y5_Q%?Sy0r%Phq1a~@hc6{6ykBpan=AzS?PLc6Wd@U-a zUr*GJbT$K$jWeo@l4CsOaw;izmF*#NW;Z?%l?twZU+Zqd^)FtSG*%fVY2&qXC7lE5 z&xh9H3sJF<`TWP1KD(p-v9(Q$WMhugSH~@Ssl3MfD@i6zzuH3H>TM2fSVbbvJEwt^ z4@`#o#p{|80J`#et&8KM+4OX+kPZPpz4hgjea)ebVj6(OeEaJg*EhWs*LN{O7p(P6 zlE#~pnJqe$NjrR8H74MCV)KzN^f!kFMKsd*)W=$AB-`q5_BSt*?1tNC7!?ViCe>`r zkz*1jzl)a!OTas$73~`o6%z!GQKw+Qaebe>9=`)oYg z;cW{LlkK-H(Q8Wk)rFLY&_xlg_0l4^fj&Fb#QWAvIFU*-GuoUq%%-%)WQM-3>>Csn z!&)ETPj0#I7dz??3^#=*y6KfOXFO)eYvakVMmAT#5zW&lk1Z#0Km=7B_eL?k`e$%S z-gG8;B=WV9dU&KMydO?svIJ>Roii~q)>g19OjD)FiFBOSIZDpi0yY=ZkluI~u&!g* z?5KZc3p%$O*m4y2QgHlrc|GPd?@h<13NzJ;M<1iF9s4$li^;LAPh3=&ZEM1-HEo=+ z>-cHLm@Oefx~7Et4+gYH&chSx_yLK2M~;TffX}<*2z+(#_|HE0t#Zw7vU_K9*DmxZ zhs4?4EspZD6Vn;Ssr4r~i_H$m_SSpW)XwJ6z-p3!+y2P6qdV%)>}&${EvZgvw48j# zk+Ve&MMEt~6uX;OBMvxKb{^saj8F$jmKv$H|r#cdn67Fh3)CmGjlTHn5{C#I5P^2?Vyg~zNRV7KUCEb>%ohHZL@wc%oq zCyf+2lx%JzSDfDL2Y}0oenJX~9qos}(-k3_?CQajG20O=^)Rk8xbVOxh#M>{%1~0R zusY~u;0jU0)!YrU7%mo8TuB3NHMw}WIZ6y? zHwW;@c7k6374k|mx&Q3uKXaoP7;BQ9-Uora)P7`J&4A0i`HQg=^JY7-)P3hPCpTTP zX5b8{M*rG-SI;lIJ3G&jTta148-k&V?I`GSd{7ftQzueBql$zkeF@6_!z9EthX+M8 zU{w4A8tT>XqCdhlH8dCVVg*7+&^aP9mEBt{OTz*6q>_)*sn|^Z{ajQdrW_ruG+82{(3GZPid)R#3UdF_C-*BZ#DO9rkw&N+ z!uRJt+gAVXg{bGGE1}gDF(yHd>!-q#i0)OWGJa2b0x_9FO`lxN=E_1!w#eE1zZK!sMT)YYq>r zCIQX@z#d47u)Thxt_gV8N-10LGqI>jn^YhGI2s{GC*ZE2b+(eH@*4$7Dx zd}@0=Z=h_2xua0C!llRWRwQzKm@#Vkkh3T($6^D z8O`{NFU%WBXb2l5F%D)Dkpvt{z#8tTKQZ2BrVp+#6YKL=s$AH^8A8c%nXf&&513Go zh(si*$1es9S9_!V%Su-`byh29%vo(}TA8+l5%SU6^B=Hbqlszc@ReV?u>Pg!E!1+g1wB!%rct2$)>VCL{SOw@)V{r)x2EsX-cR-1 z-?h{^Bsq`fhZ3~sldg0w99oNpgzXauv2#+UU^96vc4x$_R0<8%{b)!;BYXd2yp;@K zdwp8~;|9dap&m?~0I?F&m84Ms2$X_spz4b#gnEAGZEhM^O(OTE5puSXM1ec(!zSA4 zSUA+ZGJWxwGgIa*F;4B#IA+V_kumJWArB@`L@|-W9+_ z^r_SOh_$7`43mo|o0|qjG~5?}vUkZt+v_(^QYFv6aOgekT(vps)^HQr1aJf@PBXB+ zT6~dnVxmPfa_}}l4*vMvXAlGDq!mRL4p9JI0l?1Ynbk6U&ZSn27rE55Crj*?LN5{* zQ*3in{YRHl9Zwyd&P?;Fh*{?ea8bS>BZ|xLiMW_%^PQ;Qe_3-9!DVi+4AVQ`b7$92 zI^L1&qs+4b!U)Vm;cErvVVJZ}&(BtB&Tu%8P@BnrN1I!TG}7ESC?WwFJ%Y`D-8H-F z2O~|u3{m`AL25c`Rda$HNAQo_gWz^-m}60_c_0L-DW+l0UR2k=6{4%;S~xVgQi)%0 z2QrE=JZCO*rlV^<2yl9ZRCGRu@D&5k?66D5Y&vX~Z8DMcYP)t|{y zt=l&xi)VSc+iZwM^C33H62%l+6&GK7@OE&@RMWgHZdyRLG_LhNoL+sM$`v46+rl9V zWGe`IJp=0tHxZxB=yH)+bFnoQ*p*jf6NqS}aF2UgtX&O`p}P|PQSDtB)K1G{eBO|m zEh|iUC^U4fhRMjs>7l)vCZrmIX0;6=u2gKHM=(9rtu~U$_cJyQdyYrETbrfgbIHD2~;4Wk$Y#|xK~D= z-cdJw5-0M;albTYa;MGJ>eRF=8_Ecue*056%U6>~qo0B&-}f49K%Z{5P~Q$wz*>R7 zf^&EshQ(~U8j;RSS79)tQ=z^J)vP9w!uRh7`=9;I?Z^y8X98?W0c(Y7O0`@$%_AkG zWv(~{@K0eg->`rg6_Lo{JvfK~7`LPT_5$P+ozYDzGdeM4jnw#9-0huH>p7!B*v?mc z7WIfoaI{sQPHs8nm96!MKMNBL#r&hF*;K9m6;QL8RhWN}rhCy@VcEQHl^L(n(n)nT z7)^(!+Ux(lMXJt*iS(26nNd69FL{g34JNcq~_eI zVC#xDOu{$e;1JP(&W#jLjys;*K_0uQ`S$gO9s5b+=H^Me0d#n1_sYy#SZ9IboLokm zu>r&xHWk{#H@<*{UQHsBR}hj56x{7~`weY5N5OstmX#X|1`}t=1;_m=ufc&l6s>x6 z*I}e0S}P9)vdrDPvwp{QROmurQlwv@BH$?HEUe9M%|^>HOC=r=D%wU+k%&eLx7VRX zKJV-%7pwlfwO%8%TNvGrmHA57G;=c6=R^q6q;b7 ziWJyaU}BGd2CmqCwM!l2rrlHWgwUm%4x$n<4FSGL&Lve{v;Bc4i zJ+F3mbncQU=+So)j=s>sp);@+f&sB4)y{f6?2Kxb%gLR&C~+NzU=@|pc-)Elj}OB( zvFnP3Llh6U+)5(pE0l6&ZOEVxWYu{UGEAL&8|+Y`QsL|RZ7@F$m1K68o|DRESgWR% z3oDdl@9i+`h>P*b?biBjw^IXTIu-*;jKip|rYtxdkuI~f%scPE>WFAGM<)31<3~s9 zAH1Upa9Ei&=AGd+HJLdbkhvYzHt)Xi6?`kAAyB<<1sry3-En8rD%ohMg)1T65X z70xp^O_=MTk01FeR^fkOD6%HL2Opnt3 z^Ljts^I%t_v!AZ{DAwG!aEL--3h5b*WnO774z{oOWtrxj5|sOronxkFz??-cRKK20@Wag-!RraQ=i*IG%2HktZH( z!ku?D5a6|q8z7GY)-&)X`#=W;pAT$G_Ly zH}X%Y^@G3t%V#9ybB{GQjlu^JF$C~Fc2h?i*b8A$gI6X?9(s&g<4!~+2S1S*X~PwN z><7)^5g)|?hU*V?6lQ6}KmguFPAQ$y{lh095(&37ii379Ph^k(Q#0IWA8+0^BwmX4 zGWni3!7|lDPe1Z43E`e<21enQiD!5CLgoStT#WHn9)UYkq#~^HH=k+_ZaLvk$Wm>P zA&%dlI)F#QFFO8tT+*$h)F=v1N%%#*HdUuBrm1AukS6Be;8YS7lY1jksBcG( z0G{MG5GC}D^w4|QwY9m5Tg@9C(ZFmjH69vQ33I#jODJ$68m!$Az_;A~^3M9jziJ|f z7lp7DB$7N6uuZTtA#W|B%c^x2I_9lp{V!07h(sD!n_wh7BHK|<{{odz9pg9<+I&Tp z=0mljG%(4`i_3GH#eeeu_FoG;-wNrLdaaas6oh$WI|2hYIGhPs10Zwb?*a#{*|*<*&oB>x~@STYuWz+17)u5Hgccf0F0% z`pQYJ0Ly*H*izcm7?hyo79Bq6G!rv;JZ2{E))+(N=FR=l}Kbn73TW*AKJ$U zMJf`w7Reo~Qf}6+W{`H1Hv*{$bqtg18dx3?O@J$c^=^Cp%?33nzlT+n@bK`ESGe>= zSvgs7PvS|P)^fqim|hW$Nbb}euZ({2WmL8OJ-DJ;!Z0I6Vm?4wmh4`2f-E$^yP20D zoBkK6v0dJV3wrV;+Mx?pxGrcl>y%7MT~tZsd8vJQSVOO1SR$G*tRKI7WJkU93U(wt zUMX^sFhBZ`8ZX@%cg>%lvH2_77?NsXSBr|t!Iw5e88ZBCNB#BJ=^SGVoVU^$g`yNf zQVwa^Hf?r0Vkw^7_A1s%R801MK8LM%%5^*7YD4RQf_^UQ5Y`%5n~>{99koqNYAkc+ zDUMj)z!51f#y$BP=heUS2JXq5E?(33f!?cozS;G=&SA;L%SOo4p;)121K3yCpaz#A zUD3`4le`jH|CB8z!VUIMm?;s79PIqtMfKbML`_H(??~vGuV|k2b1JLZk&YKjdbL7W z`-5+z0uhabUcLoa>Dyl4UjO6URF6VObSoXnF>Zzl`~AvnNuQq6w>q+gy!sdLkcf1g z^>N~@_FYE1(xI?>5}_+@;9>aE&ME(7i>0@a(Klfk6Vb@Md-~5L`QhJ<)GKe&yS-)M z(0eKG_3DThuU)YD+xVJH1rMj+LuTZU!5v@~3E=iW+TVIff94n#j*d#RGAh}GQm^E4 zaEA};i&;lSsN~_lVpJlMART`E?ql2QyZ%N;1r zzJYt!+$5P?Gq`!+21#b%Uk5S+lLO}uoI23o2Ic zzCQ5s`kU8(eEsx#|N4v9pT2&m?{9sLz9;+c?Yp6Gp)cL%>N~gZUcKx#Jk*+(t4t7<$LI{0hy0&#mI{(o5lg@`aZ|(e4XQ}g& z&hgH(IyZN`+wpS84?FJfxT)jg9n&5D4t2*F9Yd10B~8gwlKUiwBv%gpo`P-<-ZJ>f z!Qx$UuNxkQA6 zh)Cqx3-a2q8_$e_a1pLAHq`t3?q{D&m}748$sgJ4dDhv_-fOSD_S$QG*Zjfb!**LN zPy&dL%V160eaz;kXm7$gnV(evs?eCh-7K5F_BQ%>sO$9eEo&etk7cAmW|ki|=i9cV zF>3HOJ*afeUeu*rLOExft!XXAaxIr(b%|pXC$So`&pR`Gl+nrL!JIT{&tCn}As<_< z+u#Czt;H9s1hNJS7KmD)$|#5EJbjYau{|lH{?71mizV(hLfx~KK)c0XNO2*n!FH&? z#qyy%--$+nWv+jjb|={8gIuwh>1e$3e4`zX89zKE__RLGR`%7nW~ru+X0Lpl@(+4> zOWEZu1WLGjRWX*<@NuQf%k{#UmYg$dDxLgJ$FN-r?`E~CwrHeDXFbgxxr??3dI;Wk z^>WsFBioI1vqwL_ZJxl5Rs(InlTk4SCu&%`16(vUe7>B}GR>mKnJBm_rBF;QAGYTV zNyZben58z(k}mN&iZ@yfWV>!A(%>BygI-y&Cbou$&u3#Awx@x$TTDy6ox(NG58Gqh zyp}aYk}`|mY|!?i7e6{AL=0VC<0zLf~C34p`)QTkhgN4ciU% z2Aj;b8=nKd0liGJZB{ANI$e&y~24BaArvd1uSeDeyZfAAcrPXH6PwSY0u8 zHECuS1um`n1C2V9Q`>SDww4Tc*%=BhUiBM`EktB=%}mf`uejrepAY%yyH!@JlgH$& zv992hJ1!Zv%R@;nRO&g4mW;Nb%S?_@yyvQ4ZcDRXMqv-w9o>RWwf`i2!B;MK`F29b zn$iqeu-6PF$QK9}7*A81&*-B?Ks9c8J^f&xFVM7xgRY)DFHbh(7gD6tsyC(0FrGFb zX**G6-JidZLTgsN;rU9CWwZ`kBT+1w_{^s7)8F+Pji_{Jl53i3MU8Dnop;lAcdRVq zi>_eUX3{Hl-Z)P&pQ~<{DQ>j5!xlxb(ktgTyM~Y3U3#|4r2SpaUvwws7hgSWw{SfU z84kAid^?p%d6@kax4Y_AyKLra&ZjcS!gVjhhUoLIwy(@d!&!Z>*NJ*Nio>rA+p9qZ zpQ|TRtrnlE@k!$!hwbp;GH!Q*3#5z|lbu=n9y&a(m@&!N?239WUh^6?m%k43f91Hg z>OzV^MH6mCM!cXa+cYL=RIR1YJG)MPp11gn(Uy)2RK3yF6gIu; z?3hsnp(#r%{d}#flxe;^e4$~E@=24tY>TTaCWrDGic4E{R(eXt43K-PwP!H|xFZzv z8SP#h8xECBnyx$EE+iClLq17end=tP$#!!-!)p^N^&LY(OsD0u@pz?Yx3o(!mHUBV zd!SkbP_y3>3fNVC2Y2{}VY?qSvr?9H$lmr6%;hQFu-)Odvc*)|!sUAYl7_u*^{`zN zkFbSuFe29&13@->!5@b5@05pGHm8^2Vp5J=;q>7rhc8IYHC9(jb8=mSktd?NE~o8C zsjKk_V1{)PQw90VzG*r$j;1~pE-Ji@Sgg=Zs<_d% zcAvA$n@!q?vmFd{(y7-`uGLwy$Z9 zT||*|(QX8&nx(2Mxb0;wGi9gzt?jas52j2-#AX^?rQ{XY(e7B=DL2G5sE-1>!^arD zdG_&@M{@gv!}dJWWv+J8m#Kx5mr#)9s#UJCbDC@_ zq-Ww0+k8tgqoRx~VXcA>XFD!U+g5HGWqXG*XtBzJOg19-2QuDbxT-qvQ~JEQ$td|o zTE<3o_OM^ZUDTuFU~Y6%PDNMaQs&!@O2K_%_;|KfV?f>r^Q_wA~aCFfYpiIza9(r{y+^hF&!( z)EXw&t0b~ky}GE78HY;SSaTGZR-?=yxii%(#7sk_VazJEOtO+r$fPl?+re7?Nc(Se zaZZx-cFGVMEmB<5b#?(c?&J+nU(5`C+@y zSpyoM1C?<&ZL!5)v18coRGV41*=y2Ev!=EuHZ?nJmj!LC31IaljX4-&RNH<`+x6Y1 zVxDF7fdZe<=sZe(-Eeo;=e%Y%>hfc&HM@Z?$SCND>f@1ap{NgarOH^hP+0$yAs;`V zWaY|g3@FP6sa0{+=3zUFVBV}FcSCZW9vh1d#d44s<}&^-Zn8$wqKpeqGf6wxg%hbS_^KQ za>z#?@-Rr-Q-oCEB**h=RJ$OLYfJHBR9fyOTAgmIEt~uHusK)oag5i(N%KI@S8X2Z zAFVU3W-=*_M`|erd$Q!~N@HVVlS4i4o)1U;j6diwa?V0Qn$3i00hFrW>{FDwPHEnr zPZ#Ua;8XNBOd6XtS5T+5Y2btgGQoeRJ@to`UM>}Ex2isui>q>hvt3ea0mvM6g@cNC zJ1h79ojx8f#e$s1m9lsY^PEH3;V-+7vX2`gey*%e_|ma#xn*&Di9R2z)Bwf^Gm!Dy zEO|v{@>=?MtR&a7@eHn#YO-vre91?K&A`z!bS+6&!d~)sl$$A-el^C2RV-U9R{U0V ztjuz2Zv%HC|Iw0L%cq#MrkzAB7P)HmaO9%dP>eI>w5F`vr`75cmtRM_L()UI3}3V< zwPi(6p5A!j_{8=xm!!UBY;4_cR=Za7t9MQ~CfGF_r(aq1;#7SqFw>g4YR&T#f1LjD z_fPg_*RJ}|{M5UrJ~e&s^jjvsJ-u~m-_-cj->1$@eR-N$^ZM~$PCPR{ zHvZ1>C#SzKvwD?j)n$@9C-SQjlKS|o)7feJnoHL_wRY9aZzNxp+_(BKGw+?eX;L$J zVAa#B9-6smeD~^qTYbA^F!7PqKVN-%bz#keYlQJnu6e`6=U2_Ge*5a;YR_u<>RnU+ zn3^9?mrSl-_42A8u6lIUM^?QF zAUD=k(p6h0{xb24i6k^<%Er>LGuw_p0J+q~1x7e!r*5NxL>VA=@o%h+S zoImMJMtfXG?dA7Z$HvBKeF~2@Xe_d!(!8{y$jEE@O8kmAm`eU8GBqeP?Le>Tmiszo zg+?X28LUs~RU~XtYZOQ!2$O0O&Y2HuE!)rf{@9a?a#3B<*Fpsg>onJTx}8 zhVB^(w$v;!rA)PI?3m=GSXA#H8(Ys)V^E%~xjClAW&*LM&QdTZF0$bVr)Xb-Nm-N$ zv=wP@tli2)cYI@F8@~Qok%<1Oj52Mo9?YOHAy+uG8t?5DJ7Z|1baL#PooFuZa+Y)Lt@c;#q6f zT-UgLevdJxa&B97+t|+I>h1Gu&WLY&LcOGk0XAy3)=Vghb$;#(;7s=>zrWpxur5v4 zuXLxXm6S}XT{Sj_D*>V)^_fi1m@U-WURLXs71NfdR()s+)5(fdnX8jy5^aSBF3&)U zk8XJmLq8*u{OwEw4hy@MF}RJsZYn(~0gaw@O#uxG+PI``pUz!X$`jempC21rP0!6H z&e7B|aO_e}qG$2_`3pHWGD z%C<()F>y-dooTu88T{-8;vgU*0kU5nb~?ibLBtA#@0R}(wxnR9c7rb2@RWZ z)$Hy9KbXX_qIHGX3P3izy+)!IWVOYp@=zZ<>4qjZx*B25Jzr%?twt4hJBfYYLVqu& zOkGm78|EJ5nvZ3eTI$kCFrA_*(a~)?y=<)$iTW~5z~rT5T8z41{7^^G=QQPQdW}D9 zs`MJ%!9QWlhXpp2T7y5&bizh=CF5>Hqq#W@-oCZe;8j!_<^WTX>7@lVj+Wo-HFN7oprtgMTPPiWP}u7ORr<=t9K7mWI%>&M5& zCSIj)mrQxwwYdH2t}!Te)eHO3=?(O^c~7;b;2Z&DDMU1zkzc+c8MDi~ZCYg61q&Y9~TXXDFr$rw^Wj!k|;FZ8V#D zMkBYCJn3v8-bh}<;Ty8s;l3KzYC}9%;p|R*&Ff>`NlkVFb3JAk`@(Qdo!45?MQR3l zvM5Whk%L4Jk;C9hUAQ?%Wxr(bw#1VycKVb1Cu##>?W1Zdb!whh z=R5vxhR1MEUn&wugOp|V+wp_OkJPB7Dbep@|u&Frw@tKYhzsnd7Cd=jWRiW$G$RuGiYxW zX)HolV~o#It>(E96Hi}x1(rlhBw53TY^D{CIdt7nuLls%>6xQ+JxRVL_Epb#JOM^) z_NB}&;2|VqTfdBNq*Ls-lw4gtXkmL{PrdD9RCAZ3uOAfO^F^Ho7o(DCRhfjM+SJE` zNz5WWnEMo+fSYN{RMJo_>B`$>TP}i1qI;gTSuFWEcRuE_8FDGk9#dI_*H6-GPnix+%^^jiGGP4}YLGyX}#&u~}*kR#L=S)^3$)6&Ivu z4~;+HKYh=J=f?NV_C*%TV9DTPgR&6nf5y~3Y3{Q9`0yW-hkhWLAD^*~Ij8hkChPZ1 zhu8h*^yIpCt$TGtb3P|;X>sPnObVAqADp>jX49HKtyZu3>FoM7UtIHV ztG~Va!1VDo?lrQhH%{rNzc&4U`lsG;@%twF-@RwU^!WT*>d^1;E{~1N#9@rfiVAs0 zdF&~y%{Pl5UT((>Qr;^Mx$^#GSJz}VsPUCl8FbU0V1c*RxtzRGiP{|bRbRw=H;eBz zJRMaX5g+=tHC9xx+RU1R&_2{d*ifo6I<8=u_c;^^&YrQvt(!n}(jN>cQdPL&1CgxP z5pTG18=ru6NVmjDImJ7Tc20;e74Nh*Ma9T zk!MGx(b^ak9%b_tqe|wCd*1@9VCdCuHlqy_7tJ^#ifY!Muco|MxU)kiSi+lZ@ugHZ zZL6i2tVy}%05<)JUE=bLMdP8UGNdb{qyAdHmRN(mW%e=g2eVAKsAX$9cgKdwf;wEGdrHU%E zD#aP1+;w+DqlIY|u|%q=Y_Z;sJkc`gb3hsoNHJ{0=QgelILDdo8b>(cK!w)TSK_^pNb7|21}VVyWNK;1mq8ly1sQzc7sWyArK7!` zEbC2n`1HIv7?)oLdwV^#2z%~CGi}e>!_A(}n=+)?|He106<;e$J#nVcEVqKmZd4Xd z8~%ZLn4})SN>OdKMK~N^t1`Jk8@(=yVVM+P%gdEnR6@J@t70#4g7gNllU;jz zz8>Xs376X3b#;wNr2#`db0__Ru9Io-&b&XT$tau2Uhaa&Fl0MKo^`D{6>`~)Qbki% z&H>wg7Y2nMyrY4dt?Y87n-(}?@~H0md-QUex-HsvRkFuqvl&)fjprzo+ zj;OEVQO+5$H&TC8QyDZRxP~#=Y}i{ht(?8=80O#$BFjdGuV}bzc%#{BmWB&GQ~a{M zGc%8f#++w0ynUXSJq1j4TA+uM-`~sh%xbs`~2DG$V5rLThdU=Y+_) z?ovl1Y)mB!heEnk-W5LFKb8$EkG&Hlhse5^^7K-yQ*X}&Tlz$(7oBLWU%yTK=J{0-@sUzEla+HNi#F{; zS-^NCyY54f2$_fdjV<2tFkrna+o$#Me((yT&*>7imZEH*F@D(h5pk21DU3la=|SJj8t5a zsJSvxc_o~4!FXFmE#-VyTJa!+kTc11Y|-dc9Qpr1+bDiQKA4XBxJoaVaU~NzIOjJ{ zt%G=ui$54Fo6MPdAgWDOlf0^u(LsOA47N|?u-0?gV!O@hBf4bSSO7>0BY}!s^8|fQ zrjchN-FV*T_C_-Gr~w|7HFW#U`oi`MtM>B=r8Dbk`;_ZpnXh|Bd@ZC(xIBq^iZAMu z?T9+(c*puTi?RSonxH#DCfaNBOt4Y&0Ol);QZn8hpwS&%xr@G>CVR94&Qug)Jxf6W9e`46$8JTUOu%F z#ae|!32G+PX4K`9MRDZ^uuf^!=cKzG!Ms6Syer1UWjQR-CY5EKLty{1`dTiH$^ z(dMRbB%1!DIGJf%pi<@GdT3?i0U$lf_HUVeUX<9tG?mJjp@^NtmWTv>49b79ybhXn zRY!a~+ORZ(oTXj~ByEjQQyQK56vXl*rO8?`57ucl9uLW^ZfSfkyWu!p3zM_r6A@1# zmgDmYbu!#&BqG*~=HU&PS*tj+5xF!IO;mbeYr8FzdilLjb2E976wU%gubQt#_K(^^(En4I?z+RBRTh zXvbeb+P7pNra<5A1S6Ut3N+|!mdSM*%2XoW%uA7SLKsa=4(2wD&;-VKHzIF=qSH@J z4n!D`yB%Oe14Q$RTu8(5MuV}W(OV4_gjW$p4^5*-BQzwmf9p_ zvzP1jfHB=wv6R6bGZ>dq8jAl_j`d%hA)kW)dejaWCON3I-dqxCI9W#4sbp{#6TUn( zIJj}NS(v+i4>A>34-y1f=WZK<&1hnbK^|)*S)3kJ(xlucV+H5B0fH4*wjzDd*#FkL z0WewEW}ua0jY+drE!QSxK?L5<;)RiB;oe7k=Ke#ogNGzL0N@P>Ix~Yf$}&j!zDD3U_ZDtlM(FM}%K~`fX>SG%naRn7pX=i2N*eMHtcS1hE?Ecp{!%xCcC3 zK3z6$K(j`4QP!{1F7E1IQSiEe3!MOrRUn_-DxqQ8(uG z)-40nzc~LR!qd}|twSIZ(pTZ?Z39#oVZ(q54)Z|m25dN>u7SLb|Fa^$L$WIrDw&df z4WP(*pYPxH=wo+DgiCh}=5`QtI^Zt?CmJ}NIfDI)`1Br9-+Vg;2ezD#+JDb8vO6Wh z-d%&u+fna?An^iXI0q;`WElWooeks#Lf@>%^0q_F2Kfp8t zO|WMd7MQ^n0j#D3-Y3~xg+>#xNktrUtuOq~y7 zrO@0RSI;KRvR+Hr;s|TwW&mMey&l{!(o8WhzWc&YclW}>L4<>; zh;#tFwpF<1z+mHs5t?vnPJIxN37^>AKXG6{bKMAp9*qmOYY{}r^?J63HEMMGsz^O0 zjQU3ga~nr#!v0r3dHCT=2VpV3lpyF)<;6$K1xvadYneO+)YeLxAbG=MP+K?ra93Y*2{bYZ zQ}r!}sRrWqR?y4VJMLyYSw;}AsQzxeVz7C3C21JLTm9zl{ui$xYLq}^c)^E819QrX zflVY)Bw8wU$BKa3A!_u_{ou2bBrMzx&^VXz^v?cE`-k5}0QBg0HS-O1mhpyEZEd|C z%`1^VNBFEigzp-m3DNi6jqlpCxT{|}gbocu=x?I6e%}NDy`N96ncyWiA%q^u8=@RV zm*psF^A-`F;II4S7QZaZU>+Tq$H%Y21~Nhuj^B4XHjrDMMpc8W2d|2WqDQY8h^eeM zFAGN6Tn(AIP}SkG_<5<;jWjsY^Y>hX5m-qR7LNW10`|&}_Xz)e&5+;5qu_@bCa8II zBrM5xp~`6#1zRSQuq!llhA%{|I4QHD(#gsPg(v17I3(to2wyrnpn10y%V3qTbZoGD zAMh^jCZKv0?;@mfgd=Ry((XDVS)(!~+?G(0`jiNiD=JMU{dmwQa)hlwdPL66V%CC?f9c z>YG*PBvD3^T34Vh5-!r?<+w!*Xk z@L?j!|3tp`8L=`)Xf*j>%!Hmd4vtCoS{Lq45{)CK&1f7E)c!ES%CQwJ9TfB>3-3ae zQYKY$uSw_}c}zId+bHIIZ120w1G{8S+IDsnj0rf=U8%YgmBSt-3;0P3=4XT^JpJ?m zh>PvPJ^hQV1FK|X(C0TYoS{`Pcdd@Df4E=WWy7b8kf8P6HiW-<#fDD-;NIQm0Qbsi zbw$q=yV`7&vzig6LHd9>7-*dt|mcmMsAi3yvispBHkZ4onaaABAbU{TcQZvtb zQ$;WDS2=6|JAe^%aKlKmz;JIo(tpB@SthTSmtU7P+}1jy?RGWsqTYvS2J-q=;gBCg zJVHYv%n_uQk{qG8`XQ@3OUuhqtqD^T`RZqj2^tjysnGw6PSBjd9uaTLR4++P&-YzCU?e1S09sv5m zhcjrrTr@NyyvJ_r0`YHX5>5%9hz!=xuA~buZ@w5(^Ru7q?vGzTwAcygA5BXJ4xxwV z^K~ZL(uCcSbV87OF|;Gi!kKS;0J(bie|2~N)7}BnW|5ka2M?Os;jSnYK8A}abV{SX zqzx4W2(+Bxp{{3lau1Xvx$|yxxceT!5`*-)h@TP%IvgZW6y~Bx!g`J)h z*QwR=6}h6_DT>-C{X5@+ zks-DRfkdN1+VkZ!JzK=o0mi$VV4@9EU(06B z%Jn*WX_x8t8tq{}-f{<+G*;4pgZKo-_vNqb>;LW!bY^!CTovj6gF}wnG*!XjCPgx z`a5OB*>pT56|xrqQv2(FgOV9(Cit|lzTJzv`=O6R$?PWZWpv_N8e=`iS!~K+z^1CA zZi+DbF{0B~HVem}Nds@oY}zc`<9^?c{+mBW)SYwT1c5K3jB=H9PR=M*vJ#_qq85rm zc;w#)2R4i}6M#ghJA%!3=_fFMd+ZA*#vuY!hx;9FQ!Jp)cvQxivk5>Svc&B74z|vY z5Kf)>%F+J)_Y(aSUpR3NvdpAtBzm02lj+)3PL0Qy60)Dh?lRgeyquY`^`HOr0O%z~ zueTV-y;-!!=Zic~&`a(c9N0M8OfXU`{qNpKW&l4qh3}>tn$e@k_28~HRI06@%4<^! z%KPz?qs;^`#n%7a{WzF!*tJeKQ=9$>(1-sFlxYW%4Y}xgJV6l8=xVUDVS9)7$lN`( z$5VCiSz+TtQ2l>>n3&=#X~LPMX-Kl|r@Q*$KH0RPw>B;_vJ{~h*)r29H+2q^FUe6x z-+2T(<0ws#ylo@Jr@Q=fbQ3v2kk4q3Jf?=$HIyA z%j!l|3v26DW5APVHH^KS77C}(m62BAWy8*c!p(}m?(YBk6yy~e^aKGcqq4@Q)LLb- z-te*Uge+R-h4^D+;jCFW*(cj{l*+n@YA=}&aw#0>gF&o*5hSB^NWU5&w+trdz%z=EJZ zBdx;e!+(TX^!VTb39xlh0jh_B5~N^m5$?nsN~odCnD8%83=V8PFZJOkzx^JGVExiy z(+&s9j{$fBRg2&{M!^_(9Z}c9QWTnB8XVaEzfk)NxyAQN4oRb;`|;Yd?nji5L8Ua5 zG|c5uN)!bUQ7r;^y28TT;uhi7{~T=EcK#=XmtWqtt^dG|$*x3@eFa`Rl=?+gF;c+; z^`KCYixlTV@iXD+!;5fZ{^ww7-#NqAah`{T*S~V`aR1JI7r^az$=Bd_Bz4MwYJze& zC=x}GPDs(K92}#UzYKS4?rVef+y9qGsAH7&ZO=CbbK6m?4M-iR+JjHI^sm=}@N_zoY8P(!Yp$esGP$~?yQ;hBo z5vHB5d#x;;|4E^`=dWkWrHbC$wci=6+fJ%KlA16m6-depq817Y=fHUjrU$p4m)Ku; z^s)C!gjb&$tlb2By-U}HMReF-PtHzUbrxR_=$R*WLRzW(%QVtjrDgyyZwj%TZsCtV z930v(+W2zkiDUi3kI0PyXJnIAE*ecYqFkucNGOEwJOl9_X%^;WuN#75T=!#YAeyl`S0DrZo0+FD^N z9g9onw)nL2Tu^X*4}BPIRQEq~6)-u72UX|l6uW#OQtL`RyrR`CkTry!14-?VX#KwO75UYwC&`qsC>hcN=xV`Mtq507S98T=p7%E1!aCkFkMMbWi{E zFJPGm?&?jI#K#@A?@&c7!I@Q5GI}61M$+{p_42ogSNh zWa`Z1W|S~X&t9?arkOj)*5-uS1KqiAS$Aq3#-kGK!wCM|Jd(vI$lW< zZoBFEgTjS(7j_H#o*(=}bV43`VQ}GIu-l8Fpf+Dso$_ex)g;Qt%L88hMNWd|oHK{KAm!rWXen5?R@^EGt~d-cTw$3N!9sV|4&;zDVSCr18`XYc9qF z-LqZz(u+gKuE;IomPf^Cd(q$)c*v$bNSRTO^oER@PftAIcs@mRF8Z+#ByY-n+>8-u{zF!PS-k4`S@Wk@n;2y-v1M3UxwRJV^J9ke6Cc`)>~}JY!=o3fejankpxnTiJct>g#-t`vu3I>FvXJx2WX60qE&Sw=?QN_q_^V%v{)|mlrs5HdT*wv@Q#(2EE~Lcx|LvIKCsb4N~{lOZvb68*y9~ zRJMYGi*-^+?^LOr`GjEq2VNU##*z2J1MmO*7XV=Q4+z>2t~^Sn_D0;1eO3f~l>x5& zfi&Do@B^G6_;z%2Q04qcK@C`qg_NQYbQh@2@V>c4z*w&&3B;cupeD)g{$J)6aUO;i zl#(?eRx>Iqqy8r2t2nwoh2E?3%PFJH+ZQ))9Hj|QU$qTRmqY)xtKZnZ2q=Bns8^De zA#xfCM*&?4L+g+2@Y- zKf09+50vd?;6eBOc(du^xq3AkQrfEOP*_I0l;4aljnHsryhS_-?CO7O^CI+_ZQ;bF zU_|d>@=0$_#u%Ayl|eF=+a05f?%1=qapNdWI3r)WrvL07!UPKJ2$<00L_=i_HW`;y zrD`?{QdSQb9bzf|cE=)+u2#~7rz4l5H^w?J-FM=%hI&KvEk>VN&BML0>$;hhx`;9lk(N?X^e zk|Hfa{N$~|`}U)^BQ!DWf?U!F_k6jzz5mL7NEg`;6!>&1UEM4aA-TAb&C6RML?{5s z{_rBs3oDz2Q?C%nGg3%QcL^kdoTB8*653#NE?YPoWsJTo+p?wz3)FNvKt^vR3GT%g zuNJNoezdCpkpqjs_)nJnr2-Q&>ZJ0P%xmic2#LJA<C?cAdg8>7clB$B zFonDLyn(*_9;RguH#|mE3tLet$!`?KLxu)##VW zE4FTvit;-zTiiUmk|Hc@NAVyL0`mFGNXHr8iX0(%C}i{Ibv|EtC^9!)fvFs!36ekj z3)U3zV1Dt6MWcii4c z<54WMQ5vdcO+mqCzp$(S#L-3K-2|)amRS`$wICvO*oLoK?KT>!p<28B8uWIACaC+s zn}V^lxBtR5;DjP=CkSX6Ez-uswE-!I%x6!*W^UFAk2#(T(g^xXXtgrEt zHK4FNH9%irOKG>(sqG|U!bbzp9V5+x`lG1panD_^?&) zC=EW_A6?hK+fA6jZaN3})96}@&!-PPrU`OxCQjib%hBj`j?6=^T()d9{o9l?N%vZM_x4NE|Airtx z&_B2C|MGL>E^P6B$#&E~&H)q@D-p47(0>l8vO^HOiX89|V^MDn;wN!on$tWjVDtc@fX@=gz0+e;(zPZawQ2+LK$H z7OqY$u0co|YBQnYd?e>aJzGDD>Y~PP5e~$&yf9scMy<+Oys&BJ)c{OTv^YSMv0SZodV}ZiFVNS3d{! zOX9Mgy@jY>Fgh10n>Ez4I@Z(D*3B8W$E}Z3M!)Ppr;N~q&@DOQ7uR7urOxU}qtbvQ)!XJKlPX4SFgG zgxfp0+VInqO)wgv3CCY)9PHoLT)aW#VPEEIzFWze>J?Wk2Qy3T%!55BxKWyL zrZ9dnbT01Bx4r?rA=e`|xFqOj`BZYb%4A5ZI{;59`6-`R9eo+4oO|56ofc9XbWs<6$C zSh2wtN~vZ^Zpm`x;Vj*7EBY})15j=d(@nw&9=~Wl+qcm{(?XmvucM>M(OklY)>7=sUWG!J$GhcDaS)iI?@VD-ltK`ZRK|rI= z3HQG53T&Uh{mxFP-LobliHf8m8ZAYFHHK}u9ZXomXH7D~7EYX%%_wdBh-g6X?f-cJ zOvpH$3y6$Id>tksO%yD>M3}E;#hwZIH^B~HNfMr(iyr7d@TSEZMPts3UQnS>c#4`N z8;>MH#a7wk_KPcStFZNLV6l=WoW5-iw;YGSiF!N)~^RgdRTW<4DlZ4 zu*N)EMWR#BBq+x_PJrVGO>idzi26ZU6XEwK7XMB;Zul@bLivzjJUX*%R%6MswO%Ay zZYeFgv^XuBg_}PNjw3W-PSt_hUua5P!|eY#KM~ z4YeJrH0mYb*!I!mi<@Rwk_7jmO(M$guD;~GFm~o(Eo6AU;x$Q&vRor!;P&+SwWlz5=kPft(O-q;6x)W+% z;X^32oWA?Q2e5ueX~J2cay^A8C?uj(vA(j!*wH0a?SMr!O4tFTW6lB7w zf5!}tHd9w9`-w%|t9$r}-^!^=NtsVoiSgQu@PSX_mCLc!iE}5~W3&L%mUOcdIw3)<)nfibK^dcfOD^;CC#|9Z)&F<(`3wcgR-v{kC(kxW9 z15l?q9?$(u!8$Ok{HCh`b*viiGKtazSsN{tq1d zrzVICl2%N_>5;@QQg4)38uGaLvaHup%F#14hdx^_NBcQqGeBpMSjOQ+dB_&(Y12k; zIvTae2*`tqw8NZSwoSyr_wf!BRCn5+l5mt?R>1@r}^v@w?Q=0e|S$MhU7T>wGh}BJAuZa3)>( zni5nb&EQ1$+yunb$s}V{=R&oDPKrB$TTes8`IW7>+^Y>sT>bZHqEFy!Awi9Fd(MOn ziWJ*M{!$hMrgumTjU@O^L*i3Lq|4= zWE@(tZkff&R0_J5m$BCL`WR*O@Ha4d<`J5(@Q+uI_P2kNSSuJ-62(ZFG+TG`*=z58lTGf)g9Bn4`T4#ZkQ8xXbK#`1)gz7^dJcbK= zq60ACBwCS8Dqis#$AWg`IpO#}B->y@|LoHKAD$*2 zFqu-8Oz~Pj0AUL4GOEzgzGS|KzKqa>r$6+By8rd>Ve)sMAkm6cD_W#6d#SF9S{n&< zEs#o41~>l#W3rNjl2@O_jNS4La_cTC5hx=Pu}JyE*-X#Ng_Kg6pZ5e>u{dFb;)^5A zg8Jh-FtWI5?yG-Ht`*KjE9R{s)aUF;D>erQ=)7iLc=d;v+>vJS5|#vS?&_C+gmI;2 z&DdYYX1A|nW~{3|I-Qz&jz}o0@gU=W|e-kCyHw8Ds!HAt9I;NaREO13@uxEoBO9b`&TRx zE2CJ-7%PmT)lSF?CbcZA65jtCjQD6X$pf+Vcl;KfPn1+UN$StGMO#SguZOL=nBLxL zRqMcT7v`UZIW^KsN)y=olIN(W@#HGJO+AfB!4HMu_I5;FZL1-a5mLXy?!K~BP;dQ% z8Ce0$>i+Y;gQ|e9^5n!ahn~i&V05%lWf@vrGOA@1PSY zxOQKda{}$xo=apgls$(I!}nc&32w$eFRtHq{zuM@;pXi*GaoJnijH8o8}`{zpWY30 zhd4)h-1yhU*)8XLqJPhOpZ!&yE>>t`qL5I}RT_v^gXT`x1q4&M&2l&+)g# zO{7QXd8B`Q`mJPE;X4-A{{y2G(ZN^Ti*xXP=HcH(xi8Tl+gs)|^*ZJ?=_%)b9JS#x zXGiSS|AD9R22zqdEZ(gB3wM36Ol4%R@zMHO``VMD%>Gi zLKxOcnjlfl;UK*A={^1bk}N@GD4m_EitW|nI=$9o@FD99nrrKYJWv@{cwI)G6C~zm zptXsk^7I7Z)97k|fECQP3a(gNR>LU@d=73HX(p#Aob12#%%1)SCYNw|?p!!YqF<>N z1II*OCOuC+@bAhqecu*EY@poA)UXAk{sw$#G z2(nw*ObaUFHhy=1+gj2W+rmi_3OkGv9>EBqeYs;D`mz!}M40>27mtYbv|m`abnL8U zjerpn!T2WenwDh4(twc*5Djs1Cq|BLygj#7>th)toOZl!Sx+Mh2CAm+TiU#FlqOW` z2asTT>POp!C-*H4-79xKvWN`R3zm>!iXCnTdQYbW(0a;<#-8%ptKEznXB}~?eDB;6 z+@mW=Li8^Z3}qDF-dE-@3Pf7AFH1|Lm?^7x-dAlS+1bOEMTy%iT(cD&9Hj~Szy8@{ z{SR+lf{{W>2GdV$XE>l1M|oXOZm>I?-aPF}cJtDv4I{L>7XE~ukZaMeZ^op;S$1;k zGM`)};&yNfmdp9u;gYA#Q9c{DFKyW{LZZ&fjon}1vVZ#$TrYA(1CFJ#S}tv6m}W?t zpzjWLU^qr-!s+ z>oR=$2n|v5sE0+u^o0MqY-#8bTz|z9@iCqxL4aou_D#OVDyp`8LlNplkZ~@`)=gJ{ zW81xgMpDkj@|(Mb(^s73c;?C_(Ia^BTnr$e>lNb+3YoSW-9pA5OjDNk?gz^e8g5_z zXXp|fe;t`yJD+T6Sb1Hq2Y{&DR2j}~{UW?OLc@K+n};WZ?_acp>Z`7DTIS_ky1d-b zHV0z3Y8O96djRi_(8Q~DF)Zxk2guJlDn+@S&3dD0r9)jX+cNakZHKThMrjDkefYY5 z_s|kz*P3Co*U!XM&9c;@tYyo?(R=PN-W#O}(bZo)j0G{+*|%S^1b?|{;p83&QCjpx z##?o3JYV-UD%zf0W*VxF$B!&+nq5f}UVad%hA{qj_4i%6bnRJZ;@Yv%74prhd#^m>^3jU7Tftk@`=aTX=mVJ$RgS@R3kCChg z>Q}6C!`6=9+xj|nO#W|7XE6c=@)wyL)CO>S+Z3H zj>#~L+f%eT)HM??c8%Iz!gb8j?Ci=1g#8bG0}f%5D0_k-eF`p|yco=A9acldXv?$G zU{|O2l=LxHG;t8TIMR&R@ONC(SIaPyxcfhOE@mUho5dQe!izt-a;pFPtB4U`>3JD1>x>qQ z7FRCAIJ1KD8oW2!Ol!CP-)ok{FoTn?!;Dhn-)xMa7)aZxkCzJxJ%b#Nqu3iqT7f`w zH8O>c5>XfHlm})O;3WDHauZ)$r(8Uu?K&3#8Oru@W@ox(aMwAz)Q+`CX7=rBtfvtY zTs(h0+W(!JY!*LrmU6r0!iD;!Ey4|sB^3Q$K{y+gzO(-Y2SkJ1 z2A{lgSvJzV-V|cvY@Sd0QxRVi8kTfq+K7&f(1cSPFG8~N+~;@oGe%<9kkChZOjLL} zxgz5Z`l4A?FYQR?D3{l3!DWPoz^CVicFk!m;X)!FDHmP1s&2F8Am>xNl%9?PA&;al z4_LrugeEN93OoZb*lW%@+%-r+=AoHYE?RQEm_Ol+#Dj@AU5dinY{bf1Nuo(duJqS% z!)+rA2fGi6dZZoVH7Ie-m17#0-V<-OLk#HsXT*GJ87;VJ zk?dVKc`oEJp7SY7OuSG@grlimqKnA05cb=Q7yIo>njmc>xe&I)&i+@tkSVeWlAuSb z#Pr%&%EejjnT|1<0SF!9?FgTLbz|s8Xu_#mUb(javYYULO-W)M>FCP>@>Z44g;j-I zr|oJ0BtztJtsgu_Xd+66=)U~!y&py8X+K#-=6Dm3x0-H?E9;%oDif#gZw})95gPWm zig?+#qhAS{k4ZaElz$G(8v|e7XL9xZq67CLGv|@Gr9K%73I%AlKBaiQ( z_L#O9QfOIU1wlK=fKYeD_o301oSajg3yaZ?JSVsx`pGbe^NTmZ5D^y~w>-jfD-(;e zT(|3RxYBAT2Qz~R`MYj_K#b6Y0>*ikC+kg267|g`XW0$+<^tIs}HZ*W~>5<1H z@!^_#G=lwclqMX1@*RiX|D~I^^mkm3VH!%7c5Iz?rZoM5sne^TM^$s}>`rowyHs?X zpF9`U=us++O4h1x2OIh*=eEjekH48gk4I?mNybH+V|V}ZEJPTd{FBF)cgRAimC-p$ z4KrVhw-P3v^7&&5Dr+T4IKBT{NGy8pE+oLF$qoehA~B6rzRIk$8)TXlUnlSN78G^Z zmShAiar9?|23PQX^k(S3I1vw+XC$JLnrEJJSEppTyvy7U#2&;UBN)tHa&7SpbJonlQI>f`(`cU--q-HQ~C%vm1os&nNE{e);;PN#WJv z(q7yooFtKrw0nhiNo!^zcHV1J7So!#_>C7ba!$&;7RhAfFElX&suJk6c zixmv{hSZf5PJbG@`fDw)8Kp?tYcHYISubsq`6Qv1G)=r?D@9d&vmA1zY-L7)SZlc9 zb_g#umS#7M&}ghRa#(itZB3ZjK-@cNTrOF!QQMkUCK9kP05Lb{km04i9Rhk!XKCYx z5gN_#y5}ELJNkd`kP&gE6y_`ws;1Iiy**{k$%S+erq5_I#_2t_{&T%0#ET{tPLe{k zZxp?zJ-yo(o9X-Cy#?6;q>=z!`P3I`j~#7M0jao>2YBGnUU7%LEU%6F6P3raL|*F7|l}Q z?_YxN?ic^E1mE3x9}&)2@@K;q?|kzTVgz-WT-awuU3PQZk;}vXnL#dUCM$Bf2-hg* zH2(P?h0DHn)=T!*w~8FyhVV(CMYXCH(&h`w}oYs%n2G$xJ5OOeT}bo({zcs}!Zvw(;o z`f&IEyInPtOc}p_zK?|Oo~qNg?sD$AXZamuc*63DX`CQWUp>7R<>pWD2(oxwd&wym zojgKh*Gy~wMNRsDyJq^{G0`&Mm&ooDua2AE+O6qbc+ICVbnJE0VTu|k3wJd|yDpJ; z_#Ans4{5pj=kijKiuv57hRkB^z`Rol%~O&W(lm1GDi-$ zdp>g;MoS65H67PaBLeh;s?hTg|V${!gZf4*^gHC5IrPR%EQQ$szvlH)wO+v&~Dy&x5u zRYfXdgb^_ij7k_86-?{N<)6W^wU~m_?|%i=_Isb9#{`X)6g0_#A?s%3ihxb8li5tJ zEI$mN-VY%!7179{d*8UA_nZBc0}YboIi%FKP=SerYYlU&BxyEelmn7mZ^3aTqLFv6 zql)Cjk*z&)3q3xe711C`Ud78fYibKuP&Ou`=8%b6(kP>y3YnCX9DgQ=pCd;fOYfmU z3|o4-+o?8!gNBAp@&}DqmVv#u$Yu-5f{Rr&<$U*6lj*UwVj8k2UcInaB!YrKF+%yS zX^b)rvV}8lYceKt72}l0?vcf<rr41=+R~DD358JV{@`E$S{z z&0-q)RgT7R(a^?U--TD#G7^+}taK3R5%o`MqzV4bOAp{?y_kd}_d5P&{hb34b8A0x z((1~}L&MJx{dsWrh<>TNx3hLZk~gb{7e*u0(J&=gtZ|ws@{9uJul}CD=nI%E5v_0k z>fQ5&=}Y^U4;l^0Pq?CzYc?2l))_80oW?Ama{4@$ei=MOGyy7y>hza?STMN?aF9 z#VcwcB<;Kf8{y|)!5aQ2(%2i1o!^svl^WG?rSdI&6>5EE>QbZLYtyr3O{=Zs2mb8) zAm>Fia`?XMamS<1^BeD@ov}{cP0<|r*jR;nvOHPgnzE|3%tk8x?J!OrJOn->5_M1G zes)!5LvQSJblG^!MSWG8&ASU}r?sZ53zL7T}Z$<(4s10Q*gvbsLk;M9{=l{arS0aF!|2n@)_pk|3ka4}Bv zu_c$!{$mUI!(-Eb;+d{{984i0Y3w6^RdV{g1-Vq3oYWhl)sEgk6(^)tJU+c1R}m3u zXZUyLlJ7n~{SThm|9p3P$H@SFyqktS^6+~xXUEDg&1g|yx1=L>pOk#&@bs>c#mxXF zlAlg~#T?nv8~z4#r?t7L+M8uL&f-ld42-Ei8RMk+AU;e);?1`J|J&4i`N3%i0>*3r z)M2XOcGXi><^7#Fkv#;JR@6+6242DdpLz?B(jKBlQM*cRs4)SRHqy}43bI;^4E3Pp zh?{XNyt}v8?LlVJ{d5VIaHYR|y!Nm<@3j{zSxr(APGrb09)`GE+zM~yS-Z(S4BU>V8*OwT9&*m)QSMPk^INg7!6S?dGgh3c)4hOroX9b z4Qo~E&+7CRzh0IDXyQ4)oZfh{l;w`ooU|U%Q?TQ_fBLOweP?}d#}8;f0#kP7ppjA9?ZZr1?$@6nk-@}cLZw^O@i5`)6udYmfMLSX}04O^;LVscB4 zq@M#PaWiq>G6Hkp-+#XcV3wmZ%gFfi(`SwuTzP$pF)&>t%B7Z*K_ziKkC(;GJnGPk z&rc%^K!<8-8EHEfF-Ckvs|xT+@)z)mxETrd58^%u;Wm&^;I9Tcicc+tCMrcDG~i!n)|1N1)9c4iKqp6E`GydOK+bvv8aTyK zaTLvM+zN7$BE@}141zD-A--3pPuut}sJ*fGl*qrLJ=qzVkBq>r0H{5PFbD>6_$26~ zehKhy3dHd0G!U^*KqWU_d+sJd-(2_F^!P?y93V7$fYKQ9h=ah_AP&N4$o03$sZxer zR(Q;!UYI9Qe8}v(cKOE@&G<}cM)olr)*Ed-RDHq-jT=N zr1&xaJ-ucWzE`RPKZr=#<#6P~cm2l*k=(QNEgC&}cLmFzKQ_wgaNNY!l0~=E#a1U} z3i6XVY(`NtuK{0}{mPb}_Kj)8Jxwk!2uvm_tW=wKv8jR~F4W41g*lnc60s7;>$nY%%t9R!k;s18RlCT+#`m`OCTFPz z0!_8Fz{jKUyA-TC!P;~hTPfwwkyEGfC8B0>^pXFA^05$Ud)qX%AK{ofhWBX;#r@rU zt7HzkJe^E9No;RJd@pV#183>Mh6W})@irV&eXlkRlI71$M>L#Z8E>?a^64`i!hT5S zEewjNnLN3FvtYA$>n%Z_&w~fA-o>@n9Lh15V=-mIY6>Y7{bJ{-d z39{yWtPK$j>ijA}sZq>q?v>xCX6f51&f zOd|u~y?e+hU;WdD-tB*&>LKzA+<))O^`BNnwHMf~q!&>V}K$^Q3{4TS*pjlJ)`C#e54 zbe11?PTpt%A+>|j&+;(M;iemJf_(a~7#tCeOgRv?_~L88j(O{^SgrKpNW*7&MkQk; zuVS=*qfKp@v?hEBp3%d91|t!Tyn8zA@_itKiN9du&^rJPpyg#rjERR7TwaSR^WA)@ znN{+PF8ezeiD=}=QS2XNFd?S&yqOR@6wxWqIzgRuPI}eV9zh)}|mo45fhvE)TITlfp z3zy;m``ggW*vMiMP`kehU-=IZM0CmW8Qj@v{3}0w5`QpUmrAR_W-)DVdbZ7r}}C-vg8nq}@lrhu;={L$a-9 zxyocN)>Oo@34T|cHHh(8OoCtN9R!s6-x%**J&5t3b5Fxx`MI~~4f+JfG0IX)VM+y3 z{O&qM!2n$QcsIG|Il|0hjQS|8k`*)9vazWHG+>&yHl~V7hn#CEt(~OKQC7!Tq8z~( ziJN(#@kd5xTmx%{i>oCoEkk!M`@xdm4G{H{XKwAEdSu7g%*a@>>fpMpyj0V9q6w+8 zl3wkHjFp;y4-8_l2w}6jXu)dp#h~kCvLR^Q=`CQ9 zS=>sMZWy1p%s|_XN+gOLYbnHgv>j=SL0vG*!=wf6iCcY*Or0q;1 zlt^UKy0jtGpZIZd{mz;3Q4x&{B+ls@*|zn5yK@Gj-!^q%?ZR$R$AWHYH|NbM6fv)E zGDl|vC40`CSvRtnM4o)}6r8CvY-!V3Gq9?8rVfl^F8G5j>|h-MrjzFs`IIeSYo~cW z@?GeUhz3{Juc>(s){;ARQ89EZkdc{8x3T54shXCRDDAEO+5qsx>EI%w5%=sN*gK-% z+1yi~0U3bJdw_;7@|!o9srsUv&MA?_e2I9VB^?tJ+#7P|*aEljWcyLe`E$v0t+XJra=+e0rgvL6!EhmRq`m`qf5@F1GJb%4zGT9H+f+28j25t38M<`ft3rKB&N2{z;z}$ zovoq=@PIJ&(Nn=mL?i0zCFl~>gT8kvx+Lg904F*dX=gOMgX%%jd2k}SGBz))j9_B2 zkVLJ=j#^@J8s&Mu!%v=zpAnJBp?IEt`RrD5+J|TUL@s=D`V68yZ)Q6kf=vq@Z?_Xn z5WxQGT2^ihSVF=O>^~12MKm%tjj%2nH;A$xGk@bbPV5Co$PyaL$jcISsASM_+L~1^ zi50sEM#}dwzISHbsE7u*OmIZD?FRDQy)*ydIsWejGuyT!%;dlZd^JB$q7vj}Kryr7 zWDZF*vg6V47C%J}zX!0LzH9z-vKhqlB%7I1nDusbxvVkQDRO-|IZh@NGvjN;G*mG8 z_w&dTOP?O>brhIw=v4>S;|uwN*{v~2JJPnd1du4VrQQ)H`wj+UCZdtbgQJ3S^+#r= zAM0>n9E|wW)e=)klxz;Q*(yb&quyfqq58EFj6^heoL0jONi(T!D#{3BzHVX6xpG+2 z;&L)iw;8jr=2V<#ROG-&MB^)+^p&e0a}eLc@-v<^!uD%Vd%7^xb54%T^m z>Hv)(%apgRrOe&y?`RME+ z15Z1%{+~(xavaZTXOOz-ktNHlJ>FC)T1+-kND!%hX3xmtRx)ruQehwc&i39{^)nVE zKeQ#XG?$B_{E)R6sU{dQWJK@8%}B{Sa$)ZZBMzRm306^$N%M}7OwLVueL7y0{Mv+p z6Oni`dB5m~%{+rhlY~WTl}R00M?qQ+I6AWaQ9Vw+W1;UZrjdbFUlYp0oMOe#jh@O>(0R?}}*1=6^%5;k{>@**mb^Jau3T6$pJRpuJ*3y}?q{UK4#?(pXTb=#(zE)U;g1e|dD%~w{A1uOI^*M*aqPV_ zFyp+e^~wy580%rv!AYBwlenbh$hDZi8zbnch=#&a_v0u2`t(*{=Fme8j80$J#PXQ4 z)io-MX0IU@@YH|+Mfr^R!AC@bhVjbYUd1o$7aEGl?-ygnTGLCtN_)ed&$lgl;Pp`+ zm$|`1M1ynu_eco5Y00vF$oP|PdK{rYG?Y*{L<-SLo7F^=v5tyM7IQ*}9t}YrltnZc z8lO9_w=+iOcSy;pPb#;GX?2c1jXr8 zaN-rGWZtBMfx=#oSRB=oqADXF@IvbmH529s)FR*p%r)_1$-~NcfJRsHyHjRPIyzFl z+N-u!oRSvgiSuHte{nPFM|+^S4%UJ$;p%ys6=$fh?)sdiEO=x zFP$+B(+L7Ol{A}b~Be#uoM=oA||H$6q zkB^)(vSiKwuKE6&FRi(5O<|2=jbzQb z;?~bDude#as_R#kR=HNO!+`UCzhNR32bSL?RIq;Hy3_Pn5567Hru5uF-%MCoq0Yi4$Mw=X?^Nu=nPI$-2-1l`n!+==+yZCK#A z?SJB_$p10g;jveC z79C-?-_KJ6fanGW34n*fIk>I6kvs~#OSUU`Dt-^?RseD0!bQhEAZWWKj-0u>{Y>G9 zi~V>3m|UGfa|_k)vWP|~ZXe*O_y&|Bbg&j!BlR%+A*&~6mTY^9rvmmGMGAq-P5))# zEiV8?JGa#@Pz%7D?mCb+kIH zv>R%fqv**wa*4bhW>snm9r=v#F6_Q()=9CqgJu~F$6bs|e&Tlm6^Uhb6!z1=GHl5@ zf*2D3eQ)^ysQWO-VOX0ZKqd!Uz-0jr35e(Z?!YDd%VC<@2HH3S{fSc`6NX0N|7~5_A;punA*K+e=ge6}1KT(PXkr-tLPO zkj90tDC9PD=gIaQKai*b3HT_z)PXNv@e_f{(i!YST;(+Rh%b+YX=m47I!{H?l@ws+ zEtDRl*x^Wj%M_L$5vUC6B4z=L)d}zG()Es2n$ycx+{Ke=4aP7s(eTwi7k>!Xs6IpIZRnD%q@Lyo{FdpmhLY*b_?QW z*nJeCZ0kD$8HQ=V%;z!%yo@=rw`d{8(fT~q9z;olTpA10EyZSovp_9dS{10sJ~R|4 zY8N`sIq)+Mz`_swyFjHo0u?IVGFsjd&Wdg%80MB3w(slja<~jIul69I)w}K%a_H~{ zp8VEf{$)SV>gl?-cl!2x>~#9WV>by@TGbH}!hi*7$GZujec9QONr8&>fy_Qy&a<0_ zu^hndzOZD4uwVSreMlvQ!z9i|P$CjP3Y)sUv+2vi%h&;K#u2njoI31SRu54XmTmg< zJQW>9m`kDn)b~OJAwzVLF8|^@)#0Oi#105F6w!ne0@Ea2A}ne@@;2dU>1y`jM+=Zs zG}0xK+4KqFWyB3Rz!nlrSD>2*dpeLCl+06swhsh13o!EY9995Cl)AIwO@S)G=SWc} zph(BmNxOzG-taz8^-x@WOc5Pvcr?2E+*reo!W!X+LGI77y^U1O9CmxbffAfc?wfxZ zt3~Fd>jI?&=%&SDYpq!?P$6ClIj{zjnH{bdBvoPsY}>OyHHIZvbdY{jV&;+D=x5jM z6NDnf3S1Vbjeuw_2$61BX3zPVO=jU`3~js>@gZLmO9!3ca6iruxp*p-fp&O|9LT~n zcOZ-*TpfiiFA3B(K-OB}oE!gzv8de`6McKrCZ4(vvYo|p%egURs98#b!Mb^F+ z5H@}cC`EjO;OT0RD5~zPyLq1K!1i_YOOmE#7{@FQtnO+-p1N67ki|N;W2kXHAhVb5 zs#W8{yEM=&sQ9&r=a(g@CL)M}-H@3mh=$^luiZ7)$H~tRl!#Dm{If!q8@c z+O`)d;vGu5BJvE!Ib@=GUu$zoAY*?yS zQY6L8XLfBkF?A7c;<>ZKr=%8qjX04ZI6FA~aCS$sIJY3<-9&w8W;3}yHZwAD!UuXs zY(LyTa0V-pMf>$WlJnWbI0@lP#aQNm@rW2YtS^jo-8Q(ya zlLFQO!jydgwM4Qqop|EO%QdUIrIc7N{jl3;az1h3mqtHIBxwM(dRJw zC#E8XF(w3So*|L)0~TEvupBTab!H4Y+_X>?sY4vX19wh(S8)_(5W0B6N61mb*XO$i zZ~8Fs9cPe(oeMyz@Ph^B0n!>d*f?_y**?3|nX^?2x$5}v(i1;V2JRi14=?>od1lo* zRFS19N7U`cCt)vuiQtmNEL@T}x8GN0oZ42VSTzRXP2qlX>Bn&664A)vTOJp@HjjUd zUT^3^bN+Iu$oh43ldFeM}F0Y zIa5r-)$ayc)^2N0+rbxYr5Nk{1u~*GB-*UaWNd_8g@D{ET(1=ke2$ogr0!w(ie_Kh z+Pl3$@7L(hS@GLp<&U?iB5GIVKOgoN3LhF%{W zTYBC=rnmE^Rqg?jo|;*M9Q|A&$mCoV*3L!z9e1Dq1i51ht_Cp;AN-Sk!osHBpQor9 z4n3vWM*Ps#OnElSNRzh7fYXsknffaMm8!3U<3mIv%$^rv3_SAHExiq&Mo$s3bU=ZT z<7cuS3jo!e({)=}Q${B5kKDw`QiV!+yu(KH6j6t(dv3M9ys#;Tw-gtmwt@GiH9=ANU-Jgy|BzB+4TyFS<6~6bXnejFL<0)k4+;1?vC?MVY+*Q;Kfq9~-M*KV} z4IX`)D_8v*nK4n-XoL-S$qnd@h(?%uQ3U73zy8-Yz+cW7sF7;rWy9AEeRJ6_mkv|# znqx*P7*Evr3Ep_(4rH||sZZPT>T^)NlYV$mVRPyZ`*nOATdB-L!N<=3Sg z5x-1HTzA2&C2HkE*Iv2{_9bMJ9H3D4d?txm;*WcnXd>Y-dZbmgO+gd~FtOrhM0S14 z(R<_o_0jF6!Hq1I&GkdyUiQY)^#gmUU2`|=nwT~-IP>R7&DBj<8AIF?_xdfmq&~x| z9v3`?Q4-N$*L)hQ@`I0Kc|S#630&8%QnL|*+^SWoLa{`Ye|O>;42+mY-u?4MfRni5 zmCe2OGgv%ygBg!)u!ciwix>(F=PjB%F`myG-=`bwcnVUg&N`D1zp?xPD`$%Vu^2KGkq71ZzaqbG&aOpoEiv7U}18EBTY6k9~l=mxh- z7X@>Qo)n-)-kRIm+wnuXiY}izpv716I7|U~L1R?v$B)xx3_tI^hyg-kX?6~2nlj>~?DkO&bC&PN{OVoUEkzr=|5 zE$cL^gP%EdJz_61acQ=YFqQMc2oe@vMHj`*u!i3O&*OWyZ0xQ7PdaZ{#x${mU&bzv zL83uAiz{mAFzIle7TCi45B~!5CZdtUZ@spw=lsPCas}Wgra2wF1hZ;uB@5%#SA1!! zvRh~)`-1Yg<~8sT(Z~_gNBVx^Exk8hLuaUo-;P=0$Hv|+6swYCt(o(3NtX+dHgp z8fED1NP`f@<%T2J=3*L!!#uC|nWrda^| zn7P9e&dfzjEjCr*GBu+xfsbvOg)?z6jWEAJag{#s@5x(d1!S7@x6Pgc29jjOK0dE6ixqx+iepzo|-7NGr$Qmzt#(${WU=2y6DmEO7 z>f>H7L%(zbu};h)Zf`N^n4`J(#fe#ftYHc~3scbU+G}|>*;1yY!Js1BC6|xS?pga! zt?$0P7Q=Pq$6I{gh^Hov{E)rU05qyH_l?Mh-l>SU;l6( z`AYKdRVU05sl7Q2;JpdHry2=qJl&mi&ESCsgwBm3%xEFFw+)NHV_Z>&?(7iL>fw4^3Vqh4RJ>$&ADn=&m&c!5h_*_KuqVf*{hrWiPAIqmEm2##X^CK46=4+Mbx99y-NQr1j zGEE^yZ{V{VdQaSc%=ho48k272IVJ>Q3ft8LQ-u z$MO_C2u1gsxLBO`(v}{3#w;{%>{|*{EgZ#VyCfr3DT;wi#o=>Kk{3g>>&d-mV#@`@ zq^Z5HKnuIFy0N$PtXclLl)~uq*QJC%tklMI9Y>Zic3Mej-t@z++zENKm_)|RFQA;< z%@1$ty}lD4wl*MBuqCO#6!rs>x~lAu{TXz@e=3GVL?TC@WFbD@n%mZU_*D8SI5`sw zV{39rCrf~dW25n4UE{Tq0VDV{KL|b|5+b$!?>NWyFFpufR0WHJ7cUmg1%F=6>4F_g zuxqHb(-c7ipL6CejEk5?;GqXrLhto0z3X?)BA5@_cMP0(?K>Yc?p`ZyrrJA{sIzCGLF(Xhk-JE?O90H zpU^VKdb!I~THZiPixLY>GSHZvAlFJ}$JUBTy+bd)@XY~oDLZ>HKpSC0%>{DdBGNjF z)G$B|aT7Wj5=n*Ii*Z%)#gp|2;Rl7T&| z=Ph+-C}+nuMf#P0;v7n87vT>)$+?u%2_HEw`}xcT3vqVd;0c`1JREs!#7DD-V8aHE zCiTJc%g%A$?7Hh9hH=PoNEOXY&uRTR;kBDj4Db^m_VuW~$(=ng%H=BV&` zj!MeO7=#)b0+~$SU1zj%J{JsZRkRp81C&`dsG!B{Y=jVXz(tH@9Q8*JYk; z9*jgZUgPUSJRQ>GyLOnS4$y>^WdFD=H9B1<%Q=!3xiq7c!z$5dlyZQPh=$4j`5C17i!KFg5e*Aqop6>v zekuJ}q`Vwx<5c2j(dBcbv<^i~mrB;FRu7$Hvn&5P-2fMwYPBVKDahnRF4)%Pk6 zO;)CHBcHC{p>IW?Z;NPT|LedI=tE3STts_>ZeM9e(7$;Tb8kOdIMn$a@Hb_vkhqF|qK|0gS z4_-PeVl}RaBn?@;(Di9LIganTHHx1X(O_nM1xZm4O>gbpAEk>gK6Q|0d+@iDwAtl1 zvZ<0mQ)nh~d4HPZa?okS&9v&Wz4x2kED!{XoZDsQY^Fv%=kj;GT@~>Z@QS#Zf{5FD zKQGL}hzS!YP2}N?SFVQKlaSU@X-!Da*eR3%4#@rNt3BWr;I%q4ZHN*NUvG-gSLDnJnL6^w<5L=Ip4{`n|8 z^xk0a#R}cguBn5^@Y!Q(y%{wP^%7giSn^x9T4QE$ZXS1G;ysxN{7uvHUBa2C}CET%#f+)aQ z6DnCfVU8`=OzuWmZ$zd>rHdI6H}k0VpZ=aSI~VYafVumrm;F}ky0p9EUN%$gr5^P(*z|6x&W^7KkT}AC98~XS!*D|*(9TCL{p{=+C#Ep(|8idGJoDDR z(upt)^5Hu$Mkl6Hywm_+7n7{GYj!OZ{WOF44+M}Q%mx7`P)iYL7$_3v zuGwAdPedhazc7drE*GyljeP5_S>3yHk>N=;;g}~{vgF!=k--*PM4G`<5jz?q%gJJ94}t4 z{~9#7#U#{`{X9-g3X%Ty*XRd1rVi5NB3{KQRNHn3r*g>U$I;ulP?wOTe)xeOG7^gfd8UWp$9iFtcYsCp0%)wNHShYsI6Qu zPME83Ohq3@w?#CfPAYkQk$ms***^NrZgTXy)NpK_I!NKxc|(m_&NTz(hMQwFHcd#D zCr2K}%!*oxI{RrJu2S=DI+m8HgETuS-am3;=}1{C^{A3YwJ8~mwED-^I4M3zkG#b+ za;SD|KRaoC?*|VGld@r9Qp~X^R1z~HuNkSk9l~9tKbm(Q#vMyUqjwQ{$AT{Px5M-h z_Dmg|03%*!3>FFsB^#>-OTbNWqqZu~=v$AVM>AOJ_oMW|By(9r)5u3y?uS=kG5 zhJo0!Fc1NwVN%ZoYO-kFS~pmbadZugY0(?ddl8Aa-Nycf2c;BmnD?k0y>S-6>4~X> zH0_BugcYp8c!sUJB!L#&&IKHD(w@QrE^Y=I)r}U^+@yC!xm#s3P1af{=qE24qNwS8 z6{K0?%GtG}A`*G`*W!VbZlZlU6|Bb~EN`GLoyZDBO4zeofqr=$JpB z-~0Sk&=<$FAvx~qTDKLKy>{4uB;fwfZM+5|OGN7@0rwHsTh~zK+#>Z>nha~w$85<4 zBk9o5+CbjC7H^73yIspJyccx z-0E{y8khZK$zKNc3|~RdxY54#`XEI^7lgV)r$znpYR=Yf+8UmCj!Zm-LG_55Q6jje zA{Va64)#9vlpxUeEC_USgVh>b5o0Yq$(c;JKRxyR+1(?HTlt$4gy+_t@&|(0pjk(} zELR2-lBBd^sCL7~c3Go}5$%)chPWA~foIR}J@h2)fq&}YsptV;;8EdfIU)*`OyVyp zoCc&RS` zWT11$u|r_6H~K?dcgJiQmzv`wo!lg&liF-m1xYzQb%nky` zX!gvtMq5Fr;_SA(nJuMaJ`b@!4@cWSwc_f9{G{ixi^ep`idn`su@^k~O3mkh=KKPF zPTVYL&M(Yb=kL*oZ{(f%Uq^i7a%5^R#5ZEm()dPxI!s!VtRroh!qSwpk!srFuM%@uQGts%dD5i)rNJe_w|4;F_-?MsZpgBpU6=57MM5rHnF6)F?NjUXs@bs1?fR zvbWI>5seINhG>4VUrzdMFrvW|2hRd0emg6wA!mr=q_T!DVb)a;_X19+bG5jc#=Ho( z*54ncrxSS4P)DAJtL7+sm{cL}Ycl?z(VgLYGct?bh-h%$y@lS;;F;nq7zy=3P<`gi z)qX_Ler@RG!C`1ZeD#_Bd8AsHMN1-<3^CQBj1BnX$&!<-otRrsQcLFm(JUr0}S=305 z9>y&O_WRAf$42lOG$P|5w=i89XR+htn7AyHNLskOi6PC^bHJZi+>Cr$RG!%>BM)L|@W%p*S*4o4hizq4#XU5cShw_8d#9H4g=H`Crfx}ERqF?4k%1#=$L%!L|BXUSFqTpQ+Yf^@dcjjk2b z`0^;PY@;LYojOQ^>>7QYxMQsrVqCr5=x|YGsYWy7CotmT=Hn1vuAKlAde_;DMI_vH zCiCvB%&Bq7+X{ydQPus9+`DCNY{a>U#79+2KK0n<-jc0z@Sadib)H8dAg!}Z$rN$R zLIDZjzW9~+mko2!I~UW)yK?Hdq#*AXZ^RndavplZ%k&f{%O)oQ59~_kEr!Yd*Nl@Z z#;}|hlSt(dN=Nr08UJex!%w9H4Ws0xgLzWg@-QB&SCPo7dZ zQ>a=rJV3VXoEsT)cdQC46Eu0^mQc*vKt&$crC2wvopUh3FQ)Y?^3coR=HC4~=U_bZ zDZ555qexA9qrq~*WoP(zPdgRwifAM{eGT;Mr4MfIed1KQWN`Qz7Y2rND67b}VGXfZ zAseox$>Y1RM?|e;|CLA2>q+*^d4Shq(3WbfJls)B*F{2M#Bdi{wWfZg*H0nPCYiGo_~$`5~Z-b)+-9wbu4kN}BHJ0y7m;t{Ef zsByS+YHri168Ul0!4p49rh0eJTNcm1d2TuRuzYSM{Ph&J5~+DUm^pRG!|j7Ks!<)H z&sL&3cFR2RqrG>(`ON+Sa)xpa&i^j#q{x*-?Zq~7>GDWG0}44X*S*TQT@xpyQn>Z` zk=uUm-1r7R41i_{Qge|Xje3|qJLV!SBZhP5c8{NcMxx1*kkE7nZ|N*Q+*ug29L5WI zn-~xYt$G>BdGY{d%=gzUP#=#2+(y#l2_Eh3Km8Kk7>tUJd*@beG}6pGq_E}U$TUPc zD~n_&wyC+Uaq!up09=yHZ!8OSLA0Ak+EIv9kJ27zzrq2;$o~|aWh|j?ZV{En|r^#7$-87#K!_c>n!q`{ z%8k7yY9@W0!+FfbiQb>wR1!lqaAME$CquL<4@As42iNgisxC<4CBeB}Ba2(95bo>I zn|k%&92{S%m_r$7i~d$C*LIerWhr?%ME9+znNQC7)gcDx4q^J9&eNK7GX9*o6W7%o z6@!#~B|*1TE zdLAy1R`BF6k1_^X(u_1;sCBYMSG7rb?q2&(t<1)k&m~V>IwzP9k6t#ni&_q8wZ^OZ zA=WEImO~m$$$x#^#-+Smw;T&t0ODJ&vSeQYKOt_0UG0tY$UB8OA<}fLGV9$MPJkkI<8Y^uzml zlHDukl=g5jUr(zIQeTq%X9h>`;#P7b0)URbifqo(p@VK4K!14MHdktL4X#mQtR<^2 zoRtXE8pi?lPo({?f8>l?Z*EWYejLZzpgJ;*$>sSl30aWk!Xdx6Z1jhMD6k<(LcVWK z&mn?JM1!&YjlI2gnliz*@-2+A+GbWn7=Jb#G9)bqMM6oL>{=^s=1qk!Uh(wC-n~h> zz_6t#kUBrYaz)ybP&y?Nb3@}LPtrynw#4-DrzQAs_*LGlTlnRk6vux#n5FZ4O~V;tC4N?*w9;p+j^&{ z+h$%#j^IND)zq(UWTl3hEZq)DvZ|Jp*gu9<;9T5Hc4n{a+X6R}Cq6d6q>k>JgDnsa zWEv&QJCK_-eL29JOSyIK|DxJ(#rjmQ-<$uZ>BHd4p6VnRKchdDWzb zPWw3N)aKUzGl|*w(D}VrYtT2w7`UX0tgBf!2Xy+V0x0#027XE0OrAV?<9WR=H*g8r z23z-~^d{7|_p@f7N%x#BSB%f(`Y#9)?T+Y2Ww!}UI?pvj@V?Y zArGh#eDsSpCPUPU>*Up_)&2h7jXg_e4)LAMxX~D77_&(O*H^0}Es!sF@mq_V$;aQm zY&Uu0y*IY>wtob_HKx$2(;lu8m$#}+*RPSv$VaZg_lcWH)c@0Sk;REw=Yu3p`Uf@n z-H0R~%SrzjF3_Ti1iJ0)$yY|E4yI56hxaZ=W1cXK4F$HN&&cX-D88q)9O^J2yo`>@_pZjMh-koL{sVTzV~MT3)2^9Afg$XJW02-1hc)D6%@(V_;0)Mcl;QuVY-Vz6ml)y0r(sMAUSpR4xo|%b$~Dn#GLl~WxZ=|{kngqlLuzI z7yf_B7~Ql(k;)d5HU6mDchbtw4Zna$)b`L{26r#@4D6#9@^nAy?;s6BKE~5|pfoV5;C*_PGS*nKgu8`Nw_u(6dz(+(v3B^16+UM5Z z_~!)62jaX1J+5geIttc6*Og+jk@h6qwX{E1-wVsfViHj=M_Es*bP~xK|FNMrcQ1HR zZH2~u@;afX%@!hzxvTf4-9=9oF*Fdp@ZX4<$r1Oj&g(_LOf_(gOOdv6T}h#wl#~p5 zo0ONc)ttkKQ{a?eoA{w$P-s=Yz zp*qWk`*CELrVi5JS3cA9sjG9g{(KO7IpJ<)dlrwNHX)ale z+gc3W2X*HG|2IEM*Dywh#+UMpOm?f=#>!ewSvT4&>RS9~UGg|SOGKiMRoL#+&u;F0 z_i<`Yq#g?zWXdygms_zg4&R4rje=7yo{}T%gx(+-+h6KGDJ}y{MdpFYH1rWRl6ChsLQ@k#>7wG zH=dhYKeCuY22^8M+Y}#j{g2R}tytS1#rN=1IpMCzx@xO5+6Za$0iMY(pPgI3W)b0* zsgL$=5LL<4Gh zM!~8|#Y%N5WyY)1mU02&dJ6j2;#T-LPDQQ}@OgVrJ_Qc@Rt_9J>7xU#rE8Y2{_W~l zRzI=&ORH~M-B}%7ZC-NaYG(E3)k{{rx$31=kF5IKs_O=RxMXxyZPi7qw5!fqg&5(L ze_8qZ${($KaOGVquUc7L>0frz%JWz5TDfM$A6ER=itn$uf5ojUKDHvY!ZA8Ga_8uo zE95J7tQZEjbbNl{VV^1EtgfWS*6bE z(Nx<8v%-4o5SSMzj^vnstR#O%-z_ET=8u z+hg%`rsZT&&7n|D1r(mud~;lqb+Ph5POr?^OuCHmwk3BGx9JlTKIT++~gO;5B@^CvVp>MV~^}ZWQ$`Mj6!c?Jk!( z&g9Lmik*{rkl*b89p4_R*PNUJ*v_&}(c^0VN?H^t13MB9<|T+6q|ZNQe#v)Pn4QQ69-yRcGuM+Reoj zXQ?*2MU5h=PH<;Ag?6b&!*Ll~+EFiR_bH93Wfh(fYigrRJE~%}a=TJiNG%%|+AD#i z)TPz13X_-hrQ;tQ5GJdbvn5;&ZxA^Hsycg)dVUVO9@eilA}P~U%*wZaOKA31!%6KV z>#}jO)Fik5&OY;fE*N1Oj4~V1nu=<*L{r$dUiejWPQ_*OYN?^zm74VOJxQTmjk=RH zCSOhiP)}n_53oYJs_10PvHYY==d?of{DBp>;*dt}?@*ZdNMoFeMpPkbgXq z^eUv$A~R`=84N(#VOH?$BSE7~Ud}WP@?@oGQVi*Z$Fb&_bTQf~%51?>Ikj*7UV)%A zqe5feU^5k3dKXvN@;1*W+;*w`shF%3%BPIZ-vdL(wDrH@#QEbZb?fXKVT2z{hX1wxNPMs(zKParW z5Q5TJm9gP+HUssvHapmt0+1R3bBS}t&3=>HgaTx-wZe7@CfXfovZ#%7HHo$pQ?7lM z|AAmamSAe`XkC)(woKjV=~|)PYQVM#?knYWti7(TCWk)2e{fLB`7x$#m7%0aN@dKI z!t;_^p3&Fjg`BVA1Q_;N0{?&|(v^A*@o+R`k7?wwjYa->f4f@Y@>ZQDQfVm*p7ii{ zg!ZQ1!X(o2TD{De?16pEDL)ekO0|OX$8^ScNQ-*Xg|ki*+NEs+$9PckSZ+!i%CR%w z6WS&9FqiLETt1Voo2aTzy^&uheu>G*#k6jd-0G{xGAd!&`X-BvG-0yKYbZmO@Ua8$ z_dj=^%U3cNIS%R1sbWo^ut)^fjcAGywMn|}Klye~%g0KU@_p*IbF$kp zq`3)UrFdF0qtxGMS8AEGyH-!1`bXh~8f)cz-9k>|4{{oLVcD%hdztM@^#BuXnL;&1 zQ#t&+(C&%bTWGg&R<5b*mUXF)PP0#`+;p2ju*Q6>*P!N#HkmV@ z;C5{1+ubQ({+BDLep8oqQuq9=kVIZlalBz4J z7}+hfyQK;?Xlln{Th2H9g>yEdeIE`&x6W;5EDDJy9jqdoEqQv3Ux}`oT+6t^j4wEu z)>VQVEIc1qRx0OA1q*7SS`2ny@-$(_T+v_%ASI2uLQ<`oa*5M!5T5t9nn+YgyByJ^ zX)>2ObLD(HXO!-%`u&o8n$fEZ+{8S=r7=kTK9{E&t#oRW(GPz}ctKxb7@tDp4tOP| zR4IM#e+cc8R)KS>WICxeXHG<1Yo(y9%No&Ql zukGxz>;J?v0!nR}$tWyVm%ePvS)v;`p2DLS-Qr#=GYyAOMUQc*gQ$%OVDAx?~ziUxCJ1&1*ZV#I#gSG6~&BEgfLs`n` zwF>2=yr42D)=AJ#$KTvg<+)Tg=~uVQja*K}2%3($nuv3k)ee!KQe{)Rl zQq~QoK)C?BscQ59&);kgXIU(sOf=YuXRWz4cMI(Xjh!i4lNo~pKok;{Og35>ND2yU z@AP|?Mh5zN97N&b^i*e?XCMY7a?UF<5={V5$g)7dtgs{iC@LsWF@4_67W4|E0eR`3 z$(-(fzTa_m(_IZTT@_iwQ&c2$!pRcy8XH`$7|mKt`Ak#amg@EizZ-Kw6}9E7=_1NT zG#Q;B06d0tj`R9mUWGGP;UY1egy$dh!!44|N}_3Zw~~(P*79r|D9FdA@(qc>YR(se z1>Fi#Ij5M=x?(xT&Lz5SD`2bBZXb94=Y`+Z=bdc4(6S`rMXxa`JMTw*d*4aFKWW*$ zOMWu4Y4tfL{eGok_|l;kbyB=`@|A(9dxmfg+q zWUZJ++(*B8Uhh*!<`5WLPuNvysf()`>KSc`Ws~H0FTr^yZbnJwJ*Sg*p8UwcQdsd*&g5};UZ_5}} zB(9LP8mz_}C%3$KG+xHk z``ass+8HZWlc>nnKCcwXe;600b zV{NUpT2?D*gH~BWNCF9v33J0F5RxY6oQF6$=REKbYmBjh2MF709_C>!JWMnoV?2N{ zM&Jk-BV)j1M6j6|5oC;s5B}=unU&^x`Tzgu>^VABck0&dSY2IJpOi@1bpTun92OdQ z@5JLsmeM~CV9%6gYR}=sD_$^~Pf}FYM5~ITV5-o$Z&-#-dmAp3xjbaqbl3LAb#H@r zWA!L}5Ah|WswSCUBy*OudA+t6@Zk%KO{4u(wCg$7mJSxjZ{EZs$~?8_Ff>#-D5ok6 zYx3*7%39V3NQEF_*?K-D60=9fwQ`;#(1idv0uGlZ_8~zlFM_@&jzq1IF{f#L+NV(| zRDjPc?g&L=e+L&JhldX69Ub@YnnwEXxPd^>!Wlu?a!^sA!L2 z;UVAr5t4uP%lAMb99g;tCvuT~H@G8KEzQ=f(kv@wotZcm1c>toq02ZtB)Mf^Qv=Gy zoYiyQorz}rP4-46lI-T+O!X*b>0(1t~cfNRM z$ry)+F9A01KJ%4zjd#DmZdlND<&3Vph?Y&UkbqRnTdWZ&K*Dw82tI;X1uhR#1%AK1 zaqUMCVz36MT9L0+)sq?{!zK&@N2VZ8Y69J1{uxN%^3c?=f7#Yp`gyk#ahetB#A4DD zk<&4rFhujSRX92mA?JJvO~&D&{fEBVy!&$m?$e9q;Ez<1iuA}F-mL)WZrymtun0k_$nr8DkCeN9@hm{+3TOc&p13ZWxfR5e>g8u@@aRj9!{td znM$mRmZge8qfQVgus$Nl_aO-4@R08k$lvJ2LoIJS`XNlaZrple4mf~EaX#oM4}vGY zJB+A5ZP|-43~$0{>U)lc_9q#4b+1Y+VJsS-JnP{{Lrk~b9vf*c8RzoQ-s3Mg9=-nZ z9m~miDL&sq>k?g=Wjd{9q&sggb>k^2m;Ao+$}i<*;T93I*$d2TCu ze^Ikroo;NjxgPh&nwkEPIyH8gJ&^FQI-fPK6JS}(juDDjf#`^cLRtS~(8U3$pL+A# zkoGm&Q}n=C6GA;e_-fFUtZQCb&C4=oWm!|?YJR6% zc;uT$;oo`_ibRwV7OPH$Fz(IRDe~SAhvByz9@>AxnO#4*eL?e#ULej8uCe1Asm=Y{ z@GiiUdK6KU!ViwQ_{^z2Cqn4K{7(FoClypVDLIdCvVv2hE~Qa!eRCPwG0~hD=kieQ znM=1del*d9h~-W^){ZNhgXpOx&9&=XQ+qG~6A9;4rb6N{Ym2i+^gUDE`^$_Fb@kFEw`4@5vv;k9&gSsYf$PtQb`yWLy7A%K=JtW3)l+*m zLTg1jp(KU8Iq9$03^J|P7*g`Oasum`OU5`Xh|T=jw#H-YnlcE;xaT?u$bfCS8<4^6 z`R=G#xOtXQ(U@L8ecu2&a6H@=<6w*vMbTn0d-2i-#)i+h&SRH$@tIHa71ZSb?iy0k#I9I^ehrV-#S0pr!*vh@1dsU-`J^B*Yfa z@&tPQH1+oXSBwFAZ9{YDxQjCnEbIlO7~}v#6^E<$cqhCf1t2j1lHiS@?AGQglsKWe zX!-1qH1;kXgJ|J3Tbd9GZI?y?2_C>10Q4Sea$%StC}q|WvJ#!WrMY<7tdBri&bNC2 z4NFdHPA<35P{s@5$OC|yqTzc1j|iZfDtMNz+{o}mha*u8pzgmt+L&5-?NuF>Ab|Ol z=7N;~Yf-_0?Issgc#va!kPa*huOskS04O~yaP~(VQ4n5eU!lnb5R5(eHm=1NRHv~t0NCI)>G@?orP1&H|en>T!j&WFU1w2X; zdeB!?ljO1Qz8My-jZAYblxW|B@es(yn%3sbQK%=PH$?3bby0-QVw#&q`>Bv|xPS9* z>7Lc-X{PxZSqJxg2gDs>K^$yVr_StyE^l63)~o8)tln0NX+!86{O0D-ekvddzIHs? zx$NmxXb-=u9r~33_Gb`v%FM2pXH$7SYbx7|LXlRV1gMm4py4;Sf`%Lx;7L5U4ZXRw*$p@z+}1q#-zPr&eDl9k zCvK~5YuvZ3X&G1o*YKw<@{WAF19?9JQPAhXu=}M3r_=4hS%YNM#jBD;mUWiWaXZBe z>N{)AB)Ub?1l&w6Yu{OWp)SCaPp?J`rM-^bA|ow_(+5e*LG*h$Myr`@(O!^SiXsL@ zWUyCq$mr0|>zf*n$ePQ$JMX7*5Cle{5CoC2t1A2XB~}+PNFt$7h_)w?Pyye}C8Ozw z1dwNUX#Xm7hobo@8NW~e9LDbxO4!F?mtKONJ}|ecO><(;FH| zEom|KaEqA|kpSzh*<4-~?M}&K=yolh3LG+I)Kh1ThM?SFj zJC~d!B{Qv9V>1aU9hAkSvKr4+Q2Fp43X!6g=Hxh+2Zx=nwxMIKy_q4m!7PJ5!I_Gr zPvj5>RR!c4ug2>v8>B_D4t(DRvy8(+d*^AOHJKZaMxWYxEwI8t`UYn$lF@8novAn* zvB|OtwM`qvHJq?|5rB>#bi4uuI7kn_62hmi|L(agncdtaq)f0K2n{@f%j7E)HQxT2tSGHWTzV3Etv zum>y#E)U8=f4&_>J-q?6=T?|0mwRDwgO(U4f@rCZP<|&RH2Z5>aWbK-@Uh4h=p}D+ zbezjWmI^u^@fL`eA@i(d#(a;;F>_ztF`!*e00rOAdN!?pTS$5 zNatnfl;7TZIx^EYu0|IPz4vo;-f8gNA@#O6+`YH$;U_TkX{+R{J_a46xg0e%+`Q7#H+Ay>S zj8zO`K*p*~;Ltj0wb7H~d5lS0wL9`3h{HhO^3c?)f8B=G{q99A)ZF@?6Os96-yTE1 zy6xOO=-ktq^U=0s6C-Z#k%4fs-Gs|7y@(R>cz(6Vn`dPd8D&=_Vcc?fNb)??D8i7# z=-p(m#TTbZ_ent_={|+B5(+a_o+YN>x$8A?$Jhmk7K*` z8Qh0(EYaZRTxEh%LFP!kR-=L$eq3zLJJlL7qI|IMaml3a!reZ6tYBhZr;({tA_l6K zw8(QIv?|ctG|nZX=?70&H+Bb_owDJ3lryj7<;!|A!^WyHgF@;m<&)^SFuamW#{OPy z!x_PcubQ|lcGIbJs_Fa1 z6##(D0Jxp#qHGgNe$C2l?0QFzZR6Fg1sj%wrHxaeCNUfz;01yZ18uTHur^Mo1AI^{ zXeGKl-&_m;VzWI0R&u6SWNk;WiHrP#@e7!nkiH0*Xc*$q2^GnrNpx1ZxpD)0WZB`_ z9!0O6rk<&#ySg=uPA`M43~81rz>EZY*%&p{l}W&!1c+Qs1q+4pakFw81M}P0K>4_0 zb9lpK??eIcwov%Z0?3&dQ4!Z~1FTKCqK-^g!gt22@SU?i(zyDqe}VbFw%(jr0dRX2 zgFOK_h!{#2@X=_f(w4FyOBGHfXV*c->`yeN9{=c?ffIS6PD1Ge6FsF&Aj2yM$kw<4 zav425jEo7@jN^FXuiVJvAL0I)_0h)FCx~W_78gQund}i3D(pcBK1MvW@Bz{l&Q8Xj zKv%~j8i1ZdSDDmN=Y^+ zchF*WFcuWT6~$e!Mcgq3TLhPfc0G2_HZ=0h-pt){FfAH)Bf^XWFa(xG_nvzg9TQ|Xu~=Io43mg3CJJ--8S%8 zy6@;F<35Kh&5;v3cr|G6B|T;Le;dSuDUX3i$QB;)2ogdT>blfJA$!19rqSJ(!KWX4 zDVXvc9-1os;|#R((w?qx4C*Y}h8bN|VPi?fDuY_HMk?j|(ut0+^?WhIr;q458Rt33 zzdRLe=dFKUgRI}}ZN0h6KsxNYdXP?bU5QKYvCx&U)RT&MjNod+(xLQNKN%Ni$L{~t z=-A792R3kAVK|39IDwM56&)s7icJ>HvYI&_%uC`OMc2^`Ej;qBqyH&1y+;cR_d&?N zK6FK|MJKKV(O?$hd{3gLR97_=Be`NME=YUxsU)7En@9Vpkm35x&d$3M?Ypuk>cCaa zW4ckokfeDsBx!yZz#=qZvDdVx-b6YMCux#FCf11qDmE%}CC&P*I-y|D-M2TFtrziyjQEJ-yo~c4 zn4HPY2y%v3qt|cheg>QeIz!9_!n;F^$%tfhLEwUuMZilz<(iIgA&+JRN49pP|2gQ$ zK@wSx?!LL#Mt}M-QQbMCy3d+cvXqeFi!1?AkjeUqbX@X>IU@61#(56yyYu&?fH>ND z%gl(rm5dX|%s2^#f>7=cAbEIsr`v0?bcCZ1Z-v>xVSzPz({bpcXP;k-?6>s>UhZ~K z7kmyl<1^H8z)H=rGSuByLj;i1=%|EY5Z~TB4ss#-$Y_u3ixbf!&wRcdZMdT+Y}=in z9ZX)F`APa;tTmSXVK;=qRmD|T9;O@g+A%x<#fpw7k}vCj4DI@;2xt6d`&Xk6?(BW} z#9g2$xFB#&D48Jg>Z}Tpo>@66JNKypYE)sn9F;V=?_yKuG(dgS592nI7oL%05VBoi!s% zTvpfuhH^ezlSxZy4~2g6Ae`*_sOX|~0;ngLd}%e>@QdErqjOr2Jp`u(Xvs5YS~8T4 zCRwIb_A)WIwkj10&;<{{iqKDn3`-NNfmgh|8omEePvGK*p;zFT;00M^Z;_U%K!sIT z6?s)&;ZaCqNcS*&Cx?u3ku@M}{~zI)@NjSH9QYMBF=45~d9)-u)y&fx0<VO z2#ruu!C2km3|^t*_kwmDa%Y7`7b#v^(|GM(@TO1r=`6p(@YA-kzy)zNQXe|)K2U>8 zhSZ#ow>9p%uQ`)Uu^2CtXF{Ex%jdo}bkpE31{Nb2VjmriM_6p8I~8K5&dn5jVQpHa z_IlB-{cuK=?}Jk>m$P^3<*n#{_Vq@_Zytr_hpUb-G#I(+aO!kY2P5=r0(p@vs#LKZ z;}Ere+Z-L^@Stb|TyS*`I+qY1?UL*uLXKOsKi&R;iAnb65teu{Pklg_*|7gC18sQqhbH7*$)iVo=; zDKNh~*B*zHM?*rbUcxegNSM!O0q;kEZvQ>}o=YYL6}S8W8~b%(&TVI0cDG9=0NiRQ ztbfhp@DnZ>8~cXFvL~8QKZR16*&=IXjKY{EB!cj7RDTkF!X+apt-rnT{*!Pd8J9@p zkQA%d`peD&rDGYSdkUsYKNU&-3CVN#5Y>3(sV1OQ!qxmq9b|yLa5X<4{Kzv`^RQy# z)IPEo$?A5qi{cd`T8AoY;pIf=n*E>-mke1}?`}gwf9~y=o1TG@0O!*z2qHUXuvBnC z%$p?^_p7bG7@S-J&p@Yf$enDI&QkmQGrdvu$zO=9%#19b%Ti6!eu-GC5UDjqCWr*j zf>K;E_>K?mKzBadQ|gK5h#(9)L6oWqW%eW!VwG8QU8K}H{Aj`RpcID;$?8yE^Wrtko6L*B8@4XDWHHU|MS6sen_Y=3QLWf@N zwI|HYj^%3eUIj~@%R>hq|KV2j$g90>KJXgsfpGr7 z#px~?{^`)GPy(_4{85AVkbOMq^n?OzP8$`L8BHz=HjMd8eEv89igS3xZn6Q_r?GH4jEXbnSoWzmvZW`*6fv2 z`b;E9p%>o)SsW^OAzwfJ7HzZHTaMp@B5)-~uQ-`zK5M-=nZQigL z-O+;mzmJFpG=C*Ur_nL(o>JQm!WY8yDa>@NKNq!Sm~zq{5j%LXv@wA$I0#yC$hh7+ zSY%Lo8XY>=6E^-H2!kaD=N@*K9Gyd2qXaTrK&@waQc)Zk-UDI5elqMkKAZvf1nm9q z_2$Zf_nVt0&YsgL+kIJ`qIT}M(d53v=kD31TDZJLy^4SKyyOmB)apX zo@P(}i!>*OgdiVT(HSi{nu)7Ic8e!lGbGW-#~_SDM!A~}Bu)ce^l`6me)I{^>_28S ztHo%Qm{HM^ie2fi^5F9Cl}|tzhm1CS+5!|~$MdU^_0yiP+-J~cuu0)e#qK7hk(web zFJ#mRJ2Mgojj75)Jl-4t1tv@8Q zIE`#Ij4t}3xoM0;hCNsat1LD_Km4Mn9Sp-kwERor0k4CKWQM5hPK|)V5q)K4!I-ai zRs*jECG`4(Cd!kDXsiaSFst*UQ`WUsqF)TRM#nfjNW1*FYrRb_m=U>k1VmbOW$+x?^dEmM_aw(>SHY^Zv@{9VZGhTAYOag zFQQUzL0w)GntgG!LDgE0cmu78F%ApvZeo(gu7MUrqXeg>j{=QIxNSfpFqY}G)Ro9+ zg92CFhn^h-jkshC#i(uA=eHn`+2r*@G6faX*~1Y^pj3&`FNfeKTrvrOIpe7AD+gy@ z>9iOEIl7qB80w}lZI8uJeWZ0f;0X0m(XKC`MBe|7v>XEyP?0xB(*Ut$6`PehI>4g9 zB6uU0ObkhH2;01iM_cQOcVy1bW&rNy{A}pU`QdpB@z}Y3&9`h1KrQSpz#V6VbcW8t z<+Bf+#y$VM>Jo@)S2FRE3ksQVvEs{zAaG?(&!cOEuow?G zzyX^sZjd|pMis79=LPfO6qqUTm953gW_<(=T>Rr+4ZgLjTN41s5vV})2Vn0(twF%t zGr5%5XB{Jg&R*SG4B&gSJ%UZ`@_4!ND_I0hLOK0Pw zeSd+9l%(3r_F{8r_xje*lC$vkNC8uL02uNJmZts<5Gj% zZUUUq>o&ADk8#LdjM2y&Yth)o-hy$;v9SDDr>4h27%|FGF*&U+RLVn=q8P=G z1z{XA+9lC-Lt?fscus@P`^Mu?I_i(3|DOWWa?^rS`LQcwY5FmI0f z1X)iUoxTZVbI54m)pKx6`BL?hFS!ACx7d{o!*bP3)ABTFy_Kqjto&r9qKZJtkLxICS`Hak``C?(lHSjrnMHL4W@DQI_WHX#iCDubsq`2jD8b8i!3W!OVLiIH96YPL6Z4Z zI4wX)6ZAUMB4Nh6`J^RQzz`ybJ8QlGSG6%qqR12Gs&Jq=gWuXb+E2wtnV!p--<5>^ zBp}0R`HW@}Awbhn^=dSka0C39Ac7VNVfW#Z!ReTXF3LR)m*T>nv^^p+wsBND>7q1G z4D9Zupct`ly<)Rp$r}Cn z0PU|?#Q?5y$7!G#m)r?!M@OID8{6BqwlMzq^yExq)g1+YG@S@~`IOB=XVCduTgQ*~ z6Vbo}xO5Q&xuXxZ_EZ|%2482KnqC5u$SlzcoIzLJ3#pjmNW~wckYO7P3l0_SdNU5* z(2Mh6-fZj1I0QB?FJ@_2cv3ifu^>p8+Cj!^Z2xPLq8+l0f~`zW=oEm)EgG? zU_)2n_K?70$K?@->JAvn25Ac-j&)Ph>+yi-NU}$2Dw*98tQe&}u`a?ALEn=>!}hb# z#53O_krR!7$XXEL9yACcg~Tn>TC8Qe&*~84pThaIpA5A!S9Am8f2+W6=TA)^4R4op z-YzKFWCh9_RnbCmI92!I7J^!reN^xhp8-9(|Be;t2J4d3(D?g_r%`rGYd*?qTWh;E zq;bw@3O=H7yBNWr>qIUaz>_HJCXDIv(xtX4~VD%Mn>VhSM1h0tmx zJFMp%9z^DRxw%`YPU{3a^6G2WZQjW1*pZG00KViq{Ei)|RWlifi4yB7!C)oijS`99 zGDGwAv(WU*-`k9?KDb%h*m3FQb|}7K1!J-kQ*BSM9w`3`g{6}wxfMz{C-_**3iNj? zm{qes0w=})JN`2D_6JvQ;dP3ofkAj&&+3BUV<W96pI5>$qtwO@d$(Na<^6< zD;6A4$8PpV8v_@=4R`$Mv%ui`Pj_pAMaH%kgATL88B5%>e0DB6 zu;tuNum<1>U*K(x1CFvW>ajZjBN~cgLxnRyeuKa^2>aL{20Qg3FSNt#k2Ln(vlN0z zQfIZ6fDj1}ypA2We0DBi>BO~Y;@sBPg}cYkZC$@)4vt{xTyYG{8M=A!mvdi18+dOw zp(y3_W|-ZiC}lokhPviLO+lp)GhtO8s#1kv-{6wb#F=YhMqc{8RSkKh1+iD=7vYBW z_3dq#8Bth_&YYS)oGHQ?-@UPahVN^}KFYogsU6q*T1WNd?u13|5B}Dc2}sh8@M&Gi zYUAtE5x3ii1_PiTmyD03>c%$%EziI>6*Cu^q9<32q{UEkn2*{)SSmPFL_O;_G*Y3K z3SVtZ!@TX@s6?rpu|_*+VKpp|>G-(_x;+Xn{EGbW9>A~oY~FE=4ePU~46O4`O+(0aw=}EO?s285Iu!m* z)mbes0|-}FfN5F1pfx$p<)K~AB+h93^@0{;0+BI;`*!HU*3sA-ayUv~lF#L{j6MfB zWyyL`;7p)m4!Vs)Mu+~ktdoX{nmO1J4+~sW0D)k~@Sr1!ZRIpMSqUq(G1hn}7%qrn zNL7GV<&x0`;mOCN^>=)_96eY7qu{W}mx>?~%>GkBB(V%4HEq?(r2J)(Fd?I4g)mxP z0+C!YSo}ZRioR0<8|$#NJIh2t9H>ter1f!gmeG}@7KJcf&1wDU?`8O64jJuRc{j1m zy_G)o&aZ+%umKLo>bv9We3A~=VilP^Vs$7fyezIjf2_8~#<@JuaSPZ&Ti;lNPOA0E zHPm6+mFfwvfwn};HKoTbu~QI0cm?cU|6PYYpUXqLE~sp8{BIrh>D61n{WiZd9{YDB zvRQ4Ob)VYv<PQXyb4m6)?V4&p1YFV55Va7j<~ZuYa~fgm8nN4r@H8qc_0u*a#w5FdZ+}%JF;Y} zjPo20grORH-uchV2axfbEf2UqFiZf{k*#Z!u+dQ_c@*OR022Yktw7Ixvo#9tkJ%nU zfQ10JG56gW{TkoTk^A)I11CY!)dtWUlCF~2X#+`T5G*f;VyQUPPY$WaxX(8U#bQAp zQo(EwgR}NREkq`L?S^#OrLCL3W>l>g2!(=?mXp=rL?`r`$P*97j5OE`5aem3 z!93{L4USsJ1lz<2*&`R(*&jyKD>Vx3cyrY%G;!6}wp08n*tnAr;Xm@j;olB@IRBV= z`hn!AyaCg|4o4r@W+5S@n~=#F@nj+_N6GKC#<{Zr!E6wq9kuGh#*^Q}KIy{?(s{@txNbNvqbR7V%969Z$uI(R>8*`l)E@r&mB~2x`F%&S6>qeJ#)Z(0JIXMJYl=T!O&GLM66!73&e5BxV|-5e78WE*X%9t zE*d~9zt=jZ8`J;8IinkoS~XufFFo+XMWK;fhtYn^rWQ^>zpisU$4MFFcrGjzG)kJ* zm;8BC-0ZUnJ2PgzNF)&Oj#yP>oad0`+4H)0q?uce*q-L2UAKa>2%6`Nnc*e!SUkpz zLE|V210kCzNRCCX-wMZ~eirim;D<0SzIbIVlH4{kF7AfIUGR1=VZl3!(=>>8RN&D` zm9#a-x42?iO+rhguIDoppFYA{EaN`FUglvA*bCDO^Xe*+6Qn*csBKu(cXdIAK!TW zq*pc!pr?Ne&Hw0+;Va-W3sPFTmsy-WlI*3M$2jE9)(H-s>Ug7ZSIaaoterC&U6dc$ ziAJA(VcXgVAf>Fk%Zn9)oSN}h!_kV=Z5CBT$T!)ZMERe!CdW8D!0tQ^N_S+poCeq)gzQsLdXI-A`?1*Lmd(lqoY7Jz=pGKk=RXLCVJLZ@ z^r|3$Kkfwt_COsjzo0t5ghn?#*xIygR&HbJ+ApBOKXwvqpx_fbsU04Bq=Jv;kPuMA z*JQ>zP7Z)(-Te?;oXy7Vv}pHU#{V#!@J%j9%?OB69=kFQm|S%@<@3FE3ymyKwN^kY z9cdKJ`YbxI@)aGL_|@0%^}m9>9)iz^i~XKX$szi1@ENQ}IHQNGN8UiHT4$^xwIwgg zCIu=QjsFe|@}KO(mx%p5G;O=P6J4*0&$d{SCYV4t6-Ti}>;#3ZX$x2~~2jP%VHE z8xeU0wwaDZ4U=)6Lza&ofeby>-`1d?{-*CMp8YNP3gygKh#0S?%Fs@$Nx}HVZeaw! zV)Gb>3_f|hp}lbRDs=Jh`Xv7N_e5#MjM9NZv65qTC3ie6&{Sdx3LW@8NaTP^zecTE6a_Dd0?nB|69th9M7emmG2jsGYc{AAPD%UWxP(KYk38ooO0%z^*t;+}g@-^!+dU{uSO+)tV zVH39FfqD+MZy0nqD~AlasxX!>F$r6M$Mc5d0#Tr|wjIr01piv}ctV3MzD?E8houN_rMYtyEr{Zf8z#_YE05E-DJnS>W z<73&&AQ5&v$o%QTy35~!raP-DrD4d!@;(`rc z8wK?NX(jD4O6pWygl>Bdx{yl-q?MZujc+{P^@15@esAU$vPM_^6@JepW4D{WG5$hJ zJph$hrg4r8d4I|qqRf_zBy9Hv{2IWOGQSMdheIV%9nZXsqdFW_Z>|VcwS09i4zsbw zk@(ftrg1JAS$;68Z#?)aSS?*sv^-~2wkS1nEu5AP&0hz3E@;BIw17>~gBWvo+5_K2 zjx{c~CMRayac?ngi}9IylI*b$9cn>ot$rS?Z%|FX188y4vd5OAwg2cF-`hTf-UHb< z35Lk_FnWW7Hc7&=vQZdx*t+}o6(7Pl=J3$2$m!t5yX4oa(7PY@i5>fh%tW02LS~{E zDu+tgv|BCY*W(iSM^rxhBRoC&c_hOKioJsi`=h>9Xb|Xxka+I@5+)0m z3~)&AoY8n>{)Y>}0K`9j>#NoQxJZbAnW4p)j#cnu)Um_gn}Ul3YO1~LSc(!e%n|n_ zvpl`~mf;f{SFbw;OsM}DX&<#=ThGjc+*q)GK$=Pc_7sN2R6>A{Hi6E$qP-He=eFUV zW7bEyu#@RU?W2y(KX69RrZUMRd@vhpfc?Ys;LDeeyU3X$@?ISTd9y!)cHMvK@&*Zc zIe(N4f&dK2p59%PpBsY&^?-(C!XLL>VXQnd$_%FgZM~~&}@%3t`Z5b*#}CZ zD~8*PR?x~MAR9rj5Zvn2laSb}OaZEB4U5}6ISUiL_StzIxKq+_<16tu836PXkdZ(! zXty}z7poxd_U4iHre(8o!S+P>f@)EFas`c3fSqx$TJd#G1zNshg33GS+C}Y6OJ`%E zfj6J);XVaM+e^TJPB4%;95u!RaKq(|fgugXu%>&afYCVtR`e{7K*qr;Ff_;7Uwa!g z*1jHB%OSNb0qh*A<(z!DS`MsazM0cBYb^6(5u4QGNy%$ULx4<;>52B_Xg>>9Z&fD? zZWS6>(*BD0L^@OW_{sKKY^IzyW2U&0*;vk=@;luz0qb!_u+Yt894Z{Vp5BU{nQR~F zHvf2O`)GVJKNlu1v4m|gM=HXk3T~mRB&lgs0xWD9QY~vwjB$9#CpjPHEshSkby@q! z>w+higIHJ-&Y4*g>ghlrMrDe{T-IB#3X?1myJiK5A3WF-04wI|0oJmmZ6zOFND-@3k!f9sfb_tt$NHfQ8gh(mgF{@A?J2VxjCvaw;u zCsqt-IURwwl1r6@NY94pV6K*so6}yVil}AnrAWtbFB$(g*52fYThVR&z85|zXm`Aq z;h71MWCBpnItu4xOC_pc$nLXIbPCPmiA6`AkvI>c1HSn%KkjQEjdlv#NBRtZBqA*z znrV4KB^*k#>7>@K4yJNibC9&vyCP^S4i6nTZM1VbScMGYKGn0Qf$Gp07^9Dv4?(5L zpJ8(NEHp za)!^uH4bq(rXdY{)mD(%&q0zuNMVad!Byz}t$m6v*#_SaW5qu+R?H!vSH;+49$rY3 zN@)Gvv2xxv71(3OKfp7RmD)_SEAMu+pux@Q(&)ChMOen~nC zx3>9g3~yZ!!7XWzLnKol59Ox!caAD+&{dL|HaHi|m!C>u5ICo%Q_x=|@6cg&Sv@wP zz?793%OblE-K1`B9_^>14J#nle$QRMTisZ$Y0up5V}TMabQYW~aQYgt?L+#2&rX}! z9M2^+>xz&|@~*TE$$uO&G1W7&HdyxpnYd76D>j;+sm0VzQxZKZho5lCq!_eIfq#-T zSa>2vA(j^HmI}{T=c8XL;U`=&{KTSfY*)469v@=alb|JuWw$1hc8WD6Eh=f*DUtIT zbb%Ir&n1(}il1rQhJmBuD{(>?`AVZxQO{9A8=z0+>t&S;oi_;!NktDM^50mU>X5JN zu?!eFacFuHIhAmgbu!whmML@zrex_3oO6sYSNd6irUet4jvqQcJSfBTgD~^uNtfjo;&)+plX3>@YIp5gDVE-jOFINGxGSnr{~>2Z+hN$ z=jG;k=1J`HPMkL}_tS;Ng?ko$XT-iRyU@LG$HI3OKE3e%BPk31wcynSza8_A$p*p$ z#sxbUL>8D9h!(70Fg$z+T5j|(Zqx9=fjb)e_Ke-q1tRkC{SYo!(L!Kxx+;>nV<(wA z<=}mMak{|djzysG;=m8wt*BTp65(K1st zDmabM*WEOKNthsLM!|Elf-#GnE4Rgt!!6 ze0HbKy^r6cSs0%rynuihL8B+Pvk)4k4aioquz?(>Qa+8`(r2(5H8(G}dlkw#lx@6ay6#lZo z>SM(OPr=97iaCbWhc)`NsG6(!H$Fw=(_lU^C2u|$wa1NGOZXf4E?pDN&^1rFMA7*~ zArRm27^d%(`DhhYW{Y)yI9W-Bv##J`f_&nmY4JsN=Ca=c>HmlA9(AD;{s-TyZ`*^`)*5C%(Df3oSrV5>*D&VMhP?7k+_sR2BI-Q|q zHmkfKQfX}wdUSP{4j7YEIB$1IJkCVTL?1;FdL>`iQ$jXjaT^0^ohUKh)u-Z*$|y}v zmJ~%Lu81eGoQzLz#a61&lAVEQKvH!S!W!XGJGz2Yb`KS?D#43lwm34;rDWiGD=M0z zGeKo4>xyS>1>u56J3Z{JD6(3Sh*mkG0PCktj@G(jF(9k4MPt!i z)~Ol59-4n=m#&SmRGKa8_0f3B81Rp+B+Xf5!bzdP;p5rul!3o>KnMmBm789&lU!zawlU^@mT;>duF;qk~URfJhOIBxZA!czgYQPW+ zh%H8)QM`fRRe1{`XMoblWLmA3mla3Zf*_ zbjB=lkpbOK@8I()@~EsFcizw)kc`wpi*mAZ z*(;aii`w<%OG;L|i(;f~*q!uc9R*f%HF-Q6ZDViB<5%HO_+(iisHLucc&F8W)-hXuIVNZ?W*=shF z*_ROM#G}(hd&ULPJkqd&(kE(wM4#NLYx>Xg?hth%&-$CR+45N;gNK{Ed z*{`qag~|$fJQv_6q~emw&lDmKVQ?eamb`Vd8I}Wa)SRr)HbYXNB-^346iz4UpjDcZ zWqn%O9hF~8)L|!i(EzJZun9PL3M_t+e9OWe2*Vlf^k$WLJ45?ucizUjePWUFcA`>N zsY$XWg~}QUO6gK4xv)Fe>KcBS@s=VA1+OO58WK|L!Yk$slHZj5P8F>z$Qh?X72*pR z`-6m@PsrU=)^Cx9Exw!~lCZr<^x{XCh#*SZrdK7(Vu_j&+fH3n#VClYcY5>jxSN*S z;&uQd7s4d75`-KdPY9KgO(iC0Ql*_idCa<;G*v~J%dv2{lh_MPDH5=df#Kuvgiu8^ z=`T}?a-k5VObtE}<7tg_iIr5TgwvOF#P#Qn$_cVTf6IZK~}6X zdLAS22elPTiNEF6?(?EjmZwfTRW80fT@$DbT^)taER|7$Y39|*?UC?Yw%fn?TAcC< zRR*bB=e64Tr*^+79~7x*CaDjatURNt6x=FZu@mePnK$pwlqqetC{bp3p>kcky1P8) zrEx!9Qx`N*8=LS8d@BaJFA$VHlqMyN*qkv%C>dtEgEUX2os3^0Etpd=F(cl(tq#ShE$KAVUe>=+fOq2W8e4m;$Ags?_2wvMya}5;1z08zMxNf<%qKiXb_9 zb9}#$PFhXu&Wh2<$V0vrA9jC0hst!!>X7imA*ZDyxQWeRNPw1ZHeXhE=7XQZc7qm_b@KB;RLAe zdmzbe1PX10akQNgkcc%?(={mUK&o%qBtE~S8V+Z8KBK@EbqEEHKsT|ymxX1=M?ECXxyPwe}il!Pb?uKCgn5}*M7>5caCqC;`{DvB7 zwi&k!7C6^ITqwB4264CP1%|4Uw!1?Lxh~~UK{U};2b}Z!$!PrZA~;0#P{#V ze$cc<=Jiqhj45Mw(WRUzitg}&Kn@w@LjOYosEu$IUF@cDt{id2mpRW}GGXs1&%Qgu4 z0+Hy*@Hg&rP(xtRiO3v!V+DHjoFm$GGp;^!@V<91Mm&zsT&WM;jnA<8NhL3WTL!H ztw{)26c2zf4jDV!WS>4h=!9Und0C6zdxY`8e^! zUNF-ip=919^=QoowO{B0^fh#6yuE3(p9%vt0SU5G2iBnVi9QV_NwR$4svJbaY)}|u zSc68V*Hn@t`RN2YZym0|&O-7}r zEN3H(rR)xPz`ij`DD?dtv@3^<_U_od9DQ(|a2zM5py7PqQhGw6)3!H4p^vUqvoxMo z3$tRrQXz^cl2A>n0IK&>AzkN^6L(+!+Di07p- zMcl4pE~n!ori6!kKN)QZ{HR;P=C)E_+df$ai7hO?Dcol7!$BP&El zRX`$#j1Gk%c@ZLX)}RY2eNB8r6(ky`Zk#{Ukkzb4s{rqby&m^^(;Dcm7pgFUxMVbO z+aJZZsB7)sJr$ln={jk^!I=h(F>Yg!@m69ACTE4haOk!=sK=pxZ~tG9!@*N)(7N;c z2Iuw*Ks)Qyjq^aeZe;=1YY|X&sjTFV3i5o2_^Mw30*n1*65!Pdp8DW|z80Lk5G0zW zZp5Wh$mmR3oPs3li={HvqSBv%q%7lwFy1*-G_h(P)RT0;UDu-*_O;+!J7JIx&lz1g zbjc!WL_6#synF7;1H;&K0F)zm6|S*BUggZWV>(K&C`iRVoxm)j@kKoBQvGCDIxWyy zI0gUaslHeJ?wg&dbt4A)BNB^wK{XlS1)*S&*q%)!Iyd`h#l`K3(S8=1{$g>rnpW-N zzES#L-+~sgOx<|6!UDi%DU?hw=qx!jeqp63AX1y(g1bd750bq8vJI&(>09TM-v*KH zsT*+x0us|yEZ3cBhE7Qm0>0UuNzwRXAG)odj4bTjZgrbKUD2LN*n6!#gueXG_PRBr zAdh&^1C%Z3VpIyIR?Ao_3djPy<=ZewxnzPfdEBLK@4z@C)kbKElb7Np9SO5Afv)@x zXuzSOz1R5+jq&fcJ3&V`E`o+8FN_x?T7iwvDxk=f#p|U|`7-!5hYGLTVQhSM8NM(G zOx=jfC6Hfh<6=L9T`xv`+9n7ILP&TesLLhe0_fUCcx`)gwc zNWU|x3_L`ga&Q&;;nnTM%VvF|G3EUQVAvS1fjfU3nqMH5D#=v8Lgbd!v>!IawWQEtRO+mpIC_J8E zymDy_;!hYX49dvQ%56+v^A40(H(djxef);@LMS?}fkHA+mKodlOJ{oo?bkjE1>ZXX)Y(Pt!QFe>LwFNC1`YzpjN>sC%cKv zQ3*NhrbJ9%Em)0KKc4uL==N#2RO)A;fh)h!y;Wa$W8d6A^(L}pX@W{b z>bzn|ClUsr)*6=jA2-2u7ng^2MMt}#3a{VPw{Xw98RWv&w*ur6W!ais7G=c6c%fX4 zxH0}?N3Qv1xI5+W0Pyf9u%rSSD7xq7KC#dI7{uzQZp2kM2!f5x?#yOcakUz(xaz@7 zsM`qZZvn9!9zc4EJLR&MqYG~76Z@lEVWozqT?S&wN-fA07y-qv(6xfdQxK*RZwl`G z-n|tX;on%DDxb#N`quvJ?VuXk`^Ia41MoT2v*_nASCW&sOk6E zmut~K@9f*Sm)!+o;nc7M#1gw)rZc!QfRk=!RE*Ig6jDTN=q?b;;h~8I_jXIh+%+Th z?sn&Va?&CsXz2|zgIM8?I7Cn$Ky!7#pOenR6-&sRs7Itq1;bbh zYO_FO^+P~jXH2YVfSMd0n*P89i9c@wn$QJ}KCwT#AH;%9cr=J5A73>U85dIsR5TSo ztuET-BTWIrAKiy5)l=-lxTs0$+sIcH7DbL#D3Psh%h zL{~o4UNXkvL1~^GEM&OG<@*oyO}L4NNoTE|>8zA6RR<7FSr*ziQwa!(vgbYwoz>5R z!_fnsT9>QQBMHCgw;#Xa2yv6XC#p_Q(~(4-D-e(BpFr3+EcJoKA!$>PCZy zQ!W8z3JMEKQ(0o81)U8EUA@0OI#%fCp@F9cV3mviWliJV{q4b?VLo~`#*!V^CDag^VhG=7^JV^P#Z9vP5?cL=_Jmn zQ&LtFQQBk@gU)CdAnP+=I&sOQ9Q2=`X+zyX7`n&fA=U}iF@$R6IOWjVj7C-?PeU4m z_*t;rIAlm!e{OT9R>4o6Z3Esh>+}RR`j-puwN*&YXAu3cuy>aJ?zWN_il#qM>`CZ5)_T z%XqYoktrgAj6@OR)w?^7P&BefkS48|z=1i47Xqh|?r!IFpoyel+;_ z+=P$TrLrEKw;SS(L~p`s@9bwGi|bQBUb^P~m1y^y zGZPyR+6UeOsj%haA_-)9t65@DgUaC*=-Egnl?njtJxCpX8>DhrXzvyCJLjF%DDw8q zyv9<$`!|>hunOT~31k(jYo+A`ThPm#0kJ+C1e}=8_rLHr5X<2~xf-06gX`a&_V+%q zXT1YrLD|D46DW@)nP=iuNRUVr!wD8b9}s`~g;Eo-7L0!`8Rt8w8-H)L0d7f}DT%y{w8U1Up=6jP1(tg@E)Y6}ksm8))M<#_=7!4}a zx)=oGM0AlPgr;J#4}As;c|QwHZ^*(-`^|4wqjjJ636*|9+JKp9gEXbhrI{d;FG;`Q zbatXO<Y%-TVu!z&ifKtgUf?d{_!pn(Y`PHTKTQ7z@_6RHPWYs?*wCW z5Gwb(8ylX!77$>;AB9t*$>Bz=ldEY;2k5U^SJ{v=^YQotM7w@6%Dp|<_2>=HJ=m*g zz#g2BzA^70uC{g~MnfcPoY#}h1=vC%EwEUX#*9;pB`!m?c?TgIv!4gqeC=-5;dAp2 z_Cnk7@cV4=U}urT>C>cTG*WfO&XibzCvIoGGAD*Z2eI1uAeO^J2S#qe4yc#bpxfsk z?1i>tv40!_u`v8_4n7%v+O)rHrqa@)pp@hlZ2r!)UWSf73dC}FNb&>qCbZ+0-K)^~ zM;+{ii(|3Z4}(}}gfnIuK>&3Mt+YC+DTM8Liz0*pq+zva4IhM{<$fNl^a!-YDUG@X zecGl+KrGBboOw?cAsy`s3t5@g#;f`yDJPWQ>xg}51jKT9xQ;li7Pc?IDY>vu+y6t? zl?OOdR{2Ta-P7H3AI!xJFbBhxx{?auK<>M8pDLK7l2qlsFOjAN6%i0b=0ingXgonz zaJ9unWdIdfM9@_bkVA0=?TpN#3j*rC%2(Y?vg2RV^Ip}<`_6jb``-J#i>8-$?f`8s zSXnE8uE}b3d8$~+E1j__6m?(Ph_0Omp@W>`p324O*mR$o>t>gv3%uJQLtP##HQ>fI zDFYi!Wr7+5Tw(MCUOEc`2UzIH+3=a`Wg$E;yE3uXEbUu=`l^Wz0CW9fc-8C<#p%=Z zRL{Izjm=9bgBF{Y37cN4CBkrH?bOGLs`W<-U zy;FiwRWaEMgfY)*LLt@%(JWZ(jXOZ>01puhKZY6d+AG^2SD{brrd=?iuuOC?LvSZR z+yL7UvQ>ZHPAAf#1eO}#wFGbseJrF+vT|zj1G`qb;M65-7F(hD*eniu1;`u@#@uAt z?O}pW6>_ax0tBi7vhb+cCmvY_G{8nWahM4OdX#?kAWmjGO}kBE+kr<{wOElVcF z;oVCj__HEy@MA%4mj^2SMMcg4z+{kvkLGtT?cIEGE-L4aEqf4mcb3NYaLfKWD4Gt= zOeeV3(jBgog%tX1&r61yr!DQqv73E*PIB7_4=>o=U_fyMbZ z6W}idPw(U&+j6gP9YNqao~ERMGY{>{L!EZg$zV~J90YAn{s>%QdX^om8_!;Xj5WZV zb{cYkwg7NYekgg^aYBX2Tuzd-0lCgzTDRq2JhG_x(1nmaCn<*3o(o+R&4B+p6U>6| znRNPjNSzbJs6X5DLxVT;q};{3mA69gym{Wz^m_X$K;+j?6(>G3_VCDGhfh`57x&z7 zA+3=1b`Q*G`NTol0b0Nk38aWhTB(B~qcJ^bdOZOvH`vcZSDgFOA#{xBTeRya*b87A zhP3Hr6G-3a_^3=w?+&yYff8iv^(0S477F~|=IgKV?p0qj0Bo_OX z^Ox4G9ps^-PgLH8#xGduNJ-O!7h;k26_Ex@%ax}J*|NPE%2Z-W5sU0x2qFi0=!v_; z1BcK0-e&ac3;Q&E>s?C+*YSBcJkWYoxuJH66>TbkREJb4_3b(%+3KaI(p%6wCG8FUq`-a zfGGq+9)c-^EzTwrF57vH*Whg#sxCk|?oCUJ5vFB73xgcLI{(TJsM_AA;ZIFiXmCX+ zd_T<{UfI-k7>}JVYOv7lW>`A|EI3o|0!QS7fcX3YbDyfWS)kouX$7F&va0ST7bSQ{ zIB(7yR5}Bksih^c^0uBz+ zxg@FIw?Pl|vykF+uzcVm0pcj^eLbLafKYISNmUT>MMAsih~}I+TgsR-CR%QJ_qf3U zLi<_h#bYPz9z7}J70 zH%<$I!~q_haNsVyS7hnRP~T3t5Qez{JE4>ki)}1ziP5ykSl!dIxNVtsUGDJXVGujO z11RZ#m(L8|NS|?EjY5xuw(nG3Ot-Vbr|`gu*RVlX1R1v*T4@ZU@-UF%*uq2=lIriy)-m~1N zz0>c;OK=ZJX|cEm(zIJEQeHzv)QKYRWWZ~o2P1^P1orL$9y)&92_2jGw=L-YOID7K zmr8afv|cL3h!Yg6VnFItkw}K>zEac zjYDsO=RE~t@zE&Fh680n@+t|&NHzo^fKR1hj~yUOA%OeP{coSOZPA%tT5-BdBAdd} z?i1@NHsVB@a(M%pf;!yx*;q7@fUitxfQ)fdK9*Pl^j>c$Vu6)XGM6kmR$~R^-B)>d zWsr=H9{68wv6ci&TZ%i7a(}UvpLc7$If995tED`t&IDrU9s%ATBx8hQrMLvnLswM? zl{|IXw5I}b+*L}0KAnMA2FbX*`_}9d)M|$blXz#s=(No`9W+oT@Y%*q+2Cyt!F2$n13)Mw30qONwKNT5H$3X6CzY51^|VLIY%)n{Ro5lU07JHkbyfmE~7{;~mmX?|(#Y(EdZddrlAzXLYM=m%GJ zRcS9c^Ga;WNU6^F6QJ}bi3ZUr*K6UJ5F;J1P$a3%D`9sW-~os~6qj(Dk8VRxUAgjQ z`8>D}-@XdmhhWSVK`b`3>yA#eLRIa#Xe$+}CJMdd^#+L0TH3I7kO#$H0KnmjUp}!3 zed$9d$Q?nCd>DTQ3t)KQPT*;+&OwCrnrtNEiD!Fz>;|;;BVc&+v(WMX-HnezosX=1 zTBR=d%+=5ZU|QrsS8Q6C0uFPE);3#St;0iU>kRIKSFVOG7~rAf*Bk`Yq>sM29oawH zr)uFEELKX-#$tmBQq5CIo3^DR<4`;)BZ=LFzJCqa+k-q5`@$EXqIKfVE$Gyb^?eYu z*Mgf5?g6vl^T1uusB0ngIUpoG0Z4&J^`xH4su;-mIib=<|5NCA6pGXT`P#n8u;F^# zyHYkc7HzCstd3xuV=XPNOvck#t_2|5F0Tf#YO-?|Ox( zJ-xe_6H6)fzM1Wn*;lI?jbS3CiRn4Dy<}6%fmJjv()-a!M>Kn|rJ_$Vo zb41ELz=PRp=JHk2S7}*WnWVEsqAPZTrDVMsrpN#b>TCQQE@Ez8T7gcH6n*S4C<35)gUJ~eFp-O13aYoHMsbCkgJ!YzV5#L7TkU*1p&7o>LC$E z!j%TV#CkHIZ6$E~U%dsy4)D<32mikBu_QqgGP3@@bF?pHnFh0o%%&NYrR0 zTOlG`WJ0AXAuD_Tr$Oof529H%f^9=RvlU#^(1v!f19vnyrP~_`6E#7L7D-l zsm`TURA1ru!3Qzm%hAuBAb+1Umk+{RzG~v@yMz?L`2LqzCD`;i;nzXeU)e!}mKptBZw?OBkL6L5Qs<$^UqCX^**)WkB@ zlDzM?7ohJ4c*yg*xOegXg{95Q*W%J}zI_MoA}Kooi>%tx^(JNW6dW~!E+qi`VNX@t z7natq9pr&e=|2vkuYRFV%b$J`h7x-H@|6=|Ag9UKoYjC>FX_mfFNP&<{}L!UzyhP| zsY4K{);E!F`!Zf}9{_=PeP~kV22X~=xuU46wc+Nkr(*ZZFgN;H_~x%yYSsOfJ}s+X zg@(iKa2YfluMWSxQjOEJJL$@`gT7WB&kc0+tDxop58b^4CCGY+#Cz`S+miKnVX;!K z0u~##k?|w}X1d1WN{0i4JVZC#1!4zy=qU9O`ONp~U46@A-Pb`ZY&snfit*;xb*8Fc7TUt;BKIP26b(}-q#5){oB%VRUZIp**bmR$gNZ6iA%?t zLqC#1T6RL&`-RDs?~9fT*^ERh;Ohv@P_8POX`9g5N8uaL&q2pOtvTcHTN_8v3&(%G z6`ACi{qe~v_ zYt{TiFkgc63sQ(b27%!+9WrBWTFur*(vXkvsP+il1@u$Vk==)&^E3aoZSmztmR3Mu zq(!pfQP4LrzaV8v;8ROHrfn9eTGOTG{IRN4qe1sQ1m^!BSvrC^77zV!2@qXs`c$<{ zMd~I}*QvWr;C{d3NASuZ86A20Jjdd`A4{(kLN+2nTcWnSzokmR;zQRy46h85@eRnD zpTG?WfWRzBnFtsJCgzMVIU*;B#ZW0=qTu44dlcRuB*Ss;R>$Jwk1hoj>)NrP#YQ=D z-k^m~*u{7PsUL$^2FUwexhXUJdlc9jJwu>kL>Dk#2E%!@9g zBi{*k06R7Ji=}-teN?14^AXwDef}4Hd&=-HVMswiDWw1_Xex$$I$Ct434gKf4?;cK zcl~l{@7h5!+~xlL5c;=Y_RYAT{|cmW^9xe+KVJ2&ursG8-DZ|<A{uo?rKET-B#RynB9O8pPxNEs-HMMzv~Ly+hlsi?GW|O+XJm4c5{CPuga| zuTqwZDL>QKGsb7J)>57Y?q|1;qZ34@re$;SgxXBdlGuG~2FP%ebrlYpX=fNU{DvxLO zzT$U7;Q0iEH{$ub3kvNmoU-y$VXDYzX+58I_#8w{?Lc#HFKvc8^UxUsEHqzuL=JhF z{B7UQo%K6BhqtcG;kG5-sFst#CR|;mMLLU;zk`jbp9=PXR0;a#rJd-R-}Oz2w_k$J z^~^6w0q6LuQ0H73HCagup;(fMcSIFZ{~ng_AQ{c?ZGwtvK-9nU_kHW)Xa5Z%q2W@n zIqqYJI#W-OWZ5Gci&V;xO3few+pp4Vh* zTt`(&p}YRLbjF$iGAe(=e*o87JoQg~1EXDnRy*exq!4p#)Ixe$%18+uL05ByXvxY# z`FYTBfQ(*z1d#hm=;^KK*ixUwwZ}lBcYZ;NF2^=YE^G4INmmR2?wp>e)1E-~V<2&W zjE>J=0nrkVKD84)cx+{`{|wO*m#i8cg3`E`fFt~psp}`cKlUq}WGLlFEI{#QdDWJ! zwRXy-ZtL7^wplCXpk6sF+K1i*M?gOdX+tngdm*!@zqP!?UXVU_rnh0h?DGrTK`6c_ z@a8;l9x)J*b!T?dCU9514XO`NQS8A5h^qe5;jQTS+b49!DBAdso(o`M8*~Pq0ZO%z z)Kal%6@W}?RN9fiY9{^x=ifmd92#D}5Z(Wem3jJ49BQzz2gKpeFlgJVP&z?iM*Pv|! zWH=7OWb8QupMOpI=yhUc!cIl>#Z1Q=F$B{&bm3p&wE;4^`@%i2FD@)?Tl~gfmkuf5 zu)eTM8mgWTFTP{$sw`q%LFmT3l zjW5J-r~Ty(=(IteWJq7M=>Hoys^_ML&s+5Y#Z{|@Dzj^5-k5n|=HZb~&U|C&$jmJ> zSIh`A?iqGw_t0506VtCwKc%>8`u^#!On+kf{cBzx`sj3G+OBwMnx5V{J-YhX>R+w? z{^~D|T(C+Gfi@|%;NnY?l`JL#LeVDj|I)f2BxJTvj&#GOMMCT^N||H%JLBu2(3>=TsY z?TPI}@17V|JUYIlxOIdd|F7}yjelYMy79*NCF7>?bH_K2{bTG8V?P_ZcWiO&^J5oZy9-d^omh&)HA9XJ#FZp>qn;)|4zmt9w=vG z(TJ;74c{YWK0+PmPt1&-${JOQk|Nv#Szzr}kLF)JIR{Thf@C&aHrg8jgF2>hXYpIE zI&CKP`5MpJ!AhfJ?)8`+;*}8MZ>n@6=2lUsiMzfiKcC5khz!&ngwT*c+rzpvm~QeK zTM(cX&@pDdqSK{Z7(#;OQd+9S&D8+$NtX&Ki4cZ9VI3X6nht8x#kSL2%$vvn27zJ? znNpCjYXjk!8KMmAsz3tEx2v-vS@fxRw<-oNX9Mra665)SUkUEXLR&3xp$Ic2TKXNzAKF5lq)NiV=#-Sq$DnlxFJybcp5n z9PM_j;w{p~cG#S!4Nqb+oFlk|!D(m)^l7?H7!F`5mX?>LczaM=Bs}3lNfUks(?e&| z$AE9HSo_*|`cSj)!+kSB2lg08A`rwoz%p z-!9}@Nps!1adt1-v-1tx9P4U9j8>*G;Z!yC8%Cw|)M^BG8*VXT~3ZU`yfR>$;U z%vvWLCf^(rNqbW^D`lfF!=H8)ioyt15V!$diAO+gtjc0&1#_G2>L z9|Q}(r1TqOG#yRlNV!=-jh>}R65z(YLbe^E4}KOuKNqArBwcYjB8(LvGTWJpF)|Vx zsMMe$WUCNQlsT0cqA&U@ej$+R0Emf0X`%%H@M1MPpTPPDc%v_xWA&6<&6G{z2u8qS z1M!rRjwdQnx3(S*!}>zL0AVg?s`gln_8T>8 z58)s7HW`9)w)G6J1emDUTz36`;s$tY`8a863T(Wotayb}Fz^oR6#&)AA}F2lXf?|V zYK=S%y{WXHAR{SS)kum~npFQnmY=K}NS)~IaITuOUKJ;QCDZu?;LFiOfC>A}HrM(F6RKyp{^nGRLDZ^{GLn?#S)N4;xpJX_PRQwnLG1l%y2gK7K+zKX`PBU zn3Mc!c^sVp+YOafIuVtT9+or)Y;KQR ztIGS-o8*;h&j@a^Fqh6&^m%1lC(_$5#DeUJP>`V62x$TMs=SZ97~^}fc1TVlxu8Bq zb#%@csXF*4`T4$YW`sTOCo-MQTOiOdz$dKXM7*lmc+N824aiN^h9<ErB5N2u!6D--93WO{;4l3H7(>0oqZAf%rC{0iMk+OrV4!@F`?4Rz>oypn9e zPL0kQw7QxxZW4-nACe!pWMX927q%Iznk3=Z?EC>dJ~yOiZKf6xYV%A=Afi4#cA7l$ zHlw*fcxzr3KqaAD)91b_i`T-=Y*CrDUbj)rlWXMuw`p>4otF==+D1b3*)DU~Tz-El6f)YJRrC1VM-NYW71lLS+*vUK9KTd_VC zM>-a*cPtjj8gpASyZJ(_v z>WQ*OkGg1OF1S^u&)GXkvQ32CwMNb0aEb@zUBjS{Wr!e8+ft3J+DtKr{vyAi)|+Tv zTWg!lydg>?$1z$Yt8W>aL{USAR2_H6p(QWgkDu3<0Z%SqQ)ZhbrePzP$zho;hU!F# zF8b0sPdMw!(TC&@gFarbk`+E2^oUfGqq67i!ab@FIx2x&S)f{eyWWsfMzPhU59)k@ zmXFL5$|Tv`{`pm_6c0*3$3MV8$7iv|HfbZhNzqd%b)rH%q5AWwzpDswZ4jxhZ8N?TY)M?uQS;z!cqmYX-2d!=cXsU{PfF7U573+4ZD{9YpWH)J z(68X(my&w1hu`7SB=ydSl5FU!hIWNUrdb%M0V?2(k6yUAINM#x2a($T(wgp$U025D z7tR1_?Oy6Y&C3NeLB8nl>lt_6NTSvhNE@IcE%Q3J_|{a{r&wp!cS0$mXf7L^-b}p# z&AN2DyKn6v8N!iovn@V9-L)zXuk8v@b0tCn#t3-B076AV^N?~5GHFN#|6F$~x@B#5 zX7kA(L5k-r%Si{^`mPiU5A|03P!~9(mFllR)f;OI>c3Euq%G*W_1#&Bg+J*dQ10fM z>lEmsja`6afdC%P;88}+CNV-=sI;?E)W=ZMP*hg4)#SMB|OeDZ0 zw>1lZ_0jv0_n+Qfzh;0ZVSUJ;Bu}2+T}}#=#J+U~-Y}$mYOH!aq)fXAl`6{skYVa6T_q_tb%}d zN$l4BAa;NU#eGM?_a`B7K=`F~1X5U_%KM2agUVJtvi}&JATSIVEsv~+ytH`zV^7wuCAc!5{ zL0sGc`2ubGS$$#;osGqwwIa5m&qo4;3BE!Ox*2hsAZ}Rt7+rsMciq}S9>n-QeF$~W z?i;Oj=VFluS44WDDoP2!`kSKK($IC8vKTLlLS&51S62cCmVHU7kcb4SlTLG^u7 zkKYj8s|HB2oR3Eg$2Z+=0_-^O?m4zI;#C)8!KW^B1#F4(n(yBpC00lhT9 zg1CiG_k7>G&;;2xqz5Tz68P<<^lj|7Pif%Z&K!!N77E;NknLUb5@gm_D&T zQ^5qZ%`ZsB#xYDQtuJ|Mu`mS{TWK{Dg5+XpTJKbYvI8u15#IQVQ_$t=?%z&W z+n;4YS-1+6GPtpg;p97m`Sv2L^cP#tq+=BeL#4)F<|(i@H1JrWBP`*D9il*;{9?n$6D! zXAjNpo1L9`edhU@hiAS4KKXgYk)bU!;*4iTGqXqW(V5BV@@ymj)b$=qaM^3deI$=Qk5C!U{pc;Xuqw@l1Wh!dU(&BSRFQ{(?L z{`B|*<6j;B#Q6Ki6XW*b@o{Q=`%rUycZsT5~}Hf z-Q-mIMLN**#MVu0wb^@IBqI3+>B-cihE^%8324s7=Sh*!YoR^?ZHTBkc~%F` zh2O}}(-6hOH2?>k$@9rbZuS_aE1NYRsc9!wtg`HAHrcrue3}=Pl~4`vN36C~-5PhZ zDatOtP}K9ZDP2!gb3`yLB-gB!>9K&5NH+PXi8S%*iu!<3raNN<6>?Zz9i`0^iK#Z- zC)4dV6PXG&O{Eg=B-O$uT*Y8cRBA#=!o%s)d?02p66xW)dm}A$+Pb;}2@O4lM^|Y1q7AYr7(`<`t}KL@9e5H7&9cWrGMyM%3#h|T zR(L}0oMz0{AuRr6%U5^NO{a>*9yFn8*S1N2-N41U3~QpOG3>GunwB|}nG(tdt+rIN zl?g(<9k-y-pv`oU1h7RbnGNxA)n{-=G(>;RKsD{AV%60)ruV)nljALau@P#f#bzMk zBHty-QnU_|Fx5RyClu;YR#U66??R||G(J)+G*$KDoYNR5SfjjH>g{xeG->rNXWYn` znT&E17F18A^-$@pp$iFqF_UA@dU2WVs**0=rb-BDKnms0W@LII6(aTVEK$g6vwTWe zjeYMzJyKE=_PS9ht3(~tN?r9TcKZl*hDei4fae|Qlu~8Op69>~t1As!cc@g-Re~D3 zMWeh9ldD37EKv@JnpKKSFuO+n*=oY)pd2l=pRa@GDwjBb=e_`FTp}%)`8wd++r+dm zD|dgTP0aD6pBA`a#niC|s6CTd|4Lb9qSDSxv{doC1FraKhh=&)k*Di{bR?Z*<3T;S z13PSC&j@7*n9(77qEpdCLpBu0p1bdX>}Xw8ukLUbFG{`1x|$?jgW|-xOP6!WU3q{B2Axb&{~8EcyWLZQHAC z?$E0;z3L5670O>vBy4;>A*>0=^kAX`MTS(ysz)@58g@4!_kRhhIMF(z*-A00Ksb^e z`KkPZBNis;U_Q>Kn#zDZx9%f&0E$h&QJ>G*S&bz_lr*QFhaWG7(}2uDc`J^fzMe4i zT6w}1{dF2Hd;E2$$>H!M$tip(B^0?iZIDvB^$sCmf_*qU^O!8(p7m>$3Ad=h9kHEcx4MVfZ5Xcj-`=D0rIyp=vXE)x_Edv6w=q6Ke-bZk7rAyp(1} z9``~s-yxlzh_jrW%OyNH&D0V3d3Q2z(`iDja86xKl0*N2#TVRq6Giila9i|5()!H# z+b})faJmUT*ok^t$zr(<1#fy+Hv&}r5&$LD168XaYCFphW9j*XGGmHm(}b(0AsU)B z8IS^QcOf4TtYje348w)0vzQU~%DYcqtt%6bj;#|>TU2EOc@X<5g**w%*8$U3=^Bci7Bm&H5l86OMM6#V>&?;%IQqOp7i=!89n}@38HAq(solbZ%aGk zF%@wpfyIk_!Ayd2txf_v8A_ZfEh4G^#duvwcpCu|Z@1NL#_Tx>`2~j;V(NTq((huG zfn0Lixwu^-TMcV-(In%fePsi){*y9U-7E=4J}R{GVw(}xd>l&=a#Vv9z{ZIN(^g$x zHF_a_To7F;!aS!TSiO^Hqx7B$nI1N1sWOz$p+Ys2&bI^m*8wR)&wC>Jc)A{O*3_{J zJhF6K(MSZ<=`i4DW@%scl#Q|!8)bxYadlC!avfTA%JuT&8e5RaWDFHH7il|uB00B3 zW~hyNI+Ij!A-FWiKx_iGV}x|4%+R4q(NZgVoQYIo`aSshbdHY^-io!=F8Js~ETeu# zru*wkGVRGh3}3iTS~L62GM$7{LuA-f)BBQUBbQab8`I}fRcD%j6E`GnQ8063isvu` zeD@*BP_pI-v(`j;R16L!5mGkMOnAVKA+lkQk*Ci6BW`fYXiR5XrGnmNqLL=zJbcF{ zq?k&W@Vh&qO0~w=-Rgbv+)N4{zd7%9&*{~UcriBSBmurV>CmCZ9+YP&qyl3c+=dP6yF!cgIujnyWV*^h z!0hw7V}4V!6i>}*9U8^G!Fqql$kv5h0UgmTp@#9u1`pm}NUZVe^_Om9A#Z5P7$nCC+$MmZNuB zD04MR=gj#az}=nq6sE^hsXS>-=7W$(0MI7MoqMqOcr;FU0T5h-kQJvgOtA-Lx;tBG zBun{3G^bSyf(2hv32`o_rm`foORJ^YA!-QU3JGylr9(TcEhq%zDAh~i=sj@l(Zf!% zC=Ne9GPZuls)^dzk&&Mcy#ZGoO2v*Ti{up?0br%j{DK7Ig?;AjLcG9GWGB^8CHx}6 zQ;76|n|pwah$iH>_mGtC@O8(QlSd@~*W-SC_Ld<5Vpc?S^O4>&~oSx}q##$LwwcJ$hN zWY5FlIs^}Hz65R!KvM}43(KsqrKpYaY7o(mE*6z(b~m#ZmhwO|UBTqR%A zpGK)zckh}3GP?112lp-BAM37UEJ>5@?Kqxv5>OQO_~_VnMNbq+7wxKPo$3aI)Cri! z17t{)dkP|JFZ}s7bXTI!hx8Z^5@9GM$T6&6&1tqdskA1eW($Ul#j8S-N$CQppNx+D zJaG^y&;0dfba}FG6hEKBI+|8=r2RQkMLG0ZQ!5xN2x1OBoq|CaBqK%pSy&Y5zUf;Q zKpME2jUWv>&b(%(ZKXV(dRs^b>#=Ya-6epuK{9}$WZ#8O75iGN&0yUmoHE>hH9z<; zh;~_Qm+GWBoQX^KGmw0vJ|Sgv;2Cs0cnU0w%U;-qUd{9=yCK&-xXz#@Yhd}(Y%)tO{u-@xYqL%`Dlyq=VGe3u>*|XRpN3E!ytBnLaAi znbLz({)wM%M>D#ohN|#X^(FgS14Qu}&Yku^p z{fD!QTha6S6X(fcBM5~{6bXI_hn-gq-ZV>c^{hRh=9GFBI^WpcH``Bz+mq?u?a5Yv zxasTr$4q!=xs{=fG<=CRt;)pQC2z-~t|ri=85Y_A8F`rf;In-1LdP z&4R^B2u!#up)!`LMj8@DQIj;yqeD9p+L$6#$)|hILHcz8&3DKcV@f=vNK+zJYGR72O?(Kn;*_%1Y1w zfBO6TR=e>sEYi0klJ`^b3YDaD_EIiowugD#_)lI2fg1xn6#Mb7p-;d0ComZ<>n=m1 zNp0V7Ic~dmrR^b&jmwkSYOABw=`&t{GUG0XX+J>5C}zDol?N`D73~=zzn|-F_e)p3 zJtVJQQh_7la1^PKF<@$k$Y3U&eE(_HTC7s5iTUJd=kHdll?1Ihm!SzIePVLuz-s_= z3713fGynJY#o0>tqUF!~4hf9n(y5P6d_}Qi?C8i-Lw{Q~EW`5)5_%GbrSWGy$pA?U zUaq3@)Kg(7q#(sJjD4g#yJmogj%a@hQ(4NojDMuNoOSu?9nf3XT@AezonHW?pAQfB zklWjhc0^4w5U}W=0jA8!AniQ#)&Lo1%9RAV;qFbdqpX@_HR#eWJ+c`+KHpu!cU(Q; zzx^P5Y3c!&j-kvBpE{V+w2Fj?c3uhdWRNTYSKAgpdu2Ba$&R*=y-d=EbhPYui?$?# z#y$kE43Z^d%CdOXhq?~MPKYddFKqBQvczd&n`w8x*)e1@c^;s$e{?mpV1SB|vUMMo z-iACJ3FryKyu0#xof#sE)m3kz8elW%u4`aP_frAmDF!_%;ntk`u`Z;I&`Q3^k!H8e zpUHIsr9cK;WzAf?1i+{crKC0`)nhwH(E0D*Sq5*l*05#FBht~$k z=*VkdfR7RJr|pXmT;DY))^n?7XQsDI?OVl7e0+=<`Rve_5Nvd+T~`I}1q7a}&w+v5 zq#qbDJdm5v@GY>K26(;ETzvfT&wN;cp8iz#40OXMcI`u_{;@lDdgb2qa!>|Dc0iDy zO^m{3%ypnV4n&%89WOxHAA^bau^YNG8&2{FTq|CE=Hd;zPR%P0FcJdH#(Pr}@A}Z` zu#mPm$taYvk>XYa>0crm@{sTwEosVaK$m@@yMFV@AAyQ1Z5ulFiLPOj)4-etHk1!) zeKIQfF9Mlw>Y^RNdy^CAU9E;+g5K~#*_m{lZkU`tB}CrfpP2n597g(C=;%>_SiJ4! z>prGHOE-5T5Y%GIfMNt^kYH+}S(n)>MDoU_Bw^D&4Xrvcf%;!OjE;Qr_3QqHs>JVK zz2P8}g51yQmHB()(A)1m<(&N+IH{5m{A|<@J#CIO0nQU92vi=leY$)4rjv4!r~Y{v zYzOKOb=PfyFd)wCX*&H82oLfoaRDe^L>Jr&Aw4H$qPw5Cu`kAG?dKqhrib(6*NI%n zNC2D>6UjsvE`vjspj4BD0`&j5i#JXbA+85Pp2iN}22nIndT8JDA&4&c_0$KUs3i4H z{XVz_e+R^?WJBJHn47ZFyH5RD*0vtmJcmUdSE=FoO@`dH^Ur);izlgPjIVxLxl%qt1vWZUC zkTrOtU`O8jW!QQ8so0EEUO6^;_|E$`qjSEpY*6%My1xqBIrJwFnqn)`(BeY@DqaZY zDqgEEBc##Cz6v|c02w{;;s}P-IecfIlBeAT0@d>i5*(Vo_w6$WlYE?vutvMelw~?l zz~>)d1c3wOUhSU6((oInD^O3fxi5ntIC4t}Vfe_*rfd-%ZE(^BzUoZm#Uy&qU9ig! zk|j_x=i+mB!TEP*V16M!ao&d&Jw^JLEnd-^Q26WJbthZV=!IJgYZkxrb!oHarK3z3 z>YGZ*$TP!gNJieB24rOEBmWNEQ=s7R*+^5u6i{UgcD9CYJPK!zuiXtpJitPVkAi{M zL#mj*r?30Y{U)>;3_J<$2^*gpy4g$rbs10o(M`b@EDY=eDQpA z*SEU=JmIVT#J6EyLQhDTPuO^bg5b@XCE_M?4i%kiWzh5@%*%c%@_g%Q2x|M`-*%uY z7ncpP-pDU}2l@bvW(n^J%QH5JdXBP%)H#1iYs@tS^qcR1F*-m-N2=eGa0MPZ1-b5B zZhlW<<+~seG?bv8urXS1(e?nP;=<0hF&B;UF?82=B_m^ijE?BvmVvHz{YT$GU3?!j z8kTq#8jVHTwPwFAS&wDl-p_7|i|GCLL8JSr==dXZUpS*S7#{-{P8Tf*) zp0N;Rofg8!eFliw#9PLt--r1$z(a~%`d+N>DNr|Pc@u(xmrgj4nH=t&ac~;F9EvER zIxW0|>g04}YZY4S^Ltag&!`7f@J}3tH99~Bu*JuE_UAS<_CQ|;pZOr(np!Jc6Vw({ z+GwtnQ>G}R#hpR?gU}oOR5<3n4pp+7?*eq)2bbl&@I1`dzdwY}In9;cFqWM{jP_(z zg|NmP)>N0GnP8m4%x7|xK>V|AwnuN z^7#)O za=i>*#rk|81_Z&j0Nu`KX^on4DI7U2J}y1%Ksi9 z19tyspN6_eq0JC7SA{m?U?~7KXd38hI?bB}kG{q*=(0zl%>!g~G&Tpz^0xE9hxF+3 zRO)HD@i7=<*h4CyCEi1U|P0)m4I&ZKFJ>a>#i#yd|W~(!me?!CF*i|HGA-t=kc!xVc_``_+M96a5PzEqB zU}t^sX|Q((c<9A#f5+xK+Vf1`*cqOMUV-Dl`$20Qa_dZ3^8pRdi*e& zBD#CW?=M8hpIz>ho`xHq!x~C(LRdp0lI3)CyxcbOjHyxz2w20!bKUi`{Vdp608K-( z_|b#UE!#G*ly>jBGCqHYRD&CTLxWVyk#e>o9x|_ryqK^oJvR>*tP?NSnL{{^hOL9$eV)Uo)&@iz}B&=3Esd+s_1Urf}90!IYg4o8gv zIM0z^!h3^cbo9$`B>Uhmr9%~b>^}fa$BI@6!liqoc zwnfvgA#@-6x>s58N#~4J)`@G!ln~=~JKA#vq#6e9&8{4DxTpi7yG_NmJLXK~pu8g3 zg~v7=ei@vEgRI3PkAL@D3iRYFUDyatIO7zT&o~h{<8T?tT#nF@48ZvV>L!HyGl<}h zZAI6-(4F0M(kIaIdp@&lH(&hQUao+)1*e2|qyr^D&48N^5&r<4NlLnHLLY!fAo~1d zk4Tm12)JSSWn(NYxB*G@IBehpWT+1KZrK_8+VQ>(Ytw76VR`27cn2|zYzp-Z zSx9u8Syecrfz&LJxCtd+g9$dk!}(dggVRH=^?hhw{tJi&MaNeZO=UtZ2bHerm3A$u z5daXnH}tB%f+;k>lK`Rd>FMUbo}la~`p*CMOo}_kKq|JZ<5eH*Csrm5sUxvG#O7hC zqpw4s4)UN}^}~ly>h(TFuX&@lVc#(dBJqapHko3W}A z%ouLHLEo$eN#0zis~MBSq?cR2YYV74z(eb%!ZJ+e{FY;K8cR>rg{>ggHGjuD$YOy~ zDwHBKWvkH=^ShNf66<<=D~KK7fnE4*xK@4pF{vO@pV-G%AR*sIsJj@OZf3a`pX+>sNny^$n|AL#oy9 zTWwjbRG5eUqBwS9>cG@T0mdf+Fg^#T)=$3KOB|5$20k>ISA20Yp!ojeyC(MzrR3~^ zA4B%QrzSo)booSP!aH&P#A!n}4}EQ7_4sS!&x}7fG&X+c_)T-YGy=!)8RPW$PQ|5) z=J@E?v9Vu`eShqWW7m&0$6{mFF=B`tJ7sKW^iQMzHG1FZ9i!Kd)<)kmY8X9xbmNdd zPnp_^hT@V{y@(mW31ENWmOx~jNkuR6CaVAC6|slND`}u+R;6v6Y3$;H>u*EN9?K zE9dzyOdq&TolAHy&`W<6;Dp+PgF5qUSjCf#XeU)HQDv(&OlU&tQwh?7Vr%?8)EEaRlbrV*=9K+e$es^;*Uq z==eGs7Y@PAH4A$1twTtmh0Uj-L>h;GAg|4kMVezBZM#NEawUMB#`+L`f{2F!CbVkG zG)yt)4}0WXz33(Am|Eu~sx6gQqxq&xHW-+u7&9g3vXsspk8S-OROMzS_r zrO`>9_By853LQO_^4pktl8dRm^k@ppsTK0RT-Zc~twkb~iA`h3gj`J!D*$7srsBGc zv%yl6Uz5e~SqNC>?IhqB1zI+K-4Eo}))ElAXD708F=$P6%%buP`Gr`WB+{m&fv8no z$ta^_Fuj^(9fXpJSzW~zBP8iD9DkRqx|}RT$SW)E4r^olnsdH~^{l$g(YltTlx8ke z_mQXkL?+wMoPg!GX<)UgJIXI3IsVfC97%Bds))YnmewhU=tj~z8~OU)i)|eve^ju zGWk&0YR!(}Je0g1x`oI>0B3;UoF+9f^S)ksOX8JqRd5Kz`v^JAdsCj zx?|p0IT143ys~iToW(~8g|x>?TAdz4ZZs`3)NGDWCUiPJYBV>~s?FJDx>}$hcGk){ zD^X6HnAOR2WzsU0qI}ZrD?V5Ybm_Hu0QQ_;FnXDyRpYRW3GH zGkfcC`XCOA%xl5MAl&|TzThp{TKQ4DieQbVog~}#`(m+nq(<>00v4}z@m3;juZJ2M zIu{A-tzz+-9AhTR5qCVT5}V$n`kXstIbiN&Qh_uGhCey2ai}ly2=1Lu(BN4EcTIHNQrhhMfo(OAIAEqokX@oQ~?4%Q0tgUja?>N3rV_8XuKwEv7Kcu zN?e4DR{Hc<3 zh!4-Jl{IhEQ@0zNfhwm}k9`M=QDq>tO=NOjWs$PR&EhN$jn1o*w4Uk&6RM&vkhTTY zdJK4#SDDf_GS}>Q+ohaMSI=F9x7xf)We-y>cRt=|(++nS3PE9Ym{u#8nbY_k4A(4| zEW!ki+08R8s!3P9%18tfX}l47cLVFga4I_i1I3B}&KG4;gml4P#J|N*9q$ z9XN_tB4h7pqIGL1;&+++X~%i;(@Gyr2!Ll7ReDKpV=j9U&RNOREmfOLh3oaCSy@O0 z#I-m%B2PCVv9J~_I9qmr>Cvh8>9P8B8m=ND=2ZOu2z&21xz6f-cxSe+wrJI56Nic_sl%Ai?vqXSNceQoadQypMLN2J?DH++U{}*(%j3CekvtJam^HeLs;4CTcQiWJ6s!?x6;}%!u=CK}#@^KR`G2sYgOQfyeCa$?_ z{DY*>AbjR*gP_XJXglwEW-Rx0s(6A3l)73-BU$RwGpL<}+hezCrkFM72+AGNj$X+{ zf(ez0x)lq#+I+Z{r+023HF%E_2y;?a{IPhlZI#xp8mj4Aig-87#Nq3pk!g1vY5v47 z$Mv(JJW(RemT)T5sPg<(-x|xM2yjHXDtT`#?e*2!JugAc!Raix(stcmCX?-ybJ(}X z)v+E;@i|x4Z?*^6CTo_*)iG-$o+0|JbWN7=7_)c`)yHbiI9YXr4}O9OOLbyR9LtMr zfRKurnlg2>X)Mq16eZM3RgHDB9a1(;jpe?OA1~LmS}fy`dXcnwyo)ez*-Ajn zoYm(k3*B0uo4aHD15ZLCRewuLyDctnkl1S-%UzBXS;o5&O(?h0Y&>*TJ-$8x^H<6dvUq;*(1Wh-2czJm+Bs!yT>(Tf@v>OZELYl_`pNjS~JvjR)g?JF@0cYE2 zLQ$<5$ebcz*_&=gdb)O(gM!pln49i_yweDX&T(T}5cT5$y6Idy zAqdgJWq*sbx7wu$VWA`COgv#J3z@Z-j^#~@nNUNKAe`8FmCeo$Y1oXGLaW^DsEsaO zB{g2|^A!KsxPI9bAuvJfRIEZ6&u4djbu3TCitzr(L%xO}9`KP@qXk%KrJO!I5|@N# zCz*E;_zlrh9pRa)xd@BnxgG;w8Iv>BL~q z%C;iFA^&hvzwCGEL;9yqY-$}f_SuurSQvpJM>sNaiWu875&kAw^*c&2#hM*97QEuN ziS-9?<&?fN`P6=W->!n|{$G3%$Ys`)W&M`-Kk*KIH;w8?iUS?90oXU52Ug{VAM8B z*pYQX|Hg|3tIHRb=%(=QE06~TbM*z|kh})QK{#`6H?$QQ=HYtcsZ)uJPo$G@Irgwf z>qFNJR#&!_fi2}@H|w)&7qs%KYXRS)&Yar?YwMPgCrLJKw#WUJMmGX6;(`1aj&5HI zYwN-yef72nNA_88-~NUB27TvsgWv4hJG9B4Ubt`WLBrmePfmT)_=}Lytl0+j`<;_w-b18Ub24d z257}9VXlfz(ras*aX;ft*mCF`IC~?U1KY~<2cEeJ1wgGocO(3ErwJk{&6H}1sWq=g zaS{EwQ-eLacr*NTTakWj|MigE^0kj0T>s?F1FK=@Eo0-R@fKv<9Fpo?WgL2Of|-Bp z#px?|Y%0+Vs+JZNu!?C#A2?u0w~4_}e*Wb82kv|an4-S!8f+Rj-GiCS_dMF#bhm`$ z;4OA-KEj?6tm%&4zkRU(atQi+-eSCH-TR;X?3MaEUcBQ9eZxHX-&`-9 zmchGL;~601BsmCCFL(o?a40`~#@@>?2E&-=yF_oR2OIY8P3Oy>*#@co4j=BznKQ#Y z@xC}XipHV!@gSzZ)IK=5_o9XRnR~tt&NCl=IP?EymSm8>W%<$CrdcvIVmOPEU;ze8 zqLL8^Uk|bo=5?ogaB|ZW1R7a1mt1nXu`2I4UYWG29@ zoP%WNH+Tob#E};(g=jtVrcDxz$kY0=FxUZU(*gMEfdgnU*-jOMU4O)cLxv!5yA?pw z#Y=&2&I-2D-}?uPyP^}5^zv~-bkVkO@7!ZEKbqbHER0{c*>Lo>Gv}@Vi{$jk?ORp? zRTJ(Gb|tmjE~O&{{rw4;Fot0n_W2$f+v@3tgFs6dn0@&r>xSC~Tau0CZ7&_HTy#O}mH#|^$@=p3)n>z>c3at-AHYuB|G5|MJ^y5QOXcf<#OTt2s`79&asZg39&gaRMZDRe*(O<*6{4wRw`W4B6+i)~_ z=G^5lU$dk0blc{HO$^)az!8q6o@bodR%x_@ht8I(>(9J+;Dp2oOWMS14S|UzVToC( zE*)K(SsW~WZRLT*#~05pzG1PwczV&Xc-`Xu9e>*K?2e~)e00Yt-9XFP^o|UNgIA=6`0s zKlAyS|2y;6nODygXQDGV&77E7n*R0lzfXU9`n}U{p1xyRo%T)B(?_PKr+zl|wW-Ia z{%-2^Q?04fQ;w$);;hzj2FucWZry*kqfD!7^iQ%99qyN!=@VPwtVs6ANRAEd0 zzt$kD<#4=J_uz_!n?<+MM$|+0sA8>W!(Ba3$kA8#U5-?Sb9{wj_?DkFw-_1E?L%ls zBP7||crxVTn5JAvE6SM4rQx@l<%kg0fZth{%f#YwRG&#T;y7(Bn(AP%!kshZSRCk9b5b?ja#j>t$SfjU zwm~;-NkH@x8Q>oYbor$}Ani0uhX_+E>QD#`ZY20#3CXFZ3z#feC!MvbouokY_j~}U zr{Y*1Sl4UKlDpDQ6AS2$U+<-aHi=tG5cnT;nQQzmxDDe5OT9^!c`A?*vrduENNEb8 z)AdTW!4s{#%q5dmrB}u$(M_#hR)Z#@Q}!}pzg*0@yfrtO2-?}2#1?>-az7$?uB%Enh%?2!Gh6J(;0ry!ijb+g3id+M3gOkNQzE1O z%x;7d*Oh#;h10~44n|3NJ;aW`Mh{T%l8H3;JaRSAsw5nRJ;-DL#B=E~(3CT5IOZ41 zb@AYJATqYGY3ys3=!$|J$(LJK;&4rqY0Fm>P2mcPqy`5r;AD){o}klcw0S=?MQwJE^S zDJp+(ysm6HhNc=F!Yr86O;1wV-9YtC4d6se=1QvBQ4nH|^#1<1XC|>!CfnUytK^f4 zAwt~u_3;lJaTDPLMpH@?w5EyOg-)3|D`^-3*MLx_#_--8y{m-kGrmrOXl1%BhO5)& z9J}weNKT0aMw+#tITn>GR=2o1kK}zar+{%R(~O2fVM0qY%a5R?g4HxX3H0Z9gNX); zb>oXh^=rMR&j@@2?`cr{iq`v5`qC*(zR`$T_r3 zYA)dQCxCw|?1A&7nxpq3WUS__%2r%tt>L~9h>4CkJLYq$*?_bO53(h%P>)7wFR_9E zyqeW)1-`2ygmZBz-XD`^#t*j8u*3XbPLLHPqj{7?bP(6LPA`nhSyvsVwq&uUcRzu~ zhilg%L5~-JNk0*YxTpH)?F)Y1tVon$kjz9YLR*w6Kk69UPTHtwCLRkk1d+C+4|_>Sjp{Srd>ncjmMkjJmPqOO)L8BbtGG304K~xj5EsqQqm!W4 zX9(Z}YnIy0NHq%-G}Nks8cH|fq@8K{IZdt6+4O=D=^;yLJ6;f(Qp094=gq_<0?lhg zM2(ZJiYcqcBE`IW3T^8eE(sN~!9iXxXVaUlrD^-O`x=b~~d?gU$QYkGri{5ut!6P*B zuBn^_R`W(PkX}Wrv+9c}7Ah5qhcUIR6ywCiIn++C;2>ziU9}d1K42;{{s(&hRz2-9 zN5wT~5pP)Sfs(q1K^^cgypJ?zwS*0qQ{EOkg^q!$E1NA)_H3!pjUHoP z@i%LZOpbPT#GP+Ja<=R&kr}6Gs`ourNL|D1J&y{QCR4@3wr)z{iEOQx-;YdZRi=i! z@j6eKRd1r&=_nJAq55>0E0L9a0%){rHGn*4zde@I9uux)bJkEyv{)P5#1BStVC{2T zDLLaR`GO719FkV2b1SdCAYH>tY6RD5k+eOo`ngooEhtALqu(~{jy4BbNMziRhin7{ zapbcjc`cwYO|nC`1)Q`%8VlwK@(QWaX`w?}ELN*e@>l&4_3(j}AL>u1W)GRGCP;Hc zQBpcj7peu(pS#3A8pcN4>*VlYIgS;Y9SzS<{SG}jR8MjS@i6%FbWwPx~J@ zaR1J)Ea^)-A6(G)SKdesaWM!W8slQyaELKpq5pdkF6i6JMi|8y9Q#oD0&uMK=*t1H zdCAZ%9b#=Mzctzgh^d=`j4nQib@ugwZN2ug!4>;1Ub=qvpI!|x%i-L{-0?^6*o1zB zVl11C2O%CDLT)1|@UxF)Aq1Dy6=`r{|Nm0De&+hO4gJW!G5}S#Z-P=nPwu6PQNkY) z^1#GI3cW&R_)kCk*kHF_R0g~DUA&6^+-EKsaoG0^BVhzM@$ciubLuctDDWk_dmu`0Sj{wf4Ir1eYmf6fg4w?KzuSwIuFp%w_t*r)#_ z3&7E~vJs-OeqZMGIz+DI2gw6|t2--LqrD^~7fBYA*l-wAMO$Zxha3RPoWat*i&xRV z)63!ifAI}R5s-+8nWTy3YZg-rcg=lpM4?U_q#<*I8~8`SfPrseOI6ZBs)R~0c88U1 zD1JrPtAGh@7wZqS=TF@KH&22YrZyM{XpX@DYwE}}gl&OfoXoYYq_>!G2Gig;(!lj} z9l)M#Vu(ZrU;1IbaB$AuqyKCD0YlgamK8MloUOrC6PBg4S(f zU{m@5pid8fZr}NbnwtRFtq%hL_EZa*nf{y*AXX3JS%PFbW{A_Ods7gn*9MK-#QLi1 zd#Cg#qP0ExU$if1<2yR2=WAO%Z^t2BA>~)iVlLw1BG!!lZynIMO{|-2pGMU8_y7G9 zyUu&No9!HpXRQZj449#70Chud$pxxjvQWJqRcQ-+R#8Tn;-wsiVFdR)= zD?Q{Kc?qoC|2y;D>E+2A4C&#@^^YjU&JD@`(X-+}^HL&0axc;B+T$b;w7@3ctH1XQ z9J<@e5J5}eU+>#@e(n_)Jn-6AqT%MYhCApA30ka-d0dp(PKCi%@Gxk7`6~xImoF^R zS0DNnSWtd@-Tw36eC6|%-v4UQ35%EAYAW7>*CHOpF^lAHmLfq2fPxd#_iC`gZYvt5 zRT+haLMXtiFBt5nUjtfU@`lX+W7}iMQEtKk(h1cqnF^%99rpiH9;4wl{Je$1Ur-Hl z>q3g1C*=17K6}^J1BMXsyY7Y^0xNHr1OPoC;gTtuY7%s)s1RzT%8Z_H8B4J^_59op z+v-6&YzbKQ&)>iIy!W-w9~ixM4=fn)=BMBh$dcai1S=}e3M!u@%%VF(j2>|erznDY zJ{#Hgdit5yf9=Nem%i=-^|pIqh#>xe1obFhlCRKVg3O1*orI;rx>{)9-*_+B!?qRa z$36`K-Y@(59lOu}?A{Bs?tVQQcw%edZIODkm`Mp)AtGQ&p3sHY!y?}%g|okMgZ}Z? zZ;kOA2A7RF^B$U*`>)w6r-PGs7#>=-E#AHGFYCvic<~#D>}BU}-dZ#mZmCwmW6P0u zL`%HSuJ1SxcF-3{4Oe~Z`t!G+-)i#d;Z#0|4!a>uBibxsI_{ImcEIYcHl5`H9CrWy zAhda#SU>aRQ&;Iv8Q!#87arPb_|Pa(e-E0uAx$HiIlqU%7%FH@H(D7Y(}bCO?|b0I zv0V%&@@IgN?(a9X!C`z1(#V{YJ4-^mx)I4l13n|lHcvCq$c7y>N9kXE01n9ur9jkDIx}PQ${X)7){Lo@YmDZ(->kgT_@cS@8F$Uc48J#g*YH`x2MvF1c!eQv2rvI(>ATDS zx%9i`e_8&>^4phgglL!Ya$@fOQ7p@wA(lm36d;i0(orDGH+DQR3}ab(WJhO*xWlyr zhX5Ai!cP{yyzme9g?BByZlS(#+h*#ErNz0=Y(=p^_6uJ#*r`#czBKyA_abYCtLUdL zllOE84?c*4QtKhQGpp9kqvvDBQ|>Cb;HN@EnWu9F{E1tDrhQQYU8;ZuR`qsU$iVG#hNk@UnVe? zT1F7Om+s~`$_M#Bb1EP|O>X)6as5IOxR$e}x~-b8M;y}O_l)Hktc3%iLJM5S8)3J) z`>)3G6u9g5TQM!x0yeXpgP6HuT;Kr`{XigJrG2HOoE2|E4uoDR+lY`AABUU0ER9vA z{r95!6cFd&$*{jl)IB!Jg&Po3=cVB50vPu*ij9=SbyF%?i4p+l! z=G5oW5AbX`4TRhAaJ(C+nJVgyw~pn0bDAtCBDpXtxCkP1?a{HEx1@2naxnrCj*A_b z1SH2oY?+EEc4xBJ=dq53UHmed8O)iZyAd-9;ZVtt6{l|=)%Wx&;W$pRm0EyrmVKPG z^G{=Ws;58~3Rs3zYkV(&H z_w|SFk)E!`yK)tttS9RolQ(2ZBHgl7-EpfO*2_KwMtM37(Mjea^>V!cfj?&D6dE57*lPMgBE}?`Qd5N3 zH0o*;=;GPqz@F(`9##CND!4WKX-A=J1F=;d3Va{-BR0emJgQh)Gn>Uh_E_ zk)adHbqKcfvgB#w(*6#`{N%7j1}($+BuKA6AE^7CqFTkv-J`YaD;tI zMXpnJ;@>bE6B^+(CuHw0{kI)Vj(ZIFRu6#ZlwM4RB zg|1RF=*ac7e0zc+(%KfH)`G{H59Dt8$l|vq{$c3Gx30hJjZ4#guel`kD4V6yO(u9J zpDQE~Zs+ACIvO=Hf#80xlT~YkrDZFF!>&`2smP~CE!$4v$pycLqQUReFb+hT!@fLT6 zGz$e0hG0wb^KPu4*^PiruTxMhl)0BBYH_Ji6Edg9hltayR4ALh9+Mmj>xic>ee?JM zj*^?Gr4!k*H!4Rt=JN4joIlkAm$fwsOQl8f=FXxtNZHb@J9%rR2a z_u9e6Lb<^j#b@hS!Kgiv{z^s3X=!N`sGT1=Z9dg)lECNX=SV?rhqlX zSr5@YZ=;;ncA=fz_d?&u0)&2YjN0Ek~Akx7E?3P6iLrj@o{}?7pP=C zk-WDkr@i9!jqzi-7D;yfB`PgAsiI7r91o|t>;Q~NCF@&w=bdk=2So? zWJfE@^#W<3L`0KIuN>uT+wWzPnm|}!J<^_F)LNrFdzMd4Tsu6~fTe46s#&8c2pFyg zV@^kf4BIksv{*e|Yobk2Rot@!rJaNGwb1SaY&EcY ziH=0HaK-pbz?=sf*kL01d`$wjnw6J~JDqhy>NkoF1Zxma*`ZA1Wn>OkFv8bl`Ff<~ zPlmLePBeICZ;|l1wRYF#DW(EPwbUiUj<*W8Yh`=&N6S_Rt&bxKrkZeA1h1dKO>bHGn7$hN zBWZ=tRZ+$LAy3b###=oLb?cjuE+(i_YOmonfn5xfq+4U?(VV>%#KU%P$=9gnEg|-n z|AuhkYUqz^qk+1{OH(GRE85G)V_{F4%HHA}LeKLP(TRyD;2N)8_|p9T+1sWcnEZk9 z>fub^Fyy{IXWoJk?6MFd2sXvos)RG4#&HDwpMD(RnQdhN7emBDpbcF9PdvT_0epPu zfeH8KA!D}*c?n{4v7N2b@(+WcVKrZ`L4d0-+2DfU z(qOhT!TgibeM#v3QB`^r8_GWqxJu&dpSr#_M*xbcbV3-*MfJ{Zo;JKP^1F@YKRb z7amx+$M8dAdz3O0m@g&|Bkqf-8;y_8f8KDddubSC6{io??jf3egPOnc=(|>FH>L`I`V)|CYQ*hq<8AG z#)+v9PW{c~?URb(fhogl4au{ny+*@phv)Y01IC|CEl&Pw@>`RintXWjO{mg^bq@6t zf+iL5dbSXC)(f!5ME@I%qdk9N))Rjrh(L>kn~+pITE%&%Kb?r;To8Q>CA^f|UXJsO z)mg1)5^UtVqaz{_ELa3cgcK?^%Ef}S!$r_rC}HQ-kVPV7hxj84 zVUu&kR4i8}yfms0VVYG!%x3Zw@5u(qKJESrDzK*$W;_qH^IEP{D`{ExQS@9h+ewo) z2t4<;a**RYHh%7Q=sQG@M=e$CwbWb`!xAPRtvQNFd(a-%fcXn+K=Mg=bL1T2 z;cv(j@LnIQ)`LbJF&YBRx*isS@Cl#z`ShgDa?Zbo)vK z=>%k4Oey{xW07ik*1i+f4@aAM$jX@@O%a>b+hpxK<}wpcY`xVcbgyaeHNz0L*XU1O zSDfjaYt9~-AnQ$D*0@@VO8k8M+;~ADi&e5y_jrrYzxcCAZp$WHB%Ab=x;CE-**fDN zLvjz~NW{T2&6Kp619mwZLj(s2ze8doZJV_cAai`34wuoWMTAP3;6jalBy6rqA^WxO zLuw#*tA%LP2+hOSA!(&}^rhqabUsEpl8tJci#o!2BZ6}hp*(yok(ibD$uw@URq4os%ej47VCQC5wU^w{Bo_Q522;@W$;l=?=gHO^xg+K6- zu{@2{@dhWeie^!<9<_7{lKU%Go`hR2gPT2xM4p&H`7smzpvzZqK_)FOUU!!ZORpJM z4~Pva>(t0Z-_HSsaN!t2mlA$1lZW7&e1osntZr5_qWfIJPXi53&m5|Id0)lTD9~v% zEq(~(COqJPoRwtoDY12sexb{GNQ+wS;-*H|)a0)|HI~;Psah$J=|zZ$yGv!JKR+IS zpl(eNY)d23CV`H}s3qijkq|r%5tRy6|Z_=7Af-OyiUlN8%Z(+_z+3U`y!}4 zzGSiIvn8xabB~UenJZ3>#R*05gBLKF4r+oubHiuG;#jh;sBJM-O!=#MUR~WY*6!@O z@sPl2;X3OP9mG-OWtQ++!Rw9ohx2sVlFayw=f~B}F*8*aDJ3F ziaF$nNKIdnwIQG);ccapxGMnuq>`tfFS^+2e?vd;mVE-AP&$oJ)lEZS)hYA=oA7D` zL4_(Rn{O6;SzJAg?hOeq5ExLtR;%E5nR8k~CXl~x!b{jVHd)Dft4u1LPcO|N^`25S zLS$W5tDq(n(p8wz_D?!-qb1?ddJd|CLk9RxSfxv8?!Dt51WgVi(5lrl%|_BKawi@} za(A;^rb2Q9!p_rXZ#O@kThc~fn*D^;;Z>S^+g^zC&Qwh_KZHiwW-pYZMU8Ke6;G|q zn%!eXMNft*+tQrbAyyjM{IR`bdBJ0+tc6I0W8o%#HszmSf%+5Hj1NIkgkeX!X|d z`f*jlHII+cS~*WPspg4qqw21Ly^eR%9k0R^%Ta$}ZL>NT@ zvZFZis3F5{p6?*BA=tUN$bE z+*Z8Wtw;f~UF(L_-3UTWIMi;HX!7M=mf}iLU*_tgsJ^`krz*hbwPL*yPbMbg=bWcB(-7@i#^0!<+UbH4tGS(3q_PA5aRSE}>px#;=T8WToG2m2Hwrelkw1KKy z)78Em;!h;8;&L=_k^AqlTnuE%UM)`N!og}zJvCnYRzHOE*ZkJ7mGpQOw>oj>SiMKG z5lTBxMml)DT_*RUw3*=IqA_)@Y!O+XsTJpU{{d;YbS*#>1|Dl1-j4L$)XJBU8cPCm z5x7$>(>1F@OH-#3W4S$7r;(YUd8hZq7ArpM}bxFDC z#3ChCAkh^)!FO{a>7^_dDnWDJUcvYr(!!S$NwQpOr#!i?yGrKS)Wn4GuZIz__Z#nj z*>y8}n2BZk;u{v8HZIQZn@vu?ZSs2)%vlp~pu+t&ymh~|g|iu+3}UTfSE%HvI;qE= z0L$@(V*Qb0-#fYf{wD?p#zBB1ccsB6zzhv>{KLdvD2|_GU|tAU*UflCv0Bri===W} zZnoRR`Xj$~pIEQ_^WflSNa4`6;{%@sGdX?cTnO%a=+0QrM=IcCOE@e+TeEA;>!&^m zExS+(vGqHFmhwL1)cReY97Y$rLaJ56Lk&MQ&^Thi4KMpL0qx_k3!^CBd5g^dc)!QOL z7iM*Bjk{>b@zfl2aa z_tg3)zc4s&IFPb}x27XjOcIcH#SzM-;CkY>CTac5Q^Qc(i*+84+Tg(D1o3=o=8INcKbyf{KXOc+*KhdRVE%v)7~O=(P@_;t<_ho+yg(g7 zeyH)p?u(S_{kP}`w|RWdA2Dt^ra}U9AaVB55H+1kS%FL1n#${@Zw?OYxo-@X_g zFgt&2Vyjt@AO{>=|+Kiu5Rpfe2U))&7G zZnJ(szmr3^*`7O}irDkORt<6U?%Yu83Gg1hSgHQVV>4H--*@ds!?0)0@W{lnW%{(LkI_sm{9JlX!wC^Ox;_}1xFR(4y`u4994w8n|vJxW8z=@S-8d!rSikklM?+u4(n|K8O=^roM`v-Kk-SVH%ABe6V=5gak z5L_nI%ST9FZN$@9I#DU(!|~p$zu`XztE(?4TYuy~(P8snKL8Z25_TuS_}(j-L#dX% z*yYeq-Omnou52sQKVf<+K#AYFV`lwL&w|_0QSQvSVIDo(=(L3JsA3wIAz;)*m^3g? z>e66vV&`_Te&*))pMun3&Z+e$2XN%>fh@4L#k&?hJHIj;Htv|9r}fEipEVsCy$>bO zj$Fokl~gTBdIA}ULGecmaz_8$FJW-EiS;wTo;|5QbN120y7^a|WWb{}ApaU>3)X-L zvxQcbqer*9l*!|!+J$z(AJ^ahYZ&_%NFVv>Z-F1>Hy12X`nRAACO`pYh1$1YdSYQ4A z95`Ht-#)!w`URkvkih8N%V0>5Z&hRYz1zh4*^d_Y{naxM z?_B@*AK_)(UjR(&x{0?=%t$i_roXW8`UUI!@0T81sx6&b{5B9CyN!v-&ra=`ymR_B zK&4z+Iko)E@>`YzhThbJ6F)Fu#^s5(8a_35bmrmNTW9Z?{mRU5rf-~jsqvkYjPa*a zzgV2u@sS;c9mf~GG5>*iZT|4wm*(zXo`DDc`Hy}LBsA8sU)*x+Dh@jh_H$9=IC+iL zC~A!YOl(c0RdG$x7!tf?Nu1*`V@rST*IaOPuFoIl@Fp5~?G?wF4l3-XCH`cbQOFV@$ zm_n>Etfs6{6s@j_8vL45C59IjkrZXdSVh%Y{xnOlB&Vp#nyQHM8l_^`8hC)SYdj4g z86~p}K}p8SSUYiAN+dzz&{Y^i4u*P-mcfTbQsG92^TwBN zwO!OyQ3ZaHHI^cVZCA84iKMYL_~e8liI+)2H5Rt2!%ia@T4B~Oo`rE&RBVmI;SoF` zQW`Jus)`fF{8n|5mK2D%#Md;1hQ>fx=bD5o@|viyJb`19O!JH}x7BuD5^-K*@HLJi zVd2mevjzm8>>4SPBo4YXj^~VLM%7Qjiewd>;0PIC!$gt??Gz4!LTGCWOR@|uNsP!* z#y3BmyZjV!T9aj-!6bG~rZE^rY}jxaS^{cSTv5Pyq)EnCZncD?WLUN`v4#PY?{Ls* zSUPaagP&-kBIC5kvc^|HPM7Z;yOKSPQKF=>oVJE55)9&S74V7%V+zBf5;$;9N-{ql z6z()|xzLIN>rkaQSY0HnVjc!{ja7M4l@v(&!H`CvcOPyfmOD*DYH0};z#1;8FeoY` zu1TDztT8xG5sCLK&Hb8Df|<7S}XM(KrIf8RH#W)m7M63WLL9WEjw{;4qgMCatLw3xm$$ zG6RRe?OWAZ4Wcz9mRVC_M%O5w7T3h#sPY)cz=oD_36qR}F{*xw!%uV2Qh2jK+j$Mf z5hiGjmpKvUSApj9ltMF@QUAm&%qV`E*T8fui98$;A_GlfX&4s{Un59W)fknLWJNS~ zN4l>8-PmxTA)n})%u(VRMeuOI$SiDe@ZKUB40Z=k89U1}hV`@JTi*Z|vEi`?!!Kzt z+Z^mCn&hDi@MX9rvX}~!Cut;wlQgFgMiq4ds`IKuiK?QkDFh59#lwFb4vS4>H5?-_ zOog><)T`6b1@1H_+2~#LQ_rOPuG~TmSos?CT)^L1H;emn}<_ZoDS;N*CSilkmhY&BS#=B6< zIr22g(t!5haLUmt>?RH))+B~z))+VhphpbNV=(x~Hhz8lDyWUauUU6b-#S*s0O}WwuR?8s6BST7 zo`kIi+n9KvuY4c9OSKVdlq z1_53muqaEYEyL=VtYRvhr7{l(0L8+Z5ea7aUQ-ns{&Et=7|Y}8+-Z%0Q4lHUp9Gtb zBH)$BahkRU27FP2vv$}sV|J^$A_Jo%K0G=2;r`=ESnaSv*WmDlLvT2Zq-xYg)z@IX zzzTr$v@8xilY*%%P&>f8SAn+l4G zl%}ybzb3+|Hyj;UlNd}a91=WiasW)>z~8LQ!YfE(Fb0+wEP0BA^Buz7pbM~iDR_gx zKb+mH%)pAqHIaaU#$gA-K)^nyR5(gF3Dzk~XqrroDx28T44kO2VaPRjcM`+Z2*(&C zd0oSCj^IVGJt+!7Bd?1)CYD``f4T70`AcV|>GP96GjbDm3f~vkW-Q4UkO zL@*r~2II!b)fb4@?>27SI`kCy+~meJtB?^g+8~K))NEFJTC+&6$?JE_Za^Hyg<{Ad_m&guU!UEu8IIs*&Sgg3q@kNR@bPL< z;ATyhvSv#rQetTRJ&VxLZDRfD;Pi?0sih68;V8gU zDm0WmIBaOEmDU_op@9Wib1f!k6Z*$5caQseMoZr+1Be%IcOONYKQz-TzeL38m& zmcem%pb%&_JGL&ZKe-p$vQ4Z%a<6h?{qR1R;~_FwgP-%G`?AI3vNVXgiDsHYLkMGf z@YKd`{q_4dcCBnH(w~0rPbb&EvVQ{-Z5Qwu-J|4)Y<4Sjyyea4#KDb|JGYDVGw=KQ ziS@rc2v0o>7uCwvMHQHyP3=&Yca|%)EUoCDnBLfZ|DlaN%NG{tcsmH0V4r-?)VlZ3 z1~5wsZL?Y?!VU23jfrNqD(Md$hUab<>u2M;AO`W(%9Q?ryQ0(UOGh^N5l&Frn!-?o z=%&a@5xnVg4S&Fr*X5%yY}>^8a|~om96`ZP9Nl=xFoY5zVYd%U0neiklD_#O?qLKu zWLvvzW0=wGg{6A+8uq}L)X;l;W9I>%!`4Z~laLQjDEO?=b}AR8gklsQssKdu_{NSs z7ptOw=QVFXwSM0ht|-8D^oot$`$EMOxcUl&yC@W0T_3O#C3{LnfAPtU1IOT7=+E(! zg7t+}?|<^!n~efsZdSkH8^h5wHpVIKcAlQ;x!?2p1O$!FI~H_0IZrYWJ<*9^BOmOKejQmXXJEfU3~Sz=jM0LMyLM;XzUIv?%0-P)Tn|=BxZ{8SZ(0b;U4e&aI6Rp3s9TMpd zB!iK|S@=S0dlJ9`T*Tnrv`ws^rC)tw{WI8x-EbIQs4oX%VtR!9HB8|Qr)60W9j`{L zR{bgh_R==t`e_0VemK1Uj@%eo7w&-L0NHY)c~i4$snt6I-AQ3qN&g-RzuzVuZR+)# zso@a@C*bW{p95*TSmU!c*aAdpDgYzsYSJ8JbCYTOFyCqm;SS zQcJyFjwnZBL>g3Mt zV*QaX-*a5~n%pn%It*!I+tHD(Y}yoLs(8s;|=Y z$@QPy2y-#FV7PT6WH>&dKX|KtWaY_~@2-4mSs5 z2QJC`=4`fnun5ZFL2JA(k(Qwf| zB1j1FQ1;LdX5Kk@)%qj%TybJ@RIyKh6HRVt&;WBoE&~RLCko35nhuL9jN--NWxe zrC`14<%#~#0s@v9I38^nq%I{6AKUt|!=3?Z4a(;TZn2%lLB{Y=Y2=gRl{1GUG{HDXcq#RLTG7$=f|2RB(lVMm2KhBPfQ#}_B#xx>X zOl93*M?XBYHXSgcbrgX?j>AMj`c(k}h`^u)9|%c&|0hRH7_FmN#up!bGW1|sLRWnB z;^A>=8@>d(skj}M0a*RuE5KKD=NEgMr2_CW2@y!>+RL}0>0S6;HGTA0Gtf3$Z2voFJQIUde1S?VzM=J^yl~rg3K@pWI3P>R{0jvVz z|8wV^O!K~k-?#rhPoJl~=biK3_uO;NJ@?$RIMQ_=vtU&gSFsRkEFIcq*H|e6v=E)H6&9B-7Q!pc5n7;o^^sX9tR_rJm4!Tki*OIF)iEtBJs@q?>@}!6u7w0K zcsW2|iEQ&w>BqQPHKn~hRtd@{q0=r334zJ#x0axIsSh@b4kn(1p+X6}DzfTZB`99x zK-*@hNNp(L?Fr!)*_>Q)Q3)FHq3?uGYZBY8$vR*q>cl>+l@Yu=3r4AKG0LIiE?bwj z8e9;}ps3|)7FyJQ8N>tNOVPxcY6Y;~YHbNR0hNt~j7w~>evq9$;Yc@#OHh>THb;CO z9e5uX$B>t6aGxEoyo(iCRP>J7pfjy7hoQhB8Mw8ckj(y;miflA#%w*{Q3hS9J^ENv zNp->=M`=i-FLC4Vxb{E#n9XkWRy@o1$lqk%iWK)kC z4X$CEBDBC3b7TdqBvNRSQW!;|48>Pa>o8fnq%K-~d8ki3y72oYFl38ft>dWDQ&fG>`KFBE zw=5Kb5OX0=07SzQgQ>xrzDUcPvrsEcVr(U7Dy@^EcQ>j%nPaurm7ob*%p}2Y#Lz!_ zYzYbI1eZwg#}XI|AJ5th)(LAY6!${>?H*maNjVDzgrOzCur;P3{#hHN6Q42r+lUXG zik&fuEeJY`)_jk|R^D3rZ3OBD72r`&tOruexURwW?vPZmDu8iiA=FZE4R&3~3k-WS z4HvC`jr}q9V+b{LF-VQQ9ib6kFwe4mB`8Y4_d{){qu9TsXf&S1!irXwcp8<=dLmIP zjrH*8M0EeN8+4+Im#-=PcmnDS-vlw%_TyyX!>OV>+FTNHO6CN9>;PIs=p!z}8*^ov zEVIA$Qt6AuAxN}^cznW^RVPe(+sIWv0vgONbH z1ZYFp;$4~Al45ehY3c7zZR*ai%3V6I~XQPvBHn|M7kuZ}KRws6T}H*Vs;w&+jAn|S-=e%hXzJp|d~ z>Wol?3Wc5Ba)-;4mC@t#a`IQr^zsHij5x$c&&~<8)Ah3gpNP4@ksbnK59pg(ht9BhslyE}CB6_$gTK=8L8c^wjh_ z6A{3xm!$_1p-F)F9ZrUU_@)qc1swK)TBy`L)3>wI-my0$Mw4p{JJ-Y_}-%0=zOe%5GJuF8rN9}a5! z7nBcbgF0JCFN$RYmY8uUtsf*o8&L2@NkMTAnv(=pR*(mtyJczadE4~)f`)}Pa5_G- zWZ8mqa7h0ejS^W-o73#C!)LM0X^i6cKr=DbFdRBDjK)GFQK#a6H6EHaYsq&;deT6Q(g3oYP4m#+~V(=l)#^wMT*j-P%6C8`<_W_QY)*EH)iv&P~=7>m&9 zFbjKdZ0&&t&pOB@ebXz?l8EO<0?z+ruJJv^7fUgeJNn>l^k&uAe1deRg>{@rS{YdU z9&?;r+6Qmr{7|^wN>QCl)-Ri#nm0-JCsgxfaB@t#5UB{u!egBvℑ`FEl53{I@LC zmbDfMK9mfFE9TItimXgbpV5MIGt81u97hjO z8`eCGIn+QU=L}4*JX1NR-rRf-<{Dm@L;xm=pDrOw2S6W~lsIa@j;0Z-IQpXECd^A) zf@~k4uI725_@3LOSUUoY@wq*I@-pX$+`p1Iag}BODuy z=&}r;XW?*UAR`QBjXEh24MQVvN6Dd&eGt|U-fJcI40G;Cem%lUz^bwY#1f*OtT^b` zCmn`NETmFUgw5pUA$TeIFg7^s*bsH?LH=9I@*j^51%i70fJ`$Hc4%FFL@~J*cYKG7#5#qGUV`pD1sbtY5NubM9Dr+9qhUbgFyQOu%Q>DvdFH z?S-tP`Y8zzSuRqeS)uZAtsV*c!&l^E#l(>jr)5(uT?Xpw#eWm%VU2FYvpU%igG>9Mkytd5GD0zaS(h<8TWwK^v{c^%AL3Af~ z6qPGa0z-3KMeg<`h}A@n{Qfm?)3Y2k=3vsJ@^Qb$>-LKyV)9N6R)jN1_QCDX{=V}J zOukW^3?^;jZe!LO2rC91199@5T6{Ba7~gy@es++l$W<*xYCf(@_pinRux@GTus!Kx zx}1s;zszOR8~aGG4gr_^VWRq_c~kDux_5N~<&p(wE~r!2UJpa7Zn2~C>P5d;Sc#$H zpWVAA_tWCC>6P|PCXL=UA~hvr!~H_NPZk%l#I;{bg8}%ENu4qGlWV6D@*FV?cezBa z(NrH3?d(N6QL^zmY|s2*vS;_@n{wA)N2N>Jt?o&pHcnJ;cT8x7T_N(?ZpaC5n52&W zd=u$9dE<)QMQ?whrX<_`8>Y85D2L49?2tb>5OYPviLLTY?j0&$9D;6}`xKTHZAUc4pu?2YuYRwPxA zX(ip}RF_#C=nhyJvh@p?Id7N<79B%<+~buExf{L!Yn$@ksm56oLs6|%Jl^kACls3G z!~l8YCZOPr!lK=KR!(&@)ucEov}4j2tUSNnq%ozf<_N0Z2~i|H>`I2jPzB4$!w`eU zPl0k*N`Gw>ER-tAS+~O2XVL>fhCvB+6lT+9-MH-X--_?$50lBu-rACT>{i%NxL|ci ztTA}U;V6VYgU=5hg_u4@uDu=h!2D2jc$>X+T(@S{io))TLvtK;%#nKnZ$6I8ab%6` z%3&k9;Y-uYo9BIi6!g|Pwn6p!wpl|3?npS<%u!$Q$WFZw@VmezgwhdE2!ng4E7!}V zbIpW#o+q!Fujk&}?!^rxb(I-lkm0mX9o4v%PQddkE+byvJns{Tc?it8hOAz{YIdqV zj|r|M>g1p9N$xF$ip0@D3e&~Sbz3d4VQHg$(yDz9HTOGvl};7qqt4}=6>N)VFX zY?#DEcPA{Yd75p+#859BoEH)}fp7s36q4fCu*74ZXz!u~9Q`-i-hd zdU~dnhuPD!J{lU2F+pjU$mLUtk=;*>_e{4perh;(^*sm;!Y20Xdl5W>V+yS<%pL;+ z+Ht8(WHKhbQnl1H8j_QR--cZChH+)M0cPJ=Q$_CbZ$l%sVSA;ugjq95*WDdr#9gjb zpAnAve&YBlKIHlR2ynJYR}z%AGIhk+jGma#rqVI z9$$8_OP`WyBnalcA6l3@N+y4B3(7w~v9ls)|1LCWL)d3jC``)E9<8w_GT0?22M^*$ z+)*NU?&9`b<@ZWvB(15=(nn<;%_Kz*cPA=mhvMBbC0gLnnqSZIA^7LPuxRw3LN4wa}bX*LZ-$o3y#n!I76 zs+=g<2RHwK`g5S?X+>q$CFBpnDaAxa?cS_mV0210s&bz3Au)*2%Ji9jKqMc?knL(G_8zkR-5*{tiAUXD(AyaP4Q`0^{qblz7`NawM zD2mDWW5E#-`SR0v8-JMWd*xhXZrL-iZ5!O`OiB??m_420E?8Y6a>cWdLEb3+L1*rx zXE8nM7(7+BTk0^3C(UE>^q53s9X5tZ;5n!|?kL&kf4rmw9(xXKFI~AHw4i=h-I2QW zODAiO*Q(CgcZQ(GzvRf0_0`uc{@Y?r)xA}VDuWfjtT=1Y_2}oR6?|Jzv4Aw5*?)G$ zWZU(lq~Q-wx660}+vd685k6GK)``$faW7fJC&r<1Q#evy2;QXwURlOthms>Aq;-)Qe6d7^PA~{2z^MoI|yFKW6py zNwWQo>2~R9CP9?nA>EGjJF?z<&gp(jqWCTJJ*SfbHs?JOMoj##e`U>SE>65mv(w2P zE5ApwU7?VQNx@pPhFtv-M@;7>T-)`r@{3L<>uk=8Bw{Hl2cE{_v|S%9z5_`SrEs}1tXUu@vW?Kgo^TiPN|&L*Taee6NvGi)5-pt^BxINSrKS-{7)GvKH_w8V#>&w?NYgj2$U^rPV+O`t`C=% z{`9i7=DZ1&y~RaMbK0*8l{w&alDEpQ5^YCv!|{8sKi#EiyFOU{rqjvjoAV-(TqrIo zg46z{K>3?aCwr~@D&ck+*6E)AAK&CJf79vYK+e8MsD${4S$;e1Z`xIQmHcv1xKAQt z#PV~HREH!xzeI>MGGuZgsZxq`IJp$bnR8yn2pO2#bWeEg>DZiIZm!&(64kcrFE74G zDwkg#K&~>aMlLPl*|yJV!K=^C#v7X){=G4#^zWd zpY@*0${(Z*_bHJJ88{~-lOUC~m@?)^x?5ie*<~UHvZVt^(PGUVyhkEZvOIoTAGG@V zOG`RIez_8~QX)g~oDe?d90~BBgA`PxCx-nX60#;yw4wYWSRv2}#a;XK2zN>GgCrna z5Xsd+H19np1fLx;T>VHDm&x$jKtP021421EVGIL{MB??vwRwd<0C&2sKYuLmW3kQRc-T#y^YVcayHD9d8i$d#1wS2PGI8aKutLN@B2X=X4v!Lw^{f^1L&+h_tDABS z-hUX>mm3l*A0Zz5PaQn4vhE$qnz( zv_dY39QW03Ar0|sTFKwvoBoJ&y;9LmUZdyKst<5Z#X;SIb1HkNMiH_BgCr$qhDK6$ z#h?}}{sB&o{9)3#a?vL8TI26lkRN`)ndnRZ0?Mw*{hdI`PBd)GdW7PX9(|*;iflj9 z-snu%NnrZSSv?K!F*5n{7Tjq({z)6T{^XoDRFbKGBQy$cpvAA*H)IAZ0g=QPl=UT} zGQYtPU}^FGzu_z4!$_+A!wX6Gf99a9Afq3$bTF0aV2G(q{h~o*k4xhZ_a@{~7Ukm~ zg1kH!IrQNA4y2nsvx;o^X!^rBze{Cc0eO!KlJzq(hJ^?9kduqVESx1Y@Jechh4~(k3jK*ZPb)y~> z^|bgufmehFgJ^udom?w@WhFWC$sAwHY`3<{7u0R3b=OQ*AFTR)W%VM7;BxBPF`!%$ zh))X~vBdY9&3#eEj222l{qR`7u=K|J8uQB=_%OID+cuM~C(u%{W?6nV-i>nNIm`3K zusT}ii2ahF%o#K=0l4au1AgtOA;Esh70dI>>v=FFzczuR8-Kcryt+I;o32FBe$td* zv!-)$e-BoGl|+7BViv2VIlsJ)3j&MZRP5&0O1|67LHe5&>|ANVJ9e%^-NLXNJ?vHJ zgVAHxrAl*M-GaIDU_?a_3~{aWu~p>C77p6GT7ed%?JkoxBptUaMZLyMMlb9gGIaH^ zlReQ2v^*GDZ=^kSzj9&?=~|he%Y;L#ShS8Z+JI?ze30o38)BnoV^@3xb_nH>pRWR1 z9*i7vJO!W4tFNpkXRhYVR^0})P#s-B%c_npza!Aer2C8+zs3>lbQU$za&mhc(DGnp z{TmNqwvRu*iWJ)Nb2ZYkwLsfFx!(@7Y##1JQswOw+f5nOu)%8@@|XDQ^0h$AgAtMV zs!inREvWbNi?y8DzP>KMq4ClMb(?FQVCe5xy$XgF3y6RHzkRew^a)z9Y5!$-CtI*d zW$lxPCEmWlV6VdGSDC`(OY8G+zH^6(;GqZv|1s1^tJ;vC&Hbfpw{;^+^GnM#caDUR zf+}|#P2n_Z6+6QuyfNR=z#pa+i#G3l=Al;d$Bi7ie0&x#Leeh*MwaJ#A{lRnL5NG}i$PpBi z>P^7N8zz&vZ-OOmd37bZViSkR-`ot0aMAjJFiik$ZL zW~?0#R%}f`BTQO|X$wa+B(_3^f!15rq7mV!qhFF46Uyvnp-)oOqRYwQt-#6yAsF#% z7m!tFa}Zvzja{AI^6Et6@=>oi6C7j^xjvAU#n^e?ybW4`3)}nf`J0IF3y-WMC$@2r z)^7(==j47`M{cb6@j9g$Wsx+ZVHD6F)ma8h@^I;POp^yg)G1o3-u=+aZRE)IGTL+V z9m}AEx7GI6Twnb_)gLRXz_TSKTnw7&D;op)ZoR=iB3H*IvN4G%6(_fg@*Q>DQBwHF zvbhn*6%2=GH;X}L2sF*FXZb;dT#W>iWb78Z-kvdp$)5H3CNeJ0H#YD=UpaIsl-iA7 zXeBR-IavQK0ahqAT5XJ#Elm*Be9c2cvB5wp?lbifu@qC~jv_keBhbTj(<<^EDF@%P zvizDh%rXdktQ?qoedbJ3=ME@knxMkUPI8qTE60T(;OjY>ssEqV&}G8chAE|b4N+zTc1EF{{6j`WX<{c*r#*_cjVg}_`|SSt5920Q&mB1v2?2YCEw9;=KdQ! zXbgFam*p)vsF9>ZgWl}0PNy`;hghtu4X{H#1yVhczldCI;IP&`Mo<~76)OwCK%Xb3 zWYjXDp$oUo#=$5RtLF6zRIZtuDX-x_M^v6lbVx>k8tF1|H)AuqlF{-?CYfPXSY(up zcMVR&Jt#3;d!H8<{TVN0xN4chxGj){(#K6=eWvTEdagNKVRT^)ow+jJ{ zMXc*krA;QEQ@2#ZeT)?PU~?Bk!3!3Sh%C3U^X@OtdsMB{4~ldSg^`H~v#7_y&O2zs zym>HEh*^r!&x;ANDVC8Vwz9O?^GGQVP41@^7OpA=W;vx&wMRUl^J)WwT8$gst-~t1 zQSyd~%Jq&d_s&iCvq3 zs>vG!rOw373&5_zsxMU!)pS+-eBm2{W_oG<-*q(Dl@{<|w=*U=ma#E152Lj^Jzmwg zj2Ik{I{q*bm~MlWyX4|#@)HM#jDPF~8DZU=sxs0$Ukh??8%?th_wjThR;>TN)^u4?);gnQ`Mr+35q+JX+obs&jLjC^o^iDf?Qd2QIK1F z`MP=@j2vlmz}~q3z16vY`ts%U1d6oj5`6r{llxIc+`}hQLPqw2489d7!u3;U2Ux zi2#fDH*VnN!N~E6nw`0=p1fT^FKmZEM)tziMoGcH(Qtc%pv)(lr) zS@ngAFE89j*6-RSTH`vrsao{;b3mnL4UZDDRQgl$GpLk1`ry>(1muT<`LoFFUs~I- zMIIR)rJkqlWzSO<*`(PBlFf89dynQXB3BO{vDB`7N7H;j*bZmUx>3&b6)HET4xa;T zevo@PQh?z=p%M8i#*P4bq`}gR#{|XJO0Ep#Yn$hNgyhE&Ci$4VFe+HTtvoe&VeCkT zwxZMtVyT44J4XV6Yl2w%@~s;YP;u&%3}4(lj}n3Wj9EVvX1bW1-Iu2hA06WHyvROR zWoZs6ykr?Kqf1k??TEmi7n++q{2q!y3q$!TvM!Q8qZKY9B$<1WsAm#;lW2pEY-MCL zW?A;~MDh(y^F2Zi^;9#Y;p|Oqi z1+468-V#=b`a~wXFX)uW!um9tm;vh*Bf!c75yu<*imtU4SW%uzYYpv1JAnaUi zdZ~6CK6XpOrkcGdk=} z$s{gi*f$#RD>UQm_peGrE%QLARD2g(etz$FA8RI8rpvn})uP{;0A?7gSzu-j>Xb6% zQi>w7j9Ke+jE93P<`Wb7raCT&2)5sZFqp@mX(iSS$Cw(PaiBc*-BvPvB?sm5t6}vcjJ7r>uQ** zTnH&_9>Ut6D6AomU(GoLzkW@A13hD%UF)m)eDx2j{#3d6l%tDs@Bx}T%C4ZsB6oL+ z9ph4`LZ?e*d@P;snanped+Lf9Vp^_S;`3R%=Z13HDXQbOX+Ed>B!k{0PN=PVR)u;0BKM`t0X` zw|nvc&E{mCGee#B2)bB>grU%|Ok@i9i=RN+ZUkOFj7(mAQbn%5kt5P~f4(Su2NsqW zwJWJJY1HyiL~ZRadW$JhNdEKr#yT#D^$=fc7+FbdU*J%BCIrkhM2+_)mQc_|GzVfTn}8SUqEQvo_G} z>vAT7DN`@Yf4AQP{^LT3|A{}e?>*z!@OIt8VZUX!vQk1TDzQxF8H)`DMS71tr5_C# zm3}d?-U_+n4Wr1k6e+fbBdz4oTg#t*TYlDcd&h#BT=ntA4V4$vX=`s@6cOA(YmZz} z)X4{E#wq(UkzO~^Day(`art=4*4s_B=L+(>eb``lAabZ-E7hJSR}<+yoCWmU3tB@? zmX@(v_2Gz+v4tI(QQ=^xI76{+s^^WOMjH-x?;Zof#oy*2+_Ik)6Pm@!>LPh&c+@#z z^b9J4wv1sgK-NuxBc{Itj^KjGp}*}zV$glgR${x4gLLSA5E^SoQ!Uw@BQ8NDIC1y* z=%6s5k?36gEayIUf4;tf4gmbKEO)E;<7~etzBJXNo~yCHIPp0V5Sw- zgj^v;K-(#ENW*=MICNsHSYrW=Lm%MG`StJT(Xd4_d7u`PW@ExF!5*j}luQ=7G@=28 zFU*oSvp?V1_$gTK_{aHTMXtXd$Zu=x^9K_SM(jZmUR*othLrTD9S!_pq=>HVKw0xV zsv3UtJNb2`bC;LiF*s|kslLDJrAomfp}8Tp8O%p^G%pwNs?l+v4m*UYFG4UGyQTMRRw6Kij!BphzlZ(Pkpsm zFme^y|8RL-9>r1a=^y3Wu)iHxUS4>K$u;UpC|w?nS)OubS)?m+Fd6ueBZ7OkkZJ$P z7Lv_z82=kTE^3$q%gR&jw5i6u%!ntO_W2B|ctAv6{xLKRZ8Y*)khY@574cFh^{( zEkMX_iT&L|kwoI@?}<#H?3ZguOuC-SpVh!0zT^0zO?#iYwW8z@dX8h_zWzM0?hZ^I zph=AEX%9#Psg zHa6bZ=?Yq?OQeZJ9;co`K1j9XGHdST$AN?H7j2YMMW4c;Llswxvq7!iCp86eFGrWN znRNXM+{lL!)f@l0F!%jm`n+g1VKpqKXG3hnd#C04C?bh+|BGN~z0*ZMozN`Nd_gO1^^J`666E8_TX5 zv)AOvip;)*Go_076Y#95-UQO8UjkAdjO_Ww0TF5V$)@_;)|a_RJ->%Ux+f3NEZZxJ zlMN0h%v!N}ERq;;I);(kR6OXfQ7Go_Y`llakwc$DfsIXPwB}B{lAjH{ABq(!N$aa% zor@411luI`s-)XKgPf(+gSqPJfJA|8yW?&*h6KijoB*ZDh&2;8`#%#AW%IN=bh z43VHTWR`U!H1tcqhZysRsgu%}YxqOy_h*)W@6h%3*_jDu%&bWFkJ?Q^;&>Im=MR&8 zPb-bN=U&Ytan-HYo5mzUn{Fs#31{MHv7`7i9GCoI8s2Xq4PUFR&K>!4UME<_ELeCm z+*4=Nq!uvMf2g{m;;(yDtJYrcI*eSfl6Q*7QM26k;om=l+j2*Tww{Xw*Kgk(AV=TG z!>odfiqxOTSFXL@dH7u5-BR>=@tA6s;r{Z@XE0pu!S`>wK|mg!&TlNEtlHRoSXO<( z4egNN7MlErx`q;8(v9Ln@GkYB3~rA;Lh_pnEgQuW#VKi=|55Z9>t8{J9^N4%ufO)0 zZk!8_!;RxRjFi34)0Dkt4UfrK21N58E?*XTFL(EwUp!ktuKip7krps5%EO_21L`xu z<%B{=5%^!@EcZrV&o?yB`vlo@@Z|sHzu9}%?iGg_&}CDRE?N})(5h&_7^)(=6DaGjFzFC;>iOvsa{^J5TQYen20fp`;-~qK){&@Q;&BudF&-@Uh@y1^%~N0#BRbT&M# z*C8P5C3sr5pE@jomt^?tl0Q(a3?+ug`@}=asHz|JM~bU+ub{BJF2w=S8YI|9Gx9c4 zwXjf*#=^I5SyU)GkZ9sDi_{>GbPkF7MG|Y5wI}IzA})}wd3sS{c|8wC1ox>C3_$%d zFE1*T@3DdQ;|id~647L2)?5r4x=>63z04BYPMISWM<^0SYpyIb)$>4PGLP9_8@^)& z`A#Kgw$D@*s7v$!O;BcMiyq$A0kK4{R`f_DCSw=N_A3`-vOEwG?DTbzp{ZL}kt-H+ zu-;Y8(ts&rmAW+Aeo0aiRvK)gfV>akSah;)R|72%#+uC6G#_0_EK4|O2Wx;9>m>qO zR`zY9ZlysYcE^UYMvrnx6lBrMYE3M<+^BdRuK_c>^Ct4sAPr-qeZO!dwe*Ssgo5?8&8>`lS&C z>JKyU3#-Q+OH6?Xs=uj(%5(~BG~fk4)V?kV-5NH z^1=tR(Vh8B#5@4SHgvyHR-^=pCBIe9=1lx$#@OWzYRi5wGATdH>y z4Oo$lOu6dPwU{XnM%xN^kc&*lHHauIlXYF8qj7XW?MTfx>-5!6R((*pevw&_J9bgc zr7Q#M%d_wC4Y{MtSjN&PicNSJPmo-*qtHwqSzl=N43Bf|=bi_yjP{hi6dw6utKJ(4}-bM0dd|2g7c{KOVwe+zwWjJMfII4YkZ6V8qCmi=$0@TXysOJrnLx&M&_SkzLwUEFT4%6JY6&S&X7nN61HQ^r{ zVtVBfXGl37)DD-F|DJ7N8Xk2(+v$#=K$Om}JE6 z(gv*QzW!mvGE!a)ZU?b2#~K1@J;7X>J26lF8KANQhCo?4Ds`Bo-Km zkv}R59S!_pvgh%eHj{I-s4-+!a`xNQc|Zv&(A)-=3dVS7I4BVg2Gxu-IvnX#kb~y| zC4ZQR`X$?FaoQ%b;r#N~uLFnZcYv^9VQ~rg~x>GW8|OQzvx|?=iA( zJq)DB?)Y~b`Q^@81L?I33mwZoSWxi*jq!r(?1k#!f)A>86R`51*6#LB9zfDTDblIa zkwy8zj4ge0;BB?hvC z!K}DDEB6J56f~&%+{+5BT1y<8~5{#iR>(+X$cwjWL>_(&FSp}zeIFwpu z!q6@0>{j=6DOmwIQ-+qJ%p6aKhW8xtk8CT&Q$A{&BP=k>>;>Ek!Q+L@j#3zvcSP@X ziiG;1;jZpp`#7q%9{E{e#hG#>Z_d4*=08UEv{^6A-L5KF1!ysSfTmusH7vSD(MHgc z>9Z+qs^LzhlDwn^kMKr`s{MImu18mZ+YBz?ZhSHO>(Q86qZ7Nj zpjEHm38&6R>eNBZ4;omYmx5M}diSX3if#~a@-W2}Y?sRr+;U2Y=6{&h<-%Fx;e(O? zhx6ntgq7_m$8MqR1S;pFF$L|m;hpft%xFzeytjf7UDH!ohSF#AJdzVQ??=bYwZ6g< zveR8av=;ha;7LSkp-TX2yP`|H*oR&lxBz1jRgnpIp?1am&*ko3(XdBA&JE?4tUqsd zZa!2aNB@%qEx!&gAesks(`-a3i!#z%Sk^S(Be}_czVjskK_D3t8X4ULT6LlLxfv}~ zFe4Ov#Tf1m>8vjH6_%}-{}K51uI`|LZo>ky`jWyKt+d4eV$QHSakwPWB%wz)f%5L6 zqH0(_XJzJp@Zm%M1-aJw3RR@`GN6M;Gm0AUX|G40L`a_m_1E!jIw3`O){6O|sN2_D zoKs4$cUPfm*(G$Rzqsax;!eK^2eM1(POoKmdYTx+s+~}mRH+b&QFePcWe^XJhuM$6 z-w$h?4?__D>zm27@^~|;32?Tg?Li0_j!u^XFMD)~_jEg@BIkfp8nY@D+L)Zhdu0&z z3J*s11U)b#1YbjrOps$;{Wk=(FxqI23~NS+dZKPU6G&z}BdPB25bC}Z*QzsISXR%2 zk<_pDvj^6x`@@_)`Dh=jd}*Q#ONAkILOsNUM!U3HCgQS70xa4!{h$ILhU$h-?jTq6 zbCm7f5un7LOfzNJJ-Ii^3?-OuM%86WhP&kQIE(V#2nfJ~k;#YPF{fc%Q?}^rOmX|M zo_@Qx{Ou0;KsqJqLx1?turOj7iLn@u#4t%d3?UjLn@N7pzgLj;an4fd5|}A2!f37x z8#ocr$t`_iEn2Ch-MCKipmql3|2q<}p?EMHX)Z)0+npD$Br^%_em}sT9%;4=Yv**v zQlUX{W;8LH7D=by~BwFY{4RlG9w^8ABKvBkMAHak8t?o<58f*YKDN4 zVoa$)4qCI2b8v<{Ay?KWygJU06RTv4kkoi^Dtx0`W*w2 zOy`)Fo$Nakz{&$5h->LtY`B#FnmGKaE-HX2w&lW15Pc!neWZjsg#5!s!tcu2xx z{aF@Rc_4C3bbKdSdqo)`{d&!n>^ki#uM^s-G7(Xt-)9^OW+bX)3FGZoQlfHUWc}NZ zB5Y%KRV9KlSC9`JcbG^+(=Q=35C5i~JZGx9n>{=&znUfSKEa{$nnTKrAV=<8_H-e1cyBRIo9V%Q-D|{;vDKiql?7Icuzd)AJ%ju7M4m$ z%Z;El4@L@At4bks<2Q1?|IW{Yok3Tc2gK4frbT+0DA;99IR=8tsE^f6Z+;$Fc_6lZ zL|*l;Hq!Y8j>b#e#A>`#nLphTjdD~R3me>{!-2G0!eTvq6R`3?Y$|eI0Lreqxy%=o zr!Tk#SfMB)m@6wJwqP_YWdgd3NEu-%j-oa`}%Fr%qW;} zZtbNtU#R|3)o~O|IB&LK!a5WTJU~-zSPkOQTSlWy+L(!J2eocvf6368+JhJJU}Vo7 zUq{VAntZtUOPm*OxudXVb?4-PvFfu+XnW=UPN6ZN>L0R15<@I^r0*y!U&;ZHMpGWb zzUBSZ2VPE0-(N$% z{}m2*9No)G2y$3vc`jhG4=|%DwZ)-UE7B;_T4d$51O$k2Vd&)izd7D9auwmM<~?5p zZV-34Ok8nPr_hSBWATZeY|nr&Tf#m4RhUIQ7&&qfu8Ly7mi=p-DG%MrGIR?1nH3WU zs)L8!-i*SN(lSm@Kblx;$mY~X(Quz)WBrjyxrV&|jae@Mu1VG-dEmexP_ss7uiX%k^`v#$ zp)PSuIZ`|eG?UO>&_O&9Ic}~ztK@pSi$jIizg5^$^R4P*Ri9LDTXbpJ2^^X{KvN&s zl(wKTBXNt(ilK~d)IShLZcniAmOigv!cMF5zCuGC z7lf0*|#IECXp~Bs7#v$VXfv4{Ci=rT^ReA%T1tId(J& z57gvWt7zm|L+;$~7L6|a&pT-Dr;OAIUYL)^m+Dct8>!_ zL7#@6?!kdB$C%IH5$Q+Lq0&!xJ%HO*E{HU~RG5=~oqOzof?lvpzhLP-wbeDts@GL* zsgNzuFT9I72ez-hzUQzG&VjRwu`pVzE+&&??eR!*WJEcPdQO5LVE^R}ljA9`EO+MP zH(x6tCmt%W$zSAL?M&5%ro;MEo&hvMOM21M4ISXJDpVedp!cAfh(5qJaovN3rl$Ge z5CG>+q@I4W>$9B!x046{P^h9F0qyLm8)cG&IAx>1UO$R$_e;=x5v7 z>qUu~O7gW|7TVf+CZ`0bti%Qo#)j?TxVXR5Y}7CeVMbElGR>}AW;VOa#SV7+UC3GbhMEp05$w>a6+s??DepToctPM?0Ei7+E-S&_@ zBt{)NlOn1y3A@m<>Pc)x{9&^1{;yhc%bqHjXzb$D0{otJgpN(fbVhL^8;(bunT&HN zMjX#lmnv_V6r*Tgd=|SHb)?et7WVgUu|{PV2W{$JyV>FI?q`VNIsBeKe8-;s#@xft z6&!+P=Py`#ptg3w`8A`}E2^%nxN+f^DTi&OL5R4~D0xqLOvEx6iZ=fNi^hW$87%kU zwRfXy($D@l>pi7fa^v7(+pJ1}GC)hlI9kEdUe9XePuk+NT`t*mw9wu(AC&whTR+<% z02-l^2!C6sZOJ;|;B(Lhn&{?M&AlN|x_{L2L|ytcIQFFM+yWD|O6iqM}HL6$m(a(g>`wevx7 z3Ui9c&{H>G`hV{$D-IiHV-}0cf|7aY--RyN33xq&Su}>sQmJU}U}Q3hbdGH@|I=jh zmFZbc`RZqD%0CrIoBOb#`rOaUA&AWyuC%d&*i2sj6O3Fgs3?e~oZN^1QgAe6X@ucW z&DRkz@LuJHMb=znhzY?XWt*I$DOs$!+w19f8pV3)_&_Mq8Oo;6y9%E~esdhQ8Xty) zx~I=4TmD+Mps7Z){;hbDm^zh@HDvOMBqHsoR_yQYbY_GMi}IU)gZAaYi2v`$sBaZs zwU7T+K4?<3>;4Y3mdPoaGsOA<2YQ^6J`{x%CGAFsXaeaO#hDKNy-?r4hmpd+A3cve z`S>0KraTxqp2cN&F}~>QZ*U0k z=$k+bn%0zQs)-FovtmuR&N6~(9x=C)ooU@$&<;EpydrOxVm701anOG8pE#LxO-|7a zGIqA6{)Bsw8Bk`lwzwye43i^&f=Yh%pVT7ff`}@I!X1yLo>@thZ*#C-dIFPmOion; zD|>z)ii*v{BHLI(>QXp-l30lW4xRu5@L`kzN^aYlcQ|;rzYDz5$*IM_%l1SZNs1<- zqCTVwi&2tSl?oJXFmm;~g}Melj2!QKshplsG?HrtB6_dR`m9I5*DqpL2 zu-EPs$F-8q0h4+-i6(B9Gfm{)0_WjxGnGD6TorJ_ym^YVxdsj z&ZL8;P$H}7al~bG9T9{09!SH7u?2}}u;2^taVT^0eW1lUHkH?L%xdpaiB%)k-XWoC z+>$D?$8w_k0JG)6;LK;(M9u>ra3=fIzks!Sa%wrSvL2I(UWpzpef=X^v(~E7q54yC zvMncpl?P+1KNVvTGbcHd{pP=m?wzS+K+Cd+S=K95FqYAvM(9l={D&O+HSG4c{|&4> z5SZhFlE1d|KODgu`mlJ&o}zs{S*_zvhEkSHS}l%CBaSYUgq`cpKExr03nKn8RWV9< zC29MJLxBrFW~X{8f2&t$&1f0bKg(1J0Pq z9$>%e+kzRyBXU7R@HhBZ^LtLLBnubL%m&v|z1O~IrpSS7%HK3L<{veR{Sli_o{GBS zQ2KiWNVXbVG}G9?hmq6`@19T2?EIjD{BF_AY@i>-d$MAtsG-`htSqyrWOkif8j{Eq zqNKdnuVm30DrXw&xFF)cxxaE|Hq4JAeWnVNbxuyvwruR3iDN)D5);W7 zgVUGk9`AOBS!QWnJcD~B9t>fyo1malh1KM$#T>kMRkK8(`Eu;S4$4QnQp|u?+}&kP zB{b=xiMyPfs0Lm>j7+}!+a08H$;@nYF`epA4NyXtt^`W<`-Q3iqZNA+-jJn#q(_Y? zqM{7`yavm~gRxOWw>O_$LpGejnW?50XtAHrq&ZevP;<*|5e*}BFeP#Zw1W{A?d`Qd z%Yz{d7G7p}Zd=K_wHz*JtYc?OQ|H*(%5{U?UU9#i(ZvR|6V6DHvzL?0>p%cL3<0|* zk@mmj*DJ`8x-#DSnGPCRyRFt$b1fM8ca@8fQCo_vrNs=UI!;krtxS!Jr3p`WS5z)h zAtjEU|EC&fmemh(L1fPi+BqW-s*+f}|5-j&xooC%+<9;U(z9*(OdH}=r`o}Ftc)nT zg#&}5rhvg<9jWW~U^7QNo?8KeLq#K}t)!x58T5+~^?Q5m zZj-{tpom&=rmI^(a6XLo^xH|UXyMHA?pC0Le%Jt%>@4Lzkq^d42Uh_vmW!szvBHrKOe7gb5gU`CRju2jm$IV#=&G5< zdL9hQ^!3tx$-31Xw5m2J2vFe6G6medZkb7>r@ijRJmbM$mJ4oe!&31;MAecjxoqEU z;}Bu_T3`hc)|H8%A9HBjBF2`?NXF9&+~rf=S}#Efe3W57<-pMJo@49i-u@NjTmND$ zXX3A~o7u4J(gmo{ai~s>I*65v7{R5r#RvsmF+ySLR3=SU?e!bQ-Q6CAYgiW0TuKRBb`EfgkG=J(~W&CWAhLv%#F6PyWjQXU=rWoz?cx9w@6K2O7CaDijY-Tff zZ`m|68$3^S+=H80j5KYA#hCRvM*>V|Z*o52LABlVg1DmU4WdybZHxGusu@68oJpN;_!uB#NoI7*o z+TH%isqI)EHYQ9c>~yFYWyb4Ic;)^cF}Yzxd<&p zUaoP$JJr#JzhT{AzgvrVx+!F(l**lThEj2*#Mv*B4)(fwe7)pI7FO{SGJHP|MD{)Y z&r)9QR{6|qwX?2Epl>~jnKtUNLTXOQW7X}9MC20NxO#L#5g8Go3jbqYoLNEY#WM}{ zJQyi_wFY%HcW+sp8x+r!^L;5Vd_yvG=4zUh!ZxE1370PLq_~X$eo*XcJq-?of|CDw7Vz$!jK9OK(eHE%9Nb@KVG1 zd%cFrT&Hvf&M-K$7*mvOf{9*R@zuoo};tT(BA(rst3ud-94oMMAC`n6FnxM4P zk~T$&d?$X)A0~S~KG&K%ymQ7PShjOPT}^Gvf}JRrvA*iYg?lTesVl5w4ekmY<+}nN zCzY7&J=13}S#C}`?lYY;r!EbUj_W#%z}S+9jmJnOCR-;~$c1xNI`6R}zm=SAZ)j#p zp^8OkThn3p?3IKSo-z2kV>T_i4KU^?ZOP!%h7v4)Tzk<>L(_auklS1PTF7H(t~&Go zs#jLJm{@VRXV!s)%LoSb>QGwFB!XuOzCIJ0zawX*$Vy4=Ov8%#A0fxL#xEd8wKLAo za9AmHGt{;21m)QLUp`B+?7CM!54Yw-oj;)N_4|B5@@KPio8$oO$nm~9=xWe&@?Aip? zSYAvN;~Y`5({i`Elk}0jWET$j+sqMmt4=BYn+O`T{Bh7&^%RLo2=Pe{dmY<-%DWI!^Ijg5o`2JK;Xp&xO;e&T`Vge|V@=4@#@o$Qu|sNIrzAo5D=eo;u} zgjZc|9ztV>BLCd#1X>=96jt5NR&^s6E%|E;nRd>U^7o1t8x5|RHqnT&c}RNV`03%e@Mp+xng5| zy<;J_P07x8y9e{-!APUL9^3l~)DODF!?i(rffiFel~6V`5u0#{(axbSZ3=mGqC^qx zUN2aj4#a_;Auk`^fj1eVf%eqjsj7U5rwlbY2Cax7q5+&(8>H}Ur z3@5@mSPZm6s_^33>0-lNPwi-$O~$f;JZ2WDm_fz3C?M_cN{C8($G0y50eCPn*^81_ z#pPt?D!&%=%PfRKHOM~RvE3wtx=LZG&Fe1`z zKokfqo46!UJ`&QceOr(n?62lB762g@2u>fLAgXO2=e+-$> zX&UMEI`o-{*guQ1+YLdQI?yi1@eFULsbZ`K8V;nhL5aa79b#N^+jvk)y6(afJemUQ@nG0$FNX&D z|0w$sFu97V?aWMOGBcSid&nL_CM+TJU3$4dLVCHq?|V0h^uF(Vv&=W5qKL?%l;WBX zG>IY_5Jw`ih`1o4h={VN0r^1X3ozX%Ai{rc*S(X>HU9te^E^B}oT@o}Zq=!(bE?jH z4~Jm3xxAo%oI)!ruvNgi=JLhxy0&W?wJ22xhdp`5<}3$$w&fahLj~B1+Rz)fK%y|X znH$mTl|?r_D{3&Ypw{LEwYHh`g;G70YWWnV8f%hr7Rj2e3dmKYPCEP4i@O0Rrh|_x zyuY?+GG3_T$>6fa_zl?>_Nz&cO;OG`Y>kWqAdcY|w#gWhk)E99RA1Z=DzJNDXq127 zh;D2MKLOV<+c|YNE~vYtVyH-nYFQfzm^3y?wZ|MSZNZ?3n$SZ}Oq_wC0Aj5Lhl?BQ zYuYf@FerME8DGOwq)jCwY7L5v8$$NH9N$OoXyytyKc8*`TTv5w;>?S|xqI~@z}^4XB^ROx6WY_ze+?aUjZ8y94iix{c;i85+iR11+!9ovE0C?O)mXFS_-yu7>UeT$$qSB^!AVy~WV5<*}UpqgHc7GHsKxkIgS%AILd#R?;G|q%G2( zovL#{!jUzHK6u~!dUWx}=Ev8by35={-(C$i>DaaNE7x1xN)F7Kwzwk%d>b7EvlOtZ zc_!9t=f~HavI~SmeYj_aVv&Z?^6TbD)&(G~C*TH$BAtX6X?W?+c_0obicRKy*Uhh5 zeX1Vd=Qb}w-`;JXLf^S={y#m|k9~3;ZSo)W!8`N?y?5xv9y4~Pr%&Za&)tx`UJj|f z+&lf^bNWDK^XM<&P4uTeMgmXtk zh0xP?_MxGhggpq(gF$rm&9E9_dj{`OFuUY!qC%8Y4n`(d(0WM{MQ;XYS1ux>8`%|L zEphk3y3@XGLdRo&KNJ1(bIcUF|LK{pps77@p#AgHu!F#n;s)k;56x!W@)%W9yGdz| zum#FtB>N0VDk7s}F7?^?2K&%w7Ttn9ehWTLz-8mbbti)DJV_}NavvlcoBa$vq_!Yf z$f7pncxXQ#^nN8eX%qk!`m>m=bAfHGWl5^ZnuqbnOBIvd1lV}o+4tIK;i5*=2Jg_% z_fp6=BFpDaVmpXRx5D6pkq90?Zzddl&-% zzxeq@8?)*QAT6-vavrhu&A2mJ7io5xRTO28w^Fel+ieshmog`Z-irDmB|6Ao6u zMVs{6FJZfhOJcCr z#N^|5Ec^y{{7u~nLW3^D!sFG=UN1!)Rg+mtB*U~llR&0BL1+;b3Y~rET=Xr70!0tq zdD8qr5d62eqY7>@F9nYH7843Wm7@iV)#@RnJ~AIhu>-(SL`84-M=i*5R(#pqYX{&? zY=t79PV32Vz@Dqv+GbZAcF@~kO^M0e1(J2{?2%{B;BTMaxgEa9G<)z8Zl(8P%gDA< z>unoInaS%dK|T*zUfIWSxOjns-bJJtXRA`wv}sK}N}^>4 zdt-bu6>8D^51)F>1q7q_`(!#~`@w7QjP?GVQ|K!f{Pl~dXHI_U5V%*taz^7PieZN; z?g*7Ei46MvAs7@98KMWcdWirjFlRXogE9s6LdD(6vzDj{ zp7LMiV~V$YV_ra5?Ax+rVnhGG#-vMsKkDh*GF%%%eZ-|3do{wgTn*QdP{)YB%`ND% zGMWssTA7{=rc5>TtDnJQ?tBMUou~;ZU8|t}33u!2zK6dgokmxE7p}8?vj@3!B%CQO z^?Qp|(&_ccJ&vMB4^^DtESsJbk-0KX!0pbTY?%A?ee<}&#x$CGZ+OJ&x%{N37*W5TdBWjBZk$_j?}Ee^9G%~`Sw4G^D?7#ZG)HIBQwd$T z9@pDk);i!maJB&o9+{t*Slq;6Kb*?O`Y!s@A3^X(?txP*tLR8Fvf;N+7N z4TH`d&v3)L7OlA(_DWG3I&uYUYQ5Xy%H7;;F))G*H=dEFoe25KR8gx8S6O=-0NXgT zX)CFaNl!N6Mcp{;HrUo5vu~Iq=78ts%VrO9iD->pjhd#Ksrl_R)iBbYm_bdV*3tQ$ zlOig_FdFCHIy!IUvfvMLC6@4NZ#JL|g)$x~I9qL#xt>Jw`(ctrRLG_J3PeEOKMxU* zOfN)y2{T$8UNzKOdUgK|+_mra%>b7OBJm;OB9-fDBiu$T*3q6K^4GE7|2bU8o@8(q zj>ZMcFOXK{pmc02kmjr-3*<_(V01#L+hq^V?_7K8R-BW}nR(k|z$XIgu?ou2LLeZ7 zn)|FdYnrPm>!Gb}xMT%B5dHW=Fwsuk1s!|k6J7|A-?q2!Oi2i;=B_;&6>e@Vfd2>f zCNT0yz;u%YNKXTbg*5Q;yYxqJS$wK4=>70h6q;Ht*@T|>(SNkE&UyqcZv#g`dw45L zq-wkxZjnl5C*8ZMMZJ0o$(voj`q{-1^!QKa1M2`{kqZL{0PAE>2NpcY3}K5D)@%1q z=cm@3vIjbF(<}eiH2g*O``V+IEew=9n}pGBLvncw!Z4dwpEDiwaV0=Fw}D~c8%}Hh zmQ!}-ih&S-dp^Ap-Tm17e+nia`^EfiD@5xDFSF@M5g9M56A+KsDE%cErEnj19@Jp? zNUt^{_r5FKhrwkCm*9vmL)=v#+^3iw6%rg)Pu&0MNy9WftTL zMw)g8iY&!7Qfn$|^`y#qADK-^uyl^LzjC7ID!e30*?5$rJ}aj z2-0iKgrKL}mQ>mj zQ;=k$F-0wb<&FMjd%2;kW&7~!3juQ zjDfwWuyQH52f4gO{2k#!+tDECW-8*5X%cEuhCXu)R6#^WeUJA+l*-5NgOtS=gkRY| z)`7d)7xA5C4P?h0BY~g`VAaTo#n{XgjAj&j5g3Z7XhmxH3?6gwML`wb{`34cC|Gf@ z3PCj3;Fi!KZLLXLOT}!#UdKufHTn_VfS2j4BHQYAOc{ z`n;~90l?CFx{iilp5HYoCYIiOb1%B$Wo%DRqtCyBHM6{+nPkJ_jnPG_?yNdB;fO4W ze*X%XuwpVg^59wy+V7`O=;JTKBw$22A)@OWLr;rAxDIkzhFDK@te#C1FP?tBmFg36$ zxPnS}3v#%%DruH+!gk|rm7;Pin*L1)L|oj2R!C3hy~l%Z3VQsrzvCh0iYehCwb()` z6J^wyV}VG5sFF#{aMM5FTg7c0*wz^k5eDCS`9Fkjz4a|%2_m)^hL15w^=ZoNs@63z z${4I$)D;m+r&=Wu0 z25E}#&aasix6EGuuZz%Y?+Q}_?mtmzeY~$EK-@VKKw*1MySC)T&`EARuTV7p$$#Tu|-OJbX&wQZoiT)*{ z{~CR1^cSPw?Po{7JbKO2Ka3VeeWUwF&m5iVD~-H0@~4rXjvSeMW#rb84~=9-Tq75Z z>=;?z|C`~?WV!#`;b(^*9=>Dv)5BK`NBeIdHcy^4EFIq5UmG4;_S&+imp#}QSax{X zjeQ4}wU&jK87BkF$YmRr^$-1Z=*gk)58ZZp|9wNBm{bl`hAtjbPu@Fp&fvt*s=;>$ z|2+8E;CBYUF!+(d+>J_rMK%9-fbB@Tht~}d z{c3UXR)zCVm~L}=l0?*KXZ$L^Q<{;g@51zW-T;vNv5491i7G1Yg!*<&_f{w)VaY>i ziMm*-z;&x(?ZA1!KS0F`{&-1@?OcqQJ7*sma z>urYJMNd{~i<#sD4=q`PZ00|&n~7v4Dl#0bc};XWXwgUfU*P|yO2{ZzOHb12gr6x= zz6PfIYpp67V)Tu$w2_n6;@(FwJyw*)XeAv}){JZ_7EbH;Vp**wS`pF5)Y4|v?q$;Y z^ZD+q)JMd_=^55y)aKRRw0;UVBtud7Uu$)uc5tbeN~hYBD07Dn@iV%I{L78GbBmv|CGMwWU;1;cg|RGw};n zU_ot?dRmz=#LRVz&)jB|Qq0GitiYo~8;U<0rRBONBAMao9-W$`2{z_(NFW$2yiLc` zt*e-?N3078>gb0OL^jxW-LfL zT!EsydKuKX^vRuhYTzE89#HCNeZ@`|^jtm{n%gMA9D|mfMq_t(r zWU#ffgGx-^rL&a~7vi38>`HuWs-A8+TYWX7Rz$m+6`Un?aK^7K?tMU_(e zP(WYz=j4jf{g_YOWNI0ei89et7P3it-#VU5X|=vsN#j$*(os6G{qsB*lD3oan%Z7a zxhcDfo*CJ}_m^a2hP*TB(`VcOd%5{eOpY}y3VFltrfUgz&6Zwy0cI1+D)dAn(#+)w z?Q&I}+Vo?-d(@gyL?w-E$*RjG$nmH7?nY;tD6*Nn-RscCVxYV{othyuL@e(jTM@e} znv{?8gB)$wQdGzvBMXI6$xCGRyo~=K+LGp}0Ni{f6MloYnmRv>e>bWR=v2CzKkW8y6xM1|B%;4dfa}!I%Nv@ zL)4~^@!bP8n>#}J++I_`7m-bj@nn@oBUOae5=YztX|L<}H5#T9O)9CB(aJ#78DkUV9$(<@P)IqH3I2eHu`jiZz##^WX-Nk>a)%)bs@`Nn_DF2Q zb3EPb$kJsZ+ot{TvbDfWe-_IV(wl9qYEe~cN92q;ArJH2rOGT-Z)7}a?@TC{O{SJP za6>RjN@#^VuB8jPq`jD(dWEOkqFUN!%)s42z%RE&_w%|RG~|ORc*rr(p0c}@kiCb0 zHc-r~qk1WfLX5D*qMM(=TmmU;l5RK42B}6GjY_C<;IyCN%z%KqQl;7&vxBmEe1SY6 z`#ApxM%Wv(QDfAeqdcsWIiLS5f2H6HSd~>nBan!cLz{n$yZgegr?aG5!FLavJfy)UZ3i;ev|CRt+s)HmrWzHiI+>cSn30w;$~8P) z8k3PWb=Fq0_-3M-5V>8B8@x5h57%)!Mu^PG<;=u9Pxs5>l-g}9xmD)2HY>Z}I6f*p zO&48OWV|h(Em8={et>&>g5eZxc9ybKI1(k5+3is*y+;$NyYdQ?URo+a81Z>GbL1Jd z%bj)Qn_5NKC)Yqtq6ov=FYctKPPdY=hLljXq#9<+G-l(b+Wtz(#t?~iBSwaHweYXH zs(L%+u30p6HP_as5?faB^i(-dggk7c;ZYm1itN~Co*rjoq_sYi&gT?r!t06m3xDAD zW@vS_ozOYGZbv#YdOrSLm#L@@8gdfa300SUv5i0H`N*P0h(IVAN=b*g?Ue3_@ZF`w zoYk6)O3A8ICyj0U4&R+NrD<1Um#*i@>KKBxyjZ7CO zJx&F!w7}~eJ@F;J`;4S$Bm6OW(V(z;%T>k5CAh&+ZlpBF!|L(T1-bEyTi(wV0mrSdN~a#-oS91lu{6j zFtbJd09^kxxI?{X6u<)@!4FwSgr6vm;-BE^=;EJn(+RzWP()QusQZ;NM^e3?*iOk5 z01JEKIYBM%2N&t@UWm3V7dXRR=Qap;KE&11#e<iD4{ifz;Hnc}`34&DjJ#HH#A}(P18StfP)tuOCPIev zPx#^%Kb#Oa9h>ZI-FmfR_Rv!JX#C1)&l@*iBRvcY$JX0;4bch`rd@X=Dlio_pj*SoStd)%1W$lC#vY$TU4@K zP2@}ESUMlp$I&zEI}o?9n2NTi%uqo$_4hT9lPG9zegmk1W%kerj0hfFLqfx{L?GkP zRg|(wfhN!$8#+4y_Fxei5hDWJ`__$}URLom+Pews6o+_#b;>2a55cSJhD|WMqBaQs zx8o=TbbON_-sBd{k;6K`9DNNkrlT`5M=(k|v}tdw$8non0T4>&B&BlXU?cpf+y2s{r^ zu_fG~N;Pe~5)9~!UIKmF2s_;6+hJx!Z4izDv7J3UkKb(Q0R#%K7Rk;4nfABoq;)?K!1?LO01hCsX()oD?7}!cUec!- zeq<;yC?EJDr<%L_IADBuy%ZA9PN|u4#edLDKDuG@{LZ52hP6lY!n?RtlWEy}+GN0O zg@KnPt^rEK65vP-@>~@=RduLTgc9B>o}l02qv|r0cO6P zXaW{ei^Jky_<M75rx3nU{vv+Mtc_`fLBKz=j@L&^nuY_$Usk_eII9$Miy^w6SuLCfF8Y76Kh2*{<;ORk3OFEjiXgn0hap&4ow?brn z7!GhD*m&@k{hc8W_2yhi*7-1i<39t1_ZC$tKg5B9;4pwnmC&jZDT^`;Wp9L z=o`w;s;Pf#nmzvNMQB_l>~wq7a9rDF4{?|v*dB^H+)SIYw>&=5lFUQyQ%2p{H7TNk zSykjC;-6Owd))gPynAr9i}9{RkuJZ1a{2?7yxJB^$Rg-M77iRS8KBYLf=Fam*xr7n z1x6qghy8(tGG*YJfn=;iD^n`_eG(~}&;cVc8RI(iaNj?q6AY`~BiUE=9qy6r(1r!s z0y3MnNyvf@jgpPH)o%Wb=;~od7qxML`n_n34aj8>My_haLUO1dSjd<+B(V}vChm~d zP0D~Q#O=Y;lOi%YGWG`l-n!i+e6i9D%)qARus-mC|xJDEp21LYAmLSq%6;= z_gZv$1l*OyE$GM>-rqR~5xc_s=sQsu1ekRwfx>H~Ev~GwblOdN{TX95Qj{V^4CE4# z5%KGOh|#2exdGh~6DIr@aabzm*+VP(%hl;Obs-+6MGcUSM{t(Al}7zGSR4dMjYq%}=m{TfhfLE3B(4y#U#*05NlD z&%!T}*`gyt)>y4An)KGJ5I@*EVZUF3l`U%Hu=2oGd$F?-Z7d73bAAOc9S++AFC99j zDKK=YRn%MKwmhZm9WZOqCo7hnyHW5&7d+a3oPFOVM)B=~7pdqO@d z)yl<4n@`Xt!_&81e*0H`?}jLB;od0WTU3_5v@OP{ipl6A`JwWpKCRESu~tnr)E0N6AkP zsTTDEOqU<=cWtkKK^V`;FX5f;Jot3Xy_t|F6p>(x@oV!rx1Q-S-zt++kRx)^1=Heg z=#9IfHt+&Q6?))H!mfPm%e?z81NpK0?JTsNF?jSX49~m`7>b(Ek&gaMbVDD+P+oUi zrw2+fjSk*;dhE)OziXf&z1V=XT&IYD34qa5=_0=oL%3|#H6SVJ#^sty>l;ry@R2f;R5jvkPL2V z&RXK>$)eySwP-oZFzfnWddn|KPhdTf+6rMfAAr0U#f2Y0?$`bBk zpxBBfLU{%Z$2&MJ6Ol2}@^4;!dS@T94R-+?=9`_fS1>Y9+C-K05t-lQa!N8`B)=2> zSWNEa1kD}2vvX(P`k)(7cijnyF$eGz_!r{LbJn&uhmI+_P@U=99Vl>iiY{pCtAhYr z+)L8jbhI&F%2U;dN#-%u)4MA-1|GHolc*8UjttE zzxTYm^dYDfxAABPeB%2%qw8Q&Et)L2!+?F`Gf2S6&RN>o6t_~QSDm5}Nv^zHNWT5& z1D)k7FXepUKrc}LnZXeV)W4LwwbAy{?hbLt6?hw$#cY`(L1>ejP`cpMMKZ|o2e7Q} zcnJI^Q5(AP9)JYtp?{A2P*~k(KMboIEEp()z`HUz2BLx>PtcT1xa;N+8^av0co=Lo zQ5!^se|zT%{Dx;A7P!9qBk*a!cQ^rDVPymMrYshRD)D4WTS4|efKOw4q_bjtQ48er zy*k}XDfq@C0<*_{jJHS*v;uFD%6MHBqvScg(;1Ly0T~I4xb-I>qNojRA8GTx>{UMz zPVX=M6ga}UpaPC~dnEFX0z@(y)5)5Kuu2N}qqh-&j6$A_yCmv|j-+qnF=1>!6V8Zj zJGx6z?NP8@z!>7dE3nWeXWkrAM@{~)TYe^9k=It!)s!Jps)g}t3_lJsirOGEn=?E6J_jfjj|*RZ?3bOLE8|>- zNdO$?dx!pKaBAR!zBs42R#03xkT`$}JRG%3I;*5?HoY;=xN=1p@!rAttta5OL~YzC zgW^WOYnl4BFdpYUiM8ScHbvY}cNOWJJ4?HCalcL`#T@_ZN#H1ILr*vcL3$4I;@FeI zp!DW#@F{$8VqQ=UN0`W3D2K*SglF+YK-W9r*C6*(plqTxbinm3-ub=jDPd54^IH%U zhM5DSz{70!SHT;SH(hyYE9Z3Au(5|ODlar!0bl^fKq)8luqRSt7TKM$ae+R3} zID5zlk8s$I4W)~bm?fByB{K4Mpf{A$?;I98t?u6oCTIB>yh;tAqx@rDBpC`6 z%&A1PSt0#;q&xtd=ntRitegleYJpdT>w0c0g!exytkeC^;Z?;USP0e@qpp$qI9qLy zNuMnPXBzjRH$TS>U3yU)I`HoJE}VPNc}|#-{bo?pb$@^vfxU!-vcO*pXjys}pMc!ab@Gc0S zhxc$Jr4NTlb0Dm!ml9Z=zIF`Om$(h0xBtE$jl3ZI%$YC3P{3m4GV}3bCH=*;g4RJ+ zRoW$Uw;TM@YP|@`DQW{OqX*$VfvfNK%!>lYxBrYea_RV(qa{#QhUmPWHdW=ObjHhb zG``eXIVEmGZ~XL6fDh~dmfw6yFg+jrAFP;MK0a1Vlc{QBNfq4HD^wwSs+7f_yy4}} z%1Kchq@M?Q@Ri2Pf(Cr{71*QTMW0K>#~{XW#v0U8VTYk5ciCm`7IJ(KH0m#}a7%J= z6FTzH&mh?UFP#m1uz&8a_=~v&eEh|9!9YPaLMdRRr_fl+4VKs*3#gviX=QsWXSc==w8{f-m}6jpqc`cJePp6;b-Bv~ zLmGG)?|%ozad8_I2>ukPDx}t$M&6$Wy}dmtYiL0lDBywWYkLNiQ7LP?db*tW+ZMXkp${2nNesEyB5 z>p)P@X|Z`pXnP!ps4@bJLuyJLt(9jnlef&*BI0l zv%BR>W5-6@*M*XXi`&q#4gZ3Je&Fu)==Q!YAAj@X{%+6ki7lvT+2$+8RoZNUq+?NA z1yqW2z19wNS4}K#LJvK2&Dr1@uR-;JE+2J-mUepvZxjT?Yc{Jd6fLAb?g*!&+LWOR zgUj)=Z2~Xxf0uSACPf`k-{tr1JE$M*^0S{A0*?OKLt)^EL0zM^OwK{oErqvfvMKDfHMqHWI3IGZLYyCZ^fS5Hw1Sf+Qj;+WyF2%yWMmg}>$= zn|nwJy##z$F6XWjOtF~=koG{hoJRIB_;oQE-fSn#b5D$Qy?s;uB(3%voPJLs4e@{O z5Ry;84~nSh!1-45+^^pK(=GtZnCyOHwM}E`6)m%*0c|LqY1-TtDRTG$*5l&qyCdk< zsqQ!ch5mb=pd0qKM+Jv)%ZBdIj`Gnf1=l*zPP8B~p5_XKS-6~V9XxqzGEHQ@z62spbIL|| zDg7wCly0kchtY*=yQ5Hf44zbV;9$13Nv@z8B&q}4lrxDgUEAfVmz|<@?#pYZZt6ql zR=dNeA8iXhzSXVD*mT;Q4YJ(167XCNAWIsynFr!^jVr5yY=XU8@gkwf&0I8fyjrL;I#I}X~QP? zNEjHx;xn{+a0EWUA#EE7_%v|s`DF#==}*;V?gm8+WEV?`9UmyA{05a_sYESeIRxbG+AFL@=9dxlGsnx=6 zm(Qx>_m?kihYd^AhMs88zyp;5?2Pxf3p)(>5xoG!6DjabrP1pk4-nBR}uySn_{B{~z! z#-+gHt<(^ZRVct|tufMwB2v@xvb}O944tSAt=P4BdJdf2^};rKHgE$Ahf9CQ6QK{) z)d|uXFt=PLM=}-VC*r=dK{jz4n!WAey=c=p!k6yb4cy?!<1*jzk*6#Aq((|oA`DG` zz~l+=U;3%tz)jqSLY{lhN3ZS{xJ~TAvLzN|qb#~;f(Qou;gmO0BaAXU3m@DAUn*(? zj462R>4jW9ut(r{?7S}TDqk{s?eKSo{siEpjNmG7286Ifb=br49NCy`)!``lQjwUZ z>{6rI3%je)w+Z+qaf|YvU+hIwq@ale1)2!16PM(U9lTVQV&WxL9!w{=7lfb>Zar;d z_7H@0(LKlFeyH^89lT%rN2<#QW%Zo10cp1vXHZ=j7{4Q{wvq{lGgmF-vifFk($;Ka zD2eRkt4Fn{A3AdII{vBm+freWdOz`78TQ@h*s?MeK!oImWqMLXMx|AI zc^B2o2%}IxABGqn6S?$wtY@C0RBs~-xnk3-fEX<&$7>Dx>G_;+i<^)`r{Zg}@3=tt zX7)m?xLlGvW*9f>svas_i@0LOdfnpfsoENZE(DIEHgs(CAn%uVE)+yuwGV5-iGsX_ zP$(iJ{Ee0u_E)nik422_1BRj|aP*(L06n-*(5PbhcfBXR2Wg zz>VNCoVVMY5=$kQK?)X_iOArF!&_JH!T0N|@clp6!dQZ2m&0`9O^Tosj4qj@?4Eco z5DG-mh^`CpCX1-(z_xw7uXm+RnCPBz-=+uU2K8x!aCn76{r6^(j0Eg9r7V+;#NgV2 zJ2qd_!!{*ugRr!3LS>V;?}aF0gK%Q>_!f=87d%rgNgi*_x}=}95Y32Fm9IAQEW>Z6 zKQMCJpQsHTc^5YNZ6-m3fMqY_q6uG(CpSae>+ZNU9;|Dl@>T;bGdUq|G=mAgxCw&Z zw{rJ{f8T)S&BDPkX~px)Wy$0Db(YNy7s)m?=2qBiv-m=o;bm6XQ!n{&&x>I1zLkvaDRRt#S!Xyw7n zeS#zMB|jFfe?hpq9nz9zje=PpmBzDW5VM}&D}6_j`92@f^x686l>1R!k}48x_E`O2D4e(ZSs_qQDnUo?)h!dA|Lo!AAT9O`6OEcL zPExW^B@tom8hMtpu&1ZQWJJgTpz~Mf&u^Hc5?#Qao7%m77rHnJ@?Jc97$W5PaPk-{ zm(i3C(&ed^lThZfXnzw9o5@Ib#gw=WZU$Cefc8J-8k#FbICrzh^VTTlIRQK|A{@NY z6q-aKRf{oMf4JacIG$^_N&t5L_iekkBh_Yp=*}jh)a{7%V8dan)Bh= z;@RY9`uQtQG1GH>k*o`lXm9@nAkofraey|O9D5T=?|y%1!G%maQ}9d-u9+$aUNGnH zHQ?Pjg+k@-`qSm|lQLnfr|Npkt})@6nDe{QzB2g80D{)EaACkXc=K#0pl~dd>23$m zW##Vl+EX{q%^tlEYVd-CyK0>;0ENAsS*y>{vH@Ok0N&Z*uO-M=g+D)aE-wY!Mu|o+ z>ZMYyd@w1k%avh(k(-4DAtIyMn|JY#sDmGZGo!aJoq09vOODyYTuKUNR#MxWLBg%7 zS^)|pn^dP!^lD%xB181k!#mM=XLUEB-(L+IeUI7O9|mT&*~45m3O=>79$TCt+zD0A z?NvZ(Pz=dF0-K453^00k!x6;Q<~aNjFot@}9{p%{E5x53UIiNkHiiICrA6j+&4xRX zi0HC%wCoxXOhm<{c^lWj@!wfUO%*F|L+GcVQP^e*XAF##&MixR7H=+lx z7dXH0sqPkDBg33e!i7s58G5ewXc87|Kd{!g)B$XGgzQyMnrP(8I@X((y3H|!4#1~~ z$mqs{J2tmo%%^7T#rXg*MD4kInDZUEoD563I4icVmxXKV;|EjQ1 ze(^OtU0m`2mMg+)Twx-hN-4E6cZ4;QX!IZmCL%-JyAkG|s|9=IL193@d8Q73q#sGGdOsS@sAzMUR6E?&MwKR;bxC5Ap z$l%HV&K{<V74|5ax2?P8fes@pUl%cyp1YOmV-`o2cYv5?wSC1F&iCD;HDIjZfZs z5qj`WL8ceJ)!lN*C?r(dhQGCB@|DS7O@43kE0Z6aEKUX{m6K;puAKPi#ETO@pSXMC z^AlH3WG37b7fzfpF*e>Ee{TGd@jJ)S_+H}_0YF20`#pFBkzp7F!JcgU4XoG^+1S0f06MS3S(= zZ+rRTgf__fDTmn_E}P7Wbc#OxYdoE8nuxZ{myy>?R=+dr!njTZTQJ3mdVw&dbPajk z5!!Y-?$1U_VF2`V+00PTARLbLf326+POwf3MHprzvO+KrjfFk73Qt!l0uFON9j?im zk!ob`3{O_N9fU_g8_fwLO!4^`OoCu#_M*F_^0~|Mq(&Vx&*R>jx*;q{5V=q#3K3ki z1mlMgnrx0D6E%+}$x0Me2eES)gF_LTs5C_x)KY21Yj^o&#Ev(x@EWz#K{i4@t)yy6 z*OTjNc z#P@k}y)>iHs

    j3DGq!ubdAnEE{S;w(l|r`W8^KaKdO-yW%9O>oss=(4(U?PixB za0j6}D;(lTsE7&&K!C`Apb&I@T|5LX+uA$w+3HOSWN!k_bXLTV&{A-A1XImhfSyBK zw1-CZrgGQ1Wg1asn{Hq4<`>V0^WMAKaNcu5c~r1Spq8A4fHJYUs38Ffla?+@wxI*d zxAu-+XM+x$--VN!h%VtYK(t>WngOc`a2h=TJftO%zpI2G!{u7hkslpcIPGn}TDf+E zwi`9*vQfVk{xd>SXg(L|2GMiZDA%J1w69;T9i8~^4UiQ~@7RF8dA0I%34do@qr7#S z`A{B$+jsO6{+1qD;2`t8Ye4TUrS=ap3x~fsFpzFsG4>y-KPt~2jwo(~4KF!@G%2q z$prqyQ{=ka{<2|H@5BfD8|J)-awC09v!Dw!aA%9}2uz+MxCHvxAz(8=Mn_`*wiiup zg;MF0hsA!Z0tS_SSTQK87N9kis-9f1o7Dr>h4Ut0FhG{DF8a0BAHS);?_1{qf=I?} zfG{(tauGDJohX)c&Zg1$dtp45Qb8tD8_{pJe0?pNK5uk0y5_w~fHe>=G46ODoHH%+ zE5)IaBAv04mcyaqMK$AdYG?Cll$(bxg_e@hiT~IFrpRIu^PkKwFjQQxT!0UlS}{2@ zabV;>#zSMxpYaUL*GWH3f+3ggREx@8JCgLu;hXa)O^!21Ts5>P?k zC2;0l6XU(3N0d;7dr;k_(bz4ZdI!mUEhrWaU(>t#7A52)#f|z_oYcnR9et5yg0&R- z`A6V)gJh(5;gUV*{s$CWdZAlIuVURBn{D9{uZ3e8@q8+gkW}xpw<*_54YZ*(N`NxL zl)JX{)JSQC1pavuB}Gc$H>LBT5bN~Q4R^&<45iUWJ_=K|lnTM1_uA2SC!Sr|+xD-@ zcPVBL&Wji+t-dqBYEH&{INovOqS1)Xnu?+3?eGDEWaRn&ubsU&ZdbZtm&*oY4DM-# z9exp9fzP7w$KWS}WaPPZ(%$>g$COYTy)MLr0N&s!JLOB4U2x%e;m4J`rU%LWpP+yF zw0mXmsgEn2iqVTzca8Lho)IVeG7)tc;4bC#oq<_}$-em$rJB?T2&O7_6y}hW~qwRvLMU?QC z!GZ_yR2D@(3nMo`?I|YpfW&lZIt$pscPm4i3>FHq*a4O*Ktazs4ig|7bW;GtbhmQ% z`sEtYk&pWSd5C;}hu?e;?C|1d3JFo7o1+bok^sPvYeD{eUR)V)%0hc zBN_0lzUHY?&3;wCMy>=duCE<~85$sq?$N#If-eIeI`ai^YfkfNGGjE)R(Kb~u(K)1 zfBz!9dnpyInZLGw#@*T*`I58=^>JwWK2;r`P53}0Y|(1LpDt-xNh$RnhT$1#L;NeB zfTToPJ@Viqpg(6E^CAe1GzK|b-$;>VQ?^KVqcO8TCbHQ*H9!XV9#THAfA0aw5x zMqhXcHY9RhgtL*jR(K~56(fC>j>Y6|QFIEu`Ve$%fQ)wfpkoWSW9t@eY(N5f0Hq#Q zp1I98zkV@;dtljQA(sBFiwPb7;RP4>9()W`;WXGq@$nCXo%9#wxx-<_4Wbkk!9sG* z?}Cm>$0*8^F$rY4LR)o?raP(0pf%6K=ZBvL!+fv}9Y4PgM_>_<_sdUz1k{lj z&2r(0os8QXwkFjGo5O^}=)osp90%Iak-sZ8qD%jB`8qWH7jR!}{Hk~;Y)6@Lgd~lI za>|(EgU&4SJPSQ}?^D2FpbaT*xkL6T{P$C$ablW36V^q%FIx6sA)9hrJ$au{!8C5< zein{XgGAhT*52Odo&`tn%)EJi2mDw%Lg%Yxwoqx<>W);%?A3BoAI|-{a(Zf@2|Zc6 zY)`NBb!9{p$?Y%>l1LgLydy=_ZS_FLu5WsYG&=Nc*s=!6Xw6*`&h{C--+voc$2R-? z4DgWL3Gr~y2o6s=Z%p|cE|&`(`zFlv02QFPUK8DETYI~|B~FHAej6~5KEo3a$8;2t z$hJ5QnQm5Tu@mdio6m?sy|fMCUk9u6AAeSz(F=Y9w(O14@&Bq7llVjoq~~$f>&mUe z*51zACCR>Z4VVeCC7FxaAz;s`hbZonwot9H$n!e9<%u7|TL#+DF%Nj`Z#JrCdOLrj zyjUDEK$4J$ENL`W1hQJMxkEmCG0$WqKJWcLjQT(uI(i3KC};j&vAOs1_eFQ6YyKSI zBOS)mVTR!FMAzSDqPW(X1ql-S^T2b^pMf@XsF4RuIKVMO_Q;znd)vRKyil=q-(r_) zT(aXOpyoL*q;W>5@#w`L!7L7v0YqgK1n~|4Y<0dMY8KZ#fHuh8i6-=Q2i}F6Htrxq z61MWl_M*68my(g^7e_%k@tg`AL+5SiJ@z69G(>XE14xD}4ncR2P2<*%ugf&!P%JTr zuKFo38X%)%&tHCOB-gKhDoTZIeh=`GEPtp!j@7A>F6oA{t|?7BD=pE`4`6%-+K}e~ z*f>6PJ(&Mr`hmm;@Iz!ix;CH55g452Jq?SEYI7o=-BSZ(bnMO#_G7xv=pA|BQ68K9?C|{1`J5X+@mM5}!Hs~YJv0nlI0W#Y8 zi!X|M8$^zr^{Tk9+2$c{Uhbl0R%5Y~p|CsW?qIXoQbuF}p6y?PS{rObN1r-tANtL< zv2{J~|A>=lpBJ;|rKMP;{oyKUPIJL-AUNBFD2Y3dLth5SQk2BP$zo&gjGswk23hiQ zhp@qn5M+Kuxoc{Gj1K+%o|DlY>v|8rB5s`adB6>o`@_0R?I^*z8uhL&tIGk>$)VT4 zyd5N?Bfs0ZuYUmi-D_f39P?^mAq_87fKC~SstMPG4X#!!+-I>4-S{$y!9W}Mn62_D z@PA$w$JjD|KJby1jM47!<7LQS5sy}m+eIj6lvX)3f1M;m_u>nuG$M%vL4umMEKx9fkQ{F}7t-u27HL))em zL$AZJO{3T}9v*9qJg)kfXvhC!`@CTA! zd++{(IDnCP$YQ=h+3yetbR9~C8fwj~SJ1oMG}4@ay=s7rDzA*3jjq&>ozc7ZME`Dj z{zCD3yMOQvM%j3Q$VI9NpUX_=Dg=7uk1z)VWc1`i-@K%E{u^LEO?UHIP-#YODm-gx z7hQJr;Ww3g-by`sz-jNT`;!uY*xo(QEgk|P&8Zvb94;>C4R>%z$8Y`_hH!w2jvg{v zd%ycLTsY5MIWOilOSi$HY{^?CZJMCTnM%b9ngj~}wSSshN|r)mp8uZ@{Z>R(UP9oOza74ov(bfeBcT=su^&_e^Qv*$~1YX-KpX+i%s>{|4Ob^W3 z^FylB&)RhFJx?p%qd;FBQAIaH7IMcyL?JH3(gFmnPBfc% z&iI@hUGO$|yW$DwTvEv7lePIZfPgO7s)+!$9ANxrMXw|z9s?+rGarHDANraKL3UI4LAa5DBYC!Nn9>Zg*W#y6SJu#;GPsOGz-0A|N7QoLD z5yG1X$7>pf07su2SMAxbY$IF;x!yLYr+?7fG@$}lZb&R41OC@+8jy{Hc{qoYfT2$z z?SyLg`sG@CAA07(n-yr~q-uI|w4XB$IDMud#NMRgnCQ*9OtV>pPr|R4Yeg@eYgusR z{%uONa?O`kjP9A-J5e0(DSayy!`CYi{+)A=iLnN+iF=-YQL{uFOr9n=UMqycnp(Wp z7l}Pn17xI_gviqVLCmmL)pt_rU~Nj<`(Tz0(w?u{xRp93-blan5h=uTN9K&Jz1KGY zH?Zd~g$_yfJkOpMZqnlK)d4}iv>A!si zH?Wjom3?v@ER_Lre}$owZn915RaV7TVqObhCY`3pYJfNK-9)?{&$aSC^usNxy^~9c zU{C*k@6s9=-$CAOsx#qOCgxPLeSmm9(Jgz4dMsHFSfE&>T@VFf{n<3jP&j+a71>*! zI|~|XNb%~>7G%n83!v%$8hRLgC#O)NKhCJuC~!2kUA1F|niq4g<>(qa)(PN3QNT+$ zm2UbI;;S~zXvk9|SIMOhp%eSc{rl}rg9pri+oGD83C=@q_6^Fu;*S*z8Y6Bjl>DZA z&QS}+B^46h4jOEr4QZ2{?A7aSSA9zX_bIbk2Sj{8bXpc%NNreuUBFSypxe(>K_u7m zt?0Qi#fIJ!*Ig*Prb+-PfAI}GbY`8yplv%%)(l{YcSWt{%xVFBB~GFDp9T75`Bubl zXhV?OvloJMDzIB62DusAQGcWr$vSWsgqHzs7hHnCoz2y|VX-aOik`dr&}OMe$ha3+ zfPQPc#Hcig-~*s8K-dP5F3@`@zgM+;!?La5FSuf_R-~vMv!kz_ ze_G8wqgEYVGax7nLiDowG(xoCq`E-mS=(MQxqsq{@ehnWs(KZ&2ds*A54PDW!M=0O zi%BSw7BQDn&N3da73}^-t)11TQRgDi00U$QGqB6&`PVK|L4h9UyqJF?o$8WtXQam4 z_!i^$J20yTeG~@{15_}awSCvbw%!z>5<>*$Pv)S|UV((NQ`Qo0iLLb2H6H_lFlewJo)#GH!ZLa1r`dO`jqZc^n!~hv7idXcrH#YaI z8kG^;62M?VHxHybq8tefaBK+~t$F`f`!V;Mdp{vXh3uLa(^sT%Fs51n!Vqc*(MG}- zt1vjSy$e_jkkL`{R>>>y_`86Ec#t##3+XUJd169_0idaqIwPDo17n4}BpeHwfzJG+@+8fou$b(bJwfH5exX0vm86%;Pz1wve z8I;tk_Dn9NqUWCc{dwr6zYeYM{YWqN!nrt>P;J>|C%eIRLnFju?qnW)&I)5WKt_j7 zwB&RDj7{9m?ek*hi6lOWv~!lBxDr{3#d2}1N+G8c#AlF<4!vtL>^JX+w1dZ;qWplN zV+SVEQUZ8kyh#?_+K{H2#KLuHFg|2gt(_WZLW-*%1wIQIT_^0SOB5H0-l;7sj;xr< zOnz_j!quNzy?Ua#>i8<__!q~wt-OBh^|8?C6QgIVZc_e1dHKjwBj*ku8G3W*3dPqH z=dL&+o&y4-hc<3md1%df$jOcGf(p?|oJ;T;HO3Kynqrf*I;PeDVD+*z(ra7cY)7m;+ayTc4*TX$jXiH!((`oVK_!j zL5zZ$B3Mk#(KN0W@C3)jG&oNa*eU!Onna#&Ju-uy;KoPRFZTxYE^Zv^j1mcrhE8B= zJc*OQJEl=XN8u|Nj-t2(@J^iCZHmRw&7avJu|0D+wx@J_li2aI36{i(Sd31p6BNyx!gQ#?bd zd76u><0L^b1VzOYB)#|sdcTIEakSH_o;izzF_#DblzBM$2^%+{`wze;P$bT?P$o-F zk{Vu3#WaGN2l#3=P6-Jvso`TJ%b)TBa2_K5!pmlM!MFaC7p(8UfFyXHWCenRF^W-Y ziX%XJ;smeOBr%2*2*}MRPL2`1pU`MDP@8Xj+dFu}I_V7*Pc!f{Mvb$HxEjWbR%kpkNb)ov zi!Z)`+E3#URTk2{lR;V|y@1Dr1dYQ4B&is!rs6m(ffyB2^GpJShT&L-6;62p+-V^N ztC`t!npr@r4!{B+=_H}yF#@<~Kz868)EZb&Y6kv_u^LU1VNWgqYClF|5J8pQzH#}P zMV}IR(s4Ep1&=`uP!#+H#pBgH1=;>26_4|@z$U3Ux7blYLMNF1NSwB#7hgC|k_^kl z$t1_C834poQy4|7d6E#+SWH8(9Gze|4RH!n3?>%wU;59PGZ!WBlrEnX@%5|G^u^<6 zlSwkc@B|6tz*8XNP=r{`VMz^)a2zxN9!n%aLoCP#u^*D&Fm#;L%&cFIJt|xz4lU$u z18NGc#`q))0znFDP9T$NC>ItZVW#+)a8l&({ZI%JJ@NUe9Xl45$qk=1RT?d|Joz}bg)-S?Bh5aXBeDSv#|1Eu=%8# zk8!|0j&Xd9z+fg8^$E_wQV|sj%;oZfJ#sOK2TLaT7!4x;k_H0;JygdC(18?i(<=b-W>G3rDDRtoHg6uc&xR0|jj_^&igCr%j>c0W$RgdVu; zpHHY#VvmEyOkfzTW&p+wUr6JW^JPD)0!rsPdG?Y4#WN|)8kR-*QoI`p)NwY`+>h7OP;IP!;7zVX_z&cj5 z7zMM4!-#9xxBwlFF^M?z7RGvUu&Mo^{E+9>|K0x2R{M}7fM7n50!AfZwS$JHz_tNqGLKmcQ8G7%R@N=-0HP_@@t^U`EzfZ(hJ+n$Z{^6Bxth{{e$+5koA5i^9 z6;eK`+&OZ?@Ti5p@pHPS@?K@KqnmII~UC;kdDPpqo2%<1L)O3SjZe6W0GnHAbCWl zlqeW6HDp22G!^H`BttGTW%i3Ef~b(rU_gs4G6My^_;1uS^%)D45aZ*ZfGBaTQ9J=U zkK_|-2INDuWN?OA+@NTXTn#Y3o0{2kTE-`}-DX@G66Rn6Cz5eNNT^|*B|+M7kc^~g zVrt;d5|$=tmqqK61`CRS>{Zb^c$@A&Z0mO)k6~Dh$6$y_QE6~I*k)jMs$;MfV6b7c zG=3^)aG;5%(~e!I8I@Byf5AfMV^}f?dy@cb8>~#&tVHg-xEH{xpjp5!VHcMQbe@2n z5*@v3YTG*+qWueR0e4Fb<49i3YQV~;pwyH)#*i^Jj%$)}P#%c{EE0Kxq^bQHhJ(V& zZ$Cu8v5(_4a}YKbSZ@NbiV3jU2s9&Z!lG%WNwP5tgCff(XBZ48FxUG1f1APofTKV7 z5E@AeAinBEOguDbKx|?OhK6m2iSr2%buj)<=`+}w=*d6V-cBg@I{RIQNo6=9hJg{! zLYEl~7;9h;W?2S~^f4Ap%0=Y|piZm?%%*obbM8=eTWVGY%rKU_+d`y3pk=7!~>;WX{H@I2>|dH-}|~ z!Fq)u<q+nVF!YCsE(gAUW+ za3%rUf;cII1eg!948Ehc>{)n=06KuB;~+6HSfp^0C1EZ>fCwrMi;Bkjrsl#L!uP{M z#rjja`*c%!%BSp>UP2vY*o1%qJiD6Ii0U8?Y6oy{XfL3gT%rpZc8jFK@!Qyb5;Np}T05Ra~BE(~H{-j#Q_A?riM3n>M+s-;I=fy!n z6>@wZj1UEAn{2J9Tz1s<>06c5xC8ZP?Z~+(q9Mt^q@bpkr`w z26YN+FTtrb3}_KB%;GT~jx;2*I1>aI?)~-fPFz!4B@YiMRShd{GZ@W+S^|4r9i!t( zFkLkQpVTk{1Kz8Jvm?8ogwFuuTJrGFZ~GZi2-&qO#=ffhgK{@yuU-qFF^Tcp#2W$u zeA2G@F!%!{w{|ANX(<4UG;pPS-cU$u(AAfNUvhwq)_mjJa2@@Ma%=Cz<)Tl~H6L1J z!H3+Q5@jg}RKPmRmRSLfhJeKY8A4(hsgUSZA<;D&Ty#lR^EnfXr}=2qKI;q{$^!aa z6#SZlWOO_TX^7KeO2m%Kz(c&vG9Li%tQ<&N&IqMkp0x1Bj0d;Jkn0NY&az9W=-9)5 zk@Mi5xB?h#pLfsup%=COWob5RuQcF(-X<7X)@XxT-&6p4F-S&F9@oMZb3g@P&DMDl zb4Mx@nE;Gh8c#!cu7(E_3OEGO6(OeJPLFEM-vJy`of2!eEByPol=)_yA<)Z3qS<%&VrS2Aa?z=ilMxNW^XECuuyytDwYV zVE#(zyoCRd^-)F}f$Nj7L)jDlOdRcqL+1y`sB(P#jHkVu-+(FwI zHxtuad=z>k0RuQlMmwMWAA7HzR6)S5GoO!JaJ$J8BrBxD+5pYEe?59#P_2DylQvYd z_M$13S+VWP`Ge3|ImX76v82gb&=$5r468ejzLJKQh6bp;6KU1IE7qiinj?j~XQ?Cv z-Zq>7Ms+j`PY;q&KN#q&oOq>WoPRgmib%m*6-T#Tug~hkq}y$qO-cgy(L4y;(iZgG z!!vS#-S6`%yJA`^P*8@VqocI5gw<{HBX?1?_pMa?lSBQWug$%uimG=h=7vfuKBPFV znAA+}oLs3mK6K9N->&}2>ZewJZs-QZpH|;8_1)E1t&Xp@ttQ7lGxXrb0S#rpi;{p-ZPOo!U1wJ^AKPY4W9$XKV3aQ{P?jA@N$|0}^aFZgNv~ z%1Juej3vn#Tev&kha$u+M5#s!u4X=-%7&ulocnxhm6k6k=o5UZ>6#zvqeJ2WhZWGAurh!a)Oda9%MzEkK8TUsd~Cv-w_6%j8h2hY z`4aM&4{w>nEjZ-HQkueS$r>b!_PE_D{U%T|>T!1jkZ7!YDC^1CW~Db<>KTot(KWEi zlq(lXSb6EiiCj5d_vPx~j?Ft*%PrEw;ci1yCJh8!hKAFvgjqu1#2rw984tPZ`NEvb z9I5aL^NaH5R2Xtv3gyUFHQzDX+U#yZrn_^qurax+F}$V2 zwdBmf1-dqkLnW8AFPaZ&D_P^d1v<_`?Pm{O)J3ZHYU-T1%cPDboQ8^>!Bd%RrC#K- z+a-ijJYnJTv-T{P)S8@Knj!--8@gM^9YNA=^Q0(iDxs$(db}QskPfY#jx;I|e#h^N z$n<28#fgTHCIV(MW!0#U%XIf#lcR!RL2HZK!pR6R{7b1jaa#o^^KpBi+?q}K*_otF zURtG9u}x;f=3IEFTS%8!Z#S$>jY_DUc&tO{aUavD^A>l&)=a96((|#JDN1P4QOYaK zapq2w9s01`Q1vIsvcD4nAjQ0yj9+@UOfPjH*`h{4LE^U6Xk|7&FVnqA9o}qKD(z~} z<)q{KLsCCuTsvrJ80_6(GDupey)Ef+zLR#~S^#3pL+rmPL0tOq#<}4Oh5)25RdxHq z#xPYZCPVG~c{j+OjE^9=jdi&p?6HvnSJmOK zrSXzOv(qipZP6N)1mL|g$;BH!4StDCH#;qa9rxtY9tUG2Qe#nx9w}9Qq^%psmqvGu5$%E zj`Rf=%TLeRIKqu3nwc7HGYPqKekswzMK?}r^%>Gh<7P_$-})7qp7lT~cM%K3d@)Pb zi?6?40&>Q~Q72B88#Ua(0aBijG0(|Aa3(?|0IHU&4a!jy_%kK^RXl8q7(z`e*=DV5 zJDAchyw{wpk|vfcG_4vk-efPnND_xIQ>XOWe4MK%tsOdbV2#8*lr2`~$VkQ$<{-Tx zP|usslpB)SEXjM*<{%`TI=l(>UYVW%r+3qxPgNs)JDg(Zu1pWbKAx99h@6v%ZKn|M$W{mwe`FSf8d+QL4t>T>H3ZZQF5{KMC0b*Z!wt_j!72T|v zx#${+9?W)V%C7epqPUsl>zZ{>vTDl#JzlSMJGrSVrI8Dic$}~1&9tVLBAEDj z5`H%xNVZr!sfYRo0+%WoGTXl{KOQSu+^sf~h*(WoOql$f^x6R5#qm~~XhbN$LQaqe zhGe?iF-MajOLaC^>_o#AVYNYSuu)Y~7fh82P1FxZV)8+WZm9`?pXaS7eIB>Jch*EtJ}lAwO(91bBdwIXlGf_%@#)PnJqqXu9>$R;=4`oUB%2(U zank*fR1MDxK8&z--7Y@0YlHM*zB&y+uq<#JjpeN$}*VHJHD>^zVUO2YH-{KHzw0vTc~538=pjShv`MhddT3wjqDSQhi*uIHwCf>{-5;!b zN&UxVxPyNS1m~Hc}9AzL#TxURlmkps5b(Iq(YWj2koNfhz?*LYoet{ww60b zR`d1>L`e9{o*ZFiqK-VdLoL16o+pcx!P6;5JZ-2ZA{hQG(`|l2RGl4P+-9-nsa^je zz1ME>nR4289P9A8nj?G3ALYmOvmGK}x7STvc+OkaCHGw+J#Q-(irKioRA`rDPCEa;NBr>M2Z`se7u7j+Fp0aU-EK!awjI!v;GJXYgEfvh7Xh*$up11 z^kk?`CZlzCgKFtnSLULq1Z0lef;A(>c8qqM=xQ`MVq{+aftINdgw`H$x{G1EJ2fmz ziH)x5DN7?_X!uC1R2LMl%g<9-i!yr~bcuypzj}O{mcGl{v2{&3sEZejqychn>%G$B zR-QM^QJw^E_7w|VcQdwHf<(uyVMh!PcPYARAqa(phLDRcSfX}4l}*_qMXEHHu0^>G zL79;^Q~-4d0C|Cqv0-P_viWQ=bsI#C#l6{-Hm^;yyZ%#t9@BQIhOxpkX^ex~GCR+a z=w`Z$6V+m_T+MdOc{{o0MQI$&M4c=9N=($pCG(cdN-*~3MDxeg%{j@YlZIQ3mc^{o z$wsWnjW?)f+^W~=GKEYzwSke?n>4;Gp>cMcnsBVmCo=p0BGb7{jjV(kwr;1yL)DJ+ zaETtFTyPJg^(9;h)>?M)KG_`bXM(eHM6A#W)hga(nbY_#mwsSN7;U79FVwl5(UgOo z_skGk(PTM=KeB0ia&*gpRLp@+wQ zr~0&V`ebKTtU&5d3|}H*yvJAL0T=BlAu1D7v`%A+wDR?$iJ$=qFo6!e2fQ2uWI&hr`absFBFEq>wPM~6No_3y8wX2!m2Dppk#6cP*(wSq~E*q-mhA- zez_-*;?9*fp9bhaaf9wd=o2@nl<568!uLl)9w^ras%BYu5+CdU;Rwak+=l!3Lx$y$zz|;*i{S zvugc_a_z9OxAW3By$X~)qMBGUAVwfv?>%xF>5}Tam-S<+-kV2MPSMROVyH@PR*kK$ ztKgbKMKH82v!Mdw?*Iv#y%nTjpa~rn)`&sOn|hzTRdg8J=K+*c4rDELX?=>Ymg?0) zDACCVq;YKB0$c`~01o<(dr&_`=J{J7{uEMVL||ActT(QU$D0Hjnr+prg+_rF+3cAf zq$2(g6u7b8yZVe?4Z-)U3D%N;ebY4-d^Il)r7dXmy^q3J43H)8ZV~pN_nSwDw=0n2 zcGdZ(TLvG${WQx!0(1G>?W%xcjn3@gYIrD^w?{~qGXY8A@sB}&2g&H@-5z`I=N}Ut zl1rsZmbd7~mzOu`T@QU6zH#jbS4_0VKRx!nNsHgh^rJ^T)b*7vf@R?7Garv%!5x`QqJaAVni7u5k%{H@{MoB}^ z=aXl)2W;u>_?#pRB6y_~)m*3(RnAFr))*FqIF; zP>h`lY^~`sHI~EcpMCeIL94n1l7{iSgeI*l!r||&7Z-rR*GwuYR z_dpXm@lCCmI^8dQxuMs-Qyf?4ya+)lu@XwgQW1wjfo6tsn0;jkle+_YGeAc8_lD$b zwEw(AWI@iCfQ6K^r7tAtGTDKu9aw@E8hQ=->``DbK!#M8zw|R6HlbhtPW3~y{mho7&+%V zi$kXO*m(`kd9roC4XacdIQsB05XC_cB@Yx5X**ghn>GqckIF&Fvm>MLSCj12Y+{5rS17yU% z{9vDtQUdtg{)ouOJ`cc0^00EI2rx=p8rrI{L6J2ECB6usG)P9;TgJ}rJ@G|VNYvGh zMO|GCnaf3AT{r717uvWli(HSv>Rw8PBv}IfCFUl%=0yxjS%a}A`z(%StGOcKOKHLY#s9Q8S4+uAk+?v* zyS(>lah4qOA_S$BP|@}l84xr9Lyepk8G;k?&4!8+vo%z<6-1uGlKxH4ZD#%yX*MYxMSj zMn^foD$VP{B~vklE_@CKet?XQUTVQ49Jl+QgC(-Y87bN!zQQBqlU9qMBLD~fHPt3` z!S_{@(}QiubNove_1^z|NQj+rT&G-|b4{gUYZ0}Q1Im{GCR{p={`WuO)dOU7{Al(Z z3E1L_AE?}l>Hm+iH;%Ul&snw4 z9@k!bt>?*7?PQgy`IJ;zOv-#}bl@-~A|3tZ@XREy2&^2bW6$Bf4VlOg{;x!?Z*!u8V26xu(bkycHVIA*xTofZ&VaZc$?C zy#Ca%Lok&A0!(0aY?@=uaIvmQAm7vQ8$2mG^vR^9^Q))fg=rPEK$EnDHF9ueM3aCH zu;&^04ZgUC4)6?I>`vvn=l~<<5*PI4hQBZvKo5TVhdz{fcE$d@?%C7yCr4m@jQ~}j zgPi_=8?s-07D*uIh2w>#8E|K_K<(W`FFeO(*RNQLj-B&i6UzMVwATK^zZ(XS%>5gd zkkksErm}9XMr$fvIj96UvD)upI4_rW;rn_ynwP!+RzIZm!kH`xu<0D!KoV#zAiowU zB+w%-a8+Be6o66-|1rCM$pG#O3{}y+CW>po8iFBn@X6pnDWsbJ`rT{fW!CU9l7${{GaO9yi7Mmxia; zwgL9vZD<7C86bMMCM}dT8E``#U}nwDu2k6hC~*m-`H#E|HQ*3k18yfkB4{L5pw+On zGfkU2B0=QK@C7TELI=L@M2haeUKtjxI?y+9&RAvSbHw990T{ej2o7)tZwodw(*oc| z_EuV#E3S!A);c&3v31>D+qQ~FhrpIzAhtzTo5UQ{4Xy4@G1vvOe zyvx|ztuhziCC|XEr_vG$qpu!^_jzJ;_y#c5flhpVXWOgXfy=Tm0V?oT=dx(kUNUNw zQ3%k{5%-A28^?{3AVD0OWCJkr%Y}MSuDP=FY5N$P-#Xui(Vsy(-X@} z(9!En0J8OskwI+HIYmN@=}BH0_<4Q? znW&3krrtRu1am>RupT}XBdkT+6>pplSM$!A3T%7{Rui9q3N0@J_7^S_^lV~v=X(=E z?#N?bSO?X?0Z)3Gtrh5sQyR!7+^x1Oi}jo#6i!d^%g~XdA2f7J(H(cuwpLw%)qGI^YIsHHkVtbXMc_z3eA_0|!fI$Cd?0Z|Gc1|PrQ?Z&v(~al z(Ec&u+$2v5Y1W?vq@f=ITj6VCP#c)2vrrp6QB5jkgre;ETtuM@n!V8^N)CVuo)}b| z$%VzineyoYXqTSt3)$7;vG+o5{(ZwQ46Pe5oXD;Q?EQu9P)Y1dVVk~K1(*!2QAs6Z zwmFdfd>9Sytb@_OD*~vw+jex%i|C$1v#ZhN>xFNj;(dxa)ZQRG1HSyslV6@^6G{Zj~n;V3H3AJ3xu>$SvKqTE70al~mBs^oYabX*LKCWB9q4&v1xb|Wdno!gU zlz|JIgmY7TF*@P^2O@_okN&<%_%>EHvjvn{7q%|7Wu&NS6)3+ir+25sp%%j++ZIs9 z7o&Y70I2=!hP4~e_qUu-_S_l5EpSp_IAdv?)Jy7)^2XnQ73*7o(#; z%fVRV4ti6oU>mHzY!Bg758fMV)B6Q%TQjdP^TdQFn zZniCOFo9T$E=(%Tq$^*f0N^*TQ_49tb5ndVV8H(rmcu7t7Ctv41gC*{VH4B@uL(M> zQ)8u7MF@U2R?@0oP0m{jgMe3r4y~EmdGIUa8#_0y74AJT)Es>y2?7m2JoxIsHh}{$ zxa6FPtbnO*Uf_`V@O*G8q?H_1(wUU@gwI83Qphj|qnRg0r0~0^;BcdF&k6s9yY#7@ z(504zllXiYnOoXmDo)1WvZSjt^pXyE9@yWoCgZc3mj-4ZaPV%nFk7bdn}Ul`vR^| z1S|abdBUklUKu)k^cs9p?fmvU;Y?5C?D^fcAbKV2Jk_#us&7u zhO7Fy_v(85F0vUVv{A(PF3D#)}-Sz`!Q7-#~%xO3dQ z{jdN9q(UE9zEA^oG86DQQ$ckyZ3WyJn=e42A4!Ef!17(G6#UVp|7e}>`-Pv7Kc>7}E$g1sq{r{NQGPY;t28jIQJ{*9pmW$DWu_gvU>0F`{0+OC<;XD}hn3J-o zu|SkfP$kai*^*Te;l6b3re*Yis^!n1&>~Q}-g@^BVFgwR0hutc06>a8EWuDyq0Uon zsX>`BG*yf`g7#e@oZSlP^+11cvXfQ3=a68Fs^^{f8Y=|CI{yM-R`$5_c#}zjUR9rF zis3t(Zv1poBLruKX92J{dl-fF3~lk#jb>CF2pip@NT^#i)X~F|$SXq!e(95ALjsv!%Ik!n?@5<4PpCWX9ac!e)U>=*17 zG^W^3be=T}FA{9JeBnLNIT)&5n}=|cipI^T3mGTm*rPpG=w6B{(B-j;hDH- zVs0!nF+TqH@!yR9VEnG}gX8mK<04ve(~9~k)bz~Vq| z^iKo6flCI?9+)0{acB+k2yvMB#Nf|}ee*<$a1eWlGyAi|i15|X{}nzZd|3FE!N6!) z__4vWg&z`9*8s0cOF!a*U&xgJ< zcmHtnS-amQiq-yfq z$(g}4}BW;D~zUyn(kyR*T*lEQ($f{Y-S9=vL8nqLL^e zVnt_*rinKP|4kh0-_buN_?zHqKxnyB@G-dS?p}|xls@5uJwX#Ie4i zzV1E0EaGHq(s)js^3>`M2~B(mhv~?pS*xU2QWRCm1nbVoSHIT3(A6fZ`Rzu^828gg zdBPx5FoQU9MOM})rDUKIcf|@~Hr+~&sqpi~s=-SZB^q&-^~sp5guvlVvZB-~r)^;@gHS;tM z(~-gPD?(Zz-OUy-#-duqC=QO67py8H&6H{eRiMo1ixGnA)>59WsOn+4LzZed>1aqc z7FaVt3RLoR)ZV6p0Y4eYgr$JE zMAvi$>4C?v@|Y{4x7Pe_qts$kI|b=4^9HHqJsmW8~IVzul}ubEF^^<)GXF4Bfb zz#nyq3lic-SbbZbi_sRPL7Y{@y@^_C>=CS9mrNR|xXe&7~ z0W&j;<9S%J>?o5dy)I@7m3%h0bO?tlD%xHbNsG%Nsu>GOWfFSkLR`&OMxJHzp*Eum zXhWrJY}Iq~y#fUUWErb1FJubT&Dn524qQ_-i>9(MZYzXk%6!{G3hu|vS#uhIx7zG# z6oTqXEi8BlYbi$I#;xTpsco*BL#v659mevUFF}$vxmqc$CsTDYG#J5ZvUG6X9!&wo zbS|$}rxY`{aG$iq zv{w~V*d5XS-{9X3`dV&4H1ON){)(*@8peyABETr~OjB%Xd4l!0%%2o}1FP|BfNWWu zpfsTh@U|%8vra5`F-bkG&1*7{l$)x@(!;;TVPXnrDeKGFYfS@mNjedm-HV@hMi@QC z=pE*kj`A5zWdBiI9jCnBvN>3Xy&$h=3&~Zz&b6hR0g|jsERm#3V-P2%aDbJA5k7Kb`8O-Th z@=_>Bo2`k^B#yXNs1g}H?ILZaids|hYNaDD~YkNdS$ScoY9FsR!&OZMCG21l;C4J&FSu6{KF9qioGU%DWb)L&N4h^N zZ_O)BcG9V<1rrgn6qd?IaQv&hsV|3Vcdi9@-p z@=bXBv7T@-M*37rNZ5(`s;%tC|L#7|25q4X9Znic$#A>fa!EFR4a#X zu}Le{6@YuztGw0t`VZk3qy|%luBjsNib|6%ShMT*V>#fB8mP1SD^w}BS>McJCm7~k6G2t4w+ZUJ#koZ{ARJ1NdlIzTroa` z6}fya52-7qD<%M{aBCDoSira)*HN}pOkN*Sx&UTEDvz`HajP#Bp}^&!Hl|HASz57b z7|ShEYl%`h19lS)RcprjZpCuF!UTDJ^HjUk^oA+DIYLBnLu>q6PfQ06S_SQiv9d`V z6fRfGR9Ys=R$E#fu(p!1feY~CtPhA|OKx$@XUkP3^yFbIR>V|(#%HlxOzwzImz>5y zv49a!NiivNQraknDb&l;R4uDX|zDp($NYt_bT%Pc#=I!?mo7%}$uG98z`Vq&ArdnO#)Co{&xc zy(^!W(%GgX0e*k6Cm;Ab-q6&CjWqW!ikM&S&y~ISz0f~!Au#`_e zu)Zs2!!Bool83YToY+9d3!%|RyK2}lEe$Bkm7=Cru!NKuK@mS5a?5EZCYR6K6NaSS zAxV$ra6zEebdxbp0;0%O0b?{idOeo=$y$an1f3Q|(Jr;-Qi5l&+~=vq0Y)L?izV!? zpiefs6U$vmt&;J20*16pTb5T-BRH9XwM&~7NO5<`y+t3G>hmEXwys&T67u0;wu`ly zwmK~(Co5QyF$y>W$%rnLaw;tMf$_iPuh6<6*p{rkV06 zs%Di^Cl`DMt6?n~8`aWERh|Nb)=I*Hx4Z2VU=?035Xd-fwPv|(bcc!m!q3aR)g0rp zRV|@L&XRJ+r*XHi(k89Q7L*R7$Er5QBccsB5I5S_7oEtAZ5p|z|69cI;m=_hc{5Oh z?FUy{j~a}3n#QMY$UI+u81EjkJK}+fYXvA97MeFX_MZh8yXSV}ZvAda#!Kr0)lx(5 z(LspIgK_Y}|1k`%;N?X(@B7CISJs13Az;a?*)}+{#DTV<8O#}&pwF8Ij>a@rpp6M9 z*R1>qIu@)O(Klkk)1kUg#KECuh$$g*BArkustF8lvx zI9qc59V`losWJD+)x_6^pBtJS*gG*N$a0P>H#oAa3&0=IbAKC~iGY!GM@JM9KIu{J1{eCJv=uTs(Rh&!WZffX}|5*5x%vRn#iu&?hph4}c_ z6?}~$hdSVE467p-kT6YUgs$ejE*7r36gAMp6GL3WxxGvAFV%!P!A6eQ1G~tnNGJ#R z4?2Ud7$8#_XB=6t0tGxVIv)Iam*@znzpv_EMp_m)ZVK!a4`z%WNY3#jy}+HzkZQF4G+fz{&5ADxS@nqBa`6nh=}NdiOSW>Pp0Sm!$DYu#|dF{r~%WvH{+!2=Hi+Wdxr9Pl7aKQjN4ENHr z18PBu8$JOTKDGspwE%aWG?&j+sA8($1coc-t1;&t0Fmc3M3WYMDA3HKC$5E;c~W@!APiTI zDO`6Q+^E7uB1a#9FNm{pTb=q;QjYn+9elzi3Bpjbv7BK94)apO6SZ$Z3zAOi=croh9JOybmIs&c0ym`h6b5y zL|H}|HA~H2?^fNVEyG z?hfc)X1N%yV4}S!;E&wFb(3}BBs_W}8L}y9iPBdsDGRhcM56j_pn@kx?3>%?I>6?A z8Rx_|EIILWWi8xg>QZViQ}#%mfN=H6L-00FjE>x}(DT_(e2(+kyA}W~|3iXq5K6V~ zv1Jnxy*X{jmsR>Ky6H~1f9FZjv2|k?cLaBF9`-=Vqsai<0@W@!?Q*{^g%WqeZ}PfM-*f#v zr}>@}5p`b^Ub;5z0n!%OAKNT#Nh`C#G(?4g6@gy(nh+>qRx0G!uOXleE~q9U83zmy zpD}B5M`%mV3m1L{2^a)v^vkcqwc5(1=;$B5ikVV(NjTos?0yo+E#ABSJ=}PS7gC-1gIpuSqN~;2Gw9-rK51oWgyX=_jB*B zSPEB0H6s##`?OZgb>9{qn&OR)EZXxO=p~-CbNt|$_X^Oq2ZY|WJ}q#4Xc`u^5;#QQ zg3s+C1CU(BjkPs%5(yt+kS;RsF4=TBo6`VI+_lO7^&`;3E8`j%U%4Z=a-Z!4AA#GTjT~e?-Z30T z2&|$bjFTm6C9^D(K<1yovcwmo!&jEM+>oISod}16+u~98E?T zZQ7qi_dg09#1o@^&mZDq#5ZaH zjE?;34R`0~KY;KKh?#T3>o{gk?`G98+70j^k$AFPrQ*0j9zOyN!Yf0^ew;WN!!eC^ zKP3Dk`rsS-?P%}A!Y!M~1&+|*A{_2r^QAQrO|a=y6sVv#$yw}k6QN~NbUbbWb-RSC z(XId3b0PZaE&!V9t~+1-k#O^7=>kV^py{g9$UHJDix`^Y{WI#AzH&9gCLJ>A3gRbSfT-Dt9Q?;s=5+s zI$B6sXeHAqmnpRED6}MBj0Byr-8ky|;89qk;X>2{HN}8ZZckPTdzC9_lQz8;g*bwK z{d1@(PmHF&vIs+q3s$rK0=8kO2B4<(s=>A#X<(x%sLb{lIFbEP^v?f+3Z58+e)uG| z@(wyDMmyEVxvSaG0tfPi12;4QKcG~~r4^MvR%@!#DRl2I;cNI}NMqP-?2u1z`$e=+ zuf&*C!sU^WH8E+*St1jl!ImE39pt|mP243NdyAkVyQVv3u{hMI6^U8Un69RPXx5Bwq;lBQF zK_)IZ0Q$n<0Dw$f1QxInUGc0CV*ghf2D95}K#mumdfm={t~)MzdtK@|;ic2O9)phj z#dD|W$d35x;s1gY`LZHbx2QD|u^gyv?eH0z8T9xI!c`N?OCa&| z?h}cpxBmg$0alf7Rm{_BNW8or+{~zfjE4i5QnAZD}UlbYE~@emY9o>osLZ)@t;o{D z|2J<4ob`uST?OIif~&^tLz0nC5WgJ=3WvDk8i%#$UwAL98u(zS@~E_FMkCQk!v1Ey zT}Y!_j)Qf`6C?Hx0oceK;iT|Yu&v>28D2VDri$r36(Ll74HoU?Qp6_a zPaZBuJ1@M(tvlug4y6vC6U35Cp-7vwlpb&Ze0qBveg6&Nj)~=Bv{nBy*!Xt~*LLVP zxd=+{0tfJi&oXN8&;vzDA>}fI1KX!Th1Xz@xZ^E2%Dk)S$V-`vI)ne@mSO2aXlcV} zOWiUX*@~3%RY$X|VM9px59m#v7_y!QmTefEJyCa7Wh<8UR<%v1yd`4DNs7a05 zM%z_OZI>^7o22ecq$s9l%QnQBkj;bG=V7*8^)`4Cctz;I zogduWdFE~Sw2jV%%V2B8q3FveWpBFr-&uLO_VRY$5klT>tgkPI7d?O_7gVne8PFW=lNVdXz);)MKARe(<_aq-s<=8 zAQ1$Anx+|OL%s=c_yN)Y1^FWqE08sEgK-uahKR{ED?fq+1OAK9v%gPGqWgyk^xVy@MdUTpV96=ng_;o24C~fW^({ zp{;62vW70*DI#W0_rNhDaNqrheEX#Z5M47ujIZsQ;6N^_gGDc$&2f%lpwVm~`)Xnq zeQ$)AUiI!LQ1Qz5U4pj$a{*SqQQ~yrjn|G6ho*Srt~VsjW5lX=4awsN!(DFAD+TC` z2?D|#b4F+YSn<*UIP-WK0Fscjsew}O#tCA_>J>|o;NH9c|9LxySADE+!Z6kv`6BUz zaCk^E5EFciJ0e`ku}>{<_yO3IcDjO9ebHGl%G^4?K^aD`t|R6qmP^r*>3d-Ldh(Nl zz{owdwi8=VfFs4ca1uWtFO$35luZG^W2D07uT$urX<}}YCkBpj$fD^ot8ZIH054ez zmJEEtkTu*%HLZwJg=#+UG36ATg4wNNxfD1GP9C0AyywvLulM(Spbu<;N^OE~OD=s| zC}u7<=$0*1Xl2vjd9bY}c24qzT`0~go)}x#`N3)eoEMgb#8Ry^5jRk~SQ8GnSgUc0 zBT_tip4b56oL>g1@b~p{Y?zH)`&bs@ONtt`R*7UH>6EeMjw{@?1XgtO3@GB4p~DC6 zf>r+B!F8QiXSf=f7h<3Y?-OQYBNU)?MO7T|@Wtk4uST-9#MC6O3?0?Kzn6@D%UVtk zy$}UGc!_51K68v#B&*2~3E|mZ88$!e*hE0C!}2n8Tz}EZ2bfh`h|N7;SR0cc-U#${ ze*yACLuWclMWH)P3mmusu6rY+&?p)SS*xmO)LSyNTSlx#t?lrO{1QRyzt6@QJHOh_ z)!epl65&8m^E%aZN^TJcJaM}X>{zi3X7ugbKo74B9sgz<(mnS9J~447bjbz|;{cDh zLOEDSlJcBNqEV_`ff72fjhI3DIbvq&T}AuO-?0CSxICKQumT`y2#nN_nn#`NM)<#u^o;VBC@WhCG@mFv~b~aZB^Fj{l zfWO|UPKed^N=#Xo0s=T7Oq(f`cRcRjVGRp#&_m3-R zsRWI7D$eNDjcnUlSCPoE7e0?CM(h)ueo##O|+a1se16`?f>I@<_F+PXyA6ypZ)>a9SCAz!v$@*YEiv*&u44?hJI zHo->i0tXs_(TjtAYa&kj-I209XwWg}$S_QaRSIHeVtEM?JUn@-i>Ig{jF81mD^oJc z8#HQF)~MS65#U|h}9>7e#d+6ZMRYQp(+mLK%>yT*h_~4U+M+Uz%cwn$K81BDz z&@@O7ZWkNi}sr?{`!2l$tbnqEUY>tPRB_TkpeqQuZoc4U}4m zydq+zC3YMtL#8yw3MntPbqZx!;S0pp-rZ9#wmPY-&1$L#b<(DBo-)qjf@Gr9fGn<@ z-U^|3v^BH$^H`oxS~axXq?Vg(*{ahQXFiDK@miq8co<1at5R1W?a=&ePhN3qDTwo` zha<|Y-vq2}J$WWdQ~5@~Tygu|TAlQQDK6M=UPaN`s=B5MCgFxD!^U>+?|v3A1-8@r zaIT)nl>Ma=V|~4=g`%1b9pf;^ZB=oUh5V#*^!RbAAa+@Gik3+gktkK^3&wlmU?xUZ zw}g8?AkoRms6D9*Ieej-TXONwu$+W^ ze_AGw)pFIeR&Awc=5gQ}1*tcM2pv}%71ab;&$2i=7|5+M6<4JYZj_V?dzPI14OSzr zrvO6RSWvP-v(A?#ha^3@K~tnNZ9~lvOPlPetm-b@3}R(cMi&A9k|_ZZcX|ZJB$Mr8 zdcH}qX>Y?X7JC{A#f3OdiEM{k8rm3VEsC(oX!Xcfoz)G@B-@Twh%qZ=4s9YAkV|?< zscnlYQ_40?HF1q3?TO8)Ze_@}sS%`O7OySelC*6RhCb4hv&|f3uR}b(S_5F9C5a8k zJdKirCeBg#{a_e^MHlegrrZ})rzrVEA7!% zW9LM%qGlqJqAF=mOPUU|x=?7ki4H?x{br-6omR-Mmk zBW>E$@Xfs!#Ih`D$>ejIScp!-Nq8x|F?23hM>)@YcwX_evCmYyPp$&z7xiw+ne?IM%i_B|}G*JEzlpO$+A zb*-YF%j$8s99cJ7O_WaDOap;}!Kh5F+K4~6<}OMCTDx5135UWy`PwJ3nwnGDqzkcR zvSxJ@lm%wHwFd@TGlFZR9IYq7ADQ$q>0NgGLbWD0K|*=TVF_!aCJi-+W9-RlRjwyf z3Zu_ZH!u>rY~$?d+-Z?epnN-jU0b}C!C7)_>?irsjjB}+MZk!rMZ zj(j%Vtdg1G^LmOhY>;ZCfaSC(E2)ynK^$U8mLdrwol$$55L}*;)FtO_>^&bbdP!HL zq{ze~?Eop?#mzdHbfrLnV$8OAy-pHJ1ieOD`|)0ZBcP=sz|P?`sAZ)Jb+N1`x5ixH z{BJtlA%Cq<&raZ&N3x_PD~!8rbya~sS0k6q;+Rmfq@u)-GN4Wx_1>Jwm=rb!iq_EG@3+Q`~^>rXKp zF_H~h&S)Y@XFRKTj|}%f(WI4Aw1dsCN;0dloQ1avvS?7HDUHt+irR8Ib2YQ;UheUE z6J;h<4Q;1Nl4QY(%4s)KCzbXj0Ls#eUOn^S zFv~cV$|@<#IoNi3m#_DHNY_T2ca2FHABGv*i5VT9`BYq;w_|t*Yx;cRfk(>4CpyTWpllIjvE(t7ryb z;GOTm`m-6xgi@zWN}tzPx2Pl=d(Dtd0I9mZZqQg=R!gW9-LTkuJ}OtzGTXc++zzDD zjv_Vse|iNTXdiPVTQFF`OYPG6a6is-ATyD4js{CqS*=Lf zriWq*y%!t-0AwbMDo<3SsZ`S&Jv}*-gp`)1U80Bub7_5)`8}4W(|H4_mN;syWLEBn zRY%y9r;H9NBZ*2J`FbZ zxnrv`Jw=ct1B6{>Z%!Ge<+Z5sn>{&I(b2YgJ|t5a$yg&~ya>xv^;(it8gp%>$DVUZ znDM9a!C(#d2c_1XJu^?nHRUS9`YkPE)=@NNGQ+*riYuFLs%bEp<$4Gu6sKITV4ZQw z3kfZ0e=TOqoAb`34I7qZtV}t`YMKn#HBpZvC)eUECWzIJE2y@wrOUHkqb!x)^BC3x zJPLX`FkeVm0+w{kmW=EFjC(a&&BfSK!jg}fV?KL)`wRH_yrYm~3dVG@rY5c8Ld>ni zj~6|F<5+PU;$%g~v_h`l;7dzuS+Z)e$rJ5XLZ*qjdbWODrLK}5QmhKwYI(O~o^kdT z*+M1=NZm4LFzz!}yw<3rj(@k9f#0oX3SMYmvy&km3jDkAw#U>ck{(YaWom`edwXLz z?v0emd?OXE*kZ;!oqbQw1gq*AV%lG_MZ7uSA8}{w4|M~xX9UxI6T8PCtZpPuTs{2R z{yz==H+M(z=9a5H3mhsQzGE-ftF9ugbT^9nLe{ARU*>KWJT`nW5_rf9JGZg~+zt5` z0gA47Q`S@)TAkTYI+ftE?* zZQAamSZNBs`??y=_q;MBu!_6+&LbVKhHwK$YsAosGk!0dGKCyE#uq~0)-nt#1rqiZZGyO<_R}p-9EkFbmCUo z3h-$b$Qy((c8I*vrmZ=+Xz>MFT)*y^U8xjJy;fR>KKPAo44QQir;D@CIfz>}oAw)_ z?%TWfOuW%?V&t6RefP-ez{r8{@=Jd7!7zHwM;N!S+HZjRa(dQU+YX4$ia>;zF=wUV z_60)nA#9Dp6LE4uHKbpw zqY%{&ImGRR1g_wdft)pkuJ98Op0;9X=fGJXxe;*Sg2dE1i#ySP-~b8&%OnAx1uCC_ z2!}uu*@N)@%B2t!p4r*CCrG?sunyzCY10;+gXv;>xFK>-ooI3Mek}@KMvSdl`H{|n zbup;K$mLK8xTs450A0fhkP!d{*R-h}R1j|Ku@b}O#MtT;A3=Yuzi$^;k%Hjh6~yqW zE^O`lMh+0)8-96cBLFbnq37C=-F#cw)qM{>V+99>(u)Bi);YMbVOvxDseM z+q4oAQDKOeuszf(uVJh*8Anv-*i|KzY3md_- zRAH8yDP7JOmMQ^!)Tijadj=_!oQjvC;ys3rotJ>G;=&ak$U|))hHr5YnhIY$wv--Q zimJAfRL0LXl)eO~bM0oJem&*7kM|J3ZvFeD_jjhVKLKv>-o-+1gx%1+f!Z)&Ix)h~ zl_g?)IzokvQbv^x$}1AmnRUj{Cri+`JTaQqNTJ3d`7m5`p1Zm;QRXi4Op7PM2FX*X zxVlVSC|epDlSA~?Wd+ad=ri0@7O1-DW{YyE|~MirE~wNmuu zHmKlhK7PQ4)B@_t+u4rCAyzPwqUwo!V0*M#oxAy?TA$ zgmJ710PMdI4h)F_ejSzmdh7a*_=@PI0(9LzVr;sSFY4=%GiD-Pbi)w~0sZ{-VBp-p z53XqWWe{wyKI`B=SFi1C*w3vZ_C*d;5XanRZEZLj>Jr7EJW|&xa}=j%ZjvWP4hEQ3+Uxc8PrOKBvs*TgH5VzdQG^i zY8!B)1HbYqlb-(^WS{^&>w}f`8#~eKpiAKsS1)~{H`fN9zo5|ySR;D3J(uN_uGu1! zGNXlHO^$p#Uc}TXC-0Q7HE`E{6^?Mo)p5R z*&WvEE+IG+9{{!vbG)QRwPJ#0G1M-7#+R=?l>XPaTR7`{rmyWGIuX-ffm5HNm5I) zlAskSdp6fjmlK&dBJU>FZc@;vG%4>Hbesj~HULiA(6QVCH*m0rZ32C`!{bRi)25@& zpv_aMNWBpfjol0lz!Reb_vO~0zaAUf)%n29aJ{?PySRNRUdwM$dX-EmRLmQLetV`F zNB17&R*mIibYSl4UNr1ZL_jpGudR~@sG_g!Z0EIPU8X=E`8c=S@x+Lo`>DAz@d+@1 zH(kEC6*>-M6sd9!le4OqNW8LKs^*cP@+aX(c~Xwd!Pq(eNdjnMFJC-k>E)I=UeM-3 zo^aTqt0hY@jG%Fk-Le>wN_{>cpo73 zoS7h}hYNK}Cz1GW=(`mQ(RAd4YkNS>Z-145<6UFqcH&8)up7aJPQ*$W7dfm!j0~zY zLW(F!0cT%83Al3-89MwZY+QGK2Mjx28QOQ_?_n|F;Ae-w%S~GI;yIuPhm-^$$X&*G z#qLVnu97H83hnzb=-JZ&J-jl|0~91c0<*SrONY~AT|67~;7unL%~5a_Scm-8sK+Y{ zNwJ=%?gu@*GIVIiSvxyhzfD}qso=mYdn%0Ps+yzLawQy|h_@L=o^NnxaGn_Ld+i$F zqB3ll?fmyQxP8m8$l+MxX7NMxx0RIGTp3A06-ZjpHx74)_cAF8&D}BAnfw|A$ZX^w zEAa|QY9ggDRd2X#X3E+Qha>3k_rcHe#i;a+4|UDtnNI9m+#YUOhy<8(Qi;zdZ$ijiupwj#6sw_iAQpJ2UCMT05HwD(B z4?I9jO!3Pgh3{xLD|GhMZRmSoUICV}cq}yXU&N8&*MRoHdLl#7w#Xs(VGGZoHR;l{ zHP0wq{#*#y>d@2=p`v^-{@8oA^snyh{~_1bwnb`5N8Diw>BxeiCf3(|6>AZoDIs*k z_5)%DB9fLB!O>z{*HRpYz^0kbSAW2@n{^Rj`+8k(tIHK6Suit2dDL4C+8OlOBhYU= zaW|@dDI#%oXZj(o0ga1d(9^^64YdH#CExJ*@&G^;W24 zzRelKvz^~O%&D|20{Y(xOQ@0$Bxt%(i@0i0bF?nu1~%|YEEfY%^sl;Sxiy_ve$1T@ zO^fG)3Ty`J^WJ8iNz~W`BQH0Nr8u6e(Vu{2$1g+2vS1<>emJzc^T1CyTk2}lA_vHa zXR9q0%6K$6ORj8^C=}KNrwE#9xfD&WAAo)S`Tn(?GautV$GmtR)CFtsYm8bo(CH-O z0aByzHj}t6um1?wfGzmkg$ z;lln5ix(_S#AMzc%NdmlU(=tJRbqH-eEukm4Svb78?0w{{(2PLelR5VKt=It;8a%9 zR;nIP`l=acJF1eQ(BrT$X@3C~<&~k5EmMocT(|$wR>UOg3Vw}?nL2k>X=$Lo&PA)Zgb?4~gP^}G? zMJZ^&O_NnxOU9xzLlXsMbZGm|FWUW-TTH^;dJWEOq* zDL5f4FFGi?`E2x2&+zKb#$Ur|?Ba@u`n-MpXF;U$fsrRgTl>7i^w8mfH#j%ug`2@& zz%Gpfo7f7VJOvf)H;Q#BWgOl0Ja_tAF2z(pTtpxeKeBFh=ZqKNci=d4AygK3WZj?h zTIykgr(w=(7|0su#?n?fP}iJF_@?4Lh7N3}xC7s8$NGD&{UnQAhO?@>RBHpK0PwKly0e;>XJbuA0?j=K zwUI8Db{B>_u6mAu>?uym7k)=~Zek{K0 zj*FGkJvI0L3Dhu)96msA8_UaMby8O;R*JTEqGCv(`4>Trez_PzP0e$iU%f~`ej!(# zgMWl?VixzpH{te)Gf8!+#RT-~ay8Ue%FtaeLA>g6DH6CiFxZE_IMf;a3+J@*(*b9Q zNsA5Xsy>;g%uC%P$!4p}|kmm$`azo4JPBg7L@TRIgZ2-0sqw8M< zBXGq+NT|OQxHLZF&I*wCZv;mPqG?&x8DOHe<^t^qKs7snyfHze5B!aD1+Q4zIgorW z7{=Py;eGJh0?mmt7gPfnFr~qtN=#*Z#GAs4hpr#^-~RR7nsqJ^IxKSd3D_4@mc-O4$iVei*dX8u1~cI3 z70pfZ#IU=LgSQY}IMlgSDDrbl1D7w2hkl|E(F0j-$ec>MQlzX9N3$YO!4t!}_Z#pW zj`h3HgCfyCrz3KUqe!+B)j~)^o84gw{dff4;)&6*wq_1p{E734&U;2hdjy-vMH9?9 zoQy2BI>p7ZKCZS?RaHtHMN|EvxryacbR;sm6Q%n_|HjM6M+ZcZg1iX#H@y_(a*2Shuj_+sFH7&r^<92C8S^_Yf4n>W#mdiX57BGp5gro+zK)Y@28QCCuE zaR_R}lR}RGqugH|=MSRa4V|cxP$=5G@x6;WU?IW&hP+i@%X!7FT&xz(Nup?B3>s*; zkV8Z^b_T{p;A5c|weU4~k@orvMTV646OnS3_G&B&l$;Pj`Z-UG*cabCt26Nz!Dd*S zCPioTcFc?VAo2gB1II?55S<}R4BgW|-FFc;`nGeU&kH|-N1whfWt*hikxDoM5J9BM zBJ(czR-PEPf>EFaogGBQ7bn(s9^57B?wB5EF}!2evQ29}M3vI|d{JCWNzvA`K?_fc z4*&QIbLcblt(>xZ;_S zb)A>yxGK<#?xjx4M~Z2{<1nW~Il!3Js}Osgdj?&)RkUi7SA;^p_|A^bk*WUv-j?*} zHW&cRq6>8O_S!(!V9v79wA)tl$$_lm)pOu;lFOw?AiDXij_q8L64D5l#-LrShV41d zSZ!V@ka}oB=+Fq%51iK=x0H|W`et>LG<8NHw~e`$ok*J1CpJCQ6yR9FdA@u z$ilMFAoRUAT&vOAGvU+tC5NZKzq51snWEk_d7>Q?>@q3Zmk;mk+^^esLd!Yli_V#Xc#{z0(Y1;aBh$#q!YF#aXy?RoDI_?J zoYQ&eeCXY&Yx~BkBcCUZ3i~E>L+1}%`c3CzxqEW}Ih(z6Ww=@QkW?^HB|~Mu*jJ(u zBY}qIiP4e!9)(1gFTGcYUXF}TcW#%6w1SP0pxe^|*;){|9gxSPWIUr3vtbmXK?_d| z-dGAu_ZP|G&V#hb#~mLo0~Odtw%LFujFw32j8>M*sA^!k)1p~)#axK?p*Sedmo%VvAa4G3W}^!^KBaxIslkZu#)3l76@y!H8s+0IKBf)=QfZ>dTt zbGr%w?0T2VpwESqRw)w7pq+VQK%_eZa++kK_i~#QU_kW7FvLqb7)I{#+9{)39i~#~ zb`ln6z8H|tzIrz5r%o)+yJ*oS-MBE|ABwHdfmrMJ5QWO(}Lql=6$NrWZpn1n{?VxT0-GA={Qp)gh{e_Gv^j$a;xr zW@32>I)3{GSd4GkJ%m1Wi3n1}I0NGWRG-Rx;;0b2>F~jD;H+* zNxO(cNLZLqWDUZntXztYfBgsE z6XyP9qRG`j)7Z2^Lk8VZfQ>XzfgDiEqrI1jcCB30`RKI_XYOAP6#xcGIB!K$a6X^_ z0Rzl^AXI5*8i>3cDzI`XT&PET2e1uroEsO7!xD8~--LePf51=il;G{Y^MvjpB>4HG zt2e`{#HB@IO9x_|n-E`6465{iNTs)+LQJ%C>RnQD*C%!%n_^<7^V^sRyi__%+(I)o zWkTVo`L$(Z3|*3dS<4fHRSHaiQ=_mu9Zui{JPE&y-MATj)LkddZf(mfb;k^m6f)(( zqU4KV`&aKocHt;Er1CKRw_Gh=uH#>5`&Izkm@+?4gt`j25!NgON-{F-z|RS zsa0z_=VwIc3IrqyW<_Vfc8~)#*rcg@ii!Z`3{|ypX*g~!D$v&>P#3-!9S+@e7MhNp z*be?LW8WPoNmcE?J-MqV?#|}f#3pu0U7^#0Navh$gFtt6&N>%gPKGL0qn&4@rtB z0xM#pAW0EX9}naqD2gmRRDwMCA&T++PW7z~Q_T9_XFv1Do?CtD)~$0xo$&q26XH2; zVf%M(VS56)MqkcVnB%iev|gfoz;tM=1iE^!PtT%*c^D#r7+vj6?Ckv^F9rZe`tr=t zr2>j&S{;wJp^3PuN=+t1??+*`SSm%2MCV~>4qh>Y0B zMQh4J$5bWJyB5$yE|Ef1;enk!n-$*ChKb?yijhIIVi1ke;EZn(4~a(xe>5Rl;oGU|B^%r?XDlLnWOrzNhS;9p}nMU8Z2rT9U;@&G4!PW=H zviB14DKlCo5Z96!hq~1XsEkQx9wjdk1MJFDF&sFr=1(mTSJn*m9=}A)(WuETufpx| z+lVBbK#r{F=wtO-(G#ge(PS0INhn6qzle79QdRMhuY#*;@Of#woT~?~^qqJiRVN#z zZH!jSgk(xvH;=y10P_-v;p=i{Cv3y(*WWhL6!TvgOiMgBPYjq>bVc={fd>aS4~`5b zhAtZ$AKO2c5xp_y9=J+8J@&qMQCt!SB@au!I_QvGCH|54B}rRyp~NJSO4dnM5Wgp$ zBJLafA#o#d#n4$qnFtN#h;xXOiRrN&qwkLXYV-#~<70le(buzUr+sh>Z$RAlIN%Ho4Rr8%E1xKU~@h{skk4gh zEv(1Z)vBQwkJKi#&738*V{+_F{=u|WGD|WsliJdh$BZ_Hc^+#rh3YILSF1CQmNFjh zB$#J#Asi)hW+Q>PBWbDoSU+U3-jDC#U@4WFZ8sAYB}pq}Yj7bDMf=oFDr=7h;--|` zUyJ*GiPamrzy(6<=i#xWDSJYep>YKaWmJblbSz)8YvgHPN|v&3#y?=7kdv`g3s7d7 zm!=ij%?2!|frx=h)(mnP)XzFRiPgB$f-)qO23liov#g~QG$u&(X53GC$DFGhJ@!f$ zSPi`MNk1;df-)v;jmhUbK$4MZ%RP$qnD&CQnj^qUkm}UI^%|*GjA%z^fh%# zn;q=%`g2Y%Da(>ZVAU`i%Zge4zM5>6r73N((O|RNp z^#$G#f$o$9jN5u%7uI?z87V)U#iB1nmd7n@&Z?NosP=ZnoK$yP5b*46CuVftrI11??d}AW%m| zi}-R|#9pQo3Qs-giB+O9W?qEL`zV`EtETf=xkIN*bTwpp6muz1HifcIwaO_^I%Lbp zav5q6E3!6=b*h?_<=aw)*Oy~f| zJc+9lVPXTj1ubjq;c#CF8DsL3-1r9;U8+HqlIf793cNL@__{ywawtzDv*~a%*{D{J`MM4Uhq;%$tSsznXeCt`MTk6{UtsF`Z<)?6D`Z(Nl1lDP^`wyF-EEYZ^jUa6ls>-aTkBR*BqkVm9pAtsb<6TF8Qi5-=It+$&@u%4V&oz z0QOGc${T?rps5G-Zt@8G4QacL^njoF-X`AN7QjnZeMH7Xv>MDy}iJJ4o# zUx}~Ru`EM5bMs|&AXw=tteGuCM;hn?SytH8L0`5Wt0wmV2?9`wQ97tosMRwqMq{(5 zn9LkM{Mt05VJKaxLn}N?+7aKt&o8Z|W})mVgEJiRgnTL0sk~g{Q-|qnR}l`-YD*vz zk4<3K9ZF-5)Zi!*Z0d92bkID0Bkqny-wBf0pvFd3t7JtU9lmD;ZeX0iB1V;J>X52w zNu^?p4);@|E3r<6T2&=IS+|x^za;)PztYR-3Pt6Od5_9vuu?4JI>2kH1Lce>67m|f z_Cmo(p9U4ZP~1r|VW{<2n`x^aavBY;{Av8s?NrAiR7UDzv;a&QOr|&dC*Rddv_aeS zEe+|E+d}%R2N#c0wyX;v<>nh2w_Z_fS1d8tow%#Un!64uNg9i$s!ird*A-ZgELBsI z2{Mt_cx3gmi{87Mmj`NbDpg_4VW~qa3y`Zmh2{2)w?Zq^#eyYnN|wqwhnrU)@l#r( z3@BSXQDqGnl=u~0o@Nzv1&W=GDOk9SNiqNCWJ#}% zCZoEtRYlT!Fy9AdYq}~PCR)j4H6fK%Wj0IRUa=BI-J`4KDTPt5rmS6?rqvCly~#vS zjddwJ;Vhj2Bvm72Yr9|reILv9frN}^x*A(8n&^5oG5-r#u1+PJP_iX&1=R^~&d8^K z$jbvc7a1uQL&=V_naarMuk&)R!$3CXliEr$-)7s@{N|l}gR^R(9Z{8vcBAy-&*YaORT4%JOeZWeMnS;i4>E6(Qk zb7j?9B&*5*6a%x#mWLg&;SMRGDw`_n+H5LTcV)bJnqP*L%Br98Il`)JGUm4$qO(w} zH_w@`qUbYIzN)VijkOxtIw`>g<9@c`G|G@7+jLNG zt<+pKw*w@1S~Z?d z_HwM@m8Mi|nhENgQSClpni}Ii@`iYRDGHMOsZ`PmXiSD&F`u8~Hx^gcX`{P=c0-kn z#axNJ=t+J&lJX2wa_b?%GRs65|n`66s^H+)^oSXKe+=p48x&b(0Au%EyY?wLpw2 z@4X3G|Bp><=xzTPc8zq8s!&B_RhE=VAxal(v>OVVQ!$HDix2=1v?2F3atKAP22SrE zErJsPy3#qSM;GpIfrY7U6!Pv zfH;QE?!fn|P>c?bpTDz*I`AYLISecO9$$l6rV5VFhAdtLZ^7l^^_>fYJ2e^k6(BvPQtMdHnT z+SuP$5D$w-$6Ldf4gO?wpXl$CM$T;h3(Us4FbFrn&UH(yamZR3sdhB_h&DmP(-14KUh5G5ExGpNzir z+`!7-mQ6zv2(^9*hU@^dz?G3=KLemj!}9A+D(Y2>#}rDSKYbj$K1-!Y6hC8E&-DrJ zrI{B7zz>ceB&>3Gnk{)%R?j<|t~~n3=fyiGmIzVBe9_Kc;5sp+!OAY@N_O#GH36-? zN}80aK#2}!)Wryt190x@#mQrQW`A7ZCyx|)c%@-8ZsF0@1Srb-F53-AMh6m9#$ zL%Y$|>vj+Ke)wq!`vYUe<@0b;?84N#I_5GEI0p(wv#dl$GU&kNphF-=Q9rX2J$V=^ zoZh>f8+X|PSK5X9ZD9fCk4i9+P~2njC822OiL1F+w^ZCO8tR?&SeCfzEyx^lF5BfK}E7#&vbJ%g`Mt==pK4CtUE2aE(#$moDH7j*{^ zM%!Uv7`k?pm__g3ECvYZWv@Vo_vWmSFfTq4;^!l`h;N$l25TAM->Vezwl1qS6>y>-3#H zERdStDh5*XuZqXlf$JOX8e{FC7$DadohV^%FZg+@2 z02Kn{->2GPAEeJ49eLAR4MC4(G% z&TnsAt`%P71>m>8GY)~2f7~S&uT%qo{m9+pnz2t2nW2{lXGQ8BZ2Nn_XB+}rYk7%GP>3p21v;F+$B z>nyo$7rxT1PKXc3A(0YRiKS9BGc4+-;IHfb;aA{I1qIVb6@<)6kKLDxHg&OvA{WST zLk~PfOQZ+)U(6R(UU)CJFozeQLXHQ)7tRnlQXD$b#6eeG4GGwH9s;-V3*5jth}sp zq{!Y5kv)hLGGQt#b^81eWQ(VrL8zkc58j?9VEJAC60V~9|F+ugI52%#3GTOrE9wt} z_sL%Hz^J5wxe|)fyXKbDrAYOQndsPTbG*Uf=t}n_M8xwZN68;+!&@E(w7ohem3b%WRHT9&a%Z zye?if{eh-KPd~jE*HLeJgIlSb3tVL?UUK2v8pw>SjcU20^d=24B~m^M(_SD(mCIk- zh3?+28b&Ulmhav1EO*qfEvyAS__Px7c63e3(DFp9E_Fm@QKHN<@I*_+5RapFA%Nmt z-+SR1PJ?BEt4hU%A~A0YaCUM^Wk(YW0a#2DL0aARDS;Tyh~L6R(%t89AGi`!+=p_~ zU^7wHLOdJDGoGS6hOT=W)*_*}f2c?0#ff!2$UHb=rC- zC&r^T2tcKcQ*9i{yXe*8*K~Q;7E+SYV&JM8ec6N zP$kRSPOz^IeebU@se~3Xtkr3vSkWzqAsAigzwysUC1+EB}&$TQVa}~OsDKJ56N8e6BZ4lQN!>gdew6qP)n4jeFg}?eL zyu>-%!lt7=k(SafNVwH|jrwp@4|H*THH}w5jiBk8!-t^Kg#!ov`71EHHq3zzJT7#} zqEzdh4MVp~HUb$S)#SRe?swvqlS`Y>(|-jp-F_K#=Xc!aL%AI5P^yMjZ_*SxiAoAR z|9i+s5=bFQZs?qz{WUoK9IXQaBD{Ad4a8^13&UFnT}SGGARTpqt1rYuRBIaR;QOeD z@+v3OQbP*J(_;j{Yb+IWxgWdGIpWK>!s@A2J&l+ENFUq6o})vQ%|UHuGgvZ3+31!Y8Jd|I968j)fhd1{<>9X_ZDPThhlQLcna@W;s&^BC4fgbZGBC zaAiEMN_q5M&@*RU*bdKxmk=eaVtPv`+Nye61s@gd&xoyZK&F%*w@YXRm!X-_Eql;Q zr$TAa!~cZWvFSi?Vb@V&lBFjVO%CtF^7kNFb!k)o5W^h@XL{&8F-Og`u>0t-PH+Oi zrvoUAUV3Qg9}N2EGqmXwe--y^f8n|#U*PH?F&UM%6mn(hY*lYFN_A8%1;m)|z(@(i z=&jX2RDPIadyvDB4WF@OPL5o`SVVv)Le9x072na z0u%|v7(Ib=8zD$xo$ala5L{*C0#|;BZOzd1vJ{=N#?*cz8BV!a^eGXsb6O~d5`&4e zzdZomfW?xlJj9CvX;sT1457A#9j;=?=1QUHoiG;XPZE%5ytEB%3-5qLm?z4^IDz$h zlLVMOESOyN;gRji>Myl?)(-1(Dr7nZHv~TO z5)RR{C1$raDe#5o!z&?iE4F@JZ}2qkwb~a{ z&{uvXQncN9y5VOTeYq7ix|C?gZg{Oqff((-;bffZgCNysws-ArZb`E)D37io(Rk2S zE~~O7MZ@fsdSvK^889<}6!yVwyV0e?;I~<|lK3!`OfPWthmJsu(U3f;?i%M3Rcw@SHZYL7r1gnyo?FaCehieLBUcfI{ftgd=}eXtMQBDY7y~^ zlLc!=Eu~knDTlwK@^V}HdBp5C1D`$fbVz%jH*D4 z-f2Lo?y(%*tsCLx@SEdxE5@FmG>nRe6@w|!b>p8VZs)w6`@xVb3tYV&e+o5I+63@M zru3#z&0lSk=)IHSKCz`@boF3)XV0;RfLvzV0#{~-$30zAu>mrkPpLDRvagd$BmYkL zwLlC|B0zE6&n2H&DOuh7;Z8hKXCED@qAw6plNP`mEu|c+qYQkw+z0FDx5G#Y+EC@D zr+JV2pSNRE{LoQ5s5WR>GVP8+@xLb`P$F~tPlS`Y>;So3seQ7oL?RT97y@5UY zOy~`s8J%!4AEYdyuv*r!6dED)=w4#ilt9XD^}M5+IfXN)=mO9b@oauIdA6>j^uA&< z9t+jYIwkk!cTNk%P^I%_%eOy5fIFgW)aD@Yr>iOpvA9;=$)V)=Fp>f>I{XN=8-=ce zvDsXxpNa0fPCSRo6RB^bmoFfIc|yJb+)(_+XA0+%X`0D^*S=&48X=W0eme9)Cqqv&8Fo&wKd{;-uLz(cTr4a;P`^?ATo+KN)&$a9FgLTaQ-u_k51* z7W0|4Tiy(0bI@{4O_uU_6zIZ>VBI^l1_Qse35iZO@RYfqsu8f~U%0^4T4B({PQ>K$ z&@!vBoyhCjPT1o7zZZg=3&k7*qrG=_n7jD}3tVLtzV`=k(9xG7 z#Exm9xKDG~+k7rz5N+}-a20zOW84MSR8i7hg)dt!!oN})sq@4-WbqOcQ>LYD=#lSk z;6Ze5@e;$l6Z_wN#1{Cz)PcrAU!&7iVTx2Tk}9TEK9?Mjuf%?M9-$Z={``kva&DKb zMO{DfKlt6>5Fob985XqM3f)%*STpI2(GCnIxq{0ciQ_X}*G)`ME^R`Ge|ZjkWc;E& zgl;%Iu^Ro{P5cAveBVQC#-La$aw{e$#y1gr$M&trjodoqA3$pLY6X(sIJjvO@SC-d z5|b^pog-%Tg$tKAt0OM?7!jEbbJ^P9f)7(14Hs0OX2Ah+$Z+l|RJw>5M(@Xn={3t; z6YiqJ`+%u8%@QYa&^*EtH_dq3YG0gI=ezBgnKn1_fK10({9+t-dSP2nbjcoIB0DG4 zjG{=A2+V?8z72mgmsSpVi~tY-6`D6$s{PK5q8F3IB;Z1R@ET_jy(7QiU%ISj0+NI1 z%rqeZP#W;f7l5rOn+A?UKitfcw)^5~bbgxPKxvk1g*?-f*7P3!K@D>GcV~$ypjC#; zC=V37LK3?#)eZX~0bb`u_AIe;&GL=Cr)^Jg&iFh5C9mK&k7T)W06kDO>%0BpgaR;* zfpJ60>vFAVhTgXpmpCAzNI=Q0zRh{_!r4g1(Y0i_M{ov#gPJT7J6A2!h@97Lh6>_i zzWBn5$z7ttxNFctw8p*%Fl@WI70eGCVR*rI)P-$p<(g_rUA0rKpehxGV!`+7uy_c> zh}69Wfr-CPPxmqn*bQge21`RpcS8EAMP>K<8o*w&0Cw=(ChS~-HUMvX7f$*|5w(mh zZv6`_K%F1Iids}P)<~*LjMK|D8VZvfedc;N)d|FC{~&^z+p7jlhIY`YH9#oy)1M~Rpf7fbsfi^m{b(lk^#7$xfTv$Li~BPifOG^CA07Jm&a->Z zTm-k}J^k#86)brAw-6r(=Egscd}Vls^YmLe7d<2=@Gg3RU4gmHUwQ&_-(vT>cW^w)`{ix9(kj z!ew!KfjGFyasZHMZsgWD4@3_A@PB<5 zeeL7Kj)W705yG1$Hn^hQkE2>ny~gIT(=h)_&@Ntdw1kk%rI($h}40xqY)`HY4SoSkF6TngGJpe&@-qHoD7c6R-Tfx!=;{Kw>>+pSraBq_wc}3g?2|;yu zenT#jjX;eYU_fWpE%eKqVGmih6-66+DRj;&>(`_6Z#kjC_HF@#wH_d#r`zF>vsx<; zH2qRK9P?#tl*t49N$5Ym0X-Fn;e?YXd1ShK?;;=;HFH3Gq_e<*3b7Y86wg7z49qu2 zR|7^2XceGoHG1JIV7SX)0yS36|IKjGw$UT^0c_`vqu}ns2_g+x5>mhnfhxB!gUwgW0PBG1q=#ZefS?XqVB=N;Ei8cHefSRO+VZU&7~cQ(^qkd>%yd>v?isI+ zeUJG3$eR#svWadZDfU=`{rJd(;DY-= z6Gs+^wn|2adJjKHaPCao0#`JRzj32YLzkwdv2vxAFL~<}R`jU{h*eX9CPW%vhEGCv z8az4=aDFh`Lg=U(k458afMa3wVc&Y@Kp~FAEmxH6?A*adfxKG^R0$?lfCyk{O7*FffX!k)l z&o6E2&+X$58w&@y!$x2M&>ndHXTkKqvt~8A^ozvwvQvknp`Ysg=8LdlLei8E1_&oj zX=!T|xW7GCNHb<~?gop(*T4sqP|V@M?Gksd;G@O60Ei3x&cD=9!F<62 z*PwH6Af}eF;j_`!$JY)6WG3`$m8g#}b|JuqKMY>DjR5M*BaCsWVln74&b!FcR#lGj zrGjRuCTP{e(l-B7IIjuB_`Ei?adczv-JcQ`(RAGtmK*7CJMOZ03L4sto^BGW(1lNe zX?~yyAZYtoY-@WDJ;`}Zz{AVcfnyIZTeREKq}tV_lP;OHQRMc>S!B5vT&sd6DA?>p?OqS_9X%?Y$nF<`Y)q|yFgfugS-B34c=Z9z9l|NB^A6atFh zgidWZA9{pcCwgU2*`=aJ08enJ3h5S}EDwAaCX1j6-Bi1FCpzPH@SJVBpL;Uv0*AhU z2bL=5)B&p1jyk<5Y0TG9q8ILi$s!QLWZ8~mqxSE>v;~hK$GeSZZB1>l1*l*{=`~an z`fwHzJy^PyN|ESAKvajQ=7!!SJ#OCH7dU7E{3H&8$*-d7C1sJ$>t)4k7NzciE(pZH zES%rj0|52N5w}~BBczQGi(~hWyfVCU@ElQ*``QTf{kL3IDIRZAm+^FHx5@5NsH$zF zPmX4ugU^No&%ilO(1vch`>Z~++=kxE&v2`XVc|_z8wM>)c0Kz- z_2@hfs~nxOzaCUu(<+^lO(D^r!K{AwKA4rD2_3qq3J6Du&yUh}u-E761X|+;?FLEtU2GP>zB4{Kvc8bK4iV0${8p;NO_w|Q!bux86Y}&&o5!jgklsuxbm#t zju*I%$-a;~dTT17qgcAGr&PK|H>3yjHkf0uh%6Oz@NK)%Ij=!%=wr`uy$>%yK{=n- z#$?m_8WSjarHzU%%ux$@cpG?oq&<2=SLM!z8&+Ukgjhm< z!RWpSuCS#|Tqt2DBv}wf(aOY%f$vP_xlhp*3HTKK^6)hGDQcgCBR(Ym@kwWbf<#2V z3P;s9UIxWWTLAm?`#|b^VC1tR^vHkVV?Lw+^2dDPaP)@?a-Ibv*dHbSi#Go<;XsqG z65}g5vXWd;O<&>2Z;G01Elwwb$+*w<75qC;ZU4@{Rtve)8zKUSM*(H9Ft?pf&d1 z`Qge#BDC!-7>;mOPdT!A_yqIh>;*gU$^Z~v(A@6Z@^*z>dK`h!ve%-ScVqvjap@oR zSGHCFeDK@Do8k1;>Mwp}ZYR9}c2d^@SDb*)KqY+?%2!n8WI$>FL>6xbo%SBQTY(sD zQ}M+SILdwFdt5lwxxiH?;C-Ty^mLPyQ*X~gMP5AAjiT1yL61O;$lfi-hp1osJC2rf zH41p4FNHkbFy-o+QkATyQL-}J5)A!WDn{gJ3yvN~fstx|=0ZsJ1rFc6jhFK8{uP!UVH?{2!jksuBvg{ghoR9NYIKTGPCR?#BR9Wq{Iv_n_A$?STHtVvEp|zOf3+PvHFskE+^2<@4(;+#1NXh2ac98 z37`XVp3H6U5_5b|^dMI{gy}ejhiM3_ALN3f7sG9Ai{QE950BD{D&Zs*iIP&OXi6c| z2IW>sc1{b$+{SY(G`_0$!YT=uSG_2LMH`=E14%95fa^Qiax$FM(>ZkK1_{7_ERh0Y z7Z5G<1KXQ6O1RvM#TC#KY)$c!7IN8@&7!da#hGjtg7m|Zol^oaoXRge2A8qAcm1#g zBJ8$>`J;PzvenfEa;k1zS#>pYOcMQRM6zQ_AVp6flAVkm{+(qA71t88z3iw2_CwnO zR~Uj%)%ILIW~3uAz0+QltKzK`x{iSE2*ilI?Yy1WO1?3KKC^mqbx$JU)HoL|1~quD zNx7OVnpAaSc9laDpk(OrF>ZVXVo1sv-q`~Ttn)=1E;{-sW@Dz)_H+WVm?;S~e<{3` zCI`Wm1WoYmnt;>ltEEwlVD;#r1X8+~1&(Cf+Wz^?>iuJ-3x zxNTK0xKjet-?}&kV~tI)nJ=&=Qr`%&C1ojDYQ^#HW z>3qf1s!-X8DyT%_weUy+F(j>>+b@M%-@9ln%!fJi;t&iaPFLvITYi$vr-H241h%6? z&dp%Q0x1%0zXUSpxEivDHp6oO#LXgC--RC}Q+6lSWYsEbew2eHMgkpWG#xoLt(3L{FZ(vp2n4!a`ta5eiLscaO>6$u?+f&Z3H$EEL;T zAyOup-6mB~3i`Oyg;sbS7u@KdX=i$mY9(+Y4KBjDkymQVmW-aR)zyeo*1ATkMEkbE zI4+f<=$BU=AFH}^o5U)b^DfT7V9xhX#>E613z0d6S{7`2^@ys@^6!`O#Wo@p2;sv9+=Ee`X@g$@bcuY$;pX7PrNko zqlrTk*G*hDk)7~N?3>s=AsPSU*cIcy9xIPOHh$;$wd0qJr^cP*it#Puqms8J&r2SW z+%CCV(vd_Zma!WFKWC$4h?swqc$RpO_zLl9qDfppmm-w`b^~ zq1%Q&Gt?ToV8}Rh1{Cf8&*1L|pBlVx@W#O_2P=c&fgcZQ2KNrG96&QasC0spLD zS3OUq!sRp#3BCZM)Uqc+ROk=50=X0o$Y{MG*L3*ftxPc<`W}}1opmp%kelTtf885n zl_4H{qHK!+AdAZ7R%mM7PMw_k9KOCxxohxo;7Xg_WnjRKYX8FP&ls~%jbAY53|Wt^ z;7skR;#z6|doi|}iBg)ZI%&Idh}y;FJc8I&Gtq{1A`nQ*;_kN<)w?HuQNWlo`e3&r}i8vY9d~msRqlsojd6 zUcmP)Qt~JrmB&L~;E4lloZ&5f`8-uL?Te*XGkHOrV9wtUBC@>e_2>5>(n$x_M6hCYK|OrFdcX)~MFYGtOt zJQEj%usqid0NWsK^jI5;VuRiL4px)v`hhJv>2PFY+M3UXvr(!JWJ~1 zS@Rpbyk;}d6={NsC;@oP6<_fvFR!ZeaB%6`ZB=QYEsMz~IXPeqg#vKXXoVtD+51#kNIf2r~OVio2N&)M`3+J>hOMva(IJjR)q)0^k%Qg=|Qs=ng6h z3daxe<(XumSS>Q?Vpy#SddM9)UL5qq0X@bwZ+0dF<&a8L!@bOCEE(WFk0eS>C7|qN z96WGBx)P-srAM!~Dx7u7ORb&5deR=LvuY@LvJF`<)KTp^535PbIp*pB)y=0YMl+c- zzsp}PcO;Ung3Y50rsUzwS$hExg2RJIHG)Z+ZCbi@ZHm%ojpbGgxI}(sWIyNbcl;c#>Uh1bEA14olT<4{AswiTjgmXVlt)*$V59-xF4- zFvU4QT*=j>-jIZKpzBV1KfDL4PgbLLGQ{THwP-;ZlFQHG=VH>Y$k7eDqGbK^ani() z(GLuvJd%yFkhrIFW ziRFoIx(m$bN!DlA=5x)2>@ln+(ax0HVP(-0GTGY-Mhz6x^BjCmBAF~Cq!C*Hm{DaF zTDqH8Bk;)$^0wmzrt*4@VI%%dJE2O4&cv68R0=IwG{%Bjwvl(~WudKD9_&;UbTUa9 znPM%IlqN&#usq6E!sNV8A1OwQ;i9RW^S`uu@C*@jhhkV)wifZmtr_q`uE(8^w_*jW zvflMOYfVT^cUZBOcp&a34V^@?P^YPUE4zt@YKl93F0zsIdmPPbhiS+dem=zQ;Ir4r zWAa8T)~XxkEqw3eCTo;(Q)Y|9oOVNhNq!Y!vkfa*%c^VvvqRpJQ5q$_FUtZ)dLrM6 z8XbX{Ii1$6;^omoi7^|^!E%_)U2G-IQ?;6k(D(=%~_=8FlwWYQqFh*hH7F>;cUfJjId3=!_alU$X~6awRGEE z=r*j0Dj?*X*5>6J7fZU`L8reM*0fDo{rS9Hm8sCGT4+A1*9Xh$Qc8awRv#EJovG6+UGQcj!)`+*M zm1`d0FSok&w5JhQB{NmI#}XUlmyk%O4&|FVdotP8umy+WbpDM*vT24Xdri`UEL)Gy z8yUxiSWzSn5K2&!RqT?UsyC8c|8d;UNF=IOc$=k;Q4!7h&3JS^36%NV7**7Tb)t53%F4f$Llx}Im+ z$(*_3($4bpFa*#HOvomcIUDwH!8zNfVPnc4)RP1ci5DW-Bpk~;IcLafRk?@xK?|0g3EE5P+^JkM ztx+lX!&I=S(U7K6x1loIjg*@t=2zgm21D%*4fv79Xj&@^ChZsDy9OO49i>g{@}+P* zN7fb7d~bp_$W}-=?rBcYuje5MsL4GO~)Sr_beO8bus~|+R|Nd1Ao1)l4M|uG0M^*dAF25>j_@H%n)Pr@^&}?TaZ_- z{tXuUYDUt~&daS?ik1Nx2am4ht7ceI?j<3D(mHfp55{g?v5{EP|}Q-P3Gv5-tDD*{6Wp~KM>aw|W`Rju@4b!lh%VAG3;`1triEE{j(u~kufZYn{b5hCl zw6Lx3N;s0rNJ-9}Ug{_S_rbH&^6mpZE9@aga^4y)@(>2JkQ~6K121V1Qo(fjEa%PG zHM?9Js_c9Ji2vbVhhny^KayJo8adX}OvDISrEnKVFp#llEd}(rT(Wa^xkemY*Vkw=@`%~*wv}z9u@I`0uy!XbZTp7~kc%AL!I^!pSkhZB1fd)xu7`uHJ`1Sh z&qXv;#gjD^b^X8OGx@H4;pvNNV!jfX$)}MsWTL+R&lc zWIu;`L$7Ouz{@6Pk;5v$z*|&1qVYjFU9MJf1q|uD0=;Mg=ao>59yzSuh2DBmfil$3SzyEkVqAvW_wbEc;r4UB#Z^b6=d7pXs(WfCvm@h) z6&yKkzOUKDkks+TnoBQ2(aUW-$MZ`z(8uRy$5%|;Grncue&XX}XN}ypB93#jZCu9c zNk>E30($~8+wb}pW;Wfs^fA$;B9!w;&Yck$64=*so)g#?zZgF1lY{}a2mpt=b~0Qr zLx>qj1Aw$GVzgxO`!f0^(||m*+$HGH10(;Z1@5M`Tm;*v$%TREn9IlP*JET^DS9Fx zfkKK8Hlm76|6#QC+{-4BBPcmhn)6qJlAD%!$Dz;(-Z8(nogI+`)g43I`6^?8!* zv&*$Y4sOMc9y{-Z&${U&5-vd&5D)kS*`+pz4RaQ~@)3xOE^X?Yrbg-t{R^zqAP* zdI!oGkCm2mQs8EX@Xa=u!8qz6%LBwd>7-npLMWRJs&d$}e)Db=KHva-FU8?pu&!}M;Rbh?rs98Mqw!siqTDfALSzlfsBOXJYVEs zJ#ejDNbU?6t@dh(bwn9!l0|3U0E?SIirm8qd++`mAZEAefNv4#*7;nTl1CNL`!$tH zpk`tWEX9oqq>5xE)00b^P*e}b0_mocKp6q6I0SJx;0zqZ0sa72i;`BsGZb|M>56=FfNlFhRtzOCeQfH;CZkEJptJ2n#~G@^!VZz!Bv>8 z;0Tk|-*6YF6Oy@W%aYRcQad?fLf4d+Hz7W|CsT!$O!!9oFM1ZeRt1X@w)NjOzn(o@ zmqgb3fH>X=wF_N4q^Rp*DGS4iKn*8?1{|T5YeerfUH|LE-adU`51i8aC`@)8@T?mH zX;2NYbC7B8OT!fR9}PLDq3{uEbiWeUCGSqWv@U_|NgEcGx=X1Skab?B*fZ+ z15Uv}RS$J};h+b=_xv3w_G{tU?Yl@avu61#U=+$`^n;5|H~^b2h5-COYNpF{MFs+Lm={rs(h=ef~&qc@`i@QJtPWLcK4GImd z_Q)%-KwBPlqL1`tX`Tt*F}DcK06vtkk~9VXfdt)*1>GJ=03Ksh}6Ktg3lL z-wSU}C`N}4|B%nDz4cxRWS3^7Dj+OyJG7~|KdRFMJn&EtEJq;b;DG@;BsILT*Y0so z=vq96uu?KQN*XF|FlZt+Z@{BVAnTnl+5$1U`jy!}+R>)o!*{|P2PBWhW9TYWRN(7F z$y-2&K#U$)cNZM<+~XU2FWdq;=B$gSAI&fEmZRZ}O=_$((q^g%30}%Cg9d>V4vJ7o z(8q1Met^{KhnySY#=(ewc3V|5C^J5??>K8K1eVtR`T09k0 z;N%W36y>VuWYF7H(M5wA4!)ngiR;BuG528wur>D*bG@;fIm@#ya_A|1)_((N4VZSI zpblw6eqSzz#J6!nu~du>o%Oe!9H`p5UiUWW1)tef;qvZ3LR{I$<(UOrsc_kXVK_TD z7WctWVdD-cbcH-4H+mxu7I>!0sPj{}gFuS*zYTfdzhNiV_ulv^myu;(JO-QMkJ}ny zl7TRSw~|SDlTcfG5A5~d`!QIxpbZ^91dyA@vYI#kgfk%Lq7t4McSp%~vVPi=X(r|7 zh84&sIAwsrA`qj)?)08(t<$S}&)mbE#~h1_qpwaIV(2oQ74%iFk8&q88Qh;Y?t}ga z+E670(;iq9H}ovufv(Ki7C8tNJdNskhcaug`rP`ufvy3~`R(5Ycg#{LB5!&8cs!|% z_d{>yT#Foz3U3A3SWU}ROmfm14=OxGboEV=Rp^F8l2y}QVbkI3zXd5arvS10{~W@j z%t5E%-V_t6tb!`pBC(JwudZg&$o?R_D1jK=^d>sK9O1zS;i~RTzZ7-3+Ui9A1Va+-4bg1L+e0@*TTdlK{r#E5KdJwm7YBs>yl5*)k>))DYo%_NztC31mw zyxul4==mRk4uKdB9REB%L)ZKS^kpNncn-WY`~^{s*Ua%!w(Yi5WJM~EP5nEMNLEcQ zZ9$J5f{HarV_b*s`q}nF4#Ol}Dut>h|IQvDWWzq`SmeM}@MBXYK{5z>?YHnM zg<>Rn4bTOCvmKHE&;1=|r^ZDNV1?~(>EJYoYor;I$J=JCH7$!?dLHh-RElnLKg9#% zxPQUrp;{M>M;{>3QhF&;+c3upfxID>=M>Ctfjl(1>=-DiR&W(p5&=ntt6@EU=tY>G zb1?r5pc2oWdO;co@*#cEt}fU;Qoue2uc}bk=M24jcxrv`onLY1HrpZxy}~E8nvJd` z8ECbV!Gf!vZDrBFJuTTWZ5N1-ao%Adtcjn2Wo_i}Raz%U}=a3<)4A!rItv+lW;w3PBlmreeoGENq((T ztQdL&Qk&z%rDI#=*8&l(+UrUvOGvqSeAn~`r0=9hY`yPp9*1N;$R7mM z2|k-I7gu{+Bn@mtO}b+D`O$ZNFWEKy0jWAzv-Qq=jZ5asXtkLPlcLKirL1PuRI=!X z*I_OR#Xxo#vG=yVA#salB6$rRr{g9=&Q@k>4W|rU_9py9C|AS zz<%Z-0|r~z6i3Ooz@h|V;{B`2xi64)B zY(O^g&57$p&rTee$W3@B&YIXcF**L{@!yO;K7Q9Y8ozWrJ?- z#WnG{Vy*ZT@v5=EjlDAVld*fo@?*ZS4~^{{n;iYq=x;`UG=pm7`ln z$41^6`NhbiBVQZ2X5^y-7mu(b))9JS7i21$l- z*F1KswJL8F=uJ4drnBp_a;EFdr39HQQ4YENZ0Sh24cnmskeh%|$>8w&R z!B~p(eoYWCg3C^NZcYCOx?sTVAPZ!s9LgDLfnsuQ2H&`pHrE(Mu3OgHqJU&2-}s}x zTwUqP?3B%7k?CcXShtYei1V`44P8V=Y68Au!B%2*E_Nf8DF&)6a5ljp0)y&TbZl&f1eSKslL`W}gr0dPi|+To);Y3bZn-2~_N6M?xoGfs-C|VUt-- zS)=BdUmtDJ^3-~qgrN(RY-X~mRw~_YvXRx!%OLK_F_P&5mLlYss}(R7Ay=55`U$?T zCs&IzjGZOTjzC4>rzgeua!1TclKNyw-f`y|2F=I>zT7SkbpT=~l9L&7fs%rmc?n+* z36&ixRH>G`dY7$54Pu@r9q@RyvQ);>NdqE=)UF^2%si>HmP1ua*U)(s#yTl0vl9ud z-&{^MDb`|21RIotq*BB$vE0-Obtzfe+KH74?PO53GJ@}G^xF-LyBZCpY9-JAXY9=b zZ<>2#9L4v}=&vEEV}o7TSXdx1dh`@R=oz<{Zi%?!d-M-fD29fl}S zs0^}*jt--^i!u%o9Yr0!FzV0U`F&o!N+<;Sb)(;& zr|UJweITdJ(=L{oSl|nEPEVVuDl2tks&Cds;S0(0QMY6rs|~p_=#ZjnD@=Zcug(^_ zVLE5BP)7cEn%)?{4tIAN(8YRbKqq|gLJMY?~ zYx**ICRxcj7%khW*J+W8uU}7fQcR=}?K?a6M2kjBVxC?-V3DgSbExT0h7B4(i_GpG z7wFgoqoKn2mLL8uA^E!h;OP|`qhpipOt8i_%#mz@N3(l1Br&h$tKr-jIW=gqYP7#X_M7J)f$Tx zHmUgf8M?)==3+}3>8Z`B{MOI%)zdXol1=Aeqs7*0T9v2p&MvxS&kEpTvnFgWb>j70 ze*Hi3^^+>dg>XZbtVKPvy{C}eJ|6#gOzEN2v^(9*^rLncvrWhUASTb2=@ixPdn@{M zSgF{wji*O-09tO;^LdXUT?zSBqVf1gdcHU%OL)u3sHMtzGBc0x^}}_Gj5c%&=2$?V zs<)DJ<6#RQ@P><>Y|Pgydd;$WZie^h)`fLGgEwV%G}v~>mQAhw3(qE4iy>IFo~sso zp_ZqZp5Dg~Pau&_(q2uQH3i*l*gJ3Js|R$(JZpepj)%MDekCuuh_CKzIGeRZI8+IF z50o|5*!0tUeJ`bSQXOR${>q7fucQ?5B3|dVMKW~5NLAhaMqG>4^NCS?t+K07v$bSh z<}=ru>SlcVog@C*Qo80~d`7s1w`JLGcl%8|duKS-XAPQy-{J8`TZZf${M5PJYC2~y zt)-D3#8U&dLpTzfLOaFl0JoZr_-_U9bigvC=si*(Q)2XIcO@~X>QmGyDu_k&QpZ!q>H~@rW87=-=C8sed z=D#?qu0=K-I4e2p8Bao6sm7@3kMrJ)+P}@01PdLU#Rjo_))lbTB%394Q{V9c3r6B*pPweE$wPM@H90+8zv?nU-xnrB`JiY4HSGsX|TVAV~+XeYn-fdP}byU@~D;(@8 z8kSl*8{ZJ*zgp2+JXEAu@$^EGltGu=z&j^uE9z1M`FX0UTqze;`{_9e&%O}L1k|Rg zKccYpf~5n6wLj(g6b!KvV{^LTf3I&S4ea_WczV{E@zYQ5-<%A4`riBWmMDr;H8s(Jxx9|DN#RJ&U(fRo1vDvVAfC!69Lj=UH8~z+zX}m2rZSt$wu+%}DY^C$zPeAv z8mn4k1OX$VI?YbM!nfY*M?ywRsnfN(lvK^2oadeIwVt#!1yByhfkIGW^EYdSDZV{g zM=2MgBbk5|$d;jcH9a-UGjhbd6fQvqb6TZn(`9;{kN>XSm#}IqvR0|&_n6t-?-AK=#Ipx22Hs*fb!en|0#7pGukxu%+^#6bo+XSjO1IkJU@L4Pd0?YA>^bq^h~WvT3ejt-QBeYyWijG_LUW- zqng&`C6A43%MVz6E>p6dtfw61vRpFmtiIcZ@-5T3)vaEKwZ^Ak;2WtA_X-rw;iS{V z1mxNHwlDI0biq&{r_~o+u8^`@%`c2KS8c|sqnvJS&6p4M0YWhO1)hy2EN?NolG>J| z4lt>RA-k3LmeeZbh5+5^H~P(T%-c)Hwp#cfur^DCNmt@>YdKx5#8cDX=IM0St)L9q zKvkE|)HM36gpYWE5ru8jDtj&0R$EzsOiN$o+bN4B%~ai5^>?&QpSM2c*?NG}{WSfq zqeHo4hP=7xif26=rbp~G{hW=V6g7aMdjr0TUA>LJYiRoZRD%wC*-W88>El6m-66hy z&yxp=K?MoqQre<5oD{L6&uV&xdW8x!v;Dj+mTTw5yp+;(``z*ZM1>SW9$los#8fr8n`uo|?K#6K0A^3oDB&%pp3v z_5%K+)s8Zw_UYT!nA2LRWM?yc8>_*1k%rE!>UAO(SM)%7-4)~deq1vec0bz+7IlTh z9It6DbzAyW#65w_T(Zr&!-U9l_|fwXBT*;M}{FbNVdSRfGOtex*THCO` zFn>PJKJN@T(xHUXkdxU$UisQOUpF7QD!n!G0I3tDVhWk912 z1e2Tjco9w7o=74gF7mR=s_niyzdymWT%@P}_Pkhv zoBnF{l-oZdo?G3VGJa}rtQ7;+Q4egqkVEDSS!f4X<5)tLJc;i9|NRc695$UOr;VuIA$OP>Sd4Y60EneKZdLajyu!V0D zIb%jV3)ng6^JQuDWFBxrBka3bS`5P|2cXA4kR%lrONlbn zi$-~_5VRnn1&oDT_b>|eiO8{nT3mh$&Z@P2c&$KDYou+RxF6x>(0?vYb+^$C`1K`nCKQ%IgL@@hPFJ8Ylu_5pC-*xM%&(&a*ova3~u zRKAG4o+QyZ@#01ynaruVN0F7!2X4uM$H@;jiBH`fI23>%(!|IQ$%F7d15KA}Wml+K zh5}38y8|4BWODaKgNuj1-ysIdtwHTk<(ZgTrk2^veXngSHX6IcKqgvQM(+Ogug0DE z<}UHFOJ!`07#L6J48D zR2xm-P}YzP04w@7adegG`}W&TGJRu5rZ4Q{1Y}<$cZDJyXP@(+hG+o55CrCE+3efA zS}A#BKO8`=eQoB7Ee^e$bL91zHMCqY{)-~VB;y>iY;y7jLAQQw35d183PP?;fccOw z?-#>|akWx%INL!gM{dL0&N%6Y|HK*MyXS;6$B^Ket4!$d&Hq~Xw1`}Mwm8UnbTbjZ zp@Sm;oLY`R^m=F>5q1|D6WOCURLwS&K)Z0xD`(uda} zmmDBHU$=|#sOdZu12g`)#?@x!c`B7i$xUImrEQP%%>JJl%miiR$mjk9zlR&vZyP!+ zVm#qn4skG!{3A$;u18ulV!BwC4iyc)7{_OEqmay{09zdS9zA!7_~Ox{<`v6r$z)?t zd~*fAqEzjKj>Dr>jU7EizBN_dmmR+3yK=fs$ROhlH0XWwz-!j|D9 za`6aT4q^y%u{yp)?ldMRM&$U?C*q1#WJUJo1=m$M827iSY(xK6L5w zOOmylF{tA}ZqGPd;YPT?vDkbXC702v69u%O8o6#gmlbshP6+?W;G9{;+e4D4%i*{7 z?9~5^0H}_m%yMtZ$8j7r3auweH({Brluepan<6$TnJ$?Tfx2^*?;lfbt#Q?woheL7XT`#DF zyRCvbB(1R}02dRX3AB#ISpgY-e@NPl)N6UsTu-43d6;BAU>32NG3=7 z8!sBZti#0bv>Zw==a-Jf5KY|A)0QM_gV};yU=W`!T}iy{8{gl@AtLS?K4jqfZ9BvP zGxG1Y0jou+pyLIFELs5aq=O;#|92~Oip6T`G?z0HZN%XahDyqw>{yG>$% z*RCuhck2M(e;h*fDia1|BcG8T&PQ*DpX1HbpBrwx_Ki3vChGVGzd@X_d^SNFgSs45 z(djJVJh7L>i_(>3a@TXe*ndK9sV|h#TW+n@mic&P-Ex&K#i|uU&0xp?-0{IYrb|fX zQIGCqW*3G#3(&-{*f=;wzP|=V#9F1wbkw2_+G8}3m#)4HJcMKfa@>j+cV=Se@b$|$ zIZ>47^d^?^$Fnu9EzwDH5h zO|iKgLtYAlhky)3$!n1^U>TRv8WH0uR9W|DN>rh1r8D_-)1FY0hobncfJ~0$KMM)D zc^#?#40)nXy_A!*wnIfUfnRfGO4SK6Zdaj7_qsiIJ5DYPfQ^6**N-3UzvIW)We)|o zHRm{V98{93sj@7i_tLm@`f337o(_S5fC@Yy4WEMYst~s6_=*0X*UUUQ{rdV{lU6tr zT_yTw@hzN-2f<^s`4EuS#)pA|?HN3JPq3v^29&X4k-X<>d_X`Y*BP{9XQDT*#vJcJ z%9Qb@kVT9UL$e?4^$MP7Jt-#_q_EglQjshC9VY;EJ(%KUItPZwFWFqRl4K~Ctr%4} z+;O^AAh`ruAs{0wDAJ3K^0kdp$Gx23`5XtsOB)iw9-E0_&bY#CmY;RF_kgU9zN zt2Ouyj9YJS)*_a?k!8tMMJ#1N3VYyS>J-5&K}}03;A%We7oieQK^i!9<9gaR8&qL zj)9MWOpe~+I_{nI2cFk?3Go;@iZduc@#eDVOqte&U{H8wWKiG~Z|!l#yXCdGRIJ_C zsYLaSR-C-^9_TwCxfa(%^@<{Zt(o?ZLoFNc;ne1k0~qcB8DjcMF1dL zj3fa$alVhU1FTv~JWEr{#)O+Nx?JuaI+#cDn>=!}!>!+1h?XoY(cC0noL{97C*9q4 z^88IF*RXGfhAp_E`c?ex`6o9+X%&=>Zm-8Q>|3E>Bh#}?e8tQyBX@ql5cBT*WY1w3 z4qO$bB|`fhNteBJsgO)W-}Pg296e=W=(~L+b_T~$6J_yCv&+O2*>c~eOIdN3)3(4vNG8`k z4CN1Cb=!xJwm6%`0kneGNZWy2(nQtV$dZ(mx13QG8P?Dn0hv&*J~(o9+d4d>&Kw74_@h&{3=eh0cF~-r+Ji&3Emh02#hxpk zQIVf?#rrl2$$WmtN8a4Dp1>h(^Dx}w6ifS|tCnZP+b+b7Y}(vUD$VM?-wJ21o8UC| z)xLOkqp%D)dZFn)eap@3cqh5VtB#+4k~PwuV&zO=x+apWeRb-C>z?A|)o*tn^bXcT z()UKTouaAI^F?gNTtQZ$6Ja^G>lSvYS@r}Y%gQ=LKb-@8p9LH8CYrYk<`Sn%CtH&WgE6HQ`;S5?y zCD%RoIo@!Sutd?`cv#gc#A}T_x%Gos-a<0*+%B~bH-1PAhc%1IW;e2_xG9*- z>)SF%f;2uXK7FH*Oz!@w+BN*`hsB7G@E2STJsT}rn!UUm(kDlbwp;Tg`w{V`jlwc6 zDV}}!-H&jeDw-UAhVFYa!K$VfZ!t-tz7wqzl6f?~&)tb(o?nw#BRL}8wI(t1-f893 z$JahSDdv`jZTI!AgK+d5oH4Q?tsH7hz;`~q`UH%PKTkg@Mqsb^pcR3=ycH^Ju9({J zLN?Uvp_ZnBU48fgoQAhOf*BB$aa&t9HnZnHEp`y`V`4GR#E8rlik71J0PXApCLrX^ zJMvOkA}Jj}HEKn3SgXT8;q`Af~?W(rYmG&SJ!$EJgBO*toq#@}e=7aJ)cIQ!p|{c4Dl%px$V)a)$1?Vf~XZR&T7B)0zUCNE8e; zXOOmN$xEMt=zk0K&HY=(F}jX>u@86q2Xo6YtrQng$&~sssLXUP56DpCkHAAn=F^`& z@uQKDQVeDxqJJOy(ZEVTG>z%qO5L2L}N6977mX zgB^Q@aZ&zs*jbO1v=q137B>pXseVLx025 z@K9cLLdHU;_N+Jp>#_wNAyMd#(ITQrdkFPpppW*+kDnFq+w|5_^5)}#9giz-?Tg4I z-<3?A=H)fx#d#Q_p~yq2)n~d;VL8QC7WG@mH@^s*?P`U|BVOXB_WtCS&2*8DgHm+i|Z)kr__Wo$^{l2Vi4zpk><##uC9 z`O3tV_br^H6skJ)cil~<$*C{E*bU*1 z-gYA)4td2}z^fp}E+Z$kb0wRJ{{`{fmQ`zzxr6Vvk}tk+(w^`Bcl2Dih(~K1_yPZp zcVA)I@Xhu%An`x;b+Km?q!0yHe?B|WsS}Q4QfT)<>tM(7r8!NpA)6`{ZN?LACy>sF z^L3n;E2$&EU_J}aGq1z`35(N!Lm}a>%tl42(_q6oXF1kuyG?-@x&Ief@B%WSK8Ylc zNTaiTxa*ft#dp~UKp+{b^Cm}4mu1TppT?T4nX&;A`xZ`0({~_j1x2Lx`~;WHXJPn> z?{EseV*ucnu^y~2R*D&_op+n-h8i8uuq6I1G(B$dTZ;EhzL1Bi zcH?B?dk{rJGWkYy3m)t~KfOTSX+lo1?)Nw&l4Yv> z8y#HOI9RpyXjHf=N%Lfss&<|?W0RX9yD_@18 zwEcIucnC@g%h`9f4X^qgcXx0Mj>Aqk!abdl>cb1%k@0f02d zz0u_AIeA4Xi}_N)pd+s)SN%%7Pr8yyj=a2XoWAFcUvUHO9&l(8ym7s4F1K{Fx#aK_ z8rE{zA0zQs(FOsT>|MBE9Nqf;S9ulyi5RoU8Vr65RdH#viKM%o^ry+>&%i=JCLWLJ zc%=H)VgG0RLgoNC_=TL)x!~y8sg+elp!C-5X(InA=3Yo%wtH_M-uKhdm2SWRO^hw) z!6w{z^Rxk>R_Y|)MafG)#|mt%Ad{MW5~0srpsn>a^k!_vylIWNiKxhLtzR>FzSK1F zF40Y#8MBE=a}170^{2c+gc{nl%Bs_e^ab_YNMi1#6$*v=#P=9sJ#zF(V7HH~*H1|$ z+){81&RXufJ|4)pX`e4*NocB;P?_cB@cYG*jkAI>WJ>sr~2WMbCjCXRw zk+iB5bfsXkx9i#@>HQhq&#a&l>U-}%aOumlJBGjd^T>`q-~#n|22BOx-&j}?%ZY+J zrVG>L`@hFz3drQ}UqxGq?6txip8ljehK@gA7_l&q$Lkv`y?UIo$C|2OLD%gC$l;^7 z;9Gwy-Yi{N0;~SZoJo1-@S)#=$xbd_pPx%zr5j9B$x5_^*OYG1nI;eX5ls=05&r(u zhH5LxgKvV5fDD_74`PYWk%c_X|HCaU z`G5mb;G-ffW~<%GIIYo)B4x8$kVoa3UxST+jF>KD9Y-kgHuCzf#lPTfn}7MuG25o- zHZD)c)iV!Fe{cP|N##WPc<8Nbz=i(vO)mF3=_(Uzx9T=i&P`Plq%|+W>*Y!^5~#V4 zXUCWyzBVs`t%m{^enWM$g@BU@x#5BYP}y9PB0t|IS==ZjlcVoDawebABC;I|YPV&; zAp!7DxSC?UlVIv>Uhd}JGm1&_^0egiSpgZ*@6mCp56cD#?%0aFD<7o1IklIjv-*-T zOYWaR2Lxnt`1=`t8QtLxO_5uEi`*Q0PLYh}@BHP#pw+fafJy6e@}ASzZIn{v>Iv`? zkcp;_1P!AQ+fk_Q>k}A^-Oj;rEC3nRa9Ah>Jh;0KD`O6)$O9tq5sT`uLm?;_>!qIjXXm_Z z(Q)zlyhfL3&^kXI3>nhaWFY4@<;W-IB>N>RsEB$)HldC2?c0W1Hc9Y;W*=~Y`F!8P zaiv#J7g`auJ{n86w+wGukU&hh2F&tm^*dNYm@&pH zeI~1xTcdem+5$cTGNG>ncX_cG*P7+io~^A@l|${4NFO>b9g=+t8V-sp6}o4J6@ zo25Q?C%s=p7S5NPw%a`5fE;ooXDOL1-0lE8w3#aP0$pFAKz!$;1p+cT`oQap1ku#n zhR>ZZxfn?qW?E}*6dBjdylciVbKcCB4S(72U$d`mcyYrM8}8aL*ihXN-tf*1XKt9A z{=@Xq>90&5nf}o9b<;V~jnkfK_4MB94eQ@r|I+$r)<3ZRAJ$*BKDpk$UcP?M`l+ec zr@lM&)YPY@ZkcLNT|Q-;I)7^GI3kY!p1I+kFHdb>() zkBfLbXomKMEsQrDalm|?$|w?k9^ajjr_GT9V@gyt+DtQ)I-@pnDrV%7W|1~hHWRC` zL~A=eBllanS8{3r!z$0n)fYa?*Jp!`5M$7Lj8%Wyst>cf z`0zi5b@Y&mQ09=8H5RSUDOddZz{r0X0cE}}RgYUDo@munj&1t{&xdK4V{9|!i+0py zRWqI0%!79`Od)5)WumEKi)fg<$na4Mh&l-x)JZ303tHn0Ao))nvq{JN6qJ5dsG-Rz zo9qmai_I|p&VdS}EBJj{8JlBDnX`CcY=*JhLX@t|XiH8b!zK%B`8Yg=VZ3c7kMQqi zu3=1i(|f)?{s5Jz&^0aGx||V1teJn?VZK|mH)dpgJ&z*k&wA9Z^OpGPv`ec%sse^i zTMoqBWu?N$haxew$>L!l1updRL`1WD&0^kS1^}jTKVP|`1Vk3ylTXojb7R1X0?oj?vts0J?j?8o@#$a3B&rHdCknyk)cHpJK7F{Y;-2jpyurW#nbja*c5%I0x_&(x)= zS*x02RkB_x;rlwzU*`2?E!K?NWUs0EDR%#9I ztrj**tE1GV7jon3O1X?_yR+_0PH`aM(a7JDZ*!&GCDxr(j>5Nqx7;g6JWRdOkJ0jCy7?)-HR$+jFO7_<&iLg*_HEr zNC4f7q!qwxazXDx7Oz@CS>*APdtn_*cm0WMN~4kmbnLiOJxZNq^;UN$6wAAVCFS(# zd^5X!Po!EqAhXh4w@RnZ@AxqPSs`5M1V34H*W;=)F?~PJ0i(D&1vkIOSLQg*G80#f z+2|Z4+8@kBdZmQRl2*dJKZ2I;%4BUurfKPVm6)N}JW$-ohm+8qcDln@g6VqQ*3&gR zii`Lt5M)qK(6p)GQzJ~dA7s;BUN+F30t;zp*1OVeSDq87*WsL2N??Rv#v zsf5^2YIeX+K-*>SmJY;226HhJt0@XwzB;DcO|&|$@igpZYpbX}`>rt?HrJ+WaiiUq zE`==4{5j)X7p)%S_L}l`i$dmbWzzQjJeO9>>S*SAb{5Fz9=}2%yYS%Bu^>gJS>+_|XwQM;XXsUG4F+G%YP$rYr4^1d)t0~rfWK0jX z^Ry{tv1t^#lsuGk@PXEJ%il6H4mK+5 zyyvI%NhcB%HC?Hkd}=&fjj*af+4~3V7N%LYXrsyL@9>Nop<0kB>R5+Ct#Sdnd(U`Z zG~7M|>z1`^4ozRLaHTemd)%-Z^lUs})s?~_ZL&qppU(5C*MKNqs3)CzPb=?^$9Mf3 zKhX73h0*J62ARf}(}oXZm`BI;OYT0cOh@9nj3I8aWM?8{dO94Va4$?3ePOjekw3dW zrl(2?#?@-}vKfQhXJhvKa!e0r%#_}wjTmx_qJ&%7c>UK6IX&xSb*Z*FSj=fNwmw%M z>%Xq_gcwyr-$DK#IS#eSGslb+RU;MX`RJl7Uveokl7HoK*K2)C#Oybw6<${(p4~?C z-Ks@e8oeeKF{g6jbf4PApHOtQ6*Mu7qi2hCLWZWA-Q?n#R~w9rjvM>IP(?0NcCxwI z?zljZy?o+bV|u*NqzevvJgT)>*kIBlAJYRp52a}J)D2_W$^?|_A6>IX^b%)Q`HqOo zXtn-8(ZaA^6;qmk%Fibm2%MUoq$0MQtfU zCv@vZ{bLZatU}HXXGNWt`H+MDvN0DIG9uaS;bKYWPirgbO}w;cbmmr&@yb)#(gDEt zC5^e$`EASqH(SZ{!|_Zf;&mxX3H6w+&Bjxdy>3@|5c?8w%7ahyAJE3FA*#pL`f8v| z==(9#&3t>b)(ou)%1W|gpx{;(Jd$yBm7zepmCazK->}3f#r)L=#szXui&j^gMGK{4 zTcM=+V>};CPt#Ah6Tyr-V=iSgrzrU9nxY;!WJP_hqRQLj_Oyc!++s9t0B*?Zu~fe5 zuIp3OpZV(QOjpL3)232J6VyaI*^9;pwmQ&0VCnjtN_nLpF!%C1_*rAr4v&jY(p6Ph zFYDVodG|l^tx?M}es$k1OY1aEcSyd-AE^xVS2s=RWr3hP6)&r7KjgovYS48&VIW~a zUg1rv)n|Q^*M?Q~jmC}j6W+t>6%^leRCZI8zW2Wrh1Ye-& zKtop1y^N(?h~#O-PF`>@$iU;E%Dp0+R76zzCguFixPHPLr7b$Tc)I!PnN;R z+r<`}vRa}ZXV8@|s5V*n`to9=hoo0&R+W#pQ%!3|GX4Nvc3A0fC{QjV1gfi)hZja8 zO4pLkb~aozm5{xt(#wRZykqd>8tHEFg)?E%rqVQQ&d>0~WU^iIjXjY2Y+yT5zM@NuWa3e#?U zzya0)!wJ9lMm=%(2D|!BZ?IIzL}~KMKJ-LLCK~zg?8Dfi#4no5m%WZSlPTs3RkyMj z0XW^4_DkNjQAj4heR2#9XJG7hT|T%7W)&WVI*oMdCZyWPAQ(REz=P2JXJYgPRC2df z;TWEC7OY#lt{7a1AM+N7X5EE+Om(Bl9f)_+${4x%Z2VY2C3j!obPQ+D!H;?4`I<}D zNX6ovYd-Y#B>PsI)v?cKf|j_*v|J*_qjRw6gujKe4~I|Mh>*%6hbv5xbLA355Uo;5 z{?qtRf78R`?#!lJ$=g+uDe^IeM6$r8?Z_t)L6kun4=qx9Ab$iM>5%6XlEp2n77|h7 zJ7dshlTvcBAj!Lwl8?^`S6rI-R2V%WdHCiXi+E2}Um!tdb2^&kdI&!j1am=8?i-jW zz@y217f84uu2o8j=(Y#{CSLXNF7LdE>#`9pJOvq?LE*$1=|w|^E^^2Bi0l%{0tsFu zk#1eR#&GV}s+&dRqVGzk$?PQ(&O62fpBuE(pDa2`!2&#EkcmA(ah&$euTo0x{`L@2 zl%rf5e|m@Hlud`ZTpLB?+PGbGc>2lp6O&d>)9Aq-8XA~*cQ@=uQ>X&;URyQWDQ9d5 zZ6l}ZAQe_p$(-eZ<5J<2;q5wXYse>n;*I5#CQP*otR?DosH<*;6K{8a(qo?p$lTlA zC}YR=Vc7ujga-vUZE?=hXo%KT(3|O=rmSt5^M!CNPJWujd02suvtTQEasfH?8g@dUwVh@wgm|@=)5)bckTs+)w;pC)ZU_^KLR>WNvD#p6Z zZC^N3@_K>{zXW<3iF8&_Ml_^w;v>nZF+bI!TY-ULxiJM<(pGatg8h=J>TsBpaCY%P#)_c!L~nJw^mMMEiNU#oklV4re7(AbC3{`BzYZ1Nh%(;6V0Yls_&9U$ppiMa)EXv4mY*HqHuY+y zM0EHMXYfv-r=1*p{rJxQXb|GkY4RWtKALreJT!tWxy(2C-$RpUg80s=rHC7!#fBY< zcMwD9q|)rpkmQbC)`M4KIQL?@w&+&ODL2!e@M<%y96migbu~icqmnR08(iR#mxl{w zcjmo-%MUP7ILdIVWGnfXCyRXC7w+28WoJ3b6MF5^y(z7<(ZiU3;(AeVzh3 z8%5;ND z%t==kk-672BZ0NN;+hf{cZef0aB$w}{EZkCt~8r2)_}E^kY$)0X;vY&gk<7*ZALLp zAag}s;(FV``GW;GfS!&SUqGU0jHiWzc0eeB0UlVGLs+M5YNh1xL%*ZQ(;vKk2QhX|I&pV) za2U&LuDprTM>9cy{?c}Utb4lHzydM{vc5R>vsCsakp;gOTD_<1G8qxS;mjcfr5M$F z^Za~#zAu^EvT6CfEG{P|SB-hU6g6UVYLHz4IE$9XqWD5x_X!(8435dQh_EG#LZj z=M&xC1+|8v%g^?Rh)n-toIHL&;@*^4BeqHR&vd8noBH15)C40+4EI*o#?T1LM*EG2r5KhaPSGY&Z;jM6bE~*G z{nXTJlRGC&qT>P2oKs;Gordcg+6p78wPG>h8XfGpv++3TKZF@vNd+2sWE`~n%ZI>z zF7B7bI<(VNHHCc+Hk{57>%&+%0y3HV@>wGXtX;z|Jj^XVd^o)P;dVFF%sX0PSqCti zUYC*>Z;-rAx{?ZDi&?x}??jaS<2P_q?iqwI<#6Fb%blitK|#s0Nv%OvGCBd=j}5*! zD~4*r0R--wc?U_x+>*JMv#AhABI>^M((~At{z|i zGh7?ay^-roWZ>tfYSa|rA&?^x| zwHZYDt5oEDH=#QMGTHlYx=~iQ?Zdy^Bms;GkiJYgN*Rb$g8`?)hp@KPE%=#$Olsde zedN-)K%Sy5yYP?{kXR8;1Cx0^+P*lmK>7Y2lFaNCgW(37w>~V$~!)Zxfc|{SL^=+c8zq` z@ME9kR-tPEjdt7$kEc;kF=|WF)9#02X*d#&I#ap_Yy@STH{sYT@~iitEpSNWP#1XN z^R zGl#dI7(T!KK{RE&l&)JNuFrgI`roJiG zk-L71ybrH`h7*ReR>oeT<0@}I)3Vq*6~GoeCfPSDAj5U{KaQm^cuWGsa_4}9PT)UZ zK>qq9qpjF&MJkr2l`8VU5lG>cWb(!bXU^b*@ppZi^H*~XlFNgjH+z{9<;kde@vdLl zqZ#tx=OBTEWO9_+JNCxh`FRQA@C$6Es$`tqcCJT9tO|FMT=OJ4E+CVm7f8?GTpqU# z-*}Q+amoRQQ-Qz`$l;PEpK;Ktp5GUX^&(Bghn+gar-ft^`^=A*Q%bfJ{WcM9P?_?nIBz z{2A|2$AK>JEcDhg93?untlp|DHI&&HF+C3!0x~)JrJusr>3MFgxds*dnqRNoIADUQ zMy=vYl+7Uzt013x2ID0p6HkXbxVRJtJD%mH+d1H%7x)(BGIl0K%UgPL(XUolpf=gR zh876OMD*B&$Gx^T51;xP`0P389+bd{7Z)W%yJMiO?VdT)=_S>2CE506FcOfFSL7#) z@#2+RoYsJ*Vsl&5d8eIR{4y+H?|(ruJ6jNx%w4(*a4*Y| zsjt7lNgigvfiYY>T1viNooO*qHd;yfd>%^^+Td5w8UdM52_#3ftEKDovJ5$#&OR0$pZ_MT3kZRuxl1hq*BJ+* zgyB4jM7qTi$71stNS7j4osiMuB(>pE>ie6)D90~r?r%%P3lW4JAm3ZprML84uva=l z0L=>-N#om+#jUFs4v&0sr|A3rQ2AN!Jc^7PWd3J(Lg$iV>8j=mQ#c_Y+8E((%$_?>w&_bR5d`hAIHwJPwY z+q?aEeA3?XvG}B@A2+;^1(pLZ?9GTz0t6tSwAc~5y_Ecfv0Sa{kxO3YY%;5rl2?9Eq{+q%*+HIr`J|WHo&SMLtw6_u z>h-n%z_JsNN2=F2A>O0^De-QaU$gdCqX=lfXnwl3?(sB#nx#a4Q>ElBjQ*ja)ya`YRYA8V*j{1x`a-3PB2aA+oYqrq_G zW$lJDtY-Z6ti417p=jyn7!3iHduFi@XI|qTc&-?%BRKu0FQyS(o5%J zA-bz%vOwNb2JPx>m?h6lNny-dE1jDalo8SP{l|pcaGmthZAh0}!V3j)j5M+UBvPlpn8iaEC*8Z8-8kY8z@E#E-{)tfb6Zxe!NsrL`hObTc8JmKs2RH@Yttj)hn9lmRIP{*HSy@hz=|Sl~rlshmqV zXpJ$`?KIv(RHC_8bjI+mOQcs~WaLX6FbV&b6->(#Cc514I~#ICPK`?_ zH{;}u-^1)AEQ3Pl-9LQ#7Rf#liT+Wt8@GSplZN+zTk<%+HShf+ zx+Ey$GER*J?Bt)gA(js~fDyhyMoY-9qx|7cN?~^PWBwdT{Tj-pkc>>qsuhoGKl=?D z6c}8M2Jufx!d=CSo4pE(RjCvvIQ{=_BVIo&j ziRQ8IACruq-v`O)g!<(42l1%n={QOefc(^iu z03(dUW#z)fat@p+-M8v;=3i4TI9nRo8gk&7+<;{DhCT8O$;THM6t*e(3>RnfjJp`UV_oV&bbDs2$ z-L`{Rw__8$V6zwMvm*IRYr&lr1gR9jZ zD`#98a=H?GMnDGmU3?UGynT4PQpzDNE^+8QJPQpgvqc-dWFhIdG&2b`@yel!2&m+4 z-?zt6$Ir^8oUMCl-LkEF<^IC1YcZ?ux{(kbzQRZYxbrP>;5Yo8&+C=J)j8zP+w4wP zs~1;ri()I;pq9?g3d%_AcQ>DS@oQWl-Mu@wGzp=_`z$$ARJBigTv=LS>{x)9!ENKM zduWC7gcl#3pcc2C737h>PE8GecoBEhD3>PCI^MW}sEvk!RrU;aitek`g^|_(j4@*QqCU>6;`~KVSKV`@8RUeiJRv8Dl!7mYuQ)y%9tRoPsDYJ|%80T03Dj^`9 z+bAp}*X^OsB=7%@c=Pa)0Keu>Szhy6k1-UjR*LF2ldh@MYVzYSnj)Z*qn~;K53$2_ zTZjG#*4pmK5+F#%dI(+gJG>OKg-|uW*;)g*=N%rf5RiFXPuan#O^80yWId<=l`eE~c83K+*9PTxonzV31iuB044oervN3WDhwys`<9R1^!TZfMrKLl(N zcU-!0K_8GsP0@m*@4;2Qn2Y8){Cy2gI&taZ=G6*GY|FtjhVQ>~b5V3A#UcM~x_-m* zVMzz5NZ!$bJ6Q?N9so_jW3E5YBZVY)F0WcjsQ>7VPK+JojimHs{s-n1P7M3?5TgU` zO@50`FnO5M*K(`RsbcJi@%4h#ar*rA>yJI_NAmz-89i&mM&XAN0Xvcd2#X|`mG0lN zYT5q@skm$@+IMj7`bm6=JKh%@Ce9xvSa1ToBWL9 z3#!~Es^ClK{H^|PdX<=db{i``XjwKF;gnxyU8MHk&-SBo1<>Awt4dhMLjq~LE z7DR-ghyzv~J;ZJu-q@0wL_0SxH>OqY6k3#yVH&n7od zXpiT8cPzba`7o&fLd2`px-v$G1~Hlxp|?QoSV_e*fO(ux`<^XQJa$wKl^WtF>pfc~ zQi_FO?Do7HBfV`wx@lHW##_8kow{a{d+OOd>?~mY?Bp;^__=Qs?fE(ltZBC|o`|=) zX`a>2LtrH+BNS1NUw*oWaH3!(pSsLPu2JV*jL}*uHLVUARa5YM?zs+p1ZCv9G8DNt z-uD6E*MDW(mf_m>NZq2jwA|G}^hCSc*ZLwMWKz4}_s~dgG_D(d;h;2y zpSe4g0A-80g6_5_rqi)Regk%pkW8+-{Mxh0i{F}^AKrTdW*eFT2VBBy1~eizR>WJ8 zhu+5>J}b$5vpF@EJaYHuEyGi9gkrFB3|#_oV7EBy0jhy0TSb($=zR*}xCJc{l8NTF z>5GO>-6A!MHr>7k5E3cT?ZD{192ni-UO&z0>DR#2XkS`fZl0l$i5e+Au+Up6Dyy%O zo9CqaH@<~>ofDwE%K(>;Z-V}_)48;7Sx)5aY$u@fyAg9%PUh`|+Jf`@$sN*p>Bp)x)`1 zEZEAo6eM*gJ})4XH$Syw|L_ZUVgT@7zjP+PS{r@UUP|;7Y!ymms2zzXEDCbXF8o|T z##Qy3=>PMQ9mD^(3u^Qnr735%ti0QEAS$k#*HOf=2R{>#iROFBV|b~1#-HB5{Ap!9 zVrtU{L)gd~!;ydspuO{096~ZVviG!eM{uX)Tl3Pf!u|Wr%QEGZHBwq^pUH|&nLar6 z(X~Ha_bg|Y{q>%M!6goFAJ+|dju5zHuaw2}w{KyF%21zMD@B$J~%P63+vcTU|t z{MunD5Je+P03I3Zr>xBC4$usZU^8n`VXza=ebOx?{25$51w{Zw$4m0au?^^?8-|a6 zhP!x#mH>q^HV74K#c&6S4XyE{BGytnR7Cd_Mo&N{qUWxqfKB)A+2QahsRa`kU*bSa z_z;XhDOhHyM5C%Onw$2tJxdg~Vf2J#awK|}ZTR?YP*>;lrBt=Tru@}j7|*M{C`ESN zj-Lq0HoWFj4S;^FA0oh%EBV&XDP@o)sxrlGj$jR6Lf<^YuPfBND z!(XimdGpi%_c*X1vCB7ow9Hrq$;tFBWY>5^wZ1=V}?QWBf& zS&8x9lWLV8yBAueVDVy2d+$5RnjYu3QavCIZv%$79KhRoWQvwK^g(37vCvT@tReS3 zfCjBzN^DJ^&aN1ex^&Fc|y8yx|}(|u)ca#?8L90 za2=W=vkyx*0AJPvM_&$DHPCV9aXF%+IWCXbh%GTaER}3ttqQrab=H~u&4~Q@pQSUK zE?*-yNf&2Y)1R1naZ)rvi7w|X2Hfq`wZx&Q@JdNOVALU|RMDu~*-Ry*loRTCjIV$U zV0a*HKmD1R?ZbPX=g;&Jh{{L^mMkWnoTds{J7ck!jP(K#C~@1r=NY^*3ChUf-!{SL zVHh6%@(g!U*_Jr;9bPvGCcJEqws(|@w5iZ?#yB>M(v?&qIvuX!BSgIT5Da#^mpIHF z-uh8y)Cwn6jFxGuJJ#%|^L#_@`y3h~D1-R|Dk+E0H=O)Dr(ijj6yU=v*HwAX*k&Dt zMka`a!bKUpgPuT#*vG&}P)43fK(^xmTo@jHjO&ndNxrNGX#L@Kh1Pg-#z0O}@G=~m zMd?Z^seR{zXOTCqgS(>qvz+-Ox&(ln@uP)c!&gZ9$lnkH+lD_l0`+bufO^IU0t6rJ zrOb#>VUkT()I;$b|C%Rpx(Lb;I#V3I5P-{*IHbm2Ss5;=$-8FWH~rYuk0+%Q7l|_5 zB6497d6p1?ICjg@gfsdkownC#txl=21(Ceyg@2eQpZkGy(?($#keYsX<{kgGZToQd z4>{|kb4dd}yos}1X{lJYV9+`umZYxeg@(-W+4? zHD<@t=fsz>H3VetxpU-ix-e{hnQMq=>5}DvaU`rrJx~v@l}J&MtvcnT_X1c5$V7C0 z>_oi3*I(dPwrlC)<)-LppNVEdX=JCahuWbCMLzXa@DY$VSjjb8zy@#?B@?xWF}0an+m zlk*cAQDwOIjZ?#1!>!8=4^$e;DjO_^T8=tDNeF8*b0=M?X(L->G|Ys_LBYeD$68d*93FuARbP zGH>}$d2xG=LH(C<_e_+xhPfhRp#lb7%~n9~d(CZ(D_c&%oH!Y5ku)Bxfdst4b`j5$_V|Y@Q1sbrlZeQ5g2?0TN zJPUy(JdIy`U-oh9+t7(m{S6Wb9|qTA`vFV`@J&!Lru5@xYSAp=GBO#HT>>Tqxf}R! zUvI@<7f%P_JmMc8kspBf7?kxX4?xVAM2hwWDul7*%2rM2qDLU8xZ!blEiY-h=E847 zhW63f?Zf|iT%Oy(V;1NKV`?j1yHp`^%~r)%b-DVf9KNI1KLK|%)`m_z0D#C59pl|k zKWh2+c%^LihfD>EQMaThWi&$KA;GhcicJe}KrWZ1aRzDp4!tba_#i z@bf72M+nHr%|q3NhEvcA=FbqCLCGrwq!8bTyp$xZa^0NBm0TkF_@7}w8@8eo|Jnb) z&kjf7=$_}7wyZ+En~wyDTm-^i2m+IF$bOcr9dz0AaB8}7Bar@9o#<=NpYfje{sr!N zY}3RWD)7av-)BdAsd7ko@^4GQ=!WA$IO6cTzPS7DE>=%VJ42bA$q_iDPwB`mW=R||7FRn4j=o8{B@f+=9lYI zN1@@^icn_v`=30+VnI*;S)&;~|0F(93&9=X6SW+bCIupxHTGTUbi}|?=ufk1AYC3a zgJRhSWw`K&9&;J(|F6u&Xg@u-_m-#LKScd`H3+31gHk31t>Eo7lE9f-q})z@l(yw^ zcqMa7YCzAgZ-Z^+EfBWe&F>k0VM%R=ccwe$h0$UBM84`NGw{rzu2iRwCLps6+sZ-B zxLKANJUGgyA;_n#-16(Cr;w)c-gA)Vzn9K}?|8Y22bXn>FCiWcpW0w$q2qhYmknR_ zU*HIp{q(j?OSbvDW`91jeafJ+u82%4f0mTs2G$@3ACwfw%sw#X?qyOeUW+y4j?w1*ovS>K({`K&@7f zwV@O5zXJlxpMXfuCl5eBunU2Tud)kOGEt%EVycO9EdgBEG`eO2MlxnSovGP2d~O1d zi?M5xBFrEkb8wZOF9xHzjrV^F{S2{)E~dr5|@a7O+EASh5{tbs;Gu zq39Ic*O(dIbn;C~8ta==YB*}3kIAJ@cv1nKa8^er$|lGb_bgs79?ADrFp{w*q`Izs zP)?%lM1Ni0bup@JR(}>xEb9bJdHu04j0@MDbJ_;*f>B*BL)XmSv?VKh#2x5?d3bGO zZ77xc`@=)cf?B1*odNOL{#!Jf>>l6;Kb560c+532k}m>LjM1v^>(R9uSeBhJGkTIa z{~~1{ENxZ47Q}diARQipLprFmjB^s4O98wCoT}&%A3K# z>q#`5kImo@Ap|bmH!5IJ*4ndq5~$w^I#jnC{QPS~Mc zML%mUctx)kd3UQJe?T%XpanL*6kWr8ab5o4g5B!*)e@kS*bJm!AnP-_tE3L}jcK{p zL)$lO96oc$eE=EVwO6fyK>-XAD&--uLCb3L$$qluwcASa0*5=>uoVHm{FHk6UiF#q znEUss0d{i~&H@zJ&6txt<$!;>?+gz3lnBdN>fqKnnNx?EkE-To>mwbhugKZiXZAvN zR<5(c*;%3{nK-gj(DC}Jp=Lqu-RfQFF9+32pw+m(<;mkBWECDcYtN8_6uZ0)UUhmK z9G}j5G=I*SW;p`=l`X?JoTK)E?9(x*fK&Dwrt7GusYt1r=KDmJf@9v&5$I#w3>$~< zlHm`JsAXQAV^IC3U{q+c&PfsJC~q?sqh#0#B`oqvNxnwCtQl`ZBhHD>zeWu#9M@fW z>`L$`7)I@sxUSjb%O=x7huta>=!RFS4==4Z;vB8|JlNy*UU}?wr~fuuPD@&n7bEGa zBaw;*QR93V{!6UK=Pz^(e|x?f5ZtL_SHOF~DC#arOAU$%OD<;{*sWX!6u$ueeB2C2 z!+?r@^a6EQrRnxv&Msp$S%8X^_13fK;tRonj#<(1yDsq#zjz_s>efv_MsW%oMz4)lh#P0E1?=9{_{rp9Tyzv~|Hx zc~eQEsgDLq4fLQ{eQ0UD6+I0E(F%0pE*AWqeA*6BY66y}&IfP@@O4mY4-5U(R&YHV zwxTz4UxW|Yms7<)3VT0fQ>(XY0f+%CEf8Kq@jeGj6)?pe6wJWR{FqI>ylsPajF{8> z;nTa3)2==f{^7V?ecST*WX;Pxub{jGCgFJ7@S3;3>QvBwu}huU362uJJOJg)T4^p~ zf=o0Z%fY>%PrBd{Y}kr!a+FrlJwMVM_&*EzM~`5iM?L!5kujNY=dluJmnjW`B!J3$ z@`3^NM-e_dUeXFo9IrZs8uXmmeR)Uj3pn=`_cgxoltuYd?*@xfsn;Lj%TM~%AR=`G z)UE*mPj&v}lzsN!XAY=tkVCZ&glfrSqP*}&@iSNHByB|1;&B-hRFQxZy`?OyoN@E$ zOB4H^L00XT(RM&EpoH=3CnrqVAL=)rvPi~1A;3>h4}Au8P_;V;>whpBM_k)8nTaZI z(v?G@0LaLwbkN6ot1Kg<#e=BpWCy4}CKp`d$Rk;4by=e8i`DFwfVL(;W-kM)Zp;kl zp?9ncI=;t41QR<3g@cMGYzz8Mnbt>xLLniFE+Fu^i-CT|%peD-1$bUrGdsM%s0O&R z;g|qJ!5R1Mz@nxeU(+*^>-CA=dNLux@ zkEfB9QXky1&I%>ce}=3z9LbM;Lfl8I_hZ@eO|Qr0BzHhL3HZTHub)E1iGQ)9D+1~* z%j5HgLjAy*rjrt|WkYJ;-r&&-PrJ|cFCC`BcSGuf8%+hJgS#T&0e!FpfmZ|mnL)$K zs{@!83FjLGdUaI&iX9ubq9<*iez}Q`m|CW=0l%vCMtGU+2Vi6nU&grtx;Lgiy!?_j z$l7K>OztPUb|G8*jBEabaqxR%a|@c5CtbgMYvH} zxDWIISstp|g6N|hgkc*tBK5<>%gl1@z5;xmOiwjDKS zUv1n9&aUD__g-*1{$cLAIcY93cVzC+9MGA~KDS_BoSc1P_8Xh; z-JF^I%b}Oy4-& zn@&wTr-|vo?&-}_|26fns09(7{#yVRGfU#VVR`qR>rOaHQTV(Go^rE8bOrO?vFORrd( z-}2ink8k<@Q{(-HWuvZtUtS z(Xzj&wZwq&T(@=8QUnB~X7&thZQwT{VsSo1GVu;uE9}I~_cqY6W=NCP9Wof&F+-o+ zX&g~d+D!se1-jc}&7YFUR&E<65P!)Je0juhX*b3>BkeS#EuIV?iIt5jHf(3g&JvML z<_5)XMymF#x~(5o8o0Kdu;ijlOwUxj4ZY?E_-Cndij0;$S*u7xaLY{o247A%as(AN z_KQ#_9x->)^LLKywyIbUPOF6dHp2!`k#mIg`OM0X@vjD%K>?Ukg@Ch1_S;!gVFjxK z*y@ffOJwq9XUdgv1fA&>%y??++u}Nk=>#RZ(W&N2I`x&K{%t+2vz1I1JhfQFtu5%( z$~$aH9+B*tD*?&xGI`TkHC8(SGKv^U=-a+#bI>z(Oup1CRxhyCd|@r+jkzERCUv?s zykJA)?FyDPpiohFYm5{C;f(d#*)kjX{sS z-{6vrZaR*yFIZ!4s-8CmgKRa`>=833usvsVg-N!RjI^1It6?EFC$K#mwdqMqLkxCA z+D2v#O9Xy!1KtBL{CEcF>|2F)$3JPs_H;3;&s)iUu;WTq^SVhR?j}VA{AAfcFhseT z$}{=Rk77HpzFKIC3b%}PXTV4lmcN7TF=Ho8#p)5CBy)=xD#LRi#NSQ*C6mo!tTk2bxS2|cQ>^_k5zQ)4JBVLT**xAQ{Ic4bysPl ztIFk4La>lAPWSL1xWtZ@HuQ;b3toM!!^}Lc*xkAS)wLuHo|IVC8ku>_b#8N-v{|a$ z)(OFM!Cy8SC;x&Ur!5$Z8wsN$VWPdQP;r|weq(Sz#mP*nNV1LyOUI1U$ME$`U#yzz z$$~C#_cxr`8Rc;@Qng4}n_{6Y-mJ0YPIpL%pON^2|Lu_c?@q9JGZcF2t8GuT{DT8&Q1ZZp;j1e-T%&KixzTIuC& z!0J`(vxi|Z!Ky=dVkY6vj_K6PPlU>(OYrn{dO`-ss9C= zi+xKCju-g`9n5DN!pgPSoNvTa4ZoYpGrnf7&QE_0|EdrU6o_WM?CLp8F~P^rPh&f0 zB8o(j4&Mxo6{Uil3K+xWzQ0@~tx-xk#zCKa6^$B;s(`r(c8d1?}zKQJ- zSCt@5O|ES8c$lz-+V*kWO~hUygEdC)Pk@e`sGIp$Yz}A5O-|=%GhNXgs~2Vlx8rWY zR-yt*t`%3u>_~J{(!55ovyh|AkfO=e6VnkrIrnpH4_1R-vY7DpV)iJjb!VpTQ|!fV zoyZEgAds!G%>=!Sxzeq{6i|s6#8frVr)#lLaq$EA`hl-NGjzi1w?=G^Qc}{-VK#QF zyKX2`wOThuG44jgmzu_&*6Q{$B|GP*by{!FnUS_m;(kol1VeVhJwjV`xUF@1i~bXMf-gtA@RI!VJp7g zY)WbgCKXE5sw5v`#92%{Z#4!PkxCi0My=b?54k1P9k?4N>Fzmug@%uCW^0L}>U!Lb zE|7z7EHNS!+FY6|r>80)DnqC&R#G$o_&sR0=5@A6vzR`BuP4evo(#I&{$QmS%$u|G z&*JV0ud9*gbE%F*M8s--@++gu*?y(cAxb93%9hNvTsgJ*pRv8;HF_uml}$S=IUyV- zH25j7ZEJGShVLXg41(d-c0fOk-y+-MIt79gN*2kJGSr&H>=E2iGw7-jjg$*KgHZN5 z4GU+F#=|zu7JE@-%N{OxP^)EJkT+RmmqfDDW zHL!Ynpm`$k32oHe4S9;>{wqcUu$mi*6dAV~nvBFdGaRvhWi(!!r4uc;j9fBlX>n;L zvk%WXyN*v-$!I^Ei10~WyqwfYl?Ml_{uIWkxZCi*i zmXcu))0)<&OiQQ@XP;?#wG`bKfjxp+7}TS!lNK(5>v zO!-QtJ?G%jTU?C<5y-h+jwtO*SaZ9t8QJZ6*Ynghr6%(8xdFnkQpob1I=!F$0fL%Vle=E0GURq zYz>>K!nOo9OT9?0%B8|4KEj6s!o(Kbixh)m$gQDvtA5*;@p#rVAZJucH))qIMW#9)oz`Wqh6iP4b~ElL#R&vaYxqJ1LrH6^QnNVF zwsW3bg38!PiLJHLDT}!MFZlXIzg?%2CbKV6iTYDrX6FR9$J>oInWyYb*kP&kO45$= z@OZ}9s#T-z2NrucS25CBkIiT0V%m;{n)wXwCs@$>s5Vv7*+82xk_* z6U{u&R9$*{*L$$t-lySIFVra1eGyx@%xIL^pqIi0is&bSMm}E7#p&Hk_VX#zwmwB!1jVoLJ0dDNx~ei8_Bs}V7sLeu#we9(4S2u_0@!K`*HM;|MG~sG zI(qc2J^1zXBhz1+{s;)ub*8VJwohL)y>nVM^~+vAFQ{)*uc_ zEq~hb<1P1Z`P@jYPTUeAYyNP}meFSub;FL4*vzI)qvuQ|sw6>`V{F^TS!=#bWF$;)V;Jb3zcwZ1S%eL#vCEoq#H#w-ax?4w$mhUtQGSR zeUi>!DZffr^n@=FF=wKcGRx4H(xYih#q&Pkw=w%o*?6zzO_MHsc|6@nlT;MGLk7KM zn73uzI^}x5!{_v9a|y&bbE|mEcZi2^S(i!jP$)3GpVcheECD)#T`X+QiAXp@{J@N z%-OOT{k!nviMosKLO9aY>Z@c|EFM`NeY;Unorz8)o$VG;Dp$(l1xhDWktWDsv`#pS zfq==V$LdT}B$5t7)k(WRiDGfUQn~ps{)0%M;v>Z{E13#hzaxm-|3k4m-8u-8t%-`( z94BH%EA}N+#9ZzYg1`&*3=^>S>C5o<1{Kj68niJiaNQQvO4p3%<5-dkXPg;2Dq8$5 z&K6|A9mBRhAU0d5aMa*}3i5&_=*>DDd`8dX9|p3;l>Eb;oVJ%R)`<%j6}zz-B#VYn zE9c~jH9PsrORzoE>muMy{QMk&MZBl^y5mq3Zk*< z;weMet#kjqVz$~qfS+b(xt9UfQXrw~;EuDO+ZjWW!IX|J;LooouHj`<|;_zDp z!edqJfuN2k=?h_d!_&4lXxG1h9Xrz(Fz4^r^=v0a7|TKUzVmQeJ-Or8_=W?$QY+}~Sb!5U zt!0YtC-CKgY=a^O?Jyhgb1ffD@$%;fFIT#WfI5An;+9NQ zBTF(?<*@}qehcmQ7Mh^?NAWts@kOP3UzwzxX?xA*)#(jJ!9G;%o_dPT*u^TXkJO5T zer~6v^sjH_YNo6;U9cE=sMW%84;9dX)>x3q3ndWnY%uJnm2LH!a!>A zHw5L^CkcvccO02wtJJR&m;VKOJim@h>!ay`$k)kAR%d?>cjK$3IRc81970sP7^>k9E_KmN+6ycM3MDOf5{oec7$;#u#+ z{dg;>It^u#wqh^hwS@Ss2F319^@+4I=1$k(%dsg1lttvV^B|XyOr#63Op9>oBlt^= z8h9=3KGY(GI|UQdPiBPOpT`|}IxM8soHjq_CQuf4&{H=t5&1zPbHSAe!q0yTHP za(%*?A&RWo>+aN&oS)D`#_A$i?5=9qPx_tkHC6$a+8*pwbU0mQ$!PLboE?2L(f5(B zxD9vX3V7^9Oy|k4S$8Gx(I3F+0?Orcc|gh4C7S$cDd?NMOzGXOmB0n`{I0OmrE95` zt;o?WgK%2I$MOZpL3NnD%G-5_1CT<~*R_p&kgStj`Us99DMzxEBJGt_+tDU$JV77% z8y=1$o(Pkd5^Wz5sTB0NU}oVm<$7l=N<|4s7?{d&Yn*m` z6pzzkmO-SfFEVJ_@|`M8Ny_!6Zk!AVRw$!R>MH3X^RK7uZjp`$h_20V$P~K8E%-|n z2-eF^qUuU|U7+;bk&1iDxPN=ukoVe>MMIaX$C>n{4cv|09Uw`nTuMUmjLzC3JdZ#c zM1CuF6XE8{He07iitEK7-?SSVd9Sh~ z+i1~DhP2gIr;w?+L_PB#%JnpxC;M6^YO^;B#bo-`ijTDR20cBQOeV6?el=gGsAZhI zqpS@_pYkNFLN-5eD$VJuil zSu@Tq&~Zi^Va6393D3Xb;aC&38r7oX6+?O;c?)Th#aUm<8ur`hrq^C9#9dsnlMmtK zI%PEmQY7Ill*5$1YUyW9e~&w2yWI*|=eeLMSrg3mj8XAcYzb0chDeub@HLy$UReE@ za=p~i6IMqsnPiJDI>@jqyYYRo1xLm2Ox0rHtXs;H=YMC@rcLO8XXzn1&oVvW9lZdR z4Oru$WZYIONUO?X<&6z3X!3f@y_6%-ucXLVA>FPldl1_*<+PRV z0#SRwP}k}8^o47RU4qjAG2Li4bp^ADC8qbEvNyt1TpYlQ=Hd*K7gc#Y-b@%o_yGM- zcL(DxR=;{wx!z;7Q4y~>QE*f(kk_Vgnu`k3k8SQd}%X3T>M$F4P)Eb8h-qN;ly^nKoD4#=euuSu27?3CB{Pk{0Y3nG4ah{suY+(zjwMUx;|G*uv zM9KY%_++v}=Sb3{g;bW-Q#M|H3+^Y`Zd!#xxZvryI()3@aUOoS=2~KtW>|-(rr>)w1o#R+- z_SJ96j=(Q8TViv~PE8xMrn_A`I_uqleOYfr$0wdYD3>L!4sUq33{mzUs{-Hzm+Y9e zDPNCHHeA^@oIVmp9=%5d0Ku3UJtKNfQ+KTl7bF=g?LAfodbb-xLqTLvesP3s+TVCC&p z;em~tN8CONVkTWz`}akTLOrU2vmSp#P`gw=(~BEw8|ojcfITk+xMDy%_j6EM1W1%f zr~s;VJ#>BxaBv&9BF)3Z%LLqfpsn7rT1o=dl27uH0O@M6{ORN~2?a(DvP9(v6i zCS}IO+5x=~4YlmHia%}*_G~%idlz`4^;W2<0-g@28s9nm%Dcdw?QtCIKnIzTS9O;J zyXfNt_z-}e^60A{K-ZcUvgJv+NLwr6 z@YC{x-+{jT4>FE#tPS{2$q~ui@^IySP-+2wv3c4rj<3Z$`pqq8TA~==cohPCBhYv> z0Az_tv&Z1WDfIu|18;21iU3rs#{kPC?*-2Ro>ivH#-6pnSj&Ejij{be*!0E;J-X%u zjAGm@bK0CM*Z6Knnrl~oiEA@dw~t_w?b9xnk7vsS9SFDjfqu)=@ud-aD|9w)MqmAv zbjk3JTh#&8%B;!{nELs`B0Kxu>2FLvH}MLUU!FV$m^}Wq%`i@-05zP?WeC865D~to zPv`RJ;qSw(me-rniFf<~s>@7^d!Y7Io;&_E6});}ryuR)n?=fNA#6c=q$eu@JpprP zz4f#Z(4OI!o`AUnrN?WVU=XNy5%w90g>2zm+>YO*%UY2_mV!N{HMK#$xBThdq?`YQD{rFLEW1^MB`kG=6U zT(_-Hq#K=%l#@Kkc!4#bAAcSm@0e9))H*T@4`r-x^cYb2Dmz%0Gp8+7UYn52x+qk* zpy0Q_Z`SVyzd6B4;|B#s&JLj4ew6fq zFeSR`ZrM-X5184FFG0a$)Bh`r`RK;?JTStbN+1;oa*`vacykfRUwSeY71bVA?>J~6 zh!>Hd07vo$*P_&Y6&L#2183Y4_kJ6;#BtA+Mh|{_1BV91#*tHq)RPZFozOcs%|0q|_t>`%Qr$gul-O8@v>c7h|zGrRfbO+&XwHMWbAadT4 z^!4L8wE0o!V7(PU;NXf*k)v%LHXa?7AFfS;E5iOYQmS~OgxSD5^SP3%TZ5SMad=qc zW^|Kv`Mg{H9r)FrdR%Q&?U5O5v5zk}!|^yNdUR4X+|kx@B-Hl9^B6ND)e{ayo9aW4 z$eU_(ZT_?;3N^$2B9Rf|q@YXN^jaOV{uRbBZU%0w)Fs1{e}w>l|8<5nnW$Jn>1V^; z2GQvY*+d~z4#!jSj5?&Qtv4g$+zWtKVr3Fl{}aduo<8?07o+Rv=5fXEZ~ql`MZ?<6 z={}=PvFadF%}mMdwFz{AMt3{}eU6#YftyPs7Rg=chWEbl2zvUFrCp;6V%@{){Ys(j zVAK39vtOV7?bLyZfNHQrE`r?RhbD4Raphgpz}v)emZ5ENcSwJ=$>+-5Y=%bHJ_B!a zy%i$DE)Wi;cdZV8`;7b$y=y>TtIVfBLX7!HqrDaIw`0wmrGUQmM;P#!`Q690P++@# z%j(ehCwYtWtpPdJsao)qlL?aUKwnGMy|s3uh@!uR9!l%YAT;%TU8Hpe~_o8Z%t+e#*ZV)$D;&M zXhnEa%)xmwdUWn{(8stLU2~`dVdvL&?i{}NIk=xa&NZ137=MfFf>gZ)q~l_zV6(Mi z=&RpQucCK6uU0RuZ$ZxpURWfbGEB>DE>14|YT=QEFE4y-;l_pTiw^&PIsef7UGuli zug%xzxq0*a`2f7fhyQoXy?^fLTyZWscj*Xr|J>{kXYZT+^z6H5-!z+@_0H;M_s>qx z{AT9SnSJ-ne0=7nnchr##x+C2>Hp;PuSSReA65Ti`g(NjjlVl*@Z-t*CqFm&zR9DL z#mVU8rIUvyw@f@Y@xzJxloS5kgnz;?arVUQ=4UrQ2C)85ZvOkt{mtpkuFd4;-J3V7 zo>F~Jb(iYHs=re;RadAVg2VmeaJb)4LrsGE)#@Efe_i_d(t}IGr4KH>eW|*XSh{@a zmDYYf6;91uDW`u17MfuDOfijfJH@oYOhr41h~C=LS?&0Ik0#vUf>~p}R(|oH;=gQh z9x2x-i4l%hpxCsw@1w{>F5j#=YL-w(y0kS)G|}1`O_O9*=;vKYJI&IsgWrVHK(JFG zB5CtmWvnV$7PkG*XfU)^>cJ;ILlkX3htb!`8vdZzc_7HQ2V4=c*pF7DV({M;`+D*} z!=#eS?RPwI{w6@$C?q+GdgG?7O&bskg2f5&Ixn%~eTuzY%>&fi+Dx-SFJ}=g zpTb9Ky#iYx+!k%GXRzr@jB*6gV`-7-kt~z7*P_0(j_%+@U$+=Y3cYU5Uv5ZXz{HxtaG)(lOX;ahU;3Hw${w<{+Rw_{aLN3ac+(H*l z;+4zI?G~AAvAkPk41i|5@PpXi5vvB8fDeL5!`>_l!s4yCn@-luii3K+W_9!&Y&iRWjLLXn(F+?sKV5(2>tz7!T-OA+v?I&noxfF?+gW0Muk1^3y+g$+=3!5S!>t*m3t^4uq zwvF*JN7|zC0_kw1=!+twUItX#NT(^P;MJQWzN{~nJE%YcS{)M{?)P0mb0eV5C#3}? zSKcaT%d{wF!{(q~_)y%fc zRHtF-m@MhGx0{>AxG$;+2VjI(NB;;9zh38JR9G71g&=L#+QY9=&LQiGaDe1f2DVslxow>80-thyG-Xfq z`3%$$b&6q0r9d+3HdmJsWKil&>D+$)r0!n##kBusJ2*_YBDyN#TtvB#)&bPhoq zE=4j;Q2F%dP;1N4o^NHW_*#HRv$Iv%gaqC?dF})X3}qO z6sQBr%rDm*PD;?nSvVqevCixzcPp2d_@t>4_ERl4Hvr}ihQ-~N86h*2{La| z&fFl^Un9(H##K%+?v%Z_0#kE@Mk-}WJ}TtsL)j8j36`bM`<0GBOpz3#4ZGKx&~{DP zMV(^z^r3ng(DB+@HIgw~sC=Gg(ndV!rI!#rG zfG0cC#dfKcC+JA4=uCF1p<21<`=w$}6#G;z<1S}x{+N|AY`+W7aw+QPx=tcT=&H4j zu;WY0)t)3pn;Yp;os)8btT5YFp1-6s)ae)r)E3no4df8c`;|Y?It--QOfhCkXV$aC zx&MvrA{>&Cw2;>`aO&xjgqX5Ti{7?{t`e0-fNiwAeIujHbJ3m3(@a3$PDLo%j8ib1xP4JdI*!OE~iza@1e{YY8cH-tyHO$$}9_>*KK4f2rYfvsy! zXRYs1e!x&F({;1n#)Psp5EwuBB(~?1Ee}!9rk(LnukUA4=U`|xl@Ap_wj1=XV|9JS zLm&FQa=E|ZCX8Y=ShZ)Fu2$Il0eo9|dme%kD-#lRzN)0xe**yBG8Q4130Ne;D*z)S z*U%b`C-CLDq%&Wu*qTZ+fvhfS zq-SvyN##s7p7d4Nf-Pgnd$QCK1sj+%8f#Q>5HqB#6*B1vGSRDWM?$Rb1Povb4puE? zJ1MMgSM0W`k7CVKoDcdfrmo(pJbl3&s6qi_LYr+D-2JkoRc3==YGz^irU@Ux=<8hi za21bVVDj;*i7HmC{aA6}Ebd6*{FFcVIsX=Ae!?MhCTAgwv7ko?ymU8k$Z6 zgHTbVv}D#}58B8XT*E`tK`X$L{D~M@5(-s17*c-L>S&Nr!O@CTGZDX))?mOJO~s;Z zDqiurV}-PVFJ{AbJRIPrZ1b+`#_PF|`Sj@&m3u5A@_%NT@v_vmnJ^$X>+f~f;LzDkKu`K6g&W5~F zbZr&B(y_KG5oC=G!a?}kA<+huhEg9@JZFq;mn){PM?!&yHBSJn`UFr zO*#O|moA$fWwQbO?jWQN#>_|+zEq*k--MyD!uLdFOSnU)u?P-WutWwyiO}O)fL`yCrXnK;?N2WWvXcBfjNHZbr)m&O3Z$Q3HJIu9mf)qIwP?;^Gov1CXa1 zm*7vv&FHvG?;8T4FeH1fBiB}7h*+b`*N$Y2M5$E|73-4SC8459b7*P36&-&XgcN{! zeFyr@AKq~>y7a9IS>IEeA-UpM+Xk-G*^S4YmXYZbwP?cpb1bXt<#n(WJMuFmJ?e&1CYB0pj zsSK0!3FtltEROY7bmGaMosX_UliP=kQv*^D$u-b`QBEw#GO15dDLtPEr|AIMO{3Lw zU_FeR(TN|OHNx_28NU4-O;EK5*w>UEJRo&qAAiHOlGs z__Ve~dU)V#PM1l}o&n>EpHe zbjK)rj6>=%D>|`u=#t@s7ic^x&1ff+smyL)+_(9T`L`mCR+C&Ff2(Qvv8k8&Jr19VopVBkF1c6} z1tLUHb&c4-#}>i41a$yyqB&p{Lm$5weD8*>=*BxQdYO!67r}!-dyZ(ftcuVzYnH$h zgYODbu+j8=b~r$VrF3ZPOB>Pgn;+bzxUeHMI;8QT*{B9i z-r)uL?Z6<-0?%{A3Y3?@PBIegqYI+2hn%4mnSRDz^s*)^`d|!x1jPE_-J2+H9EeIm z+?I>mK&ue=(Y=H~7zU~aPJBCvL8{gIr` z3shDSmB?K40arMezNbphG7CW~F+BgS^4*69JsL8rum6h%j0Kpzv~NsgJ( z@eivM@sFL79Ju<|WC<{Q_AQZGy^-LBv>44LdX2DvZgW8wV`g+s@aKoo3;F;nZn+=t z8qfnOXSWS!N+(i8&}8rE`D!glqoxOf^f5E4eeaynVe{_c&pjH8YPT$*h1pBTrhf=M zWjn*7coA{m6?WK0_6FC^gE;&Rqdmw88i8H95($erV=CA8B1aj9F=mxHgth4Dy(?RW zca}Ad(OLYtFcN$gU#OFYFo2ul?oKojFS%0k1lVyF4I=d~+Lp(!0?gfG=L1^mRVyQH z($S9p85`{Q^qMTzg-P$I@kA49Sm0@onL$S(HvXM}s(<&9JJGYOWu(TL zv6L)Vvlc_NfQZ)nwxKJp)-0>X+R*Xm1Bz_o-B*vkj@)YmycG;yjAXqaWY%QY4ds?)D$GF zovf4(w^B&RK%6~pMo;!NhlXFtXkH8Ik!u&g@8?Fy9j26uiV3s5Y{{2xC7%)XitzjE zt!UYxJ`CC;JBGh3%0KU1dlmdVMxplN2A_?{`gG}xJ|0XGd1T1K@)$FNSQlV+M)3ZR zW;K_eqFcXW)BGD|KQ{g7qI>DQsfh`#>I!+z$dvwpwTn-`sGJZt8|bbiS?zi#<8c;H z@WU|1^=71vg9OZjAD-Dg{Q8GApcK+cW=jsTm#FtlV!Ky{c?^HGf{Y)5nKssjws_`G|a%fi>pz5X`YqQU{gP9d|e8=c{!dr5fOG$IYnr+~kqr_Zk|Tj7rkMpX13& zYTE^ZjJQAyn)BG>MHJi#lm07x%~thT6EZapE0CalZ@{AfH6mrkawQ39c$|Ry^!2l> zuR)^6x-i|w%t*ClA0bC~4c$Er=#^5Z#}OBTkmPq)O$}SN;B;{`GF=S=x$%t<2amU* z6RsJ+)ySHozj~v*{J1p$)GKIRW6$U$NmsKMivb^&rd_*KOMJ zxy8MkZ%0dS)&ziEIQ>E-6_B(Yw^kbs1kzMGnn$Jw;GN&_X3g@Fc3l&C=6=&Diecee zO#sRTfc9D`7Z|$@xV!INdxpDHBL2INLYf1_mrH&&RKhI9P&yFFLy#jgf5RXS8}zU* zzDOu&Y^5cE!i&H|ai`O93f;5Q_;yte& z*o5JbQ07+lvyiCx#G2;Nj*S~JC-2MoAVPcJA;*{{KxamP7?kx=xJtp=1ywot*m(zp za~rmz<%gNqpdUR82-0u7Lvtns>ArWut&i>ZUb)v5^pkgjHyLXhg#wC{-W@k+Jhxn~ znch0s1ZcP4O}%2tF@N)7Wx}T#$evEdySdlQr#FK_uF5vzOpmmrn|7gLL?`bAUpi(* zPd>H(F#2qGW#{nRFKA=|hBa9L3~y?!yx8;;Ho@*R$9YqyXq3mf1MNEr8HMpS^w9Tx z=c9jmVqxpBdlFn0V9jK~EF1{d(p5<46CIu+>`@~1AC&y zYxU6RW1obFF=j@`-!bt5Ol@Vj`cL3A_r}*Qdm&S_Zry`R_~S=qKeNs{@&+#o0t+9L zGd0mQ5JXcF5gY?ada_b%3Smdi?BRj)SoSR3KWjAVu{LD7EjJQ^+daJVpCJ_7cOAV3 z7;GiwW3Ou+2`5lswcY8Axn@8&ABW+rx1z5e-wNUN^qVG8;18O=i~_&yAJ&}0PR2J) zT(o3cylMVZv)@w1r++;8S9va71{vf_lGApof?hn}k!y?YLvt*o-@9m*Md_nNFRg~NolwdL)S#kAHDF=cCP(16}@7rc!zGrH+(OD_n7 zY#aXWE|{NtuUd1#s4$bg))n+qfn2U;mx6FOEu!e-;91A4$TatQ@9^Iqhs|qWdQFxe z!_unZ29-7vaW0;1G$@C^WI)CzU|NlvF%A9~o{<0ix~tagr+>T`^N?Hs;0m2?HQWpd zD10~k_?Q(vlb`kt|LtxK=%1R|d_^KMbc)C_QblMAfa909{V}urCqSeBWjVsUj#!g5 z!Y&!@aR8Gr#bPO*ZZzAH$1w850B2rjMYZiJ2y=hXoJ6-ixn(Q*+X>AtM{j)Tb_n(L zYb@M8rU2Jlvb=|M)mv$OKU{XUDCD{w#y@6;qNDx`fXijH?^&h4|96Mx6vcIBMD;&^ z?yP>=JQ>`S*^E**x;*G#Jm|B!B#wKu_sk_}ts*Qk2SyFV6I%3+~s<0rh_rP7G|KKkfz56_?0?6f69{FL!!y$HuM0 zYaaW}O)9kW0nIWo(=X=%^I>f+^-&&>-e z%j~D8hs1wdE*O0ZKpOH?1Y9lUX+lq!sue>x*sB!KFa8x4BsXS8ra%18E3qc%>mHG} zNN#N;4mJAXIm5)>|M12W8*d9E!RV_W#-|9N6sDX3xY@E(B6;9HGD}Y0?kk{IKLks1 z%nX#_hm|vcTOWd*1@@=V>HWzh`l4PTo-tSpT6a98L#FPBx1oFg2;T-{P3S~mmvRFWdw~X&BjX#bK5&Wk!06M{C z$`XFQ=`vDN&B%1UJ6@h_2|fh)m3-rH{E;M+S}p?G&$1j;$=QR`fF8Q+SK#9|Y=w--PB;46ug;ih z-TP~}@A26?n%UdYPk*h^ykur8>DH6K0e5z66X+F|r-=X0*mpolR#j_vb7}D*`60? zMy*LFBb(Y(O;;lAzK{&DbK-e)-hvpcVe8w_)xW%8AG&Ja#|Do)GBnq{e?iQ}3pfvP zCFQW{UryKUQc@<t`wlTE-r++~!;OF2$Afv7 ziz0lvoL;IhMw$eAVh{#((;HwU5Vj$x6mWVMiVmJD+G#q(6<ovy0b-?>p zLX52(o$v}A837eNeE9odx)qIVLD#;*tGV4*XOG)SAL0t!se7Et@wB^TDQ1~KCn1;X zWa!H;fxf(+3MHVAZm9B{@-m3Fz#%{PZ9Q(zGT=+n#j4sCsw&J?eF~jF3@32;El}eH zZRn`@J3ZUOj_xyWaehha5LcfL$7Tf0L@P*S*r1h)+B?N8I{Uw8x1bAOo}HNyG@+ZL zZ*HjG{qgU;v3b_UmNrJ!ETL^tCRtst@#i5!kCP6ew_$98Hn0p|yo8>e{M`0#_ieZd zMp^7;V$t;R^B%5lD`YbB#th+-@ymH>zxchDbN?-amx<81gJS2N{6{{ts&3gkp{A`9 zgFp^=UI!RBX<*?13&VAni9re3u(5lT{Ncw$X#b`>+ZBv7Z8V!=+py9Bbv)^DEP2H|ZShEZ{73s=RS1V{%XRE+|q z%B~BiK*`JDE%w7v@ywet(h0L$Q26Ob(nMN1eGl9jm{Srir_ z-bt}|(}q3Jv0vx-Vol$f6u(yp$F3>ykzLl0K#u=M_w-ad!4AZ`6EYgtZ`$6*ljv5WJS;*`xHZC=KEQIvKlcl1t5fZ+X)>usG8n3| zoY2|4Kog30n9Q_-PDuRc`_@atK@0FFRF@2y&_7GI>9MY2ue#i?~vNJ{N4aTfAT z-CH)n--C^xtHZ~q#j4VwD3xzUoL()H4}0X?r!3Cq1Y|^9mWA@=Tlyv4e~B@VbJutj zoF=oB@Jns=qN?gD253AT&u@k45VWD2@7dM!H*D@|wu!-l%vGYpmyAJO$gqSl?6+v; z?PdZd6>co>w5}&3(GO08%j)3t=I&4D#E=2JSo#Jy=-39T!=~E}qh0S#D@b8Ca2F?=2!SJDkLRp?e@NPZW z?5X!bbG==p-O(Bu$%Cb)okf+iV1xoPI`%NRh%S0%W^4BkXNfs~o#PN!Yzq%jM<%Ki zod!Uwu*Rt@gTGF+54O&KoDDKl*oLm&L!Nl#%}uZe&+hF($04Y;#WQLKT{=jh>Dc0S zt&fG2S#;VW3`Rgk7v1r303DLeZ|UB+$gP|6P;za?^IDt9L!}By7Xzk$moA6L^8AS~ z7GWED*aZbqZ=wdaboD2}SMA`6cHvLT)e0Rz?(+g(Ufj+q+%(5#aYjH!Eb~|1{ZQG* ztvuA`;#ZzFs|yv%5op^ZO1W7Y=f`owZn1cJeH#?m&cVH|p4`@bV>fpctcReO8o!mT zx@gI%QjxkS6jhNKmH2Buc8XXswXOw;?$GbU?uQpn;pW6~D7yABaZ7=fku{T5AF5VO z-cS^)DEGgQyVC@1$hFO~gdVCwe(?5_#oE=q^o73hZ;k$CWap4&pfzn0ePOa!KJLn% z3@O78VJm1t=ay$_W5HT4`{{PWkU%!Oc<-!`jBb8*59kV)Z`;v*$PU-kF4#=~*Thdf znKw5YbjA~K1kC{IO`sdk5O3Nomk}yC@o#&8_Fdi7`@Yh%^KR*WK*b3q+aY+?@Y86j zH)S!RRFK3W2Wzm!%I9JZGS)5)^MdFjb^6$dibKTi9 zxet;Z`ZvgyLX)f3sZPvaF*?ALnp2`bs>OR}1Y{)6?pW-;UnA}p^$c!tt(fzzbGT#J zx9*4;S~=2dt<;;kK)T||q0bO-W&~vPWameVx4uS*F_&GGcwsXRsQzi+v~Ke95oV}9 zaLf3UV_Un@7q$1p4znHVtj&GVn3DsBsaxsDMHL!jGJ|aAiTBJ3$%y!D{}TGvz~*h; zZ=J_!>~Pg_P(b)_I~@s^6NZna5UF9A=f@GHGFRCw(jG4u}dTl zmKw%9rDz0QseDJn7$82)2%jh*gUi9gn++Z+Z=Uad*2o=e%b_}q09)(Z7HLx!FqNEY zPqFQbMmaX~Xe%S0onGIB4n(h8Ld9#(9YXv2;i9TB+}4&I;=q-##&42W;#smrR7gj~ z5@M7}^g9;}NkB%sf2dtV&Nn|agwAq{-|8*kd7j<^w$>IOFx%v>OSVbS7a_MLKq8 z1~tzCJ_0gQfA54P^w-Dcws!w~4xHn`@o$Rm=3yF};&m;qZ>I9lf0Q6$!=w`6B=?7c^zjNo|k{>#69a z=TBHf2ioF)_4dLSI^uFAVneiJs&>@5k_Y@HcbGb0(OCuHcp zFwB;Kj1FA$i^cBT2Ulg+ndgWXj+`%UZ^>}gaRI=sqk;0RuC@(q#$Xgmp#u@|7If?R z;^|Er_CNc z6S=~-Q0tuYY;#C)fEt%WiG&!!_%~{WIJ!Oix>r3eF2SQQ|B>a@XDmb^c0xTfToTN1 zT#0TQZSOE`6i$gDWPan;uJ~mo#9e;i(b>`67p^{J9pGmMGkP0r{T=Xa!~YBv&;%F^ zO9lqDVJrGu<3IR8p&dCf#I8cEO)nIoG&1mlg;fiF4xXr26SEV8D1Lwmf`5D73*ZFaiw#?O@5STdvS{1*gMGsTxAl$Khdw-Q zoV;@2wz1)XqoUXP_9JjDp4dP7X!q!$y@>%(lUIgetKw_N8+XO^M8un}(B(h{^1#uq z3Y;h*86wxuJMl>5xGmkQDsXkd{kOs)<>04{GfT1wqFwITyy-&5T~H!h33v#}@H|p3 zp~s`!Hgz8;ak>Y+(huSR-xzsYnlU!(q&6c<7-JOzy-@}6u%3$8#rr|)c;t&iC|Ki< z^@r-*eX+vf+u#d7?q^H{-3~OPDKb>CvN=?0!r2p$k^0sbmX5q|+aUUJQ~YL6+Pv5j zFLXueZ}b@c zewhz7$B_jB$VuO+A?7oy0;Fz1Y~sV2qXkuHMB5@Bn|#EWlixy53hBs z?~*=P-7ChQ8rwF)4t;UpZ~dyiOSlzIFI+;dY=YlXY?FaVlNRKWDD5Cr<{1X3M`qO2j7>*|me-2av?7`)dNQC}xZZyWwK5NkvE9s9&8bqf zHLWM3aY}F1vJjgCikW~6BIL!zBVT^sAbQ~<{yv_%SPXW-mASPwcd2tZL!PD-!C=H3 zQ^?SVE`v2+PesSfUVw@F&x1qgmzVLA@#aTi&1EYbj168R2vmhq0**pbA#WtKvPc9m z7sI>?$mqbq5EqO%H-v7zm><&*F6nI_4!}myy9u0yK)6b^iw+IVYE`2T#{fI_t0(p*(sug$6&uZNK$oxS({PhX2+zgw9+M zPov^T#DDGWnU5TV@yJ&=^do#TwX}4oNGQT;o4FRYQJpBd{V*)!yU5*RhsBHtoqT0) zJRJ5B9#1i+A?#E&88MhFxxBudMT*N|JOVO$>5mc+_?NFa64u`iT|0<&UCOW2{>#Lx5f8uV1HI=e(Qn3oF}7>O zHgv(jSGbG#+ad@n5d$)wC8cqbZlgBsb1JOzRt{ZvJM4w^WOUIppIPd@csp1Vc3M^- zL4`*#YPYos59K#y^zL+;iDc0H-7q`>6+L`Cyf|)pd2tAxZ`?kQF1uU&c5lkRd=E^y zZ3U8o4widrUW#!vG=$pe02qCP)8dVwp>M#H3CQT^P6{^WYa>vG`VVuPZf$&ne>~i9 zAMmrT>;Qhn9zT^LL*+8Hqw)I1%ms96wR|&vWvOT;cLau}zZ)P^#Kl9XZ+!@5x54g8+f*VsV~O~M>nTOauL^f z0u+9CIzXAU&V03+V|ASrYCjG0C?KN)SH@06KYN;2M_>PCZyLEMdCWy`Na_ltU*=W< z+>XzkAQAm57_yKI_nv66d&RF-m*cCy202Kq>;*X}+ok|ft(p`+uUn?v2-isxs9EjRx+ zTKdBO;kW71Grhfa!Wy4auvq}FV;SHGs^*k8$D+tHFed^sI+hs)qZ@fHTy)Q@UUa|1 zi^(O$;hD+AlQBEtH^j=(9AFvAmFQ3R051U<9S#3+5&h)$FAO8YS9yV)`Wj4*Y~^^E z9Ly@I4d!YMz?7mrK^qGXkI#J#1jBkN_wLw-p4fEeFdDj--(gE#kc5}eE61%}H}ROX zPAIc7I_>m_WnLQn@;>0So(gs^*CN`#qaVVyesj(sQhk&E#?bvRF7wI)aKq4Pb(RYI zL+wD;O&FmA!xZ$GoO`|LyF%SBLCUM~%iZU~t)=WSg66sWJ@ zIhAr8z^SugD_p8sh4P9fIkkosME#$oNwr?-e^X4 zkE|;C_KrDi&-fwb*PQ}i2?Qd!TJS{_3V$CsZrIut-E#*7&3xcd@$l~9)sfjVp=PK9 z*xUg8Y10`15FC70Bs>@_kHLfCJzBdr%Xb1Nn4b}}@FURA!6}piC~@wQ(18;3kOT!@ zFkKcj{l~>yP9Wcz0li^Y^z3c1wX|gJeKzwr$2ITIh4Nw80l8cVT>b#n4GGrZMh331 zejB!S!I2C@d-EsaiT5w|O*50%j{kOSujsXrbl>98T?3B+;KS;Fm)KXhJOgYBmBx+L z8j*BKD+Z?8GV5aKmFMAD3dl$lkoEMW&E43aLFDXmtZ=yk_`LwNPIM{~aCR)sK-3d7)i5xwO9(_*y24?oB zKZ10jSGc4r{OqV(tg;qi&^fXRk1v~Uf;@Nvv|<4n-F(4$`_PL|i2sGz%>T5<=A< z-o;~x-VD2U{K3%|Ca)UVK4coGiEie!!pmXB9V-g>ExhSGT92v@2qeyekqARHP!?I^ z3yU)XGJr~+zIfzQo3?cyj4!~RbFRpN1GZl|a*nc%s^-Glpd~~Z>?~?UfrEgIM0-98 zYWX?r2s{%u&vjpja(wJ7TowpEL2M_jj8k++9j>MG0Y_Gj7Lp5lXN6?+Qd=^h|Shn}y2QRHTBk=v5|}68$x`0O>;OsOajQ=Pjc4b6}V|KMjN6 z=HuTPSgDA-(xI(PD{gXFOZ8G3U6X^a5s*>&<|jE^*zMh+`~n2ffhZu>KBSVCm(z6B z6!O_asxqxdmKQ;17EnQ#Ff1OK*s`_zz>8qd0W}3`|@msaw=^_CA#eouB&mzxA*sC2kq()Jh8dHn7TpdVIm0HR{^A@cviYJcO?Lzv4IXyx#pX$Q1bsmr{VWv6>>H^-wBr!4b|e zW?L?fzWfS&?s_uV{!$<@e>*dXMqgbOzo)(ipL_bsS@5}3Pdp`*W}A!ve_Dr*k)@6g z-T4-Lu8<0#wJ_u8q_;s^rB}Gr0xWN(29q>O`TY)Swv_8Q5^2=>8+??246=K2@zy8* zCKloE`NvD}J&F|-u)$Y=Jznyvh>kDk$Xg-}qd$fI@-naykTH<%O&5Cyk@@edvb*#O zd=Rywgb%_)s-^w0v>|TGnvFGD56Norx4EfVN5yGszsr4jsQc}=;lm_9=d3v&8?lT( zJ=7lfg6QXCJ2?UP0Gu`3iV=p1Eo^4HvYI35f;yXUISe|;+ObVb7H0(HUaA!w_(Aly z^88%)foTbMW*sXA;DZHeBp)bHq^#OzoIVYkF(%P3M}d!kjLJ`g7@YZB{}B4|J>ZA7 zj!A4Hu{!TAgh-ZVJY>iob~8zI+c^BKfDCpYsNnOlgCpCzJ0~O#(X0z{+)BDqOy|&f ziWXR>4^2uIr`A!CsJm|;IzGK^TlX)MFlJaG)7lCZ1BSYfl7-t1ke4|rnM9u(kSxv$ z$xx7H(@BuL3p)GopoG7r_YFz7Tbc{M$4k_4Hdu;qWNod2zo0BeqUg90U?wC(1)--G zQENoPU(=r%?eWp9@yS$*@(Ar!BpPhM5{y^V=+7dU3jrA&wZ6K9wEe4W(gTtOc-yF9 z$Kcac2q)7TLSr^M+y-eIGPoi`z(qg>6Yn2RMBf@({d3A`Pkx(bBkr^7nX zZ3FrypeI1?7-+`_BocT#%u1$u1z6tQg$p0zwRd#BM8f$9d`$qM=s0wsAA?#32sR`b zziE!s-nk80L6zNp(&__ZUNQ^1F(jUnU?1(+AR5dDi2`~+*n!CV`n&|R*bQ4b+x6-r zVs=$k2OI%V)xkl~fu~Hz4H*Gh2sm{~0jfu`IJZF~I&j7hx4!EMF|+!F0DfSW=CCy& z&@5n2+cH@iK8OIQ9tmWWZPbdMHGE|Y|G1g{_qezqSjY&-=vxr#ma=&PMko)7ftKy? zf#J+XtvC@-@VY?@J0;^=bcS5m7?J|800b1nza8KTP8B3wfTi>AluXZW)C1ma=kOy# zGYhbAHpriVbVW!D05qlm(+(T;En6OD3;00Eg$-NLfkRLG`RCSK$4SN|PxOr#hN@5+ z;PAjLq9?|GI<|!qL0|8Q4*QzuNK-MhjCN8MZ(ac?T1*72@sfG;&G$*fGlDjx{(%P6 zhOZ2w2M0E7?e08T0veEY#RmHxi!(riXTwkf)0xYGIF^`m%5r0B>ntVl-&a|MZV$yKD?pBDs}mZVwsF+a~ZFrn&l=K zEFJ5}=-KVB?d#sRC=u~&e!m24WGj#w!K-CKd!;O+3(i!>3)#wTz;@fU4<=VgMn}JW z+`jIZZR|J^diHe5AiD8H$*!G>70cRpr6Vr6meR--l)lw=HRR}Xdn8LU0xEj)$;Ex> z{H_HoFMB1t*066;vTGX`J~0N^Dg7r+nB$rv_+F4EN808bQy95FR;SruczWv!Mm!*ZSDTIm0QuE0%G#$s*Ex+fOSE5 z<;Y@($rq5(&3B!(h;DqYe@FLQcG!#y@RH$zuCWFeskmElLhlG!i$xlMj-ZZ?9%f8P z2KVaHKJxt;es%S5I;{IF4 zQJRswhLw`b%y2ExEB}s{rUW>m=)C>FX+0J8_HjMG$S`_f|LTyQRrfZ7e{C~3b9HN! zh_%|j3goT<9x&Rjf$0&DA!6Z^prc>@{t?vHtlpj1YkQ;e!TMl*-xi3}&7r0;9}H>> zif9foMi|w4D%!1sa2(L~_lnRDOp@b4$%o)*etuechXqbWoz~k!GPki!p`UAEo`q!e z@Ua^qic%-x9}8Z6@A7p6AAE@$EE=jn=H2qDrKZmYYEkrv8Ah_6jP}1axOD3di-bQX z8mna83*oBqr@8&uS01`^;I)2r?}f1I66*>V@QH;~Al8YQ4GL0MEtI4UT7^D-4*be` zDmrlYVTiR`F${M9dX6N>y$rZ;SiB#!El)5=$mLWcM76AG0&NSy+zY7an7X-yY9R@4 zrTApH_qALIEdE-JQ`gjzu9By%$}55pB8+NIU?U(SF>~AEtv_q-XjA!A-m=?B`-_GuKnW*M>^#^E zLTdN=^CU*mndBK{n9)S#;KePr)cLB^9Ec@?DkG`PM||9C=bW_<)io2fy2|5#`cIui zw9TSZ-LP!ysi^#t5yJ8w;_N5qNv2VFBDo*^(k;0QAILjBy<_yjwPO^tHj*KNaVF~O zh$Wk66zH=)$=+EZ84-7%2J^S$%E2T4)g!ql0KBM`@Y*S0SyQ_NIayRgoAaa!i5&W~ z2j)*eMn~&A7LnS!s`Mp&l3mN=AX0A>8T)47cAoj@OnD|Wqn<%fJj?;lzkni>4Z;IY9U3?3c)*Z4pg%tIM8Bl!d91x$6L&8|1idG1?caNC&-#rrW6!BjnF*YZ3_xA6QNq$Q%X~Q zg*12KbNF|gS=K_eojxXQcjm&3O8G;c&bSL?)>d7X*)tU@U`~(VGPrb8>TnPd0LRrd zl8%Z(ehcp3Xz1g#!z49@a?+GXnlT*Y>G`ahEPBm#Z=&YtG&8OPJU!b{QD zhKO=tD;|C$QE`_|4W(59Pkxvng=|Za(0QrJw=ny<*_UWXQccPfZjjN~iA)azoUR+w%q*_m=;>wP?Mna?)yAQ*o)74-ZfZ#%TT{#4R;XzXWv0ndWy6Pu8ge}@i zlm0dYz@?X*Jb!~G?DMn%Q9W9eI-&eM~nIOSC>N0rvJziqH)7nS&TD@m7ywbkuu zvLRD=>D^z!{mT`*lC-A{Ei(at=Kuc;~q@-lZq{^}~7%mEgFBV*Fn z=^Py)hA{iGlTA|XvZA2v)Qn7SS$+ynx5pz{R?4PQH0)*h*3)^i)zqNWu2|jKCfhz% zk4sw9Wg_L)LRAkZVesXRkrOV*KU#_e+eA_?3(CC)Z!wY?#qi&B$yZDQR(IZ_jFM_) zJvV~E^68Rl+3O>7O_eENqL{2Ddpv)fK{+r`O{2op)OpKJf9%Xj`~$@fq^XshF?*g) zy9i%w9@oaEi?u|Pv`h6;Sw?Sd#$vuPzJGwM(=s@*QB%bbB4Vd-b#|c4PSF<*5Gk83 zv0Rol>YWBT{aL=j>Z(K8fLbx4kT;>$$Z7ofFEW&cGM7UZqslZGPREL+T1%tPnt8bHLZ;QA*+km!mZ{BbUbS->7mT3`8H1fF zszVHbp1MP{O2f;Ad@f<28}?+ur_AXK+0^l0!@rwPsTE|!smz#MPTQitR`pL{siA&?MV=ZSe+_1OEnvlU>cZzwo)q5 z32#moQ9DA-a{slsd$wpLDKD8VE!Ts^M#mhVT;v-P!7`C8);hF4=3wQ@9sI&)-RcN< zT@nqu8XSfsafXub?{X%{fXNwX5T1Hnuh@YBdi zGR`Q7jOLSke`#7v$Q{yPBv^`{gaP1H;JIw4EYlujFsIXy3x(lT`o)}UNa zn>ucWARQ^(Khd}NSF+f{+6s=~O5)an1l)9s2VMKMgPsDr{YR7%5Nj47*5V`tQ6 zBI=IkYw3A@;!?}1REsNi5n>ZYMboJ|{RWKbe-o6X{fnUN>$yd4mDd=a*jWxNjmDMs`(Dd zF307yHk%m#C+?q!m;#Z2KWu5F%N1+d*SBflbht7Tc72sd)`}KduCm7DoA}O}mV9&0mkDj#wNvrVnKkdtlg@^o#mMnM4y zl^Px(Igg6KB^&5yT&<+E{$M$nb#wqUdFzF^e^l>_QO)I`i>TKsC9)nnn@8=BWU^3- zfTp!UA6*KhBD?;D{~+S4HfV22>QxYpNZk~bJ%YbCqK?N2i#ijme0P^xO6G_{tL#rUI&}pv8CX-eMU(nW zGLiRGl4i>MZOmqw)yC>%(-sNEGcKh(o}q5%`K$Fos+n^Itp!qPhYDunJY7*Tkrt{b zOR38(TZ2?S#nYu)C+W{=%MqKFHR!TiUcvNmy_%pJa6L9lRhi0^S-6s?ms@h88eVQH zolGzjr4;%VzM<5tQbAiaAIk(X!BkfJA)f9hTOH*-&!Womx z)B&|jbv94eB-8|i6wp~!l=TFXHoihcC=&89vYf2S=Jl=IGCBJrJaHkWlFPT#@k}UU zZnom)!f|r*-IW#sOhCl?7yGqF1P9lT`8-|r(zG#ThuFH~ty`9R z($r@%7)YJg1TPrM8-dDwFY$k%FvaPZPj6`XEUY3yY~^1)-eM3EtkqPC3Pf@_CVM=t z8by0^BotiIstqkaTS%pIu17H+Z!}V-3hGeUDz_BVCZ+yHo^D^x1IS6-Q=l5LroTw& zZp0t#B_c&imt~1kqaDpur|-i3J-$|viV`h%K~?G$p`0zR^n0iTODaOCe5tO}vWRYq@MURrL;DJ&RXFr7LjiiO8@~o=PDxwjxM5crM2V}JNI#Dc`Oj=DrRtjVS zA&jgT>6@OM+`$1u^+kqn8g%x6p)3F>aB%Aypg`Melc%YyG8x+<# zjw#=FIuEImjYvMo!4S1W;AgPuvQqFaq{Bvt7$p5^bhIIvUsBQ(A%BM*edFHO9f17S zt0up;grZT&dqF~fGb;J4SXvJmSi<0~K%i<(R!HZ1KeL-A6$JH;lFC|PzwS$qN{)(< zHz5ga$@ensVUXaU$@rQOo0bmep=<>Vcr*HSLNdL1;~xK;Vih-o<17S@GH`tv0W*Mf z0Ujb?WdV9SWTJroW#d-F*43+Sugz=jC8&!AE-J#-ftY zu1f&LBeVjk;yij&AR1TdC|BHE(>a31Xa_xcv1AjPsY(D1RoJwOy)@I!SHYvbE3^Vx z-aH@S*6*E&c|@0ik+7|IEYMX~56yHxUgjA2S0L}4FW(^CjJ-{}I4dNhV_PTR-`&%c z0D@ArVF{}V8{yGd91(BMCPOPNIE_Lwy7@MjxjWvL_(bAdIi4^Oj(WxjF>t9k9N{C?2ZB|y85ltt=*qpAc1;0IcJ+S z5GiLq63N15($PqDA@>^sGTQy!KLc{!g%S&t*y-yFO{YQn9PB?j`r`17Lx?!~1I;dw zJrG{cgPFW*SzyJMHeM`F^Z*vq10RvtIUZ0WgXhr+C;drUuebX>B$V zlFZErn!wk+e-+p+ak0dKCJss_0gg>Cvq6CYn+~wvz{_lhpibE5P~!U_x63zdMaS-g z0QcD>+K#?@@I3|Btz5__h(Pdm%_XY$XvkW5)Zm@ z%SR=Ftu{#6gOJ`7z=1&8T@pZG0d7hMkp7a(K_G0@ik^Jzk^iaq#F0IcgU79+k8t4q zT&a4=u@{}XB6%;|kxN%3pPj9^GlV{q z?-aEdJLTu96H(N>GqyGBEzp(QgbtKQuqEUsUQsNLUaYf!37@nC5W;wAQJv z)hX7NbR~>NZK5nk|2hIoB_N{%g$T}bIda0lT(^k0h!y7w2RML3%j&L(6%yGBSWWL2Me&C3aQjDLzwOz--CqR>$ovk zRycS9?2nCmArOxyi+W?QV0YWxY4np%z!(H%zWMzw_`{vaW$ZYqn03rd8{JMVI!DiHd=3Sc+!Df`ByWSoi z?cVzt34o8+`bHlFsNbt63&SrAZ39H}?vwk+&xJ5b>q-ZPhn<9l4jqQ#^s#IxS(GbM zVf5A)xOG}jMF-A)buWi&zO7rhm78YQ3YRKh?L~t|eKC)psy6}eL?2|qt%de|9(Ie6 zjEF6}PDFQIvt@Jl`p<()YzLPikEh7s%QQ(ckgZ12dbZ`(DbV9z1P($nVy}iYoc({E z-qPLwC77WdP2hmT!bqo{q6mZ8P_#E3wB42MDO%{V+ab0?(1spfJgEn|vZecn+a>a4L^&=T-CtT3Amb@7P94!H7WGwy)bD)G6$s%u4WEUxQE}6>vFq*%Q?quST)tlX^N%l z0f*6+ivpg?&G!KtAsMMhruLzWh>N#$=f8<%#szDKt(pyZZ9YS}*(kJx4Wj_{cE-O$a~{2D;!Bipui_kRPTV<6J!Lu==wF4O4?aJe=sZfnVCjicKAaPrnu z(bcyC@=6c8;diHu%y*x=pW_lZ4A=pDr7(*cOf(UBs@>72YdTvR?fx2YSx-d=uG|Fp zEtd>SP)R#F+`Z~+5Pb+L9$*;oDxO>l$=#GK;;bqtlTs;-BEvnfo&qx3t^FJic>j%i zU{~$*9`0KcBpG?FWS}%jZ#34h*7PQ%e-JnbsHp6FVJ}}-<3ZR|T{rkCRpl>naov38Hql?Dxku1z}Prc#6 zSNf(cknMJ4@RiY{!$0QIyRRGQN}s(7R8sGyqwtfUYD0cmEG28I$YLg|Q5xi7Mv+D8 z+sC$`8?G6fnO@%n@v^UgW4wCXw(dW!83Www^Di9-Hh}vKY#MQOt3sF>O=HGtP0C^b zO>zI&;;fL&>4V1ZQ}>Sn{4{&%7&nUEpNHDTR+X}stPwpSZ^@+uI^#k3b0Hb^DmLEt z;24+oasH)TVmJPIOUhTtgQ3<*I2={2swG1|z8?NwNanO;Ti5=nF%Ez0QZCUQq$G^q zSXV_uq%<9`WEs*Ew^Qg`z{;K#lCL>-bnlVh0PN9Et{a1^2tWs6FGD;Ba401lnoQH6 zu@)1~RE3G7yKWd;oL)~wqI*)1(&pPc)|GsEOd;ZZ_Rjvv-6H4Y*u+Z{znXY>;!6`( zPqalBO|TQp1TnE~qJQT3N#*zp<4=u$bNrU^mGRp6IpezVQ^x1V-X8nY*iXi~V>iwm z8vE$XlVjzv@R)Y&o4e$p{Q+H2&YU+}y?38Ef z%&DcR=}G70tCP>H<}>wS=e-GPCTr-Xy6TVD%mKok*?Mx%TwPnPb7o{muA;MN5bEPTq=OEpuKOi3Av_I(`pXD#k*#}#W@L*P(~$RlP;03rZqO2F?kqAK^+;D;_j|!GDDlK=4wfo ziw6o5F-*1xR7zV1BD^%dT2z^x`75pyZMIq~MJm;(7_w#q6qTA(;qK;gM$uHYRN7jK zH7ezjBlt&6g^UHt?D_o>)~8X`LTs% zMC)~hNiO;bPj^A7RPGo+lz;PJ~tnLspC)+Y1WkguSU+=si%+H8$%l&PZH zmTfJEY_dV@C^pNSbwCeys#984%QRH6nZMvapfweWw%16CsZy?JN;&Wp=1*kvva~gw z343gwe4CxW2zQriLq*(8*v{iAZw)_TnmnuWXrj&GQ!%U^3qa{7>(6W|kYxFXz z1;GSHlV6{cs%C%J;{$FdsgkfYL*RR9)GM**5Ozm0jd(al>s&SfgHYJ~#`qXES2GO_ zSaXe})$Wd|6XiTD!VV&)o^I=jnwIP+T2YhDsM?I}qD(!I$cLBn?tnesY}sh}7VO6Y zx-~}WeNKO=4H2Ji*)(2Xrq*F%R9e?i##|X+z!V?HK?Y0>o~de$sY&Yt`i7F6KB@P) z4A{*Bu8K}ms~f>!suZ7vzpAJtER@Y*j(PL(cs0J9nyKUdc~de;I3m_S+%Au5G=m8D z&nsOt-D1lwYn-iTSw%mNF<`R(lFZGhtV&wb_UW^e*t5VSBXJ#7ZRjgff(h!%%AuDr zn?wP;#70da>Mxb7iEMlnI}w@XxJD%*F)=XG#Vsva-ZEe~e zSr0kM^9d!@F{0@;LeX?xgYadyd=md`h$SlWn!BkEd1Yp8MDil$?$@=-WGh<*4|JAt zl@n8;&C9)E3aYR5WA7Q`$Y~NFjT&kVU6)1VnTh?Fyf0b@z(&4k$%HdO1DSjnu|#P_#oAs#1Gs~e*6vdR^bkN+Ki zuSumaP)UE*oN30}I)h^RPnd3OnL?B|8gDqm%Q8)xjSoD>H^`JyI-;`%Sy|d*iDicQ zKhWpG4a%KYrPP%yX${6V@tafEaabwZsrIGKfw)x`-~1IkK^l1?uGKg~ZL-*Qdz5oq zFBaJ{Lof%C3vO-FZCZ}TX0bERRM%OHhERld zv}GrEqosEvjFn}3D5WWtUhWueo_x+PaMn%FJ)iZG?j>O9e`tL06#6y6NVIes+B zM!7{tTzX|$ugj%%(+d1Xc^ySCe~_o(H>Pg-Ds6%;phaGf~Jr<>I&G>zIe&l*0)Fz z_HUblIYW~O=<_zK(UDMh6cbK7oL~@8XAQ0_6n!rF>UClcM`V}+G1^EJ^*Oc^BP>=n zHuYWHKj2)B$7#lyb6NEHG?9&sorW9yPAx%~sH{T`G5ck$Yzn)+O@58XLO7*Oug+Cg z%46x#3hwV~XX=zCYgR=7oG;o^iLS?VXUY{JBY{k#Sg^~bYWWxr%`!Q1EjcZd$Lh;j zRWqfbGUH#wf8bC?+B9L*(e6go;9`>E|HO1S5&+d?FO{46PC;H$Zn+b$7t@pnJ?=mt z;C8tD4nl%MM@(V0GfziLnMB^-Fj-R6uCMgiSRe_sL$#$Hn5Jf=S&!{n=5?D8@oNIr*vO0X1E-3#7Kg?Y@T!a!R%%Z= z>mJ8v(MP_A~Fg_v2lQ=6Q93OAVR={zY5%2W}$oz{7Y zu^6Tsd`&kQu_c*Wo{l>!imk`>zSg2|RHBrzE=!WIr%LuAyh+|wjiMjNmRhtvZA2-9 z17@@tWgXcV7c08lueE3(NVkxRc0478v!iCG{)D*;Y#RMv#AKD+E!XE8Dw{N6GUrv3 zx8gA>iuMlO&e=Q>57TBd%4vLOS>&2#ipZoR$r7pUltc8yrMN#`(!>a*Vj1ekOM_{P zJu{B)8Vd;#BD9|p%SaJbtkETjfA#=y-I=8fvNOfe2t@uEgLV8n;_A7%mzs#BnW!bHtz&`tP z`udMzzZsf+VyAt_!4uaCm#nvPf$i(5M>e*7b;0)aaS^)zI}$sTPdT_3JWwZtg?W=! zVBi9~*M$#B_HJnR>PiQu!QqyEL}Ewd-v#Hmo&e-Xz+eGneh!}=P+jb#A%{-;u4HL$ zgEq(uEm+Xq-+fQt(8QzQ9-SU0#kvY8JxYDIEP<|i_c#x2nnM(uwVhc%r(DS};)QZYG-}s+=Mx2*y z-

8e~Ks@a8}WLGe{p#=7k$3us& zH=b0V2K~O&e)oiS^r5Lrd+WS;nFX@QbtQ}IE{UF!`eLDinpULH)$E1rvI-pP`5eI` zx^9XydaTm^8FWj>RnrlxwjYWi=V)1;O{@szHC;@Lg}f&p~)uDLCx|eKvk*C4fe+~ zJE0aENt|S4;1IkMa*6^6j=8|iV*9(fnw`PMI1`Nq`H#MqM`oN z`}T3|w&?i7AN=Q@f&2w+@B`o09-D=HBnx}j(88ZlrNIZ20#L$020i#Fq?IRc1OLdH zEl{vOv4Ze)M|+w@2TQ^$Y09ipB*4Qe0;nSp45>0*L6_gr24JT(o1nw%p5N5D`o@h{ z2~hsa?SV6M_p47hgkc&Iev)-mL)8E_2MNMN{LK_P@9y^88RC=Byw+;ixv7463!K$= zw4uPt-EAnal3`O90dz3~2uv?e!&FPS9yx{`288Ou$SjooFH+Z-ddndLXEK*a+yTRD3U)0U+lB@ z!zSeM5OMpj0Gxv@W^&zra2G6imN$W+|8V#9jj@F7nNm^}ljm#}NC#!Rx*3gL)1DY# z#X`p~cw!g2dVgZB6Tb!y>~IR)3i}pY?1)xXNRbNg(fegNg%q$MZfkErKYX-3G09_L zYzSfEz76@LH$6!QTukkF;v7Yj-DdKG*ywlKkKMo(j z)q4=Z<`SV7uDW@&v-J~gc;Tzp&3YLPs6M15S7ThI2>RG3;S<6qvtJ!^XYjfYmaSOy9wIXJI3wHvxRgJu+ob6 zJ5GSFf%1c60g{MZdMH)kCM_xpJl)7^U8&m$@ku_AwVEEhirLL=h5X2YesseZVN<(B z{-h^u@j4)9FI+Qc9LazS^7bD5Vtd!dwRoNO+Xg6m#O}&%wi6u#cu^t1pF%FR8e9}+ zNc~I40a-4=irI|5^`-Xs#O3Ub_i8bQc3S1Q+%1K&O4>l%C((SHRE1Q(3IZn@)!)Y3a%L30||V zW}nEa{u&s4Kv%Ds0VN-7ugI#3r2TBcEYgx@ySn*|lk-B?YKabi@A=JWYS6#?pL#yP z>JJ=zusyK;Lp>8J!G}if9eB6b*1vP;=vbMJ4-3Od!oK`IW(vTOGYP8b%#&$A>7~LU z{5@mqnVyWKsN}Unhb0ga^}>eR=R5XCSR>+CW&v)nEee_)gCtszF@rvP7@i$gvrzj>AA(>p z)-n9v;qLu zfh{Udr3g=0BQa+R386jMoo#eR2fD-Kp~FvnpNsMQaEI-VX?X{92g_lUA$8PWFXdB^ zdQgGmd3SPd{0WHRvAU=8gXbRF0^vvOT}ryl;_l#+azqm)RFupjEHrA;bXgl>zvJM< z_%?{)@!-1n?EA;%GX$vbvG(a)%tp9p;QtLBp4c;T&6vM`s8=QkW7Hhb2^JXz>x48E zH3f-mHf*R7^|C=7MW1~h{??~{1AmLh1JI$|&dxKxXuPJJI9Ue{-&*e;Sku zW|jr9!82>pYl$ME0r!t1>x@LAAv`hrz7PH3^U(AbKpg8jyYBuz?3D%UG7C(E$K_U) zBP1;ZJtXp|AH34=jy&M?N`m9@Zn!{PR~dKQ6O~ z!)cArYDwne`JxE@$FJCP#cC?lZv~&8?YY}GcP{xa)-S3nR_sYy7;aV?T2)q5m9g5l zbCO3!hb|JbPN2EY#$U7k4Er(xvy6vTuUNwcO78>Qvtljk5`_Q?7$oq>;QxUrtv??B z-PX?SzrcFKLek**^_jgv!0)n~Ntxai6+Y5%c_iHnT6cJ zYwd|B;F(K7Hc7@mcby%D8Mnn*he zF;@z;UvKXmUqwX6@3{0NM@;`8a9606t^}-&tcS?i+`gu*Ch?PLR>%yx;V7sJj|cFU zx~``L0=tj0a;(dMLBv^Bl`$BXlWxLLk2zv?s4aozJo_5R;ql-;0#ATlw-@<)m|f1T zaZOMEo`JtlXav{v`o=0FUmQaF)00P8ug0D1-e*xR@ESt8BS{k3G}JdM(|M;tgwF|% zm%)+8j?p0tYRs9jSVY}V{)bm_u@9g{pNI`sTCx`R*uXJ6+x3kM+NPo0$&NyyKZ#e!m)M`Z~i z`Dq7sPVvd;*z=#<*LnD~1MHnExU7Ibii3Y;dXrZX(j_&DS_TwKhDP54`@*B5Lu$s{ zx$!Ob-lVfu$P!WU#M8|rykJ8V{r~)Ld&d-?jE-I)HFOGpVjX;Lmzq-0){H!qmZ@tA z9RTFBH-I<)+#a9g@sMEn5jX_xADZhJ{{o)Ah2ZkOmA{Nv51z zR|76J4Pa0J-=YD}(ZB%~7kn))I(EVS6JDd{(1B?foh8oR?BLGW0Q772uAAsyeL%=8 zdUWW(_{O!GbniTz&j@-ny&2%m;SQ>%EExj}C!Pto0RB8iLYoEnrKj4rhkl!yg#l zF+4H!XIw&+t=$SGRV_o}vB9C!h6V=T9DHu@yMy-)-ZWSnyi(vE)Q?F9iLuiMw+sqK z?;Ch^;OM|3!$$@V4O}-+90-g)H=r0eXJCE*JN+;A|G57fqu=entN&yDnSOWw#r=yr z`zQMT+_&8KRNn)AXw2HT*vIr)`y_z%GSvIW-e2`T-utEAc5j2ldKvpcFVVZDSFrBY zF=pM*);+rJ-gTc|S6X-J@K4q$*PT1syKckS*97kfUK0F7@D0ITEaVFy;~brQbn@QG z>nF>Tmrtt47RS)!-jUx=&QAP&1wcHA?5@%Ya1iLpPAEsZutgQNOUVsvig*^$qWTt8ACxoku=vWG24 z+m>&@m0oL#s4hn|6bx=_Yx)<7kso4)xvXtc zM#8T1>ltCyP0oLoqq~J#q7oG5qy?dQDZY^6LGC z27TJMIJ#1;qQmh;nc0xZNHr4idH;zShI+C9^;?87b;ucWC}NXtj-D%MiKtOthm2)? z$RAYK@puj4iplCQiF1TCpJkX{oH1WB1j8P}MwP_%ENv=iLm&7JCkBuuNUKg}x70Ld zhkG$i{f%P~@*<(H`eS8{*Dq9%Qk=6|)7PC2!cwkM?gr$zR>|EF{CD*^x=~P6Q*mP^ z=n9giU04j{5oah!c{VU6tu(I*_Fcr$&1wT=O1SBS++~Q=LcPH*eX*veO;$4NhuV0I zFBWwqw=>)iNIFT_8%>oSVD5!Bscs0D+Vj^bYr24k zkm_;+PXLe z+08Z*+$0f;GdYh-b=9=Ggh;7i8YVNXC+=}MH6`<9EWr#TO<`z(~Il5#wT#l@^JZ&d+5Cz2wormFRh#;F#wV^Okh0kzOu6AfrdpPqi3%g{bEe91< zjSfjpnOr1(g#WJ0owt)sUn;E&s0#HmVU%)oS|p_sltJam1OsH9{6G`arA@5|g3d|s z;tSR4a9sQmj$TMKNkhsl)dzEpkd+{v96b$Qvu42%XFQFXqZvIHE8-%+iU9zL!J+o# zG=yASj!kkiEon$Iw8C4qx_nH{VosPijg!F6CMbWjuGJ6~d4W`N3nt0ethR)ukSHeg zm2y!2b^LcF>5`htCM0xNElS362Qabo5Q>X6}^YYb2ed1bzzx zu1B-+-EZJu`7&w+l@ja3Dy@Wy7t(vXz%|O6&q`Nlhgg;hhqF1cOgi^4*IrXhQ>8FP z$;>8C&K#YZ=jaMgl8m@aArlpMIL%@`_f_)A3*cB-6q$TRS*ED~{E(OM54=`z8BV&OeJANEEf8^~JH!i30KR!Kc4#E2qIvM342 zN;V>EOUH+94X|oz+UXe$I$zIwcwqqN*2O&P{$o6y5o!F49WPRZ68iQJsTIl41B@ac2mn%jYF! zCbctfDdV!F!PR8Z2otzt65iZx`;FJZc)EXmL= zO9g;{=$tGgPB?GC3>hFTQ3b2bBdWQw^$6qqIHoI&befJf%3`HMn2wZ#&J?CAYDFn6 zOG&~ayDgzpNSvIS=!%LaK`E>m(v^^9l5rnrR!rVdog{)vWsqsg3(R7~#vP~ZwtSM( z7oAND0Ig_sL7SRe-e9>N@mce<-JhsgVm3~xEs!)$k|n5OTC4^m+Nkw0+#gsaCkYk- zz6`-=${MkL2GiYO{m8h_)-;3}rAn9HjS*X5{>@@BN!t=CmroRmGtwDOf86@0m`LPh zVw*il0z{v<%n8z^3}n(`w&-Gwj6ay(`ALqhj>l=U&65#Ts<|@3Y{kevHMdM!qC6Fg zQX?(spyKM}*Km7RGbN*9i>`#oU~=XgnbdafxZtWs)TGyF6=f5yXj7Ncf06rvx0HwT zrX*FV1e}gQSjuUZ%kA)x6;Y~K%Lc94I-x3Z?E$ogOp)=Nlq}XlF7bw=nC`67c7Qih z#l(?@Zjq5B&%B;vFybodgB;dyxK?tCM8g=zuI6;a;EmuY zHetp=SxVarNr|MQapl8PpTmeU*Yr&2`p;#3-Xr%6{cNl<@Hh5(H`RUaVnH{s%exG_ z%ukBa6`@yY)YnYls%D)f6SD^($!s+b9iILV)=U4Pg-&+%06aKamszX~?D8&=Mt@Q( z4ZEF%tP={avtl+N>C6GBiME>6#fa`)J#*l4_61c767UPEN?x?S)pouJ1t0`;u1p4E1?=MuZ-5!$vCz@>ECd_0-&pAUU;{e{>oSYa zf~Tcvk_UxEv<7gqvZk^eir^kxu@~gZ*c22COvN+Idxwe0XPFpx|I`^F7>lwLb;@sZ70$+dMn0Mg0Atayn zY+(!Q>;~m>EZd>)_%*6(m&?Qi0q;h^3RN=(p#aPda5nSF==dBB=+m{@eCM_u?D!qa zwiOvZKVwNy3W=#$CsV1IyQ>!)(C{u8KaU4_=40JLKz$f&D6#86_XX3jGMT1~tsC}bogWEwCkA;qn?dH-izPBBeVx9%%z@w@wlS!x;RLeJVUUx%ekg}ti zL6=_)TZYF&^1lqP1jKLdJa#dRj-4VFDFh3X$?av5l#yXYDhGE<6QI4b3U=*9&?O!Z z9ey2#_sq9%+1h#aA`rA-TV_Eyu&$?S!Gg3>(CR%E6%BRDu$Uv~fS#^qp~IIw(A~xT z2S5Fb+0LeO4|E@|oX{h@lU3DfF-6O)lDIn`Rx2V<^MoB0is}1@G6@%vtZWwrH;KjaQ z4*YoF$iSTg*Yth2_uhe2-~51c;KG6Jz0VGe_P^Et>;5PEztVSKpT7U*{txws`;Gln z|3ZKNwoIH1O!^Gk{6E9Buc;d*!ofFse{(d4g;heZ|;;f0W zK63njSK)A*#_92e@xHOw$9_Kc?Xk~~T|ZVHyKGD~wr6bP=)0pY_4SVaWb~ol>qqY% z{rG5h)H8a?=>o*vIQy;~xo~9r$msA}!@uskY52+EuUs~K z%kWjhkzsT1w}wT-TZadR-WdAj&||&z-YWqi8~aRO;}Eg|AbSNK`)@1o*dG^U1s<5h z6aTuOGgq*uXE5HeAG?cOhpx1r(ZA@5II}8%4^1{xaaqm;0MWRiBk7LQ6**nZd+WN0 zmiA3xdO~JtQVO#rpovHf{zlrv(VYpIj!SiU1rZUnPZMM`ed zO3f)NcH_DnT6c-k*6NN>DUquNX{!x4x9VeI+7!yFbWXU8h%A4_WOvpA^B>aJ$x=e+ zbtYy%%+bx1E-a!G#*p4bq{0^*!<}&}LPD|v56W<4RmSVgZj2}A0z^uhQhL&Pe}WW= z1G3?lxz0180O5~>eHxX5jGKwm*Ku?oU@phpCbc%^UsN|^(H;1L;c~g5d}pc=mY3_% zu(=-Ejh%chmrhL*CXdo&%2rbjlG%$-hc1^|siaJ%LZ%ecxe{wMCMalSS+)My?V;zw8JRWURtaF=^+qe-sgHa_#HYy2SR@wajjD2~0TgA1% z3}Hyh(pMZc@l8P=Qdwjh@+RqHN3^AjTWVW*ACL`)g`Ff8t#_Eh6AycZo zr&TY%{KzQJM?REPbU2-9l}FPr4b^>%d)_(_cd%{2k@gW*GQ>vWiUeQpPc<`vUQ>rB zRGRXr{OJ~_u_Y_HY8GE_8SQ9g`fU!m zEUYvqoW72~aqY1p0=?7X0Wz#j+Y*R0@``9xs1(wn&S9B4>cD4PU@iv{>afZ@D#?i3 zje||UBH5O>K+5sAjKtCsSC2=cX%6+LwXyTK4_${P>Ol5*rAd<*wM3h-$GpzM|G?pC zVVYYrBQ4&nCD_d{9E7LCqV4O5+7d(ISijLS99?oD_jokr?~)9)^+-mTq4sPCTRVQX zzEj7jL#Y8ZBh>RNZaS3Vzf>Ll`ZsG3xPqhFFy{QORo|P}d!!l3sHv z;&OJ|Y_S%@UpYphSTrIvtFrEno=)4K#(#c+ueWqJGrd~XP){u5k{RMvqs7lR}l&;`*uN)y&yIc~HF)CL=pGkxi?Y!{}_N1bc6j0S9>TLU{qeFQy;n)W~ zGQHHN>o#}m!)7KFTXBf%wxGMS*QIOj_cfb?sZ6+q@68~hBbEI_nMlCUqBgR#dU!63 zLoV_4N0)?PNLQ!z<5lTB%)T7Fmp<_N>+VoAoD(VLY+@!8+wpEpE@S*>eGmhB7qy-t7W zL9X7P>`^m`ute(`XbGyinTz>;@CSP{lF`n#VZ^I<8<|Y-%FFp5bRq3%IG7!1cG}{d zK55w?UvFtqOLVef98UCQ9XRCS`^|53dztQFbGY9$?CCcL#N4L1!>{esNL(gOk5?TC zXSx&fxotCtU(ykiCQ^>rkdGY=Iu+6NCpZDV5v7+k%3FHm$u`E|VrKG;e9>M9<4drt zzoW;C?YU)F@X!0Z%&b2fH@iFRZk0XK*2vd;2BWOnmQf5dG5er_QE>YN4xcuw0ZMGA zw7HdyDIyZtz5M#?)2Jens7u>-F2%~52m7@VSC64RR(hOMMNenU)^D|&y0m>Vvod(WVUEAY z+S|QK3i20)ExQt|RpEl=ob^+}Q;t)pKz zs5aQ7dcLRKT?{g+TQpI%BrR9@11tW1Zb`>3t;> zuev$zcC=J&<)3fv8j=JQ8F##0mc*6S)w{S39d$*AWNH0CkF2v5Ioy0z?{Lq%qKaXO zNiQ3*3?;C+9-4nE_quywy-|mWZS`?eFi6C0S;$7>F~MTyF-8tbm5dr&ioV|M^1;@~@h)uR_1z z-QdK1!F#i28zZ$SqaJ6--Whb`mKSYIl>(fEG@4`l!mW3WEzBnr_|Qe*@-_H^=c3p9 zz0r;kn{-7o{ti`mb_xzFZ5M?478^0|mk%7%r8hNcA2nG~( zG!NL(YefwdJCl2*m_psDVRRkVa9BB{NpL%ZbIElQypn*%Z3h;wT)!s476~6XzM(|? zboEVTOifqq#g*?@l!-RvS8NO$M2)6H6hD#cf2Y;b-YQW>jdClZxZ9Lu{W9zgopFrK zsS}XMrh}hxF{(=`y=)_fV(ashF*MoEQ zP>ZjTwzS^glJC`z>FE|q5KZE?P@1i7rBb5o8S0C-wy4x5ehcOGF1)#b2JqmguOjPz z_i{ykrHk7`qd1LR4?1iD-=AyCeJbz~(8!M8-ol0NlI3>*2I6xS)l=)C>%fegd{LL) z&?4yxrws53+7w7+PxsJXFoKtWgj)c=Z2Cp}*ma^M*H8Xjp&r(_*v?ku^Z=ath=Ke0 z2W|MdfJEx=;3CZPtp=`VD0C#(Gc02q>R{v}7FVk#)+|Z#yQ1r~U?ZTB*I%#28+C4N z$Zylq%`V#^|0JKmE|)#b_y$KDZB~}C$azZ=YXu(xjigSj;Um7^YW-5T>Pu=DRo=-# zk(U2VR9||8-UR&{1p`S;>H^zg9I`64M!7!S>m0Jlh_MHIuTyIY<1%40ZPRdL{$lg`k6@5s?y`U%A1UnYyw-U!fLXqG`yNTxav;}@~0BqY^0ESoErFh z273bRz;K_vqdVHFZ;jFL(WcqLYO-zavejF!F)hwNWTS)cJQT)@e6zS6-qq6T@965Z zx5lGdv(_7?ah{9FlFqT(+NmT`KjR5(%&T@b7uE=f7|KZv(ToUcmJBBSllTC+HPF2XN zml64OV@-8}YVwZAZO*@N9k%@E_)36o{A}gH+KX#kB43%JqMBj}8Hx)AMG@nMfr)kL zrR=azN5wziA6s1|<{`|M!RH_5_mY-dKK-fo;KC9;y? zemN-()7}A7-QMw#Ki@!4)2cpAcF|=4v%^^C>{#6cuGI44mt%v$2TRh^8r2LGU zu_lHx_V$5zkaz-MA*jYiH7@U2AN`;q|AzpTZ0lkrN@=D)GR#OF{j6O^E)C&lf@&gq z1NUvL3pY399}0bGIszrNm*5`LO_h5^fr=XOQ)LSNUYzw%cCul{pxkJJ<34CinUdCw zO+lOk^xdXblTDw!N&(;(<$pT>TiHO7t2j$3>1;7}vpP+uG=Wfhx6wz2?#56EtH}=E z7g*C)zub^Nc{iHaU_A6q+y)94XMLw~xFf9ra8*(l$&3tN@5{o5c?YfKtS4hn_;uQqdq2|Vbm}uIo4i*>4EKPUpqki*uE$mQzhJCiy{G81*$$;A`$X2( z-|1)LU0y><18_05oLo2rH4{{m6&Fb0XVF_|4-Aa~eJV86+~q=!MVFV&n%KBKPX09v z(Sm9sYUx--uLds550Ai(WAPlu4CO|nBdt%{Z5pK|WAQ0efOh*+8Z&fiEfL+Q{mP+{ zA%p(pkKV2?5pS=(xcb|b`zk6$*TbP9BHPCc^3BV)OK_N4_!50;&>HU=Q7P>juPeo< zdl<6qPPlLPZi3%6l|){jnD>=yTxT|6DmRo*_LN0Bfc%=RF>A1SNM?zfd>o?_>kqfc2OP$XJlQRE z2RK=;Jb}TON+PeXxCEN<#w&}-c~6f0i_?ttKSkU9g<0rR?q-qPW(e3ML*44$UOl5m zgch;AHMVNDuo_afbmaf|7QM{WAGerrNFY~_up?QEZAd{BZ^O0;tBLBfEvEd7Z;$D) z5<3eNgKD&RB%bNes8mc}NN+~kZ@JkZBR6it?}gRGW?Q>9|L1K~WMZJ%o?w&S&XB&x zDh+fci0fheL|9F>og^LkJrBcmY0wm^U`c&Ni3~Q1Q&LmBS7NgdBwD#Hvps??n@S-f zdDW_|S3bKizx@$-PxY*)Et+A?rZ&doH=EQ}eqfhAih&i-xU3fNcbDXEd~^)JMV*qg zM#g3Vp(q35VzW=qNj?1-ek-8ih-XA;Y5UmB`dE;$A#T%BQ(*y(OkCSIiMRgj*tLs1E+g*u09wYOi+YkC#-#D$1kNMnSR8m3 z_j0CxgfO!*K;R+U8i?h&G4(kBe}D4a7{#1~Q_rKW!_Cu#q*}KpWNb0FtJ=}iA9 z(vAb$yKm2(-#ABei}=LLmAOiC+4EyH^GsP=#-xeFfweILL{cEB11@LVMK{hRKRO8? zFZ?`uXS!!hN#a}OJbRC-@kQK!GGzk*W4AH5geCFBJjg<41g5aFnQT6Zq4K^sHXG8u z{s?Z(-ZTm6@nWvxg5Jl!aTa^WgVtGaP07TXup6*Oh=E8b|?VDrdE>`M;|RZ z){FCHAHmc#)K9jfC1VWXj$GOv?baD$nV6qE^G7t~x+Nj~ugEWlDrfg-nY+Y(xb+i8(>yKSa`LgEW$LY#KA zybeAB8ex81ifEuzpfUgb*Xc%+r!Z#{zz64)HWfP(59s^D{Ys-l%DvO?euH-s(#X5% z3$G@dM^=>QFa9n481xioPcjnBNN%>mp_@91ixZVBe<3+LU-3J7D>YD{m}K1dWP4&@ zz|3@bWIcm1oxd*>CGj_5l!et~qV0R8{Ks!%aJIfPrmYv~0IweLcg~?6`PbIxZWR&L zAIH8?FC4Yvh_3wFVCJ_h&;MLRzWW}mpf{$Ac(N+i9P=iT*Fl2(1{vH0Y$oq4%FSlB)9XNR`KLcTv?2;eV$gSXTaLt5402uLY1g6 z^4u=GqJUNmRpJ3@?tLGY(4vVW2ZJ~21$GW_bD}2Tc$qZ@3FgqM1=ADB#G8HpneC&% z%;B>rJ!XwD;c)?lC}zUipklom949(VX-=b_+6xOf{Uc=4i+@H+vSTY(lBN63eR*>q zdP1m@yt=O2Kb^XY?zs?`H0{mpJ%Z}bKlc)bUwxEe^ zmMaur0d|9}p622I43Lek3ZvDP)g}F+Wu+CT%DcJHbGm)=^jr2L}tnzGYn@6`QQ z*|X)Z)!kmTplrNmz369RP5DD*!!^%~mI2$~I?>j$D=G%d8cU6(mz36){!4VG^jCGU z(nwuL-DP#NYyVtxL+yLDzbL<@V*AVwMCsb^)@Ez3opG{uZSC@kw`)sh9i8=?S;@y{ z-8m~U%Uu4Cng2a&&dew3elqj!84iRmS!YVb{+aWuKd;_X{ZjQ0t4FJS)vXm{)vKy! zRGp~$ebv)dj*70T%~kz1|68+5+%&6MbXAp9{D0!T;+Mq_h{fWKB5&!BXS_Az=^2|v zf1J@@S|~qQp(OR2?wmV=-uI0;vs+Y)$nw;U6{GyW>2l*qdXpvxg{3pcmwvId?CMhJ zW74FtWuTie3vlK<^tNv{JR+LGQ3Fy_5)l6`;9O@DF#!MJCa_I5FUnEvSb9upuLDn^ z-t4deRoadU^V_ICo22?-2W}LOjuy!Tp z_w#}w&?ED@x@fb2G>*&1tYKuyVUB8JEt)X!>x>bg?8Wh7S-^Q^=2Y=iAfN{0bn(U} z)hHZ+F5H3+ODelKvKe=o0b7TxVifV(gTEGiSG@Mwvs8-%?Dbmu=GYt5B~3uhF29{; zEyJ9GTj9h)Zj<1WHhRR?ylfpuMc+BPVkQR=wgHA`a+#Cn~>pdeT+;s%HSRB?NTly{T#}pUQoB(Ve zYjMFL$*P*ov3R!p`#d!Yce3~{z)_5waaSH%6c-)hsHUvRWlzAV!F_WT?ur9kFsX}+ zFXgE~TpOi6PXgi+fL`-JglD9}!jmNcV@#Mex)^>K@xXl3(X70Qr!pSa8v(33unGeh z5a7(m07c~RW9vYpdNM|z&XQ}2`1lG%(z~I4p88A%d zMCtE2DlprS?Z^yS7y!oNGR8+KvxWm4843jj@x0|*(0R6({ct;@9 z_|K)I#aWIH0boDHe1~!|rlbdsqdn5dHw&y?NO6+vN&+EM<^gH|5Cmim{ABZD>Y1_@ zy&aQHi+hlEC|Fq9$oG~ReSw@u4rqZ(hna<^lTJyalWUeIJqq){pqr3{!w%)@f>F>) z8&`2;d&J`i$V^GjRG2YIv4a$EJfD9j=z|kB!zuH|f=P4MjHTX|ZLH*|(?jpid$s0# zk@0M(CjOFNKDhVFM{({c;>}@K6upR6I5TFd9~1;47G{^Va$EuD;4;Y2cUiOs?Y85C z#gLv`#!&-UvW$Qnh_lGD0$9-q9fOfNzN3)NP2-VST=qB?T^Us`Gpma(;tg#ejZT)1 z!ZdM76Yw2`+$6F(6UQ38s?il!ZD4#N-Vz|HdSh(SR$ed*YeG>#F@X#+texnVU}W)8 zjtYa4rMafenAZt>{9smQoy?NIa#Rz(zku8aEK#rCHd;iLKw2v4(hiP{DNo%f2!+u~ zS~S#Hb|sdc#|wtp&{Ac=o7#~92eZ(nm6g8DQxPZTMSmJ$ZPoa#4L};^=&aXxDiR}5 zEk_Efm=g)3KxId@Benc2gx*j!&vs$z+pvPrIb)B{y^;GdrJ7)2ky(n>#Q<~)^^e3W z`8PIUv4}UDpn1S^jF};ru0RX(3KtA}4gibAnwP2;L_3sRBCoWp;;$<6B|?4##2We5XzcjFg$29G7-V7h1rrHaby@9 zEN0MZi~&~EB$fx4E-~-#9CiAHEA!r{`94{pVwSt%P{7xTvnFa;lEye}I21UNXozsX z$C^*QHMn6=PqRt&yPGNxECGOrgFlyV;h_pFC?N-$th zCS3v!2Lo>>F>fBn-J3A!vDCXTP{^}qrcRr~z?Ac{y--+c>?2rzpdorAJVzBX{~_+T zm=X>wSXmPmKPPlBjNjW64U^UlZr~`UG<7lYQG*W~ug0F7doTZESTy)dF4_Qd6b1v< zJDx4ApQHi|2S7IP1*zo@!xuHjEB|?xiuD(nvM3}hK!DI`fIW_sKFm`kuw7UZ;}Wla z6#W60lTOZZ4NqpUqygSp4NC<@)WkC$mp5Mjw@IpA7b&VJ9T)mu$i+8N z(^wjT9*d0|O?;$uFZWw&t%EVIi>}ft>M%w^3z-X+W^ zxSKL{?=CGHrQZt3qy?h}M--IKVDlymTQ?#WXK!9z|q=qld3#1dNJ&lhjcb&UF#bHh>if;~Wc1>iKCy zKRfU>0K4aj!K!NvX%j}Wj`yl;V5frLMVAUVHjX&8l#;TO9BUK24>}>^082ubW9lI( zPGrtg9JLGXT%3C8j358g3>OP?Mk`tJBL8FR3&TaFo+5p>I6gycvN>UnO7rVbClrfJ zOa&hlP~b=+H|IhwK+9QDyQ-o@*D(ROjke`^g6%V6#k6O}5;?@>kxj`H)_(0x~pzJl-kGNPLpPl)bORlCm;b`i1%k2)3n!Tb$>0^_HAJ*;m>$!jL1T_LMFyRSk9diRm-+)zn(@di{-vn&Wf5FUkM< zGiVMD_0F3-)RWu0V)8z1pSHa%J>YNeE-KD)Ws6erRgkq-!DC1~cY1wZ{Wlu4V=hpf zV@`j1T89-jW<=d(XOyk&3KK)V`6*ODP)&9$$KAkUwy4veQdPDWD5x+OaH2EyBz&w% z+GpsKXZzdwedP1MqHhG%gt=|vtAQc$&*>&MMM~z*JpI9uE-7m@+WI?(ESkZDpRD`~ z6j@kJCYbMBnZNHZ`0-LjVI_Xfr5DwP7Y{o<4pyE<_Ck3=l2vze?YX-VYy>p2<&8}7)Ex=w8*@-4d4ZxM zw=7nyHnhrn%>8<%C!ldF4S-te2@!c!uBra()!QGvWj?Xa%vI;_#si|#W*K?5I(Kn> z(A)0}vRYY}-z2qKB^@o~bT!mKP)&SV8}N+z!|A#C4Ks6>Qgx!($ecRa+p>KK-8O4| zI*rNi9rBaMYrscP4Xj*T4{zS{twm(nfwn8i8M3K?*QbAvm6Ho=bB+9wx1*$NwfKSR zff`Nu=ORbt|I{wduXyLo)wtwdppdqFNGC2pq$F%tv?J5qAvf5`ruy9KI``CCBD&)# z-as@Pb|HeY9)sH0QMe2Sf{W!F9#p6U-S{$cFm9EvJ zc1f#F+U$?Ec@xHjV<1H8F37E_8=hJXn+bg=<{;X50XJDL2McbpXw6yu2piYn@*~rq za1R#`7%;1+RwE_f3zPY37UZ>y!KTqvKpJn}$aQDbBPL^Wd&WGRPQ;Lo?Vk(qE`nOJ zV?Peqis-(ng|Pn(UxF`t^v(T7i9QrDnc`iB_K_f2Ge6ffTUd?o;N5G;Yk{9E%0Dol zs&=3t!>e$INJwodmrJz+dM0e>%9@Q*qPPq^gwg|}A5j5UeI!PCcUlT-k6k_u=(Nd;Vbk_x!^Bo%PsNh)B?$u%ffpQHksPEr9YPg4Hp zpA@59ev;&cCIC>(2KMg0SfW;@MfQ2WhfO#j{P|i6)1=OFQ0_sjs0kcj} z0W~M6fSD(#0PzVbpz?$mWyJ|9p!_%$PfmGDgXT+QvUlsT#a(?hs#jz`EdRy z{_Os+2IZ~~%TVt8AdB)(AEZ$J@dL{G-4Cuu`OXI}lz;fZg7SYp(4&0ogLNo>|A8Fk zn;%??@^>GsLiy_tmZJRC2lG+B{sCO}s@Fb%hE~0L>{}>*d29&fOUIHZUpy8n87--L z;n+9ukLQm$QRa`CQ2yeW7Uj>6U5)a&V=|OGj!^;Ik5K{79HRoBK1KyRd5j8p;usb1 z_)#k0v7=PLPmWRnKRy~l`S4N7|DmIl|AR*<{~sNt{2w?9{-aetJW2)p;3yUFy`xmX zcaKs5W(9n|LsR8|67kx{x=_?{5Kt;{6{w)p#nyaPyydMOaKN0uqO*fcRl5AagCn$ga z=mZtuo1g+VOi%&WO;7>fn4ki#ouC4|6I6g_f(md=Pyt;NRDg4W3UEwN0i6?6fW1Hk z*a}pDwLk?}3Y5ROK>4>9D1SqN^4AwA|JK4N6`(3m0qYA?z`6nzu(m)2Tv?z3S_)Kv zvOonW4p9N}LsWq55EURjL$Dxmog6>#YxD&Uesl>fztDF2HNQT`VmqWo7M zqWo7KD(e5rLsY;8hp2$_4^jck4^jck4pIS)2dRLDgH*thgH*ucgH*txgH*u$gH*uW zgH*trgH%BMK`LPOK`Nl`;Cz&|2PyxV2PuE?0m{Gf0OenPAW8MV>;M%|dVmTL9e@Dw zzYjow_@4(LK>Wo42oV4600fBt?*IgdKR*Bg;=dk%0P$ZAK!EtO0}voSa{vOwpX`SK z@#*~#ApUrN66LA=;4l7YKlqDJ?x*~Z@2C8a?Fau+@zMQMz~TK6Q2q3owJ4uDgE?LO z(=(T$eEduk%E!*YTvR`LW&z4a&eWp(@tI1L4}Wqa%7;D~M!D^i9+W@&q#NZAKe-O& z{hxH9{N5)JR!u(9pxpY&l_+rK`U8lRA{&`Gm5*`!wF8 z`mWQ1DDOBOM|t~cKgwHAdr*G+G;Cb;EvI4Qs&76G8&|#QG;Cb;#?!EI)uX4^p#0Y9 z-nsUybo{chdT8uJ%x&-C$$7z&9qaXL-&)~3zcDJsBo3IfCv`!7XV*iXm!;Qpm35A3I7ynp{JlzaEnG2XKeeIwqz zkB;%KeF>EB?F*p%<32CSclX&)zOxUU#edibBQ5@)eHc*jTl*;I-|t(A@^||hQ2zJ6 zxv>A@-|m}<^4I%d|HW_Yh5Z-*YA@`+`1QSLwfMEYXtns2y=b-g<-KUN_{F`H_49kt zXmNfoZS>FgHlzI6-Zdzn-Mbv+_PvWxKD~D~%BS{%_C%on z;ves!0v_7qM!9Vd74YC5D&R+ZsDK~tp#tvTLj`9x7mL z4;8Ta{WQvZ-lqcYdOw2l&i5(*+uwJiyzPC;|JL^@|6AS%|55Qx?{c40b+ox7+2$1W{^4;v}-xaj$MmT8g|V_*|tlJQn#xF zW$Vr~O7+e@lzcw<*h{J?2C>PSC7M>rus+ysv@0}bmx8FS z%grS(yK{5v1T?~Y{&zkj-ZD=P+2gzgB-r4C;Zz2Lzm@HeXN=uJUqaKHAcd9qauHOM zi94^xSLDDwjrp!sxpq;byP!Y@22rso`c@Acaako9r@mFy>xq+Bny^hUwU&sEJ-aT? zu7>zVSK(^>wxYNtCLhsuX4~azYt#`oINShRx{iK&O|2ypPprL~EW230l$^Kc=2iK> zUYD!J$GxY3bQXLPyn$9@QZ31{y-_x$8L$SG^fi!$eNC=@wvdLr8Z+1CYc9+op3hT2 z;tHOJI;l`;rAeEuxudhUx1&o+1}{Qm1l8o-9d`g?i_|R2e{fOGBdU+e4bmVxuDfj6EzZYrx90Xs(be-?1;fIP)_js~#^!^7RvfbY?74R#XQP?T*%~_^ z??Lv2i;H}w4i1LwWp>&jljmQvKD9|i9+T#fI)U{dwkC`da}&bZRM@mP;Z)lk-t>f98*cq|^z#fG0L&VS;9FGHRY`He$y zZ!Cg%O`LgC%-v=eD%EPX!$K`7@B0`XSu2s=bz1Hh>$Iu?ja)v&bz!CHCWk^ zcEcMbFRUD2wP1QGvF%)mQ0J%bO&|;EMdKCZ?xyjXi*SsC<2Hn|&@hUa4k<2h-i0$E z@=O!uG%XcP>fxGH*?3Fm6OEH|$d!usFlpA`l7PMSM9BKJ;|s_Q%g5_$r&4gq{F|%z z6eRZZ$88tPd*Zya@tQb@Mu-GG+@di@2AuZcKb#E`)!Om75?fmZ7-{Slaom(w?}YyS+QXwo3vsy|E|)DK{=bd#94fwg)#LkpGhL zW1@w{zzQ7hXVF(UVY480Cc@sDY4a9dpp;3!l0Mfw-LqtK+rYyAD4F6#@?yG;oBN+w zes89J0H(5Q~EIe{)gg;%P*mjUZ|zNgKJ4 zW^Ded!JGD3vMKgb6Is6dl12aD1fIpaBeOfGl|}rF#i2&BoZ=*;*{<>bxK3SkBMcom z1Wr%;2<~NU!!_}j>nPgRTK&3~jQI%Zl2=&FSaczYBz6;Bmpqgy? zY#~jHwK%`lm9vVLXz_c_!*sXx$t)88K%Xm#(5>bmnH|b4AXf}w5CtUism{j`YuUqf z`R@-=2lJZ3x=A*|*~8DQe>Pl*)A@zzMF+u7~t zP6CR9s%)nXZ4uCr#)?^W-#c^4$vs2KIr*n;)LV5GXudGc<76TZS1Q@AHnoQ}R%M5R z-0nrM2x`fWtoiD#?aA`|zr8u2Ti6S0vBN%8Y>X|K4Yjj|-odmXV(G|eITg966KxTY zi0#p)mHD2|oR2!p>uHx1onCcEIE34;PMbRGG4!UDWc_uyc_e*pZcd$mL_Yn(jPvjp z7BuAdUW-qFMqNRJh6IXiMk1M(h_u6J_bXd;?V&ia-v}peYAx9o*wU1L>P9%KbFMC# z^+?UElB=tS#0{0Vm2NHngc`tA9_4-aPvW5sY2~ zdTAj%8!5uy5EE&HF9N=L142OHv_9UQTd`nzD(A00ctcGSxj1}IKl0`yck! z1v-Q)l#yvP>(k#XI6Ilw#Na`C5JrVym?*+>5lcoRUJ+M_+u`JUF*v)^Qpt*+AI7zn z|JcIKO5|oOMA~;m{v$F6fkPUt#Nt3?GxAmwCXs7eFg=k>oa`}>UnI_H*6NbEhi3~^ zme=N8NqmS3NSrp$rY`h`p4?AFbMz&(7l`yVy0WI~8-ez4qC!Ls+2t@~*A(=V79=n- zq|&qP>Rw}{O%`@ILd3Tbv;Ud_D4Bppd=Hy0B+Z7h4L+U=aB#{WPS-GaGC8W1`jee@;^GWQ1-0ayx8e#rdw1zCb z(z+o3-w))J=!~{PJA{XdlYUSdXiu}9@gSQH>zWPe04W=RmI4r4YMq6#pd97*TuXH6j>6sC3!d1kG3QC^eDT}eNc zfpyM*DtCE$M^daiV+)#PLAD2Q)Wsp$p2hMdq!n#xe%3c>H+l-XNgj?tcN+MXX?xB!qyR=M_#)rw|d@mG+ZCO z@$B`{J8#L=FGL(70{&={^dMr+=v4s9CQe?xDYuyX{+8UVdDA^X-hDAQ<@V^@C#qn^ zR!}nrzYUS9I(pj$k;{nVbKtgz%arB%{gqpDv*%9p1Ud9Ye+RkrwsTJ4TW_O&$rIv9 zzeG5A{J@%TpKf5kV#+SO6Q<1M@ZjUuz|dH9+?~NT0qz#yJ`C5$XYS15*6cKokPY9) z9nAmeo^S2l@YV4BhnQY`$ssBb!F9OGfq>>%SCpGm`n%z)P5%fE&qvzH^LL-qq|g3N zu{!|Tz;6u*^{}X;^U3?)L3apgMD&3CtYv@hUbtzOVh^ya277>)R&OXjA-=itzo~Vb zU$kyOcIVx!uCTk;FO^wMeJaDStq+&~=j1S<1=ZZe|Gw5_L;kj0&MlhlZkKqF1XBkn zOkE(==O;TJ!Za?w50MX3No3P?$g%obfl)?iS~FY@u-!ih>iSi3=p@lBSJal4NfT7%NG$oe9$! zvxq$KR<5>AKm#JglBTUsZeH-U;3OJMGUM$W@`lRwQY&k8MWr@J)Y|U`p48j0vchU& zTYcWz{LkNpo44#{cfn3yjq{F#>1DP)o?EyKIS?*ce*RE2c>Wd3&u<+OJVSQGR;|mc zNX{jy&xWII28p}3qa&QqF&c*9dia&^V(5i5&O9yq9{rs~sf;9;!CtQ~tzfP4b_Kch z`)IeYn!LV7ZO&KUk4~KYJ}n*R@|~7kDc)bXk^erW77bT?`3*pUT0mR851vC?_`N^P zL%DBEt1W;tnxaERMd80s@BeY`8dx!a3?M8VTQ-QIr5847;If+h`?1`Dm8_!WE4d`5 zf0V2+Al_y34anv&_Q*LW-N{FC57!GvB7)Jv?b@H9vxTI*?}pc35|Mi!D_R_U!p2O< z2a0?6gn*ZE&!sXg0>dt;YV+#^t;BhH#93V^`H||(m zOTn%jRSay_Jb~}^=^sJdPZXOqPoC2Z4?l@65Goa~aO-|Lox**^)-*hgj=(AduMzuW z2;0XsAOz^+a$^kXvZ+~UYGD-2)Zv=$X)b~Gf3i)xb$iZLFR%}1ZO6B^pTlLJKa0aJMdTXBK;`UR?XcE(Uq#7g+pXdOlZ! z{nhE7z$wRVP5I5{Sx5`q_hN1~);a8T;tBvZ!{fLGgUc6iIUUFdT(r?o;gNaMJpyke zAt4WbyLvHM`qH^o?j@+4(3lo&>;kg>W$Km+>~G#z^D3rY!z(%O!Ym@&;e_2wCC6Oz7~)WcKWZi z`L}rex-B z*3jJ|@AJ6XXd7Aoc5cCP8PkHCd0$z^1dovwGyVlUxw+qK$d?{Kd|-pTa4p`9Tcn$1 zF=@bUG_-px>VSQS_zoiOQds#q6Izuo)TquEkwb@aE0*0HC{QF)F1nAgd)vIsupwj$ zM=WfIubW)N3@`z4YQf2*lq9~h3MBHR!kcr!P*b}Eh7TxU2mR0_^ijDMXC zH~+24aMcYZl?Ox{DrN$u$y+9`zE!+~Lo`K*D23YOLPQ6H2}iGl1;$oex5i>I1W5gE ztWW>ruBKx9xlL>LWgpLX&+DyN@1XFZQAy}NYDs>mGapBE|fw*!`u9z z2z<6QU;jra1;W@jfDfme$THRDldx$^i?lm3)b7By?A&F^2?jV#Tp??ZkKsX#i>Z z#;UD<-?bqB>`rtv=go;Wl+<2YeM{v&@zWLJGI@>XEKn}gib9ccEq0qURtJM5N}-|F zWV8)gl!_gwuNViit$;?8eXSwQ4c}Xsf4pK`Ct4Cm2Xgi;VTYCgv>3TPbaF90tW=A)m(0mk+!g(T(r zL>=cWL&YG z-X+UsjMvW=(g+2mMuRpl%-=X;9Fxvc=$`B#v)i3ANQQM*MR#kP%bV)v2K%`$&>#Vg zF!|$60NOp;m|ysJY~S!Y6(}iFRPL|dC<=(5s+dV3n9rhI7E+V#?Z}4gxXow|+Syin z?@)>#hkI+r=hjZ8ksUkUY(hBtBTLAcn(=>J zWvv-^bMgJ>l7X`Expe{>`E=J}9%b;ovT;l)Q-NZ&av}2RlsDeOq}uwrL*|s)tLLZr zC*turvxPLW>7kN&OO5>rS+5bhd5-v3`cl{p)Mds;`kIvfp1vUaKAd z7uWYk>&6=a(OJMT5wFBOZ5rWMgiR<5a^{;ZtatoU*LI5sP+1&Y7Q zjZ>m4-8w8)d%8N6O1CGF^;2iRsZLOhMxVsxt9{!W^GB}29K_+z4U>mIQ%}0NL-3~Q z&c8W)to+(>Ky2N-p^$~Lj1)J2hqNPXX8=ft+L)`yEsK)cx#O$q1hwSdE0k^dyXKB} zh#Gu_41UZ3GbUvntYjqFF7J%#hO>j@vw7pI>x7j%UcTR)PtS*mU+OPVq*d;>5%a-?ebuEvi?>j6ntKkoONJwYsnrjonVaLEc|9 zK5Mp+Mtu3-;(kx``bBwm@i>KvE(}99k1{=&inlTrM2NNb4C7*;glt_h4wPv@HHR{N z;oom-5|NFI@KvR5oK%x=N!bDvrr(+3DM+KOxcDV5rx{= zXJ%9usWwEG%Ep^&r`D1QV=p}BieD_rkI7(VaAWXBFyK}pS8rxOg3QDkD=y>cVp;P2 zE1)8RTJq`f6)VZ|{-+xAbyrd|ZJ#K^yK?J~p}osG%on z6YkZ`_W|UWp^fO6pjf1wsY7PjA)i*KVEmoYzCKf!Z0;DJPu??**VhS1WYeEk;zrOT zU!d39$FYLh3lxHsYYC!U0z+)3L)#{qJ6Y?njj zWQOGd`WCqAIJKIn!r#Ug&%o}6e7OlP&|sRtff(IZ5DYqe!&@tYMZL^tMFEEjh}Q#vMQP4=<7M-u36u^Kxp zL(zT{E@BoVX70WgtK3u)cNz1H__s^)r>-ro$rII+eWcX%ro8APt-NQTMWL4Sfj8f7 zg)tP+aFH%i^cffDkG0ap%{oyt*;zv&%b-RYa5Tr_Dt{`{k3()6!1Imkz(+tMDQ5!e zd&j1Q`IoQ5n8Dyr;KYJA_$|nM9A*8MwqSqDfTP_8v`pyERs&Q=KqB>Q@0XWM7v!%q zfLWt;VkWwX^MIT(g=dgOo|M6a%H|6r@dRztGb(h^R1#qx-KHYHyzxZ?*>L}T7n1E& zf1OSKJ+k~qN3&`3@(u`AlDXR|4j-QVqLv!|qFp&ptgtOf%7W?bL< z!F@~ecj;;4OcUZs-LSXVY$5ZYSC;noXie@Y(P}Z%r`D1ko!Ak1P&c8ZBA$mhOc zS(9}*&2;oBJOcwUmB|tz0rU8(+NsqDoGq-*Z+873K4Ocnanv$?{+taZWvpmJ?Zp-1 z%7fLniFeev>DL|()+c}u$*Zj<9&o9ocEdocGOP->wEMY^JLaYy&r}*&kvonLwVMeJ z$voo#wl=!trUV;rc1N@xudJ;TUskl!^IrT`KqFgx|5*KtYsSAp?GF$x&vtH`nw7$J zHz;%iJ?uz_l5DcUdR*m%zbO&W$cpH_tI2v7S)Bi&lj@{pVh$K_^Iz6G9Pmi`5`%5( zNQ<>aF69_SJICwl1T-M;Z*JP!KDL-d^lur-Y{&RN8YpNdH{8Q%nY>@x-)@XChPGZm zK%RXGSOP(H5#*U{zu>zK`P~U>5ls_wCr4Z7H#5T~nRCGC?MJ?eVpE!Gr`D2sL+~s3 z*?+M?Wg6yBzRsYuUE0d1dvzXsWW<>^8EwUU@^B3OBBYUb7Xg{Sc)zhUPR*)q0$b?( zwCEfOGa9Mc&}MP9Fy>(wKQCsxFhl|xE)-+VztdW zf`T7#C*M{@RIg#}SX_-QwumlV453@NOwp|P>Nb+#DQs-sRy+e=oIl_j2ZpM7f?`u} zn-BvnJ-{GR26fqfKcbRxwprBkHKFl2bpjgM^6Mq=EKWSon7=bbeQ)!`mzWMIosCg4 zDqE||ZcetfyUDxm@p;4*z*q=KKyy9AU!MJWfa-c+f$NJwf{y(2 z_rNQ{PT0hfNvSqT(vx5#cKJZs>W|3q`L5`J9TZlR;_qMR8P}g(;;itQMb?_D#ZQ)9 zR=K-+Q$=}x#pV+&h|Hfj4+mJB&pa?FiMrW<*X>Xx!!61l3EA>fn3C2_=oW|jVSKT_FhfRy0CT zO}1^miboK+^fp+KrOFA4oS-e935INKBR^) zuFaR;F^(g`m>F&zBWv&NYexvSP18bRccK}>YO+lmHs(*>iEogto5x-Cf-;4(ITEyADzX;Tbgl|az}{465MX;it1Y^=X;9@#sFIOFM`$ZvTpNY7lx$LA~p z4i~oiapsi;7+@@dLk@}_=aJy<{(W=F|KO1Y(?5dj1FEwp8@F#ApN;VIa2j|^@M(c~ z2uK|h&>sQC$&&3`#}PF@4V9c}LLf?EeSHRvSvf9VvF2=)FrwZO%mmakV0Z!j2PY&p z#C9X96}%Rcm%lq+vtas1@}ixtEh5r$(RkI0)o0K6C@P>?Potf2w1Mz6iuecYu`C_l zg=G8p$7>M>I^82=;>B+n$+G*;8IV14|M}Y ziF~z}lr@W=slKVEi+-Td&)@cmHCV{GjZyE&h{B^A(D{RUmD3~*(FV*XmplspR6r`i z@NE6)XN&T8K1z*&ed40YsVwPM3|bhUvE8X2$|g-`-(%y$&}0D(N!HgRzIJD}A%FB? zZYgg9AI`&7N|UV_wtc8eYBE}sR)ezGoaGWlvt0Sroln7YIO(<(^FuY{nJ1~OvrbSr z49-vu0h2B)jZ59GzEG^4RVKJs{O4nMMF9=*ajWo2uyAu@{<_EUj*XUyi_udYpJ9p1 zY4rMr)!BqDV;w27!71@Jc;8b=MD&v@zI5al=4U;`HHku?aI8jBnGjM3%hHiH?|`8% zB&SV6+O}8FT>=_e@#I}=NI~_TMfq1>L6d;xG(oXTI1_5>())%aN>8>q*3q4ock=pk z$IDPZAr1I3-&jlf$nVSZr(fo*IYoBiS`_v6M-r^UY_=c?&447zaGm6S1f3+Hku7uP ztR}C0HnJf9^G9Hi`LDd*lCsu{xuV|6>DIB^TFkESt&_+Z$kW<0dj-Xik9JI4R{ zWdoNyM>l>a*vZ%S^hE89w69<1=^yG2wHW1G1EbI3!$v?O%s_uJc~JxT-E&`k>(f6Q zZyc?jxvS&{B8{k~Vdkr|T4p{f{{GC(Gt)CS%xs(4EWT;xqM0St$7flq->H6~dRz4! zrHiZktG%Ud)vcxPS6^H`uj(IF$4W(2|5Nqzsvn95s=i%zURAQHt7=`<>Z&?`br;0H z6F)1C)%>~iF|l2Ih4_4N^^8By*gNBm8Bdm;5ou=RW{loYCY}+T(IL8XhIGc#85NZu zSMIF*W#uE4_f!s7URSBFyu5N@#lJ=GR(x3Thl+f~gB7<|^jCOG(-rE9iz?=nZYckv z{BZf3<Tc@tOsBTW}7qy3L->iME_Ws(NYm>E3pqMw+*3SCttb?D}%@Z}bns3$wYT9cgk-oIFn2K~H5@~m~r(zmfV=zP= z|1M@O9qEs!bj(Or66i}RoZa0D#{ur~V8q=r+R>%|f0Vrklw?PBKE6F^CvVd3Y?fBi zuHvlvrS5)0fzCPSMyYeoxxutR79b3Q1$rK6MOb5UFhW2B0?YzJ2rx!O12SR;i~;Kh z2!SvXM*pw+z1h&LkNw|s=A7-i?^V^Sx^?T;t$V+#G}6&DE+Bp17t3>$lTrC?ExR&9 zyDeFtn9;foqho?8RCmuVYQ@|kSn^NE%rL6uA%#^+6XGi`-Yny*^N z!&(#;v!h^BB&hrq8u9U3#j9rkKx$9fSk9Zx-TWJ=JP__OY6O!|0WQ{$TMH_k*lf)$ zZ(6E`hQF+KHbZ&p0jb#FR_5#;D;=&js!e8oN~~slKa_t^D(`5mR5zfY^I^Y|Eym|6 zQhBNFr7~_`+N!mCed&~9)SbSzT`kt~jJH-WIt+X;ZKRdI72B=4&3-F_U(z}~U2buc zS*af0;$m{mY_?qLCG#=vnuo;lO0?>uecp6A66+})mBg}r&m<+&wku&HOX*@(9g;_< zJKp??^thprOK9uscw3dT57VapQZWa+R~q^a{4Jlg=uW zO~qj`-Eq6zD7q=SWC=MKl`UUVvC{CDYt1sUgd4nGN1&*uG6()ktfyR7sOXxKvKC$0 zUaQ}T-SlyZ0LWT8Qp+lpKyCKt`PFNr@`OoCmmB4xyqGVTW7!3nR35GQDW$#@VKe1S zr$=3#lF9=`j;++2S!dT$ck|rbd!=$`m}c{tuC2xUqgAhxJAjnyBmU=%!14^~t!mC^ zsLXv)e7t0JN10mCz%ac|Iuwa7|3sXYk|rFXL%I^vjg*oRmBAxDu5O2@BIj!O)jjyI zrk9*jxkAaaUUkl0DI48BI=b(;SYGV3s#Go0_h^uCPNVL|=x<4cc(Khoct?o}ha=8r za+gUek2Y(px8>2>OA*-jQgaeJ7q!T{rc;=+EWkf?MSkIk*w3OSpo@h%iG)HEL(uBM z-%8b}Q%WXe4f`!FKbQ0NdG(hi0zBHJm_YOB&~SJ~Me zpA#Q1_)-c;nNBxWRC*e$;@a0qv=qI{`|zUF=UTqykK;pVmg2!MG`U zXJ?)BV*yQaF%5V-Q&XE6&Ybs^drD8t5!)$A+l)IAqXOl!+t*BVY?rI}qwW$iF|B6(OKq5+`i1d7Nb)E~Twz5*WGVf>fwm2X18ND63LjQzVo+<@2OsnJb zx~p!#JDFBrGAi%4Q@%7$rMqmIqI|iAIlrwcz7XY+w5_c+*m8D_0kHipX&a0bf>k!< zvqa6wY^?1qs9z<1Fw(cikp-}n_m;De{#P$c#db$E8!Q~ zRCz}@e)*c%Y|`v9wvDc+wUTo2y7cb}IQC=}S_%-i6$RtX7u{+gr+Xa`}|lpLjnVQx;XUN$IUbs`1Q(v>4;@f|F_`RGDVN zUuqWk>4@|^l!jQWn#k$B4qK2_NX#7f*mQ_u;kyBSoK_UG`+U;ls(icc%_LP;FJyL% zIwAHZR$4+xDZ&jXmSqs6q+x>G82-v)BDjdR*_c zg!PR`Hj^t^63oE?U|E0_b?!gmlGi^EN7=W}O!wR2nvJ5&+PEeg%G)zK{?InD`i{!W zQEsb`vpL~3*~^(PmC8A;Nkud5P|n2HtN9EyFP66pB{@}5TN<8RO5v)qQ}2|@V@@4o z))cr}BGa;)VuokLZnk~Rj9JrHCz^FtqGpb7kwkpk?aZ>tRG2C^ycH->mOG_->}3rT zc6l`Baz(Am$3<Pvagdba5jZolKjzLh+=Z8 zY>z8+!-YEKl0K^QxvIAl-`>kxn!_*tb zn!c+_ro%a25+$uLAI@uZRz?(Yh?_$^-FS z*@BwE+TSbI-=Y;^iVJE0T2Fb{ZhqHAVtKOy?Ov(p`f7QtUaCd7%O%O*EO8BrZhOMb zNK2_{Dh_TDhoM;rDD%az!`|#Vv{_!?lj_O4VvNgZwYN*1B-d3reg^dhi>sNoI}|z_ zrDKpUz_mxx8k%VnOXu`<-djv?37_KdPbEp%^me1PK4mUc;lqd=dB>j=)ySro4^cr! zEu|>N*^HNcsnn`lm7{vO5T7kqeH|q=A!&9_y6M$vyX{J5{$c5Hdx~eQx`?vdj_Fu)lut|LHn*Lr_-g(_ zznLgIO6gsHmI!n-$i$O0!rHL|jdN+ABU@Z)jL5R0(H` zwopjxi|%|}Dlc2TjNNK2@%f0-kyX-a5u2&GW%>BxZ7?}~8WE>^CUvr=@b~+_TqRd` zPacM~^F~-2@*~rQv8S`ys2Xi-8KYez?T-m}J`U5xcrmVDYsk3h$1r3#)`8)4cXd>~4e0}njItYVg*-7+FqtOR@4ke_`Hec)d^z@< z@IZWebfI=&c>2e0x)~-j=Q@y(B=e0r?Dht!gex8NMErU~gBB~5t5}XZx6-lagqIC) zSx?|?;WP{Fcmf-BAOwt(@&2;?3Fi(!tgwv0|52Jh)+|o`y ze6G3Z^p{7q0@g_yWr%-|iVhkB=9XMhEWuk~WIbJag!s^n(S(=XcM?{+`fK+KzlrUT5an})LIZsp}GyP6F@_dV;3>pV*joWoPWJdlfxvUy17EZ@+foJs__6vKycJ4Ub zfQ-$Ot#ya!q8FL1&%Ac(ld>HXKO?cSe1wK7vxjmg;Z)I9hr1>5R_B(# zV3huf6g?%tW#})&9tm@;9(9QJcuhQB>lD)ozL=H=_*zV?;}w5~&HH>3jLXk$x`X3d z^njLpwTP~u&B*<_<9z#FeV>CgQefFl|gO9z*CEMQUb}UA}yV7;0 zbg)UV!me+>31QLamlDKb%kT}~CYNx*NYEN%RR*iK?l!lq#=P+CcQCx;#lTv5uW8u% zF1b~WuLHwDx^borG}P#bA?1t5s89|UfIs;jULP+OJpph1K6%}@4pa=pkY5M%?*Poc zZ6=?mE#*cVVOvphUA0$u{9kc(I8GDP->*ondE5`)gv`lSm4i*Q=2ny9jg%`?P7C+_ z5N(ea3#T5;*oTLH1Y@}5vvAv%nI~Xwf069A*#{@->Dl>{Rk;jF&wm1I1u?vnSb537 z&jcKHMqYLss9>U}Xvf8AQ2hbZkR798GTm1Q-~8aC`-b=Z0X%WgvrgjG#Vdyn@`NNQ zEn`ZmbXhHD6RL|aLBH`SI6s_E5}vv*cZJ}3&(9AHpLvRKmUrETT13nZo0ZBLS-DP8 zQoEdNHI)&&6ImYY+BQZLsQ-u(pN$tE9Da6rK(bl5)(vOAt0DJm)O5Y1Q`KzxLZ>2K zUVijh$gMG&P;EW}M=k!-`-c}jM{b@R>lV}_`agvHMPre|$ut>=y7YOEG(PF4QO_7n zkp1#6ND1-pZ`eD0MpoKreA7hLryzG%%rQ5HBTk7Bft zjc3cvI@$@IX@^QA;tKeKtWvRfY?Y;=)G8n6W2<~ZMe(SCQ7M#X+M$ojssA7C9KI`X z^7LWZ6&!avHaCt+Cg@dVD#fp|aSAOc`1mSzXF04BDHacGHlyT^t2mxMc`7M8B;5MU z^IMN>egdOZ$uICdhwnQ1!24uZuyXG96wAp|abC4b@k;qBOVf$fSW?BU%HxbY72~3u zLP4KthdIu{W$~TAJ}lhw%=5EnNA1F`9JbOeD3)EB39~N$V=J}cbt)0VnrB9yHVbtWe(+YVCUUBqlJi#ef zS%&6URm!M*m0=VNxI>v@R7t5B8soxZ)&<#ZGZ&vMUn847+YYa|(5M}{D@DHN3Pygr zG8K<8*cMh53D`NHoQxPnf=YMqQY6^LpRVpmZ%{7X!#xp<8uF=DH#YSs~=5J?GQ5BnrVq(}B)=okNE?`-1 zl}5S&Ih9N$;w*dSd%y)J*WWF>;2qiYAP_D-1N{BX2rC8;YN^Uh8RdFgt zp-86WXShvH9p@A$fBT&5;*)pmIhWba9l~=*?e@)9XpW1eIG$Z)lx!SJlvk|AXnY+l zXHp6U#YCgY&9y`E{BcIH_TA?%Ir;hBvU3*b|J2BBn~g-}DvFMQ%amX$G!j*=M!8gK zH5F$Qa)@Y%JTht{Db1^nGwj=+dhsL{&h2|-vuCB+|J2OeWtUILu29HTx2teqrwBLm z2|4)~CI+zvX{w0IV=+D&Q!3By2E5|9lH$N^|9JG!Xwd%mhEAUP2hxrbJfMiOOpL-@ zP*^&&D!CeiWL{OOxERgFD7hSBeDizg<1EGS!s*-jLnq4zWao%!6-UI8xCfm(IVas$ zi|wc=h|4%lt#WeAKAV!OR-=j})(%baT#}B(nK*N%9qKqsE5U7>?VJ^C|5H1W(fqK= z+mmdJW22awXf(=7+kq0pm;`gExG0m1v6~Wy;^oI7yoHyYvK=~EIv_h|Klq=T36o~7 zlE+e5?J6Z!3X4x*>1b?Kg)Mqj!Qq~s=6My1cwcGIRLbL&;LgolEZCoVepazLNEhCy z#e;i>#8kdw_M0%S_J^7bO=CA+~iNR2VV(B9n8~are~@Cv2&h0%)!y_q5v& z4|Xk|Pa;UZaCsz=0iQoScp<8>uY1pELT**UT%e<@&t&&j6JfPj%?TMa&M}e@wSDSx z;sm~L_*)q?PAGW(GYVeT)L_hXv)YW&7M0ps&x`fka}f26(S%d7cO4ym^Wfli;>Zmo z6UkeIaroP6hF5VNt1j(udExIs9PZ+isA7zUEIrGT6U^z!0q|K|>#j38qEi#IwHUa7 z=4!md;nzqy>)cl8n&UJQFn6U;33m4kb6W>+Y!Al*B^#6SmlaN9%w$6d(5MstHj7S- z(S#!>KX**@`@eZ^fS3^Hx*NkP9xOtUwqDyzc3Wzry=j&UPhAcNL~eR;(b9PYL1zAd zl=|l#%~$OkzIl2u@~?87sVKtw`DEUx@$jv7NY6=U%?IWOyOz!)At>o-;5B~%V9Tyw z{>`4@&IL@7bTH0unY?lFMYA8B-ZB4*WoqUpvOHlZA5ry55Wc7qvsv2ar`5$`frWUC z8It77cMFdn8|>IVPD6n5#K`e{@9_F7praoMoEd#ek@saOht=&bC>nNuSJKcwz8|AM zP7_0lai$-x9KZk`w62Ho-J%Dco#{40RaegAYNc&Xzfzos>vv-w#z?|b^RI_L`DOR5 z3{UO`f5Y*b-~fm&NPIP^rzy8O*NAxoc`Hf4gpd00mH4Q?CcW)rHw~AsB0X`fht7PF zr)aDK#@v8NDND+ka+0InMZ&@gdNM{59-H5b*(8a%iYurF{`dqdK|Jvrle{rR=iGr} zBAs_yY3T@*+J$BMV8o>Cw}jXw+x1JCU1QT8N6v20NF} zCkg9|R~}n?!ADnyZ@P>OdT^b@%8L;JjYx>{GAzs5+SR7Y0{G7B9GL%Gj|_Hf8>0!2 z9l2ME19<4j0BD-A^&~nYI^KIVa$G29Gdyq0HoX<4;JRgSY};6=pnm#Mvc*;v4yMMSHbYbgZfZG&Um$BTtiR}Y*Bkir@wKKBGgL2R(0R8`xw(PiPP=~fgG zm_p%dygy!y*rSkb`2VgRz+9rOD{WPZR?*0KnzndCl;F7*uZ$OCHhydwe(Tx+koM#2 z1aCoXG2sNjCKILnO{0Ue+fz|NbsVpc7Xv7UwGTgid|;HV;4D15C9q|AVR7&LWwY{` z>!*xc0u%p8IN~OP=LBCi3C~HFQ#T`&tr|9FqIIg%RSNO~=Hb;Z#5x?O4P_7f5xB#* zYX-Nj0PM|Pv?H&m8xGW-VgwoNkxM%-zWoc$U@FY|I9^63bYz)D>RtfgjrcZ; z2QIqM13;=j;8ulXtvKoNmdSGHAaeGiti}l=M834rof{zF%u9(~G&qcPu zj+G*^#}c4=pj11IX2xNRkbJwHQAL+4aRgMJ3qo{(rv=$hU%%i_0SEorIhfxW-y(}IU$&T@d2)Ks>=)(- zlNt#p;6>|zBaooq#<@%6yd%(RaoRjP$J+7d1X(wDIusWfG(rF89Dl(#Xg zux9!q$Y_TbyYyd?PV9Qujl&On ziOT0#FQ5uhVQ}TD6(7y;3Try#D5nZZ!FDe`W2_j`8L4hB8T@Jg@btX{a*Lx{CukaC zq>83gtEH$&HX8K#HG#MHG!_U9%-Xk(W85vx=JshgK|Ve8vBADeY5pwhUiis##S=O> zBOFf+7J$M#!c7AtF%Wo>N#0>ZBI=+eFSt`!b{C`yJL0cg8QyvCMK6&Fhco0$d%#sk zB5NeQ2XvSLLfMc3jCo!#W(G$ANqHfvK)n?zwiwq!gym(m_bWCdTkJkR^3W5^dp&J8 z0=}3=9t7Il6|T<>j_tYtQK;VU*hDp(Eey8r1$-&8gBK7kQXsjnk=q+Sv^qn9ED+>7 zxFD5)%PWMByk=oHkbejNQxc8k;^3VZ;GyE+ioYraaM(kLV|lPVuuHm96v?kV=4?k}bVhFLxGiqRYQnu4c`tJpd2fscwD5OdCEW3durmDGU0BD^Z<}Yd zHGd`2a(TUUSMISW0}-kHd+vw2c0Nfsp+zV*QU*`0{T*uh)&0ae?^!>K3Bv31Wrm5W z8?KJJ(9Hs>bkwC?uY_tkMiZhRuR>M+%%=_xTdyRN#lC(P@AxccopgyqY;3DqiYYnYwyr-4@PBsS>Xt4sFX6(DYmt~ut{*g5pwO5ug0MK73s03 z0G9HTDuSB#{~gh?-Rox&Ny45Wo1#r6Q(09uWHgC_*o9l)hAxcJ5FX<>8`!dE_}RCS z@4*~bF~s7gp;Ye)Y+cK$_)d1TSn}6Nx z=Vt!j^Z^n<5*cw(`wSPgv>soYK{ir4sif_(=%~NIJAN}1-7%UF6+S8*o^O830H{b- zW7$v9p@vx#>?IRgIL<-5jF{1Oi|!e;+&sgn<}W^ZGXrE|EkXOjh#6Tj%cugFZQZaMB^m z5K-p>lg2it(VT<}(+w9RRK(-1a5;}ZYGZ`LXK=(QjungeD!={=ju?k58w9E&JGxBH z8aoO#ozo~&oj`>%BWJJsb9jBcSdb|W!X6-h&Fe0B`}BdEt%^L)x8BBDe+Tc!~_a_~F5g_#VdwfgTYVo^ADDEV8CteoxrUR&f*` zRkn5tyg5cAM{(3fK$ZS@>fBjA^iIsOZDWKDGwNW)UQFwnRVvK4D;7Xwigo7Ri4LAm z5>9;ay^voggnh!--+6A8zxxMFvvp$&`YAF_H;V{yCTTNSBaF=zj!GYW^SiJx$7#X? zFS+kV;qC8|=J@mP9vlH@kI-61-7}@T#sIAfgzYMqkpSk3{oC;#eDfF$R-zxCN#eXB zG~RP=C+~ajh!g-5> z6yHDCbO=#wS-ujOO}EGtlM7Q%%)WBwV}vUYV;0>T1ZG3DRwRwZf|hcXd~}{^R#bJC zs8~n0j~5HFhiRDmzW&?2!^Fo&HpdMDup$chc4y2{k|4Akay>fYNu?EvNw78&}QpdaWs7B$|2Z#hYp9X}x-ytCVyMR&q+yle{ z;@nsw!#XmfFwJPuNY`62eYo0%W)&6d`Ma;9o-vy6j#uu0*-3k1-|$yoCn|=nX{fuX ziZ95AZ535D2UsqA6+-05seOzlJaEU!8-&-lt5d^&`Ucre?}}~^7!+~kbBdUetF}_@ zOrXo88I|zmPhf``D-|BQ`*O?BFdPJAI{?|(c2Jcr=W-itWtS~4eCU%{>*K}5ZN)NN z{SAB@qS#xZX~HGTs6ga9 zb*~gJPo_?(oErfk84E!*}051$gN z=su1r#%RKcpJFBbME&yp!yi0Odg9#JLFDtOCz)=yr*&rREt|HLm3#Bz2i^GaVEgj< zB*DFJ=9uvM2jcsO_diSq*1bVcR3u}o#tKJHudc$EjlmF)+%vEHA$Y+!R*W&(1lpYZ z5$Zrsww>uoIMmALXuGND&p3nLT%Gg;2mSL)1#0V~mkWrEJ}}fhif@rTki1AjyQrSL zdiLb<-kGn;yi>xC%d4Lvu9tTmzRSCD5FHggeySB`-UtVzVAR&Lw0lWPc;UA(^0)pP z!!|}k3ZvjLq5p?BVwwM%EOYE@d(m6boLgxs!^RG$R8{!N6% zOO;evA|_WwZ8KT<^xpnaOHV4P%}GcD7ZQbOv>Rn)=!I z(2?_th3FsP;C1J}zx=>3@_o{g#0G&<5p${-3KgbJyXx|`$6~hg21-!=7<@TiEU5of zvJXG?YKomroM)#MG++s~?2t_=cRA}$+;r{_{LO=YQ`Y#I@$k`g}h z4B3EKm4ZEY)W@D92%OUW(@&y5**o<7f!sg2HZH^1iz`W8X-3M0qSd0XR*VWwPI&(3 z;Lo?LL+L!9B%GL3iTcu7?Zn>Uv+LL+4-iZekw43fIa8r(sZ6sNzgOXroskp0*dpZL!KP`8~M0A-QhOlBJTBx7aL!KguL$e7|}Ag)+G zzf^dD`i->N+3l3Q)$5r;;kpVC0I<&; z+df__xKF!p9R9;o1313s!@6*f4Z*FYoc9ExUP@dM@IHfs)j50h*mL5X-O+x>%J6TV zCM+1=xCY%2??~Kgy|PVdn1qw<*wPv^?%w_jQg*CZ_T*{Q3fU>6*6>Fwf zt958~O2|ArICg>J6Wq1-;giqe?r3|%k@C1`cek2W1X?v5qn&?-z3Hz?tKY3ThJ)$9 zCpmVXz$y2?|9f!Nj)=KtZZalY)@%&)EFLW_DF1?i8ZQ=3z50Z0_^H3(o=ce8zIN-5 zd^}X>(5WI*Q^nIsbs{f3wsUQ_@XGCLJGPC{MrrV*3}?6QT)Sm20Q-^C%nx`PGlSG# zZI~>P&(_=~Rlp#4L8`F6_O|~$x8uzhtsw_O&(7L?!1d{6ib!PEA^8iP$k!p<9z_pd zdeIum5AfHItfl8SZylIDYdeto5LtV0CF2C}2{IorcAp-3NFBvdHOJ%>MV%WraN(zg z=)DGjxG;4n`}V)Q zP9_lREbO5-ZQ4U&J#OPBD(gV{1g8!+RLG6s@aZW*zaLdymdTbMb5180epHa%^W#m^?Z}Y4aCmKDuf3Nhc5@_6 zLH?s$o+hJdH~J}3?a@6KrV1xQFAl(NzkGvCc<$o0rR_71FJH45oc+lB%O`nRQZ$d+ zN3w&!bcnJeVJ~-Bx>jJ-25-HdG-U)gvj)h?o7Q%1AEyb`qjy}j_O*xh4o}~-My?v{ z8w@HErJ74`wHK(4RbBKKfTnCKh!w3JK}F-Vkz;~z=kz!C4xc%)rj{LWY;b1;w@ODR z8ubDlHs>t5Rz+|zYZnRk+^|NVG|#8J?647d+dFa6_~i|22HAn*XTGY}ttX6Bw9wIc z6iEhAnZkRohD01IMs6|yO^*Ov4_^b3xSu-HiHuX9v}jm0PaCrJa*Gi^=7ytd@cucE zB%D6gz#jC6r-7_;l!#UL27wq6H}`baW=7&!+QEb>ZQ7sBiq)hq!eKh(8|zs)!G?HgcywLi=mkxEnhqP!1SCf zHmM+Id)#Sb=OLj-BKMd*4Qre-1Tvm*CYaC}#mTzWfu4<#gy{6Ol2!B}$C@6@c;Vi!NIXM zOVbk$HMtH4)N%$wY(TB;*gj4h0oO0VsauZoCH}D-AiE!J9T!~ro!f;w@}EImQ28Cp zf@A8x-XT2ko58fO!mI(obc4hMiRa5$RnFB}bthsjXd*?IN}8EPCAvLMJLfD^RIVXd zWfTQ9I+Nup)^v$Znwlvtm1{J$BQ`m@ZLC;0wf!Ymti9;Of#D+z)(p;43UG)x57}tP z=TL-n=2E8+jUbo9X!t&UJ=pbplCa}ZIkASmc={7BSbLG|0Et8rtKe-3FUuNT_Hb#nF}Cyy@%W`02U?`H6ycjG3sB_8jPx=c$k zwyw79?&y3xEbG@pSUhL}|BaCdew1{&Td|7k^lY?HLSCrQbT>>{%Hc#IV1glrtgzRp z@$KU@;Q<@M=HNWEfB0)PsmQZIGR%q$5vayADaPwG*Nkjki?C?nh#qohtXO#2y-G>> zUDL0TOP&q=nJTokT(ZE{Xi8`H*tlQ;R#?)Px*L5Nr(rg6CKx&Re8-JN1vOTKilkGW zv)ZUo^_ksy89EyT5$2jo{cmnIwu-XSWppVLD0U^+>NkvN?S7iDQ7MMx%- zPRZ*n7w$4if1WU{?c6p-!(DW7g#S9c*-Spmy`e)jq6{l`^+7FN4QbnkqP(inv0^o5 zFFtFWHbVSe`@lc$AAZ0qP8A8566>Ljl)}i^vfXYrSPay&dGV_jjacF1G#nLQd-Jeh z1XuOvmoi)4D)UdwerR?u`!^GxTDWC4x%lE)`z$y6d)ZHC56^Dh`rEBPSp4GF(-Y5c zecz&W>l?QA=H9aKnXR$KsjZf|mv5!F?q6~*eqigw%&+DiSY&3tHL-Kzn=_wYx@>N7 z;X5;bKlAFD+T8j=VY1I>&rbhz@ki5NTlk0R2bcN_)Avu`JzZS7e({ad z{^=X1k4`Twyk_bTQ~x&g@I-Cu!&7Thec5wU>4hg34@@~_{wd|u#Zy~l_fP(2^81tj zGtU;cQ1`K`-$FPD}BA}G_`qf5`s<(8gUdIZ2sZ(h1{K_~mz!nF$* z&Hs7g7xO=x|L6IS&%bs474xO}!2HegSI%#r`_r6v?giAuC?d9F2nG;U&ctG!oLHc- z$CGS?3qd$EnijUC`h6I7Zd9 zd%6nnUBaeZOlMBkO;O!rd-{{tO=vr6ZIxn8j$kP7ch*Y@orsgsVM4tiRf|VV`FuED zwJSAGOo-qP9epO4r78t&-arGufVt$2Vt@1*Xq*j$%cX9Hg4y)KTgC3{ZK*ozH2alE zR@F0c%8NzJfev4&^|L+X7^=jyOuLo2`Kb837OCGTlRie+V*n@+1O-{$m^fdsHA|MeR zZ7$bj?d?jp9Q1cNi|V@XNH0Wr3sVbwJ7#NLmk$)!C!}(xD~g%-IKw?_EHCFS6LFh5 znqIxamJ7a0E(`t2!dxd8pVu@g6~ooovdw6;Al!c6Tcq-GwqGOZs@!U9Oo}?gTrCj- zbd1W?qArETTssaze_ zF`;1BsZ^JPTs$@LF0ou4L_kc=k$3i>_b<9sp4>swUL7EW2{4z*o`E$aZ!q>cE^T2RN^T&5m>KpF?0 zYbvRnwx_fjRC=q4x#X&qK0)2+s5*?2F@+PHGg(pjYRc6av7ag=VWTu&YX+zvu?V9) zAfj<}R3^T_n$wjCQ)rpfbb{X_J#V0+Ox<8Km!rUbETMpAJ=rAruE$zUVc)~hq~ z(swCxr8aHj6Gc_7Rzbe0os#%bBvdV?UeM45zNTv_vs05|H40YQOQmf}lR4G5M%{&3 z5yzp!<;`8X(D1la`YfLeQ1&2R+R0Q~fL52^} z!MIl5r}>!LtDxsaJeLmDt@fy1Cge+*gKCYFWxpd%8P$>3qOH84Q?17>=G0U|te>(} z@^nCHNha&%pp%Nteo`!#TeKW2=NnlzQ$U2g>bkU8ja(It=PePx!ERQVE1660?n~ti zs{_<9YYoNHv3B+<2@#?f4dhvSSX1iBlVNXWPTY3dJx@B&(>EjaW<8N*qtl`|Y47Y1-m1MLI!SIl)}~h*YlAadeFhHPsQX#uG{|CB&~X zhO^m@BiqVH;~{5`4cSMJcML{Ljba1paMKa)Th&ZFq!;VyX`&IvoK-tmo5GLNLP!Jy z0xx^BOf}GPfjvVCc|Q0tv3@Pi6{=b{?^9C2ZY~wLM6BNt&#G~>?Zp!fwJ{n=``#%& z?ubx1E*6Wsy_Q%A2H=0j;{a*vSdwWIrHz_{6{p6ajb(iQEIv;IUaM0rtLjN*P#uqZ z|3$2xrjl}CbhPrNa>(Wn#5_-m<%j{#(XnWzB-h7-9Z%d-7RxPRVC*y*wY?Wh%WH*# z=N7S?jeAOLzur#tLY&*5XY-y}sh@VBvl%-^zF28AqA6Muh7Q(eWV%5hYWLK7MLKzC zNqU^l=Hn5&H6AKy{B6Z$Qt$2F9MkjAe4)wq+}eamT8ef>QO9;PakD4RCp(TleXS%k zY&pG^${P!sY)0P+Wa6to7pu3$U5bWEpD?)15lw*ECv7qp+*Q=P73=#k6@FTXe9w zc#g7-=Dn}&=-b*PmCTj$@}Mhe>qKpTJ9?qr)vGub!Ykm>)u6De^OkGHaz)ghrTdNq zS8}*KO;sdo{*_4Job?ow&A7eFmOFp z-kH9o!(>=*(94Bf=>UAYk6$UiWNBIS4hJi*`E{&~231C$)fw>J*xNPT?t)OPwa>0~%QB-UeWYBQ`;UH7`OY)Ros?0--y&!l6NwZ^MM6@O4`iXZ!v z*d1fqSx)-2K1aLXi+Ov6%O8`T4{BSKzNY9!ay)C$X7`A@a>wZQD49gb=kciwuq3UB zAfp|l0ypTkQZ}nsrdmEkze|&1XxQU4V1$y4JsIy6(-+6Y>d!f?CYw|;x$o^udq`xB z?C6%siJ1@2-nqPg>N~iwv&)82_5I7ROolgrtnmuj$Tl~2IU`=&>=F(oVPYDii5EAO z#_4uu+_WnpEcl5De5_bF@%8KM!+ZT}$X6HJAm}w>5Aq5(q9=l- zl);kaQbpvz{Ay_J==Skq;dIAq8XCiER+yOeG^$xlqad9pV@Gxv-6PtV^!|I+z8<~8$| z&wX|7L(3C$uUq=rTouL_ZsNVmx6JLGeRlGa`F~yh&bBYjK0f=o*>`N)n0@(dV%9Kw zC2+x?+}i)f^6$2O1h%W@l6-4$E5EdJ>w%g7UVih$mnUzUd1B`D%sc0wnYnxNmYMX7 zS@x2dYi5>~9Miv@{?_!zw&kYRw!Lbpu+1j>{d8wKGJV5@Ty`nx*wW4=`Qq;Zzw*h& z`xalac-zvK7hkw|>EhG^z3_9{Czo$pdhfzl7T&+`nuXGWYwPkQ%f01KY!lScs}D`c z?i23Zf9lpg?ywx>S`2`C4j=9kdwDLLb2B?-hbC{FaP-oQU6=0Kb85K*$dq=Z1qtU2 zx!pa9N&_Y}WAEV}tf>&z^L#Re4jH|pU1)(~1X4bCD zWcra{AV<<|;75TZieK3;y^Om~Anqbg%b`Q+c*Kp6c#Hl2Dp5J74k_1zX5v1Jc!xBJ z&C2iin@uW$FWccF$?*|y<6YLCOScdGtwd!VxR!Mk4SCpE`bY)hK*U)fH=C5m41!cB zCkgo~n(2rSUyN{(U5|;>0;(+J?KwXc?&%SrV(;NvwzvHogo+DGMtCfq}_zPxwe zrdQqpY9Di)$6YXX*PgqBL@kIYbRg5axi|k#v0-RiMSmxPDMAOb4%&lI6HRvc7ZMd= zE4Wzo#Tlm#*VI9?oLt>b*CeXk(eukO7WkMzArd4xI z#7jmB(>F*jQw~IBhI?)nX@QVl$N*P_Om=ZmqGHm}(Oe#LjBmnXjp+1p*-4Q~LZsBa zFydGvz6>}B(U?U)HLW^0d85pUFr_|m6u`Yc18zs~8TzR6OkDA9dj5d!so#Ve}`b0p7^aqC96J* zFtuD?T;zc~!ffSpj7ZjF81isoh-47a#o57|7#3=4Oro|OMnr8PBo`F2D3B#d&rE+* zq9S5VkLXTE9@&;?%wac@Gt(1~NL099_#sl`J#c#0sdMzRWLYkcrWm6GA*aV`DqvBl zAp+p_2jR6`5nt965m}Lm)ccri(-nB-i6FU zmx_iABofAwEF4Q={_pzYL}+pl?FD#Sfb$YycROBAcc!IxA*V?Eu>p){$NYtfG{`UX zMJi^O_GH03@OyECiU8nXBs=jgiQ0`2UlW}hJxYT;!<5}<$Si+PqIUX_?#MXhz~-aL zfvw=L5#}aGiwV<Aq5}hpznL$PSsGEX%V8yFF@0n)fj2!xo%AY}P9|qZ z?6h5H$RfcNB#|RC{R4@L&_d+2LQ|j?!np(j<>T_jnb9Po=8V&q$vJ#r5!wLx041Pj z$j*(J2ND#Vn#qQV0)Wnwh-eZrI&-hst2~6D9s4n+8NM}yCBd|v(PF`?5JL!V23KG@ zJB}a`^ZJf#v<^Y#`Vn6kYYD>v$po>9Rb$BSsf(S)#?%96kT6x^Y6F=@6pF1Qw#3VA zECq;$I20D_cVKHY)js%c>0P*D*|FLXi>?Dl8!dVG5i#2`o78Ym1H~uP&tV);Jp!?N zVP;uUKJq{{M)EXY9F+v}#Gfk+`MB8IeA(f{PNsu~03`&X7rIfNo*2m`(kN2vqVJFT38vvUeTGQp3L+>Z8ICUuPk&iE6IFU9j=cciw znM1D-sfN6RY_(X6P!ecF+T+PgW@V&W;cF-&upo7@tO)V|e7dj*cYk;Jk}Z)}YwxoZ_qwEU>SAZ@ID=5bdT|I8caQME{;kVB!F5P|(*cp8 z9a!K2NHRS_e8F5jH@)la%fbs)n2eY(g=Tw?k{fj##k!9JxK8-u7iN_pv5pW5lF7a(M6n1Y&RCs{pp@3pMi|D=20|6E(Y%^@xGU}WG zUpoqR1|RfBcm~h}$nx0ckvaz{18JGV@(Ko^51O$~!kukb&tsVTvLjozZESmZ+k1rN z$~`Ob7cO7AJiYWEOOGynVCl6>2%+hDT4WtL6A5`0u$Tkz$TXO9lnEn z^hg8A<)Lyxa}Q$RdKejQ5u9Sc*|~$yN>s?kKrs?T zazUI*ur|R;c4qHuL~0(Ko5tBl--a-vi1G+NDDJ#fqCzZTxni4vy3ofItD#CovU~59 z$Rqg_feK@%kq@y5%??}6c7sGEx4n?Met8%M1E-EulBZTinh36*aZbTP#6bj3rd${c z4LZL3;O{oy#mGXCV8n`M7LpWkv@08vhsmBDQBBD!R{X!^VXPFyqz33K}A+R-!<~Ae{#xj8&&EMVrb-dfh z9OESC3*-2MT?9Kbwoj;N=HANZ#Husc!StA4P-&cVa>%}D)c5v%@eDPHHQcl0$%2Rw z=#HGBux;Na6>`4kKxRq@78eu_>>7UV;0Gltj-q|CS;Q%O5qeP2kHIz5hmVQmbPv@* zNaF?9cwvKi=Gz|W*bCDwK1366={EkC~o|-td z`L2^_&^?^`gBY_M^m|P4+-FAz3i2{Jk&I9ce57H>0AC@@mR`4tlGqP6JW?fjsW3c0>MQP+;kv!K(R@MLWy%5F(`nm z9aunQGo2f$IT0T++rUqkoWDlfg3&FvLk*aCkMuH>U_H+0_!`VJz6YwAy|XAu2qKQ4 z#bEi_i*7h&lPAsXm5B5%U?ng$I&+^KoidIbw0uaw-IF3Yj>BRcx=I8a9galMRfv?B zymONZqlhy7{i%N1!K=inWLouUHjMoK6n*S0plr;elBR$7CHjT4I~0J(-#1O)3VH zAuj0nBf=QRJTtxZ4HA__bI#zg1CG0)yvNsI6H zX5WvpnwqF9l9Ql6IifNba4il`PSyU7>lm6PXYj-vqg&JP^_o6f94DsYN4a(#st8& zlLN#Nc7pvQBMZ{KLQxAdq9#LtScv}b?oN#qHj(Ov@Pft)FLu1mKx6JK{a&gWT6r3) z2&M*K0tafO@5NUz`y~Mq$>D5I4nWw$u<6oJF)>{GM;bV)hNcQ72@4GZ6^`=AJsUJ+ zR`g=kcrOS?d?N3$_6fWR^u5BwNK+*80(%3xlqOOJyD5P#arfIRX6fY)SPeQG_`QfM z!q~r{{7`$oDN(`6KyxbMV3{L(I!p&^*kCiw zM0ED<%AYr>P~cG;#>3Z#?UM8wD%bA$Gh_@P%CL@MPa&sLu-nuqf#^ILYe#Fw1yQ z2@U~1tXN$jxBrLY%Q&6m=wVaK{IS3ov3<>$_YwI1i%n zCIO2D3~dkN zg3TJQrzuGC?a|JQ0mCRUjk;{mN*<0zcp-*O7vILf1@hXjbh-Ef3zQP>%fR&NY%*{l z>vwdyFaS!JCtxMu=Lfj$03)-tp>uTv$_Ps|98ckdU;~2=E^AwW=fte`cXxVcXYs)c z4=ks!$$-)AG1B9IA)=iy09gI-6&`p#z@KoEYYlV-F{Q>1v_E)>s;DHQ?gXA4;w6{uZnyu*f0Z z8=M+pc>`#x7T;L+X!o~Zj~Q85e_)}^z}W<@aAEcBPBpmBqp?}4Y{8BP3!E04-^^%t z2%UJtgJIM*;Xy?Qih%Eztj&o^_q%X~ZtdK{!BPqx1~7K8_^$5UNx&R{2?!&L6;5M? z8xJS}oxQ$moZvOm3Whw~TtIt4OP~@~c0+f&1unLl@jgo9_2K-ihkpT-6ENpOYSZD5zKd|8v6Ml{@92ka9?3;M=x)VQ!D#1Poo3S3h;(%oX zC-2!YG7b=e2IeSqH?|XCC5^*`)FnGF3$PU6OK3RgV?zLTH+)B&^)jOE1iskbGc|F> zK+l-I@9e=}kKQ1%44do>H-pdU{`0K(g`g{esauLBOcaLd}+_NDO!3yzR>Ek{3@ zo7QMb6ZQG@yg#pvg>f}@Osu2=(rJXmwm!?@IEcV8fKL9zKnGDpTCh57v^>ID-8m*` ztjUn-MtDdTkRffssT6wc%UdVg?HdKEN;{5=gbzR?V`==Rb)KV>x_C=&SGWZLo=ZIC!2Ce zgeKRbQ>zQB*Ppxudi@h;|DU2=hqkS~*EoF9Roh@xXTY)sdj$4g{9393^B7~D!j4VU z^x@jV>ecTrfDVRlJ`?T#-5F<~UG)XcI=4YdOQfemz%%@f!hc#d5_DyK;jZ@&W@nrY zjgyRXn|t(A0B*OlwGi9@w-)d&9c1BH3`;0JPQqrH)iStRGw8n7!o<3h7C}e8{PUgY zwCB#*fG*+x-SGi6JEXpOKZ3a5AvAsk#F@hJ8BXM|3bkN$g~KkG1#r|4c4CXyA?+0l zQ!^h>1RZTPjOf8DKCllaKDuz%$(42;dhVmJh@4DS+xx%qWf<-U<`>-4`+A0t44fs} zH~7!7`snBS{1ffz{r}2gtNT6)9}w`+fxSKm zL0ogoY@7ci#3ya~5Uh2?2d3<*xf)EVVYD>)N-^EQ8n*`hYY`8Xkaa|~AEYR++}OVS z7Kki@I6ObB6C_xQDFqCA#-ndl96^UtTSbSjhNVV8MTgy@Gm!WfADwMWuEFt5j$=Wn z36Y>tI%zFi&&vx;SZA%K>=x)(N+DTXy@O^m%@rfgap#Z^d4F53rzV*(aB z_{?QzphErX4ef94!!3~=!@%ie?NwR<^q-OBXs;%o4w?YlxYHxG+ZR?(33=$~rl&7z zPyFzORU)$B9=~H@>l#s}XJXUf?*^vFE*E7+Zy0{0Pl+-90H7U!sxX)}+3h?)1x?|({b$bcXvIF-WRZiWECbZrKJ@aS(E}d zJruMJlNkr3I~o{Onu=KNIlKAss+UEXQ8nfM7;| zE=Qm{$efVKs&s;qRJ;kljH_AVq&q(R7<7k#g$^E^+=0H`*I3_v^f4Ux2eG{vYMaQ> z<*F$+BvdALWK<{ zc=VCmV1f#$kRi`&K+lY=8)(0C8-(gEh>>L$5-D`SwiVWdKEo7~GAfq^uh$%4PTUDX z1Z2Q6cz8#9YRz@~MacCzfN=o(6V90U5hmDz+e>izz?ci#Ci>pza7h12xkyxQ-}wJn z$pO&z^9!RhozpyAqTp)@{4N5=D>(Jkk@N0_4XE~c*fmaC0&&~DC*TLpynA7K2H(x# z_ad-K;iV0Z)^MbTI~>Hl1Ch0nyBAikIY|jL^}t6ro&d4E2ctoN*Al+71-~zR8wl@v z;N=DTEYjbzuzlT0xiEJ(bs>Lui4|O_u&;ElZ5gxy--({&h5?;_FLWN*kCZ%2ax{D3zKV4Rtf;Je{Dt& ze))rUysyBHC$KBQ-0aN%=e`0{P{8ZhobCPB-*_GDc=s*1SAV!i^kD#OIMm0CUNv#{ z;PV4R?XCCEK|rqS7$9zUV~ms1EI7}xRLn1~8u?sJfqwE0SYW>K2z)@mLkBMu?^yWb z&70aAzKQ3h<5&{Jkd4Mxj`1}b!f;#xvjL`P6zzNvCe%tYI(lIogYp6H%xw?ih1q!w zLv@q&Qd`gIB~;##hUjZQ2RSCu#}7e8zV&?w#TD|mY3fVl3rIn;Xq^q!fTX3&sf269~xY_3y2RedNuX zX4|@laU8w#7={oh-2xGF98HOf(GcW!FM*38?v@>s0x~-49EUX%=d$?QArSE{5Ya;K z??r3-zd5l9e48!9Q3Pkiw=upZ#uFxv$=)VQB^bUgmig1=psPS3`U&`gfQ+_&>02G2 z6zhQLq7@0X!`7bbyHXV;4rw^ZZ;pwfehkw3<=CNEX_i6 zDwU9BqzO`;KYkAa%iqW9K$lLL+w0n4sP1d zLtTVqocz<$e)jnVKp(PYHC&8Q*DMZwu1ZJsF(m)Z!uFGp52k)>Yd`uMP*v=pjKQgi zgR-3Rw{(;%7m|cnvs3F#Ap4Ktn?f>D8rNIe&-@4uaIl+|mUlB(U1FBRm}1j!wrc8n z8It}O#!o;+kTwIr&VCFg*=lXi@Rujf=>PMWUZm}t9ldVw$N1`C4t8wUu@1U!$Gu$A z%9a2hI&aH(>lJt~Mxr6K1{FRJi{qAO7bYhKe01;yxJ7ua$Zu(X^jW-ZJC1drfIG72 zs=Ub2Ei0d+3zZn7MMwS)MwR9WD2srFM0^dv$-eme+4en0usL+;F?e_HrWvpmWd$4M zGc(`>#MG))ydAAUul^T^5wOto#v8VGt`eL-gC=hd9RmdAPxN&vlgWjvSvFRS8uBr@ zMB_k*FGB0lxBeGaP64ZfRkv^}%&JrV0SdR}(qpydx(GIU*#95-?+@7j(YMPt&bH5c z4(>Fz$d6qC<4$n-tiAYb_G?#S36Pi$$ zq0YsG#RjR)X@iavi)EEOUzel%j=>uIm7l{JEaV~4Tc1?6Cx5Zv6-_&mAsu8gi7NHA z3Pe*=NmTtMv_U{d&Zj=sxjop}e(9Ic4O7dv2VWQ)?~#vI(bTu^ICBf6B7uWP*E$jm zM|Y$SANzoj>K^|;dwjux<%E{y2nM7(R_PZ$V63`wl*bkv=;h-JV{7r189ac(n?f9p z((pc$iqq)OgVilXL`o zf5F=acCEl(dD;dUqHq3wVR~KX(OOsniTVz&M}?oA2dDX4w@#pQUR?Mf{QQ4=5iAbj zICpix`qIMG`*q;;_3Ps8OP;&dBSL4sym0AyxbX(>2)JqnixFSWC*a;OE+$p{>dOnO z*Pg5ZWM?S--|kz`#48J{X5iW#d_&;)>1aCJ)9Ra0Rzp}7q-APLzk$;Fn zQ@18Jp@&}iK&xx=PtXSf#RYwS;!m*Y3&<0*Jj&!#<_hzp?$F zZ@^-|*|CICqKO!l6;hJZ(pa|1T2*B|MOr`oH<%a#7CLlrKdgj9-`>fzV^BSp~G8j+h(95CAR-cxdkfPwsC2X$*mtWLd&U+T@_i(3X@*SuxdF$O9UO z6k?rzQNIcOB4DAtUpx!2tscC4WBYS&;;LAe`k^XBj9#MQ(i9i2Mvbai-5%-40m$$P z1c|#=^3c)L9+HjV@d<=6kR8Y7mpi8E3V=HS^2{yl5-iDP~z(a@M20YWw-ReKyhON1aO&jYO z3j&5mqeutJbXFXS8B4{Y+dv`FF0^Ax zNQS-W*ba2(>6LZu(k=w3pN^%`m5MnY;=>j$;084F&c2xJLu)66oV~vRJl{*6 zyLof_Cw<5!0)yCErtNvZly*>JlZE{9;sLbo{hTL%*UfHm*8nKN7W>lhavS2cP?e?p z3107U#R1|t%8<$7@`P(jIv%qY0+ym9Zs^XjM@FGC0v_5r^bWp7d1kh~c@>sp zUm99&lv|y$u#``3u@+56wL;(Rn-_;cj(~^us@H-}zWM9fws8b4oAF=hnNW+qFjgFG z55GJ#Ghpm%LJB6+4OsJ+Fp@G^5+X*WuVQezX;+z-L?xNd>V2w|mMO%N_neTH0AK4CCwP_v5BN+bPP)ygPYfL31%jx7MFWPHCa4c9!MX$fSVLN~{ZEXLK z12?8=kJ|tm)?ZY;N@dWKl9qexMY(v?~ zTDGJJ%Zy1e1Ug5^M11iqSfQi>9^6HL_L8>gZ0NYn#w859P3mDP(&})fUXGT1x{AcZ z5)n^th5i??I*?PHvmDxWIwJWO?#C}Swryz3X6X_J&?eWBbzYvX*WHPz-0V)uqG5FR zInXo#6_yxrC;i5Hbjk&Z^U(`hNKEkVGtka+(UvW?C5(GcG9AR>fv!cRbbfUtpI1Vz zSakI^kSZYK_mU327J7RdBIz+Yb=NJV35t-|9@{6dvE>h zeso6`4Wjc|G(MB^!pl8Cp=ZH~rt_c-kyt4npc^nNZn`p~^Q+f!HFnFVM01RC19=L8-o z7Lg#(_5=KrZCv&-t*A&)kIvRYC4^*hT|IT_OJnV? zYmpfe4h3CJ7b9;;^og*J;Vd#dBJ0q0J?zOs9%RUU2eO3ELGaMklGU zRH4xFfa5^t$Nyu1sW0FW_W^vp135Ns+R*kI@d9jHS`RHC>sljF4pnKua8eX)B^HwT z!GU`%`Yu>hlL8i8B0K>1SWi5*slD9{n}G>OC~O^U^bE6;4^3t!PoMbt#EnBQPiV&f zcl`eG*!bqLpN?HUwtLn84Ecucgz)3bSFIl!8~xGfm80^(?~J@U^7)a_$kg!n1{=d4 zYac57{oKJjcHh${I{i#Y%O2r*R?f)h?4)ySI2xW~DM(PSh)AV#Vp&)$jfkZjEkpNZ|8>SLMz)9HA%DCi zN`XWMWXmYUT$qn?AX^GK%jNK&g6jP)k-dwN?%@HwP9hhJ=M+*I1DWU}?3_XZiNeE_ z95R$gA!8ZT<>d^{ zkzx$ww~s|)>>Mkn**SR_elCXcknKLoQejE&9d|-gPv6DRdw58D9%Uss`+5vA)`zLs z9HjfE=fp7@@}-BRk_av7Eg|uDQrpgu&$R19Mm6|)gJ*V8`H;qpBS$Y&mt zL0!bSn^}(M<`hv0{4=6pBGDM2pGUc#he>%PzB|{yO(th?j`TU2qN8)HSf-c*<$=y* zV=UYihB-*-dB@hJUR)j79=SZigSy4$82k-Z5|cy5b|@X?V{*_VmWM9rdFVuSWH6qP z5uKxCc<7-#BN0RSSY$4yP>7>2)?7F&?O7gw&_^yxLt1<390%DrK|UXum+p!33sjblg+jqY+I9smjlhUU<#f+|@0ORy6fnag%pA-iC@*HibDS(3n~Owb;;@v0 zz7a=z?mtmpvL_}H#~7BAKwrw_b8J)^fzAgN#yQ|2w~Z`HQ*6(Fkn(3Tl08v{f@2{g z5D3J1;~8jeSk6o5;2|LzVfZL5Rj?2@b>BPCTFD+tCc|7YNRL5>ierj71=JX3ZA>N+ zOQf=JIM(|WB7G;67stXZ9p+_olq?K$o5OuC28EZiF^ZSTW3reucE{eaj-s(p7e*@Q zBGNfp7J06O$==(DXgHZ#tPT;F_RzAPJKs}2Dh0g! z@SW4=VHt~t72ycvTAqtAQanrKH0TY?TqXi~FX4EYRaDO{qoRF1pAxx6{nzvt`-A=J z{%r$mC zfM$%Y`pc?cuKEt_SD#+>kyZRE^D1W5?5h6WCq`cx{jbqSMeflrjNUL>9sTgAR+Ju{ z8(lZ@uaQ5D92t3d;)RieBiD?SU{_O(oISF3`0e52!#^7SdhZp(w+&x4oE`QK@1C3* z-Z?x!IrO)o-wr)Bbl(sfnxDL6C_ZE#k`J9WG(7m);LiuYJ$TRH{=wE@c+fOR56%wu z5BzE1XOjm9zBO?7z>Nd7fy;WoG@u_iZ(svJmHeUqNdLqA2YYYr-PfD#_4e-WJ+pU8 z^p@zD=!c>QM7N6eVaVBuzn=)$?EE>yV4%r_!lDKHAr|o%;t99Bn6~wIuy_(mpM<5< z>1cuGnS@&{wb|hJZ{eq@H__$J(+1`f>MC0+NMtUfU&o}Y(!c`wp@hrYDODEIY#F4* zkT>c7J)xUVfDNv9(9Aap)G0O-(>)RJX;Hyr7casMW@nJ1mrX!uA0(p-X#qtgN{Za z866)d<;A?-!B~vhh&o`8`4Y)Ff<2WGyR9|0uF~pZw+Y1DnQhl~%j;cLrdiZ!{eZ#a zp7%#if2_lZw+akH7sJhjOJN?eQ*M6R1%woyk^8DWn0N{DL15dNXIM(nVdaXe^q-&0ON_p939W`r=JrqsF8f zS`RN(HIs(OT($cH6R)OHys~0}_f@MdyqMPpqE0_zR@G zxu%xV9^Ngn+o}=9wEIh>xVh@c(Nr8lcq6frvkI`5-QuMj$1-LGua4(!dFm{Ew|KzA zvSqU)A8JG!1}S6xXNNwYFnhB!T`3n+s*=|x*2%ZL)%}6j>}MhdmCVXy%3^!kyuK^n zQI>kjKAA5hIJ$TSmCcXpb<(SqM=CeIc<^^&^fFNJ0CUGqe|K4`L08Cj9adqVD9(c zw=2eJbWrI$@6LMMnzT-S-meK=TXkD#t|Djod6|c5Y194EE+b2usHk1*i9_-+iJ4yg zPM03YB`7X$R{OJ&T)>(c)OG1v8esKkOGeE(nk=8bpt~q()tV9w$YYVPy4W;ODW?=bcbeNqdYM9VcMlZw1^;rYctV>{&=g0>%nSzRDoi%Z`z{fN$dh`L( zV3=#QFjKUKoRN}OmeyR|C2Mv5s7{i0v(}c$!d9|U zCDf&cfpXgofN3dHms^yI!0jc}(Ncs~q?@ckVu&XzDeZrBjvTBo~ z0_T3K>OcQ&f@P6I7=wTz~4Mbiq&&Nxiu zC~Hy;4f|}~o8$`eG*zya7=O1&1~Gjui?oL6m>pH%WBek$WX~91Jcue zN;+R*lkyo|z-~+B6NQrGy!*PvHPR~6a%+9MU?^(I(`&oywL%5ULP2GB1gtrq-lW*^ zGhBWiOcz>VqU+|m%PwzvjIPAo43RId`12-f*i7SBlbUR{J0s+2xsEMH{DCG{(kh*? zi{s?Gau*z#b0w$AWUdFObY@j|u;gZ=gZ5j)tS&D#weswC}tMa8~QL8su8M&rgSnh-Mz$@04(z=L0n!4Z#qU4fh ztPrhQ<^jaoX3VSQpCQF1F&#x&jiqwj7!ucrtOe3RknT^e)+^f%2GUl$vGGVu8o+_x-$&51|j7Zt(Ritkicg0sS zhs&~(hF80Eej=Tb#AB2hto*7zk`H7PbE8B$-H^NOK3%JpQ+ffn^{nn5O&5Y{HduC; zOO0IKZjy_;_6wbMXXGhc-lbHRU0SezvP3+c0+g0Uv*-*-!%jf#wh*}G1RYgYD3jM& z$~)v~iR6rW_p70FSz=chEJntjFGMfe+$FmcCaJvO!`DcvqJ;|m7b|3uzcm+HeL(6d5OVYBuqngdrv5H1-cQ)K&c}L88^p+1z zO$mAEh%>VbiT`l(`gXvN1=*I)071l?(oxC+uyiz4NN9B_v(YIb_1W_=XqteBD8IGi z)3vev_{Tbq4AQ03mR}fyK_gR&SGi2EDAPF@$V@Fo8)m8Zy27q3f{M4CyW%15weO+< zbU_GSF8xcVLPQ`5giE!`3T;%aN~aA8L%q;x=sI+52u)9{WT9!rSl6-Py>-n;hLZykk(@e^IZ#$8+=6UtY8=e{cH4;}`gKL#!*Hcwp!ZKr_RzD&SI-KtDc? zHlQ0XN8@WxRsIZDQ$ry2E*>m%JrM-S6ajSW{oM8;)gpNDpA|z> z5S;~h0UbCtjL!#%I^bpo@J#1(I|hxMHUL()C!1V+m)7B`cewkaI|sbqAvq zJDt&5oUA05-iTL{l`IU&d?vcH3XxNf-H829_Su$pf}E}&JDfR`QN2=Kq9eheUEXQb zsSKl#Q}0dDT3%5MiJrcAJGyfKd|%Z~yyn`Mc7Q~(eg_@aLeiU1N|}U9AMkY~LKMyl zDmrw|T_hNH-AAy4j(zFO<=>llt>=MNX ze>E^N{H4*4_qC^|wmUlRC*ozL^4JU^H=PFDzNp+8@);!Pe?I|luR<~sDSmlADzv{g z(9VAncb0hxXR;(2zxe{=2OC$y7i(67n@*v|ZSV@bl8Qu^UD`>#hQw#z*x!ETHh4mX zZ3X9$B-=_wW!Ed1k}~LP8qKEs!lw83$o&KuW7DZR?h0hDf z=-^%69q3=7&uni0eJ>d;oMM!WRwWk6=vjFnR|x4^T-qr^#@lfVR+7=)Hy-Z>WIT2| z3>JiWF1?%3GnWlk6_i7wSJ)iYY9c5{pSu=h2*~Kr^FM%amD?cTW#&4NvDv+J9#n(m z3N)mo8Z}F+d7V9wiHGNdXld{p_mk=#r8BTiU8?-c=b(PycIUy20-PMxAAN zaWp-FoChynhkg1^>*&q-@D(!U%r)L#qpb;t-|Z{{9tnd2H=*rQLNam&5AAOM@FqO- ztxF0RFEZLLt5c%No7{FvVze}J6gvB67_XI7boeOviUCOcruH2-!+6a~;p=32Y8$E$ zO*fp;h9X{pSs6y3|15NqfQ+0!E#nC~Kr(o5ycHS>RvON0NyNx$y)nnCvW^_XJG_|y zh2B{}+b0ENRDAL&65WBH|2MWPh^!VDEO$oB9;%2bw~O8z)qVbd>j18fe+g$9B~c<3g@d-!X@4qJDkdu>Cynm88+v6W8F9aB?jUIQvtI;9 z2AD)Rxh3gVHe7Mk>7-IFPHX%Dts{zlx(NLuAVVN5bS&hi-q6Z z-O(7$awkCsJgJl|#~np=q3YCg31of@>Lwtgt-;5jvvHo;#~*`!K4qVC2`7ytQ!J8g z1cP)WueDiKR94YUq1vM$LqG;sts6Ub@D>O-#k170gmYk$F;Br`zM7#~kJ#idSRfG! zI_n^a5RlQqDj4?=>#@0g=Rs)Ww6v8-sTncs3Q;@dcjOZ2ozFqH2+8Q^^&f$Js5Rgl&81RJy~@mZ71)-VK`(zEO-`(2p}pVv(|e8t#xGz^;g@iB zNa87!PD{i&CIcBvG?bE4m@{bKJy07V86A8XS=*1~e!By5d+$O0NPI8aHRWNIY6zK4 z>77<(jA`&Fc`tN;fZB1kS@=j~u>H!t$R(P#W}*4Ctx{oiO1~tVi6Hxz;fq2taWwkr zm%-7f8=)2H8QnMdTTx_S)mUI+Zuo&d1y&AAXJ8G>153+Vk^+-2Ml+_I&Fbc4=-?w@ zmrS<7E)nuz<9`0)cD9Yz6x)&&x|b|T4M9RCEMg71;YVOi2w13-QF;Hmr)S!){s>P1 z#}dwlKoq2G5Qpn*OztfzaurXh1$#HH%0&-CRfIf5J$1`&2pJ?Y^vg25^$g@pm(@*T zV=4jnu<4GB)9@=ZMZL#WRZtFG+3((g{pvThRS#qBu`J;{5oC)CmmDFL#AD?&{#LP- zVo38Y|1p?cD_PLGzhdw4P2lbbyDXkTI7tVYK{ZJ#qoGv}E8}c>G)ivPTS)7Cx>*9)7SOOEB1aal_m z&_GoxkEZ4F=@JW1!4@wdqNBctI*Z8WcKs>5fLN9QEas|g$8pc7WW!d5vFlo@nvT(G zBcvkNKMxfV@F3Vc`L5-L{`5S08@+bJ;x@Fu0V~Ry-=NKK!tj7(;#6%>aXJ@Of~;j4 zk6v1dcO_r;8;~sEq1S&27C6MFZbFa!2K|#rJ^EV&Szzo-Zje~+)HR-#(s95=SLG?V zKx|Sm()G6<289#y(CcS?Wf%JRx*KQE+lNnxJoO25+N@~_L+zwH63eEB(H<(=(k`PM z0Lh5@<(@!mCsuOEg~R>(9@&JRdE!K~|MFdQYF7<8?AEzw^i#v%9{lsbDUf`g!)u!n z)X=kpfgL{D`C8MG)YKTUg?HKw5S}GY;iLVINdXxg6u$%;-(lBG`{LiBAra|~%*RGs)rdTDT;VyyNOt5DV{PaVl#h3We~>f!VI^z8><1^WQ9*DqbVJUZ{Ybw;A+ zK#gxZ0(~jup+iT0aWQ)P$ccuZ@+>+Hh8jZGxSIkyw5GaCcr}-HO6!4Jf z+{?PTb?*EbdgnbF`ThR}jkGLb=oF&s8I|9bXDup9$J7*JpNhj$Av=zMjJUQ4f|MV; zej}o;0UxRXw*;10y;a=PNEqB|b}!|@xxgt;PMp}jvw#0Xs|9oT?2{p!T1 zT=+aXwR_;(g6%M7)GpdGT_<7~#kRBJW1R;kz&kTQPn zo6xu7qcHM99y$~4SRD1^_z4aB=p839?8@PUtZ zO}K&aMcBn`OFZZ=*`({yfXkk6SXB|18uA@6SOV(<}U#OoiZC|d!eKrUw9)44*WX&>6Z#VtaY{MWT%H1h`f z@C-n;1DYye69fJXie3LMP7r+Xv{x)N?yj?fd_RzABml;Afn(1jD=H6aawA2_TRVveubz z*S>`y9QI@-(19oJ`F}^?c49;R{8u!1#+B#Xn;*VtpLU~c=N3qU0jW+PY64$GV?12= z9so$P%imnR{sRh7=N)>o7a%RB-bQOTU{oxOY7IGJAdeBo~ zIC)_VMgmbMxaVQ6;&BZS})~k6Rn7pIt$$z zboS8Vnn?i4GdZ%FD6Y&5`tZQwRX(i6!6edivgat*4=VS`=!1`Fkx*=+2s}7 zr<3adUSFPpjJ-N=5-0t8-R8wL6DwH|tGg3==Bk%Aw_n{1QsBM~qq~qEhK{La7)Zme z^W<2%l}%xVScCpK48tVkp(7ilohY*n?aM}BthUIPFboQT7|5srFc&<$8F@MFmHGS~ zWnF`66EIW)9y+k30r*D$-%p1mdXtMgS4VmVe>pKX7975Bbl<>mpIj6!|yL>s$vJE zGVG}MfobSFArI}H_}Yc-*QRl|IhS(F{m%z2VmECyt9VP*D#?aATD1l}vSY6Gy6|SO;Q+JTQkob5Z-2b&H*s$r8vQ zFO#8+Ho(zFi!2nSTOqr@v;D3?{2GuU`QsjaU#nlt^i<#ETPuZj&MxbS-aPuqZ>e! zfQ1gMxn_4;wGq0dySYYs21X~&8NPq;w`0E1t3;7L8Br=g3tPHk`3wFA1>QGVS;7L~ zcX?-LrCx)6#lkFF$wG%kYv2U@hude{7fSFb+Lr+6qiYATiM%5~tIZO7PLfrJPly>| zprQgEmeaj?OfzIQ)<6!Kjnc3sE~TsuPU1>yRi{qLtaWHR(usE$ULPW$=e(r2BVohZe15p##%j$EG`6P~5Q{uS{mCF&6eeNZU1W@l-!P;m=TCwFyRzKsknH2C4Z(D>1^!IKGD~q6m4uDGN zWJ>)MwP=FJxZ@a~farXpQLJd$grBA9SW!!J=wN7ZExPP7sIq{Cj$Sd_#cg=}GEk*c z_PLH@$OST;#X3!dW$V$J%tk8%K88cJ55XZpKt_iygvXeUdH>3XuqtuKG4=yFsj? zD_hm8s0t&sIO&L4niM0)g^N3<1jHCR_~_Nv_RlU{1dy}H62LHYZ`(}{hq6Vp)`(sa z4HZ3bThiGEO}jzkggkP$`ta_>yZgYZ0vwa~Clf_A)#45?s7}IcA3FB*r@%bdECOmB z&a*{>N1`7x@BsWZK%+p~NG*+$nnidLKN%P8-#Kz35?H2NoZ0|sX#nE{e8zG92FRBM zslgIBe-_%K0~sgf!lTm!yzT22uNBSU1c`u2hqE`}BQsq9KCla?!DNNJb&%}<(kDPx40z>-97h=29~n%G+t;6*i;kYZw`-%GR$cbP zz_9u$jH3gt5iLkCqQPkgL+E_V;*Rx@FZCo$bky_-fIcMA(Wb>AG-X>H*#J2sApsWT z4*??y!mTl`I?h1XnVrxvC*z{M_g>xUn2(9T(4F1`*GhvwAN{wnfN0M^Zyz;`iXZo1 zj9=kK@Wc0UjEX_d!GN1@h-J-gkG9Onow_u#xfgd#tfV69- zvS{mEPM<{)OcWiE?~O?^$ee?jCZM9dUp=!61^aleJKr&+1)1-DgEy<8nJR6!nk#$* zLd_dakRc$Wy}Q4)YvIzuO#4sHjsb8S<3|t)ES(9f*#Kl77dMLex-^P@6aWbVGCK6c z4!F<67=6kh5i!0j0^%{~GT`WGQ<-`&=axuOEdwG1WVH9PUxSFZf6|X#2{yK0$#fR( z;~3_HEP@ul+mWXjLnTsIgd0tUL4Wsw903__i=Vxuo%KU4W=EFm5T_(min78TU(lT| zBxF)_x)**cAS0!}zxz0Kix)mWYdb!;Jf01kH5jt%8+t{yP^rL0RUDS!2Sc!huH?Xo z{1AkA@1AYXTnZ!7H9f-MM$#u43l0p5!h_Ebe{JGyYWLp_PoP(?{a40*bX z<)*)ug}2kKUieCehlO6iLPw7JyD#QH;KAD3Vm&?yV#rQg2-YJUB^8S;DO=IvtHjaI z63|=$869}?GT0{je!ae}Phzvfb$oic$2eEQWu$6;*5_>GeNr$x&WXaxDh9m}vwZMJd|HK`pqIWU%~i-+>B4pWod6Uk;BN#_%A$ zp|7<}G?g#5{E1**lZ~+GxdsRjkkMYsfx%cdwarbUGZP?z=uA~7$x4{ALoLn7b21Y+ z!+bsk5(H$lcim9uJhr91DGet5X4~MgPNn|dQP5`8;pJ~je6@)2LTyv-S+XF3zxzSYSy6&U9GvY zXF@#2kA8aiJA-cwoYvr`a4U5SiHzm{(D^I@ucni+10v;08{|I*Ow#C`@X&-^lPg_dOuo|E) zaxS%66{lPY^wBGzYXoGthk%Esj#2vh6^py!>FxN&<+g_nTD?`uSyiT-u4Zy)kmX|_ zK|n=R{Oq0RKI|dzosWS8xOhLl0V_$T1`A-XAR(DUfh^5XVM0Tms+7MwWm zf8(aL=s(LRM7>b~QI_NDmz$<7>my`lqwAnSY(go{f-9j4`gVhyd9M4o1a~ro)YrVp%+e-pl8lmH`<=P zbrAp$gU7co!vh8#Cbf^&6nwc5Z)qwONc1}}Biy$yuAO=x%enK^-R%c&U&K!%{Bi8E zOKwv=jZm!4_?TEF9Fj$3W(Hlj7e+`(#%7?Y{pj9BADErxd`e8ocuk#?)VzUo0&Uv| zKM|6N+4+TiiyqOGMjM0p#b{Am)Ff-!vIdP@1?J-Ws0V-Wgt>j)Rrn)nMGVrRv9*ST zb3p#w6o>xu3D741rJWr>uH*^q<3nL$3}!H}v?>7l%GIR3F+iJ~E^q|NGE+L-R9({~Eh@ z@WsKO47LaF82sd5e$YR7@!*+*(*th}99{M3zz;@$H}Jr~tpoc8(gU7>i^jh{uzl6K zf${z~`+w8_RR8_`i~S$(Ppr}cC`Y2-*?+$1y8hGqSM|NIYOe3seNXm%Wz~oKZeDeL z-$zAvjhQE3>WlW-`lNlQ_6_y^x%au=$9wNNr}sc_vzO~N_0r=n^llQB#}|8hMK6n< z6@7E!%*i8@4^Q5;>hojFWgNiZc@DPa$_PQAGt5^G_N_|Tq_r~IbBc!||B}=i| zXr{v3Ep?+R(MQ68ypE{SUMb7;X^$l7PIB|(d%NW&Nyv|sw`f9MbE?MhW498zz2Yj+ z6`8ykGAOeRwPNIjP6&k8(9&B?31`q(P-o*&X6Oz=)`vdSmm{(B=q*$jeQ+LZ->0Bt%PvTF# zvQ{!e`|Wjare%=Y9n9F{Jcr=>SHxuHX(CIRFZxYYUe37LIAy(Qu47<*2tH` z{bW=;`C>B1LKd!qyOa!9oYKDePP;t0Si?u@&9Q7a8nNoQ^bpYoPqu6kQ-QiY5sOg} zk(lY5f3Xug=gGSD4x=|=D*MY$XM-lOYM!Jq5vR)bR3S%|Tm^q*)ml>hggdT|WL%nn zv{BBtm{Ahn>Vbe%3l(sR?a90*oN+~_r%CZxCK=ah%+_o*U9r&Vfi@w-qnv$SUaB?| zyiuVt(Sue}`Cz4?W9sR=rzC;MNq=nBce-?$MM_(!q+hEROLPj^)E@~w5U=yBN9i{i z3yil}OpAz$c>MY*MX6N|eZX7E%1RR?qS@onWRh-sQ03;GTE#q{7*mq!*tG>q(wV8o zQzetVmRyw}(yhEMP0368{B}V!qT2~luO4356)L`_baGO$tmhH(SxHq7k@6*_ zzsyA3x#WngGyOdhy)(jSjP?15+9x)ZBiuL<&uRd#rkvI%Yw4_3X5;!M37zqVC`xDX z`89gK&R}JSPbcCTi$2$qma=I}q*%7ZCT}KW+M3atvzDxmv81G~%)}ldg|dY?2p%$t ztBRIH%*aMHL|@%aPR%g3pkCJEGKQKovHI%H58U;JH_j-n&ZxB5$XHC$DH09nu9rLo zwgStUC#Pvu<&kMJZQb>P-AmCXYa&q$$1U3AI0?3QR}-cRqt!<}36-*vC`8soi2U+= zN}8m2ma~|X4yTe&uO^|k?o!2-rZm1HlL^;ajY4A8>Es6mGeEtw)mGCQ)Ek`A#H#NR zdY<-}8GXwVspqAYXo40IEpew3Ilw`1qgI0s4WCHA-2@&mC(9<1y@B$jdjP}IqzmvOrd7e$tCKnKN}k(>#W;RRcKkSBpIs~4S?H| zTvH*RwW(SLs>Him0kNV|GASlVxSHDv02^$uVsB`oYMVP58OW3Gnj>CVXC;P4(yLY! z=n1keyG`aiMNy10Hm|VzY`S{7?+zm0U~%|ppW7U;C|gyxH@=F1M7Z^S$XOt!q>KX4 zsIpaA|KCV?U9nVR)ftJy6jaD{mc-x;p{t95FwHs}CS%Pbujk|w{~+~I(Sds2llIeY zGk{iyr{+IG%F6?l63aOFEXNz;jcB@upgy?8W>b<1#oUEb-mPcM++e;_-qo_`bPy@% zEIJDAFo2~^lKQx6j3P_P{R(MGEY$%XQ{OL0`6{6H0wSoy>y!GcF_s_n68e1AU^Iif zOE%-L7&7rJH-2*`Xwp?S*(~y)$=OJR!$!v{5}@xYIL#)iim4`{XT#MDV^6C*`T3^BolGPLZX%3K zo-VQqo6(bY$*nMjM+}6Xf}9|9$pWh2l{*aK#A?z#u0%H0q-?TO7LxlkR7tMqyPf6D z6>BKr5lrvbXMJV0HkQG$xxH!^&sH_yU1GEY4p+w45?}ZR%X*WvsJ!@>CoMwG6d}Sob|LZ59d!qZ05J5ya~KS7#U~Qd$iI3 zAe_yR$ahah+sv{$EJCB=u}Xv_@wr;|fWf6*EuG43Xl+jLSh~7&pMuNEFRbeEpjpx|h??I>sDy>Zou= zBhUYTjJnw_^vhMGxKE=qi8H*)b?Vfq zCw#xzZ4VC3gvkUKW0KBlBzh)OPRH+s(Fp~5nWQ1fS)^T8FMeUD zS`I4awh;?P8fj~bH;ZI(7b*!3CXBXh)fb7j!-Ru3(7Q}%JQ6L`a6?@wCLGo{BN=zC z8;(B|PiM3&y@0z}YAO+G=U0Z!gC$Q?#<;u{@N-C4z>4quKS*9+lOz%7)t2p{WXNZ( z;X6^0Z#aX60R*l>CX&%`O!U(`^>r^YjR+ygMpF=X3T01mCpsHMLQF;?$`PO6)QdOc zz03{-A`ni&YmzM1!cr4Zry@pi2f`2t+shd%CX>~e*%1+V_i}2-(P57wyt!;5pb*^e z??%~lLD+%50zwiCuqj5Rr6`2a=gH)kPN4RMd`ANKHuxZ~1+su?x`bXsk!YN35wfuu z4%O{#aPlv?&^i-Zai76xrfjixj;ZFR&@OdVFrK3bQVMziNT6G5x$^68L^BjOM&m@G zYRq{Umq64~6Xzj$OmwC(B0y78#w9DI)Rr$G`!NpE0}?^8-L*FhtZDHn0AG4cb0j>X z-tn>NspW`N@|v-9&_PEkHMbJX&2Jd~Fj8PKYf7;w(URD174q}h;cgX)0S5=014bFv zlgFi5gp(49cG^WOWU6LONu~!8@dX4H6NyT6ovDSYSgaDM=E#Nmu(RPtIvv5flE<5v zX|f@|Ky3NbZFd}rZyfbl=-!OC-*Fmm#^C0!{P6Q*YWS`rS8fLqqJT5f(W*548W*X= z1EEmbpnmJFBL_C0MyVb@dgri=v^RDL*Z6~KpBjTGh5&x1%|NdN{G>8ayaI7Dq}lj@ zNg7B_G4)FyKXR5vzH}Nbe5zmdS{UP9_Z-=@4ai!7G8I^WflJx~#Jn=(Tm?(&XYV<3 zaPw(&z!&t)uw=70roQEqM>cHG_}BwbGYY)Iz(<}bsE?&y+NM5s&yiX6OP@Tl@HhIw zpHnZXV`pR7a5P))efvpf0iYq(rUPnYfe#hFUx2_GVoW6{P5?L2{r4W(08ygTG*OSg z=Y@laym0TQj{H4T*Y>B5-2J!ip`qvKlKW2MIT{G_Uk38R-S;1fF9FLj6hH#AEx^kr zAd&_=umCs9W10hN`&mXK@wzm`)3*h*^O^l>^_vfff2X{3nCVr9LigJ?^rtt~*G!+7 z?ax=n>Ju(Vf!Z_kHO)zT1^BS|6|KAzxq;oHJu2a5gV?LOIGm_SYUCDhNR5isJ2&q= z2-RQs(%{>-XgLM^%3q5PU8E0?FGNSXnF`@J(5|c3+zc+kQ^hKO<1F|oC+-6}o|`qd zKDTnN<|Z1(rE7(#FNn8kkI85d6;Bi@D75=^_4nXG7}Y^;PkH}sAO8IA!Lje@Zr=l7 z2>Is2l(kocqjl8=sV;6Fg85G!(OhyPVo12(1JMu-cHh}Yp7HZeP6;kTjyK-zVOTAl zBbsKYc-1=d?(afpMs-l$m){TkGe@q};uHtL1`1H+s%FJZ^hl433iPS~=%@boZP1TV zvC1DjU(ZugR4q`!uN*qr4>J&vc(JN%iG)fV*~>HP;akCtHzI~-JC15fZ@*Quz^rKX zzbMnGl!|5xq&1PVb`vgNo(8VGn_(nJZ-eS=z$1fRN&i?l-q&oe}ktucUM_+Tz zj%i2=vo}mXH}lYZY~sSH4U6Y#Q6m4??(4Xfzg8j!g1j?HxadShN_C3{m46(r_0YE= zNHnT>;I}s&QlGr=*oJdM#a8<};h~>&{il(#&WHY27fSnN?s)W@` zFqQ@{9~&mStZ4O>Xffbu@>x@5xFpVCD4cwKf}?e$8RWxXd=?78)V`^$`M?TxvUB0E z-D)Mg-dd@ibA?4*MgzV0>oCv}ohsOG&=Sob-!b^e*P(CVkG}xAhN5a%w#?Y_Bp!fz z)@Bs;&f#iZ`4)s(PF1PGtq@Nda!Hz>(55Q5q7~Dk1sjdU@d}o$8zooGTm{f1)SKMn z5J@~$r(T}F9^mmcipM7&hY;URt*lp12oXyZcyl~8FK^HK90am))6+*btuLIa0zQyO zE*re`G;~9cDdpBoTns_%Urw!`d2sff^U1LsT4O-Kw4&7-qHd-G%>samk~T{)W3lAh zn%jPx`slC0ojjsauYI2px>`V$5>l$VBO!gg4q~R0lC!PA)ngL!IMvEtD9TVic!%p!rmg$A+rW4 z>!#R5QKFHZ4qmiME?M{@6=}*b? zKZZwmRHr_0-}C!{xdQ5+egb3E7uM!AlaGu)Kel=L-9Y#@OpnrzgMWr9>J_a#Qt!DC zsQC!N*GwdgQYedO)bpQ%{n|4khE3x87pZ5+_e>2w{v6!LjTK(xL^3J_^3k3(=Bh~Q z_$uttBVu*zmPH7WKrPFlwThnKOHV$(9)D1*=YT<0iuC+R0)pbdf|uv1QkB2{{d%m^ z@w_%gu@y7)9Tfq$>lIIk@OeCClbkgAMWc4^T2kd_k1TE&)u|hQvJa|MUyg4ZeC=5+ zCYD~&YGqM8D}V>$X{_RIi&eH(&y`jFRS3I|NYy)bMu6q*)g!Cv>6-`t3%GUNB#lx8^txU#(;-faH?NxacD zGxsl^H5Q$BO^{PF(?6Si?_gi`_+?}2t`kS*H}E(7hc4Wv zK6%aLhQZ~(KXR4!g7CnMpiRmw*uz$=W6%2C0dH9e8r7{Y!{|oEh(hSI)|;0GH@plR z9qdqA38?;PSIyyCCEH0wDTSdJQGIG>|G;AS6sgMpQ3J`*(qx>w`tV-3Vg;%{^?++I zgoPV~mBI40N|d*y3hI|$fdxJyR&Rd142(*<_w5=O{s7Brk8#BZ<3PM1AxDI^V+Jpu z%L?Gku~KS!Z-4*#5wUu6J@PmF@Z7&Ieo_798~S_qUKd}1f?FN0$A)|I1n#g(b~`|* zg@Ijgc#A&$UvP^?bn3C4#{ih+{3&40{UZcNH}qUlyMgeNc|hp$`0I*#=h<*~-}NW$ z?w+brkKg;tA=uCE!N2_pmiveLw!gDDZY}grzcvO>a*tdODRkrgD>sfz8O-GUaf3ww|s{5^~lKc+{Jx z`hV|h=EbT0-5W=y>$RzTU>Zg=qC->p*>BC82Z$!^{WJZ9#*^ODaCrhYGv)^efZu7S zl1?D+9o~}7>-w9voxaKci^2D`FPTkC$r2U%}Y&(dmy(NiADn%pc?rMOPESjT0k8PImDO*{IV7f)5GCtd+G68H$)HE8bW z1JOHo(uTQ`!GVw>g@b!t>Y8|DPc9K>Tj6O@rQV+n28)1(>)RS6x zShw@0^TE!DPQCL37Z1~4wN&e=|Q8~azZ3S{)X(~DVL7$z%bCtmNRl6feN&_>Nt+D3P(POTko0KACu zo*jdGsXm+t`IRUP8qHp>YA0+`tHgL~wQfkOX3@-i9=6=YQ&n313LH?iuZpE}U}eIW zuvS8gRztR4&o+sS(OykZ80MmMGtV4?-i+vg*9^YwPks|x4{I~Xtqkj#hpq;HAVS+P zK5Z*lSfM6MP^qyGW^hCdFb$8Q?7iRb)7E%sU90_BXB{(W%1AZyQpH?HVi_H9P*5VeRs;CwwK!Br$hN!iBW0EJG^u(9UK1VMUy( zQg7aB)ZUHi(%|;}ni+mYtEonlQ|<5}HzxWdoR)3=G&_75ZdIi-p*tfw^%w>l;}FB= zyJy0!f=72)^gQfNA=7iZ@nY28Y6~XCOs3JjT097oJfc${xFf4)dCCXjW}W3@gfcHe8CaN0pntHebIJ-nJrLGpJw&~_IguEUtrUobFzZ}IlQy)vRx@3iOr zgBQJhz!QlCs#tGFoincI79R8WwJbr;N*elt z%EzmYQly53C2y%gLFsRo)@(vX>ZxLN?6Iqdr|+c!Z|XyWpdsC2n^>}wEEjNENP6>V z2#;R~Q$C_oA2_z8ClEjL)YrEU&b+99i8k*7^Z{im8rmk-MC58FtV4!+5IG$hgX&p~ zW?oH`j#pJ5i`S1;{rIf&kstD$eG5S}U-3`=+t8m0{+bq znqds@>wphu68$q^uv!5!8mv`d5=q=2OhH0|CDe{WnTyu3Ispbpbm{}|@xWVLr^r_S z#d~y@`sTwwyFfjI>_3QV?f*#jbzp@xKCM7``|Q4%^Vj&MZ=1Y${NvhJ9<}Ekp--)c z3f*&HiEp*K(`j79qi)$~tpxxURvoj#%6lu<*D%&zuTn9m<0N%ku>U5ge{h4h7EU_h zbQdreq2`qZiZwXY4=wyG*x#__bWPNa558^bb%eFv(BD0dd_2^La^g<`ot|D!?1rkz zhS^Eyn?ZA}5eCLat+S=D*4a~3;AnegzkV`dqi`}w^!%b9nAH;DH16*uD5!Zh0J9lj zBUt;}&jhNI*A-=-wykRT_tgJ>PB|3sZ-QzHAL%REi3A>mumO()+#(K;y}0^;Vt+}M z;{63EsW@E|?ZJeSii`>|fIZ1R;78&KsP**^5f_udPp4VZN<@&QE0bX9^i4FsmL82b zL}<~C%BSWbx^eZ6^A2uK!0-Wxl1lWFGL$(3(Oa~nkUMy(9{nZq0wehBMOV(!gz=lz=3UsJv4}M$hr(mPA)Di+2 z3iiruzGX|hB{f}!Pqz^GHbdUT((2D`(DPBTdgoD(dvKM#4@sz*6|LYG0hF;d2sVw+I5t7V0ZSxv(OU_d4j~F5it^TB|AWL`Y9LuWK@iR63%1$fU^)< z(Q1_u%bm&8NDze4?l&i#DIPe0wdHYO{fJmSR)g2*u()pA(|16|>(qa*xqa-4v8mPZ zA5DF4>I+jJon&Ta#@|1+e(If*>!!*xN2a1vmrflVyL+rYxjg>mv759!(8)hc{$lLK z^>)*XzS)Uy5thcQ{cm0-`&n~{YxU%@qGuJGBVet+C(E9$wEsO73tS-hEFJC-7 zv3GGJFvk6Il3V!p!six_F8sszvTO1)GiOYk7$4UddnPgq7cHE*{)L74`QJ_abpBuG zzdrxz`CI4THu2W^?D!|bC1p4Gxz?vHqg$w z<_weHoLibyC%!tjX7<;!PtFu(zc_p6?2WUv*~F}Q_VD;`W;d<-^SbBOeP`W6Gu*n{ zm)5;wU2$D_-6iYxuUnXTW$cQXUyQ$bhMD=6dd4$9*sG{}D+>yWdy?XmhI7NbUIPS8z*m9xh&kdu)R4b49f~9=A6Y_`Mz?Kq2%}eQKg%E?w z=0+wSQ|y${kC4YH*~cd^Z{FJ}k)Aq{EBH~C7gY-a{b&_PF#H_jOxkGQ50U+j!=13D z2|GiU9ra|+cNmG=adR85NvW#4*{X|1@2Amat0E>6X+B-Cw@aAlD8a|E>Q=3 znNCySi&=(6DZ-Q#4YWun!$E$hSS_WE?4`*3az0*ZlpwxcVk%s~hOsDH0f@^C8Q>JM zm#wTN>c~j0eaL>>0e6LVMNDmxuF7%B`B`MAk`YK#(dSkgd0*OqI}s8(C8ve9qh727 zbh@QhEO01uiYoDWABL6P*5GoT_mi^VM+^Xzk~P*zfI^4QatufejrMDh`KA!YSvJ6V zNM5oOY3m6jE_K6nx56fx9$y(wIaZV>Nz;A^&*bTDyIIRZl2JB}G9;*;fvaM&AQNJ{ zDO)m%N~NpH?ztplc3e#f(HI(w97=x99jSRv=6!I!G+1%?9$4A0UP7<|;&!g6!;y zJEm~LC5VQJlBzWa-pMzTUZLIrT*FIH$`(~f*G+iOkV{7cRICJ$LnxDj5|fHt2$Oi& z$~oJ{!XcDDNr{n25HA$14J$A8sEoAu%Jzw6NWp@nZy|&US)PW)OV&7fV-@vBba{$o z-qJSPvJr!Yz^Qw6xjAJZsHl&0%vEx<#7()X z$8EKEx&`ANM1Mi$li9N^Z8uRMt3A@|HZJM&0M7)Dxf2e1RPrPLfWd?hQyptD3Vm3*Hy?mEn_t398ZbO4f3(qQp>U z;b_Tn0UsZBn5KPA26Ev7*%ZmR-7flqt6wt%NPJ9nnQ+^Rrl>i)`wrBel4LiQ03woR zoXi_BY|k4|dnzx80@hJVRyLZC<+r2EESj<@5u)z!nOcpU#Z6`oqAeHX6)#aLmEAON zbaslVy=bqbDQmZewH(np>ko0YqPVHto-V8f)0qf)HptwdZr=S|2w8O`vR#cL() zxe!@%WY_%x$(KpLkR-}JbJuKjCKO-;MTG}6>2>g!lPS82xZUby3-iC$4Y8#hVW~iJ zku4*ZncTu^ z)7vt;Q%)&7hYS(ba0zQc271*+^J2gldK$@bbCJhv&9Xlb?U4bT3h6i4P%Tw4+7;?} znQ$%=Ed+mtE>JQzO=Q#+3D+%_U`--|D7laleKE+~q%9t!)ToNfW+{lH9~7Ov3?8H- z?Y82Do6qo{KzE+#H4DvxD9D5a5J#+x=L2~`uKr%^UjE!wbx?BI=hClrJ%pk^fG zEs+Plsn0^mLy|qWE#|h_lNNhn7pu#Qwk8>my4*=yK3wq|*P>TEjf>6%A=dqVF`lw3 zp6nYA=EL42#Af}vWpvt5uR7 zA-~Rm>|ni)L`ZhrQsD_URyG|VkQuB2Xs;D>%1iS>05d#?*2QUy6V8I(QpFSTnNu5d ziY^+9Tl`oz7O#>#aFiqk<3Kkb?8-RoP7LQw=9wWZaeoa&X76wXxq#YnpmEdWSnPnX+)qBM~bnUKjS zhYFd)KS%OzNV1VOf8M>EzQ63aYxw3=>E4R%1B|=rdUbj|+8= z5+-+kPFDmxO(IGvnPORrgiRTvS(n4dHQ5f=d?l)7s8kBu7m&Q!bfs}Akzpd`O57eu zPou|$Y7+GzVKGQ{j%EnVgzc~E?J={6#}k#%vY)iqB8BvB3sN*X(JGcU6w{0|gK-UP z9lG&ULvSYuBbKyBb9JI?%x}9J4Y*B!QO+8X6l8xfoT|th|Dex*olL}uNXJr72Hku?CdV?!ywaw#R(Oimdm^SB- zdBq%$gLjKM#e|Ig!t7+UX*}xtII|> z*a(Q8Vmz#WUlgrWja;sz;h1iZ30vW+pPW%gr^rzRSkje)oXsRvU6~?h=O<;d>OK0Yxq*|wH#Dz3Q3oY-Yhcn z-nW92c0{M1$Za2nTb2edy;Td_1Xda+?RW%NtcFu1T_VfmDMp=+B4>Py-)=D)j7M!!6<(pnX}Kc@ScGH_Rs|E*cZHNFG0o8W;EEa%BY=O1Fl`^a_?|uhjW!YvArFYpSjHVAi z_q-1rV54FH+PLka!K3ekUTNqB8lDx(N(=*0AWj6^Y%AUFrV=C|lW0rv*BzLlQ5`_E zef6OF%)Z+;5A0pI_y)lobNJw!)l#DDH5W;!V>iHWzu1GQ{D?|@;8A}67v2Iv+g;pB z=j62de3@i7k`pV0q1Vh%w^{pJ)J<)83Qko3c93BhbX*!JZE(QB>g~Y@(4rGtIkHPS zYn;1XwzRs9G#Y_i?{8W^qEoNE?xzss+5MJXgYVR}fMZ}q!xuw#WUlQH2_P9U+3;Gz zQ7x+Ptieor6*Vl@m2({+GrtN z%tWQKQT_P4p||M~v3lYg+lKjsI|fTPX^VPw4VchZ9OvW>q^%L4dJYk=CXDL%4cdx3 zRjl58_s39pXYl45`Z1WZ)$x;a<}(>%RiH7i7=el|o2~=D^N3g#cE5j!7_c<> z=j*gb-M^}Vlc8Ri+C)IW*bdal34wUqkyr1(O>@DXDh5~_NlPAh-_qa=Roe%Bs}o=X ztzi!kpJs5EquC4;Qf-L;tM9oMOpJ(C>_;oZ=-{@&tJiA1;8w@L1iEpJe6M08Ey;?l zRgL(QCPF>`dhIb95o>r!2UWx2BijadUa#2*tSq0LjJi_y8NuaYNgB9h41*lQr``qK z7!eP13~w9%@V0^FMr|qcs~W%>+V*-?FJP0^{n@g|!$flxQT@q>z`}@F6^wVCBtO|Y z@ZAdYfpDVN{CUmzPbWXMxHNB=bM{CWDrHN)68?dA17z~@+DVFlnLBUYI_Tb_-MHwg1`qX?VYs9o?iG``lriVp#(L7&FskR@-(T8` zllbcb#iNZ*rbaFeK6bMfLP)GGz_`{9!C2sE9Vrkoze|iqQb|7~(!sbO&+}BVmPrS> zz7KEPH5feB*HGOvt8>sR6o#n#s4|Zgvr3(H+kwF`t1cgbwJ<7H@4WDx{=s-3VhX!c zs~U0_iklnLp+JU=+akQfkx0c{YVIif`fsE+Q|EdIFC6WM$2L*~6m7z1aK>Rxd3!vc zQ~kI151dAP{HGuC4ZeSSA8_$p-U5%2kXzEsC4zEQ$*A;4;WDFQ_4uKufz0Kj{f`0| zlf=HvyOeVtsLlpdEfB%-#X$SA0p@D~Q*S+xTM2s~+q9E>*%)LO^ z4OqAEzvQD-`@N7ccX}=4blo=+Lf!IO2-P3+b$v0w$dg!z&pI?-KtnPXX=~5aj(x`0 zC3c^-WW;r{-*?Lf*W`D{MO>T?tmJzpmohG=Tot)6#({{W=Tokpo{ zJhQCFOqaC)@9esNUUTbMX=*kyF}CjW>prsX`gNssk#(2M4g*KCrJ3K){Oh_`X1+di z|IBSO%QN}0m6-s9kFD0phNfPfTA5n@?$kq5w@S?rCe_L1v45T{OmdUV1S^w+xPXdz5oeRHPf8*k}*Voo3$38#yk+JK?UL8-4TgP9R zeQ5mn_#+E%TgWc>7N~_i%mP5g&j0)T59S}6zi0k^^X>Vo=UwZ5F^?_WH@{b9^C>%3V1RUbhfp(&zHU#CYDF_4bFK zR9rj}PheJSH0X`f&8*wFqo~W>oDE#nRZ||2=3I8sg+8OXxB*t0HDZ&pwz{DrN)&=2 z;erm<);3gQMwcQ~N`(;mP~_YhlYvZTmodgf7HCf}?K)expS3y(XGN+AhK|_~C|vNN z;U^X6trZ1QDAZzMLrL*7F68t8*x;52>&aHDw<(4@ag!UljJbF-iNVRkoU|vpEnYMt z*9I3aV+>|=#zR~I5ESgGWe%+Y*EX?~23EapPdxB#Jl5=dfjhR|CyDyWX6=%VY zeA`@*DK#;l;D}qR?QXSMusw>pnUIr>R)DsKx@CpSO4GW z@|khV@mALf5T0UG$hgItiJ3-DLeAwhnhh<;cr9B^wRF*HUPSgIVWYcl_xPbQ&E;hKtIKUM0&m1Z%MF=J#6qe3 zKIEn1B80&}@b+9lfn2h1B!31932@=0r%1Tk4j^Ap(jq}G{v$FJ#ytwwFLRw z4HE(n;KBwtwS|DPSd{aIqKVwF1+@=JF$|B$F2+|@?1sj&@ex=DBiL9I?lS-C?v>pk(ZMTmZ76Q$(CkHy{_4X9r$N-fnc^7#!_Z;q|$Pv z947j5RR7Ec(*ZXwB{9xr2smOHahFk>&}AzZbd}P{K#MUuea>K$+NGWoLUt z7eWcdA!LSEtQFGkUCuMvcBSI=i-(arkmF^gfOjObrxT!iK2vI^zCihWIEq{2HGd%2 z%{kn{1qdC5;}c5O)lFmtXNzb#Oq0k1!SQT4D4U};Jdt5zfz*^f%N&+0lBr^}7h_$i zQbS&zdTpI!<}Oy2{K=#xV`og#<;XYB1poqy1S;HoswUF8PG;f9sQ-aP2e|E9Mk?3A zDHg-FqF5Ri06usum1e1S*C7{D*|R^Uw}%1>0Ev$Ig7${l%V0~0>wTFESe#j`5XFPh zEDbMzY#f1$Z~+XLNxla;%&Hr&R$aEhxJ%XzCnOgfPnZ<8l5k}AtNKoTj$jB^O?i1QYm zPApQdmt_FUwkyl@#IN-q$blZlL*{%nm+W<8+3gRZ>v}`gP8*M9>uFa}N-_*`PI3Sl z?8Ke%tS!?u+9D~_R#i9Skz5#nIcDlEQSzknmwr!|+rka3(<3QI49BbK%!OwT<;$Gc z1SLc5q>nO4g0&@3Yoq#g38&HGqliY9vv^F>xmO}Po^02HW6ma3t@k<#L2O6C0?w0- z&R?>lun5z1N@ zOP!Fjna$gZ8}HMb)71!W@Ox`v+~!uI1s(Z`bCZQUVMv%gB!v0$t#Oq9z_Bg2mvH%6 z2VL!DA_c*y-^OLuTdqSSP6^}^sc77lzv#b^eb#N}iAvqzjsqto)5wnfMwi=7ISh)O z5>*ITrb2nkL%Q6mq=*Pf7IL0mNfhvn$jQ&Snh;qoIQ_1wFVGGU^z2=zy{qg?V@_wq zj}h)ffn;*VOLc_^v=tT~psKZ#J+YeEYt!Y)7)x-$l&NM;N9y+C8}%21E6xT9dnsuz z$1*uGOI*03xA&72#w5~0)Yy|*f961EaemDv_0B7so0qv%E1D>zD@w~?kyxb=NA6mV zZ3r^vGj{EfC?=VWbo_1T9zgiX#uWKb632MnLB~D17;{@92ta-~bbU*2?+wU! zvDG%VLoQ=Q%#2-y`kA$pY#~?(`AJi`EM?B!t2ein>O{I%_j)7Qrn4nqybZ~hv$QN@ z(X_+pE7e2;FI=GC%Pf`UaV4A~n+nUd45`cXdC16KkJ)Z@^@@Ne=@6)&B0GSbUBWog zrZ|k{DlqieRn(nKrWc5q(w2gyRLzvd-TG)VX4ny3NusiBDRZN09xr(#_xn%vlrNPK&{co$+;DUMBo_DVC#zXw}Y1wBreM-BgcDwpb>` zMdFGhpAFohi(4imfYlXqb|!2s5Es338JQ8fb&&|VlX0t+GlZ)q=Z&bnP_hNRkywcF zmTCZG6=L+}=^##eaF<^;NnMOIP3R{bA<}6RB`K2e2hxCgL-QzX#R(z4V)VCj*=W%2 z^AyHI$V{^1SoT9)*dHgkVl!Zp_FkBbL z+)Kz%G?^3#!B{LMT`@U8X1F^SR!qAEUug}x zc*qiP6C@l%d##QY3!1!_u2GMF`NZyJ&QlT;tQC!0>^3GA%4ED0nhvkuT7?r&(#O`w zc&Fe-;W{n?sXLe$sfY1!(?ePa{>P|!tiyN744vdn*`5?DGAI{;i}`3b4y(&W2@xep z;G2)?lhN{*30d+k14c+N*0yJ@=*12A0zC`Sa7Rp8S3?j@_@yaie*~TY*SiyC6cZ7* z6#O}F$JlCPF8x3lX*jB+QfcMl!Dx|X>9Ze2p{hLa!Oc7}y*m58`76irQ=7&oE*Ze| z1vDq|>R%zWeO?|55R2u&rr~KaA~RQg54tm=Qup2XUjQ!t@}HLmU;Z9czyKJ^>V}hk(oCx7_F_~j7D)^C zkUcA@zyAWbokzs#@!lU`NLszDIMBis0ELMw1fH}ZjYStoqSMz{H4H6<&Jxfx$DkA2|!M?jP-+yHSaz zVmUln$VPw_4-g~>HTfv~Y(%VXykXj-Uhe$K)ZiD7Lf`d}LUIknG~Y3C?pSjACo`X! z{L6d{AZGT!P4=(ufQ}(|uHVZxAZs3@OV&sUUWCB@`fXS&mwp{?@~BRI_P$+Ep8h77 zqYr-_R?9B`>JrQm3ZyXgPP3dLIE8I@N<~b)V|JZJ;bRR^=9sqnol2itg7GC zqA{`6-I^12=o(HsTty$`hGvr)$OvP)Db@OO81IN!H9!B^VP^LB!9zcXiXQ->SltOW z^rE(w!%5@uyeS?I$@aXg@}Gq8RQ7SLX!KN-db3y3tJvdpIa0u-L#-@6NN zU|>D#tE#hR`uAg<3GdV!fT~xRy>;fBud%jqs~SQzx&|Lli@?EB>vhacGoMQWDZvk5 zS^eveVZF81wLj#E6rx z*aDp2z&D(Fm;T{dEsT1K3Zhqg_0q3jKHL8js?8dIu73uEb)Z= zz4SH$ywTOG=gpj_lXYeaWhL)piEu&eb>dBxdlmMLQQ{$2}PQ1p-HVu6y(9Iq+*l6AHO|ISFsn%5A<< z4v}5;vghDw`Wxv!b(3@OPtQRtb)(pEhkTfa%U3GCmMaC!efwA8C!=Dmyb_`~?|VP6 z8*R9~KdC3bOwXc73 z7_r?xIPntHgnsB~d}GeUNG15vtq@Xy@?b&cR`Dp{b&W^|H(&D+4TNv}=oP>$nv??& zl}W&YfM5_H^0{RnfFP)kC4r0K=i^5gx1P3%`s}@JkLsN``uA`d{&C{y-5Z0ZuE-Jv zt3MIQrpXGRMIOwxlF-t<1t@24a7!JcZUP0jAX{uN2ZVN z-*$Sf`s~?}OaE6?f~NIXOy6t+J3aAKj|vXO3>zcKRmj zvwy-)R{PB!1u`ftqEuo#zMjU(8i5EmZKA4dF1he%ZF zxBIm?Rnq1z`omGl7cLfoK^Bso0gVu@px*Ic{iU-2`}nW%xxdqNa3}rN_d*nH_UJlw zVe#lXsQUCn5DtJAaW@P%Q%b@ggsP;W$ulX_>*^>^-*j;2MgQ`_G4;>ukIrqna?ONc z_PWKhApvY|K00>g%x4DsK6{>)bh7$a#IkAzXX|7#5~AF03&1X$RL@?x?IU9K#IMd8 z<|geNe0lFt?GzhZ)o|F*5vR&@0DIF>3DmuHOFW&F)aIYyAs7*>54^lZKjQrAPw?pO z_O9Zv`~&RVCc)MLjM0V8F2Bz;-i0FsfKV8(17 zhqYiM>^xk2_|v)H!v-*-Lp>OtqvhXg2O4gbfR@jo)?sZl&Rsc2%2BB^eI&)z0ROzr}QcH!~ zHQ4$`bdu4~=#YUloyFy=yy_#5v@p$1W79jP$EIFbxPS2@Q^%(sp1N!5-Bb0cE2eBy=T2>z z{O`$MO@43k3yaaok4@e%S(%JankW8Y^6>gQCpS*~apKvDCl+!OpPM*3Ax#7)E}S@X zVt(Pa@!z?}pC13(_(VoAq?S$o0c{Ne(t^#JyE{@9OqEh}_SDg%RTx!RCJk|C64e>41iR*X`m zTTPT`Jp2F8pkmh&Jj0PjH&rRpqEGNmqb`{1l{Q`~b5%)bGk7EG?aoiG**?toT(d^) zeQC)`n6&=p=snIMBzFVm|OC6h6L0FeT0B^wOwcp&d_kADg%n;ecssnCCp@lY!GOG^N}vvoZixyE{l2sk&lPw5KTn!$Xm#Z%9OA_=Upgq*F4U#6;fDADS+#8@HXA-C!G z-EV3ci5^sJS$qaVv@Y&>W|*L@`0`?x3{h;d=55B(N^UpmrY}ajI@xxBj$~t&a%y7v zNpx8sPgb#(J!dF7%~>Lw9-GnS9@apz9V210*<_C^ed$`=j>Fa_QiUGhA_G~4FrhG_ z;%zV@UMyn~B5cjbw6uLQGUF93JvZnJG+y*?^Wx9G(@jJqf(WH%6dBMSB? zo;nl7qGd?8a`;@0boPufWZqLUE0uV?9j}nZl&^T<7#i#-JvH_#BzL!}CM+6hrdnLC z32#&*Jfd2`q5{-pBFUvp0m_|WnuN6PIsFIWVv6v`6?>a@TbUlV@ZHzsDI;m}0+M*9 zE~kq|%kxOiN+E#XGRL`SEMtetI6G8CYWCSoL&Pw~8G&pd(dsNrBj=yOhC<7EES!+j zp?sy;3FOVFL`GpfDaKlFl)OP(Js=kLp~?+~b%-5K?$+GCxRb0gyZ(=E-r8u8k)X`S zN`gJ%%kH`eO%ID(yg1)+=4y~!Qo+_7M`Bl7mJJm-(d|Xb$z@-0(x%Hp1)>(h69nV0 zH>>y_lmMW(I8nq+UcL(Dq1}8lzh7U;E-vWt^!&MqiRy}#;=zkiXIyTth454Zalv0E zDN(%q8ePuRjhMS+%*7HBA8#=+?-|OM6{m;q5D-CkH>y40Ovqev8|n^lCRM}kNRZ~t z-DE9ezX#cIlsw>kHd|P#!L)KhW`370&$L;h8LS8RxLL9o0U)mwe?EbQmp5- zysV3Zk`Q5?nAaJqc=5v2DzaiXgqvhrFgkOEh8!ab7L+fe*aFTrk*`)f3?n34lDtem zjDBEqWs7(NHn2KtvKQ>a0wPmVY))`Wd7&cLo^5(#^x-d|=GJbfNVZ}MmQ{*E+f*b! zhPq?zU|2Gm!V?hJFGNgJKh?z*uRYqJfgYCPvTS+@g%}iTaaodaYbKMZ2uTR0;oDL6 zg<_Q*IN<ZNDpLY9%sf&7#f&+YLjo>3pzSU*@VVKVj~?rZA-mGSLM-35sI?6J#fn zn*|Ibi{Vy^2-7SRA$Ov>5XI~b62Ps{th)+)6R4AD6uDB&RI`Uw+kz4+hWyo%Fo^=0 zirE06*fMJ}SGwMgkY=9UzC3(DO^KYH#427|snc0HNKHJ2h6{d0fx?44%lI;kbfFvd z#^i!mI^8sQlhtl46f7?3M+2s1HWEQ9>#*mYa>8glCxY5DMNYwho4I9hcxi!5FJ1VW zoarp%_KYRMc1^%{B5%~+=}by05-m<_9n*;HIS4+YW` zV+HqPNw394#ceKlgWK;#_KiidMh2OdBNT)0kR0Wtb-5p69TAqwa4u!JMpn{u`rE^3 zE)iHQL02rES|@Ii&eN9(-Ol>(0vRZ0m`t;2md@1oLAq72U~VsM7D&;bk>tZ$&;@AV zS0V$kK(&MOG@p~EKY*r_&J_LeW?t~*90KoI)Q$kluszbLLK$m$eI-i7Rz8 zLN7*S%)LfkXy*#XtZ^Jo0}ZhX%4w_i%0|Tu8A!dG}bu%VY z8FO`61$PI_gh@C&j^tD`8Ym5tsG~! zIMVa_0C<*@3AQQ*-TriqFEQ)?4cXyYa}!Q(wN8Y0R+eLF@&bKZ=beNdV*tmd#sCsV zAb%N3tWbDMnIxh{XWMO}9deqs>90JVg8J`Th4K{`ch~GS?zseAz-LSH7#~TsjkwUx zbA<2RNN(2>{~H;n(;W-?TdeG(7gvU{#^LE5_>+=dwqW#EdZN39%S8{1erEE!Qlvnq zi*&`&BD#V{U*RSTpCPdv86vTOEAAEeL+h=Yxt&hMZ1V@Oc+k=Fvqd5uBlwS9e3nn@M`FBaVp?L7c$D_D$W|XX4Wnm zIF}IEqaObcX6d$TgqaN!)XalZGqdklJZJjn^O3RiVBc4^fCph!!|6u;Y*&I|LWEc@ zWep`$p+^YnH5g5bjM;&6cwaN%#M~4g3frVio)N zxE`meZwD6wL@70RY!s)d6SYVii^mv6&W4Oe0P}&dK>fw3Vg%-MGDP#rMi>fIlW0iR z$fv?an#~B2j-}fIndi9_VDT=2i*Zy8fN`IL(MvN7I_B*X(ZC z3`4$-+htFvhqoR*xNwS4y_vWhN)XoG3Q+M|kJ`s}Y3SU@5n=PeBZ;N(T$0b$^B$Q- z_vFg+k8a#Bs#72EP61ZDMt}U}^M@WLe)YnWGg9Pog$&sak(p|o$ktQC83D+_&2V=| zbO2o+1vgXuN4p2#*$jqG79-6kW*(S+diMIU+~PS?>n2Q^%Uvr*3anb-Iw-1@$XMkn z$t2BP%2|gKkE|~5gHz0Z@1PUccJ|hL$D`-DHuz0HYwuj$$Kz-)f?)HKC@KLBC<5tZu3+U?2 zY?N){MtiejsTzW<47&J5`(YMFRO*RuedMyi(f!)9OD|+{J@!=b(p4gZW0i;H`Kgh&Py8wdX75o8S(En*prGBVx7o`L$4s z1kuHp_kjt0)offd`K9q+jcr`qGf&S3XXNSkYOlvXYC(M0$t!pa-hhqB{eO&o36x|- zm3C+CRb5-}J9Gop%~nmmEi)go<-YHGDm1z8`<^fsO`{?z(xCmcvSkq&L>x!lQc?WD z8TCg|LB;(?TJ1stUKLc@oRM?7`*3e$M7)R_H*Q4S`(27vsYqS5D5p3( zf#o_t#!NpXyj*a*vY#<=PsZPKK6lBLw{PM;e(1@&xo0m~9^rmPF7Lwx>es4Hv}9}u zw-p_oS1n5!WdvXKHcmld3LKqRfyY;Vmkc3)qA1d@8DKnVT7g z;j))5FU$>40p0krt@qnY-*-^LZMkgu;!UM$Cf1;W!Dy#xDW(`WdN?jatApe_j^AhK zee*K(dC!s4#>ic@Q*5r#~xjsX3a2UfkjX=WXdb2g9jx3X~e zc)uF5h(*QY9Sirvel?M=Q&Fgvkj`9Bwz+!@%UigJa(V0gKd_E|k-NP2A4;sMy|&Xl z)UmLt;+=TZNJ-nZwz8eoGj*Yg54~v_Z|>_^++$G$cRu-r_w4J9U%h-KAMM~h7ZI@gamjhC%f+Sz_grXiS#}WSp{7-56_T4?Dp4S}C(>#c>uu?p{ud;oifX<}s9&LKt32rwO?m?OZ5V(jcqT@i#4R z=UUgGmf`@X@8|REwbyO!+26K2E#XcbSw8!$W5LsaQWit{2Ag2c^>Ll49j@zrK7{o1 zb8@45dCUAD50TV=IRC^u0P%a;&2Jo*(>ye9vOl+FR+&L&omdKvvub!DA{3dg=VCwR zc7WH1<~{NG`*!x;;pa!sx7L|-gSF?#wltq4&8m1Km*pQS4PI*~--`#G=*0kwlbmzi<=nHw9~$k=yZEoM zpXTwCg=b8fQ8Q>w`#(%&csQgttbQO3_2=l;?{s@aN zYtCw%*;W)zIadoE59bln?pSOvbZ01yudpv<;prj*=Uuj z088Mz;rF5&_4Pb##t8B48!-=igF>kK5{cj=vn#s1ALAQARrUVo-QYwmi}?#&aBnp*7Em|S>VxXJ&jsPN^$-w>KG(*lHio3_k-%PS2C}!7mYEBVe>G4sf;>s zBDuVkbJj7g103$ujT-D@&)>PH_sKdhC!vU?7Qt0ljBM+zaiS;_=H%QaemlV9j{X5} z>en{!-r2jcxqJn0Jtxs=!T%{+%TWM8Oc>gQc+*S4C#NrOFSbz60FOImF}(ID;b=ow zpfVm{R;(;tt$GM`rV-BTkh0eaL=;|m{htnB*?Jy#PhBGV+3dd#!Yk;U4Te5o_6Eb$ z(!|2ptwVQ?{5Nk)OZVO6dJz6(H(!8_XPdf~2{q~wLnT;%VG^;x1?+ujrGDG;mf7_z zDC$dA0kf^QFTZJ%-zf{SRNk#s>NNF$OUZEM7x2?>+>Q`hQd;%AHPwxvy zmjja56Hmpl*AY+d?qeUH?wvfg>_g5kTP|pRx(SsLu)8U#sjbTPC14+=c#U_HdY}-u>GTr^xvQSLeFtw|Uo6=hJPnW~ z(Xdv~fpCMWn6d?%){xP+xzY>JwI8_|Lp#9Y6D!D0y#2cyd(&^{hsb}rv<4JDusr&U zW()V$TTsgYOK@f7;ljCWQ?-x#`$O+P*t_5z%ag0B&az?VL(?-;JD}(;8M$nOW#~R$ z)zO^o(dC&tj_ zke5L60ZwuVovi)m^46_qD!~2jtrx8(*u~nMhcZD{rarU=U?n_A3E)Wr#R8se-mma} zfoJ4$a9;EE9<`nKhW^?dKezDUVRY+i9#`M4Nj8HSCo(;m((sDQhV)iIRydp7J8+VbQMyT=KY7er50$Y-LZgZ@wsiNCqWrtq=$uPtxccE%FW z$g``M`e*Nikk3ECYxumegDlBVYo;vx71MA`B(0>eBkUr&CzdyDKXVc8sS97coZGLz zdzSm`6U(ocK5G6O(DH!?FPb23W?{Q+QxC|tDE8m`#+k)FCFaojG|3}*2?q^7&i5)x=XDSjDVeC{Dd9_Q{RywL*7LZB=J)q~ z{73pH%HRD2hZZQH=9&VM$$*PUlbvv`uBy@sw@}p|Ka8pdSlp%yE$bvMXEHlFui(R=1z{vOoVmLsAP@ozpwA}@DV#8GhFhprFsxO?ti zV4uq{_yBL&7*P&&CB%uP>k}mJT_0Lt!7dRVFVtyhaZ9UJnpFaTlkDMC&P^& z6i&3)qcY({8}SqQ6jf2iD%pxns!NeVW!FA~ZyDqXK@U>)wq3pd^GyFpYdg&YmkBkQ z-J~P$3M-R@yspZVgiz7B_oG(>EKV}{Kp*FBSMR3#(IN3DdF_Vjz}Pbr4QVhTO$SvbZ0k8q0P_P_nz z=<;vT<-NzOE5qoraH_Ohlp0oP%Q<|7d`;Eiwf%Ok`_%HL+4UTb=)pNc!Vk;r&81i2QB0{X7Cg%r)a#fz+8l%<$AL4#)1%vy}jpN;7_;q)33s0#ZyFz zrF4!IT;Z5xG@TX3?ztae5(atPf!@j$J^c^)8;%toxl9vso=6E* zZ2mrme}IQ*j&NTn_VjAs=PwpkhSo+TZ3yI>BX4a zk9%~uwY~R$zk_4Wp3`qeHG+ti=^EaYvur7lwuVC3?fVw==Y9m^W<9IF*$XcZch_&; z)!X-Des~=#ufmYUJ7r&)h{dh$aL!XwFyh!;@iabcfX5M|F(LEST~EI%R)Gx@_eui8 z7f;nk{xv@I;rRz2?vm2L3LifG96o$Ki@WD#q@4tM+wNZeIbJaB zD?DD7(3yUO>sw)$yo62-T49`|?Z3Qt>r1#)nycx`eiu=ZlSxx1QuT1*Z^BZreQkMs zpW?NETZ}y0P=8!edjT zFN}V3?ZH;V0o> z{+{8+Z~zYGdxu^bdUohbL)3?c-a3>TG7VikG%NX?s)5eGIw~=H8(%|``Pbu`%Aa&dV_tkG(*g6nf}A{_cy+4`g7CW>3;zfmvZ{t zNqVDmBQ>?Oaof}%r+zr~`Kb>~jZOS%@|U6y_=bJ^jw^RA?b|ne`H&6SLajK0+xYW25> zoyj6H2gzKGO{+)Q3X-POj-QEKWadheLEs%(Gf^VgaiwjfF1PKgBA0-TEyYa=Y0Kl* z#^Xx^)sLAwU*zJxMTY~!k`3L`<@=W|9;b9XB(PKHun|^&kl@2BmqyqTu0>MWiT8_KMCjmXL^_EOl7<075Q)UJ)O<$dVvw|engiFPWr9n2 z0Qez3Xy|XNY#ck9Hk=f!9xq`1av6TqrhYAOlgK*jC6JR07vNYfNybKco4A=lDmwrfW}Hpj^5i5x7k`YIN1ij>BDtCsg=_zZH$d)wOT7rB%*57EMT7!pg_HPNQs?<6J+BA3JjwwEw~Z9vOl zU~(Cxi<6FjL}W{Yer+2FE}2k9+X{MAh_})bTc2L#+V#2=j@uoZ-mnCjF=CF5SP{Wy5JSs%ZR?*!E^XCAAkkSk9agd4~4Q{s;yP*xH^mpLR2!4zd%R=>8jRTNBQ=F{`&jYxzDHG{cHr#MaMaL0)dL}LewHD@Dn`;bZHcKwg=TW~S^5VYCQ;l0@zb?Im+t$p~+eJ1nt2zF97s>;T z=W^CgF2C(70vF4R54glY+8~@ZO_Z^Ag7nTmid?8z++JxyDO<;e5%ab&p3S+Q$i+3R z79}t}onRAkg8Le0bMv?ME%kRF3>DH@+VoDwuJKB78JxHKt@O+_;*T-R7z@9a!a{}G zgnVFmZTXzYC4uPxSr1aYBw3-rfDcNI{;S9(LV7@#VCM+&claLU!iF`!?N_T@q>S{U z(I{g>sz`u|c5HetGxQsQ&1)=ZZ-j7S8=>*leD|2m=DW^*aY%B4oB#V;N8vwC@so*~ zG2Q&O0oB;?QfIxfUq#-EO#s6LvBF0~YiF^1tkSbC6C2<&HbS2}p%Q~FJLZE|qWgrs zAP^||AP>GA=CaABHQ)D;P&4M9*Wb`t*mAWD#J`P2P3;q;H*Z8DOvtp~Ng=(_Kb|#Q*yEDzeO9qs*`UXi#d^hn`*OjI3gVWf_w5$A zK|Gj88DZCpF5#P$QhqV){i4t>{`;}*@q0E@Vi4P)4c|3?mdM3;U^DO-`F9n{s&}G< zD?j`xp=vA_++qS57W;t>G5|RxgUsH~ZxGmcg7EwB2g2>K@q?4HFCk1~Z(jU0kK~H2 z8TX*jr%+%WD^}Isn9#Bbcv-3pT7`z-@87)m{3y9MDsXXWn8`vXX8D~c%L@gzu*}AP zS>yWgdrcO<>Axbt;?U)1-@I>l3C2?%B)J4Y(b8$dxM z>ESQ_pyrwr!pgu#4{HJX(Uiw6W`_?z#^r5iNHB5wWcr_q0TIU&X)z zYGO6PibC(PP4BsUwQ3$#8C`?r%VY-_0-x9en60FctsL_MhuntP%xoYM~VH?WBIE8Ms!b*V9 z0zR7mVq&rFG2Jhxe~ zz<~MefvMCnVlDf!lke=C&w1k#){vLB!kolPX(LN*2F>Ie;%||65KGe!0}2KZrV@{f z$<~lCiFqRl^Rf@=9PA*!B)@bt&d!is{4EhAeQ6977AlNNNHFwBXXXUh8A;&q4WkTN?#a zB9GS#7~-~07F!JF0%iq_4sz%Pp<$S0(1oz`VcTk(AqXnyeV54Q4+xM8eiy<) z17B|KL|G-+^ERWpK{$!_)*uAD{y=;|`I_?@7{-2hY9y^4DO?@O#NENs){3 z3!!VU_xZySMiK)q-LI(Ao*>R(PG&yQ=Vq4p!BfIWz}^c{ zxAKP|EP_e#q>_WegXzl)wjMhHR3kS2^zMHbew>5JjdPbLl(GUo0y-7uQ79$(yugKW zK+a;`8sN1X3`;yQg>t)1A{TN9Jc3I!xf})-y8x6|CMw-_qrgsLW98Rb7T**Es4?EQ z^|t)(&zzX=Ub7R13l1)@lA+*{4;j0x6^k|7;u`bag&nWM6)_R!cX!9nDL=^K{U?mq zjxE?|upDz3SY+As!1DC)wuO}=-j4g1>o#}sHhsnt+^M~L7w)+2R^runrAhActzBR( zbdvlkgg%G#^euHIiTyCeIk$Iro+Bq-^BQ@^qC80WYo5HuIq7!P3IKF03M6mM;16#w zV4+$ysvKV{{~UcLE_cA#9_-@*+3JHF3<>`1j3tI6f`_+MbyzOe4yWJQJ-F?ROzzYz zbFY2uI>4Z^C_jwQiWFQKFsW9Y&v8V97J(Euxl4CrN?wQCJNob=crL#R&*j|A-Y#Cc zV4Vjca##mY`&yvBLw!T_2^U7{y_k(N7lGHt!~%EsWpMTX^xp34;gQVl>)yL*@Wx53 z{ONt&Gu%c=?vy20-?z^0x;K|L%w95m&D1-FuN?cu=w?Z2;&Z(NR~-lf0&Qh4?y3YQ z$GE9ht}tOaOE`V9N?XBM4|fmFuBURuj-U6hYIpR$c({v8?ql{99%)RtWmUuf&Q5hq zor=s%OA}`9cN5*M+%=R3jzix@e0m znR59|lKWRl7w`M)$=pl3B@3S!>b?;^k}Etmm~d&IF}bQLB16cWwMrucC!gcf=)*0; z7^Z(2X9=FIx4}V=f7;pFyKTIS=QWdG&Kk%P zV%ii^BLlmK|NX(a0kQzyfpkIJde=_!x1UuHRriw~t54?9)Xm{QlK%iJ}yUzpuJbN%#> zrY{@)<*07tLn!vc)p8pyo&41BwnEGi-ic9EqSHXMz^Z-bT*azaM34BYk(Q}VlBdT>Z`R@bhSjGrSrtRSSMjG+m+ zj9C4jd^nemri=CJ(X)jfsHN7BQj|?!pP%s zHoVr19L-1-U8foC9MMU}UegXOJ!3oVemgXC1U-pL(b+{=g#R3dpcli5Ftr$##=~J! zA(w|^)LJ{#VTF|84t&tEulskMWa58srqyqTLNjqjmY|sMVpJ|yEYb=(x){bMEYiS& zim@yc$7ilJLmrm0T=>MxXZ@3{l=`iZ)R9Omsz_iS7GrTbvWVf5FCwa)T#OM6Ax|WT zFfC84wn8ZmQzsr+*x$7ucIi{JW=V_?D<|+J@o0DvQMYJP7L(F3 zITMS<(3mj)6n&Ux<kGK4)5*+K_wPRhLmHVWb`7-qRB`?9+k-> z;aFU;He?ia81w(Tze>*jCtJz)TcOD#5N0V8CnAf|FhyeiNpdk9mWLM;B&uhk3ZT-i zwL-Fo(E~1gFXsQ1gOZ5@s}f90De{b?b{C{sa)>6#Bk~voIv$ZP%7MwbNGDjdBWDwk z0$z;6aajT@M;ta%ahRsLQ+GfB{<&tlVY}pfhUDj8CYQyci&6#4EYdO(L#7~Qi-{;J zBWN-%Wu$A1hLjzq6)ej=c7%mAA6zE`uk$q-K?aB;aw!tdvKXb9R8B3@@(8=AkjY~B zOCFXIBtu9e@wJa356h7knj>5n?Yn>=C|36BisTbqpK;vM{g$Kzq)i%5#3_6N8^-dK z%i@a>1;&n*${@~hCdvZ4dv(}|yKZ~ukmQ_yx|Nh51jLbOlwhOr2viIjTco2b*1t^3 zV1}S=&;likt?4vUdYB@}yNKgZYX4+QyN@-v@(1+?Y55VEB8(uxsA4feN$EwJ!VE`Dab9TIVU{Af8+@$r9s5_8&Fg)~UEw2GHBiMzA{4_=3NpG# zh7}NKpr|ZDeyGJnED@H+2v(|~*0eLt9A-$Gd+d@e`?`7aI_(U&lhrm~yV+C(d8Usf z;v^N3Mx={`oaN^qQy+=N6pKuhVu7bDjmM;G^H1}thEa4M%3!l8n%8YMuhULhm>2p8 zydG#NBV!k-SRB$!P|`&O$!qF39cC2B(hg+LwNaBEmXp%%JzqvM1+!%Q+SM|f*JnRD`+?cF&K72Ub9W2y zP$Q|CKhFGg=Bp!$nSY<*W|n4>Gxizz%>J2)>6fN|IQ^yRkIX5jZ=ddrIHn`h=4pC* z@ASyV7e>AckgZ2H-Y0-;&6PH4H!k8K@0F>Qsc-ecwca*WToTZ=rsgOAJa^&b&*pwP z`E`kI@{^JV@U?Cl`S;1(q-XN7$@3qT zop^&hXLxGp_d`D#`j4Rphwd1+(lLZ|>5eWwh!cTR64N2G7lFCqtYEq6&K!B7mBCT7L ztk$z~mz(Jn-C^Iheh9fy>rcUzl{UyKWV=~Yc)u-Fqeuoi1Q{#06Zx<{T}^ofgastL z52;}-Eg4cWg2}cm5$}0om&1VSx5K5qt_YW{amG6@(2bU$pKKXJnGPLNS?y`}jRKu< zA~mtwCC7VDG8WNhT+0HTs-@sSrOt-E`dUs_Wn2QticwkgsVIt6yBI(jgqMiSMy2or zB{E%7lwH?RHFT6#8zY_;>10?+mK3I_LI&ZZkwA+AUxL99_@OkH@OUwp~PCRJ+MrBO33hhA&##P`2J ztS1g22A9dFBTb1wrJR%t*-?yaq>1-Od%kH^=CqVWZh2TN?{FK5cCOrt=2O`+NnbuH z(#_riQOP&+DJw14y0Uv;6zRq+OL>?4j*ds`CfqUd!c8JW-l~vhr_*an#ae7oKJ^EI zuIN;Yv@9b_`Y2~LT8v*R%ATSfSCM|1$`@owYtcjM_lxCyekoxt8Ju2Prc)Xc`fm#Z zp#T!)d=^$w4jLEtHq%lo^~`QY9ng_7fsK8&r|8RIFT3sGF5^YWhNv zZghJHg^vo^+jw2fCvnv8R`9@OO%96}xGbxRZCCJUc66ut^K^W^^mCRW3r-KQXT%a=% zU4yV1BI=+jY*be0`M(Pv%t)p6gu!n{HobPqAR7}9VT`nyAPP&JtfP^$hmdaOs{atG zp%r==)zs5PeJ1JGCyrv35sEPdF6Lu*s%xgjB3a>?Nf) z`w6?W-F92@Qg1F{5V9^Cm&mG;s#9#qZ_ou?rtDz>RmA9U1l=U9ss*t}$I99CypZ$7 z=+FV?1bKBr_M%SdAmZBvY&N4q3Ab3KC6&>}DYKtSZxSH-jrMAhARMt~s@C$9YB^n1 z=%&4xGf<9(T(^`<+k6IJcI?k0qu^_hYMH93E0`S>g?#)4k)Cflk#eD(X-i8nZ9Op} zj;1}AmXS%Ks*CyREG5m+s}00(9SV>=prW;;nJjy`kR;4#H=9j)J4HF68j?xbrAw=d z+Nh|~mW0;jDQns~q+d@9?b@0JDNzb!bLFbWtLY?WeklyUHSO^=Ewr==bSTU9amEPXDO1KtZhSx_Yq52=oYe+^>kNPb4+@oA8T*o(ijfItK2<9-#>|*rWDr3I z;qxo7n$@_&lwBxbn;0!gT1zQ`d~8aV!@*o~lUJzU6057&kda9;?Q%gGQ{F37W3k!1 zlp@s#Qvpp=UQFscBHdh&;vu!B^ShQxthySx==~zYs4$Wle^rfqkh** zpRQ%o#;q>G92G#=jAq6er8?DiI~YuqRF=&CPmA@C0W*hrTb+O^p_X z^6q*uRIw!knM+U+z}AeWoSek1f;SOJN^5NoJ2EcPqmCqHK~|rTwdSrCh{d0abd7OI z4a|3C*d27a2_>QZlE}al83}kgRikQ?XM+q}v;Lqb5$Uw3!$N))qrqN{ z5HU;6?Ji~IAzPgNxzMh`oM_u}gp^g;eBm%<{IOWSwxT7|EUUE}qG3xesX8PUSL@Rr z==ZG3*R=VfNWRdYEdy1`kW1Q@qE41$CclM|3366S-AwXOvij}VJ)Du#xN1vn>=}>_+uhL`TBIz`f*-o9TDGB;2!E`Wc z(~N@Ddt-#fOX*lol+_6hYvT$Np#k=;$slJmes=G7gmKUYs|{Z~sn9A+njjm!h{r$T z_dl%~%QRyl18hlMA@oV*-^6-U2_GSkcc^H#Qa15^fC62UEjo#~#$;)ADoz}D&vprP zb)ixwBb1wN*a2Eb#^+9pbX&}V=dip^>aNlVfZS&i`lGg5VoQaF-0V^Vn^U8>s?f*k zGO9X2?G6!|Xh@l&t$TbzEvlkXM}$9sk12ESEG)#X{2CFhiTni2ccbD!p=H6(dR^8TT34qr2L^RRCC@bJ?kmW`UJz~mD+u56$B`_yw& z-_C`OmSpPn|z9I#wPFjw#137~4D&n>;!Cm(ib% zer@EVqn{XE9-14yaWo@&cIe9C-;BCOFCBhlgdRP2?s>@{=boB-c9O{Po7~3?16| z`Hdf%IKJ_n8*3ZiG_`5+z~to6Hz!`2_~FE3l8+BxGyL?#0}|(|FJ}K=$@}_qw-mDG zfvF0|kd(*BHbNTO_IQ7eLRxhKSuJ&jl%o?)DHDwKuY#cxl1746I###SS#MQ?EPCeO z^yfMxwN`XhStF=Y17{^BvtBIJV{%k|WJFqTrNVx5yhhs=h2pACITv&-d6L?EL#odu zts8{$8p0l>D?WEkA6NQ2a)srW0$o)pP^4U+(r49f#%hyU1S2}+Cn^hK6h3e$JRjs`3;T3w*4O0QoX z@Fq=n4{sa3M4}E6POZ&Wmlpxzm$4S;i-h8qprJrVHOWj(Yp809q(L}Lgy^EJNEs7s zJ{Jl2t@^0`Z9;iz&aI)1>Y&`{apo!+^0H@m`jR?i#=`@}I!R0bGOE?GdI8ukWcRTN znk;JL4p+`lS0uIK2kX*WB)CoyW^0PH$>R}iPH2EMRJEkKBugrMtXeA#+X;bAc)dv) zuVmU6uqQok&o7uicoF#GL7&9c{PD_d~v<2Y&Vq@sf^|=!i-rH zWzvcq1+KQerdFiY|0NWsBkm~S&Q#0An4WB^;_8z=70m8QDy^$XLN0#gO(H$xt`dr1PLXpv@qzLy z1tTw{jH?+^s|a{&p-|Rh314}QP+rk85p>Ds^BJ>Dm{rNI6pl9`IexK3r&VOUU{gfw zmMeD)(I2`XUv4zE7ZcgsPh3^x$cUEbA^`I zlHGbxs74*|SSVYlWROa$4O1z)n-b}kCeoYf6`gRzWLxq@xGwtQLT7KBcqdAxnJ>y+eL<6Bcs~ooYxCyPM0cs&R<136|7VKOu?%R z;A$t56fdbliaf2u8J4nWiZM^sOz*v=zpaN9OjX-VXLU+{GpNe#-zC%{Pdg|woDH`s z+OU4fsYxyf_az~@n^t;dDRZ;pB~8ZoIn!c!lcIpv`vj3fULm?q7xvbet zxoBxTM<0Xo$4Rg#X9LGXbGfk2%7h~{+{Y0{1 z6%Gm^s_G8|$=Z-;C|o{cK05Oj0qZwJR!@q&fe zxoedyT{5OK0lUE_Cz`s*t`U*0b+e9|T~2yiN!Z&Lu|n-+Lm#0N>7XnTZR-N%r0&}S z-RV)NiL{h3WTxD5@ZS}}H&K)1IGKB965s*2UfC<9VY=De<0 zoK;K77BT~8*tE9kiX0LS$st=zql_%+Si8}0bL-`)ol&8@%~ecNq?1y}DL)%`L@yKW zSVA^kvrej_S_P2^_>>V^BH(C;Y;+_mQ&-4>rbs7}813LI~deRq_g^J91pPI^cw2h)a=e3aJ1^-W^CtD55q_0`!RYtFi$Ikt| zNDu3qw4+m2`;mQIUm%BG5FA&Gy=xzn`XUKg}mR7SBzq;jCTy(Wq z57V%cIs7Ujw}%Z4*|b`q8yr-ca5~~FnaA0$m@GSICIWVJFjOIBl~FqK4Kv zYj`JZYa-nV|Kym>ohybY zGYq7Wi-d93+VjeKqFm9{NVh7NJo_hNacw(AH01?ClW6E=`S4|;*3imxa>}~o_T=o* znv)_kGYatsWWGu3qs6F3WAYfN@D?Gn0@7t+>Bhp%w#t=29@>k9OAxqpnzclrK}T3u zz?4d7FJ3kGI#ylNrw&*2(heJoO&t}In3j>1a^lm|p{bk4Rz|lqL#U0;-#C^ZJXBp07wl1R15&qs!x!1?$ z^Lh+!UA3KS#OjKA5GjWG{#LhGP|bQ4pJxad!*97^d+(PP!RPGUHJ`J5*&R znz@9sOmW8#!0l>)jHuo(pbGiBw)ck4fw$JYS?7iOvL+*8t1~}ZGgo+ zBmrDNsd@9(-c#rDA7NkNb14c#QC9;Pol-cG)>=l%c63R;b-=ov5AUr39&l4LhIv}SYHW98qu%@fX1{pW=wOGi}zPtPesVzsJHma|gn;Wow(^vayOhT@+1lG?=B2>3 zatPIl=%pn&eB#0mUCmOJdkmGZFuFf8V06ptc^vV!Q;=jHuNkNb+j>_SyFg54Ru(bS zBHC!f<;m%Dt%|$SRI3;{7rh2EU0g@y9(oGUkkTLi%Si7_hi^JdBBCrE>7KJSvSC&~ z{qCvnZHP?n8;^`WF#NkAId2vl01~=Fpv!{CsGITQu{0F0M*^XApvkb@5eEXt2guxG z6Q>tA`}4D-+@oK-YisXG2YS1YS&^ZhEBn}ixiU+4C{k)9TxEsSLnOGDG8oH8a##R^ zJnrZ-w=VQX^Ic#jFe}X37pq%}c2Zl22ei>(vm~RrXaQ3>K;@kJ%NKfIEWrQvtYgdy zpS(`!0bNkFw4{S7I-KTCz>_7oQBU{0xdAd4{sa6!?{+*g(hGaK0NB%~-0cjZtu+%3 zHUYKyD|K36FnqNFJ-n)~%e-~!< z%9EqqXF}b*d+8NE#hiSX{E$%{s9JO7b~tP&jdT*B0^Exs_<;{n&%x@fa=-gpYb!UO zua5N$+3G>b5W#S{H+9d(6dYcg0!l+re!b0~CPUGbtd!vE+r~ZeCaB^87N@-F(u3T! z<7bVX_M{{KkS`;+4%y`Sjs=a=-000X}z-ra|)E?ujt z7>w(Em5^FfuX^;d8pDSaY~j8iho%`|ahvWPS?Haez(8zLMO^_BDYwiBagKYe8CwNkHfD>D8HuP+v6*Aux@7hiuK_v~fCk)AEv zy<&Bz{LzM4_4M1OzA?FZ^v2Jd-9?MrQU3~+- za)8W9{`{T=uK4)E1o!T3AK21+>IUAQoz14gQQBwq7**;@F)j~t*nL-WEmkU%<=7?E!{T-vtZX!c~d@td$z2B;jd-xz5}8wYHuNd2d3g9*d6le(*NT(>}$D5>>om7Yh}oH?=i3D7$2|W8r;8 zS&n>r_u!^~Aoo&lhjqYfrGLMrd(phtYGC!WE2bf0RGcYixW^vG^!?8*h$L9g;vQ0N zJ;?1Jd&6kY^bV}p6Ss9!z?Vd5k{>Vu8AQAycAWs25N;z{8?o`IG zE?P#p8ZBeh7!j4l2YAOI5dcL%xU`iIVCq--*4w*Vwx78KcQo{{_tl7_%?LI^P(2d5 z+C0b+i&_vhgD6&8mV48Q?#^>*sr=Q2c;=!#N%iaRMhwno#NeqZ70gS&7 z1BlqMGZg6^e;;!z5<2hhPVT>ab?gxHhd4PE!tHrf4xkle_<+5npojg-7`ii;;7)zz zu7kbX?%b5?M;uKYxNNn50Mj5bb_fAOpf=*C5n6>n$!H7kk=-5V$fWYupv9l5Z11t# zZn{nACZIzRt0e$R0Gm+H2kQYaqaP%z%kdRr2>WmogIoX;Kl_^Qjq>=Rn;+jGd3;cXA@uba2+udCFR*dV__jk9>4Y0U- z+`R?vr<*>otM|zLymoM`n6S7616G>Jg%UK8bt|IwP|cPhx%=*gf*B-pN9()J=dL}} z+|k?hA*}H|0HPOb=ma7a4QVqKi>h3(Br6cyx9`CUA0Ts&odULS{)bRenhy${Fs@Y* zVSMQpsaLlgNmHv3GljXHT;3;Yp3p;cz*owXhrh4AUbCO=ghx0+}2`@a3KU-3JeS)6;P+S z=vPti0GT81*8=eFhU)I#_rA)Xnw%@IW<)54itQ?8iq~SHSkseDD>%s~_`}6IGFM*s z{Xy>Rw_dlSSNTL2*xSB<+1;Y*Of6>hSsFTBg!|qnF~Eal92}(!+*x0_$;BP}RQLD$ zT~p!TCWl5&(VeQ13UN?ph`DuBIjKA^j1%Tbh?4 zu2a~@ukK-`46wN4=cX5W_x1S0suFHft>>W4;q`#;Z{_&QlY z?Iqh@V>)Ru#0XoOyY374%0V)B;JLcB_sSQr7Q{P%pKh4dPQQEfmZ|Sf?w0&?_!HyT z@|Mk4A?Nm$t07myqK~OM>3rSb2B<+H+K9@yQ;*@(p7;-3`mASh<+P`N*xA!N{GYrG zcvg5k{$~Fsp=QzNbF^90Ht3abSII^AYLJU%fXqF1U`OB12gLFR@7~%Ae2KRaTq_|| zBp67=Y}~J)8m=_b85!$UXPUe9%cy9O%sus!;e*_5pSW(E`{_%+-P9ZU3iJr<`Xl%* zK{$*N7jWP^DZ4CYb~~JLzC+u%<}(=Z0T%a=0h@m^oGB|H|mU}vPn8*QHFBme21+hx#&01=l~hey^MgW+Iz0| z>RJC=IO}US3~k?_oz+dhYwGFAvvJzLfA|IduyqlCSs2Fn3Kp@cZj@ER*;W~;(Gm$N z#l@b4$-SP+J@)dJgWR`rAKKOX{*%1OxK{Wi5W-ArJd`I)#q18fHRmR5u>>dkHfDN| z+&>zg_&PS54}ZIBknBmJ0%3-&N~cFh7yJQ#M(t13V^CecEtUsoV|DiG&4mDp)}TWj$GB4az(g}-$hS+17wa!zI>>c`Yvu7_OUAo{9NCk zpL{OMdWcR~gKWpNrl?GFUw#_>7$9@u<3C^Mo%KDePt0x{zh-t(*k@$4EgYf>R%KhM z)(0zqpvCgL{rlbR^XnOkMDMfTN7KAb`{y6vq)o5HFd4#G(8}nuO1n|#WpPi&}pF=BcaM0UFKn1KK)jxu z+&cco(L0BKHgx`m0xx2oy;yPOwIv(}R)38wb*MPi(uIs1vFjv&qR%?Hb#^_6J9>?C zq4$NePVyJpvXv6XR#>vBmRp{n?7$1MNtK;)La5>1XK`x#2i8&B?F+pZp5+g=dRnF^ zQeLkkQ?ZoVWqF!A{wyZtnxEl3Jiy~#`pj(FnzXT9fS3gFB;3BKlk)&^a02NC zUk0EiE00P8^bi|B#W?NMNt}Mp$mL%0sa|vXnK+T1k96;vLhUtgEU{~!nQMVxlLQj zJ9;;KF>#%k-eLaa*kuPdV4u8Y>YKw)Y&aqQToV6!k5%G%M_X7 zoD-O1&-}@)^Z&?7>T#7ndF{^Lr{{UK=vb+*)k7OPQZ=bFm1>lo$Vhcz?w4Cm9-JQ} zbK#z(e|fp9_r|S!9g39>>JUy?K4q<3BRj^TD{GGVjIAseIgC06$+(;!JC8d%v1zpT z*x{3Wwjp|@y|!yPWJxySRz;d>ZB=HCM!C;#J9%(+J(YXu7HXkqe(+7JmxY(^IJs|+ zY^4SBNa%{W66jFgc*UM^Fh;V;)pnqg^+ayd%ZqqzOW!o!``(U|*uILIj9p8q6`oo~ zPcb@x{*t>+0vBUFnRE7V86-8HJH{2h8r;MoKg6ZnGrLZ{jG^F@P6+J>0|hEgHj?UM zu|k+^>J;~z-6s#tuBUR62h6xqtEoqO);%X-)wjxFotmt-EXM!O*q6u2RaNVD_1v8v zlkRkq?o2=@Az`RIB2}(pff(YcH z4@E9l^dcZ$gnPwqxrjubsOZJ_ojR2!edt`@AN;~^uT#7Cu=d(}ul=oW<;;`G(!7*B zFoG8FiizOx%qY{ixjZJQZ=L#v27QmFaZ~Mdwz(~cx0v6vTj%-g>FiS&T29wehDj=| z@k=5pk=JB^!|S3mP&=;_N0Js~6dSx}BlGYXWt?g(zhx=S{ zL`)LfPzA4;*xcX_zhulY#Jskx41a=rvFYQHNzg(crL!VgjLnktW&j^ z_w;-6dDEOoFDt0*(rMqkGD?0p3LWJafA+-NXE9rMl-WIKktI;)_8^T}Ix$A8at>QA zPHQB1Kw8*Y-qHVwV&*$L@zdI=Y*(2*l`Smmx1Y8atr7&ZWlUMxH%GBG;8b>YxxZ(n z2v3DqpG}_KS?*@;J-fV5&`0}J3K11CMLa&KH8CS5@9xIH@k)tbFgQw{{^$be)Sj|l z(5KBO=7gZ&aHc>8G?~ehubxxh`N>keWk9FSg-&hco>!1%a=h#A&euD3w@o)BT9~H4 zHQtlk-y}GXAWzMiBq=O+_otEtg+Y`NS+%9Wl-N5*lbeJXOnx!0>zj9wtoyzV%zq1^ z55uy>E{q4aQVd~<-I(>x8B*GLu}n_<`(VFjuE2S2rG(43w(Z-)?aVV*l=rgFCW~v9 zwMv^et0E#%F%tHTYt)%+m|RI?aCpT;@W=D;B-%CB!aPZr@idnc&uC^SH_T1JCDd4g zGBPa2&v?b;(0%X`&WkanBjQDt$DKQ1>kP)EmY%R%O{zd)d;%$4aGoH)laz5HTq$Bx zxQsHoFFnZ`EcUgXbrtt)IfnY67#6YqZijiyf zW7Az#N>2Rt(vwVB<}a7qw%bmg&A<&PW^&e4L&F2j!Q7_PnIQD@w2&8RbNhX&?${WvE;Rj~Dc2lM5p_Zh&nRv|1pVbJ)Sc3GPT8Jk}tgWNSswSCf)A58t-4?yNpLR_-4H zrxr5ifHW7Z+MrNnxe0L`G80>@ykl@xA)c8ZJ2`lp6YRMRVq6N${8ylv=2W@$3`+6wtH$b|!#|un zrO7Raaa@ycV_^)pcD~rKtz&)LWlhfuK4`g*JF6YEFZN+saGr@dyJ}J>&WQXPT9(!a zrvl`1H%tYum8&0YTc;iGU$zwaq;+iYJPSgy~W%}yriKq#8A zTC*8zyf)x?=;aj?|DPL2$@lkFH+=2e*0P{h*UPr@wvow2Q0dpRi{#Bt!>l+ZG#iYj zY|L6<=YN3gw3pZQtP~L;^S^<(5nQp6xzS!0aMe9HS>84*SsX-loL%#+L{yV|ov1DU z>GD7?U!uHk;|}KOPh*3ITWoPHYTz!eNp0LPCY~58QFX0 z9jCcp4if!zxxbGuLq3|+F7n2KuM9F@n`RGkmPHnj#+?O)nOMw-Q0MTZEj_8H)gmIk zwmjO)D<-)cO*@#|t}S077~Z@*HS)Pw%0StJ4ynhclZ4$tw)ul(%PdYoD`mv*T-eEk zX4#XNba4}E;EsSgqcohLHA#olsj-izk>2_TbJ(RmQOx{p4%d_>3fq)2k8Nst9spO+ zL~3Sc=X`Kd#>mxqC03V02RM~knhlE<*W-%At!hlLMn|F#-ntokSnNTVH1_bGbqOC=hwrU@kHbp^)l`pd2KVZ^#=Ar zn57M_32H2fnHGxK+0XChc7R)IHs~zFreoA9{1H= z7U!G3-zaEMvl_K~%R$AW5Tn646=(ECg+vq%Mhy)0+!O^c~9kO7>cY_hQM*Xd)$o!YfqXVl+ z8G-ZM&kD%cSITRLSY}!fPJ@&fM8@DFN1g)-yul>*C{}v*tL2t6Dd8#9ysLkXO$rIl zIA^EytL45SkZL2P0T3x}8*)VeHN##;=#Oh%JFwap*dwmqRX^VEexTfs6p#2Bn2Z5v zLE~`w03?Nlp^(W3%4Z?F<7!go&;ucEXgan#PhO0Wn*k?hq$5E*6d1CRX%m$qsRGe_ z9nRO)rFcz!_7is^$H_B3OZ4wU@(K9UMVK@RIC(*!K9(ToeWT1Gj7~Y>ul^}H)FeMS zX0=OE_cv-j*dUTxB72V800wCdatI)yL@8CP7I{2Nt4Ya`a`aS~(TCqGcdfk^#;D2N zb+h2w&KFwFY5#5OKUl0g2;&ag7Fk3uhfR)YRO)Hkn=^+3s$6j#V1e@=!`}4BBiNhx zGN}A__c8t7#-`Grw3}pFaoX%jXC`J7PIHJ%KMFnP6%)a`+ELPX`1dX3-kC2CFmFA| zouODvGk1oPrc6lo7?Jw|X@AM(vWv*`$FSP?#qgLuir|K?N!yt7zEyT0SJ|Q*b$n{0 z1)hTmXU1z4#ff9xOI(F| zMw^-2AA>RLljtJ`Go4UoB2(E|aCU-SW9tupuiW3ulK{0~96kIMTnh}t4{XCp;Hh#m zNk38EzTteF{#eAHD4#4!C{@Abq2f;6^aQ(w43a0Fz_js2%y-#K8~*NWWX){81A@{?ZeCi$8j?1&&*~cX-bpL zOo?QEQ_vA2{m)?Rc*Vr_%m?_{&jTaOjnClVH)3481U8mSA1FrHer8THp|xUfE@~re z4TD=1v`9>!vg%YTKO@vLFSEHqH!x3rgbKGDbS)}a6{>Y86Vs+Mlsg}>3niI!hzgRo zegGBX7Zd*x-(JT3!!nXY&lhJWm7;l%-ZUrm>aue(^5p-)Px!^PTz2H@gSU+_GtZVc z3i`wHtg}d|bOC!H7nDZ}{@U0f#6uyHoC*)-eMe46w@S$yZ-06Xv+l=mm2dVeUWEB* zslBzALPqB#EmGNvX}ADOMKLKpS03%-7n2tYXYW0HDR9^CJ_pa}$mNSH*g02QL?uy- z2ECk9E;j~?VO^Lwo-d!-%PS>EF1W$S{QP+=Ar4K`Fjh-4-}pr&nLo4jmWHur#09^1 z$DYlO2mQ#Ky9a|isN!kFNo^_o^fcPSJWT%z^yj9Zl`mU;l-HA={;b^hiJ`71Z@&NE z%9m|`MHd2nidRl#Fhe#3(AXox4WNcKMLqAOa^K*ppAf-+zP6KWd-N{*UE(4 z{)=+g5VCZz3Fb}6-i4hJX)ZuHh8#}h*e|eiuPP)0)xS~X-s?Lz66wq3(^0bD@p74L z_B?pya`IvRT#DI0F-Y96V8!!gL~#4rC+XSgUzWWa;HyI>ByGY>BU2Nb>IF#{SpETW z-!IExp|pAZGd+7+-$1mWt4Y$*A-IAyXY2+rxyS-Vx!kl7@G<1Y z(mAa$V{ypCIAk6WRFE#Wr?Re(FC)j^y#EsB`#lvEDzPrIAo4m)v}6)y#0jlIsS`S! zIi-wk@H!HI9~TheN*OuOGgN!q*~C2eK6`+iTx2ozTw?+mm2-lU&L!#bkUA(8kt3aG z%b^o^&-{c)@Yl~OnGa5|t^wPk3RQ5Mx@Jr~t)xYCpb&|g^r@7eYsy=HDX;6}%g8bR zhqz^2f6XRF_gA(pmPIux;&x|qVm#@jr{$4}OhOoT*vO&F(3bu`mX^^VXp| zkuCSnxNK}PEGltP=ZOEEb3Tt$EsRd+<>RR&*P+}0US8L|LO`BoWA?6j^s5`0Kl~jQ z8eL)|1h_60+_9;mSR0V!j8>NmbPZgW_WlW@%af5~T?i9kvpFBW@bDm0{S*62Yg=Ri z_gr1JiP>=v<;KHkFk2k+tK(c5-TLqC$5^#8K_kqI6ZkvaYojOVGEC7nZB(eTn!Ud9D5qBc*$%bh%b*h9x`-L; zfLfug#^tuohSJ7)5#=l7{R;0?JQ?EZ=xwX4>*dMF0W;oqkmYum$+n@MVbh`>=ACPc zLTguM=Uf>|9B`D9NLXydMBdm{8R+Fp-n=<=HtG8k!blgp*w$DVSp+es{AA-e4AG?79dM4B^=D z)TT;*FHc7NE$6WMgv7sFhAY_r&5NexfeqUI88Jv+t=UpcVW4JMjT#{PS}FrQD<$xb zF4U9cmRr!85$oc|xb8^6ngntsT4l~a;Rg@>SDTw6o zt-o&ncIQp-!(WM<-a%&j(*sEKYFYFwk6kF}m-<0KC=P%-Z9F^4ws!qC5op~Nr+EEU zywAw-V+iJb`h{!PGv7O}qN$mzk5SGRlPTe$K?PYfiY1nk%Fpg8L!{ha>Fwpopr1b& zWq^>soYl{dQO?G38MvzCVzE+@(dYx=I5(wlZ>aS3@nsx9O1P1$!;Y?T>k%m4c^{RU zu*p(0s#z;8u272|ef(l_;GG=^~}H?tQe>=3mLBa%~j#xj3}d( zjpfY6S?LTrWdo#tCx%+c7ae=2xR1&0gav>lVNtSN74dPS&`%quXJxbb8HGC{VVeRh z;y#!~o{SuMSYJomKD7^vZZo{QUR1=b-bte`7N?DKV>Duiy}=1?bGqrA%0S;IM8Jh0 zrObU_+K8+yP(lpurKpFqjFz~~8KHD0gIPQ?9i3C+2(cYj;H_PizFwY;9NR7)tKQ2YngjSSyMf^ z$U@J#V?@GbHd;kq#TeyH%Rx;oY39FH%>mZxZo;8CBldwi3W_A(9c|i$>2*)I4|4**zz#* z&PA+p1(## zyAV@{EIEo(gzsDco#e@g;0w4?zR~}c5oYK@RuL?Vq2)g>Pt0g#z=|46v0O5lm!;T0 zKS%~-7%skyZ2#;2I*e>u##*EB@-}O9LkGals||vaJgoE8YS|{1ON1-#cD&CJ`I9}1 zoy~UUc1gv-Zgw$LIa9ma8B`j%UZj=g)N{J*tX9G`>@qWSVx@>2d*;X}dFr!*7WU`i{J{`N%r4(Ml<)e8r4+<^~T;lj%tmINoX54sM-m+ zH8e?kN~ySO9;sWow!S`&-EF0a9NX44dic@|Vm|QXO7`h1|KR!`G@$>+MHWiUDX`WN z6Xj`BSn7!t!r^h9oU8K@1DeX0;b8pSPV&^g>Uz>Yak56Kv9b*(pQzw6cT0hS`It#wci*k_0D#hD_iTPax?q~m$rW5AjH!G&J)idmc)t}w^#L(G0RnhiHE zizwwuSmUpZ^lDQ5cC-2&wLWT0{xK^sIq}1BB*5bPk;kFx`XMv{@%2JY>QR;;6y^y zxDFXWkxm}zaFJ{m31X2clGTrmX9%SqBbrwK60N%MSI$+rrAn2oGFn~AJ@A2r{uuyck%R7?b$0J9Vs*unKqGF+?=pr(16K90!yUUL?Un2 zpEx?WsuZWHzy$eDs&YCXUvIi{-)Y>z9@imq1zLImwQlx#UnOU_sp38d3q33Yt&s>938BbILNYuTq+G{H| zcyDvd-dmYQW71J-FFh-rHHoIcE%2`eoQ$5m77KzWBgek(qd;8q`1JzvrRyq}ZU7RH zeFYSokg6DArO2>qLT>n2nyq5Pc3c}jo`=;wC4%?w*g*Q)yu1EKXY8d_a^}E;+4jBH zpNTyj?o5r?RLjrnMEY>x`Pe+J&~dK+kKIsNJGkm6QAKvn?P*o>83t?P*4Gw?;Ml#pYO?~yY1#*W?~AZOoP@oq4w zwNN7i{Kkj}QHKzqgJiWON zQ#qw=dTbuSEHF_+TSP+1scsYASA^;=?qtL0|H0LI&Q+DIn-HOKgP>L?Z~4?$R&M4r zE9>wV1~xK3ovD}wn=f6wirvL)weS|t$%SQ}JI%r(R?+Q!%tLe7jz_$Uz|+?c6bgG$ z4ZMri=_p#{DWC?f$zhmQmJ+}P){{$K&hKXal&hEoBd(94U;l9p!()aYybGI~HH~HWkmMHfCwQ?-D5gH`vJ8^|tDXI+<^R)2heRy-V-5Dh6 zyDHX^$p#?J0WT5k0i z5_fBn^BI&TY~&X>FbMSy272^!mHxq1zaaim=e~co)?xYz%cc)$#et&6Mv6r6jwq6e zo0AqtsHPI&TR4nAwCWe|DjhJ8bIEC~-VLNeMqCf(m#yCFI%E0#syf5mdF$=B2*{o< z!s_ANAb~Z8F&e`-7!b3j7n;&qu8BLu66ESUh3IbeuL)Ht{{M{2?8$Ml;2eOo&cI@` z>7bD+J^_>r@||;AnZ8`_F%iF zeP??Il0p1S+c(<|wY<>saLZk-|K2j&;%bq%Y-;i}|GoM3=BHcUY5sEabgZl z=d$MA&0S3w2rd$AX?nL!*7Vb+Z#CWBE$nIR`bA?;>yfVi+x6YXbGp9Ry|&HSbyeHO zt}D7O={lqFeG@92=g}E-s`bg%dt0wx4A$gZGLmvifg@$TeR(Z~D}BtW9KPhi-2AdHuHl^aK|qNTr@PBl){Gp()}lneOVZiPJbb zCjio-ZL~LyKbkP$*;hjiwQxU9C2&{;j7uA5SD&|}DO%KC@o+8WJzz{M@l77-?j`IS zEY3#-pW2)nYUF+!Lqm`w99rsgFF27Q9j60Su%70`NyLo8lCXHF5+b;DPL^{izJ3cQ zbrxAz6)1p806O8pJBXKQCDrz=lTvOR@K%j4yjToA9L8GCIw>`k^f;b55msPMA!amY zUPwggR%2a^7g@X-BUL@p!ApDzmYhpZ4ISmAtLG;l{C54fI5V?EMlqb90cS!!d!ITK z+w@jVn${zHSYO06r;+WR#uNeYrO$7SZEjj%=h%hk;3Q@v6!RsLLNjdw%*tEbcso~h zlxCw;*(RCQ>~QK4_ktg9=cKshsKHWIQUW!Gc-B&qM$d&Ce$D-1ZOrV3vDEpJtkxj@ z0}taG@rEDPYc6^hXnPDiPeqH{9!H2RX3{2E_u0C*;7d3~X0#RefH(#=&Bmeh)dw>Q zY?wW6(b*8w<3xkm*Ku#D?SIvO3+5=il{@t4E$$L*@QKo=T~CB#w! zQHOZzL^O|p8K4*RRNr-VY0{#GGCOd!Nw9ZB{X!m#hg#QuQf#KZ1)tlV2C4!WL6Zd6 zM#;Kc>e5wT?FV1uq`@LCchDS@(4zAeYH$ErpC5A7rDzUxKA{xhQdvZ;?0=HMJqvX) z$gG?g&`{h5h4iwDf>58KdXIx53?dd9;>LAon%hg65Zm4IO8vJu`kF!irN=taVD_Ow zSTC)Y)TO}J+0aRh5@sKF5HTXB#LXXYQr`mNl9a$x0@#7GGk}OOP!-dC8|q>#5?8tw zPvv0ad<@WVbE?Humm(fXQ?RI`SThD_k0y^g5^L%j5Q<}{5onD|FH4)IM)Lq|9R7Yc z_ha0HVNy&BG-AU_UUV6U2Iyb|w_*|qx-Ugx7EDn5qzGY7=(>sS!-`=S%<5t0gLSpG z!8~YSae$9WqxA_J{<1mI{6_t^MZj6aSa5kS{`Lay^hM|q-Ee>t$3P#D0wI_yW=gtZgt+SQ9YIw!+XKxmNq)7=x78VS@rIvBZNEqU6N_Z(WMJrv?;iPUxK-#x05% zGpD%YE>4Q2gb*={ItGGgFO~=D(wT$}$4^SVY1;xey%012Ty}2OS!1Hxw=Roo*2gOb zkpTuWiZDNAsrluTQp_MI%Jo>tCM*wFAQ+OKx9d_UJdjapjAcS2#Lh$`SghFcu@uKL zj5P4X3pU)K!C97Y#fBzM{urk=Kxdt>w*VBSL0y;dO4?fMQVHt?!X$vu4to$($%j$v zt8XC~$Fvy}VG^T8)RDxNsws9~TL0}QLCgyYJvI1hT@2+wXr2yQUkYKaFdk`NtZl3= z#R{#tv0z!DCp3HGO^SP`mZfShj3M@LodI?j>sjX%b{=+gHih;w0V&IRv5n)-PY0n)V7X zfLICmv#fK2WhJbk#K)4&_1{7-u}&RI3L}m?2W(u)CT=)Vlcx2URd9FIFx7gI*{x^y zO>xITP70HRkW_46N#BComGHWqurB6Q^E)TS_?UI}!14L1?!B`iNYlS-HYj3qW*s9L_2 zaKBBK7O*}_>{e)Ej~J}A07FWD-4-X=O*0PN!)}OanV(;5kYerPmH z2I)${u9o^jbt#rf2+e{;gAMjMV9!fINylS#DX{i>?1cISb}NN_jN){r5w^cu7X!`D z9uG`NXJ`|lx8SU_r&{H8DJ%+hLTmy!8I>&Pt(o1q?&PF6-LjJhq7wE%W(Euy=AhVE zUoJ76u)QKojmW2i6VI{W#O7yDZsg8u*wx|JgUVw8CsNpXKu?*r6*r!&8k?dM4MqU4 z8=D(z-W;y@hWb!LC$I^au;p3cVa67LT})Z*;x>VV6S~FX?9mm64<0!!HhU*EypZ5p zZHH?P+p!zDnGvb&LnGL=w`pHp3KNLK7`6pA$^ntg>=uz9y1OpL!p8jp#HcuUq@YFE zqnz{>swPb%T3QE#0xOST1{h21?6BpVB;0QoVyvOVf{DROu-b{Wj3d+#cb>=m!uaP= zf_a94z%GJ@q=xECQG>H@5G$L#Vz66;hJq@_x0t!AqnLU2PyvGn7okPX-V`+S7Vcb> zMo5ENDe(?EG+0I~x)c9G^)^)-8U!&mjvypBoZZyg?{5(J+aKyVr}gzFY3IQ%cMC&p ze-!V4c&*hV&|pabKU^I=;+jF2N+xbeP3fn@)`Eg_a~?Pf)Q6WRBZByc7c>8H6qtq) z^HK}@YF+b~sl_t4ITxbjhM3GdCaHULMfbzkx>7=3JR#pnetPuB8<@}C&!WfdOYLY0 z2l*J2%o+StdP<$1$-BbSUUKYOcx-)70x`rBkz>Dlu7)Js%sllZ5CbCzCzhJg8V=PM z&D!&Bhd*wR6&1Q^6H$H|)wF&Mjaexnwx7*#!1Ku0SR9LeiRJO&+9I9yn631**DOnF zeWrvw$c@U;uVYmBG6b%t(3;D>HO%xrSVQJ5wW1;pe-bt#&6~)nnm0IY?tsWyujtDA zP!V57{NXqDGEd#dqLyq+ECT~KMMb&E5E5BRbXYbXjF(*XDZ2Rx>fp=Bi{Z%Ghi`dl zi23~y7RbTUn{X{jDuQ|ma*hP&WN!DA-5%n)^vVOMg)bwv!5j86^8bb2)Zb9U4Xv+t z`C8iBkM*3_c|8!85)N6p`Ji#B7emhl0L*7SS+AK=m@|brb<%=N6wkqt_N8O+obp69 zF0I2Cert&N%P~MThS_j-PMPKk>ckvQhKdMi3$$Btv>1eClZfugNlbO6{LbTO4^Kt}`TwdzEC;^FLM+Wo z-Kd8HuR0XDX$j)#W^z)u!y+xz=lkME@z~Fo5r3Befw)f$F_lMw?x?GkxuI*k`TzEu zB``N_Yrm&+uJt)qt)u{hnU@BZ?TckPZ%YSN>V!u(GiMjoXY<4VQ(4!&LPV}9?A}Qp ze&)$d%w^BAI$>R6xdS-;M^ZB17-cn!A~{pa=Z_%K3;XW2-pPe$Inb?Z(7K;$Oo zrXRA1B>NJ}Ai(L?geK)fN+XY2Bv0py`LX)oz3?NfBfbn!lxNQ-!uXdrF!Ybv2HBR_ z@a+1swrA~XktH^z%laKgy++J6he60p_6Zn~JqUckf2+B<5@1TB|zKGOcz zreNEM;0}Ow4S5z>yR>at31n)OXOb#fL6WRPY7Qh{z+YHT_J0HiFkglUsYXyZfCCt` z84oryPkmHFDSDT-eEh@%Cf^{!G>}>kga<;3Jp3Q9cd3`y2aFXWmOdFFXEV1CGyn1u z`%vUr8eSeOxhtDic)X%QRvws_hm+)Ae~DUd|2b+|DI!OLhoIlN(gx=DKS!rGdzX+( zsQ%6)^=Ob$+U}XLEA4TaCLZM)Gx0JOBVR_2kL=t_glp!S5z@}S_DGjDLj$-7Yxx|K zESod9ADQDb)ErTM10%HSRkk%NB&1&-8fCzX4a(uH$2X0fJmX*=QREQVpkVv3qnB4q z-n?pf2k9eS8d#z&-nG3XecA9FUZ2{P}!9t0FIsoE6D4xV{7p;b$?fPkl@ZiIh^23^aAFf#FZq5bGC*kUx4Y__Eu#b zpeL(*LEil32AX7Fz4`LfJQE*a-{#jHZNNj!cD#%XvHmw4{wercasGC~J(0wP&yXTt z{cYte5Y(?G1q+*d^8s@C)cPK>XYsTTF$Wj%D$P>{PDcibaS5xNC#x&U%R9#E zu!>!8SGr?O@P z>)%396D~i|60VK#Ne0=wOo25Mqw80fg1hHh1NqK7r+uXB{XKfmvtK7|+bh36jcuzV z62AS1ileW~+jCCm!S-*qzACu9iE3%#K;$@K?7$k}HWT}_A~jA=$)nVyIjaJV2i`x| zk-+;f|DP27{d@#pv~8)eTCZh(@IKbVFiVTU?Es>zDmzJsl(gF&3ks+GfH1Ok-F^c5 z5>G}ByfBZ$6AMaz?*#TYG-=mzJ+W9SV^qBFi2tou*?S47RFH3AJ)`_9j<(oc*-UNR*xCbeq0<4fSNl|ka##c026yw{ zp#(e;p%~e@s0R5|{_F4TNuFix;3}cyllqt_60`^M6SErmw1lgL`4E<#FC&M3c=fp~ z7JVHv^tX@CT?-8@JKJ9rEHpWK&gx3F{;l(2_VO6TZfRTEgFnP6)mSVZpBBY2%2uaJ zJLL&-L$4gHuIuH=K$Tuc4>MmL#1x{}=PdWSMCH6GgITA=aQboA;HpWjtFG%=DI)$k z8BV_>I?TMVu39@pvjh-ax04fwv{qz}I5H|nI_?=GM?SSW;@XL}?eb8UU;rG&| z-ODf$sm806i?g!@)3kU#?2G!z{%zGk^7N)E_FJBeym>+V5@!2w6@XFs63aNkaat&K zNpD<~pyG2DtHYuwN|bCvi+&yM5Go|G(<_Xz91Em zj8CT`Tz@=Us{Oq@895+AP+{LKO~VYcrD_qhU((S1m9DOaOGr=OL)6xW>l{bH+E+(r z@W-MyPNSa~BId}Qk3A|NhBK;{0iNc?!)%g$L4?N(4Ue@N@TmB9=zh(Y%q6z_b3sNox7{v8aW4`n%K}Wbga7{PeE|6O1KGq zXm_=5kY(uj#3$hSIpd$68c6p!)viJKTd^6!mk;lm1AbJ{C3``IaZYvDX+&>+xYj@( zJ?FH2?>V=6UqAntT0g?Rd@j4Bc*k2J_-M~EcAbmfrt`8+b?3RAgB}0f@m9ybbUfNo>A1cl-Qn!m z+cDbF)BZvG>+S!i{o(e{uNhkN)S3s@+}SQ~-`3u~=H2eCZSS?cvgZ7@r`sNAyR)s( zw!cl^MgeN^KwD$$!rQGsYkj=+zAkb1k2?R+dQ0ofnqRbD+Ny3nr*)v^?=8P+dA{Y* zmP*U@Eop!}_O23aV^RK%K&CfP}v+EDdq`R&8n&x=>LbI*;g61=tJDdL4^~#z; z(`!x7G(FgKchgl(p(bOKxM`%Rx!cnC`^H~1KH2!yuFZ|N3-0Nu_T11jrR{O`?CaUt z{p+6I?mu@&YyD+9@9F$ZXSUPRsqEa{xwhlOj{g8E<&lmrbzIkx>Tq;iB)Abh?ymRv zn``b^lRuDm3Fe1Xas<}7xJff{RBqiblcrIppV zCuL%4oK`zBey>4l_ZyGa($;F++Ja@;mj;2fVqRXL&+Dug%bjCZXE-k^5IR%dFDm z-|6AX7p9CtDXr3&Cuh9+`J_*}@%{P_6w|ag6;MR{QiV%x4xIl3t~{Lt>-J1YD4j{@ zogO+m!liiDq!Z?OvC}M4nw6QUNn@baKnoy-ZvF$FdJT)7|w3x!Q-I7rk9HA}GarLA!lhN^D zQ9n_zYRo11`cnP#$>}+2YA&peO8oxWOi*60COH=m(1DCtrO)W~k!WZ^R-cz-oH9|i zS(P+rEhxte;xih#`jc{LK`fk2kEH`1#dM(i3a15L@GLy6kkx+@z|tx!jabp#ut)lqi0;+8sh4Ssi+V=<#r)-DX23~%hz9A zFCR0-XiZ=up!FAMtwOP3nCn*zUTaarGzLmAvm>qTSJpq5$|jKV+-4LxlExWRe4V{s zE-^Snx+$AmIj0d)7V5%|1x^qxs{E7~iS6@pvwA!mQ@qR74=1-IP8(+8KASD*k#=2H z|2(ENio^!XY$BBp1$6%IM7=x`5>j(Xyl*(2Nnyz^-B2$N*izI))+32Hg}`3WvVYXe zeG6g>&TD${q;xKloev{c5E;%@nyA~Oq>ROAHh~EEF`2*XgL-=?*F2b?b>m3)>y?GJ zP~7K{Jnf;AzA4e1Ybu=5$-Azqm!~W;I-(tur<4Ji$QK!Tyj~v56veX>x-s#BcC6$z z$od}O>W`QtVPia-j890y33q(c&ieP`Q5ls`Qz@@-YG-&41cVSxJ0Q`085$YwSuB-B5K7HZu^Dkcdf_gQ5+ zgF}JDMLplG*W-0dMe`wNW+t0g8dQPJO0Jn<%e1nnQjMqmsX{a--BYQ5u5wO`4MtyD zS}SLL6;BjwZu4X=>9>Z@c#10zIYePPmB~*=ZJAtlIyT59T-SuO;SxO& z)`+qaB-2nyMh3X=gP9pWWeE5}fdyAG0d9!(4Rt|UU!V~QY{>hS;~A%X>z;afQX!?s zT7d5AiivEGYrgNc)0XiKGfj&N)vHUT96#d4=-QcJov{lB}!z}PemmP3?IF=ZuR`iG;-WH#sP(zwAgd8OFrb9 z>6b4Eb<;L|&KoQybaMKF>+1E3CKa?U5-R27L7!_{dhu_$a^I{nPKlIRWhmoO8fGJ& z`|IV&oR}&^ttwGLBMZ)kcXZXu!#=4<6R^!i@>6+fF)SacmpfxNDn2nQi!Nm13W>ts z_tm-p=o;E4nMu+U67y8n?|HUfZZQ=oO>*84(~C6Wj6@-*mm}K?(hYdSZhs*X4;mCj6ik|`C)6MRwASGaPoTO_0K^6L!BWW{-Rs%hbsy1+#%#ah298=222Y}1O~ zpKv4OwHgY@Yap77hi0inkw!Ov zgHr~NOr6q4T*g4yBMQfdepdflY!8aE!U)p57XltN<*pCDyAYohWljE!YciEgc|{l8 z$bBCPtDy2SU`~xvs~l-9Cokayf$>C?(&xsVVA`-yn#4f8q7XQJ#k0}WoLD512Ge4@ zudB6z^b0?C9(ROGc_SXmoHvDNZI1SOlb(0E`hw0e5#@24?ZRj(7mSJ5e}n6Ga3VgN zSA_!-wNb1aqt|)r#UcQaX2m6=jFM+9DRZ*k+??7YN?4p@8F$PQNlJ8Pt~?~B)pQ_i zF0G;Rvr0oGpfhzDNbauIL9*Yrt>qle)SSKOi~|QE4+Q2Sajk(H#E8o)_B+Ps5-ywH z5Yt@Hb!WqQtdDkgtuq60rGHEe^vA589v4jrBkD`Lo+h^AuM7`r!ja^xDC1U6$kJN7 zNK30P?3R%e|M|D!%QPu>$up^?vvY1u(lDD;jdN{`+X8N!Z;gStMB@$3DV&yidC;Gw za(ZdOF{xJTrYPqH%YDkxc_CVxgq=1~j<>rJkcdA%q?xknq?9Hw|<8xcD6YWJ@j z{A|N7ul09O6LI;cjm3$0!Ztr87Rz1chK5G+ruFDvX8)VzH){|0Yl{tCGcDUYtL@JV zime~?=$cHdgT`Nb&X6p-L?#kGznE60EK;FLs+yC@$bzUk+RG~@f=90ZI3Rj}IU%aD zED1~U<$5yn&M_$!GSN=+9P&5VljQxeDoZs zxQMc(Rdd3GR&NRW*{;F8LctxulOZ%4>A1nVqie(FB{70xIj@ngIknk3MOC*UdQ}M!a5>tOCq$0^M+YWX$O!F5~?(B7rUpta;~nu zvMQ(~R?6xC1^;vl>Dvj8>MzQ;5vP_%T%`1yt&~b4&bw^kNo!V0gy&R;$lDiGd;9n@ zBG6a%GTIB#pkc|941>-Q4h!8zq_j@CGZQhH)>q=Z5RY9{9q3spAtyXec-3^3A+rCL z@`Yqet~^Yvo2!qLUHhsd+)Hf3`wcytx+D$ncUs$H%@4KS+V}#ivagX3FR6C-=anh9 zU8IY+CBlp;7s^Rl@5u%tR91U>c`|b7Kfx4>P~nZtEz0Ty>odD#*=HtG7z23QN7A>M zDa}lN0-npOFsTz^T=4laa^lcU7c&ort9a+SbZOsm9YRGxX{PCE8fTk{Tx?!JlpfUa zD>bH+CnHBL64rvXH!>G$sy;z~(66PObTBn;HfNQzBI)OT`#mjw%af5KZ#+W5m)q6D zY|>TTVAfQ`Tpm%bI2V;f?1p$EM6MmL?f`URWif)g&o?nG`s%n~#J_YACaYKr&Njt8 zvT@p_cc*lzxC1LBVSp=#S4xh&O^nPt2JXi!2_W}lgK*j>qSdozNjNq$mv#}G5r6s< zrIapUV18z-f(cVC^{N8mqQav|`E{N&6(@3Yb+nIPOx_&-f|>cAxoQ)1twI)fw13%+ z$Df}1)V*L|W$KWlc{dwpb>zh$x!+MWZ@JES6sUpEoLhTT<4w}Z37oT@W&-PPYZLaW z^~{34zJtXaCq@_j?>2-tEyr> zR*Uw*!Dn$Jx&&F7&3Fw&umbXd;WP&NK(1xq^;P=@R{I3eWQl*)_4|eZ(#5Nn7{EEa zI3frF5JJFPDRSNw)s1H;P9g9Bgn5-O$$_c%lkB;zS5*5pupGQVa3|sZN0391jWa+X z3-WWLLSz$JO-cm8U+w%j7`^%M{%Y&m>l%8_Y6^6XcithmuKioBe{I>z?uaSuh`uH8 z(ba=4Qy#UkAP!F}Kwu=X1}9|Xr!iQE&-$UJd|8bGlzGq3T84aPHf^KmDTBu>k{gp# za&l=9J1MUiL6WlOkKoM8~e` z8D*wkt>7j5H+NJ=z#+e+TQ=!h{kYJR(}~2k2j}mM zVmdNTQ*NJHqRrcbxg^_X5SXkiCdW>^yOZ2|Uds@pidTWQaEml%k;sjELqw8Nj0utM z`-k+19r03W;ARWt{`u<8b*spL`5BxbyYr{DM+ft;N4&{8 zIg!S~X(p1{fB&VZ-60iPc%n$l<%3ywud1u)emP8YsWs@i|=U^OZE_2H_KeCMju_Ph7$>V2Qow3-sW zboDAq$oP+b{(A!Q?S-n1v}6y9$VGQn*YsP3<{5*?EiKuL+1ZFos36o6P~+sC)pdP* z8FNf{26o3c4&B4XF;}gdokx*>q`o=oW^)R!$m#RTd={}cu9lOB@4{BkFJ=y1Q^9N5 z7w^Vv8Lk)!L8?FWJ=O?OzJA`5dMW4dfvHI8KMELjM?|SxF{C`%! zZ6_6wjWu9HYD|tOh(@4%2|(T1aN(~Wt|DpXs!}#QxVABFBIl6m=@<;IBULiuISOD? z{S{1{)p@2xeu>L0nVL`*$2kk3|2%L6JP|o^iI-yTEI)j!fb9ArbP_O@Rl_pbK^-Iy zeGxjj`X}VrH6bav=5x1s{)h1(-Q_A$nj)mZjFpZDMy!4pkmLx}qxIzca&-rI;a3x4 zF#?cMqZ)p+d|J)ysbEF&j5ut&u#Bd^T)~Ru$v6Z5@Q=Ebb2KYF0L_7iGMjz6<`A2WC@ zdp`Fq>6dq4zN*TJ@A_3Vm>ha!@IvOf>tW16dSJm0cy$d+9<|#wMV&k!GDyc#MumhN z8o37hSVfqkKgT+l_Ya~G!{9TmKV{FACV|S=Az!eSaL0x-%};(P&6 z0iKL(*8sA?J!QX81+&pX`4Y<^%I)h01OUv4Gs?L!RepRrJW2c?VO8sI#1(6$h@9xW zX$Sj6ze_+K`%LxhK8H+}ny2I*g+?3?jLDtk*oXLK%S}*Po(QM1`5JZJ$FK7r^_T1g zl?YK;UYF0V(80A>Tg=e;hB{cc;UaF&{Vev}O@Pc@#6jlH+I-#Q(X#<~<2W6n3jeH46wc{| zu8H{>lOCykG4%0=VF>vm=Gep6*l|q|91D`MZ&g9)a1_~ePS&%k9{lfbeL@cy=z*hd zPQUc+>ZLsb?mB4! z5%q`YX%`#9D)goin3X{MEZ}3Du08gh>N;cyS>+3a3z#V)9O{7;WKM4d87zLDuAbE6 ziSM39kLw_Svmb})t0mRYVZTKXm=F9G><)qWssh)%qmNgS>4VL?!TW@q_)*)gf6lWG z_#o+d0@e?4M2Lb#I3eO7Q9WQAh)Q!CxP_v^9*9kUwJ$IVSJX}5cb+({3GDqoMuDf} z^|e4=`9AzEJQ=6|eJpNp|GW1(u}wc!wXgLw^k}-S5O_KdwzM=!T7TL8O$KL0Hg&6a zX>u9M%hyg$aj!nUisF(NbFsb5>&I~o*kD|8!FF-s51DC+d?u!phNs8mWc$G{4jg{A z+CoG>gsnbRL`(e0l(EO zv9Io9LeH{zAlnj48_YSVW|DKp6jf3sav=*f;RF*sYjZAr1`C`gLX^Qjc7SW~8zaoq z&r}gWV_ou~7hE;c)U?|mPAhd`L&OaN9_}b}>FZc|D@EjhYG5a^F8*?udFpl4vgM$A z3Cz89_8Py(8iE+tf*-Tq3!%}c^-~&8 zRFcufX0u@E#sO~~dE_}v246;w7beG`Wl#a|6 zjWKUdl@*aIevUuEE5`L~A0St4;52>d=j;HRm-b_Txd@jjaeg93sfAXNFhtjAq^?_D?#!G^iSvg2}!Cd=zw29YWxmKaR($%s?V&CxBtf??pv$bnCP zaR+(tvOCr@OTS`aaONeJIhYIJ0AD-sXNF>YA|WxV;mhahdHk0cXTA&>(4ODN48Mjt zHeHFnaKTo7suY==oybU1ajU@#FYRqFR?q5LS<3onM-Tsm*~I+gML3QTVZ-wCa${k! zq^T$s4o_>NbZW8$>X+KV`FF3NCp;O;`GO%i&WtdIS5eQV%a%vfBudXuM{F^r(?1(< z7-Xd7WsK;`QnLNWz!tujdv+63c$pmt+tTIBvpSs|vro`2dlvRmEiO#Q3H=fdE&O8A z|An)6k$dMpvypk=rRs7NOT3};W{{&^-u^`EZw2wD3tReG17oX2u|$>|sVNw&mXtA0 zDec-YPP9b$R&{Wzl#`1di6e*B%~WcK(f>O8ZiHxjpgenAw9YyObv8FIfF`ZC1pr^p z4fMUYv6?<1dhrAxs=~$3Z(uh47YxKgCo;RiBKP3(aqJe7ED?j?Z*tJ3JkibnI$&cl5O{ z{H5ul_BY#q-1yD*V~roQf1#e_6yq25d5$9&bB|cz1H?j+tIeW z+pca4x0xEBZId*AN1$)p+}6_i`_^ByKHd62>!H?StG{_?tD#jSINmxUIMmwQ^81#T zTE5?Mf6Hx6e{Pv;xx7Wwa&F6D^M5xz+kK$9x9OWrWTENWrexD(@9%nl*86zxmwRvS zo$mfZudjEkcemiZ-nBh{>-kO3^F7~gB#qZJ#stMiYolD?@42og-Qxu8ZAT6C_D1)Q zx{qNPYfp4|)|KQbp?S`Bkpx$=xw9u=9S{;W4YVU}is&Y!d83#!7@R7xaD z6t(%3rDRCVOPzaa&z*&sC~S-RJrT7XP#^98W9&Pi_?Vi*f2f&m*Zei#{d3u6qdFqqU}3|K5IVM$)_5*Ap@5XI>$P4Rdu}zw{BJ4`tEnB*!E3YMFJjTaFmcOX~D{+lXU#;TKP=f6QCSr z+S1B8%2qbs*NO+S1#qddQkWP_^iX#ueo{*>iZVk)7V~aA*r=M#H7fRPErZLpyr{!o z2uk1u8SQ2RU(nKn-fR;~cjKK9RrkldWZ+gUeW7P6VilYMR!3i^S`^9O=;;jyk0M2+ zX$zNY0b6nEuX?&)W>E+hPg@+uYRZ2%8+S+ zCmJyun{f+qK6CX!Ejd-d3+A}D&KJ3i+f}%FN~@(1w&rjMtq2SO&R#OeTw>RXLomyZ zpXU9GHkwH^7~W;sHhJlUWktAJ62Dikgg_$@{h-pV)r+ZCQ}k&NyiUFr&Y&GrEmF4H zOKn&7MY@FKEq)PCcFJ~(FN>SIxnp{l;*DYp<6XW?$LjNEanAQ{4c^nqsgcX-78Vt9 z?uDF}^}R~_aK4bWqm0?xYT2tXXE7VPSWC~~%?gTQH6Z~s09~)((J+3UsI48tlMD_? z?ox@*d2ZLrr+l3%S`3vuWw!&b%cA?6S~^!)Bo+vA)nNQORKI4|$ z)g(}Uxvta72TPO-lhdfnW8&qmGwV946&G8wUxO!|Q z8gFUkvw2Sh_by=eY@u3o^@?kGJzY*(@LDWN+Di?O976Zrrwv?oFusTGo}=1eh>GrmcyCL{Q4p=4Gr7rU&} zMD6;7o}6F<(Tb~BO1P77H916Ujgec)65dFf3a(so5hN^g!6)>LTs@30;O=V95(?O> z{FQfU^~iEOAz1A~tBg9#F8-)pFYXkqM3?UP5r@oJgP7sj5rCs3m4Oq)F zFVQNIxOh8KPG;)CKsM&0*J(hV#f}t6cZrA{DF|ZH2ioh<)mrV6J!T`kT+GqV7i(;f zGHO7qj>I-om{*LXdxFJeG3SlCP>H-0M2T3%74bRSOqSaAa;+XQu~5Lmj;@W(lC^M+ zn*Nxc?k|vNeG!B$?TXaeR&;k$YpCdp1k+_xyK4ofQBP)G@2zOgON6NwFe9Z>uHMY- ze5qa>Cpo_CEBbv&pF2eD|G8d0$~aJWI3*@J9g-|l%-gi$!h$8oHFAut?9T;!g~fwU zYvqM#l){jl3=ZDrj1Vl&X-LG5V3uQO&1>-_m{8BPz|ZIs!WSJR=5Z~!nw5M>X0m&8 zT0MN+9KoHPVBJ+DgJBBa@)tdwNb-cO?WniQ8QRQq^jAjhS?ur_hneu0n*Kh%2#gMrWXVR^1?$X!l z>DHo*=QwY<6c2ZuEop9_HV&yCk*WESMT?g%vPd8|^HQyRN~Y^XUZR8qMF@T*&#c$e zQ*AfyL}j_t@aAlO?C|+|y2EC{8jUjDCfd;^OYKaP(@fkW@s(+dk2 zfr+?Dj+wA_sd&K`w@<#p0{{huS(E@Hx5$$S|@XHt6sf}9_=iMcu;|E7{zsZUp`lD8S zJRBGPS*>`2bM(@IV$W1)I>KIbCZrdS*FiyY1$42@H~6qaykfteVa~ZR8!NPBQ>9vr zQoFNSJ#pESO@-JNM1QMt<>KzoYsKRNyfT(#j&sZVay#&wCVSZ-Mt^F1!_z%GAE z>p-NJieZe;p2s9HpC-0kpd|wkwdE?+NL!r^22H}A1A4M07)bhRCQ}z;UzV_a`eqYq zxEpvf6m&&}u(#mjiPvbY4Dn2XaPU=k)S4+dBiNN7;fnyK?u61NmMAr1t_lQ;K|R<( zi&lRqSoC<>y&h{ZlQ5uHY2e&W$R32aL(QX3Engx!&{|bh9}nOgA>9DAG+xE1!{4h*W0pYcQv$nf}E>~GAzC34r-I4k9{$P5~#UcqT4Yd+o7g5=;^6=1W(o%?A^T2jya0w@6gjD zJ_P)FxJplsrz;}5NuTrLqO;~k6Ml1!G{r655nhD z!k~Q&lMyU}Gmr3kIuhY=!Ai1)fLKZUik|<|(hHT=0%|o^LZXj|G#UP4{lr{I`=nq| ziZbm&4dS-T8(*ajLm>vlk?pRtL}Vgzg*SXi3&N9Iv;NGC#gLoMZg}(BJ?nls>C`Mu z2X4CVse<~_GkQa_nQaLf;OmtjBU%_w9!NYc>u*=?dj@b1<9Uj~k-u8`#CBny@~i15 zwknT3JlHzC`ZxDYtCm7FsE=kTtQ6{A@OmoQ;}JNKVmzn5Bh1f^B`c?XojR<%@9S^h zGhDmB55y_Kr_?w*8WIz)1}$z3^LpcSf?4RqMpbM-h@d3>{E(!U@p6jkn-vH?)7vwA z_;)JqH1JdztTkGlbTQ3(fv~WdV!V{Q0sK7sprbeZ7ED)TSqcQ)JFMLCftR1BMdteM zZ^5d%C%4?XE|Csr(MraZEVqS9rJ@;+e)C5#9*t!wCtg;cS4~*!h7e{hW!S4m|Iw_O zwpJljz}QkH5l$w(BnK=k>ciuOe*g>6c-}a@$W4Dx?Zk!xYV|f}1K#jzwKqS67 zn@JT7XgDP(u8ICjb^_h-b5zRDF)1r|T;AVx5yn0*2uNzxqQg7Cbs2;fxn-)qWf$-k z16wNuYXG)P;En_~Mj)e$x`;S>@8 z*H&<%ZI8&JOFl%KfJfH#H}6=zh+;Uh*{xi1UjJM!zBirMSN6qDzZjl5HAeE46M1%y zz3cm{&awW$cXUHPwKETdnHV7ORK`3Ab+3{gs>F|48{fO3Kev6=68{u;y|QV#zj4 zZwd)B#W-z4wU)nXD|}%r51K5^D}&%C_6~ovwGXcYfv0NA%R19!8$~?aBuXi=n)AgO zt)Bnf(+5z(iaa31ATL$kFn|B{A-1vr}5t{-`-4i#xJ1YLn*j>0l%-7dzPEDp%M(Tx0cSAWawSl$S*r(E!% zz3Y|fw-2@rU$$GVEcjFtD$`UbLpnGsE=BD%rpjgNsf<=xVml1dSe|lb^18#oi*@sP zDzC!U;m5W^7r_D!5wP@#Vs0+$wBR}11BOToFq~_T?w1|uZ<`&O7or9K*Who~%UvUJ2qdc%vnc33U zgV$kO`xk&JtU~KFRp|6KdL0Z&guSfC>9cxA>Uq1;KG2_=9m`Xmk#`=xyY=$j%Kq=o zU7>7#QUCXIuURv5*>oCwGQPa-*|ir>CJajT{abepkqg$R;i<>H1d%&#DU5V()oQbq z9YH=@k+E{71iWaM!8X8M4f3)w3pRnLU=;4H?j8Qy)%~kLe*I4^LVLB)XA+kS*@$F{ ztT}D1memiGeNfNc7eoKYvJ}HF?T7E)`@Y@7>o4xZb299R-8fb;IjW&_%|d)20t8Xfr_O|u9uybz)j~{`stW*32JnsY&_QVWSeA0;#67Ti-TjNT%Ao%C?aJ(h zXXmf-+WV#y`l9|mz}mhX##Z0YlKzEK(wg+t8kVjdToFL_56=Wvq^eE`5E1TcN7oJ? zI|fZthqbpntQ1>taTw*PG%2y0!{E(vw0vH55lqj@JOCnp9bh?MAU7+&{?h$BAN;{Z zeb~s<(2eWnLAHWVb)nMcXv!OfL;^wpr$T8qXHG^Vx|WR3!{Q##QyzYHN_~EZGuOxG z&&vMy4)@OntTU{c**$ID@Y40|b#I#Z{?sGjhY#OIP|M0JCDZ`Ax5xG!+&esp_960Ibm_eH##;@e&Nqt$(P@|ylD!guX8^5|-8fXT zG6$lJefyAxw(8>jxM4HnTM(^;xm0yWQcMz$D*r>Mk~W_DWb!G`@OrZEH0reMr9 zw+OG~5*=W&s#%13sO;bwt{6F4QI3j z(A$GsfyzVTnx9>iYjLYFW)tM|J2}wLD}T*pARr%I7EVbi?8GZ5^vy- zhUf!;4g*#fe_xHHw@R+^@Xp@IPorwMJJ?^hi^lKP((0*9gv~Lz zv}sx8c$@ZkWkIe6x>B_kgou;qy|6jHI@I4XvocGIIyq7~OQAk^EI8txSO_l*z}b{A z75p7aG28|NnT^2yJ(dSS$qOUbuf4-BL_l5byL?Hdn01X-F|*+C#qcN+FPq_?R8&D@ z{T)i{4N%QkmSQ;k(z6@M8%7%myEF^+Xj@TN7N`!^G|Aa?R>b)*rHbF-*|B8h>Is zjuMY0`p@i*FU_cmeAF7U5RI2wu7z4MQI|-wa_7%sIDU}qZ<|?}qulv#@6y>5O{sp; zu-O_C0t^u_MVzK!97&0zncok5CC|;gWvq-c_oo|yhjOxco^r?bw{0HX@D#Y={ikyD zCH>3h8X{84qa9a?Eic$viYK%I?!5$#4dZ#rnc^*155N5qwI!V~Q=?*fS^voFSn7yx zS^2^3ePE4xS>JV5zp*3ksEIo^G)A5rtmesaP}NMPWzDowFwV+MwgNl$%B+#h=<4a( zTK}czl9_+2okM1H<#e{m!RP`P4Lm&V(00H=LsVv_>kDu0rV%X|$-LZNJ zV0`pKfVd}KyGOaS-9Hz${-!qEyT&I{pJZ=mwMjO-;o`F_OGkTsfR#EzKn($W@DL5a z-^&667WlZp7-@p?-X3W9)r%-k{=eGa_wrDc`=%RIt`1R!k6V1bhoH2uB8S zL)2Ylr{cJwKeJ=?BFd9@-v{^38_ucOXI|02|AoSO<`w4(9;WLTP>z2xZY%2w~^~ zJYRWg1wx8Y;E(`{V=Nh5>A+R&{n&T!gs`3e(g$8Npydbe4sfjjp~PZ9OD_QZdk9f~ zy)&k%ulu%Y7{1(~WKZ-r&Cxzn z2%a)L5!&ap*0=`Xk8cB6z2^js?^vGl@MXUTWb*I6w{Q6D3Dtyq-O}8$VR=lh&&vFx zuRVv%k0NaDdtE;OCWoc%uy1N62iw9JRo19E2bp6ihLg{CZx|~G{F)z|zuWW8{loij zfu`;AF71MoxrV(1ka@7iA}k`fUH+hx(R%pwyZT!fs15>|0RQ6O!t(MYF(7&-f<-{jvMrhQ%!>`^11|w+9*5$?oGQPB> zUTxVM_GBfGjfQ)>^7B{2iE(9?Vz@62m)}p{wP)ygjXK)lrESm}4dB_5t3esBmF+~K zTCk=Pqt+ar9ZOcK_Y`5mp7_z8Ve>ZCxRYE0vU1&oJhphwF08lSzWTztdibZ?;fAFbvEEQ`dL&eBxbcIA`rf&FzXZ=}z(E98NH z1uMn=(9*u;p=Wy0Mhs&k5QDB#OxD_?W8qF^_k;b}*|9t@VKRsBKKbXp!_I^13)Mja%&pZU^Jc(~m(zU!=hLZRH-N>g?Sk7I^oN>xZIQGdQkBWd zJlOa?56lxg@7Sdr`0|5bMtfiX_gnI#H>`C(nwCMVwoYDS$g8RA z3xLG~987sSjAxX`zXf)lmB~u*mN$;j#OoAzirF@_eOn#+;L;JOMpHE{ibpDdQMU%# zu}C6K!O+7Fb^*cS^z*$UEo0??Q}fqgeqFk6?{MM++BB$K%i1(}7KpS|mzpiS<7Bez zsLI2$W2wM3{-#lUiao>s`k=b9Q%e`Y6lhi#p3J2sB2BkV5Xk|E1Zm}6kHBl%STYy~ zzc@cqp}Rlchakn_rGwBfO*dE)CS1ZzMXF_vrP>h=P9LgB?HqzgjpqT4?e|Bh^3ehGG$yB`Is?^u@d%olASm|r}xclf7A`w7G5xW~t{1jG8% zSyW!28``#A2Wa>Uvz~l>2ME*B%+wH|<936x?v7LVzSE)QHz}U>bnAGBigzMdlFKik zis}2%mCt+{1bZw`IrHSUvq!79ex@Hh0F<>psOVA{lkJwVd4TCjJ_g6LvE4zF-l>!iR^p|)k`Aqpt%p3_3BmxZSY(?2|zz+o-8 zd{~3X!r=T1bPXbeL<5gk2%!a*08)A9zxU^NsBwp1n5&>h@WtJ%oB}Vj&z=zG|lO@Wgj^ z{NvE_>d|cWOQSa`u?TSj!Rc9mQ=dwZAA*yhNk0-hzSQ5m9m3MRu!!>h+-p3_@Jr`B znr;5_=!^=!vAP@bm})$$Hox`dbEwU;mxr&ybCtYi?acZQt^47I*G^tOGe4a($g0Zo zgUSmoscg`iuB!W8q!lfjf}Bj*WD7aE6>L`?{5gDKEDzqGzX!oLZmh#Y`!Ccb9bAI9 zS-l<)MU`qO5V+%6rox&*d>0=F@f}MZiSH=9#qigUgPn8lb4=Uij!U!?!6JnM`Jp)h zW=^PJ`voYx)YH#5E{v5^PR#7oBZAbvsVYtX(xsp@wT;=)0BXpDB-gXJXmv0^=LA(M z*{{RiwK7XNbLT5`kC)GX9n{_&U$w9?%vTpHwF1gR)Hdy>S3UthU6}{;96OHQeciw8 z9p3i@d>@Xkmo1-D#uUI=?K3D--|t_rFR=uK-THB?mXFn30u^mAAtq|=NvcvfJUf=EjA$-C z{CzlxU7~u0kZWGMX7835ypPRm68r}HQjrVPgZJd4^ zHEB4uXKLN#$0sY3^Aq2hc;kfC@F&AV2Fb8*&DYnwRt?=;ePru}N2ucr$BG<9@NecLP-iCjXZ@A@BEBTiL@w^MwEw9fdS#5c8NF2sDuavM~FPiPJCmzIDw-89Kmp>`ZIau~}QF+o58v(5=TK~8*4D}IDN zF2K1K#RMurffv@B9a zj;EmgG$+U+E08S1OniB{Ei^45I4wg-n&M#`1qO;UxKT!+`wT0}D2GpcMK4Yrm(lCqBPi9K%sbAW+08%CrQvgCKAs zDH$mkUKs|H0|A}*l2-f(c^pIw0dba$2z(sIkp?N}IN2!RFm13VpniPfpk$~V9QdF#{KZi+V7F;X;#g|pbIX+zI4N-I5Q?w@i~uf#RRKvbXEMjY zZ&>)=M4w|o9M#$}j9?I%g^9;OtOyKN98175k$DV(|8N{o^%MWrKhZWA4j+Q^goMMQ zAuuRG@GJ>c6BJa&^-2{e!$gl!#L}iqhVJu;iu!&FV!;T;41q$IQ ziZxOq2p4!v5Fj!FEGUwe1X@HuJMa^aEf;4|8Ct^8Mx10}=~1{~xDTIP-QqQ99}{}VW?^g z^apOF5dpR_SQsF}6Cc$I&m$s5BcQE}2#gQZOe02)0CgnLBrBr`EIO1|M-hhQV$dGP z)rk=?5qimTFzO7*JWpYu6D1NAIA|uuuoHa)F&cIBI4mD9Y;c58VqiQ78lj3Cf|kgm4qX(GbobhCvV+5s{1- zFl@s7gP!4G7>%+-A_V+`Br#^<{iDK%=Oxgp2&_sBXF*_ifi|)z=rIJ5c$`I1k-$Z` z?5JvS{xE2JniN54q5_OK0SW_J0pf@Q1FfMF0=Is`_FJlLFQd7^)C5~llNl08mKoG6GA$ePH(Xwa}(vH}C+CxGKWjgbNg zi|jpG-G^cG1!)#}BkZ}b0%%pJAzmR!tW1$4Lt`R|O}tw#On{OCnoh(hq3WcdpfWiK zNMqy?RnIe^!%=+VbRWG^ok5PFQ9*zq6Jh&?8H5drdbVG}2xxkBwB?3e@$5DOE5!*&mI2nPe6=LuL2JZMT5 zb`61?c&FYD5(N)u5~Nr_pydQ;d)Vet)ChV-7DZ8FB^I4{hu#hl3#8;S?c?m?Vo6{pI4YB{47%Fl?-bDrS*dRQ(!BDOBE+Y9{ZG|S_?MXF8;PgY&3kY!07$w~tPb31cRUN7SedHKO{M_# zauaYDO#MY|LwJc^o*#znW=()4?>gN!hfAvE)oyH8-uEO7=~$lf@a;f8Fp4C!>4#vu z*iSF1#IjnzJ;Bf0O(;C&_^Q5eDh1pj;xC~uW62Qla3}EhZ3o+<@8yTUmi8;KrO9h% z>>FNdkk|ci{YNI*wVS42rd=%e-xOH70(z=lEaRf9T#2@+T*xBjf)tomrw7}Wzx@%~ zIhLgyT>I6d%GW-8?~dV1{{)k^FSv9yRHKOy-HTCV*xhr6W0gdx%c!@Pt;&tRg@^l< zSqi%If8muG5M>G=%61Na_*>O17h1Xox~x@IYrDJ_0(^tw3k~pe0iupkUH|$F*bv9^ zRJINf1D#8E$8ghcG+DTESr$w}w!c1KhxLV^m$^}MNwX)>z;I_Fk4={Hboe=q>zf%SL^5sfe z9%rjcgo0cUuAPBg7i=cegPjKmV0(Vf`ePX@rJVYD9+)}+XEr?cXVqvcE&+4yEw9k% zV}1450#71pHkuiAm;&7M_% zze~xl8*JLKdJ*N6yf;3)_LhO!a8dbmeEn6o9^Y*|vK0uEkW>#IxE+3=kn#h2BlOt{ zJgd(2(4N(Eb#7G^vvV*86$xO^-#U8l1QJ+4y#w7<9D=Lc;blJ5Rj$|o6|J5NQ#?BY zzt;@P%=BQR3jTp8=73a6_<+nxWoZP$);zo{gWMk4wpy<8`2YJ)FJQa}=YqP=Y#J#0 z;-`UN>D4r}bGv2C%rP>40F&J&5RkDfon!HXvxD$f14K4g;gI+S@5FzvuTDL(PEm#L zDIgnKGO5dBWW`Q2LX|WiaB^7B9&WZBMPG2=_lWf)K>Q1%IY#4NgV5TU_FE9R>QhiAu9m4|!&tCY>Iom0b)T|ICBvMRA; zUp6m=>{VNk znC!}lUC{Iwq@H^Eoxb7J?g5}8`6YO@zUAd3<-`*98U(VF7woB=qiDgE+#YE9SSq{) zZSW3%wrAin>=TyEFm>9Gfip48La;@~8ZMSw*|;({H-N~M`v%)KzaZ<>7h}%hm-oTY zEpAx*r8T!17ADVox8Wm(`wX`kell_UL}PN#tQ__@g;u~wPoFdnMetmH209e@;e>wSIli1{^CLf%9<79X0cN34EcV?2Gt*&Qh zQ?sVoi)ZI%{xtLC%ok=Jo_XuctJeR1rm+4kGm)7qXO|3LnVFy2wCQ)7zGql4{AJT; zXFs;-p-p#hdgUg0lYbMn>AJ1j$7_FNxDUqZOJH6c`(yaXD2~BmoaBRPj0%z7NHxw=Iq}+G8b+>Z zv6_wVskC1HjyDnW5$Nubhg+;>a#iqP7O}Xpy>vQ5ZPU0SVl|x2;_((kRooG4ESx8gA1$=Z&9p1SBUsk*YAqeHgeW4^h(-fMUaZriC8P~!7meibMiF9p zI3>GSH9tK{UX0akd@a-zQg9~hc|+6%8ofcRRxY48->fgV{GOh@ot>T2n^Uxz@rs-c z@D9FhlL|+_uch~>b_-2;2&9tlh-F{abiH1_>RZ4WYY{?xpvf*FUam1w#1V%%3!h#T z&AhqUbW?|JACWo4dTqZs=693uzK#VfmtLyZUTum*3t+efo<{2(nf;!gF8IL$*JDFv zGi{aI^pwVW5bFgQE}g1L-9*Cfu%T;E2!;8n@x?Rk%U`MdOV%4EZle3utv1&CEFk|(wFcEwQ!N)dOH zuT?RxlfBZWrx(K(jBdM;MOQxCC7cEHbEAwng12Rq_rUlRE*J=Y-k9nA= z5cis^5r5JyY?ZVCC~sTiR-jq7c&muuxlsRr)C>T3NW+$D6q!bdI;7D{#Og6W zgGERr>Ezh1MC50Fp?55sFcA*IMinb{2hkNScxd)DhJPQTkKgub!ze7uVyrE6lUX91 zhf6+2w6n?EwO>{nfM`vdBjI4q8{+9~;@6{eRZtNuX)P0omr05pA#s(K&SLI75v&M8 z%~|c>RxzQ4Y>As>M*y=&1zspRa)=X+J*tF_Mhc-nXyxmETNG=Q%5EW4t#-|eZ0J9<1`&t^A-$2NU0|$HOFI+Ne4XRwOwdH+ zF|0wRq+}%8(!_!TkBb@FR)V-} z_1v_!C&eJrp@bHb&a9tex}6GUzC|nFNMnmtJOmISTN57581BFstuc*wGZIB|c_JWI z(cY9kmJOG!i%G6%M#h-FjpJB?-~S#}1TR+J%T z^rcm=MG|Ph<%`nJ!eXpqXEyHCeo)Wn6Ik4fbB+uf@kSY&7CtOi&qbPekuKEY%@Wsh zpyz#iR6cGlR@_*~SF5*DEwdlbUH-5pgJuC@?}VEe>FG5{CwY~|$r3jwI~2AMix91b zolQ#I)dP)y0y3l&?l1=$@amTAb=jS-)9dlX5}YSp!qJMQSmY;l)TlPFo~s-#c*MA?Q^0##H71C0m?fzWo~;L@PVv|)_2S+bhApPuNUXj9 zluZTplJoWQ4zxl!0({KbwpzSJR-;&mo9qDI4J|AH*{BzSnTUrzpcl6a5@jdDRzJ;6Zt~;&igLe7qsfXxv(H*1~(^k+21*Cj7SaV&=s^)ygxrt`|p}IUiCY zBrln{*srD264S)xRxlxV!Jux!H?{P1vDw4S<|G~KmUEFB$NZPp96DYJL~U`K&)IZ$ z;88^*+=AI8$Vgg-67qQDeA?(@3t3nFC%gaJ9M7NM=e?3~{Pui{LGL!eI{s zf0`fNs4dVqP^f?~FD%xogZ^tvnXXx{6%{0)|Qy08*JxYUMFkOTf#SRMa8SHaUwQ)He?dtG4k%0dtod z?GTaXkWXpl(MG^T$fjzem~lG`RbkgddU`DYEPd8ea*=UbT)_@CcZZ%)CQz(VwkBd+ zCYPwPFVaplaWs&o0S6+~;#sE)=wC=JCS4qLhz=Bi2bfd?sTVTRMH+=p95q{Pm@IJx z!EDR1Jabgz+=&BE28#JSE?2$KSitJ?y7|iN<9gg-Wzb)@c59sMmLh1)l?fy}5bKmG zT=OaA@n13fFNhPFE{0fu9k|O2T&8%<`$ksvHCL?J^v>y-iMt>Q`FoBjmtQcLo-5|N zc{65dSQf(dMyM13hHn(E#KjBXVn3FrJbeGBsNvU;XTTxKa^WBVVHtoQR;N1{zr+j5 zLl>@cw;!Im{`C-+;Vp*-FWUi;Dxw9#-xCX|l1s%TfoEJgJNo`%93@Hod8R;rZ?)2@ zPscw5f`RkM^~*pot3T_5D93559U?-+x&VAvo%a>f)q@?%#|{qw3$TTztLFYwV*oM9!G@K#ir{#dK>=|Gj13v!B`84Pp+Zl!g3NDQEmt|-ya8-j zmz}fYGsaQJuY0cJt6EsTX_P5m(gF|OC`)nOqB$g^%4H<1mhoi8^rr>i@F5b+Nq~-p zs0%tknRH^cG*-)$!JwA*$jz*>g@$H~C4*$#3JAuN{N~|pG}ycM(Mw*iNNIr^(ozXx zEI0G%ZpuKn`g)JlsR^KWLVoXJaEMT7|F4;m5O6% zP82)2Y#j~Ln!UJxc%JfjsCZ=f*hBq824(%#gR_zOK&`!FdV0+j;2;NK7bfn~ z!Y*8-TygDS(<;-Sy7nB?uR~R>=7Ab%AqO(8p~HrH+CtN zCtiF+xxg_9ox}I;R>wfuA3vP|Ew7QWj7b;>9_t*;uPS(YIJTqiK@yyiec%?P#z1hj zRi8Zw`U3w3Q~q1rgZb^N=7RIlE!X@*SLaRM!Sv1&IK$;lfSWagLtLn%hFD7VgpPuE z2Zy(~BY{L3feXu_4J-2G}4emdeWPj5K+v94IeO93bK%wPSg_Z+_rcBz`?p^=s zbyHIgvpf(H-n8D4PRz^f{z*s@}BV3oFv zn`2yzu{+@=DQPRv5*y5I9?t_@>tC-Lo{9}@hJE3sIMksd=97p&g!56kl?U<9EN^JA7L~DFkbFELlMvuhRW` z{t!|d;a`H_3VI`egRR;_d)Z`Eb|p;afV#zRRkkMvTV}_y6tw*w2nqAx`}Yi62~|-i zmm=!B$H*1Lo|j!s!c(Rt(d9`t_q_z>e=JX#t4$%wwW+Di!@s@+)GfSV1M*&f z!H%YaWdvQov$ittDG6Ry5nl#98cPNuiqLcPF`M;g?Bj#~o7_72m;QOz8Vm>e^EVm{ z@0(b&W?1$7`N-tdi32xpKWS(fju7~90g)LM*JQ*H22fXkLo%`eATuHy0#Fwb#{nP) z;5G`tT{zAh10c&u^pxR6M{s~eVkmVCAUqgF5(LI9{||&k&k4D5vku?spNdWz4xhZX zW>^b^{EP^g5`c%$fNx<`pa?FrBUl2CM4xIc{)3EN~@|T|f z+2?=hB=cDtj8PtY z|6327Jl-;_e_m%uz~|~y_1u{4zj=1_6%xL}BOExU0|t}T=c^ zfJg%Fh-V>i!}4dyV>E{JL!Jp3wergi=RHpbFl3efjHGSCaD>E=;{pI9RT!j^28bGf z+!*MYq=Gp)z?K0lkD&o6d$vFLF$6(RKKYY>{ySXR0N+7b080Vrl|o4)CE-FjR$Z>lmz%C3oyE~-(ik{CszMjJ1qT+|Jm=HH~J0=ST2SZ z7=T*IDyk9~y#eqit7vjrhM6N+fcfg*0R-DI42XiL+YbEm-C1{XE(hI_BnCjV0DBc^ z8P+JQdq7wN%8><~BEcI6$vp2f=rMqLo;0b`bG`h0aeMv%J}1@(ZeBb32+9GJ5fL!} z_5o%QIt1``9>)M?C~_Rh3KYd-s<^4D4P%jGBy|$4f*w%6@tmlg>l-J}EEtXw%yB@K z^D+R40e%NSSOQg{h9aOJQ5hx#=O_T@pA|H~uO0)8-pNzj^`86_UkN>}${BN^$cl+S(!J%$s?nabY|{F7gK<=M_ai~~sk zOe!c%z--vDI|ONgdH$5Dg~*~^`wVC_-($tQmgQ}dPl3L!g3XI`Ox=3)$(i!ktp zgtqhQvPTerRZ@Vf1=KBy%W5vD8@($Oehg!=ljuQ^vY^SZjy${ILH<`!&>E@{z-TX? zzHY;-*UkYT?MLf}lS*j6i5((8nA`y;pzx9!Zbv(d)djNTLGyGW;%NYzXd1mc1NVk& zBsg}AWho~P;DG+x_wxP2QxY6sfQ{*Ts76PTk(r!G@bR`wZYLZVsUGRJDo=L+I#3(W zGW_W-(=gB-fa_vl=_OEw21Nt|HI>Iwy_QQdryNK?`I|gAGCP*4gg$seWlibq7*;cY zy4b6RgVKI42D_;?YDHV3gr=(<8>=J)xay84E7kK$NA4~>x)Xv2tG)0o9fvA3&-IRl zW8HWy73sJei5s>bff6wmWA2~P@?g7Ju4)Nm(0VfMK^Jv_e z;6fhfXh46Oh4b-v4tQz(;0g!{mgW+Mupihx{6!HC!dkF-Lt_n4Hy)Xc ztpDtc-O!jWZg}hP;I-GiR0ZY8>fv;BbqMqdHC%7cQKx;5acSiswRFA7zAtQwzDrS}I>u^dPOIElyp9g36 z$lZH~Pt?`9@-Fc(%-UR)9kQ+B@P;5zW`{@s1QKchXW1rPXI5sZ5J*73wjbCtd{+~M zZm)ZZTMlvLi=ox@HWt}=T?=!PcsX{yM_ z0d`82Q=W1h&t=an#iE3+Wl7!ZPiv+r8fvwMs3&^^a4 zS7sImf81goMWI}G^ZM^iU9zD$L9Q{Yc(6+@x~Y7+b{1ThO4xG{l@P#wDI%4(k-n0> z2p+M@`)(fWzK|rIPmQ%&$>E)y92h!oy?FoxvsM@GbEHcujhP<`Lu5%Hm@O8S_uo7? zw0+fFg}a5yZ?E2BlAn|oZZ8ic?`ys&IjiNbI|7-fGR>M_>-8{SV|k<7@$imk-wBb2KlH{yc+0J847aZT&$XA# z*w+1RGBMrQ@D3H>zW~+|-x8SK^lQ8m;M8b>4cQjjU2`6hltwyXQ4O z-Ahgm?CSQlu&nlRqF`fa9yKxNvTI*&V;px7vxf*At_rF&`4v+%AFU1d+%AdfE~kI6xf1*d;^42-wX>P zVdGGL$5rTnvSlhtr!_Koc>NFie{bGj)#qNXhv0UTa~-+ zA8eZ)%Tf#vIW=^@@_+Xao>guH@=0a)1B3mrKdT($8VhU6(c>6<(g_dQEZvsn(HLJq zz}bv>KBLH3G3DUWmq#3*dzH;^I$Jk+*I+*wPKwZ04ft2n*%*xj z;u6rPlWQdd?Pii{Qi}JJV5nM|s+exu4kw#sr2eNrIk+0mYTl*x@^D%_4l7T%iq(WE zj^vOsuS6bzCXOdVOw>PLJ^b7QfX$rq^dwgtE!k4`ptp@Cld#dMn*;M8ES#}C<;hoB zHR4+3LD;Y7YP}rqMB_fG&f~sXt6kK7y5Ze}+1ar?#qiF{!Pc%5$8HK3a3?(u&GDca90sT|AN3xX^`XiNgjI%snUXTtCn za_4Cf#Ia=cE#&a<6Mr3m$$s{s!DVx;Fa%>jBhhd$8j=x!*lE%N7hv!Uecq{MtekS< zmrss-UG@&oJT$ll)I?~h3Tuz83o2iE;zN&7X-%)M0uUxj-)}1ob zEyf^jRt|}UxQw#@VGx{^smiIxJe0EeRXa8g?|N7@*IxJZn&p$5oou>8Xej8Rc*fcT z>}Tuox-akIm2Z6relnh{jF8ONeHae&`?#eWV9jWZ zvPd$EgbHC-*aGo#TozvW)JI^_$5PcFJBL>d)ozPRFNbN;p1lewtH+9lT2^baEzunS zfIsk2`1W|RqN13U%5861H$3{W0dUe5nHH8M@}^+5Y5@qRl~d0ayADwJ^Qo}L3yq>8 zC`j)3uHoMv834;{h>cY|XxC+}#Ix0eIZG(wqtN!TWM%Lkmv8u!N8!y)JBzQeubJ66 zy=#qq!;S0b*S%rlZBxHjMdFyszt~)UBU(B6AQGSW^b15{2qK{d;tt&*DDVEvAfO&x zfFD^uxQxyFS()fQb`F`)k1v5w4}!`cKQr3wV>m>XF8CcWJk_(Qn?B;}WmJ-v!Ojc8 zTbO)qd8HCBEDIa|>;8$z)+gV3hf?`}r_Q@@>*)?0W)6ZN?o8)1L@EJIu^arI;3xO{Vp_49-I z7l=Ka5kCcIMEr~Jv<|1AEIg;@!M`P!!t6yLaU~%rc|m!{7gZ;aRdXQ-YU%Gg&zv0# zW%rlhA*z?c{ZRpdmo5~})m?ug)dp5ZM0xR72D=V|3Hf=$ze-Wy<|qT-tf=%1%6VTI zY~JOE=lOIL>PP_FWe-B#C)5L+y`a{2XxnPJcmMW%M~9nl8I%mlvtJ!-*mC2Vnfb}9 zrk#cx*Y4d=0>arps%NY$C{On3DOl2$(KV7zvi<~?;ghvwi?(zP+PtP7!F8=P|g8k{ICqPSSPh1N*-rU1H?torl;DmU8C< zpSpVZA73B%4g094ff8IlO<;AGpL9_v(UGb7>^AT^`#HRNcmE2n-Yc`LJD2dkm8L&tuaT^K|CoKsG<_-s_!{3Ah)L54C@HFf<@4vCWOL_0b zZg3Ur4<1+E^sND~o;z?(YN4`x-tvgQl371xAKm? zK;)%9F{PfKgi+R5%lsJ>ynDI{IcbV^iwi)%GaBXIcVT$O@-)`65z*|ozpIXN;%UQj zV-T-T-BfC&a#ZHK-lVENK*O(0RnCMwhcv3%k9;329$T)|$Um>#&|bfH-Axn!GW9c6 zNgh%?;9ddiR(nVvn`})G=2w-0;RRb?cO$TR{%D|5aK9Itr`Ity)4C9pe(*ve0CjsU zgjM+gdZ(aRe>eyzKl>4ANk0Zxq6E06<%@9d3IQ`FU~aH*Q5*9^KZg6=YDJVAzxDfF z|Cn}3R|w}HT=U#L&kyGkfl#%e-|A}v`77?X+DL779{q{xx))uo2)uyvZsoF{p7VkF zmY;%JOrD0*fKI?PHp^!v!1vTSBw%>QM^7tohkhFLW55~$_U#Y?H^c&X?ZNFg1HNuC zeW^b5G&FPdBFdAOi+>-3rH{#aW%lQT=^g$O5VW>cE?^%9L1gka#Fq$X)rELu>neH5 zou9varw&xu_{v%3qd!0AHZl7Pz#_#?Lm&hltuQ9DN%bS!m2dq5hGQ&iB+mM9eCStj zJ8iF-u}+sKoof%Q|LlghuKTT_Jv@k9e!XG8@9E8;1~gk&As>biV|6bT3J@6*wh$%s zyTSGsu?Uc_JWqFy6;q!4E||~0=Kb0KXY5VjeJ&4?JoKT6NHt!Q63o`3Vs0h-D8kM{+)N=3O6}2FF;u( zJy8EH*!1gd$*eDdZ13E^W(!mm1DvDN#+cU(79|A{9^biYihlcTxXe!t%?mV}tR9TS zqvE=R@Wm8>RtcvFI2RX^(aAT?=BnLj-oM`}7|%vhP}H?jb@?MuBe*%jQ*_S>{!TOnMha zxDx?0*w}?fTNAf8TN9%^4t;0~4bha2p4KJn{4NN4NvfM>NDGEESqKI4lMGIF_m9!f zdRi-2FWLm1TyyR}k2#t*axUy^G1$|vV^wy*`vwcrWk~qF>N)@+*T5;?TDMI?oOa`1 zyeWW_ej0LyyLQg5ffm>~D!|hR7(9#1E&`Zf0B-ic7qAi`>TyvnBji+Zs?CES#H`gf z%o%?J3@?al)I-*=TWEpW;7B{z+P->GE)w1Y@Ski)Rt~jRu3_S+94YXRfudG}TU1|z zpi~@PFx1+yYB3(#+R>lZiGC;w1p@@GRR;SQ2FVQh%253Y_lx{ZMTS{t0M0$!0x;x7 zn;?PnPNpbS>&ywmEl3zX(hCcPO&DHi9GtQnUS82!)NVjy3>xzOm#>FA$fKhz^Wpnj zgJXb=5FPk+uM8fhE*pHje+3Q8(F{7tHVYWJoHJbOO3G|_#H9;2ic}<3CYVh;fu1-A zRwR#y4#+1VCdd87NqYUcEvO&23bYBUlMHevR1LQ#3EUpb5+)HVWMoHcVq_r;1>;60 zxCqLz6nB7v+-RR&H@|&#ZndIF#)WE6G@&S#A#$?YmrM3SUwAxJc<@o~o#L6jAZG)7 z6oWv_c85x+Q$~@(lq#B{E{B`ZE344!J3$Pea})>ua0*w8r6h9>c$$GQVet8%DN`Xe(O^gz_;>w z=)l7m;LHB+9c$=y7cz^$IST;29N=&*XZ7P`ifWjuGIy}x+n*!>Vt6bxzH86f^RC_1^bZI|mSvWK z9%c_qH|dF30B6M#AuDcCxys7gCjwbK7CNNXo!#|Uqy4+?>7!dB=KJiko8kM|wJE_> z3Ljw)KnZY69P{|3tgzcL5XR%76N2hA`ce9U_4K0{wx4P_yen5WB{ta+{?>25N~=2`YE` z6*0C$*Ixu3;_;veM}t8$zIlp%^P(2qoNTiUhBZ6j;d~Mtbr2rXRO&o+PqAwbOhEK9 z$l>w8qx%|6+y_7EL&9B;tffnmmi*Le3oRM;4L&mP%aL=3uI?rKmkL6R+F}qrEVB$i zGTUjYnUm$oU@dRTHKKBBI*ML&wYHD)$mqoI)ag!Ag&VdgtP%#znC*1l>QTqyl-p~t zQC17odjT=4H{%i^ATFL}f-G!?j=sGLx_@_JJ^iebSu4(226LG$Pv@#iummQ@GzoQ4 zUlzvERy9~w*U4cYe2jI})DP~zdH?g9a+qXTc-!U|UNWNAx&uT}XZMBN))dj57^lo2yM$|EEBZvkve;D_G}mucHJ9d!g$ptH6}b* zwMf-O=p9XKdSoFLop@Ia3;w08gJ?zj{*`o63%%jAS?>}-@5p4|BY>%49E|k*c;Iu4 zl{N=YQ?t9^N7&`%&3KjRrZ5}{7c?>wOLdpUCK<#joj&XfTcN`0vsh<--pMR8-z*fm zV-rG-(wGbyS)W9Q2n#QdFO#G9oL%hs=s6{lF@1ftYXIIMD8s7I**5r4R7B^Kb8d% zn+}F&cf;(lI2CcIxZVJSFGap?tCsU63SH%c6~HGm2s}nw;BNs^dM#=ciwL_DAnjGo zx`~pZcmV!{Pev_u+)U2~THwW%HQXY=9;#?la=;L%hvUe43H%A4j9QOUX8OM`X+bbb zX!abKHMWzMY|fyq7)zN_s36OQk?6A4j**2#B!BQ%7W&D{V0ck~{xGrO2prd(lh)}^ zspXhN?MP}%SzC&fqOl5S)bAEs<70dtedwxtz&gLX+yeA$_Yt@haYCwMJQu{AWs_Ew zQ#Ues5xVaOAS9OuA$%S!D4oMNF$Cbm&=gx%^k%uWVr^0lA?{|9tuvEO`(0pztDv|S zbY^<>qD=56T=Oqo)0b@>JLS6QrXWGKl)0$@L?1tx{P54~NiyACi@se2OLp-lNYMKq z2K0&A879+fn|zM-yjoJRg{M=M0}36SLRd zw5THB(n&+Kg8^Jf;ADsJD0aW7uWYScdxj?H#5W6iL|=KvK^gm0cTm6=zzqs-vTZm%@WRmbeed_~61eECFTS;hu`{HwV_7?+>X8#t zT%#=&l_6_MZ;rEH(Yl^7$ap+-Vn_$TXU`v7NB7;pC|t{|Wc~~?Wi0WcJqx(UaZ;w1 zbC=Gmf?z%_WFh%?!LQoA>Ax0a4_YxuVGmkYIh?fAJWg%8TDI!^INKX%7^Ey@f$sil z_jW!>eZCx_3WK#arM;y?7RbKWBrg_#2ShoaaOr z*_`O)q3ib1*GJ(1g)RUtA?J!UxP_FQ6iYL9N|&?e9U*38u0?N9tJ1 ze|I0PNiaGQKv@bQOq8gFZNfl6C(9fF4k zFC5%9IK1@FOJ803ouv;iJ-l>gX?&@zf8$cw(ydFE4V)bK`M`4nUmG|)@acj0fNen5 zPY#^bZyXrv|5N`f{r}PbQ2(v{&5`A!vjEop^A*qahepm`@wFA7UvcG%s35Vzyh5~M zBjEhZ{DB4f8NIge55u<%*GKciR}AY$4)i@UEF4}xa$>k=`P}lC`UgfF%b!~Q!15cH zSC?PDT(=xszJ9r2=>LX}4}DXBhB`wx4poLO9a4|}caO6tF|>PV&9c8Qdt=!P%N}2L z@2Gs)HOq3#yvz12+c}b0HrDsW!M_f^Hu$~1|LM77@Dcamor4DklOsn3f9_w?_xI89 zo(ucl=zF2>@xFWeKG&D;^YzL5cJ+<-{;l`dy+7#v_uemz`g%Xxo9?-)*Dd&E@7~_A zp1=0I*7H3W#E>=qsPiVxN^pl0S8vW4jBL090r=5fUJF`Oia6BSqwUp#xnOZG&JgyYvN-4$#G$wuC-12B@B77OHoELi$Z4 zNJ^8tE@Cl(C>Nk1kverjYf72OusdpGQ`{++UWyZ%IDkx3MuoW+>HRq;Nau9p4F^FK z%fd{;PYHA!T@guO31K}?;-08JBv!K6Ih0Fk4B|C$DJe1s8YwHeEXsY?Oxht=XJk!v zEL(S%Qw|o#fpU694NF*A!E52VCWr5Pl56h3gF$N<(`L#xk5jb!uN>J zu3&0l3ELT`4iIJtbxo=idX>d2E>W^e%i*+C6pczSkXET?w6eYgE5+XMLg;N+1r<7z zkRBlUDl5evQTj1^Q4`baQ)1E<*>@i+#U7}~W#M?Z=(J_BxM7TI?K6f6iqsq3;ig0D zlZf_lbdS1@S*4DmGNyBg)gkjROP{gJVE(jq+!u?73UVoB<$7bwiNiu$)2*+VnF zt=wX@86^SSV8(-qnF56u6UlW?apE;ei8!xrN+Ry49}Ay-D@(T4GIF8a9rt6HDrJaE zzsPpp8uvgTy@`lAJvM*BFI~ric~I71%z;^J{%Fl$ac9#q>uOGnr9vgjv8t!&O9`{0 zso%2@C6v`nTCh-4C-+x0Wl=P4e3xsljv5rCT!w2BrCb$W7}=jSH!MN2Ty5y`hN{yF z0DB^~`9k+xNHoDVr_vEW?$tKE4NWfR)05;*wmB6Io7^+;jIZDh7ah%DFAHi!QBirA zOvy>FFs(LIp~#vtCr4s!;MHu!BF`u#DoQj(a&)3#Ai^q5T#DhYk|nz7RhAyNTkW{V zNZ2urvr&mkH*tF;ZmdPg6ae#y8iabLA&!r5!xN*TCZg#IH|-ifXhX>>tej}sn#07^ zI&LH_Ii)_hVSu9-0~tJJH$^pOJDyNcV=USj6)offYH=l+m8A3p72C*Sc2Lo%J4hHX zt3xS_iL*IOejX!cMoC4TH4@Lt3z)_4Ar#8sMVwBJ8nsPQ=c>Bo1*Id{h@B_nepk`3 zVi1w2!!>3-B^h%It8!PxTQCQA-ow#Jrk^smw~()D$UHvDqFYdrrq+PZ zq&@0tEhsC>$uRC?Cnl1J+c2FzCAC_sB`3D&v#gwmQ!d7`Skd4JtJ8Y7NcI#*H<|)i zQJpSQ^$?~^%a%OIiP7avy zR70k*n6MR(vgEML4g~}Wb0zICIYiM-+PKK)9I9^GFLlt#H=4vFjb8C4fl#?Z}tejLfRE1i#673DF>BR(4u93=X zNNddLGeosPsPDoeI8mXfp`j)vJ}jqEigjc!&b5xJOSmnVSD9mw;jbc>u}6K#s}F=? zO$FSPH1&AO#P!8#NnAWYa zi`gZ$(6-MqWLSRzk2_TaRjds}n<6W|>GSNb228FrVU&l7;`2q!ltlR;9={C1<_P(MNs)k*osKtf`Il4+}Bs?<; zW74d1dh9w%8e$nfo4t+~wGPOmF_>g-ser|!qkMX6fiwv<#%9Q65-FqS-^CsT-c+c9 zOLWeV->8BNzwfhByrEbLH&=w^WXPoO>cl;NW=Fw`DP2DxW5GOqicpglrZ zoJ81NYzD;v@p;^W^7w^-eO}PualG8{CSyylXXSf*O%q|TyC|729B*081$-~TC&uJx0I z3ljxO#z<0CmG(Wv(p^a_WR_)&XUFr-bgV3nZvM&=?uX-Q4;D}>RJmkR;#NAY9k~+~ zZXHhrGpbun46s^b-9AqYw)4 z?{k`NCst8Wk311gI?EwUYs9LUwmy1)_b+!-ewVRExj2L zAC*+ZVx=f%xd+U96g>2o^Sfr~{)khpCUS~;T-d0Jyor=U#x5>bGh&t(OE)Rha+bXKGgTYuub4&yxB}nyk&Mj+|^lk;sVMsRLFf+zbzKN< zPc}HrMfz=CX+WEId!*U07e`n85`1Cx8{rLeA&U*A${%}fl79Kd7F7GQ&N86ntmoM2 zFq?ElGej9ggxsOiknC6OxEi{{=OMw9uTRtYt6Kra&o7&IKPcq!e8B{XX%$N}q-i8s z5zk-SS~;?i1@)(H-i}^;`tuv<^RHuEA-36l&=b~)LD?4?ji}{;ak=II3@?v`un&&^AtIK@Huj0lwwI z{~V*AxEaP}kgFGdD;n8y|9MDyOAAn*(&f4X(UJ0+=1s>+r%7rs>YO)(L-UC5S-P=SmeYDq)jXvP2${md3P@`Vu$wXP16+=&^zHfU9rGz(oUR_wFAU?*DWDFZ#dJf299#|EK%o z{nma-|K{HN`md#_#bs}Qj>}&J|`wV?V--f=v-Zy)H-1~Iz1HCu(R(db( z)gb$=%O++5S#Z;kKC>#GtR%7oL0P}tJ%j@;!j@J$6Y7FEY&MGl5ukgD1srBPOBSkS zQLZ2>lmepFtaTf(XBtJk>TzX!7$&BK#PnvieOQrq;RP(AR=Fj4C}Cy#BufvHREofZ zGlfi3S@1xXv}qmtyY8el;w`6wja)3P650c>f(^Qo+*Iw@i&%E$?+`V z@TUT~jL57IQpQ_YF(GvYu0(D~F^rfq6^}8`k|WWkROV8pMkWq5L10Pc&rLIK=Tcc!Fz))EXv@N$zdq)nO-pcm$4GTlq890vsz z!%TV;=BpMhZf|=1-&uMrOaXo?5%kxzsd%~>)rDEQ#!+{euyj*oPeqAB#UJnOWf_rR zUV(e%Q6r`_NTU@@%erF%Nr%};#5IYKA*?YsZDQ@MgI`{tvx!8+q0IK{^c*fvLRzm)e zK^k&#v!4hwas;6j27*wJ&>;#rpJfI4%K*HrOBu+pN~;x75yx*>y2n(<@I;cZh&**w zwGnbqEInp&DTuH$;1%j@)fs;&>5y^^Pt{38>si3jZn$ej(ynLesf+>YmX{->9MGsW zS=_E=>He}^fng1Mk@7dhbx+9h19rXmi&>dn5mz;3b+{9;E$(pA`{ovaIe0cp&|oZNBs_fXDCJ~Z$b;#D^GOgUQUp%UL{f`jnAD3 z$AmRtZ8Yu z&9%Hu-q4bxFLTXFGeNi_CY#8lCFAwP)Qjx+cx$ydW;WSeaTzfa_lHIgvhBTje+hGG zq7j>r2o(I}#9JIasY>BR%#qhiwYWkX+#l!UK+z+&!|m2tgo$8TqW@2>xjUZ6O%hiz zCUj&f6>KB7UA-=UootBGjvV+c9ERlC{m`Bnf3Kbr;!=ZIZ*@6bE_3{XCM(DTRfch? z8Sb`Ou`(7GsW)J~#vGf}pUGB+}M6n{Os;iA$N~CtN{d89|VS`bu zh|8kNgfKM7-be%PLQsy)sEisVr6Sb!KoUR7%5lfEPMoqk(}X)`$$R32x+7k3=vV>nR90iHH#gIMJ}kX07EMk%22%IT<$*Br`!tBWuI-9x|;tYt0N?=9PhD zGGrDvL*gb$i0h%C`X08u2TMBfJm`G274sIUkT=WH!xFg#tELssawMS0lW{eB_YVXL zP?Is0vc_`ON&yy)n%hW}(n8?41|#j^YTX!&sgAI60(IX^f{dl>_NGOxhJx8DuA?zw zRfy}ukk6Y`=iuh8WPM2iXGv(m>{_Kr8IS5s0jc+k>>10m`fHU(L#= zq6!g_NQdQ?WImEpNB6O18v=<~F%+s>Dq>Y+8KoDB_ue=9gn&Nz$+v$lK#%;wHZYUS z3-hGA5D}W9adGnHZmOGNap}7p-EPDIj4>b45Fw4lNsW0py4n}S^(ILmiZ=sRZw&hr zOHbwGX)NZnm!eS<1Vu-;vrdCR%I&OYBrc^Vl{Lwt*!G#rx%PU6nJ7lI?n)ux6_e2^ zoTHPt5|0~%21_|>(bx#-8jg-fLWDkS6D6uxE)WZEi?DP!{|HP*B)thjS$4(aQ=9@% zS}7f-GnrDsfY0UArY_vTwx3C=OgTJKb9zkyg+*JAOrFIu5)oS%P602TR6$m&L~<6l zUJ|-ogmA^1$vh#>5J|lMTCTk^)*vDzRmYO%NK=GQO(hjKc!`wDm@$Nk);ykE^$B+7 zsiGp~`61JN&(Td82NkVp4P-Touh4^~T zQi>KZ2PQIz>&0xkP}fH{E@S^7ng^U{LRYJ&DX%Y-B|q^5E1w5FN@-h!RO2@09YA>4vR@P^hL z#d2c&cU*g+M@uAAQH9PX3RIl3k&`SvnDrzGQNY(YI2*StK(M8s-|ovp~+RNP#1Pxv`Rp{E(G$Pq_`?H z01}~eLd%K|$a5NpGNIAhB;|rKz2+)bNJMRVtl6qZNfhs5|ks_=%wN|bO`t&8j!fn)m)K@0! zgxaYtO6qxS$l_-`W6>qUmyGQ09}`4-FC4mV;Elm2PlcyDW>w&EVWa)b)quo8c&n18 zRN?j5AOf-*yEghIaJle!OxPoYmjCuMQ*`l5;BtXz7^rc@MZ<`d!nhVoMlf#_fG2%6 zF)QbS2f<0grvN$(Zk~GDk?j!C5)1YGXn9;M}1V_akE$9J{g-&eP(1p*LqW{`r ze0-)^9f)BAt#Oam2RUs@g(zI6s5B%d9s4GD6u$B_$l>wWY@{n{_phb3|x^v)~lF>1!}UJQh0e6DYj($U(H0p8FaTVan9OVujdzLda`Tx>d=jswB)M zI0xNR4}laO4;_2@>FtN-zC1~9_$tI8b77siB?EK4azSqJTSK??uO3kk$C-3kZ`VI+ zocE84!V#BIna)R2sa(k(jxgW68ttZG?077wHuv8b($~{10E&v?5eEPvQYyWS2xyJ! zXm`lBK#^79fUhdWYII&*B3|n{HCLlY zjzU*>JODAxO{0Hw?wX{>{vB2o2mFc0kD|M;6QY<$jv?5cAi z-1?pgTJ#j-k#x+O=6fTwn4KXqi8TXezZ0H4Sux(nKn#zCPQG&k1bGQATTeg!7(@|G znL!Ba9Zi};mI@&)s7>-pOr=w&nbDmd#0)@W=J>l`X&P;UwPd2ZkpZgBuGnULUAlw|Zh@p~>kRs ze8y=W4_x8;UFhcRoe8vQ&y5$MKW^`=XHl?Ee7m)M<=2)#tldRJ2Lxa1y=w43myY#2 zApODcd2r#|W*JOc_Tz&VQ8SChvIW0V1@RC*C;)kPYwbn}lsi5xj(lM&WdF-Bprj0k z*VBJ|j!_quS@-h`pRBCvY|x^_gR>u~8liN@xCLFFo}iOt9Pqvp(pO zz6&6s4@tZZyr6WcYBsoNkrKxD2vOTSG5|IKFzppfH!Wp?rN_|`*|H1K=&xEQHyy-h z8QfmcdSZuOsZqKT7-m;%z1najSdfO%?(ep?kAI9zN4^Vdy$6$_FMhAJc~Ua#flp#l zMN%1gBNQif6?5KMGoh0)*n97M42JKyvI{1b z?CV0753L#8wq)PHjeWwNJD3Rb9ZZ}sq=9g8!Vaa)Y{u$VywOY~6pnlnJ@N(&NBK3_ z|2!Vr>invh%b7O(x^?MV$S{Ud25F1S4Oj#Yz#-Q_uC2euN_gqlt?^ZhwLk~{+UBxt zyPyo}*IQ=-Ww`tGZnP={?{m?r(PGqSClacL2%L5HqAJDyR^&I(TOJP`KXeU7-}36M z00y=HjaFcdAz_7jxe!MSH8!EpgVqC`O=lPZ)2kNaK@9Ls{~9vGw%n0Tr$EmvNpsDT zQ4`&=6HuYlkNW{6!(B((-?gSE7Ga{duF-Lj3_E4PV*X(9$i|PViZXEPmNYyqKyWma zPF2Yfd=nA|q3Rj<<0A=w#tnJV9ttwW8%$g^`$nUF z6P^JUYXT7N?Nbo$Ppuq5kH2}whl-KkgP)$i9=ppF%8ULU0$ce!#8#%DzwHLJu0OWy z69R0B0D~OCO9q}Bn&}-FZ1??^F~!!y*=e7J61SWQWm37aRb1&X1dL*@(a?QpnLxXK z0*@g)7W2Zg{qV)PKJ?mw2UgS9|AYzD2h>O|3Rh(Es_KNv6N^>yP_8tUM*sCw*i(Em zIuzZxhu-_MmX$dou9!a}q9T1YPLv&(P6|lWl`Mvc-uCn;kBp9;SkLe$ousk*##YC^L}+< zVL6Az@Dra+0@?uF2=#zz2*{Ey2V`MTX~4T^vNQ7azkw!O ztOf2uX``S!pV z&X|cNz>#`v;CKCk-bwn3Lx0%-Mq*@^f<44yWK}4aD@J%VB8`^{Y2&&e)G=>QkMYT< zl_bsdlbhPwZWdM?{+>;6YEt!z6#@jz;Jgt#Flhvh_ru@w$>`AY=bP!z_qUyZ2v-hP zWEl8#)G@I)LIeslR02>%E0qq3m~opP_f_5!~?v9%x5h#);F@rBP9;xPpfaV2e&1M<6Y)*%C;59=9=XE>K74)Xn z^oHeagJ7%~amgH5wGsq$RRiUVqv~*b$0(1A?2hxdqg#$S)}q&*&h*p2A8yN-TucVA z_ETL=h$o9`by^$Csi`XSE`q#*_Vma?DzZQKF60UpAUXDjf_5(in=|U~-JbRq2xSS* zD`(!`>u$>(i|xq0hd(*lM?W#rwg^`42f(@BRl^tdy*+ffs`2RqEcy0d$A$T6C= zo7yKNWzGbdGiri$hp^Zrf(RRj1C2*UM=ye$Sukza(+`Zd!PLKaHaUNy)zVNSkWgpH za5EWqQxuMlPQwxOhgI$IF+L9+eQmP{*=~P&Ic;4HM0%BaOnXD#$Wg2Zm6pVx4)#k&h9VEdF_>J7H>iy`l<3}0U9&3m!TEA+sojL zgid-rnSjdNfHP8P^{N5iPS5Vtolwbvlu5|bH1^`{(aCGhou+TGtVj#c`{%cpubf#j zqU?1J=LIwU(?j-2mRyBIpKIY1$PzlTsh5nnn3$sUYnts_Bu1RCHo?JE+W;LQ}Nn!Zvt> zt+N&A1RGTt_gLL2!XJkS_NvJU36X3k3L;Q13wdaK?XhWezwKL-^l?!e{CJjG1|XL6 ze%jIy6JC*cj1_~;tq3JqF~>3Z7A=p5j=eet{b7*w&&L@RZkw&o4@#q~ki|(2X2Qc| zZ@?-NGlEv5%P)gf$KwIQ^)I;K!e=gn4sC+m^(qKrgE#$FVO&8J%05OVXco3j<*GnnCee0KXj_ePwI{1$6C+)r+=32a->% zpnb}UIoI=QxVF2D3 z6`ORzj^XhTwsgmKw13$x8|nXYvU0ARms7}6ZURd?uo~tPtGs?rRgZZ=z43W0{D<)S zjVZe1g-txwoFA*OC@Pd-Mv=P-558t`gi~%$1i(7s^B{A7XvgChw|$JFW$=YrMcb4s zY%yGJNyy}-gdPg#Fkdu1$|D1G$Zxvg@u2ekpwZwFumK|2lz5-SqR|l%yVFZX6FH3> zus9hNd;KLaC_EmR4i8P!FJ98Vl!=W06evZu7f#F(aN;TrSuto$E}xwp);(^}tvnVR zV1JAI)hYTuH}r&ir;04;mG%!0T|Mj@cx~i7L1geKv$jmk2|2fPe%PfZd9XxE4KiI2 z0F+HlSX<2Wp&%Si3wh|k&C7PMVDRq+83S4{FT|M3dW&SiQ?{yoIb2nMqX`x$x+x8V z&gY?{KRCP(s+4r+e-7YXxnovimP_C**A#9-a0z^GV#y68NWIP@^@b=HA>3<~K zm%xzC0kSJMWcj?u?(w-T5U)cv3(X+=DSM;vDGOOh@Rhfi_cB`_x?)Fd4SjDEzGspF zcx9(grOd19SV`>6rn0JhQil#Tp)1WR;d4I5I)385ee}<-gjKk~ItQR?+~@f6MR`aG zMXPE-qDVo-0Qee!QCUD`iv@I_?KBBSfNidCems;a$cezIY*TFWM}0yEdePTjg~sBr z9X`f7u)F6YD5!qA6mP>*u5E5$URY8@YHgT@s-?W4pj=+(OpsI2Q#S zTWT2OaH~nQr0>Mg<%2i$jt@L85RFU?6U=JbC_vgmd&PJ>rE!NLx-1kc;y!sb2L%op zbzLujd>#)S!(xEC@SXli`e%i{I!*~8g}2@GWc3{`qWmJQG%sYP6&cCWXhHlGk?>gJTg@Ixf~Y3aCnOD|0Ik) zhyZXEPK44It-3LXN|Gfi^1QtkXSxDt{5&$$-T8Nbvv}<8)$}(?;FXwMKEH;NW@Rc5 zIeGdrg%d)k7u;P#f3Lz7XCbRwGx#IVD1B+I4YhxC#gqry*$0FASO zng-MT#&$pY&A+ubY&sa618fxl$G5_(oGYk?9I>?DNeY#CQbKW4Z2mNKh{r>%zcozs z6Q5=r6O&6|t&n}khP(s!4PGgj?D+$;ZlHi4XrYgA@bDPKjgdwy3n{G{cfcj?nlwmq zpuJ*@&qG}-t1edAtp^y});h-k`?0omJt->I2zAkIu!zJ;Z3Y1KG_Zui4?{0`Jji%i z&bm3!v4`6qqPM;!m_{eQ-rl_NU|?0bCZzg z!u@Gp9g!|k!vi#9=r*2Pb~3w$*+g3d+lGvyy0L~S(XKC%x6hb_;%a9ME+PJhRu z3+@zJ(9SQkeQV(!A%gpaFrZb#{s0VACL>7|K=Q}f6+3_)`9gaIIPX8+3>~;$`7cxr zU|cjS?gqQwqP3);_H!NT+=EvE93U{<{v_0bK5!ge01czVc*c_1TjYIS(y9t+!jz) z?EP6n#U&&``P4C4)TT9%Atd+`^!|I_gj18pLnmJeb??vX>77q8O5Q%V9^|m+ok$BY z?1VBJC9^)bedZ&K(wl(5sP@V+J`at5UwRRG_R%~0=s$doIrXe_474VzJ;PB`AdKs) zXQY6Rk6VrY@5`Wxc|3G-mIUu51Kh0p3ezXs+(%%K4U09@z@bXE2O#ZZ^<OV~8-?iWpKkg{09K0#BVP zX)ATV0Gv<{GN$}O9-M76)95w%XV%m02jTZQ<14*n@IU%Dji?0aVQS#5UgOa1jI+xH z%jx2|v*%s&JOv2K@#dp2Qao~3FEYVQlXUODgU1=H)*bU!t3@eG6%{dy$&qXlwGhc} zr>h=?p7K~o@b(JG#$Ecr2KqOT!ho+o3xu$%D2sb6C9NZ8aR${m);Rnnuv@2TFv1ry z*wTI7{Nk%=IL9|w=B8n+Swk>~MN=YN>@tYu%CtHZhvIgyqFs-H5?aVYhtlzB^w!{a zCm~7<)*yTi1e0(*v1?QL93gHHseDo_O{=?I`O6b9UwjTac>xp7!#K>GPl7!;Wu0Rn zK-p(*rP-0sW2(4A1mR{@KRSB#IJh@{*QWw&B3!HcdC`8Xl({PgUcu1gcZ9n{SX9NBI({Qej zmn@-%5I2^L#+c8U(E=`5S8Y_Df$!q;0CD!AJ?P>0ruLxMP-h)_>pcODPJFw)c?}yI z+gvgt9KK}erom?h{?Nan*F=v$fJb0mS>}ZB`D|e>d&xk#aa}M1aV5T-1|GCQ$*$f4 zWtmCwY0sNVUc2rKH#-=wz4V>6==g8B!T9qV?JXNkbKnN&Dv43ano|vGN362zQiV*R zyX>Ht5RZ&n6R^jH?}aAOyT{w_cL#RuOCZZK$G}Ijovp(&tO74+6H$NI+$;qX-Oi%K zOK^AN^Uw+T*v{?^5Pk2Z_TRe#-~2H=$C>6n!EA}HTTvwp<6=jhj9Sccqg^FtedCczU%1b3n4x_@^DCDX#ZOF=9Re#U)l_!SUmn>z=@Rl4Ft3AkI3aYaq8in@gg0%yfN`U)rj z9uF1n+|3*Sw@;zfKX3n|+r0~3?anNO7;qme_Sr)|$kP+WN=`eG#-V;Y)4l6og{8{p z0VedVfIjy#v>wg9%6;#OU$(g@4#D+I)!R#lZWw%Vsi0rqTNGT+=)fYZ)yN!!MabTF zN(sLP>TX*?DQVE=A@Xq~9_c{b9gmET)tzud8R_UC^vF5KKoGL;xIVL2m>{b1R641} zeNI3qez(0I>HoLAVq_r;oNF85z}fwcNxJjD@O-v`oMRve_jQLc@2O*c%2`*c+?Xsc zj-bK+Yi}P}NJU${SAbKENUlYD23B5#Y7qXBYdAnEI^|WY?QHGK^Ks4k6RZ9&>%)zl36e@Ab^z|mIQXhB|%o!dF z9h!K8jjEyFdK0ebVG4buZWy9rzEBb z8tOW0NaBoB-ZZ;4?|vP&CXWT?(}`)oQ4UX{4_@cg(B|K^Hy?hhec3v2HG?Z0st35@ zb%IP^3qFg3-|5UFw{grt! zP|4xpE(H}00E5A$0jvS=(u0Sd5waFt_E&JFFW!U}-1hvx33lR~t6zO;tjsE=$N~Vv zx}a)9(_OP_VeB#%WP2A32J_$AD_1Yt0u@C4JGiGnc!dB*{|C&4Kow@nJ`jGUSIM{t zN|OOjLtMxls|-BBVqB<|RfJLrADsCb@L{_%&O41yozyRX2+NGe>z>r7?g9U3JIDXH zWMus?K4f0<$H9Eh3j??H!TaeW>kyRcewMM_x$c&oDp{+Cwy|o;7Z-+6YfWeMRuQB}lBb{3 z{C4QX-&XIV4+uICToInz51W;Z0jl^R$^$E#0GB!`$(dwvB-stRluu?bk}dR8yE|&o z#s0Z{&>uEhQDfFx6J#buSe;4cRbvc8S8nD{{>yg+_} zjjvdIDLl7wk)=SlUL?Aah}VbEU8_2P5bZi*oqx;ZPc*wAP-d(%KE~(Ktt)PVNDbx6 z4pg{W)fon@=z#hu@tV2mNkBb72#8<`Gs6wLJBeqn?f|UFB2CbN$xC;leE*^C==Rl} zGx;2Tzq$i;e-~RH+ZS6J+?G1DuH#?DJbqeS5Zdk4z)KzgvNQp)TK=~$O`u2CbOzAc z^&O@Z*2mifRP5D1e`cWO6W4X_+-f=HdNDVlJPi&JAdJt)Yi|PT3&fP0MeI^MGTB+V zX7MISa2w!OZ=UL$DGsDQ1z*o!#@rI$w_%YbP6yLRpakK@O&u>&qNWM)6X1S|WGqdH z^H#-~|4y;px^Ghl)aGJM(1}+r-uKU94B_h!AKua#fT~sfTLiTc_2Bo1^S#D_w}^M*8@+4peuy&dK5QXM2#REM=qBmLU>Z zStVtKx>BGppE{?rYLw6Enj}Jhaf;r2ZU;;f$D9^=!>0YEo7#*IPkK^5hti5e0OO(I0GOzKKa5WUstNd)6JrlQyfwTdh0HVs4SF*#S~`JY-+x zV%^SkWd|dLNw{ObC{qmBn>aju7LDbsSSN$Rg3KXs>E6!DF+PuVFnnuoM+sWjKKD`n zVNn`NrlB%M$gBv+!ceuF6{3KoqmhL?B$)Ws4)l-72Pf$Vwu79Fk~t;|kxgro=oQ8a zmPpwP#%QA$Q4;7==XIt>d1NFwc-=>qA{43m+b24w40do@JU(!ucMl|9rlFAXbtAh@ zIW5d{X80Y}2No()Ivn%mvRbm2AyZtMwn z!J)wklciGe3uUEj3JD}|%>1tuv>cy@4%`dgzpJ7TOroc2eS@?`)`37y^PCA*73+9V z1;tSjVUbEal_oB(n;2o!qdY1)YCpdH@LAWbgL)#&z}e>v&>ePp>&hZ0)SS>%0S8v^ z5*kUiJ5OE!-Qn}lN%b>3P`>lSb@ciR89~-L{rq2ZNIVbb?ep(VLbVjwCvbta!WXe4EY*@uO+_j7gWa#o!zl~{yc*q)!703u#pKg~ zkMW(iC+UA+%x*KyS>|8nJoZ#A=@L1@`l`yC=&tY8o4~Fh@zY|rlnYux%+EBq^-e%} ztQUxm28!>@LHZq6yd>$i8M7D`C}ts2NUu_b*lt~Ffv@B7klcSISIOxa3*6XN2AA|N z8+>T!(<8fv-MyqBIPi1EyQ&wUOXZyvOWOlI~ zzKmT#LNCB);!to+A(xr-MX!YY{p(He`#c`P{_;MASJi&Do}M+qx&}vq59WIb3TD0!J>jw0X;}7mcxkEROqMMAXT4?`y zoj$bVvd%`h={um8tgb05?NkUWSnNfA)aLWVI9>C&0eZ>fp+Y~@)q`3*lk{36vr3(F z&iQ$)%Kf+)_eiO9S*Vm#$u#@5ztX`m#^)iyS)bfP@6&hmf+_cWPh1wi&xJMe%>b^8 zh#d-UyhLi~36BR=c9w1L);ywbRd*m?wkfqsqNKwkt>plgF-CA^^Pm>~mdAtVz7;#r zRqp_tVN%eFM~bwp$`@-j|Gu;U)jml8oJcaOsQqgKQAT&*x5-^nF+-8PGMG(XUFPC0q8A{ z1*wwp?T5em^(h*^7`7rz9V8WTQ)eM@kqtB0Q>J(*j-|t#U45<>dc)&ExrHQKDdt)) z%pB;2OXu~1Oqe0Z;te~H@WOl7(6k$dZliAwa+0o| z>E2xY6=%#z1gN4+B+QugP7>|TcGjYY?VZsvJ`V}rd2%nk+yNFbDBa7TE9{n$c+4ph zH#+6Mrq@$UNZ77iyd`2tvE8z~*%RT~Wd0f6wUXq3Ij#|^+NCEt> zt{i56C?A0p!{ea?2VdFFS?z{c$F~m9m!Pb-nFu63P}WcnZ<=sDcd2Wvh#$qEuZuT< z5{>SE8nz8)D?;Z}o#o7Uq?xMa@DFNO+ToovT!YZ<3<};0p6?{pS;36QB27+d2=Nl!aO7jMg4UbvXauFDCn$acW7 z18HL5A%aLyL&mB#BrGaR3P2iDj9hT+EXrjf8>df&Qs+8D6M~IPMkb+1m8s{0!MtE2 zcqx9$=)it3EH9pm%|9>24Hc6NcL@Qo&fpRk>M}H5fGx%+Lp<9}`{~aWz?-naHy4@D z_gJ`?*)=~svXI(c;wT?&P0_Iuqa-AA6etNcr#s>Ww0EdZtuq%?ak(wVOzZT>LMl3X z;Gr{Y&igtL(Bhwi6erF-p)*$MGE5;ZN5k=4t(1!~-?JLMUSJ*dF-eW&|>u(l%P6ThwTKWwGP+KS@OkU(Gu$&_!2)vBjVL?xI+O@>hZO z=kw^J!m~~}D^#E9TsmIP5dhO3iHS9&%bZUZrD*(Wn1Szp24;ZIlq_scbr)?cp|T`vUoBadSc3M|wk+9}ElNuW zdwH~h!T_PrU|DHto8m{|QlJ#duJG!zH-#GpCk9Qhf`wHtrNjD zTF%}N$SMGvG<&WcskG=yRGm;;H7ezCn_AGj*t0Yi?_b8n%sVH-OJrfdA5C=^HymyH zeB*cOSJSo1A|qGs!*G<28a26lA7+TOnCyFa^#wxHZPbJ6IhutPAUXq5>5!s_O%-U) zkCH+;m=d=qj^Lw9WF(||04Lv{Khz<7kx--9b2K-vCt!4S#kjn=hYcZ|HS5K|rXT3i zLog>KGQt!t$Cb^KU)&@-eP{w<#IQU2=MBbj?`Ss44J7)^NT6dk3=_*8IE_k5$${4{ z-%2*WJGnvl?j54ZIXJJun6U657ECHMzLAL4V-{<2)9v`6Qqk?9Yf+PId9Co??bKLQ z936lfZFQkbY3x?uMg7DudGRokgCWHnj`!yC*1+{U}8viY{i! zOq`pg_uPAuSt_o-f4>)cYM~XWB@MrprJAm7d>EdJ70Uz7=h5-x#@^>Tnn#7j)6&>L zNtN2YN;vi|p4;k!>w7-cK3T~gwDX(ID>Vmy4a1XO%gg(Q>Y6Nv@S= zc(IZ6#Da=#yf9QNV*(k>QZf$@A)=Ku|sA2YF<5;cnZa-pK$=eGF5i zlRiiG{IX&DotNy}An3kL52>nYidhl;hr?q-48!t0mJlu0#4wz+QC|!&-656FRCHPMBPvnlZBv+pQW>Ql zL3?r9Cx4up5JNlGJUp=(FS~M&AG5b=#}{ z9`eG&HGR|Hff@CTO_0%Ofkox~`jDfhuUUW#XrT;_tdF-73IQR5LQUPi$BuKw zBFZP!bbI474ZjDoxmT8*bHzrd8&UllXMkz|nE$ApkL1;yCgF$?T^ah9Q_wk+F=mC!7zeQfM{Z93FiJy(kfp_k9;^CpkZkckSP+eU%HIMK3z0 z>(MMRBFJLy?*pnR9B?sdPgaxGkS)(+CjZB?*drt|a$p+w4S)o!C)3Z?^tC)!)klFD zqCVYdJelIg{5`IreplMvtFG$XtmNgq`Zz;JCwY!coi_p9AN>GaH8dRRd(TaXv0-oj zH(p?wuEPsb)sBp1f@2oe+}|@c(w%Yma8yTyK_IfQnC#hfhluVXw>@9`0>MVp zr=Tmv5$VtMb=%xvNA2$eiEJrB-hTmSriG=1soPVFGm5`hQ*`4?P-L5?2p>_AZ`f=Y zXJck>BF?GD`x9j9nu#^!XD>~(tdNL^c5FoS(H&I0JRt@_UGmEOP+VTc12oxBIVxM; zm^=0PhW!Nl?VoYfoCf-$Mw{aYmvx>ur}Fu}ENiomXvm)T@X6l%AwHQzM)tf)5Qj+f zd0g-#xNtZ2O)p2SMc-6kNj2cYg-Sf(DfJ?yV4Uonomjh3sXQ)*LMM5M?D@=HHGInM zH*f~s=$fV=2+XT<(_;(xI@NoC~7Ir}aaHvE|0b=v|+O2YVyVVA|mrv@WxviB#L;nHIA`gL3F zLc>oddStB#thU7%=LkF}oZrx!NRaf;@Dph+2P7l4%DB#$r`|KK@t#cwCtTcw|+_Q}5V+eJQ^5c>L)I9ZMVZUPiDr7j?f zDSKHEhh1Q8OVq<-=ft=F^LG;~RxkPp*)t2qzkhMrz31EqzCir%O(4@S0LykG<=L?_ zfl>x(h@%KM@{z0Go7hJ0l1~(p!!Jd)3y0ssz+4+ZYykLg#sjRI0*JwdLhUbmd8-L__NDKw34 zpYv?}e&V#1=_Pf$nm^h2$nr~?Zj`0#TN{2uje8FcS*~dSY-%&ooJ=^prGzh@C?$)U z7*Ong!-viO35$(HM7E^v-X*;JC)nW~&S?sD5tju`A(APD^8<-ums>eB&XSRju*@zj z1yt;hHOAI=KcYsjbDH9xL<_9juT~k@RIl4z7#L0Kv8SL8ZRD=^vFAx-;y&_+q31UU ze}A7^UG`}Te-bTuLn0oPGb0%W%u&9KoI)U}o`cKF*gF@>su;-Xm1_OzWokfA1M^g? zPH8Zn*K>-bK9=lKr@P`X<^P5$EGZ^?Muu?f`1*f$2*$soCO|&TDKM27kovP4MNl3{ z45dfOYk!+qvqhy+Di=f|NgoqJA57eWTOEz6U&}_bWHUe;umTAE53+CMp{3( zV~2QX&HojjW&KKg6!ADRpwEnq51V`AIDGW=CTpMdv46leUMK>eo(DVgy+a+sx(_EV zo;w+SdP(Ce4S#LAzqxyPp?-6nUG`~eG(|CZ?9-d)-;zjW{Axl#Durt&U&7MP|G1#tlQ4Bn`P9nX1&qKU9J>a5Q1Hu4P_ zKAc2GrY62yI}n_HN*VY9QvrPL%&>jXpw}wZ+*m@a!_{^8twcsb&jD#M7ofgQ_)T4z z9>1n31Vr4PQaOd$#`=J3(m6)Ebx5sL9YG&ALYYJc#QkU$bFo3VVj1*cO01io660WJ zN--?R=}Uu-V0J)M^F~v-t>pyKp60_Bknc{sP%o%XE93UsHN63P#QNy^9K~UqPaW|v zd8MhhR-Ln#qJI~P$m>%#As^S$^5t|aZ=CO0Ro<&Ea3y~vF_tbUok^9rat7+ltt%ul zGWF@rH5|%g^>j`srzs9a^nhp?Yj2hrbtZ=rxG3u8fKR7WtJsW=k;sVb4OmpT_+BFn z{Ae!@G{0I=-mx;gq~Yg41Nm`xeW*^=v{x1uJy!_dn5I|*vAu;%B9Z5M5^1lol+O1A zIIvihx37>ClOsW`c(1o@N0~w=rnjTV#G&L5#Ec~`6ONTKnS3eB5?OnBH5q6_dnF<= z^}m2T9^OaR3Eyu+d!c6Qyqa#Wh8@-n`1?zyXjHAMs@c9mQc9Q?SI}$9^}=X7>apP% z^uoiACbOKu6!9mFPEL)R+3Li&wFBKHkPNPt>$89Y-$#a0G)T~h9ORLMcZ{7io;$qE=<=kPW(49&<)oFR4J1ch3 z{?>A9^FkSMy)%eyuC)x`fO{HTfwelZe)XV=bz26z^vE$E?L`bfo%HXl#h_d$BS#*e z#uC|aM~7fuS9Zu+`;MbH(pZ@fT_2?FfjPf6gM^0hm226{Z!>Vb? zDZh|4Q2=(6tucP;p@y5O0sY5~SWeEFpMAwhugVt=4@J|49*50OsZcNmHlK+mE)p-^ymwzP!#oVjOWOh+>Q1{kStT0Vbc}F`^#M z=)+(pFqOA8FDxZffB1xwymm{+X@bFA#*s8Uy%W742C!zs38mGgGP&g@zQ@2YhlrO z%a()SXM)pS5Av3D1eD`$7IxgYy-KKM!jSm|TW(pi_#+tGS6PUiE1xXPvBH%}N8dN# zXRO_+MBLroV@y6#3Tv}k%V>^h9p!d1$d_AINJQWrD$HG}n3d%K?sfx6!3XQI1jHxu zIyjB={x}2LFIvkVD9hl4T;vh*(DS8#o#c*M!Dp$d;6x@`AM8%`#kR4V2)uKN8ZsJCga-j_U479$GnL014vRl3>`PvN ziG7!5+|A})Wgw{4rZNT1EW7* zOP=g2pT2t0N641Cr8TU~*(^s_n6__>BEWqM9F6TxuK`gmTE>ZEH9!_}V4f5dwomQ} zmbb22OiB)0Mr~x%B`00-iI(PLQDHxiAp z>;RieYS?ieKdUZOrzddak;-rwe0Y~IkSN2E;GW)vH;Wh0gZ+*%Hla_AD5AXqYbh!*_6o0zSXK~_LgI}7-dyHu%hXNPl}n7F{cqkptU1whOq%zLdWIg8BEWgYHo`(yKVr!`56b5CR1f)$vxcys||q z!=-%XVnLt69#XTquUS&pE4!vyw{%JUxyy4+2O8g?&VV$w7}xYMP=v{?wS`$j#$X-e zoc&ojIIQS9J{m(kr7|L0_qU6M%g52a7N=HQw6cAD?xN8b^z}Fqj)PtPwGw`Ig6PQW zYtT0oguq=%znXj6Fu$b)Qfx2Fhr_u6w#W^;!bCfQi6h?H8HZLh@VM{N$BpG+9~bkB7L!C+JxaE!jQohjr3i%K~H};<4c8<#Cj`M z>4l|aYWk;Vk%#{DU_1Hlt>ur%)i<|pCBOcBdDF(d)@dVDi8l?Nu$Ad6l^nxi?Qm$w zqak+>p)!(EF-668$I_Q!V zBg%G{2>;!G-JGhYuE$5QPuu33sNy_*3O;F32A%0_kHb%g`zmt!4frS$k(l)zC;1MN zyP^D{*v#8*MAhum6iFgpJm!ncV1ny$^9gxxUsf}&A+O$us!56w8a(%b4~Gt~CHkA@ z6vl6cLdSF!3sSww8?^+GolURl)shXcL=Btv-$>(atfB70Q^-mI^Fwn=#ODJY;wDjq*@F)`M8RBZ^n9Af)l56gQ4?tQh zvS`)c4HrU3XxcMB|C1wz7-Q=h3aL5IK(bFwQup9{OG?H0KYfq*WB2@zyR3m=cdBF$ z>x}leGsF_tz4)=DlpMGj;qY(Vi^W469!oAAu8cbx-<%8f+)5Fuh!?3LRHZ|p zIy|R10*7GguLc@{5l!wdZ6qg@0QEU z*9Q85u=g8^IBP4A@&~3lh-{Ios5;WN@jS;JPfoJv(_n30VwhVPIJ zl@_V77LFWoJgp|*s=z*5D58TZDO~aD*J0T1`%1a59o_^4la`Q=SP@9$9Dt-jxT$1m zZQDuvSIa9_FZu*I@|Umu%fQI0Z9DK_xvjmF;Nfpb1=C4-O$qQj+&20EPsi&Ta_GTw zOWPt(kUcM*kC45$w{9gHzjjiye)MZF>m{RoZYEs(^^?qmTKNBlLvY{NDT4t5RULW* zLh^ku?}5=SCB~|gX*(!ZRjT6xjTV2Jgnl&gZ*@h(oez~8R(_figgYBwXu209;h%2! zp#Dtp`i43ME~mRuH4;(5CK6-JP~MO>hR0yGN6F`>FulhfMx!J$BtJ{TetGNYI^ib| z!!kr*K#(rZRXw56Xt$A5$A;Y_d^W^@CI;QUtwmZ)DPndBXFehN?61IV6|2FAxlA$` z?^Y%CPQB3<5o@vgRg9~JBJzGyaU1z~J&pBz6;5G#aM=wtVlBp00Z*Z1R1fG9b}dpF zP&M0|7nafyRdbRw{HJ)^LSZnXf>CoIqTmunQ*6*v$_+ZnH!*lN^9;kQ`Quy?lE-Q{ zQZyFU^KBePHXOq$*#kxu@+aw)xxtio%xggMF}i$iL}rN=sSE@#|AVb-*%fPrD+Tlr zj5(w%s`XHRob9o&y|EsJPr>)72V!CuSsp2`Y+fiLQ~Qq8P7hysgdUAF)4;IQ?6|OU z*fqq<$2sNjsLH|{_^L~Q-1{WF91{U8 zjo)hStUvAeOPwU%D*CW2y~90vc-{Kqsia>WbTH)BH?bN^ipd`C1V82h?wXFy ze;Ikno^r7^i;5Y};v}z5lMnwJDkR0gdrjA9&<39uRRHi%`?!k4aBqQeT9TTK$(ZWH zP1xRNph8kCUV^!n-mzZz>oZV+14d-NA<=@h5a$ykL)p9wAXg*Y*H~QMdI7UVA|j#s z^S0k<{f`bo{~{fy&gmGmh@)K<8#c$dXwl-ZdtKcgO_H4b986P5u}Df;Wrf@S91hCs zLm1~`f9e$pmrC7j)Qnm+Orew{!>?eRFDxap&lrH#-ivm;`wAURj_ELJARa~&vA|%S zwQBWa9*fc9>C2D@UP4z$ipf;=uo!x~>Sfv!&guC4RI}zdhq)(Zi)RPiTxgUdz0aZw z3roo}2Zk}#z>!BDdice5;pJzKUE^G}r2fptmt1)`uLJkUx*wybB*j(Q5puP!vR=65$Mk6CnjVCT+RBs;f}Ovw)F1D& zW&7M_`pLkR@OpXGiqJw4n0dd0>dvL;659SpJj18vt22^TDYYygQ}$bwPJKV1wcq&} zx=m6nqH3=wVvS;c4iy{vp+Nj_1EmBv!VeA&_j~M?ag|&}@^8Q*k`{xQ*K+F8e9{^sZ?d<1hAy%V0A0 zFvVms+n+RzsPrn*{iE`Z=7pt1_V5a@7*STaZ~usnJsR6DeiCECmb5S>WIgbWc6apz z#s2)>Z_%F;5s~fmU<5wugWzdM$_aA*VOH!f%MtXKL`04} zX%X)ttAU|kJwlxm4yQfjX3U`Zi02{&##c4r+sMYZaLAL$2=n9L)b1j$e2dQ4$TW=! z7q9bjeL=+l_T^ZwosXA##>k%Em3Oq9Pj(Je_-g zkBoT#SiZC!zGsKm0y7iwSpC$RixeHmLqQcFLi3O1*0x2SAfLZcKbK|l<<-r^{-=}L z+>?KTt=Zkhh4V~sI5E~2G7a=;;K`!u2mXu^ER_K}v@#)F@ylCaYFqyTA2R&d09bmG zl$;k4fki-*fENQktlGv`|59GLdeKL);b;COL&}`3y_CrRRtDa*-;)d=BoEm(ks>Gy zhkQg1uQ^Y8{s#Z~Vp4LrY1KS$*gxRc58$H04%%8Iy;5XPU$4fdtF0cQDasfZ_Vh;*O&M(mm z&3}}Uz31cdGE@*1^9Gn|d?1i#NX3C18oug6Kr6VI6lCJ`R#VK?^Uv~WEBlr-ex-Ta z@@&&}4L_eXu{7>yPo|Q+1PTwrCi&hSMBp2cPg*H9zuU*(6ONG+hM- zR8I#Zr0?TM2cmrsJ{XF(}(F9WB|8P{J~-KBm=mNieFz4#n%BfZU& zZ70s*XKrb^K=@Ykq(`<=WMpXkX8mc){mth!{H*C3I$E66GMb_3BE)Uj5$x(JGOhuB zz~nXPyOI%cv^>5ZeJYjV!n0-jqZ=j@vQ}r8O|IlYsbN!%nA4GXO8nX9Ixxs2GIHcX zB>h7U`E|n44*EH)GpC|gL~@QU7Z=PLBK>x&r)zA$UVHoMc6^S7A|fju6>Z4jb_|OR zOXtU!uiKfjF=7AUaMWt7JJM_rP!F?u0<^tipbRS*KWJh`s0m)WgW))M)wSbeTZXS)6aLAnL+KKm33+K zxgG?h??gQ$#l*d?p%(1-)K1g`8GC2y=XJyj(VhX;r^yA(a&1Z5M+f*SqFs$%m56Zd z@$;%pj3eM`S{2t!1JsB!w?D{699%)}wU&&@LQxkXm$acOl48P;muq2qKWIZ$YM#y1 zlDdnU{)0v$G(Ij%H8aaYblg;td@~50uf0N^(ngb9A2%`_)oEicXNdHiiP<16Cfc`N zL1KqD%I(4nXVT_+W|l#RcuUvMj3xD~F4SxB25iF|W>n!kTFr&Ulx2aQfHny4o`*GR zqjTmoXb_E}%z!Bw;)*tFro^P;BT5aq|D4Iyn-wZta~-!x>m<*?8axcMbO>hYr_QFM zi9#L3u8W5q!vjn*6Za_tdQ}LtcT^*3-Z6YA zAJJ&-!$Z7&D5fDhwxM^V#bjt%KT^T`>A}^)-P=$Pe8i^tn)IkMwj>)=v5BFKo7Y)c zT9a)p(qf|BarkT^Pd%_sSaa?q+$pvh3X%{n39^wq?_s+A;og`=u2MEEzNv1TtQzjJ9TOokLj$lyOVK;ht7ABR zn2DvjExp~NMCF*=(Q-m*l^O66$0Xn-dqXqrsHb@4GcdpnsCxRe_E<(IH!w+}=TOgu zrQ}oQHFn`SZW8c*h0=;h#Qu!3pl8#gX`nOCQQ&(?i)qN1MR-tw_jNdCXqdJLWwLQ$ zIm7psG+p_4PiU-%71F|~SN;## zFO=ubRXygNYAe*%~)IAJiBv)UE=_e^Ap(nq)_0E?cTPOVS!bv20O?l(_ zA%u;NxWdXIb+<=s>+W4>t3*Vm9{RKxT>H!}3~o~In(S%S7)oY_E%G_XkkXS0Bs1i4 z?c^HrS=VGsi&Q2|y>`x=EQFRn0c?q- zcM>@ykvq=b??@rpGLlQcluLJ0LpDX8=tZ>_mlF3ia1#9ga3yE=O(JlH!d1Kx&;fwP zmU6L_0$@|g$jRx3$+aZYH+edsD~miruDD~Yy%x8&DLB~z+5_`AtYii9)nzCW1Q9rJ zrXjShs_60{6fOG5ozE|?1;3ECOD7S8qo-J!YA9XS-Vc3#`#30cIdZsra@{A6TX#?L zpfGiK3fA$);AA5?{qjkGRJ;h_^3ziQ2xm)L+(m$f#TzJ6g=@FUmB-nNCwWxZbIvaj z5c>r80Bo7y#lhjS)5b*~wGM z1r`{$(rKk6BbG&G8BI zCzL*Oew|Tx&4v!B**RA%sZ%cZH|?!oCcC2fyv9S6{qE|7nVKlu&^XaV8B=(DNG&p8 z(2r#;Y}y+moiTKfq?o3-L3sM5l@6gCqgIY{=2!%OmSM*o99W{A+%T8w<+Efg3l)-L zvSn#_&PvYGk>Z%yidu+9x~^N9v~UJPp=7WzQ3n_b>Jn(9v=~{4zi^>2k`S#ViiHrZ zB&Eyl;5Z8xR`+Fwa=CPz*gk_ANQ%KG08U5wPp?`peD^c3DB%m6q0#=Lb?Z0r_8>sb z9-Aqomk;}+R5 zl47z)yS{d-Vor$`_9y1+kQ;RtdA=xj<}J!n-%ziDOs45blN47YmqaX6dq%XXw$E3C zMLv#kb}Sxdy9P$J*^q(+BG4f%CapL0?jVN?UjxrW1YdNGnC2nAr0M$RbC+L&sJGMV zG!2J^&EXGemPzLfjaV0Z+ua-IT%6J1D|ETWM}`N$H(D>RWV+`kxwckdk&tnO?bL6NqxLCH11yfV2ma< zW@gMfu=gi8-I$yab(lt|8(^V~xa&WxMKXP5L>xR6d>}SQ9(73##$&M zM{ew`MqYFXAKXkQlY8du`Brg!#@@>)-CdSJjWsohe5R#OV;D+`t2s=`YqpmW2>ofO z=&;S4i;9TYK9we#>g#rAh8UkK98iIRleXu*G4zW>gy_@n?Gnu6aK*L`DKwgHcF^eP z$pqb;u8 zHC!>RQ^iZ1d$a^*O4`t)*Q23^g);KYbY0csyH>E=KrPZdH<;HkJ}u*pnaAV4LTwB` zc_V%+k&y%3SHZms?f_xqO*jQ%i{s`S!`Sk+81FWFlwMD;G&&B_RN9zz*P$^|S(ODt zxZ=9WOQ;T-Z$a#kT;A^U9Kxc)c0Y|ON%Lamq~c^K3KV%a2TPH>f&J}pjCthSXJCzQkRO_ z9)Fs6Z^7@S#T1Hd6aM!W94J;qqG5GvI4AEm==q|}Ks2}F2a>`#(Qf;TS$OPLj4x9E z<;mDuU>$fn*tmiSi+1=e@IWTB)U8R}b(J=9$CoEpf-i5eM~-K;vp-NZ^&D9T>r({N zH2-)nVy1oLL5e1>YP#_OXaWvlJ<7kdO@ zj~#PR=}ix!yWoCCQU`jN2p~BRtYfc_K{HCCrpq6snihS8W`VEyXwPQ(D)i*gs<}P` z6bOOpT^XcvKmc~66!0UQUhf98=b_2=t-PE$E(Cb-XN7$~IR}<`XTfgkSw4F zbF;vf$e|V_h`pI$zq?3Pf~as&DF8;7&HIsIAh$Y}ocf36bxlK!_cgq{+#qw*2}4^h z-5{gs6goEUwapw0Uv~F8Ig2Z3u_pVnc?GN=^z3Sq**DqRyii0fpl!lK`{?9#%+L^O zaVInT2E&U0#)y#wg#)08-z^$4 zyU-!xvS>DOxio7SQ;)DiQH$TE5Sw$+?UOAlBr+08SgUUS^}_z!sh-FTjVG^N=sBQ< z3lC>U-1)dZ+mj&fd$CsKB*oPAVMB=97MPJG0b;*PfT7= zv4ft3Gv~!ovpU1u$OVsJJCcaRd}`IW?)x4=TQ?ZdQqhv>?i=&tzMFU1`tu&0M+Xd?>E9a)BP?3aic0o1a8`Br<^4&@WYF*zA+EUpzA==n>CKVVhae%lO^!yrqZi zai;c_E`1exBr;G{{epV0f#-edRos-c=9b8E4e!;r*L5{M(YzCx)W{aueHRE=kv3sK zIcCfl3Sy&Or6E^@_eO?{uKcLN)Frn0rdRM1iHOKvLYpoD+{gxRVs<(U z?PupqHS)XaxfmZsFanbs^bKb%>EU7`OU```RhJYaBK@!1?mYUH^}>D6Q7hUq<3i&_ zW+Z)yDLHX$S4YwTl|0ysz|)^$T@SntvrH-@t;@c60eR&0nkV-s{{xq>V}{1Zi@r~0 z+@DVJG2LLm<0xi1FL@n(LB9CR4oaZCXO_ESmN;e!b!OQxBi= zcOkds(#Gm;(uWs`yNTMv3~88B5w}mu!ALe8shTn5lG(}AS4d2TNl8|}frV3AEJh{Y^#-iM7K`6!;7y}ygSJbfivzU&(GTI( zKB4r$duh9H^^b6g*J2senbcl=w=QMY*wspo{Q7^V;OFmRdh9*nE^+XLeu+cX38E??Jf-{+p8X|eGrixuu;CZWgR(^9 zRDEmH-saA^`%U)@4V)C`xuMIZ2!Z>`sZwT32Biwy8?~jEzJpgtWk|&ryHJR~GYM96 z_Y4hotnFdSXn&Z?rxgCYl~;Q6$*PVm>`pb$Er{prU-%$-=3&YU@%p3dg+|Hklt!G`V~j%a^RSuF`=T7mNkJ_mmB0Q?vzgJ zckn8)GK#m+M^YJi=Joq76u$U2T~B*vc0G{l)#M9D zu%t+3h^{mtt}JmI?i7wtMa~%-IxDX4;k2C_q>zOgg7w2co;cIc)cPQ8btMoC^w1Vv+uDZ$^qOM1CB_eV_KDwQ3 z)_ie;aCd!$hNjMhphg_*A!BYJ#Rn6B0eHDlg_4e`Rph4SsE$NLrrtyZ^wV#IHwrV$ zp=Nz}-d>C8dzs>RV5}#}JM(6wCPLS5Z(dj`CMBxcMr%&P&++l%^B*tY>+}O~6*W8J zhOV3k9F^!5+`>qTtIjWqUlabTu7U|hBW%Uqu<-0)o-?IlHdSJzKWEHR1*^BnSx%`q z4(_j$K1cRVeDhO+b{Q(P!7&5c_1duXtBO5omxcA&17kJ-N@eYpRb=^6eCvf0k^1n< zuJ3FR29{Rl*+x=JmS58NXme-75m~D4!loPQPZuxM5qCaAX^KUget>lZLQa1^k>d>3 zI8&`N5*)8a-%CW~$ffbKkm`AIjqt!~v>b*djfoTu%gDGTHv;}q({MbkEA(kH;*iR< zRoYslGH@blv6;Se*Bar~Hu@D@Gc-n1td9cc6FqD74RdC-!{oyCKy_?Bx4nXd*b*5D zEtlc2Lf7`~JE$V}3=I|)2Ng2ScMY?7Uo66g<5~r>TvZjVZb!=`GV;u&d$-r9aG(aa z6>0R3xKNq2quGL~Z#16^DaWmVfmO9UxgK9(p-6;+!Lhm?oG+Mhn779wd5c2>g&rp9 z_9m=4dyh9Ej_`Y1Q5T7bOl|o>HS%=5@Np}hxQ>})LA&I|<8HTt@o1f{TIYPe z1HCMj(axz|^v`zC&T-Dr;AC;d3-yG(15Bo;&te}QjaV$K*sOQgLXlJkuCR60klZ%G zxDMaF=2~32M79zc68R=)WBQc0PkpB04uZ4TKj`S9;jH3&ycva^;fF`{Nycgj40*&c z{Ku_$%?YAV{gpUnC#qDSxYvYS!rG& zkx~AU8mMgS%nHtit{ECiDvqv1*3ye8+)-(5UMM5X4mi30Fcj$!zU#omqyYmX z7+IpJG{h*hC0nYmlm!@SY&=e`I}6Lr38hts-Kl3+dSxw1-?&;eVo0UO3+_TnsU+!h zDnOMjEF}l-v6_T;&Z%JQ2+e?vq4qkpt*=kPXxs*!dwket?IN!8@VXO94_NNA3qL%s zf($*@v?1wbxUpD&*gdFH%R@*aiJwS|#RLS8@2nh>wLAUD!HTq}l;$wt2jO8qQ2$;x z(LRT5s<}{UAa}_t$iT7aW5NN`DW3;x!rv;5TeiTV6#)>ljV4mX&GQ(@=Zo-%f%gQF zjQzky9e5lnR}?Ds$V_{}qvZ9b@0?YOy*yi8X>CVx*COI{5eS+Ac}|26u;|=$fVkC_?KJc2B0^#6 znxixb^!&=oYTgz+#RS*@uHUl=P)*1KNX#h?*WmdTF>lL>j{sZen|ClO#7^s&>okWE zs6DXvAYm(zdq^j1bfn=?Ra7VB7FKawHk8F4h3>s`VYKiXgE4YfrK#Q6joLYq@EC*5 zf(9}m=As1tI!tn8g;-2T3GC(_j2Bl~gH<5*h5pE@T$Zf1^Wq`tk~OG1_MU$ETV=#*v`~aw zlk;gf<2rE9&;~hYXxy#1PMdpOxh$jfhq+-b6Hz1edR0qShjmdZBL^xixOt|@242#M z8y$_l6&F~gC)XY2`z;|>K9=h7jMKroiV!V2Mj|55ymAc=W;8+Mhgx(D_RG?|nsn4J zA7IAwioC&{A1n@&FIy@*T23gPdL;@&f}+matQEL8Z4SFF!}=|Kj&w4w=U~C9@p*5u z;qyvFWY3|gns@YfHtdeIO%0f^z0Kz~yh)vm%X{k-^~>leqL(wySsF4a_EsuqE%}j| z*TBfNA$eki(h=eFpYKB}B{Fhk{ngt9;Cn6?<446_@&^WU-CVaNn)GT$`XYVRkJd(R zb7NnW%I5d+wZfm>)$cY-13<-^lq`L@Bx~xzX57&_ynahe5ew9sbhr;qlE?s9cnr}YsoT~IT>)w?Ic8~atyrP% zL1@thhr4yAT-cJKEE?#U<$kD#g)%bqQ-mW_jq&zNP@kHI z2+PyX<(DR=SwXuE6g_mI1eEaL~l&EX7>LY6&~Cwbs6$tgLEYC?W^$O;qFh)(f5# z42703r^dP%%W$kd5$GBX(sgka`Cb~GE)n6%6r3ACMy(gNW>AIJ!FZnw$Sn4Z@e zQ>j|l+@8g6B{ItRdYl{QPgy$cO|#4K?M1Q*YmX}s9k$qgoOUo>fS0@a?IQz~mCXx9 zqLZ8QRe&z6x~e*7X^5`K9x~J)VPhPnTF?&32Q33(QP2G$R7oNuvTYg~Fu0z`!j+H7 z=4@pg{8XZ&h_Mf zBbEOX6@C=0Y{V>~QOKgx(U2KQh1u{RuQLyt&G0!^yW1RtK8c9D|FetfIo@?Dxnf7L zO*j~FBC@TZ*Q1Hw#@c=pg4M5AlP85Go5d^)!1QFB8@->8j+8A1)XOYf_!Tp^K>sUyF^0`ubd2H~mu zFokF{R?Rm9)(IWO3NRQMzR*`-HDldF8DnTLg6rq&$1p3U z#R!Dz0~h6Z1uo5^E7p~ekMj;g|8SxQzsQzQLrJOlgV_>%KOLc2N=Pjp3nIfoeJSa7 z`Z76OYmBLg=hOJHq?A;XAwKcy%}Dz7tKY*0{^wPdjytce1X`t^v-*|W$W>Qk$&<>2 z15bZyF4)y~P32M$f_qX9)&Zyx%tj;+uLec}Ek>Tawz75$$7qfLXcl{vTyb6BoN;&6 z-zrPV{%b4C+L7Fj=KM+r(m`;O*D`+_?c|ATVa6^lBq7Du=d8P%uCE~c6Un>*T}wLk z2Cy>%{sf>E;!+v%pVwDFP4TR z7x@>F&F7xkjO1RGlSK%ReXcTblF_^CmPJSJ9DBp9l|VbF^TsISdLV5t;s^yQO8oPi z>49t&x&PM6%9B2E#B$?B|0?IW$jtWn%JP-bC9>%9VB=#=H`ce*X_`OT@HRD?Y?!z1 z*>&>^fHq@O>-o5@m<#h}9Wbuq0&v5aVoOT$^kb&<1rU98&}f;rcp?6Se5@Hp)6%b$Y% zy--A$1Wp1~=i^gPQA=g7ZI+T{i)MT>qwUtXy-x77<qIvy|jobX3KIDt~~{6&ypcuA+vu11nZNArnk|sf@_>pRt2{dG7(RToch~T0h@0 z#)zIDWkw^8OommDkIj9k|GWnsBaziU)U$zg!pi*>1Y+4|X{@o>qHz=N%yH^~LDy~V za%GUQqFSN5_F=`B$S_sUsyV~|x)0mAnub2EIi*8Z|4zN()QMANbyqY$(|pG1S1tef za?NR^>4PTUvWJ(oHV!WR{?c{b{~q;DWY{BH9=@rr0?SjDJ10qo~GHPL9iGsK3YQ7#hURhsbJdwA7Om16$^#Qp7Gaf@u}vDffQ ze$m#f+dp*^a-s4X1s_p_qn#lxs_x_!As&B)6rBvK3M1vMG7?iCdxvr-toHrPmVf&t zYsHtae4L3YqT$Xs%SZ8HLh?=xFIRUW`b`~;@iC5(Yvvom?*xt$JShMCcU#h4{Vp80 zJFE_c*%%w^j41ecCl4kxbd^Hh8INF8XyWlGt5D3phTX~Gnq76nrn4EA<2emG-%C8t zEv7*IUJg<{HxJT(6z`A$}Kzsq`x z><%coeDM2ck-c-5~G0QJCz_rXTtFax+F5!AeCmPf@k-?{ytu_ zyK?+cJK4n9G1r`kT&`AWLZMDYC`Mnyt2)&YO{f!e@f_w%SQCoPe;}25CyVG<;J()W zyAyP~_#V~n5UWy$SVqwqi*WKzo@K(FYBsLvREOkv1OBNQX1+Pfos3FT>$cq2j$a5A zs$+xV_=R9w^*x+ww>%yThhr?pK}Zqlf1ca%c2Q;wuy;`nmzS@7LY@}4uQ@8OlZ{fEos0Mpk zr;3q>(P?o^7lkT>eTIv&v3NMDj2?RpyHhDwAYc-&x$OD{y@n9Nxj}GzuWb~2O|csb znSxc)oh%mP&>98Tsa7!@-l~pj&~?}~=T|cYvy)}zjJU|`zJ5Wko#Z_obMH~|F;MqH zaWqc94jpwG4U1h=jjch>gp>>upBrnuW+%^J99I`J`ku4rn!qa-eb4%9H!R!JcJ3#) zZM*;VgP3F3ro*fPwjaI?kA0b%0}3pjQB5b(zQ$k@@KHv2?0wj#Rf_u$tge%7JWH)P zZbmX#vrg>4C3`xqJ@5YA5t(c|2g@U@QOBYYyg)6-^ygX3B~6Hrb;hw8C{@vD2%BlG zX$a8Wd7M3Mh5K#pi0j;4FDP89Vj zV>H`iG!|+XC=;*1Je11jFcs~>Dc={(ObTWZ^%Uf)LKo*v$j3$sqanAiW;Q1trsqqE zjO^KY$~Nk8Tra%vFw8pG-^b8B+M>gi=f@R&jC#;H#36HO)jYg?ik=4+%4q7+9o3AG z!Ut2-{o|bHm%R!TQ#^U5&!>-IUPEj}wY@_B`~G7&Vf!Iu+yIo_fa;{~WWK{WLdh$LLaZ>|$AeUa*M&VF*fDX#ReXMhC*gxQqo z*2Z0;p07PqS+znc+2i=&LgBRU!Pm3locWK&oAW(6#?3K#d6!k$&t*gfufBx7kjRLv zxw{&FxIvJ=OuIBROJPo;$H+C>a9u?bX~I)iX+l> z6|w^*A1(ph!+nYTNT?`!v&far2TyO2%Bu8Z!qd$M=|x>&7I>Umw(2eeJm`#FsqOF9 zjAZ*pVq(qj{}{fvpZuoM+#-E|94WQ$61cZ3eV~_Tm=eZr(J|bUup2@a6}k7fa3M;I zMW@~w?^F=B8ORTrq73+xoSZRGG+4>r-{Au6gi<&iEyAhqBFq6Jf}I}`9@CgzVdGWi zygxc%EG9_iJ@l8P6zsc6yDu3J3_-9oLo7+BjwT$%su|o0nS(+4)MScJVKo#URp@?&2 zhk5aj@Wm}AC9gkz`$8|{pDW9HkYb?-M;E{@T`5OeTeKUyvvweHuKYw{IFuhAPW8t= zasFmr!6_8nP8=ykD~QB zs~W?w>d?-4-=i^rj21MjL^2C}6zA|pvkvMQtxl{%|ER27V_)K%pikurL1`S7I9 z$MFva22vzCmrUsd2sPZSUjaN*dIq!={Vsh^XVWrh_Y6q%sn!d+-9G^E9f%K6~MO|K|F1c?ZiX?2bfQHyZ2) z9+dX)xl7R=iHtB`8mIk2Rtq;Q#fPeyN0}u}H`lk&P)b>*?&9T_H5{P^wwKzFhGWfj z^=Ry@FC4R!iUD1Jk;u0lTtzNgjkj19ipYVl>Z`O+?ZW=ms4cA7ZhSJ^@`+D3ipPH2$G5S(JF8t3i8lRK-U z+cm43@0MhbDeh-DLs6}h`*jGK5gYW@S}2mpz!kock}kCiUF#0QP@-rd(O^@II;|sI zFQ1QQ2hu*T2C!oK32*MeP?E~P`S5rZMZZe;T?g$K+bm5`A(`ccG)5vLt?xbr z!*S^yYlQxGRHHVOu3b`pcAZ~#E#M-NraKy+Yxt0^QCTbr&ROgHds2pEj%UpZOFp6> z=^pjf+WYQVXs=WT*w~K|m3!b0L}#9j7h(Qbphz4|Y(UqYVuo#9`M|JmpdVTMsvY$>v) zUcWc9Ofi4?3H>|g-dp$GaPGP1o^w8HyyKTY^sN`+Lq~YRquY*dK$`9x{`Mkqyv-*? z7!1*O&t|City!wXlrmhjkjyzYzGH{*P4!^Q;s{GnF#F)Gs(Ra!a2_*w>0OU};;>+0 z2M6~%Pl|CrQYxrwP**9Dop?B%Z0j=>)5ccbA-wO<015riE$=a_)E?ZUP&lQ#*|1a3%}4iHXzcO}7rddw3v46aB~e z8!fs{w`fhf`G_yjs1V+kI#)x+f#t!-G3u$nG77e`o9bm?ueyT^w=i+t%^DxECLPm-&Ak`qwMk4CE8N5mRZ4@jcmDek;o4t)X=3ug{iz8$~_bDV+VJ{sl34Lu`Cv5rW4?H2LzKkil;EKV%y|$Bn z1O>_XKkb;A2-_IF!x8A%>cTS=#xr{c5jZ=qJzsd~JrC|0_-T3RchwkA_M{I3B3-jA z*0LoS|9UOhOpIy-mqrndv? zdr`OfEt_j|yA%&9@7o;PtlNBSp|E*r_P;lOaPt>tpPl{o?5Ah%nSJAIY4c07p~c$l z<%`E=S2jN}yD;2vD$7h6@)y0QqvNPTpjqM4?$d*g|*o#VD~ za^acrz2Wh(#ig--ANyCuU5clb5#_6u-y1tVcIDUy$8K4eoBz-Gr{@1<{^RrMdG|as ze_(!c?j*8J{b=stxew3XI@g}Ndd|H0p}C7UzaQKEW&fKyDZKd0|Jl3RXu1kb8?p zpUO5lx)Chf`lT3SVobZFW@`OTpGf)xYPYAHZ+SF^@5{}kLry|h?yWk?Zgr#;qpTm3 zDwMR2EJen={ytp@MamleU!?XsE`lp`;x)QOTD){t|24V&kd`7?M3Ob86_Z5H*oawDzT~RqKB=K*iO|v!#1b$~ZK1|yF8{hj zZ>RH3GSsZFDwhLhsqE#e5!h7m(Om{ zo2n+2p&|x#ijVR}u9bKdwLxEP6tZDGU1D;*bhBCu=hTT5wdP+a=^f>gd}F%(QrPu>~`rs2ry_^#Z1U0s7mgdx#&=-U|! zYdIm)Ij%!C4C%Vx(u(G4$;X2H((A}Z*{G>IO~r1N zQmy{W2BXpMMRChd7)_O~+MH{q=Kmto8-^I!F*Sizoub^y?2&y^`~9lRkcg$&d?RD9 zGxT{smdR1O$!oZ);=8t|J+&lPmu#wcktjQ&!fc;ae30@6i%_<>HjeP4rxap1x&{*qzz~ zV^VQ3HbKkq#*B+|7ER3Y>!jjcZ^A?t%$&XMST&RoXK?PDWQHffQC@wv)1!Uv0+$;5 zxJ2)?y(OAVs@p-l->IzGi)UndFzBNK`Dn*ps91B3^p2aP-|aZ!m1LZ<=u???jL4sN zhg7`nuUF}YRa-20%VtA3y~VV1bz}3kHP#AYPwSmsou&yt-Mm!36|h? zvvBAZneMC<=uD~;w033> zQEi}DA~khmPjf&gS6~WhA{otabTewI$EmTO$aE?fCAoMss4Hc(nlh!5H*X`=uhaf= zCQXr@lAABicBS%-Sdyk&wtzP5@R&3jcKh38y5G_#P4%`uu^RJb8&>Mjzsrn~z+pxb zSB(bK$q>3^A?vH_lg4CfQ4%MOdc(z%*`hwK^2Q@XB~QxIp!k zCZ?WgYl@+q)st)1@kBed>s0v!>nHPZ6=Cj|Oeu9@=QgQ7bz_F0sbW2lq63yrl-}%? z>H2_)N{|jupp|F`6FI^ww@=ZbUXVrzvoYNvi?eT+ir1WWGuiOOdKp#S*9o%Q-Ye4` ztJWMIm>SxUPh%^&_?eE>PR(e_)9MHvf-j}rbtuj4U zZPSK^G2+M=*@B)wJ|i_#^^h$iZ!SADjh@-V9{Yn_+(Ektdy4cMsntrM+GF-VEHiZR z8ey&@DAL(9RH)+kTP1oWZi$kFD$G;1PQ%_UZd;M*ZmWwbI)jmB(o^A$%(2f(^l~rM zr8=5Yy+a^EuS~44Qh&*jt^yp+ZOywFKtCL8pW$9Cn z>Po<00=|>Z+T#rQF?m6k{UwIz#>2g0kZEPrDb0K2-?fHnRJ84kGgdVhi)fA*Wx6I9 zB&+?J#@5iZ3sG{@O%lBnS#6b&wK&-{*2;cf#V_S#M!4J}vrH~miaOO6j#Ej;+Ne=F z%W9F434Ofg4gy4#t6h>0+(Mq4=j)r|Uc zas{<7My2a^PYKx^eD?JA7bJSN50#;p<5^QnXG|2*lOK@!lZ7O=(|wZ61+2|-V)s|& z;_3paw>>OV5e1}YTW)lQqb>&MQ zvhOCjg}O{P+sgzI=poXM3NnoL_-kdly3Ej4Q(oOQkdA(z-R0diwkqm+X{yMQx{Aiq zRks~FU4CMVR3T+!jdZC}4e+@Jbb`bY`E&Vdpi0NmErUK4M@BHsPGRn1`6m)hKh-Ae z+Dx$B=2&$!CVg=$Zt3}>v^VeJ2 zHqoL8uPmH1Wp9QsyJ{x8(H&r`8Si1Kc*}a-vE419>7>4pZSwqo+?Zm%p^pVv{rkOu=S`EhcKL zj?`ZAI+?5sJBgM>o%Gdg>JT||*TzRTNz#vW$>~DeP>N;hamMv)X)r3W;IOrH3ZOwLkemEC2jcDS^&&Yig7)EPtiw1nT7tW;Z? zR5U@HaLL_df(+3QG#Zs$B~tD3Cyq<>eyZ6eLKa^ms%nOs<(&PKa`{w|q@7)Z-QcL;ZtL`{eOaPsR|8?_$kjeFV6zRcP3@DVI-j-MsI0S;tmr6D zt&p`ov?zT+(U5fXQrS|;%O^AzwOB`lLiGuab(ht;Pc{oqf8a<&` zVbU_8r{s<%!c8()PUXsh0;_ga2+J=eM!rfKXwqG8TY?Qb+0F$eUA)nVq>Z%S*ybDY zTr)_KmRC#tDcgDoIO_Y%2F6&dF|U4FGM#9|^7qaN?Y25AM5> zJSiq0kZ$tLLf-Gydiz~|an-oH>}7S7@Olf(1tVlZ_cg$n!deMyjsw zuIXllYvwsWQ3Vov$FDhX=!k@WMB{+l4Kq#^lgiXdDskGDRosG8|tQ)43B7 zSGmSTx_E_$p=*cmB`0i?BRt{72SUe$M-J>Czw=w&aj`A45OfXxglCJ5JS!WvNmsh> z%~NKgY$odMegJsXXm4f9C|OvF{N!?hH_9fzn@y)peg-ioQD^o`)6Y-6YN9bVRQ&HI zgJ|+Qb^s7IP2#nQ?*=UNChs}Yv4^cMBDqFk53H}JiY?O>tsqZ;5{6u8HDVE9s2jwL-6-Lim`tEF-6%NO+ z4@by??t|yTbH;M<`0)PB!!V3(SXDn5AMD@9oD>s-NF&W#i*YZ+f0RgM1O0eH_(dFT zjZhJIJhLnu_?Me}!dqT5_!Eq%92$@|k0wiMj4oB&RwwYflcj~bt{f~coJobv`_qWR zn)vMA;lfpeD-?HD2U+BT^cN6+gBNxYrBsaNG3R4Q#V%Z59f-Lg&&C}t1&)g`>HWdX zA?>LU8~~gGf6AmrE=}anbg2+IQ^2EeUTkQ$a7%qKkEour6%iEb6XD?_?(;8I2(NAq zw(b&fmt1(w0rnDF%uq<^u5$H}f20c$Ty77h&eOgO|MKjm5sP~4RH)GY{$NVDv^@ZT z5@|!2I{>2k0Dm4nm2G_N*|~DUfeoL53%UdN3`91wU?tZ)& zx8N1hmqh{&Vg~jCS{VMDn|U5B2)N?n7GoW&ROoD=IuF z^v`g^n14OSERI|SfUzya$dD?Q4t;0jGSy@B}=c&os`K^Yx_%1UnD}*x;a5}J%rAgRH623 zq@}y+!9Bx|T)*)^={xy1e%%WL@IKyyIFtP>k{rPxSnX@bH2A zcMaFC72nAUSr2a`^?nUcHll$<2m$9w2!c_v@Zvf2%J5@J@x`7#Sx4ukgWVL)!N;`9 zCfha^u{KHRrw{UYe>#&Ty!cl) zq_d)13qoOP61pmDp_=Y?O1Lx!!81Y@63@RCi7cN}ObqYJ4GxHc`g8fgxqFF|B|JJ@ zDm@G)LdljcXfx?3vX)c}f68Ol>Sqvzr3+tL9=ZwxmtsrM+b9G{E8lT+ND5bG;ep}+ z&@7|W2S57TW#Junr6-1)OM}Z5HfbSUv}wV*>7ud66@Qz1`|J}lyQZ$5_|VHt*Le!FM5d=s9B;11A53(^C6 znh&`xx{$rjYbs%5G$DNHt!QC{Dji3UKjE1WRBw4;$B?*X0NBK8x@6E&skk-i3xT~2uP4$SnKR5+wQv^@OcQ(rnC z2i|>yals%A4(vNAW`mG?6fH%2rB4`w4r{zoj})pov6XGYoo^JMmd@k}H)x70!(Y4+ z`y6_34^2q@@Ma8-AjLMhUdfeC6x+OT`I`sJTSm#ki+Ao@9^Uz8apgk?7nAi!Ta}C= z8v(+Sg0YaHOtXxTx)tAXCRNZy#+Qc=-wIEdoim#PaH^fVdG>oV+os|Z_l^B>Q$TrC z)W5WM|Igc>MM?XGzHM|Wp>*J?K zH;JHMyfEk7?plrO1-<;;CqJ)PSsWn?H=O*@MqvB+7o1;EAhoE|A9J#F(il*y(_W@z zP2T;$7Zp$(N5}&4ABv-2nEsMN%rXG0O2+O^<88@aR~r&{^AF>j&!obi;Va0W;F}%) z!eb9BuGr|S;&fj<{iZuXrR=07)v2aK4z2Jy0pB}977{NC^2+|104;N$dVSOBh26Ec z?IyRIR@FmB+No9x+Pg55XHtb{UORK-&bxi%!@KT+>H{rR%y1%UsTMM5hd+^y;Q~3X zsq3VKKfMQ9>MO{@V|R;MDl1g)8Jvq2#AGYdat>P}A(pV_IU|X zoYo{taU?+xp&eTv0o_2a59g3bNqEg?2Yb%bs9&ajA?f2QOCk&Rn_i~sK>PYEGzq{} z(&!izCQ~!Fa? z@VBia_&*0_OZ#HgS{t81u*^mnmtN65H0 zys!*}d+a;hG}jkUT{=jJqP83*^IJTwRG#63?!+BdI$C|yA@Yp{N zjx3H)1;tZ%hk6~Wn(*d@*AH-vkCKH4o!>k%{Mi6% z&Qh~ejzi6<@!`75@6@CiL3_X0(=*A!p^x0MGPKbRf;}i z#yd-@DwP&)djz%9XHt=O33|Z82ktpf9;B_0VUXDMofssk8Ed^(V2O;eNf=8$eXj-_ zs>jgI2wA9UuUo$JLl=w>*B%oMWAyqCbVS+@iIgW*ay9sBD`#!G>}g@*E3iO~P&cwJ z4X^piz@yk=PWQMX-7OiqHmc#MnS_VGiiI>n#o_gnm7(L7>(KKJol5sLEaH?gUj+6S zZ|SOx9+M-M60Z9idOJcEZvSEe8pz+%r|SOg>(Iy4>swE6BWShNVgyJuSw~ezmlFc> z4V->wQiVgm8pvDWj&DF+*sob%!mvrlUr}qY=SU`M@-?_*ywruA>zi0xuOJVPeoH$3 zD&K~YrqoIH$^;!Rd1^k|<*BH}T04YCz76Zx2v6{}u2~*Vd($c(jJ)j+>@Fs-MFtHJn%f47$FNwWaY?k@(-e(&8#0hy;a>oI?2${Sg8>y1kgVeQfuLt0C zi@w%U^Y*YKm=^B*A-Xm~7G8YME-}W*JT83fnX! z*Y^Je{)8he(X4}DuL!tMm|TH%#Btz+es&?TA}w_eEA4j@a_06F3TT( zj;t-)_*T{;!LWr^g-MY?f(uLaOVqy+%8u>(}OV;$&q}d3*hX) z@GQh5CgJ)QMD6sf%%NiJQKU%S*B?wDvYoP}#)GjQ?2~z11^{Vk&c{pfB2ei&!VNEo zw$wik7Pp_RfQ->2s>>@Z%x=)=t*7-=q%w-$Y0~ZE?!zJ9E%{s-v-ztq;3#7C=sFB%DQP7GH$QFZljzu(IQ<%;D{8Z^IDo z{p(;Wtd;RBoVWU}ya}jDI^3dl{dmL--Ttq*W1NjUyf3}?-3sAE6BA(kzfK^LEP%}8 zL9PoxsJv&xSnTQx7yo^LM6$%olzK5_?3G1zE)oyUSHp(7F2=)3 zHq@-I7cu5+oH6gVh$7w0N%!2?P%~Q zPG+OAg0Qx4ZDrw1s-XDwKP?ZH`_~|>{7JhZNVcOXzEEM^UE~Vq4nRtbl12EKBg01y ztckIhm#h=mueJ^2p^?ir-9)MEtptsIzde@|oJ!OmB@2o>gUiE#a!m{!X3~ZhWvwGn ztgIQP){ZUN-N>~}rJ`|@HK*2vZF%8!Q>Z&a7JN@0!@2vDEqHXDTEmT@7Omv^L^qL* zhXVk?;nM;$gYOz8OB&^c&4)!)Q}L4Wxmo-s*)3aZgs<8y_}adzHAo15oW*aBkcIc( zcG>dqg>S!vyTgWZS)W_m2hVHern?lyvCY5V{Qb?J-~55iZ{1wq9N%o%eBtJ8vwu_k zYW7#N-Gf%K#*^scYsxHf5Q2PrYhxm7Ll&`O@U? zCZCvmX!8A&Z<(x3#wK->$0nC1{(IutiEk?Io%pA@eG~7Qc*8_tA~133#Nmm}<9{0e z+4xt+KRW*I@z;*0<|oHpE#ACXTa3+}T+}TdTim+v z*M(;nzP0eFg}WDSTqrCA7A{>le_qP#Aj8CE1@KCTPG{9CR`dr0CRSc?-dPytM!^V7%FmzPq zn3c4&icG+;;h|uUXIoY(Zq=HSH9C~2`hTyK=m~EoYO{A71xqBC45SZ8Zi044xj1=kbThjv-N{@CX=z4VDh$$WpYDTBGtxFFie|~t8w+9=Q z7a3Q+(hC&~Ka=VCsE*1TYsPY4pJH3;@o#R>SMBjkL_`E?1~lQKQrV<{@XYIo533J~72yY|S8Am5-Xx|ZJ1vDQ<-t8mM7UnNXY5x_o1 z8);pV*nfpgw|Xi>Oy{uM(@krW%^p!m{fzda8Yo|!dtH<*q~aaLuCX0V9{RT2Oehs2T;_x?7mYOS6^-XLQZuVj4~f)MqNisx z9@H1+Bqv9E)ZWd}WJYb$X6@O&C29R{xgA}zL7GbqbtvbGQY3$w*l2HHo&K4Tf60;~cqsx)viC03Y?Ei7M?R z7hWaPIem~+JG0ShuwSdPq~efFH|c4b^4e?mLf)6sWzQpJy1^bMBUHiaCyb3sg}m@w zdHh2KuQN?sdqtm$?S)fLd3%N8odQ*?1k1XDr`W6Uif>8ngzPD3u$8t;pNwT(Msj;g zrt6Ca+FEAy{<_Je=_PE0OeZu1+2iy&UXKugxaMG7rmM0#8UkX~m$g=WRX-BONsM4g z6C&asYbjxA#=5?QQt~&n2Xk&U70Tbp9~`8!*#d>g2NQ&-i&@?DC5ayBs^QVBwVNoeXLAzfcSy|y zeANnBso0hStGo)Uk`!nqZ zw!540Xk#W?3L_C%;s;oY~Q`R1RLMra7%ay%)d%3{umV9>Y-gce_o@m0enlnXu zhU7k3DtVhlCs`V~`a`8YVN9E0~XfRXBhGVH$zj%s%Mig|OHLc3+_$?STPaqac`IB*A$IIotx;{y} zc#Ad_uLUza@prkn)1CB3x@{t$tD0$Mxh5CaSu=E#Q3V|#kHcE!mgUXpX}QyMGg%4N zUEX@6m7SKG@l<`QM6lOxRPFspHN{T6QEJ{34zMk4uUL%1=`KQ8c1X>8RN)-etP|E& zJfWg;^znd1cXw+EvQSM`QwELI;pUz48gZA+EvlN1CX*d)CPU>8OvvS99-1V5bxprX zu6AlZ;>4897*Pz_k4tn{)0`(8?TnRD={wbYe)G>|dbHHW=1O(lVSh-KDQ=PCue@1IyhZZ;wIigzK!HRiYj(=p;23!?y0rc- zuV^O-mwe_sygkQ z>|M^x6y zUti9Vu2hST^;F2wpuI%axEzEnOETqj+2AG}%_zH5-d*-$T}2hs&3KouwY^2wa=+A$ zol61boM!2$*Ge_=d9yss_IOx-0pT$<6KPGFHkj#cUzaQB3whe%r7C6CrA|AkO>dgB zZ#w68-Oh_QJh|;*Khb29DH9ipXUcrEAk_-6ogR_ssxm&Sw$!!dBHs|Mc(2JUT3Bbt>_ziYL;irQ z9HnAeV4JaJYpkM<+bhIDuha||$d?FDqQDcnh^gU7M&zv)^#oI7$x>N0TJ((B;o-yo zELDi{g&OIwGzvL;$3mMEp*tkH&!Tb>I;P$;ShK9k#|76VdVqj(-3^ z_WcoKjp`L>x^Ju{45TI?t6!-Y(9i0YvgfO`<>NT%U(3MX;#BiQgD== z58^38p9~o?EwxTjYT{RGL+5$j$bPm&ziI^ZS}a z!w-cYwna^mK3`U+IFrxT;wVd-QJcGrnpl&YS=E{i1lKlp6IEx1v1J!h5+m8_s7VJA zLDm_jQ1i3n^3jpZ6KbN|X&}_H!^eH8$DV&X8M^Ar+fsdZyJPJDrw; zb$hyGi&)l)*6C@*kMZC(@kYGfj(tM$n5S*1M5 zPNixK_snIy^}hgHo^#9Ewk@MPDLu?>j}@ncb8oqSY50*XYXQX)Lqzome~d({w9gYu z!s~RSh4Z$eg;AcMd$M{|c;SircMfmdx&}u%)~#_?h`zNDPw~)~i%15uXKjb@*KKQC zwv6(S^2f0!QuDD8i!kZL6biI0bX;XZ`HusL%AHoXw8dw2;r@UCS0-iW7zHZQ9r?Nug zVti!#>b32QBP>DjwK*Vf-_Icfz}0vLfV0)Q2;j|byk9%&wU{;HtoKspc)d^ag6TZi z!A7aWdlxdNp2SKS#8oGJj#xg(h1x#9-*0xMxsE1TqQxgM5dd3SLF-T{O@6W

HG*mX@>mj7%8Ujwd1;7fxkyQE~<-3lCm618i{5rhe-QMDrqs`tZqjwB}UJA|2Oc zTDp9?QAlwrA6EL2#}PgH8rD_MN>Nzj>FCb>M<3_k(XoC6{Rl%+Cyhll!RYJFpc`Iv z6hYua<07x1pVzP|%a@0^?ad-<<`&5{Ba(*}e+~cPmlkhdeCJ|qadlC<_&UkWi(3}{zVP#fhZjD- zaO=Xg3&n-N!les`7Bl{6|XY`!8@eR*x`2L2q4IkZb-G=&x)eYJW=Wpn3n|)>U!_#-o z{&Mz_*?VVi8@q7!t+S=s!0e^7hh~>%UYdD&=3Ap*oH;&oeTQ)^QnoqG3FV=6MbG^Lw5e`@RGKPG=M z`JKrxOx`;A*2&^zVDiXlW%SpRhbA|wC;mF|)WkO@J~Q!e6IV@SCfpMjO`JKgVf=;h zAC5mbe)rhO`1{AN7>|!z$LaAsee7dn?;d@0tT7hhw-POPxoiJK z&mZ)g+KRHgO6qKipgI|Rc(5_~wPi*@TZ=NkiD;J1Y&KXB=tioXp;=10DxG!ENu65}$kF~C0@+AP19n#{-_z1{XDS`_ zeM9KR?G9(DQX`Njt;SZSOZvp0HS298nXJ2&nFbK8jf8KLI2=R9OSMdzd?i_F5GIB9 z8G-K9m>opDPBtB(YQR^Edxc}7->a85DYG}@vS-Zhwn5SJJRl6nQRt?Wfv!xOtb}T5 zxks@6{1!LSpj_GjE%Vpw@^;QG92ER8EdY!jb_WgBU_e?>xIZiWZYUnKP{mLq+_uXd zL`Cj?lRyWsNR$ zqtfgW+?#%Dw3e*MlNDF0O0=ua>xEu|x_SbYXKE>XQ|i#vSm!n3XiBXL8SJ>?b|y|1 zqjITHq!*kW+EFt2-MxIxsBq*jI#*=aqZTUfROaJaea+jtsgn!KRE%7CiTDBm6z8Nv24y4YY)KQj z?8;+8`#^!fxn8c*n&keB#>QUyPmvx3)I_2t&l)T6^2=C~6viLuSt?qUtgdoO6Ag2X zr7jiP`x}}J<#q+-d9%zbt0e5CNN4k9n#{%1^`uQ@@J2^(7U@=dn5cUkDr+@WNj2H! zaglDeIY~>>pv+{QO-n3e5e@@>UpAB=EKbtYtC{2Ox`}Z(gaP>ysTT0iOs*)Y=qT+= zg5Bx|hFFfU*K6`}w#uN$y6Ldczt5?Wl2VT$Z_nw%>Ljx(FLq;3>SRgQQ$rR|H$ZOr znAqH`ZV_^mH)o`Ea(N&=Chu(7*ZD*o69H`{W;wtsFLoF(&aVVWQE&DX`*FPw<_g0hy5mK0S360cm zrZeY>{dn`eoR7$x)4ICHDJRI}#2dv2@^pYImji{i1_A9sYEiK3{ob&&Ks87`ZZxZj zayzDS3-9YyyAt-aKhgBcasL_L@n(@MFSglkLzXBI#ds*W^8ulEPa82C$x^MBr+Nxm z-IXwZOlS{=wd`oQsYEzskrHR7#P+^Q0lqP-H<4>rrH0HQQA#`(Cq*#k1Zl6>8>~Am z72CVJ2sBhPOx}=oC=`yUD63dH@dG}#L#tX;%HOb6 z38}&;c-j1JL(@vM-4Ax(re$&DMu0qJ}7IIY5sxZYkkUi*NzN66 z+!YEb_AABqGIfWjQt3FnTJ@ZlnHJm;em7$<6W%ZtQlLCy*e5$zq`NA0CC#!0b0AFl z*g7%)QK5TRDPE`RwPr!qi`y+KrDAn(pW%1qT3IjSW=&0PAj2?^2*2t|D|AHIAMjEN z#D%eOi{PsEyS&L5QE2Eg9lP8WP)0AfRc!C{Xb6)uV|Av3b+?Tx)J zWg2#;?A(Lf$9nwqJF}%25ei#fE{{W3sHO=~>p3%?IGIRNrgYR+ZnU#Ut`vU25~#-r zTq|e*&YsG8Gfv@9=yxCY~2(+x|ofgy-R%u0gDcU39 zZ_OpbK{oGHD@@`WIQ+pT13_3_=32w?PiyXwlm6d-B$2=ta3`+e(i*=MkQ0Ok}fVYb_(>le;4|(g=vyV zCYwaCTGhCdiAjq{cNif#(rBie^E7?YxV`r^kztP72vsxG%2Z8dhcj;er64IbRjg^;jusR+cLPpFvMLs7=!%!Nj?Q z+nLfOvkUJO=%#3fAj3ItR3FD3sVhdjEYgD}IbE*=lYYI-TWl*Wf}6~5LcA{NlNnT2 zz1oL})-A&Ih2NwMmB_p?k?W}watBSa^f$zg2-*Pb%ZycRX#)2;dQMrO8{1|VQMH=n z+7=ae8WNWXjw!#fl(oRHAQFTsQ4BZ<#Xhlp$s{LQ0aaEnuZM!s)bx8rdd#f@%u+~^ zBI>Om73(d0P-FyJELqU&ecDnoOVrp=;Xcc6v?Nmsy;`44L{ok;FMnEWZZW2)VnSPB z4S}dJnBV+T46I4t~$DH zg;di_vIoY5ehdMhoG@luv?ZYf7)xA!r66$zPg(j0hsgK#% zWWAkgr-;M%iw`K`6k)J*NV(R4LkA>mr75c0{jX;YyrB@~x;`d^6s#Kt2tz10r zR#Cb}{_qck=DJLX@v#+uvyiJMHSE?uZR_zd9)2BLZqrenlW|pLj&|BAt|ML4rY7Vl z7Gr9(Wpa;v?;FH!d?Cux(%PHua6p$~XO0QKs$#uFVeIzGKd;ZY|&nye!``d#q>lFCrEP{`nl zORZ)$ZxvUCHV`yY{#?+LQOG@-ux!aMwAVVb1;UxYofy)M&5fK|G>f#xEFFkPbH;GJ zmrD53Tdl%-X=%HzP{%|fdCSN#z_8LBE)rPPv`?}_&lY}Kx2uw+t0!$)W zO3AV}ya?aoZ~hutS~!)%9ea?0>*i;`PBOj3yEUBaJT$(Lqi)r92_LRAt8!mB-LWx3 zrfBX3WQv~30`mN02f54p=T2~!zb(C`|L_ZZ-n4a{ho2W}6#435vO>AYoL<+6OO=W! z_r|{?5p#&lJ#g$zD?;_sXa0`S>~*edPmU&*k}0w@ogrxOdqOcZ*?PUu`mwnXt+tze~AI|}ql%i#?N-5L~H{%{t05lDy*LL&OcC;j!4x{>#t*DgC)L^K;o<6#?ahSzLUxd3;dQJu?2s20d zf|2Vy*u4Pn)lsUcY*Js7Hnp;{%*S`LvT!Pqhb|wK;o8-&Phk{*1mLmyg(*vT+_+Os zrC~$ECW#pU8YelrvN%NMmg*O;aL*k8p43YcVFG8`7O!}lHCvN*)zBo_d74OJ9&_RsiAc~-=A z`1u(}4{VZnM#hMRGbNrm?c`4<7N_r>e8V+eG;!Q;)}sc3E{62mu;0*f+TLF?sM0WBA;+Vq2T@lR>Lsc-k?a zo@OH;mjgTyRrxsQ@vo;aQalm4>cc-i=g99O6HWbAI^NdDDVI8@fF8uwa4LmnoZ{vuZW!fQXBR)GS!7JQ<}P$5zm}zx&oN!h1b5vHb!vWDUMSVgIgG*ndo) zF!-37ao+8W7R$BSI5%O-+k(Txd>H~~U%sfheS0t<7@m>ov~{uGn2F4nT=R85i4-x< zM|a>ocp~WN&%mN^g>Pr`?Hxe_9NQhg*iaYj-q5|H>z%HbkzD(wKJCDd2fiw3bRHQ9 zc9@3#MR41|rGni9XZBs)b)Dc4+|$3_^i0+00lWh~bX$%b55BLA~z<>4s zwExke8wM}#xOeln`ajio2LQ`o?_cVV4E+v-iQ?kM_>@dV1x(+j`y-yxH^8;O?F$dhY7^z~&o!lAE{m z=m&q)bFgQi`?aBaJ74d9w&Pzmf3CYK_)*6VaOrO#``(v3lK|@6y##E(Ico%F7non5 z762ZugJh_&%|tWH0SN{;Lklbom~>omz&dCmzhAOV(~?pQ8emTp5&* zvh-0a3>Za;XV=P*8*gp>|Z=Vuo9gE?O@eIAQb%JRZ<#Xek1W zfgNhW!RRL;6CVHoKwZ_Er8=T}1t73104w#Bl^byf&uCv2Vf7RH*jwauxAUx zn4>5H09jl08yZ6`#7?Wu1S)d@y#ZJ!Dw_eFg{=MDP;m978;Jf=x+9&NqIUrCo;C}& zwjkC(KS=z*zXHYq)VE(kX_Y9}YRJg_7&w^%NSw2A02J*);0A#vGO$C^&Kj}pR9@`E z?;Ch&fO&vJ1@_7hxCBL84nD>Gei{%r3Q)m|djT{7{1=o~jV%|prNB8(8*vTB2Fp(!u>)0|EyMjferYMd4z0KzpV$ zBY$j3DaW=8fOD#46zdE~9N<#IiO+GrHB-O@V1&STQdk74kNAPA9%(_ify2lFdY2i4 z4p96zU>(2~HO!)kR|l?WzgY|CBcVV_GYfbj{t{}pWky;cU8oTS%43`{Z&@Yqe-uq; z%xr5RZzzVcg@Me*0O~{6h|dEwUzqCR-WzBgHBfqt+w0M8ii8W4qz zB_JF@X^Nudz;e(~{sgCk1!yN=cYp{1h6I$b3uFKVJG=2ru4~i~0rnAi8d~8UFupv{ zQh{{OAKFs%{BgG!_E9v@LiuxcU?~Q5*I;2#{iGOPO|AFd_K!0dBBW$c zj2ynJfK})6WP96I2;d}`7kmrWq#b}vfK!2$>%4;dZ41T>_#cHLSpeq;;7sSPb#jV{ znnAE<6x7Q4ml^=+wq{eC?dxp+xJFCnKwE+Qrtm%ByuE?^CeCJ~q$EW-0yhjpV!%|H zIq3)6zXe_%AXdsZkE)J93d8JbM16&}6fkWg$QS^0qDX6SSS(S!?cLuNgToC*A9yez znZU~rND^Rby`Nr@Qotd&7J!+;rU7U&awo*yZJTWXY>&eCDTo`Umo7!%syAH6{T5zn zAnCCx@Zwk*Fe89NHU{tAxkPuVmS$4pK=E-vzZH;A0v(=c&mwdkFm>R5X%S7pjG-T{ zRBiKHt*(J^gC)l>gX;l_Mw9~|u=U*L796p)%3ae?Jqqx5V5Ctg38=!&aqhLWg(Z{@ zzybr(pYkCf_DG@Vf;ZY?>{1RGFiZyPu2Z9j&6C}@xh=*1lg8Exs2K|!HM)gaZS;R= zMM^6NKq&!L&4D6h8W>T7sH<%>TRb3QKWkjVJOd>R;4rnvn>ZT)y9DGoP@}+iVr!)q zjGC$5DXwd*@`4=$N`Yt;H=M)Q`xiI9vLeO6Q?xl{O#qNviyhyQ?Yn$O=S2coJbWa2 zM-56q+@K#zbhzF1v)jLA0QCc+m}beuu`N>$5oGqZNFeZAa8h7~FnQ1(hN_Ac1Q*?U z?zgb?Fc}~)fuW$Z3V_&oJ-I$&^;cDy#Tm7 zwit@4@4tonv6609*cx!O!Q_MX0`wA&LhnFZ3OfaSE{g;$m=P!g76=f$U*$eniIgp% z-3#spJ!xQv#iu#4p7u}Kr55PCUN2G2=`?n0J3V<~=v)Gy_ zNK*u`cc$l(zqG~JYO!*uX#`*q>5oZB$8I5^>ay3Ns&(#;8UIyPj%fxHH@rN$lvgSxZ5%t5vR z9uI)!0i`$NNQMKkI>qk1miuw*)P?Pko>S;71%Tx>GdpV>Zg|fU-8Hg6;p1qAMM>=| zXfr&yo!nP7C_{+>GzxS?!JmT@CCnqUqrIX~)PvgM7HfqaXBljrS-Wt@2JTNAFuz7r zW}}BMWYS|qtX?;>ojbo^p;L%GMe#$m@!nvfqMQ@kTL5snZ{lPDNVx&_05%o840Kku ze~s%Jj0TMsfeg;iU^&3a%a7yEcGJoqwg5D4bpbC8AU*6*7Jo&w{et#yF&Z%}I3=pt zIhFu~1!fs`d29QW3(75M6fFe@4aFu2u2GQX?0mZQW2{FU6!3)7OT@6z1+?4I2 zgVsdXZ!mh|rq zdPaC27tR~AZ#_qhwE6NA4RFz2er7N*h1bN80{)FtCRj1EIR4;nkVB^F*}*CD>Y2gK z6YDo2Cx3hWM0599K~yCKAR5OQ%1DHH0h0lAyp9yvI_(4$wd+cof?Hp>ML>oRg?i7t zJ+P7pibFOa_gF0$dP>UNU+@(93Ee{2^kq(oNVXU?hl@hu!JrQr#`NRB+CvW?+1AYq8fKvx#uKD@5O20_3-bEI zA@=`BroHV9&))_B2N2w8=@qkeDr}KfkUI_r$H>fi!BLPIuiIc`d`L=eUN~ zgPpSOje;nRXBgoww?7_+n~ZbcBc!TGiK;UNkKR^YNW~R2M|hOneJD6O#FLQ|wjHa5 z1W-lga=2S}S{|o`**JGAuv|)(^-AZBeor-0v$yh%N6Gan^u?2*(${xTRgI)~G=HlK zDh1nVsW{GoAFrvrDn=|}^XiH|YmcPQoe4O zo)*s_Kue4T1BHcIaCn)~1qbZ&VngzoZpIhi-+>1(oVcs2&1*jWx zf_&Bl_Z&||iwMCzXV3JI-<%g7Zg!aI_}U&nv^p~BvQm_ZsZiBg4`MrGOs(qi<^jVZ9eSg^pn=myoG`lAf`YXHw*hR}chzEsZ(l$xt)=r8c|0 zF%#4ZwwoVMtj0I0(@|G8XO*ZF$y&fTM*{+55q+GQPX@M44!lZ>o>mCKo~u_B*xT2`8y z&r7mYQOC#+0(c#sh%n!NtW}3(TT^%$b-PO*PvN6D4%}=(s4~wgYa!!WlgK++Z*BqrQqN&Uq(jG1!c4_g8ttghwt1}LD zM4c!{xNUKJ3TnZV5$1a2^|$!PYbj1k3#;!WbtH`d&FZ6zTCuF*oX@oS*)5VY3fZZ9 z0IwZkUO09tCCNLHAWEIe%e82MHOWdEZwd59vr_J*=3{s%o{Sv+u3>)Y-X=laYx{ ziEO2cATziA7K;e%trd|wU;g*KP1L6_3bu4^7~D1>>vwl8_bqn3-17-RC(TO#-L7l= zkJk`{;h3OJ#){6y=%UVIAX1plf$CX#KNO;PHxz;=BPT`>r4!zI(e~!|@5UcM^sTxY zI?KufjVfa``4*LNojX;Pk=d()6K60&F(W@^8|O76%Dd0Fm^}N9{V3d333>#>!ug`7 zv8Wc6JVIMFZHkZ=<`F(y`;-VC`Ect!wl&QQL9bvWH}5Uvf&8l&$|Z$LC6~7THhH>= zKoVbuqD!Vrnge^XSYM=xDL&4MMnVWxX1nq+1no=Q~7FBZEIa@5Y z=tX(REARu}QzG#9o0?y{II>Sb-hO{@H#DiVs!48d+TdlSb7tXOwBd}oP%QUKXcGT1 zx%0+bOwC8H4E__U|E@PT`-XUr>0GP;w*prO550RXzIFBbbJ2Wu_>!9ix`Qc#kIkq@pYS!lg)+wWcN?bOP}VjD7Y?o*91`Y7V2c6?1i}R;Ff@}hLPNPdvNr~ z=Y!p6OQf<>IE-**T&FoXcGo9C`~Q$)A5mU^+OzrX*W+x?(*!7p`G(UdNc$`*y)o#U zq7GL2w{dHP6WW4fIW6&x0@e547~DH~8Yu|0Z@B67-wqDx4+S?(;xdXWDn1LxK+kE1~*xR?5S`f+&rv5AY&h7bV$3J!bm0B3_t`E3wM;+ZZH960U ztXPO6G?@(L`IaAGx97s#w1U~cQK@=d-(U>RY;kF|(NBLIaHAB#ac1a7OtS99_lf%9K z+Uck1wmsREs}uYT@EO3vN6E;*s|WW+9gbv%8d%&Nj|4#}zHSqwKm~6;&7U|zaAmT1 z7i2 zF@2p$^2qI2nCrG6PYOnbgQs~VEX>>XBv-x~{#XRpTCQm@MWzs~gx3rjM%Vv1 zv3wF=y?zsN;^2Rp$P=GD?TXy`DXd7oIp<70*vsV7Q%?%~W=+BU)3`W4^qHW2OJu{~ zSp(_rvHlzTp6!(OyeWv#1D65Ec>D4Om|5-uB&%dBc}ACV%(=}D*Q|{cv7PN^MIzan zYbmc8xl`1?n)oo@eD<4kBY*tL)m>8Lm@dWHg@jxumx&f;l38N^C18TudvJE;%g8ai z?b7Dw?!ldE`#-Gqz|-#bA|N;4iQ^4V*3x{MsIsH^#+_WM%M$w8)Pe^BZLLd))J!>9 zaoN0SJGt{wI9T?7HaIlI6OkuJaB)Qv#rEd4pT+)%gUS0>4<@?uywvHoTUzUt( zoIH5TMc{7>T2SHqaay#KJ0r0*lTd~n+%)T|NuyC6SnxlLPx{Okf`dam89A&PYn7w0 z3D#XqQ^a>a27pX+*y8a_ESd^q#94Ih6(+mrp{ zFRe4#&0`PlMq!69ekEw#`2pMQ6+o`{w~U_Kla*HFCFG2HXWes2F|H!PiJhpwcB;Cs zZA1<~`SX>H-1nuRg}n6@SUl{Nhzen2Lfja{n{?-(HL6-2juXj4!66iHTCd6fp8+VZ z7yyu_!k-DhHk_yk_ac&ncr$Bfsiwp1Jq*Xxx=l#r`OL-S!57UV~>>p3m(%tsf%sxuDX7EY3NRAPTM4Su(SfpRLQgv<}KJ;jC%f$Lk$Svs$ zC;lEXA7=2#S!1^sF%ElMl{CP{jSvE8F5$t|!RCP;62U?-Rq+X8eJnUQP792^s|i-^ z7)vhwgKP(R;<3}Z&ZZuRG32j|*7AXo5-NnJp1JwWnt~7OVGO@=Jm}bRD=Om+e6U;H z|HaPv-raqF5Zp?OUA>=TiI-8@@w(ntYMqhMyJki8N<5R$S0?=cGI3Rj@xb@MQ}KXcXvWcU*Ov*cxJ2S4&%*g=&gHPaB!x#k&r zx?!vpSh~u`$xGj*IjlSxIl1q$OPiNGO)ow!S1KA{{PCDis|GuWxqY^H?0fhUo(x|y z(7G7z6_9<;1b6R{EDKg$7|uvqkx|zx%DlC-pm*iD&ARpsu9s^?xED@w;)QC>>S$JhmbsT?PJp2xvWA{U7i zrySQ+Ynzc1_x)n^;P%7dp%K2OwYBhtAFiW??Ls;C|0sCbq#0388b85l3lYLJV$(`w zzj)}5H%dg$!->6q3v%+ik<*p5p@*K`ja8e6ATpvn2&o|0fEX;ogs`&~61g}uMxOq0 zaLYIiGry|^dE@N=Y?rmUgOd8nOJ-( z!^GNVEj{IqS<2twn6=ZsOso5H$H<~BuQxHaq}~LifMZc3ryC7wrScx5Zs`}_*Zle~ zajDv2Ti%SHb55vQw(LkTHD%d3iz*q52CB1TX?b2_F=q>2a$+hpN@TAfJNR9aQqSJzRj(k|7B53940GQiwaN7X zrBs&_H&Pl?h2eJefmdNA){4lJrALt(J}KSVEWS#uW?*@E_28*9&L&liOS_;{7nMGJ zfT6}_^xZD%e441XMSVT$$*PB=F8wkW}M2LjC-F? z{hkKScrxlFKfAemYn)aure?SAH8|)3%Nti;i??vFsFbhas?U4eT2I_r_@UR}Z5-WT zrFL(;&8n;_ZU9U3P;?Ffww z^JUFrFQ0*v;Qd`83q4Na#NIwm+D&!KG+QcF4e}6UKJV{;)z;S8k^5P z!6KmP=?GcLTV0`nDMW!=M;%-Okq3ito{nb2nnmh3(80LksE2Ddtx+UGswJ|I;8lU9oS7f-|5%14g=1$z!p#?=UIT|58!7itg9 z%M)0%+zGG&c)L(kFQ|)EXFy!mW?H+#ZUqeN8uoEsJ8Z@0w&6by{DB?_t;^%EOPrCk zIQ7$WMcG_ksCVZ@4QZ>(GZaFRM0AQjOtrQdsz5%10@Ks39c2C|;Szc8(gVZ962JWp z&OUtZzhNKj%d|W+XZ-3e-MoX*&3ddAn@%ROX6auUC9lAU4)J8<*p8p?Beq`eR8zAx zgutp}nbtVwLXkSZ(^5t*tie4iQV6Xj5!X-s4VZMEjGVY-avufhY;V5!1`SVGmuX#d zF3ji@8j>loFkp1JwDnA-f%>!b$oSO%;ONJb5vKDn2Jc$;j^;UkMhpjoH@4c3f3Z}b z6<6eJOv(sl9y@vYzk~aScu&cl&X1e}Rwnm&)A=VF|MD)QwE1S|p-cCB7N_$IP#J|Ek* zj`<`opAz!=0K2KVb9)Hr9NRLj&&_E{RoBp~#dWh(R`*tmjuKen=_HO!ViI{W61n!} zz2u2+__sDolOf8CwY(kua9V7U=~yL`F8VzcwcP0~%ej6Eqj({{j6~iPoK2n`0NCg0 zQE0>V-K%47lxA#Vu`uD+2WEvyeWZ1e8zsT>L!-ld8QGKh2)rnNKur4h`5_eDy~ez} z4NIUM)sy&3K4HNd@J9U-HMayt$;IQL(ZPi^B2Mj}ed`DCzm&CiVE+qTo%;q9nb zRpCgmrnAsgPKg<;=5xuivRGWm1@f)6JW3XKVMO>c zBKZ90_cfo`6@nu=y`fXl|BrnS3(`Hm929mB4;-S$J6mg%&R!j*aylXl%%zp6RU43$ z;wgIQ9VMIhW0cm4$l>7Yh%8coR(^j7E6=&S2Sc>jx(p}WTE!weW7Bvfa<2=1c&?l4 z&%+S$WFQ~2>^oBZhdy$%`_i%I@6N;gZ`;3WxT3za-&b+!t#OAh87U(cOW)_n9=y+5 z5jp(MU-3TetOOtj_k;j}v@Y*mRi$XE7BPw3GHErfb9osOc?&%~cresOF4~JtkuQGZ z_RG#C4|Hd@G;iNamD{>Zt3h*?rIht*7g$h`G;+m2GM9^Ruk~*S@O?ZPqK#i}9rU`% z(wm1Sn#yyanJ_PBu709tUYM%aF$KD6D4ht{#F!kg=xWLb_T^%lpt9 zhdPzA8RSi8Di%w|7uA$!5?pV&v(Ot~1_W8h*{7taJaraEev*Sv-@9Q@J@CQKe-PZ; z|5)E|d$)B{{=JXDcG;KD!yn`JjYU(*7-2mMk2)=%Td2n+++jl{3vC%(D#@@yLZei zzXzYpy`qckkK(3exZYR5? z{)frli$mv)WTlEsg|#SwlA86zi?d=*6Bp3k5Kl&wI^+sHF1vhd^OAoK4GGAvE(x8v zUb&&@tGv!mgICbacw%51jlI+io<(M zPM&9kk)b8xj~81zjDA_RsyTScdA62Aaz@(kwlX3TR)r?WJ<1SbPHROdT`k;49{h4~ z{K)jm2%e?F6q}c&c%@Qnit|no#j~@idGnmbVT>-yXn(kFt$j=)d*%DcXPn_(SI#}*B<7D;+eq?9SRDZa%71?0=f;ftkvo4X&0;3D`JbLhO` zd`w!NW%W8;)MHdOs!Gl)WUz$B-Ysg?c7DVX(qUhjSr)CTn0{U@O~aM$Lxz-6QIv9j zU#AI;ZeAlIbDwa*-*b0l^0W79LT!b8T8qyyF0=TYTx)15nUX0XW+IlPwrDfjW32<# zDA}%qQt)KJ@jgJO?DZ+wy3pI4wtiCIT29RB^ryA?gpgg#$un#XcoZ>;In!1Ddp$bj z$;h7GC{8`+@4*fEqVQ!Ci)EHXtVys?sX7%T@d$mwQ4}dt~e>p_BERk~f~}ZAHnK1mr?b zsDBDYMrm{$72g1sMJ_SYZQ)4tH)wx*Cr=}7zVYvSkQ9N0;vVu|Uue@5va#WMM4CE~ z1^`9^rAfgG=^SzR(93D0&0C&IgP?YMAT%-s5;0VRYO(xMG!ndxsQZMRccKo2kk-7e zl$^Xhx3BqNqc1NYAKn-2IrC`G%4Hoj4HtoaK#DbBH)jKkI9p_eNNweG!pU%Mzm7a!y@Mhg(NhEoXRC3dt&q_yvO9& zhyGw`-V+O<_`D{gv&cbQCW)39-D1O)A$=KlB2!e_mdKuj-*>=$sKo zlb+EsS#c^|U#RGf+C2HsB!0|)j1A-(V{v$QAj}zQMImITryIGJtKgaoRG>b5895oyUebJ| z0`=J;Ue@E2xx!~Nx;aBK;7lf@HiswXm5{{!p?#azJO$gdW?yspew-fZ-l1FFJM4y} z-UeM>WWBDx=d&S&joa_sKo%#lxchMNyx358h+H{FA9(|J7~L%69GfS15y zdK5mAw#SsG4lAniuUDT&Rhqj;&jp^~iyr_b#vL7@zU@P+9$daEwA5tZyELSE=M$G= zzdLkw$a3a2qesVJYtO=}fOYo(59-G50U$N&2RbPZI1jnwQN)MXYeS=B>op+5v8Ad1 zBjikW9o@2G&;d+=5vNgi3U)%_G9Y8go%a<+$yHZj6Z+nDA!Hn_)5hw8(`2KNTzb|8 zJIKY?pVp$2>qB?Fdy=tSCP?T83@LAt0am#To>%5ZcwT`4N6l9t<`9Gf01WjGX@;CJ zO;rTG=k=sy61~Kz|J)P#+1|#`@X?2R2w*Nh2TYxR=ve z=}zb@{DUhxTZ{)(Vj;4oBW^L&~I0Ja1cBs_-B^oIBN@!pb7&?F*kw1td6o7=N zU1|rg&w`UNj12owXcR>S)@wl`M0;eHFBoHbE!U`BrWXOTi zfM&>@_;>uJt6qfn;+coxEMK=7&5}dVpcy(Hy68v~lQ&;N{Raj-YNo2bjXx%7qI z2by1cDP(B{F)7y;=Sh&dm6D1mWh_=xj>NoQ4`(Tz`I*n+%Xl*6p@Uy<_gA*VKk;sd z!i6&S0-2{)J=YDmo+IUhmn><>m)r(2Xqzp&1tr1|<6lXr{wQ{;FkxF4qh{u8*~o7Z*Z?bH@JDIy!pR3zqI*VoA2LDHZN^XZMJTfZQi}P zZ{YQT7Y4pQ@XrGu8~BHT*uczyXkhz5=ceCndahN0;HFIrn=ap^K?Q>G{(CP50V*6}@|U`+MH(`B~4`d+zJ`XiuXj+GFYw z_w4BD>i&KAkGdc4zNh=9?uG8lyEWbK=^pQTyX)6o&vZT9^_i~gyJow*U6*tnSn3+? z{GZO3JD=)&u=BRgt2)!D_^RmK)48$ZjgA*Op6vL1$1NT8j%bImgYDSX(INPq;5or# zf_rEsSQNB9G4$xrT|+lk{BaXkV<{ymPTRnE88;bbYl=cFw)4dnvt`yA*Lp+&X9;Di zvyqvsbjy7$2FvV{p)64rDh<>GGSq~{$QF($H*1(%be1D=V?5{8Swym_A+EW>87U@< zCYQ_xKDttRW14%cRTVwfg@y&i^5#>C#3qjRIjhMwBBEr(z1UDzEpmfJ)Td5+yb|#QN6MTjdFm1IoXSuu38Q7PB{F(JYmhT@wU~mb zFDha6K@9BA_i-%anb|~1CCW+-c}u;niuod2I9At8F|Sx^Fvfz$ElF6C&SGk~Me(W1 z6b!~Vn*&dFAyZGai4*wrJ`o#LI7$wOA09;6CKLDETV|?asB8n3 zkY*ONxt(17Jdk(Kr5$FOFltsXa!t06BgM|Rs$P$1wlVECCl@m{7c-jVx^V`43|sQl z=7sVZLvl7h#&XZ?)}=z85vDw9iNRJ&MN)&`YzxGw$6&UKqzvOzCd!$qZ?!ZxV++hn z8$#ioa}f}NFn{YuyDw9Mzs_j7dF zpeU=)vw9n7kY9IuR;Ex)U~G(rB%kV}rBp z@iz!X3PwAR3JS(XL7|IHzRGo^Z}>{=Tv=9}v1%nCw(ftl{X92cV@tZZtj}U`=Bmt8 zC--6cl*Xl2<*aUrj?tA9+pgi7>vUBh+A}_F)+CqZnE23dxaZ2$5~wM4`O382TL-;l zeB)i5Kpo$co?`7B$s%sZ%MD$gfJZ|0s$ob?)Op0zsXVuh4H z6`Q)U#gCt1oJoaWZ)B<#zj)p{RB5$NH}awcTky^#0-~kDjA16yb1o-XoX=@Qjf71J zJ(NqNki4|31vHD(VZOGcBk=|pi_A=%uIW6!k4GhMP; z5|sjzk!cNTStUNn8K(4{g1RpA^O1#xH0Y*fV+XnB#W}st;?t-VS*@a4jtJhz{aKVr z^Rb@jT%Cz9a)mSBv5jkmfL)}5|Kgsf zwJDXzCAX{8N|h>N&u!x>=B5*+*?>m6kSNM>22naW(Ei%EQz>PNOxfs&Y4QfQWb&`v zpN-2>S;<_{k*h1TOBNH;Q|G#mRzV9RO3%8>hKfzp}uC;tap0s z`t;5gZsN~kX56CWmIZ1Cl>XyqVAu!pSwIlHa%SjmN?^1lti5}t{bO=jYONG@lN8C?WhB!!_nel^ zNW>Y>Tsoi8L`Da==GMi6QfPOl{0yVc8B>#Yk9WRTph{aj7P%vpn4a-uCH^Xt;^^$t zrdl$}mJ(L5$BXSES7iGaxOX?zJPi?Rosp@N)oiYqn))dBe8yd1+4)K-J6(2Lgj)IL zaqhX^Xmc^TYQ-lsyQ9;3*{1Ju&-qTd&D_SG*7%kHqm9hYsJw-E(Pz$g{DgZ?WyKLq zVg)IM0g=a=+sSpK%ta-Pih-)aJHD`x>3^1cu9ya;)ZDby<}(*PI-_Fvx%P8bVPqF) z79Cc3-DPm3M>%rzwA32#Fv;3t#V1BN4~;)Ra>iKaxgDysROt{;dvdab*`1m1;&%JA zB&lT>v!Pr`83MwpUA(=Q8)Avg>=8;+28}FhOvuuszu^9;M41(d{nIg(Ri*G}Q{u5| zyE$986qAh0;;uPWC3a|`)qE+<&iPehf5kRat`%pkM)_D<{e(Klf~a27YP>qO==8>i z&T9Q2Rf{epyytMN|PB2$iYXK`usb}XjN~uG!;r`YKqzde`F(9qD z9kb4QHpLG7C)Yez@~IhXSrn1h(vN%%71U#x}RIP{&S-Br%X0!|9fZKr7(i~$@Go$x&&r>>& zl1-Ew#j465W3=(E_q3lYD=x-19c?VAOL1RX-nWH&o^*kLOSPb@&neUzLpdpE6`)*F zrQ$NNQxuiRO&%RU%8QXHu7W`-#yYE_gwN&AIo0MwG&{&`TD<5+oZZZoc1pSH(ZHg1 zUK=;qgk@=Ryu=NgBVx$7^3t-ulnpEvB%6NNe(ccHb@IifxKTQtHz_0&d%4#%E|?Uo zOSq`Z8Bs^6rkLO=V5Ia)z}M4Cdt=c&o1fN6M}EQeqpSLzqFG5?n$21pn*8Q=b8RjX zM=4ZPGVy5)tV}#6<+|5qt9GWsh)Obp%vBPnm&REVfCV^K)8dVA^0;6jEa@ zt`|{MmJwriHPNN?434yl(e~Gh%nC2#@g_C1bCPL=E7f^7_X9SiSBXvPqGvG{k7wi3 zG48~lVnya6Yn#znX5)s6(y8d>wz3ox&n>VrCYQ7(gf($qJj`uE$%ZdlVbs&nv^!Bt zm(tOR1ZN48)tYKX#DFxmh00C;)30Wm2OuV#j*Z4c!J+c<7?-V;s2HNEXfrSg?Pp)kq8?z znm~@(C2ajL8=1|NSdG-QIJ^+Z9Q zjFe^;Wcf{;I%e%|O{!A&V*8cKyp7Dz$6CFlXJSsZ*l#Im_sqs-l#GMf`FoCG%D!Rq zg9DSux4x?HJv|@aVDEaH?0I78f*tmwXTkS*P75<<5KHG0u5@kIAX>1Ar&DClH{nxx z;p?H1!L=e%%ACF8LVe(0Xu`GgC=%J)cw?StsqJ+-0~k>D)F=tBS<3;{jwJZL9@}RO>&ZjE+CVZ;vw;(4kIQ)P4RBzjJ=BhuDGIxRI6c}^x zC(}Id6bPc+V(OV1C*S{8s0F@zcN3)hym~Pae*3hZ@Y}u}IWT{S3FtE1J=CCwExpUB7YaoRlwos8!lSGsKwC{<^j+_iBh~Jpvd1v zQFn*ONb)&+(OL<}G;TYm`M`6bLxOE~8g^|Bh-Kd3^yg<8QBGfAXJg6Lki+QUS`j%G zdA7}G^wNt+HANN^rNrm*fYZ~93l6p{wL5DKT_q2cRO?e7{VhI)FC&LvE9`yvckrU_ zuq?Y*Uqo#!+A>Co$ziKm*0duVXM}P$gx{ag7w62-QK+Yc?8|t8PuT-gW{eS zy9WfJz6bh0&?y}7P(M7)P%1!eE64!iiO7?CkaRx$ zw1293=POi=e9NI#|M^<$xnfv9`1{it*58Lx6aY%u$+!WF`J-lQwH8@4vD$2XCe3~A z_^VJLo`@X&@N*Y7ORpl>JB)gS)9I)oP)SB(3n^)9vi1$GeM*kK_|L5*_pMFUZ)pCg zeVOuqaY>j;jU$2d_NvSM&Adj3Ts3h6CshvkD}#3 zePD|M2x>4qG|ZP#z~?2+hX%tlh#lyc{rIX>%Zu-4b@7HcWh~p31yMeoPjRD}eht&H zRz{wPjpC!uN$zMq^%^|zZQUtv7$|p7_WZ6>BPb85`$^xUGCIAkpb2GW-A!gs{S&L%*L(@$frIL{t@XJ4DaCdYlEwW3EsHe zx4-*GT^Dv}H@I%y^RtW2Djq#=B~uUNmB@)OgGUsE1THsNatsuqB_U6Yg{R1`w}b~L z)^E|grSEm*#gVb_$T;|LKvRnH2jIU(7#ZBfDb`F*bVNqUvt!}$iFM@-da_!{jJs(f zJPc}pY2+n>m7k?CSTIY2>>gyo$Who9o*++8goi*4uwD}|_vqUBaPON8pAN%z>ty(@ z5uRE=TUwn5r^3VQs!aR5z-$ZqrobT%hFVG|Ye(82*or}!4PtH3)@=*#omgK=BHujs z?;MzJr8xt@BeV~^JY{R^;kCo>*2CtB$Ui=eJeMtD>sjMR_pO||K>UK59|&YO{2;|e zx}%QrKNv*Rx=j$v4myPEHUYkC4w)D`!l%u|*oo2OTgH~v1mA%SnJ1@&Z~4tuaKLAT z9b0bSAh>-{-}g%Imi|XOv)vaBe2DTLT#W^3TBdYs+%_dPnJnsAlzf}b#aO*5&7B&* zcQ8CWxK>02|GcobIec#T5IreT@;J`YC1k1w3d3cE8NFu2eQugIp^uujjk&GrP6}e=kOk8jC`Jpb~g~|Nf9xO^^Fn_jE{RC20KTJ>-OTwyW)05@uNiscVUTmSFfdo`58FXDU|r1C zMBbubq!uR1HBFYgRQ%~ccx0F_BavIW_ma$jbHV_<6jn`DLZb9Ln1HD0&Ch0Y z+1AKR?2?LQvQs0-Yg++?1pY+;irYAo2lry2V7e$jB4@h9O1n8HF8Po{Cyx}2$|#9l z3^UAo3^luNUyCG^Y!hETLf+%~+=bv`2*1AT8u2paHN2!{2N&Fm#TjO9ZZ@l5)J#XM zId1+xeI90yCnL%~+=^ibg=rHMrWdU2tk-Vn`71K>{oM!pukZUlt%Jr@KO>)F!UH2_ zf31oTLuoqBNK%r8G7v=6#5~J{hllwxa$?VCkk63FjWy3@=~r8qLEhI^v*<#}pJPp` zXd#^xSy>iPoo$HZ*A78HcrqgRbO30nL*dJ47xSxKEcj>T(_*WAT0bvy#&tLvwl2%F z63i-Jh9fMfECyNZ%Ri7{Bg7U|TAf#YN^g_t7JPQ+g50(sNpfrc_ZMKztQ8?8an~x& zWwJSQVb~%Vne&*Us8Ogdx;&|5$!kM8ExofJe;JX{sGKrYeYw^}2 z<#px3XRrF3a!ZKPdml)ig^W_WsqH6n`#|vW@ier zir6hGnC1dbt;{LowDU$gw38pMx|LtxkC*S182^886>Wub+$)u&pg4p6oHMI4tzpQ9&o}=WR z0Q%v{Na@e{7U%0!v+FY2k7b#1O>t@#ajE=zkGF`_y5j6W$Z+oz{RL>>(98|FXeh$SBl;`lha;cbo{)Yk~_!<#2*l_C@!Kv9i4 zs2foCho+9^3*0m+7Q(~h>$V^#e|*#bC*I?eM1Cf+1RGXK(|+p*w{ukiX8Yu&*`3U|U?b2{1fAx|r<#-Kgz!m@4Gzl5JOn zH%%dKjS@Ymg+mL#pePbbO@KJkk|FQCG7QeqQ%>INwgiSRKG}TYSFXB%^j?X37OfHn zMo8RUP=KqE&ViH;<<~rE+8>26ttV{?o|l8nqse8!aZs(=Mc2#&_*yqwC z=4UPGRN11oSn`vRW_V(^R49|Kp~>SlBTsf-wy(`L>bp98Xn3tfTQPP&yZT+mt_fp@ z>(Bik2p^hMqrwl0NTJ#wQqN;z6s$m56M(YzTpQjyzOImBvi{Dc?6y4@tlXzSph@c} z){!V(r}fvsrH9fi(=96u!m{h=^sd_kZfs}!N_z42r@fMr>*=M+RX4iWm_Mnmreyg- z9R$$S#D{NyMdZnvg5?m{L`643^ZY0hhvk7#0)PgzXp@>&Elkzuucye@ZVaPP$GT0x z^M{O6VRP%{r_sE_9}M3$LCZnUf8UFUBaE6?bC{DeT@S3&uhvu+M^g){8kGtiSlvp&^d0GEW zea{K5?D=E2g1Xa^sBCgec=HGtN)=9#Fd@>`6(yM++V#Mb*adIC1xE&+jN41^_=$R; z`Q|Oy>ettAQur8tx}Hu`j_w`JAAF2Dn&ihpz0|%WC6k`T2BY=3(&A!L5dlYcbQ!x3 z?=j_pe)lEmIK3nVjsp?X-brOBFCk*hDa7A}POBy^=Dz0u!AtREg*xjV?^iRzC*$@&&Txkh_J3?ON`mp5GkFWsNRCx z!nNVaGh|ZsRPq~sD{{;C5*Iah9Ss9@WS6UA(@Z|MFz0i5)6=dfwLTN%GoOUk^JHM{ z$E}CE;(Zb~>-AU6KK^1MSS&aYeG)_@%}-+zyE^XaUn0ZLnlIVuJgS23or^>AxXP5W z=4M28MW7-w`utWUE*kgXMSgY{4i$V^^VnPl8|nl96sFWrM}c2#@5(&=Y3tT*Y$Oul zsapxJ9W`T30rA}xMwIfO!eB*aQS?Wx1lSez!Ln%--HW4so+V4)33SlwNnvRo`M&`V z(<>GYbwa@mg|b;X#OF}#4~73w)X^=W$}>rRa4#Hw>o>vQxvssmFZt|gm-cO+g+=3O zAE%iUX9(qrHA(8cW-TRc19rssg}vBYW2o*26fp`{p+FNbvefuu-)pVguih6P0%_Jd zO~{k^N5C)s%4M0;7&rkUmAfxq84*}XT4D}`JyDE{#kPnFJ3yL{6FTldWIGnDEy^YsF0LmVkrk?=2Zv{2+a=j%eDJQ&#=0uN)`) zo3Ked84*+-Y-1{~Z&JUC?KmZS;_kkYy3!|NJbt%c8r2A^fjBw*4ZOm?ei!}lWI$yg z>e1r5yXa}^MKB+yWKWzQQ9tX`6~$W5q9m88W*lymox`W>mMcW!QYi~k z;y9aLWb*S8cR@_v{}}EQ{Ko(u8cfZ19t&$%ycahL`kwFq?4VF^V{hlcLO0uqc=ztU zGJ;yxwM%)!KfXk}Gi@ z9MQbU97V2q#^z8OYWawQ7+%6=$9qgpUa|cg^29rl@#bSM(JrnrA3p<{*bbYkHQA`d zTZqmj^Z8lWW-R@EL)EoU399&9)I9U+G@4>Lz7sFN{WzIaR*GWPtfg92&CQpl5xf5e z28#a}Wtd_YHsAOLz2{kuQ?4rR=cRe6-Od*5s?2Q0pPZkEX8-|>p6`UmhTkO`d0`J? zpRWWbnu+hwk1!tJhJF$)FHFIuGK$2rrMxyp;;+ZgLT8;y+*bc{)%*C=wzF17ufs;rT8Lm&ow{iAfDvD?<;(HFGz#d zkBQ(P--83`A0j)Nx)DMnm+pg|Zo$>mL}g(WtjC3TY0gB|G^S)lY&E!L z2sk$M)O#Png=tr0WQZps$4>leFR{Ha+(kK$rkYRgiolvfCE-wMkATm(Xf3i5iPo=T z9Md8ly}E+A>kTaPcZm*P%z{4V*3@Kk%bV0(n2w(hec;r|Zvcuxq*HnV5$%E*#jLO^ zjFTJw0Da(zK>RA*-vpCfTrfQC7MonAoKzQCkQvONTWkHw|400aCn9&=4Z!K^d%`=L zU;87~B8Sy7rxL|vdRCWl>-2Itr-A4H35J?4BZr@fAD{)*rkWr56P-cJ@pCW&oS{p* zvQ~IJ3NxuWXFfSEO|&|~?OmiewVsKJ*Nz!~V zjXDD5q$TUqddY|1fB$vN0 z0`{Da2=3eKHX$dEeERR+w*}vd96?OpxDt~G{y1$#-DyN>8>kWs=F&JQqun)fc~4~O zEb*y6u=Sggla0BFw#P@(6B&kEjaJTuOAQ5{QDg-LZ4sb{SBdtxcWgZ=s1L56YF_o4 z`w9U$*cTa@1kmIE5%%SAa#Yp+>6z)C$z(E;OB5LX+&hNcB^Yk(f=A7i(yJ}r?zhMp+Jrg2gV0tjG6Q12pQSJPqe zu>hIX!3*Yb7SPwHrS>1X@(A=!A6T<(>|E=K6Fb7Zo;G&4IC1-69~ z?3qji)-Pp0y?o#dC!X)HplS5Fw_;Eae711Z>o5E6mb-9TpJIJ0ii?J?m9HG@D}Fw4 z!}y((?~oPAQWnC7=$<3UVB*~4Y}$gFsW!6p8J0EF5f~8*z)FF;jKu@usWgE-A8%3w z^hMZv8T$|EaBw+`!-02>fK7>;LMK*@*eDCkV$3Z7uHlty zZU5CxtXZ~!#*!wos;Cis&15sto=UJ}Kf&o+I0j9gO8OV0$2PJsUvkZknYQx0=Ou#51Qw zTZkK1rOXFgRNfi!m!nNb$Bdg5>Fo!Wvn!Vk((u;1>SE!BTdrTz|HpDLl6J_Ai)0&z zULV;zdGUm4{Km1i0`VeV9v;T9^3UlZNCdf!xw;iQlkAo?@QL)+!cu`hbSVT4(u89M z`4-{9z_#_m>zA_s6vx%-%h1f^Jqu4WTQOk8rx}}BW7BAwx|Ajubyplo;R=Lsn;OW47V2_Wf7dk_>uo2XYC7m9sy0J`1p?+O*x>Wh!OIEH~quspNR!{LSo^WrNv5<=a(P z|MQz!JSHKkc}h+3>6wlz5USJwG`sjh2pPy0L1q`;m2bKb#q5nQp%#5y7L_eozeG0v ztMOw)H^BNPG5(q1KP(*|fB$%W{JNnJjGMK_~@q55yfv5-&Q=S_}tR-6d#;;SkYA6F!7SYrnr3Sam8Bs zKjptz!pe`x`|?l8-zzW4qw=lti{;BF_Ko~yY0Ha|4(yz;+Kq=V1G`G~ZR6p^NiJK;p6V3_s#90&aC9f^{?vlABUtH3;+ptb} z@KXwT&tWajc$u)$oeQ{`uGXuGzPR8qVefGIE={T2tx`VEur~d)=uYU+&!!`kYSwFt z*!0F(ZNeeCPubhGD7;D|X6N)wG4D%g0vkm>-FC7?J~aKSMwiH*i*Rpx>=qA!FCN>9dhjhNqQC3O^+H_V30o>rCbWvqW#kZW%! zb*#r|s%Q1epu3f~z91FT?4#)ESR<%1q{|4uF1k0_0rHhVEHbLw@po;Na^C!1shEy# zneJA~S)H8=*y5V?+eGf&mW9bh>oaMejxHlY)z#wXbg$5G)16$_%Cx7`O=He1ddxZu zzOs=Crszf&V3O(?#;cO5rBRh>;u@DO(%M{(GK!9pXw5=VRV`)1ArosibyUXBN#*f- zHB77%ro16M6m(SHBa&eKOo@p$JH48DhOsu2T8~{6(8$LOw9aY>bWEDMy{z_(NQ`Dv zU8)?*!Hc)eSbT+R_lfz+V7a4eIh7r)MIXp%vhFWS-&d76nweHk&oV3*aHiI-5%VcG zZKNFacwT3nb~N0*!uI*Pw)f(sBB7dVnsbU;u6K^&1T%x2mESBrI+G+BJ)LxH9KfaLP za~PGG9A&PSJN0y^W^=JlsbYE{A}}^js#H-YtYuT$@OhDuK0)W`aAVerNIfNMQ@`>S zDL-lk0z1o69?sP92lcC@dg(Q3ty817r1jN6B9prGUg>j{7Eo!eo-g3Abey`b*6>%6 zpo?X^41l1M9xl+$$F!HfCglfeaKTr0^w~<;maynYW~F?WzoBZ@W~^b#;I-&gOCJ^6 zQ|IU!scyJs(iVeJO?|28X6MjmwNX0KaW%ERNItFYW!JRD@3lcDQ#Lu$ZBMn6&m}H; zugG5OXqqTfAe#!r93_o|zk0ivuPN8els@W-)|KsPCPbf`lky9EmGQ<3tgfzfcc`51 zTq%D5n*8i@7V>)zO@h-=g;2&*QfAxM8Gh=g(hoc{G0NU)w6!XKMrX*bliERJfe}zP zZPJ-yMlbBA3?kNqL!(2;qh^`qQw@8@;nklbIvhIG88b8j@uV$D#oKNZ01d?Ys*{~) zvE0j6cvsC~HWU^w73HewW|#(NADjmbfV90bAbziE$5T{?&d0+!bw%A-DNQ6*vf;qP z6Xo$6G&--HT`hVdJ5)1SID^F7#p0|^?bjzpMekgPiY`@|>0HXG%`}Q-xSwi%BFbgD zK^x^W2MjfrvX;+e&N(8=W!jCZvFoL#J=OqK*Is*{^m#s0rM$VgCU2UqRxPOs&|NN=xU(W%{G~aO`T-w`W3_a-mMW3*sd&T3qNUe4i z%l^W}|FQ7Bz1yOE3~zO@GnP&ymQ$ZE4ibB})V0!?l*Lk>3FOnc#8MH(!rl${I%Y>YotLFtMfb<*f}r!;E0Ulh>s@oGw0fa|o;#arC`#oR*0>>VHF zHK(AgsbsByUOn$Q>2sT{L`RLLX`{JVw^-7bZ#vG!|O|>i0jBCdyr2I-A&c*2@J2Ts?Ho}au zDdqd(K4vBsGDMg}&=lsDi1-=yx@UTtp^a+FXyq%Oa#DGVaP-DImC}h%xTv%s+VgZ!V{+Iu zoszp{PhBRh+jchCQdzA&8WwFvs**l`smR41&o`aPZnTHU6f?OZwOni>hdms#>P-}z z(R)kImTJp;q{4*i3C5)fr|~AlWQ-b@IAt965X_5X%7C$1tj!j<{P>L``{|;t!eu(8 zX4O@;sS-odt~~88$0@DPT+g{o)}&8;;RZ06fS2aq* z&0Sq;Mso!tbHN`@kGdACWl&U=|$*5w-xGo0N`(7g3_tNU^P4Gcp_!X#B1)(j4s$-U~g|~ z9VI#vG6K;_-3=SL;Q3;8RS7dk8Qiuu9gSC_>cAnXlvZ_xGU%RNl1XCwEI{+z2!}jjisCFsLHIt?Nw?Fv(DVIZ-|w(G^5&9H(4@s)}}A0^GHX3 zOT#wHU_+kGMw|9@E`6zpY~Zj|BT=I(@AUhloY#;sOGjjjOYdjem7d<5$&~@z&&!RX zShLfpWmL4XGaIK0m2mdFxRh_zX&7b4lZv?wes?WD@^LBOT#3`EbhS21X9IyOYnQfU zQ>$vA!`3$A(uHl5lA073C5Nf3MD&4@4#-@UaHywdHyT7nrnoyyIm)xjh|uGD?aw2Qh{8v4eRszm#`>PEWT(ga!c zMsbmJ7@c)B(_w1KNU)OD6!|MxiN!HGQnM*zJI_-!T~M1?ccUm*U24rR82J8V$Doe^ z8Bjc#+dFFetjglJQdzD>Kxfgxek(+L~f$<|s`t0fifh%a#UMT$2j&y%m4 zu#JB}Rv)&G9f#AyJFh3tnpS8jL>*Kyod{RVv0A6vaBEFeUeGe^mdR6dg*_9mUwq&H zA_&G;7RC{YOq>lL;w2}QN_jP zU~(g&Ku&imtWp&TtLiap(wsv4kIGg&;Jm3}rc+rLf=eIR%kPVyK~*N1h& z5;cl3kiDSA7eOs=QL_j!t(lufO~e<4s4}EunRr2GNg7jmb(s>9H-N=Jws7uOp2Rc! z4i;$OKfRG?TeWil!#)x7IBn2&0Fai9ds_~zGoxKl(hEP-v50wmDoxn)_p`V3&(Whn zH$~>mu<#yTaCWIGy$z`M^Ru}4d(5`1*ckU+!7iITl_VT{=tcs;yuAPCE7*{1c_f!+ zA~0lNDT~(Rq0KybirBJjFk6tdmZ^nhxh>=U<5#gKB0nt(ErgCAvW>k@p&R+s_&JM0 z!ns=yU4w^+;E9I_cMx{I=7cgHjCB#OGYeZGHLR05!X7i8Jbqzhr&gWr13~uF&q#{@ z^Ym=B3`;4`NlU50{$1$%E&tZ-eHpVI2AoU3KcV?|N8(wJIb3wXw+(^aV4I0Y zn24PwZHCy!Ru=FIr~5=;@4W@FjsI>&Y-1aH#@NO-mPEOOle&b{dTRTh=$ad+Pv13? z?Go)^fv`}tcj6J33L)-W?jYj)b?uZ3HcVpYKJH+rNbLF3d?LsKAN{{yiz*KU&`Al5 zpOwV+6(*{Xf(Qb<3o#PxaQ+L?q?7Qfa#|`hiW6Jz`GG8 zf#5;FjS$fhNW4Bl?kr zul}ZobwY9Z^Fwo$NZC505kObu_dE_82#_jeWMSLeq{8f(Oz=YHDMoBkDfKE zP`sx2j$&?-SA0S7Aw^rUZGu%yD=5YKiO(x!@?Xo3%Xi8@Ex%JXFR#kuOW!6p%HJ+u zG4i*OpNG_=#N7` z7t3&qCH=1OWjK~l&xkj>)NV?jiVgk%Wc}8h!^yw zVpFHodbf-D+GvcYgFJQOYmd0mmz_OZtf*p@cDCrtC^a!^M!W@=12%V)(o&_=Or=1F zRLn)6Tk>;}RTwtN)O6gDaB>c%C6U}vS~wq-?FK{DPSrYaAeqkae)0HK_LtRN#uu)s z61t?$8%f(;A{Rf;mKjae-OHvZHE*d?V&C-<`ZxfY0Wxu&wW6}kSfs0pTxkQqFRT7|UGE~J?4YX_1EmfMkLcE}r{TjMU z+cFFnN0c%q*VA8ov-ATx>Zjd-qNS1bIy}MDif=CL>17|E%gh#1mNs9=dBWV%m&MP0 zE|}K_Scf~7ud8&4+zO-g`SgsEiYMHr1Wx>3dXb1SRQ5U|Ih9$%SGyKpwVO{}EFQti zJ+Hk{0lZPgg?;-UMLw=##*Ai*>04#!^sP9286}H~tl| zl-NrsrV}aFH7!1^ZzLVicu_;9vXk|9dX&FlV*RrKh7NJ&wGzSZ;OQ1H(Yv$puG__| z67SgMnO369Xj(O6L>=uGYpJDMMY%I&W5Wq8Sf>&z=7OmuzZcoe1ZowP)}$_K!j)o+ zPc8X^^tngf2?mPpv@X=?B~*ItrDDFr8liM}Co0DEPHmUJKx$JEW1k+QW63cIAY$+<|RB>#ksxqkPO`^`CY^U8p zIz8(P2l$K~q2iX^E`C2<%}{jQ<;XR-QZ6!+T=uk-AM;iKI@z=r&Hk>nR9OFMvA)wD zbD$SD*DA(F*cGs=H;4+>^0cF+rFGtrr5?BF;+E{N_--<2`&BsmvmzfGS8+gb&t!li zX<&E>YOrhzHa(Q8)Xr2w2GmY{xwL@UoN0zGtMZ<_$7=2wX^l;Me<@pAX&oJQ)M7?! zs1%BAIVcw2I;)G*(fGPDZd!1P(j{VtgAV?(~*z`($=p@#R)W6m95x{7N$+bf{R;svs4^vX1bL& zt4ehpl}zzlq)7pnH7JwyJ&V4iO-7rl+!|>KFjrhrx@BgaMq8{vD^ph=7WtdYp|mQU zo>7~;sz^GLTg{%xcT`l<9(}>usW~aL`qB|muDRrNR64C-a@yW9H*vv|KIb`J#W+LV zlDe%|*?XFELiF zOe9{nn47V%&XRYCm$S05lC;pgCs;K)Q_*ZyeZ|}Y4rbX{YIs9_hb|ZFc5|hIs3S+N zF+p)|ORb(}HEdTk^lh;;#z0r6ayT8uyguIY<;*E@voxChfpFcHi1vU~nJlmSkyuEh z(NLxJo~&A3@>VKr#`HlcU(=jb=_0NAw6fHxs?z7&E3z?^10`22l1v-i*+B5Trj%=R zHfxTs-=T;8M7vqqiSLyS?Cmt?r6}KzV~}j3(kdEzJg9nFSuI#jR!94tFD*RO+Sg3uX^f z>lmDRt;S%CC3@#xB@uYDk5R+6!0YlDY7W}*q?GURu}mzG&;n1vY0hM~tdR2UwOPiU zWDKDYbf}5s3K5dCtWzequ(je#0u0dM&|M=U)Rwi)kOt~U9qdcI!7{(rA#&07X46${ zHNH-s4XCH<3H8q;g1M@p5)RB2&J%0Z;U_KTYr39}$_c>SZnNU7rZ}5)JkrdDu)=0$ zLjJs#@!B(1@%5mr$#=skYf%?!v`PuMByAE~S)(bnl)TYq>}8vkEUQ`R5cAbVRi4S4 zGd8;BkHmtTJ|$&yc~_Tdw~b+Ye3s8&Ds5P5qYLj0+NQ@EOUFIbVsT1gX)R_{IX>Hp zXcK%;qqlxvEW0Y~)*=XUKxdkn_O`mZ^Sp}|4K0FA$jiewii+5>)nu?Tv$K5Ht;Hkf zY%=;?u>dxoA)Zr(w5G7hYmcR)Nikd3v8HUZjcx?yq8>99m1-B(II?i|v0CDOdx&8o z(vfglXDBevxE>*LEc#rOjeJKcR~t66MyuP}b9Sn37h4F6O5<{vXOeWrVa-t?UR~o7 zA!#b90$c%D;~JhZX-rfu84^{8WqrZYP*K^U(*j2puEYk&4ofyzkEW`M&j#W;SIOWo zB?8xp`4OA3MLUb(pv5$8E&4M(y+^DUp6Fea3kdyHHeCrax*MhM)n!)YSD8}Dq%k>T zOl|nO^f~3WH$A?(S#M`F=G4mfirL{d1&o5W3F>owS(8*hCUObalS+!V6kJNLCs(WM zxBgAaPxPEwmC+rK&Up0=i!EzkEAr8XLR`z$*0<`sQDw^b*NERc^*At3bF4;5GiWKb zSGqcAJ8m@-aciQvb|6~;M$0Dg`#@mU&6Ipqud=LcCB1piZDPJD!0S{sXxgkjRu!lg zS?{l;0u2CGoZS@jt+`oF6=MV1O1apc$)wzGNZ)G$3EIZxoRPMl>ZaI9>0}>LMszA$ zvZ^j6eXvkXUMlM4%RxjKV9W+vwWS1tZ<)6BG9sg3#>c5bLG`qnYjet)dWAG8gRFa& zwuN2OT#h$sDecCK#0Cm_9o1^HHruT@GHMgEp(n91l!|mK9!_&jW2R)uYo*=|v~oUX zR@rV<3Sm!_vKYkA1F2q#W9-Fzk&XsDQFCrYI!y=SCOzF~sq&#p-9#m|iP(BotHWm3x*rq;7%~<{RjzsK1r_gU8nPa#BLhsz zM`@WZ?JM!RQin@zepLK{zd9YH1CA&cw0NrxL*}C8V!qm$=IO4vVRv?eZDlU)>Wb>g z_M-8-`y)iaQEWy3du!_ddd0Rr0 z@@b6DV3=VXcCjL7>$N(aPX90Wb8+^~|KW^yH&l0;qn2928j#M=#&zov& zDy*4qM7!;TRI}?tP(+QB`WzP8T^H zFE-FiaWv2XO?YMeRmnT+igyw|zPTCj5uFCi(O9cPg$j;_S7$GkbeaV|=K`69(rMpP z!@=)_N4Gt2RsXICF`To`xly~+f(F#(NSa_$?CJ)xF?PnC5sUTJ>)7R!r;>z6UmaVp z?q1g)zn;D7L>%bMqKSxneC!*FAB_LUAB`2kR&Rv8x>L`{U>|Ym8ds#$*#_24|dZ53&PqFHjnWr z(y1ij?(=i-nD_&GR)0gD3=sbuf%FvZJv9lPT1ELgxoI`)C>duL#vCH6XHc2}njqV( zN7eouK`g@zbkQ5!a|EVToI;VLEf|VwRb^kOnJ)3&K)|J9lDPk#lDouDr)|4POv7S^M4Dl>xAKN7LX7ZG6Aj4FoDv>`FEobj>n)^>mA?M(R49 zG_v?xQSAYmuzlr!BS`iiU;_U9t*l$Ntd>E!;im&6poDfL z)U!|AhPrI>&TTu{^0|t=VNq$)xkk&Pq@5YzJ=@u}XX`b3=B=JV178W-m%X+{#JHOK zD_~9Vl>-)e=GV10Rjo&fx&awXF<%(a( z_~C2hE6D)!!#>$NN6;aqfgE?Jb1H4PjBP;E@Hlk>buZS6@;$_Qe1Imfzn5LG;4IKT zdJk&9$v2ldS?WO0h-fpNx;0>~#i3;fTmicG<9DOb10><~G{9&}_a-;?-@F@aHUf83 zDvi_C4SJ}OF>5!+Y|SR67fbW-7tw?RG=UANC42huFOdQ7oJ)a^2m@*}QI;f?avM52 z*Q~kNp$Q)tZJ(MgY@Y<&<%1XgW=;R0dr2?2<`Q5bZn&yOh)yx>P+dQ5D+JWU(Q`W% zu3z2HE?YK86J!s3W&w0;P2cuWaf4*RNSrgic6~OXV!COq(S?CN0n-kddYPA}c77)Z6aC)ca0z%WWML24LXIn!+8KmKK_9EHYiid{& zFtUGg(}Zq3I5ta$)9Au*%AM>$RSh?Lm9kOnOwW2KFMKE$hSN)*$8Z{?0k>-Ng~EfI z<#GY>f>-vh`~q2SymR@J-1P8jXsZJHK)vGb=*^M5$W8Yda2uon6!T|Wgb!P8T+XkVX0-s!G6x3v^$)SDrUpm?HJX6;dG1DRtPkOFcawdN zNBfChx6Ni)!?RY-rFADN3Aa?aiO=CoaVkl8<=3Gt!Xp)6r@O{P_ehKyxP*^m|d597xJxq`vIX1ag$VZ7|Z z8-c()ijsZqmfEEYbv1USDsGA<1l`y0YUK80X7#rZkuP9O%2fA>W>%O%esYs?qes`#e*(*f+6A& z4^#^{w2?6CZiG4^Wmzj+@iaRLe4f*NBFHWo+9I6u-Al7)!iac=eFzcbi6q2}~p!?h0MX{Jio?(}*IsGRj5-T1>e{jii!LfVY`F!)_x_DMTIp*lcbn-R^|g~-O_4H$^DS)k?;^jumj=Mx7|&eMM) zyuxSCh=c^UL}9~0c4AG?rHmm?y(i*p0gwa_@bE|M`i095vm4ISyk#qoo%X~2-T&_$ zaEenLW|yNufv*uHjsOTg}YN1ZSBA3Td*zJSUHKH zF);9?L3xf=rKYI2q7e;zchb~kQ~%Tdg~h=DK3o8Y$#395ue-DvBBX|n-hYM;$nJgw(z^hHehKb zh?4ssWq~LenQNc4G+|40i#AnLm4rVYiDIWUyvA;xJT+I`Xc4b`WB*&Pp&D7R+7hCkxTGn{-CX>}i)^ zB+2p}(mk7}26BaSYh!BRce?@;{Wo^90L~a3{n9Ma0zHL#D}Ku0cfzAx_ci^ayU>{8 z=D5hSXzAA{)(m}Nyf=24;@(A`kvGZOrWIz6LJ7foBY_Mx8<;lKX;uwQv#@oNTO;(2 zVnG_93DjqYPJovMkF(b;AMD44J_g*xK-c#lJ^FSmh7Z5U#@EG)K1AV80P4p|))ys= zZGdo-r-{_H7pPULw@$9pek)MF2ovOqGh^L6!`^=`cf!CU)-4oWK`Y#NNdy!K(jHn}Ab6rRm59A2HYNIK)yOAhP zH*~&gj_}#CY%p73`}-x>6yvYNs}(_J6|Yv6R?}2bB|@5vCu`GX3MA+R$};r}lx2V> zY-gS$KDWM2{pv5s5zaS9kXc1O4k$F8biUZ?blk2;idTz#?t2A%257=7&u+(k8d^Q5 z263wV+bg7E-Z=taD_+5>-DJ^BhwYwjJ*AG#dPwX8Oq~9&vAGP;gzZni`(H=|tNUyI z7d71Em?QAK;t@6MPge|-rr{{ooAv2}O*r>rjO{yK#fkafNZWrDxJvlNtL)!|tycs# z3nQ5Fa z{p-q5S|lrt-!ES^Y*hSw(l)kZB1cA5gs3>?Whk+DKdR2ubYUty>$6&|E<8txC4T+? z;cPxYg0bUMxP2dk82?{z#NRN2qKZrc!I?~)_cn8;#>`BmNutl7sGUEcsHc*Iht5BH za~~QnV!=93AY4TTp_+xO`WlH?#pUlheNtUrZy*%%sU+di_g*d`pM3QVay0kM%TLxt z?a{@{Dy4A-;Ynk>zC%Kipd4R#9nC*T6CO2u=4#=0uY^bX&9+@3BWBB)rPbN`Hi zIzSVlk)bSJ-{1aca`%kSkD)wE7PP6;fs~)4T-o}pw&2%Cc@5c3U|~6sy%5*C|IJAb z$BbLm^9nStxX05WYd7mjdDBWyyBRhtoXJ-T%{S4!r;-GA(}xx`iR*+%v{S%w|0nyW z<-tY6)Ob&>P<(&FFAGkdKPDKKV-P4GiEM@e@BAc+IlRzpnZY=6Kye{kt&E$R8lVXe zG2>8b*Dl`J|A7qU-Q=5JjAoNmFjz2aszj5EIWz5&Mn`stRl=voIcQ)`B?+(Z1aQ%N zZVPSdk1XMc)^dKy$>CrzWpKW$rr2h+qmHUuS>aU$T5T{}*#5PjUL=$w$u<3LqlAZd zegZti)u9**&KgxIughFEJCh-$URWmwkHKsLIQ4en>vDcY|4uoF>#uvBKtzfQch_F1 z+v!-sl`WOZ@W>=n?80ULmizj5-ngg_q!i3h&;0nwTI3BOI1ITFJ8#BWD}+)y@$mb? z7zg~dQ)$pA>m*(0Ws6BET=PpY2EE6dE*^37aYQLW z;4{Y6MJwS#hXa>d*s}`DuD8IAAl?Z#x%Ld-NdZqDOmbtwgR8j3>pbSX+CyMa0M7zk z*mfKMv@SD38-d^E)u*KjuY9?6VgJLIB@43qe#XgR+036fh{PfQ_2vCM&ODu1*9E)l zaDKsz*XPDT2RB4i1Ex0yuRJ1%-)Q|yF2V1IGysynl)GdqAM>cvIs|Q@Y;{vQCZ14s zUCOPRJe4Bcy^H-9GT2Jtw}tc-!aIUDY!uGX#2yniU&fuYNi)9^E23p#SDoz?R0W$w zozO>Td?k+x5Ix+M$y0Noklc51fBrJ`%!*Gfnq(%}@q5PhDt;?Jf4Cs~6p3^5UUa*C zo?s;A7PwL&$84CIQI(TgpQh4)nio@Y^RmHg;nDBNaA+es%Dryx8f@6iJON1*qortO z)O0CUwd-O&y{62igb6LTd1@e6cxC0tg~Drv8&(U~T(bBI!Bad@)jM>k>h%2Ez)vic z)2#6#tU|WXVEGDNchT=f3P+43A7TVALxTdeuW9eSr)T?W(imw;oK(EfE%z5FS zEAX>{Y~k45w{HJ)YDs#auwk2`EyN_-buBETv z(0}PFZY$2w^8~rDxX_5^ddZfk7@X!Zyi@25qF9op;|mmr2!5xK1Vg(af&}#ubz~*9 zonwp76E0%7bIx+lZ$PKi7Wmn8Gkz~+jx=DfXErOf1(9Kw!9*IQ39lSWTy)vj5 zxHmCk6!z4C6X=&C<%{t%gV|W|Y{u)!g!>r%;4*?RZN&3CARSRn7fF z=xUlb%-M>gs9`E&0Hb*(Kg3^paKMf0}%3{Ckt#@tqUrjemS%>-f9J zw~ZSoM#e7~S1kVJ8ZnC&%71#*LYmesOHe z*x2Z=M-PsEZS=#V)zRRnW^|q6uZkZib}JrK+@eS-tcr^i)~3%aPaK9LGXo^Ckb10s4WZbO&?`1*T-c6xp-E>CKQBEg>k4wx$?~u zR8YDeI8num2!_fNeX_5;{4)|&y3J7bJQrCsKDfp`+R%=w1t_^fj4wdvV=Y1z4xLXtw^l7u-9=Dw z?#Ltf8$fBX56Af=KfXtzB4TbH4n+wjZg!BE3{Y0}LX<3Wl1#_Zh$K3JKkM!y@&Td} zDE=f-;X!0*0q3nq!jWN%N1TLgR<>KBLO*S9xy=^f=@klbf(U0$@}rNOpyK!h?0K9u z%zpg30IawWJ^EWvd+1|#4#Je=heXls4u*Num>RoB`f)Z^1ZZB+0E}xyKts(vW`law zS58npK?8h=El`+;aGZg<+~&{8cATKPc?d%=2L!~!NihVakcArki%5k=s@o$?mCT|? z2tHri#XAZ^$0afjZebkujd>JLO~wh3?y^IVO4K&uEHEx~P27wyc{nt>f}!qkL87)i zX0!p?1o(o=7>1z-`uxQolBi6a_o-t=yhQY97d{Ok#+yaC{H0C9SIb-&P%$2H-VkBe z1tp@p=;tv;sMXSMX(-v@XhwbyBA>ybH&3s;RiZ)#??T`{)P@XqGt`3-OK1JBC90Ct zD9&4;A48}Q3OEWW}y-Db_kZPwzt_n$S~Ba_@w1eiky zT})yH^5}!S+h#2cFOq&-SkUBQDZn8bOfob9IUi%i#zG^}jzTfhm>& zHe@*KvDxXdUx`#Zj<_*3^ouQc=^^$8=7r6!T=5-=it9t1$6y2exF4uV$-K+v;HP#< zRIE67+``cq?T^(BPzac(`E}CZv7>vkm;*^vYaucV22i*-_U98nCaWSQQws|d0zJAB zmpRc{u|%S(V_hp&jTjRz`r+({ro@0)E%hOum5MG3!0QZ(Rm3V#=#fQmwX`xJRwR5H z@xs=PVdQ!c=i1%1^6P1dHF^gV5N~D}mL05nP&GRWqbJ&fad++QcoBg2K`btqgl;VD ztM;AvEm})S3XD}mh4r@U=JV~fYtQN}tnyghZ9W8ALDvQ`bb|@h!a|RHUi`5Y<0;m` z%8q4~tQB#r5stik_9QikHY_4!M$wI+Droj#o>}z3zo_=M+Xi^bE`hl;sBjBYt+Gf| zzK696BL`D1n80kpR6`-A(jwW?CD8gYK9512Eh5A?IwjLt^H+(AHb7)cvU&vl1Dev3#uF5JE11uRZj>EZ9oC)5)k zmZ(@h?704gS~09Vu}BXXo(O`nB7cJH!H~m9ZpXSn=STfK5H5fG1QmBT2*m~x3G)~w zD4MII5bMMj&_ZCzhY(&R)QJUs@Q}?=ioY-X7RzuP-55s@1cVhuNBZ+_EGH8^aV~<4 zzCi>c(rmyY0XRPxwT8uA4^&K3tb#r?8-7e<-$xM_KQFQ7(fe5U!#tuOpiyym$4Hn; zoTL(PQp^Ilz+%#oJ88VQ{D&g7clsCMr7uZ8CQ*72QPo}WAaV)@meSR=v}9qCip`X_ zV^tzSWePk7DGn(<<;ts1P*Kwk)(nguEayDp@L>GQzbH{Lb*=e$54$)fP75;?L&!p{ z>`7!SEj|hXVX%%OAP#;UFZw9i`6sBPEwJ#xhucTHux*pMy!>{FO7tPvp2;H=9+A5R zEU5|Q)bAuJW`P~&C2ZGp7~`KjAHgGGO-Lf+RUCT+nZGCiMlDM2&yU+BDi%|$vfU(J zEHPyHOc$$#YIyPl)osoq)~k;}@l+5&&QQ$qpNUiwhsapK6vn<}CqtG(IMZHs8!wt(DIZYX`u_u&g9U{~o4oh8VLm(96J%ST}Igi=u$ep!o;m16j z(#;_y*1`^U9khqBK*DUCH7!x`y#r?-P(dMM1kd2iS#ptzXg+3)bL?+ebg+(KhCmgv z?57eHE2XQ4Lj?|9*x&Jnhq}e672=Y~XR*{8(7c%GkyrE$VJu+>w{$(W9)$B2G^k6x>ZX(A zU<{i)&Zjm9-10H`aI{*@OH@4H5tl$e4hMD|RA5Dctz_LRC#YDO$Sgc&%NBlI#2Md=^DqL4 z5X%sEH;H1|m7B!TQ^atktyq9i=q}nKh+WYZ>TcR9{?@^h^M@D+1zT4Hiyi`IZCW9n zKYVQ*va%Qjk(nGoBt655!mof+KnZn+&2-sWuwKAComN zi_HZSZQ*Ey_gxfoqj)^w^C$`?XoTn$Q8#i0!Opfp+MF=#Fi*%aFK#0z1dOb1NV)cM zsaPl|2{YwW^>C2GQ7?qeH=f_P<%D4DcLj1r!J!<+I0+hyNpYjti&%zSh=_)eDmW^J zF;QbGcf?xQ@Sylx1T5}i!XW?)b~sF7vgsCzBmR?Aj5ZQv4hQ){jJEc$C}cY0Qz99c zgChD0=Y0f%j5YigA9I}E%e99G-6I37yVQ}I=93;yNRtuXy zI}(+sXeHdLf*I_HxDS$0)U?02{7%WlZu6qa%Yo~B*Vva7PmTOgwt0AnnAk0q30ecU zbh$5_u9+yU$E9?p%iU=zBY3h`!;Rk4lrmz9wd%keN`u+g}6e4Fu<}ZR8UA~|= z@Me^GmM&#G#fFwPYV}&eXN?ehH`Lt&G#KKRVP*dQ;f?*r-_1=!&&17dfl5QPWAil) zEhl5L<&xP0(9y}@kZm@Mk-KVsqlPU|kGTT$BYHJ9_AYN1-EgjE*&WH4JW z{AJeF7c3mWY3o&Us!Lm$MvHg1HRiZZ_^XvD5eKq`W4B%4=yz>gP`13tXG0ps?=EFC zEnU>*$q}XUYT=L5&`A%{5Gv$hm~O^lJnOgP8ECmOIBf>DRk@x^TO3fvr^O%db3jou zNc&gxPQe`kF#pF*2AeST&-snQBhP(slW@({*KZbeEhZ;->GF~_=#0^smfi2k+mrEx zUgUhQ6PyQW0{blwBF_E{K~VnSgl=j=K6$%rZe#`2HDj9)BQJ5&(D;OKSNS7W;pl(S zn}xrflUO6%UHM1=nwZ7oi$})Z9Q*y)t7AVOJ3RI>G&3*u|62LTN}2q2`G3kkAWVLP zzDc<28}xgGiAU&n_eLhbb{7Aoi#DVlnM~p~6f8+|JpF2V${mhZKBmMM|^N>DtWCPL%j}ZQ! zI70Y8aAasvZ_((-4if<%Jxm1Lf0zgm4if?Q9wq|*^Dq%`*I^>ygNKQL_a7z#?mSEc z+;Nx)xcx8@@E?bXfbEBgfcG3G0(ysskiPp6;eYcX!vCg2gn#!C;om+4{=L!WAtIo0 zhzO`1A_A(1h=9r=BA|4L2q+vP0{BBjK;{q;kUT^LBn}Y)>_H-6+d(4WhJ!@F^#_T7 zcOHa*(fC2aKYEbxj~pcYLk9`}z(K;l=Q~IQxDT#D>ODxr_zw~>u7guZod?H|I-c(# zwLjlPI{o}CQrq(>q?YHeM{0gPh}87_3{u1MM8LJr69LyePa(bP`HPWW`TV&^uXuhv zQvLJGk!qh`j8xNmUWPyF10AHQ0~Mt7fgDoh0T$`y2VzJsJK#h5jste2mmV-6eft4D z(u)re0T&%00=66=0xmc}1e||>2srNm5peDS!vE~&2>*@G5&j#VBmCDtNBFOMu15r{ zeU1oN{Tvan>Nz4{<#R;9^5=+vWzP`-OP?bGmOMuUj6X*NEPjp%7<-Ng7=4xq70z|Z#+0YBbP z1iZYT2>74<6w)8GRKAiS)oT4AN(xxdiFc&zz5R-!mJLKK0B>q8a+M8G3Y69Hd;nh5yX z(?r0-PZI%Od723L($hr1=bt75KKnEg@acU-z=QjUfKTot0zR>i2zX#01SmebkMO^5 zAK`!RKEnT=eT4si?j!trckd$tKD>_z_|QHg;Dh^!fIIgQ0q@&K1ibetBH;F?h=Bii ziU_#%DI(yOr-*>}JVgZD{1g%JuBV8A)>DLA_bJQ*Mf)kz1vfo)5z^*UXCZAog}J7v zK82TI#cXeH5q~OAjUX-WC1PrOF^?6+y&0s1z1xuTd!tBmd*MB-$n2d)n%uh;X=1Mq zDZ5vRblYAc;D)`VkFVdm4rzSvGNjSHn81q2-bF~md)i1td&)=yd$LG>&codx!wj9wNZFXAx4vJP~m1JP~m9 zJP~l!{5GUl%oG0ldBR^iPxx!*w<1-|>&W=0=81sI=81qy=OIA;{H{$%5A0fn^x0k5 zA>{jap@ro8p1@F*KlMZ%>E0&_NcTLEL^}V(bx3zVfrUu^#1l@WJD)Hk-SNa#NFRSf zh4ir}E=BrZPh5cX(I*K1N1j-P@h|`S6GXt*o*)9gx|0a_@=hY)i#v&cFYF`&KEIO) z_}oq+;4?dkfKTrv0v_B+1bkvA5%9oHBH*JtiGcfe5&^=_RY>pMN%((cC*gn34#NNL z9fbc~JHWpufBz05;LaUH!25O(0e9>m0&d?y1l+cR2)K0z5pc^6BA~Z}2)KC%5%8`Z zL_l{35zyH|1hgL~0$Ps~0nNuDKwf>E@UJ{h_?I6i{AV90{ELqh{=LHEL;(Ld5s-Tv z0>(DHh%Ojg|04Q$Z0(EaAN}VG;6M6i?}cUf^N$xGVDxV< zK)~oiF#5)E2pE0+I0TIT_BaHLzIGe}Mt^f00!Cjw4gsUTKCVRi z%i|C*`itX4z|W5p0Y5#y4CyP!3ICUmFGBjGV}$3c`2MkNNWXiG2>8x1 zFVYu}5dkk8+luu0V_Kxgj$MZI=&{X6j~qkej~+U<66wKXWFtOsOosHiqgbRz_a7y! zpE-&NJo@y}8<0MAG=y}|Q8fGL{81Cqokz(IId_yM8|&_)WDDMP^gN_Hj$-pwTr!Wc zD=wZ#*%cSfqwIfnmV$&RouGlb# zqAS+V>5#6SQzBh6cM;OnbLSvkHAncbm|I5H|EW15U~-NKSh|}CnAlAOjPE7_7Vjnk z#�{^4&zh&~73?wi^QE|J)4$@;7%wfczi3Awd53-4G!E+inPu|7G_wq<`KG{_;0= zgTMUuPlCVv^(Vn!{<|l^zbF6glMo<(^+^bj|L>C!ApiA~5Fr2MlSIIepCkfad6EeD z*^@-T%TJQ=|Dz|dl*)hjB$iV751zzsCjajz7CUxozn`Ryc;|Qvjtfva&>>% zf5LL+tmr&ql-({{uxZpMX_tzcv1XcyTF_vPriI_#kK62(HQd(+XaZ$>3{iK!efEa_ z$7(R+TOQ3$7ds5?)I@Y@ps5*H;pHZNyS9NDGe8rl#c+c!?|EuNzuDkivQ7T^%V7<1 z^McO6>88TQhBuM4);bYiB0<=kKY41dAk+VLi?B?XSl9Qqh;X$(Uk}lamSvi=)XU*u zK`i*8HiQq*gk#iYFsglS#fJVnI{57}jV%U5s7f|aj%J%BxXYXvC<@`LU2bynRJ!OU z0|%A0efhh%tKn`pPr}BDYKnlzO*`mFJ(;biYN_cqC){uontw1`^p|`2CRi;_iWY;B zMT;Vnxrz0{^w-_OU3aD)`Oz(B=n=`- z@SFbuV?${DRj!5SXJQY4moMH2ZNjJS;G(PCcwmg<0Shl+c;|QE zMIhgWn?M$}P)#fbTiyp-$kTn}G27uYnfc)Vv79VE?}0Xq{76yP!dnb+>ccr0V?Z+) zhAji0Ztzw{M%h~7$ve5pRj2zzIOcee5gxp4e7$hV`_I@e|M7k-ssn@c!~k}F;0yy; zYK`B0yU7Y?-^E4NnqjN3@K9)gc}N~lMo|7i!MrdJE~J%e&0F1!U{G+nuLaq|=Krf% zM(_JDCttY;`*#!r_N?*ShaMUGt>TmNQDWkz2)^x;FOcyfA$2-nz$2HzJ7{E)nzaK!IKmboBGku?^DtuUpqYDia?1A{SkUhekZD;0*(I z4;~v#Zs1P{bJQ;R`R3K9r3$ZnY!fXg`|Gd&KL+i}b+E%NxX8;fUI$#kFy2HBN+|4e z!WX|xxSx(H$Q-f@g%AJif(wLqeC3S8^!Be{`c6O4!}L9Cq5hqjbT0!0@6V z=pW`bFFhq!*!D(U+n*m(APVEzU&AQn$@7hc#t8>c9tc_j(;kdeM)=^@aJo4y5gwio z!A|dUfz1C=buuu=mQ8M%;APvP*FHYFZumy|)#O~4gS}yVp83}%dD<~nxc3ZWOxTvV zX<7fsy+pYkpVyvb(~fCOSvrAt2va1^IA}NU``|vCU8;P%=?L1Xpu^ac4B50;O(g z{;B#c6g$pdByGJThIGkP$UQQ{I6?rFob=j;k#Bn4VMq@3V>uE3^3_`^$hNzC>lV{E zl#W&28Qa|2KgS?y+i z_NlQBYdGPyV2Z#{UB|#sDjMwmhJ^&s?GMC)t=_}y(2jgIXS=*34vrn-^}Vj){A`41 z-o`NAelWJ7MnxhAu6$vqqUe85LbyG3tWgkegv`;vzihzegm>1hqdlo7zK3J$p)#-Z z3OQE#(~bX)re8(we*_A8G1LRTRUEwtdxAhkXaJnN({vBvopmTsQA_zHzJyAb5jX{Ky9fjrO?fu+0 za2Bon3OO(g)%f4!!!F!*RTBwXMimWYm^z zmVW#s6?wk7i_rxoO$@+}cGf#zKQ zR$qOEW~S;$`PuYny&T8T;GA>uOq`hT4MiDeitF&id-@QjMt=D}I7(EH$%#XI8FI1V zx>~9CC-hhi&2?Y~416|>s{^3}MZi<)rBmX1thnj{n3DBWO9G~1Qz49X( zR_~wd#2m8 z+>p_Wslj33dlY&8i!Y!R6^#OWfK|uCjZ)PtTd zn=B`h1AE^*nG3wMDtVDj8eW0RIc)NHMb0!6=^hK2LnD34z7}7>7*#Zq`_1(V4Boe2 zK^9JhRH7X!kx2Ecu`l5UaTs}c%5kP*9GRaQ$Q!R>kE>`!rjm3$;&mEQ_!YemxDXp7 z2j`>^^noxO#FyC9dcwViE9^>Cl6$t}j76Ib3VyTDpHm2fNzu3@#9G0$Gze)aFLp;=s-*Ja>PxDwFR!h5O?xgN%}8jo)gtMxdbmYHMoz@4>o{kRb&|C>!iH@B zwB2eF>Cs+K?m7W>SJ8;|H^?O~qVoOYM2w>Q%>^MECygBQa4Q%lju8eq0ysr<&&m(g3}! zMnxiZ=bwo*yt;j`zr9Vf;6ig0g;bWmeO=tNO%JHq1Uov;_~OW)rUSG71@c!-qv>?O zEqr(HM(N03Ao4bQ=O|jI42r|u8Kwq1uX#9KKA-1 z>3`p&ay&3c(K?lJdEF@3lnRgAgiOSVW?&KkMBO_$pWVwzpPr~O~`3CKB3ekL}vsi?_ zNm{)bJc1(;^?;PA4ELqRvxDOUHk8Bd={FUR#Cr0PY90WY%Sc3X-N$xHNRHm8X#w2T zLW1P*_@Idy%nKnvtjGCaRA!As8Xk}q%W2SK!Slsju;+Oso4>8$ah7@KDCDQi9?oft zm*=vb;aJ>0ksRPG#m2UocI$OUb_ocp>OFE`<}BpWzkRG(8ePp>0oXW4p*!U@wkLW$tII8;rZn zjE*%LSmf+73;!Uubsb=hXqwS8f?lw&?TlH_x9g)OL%UhW>e@}5*e`+3BZf*6cmN(jJ?QW`o5L*SB+~XuMr78qDp{SUlP;po46T(MR=+ZlPH- z(yS8Ju0*AK8x5?8eydINE^e|Hl(cr{A#TJEYN1 zr=Q&?u%gMJi<{dGCNowx>4wu{quzXDkMuHS;E#eJ-!8$z<7W#&Q$QQ%k3RS+f$F zr9Eb2m;e!MVn9VEbX&lx8ZrGwp5YkA!l6>k;>4JYyY)ciJaE+eZ+jdL(59JvW_`?P zikdO!oXOm-w{T*+1ryL76M3V_BJuz;KiM?58*HaA<2RmKHXBP;fXviSU^aC7&<|5o z7u91u^#Ue3&b7xFL1;H~h8UwWuu%(dS(ptYw_C5b0PAx8XPaAetlq3&Tt(Kv>K6Y& znl?!{*n`4~NE?{590NyL;%-mwb+-?@4 z>(YuX#qOWntV_F3Zrdo&jDcm%M$CLWYqEgJ4XmNvB7n&mv}xiwo{54d6(%&WyLA@* zT_-LnQ>LbEVIM79f|FCza`lCavdmyK@6+oUHm<{WL=(QKH=sJK*$}m~qr9RZ@}ePT z;1(r=LARS@vBY;j3t4v0vlUC0L4Q(~o%~ko)fW^ut&x6*i^p_P27)bWfou@KvDjD) z76a1KB#Ln(WRNl_y=AwK1@Op$&nh2UGGR+TL>f2I2{Z2#EGVoRiyGRIh;C@t8$}bg zmjS!YWR9YEkI2Qb*B9ERa>sJl3&*KI{>44dE)mH3rEN=S8}MHHSWW<#n;vZowBI~d zI2vUw?GW-zJZdoM1ny+Nu^1ew)N9hNNS@+A2%_gD8|f-TbVQOh8e;9;VrEYTb${n_=M;?DL={E&DhCk+Jash z^hTzg#XN&q1yg%8&T{Pn&ohu~rnsJ890h0C&FGCBu|_L4xBR=t->Jp)Lj+N)#nP>zge>-pD zFeQ3=(wcdp9n%8lF^GDc1q&-{wCrYdCJV7X@w3h6{~HOkxBx}}v*uGJ)A5@^nYcV(t#xcmfE}Htq7KgdyK6 z0wy<04eR-!rq0F;=X0&$1Av?>nVG7K@30CT2CK9i+B*T#8qb{2sohR{a7w z(RV&BJU}!io4?!(=gvj^o7BNXfy-r7t_SiCU$Hf)MwAeh`5CZ9`EwU@YXRq z$+xuSl@w>WmgxTa(er4Q0vs}1`EAOLXM2g(0cepARDQDJ{?fl|wy%1L-gwra)ItAT zqOx6yMH$u&4JQQs;EdRBFn9M5GY2+X{*ct2dEt&jw{K`cnO`1e=KeVfHZG%$y4kMY zF~(pwdpwi+oNdfNjVv(DsveVrPk!(ma`A)wdg(=m2PA%Y4iMpryQrhbIHA|;T*e`b z8HIqHW@6vV@2pWhM%=~K#mtpW(t~?>STnD=d``r6kztGtqdHFzH7+K5#q5Y_m?8BB zOq=SdoP=_#fd?cGKPS*ZYzn|YhcrB)i=9HnX{XI=>+j;p+eQpR{dfrq@?+2S?SwJr zx(qP5A^e%E_ZYE3|lD*I}t&Qg#)?4fak_nse63|DmhWH@4s^1S8Z=z2slA58}eBZ zKxn6V@rVzw(^R_%M;_|rX;IvjsO0z{z`Jyf+GcWrn?F?u-zVMtq0QdIn-)ENDsBdo zJ3Uxq)#DF^Bl@emZ$jVxrE8jn#u!tyM{C z{CssI0tAcIdTH!r-Z~Qj%tZvrzl8PkZR_7pB)@DqKzx7bj5S*jf?DAoTd(=>l1%ybi-!q*I zq2R`WD=_h@$8xcaVx=DV;RZA<`Z?uN%Y631ecz?G=Ocj{3&6kfBtX$3EhMIHuyam}=#)=D8-BWdX$tBb@V%u@e@ZlYc zmB#al8Th{zxg4gfGsxLC8}n)<_A7N*@#u|JR_jI?{; zqEN&Io`J(jUp$-IEUcb0Es2C#`E63r)a$^=L(Qa+;ZFsO*qr6>UYW%=ZZ+Y`ZdqbU zU5VS5Mpb@&gzsKIS)!S&c%$<1>PyO7s%|KAX?H_8YuZcg$T{qB*|0ff&!?F|r)@Oq z@3f`5hvfBnBG0d{UP?iEkIg7j&}eLywts+X@&J@qgrCor7b2|1o)o%s!^0ggC4(dD z$ro}^cU82aDOq|m$6rPb$P`arHXx6LQ!~@7OCJh$r?OeWCCE(xw7I@UMI#5EgIZdQ zBe-u;*1X5ij;whnN2d4?Cj=Au2@Yj76LEPoZ_R*VRWx#J`^}1THZV)gw4S+fv?IeI zcO|<66M7rd(UAyGb#^;rayvs;@^!Up8nT^#d<*ud0k+Cr@qggp)ZZlie4Gw3FgJmAd9{ z`{JlwotE3le+=!YXhfrR;tF`_i<_jMd<^#!MfdM5shX%fQt{lXzg2f?n>D>@ zvB+-q~-+`NV`hn@f0=-S+t#(0>(;Xdbyq@u98xDCHyn+(}e+ zhq=>f;--dEnGmfejmvIv*G8^EJ1Sc7vMa&qc?k`Xr=a0-i2Tr0x6y{`)Ip<@b;M^< zL&SU&E+p#5Wc%xrKIyTWpfuGDA)QsbyYd0eP}PUZ*Or}EO*A3YQPRzAxDcqn1&YkA z+{L5g)+}qV_x1McohHADE_XdyPvGA2EF+PlukKNtNMi(pL@NlxQ#Rey7&mI=P(MlJ zGZE`Vjy!)G=J}3;Fjc&d^ny}Dsa|^bAeN{uD&#wOjtTS|^Q_1ZCY3H^ZsFH!m(vK7 zxVugE_a z;ww<3ad|=pXZoz^-hRg4m+>VT#2NHqK3>CcYSfg%rQd>!x-8Zt*>9)42^A>Pxa<+O zO*p!`xcsDP)-&MFFlo5M=)CT^6|1hIk^B2DJChvggG2bPTdAoeQ~FD^Rd;S(s#I419>` zH;?%GJF@n?hevrU2ov>V**@}obwj!I*f+rjz!oVW#z<+zKRXa}vr*fm(=aiV=^q&) z!e`Kk`mrpLUjGaappe`+jt_>(>VxsgE>F4}H5urRxa=P62o;TJo~XrW9v^FwzI6}3 zXQAZhStZ)$vdU_s=B%p0Rllluu#)8NuWur{TH|}02MYj2RuZ}bv7s!g-i(WrK2bN4 z$eKv#C4A|74?!BKX>wNA*%Az{E$cBn*%0Q)8iw3laE$5f25OtNJ4Np#Z8fULFx++S zlC#PJ57PT?ps;aqC-n4qdaN_yv@JanGT5UA6wTqAHZQM&sCtJSxO4an@=M$@q$?kg z&t-~_EblDiXuoBU35I8M(V)I#2q`RRuz`4vfxA>Ra{Pkc;!Uwx`ob}^14-S4c4VgK zjN?6NCMgEkLAd)Zc^`$litVqwiO;1nyzt6FFww9D*RHiw^-4vWG{+$autVHeZG|BF2DYw zgTYF2`5eElPR$Amn;e{5flZWjo1uCB5?XkR!hr(3Dg@*#psQsavoN%zNkAhsZ8t5s zJ*@a9IcC!ob0%jsNmtMVrM2nh5w7s3EBd{V>I&ju2H`9V< z{Mz+5l+bYCsxMXkv}~{DhSjUfIXRCSbw3MR7PosU8#7LGp~(y?f9gXiBy(U|8ptg_ zg6vn3;HRLK6(5A+{O2FZddOz9BkLgpz244Iy)o7|X>v?VqKFu6r>#cym>jU7N(PGQ zv`A0BBugHOS1wDQU>~Q`aUn-MFc#|Z^!6c+igsn+pKv2k(@5Ryr;4RAnxwfu(VGyo z1K4L4wD=g?9pgHjV^h<~bRv}}!I$`r+Yt9*W(+5p+@@Rp8aY^xK=fkd-PRw>Kv*+gEZ{x#jiXgs5j#zs<;reMFh zmy>_H_9xi?Y8p9O)(uhr_Jtdyp`TEZsxLI753=U0EU0)jgH&bTIN5 zFZ(BS>*XX^!g2p826uhqpBUj5tlX}}mFt)_>7p#tF*ej;>=y>(imbf-IOa-CBgZaq zoO$S1LmQ>P9j8vVP=R8S$?O;!ji64AX)=+tj^%w8*bR!iJ@p#aOGT6I2F0+fr(c7Q zrDexrZzjWrj(&D1(r*j+jg!W4TE+()S^qkwO+_Px+@s1}cl33->TyGNB*jHNdUt%> z@0?2L>2KR=RFBE=@7#rZh^2X}DD4%|(!zPzcr;?~0-;%dKKhSC5xL#|QaRODUJ8c5en)rro2n*wk zOO7U+>OE3;7IrLv{x?f^|ApR(eFdc4D@usZM`ok zr;1^j&C>cc0xB>C3%eJ))i<3CTlFrz!PgevsN-*DAakz_+rkR)29*1tonwR9EE1k%5( zQ87Wg)5P|glF8fzH=Hg`54rI@zE-=OLJk;Ewy$`xdi_0m>+~1SUfieS9og9~-E73y zHIuMK4Ts*wQT@Aju$(FaDOfMvCF$PfFV(c1yEqaq#TsTf#yn!47_r(?vj+0v6POJ3 zV^Vkazkng|db&ya+X*U3y@hko19=!@-hqjfxrZII%}(_N^GQ06Htq7KL~|vW@??bS zO9-M}%Y@=& zAt_RstYNpQ4~2#JTt_lLJ&1B-->*Oe%b(IpWIM^lUqG>>i&xVIE-#qTfb8NPnHctW z_K$Nuz?P3>yhdW)fiw(50&c=+f>kLx|_{( zpVy#Bz2 zw-3U_#{+1eRulGQ$+^3QrqkJ_E~AxSB^uY-jSFh{ZlSgb5Z?eO2TBbvXi=LODmbu$ zQ$DESy9LyzT8WC|WMlE3G^wfAI7`Y)wL8joz}tP3###A5#V@I}+6}d5uz=K0#gfp$ zrM(=(TY3i~u83=l)f0U^_KWHyUtZiEi*jo!Y|(kMP4Vtvd`2=*EV49;k2X)r1Bx&=gkTR&X!B~ zjf0(LH(%T{4dhlYxI{%G+h=#7!upyUTcp2u1=!)kg^TELirH`Mi~;DlJwYKe5u3={ zQ1{FzY~04MM!k7S*;y+3Zo+?;Sl6Bj(SB- zt9A)C&y~7UY#t?AXowYpr>{S3hD&%m*sXCeWktmnAUOASqnrf9Xc(3kmoHB~f1a?T zVMQuAcJ(uj|1lq)N+w{*m6Vr!$a@$YO-bNav8~MABw@xTQIU!qt%UZN&l9|eA22RD zvMFx5od-qc#tBA-PLCE+X6BxJFB!xIj2nC{oLX z!riCZ2gfgb|2~kg559&f!WRjl^;0F9scJ#XR?b!YsmxRL@$${o@~{^gTCiYU6cr(d z7o~6*Te2hN3-+dv@AO@q(BJY18){S}a^k0{Gi7__X{HIUPwn)FQAua&^m`Kq;6iNvWzD7kuDdXmy zhdv-~l78KTuiy?vlMLlWHglB>$~Za1Pdp# zOC6zndXgKO8tP>DwAX_|=?fco75Q97sHsuCK+B|4?={ld%ChvT;V;k(O1V!n1L#*bdKCuTX{FdhKJnYY$T==JIDGXFkR5i{k=h9 zgLXNEMA~83)_z45Z~jwS}=>DjKoAbt|2m zAFPt#+8@+xHWvbD$5qrOJY2rl#f0oV)^VS1Je^S1eR3}brJ|8gH!f4u8bogV?CA)$ z-Y5KZ{jId#B44bx_~&v{nW(vy;&*%yN}RVq(?CaxUvW51-Ls5M@J{=tMqE8paq`R* zE^EsllM_3?iO_dkjmZVm!as>_kUx#=n-R7_jD*pYTqQ6z+!Hc!0h50wr|-8<4U*&k zgX#Nf6tYo8x~1;zB`(d{n4poHH1NW<&87m)ca+1pTSFoRis)JTCq`S{%Ni_l>uGvWP%;ZO>}m6O#%C4 zOz!M}hy_#85P|e(*`7!q5f>)(=W&eQTj*KrW+-eNNHQZ6E*~kkXiDEHHP7P8(7LZcb5^E{arDV)b2gho(R(4%fg)c#xjGN+P4%?sC4T4w z_%y5=m*KavbtCRI>rx4uVcKAd@#bWlB(A`h-}m(B4fpw^H?9yunp$9Q#!`CD+m|0P z%vkhpSupLp68x$nkrNL;r#Oe_uY`Epf&c-U5+aw~oHC9LL|9|c(9f8|z4>5<^yTnr z_2Xi`jD+H<4GO>iVGN7kSs26+PCRg=8m% z_hcrzX=;Iq6nAFTj!L#-&nj=p-qHsNuB^^2AL=;_)D$JMKVa)(#`I!$BF+WIxlwP1 z+hG{~gp^`x)YD;{6b{1fYs0Lh)y5T`$}~vc5bmO(cJvPz?*f3a=nz{JNqAAOrZ=>v0uw zq4H6dma1~=11LD{52J<}wFaS`Mv}c=sA*X74GG2|*ig3KAk^U&f*NdgT0e@oVuTUw0?7m58+prRm+-&wV zNmt#p0b&1FRf*+?ZWb!m^Cj9=4UZDD*Oghz8!G-#`6v$A4HQGS5L+~JoPzEC=eGB= z9m&1*k&7hL?bNIrEQr{-vQp7)G)~31-a)566LK(l4;ej(eRB4#LQU=aNIA=zHVJuZ zh;9uPX#SGyU5bRQOfSO*Q+ake0}H2_SZ~4RS3f2v&gg!F#Q?tWtuSmHcQ6I}6ljvsBAU+AB^_`d>)l&fVc6CY* z-6;e$>-QGzBvfRT?5((CRaa@TsIQYIBS9rqM3#3ToAX8U4(o{5B3R&FKGrPOlN*oV zm{pOaV>fSx#1ij@C6}V)_-HvbRO^kTP|31r{D2_AuN%n!-c4b za41Jht41OrDGL;H6sD2~H}_X)S3mw7k%qZ~9O2l;%=&F6L6CPzR9Khb!hi zB^bny07xBC3H|p9I~x&EvJzFQ`;i$)<6FNd)FF!i6}$2%vrNlk_3}tj0??`*Sh$^E zL<6UwN+*7|9TEqkqLQ@UM+I21v>FwNur2kX_!=$0g=%(1&TBJpCcSw{4FAe+BMN28 zL+0;0<r*9~ROLfeA1$xd>dMZq zzO3RkYX9wqHsLD_VLQtg(^!-Zc-U#KbG*wj%-BqbC4U?ouX;?Z;Z=&s;H}5$T`5!; zUX)24E+31tbT*tH8tmwtO~wfGB<{B34}iT@G;;jMRwdBk#RsTx3KWpeqg>qV@$O`T z%_XOYgGTGLCCSk_ttTxK+ELNS@#-_$$Y?_+f&nQE;T00hxM+-~QOUQ!kzSW6%yu}2 z6V}OTQ4i5j?9}DYLG4!4NN8s}!tSr>YmmPA97eb0nouFNIK07-&%$w@fQ3ztL>wM{ zTJF}j9!0lQG{mV4Tcy(;qch|$q|tb-nt%~ABDGv&lELb}-CDoT`+p9iO@td+e<#m-0 zYBJQq){8mw7fxmbM2GX^9r{^eHaLNz;~wB&7H5CopU_bi4LJ{{V$gMqRQMBI;4~_O zW^>5P7>N6#gG^L!?eF!&{^Q_jLv6L{#{g0K-(J*Uw z=AzD&+|Z_{AS+cgqA^?y4W6bsOg}|ue|oVyI@azP(GS@NbFN&^gn76)H4WQbbChuR9{@So1TR!ayf|{y;+9=ULiJ1 z|M#rye5R>0a))dg-s@trPN%njATv2;Qda-5XR!CwG(b&`>_TEmvQcXN9yYOJRGTQN z-dA;FnO)0hCMv&K@kV(gjB1x$M*aC8#K2|QrPSz3uo7m`p_? zA#n_jYWA`w>F95;t}P!}>};1X6?1dp05VEO$A`P%B`A*hx4%OxDjGT7cIQcxhvfV{ z9e8klNoENjO^>m|-J;Vy97Q}QL$;rQFy)p%hL`R%<$8DM1m)I1fhM`gb2nk(JG1(k znW;qBW6DNjCfY;;`Rs8pnTkdZ)_olT06E}j{p&crVNUtH#!O##r`0zZ)Ae<-@<_&C z!|E+3kpr(7ihlb>>G{`WdtM$rkcGq8Y&d3NY}Ve4(+mq}<JS$R98vDjLz;bhbPp zqzLEL{08-=`3tj)yy@(=S@Mao#L!SOXPOvE%WZx1kLc2J5;@*_z7m}E$3LP=h(Ebv zG5*Bgk@j|F0{Zk6Hxe50%8k^&jz*SK$g$81JII@LmQ^wY!uac$UYVmx-YwC#R2!-S zl|v=(R@_+n(yC+hZh3t3H3ReIiz&P+ZA?+rD&NA;RU~pyoY^A{y+ysD1M^4|QSb?H zP0G)5sX?bX&>K#n93}Zdsfa+A|0mSes%gY}{7V-}&cEQE(1LsjCG2=IBid#er@KF9 zv-C%KuZgzMKnAvmb+u|5IhOZdC_T7E?1J1Jn6FrDM5VjQdR;w%Rt89n_Z*ogU`2)B9PQ>%NUM|$L+Sg!TqlG3lBNI^4# zrf;e^ToNuXr<`!nt(S=F>c%389HXBc4miY4Q@{#a29Q)5ZoNrF^xAR~vSt=>vV~GH zu({_j%>9bOuU_dQ7wmi=14zd%KkyLh6s!_2X+*dNJpHIAjr!VQl<}qcuHiulb9|p% zTrSo%toR0r{>AYh6=`y3g}AN}wI7NlWl;ndm70+~pD_3lolHJ=S3O6bH5b zaB#t^h*G+ozZY@L)LxOwpb+sO+H~k;{{Lo`Si51RSCCG+%}aK#6;BmI^5M1Oq0L=~ zVU)j~`dk}q>RqJlFn{$5J4`z9os9_R-l`S*n{d;C0R=@ATz#nA?n7aETK5+-Utb`is_7ovymJtg-S-nmrXipbC5&ZqR-6HIT4! zB1do7H3?s4N6eJgjMConplX0p@iY{>3NP&D(Ryqc~;wFt&~~orpVuzJ`SYUAm9z@Z zNv5MK5$%KKPq)zOMzo_Mk%O5BE|TJnbTUjiR@cwyGtunq)J$}MPm=F9iEXv&#{`1J zD+M-*E|^8;X=;>g7D>2xFM>im-hidUXC6kJGj8c^+U1YQ{jI+MQtRF;nxyS5qFYm& z4Eo2$5#li1H7o>01c~Nb@uTHWiRP^yGOfC z3*g3ezh3tp&28)MU3bH}%sT%%-MaPF|8Mod%DYOxUH#+ghfBSceDxibj_MCq@2j>} zpI%+Q_Vu+-ul|0`uhxEP?Tu?k)`r${Ya6QGUj5b5-BmxSdaQCy)u+n_tM*q#t87&} zt5%oRt~zJU@7H{9&6n4F{Ngpa@>b2BRsUS|>ZLne6HsDnpBOqW_L}k_Rj~c&84NkBHOJ@E7@k9+)}D}hy*uV_v}Zc1WK>N zDoLxEq|zwF9hs)JOj?U2%aKX~J0nns!^q(;R=oBBf!L96X`;2TQ3D9|2!Kc2ivrvz z)Q-)Jz!mp&^Po&ck$aaL_DKP6Mf4F0HxiEION&M8{SW{Uq5A=#;LN~sV2I??Iv|qd zn_J``qk4J@G6EIU0k43djtKJolbKBcnMwhto%nEK7WLMFPK-#gUY~ALvA{bz4QmQL z3;c*91I~%P4_0K~beTu#7KamJ2Jq9sm)Tz&-!#gHXByKA8Kn*)K%<78ME<`4!8obX zca;w(QC39{IA~Oe_W?-;2`TpeRBN%4IzBudK{QG+VTEEd)7&5YR(qGyvH^weVQ38j z(SmjlX6^mi5Yu$e0-2Uk2PC!ui9#@0qux*|ncaMjLIuT*q!cU6Hx2`0<6t>*Fl&Zn zD$1Sb-GIK1U>@GopL`W4fKkXfWH z)=H;T)O*Lr0fwE2nHVJ@(3rlaS?N~Z?*dqlYY^c}K0q(WNLChJgK#v0QVCH19;>$AC zjb(&8U_aoo(JI{+#i|??%FMX2d=W5k_fVwQs`pXA9Xp?|u2+5xlNZkBUNAj+1K$L& zejIG=RSFd!g6E<)goOr%hRZ#RW1HRhrv)l}8nE1Du#|(z{Si8U;Sjs-e-tvzoDl<3 zkAU>!;83N{FzD(}ZmL?KVn)Hd!1#tUgzhO{c5tZa9|{$KNYwX&x`rumSuc+w_vvZP ziwcziDid~TL=U9}oaUa6^!D%1uDWx9ypq#K+o4cb%!kt|?2RZWHZlW;4?0V?FA(N| z8&bVj{;e|=Nl|&|alBmdY3 zCiEeL3_Yieh_wztGBiFbQxSoicYrl$2o^A=U?|2Q*hXbv!PW^alD<)Nx%B$s0PCA= zyr^l{98xpHY3Q`d)DLSZc!q(N*Z(g7Vs7z)(*f|l% zMgXg2L;9KzfVv+CcL+Pz2LPk~G&FInpc}UQOjgsU{20B2sKi|gXATZ-S_>epFSjmG zS1SIXZBVGF7UW?42$}bVJt$E`Wkq^+!+i=BQQiC9*pRfGLO*s4O8$l2`BgE6jH%*L zSQQ69>%pX=)GGYUb-!Pr!uN{l2HWLv(t-`aJ-W(Cg^E2#i^Ag812+n4BSE-%Qg!8YM@N#e}hCnJysN*wHKv1i|;#h>oPJKvI%uU z{Mbo;)D#3KK`rp4)ERC9w2p}P={Uz{>HVW6wo(_F=og&#wnB!P_wMsQ$f zMR1Iy8SNp3iYc(-ci=7DStBf@70#};pIo4#v@V1((H+oR;X-be-=s? zRTlDC;xNP^>tL!&6*4G&;1S#sQB(xW%t1|Js^=9dRwV=$fxL$&3XX5=OpJKn0u`GG z3js|hUpxVzilo`~$}&MKVreLJNJp#q=^$kgyAWbZJ}UnhU11>>xQ z#*7NY0L8*jH(y@NwxjXl$Eur4?}t%^t+=BkQof2BRjlNaZLq5J_&f5Q%oyLDAJADQ z#yl2s>^xk_ZrVn#h|6i@xVIA}2Ikm<8X}w~UQ(;N#47jOU!R7bsz}BAt@6`Hc8HOU zP}y)0N5BSHPGD_OSs%%hxe9RudG#`J6}fn)SktiLTkucTGUVpJbng96PD=9WHnF-9 zb_y&ugb}nPp9}Ka?jJ&)2`N;-(fgw|v3}#qZvgyo#zUODPHDWjYZr_czQX{!Re;n~ zS7BU}LuZI>E8dV7T!OSVs_85-(n!<#Q3ewm2f70G6bjf-JBEDGe*7%4u6~6#NY2~+ zpDVBw<6oN35v!Z9y{JrpddK5rqMS>GOk##!!y8Z2>6Qg~tnjW}G4_dbPB|s5?c&|F zs++uW$$zc={g-^{#GzJLaK3)7*uDPBQmv=rjp|(0rz@W>^OtYYTuHrGabV1P=bIM& z3IiO#)`y3t145_SJUm8p1~81-fu_|IX4kjQAQ!)z+a!I;Ap%X2T%D!C1_a4AJq|lRFs^UeV?zC=0j^eiv)=;%aY*qYJmz8Kc%d4w1W#?Aithuc6@rvI`+wX68 z!U;0J1s{=pI`HF!b9$FC-5(Bm{YjLPZW9qPV-st%%Siw!_<`)!mhQKS1IUq@Z^g>V zIZ{#EP~5{#>Rq`htI@)s$X?+VO!*oYrd&lU)^H?q<2SWPX_tt|#esR`@+U^hQNPJ4cmF^KV=U_D1scJVi{9Il$77&;vH)9<~eyoVl6VqS>#W++syT zDjM1DKsgi&U`7C7)*!uQMQgAj0t-U1A)<`kgrK+L&hPY(n-f4}!yGk`Z+l?bRny2Z zPwpb=^e$@rgY771(GL%sdRQ*biEaa(l#S$wSFEj7)5yVR#fzkWdFk)?vB4P20{Cpg z++*$=>W9mXZi87rIqf!5IBeF#1}6G68Pw&jbuu->nBi?u7Qw{-FG7;rZq z>J@3}WZnQ(2udI=NJdL2LoP3Ja z3X7IoFSF%~{UYKrS9}GzgjafrGc0zT;)woqSiF1XmEHNiMU_reP&2=AP#nMkmWHWn z5W{sB?;eAQkc2^EM&^mf2gRBVE4@PYKl4IR(KI5wh+Mh<8jF(4ZE@xyT_ z1nACbi``*!zI>js>iQ=~JBA`|7b}a*NAeIBDjGTZz~wt1`ha)|U^(V@;vkU+6v_45 z^21#-Uj5)~Pro=Mcf>x4j;Kha?)Ec_C^e1JXD2a;+F3p8bSAspJw9J%WG2MZpSEe2 zKP3mAT-$c&4P^NsWC{bH^_jvJc1mXv9A;mx%gf6h{_PAptfG+bkjQR zxh0jF@03*j5jgF0TE}XAd93V{n(s*4M?dft=v$t79UWHj5Ei3j?%Dp4gw7qy1tL5- zaZud2#c1S~r3Ea1i5!bQUj)wBBo)3X(x@TN{JEHEIjtc$>B<0+FBKW=9^mq-)nRRb0zcWeXMdSeI84U&E!>mrYR3JP9u9#~b%wi!Wcft&4dc(Qg|XD9(+>sxO{ zFIA5zrnM4IRC!25Dj_#dkvdG9OsFp~mFow_Dwj9KCzwQjm?K{~3{RN)skG+oxE;{^ zEII2=@$5Q(r*||C=k*vrU^4V{jAlsuPH{)A`Y}2F0)Ga%+;aH_a`BJPIG^n6*xRgR z_}nFKErmrgw25rka*b*J91KYg61LB}yirD%1lIT9fPLI4$k)d;cVMDaG!lK`4~ro> z8_3?z??0a$xkG$Y2?Dva2-;mtFt~74SIMPvw61+KFt!n`r)2fUGDdEO&AW76vCQn~ z@F1~j598S#S-SotSwZca)*svkO3I`)NY#X>aliDXCG5+sv z9A+!OLZjvXy&JzNzMA+x3pakAHk*e1%mGU*JmoARUs-4@xzCDi>)%f#|Mwl|CTZ^L z@%@_94i7E*?*Sy>OZi}gfmx{NC4pH3*LvDY6ZydBsQ-SYSCB=uW+A^ocduC61XBxa zAn-`R(hM69Y#V*BH3>keItCqgiLiog&54TBM-L~^u_%N=Jv9su zB3~P~M%*BiLo}xxcB|=Pdpk@^5hYIXsw5+koqMlXL0aw;X)Xoz071J5!+@UWVO#Bn zg9;Z?Y~RMySX7caiBhrByX5%BFM7!n_nq>9ZT)ibj*dWo<&LgaH5E1VwJ)!rhDw?% zF9{(<=e9zWJor^Hw0=j4mO;wjCo1o&_|B?dX?B$UgPLKgi*A1t_NeT2Pud+&eVm4L zkKUJaScd5Q;Nr6EDNVOIlU#gj`9|rD(c7h$>%)MCmt00G<9Kj8ar_^5bfz3G-NH<_U}A| zpQs;0A3xVeKHhg?wRE+FV1PQK)#exmc2+K&@(v|D2#73RlukU1V@pLNns)(fT|~g? zegx-ri)Wsq@W{tfD4ywYcjmj;350Vc$H?3*Fayj#idNK=r3mKe02~#rUc5wp3_lZGW+!L7c@#Ly!Ad@?vz#*cd zK{t9s8P&Z{P|HVnz6h97R90+`iGj3!WSr|0*#ZC9gr3gMM)KHqaaB~)$O|)PUMMv^ zEh0p2)SR&gxba!5*J3hSJD}#^`zX1idQ6x#%@;~+t^rajvFGnpdI_=NAtku-o`kF^v1IL+9&t04pPt0iFj8 z&@l7EF-7~@NFM(w4#<^XAt$ao`#&QP73ZYs=hW_+a^Of$OrsPATmaBJ@<~{|kupe` zW`|j4u;`Y+F|G7Ac{P8UmlS?}%7d=?7nltd=P6vd4OLXlx+N#6P4!-pLlr!cum4i? zellK8%HI?RYiB}(Rtr*)`rM=O=oHgMm_^1S3?cSonr{DwHd^v`ss6U|+W_9`gP@b{YbNvW zopKhM|AARhi`$|oZrF~ZhdSeu{clshCuwe?wdr-8??C1Hml&!|m7pwC3Q$>|ieCaW zrc~M%`#Vi(G0s!?kqe8b;xOY%bu&GBk8#L69k+R-vM@eU9j~oX(Uf8deo;AL%eC=s zIMR^9tQ={}`FernC(7b#mM36&6S?@w#wzLMvN%qn$UJ~ml=Ic%oF4RZE|;^z(Gkhc zX5ekw2oCNoM~_rAa`1X&nqK_!^jXr^%4s{nd5Rn(TVMzLX}68>TRQuOhI1y)TNF(w zqolz>t)h{--+Wc6kWgA0FB)Gv(Vx}DlhHC942*FoE5xE6aL^Wv$^8lMj@Q+yX{7M6 z+C9=kyK&f4m4<@q$ag(&B!Wr_HghcNO1sTdD1Y@%WxTCM^;j-{MG+lPfAQos?*%ed z72meGf8I_fso1H>VTQMIt_kOC7t6<@14((CKUIansc7W*)ph`CdA__>+O;;0_|AcO zUgBL|McuLnaq+& zGLw}AGLr-XbS=HH_rC9Y12Mf-Rqy)>GQ^0;B8y6{3qh8rfFKe@3K1|#$EWZRiHe91 zktoUo6^RRq3;s`aRbr+x{58rq-*?Wf+f{cx_uO-SKRw*e0ua-)D=9#o!%ngTmoAE; z1At-+r$bG5C|>-lYqNKhAUVYsE~5Gv=$wGyktg(8S4Gwxj#2U z!3wzaV54W37;NmZM_25ZAk|tbI0F%zTx=yo&N(1%FANc51}@Zz-*g^dOHHp_ss!4d z#{UD~E@z*tTMr)&2VVGK3)IYIigI_L5E=wWP;T&T0T;khT8LxcZ9$#&@B7{BH&EPF zFz~Jj$4t@qJwCR7vEkIQ&BECB!1Wb(75vC)lxM{waB($u^Jr)IouRV^LVedt9^rsx zZim_EJj4M7@i$i{Rl1$TEOgxCH2KT{UzVReyDoxX5b4m-+jqku=%Vvx*e5UImWDm{ zLr(52)m=ToArf}wnXKQW4``#-EVmENY#>yMlQRCbiwi;a_!|B`lfB?{$|affTXIzm zp7p58jaIa%D)N2yC_g=A(_O200}5f!~$B1HkceLRG6dY z#}`WhFk`Cg5}RRvHb(&#ulZ0HoT$5uG*hGv7dIHl5CJ2;_#JJ zU2j~>>S{)CjZ>Xg*8=J`0DyD5DSG`(YHI2f-EpTJfgC%ivnC7RXEw=`WGZe=$#V%f zA99c0u>-nKq=F2}XO{BIeH{&-Lmj{EEc8eUqt_3t=(}Y6+`(TBvtyTY?*Cx7uify% z{Ka=r-pG3Jcs(S|*R&CH6}e|&?fBRQ)XK?IRKN#u9{c76;79~lD~H0v4;MTi1d3I; z9*@eZDjCya;0_+Pwpj(tZm|wPrBdg!RRs)@sf;S1(P0KzNWnN6%IJ>q=o-c z1SNjXnBz4?6N}f{Mq9cTw5pWcU|Y2rmr8-J`J{8XxE$XD4_6{9+4nGLkoC?(UErVY z{7HHsqmk4R3UjqlDkOq@n||XwYI;JX0t}(7a7lV@E3$%Jb3O&m8^<9IEsAekk5esA zkeWuoZHQ#^?sTU6g0T4jh0VzZyr>*-;;#Ky_UH=sDF+2NHZaTm|C;56W(g;CnM5&C z^p)b=rm+%fWfbJ;Ez-cJz6NM`D%}7?J$zuAy;}wg#{4J*dwxc8pr?08@;k|k6K_l$ znfUs|T@%+$lq3fx!V~I=?Gsbu@1pfbm8UIyaCvgMeYtG;hUJ4}zZ-jT?3-ivjomWV z9E*;b$FQ-rW4+7XT=xBC-&l6fvKy9FmR-6`w`|9 zABJ8YIz05Hg`wMqt{S3;oI{GC(}soz-yZz&;DN#W25%W`4(=K>4`PGs2KxqnJ@CVU zCk8%0@Uel~z~uw_fpZ6D`v2MgdOskA_21clU4OYh(y!@1tAD!hZ+*Y$`=7qA_I|6O4nUVYbt=%%S=Ni+tMv=Rcc#p98U(l5uLZFmXg*D-QrfI%2$k( zL-GZcRT`(X(Xk&1<&~NeS+Uh|O*zwGjEVCf=F2PE@&u5H7?l=HI^Cvr+{qVLv;c-L zlP3ICqeHGNW(*e#@?g7#N!^Be+>s}h5xKTskozqmEEZvu)to%;_sb_1_|LT}Y?>r) z3elFPzLZvz(b$!i zCZlOoQl#Ab30^KQnw)qhT5nnE`j*xf)2@Fogr?+#v0wtXtB*-%Ajs|t@=Gn)v$fyhRp;G)B6S&pd4 za`=MpZJ~SuFbdR#kii^@`JIlWCc1m%VRBG4cl>wT_toW5skIQB#Hk9Rv9A`q| zjN+@S`!I>tN}5U}5jR%+L7S>z)@9{FX+wglht27RQ{j#jne$&1D%UO~v{)$+FqB*o zrPraH9^e&3%Tgt6A-H3+v}!dXPLm~mwyN*!Uab`e3?qN8+Db1J%lTHgKgJiwtx1AxWxRQ{ z-s^SY)RzAhh<;*Su{9;bwdasg%l2pAlF75Sjtq3C1eR#E)_NF_^*`)+eFb~cO^|p zog#MTC;8G+n^Q+DP=rdO!3~vyg22DS|Eg5oaC>BBhc#R_NG++;gpnpyC22C>Y{`=m zJQR!5E5F{Y2Rf(`A-sf2TW>WI;TnDBad|Rr#GH<7n67!vkh`%-CX|ojW=tAV$xKm~ zY{8OLP5(|%_zZQdZBXj$ep4ja#76!k$lV?(Zfff_s;DVmg5)KBZduySN|gvWWek|? zew93{&2``3(zcmfSq(viA{J%T!eASPYD{GkVAIsW7Vg(N6xeJ4*{lOL zTh56^3A<2>%Voh$#bjEiDVp)LqUSF{aYxf%i7%Aft%AA%Y!TBvLV1<9iTP_<2hnsy z19WzclrP_`R((cu$>7R2b@mc*;s5Z(oAFEuvzoI-nK#qM5)AnZp}5x)%f}OLjhap* z)baE91<%s7D9waE;0?D`Ov1fkn(b%aie!iAQ-fK#yEV^2& z*`(yLH9G!B8}@*UX!)dBhn0+Fv*h@8US4mLP9lz((;+66s(6SU{D8I8Yc?tAO4M6% zTFGeYiGV^VPc8VfIFaLA)1XyGB`5`zt<|xBV&%{I`YXj)!XNe7LW;I4XI5$j zo1~HqK&*gU8V^X#249VG9TSSjLn&pbkSpb>hSwrLD=&znDK+V}R_pCVH5?BP^$22s zotB$S4U?=C)-2?y)k*$s%5HU?G&6X{ByA;YBsTt6L2jv2SPixaL)c}hkxJ7g{D>_R zWnd&R`J**y)8CvDdZg5jYw=Vq0ZhAu+|io&Dql${nza)ey)$cQG|M46>*rT?%RR-PdmFGaZ07&&I)8^5S4YZUcbQK|=!{#x{cgs*$XH-RAUZ~e7 zEbcH+3SHS+mnlsdzMewG6>0{{34=u^^V+D<{X%hXridFucG!?TMo-M%%sim$4qvoWx(n?5#^4WAGNruW!pA9o( z6?Mky5z0pjkaU}8Y*9@^=P#yryu!avmTamVYOT8z&Rb2{r2W(U{%^^Wz6KEm?ihcq z5yGpf)8FCi$+U3;;a7WOigvwjD8~AQ^$QSHG-Naok>UlfOD$LE148+nJc`Nm=6sT8K zG;-DH!Z6IJf^s|yrh855Q9B6L-1qnoOP5r3JW(|`9T0(}&8&ZmuO>}n4I*Eqf^I4l zvet1)MUcnxI1$YUDeZy`Bh9%)|3?LdzoElT4Nuciw-h}=!iR+VEfFv6GI^P>SL#%x z6kia;2HG!+y5${C zq5YY*T!*DIZd)N1Eu>ZS=KJ}In3AebnvSZaFitzGi=+)d4KGOcAoIS;Gu?8OKKBwWw7XQ)8PbH4+pGIO;3t-X!m=* zZ5$))6#Ie}95HJ@aH1NTa?lAZld&@Xu+vylp=ck}a=)5dF(FbR_wGVB4t0hd)KGv+ zV?T8HiE2WPs+z{?zF5^v8O%8w1oLoTWz)k~iF7EccmFGxa0Pp>p8vF6Co0P|87XkH zQ8hqJv^tue?i~rxe0$;3#5&-D{=-&uOER;9z0}9OmE%ws1-R=Filsx58j(-iEiz}V znN0!9D0rFB?@Zw766*l&>1%)>@$KMB)?((|WL1^YpTo_HkgMzrw=l1Ycds3=z$b}x z=-~b|Kt*YMfX`*+zXo!V1Xr2c!)P^_qa{zk0oUb=CcE{(Rj^V?o_viVD!2FPBjEJ2 zL2at#lDB$>de-&yJ=wEvtU3DBNdJ&=;AY8NAO=S?psxx}wTf2JHsk8DEzyq1oN85+ z9}<_kpxwkebl2DqfYwU8a~1oT3x1?`9Al4#D$j9A8646l@21l`A(9hIOFhk~I#>rj z@9r4e;Q^1DNQLhD!LtB;{X}_&z0L#9G>GA(p&CAh(?cd52`r{D%2gqo4f0^XmY*MA zEbV5%u-^~DrO*^mZPZj4W)Eu%2{RL^$I$O0&~L^tcymwDu|M0PHAyaj1J!xw`jqN~ zQA%pO2_s#%Q%M&Ex4lMXm1tZD_moL^A>jfIQW$(DNGDBuyi%nay%nLhj@uRqfp?Ic zXP-Prdxiu(znLCD<;$pTlc7vdl_OkOB4!R$f@%lvUVrj3aIcG00OE7nJp0X^XKaQW zg$b%3owbwNJ_*2hIg%`SA=p7lY11LzMcLR1J#>m{>Yo02_P|cKC}OeaE`MIKrtj^Z z!5(AJ=#k-Hj~jc}jNRB{9Qwe(eSL3p4z9Dg@bcV=p2N(BxQi$%Emc)borb7n)h=po ze6f^^N1jJlzn%i9yFX`Evk&b8XXOU(Ar6zV(Vak;yj53{`l=R-xUFQpltp7P@bikq z5T13#R&?4GnKkUyF&InzJw5$@WA_*T^5^~ydt!%DP#qsmXOR~xI!qOEhN{x0i4ZQ7 zEO~HxpQ5_!`dfiLEDuA8yZhvzb@{GKn`C7zPNk}_Q#h^qWD-5;hgTAb0YpbS$Ib+} z$*4HQ!DsSMW9F#5f`=pFK)_ni0oN7!?=<&8i^XXFrZHHeY}*IexeRy9Av?rDUGjrj z?`X-Vb~8izfwf7;T98%)wtBuntG-5Qlb6m717dq6m8R`f@j3 z7H&i@sZ)UXs&ls>rUrhWOD2X?**1_E1B41!4TN$msYQ}&-U#qFp=a#L?;D2i`T)n4 z1i?QLdJ3Fg0L}tgm@SCc0g@v%IvNK@d8$dRfJR!X1bgeJK7729hK@H9q!0td2js@% zeyJnKA(|&REDLD zl9l?NaU;xr{pj~cW`}kSe4%%??>F2Ua29tl`7d11OroNU;_+6(ne^%zycI(_I8FD$jg0mZ05sonK@;2hjSEe^E)eyQ5h(; z6x>LhMnAmOAfnI4Dy78?_xDD~9|K2d>Ij5y&dTO3a(9%XOhZE~Ws&#Ot66kr+wPCm?L( z>jVAl-s`w36o)uiRes$HVg_58kmm9cr7dFgDj0O^dgutT7#)3fYM!;-0GsG!C8D2Y9!IAiUXH&j3uasm6=@3B>3pv2P1`c)lDoN=6N%CO2VbAtd-`?#?C0*L z0${0i`c6~<2tScHna~DXZd0I|0Fp4MV$~*s1ZM7&uiHfBx|Dn9Rd;F)`}{53;B_8? z_z}T)NmOZf3e$wLX0-;d6&N`>=i|`qA~AIS6>!aVKeL9t^W&WHfh9{J0&keCK(bQ{ zII6O}pM;MQOS>GZ?4_TCJGu3$js$-6!ZqhZT1c2tg^L87L<0epDHD^T$8V#yPKu@M zvD@I{yH`P=^AUB{RD-lvBSby`_E8itc#RZlAb3-e7{X9?@VgQ^@YL-C?EfOlB$={9 zQj?lYX6jO9$P|mmvWWaN7*~tM=;60dpJ#9SG&e55v<8nbUA5u9k}VC?%fI~$yx}R* z-OnYqv9`}b9MqJ{uLID@YS3HFxWYkij7In04zDK?gIyn(WBc|&i>&2`kglh9)wpi# zy3yxHRu5e|aChIYdvx3~btZ&8be4mu!VjOMlnR7vJ}MgtyAA1T49UL_AFx=8jzxBE zN2BKhAn$$O=QeduX8_u~*0oYJ_9XZ_OhH>XB%{K*db~S$(A9T>nJ?C%W6ykOJ362( zuV#OCCsz^C8H0)xYh=)QcuWyuNWBv)hAahwQOVGX|DxunP7$-_|AN8Bb>EGjhwiJ? zycQ#&b*u6%ohoOqX3%#&5A7oogHZv9wpYI)>1PXn%x;t*-MtWorRa>p&!4|W1wWr` zW05>jlG@F3cagBG0cQMO`1w=B>|^(WS;YPPKkuVX+aT|ZKo!DLqcA$ucu1%4N24`a z6*7*YifLrOAI@`u#X2tI7(z$h0n_y9d#MRDdp>gs`sMx9vGuYJ0Idpv67dxd-9B6dgc(71pm*m{#NoS6EeOW>mR! zD~axV5SmCN<|)!PzVqQh^xfw#vmx)7sQ0E6AyN~^6vjLds7mQ#5l69y;8Bs7i)NW) zpLhtS#Q4BaqG#MZcGKt&M%E7{I78Gkv|$f;UWyK!a4jeVl#%CQ1sS9K<0G5BlQnE=R^2B&Dt?ym4d5Oq&(x=W!Uni=}|v zyJC+0=6l)Gfyp*W?U*9HCbNy8se)FHF^Y;Vi$0r#uM&wN_2T1j=3alr0Q=V@1!)_4 zeUnL&l-5p1b#^r!RG|P3tCLuaj;MiQ?GYNz4jYI=911<3$xl=gh9XG@+L*?b)#~LC zLz;qL6^UUcXXkEvenmfu*f(Vn_L7yxiUbD3qfY-Y!*V{+k9Og`wG~102s7H5fs(#7wko3 zeS`}j(-|P03g9^)ei(wt8W5xmctemJ9DS6UMb|z;EnmHK5wH|xf~ANqd6YB9ba5bJ zRCfXR0FeafQE0$(vw*SjC}$-usYUzmzFl}7;9%G{dE9(;0D_mDqxsbVRuI=tfMdmh z@}a7COQWzrO?QJy%iO(c5Jq}MVrA4p)WKGvF z1e1Qv6VNR7b{D#kboce>j`M!rHeo$^W7(`)TcPB-e_(B_6cAL zLWTllx&caG1BOBKL{0t3@Dw$^dg*fL>d50l1MR(<8eC!EEQ*^(Ul>_8w5xaRz!&;{ zi!QlCe-0oWbXLO%Lt9hQO%aIrgdNsY~IM*Ws``_)}iX zsfFyMyuIL3Ni7PZO{0+?Qgag`F~a(G&#|!|a&|-65QAt0vrguz%ZeUznnH(OfVm|S z!vSmG+o!6AwmFTbq=rbY;IXO!_Dxo@7eF1!5rF_irY{9M=wp#qq`NaS5oCWg}l zPkhVk!95 zEOTuCPq_#~lcNkCCvD1<}D5VEL%M0^Spm3Soc#8@KSe`q_i8z$$jyIMy>H zd80@224qTqV?+WDu$%h6(X$@@2mc1jEOzADryU z@BM<>Iw2PBKl=H3bReHv#j0Q9+*ZyG0A&ajs7>HDBt5=*C6rCan^tt}57g?-xE$bl zPIla#QcO*s4a4%HE&b@>hnQ)$^m7=Su&J(xH{*Bd8bbwLL?cu12JJRuq>7raL)VF< z=&t8?&appuowM1L;e?)2k(!vX8L8##N^V`6M*24(Xl$_xsI9)r7vZ+QdSZJoRW zpeC@FbGB)cbgFf2r-3e3W3nQokpBTH`RALkcrR8Er$Yo@1^x9m)Oz;ujaz^r)cYH1 zmfP2}zX5YcX;fA6q$^S_Rs9x^Cf!{nr_ncl1G}e4ho;_mcq`lgTW)?-93DE3S1>ba zEh@Bjb(Ejkt+&9RD$+rI7dJ`Xf_4*JUjrZL8I(NM(|5zr+2e+>8%B>v9_#y2?}nZj zXHQyshd;-{Uk_}|&dwR|z5H5I2>TT^#z2+jI$yR)!I_EMtuA{TT5YikVXsH$_Wmum zj(zHFIK!^ncw#vUx_wCn5sNgmu8hWANGH(m{{USj5+lhS9vH0`d~F>||B+HldPgMe zv4b~!7qA*Sr=6&acDwuprimJ@?nKjQAkc>2!+;b?(ZN4V&!dH{;7j}X@44?k@WpjU z;5gagAQJe|BTdSZ2F#Wwy&5_X_i$0}yXGgwV#rate;e!kTlXm0;UFXUqomG}sVi`K zS{Kbr^YThOhQ9cB_#}}S?N`xI=)QtS4P~P!aWKWeqG&r%>WOcuXWl zrR`Pdx%a>fo8H;evlILj9~(U~GBb49z&(9$^r9*0ZTj0H^zuoI=n@EFFqm(;S-8Jil#-{nQ8z@!U3Z(}-h1RVbs(_^V+nhJHUv&rOQO=*V9-&a?Jq(6oCe z=@R7T8PWh-*aY_+fI~v!J`TW_@E^KvlAZ&Cy(P5Zc*@KOnHiB4^ymx+b;*$lwliH& zN^pk)Hle$Tu2@0OuUb+Gs1YAJ?(DOzq{n8!B?riWfI}Mu6w9^-lI(#B%NRg~mGnG# zGM7@G9wf6nqIzgsRHPzf%oziC7e+? zd%~y$^yH<0L{V@S+6FKWPt~%L_yLYCaVULxQTEo4`uGXNx7Yg2I@Z4hCI(cYI8jBpLRleFqH5Cl>6Y9L6nV=} zhj}Fyqhp`H0c@J9(yQ4Io=$^HR@ONW>fo15V_BNgkXAzpLWZ02us@9+x&S^zBu3ba z5PSaik<$j)u?uO7WK!j9$;~x~F)fSR>N!&kQ5V5eB55~S03G;hV}Lz;5q$yd#$-nh zzswtp7E$mF+CN9HM4#G91IhDZ6>u2_=h#=a!jcWkJ$Yie&r~gN;ct=Vn|?RS_FFd^BK5o{qy3FOs5z?H8dp@7g+mHeGRRKl>4!KA$s4FFCQ9 z1)Awb(w1z;jTx&w3HXVx5U{;0mUf{NStZGD!WW0VEw`&`_@U##7UfpBQ8U?+5D&saPuy76Uak08qUB>^%eQ zR~6g_)Am%9G9oFBC9*MH%x=tbb7|FPl~N_c$&<22#N{}w4Lf^_3U=0Yvd#r3K0mFc znh?zuGWdfHnbypW%xN@mJ{Tin&5>iuIo5GLw>&sIfSVvpZcVCDX^>>iBlS26u^bae zE-8G7Sd8{xFbceN-zte6V7z`P%6Y4t;H^@0ww>r?mC6ly z!i2ZnE(SB25E$;G@P1E@(JLoUQ5`7_&h7ndbmj!A&k?kJoZbYzy%p-?lcjJ~Mv){8 zb`xFm*{kj(Ute>aUO6RJsn~tv(BT(xx9dze(NdU|Zm+||WMsi}`(v9`M6}AE%57n1&Wru$>8ROQX%tbeIdYD>YDww zcj4wotb^zgxTXEXyHLk0*B8SQE!P(}jovTO4j&qPx&Ph1b==9~ESPq_juBpx=jaa9 z^4^9~CksSUZClbppmTT9v+E%*^`ybKxC}aY?7}(JWp&x0p*h%%jurA|dGw9|Zm!3P z0v+}llL|crq>h`uO|L>Lll0VtNXL;n&Y|ML&RSG`@saiH%}EGIUH^fO1>TJ(?5^SI zL^KMFuMNg;O_)+hm4~HTBt^#_{iuU|A`gALaZjvchSuY+=#3?&9wmun$Q?^$a`r5N zuF=9s7K=GvD;xXutG+i6^Z9##5{&6#KI`q4WSP*Ytwf9oDoLFjW%Tf{Sj+?Fyrrj& zfVR^yaIM;<8ZU%oaf@ALt6>Ra-aw_0$4GA-Uo1qMU$5EO7mV;M^g5TH&G&jdtas}P zzeB49UYnQ=r;ySN%aBNnjy_?TXZxSLY?H7IJ!*m1w&ns3aN%l-V64)Wu$4q_Ti~_D z;x4`z>#))nO7^;F!<49Jj`v#D^*+5O;45f6^kq|)P{L&=%zkOYnr-SJZi?^m!yb56 zq(f6rLny;7>kGiqy4OdCW`b}fo&$V*&f^KpEkNnq1i1SwU&C5IJ+*4d5?#v)O%8>d z{}!F08Q{!4jv9c&TL)(>5M%&Uw*?>=BWeD3;43FrE>#3QJk#FFzWU}pJ0xgZh+Ylu zNC4f3AY{M@2S9H~^#!154wnS&h|{wuAL1A#Qv(Y5lKd-t zUAy353AXSOMUcDp)sqmp0Q2fHdTccyfkPrb_@L7qLq`{lItS^Ap=9Ci|wx z-yJ_X{|ahV zcP&>g-?V&W?AX{#V+RKVWB2!l#%>*J9ZwyUJU#JzZ(*!=BE0O)-e)0+@bP7LFS~wO zd0AwcX4#p`R*e2_^tI7v2j@p08NGe>atPS3U6G;eN@)odXXI>>XGbUoH z?Qiu*`_27W|C+uxfyU|azPtOb?<-II-^62_*?-bM$-6!0bZ;Bcou3;VSfF%jyM{27 z=osw_)}zX}^ZIU(C#9`BZMY(1sVaP$ygrn1?&Rf$oHl_02We1-we&V40Q2*5iy>Xc z{jrL=rp~%*jLP{vp?n6i90C?86)z^*eyPmy1zt`RH8@dOF#DwOw#w}>XLq=Gg}o4x z5qZfWT-G>-~;d}OD10-Yx=BL-ImKD>ZoBCU%Si` zhR96|X{IU;L!Bl!-6Pb#qik|jGJ$l^m~tzV%GG?pJEf^f;cgytxSI*NB3Y;OTPN=9 z0)b*$c6TPbiO)%()EO+q(blT# z>SVBrCCB)55K0|r1qoHN=1$5q+OR4$vrVWbpsy&~@whjVE=0%$^1|i(`>1N=79n-p zS|%l~b|&!iuHnn8Ak74;w;cYeBg53QXI~-|SEeCQ(NiGOjLZt~V)%CjITrO|+O#iU zqN7rqH*qE(bWf?I$}Co88qGpeUugvsm$bX(7bs;_(;&jiWF(kXd4REX+qd|NlvLJ7 z_!y@>S7Lmxt0iL7|ExE;&4fUc^l?hEiMZ+!?6qaB*_Izu8?~% zSqPI7?q)sgqs|l_kTr-Tk(OGjg@80?%*Jf*@%76}MMFtv308B2&*718N(tgjzU3-P zeOWaVcIu6& zmjnx@V1S68`F%kiNT;x9m7y{zClynvM*M=@PeZCtTA7w-ZFI4vSU6`+P&lP>JeG!; z;;cIKjB**DoIzO?m;w)3iykX(b~#+CxpjPbOCcE~q8W23M-`kFDXzXnkf)nA!b7J6 zo|HymvtZkVoxoy^hY4f2t!cFrRy$;i@M&!eltmjidXxqT{KP`OLhNilnUS)n%TdCR zmuiwkJkX$1XY#p&l({9#k-E0hTP>{XjZ?9e5GJl^zU z(RM9~yYxgpg7=06xh171ONE89z8t62c}-dq=M|=yv`SjQ%538mx86-I;}do%le472 z99{?(vcx@_VrG=jTBb}!pB&F*ZA@0@W-K_lk{0U0YBU)S6u@BcSgLjU;v4x9VJz0O z>2N5KYXHM-U_mkcMZUZ-hCxq8QhAlKm~u4JT45#`jiDGBjW>1fkfz*>CssW#)T7ZW zs#U_GErqFOh#cF*S7T_TQdnE6S8MZ(*>5Ay`KKUficKPJGg~V`oxE*PPVwV>fima} zeoSczQ87aqz%b;OAmIVRV!}c?qh1#&wg^3ShKm1PeNCq-lEtt*>c@*_?DP>qoDTWR z0ErL+xTK7cS=Hfd(WkOjqUj?QK;%s})v*=A+v@}1qfjZag_;o(oovy5KG&Pl8!Sn} zT5*-N;h2o7L~&&|J(1Frp*9Yg*Ji4ePgd2p^FOMq)#X6aT#n>p@>V=Cuz~+kT_kVD z5~eyNlBQiDbG+{vK^_cxiGoU6Nf%1EUzwV%^BGH&&J*H zQY3wh9MXF+6Rt|H6cz_oyuCm*)#?D_chF|4(n{byvOOlylr&kcgoqlZ@(}yv1RbPW0v7B z_MJI;g(TGf7tVun3HTWt9S*C7cc{l>)}|kC*xM#Uz(Qd}4B2jiGq+fbcE2Uv3XbT^ zD)y2SzPJnf5;$}~ODWFc2Pk74On8nF!cIz(c0w0)Dn`LZ=dcR63?kSK8`0VEc^>NEvl&7KTuBPxclm-csoUDvTrng)DWd*@%6P~l)G zq>;snyB3M-D8Vc@%;D&XP6dl?B zAq>6!;N}VToiq)EA0h{a;M~|G!{zdmFNw6Ga$QFUL^F-7W51sTH?QE4yP{|O$nx_f zS1h|{#5eTRK)UY-9G+5Kvhl;dec;m+z~V%0Dm48jpqqyOpX8MjmFu>>;F$SQjlOIJ z&^5vl92qP4tfaftkY8~Pc0!0quoD#XXZcgtqgB)?K=xz`YgCS zSfy=56={N~8J+S>DwuEwXb6Y`zuyBTdU8^%WB1>(;cF6fb%ll?()#db^v_4=p)*$O zI}@0}H$!bRK$u24aG>?fd4P1x0ht^eC1xUnUTx4@Af@0`Eh@dd^J28=f!H`oHtF|6 zcYU%+?_F=*w;h-<&gj1N;@*cbQEV+eCfMhzsofG3yn+sMn70sM2ULf^g$IFkfWZg3 z9gt=M<7o!Has@pxy+jFAdQklzuxfFLa_4;zTvqmWm*fr*UIDjG2dp6+x1J9|3&EW_ zgT@wU4rhI-B3x)808IaK%NF#D57O_4sdvFu^j*OBk^ydW_!=Js9s;_J9lio0?3(}j zjrT8tUHrYn=$!?6azzp@m-aK&!!*v|y7k`5pWCC6#S@O{OT-p`OXVZKwlh;Bm zA|1Nxb{M92?upN^`D?i=NJocDh~$_4gjEIC32|?=Wdww}5`+hIzv?r)>FG(a4jn1> zZrOW9at-^}-LTrOi=6l-X8;m)F<;$Raazn;n>NPRa`o*{i&)2BOiH(>*0M)$hg}3- zhl3*HU#G3C0ECUoRKS7IA*hH&`HC*S20lxqLwCI$hQ_(J;MlN2&NWPvgeFo|g=^!8Xr%=z|zt@kR@04cQiO+H`Y%)v6upl9^le;Jj=i(%L@l+nOlwk6 zv?&#rYHEczU&|+Ng<2M?(6K1sCPKREI`)sZa+k7>4ws_Mzl+QtwaIaU3>pfaTtb%y zo(68(z5FQ{T4EglB96e7UI}uv&;K;nHues12niMGvW!NN%@*~Upo4}xPQIQIL{E<| zR-q|kV2*Vm`Z54i?Et-%0H|8F1nCq2o2#5MOF~&A()_f19Zrl^>M7b-b?me}5JLzsU^QY`G=+(iMwD__!eo<{wp5^tEYc^+CmpIOhb+nmw2IEPr@x&B%WbpF8kM zzftnXp3AvIh3t+vKAc4|10e1YFK>tVA%OM+CU{_hhg?sHwOaTSw8%wYqbGsC zbcrJ9)@|qiXI9&K=RSxg60A0_HQ|>#-7-@%<=3hpAEo;0m%1;Sj8Z^ka=U+T%n;iZ-? zf+Slf|06j5VQ5i^r4(9JG}wfXzwTk!LqsZe|MO>p6}jE;RZ}hSEm4rA8$}t z{pNtl4Z#qFR)A@G807jE4CikigmJc5g{D?bK)}~~-hM8zZI<19h_`XLydQo?s}~LK zHWmm5gBoXCR?;d3gFb+{-hm#$9au|Ol1_oQr|Cg5B zSd6;p=?`yQKiN(3{PMRTz6DGgF7=)_I6{eH(@#+4M7!836g)6L$ z=`MKw4kUjGXy=P3Da_v+e*)*1#nSH7?b5nR{+AvS*1WS{hCmv5r*vY$b5JFfmM9mZ zbrQS~)g1a+gPz@pk)-mZ6Q`&UI(X$9bLh$EsTua7|Dlz@oTteGGNsQ0$V&j}X$r>p zzPbHb=o_&P9o#%K&kmo@KuX5IbM$G#5&7!g(T|Po8h&IPAAD(GS)WUCHMcc0ur=E{ zTsC&0yU+tHC6>bDE^}5_cEF)t#!u(5-_w)hi*?9-Gz>|SZxvSEOaGo0zW&BPfX779 z;gZAo;NWsO?K5F^LRB)T{8-VIM)CK+VObjC zoG*t<^yca4I7p!c>2T^&8lovz$Koh;1UwxgF*;^4a};_{tV2IN0=}HCjq;E0!0W&L$INqv(%d8bjc{9lQe=v2fdKnfJkq(&DfZA^IhQ2lI|Go@yIWXSpCq{~1 z(QKNfQcs~?v?#OiO5JKYKZY5&SOs38Z*<9UVDi00j|eU1{0Y35v%_U^^HYFqc#{y< z6tiWt=|n{5|UtHDu6vKY%GJ5+iJ1YYw?msWs?JKcN49lAZYdAJXgiA=wk{Qk{={dssT~ zvwl;rw5l6S@!CiR$c*d zHNS!&Y48*@fo&e>NFqRa4?*OB$KVVC7wk8G1)&^EYXK@^g$3zef8UK`-|Mh(*!QVU z;L(f5A3rvMdT{ZO?G8&J=tuS@Y{@_v4y*vsR&4`(7X#5a5OD%=+x(Dx{7u-|mMj86 zOAQ=J*)^B{o2VadM+W9JVMks(ypNCkn_pde=mhYJ@7+i4vYq?yyETqq_2ebSF$TK+joA+(&wZH9ps$}pL{3gBhe)03) zF1cSEr``D-?U{P8XIwhAYxHJ_{arf{?Ste@Z0g}zR(inlLD;0Dhx=gW2@G+rq&{7A z*Ta5`-DIw05xt&))bGVop5yI}^^6ZPcrz&s@K38+dCApOo0=pyyk<~xBQr56)&Xa0 z4Nehfj6)`wlwQFe*vN2xblG7JZ$OCU#1eKufiGifL#^e7Xj*1` zOo2evXhQ1eASis`T{tbCqT2ml?qZgH7Z&NMs7kIi5O}LtQ?z_oDwX87vLF8y7I={k zP5tS%IWDY!9jp8sgtAXXrR6LTxEPao%N&|oqKk%4oU9+^)~kHzk?|w z?6kc-fRwd%j2N}|{_k+5|LcQ@Th`v(xW|8(!^7aCLvuimT_;lEdR*&O#vx_~oiWAC zO^C!iscJVO^pjHzFquKt3BW2Ut8@|1G7(i$hW@?+#*#>kj_uuwAs2DeBwL*l(~%>yz9cy2<6mz_9Prrge47L(Ee zoy_cN(oq^|E`l0FVszI5aNA9OHa5vVb`is!C*o&BZeE>%1pYhGNA z^qE6ZW#`M!%eUq0NmtkR0Q33~6j)1lKv;%@J;ukMSxhOq=5iwL>(jzwH3(b988)`;8^F zoY8=BEZl36X)E)7cMW%LW$vC74HOJ{ww*eBSjio7I8(j-`9u_{&SZi!zHBC(Rzt>? zBNNU67diL=V6VZ@y=OA>(@QAP?#~qdJzGupqu1_W#%3I83xErl8<5Hc2X;4r;KNN( z+7E2c%rtWCU{*jh?5QQtF8?*NCmAeg{2XQk7>U6D!*Rg+fSxZ69R^rZK!lb-=bpng z;F4Od0gnfb{{38LWEl+0qD{Fq5j=V~cMQ_(=j z9)s8X@FmR336TmN`_&dq7?GE27}t9DK8SPw==ScQjwrmO+An9Ujj|uNn3Kq9VpgG_ zX_%?;#VWM_=v(uG8Sph769E@OB4_7dzaZ*2VssP0Lz{N$XaYT#V^*UJ^~?mg5SA*! zWu5E?F8KNk1r%!)uMq z`(6CpZe+MCF!Kq+qMEBTT5Tp7YU&NSxG}-~;{5nxDcb!UHqTDJI1ho)m)zHgB87zs z!WESoQuQnhFg>*$IK&MDjW0x2!wH3J*>6~w35bS1wFr9k@z(6WylVj{Z+>9AmRS!==J$>DJL}OeS{u$zZhCjcZeve>)RW)>Y zj645zt64n8j}QOtilv7?Pw{%4g4uzVXRxV49!jRS#&4H zj8BMka0UJ`xQA@r-jBXK2brz^z!(4m3msl@Vt)=(HJTyY)nG1AEy}}knx9aioy_E< zSceX--+CeYwVhxk08QWFNq8gPQCljO8ZA5;FB)A6$U?vg^m`@rp-7C5J-+;3o{BLE zDxAmcm zhM!5R(3KZJ6E9YErxTh)W3%i}E`W|2@7{Iw1iJp=-Ure6F2=mhv(L*NVY+LVC+ITx z@?lS^(bCr#Gq(b+MAz-K#D-APTDzJLT7iM9RTUv{b{YV3D z^L3jh&|$cpd!J8VmxE6iPp9rwn?Gfiv6A=B0!!o)$eTis78uvmM}R1E@ZGW0z;?+; zhMyU|qYp{kaGxaIG#rL`=sY|N^N{xk(J??*C2_4sS+lCz5f?Nrw+q<(FuFuKBzX_6 zo_GCu|629|KLa=6>!21s%Ex0Yw!!H4yOq*%L2Yi*$X)}>QzS;wZ;^0O`GdeL`&5ma zg|@>SR0{7uk~8MK0mlr|tlc2XW$OHUYz)GCh*aoSy=hDLG>G6dIL)?$j8igU&iVsx zMb1MfW2K}!jY^lm82@#MnLb6c|H|>MGjI(HKtFJ$@Bx}JUJDn<_dqBzWf5b>wlc->(sVg+~Arm`qQQl$bt5P=sFi_x+3&e?`; z@o4+m<(I-KXo<|N0 zwkT4eBcrp>K368!vA?Y_T(;|B4uFIoww^%T?ZMl$vFypW>ME6jo7XcNaa?+G{-dZA zPz)D^kdP;Cf&mOrEr5M( zqBdEVmC{XK`@>&r*chuX|0 z*yK(-vB}95MH2Y7ihhhH;o=a!t_|kmVkvS5f!-Y)(d$_93b1E3C=PQ-MErncEE;c- z)V3YvWKfnVmJ;aGSHdbR5~JufuR^Cq%L52l?WWN`Ufz5@IuH!3<6mp_Rm|}VgM82M zS4XcId~GZ=epa7mU|N!AH@g}^z^ge7(P_eTRAnct7$H|M=M_uO;d^Pc5>-sknW2R!708!)g( z4<*-jy+IUyY~qsgKMzskKhIiYZ82f~@wp;A7q(V!ry}z2u&e*rxK2xl{HzPlWDUGvFzjbV!Jt1SIjyPoXXMaV z-+mr>xJg}Cw!TxFq%_D|d&j7pwA#2L@97`plW|eOKJ5mq3N^*#_Zw8hNfxAgHm zH|WSYQmQv@Op>cV0b5jCOin(t3HA&?5dxsd=JG3_z!fj1A+uDGWDzY!E~5`kjv1}S zQB^z2f9ME4u0}+Tz3A1LoL@VFF52#z?_HXQdHaAlGav*qV%C^WXS5!A;r+=CYnDmK zwYzr$a$-zuD%(GRnGCy6xr;QFvRW(yMb6r9@fA%%!Gt@vCW23@Ee0(gQ%Nnbt^9UE zzs50tKH4!>IZ~N&9?3KdZ(3+L<{h09$j9$Q@79!7$aP8f*YMBmxCf(4?T}zYh zwuVR(gWLIN+s9geK;7mAsFQo160K;H)I1ecvB+8T446L{Plg=-Jj~Xn2hd+NB3v~v z=zGc@Jo^B(I?j2+lCcnT;`qdrEjsE7CiKI4o(T7&p*5vQV*c}eq;s9Rq5P5iq4pR! zO4p)kK*;Ky(zEhRI%$Zwl(<frmqebjb&=J}XvfT7n7jtvrI^0p7D;3IEQV@$T%{U(4L%mBDtYsxd^OtZlpE-)WjAt zH+4Oh!vA>gTjZw)la1sTUrKiO9JbHP=vU3hI5i?C(q2Pz#%Ss8e z>!TG9V^8@j4<$j!eRyD=a`9+>Y>73`j6=306WXi~A4_iNdZP&b@(R7* z0}b~kt8UqI?n|CgJv{C z)~!#%=+(%`Gl$pju3p5(o=Vb85nYUfB?zuScWN6cx-%BM%|~)qDC^0!^GTY0e5EJKkMzC& zR>ZEClxA|tSCXrdi6EweofLjWoTF4Q3gBAPV@~PGRbQd!rxm3ne0u@ckk=?0LDlG@ zFV_tsdoWzVzc;4$41@g?3D?mKhKziTUO25NMKW(Jk4xU%wVO*(q#F0*q-+6emo?=v z_aVkMnIyKaC--bzQAiluvwJ`FwhYDfFnzHfXlaU+NN&f88R{iv-0cyOw;nmD!aTzPvf_6 zFDBG=Fzu1H_qHBye!i)`p<5?l!{5+@14(qAvJ7b(+jO$%8)0(;xx643Bqu8o-;ZE< zYm3P#1G7HUB zYzE-smJx0ykQf~DJMxHUChvO$zppJO;X@Z+TyAN7!I9X z`9WTc^K2GjwCS;_kzr!I6n4N+hJCFOktcUbd&+a=WK`ERKEgAzEF1Ev{h?`_Q6R5; z7WQX(Dapkfci&Nbyr-P}T=EjSE>Nx@&HD6@%mku{Kn)pZ)sRIpkf%P62G^95N1l#> z0u%t6GXDjv3)KaTuj|;>(A9ov4efnDz8vTPjCj>^ zbH&e+SDbFxe)O{yhOK-o8w8N@)4!-JTR=*JcRC2)8CVaIl?Hce$O)r$^2NVQcEKmL z(j&xs-4_Ai{^jM$Y3|XEiR*49m6hwxUsW77Mld_taY={x8Bo@^Y;aPlcCIoI=NR@& zjLe*x?!krJ)Ngzq7p++bG5z|qruu`w#_e70h*n2C@|)zkH;i^!_v0|G@Sgl*AxsP} zz)J&ec));05Ii&nqzcf)Y7{AGLPPyb)idwY{|`C5IyDQ{=SOObTeYwHuH6SwD-J)JeB!;(H`Wqe_~G-mcr1P2r3$!*F;^5c4CZD);)JaXv4#ovCqQ3-8v0TKrP zRRMlNY6=J(G}{#&*DK(j*ck-^YDoC0DP zteDsbLI06-$im?Z*OL>?3K9;j_yobcxVQ!TEoHA zkl7WFsHl4*iMA?hyJ|&Mv~Z>Og*Ih$3yAVTYC2K?2~*NzP9l|&5AM!B1y$hkp-t%o zsr(zCAV0Zf=(d0R{af0V4p6H?yI7#-a43U=+YAPyjD@`XDppf>yRvb^N^){C6kpsl zwV(Fex2?gq*BWTec<@rmBRTgkI0n>+DoT&lb8GqLza(AM_xF03vzrOWI5y`S&&84hj%lT0g@A0SDMmn; zw;JYrc(a1rjlp^NpsMG{L8BNP<3=*hB63WG0~T%lIq@qTuSWj_x8ED&Cm(#|((+?} z(r$#jOFa{J*rz;fxPMCKha&8_FQN6!r(VV<)yT*r4_{qjq25+r{|fdmxY?jl*V?%@ z%lq9T8#N3`CTIWPY)R7Ux#16}r$$Cjem+L8TeLWj&E;SG0SDXd!aM?ut9P!Gs~pJ~6c-PV3V`{vdETK(%ae_j2|>d&n{w)&mze^{Mc9b9c( zy>Io}w!gLgtnKR+Qmh+5isf&+RCj&bp0Io$e6>+`Ko>A)bW5rDOSxnpf>v_b;b-P+jlV#{~e_*x!s`S6<6E$?1) z_L{p|rdqCOv9$EIY-;{j^RGKktWi5}?l{nVqWQDB{^n!Nw>0OQFK;$CpWnQp=^txO zHvOXMn@yi-y1VJ7rirFNM{us`vZlRFosF+{ezqgqc(U=o8y{)Bv+=q{wb9pjVdGhi zZ4Ixixv1g!hNn7z)9_%!e>RjFBAr)snmf<$+|cpQj$d_rv!lG`{GU+5|3`=>KT@6Lsy2OkLVDvZrs1je0$yk~qhR8E?eE5%tb@MhRtX*yF>{H5_pokpFNEt#h>Y}_$E;h2)#u@PbSS1Z+{+~#0r zO)hLVUns-V2o~zd5;6^#;gw5DbSoSZWm8sg+&-sfxB*ftCc$@r}f;#&`@~7B+B8jq)lT~$vJZI z2p8~2-C4z&EKS5O`A+qD-;9Ink9ekiQ|wUQoanVw%N8Q_Jve_q`d|P+*2P!DV68WJ?^Hg@i zU{l*nTKjDtd1{o64*}>Q$o0znE!&`q;VT#FFOJ*@(@P)^6 zo=B;9p~mWyvu3C4Tufn&u{nEgXuK$|)d-++RxcwlMz1O0b7%UUqpJP`TJ=^pLh1*z zSy48qGueUksxubL83SJ!7+|egWLP(G>!!3;TJ5u$8N0*BxGckl>15Bls*f|nDK4ty zC8u|oozjb4fjRAYOJUZ>x{Q}R5B^!R!81G9FbHH(r#|@s5lnZb<#hv7hidkb?%9(k4AD=4)!+us8bA;w%+kd0gW15=j<5TiT zzd7L+{9{tz_p0S_Tr7sBgNcOGHx$ou)?Zc2&4~hUXYBSVzhNR06E|w6CucG`tc*EY z#-8>ht}nIMbJmj|oKwKP0A_Z`8_VBc@`1EUE8PO+|)}vOlPn z%U&dTR?|||cSIcvKL6$2ZAJa%o1v^gX{aQ8RkavcgiVs^0(}Sf%%2Z_> z%!%${%v|R%6NpZ;NVnSkf$H;SZ{MuNr|1hvykQeNom%yVAveP?4!hN?^dr4byi2Z@ z4|@8Uk@$2XlZ`4RH?zL6T5b}i7^_pzk0C4OFw0)BQ>$K>RHjTe(;Vx`4Nus8!WkN4 zW=_ZjXPA;4lcVXdGag9FRc#QWZou_NM^t`BKP8&@_Jmfy5Kc4fSTZLg=w-w_X4wDR zYPl?1*$JC_C>8Q@rhL-yp!QyVN)1k>{`H&%$1_hzauwa*PE_#mI}%d5Oxl+-Sb$1lelXALuc?*!iA92$%5 z(ip9BTw%)0q@#W;)5U4OH+u98+2M-@tNUd%VpK_v2-7oD2{@=jtwv~ z;nmo2VZ)W!*ofeyYYHA=P?h04SeM3ej2TM5P z>~oijLQA|_?uj6~l+R)qEJXDt%h*NL<$x)IfzRWysxC`5mYo>uAJV#qnQ{o;LNYqe z_nW4j=Qe1JUpXeF&v0kXnck_W?*oT&G{WUNoK+$?zCQ~4I(2LO9RSiDXn+{g<`_+r)o8ve=g2P z%@)y<@`${`Y;4s8dhcwGEd;p!WI@oU4ABd6mGW$9!mMZ0W~)!Njqy`KL(5O9J)g8GJq4KPmb7sbq1&?Wz^=O6(Ff!i8%yIp`ct{=}4309M z+qJi|nPQY@3kG3QolN%S6P~PAZi@OiHkemTnN%Rs-Phs3#x>C$+MjI za_y^~9)%GmV|_w&WX3WP_dQg7ob@2TXfDcekz#Vrt55kfj?SDp8Wq`s*^;y8bGC3a z?mSkVdy>JFV-i9-IXztLFNCBaqxJ$*W^^W;ip)+VgQa+mb;Y$}!(?pKZ?=Hm)-%LJ z(gSx_-kU8sXOf(w*l#Q_6aAbsx{n?g=AeyMzc<9B3(25W7WzeJYg~q-sI!&ZLDmC`FgwIPEbMqVB2|8S(*F zMlbdA-e}*rFY5XiPF269!70BaCocO&^PG7q%sX=2OnA`A z2uh!z#794_HO$@@Pjk~wKW7%DkjKW4RwtWz(BWstCNTQ5qmzti7`aA!-iaL-?<@GC zNw;%$a7OKaMq{9vt!vub{I`zP{q65)u(us+{ibfVyi&9xO@Kpr@L9#Kk+tSGSzzj*&ds zy>okcbgKfKwrBoz&YcNMX_RG4ZtqOgoCx))m3s|%RM#u(J8NXfmzM&J@z=`c@=w+) z$VxRh|2o@}w=iq7v;J{ELWW(@!D;PIgo?aU7bM1E{s)@wjR~KB`7WvkxIk@R_TC?A(u9sMiB*OI4l_J1^M`+^mhC zu&HAKb6TR;r+YeUijmv{&|3s_b(Z<<3PQ3tm)^(nft)vQC`_9MBZ_wQ{ZO~EzN=QI z@wlA$gt)!DwgO=4z=1QA z-_NzR|FQ0BU5~E*{Q8cD(UupQrW&vB{F(0ex^H)UxA7kx@7I00b3k`Tt65j5f2#8% z^&hUkvGeAJM;jB3{f*}~wy*h0GW7bQg8* zum5SM+EMCwrJ=j+^R3UfeQ@<)+YeUp9iM5trgOga)rR-!dg>jkzt;ZQ)}yO8v|Y94 zmbShoskyEF%C=n%7uF}6tzf^LSx!@ zwTw$ZL^9X3MUy6zZhBd-0s@i26EqeJ{-w3=(xh<9Q-&7mo@en}w9jSkOLhHTlOi4_ z5M+bHzO;MJj0hnW&1XaDbst(3gP*T}`)?J=x$qi4!oB^e4JRv7+Fca~7Gkq(aAMi~ zSYGXgEkDwvUR0X|)WM-bDo|b(z!eH>KC9K7;;~;t%2pphq9qDZ? zrPY^cQY2X&P9Y!H2ph~`e-eOn*f^_uvS+R`$POiBLr@#A{WP4wGmNwhB|EeEPVL8( ziO!t@&Vj|t3pDhd20E=fTWeMD8)>JsMAQXZp$$5K4}R2XM#dhK0W)hYN)5O1ftpb0TJCQyORk!+E)A8Xwk zL>?B3BSH9)fP5AF+V1L$3n8-w@$1Nt7OVtZme4PJ?>UicAXDIVigWKSns8 zYAMxyZ&B=_0bk&!p<(?P48+bkk`3?Hq*RL?3ZN`_1v1tSkI_g3e%%+U(qb^Ae_-&aI14Ec;ql+UaY35cFrOoXiQJZ z5D=z_=oNIE8f7{^sEN_6QVJS?+#vWS7hVA+E4KD%QtC@{q|jhYMK`cK7HD}a-L$Rx zTQt&zC{;T0KCo5VS+G9{Z2?W{&LDHL-Zh6b(G<;tv8FoAcWN`W;+Xa0docf@a)_72 zSENeojoObf%i%2p0Tk>8VqxG|K#&NxRbOou*gdTZtXy zB=oe~7Mz`PsbiSO?&P|!SAUF|8AVGG&O)bB#*Y557aBrUDe^~q5q#r?g#a~V0NI=I z^7{2lQY6p=U<)=HO@tE^e@X(U3i(y&dg^JV&5tUq9zfUe`^984$tgrOA88`$B{ss_(Sz+S==)O!dmh;lB3 zvNo(+Y!=9)SUB;qIzhoerwTO{Hr`&5!o0$%i4fQz^eYJS1Pc+cGu!{F{nm%9i6e8A zaCZ?2XncY(TCU??R>Pumw zP`0sR2qqJaV7q6vsz<0+3m$W@YFeNLYOvVdrb*EU!&o&+=`{Ki1Cd6bj1;y$rb%7+ zz!aSkdQ4wrjs$RR4#BKjAJN2UC6p1%24&+ySEoR7Okd}-X2s^?}tyu9xYO}A}=we761KcA-^Wwm;`c*7p zOjGNk6w40s0zt><6fTY6i4@nYnI^m!-yaodAUhVC0?v`pVGGw-H6U2gSQpd>eKG7) z@lu4M+x3lCYgGftf(6!%)dQp{STC^;FbDaT)r(Sh2ES25NU`oiSn>#rxA}M?=neglyAkg|$7^+F6yN6EUT5wTj8gKmu}D zBiDSUCZ$#Z{b#cy+YnNA+Wge)rq_K*lfq)Mpq~K=K86d6n`I8km%Ktx)f!`|WwBUN z^0_ zFb!dRsm=hAgIHmxamJcjKQgEN*n%|jFdBeS!bHH5dj;$Y`AyYPM70?|jE51tdqJ2^ z^bELOHgr{AOurKALLV9(#QaCIV0JsI`v9ma)|3!-7(o?l4OV>^FmBUi^^@kX#+re4V$XJ zh0(##WL&%_0M;KBtEzcqw(A~EI)X;hVM>o+4aaUSfTguG#%wB8e+;$5&KRpacHW3S zw}KGB!mqB{0IZb(j4L=15Xg;5noNT_h*_F02(%F_gc)j&B@9UsGMlciz8n6vPzp5{=z2kyK8m(obx@OHq_9T^^jM`v z4B893I>Pr$VBe*^B-rrF(L;B64Viv*2o5g+s z>5u6SYjbs8Ig(&K$bfYN%iJ863YZb>Tloz?ul`uTIKni8r~}7E3@lz{O>VC)y_hk> z_!fEs#Bz;o46Ljpz5N!gS;+Fs+OZhXT@n^D%p&aa^ajQ@(BVk)Y9ZZr z{t?|?e!Hk3>7;9(QU+_aOd#*eIG^v2&e%DnU>e}G>zXf}i|d*i89Dazn^Dgd-`!g7 zIZpw$#xsBA5=JLGV?aE9bjseRB>E<&3$oUnjX=e8)yl}BYyR(Cf+)2O<(a+oQfzSk zswI$4NQn(b!QByHRdduQh@w`}#M!vas*w@hr*1&>35Sr%6K8ASBT5skfqk6Q?sSS( zjJzk5@MbI%T2C8y<1(v8gy?N#xC8@vclpD+>34bO--c?mP%_yVAJnsvU??LB`6(}3 zx$0X_esd0*QzHYW5tm|>2v7SyG^dK4o~qMLHErv#wjF8DG{4wjZv8@e=Yh-Lrt2A) zkKr|1gkLr{GbM6XZ$u4@&e%ZnqkXkqpxsv^!+Q{Ub?s(^yL?Qb>K+Bos|S2kw$9SisA#L_M`4P@minvP9G5rt%lBM0=6vVxDpjYl=E+W%VU)AQ>F> z=LZWOP%TvSYnH=@*T^)!g%j;iu;)11Am=>g*45&s6n?~qEsq>@jz-eO5qG50Ab=Aa z$tM`4v#VB)o3%fH?=PO(P;SQX(RjJk($}e~TQ4#b6Vr(y4uF26hV{Gt3JhwE2=Q{C zu3U6BA@&?`Zoj#LD#+;k*itaEf2d#^$a-ddTs$=9)HCF`6>z&JFI3icEEf@P)8F@K z(a1Y5QYh2nd~zv5wm+#Kj}?uDiQ!q(s2|)?m0FHojOkM&BFA5txvc!!#R>ur_&&QU z$oZ7Gr5N_P3Vf{ExtF4IYh=Xum&QHh0Qpe>}!{Z;CS`2Xkl@gXU9EStgU(t;#(rgBCi$E^820+Z;_bH&X zS@DtbBlXWO2Ht$ktRV3@(oBM&5GPn%5@3UXV+59F7ek&lD;0K@6{O`u>a$05WbSVW z1G?L)w1I^QTcY6*4*%HtVTXZTIJSVs674$5!nBf<9Qxbes(B8qw$q|E@3tv-fCdOm zv{f3Q>^85$c&vcNQUV>AkC2(r2CRg zh&*XUPkzy%P}1X-o*>~S<=?`qcftwMc)jC8IkcZ<#@J}8QK71KfhGP8+Et~Ms(^20 zhcbW!8{=qnCBX)^RoME6aA5Ib@uUDLU(-)tCdyH9sR^K0$19sRJA zUE_3_$-)3=-h}{f(Ti-}7`Mby*wv4)6>E|l!n~;wk=*y%5$gW24wbO;FPH;8n>-MjDj-|W`%y31jXuma>zjkW@eWj!MzmocS`wve-s z&PtUp`+yfssu3Y{%(}ab=+B_8+dH4ZhM*cuY&V(GalLIUV>YB5ZmohJjbc9_FO!gy zSM1j)-f86S#`2{>#X>)6V(F8@Bgrh1-prc(@{qyk_h@ET9D$jw5s|f@`|uv}uU{s% zmES)?d)YNViE6aHh0$U6(2Rsu&!~rC?D=rzlU6DCq#6-9*_uNd0YwSvy7_tVCRdXq z&#I#mE@4MlQ)oI6?bj-p9Y+N<5}>-Bd&*CaWA&M9YxURZ>u#=V{zdbh&4bO&O^-KC zuKx6Db@iET&o-UY=xD5K_{^Fe?au=GYF+(WL%QLt`djPG^*;bK_TjplTibPsx^L^c zJ3rI%R7;^V-Fa5W58#-2U(5cscenMedKKAUW2?5co@l*!)f1~`R_$;7RqIi_@by1O z23C<>9k2TlpcJ7n7gRyu_mUszIF;b$J zkFad76z9Xe5r$>Mk+2}KvAAyP_2m#BR;ds4X(2-;J{_gDE%)w|}j4@~qtrtBbp&e*4+Z&7Vq8yEc!+NYv zH&5@{Cou;N@km^X8MxjA?MhzY4ERu4=#9j~Y$Rro;t?sV8((ZVb1)GPN2AeLxL4%D zdNf4FCv#$=S2jdr9D{yIgk!pl_WWK+f6x$?qfv0V_8P+Y5g(06y;4NvdZmQKC!&%N zX4we2_Lk|h_u*lEgqIUCdfmVZXt+TL_l9|i>kV^K1pS(baB^IyR(nO14<;fKBZMWX zS09VTX=4m{J{;+dClUfDM;XZwm2@QcNvME)5NUf^QASH7J!8O-;tg`lfWZw%S&22E zZidy3RlgLKW8|4gOb~kG=wx)Ikm!vF4BMNC(nK}TuehYwB^GL1ud-V(xqXWhE%HbF^Ai;6*s39W9W0Eei*f-)qLE;i|eT?hn zW!jgFgqacNxn4#uBJrhOj_D;vM-Dys{MqM-2lYJq15=?l!A2O&CHzc^CZfFw&Y+J( z;tUsyg>_dg_Ko3SBEjk7qCxJ}-oS{l-f)5m_r^t@i5TRlJ{%Kuq1T_6Bl@r&RrNBg zi24&@4(iJ?y@H_EM>xR{i-~dF<*z?)NN@?6s#R2gF7kR7eUEIpy$O6qoaf~TFNSqj zEIuzBjO)?8vW$-n^R)d5bUV7Jmj&IQ6qBNSgbV9NtItc~L7tCtERZ5p7x1HaJdWpM zP-RAz(4wfA2*-6dEk4g5gdTBhoTXzW@aTNBKg?t3^r9GzGcqeh!wFsK_2&hAVL}eG zyT&EECT~V9R7ZhD~51h^dgn zNW`lvtVz_7@R7e<5^aB`{EbN2RVF|K8iUafcF<87L|Hs*tT8W$;T0pQ{%lQY0?Mp=|;=k-iy5M?4teq<9<$ z9@K^oljd;6q8wOs~$6$vHEFH=? zzEu`u5|kE;YlM|q=&0^cb!hOsB!{spfNEp6fDd5lC`Kz9iM2T_3kIP1$ZdzG&o)Z@ zLA_qYa)F@H_JP4nzx8X|%Xc19K*8*p zpT?F^+uwWj5oMfnjgRDv6WNGiMAgnHu{aJ8H8R3{{};PSh4tfjoI;tL^Rw7EYP)Hb z9kPx4`O(a@%@G((h~&Yrvb(dUl$?C5e;?aY?upQQi@|xC@<7|x55xmTKf`(Y zEDl$n8}!s#OT;m>q((-Ltp6|M>HO{e-R1X>VPC&>1{ssI@5vgoLldriAeJz?lS9L# z6jk+r1=%;IfXeP;X}qzvn4H{}K8HN~7-HGaaBaVcbTVUA4za!CN|mgu?kY+@ zy|rz3D_3__^9LIT>K~&Bzy6-*Cn-V|JYtQ&|65-2FUH&*=fwNi5OBcH9N zoj6AbPi7BiKQxQ#!Z@t22cCpFS-`vL;;7r7dL#kwND+HU*|lk9DI)g|R!LOI)~gYL z3=j*jS_pN9r@%9eI}yM;0P9K8>A&?X!ztm5D?eF2Qb_!Vjbz?uI1q)INn zABe=7V)DqlMNs$TZ{1#g^nP3yZVxTgEmbj;#NLyQ346if}1GLvSv1DGi3{T=w?{_8d+tgXnA&5zf%E2V0iu=Fi}N~`f$owLV9qs3Osf^ z#DzJMy#+QZR8vfJ!8S+vrCTbur*?&(U~-%-WY)W!{(wk^-whkZ*Ax@uAC9=n-+wo5 zH?*txy5YL|k9R<8+YZ$Yx4zJPXHx^&ncaO!&(KlyNtJ!KW;8L#Q@5RFkgIou2me#K z{0+mmIIvA;NV3eFG7n5E4Rn=@=`-(xfrFPY4Ob@|l3oGsLmm!AfU_(G^3AVfkPqCB zxc3zwA!`p`=Oho^ep&<9atChf2983Hs#!*AbVbvnP2^j5oJNnTw{=I~kJx@#3;3wV zaB&N~2Fz~-pTUj@R29Kjw4xM_mK*==B`A^t9IactZl$D5E_g60@W8EFU}gZe0e()? z)6d_jtlhZc6Xei2b_03%{N|11yt|ask@g?H3l_gd&ll%_^Mj|E165-5%0+9>QOa@v zFclCj8DM!z6hH_6B`{xLd!Tb^4Z>r4$6KFm z>CxRpx0n+;QarA7bj@0#Dq~jz{)nW8aU3V)xU#onc`4F4ERycDKLtD29b9OISVFFkw*qzfCG+#+rN7sHFm-RGJ{mF0MoKK2+03T!6~!TqB&6= z`_ea+uFe`6Ir;80_LiUgCbn|a&aGOqb3o6g^URPqsh{m*XQpgp>!1GsykfO7 zjeGoE4=A7$3J!!3!!uNJ^-m6m2K5tZZ8xy$W6+Hn8FeDoxM^PQ9$9E!auli4NQdfA zW&?c6#*~I7tv9~>AbMlDh%ospt0sHb#}#n#sL_zSz`Eo~WHX-$*uw_$&QD+$xxAP> z{Ni))cby7I|1Q!|D&1`w-FTp`{=Z1u;JCYc_$WH2nr)$GIIAOl!^5W;>8ioI@=*oZ z7LH=1t8SL%!?`%pKYdi`T4|)K#_q9C!`K0X0t^=5kU**cya0R#Vt0YW&<5zD$3S7S z@*^a?8yszwv>XpTcG?-<{2A(?IJ$btK~X!}RZaNDXI9XJDnE8*rXT&R0&Z|XKP(hd ziX0dKgJb{#2C719>dwz88`iJz0J&=SP5<%lw|VQ2wl3N{fUU6~1DPDQK@^@23^g{E zKIE2Mfc<~`^I(rz`4Oa;i#o`;UpVaoaQF*wk2#OFVBEAcQ_B@^Q74^`udI_*^WXCX zj2>WX0Ih&y2&fmpE`iAb5(eI!SXT60~^%w=ZGIuR%shb5LoWgrDK7gwzkkX$4in~Cr zZ9rqc@H~!TD?V~Z!|}}|`@IX$8I=6#{2!jSGp_%ka&On{&dPxAF4-A3UQ+(mmle0J z+rO|LD^U~9eRl9GOhrA;{E$oTbMnbai5yyw<^7)5lqPcdOW3{F$jQ#lu>P-lzpes z_MLix#TE1^Y?QT{k8GstE-BA_l`hkLc^jZUvq_gf8!xSQ)Q!>;>;YT?9PM7b1i)@Pja31lI~oCn zQ#5YHKVmf?u z`?lYoW^z||LCIH?L888f?*~c)$VLlBlqS;lWn9Bipf{uXrRlkDKoqlzx6ndntR;QR+#Tq8n`?TuJxcD$xI@A!SPdF`!rx?5YHX`gHeH*p=- zmio5x%O|gx#je}4umSc#yZem!(pf9lXUe%0)A+CiI^4>x`{ox>e~pYV|5JKBeb7eo zn-`UTlCCS1b4c4uN>7h_VKZvgaB1GzK?Ob|hixoU^h$#!k=DAWv!SHb>&W)< zrk_OjYO@?U|o5`PkgL7|2@w`Te@uyI}%{vQKB5I4E*rKlOSS}(byy=VXh~yf}ceJPnblV3O zHlh*@Es>vfh9)8*&ej(nn+Y;>r30ks1$qpvksLYv%S*}j|5g5>HRs|N(M7I>?f5>e zrm$x+#js}MSa!ISiuak5WUxcs-C0viyw6>~56G60jpV5gwc6dk=v2FR93EVtDMhq< z@PH962u>bWZ6KN&&kJ$dSsTgCKS#rAWaQBPJFsYdC$hc#o1arKh+$zX>d|sk6y>y# zX9fo+Clhwn2W~B`o(q4CZB4DL5|>*>l=2cE|GVlsE@=IB`xQ;SZTGh58iKmJbNU8d zH_c5ms_Q=NSU4M3?o}w|xZQ0WnkqSFCQSt#mMXiawykQ{n(V0(^2m$NoeHo`Y*i_J z-2%-PqJ4QP=1-`sEgtptrAv~{q8)?3zfIlHv0Q{*!dCFc(<~CwcGS`{xNyc&Epo(a z(DMP?w97dm4u^dr`DB~AyQ{XCyu6J^9)e#6wvaPdtN+qQ*4(c4Y(#Wk=%lX7T1G%cC*{fxhubY>m0 zO;8h5U-xv@6yrqO3b^mPf4#N*N&}P?qj@H(&_;8xAEufc^hM;HF*=gBq{$yz)jeIc z#boDSuez8FzH9A;N2OP~QIlp8Mt#Wa<&Mwha#A4gNt3w-brXp-scSoHC65d=?LsjAw(^&o zRHN=fdNkh9aARFlqVX$@dm3)+40jywID5_E_Mf+#R^PX}sV%;0Vbz}28(V(WVr~9N zb94Q#>utIRbS-sBx-jeOn~u`|f2h8GuIxSe!ME2FqwUZ>gD4z~vcSjaML49Titi0h zLU<*)UQv<-j*GGe4#Y1aV_;>t8M*y9EJ@_pQ$Ot44%C%_XDFepo`v&OglBf~ALIwN zL!dSm4$2(M$_6+wWe$!?9$=#0NQ8R&g#=z21+*X$S*o1f58%z+&z#ihdb-6otG&=q zYv&KL0>C{60lsGV;!!&g4)7^Ty)4V{`WOHM2?1QU)u!wB!+A~)`Oib;JZoU3rPeO{ z4zk65h~-gvOy=Q2MZJ1H4sWJ`1H6F=!@nEmL5QsfDnN`bR<4)!>sg|+{cFdY*DYRr z6B_>3z%z?=8(1VMk%;brmv(Jj>|Yict(KZkzF)2Ntw3y+YSr(TW$7;Oc3lrSc;8Dc zr>T1O658Om=A~b(S`hY2f_V4KcQv5yCmvW1FJGWVP{%5$cmg{sav2{?9xBTs|OCT2Gspl5Jii1bMk&h1ZVom zuVIqDS>^9HYL&kg)WcHc;(iK#s#t(?-lX!^yJ_2XSCZVlHjphJ1QJU&h?2e+*Z~Si z10n*Zh5-~N9+nsuy$oHb&R33yf*QzeUU>%@e9+dkVR1C1Q)VvtL7(;sZv~!pO3ea* z6q*rxlTRQ86E!o2gKq^swOBbT?`K*5F5|DL4FeM66r;Fon8_A1H8a4iy#*}SQsp8l zzl+J~U}oN|?$4rb+VHo6D_g3YhxKL1u?Jq-an766ed@RdE91%mP6;?4kX#f169Wbd22|t#hMv;zr>Sk zj}7eTeY4f$^)J|dU0`Vfb9fmGsFV}~j1}-aifRRR4>%y${wUBqV${Hf^}^E2r2WF( z#!dCQ9hbbNmubM1+v+-OZ69xGZT(^U)eZ3`QFoh`TxZ8&@4|W5uxN2S(Gh!SjF%;U zWKrFrm$vB_&~3VBVGmlQ9k#@osYsmiH5f`H$m41jA@c)Pkn<}{`+|`dxFzWiw8W}l$90|w1^kdu?FEHwB zL?4QtMSjDoXLh?6E}#`wZVE*)l1qYt7iY1%HZd#r8i+nLUS;`GZW)KTmX2w=*Ln@Kvk?%0XRvK>|jfk9VAK$fSo9e2I*2@AfUw^l9&?s7?mw z5Kqt%Pug5^)R*Vz^&=b_7s6UB7m-K4{{Jp1Z@Eatb+X_HXPr#eKVwI5K*VmYYRHj` zVf1Qc#Q5{4E2u-{%)6MLt6d8`8m~zb5={h#*PmKVp_f5^y7%H zGuTf+sRceTcq}tC=sXDootLFGAV=3qLZrz^zA0Yi9je*};Ke03PuqA*O}o2Yy4Mxzs}s2ZvKC*k2aiDhG{w<)*-ZT*^>Lp5@&5z z-U+gH_fRes9*mRUnbGi?ViJBC*^t5()uY>vd}38-iYGoh5M%UHp+Z{dpB_y{NO&5* zttloapEV+-6nAS^`Ppe|A3_V4EWN%)^R-#AXT=FYvd6!?t$f&|A~}Y4!H8L^8FHkx z9JetZ+oV|FN>)yhE8dqLMEAVzeKFNML{7vLd&#wXQ`^c98|hxhu+WDJwJnOpW{wzm zTOl%BG`KyCD@kJ4z-HAJlao)c-A(UB&(e|GN?7=QIj3�o3IHzOJQWzVzXKi^_SD z*1_ViCoH5Ze9+0a4V*?N@A&?G-Q{l&sQtP-2CvyjHXeA#fgRTmAH_zpYQ1Xo0c!G%$jWN6 zXn{TxQ$4f}?9;1t)aV7&Wvv1`^vB0pou zTb)U}a~OGG6x?T?NT^*M%SGha&~-B-Q0`@d z1zJNTiQo!Sa^z<7CeqasEW8;?1(t3-&<`mF3>yIIfGQ5vQZ5eAqY31rDym;uid$p= zHhNR1{rnqK`22yR$p2dfrPS!Ei-_sdXmI(=^1AEbl^RzATPTAZPzd0@vjX+t2CW}x zT+GQ7dC$1Id&5dna;X2oEpO$+HQV;ix{f{VDcw8UZfpI1OLIf4iGM6SHAxX~)+NN- zWVSFd~;)>B187j z2pPH^KV4o(UVdQ<-4zZtl81JK)8MPO)6<)K!MU_i?KjS(OH4_1ih0%G4?D@+dog8d zO36-=CX2FpwGsYw899;34lRsJKoWyxFc z3@I1XGkXFHHfp*n#!ViMBy)^v^SZLhygM&&IJ3y#&xGrx&w!|T&p9WxgPs8%7*A>fw`m9 zdz5exl!TP3QES4bH^7*!^awfh{Q2jQ+kUxg7kTK0(@yD@8!Hx#Te4^lHXRKxnc!?b zIBpcj`n9)w>qgv`yg?Lx{NY5oYoXNvn|3p`X*Pfz%wVrGgKH9SXprJjI?zf>VbfNW zl0)hr|9u{{ciaM-23E2RIszntl=yQDY+OL{s&@Sy4`3+1cnjUHuJ{B2HO8hYkm+5j z_cXTi#&==UHgFW@`l@lO(Nbuz^lr@1n&OJ`R^fI#ZiRKDxC$5O$6UjpTCMP?fg>pc z>>>1@CcIrq3WVfMZ)w}M_WgAoV*5LE?{B-WWozqi8)lk_@usC@(4Z!q4LeE$O3qBYb?T!dp>@$I6-o}nhr^fj-Pdobzy`&fPry!+G z%b%i=3>uO4mmZ=<3%6fGs8Dm&4*Ol1bifi#6ij1QTaFxh9LN1zK7r%@atS%c;tHWc z(euBbz>x_ScyOszLE}h%m@5fGi9(DsnU)s!4IRrR`jGlL za`;ZQ2ZqP9WO&{%OJFHBooUc>r$*SA-tg4%A8oq0tiMYg)pa4aZv=S(>_|NoFo#A4 zNNy0#`uGQNXHz30FSpIYb^PVv7IMaW`p~R{q7{2QH5@CX zL!*&=pT#DQ0h*2FW;0Qbs+}FnMHHF+I=*9FdHyJNz-xrK(9|#MR)ftd$#X@y~x0N@!Fh9KHjt?|Xuu+&S3wG4X)&9ura0C1X%J z-!1BB6W?+N6B%DjMGV{d<%iMEs7N?EwIVt72iA{Zx$TZ%=%jPjruF8molMQ&tR|~r zE{8^NP@h^TRBz3kBm9m?tqtlQ5*M2LSp3B6=-h0mNVM`UZ``Bii)BuD%TZC2oLVeA zxqk7`*1Ko$x1(YlfalniXhP~kimQOX$WZpAqAg=Kr%VgiKY&pkEgo8F2Twe}M#ZZ_ z?8Gb7dlk1a8P90gdd}!j)54V>L8N78aEf!~*wPlC>CJA}Dt zOT_4l8RyQQ+cx_@vro-F zJbVA_duQJ;{jr%>Onq_MHCvnwPcBdWVD{44{j-Zx)|o%e{B&kx<`YxDnR(C5>&D+T zzCLCiziymSyl>n!PER~Bb@TEsCtg_o_VVYJKd}7P<@)lK%f{tbF0U^A_t*my3se8H z^s}XZpZ>%2bxWV>Pt!B=)6Ddjr&?3jj6XL1ho#$>UcbbTJp&H9(9$JKXD=;|PfR~H z)?ED4;^T`Oi+3wtToe}jGZ&3*U(6|@i@rte;+bRLUz}g~!@^_JlT#Nie0kxng?Eiz zt@!4`bu)zpX2G>UFYKM#u`sQ8)A(KUzny<{{40v`#MkB@oCzof^QI5aADP}e-cpseb+xftiT~h7<`5pVFJiW?We?ce8HZrHwu=m2);tf{YQ?jHya%S_!p9 zqLN@@Ax2Ah3pqdx(LE$8$8H!>Lomf~(ndHML^nr7)eLR^xYSG`6ABY1ow=W|5yo2H zm@|ETOnRVVYWnzKt{k8oIeRj9=qu6#S-zVmqogfjs8@|_Pis0LRnIlc24l{q)`lY* zHI=*~B~`DOYZk&@EFUm%b#G$MkwX#kTa?f*Hvz1ku+^Buq>p-QsC&)zZym zqb%P_T`o~bFqyi!LZ(#}Z>$&P%Sz4V5>Xvf$#s(?5wOw@BI~ZTvgf~2?tUtowa061 zrW*_x)SB}of)plM<${#IYAZP!5fjjfFO`@pn0`KMbrDLfwxD*k?5R-U(pO0x&1kwt zx}9p3^*q`3ahXf^%jG%BO+-8KdZcX&MboKE_ekZ@uAxAibzX0mHab&1)^NU59@nV5 zH0LJFX;swj?vd*f-yIXDkgT82^}PY6opQC!s;Tcu55xcsMj73dPv@qafsS_D&*gHf zOG74Xl``dyDA_V|kwgl@MB5oFold%nF*aFI8#3E>OZ7RIS3~$1gU7;|?YUsqc84@T zyi=sWvt>P&I8A#!r1^+cp9!f#L{+a2L<+1UZRRb1k;~)d1X1>;i;;S{)K*cJe?LuX zD3x!fidoha54P+otIB@<#Pqua|1M!ypQ%-oCXzvLvLVJM+Ln}aAhlHsn87KCkXa34 z?BXoF?KN__Ex^zLqnm7YTNz*>pDhu~Fg0_~M>*pfv#yYDFe={gYpH&jFRMhCSSAspI5o{LHuZI1#5^b$C-OWyhZc)kTtW;i38VMq04p=e? zWJuZhesn?-)U}Q@0eBiJTlF`w=(b%Zm1hifaZypNu#4b;G8B2I+)zH;qG2qhRGhDF z&eIlo&6P7DigM@G0WJlYX;o@UB1K}#R-#Q1G1?eTRUB$Va^n5NcKS?Nr%w`etdrn8 zZF|WIyMy!trE)t;)N{6yp38(>bb7l)H_4RPB;ZRdZdJ9-`?VR?`(wF28!FK~u2r^^ zdR3sKo0cf`K+vf16Ba{~$<$Je&yWwjL#khZ%aY{#cFJ9&T{Ukq6N*bC8Zi|qI_mV2 zHbb1NlA#r;J`=2zXmNH|;-T*v!>TI-N+7c8YApYpHN2qVvmpGOTl1s9YgwNmaTG?@Ri}<@Z%Lbabhp zj1p;Q$jRh=eW^U{PmpBOSId3@Y>-iBOa$kVh^Cmd(XFS6P)^Sn!NOL`xFzaS zCS9jWw6dJ2s4P~JuBKf3rB@D>%Fus(LPc7sBFyW~w@U5jYN;AkiZh*P-Uxy=mGk%z zg&NhGE73?a^sQ)ybI8Y1q0WQ~x>T)DwB<5Uwc{MAm1u=aQWmv7ZF7-6y(6diqV%g# z#^^8e>I$La;_V=JY2PfD({zV5@+O1H;-!Pc{Kw^D1o-8MfX!Vs<@CO+N+JeiBA_Uw zJDqZ-5~xtd61^fX|41OzB4W|7+0?On3QEAsPm zOw~A{w1*o7y>7=Xk|5kf zU}~GPPz0TF*L&nS@`exQXp-{l?dn#XGc&H#neu5HwDbUG}2BuLHcYZ+{xS-zO z(#NV=t%pr@O4cQ zS@I<%z+}KTM=8~2Pdx+V&Mnu=_05(d(bSu)#hjt1Hx-s27Vdc0Gq3J5bqdg@l&X?f ztCPkOsfj%(Jy3GE>!i0FRg*qK>2PtxjZ%L~c5mC%Omy0XaIER4c5lelb$SxF-F!E0 zu|=CDoh~GoD?zyzW^8R2?X%RI`L(uGUhKr)0z;jZPaG9|>DG zePL88FZ9dq66Fd-6YWAGz*!2XUn2`54xY&QIxf&==5a7zSd;owu;-Xs*~rpLTO=4F zCMAYJra&7al)hZ3chgF5FQnRbw$x0%8couTjx&^OxxDpKey`kozQVU@))AolHg_e> zc&V)qOQVo4)pBk-1#InJ2d^S;_I$!w423#=vpP)jB!AY^a_hFFh6?oXU7RbG%`x)g zS4f@ATe8MXBwh(*-LV{z+9F>;@=BwD@VPqmCKus6e)i(4B}!)|7Y@^u#bSYq?kRgI z)pAQ}Cua#EfZJWFS{j*nBXyBc`q^yGZ6)=&hF-0W1;NlZDeIVQ3bShF*Z>$S(_t?+ z{cfq5tSOZBnGLaAQ=i~zdS*>(Cey2Ei9X@sec@uaUas@IKOoi5gi;o-%2Y40MxvL~ z9+;Ht`-=`FXvfv=BtkpYg)xbDkjZ$xH7ZNRy6Jqj-AZS)@@+5U%yfvTG31WfLfJTx zT9!2o)5-NHqd&@>N(kaiA>L+-OiJ%K?y$k$ceJV3~zFeNFtNKLL$rstj78l4dC_t=WW{0e`hMlWl0S zz0^!cYCT?Q28ozCZDhMzKBVP$Tp*WccmUhAj5V@ZQPO+jnJu?TVRj6{pvEtrT$;Ie zA*x`eemeKQYGq8ZZJ>Nz?jnUyzL#CtLS~t4nQ+AltvZ>>=Y2Wh$WPd{eM$tmQzzU0 zN9qZR7vm=f2`N5_AR(j*Tn$TuWd6~4C~u{ik9Q(YC0FbfgdcwfChk*9g)@(R6Zssj zb0>vYiGa_Z&x+0w=do+hij?+1BgV%DT}$7KGlKShJU&`1Z26jY|1D?TI3WSfe(ZkHkmWm;KGBVQoM#PGgg59MC6l4j z(@4Xt1?n56ImrP%QcrmDwi{0h6dMqaq2YD^v1`$=t^76>zEwSvu*Zn}tHk9<1htyFUlp&PcJa zC1c)y%a!HbgR?%5-pCP7<SY@SK6IN1F|KrX2_PPsJ-EJnY3DKLL9YK;kDm` zWz}}7NFaUzEMcJB?jAhxJ<%BEIVK{&OU?8`c`XiUr>AC1WSDw{5}y7clD0;Qg)JAK z3uD+#KVKib>PHA3fE|=_~sOfPk|pwoaV3v}=Ky^Njt+Oj9v2@%gD+#jv<%PQM{~tcrK*4=3C2 zS1~S%u?l=rmx1_#NCu|M7Dyy%CY%f9|#`23I^K#<(Sp0UP;vD!9{Zw-e1~RFg<2%H}jJ z{AP+fu1l2V164l}Y!TJitX(o-A?qfM*&0jd1>+K$7%3Kx-lHUL zdG$L10JX#cZSRKgv5NQ}k^$eMCPLm!0VtAD%B;#s@9~BID{i4vMG`E^o?qZSFv+D8 zlibNC>b7d2*C_BEvs;rCZuli8d8AZ0%F^z^)UQN8EZ3m)0V>sYW_7eXt4HJ$`!uxR zXtALGuabN4o2S`;V#Vg5z(?+mH^RMYy&f(K-e=f@FD*UV`xo!vk!N6MUpbC>BI3`T z7M;6ZShlG>Cs^23fZe(&WXJ7k0UUsB- zIA=0a%6)%?uNAIEkQX5uLj+|Isoz+HV1X-1IQS>gdAF(bmb*;<$agms?A zuNLNom#&tRp;Od8V?um|Ti8-5w4HXMq-(ZIW-1$M=Y^z#TNB>8!fja@m7TmWlUuo~ zwy2ZwB1x6XbepAg!6^2ze2z>l8=`KvEQW!(aslUuM(~^05Fr98lqb-JCex zn^i%qsO=xE(>Y=9Iz|EUpe!%pGL>o5EM z>wAaqk0?j^{YOp#91h>y`!a`v7-)bns{7C2{99jj+W4hQXHWfk?w*;iDPA?Xdw~@r zIIY7lfbNOIYji;l7wdtStW)vqyKL}?f{QC&W{C=+ajfsrbt$|()46dL50xYtnyYRMrSd19hW3s(Tiee2-qP@75ycxAZR zj**Rmw3C&S9QdhEl?lX;?j3rDaBKGs1yuNmSN7A;0qib~KH7Bn&?L~MR- zhC8_OlG2A>xXwLr&2mA-vW=~E(o{RI)z>V+Mou_0imi3Ui*T$To5LuKh+V>S7aan` z>J8y-g75ROi%tp;P%dzL5p*EJ#2SakctU42sSy^o2ak^I4r$Y@Au${6jL3#NM}jc<=>jK0m>`#WM)8`{X1=;) zQ@m!OICyKgL{_-ThHPWh~wh4r8JqY1@+ogJk_kwqViZflcIsfe6q3|ttTix@@@U#kFVeW zyWre74RLqUb+_y<+6rc8s$6$@BUYE--_Pw|I<-)^*Z&tdVwVSIUUQ`V`go_Vy%gZA&goYhDFz6rTuEw{(#`uYEfpj>LsOk!y zbSzlNsH;O2yC(cJfe{`N2@esOO9vNUi3N^eyS_L{!$p-z2Q^;Gs!Ue=Ws}ilObI?4 zw_R91ms?pGl?e~sv~uZyKbMOtRvH?YqhYUxb&aep?yGBr@0|z5Gg2xXzQ%pdK>14U zGQ|$*vUb(*bUf{<;puqW#GN=CQ~zxiuDOC++%mEz_w0Kk zpo0w@k`qDEFhF1vhv2eI+fGHc? zuPlg>5bcEnNaRcg)3>-g&fdPcRO09{Szq>Kc(0ZFz?RYZ8qVc`mrUc}xleBe%!|f> zlMrN_h#@vB5!MSRF(BLFoJOFTyj34?;3V9<3d|n}o_XCj(q?|B+|N-TB2_9vrT)8J17wSv)EB2^c%|J1!lIWQjCJ?$m^7a_CP$AA z`AB)vy~&X>P`vg^KfVXvHk}mi_j1nu98})B#%zkIw@%fkuADMW@KYB|txf*Vgqfzgqsz@@FSP%SV@QT&^z1m-Wl%E^l4>%fx;$ zzGUfBOaHWV!^C|{+{C3z!KI54O0ux{$HkwBK_rW}EcO@k!{Cv9i?a*AU- zTX^Tfbqkq^+b3SX;8{>FoW3wM|Lpt^=D#@qFY`Cgw}&Aj%K4r1r_KFp?mKgzojW>r z<6LzvA&1TUb@u18-cc(r#^}&h7@js3Kbo|)(-Q%~6 z_s4VN-f_+N8ROGqza9JG*n?vq9y>DD89QfeMe$#X|5SWk@kzyPit81uB7i|W<8QjxLs4N+%1)bPsY-BFeKZqFG>c&L|%uSnaMWhF0RysNl0CM^vp+_3%VBUNh&w z1Ltq^np@@SoSSl4VqQZ&$Mo8%kQANLuOZ6CNHp7AqnjsEK3j6_U!;CkJRv0&W@}V3 z6RyWXg~hiWFAsDnuSRcVtSzT8pF3+wE_d}}WV^{T&61aHo6?6UsXVH87ig+nQGxE& zt55R5Z%h4&^ZEvv?|VEpG7O?@!Y{dyY7xq5BElBn5V=!eKvIQ&F0~WruqLuyggK*O zX=yW*7v2+M%vfW(@hVYO6{{6*ukE0-o-5??N?J?%4N0(irfNtR^vp};@gyh_m~vGe zH2U0`KA-YPF%~sG6RXjxHW=L-IZsK+xSx<72qj|~(iV>!bv_EYd!)N6y+D}rv!en~zGjCiCp3JsN9u@@_KNQftM_Z6mZn4U z!Kyv#G(-ZlSzaa~kFG&9XdB~q*Hdk)&UKO0e8^r1PMY-WBpz z)n%1Eke_)@Dh^hvaP*P-q`@DdGyK6RsWU+izGF|Lt#$V!Aytr2?Ue#YH8d|yfAq)%QHqJMOpZ$-=t4flx$>+TprN6sJugOv$^#pqcZ!7pgjI1y9u95 zT-#}m#(^rfPYPbDm8>~48C1FKj+U#@RuP8%ayy2el2p0;s){ETaAgaI!q5>_EAmc_ zBak7T?xww#f29<8QY&%{aK&5((T(blQ}sFFYy@Gv6zub+)1($R{NOuRTvz{5%4Y z$P(WvIVd`4P-d47NzL#j&;+%zI0LC8zfC0I^}h>vld&@E_zDEjv4|^G7_j15>^x4sTF8h1#<=s zyy;~&R5r$vy#)1&&&%~S@d%j=D}By#OM@`YyD5Jh$vIK{f_)A<%Si?wtM>x!6^4yHZsTS#PtApz6{~q~^h*7NY9y49D1*xV@`BPb-yY z3VtOKE4EwU2+dggs{BPiJuWchX|LTIG8!@&hbHS-mdj%fJL&Kz{C;QI-F0RzeUDro zL?XLhUu^VLgug`Q_8pbW1AaXfu~=&!wTp6@vzMyma=#};<<#9?!W~P*6690~<>L5f z?BFG8tK%w8W2mRCsr_G;UMyqvnQ5E=em_~N+U%<-shG*Tbxh0bGQ|QpTSm41Rk=86 z&Ij9uKr7<4(mhHcIn8SzW{eWidV`5X!W0OdwEryiCf$nw4J_5C;MD765)Ss9-%0JH zn-R)y^%~VSTPYV%>*Z@tx^6Cz9+FKnKvE5MNmADFX>Zn7$z_OMFP*9wwXa0P2%#|6 z(ypqWFvXDaQVwM8Ek@p1X=|)RdwEyBrj7=3>B0s5N2Kngnzl5pZ4{}NuGGtt?D==d zZpn@#F;$H>ju%vmcgPPxksMC8@NgB1U)A?IStWm69e;hEq*_$c_wWvYJw9igNWp zSVuF_gg%kwRZcIVu*l`$+a|L4fR5Iug32=U%KN4A1ZyJ*Lzypm(u^jOPnn*VdYLG= zG9>bYx+z!Ro$e7AJ|@=>8B(;~XU-U$J$qB5J|N$n5^ik|L{-*=#$2?7RVmGXNcH2n zDnaAAY0lU*UOk~Zb5Saf@l=9f4P405%Gr!vYL7gJv0TAU>Ns1)o6whIz4X@E9sQwV ziv^=fq7?21@g3sm=+(PlkQ>rzjWo-;DXqnj$aAdSA-w=Xv3%L4Hl26cGnGhk*Q=%K zQH@_s!r_H8JW^2GGxQgv>JeVq)!0&nLW3o_hWc_*@nhXba%Hwpla>zKcB!0IhkE=z zS%3g@pl@fwB$MNN1^`Z055zuQ{l`L_U(k-KK{ubu$J}r4uX^GP4Jz z2g0>{k?iF8T&(SkIHLvokEIt27o+}OB<67G$XZCJJtHUC2(JfV)693~KA^aM>cz?P z#-j@j(MHI^M(E#|K4AkZ+X#e_P>HTR*6>#t6Dt{elVN|7xB-u$6w z9KwUor_K?sc$alW@P6R__e;r3zly-v>D>^CB_u;|Fp zwG1}7g`0S^Fe(!czjz_oj!Jt5&+;(P?p19}pdBd?06~YoB%QYfyz!nh#VLX30)ww` z&s8vGj>v#DuH7%Jyz*LbUVV%MfYa-4gLQq+HQb&Zi!%?wJl#8O+@&@B_4~;) z7Lqf9f~WyS*4Kt-+_SNG;`JT&WT;JBEPk@#%Hleem0thXc`S|*nLrGFiI5DJdO|>s z)V6`WAdaPXW8uU|SjttukLa**WLqf<*>px~?DH%d8<7bQ{q@UIK+GNvvx{a#y!GbL zAWN1^Rs{FvS+4B$2hoz$%+Vy88IcK!TmSR#@i{w%i4^xg5?<1QG`DZBb7Mt((_yP_ zgQ@BzqgE)gj6YFSQc|m}G^S}(CJ-O`^|`_)j^);bN7I~)!1MycopA^joRyQUI5(&_ zR`C;(d!pJRZ47j-A=~E5)ha-3hU@#I*Wo8dWdOdno+CW_6Aa}4`H(n;+g^(f2R4?( zVHg_RgB~|1z}05n9962DPK~^-w&%osd#X&hg4uFVc<{AY1lK;#tqnRkPUH#P03yHq z_9k~Y;w7yvQz>bQ>wJ3QS_QXFNWT_sjfe!rfBnxn!h;{o?;L#PwcI7x{;mx`^2@Ph zN=+aNewswE)zwrJYG+z{MQaAHI4TqFeam+)8Qht{LYHjc3J+rI7OtGTapp5qznt7T zPAUdl_WeyGa`|oS!RD4wkt}?b)m19#Za0%ll$ALlcoTPE>C{qWbv|n!eETNY;kS65 zP8~0OE8rCxSS+HblT?2}7%-_xpIt>v5EI30*Q# z%?S5Z@%(5pK%d9X9wKNB4%9doepeSJNy;5pnX2_*rE5k=NL~Ehkz(N?{Z;1*|9V4Z zZSZ^@p1v(wM>ij!IwcKYT|$jWTrC8fa2$*j3rFd5KqoNB?-~4ClM@pfH$<%Jy5zEm zw(MRq?)Rt~x>Pvc(h09{9$t_Qfkq-vKf70hE5eo(PY0vc&x`QuZ+ro zGPn0!;lU+-ZJ>EI_PFdhTRClMeL*wz;fb%$U9DJ|IXw0o(G2>+-W%c@Ky;Ghj*_Z; z-bLVYs%Oh)f3YZ3j=&`|e*@fyFA?4A_gy+D+`s|5Ccg2C6HPQ-IlGzQeYUzg;V8N) zAR_t<)M@8~P^TlZA6%Y{lyRVpAdb%MzK^X+4X8JCBD+x%Ol0Yb8py-4J1{rKdxVmfIWZcFcNR-Bbke zLFp}6h9jlI(I4Mn8$9zCY}Z?kaM!+c+OZ-IzNB<;?>+kv>2cLN5G*n>J;$f+@prt; z)X78z_q_`qH1L~s+`T;Oh9k%W?juhx2VWPQLc{UCSn=M=hG&Cdw`bPG2x zBH1VtfNufdK@YJ~06oaH6DB`3TxJKgBuLUvaS3f&8!;I-*af5TvhJYU1^C8BCRm#H zHGz2##$!Y_z~p~YA*gSIe+-VqHptw7^koMg1xTTKxgMfMx?&G^2w%93TLKH-W>o}* z@%xtv`+mLZ`~UKf4Toa)?cCya#2%53g1cu1@=&_x5fO+$xFlS72N+c%w{uIYn^X{< zxb1qG_fr@;DVOfxW_N&519+0KvzwR#(2M9eSf=7pzwpr4;r{gA&P@xpJ2RDGeSkrMJ3pH-oO;zdTY3a*o}i z*Ys=`I3~&x#E?RPqme4jXhB=Jk>)|35b9o(H&jfZau~IsH91 zh`+p{2$u-u+870CE%_ecR^hMSti~+|w>g9_Kk%|cu>OUihZb-Pav;;F{+4z7&%UsU zZa+Ef@V}^N_(Lq!5s`53J5!epfP*3kXKOy}qzK_{`(O2r2c(x#*5`UGMhN zs0Ahdb=rNWW+nG*xYM>r55I&%q~jqtW3VPr6-)l63S z#7A+gjus1wAARYSgO!hQ7lZF=1NgskAj`;h8E&FA;Wc+*en&(Cc9QCr8^1q4c>FF5 z%aRnCa*d?ut`U}=$a&5Hhfd&*SDlC?9$6vs;`u)hzI5^2fA2PEs?3+TtG45C^I9F? zZ{j)tFd{r6BqeJR9{mz`aNA}wLGg!AoUG2zOoI+84GppCW_ge;iDzVl_2Mr=M>>fj z2>UnytG*r z;mPfvatNlczU*dx?^mJEoOdKoL=d0445bx%V6(+3gCA+W4xJ`aQHxwuaa=xd6hf~D zFmwi9>fZxjNB=gjBAjXO{^LlLp=RIn4QO_E&%z=esNg2!fSeM8Gxa#y5ltr^AZOFS z!>3Ln_1dhqu;t6xxDvhH$5KneSH8i$9G>U;!$U=P^$A5cx((zl^0SAb=tgA&#mzQ^ zq711i@B0=P*!q^!rpIRczT;XgZRv;4LxP=bI{eFbieg>wh z4?ZJa*iR7&4=GkpHZhI=M*Q~nZU7ZbZpx&I)J+LqRb<$xHBrk*O?~TWGQ_r45C;GzL>me(} zw`|2O9O}ieR%)d4J(v?lWJ2|+H}Aj2`RLxkW8Z@zVBNf-L|4Q;Z8s|Uu10NiXyV~w z!k1CXt$h2(Fyoyn0y|1|zp!tIdgtKKWB3?ZF4O@20)#btsrq-QQaoEs+;QY77Jn#g!ey*qx7AB#S$Ks0kZw>bB8HzLgFLm z+k`V1?p)!>=cy&3@;}@|m>Ln1Svnt!svP(L8JC5q7n|vHT{=6?`vqorL?jT?Ujq*O z7TtsdoAl;iNVYf;np(2@W-XM%M#M~3vnf&OQs%7K#RJPD#lqo7`jQ!L+kc8iR@cTw z=#3OGYPP1?c3PFUw+S=p!PQE9$1^~*K`Bp4FEE~3O}btkHxjN5{`Ey1-l7G02>m?V zoFShouBY0u7|=yinxYM1iQ?A!?_Xl^jL3wC9+<{L7TKMy{*`0|7SXe%{&nLiuYq>d zc#T@+r`k&4vO8fTc=OLN2QLwwdE*P044(R#WN8#3w535(=fW^F_DqRptdfl6eew-F z_7vI}l?jAy_rbyYo)Y6?=?xWzNiy3Kby^dtIkILprSCS(g6}ghthJxTb~;rey!{pD z?;kvI(*T&ZPke%#5Ptq!?yRk19P#8U=5C+*Gh&G=OXhL^@i=1N2EcCRy>Bzbie0+n zRjYcDz@8@F2j?ew1XG_X6O!+q-aqh7@>hzMS_I$AoG zluP{TS;|A;ds3@TUL_+n!4*+EIY-m}Usxu4-5UT;mS@*lvxeMcFr3x4Ge$4v8NTwW zVE7YO$%stY^42XPaMsUv4?g%OQOEc&Mzn?q)syFYN-%-E^rFJ*^O)vSMS}kDZ>99y z0n&4k8SCHpJD#%5=PT5SELlvs)B0M&s2R8J`t6rXy--;<32ffe6#k+8hXKfiVEw6Xs?@mVAh zl5@_P%+y;HbHg}9Fo|zCagS9DH)*TY1*}lHZO>^_wwNANnU}2c2bM>QMUG4a%BJsF z8hm1vN7|lu!*pVCH1evNj?lN$dBy~G6da+$^`#xh`WlgmXXwz_xp#2eI1e&e_Xa{& z<(1F_N_~qk_$yT+q3YP(f?vTOTplSE{NJq)Q%=G4q2RHWq8kphAZ0_gK@SKHu~0$f zaKTbr1~{=mv;v2f;Bfz5hEfA_Az54P|k+Wv+eZAeL;iDt%Wp-q&n6E*VqgvkkC zokAO<#ll0Kple{8=8*yDiEA|+FpV~&st_>3x>$ZZD6^yo03!goY-@0wH zDzN|D`oFaQ>^>jk;VxQOq-!BY-3`>(Gy>$ocN+qK;f06zogghcnSpncs>qpp{Z2W< zP%_OO;*lB00^Ak3aIo8SU`=d$tl+Kf>APa1;&~_U{GcSy<&-_?%%gh5acg!3> zB>2=Jaq9hJ=TBWf_Qok@$})A%)ZFAV2!g+7@*R_n zu@@&JliJDM6Mvm}eB$&66~CMKz{Kk(vJf(i9W28d1Pt8N(m72XaE4f4C^r&xYNUX$1fd=7sG%#x8(8VheT2XmtgfI48*X05^uj%NF~IL#lcbKkv=ie!9 zcGsVfe%QdF8=}d)7Y9{4VC6dqC??jwB|VEzPY@ELRXX15BS98DM>Yt%{$)uF%z2ae zK6dd3S!}uj8sXPJEJ*`=oJ_EZ5C`IoFpVDu7P`B){?C%s4L)Ub9QhR>z~Es0ZG&ey zzn&XPk*Sif!p0l|Y`itxO@z{vyN`dY$E1gmw+m2Y5Av7A%uP>-&*KwWwH}lnHWbmU z%4>qr;T#8N-qSaOG4w$ETw@KgG)0CxMk>nZU(T-yxz@n-|UU+v-nqp*dCy;fD z%xJccnE*UDW)+#o)13S;?DtsNP;6cV#V4@-p^?e?_sddP_VuFLfKC#-D6R;5Z@1yN zRD{ls4+VK?Bp2y&3}eJlq9KbDonBo+sOx0Mq`oc)XOQs zjswC1zMy!!EQLx7g9N;f0kJw*Hz{%~M7SMSNaA=$Ja@2_km4TT+$J-Uvp8!0spC?w zNd$6-#uGOi93XH8P`lnHOWXJ#c7h+<7#+0QQ7f(5K6PB`F(DiYDC6KxP`dlka2o@| zEnak7j9D$>@P{(BfN~xwYIwJ`AIMT}bz4qm)|D&*}HC}Mp;d54v_I*AJm@~j>Ty;cXr8hEV{+8(M&nelH_o`uw(rP_zCG$EC%w!JA~CQdbe@l0-pzWiCtfi zS_Z^KuaAMmk?KY21?Ce5dUt1K_X#n4k7z(#m~eHbyKyp1>{iNB3@wcLq$e+ql;~f; z?VX<^WGPNkXa(_gSOe>h`r9ChQSSQHaVcI9D+cFEpA`?yG>IihF8*8=W9G%(fG-a5 zouH@Pp?GJTbcrbXu~EfyPu!#l3?|OLUYOi5E00b zB5DabfM@}z?4G5#`>6D+SQp1Q;3sgO!oh|b*0^fEmb>7l=5Zp2B=t z7UQzb^WxEib%C3)8!F1(-ZmynajAr!?-_6*^FY-CKO5A-d zq`k9tfh-;I-S;Ku{qj|^7~fiYRRR;>F5;eI!rh1r)2nt_O5#1**y(^4!7@TBh&azv zAC;vTB{y~iHmNBG-2pYl#+6HtAD4=+fO|7EOBk0^1BV+jJJ~-+7K@r6x*Bf;pA&99 zgvSc3?DJ2OikD|xs-PD`Is7o!*_xE3_&SG%goeQPoFk9DgWwrVQ}4KR7}Nm`f%~E8 zrKiNRV(xxP+Q*wBegvRC;@-zDcY|>%QW%%+YefeR$++l6gyO-L!Tct0@G7p6o5sxt z>%s&sq$2JDB%FgGH?cT%LJH^+@x~L6VvP**tu5RZ`RIa!O;ksHe9|Hb9X-ds#=ab{ z$q(Zehnd4B!7xEJnE{Iv?=E$YOX1WM`KNI45YGyzUaMWTx=WVg7>;+b0)W&Aj=+!` zTQW}UiX4~XZm3FtTuQv4_7g=6HEZuF5K7eXCUf1rD9){Fp5RrOt z`M}Kw5KEY@;;g)#aJLI#EYKB@-C#j8n8;jjhkOqhUR)3nqer*!vORopSna!&Q`boG z>P0bzVAq0U?#TERGoMrxr-bUqF8{p%dK5-UN# zBfq*bDg#x;{ReLu``FIGH;u5%!H+Kzkw`&tdI~8umQc&dlr+JJEiG(cgB|nKQgHD8 z7A%qq8Ml`rjL^Nz}RGQquZ)Q}w<<@O`2ALf^f)aEaLA;E8XiTk@M$!Sr zmjO-Qsl~$E)zO!lQ@#9ip#0nL!)!V~Y>Y^FnkL#?DuhhxfTLj12;ba^S30#=c!&j< z+={TUeQ^0M{wl?m43Se->1a-;%eeEM|SOjZm`)fshCPB__yhPPL*!wNehle}yzZynz?_|ZCs3Bd)R zK#_wBPPIuLH&=yE-`rd!T>G`HbA!R@uuratU{I$;0C#a{>fK`>n|M()GG4a#_5M2m zGxz3mVQpSBo;u}N2pc57f3t-!*hle?E7o7{y`w&J!J7{bA1)9<0C3nGM9UMW8(yKJ z#Pp36A};WC_bG%cN!}y8Nb?JDfhVvvKrRH=H;xJHRoK&@R>h~+1dWOZFVrSggz8PM z|CJ4G+YYD_=xR}EKwWZBdw~J~v^e3jYW~35rb6MlPrvF?;WkxkS-3*;vWCQ4HT(y* zoVuXIb>`A;zRm_Kn%2zn^(SAERFl4XL{>f#DEGE`fMP*phH<4@Gbmf_Doh?cvHhKxvhf@}%&Z&1(y9cd=^W z{cqU6CVc4<{^eo|c3+CI7+J;g3g1Vnl{(@iloR7fz2Ryf99b`eF!a95`M}m|!49Rk zcH!#ri{{#ZfBopxV}mnam$NJOL^i@R7s!5*k##j(F8fq!t?HDBq0w63spc;m95suo z$G7o!wjVxY=JiA*oo=N7nXToe5fbjuV{eYghOAIxJk*}Si+UdZAo~WQ=iZPRI%}Nu zjGs(0CN2~~l3GM1%vrGoMoNL~`8mKWee>E~!eJ}_X9<$$RvW($c>+VKoS_2C6Ac3r z;iH;J*srm(HR148{K1u%loGjD{+&2}b?~RF;QZMVw&e9$I-<^G;lmt<1Ir`D zg8ung_<9aaXaAu4a3wrx@+aO@a z&tiJOHY97Qyo&64N?9W033r0Vs_?dRIp1n-*+u8ns*`=B1 zm(Lx`&iu#Bzb)N5bI;7J6W>zUW)9D=Gl7|lX3iQvQ}HO6eEu-~lj*N4$EWX_e)sfi zrZZz_OnYF}K7D#>>bFxrocNpK!&46~>&IrMK0I|~stZ&r|5S3yK1D7ap4u}t0W0_S zCm)!+b9`>{ZIjK(YbGrdgNgS|ylJA`pNNkAVd=jnE}uAOVrBe=@h6s^9RIiRdzQX7 z{+{vIjpvtt39g~fEWaOy`s(D4rNWYbNw;+7((KsXi|)ne79U&u%Hqct-@W*n#ms4^ z4YTZ`Z5x*-!?_TV(L`Ety)Gnyq(_Tk7ei(!hu&{4w40wGZwRI6Kj_enxoBFIYp!`{h*HbG5MHZYkk|K`~yj?r>c(_ z;>kvYwWdOEl^W{#!Po7~MyZrL5^vf_%U`APYMM6Ewsuext0c6siYENaVKY&#p3`SM zz>imFEy`xra-~$<@^dM=S1>nP#d@01sVq`{HnxF5TgzDLQU&M1hbPWq_c)!$pcr+rU^n@%=v1?Sj|QmB+ij& zz142efmA@(cchs{Fv01qQuCyV(XhH|PSe&TT-LOHeb`P+%|~gn+6K+9%Suui?M1iC zD30q{7GYIvOt*W!r%&&my{wKckvbt)-6@;=*H^;uH6 zs_6d7*um?w8jP%bf5UrTkVYSyK57(70Up|F2V zYKJb^SW?e$&X!Ld*eyCIZ9pD{?!~&v^*OmbtEtdBWt?{wEJ}4Z<#<>w z4}0q*5jVxlxfbaovvbmlh=CZwNQO&>klq6)V!f!^erWhWw5<-;2~`|S*+tqFc4hpB zrSgi|R-pAEPseVkI#?CsuSq{ZnA$F)*RlA@+G;)3Q2Dnlx`pR{_TPK@F;c735q4Hx zrqgLdf%3HEF8K^?BH)N{z{Yjz?b`M4%PY%68#L)`yI0A0lUj0LS+4G4^h7@4=@k=1 z&t4+W|EOHAM*!}c%S>`JDjnb;677D9joNLQ?EdHE`a~f?!U!HI_0p6+ zoLZN_3Stz`r^%k$6wzg@{)8i?bV>CoF65=MabrzacG$b+^t!|e5ToKYTd2iG+~y!l z_;i;_3O&IJLX4<7oK;iF)}V~BQkFkoo?e18M_^iwYU>4K zq~+7DoFg?uFoAxYOa&6PEHL#gQS}+}s1aenqc|N-s_jjh92{}LD0P!iHmmw%)2A$e za7o3keo`t{cALg#DUrz;qGnUJupq%%#FU&VYjl=5Eo}*-; z0$jXC7-9`Rr(2V7J)&J6*%C#iJ8v=|8>OxuUm9WzM7vo~m*l)fe>K}G>b#st4*@)d zXgAn$Q{6bNGp5~DBA&YZ2C4n7+fX7+{ za&~}#+WU~i7-OROhVJ@%T~E+u%f<2sB`p?hXS*$$W21&Ho#M;B0`+I9JMBbU)8$MCvgU9(6V#%F z+Z1hwbYQ)RS#oJp&{PR0FZh8}z18Mebtl~*I8`U(?H4Zopw#_Vtx6CLotDwME$&E2 zbN&&ze%@O$TjET?mnthW`70!lmuM?)H0Bt zxloW=Z?asP3In#h8Y)*wmR!0*D(^QLYn{@C3%#PX!-pEY?w!)lHog9MIIc=LXv&r` z(l=PIo$;PA}ZMZ(vyd0eRM^aNmc1YqRwP45KuS5HLoV)&{KY&-Bn}M)a4iV9ydi} zv{mI*>wNBrBc9uL-gSavwyiG8tFuv0up9zbkLH3adva;RNu~2~OEDi-R1*2E*9+rQ zEwWTgme7B9)d}=4x*f0B~@c2z6u?wXG7{Coci+ zEIxj|&>yx@%*tBwlx@~ocN$F8nLq2v%Q{+?uvyh{PsI~!6(_Fi;%6tPcOzY{o)>ZTSVu^?=bH;r_Z24bfk;q(jT6nPkyHxivaRP!qwKSWYwgRW7(bC6MIT-YG2tt8+BW8>eMKN-9F6Vdxo~C zN>Y2%qxQzAO#*F6n9(Nn6dSRagTY)Ov*Gu>KdNF>)NII+RXcKKX}h%k!-Bk2R{LeD z2CX-^(v|F7Lg5$wYANZkfmA)CwCg-gM`GWQrYF~XXJuu%#u5v(bvDCj&*>ENx`N!2 zW*z#7ycC?3kG>`}UkvMLD%p&hI|^Fcs-)G@p4`*a$Su)EmStxB1xIn`4T8MTiF7FN z`&f(BvWC*j_q-v!gY8@~*gIz^ zofVBdZJ|`1rqmaXC4#*zR%vn?C z;SW?8i;L3E8C;E+GhLF?{ucy!!_&6X9jz;$FZneMgCg|0&=3`JIcS-oRhMa8vov^- zdPl3a#~P(Hx{^IvkId2eLRdknrn)WGheNBBVx_W+Sc!O(lTl)2!&LW-|Vd_!M>r@hL4* zk#V}emz@74KsE8nn{hNFBxyG-Y(PoX+-yb>&qXUzKAy0FeA$caL6M3a{PuNSw&{)B zS|6H0E-BAQBlN}@2M;JsrJ^CKlZ$J#Nn(FLUPmM*6nWuXQVFLvaNl@;3E&h5Tux#w~m}^pC zCbBpp@}i@WA){f04F41YBxdQne&ZQKoEK8S94>MBGmuHJG9iYRn)2G^!^#a`DNJkDmAJP<>` zL@ecA$7Q!9wVBdpa#N}_GP&#%h>_Qq zAQAOn#HM#lXuE`N~(7SJL!1PNh=RFQ8DsPxNe$?>0Di4;V>LuVgg?{1wOC*-Rj z-GRUSMplIkS4e!;PS`3$owB*o#N@J1pzd#U$zU~44i?WD;6?%mD%?uo48RpFu6oc{ zVlJR>%WBE~7PpDJ{?QDwLpPL4W1HQ`N#nB<_{%V4vG72iQe?46yP?V%kWb4Mr$k?u ze;Q!R4I6o)blM>FR;F}loBi%OBKT(`ZaAqIhu6A+xBp3w31FsF;1~3qdq&EB>-j!VmSLS`HfOR6I-q&l5N=6PaOLZzK_2mL_V*Lm#Tr4J% zHJ|II?{DB9`3S#g0rG)t+nygvS?MI8D|D8o%%x7XQ{=f87VSON()h?y6*=-kVdl_p zD;v4Dt0j+Q++&w#lyc*otco&yzKZ(cNKE!i;4z-N>IakDcWb;4bUnp0FA0t( zsqSQvhUrQ;RW+TVtQ36U`X+p!NCldqBk$lZt>@Tg33Ujrr+Bs?!4WEGy}V=hXsT*0 zHV9RQe~+1wrBc-3yysF*+b&roTan1!`(@KAcerJ2v^ZDDMlxw1*{Oj0+gryJiBvqr z!#l+p6WrZ(z8AKqc*dh_H{k50(i&S+7D)N3ddr+!EsW;vx0S|5ma2&4J9}ry(JDOh zuWmytaOyl0l<+RGqAZo5tx1m}-=NB|Op<)2gP|3PfuAA+Q<*NXiJN>chPGFzRbMe8 z9Zn40E~)pK`?n1IdhlVKB2e*+5|{Gg$j>&yiWmiOxQ@G~Fsr=a$jCHm@HA^XmVA;Qu??hs0P`kN0hj9+)7;|+P#=R5s_LTENgFMh z4hH9JDI8&XHY40F{nLI}-BK0t2H)2$U)ad4`T#cKZ6HwUSx>towaF-5LRXeWI_4HQ zn6CH-n7>#Ic$(F?Cw(isfjjmOy!m^cs-X>`cCf<)+9p|!&U>`-e9#w6lhQ}ghFDCF zJpa~S?)XRf`vvz?EPgIbls}%!x+%JnRU<`NpK1#ZZt7;3jz|Tfsz2~mD`1tonXgUI zYs=D-tm2%Vvzh6z!kH!i{z3d7#r2%yLnW7F9QcJU1?BXHJpNosmrQ5L zKi`6h6N$;OWdBT;LGJLqnK5qbt=RLo@~5OVE6OWIOv4`?`r(?LtF!&b`u@D~iWO!4 z;xV}Wfb*&AFhRo7R9OO%91W&nS0WH@x#h(66)dNvQnLU3BiMa^9^b+}@)iD6p?HdC zq|j_pVfPKmtGR+auJftNJ|`1Tr%3uy6l}ap%-!`UCPktm#~&-5x&46rsSf%e6p%T> zijc9U$`xuxd(t$kB%m_mkCQ9+O~2LonbvcP+z3G$DmwBg;V@mtr-a4!=a zIkr(xHPPcsx|c*oOQx!^un{TaPpfBnwVxnnt1 z-I=4BT5DV8Nhv6|aPaB>B)?fKRgq(#er%d^eiEZTC3_0H&5ergsLv_vObz@W?rPm* zX2U7+#k)$=V`3@y^SdzS{F!I>-KF!!XT?aVBy~6M43>%k|8dP8?#a7xGu1OCb_I%! zKRom!m{P9){uONB+bi|FDFv`i&G*3)gl)>Kinp6GPb-y}trpBlRhpc58UuUFQMe0{ zj%Z(fa+-Yay7CnF`cW*l?TY#ScPy&ya#-kDbqHkc7N0M!5!!j|yGX7GiFDlm*6%X% zR<-+C+~d*nt1v=)g?qd>)n;X-N{F>&ysBnGXr%RQY5iz!sfq{M+f9ZWca3n*JzJ7u z^QGojqBn{yH0+xx`+YJnjQjIyxx(Q0tH`#m!oJ@n=Dc6U`IaB+e|P|6?Tz|MHG0-K zR|%zAlQ*Iy&pv>$7KzFJJ1`E<-KAf}o&O*TuEuFyG3cjsov0McOe$T zVH=3Wea!h4|uay&htQn`mRArbAe8XD#*g}My{=BVjDvzCP?#Tn6+3(_TTx*8Se3y zF+XPHF~4$`d=;1fRtXSh%6T3R zQ)nY9YX&NmOV8B3&TzBnNRcPMjdu}=aR#~oP24xWireuNf4SXB&E{CTQIW=?Ijhmu zqRDmh_?bvdcCL}ma4*f5fOg4*Y<3S_$>B0inRKU=aiaPTejyT*>aT(GcJ0^uS8<0v zlsOY83f~`RTm(EYo5nK6sA*?GgC3jUx+jTQSaBu<>dE2!EspneIy=;bj16a zvthq4L^pFE{yt7{+juZIVe`yT21+lhXyp}u)-LnN)8w%i(aL+CD~*kbb%avk6gRMr z-N-%k9DkgY&u@Zt2|J+5*D`4{&5YiuYt)Q>Ir-w-cv+E@9J}s89^>$z-6Z^%(ur-< z{6=sSUDh=&cSuhaV{XPVCrkTfW|ICZ*5Ohii9hn#E|jBVFFWIaYJL)LVeI}kM43}& zN~)q&(K%_YnC-sB%&16=)$v>8Tm85+!0q@UN+`$i4QowOK5xpK3iy(96&dNggiedZ zqc81#bRDX&uTnmw5zbq5Dqx`W_&Ae_0yh z!LAq-RiGvZ`N{@9-Pnul>?n#qe~A}dUW=TZ?}WI=AI)4UAs4=ePj94kA}`m-r@13g zkwm3N5_z`Bl?%OwMwZv|)t#q|()cEnW1zSQs9Qz64u%Ff%jiglSbkHQ*|@xtJNVR{ zAC-^`UIR0!lG@^RYIwVN|36BCcYZJa*yLgGBmo?AXVC z%>0c=W686~UnIt`~$?z!s4H%n*Yh_@YYD;)8(jeMr6Gq>kdEtAa$+-SV*%&16;tS{qkuKZv8>B{d^ zNK^8lz7xo+JoPGKa8LgcC!=?XImv&++2B-Z`cwB*xpnbRDq7WwVJ?oV?m2DBXV8!X zf8wJLOQdA~oBuY=ojG&Y$uE_ae=eOnZZb7JQYu4bj7oRDQOFm`rGJLs5sQ&6Jg|#9 z^k@Ft(U4Q5%XF^LuB5zdB+<%{|M}n2u2GSg9NYgzKvTR0zur5qzmGp!-3FUG1LyTG z^}V@Lz2bfR9+>3)K9Bw-_(eO*NjY&vz6r@ZM5vAT2!@GBB?Xbj7Ut5(EoG}_t+T>kO|O>b1zZ@Iy4G3HD!ygt&W?* zGV)A6{-#I_;F*7%=B5W2oJH_8Z7$0FL9=tt5Kd)G8gk=mX4j}lOrE%FdYb$9)#xSm zX8?=!_Gg8mWpL^oPA$#O7G2paxnvDGxl~HLzKcLn{a1dcd1DT{+#^HG)Rb)gY_uY* z0cXH%HG6f-l(6 zUzQey2Ad=3i&#hYzhpa)`_>3^g=At-@&jPH4>yPI8~ojBy1&);Sqa%+8hxJ6k$)YL zg?S!=O7J3ynm0d7OWP?|wqc6`#OuUXW`bOMA@4<&sz`P63{0lOhCl;H8Q}Yi-j`gIAid|ss-}q1T!-x7L#L-3;_-Mnl(V^K3JXPavOMiQ_Ww5 zhA!Enfgg%9$wZnCnmgu5*ltyT7ku9)W|I8dBr`t#E*}PC+a?NI7 zlB_ppt>{^oSEW|wLm7kdGT1YZ3?-~8y(VAM$lb1_s;Ufnn(7q)2WCb^VzPe%Kvz5d zJF|-W=_UrBQodjmtW)-g(e8S-j2V^)UiW6l=m1O4lzTg_tvxt_JwP$P2YnMl zMTu$_2`p_YR}HF+Y9t_%KWt@Y#@{98&fUfcVGDMOIinZu+_7RrKYYzlbMWA*9}av) zvSa1{aByjZu#><%4~f+7#%0?bkG(A~*%B?U-P>t|RK&Xz!zdENr_IAm-W=P?J+%`v zygfD#+^8PJqsxSEOga~0!;xAgECo8#mn~>QB<6vc0IW!TbBvp|GET`>j z?0pyWomo~(j(2AMK12=w+GN|M3?OQNN`aDK)SL%VZI6mOlsviuu^hk5H=jkHQZKap zlbqzur%?=Y&u5rHGIBXHv@IMoEh1;{1e>%Jul;n zq*_^`XLf2c0GaNx1QPx7v5BV3bzp2zcQc3qR!Trn7A4oy6or03j; zih?{3oCy-pGUH=n9ohdZE~U%#X%=i8YX zSt=zvzx^yu0X!7D$&3@zHbD3F{2SQ2ma=s5zn>rjMw}%?Ix;@HN=iI`dUQQkFbdtc zVzC=VSveW87Hw3-zm5B;1Kx03VE$qh#q@Q*m}*L6jxnb?+5}aU<9-u6#v}p4!1%f)8nXY78+vVU zF8)*+Te0r`;i;8Jhi)8H4jf()>nGIC2lU%-@ExAO#qxQun@RoBi4~@MBYDM#5n8J1 z&Up`B`+)%C22S^3@K*FZqiAYlwD6`kVsBb@+Iw`$SEI6b*MW({8{l%z=3P#dPlqtz z6CZ#Qe7wNP1Bn!HyWX|t%YqCrT9-Y-KEZ>QFUpFQ5y>w0T~c-5bhBA z{rwQLej}e&@$N^+E1ed=YQxNFk*LDVy{DP@L}dAi@0Cd@VoZbwkIlIXC@u~A;BXPY z0hSY>REk2!z7}KFPcHiieBD_xBIUMReHzDmM791Sr0eUpT!jHZwK-m#uO^014IuOc zckVR1@?GoNrBHzB>69<$<(?+5Ts-3-Ph54{k=S}Qb7-6O@H&(d3NYkL%(Z98X8>Z6 zIyGfNzvQW|QJ*X$dk^F2k|iHpdHaf0f9%^19H{wKUtamURbG{TOA zMlK(j85v#or*;3aZhqa-bst}M{koGh$%Dgh4F72O@!`*-+-M(PZ)6#k4sTxh((sD4 zudRJ4>Xk^WQuX%aR z{Fgc99MR%fUoXHB!Y4l;x^ z0eNVZ@U%AAG|A%WkfEX~6>52U_y;|?H(-+EP!0nXsG~`lQieC9Qp?P&Iw68+>thyRQ z<#HZrX`_&L>{P3iMatAEg*5d>HO$ESg$!M%su8cqSh+M4)|xcAoLwM#~~t-sFb8=q3sboFILz(D9r`!4_t9GEmb#BlJIF z4f(0E$)HkNsG3fexCkltAVYM9nG7oZfy-mEtBu8YK`uNV&S+7P@6l>Hih#cs&urY? zlgGRT%Bl4?P0~atUsL;f#uK*KwbVXo*{f^&432sS^dUQ9|U)tsuPQD-)M zTxciML=jLn*eqDwZPZEAgUz1YYp;VxyXa`gnu@qKe_n3|h3t$}W~Q{ccCmwUJH^&| z?|E~)POGCGX~B_c?Njc{C+!I;~b{S~*`~>}P^FSa3!oQ5=%mY7x>6l#?NN%z9eh|#JDNU{BQmEQl_gr$|_dU5klcB2mxoo&u zHs#{!4S(s$JuwSz!&t^9by#9^Nvl8)h?rEgC=VLajcQg~j~A#>p_)sGRqcBxj&-(> zp6(1d;*1iw=~Kbg7zC%Div&0~|U_2lMR1x+WLrAj)fsC85;Ul&}JUmNi%>IOy|@wcNM`ElWC zUp-Tk`<+ckv+B}Y9N9~Sf~|c{UnNv1Ce#&Q(W;Z9mEP$4%t4RLYB!kkfpUCSp`7`W z(2loVEK*iQrlyuEv~Fp3Fe|*R*N_CWeL96$S<1pD_WntD+*4+?awSu?C#o84MJqEN z>&cUhPFAw8`#=gV)t0LH%d|o}o(P>nCUvu#WfO+k#NPXR&m+AWH_mZ~BWZV+JE=)d zkh|x!*bd6T?yj1xATJFHB)d*`&FcwJQkT{cvxoHwtH2uXbQjz)THmT08z#52(Dq1r zZr|<8)hM+W&b-xXg%k3PLamb1?UohfRb$YTnT@7%R7Tfxwr9A5Dtlus(E0b~0 zbG`1!gBqDO%>=5-dMM(|8x?{a)zB6yjuqgkBPEy&7>=9Davit3W_ocwWNc$}$NJDACrX=$gPQsiWpHLEU;{Jht?JglK&C1o(P&sPEqdh&dsj0SbI{+i5Pm(N=A9i^>7 zd;Tc2?m&KG;n>l|fyf@0&jdO({=7VW()$F6BL>0q%FRcDeJ zO**wgC=YVl_i5&ea+56Vsi{13*vAGQ>NO)RyzjI%jEF&X;&ak0l>%*|Y_jhnY!$W&kjIRvmPV%zWPGW!dyNzt44su_ z?XBECwT@*{I|M>`r!57laJRGL&qd>QSN2Syz|Lul#^u3k$QzC-9VqTyB@{_HZEh58 zY3j5mAMom^vQj4$898mPa8s5@Xc+8hNNLmb`FelW%xZ!5k}Ipj(z&EGsfS0}2j*6% zO#!-Zcf6z1nHW{wRh)WI_<^<32*}bpjc+zqRJS#h@&!R|sWh{6PNlQe6UE|eIJqm- zlNX#CSyUA*T2#?O)0yp??#V;BIe9smh&G(^S+}BO7iuY-mOywPVuYGb+~;mEZkx*A z>ixi;mCFhRd)Z~l6-?^1y*FJJbCp7MkiRxd1X{BH`EKZI@V2Fp>p=@ z%{;4@QJILzTJWk%bHS2RBRp?L@hx4?&l%MF5-rMLEa7 zCzmsz{;kSA4Oup?NoNP2?#U^4j?x&Ta!VwqSGP*KJ%ZdcS24-ub47d0;>xC#alf=D zuQ(jCgubLm&`i~y&Rn{$w^B{n?NKYtp+^j^0YbjbH_3k-)bKTg$Gwxa)m_ zy_w7{+FP^~^#$7RNSCy~=(SI&8&oQpa5g&8qA#R8ODNEC8k4d)dDSYfbQE@Z+bX-@ z+rsn4eNmML=^vhgM;D1}bc#&^6|U15LLz0#ZlCq1>1wrL{8sOILo!SU06$`rHH$F^ zy{BhdMuW*Ct469gy_pS>Tu~#`4>}E18BEbYW%T)aMOn#T_IaTl1IT*lxkS;iFXmAe zW0Cxjz@-cz#bl>tE#%msCtugldoK}Q*I*3UtHy##9XEI?n#A-2LNoeKDk{_9Q0uF* ztj-hP(K{09n{-KDR?Io{?NF;=E1dsQ@A(27pw*!8toaokQ&K)=?w!B&$wFPGiq9!b z#$Z-$o9uN{@2i`sS|C67JVWFFPOEjFwQBrlg zY*&?){f`QNR@XqTMy`}d`c-nJ&L>~}zry3Xh-zP5?XH!LO?@SA$;|Xl8e)divwQAV zr_0r8ou?6$b#!W1N-<;awWIPiVqw;ceXwLjNuHu$)mdL%5F*03dC_xN3!xOLpKa62JS{2XElG{s^cRt+ZH1*aqnDE zCl3~_4zFF+intND`#8cxuOtuv6zjMn&(Yuz`f7@gOM4F^Q>X_Nv^2DKGU|5gwaZ7{ zdSU5!f^qRdoT^gZR~~=dyxwzDoBw715PzWb5QCdLmCT>f1v2lN`;{0BLzf* zmw$vDzq9!FhhKdwt&u8~IN_gF&!^71c*j|Q zv0LV8{J8^sb;{}EIt=1E_QR8l!?839+KZ3=2eWK^G{=p7d(g&Ls4%|up%o(+OG3l% z89LOze(>ReH~LVkSa}|7tg(3zY4k$MV(aZ$_J^y>ST@<2)?UW_y2^MY+dwYRYXRk@ zA&;z3H>4RlX9=WeQhfw#o98Wv)u+4hTxAwrk!Ae)l-E@91!ZzV)p0!~5|g<1 zAErO{-1=4AN9qhv%+zi#?)}1TbE6dvnX-Ps|9lWHG1kPTpGZfv;hQe!m?qzU64{k*{%^H$-ix3c`sFw_z5yYzWDw-wsQ71qXFH+JcuWH(QvcZ zsP|GSzcejv&{p%DT3FW)beOR*v5q`(-P*m}#C!ShzHXkU*toje6M&{g>1<^#7IS*( zNHR$}*Ws37sg#_!g~k|OxN{QKlguS2@8?1*)*T(*vhrVsK7jkV4_c-UpA8=<;GBu( z^5i__X_y?H!%~F z%RWKkujXU``x@Fpj5nWlRo{IxF6KmrBp4aUlb6~aZ(k=V6V$gbkxj8e2%+*IfG3er z#~6{`2M7ssOz7A{w=feMmV1I6-PHN$-*xv>w=u(;_?HFTyOT$u1(aws4D@1PwF;IO zxQ!W~T=of68zgMxTeqF|rMG{WIkeqz7}UGHLOZbm_l)}&ABM9L>p++}iCVh{ZfCsf zLA||eI4p4uy{~W2;8zBIgM8y|G!?Wj^A0Q>f%auq*-SfSIUpFO)Tw$Msp6hHnCVfG zm`@eoL+<(Xj!EvxJ9y_2ns>o@2%wJXs@YeS&r*~#QZv-+F$HNHg!2%I$w58xsxI1c z!yvihf#f*%>x29XOw0pHu}8QPVS^e4ou$3fk|8x~v=Ht4nGMA8C{lFZr8;u)O-}CN zM;T=D9Wc!E0F&|VDh?D7m$J)B_GrG4b~eE@^+8;WZ6mnlSgInD&s{uoNQcCkGcNH= za@P^wrRu^o=)yE8j8DiV_?CT5V=vhku#oc0sUW&B+q4_4XV z?F_DP^2KD#X-`I2U9hR-hjx-2y%WxDsS0@}y53#i$S3*Xwa$Z>=f-@u6&n(YwDNjR z6Uq3fXfmK7jk_?sA~8AmSII`=2@g+@FJJCK@!ee*-f^}{84I+A>f{0WVF?7|f&&QO z4cigxKpl1F<=lgJW1||nS|EnJdI$`-*CyTM>U)^A<06|7Ol6XMm5L0aT)mX~6hy)0o+c+gXWC2dnS9?UG2X}MPUAf8x)0|y+u?I@ zKoKsUmKwlG+em$WdD}R7X!`;a-UQHnARzld(tv*;761@2C=7B$dpF*l`vP3eITWtkyG@6A$7{xKu;52VdLE`8Z@bArHa-&hO0# zuc+HDm)suL>2X3>`2bD`nk7;q(fodf-1Fj@Te;=~{7QDu^H7IE5k@^#cDE@@z@4Mr zQgsu#YF8gaj)_=|tfh}mA3E zphQb<rp78M7GT z!2(@O&8gg}V9CRfoiFlf3(o?0_)8BlBcmccj{R$UZgI`SOjt5rNI94!V#)=RKH)1j zf?Z?WH6|95Bh@=D;a+)!xl}SFe6L1Vto$+=dgJ|`ZN9@4)}WASuyopc2J!MY-)#`^ z8cObpIJacC>~^0!a>p}6`f-2E?|7EIlLJcy0x z*{9%ama6y}J9&&cyujc6hl8LD@_`}82Ka_n*KU8doBCh_^9D*y3V?*?OHT|aIYA%Eho9~CY&k7L1~>n`*I#|; zIc8uz^7^(8ernjf>VF3Qb!fKlY>9{4`O#lrEZH{C!>I^91EJisMwXcMt3xrbG#(PR zxT}AMj{uR1?EIz;<$S*a%<7}RV|2*I^3L;EC_Oqua|&7OvW%upN0qY%Yl(E8hZiX< z6%#KBqdxPI*(ng@qK)m|c^(HvXrj|pCi8UEdCPZR#@UyNi!pv4K z^AgfpryTRw;CLp0!&trY52F(;wS)bdgxA_(1&Y!@Aip2u-?Q@RrY~jZLjZca8&htPwy}I43sU(&A z5ROnG0_tz2i0cKkVHSx2s_^~YJhlvAYhU2U!aaW#+7PCNh9?DtLD;~`VmUUCy2SY( zp$)N^?EEv5sHAJI-NIe+W4?{Vd<<;}1cNSbKwFS&SzEhSx1p$;BJ5AmhFDCFT+~(P zoP6&!Ec%IG;pivU2|Lb}N4IdZze3hK3PCfNGT}`-C8onTvj_~NWy+GQAT)EutMDC5 zRYY>ll>)Qu-LK+YzKsW>5V`^w@?@QA8_S*qYqd6wy*4U8M_0r;A*221{VZ@be$LOn zdp^H7>V9q9P^CLoS24r-WlXV1?0?0GiN!?niSO;@9{(#|g-=Q3@h60oM48vgwq;e9 z(&o0g(#@KJe;Jf+EEOYC@&*>c)O-5{ZcxLokgq;Tot$;a!n~v2 zKt6RG{zRlA2Y+q=kiY@bPe#`lCb_>JhYf7wF`I;ekp;@Oq@0SH%nd~7YYB}oxDWpZ z(E*VTxEg1`8v8%HiQDp9zFfmKpIDruK-6FG&U$>#kg=iw+6igCj%Bq}%4gv3CXas_ zB=)brjs|*Z=7kkQAMV?WlT%^v;r@w{^9Nq#zY=|2@4=v>!jee@w5&nqO{7YiR>q(N z{=ei;7<6-rPO&MYJK*YQ@tPlUtT7%HqwSyVI1V$$kHeHpF6b zZ0ZJJk3WolPQAr1UDy0O@E)#QU7n`%OhwGWRB*?z~ioS$w$15BmK# z(U&RTd=-5WIAX1tqI#A#XX=iSD`Ah;5B&)<`1%k#0TRun8glH15*WjEiC+(H)VFc;``o@QOFTg}e8Ue0S{g1bEO<=$k+sMThr7Bxxs zvoj-0rR2mHg1~clA-aWov7a?bwzlwd!6sVvx~epr*RiTX&SgrKy4^ZMrl6@)qW}7( zPm$xl@y(Eb=W86LD_PWgDFZfLU1q5#X7y#|tj8teTR}W_shFI2>dbCY;}))O75^HZ z`F9Xt5-MdTMz@{5YPBP+HA19+4SUY0NJ^+rO!puFT5He(%2yf~VWCJn(NxtL+DSVA z4X8=z8fo&yVRS+yCh^yAndbV}VQrkb;(&Ud$FUJA-D37^t3lh$b3j2-m`y-R!D5{t zjS(y}v5p+9sb{!HM_7wweD{jMj%4@1XIH*GvTay7~r??W4c`}G;>jw)RZG#hrG%51@Q zU>|4C9uHmP=sTjbFeaZL_ym+E{}!=nFqUhyKE^P_R?p_ ziH%!l$hF)VliV{Di=eo7p2w&WyptlN)R|JcQrW4E7^zBuOijQ7mrBV_|39Ntjd3X$;4f{iC<&Mg%xPx zechs$FjZ9{(-h;-t1sgDj+V)3Y>ZHd;1`V9Q- zcS*ayc<2m_AsM*-1L3K|sBG$`fTue;+-v$RhIVk)6i9-e;ISEYlH9(79Um3xx*P?) z2zu%)_DcT4rwQ^y@KkzbE|6P+{0Pjd!4`SxEVldMvy2uA&lMZF>TLFOiP#UE&E7j6 zZ^%m(xxvcT>?T{XsVJ#Ep2V_;o!)dBZLiQ|!};v^W|YG7x0B!x1}PSep5NUI8@|1l85&ow7@1o2=CH1Baws?WMTvTVNGNP6*Ee{; zMxd6vX)2o6Y7(U=c%!4RL7dFN#|x8Rc$JU@dHqEdZ#fciAYi_1-$zp;F3F>G{sxt6ub6cTEU2 zHP@H??JjkSud55>UYt#0LyL|dzXq@v-L9W0hYC6Y*Y)V zIqQ{FB)PHJ>!aOmNO=bmfWRpic#+0jvv9?Nsn<=lT?%nz+-wP6ur8Ex9GqUlq{ zL-bI0N%B?MTe#;g#mh`xyRZ^ITkvpT7YOULtUc^UICicH+_}r)t==Vl;^ICl_qEHh z%^liNj%?GySDn|bdJ);eNjv$F=QMWG%XGNL$6k3lJNb9tY3ziP`q@_`n-F$scCW`k zy9#nSBrO1kGT&@xuS zNnVb7CFF_-`_Lqh`pHw_C9y8?f6y2sCPpNLH-4<1)98=eKKS9k7u!bI>59d$Qvrms zJi%Zf2LzB9&-@HJLHL2L89fwZ*KY)8-ZGDn{SW;C&@iv=+C|R4^0WhRA*B8LI2%f4K<3tq|12)yXPo-MgrGMCL1Ys^KWDmm|iHjwL*7+jHx9J?otk3o{% z%KbEnlj@XnfydPmnknXO7I0vAUFo1f$v7yXSMRwSy;`b5MChU}VDV<|8+Y?(r32mt z6rA&X#O6)egVVn}3Rbr1UKCs9D0fR^5!m zy|FZ8u$(jHVGyky}b| zYGN@NfA6ko4oFYCBxI0fr-Vz@k9We;6r1yvw8Ys1I|eN5R!90#Ex%R?g=uU z+_&lfQhz;xEHNH4IS3YWPyhg*m?z$J@>ybCqk8-nmd_Gf?h$e<{~;T>@Yd7L&CR!V z=f=D^HzMOaX}HeYPGh(yWAz__(~KEHpkL;5?vQ&2;(FYVf<3f|x=+~tj7+UoQJQx) z_vN4FVKe_v2WBCFUtBSAQUB<`FC@jj%LkDRIeaA_JPQD$Xn}_t6XFT_Bo)@k;x+?I z>GcXDOSCK&^ajFi7!|3=v8%q^3!OIzix`n}VdJ8ga!Tur+ZEBx>Y^5@Ki}I)bRT0U z)-6#H>b|$|#rtG*EBEP-p^@$0g^5KUm37tQEZvsXOpRu$<0=!WJ|nc;A*?VJuNesljHq z&Y7rcZ+!MYg8qnfXy?B%S=x(N5oxr%iTn8@!i=q7oH4zPt>AnL;6YWcQLki#cl+>N zXiKCbN3PS&Aa0u4%Dr(HyZ2-;?dlbM(%}I7=kdY&`}-tUkL==h9=!nY9qt7lyh<=H zRkk+gp*pEt#mwlu9v~iLDkjM%j$z4&bUf_w72N+ErxH9GGF6s3I-b~2Nv=;H874XZ z&P%yBA7$5}y4|(F16>L4*5sxbE5tqy6h#9rXxbRN7`_af!71{qKth(nMN?_>4{IN$a;ffrKYIlk;rt`EcJByMkg{E3T zc$oj)%U@&HkBN2Ui6?-7aMb^m&D>>Q=La^j0Q92X$Ch|o>TOw(XEDbj9eKQT<6iE; zXIYPA{q-yQe89|34&5>M#K3>|?~+{4pYU=xx40J0#oN`ohlN-}8?4E7#c0l@w}G8X z@K3`(#u@!xD#?dD2srl74RY7~m>un*=={S^*d5zl3umE4VO49I(pFmTL!Ckl6+%{^ zH+4<&=I^4rA{}|&^6Da>^9JtK@A4kYwXl1!ck;R>9-{1qd`OBqk^*>7yJPsNCwLFB zR7Z~7|A+vxOaAr*`xgO}XXlgbjw$m3kH3}ezOE%%3VS+Mxy;3~VVk2jmz5{sN0+FG zcH;Zs|3$!_eD6sdLAx+-zyDVERc98vmjD@6jt&`Ha~5e_nX#&c?(O|Hx+l_+{nvQ; zMc&>z zq%qIFEp*UhL-_5J3+&W(>%uNHDx{DxwR*cl2g`|)yAg9&OkG2qB)?u@$Hv4ua?D>m zhm(GXUEiDDZj;5Q*(vlBiLJdW3u&+tiqgKE34|swwmm0U%>z$kR}-no6P=g37cpD8 zjnA-`pLA{?Uom1CZc9Es^o7A^S5NjE`sRe20`kG<*>&S_Yb0%> z^Ei5n#lnZiw(qk@C3GzCSX{y=wiHERO_%0;9<>owI8kz}fKlA{CPq=D;)5KIn68oh-r2%@NirLwwF4pcULL44O+ZVwQa!FclYc=UVuf5bo~AI42M|$rr!8% zd6C_*O|fthEKtDlEZXbZnmds2=j*Ci%P4%;zVZ`x!^lz%IcCCD#iJKqy@mtWpjk4W zPq{5y6tx#y?s$f!t%pvlWUx^DsC}cSW_VRq)1iI+0e; z8?EZvDxtm0UV?Rrb>zgw7YbK8pC`xvgZ7@BvMSCfDG1-o`5(t!&hw3U>*3ZSn?DA{Q! zmB`b-V9(jGoQ~{2d-|OFAAes#LJs|sUB8I|+z10sMzGa813sK;`R|@ojvRdr)BVyf z*>w}kJOSM4D;KjR`L5jl8au?NDT8;u60h^-{HjX;sHVmMr03x;W`Y!kN|eEK(Ng(i|NT_wd9qjlehn! zAW`>hKMuMH6M#$~8vNVpE&cL7w}c$o`qXR}_wS4Yp#|JB^wOX8IcZBv+jaUxF>O`S zzPK<=E=hT0OsqqK(P;PDXA}2%N!bR7v4t*{Tlco5+yZkpt&~aIwtO>MYL&>|KeE$f zVlg@LlLI#H(Lb_Q$y9tng+(KzleDs7jXO}WmYA?DGOJUQU4OzDilpTE8+SRl&;5xF z0MNKeM--H$lnbY3Jz*Q8CTstUB_bB{KXGxl{~32OP2tD1t}JIbT$ELub`~974jI;93vG#e1bg!{uy|YZ?hBQ@6vJqqA2rl zdup=#uk3l_^@86Ul+9Yz!J0vzqn+K)c;J-(6`O@fMua%JF ze`BZDEBG6M6T{lRiJ`PaG5Dc@@A034+Y#}OEdUd%cS5cu9e%CM5HJ*&fKQclB*nZH@k<&n+W3FpW&186`bCXzE^K%k;O zGRA3Fm+ky1{T)0kCM>HsD4J0iDmq7GR$n0R87@!mR4ElI`KdSO;^)XQujexE+WxW& z@ahYQT=%xK5?je8Wo})A(G?OM)L4?#<>-<~O!nVo9{Xfsl$%;p4oSvAfEjDc{U&KKnTj|| zDFqqXQr<-F94e2Figbi(0%Onfo%LI}{~6+c+i(VJ0g9Pz(FSSMWo@PT@t7GCi}~Aw zz1$Cm%RnrQMKv`ml}j_#Y+D+uqGIOa5&T3f7BaUU8o`K-t^DV1ENuUZz~FBNKGDCD z?5s>*w%va?x)=`<%^{}tJL^v~wY}i~S2vVhd`v00*oJt{gt;X*kCn&A#5(TS(H#g( zUA?~Ct(Cm$q^IX|99>~6P``OhYa5`R0050mkzAm{kX|-f=EFV9JwoD>< zcbQq@HsTGJn;>rNrJ3`4fw#Limtz~V9jC$CcJVOR1`vXUO$d;e3j8#mvtc27}yY{M9c%_>clQ_EP}$=iT4$~^v7h;bThAW;KZs)4W6v;vtM+Z^n4 z^I1~rltsJjqknhL`}3LQ4P@QXycPC{%+p?cGT(?vOUPOQ-(1_nwj&5EWXluerXA&p zQIQTi^Mf;ddNU9LuQ{uH<+#Y934U&p{Kr{X%OYLZ+4X+=z^*cG-odfvG$6!iK+T%W zRst^_10;I6@aHd?F0bFP+#}dpw>!uer%yZl12bj5WHyQLEf4HAsZZ!a@nE7IHJfFs zj11{5-S_+MOnG8tsftf=Iawrn&u+{JY9Vkl1^CHA5eC8|H0DatLa`~daQ33JRJpT_fY&&}nL3cvlra&!})7Qy(6Aj0Dr`?|+4 zmn_6|`#GaTE|%hy8V*3*FY`1IoYSZC8{MLmKVMW{xBhc0B%d3Z87=}k@R`-?`@?-V z@ZXEbIe3&RuNxN`?x(#wrT=o25w=h*SkR8K`%P4EGP;IL8mYuHHdUkGDG3wzJsOT!tV2-} zs=pp*hgXv?U&xG+Ywp{33Ay_%_IaXKl=*WG;^Vz@PK*i$vvRm(<6OqyY9WuNt|-rp zze{}bhyyAiW%;~u4=rP9I+D}MT$V~Aj2Iz&`3&+8mWav0C)?9xuk7lzi>DhEaC2jd zD!%TLu58Dzn+>2u_g88-EU}mzF=m}yK~o0QZXnXJBCWMl&StcZIX02t9Vjx7mWs*q z$B}C;eBNGCz67On3;M;^^T^eD&e`~>fi*!gO z8%Kn0@)O%Rx3!EcY3G6)hwom<%R3t^t3irQ10=_%RtU|M_2{o=iHaQ5?&;kjKC8zu z6ybR%dLyK4Ni!a2oC<2}1&dK#_0c(@nT=-jMx-N8ygAXkD`=Y04z3(LXr~uHRaNpC zncU|r>zeU&Lr;!$;JH7kEpHg}i&amYfBQ6FHL!*IiWVGM`uKT zL^>e2QsK5H!FhSj~`#pnp_l;#x1M6w;p#S4CCz=N0@zmr^j4Vn?D$dNwZ zZgS77#ZBC!*PuH{`dhFq_9rV#LCxCD0F&i2Z>Bx!r7L4=#Vlv=A2CdNm^(p<0?;#iFLSTeGGehUt%NoEf*SE52CpX z2ER5O?VlL<#n1;O<-W`Ls4BAW57-wXcx54_S4~%oDpx{Xk2q)b$|%B?d{6K4me-Fg zRUskuX(SWyX}xcG`Hp%Qa3<^-MA(_Bmnc`$=ZzLs6<-VY5qvXOv3OyTj!($Nx%Lm) zE!;QQGJ@d;oC`tl

}#9KQpJvV%jWH$XF#Wc0-A)?P7u*K$&ZKxc zgOGtDH^OmNb+bK^Dt9{IDo$Jd_7ZA~Z%_ppscwG9mLVjUJE=m~zft4a}JhRRbZDjfpHg%+0`P7%@_@dG@@E%3Zsu@IfMChf@d=JW3CyWb2a znPR$N7JY9y&n%vObOAobB3!TTAe=L0dl}H3AbArYI!Da8xG~ui$7~CFY*C}$w9+T& z^c!D%mC5}^I>;SwgR{*YgcGe$%87=0m&FI?8icC@ItjY!Z7{?umLlOz2?zSh+s-=x zJKqiipj>Pmdiw1vtij>wEt}yefB2mm=lsm{A6C6jRT!Uni|XsDKf&dC&1%EyOIM#< z=N&t;dU0&)>c6f2-A>-fiJUtGsc%uF9$`-SO! z(}n3%>hkz|)S)T&>|i#rcJu6qr(QpOr~0a;#1mgz_o;R7oua39Pfe`(&6@8{rPn;R zX8!&)Z(sW>)t&36)^yffJG)x->6vHNnAaRxvt{Z%lP|BmZ`wcki^-=aA630^_O{8p zCvRE%?XkDd{B^BivNH48ao1#6RhYbL>SOD2GryR%tA09pa8f<}{MfbQ|2FaaiJwe- zZQ@g_H%$F-;=QxP+H1!DcjCs0+=O>+bAq4PC&uSaJ*oMudG+VU=}`iWhUS{7{}oec zXf~<;GG8MWmB#WZTR)b3!VxLuryhTbai-~=(m`})q5nmm&I`~ z=K?~R$>``(#Bn6i{Z>nqEGN@R!s0hoi1hJys77%Pl*w9%kObRH4FuWMA=fm!TnTIG>YJqkQ=*l@JMluoMrW-FOJa*$akN&VNwdLKXVbP$fiE3>T#7EC z%%OOch?h&*0NbmCoy9%!56m`ij>vF^T%*bdDn?=bez`&Ie4~;vyQ8GOG0%93xv*4m zHtx(&e4*5}xr1bk%bTRYU&`Vh2#IVa<#MFCo-JjT0$3??rPw8-C3BDE{h>NZ9`PG?-3W!6T!80NTiznEx715uzXRpFRY*lB_Fzl;+=AgHGU0MS8iY_7uVlA=SE8pq z-84znBAz;5Xkh_@|AE9NQVm)HamRc);xT1{!8|WTKU3DCpCs8r#Ndo}A!@6j`jf;b z=!B>a$Y}&H{(zvBBB;|6-R7e$u!i#fDj>i&BFru+rjxQ+!wgYwIKs^mV97TM+&iW3 ztpm(JnC-O|>A?$_d0rsfazU@!!1du|&*5*B;$8A8DU5}(cAW#VZwnW_Y@R4&@zoLO z`&`u5j>C$^NYvy_;}RG!6|y=SZcDyvZB-IjD1}S0 zgY%RvU;kXak;z3%^n?^KS%dxR1menBKvZ$s&7+#7A&jb&L~_m@P35M=X407) z^cthoo@mlt;c5UEO=NrB9&zMinLHnDwTMA@P+$fY7*EwlWHwkUPgL6s#6RRf@04B5 zO7uu9$q*1q7RzA;XQP_iJ&@^9u1}Wq?Lxd33fT0-g`bn?VN=^l87Rr%nW)QYA?XtO%+xC(~4_es4E zs9T83*30x{nZ`4XfGch2xI$Fo;<8K!7*4Vn0i5u>zEF&jV0{rmE7S}oAJ;u8g9mvT)NEuqBQx9=fE^8-{q_=xzI-AA`DoF^{hzDGaa?=s1{cfTgrNRTBOOFj= z&HRpEt&))SDMzW^Ao9lkAg9aM=e^YBKDniUF-(Na4l8anWCC7+lK=oHr_ST*dJDd` z-xo@e^aL*P_m^rsWr>${1xO$5E^_acxP-kdLuOjlWUG+$Gc|_2R{A_a7IX28navqJ zMvF7aTrYh-A7c|3?ytJ6q@A+YqvUb<*h}_!c%ig>=}2=5av&P$F-QM(jGkL1Ws1$RY@d8;*@=j3$~Fgqed*E}D< zbq+%*jS)I|2iOM?Ez$31+|IPaArvV3ez{^jZXw)UIG=2}YQ<#nD!F4$O91jM^<6cA zG*H&;F)6m2asXgIZlNrmQdwWu7wBW0G!D5~6DNbQV51Vs8AFcUS4z1uz#eI{8wxsC z&fK$^J^YnP$b2;ljk;ErQ*17KnV<@$YQPfU0zNkSpu{lU_4#l<=Zki7DV_*LV)3k$@7dM?F{64T>I0YP`TzdA!Cp*@A_L#d?hUlti~BJ28NX)3=%(hkwu`-STl6 zV7&#B%hQ3TKU3nuth*|;$6hddQoWA38qL!+J?}o#D_eFxPgZhS8|}*^noibrkHp`L z+076gnl{E*y&kLZF0(}Un_~&e-mmf1e3t1t63#D3bQ6T?;gln%tJ2{@(ZV`Q5kRVzfZ#yR`jJF8cjqBt zVJte}^_fAwwGN)l4l=2pw?alrW+`-*a^(^( zJnyFi`2@~6`i09kOW(Va%_!uSDFSYT(?tbJhX7FkR~aZ*(r%#KWnF#VL5GTYHWiS@ z*<~`e<7S*ITI~$o5w6}Qv2jAYGG!Ioff{M=2OFvF@>{|gX_Y8lJt*kCxpJzO*( zIoLp-4Cg5dtYX=;C#CsssXaLx0J0?gdaEs%)d8;dg|aM|vz9s?M;0Jv$y6souchVB zSz`yc`5X0+FInif3zxl=EgHwRAf<^?9iv9kS^0ZX6@Bu7;mZQ**~< zI#USYjhNFPPIvSLH-AtPHmOt~I3S9pyt7%Nnsr@iL1B{w z=s+b036`w7h-_t^vkv;+gSSY-pX^c@U7HOgEm2$6#_p|4Y?7TYN0!xK5IsN6!xlE9kfaijPluK9F z6#xOQlSzpBnk{G>(rDH#D*;1jYLujO^RR|AU~jiCbYU)FxIJRkc-|eE>GrZ7QQdu&Vp0i2X1h>DF!V0*NLdLsc zVw7a`Z13VLh7aGZ@v1J{H1_za2{itv@z;($u1Tq%QeU#}?Xxe=2G%~hcKgihr=OoT zOg%U?v!*=x>?DP-Ter=Rty(p4R~=Jr89rY7;~!U#-Lyl8Zu`Kt!z7JSY=TLVa|D*o z%t0oU%$z`Ai8+jb+=?`rNpNttusB12HJT@nh<0A|#3v8zM&Ek>wuuXwBOHzq3{5f^ ze&+8ofFvaI)pqly9mhv?;0a)m;keYCkYcDg3QrPq;IqNbr4va!lSvU6CNN8N5JyN1 z>E8X@J$L;3ZR7i>CAR0O;wq^Mffq7dCM`e}7zS04X{bU-&9Oo<37}In#;}>CD)1vT zhg9!>wN)G&Re|BOkjg+?=QuV&&QYYm&T$Efnj`oWBzR-^6vvN zN`Qp~wFxAhm}3(-LGW~vN@K~TI%o)+z00@rRrbOy^#ahAGCU&)b1Z}xG}&(6h)-Pqw0m+C>9ypF*Vuw|2J=myQh zgtO!vpCp+%hDat83@yMoin~(W)+9v#f+$8K{Pf>;A0R1MWM`Hubf$gk$e|;TNh4_W%7VcGyQ9p~&kv zo~1JcYzNp~Fj^TL=A6f|IX=O{KWrLKrKS16m?JEK-G!f2?Rho**kO|@A+8fxk{}X% zdM=rSA)}ZC0sLWmq+vDC7>y?dj6E}27MS0#?a{#7_IXffg%+5KL zn5B6quFK#!LyPAVsG^}KJOjs7f@SB(Bnw9*pAh(^BMe1zci}gw_UwNZm6)WS z;Megt0`;$BRr@HD`VC6^{1cFGZkphl|;ee#ZTFTZo<=WI{5>!n?SUq@oF zyC|N5)dh1-B~t7h&rldtf~9By^wJ##lmlIy3by$>ci^EF`mW(j%f_P&sqQR%w)S4qP-HZbE;2K(k(}EJG(JA(rx9(}mlI z(Fa9Fu>~QUto?qaZ{n$>7~{!6?XP-SGDx1^YKhw{L*P zNYZVu(y}CQtc0~q{%XTxDv6ERg1-4-aJf^KK^BW=V5n|ew`F+vBVuD*ivWHti`qIv zxC<$Z^@e(gF`Mj_G}?H-=z+4Fj85GKUUp~jIW`PW+z;Y5IHf^C4cQXix2Fp{!Rb3- z7)j^@ZX|ph92^u>$tUjKBNLm4-~PBLB?}9X{X+JJG+HeX)S1Z?B6e#*=m4V4(T8AI zlw@@BR|xzQAA+9)h{-7QGvyN=hgPS^OK8XgOf+<&! zk z?*pWoPFXM=m?IF1Tq!7AWYrB@C|Qr82l)W9ax7 z!K^KYx4fbhy%4WB(34+0ZGY_iPp$opHxmOB%_?GD8dUR0)8<)_$GhK74Ks7@h591La zLM$x~1O(-O0}cjd89MdC{g;U0ZX1#2V_$&?vH#g6MTlMeG#sCvMG+%hI{PxgSTu)o zDII9P3(ZcAM1T1jv{yk!x4o!3fWG`4NIzNqC-FV*UIZv``2;q5%+?0c)JLqv5>x5- za1{9}uuzbZZ@B3!TFIv2Q(uKg`7YPuY8W{w3@>Mn6&%@a(6^MlxK70^t`_cNO6bi`LPPA!$>^j28S9>ZQgj~j zE&{N;99EKc`&bXPx<*7P@~_i@~_hT$JA|_XEmRbeFx&uHNWPP zu`Qa7>c6OeuKuR_(bZ3@?@_-+U0eOAI;#4k`fBxIwRYVf*FC>(IPX*EZK)v-Y)y zwU@5lIP>S#chCH6=Ib+`nYnA`=9%J5VCIUMi&ksKj?Ao`{=d}+r=Oethv|<`-#-2N z>CCienw`F2dd<}Ttp3H+52hZU`pDE^DzQ2|WuGFZc1*2a^XoO=S@VT8_pN#BnkKsS z`TyD+s7!_@ubMox`l?CI#2>(o;;D&GPP}*GM%AameZoI+#l%GuYsdd@{JHV3j(=kO zcGcI$Uq7B6ca78F6Crttygc^U*!^Sg80(B(J7!khsd}TTfcEbF-KP0M(o9l=a?7JH zQmsNxh)P;oTIWu<2rHp$*-5IvS_SU;k>ZTjIUz}MBiydo*;r8U<*$}3S2W+Xuw<^2 zwMHouXs6jVy^(2wraO_gkJVf3X=Ae13BOt5!t|LcFDzbEFhoqOQ3VWiln7Bj=HI^YtPm zTFEujT+BlQE^f{v8~AHBLyD}Jnq3!bY=hkAxlXFMV~G?9Pa+&jxLbIg&v_V$Udji+ zAQR8!G67#EGf24al<39zn7u=#0QN8zr3rrvcZWs=H0A_fd6FlWsh%+!Cv9{(5gND+{ch4BnY?Mf z(;tw2y?4GFOF1osC3CgpSpWqFFYfg7W=p&g@^}jC9+Dcwx4k$(;I;;R2h$Hm3#%R& zO$^PanWUbL3&yg?>5j4orH;{j#B3*+m_T=eO#>vPp3=!|yp95q%aOKDxd-W!GxKZS zDiyGOcNK3Kdp@ci7&wiIBlpYnHj%^WRwx%?g^n|u!&5T74yN9+JKv?amLWJ`*Gpy% znk^9~KrW)pR40sQTDc9MmA}un2_nrmDluO;%y{`tw~y%aG@A@$$b6Cs7@e6$*e@LT zy8MHf(N36!b}11`d2_xzua)VP&JJ!J4B2%SI~IL$hh&?inI^3b#-bmBEVSc5DXTi8XbBp7U(Nm%H5XFk)-h5KZdVNS?@BQf5QK zIq>;1#DYw3MRd>C$yFJur`jAT-II1I1(`5KpRpC3Os}+yjS~uX8%4QDQR}rRDGWiklEhIhqLKfbLPa z9v5LbhKT$AnUHAsN@VM({ojtBCBwG&4<0rAeh}* zl?$@j9$s&l3YJ8VC;BNyvcJa74LJH&)}`^m5^Rv*&D1sA~!4&27g$w0gVWiPOb}T7}-On1`5f(cpHFMD7LXh4* zPm`_rN;BFNrkkUBsX?=CNSmXjg4OFNISSjIG8wQ6eRY?)QVV6;l??YjnT;8sEA1&R z(#w~t;Xp!nsq}fj#WB5PF3I(9-egJetEJETL9UOxTY@)|ZnU}#yG^tg0+2t|Hxem4 zlE4B~l3`7G?x^e|*{56%Jnv%2c8}?$qXqJy#J}gHZI~}nY;|kCdW|tji;C(w@-dS z(r~S~=l1@eOlPwO%I5c2+MzDjvZqxy$aKQw#O={m zjBV&b)~Im!5sBUzRGg$E;|=*^wt1=^1$RHWpv!@OMA02#oPl1mlb@BOC90FEnJFKg zsHY4@+Gi^ql|2pG{algC*wTeoh|IdV#O{BW__W(Kh(LB53^~l+=|#Ee^)fv~q{&{W z#ak_<0IlaQ_?c{SZu>)R-0JUx>xQS2tP#_-1O)mt;CGgmH&4 zAI5U5zF=neAC~EyIYwm4gKV1VU`=~*hiuw!(?S8yw2hb#+*PdlJYST*$LA|78LwIT z9z0v>=7fFkl?qw|(gwJyRja zu4!`Fo#esaNcn5@V)|PzX;-_UgYXN{PN2;7|#pyzUIr5amrk?8B)3}96 zGi`S~%5Ib7PpVF}2t4j9MLSqp7vz((9%-jiwQj6RWv%IIkTzQqa2j7D@vpTl1lba} zFzqmytkKd=+2OM0>-5RKnF-tT-T{^@Oub+J-V$w)0v&eK6^E{GO;dK6&X(<@p_0oP z_>OK6OYM^mZmK%(%3-*fvqnO7m%-9b8zecCs+7YGyq8QmX;fdJY{ro( z5e_m*TkJR{x2F;#2V^6frjumD)u40hzc1BW31&r%^I`4O3(NSjHcE@y63pn`Bx_Z?|~N(PIYDR)Xv zhq=|o$-}Y-Yq7+Y48>rFO?7R(6n)@`^mTFG=?TM&w<45!jh;O+sgvnWQ!>283Sl-H?Pjs?e%-a<-1%*{fPHPjTm65|=_n;K9YiLzenR ze;3~*iH1}m6ZPPZde&e~a`U7om$~?JGJC6zqq6aCy3z}V(~i`Y@-a{#A%UjJpY!Dc zu3p2>O^PQs9NYz*bd!c$(-PH{J&{<^v`MZPvsS7u*4s8_g?Ny?Qa;Z?=4#dbS0b`uNC>^8{ra3_g%({o@si$#4a(#i%2hp(%}-`WUq_03w4iB!-}Z#9q5dbj9w_sUV@%)sy7UO@*Pou6rkoqKE@7^*R{Db5*hh8Ex#@cGDQc(M`{R^(6B$08}W- z&`p&eLUz_JK)-zDWzAnDMd#l%yLR8~SX>W{lq?{*FwMbLP%(xLHj~rgLf#)kBNbGn zy7rR&NPS{@8+zi$nwKS3KM{4N?nM#OTha(-TEVQ9fQbA&+oi!3KPR^BfL2MC0C4V2 zZ(f4{kY@w>zvtw}ZTT^DHng}E7)mh3{gTISBAq;IVT|6OKUP5D(_mClkimWFhcY(B zQ>S5$c3r=?4OmFv4!KyT0RFCF8&fPYAep1z{2nY1ub`eh>TwQBe}Ij*zUnlz9XONa zy>Y$Il4?RM@gFq@Rv_yp_PK_^mo$FW`hGJQHsbDXlB@fy;hrmjhJS)lRFJ{s(zBs^ z12dDuqko32^&V|?eW}ak^h8e|^ne$z+g;Awexnvp=a*B_6F0r@jB%y7S_|1@Bc>i8 z#$u4lwC679C;+sDAhcKy&;zvlH?LTVZt4xUO72w`er!DY|CtP%(@u(jHMTS0Fo4nv z_$y*+))7c;*G1R{o}jr5fHm6vn^r0XB=FKU2-IFbuiAIQ3Vej^mmk;|gJ!ye$-awl z0phQ{`Wz%o^acQYq|?YYz`^b+0R_4ige&jpa9j6p0PSbiW0udCn!Q^zR2j|R*d;B=nS z;Z1`_Zd0MHv)c7rjYZNOOqJtCJK*pDxX&Ql^;kj>c|WT?uzAHou+Mbt=*d~_d86*v zX+OALc@ibjx7KO*zv6%zs(vhh@#OJOObX}`jn=o}O2|qu{=He<fYk&#)aj+0yb?NjK2tcPF zLN7iBSv~Mw+6&-l2ef+mXvcz0Q+kC<17MJy&P9u?$)Di(pzqZ94-^zNdoBa0qqv_;x?^Dt1J^yZLb*Gw`&1oB(S&} zPFD%=Dr0PS7^0AF#48D=4~Q;4lXlaE5TXGu$FsIegW@xETj?`b4u7&s3s8>XMF57E zTNExv%M2j^UUVw#&b7&`xZk&+YxZb08bulMz3H7Y=*Yu+w4!VyEN+LHmk@KjUOZl+ z5~c7UVzVa7ts+|cJ2yKLS~@6*0!y>d1f^zD7;nimkq*>L+9P#A3CJHW0&QG7b3oQLT#Isi$Gc{sCZZlV0p`z(eU&gyC4Sm z%1gANZSJy-0PG4ldvuUCJ6D3F;zgIyHyEun^rcI*+AS-8f>eiQ|GtG-92B(sGVQvp z1ApEf)D7H#p$^dBG@O-iUYfc{cNv^pB-(4y9@HqP zkar3^T}Ju5-)(`z1CCaJ*OQOdjIV@~xHsZ+m2yldW6Ptru7_Q#BqP-uE|IZq|GFNI zMX-Y(fL2I$aNJULq)C3jHyS?D9|J%4HyEIA3bN$r{>-i$CZ%*Drw!WCs|Jv0WZ|{p z>pK#WUd$2-#`|7tQC#%<)yt{q)UF2(oU#6I9{z&~nC!gh?3tQw)CHpH3N+hBH-)Ug3x-<6s-lof|@2HzQ&V@Or<;iDjOu2hI_vi{5e4?!92I0lC!>u-@Z{aD(PRU(F$H z1jbiEl^$;|-ZZs+cyk1H5~v5}U|UP-fr#5c6BOw-KrUQo*p#8rr{miF8U-1y$Mxri zN9?;s3u*@2;-$bRISTaf*O_{Tf-uvbpU4LjHcDJa`vH<~85vU2T`I?%eEC`}piINN zR!ngty=#2}R(C*XSG5x~TiWm3yoCJ$}Q%s6SXREYH( zjNa)LQyRUVvRVJFEsnnutS$f zqc^?==3YrgPdo??n1J5DWqA5E(3oAm#fxENZU8yMW+-(AQ5%WtbNPfl;m@$>&sG>* z1yxM50HAp`5J6>~M|RcZf2%K_y>9BUnRlwP6I;g&;+q2G?wg~F09zy94iMev33W4N zR;ck!h*n3>HlU-gFNwpxtOz};d(Y^O**<)(B#PeNMegjdm)U%nVB#r0MV1*;lt6pa z;;=6#Bh~hQlM;KqE3JjZUV%jxIw=X>T%GfK30J))6uK(ggKV%^nFDkn@*wk72xMeG6I28Ol&l@c{o*s z-3aFb0o{fe}+MW8qBbQj9$3Reo(#^Qw^;b5R$H4 zLP%P^o}{G)ApWmhWio>=wm@?NFnC>8p;U4W0I?LHb3tq#fU{>0UEUt4AYNIDPJeC9 zVNn=bk6xYPWWxzz=>u5C_SNH-B$ayES zch7qb+}G89P^(zR85HWl04k`%)8T!PSMiF0HnNof^-a(W4+Q9W&;&^BB4l}pkaosn z1MT`vD}4bN?dxtmkLZ4q-SAE{dLiukf0VrkoSap;KfbelH```5o6V+?KsKQ>Z<`WY zruY6%Rgmd3@AO`RE`bDOC!$f|+-sqUBK%N@f}@~95af!8AQutjBE^ErMYyP3Ebx2Y zIkO8pEPsFhN!R&_bY`9^=l^aT5+_?Ci1Knz6~zzl=UN z`oj^!;NH=%54<_>E5RRz%L5M$+&=Jc1D6aW2J8c}ft>@R{jc>u-G99Qmj0vtjs9T2 zp`YyE(%&z*QLrp13Q*8onH!#mV8Rg=!Fhiny2!B;mZyZ0RBVQFkdlOwH6pYF<78MU zxs^<*Y^p-35>`f|+h6QhVyrsANhNDB%IssJMw>gf9h*h1ag8)V%Y5pf-mEg(iRdJT zv$4hrXOe7qV?G7jNM{*((^ALKV~v#ntVo`9FD11#aYHPb6kz_*g1!KN3>2rbL|uh) zdI;kfSVKxGPDXtJusTL1#fEGQJ2qH@R;!e-x`-ISFbCNpH&(@b0s%(?LaOa#sKCU7 z>a^hgE?udpP;S7X;UW#KE1p^!8^i^^Xg~w16n|8#iMowJdEfuwhWdO)brzggAe(i$ zm?j6#$JMgsM5VH(pfe=*Fe2<$XmuyS|0JKYJN1UR z(?%r(*lKBAawgImLgz^Mr0KXfFO3VgVn$APx<oNjs}HuPKVnoNb(s?&vV+DxdZ@J8%wVb!KdGnMdUy}nZ3E7qr{v456T5ukLW z+a=dKt+li!&j_&Vge41DzLdt_6i62^fXS7i6xm$_jbq@xmOc18(4yJCj%B$Xw#J) zE~b>Pnx?ECO|foBK=dfJ$=0cEu4p~^Y^-2wL<>cGSh`7ptEZO;P71icVtFL)$c4i4 zIfPqd)ih+JUJLP+QUE=v$>w~R4{6kgZ8c*kSJmYuC1&GQ9bYEi8)7Xc=R0?_;(K4jAaynRh zj+{Le*U!-*@T@Eo5?wZ<2*$_}?2TjM610!X5lOO?sTWoL$mqkkJ{VUa08SpLy17Is ztPBfrSidRB7QyPL%gF#*5nO0fBj8lB1lCwn5H<+q2zwY^IY?)e^z_E9Khhyv zEfuX)Aq|7crkqlT(wqL&X^h!P$kcQ*>V#-EtyN(RZpXG{GgZ#TD7^zvhx~e_dP$qy z?(TeGv021f!Y(TmT_#c|2?w{eF(YdrTPJd+WYHE>r2S-Q8%Ag`2XnO|>2PWbS!dJb zGHk<+4yI_1RFZOUEyq-woY|M!iXE5DsYt*gXPw5pJrH4h!L7G;xG$OIR*2YDM2V26 zUUECA^wzUF1y*orvk<-}r}wIjbTA~}x)(PmCXF+cla;6Pxs+U~Om01?GYpoBN>`U8 z#08yPBTfa=Td^acDepE*NL7&3X;kIBBPrYR7tF?EOUMXQc`3k_d~&lP729Iz6j%z{ zSeUZOnX25bwUi8zEmVgNNK;iKWmH5Mc_vL1iS(A;xPG=$CWvA%qtM$_=6X!BWgOGp z9@;=^9jc}wWHmcA#KPN{Zfv9=+S23An-X@bWT`A&_|Hy(IZ#O^=x`|>(9obB1e3`0r z;j^9bF+1&sxQumWj80Y?DADu3>2P1N$_o-dsV0>TwY#MCI~bw9Q(z?wnJ5XV(dAxm z){qGV2a|Z58*I>5jkvg|&+mu19(|=#-BK^d#AG&Olhg>+193{Q?><`qRbLzCH)4V4AQP!voYxS9#cv?T{{y!&m5LQ#l4oNW^j><= z%%YDB$T6ExJeeYO&1%w?s%By?ZtPXunvl%u@kYHSMJ`n^yJbQwdRPKv#zmENg+ex; zYA7n{v5lCGS8q}f;+#X-aH`D}f1(TNWnqiyI#~l89lep!F6lXDb`So5btfBy901`M zX(MhchX*jGoyD04RG*M6?@Sq#bWFG2qX^AeinZKKsEs? z2S!l`o411YM09DFE(eG^E$OwFr1r8jMfSflH*l6fWijSKHKvKwAL}rE5cKy5N#D9Wkk1Y$wJ^ zpu_l^%b9eVh*y2~gs-ZQSxDg={-CI#q=eR(GDsR3wrrLTJ=sAIGUxqaF#)h$7LB2p zlLf;puAVDuN${l#7~%oIzVymxMP0hr8Y9Y%G#87+^8tBExB=6%=8S?|szUS>fU_mD zj>r_gM$L&DZKb5(#$K_e^-?k{cm#hCx1~&!LmntmMxWoNkWBsn(<8yUj*6QlE?Gbo zN^`-%FJU@FyX9z$!N)1s0Ocs9#`bsV33Y`c3QbuiTwbCGIy_3^0rh1HmS9t($eHC4 zxjQ~(!1cWpk*Ccr#-o;K4UtB01m6f|cUB6)t@);k(Yf-TRCK00k1Xe{(M7#8qEzU} zlq)p*Va(n|=)KvhSDy)Zw46yY&5JSo_*3Dkc4O zCdI-28+Z!yk<@fxq7DUJK|PhCoXHJ1ti~*1D+V&mdG%F4q}k?(;oo)Z+c}!H6+$|7 zm{j;_$qar#nI+PImJBGQ-gr}~YluUmU&ZwqN5(+{lwP0_<)kKGY#8tAB{Pu(XX#44 zW~@6BT2o9i_>;~Dre@h{Aie6MFDr=|UADyV!7kk>GXfAPJXIXA09#2+V}Zg{BUNTH z71pZ4g{swA;)K7&K6(I`G%`SqUpe6)Z3ATcGgGI)Yku`l`;48VeBwpvruOkLuR8WGpTBBu>(PjTqU_l62Pn$0#co#%ejc>X ze707sz*DoHLX{3Qb1cgS0vy;p_a6opJ!IbI`L6e$u>Fn0ygu{nRaK%wNpb`o@`nQ% zv(u0u<>v!0q|A_Ly7gW_VFKmdrfq;R^RAUewYCldNTv?@ z`<8EgVn)BB(k}K5{(cmVCk9Rz6nRI!;qUR7Tme{El4U;kDt6;b767iFR@4fNvQ* zm!u2r-yEF*6n)FG5?EmKk5OZhJE?j>u8t@3jS>MKvj;)h+)GA^C*yn2r@lPDslDM+ zUfFC|<}H$Q##1pR#syJ;P^Cp z_;c_{FBu~ym_839*Ud&3U7L+A+Q~)-wp-UB$kNcY0mr0$u&b?|zy zxc5-of;T3=B|zyLX9D2S0ZAUY0Hk5l&|tP?EMT;SWH#XGdHu}B-7=B}?5KAa`g*ki zhNSiXOJ$uolw9$ugETdK&NcASbAZ1ek8kg8KrXfn3Lcx8M@Md&nVegeC|`P0aDb3X|N*@==|HTOXT}XQDMS< zKH7PYXc|3u+Xs5XZ2KB`1sM)SR+H_lJ;&gz`{~!f3bmHnIo-Nh5yW5pDj+D_4h}KX zeN)>eWaF;>S4QiC>EUY!ALbRfZ|=CvzieH-USj?brKD0(MP66VWW72$n!O9QeGeJ! zdI}Q2bTY^tx{JSF0?Xj9)6ICi?h4X8<;()k=+ zPea6)*`o`R5q_mC&h(NysYKfM9pkNBo@GAg@<7L;>5$q(1Yr+r#Be}U4QUD;x*Iyt zLq-DhnRD8IzI(F0`#2+csCZ;q3kNto<#*~t#RK6thKHeOXU6;>q(GuxU`aT zm^WBKo-h)&Tg~4za`4QhEIL0bY`Jk3o%`U7XybY{(DTo1C;uf1OvjLQ?GJfFmd+13 zEFBFVQ^vw6z}O0BA_-^U{Xc{QV*OI|!oGu$XZWEHv}9fP5cqENEJ;|Y&i`0{rApfO zjSgQ72rv)N_~)U={-!nw*}TAL31-9$cs+8dCi?2b;Cr`jA;eEy{Qu~|v-J_^vdyc3 z#9=AM3Ihr$vA`y(fmF+ovg!Osz;?H8=`{oQo6!T0%zR*O&7VMrdp1yaqoJ36!rSiF zZoNU$ zomz1!P_jntB>LZ9@LRBljE)mg@H**69SG55d&l;nnd@e5$6{9H84%Yb%Y0^FEcIpO zMu6~26S71w!5XT85I+)-2}-&q6I4$vNIEKhuMjx$9B{QP`+zGJkz_i+&ZGTy1!Gh( z3@1;Z)1QL*?;)e(N6%mNCz(TEd}`*OxRu}g1@MzCJAfZ{;kLLkW)~s$CDf^?G8K2l z_=9sJ`qj5*W~O_}AW~`j|HsQme>br9FFRLnhMuhrN5HW?u*v${aIE)~b+$czeSD;i zuLnpV+`S%BWQHY4N0v_28AnnQOrm4YKoi4Hg6~Uj*?XJ@?|+ha3h^$37hE^tJAf=u z5Gm{sD|D(_rIwKLi~xytEg2oV7{FJbKXTpH_Tn$Wdu5w@*~NRObS{co36hH@y?{#Y z)JaUR`}k80d7hgQO|32B?+Qix+s{E8L}Bd2z>a=;SUGsx_{n|X$M^hziI0#tuqvEz zpy<-MAxgqh0|P(ABE-Q%R#Qih{(5HqBmjeZ_ssOKTeU41IQ~h&iF}L$Br^u2*sh;M z?+A5A?=#PT(CBqfPVU7S`-!4MjTKJ>@c4t&#&B3dt|p7lny_&0M!*XIR4>oWp`ZVj z_Yz*W2IRZ@;$C$9cc)K6+TVTf+4eiw>OB*I=VuPZUxu~VQ`VWJl>~`@fCCP+3>I|& z@>Mx%a0-bbGja_MI*y-V0A2dS%+%~UHBj)u{QujrzWcKLq2{Xi$3cRu3;RY^22`MJDG$vL|E|4j|A#K%LkPj&rt3?j z%E|*$x1pdYF|5u3zxDI~1xa)*mFN7fZ=a~Gc?*;XAnJV>PAvR-t@)jr5~WTB^c+ch z4AxL*m{98<{2p9Wh6G@UEghm45% zm-g`fbQ{}W`3tasak*f1TnL%97V=xO3NZCm(}^&;`ES6Xhl+yH=Q|kNv+YfP=Uu$` zWYBm-Xu!79l4{ykDZ6Vv0$$z+o&W|tWd7ydarEBSe*FnvA!1$r5HtaMn%P0Qt|wxw z+G+|X-QaO!dK)Z>)-H*eWUt3#-3UfPF-KuBX3qOOGeAiQu>l-+4>a6kQi3=dZ*GmB6Hp6=g^7=aa zGNj+_{#H&|fVgd1C2=;w5>JejUNa)xi0&B|3a5LD(DB#jIxu7l?S&1(PJC?;*kI*W zN$&|5hP){ewfB+fTg#Ed_7%1hBxPS9F<+S=yAdgBitH z&dVg|4De8$=_RA1vtNdr`dF($0)GL?&33gC7zIep*XK2j93Cdp#CL zgnGeNKGQR9Lk`>q0wh>gW26Njal}!4(|%-%AJVmD5LXAuxI6xO-5~4bGbY&aO9###njC&^^mf4|yn-$P&6O_a z;dd}-J`;%opl&tfO_x3Xa5^1Au^ljfy<|Xk=Y_K!!mfty#S?@(wn4wstJ}!kw9A44 ze=*wddbK(YI{w?4S+s3II6Jkr1YC5Z@71O?7ld#!S(Y=aU6(_OG%Mjw)*=o%l%P#< zv~M1!vWE|?AG5n4 z+%75p zf{ktQea7nq+a$~HCS>r+LTtckh`N0?ZBPO@gJ0Vw+H%Hs^~Y5&{Un4qh(J#~lh zgzeJhIRh}!)5R~X^$?zPJ@42S6u+S!V3+)17+#hn}D1S_yai|?R ztttqYHGI`WhLHIO_V7>ygXj+jMRV=pJ$O}C;Megh#w78_C@QKB0gfdBNo*x3wpX}& zrk9M4xi8q;zHhJ456HyJkPqVU*$Zcb1G?Uy)Fw%pE~@3ghltF|(aom|7lrR5xBu&O zp;3VLoGCnEn|!$h+Z0De5iZUJFjO`s5iz!C?)G=j6b`H?($5lt zBHg@P06w@I7Nyi#4S2IANnT;F=fmg$AfQc|W3fjBEUMF^k^YpCeh5z`|2 z)ZYFf^x0EZ=KGtc!hFkHJiIV|pXb_;2&*MjD89AmQ_^Hwi_^ZAi+E*}6!mCpI(Vbdu$kv1kYWtUw_ zkTLYyF5$+VQd%aZ-y_1Sdg`GUzH8irPW`cHp?#2qGjGRbmgOce#mkJUx+4jiDwA51 zCFGBI{+QT<_AkJx7d#PG+BN%yjd=*}41g&BUTwUV83HaL`7Ffzqk~G} zJi2+maB6Pd8gLReuf2qYO{5^dW)ec}NuCFIWv^EXxwt>weeNK$ zS}2;&xM>T^=hk(@3kTo^Ak+&Y?@3fq3m50sEo>i^U2+we1GGZn<^Tug1f2#n_PkC> z0}ue9#fM&@m=>~-u3y?dc_*n;d)w>Cs*Ntv?I5>+E zdf}!`{`Z$cW6=xGj;vY%KDP1p$j` z7$mL1)$_Jdc4+m0O<{4#ZEU%bL(vO?RSy*%d;FZ;=&?7%gXsPXR}RS+Kf+%QOp8aB z#`-^x$*6KFX^TA^P*Q4$a^39*UOiNF?D#i8fV=vegXo=Y{eQ>Jx<0`3qFX#z@!6eY zC1QtUll62UTL>2I#ykjdQsC7?MZ4a*Xc65nUFqFRGU1NFzP^D=+sE?%`>_GISz1G@ zJvG|$4uWk|OL=1xl5k1UZ6Ai4Wi6GLB=+1qe1Wig0iJT9aK{$jyJD=b&^M(Yx^Zk_ z;*$fv8~=I#X(Jc*6?mnV7cAecjW9QO41%7rTR{-1XvVLwn;q^1y5S-aTT&t6%uH_? zL?Dg8BQ3OYxc)2*hqSE4qr+fTWjYpWfEXLM#o{0sS8Pf2!ze7hUNU<8*@4~d6Jo*@ zVM-N;S(dhDpzoLw7cAr{sRUHB4VOZ0lp$$SxH!3niuS)b1|rP1tB27;ap5G|{Gr5t z^iopTRrcP+0ZUnHaH7Sqh$&bH_fogD4LAG)U2f<;a{$XEAg+fA;d*i*5GoqbLmg5ZjFGw zYKW0K#_MKt8Kp@RL$7l%{P(6oYV0XP2cKMmx9K_lK{T3KSwW{{g}b&2ft|E-%a#L9 zyMmPKJf>VzQUt#>v=kTa7QT<%zB3L&H~M=528n4+L&xNu@5K->k&UX7QmfBciBKfp z8UXj`p|@or{NCS0E#bj|gGzM`adzRhkN;%G*9Q{+@;Lt^VBh1uULl=#IpWh(%p&gewS^({I zxYXHl>4Yp`BpX!OM5rXBtPn<5Z(D@7^jb2+IWO!%_kMlbF#6}w`MLJk_C*j)B&|{4 zgSS8+sn10yHs0j&6l5CaNR-$C?d~O`ql>LY^tGYMISi6AH9WbclSZSvN={hZ(LZsZ z{kpI8r~m{z9>od^cHoF?Xi&+dv8qmSrV7OOO)midUNTZVl|LDMaei?c9avcW6XyDf zEsMJZceZ!s58MHQr=>LpgN=`9oh$=LkXF53VWEs#jzfp%78j@1Qo)!y4o~j*+_v`L z<`(x0+{4LO?W0JBE%p6!dMbdn>*BAKXuyRwu}52}trpDCp4Yd_H%W0@?Coz`TcyUijQ3Xy=~T zHHv=tG2vU?Szp4J3J+-2y$B@nJWJKeUadoBE>$2Q+bdvyxbI@v(2=!8@CchV9~16?AglpYxMOxRpV2KlfPPsJP72wWzgd7FLYI#*TeWp%7`;`1ZP`l(nIpXi z{cd7*V>?mgwG~ur4w@xhU_k!1O3YD?Ac9Gi)gq(H_9%bOFACpBZa;MqNVjNfh`&fi z)P2K(H~U6k7Q8u88^3$#@_`>s8AsHk@9-CiynV+d-kV@mT3g%UXYi^Nmy{8}eN;r{ z{+cRNZ=i=uaLV>j(G5><0KGwM-i*#IugukjmCn(~!+79rQ*J6H4kAn?jAE+bpdfw0 z;*~HfJ>*XQg7(L*6s|Z^eQ6o^>}vtWPxmRAOxpEc!pw5=n!N}ap$PQcGK^j?nMW+z z)0VYXm*9tw2zT^P8QZ%K(l>T`xeXR0)=pF+c4fdVFE?;*${e3n>+}-vl)AkvM2!(6Wo~i=KnTmckirff0bV_15F9*3ptmkdS9t$U$T-S{yQDy9)U9kdZ+CBk)BuONQFFT_v1dc{YEtv+x9{ zaM8!l=M^Mn!8Nb#8AijO5*8s{ilPBdLI8f{NrQt=Jpk_th%%+n!B6w=lTQgJA!o{Z zRocfc{UiT8xJEdNF8Z`^4BiNyG>#qRqf)gQn;P>6Ep7J#o)8UQ2U zfdNvt*A0$6))e>xkSKNyG-UnKRaqQ2WMtRK%5w#bJ@5c=K-L;~y0IRR@cAc;gGPaW z18(b=wvYbe)b7~q8eVA@phem`fR(>#^8#Ns49HE_3g>sN@hw}gYWv{Jw}5xY`C1`}LD%y9;Pn&W zoGCvC4;awsTiFB`;4~e6yXV#|MUE@S_wsL-sz6lln^I4FeEer)^CKS~x^du@egZvz zr}`pZ7(W&E6uyOZ!Ajg}gVe9lXh|;x^`r6@(A2D@^4iD6_Px)IgW&ks1Gn!%-@g^M zfwXlBY=f>A&Qz{MAs&vDTUoAL@}$t;ZiQ{&SWEuQ@t0s1d_gsg{QpPzH_WPf8?Yi< zCj%>{b7F=aMVF6Ikd7kbFBYrXDEh{2aALlX+JK#z7F3@T0FQ9?vO<$m81x5 zGwqRAss(R`M)9u;cTe|_QDO1NASR|}2a*4m{a6=xHn|VN>Z(?|HRT};I+G#hG6XdN zic49H3fZ|Jit?~TU6H%Ng6Tb{x2LQrm%SlH%a=fZ(`%_n`1G#D_OCBlJ=;bv?Od;m zt8DBJL)Mv6c+{jnV({8RNPQ`=>7gRw!uFHV4VSJQ+4o-tT*wxW)x#`E;gV4n<2G+G z#F%|WZAi{U&_6GOleU-ICJ({wgldQ3Ygr3mdb(X<^SWA+bVN<{GD+Lm2>QlhxI22N z=!W|~w--%azVZeUUjf4|Yn`~tMIW&O;y_g#3OMzYIZAOTeFZe4myC`-JF|#R`0Jq| z^y4dp-DlnJKQ7!MpA`HYWTb6<;YaXVqd;L3 zltko|)^7?pA|!hB%OKdSr6R#wpIvP4{R%(wofT`k8P3`X@S=S8tmPkM;?-p%7S}ad zqH6XB!)k|2lAuuh`!E$fWOUpC%O8M0=g_r#9pL41FFbrYKk(wcyvA!^iw6|Jx>SFy z8I1#Gr(0iCv&OtDgs!+5Mx>X_>(Ljl`Qxd>=yx}RlCr~W_!bylTZ@Nn!Pkr&0Iza{ zMw)??+E&_JiK4k1fmbgX9XwABcHJ+7D)0(`I0Rqy77rnVWdwOVA5zeeTHT|9C$0(< z+p6oKhdpFou?-Ux6Aq!Vb7#R<{d!)c3AN4wKG+S|B8kxu*&Hj@0go{TQ5opvFF{*+ z$>{Nl(bDE_g3sZtEx3-?;(oq!p%bf3(wHq)8!4^I)lRX~BvYVY-VIByhl-9H?*_z` zg-r`>>ph^oTfh(PK;M*Z;HP6leSwLiL!aoM8-IEP9lQP+1sJeeylXvPEY1+)4w50t z0&~$rM#py1@bna1IEco60z0qMs?#0?Uh)tB-`{cZFuL#ll|KI04}h1w^=^2Fu3S!4sUTIYSj0wOw46krybpNwkP-3pG1yTz zZ`;})JPxzFoo+#d21w8R!4^%0{0+kHvzT?VdadpZqsSt zboz=7iYpt+A%_DJTQFi%AkUxEnV;Zk@OcB7@G z1t$1BqX7q5Au$tPP0UpFgXHqS6ToCGm6u%hUh`uAmbUyqg%*L3tSIC$QYoi$sSuqq znNtWo3B%D#MhCA2GbyC*TxgH~Txb={h{L8Pq*ckP<5@|iRFt5^Q_%4qDnHZbwV!#4 zx4~FieB1=q43n(R1yR0LMU;y=^eV`$`o`n%bq^T@9iIm2Xxo7ybYE$1Q#<}M;rW7V zo)^{uW)57qxD)|iZ~(9tNm;lsc)}@@=-`X|Q{Z{w zwF1O<@T3EWRPgo%bH|Hds#v!a?HU;Ah?2bM{cGXOM!*vW3|_z%&R7V5NUqz|AZ-_J z0z>|xUkm5fEpA^@Zyyz)^L{Jjk$gcoR=|S>w8)(Y4an{Q`-x(|1xv@eh3%uh1Ms!^ zv%=9`(<^enpX3uJ`Uz_@4t`;72GTY{Bm_K+0xyGcVZBn`M;Q>4JCBj66{+6>IjRC) z$Z+Ach%FfdyszAV+XHTera$nuoApYs892Ubx`8I49j^$-=bK^LPx9cUV59)lR0}Wu zvtWP`zsegbUI9bJx;1zpQ!rHUZ9>zpf~*h20uLf5=g(*p)}|6(Yyp@s24yhCKK#z;Jpf6k7Cg+KF5iIDWnYUA2*4*op=ysd z34c0gsoFhKxr{^1Td*2?$bcU7%3}Mfw|EpJvGAuq5-oeUU8}P#twYOq(_}zXcWTYv5 zR2@gJ{SBJcLj?hcTx=WvzAD#c{{d%|tOX$xT{cQc+@hg41~ef7Yr-s#qg($0e0s=8 zaLSkW-26rVShsh3-xi**)!4F(p3!w)i=@;Id%Ui)CFD+th65N-I9t{d!T9?_TP;K+n{pR38gtDog8 z_!pv8TX8zKfZVBHyBrG@}d4y#~vEHeemirB>4Q;(pX~5J|-L6IW{`_8suU; z4!IbQ_7_K+gG&#Nh9Ds$HM(_l;JpbM`)?Te(1?2EjFGwFe-8g<_$U1V!QY1O8oqY; z@~LZwJ9!$Xrib?m(!0}JJHU9icj(~cucp2=1u5&Z$THMg7YD-|?9nCwK9=8`Uex8~N0YlehPOXW$b9m4OTTmj^Ucmk*pVuxaqw z>EEwOcd42_eR^){pOgOvi7XS7_DT8V2)gRJ;rS&-Win}Kwi&S00FI%qP5B<|#2+(G zFE}v7TxN+Fj#oWn$_X&t6Xoj4LaN~g+5pIySR8cdH#dAz9+-hNk+F6GeLxDUZRW0F%AZ!kwxIWo=CWCM3zw`3}@i_ zAZ+<5bGd0!b3O+nm1(|>=@2EZrFGs=!|rq%3NiVFuG=0{HAh=(Y%rpsbX?C-67~ ziDX_S$pXTXQIT~^eZRu|ZB!1zyct68W}~sJSib*!Tpf@%8a{stfT<$#LN+yjA|@|E z+P|{OBGpS1DnJ~Gp5IN9==D<|J69`tnLBKW8D-~up*#8pG6>qGH0O;)(_H$z1DG6& zG)lH`k*PXg`+3}$kSz~Tmg0nmlPEP-2QxZ>=|PP*OVkS)y<{mYE>m*iv?MMF zWE3F^Fn-i}R&V4&v0)5BzyxA|%h_-?)y}Y^W;Uiyf2CXBLxhP&q$=hr2~Q{^oBcYb z`%7Gq;*y1I-9<$_ndEGyOJ^NP!X422KyTzr6#+5=N2xP@Ll9t&-SEh@`9ivU*zmpX z2fD19G`Y)^L1xw4i)qPgUAoL#CnPFUq!6gZ^<{dt+cRG=&?LfuiQ{P$A~X~5-;F*Tm~$h$4q) z%%ZOc!_wxGHW&zVk}9RJ%JNeouQ zcqB?~L?VyhjXtC)=fP8F=NY&; zPFEu3h!O@$7SK3}=)nJWt3#G+La!EwBD$rJ36%DyukfLBMoMpDv_y%mWrD;h-C=Ol z(;hODY{q0VmdJ$DTOYuT90o&$a`-%YmaB*ICT{OvI=~-{y%s5vC1`&$;|a?3=?1QD zj~kSbz{U{|(oJ8|89n{u-6W58jg}^hiBeo|AfoP|Z2G3|2MQBMg(1OUrs?wJILQo# zj$&*zH9;u~I$)SK+XJC_jHJTY-1QPw&~ShbW^`x6lDVt!IN0<$E@;sN9d>WLUY6|b z<{7nV>Pt3t!{Smlc}$tq+1<0*CJW>tccLjrX8oMJLF^pD&9Q;!AK~-Vy;+q+6^evM zy8W`|C=D$xs%4=#>!y9tzV05f`fCxQ%;?RoTFw@UNd?{2X7$UOG%M3`1!_rUa&yw{ z7;1*GdJ8H#7qOSfqOn0M=L^kQ5Iu)-{xqA2{47|cv?F}zcvN)6^lNXzP z$x~14)>mmFblIzsG&HuLsvbS_H9QVhWtA$LSX(5SbW5Yj#Y?*5Z>2*lkuo!C(6dHT zs^qD^#(XScHb)x7oGa%89L+{>`2S!&7D}A5%01Os)aZ8?Vr$K-6bP(~kTPK$NxYttkJxnj*> ze?8R5Q^bv3I#rWU5K<_%6qZa0rzy7hU0h(SMhHS&jnP_#UE$J8&iFlUsId~#)|djF zbrMdEA~ua7Qy60~ZzA%ZszDx;hYafAiFaW(hM3Vxa*A9mn@@zxkoNnVUAiqM_zE?r(MJItxQbl8n~k4&|-kQH+zr=*eP$EXH#Nkl{_SN`l6~Qb0G=X|-Re zWQ<8eAr)cH!OhW?Onyq1X2JW@Znh^Pi`{Y4LGD`07S)J@g(X!(T1^VN8%dXys3=u5 zN@sl#M4yi^|K4RJmH7!7D@~|lPF0MNZ@|!XjJ7GS5P5ZomZ$(FIzyh*-N0IpJPdx{ zdT}iljV2qZ)33yQv{s*j()+wJO(CF5vds7^-5sg5$jW4nG?`&s9BAB_-N{`Dpy=1Z}AMz10+HC++FIr7qpmR8l%m+M}ps6J{?lj8oh(8jCkh zDok27l(m&j(KEa2P-CE$SkkBsIdyVhv{X+GcQZ$;>uQVAY*A3zV#*qipVU1L)pLlhTS~TFK<6@y~+Got{uC0O}_nHtR~UbGvu7T2X=o(S%c$NS5L3zH2cXRVu9}?C~_sRLY*Dl0L`Ur9%P8 zS?FoCfw6>wISX43ZTcM^G-bxY)uhTM8H3PIUvzLcW~1~gycClyC9M)I?KXsW27!JC zq#RZ%eUNC~=8v*W*c?bo_q~KaP^9BlvQW}#Q%+dbMS8%D9{-bUGrIn|;h`laZV$OA zSEgjFl9|ZxY;V^491{KYWHsbp>ZdcqEOsC?WELrnXa!0~(6jzTk zQaIIRsl2QtjpqrDa$|bT5!Di`MB(x$BUvSr^!~j|w<`+dQoW?6DL!tMe515SrNOlKU~kSpYisB9sYA6OVy zmoDxnoVkSCkV~?LSb{whw^LU)sdO%vO{Psp{hEkt8CQ2(=oqP})tm{rB1RUX&hF*o zEco+O9+K#4wKff@Puh7pz)>;5V9iNpjqW@c1Gz$sv*s})M;sJlRlP5fj}nQ7Txyx= z{s6&fsA@Uyq)V($?U$RoGMpC>iSxeJbYSyx3==AO`i`Jd7h>{BHQaY1OA35X8xVzDSs@za%@)`wM=Th|94|mB1 zS45_er_^y*zzeyeAIHB69{LJOTQdgJWgX*)a%Ut~=wXi5$ZMsFR2>d$mr}#O?DEmr zY(=XvMNh=&!}WUubcVWv6M+aBQXST&Sz}77(}zc&!S%y=3IZDpHb$keYZVEq z|4z(49AQnWbUueOSK$T2koJ96#aD^c=eFc z(UayE+tv-D75#Z>0{F;Ue5gBCmHD&QW`tm>8eIbNi{-);`sonx=^>*R_FM~=yvq-a zBk{24O{{k_jsP!d3u4i`1Flm0Dm0<2Kt2a|-f2vwP;3e&u9u7sJ~zDk=6k1BCho;) z5jbZWTP(~RPM@ga{M7*}->w*eQr6#y>SMXji+6GQ-@ zfc-Y5F5#A=_zvK*mWmGE|KEHhov3T=d+`Jjn3ZL%53NpqFdnSciD)w5Yx;ae6+xh{ zZxijFT1!SZJbpDeLA`o(2u*Akb*;*$?SKYJTYT6tUPl_nre`9iAP4x}bTA%5hv)g_ zxR#2DwsbFgetxAz{R^EH#K$7yEn7%Sn+noM6=OwG8P3-e=t2>&=^>*VJ_9+L-Z2}8 z&^@A+9rE<7=mh(|)%I0A2_iDiS5hfWF~szzMV7$f6tW5 z2^sxv)W53dBR;MOJe1$KbP!E%oftxAY!Y>SO^oxgbkkD^@BQx!L9mh;(g z0Rir+8EASBnNO7firxZfQz4WZtl^T@1;7Hk?s~l;A5F1bSl4uzNM9g=&Rq~K3g1U= z7Z*f2-j4X4EutOQJT^Z!VDG=1_vbTjKjb{Tc{TMyg_LR&MF9HpDqM=9nnRa}p+!AZ z2#Xt%v|qCifb}3niXitw2CxT6z!_-*dJ_qGc$#7G77CN-m{zoLkBp`W$$N1U)~$_R z-(xu!?fiRk3WX`r2SJbALy2yju_=`iE1^r<3h9Ww8mS`UuxJ)tLW^dndy3HU8_J7a zI09B8^3Rh-4zfNHHr4|;Rv_ADAVh@pB>0AILeEGx8i;I)_b0~mr801*65M-$qX;`!{}xLzp|{vfrveaTfD0qBOe z4$Tbo4SolZ_@v{`(TreV_%rCW18@BI_RGAj1YmdwI-cDbXazVF2N0@c4oS94@)(o4yhl+8go;1S; z!eF*sPt%;O5eV2^t_T@Max45sFB#&t+p0p>Mc9@C+OGhyV%h@QJHPaA}SxBr}b$FD=no zf>AmDqmWCKpx2}qQ}tA93qJNChv1sM$Aai4pU4C5pK&;GEKDGyg>+@gBskkbVoPw> z6#3!MSih8ycmG%C+BGMM4xg|BiNgEqS^!tiq7K(BIwOpgo8-N6(JcYd9?|>D&^tf- zff=3gA<+kA!@c}NaG)E!=}4RB|Qbb-;(PQNc}s^uwhl7W<1yo9-i4037; z&fmK@=WdYA`LP{AR?@5v+9AbYIT^I%yJ!EwByTLA0#$#a-V85`f6n~X;+^g0u zK3I~P?D|U*rgmbo{jDtjpvd)&Unmj4Zw_JJ}vcEMki}oMjz}0g}wBqWy#J_#~Er{Chre=HJ z8Ts|*2c4YYJUTtoKIs75Q`;S_1~dvsRf(&SSc1}P^fp}yOt=;rg-Xz<9x{4i+cqAd zWJ~+W5{Q#q`A}%Q6Vgc)*`O22qQa(cMxt>J9WB83J!Ew3g$Ea}*)YD)?l1ClW^M6E z3Ydef>Y>1e-c>aEv$c%4oIuhF+%3Iibc|bsW%!*9^X*$IFlk#$z@Zxq;f{g9!R^#0 zqhgj0#3Sfg{t>8KOGd9hbAA`4#nJ!<;NZZcFJKl8X~R|^SqQ_=m3?H52AnF8VA1v( z$RIss=-92h!O3A_a-n^oCIYZqwpCqSJv~RY938osAC0x=JUV79oZEi;Vv%tLy&}~& z;TgSS{4zmm;N+>3hlV=qhwZE%KBgY8AGIN#Rg(6miYr*lRLLwsk*k1t4;frlJ_W}P z9}If{&91n;e3F08`CAa^-(5N~rCSvxtJZKi013X8c`3Sm8JP8ukx)LdxSE!Gw0&ZW zm%Q9Z1mLi;)RCOZ$+9L)<>_YHtZ;KN^u)(Si<4`J5VJ7a5xnNxsw+h{fH^wS4+kk8 zce_6oC|7L~m8+30+94U^k%O??)>1pU7Oz#NR5)KkS&-Uj zInQiyx`&L8!&42zM?7&EUdue%0A9M}~W0A$7*R>yr7y2u7osC5K}Wi1u$I_VNXF69rQe;k3O)CB{* zsITuLEOPa?LFBrAXq*?h^nlxWcsGb#r@^evsd}avX8)((5ba)f_S@n&Mm`PLpLg;i zm+kP$qi1}4Z->X4Nrstk+_CP=cO|ayH$+x6dKXw`;PPfQO@9+Wh%*K{;B^4@ubW1% zKYa5nI{z-w?Cd%fkl>|TNOb+-@da>v`aqFl>{}pT84p8{Nf%2kME1>7weZI z#Y4$|C13FJ)ZSHjij8m`$I50T1M*ZFoIb>sCSV`ma<>QoK-Vkep^stZT@08KXWsLH zLgwZ7fLyh9rNH`;eRuu!vm#f0ANmbGnoU3HgcvEnb_SnK@VBJ>-arz4;`{vLbKO$( z!oz$2Rll)Z_07J~AAw}`&4KLjA1CZXXN-S-#WP=egpY#9sv(MQ1S1Y6$;4AiSILk- ztw*5YYpLKb|L`LE$k_Y>+OgrA`;hoQXSd?W+>VRi=%b)*Is3>kY)W0{h|0N}oQLq0 zyoQ=mD|V-3yqFEkU@aLrg#JBkK>S$oJhVRoeD)m~13p+u#AH(@1(~fg!IGh(Uw;-TDLI)k6mL zE@&SBqlM<5msQ-E@cIK-4KK=H8iatCKPfBZ3 z1L(f+k4vNh+n5hyq|s?l!UkWrup?!mPfgqaNMuib;07Q4Ic#u~MygBvU&h`9Op>a~ z7w@dStE;QJDzkcTw%!0qiG2Y4?3j;;kLr?$f$?gZgFm;DXd*EAhDWJy$H-H0NLpUVzd1Bo? ziB=Hazs7tW{r21}AY`_wqFwrtCxILKf6tn#%ekx1$~l}K_s0E=O!%TIU2eJ8;qfIDBHB}5e78m0`D1*2pa{18 zNB$5$s{CVJFa@^upe+Lj)U&1#1l{r1%InGYdL%|^Cw_>T7$j?t-uP);3cd{!x%NXy zsKbj}yK$Cm^knS15>bk)c0yduw0s#nGxP+)KmTOTJbiwN)`JoJdi2DB?sY$fcse3& zO`|6UBs-N(GC7iVd&TuiE|_kWwNt-BPX@`_$~RVn-6wuE7c*U8b0+`w0-IC2e|q9z z_oM#`)p{|V|S0ZhCZN+xR+i8gBc=#`XZ{+T5LL*#kK6JTc{*j zlB_*6X|`x@cnVtPKpB#|+s}%+SNz*t_}DFTw_SU7Zw5QC>ZYQtY)wxHVIwp6|110~P~>k;8NBs8o_090mmrUz{4vvYgqx2*!(*=2t1MbBMu3T}OF?w%uy zw=w6`?STzs?5p{U1Wx$F17)Dr!?(SU|u(?H%VKmW!-i*H? zwe`-PAOYe}h%X#YSjlZ_Ytg?N`|}GYe!g2f@H-r&zT%3%#khkm!M;KSmSC0a&4>SY zbF+H}%M4SbcEdAkl6KMabN)VDY<0)?Rv;3Bh!(lw& z1pH-XUB0d%i#m&m9R2dp02nP#a{vcnnYL2%SOHxoX; z4D#%wxN`$%K?Bah-tPNH&9H3+who??XR$zt=V^C1Td}8;NoTffH1?`t^W60LW!e+Z zUImmD5^1OYdDwgd0Mobj>k__aoEq3W#=gR>{rv6L+fv#OzIYmd>ATDTOb>0%pSy9# z;_8x}=Nul&6>m99lr}YvNgtqUD{K3&>%My2teZ);boeOaikwk`xiamk`=V>e)9Z6` z+P_Sg5nDV!)*kw@a$MVU2(cv5oo0yk1p#H^Os>Md3f6FH;npM;I$i1d#Mn*>>!yg;Hd6XRa$=KZJ z=S}-|e0j&|7m#3je~tWP#}m3-{b%hF%S$f35_sOHNQsctJk42EQBti8&*iPMAW~M5 z;8aq|vpG>zO+VMjPneG%SJa%!t0HaXbCP5Q6g**-X*q9IM2gR;l1Raa+;pF*G;F%8 z*LE&Pin+X;v!dy|mC50k5=XFBiI=f!MV00h&h#_wt}fc9I6`G;d>FnkycG#jMXSI| zgp~&Rw?YZLN(*_DMjm>J-ZXKFS9AC@BUllb&RQ9XmaGyjsQ6M|l0=4}2qkCwNw4V> zJi{^qBM4T7qZBK{@-lkBpxgMD!sJOLmz7OF)`xiF7=tlV5@!_%g}?|IG|O|WRhCGO z$dk0Hkd*1Z*;koNN3S5nQ?x1xj3S`}j4WCiML?$+hP6^0;7Q25s^l2P^rYU4qnA^s za)L~-a4)wK5>25W6lIkpUb3oGUXawUSJ~G-{Klcp}eJB0jAU zJdH(1=LL>a@Gnd`iOeyCoHzZVSNkM=Dlg<26=SzjEQO_!IJ6Cy04v<{@KIS((0$W= zQd^%Cl0Jp52r9#hRwd8KRz_5Ks|?IZD?DgOm?TJv;Z@U9MptO?UoH>Ep{*j1CYgK= zGoHgdDx5+v3ePIw2h(qit}v%$nq_H$%2_E%z%cW4-YRkgZB-Rj;uTUP1e!K!r}y@_ zggM3LRd6XMT4^N@<|b*vilkHMRGyJoflzY-rJA1BRz7Avc3j4+!Vg}tN(u(ZkU0u< zIo=BXB~?|S2twjsYE+fL&w`pqPob>o&E`>6Qmnj$jN6RD5*)8yZ&YOo%r2+UR*KMj zAaGbfiU12xw1AvO%rI6;R9KnkL~s}P67BJKfR}_* z5+RV3%;1|u9+feAtHi1*)|*iXmgdO3BALE_wzj~~JRa8+tEdn`j=kqlfo&I1cS+#s2ss# zgsi|>#XOHqjujGUj?1e=&UCMo)^`kl3M|1g61pr&5@wmgh6Hmc);zu`uo9h@8QJt5 zqbK|+Mdc)hmPynmv2!T_!bw(GD=)Az#mXc>u&n8OXKM?jr0_Y4w6X*`!Kj1)ag)d9 zrAU#@Q*w^Z(WdWePy98+jjUof3p|7XgBlDa$yNb*Dy?!ON@S!MJNs$LH^(G__-X?N1p~|epavWv)M}3ILPvj^TR2rK@3J`q-mPXb37r_ru!ah^yD6MN)R9)84^N_kRaF@0S5sI>6;Va z*OU_=Qdz?Ebz@zaQzWkljLM_iD%gbKAge`+WUK=CK!$KaA{xQ;_uA=qV~7}!m=~~y zw5m(Jye_NtBZE}2mnB-pm>APnjk+AGsBl*0!I&)8I|q3tVhXGrwxFyM5X}@}`ijvD z>Xahn(LKyX9xDJo#X%>4Z_zx>Q4-6GtRR`be71H@gs>Aax7gCyUo3=%Nai7+gq*6d zfQ)7!eZOE#A9aeNNEtFRXU$XKPKM(o431*4C31O=Kn9B(Et&4Ui_({zJf(_YM!gOJ z$%z(K2){g$x8@{lAzFrPR#nqyHS&G>e9(-@$OLayN$?PkMRXVv(JHe%P7Ep!NyL~w zZ`2h?frZr2&tr&N^g=%@WXKw{z_Vg5CvmFjv0mNdBn~=Br64&;{b(jRocIhwV@h~Q z8$MtjIgV{BB6~Pzg?~3@TfxqiMHRbI zUj{HSq0)IAyVqgQ@C0#6X4pK-LB=pNnr2jVUckn;ifoR6g=r0G+W!=C_>>{oXT zuMD3U`tH4!ubYm?HYQ)Z^M^a%yfe6SXren&ow#)To8xzk-!S$cWA7O|HD($8yU|w< zz0vfn=>tQq9bYva7^O|h$j?UpzmeF;I9j`9K%D}J-6yoK$9QjFouY(O1jC^h0&gXA zIjk+%74i-IhNFeX84UDgK0kEDz2uFi<0pt54xl`yiG|XDa}{cb1je#*94C-6BsoLn zhAubi3OSa@F`U&{nOR}KyGC!nA51Nl&K|vlv zZ-c6%pGjCw23iI5M4iJRrWxc%r&U53I(o0fnT}r0;q>LeN+kM>p6lbop`c=?<~dnn zStwXCogcbXBdaG*9M4I4QV>WhM7X|{p=_WK=MIgbs8BQrQZoIAUiJ712y9NJS;?B? zd42ofjKYBg87EPBMTDg1AdH{s*CqKJ!9kbg?jE@(a=Dl(>nBT04W@VVNwqKM!PD-YcbwN)q&ECiy=LVM1uGSsQu&_!o! zL%~BPaeaV!U3)+!Y#@9Jf>;4w2hIsj8aiUsW==_>n3ovrdzmL8zw;dAm7?g1jI1bh zF2`Uy4;}2)#!$Qk96PAVDem!kcRdeb!9=4sXPS%%rZFLbuAvkn}99_z7=)d zk7bAU^~MJ+UKM%t49cGjwF&HpZ6njzT?7tgGAE0)$T35fv$bUbY9*hia3z2uz{t?- zBoZ12krN1+%wZqUxuLnUwFwsDm84m#nrF~<4kv?5K=?xo$V=#)gijBd@14CCvmrwt zl^JXlfzx*`B&g1Ngq5QynZQ4JnvsWQjJnWcNxr9M5$Fm8GWZm$2kuZroVc`*9E)uSWdQ5P=;99_%2}~Vk#HQVhV#;Kwz4D&5U7y6l90#T;YhJ!?J!UhcMAP< zCt1OHwz8OGL|k+ri*f>5R-u~!BLF{mL?Qt2hDGwcY$jJlWrnJ4gh4k8sb zAZjpKQ2!NZ)GUF!GnX5hH0nYo;e-<)b5-ah*n+xPQb{Wm8t|tGF2zwXZrqZDQ~5l$ zu|jZ=kdOlmgIy~TI0_&?$UH@3B2fFjXmiMP*}aj1Y2*ZyY{+Ar0(qQL_=ZS=r*&0B zfzXC9;ADy$8a1wL!YQZ%vI>C(#TtTxAysIg3Pca7axfUBiVQsl1A&1m zmnVjXj2?5)6wxAfkQD+8vw;UNtIUCuRF%*z04SA3)Bl{U%~QD7Gdzh->PHOJZd}_S z53uec?zYgp8P4=v?>M?%#FZYx670c2^Td4yJc=_HAL0lJDjkk7$@Hv|HvWMfrUxc( z8$B@gkFY7mCmtGpx&ChadLX(9TZdrPGJInScK@Q&yTO+7r4`0sQ4RCj`t>lconNHc zJ_LxRSB#F1AZ>*CY_!8m&3d%M)(fzLwss>3U2f4W=2i-Ma)CFDpjV0J*_nYd&9w8Q zNUG7D-KX7j$DduR&HtzQ{f4RX?rUJGw9)jK*09xo|&+i%`v&Gu;E!PCzC+JdHfo@0(^@^7YE98D4hN~ zGEeDt&d8PyylXt$q=Wu+iY98&fNd=*ry|Hot=qppOv4^GSf)uoe)w|jgU8_|KF64y zrbGU%!*B&M@TT}ghb&~}Y9^=D1MXGL#hZ^$pHDss^K1oAuHvSY_v;68J3^45tr;)OXe^ptKWJgvR$ z2J`OOfoVNEHhz=Xg_e7zXX@z3|@PXZ=;r>f&K(<-U_2*J!y}*&AQ9*cBR_W zuX|B1$Hj(8+gdQs>JQvu9eOHmYh_YNJaEHh2FWtD4=hVdym3&^#@rPfsFjebv4st zPwdma{+f|XwM*VRlKvA9EZJ~H4RtkvPUq!*x17z*#U;G!Kwx8a)zk4vI?~Cx(aWr8V@8hivI!im& z3vD5mEY&Gq`%M~643Le~d63oGeVETTUVZIhjk5vfou2Nh;|0Z+T#!5 z9pjPb7e^4=W0}`>zWl5+;*~c+l0~-QjnTDS+;CGPyyl+sXKXV&}C-v*vmD4`96qiZs*fw%`XkjV#$u zt<2AL?@Z}}D6*wP`5F?jOh@YkwaSJ_-rK3Q?4;&RV1NT;aPwv8&R^|2)cr(4pX<<; zjwWm@SGurF6=+{F(pG94rSOuXZ7gDopHJ3iH#QM9@S=$W-Cr)6fkDY`9YqUb4}+5M z6ha&=`{g#kvANA16Ym)gPTo9Cj(y9tIXX5K z(3z=#)6%y^;IuRxwhJp{#7#zy_0Jjy{7*phOdCjE+BEbmKuAIq% zQCtILAVJ#Up?i9MzWckJ`79LgC3*Bcw50>e8f#Q4dh+XZJ*{*)srFK6O}o5cKC$PI zs88Go08>PP9?;%aF!!T=KT!k=hqiQ}T%#>yo^6*I1Y4~vtLvm!qP6gn`PiO8GQ{vl z`T%L4S~}OWCzs7|><(;MF|Ec?T1XJ;8nKjculeICZjsi$P&OZ%KA)$jgs_2xoMWIuM>q0f?W<)aR6{~twI*)j?2PI6`AX$4LdwsBbrHn)Hz>CkF<_mT* zA8X6&)QVCoM1tBgMJ(+3M9p;5mB)LKaayHxmPNM8=8O8zz(;pXADOylGBxszu@6j~ z8Tud7(e9;hT%1Cn)Ydf^s^LJql=sBzzJ{Oj+PQU=WwfW7_|W-OEt-;!-}4sBzV0j5 z%IcsV(N*Z!=4-R3=I!*mTw# zqLxT4c{60+09AYRnVW;%Z{2K$w~Iu@lH_VVBD;}k-qxVCYhH~X3{c^HJsHq;UGcJ= z-N#-HVQIc{$MjcBS5AF<@@G4*9QyM3@5a>8F6m6nnvULb(QPicXwaDHeZg{cBbW-+ z!k!?av}|;ygT%~~Put^wa4(!O@0s7WhW5n4%1P~Cu^!rI&zQ6Ks3ViJ0f`Qa1V)ju5AF5rAT>`xbs3<#-Ca4KK9xxZ}UxDcZ&n($`M3xAvtlB z2|1&!kh2PxL}VREd5PW!_FbShu(F90S<4oC9URfx#qS7>_6Z7at?xZ7G zr&0+y;XdSa0~j}13wEFZBTCj#!FATeT3(>ai~rpG#Y@l4p>fT9)sAUl>ZVC;n4kF6 z=#1%AV^8V_cOC~fw`IfTG%k=#B@j;1tEDBW+Fot@Qrg8D4(|w&1~*|_--@&kHcFx zKwcT@WH#bYDS9OUy(LHjnIbfO%H`j6v z#-k_>|4K&mxO$t^qTTs6T$~5X4FBa{yiNbMbL(1sTk3s#V0ZlKJu}(+_#nI-lBG=`Qi6 zBWFz7$3JTh>)|56H0g(n46Fy1>6MRMV43;?QTdEHtWAE-JcVeAVj0O8>7WxS70b2` z1P_hmCL7v|KL?4neJPv_AGlt--T7fzYJ7N zr=G0Rh5Q-FPEn4P;kS&K4Hv6De*62)TI|c_x%q8tASg@rX^(yRg16|yU%_Yxxwxu* z?JLk~2g&^inj3C^m85;-Yv$-2gxQIae}^c0`&3}E17Y^JhA>0wi!Cn%h;esd5=z@k z+AB(tOgQQ*3!?Viw{&TCK3RLs5*Rx8kLf-RTSLG zs&>cs(98f?d-~zPABJW0+M4`6gkosRiM9+iKHe5e6uG>lMw_+8Wlvl?eb@Uf+Ux!S zE`I|>KwCS_ecMrUq<6wzH_oQ*NC|S5hqoNbnH?V*fy?jfJp|Z+C$NcukC*1 z8|I8@w&+SP6-jB???}}YfWuX_i~k9~7$EnOg7?(mKmR9P4GwML@a;?Eg|*d&kW4Vu zq|)>|3%t(x$EMGxYLEWz;^W#CdQ#gxf3M%_lUqQG?_15hK{gC9S4xf6ip>=kp&)<# z9du!UtVRFn3S@`ZruKF(`>t+DOl~>OHL+gfT@>YMrk&+bR$c)%I`;TpE&F}*%*;R; zd}wXG;I&=d4}Tw8P zp4RR|U%&DrCQW|QeB(CL`n4x7Fs*&L_0b=h^~eo22y0Z>si%_lc7Qie>&WriRX;ZC zksI3-YIoi4+^g*w&$R!9z|!vfiFua}H~^Rw8yQRi{2d8^GdjAxo)+sfKj~?B+m*uH z`D&l${^wQ1PZXH-EtYGYC7g)jWo_{)V71DvRuaPwI7qEH7GaK2IjyF<4#{gi` z@sc5D5r(*5z?QdN;XR+9LNeR#ftUZO0U!Dm28>WLiuKyJV zynU$={qdS_{Q120*sm@qkq`YEqaI)^Fx^*wjZqJfd;Hcn@_qO>=GfdF5K+VK32iE1 zx?}89la0|KT|_lahxx5A#DSr1t4=u0W7NG!0?M3hJ-0`)4RY8d@q?Y`e(YYY@=rf+}dc=wann}_;0#mVO( z@q{fMJIe@?TW>nuZVGPGR7J$A67r>9KV{jgZT^S8&(1GHG%)Tr1CJ9u+4r;mL=O{N z5%kc&KyfVwTr#1owiks!XEmT`AATAV-+DQ!MLOb6N&l#`ytEr^V_||{37I>`uK?DWl%j_$l#%?9!dpT1!u-+IIUgDxhY)x~rK71+!fM77p%)9i#gi8c~&bbuEI zCjHKsWqN+wD%xwFeHJJ5kB=SG7RD_XvhF`HZn@`3;5G@*u>3-}TX5 z5A1rwuEwq#cR72x7k)o{#FQES-sDdwzc%EV><<0qRK9ZA|}fb2)B)%Y@# zb!}EltuS&4HMzad_1cNKDy}74E}+!8wZvLdoVsl2Q$0Z3m>@RkiV~NT*@b#Oy+6?F zPNZ7!1gP~4fM}Tf`dUledxt^ydP4X>5)8jes8YVpJ;eFn3EUnu&|Qtf{WjK${@Q}ToG0Zlox2ZnXO5C zUuJxk2sM0kitEHS>P1Ms8ZhMS#Ne4b+R-cH^#NXFIE{>Rq;d> zU(=B*&7bJeqh!oWlXT4Cal2A&_X>05I%Aq06{n|=q&7VvJ5nXo;HhAA)DZ~=$#$69 z=#)zKSiQXWKBN7pYFlDF>kE=2m@hjVg(IXvXZ^`IX(Qw5IN4lYDCZAAC^2^P(+-SLr2RcS8n+t0>I#kCKbe^vPKKX##_$tiKIcCwnvYu#g6`~;=IM|~{ zeE}fPN}6KhmSexB?;^s>y$#04$ERiuK-%bfV#7-ZoF$shRhY8CPkqVg&RT=W zk_~pPoy#z;LXaFKjb;W6w?khx$n|I?rmQD|Tq6|OSSju9?%f=|8hd@&o@}nmnbmc2 z&5N9FyXr>ur3In?i{1#-)AmpWP|cO$ph1VO;b7M5VXsnO zu_fKI>FY)_`9@~lS86!K%nBXy73cOE)#chcQY(;-S~_3YSPx~?@mCoIQqt)o8y((P zZ!hakiDm<#KANp0!jwp^dyDBMre&+_GPZOyD=}rpUt6tr2qGIuRwoTi=V(^+Rq0$t zs5;$jS}YgGtw#H)7O_T=sc3S=BW6Z8%6i93%p2y|X|Tb{h!h(P)NI zD3`cyi_S%c~=sJ#ZWj~9-1@gA+AI)^~G$~BQGfhh8nuwpa(WW zc4}p1-MdtPxvr@0-ZY@)qevVGES$U(Xw@rrdn#x8kuh_D+!7yh(qy@uQ0+l+bj@hT zk=%m_8k#?t2rfkx>*anVyh%W9q zV9;B3#m#UoJMAilqoPvW`S-o%BMo0^ZLwNPut-!}j&XCh?i=33krr81-7&gWbt3~W z@_1D8W5#?&>g{HNT#e+Go19I=5it78-boax*BVutlp`LmH|=as8Hpq!OVvo3cDG4n zPwdoIBL$1v>rKo})Ebm8i~zEQbflc(#|uU;3q(btHkXSVwKbly^CG|dX`>*&=#gnh zI9&JmI(c7AG#R2ik_vJ@%1A!Otr`WPmGm+h5QJ*g-$>#R#%SJ^ zT0^Xq8ue||E6V|AZs)5Fx|8$N$qXy7_6DD_v&!uA#%ejDRXQJ9bTs*@Pbu#DN24}& zS%zE+Z&rP)OUimDmK%P|D6r*nE~;)Y`DpY%G!K+Ho^`%9OJbZ!UQfCBp^k7#6&u)@iobjo9*T-=+?@N!WKM;ACJym=MQPmTQEsJ^+xHW}K#x?l$&*UECSyxVWouSFYN zi;uPIi_+4nS{ZrVAXg*VLXj$aQ_*rF&&m^THOOT^4!4{6nv!ldBc77!n9+K^6;Mc` znQd3ug|&21o-t04a6Yu&Viw31hq_rwQgN}o!^jO2&ikq?EeHG&F-7|XKfUKgMng)| z2Q9C%q%Ovq341ng-fw(YDXFPIhYiG?4sm0No%@tgT`tv@sa7Mu7R(dNg&IHI*ImHhzMGqD~isdJ;P7^*r0n;6@~O>?MYvY^e?m2*lvTq zfRw_FvrtcG>WlGuL$w&$J;I(&r$iMfqFis5Jb`R^Zr!Nwl3E=yE!sDoQHMX+A(=hj zHVPbm5}I_Zpwi(6T@O^J9R_^>w3r@xt3kJU)g`)M&-o*~3Mt7C8G2r*m9IPLda8o3 zHE(t!OzkifqR`4h5E+nHmU4WmwZW`O%#5wa&LL!eX)>86A4o-lL~7DVgAl52q~Q0w zTnn|_&9xLe*>9!7XML1+Ef5IFMS^VcrX{11@=7JrK+XoaoF+<*xn~gLqs>0@d$;zA z=q00@;egPBfb=h~#5h|rR=OzM3PLCd1DoYy_>2vs7>xtHCN;&d{9z7OmJ5!XDi84rDQOa+Khm6EbvB*Mf5xJUH zH{9I!BiXJhe#+q{1Ky@foyc8 zDiif;zV6LZ74!YZXZ;dkBhyM&>C`<-d4F|}!4fgwa>YxpXX+Vj8bb1w_iP%+d(7uW zAYimrTP^q`m#upk#f2u{PPv>dMnqldhF6~Zk@0MN zkDiShV6am)xDUR4)H?Q@?j8N=9@2uI0Kl+gM%PO%7g=1SDy`LYJ{c2qTg>r2gJfi2 z+=cwg+c;|VEQVKIWH|zhU;LcK4=1dhqWqbvoppmLy#?*r{gxBc=To)QcYfY58I})N z@Mz)N%E07k_@VKE%;I92=Tx=5%!lFevSo%%?0l;3xe5y=J3ili)@*^NUU(~uff;Ym zYOqQ3v@a#B2VzBG3Fe!R&BFLIKsHP^J)q_n%~^o=8Q4mp4~DB%u7o{b^DQm~QX(#0 zw06T)FjKvBpJitH{37ik+fPquAN<_RD2!AG&E2=|v*0z`zm-OBjN#;yEsvXYdRB!t z+3YBI-h0_RdNV-Q-}QQ^uJhf$o7V@F+)AFaJuZ|AKy_URB%|pnyNJ}8+BXiOi2BKJi!H|{ za=qu59XW0KhUvJbUSgTqbN(`7ac{e1`^D`WESE2{WcP;vB$bKl2LB3PdV$Sb^WwqN zMQKl5W`RfVwx!*>CNg)Lw7)uLncWWndDM>q4lkoa1QGydZUvpLj{f_7+Ru+!0RFOF z73~#{hf**2YD`>GK5LHDli33LyrsJ->wqc2RI&`$XYF$*EGOo-EyLSr2uSJsrVncV zlNU6?z4K(x5DCQZz9Dj8jj(iy%P+8WePH@)u7n{n3)5&g9z+&jZ##&jUHb6w3`1-0 zxzcjXvR$e6io~nw|Lfb!k*h4bbVxtow#Q1D8f>sNR~v8RRXoDCbS6Kx?*gSTY`4AI zXRo@T4fcq&H}w3up${17VYmO96+<5&_w4rlp?~;lOKkS_JEqC0S4`eH@$s==4!caR zAJw7{ymY=xTr%-;2ryv_M&AC5hp+5XOSIP>msZz`ZO?K+%U_QV43M?Ew!VB4VI7v= z8;>wQda32`MYn{vUU5!dWbwiYPeX4b$40`fW#ps1na182Bx|#;Ja)PE#>AAR`zsm( z12RX?J7LHi8;_-;`PG7uj*FpctfIY_L|+ETnn?`kh`0N?2Pq4lS_50Kmn+&rKgQB9=QJ~6QuT(fHnrn+T+h$glAs+#C-RZXo;F;Q_V($ zWr}HkvK00ui=~qG=r#D=AXzir6F;u~z%jAEOJ8fT>+vBkJLgeKHM04#lnW4z&B zwg2@J%kkak5w+QCufXF_Y0rV~*mV{g@&ND7?RbMJF)>u%_4}dpkZtJ7p*e&lKWX~n z&`*ZGIyN)!fJ=odyG8hy*?>2nEoCrAEmu({J0=-F4rt+jrG> zWp>$iU9oF+^1uHmT)U_7ah-^JY1NTZNRdF1jc_EEW9Vy6_H-+rT_)A|(n3_Gnnhy0A~uJHjrN-*d$gHNBTdRil5g#* z_L||E^irM7JJVcTW;SR)z4w$sZ!DJyL@7I461$#ASBlhShKYe|EJ@3BnOkak#2}qZ z2?0aL&WfY`k!^l%Vee?xKb-bLG*G|$)K;MLlJ6oH51}1?rg9Olje{yTu~{d-Oy&%ZAI<#ZZdk0!DQ%Emg?)a>cpKt~p{&?xjZa%|(DJAmS<{xs|oH zO*}B!r+b&HOejrrWjQ90il?GA=ZVKFN0f5>QOBhoH1>lt^c z<;f~`#0Y=7PxsJ8IvrYQlL5tM<0a9!o^l)RAj7!5Icia)*}@v_2pP#(xF#g6=-Pxmbb$hO?H zd6@{k-r_9deY(f%X8b9eS6EE3Ua~NE(4ekWDsf%Ex`XnN%Zn~#U=2In4f;@1r*AsA7Aw@~P%TwjWbCCChkV?)&2lZq z*TgNs*4Nh&pTFn~E7caeCmZrbNwHtO znGMp8R8VUA5{sdL=yTJl$@SGG3rHd=$LcIf;xlrAfmO&aHEyVkZ^@F4Xd38-bJ!qdRL#99Dz49Ht8~pV)r!rqN1s zRb{ADk&i`UQqu3*6n5JB1$w&4YAf9FMRNIt#p1zOpPsIW^zxd|v(O-`D@Kv#&bVTb>AY`5TOF>I}Owf-Og+<4eKxDm!l2 z={9+%BfUs&L@27}sji6GJab9!yFBcJ1nG@$NPc@F?}_r48~x!O(FihUhBq=1zeqaU z6k$jo-Vsc!(lMdx$W;@|e(~t%`ptNjf~4K&4HIZ3pZ59_f zIUA0NqG7<}9ZbVdlgm}XVOwbeK<1#4B9XVRAK_SfhHGaZTp!9Ltf;WU|#M0`;&sV==1RI`uLoEs~vhBPgaBa`X5njRLXZPEqzX zM=-NWW}Q*$%A5Q2yp*OLt1F7jB}*`-?KDgnyr|=e5e3E(an`+jMX^dhT{&UK5PG~Akk{x;m1i4Eu13qxGB+5DB5n$4vXEG_JJoO|T$GOV>kC!6MK4rr z1Z6KR$?3{GZS+P+`@;YZ$?~PO7QZSm$H$F!goKMu#exx^=#6KhGGQ2td0t*AQeLVZ zN{PXB1dm;2*y?#MR}~qbBPj(p8Be(6sm%9fD#zfR6Y>*z=qrVwT^KeQ-(}@x2jh#` z5;dh*SV*Y53=EgG}T1WG9^ zc{*(0$dSoCj~dN0?p1|$xjS|>(`sgH>@h<`^2o!SCO6`2h!3|*E-!bWWy~5~X>Km3 zmexFNMs#MJm6L}33n+#$9~p|Z-8Ah?MEu3w4;by^D5#S4{6ef&Sx$LU(u84q=c$cA zmGt`jo}#}AeOcKXG3rwr3soixa}T!^e~ zq^oOGy2S)sY0hNqb)H;J^Ay=EZ)9R&x|Wd-r;H~io~+w^WGNd6R~kyBo{`7v^+GkXel)B*Jqj3cFM}OY`Ea6mm=bG0Qbh(=WA^OAqJbS#$ z#gx1h!OK%I!$!W-YlU0Oxzm)qv?_Q#>!lD93_A^an=IrQyqB)03jSKKl@EW~cw*&A zHn_~hUAVDvX(eP|IJmplKG$&C^Hc%}=`(II9xNpc4TL8)05KBJ)+s3;q|@&5&?k-V z5bYHN`o(;UG95{!N*7&wmdqk0W~&f%1Y?YY9qF$k5tUY{O@XPl%kJfnGs_+Og)s?4 zWYI;zwv#2q4F~BdO!V2A2-y=C?F#@p}i7c7ZwMs5Y-s%xX!TvK)!Z?#;f zSa#4vuwKfC$y5Yys-NlC&!`?+P=fJR&=Qr$3_C>E9n;f8I}YAu+q>D<$b5_bChw=6nLx(QrvAqm2D7d@=mNEB3oc{` zN0Lqr8FZnsL{N@q%)aJH05pS0&}M8BVV(*9uNLYL~TtcjKl$K-TWMnL_5rmoOt55|o&`d5>XaRL>b1 zW6Om#`$};mP$K|_UO+h5I^6TWvtR-G>v=`mQ;BQg1oxNw_I3rYVeKrQ>rFOOs8DpR z;DNJ{w^=JH+NCaB!UxHQ_2TLS`^??DT)OQcv;|X5-vB_al#wM>5Q}OjD2VYktG&gC z5e<-G0^@o~PWE>v{piM_&{he9=^I^_YWaoiDiU_txFz1F1st#os^<~4r~mW7iF=+q z2-AfFKZns*IcM~B6&Kz9c*`pHH{SNEBwrH81KEKE?1_Q`qzWcRBi^p_O z&(39-YHCp>4#hL1Z1@nSjBGR?{0U+a-Wj#b%?uQ2kKTpMMo&F(@?dv3hKa(0>shso zW@t~TT_w44HMvq}Y9cZ;kO>TQkZfR}KlPns`@8Q$`0phMW#Z{?QEwt%nXQB}-Xq_7^M`s48+RC53 z`*Q8mzn!;qe}1EGYKrIAiUrc;D`n)&8f6ozn*Szn=l~hkvEzWp`1YQO?)z@C=+M&P zEj=Td!J@1AXebUK`;AUEn9ioNl=h7@+87{fQS;KtE|IYm@YRq9c{0~2xz^q&M%WEf zdoYXP4w5lVwH~tZzV3mSfv5VB&TBhH4@{mJ_Kf{ zzpP0|KVa5AQMQ<828uN4@H=0CIoQ)ZSV3FpPvcx$&c$FzW<1WdVtTpIURn~gz!D~D zfDDK2W-py{4-aCd`|%~TqtEs_8Zu^E^i=#MBv;Rby@{ZoElJ4#hK2^nTD|VO{GNLc z%p>)i!6}_{oI?4t?ToMNFIN|&Ebn2oyCukk^Qjuy`rh&Gze<*un-1wo)eQEIWo%V} zUgMmNCBCQzmsRbRRZQw2S)0w6de{+ryT7PnpB>UOpcyU112H~N+g96ZXSGyJlZyV< zV9`1`%k0cRnRZv?!Ct!Uecf;7^y&0(=_$mF*Pn7;X3J!7Azer=g76!=L z1Mf`0M*a5P^WAm;TlXxK9LA(L(5)?T*Mc=yuR{LPiRa!u>;Y`@3&#=$#B~=?SxpEm?`N)C#@Kt>c~%c1w$} z)UTt70kZbMV)r&|TG@;|usDl}lsw-?ClYwAMEzouq3>I8ej*#XI)T0sZSr)snFGsn9~oqQvL+t29f#*D!DV2xQ%*+|w6Q1}Gg_-6*F+5>O( z2fG39!ILKK`BzykIU=3efh90n@FBxkm`c!v0OeuSqOX8}d2s9?S$p6^#bEd2ueNke zv&~usNO&n{Be$}cO2JV|yX7^QvjMUe?OKlaALFX8#baF7gX{_AD4}Qm&8CnPw3E{_ zzf`sFzZQ>i+n4Hba_~U^(mb*;-*UmnuaDmX5A+q=LM2byi}?b(;bRv0ineqs=3;=X znY1@?-A5+IkPtZjI!k7s$J-9aGp!I6Wbu%K*S!KDbP%z4)7$j$fY(`O=C`e(*>=9+ zPlQ80fVVEBKh;CE$~iJyiz3^MiwPlrv6j8va%_IvQq7ba-`D-Y4YM1j%Nc34eoOtf z<+G`ngOm&X$|3s8MgtlNL0|4#rsKwG^af1c_NCgRZ~noF7XXe%wZmI@gab$r6Y|8$ zp^l9Rdon~8A?S#}U^L=R%f8D*`VUeJZ(Fr{x_I{+P1?krmRVpE>9|DjY|gQva)HXG z5*_64VfChto3|;{esIrym%q@Xk$c`~nbiu|?SmmT*T_FOroP{l4`_eu5?EqC<`R(hk z?_Q_jdF-J7%uei5L(JJ&zmt-d<4%E1wS(HD&sxkH^CpXBdZ6HezjB_`b4u>--u)*1 ziH#*~&UMm7IRL9x3>JNgKCyeXop)PiW(LZ%#~;;IVedeu}glU^?g`KhOwt8vz@wZ{l zXMy%n3XF6kB zZbT9KYT;BCAQ=ffn^#Mk)il3P`_8*8yZ3HiMT@@nlY1W?f3#!L&OB(D(c_`0kpAvp zPLTcovIt8o8x4KwL3kK!TSbemedru`*?TN|fKB4Ag**W2z?5Xm$l^yO^c-s1>HC3p z^$FAfHpwlfA#>6Evrt(h7hgfqmS4D`JF zk{vs44crD*sP76fz~X1wKk&W_uz&w}xaj?sz&&3#kIlVi$Jmp@*G+tQbZ(lMdimt- zrq}3~tRh5|ct+2bWdweA1pi8!cGt?QbSY?KH+W6?l;zm;`DE?sH#`GGv{Aq}{qFGC zOSDV=V%I?fe5&Wu^rKJfE&|arQ)tylh`W|gh5Td~UeO*;xwV9gAq1c0QY2JBs)!e6 z%Q09_d*~&T$2H^+JkTXRt}9J}GkOv!Lms)QgeyfVaxPk~cx67J9qC$5%nVSqC$2%( zlwP{$tuFMAL&)sa*O`iIvDF$~h!+D?W}R$h)Ly5wcYOjAI#6bWqar)vq3+lxp>jFd6fyL!u2*4<)Ug?yZJ--=pb2p zz&-U@|J~=s)av--wl$r(-(Oz*B<$Y`T6dnAF-T; z#xT`}$Npvd%Bc*XG5&h^y3r|9P3NHmF6x0Z2hS;!RcEa&AvJ|uje3(AF{-`cQ7Bde zR83;PeN6j(z}HJ1JJe!^$=Vtx$1a}x+$ zqRFH??^>gUdPV#DFJOMor)m$8{{%ND-3PmezN8yN!e?H{U*ukoIP!FYvUM0Qv!EL8K9Qa~U&?i+}T3&Ri@Tv0%OjvJ%D@2mH^Nk2Ny{K4lF&V7CAF6W+m z?^(V_L?+&C02+Mkse$d?7r%)uv>i4@-e_1}GyHZ~ex65p_y{;%n z&QwzRnTDa}2UQC`Z3O*l?~*T6Z`jl z<|lZd?{F=gzx>xVH$~4fE``lS2TR6`gGio6Cqz`BVLZ9FXU`$9=Ztk{pXOd(o`vnp zVi*frv_)Fki6BWrZDLA%TbS? zQXw>3myIjk^BS&G!0vfw%h>4jiZ()R{`vkBw{Dy0{^l8I7pTJB;KH93wQ2^1$LDjU zNF<)m*(?m1`aU$2m`qNis5N=)z8!<)e~!zg-IL$P1Pc%U+M1C!4}Es@!0;`STAz-y zDROEGg&on|{g^`j&09}t^ah%(`UB~#Ddogkh z@+@%3l>AnVWZ)5_^oFoGt9KXOv%G9gzkq2JHId`YPY}#CerO#Ty%j*2A9;a$h@-l) zAQgpDrfi}-)k47^&Ub3oUZ?ipJp<_VvkuDFeRk%G^?S)%Ke}UkckNGk$-f9Z`7Itc zPz{aK=8LpDR+~G(ay$W>xq=E1f`(w(+O6NZrThKo!DXj&fddrfr>o|-wi|da&s54f zjUz!R$&D{^BDa!EPCcVUfE@=${PK$&3(o?FC(2Kg(qv`)v~4;*W7dXKbFBhD<-hsG zmhmxh8;O1C1pyV={!7ki?_A(;Jo&!F4HTQD(lORfMavq?yqdUvyJhc~n7m|19q&H; zTPzvCUl%69gP)aIYqFjL;Ji5i=X=h8N_n6B6~-eX_bTO)9w_pzUt>ISUT3|1&EU_5 zJ|lVi$Tg!=1JXXjFsa?Yc`FxX8OG0O7N+nsJg!96nXZRv=X5$BouTF_otmWnhMy6U z$&pcc&j_}ay!3SXGII6z`i1h#{Eh1G+>Oe$@EU4oRl)l8bXHwYxknWdA`@L}o-m1rg554AbEYfI4}fpGFye+e9vmbmuSpT5(O{T%I9gEU%l2egO+Nk# zx*;MH>MK9$neeuEcl{1?fx`hMZUtd*7t_%kqhz9bZ#Ac7v)pZda&#q?P(RmB64*-R z-PoVG3!Hm_!#(Bu;LEjo1L{ZZPH1}^w(Lfo47Eae*2Wcm$9oxI)Y}Hw4NR|~ zz(&?cMqsg24SV`OJ5*fz%;0hECHen2{lzTnui3ef!P-#7RgJ8rrm*D6fA&i!M^{qG z9)Eh0z-A}wx(1}^b9h0E2Q_aEXh%~8Cl%5)bB(Ye7OCY(f1h;kMiH5u8f&S@6PHRi zbenxryvYL#Y7CnPyi*{e&O}=pDPz$b(|XD@_u|9tY9*Px@`Ihiv;G4TjzwtUGW3Ek zzv#4U>jie24teI(p1Qg~lT(9WAtGb)gSg1PBe$cwZ=Dq7WUpJ`P(FDJWLw=)`)Q`h z*s66_pPto{TZg2RV`4HnY05ad8`et!jYOMVvkVgsH%YGtmM^qi7>XA}NHL`H1$%S$HC&ux(&M81Hv?aD`(Xb)hG zGcefjC=URuNh;mDWwlmvWb3P2dBnHf*ULu9DXH{aI2-F_(!0jWwtzK+N-5K`W!e(6 z=g7k{>AsC3Dya>Gmx|clwN;9!{t}SQJ1`6Y=`MmGBWKA4`(L6>Hf@u_^tx&*IllGH z{}@C{z3CWCBGUDH)+}c?lx!T399O=VLA`MpRRF$XhLsY6xrID3Asqwo-D;n3rb-pL zzj&UMOl?2s4BWh3de^u}ym_eymii9q_^P5Wg!u2;B}HXzpqF~v$Z7!A)l3O6@qma= zP+ae1-s+6mPk zS-5=J3@MT!h*tX2bBGpse8-;c-5*~HnZ_XwoJ!#kFV_`uKON4_)YTfBJ7SNK>-T_# zh)j-r@P>V4_buniyT9HeHA%Jurc%(k7IR!X&o;7+y52fh_5h{krF~!^B6BD;y%Zw= z9q$JNsBPUc3l)Ims#G1(c{X(+tBI+I{Q{^!5t*EN5l6=pJ3RfUAwRT*Jn`iE{_bNJ zNP7>mtCyMSk>uHC=5p*z0fEcv5;=acbTa{-&gQY#HN{MCyM%n`<}pB}PfB~Yo2!;5 zhVi#;6r-&8oNiar7|H{>{X%YTSCYxe7rnhJ!?rGak<=v_OB7RaE$gudoY^2XZ=da% z6v@38OGh_~n)r$loc*TTcL`1f*od!K*2kh5+R!j*qlQ;v=>Z zdSqgxZ^N%QJhkEB4R>$2Z9~0>fOF}FEyJ%4zp$1a{?_n=!yk}*Z20Ek(r|G2s=kro zeZ!;c|9kzj>%YAIzV&4NVadDJXV!bxYu4{s`^oj|hh7=_(a`Ckdxvfxx?w0en+QY3%KG!e~>Kt;OJ%dHPJ+$}ozG-kbJULorV>$Okv6bE=e@YTIdj zAeIh$jq%_H{`+h*r=-%wd3`iuZ-rqX`x76@n4Y7v41KshUkj9GvNM7I=0Bfy>GFum ztx;A-#9(%40y6&djN4|i7|QWd$e+{Z{Ct+D+B+BbQ2wN`Sjf2SaZlPG=eamE2exLVY)$xJ2YtIW1$?HT`JJ}p$8@n-dm**{;7>wUB}r<&n|&(#@c zVwRq7&eBHjoV(@Dc{@C#0E2KlccnC+b+GEFPU{gm6i@i0j4#*-m8~&{w-s}LoBuvW zql#Ol8uiWQ;;l$Rn)+qzCLq-Jui-|~OpLwz4AoUY7ztT~1YHsR44 z)FHO%tohOzzpGJ=R#=CSqmYHko2_f~{scU1)~IrXN8V9qGpMbb4VzGq(POru0@H{1 zh_Gy^(`=R-s>5ZYjtb7_CwKEdn+^J+bUmYYQqxSr7om6jkMO;>gj+2W_L@EAd9Uj7 zKMS9mlx@amb}}eJ+L$w{CZFW#nReVuM_Hd%--v6AYU=U}1$w>Xq_Wd-I#~3gN^O4p za8YQOt9z(UGFvs5^j?oXy;tZ@#$hnfl|pMKSoP5}_Uyhd^Zm(Ko3TbJL+gq#pX#(z zA%RR~ozwncqZKXa7;{W5MAN1nx)|%rMLQ`Vf<<)si$?j+Q;oyHI5QLXGxoe*Gn?K1 z5Z{|rLxVk$Fy?3VDt(AaU;0;pUbm*0WYgwy`aRP#+N>%i@R?3BKD}9+t2=56ZSqP! zlUbc&+g6~Iz$-YfE+jqKOWw+}Np^w^?abt&LB(O8+mvL_KPEJ^5w;x7M%x~RSzXf? zBwytDC+oF(+iO=)#<@l&p}klL`%P5Z4oXdT;Is*-KY~jcajYo1K#QBNIYbrg~0g)a(R-~cspim z#gM3R#ZP%Q@i`~O)@H5xye`nzm>8W~pqpzMCPCsBg&!qB3cPx=XQfP|R@xL35CsLj?<>-_RwHkF; zy;F#hj9QSJp(#u&EAf(pE||0Y=aIH)x?GId{rYyI9;F9`oSjIssHc@aO}N_D8|N#z zO+NltBPDZ(XrqwFMy}3r7 z?&mQ|)L|{so-*<9Y`CFJMWV`n;d54xB64O-53R^ltMs0uJUx^&X&4(tX-&wCu)0)l zm=NeF|H>9jp>`~-Lxtg@?88DBb||hWGWuZ5M0+}=LaZPW1UzI9=aHL06|9cAjz!5{ zA&6AS7V(>>6J=km&`hDG=G*w;hNw`$pNmu?jm})!kysz)$-#y$Tg+C&ew8UWQ^{Zc zcfL2la%P4;>~l4ZN=+v)9f)7`4dHudfu-#}UAPkp&gRt0XZaIoWeKdo9XyvntEFHn zE^o{MO;m}pDk0M#(5NC_!HF7eg{nI?lQ-=VzAw$SnHgh@O$Y0Vkm_*yjeN+qI^a<2 z8Pgg;Qms&vai)lG#|KI%pW3g1hAAwTa|OqZQSceG}vRet_+e=4nq znl_=v7F~orWn)P|KmVJ+N261kW1;D?MS*hR)R@4>uP7Q>wy91ch&U6R&R+OCo{cX%SEc8C zC6%G*HM{)O6@OZytLJHU&U=`Sd7`-)qjH_le{pQW;5&ss@Gu>w6H_@@O)6W|C)I*1 z`%D@gtyWoP%}RUD>sKnL8efxz!aJoE9n|5h^Hl;RH zPp%Ob-s3Q2BW|7E+?tM?!`e|H=-WM8Gtwwlo6sd}?NC8`xp04R$9y$9pU6kmF@N4> zqZuI>-0etMn959JF7D3QDDz=zE1xZ>c2jtTV@F5qj4PRNr_^is1#>klo^+#SnVnV4 zxh%yUU*)^$im`RtXi@|HuuUPmMfo{_?u^Y-X$O-B%t|?2%-e;$3YW%Fp*ogAG?mO{ zL&cc-L1F$~bcL!QBBaVPu0Sz8bcW~S^vy-+nTp2k)6JBf4dv$F3v_n|-t_rGzU2$H z^UBP+Ukh}dH^zqTKDE6EEaAKFq$_i#XuWDJ7b?>c>e3OO?5MfQq4vD-aNXRh zt0~o$n|L;kVveEQCBwWTKW%lRCap@KN3sgKP@+N(->fq4PVYG(@L7qnF&GiZc9h#; z=Neg?fkDO4Hwk$v4ok>IF(zYFiMkv01f%%E2#-Knq#+|fU z@3t8=jk3$CF$=rJeweiuD0L<6buaylWsnx|Xa{urA{J0f%?>uQ!`Z`{F8kTp~E zs;X(rVYZS=IYUadaKp258MV2Bw`NbZXOjj-$>U$CElInYF}LSbGk#at?M!Vt&hxSO z!&x8`dR%dTsO4ra5R&IC-eQH(DjGSfR;6j{wQHyO?pX9{BNHja;>A!SlV{ai4+~;t z(WYutGCiYe=w{vi6t%4-{DH<|ph|u<>sKgSDQDuqwD7x1Tp}osFYk-GBW2Y^KNdcx zXVQ$yQbCH3&8$nZ`!hVcO+gc*M_SeOfS^pOsA!JWeQ zUUh=eyUJV=Af0lk_Vf8GYSU~GwWk%)xfZY%YU(VCSMz^hnz89j zTE(czk*mS&@yozX)J7!FqMDqi@9vG=-Iv421V5>9*`JoR%)|}mIddHqbo7zgH0e{r zNWPLv#>uz$k?YpWC%R3wv==`xy=>IUR1LlY>x>4%9*w{3@hbUY%`xbRsEtq|Cyec; zp`G3DF)$8ow}A`qY%04ez7pZ1fNZ$Oy&T}sYc6W3Bi6}Oe*aKx=j_8D!nyl zPGz~3l9CTzAsrhNw~~N0 zVtEmgivRNiY1;^g82Ig#uG)%nc=@v;*9ORkrllLuF<7Tdfo2q8q_7$TBF0O*aCboo zP*|u}Z|$DBtb>5QTP@P@tz4+B+plXmfsh~Z7qj?VykUa{l>da~eYI9{-3v#TV^I;< z_lBcGOJ?jyCy9|DCa~jFIL%IF)SpGQrT|LOay#h}n{?Bb)jr@NrYM*uhqs|1sPtTr z;Wyi1#1=1aZ|S*$pwjWzEqzz=w~M?IqS*4C7&+f14Z)i4#XNb@Eia8lL;)>b6XS07 z#Agyku$5;;hOPcFkr?j!$0co+4ci{+`i)b=?-+>=j7tiGKOK6o?@e5UuAlScbF~S0 z2X!Z)wgR0_pDecXv1wzAtPR2TDWan60csPEZI`Vhj}IUptQq2ThHHVVCBX0Ybe4(L zs9eCT25M_Vr&p0%yx5r{GTCzhv+sn{Hbm}UT#o=KFSo&+3xM5U@^V)zO$XD-sH{}W zKc||e$rTJCYl&ckPjJ--_~8VNtjkpKRjGu!=4d)Hsin-)4P~X}i2BWnsG9eq9J>Y@RMd9+_#Y8GFmm4Z?n~Ejv*BKF zE_bHgL2f4%$SWLk>PW=q$_eh6DA;~tQq`y-&I2o4Ih&n8Q47f#*yo|z>-|= zBn;sv_!vr8q!uk zTz1vBt3_2y*R%!#mYOE%iji#@>E6+mRN}n{S&EO}4ZqWE8O}{(UxiU81<8#sos#7j6ku{Z>D>G%vlrXx3@foj%tZTxJB_fm4U;Wv> z?sZM+o4F0jfp76YAIjBdZFI9{Q8bFdQr)X1@2Wva#AM>#e*g}r(SgA(YWxPcNxgP? zQX`?7Hvyll#!ziXYTgq0aZ7r^MiG@r<{6<t6#Q~E z=3n2y--}*D^y=ibFmcB<=DA2p-%`!T$;Ug~f~+JXBkOliR}{d+wqMVQse9qz@{%Z1 z(}_H5(l+Pj)y70(n%Hl|Q6i!e>H}?LdW`JvCojKqhqU|XjZ#Z59kwy}gFZ&m82a#t zd0=pKJEvu??P-}bet_39wfR<|PK6j}W;Wg`u?m(X7cp2dnVfpHe{U~pg}nOAo-4?w z{=7wqEaGq8$2hIyUf`0M`AC+$$C*Td+Ih9ENzIfxUY3)FExXketD!Zo-K-3v@5pJ% z=6$`owcWSAojZoO+-5#ni`Aj@CvbBL&Qz&vRprPXM{tU)q>|&GJS+sN^uLXBN!k`( z%WhVSY{BHYcYwi4DwlW4#VKv;&fLNs9j*l~*|NT_ulQB`707)v zbiTNaoXI|T5qZLZ?~WX7IRKduoiXjb3?xPPMkraHZuOg zr}#j>E&~1hoLc6R&Uv-0$jk$ZR;>s*!?2kcgBrd=*WUy_qBcY(-#yuV{3a<9UtZ7Mnv{&q);{0m$ex89EKiQ35V&7Xx*;5_`T z+xh6A68gwT2NfMU3ro=e$1=u(Iz4JCU2+`TNJQq#DZNY$%DeAB&asFrRF>a?PJbZR zrnGZ&E~UDian}>%KmQplL}YU0rXM3t`t%nky52jW8pkxWGu2jVJ1S$N!5CSZAHcUy zU;v^fa%SJbE4!BvX&Cv+tdUjHa|Ls*Q7DPuQWG$&OnItK{7duf*Cda?|Mo0Ih_e#0qzzbYPHy^!Ztk%NmYObklrQ7v3 zs%{6S3V zrr4UbpB*iXY#+XPO>F3;!Mg{}NW=F&A{`S;L-&=z8&TQk!ym%~1tlNbsN#!iv;i7< zR(V+N7$+UXBZu1z`|m{<(CVL%GhdJWZ=p7uwnn%RBEPqZ+EI)vgcPE@v+e2xbL8HS z&W@{Nh6+o0g$Od zyo2#Dq+Q4dL$PGMg|C0ZTs<~hujfjsH(a(`$tX0+11hbOJ}a=%x$2*yM);0@T-Ry& zfyPB1UAJa*$KYp1bVKi!T-X2O;dI|lBy498?5AC5LaFfQUN|}DPSg6JdwyC~m?<+^ za?e8;pNLFO{~pKD%g^i@Apg2JzKQJm&4rf{&%@IDd4tp5N2I&JwX@8%VvZ!{sH!^> znN{UYvkXNxb-`6cCPyT=0&yXrs~)DuKMStm1)viwMOd0xBe3Y_^9gIbFzw4`$Tbgu zYkMV`jDKxmANkPt&!6Z%@c^d)!wbm87g*>FdaIlEv7TIR+NY$AS)zUrEJS1?x$ioP zJVAY7tow-v@lwHQ!$Aq~r%gGnv}T#Q3q^mXla*{T&e=8O0-_mw7@R$jnASlA~K+E_o>KpH{8CV`=-w!HVDy0z*-Pk za>w7dXO#Tgm(CeeIPzsFD!3g*Vuz3|C|VON)uUfN$5IK2f_Hya ziac^;RC5L+1eO408U@W^J}RN)@8+*bC%3HDNXEaIJ$A05ZN1I?b?GL#+wTPq^E8Tk zTU!x-Hisn69Lfrlk9{3%S8F71-TJIQIrbK8kw*;l0AWTcM$CF(#y7?Zv87T?{ki!$0O8FCsE|MK-aIPp_8$ zgnM+@7A4@p1NhV`2^)g0Qie_}-%+y$LVX{m*w#}x=tNEA^f$SX><3N#U1a$ogU`FT z7Hs&Z`s>iykjR540Pqc0B%z2uBh>!`9!M`+Q}SKz4)0vx5GMFLc!9C&ot0(@;hla> zE}h|6PL8gmlGD2X6vbH%bQ@1gujWR%2CR5c5ZhcVr$aTYdZUx9M-ri4@5uD`ak&#U z@m1To>`(Ikfy9RHC%-S%aMoix&oWNx1bH^hwl4yk9v_h}-<-GvIUn z8W?@9U!HsWtPA0r%66yj?j$>jmWI0n$;hE+r5ne@ZRC~9EHHE24tv>S&*ECSslBGp zHZU>x;_w1;e6N+Xhd$4}9Aij)axQX-{CsB>ZF6IW3Ylncz?P?z33B`l`r3S6IzGCx ziAc&ojOyj=J^ehoy4|tZ2jpp?YS@Kf1v`G)t%`VW&-=2%Vo*Td8KL41r79#exE|;^%l(SxCPQ^{b zT_Omlo z&A;R}t!r^;c^(|@a;j*8`NU|^L~F3V^p?Z=0z^mDL{8lX2pBG#vwP1A*kD)>U^@uI z30YaIX4csXI_+Vr-NbGE&1CD(rJF}rwvgi&2cPJ>m=hfi1M0Fx-0yET^#CNoM&PtC;h-*OYO{5(E-lE;-_Ti68}U93OU-w# zU$$ov8j2&g!<0!RGg+ei1LSfgm7F}eaq_I( z;4EfBI+`-oV45iW6uJ=$mOW>d&E0msMIJ;#H-R) zViqS85&3^6x?EqZ(&{|oqt z+DL61?*2W?!0x|-4=-nH4z2-6#smkFvF6|)={K+aH1`rU+;LEL-neIFF)CZ;j<#%a zbS3q~dw#M{cseH5%G_lAfNW$do@ZIWw*XNCzBhja?k+F6XCD7$Oi;8A2cOv0V7O)Knize!6T8I-|6Dk66!Hy(s@tM`z)Ye*K68v!Xp zqYgRVvM7d&Jbm~Ak*7g6t(PI(f3-#;>HESz#)J@_O6##Lue^B=>h#J{#G{F)V+R-% z9k|XEk&qYYJf3wds>tbd<|X0^;&F7VYp zcN)o&3$6dB*%>4gBakGKOfSj1V??&PybCYk#~0SYJ2@(|3u&I$uNmJ2m7IP>`dSL{UxcWK z^JTETh8DMCyC3eU*Oj8q0>yMuDD1biPtrTK7crs}oPZaV0$C5cIjA*`g5*v-&Yy#)KuNHGYL zcG`&=h7Nnj*R17Oi%%ssIZ!lnK&#X$HD_JR4Whq-J${sjFXYqRkIH47J8Y3da^PRW zwN@nRq`X;OxT*-v2Iq?8GZQl8Fs~$&*nk1n#Ef)%_u}m`IDo|4T}$4%V-+nxPT6W# zc3<5gvo9U0NJKw4IyLl}fi1(g4E_ws=tk~Pjo?sqFYZ}Z@;)6>KxnnK(Y>G^7& z9AeNb5t;1qed6p4?WY(StkaG~4w-;=Y}NfH({fAiSlo?2 z=5JI?CeyNOJ^5IWu~(9b1fi8!`ju4FaCr%LRxXqGT}m0it=x;yGs1D#X56S~z?zjh zM=TwoaT~w)GW@)VOwK$r4&1?efyT1qa&8h_i|2y{FUCGIT}iX5qL*zY=i4=phV-ks z$y`Y$Cm8_CASW4SYqgAX7cAoKEU++U@+fB+HJUvsO*BK77~;4JEJS4F#qJg|-5i{r^4qmA=bH4h`Qh^e>!PC3|-@E=iuht5pIur;(xn9?8<_cqg4CNf(A8 zA|uQ4)yXbW#QT=~&~8pEX%_c`5ud_tt|Z$m9nt0-6<;IdifOp>WpYeRCb8d1_V#j( z$#r(wuX!C;amaSz;?AYr^D+_+*eXW4lrEcDqdjQT)BIs|)Bw#aY9o?M*7pz(w{`!^ zfYEPvF7AV@@#}0fGYP}IcRJs;B-_(5^0G}PB@gJpMci_Fj|TVM7uHU6H|sfRxo+`d z^oF;+Ya>~frYUXMns8)t3R9LCOc3z^vRAxiyX27|L4(~BS6u9-!!9v z?LHeM`_0&JucMy4IOOc!YnCDJn9_NJDau$VY3u;1_Zf?1#EKsjlgY_n5l45yDl!}I4w+RVQId;XvRx-UvbiyT z6Ojliw>K2PFU6fp}!&=dEZ0blS{*!Rl3V*`=edoM&JnX}TE0Xe}!nh}f6J&lmQR$?6KeI$FX16Z z{WB$3$J=(&9GF-HS=Ujpj8McL1*_Ft0SI&L5+0)b8rj%Z3==m$I89KCjI-D~^9UUC z2NXnctqhQIXDgW1KkdFNTSNrfx@%?QSZxfbX8{Z_5#%wUavBDk>2S>U%Fof-J#yJc zj!Vd^hh)Q>jBAGed30z0Gb4t|4vlSzX%GO%&vq*G*=v!#qvv@>#X7tx={r zS@QKPbd!ioBsZE~3o3d26LO#YLSoO$&fm^qLA<4RgUUGrGa7n2S4oFv%F1xDNHhsB z7LgIXR~JG?KbepPB&+U@$yGK6Z>9gIlnma&nXoz-X0lav+ODz07{p)xCXJsGk-7Lw zz$e_cV?#Hd!OdWYZ}Af7k9M!ODK?Wav5IWMnXSZwT3v6+NFyd2-6(1zF~{fj^2mr! z#5gwoMFj`zh-ZM+psYAeK}}0lrBp5Jj6qEnZFgs(ywOn4a?_RFCyFuz+8$cG^fgsj3ea(-(NIdDxQMTiBHA)01Hq7IQ_0E8 zjso7Gj6a66XKfb-`kljXUvu5i?*{MUU6K}ZZ58)-(RyJSZ>XMQ83prtdRBJLDogUz z?CY1LizNX>!sqL<=vHT5kIIFpuh`)-=@GpdvK69!q~pJFUUtEj)ml&Vy<4zMkA35h z8_B=T%k<|kPj6^Iq0K60Dmq4|3F~M;-DhW5@@NBH5|PQNFK*a(wma^_EhsWPVNtZv z$pX?A_6A%I zUoW3axVGotC<|?M`Aq<}%^+*SmUa4zd6ck3?Zu3OlW^$TRa=2{F#C_+iXqt@C*CR> z+;r2L(S7}Y9kBx=>W9Ns$xTE5#@(X|JzWKulqH*2aK6%^ZAdZ;8=Gl&RYNA;jui~A zBooR!y?l@26w~|OA=|k_wWz`l;opgQ#@)5gUwRmds5D%$ZYbOj}1NS=HMC;Ew-a0L>z^! z;U*a>n}!#G;38OboN22!gWA*DgpPKkot7l|$PtWAL?+%pD)y0T>g4wB_P5Dk6w)jL z!9}=~pbiYs>}C>4TZrx?iq<$ebTcj`uOkbW5*2y&sO)^0rvTt0n5Qzc=IJ~ej#f-I zC!bm1@s`^# zAEGt@?8L%p^Kel!sT!aoD?WIV-qP6BA6xjqBebN@Kgop~!IxMZxf8BMCHCi&Bd|2k@7(oUFMxy1wDz!g!j#U!wZi%}%!*n%Q{0Q-d^O5m!pWa=L5@YPyRJby1k#=4)JAfLYHoEv=jBhYT*6;hGUe`J+~ z>%NlSird-UACraUQDXr}%~qw$&uQ8Wu%O`&HQLCgdu5Zd)f@kzr;XER<3}~nXPlnl z>aW6W89*F=q!l$si*Bg_tHH}&F`*uA`3qMOP>maQTu#Z(JfViqNL^vQOy z)LGFT2JuJav}0^PaoS~nBOl_l)A~oDowSP_h6x{~p$UXTN+x5AG-gbhT-x8$PLmr& zWJ1kdyPOEb@$o*=({jLg5wu*5DHU=|TbcCOr=6*WKTEE75P~lv6Un|e3lS9eKgiuo zLW`F#gI*ih=~|W2`SeCqoAIlCWLp;;L{u_<(Up6lBDZ%Jx?ljS5eE{(Ta7BXP-o~^ zs2p-dT+KizL$VKmgNRIyKR*H7>-EDE-T!z1?@U-m^w9nMtJf7Xz@z7yrG2fcuI5vb z6Q^+at)z11D?IkU-zV!1eHx|}Xg6TX2pTeNZBCadd#I$HZBXrmrAYq!v*?3}Oin+t z?oHj?=eP@EVDSn}L0|8J=n98z#&Wiz1VBN3wn&r3Z(}n=9))R7)YJ=yBTszuwt?&)FId)E7VJre6PL zY--UgVsan(^6HbjbUC@}tI%Z54$_V~`cf1rLx|>3xbg`^ak;oIP0ChpL?wVj|J%;x zu4h*-UC)qwM7xX`ykE1p06CQ|copzlO>+1t*gHP|b=gKPKk4;IXccJx(G){6xZltffKI1{OwfS zO5XL3B#>y=MOx>$GM^N#X5+W68Gf7O)`0n}E3 zaXIOlsWfM{nsg>Rkf@%;5hNzVclw214%-%TUvBSZFr=7BSxag5&jV`#AOB69463s%CF z(=?a>P|NZ`k0P$glQ%pKJ|Z$XGyLLYPyd{F8oL)(QRG4jw#3AIvcpn_WUj8ADfumF zhWzW39EX);a^|)roU5JRXMu_2A3bqfY7sf3c_UUvVNHX@xawoXb8{AB5T@jfHFXuRew zC$eRvp|~DNpt^kNy`-HBO_q ziRTRK>}22*{tJm%LrYv{=DyJUKj_ zQMiprqdWP~7dMk1{7g2^LGQo*ldk0Ve>{e?!(VVlA3tnXdDH+fPiIk#pcpkGuh@@n z^>};*pTHKi+9zlAhPQ2PI%-+cTriO-qJC=!wb{6_($P{7FKwU*_7?4tU!h~Geu418 zD(+#wKDXxjHB`1}y_aOc@!~mTVF?ZYx6s>eGZYpU6UMt%)CdegBWKJDkUdZ1DEZKD zag?m~1v&D==eGV|bl0YnYu2q9J~?n;WUlWT$;r{_q3?G0JZ`%MZbS7Vmz>92)g8Fh z(5gZ@c`zOFdOL zib1;*POYLH0+vyXTsI&`eX~CK_(oA1IVI8c(gwG7CH-;(u&EcF%bV3>LI`}-rz=$T zxmg5xQ0wITHolI?!oS}OM!9>Pyyr%;FEf~#H`o}bOFLf%Mo2N9@AYH1LaR}$&e|>p z(P!lJGh^@#JvF$Ud~sC%Dz8xgYomO}j+^X@Ghi;@OwTacy3Nx}hLf#nRNi@Vt9&zg zLL%QhI=!NWt5Pw^>7#Yzy6)(vu41j+D4B39cQU5TYn3yKO2$-y)3mPTCu?FoCQHEdL(}>SNpO&l+6;7 z4X;^l+ky2HwIOHWQ-~tlA-_(tJqQN;!g(B8yN_u`ok~SMW@yBe}&{imy0Yvg3nFJ$46H-5y?#@F5+o>cVfGo!!BO*feAmI*-A`h&(C{&u5h8m zh7fwlor;HcVH!kDKY^`J~a3MDg1?fr zYZYmwzes0@{Qv}TC6%0d($w?4@8~{$Kn}2IcvZPfMSjIntzx>$I>PE)nXOeQ2d}a} zxJSNuqo|3TeEuE0o0+TnC;QABFkDE_o0p|0Rf_;ftfelr+|k*VH=-dQxftUSkpXA^ zb-~p#I9_xPd0&GP{&$Y_}m`oPqYRVUh zdFz=@C#U24^0Nyu8=@wn`wC+I5U?@PHDAQdglmyY9_8i7XLJ-oOjtEDU2-StEn}Lj z-H(|Nkx>HWUj%n|eLq+Tu4wg|p&R>uGWbb}x^EbW)ym-+&fRl8t!?a5^hx{{e`Gi6mZ?x<&DYy%k#D*4_qF_|2B7R4%dUjp2X zE7ce*rkzWW=dT2mszfXkL80MwUu%Suj~J&Rm2 zA+Nt&1#7;+lq2p=iE-!~E{eQggLxN`VOF5eE*LPX<;397B3HGQcS28VskTX_Rc9KO zlG_)`k?Lh&BchT$Kc9DYe|MQ2KIo=uE~cb2v&Ct@+8kn ziL)cN$R#iGnTPhMCBRV8x@*RgjkMb|znG4zumxV%B#8{$x}UvD?vN-q_ea)jcyPnk z;p+j~svG(+uvqhh-`bcM{qpEV=iLTC*qK4a!0rA2-5=?Dq;I$6XANBq~ocW21T10^)hGr0IOoinS0DU=bcOaJiE`O zSTUE#Rp#f&r{1;oB364SsZ=BMgN{w96k6>RtBotCv}{~GmDZw!wKlHNC@^AST3GD? zl~Qr%E5DXVc9HwNm%P?_m4IrtDm9giB{f=li8HM|fD*QMQaa4gHkFcnO$?Rlvp9bcoRz9W zlr|YtvuVW?qe^O~*rY-`rP0JvQ_6TEsf??VtO}*tg}Dc3no()V=}%4W{0E#be^0N^ zniyECAnOWBnV4eL8g@zxXYdpzBOXsE;tCa;T;{AkKxr8gyW6pIf;xAff5>yD6pRA3 zY$^0qi#}7>n{k?nLmU;cR64H0Zd#T^T6F+h@qMrSRkCaHoQ%&Bmk>F9_vD2%6@$E} z8TAxHD^d{2B=#typr=x4ngPZl13Z~!9e`LuOzfRcp5a9D?{`hUChTWVJ{f->rbT%u zp;V<~S|&NAPBTye*sf44aR_?~lM+iZ8U+I|PF}mv5OxLT`@#3_B!9bW@-^kMg7I_5 z!B~4pl~5*>admtuj*U3Q#u$1^i@iTZQ88N0FbNfgzr>hT9YArwJE)&^6)11B6 z&+b0yg0WI_NTEgqq=wZ_X;Un^9E-=Npwg)+MN-Q!$^;uzr*gETU&N}W=2zst)9gVTp%=sQnJ z!5JUDwv1=}$a2s5%lW1?l1)h3SN4B(_~76@LvLIAYwiI2%dVROiv=9Ye5!rYHk-6E z7EL>$w8uMUm5R6B7!Z@AwLtmKJ1M6d_ADKFd>RG_5fxA|&*N@<_ikyIHOrlx z#{|A(|AUH|2a9zr&(-kkixhExWZ^m~_uJK!`pgy@FX|xAtxCZnDaecv@Fw zRBF0e>R6nuEJ~l}$+2tYGIGo&AKfTw!*CW+eC*b~9o^s9G0J&OR(3-!U}TgaON@-5QUnyuu_MAJ%61?1;S!59w8IUfa{x`K~F zv|JAI`5;ClqV^V1sF!hfSdK874ifh}t^#U?FcGe(sIgc?@LsMb6J&oxj;f-oeS+eG z{Sp2m$?EEM9(FoRS5pJWNk)D5IfE}=P&Y_{PTJF_!h3Xjrard@}Lu7dIkA8 zv#kpld?KYmS>&3cWU0GSsNj<#PsXvN&Z2y5qo@u3Y{gRjo?T@*?C$mDnlGuwZCg&kBZ348MUh$^k+Nr^Cz0ikqe?dB5a?})NmGyn#e21 zZ+TN!Hj9TgY&$@Y5Ns9xnMON6>6^7mE9Fs@)hW)?1Tc`5WTJcFivY{us>I&jgt-GO zfY>0gC{DMFO4e_fH>x`BaC4U7CJ7)uE6L>Kho)fOMm{-LHCERB;ylO4y~rVK@HU{3 zC2nuA;j|*`VoJfNFGmi~$@gv)kx6ayH({dWO4GbN$Jw4kiyWK=Un)$zqxhXi9`DFe zKTxzQ$*GR(%I>b~xfuy9&Mos03F(pmhi=5AirRVt%$?}lx)0tc_x9lb&Pa|7JurOJ z=%pi}fw8_TIicd<|1^tSE;#Sl(fBfc3sp4F)!9-$+e{@$Y7rAAB9oJs4!}Ni!MfK~ z{Oh@q|Ld3>{%H3xE-9a%zxle$ILk&{Peev~&DSPLuTrt}ZMam8 zN9%20oOV?rPD9qhm}r*F--OGROl$?S_@Vcfm zPs(sngh#oXxP>#sdXKFEAKstAmi=iH9ndt=UYFaObkbz{W(-b5#$EGk`??>xS)NDS zx4qf~sIt-NEOw%1HA0=Yza5t}F`1m1H(W@r{v~SJzw7PrT`cGB^l3)ILk}Q>=hDGv zhi@Jj=46P=-O(K5a?5!ca!n^)NxD33Fqh~;pq?y}3WL#jH>X56lVCq6f)%~4!uP=ahFnH=A=iJK7t z;q>|2IS-)cSpV|0xI$%xfi?##oeF9+S*Me|)!L23B3gY`a*RRr9f>{pE5RkGcpu(j z6YG{a2C|NVmquBUN;?oTBo*Xj4X?0E3C1UCBI7sbCc7vR{pKYJ>s7yfXn3JdKln>j zCzVNRoP=>nht6YMqCIa*H>k=^4WsnvmquKiwa^SO_4iT3>b(^cB1 zpsKT>N-CDfCH-oWxEotZOhz^GK1@^!37Jpdjjgo9d2HkIKvb@DE628d?U1Ly6iXJe z?xWm$WhE7LuwUvqK(=)|ALXS0N$o-}97S*3M4RRfrbgb;(g1Sf`cI-4VlrO@y9X-z z@+UEpiSw|p1kY+{-qGsJ(Ur2*6^uJ*^6`&jE;}o!P>_!Sx#dS&wsv=XqNf{=af$xC zZd7VL_B@@iTSrnPB*z2&M`N;t%A56btA zuB5`O^KK3Sb8GjZ2YC^fEsI7YUoev=}x1nujf-5vgb4>IV;Iz&o{2eWtoGkeD`Uv*bz8}GWCMl z$zrEc!RaPVHKu)DFG^Z|`pfA0N-9^;5+1#;AKBjB_Z2yEDPqUC^kv?;Rx9Ct#MVl9 z5XMZ?bR$J>{VEnpOy(1*hQG!cjXL?1-au*8&KeU^r9$O6DSsW^7LkcA@QSnh($~4a zKuN4tfMU|~iBiX0@_P!z_f7nWn9LWW{oXgZKLJjb%SWjz^VN2Bu9;F6i00e)6ET_p zlh1t{=D1DSHKQZIU)w*VT9Y08P`_{O=Q#_3XXih8kH(gRfmg07*7|KvtiIMuDXHI; zAC%(}NudmFlYc&Y5k?3253`LNc|tDT2S*vpob?W0{bSrwt`$;J6HlG5 zRlfkveEuJ&ay>0Sxi#WXbWr}4MT#!U2AGiD0W6Tbi6N3d%H1cWFcGh8tT1<{}g za#0gNTNDv4B8n)B0)mKua@`R`Tu||QtE*5sICUYB%?Ck-sR-b}0dWItw3(A3$M@aNu3fdm+`x7g4Zb)tDYSvrhi=82 z0XJj$f#}LkfMy1QGoeMKdvS(I_gJe6I(k!l{_dq~vjTMKUSaQ%muC7=|I(Zv9einK zWXf(Vkrpf*uHy!*pl?wrbnI=$a`h4@V7xN)@=cQvTl4@9L7uT!X3ksVBzo$VbxtB~ zQGfGSGw06$oi76!113~}9)Njd43%Io>HP4#gz;sakd|p#t2T1{b{IpGHzpx(=hb!B z^vM5$87F8Y6*j_U*2I-j$|-ITouAnbJ~Bdn!roEw>Y*J&Vyyi{C3y%iQh&pkRsmZI zpg$qg2271vXBx~oDKI-pnC7O@DZibWm|3R^dfE7q^$c2X{FYhROfsTd0ahYNUvfi; zdkV6Vf$11o&lYY*5BzRseA8N0(1QoBSw;^0{pI86^xw~{m!f$1_cIJ=BE*+)povCt zR9+%m>S(c5i#HYUg_HjQPEww@^M&K~_qNxVL4XVX= zOS#RIBG$wMVHvvmU!WnZmLkD(&vrgtLUiF7XPki!UM&1F5`PcKZ-(BPISD@YyH-B- z;cU1bA~V56#-s#hKSKsx@FujkT8bRV_pZ@ry8ZZ@pfhYSFYa7XjJ0wP?lw?Ot3Fny z<-Q|-gEm&n(2n@#jvYkQF8>Ymo-L-u`IU&pN)6c9WRT6BNtZ}mhxWe(r|oJXtH^aY zBW`(%QCaB4Ju7}B-d0`S#=rjiI@`DtfUo-p*o@{(i+kZMSmhj#It+ekGn|stl;U`p zK)-luX7iln#K>>e>N=1{b2B6Z-8&*|zw-vuE8pTND<&x3reZhW`~*+j*=y+aJ9kX9 zcm9)66MTz+?ZH{XcuNviDy+55DDVzg)_G;DLdIIL-hof~#Nby)&x5<+D{wd5Ac!u9 ziyk|TV#W?q^f@1#kBF$eSTmGw1s$fv+RUmX{k;5K4jJPlS5 zJ7`L?B4@$%=BO(#E-0lXVAC0d=lNnZb?Sd0)QaKvK6gk6@wt%J&MBNF(vF$+nx;o# zs5;EWH1hNa=f_t|QE>Y6+#ULRJc&;fFxHK5W+Os7f*#3V4pA0nJD0%Xp^#}(^3S8b(9+w?wsU{k>H3M)HxME$-F!& z1jXID$iNY>cM*T0p77zc-B6PgYNI3{N0$qPkUP9ujIO)pG0sNuR{^}lmVGM?q}`Ef zib#8_1#iVF@tQGo^Ds2P6N9Dlbmk7SLQsBpZ*P0Uh!7&qY>THuW9)U?+)CS8gua?m z>vfK%DwsyQ`=BwN7*6IL9AWwmeb5`uaCLF_sAqiF;IZM$`(NxE>yZmO=TI0d>IW8? zTwvCso-CFmE=;VZ#GV=%kZTzwXCu0CPPlP`SA-rsGs?l|L5T1MbkZNU96;Zknc?sO zJIB)CHsMJyCvs?>ofExG-N=wOgQxB>%I&Ut7!@`OH=$!w!l_Aq8QiF3^GB`*!^8Ln zA()RWi!xXn?7ZY?Wf&4t{LY9XS?_= z*~|<>{xsK;u9OSLFaX4hXr-P;4ycoq(=etyF>=fdFpM;_?R%z~b!J`f_pRR}Hc#7J=eMIDkdQQI$Kmzi{>6U}VAoPrOr$)52gNku4%HqHnE z(0H{Ni76b?o*DSa%V%Ij;EW?y&NxbK)6g3~G@z&lZ z{08{Gc?V19yqQL5yKwS7hfe#ry$IgI%m;)F85rQFw5&?} zK(+S(iXlAAsP(`r2DF%2t2^Cf8+mk(aD4OHRnVd54c_(xFM`c{=j9u&EG#<)Aww?< zu+A7LDNWGS(zFi}7}YchxVtb*_w5x-r;&?wf0|&rVO?ah#MuMW zs&o{aSW`l26lt-xA_=1ZJ^){Hz8D4DfC1J4_M1Bcz8!GTF*)Jv=O+x#&^RC+*)@)4 ziY#YC=s6j@3Qr98QS3x;R3+P^#r9yUtw-T513)<&8v&h z8+Ul%`;y)$L}G6YvQpKXxdgAy_wN)deE(#NkW9+8Of~#PipUa`CaJRooaF?HTH)3C zVgw#9P^tlBkFiN^M7d3`oq>)$H8qP~|A*juR^@-iCfvrj1c1qr)3@Nvq9B688?k`D zw;Tj(d}r%^K?NUIei?#b2Ix2wA>XHl#RA_FG^%NYQ{$_P&@qN~49vK5 z?PoMF$KV;zu6*Qe30hGC^lgvYqIHK0Y4#3p&_OG!i@-bZ?7K1cn*gef(IizX4beq9 zoYutfss@)dRB#u1&Ip?1YAJgcdj05bVcTeek1O1!m>gx+bXu_xMIDyOH6aQ|mvI61 z)Sv;TjW0$|7P@zKIE-2b7*kI1>g^ieIx6eEf7m@(?0&ibh@h9Tqx}K+QWu>o+Il6E zx0vu;iZ+pYT_IhNqo>`lw|HXYn1;(<$NXvV2*EQ>FWOg{z)TWnf>dOi?ga4|k<)<*?EdDAi=>+8lf?zvmTBOz_H3@YQ=e(RQ=#c^}+8<}O;a z!F;h95e{9mSPe(YxWd$QnUgZ~F+aQrPl}$rVyC%1P75Ku;ou^Z&c~%w#A(8W%dNQ7 zmah<=GAaa^SKv#J-eEAeUk?buHmXzAls2p?(VI(oB9xb4$bCLM!WSdOKXR7#Gv~v} z483J?CD|X0=*1N|5w%7eu=j9B7|Ab$-twgA=%XHe`-wY6rwY)^7YR>V815P9xGPEa$@hqhVi$@e>whx@w>-w9RKimcHA?5*7*GR z*w|ZRFOGe8>?>nvY+)?Xvu(^iCL7y6HaPnF=ubx<=oXCLKDsp87!8gZM~Trbqdg;k z82QP_eIuVAxn`s?a{h>VZjW?$&+z2XKZaf& z`hNFqL&t|c*=-m)G?eUqcF5ViICNm>14F}t-wytH@cF_28N6fgV_KI^tJcJ$s%*j+W96Pi-b2V_ z0b8}23{?s;A4~r(3o0UEtWdW##APkyoQAwC9lFe(vMRu-wqVmJm2rUo@PM@0dT zwz(0LDt)-p76^LI>JUZCd{JEhOQig!SWFs8KW^N!-1OYlsZwaFf!Ns{1I)ACtH)t>Bw3CWM4SYaH#dEXbEyhoh~`G z`wg~wpipiR@x($gg`-U)_ajiwZhHLxs}RB_8{fi~ej+*_8kLMeGFE2j3F zxps8oB#t@#0hcpsBC-kf+niiwD`L53L8JE;n`&o#r+8VeG2^aU%wr@SD##j;v3%$< z8gvXSC)4@Vq`%-LB=YR>$by=Xx3Z;= ztBqG;STGRDsyy0K*hS2`Sh=_C(O|7+BIlG?tkpHF+&3 zE@T(vewt_$WTBcYnkKh!%|x7TBIi^S@^XN-)l#+wSKnUqd2p56;*L3Uv8e3_Ty;f^ zz=FOA?zfS&sTLC4$5!{$Yc8=gtaBt(X}^K!{wQ1BQ*<{;ED0(wDLCat1uE$#sxB-6mzoZMPz;L=7^4Y~fUyd*NREI0Z!cvdPY;pJk(8whuO zn(Gh5kr_e(Qf_J_ZML-C3e7CQ6neBN7jAMzm1W2#4I3h&Yq|CTSe&%v4W+0ikGGnU zt&ec+V6-`Ch{)C2N>vw+j~LnNZeJjc$BO1+v|&%XOtJYda&jA}CqZ!m0xhN4cp+i? z4ktI)bNGUal1S4&YgMC)ZQ0AV@0L?FX;MYDyvmfVoD{Y=v9zi8nkj256f08B#AG+y zjH|9yktw@88PmFBJ~g%_$H^=CD5lc6!r225e{gKRUdTqF~8m}q-m?{K#kcxuju zUvH6DBZ>KwI60HdsDrTXhS@+DOes~N)13vGOYC>rs+c)NHtI&FY||uL-{~NNxJOI5 zi$$l{Ys09+oZRe+lWB2K>hQ}hCKxKg}Cv5d*%#53cxB}V;&ZKaWwpH{6u_UGbBPaLEl0>i^H&Gr} zs*)oQl-TifD0RTyYK)5Uq6?I$v$@ZQy;&tlW7;MS7K)HA8P`eJX6&U>5;rzd>V{rZ z!ZHiEd?EPVPvPm=CCO8njm%cgarXR;>+7IfJc|k-z{2hRBQ`?^IuqStC@F^pVjZp>h~n z&8U7m+m1D?EfTeWSyHDf07yq+oZ?_r0vuRX9>Kz9U4jY{f?u-rEoCi^JN+6%*qO$tv?o1mtqN@Q?@Yw4fX+3O`0d=GOMg5rW!eU(&%K{HrSv+cG zW|;fTEtqT+hN*Cex=_Y5F$X^TAoqaL6DOkLdcsmkID@ctZer!eX2MA{a#Yoya96yv z^knYvG**=!Lgf#u46anwMTg9Gw*SV8x2Z{1Tv5VijFqCJS+1FaxQLe&*h0%9_q#!1 z95rzTNkT(HLZZ(cPc$uleEaXYcKkN254Ys;G;R$CW190gvCGtm<(0G&GOLR=a^w%3 z*imv|fO!_KW+PFVVS|cm+!j|sq92))*XvXu9K(OPz!fM9Vj>!lDFPVKNLleYZq|)* z%7)<kS*MpbLD#E8j^w#V*k*J=3MXm1Lb6~~NdV3z z(dXw1Kby~tHi`rB|LR4BrP7*Lmt(CBq zn-*;_=5xE0n9|df`b*)nUt(L=dc9T5-h?#JmNgJmCQkb-H~v~xx`I3MVR;bLy?hPd z_g(G*RnUh!tb~rlAW`2LovN~OO+|0U^-`On(WG(8ksAN`vK-IjzKkp$x2p>pYxtb~ zZ1*+kP>Kxu@pQgg4@VQ0dpNOup>A%bt?^Pz>rVS4LLt|T(S_mmj3W?LDV$12W|})x zHHMlIQ(9xP0u{~UZV4dc^kDD>*MNDC$ch7{xI(M&r{o{Nxc2c<$*S|DFc)Pe9O-k9 zvenh~mJRpC+{T=0!JMxpsB^ewrOp=vxKg5#=E`zP3Ar~{aSzy|8VquhFh{8<^V*X8 ze!|JkVl8B3Qk81fRxCxa)3{Zl26zH2EwedlA+Iiy2<_v(y=pvCDQ9rnkTR-kg%~E8 zS?Kg%jpbE@HQ(C7a9T3<_yF zbng zgrk|{8DGFA^HgXZn+z8Sa$iJfWs>+H`+`g2<5^$8D0A__b&N7h65me*XgDey1!zJ; z%bGGsEGY+sBsd@>0myaL26S3f$UqaWRfwM4`zHX`Wnw1ojtbX{nHY%)kIb2`gyaA& zW+JU_REtEbi2Is3n<=M*BqrfT^mq(hX{(Fcg4~sN3(zeIF!Wn-4Vdl$dc|jG2GkHj z(gIHh1azSdNyf*rW+^0R-Tb~06A(3W!;Z$XuLELd7$AE*;Ik$H6Ac5*)dV0!Hqq@V z;m%EKl>%nmAkK!*>`Slj^rp)20T-U$An`Pp?^sf?qAZ?@J%$yctvHF<92mjG6@J4afSA4_@7a97oTYZi@>~ zih)0OkwHCTBSl(OAkxO2)oLzft6JS? z03oqH-%zTS&%<4^Eb*rmNv$c2&Z>g_i!TO(GH@P#`^$6vXkCZzH*3O^=6s9pl~_y{?ub!D|=5Alxc+v+ZA80%lbh0v9yHqQ9=*hwK)e zLFau)IKkVZkezlVgc$uQHr(O~^l$Frk`s3b0%|3+j}Q3L#i- z?J7Xobl$qbavv2Q1q8=%)8+gbNE;Ivz-6cE}PX0-q6b>I5% z)$rElD;HKydftj#UX7M()>)13LSKi__G^W{4WIzhfTIb3i$LzKfCO;`Kn#6oBg&VB z{ks5s0VhugR)t_rer-r#MsHjRQ3K+(=z{;tyIboL)cPM7pYOp3KRs$5ZuP##cy}-C z=4i*%z3<6J{ZbX|YH9gg_bQiiRI3pdGpk@Y(P798hys>by4Fd3^R zBY{e^8PWlyxlKyb)DbUbv}1c-VF!kXZwa3 zADtR>xx&J@hak_kV5e31NaiE)$?zzYeEkCl4M_W^HOEXhz4`S=_63U8SP+Q~plLt5Nnf*}EgSQiL8N4I}NxO>xDMew@dvh46w?f>Tb z2je%HgYhsV>v1YDe~Dy}{65&?d~sWFzuCc&gl@YZwBP_l6#=yiP!)tB%HAWUfe9W$ zz=5g&R^Pl_4mR@>VzJk(4Q_bt|CJ-ah7m`*dSrb=<9i0%0P`4txX;6FSfQ3q3Rx1i zBpad;GUWU*+@N%(%uze(l%XBeWSCo-j%bTJ)Xo!A!nKIu-7PNSS*_X4=y4vvEHR93L0EkXJa= zWW$}y+e-R8SwSCs5Z*kyT8fT7aUpQ!X&`9yjR%=H8RKFC-h)lB3+gIKAFfN+Y(=Tv zlQdFj{$Xf>Cq_HI4@Z3muKW6jna~IKVw6#vJArsrb-I*DIvs&fk&a6%QgrQ$@L3D| zNH{*hD?$(cu6lO+Yd;b?1(UtT(Jezi9HhD~>OVSmy!#&J4AY^Do)C^rrY&SCXmRA^ zzF;vC_r%a8Pr#O5Erkoz>C2fA(Wl_l8F`wyin* z0;n|N#IOF^mC+kf$SM2mneh3&`{{M}<>)hT47m;iSv7Z7uDzsw_0$?mii01y?0ie(K2^9~IuPV{-Wi0y+Z; zjke%N2rKBU0G*SzrU0FNd`7ex-T%CBVtUOQ3{pElWdCg4p}68_of8?DsJRoFH|bI& zdjVDyPs*{hYaRpm^flqmu~kyEbn*<) z%rVi^g~NT*=-i7_kVe0-;VWFA)SragwnCU|Zskt7dfCHfxbbC(Z(1$wY=%xg!PqNs zC*4w9Ib$_i1z{n?3ZsRz;B}%bL;6?YrFmk6-TkXw5WPIx{^qMpG*StEomHDc@t8lX ziNq@eu2;(IY+Nb}XjjbxIbfQp~RYP8-NmEIujHHZ2qF=*1@T92t{gd~g z?Hi^xx3B)S5Wpx5ww$+ytE5UGGcnmqG7A0vH}K1RF%w({XcWppVf(`0G779`F%QZb zd$jQu2dtTo{Q*vSp18ASQ0FTCpFcq4o`^#_u5|Sc4}N`o-|$tV7YHi-KkqpWkdDv0 zKrkm+Y{1K%)zOi2iE`d=w#PAJC2L9QaO8Lk)WM72fvf21qE2}DZQp)JDBzaLe;DW>Fgk|ILh;ZxQT}oC(BJ3K%OGP*^BpA(K`OoSOAF zVbu9zgpqR)FZp!OruP572}>5%%)3A`CRHO|BMD_r;<8kw4GoDNdK=z@Cx%E?WhY2| zwoUyLy0N9U@)qu()Ga67vMfXpKrnPG$POy;H|F-Zx(vS1uXFs%|MfR!@tPLv&<@LF z5u`1N5cu94>ShdU$T5m(XXhke44;=ByN`sXXW9?F#iT*l7r~~=eWCN|rnyL#8&Pqs zs5J(1TvvMk0bSvhp&h@vjfJ3y`~!5H>qVt0-qbnCPh2iqdqO!SKHDvVD0O#Q3>Ht^ z0?era9b{AD1`?Q5N%Ul|Xa@bQTQmlt+Is~c% z*`B6_9`1)m)-DAi)8jxJaqXapAs+QW+Nq`v^z*9w0K5$usMsiqqa3zxrzz+OtySqBg^FuFRBkOHeIaFdbfj$!7F)+|LY&jAHN zM=#hvB3dsj{qTqg5*`~$RgF}+)xe72!>j2eIxs5QIl&X7L;LH?Uz(G~MS;yUP0@8FdPBgSYfQIeck*hrJF+ zDe^_Iw{V79LrA7K6AC&P&ln?(T9rcg&Whl$AW zngpZ$K>XusF?#T^%UB>1bm@%f-|Sm{Rwz1YF0j-EYVSbj;LZodGL76>*HG1rpU`B` z3qoj$CuQTp3*B3$+ZK^%j61qNI13|YU1IQ-*so+x6Txzj1Z?!i%fVtq975+zLt{KK zI$k`q3%xYDyO%+|pGJ30FL&;#&7CP=5R2FW%gVi!0V^l!p-kDE)&dS+c@7%niCGTf z?cbM70>*$)h+dr&{fB+qfo-Bw*I37}7JEp2+aW2fxAuuQ%WdXkU64%qA0$*UgwGD{;G$fS4VVqRaL{H+f?8@;+D^FHK!E zfX1($-f-Jr_KCQGoY~(Q$ibC?l%=Dw6bV!Wt&qLel&VPdk$Gs4Cx#I3tsK2QK!$8Y zZ_h6eTCBw%LkW+L5X0I9O^Y%PN$V>lQfvYC~p|uzXRTyC+&pwqH`a?dfVrGK;#xo z6)Qn1MyfJ-Jm<-)ye%2}{K>HC`C>MBd48t|_`%IfV3}S{Yw%Yp20WaDC`MUL6$2_* z=YG-7$tX{ZUjEnqd30{?mQC&Z_lpF}+RN!8P;|+qes~9}!%LDO8bLg2SLLvbGVU(R z(ZngD`DwoN1CWzbMo-)+*wWTry>ncE%6mm30fnyFE852C>eF4_e+GI0S?^=R7xjN} z@Cv~+bGQ6A=t@ffNyO<&!B9@-#T>ba%8+uUiZw8VI7OS#$plOWuM8cZ0gAdKN zFC#=?n)EI)SUM~Rw3Bq!v!q%sj~R6`lJ-iF6oWD3i_xK%HD|SN!{G5P0BXc_B2@Pi z1*{R1S^S1t#-k6SKalV+UyNQpkUXn>p+poAOc7R@EllLhnOrWSvxpNZ^nEEzHBXF! zpRfZZ)g#`a_L-Cj_@e=)QtpFDrI;pPkSOKuIJ#8^kMYFlkoB8fpu12m0-uu0Xv$+4 zMkr!(o7bwXr_sUz=pbK=Ufz4%S?xCtFpn6`El(O#%Y3!CE(4Ko6!M=5kMPCl!97ZI z`?)ij6FRuW;3KgsSrW1poJ2&N@TR0njnyGR2hN6$^2A7>TLMtpvqfJLOz}r6h#Kdv zF^KJ>1sc-$LQ2v3YYgJ!%5?^@eeUJLO9kj&wTPhwWazGx3DBj0`YJ84=p29+phaiJ zMKdP@hVzMBnrl@>;;k*trfF)&~EY1f%A?y`D|UPR9TbOGoOfE4Ei zW2*(|uz-a%YXl>L0k+bbh3Mr+v+u7&P#YG}hm4|)GdjT81qV00Js=QhfPF9mBwhv_ z-EM@&*DU00DVG4B(P<{pdT#zJOz^_|CDmDJ)5u~LO}=NjwFTGe!MG{j^mq`RWEFuq z7YE*INL;k}0F*;#1@>9+NCET*vsyRr1f=Z~^p3UbqL=^r-~V63(0{}(>fdl-SJ#Cr zzRDFqTEIkh9-aq-!zrL3Osjau2z$hUX>Ik%(>Yz1v1Q#NE90mAg`7qNB=78xYs6agKtM+EjTaDOp&ZHvyB0TmwHV2LE$2+%$c z=#*;}qT+q#bI|r5Opl|xJnPQbuoq@b9VW^-A|x(Kf`(kykqUMCwnHwHh$Sb|x$^6^ z-}u@F2Ab9{f+S2F+^0B9SPLAgpy69_pxg#e0sES}Y0<>ywW~0YI@hje`su9L0IXQt z$f(d5FswDe!jA*82V7#T3HGSJFCd!QxJC{1y7W{Sf{V9~16K07LvY1;Fa&93R$nGH zc*CL%i}eObRP202%;$@yCi!LX+FRkZw_OOY4g7ZyX9qDN?li+@Ndn(`2KFn~d3>HC zWH@!g2(DQhj$GmU8{@fs+kfOBEZ7?$Vxw=e|A(XI9*^LL;fn`vXVkGvK^>DX30D-9 zYR%w-fY4^83~Fpt?#9vCanbzvYB5p}jon8q#zFMixac3~+~q#S;TVsd=6?X>^*Yq@Wr35`#s?YE0QgoPrF073Pza zi6SloXIU?(OrOb!CMS4hfUYplA_<^#E>4}n+SEF&4(32x@-0oT#CfdVIqasIUu!?H zAN`+1nUB70X%@Q0YS)%ZK$gLQlqsc3R&rY4xcycTJ~@0bI{u7+%UcwOM0UZ1Q)_EA zyp2>MV9QErcDm8$!lJ3MRVCmq{|#7ZUhST33nC&guy~gMU5#@<^0yPa?a+5pu;%z> z=)r3y&u*Wb7D4WtcL_|P%Rw4zuUmg^jdhD0yH7g1-Ohnh4@9Z`zXzh!Eu(=R-T1!2 z`-VSL6!!?`+T!hlz*ly;Y-tXLh;>CP39H5n3=odAMoK8O6%_f9XxHR>q=)X;cg#T3 z=ugi=O6s{k>E-m?&dj~CAOaJYed#1H$S)6x#;J!?-2l?<{5X7_81 zu?is5DB}Q24DIm5sF(y>D9epnhUuR(Eqws`&*l=_b7h;gY-F~1770;#?mb+5Vz`;c2|gLXMU0|Mp#<{2JK(M%YXg~W)2-o z0I0)Z_$DKnsG9T=Sx-q_f|z%l?MvZuxH$02AiF%l+DRY39Q52d%Mt@t#7;x8Ui4Nh zGKW}GwU^A&1ZrLbCL*2`XbBJQLG~oT`u_16=*XOXi9tu7IC}C1SW9336uj)} zGIZ?8zX68o7s0O~ypi1lfLO#eqmN|tDKcGg>VrO|sbxyB%@jTkM<~AxDV~l)CUkp7 z*na%u&|lcl_{xSRByqDMDa+YhEhUi)km%~`U_0`pCs6afeI0XUvM#*~+Y@yADlMGQ zG>Sw_5lX4S&da>fH8(+5_+^Zj1TNzYsO#@;V&2KRB!+il*Q6)t#~hGO<%wx&W3I{Q zBTPf8Pr#Dmm7(L?M>(wC&wc_rGC$3e9YN6zLtf*>(O13z?eN41`{XGXlyL;xUWT>@MjZWef(L&^X z6p8N#7lP@iXncZK27US|eElAVv+CBPB0xJ0E-_F_?5*Bs^8_up2a8mci9%iDkD#k> zhl7_dW@1y#?a?oaAkp0&GWr8pEFz9Wju2h40{YS&@CaYb8nqx-y}$kD9U_Nd(&JW3 zt;Is3?67B~aVvq`cftp9wG=)0_H$r9xKOxTfd2U<(Y`5Jjgk|jRGTT4X&vs$g3tQP z@MC;2I{GOSJojZ7@(mFdadZzvFhu%~_By)1$t(*q6F~*11Q!*+n>U!w%a5%yom>P} z<}MKf&j_$N8nMl70B9O;3FyEj0C+s;7k9z6ZLLCJw;AWq7{hn3YgxGOZn(2V$#Tt! zo1`u^7EHAy`3TD21Fy;#x8FE22iFzP*WkJWnPkAS1Ae4VpEQ7u=mCOqZ4y2FHE@@# zT?%%EQ{VrBW)uyaoINZC_|FSOr_FB!TZNbg{2g!-No?vk7H|WVw+>i|&ilG(=k%JT z=-4%;8O~ib{|&~;)G`9hC&c7t9k|u4f#7#1aN=ar$ovh_$(z?MMb~{KvYGW0p-=aV z2GF+qz~=>kOkm`&)GYwDXw7;dsy~yo>I~w}`rkoGPq?0~RTTpF^1>4xX%qJ|jx-;j zk%H|AfRq?8p)3=R&oCJ=jY68h8l~+Iz5V&?1?XSj7EO#P`|lc#3y8sw^}gIQ-iEcd z1x`%g(m5;Fnnqo&!hxuk#O-uT=ZK&`e+SkYPYOV<+Oyi>hehCXwJj-E4zQXu?Uv$Z zQ;v`YQ%zksg6t2%vfzu+q48&Tqd&a>pj;0<2yFmCjZbUDrF2kIbC*>fKZZW=5d11n zjEWC46bmO0h}zdb1ZUptSu4GETJ+_7rDE|lut-EsrqPeS3;T7o6!2Se4Ext?Tk!~M zfCYda?k?l8r>GREiDoKr38)(YJL`_`K?itZ1fW@<0-;e+d+z&;nNn>~rJJOsnbl)7 zk#b}c5VZupjZZ!bc70wMs2e|oQ=5sj|J$Q*l>*EAnedrnPc}q!KlUi>5?f&ZgqOC)B>@@=h+6Utf^eh)}uU%i>mC97#{J zDQv!4sfb|}xhx{HXf0khwXwx!hBkmY;*Py+u2MhqbK|kNmgeK02OF(c6UeaQ+SmwT(8l2+?Gt%4tB)f zu=Oi+x`~snhC3WIBmllxbQ9ZrEn&-PwDdwGX%FSa(S(Ri7WX+LP6_6+IEzkq&{mO! zMY2viUVX#pz)EHVrLGeZyDlnxlYQlAU1`Q!Vz)MDNJUgWVT-Nas)ou$q=1*)5v#?o z4iEf}l{YhuGTG27&B=08>$FA}hQGiT)RTk}_fdXDA+Gc28mX>3IJsLBCPSvOB-8-# zd^b6D{<2)Ggw}ymRU9ztZLuj9&cR!$WR#>I&*9B@IjyF#!ToIgJZY3bzG2E7*Tz~3 zS)zZUBVX|5l+83DDf?;~N1!Fvq=sMbyqGs#0>4elkgQ0YPJJaa#q}rc&r0zi02D{O zfHp$JySX)y7RTejxKK(eOa2g@4sT+!P`#;E(MCX~Y(s90NP}9U_t$KHlC8LgRJRr~ zCU-XIcPbJCY!@||f4J>Gh*VWLO3%0rwa)je1F*g1uwi&0c zX2u#$le{StM+2(Z0K56TPHiPZD(IF+Yc0#-O8I!SQ-8s0wFIkVnJ}tS#b(MJiuC`G zZOCeLC`hYBUZ_~IZkL&wX0zkHRt!u;vA83ziAeR$EV+SOK$ZZBW3gBb^Os60XDr&y z=D&K)l@vv4b2*uz1|E2Etm_4~eS@6Nc|&py&)tg^CayM7ox@Z&K}fSdOQ}MTMr*bdLa~~@TuM!_`L8tTsJID5 z(6-Q&8Dr_V3LBg1Jm9Y++n}HrtzxPi2B08KREi0nVXK!7 zjsO-2P(;CKQYw^^kuFwVtV%7wsU3kF;IPRPj`y+0h9B?~s<_7ER%QKxvObnt=sLze zP>2M|M9HNsI&|VtvMQbYI4e&QF^a6p>Q=%5mZ=6d%%)-c6Z&kEz|B&hOaknnis0Bk z*nWn}x>n3($Vi=bhU2;Wdz~+mKUDH6094IaA`MhZ7L~G<>GT4fCm=b2veD5{Mc#iM z`=dTTDZ|acJ7{wxBH9`?wu6;>jS&*aeF;sVRc(01lHqe%xm&NTlD48wmC9*z5T-r$ zO;+wu8Z@NUtv6Qm(o|SOZ8)F(T`QLNC^LDptGr-|CCh~1dA7bqs?=gwI_;q{{+6;X z9bw^5{3bQi`b4F(dD2~1`TixI`C@>s=PAFwYSCkW@T=x~yP!iA7%?VT4SWmf# z4FUFNB^p^GmxmabJmoKB@DVst7a&*MPkL-+9HZ5AK3>D^c&wL2hVYYsSAau;i8lwK z!wOGmbZ_T(ea%ck2D#;ygjxwH4`rz!(^-SQW{j}maa-0=jMcJoTe`?qH{cZlKskK2 zP*@?2hNt$i@_Nc2Ss*M~!)R~=r`fBz>I%BHnB@mZXQHJ^+XX{r}=`i83 z=v76?U&B*)|5sUgh4ANzLZv1RWvX?%o$8IV&1Ax6W6)}hNli+7-5l!u7+XCVBYXr* zBc`ELwgp_B8e>m9U()4J5hg3{C^#Esy&==}N@wl(5+O=Wy6c&&+MD;pDlEE$FHU-b zq}LSEY0BX+q@s`1*k27beDaFPmP;n|$ts;09ATvdM?p2fQXj16);grPQcx0FKSDkd=ERjtUV;maU0W%%Bt#qpV`$ zbDDh?EJ!5*1fZxi=3_lSX6ri$SC&w@>=3z{hc8Tc;vu%5_IgELEiHt}6p4GxY1u@O zt#2Y8?8a#~Ay&1jviP3d(_+^NOOYD%N?hZ7TL zv2xOHZ{T*yY?YWx3Y|4Rso~_Rg|r=WW3ocl6fp!tiBT3Z?L7d-Jz2JwgiF#a_~n!# z>TpLanPGMkeVDZ%B@8NY*&m22Oj&%y%eHT&wM|T)OZt;#Mi~wYiB2keCh6Al%Xv=&@?sa;?O;S-O;@+yIgo$NaSX3&XNrA(G zmMoS08QcsXo6Y~rb~9_w*s#2*MBBhAt(R|pc47nDP+3oS330$8Gl!LNwSt^mc(wCH zKpKr%Z5qEhM3fRT%wN|OTK>`^dIg-VS z0B3WnNu&Z=na%A>iB+L-OXpX?S80*qB~7blO~$1%O{DiYE3caC3o4>TNoa}QRgI}5 zo7ufZXX_2nBjg3UG(p)K>C~1}*atF>oR+k?y-uH#2x>#YOZElnAEk522;ov z(n&(ItP(>g3c7ckcF10PLOR3bpc)Ce#J*Ok~l-*v; z<49K0<+Qdz61|+NVoqgCxH#ve>sZ{Ov=Gz(?EI|HA*JO+)}>Ks)m2cjCDUJIm42^X zWwc?H3SP4<&?TRz9NGF&wnIs$E|s-s^$~r-+44uXhC5FZqMho7vxW*Xk9lVKIq~wgjni5}P<3Oi}h%2r8Y-RQ=j;2B)?@ zHZ}t{!NINzdU|!E!lCaC;$0W?-vs$m#~Ev*1|57tG&adI@kG!EpLnm~r+xH+b0PjI z_LRs9xl$q~iQNFW;@M zTi#oU4h||6K z3mJlt9>rLmd19n^wgAri(Xp8mI7ZoUfIl(e0OlnXG|76yX_dTHA*HQWQcOl<1|!Z` zEjMi^F-&p-y_1SxZ6z>cwr&5d2r@P-OB!gC^I}pYkiBY~;bbVi%IkAd{)Q}2YzLuuRN}v!yPyAW5X@`uY#3$O1Rs4GB zx?8_}PJ74i!OH+9S_U$k^)ZQ6O1eqb0V*#c(dq(Vq6L4z=98pwi8#UO&aZ`z-bX`T z)PF;M(<{GZx@ccALX)gB)a#Tgn^=iRL}~`2l6FhbCtrs7=ZVo#*JUR;dBp24zFPx zF#svgIb!%@+?fkNM&L~mcSwHYFQN`$2q4;Xv3$S_)xny-y!3_s^5J;f`Xj64u zO#6(90N{b34gY|2nl(yM(6jft_dQ?U7Hxnmb3jjYhcWOL5rHf)!n-~2ZAqlj?Qe^A z&a6`k4$2V&+V{_OU-XK9GJdP~tP9z{;6-`j&XQ<9FxYOjiNcDlV*OUi` z*xf8-149g8B+aZU@VTr}3YPx!mfrVG;Uw(@)qSw5hXUA-UBh+32M2E)HTS;31RO-+ z*pn{VV2`m0el1B|lO!UTrI@Z|;|gUGJu^HDl!>dwFy*dJ(9eI^h&spU>`7atOQw}( z=v=gr#q31ToHYP)pCO6jFj!4RiR@Tnz|vXv?5M8= z4)LkPrPS1iy=W{@A9Y9b(0vmvi;Sl*Np|jd7+BZGRxKP(9MK2vV zWJ1TLXVvSh_@T|SN47c-!{?DZ3Hh@XM^9{kb;uXDk1uTnb@Sd$v(6pHWpyr)@}?mz zA9!H^0}^L=2g41(q;8@OBIw|nrI5+6cRkpRqa9Ulc9uDJfU^&7i=f960XIO<0T`P_ zZA`NBd*AHrB;XRgw+i~oEf7f5fn?gZW!)jTV$19;Q@rJ|ymZWSYcCz?@)@*k)-R-i zA`>|KfK|r>$cvh~O%0y{aC3Khw@WIhMl3Gd7Cz8xjcd>Bp+4l*R7 zaTW+dW}pIfle8Q&;po22u$=hf_8a{l0+0VK!dWvH`Eq5K;L1K=1cc0G)$nDI0PkVW zw;Y^r@+B8+OEyN=>A4?BV2$*T-FR=TF3)|%;=)B9zu`rh5quz2>S~}*B%_25u$A)cOO9FpKLra zcGR*D4p4f@y`qlsw@(z^zGIDD1<5wkXSHWPFxzpEGf;M{_SLe(Hqi}K)<>0lG%3dlvxP%vM$kZ^0H0n%bEgRHu;^JBI$@*fMaeR28t&I zU-zrK+Q;T+6Ogr|z?53tovTtwRa)J&MbIg`;R&7?Iqp8h@O_EeH|~a?gd8mfE{{Fz zgQldHCV(@HY^W=#mNSK}I2l^ti6Kx?&ryB<^X z-Tv3US>tlx)Zwo2{iEmg?HT?EMCBbG{A!P%Sw4AKK9;3}&_h<;ZdzQ5BCaLG3Afmm zk)<(oBFEO}P?Au1Pa+!*(gL^U`O6zmZ5c-#l z=_*eQ2xnq8Bki`7d{)3V_OS!d*nuSgYT}RviKJgu!KD##wh;5EYW_G1pA8-3iP4Vd zPGMp^Md-64NYp!bYcIzs$KF`ZVZXi?t$clzm69r73Xw6jQR}O*pTJG%5e$wIUJ*KU zHV*e7Cai524xisG444(WkUTX--h(H~s$_$%s#SCbeeVEtjVFen!3$1I7d>#s>^tnc zo_8j^t8Iw^4&xex6cOM{GDO|Ja7&A+r0l_Y0|DLgtS$o*L`^5ac1!#31ZJiDT6WC0u6|I{{=c;MUP%bL`L9~~G3FC`V zv0&VNN~x7YsVQ@s^q8?(ZO8%!vXW1tLw3+ehSIA;G;AgMKwTxyXtL>CKV#I8mcpSQC_QB))KVW=@8YC)^BIS3*zT z35gqpUs9s>w-t<*6I^1Tnb@e7pa#e@@B-yhTID_}3212o4a^H)%rbBv(#%4E2sd1CWQ*nG>z~WPmGT5(^=Y>X;uRPG<~~(zoyvJeLqmT z{HyO*edE1<>-|OVBfVegMZF8X@os&0cdxBiCU~lMNAGaYpL<>qT-|*w1j*dlbA8Vx zJ&}off$`?5iPA*i1h$*U#yeprxg zj#;|@IJO`i+cwre`datF(Pu{gA7gI+X~ z_kAxBsC|32?*-BX(BOut269mpjL0B5AW^Xt*`niyjsqi#I1WP)H^xzMR1^_^=hc1P z(3NKXe?A{R@HzMOseA7`?=I(j&-XkwteF0%>6@n;(^pIzrsdOTO%Dlpn>E|lK0It& z`^mNMUt3ulUaJ|sbIm`kJ+yZ7)az41^_xD_M)L4faVju%>D2zI^^>no{@3KUh1xel z<(o;@BsaNda_z()Cw@BdFQf0B_-D!86Sq!WGZ7c+-sp#SOvu(hB^JMVbo`$24~^Hy z-?fGq*Nq=u^TY9N<3mvX=HJI29{c3j2gYh+mybR)rX4#Zd0A2(%ElVt#i=qyhdbxWDRN5xe*ApL z2lTYRpIB0zHE>%ge%!Xu31qk;@)xm zcuQdhZ@i;Gq*a9&ul78RACEC9h)k+maZ5~D@|qXK z$2*%ya~2}(QUGta&qh|_Qcj#7D{G}H#%i3fLyZ~8rP?9N^-Uw0iJz?@nb(q797{sv(_b%oZB;VjEU5ChFR_RvKslhMfrV28@+f-Av!a{` zFQ^I5Z;!fs?o>*V-bgMr_@Y!StO}QNW=+Yj*#9b)M@!($D%H!5sxsutSu+RJqC9C) z($z}QSBX0LmR~XbcTt|OMu^$`j@bs}RehW0K=|08y`{ zq>G!%_I#?AcG0^qVuXz}s3r{<2}g&o#Th<(P`mzDLstnG&CAhMySI)l)H6^-C0|c! zGz6*lRU*M-SYN4A_EVLrF>Tfsax59V8jCw@wCYS&GG1px-%>_`7}&&SEX@iP=qRwte}kGNaWd;?=0uq}+T+{8gvJV4za5 zW;;<=t5}Ixf~0LoEpU{v6p8E0IZ|IVi!~csLDmfE)h^ne>af=My2r7WmP?VPfnBdz zP}vQ7<&Hn%zOjj^ow2hD6J3#GpbkkA7v75apTGf4wqCWjsX`6?|1LA<|Y2Hk@V_s#@Wl$snG3w*u^Zo<}XwkePr|||@ zHM!wA{37c%Ib|<)Vsd+Cp$cVR=^gm_S^;Y3G{VjlpxV5wEp>qxuY9$1$?VAcG6jnZ z(4po<@##3!H)Ud+&(lu$i{8XLFsOm8MO#TC=`U3>ot8nvr4IdBd_J1bkrt}lF0e_! zX)D)$3*`E&ja8)Lq{vaLG@WU7|#Fnjr7NrTr z9qN3>sCQ=1`-`ZabvsF0xfy9BYbh!@%3yIR<0Fz~Wl{mVPP0y3grRk8$>^e~7N<#h zb!LCSOm7$0#}XYO33)lO5Kekim8LCAh<{Lo=mu2_R_*SDFQ`+*ba&&)DOOb`G9UCM z`39?05!A?6@$VL69*rqxH!My0V$_TDTPLjj6#l39$rPQRDHZ*Z|;+ z^qrC?vI*l3*@9hFauIBR(w5YfW{$%+NVZ_G`6#d4UsS{YD!pm?82;6QdVy+^Mv4gV zrdGSHi*n-R7f6MY3gvvcpgrr&X*k){_z&`aT0ulC(F*N=s(3}E9fL~Pywc?+t!%|y zAc|hfl-?q4*L=rKK#3+eDHIC) z(wS4q8yT0f7Npb*;)y+5GZiU2XUMxXyq0S#Z6C&pvQ<4pS1r~~x}3{38J>Dclow2O zAoJD-tp;T{?M&|zPpjE%*+c~^(I)TKr`URG3t&ows$+3LIB@XA+!ppBgbHn2%D+``;$AU(i*ibS{uD+p^nw0_z+EaYAp`xyG8TX+_|4y zk`s0+=L)uos*cNP?V;I9PusqpG zHpxUeAojrAH&Hh?k$DfSAQCa523I^pNu=|dD}q1S3M92I0MGm|DD}R1w*f( zJsEti_lo})2ibI4 z73AYV_$eQPAEes0Uza$rw*i=k=;9z*3{9}sC< zyY)GMhJ=n4mfeW%2F2xJ>*JIaxl&Inl1NpBJ`RY1-fJiJAbznbco0L!%F7xWNrO*A zX7vSiGon=3LP-=a&+S{cLW-`t_G$2I%63b8KQ0Sh2pp?`0*u>$fNTPMJL-h06s2=~ zj6@&46L3@;nsXawRyLtm_Sux^scUXt+bcE&&tu@2z_^Rm5MfCFAS3opgDuh)d5sZ9 z0-za=Cg``qTn3**Cp-3wzjQV9O6ENVjLaf|uT||P>;+9V6KV+*5@}(oH=}o7GdDZ4 zvPqx}A%MhqdZzc&Yvv$9aPa$0;;%Ds?cD5!!8Ua2nvECt9=dkUC0U||l1;sL%|jEv zA3HI+R=98jHI(Nl#8gB$%D}tDCIBQHD=nk{%0*(=hi{yN>J09qP%B6b#16b%{LZ(a z4_`O8VbvEeu9@-c=j>?mJ#*8WZQ2wShSD%l2A~aJWD{s&Tae)l-?#JLxv{+vmE_*^ z9n2=lJ;2zroo0R-yVL+Q5(a-Rsy9pAI@XmBY` z9fE~3)DcQUgrH=YuMJtiIeXqjp-;ab;?%3QqF1(_cM00{)s4U!^?|pYiT8Y9PN-fH z09+9!C0}WTV4v&<0Y+BZ$1dc_gIwA>8wWGJo%tFakMOxWahVW-Hu0l8>`;#y$b z`&f=qa&O5`Uj6C+@8ULrx!aB(n;RRuVrb15W^!oys%>8B(a16)N=Gxbva?c16HM99 z7U9cUoSR>_LW)kGx_+N%b`Rf*?HA%}qWzw^;&hIIhBH?jQA2DIa1N8V0nWh&?Ea7< z4n_;qS%Hu|>@|TQLv5q)KRLG*?3Q?oJ+1yMdZE)Yqm#G2?N&c^985MLPekK{F9SN3U8kR>;bS%@u%US{>kI!)XT~KOE@kqd(q+zVgwz zt(#VBedU{KFjm7SX3*g~-qu*(d&k_}8&)peu&Q$(o7=bAf-V9c&c0IsJP0VatPfsN z8oCqiBg?}1P)pbn_5jcEYORomuZ8X6|3I+{2KkA(v5mJ3jjo$211#ZNl3OM|GHn@l z3S4Ga_v3y7cQ=mv+5AmN8A|z@S)-%Pg^Uz><}(nF8WaO1$AS3)T!OG|UyyIxnL;Yg z*gT|`Z>7kVf(lhDxp#zO^u+*I0M>Q!hjN^PiIW`THmmDJW1$>Jm)$Fz4_1nSIr)V? z>&^B-v_k)o@WiL#kf1y!5V2#_Sl%Spg(*2yEGm1gmZVbLey(`{cCM9e=;U=kd&3VrDWOvRwM&%xi@@X5J%N~GRn zt%>tRiqm*l84pqxLn2vYlAS1e`txAHt$XHX*R5!Q)5Xi;0p;0ygnih5tOj9kTp4f0 zx*)C=o6*Pa1|=(+`b$PX)BkUG3nvW!F`$+gp;z8~)hZ`~O-DMJB-jj;uDJOz;e>G? zC|S`05bceC3q_xr?v?JF1J>HWF(71L!k3=$Q43$>E{>Cv)LY4`R{P44^DA3ry^;Gt z=LTGj^Qxhtt1uBH+Hh>n+I5b|ZnPgwOq_qye4hhy#SG!On_p$x#7+LIUz`K}N6%3R z#EJ(6d9L7rv;-42*$cN_EZR@09@eyiJhKMj6 zkZqlqPy&-g=RX9;<5e3G@k>7dSA?=BCm(wIW${a}EH(p*c!#VoVXo>V3Qj(a9{my+ z{D2s}GG<#sLEZgjSQMZ%C=I9kcGw$+`$SqGKWxLDjY6BgGPh^*YOUx<8vWnEcD!$= zmzTmk6uJ~HR%8h1Nnzp5^1LkzK&wwbJhy+-Dosdo%h#Z|$yeWY!0-9$+^5#BFfK4V z_K~^$t61C;Z)ohPnfcL;Q&$fMB=4IJPatCU!LtO!eHhk2b9V?nd|ce8kZvn%lu5xx!vQ%1 zVOBK!9r*AE#i;xB0IVQ)uG@mD-RBP@YQL9YLQv1?P|zQgrHdK)_%3Ysm;Y`)|{md%L~{fSeugJO+g8A{)Fr zW5MMtwHy&gkwL`IVVS(;>u_BdY{Ml-AZuVt@3&tE7|aesSD>hW*LG&!q%jn1nj~$p z>D9H6s#Mf7i2K&u{OlRxUh!Lisg-c(Ti*suN#GdJ?~5zkz=sImr{?=_^L+~7`L(?- ze}B#>5%W2KMD3>0%|N1dcrSbV*HDV>w~g z=GPC1(dj9u4fxNUhy**xs-TotjWG@p#x5%31@d0)B62{Sp8;gDp>=z6&aGO-^m= z)qe?FfOKlP8%cR5WhK;FXI0@ex2qhFK6DzoF(5`Ke)a#nUi~{SQZg~0u=*dIH0@)fVva=xA*S;lK_--bZ3`Uu!8|gLB;0X!0N43 zyrnQ6#4A?@GSR6+9~KH1ZQa)UxBnITW$Ug7rT7!^8;d4}Xa-bSJyQz>BPlfUD)ehW z47IF)eD2ciTetKoug*bPUPl)w;>DqL0(EnRs)ekUnxP&I%{~`3x zS8Sf`>Hdnx23+@|j;bcuDig6dtMcnuD7KeEA9w|p?v-NnU~II{c6e6r^;ZPD6gb)O z^g4^V08h3cp_w%$6KW-o+ONYf2E^z@4*kgPH)0Hl7 zM@na?%4dxVh+$hbZIVDYjZ5d(4@i+@^1k`ri{nx#JJ8=cCMKnD&h847$M~EbG}t`~ zIvNafDy9uA!vwm28uSc^!O9<=M`P=x;u-tk45(qc0wXZyJEr8cmLlDD2uMZ4)o3__ z)RUlQK#W{J+&h2o9g|YAH&0A~8haPWeZ>_3Fcf5-@`XaCj?3+8xY@oH-sYFiZWwGr zM}E8cf`?8@jS?vk`-*>0wu4Oz70E^+4Lr*y3b3An6{9CdLBU`f+Wjrnd~d^;6ps7m z?q--+oXcg8#$^QhO{%gb1*_o9ssQZRw>n+a3^|w8>aZArTA_be- zvfLB5B9d=XP&=&Xv??3^IDN zp!f`QWI&2e9G#u-JvIZ=xmh_hBOShfeD9EQ>h{r$oUt{)I1$+=g~_g>wytY^nI(8G3jEcd5eHg(EWIM)tXqYyjmM9>i#^k+bft6jZ- zt{y@EDU<#ke-r=MA%&A(clYwAWsNue`i?0P)uc?NBGBj)Ge6mcvfHE^XI3@|toif3 z2e(Prhz9-aS^eP&Y{PhXhAWaOwOPfm2XhkdSBfseOv-mjJ_tgVq5l34%iaSY2gB83%E0AahDV_ zXjW^5ob8!yIJ&d@Xmu&N10*7?Z~!Vg2&p((C>fEBXKdaa>h6-Bg+6+Y6iS4x`b6)@ zPfT42vhS77LT7-_5L~e#ZyMY^wkBM3Amb1C^_zR80x#rht-Wq5i6c3)XF0Sg$kcHI z^}UIL&=6eNY)~@S&ZG1`7|g1zaI3s>fA82~X-R_E1JY@zb*6`Y^J(yZ$|3Km1!IA7 zULgg#{DAbFEvvTnx?iqBSur7)w7a-8A2z6F0g*!>eGF0Hw}bwe+TiHTAj?7M%c`v? zG9O>+i}a9mdK+Bw(l&z+_%UrzPCNy^zZ7sm#L+trOV8Rv5pVG>to~$AvgcOl*k${q z<7oY1=_EK2$uC4kvW!`Eb?+$FajO!K=4|^P{m3&(QIbbZoP0Xy(x9(Wx&@ zS0?_pW@h-iL#}bP5RqUY>82}?2xE6yLQ!tl=}ejD&00;-r&pkjT39~@#OUPLPt5l| zHo0c$gYW9#gXg*jm-XmtJkUKftZ}1D#{`wd9Jc=qqaJ-|+hLoTlHSbC-MME%MDY(JWS7F^$Cg{!=TSuVF4Kw5 ztFn6l28Ji71qo=KWXj4IO-W0{#iKu)VPGqzaFqHfO!c&S1bHk=Q(d=0kDOhBzZ+lZ zI_jjkLwNYK)?diDv}pz%y$l96AVw#z*)@OM^7|2VtT(*9_xH=Bmr3RXhuY*&cxd>k z8Pn(o#}jDW}K;Xmm*k zG_91P-KnkfJ^R{?OCR%N;l6#5%l4&=v{X*QonhmEw=$TapzV7DFwFyE)ZMcUZup+# zBk0Azl4Xp9phu3b5_*I!11eORbDDZSWza!kQSd?E_PPV&%lQDhEocO zXiQfDy}7VoAS{zr$o&*$aFmM*kI7q1qIbDr!#zXXyTuL1IM{Ii!vh;G)qMwOQ1pE( zQI)}_qb>eGAW`P3Rw{!Yyj;3>_6%|F=a<7d6f_*XLb~(#Rnm8F)wRM}ch+t&=j~n- zgj@VMdk5-8-g1?6e)DQ=Lbb@Pc+)-S=+#S`3~XsYqU?iB59-5v)d2i}_y}w|=!Ph) z=c~6ON%cW-J>Ppn{%8ku_4$&+kX8=>64<=?yq)wzDJHY9kt&5&da z;|cQ+kA+yNu44-TT!i$e(L2+iYxP!i`lsXK454$g(zV;5I4A&NpmvoBl9yAk0lOhr z*q=j|EX?t0jp%geoaOzOhqC~jBigXD0nl>dM0zoF1?Olss(MmEw%Y)dbvT?+phLK<1YH>r3v>uj z+&8le%F&kK_`Ji~WtUa72y-b%`WbT~Q7r}>L=^q33MvM~=*Z40IJk!QZS8q#paKRV z5ZhzVj3%B=h6qS1u@vd5-oT@ib?LtK15zjx2^pAA9NxXPx2pli|B;~~$wR`6IteZ; zrhC!y^g3#suR_!MK$0oiRr+jPn3K(D>T2oi`hhkixzjy=ul?#J7eMtIsf=AWP7RF@ z%?(YzZ|b`8 zEwCJi?ifXm4=kNPiXZH65I|@mZV+^a_a*#1(d25KJgHEi`#uP7aitWUzGkxTcir}u zl1hCy%DFegPGRe6m*iy6MX zce3=CTZebva6$J{=oXGNRK2OVny8hPzPdM74`dSP`X9&3)>2dVH&C+S~ zyQcJa*!YLr{b{>odD_}mkJTE9CzLEfH7}lmlhel~#j)Y;aA!C=Y+3)SH9uPa)cP+&(&GEpmnFsZp{2CNkr!uP zoOyEQ3nQPO`IzKOGw+$n&-iC9nb|jT-SB5;X4d_A-Sg|dIeOQ+2S!}$j<36RU22_U z^yr!oEv&<=+OJGMx8~95Q`4VWbH$o_rWZ#tlB1)+>CSX)+A>W|OQ(m|{$}knBY&0L zwf51q_l#~>d-K}H+AG%T*KA#Tc$gBn!$*r#znuEFsou!#Q+JJCHg$BWxaP3r4M=Ic zZ0g*p+0owQUngG_xWk8kGQv%Mtj`_poxEr=v3GKM;!h(_PCP&H&4~vlj!#@Wk(_W$ zu%rJrv3p`__!Y@7#{V$>lku;O>>mHj_~Q80GlfmJ1R`5G;c zXoK!dCTFh_28?i4wQ9hr=_r{ET20;14DyBue!gjTRtX2Uz!XzHwGC3T4F=p$sAp@0 zEtM(DodEzkrt}y~uF9JOUW)YQRJLrVRt6g5!{YOmh?UZ|O;v5p?2Q^Z9ZvI6%k4=Q zl?HgV%hqbvf+^iKxc?b%##nUtf*E&!wW}5Y0*&=_nuavNCH#~@ZqzspjJAj6sTRc$ zL34=>Irc3{}Q&RZwMvuMVg#SKF70jEZWFu2?HL`?JLVf@38 z3>Kk+&4w-(vO7yP$F+iZL8EG=QUQO}5;6zl)?|g!H2S}*CY&z7KAE$SiW$grxwL90 zR?})~tu=+wXGj}?U%4UXO=WAf1X*)n8AT+BDtDS?+@s3I77{D}$G`Z7-W^ zT7%oJ2;76^wT?*(M5uN{m9;f%c0Oh7H zg&(qnzk=29d4m%(r$DIke4+e9WGNF^Vm2qXv*6xr5&No(d;?+Fa zq3daFL=QQXiF4QCY3sy2c4xxK1agoXrivaI5ydXZjP2<1LA^N+#XC0QL<&{M5y}(5 z&9?w){7Nh5OTYZ zGV0NDv2rRw7@09~nP~;R4GL1pm89NUEb)qq#p!AJvw5P^Qfa-xNYiD>?)#dk$5++R zQLoccR+%$7sQUL zYYJC6&K0}~#-7S<5c|`t=W=ASQ4FRdX40*oHa&}fx0#MWs+GaS>vCDU(Ve^4Ey{yF zp5j!^X3n5ZH>&KK-Ai)HNAT5!Y$%})L}KOK`CYNW?yS&lMUY^Njxtq>G5c|U8kuBS zZD`k+mfq~vX7_wt6sL_bF7GvSnSfWW;-xrGSk+LboC?}&^U`KxxEMQpT6|iO*2_~x z@MrU6&Y3$ry?}qTUh25Wl(A7_nOe+Zj4?RRM+Gpq6qPN9nR+VTh#3;ouZqv-I4HJS z*4OGzHYE2aCviTQs_yD!331qgsSQb zM7>gQ1g$z2pl-GF<{PoRmQB;aA}5c;OCg0JA^Q9@l!2PUblwpl3ldt&#K3$x<=o0*R zIS|hi6q~j96xFJ$Os;zdKVGVbi+tW;HS74? zELKzUMUu2eo(i|&`lHcACvn=Bs^oOmDJtOv*q1dM&{7-D!s?5ql%I1E#vt#mBr2Ih z-xI}gvQ9RmWUXS#wxNun6KgMeiz;G)k18BtQ$FV8h=X`ZQWYw0EmbVqfz=>h$-20a zm+>DI@(q%-YICKmElnxRfgF zXLzde4NaA(LX0kz0?y-{C$~>rvhyX#{7XdrotCARRw?PdyYT?>v5FO{qI8mWD4(mN z$8b)T3b_6#BH66V4bDs{?Njc1QT$zNx=p(B;e;+6)T;^NqMJmyfr5NrWhrW{r6Y7B zHx5~S0_VIcukCoKT#fd+si3-5j~@`tEl=AuM6OJ0(;VfcDzS~?nhH7gDI;N{cz4K^ zX|vOZuzo(+j!?y9A{tcX{qjJ1;&t48-a{wsRzsrB_!+BFxm#Qzc}tw37V;ee7}#xY zO@TkW6+fTL5*AZ{&uVn8NTQbBjdS8uIbqvQYMPLAVbZ7xlEEhgRZbPo5{g_@Q<1yP znE-pvdAK_{g}Dqw5S&uMI=zf9DOMX%Wg8w1ov$(VgxxD&sA)30aYm~uTWHq($*e12 zby;+N?(na$o@}6{r2XL0v4Tw0}7gc%Ey zr-3==pdUY;?&P&(F>iC&<1TNDO3W(-Ih_B}RfV4B7*{FUiqY{3xiN+Hq=7gsW-iBa zx<<3;Ah*9HishDEk#@J?NS9&F(M?sXKGjZCh+McpYAP0OOO-i~UXl}K%I0MvTudG+ z+oEfio_CirK$W%-X>@XFh0Y(@u%(~Es7je^99gp`0)#x9Wb@>^u%2Ygs~`&YMq6Jt z>B?UI9PzlDOw=I+Z`Cq6Cs6-K`9nA#T9x#=IEpibs+v&9rYpo)OrN1jx}8Z9mef{= zPZ^3usJSvC{(v)~q_Uiq*BiBToXGBZPLykz0$H%s{K-(pTWuwWuM_2*Izd%5Mt!CQ z4t;lKO5E8KMN&y+)E!ej()O4g@gZ?zPw)kbs>Ka;AbyUU==jWa!hFK~C%olWQ9nm(`V$^qg=klb1$V$wm4`W*56^!>SK)$<5Zg*aB`g=a6SH)y;;ouKpk^pK zsP@Qhxw*CY>A1dS@IZ9X81>n8p44XXRupIKa*|CYFrnOvU+f)SgxDybt#$ z7B0ieTvq5p7EQyK*uNmoW=w6CL)sRRHa60Z)~(YX!#xj-&g?s@FwkQVp#^lT0-MCXl)lLKOqzK1|@=$M0NnQoVGS zRDhIsO`r!m0bPYugQFVxfUD`QS+bfqQe6kmnm>M2aMrABL#MvC1N>2j`3dyf*Uw(x zbKW6fJRDttAr(7*AbnnwqhmB@j<&3ULM4WF*8y*LelX-Ue=&0Wp*YPW9b+6KG+4$EM!%w+RsjdspCC z#iJ^<+=&tyYIE9vs^tnW3Um>Ic-o*C&7SuU00Nr!Y=M-~b4Gd(ASv*m*$i}^Ak<~r z*&tIH4q|%3l3&Fm01Nw)7T0A^;7XT_^MkM^0S2PR2r#-l!$v zRhQFd22ankU6`JMHnjUY3@97kA?-1Xg4>kr0(GefSSWiG#SE2!v;_xQ61)RHv>ht9iGx^t^wV&lWt4-H@6r}Mjb>L}p({vvqW_~9MkpL8ud$NVvS zw(8FCO(UmpngVGQe*k=nE2T)X6S&d-@tgk{MPGkFDq@Xa`kY{2Oc%%+MOSAqmhiy^ ztCUk}N-71zq|p8U3~ypk+)r6RWA`sbNDn^HceDvyk~j{gk9o9KLSeRf^Dado5~tDp zeP9^_VswOX0y*6WJ~)PMyl=^6`l-(dopN;Fq=1a%(v1k6Y{ulYl2SCa407KK$_B(p z@`d&L0pPjwtll^772bif3yFW?yL5D1$r4pp`kS?=E)`1gi2DSn7!adVr(Xr6;?rl# zdJlX;u&sa?uK}h+ z{gOWqT`E8a_OF>ZDZKyWFuLyx(si?nxG&QrwJ|*p^v{gJ7(?Is0t{+Ej7}22125~V zfr;L^UzBGFDI8NYP$8pFy4;Xc`a$qGj!T@1J|p zVG(xp%$MP{GhN7y6wRj;RK_`(*pwPQp< z4oUt{?}>J%knJ(((|{OB-UxvisdfX!-(%9RO15c3fb-$gz{m}F9f7GEC~-R>0(GAN zjLWKx=#}GF^y6Xg6R<}RQiBMg-3zdxj!t0*#&@A&D?0KuA>z1d>zi<)@pEok^JeT4 zvQ7Iy835Y=O|LzhgDeS1->(0QfMODIQ3qSm$^Gpnl&{Ci50SNGQa==IIhV&H39r4CG=mh)I%_#eA z>E^AgHHW-NqIqUH%)7AEE${^k{KGIbVWQj_$iRm*Qc!1k5{9>GD=KAwAHd;40b4bJ zc79L5{{)2aqN?Qxg!vFSm?3ryvn~WQzc1aomz9&un+dwBKf5BH`F)7825eL)0JH#5 z%Gaia`WXRNM}SQU8X<9hwMHZvJ_QAGA4^^h#gdECwVTvKYbv^o5hiQi7$ zH;qnzQG2cckc=;XHk}U5dkC{tU($ms+vicD&;ArlbU+M&LMTCfmErIR`uKf&94PRg zOPIZb&-cG+f#VWKzk(&3RzsV7aQg|=0!%!ME`1IZ4v2wgc%uMQfp7Yb=a#;oM}7jj zF6gE~7hY#rl|7}U2sY*`YC4Rj%%Jc85OfWQ(bIE~_3^|Hc26MrkCx)0j%Ohxr0k|( z*TelXlNC?3lWtITgCb1ur zIx{FnuKkCB#`T${o%7Zo0z}f%&BCy7oR;^Nv??RZYW=o^NoPmef0yo?St&#j#mC|0 zy}EaMulMixER}}Rcx9bZ(ytgVquHefBeNYV`%1omaOUg--0S- z7sw&R1A2x~%fS_@R3<#m0M$^WQR=s#YCsH0!t#CS)NiG4;5g+=zr#?XGQ2)~(64y4 zackP@1&?P@VREO@^}mFHt(2nKE$ip+{f}RYd)Dz^OV6GYQZ_{mS!38zC>M-D)+gtS z6q94k(?L9hu`I7n(Ewo2rsVpDoXepLehnr$ zDDH<%@4fZcOIzqyUIsnBu8Qj{IpeBoqjR z=zsWvG$5G`L3z>&MWl@>hqC62xFBfzBHVcf#Auc*0hZ~u z>0@h<>%^s7ko>Ao%i&jqlx4h<fYzs8~FzunT}AuY(n=l%gZwSlg$B9zm0TUjl%g_eQ^0t>s?jSxY-g zrOkG(BG;$mnFu=Z@=rGHKCGY^ihAn>Y2ZOrDwz+UkN$N@@guK67uhak^or)iRl{t7 zVvHWfo6tMd1{8k-Mmr!yuRMGTZlU|vjH7>fV`;Q6{R1D;u7=^_`vTDpc}z?`Wuo0& znrE}<2Y-U$u9QML+HVA-zj_oAe_ra9=T+#Ht=j=jc>OCEv*v&z6|6*ximbg#p<8|r znpR4I;`(`tYqf<$b+S*hOoYoGnvw00Qi~FR>tEPs%&BO?N;8!A zbX3C?d903-GoWat5S{W!_M)dgrWrwBpOG!yE7!~53g_xx3sZt?hyY8VJxSN1MQ_FC ztOV+5bm_Qke*J(L4iWF|dkRL-gL`0W`og$OxRWmm$&dI>ZmZ}$Kyv5Eo1*o0P~+gy zHzhJ)7Z?yDf}5M~?OG#ym*DYOfIr6`kFYDNauKm;Rq4(HtEMxC_)+-tK`|fDI=`*5F)XyL5p-DjpxhSMA z;;lN@=%nH5rms3%=C+&+=FnfKWb?CUh4(%Hn4b2>$`owfia(aC8@EsGs0?}Lkxq(@nS^jXXx~!aOBx>=P$(sqo zY2&+Fz(!U|g~JBiKzj!PExuJIuAb&?GT4C^gLN%>|1>(i}cw8gsccOFP`rwkp(0Gc<)R-VSO8#Hd>Zht1;! z*(mznHrWiiZ@cXGcuRk54iqwrLQW=L)vJb*MMJyvP-53^@LMerl-vml2gK;eo!7uR z_v;HrkmHU$OW(oS!gt_YTnoyu@uUc2z)8eNL$<`W%Q{;ec{YHu0WoA1Lhr5`9UbjG zxIq?@$mqp&Fyl;reKITJ?O?u?E@y33vsT5U8@GYg3`%=zkfzQxpk^{Dm?qIlHL=g zzuWr}tH}xj| z%xNTFVrt)p;dg<9M;tz5CyPXpP1{N|W%uz(bk1M7`I(hcbcFhjklA+bQVQgW*Erz< z6J6G#b@6T1+K$>CaW=1Vb13sFw|D)36rK9|j(zuj{Z&qMx%}!coN&my5=JKOoMw}< zN~&C3Tn{zW3tI^+#PeU9b~Cc-BQ=+JJy5; z{l{w@tk5f^0Pg(Me#HEZ6FzwTPE?Em;&7o#EV27L_xYz~&t7~w>wHaIsN6wLL zL-+2ItpjZHYLE1~zw+Y5q;YiRIWj>0lE5dZ6}%+s3}iV$c9M&P>Pn=b36Q_5wxaI- z$z_0a{-&vA=Yp5dLiHaCvZM%G)}C`1^zd(}jp};^U8}Y(`xe0CF}dVguxV{A0pc9? zrbr;rklXVvsA;QfqvSqNw0bL&-1eORP2U1IVkVaRrOg4D-9*{7Zr%={>#!DTV0vM; z!Utq~H``ZfMNhx>WS=YWIte;>P$n?(0li47ZST0jucQ`o$RMzm&O+XlY<}}VSW%69(uwB+7Zs0=FX23?A-J&T6gTAXzWIF(F;*qP;_--rZvwA|bP{%`c>3uJrO4~WreNn`)L&I@JY2Ux!d)F>B)BzW8% z!lcTx1mAHK(owmau0S%-MX-Vmh#^7%uHMJr;Ncc}u}n-KIdn;XuMra0@w%D_wR|2z zO(YB@Ca7@Jag@9SbPb4+>QzAV0xQNS`j<2E^!Tr>s9IBj|XF!Zj#JaF;9ch3bW@+16!^vc#f8)|2$=`-9ozafo zG_IeNOg%RIZ_|r{bABEYr53ltYKkX74PCWn?9ptgu4)9}&~VHOJLF0!J~Qn4b8-~@ z*19zOS-Wh9%(-|LXu?NlWreX&$*Ml@ik7QoJ1c0~jIOlHW@lD5q0^Ti-iMz0+2{!R zucvozgOobi5;c`WunooH*)SLQWM9_XYcbMUDlwcg+bCIiv_}o^cu28dYZK7`~{v&`y8n> zdQJm+2E^#ZiS_fhJ#a3BHNUfCL(i;T9$rZY3J)*t0)@nO0&wS05IyN4irPTJls1Gs zfgGw_2FLU>#Jx{nCc9L)Q~pu~r#5y`AUeRv^^VaLOwoGq89z0WHkpx$v#vzO}0cHX73Nq_Rx9EDZ*I92SL{l~Sa-`|NYkYtE$)Zil;X zMFKSdwxSRb)7S`?#T>IVRd%B62GkOc)5=Pqe;6X?=+%GRRo?~;kh3+G<} zy`mR|yng(#>74#XBH<3UNH!ufWrCNGsHdP=Dmh~T>54oSS7tEq@6PT#6E8$p)3(ac_<=J)QK{% zMBEqv6=#Th4+r4p3U>XEAZSo7?g0(h+Y-t|j19`B&v)cuh1%`Upg)E|!x`eJuBb{cZ+)#w<%WIw=>-NB0*Y({Y2VwT{{v6Q;N;*v`s%_a-0jD;L zk_C9115)6q`FEK9!t(SNh3WS%%Auq0?%yDkq{5J;gFZ*iSuTbxz$tTf3{DFJVu4cz zDDXb}%(~ufG3f9P-=dHPiT$X&t^(zk@-}@l%{D#2){o@Z!cps85!uZ8fi_egy+m}T z_98MU$QoEAmWig6ngA82ixz@5#Z`VDvSCU!*%maDkZss7*oICY>|WZ-CuBga+m`!H zQ3BGRS!2ZB*4A0{OcIvaK`}ag`(^fCASHuBadl0@S|EL1zY*Y}03GMh!)f@FK`}a^ zOIdptW@Jz%jNuZIAf>64<2qe5;;l!}U0Im$0WmuDt97>Ct{mJf!6_o-pJS(p%U2IK ziIlUQROkcRikw8(^YDX%VszsDU2AVm9{&7zNmiL1cn$D&ZYaTz4v3-5wB<_@l&{Dx z-l9 znm^;^^dvVMU62?0myHn=Xvl(FO+c$_h8v3u@+nO%sN^h%Fl!!tqaoY3d9^kunt9~^ zWF~**ud?HN_?tGs#iO4wDsT-0O+p8_ESeBQ78v^=a}=l_TsOd4Qf$fA3pcD)9ziEK z3FHKxHQJUOkV9JK4W*mbFI|oxo(=tlbXKp5=o1?Qd|BYNz)G*|$Tn%;FOkF?i z8J!tMt{o~)z;_AN4nvEOvHjlR{_3D|>RK%2;}wh{sh5Xq8T8a5e3DmxP_|+HKpP^S zI|)mTz~=pv56XaR)4s@o`Qx*$D`4xiA^9K_tQ$DSuT-FuC*Z~0azqCBu9a=bwb=_! zO5&`!-XD&DlTv0|WMR?6dfc8`MGpB0)j-p1F$CShs{nV$ptO6#HHYBDIJU9(jT^9^ zlZLL~Ll8?B7$~_ORo6ob#+Ze&seK#yr}x8tGuS2+Pd$JhoS)d*8~uQA?zSun`Qw=M zg=j035TGqK6$-YT2t&>4zM>!B1Si;)ZAkvD=k}w^wgagb{XUsW7?KjyVC+RE<}Jmk zq@A`AW<#k~MBVqp3{M_~nHgw8DntA&H7`*SZ6E99j>;|;9J$Q$0DXD3R-w|*a0j_*KN#f}4Mhe$q&1;xh2;?_x}89sV}h4%g%q8hmd=YB;)^mnnz&6i z4Vg#R%-?KLJKNd-}bf(G#N-U zZl^oqx9C{($Z;^tL2>Vuty@k)P2}5UKxzzFM}bW`1e80l!nADK7zu^CD75h-(3e$P zQAGFNw<}%^E8^|D&st_K&D!LB#acDEF92KP_4Bs8K7&5}QNcm9YAZVZfFe`V*LFnD`5o(+Q|3|Lj^ut9LI z>0!$P2Nu|v(7)AM1qT+eOus#&DNF${n#v~DPkevuZ&RNbJs`Pd#xm@f{(|eOYhYbt z7cYTt1RtnFwMrsOrpq3cos+jn0Ce@&qyIb?z3B>fF^i2l(3}Afq6{d&0%VG$4yvkF5S7lvPlyyPZ?Bf4a z-658*NCe9t$6lEFaIRRK$*58s%EenV=v=+S0ADt$GmZ$B)DI z85K*epQGp{=iXg|Lw8B83D4>UC&y^At!R>T(!iuxQk!F~1b(FKJ)qY{+Ys^7X~^XI z!J*xQFW<8Q8Lzr_4_F(0-Htj{OX2Cv+`!b;|# z{#A4Eb>Gx?KDxm-g%p3f;nIQaV=Fer3bA?#ycB9^!&fv0ms=opEsr^xj(G_5sgJK5 z+A=B~glDu5Uuuy!k!gGymqRTj*a_fC)IdYB_n(Ql)goLll9B zldV8`CS)T$^DP+d3txl7WPKaDX7`=D(52sNpE=n7^%bDqaIH#t)c7zViiuc|?8PWb zPjhr9lSJ=+0_?>RF}%V{06aW*VAo*ci_)&r{U3qe z|G+mu@2_t|TT)rNRGxW5o_AxT_{u9lR47(Lf|crQ;qlo^3SPDqfxLldw7? zP3ZWyzi|k1woczZ_|}tfw}8`;gJJN2pLKZa+CV*|3nd8$q1EAG_B;i{j5MK__tHlO zS3b4!M(LO~!jj-)IvuAIz*HI$tT{{1A?oD!Wd9Ou?U6PBZ8);b<S@rP>!nCh3KD~#T)F#tz~uhc%4N&zH-x-d z-~?Q^hlcxP@CEfdKBz#S`wrX;Nbt!U3vk})y8x+>0|Ff~3chx9?z7-o->4A~hHl@5 zD$kyG6twQOi|GDmS58IAG56h-+m+5^aQ{7aI-n%(-~^9FBnh@^ZPB)B4+@vj=K(xv z%cywp^3B_0n*$?YqgHgy zFYep*e-RtV$KVv0`Qu73^bb$`aq2tsj+uLArL@W>0yF>HkhZoe)hS?aCq?G?GHs>E zdQTs8_N*jI{u;E#h#2yzz*vMll_?1-V;frf*cZ=7OaHy{Y57?EZ|PVJui7QDoZ;nR z{Vs;R{rz8TytmQQ#22>=oG(bnVq_I63{DI{S)gW4@R`hsPScUok?4Pa2J_0V7bC^n zZjvt^)t^g4xK`aK6=J#_@0N(3&qq}JF>@qFqO+d|_r{1A-ABFiD7yH%eY*zldmbOG zQoRH|oQ15>#uEW&gwl9{2~#bg=ucr5BVttbza8Le=a23leEp}A?(nSgCx?jY!x@OR zb4IP+YU@@)=)Y%_JJ6la!O{G>rY8{`|pntyl%ax_2kv4Rn@bnRM3wqnW!O>r>SS9ri6+1GT_vjZ$q8ne_;KM{ueD>Lk z2mkvbsP&E2*S=%mo|LIqSU#z5*0sH+tHE{b&Mf-$Ugh@v3{9}>2;9RRQ>QHs<7%IFt<4+p6EcW_zW zxQm1~YDW+K?v&s4((i{#4V*Z#QY+~~X~@CI>NDX=MxzN((r*C%{fHQ>{Jo&mKJ-UP zsTE^6;A??9dI-|MGr%flgPGdM;S!-U{sgnzxC?qY1!)FvdH#*LQ){>5lFkH}${-OH zL%C=#3AywDGZ{AZ&`19)+0h%eB7wUPw#V~_4xw}Za>|Fl;V;972e+#H@FSZHHX!>~ zcs(QH;og(kYkrcOxDu&eS&8h50i-CXIamdlqERAm18y17hTi$g%HdNsK4<^GG`nQ! zPi?(!)BNSLH;wD3ezthd%x3{;{yNE0D}c4nu1e(_*u~uRHY_Px6isGz6kNlQhL>Da z9$p#|<2<~_-+vjDO56n?=gP|uU4XVMDL*Caw0S!5?WGD6KQpYNxZB zL;x+nXJs22+pOHS<#kQhsDz^f=VoP0@{33XD%iXs1hJSS)J)y(g^Kn}wSewbz|2O( zsLEb7%xd2~*gd8M_$#RZ2oI2Ugv1;nG_vV@&XbO_EK*Iw03%|km4T=Q7&bElC{+tc z{sO6{2|Gk+w=PAHbb=HB{K{6$XHjPyh8Pi}TVJ%m=Q^&uLQ=4P_-kx&@_DsTCxCBW z=b$5&3izR4no({?-C<+jE3 zEkkIs*A)JZEhr&t%(MDxK~w={c&2_N>@k~MXOTvjvN@|f{ivA7s`f63g8yX8I(}LPng$> z(XBUq1J@=Ys7=~}l>c@9h3JL{_U%P4{Ymj|c|Yx!_LE~(O25G-b1J~ww3)6|$WzI7 zJCj52SymoiTrWk{GaJJk`Mrbrtx9kug;y^>dEl;BuviZtUR*C7s$F~!J+w~=ZaT-R zlyrk_3J^*moCDXTYpK=5$(&S92#bbPC>A!f0;P}} zWzL1!t{0;Fp5AllUMOxj;fOd-+ClEs+{tH782nj#g|OHw{#>94nU~ibgi+Q@(aXY~ z!?%Cv4SNQ^Jt(cecU7um!KwfVuLH*CwZ@1W>4$`8ekogW`ZJY7 zOD+R*!-_`Br`0V;Gfc)(AzLh-VbRgU%0r9m#pu>T=E&`zo0~u{y|i!V;5~<7cWx2f zj;@7H79-72hz#dT_^D=(N>BB=raSkafxd9DYR5o43Yu1V<*HOa(%$2NXm>WiI0Uk- zt&190tef}H=p%1{uVYkc}#`SEv>h#!nupNgBL8&z?^_pTU zZls@NOcLm&k00DJ7&}L4Rot#tR+dK=3ok0JQJz%35m2#1P!OkwNI{g8 zcum~_A0S#niPnJ|l-myzBtyNn>}$i`X!+W=?!rM5bT6&k0;PLAAaiGnL!@lL(gf~S z01X8yBWcV-FeagU4K(IPz0q5~|NGs8x7@rPs=)f^E2q#0waU5O5V`2OEdcr{(H#f! zz{Y0+UoDLLq*e)lrW>{n?las0iFP+K%B{PA%Ta;}2W(aFdL|$m#1qi~WZXW$C=c)0 zuu;mp1#|l?zbY!wTh3Q5?}AFkXpyJfVTe-!t*m>Z*MG11}Fg~ zf?}BB5uk`*UQ4vOac_yB_~ug^mS9{dXSR%6=A%=;n0?#i?wN-c&rwvR^DqkMp>MSc z-vmxTEeBIJg6d@)c~%`^B>Ur-9yI@mSh7D}lfpCjs~((g;OCLb!>}FGXr>Hyu4Xsp z^*Pp-pe4;EWdkXf7uPqTYo7cqDE^cA=bv{g!4Z0`bF~CxVNGFb8^b2TRH?eM!EhvN zM`{y{wbKG?JJKW}I)m#;N=Uxaq6`CZ#cBaGGCqzY_F5^L;sUxrrIYaub?J8WuwA)4 z|JoK*{nD4gnm#%vr||A@NJ`bYT0S`)y}@9CPe0lcO=)A>nUETsBA?NnZ=*jG6@k#@DiIf!mZOXj1H z*bEFZ(nJmd+-XNE2YkzVQfpljW@4X#dwgdOrHp_YUoQ ztsVC!CHQiKt5V$+&WEU19o8J7BkF9BXKY1ChEMVE#@CC{bKm*`I0>b)vhVWJSr=V} zN}Cg5*X9WH6}rd|UzL8n81aoU%)k68zcQ*=ChCkH@JsC4hA~M*({=*w3Bvg_Dn`f8 z_qYak29=Q1U;v8^UZk&EZd-Vd8d%u=7J@$+72{fsr(ax{99$EYj>Y(@R4;Ya@L2Q~ z&2@k^V&f(?)iRn|6#8id#uybt@M6|ANJgcfjat+Rj)d%*Sf$hz9j!e2N=$iZ%cvMV zamR<91M3^%7jbILrue3@hrx%coV{UFeCFk;4^1vgnOt^YLp}z<<`X1`^+2*qo12=J zXm{DGQ61`6VD;4N#Snk^+DZRIP3cwg#~`*VhZsjzI+RA=sh#2l$Y<^68_MWzxYt6a zfC=dN0Q|aVD1u8b2mV$Xo!f--YvWe*+|O>eqt7&zr^>vTYbkGEu^j`%exI2fM_`D0!O!j@&HqV5rf%jw^Sf$9u}fof~(N zG8};V`6?xUieu?*R}GgzcXAo(tlH2CYHUHm+!ojvu$^2D%dlPw0sOOw6Nl%UVFld1 zj2b8$A*UnQi%Hf+*wu-`TSGU$SqT~H8?>UA(?JTU2YW6*#l(jG)=QO}m(G}+nDwT0kfa1B$%k5WNCZW-pW#De?iD2^=&ZN2d)8)IMRj=p8l3g2CrPB^eFa8 zG>163W8{N?@5FfhDZUe+P=(U-z zZ-zNwhWCzLAI=drwcg=PJM@-x2HpG)n8Sz|J)!?G@T%Q7zUQGEr6~kguRfXRu>Q+| z?AuUAuhD2p^R6weJEVY6?IfiXJG004#ejjWdAv z56tTDvQIx%D|+siB|CcHwo@9R^S3MS+QQ{D7K#kIjFw`fZ6h4R{d0g~)D-*LyU9p5 zbWm4P%b(QUcPO2b?uDSOtb0c`-ib|l%PkvkO6}k$FP(Lb0%cZ}Z(JVPHn5w%y?Tn> zH2BFaHu$s0-mUbYm+nx`?=%8(2c(w4#ewozeA$>3=qkF=dAEU|{pfqZYTu{>s%j<) zbj$CoSDgCOzT@DfCv_VHqoO@KWR6H)%w*0Z(YV9^(MSFPv^xZAHfWU@?e9FbTDudj z10$Oi_AvY2Q|w_mi(>!#l|Twkh6-@sp@8a$0(UAXGf-$^z6V(p(s8q4D@^F>zn5A! z^sO$}H!U8W`Ovs};>CHFqCWN2SHnj?2h(hA`lKnPW(xK&;bwFJI+61->XdZc?L_k* zQ7$cww1L6B2dww^UpBF!kG1hp<^Fxl+5~6^Y^7ByUVYT>sf7SIl&5v*?H^YjSzIqf z`Y=?DoH8u6`IAGn38l6tw4NnXbCL~pu<39ZbJcbRefp!IHd}Xt4pxt}0ZU}(;=yraFz%LaJ2>xJIc7SkT}I!J{O)f4^ak&4aNjLTAhAw-M(JJQ zkJ(NJtJc32{O-Whw(gA%-<53GJ@NoJQKF)WfC4+hU4&dJ5mG`)6Y!vvk2z+}I;I?2cI)0!13mhX^6&<4PFB8meO3vP706U(=;mi#+Pf0#zLMX@$>_u|pX`Pny*^HWdF zdnHhUtE70qnpEA5;{owh&&@(kp{>CC&Ah{%MyYRt{W2;>`s>bzfWWkB3Z3!5zU7Sr z0{wpa23(vYYfu*`2j%_AGF2vH z>2kEm6x3!0eDrX}{=YB5t9xCO-gNdwgCBkg)Tc7MHV4z`4-*5L?PAnQbfBcgl6SOQ z-W0m|N#*HFBVr`H3@QG9ds6yq_nJgui(N&PM%!(s+s07TN2R?zM+!aq1T6We7(LhI zhV_5j2j_fIayR+cmSJVFo(!3SQOeOax?4WD1whS-=_%!*r4cD;fxQVJ8lh^YLjK*mECkkp1pD0uz1eo z&iTuxUQj?1ZB&6u&nXv|NPWmj06JNmui7+05-ENzT|1vsZe3W{f~wDgPqUKQu`>AE zb5dN*yCxN_VuL3T%jDy9$kRv}#ekUxw)cB~2_NyO7+8swKpAv+@4kWZR}k)0de)?Z zY3vdWL^Q@W5y>W;WrI2&39!;kfc0>_c*rY^4t!O!1${8JV=r*6OOZn7npBC3{l(^< z-d{EH!BoUpR|gZq@PSkmtz}>HnE`mfYkNVe;HRKU;Rk?K_Aft`e6{YiS1Wsyw4bh$ zzL-DhXc+iFnE>K-c(_q95}toZt}b}|*YI$vYh7znsWG0F-jr>JiD1_lvE>q)IL)A| zUW7qL#h5UBSX=Poi(n3}xYi`DVyr5)b+5Wr3~{!!(O$8EcW?NrxaYyEzP#s7`^=GpC3Ul5xaK}%rC$+`VxuI zyT|OCmVN=$K@X4hmX42mmfk*|S*ikkkbddRv6q*Y7yq>Q9MA`SX7L{u-?}I+`WG)8 z``5)oi}MS=Tln`GwD6^cPb}O9v_a_w_kwQBzOa8`dj7xXzd!%Q`H#)Nd;aSA(z{`_$I$?1EyI)T05&u^TS;HOAuw4^ST*}8^_*oLsphB72f&_J5vY!s`#V4V*Ca0m-+XuH{< z*+^=LTCo&Q3!ztr-8n+e_A31ReM=9=}#< z=c!`68nX2u#XQAB{#jTPr_Oy|mK&{5 z$x!M6RedU=_N6q}VfiT9!R8&Z+*Trps!01iWpg$ZXLbEA;@{;o`l=~j4~Py&#hoc^ z-zxW~=n~aQr?Q=1C6O?Y%sp6c=mr8rzM|vobfS2^Fwg@vbsQ4T(ySX0?_TQ%;^~Gozur1ZGtR?G|1HRAg3H@e;fL@q}DUlIfh$s0R$yt|NKQwX(dN zb`hCGib&YHDSbW1V`c=7%@tT+Do^NuEza9!lBa)C?w`p+s6476JvO_uOp=TJBXUEU zBQ106#Dr(UA74qh=3h6Re%tqLjrhd$Aju~A_ z!k+K6&8}vEAjclTqcg=skub(ojLpyxr!nR|$E1ZY(dst6p_Dyu1z6<=<#Bu-jt<#U07Yy{X!6>#-YLsHIf`_Z zfIrHu>twQoQvNC!O||6V&89-4-=n#Tct!;OtgfYtC(M<6+a?%HX5q-Y@i4lQP@|(| zx*W=Mn0%C0+#<`ZK|NvRlEp?$1EGHH+$LGh7R*$J2$}+HiEf56yMHMU&-6-MGm_~g zJZz-F8fA74PTO;mw83Vpd1`@pHN+mpgi4&YMwJPJsY4i2Np-PhoX5j!OD+b|ferC^ zuHvr->FHHGyw)wmomA9Dcig1IL$L3~-8BxMonlMTbR=BmI~j5(i@R&AaZ2pRExBN@ z2gE(J4HE)z8lz1^#lq=|n2Z6|c1HVSJPuuIw8D{yf;Cja1QF>4`#B&OFE z^_fui+^-LZH#A6%yBT9+L8C!k$rZeeJW96NB(n~}TF7%iYS3rKzAiUJ3;{w6whRs? zZ0_ljb0>b*)AABTj;ZT-Psi=0&wc<;pEg%3gx+s38Yw=Y^G{zO4`U2Bsc4~4?7EW< zUo^ce?^s%|E&?f4(_gQ(!eK_)*)e|37{~Q#s*y2~q@&}^SyLsetbVCvG)p)VT5Y19 z>=?>~PCgYWC=#a_PtZ^@XMA2Sb-_9KS1C&)N@^H;D$;1_JZyg7C$OAsw*90V$drnj zUN%#u&OHbJELjMpc(Uay_APabx4WE@yNh}=CAi|Ez?kAS6MN_{vOL)=k=aV8#aBqi z)6JjtvMe_itCZI&Z4)liOs98aA{7pZh*G4JO!P!wsz#RB(@eNOQG%5AsQ0EJye&Fy$d!d$ z(zzdZSI50HLAIPW!q~~U4Ak^xvYhTfi9D~5R_%c(kU@=~E6dgWRF2R9h=Zk3V1;yi z>kGpMLob&P5iD<}TxC~6oyuK`zeGbXVBpD~%b6!cMYXSIHRWp>J(BzD)If@5sO1dW5PUAW1Ni(fbT!soQr~K3>@3ez zwQs=RoS~Dm@u>1rUXC!>vbJW_>`C#u3-JMBXeXO3!UDj-!KPQ6 z_oo)ILNx%*qMa~#XkCCRcWM#sJZ6_g)LuA+XW0&vtVBIi=$dN= zI&Eb%*eo%$J^e68*)!%$Htccx`TPnY|ADJoC5!f`mo3{v(wT`ly$o%&wLlZm6yx;8 zG`$|{pm6_I*KeUjA8qVtg)R#K$6v-uU<9yd^B!584~jN6QL1SAHGv3g&i>nu@$(d% zp%q~*46Ti1G%4OeYR|^Ko25XEwYv;8POZ~961(4sf3pb~WMGMsm1w8k4j6U&J}1i^ z?jn`6wX3BvrA`G4Z}^xj2MlRSTQPcz(X4236T9}q@cl8)(5P|cTAYS!iaFe}WMrv2besMU<1QYBXeoO+oIU0&`~p1a_f(W{riS$ zkJ8Y=N{P34wR9<-zktTSTkYC>1fSAH>ur6sTT=fM9=}>H~s zN&_PM=`^b?)LmR4SC}X950`5|@Kv$IYpGzEZ6rFm@eA<-mwm2astI(CjZP2P`V`ov zGL*@7m#XJzU)~qd=!*HNFW_-X9fl*TB_UzYJ36r-d)6BW)RF_H>_&<7tpxObrVjdZbh ztQ~-hJs23WlJPh4>vLPplV0pkQHGHL!E=f!|44ZLYO_CtV8#M_teJc`#MO0gvs37wG1{ zf@@)Y6LteVzBoCJ4j6WCAN=~SlK;iAw)f=26!~fiQiY>TkQWQAmmYd4_G@)4wXS?< zeK&N?w*QsNhj$Midj$prSl%@WFbn6A(>^;9rt)FG5Xc!S<#rxD^G8_XQL(f@N09o3 z`F#V+pQKsY*HkbooC^<3u?<_vSqZr{WU^M!BE=tIiASX9zHcOfoaKhowhyX*fR_Y5 zE(!h%`?y@qTn)%{IdivW4T)V_R(ea@(IbC`SlCD#A~Ih)e7obN33ST<^21mDqP+A( z`gnEI)Gudmp4>C@sG>T5`M7cMoD+GNo;3+Y343YOov^<`Cn}LFuq#FxmO+!#s>54G z#Ry8yph$LF1x2#_+8HMo43h1O8oE+%<~&_{oo6-ZigDH9r4cbY?xi5qI<8z9e0y94 zPwQHf@UyVLDym^hS=t-tiiQRQ@a#$S(ODQ`M2rrGuawd^&j&VfD3lqj%&DZj{k79z z-SLxTxfaLdd<<(zQ<;iMi|mW4!;9;sNO1+wxetr&9$i!!;qANEB=jci^-B57`7BvA z!JR%H&+{ySzCQyq84)AGe_YCgpFm!8#@2ylvkD4p9BZea+?MKcLT}TX%AU5%tSwrk zFJv3KXV&B%{^clPZg1@0lmxt)-|9wkehoN=#bkaCFggyH(rJ`xL5eOCwDH-UVokQk{=P zNwszGiUL-57gkEmO_Qh3e0kA4Zk{jBzGv!p3Uqw$mupg{<%^Qz5n!0)DOWn4R-6{& z(J<%JyV3~~6}G|hjfl~~?$Kc(%I?9xZybnTpzG4_%rueH!Mk27RW#j0(sfZnwX zLyU+~^@TGa1@hVbdj?}$RS;r#uSxJ$cpG>Nan>mUoFT;}?UiT-J-8PZZoL#eG5$um zF6ziWczv)R)h8dLkxr$dqCT8zy9(80R0lBqJ75kYV$5zoikuFhn>#fQpt7q$sVOdorq?NLxiu!5(YFU4tx|HR$atuo~;7 z=)Nb9;}oaCUshBR#j+M`)DXpVwcd_HYe^aND5-+!kB9-cAHd0h9BL1G?5=yyM_cx* ze!n%dX;TKGRDj?zvpRKr;uB+^m!ec26@+`B_Dl}vO|`gvqYjvTW(d}V?meX1vda@l zsG;^#;{mK$H|Z__Ix8I$6X+6Nwfl4}{hD;-je7!*iU-hIf32!0&%yj)(DhatI3=zMB!)$}~+XprkbN0rY>O{=xT$PkSnan~_ zL=H$&MGv6LM8yPTMYtj8bgr~Q8@8gCA9~Z@3$vZ5=bU%pO zU277;5mu^6N0+04`Mun;nytQ0SPG18L*F|e6yiwJFgh+l%3}0Xq`g4(3QhRo+fn;s6=dtLZ$j6MWrih3f0OG1FHu20xn~VPxMVeybUJhv zq5@&QRH#!Ad-5otf$w-kjP$>~ZK(U9AWNf)N}5apnZnw%-07ssbhBEoi9p+~p^|9r zLKtF1jGocI8}uoZLmNrp&ZK5sGuoN` zGt<*AO@DvvH`8C3{>b#|bZm4|p1);3%6Mvof&oSrNgyKcTcNC8*KBTxw(NtWnFfTo`Y18=oU&XOTXZ>XS zC+LG8n40VxHSuqqKA{O{^{EIZKQ;3CxQ1?o^6hxFM15J> z+72ZHQC=jhNxuV+PqAK#XhhrgSi+Vs6Pyd^8q)ld20H8|k4*jd?fr2^ck8#!dzFRZFI6tyj|QdFSKtHB7KT z7D`qC!f&>7Ve%Z8{JfQjkut=64R{(sZpdo1N{WnsDPOWXxv;mRM$XkWIbvz1XgTQvo z9`%TvrrN2-Fa94{Zf%!Hz1S)BT}Ee&Dra@0 z0Tyj7?hUrhq#8TbjHDw&k!DUbnc8|HU`dlWLSnb(C`FGX+ILY`Ki$B(K*UEw#Q{)wetbD<=GbhQ?^NwRuA+ajp(`_omu9s_V4d4CTHj8`S5v;*hG*)1?AL zq}B*)9Sv7pSD4?1$MLi~Ju0Uud-ZCsqaiMTS{9eQIlIQ`^L9MRP${)vUNjFwSgEA3 zE^2G_jH{mAd70c@*CP@MorNyhbVet8f%HLxGtcO*1B#8y5XofASyM!y_AKLRy7Mg^ zsTGX^1hlpFMEu}!JP!DZ5^SJHCjxmL(?}k@Qts}fwIqZWXssnj*Bct%6}l(IFdJH z0w%p(pL8&)-LgCw@{ks%u_TzItXH2reJh@)%hw4St0q2atdPAnVKc~Lwvi%}Nnm@_ zc_aOJ@`4tYJA06QQTF9pWgnosC0!Xjy0ZiUF_X3p)a#m7ubi>|PL`+I0v$Dk8g{;1 z;CXUsvn;37T{^*gA{mpf8LcMH|A0I^87f99ytQWa&}yev|BIoxZ*+(;59v0xx+%Mv z30fC0fx8i4WAsp)WACJWX}+1J&wCIL51(L+h_Lw{5H)mSd|n4Hg-~!t2b~C#HIlWv znVQFF)8Xj4(VlgMsiMgG0+ycWs_OP|csBNAI8qE7?EP%LoT8HAX$e`Ls5ZjIvODPM z=(EMl1)svdYWJ7Y1eK07f{to}V00|zAvfCHf>^cic;pm0Y&H$HW-sNzX z^POBYM$`A;acr5Af%Nt`vFdJ6b*FZ+kCPsZHlM>t)6qh);4^AKXRUk!&&LKzx#RYg z%Q07~64vgn%3^0S)y|W)R9R@URr2UJ<>8$S5YaZ>77GzKICy3ob_g16wu+BrgK2$E z>vQP32@5Cp=lc0B?dle-K+G!g#q11DGB8?&kQZp1Bdo5|j2L<5!cX8ou-XC|h~R|a ziXb+)qK2@`a*L(~o=Y)ow~9i`P?*3`D5I6kLP|(n&(&MTYT1)r_T%|m8o79ti3gcJ zZFBk?8r{`+91Ac(P$n-_zdI^I)>GIiZ#GLI-J+cSe7hAbMhxZj+3%J6XCNs7B6N;= z)T9Zv=}W#Kk547ICT|wI)?^p7?KJi%8!coyN#^{TE=>tpcogccKJIU>Yf6rG&H}Y> z8A{A3EO>Zx(#X(0Uz4}f2`g78cDz%Tdpu#nS?ZQM&Iou^3rhL8F*}L{IC28C09Ck| zV0`g(xj#!AsZP5SYnyuD2u_`GjV#ypy%{>1E|=XkDofg!3-$7R*0avd{9f))<>Iu- zMH<_HRZvW(_sYkOsZthcn(dTGAa9DOQ|c1#Z_2n#6y5b}@&;4cpVzTYSq>=xRH|yK z8vD6cv2J9^gK|TnWv11lzFCe{T2@MHm#qntkcm>cqL|_$;jUYs-Fm6qKiIAlY{C+a zGd?QAX(!H*<=%>&C^d~~wYwAa{+hQoL<29B% zO;ro?f5!c}mQA2NR#(^FX;joab>R)TJ6ADwh`QEa%9o54(W*HncQ4vflqQ*sro3LR zmQT9Rl;s5*M}wsoGu!jggh;VC&|>85{YZ*1m2<^P*(yfa%x?K);b={{O_hpT3E+dL zUGn;KRK!G=xDW$LB;IU-+?K=R8|sjxVls=JL{JCJM#-g$EU!=^?R6I0zC@dJvf{*_0#Mgiii`4c=UYtWqhXDHjdZMdA#3 z)eM@hU+8EoExrf{bj(iq>(#fMS%S9st+9x=>8fWIKaNM&*LW+#)d2j&s z2{-`tJZYih&ug@mPsZ2RchA{v7GH13lwXPQ^86$TM8FE z=gRVyh9cRlr;`ZlDq0hxKQ7A~y(U?+##%|6l{BYP`=@1jKGLs~MRhD~t5vIhD?!|Z zC(1@5nykQ-Iu@5;6oqXaxxWYCaww)iRy#yCWFWTxRF)eZ3Cd_pl`4P*;xuY^DUzs|tr?TbUmnNMuZo4uHf-?Y1%_r^5I014|;%D`dnEJ>rw(B`j{J?W+LiUTXL7mZx_g_ zEtXKD;SLFjm?dre)6Vh!d9ePvP~8|SXo^WOY>CxUr^_FUj`x;HYnb)%E`zgWATIf$ z{IkZAjnvr7HmdGsoc7#=YnUNm)G?5f5Z1R?CT2Hw_imMY>jEXhQRBpzhO1~rjpq+o zu5B<7i|MnvZZ&QtlWooNHo2i>){*L(v7JcKRzp0u`B(Ua)#eRF0*={iIIh>m)1p!C z9_8Y6myMVTf+bQUax^Q;fkA|D8T9F5s-&xV^4oi|TrcWLu^YEk!ezSHuhF}4x`k1b z@#+|}g>5-l0tkh*^4`}3L=9aQLXl)eaB?m7;_u*bh@#d(2t6vJYe)5=9=Ycq@yoRc z`W{sW0-(Cv43{bI`>;FtqD>S3thi|E_}HHp_s-L^-kH|$I*9Il_lrfzseHdwBPOBK zVtp^ooK3!{)6_AO8zZ(?;cPDZVzRalrrKV6% zcB3TxUO6Z-K;%(CXPV$oM#cC~K57E@wlcmZfhl7E0G~+!8u4`4OH$=V&XOk3q6PkZ zRE+e0D!B&lvVfz0`@-ypHcgGkHqEzYADMY(S}`7*JXb2Oxmhu$cw}&}a@9i+)A8OY zIk5113K|=nnbI-dbU5L6tD`BjdjIm_r4cc@^-%$k$d}&)3|=?x*gBYaU|E6)yHRo- z%8oF5QC9{Mlz4#&^ExfyK|X#Tj8k4OM*OzYVYL5kS4~67@XjrR^FFf-Oo7fDH7EUr zsRE~usS9>JY4DS2Z5*W^Tt2k8UWyKW`==5kE<`@PXCB-!_`!qAQU?2t5*9t4jcCgQ zr)j6#rPEQbj)eqm-2i4YA|57Z58gFczDzN;XhHlQv>ni_Z=_%tTqjg)HMt-WY=mM| zTFbT7dGyIgmk)0l6{CYs>A}-~)A9tG|NQb_(bNC*sUzsD$Cmf6xNaoj$#C?{*e2U> zpat9xOVgW=Ceh}HVM-%Xq>rc1L@xnS{ov|{mko-EO`8-COYiML;H}s@we^fmi~FV? zm^V!P>uhH1uQTsdoFOGVZ;@W=nuJ!2Uuq`a)zCy)XDMd9^|(Knl>GmPw~UI>@>d}e z{whk>gFHmp_E}Cwn;LAwt)~_7+&@?@G+a(-AD?3GX%qoNKy5{8!j0b!YU`g@U3xx7K3Y=+GXHT z$$&lM&}#zb3fk@mU;26>QmAZdR25JxS2?}iOc)bgx*am74HgPr8-tmTh|w}N zsYaJZC$x5qIZ>4J5^uC2>86Pd`{15~3BX7f5*JqfIj>=h8?8Wp4EdmeHP9=QT^K!0}eqD}8ngcXZN78e(O zzwl#llYV;Pj)k`@WEZ^PBt1=blKvAoNpG9~fAi^i_q=v|e18A@%-lE^F*zJK$b zo3B;eu(_}~0963}L!0Mk{%7Xjhn~|n&tzsiGrFPI^uMRSH}aUKXJj>w!IJ6I9T^FAt1OA%7ZgaU>zRX^nj|oXVewNe|eTykb!QENV?YwjN2MIFG zG-+M1S0Y30IvuBGZy(Cz?FdyNI%&ogv9$_8t1$jPEN__fB<(3=+nq=#U@B9)p2hNN zgCc-Bq)igmR<)23cD9G}j2HMq!AX|N@l2wV)b!bz_v8KrE!81=7B%SjZlx5~zU5;>Gc2A;HS46=3r^s;Ip5M`@C_|4Sba_+Zf$0IaSJ>^4o>TF zuQ$^emDFMfPwJn--Y?JilsY&eljz=tffGP-K!9@00 zQ??@tlWq%TN!R0mTV!&TwX<=#yE7*E zvb~1C-7NcJ!g2#Y6vMj%q|3mVA&0qYPxs^V*a;Qa`2mqF3)xR*u59C=!?i6Tu+0|*3gix7b7G99$(KbQ*5?Q*a&A3{9oj8xL zr2?c2l3XoSO+amNq)RS5H_WURN*Yf|+p`vUSC%b#3GC_+3i?T6C1Kj9pNI=xzw4KdccNP@GZergukh|9*}Rh$JK&ck*Tf7ceKc z9vZ$bA*suoBYH+-cNw$#Pj9#~}{nL0lQ7+Mhx*(?`+bTNZ zVa;az$q5l}JVV!f*#c`$)HRO$&a-g;2+4XVjju*pONL;toSed&QwZtdqE6GzWQMmT zSqr%fJ1~WyVAm5`cZM~$yS1XBu%$1*6|nydK!o5jdR*?N-maPb8lJ!3ZqjoQgmh*C zj80!z4q&k_sZKd;F-WXu+udG#=e5J>#6(ZlN?4uFyby~7B9{E_0G=k_>$NDgwrl~Q zR$q}#P5nxiH~K*X9n9ODyaQgGC%1Gb9^YHarV{Crr)zaodR<}mY~0@)_GgF^gpV4e zpwV|z3s_~m4xD}Bbll(FDulr8Yq#Y6$(D=CY{F-$;10($ge_^bIQm+zBU9FH#;1$m zw#FMohWEN-(H0Y`3$u^m`8bGF((YmlZC~6TEu z%2a`l2}CE>Fn7(C%oO%m3ARYeN_i_9A=q^4tA)hUKlkw;m~+M$K@>ZlTC!p-d2~xy zXA9sKnuDP zyW#|Wyq6+DoiYYr#%=GAi<@zOz2JzG4O=7TNT*4ERy(#+mfJN@9Y8f3_7WtuQN-lu zv0O`-S<3IuM*8MhMIF}D+pz0Y&}6etxP^!GV%fwOi{cXY)C(F8oX8E0mU2;{WR{x$ z6CQ`sGaO|p6_cS>wM|+W#l%n^1CX*B(e>mEW{)1;CpGmwEN`(Mflfe-K^>*Ng&eui z#}ScOi>TMgJjL)0XF??X+S&8*A2f()ldwmvCUe0NptOa}*vA;FIax0tf1C5|dMVmA z_lJ6U3*A&hX;{(a3Td+2&lql?SU%|Q6mh6r!|(WYv!>VZ3N_0Eliw;$4`Z`Aws0dUbthl=aO@u!D1no zXgS(8(5Eqop%&)9if0)PW-6pp7pSHCYG1M0B<8U(84CxZ9lEP2_{ua{^4Z0u&*O1| zq9++{gxXVx$yo^t}n1idQNyeODI<6EI&`n`O zIA-U>roV5D_VQLusv6Jil;4T1r}mMyiWRcDlV;F2)7UVN*~)4lhV<3lQPP>sR};%v zH^(e-U5$)uy&kEaz}9BBoQW656r=0FO~Fpg^t}Ey$mp@SOBpQ65BE=~k zeq62xT%aLNs9DrKHkq7wToxB2?rPJQ6bhwI(3zik1P{YS0#3>ut60_Qddpr(%;A$R zX2@t$bex0^?qg@MW;6bbAonS6hSSkqPJ{#2YQiFH#jBTK{8~Mk6*+sG>v^FzVZo0FV(irp znKg#RM8M@s?>HIU=dDVRA4!#GwF> z00WZhI|?+HlJYbyE}%ID1P(wX0wN>807{A;Al5|Zr6A98!&W5R)^MQvQ>s(pY|f`u zcWvNGc|3gzSIXePVC!2I=$@>U6=?x#P$Pg>i@>vI4COsx36sdyLpyRRfR)^!6)pcX zv-|&~@#(5=KW+Kgl>j~>0|6HD0Pfa_g#phyY!~6CMgqnt`ltwbmw5(QFMU4+XL8~TwB?bxspkcOP6#G&e{Zo9prn%Wu}pD@ku+WgcEu_-cj=fbDQ zJ|*qHOVQ;O)xt7d#)?qQZwavBaLHDT3FxW{_zy?LgX5Jb?7UP>_t^Z)>+s4ds$c*VvL!O$3)oZT7zu-WkNcvpx z;i;P#Eo5_M6w+gMsDhr@pKb%6-+otZ1c@$N)&KaK%V1ti*T!I8*c@RTwdRt_(|q|V zD$gZ1E%|J$(3~W3XxYuhP88f&_KU18U*eSy>z{)>>^eJFML04DzCrsA@es;Ulu3A`40;)yTlZi{5VFh}m3U(|G6&?LXaRvJB7wR)6 z766J@?ix%%q-DAH50Db#qJf+Hze@`*y7;5KEs|p_}_Ytrp$&ML8&Cc51EGe5zMw$SntmXzU zI*5b-H9KS~JOcB~DPzJRcCiMyR$H&$z}UFF#{i(It>@-$t^gXjro*0t49B)9%I8*kg`)^xoT!?lv{?5iq2zmLZGi5-vQp$S21xSfn!z}R6DtMJR<|F zsWKil#4}}xzXn8K7?gb_8J)QGO%t6w3>y1U4! zUDdZ?cy92T9!39a1N0E$+5fna76}IC!M-9p=2%|%3K&(IfSDd8Fe(XQ&`Iu*U+U0o82JR+0wZdPQ%ZXS^M)1WL zC#S{AYRG=o4ehkfM-jveL6j6=kF~w;#X(6mOO(pKq#@NvSv;)N`O>YxpqwIfd}wk9 zi@VhOIcR3ucIk`q01BgpfM7iY#txFshqU%TtZ=}nvI#}=8z zG#z77GO?kRj`VyoNCNDhR3gfI0R)8Y%#mZz8BQ4*eQ4|>^zV-`O<0aWU`*SDrUdwu zGD$haUdoeesPY8U#Ow%%jE=s=J0qPl9sDeqwZJ&-gLYW^7{r_EAS$mW!Tf2NNE1w> zFCK+vi=*@Ig06DN=!v6{c(j#Z^PaoFqko!7{ll6awZ$~402~`YqL;}6X+4QjcR~Xk zGCFnjhapHRA(*6Jx|4}IvmAq5J?$nkPVi$PV>vewDF=O46OPv24WfxlM%ed8+JUtn zyBo#{Qyy5Ja*H_?GZG=0JCZ1+0VD|2zm&{;Y6{UUvuBvNnGd8erKc zp7416I8g}OlMZk&GN50433fJzig=%W5n#=Fc5bBg_b{8mdh8O|4D6~mFlRjMa!F!E zGi6U>kY(mxxDcv)J9b?mq$SGq}b1lU$ZlLe}Call2`B-RK_K>zB*k>VMnA~H~#|#L23Oah^VF=1xS%MB; z@U1iBO#k>Wv$?FtqR=hY_HL{y8$KfA(Pi}EN=jNGP#+E4!X-0FogiYCW+GT*Y)}ZKNi5Hf)Ht7- zCuA`!7*;E^swfJ4V`c)~bpj@bQ-n^Qf6kd>F95sF@&HUQ^d}Az%ub6ck%(#l=EV~?%K=YO%q~{-8#80W zD~r%^ayMAzd$vx~&wYcD#JXcau!ghIThE8q{2{9+YQL_=*+g^mBd!=mDBOJ z4?YSO_4OIZygW2N@GV|u@NoZc`o??YjIeRH{01`1<20GExDwasC6J6WuZe~U$WJjd zE+9k%A;wN$`;?q|=+yVsY=jholvSH(`S%zRRDfpLp+{u7KoSGxsHd)t0|ZZ+Z5C2i zVbU|w87VpSkR5qXM@?;{dEa3+V_5E{Vwl%CpRd*co5vn*HHOMh!VQC4hQ==2v760U z_3V?3R5KpSL9f_2^jaoRDU!~rLv7Cb#pZOBZAkMJa0sUiUJu^`rf2f99e;{F3DV1> zo39j%VO)}gc!NaFm5;aD*)hT)ql3@=Y$y8Dv2B~_@gJ~V$u4)Ln9j;1WHl;Ni%r2I z?hCSA8UOCg=qR@gjqSO2*Nr%&QZ9U#;W5WCxI?#-2C2j=UE)}tzxIbPHSa4rPHbnR zVi82eZlK@zAroP3ImToTVplCUPs!rJioN10B~-;+n_(~g5isn^B6RSb@piQELqCG+ z)L5Xa|M8w_UZD4n1D_s@LJArr-~6hS7L7i!fwx6`tPDTF!sp`IfYVOIZPKDzBq?Tb z6nPnf16NXkodKzGDKF7K*{k@gzhbV>mSapB8}^vfE7ahjoQ|vQ%}{|-$>OggNY_h)GY_jwwt^QXK{4OihGo zV;tT460G6MGT6f64>L}ElW6FdGw-sqyysRGsUrL*^|g(vZ73s3F_0hJctgx0$*{+fChW-&UP4d=GB>tA(~d+^m!ro zGwz66U1l7hyP4EuBzopU{E6+NGjV=9S4AiNR~S(6wN$bTgg;ke|(fo_u{~ zcDz#|8Vz0Zff}ykzhM*)8PF=Y^fidBru;5DX@%^y=47mi{J)*qv1yf3TKMFePx1EP zSfH3cl)pAN@R6$npt{=NPntmu7it1XFNALENdQlVjJs|M8Gpwp$vT#TlI-fG81U&o zfNl{UAsI_j!6?`oR+Sipf9npoi1Y@rOp0dWWPN}R^3&zmE+rWVwG76|YZOnz{+Ylw( zfpP!)e^y~!2C89__Phhf8=yTvR-1N4g%oa~GJv&-iGn4$A`OX4AO8z9!6COYm)>~G zOj=wtjZ@g*yQ*d*4hidheezd&cz9 z28H2dC1j|Z!R5RzL(=!)V=fsTSI12B1Mh)oYQu)_@9L%jkYQ%<+OGWrf9}77)x+x; z@NAHKZSZW)S_2Cl80B|nfwmBeujku9R|)4zTUW_hGCLt8V1q zF^W4~?kq;ctnN}tW6kH#BOCcUM>teuuk2gO`t*fKK9e#rR`WGIkgX*JLM9Fx>Ja3j zHYCyb6rYg`ol4QEzf66w-gJt89Fh@)A+xo+X>p|>3%Lb^h6l21g7|8&-=mxPqnlQ# zf=)hI(4)Q6{MGCc*G%&ng!bApLOX|#+bnL`!XM?bIDJYp1#+7|!-sSUOvV~m1&a!j zIC$+8lYtxzBy107B{)V3Dn33o)=}AIJ)6%5v9bm(10QR_ zWM$P^n>MJNSGo<3Xu?mS&j|TDhF4Mn;ULH4;hU!Ww(&tMc^4poP1~oqR@B%fNwdR< z`wHa(JTjlg`QrkqSPU@!r_T{3ry8=aiC##b+|Fk_Yt=-fMpmqmqQcaWG>S~pd5~D%FyxK=T6^2$LWV=`8M8Y+-HgeG4M6hsv35UqJ{!j@i(BoyZ9SMI7R5xJD-H_ zFS%`+KDvt!YRVcBR!VV`#ZDMJj8h%@)CK%aXlM_AAid_Z~eZm?)yR9L1wJ3eFJ~$zpZaAbK+^i?0A^BY<66^ z3a~Z}5r4MR+O&mK2Hu@yZUc9z96%FWICrgA!c>31SUt zxT_HsCeLirkw#A(gCybn@Nx26Td2b=wb$LCkR$roCoA7O%2q z^yu?D&t6K)AO(R3*}~v}VUqO52y;`B0t}m)#idE34Kn_YiH@a+_u7jfgr7eWD`dj*0|1NyOt5kiehxryElG6Gxgb+Jm!c=0n1K`g{JvSpkh|&(TzwwQ z!24KFdOm;W`=~VUQIowja4EpLzabMkQwZY)Z5Uf0DQUZahhfF zYAS^$w9F~IlF9~Se2s$42G?o%j1GEX3?v$>L^Kw>;2Y_SlQO-d;?m|N=q@>b#|Vdv z#$=FS;linno9RsozL__samj23LYy@!eTlGMZWg185(FWaj1CTKA%5V69h3BLlze!L znHNUjr`Z>wDiF{Un8=X~l_YV4TN*+dHMGGcqrk+)yXf21d_QmcEclpJUCvvAHiGo1 zU2;<;=Or`=^o9u33|i;Q>b4_J~sAO z&|z({0q)+fL2Gi35qh$PTo{D4l()h%te|}lnBy+3%~T)?E*ym|AY)ci0sE#O=JQMh zt!L0lD}Q$V{;s~kfv@rQ_nbH68J_L`)!@fz;gvBxBO%9^kBCsNA*$OYR4nMV1o3bL zU2cb;SV;xTv%Pg~-%P({XGE-VVFLQdatj`DB(!C#+Gz*`Oa(lIemD=4#i4?g$NwR8 z`}2ZP`dl9~S@s1cVFf$i79Z81h>Rg(65C~F!#s(ymp~I7G7^6F##u(0*@v#YYRe}2 zwM&@UGA}ThG}_vYTp+J(IAt=6G7$GEqsVpze;i%t=8p~QR}>-pcVWt&{>P8|(OdTp zZ=`Q`^Fa}BSzyv%uuZATWJ5}Njb;xnZK&b|g>LmjmpEj^OMJSWc4GKqhKp1mL-`|;`mH^p;aJ1o&+6Fv0EDY>f6B3LkeUN!Q9!F1y;l%$-kUu=pu?D~Zeq`yb z`=u~{6cErnNhZatKdG*pn;N)sLke7Y+cOPqhooVhN>PBiZ|AojcpGxC-x`G*vr7)I zb{}SSX+SBWruSwad+oqN3$VY$+ zP#RVcPT&*{8SEPjC&AmMV<|eh@f#ofwrTm_z>$XyJUA2>JktM0-{u}IKt?Y7q11wm z1dH&3aCzTbjIy-R;g&@*QLQCgPosqbBR*DA5%2CHQ03Aylk}P*Fz}eF5>2Vdc{L_W z*(z1DJ&Ix_W{a;RqbD{q=FMjT2lvGi>`V}S42mr)`jP>$tgh9CC0N~z%W{%N3HEGRevW879NUXW$Mhx%JTT#lw)6jP9AF|9m+k zXsiniZY_Ir5IgOGIsu1(BBCo50+lp+u?~kXmyCpe-wzgh{q_l3-{3<&?Si(Hmk?AX zxMVoAAKt~H)o#6vk(S1V&C5bg3rPwvLIkOsHQI17Cu$7{46rN7 zh^PNDh_t<+*MIa1XhJsR>KgA6cJ-5esQ2C8kB)?f|6_R1S=SGpT1T(jJb1<0lWSE2 zUm94qCfomX&tpBp9%1((-miJuu6vjZedMfuq7^pY`lB12ykAwhd;iH>yL%6AKG=)w z_nCGR0V;&aNJ(T)B*UU}q&R}j1%d%;E(Gc(Da1lifiQtdFmRS7Ns)LjPRgj;j!*RP zwobtt3-Vd)m0}`T5*e6=mi`-Uz4XI4g^TxzDT;`MsOVfE9DueZBrz8t;a6}89wq=3 zD;R(uU22=$E0f63$#2}ebtk@R)0sdz5lZALrGuOEsBnjNCxz{cM#F(fG$5NJNfL)Y zq~bYQC=!|jTS`05^w{SJ1wEk7{KV4XEFF_A3;gQ z5m5+wEEAD)Bqj<&(_~q|_Q?X^$rgx8=R_eaGDn63BrJ!FS?O?8LW=MRCV_ui z%umShy%H%pNnA67MviOy1xs^tX2WMJz!l5=7XyEWV2aIg_egRu0}a{r|g zm>Ll}c>m2?(R+8DF#xHUT;2tz2e7$`0(WcofXz1=f;ib-#&qB%F>JGljFCZN_z{c*v4KTF?BX~s zBSOnRg6+i#z_UCyxovrENdjLU0lNM!c5cEFDF$FmGMF1uGDk)j!4?pQ=O}477!pZj zI7uw?y;QVUEFx|@^#i8s|96+RZ+UfBnVecn_>jatSb#t%5+UY-fv^aE1!P4~ieYnM zsYptQ#UMY)rAQBibh6(pj)B0}0?rp-9M zYSXuViEWw)hd~y=sRDmN({QfL$--E04$_v8gfto=q#y~~`%Em`3+smLp8lDs)mxU` z!?cX;qk@qj5ebrWl5h}O20<|wkdV}zI26PKu%W{su9sVe<4YvH?bIzG`=_uoW!jko zKtF?~8Q~9~iV1LZofAbOFwY?zWTq7MS|B10U|2X9p$N%x)6`xPzr~&c_F;s-!{y_8 zxW;kF=+w?jchd0a@8+>q+p~{=8dtKw0LZge_9Ct~7Rj)`VhjiBd9fshVn^T-!zF{d zX68I}!NwiuqT4<(J&oS_J8z+FZNGufAm=XZTE0)stK9}4UaT9$HB%fsnu9G(9jaah zFF0Lj#>__gvcqui z++tYR12GITJTF!{aEF!5fDdx)^DqS~sc39%?`dzVzqL8+Ha_^mS{5*9ioLPB zt5S!esE9lB05a<~#MrLY7eV8(vWRi{gBOKq>oj_Pk^dgs-rsJ7Jz!lpXPIG5c%~}D z%Q|t=V3l~2kU6w9)D52nhUJ!_XY$=J*4eF7sPNgP7C&<{jMca>2OVTzNU|m#^3Nw! zxhf^gIdfsQ!LQs3)&ouvdV+XkH`;s4whec${TzR3mwq1FGc7Q<{H%U3VXuS>DXA#p z4dsZqQOs_NyN|(uR~DgzmQS_aZF(0NF19S34dY~)&@9r4=W(qJch^0^Oxz0)H~b0o z+)-FjP7yk(c^9_Uo!cg9;xh~vniuv$Gi+y4S%1}rr@|7m)!cLvP3JN>9a0*>;3%~8FbLp-8nKoB$=<0r*w_$jCNIYooeQ+S%{~6|-`(H-3FrYi^ z%KH+2`8=V;a781T@&sd1^s)Ou>~YBGgpg5Cy)-k8{(K+*AMCP^eFc`?w!k2Kv%5*s zG-(w8kwNtPLD3^=^2hTsBzUw$+w(=~)v-FR8JpHAP!w}T(60pi;UU8+eG#ZE|A9zs9*B7DXrw?0FH^M?Cr``yfU;15*| z;6{8tqroDjd^L=|@g?|0bDRO9o^9 z)n)5S&l;$@?>}vz(rx{O?eJNkh}#8=Fu|D~b`~M|$BMaaObExZpT0bTw$Fb0Q=jypfT3!;WTd;>%|eTQ#BYoFquwGk3kLsU%4mvMu? z4wGlW5cek)kb{Olu@i$N;?x-{Y3^7V3H6P(x#q-EtD0*D{{u8w=4eTu#sXe>S_R;N zX^R*=@*gmfTyoo?=+6IaDXtW8vkT%Ty!r+taeywWn-IcOLmR%=Qe1T^MS)rOsxf14 z@NW`~E~)J-S|4Re>Tw^=3||ey2QMqH8GY&d{GIFHUxr@U93|21R}D^~xgV@L)T@60 zLrqHSN->!$Ix7`%M5iqgt<8bVKLp{$DTCz9TgCL_1O1nSG5$wjjE7!;y8u`ZAvZ28 z3}{I$Nw5>vTTSeg0v-u|hVrO$ZFKO#KkxiNL){zv#T%dI_m9=V8sGn`Awys9U=cul z>n-=}035E=!bPyv*~3tqN=XZ(%n-3QqY|s6&M0cf(I0*equ~^xF(=?~L86=gLvP`4 z??Ubu;54)@TzFa}CQBk6X2~mE*;=|0wBfAw_^Z$G&l>e{%1}WK#;enyUPC{DJJ)DK zs=vMOKe16s1B^b`~Vh^T)>CS4R7uhZ{^cj-y+D z4yU7Q;R42%(=r!nz$@91G-^cFk~kBSlIVsPpeGzEdLn(*1vKwPJ~$w8H;5R;U+S=L z7zd<_=wH6XNL3DxE%BfC<<9(f5lz1g+SY+fySgp~iM0g{=eJqWzE}9e@1O0Dz0!HM z+XnRLtNcsGvVlrWMW{tlrHrf@G;#`^co)v@-@Xbr3Qifq<{D!9qLV>TmOT33;2~so zDZo1hjOHqJ16&>Gu{wIipuJ%==Yh6NT3_rMtbtT| znpf;Od*H6#e-61A4}U+rDa8wF*pIAG@;6203ZTm3Az8)anhz$?k$=GTg-b>!?_=I6 zpI?$lgYWTYrp*f)XotNZN*yL=j7*6FV*9+*C}qYoj<)`lzkY;UV!sDc!7aIOkJFd` z74Di_tP47jlk6R>7<3ucl>$6KRN_!wnL@$0!PKyVik`U{;xAhU>F3^NZLBKjO54Wj zESE}TQ5?rE2-$@*`!*@f}iEeE#2C-=*r0PA$r&U z@&PE&yue^KvNKwAiUA8U-*gZpMS1P%)_nqf@f2(>P7yk|eYWMEFiCg+nYp=p7nI9} zPtHbM+NAUEt+Gjx?R)Dt)AW0+bI`!8y?-0t+5i2)25(=_^pKfmoP*$8lP)kpnQRDc zP&%K)@uVpfHR@HxdIcRl1-$&ZA;J0)P7xZ@htCMaLw|g}bRK%_`SG@Hp>@`+9Tv>M zRN9uO(k&~`CrP^|U2{sC@V*G6cl!kZNV<{?83tiB0CaMi&aDx^CEK#V#O1P&Ac?Jp z`|(=J*ykaac9(IT5y_!l6E2;e^8Ks6iFJY!95Zkbl3`VHe;qi5R z7x;#g8+z$?cuZH^3lJmRK15BR|IrdLlh`TsD}(7|0DXN>Fgwa6qm!EtTuAR+CjdBF z&w_~=N$U)j8m;CeQHcW{io^`5uhZy;8No*69~O*2NY#om_JaG$3u~v*e-Zl4Xtemb z?esgtf-&B}M;Q;a)X+2>moxS)hlR^dwwx7)h5y*-Dhp2wo;4liq4;`%b*tkrnEBdH zwwy_Yxqf#2DsxSXoY|`Z3t(Ju@dPB*z}*eF(}R=_r+wgW1&9lf+4A=QS}-9PAMaGY ze1!+df(gOuuC;_ zF11%r!#FuS!14zilUoF%9r>dTJHVfT0fSos2A&Nfa3>%wO>m}d>cPj(lVMnF`^L_t zAkrfr@MdXU)z_!H2D1Y<^U}jxdUp4|IwbFZj5!uvEt%$mtuU*p7YBO3C2b^Wk~qtM`j`Zb0hlN^MW_n232RbBqKy&x5EKQlOq}@;&v?+ zP8ywl6^@?4K_KniB^Vp!mZ1}`@WD0Y`Yr3|Yjz3Dyv@F4w{A!g_sj}Rj3{z0iz1848I%$hr#ex{Y3#Wqj*bX{m$_tg;%7W?N%-!T zX}WhC{QPLh=B(wggiNBtlcW}$#sb>~JKs+|_@lv=v(RSxXWJR+ zL-)C4^hDihrg?J$6>pG*>tQbWXi%`t1%UyFK}FvV4B$?CYe^sDO?10z|%^-&b1Nm&Koa)5RDDCe|5pX zvS)bbkdt@i;KzH;?|-rHtbwmGk}M7veCfg^z~SueOxJAs!6#l-g{(BLa;%&}pESV= za>(d}03v?=giUTjZ$4i-7k&DTty@@w4|^%IfaozVFbDwbZSYrZv%$sr0#Q;CM_^=vi?xchL#({i{Ma*9Aa^`6dQ4CG0SewIT99T`1KgRdNb9oQCv%RH?r`u$0G@0ksOw9jC$rO?lk@HK~wP7Y;S zH;(~yUmxW5)~6Uwv@bAV2kaYIk;Y1w9rd-}{FR=&er(dQrV37#>+!s%1UlpMI^c7x9fVQ}pvC z<~CtnIE_h=v6OWrp|QJ-;F9kK_+9kMC*U^m#R6Q;IAvhKet@wsiu-5?ke+AUshQAy z_O02_)O+bS21qO+Ll}8F6hSf=}x9)Tk3RM7bzwT=ab_}m1 zqkse;piYOtPhSR-8oI)uK(IqnL?anJVTut-@LSJnz&HQJIt+Ff;^O z-ZTS4!1g0+sn-icG8D9^)lGd4!_mhshXy!gbmBP3HZZ17(SN!e7^;oJG}YDn9o`gx z21p<(*ENvqzoqara0O((c^Q&iEHDxOEK|jmzGRS)%Zpej(omSyiPj1VWe|BMJ~O!j zw;q!VXUB3f-i`Ff4>1pa`$83jU8QB?!_4(U%&G9yHM(Nn4$cjt&kHso%R%5XP7#|V z=4ty*PzoJ{NdS!wg8{(KBixbGDvelfF;)QS5o`;NndxJD9Cn z(1ax1oe9PR-2&e0%uJ7?w?88o0~=qb8lV};=~3v|s<+99k1@ANchMap#L;9!U5>ia z5G~Yd_s|0KP~nud?RM@PnKy7#4N3?*U==tL5L=c3o1F;U%#-ZrzqnB_3TePQRY8HL zKKua>;Tw_kCc)6Aq`Yng;6bZO17MPn+Fk2UK-Tj(GTkhg6rKr)0Q&Ry*Q9yde*-z@ zcib#kzcGeG&^@Tx86Abb;rD7%0NR~m8k!yNREBsmQ#%Y{@>anJ#53zjh?IpcxJgDq z@53EQ@UKs__Stq!dWJr{b5#^@*O!7L20kwUAb^Y+a1+#Em$gIJL(nHnqNUYoxAnNcZ258TD%AbpJ)4w=qQ#6pR0<-+ozOIg zj85G5-%Ld8X8N0V3M{-W3m;oxDS4OWeJmH9z&zI1V`wX?-PKzkGmDy z+jRab9kwZ}PoTd70(!J%?b|$fP4_nkPW2z}8)95oG>lq+T2>2iRt*;OnHOL!e)DyZ zO`NjUine9bBlioeOhdBehPVsYUer&2t;3?W<7uN`2Q|UaHw9;H0u6yh1zJ8;3Nt5R zmw6pYun#twdEJOK-xLgQ=uiXgQ=Zt3@_k2V(f!|CRj)bpEs%5ERcWu-v)}5lVr}K- zUEc;d2Zl-roM$4K{0Tp7TC>*&v9#cy&|=s<4+uubJ5@mk->n0>)(6DVzQMn7`^aG_ zs0^k-VZF(Mt81V@1$hb{4_68Aw)Vu0XnBJ3#v1XXt`MZBJyjp&|3vFKo5Rj zFtMpqv0v+BmGkHPVAZL(_6LGH-Y=xj{UJOJI>={c+@ROv|487S^kp0g2+04qay5VqgTw%R%StL}q55`kbm@=$Trjgmyx0vb zu|Cn#M$k3yRJzS}H)Zf=rR*K6@iN%@cdViY%?3q?k2G=z86lKHESD%5&<4{3OoV<|U_7mnw;a%*9QL%oD zjhf1s!EzL7OIAdMXg-OqdltUtkde^&&-O~gm8ud^KWTFZ(~!QM zK!5!?DF0TH(ebgb??$)p?b}SJe$l!eEcPz9z}cZoyZ5%2R@uFXu|3l7y#(#t_&7hX zS--4u=L{G_2VQyqG|TMmRRs)`hCwxAz9{yV|QM5j7FbmH-!wvo>- z^7afP(eGEihFtr55c0;uT38<;ocI&Ul^n$|+PQz|%xLu2{&VP)Am-i#F=z4G35(VM zkRvhB<*P}?S(1s_Mn~R+^QU7ez)9t*amLx|9;;HqguV3(bz9C zm<+4}G@7ZVL`24#kK0@cAEe|#pZo_13@#bTH*Gy1-G-E4bj&Ro9S7b6VR7E#Ff^uZ zNk~zt8gdhwphK@tWa1i8m^q?0qLIIYjh<76ur<5dTE*<9ne`pDwT*W{Zb}x%KyI>~ zHMzBUS2Ah}itM@Sd^LoQz72<{>#wj4IYodd`0+jH^M4imlQm~P_BUwCvN#G&u?oFn zP-=AsZ9#uZqmPlbNUJFUK|!4F8CDY|ry4qO@-E2n8``#s#{SGG((~D3u0TSzXQ#3T zaO`Cn)6VQDmyAws`4H=V=K)CfDR=6S_6Yv1GivL9Fh@$^Bv#^yd@QG+%6T%&ahN!u%OJ+!Aeyxvz+(gH;W87g=Fsl7!qJJ2 zRnY#coU4kBwL&IcM6B*l`T^B24rbjL;3OIn;GhvlGrNGD9v>7kpa`9+0Mx_hcA?uJ z9@&oeu3L49u30C%V{|1y0;|e~gtMKvbSW>yu#kDQ`D$jBA?<^tFkpWb0a_&>L4s-# z_NTwqpDw=SniA4NI|9wU!bJLg8%^pxZB^EguZad zEaWzT2tj1+3Xg(A4@5h9o zr}i$cU%t_CxHN@gTc8;Z6`ip2FQi}GA_ReDUfcxYmz_~au}C=U9*Hy)beoeo9Br9^ zk2zEp(tZDLW~b;Q6GD)-q|dI9;2IZXcFH<4)?5I+xe-3&kkP>bXWLgYunDFQB;|%> zNy*vntW-erGeYo-UnwvcBx?%2a`~}!^aC?OGjIKou7St<|JbAB9T^r4?HfGGMzvLe zSHz19*aPc#gJpD0603NNc3fR3=(DgZcMHeSWqaWlIAx%}KiM(|E}0e25yExeytoA# zV{I8~Kp>ZsF_%S4C4wbU9VEtX;p`}v%%V;)h%_{$BnS5*+ah?jwJjA&3z663GLu>y z3VTd>Wf*-~2$RMkqbGjI039=?Yr!@lW4d0PhSg$?9gsLyU(`i)QoAlz)te&d@ejeC zT}ef!qMM)rCSL*hVTM=Ci<_61J0uCF;`7;Z)h&_Nli)nFa5i*-Lq!MsZrMe@b+*tC zw);f^e9YSJqlCey3M*an0jj2~Ce!GO?eH;&ijEhKwLvicxSin@p9>z_gsUp0(p1Bc zjir%!7Cz&U(Gw^CdfL=ZKRhc0>~PcK4E#8|0wujT7a_zpkD=%_l}WU9mvH9@msp?% zcOeslD00It7<${5bhrzU&egobgV*%`ddNS#cK{XkUwa{B^w>)Bwn`V75LxzGQ+N5I zb!^_1(diQAY#<~?kqe-!95N~-T&Io4qwsPYg3H*2!X*!|3x!*^9x^U&hpw|Rf{@+K zotIT?n8@la*1{Ni@?1vJuAn0OrZuh13ma+TJRz84ZMurFfXB5KUEXZ1SqWIG^Wm7| zkkN^U0l2D_DWU%(47ZpUcP=lsG3O6i2_i;Hn(Ba6ENvZ2d{QQ&#AiI$l`E?O$oX5$ zLQK&&NEnf4Ufi?13u@(PS%$fd1nCMv5?N;$jcQ>_eH#;wjdIJ-6NTG%eG3P=Wp$eA)a)pi%;H6z4%7|HU~sUTnAl@>D@3BvQh*F5atVii zUZIn-XE^#O1>2ibh62C-MQg#p-c5nY{t=4V7M8``FjK53c7zMnYQ)xzN^N$x(~7g> zI!p-1hF2D$X9g$RmefZPi=}N+|~<_R$I__)>_Zq|Q+8DOc74h${tSbly5ee@zX&hACj8S=lKl<|vOD z_olUeDs70WMM?BuU+f!3ms*7V=$HxSfm4A6m)YOf*9XouTQ{NqF$vqZ@(GJ@W{Yu= ziMwT4){raN=Ih>KSYuF8PE!<})Cso_ucV?Ae;As*@u78q_xaZJM&!^7-(&CiWrGmH z1QySRbOr46%H}h*N}--ED;f!dD28kn;F^yqg`;P!C;^sC@q^ z;-u7+AhPbL*Bp#O4n@FMv%r?)kP+{@kSAisq(2$zlxD|2jE7Uy7v*wfV`YaZ^rj z(C1qm3h6LblF^ChTzgs}#`Kk1Xrj%Xy+Sz^FU`CQ{;>6sXHf!E z%c^!vMlE34*!{_Z!=;fGBj|q|!X3jaspu#Hc~x2wsBxzdQct-TN$4UAGEGrUW1Vmm ztH#W{N#^v(kSHtMG$X;zyis#2p`-tJ>3sTAb|C{dy$AuaZ6|Zc(dyCFNtKB7S~GQs z7yGdbMCM8=I;Git0WEifh#9Tf^JXwvIh(d1S#n`9bdLvCjzeYrIrn&l4)AuVg=^*ZG8Cr@nNNg4wD}Ss|b;Q8oi|WEqm1cq&eZT!M0b zI4C$&B!By;nLgzgf;~U3O6L_gX|IYh`A}5lz>)J3kb7J*I)2?z6aCXmggV}qeTz8! z9_z8HOzJ8b(&U>j#T?Cu+lXYB!q@MkKJhoPnSS_ESemg|*YFSkyzUwhcg6Z|?{#!T zJ~pq7c?N+G@X}L?yXGI?53}51&6$T3n0-@0;lIN`UaC1zC;EiGiEtVfZ>%oHj zauA*XolDW!#0UWWpWQ!!LLuR5Zt@R>S}(_omtT%6*PG>ni5VF#C0Bs^uHY4hE0$tH zT~VQLQ&Iylae5NK?H_W;TCy8lh{4gmDu;J`gypXaG~LzfO5UHi&FWAH}A?<0M)YY+9E)%#BGF9*N1_Lj9@?|rKG ztG#ILUwW@Rz`JDK#XQx}rrvn3tykJB=v~|M=bjhWUDxwu&zF0S^<35y>M`|DJu^N1 z-EVgPY~4inqw5}6r|SM<_mRQZyKC#_y7zVKx<%bn-QB$3@qV)IIPXE;o$H?AUBB*) zk*7z#J#zcH;>fil`H}gNi$->@O^u8VzdLl!@T1&_$wWCk|N7 z5)XBqHFH+~(3?X)Tl@W?M+b+8zBqJbs5*GnU}n%g_>r})wdb#$U3=ERI|DBde0Sih zt>m)dxQdF9PD>!6(yNOib$G_Z(xd4{9QWcnkD^piCY#dDDV9zGZVc%QE0ra4cs^N3 zZTizjh*MTZ4kXQ`0^#ze=GFQdE~%3jx3cU;;;wobl*pEF0Z(TtiheeGb0iKP-8gB; z%ak5mFV%;}uWL0Q35#-Yw@j$WFc=9%Hf*%O(nC&(mC!=&AbU=wR4IcadbauH6aoj> z90I*;g5`)u?^KcQv@4gamkN>0=uK=hE(2sn&nlxRqFR<0^)|wg1$Ml*eQMH;)>47*~-HvBUma0t^r`%?zH84bO>N$XQDOZ7 zR0J>hb@@bWeS1^}hXTiqzO;hUgd|>ltot`?`|519N~Fp`4<3=bR0OrA#?nETFT(6< zt)to~$gDMN1Dkz1qHw_lH(iRQv0z0l4-q|&vGt{S_kjkc)CL{FLP#2`2PR%)J1Umt zJqlehRGANzV#U~|U$A7V)^z0!dMxF1Hlpsp22Y!u#4}B`Q<_Mc<0W-;?R#wNl)f4x z$_`8?m5Iqp7Tb6?O9#JQ2W}KQRahX|JV52bJ>OspM3G<^)A>ueNRhBX$bHXiEqb_4 z;7W3SUSzA9TR8p03Io5>~V?09A5W$i>JaRX)a9KYg&~m=}k5xk-1hk z!}*{$s`tUGr{Q!c#FF*5GUNlwa9&lhrJb>ygD}MOf!KJFZ9Nxp5rjD|cBF!O!cPUe zpJC})nH(qM(s;wC(RnLb*`^m+dctE!V=-IZR44WEcsV@&oi?3RcnEneQEG%l)~1UZ zVDm_aqbgU_raqvUk5%N5v5)MzhpitlDC~sRu8lbIfuda>S)-ijnd?@D{o?REVbn&V zWl6Ld?D;iY+ZRbkiD(rvj#u&`(id6tW0r1p)?-AlXh|D9c(y1D^ZuQs8-j@n;75fT zwbH!S;-?Pu9bgM|elvz;(m{LlWVUaXK+!|QKk3&a+=2T$3>6-y0Z@zccmH`#WuoIkHNm`d4Z?^=w^C z7%-{DV@rD-x#T#TU_Df;$hEjpku$_~RLtdyO!T*!57pG6B&JV#4|pIIcmS}qM$Tdj zs-{4L$oWakQ!5#h&A>VrOE0Ah6+Gj%&xsqmDosR;N}sqPnB z-Q)uE_Fl!dl1n=Rcsj3+%JPm_HBImioZGH%HB<3ON}>#VZIxnt!;jkaF}oXwr0HZL z<4k2F;=%u6t0$ETdl+&&#wGUov`WIegRP#F88T$e?sJ+vwxp*Z8@!pVo(O6TgxVib zdDF2xDIfnnTRnk8GI`wTQz-P-vX3f}{flhTs@Kcbk4O_{tRTw3 zyC*^fB9R_1TRkGu#^qs61ydMf0e5)V%~lVE%6hzsJH2VEDXa9x2iju|Ibu>wXErng z*3to6ywQJmYu|=K3W=HUG_3_iJQm0rq&wMWf@+5ovuG?{M=W16n8a(#ZMsyeB`R4l z8S@khWnZBGB-@*SvEYt{et$SZ z2C5}bI#|vERvYhj_JesWuOace1}oVe0h1@(cMVJTid|LG) zsbj@hGbm5X4b^;bN zG3me$S#r9p^#u)(Nim?VHRdC|0k)MC{48Ggn-5gIGC~<}6YDNw3li2$l?*AA3S}S) zIkl+q+gpnhO^8iaOezECB}b%2#Z&AeMB`qS7Zdqp6qVD}$Vj5==j_jh9W{@?X>rs7 zWUUd$y6$INCuMRwo(+aIgu+xJ8_}%?{<~EWR=biEnZ@HauPm1G=K@>Pt#-m5RfYg; za4W7;_)-OYYm%+*a|c62xS6QRWffyN9NBtKOGrjNzJSyYfIyXGL1&9@dAmgo*?k60 zr0!G~gLY3XKK%!_jZlfmk_SW}PbiHRCkw&pm)X91BT-0&A@$q*j%?l*pMJPiKU7xu zLBiGoE)AxZX`SimD_Znu$llCgqB7=nTY_dWC7F1Gr3YhqI0~#5OSM+2O8t^C_CSaR zW%)Q6HOSp2w^Vij{J$nO><0m*)Ps9cRMe*Rk}5T}j=g<^Ww}V1kdrz|z)~^?6tT@G zSyl+U!c{32u;NKgsu@V?qf>uld+LbFK|fg#;US4c9V-%3e`yUYVwQQ#o|M?H$=VHC zwRGwg_WltnMl?}OM>=(mNG76>1*aZwwG)BpC@r4K*v(o@WVWe;Q;)Lk*d+}ysSWAM z&WN3ggr@Fi$=bRCBkU2a!yKllKz!+AM;WL>MSbRP(bv4_WuwNY})5iI1R0)7lk@(b=EFBI35^G3h z4YNd?samKhmNO&qpw>c^EzwXxVr&AdP3hQPrU-d4W3j3|zJ@0WVsT2)qDO5h2b>_z zQo~cO7EHd$He<%4S`#LcN`e2Y`k*T@`IFYq0$i5VO2|?*gH7w#$SvW?|3uF`c52Ik zkS(E8V$~`YX*Lz!d6jfB%6{OB$>U^JR?(IWvU*8Rjj{I(aKk4QL@FZBYs;CeS1aqz zvh}@bbCe9Ia7`>ADdp73OGI5(Ly4#!NQWt}P9H8( z;ePgt5Ot7dNEO;lm{T@=-JnSfvsZ*DWSk{1o7Zkm$HnfbKGDry;iI-j*?|W>>CS|dn2ulY6A|gt@qM=v}6fGL*hEK3`Q`t(9ZiC8S_uvhYGO=cYr5l4jFW%7T zBi@|O>mdT`uV?A{nkI`Gy%|}tiZw#IbdM6~2fCF}eW>on0?kSUx2cJ&ALohL54iqz zy-&93T9+74rA_g)${si19WMU3#&FP?y@BnuckNrlx=I#Kovz_5*usGW z#`qZ7E)cnkxWf%>T5)?r(bQSLV*5iC@|uFm;4Nnem&G9-o@U8pQD-ZqJV~!MVV6dv zYaeA>AQrAV{vND}~psnZzsTBS?I+uiyg(o{H%gj1(#xQiNB$RHhgfTfqhMLAYARy4RN z7I9SYvCCO{F=Dh62~~r_6K;D^mD+fmr5DU5IM>ftdo+enDcbO-&SDGTM6Z-dZLs2U zU`nIN5Zv@n7V|XL)%()$u7MkeEWB9Hj{XM*ON^b@%6Ql>UI4m8HV{8pk0oS8-dszE z%Ju)p*qa7OQdMcgowe^(UEN*1LswQ;v$q*bMnM{a=st+=iFN-Z`}Q! z^PKb4qB>eKgRIUEh|%(`amikM?I;GAEF6GTh8JG9eD*#BA^m#}{EX@m$LaM>(WDxvi-F;~H<&ZFBZ z(5?Y7Ix%)5m_+V9f428p1$;UCuRN`QV8u$F7Mo%tp=C8mfRh!V1rs_5&S{} zJf6^oOHZpvHrsj|MSw*sTrZ~#fPqWaK*fN#4_@tu2>hr9Uby{$?3EGr!ECqUq72DK zo3n~c6e0x9YJn?lKq~PvgVXib*H8D}-&zJrmB9LCr>(Qic*X65H@hcKvzeNcKDQhTRh&$|&3=v1S-wq=pT)#X&KTw2- z$$gjgzIZ*DP#2@ywnh8!mRpA&0gk?pgR29kjs?B>hUMAq1495KbL|aVjEtP~Bl))F ztF{mH8g%9}Zv(^efEXizpL&7>Fv+8D2ODU_pXxYx0Z89~0JC5L!=f?mfMkH^XP*RX zoeC0UziwFDtSvw%>NmDM%6IwCVznNE=Y= zsz@OSq5l9CmeA|>A6s78u}LXy#1Z>0 z80Gs z!1~5}mro<L`oGJsJxD@BUmz4BLSB>VIBZkV^-ZHn$NJ$LR*XzHf1 z7bYGU1w`thi5S4_nROlboG>`Pk}nD(lkDnwALq`+DU|peY&mC2(TO7;-5d+iKS2NG z^UIJpH?$7%7qXjiV3y<60G_%t7fFBeqX+)AI@eQv8X!yH3k4s6>(l^%g~AIu001maNmJFy~%q43UlZDB^z?BR)_mxg{g^u*97hwd2a4#kG7L-f#rp%KMz6yH-k zuK0xFy^8kyi;8O$=55>NUmSP$JSRTf8bWv9H8#4&i{@gTwq!iWH`p-hKO6Xf zx!EkIIE^Ntv3LSvxY@sr^SPj{MLMiO9?Z>6I!%YtSnktsN!m$3#@M!tiFoM{iRIB8 zMCA)5I!}4Iltx8`_F;KKQ)fwYeoeHcn}J}8qXXyRf+7`#hks08*E8y%CQk)+VtJv^ zDADS4ku`_Anhufizl!DgR?$e;;<`q=M5qit(f?g6_p6C8rPFz;O=qC2;^RK-Y2uS! zT^sVL`?}QxG-@pp^?VY4u)qWfl5uoe1`E&nYo2?tIO+^!6Ny|aU=mF3Zq9@4YTEssa37c|ME)uO6I}HM;L3Y0%tBLrCWI5#ZQ!PiZS*MO-t2DnB zakbJ!AsX{J*s!A&&gm_w_y}(%NK4#n3y=YCTb0~zm48+h ztdh=lwGb5p-JmaO#GW8tXxkl>oo&-h*_5_>b0+)<ngS6?U+ZCkTN#IO9S+-v?o5NPi?GGWP?3W@z!%3>?u zYBq~pDPW3qnwmKU))H<-d?exU6BWAMsaMsPu01FhG<+p8(~cXx))3V-<`l?qysM;wmJa;OK0OfIJxvR*Ow-d=QZB zX$>E2**XSSRn2K|^`JIjB^jHqtaAJLgdw&lVtJrwtI(N{tD+*JolYuu?vt`ye&ns4 zdgV=hSuW6pLR77q4^|BEh_0I7g^iKCKMlT;nzin<7wSSImC?L{>-&S1CLQUP{C+%AQJ0m%VJ4+#Zh2dGs1rB4LECVpiq(UnGkp848s;#z@2kXzp5`{urRcWd%e5}lxusfRvu`!LAb zx)58k`JAmx&(Hhb2XjH$z z@=PhBqntKxHxl$S08urBaeFc)!Js26Rv@&{gnWqu*h9)^GD)My)efc|S_n{MWP2~4 ziDrG|n%nP7nH?HVpUq$XHCes0;(`1_4qer1jYh)U6(5o1mQ0GwX(J)O&~XLz;{G4X zaylEN+D;-L4BMRoMeKeQ%hSawO@@LxqqSW&whZ(k?7rjE1#gWqk(p$HDXb+KXxE42 ze_*;XDr4+slMZj!V9yzzlI7|I5QStrWzka%$J)siZ0QHMLo`k~XrZKvWK>i*IxQb+ zY1#vv8n$l3!L}(%pD^Bm`zO^jTLM{osA1OS66uUXC-;As?>;JF6_I&DsxRBSg2~99bt!I7 zGNH;7F44et)6OFSz+6RuU&ijB1_onqf~h5QeM4*0POhH~3W`&4yyPChJ>s*;JQP|;#j?KOZ4d+|y9 zyNPb0oY(3Ck*>qwsAlc*-j)EzI)J=#dVkl^a@P|k`DT@X@MAg_t(TmRVlxn-Cf>a? zye92=36m2Rzn$e=LR_T^oQKWle1feRXG z1kxtof}@^hlguVUl_;+&Fuu&2j>>Az%!$NJHE{Ez3{Zz6GIU-|%jfOG$yWzynKW@W%JY{nvq;os9@t8gzr1zhcUTSwK z+}q}Vh4E_hx6N1PBlEiX^Wi=9$GM-+{S&;Wq~}y|E;x6^9D4Q22WHmpoV{^2GwYe< zW|wCtXHL%iXy$7(_s_g<=GvL~jQtHysIN|cV){MPt?6r~&C{ysJ@ABjaq5|=N2fkE z_0Fl<)KydZsSBrePX2N7-zL93`Gv`ky#9cioSXOqM!8L(iM5F|ydW>0SOHGc-;F;% z{ts*8pB-NxzkWP5?jC2y4~|^xUfw7U%-;REN^zqTZ z8-34cYxJ$7rcu@Co>9ffuScF4`SQrUBgaPSBUg{`BNvYB9R8o-pAY}j@E3WN2k*TJbx@+VhHkP<&2-6l;o?pQKw5}E?3IUl?DjHQalO|-K@E>Ej6$#`OA zMy{W+RH+8xNwMZa)VM~(xPn~ZG*=}WJPR3R_eUvwEBU0(2-;|<>IM!0Es-r~6T8zW_NeX7!V{Ke3 z=5#qq;2`TLp$_HDO zQ}u?W+$A8Hlrg&xpZ~@}O;6GKirbl_jZMxh9$b4j{)d9ttdaqn-OO8q_C%OiJX@9v zf}SS*E@QZ0;dNo^@Bvw_?UJ;rTzA@R+H|xiLR+ zCJk*mX|Clhbc#BPw`5~}txUnRtf^XFtHr??2?E;)jQLVJPIh!G7u4oRC#T-GDk~zo zJXtZTRSp-CG7GHtias2~nCnoSz((4|Yz>eE7k>-a&echt$ak7*dnqbrP_S;kzbohNy7Lv&U0O=FY3LW@5) z7wq^$`G_SGV``3qW)@%jj5&AHEmCe>UU2&Z8fNmpVd{$VaR4E}Wq%x49Bz-Y< zk{h#Xvxg|CV-YuGX!MjwCw?dzGc9w1rnRCyTw*(J(AWIfc5dCYnR;#JJoGDS@()oRef+r8*U;(c|C2 zYLcCJo^BV`^lb}OvsDZ^jl6V|9Rt9B$xOJ+r;@BHc^)>(8Iwh|i!kQnDmAa-nXcy~ z{@G-q1mK(&*CimkRW8Zm_m?s0Z$xduMw@k+fyIpt+%NyCQ=g<9aVDS8aHfPO?^=6J zF3_emw3gG+et$gFW%E1kl+|;^c)ApDv^C{KfQ?;<;eN(MClR%9u_kHEr_~%~I}sz3j529l*OfU6I8R2#;ohF-}v3^tk#}CH_${kl+c5 zZrORi&J?MnE`MB>o3boX&9PukiE(Qtbz+Y^&*GJGhOqh!(NxD!RO_?44`BWAu+`-% zS)0B{LIsD-(f^0_#QlDT(&`);d)KC|G&5Fw2ZvV-Zzt4Nhri%ahoT}q@dLTOF$p-) zpx@_)^cm2Gv;PUy1GWWl;F^%A(n42V1dtr~)31PR@wmQpT8C zt0tXlqtU5#g>=c(d;`~yHiZZY24tN|@LB3+>LR({qV;kfOa?}B7=>oC%EbixM zoepHn!K}$hYYkL-Uq{xH(5h*3%Si#>X{zp{7UWGlD(K6Un$~4SRl{60lBx&f`Uc8Q z_%rQTvBLU-?Ysfs&yA5*TTd0rri!!S5K`fkZ35~`{U0e(ZL%nGfx5w_hnMl{_i%e6 z*{Ul8#?m6}%yC!Dpp?a;$g8bRS1VN|yPnL#`LZ}102@Q1lF;yee?D-Y54R>_fo0nQ zYD2p{Z4y{wTHZ?|hEkM*M>v%$s2Eksm2=8h2BBj&&^BA92KdRUfzL0=_bH*R?obuG znk{BCX+2B$3ix*g!Dx!>^#(H}Ow#9bOCJ2Yf-mf#hzjgT-VWR5l9$P|Ux2p>S#|20 z5lR=Q4Qq+ZuxZ8!@t7eWNc8S{U!{&1U1yD~&9O{(l-SY!Jg)*mjB1QE)3 zVi^E73T4)TF+|32fG80TV>o00Y<|g+4q|JWG3=|DNtRDH(si<|vL_u6_0_K#!`f_6 z? zN>NL&uBGbnH(elC_p3^pls-r~n0CgJ&_5=N^{%4Fm1jHIHK)tRF(Yr5)vy`^nF)G4 zwPG{N2U!L`=Z(PzttC<f;U*JtBp)roRx1)!7}G30IC%X zL*Bh=1z61F`UQ8Ct|m>4Rc#b3ZgJ<>np}|Z^RzV)iB#LItVx|?|3j8LnKE6iYR$G# z$kl2j_40i%=m1a%8!`t9Mn|(tMqLG5KhQMR=~|;vPuOFXQY3Ny9$8+6ErEh4KSy1c zrK8caiFyVAN0j!EF^=nz4a&^hDA*qYH{hnA>Gjy&j4>eOnED$2sNV_py zv&QDWgh$42EK)&pD5*30A-i?v$Zuq^R;YQ)HB}dg!bLv5XG~VZxvdmawCTa8VbMC6 zsRg+@u<&xlP@!uUMOIHThjDc$xt3++;H8il$!59ePz3Q|bDe)!h=qV%r$ZXU4srQ>6@FthFi8R?qLgAL|)NqCC~YYTPNNNNLsGC?9WSEZ(g4Ik~!(q|EMEBM;!% z%o>%q|5>ijm12}Fz^QX(u@SbWcFJSrCOsiAvlJnIE8wuVSbr1OcR5WW-RY=vHb%#E z4b1W*vfNzGQ&Ee-!05Zawl8@}31jna*f#br!X#hZu)Q>bo_HK0q%j`gs}df- zwJwo#VHdhi)To?pRuB@Luu zvP0jg5r_aGI+7V}&{od{DRkd)@S_ii(e_KulVbRRUSjb<2<(NdF2K_zyUI95M;^T{IG_ETx{i-&}yf0jIV|M{gLG( z3x6RcUircK=%r81E%l;b!oULO>0SvZz{5mk2!miFLy3T!gG8;+iUBcXq<`W_@9r-y zUoCxuM9qd_07-u)5AW(&*lf>dQyMmh8V|vL4~Wt64}U`@l{lo^v$OZBhoC$6L!Kph zWGYReSf)~)S~>0@D9XnmNNTV;KOhFuJCBF;p8xW&Ac6|PI(uBp{kG?BS8t1xjy0;9$deKgK z?Kuq_i>6bS7={#m@@bfX17%2Y+duco5BBvYo{>Nt!n*e~F0*SbW+2Q5LgKP5cP9oB z^q>1Nv}Zt!L+I~*_H5|P=Ok$7#p}RrB(JMlups8h7!l4#BJm2vXwW;KhyEB8Ln_S| z&e?eGx)J2&mKV|G8^EV`=nFuB{nD$758#D1^;1BuI@kTDztXHvGAb|_Yt+Sz=!gmo zdj5ydx&blrtbFSTQdw4Z^=v3`vVxVgTZwmjygpir*#P`qT!EqDmA`Q57Lla51^k{{S=^|?3rcg>EpK@ zK?`VRFFJVt&nJ6N{1h65#;)A;)&sWzOM#4p8|Yr>^_yPUqSs|4T;X3N0B6AodHx&( z#5d&~es3Y-2VfvDrlP0+ZFx6(+w)=s9g8*w64;*R* z$P>ux3J#NlmJ%5Y1#4dq1&DLONeLO+2`R+Cj~gsNZ}CBN z|F4%IIiQEU-H+M!CDEJ7=u>fY?kmzBJRn9V zj^(9Myl`*tL$64=s;)WRCIajh1uAQZd81s~Z4>*`U?=*_A7T6k%3!Y?htpHLycbRW zMz_owBv@(mK0BpcogWaR;|qs?-_zgpqdR;7T_r+=OtD-*%OrIA z{#Lg-KOjbT)B>wWwfCF*dx>%7hyrVS*M#!y1J|r);Nvm-h;iWYinI#o#{nt&+POM= z@0mOed?~*gQeLz@uyS=_P>fT%d}3G$EGfZsxaz0eEkbXP z8MGa<^=rvpcpf| zSSFRmQ`fTOwviWr9r{Z%)`<^HRfd&{q%@y^K>||IR-hYj^o{6hl$v!8uvdUaAd_hK zZsn2rL1CX7`c#6hots`lHugaOUc4@mH{qn%As5q0)4D`~s1v4|p^cv2qdc;r{?^(?d$kG^rh^@I{Tqyalqicb9Zt}A*!+M$Gm zMWJgoah1|hm&eTT zTv8Mn8;NezDj`CEP*dC+Q-cjuLtlI3*~=f^uM8=+>)a_ypiF|bS}_ZHM<<5T2cRPc z#7O(g2UaEOxBb264=96*?LJc|>!DNxLjmIyS7>O^?MLCBAe^O~Ul=Sy$Gc95#5qfO zwPO6CiT@b8dvr<)zcC+tyX&?FVEtG7fe8a$A4k_8f-W79_U?Jf4tZ2lN~ILl&^djV z8|Zl$kY|+e6$9e_fb_4ygH~-`3W-Z^*(y_NKk8=jw)UxeStJW=IUxhk7sNRUUn z;PA(#&zuMh|cMh$1v3VHHNkMm?ji4!vXk{ITuBU!7l^ z`|tTe$fTQ`M=+&?8g2vAd_vpV~3`+OP^^$RRV)O~czJ^OOG3Z%tl0@`uU8QnH_spN=>u zelqb76Q7+}pZFVqg@0#AJN6EK>=#4j;XT8j7z+=-XZW{@yNAvn{{G14MmC1qBiBzP zCL9y$iGvfP%rxGZQ-Z+}ML%R!u%4@o;D@!M%wsuP> zbz9oxe(Y4NMQfo3t*4BsvL_|wvQkmA@PwF}!fYg&_UtxReegFjKuxpRi}PHZ`>>8%AF)g?u4&m7+p=bplM5e7q6e z`C;53jm2%Gt*Usuu$E5-VlMSg>~pCF3RH(SC;>+El zrm7X_9dE<-+LO- zFhss$)8-nwwiXJo4YjHZaB+$jItFi2?Pf{!jzhSki(*7it6WyXQ?oT86XYzy@GgVu2wicr1fd5e0J!A+qR+i zp15YuS}kq^7-F3>dFgJ{>G6vPE&U&;lC3ODtCO}sE?lj^YCCXyU*0ffaxs!{Gu>QR z&v+}*@lRm6vECA>REx0+F#H}ew{TfsUZdlzmP#`T~Q0Fd}>c!uQj-|4)Yo(?%js#J8Tve zZE0&Lo(HhBIlku)eR(~W6*wwqqq(BH#nu0V#$JKi-!u2E8 zgdUPn#S>lD)-lzSyK$bbS`(0$HGqRyg_ytGi0Go(%-}h z#e=whCEm&s`DoK#XhcQ&joU}m z^AjI{`rsz6m&}l7i7Ql!Ca=0_&c~;Ij1`sme3McqycRKN$j2SIdF)KAmneIL5R;6N z_B+biD!cSET;FSL1>rhPs>*CA9!w<1w_~{{u7a>4ZH%|%P2pgfnEsqB=i>G?N(h%5 zmQ2P9(E{V|#|18tj8l!SSHr0Mg>aFXmE}%@UL<@$vgYpUqpm1DEPt6vw3Ad!pYZ!F zRl#Y>Ow)KTFfxSSmB;|JFGLyCsd?<&tQ#El3Z3jiB)ZYM2JmunY61T)7k4t0${Q)S ztvX-TNsJ`0oJlbnpaSih9qn|A>12mpSid^MSM|9lq^?OfG`Z*ygR83vON2pc3 zPIa8|=!^}^34J96WVewL?A5g-6(7YwiMmP@b5vIA@!8AeMkGnhI`E3`hOGvxKA9); z^+u75P0#h!)Y|T-VU5fgctP4KI)HM5>@$^gx|3giP(KJAb zxuDHuU|G$?uVlH`)FlnorY%IaYOtBKovT9Wtk*@EAziQ8lIKf!WX zh&hUP`fSdi#px2rDGZ;eMLO9gnQpi{MA4Ar9n_?Be}nn|7yREN7yw!eSSlroi)4*$ zui&*a#H0%UfX~=v$p}TTWg{dla^)7b<92#2uBIxI%j+w3RhNoRorSBr!Ae6W3l4KO zFWPDmQPIY7yGzWIYZTcLxp=GuJhR*JVP3P?Tw02Al_M#WGp-9!+wlfbgUsd)k`Zcr zr&EcU&D1nLgKOrh$4cnF1V1GQrYL4;?le>Fri5H`EvvQEOVA zDkHhp(6lp?H{cJ@ddo$&lBmbYhES=Bv)5uVr_!|pYD<7HwxZA-BN{Abb$L5!O&PtW zcFovK&SB?ojiq%|IF+i{Rqj~Tm6-Z_{G&{X19*lxUvt<)#;`p)_vij)c&)}5(gl;) z)y9Y%U1H|njjNN|R*-O~TLN1!@obo!Kf5olLUx!U)k)}+2>HX`=>!&W;-R{b11i!Uct zK>v3rkyJM|4zX6}iOD_vF|2ymI)I|FQku3(t5FGwNql%!y}^bJa+cO?nnao7B8gE9 z?x}jx4IOPO$BIoz2dOj0M}L5uY`_z`mTE*T7#j8mOn*qE+)f!4=Xm^ZrsjVX0pt5s#XQ-N6xtyw$6FS{M zG2+N8oCvNP2hlVH4Rg?#O0S_uc4rd>sm6&nq0c3$oVrkU0ekd;pxr87=3 zo7?{68vb2|Z;|4n+hs+BE7l;If|Dz>zEK7_iUzxW2s&y;r3K?vXPsdVSlStSCt;ooGs}oY^CE(-}zpLIML01&og^ zaMuBoaX^iZs+EU#ZdQt3*tpAq9#U^@YGRZd2kggy?@#uI)dvnobYoPx3wW_8mU?4C z^?_ErZ%J3e5H{~HQb-Pc^(@)d_PRfvnMvI(ehT60geNC}L_1BVSoP1UJ z!R2kIEK$yo&;?ReU|i1UBLxp|IU92VFv{Uxee7c8!p_aApcnS7*wKZTY-xwO`4Z?7 z>uqabT*S0)1NKjBCPns3Vb}(WdMC%O2eZ^!mqQN#Hzwq&7TPY8HSa70V89?Bb{9zQ zBqQq)0`l0g>>IN6Y+Cz&C%x+^*Eg=luVUN=x)1metw_~9e?^2nY-e3$K0f|?`LU&LhNU8 z@P2cis>c8$=4Nt{a0d51Yk;m9C_~46w;n-HUAnTnw{B1xB$Igcv`Ktm8NurMo_UMa zg=qk+7NuE&K{QUA#4VhrT_tTEPr#ZM+nk_5|Lj%nLNg}i!u&uPI31sqXsq}5awa7t z`EadEm6_oV7eMr zy`I+R3O+EZ^VN(sDfP+f{D2f~7Zj`L%DqdwdoOF1kl!P;-h^+#WYiE<>eCaH!zs3P z>Q2Z&qt9DG#ef*Bw!qy4xiIE?D>iU406A0bw2FcCN%fa83Oiw728#Mi7d(nH^Sz!^ z>5`xhdxHm#jlzzAll~0!9`4!IO*>Vl?*URSZGQyWQMT*&xGOvX($y zx6~D3I!tACIDsg(V|u(Wv<07gx$qQ0&D!mGCY`kSwUuOFCCFwOeP?N`Gj87S+| zwNup5Z;^JlJ_CcqYz-T*2^h2`I=XDCEzQ)W!)i$B^oG4{)4C}7Y~!z*;7`hX+xDxr zP28!tYN{}|I=pA>n={rCRQdE3FC*0p!(J(UAF$ZV4n$v3#|J4_S0}0~IMPgBM z9t?=ljm~GlAGLo8*l*w5C$v<49^JsMoQwXgq&#reO~Sgw3qRcV^QtN~2V8*dWj+%v_%e7i2~D8L zZNKxpD|&y3DxHc2$g*TD5`k_zTW`c6cLnmt;Wr1Qz%KOgxjmqw6r`j+UHCohmCrgd z`5@u)q>?IMu2i-q@Se;il-m~u%MhUKmc!1u23Wk^S71jqWa@U07rWGFnX}D`9$z*;9?LAs8lDys<@!75c2`DhM3-c+v6 zohe1jD>o3mL$6%_HsB3!!!8x^=LjJLc(SZ6=Y+6tXdfZ?!7=u9750#GJ4)aU->eEc zQQgp>8-#PiTWwVxi6ch`nx;iPSrp+#}t%u2%}X{pqyJuWiGPxC<=y!08S&qkNn| zw_mSZ-MLvIoHw2=`7lr2tghWQ>>O3j9aUUA@%YSDV=qs=M}m~b0Sn{WfJ0JVIv zh|$SMz9ZvsU#jfd(fiH2l#rFnydm+O$NPI)CTFY)FG;=xZ0g z=UjAU9ny?7Z-o!rZ{7e3ak)L=Rzt;iRdmXv(WxUz^fam5fj)7ga>v}6B|xhvLKpo` zHG&+I2Y2?y-X=B4wE>La@@N%xMiaQtSRtz7Tjd7ez@SO13xi^G{M(?Y4@k zmQvx3{b=ePqX!lDN#xA$hE#Z(jo0~(vt>^JQcu;55c#Mh9Z|IVPFVJ5N`cD#y47C! zPUVmSA7bc3%7X{F4WRXvkHw~s?~ruEROtxSs458WMe(CBu?EC|EW4#o>9-qQwzPN& zTDa@x5`IsKq zs{0%GF62aTlNl)L@8bBx`W%AW|9;!XJP^j=shUxjYAJ0bOl!(1rpe)^eE$yR_SrK^ z&^?!`BqaY)AXj~#^p20TRaXZih<14?G?@OPTW`<*9$LX(6 z+FUAzjAi2uFyc53X%;>ANl-W-MmOsJ8RHLoj{Bv3(6zA>RNx8WP1##sqLyuB$)Gtc zI^$^K6QE*14CDCT*U^Bxde?pedhnoULn6wp^|!B$OXpdhAGW=QvV!)KsF2F2)!Zz`R=;m^W-aN_~xu3_)cS0u!h@4(xg$M#NK zBqOeJYytwKGs(6J!g-2qRQUp&4Ih30R_&Q364+VYyYi+zKsZ);P#FQpw1af{!5-p= zXPrqPAUkl^Njf@M!z&Le=a)9Gf)vB|5a{lkr}m=cLt9>*zWR`Iet3Ff>kVOY zma_!yBzbFqVr*hm`XNYteWn=QbCdUo4DY`3gRLkEJ**7wksw7v)(X(B0JPJYbMcUF z!4I_4pkf#L@xxMEH?0C+y*2lAN4c?5IJO7C^KagJ(drJc<`Iy)STYb1P7{Ft3lPKC z6)1GoBNBdT)6(AYxBWZd(5|>;WgK1bWhF4Kg$ybIa?`?13|^-Btg{fw085%0*}n`g z(oIXziC^4(Dj>l5c2IQoW6H@TNO0SB@WC`ZI3ZF&y4VU`7mseNkM2O8$CNv^sL;FP zhs5m)bonhSV`%Pi<@65t3Q7P}9DEg^;{cJ>%^}YOvjbi6xN_IhCZ#YTdJ5ljcPP+n zUsX;o4sV;=Kf_GT+k6tDr`~m7 zriZ>JArJ|%p(+xsY9>%_=1qaGbYt3L8I&Q68)^q%WWNiv=oGl$&5H?}a4@^QlH+P{YzX4aQ zfwKMtmBLc?^p5;rcmu)8mN=*J%C?JIx0cYjyH0o7pY1j%^zLuMjc-7Vw%rH)2 zvK75`;{cq%nB=ho95?w=Jj=(KL?X$PsPZH%kO3)%5x@Lo9}~O*%S--gYoh9l(l#z? z4#x?-Sxlh7w_#Hm6r+1CzQx{q_S+H)xy!UokigNDuY*t3DzK0M_dD<}gJSgb&4=y1 zFMkI*ZA5zNp{b`<1Cm(@zWY=@>dl66bzyMWddFW{1>onS-vi+1+ug^O;aPPKY|Fd! z%?iBt%tebOCzM)5D+4sUD?8D9o`MN?fX)?D5Y^_V{d|` zShHCxMD(N!lA5K%l!kl*)_n82=*H}$r=Ek)Zn>vTe;*!1fI&GEd)063AvM9U)EjoR%Z?Pj0^KUi-1-+u0ol=Bcjv`H0o&9jaF z-GFuIlmQEpzpLR%NVxov>;xPDLN`DuV<|2qUW~kh+Ce6ju>2A z^1^dGzsbVuDXzZ?EO-5YowI)`S?)*x>GBpJ&U9uRp-38XZNoMPR(Wah9$_`$$a+I6 z^37}i|F_B~wvGI3?ua5Wu|DG%R*pR~Rh4k>4!DGI8xs9D#=RSitt?MfO(t*M7H*0a z4juaqEWiOVQrvz)Ka=y`L95l&Z~GU1iK7}TtO;I1OVvt7NXe`#g`-(~w$8l>Jv3N` zw9lr10DSzcrNL`|=htvk4{Ru5pTMa1Gnd4v)pFMfxRRb()L$*AA8hzPC%~Y!|J>6T zb;9LMHmE!uvH%7`Rq{vCp?c0 zvrJ?V8gk`0EZgqC!VP<%47a4LFYN36_+McoIS|@75AxTpO-v3K!-wkXW0S$`&{%!BF-8xZe))IMJ+uHTTa7(`NYvsbiU>Ph# zAb&sn@6yFCxUnLAO<%{rdTpffLJa>FzGk4Tzn1Y;|B>H9zoN17>UKmdf6)kz#$)hd zvZHaZBjry1#mk#?a_^q90DI$O|0#JZJ;$Jz<-KvBC*@u~L;)qNhI!q%s~@QM#+@?t zveJR3eh)jPqiX>pc?vcj4+(?_z}Enzu%Q6mAN^Ggp=PN!a1v}<8@-Ti+R%f)-*R)9 z{)6(~g@MuQkLj*MYK9|;H&~?g1J$tKcHsv{E>xf={<94X7XPIT?UrnLaQ*7K`j;}e zQNhK`QShLrUxv%yxvzo=e)AgOdq{5urw1!Pn9d3i0SX2=$@&(N=yAb72cei*Y4$9k zC;nSGx3qZ`L>vT@<_*st+lSut+LrdSTVI1Ku>Bb92eMCha4O2v)bU4{4})dBlMgRS z2DLxIQ6YrjCJvwNGWs$D$UX){RW@#rnSM_TKV5hY!K_HxOu7! z=KU+jdNa0>*Czh9@|5DR6zT{!6)=dL4_gp6JWxd5N{cELnQb>s!6J&!tsI#j6h=*5 z2)!OUaLSM|zjDgFKfeOcRn5jluv22L0Vf+N#K>wr5RVsGjZ1{HWNPK`{D2re?LP1q zh78xt%E5!|h6;4ywgsGlqJ!u-RRKn%lVmz6brZa$&lIB@pZ)%(Z|Sd2fWGhs(8AxM z=)V~~jhZS#)YOf3T%Zjp2Z27P0DS{ubo|ha3f=8HxY#>9v;upJut7+BOJ43di7elWVyzt_I$^q$rTr$rqV=meuAmGE&?6#dr({O*7l9l!L2eq7MrUS@Iy zw${+bg`fg&&Q#kXXsK>B6in#-8FxN`Tk(+@XvIJoIx(}quV-KHk25P)#R7H@T)l1R zA;~>3^>(!Iz@h`abzx;@`#|qOr(UxL^2YMAc`zuRZbhaEQbnl)OKxmje0G$xv*%gN%YYXgh!ED47%%R1-(74S@(TVPn zzwWb>5E`mecR+wUK$JSX0kZ*>3qs8!egJ`Ffd(8V)Dn7p-wNz=n^r+5AGTkH7M^=z z9v$7kqT9j^ar6F_d$$kFg;Vpyeqf7vB6q=AXF(T4cuyCI3E_>JqFo`28m@b=*BM}c zg9*O^K1`B)Bcak?)<*Yy;g5UK!nn}hqKSPU=Ao6@>4Q_ZPP~8Y-jUA_Jubat`|fcy z4B-X+cgVnkgmwD%LtCs<*=9+yasoa1aX+>(zgcpr;P6>_M+6S7w(s zuOY>IE%j6@E5{VOc?Thok+du10V715beSwPgiNW?(}!0M@7$~qoroyU>8Vy%u2aBU zA_XQ3xJ3g8jsxb9)1QK)U1+1fKO#-=O-p-syo1M7tdXh9O|2tqHEUM{dQCoD~re2Q*+M68zE1C7UrFUfVUWUfD8n{ZwQD_ zTUp(?Ss^;{B;5b|cBP9h*mBw3a={AF3mwzI+Y!?XIdZvVl}-!IhS$-JN2NeD7_tHB z={U6&pw{X~-49AmogNEZS(LY-XD&UNz)MqO zto#X^jW4|vbU8K{(1negb$6?kBqITJicN&8Bt_uO{)h$^@jw~6QE{~2y4}4SH7gL7 z@7mCS9&9=;q-xC)?Q#UtY~IZR8Hc0?+H|HEEq~0?=hoTNJFZ>4O0Rum$n zKHiCLpx|2u${?r2g-6f}Gw1B?{e)V9Tm_a5*w$~(^xp+8Q3aWJ-1VX>=+zUN1chHp z$1Vju17*O9^Gh(NKYjL|-Y+j*xdMWGH^|dLz5_E-inWFB5iW=C87PuNZ7*K|(!0*K zxeI3^6OVvzYTvMB>_tUKnody#YH3$yw_CKOppF8jcCQ*BnNcE(*0n3E3xi^G&yKUW z-mq@Pq}VSJBjUj(^+blDr367-jfwzO1oC|M)g8!USlPZXSO%W@VSu6i>Eco3nmoAB z`?z7ntJuy4ob@(js7~;isSP)o~xw6KC+`%H^E>Zux(rk%R$a~ zkp+uzNUX#X70zX;W>G>9%OQA%6diw;1|G)Eyz#YBaHc++yveVPf9E&tXBB{&f4SrGu!DU#} zi{_QZ`GGRHA&8P64AStRa~FFCi_|FR#wDk91vHSmiD+@|C~(aRWCPvv~m1^ma)P5@2Si*{-9Mh(F#2iwCBZ{-Mz=0 zaP5L?{OIEUN7#3ONmf+*PfwoN*$JC-V7fQ3gubEscJGopr`tLAk~(+a+c|fG%q}@S zWJRVHMGz1d5rtKx#eg6pf~x|G3LY(W_VA({ro&teWq^J zsZ&)a{Lbj31LuujH~i*AX!2~)r;Ab%oHN@-1E7Xv^Cpf7W@f02!|WaGl4VPm)G+J(Mt{K?B@& zA&hP@wX^qO5!SW`E`r~KHq$Q%cvF!!r*LmD%|iVHQ&g$wj0;`tg-PsfLx-gMcA;CI z*|MVjxR=`}T*)$CnWYpioFsCPoM5)p0~nj(*hr>($p}+!ke~xYJ7A{w&l*J=bqgG@ zs4E^I>X2lYD5gE;MhtEA1BYHR0F#}!3%z^W)>ZAB{hU5@&KrOS??r2dGIEos=ms^^(}tX@e+)DG=FlM8YT2@?{W~`dX9HKZjNdH9vNLKViqeD<%0Ibm zHBK&9qQ{-HE2nyzkm!{c;hWwT4Wi=%k`?XMF3|MrxoiDcpS5qIJaqN=*9U$uc}Aag zZ~S7>jI&u-qN zn74v#@w{+V)=pz2?aU^mA)Q@`_N6)5T0})BGU5)WA#_K&duD!%fl*QO9D*JHbWLZ< zc?cFE3%W+UB=@zV=*t=S!X7fh{D8f%?XQVJv@F~G!ZUImUXBG`YS@fwEM2b1wFRF; zM#s@}ap2WMMkf<%cc9b1zf0JW`XsQ~I}cD~!lcVw<*bIZCvp^<)Y*K72zQHIg_sD) zN>3X)`RY%(vlD9Qe({RgDfGhYyZ+4Y^Pfjy%BXn`*N*?tX4J)oNq1Bo!j({8D39J_ zW_L_~h+1skv=h15+5h3$R5HLuHg8_gISL4VqQj<`Qme024ap=*s_rg9R(LXv6ipa%4;dAAS70kN zyPy7O3)m>;L%@bNZ$KH6a1rh`HM=eysYe5Hw5r0%$YL@&c-zwu*ZhU(ASzV4Yw?LH z@KVlmkZ$}ghy=WPKoAe7EgqHH7c9%rJ1yYVLxwobcj2mc*M&ofzO2hDclqqr4jLaX z9Cdjkki#5-mMW2lOimAp4%R`%^^(zxB8V1v@~(}7=>Dq#BXZ1hXng#->S=AOMA~X{ z0EWl0Rw9Y6FTjX;$ml86zr)T{Z69j?wg9FQn4tX&6VxgdjK>Xp_O0Isd@8PB%!EOiuW&XLEQMqcFvac0`W3+ELv8Kj zukA8+_`ER(rF`rju=-^o@EF%a=wONgtT{5+Qlo=c!prgt2WBS#-(;yCAd&7h?c*1S z4~VvF79MvvJgq%3cv=TB@J**e1^`PlKrYCYSI$aSF42fid}{M9?ul6zZC5Y2$srCN zDw9fWP)L>s9Z6-aS*T1}yBeNP@Ss|v6^S(Wc88~>3@HV!a(M2xqVVoy zNtC=6p1e!7qT(^NFrIA}bjM@&M8SSyYQR$!eh%;>I0wULMkhZtyAoxupIre{v{a9_ z=%+vFddhd-IJ*oU(VVN^%ss)I@Q7|&v-%7eWa@~%ads9S(Mz?WgXY_P?I&&G3q)w+ z&9lqbdbo8`GZ2glaq?irfd9|Ee3A5)*|o@b^X%lxC3>_EZuk@U+dEMNQ@6~HL2QN- ztO1a((t;Jj!7{)=1z7GG4s67$mu%&q;kVkvHPNbA-}sLPUh9jEc*mxP4o?~D62J!CGkXy=jtymeOCb89~_yLH1w3%WL)(^gXT zVn*f7Yf9NHiypiac=S-w(T9E~Y5#%V)Qz*-b600994H(=7JVXBj+P9anyPxXgyV<0mwrXvmVXk4+DmO~J_)yWPHo7#NuPUA3G{y4Q!0FX-16>~vZi#P1j1WJ9Ga~Uiq zql3>3OOAZ!%Uy|k>tR@$tK{=Z7%0CBZ0Sl&uhgZ(7Hc(u#boI355fvBrXo@L*p4I4 zFLt@q9_p-2YGGycid-Bg^(})h1cfZC!7v=XoX9OEqo)pky%VoEh(7a$uE>4o!45AD z(vDx{oYtx|5ty|Zq{&LnhGFQDhhXY@$*8zpy%RYs00TSyrP=rS+t%4%24>Ve1I+lZ zOH)$XMmPh>icFDKH{A*J^8MVNT1-X4DNT4kcnL5=& zM&Y3|B<+K+0@=99mtb_s)M&I;Nb+qqZSomI|=#?$j z_P6il-ci_m8pc3$PW75cF7xAoR-AO{qWN4af^I%CE1vlfx&73US+!^{PU3sz3SHUc zlR-ICx51C$w6y~D%+n67QbC@}-zBAeqCX7WKWQ92ITRV$JpN>#bmG=Ssx_RT0XCYj z6w;*2ts~<#Ra2I)nqviY^|SEtJyayxViKcAbfbgl#Is!y8F;RadU5+LJKBNo&4xI0QU!j?zmN+` zz1|nel^jxk3nEdJDDWiwb}4BVw%t6q86i8??-7t8GNXo7$ z`Vvw*lR`g!W>zxuA#!`*`|u*+^q=urxHgjWg#{Lb&FYE~HhnIdiPcrQB8A?29$0*c z+}`s;fkoli?3Vc#W*h6cz#6N;mxlkXgI|J#@Xl6bwPgVOPoJosaEvjpMLM>uSDXjvNxLl|2<6w z@VrUF3VFDYG>t>(5$Dw>QT1oDlGTu;^Wnz!p&wk>by1kQ*G7mIVuM^141bv$jX-vX#sHuoLR{7YR8?hR4Y2PYww!&fhQ7|iIDZ`*-^CR zHJEIe*lduAF%U0GLIMqh%EIVc)&@HNHQ=;#Yx__N@2=R?>)eVNtS}4+rpk5_7MmeY zhPAem1jl48GQ2*!eD#uD(9Bm4tQCgzkB`qTQ|;~>+COQYXb#*neq{7#BWpyz>)Q>6 zpHu$>mYz9~SKiWts~LtQnF8L5dTnGiMWJVZ16#I-jE-KuO@e-$`P?Yl_1oEh@TZpX zcc4V%^H(gWN-$vi6<$@xjlof{2gfc9x6I<;YE`6uYR|1PKe&_uxTx@p%t-s ztX0S*WOWNkHWTQ*Kfs83sOX-{)jN>=k6k5M{!>Sz)qx9t9?P>a3*n?|Mmno1*dSRu z_6{h6#neukcKh4!2vVPmmwW`%(Cv<5l8cLSv0Hh4>dmBd6Lxwb! z({`ZmoYy~&?tXjr@BI9H>kptF?emZnD3~Or%ABo6Xo4k+9ZLN|J$K|h4!nBE=;*{J z!M5|ypFjzQ`*y8vKYbh&1vptQ13tWkwPux35b&Io8|-A%nec!C|2RBNsW-q-)YFEX zPybbd=;wB>Yv1+;@Y!gc=TfbCK8k$QtuaMyW?Y}lhmGhjZ^8^MCZdC{%LGHyoJ6v= zoqCH?*!X+{n8-Rh(*(FndXJ9C`{;UFPbSfq{sc!+FSY&Vp9FQc>z&yxbL0KD_1z}Y zi$ve*-_$=O`j7r!48Ae={NPsxKQ(yeAT#J1+&3s5oEUg-;9~>79(ZOzKJcZ1+j)S< zE&`6aBHtH<#O%%a?CiK0NWx#4jeEoOqz0oVazO zF>&dHaRTeVY+^${Juosc*T3u!%U)XcjmdvZtz35RvYVEbm+fDsS+-}{%JF}Uzd3$v zz&8H1@z0E3JDwl+kE_OakFOYef9#F1AC7&M1ArW3$J}H4#%9NsjsDl@YXJNB<*&bHpGST%^5n=DMh;E>P^2Gej)X@{BiP7>k^cTai#|8}hvApz0Pyk~ z!}ku~I9wXOa9BTl*6`Y)e+~U^=qE#8ANuUj^`eVK|29+@3W|OYk|^r}j*h*7Cqh##%5M!DyQ%s>(2xFv%FN=%96&Fgg?rLTs*It4P}N z2@78`$jD%Gv>z-RvXs3u$1?6aD-TV)DA3h?f|{ zoF(LkV%U_42YfU}Gk!`m!jRK)VV8pI@_d+geDxU z7xNAa9aUO+BqC$Zk~e_&C0lFAz`mjn({FUWX@AYz`Jv`EnRZQ}W4a|Q!p zb~n{FwVR}D48415PoI{1a$kTxyYWJprifm@@}1 z`-Ud(ttMTM@${tLnuO|Sj51U=RSC09d{m%ol5sK-vxGHF!KE_9Xa8H^Q+IoD0C1^V zjTEa_;d3)%LPJqX5p07B%5Xf9pvi%K{6G`7nBVCx=P^fBmM&71Rp@TRq(mm*Od4|D z7TX{++l21ckdHM4qxM1ys^_F;{@Nugv#Fpps>}u~QX8rIAAyT>4$yv5cp@68rJ8;p zb=E)mhPVQdtCaeHRZqctSb5ceH1hxDvfzA{GSXnBS&y@(PujovVeN$+#L7m2$G!k+d2|7+N zL-%&*P^jHg!em;78LGV%H6_`$MCZdyxFKdx7IoH^+;1%vB71p2IuovJH3$=UmOL@P z&FUZtg}{ceu%w~kFTheJ^y$c%bARFaVCh&5vII*ilGG=x;q|}b`(uuv6Dx-Ud1=O? z3+XTgkLqKB$(Ld-o3}tkbaG!tVc-kgnWPEAf$O|ceNNkmxIOH~@AK@XfixD+$Rl+q z_Nk?a(|I62lT;zG{qbxRjrURtt&?2DP;?MD16S6?U9Q88Wt7Fe$W6 zX408rTDgYZ@EpIst&B0@bj3>rDpApu<2!j^L1QZ=cVkp0YFBX8RCV#aa~()7Bg7P? z9aN>rR_FXJzkaQB^}yL8jj^QAK>n^V>dC1OcW zdJ|tb(pa~fEku@0yCcewzM{sC3v6rw8D?uL0g6=?#2EPnZh>wwMe(_evrv@gOTkPT z-}Ro*K;&5xORDAZv@~k2GV1GidM%@t;j%d8juhh=r!P5L6X=Sj7AuwQ786D5d>UfY zef*+SOJ#-6OJ;nribb2GhK&L_OUi8uPq~35{lr{SImzRv8LJu$sw34Dg+?&waI&%S z8+rCsl|6-f;0D9xy#26-4-V=3Qq5CBTarlh5&FDXAeCiKrF(-^IZE0t<#Id8(x zSS!$ViZG#$<)Ip+&MuRa7rZRc)rlP8H&yJkR-rJ2BB%YH`!1OOl0qM39SuL-@XIiN ze2NwNV-Y8YnOh)OY|NZeXoVBL*bEy9mBC<4>uqUYfja*NetwE9Sx~vsZg;sBH%G|T z!p))>HN;6%$cD$tDL7uJ_2=;_py;7p0meP2%xE;mbn1NJ+%K9uS%BQAS_vqT>WLFO zesc=gV%5HXo1d6}DEP76zQt`(96ts5l){F&{Vt;FbQUOeZ0B79 zJwcVoY%S&BGJ>`BxLOdMe87++^}f1{P1n*cZ)PhJ`g=`KK%3T;yfLpvrA&KeQ92>)Gq zX(5uYAO2y9< z{%pppCopqd7q%!0N|S-zEeJ`*ZC8@cQmc~D;U2x6-S$I%_}~yOV6j%NB6G17s)Fr$ zfv2-a@QJ^g>8W5G7~L3?tIw;dB2e z&~s2)*~qdgLn||vFUC{5gzsWOdda2TDQ2>DS3HU77X(_&YvgOsyVIg%e$RxB_UXxJ@ z6Pj!qe7M3Fv??5MU<4WIzl0xT0Cdqq2P_q{!VnB8RSygFI27p)SUeVo$!TelqpQd1p`Ghs%WaD19?sHw|NETi@LNljf}!ex%j zcsdi&CNNu|U`n_&-Xs;Z3%AHz4u?!FbHyhuP_Z1ChL-dFb2TtA7UKbLGDA3{wWRI) zV4HcFdvv@wU)V6b;?X|QqvN+sTrzp~@NWllqmK>k;-D?=grqk)>H`x1Z`n5xu?$Pd zb^a9Xa#}-r3?(PU;;9}oI&{zn2pq3`Y!E#?DHZ~B-kK6~z7#aHU~o}qR5$_W0Ym#s z8HJlfM+d~K(9;uQDCW4h2^GOCd}MUFSg-(}IVpx17Q{h=@a81F!c&5$f*vK3UjZztFK!V}q064T_yTnAGO>_oQkwv-G~&QQc%yKcWW!Oy z$dp3nl06!7rnwP9b*COO63u%g=wAoVSld2rPz<;T9>n3OG&^3hw5HVv5e=;=T?y3^ zN{T|Sh+xKg$Vl|nYamVVO=^AH+%JaGGgic5QStWWhPi;3@Ma3ba$#xA6Csg!42IE5 zMq$xv2;$heYh8PO42H3ZM*T3?0uMH1jYB?$r_Po<5Fv+LBVx&9V-XdJ&T@f`S_fsu zzBeM)i8gTHG(r#34FcogXW!>=d-K|h71uz10%b0^>m%8kqVnfGAa_ed_gw~+Z4ht@{Ms5qU zfLf2M)t<85R>TPu-2yB=L~h@)MJzrrELvDi}I%w^%&gOGYO)X~1E3-fkg0>Kmtbb^wPy!u#uNgN_Z1xI z^)w;T2SJFrd+p5i?dP|N?V_1L!=%;YPP!P@R#Q%;B8s38l6bn8jGU6y02!(QmG+s_ z;CIuyO2$OPGed1_802;}h5k7!7EdmwLT1~T1YPoqc?dmu#hI(yS+SUN_#qC!hj;kd zq;6Xb$LcY)futKQX$1X50+RS4a(i%xn0NS@c8a?J54FCb`^Pp+8vAMkf13Ej$fe`I z=$CTm_=Vi*x_RMrZRk=EQ&iDA9I9%-4?tIYm9X|b)Z0$}L2~3*JG&eA@x2|Lb=tzJ zYYK)Wi(5)nyTcz07aSBiA_XozWOU+spX4!YVa0dguuw9z1;)Y)bj2kvwy-9Vs5qOY zAUJ!jq~P>fOyzw&0M9gt{+$xG#=Nql_%X6>XGxI_gA8wqaoHtj$cG?l~X{QaAjq4gJS z65?i0KMy!kXghG^_lBCx1{GurS0h6Y=s=eOS;Zm zSJ!!K_jB2d0Bh|rNo@vzJk3I}TZ1o!s#;*QbSpaX+DJDD(b@IhLJ~Yw%T)nhk1rE4 zK(brb%-TGuG)m~jl9fv|q63&{=WVy%0=2ifs6Wod?dXmQ5Dy_z6Oz+gkk81aMbW3bYHpi9hy>W*l4whJex@54m$W z0MX(m8(D(zNb70i(6c1%TZ0S7z+)ltroq0xfjiqr3x7X6z#UJ!VR*crGg)nMjXW+h zr9zk)@Fma{ez9cvA}Tug^{=i)FB}+LiGJnp&ielZ#G5uOA9x)^CEhob98vbg$F@)E zCvNQDKJfa`r?`XA0%&;%a?-mummI)<5q34Lvg*ucuuq_P4m7HMF&R0ZT`nZAd^gwq zV{hfTtBVqGZ~?rqxYDI?3iHI%32m0nMj8~lDhbSb$RKLJm$Y9?3iG-f4W`8#2ga5G znA#&N*R`cjnse~5wxQF3FYgmKNOKhpmPjXSS*ur31t_z94&d8EMh9=9B&#x;_v_=ceIc=_RA1;rAs+P`Z2f`xXO&DMx^_Ae`X} zJAhH)VHR9Au9PKWqtIU&_}U&ay65MGLu zT)~z?w_gstddMg&`^*{Wz013=gVk368w#BRY=k&IZ72nG@M4U)nu+UWeg!(e1XhmZ zVlq1VBv>f^eFW6#ou%%OzFmfwh8f8qUX!=FR9*I<3M|dFP$*YW8iEVK2GYiE0lON${KtQJ;Y$j(8E>W)k8)z?+tMQ&=(G(<+bk4 zKfB(UD8&M=mW)Vf$c)04%X@5gQz(K?YXYwxGJs4;CG&e)L+C)W%j(`1u#zJ#Sy|b6 z%6eZHT)?zK`?`M2BCW)QgS`ZJUUW z&yC)}?Xr(|c9{zP1TP|PMx&_Vq_1XFG-{qkHHwrsz-W8ONJLyELB|i)2GQ*|bcfr% zvGe8UEquAD;tV+nOVF$G6H$-G7eTRGfL9M0JvDPh2k2@LJ#|Z0ue|kfZb|kcH8A6! z$b>!-X+h0KmDC%+jEM-24qOM!ddMie>AoH9SFY=xOY=8$-T~)>TH?RY4i!CZIa*`V zMdjL~!0ErPw2y@rKf_3>o%13<}!rGebe$Z(IdG z=_RA$RWf6nx?1cLP1m$Gh-zqg^x2lw84p&F^e*wLZ6vr2<)@lhdb+_5{H(RTV9c5exed+vJq}3Br_i(w|Cwo$WrcRxTxPMw$B8LRk;->!!diY z6t#GxNp$J0uoOMyw&>049upz+C&VErAHd3No+w;@O#~nx0Wydy6ZDv~+z-X8mTE;O zKY!`Y_VM>mo+(1cPl{KsgA1+JOWcV4_=E&Oc=?gUUg073zr4=%XV2Gw;s%us7yJhN)49stO-z6+swV6S8d zQHSAC0(n4&ARxg*3XTDQIhZKq)Y!6U=05S-S();b%;XS+fPT1Z`_S(_@Opt^jc)gM z@8afcN%<)VfJ=967nyhAp57VdraQ$GYq{yu#?ml_ z@Gk_jA7cUQQ^pC=8sxoGJhghs9_>S4Kdbw;nz{>a>HwJ1f~ZkQxKKlUZHjw*;1EFy zH}$*VNwjn;2SBo;4M{^4(TY*gHh}u<|I37Y_<`|@29J$i-Ii*-ou*@WJDjHc&KjfT&WSd6@c5Y}Ny@#{bC@PUGm?4N_Gp9&+ z${IO0fpFL_CZq6b9Td@cW@uge%KOAt0Eq@%B2mYR`=Qca=$@yvIvrGp8;}fdU;GOy2p;Q2f;3+b=bZ;Kp^2+at zKML3BSKkwJH6Nl2H6Io)p|HAJ6>?$`M5ShNx6VonIL7b3TnnS>vtmD3QhX564Ym(P zMTR^ObIw3;w$_*C1?KP1il@PLu~Zin{#x;W1$=ty2jWgC2#iaEgmO55X$KX0ILs$N z_(Rh_1j7NKe=gMuNuFsF`rx^boDl!>z?w_Yv}(Ol2q%Xrw?R#@6!$OHVg1pq*!e&C z9-2NTUIsII@xqKQ7GXis5q%8y%i^Yvba#=Wek=y0D1cT5Gepapb)}&04hFbNkQ}Mb zaOc&k9dZJ2>rcTAUb;8hZfe52@HhL@9|0Bxb9wvx3*xcKYbLxy4VlNpzg~h==A)vslZ2$2^j*$cKq`O05rB$DUplBPZ^k?(&42!nB4D-=LMu)DC ztwF~RjqYiG;$_~iX@iR(@0fJss$$W>`ZASJ*_pBP_XzahtDuv6n$U@xFO#&P`qzHI z4MBF`AmD~Xqgc9S&=|~tDr+dg1qyB==$F3)@q(wrDNT^}2APcS-m`NE-E{y;UC3Vn z9T|6~aS=`3?TIJ}{=T?ljzy7+|CR%Y}U*CnG2RDvi z)Bn}cKM#L)Xq_&WFRgPW!V+nM{eDdgk~1stuy%0)*6m8v#Vwcf>xZFa#O>9xKcZpvOVR zI9%fyTPrE!q?N0Hv{WlnHLCyDlyGWrcm>-xdFJpN0~ZXF@J3DVcwhD5>R;I!L*=DPL=C*i&TK@l9@0>AO8 zh@qGye0VnJu-Ig>ND_VFeb@>;WL^`3OL2xg z0j#>y2HSu9C&$Qv_Ae;Ggs++M;5M}`$*Oh67I&@WX2kFwsIZ_|7lJ=#41MLT&!6k|Fy4-B7=o!3ROBxBO zx?W%yj)i2Zhl~zBF)oztxYV$DZTscFfW02hB@V8H=Ytu7Dh!jyO94}jQR`yJ`~jRx zJyaCFedPT16CZ$geZ_TsqmK+|2mduGnQ)9B7=BH39S2pGhZ9qYxU_BFJeBdv9X3oE zg9^B1TL!a)(aYl!$y5&+9lYyu9^eB3z{g7T!IA#G=p7_^gnQ^qkZVG+4Xjm{09W2x zr6B`q55{T7Nt^B@0Tmo@}|2SPw`@L&WL1sa&a3H zL;|h|8o^Cg*dY2w!RiaJ%3`jR&ND?8T{R$ql-Na7cyfJ?x0<&hmInaC zoG1e0;6bRAigZhhTT?Zq8&g{_ubjL7twGF?WNNCX4IP|3AYkJB`-@xFwtp}LquK07 z@Bk2yWqXvpa3*ZSNeZ%oP6DM_F(DY3M8{4Ag5>xlhvA=I$8-*Q8cyfvCZ+a(}nJ!Ew70V7x+KX4DWA=3@OX)K6K?&ph=dJ4@nP6nVd zX$prj)9@tgycNH6x@3B~w+$WqsaS#_J9%Aue2+vW+Gs-=SWA9;D$H(6Bav4J)dUtQ z+EHt}WXI%UBEm+#2eQyUePjFG?Gmoa8R8HN_-{#(H5Y@KOa+CDwFe_K!+pytG`3SR zGu6`u=m*d5KnJ)qYj!7$1Nd+N1A=&yNvn)x6nIsqRA#UMhHSGiC)UMeRD1?JWY*^Z zVeyGs3A{6Dlmr$+rZ#5HrU+BL>`OPIrBnr+=iE?!y$g1kzNd`?A{6sk*NWW|xPAIj zc0r=tR#`Yp1}pZ4HmsMzK*nit+_>X>sn+(vZ@eSe zm1Z+HmcU-MpDStum|2O z&Trx%*3Xj!*Jkxu2yTEF0!RkWLd`-*42NlAIRTQaTB;Ep8ohSy{{}hCy&~tvML+I4 zBnpbAuAeGQ1*R^T+C3nhnwk9X$u}mSpZvkMZTb?*I{Zy2n_|C+UiH}42X?VgkflaKR5G{L~%R7af(;G#1FDos(aG7@58Ov6U z|8xAU@nciJAAfZG&he|qHJNem__^bf@#SOhjs1G;nXxa8p|JyFsWIo6a%}t9n5fV$67)k-9!tJ8|KJ&EPAQBQH|p1%L!BLUIQ;{$J^ z&)z*eG)LD=Bvf*ZC1nLeL&5ly0Y2x)Doq43UdCSyCKyN5kqX?~;c6umHoe#5gV6YJ zL0=&KWM>doX)a*E$|+|>?o6f&iKOpcp}W$Cvl>8(C|9HEc-(grKW3(+F%Xom#mu=A zu|S=se0+AFRYuriWKe;pn0&TT_C+l-JRh>za%J-VpxLa#Sx<7gj{mb{Bc{e&DTdUU z*|4?BOz#)ywYUTKQ(z{r^!CpRY-&MYldb2qL?-IZXU=zW32gluD_L=th#1kN z%}KSb=>dDdd8MBr&r>=y&Xmdnkbmd)1;dd&e7c(z zr@bLOo~tJygEc|B(i`~Iwc-}Df$&kmvNlm6o0_!kzxd(fieehm_z1=*1>}b!MbECC z>r6iua2RlfjV$LqdZ{!JQ}Edn@Mj_8R7bkqCY6N_x8fV0XJHWl)BS# z@fyCrG#@PzYF*S%m9x@(2*>%PAFDK_kde*|Bqy3!jm$u9c}VDQ(I+vzj?l}?CX?13 zvz#Z;jq(6)P(t#DFOp69qvK}?biKI*sj>b*sWE4_2eQe%O`(BO=}Di`Ax&zX=Abk( z`xSvMHTbZgPMyvK<4r9ix32Bb=@x4T!$XzP8llFLCd`iT*&IMuCb2-au4{tH%OFkd zC%Nq zQqK!+Z#|F5GCp~hZejKa?oZ*_l!__F%dy@3%FxYxHb9V8s$4VXGulx2{7>=&YR(0) z48g|b4ym4Ud1$Kt7ea%>P{C_Kle5xlvROZ~=1zfb4>E+oS9KS?bjDm`ZG0vr-83a+ zq|M2iRduO36<{@l(BIh9<3(eoMzWrG!5JO&cb1-R%3`>jP59?*rDDmDN{={%{?bw! zz%<+$W0aNB6lvr265Yr;&A3$Kh+4`jv#Xex+Q|2Bq~dB)T~(C`87_~jh|{0p`8VQt zKA2!-eq$^R$^Diu3S>jW<$}KR02yeYqdQ4dfAr7 zrMTS9#8O@yPpy;)^jO`F%bY%Wxh2C4`sDayJb$P=X?Ez;#ZbmY7aEamC;9HRd_Do$ z=gol4+aw`*WtvZOqHD}tqk<(IOrRcessk*u>sTkXkgg>Pv6|GBG%^)q)Op_Dc(CZlg?MwWHz78|J^EWPdVhQTb^+?yxzpRy9NIG zh?Xq6W~Mi`msT5Xxryx0% zP?RPdHMb(!s^>5)W#u!R0K+ZsARwJF<5#lMRF2V}&GRo86)r+OhevF#a9Gh&VJ<%T znl5K`YTTl0<*a5enbpNtex9F&ax9TysTe>V1;b1|JtK%tIYPP#wxURdW0hP;nNrpT z{vmMT=u_3amGY}%{^TY`p!;kDsZ}rzeLgJH%@s0d3e#Ek1d}8Mh*>Qx$1p`=;+Mh? zRFyKG_Nn95mZ#uqD5j1Jblkv_q|8{%y7MV8r%=D=>7`~w12rykE{#T=gu@x%Akgcf zDDL#jTbZcBmobv`nLvl+ak^AgI|+Repr7N6nhuckwD5zxPC>*}*}5vk>S8XL@hyHK zODt86rJV{-vg!ovP+^Cb;;Jy2&f-bCmo&#cslCEHmvjVF5jL|Xc{A&&(9}dl;I1{5 z2+v#!QibVMK8VHWzX=T_6mqhKT!xfB5Tq$wYvAX(Sz&Yd|2<9|?K z$~6qnYw{|+CLFWGr-gYgq||Cieupy^mzg6(TAW@pfQdA8AsCfnR&&;>GnMj+aCAFA z%tFvuZ&}%brle3Kt9r)(FByE5dZ45@HIe zz9)s@$jU*CQp6p4B2i#f$=NZUf4*$+R*i`iuCbPJZDQvL-#uT_<76@vG9^RiWYDiX zV^W~UO%|x`9ab7cUZc}TnfQ!*I`6k7u!?go!vFw4A*5t?@*9%Qs~~@@7z}00H9h$I zBWDX&##|w!!4%4d8;jUbi+r7#7GWO+=ZmvH_{AVhYCA zJjD+u2RKJ~EloJ}7GpZ+jLmI(lW)j2WGTER%Qxtd#~=++!^Z@Az*8bUl`N5RdueZ! z6bni$>!?ZzdDIxvXuJVyia7fv{_kdO$&xb{fw>@+Iu#+K1hN%QD}5tE6e>w?L#`Ht zCp)KCT8L)LCbO6mRKOHpbG7hi;T}&&>p2HFP+?ERH94N1aYl5wuBw6jFuI{=C`N7; z=<1xBkmcisYJ~|lv$63cPiJA)$d;?2Hn~Vsxs}=?oR@4Ci{rSGo^wiLDvwMrr}!%u z&8AvqJg-;Dy-hpZS<*XS6&R)57PvHr)j00UP<3k43jV{`SjejMxXcAdC?*SpEmEO- z7^)fD>2%R+Xe7x%Vy!UEtg4nHW14hbmq}H#$;jN6Z}WT@MpF*QeR5+p&}u{#TZQRo zCH43_#H%C_eJNFVY^r6o~dfOhlY?iukbp?P22{-GC%DtcAo&ERqO@v3E zm?XwOF1l~v!lCuUf8xT|ZsIBppc0s?_ymoDrJ%0TAz!*#3}(}wI7-+g;>pES6u!^O zXNw`o7MnpoD$PRqbGxLI%qc-9?2@gU!IoSGrhMp`fzGIOOd)2AHPY%3lq~-u4ff2% zRIXb2PIMr>dmY+rm2~Q5OVDl`*pKa~0wyTln&xt-;8IgIMWtC^&Zdn;IgipB^hFIA zHhbE@!s^}Gh6Ez8yW3C|Snys)o67C;;HrGw9+#0?E2M>Xyl}rzfkCaOjmr%ca+l<4 zFwBAXl7nRAy%;hBr3eC$50%nFB5*>6?s))Gpf;K$E2nyz&{Lzo0dw|?TLA%7y<=6o zWs>Mb8;c7g%BdP4*{&F4Vj`3&*bJkj4oq`BWVHR6KT6t=BYGkCJsid)|2-Z&SFzx+ zus7zkI}#dM2EA&AU-yt9&cO+FWp?gb-=-~K;oWFL1&I6Pjh%ojV9Jo*U^Z7#Rwxrv z7$oB5i-^d1-SuEAy<*Rr_7MY^^Vab)73&**a`5DMZ1fWY+eER+O%oL7aiYPRt3a2* z2>FmfIJScrq?Q(`O2t>Js^t(`4Dl~$$~hPINpevPC7H079N9&ENn7q zj-h}0fXQMidhsbaL~2WRt!=Y@Fg(r_TW}-Ctu2Kzn6xDuS{XVPfG_AFqeCknmY{@7 zys>>jkh8zqP;+6KXcw+G6SON7jux5@T@LUI-N2%Uj1InYf{zhzA9HhtcsptU3tsqD zm9RU5+3h}}Sf<^XQW)*=0*f9p!ma}rok;ahdqL13REPt&<3okwjWVgief5;to{+k+RuUlfF6 zL*L}4{`V%7q7CC05B_NMn&AgH;phj2<3B8dXevHF%t=Rclub)u4C76xtx!;~Bw3AK zNr1;>aT7XJehk7~pL%*jn@V!d8xP_@4f$N}M9OMoAt%~t4HJrp#Ue*!80_qeseq3U zwUs(iYWIgF5Z>WGJg_hhlO^Z3mXmQj+RQ+3Mhe}N0^9bssAOhxaTCIR)Dj}h4n!po zsTMpuwBWdC)m$1QR>>-BR(HT$+_+jxN`XDRWyy;TJfkN^!234u(d?D+$I_w#|>60Tx4%qZi(LJBC*xKLBNi3oj z(Z0SYUwE+p>!a^L0LH}a+b8Hv&Km)fSE$gsSQL0Ekt`)3Lb*%biCo)A%W7P zSpczb=~_@04MOkCDb8XKxpE9AL2J;iret!}QeDu$`o9YyB<=MVeT1DJtmB8bH@f}+ zIB^+>S!JR09Bymb0Eg8ngJOjkw`o_QZ?z=TtCs45UJQMSMrU01k&|%EW#A3y5!J33 z)0cmQ7+pd;DHuW;j(6?GcXB-%L(}@WvZ9#4YA3S82VpI z$92NZ4oF6)`yZQRAzbL%zR2ji!}ktNaN$B`D3pE^Xf;9Fh*(gcBb2!!JfJfk7348p z0~7T7D?!>8H=(D@-;fAG`^41}s448a5!AIH_Pu%|jphz4p-$TOyg-11D|IDE>%=vZ ziM5@Q27VosZQv?)C&8=4HlfxaI{O-l-Z;cjV` zEbC;^Otzjj$1wEdwQ!U!rlNaZuy)I-fBt${De$<}ZBTCz;(uCjq)J1Ki?uOOL$WhN zr{4e~v{V-;DWUzp1a%(WaHC||I!K|E1{oCrbvUw}y6IV88gfsi=qJxh)@+x_PYpa= zqANP_V4g;2-}I65aQ#gZuAnF!K0>+Rm^qTJl2JH0>g9mJ7LuX8H-pCOA)`Z@d^bpH z>n)rs3o=Y7ArjYJ2^4owt? z#>Nj1(8F(zeuul}H{nV~9p+G5_&5wtt6WLoPIDCybL}>lSIN07S8Y>5GQ_E&@tU4~ z=-_w%<9`Xv7`+Rw>&nB+;Lq?uBv}(}!2t895%&OA9cCwZMd3%VrF+`Y(fc52iYpbf zWF*Oxhb7xK`3{f4DKpoJD_^{ggdMgOa1crA)S!gL-8#FCze9*V$(`MS!+=^M+(cR? zRv#q-CbJcf*qb>LLti;05l{7y(a~2y-xcEX)97C>J^)2mzb_d?E7kXF&)$MR7!nI(0;aaeG zOTk9t_R3b7f>JI@Tv^<$v-9}k=fyj?qh5M=6lRY{*T->Jp=yj4l}@{*saML;FF(cI z>3XQ`$xp+pryrLg=bdmF_a6pu9U&;BN4P=eL2TEe{dY+wmlS+15M=%Q{^(%)@w?#j z(BPA+X9n&aTF&WCBf9tz$?}#J-L{QW*+}s zS37*}>yp4)C`tob8*;+AEOLN`XS|UA4)FjhAD2j0F42g>lEVL`Akk?zjdqXnpdV`A zf-Z)VHITS&C2XEd%Blr8^e=n^f&`XqMcd!Ldk6aLIYSb3<~Ki5Jzo1wILmt_JBF0s z0s-qK3!eS0PrwI5G=|-i#9=IulkZDGjp4ct;^MjO!okij(TGk$kkJ2edFez(&dl`< zzCU`~`J zpfjEW`$A6}I{MldPkpa`;(6Hl`wnxsEqs+0XIO4E5Yi+bB8x63rcHAP5R}wgOh%&J zm;8Uo5(oO&54(00+c99MI6S#9xR^Ap%HcVkR6~Ic!&;DWm(MlmvL8d(Om7<>{djyD zj3d3~nV)o`=MDqtjSy``*h-lok#zVn7Okt1^vKYaPs2ca$mkyTl{?Y4Bk-#Jucskg zYKi@N@iQN>U+3>wwXyxuGoW!d1rGyikMM`J_9o%M0;P&yZmC!!6uSQ@$&Tp{QHy`M z;k@?x?@H{VjjI+Ekj$;deVDSI(qtyAO*q| zu4fiua)0{LM@(*e+sZv37ol(cOk&%7wd*E0Lj)clnvsvau*5vI?D<2*Gm6tzqdoTOBYeSj-0aBv3=UfmXc& zF-}XhqW?$Po5x31RPE#G?32l4VUo%03p45N3E(w+1UIt(C+ zg9s{AdPHPYL=kxz5E?{OL|+vVK?N5O8GZfoDu{r}tBCk}Zr@HwE*bUr2gB!cPNlkT z)u~feXL%0K*Y$6e+U_GGOG*ueuK^G^-O6|gfI+>){O+ho`ClfKPJBtoT!X@p^+-k3XxoXG@jbEEPW z1QyU7Yj81~Q~up&-+0rj`_>Ilc1;Z&>iyZ^O#c^ox$eI+fxI5Z`nI@zS!;x=LA`~t znZ2}L^Wz1-f#cdcn8wokD%i&U*Q%xJCMMXItinbMAC+qsps7hxtt2U{^H z*0$$0OWXFn!qdJ;5kV}4p9mS!NWB2A;MUgi*fAkwzVPU`mez$>smjb6~P?%RXgHXQGNPsatljc#Kn*%SV|mR$5IE@at-XgNYpo1?js zHmK3frHS(*KI}@b;`Ywr5#Gm!M9mlO-hDN4R$iY30^MIGH%u@=dU(;;HQuDnt)g+f zOOX;-VY(S7n!ikrjIY@OFYzl(VT{&>e z+PtigaAiYeC=4Y?h(Wa%E3*BN4Vflid=s}U>snkC2z1a$Ss2(t-t+g9PQeHNjz{Rs z5gg*}Gh+1~Vz$3xWfmm!;NNHtJlT9I{Oz%LN>RZf7xSEW$x_@b{ zcD+4mZX1(Rc-9WO`;QM?(ffRtl9%e)z!;OAFeY0T_hA>Y#{E#qt@P2_tlxwvI7eJY z3WNNOB#C0?!yFd5;m$)XAJ$m&(Jnq}q^G4Q0xnjfl0Y5s7gk${@O$`^!yGbk-Zs=u z$GCfB`&e_ahtFikEKXtwtXrt2o(5cXKoN;rWs#U9svz&@@h3;PWb(*sUlQCz?-_5t z!Q(S_{>4+5bwRBZvWvuadq6QCE-rXbUHHvj{=Q)jnW-+!rle&0Fo^Be#obUxta^^? zr?qglh)wE3AYMh$-A@hhCx=#3*_yjZs@vQgS$%>V(Fdna%0(tiZEs6ZzmEe|Ts$ zt5ss@V~&rG5Rq~3c=N;{Uyoq%#huG~jUyir8_f_FhC^xw*X55{N2QW<5-KokJqX`3L6=!Dx&QuMa$?f>g)l@=F{AQB) zzJ;<(mm8-Jk_W%FcV#vTe=F{dB?G%> z14QZneEm$#<5pcjIK6i9nbelW)0gka97VgNgugY)Ut0;2TmN*;NORvQd{{Reiwt%b zdqSnn=~9r2FHDy$)|57hl(POUjC`*qlhAkG3)IEuc5Z9FcMH~Z$IRjsx+t|wE+%g= zSr(Ucvo&=gQkX-Y`NiYtf@10_s8v+pw#Y7P0KcBEcQhP9jh&%afwe(sg*WIN^F>x$1Z-qm{q7N^SH%+cq6*tkl~U02af&EoVw-y zF}`Zax8>~^;&;Es^LC95S_TrmkM@7OxhMbBxjYC0gIL81g3VpiSHx-HrPQK^sChO* zt~r1o;E>5N!9U^nmhbE%FCAEtgT6B$RDnfmSq#*HS%e(LL*B4lV^GJ8Npe_()9xdC zAO;*Bp%RZx;>ESK`N|$X{A9L81_O#!3>2Wxv$Rc9n-5$3b3Rvw{Ed$xamYZU>TQ?I zO9=QnW@k*_mRHiZZ!5$f?Imd+8&ljA1n*s~^~V>vAHno8MDCOJCEDmm%$0@l+` zYgM9@=M7%EFmFexI{#jbghM9BFORlUV}7s~)4wCMC`K2oqbVGijp^u=ao&|OSkn%B zgghpM9C69y*kc|8dGf$LeNEdGAKu*Qe9^6?;&G)cyI@tjQz#gXx!f(Il**MTcHCw# z44-p$bN6Y?&hjn-538Mf%(-kVT}1q6U}-qK)2OO*z2hG|cQJSyY!PkA?w91bRyl31=)U?4F4WKr{w#(&7_MS&_5M1)zcg4`7h zWNj`?U+-Hn5Ok7eAS)wMpwghavquD28K4ma>g=BR>Oua<#7Ua455WUx@=xZjd;gjI zPoG49h~+H)=m=M8n!K-BoN$$j3pAJ)uD?&YhqE#pp4s?bfN?ErC$Cpts zz^_=pwOf-Do9_L0*HAVm_`{t;`v))Vf4FB`m$CN`10Uvnm^lVZtv4bAwZ@vgRP=&) zp7!T7@|w~m$(t19atpM}kP#xx;Q?Upem+Ue0G-nM(2+CA_h znU&HWYu!_g8q2wgl-#R=;^2_Ui8m0!!NlA&5p&~5e&ynsIQ3Z-7KBes7tk3Uree_H zp<7>z^uX0rKpGnmZ!js`bo;9oIJ+-r5?W8O;qxquisi0qh{K&Fug-?q?t){Z3u&-+;H#fhl z#W68zj>T#+s^BWdi}SQ8Ac+ya9@>;kX7gVig2`>ooAvzjcw0L<*jON2NADdxTlceF z>xXs>D*EdKF6M?VgQO`J&&BGsQSYQahm#U({RkMXSt>aR`{erK1&}m^n6KoK!sPcS z$tysBCU+;c93;1_zpNc$Hg-{K6;#WU=<*mfnnETxW3SeXr3fy}e*V6p)l~AxTaPYB z22GG$fZxJ+pCs1?(VKbkJoLuCA}S7-Mw?VER8b;}nvscFweia!e`J`$!WH=RvxxG1 zehcszkQ<9wj*BkfZ{J~AWMJIb{w&=1Yv!9LN4Vq`YCPFFJ-L~D>mq&&4V;OBV&vbm zs6lU+wiXv|{(@c{ciDn`5xY=+~ij2=xj)5Rw!i# z2}&v3UHE-2nH>B5=giF?y7&kwL1p%`mChPn)v(+iGL#Wd<(i zk8pY9sp{0Z&HqcY!w0Zc`=@KVg3O3KZb#B?kIYUx66E46W`ILxAmWjsp5hOXe_Uoi zr#X`2Z{>}6B?W~!Tz9x!N~s8?Pszbq{3(aZ2p}-6X88ysa(8sz0VDjDfx{i{{+D_i zJv_1}KY0!b=K1SKIqSBxrbqH8S=07y>ymlCeTVA^p7-sPW6t8SYdTI|m`6VxUTb07 zF2^qy`R8vA&;b!3=-$-#2?wTb`xCJ!e^7aUzUxKyGs0% zrPTJ8aW&ztOl#G~$rEM%$h%gp$-8dqULHAC2U4enP2^`Pi7!iO+4 zp-Q*IT;HrnY@udIld;3gr1Hu zkx~3@ywQ`e5( zdk1pN$!g>|;4E_B>cd{oD3pJTd+j2F*jSF+Y?;-lM@otoi_f4$Qt7IiG^_upRR@4; z*Xp?ocP#0m3qQmf-m?0lEU7j{)shVAn_0rF4jlXfe{^Uy3vb`)e_?%_zoTU+u`QpN zoc*%2mu^0GlD)(n-rJggKgPH5wz-#kaVlI37P=CdHx}#xN+gOC)ooZt4w>8_^I>D$ z;2mu?Z(~mXz@l@x3zbPCx6>-GUMiVW*9!o-h<*kelS?Kig1U2?Kl=>x`<~^4Q{^|H z61ub&Nop3RGd?QG{QlS;nS>I_S3sAlx$Vd!ckVy8dHwA;h!HI{1K)N}>kinW6;{E_dC*ya-lNS-_STF7t0|?)f4PRNRT|7*JoU1J34UH})ptzl%S#=Ef$i ze(t*q{qP5P<&JB3x{ejKtmlV=!2@ChI(yaS~0#=7U%eP`W&ty^4o zcwK7U%({c?PF*+9|2jYvzS)0A|3~{T?T_@E`^Ej+`+NHS(D!uT!+p2)eV9Ba`tk6g zCwlMaUDW%j-VgN7wV)KHdPjTy)^nogv7UQ+j`m#9lj(8woY}LtXMOjdx}WX-R`;FV zA8$b@=(>g716?n7J<)Y{*GIdGUEVH5*VfLrI-l?SM(3wHuj-6<8anrP4)R{%J;}R= z_ic(|JddtZq_NWLEj)Eh_dRv40L2>+d!L(@i9k*2k66D1Q7tfR%5LW-?zkt z6{;3El#XU$_`ylyk)ZO0Xq&Cgri1unyU!{@crHBu(7AeTwez|qZU8^XqQq$>7&Ky> zbh)vgFLAAI<|=~f7=UR3SSCD(R>}Han0d(+$aGA|~ErK6# zPK)sW3LsVL6KryKyL}A1&{=lbz$bAGzJAO-vv<+QKtlXw1>rPq>qqd1}Rr4FSu_EKg}Hn6po16Hrma~7j~CY#oH^4YR@jLr3` zS6oGn#8nE;>l7JJB^2&_fbFMTjn7bYHD8IQ%D!1qrsJb+Iwzf==e;bwG+m>`k~F24 zE{NlXymIgmn|5EHRhnn%vZRbjwcza)op^}-gKWy?q2eV`-B$9udH^+d{G6#M5amPA%ZX((!(O@XY(!dWBA;Zk{{)27u)v*RCNyN@2S zcwDqt?X2a*$N{WL#(%~3A1Nu#8BKM@Eh$E`X{wJ+;jD);niS$fD-uW8B~#|8p&Z*! zz)c${Q8pWw*%F4NKfQ@fZpBk5nhao7hBF)C0EHfStThJfxAN3VHuH zTayx5f@-nYmJ4`;GfF+3OKjTPN;IuIZMuSl%2wtIdTU-*i0as%waXJ3DiD-gvFyc4 zF0!tlrQ3qJlsN3un4G}knsLi|*+k8{H7-iaeLBGI=cAfXre`Ay{!ll~rt%Wiv^AQp zIBMbfSa*9k+{n_N_p|*QLfNb&KW%cwD)G~t^`WE+>r_^oWr}pRknUSx89IYnWcsm7aIf!F*V; zjx8fxr*)~C#5-%&D17?aaxpP>3p-9xeSXe2Yn-9QVPi#|7$I%4VIfxz8s_J1+I%XX z+R(+$f32E|il|`F6Y(d)!P$Cr9h(4LtEyBU%Hf?eq{4pXyfngNu}^B1m{(1CYYCKK zE#y?e&^m9c|5_#L6#GjmXT%nnR??vX7W<@D(U^18oK)gSmqdklKHdH8)>qYv8s{N1 zrKp&yKrqO9^+{fxW#s2(N)oS4q1Fd%B8?b`J#D(Dq^FVv(?V8OH6~rk^{k4o<)=d` zY5^J5{+ZeMf?L{glx;s}4wNXhy;{x0by4$Nwxiwtoru{(Y{+cSHS8bc3JHsN&Zc!G z?78W@D>HUA`(fGoj3=)1d)=|DyC_m_yo7C@QB|sR+`bSC%-O@1RB}|uHcuN81%*AG z%ZWoNtv|E*NtT>QX(Nph{edher3Ze-MmitdvhxNtONTP@s_N{0G~A zz#CQ1%AkrxHGQfq+k6_^-0!U`k)lZ4kl&Nla`P{TqVx0U8rIoa?} zwz=8kP|`;8ylkQBa;Rg{^-r>N00<~)#dMi=(&1^8n(RD}r5lT?8XZz9)A_u_5Dth> zVG#xn)ePQXTr9E0_3|0XtXwJ?Wf5a)1`lnbT=i525ihA+STXW2+Y#3^({p>9o^pi5 zD)nqcyP#1f(&0fCQ=z7nXwp=sl#Up~8J#Pc=-R@z*F1BafYHCe3MtS8f1PA0@%5Y}D&9+yjTq$wP;4{>mK7BRmRgDUTbrns>sW$nkF$wzzRKQ%7c&tFY4ETdF zSz`0ISh^^cnUlEnWv3=P1bpbJ=Sv$f;27b+UQ;dhb;+n%IP0>!noL$+=9{JUxTP&9- z%jRk-UvMQ4DKosS?LRR46m?m;Kg`mz*#IS>rss03P`>MjimZ zQOz1qB*buAa>z25!eQi7F{RMXA=1m5 z8DgP}s=<=nMCD6zGhL;;MqPLv3-1A!Z8k1Wg)DP9?@Y~5j`cO!{sVFO0@65T5uZ#F zv5C?Xu{K?=Rnx`doV+5bxJydey05h9)4&D@iCv|lx_&5~E5-+Y)Mm(lS{X^3l4@U2 zY@#DWedAs4;i;>BdwxbCk6McvomZuhuwWfkpLcQp)0kbe4E5y`hh3en?$)`)2c!c}qGdi z4qr#-U9A}Ft2%th68&UP4+{Xt{!31Op-T+N?jvv%woSF1$2$9lXWaahOtiwos^+w7 zJ?fjHy?KN(KKNxmGV)wU5Vp|nl>2;-lFHp{yy^kpeID#>p?moDeOHbhIqMzc6B500 zGcar+T{F$paxuaPrOUOR_vGCBU;;)$+!{^DiGzn>g1T8YiqsSS^hvTc2kvj#LC;*a zgL3TytQ~>q zzGegByyD@1iP*nn`&_q2ff?D`G70Cjc-Cd`EJXfI-HF04*h3myihTYn{JrCNZN8fe zC;irQn7M#W_@R@U&**yzXm^m3j>>dFtpb=aJnnZFHPuVU|9;Ws4hqUkA`{lS6xX@9Vv5P}lwE{!bM| zUA*m0(e8d^eqAYB48TstCh8fcv!aaImcgZBuRap+)M#p|L)GD1j z!F8M(ABP!EvFKg4_oWP~IgO&Skf_f}Xe~{V$P+Mgai}Paeg6~zM(#M-@rQ$Fl0W?4 z?p7fucqf0z2S$Tz@q*>?YEk4KCxvMt6?8fyei@N}2NS-UN)CVQ(H2g^<~2hI?)@(R z)NR3KJ6gn;4#*@Pm#C;aB zsycm@j+8VB%AJjQwOOJX5{!}AZzE)b%Of|$gy%JX_-)1p7F-1Ic-x;BQkkS`YFb<> znr1Ct9qKpapTvIn@*^-Ua(Lu0?~L=B8^4K2#BJv8r`DL{Zj$7X2RUQ3LpT+oR@G2Wtyry}o3xh&>^A_|G{!a!ewWHD7%k zE?~CaOUFz{=NF(tHxFEns_?(>UF;z+0iVezIMuR(TRo3U(@mcH5dsoc^ICJ<_LCj| z37;u;a0DSGZAHnM5O%UA*P16;JJ~+?BfkBnr}<2&1Jrs&L4!a&g6aVg8p<+_fT9{R zTVq7=G=BsjwreyYFFY2ZSwF=cPoLCJ(e(_>^qeVYS7Mxe{~0VLhu6;AZTTr~`5E6o z!Bma4qPk6h)l5ZjH=cDD>IDOYz&)k`ad$=GtRT~md=g%1Pj8_veO|Zln0nO_HC~`K7XqswkXp;(BE?QYWV$Ig%lBY}m(VVpWW*a*K z9i4Z!y}bc=dq2_B#RxO1%)QFrFyfwerpoH7-V&&p)0u>n4F3%q^_o`^eY~30Dz4D> z(O&R6|NOP}#5noo>o_pEdZL|hbub5H(-37}h( zOJ4I%TgVsxa?&N~euID0cFPenGD%st=G=6pl1Li#YPU#Xb{c8+yB>c7dvi65ycYYz zvUBaPOw^ek7|``3{LZNUrnljAPvBrhA!f`BgXFvx7p~0Eb^qo-VL?Y034mDAsG|Zen+jH8_-pakoA!y7(iL^) zteUmjlF+wL`*+j9`r48mLwg4*UHtyfbpMr??EUVbf$_CD5XEwEF@h)-Has{USXclm za$K9zY34)HRGeHrD3~1PkjaTV&)_#-7!wMWjuI35&L#v78wL3hm)T*t`zw-nDSMn`JnG{Mk@NBJpx06OtAH)Ugbb$S z1p7^X-QvaH4Ibcv!7g@SdZ$tl!*T=@*(wnO0e*c7=$FfrDg>l0{rTVwc4))}^X zud&;36Z!gpV0f)<$R6c8)(cv(Jt!8@KFT@5$_g?Ai?vF=ndgX%y!!Il>znrv2^_pr zj&}4v$~)To^3Y_LcQ7+RdPbRu&MR6WQi?YP90YjYO%~rCNv$k7H7!06ZlRp@wK@2+~&O# z0wZs`W09%yz$Qf$q!C+Itnho%lCr2MSCcvBLif3ikS-1jw}2fepnGEb)@Jt@qybWz zUG7GSuzZiWl+3HuVzo9RPO%E_C!^?x!$T;+24=>$HN~f3_wA4^qUuGvqNsBrRE*O8 zxHwZT>*qx^B|E*RZxM`+zKhqiZxJvhYGvf6t%6NDQVE@a#M|+SO_(Iq8_N$yn zoH&rCu;ItmtJkT$f*;tu_6jnIXE*T3g{KPa+w4cI{inCVa=44d443@!RKW;$8BxgL za_IBp`vkymKowN0&&mKKAkbBpgnO`x8(Ed8&cVH2F)2U_-u0L zWO3eIe8HzjixQam=|I$}sfc_T`8>4hIT+ga`4}39M~+`B=QDK#QS0*-p#XqP>1h;Q z2vp#*tRl4;sfOOPE$5+`E++Pf=oL$`R#Q}(-}En2fR|pB%mM6JK7cjwlhTN*s%KMp zyQ6*~(vE>~Lq5A-un)jLYjRO3)@3I9Pdn*cTzQ&+xrU%{Tl*TaT6Ee1M$88UqZ?L< z9wSt;=B)<=&+ri80ta!OxwSK)UjcEelmsw1TEe+cE`vILCu?EN#^l6)#8>|dtg59c zSvrIVibH#Qf876BUb3g7Yww_b=@6DL&STH9?`t1`xz%)88>s4HGqZk8gx$KIJWDV- z!sU@;zx@b~PBrQrUGfFNOKe1V_c?-7w*jEC4QXKEV)T+9DFpjQxMaes`Oa->l>+4F z*cTTt9QGI&r7GzeY8Hs>RZ%QbS%{D$6#kq`M&whL$+0@HrTGtv(MHzAJo;!K;tMr9 zyxw!Ag;GkZ%cxmxv|BC*IL=CJguv={gt}eJ6ZLs~PdY%$0683Xh9d1>JJm5#CJ;O#ap0F~IJf-rfA6SkTJjnqB_jbj0scQKoEB zW6sWqa8F?8f1@1p&*hQO>%4vBlAfL((n`K8$eCgK7fYCZ_F$fOCQH*2b3Qyk4}?D(Qyg$)+R%j3*Fm~Ahf6bFy@MaoEamc!8w8hT{j5}VtQI|{saK$GB(B- zl}@0ju_?vGZ`jf%@&k=v^Ilr9LY1uDlI-akTuS%(oJKGLNCF*ngee6qx11dnXRN5r zXGeGhc|s##APL^hC8NJVqR!>lja|wkhYs?4$)|JzRBpx_9YJdv6;r)A74!vxkLMJT zZ|Vg6v9);38#d2FL4L>}7zF@N7WHIMuTMXNf`-V6LA^kflunX+4FY8PtjR?!?oY1B z^y%5V@rZxPkjNB6#LJ7pq^kt=czyW-6e3Dd=KMSy2oISA!+^Y4s|hN{dttSF`fLF? zU_Pl5e7{+6(+=AaSc5(&XoZ+^g@~0kVzCHDM!38t@A(i+t2=E1MB3U=TGj;UFUG*( zL3tfu59JVP%Sh^^n5O6zrEvpmHpU6|&Hp&WwD*)o$Dn`c^nt5U39!-oKmA|s8D=hw zhmi>@Uu3{l*{j`jvK$H~b@K}WxdGnS2)XkD+@m;DQt*uMZ?}C<&`yWBJC3)==@$vM z?~pGtP^YX;MW6xdBFAcVu{~ypNOB?Iy`nD;8EBk`CU5`xMN561xLANp2j?OKR?1c} zOUc5~kR(x~s3__}Ol$DcW6t&;I&rPy@W|o!EkYr_^}}wYY6{1jr_bPWgghI-Dz>$v z#Sx!1g=f{8a6IW%`sHk2We=_@t67Bl&d>46(jzhE#~wz(*cLCtkl5rSZM;JJ=}d4| zT=LGwvU;d1W=NlPL0xfqas%o_+lB7F;E;wXz?AY+il-_Cp4?otX z$h)Rv@Pgjo_dnFLnRm_583P~cYK~t2&w1uG(&)s`u)>vdrd@6->(Tfv77L@CaWlZQ z)!v6`JlX zjy&?*NGnThOY`~)4mYIA9)irVofcfmWCRf)4xhi8FNKt?K6gpv*yJm8wt96la^kXW zZKP(=rHuTU8yy%Xi_{!8%X0H#ol$NzL{<8VSjjX;CJ17x#tl*yPABAXLybgD!o?@N#$epE2NORSWL zR$k6H&4}v7DT=&$^VCrD-1jq=#!DIu$|8%~t4!EMX39-hgA@V{bO3nz{MDFyE*be< z#L^Ug0D`|G+!(;0U)oC6(nQ1BxFjOCRsB(CBoRoF4}B1S&Lxv$ZyvQY2d)tyJxr@e zrIS>qCZ(c&N7ZN$lerJ!Pq<{v<$$&M+J~V1c7z&z_(e8xTT-qlEU3b5^T{l(>Owh1 z+}GmIxny!Ic#gIC^tFsCzogL%QDgtS=&lr|RT}d`SskkSrcpKSIxGT*%HR}Rn_syO z586{;E55t+l)bVe0N3%Sdiof#P?7VmhgeALGg2#M&Dy-tlFTlpL-4WTk$2toc;s<- zgm+7jYFmpV9~C%|8Fbr@`a;#EBybs#8o$m^B!SG4j28@I@Rlxnb|b zQtsJ3UlstQ&~XGt@wOFj^#Wp9OLq(Qt+lLe?RVil0{cz(2{uglAP;pYy&T+`X~0I* z6R=?gBxK)xg2}P9m~a;DK>WvZp%L=M`%b#yyY7bt&ylYdJrqi3%@t)Tr3+`p{rBU; zIAmOr&tFn=w>*G18nUqh%r9%QY50oZ)(pVIYpju>2L+QG*I<(Cs|Pp#D>SSn(-dQ^ zW2)D;vLOLh4)Y)bg^d&icNR~4=I2y(^4YK86}}di9D4IjA-ViMz^d$j=%i28D<8s_ zb44jlWM74#bIDEKMbpg7^lLC#S{W3ymS0epw9!Tp(mk?xk!KkJWx&eT;F8z&{Sly` zKRuBAH-19aCU;>+|A&!;c46;5gZi$`-A@moLjB#RV|&RPo3Xvv=cC>@<42j#yi?&> z&?OuT3G$)Gv1S}HQ8l)$d_ML(AprJtgMs;DQ`wY}>A0AlLxsuYw7gc6hRC13iwWS8 zNvO$N`J~N1274aR6WcdFSu8LwmZX$k+D&_M5ov^6^$2?5k_m5}7YWdh2v9;cq;=;L zh-XX{YASO)MJ|3+z~8WnNKTxETW~A!>_?B{g0dsn*o0qXv&K1_4tw$7w@F5V6wA>3*T>+?{Yjz&P2~Jlw^I zkn)o-nsUj_W3O6ZQM>3zf(zcYM&J9yBDto=qQ zT<;aQ8l*O+@BvmIiKA+-tWnspI$TGl%YjMd_`~Uc#-@8W7@93I<#yY?I&x6K+YX4_@36Gjbq}~f%!j_F= zH}nl_<1hzH!94AwgHe;GoRkNlwq9oT?P@X^?Ym>LiRwJOwh68073i%%gTcFF-6F{c?halsjFFYBu(7_DS)FtCQ~^S)RQN2h83oL@xGRm9UKF_HZiqvDW( zYIyc!^CQ0%TnGnggTZBF{jBknAwG|E3FN=I>nSmC_WECBzG*d?0orSa7F_xwj9uHU zjlIjZ6mhB)R*B5Ag}g$am6R0#oW-qiH5Gx154I3iw>KTXYsDrsPF=n(nf!JdWh9I0 zIk6x6BE!tdrX8^EtgyEtY=31Va{PsLB0%V4l23h!nGt_u*RonGWKg=24%tnjgnMQ# ziPgC7ZAPuVA{ZLs^2k$v-HB2GHCuPH`3kOK&}$vOmR>vDc^9IWZtm%3UZl`#t|Rbf zv^@o!C5I$@@AZ>NLi^3WTmK4u2(6q0URdin9ZZ`5x@?tTtP*Cm z_ib96OKz~F|09*KZU<8dhYefSI8jvv!ODp7vIEdHkOqR+u{Q+*+>_qTu_2gbkk9%U z_W%8)^Kj+gp$oaPLlN0qxN&gFP2Mds=Hm7?^dJJyDu`KvD<_yms;xAbgDb^{D>Ni> z-}stbayWV8#D8*QWiM_Y?-=wA9q6+4tnYn}_wj-E_utL<5H5oXlrk|tY*M2FB9hs=NtpfAQH=vY71jx#wiEQFod+L%ITZNRUpQK}UuG(m$nRfs!* zM%|CsmfT)s-Tl9wC3^UDVNs zMg_nf+q0?p;~sRe!`V0;U9b)fqlxxN=}5&mU0$%sa+(nN3J=5Jl1V|iPRN31p3x}; z%(Jb*AeOR<*kEy|f|Ndy@=EklfW?uIbYWUJRGgFvJ{j4zb91w^8$DnY4E!cL3cX@Z zlM_pvhLkg?tCbQl^0NVS!65_2^Q9^BjdO-JHO=dp4{(B*wUA!%WDj2dW8Ky9GqwUQ2+{S0PwQC{yLRe zha6t1&Fifs60{yk=Gi3$<`1p z&!JVGp(Q03VW#HI+OyI@3a)+}^xxLdX>JYcR-@tYKeSQ+mx5H7}}L z>|#{ujWB8uZwn5YJhDdt4-iu|@rUEAFfdS@>@v8i8QZjYp(KySRq|@dkY+z{VvBHe zn8PD`+%PCVX_57iS0CTMxmnvHgr~vQU_d$90oAJUxLoWvCA7|pPiOIwYc~q{!yGCi z0j2BVPO+5w?Wd(V0Smx{~9! z|LK6ReSaH21B%PmP%M9ZDWNjt>8M(x4Mk9|wv;6Lz4&+z8JF;@+oeUnvX}X8YeSAM z+7TS{-ndz;mAc}|u)`uvO33C(;lAO(YBCH=waF%`RH7iLwZQ-+vVUET`erlqjJ~E- zCZ+Q;^D^Q*17E`>lfy%L0r}@6`^U*6X9$4=7q7h2tH_QcQ z%{6I8OsI2&6FX!p>#3 zxzh`H+b?V|$d3yxUx!~*E2&Gf!B}G2r`6zbe#?GLEQd;-I;gNVcbx{sd6P((8`Z>X zRhmj>Tm@TwPBvdikQX$=L<49GjKqW<#>p zV0Y6Jg;cTfrpswZj=%i#rGRmdOo;fkx)tGLxa7I5RM71NWE3bUuhHs`{9GmkSlOCQ z2(_X1ufnAF%j2nRY~jk>wH^IuUwz@0(Y`6m$_GiB#>?8XR3I{f|%E{rrXG?o=|MMUV0qFi3Vmc_~kFCYKsq0o@8@qP% zS;El?L=f75k^;+M$!k`2b*?r#nRI$!L+j5pBxDduJH zIzYi2z<_MO5j`{FEYLQ5GL^orRCwYEG7`Yyc(w}4n!_WHsD9P9q<>N+ge9F$=p-*0xjC)Iu+B?VYf1ge&-Dk95n~Jo~BpJ z{9U;mF={BW%%~JwT^X@D!;E*+4y8o0(zm|46}k1bJ5dINiKwFVLO*ZR>NA*ClxWU5 zU7OKZN`WLZ@J-}ygK&75!-HxJwJcoQnnOnBZ#mN5-WBAC2@}TQwRQphJJ+#nTi9@3uf;amnP7#m`%sPg{hjnd`8H=Ii2YDWkK_(IurZLzFh*z7Z~& z`4e;V0hVW2SX=WMm`tt~f0p9oSCghUeCdF*x z(Vd=?s;wR`)Yj^?Z%YWCd|u(m&}v>wF4|V0Tm8^fFnIypC<+i|T^gGV0bm(C`GAIv z!QsibCKqLnP$A>r#gbkY6mFcLnea3fDoUEtHlGvIfbg;$@&EH((2jDl%%xHk6iC&w=G_Omi7pU9aNt*ZQC_VohL9I6QL0%X&Pm_53Ys-u|0O+|OhU zBf4fEsYTIjzJg6jB`8zM;E>YH5e!S#YBG6^{@A-7siv%O_qJfe3O&r)>h(6eT16%5 zo}^0W5NXM=kWetpB^Dalwi2BP3lX{zXqc82x!z<_MkUFjJYdR83;Fp7xgdtYaL6Py z4(!@iHtSO{<~|i@=$E^&8-1B5WeiSxO%=*Khwr&Of-X2@=6jGva^?PY&DSFs#ddE4 zX=QD6IFCL!pN-JrnqMmw&mi_`xCX^Kkb+|6uvmxWt6z1kZ>Ca02Jx=(4%(}CPGXXZ zotd;Hp^Mj5iX=0VadLAO8ivCok7VU-hrwG}^wZ8cfOqmsFpDt|uHJW&`p#jL;OMdv z$JSz!69Z$&R4oZFKFJpBE(;NI zf9*zC#MsO~&N{S~Xq-G=#!xw|wny(%Rj3C5M~dK6Mb#w+RX-y}_FvTsm`P^Fkd?S5 zw{2NIc}eJ&djP6&-5#dyTFW_r0G1k3Qc=)XmqCC(Zn-eXV-^?z7$XnXaamlu3E?d? zVIM3Bx1&7tN!8?4mqJZ)B#4!+F=D<9DuKgmNmu)b*!4ak<0XkmgKi^*dT=#3a{&cs zOEUMdmVizwHsYVr!<`4fyo z2RSXsr9`oD6wR`^XK?DM$Sk~@vDUJ4z0y)zMwdQD}&|F!hZ6ptI-Do%z(>3f|8JMlaAmZWP+7~Idc4i zP!i8vjjQq6O<*8PZEC*ost|?Lum51HCnhr(o->qXKw7BO&g7x$XVOehOl^m?xP+&* zdYj*{?K_J{-uodTYCE`XaKQzTeT@=TIW5Fni!4qAovUtPL=8=tidAbg!I95|2{A~* z2acRv)Q&*ZT)M*iyhNRqI!pnjLT3SL#x2k=mTR%wI6T7pVrl8!wCg%%%OQ-xhQwNg zK|u*b5X|Il#d|YdY}zZKR^%b9-IVaIyzXCC)?x+iBf`-Q=XU>tcmBXa?-O17`#;SX zHq1o=U+8V+DmIa;=ws}WE_A~ha6HDS)Ih6} zr3K5Z)EbW|$*vnQ6fT(@-uv`^^6DK!8=E)W2*biw&$4?-oiNQA#Q}{p@6Wi?u{5dO z0F&TqDtW5@e=YaY=H~BjV7|oAn86S(+@gf7Dy5Oc;dYQE=Zn>(Hb!Mw-S@La*s9*m zL-O94O=&~8lXsS!KKLH5mrnX5^Wl`MMwR?2F_o8F5;k){w{Z5Amo$)g)sB1&q-SIv zL!oM!Nl_gHLLyI6k~%e;P8Y=NK79BNXk`wMJat2> zVA(`-%NJp(+j9Q0JvMDYCWy~JXL8wGt|IPw$FSRsw+TmwR&yAOVJnnNhtZ zz6-W`)YWVFmV3}^XT8y~)LFL8BC^GTtOrKfUVkSB!eK3EO`pCYzL|f)Vm1woDmJ{38 z@berp;jRDDaw@{c=GVR^TnYv_@paa76-JNj+5wwZ5}_9=p`cln(?(JeBD)WojY~%Q zsZ>aIPfu=ae(pZT;bUoBf<9Pr3}h&8MIyD(F1@`<6=$U6xd#}vv6@VHk0O%+-huI^ z=|M)Koed@rpLJGH^AU%P7SA|jZd=%GwX+knr77Gv%wdt^+kXke_HW?P-eul7)~q$L zQL)P|THYO$r5ILF^U~S$jL%j=1m=6ciqUYWLJD>ACv{YXV&WJf6SRYypziMfpAFOOjn-bForJOHoTrM*4G z`+Z@%fXl+;=u6s2pfC3QIU5n#QVOqWUhWW;O9mxLJb~S~no5rSX%_aYLZh2J`h@T; z)NwxD|0e?5-R&Ve;g+(GQ1A_Dq!#clh7JcCj1tcUmuNCV!p%GE3AJtJ4~4 z+FiBSq%O0VocldY6PL_h2o}G$lV_o@ zuscWMS}1G93l?$681S3bZUyQ57S0q7nNSNCO%ga_#+$is zVdrdRWp$>b=ZYcCz*jqmx*i|AuJ645w>xGSTdso1jbc);*tj88Y0i)krwc)ODS>*s z`WOlR2(!i|1C+`vB+VZ!UB{mJF=p*xgUMuO;Y6}F7ab5ga$%V&md-9XB;?g!K(JPm z$>kgW!EYL#6?V1VSGngPo^)dYGbeBPd(s~LLcydF%k1_d%2h|n**_PaI<%TfoR7W% zRdLHU7y0eago0|zM$P-UvzPMy^ zV*4n+IrYr4ZngZhHDOHp96Mp!gwL;{EVV>Fos1Z!>=|% zS(^PDp2oD<8ii$niw7m1Tr8sUN_-`^+nFR+KZ(g-O(lZmeL128ieMq!k&C2K-jz%@S=PL95d-2D1aA)x0Vm-%4C8#!%G>TxI%QBl5-e$NbT zPR=FOS;YRI4e4T%!C4n-+!>}Uv^4EP37t|k<4=-1o*m!>&VETaL{9s}P3IB+AB1fi;M6Nv9!2BOa<8J0-f5@(H9gR-V~I#OOuqkH z^vWTVr%w1Ln~rPtFCC%R_dpEIFSf++Qgp_yb;_2DOC_*gCv>xhOckl5qPK-(yQK=T zVx{Lz&1u(8D`je#9{t^t-h1fxSbKS+inV9IzmjyC<|tDrkgk~G3po{uy@G*qs3c^0 zu$8>tO&)n=N%fuhBYWO6Ij`(_uL#G@GReaHoM%4l$X2~lV)!+Ll1nCqu6Y4@@!I`k z%?EzXocH#|`_Kog{A|Ta7_b$#8X&d(^W_BvDZPLJama*vu#Pk4_R&7_{mAK~&HwiT zbLfizFT>!GoDR8kmh#SdiGR*+204y}{c} z{_B5)|HNW4d9$n-dP?0`Oj@Z4yXUzvSwVvLm?**@b&Tc zJ|pZhIwpUMF>KIG9|#3rlZ)!1AK*7dlY3Du)B0!O=tLcbpn&LRtta59gqcpmfO8?B zuJmW&QPk~HxMA_M8T^p0tewQF~7<5vIdtN{@FhOE%3ECpaoiHr=4#xrYj)ZS#wsAEjI&L z038rhvsngDg%O-hlVZ`zN=zqdyV4vs{5JZuyG`k!#)-$bifyx;eP`(L|3HMZkQ#Ze}el~oBPbKa^F zM?~6LkwK#f%piDeia+u$DwCIc``3r2+K2Ip;i+BQuaqC{TUIT0v3_ROES8B)TB)5f z5c#?({xFx=(gnYKac}!x);fqE9GKd^LwS@*m1eKP@o>WAqrzSwrd10zxhhRwADBW2 z?rJi*!F3*#^y+xJxxp#i7mxO%FZRAz32ST#Dw_|<^k!YjV@i<2edvorCcMV8leho8 zZ|Up)-j8k^M|;r?YqiP7w3&Hv-B_-< z(DhC2+F?D)B&@S)xSDlYMYK#D%GcxGU_MHb{hb&ahfJIkeUs#?@87?vx!5^{XO8S> zHJONcF0)*d_Lr38&cP|%^H)*H;U~ysv;5h;OQ)A`2yy(U1)b{Xm>POdk8hyab(Htp z!BXG;{@<>CE_Fa`nN(m_Y(pk<%|yqP5oN6u3&k8!5<3G6%OT^9{|sW-&zM>o^@;Z| za!VZ@#`3VY$jXez7LoY!3A-*NuPDjEsi}P%RuRc-|8E}*C=0$`vN$#MH}p-?sFC%N;;J_M=GLZXb!$ z(MUulcGkt--EYKu$SaoZ?MN@-8B@CwM z`3u4F%Kt-%UaUvgqZjt==BorN@>)hSP0yPw=Af7ePDL-PsbqA%8zzFM>^SdX5S1N~b%rw6X+3-*7m^U(gzQ~E!`dvox7-miy+ zyvKO=481ULbm+T7clS*LZZA7{+R$R(lS7yHyfLUAN)CT;$T6hoHxBI{>hF7CI50T2 z;nfX4+whIyTl*`#D>i(7{r{|=+i?AcT0d_?xc`}TJJ$O)nEFoHKyTQ(&N}ejzTfwM zZC&jDBkW7yCgiz3<%f zeP`>)#M*Rz_L6s+1Sa1!|I3LRWDeuR+%hro;+7w5`TUlT%ztCcJLW4}UO)M(`Oy3=8&~(lk9qgw z-`Uw6>l4*GwK<)~QE}zWa!oWFk=w88Gp;-B%>+xAJ(-v@z2dTzqc-I8phk2~b4wee zO4fqQYS5OFjNJO4g4`JK#~3%Tb!<$P4N&Rxc~Q<`&vVvvwRT05%jR=4Lhd1_v8%5p znR-1J%4n-fC#xR+Kj8sGwArCTYOUU_vpG5xd-yw|9I0nnwPA(zv}u3aE+4)@l-ms* zmW~?y_EI(y>!kPpSa>gerI59mO*tD^ETv3|*&(60K2vKlOek3Hy7l%VYe-DGMMXHU zio`mF*ot?hp0{MTzFm;(>NP#X*7Ht9$DfTe=^aX;{sC^y*{j9kHfn`UdeSMzxyn@R zg#$vy1gCZtwvXa8{-RRB#nsFO-AjcBv@01WEeow=RxE*tT9R|G=Y zc)FV1CNShXwb}%Sd@{~zA>nEy8qD~w#A;Mwj;>T3WzHQjgk;Ql9zm|DH#|&vMU^wx zYUWIuk}eC?Yr1KFyQQ_dt8urb;i7haNGxwjm6)_PZgYX~Q=?Xn{Y;Rn{WQ%u!g76e z)mv#BqUY@v>QU=`)uL>bF8G@|y`9?j6+x^@hHXr;QFW;k_O@5C=V?(KXd;hJw5e=5 z&(=EP`HN>nxm(4R>^h4fuFxmk>Y2|>MS1rgeoxn_Qe_HMtsIHAl(b7>Q_47@Jt~#S zMXgZsL@b>|j;6xYAwjORDp%=%nQ>@Z1^Y@wF@N*Y=tY>f3PobI&{Twh7;U>%L%$bF z%WVN4rJ;NwAAZA}OS*(C3QoB?Nzo66I-wno4-|PL;c@l9l7f z?iJ;6V;m82*$#+mjMY%Ad(r)Zf>|lZSvyi03FqFOYE22DGV3|l~CF_y}l1_zk z*VjdPy5^#-no+##Yg=rKs|s#Nx3M@}6ZlYrT?)v@(Um zOM<-1gh2&lEPHjfU`wy6s`lR^D11S6gvq4+MjMlNWrCTb?-k@KosVT(E|1a>^{)m( zs?pC0a&^#Lr`(oc!K!!XG+O1+*%^tTu{v>P%dr+&2Psb6HRY=*p`~hzNm1yQT}_#~ zk+rfcCuAFQs!TZ}L$B7#OxhP1iemv@~mYsJl2?B;T!Wlm|Wd9ye&KClh2!H7Q4 z^fpV8cFy#uP?0$qiBtY^!ECSS>QS%SSQ6w0ldeOnO0s4LggUaM+_)fgk0&itcq~ps zgf94^>a0PW=a^+4Vm!2Pu2MN^Uryy$ zx{^%Qm(z>=W=Yw+OsQO^loT5?R8 zVAqINg@EhYp(^Hoc=tsf~zn=nvWTT0DUyx{ZCNIoi5 z6wDYKY+T7Os(doV#q&!-HX~Etby`jKCjv}9?E4-=xLRZ zXU=IXvjC_@XcGtQyQ83dRQOd@K2~P5Rm!VC+J<)c*qek}+&(3?BfW(-WkYPK8CQyy zI1nx%y+p&e>a<#Pc3te8?)QWT0wE?07CUX+r)lIGIpx%6MY%ujr7fyZFp1Syw0wyTXOMKR&l-1o`5pIwbPU?L?_~=pz87qh2qX4f*F&^6=Rw%csqdt zdxao(bc;SctCUlnhKEH`DHY2I77V(sdPpH;Y>^`?KtnaQ4Y zL~JCT4Kd}AK}N}nl+&${bOgCS%6h1LQyWORomr!iJ|M~+j$DWiU?A;mSMKcSqRh92 z2lOsvzhJH5l}N|Z^k>t`bA{ivYxHUjS8xSN#hSLGU~p~4W@;YG-#c zg4`2P$Y^CDNY!d>cVtC1T^8QUW9w$Ej8AC`!ao@BS4O@jmX|paRNa{_xu}9Mtz(wn zDac*nww+OV%r(&28DuTR*iE9`rRuO5xu%+o`RIrtxlPC-=yY}zMan|8m}oskQ5$|CJ)Ab(i2 zNe)}JOnGv#u+G913Z?j{kZI0och)jgA==DVTiK|&q>wm-dhF(gg(}p|W{W3Vh}NTr zPl^3+H>xr$qgE<1YJElx77PI21W;$|DOY717hrYhrZ z}27LJN?y4x_)$+k6WQMqOM zdUQ@)FIFb%q9R(AsucxVHl*A(D?Bh5Njv)`L2eGDaNbB)Lg9+nS6NM6tP|v>PA5yJ zX<4pP%bM(wob=s-+?ZfmR6JQ^yG2UZ2$-|`ib5ttry}4FXM^yft^$TJ}Rtk}B*-$E-<`mU*;njZ?I`7NySw9qn4wRCQ68{Yk7}mRn)kV0i>RrlGBfANzP; zev#7~*C;4WkaFnqGM81Qyi6f@rZhvN4^RDS_%GA{I%gg)&(?=DlNXY!rSp+aXl?Il zr$mKun5js^Pn$AHnW>ZFFQnn$7?ARsn=U!b-%LwH2j~YG$$@?HwIz6?1lI=DC@EFe ziZ|XdaEVlc|KTN)Lt8fp`Re#z&%f{W?SrDHC2}b|Ey^{*8zp-4in+Rr*1B~8ouOg3 zz-O4g94#qr6oda@2@c)M*Ik~cj!MXt{Td;+5gb~tIMecv$WhOLnBPX1;UT${9piT> z)?v-G5^Ykiy~J>nGuYcLD$DuWaYLcjY$o{?8Jt>!V*c^_Mh@TiHQ9QjzG21<*&itQ zhh1xnXqe!P_4(AAC}UKGS1c6=W6`L1{!%n-K+H#%L4kc+`>wG&o|o?AXD*Y7?xZ7^ zqtDs3o#=BR7{F#L*R{na8#1vLTE4;`RKpLnQOKXV@S20Y*Q-x^li;~NuW%^Zed1R}yf(9T z4qjW`zk`pd+0~j>-NwyZwa9u|{@n&tH6R6D!?wfxpA8Z*JY<&%FU_riNJMnSMUg!` zO=sDVOReInO~loG*^1s96!WK^*m(i}p3hyli@(&iURlJB%3N#vUz#590a=(>L|HRM zo3soe#JrtMkBwrIP6wQ4cF7)bB#v;X=aMzBW{BNn46K+6RI}&_tk&d4MJB;-wV+Xh zV*c4XmJjzbmeW(?Eml;dT6>9ZrISg=;&jTP2)E4!easA0mI)0S5F;At1BZGaF`cdl zlmEbe`5FkG-tg*vU)%liVwMUA195}Gf7^((7xD)e+G9+HP0Ix}cXcvg!y91s(-(SiHdv-z)RC4Uzp?}m~? zbF;Jirq7>JOlZeEL&*{T0;29j4(x;#TMnC_DGiace*4C za~pO1b??6Buo$LZ^hmDUg&VqX5t-qUAD-)Iag$1d>Jdbrvw|Q41l&H0te-FfE#y-H2`>LO)$+sVFRY_8Uv&X$yI}pY6xW7w zXV8EQiR2pB0upavFf{`Sv(@cf=kzCSPA;PPi(DcQ0cxiBa$XaPSH0U8?%pjAh%BMr;Tu9ECJ zSD|@tk8cH1+w}%)~R(cULPT!;3xHXRTF)eyY|8y^wJ6q;6ZoR;I*d zw3NE)iZ&QNS;AZ&5c7}UQ#-^jyk&HZ|98-rnEC-RfAZA5h@XCTdW`>%^tv(obq1A1*Dge50=;gjW^I+|V5*Qw1?@3=Ov!&O zipmDX{NopB?L96gA>_VmgeOIKJe%`3B1|O^*U3Uu+zM`xo0E8aP)yi}9lfa(u1)v9 zYK>5fDEmPtRVptlGD?G{qB7eJ4Ofm5c4NLdE^yV?`?U>-$dSrIf9~A4$n=$ zX6(yTH;gvwHd8)KnZr8T)`{wZDFylICH~2VWMO_lhjW(| zajMO$_Vw7N1Q|zzYxHTFEMq><_5}+OOE#uhbrhBST`ja^K+2!&aGKuswgi-Wy-H?~~V}ueJw=q9WR zAXNpEY0-_16Y!c(z7hM%=34%g)zs(eTIMx3OU?vYe&@{+f=r}NBNGRvhLX46^2!MV zwkiwQs@OM6LW@oxNV80c!a=kW0iz)rC(qxrc6bN>(3>So2*Y`$I*bI#XFfGt{}#M4 zm(%pQ{~SRNNVyUqf=GiK&`*&mxX5$IB@0WN7D19j%w_)Z<7a&9J#X#5^+l)O zdSE)Mg`au)t&(knGrc!_?GlwWO2?DR3cxrr{;HmxC43%qy zK1cZ0RF~|2jwzd>0k#=zn{_Ha{cg#@g+Z~9UxIKHzanwl-DFD)uYr_CG)xhLvY-U_ zg0J9=*Kl>4<3F~BQ5q2Q!&hB_x%Izb3qE*)tZm2Ir8wdWH~URjVuH zAAP%I@oYKrm2Bh{*-#9bPLqdt5CZP&jr@~@8{XzttT>!>sa93f6q__6hyv9hXT?Tw zKZt_A`;l|@^`3k?f&=yu{ukksFt6T9`o z|2s%Ejy2`!PO%0Pj*^9`hT6eY!{SK^(_lZ3#%xsaCm%$B4p4A=d#~q7WJ!1pj6I_5 zmRFog6>Hb|0}-FD(?I|*MhEQNccGe%D#TPF@*32w`+9%B3#MB<v7`cC(Kc{l&^5x^86cTv=2S!?$089K^-h&q&(Di3QPxkia8;AL;-z(wvdyl{R zw1sSzG|doIl)GwvO((BRrg_cpu)couUQGM}9e*-DzD^hY(EIVNfYT__;UXds1kW8~ zF5JPtO<`ng`yDokOYfD;FK$)>*irpIWU7O~yOTfh0i1yWD#a0BnA^@ zo*bul$Pg0Az`h|^6logzqx`84;l(#Af>eQf{~>99|Hbz`Ko0*tLcU>zE69&zb7@dP z6hK;m7w;cGTn|VVc5YsTj~=>~fMStL;PVei&Xh}F-$x|KeRLcaO3ZyUaG($m8)wUv z%!ZTGK(YS0qj%d6UWM2Vw#2F38MyhfyM`}5=Q389Xor|VF#mST$0mcyQ`K9Mb{Qhi&< zfBHYL2nKY>@eB0pb-x-O>nHKq`xUbGU2Dfq+p~(T8SgNP=BhR*4|R&GNujP^ei?NQ z=)f7)eu)NdXV3ia#2neyE{8c1@G9+0rjnsT<)T8FUGauvLS1kDD%q7bs(7lW?Bf@g zdcXWCEG#@nI30j2V)`0_V{+|CBNWzn6+(Ni`cJfHK*wKSnj`4m<=$uhQv$ZV8=Y%f)FTA6m*SmF zh1DUlBWXxfQX&4x7Z3(JASG1yBC_*cU%-fo$V22Odd=L$qzYboK+2z*EgeLtp=3SO@WJoEoBFf= zmh1y!a?OUygaA?#r#8kliJZG4SK4Ih82{lXP}zW#uO=_Lw72iS&{}LxCOj<6_h2yB z@zZT{V5MPbW;8DTx8K1OeT9^`Jq4P`=yx%M@SK8JMC>wFWeytIti^0Dgj~h8mG68L zT{a-)pLkr+$3gDv{qCD+#6EC&h%+haa{2vC%;K}#8!s>*=A-xK#N`I; z;m+P|-O_f<6%QbyvD}VbBuyn6_5=(bL)ejfukz8nR@3AMb zO7=O{4CoP|8VB3%cnalU*lN|#c^|3e@Z3fr@`-)w@Et2SX-xc(%ph)!Fw_W-M?$8R z1{E&0lp(kZD@KO@x9_1x2gQ8!Pa|0L$k^4RzW>q`st=9*X5uqb|1@1888~K-4fFTx z{o)D%L;r?&F?{$LVFuYVDLpt8J@Lj$vlC|;a>4%o{g;^U13LcXwp)RCy8M<2e&HkM zS^4_UFA%ftrhkp^apjr^wF<|b*_F-N6S)us6N{~A{WuN2?&>zt!^{xf93 z1=o-XS4``X%=lV0x}o9{Rk~2DYsskw>t&;quih|nP&mFl@;e;g5cC=!Di5oNMsFWG ze{9R>GoxP{|H}AB#@{wx9rq#tcGuXS$G$)IuUogze_(WV)IWRGsB(1A$X`Z&IP#gf z5rnedIFcMOjYvjjhJQQ!_2HAlZy&A?2Zz-&KcD&X%!g)<&y=S5t#6)gkKH|e#k_s` zvaMg7K6`d;dU)aCiEAgWp3qGknqQdz@$`4*o|~8)|JBUm+?`|BZ~Z9(W9hN@Txagexy$Dc zjGccr-uZU&)Qb$jo(*t#53e&sawSV-o5s;DL z%ooP7CjpE|-x&*D`bcrl;dQOUXOMG9CB*q~{GvHfLK}0t)S^}%2?h#Iy`jb7lLq-d zz_H?H7T&n7<#L5g7hj}E&Ey8(b-D#ON@2^_MK$w(a)8T zr^n9{wK*{Fpr-;ts^+4b1uIczq&q;M>Z< z2n6U>^pQ2UTU>7zthI2L0mlz|3tuBa2tY@^^Zn}&V~rH?rf7U26EP7sc{e*Q4wZ$) zIs-!$W*OnnH2IO0*3FLGEI!NP3yJ}clRScenlNq5aUC~1B$@#b-{tb)6mmDixh_0k zBpGdo%Z${;hcR6f_&_o=k!~lC_i2Hqi`uze&|(0wP%(A!45}t+v-KAF9-+5MdfQGO zeLq%P9vq?W)^_|q?;*Jqr z#dQeRBQ66`E7=!DKO}0K!3zz+rr$%zk&T11<=2{|l*duAL#+(>rZ@{wPQTAK7FNr#78<+#r4 zbTOFh?2p#fF!NYVFmEOh(-Onk3FM~zf;Nyxez-ye(;S_NMS<-CG;(v#t!v4?#C1R& z+t-q8d!FpQ1{F|HxLv}n zDX~BN40fO_q0S;VtDxI0fYGzCAT9_%K+)AGkLOS|_9{?IGFv|&{;&)iDyE$UX$LYz zn2{oesWpAey0+`cd5}6vi_wgu5s55}dSUzj3TjvreE`FQ0qAH@eVD~YmmgbM*K(b7 z2iA>s~H~LxsDy|uQkwg zI`uH<*tNJKIO1Q9#jCnovNLN&&|3OJeelUj@&tcyW zx|wO`%;M1akWd60KrRErp#jhqAY?2^%oEw(R$og@8>St}`GG?NQtY5}0eRl@2jN** zGz>GQAciT81BwG?G2hme7TEl{ z*yG|1*s zjdKPD5;qLw8a?6z?`kgH-t82$Ft|wS#_6>%uNh2q&`Fac#V%r$g=35lcDSPfZ5@_6 z<_Jj+xlh#MU_&xEA+DH1SO5+^n9gq5KCf6c5^o|)x{oXuaOe^HY_c%>c5apRPsu?V z77^Pjb|>s`evs^u$!}=y{eswT*jxuX47&x$`)(`Sm+v~5{hhsC$Ev!TwGXjeidpP!O*}ji%{b~Q#_u-&|I>`&5U;Q$KMt}v+ z!tVU=+<|_9J$Rc47DyP28c$=Pkh$h>?l0bb_Wz6w-@zYvOfu2M`3bqJu!rM53pFvc6^zvDngKv;0S1{;Jyw)`6L zVQlVLI%H6Apd0%~-Bb9uh6#T#Sa#!&{Fr7uG=(O}->+skt#Y;9^N z+`sS~3gg0)nK&`>F{DVrg{Ov4pu&?WUJG~}7FUFhQ|*pJtz4CtS-$mq1TJk9^T$ky z^`M{Va}wu%&vEz)#Ttxs5UvhOBooqozTb)G?WV5Ib}yf7kQyhGT-`I7R}Ia17BS zQ7v{rOzSrPug~KeU^6XWy^G^`-Ji~Q18~=$B=23I>N01Vs(Cf8TqheYaXj||KJf>n z{K;?Zk@X&Y!H$eXiWeoponU4LlLD9(aQNsLuyk;$?s)k3y(l@nw5bjOS_vfK4qp&D z13B#Vf5CkxQqIEs;#AlP-~$ANtGP5owm0H;SmK?3mCP?~T7*C6S9gnu@3{Z$42?2#hbDeA+?lP8&rkpJ z)MLcmAA=)Sz7~QnM+hC2dyPuJmCiYIIc2~P61C&A(nE6_rF{;y`vAQcLt+-5gd28x zPP)85wC0DWX}Irc+BlEN^tO$os*U3Q^cEsI9vhbucICCm>5J3BIV?a(XR5 zHC9<6&VPSedT84##JzMtgKel7GojxN{pY{gU;G01zqM}4)I@q z!Z{&8^_zR7piL#bfPz2S)V5{njIFcEdi;i3+s|v}V89zoQV>IKRPnbjJa(8raNm*r zz3(nzm2GoGRvlr=V{p6ero1D~D0ulUOoRb3fAZ7rmjcdv_wOQ0!@2gF(=D*a(>Wzu zjmJYlZ7Uhoq{z}(2s&3iOa_9L(vhw zdi5vFK}>oaE8a>f&`|JXO|8s)D-@K|l z2LgN~;9DdDGG(|>z#NSfGf$YMyZAR9l+Nwkyad9T2yJvfT-LH4nTpR1P-Nq4v>3@p za0nyk8gif#YU>=9Zr!2o=DsT&3e1UWuh>~#XLIMVSuEUc9Ck65w6Sj0dc!87< zC2gif*v87vmm+uvo`2-wumO=O2ER)U(YuH0+ymj{SOc+iZ6Frm1@-dWht{ z46#G%H9~+Y7%F)_X{T5}m2VI>Vxt`lE|+6f4Tv#OFCqkfSB?(`s-8MZOrL*^kW31Z zs)dj)Xs1G%TvHjz=sf8>ze=IT0Wm-PQFA}#)4tv>D5;rT0ustg!AdAQC5w$td-W~7 z!`dvmc{_s|2Bb(!@!f;`Yrkt97vgb0!$@&&6kRKzCE^v0yId$yjj)HS$O;B+QNf=r zhutg;h!IO>v-j?n!%{83b}f%qH2b-qVr{1G$SI7ilF}IRT9W*z60I1J^7mZwMtkoj zr4(6Q3~8kLV^}MQ5DU#j%oOE+sUk*yK+NBhW9_}HnmnS26@wJZQEAQ))alKXg8$kj zcw|s4G?9BX>8Oj=QfQ*QAN)#H%&k@>nluHP#g%F;%Rh7}O!7u4Pkr~~D?(qbmr2({ zUoRgT`ODm)sat2w6Aw-2hc6#{s)uv`;r={XJv~p-`Ak7c+1$}pRl#F7mip`Z(88d& zAJNuuM4`-Dgz;<55b}k&THZzM${DlVTwoPm!|NB{brgz+cW5r(ZABw?gG^Gv8 znPwr`EGKJ)mXg=pDqT8;0Don+aM}J>8;QJPXuI-I(;7RFxIh z&tIa$I1fnqXMer>Ab;DJEc<&8>ae-)E1zyohl>=mOf0Cky4BT^$EV;w8^9;clnH0P zK^;FV_Z;nIOytZLURybR((=@cZI(`_Lej!s2qOR_g6c z+@jW6g}sIkayTjusQ6QduQ=L!gp-DbXFiJ0L<(`SR|;{l`u#U?$GzD5&ciu+NjK1W ze!k<9p1Wz6irA2-M|$P9!Ol|j-{1g6$u_Xh4;Jg4tYq<-_z9mhvR&{1BYxFnB-cl{ z!{gm5>msl6OLuOjyj5l0`;W4klFjnG9mhTEX63pmCLh4{EU0VaU&0 z+EgoM_W87Zfj0)vxCgvDh&{k@98~;b0*}EV>klVF^an;6(V`keiz*}1Aacgx_6Hs{ zavcYd4Lr$Vzwb)v^sb-<&PMF*ouUvSAMInZVe|iNAeNfdqDLWUF^3j?Uz6;{I^W!!W&M;)@ zAoptU63Y0Gy%|qmR+qwgu~`WMCi?$HZr{njt06_s4diKoe-k8?IP&;#7mAB1BIBJc z>C!>9l2*O!t9#SJ{B@sv4oRLKQ6J{@P3f5e8{gH$EVUoU_nnw{Se*W@ONT*JU!r%yBdCD&k*6eS;}A)THSzIT z7rYsnd?Xp5l#OyQVs(JOFZKrM;kk`M{_#_PI`lGU#*f~JFGl5B8@sg-0_5ya?f|7- zvDKQ%@+xaC5c{-~pL>&ZZhk<=KmO^-4TQL>Z|+w{c#p++B4tulXHpGUFa<&)1_YmP zIgVEjY!vgFFJ)g5Pc(5W>WZv2u}KM`JOe8X3-A8x&#>?W;L7q1*ypfagUD4pK-hfF zg1lU`QT0SFYjx*&*PWO&CvKE3%xzQ=Q1s>eXQPU--d}H&B04>|hK%8&SE1Unr1Xq4 z>`!Lw#$Yoe)FQhXyWW6`fBXUI(car`7Pjox>HU_i*(n2?TJ^=1ali+vavms$$#aa(6Rw>@4*KTJqqvYKTDnaZ*m=nQ{|sH{Z5t2P=9{-)6z*>(&1xbsW5L`|$*J%5%Uoy9<6x1hD}0h~zrB!Xmy* z7J!N-f5AJX;F;ZA%SWHQ;;m=!V)mn#-*pFeAzuL((4=NWb?C9p;nD=j1}QRxi-#FT z2Ih#DK9jCfux12apTLgmC@+*-4ibk-#gWN_7lEa;gnOI7=-~8K1to_X2#wQdO(q7pba4vzkEMF zYBoywQ^Sou$YKxw*88Qu7N|299+Qso@A?pYy2=xTm0B=gQGd1;XG*4sKj*V5LChoU zGS7SnOMO5G@6``4-~$KY58BMl=YF7X%|M(jTC;%_MHbpU_<9=@^TX}n(caPb5=-Vh zF@lx}pScB%r&OgZDwogasjI6xzI`wJyaQ66;=ckHAz=Wx?Pmxy{ms4bXf1Om2yv`X zO-R+SM_IErTQGVRMNrR@b-;i6ebQ}n8&!S!*+<_my?S^bA&eEgdTO;=Yi6o>L$grS z1aoycZwJZn!k`!i2f$IB-BhH|?rLKT6sNybE{ZT&mQ8Z#u`jVIU#~+g( zUYPj#^jpSvP5sNLad>6+s=15F-9QB2t*#StBv6_|`+{^8MTi!sjczU2?Um%d$Cl z)MT`V>$xT+RQCRpXw{&Of1)xX;cp9`zt|i3IHtM?5x#C@?#T3;CVn=0>1e_)S1=E8M^o_i# zuRC|O7G0^;vc)8BCe&(Hsk~TDBkS|ayxzLOr}%1h2Rw;ASf<5)Ba_H+g785LKjDsO ztWA~)<_xUaZ>-1qF1gYzhw^sk0|Sz-Ep;Hy~j z8+GuD7SHE@|AVvk^v1u2YS^KnXVt&)hsyo(X|1_=1^*k!SmC!C#(!aQe>a>!-8Rp6N@b&z+v$^4ym1gD?1jE$Pp`Pu0r} zD@AK98l%PTQG&d2xi5Dy_C^sO7GZ|+)tG`|Bcof*3?5Q-b~#cDI+^eAmcxmLkC{&&}C z7yNfFW4vsjmCB^fQg(Y2vDC0kEFTVJ)vj{1+zgvoquLk{sy7DwHp=1RVi})SUd+XI z|3obAO3NulM^|(Q@+*yiR^TFb8C6yfo$a)(5&f!J9cRra#Ntd@=j>*D4VA;~cf?rt zE}?ou+gfLG9h=RT$y*$CcDcSTR~4Bec>TQ543jU!FE}j9Tb%-JHc$b(#u_Rr)Ry;& z@`Ni&)s2}%Tc^#MW2tlR5q{SYb%i~i8WLl19M=t`kI|w$5;c0O@)*l0%hpcZEHEUx z3=wsWO88tcf7P#PQp_=d=*(pZ)?;iU<+ipf`LbOfU;3o@v%x@x_M2Qm1gV&6EoT3l zMY+8wqje@XLEn3#p~R&LBJb*42AiWmwUBhpUx>D{_5vl4{kaTglb32{aJtHv>q@;+ zQ4rf{$~G!qO}?Vdu4q!JNr4p4Wza<%l%-gqy{o#W!W}gWoQE!hHqWpvS$nmn3TI5N zQE{*gs#*rbw%vN$lGUps>dORn1$&Tob0>(ih#)|cXzcsZ-d zSm^DOqCBDEsHmQ9b4n*8lga097Uj`aoGJTOycK2BZVWJ^R|&1xyU-p+X|oqKN_#fj zb^Tc^ZawyR*JQy5sV}=KF_kV^NJe#! z?;NFubuLXhP-miaE1D?9X@x0m>Wby#aRXh^CaSiejj_p8=W(Lk9@H_bC5NY?t(p=A zx#a;-u5VZvqYi1$ETG(tsa)cs&?v)c#$U9x>q>7lXegY!E@xaB%F|gXxZ3Gp#~IbT zgkDp3E8#GcH|v#-VskZXKe{5yQ_6}(;Y~LIhf$=jIZO!Mjw;Iu*hlOfX za&9GOsda+(m4K7cZ@|qPFMTPp6R$HtT^Sg6J1wyi-^FI=cGw~9mFlkw?owHdx^zy3( zxuPvgQXx&QsEeg5Oqkv85UNq6)iJNO8*Azes|rUv&Ip9RE``%jVH&x5aaC4k*rsBa zR4gyc+JcF+#Tb^we!MWC2=vE@RMPMMSCS}V5NG-i$obiyt+(B{(Fi~cSuOfos6awiNvL($g=CY0iCz^vFD6jgJ}+Q!v@U&$VP zt5BW^(j_WdWhpAua-yMI9uno8S;aaTDxB4*V}&qvP@v{^G4iUJO3K-8JzK~dBB}g= zhs6iz5;6&7G&E>dy;4DGHI8Li!0Eu|B5EJu(0 zQ21Tiodn}=Ji6jBv<&J*VPsPLU9%>{RZ=Bw*uYtW?5kQrajIktgT9*0j`Xjg0Z ziSlec#28C~mR;T8=wkZF{|NFfm6CT@#j1{VMbd7wwJ@_&d?2WB(c!XJ#mZwkPnlW# zx+wQ)+f1dc4LcjAvWuo|H;QtPLdIqTaeKzV=4+Y65)L=yY(qI^ekPQ3cvkCvqsy$C zyGWE<17(^Ccf*FNQg1G#m_5G`70QGX8;FH9n`M@0IWGH~AeYs-Dr>3x^of;~NV=ui z78T`*tela{GOL-S%4KpUFTY)syCZglqy$wVO@oCwF$zqpE*ZCKWrB*1r(LO~0$rJ! zwTTa?0}Wcyj3k>YIxq4SEQ$+QMy(ntS4yt2CgpzCnx5RE=)ZMc^CA@9YU5*1=@bbLpLhL zq)9jmI6Ed^f~_W-Rhf~Enq0XHMAqVtF597KWT zZL8dNDjhJz>zv!wt$OIGH;DDf6ip`Hax3i}e{5BuSbR*Vrxj~iBcXN@)KRdk^!Z;D z#Ws(Qb;MgL#u9St+>SpB;$}y$@K{}}dDUq!C>54zQJkYv>kB!x=Zow~4&CO|8YqR&M!8A+ygEEUV|lQE3Di zgiv``tl?6#D63`0Ul1Osrxj^h(MeVk39Gm0%a~K5++QeAHdU}LH>s_r9H@Lnxh$n) zyt-9uBhz8sv4Y1pJ@SE}*N!XsH1&A2q`6ntOEaP6FN?xrM-Y=SBeN{o<5<>j$^Kd23-Sw^g=v`|KZQpPK!|?Apl1^FN-w z1|O=&X3w1+dkK#`vH)Q5bu)00xu`|{z_HSVZ^XXk)-9E(*cQ(gcFWGG7pA^9_382D zvA>NyJ@#*7?;q}rd|>R2_;|FAT{t#3`uoxU8hv>5j?vceouiTYTShM(J!|+|!AwMus~CeXu+>k{f!M+#5g0ABajPy1*55Jb;-I z%nSjGrU521H22*n#MJ{P0XUV@2e1{`S{#7%18U3c;{~l77Zrfx_Hh^lkcJpGUnIBh z?P5$m;15P1{1AeN$TCFl1OMS~Es8)wf-uwO!b`M)a8m&?lLkYVC$s09Q|})BYtMb^ zt``u77nM$Rfha_FL13T&LPL;$2624Ug?QGfTe{wOL?9fV;x)62xl<`40i@I7TyNuivz?K=^{!Ga5aK> z?L;zjB8CD81Oiq-j{!amq$O}+fI;s0npick3gl`Cf&3jUP)dMPcP#X_|6bQ3A|L(X z08mwfP(B1*03zU@@lGBX zJD?Fd~> z03!hy!zZwmXjVU@aZ6d$_Tx1PzD}5eK)V9=vUB0ImVkGBdCaR!whuQ$ z!$*DVTHHMWKWRdn2*)SkU&REO72gR6EkGE<9czKaQKGwnWOFmSX2pjAy$%4An+6!c zO=0f0fe>W&2|#OLxiBXfg6TorWtIRQk=8M@RRC}50b~XQ3&0sdGTQ2L9ej`jZol)d zV$~qY12P-nO909M?7`P(jw_7+d|ev`;1hEfU{oNz@S_C5G%P?nfiQ{mf%IXZDi2^MwkaClpbJd;IdGxkGI(_Vvc}X^AX^< z8{8r!?Il(R0u%PUO?cJ~=ps-|oirvGfx8y4e%$gs0@{m&h!Eab6A+phUJ}TII+#7~ z`HP3n;=lRr$bl}w`yqcwCym7bNEJ}T0Cv&4z9`fVlsw4&0CXp~K|t031rEBYk)?Gl z36lWu4QmylvjjJVH9P%kQJVoaL+iIRT3n_k!263~*5{FM6(1r<1iEl|T}#Lo5n~0@2%8QAioWR< z#{PL-4YWLfhH%^C4{-Bx?mn^p zFc3}zk`A~X`U0c~06S76;=~4&odz1YzttF#_7tWKXy~c)#Ajg+9l)Lg><(}e@MD;3 zTxR=+*R=?6>b@evY2wOtHCTqTgs&Jz3+sg-z4Nl!IZ+Gij0NFy_h$m3aR3;%xZ}xn zt)p+l5qF1P0tA^fq_z9~q88w4YaV^sfC?EqNt~Uiy`+X&1LzqMwZ2}?%I3xil0;~&|K3UOe`GSC?)dS?&iMN3Z#>Pmt z3fQ4;F3;?U3qOo-tRg`AK;x4oiN%V&!q6VuvaTiT1V;gIVS^0;cy^$@iwgqUbWl4qyWb9-bhaM`Qa(yFiR$fgtc6fq7{F;t^Oy;LX6^FC07luultf z5B7i#Y)_wK&OlF!Q;#fAtOQsH1or_S3!E>u_hA7Ls>cp&@(acf@K#VqqsO?y#J`I* zQ{gUh0pooDS|HRE(-%3V zOgTg?ka{F^6Q>%$JAoO7J@pi3#WR@&RsrBslN> zLEZu42-s5W1Ymry=4Mp5pL!Vo^9P?E{Yd}3e3+n;&4X+Y% z-PC^}(h|mj(Dk5gAl3lBoSe7NUY@F>wrBoJx?^#(68zJVJ^zq6@%nv7?%*BYlFsZT z1Q_Uj%wn9d$VLy+2!{_KfFq0i4c|ijn-%Ci{&WE$r0S=Da3LwAkp>+2Tt6&G0Xvc# zaB;w7D&Las<~vVGw=Qm0r1$r4sooBd%y&=)j1- z08|kvBnN^?5M%PSAD$t`WF0~J-%{Vg#4o_0`!AzMr{6TbWA4J)E7s{Exf4522hh-* z#bJ!nHCxjh4dp9IzV#af9Bq{H!_OfUqt9{n%x}mQvFij$(jwfkmxG;5iMFIvA+OSC zQ2EmQw|^a?KkvB`fz$*=EuK!yeK)XjS+}CUV0+A^Q zyjezj#K4=pI;(-7IFi@b8gL);vY(-vcb`HSh-IUSfA*K>AXG}s6TH~_>nW*ocw4ID zfh{t~<xQ>>Cca+ zhQBlV;mJ#3?vM%l1j$n(#C;@#saTE;$g8ViS!X4aPx8sXAyi{f+-KBB!k={*@~OX* zm=EU(fCO1ZG0wa0J+j0H{vs8# z8`S?wqIXZ6hx&x@H@nsp!r3~~E+*OvT_sBM(m#_JwE;1IeSJ?KJi22r&&a(mqDIe& zb5NrIE>}-5C0@dDr)`MGm=n8Xq?)piZWEhnzuC?@_jS?{d!Yk;C%?V*dJfUxVnhRY1r8dH6_p_{^L5 z;wx2E@BYj9r?(v&>-|5;4OXHS~6v9m}@->RpVE~$1)mL*G;C0Q*^ zrKf$fEN_y4hR{NXLVym_-T`}PQ}zOdP(TC2(lRVFzzhuxTcbs>^z1-UL%x9Hf+_*91WQLxGzs#TLeNB+GH zpKmHA&y7idJ^0e$E%nKEZBR3?RFre13f9Sda4wyOpXbLr@T;a$a_%9gyDoHUk%dB9 zIU>(rBiL`U**-|#)`ed;6(fzrPn_hyb$uQ6eVesNEWq&7vjPiSV<4ZIPnaz+@~Unv z(1DwZk-XyF?)tOGZa$NjNto9uwgP`G|zJO<>iWL+OX`HO_LLS zXsEfEn4H@u>YwV_x0Z1S?x`BMti-zLhn_*ojw24^X-;R zJ)iA)PuFS#df>I&Pj^pu z-_SkM-P`p(&AH9L?y7D6{^l=ket0w4e7b8-r*m_<^BbFeo5fCg^TExVyPng$uIsy9 zk9F?qd}mi{r>5hl9bX5W~Y0GHl+Wc)N+HSkLZAZ|}RSZ?-Sg zce3wrUw`j!dVkRSrIz=$yt$>)a$Cz-3)Mn==S~jGTW246;Qo&G(;?ATbg@$oM`&)` zU9!)`!-`2b#040US#V^Fe0t7mF=WHb4PAH$iLB>2hgY0Uv619LB^6eDGeT6>wOBMu zOC>7hp`6B0NU3hm#C*(hYC)Rgv#i@KgaoDBEYMNfYdoFzITMxYyfGJ4EH%OEn8C!P zV{TU@A23_T4M9rz0h0TAnH=&zP8r4ddc?m;fK`OwGGxJjkgUOoDB#lZozR=io z!OF0U4BQhIqzV#YZc!VWjQZ*2IC8&-Dda_uZM#+}x6p+}RtiJr*~b@C)gvyU31ALxglc@z`IA+j@_u1C*Tw>2C|N5g)PqWiL38hE2muymvkg*hU%CU zK25u>Rojm_&0@+`w2m1A$jo_I$xa0|$?j4Nn<4Qu$4N}O5DK~3 zv8lX|KeDso>k<-?WW2I8KLI0DdDgb~Y2~ZNnlZ`Fr9y?tq5&r^Yp<*23zII!UU832 zPsiM)3Bxg!6^yw#Co@y@jU^nZnMsH7sA8}R8Ks()oudP`)ae<&(Oc$^pI5qRj0GZo zXJR_+wMPx6OnX^v-#eSbwRkQuk@M%5(!$W^mFmLsR2E;Jo|vh)Ygy5t_!ESLMLJfU z_m0)7_GBfO-}Qvjijb2E+&IhUT!nlo$nnQu-I9IgLPE4KK`%wimJBn#$Qi_;U#UL` zCy__8Feqb#vE0~Z)fJMg3S?@(pUddEw_si znyR|87CP^A#Nrc*YY!~Yg*0aooVH}nI!3Ya_ESoI!*brwNK0X=xM+zu7x;rdW!?e0|77Y8| zqLy1FU>NXOYr*ZU_$G4`Z&%9M?1IRcGBuyiI~mHAn2BhkJXrC2wIOD%n5f04E9q>Q zcPUoxV8s~9arR``;T^9{S`tau5^nlK#OFJ(?R1Ds+Dl%i(L}+IN_6J~>Yxo~M~z7t z3Nc=+mI?wl^(yt_1#5<}7G^EW(XcO^r~Ut+lnVxLnKl)Lq-e2v=1QXfua$BxWtpb) zE>CDKI_aGAB_`+9c9O|)W+{3)PSrSiNj4Fde78!GzV;Sj=E` zGGCf;8jJIGCY^(m$sd(=%&B6Mvlph_K3BNvuNni2#XrQ%mrI;$Ji_w9sjw%QH-Av! z397shn=E-}7p0}DY1weve2vl$&Zr_g8Rr~hHa2WpWKCaD%8@y;!b}Qo5AQCU9G=vO z;?xo1LQ_emSWYtD7_@84sr@_D`cu*}n|28npp{RjIbp|PwcLdR${!pzmW26Y!eBJ+ zYm{UDZ4~@@O#t=J0peqtxw@qOz>=G!1GKSJ7>_%nvGkt*PzJ!6Y9d!OM(jZ(T=wQh z6x)7?%~4a7XsaL@xZfzHb|;ip*tjJ~S7Woas4uxttt2{C$;3|a)lyg#PCFC6Kzt&< z>x5e0=3&{86bUBzylAHKoVvG}T7HhHgpCW;CBa7@cw*@)rr z9;F#(Zeo(L!MQwJiqWEnZ@Wt^pITz!@es)wvc>UuSm-$Y5tZOglsK_W`^1E2K`csp z+SGCZ0)2it8i5n4P0C0;>MSq@J|7zQE=*K&NwZ%VRJRgct(2JJvX^#6V#QpX*%MQm zq31jWcGl|&yBXVIVUI%BO$8fT3B}2$HR6<$yof*qk5=lZ#&3pUbdjrJ-ukHphsL*aQ`xDaSMP zwKHmYzB12M>}GdnzH0Y-5<9=D^rt#Aw z$#z#s89*hwoNy;0>8Uh58xR8}L&oZlWw!oK-56usM1+Y`e)m|^ zN-c!qhW9jn5OUNgD1ja6C;|y=^UlPSdX_uprqY}vJ~NRixnh<;e#fXZf$+9gh_T8+On`|Y<$CoEd z(eeCbI=@>L#11~3WwS=x#60bsbJ$tW;|ixcDB7H}q{@r&lzp5%9Xn=H+OZd%9EV5- z_qf9=#R>+^?P|F+M>8|Yh16`=m-8;AnXA-tYa+>+ZMer3b8OJa?B1o6+p5tR>r8O) zw6w*YA>)liEnf;JID_O8tBbKoYAW6KExG)(1+K`!AZyP$T};&P;!L^Wm#IHU&Rdwd zTG{7dXivCo+^t?;Y?5E#${5fTo6Js)@q1pQ+;MGzh&wbsk@S{*HhZqGT^TOkI_{j` zEP6{)QL@lO-%yH?iQKdp$d*orXQnH$0)1jyEq8}_wzyCZ7?WAs{L;xIN?$D2g(zWYMIOQ8YEfcT8ReQ@| zYKgU{=`qQfA2Tc^9c5$^nujj&yIZw`{Y^A-5Bu+HNEjd5rk&XdQ}ZR3*B1@1N)!CB zc3|5^RmfAWKWl0E+k<7qkRNWukRvB;#EJ|KH2`VLP9(4z14V<8)ltLbtJ}2$a?-;M zs*vYKC*0)59oj1aS&$vt2M4RxusA_a&Bwj*$&_WS~y?VaRB=4mk3_X$1}s zKy-D|dEZa~=NxT>vNvhdpk({%zAGr%>Ic3( zdOI*yuG0Fqikteb)`%^??Xh>?*7ohL*K~ZOesJKit2KMCTR9G8mXcnU7nk6&>-LLw zN2EOM^(ywa`*hlE{Y@m~+y36Aaojg$wMR(DaqT|nBd=Z8M>cWe8mI0VxdNvu&=D^m z(aO*fD{`(<1$!zoZkbQQ7gI7;CK7BwAVmsUVNYJ8?eA|QDIwc`ca0WlW4tTKnyPB& z>8gFoLkEn)qSG)|u2>a2W%?jS)k7@z(aak#X60cQL_eBnCLz+RCal*gIEzOVHgS2VVCUWF+N3^2@&Bcm_(|S}3 zc(G+`Z8FSQmOXaCREkfsQDuLA`WVDR6OEj|{;9_2_SW}lWsPiPMZX^4-LxClcFOee zE9?{%sp2@g-P7{k?$gLJc<-jkwm-=(mB#&d2Hx;;@S(neHerZyg-NCwGbN1+V+Dj* zlLI^!|*R+2A!z1|h45Rgu z=Q(W;fC6R61UUFHK=Ft72W+4~U6eSv2O|Iq+=xof{NpeGPk2S_;lDjtTa#dDz5+Wv zO!0Xb&L`m6BD?4~You<_jt*}~Bo~hT4`i2c#jQ*P?R|SE-cXeRI~rU0a=rmKxr`fg z)0zM~p^a=sEEbIAFpvYyDhTHYA43LT*EvK!azeXv+e?X_0=ZZl{lBqyu7mWFJ;>m1 z17BG{LjhYJjl*{g(gkPBj%x(^Qe=(|tIBG9WElLaeSkc6z4l6wiMwuq{BGi4mAkJp z@CL)B_@+(O8jQYXB0dR`mf6(fZ~Lt#({+E}q1I8PS^bI(fae1$g}8!*m?|no!dQss z5sa3J3XGjXz9z||J>1`1_?UDHHqphsJITYp+jD|E{^~t@6r9+GVEd6*yH}37m(z-> z#?9Jn&Ca9}Hd_giG|7yl96=77c5uMiL?h92k;CM+yRIIpKWNkXV0_3ydr0dRqRF0`&8Y-pLK1phmk)QU>JMHA)8^zL!wZ%D`o3g zBF`)=%;x5uqAhJ}*qnyRyhXdU_c9W!*O^gd{@YXkhD9C?4@;gBWnDA zQ!c(+ys`d!H_itY9zfdE{a0Nd>7&}aS`9t7cKo|W0^smAH;{3n+MdDX__&{9s=;Zi zXbMg^#|`p250N)VG1E;nxCxvE)}{^7{Le(Sa;C)@yX(amUXAYA$+4MW=vnlxm@~+&3xl&esu0W-7(^ivI2$Td%HPPU^s}OR} z@RvHcP?5!SJZBM=UGcg+7NUtp&JQFJx-Tc~ z{Yf6niFV|Cl1e*v#=dNU+GSzRxH#_fn=?u~w-(V(6AhOCsZnxUT}~)jlqU<@)V$7F z^Vy{sG9=Vy%#+^93Z)F~L_#~%cR7V>v+k4xJzar?npa9v zWMxzlH{HAsr{NsKN2-aeFdj~lgYN+Qe!2$sZK4s{@$p8|`91XmFPHBT-W3~qr|i(0 zE$Klxi7-J`3?(}0Y24(8$WJS1r-??M`{Gp!>~??h&~V*V1;1e{yqKeLsgy|D*;&q& z3C5Edvw@Z8bBOF*##U&i5mQQkvR+$;;Mz03-kVH-@%ZRvSE;bDG`+~18xNq-f#zcJ z*n7bBk3V%}XZ_#iwI0ntJmP1@sX(ZlU1H83r?zt?~s!XO|xBnxp0$^CD7*85z~|V{g*>w!U{$pRK3V@hi=HyWie^s5RO3PcoAKn{homu`-EWWNVy0lzBFj z=M45T#U;v?WnPwhL*$dI+HC_bA(_6J8oe*)L;i>V);_O@yrXZ&lk>#N)OvfdQifS% z<9-`&^&#bAHA?>bZSwQ@@?vuE3qN}aE_OqP7FV_V_PAI4U3zt!&%)xe4et^TLCz^i7D7kyIB?EJJRSzw(03THM8v-3%j*a-U6R7@`Z z{K#k>K5VzhhoPKoRyhn!bD?;FW{uhLX?}j*HwW1(%kU@ffxK*{$=+ZM->p6MlYcEs z8_$Yw{V+5{g6UbhoDL`5NvbwxP=<2Xy*Of;NSEZOc=}!(&U<|;a$;Bo+^Cc*NG>`y zYg}~C2TI5b+i>|k_EtQln@Ge|SyVh8&%PCh>K-{gt*rq(R+-PHSr%DbovsS3qK|9$QYu<}!w41vh|q;J)5mOnf8yBX#6)2y1pD4Tie-)8cfzWVTP`!mimR zIr z)a|S%-z7gCVk>f{l9xC9t_sV(=?FWu0AAq4s@Iz(vk#$-=3+8;2R}hx__?*S{=0|J zkHJ!9%9~;6Wk=XDZ=`^_PNqMgJv7iFf@ zsg#`i^7I&a;5B?l{ZkL)`m%M~roP>6U+B5M@cD$qO)tYVc@%X&VB65ZfWhTbr zx#b`bKfGq&bSzY61#<1bLgu^9L$lOGBbx7<;RSqg@9z4$&&zuvymA}fAFT~3R`O*t zsbW51t7H+^5sZ<}NAQxryp%jPc)RL$_liek{ZwS-R@?*>eAUWAG8Sa3lOBW-`^ILy z#Pd(+$L~K1eNPjKT+AO*n+bmm&EP>7d+|Y6G}}Uqw^+*8W?|7w7|3H^$2Ia>A4fZe z%W2RW@QwT4?mAbO6>i}bY5hGFhT(6Pg{M0(!xFItk(_%1-TBzxV_KR>+a>afPl6|!iwV7X_YLI0@>E;>m!HHvd9YBKo|tF3YKE!J zPNhs0AU*yQdR_VyPTpo3xllQJvi`MCVUrDxFXuxdJ!Xx#r0Io)#aepo zo!ZPtKd%MCG@@Lg7xy4%os6vN1tuusY|>=(3(zucNF?VTecS(?H0nAnAuC_hcJGuE z(jj~bru!Vif8u#L-5}J{lsvn`BOD7%%@%6b^r92VTIVJ0y*=9^Uvw3+0(vHRHOA8h`c&Caerbv@FR?%LP+_0GFGukU!S z*taF(z^`j@29J7_a9Tmexm;Nm?IECMa5BMM_|!Ew`*hgPKDl3{-Ml(vZ|M2{EbX z3jlN4Bsw+{0=97LvdV!Z=qJ`TQs91_?93>qk2A?K-DNG=#7#X)r-856_`X!jH2q{ z72kI?Bcpm?3n6OAls@o2Q=X0@&m9u6;lS5Y@W=|PKflo3lr#FfQ7Ar#= z@h6(ni!lNJ6A~N)oB3L00~Isi?+HD=D(X2=VD+NJ8uSK6l41rv%CKT=Vy!Y4XN@8> zt9mdG7Ev;?`dHi$1B1lniK63)m~niCeiAbmMDdGy)pHaLmg6Y~41%u2M2U~{TuVr)YoHDBBrkI&JWRny2}&Pj z1wkL>s3h8+l9jCf8MTJDej zJ(%ej%^FU{jq$iqh)Uo&1D274Oo;JG9$XS*lACTN4APaOC7Nq7DU-sUqM}H=Vvr;~wiMVfirIsR#e~OM2{jE2*1F}U_1csn z8HYsG!*?E2!SawK3^o$jg^}V+60%Qfv98donvoH(EN8?h_3%!@wuFGt$D#%fI~t;# zk0uj>5No-A@Y4!gF{i*45+sqNhx}n6)F>Won80}xg@_liA$XB#IoW7?l#j7VK`_R# z@G-D#oWq8Ol*Dm>xfYYWF&>jzu9tf~G8!`^6R`yLN>t`6F3O-un#OJuG4B%A0b8rZ zsMHlX$|zz>f$8MB1|y`P6le9cEaRe-lt?C%EuvbNWfPbVMh_t#lNT|rHzMmE#+Q&g zgmw*ymg|(6qfSX8)=cJmI+?&C8nHQ}@{)5&oOjqlJS~VV!dmSZkHdk3u%@Ch%mo*V zqHR8*PZ(&-gAu@&ICj~!+HjO&IT5|4V^OSlJPu(U2dm(OjPphVI%J?*3~RNqUlLM+ z#q1ho{$MFt@FbG@B-l3@$E+r3p@mV7^dwCicmY!^&@{HX2)SmAL0m#cK#qv9C=MXI zTy^A7Qs4wEzdj+zOlmO7=ROtJv%HaEC?mcoB^-@LZ-@#k!^ChFN;r&B6(f`-hdv=0 z<2=RF5=67}QvaBicfvnL*YTE36K&7S?=qfDJg)5>bb6MH6kQ7E@^kanX=^P>_J32m z{VI5YUTPR@uJy5V6R;0Ye_cDdFK`yf$7>eq%O5<-V`y~4caWMa=KcSsy=6xhG1>(= z^9Yj0;TDO&a^UAo@N!Q^w{1iu8p}f`$$_5@O20^|dd z<^g;K4kKxD&kym)`s%l|{lgp9K;pE&L#mhQlcVH@Z(mW5ckj1lEA!dGbt`kzgH2SP zgtvYN&yyw+auVGP?H&CDw3?AD@_{ohIpiNOAiiawPGlzv2v5UHa0JoVFQpE(Zg1=OT;J6_4$a+N56DKEGBipjR&r1mD9XxA z&YGTOoTb#_Y%pBHJ%|kb1PwPA10H?Hs1hvN&?)}SPobnVt{^5_HTIYp1N`#JfyrRe z9W~7^2qf_g+G#E(gKq`eIN+^cQ0+VaBinaQtfbaEWOfFN1-d$C@k2H2DlcanZ#(kY zpF^kDL?h?kXB{O^J$?jcBl5cINa(-U%tqR0(7nh?dR-aOyuXxPNdEaE-s8tU-1GdwzM=m!^s>y(%)1}=-z6>!De^8?MJd&$+wbRSI8ui2m)Zm z$y5eUi5Y(+rVME6$J(uZmy-znV@eI|{>YDI17c_;i)KzY^fBg;2(Yz$cx=I$GFNS5 zJdvK3C%CDYoVjR&X8erMR)6AYIkGUal36#-AiLa@m6@6`o1NZ;8GfFVCBTlWM4r7A zHodu)te?24ZvGimQ1?A$2<<(KuxeEvjZviv$C<=vsJ6%~7vaWqlSem9-ta7xp3OAX z=jFCvXm8#L1P&lg_y7>%lOf0eZWGVQ@LTfFx09dzLff}}<0|Byzly82kC|Uyam#$< zm#}@99TU^@v`Bf9PQhj>7|BVGZU=e!ub}X0B9SxS|7F9Y4#)_e|J4S!!z={gC0U#~ zfgSP0w5l@p z2DBP7Tntd4edaB#Ba6Rwry0Qe*V#aLk6p>p3rq2+<~;G5>(JbGub>uyc4p` z1oZ7Qg_iw_h`RapbFi1S2;WtE!cczM%CFBsO*5 z*~<6Kbe(VC-0|;y`uf4bkG-(ExK|d|P1@sj+k&{@uhGVUzd9d@Vi$uGS2eo9{w5N+ zr+iJr8DV?<_Zl5`>*Pui+e|TR%t$plNHf+&>r}xW%2)I9*)mLC-=iBGXr>W5r5&jw zWirego|QSYp_oxKW>a{H^^0+95t)V-{c*W3kf}|@gWhVQ^T+U2o%SCE!bHF-O#QKOfY ztc9^!N=#0f8D(rg?$Qk)iV!I-tmL>Ev@yzfsqMx*}o#EG*ir1wnEmk#7%ox zlgBh$oN~vAZwS1$Wd}ahL<5VMVX*%pQd3?vzJEtOzXKBhObI#1n!+rU)lzZga(SD_ zUk!PssM6M326cmdmy^huhvCIJTSrQm=LU5^lc*pRk!MZIbJe&6%{IL+f{kk#D*7&B5r@9_#J<&7MKG6M|zGIrWY}s?mJhj@k z-dUDe9G95n)PfjE`Ik#$$Z7I**=l@DH#E>pQ!IP36^rcC>i(qMq;Asb_U-krz)wOQ zKIL#P<+w$*Af=^ZgqtFdejN^VrV-sxe-jD0ruHdD&3BAI4((ahtV>nvjLW*bv{V#l zryVf_ktw};;Gk}6-{mA?ddF1_+?1X57Y<_bz$vdpR}^2HxjgHItFoC%IVy{}8FN%= z=Ep}cxMmtT*Yl0hI(1YRk%cM}T&epcSq_&MX^#}(D5f@D4mAYx5ZQhhZ8X#1xAypG z{no>}8F1ICoaIX4t_8L*S)~ir+?<#7FB;-%8@Cs0&v zkFM3>$~v(sr}a{dsfoCOTHpYByx=sHW@ABR?XET)=LM)8Uo=Qqnky31YZe+9FMH}= zzXn@j?`kU=RfJ4pX0jGx%w>ajVLrkY#~Y8FA#zrSzBbWF^f>~DvG2Ot8tJFs^NdcX zQJ7-rxNfiNvz6P_dSl*;TzfeC%8XqRow@0q%8?W2|Jb^CU6tL^YNP|`?-E{ky?7rJ!YNaaS| zww_DN3H^7~QF4>@=-SKRq&&^nt#+YviYxzAI-j3qW;08%k~23M9*fDH8z$F@IGUSj zg#MN02!YXgJ9$&QYXCKX+-_pPjE%=7Y0)RL|uGO*CE$EnHICjUDd=)0S9G*;+T_G==x0YE5;^tz-X!l!I`MI1I zO!>Jju~1p$CZ+;@N*rG>d!yuL9zSm`mUDGa)W65;fc4=q7|I3Kxlkwx;>2_aX33ib z{G_?KVL`s{Wg{K+&kOPegI<-BV_nzC*Ddk6n4g{->yLmEsSi7Zuqf==JsixG1me^&ZlciGO>9IJU zb(=EskcP>!8;55TjYRMHA#$+&>*4M7Z@YD2&4w?p!y7)j)Zh${Zc0PCDBiaBEU=x_ zw`J1;C~Gsi;ku~0t`7usUPN@91tyc)#)b56U&Kq0K|+T>9-5sv8GH|97&EQgI=o>G@~k~NLEb&ByHe2C3)8v>2b&i}U92w! zH(0E?=J+vac2>f=5MIwxWd^vw6SZ^(Ij?0f(3&^ot0`-J)r@Xn+eTHOY^%Nb3i`Yk zAEmF1=z4Ynik3%ghzuZ%_c?F{ml5srd@Dg>xGpdbMw3G73lw9YUM#vG+sk*6-PfNxxzT>Rhn z|DS;)>+^8mZMu%FQ*gNH`kRhNHB+s9JvX-fygLJbzh7Oi*(#L=O+Ir}|Tsywqi zHxXM(h4Kpqa(f;}M^h;|)8`l=Hywtms*z={A=3U(fJlq1LY<N4}Yc9BHBv-wHG%k*_#=AQhD>4vfamJQB>6OEth>#I2k>Jv+#) zlCFQCnMN+$vxs|xL%XZ~DXH-gUfr?YP>za&W$j$D?4hyFQ$g<$i2c#yC_??sRH=Il%!9W|ptA zwyGgTj78nZKy$HtZjS0%a`ff8 zD@BK$dAUxuT^wGwT{Q7mga5V@*DG-4Xd*ROPYrn8cRM5?0@?ub3&kFQbv*z;mtmnJ z0dsbpg|}|sxC*(a)d+>h(>G`S++@gNZ}8QdI-cwLV*7s0tNU!NH}#~t-+GT`tPZrY zYh>fW>H+Y-VmuIeM?S{bjS`aC6+MdxKWJPMDsRM|Y@#Xg2hX~X?jrm59s3Ds2*8VP z(gAWZvI@vaRRT7%yt*CQUbn$^P{Oz3ufw+5>s`GH0$CA(K5ru6XN$?D96gbmSzb^& zb@v_UR1=Aud;C^h#_9;*`q>=~HP@<)=covr7%OFG*|aa<$cGmht23&!bM0N|N;8cd z9RCbbWnMVAy?*vC+_d+)SNEeo%JXn$(Hb@7(&K)&wN@VUG!D^Wa_eiLI=Gxf&av0a z8Vx1KZhQS7UL*HuV)YREq%<`VNw`Zams)U5+q0>82NKcB*Sk-i!PuH;B-*ZfF%j+d z`p#F&x|YZ);5gMQUh}qVY{}t+ENryKOJA+c^++S&%=CI4!sdik8I1F~T_RF1Pe-V^ zG|NwCmS(txkfq3zhu(k-d2=y&?%w1O>E3s&@8f56qnZ|$B8T6o+poST7B=QfXaKuxmZ5mxV8_G#fKs9nrK9G zN1>sP*+mZQ`3JaKC);-`VUP+3en@xKzB|0D0Gw2xz+T`R*_lMu6?GbYly#9r(JJ}C zIo-DYCK9>0`&EbKV4NNGo(JV)W^(l~no*dL_8EjMm&#>=N!!?Dq)HwuqnY2l7tJ)0 zh~_h=UW_gx|MPs#MJCP12gvE9 zIeUe7dJ0q|<0g-#aWf6P3tEwvl5}r^?M+tZoqtzD-@K|tJBqrYTsBlJTp?PsPDICR zG%v|QW%wWs(~yz5ZCA+V$?cg2}lV+E5kg zS~yzb+{!He{_l0$23|rs|1HfZ*>4`%S-<5ISdBg2Rc>84rpyta*_lXI%h9pvc?99h z-2I{Rn1yD_oVZzyyBPY2tXiE~J&xWe0hZvfJYg_v6pho z<@Ly!FLWr1M*1IQDd}CM(4?Xxbj+J;%N)P7IKJpAO6#xqZ#>PG(;-@iY_Bf(sl-_WqH|WH z+)I;c=cXY5`kQEgv(>JnNN=zI{Xfc<3dtIYO7u+BNxSF6#-uSzc76dTN^@}|BBQ?Y z1!xfl>G4W(4ghpZA)5fi!H`5=_#%GNT&!ruzWc+@`ki0WO=21j0yE3wvq8o`SrC?8%L20;BVYM4e%@S6&b{qP zPu=qs@cy1_R}I*d3Iw%3J!j6&S;92qcjT)@WmA6ctC;1>DRQ>^m#X9bMfbvekL%)t zvtgc@qs_^H+de;Q$|R!Xre|=)e*NRPS~k&0bo#^^h|XTn@X zRUElqrYX6FVe(&J*9{JBP=h@6;EI)!1X@{5W!hysS-=)-9<-) zZuD)Ky!_vAacQEF^Vb|4sXzK}x*uy0uPJAyf#*^P8D>H@q}W0#E2ImO`?Z67>sz`$ zxZQ75g!G=Wys?e2?e3(nW5o_P$k!XU$^6s0q*QC%2+%IHmF-4oYKQV06pp? zec#t@hDHY&qU0G2A;nB19g_*k;L>TiNw_9$NJaegw+=t@=qs}t@`oSjwrt(EspAtZ zf9Siq?TH>Jle<%0eFU8!@u1mfce~{a9`$w3y9F?DWK#WiBu~$7JEPq0tYM z&;A!~?aeeqt6s$u>c@`W`qe*?Rl}iGIbdH=FW2A>?PY{?zAP*!{maf&WAe$-AHqu7 zM1yYlOKN1=YknvzQoXBIw44t_js6j5={p?NumtW?({_@Zr!)J|aeu+pihb%mKWLnE{NC$@OcTS{kvgc(E z*g-z?ds&QbScN?Hw@(?!n|Xc*x%LlN)N$PP2i<-9Ce8|2;gJRkP!l_?vD(D**gH+M z2CJ#_vhPn&a!kk>e;jfU6|&M<;Z_R8Hq^Wb(Z@bM%)tAKx&*lA3bje}%E)HxQ`FFP zJiMtj(`V~?qW!Su;ht1ydpDVT6+mIA16^UrHDT3>Lt43M)c~uQN@a4!c_th4O004= zwr$Z5^j%IO7f0W|@wGnRqd&0k#HtKJp(s!mt5&a@uB8%*C7)G@IN;RRryuQaDkjf; z@-aN+n{+4rdOQ&#tH9e>)14TN%Q@PByq#12Sk_S_ugdGUkvF#MhX%%)Nt(@vZ>m4r zu9w4TS7jIqMdvYPvJ`7{lAE>)i;jhOA}!DQ=seG%K0Y{Z z5j=T6&=q7cUg*@rcjIyrbT7{wu0Ohe{{a}i^myMqzK zGeRzb%oPxz5A4UK_vmJQ|3GsEa?!<}tiN`%9{OHkRmS;HG#pVoFdf-tOU>c7*zGfU zp1iLI)6-nMk%psBzyH30;}g4az^wUBHm^xzxxTY?gXOB9e_YNh^`UM0hJ6b%U2S8z z6rBq&fvMDNBvunVr8s%>D=FB~L*%DIPEw>WL^im>4DxRxOJ~+c z-h>uLk&2kT^x3&_Wq{aq{bfo}a(XwW2Z{KQ?`#?{Y-xNNsiY9qimY#(!aN_}t%vPz zqblS~`d(Ejer%8aN(R6?_B3Ya-?2~RF9nRVTwX^3 zNPN@N@M()3mIvioor2U*1{IujFWK0_a)hfP26N7)T!?SJM!#*~C8P^;ct$r|LO*eh z9+&LMDi9`A`QE&t)y@72-3FVTT#VRns(()>3wY0}cfBv}Vku&Qf}=8-nsj6fNoY>x zg?i|iJj0jM$eG8!*MOngQ{ST1pOkOMK+Je;dqX@o?N?vj7tg{iyk#&qMlo#ctfbWn; zKh%2}h1~X~S3+3@k52Mb>&OuCIvzbiPPUDxK0k`8*DD{G?o}ByLQxn^x(uahhVr-} zL#?iIkPL3dv0$_5hx(gHV!@Q`w?t^Q`4KBgH=A*8Q_i)_#)d6uT;VD)Xx<4%Wu zV4#^s&b=cwN(T1q-&tRB;GDyW`y!&pTy4o3pzXmD&8Ei6sp*W;(9g!OAWbx&9$pGV zHRc3^?D4GL0zWH-?JJ2aFG#E{*xZkAT+IKkxdREvOUewuY%yO@8UY)`6 zDkyr1fGZNEi>LQgdCScKg(>t zjVxO9TlK^D zwnHsH>alhHsK=yf$B%$M_Y_h+w%*xtT25;I@|LzUd(Rvog$IhG9HJJJF$VE!Q9Tu7 z$J;jcFsw>VSje|1}Eqlj;g z>jgx2BAO6!eF#nFF^z~CG_vu82&_MKG@Ni;pp7)~9UIzvlm#{uLYrUw62I|?cCUSj ziDP9%4uSVE0da#8!WfNmC^?0QSA@UDB?N!3e+kXPSD8fLU)*=(FZ|H1#)nwu6he_> zh(wO+<19k2IRvxo#e@_^cyiPbM_i`FQuO+V_~SefE`r+qfAN5JHogOF14e|gkwffl zoNWZk0xTeAz!KrBd@LsM0+nReze67v48qEDf6(kZ%F;C81}>SoOQ!KsUf8krAxt&G zXc7HP3y6K+HIAvtvP4mKE`k~!tI>2Uhw&y4Uuf8Ycf&=fRK3*w0N#qLD#c8mts zVcYWH5F?gvZ9EKr+(3)O^av!vpB`{`zPME{{ph9N=~@2{6^$b{JDSjoG%L#l9+BBb z#EfG$flYy(jJVK5P{n3{0-SH2;|_~e!0IPxsSdme>RfbklS6G z&kSj=9T~a*!h66(obi+af(8H`lpZ;kAn}Y6fHEMB^pcQZ7#1>!2i}1y@o4tAQKZN{ zK5^gfD-Vyn>t-#3fNL;9l;Q5VFtRq3OQ&&t=FaRnvsE4mnR}pkHH41=2o**tiO6b5dT;=M24V0h{s1{&Yts8av{NML3Fa1uo@K8N6XM63fY0q`!#crt+#H?cl-EOi{x?h#QB8Wpqxz z^BPLHRPQEdbbm?J`uS%cgnsit_IMY0V_4t4;|iJDPNa;4oem z_ur~VR_+aI00l~i5Up?P(tplB>mX!X+nw&SP`9bN)~1`Vg&1zR!u?nU8sC4beq6OM zFK+7iNl&zo?fO*r8{2ob+BD?c?k|?*yp%uRkC&1RDyO`Z9HD8;EEAfLBFTu!EEY2I z+hVl8sTfALEhFS>7rY$=c#(tT7kT|36@P}oA{3wARS69$R*`tbxIjblE_!0Kn5&{7 zH#khBBHpsiG?>SaH_X=C$fHI53#y02to)jrSOrj=`rfcF`c30(h%q@Bs8r)261CvH z@xdrwb4?^-`ti|5tkUj!Ukti~-7j0$93T-omnwTGi(ANxl(#X?A@bQQ8fhYtxw)Z{ zdq0Gf!UuDB@#B?!8@i&r_|v7#xP$hG+2TaHTC2FC%2UjnfG($*M$X+eI7$$!w7vep zgseL7u143ViKYGVMK)bnTFSWMhyqf^^h!xT)OR@vai7bF@B0}-*PfK*7nEleKzwR% zyt9ntq~miHtJgV`a>bQKo=Ia&O(ewhJd2>GC-uAPo(v{tk8|}DUYDsx0Qy|UR+J2u zBp`GxS;USubf{OQ@D#s{(uf?D!xVScUztK1DytbcX^d?jZ~0B%?jE+=-IeUPe~xO^ z?3KL=+wtbVZdHa7P{KuAl4!Tk(vr0jExA($GO!t(v3NV)jm;D~_2m(A>btIXIqqqV zF;45@Q+VB~j3}VA=Pj7?7S3+4)}$hl&ty|>Cjlw=SF;pzrvHN7xA)hE{3{2?5@9aQ6JC@E{ZeO zF`Du~(JYQTO|XP+UPkYlipit0lk@ABZXzWM&mcWG|hJi9rx`K0E-&4)Mlcm1~Osjh$O z`f%4B@BZy2P%lySh7n(YxCH$<8M_KiBzCOQrL#J8Rt!cE&ngy&vslJNI_B zb^N^Jn;oBS`A)~XI^Ni^)NyNvz2kVt_Vzz%D((N-GS>dJ_ImpR?WbSYUT%-Ho7<1I zytjR8+wa@{qwOngkF>3{-Px9J3$$I|eRtcTw%*oXw|=kni>(j0-q(7%HQjokb+Xl{ zxu6;Ay;Jka7OFSjvJ>fjH7)nFJlfjT@@)TqAw}>f`ycGSrT^~!`Tkq_t^ImANpSC1 z`u?lC+;^ex6Mg6U?(Qr1Mf%LA`;PTq-?z2*_q{*tJ=ELV^Xs1P_k6ME;hy_6KkK=@ zC)wlaG4$;3>DcnjmTztO%$9d=dE=I)EvL3Pwp_bq$Cgdq|D|Mm^2aq}o0LRgp&0{P zWO7Mr(H96M7LxJl2bDT5bD3xTGv=|$F=u%)zy^NMDBltC$NfA#HQ}H02cq5uqjb{M zy=~K0;`{5(L#IP7U%bYQRZ8}yN}!aOpr`*)$rm+~aMS{HEK$ql%C$UWP?Ll~J-@`6 zV+B(z!q55){0)WfZNshCYAm62Ot5l+<$S>!oSjZCbgIpi$Gmgp+FZVzk5kk60~eIO z&diqVtlbqqoeqeLVJVy!I#ohys>*l;Hy81_0^&4%Qq6Wd#h7N8@tG3CXWT4fGq?_` z_2>8kvlL6F&Cx>EXl94EDdirsInE#jx>OC%@@{X^IoG0gXo*44f*?)DW^A0}w5vtU ziW!*87U}77cqUMqnf1n!V<(k{BG&mLyR_^IEX0?*##zoWrIb$=%t%S;Ete<7ndwDN zbo8n9L*p^dXdj=N_c@ow9XaYTwS3H0M!rFlJ(&*q(z#q)BcCpkjfL$_Gn)wHi`hA& zEmn(~)HKTBu&0C^q_*PpgewdPs$EI~y-?VNgpJe7ruY=^@=crh)-Ngp3l$l&R7oy` z(q5;*oZWw1EzZ`and(@uykuKWn+~Oly-uZY$`L8@bLC!gWH+sKc-XV<-f+%mHi zitxrnB0nW0v>j?Q#emNc5WR`ntiwB>IX(E_YCFLIkiT4sg{5e8F8Ti$`|dco%6jje zY|Um%+NOsjklloYot;x=&P+m^-senjnk(l_@4X5v5fMQ_K;#i+0>P_MM6Qu51Iney zMJ&7sBG-Dkd}-8V)3Ubl;IsdS-SOK(T*|=il!=#WI1lu$fzA+w|sOZOEwx|xs#|le4)g^J-9y5s8orj-MT2V zut2QqrlcPb3nG~$9WmvU1>kLTI#LJzNtE+)l5RB0zC;rc1yu>T*iJ8}($mdW-5oLc z30Ih&kKq1#!2Nh+~ecDc~v&!G0R%Y zc51uWOph+vCWFZ|Q;&EkPgJ$)s92qHx3wmwkt*p}Z7q71NT=%o988kU)r@*sz}BXt zDsj_r+X8liV^RguThdqx@v#iz>VjK)<+NB4;QyDmjYMddttwLw=4y47;>HL*VB$x&L5lS*a_S{WJH zyBfFO*{G^&?H+9$B$aHx?{JL{pc6X=NI#Vf}6s1$&{%U-f`Vnb?cDDFdvJgPcAhTGb?r4Sg^= zrdq^$SZ~$SG&ottQ;Sm?YT%Ylg9L1;tWN8t3VNkRT`C1_wfMZKUeQX@nplpg62^+Y zsT>y>OdUltF!Aa&oYok%7aQbR>u`NX$j~B8`BX4fsm5#(?$9?xxmLaiF})5gTT$5j z`Zzr-{(!yWR1>LOqaNg&nnX4s{UiPZd%Tt<91S-RtujS-lh`Y6Np?02yolg1(FB5d zO*V2^?5`~oEKtE*-mhnx`i3mB`PW#F%^PzPo@zkDEK*e1U8M%E#p7Ueg~+zWtqdhA z6|+sDe7{&np~*W+#zr=t8u%NQTbs28Z6{ha*2R}gjmYZbqC8Wv5r&A%6AUEH z-V(p#@1mSDR7rE9&Xk+Ac%T*8eTg{!R(GyM=M%)omy0B}-6WCXF_B z<|$m=QmHKFiIi2TtOW`dSx7N2E?Y}10VeAVU#jUn*;rFCd8_ybj#Qhl-MenFM>M^V8z!hSB8YoSgv7FJjsLI&N zG_^H~3(T3Uf~v8c#}}68REFptT9gC6F{!03IeE0Ha8&3GZQL=ltCXdao>DuOV?!o- z<13<=HY>~arr&N2nyvcisCXAJ)e~eTm&unEvSv$@S}&ROBH}B*F)U)XOrFYS(#19v z%bKlbZSV{Drz34HNEuAkxW-N?*`O-08_WG}-bBW&@>1MJc?yb@{}C*AByApwPo_Mo zsKSzBB7X7wvTL;7Or2F{qDE)aoAn>WO||-EiACCzb(dp$SXmzbTC66WlcxzVkprwn z(Q5OkcHM{Tr?Yh%r4JQwVEZWs*r{$QH@D%B&l38uXf68 zshoW3by2S6{G`%jA_Ey?W3lavU%-m`RV|x_Z~|Fm!5eZ$=Rb<;r`k3PRo9e4AsfZO zl|vVv8=lOWZqB9+#G~I!G7n z0~M1wD-oAm%2@*#$83(3s~7|1s_zjmttl(OqWXevvyyfwyoHqO%eXk4*$&5$jGfo1NFlF#Li87#wR&x|7vWq7Z2C(Srj2T13T(UZ22fi*U@_UqY$(;a@ z9{BvS={-F%SGbm%voWHqs`(sFI#*_+tY56J37ZLHA#AG37n?bTVVt+)8Ay`aGN3!V z6nRb+G%*{*`iYX?LxTS)!Dw7gnKL!C4_8m9skEH1+dPJXM&V4a8N=!mw2!0xR^F(u zL?RZR*~VaboJl31nO<|r&tD#ZXX$542078B3W%XvJqLOl(#T$ z4*y+=?ao?@ih|#5PPw|cS*)t+u=)~hOT(Jalt`C2 zJ&}gINT#W1J60%y;ULStjH}1Z@ibX2E#@08Ks};c=cMqHV7RtvFNak!&F zjg7F&b6L({Z<`9t_Disus4ob3$m%SqljWUMJh}fG+~26t>kBe;(dDaW3U+$ev-l0O z7-?2{-~^+Aj-^@4k|S74B=1yG*;G?SMm(-iC`RtUS|SNWmWY!vccsB6i}C~FWh%l| zGE|<>XWFTJ+#fq%oWh8$)~4cYHAsgXBo$6=yjj%3q>Kro7A$CDiv_9z;JaAPHv_7w zmCdJ;rc^DIU2nmS;Vt?cq+2N!CbsGY`0Rt?dx0xJK8K=W3m8gvc^&X#uf}S)kg?RR z)tHt7j*b$qT`P(ilZ)~viL_B3aTMapX9ex&X~FWE1%Ef=NY+ZJWGzjvzY3#g9Uc(C zK!%>2(5?Ej;r=e@jrmFl;OHwud$t0mP!B`o^HYp`_=2g8nvDsSao75HL-bo zaey8B)d(7TOYoI20*HreImoep9(vO=gMM}ste5_>?(tV`Lg4q!I8qXVr^HCfzA?o^ zy$M})0|YGfmG#D3L;?xlG|%q6a^rPga6bsK&6`7HNM?t$42KSUByHffNcS*x<>;;Z zAeQm)Cm?8Yn2WlxPe72!~gb?al380w9%{)4&*3s*Rrc$xZ(&{%tRodhKoVqiFF{ z5He|pAaVe)Y=*sdh%twtcCVTYc_S^nB<}mv{JKpmS3x&!IU>S(p8M%{_0oLc)AM(} z+j=wIHoyKIOAUYo6hfTjF^H1{x?2e21iChF1mYy4fRw2xz*{6+UakVC*-BNAWZ&BV zcbud!2)EoZKeFC7uQOFQGtu z_FX6MtbapnS*r6IJe8Lk>y24h0#H=sa#4)%%uG9aWAf?PlKd6+y%0Fc{BR|67$}9-;dHy#t;^ z%3<^Yg0v5uvOwglgHUAQsF@>`Kyh$dj`qs61&reVH6yOKg1-za_ z?fF&qqZc2Z2Xr_0ZEZNnahkZY&cq!Am|SZO6XSBE348=y{8iZH`^(Vrk+tBb%0lq( z9bd&hGhp!+U5g$j=ZVpJg*U2mN8Awxz49SgV)=XLr>FahkOX~P#GCoZoD;X>>%vLz zzOA-A%xyjg;r_I#5^pe$6qrEpyuEZkcmw;&a8UD-du^s`cmPKv0|KacZRr1G#n1Uu z4?+}de;JZ|M14{BuMa|l#AN!+z=Uq(sqxa-?SuP={w~Q(fh$!&B;2m*3@$G-qq@Ol zEV72etx~GIyf6=&P~#~`CONYNoqF$%x$ecI(p3_{K@2PGd%_B1JCfyvQOw44Ixskz zCqf$elr7M76K%*r?p-9m{vBvgUzw1Dd@g$AGy7+{TfaLG+2ST|(;=fZK93Sm zh0VM&gD!m%uHpS+$VvOWz5CXauoxG|2PFd?iGS6^8&m%}{=w<>=etb|W`TO9J)n8iuiK(@#FQ547>iDV$2Co~e zt#(X)dHU(q%<5fJ-(5XA_WQ9Pjy*hfV(Ox?kBv1Xxv@*8I%B5EzpN^c$;P&f4NU(^ za__1;C5u;%{%Z8;>GJ6Pt2V4UIC{tEhgV&@>gCa*)Y>-C!_yB8{Y2s)`o_>*LpKezhayAPRoWqXXvfgd;BO6sKahNP@ZSbMI}x3* zO~@y9P7JU49k>V|UUOp2$JR8!MQB>*NcQADH~s zRDSAjQ-R43Act%B=0&a&^0^h2OgR_E0cO6m&jR?xn!_mlDn}L zjmvsHM#7*`7(LdE*4N0GeuwL4eZT^fcSS-ZrB9Q#jPWN}UQKG7l+~T|xho2z=m9-Y-j8NP?>r^8g04z_dgpe-A8nd6FrsK1u2QDLpT$xKgHD(kz|uBB$aJ-!RTqpGVU9&JbExdILMr_p?9R3z#&J_ z*to{!Y?%zrYBXM5+wC{N!};m)+t3ZCF4?lk#jG|bS+}{-;iA&Cqo|4dh)9mMuNRw|Rpdyo zya=%k*#?!QZ6#42=ZwHiznFEAPBIo%$88tjf?BZ%e%DZ1YbSZobGwPTwoSGg;+zDk=| zcScuc7o!KUfrzWN{6T^aslsf&t`8-X!_VU1tu{;I1BCB9lFWNMSs5_6?1QTbN!izz8uaxz)Y zFb1t9Wejo$uEXsqQ5?X7Tdaw!!9%MPi<0}Wo}x9{qzegN8);jDfhH|k5ap&qnv`=~ zvQSl-GUn_)Y+vMxdaaA}G}4+B=Sj2!$-Uz8DN-e1!*YZJ+Kj92bZ}!d{@o(sBy`1G z1`>hfRx>&CuUP$Jp&8&QE$QT=;b4|XQ)gkfHCIUc6oe*K$@BhllxWMRu?K`J#G6^# zQLs0wc@A)XmAj|0qCyDF+U`h_&M6Z1I+Nbls;V|p*M9IkTiyH^$C0Z^IhC*+-no7mg!3MLiC~A+!3EJWS zwpX9S6|s}MpXm7oxx5a1mntUii53%bc}n>{vAU+5r!`#50dAB=Jb+X1c__sB7BVU8QaESz-pFP_;daR%d@4FeUUU9ib}iA#b=%ToH)kWl)XhU z!2tMz2}{eG+;N5Y2kLMN43gn`N#}CNz41BhvgR_$I!DJF5eWLG ztWq;Y$Xqt3H9doUB3wq9kC2hFN3G-+Lwv1BpM!k|T!v`|NqzHnqtt=d)JIvdCOq zl=8fFWW@?bL~KpT|U{Vl3;oE*eq z3|y4S7=mi0+yc0>YJYqh;p!3SzlpR(oC>b4H2FDZJ0*nX;=*P=oFG$l(5X^7N{woA z@+?uF%`v2cbTf4ZxN?g0A?!NkngOkc@S7t_5}fB1GNKh%d(%|5Q~p%K>rj>XHlQ#( zCF;>=>-3`5t7|!B0kW1!jfz`(QxR$tQ8t)&%AM6vKDkN!3L4QWP3aRcz0KmZ)SASF zzr?fIa0H#4n@czCVZ!B%Z8-<)Z4tWs>*O|yyykvjAzQBGBwL>2ZtjY}Se%zRzYzNqEuQG=0E#;UFwo#hCf zLJ`J4Tj%8giVeB#?zmFvGh}T?@Sa$AWxZsH%T20akYn<`M+qAWu z+`39sLuUcK%ABuQ4VFklncgc-Z>jC&iTa|;Vvwbatj3b^h~Hk+R?-V}gp{tr8)6VC zb3X1@DHfm=tS%AND8tPp?Ha}UTk0T1_(MLEg4fIH;pnbUVtK-mvQsLTCRVVhtWBlL ziT$8lBk{XF4$F(OT!b(hbaovqcup2S zzvqXB@o&c&@EJMl=~7*hp)-<)adTR&Org&CoCYHg-)wBgjnyQIHVu`?t2{Q=MwXMz z`AIBqSDiIL-Ab03OoQMJ%C%Kd?lm^Z0#h-&Lq(@uL!S2sEKfVC9O(%x%DJlB*Dki= zhtI;l3nmSB*rv+XV&z0!pFH$uT))uPW{7e|mk${|3R5g~!Q)t-@&bJ?SygJ{B}F(J zNM3MbPYo}#>Xi%x?P*hva5>L24zW44pqh#)YNeLksSFoYi;geipN+AxoV^k))>5Xb z-4bU$fyHUHnb)?A-mu+oZjn*{Wmp`ER2p`r9xGwtkGVD*U*#mkjAxWA~G5ySGBhSjRHU4`zEwplm-uEz^x_HzHH9s zi5kSqVL`!pDSKHFF$E3q-%rPEL2l17=+xm)_WyJRqynySFZusEhyXL81-N2iV3 z8op!zha7ShTHOp;+J0L+;$w<(?N;31M4i+TfC9)-Zpspl@j*G3XAHorS#>qxrr&6g zEOp^~CTC#39g{=`CIVCE4JyX38hKt486NHK=Kl`BM_~972o|t)!*2m708;NawOKxr z(8tlq&w+>P;^%|}{Qjb&j_->YnYTYDn7iy9fgJ;9G&^-sCG3VevgKe{N+y$ISKq@w z0pmtr8IoKBe#;(N&(5C;RvS-8;ETZMi6)Cto1|k_FYnJMcp%z9k{^N@Df=u~Tl&iY zWHh@UeR+6xbN9(-p+P%boz-AO!Zy=DyJ%8W8#zA5u(kx#)3bl#bQxOr#nnB;MHJR} zt>~4P4xEc*Lyt_O-;EM?qEG*5{_O1&&@OCE@>OL9hDZW^sEIY{2qlf%^{Ho|UHxT9 z^2X$B_l0NX1)7$QK+=JA#B!#zips=O_Mn!`D>#5>7u=!0`w{5qFGELPIdDPO`eU$- z?R0g9K?nBfve__16UUpHij%b#jCH^wy$cXYE_oij1pQ^$K`b-R@8~}A{QSk>YIb%; zKod6OX0!%UON5aw#w1^lu~DOdBQ=U34-6-fEurW zb+xYy^8_v7N3KWt=dJ{F+TYLj5J16v`Fp{9>Fofu!&R+b{)IPH;{8<3l&2a*&Dyp> zTGlBrkM)ZoFXcPucb`2q?}K1}y))w?Jf)y4;SaWLF_qvi*^Hb&hk@)bL(iy(_ah(` z+T6Y8=kox**sAAkHM;Jv5vD@1kck5RG4y2*C8Z#M^K{=*Uqy8MO7L<6k;|s;ih3aj8C9USr zy}yD^_lpH?6ib(Sc^*LAA{~KwSyeRo0-e$2oDey|RZJvW{4M-RzZf0A_C{M*@;h)F-16#td|iZB8sX)TSI`N6 zsZzRt7d0bEJZi&U)YS+j)t25TOOO>XcDp^ zFImopY)8|;FhPfncEC3Gr@#-J3hT^r+1uy>%X{{SbpLubf4^}R47fj(@VRX{M=n2&eQ)Ke-IE{q%~BTR)SHl333Dq0m$(daDglAcOxbe+T#vf< z0dGOZH^K9`auu}aGv=i{$bY;wKfeAT5K^pqdE%mx&yI6LPmEnDIViYHHVCln9f2wV z??Mn5NVX|&lc+HPlQJERqF;LGr z0if*1q%&yeuoUpj&n!d4&b9)*Izdi!7l)++k56aIvYxn?wN$8jHYyL8%+azu3WcgE!|mNo ztECYAVpDi)W-^ivnCc;U!3JK--VfhA4nN#qhMxJ$Sr>F)AD4zDD}IujcS2V9X;7Da z-zJj0Y`duYy$RuG{U+Y6Cj-`yGC@=uL5fGpDe2tWela@!>(AM`Uz>ui0=>>fx*gX6 z7pxdL&^NqGL;u|RcNzNb#iw}SjJSKFv=@Q^>3T~c2rG~MWouU$dl7@ovtG)gzipHP z23gLL2C@kXcnbui)Eq!}Wq^1BuY);-jF2;@QPZwm8%QS40${J_F4%`YJ0pEJz^ylD zq!52_=5)d=pWO5=vn)o^d}@nSz$6rceIgCOP80$HAjR4MAqW{@hZvJ?K3lG2PMfxs z>Y^_{@xL?g^g?JZ+Xe%|2J|w(>&iL2@N*DK1L(Jad~3-F>uPpp#Zt5`a@8PdpV%Q?`;O(>l^p8@&zuDV0J|3eM`mPppv(^E%x#Cx4Sc<72ta_( zY>rUE!aaSOR;-O)oBOB#&o~+(3gOBD$(19&oRW@xef;`~_YJCtHwySrnch~nb9t-F z+O=^F5u$Al-WZ7GV4QkqW>X5QxUUTD8Ju{V(eIrXt_5k&Ukv;R;|-vZ?#4bENQWU^@b71AcylRMDJ<)@W0_yxuZaeZ8$^1M2RPZdlu2 zh8{h!YVN+XVT;)5?3@KE@I6*$Qe`8Qp)70Way5Opoxn}`%z4n1zA{7%9u;o`l zA483(-sz!gv{n}jfz>=A_DZ@Bl=YPXT<^pB*_p2NAm|ap5gG%M#?+xf{X}x)w_}eCZy5)4W7(lgBs(pg zS@@Y)?-K6xhOJr3)G*jJ(Q+gOw7k8aNn8j&(^rP6c;OyAgC4t3`VTQG;Uc`s1fmGM zI_!nI-a?j5GPYILDNIFiQoeUcx_-K^4DIoJaTy~WVo?qYgW&84Bo26)RLN{jODM{& za1xw4x){ufa14Hsg0G>k41zl#nHZisBk0w;rZ#j>QNqMHJLkg0;8$3chulh^I%D#y zDtdDo+9l{ZmyxcUIKg(FPpB9B1OECPv>_hKrFcJIX!+pt!$0?VwG`rY z&nQAC_xyN2dit>g8@t0ADI|a=JTV(M8>m`co-JzYR2KhfTMH|=uMCw`C&ZAE=d{9v z*g67V1O9H4F-?mlU{Xz_!ER1^;gK%%_%|l$`nCOK5c`^)6=G^2h{!Aq9or#65&i%i z)uJ{)RAPh7dT3Bz89Ft7FWiUq()S1-|JzIpjZD0%qwGAo^_@;q*zz@!E|J60*YTYV}a)+m^)^JcHrmxV}0p+)F=8+?gX(9z(0CJAv$mN7?J3?^3 z=r2P@pTB+<{oCc*QS@X$x&|pfx9(!}Vn`|)K<*ENZe<7Xa>cX(SKJmY5EWUGqrwK6 z*2ti5`Ct?26Qgz2!?P#$_@!bPm?0qDxr6R7FrNZys%2nEJ1si{4BcRtFVP7y~20s>KuX|;r(9I zh}PvjXM4@)TYKSAlPTP~57;gxTuSg%?J929W(wIl_5fL)hG@8_jk_fWLr z?XP&Hny9qny-O?%fQvMYLcA2fcyd0_;Rk?Y2%Gi7Bcq*7+jC*`+O;rK*Ync#n^vxY zp844m{_Z1=y@w@8nglE(HYx=yBXf@$g9XDx*a(!E?PSIQZvs?|O6NAMT-aUrta8al zQChZ9czrbR>?Ps1380#TC~JT+*139$wxD)gItgIxD^)?KzIFt5zhmn%y=JY0$CDp` zextyMVU~vg=Lv4)jZnZxqd-zRyK$vbbaY&C+Bl8wDJ-?hp%Zu^0AN{Qf=GumFjmP> zz@J3sv~+G}#X=-`PI<;K?aWF6L@HoOIY=J~NX<0xUO@L?@Qv;)lI5ja&VeA#w`X$Y zs@;>CPh#`Q2%5~pXsBgj9f0M-qXOceL0=fK?DaB1-`s{3%Fqp_%I5AB55?aPv=s&E z8e-ePgm2hBux;!K$$yNl8UNtm%~J=jRCX?2-dPH&B2%KGmXIrH3p7G)^o2{M`=Mwfqy${cxu)cq3w2GI4E_+9}d`y~ZIS3q5 zdcoP82v7+X+F6FtI#Y^{zjw_(Bzs`ZX!nY;^nH?bMtjR4C-R1%Dx9i8zB(9}D)3il ziqTO@29L(y%7(jaRd|)TItJ(h-ZAsQ>yf1!ezn0JE3{ql3^EmAvirqo&lBodBnz?I zyAKtmYROi7KrakT9hmTs{Y>(^frW82`1#@3DB5#Uw@I+&35fjoaJFb0Wi{zHG%35% zZ-na%di`2BulmHuHT-vx?2rA((&=3OD69vj13361n6fTTXect0(-)g=+9Rtf(cK?~ z_V$Yr_c{dlj$XH<=fL%#N7aE`Dsk#mVTX&MtzLgoZ{!S4bp~B=HP{#X#E5(8$AAVl z5g0+wU%j-X-uiHFp*xlrx)Cx@qw2cPr1UnLv^fTCcmq*F3s%NYOUrzg)$#U9XjiRX!LeKieNU~|~+==uDmlo2;u9EKD&UD`9c+m3c z0GXuC)<%R#EynL?yCMrXSZT`!d^1)6_MxEmbq*q}8Sa7rDim}sJwwaRRA zmI?rup7I)KO~1HzEAHNO&2q^41J^>goE>0v5bp&pPc;Ie2~kLLmNz{ipwW$9AzXRR z6l2=lD;`_e+Wp}b!sU~#1Azvqid9NM6U22FR7m*&__IDSq`4Vk``E15(Y@ybQjO%| zrF-M(x`A`Xo*F+c`OjhR;H^`}iOSNoao|ctM}SGk*xW(JNMvYBoNOB?!pxS?mu`b! z>64=4&px^L#BgV6$PXNYJ}Nt2=p)VsHJTGH3za6*`E0S}jk_82r%%CP^^4Kb69?vy z`_oH{vUVFRB&Oqs)?htpnWmg0xf&ZVXhKrW zm(EU|DFxiUE8&s*B)y}XzZsq}@HToIecl=+v|6%kZq)R(R@D+zqJ1|(OZvp<=(FFP zL+ne$w(e~=Nr5QT*$FN$!(cq)l94%)BOtA-wld&{qty-4NT-{zqSfUNCn4|asZU7f*1bdA9liywrEo7aBk3;DF7uIr z@hc}ngC@yGrsl`)8Ts+>uwV$RN?_jJyFA`rBVR~Sax0*VsMXbQMuEO`H>{$5G0@Zv z&z>0l($Z=?@1EYg383Zp0mI1j@d#}Rgw+PE(NxmPQS2V*YM&V0Sn1B$0$ueP;fv@K_xjR(;WN^dWUV9b@v8}wDN;5B;w938xclHR&3;z8 zak{Svz4oWAbIAGf)NuD}p9NRKPIm{=62*9ebQ@@MX$@njwcO57P7y;tx(gcICq^e9 zn**|{mTG&~@kLl}U^N1`cJWM1*D?SX!|JoFBjRgAn(eAD2%q5@Qk>8%kOg)x`2xIH z;VpCo+JMagN`2L2BTWic-E4(O#)Z40J^@|nD?-O>a8Aiyc5Ln5c>-44Enk+Fw%F5v zD-o~*fwQk=Z~IyyxLw;JyBl5eW$EmO6-trws;_K)8&Y+2&-<6J!~uVf)fwPAEI0%s zzy=ph!sCNR@BfMvDAQIfMX!D6;AwYscsl&6a3>ZVegQL>(CsAa1&@a=MD@}ai~kB2 z^_5D6%*8V<>aFEgk&v8dG|L^}EwSg^DKN)VKp>SupldT~-6x%zajaAYHi@ZyORtCf zrR%o9?H*Et^^i~q*s*PR+<@x^y4OU3`=xs~ze{QNxZ+arMYFrH)Fc4#OaWaTkg@<< zip~Jcfd+U>n9-v@fkhbpnsfuCM6Xl>y%zi3?8k4oo;dxjwd29wfH|^|YYN19mJFmY z!>}jXp`0Uy79NsrIU5l4PkTh>a!1kBL!cFg9P(O|&}(~3@HN|w4nWO~ z_O!x;u2_mr{dPMHo8$8W3Eo@tYu0~%K=S>uKaD>*?3&Vz&Q5%I@TTsb;`_e_wxjbq z0&u6fXJv?Hn!Y6MOXn16Ptcza$Pxb(d`W#`RJs-HV#0@T;^C*3_M{iThwl?fP=@al zab++H2r(R&3g?Xq+7w6fAA+(zF*<&4ajyHZA1+@f?)#B&m^eEEj4M7&oaMGBNEI7w zNI^T2%>8%lME{LOuQacXp=np@ps_9 z)+a`%{sV5jk7(svyVmatXMwvT;I!hPC7Vueixb6APFGO*qD_MWsUCsttzV4Py7vP+ z)CO`}_nt>U2Vh8a1pHWh+S~1hbeU3C43J8rag-rf?5-zaNczO+P*IOB zSg3`GW>lff*ur6p3BC4fSo-9*VPN};dLW)B+TUJk((T`o?hp^Uy9UPY7~Vg%U2@lW zb;3ND8hNq1=Ml?I(DTEcEc_H+3^Y-(5Mrd)Y{8sC-}ng(U%wbm{f zYN7iX^!;$Bu&l_EjLS>FBLN0^72OJwD)jLukIYS-DMmNk7Two<<;f#UX_Yfi9f4C$ z*-0<=J!H@%OOV=CvAHxQg;%CTvFBk7`@~3MEX|@;Mpj zIFOtrp(;@>;Haq>t9AfvLqGY>k=eEVVkB7u&ocRUkBCp-(33}mn=^Q~#g*=>nfzud z+lqz)g{+SzDa1bqjp`GlQ^YhFHE*N0bf0?;E*=nEmje~}b?2-297@t7mjz9nss)+# zy)*UpXN5UEvk0BMYcH_R)HGYWk{<|WHAg28YOo2n84=Q|$~LVvpmep(c^=uGI5Icg zCq|N46|D9t*-ZDrCysy>nCoQVOvUW7Sx=BmmGvf14&obfK>}U=Gw4g76dgar+V1;L zsd34l_3*&prILroKQ#8$kv~s_rVb1r7M9ZqSWc>r0LFqZJb`o{`V@-30?PZu=+R4G zhDXmU%d6?d-{Vb60Aj)GGR({TMk<|&0k)_-T=S@e18D|P-#)T#x~~j9dNMuNZGC%r zQQh&KBRh8}JCIl`E`wZ64!J{?N|Xl}BBPl?Cy>H1r!7`@SOJAAbQ%nlB$3LeAeT zy)sL`g~!36j*#_?U(uejPsh`2E32n$mNXy7bNS$J!PxMQqEmNopY2|M?n6uOy92NE ztPNF|4m_iwasm>hTE&JVDUakV8no+W>C7%UP0LR6fouC}A<4JD0awO-^tSFJzZ7nH zC4G$W5L&9`FeD<*LLe!qnVaqtBgt7|!GA?=?cVgVaM!YT>d-5^8Ou{XpPNi(wN%rxDJ+-O(o0o(Y>h3^lxws)iSXk9TDEK6#)+O4uyd0hQ zIkcotj7}XGoI`VKWLvx2Uj!AKFyzk{fDs*d(9ao6jDJY-g^?G8_}h=e8avdve0lU` zMw3NFM=S+9!$x(fuoAucH~4`*F}M-83-5;^O#T+lItx^IAyuCELn*9BM%Z@?7H z{6ToJ~2A^6Cb=$&WF`|<6q%0-r?v7SPA%hpvelWC4es|lV-IU zps)VHDe1no?~opKlp((KC3;iW{NM1x6hmw88knezeHV_rJ4XIE7@INp$EiKFuy*Y`icbDxVfMtsQwvKbn&|~FWHQG_ zmX)>qjTqz=D5ENOlhNi7cNWasLlX-dr_LB@0HHc21U=)U zA{w*CnnXbBwS&PW9wK=3+6K^f-{8WA>Ao^_^sLG(TKkQU15x@t)J%8N&;mGRJ^5zZ zK#)#ZuA$KB*cgQu(np3tL0=g88$F_vBO;!b@=W5l&c_IySgTqZ5TeGlX-8;&< z2iGk03<`ybgdBQOZ&JXE^m!@z9&h@~p*&&MV~FFqY3lq*u8 zN{UR`X!Ms9S_*xB2k7k+1E&2oJr>#_G`w>`^Z@TaYhi~B%!BKfO@zJwTzUA|1gOV1 zgL*LSvl9hFDM4A3TCY`!$Fc^W+}i#!B>BQG=DH7^wXk&hzPM{axFQ~#26cEJNHye? zg7zi>1lDD91pNv0>Na7G_lejO=2brtlH zUZdtF&k&;54ErJ8=D-MgYn+(rCN{!^+_HP2v<05C;H30tfJd2t5NX;D{KVlvIE}8^ zy)Y|0c2_7xC*Rn(X^AMly)cTxXD^Iz%7wtG2=U52r5SZAG((Uvr~$@QRNO1HXT?%<^c=`?5Q*!dJ$oce z&-pN*4FS+n6CT}w7uK_R01T9`C1?W&<=le6V82oobm}{iW#h;Gh4q`;5uhUlw_U*3 z3>)>}<#a=AyWpSPzc4qmVj-;m`ckXFkvqC)aj8{cU;rgx4iIpVaxS@Gwg5Xy3z-kV zSgllsB-$S=H|KtEiQqqXa!gQt86h-SX35lvb(;#58+P zH_MjRxCxY-uFIn9?zlx0IWDU_|t*W z0o%avCq@GUwuz6e8e6?_{QIkh2Otvf&)X%V$aVapncV{e@F@uC4fs>g7xS3_$))oe z#;x%=A=&1MnT6T4{bD4!_1=Bx;*Z#e(67&Tu0_8ey%bVS7Sm#+g<fDB8SS$4f=@CuYLR?RFooO)bRNX9wV+MD zRSve_YA|9f8LD-kFYHWe?f9s*ZC%*7wy#9qEp3G_%t{gDAw}b0DB;PQ$_k&ypk!o~ z5La^%w1M`yE|@Y72zO8X?@HCNbub?Ia_1`-GC*2ZtK`iNYunIBqANDT*3d8RHT}d- zH;dPUTeiY+e(2Z?sKNVTHR+F~N!pfF`Pz`tk>SwY=feQ>iP7;F?uGsE!5~}>E?C+R z=P!h@R2|y{y%%2|9&0-nYw-1SGtTSl;DSB0FgN8nLy8_fUY$ixo%qNYavxs!JANCN z&xcmg$2LH#n4S$?;bM$>(od;lbFH`^4zAp8zlsL=X-m#otDYf)F%-ENX18Aq z4!U7@O8elJ{G*E(AoWgl48r`y=GdA!mxYvRoe^tAZE=_4=o@mF+CDJ^?EGrByF;;j z3Tc>Lw}hxw+^sSo(i)7dI_p&?Yzbb07LA~$Pm1bVfGg5t3&AP_Y#}CcWH!cf$G@qxBJ95i$$`Lk1Df@`q;0!CyRgCF)CaUHp9<~PlbZ2S)?@Xa#J3MED|tuGAbAm@PwW&1``=AdT~CX zS{jl24)x|}8_YD`3^}%GQ^pJ|opHJwz`Kg{GWdYclnSA~=c17#V7<9tCfw&WT+^ka zmC2&E?1iA50)e)XuvGiSaF_p#xG~SKCf0R7O2XA~5I)({u4-UtJho+d-GymKgyXd? zeJu^F5P=lBlv&s}d4>?(_;cM{_lL~#;{6}x!j8r9q00ttl{iNL+3H7QkBohO`u?#S z1~(0-#+qZ7jF|w{YU_}FR6n+A^w*=`AN~61KaYNNv?g&5e{yKcba7Q-)kV{xp~pt1 zB!8Y(PoFz{bmYQS`y|Qfb;Itdzm9I2IyLp}sgqN;PJLi1z4~WU?x{ng(y4QXVpD4d zpP77P@~4xJO)h?M^5d(1F?s1^bka5{A3Q$dAJk2rH94~S-zQ!fJu>kh6Aw*%ZX`eP zvDJ4^G=>Hy-Zx>KSeV$n=B?o;MxI*p%T?c7^Yoer)*K(1TYc%!&1S*mFZs%eR2F#(|4?zmRvFNi}4SvdUHH|{_5zs zd;IW_eEgj8HLL$H_^as;4?jPA_VD=78z6Id1pCLU=@=XL4apmsu=B2LP1dpNy16*I8M{H zM;sQ)k>cVJbt<6L@`qpRB}MZtm%U8|&4wt!0^wj|2!ojL&XU?rShaLQua!{-8@UCi zp7Vf?WF^@4qCBU!@V=-nvi6%;zs)T769HGA@uW+3z=2VG3(FN%XNi`zC`Gl-SZF=1 zz$6U3JzOo&y0p*iPCKJYPf~s_uFqIo6{@N5120Mtt`h`(H&`@8*EkImtwsYuGL)a!!I6wplyN%eq1&ztl{yMnW8 zEO|rS;>nUYZ=Bco83on!QLemN?<>(t;%``wL(Vn`XIQBK!saNKj1n*PK+Sj}pKXCV zJLm-Z3NyX#0bCoNK@qy_u_O!jJPxa0Akc+b9ffLiW;Yf zjA`DJDi-Yt*;QDJTN~yHUx+Nl!g;z@jjcT_YHt}Mgi055WvPrdK~pA-jl*j-^*j+% zHB6ppNTuh}hsD+4HZ|K+BBhhXv+@uCR~%f#&|jSF zRlm$o)er``j#qsN%MET%jL1a1;d-&8aECe7%~&osd4QIutn#$!fH4wRs18kkc>0b3 zTdPb+f{ht{6T zHrR~&PhjdV-83?TE^+N1UgXW5mOGwkS>mN+AfKb17|emUH9b+PtciO8|G>u9RZfi0 z!z;|m6d5zL)j5bW%BfUNjG4h(+g3T@RW}mWHe+u%6YNLuTsV29$qOJk8YMt5IaL?W z;chrR`8ru_mlvr<)1-CNnGG19hj%&~Bw22l{W7x>Jnj6!>+v6W7&1g4Vw z$(XQy#uqOn=|(9nuap|B!ts7w9k>WcO5wN0dAn6sGDqwdvAP;KPSjwr;=tZ4kJ%Tu zV7Xjh_r!e3Qaf*?ycXJaRQ%PrB}=(lz$4Vul#-;9#VGN-(ORy`RDP|`naTqugk@Ol zm9j{XoIS#(m1I`qp%*rYYBFvek&So*gjv&&o0(ZruCOi&bOk{lnJogHvzj+x;tbwQ zd1JsVWXvQ=Ixdxo8a{;;F$P_TU=@`#T-||(A*p`>%e56iDRP+doUd%J=Mx!y0?YNR zNlogSN^Lfm^XcPp9fp?Uz3RMKaK zu>gYz?e>*TwGd4j>T%8O_y>%^n4St~>~eRt)-X`?#o`7CUtNMSP@1^g;|LI5>f$c0 z@6`eEfZEGa^>CwYF(nswV>}|BNoEQFEeB?3CeUsLxC`&X6Qi~T3;9I5$eaBhg*I|Q z4C|o)E01iECTm7vuVv$r3ovX3uWL5^1i+rhQ{fUxE2HN>iPg}lWGP+)SQnNxr+hII zLyhqCVwi?xgaGBP00FSa5Iuhw*9Yo82Vu8IQYA(%3srV}SQMWbqdq0}ib`s=G~w_W zS`J&oU`rhOcd?a`bb(5`yhZ@jA$4YMYNx2iX*WZDmQ2Pj8bfkz^5B1oa-9hP`BYJe zFJXa#X3NJ!HA;(&ie)HLmk4P9kA|5N<#JbqGOLy!0Lp3d76@~Vwg@|x(zZ)315*mZ*e!f4eJWrhsJ(~-0O6aN7bAhbk5?j{{B zg;872t~*zhJ8~tm6*gr{`BF)rCCESG_7mEa+d|pZ5ltkLNbGzZACm_CDdsFPY!Ta7hs1&=4`=7aCSe{MEKYIH3aOBOVy1l>{u z#QoVyD>GD5>8mkRtX=WT12tSMY8F9E4EvlRj^7Bltxu7sdPyXOJom< zqvdG2^mN42R$7Q)ypp2VVcIm_5o9)e*w76Wc^tyGpnT|k%BAXS5E1%W1^tQ$9 ztWqpcTUny);T=X+pVBIbO=&E**MLDd5Ok&B?p!REGy5(Q`V zZoVz1a49RV$@%HM#*~=<$Yzyhc=Ip;%PT$ytAP zS5~OMsO1e+f~O*M-NctH9y5{I`va`V;4EqBWUf$W3+DgJ*p~;kQC)jm-s3o4lGs`7 zgoI#c0pgj_9#-v^tle5H0V$GfYnOM+5)_kCwj>w=NiGCxJ5bj0Xu>uvrIeIXmdE3f zwv@h>Qqq=Y<7Ppz&2hgv`4Q| z!o?|__B*WOv4m^mu%MFa(y6=vY~d?GMSi*kDH0IX0=Ryh|Wx zdvl!3GUQ1{wb|j3yrTN60(-45y(CQ{svQ5Qq z&`bdSAP;AXWYQkX*uyPP3-4=22K!}}*vNpzryoz{k_`f%$*=}UUF<-(Upwr~8oY+y zvVFxL3~JJ>Cf}oot7E!>NObc=u^dSjrKbK7gbybSwgJVeUkdHiAPJKjNv689V*^m@ zwg@0?VU5XVkahX|{=Omgh*cV|{$`PlW(aq3u1QVC8#MPxv(ih96hU~D)LS@~YEyeGkN32USu zpt{JNCaZB2%U#GEYtyQX9H5~r{gdI=qJU6YWM)>CAJRuviT*LOe0}lIr0kWakpC`h z9>_DpdXuz4K+g*+F;}HAY0_`h4OqJE(pCW;F054a2cH zSy*?vu(>yAkR>NaA~?S5^uvmT=~qGp*7%5@RqOI@M-bpI0bsQXuGkw&B)_aPl^v=% zTsvCfuYRj!L)F%Kt0#^66>K(xAurqMkkjh6lkWDB~1ijn2esJ0L1X7WM?^fU}r}I`TM=47ZP6IQM5DfF%*nVG-y_6c(<Y7nIkV9}dT_g>n%*{VsOfUM^qo?5x+`o6k1Dey)DAP+XF*&rFQkwY|Ep-{ zJ1?65y3ED+I>+?M0P%c(AeaNxn{g;94Oz5G_Jl>B zhB*s{#=%ifI3qKqQ;JA388%FiV_r08yBkLM&yh~F0{{NaU8>dmO>XqiTKRMv?#$F{ z&Vemo)u$L`V<~SwB6rCd;iE=(cEB}v0YT2+wzH#?`f;E5QpW~G+0(e%SX)x_O2wtM zdnE6btXRVU^1*S% zS`v%T+1&ReFjt+^G&ET-*^OuIsu8v;)s+orjk3|C(9WMG&`uEv_c_<%W3L@4Cl~s; zW}-^Y88U;Zj@I%eWs+HXJA4POG;Gt`(G5aV&3#VCpcyA2z@M89QDV(>v@cswNF|v<>V?R;(=@hPa6?rNN_$N*IE71dV-Z|?^%7+iGg?$kT+jS( z8~^jHrM&1b@k9(gs+>L>V*=3pg(?O68Bj@%YG{7NCOg@nCrOC0YAqwIX9m|^+e}#lz?VG!j-H`8SfEzU+x=aD|Gr~pvhHStS zrMIYz!0DnqI4%AP`S6FZOcw)K>E(6n<+zXyBm!BR2Uq5LFI?=6347WNpYMRMXdRb# zzXOpUyz9grjivCxou;AEf=9!s-N>;rd+)H(=E|#r z-XsFN=!UbfnCxqKs-3^(`i?o@*(Y`vmKBXf7nW5&EH&OiyNOd13TpQeBS!mUkuXrxca_9Q1{vR+%4G=cliy&dh1pDX5nvsbuj+&tB>VI4cI z00;RRDfS7kbfkZT9n2>K5oa34q+X)G6dXQR%wKkC$AxsC_)Z8Ml+$u>5Q59>N@;|Z z4MnpEx7PbTQI7mAgwI)63@Q8cDl+@BwSioJX-7S|G~Dqg;r4Vif^Rx!S~fpq`MykF zSQ-FEsdsqH?_!nYp$OeYMa7t+&0EQ`-Z_!Y^mWX+XE&Efn(NloN=sj@aaJeFzgc+$ zP3-k4of$ObR+t$*(X7=2>{VZ{zE3{VZS5ytz7jJ-R16oL+IIeDSI*Cj&vv1?zG)gq z{N+OY03h~V1~%W5GT5BiAt?usRVpdAAMU8D7tzRxClLmGM1zDiyAOAm0gN_nm4{0+<@@{evV-G`nR7n8$>x~zQ7{T(Jr z>zAf=nAX_>griK^JH!q24tQC;!7zp^#LNS@ix!m<%|9|W{(}cPkVYn#8TGihiKJ|R z9dqU5y(-fEAnFqrljB#PVdYWMro>`@j=C*bpEMxlm_e04;_K@tnwLA8PeZ=V zQyolnqSwgr7ypWwi*6G{cHrR-$GYw*_-GX~#)$_@E)2+P4=*y1ykunCV-oVvqaDH3 z!GsS{G{!h`y3rse0Ij(p{v&eQq9!7LtOMARi@!o7-9P9e_deF~1&C?~AMd!cQLBvW zHPYCGDuy&70k1Dr_)_x1;~fq4A{zPdajSyguzB;OgnaE=9X@zb0V_?f1^$~0o2@My zL@*Nelo(~PdK05O1u0qS*OaH4yr@J2|uD`e}JEfiplY# zXCXT2$Ke(}^DOn%bWK}Pv*57GM#6p=Z#$EDeJ6)am|uKR@Nb<-lfeN+;L`NKw$$=4f?T}9C)##p>83m09FIX7r;sW^~DaW zWLK(+UIZ#kN0chjm5^*uv`1Y8Mf8!-8`a~;ESdDNHUARaK z3z2;AQhP1`t(QBTl7~FMxw7=0>US#-mj8=NG6nKXPQfK=4&-s+B*5G__M>9d<~oD6^ia&^P{<-A`3iW5iut3neUD3s_eULe^6^jT z($yzfo8HXW6D~La0*5w_07wr2MPB(mdR6{vM?G~%T;vtf*e$b?dtUv*Rr}eiShdP7 zlSR)ujR|E`9+Nqx34!nPKZRepn8r(XQh40kf7TIL1x?<8G^fD?jhr+{;oq3ICsHx` z>s4n+Wy(`P$)Kh$@-6}@QvY`Ok}H0WE)+_; zY0mp%6nX$?o;a(Rvp9vt?0THP?aWFt`$or#rbS;M`zUZK!>_sI3tA|onT0SfNVCgI zD&Lb_hERd#>Zi+8H3w?rG$1?zX{Me&8G&yZQ>ZdhHZZ76B)T0o9F%(B$7~Z7lU+N% z)_(8z-WLvcf5%>f}sVJJBn6-a-=kv3cVAdAUX_xY`cd1l#PrI>_g^0(v zRWT6bWZh~*W+)!XXCi`VXWz!gAfl1On?Hk79S!B*|F+;qPEjrdyGA}G>+NKfjK!zQ zjtv>CVd6Q4rih9O8`VM|yvo(ezj%!LzqzI<8h{|))Uh78kn8nQm#Q~B;7X^2rd<3M znj)f+UEAMjBj?jF@2B1pn&O>rO4c%w7?O?mGyR5ecfVT;=y|%4UiTaD5z)xLXL2;I zr`>rkiS~IzzU16{d4OMW}gPRpi>(EKzmm{jr7pP(@G>}!ekqSnOB(@ z?D4Q1`H%N-*7#g8|C{%4S}B!sWXt;<>x5+ER@&n- zII>DE#WCdY6CEqbrJsV&=SaKWs62zl$gkzU_bGaR{Z+1M8t*U6hG4HX!?23ZNGOjC zWc|^w@MSlA0#0HYfc96x^!8y*Isfxd5axl%gdi9RGqbxtJ%|Kx2E&lgneXzuIm)Ps zeD|LnjSXTN88Xyjia!aUh}Mtkgm6z&90y^k4CpiyfVvsXx{^klOsOyQQG30pnCx5e zO&FRf7#$OLRg!OBEnUuM|Ar24u}xouql3`l9$9?QG2$IydP9sXZWFrc_kYI}6;sel zTj0uTSWW)KzE;h9|IwkMaV&nY5_-ziY04=w!PJD!+wJJrsDzGs_(aEwx`iYXYQ3?5 z(aC>y0=-lW?M;?c&y@dDlC0I$onE%N^1o|FsRHJq=4To+E?5ItwL)@$;73%ED z_7*k3i8^LQy@*CWe9=GyoS1^a4q~gGf!K0P(@<|=j##_;yX3MFyBS+gDwXYu2nv6o zf&nnKh=vs!gz5MNSrh+w1%se4O?Wt*m1Vk&USn836aXk|VRdh-VpcSWY2?^0gccTp zU-wio2raZu)3|5>m`*y3WJaud!0(YK$0j`H!a=BsTwlf@&-FqYImUjMULHW)yj#Yc zPsP@kz(?r*5wljFlXV-kDa%;D4C!Np27T>AOjI$A9Q`R^Aqqjg|N0OCQmtLn{TN4~ zK}faclq<|ZucC9r>16waUir3!X{=jFA|KuZ_x3`>N)sI5ntA^cFc$y9NHTBU@Ye&=STbX$?*zp1mjt!#yS!@Et?` zkb%pq4MTLxTtQ~GGZkdImZ@*}9R2vj)(iMgYMHrgx+R@ui_Zc&Zv4A_FhtjQL)WV}{66AqIL&u5y+l^d9bdJ&BrKjBBb;?o>Xqn^_l zqzFHQsa@qT`2ZGya1JEkMuOtd04C!zB5v zjXBurnOZmBR8j90`gn7_sI<_h#YR4O2IJhcV(Rqj^RC_mHGEaj?**2i8MZ|nFKNzj zlaVHUm(ovOwFx=1PcdRF`YyDmjokm2T0*|OjajzJZ{UEy$Jn5s+Vw%i^Z+Cfnjbm5 zjcIRMl!zJtiG9;Y?JZ=>nP1p7yUt|p{QLwcOc3K)%*xM^c*)dOn)QA=1K@6eW(3m! z81zKgfCtFsc`xj>TBz@*GtFlxlnTWudg`JtlQ(yF-}vwJvW+DrrC+sAA%x(%&FK3k z9i#F1b+Uw}Kbuf?cLf!3VWK_X&NS35q>-B*oK*4~UTePsiuD$zs~8uWD3K(}HrJhA zldmYNzPr|5Np_{`kJGTwue3tXi(*9!7n8AU*HF?JO-b!tah=L3%*0>TFe~d8QZQB0 z*mmAy%E{KHOaV8bjaX`#4eNTQ0kv_Bq;P;0ErPiPvYTb<7hNE9J-71ju#5$v+0!&+ zU)Xv&hgHTv(mCO`PWa`lA3)5|)K60?)N;isW)0oK*T_)YF*MQoQ48O24udN^+jM50 zV@Q4fb!miI6Cb|sLL~3xz9AziEhH2lg zK24@%Pl0FAeeR_bDZsFQ?|sApzi}=D@$8(YmmvQtB0uVVw{b&v&fYAm7d?7Npn_ zy@!kT#|u%S>-a|v%ms9aDJp=lSN2A|UYXQrG%7~bc_tq&oDx@%doJ@R*rcLe)l7P&*l|Q8a&#|d@0D$`Rs1n2*g(S^ zoSzwb?T9(U8jOhv=0d`R6^1H0)axslGUUml7(MQ``_;MRvNA~IA`Sz&fd5=}9 zvZ`G+b70JA6Zm}Gi3K1c5y{SNZ3n+%YT+-&(Oc4x?e|30Y%~YMGV4i>16d>M0$3Tr6S7o&+H8qRtzw(-Aui4m@t+DQ9OW<%>a(-ho6xR96_;n*RmdnoKl zY9roWhRi;XMvp>t8YD8}#0QGF3R>Dh!hnEO6bo=y4q=WICaU>x1<#K9s*LV)m*mQ4iJ`G+l z%qbZ_bfVYD#ut=06mH*GMG8?qmj{G3a@qWxOev$-ya4dTjCR`O!wKPIZGLE_3rSca z%64*-wqq^-AATy1?bBbL=i+fG#?nfw*E^vJ=!a!}ec6Ii!mj!;jJHdmWLJ2w zGK%w3S5p3V&7~4u_1?18mES^+GdVq;oJmiMGZOTtAXq|jI}&gQhs|L?O~-O0EXk)B zq{vxVOpXmbanhw?75N~=6krqDNPPx#vulPTIta>m&=1Ey)@F5LT}h*XF!^N+{6wVy zki2rs!C`q5amJZKEO#5pB(QDUrYR7IFw`lfy(bAzVWT58)EP|2q~sStuo4vu8n`oS zTtjRZ&GAZJj8-{k%F(LgQLh(%m*cXaRN*u*9#4YQM8V3mu#~tSdubcF^er@NGCHSC z%*N0x=M05o5Vo@c^SEzNs_F?0sLd0WaH^L)kYL&y#Kp*u;lawg_t$I5Y00^EotFYL z*9-*;5!w~hSbK3a9vd0x3dQU) z%N4HG@`JX-xGX#2H5$!onaZFhnh3awi^*X_)XF~-VUW=wJX3+67md>%M<6Nl>ifor zqMES~)@NHEer^*L3-@y0d4Hk}+vo!w<>ZxqruEmx#p6!nZiHe@Gd6vaLxL?CWzj_bFw8VG zFaF9YH#(P$e4*0)_z2D;_9=MT6*XGK0*`y7hKw<4Lz<%AEZ`8Jn&d~JfQw1In#T^iz29NIu{<#sY~L?)=aN z9ao@n-piT#<)426h(&FMNc$@#r0xoa;)(}>#t2+-lNo90+_36xj+l~7sXTwygT2h~YwZ_L;i z)R=wb=!@vcKYtacl!X-H8Z9jt30g_lf%DEISAK&j=gHMf4er@yYUT|PqQx<{aMZiL zVBrX6hg)|+|7>st)d)6<1XL-#QQo6Y2!p!vD(KiE5@DZvvhCn)E7y{ik3U|*PhJHn zuohR+MFo4zow3M}0c5OmOy3`fT47(qN6kz#6{jgU?$k5D=iWTAZQptPvg;W;tROQ$ zT`6)DFC<}&UB7#gHAYU{qduSi{cb2`5KI(nMG#EGY-oHyCLNOX*}Ikfx^V^R-V4Db zE*88EezKS9{Q*W63nS)oLN(E4R_1_^tD3@3#KqKMz{Y=P3hLZs4cu@iB^yeYbT1iP z@{Z*ECGutW)m^+~RZV4SqWT}zzo>qydbZ|@y3*>e)V@~TTe=-LYsUI}>Ta#xQe7kY z$+S`}@uJi|z zi_6Zf{ixhh_xRH1%MLDmpvqS@sgm4UwRYJL%imm@sr;n&!t!hCt@YcNt*HBR?UyBw zSH4mCbj=f`zpihnytC%g%CFY_q;{v|FO~h3oi+bkxoz3*WvSY4FS9RWORpgb<@rq!Zs+~!#lEsg@!WK1CAS)AVQ*#TPu35hHX2HEO9fohuoZU`(l0Va@kaW*cP zfP-ItwOOE=xd6PoChhqcJmVm!0QHL0l=(GB1hNGH7PwCL0OB-}1O@3J6B>E5vq04+ zfyf$_!#2VN62UmYP+`+D{_z7#p$@Ldp& zzSL?WPyxN-_d>WOVNaqcrErUY9clGCp<v!= ziu9R4n8mfEEun?;Vl268T=+5W4r!_in!*jqBarX`V6DN}(whaUC1K~>ad;O3G8YXt z1#*GBJGuIfV#P=Zo@lPA1=Pt>^cLD><{Tyi*i+{~129(2+3F>8 z6~q3PgdYdSPYV>D)s8{L8~P}G``kcm z^~C{clUQvKsJI#CCQ+1dVTjzAN}9YaZIjpa6n~tuduTd6Th`%;!bcPr$ofcrXaz%HM3SUb&YI?vi??$t{dFl{a`(%-dW_amGO9PXfFM-V6 z@LhDtSCwuZj2wlS2{uo1 z!r=+zRx65B85}Jq(2*${hjFGJrFuiY@zo-0X%MDT^pKG9RgbiPc@10ps6fRwjd#(z zxgd643iFHJ&Ne-~Zj!EYi-9?56LAJb9iYej~Gc6kpUNL&H#X)RAT97feK41a^&JOki!KAOzNGhkHu>}MQUymE~1Rx zgv=m`UWkWYEI6C2W~fM}-wzoOffW?X*yKwDO}=CWSES+!-;j6sUHG0D&fH#nKp+N~?2)2*S%=?}SUovUh3~7~Z=OVG7u<6(g7&;GUGh(XY?HzdRfY+Yg-k?? zvG|~wH9cOWA_pwwA?-*y2!1#yaW1Cf=W|pCvf$W(=7(X*1wARaFGZyl#W@ev#{`*} zpz8!H$3JPH{=CeR;wVBZHqmvAtd)NFM5oPcARXW;UldqFt@F?Xw8k`rREDc9{D1@5 z>hBe)F?=n9+k1#5y4K+qg@GtJAyAxr^~U(X ziyH1-43MqTswHz0 zLIxQMpI+pj^q{wZ-0T1})skNpeyg8M;U>Zk-vfYsr(MVw6M^XT#mWN$IfWmk@TFL- zejr8pk!ncqOD_>5IsBmQNH!G6M{`KagEfQAiSx>q2pfz(iM*t4tOyO{21JbqqB`x$ zRbC-*PGUkDQ?^NTHTEpdo~B=&ib;f}2$U=UXrTisWH)w!d^Ah(uS$hcr1HJc9Qd1? zTv7-yAZTk-C65WLW0>e=;mHImLaV(G3lW8{k$z#a=$>1 z;z}IT2S)(-V_;*VSXpM7BwN_n^ii;k0G5lUT(STz9l{Gepep`!0_O+dSwU_AE8Bq; z8N|%3mdsNV=!!H}uPF#BFvGE+Caa2{L_g36nG?hy(oGGb8=8K3XYt37E&+J3m~#*i zNGxrJ9O{jiy0ohNNAZnvp4+{Uv3&I|P;2}d4G zyo5p48lG!2x*&&b3%yCjxMl*r?@a4OMJjGnaHyN~yD&Ntd=7SFIOVszD^!fx;DJ^H z34pW|Sg**>1c~2ryFhiPFdg9}g9Vv~mIKFpx-YJ76{r~RG``rAgn;VB^oGk1G?L}d z7AvL*=GakiuZ0htgk(Zyq$sm|{+j}6OPsnC(zTA|0+*?Xy!9P{wI%K_!5cDx$>Tvr zrG$pXDvvF{w%9CeWsr4=6dXm}af)+K(^IW^t=KFM0CiX`TBOyY0-o+Asmav3>x6cp zwQ1;N7$@q=X~XtO@7&hyoTJj<4D47Cvf9G@!eYvuL$ToK9)NtaR49Q@Z>;V- zfeN5is2#Y;i$SVF{V)QpUK?w8no_an!k28Y2tNkJqsd|Ofdgz3 zgMkd|aAj-I3RGx!9=cOfAr0B*!M>U{Of;NdSNt)4RQRs6eUkcBL8js(lg%#)WV%OE zhgzs79A;=+>C|bWBTLecLS(5974$;T3DPV9pDnvj+U)RSc;IE{!2K#zeP{&{uIi8L$|kA$ zfd&H`5Rx4r{~ByH)K|`xtq`^9SaWf99OfL_w3r;0_&*E;YU}d4fM0H6bmDkUiW9A zSuRLs2zo5XN$mc#UvU;OuxpEw3-&O?`9STUXq1p~Hs~-BW|>s@F|kdKF4GBAY}`l!hr=3{a16o+Iw2R3HfbErFqC!$eE^>1$|7P0+uHvHM9VXCiXThJ@w^R37Q_ZTi6L%M2_Rj zHB^d0PcUa|LWPR4Q0b8rJqB@WPYH^KhFiZzXclA!RCLTQEK(zuBaUTxOKe$r0R+3m zURF|iC#iY*Ttka<3K5OhZHCdONw?6nQ#AVg^k!zoVn&~$7sEsQ8T&f;Y@9vs2q7}c z6zw%v-1G(Znj#;h6eJ*ZOlgXX)*EGHbWor&k!wy}1y1^Q*AuK7SBq zDG`lqeD)7*b2-*;rJf22cZx1+=yBM0051xmWk;x-z+%H~4BUJdeFbjtegD>4O1^vu z9vV>ak#P}12N8W97qoM1WSGD(2EjvPQ6kx=y1JPRzS^N6TW#0Ck~RdQBCbqnVebRsIutWNT>sdxqs(C zORdHSXPL_7*Ob(qUQt&0(=vVa&9#P_LCH1Lfi{Edo*gsIu%rpsd)9ceU(Jn$eF)L$ z0oDp`fe&HEwBL`bLlKP}z3`mHulFu|fZam&KftVOJ!gjEmI{}W=?Nz8kb0ecPM@Z8 zMDG#oeBXT#Q(8nKjW5tN)$?8(1%78g#2`d^rUCqfJLaA~n?f!{z;;gN7_+hfb%))% zt!`m4kPOe?OjBH~;UBq|*(8y0l)7GhGD1d0u1y3CrwzHPhSTfb^&x|7-9T+u{ z%N}Bu*NaF(hIC|X5L`*l<+vRkimtJ|bJW~z>5+M?k%`_h`B-|)me8lX=Uo+?Sphp| zMZp^E$@EY70EE+@4)^uijBvtu0?XvyyKuoPB9V=ot~{T7s?k^SHD6~sannCTaY}_7 zp}v?snB*9hN24>Ubq*v4!w9V+SKke16%mc52s?SXyOKX~H+9tu%&bJ4grEgo2r1Xt zfWi>gv1WE87a=b{04u1tn6OLMp2usxLG7-=8K5#3O}C=uU0nL7DV5BE49ud}3Q|A_ zfMBnMFI!Dfo|cq;oz%S2VQ6(vA;57i1gck=H1=pza*ItL)A;(y;SVt%Cyzj$h8BZ5GPk^yTjd% zAHgYwhH#HD%bON`g&ckQC#wV@a?fL5C`3McjJdPXFyi-gv4LU3SSsFU46+c@^dp~r z98Lye8ZUVxM57VD#q_MA1{3UAG}SFtz+vUY`9I+!>Y35wiwu`L|nu{Nr4YWI(-(6T*?VN&D$xrdkgkreJ%jCn($p2qw z6vSw_r0lf1(p7@YGV{i`ksY3l{8uFuFYb<%*RXsC^*eG5v zEu8;zOXK;&i!Tk~HfYu2i?}`)6_b6te1+VT>-lZ} zNj-F&Gw}Q@-kJ}EBhEpoc|e=$k6Sc3Y|m6WTAqdL$LB~VQ>#AkEOh{L&rqyip(*`| z38#$nSy->yJv!n>_RQCxM^i+_h3uIJX4?Lzx+Asw-lUNJuerpK?}0=k(cSE)XtL1Ur2UV zAE`ULqPk34b9F6|xc=D8!xxQ3+_!6n!v6}R)~z-Afc|Dz1O_JL3T>F|y9?d5^9=|z z5lP6qCq#6-0q+s&-f_k}AGyKn7`jH;o|akp@L9s3O$E+UbmM-Uu}JTYtd7k@(s)Hy@pb%gI1gTRvGKf~5m_cqvw zNEDW(5DU=C55J91Z?Vl#WF5h^R&D6+9`TN9+>Wm7SXM!&J0f_0kE`^B6tdBOX&afn zDpEm?+#+ov4X1aN^DTd%p#`=X9IuM5L;2BxzA&5h^#NPHC#BBH$Sdza<-71LW_jI0 z5@EAQzf%Yaxcx1vJ~?J62vgC`Q9j=9XUFw9ZhSDLAMQp7{5w?cEi48GQ61D-n$Ai0 zE}dhp846=0Ojk|kgl>>k$_EEV^`k0lmx7GHM_DW^CcEr6z!By>CLw9;we`nBvi_85 z(4Oh*wWw}R7_4-(C$JuzNg;Dq-?p$HnVxYJNp^Oc&|Se(Cf`{kM$tj0LX2} z(U}X&$>E!jaIFxJ^zm`#!nyggtEBAQ>PIBID&MTAuMO6nS@TtTl894eiW!RRBWTrH zQ?q!s$gcOwg-+snW{P!6O9aEh1L$VPsz$uNK zj~k2*$3x_*6HHq}L{toy)Qh+9Z=S%;)M}fN&VQ(7C?C;r@v+`vsY|M`=cs1YM0S1z zc_Jc_jU&}(V8v+G^56XkJ_-%$!3kiVMWm?_mBz>*KT1KZ+Wt4pToFk~9QD~QQ!9V- z->|}tpZzlJBf`he)2H)WS+8t*XFDuHP5b~eb?5g#ZNhP7`2P-No|A)#RGj=8W z%sHq>SnZ=jd8JzFA5SS_I)~Yb^jI%dvzzM{mI{fnsD~vF4@(afl{@gQg4l8Rr4B1I z?8td@17R5hSA06|kJPY@bqh)4!=J7xqUXs)oC)1CN;FBB-Hx!{65#UID4QMa zV}1RF1631w^`DrIA{rUG`;o1r;e~V75aq{kEG!p2Qy)M+467~g#*!ulv8!4`8ut^kujO@+m=3csU{C8!+>y*E&i4LrDMl;`#9Fz8k zWuw_#)?$du-97#EtC~+!v7AbM60%AsdX2EA$4|QJHuD?S&^c$H0fbDkx8Ojn^+~-3 z8<%H#rBQ8+HnP25RE!wH`;bhb>OeX5)#ZQOD6pZ(I6|j;eVLvpVXyoXL%@^?BV_8^d{4|l{GZy^oe^gi;dJ-2xc|GOP*P}1mT zyg4stbY$`|?VutR2ocx0m;>Tsayb7>8~>AYSpZ{FhAMPW{^YIgL zF>>wvV`5@q2Nx@cW;%;`awH<>2JJ zfvss2k5O^_c5hf@{P?5H=|JuYpUz$c(1!r7S#WVnjTw3BTSGD9%z2@w-Z`CJ4kz5j zULnV~{pmbn+r)N%LD=47n^H6U^MuK*V@mLkUzGuPpqcbw6F%j zCj{;u^fIU5Ary=W&HPb2nz{HZ@bI<%Tf6-xcsXBq(vg^YSw(Pli|d<2443#You_TY zyM^7{lwOPmvs3*%cHK6%0k;ge|EDN;u&~3020(Fe#KP?s>DJlbPrT(_q=L7)U7dhjU~o?KBKnFg4pnav<_#`KMP3(?`m@8GaYLX zsKI_(JoOB)IQ2MZC}M}8Uv%p9V`K`_N08ETW2peY&ZfwA{q(Fzt&DJ$f?)zKZ&59iVAzIq)b(@ zwC0-HK=mV)C+g0U#OOS8;;?6(*@^ELLUEi*OIJ7(_PP>jMIi4hOtU7E7=d26kVHP* zcC4L0G6Io~`9+}?gbxn(nAp5M=e1=Aotm6Um|xQ&^xr}Xj^nRmlD;Hc$4kO!WvhFJ zLSzUkWlE|}sW{w8kLQDK?-&ky4`9y>Ucs)c7mIAmx{o7abPhCNK4rh>y z(IR1LXuQK}IRNF{xr|lgRx9ZUG?BV2K4~F|?3x-BQgu-*34S1peYjDsiDoi@l**6x zMuKYizX${P<^(!kL?fY1K>aA7b!c)pKdcSR_ln#yMgiT2WEnT>HfV}d{hG_sEelD+ z_1Z)c;t}SaX8zsF>GwEhC|HN^IoaM|ze1`^SW_m(&vu)lLW3U3LlTH-MyBS zT6bpUuWG(pwxiZB>90OQXOkTpuXBb1NC;J!b(!HIE-dYqjXPAfUJiP~VGN|lu0Q9|$fQ2j=CzGm)0)C)wgca7K`~(o;_M0-6n`DUK%yz3`KDMIgI6IP z8Peo4+2rVeH7+#e#=U5Yh(?Y!{#ViD^xj_ZfjzB%z9~LWO6Hdi4*Js*I$dU{hp<<( z%^TEm1ofYy?|<$sP4w)|LI&tpu3`;z?E%=LI5na!o3E3#yZh6DZkJq3n5!|-zq=a^ z6H`9i_D{%Dn$CRv9`tpKbB1D%2z_KxM8YbZucD3tCN^OtY#(-r)z`8s8$^^Y;S#j~ z9+JP7ig(w{rC=i*Fs&n+(Gf20)Ao(!J%jEEmC#Q+r!e+n8aa0S%SigSf&arbkB8%D>GN?${M`T^f?wr&Ym&wwhfoPwjFgKb=@-DWaUPL3V zM|Qz%O-(~D+=aOT%VZjBRN!N>jC6N~qB5`F>K{OS6UJjDIp=P6dEG(^**BtWM_}<< z{*Jqa#hIKR0qDZcq|`i!1Sj^$kSksM=wIK5F%Z!Z&S*KAc({pt%X_YoG<0;ekf*PA z*O52*&N>3mpILI{H2^(`J%DqCb0#`JO2NT?S6phb^(2hL$waEJxU{~u3pI&oFk3PR zilynlKi!34f_(*$3B@_%PsX(gS!Z9ys_T)Zyu;+m!}#o-4}pz{M2=c3v9SKaV2~cd zAhlu?Qu9(aHmET(Y`WWE2=zOW)fa40$gt0gRMX@ya2-V6&G$Pr0^A;XSAPZM+1M^KaDx}ClKb%*^ zGNFLY<|qtgd%dU_L8gEOJDGU=FNbj^gFG3YZwoR~^y}Esu3ncXZkmwmg!#)qfiD)3 zaFKF-JO9}eY)sN<(AZ&{w8`MPJmel$#-TUSj@t7iekP)kV^2PLY9RFQpQKCPF*AxL z2wRhG&>+)Gy?rd=%2<^f;3)-W%{;rZZXtv1qI~a?v)u{VlXfM1zgXg+uOhu*r0On+meA`ToeUD%Sw38r1}P)d{OAloGh; z9s?HevCHBIdc-ffK9oyUard;52dw3sQdq^^G;5@^|XiO3tm7(XH|fXer(q8vZRrFRI;s z4cDcQ=cBz7>99shZhVmi{_}!T!4`MZzAhjm{3i>z_k#WG?3W-K95WO&Ko|zQDwG5u zSf*G?Bbx0=5jSUAUil2DNF>n&m$cKv4ik3tn{lqak`NK05 zuRsW0bjjsb3+q=Kpt)vzNK8WRe;!5#aWSs?cG>u|UZ5tG@C=1a5Pojx^aaM*!E{EJ zREAW;FeXM{!q3IU(1gua{@s`G^MlNlO=XtSqXe@_zwWE9DKmU+wia9$$HrN;+cKg< zt|5)z0Q9i${S?x8?83GG&a=(cDR5q>W4-&!C$1npnc_HMDnJ^^nW5C z)$ir1XgGG~oS_1~Cy2*E%n+g-5bl;gY$ z8&|{Q8{tX_X7sz$1!Q9C5=qgk3M?-AISXH-#a`iey?E8l60-7j@Ic5nfcX&=NnM)} zfmm>QhHo{M468ROxl>>;7JrrB_l{@YQ1J!~6?#NFEfW4gI^JO0S1v{*NA`9h&w0U4 zu^u+mT6yU|YXXw>)n6|EY2|%Xj8#I6^~?ekqUg%frE}!-`o6)Oo6%2nji<5d|v+Bt8-n%>$oE1BmanxuvK+eE(o4y3J!L?lam7w~J|1&0>x=9X-Ahq>rva%V-^ys<5rTYw;*Xmgb#yXY2)EmNH54{DZqlDy@q=tX)V`3G3Fl{ z4~!4?sfCe~0$K%#T?=XCcwaxzgb&y%$*)p?;o1Kis$})d0+gcYofipp4SA!zF>k*; z%ejY?v{%~e7M7CZYrj%3l&*8@`f2YPEml5^*FmH=W1^M#C`;afxhDtFy1YmVvCSx;lqb{Y* ze zr8388Bt(WjKnE=>#l6@!=P)EL`ZIe`!@>zQH`jjg=f&q*(WCIlUtydLBG3m>4e)<6 zK!U&< zUFw{Q=?m)mDf4FX(*HsTi)h649P&5abb0%Y5;F65wr4eUQ-rAj8A1$*3!t%UG}ts4 zCz|!#D$@QBwyt^cS4ik1!~boSEeN}&DJO9DDAwC5JM7YkM@6V$1d)I6FGp%NU^FM_ z6m2F?{*!HJTJ#MF{@v%1BNuBM$o7xFQ1D;#F$BML%7KAyEBKf%ob$p;XePE#Aov%O z3d@07sv*JFf6Df(LR=AzDxtAf2uw@Cp&wBTaQH(zSDhhOsZUu6h{jpuU2@`qYyNHD z?B^;Q@+CFb)@?6SSH4*rtXNw8FyHuft{2PUoY^`o2f+s#x$}%!puw7ztlHHt9gI`? z&_uFzTtmHxMs}%E^WI4-$@)vqz=csgcZ8<8pxB?>X|Pw#E}0iyUb#2g<#$N6s*u-> z7+Zn!->bRCWeZ4T-}5_Gkqs}%8^}%1{-A{qEa9NFx@K$Vg;-pX^2eq2kuEl`iJ5bN z@hdd)%Vk_+y@*EkJvdo38ve43qn6rP;8heA^0+RaG0LK&xv0Z3kWb`#DWA4_Q879E zfeq)wl&yuox=LuuviYXyGCF^Z(*YgR8aByw+KAAU`y^argO~YuI0CL<|aGcFXjf)H*dchqtXi%DW~({tu^z%b>^@VcB`F+Y8C zw$UUK&8ZPkt(00h3tu3$YMWh-z7kHl+CEiA6^V~~pobUo*mEYFnGon8H?BvW&J?L}o5R4lK2li%pf z!hOazOP!#FOM$f1F3%vBa$h9u>ET?7u<+q~&f-=yh-m<@lEX?cC2iv0Ig5kM(=kgu zas_)yXVTRZVeD#oJ`f2iM~Z{Gd^6_8LJ~PqJp`3%OuL33*-W`uX4ipBv@lO~>K-{~ z8R{Cg_+t^ZMJ2RG+r}+lwtz$~{M!;(6^o8pEBM(qI-<^5>M|{~CoE1@DX<#Ygb@|d zNTal(h^KkvS!X$ae3KyJ;45659-2X?b4&`CR|Iof6MjAX%;+?`csrf43u$ENS_*%8 zhio44Sjl30s&I#!#O|F6+$NrGe~VbhNw3=-b=CNJJw;P3ww=+?F#r$T|Bg z^`I8`WP6OmDd|W=DplL8z5!ctzP`N$d_*)d6nUX&G&gRg;@>g53VZ~)8&Nw{Sx)cK zSi)XoKy50npL-fHYzt|G$-a&r*U8uLmCMoDMd=nQsi>_xyYfWM^^#C+uuNI~7?p0+ zSIj+2y^jT(UECKK_DDy^I!#)+Ye23p&W;l*%rY?zQDa?H<(97H^=jH)*DUq+71n7s zIuNi)yGPTVqYRfw+`h#hh;64QvQt?4YmyX_9Su;5SnFps#plTMaP_}$s0cQBD> z1x9ylLK zS^ql4D$M`sTn^?B=j=&84Mov5kmnEl?Swp^i z{>@AH<5F%1l|ZM@OCZgJc2w>f>Q!eveM);YAu!{2U}zVT;K%VS43JCDZ{^pXLuZ;} zmO7scGlbLXhhvGo+yiZi56i5?fzglve+ueYz^VdE``YU&LyFf!P>nF(1J zU>dspW=qJP656x#eDsuvMh>e16fT&f&*w~%<*}05izJGtPd}6g64=7$OoANRGXI4=Y|`KZ5RhLr64&|0okjV0i5-0? zqTvu;BiJg*4RYBE{(E*Xqr!+fSPMc#osT;*oQ8Gum_2T(%@(6y*WMs5CMS+J!>q4^ z%hp{6L4Q1Ro=4Q>%nx%t7Nw?>RSkGF#V>oW6FnrN5sl<7=tmW73vV@Jnzg!TH-nEL zA-b%|PA#WNF?lbt>I}IEW5B6?AB$P`Inq3CF9B|EGyhi>jcVN_aCe$C7ZjXY+3oQB<||#D<7#_TXRXRl1jE6 z(A$)=Cq1ayes?e}O-Cj)y&B*6NU$*FNNy)SUqnKNzri!+Tu4_E`#IbCv;LL3H^ByT|lwCKk|zk*_*AE~9+g>qW)n@FrMCX(Co026SYXaL*#FxHxKk z$mbs6RGv}RH^6FjBWmH4ZSBVAi)iHNwR`9`H0LJyU^fRqW3N%_3(5TXq3&K)U?gRb z6&P%g%H?wQlysgt(R*;5*9sW=jULX)Q7!Bfja1i?Oi8#pH1Cd>b#hgfmELE09C=SjF`~ zuPc3#)Xs9>B0rqvzP@4UpO${K^xdVusXo5+mrGw;dVJ}BE`4_C_m+Np=_5=3W9hw1 z50mQ-b4N<6%82St?gEm#lN;Z-q$*w&sk)@fU*)RmsxnkvP^GStR-Ik7xoTroOI1@< zJ>PH_cX?^s^LMnOvLD{D63=JvsKxUKcOa8%=`*)qj_3DpAI0-&^4+_+O_Pt`elGra z^mZAZM{hq1&m*^=f#)}Gr!2m4J7w{}?Ucp+w^J7P9-=J1eu%QT>re{M!-snDoIP|g zo?koU!SjwoRy=P%q{s8NLzF)`MEM^)MEUPOMET!xs0Gh`lZTe$pPLRX!E@>m?V=lQ z%i_8BwhW$oZtKHy_idNpdHro(Jg>RUhUZsrGvN7^+s?yt*KKkN|4bRJO zTZd=WIy;%mR9el6;$n~6;$k} z6_o9#6_oC$6_o5p1(HwqqXNml_M-yHC;L%>&KO+_Qa~-F>bTj?&i#OAsJ%2O(*>gA3pZ)OW z4R}6Fy6@*sKTGn=zA*lJavug>@|}HtJfGO-EGenjyss1g=l5aUC6Db>;Q1&yd_TAD z%!l@s;*SS!%Hw(eO~ZKJb5jD(yKkb5zJ5~>&pU6zFiU31yZ3Y5lIzKN4{+U+BUALP z;VJso&=h@ZaEiW_nX=%Sn$qH#nA(A7Y>LCPe`*_^eN(67**mos&+yc8JVR48cwRbH zis#N7@_1f+!!Vu~-9Y&VZ=n1GH&FgPH&Fh*8z_Izn@1^{?y_2*8W-qN^`(9eXS$k;(XYQdDY}-RC*s_OK(7uOO(6)z8hE01g z6q1d5=um9fb0MB@?@{7;+8#Qb>-W$KTJ}IzN!ILHiRbD)Sb~zZdzRwayr%@urri^G zuG~F{RVi7qJBH`--IwCou)7D(y4|#b+TFB*rMqbb)w@-AR_$i+tk}H;&$8Vc@RaOc zjc3X325|j!cQu}$?8c+ypVy;;lK;opcfiY4RqN;8nYq0rq?1AdNeqNC=j=0$n(4jw z0f9MlruSX|hmr~iM8t!ba&LO?$*3qru{`x5k>}$nJ_H+}h#>lS4;BAw-*Xbk5dQDM z@3$|kwP$_%?6dbeyMF8ajRi>mvM~YadmC?u^xchMf7+img8gZ4Z!|z(p7zI$tKom% z+6VyCe!md_ru}Lo08D#x;}S^U*a!gAezy?={AMEtcy%Kr(|)-D1N`R(4DgE$7~tg% zw?q1~4H)314H)338w`-XxM4MNK6YDU*wslJ&-MS6~Y+i=}o>+$gzPt{SX^*eP0PNa4q>rtQL;A(F zw?g{pS|6mF)>3wU;klwo{4e8x$B9MM=&CQVBwZ;wU9c#>xHrJ>jZLGoet81|R@)~Tv zvDD;2 zAI1Rf!x-SM!x-Ss!x-R>!x*4>7z5M}V}R;m3{W|Y0m_FlKk_zp^Vad=T3=wGUzd<3S8yIEVps2Qk1+ z2jMjcH3u<_>L7;E9|Zp?R35}Is}F*c6W(wTUXk$n1D}KRx&tuI5Xuk0I728q0OJgy z^Z*8s9KiOe1K2(~fbEM9VEb1ez?QE%(8i{(Ja8GLs}5k(D-X zg5T}E8N8w3w|gnd$9fQ?!oq-+XMF7f^YA^0N>h! z0iNB10iM}|0lu*Z13bAKYDn6TqLLb`dE6wySM`0Y9;F@R$d z1K1`pfN2r~7$z}*ei8$$p2PsUNerN!!~p6^44|CE05?ryfEy<=Y69C|HE}C$|KtP)xMl(aTs46Ku9(08D<&|&@(BPCMZdZbQs%4R zc0`e{f@>1dUll@nd*@C_Z|hVb{cI-#>CGK*KB7?P7D$5~52S$(SQhy@dPu#Un;`Xc zz_Q5Q0n2TXvjb%p**l9MwRJFnwF50*Wa&Vg7a31u0K@4rq`K2-NVTUUkZMjt*Al5t zyCGeD+6?K9r`3?&a2mRn=(^L;@1pU$BI@)^NYQC*pFEB2x5cOK zfIruq!T?vD!T?vC!T>8zVSp8l@157`O0me^afYFl}VE7~k7(9sq z`cGm2;Yke8dlCcmoCE;jKTiUH@E<1tK=}6)03iI}1ON#C=L7%<-#-BW!v8t}_Jw~v z0rrJ|IRW;Ce?9^Bg?~B$_JwbsnDYOBJOKd0w@v_n@DC>dK=|ef4DiMY4Dh?-7~nU@ zF~F~mV}RF=V}MtWV}M^C#{jP!#{mC%90R<390UC9I0pE)O{$ndlZhHT= z6$;S%!PYCssh%70%H;JuZNX&|xDQ@BF$dD66JwBGGJ*TxqHVYjF5FgwbiuY9q!(|) zeQ^G^TOpmd%?Ih6ZO~B!v$x?cIBOg3f-|>4M-g1K4LXWo#y03Dg6Z3^{jqJ>{_r+z ze{dVNKd=?sZ})G-0DW6AfN(1Y5NyQ&y<0KBw50H#4tKKoDa`&*$B zd;fbY%+GrNYbyZs{$=Ypr0;Eo5q9sNw?f9=celVNsP~;M1xWw21wKK&f826Aq;G8r zK>COF7CZd;{T2Y|ePat$V(;r)C`f;|1uC)kw_BD$`s*#=N_t=00zJL=)h$qf-dDDO zE9w2u&Ct_(f4;c_>3?j_K>E^Va3#I}wi#SW?~9u~ke=CWf%M0lHIV-6=IbH-(PnJ_ zhnue)h2jmcqT9*arWd7d8=R3g8FiYZ!4juf=X)+bb*V~!%6(7c@{;ZiBE zBm+MdCg+7akPsWd162KYaddk%Xi0|#5WbZpO~-#T|TGe!pILL8r97U;dRn57xB@@9aI9L`OG z1-J-#Atn3T2etnLXBU4$GjR5VCPWQ_gFrydodud}eJG7NU4b=R%=!}K@>v(scJ3LN zz=tzaVv5IdW(&5Yz+p8x%?j z+^IkX3sHwcsR&$4%|Yc|P&pMuvGd3)S7v(Hzvs!Jiv-gkNRCwa^iZJp)qy*D1bthu zH~7P%`+^fUz$p)oy)fbM71es3({3!Jd@&?rCmXQ;C6UMx`SHc{^Rux%uc+WXZNFlA z=UYV*PHWyg0VE&%6?fXD4$*`+NEV}^996AwjrsaA3Cuv}tGHtkQ$aVkm0_RY6OEnw z>BZFx^aI$2@!!&sflKh*IX+Wea#puh1qBCg*N_JiyR;C(y_$)*I(i^ib(qLj0pMx@gLfZ4Q#g@*KpM$mk z#rM$@m~w+VEMB(w!)}ysGIUdw6o>VQJr#i8cZ-3PXUN)lXW=Ns?^=Be>>GtcAJtdu4I=E z-ZY$%nhK=4<*#_F*)@T$KXQA3I<243Q$V&6R55{Urp((p@d4QB(y_1oV#Y^%>9aa> z|HkcZ-3-RK-7PECU{r)Fk)pJwbl6%=afSNje}l0u9n|Ibr|vB+=qUdOj%+Nr^<0tS zPFkfUa&enl=17FC=?G^f3N9VCH_y|-9p5t_zq$1N_wZh+eIf|PxE=6lD6LDtO%s!` z>Z@kpIv{6k&I5w>0ncukgOMV**EW=V~Vqb2hYuBxqwiMPH&a1c2Tie5W?W@)c7kGd@_ur~%nK;ldpwVKFofvRO}SV8 zH`jsf=F&0pAwg9g6{>@X8RvT>FOR9P;> zC{v=GH~BQROf!vZYR(cVK}kOzD~;~T1~-}dRH zR;sg9J(1#U%+2-#{_2f;rva;A~z*TiK=F8X3p<-x{6(-$U_L1BGgX6goh7Q&sA~z@9Sww1Q!av?{$*&pT{`yId$V{RiTs!G zDXq{1kW}%b5|>V#Et4jDG{zVLj+7sUS-4J~*bL?A(y_$*f14U&T-^De%}^&_dWMY7 z=&HA~b^5?FpHipT+r8B@7wGXJo(K+k0VF3lXg$Q8f&Rq4_$?S0Ur5QmyIVIEs1e4Z zTb?7Q&xN=w4Pa^q0$v=xO0CM$LNQ-lpGWKbDh+xPUSpEUaXO2x1^`{D{%RT`&0Qt^dmeOQF!azhnL&&E}F+e9ut{6LC%Jyt^K`+M~A%>sf(TRP+ z1O?#+N=lnP9HCN8I$#QT@)~{$-T6689X_GD=V}PcIei#tFy_6Cd%SbP26nh1t}$g| zViXxq8C)S1qp|@%$QkIVi5KC4x^(R1t2cgh3VT-PyD!4X99)?3T=&0aqDfDyP$`tkNS^c$0YWHj5p53C4h* zQ1wLNtG>FanBOV91VdXGk7A}UuA0SU)!RhPL={3SHpH$9#Z}J@KZT1M-8#1Cy-_&4 zS0yg)Z22j?@b=KizG+|V@lPAsG}0UikC;Ztk&8!qhkrl(li?>vj}Px0esJ_F!(vMPAVjqUEA7;rqg0 z3cuI0O?XuJW#K)-q|hb2PPj}sD)_75KLy_r91=VxxJwWfSbIJcNFdUjsP~V(KkfbI z_|D$ly$|))dT;I3LCnxOcs;dAIg@=M|9W3LuUA)5RotZG?yxi%qg*GsT)CX1MVLv7 zywI zWzVR>YGjmU+ATV75LX&u_aRPEj@QIQ-sARb%TlG5rrmK)-q0$%M9!RcrTrcat&zI> zIeCj}W~pSfOob%{r!=N8-pR|waRZr%rEE3IVO9s_*Zqx?H**C$VJSt78JWgtO15R! zJjyFPjGriGse&|?*3gFJLLV=8*6XCMKsm^$*rm283<_RuZ+Hn5t46Xdeb(bh_iyGN zxJiXFD5t6hl2K1SSsA#7%id_EQ=~FnQ#4d9(uNYt-ky@T9gUhBDl-;3-~S@CFIHs~A_g3L0gYp8plDrfXSC zAm2>JqUoYnj}liod9mMG%FrRg>GaBJW&Gl^VwGQO@W;hsMOK+H$YtWG+-*lqMuf%1 zVuf<$JQ1g~_wO8NwVBco8A_gsJLENqD`_$C@f^K~ zBxV*4@^YV&B+?B%u(J{6d_Jb>Yx4?w-9^}044D5^;gZ0F_1WS(+Y49c>_?I)?o z3=c1tS+rD>l7wOgPs8PjukPc@Q!d&g(wtsgG3q^)P8(v627mL zvYrfzrV0tIE@d`4CB#nt2Qi%sWivWGsR#sR>FAh=D^JN;2m^D4$zloC2}jEqMjpsR!hmNa-6)Fh{lLUGmA8YQKc)PmH#uhJ>`;%AzF@FvZ5rSVZw!YlzfH% zfj%ZB91w*U0<(#WHid2`CoeQAUZUiP8kn!f@fmB$li`I}rGLL_% zg5A&{>=CO%-1Ijc;&8v62Q}s5Bs4==qiU^HAsXQydAXrbCL2*tG%t+>D?0f_WnQi{ zH%T($2#5W;d|T{Ltoj45ki?xNM1@14cqJ4sDlWc+ljqa^4B0?Zqudyas-&5L2YGp- zRzL;XSHe)_HEaK$>ql&25tIn*qm`^s7OPicLS9O%BN{yxs!9c1hk6eCej-ZXd zQMt0+*76rzUZvij3nd0F<@0BoGUT@C(p9lBt5Hj4WO;eUkwUr#fl`%Lw&aLk{S993 z$~2K!uZWoo`VeVhjC`-lxx_ZY>ouh*Lo1wh)B3+~^_%D5+rk%kGZAZw1dcy7N$6c|b6L9jGrU4qu23EYtrer1Mq5LJ{Ff!G zv?);8CC{r&$_hl&6KJ^nnYi9U)`DewiHg>$b%lg;sg4Y-u%smZC{i<~LNGqKpDRu# zBrn!W4u828l@|g?_B6KARy!b)V-u#40gc*Ysfn%OWuN2Br&|sOS*)w*irpG)(6YIH zUS16u$aKtG)JG$xcv&%@{~)JhrUaR4I-%RTly*l(`X+~)s_GO($W&974TYvScF{~; z3=tnlrfoJF4QZV+=8*9p>Qu4dA(29Ajt6Y{SSBidi_f2v)CjwgE_od#U7~sA{k%A) zOB)oasx_Ykj%#H20$0eCI%7u)gUf&#GOd@OoL6!3WW}4NQtF_;LR#~3eX{Lb%qvpO z6p@$Ew3lcqA;#Br4PGA7$;o6?sjpR9b%_JbCZEoIvJyU`Y0nC;aynLNjJeX zMB|e?B9>-!F7FzW=5U45E33IwBve$ELxCYC;VOT+mClwG4%GTlJ@m3^2A`M&=k~7|{hBU3_Dk$E_s*RCK z71?|(J(<*ZcyXxcBAnJX)zFGd1x0w(KX@}ilNk8|PM_Q@_ZJZ(JuCM$TO_G%L=x_1 zG+R&1Nb~ufmKGt)$3ldvMJUqJ<$UquYO@E)Dv@T^8VhG?jEr{zadA3K<`d0q6|RNJ z6fxP7m0W>h))-MwhumQWa6VhZw!1m|F$k?r77}WjQ8^$sK}~dT=MoWAxYdhP%~YYTMn!`&?Z2OY zkTPXP!Gc^tNR#f0h4v>od0G+GPz}9FM%LqHy8`(Nyj){QqLjRrZqg`POVYlx-bq)C zA!$7n_C;z^M>^sC=~R9vsZJ=VthL=r>IsFV;*!nzIj10MejQO$y2Ub|*67ekdMBqU z#7R``-g+!63l|jS1Y$%|K6|kcrL?|)OyM;LC|T;_U-Q|c3R9i*Fs`E7P_fG|OY>sC z7kMN#r_U}G$1}`|_95Pk%ZLc%f;~d5zo9EqZZ9v_=L}@ZBL;RHIptC-TrEy6u9Ie@ zX~kM;vCP!+B(J%Hmos%c5rlzzI7@iTN%`zeyqr$vkTvHmD)R+e>P=nBIWuQlYzj&! zlOyM$Eb6G*l9=&2{{t!#M{c4ZBW*qzeB)QX&OLxwthJ*|)+N=X8|Gka(U+&hj#kkT zp*)eI-chPa3@YirOj&WX($OeNTkMS*NrP99jD3U89w*EJZZQ6yf<5C(Z=uw4-3D+I0$N+!gWsfEQb`9#yk0uUISIh9Tx@bK;bvPNN*< z@;Dl5h2QJ`$xu&z+E;o4aM-9PF#g8)3*%oKpB&#fUK|gOx0U0Uk6$$Q!Pu|HelT`? z?1`~^$5LbNvFpYz8ygw@%jhpgpBp_m`o+<^Mx%lSz26wMj!H%sjrIvlBX5uV`^Zxx zyGI@xsgK+?qVG8~A|9DH(lh*f!PC74m}-B0c>D1Ez188;aA;UPyb4dVh2QOc5Kpyx z-t5^9)9o!o>xOb|m}}oC8iQ~}D~84f-yi(t;P(cP2wxdw2k#zC3_1s|?YVz&+2F{) zUkCnk;5!3{L^lpRHgMNKRIsO4JYenl+JLlo-oWC4zTSW9f4l$R`=9FH)BkXPz5lj; zeg8E*Wr3i7Zf{TT&c1&N|Eury-rM?K==*BlMDJUo6@44~N`0X|Rp0U}`(}y$F8ZzL zUqz>2KE6(r6CM__!nQCjvlkI4Ega7pjLDR) zSjkvMxnk0YjA^aLvN0{!FzsT(BAgm5(m7eN#5nwZM<@`_5axHd+!1xiWtLQBdRyI{ zQpLbG@O5)3f3I=V3H0|f)K@=2|d21f7S?6`M zN@iNb$=exaN={icm9#2R_bK8@v1T>ImybkR zVu_Kj%pgf;P^~1Z%3BJtP0koka%N(wjLICMOj3zTGGHguE+$6=xG^9dZWc0Rgf_Zk7Kc@>qx@gv z3RV2s&uMNTiLIKlP7S-% zbiwCs!WSjm3aYdo7a6gAnYZJPWC*Xr@1yGal-HTjpW$k%p!5JOuD7L&>4`+!lC;j| z^5;uh1*s&f$`Wd5#4d?K$jKQitRAH*E>#d>#X$4(l{k64OqB_ZL0O3xW%ary;XTgD zv$dL*a7C&~slw8z#**G~P9959D#Ae*%iAYfjadTWc zuW~RbT?@C&nP|S93(+HQbNv#JBGa_Ztx3f5;p}4WJ4ELyxd>UV6PYGZ`0{QIzy@QHriiP$KvA1r7zEcpnqx_R!7|=@=2?Wl2J)` z<1)@ps+P|axn@}sNGp?YUAUjGw^SfhMY)vKB(YZ;nIu}uO*QG173C4CNy8y?%p6HX zq})Odozl@-GG1s$h_o-!R1_j2ZqblVsWfWJ;jj7p9-Yz^jLZ#iz{!L)4m?6+#2jll z8qt{OE4-YRJIM;X+>kP44&_tVZ{zASskf+o`b@B1YD&^&#bw;AhEB?YQlxAKNSzy; zjI^CH%;8#pQc`Ql>a_@!j#y=JftIt9@G)_dEykpgsU%T{W%u%8F9e3I8`XrzVrnQQ z%XrU_a62o&O{^vn?!g$TbfORwOT9q4!?+_oUEOj=9mJ$^U@ zbIEezbwEK~PUq{HMaxvO?fB}0ps@^VS{dTX84eqL2`fR+Q5EGT zWhyT(b_YT#sAp5fZ&x+sS51Ny{QV0XTo!^hRO2mLPx|V~;pKdOgCwEXS&$-?YUnhw zRrhhIVbX3Q>&Q?xYjcEJCSCF-Cl9qMF_dL!xyI|Ed2(A4gLPE!nCxT&LnQE0~%Dg-d^xVu1D|q{6cam_5V@{K_*;KmH zqr8U+_8Z*k5t>EnV3w}7+n5HcaciBwKM!01S+V4tch)U9CD;6V7kAsn|;muG8 zNHf#cc)=t0i`!NDk{!H)$R6SfrX(XtW7Sfpr}JN4uZxILg@l;O8e~o?P0m@(;d(9b z-n{{T*z9q8!t(II+q~Qit9A^Ts1uor#G9oq*~H6bPBYQ2c*GKUT%$AiC^bI-_oAwd z&?7IXlWCnZ-Rs~g+ACH>)oz#9t}sc(`S|cI&W@)N2A;x9Q}6V}qfH&ND85*H5 zxf7h3!mnXlzgx!^f4X`l`^Z{iZs*LeF-eeZ0>|*-ibHq54Sb9Pc;DXwL)|(c*c0E_ zdFw6C29CMI*-&Iv`8w(K+d@cPF{E<9(|!gh=eoq~nfqo=QR>a_ymtm4Q*cbUzyx>X ztCFauWTXXIR4`4cD9lqwzGkwW-@|FwE*-n{bqjFJ>;SsJi~oR&;+Sxpv!j(G11yrp zqmrP>7R>6Wj%`7dwYPygsY}P+qn-uf>CQ#xefn)M21Ml(IA{-7%Sd7|=aC~BDhFZ( ziOK^9+HmFk7LLD;cj?#}{{pcUUhM%Qd)=F0Xn}dc1Mi%p7z#Fh?zpKUmBh`Jm`TZ< z<(Tz4Sn1Ymnz@T7%`3hRCotN0Qu}z%>!R^1K3WkHrpCT9cHdZL%rkcV*fLlX`s?T~ zN540EWR&fFXtX^V@BQPbeN;Aj$!Pz`pGIC9d3t1TuYTl_kp>*RFpdx-^I=8kO(2Jv zS`8X558onKFsv0`JAC!Sj_`ux*iQa!7a16+WPYf&( z2nPoG-|7EZ|Fix3`@hhCM?ceV>D}E=^)Kuf^}XHqQs2{kd;1;{9`9@P-QH*DBl_m| z^@!f=y;XEZ^fl3>XroqC6a|GYky3QIXom2Ags%zzMR=KTSn!_UWx=-v2LxZ7I)7mk zNXO5Ne|>!W`2FLh@teohy>og#?AhLPe^06BW{_?xiUmEh`=R%ae@&3X3%%>x+(3@e zXf(xS*5{#8vWUfp0>7K;;*3*gv7=Zynv{7Y8N!%Mri}{AcQ`pJyGv9q5mqzqYS3nqSZti!P$N?)5{qaJ`CzD^k6DbI zTTIkXa8d3cNtmwZ$5qofmAx5(!+fTYxuH(e(O3kz zI7{|wzE)Ahn=qJgk+D>J=v_WPgk+#B=Ca*Vh=;Wqh3^2LKOTg$SV1a4wJNHXV*UUx zjsg#|DOoGkWu|l?xp+En#odS_x@60kd}OYqV1$Fb+y%R~VZvM0+ay-lWe{_7A;#Xe zrki9nQB+4vdbc_lUB%5J8M_*`PF#Myr5S-8XuW)Ooik($Idep$1(96z0dpdn8RRA) zj7@Kr+mY7hX^>1KNnbI_Wmm+cVnka^tuV}~jUlQ3_nh3Smz3e-pI5bEyFx)5NdG!c zLBx`9_*|#R!w^H3uz)dO4{Ld%nZf zkIAQuWMvXr7@^_YkChVIe0uf@ zUY>725cv$H)Va&$s3Ad6ygZhVkXACES34Ujb6wuUErxZ4s@6uw_wxB&85Q9Rc(nn> zQ;ra^>#pVGZL1VXP+6TO!ofnct{_!zPGKpgYA{$y>*{W^#AHdW76&fseJsX=ZtjWH`^h>W-^ zO+D=F@gMl8;f(nMSvvZ6@1-cDS_jlvjHi7_IB zycv<0>6Tt9?N4(*Fww~>6(J+ddO4uCg(M?=oZRS3Mk$v*XNkh1TfCN1{)xjinq3j3 z4EW?$SqSOFv+m`yYh7|wD?4h&5M2yL65<6@+1m_+-O3YDhu)_2m~3w1YVK?lV^sPo z2B({Jl_QcUxS@x6>nP&O)l`N$2}`q0=CUMb-O!?2L^Wq73`$4cn6 zWqyNOsmdi+T*v3H`ot(}Z&cd`i{EIhN)~cky^JAefTiYq-XMuK#76Qe9@dZvIZ#d< zAi@cED-@P7yqOS8!m=4!2kT1?M@GJk+Ye(P`mRBds90=GhcZj27Z3BDQw~*Y%FCedit8JygXz{A}{P; zs0+0?Fe}dB-Hc90CCR9x7($HODhF`Yl`TPb$m2${ao+Ly7lW4+Mww0Vh6D&6h^97I zsrf2|Bbr*oZ2>bHMJZg*#2YBD@s_Rez6@^$jzptIU0h8S?cstrE#lpzx++IRIg)~q z@5+Qf5tiT0HD?v?LWQBbXMM)!FY2f8qMT%-UtJOf$ z8diE@7je^CM(LHr3BNl~sMYnP)X5BT`#+3QY0@BRxn4|{W0{C^!PItVTg@nm5TanU zCG6CtJ&f$SySRr^w8UZLNs;!1)87m>h$lEyMLt?VO3EM$+sf9kDz4|7rXt;NlaXlI z-mvRXx|mR3%$rGRN^lk>X|0i(l95nxD?N-tY<4BJIeFVul&Z~sY7w`J&B%$U-IyxE z9+STk)k$Yw!da2|q;Wdg2nBWis@fEnev>PV%!j;$*)Ee7jZ&4O#$54dUar=aDF&%h zv;);4+VYL3IWy8G<8VjS3W?QJBqj3UG44v25&)I z*D4TWje2fuarH?SRH1rBVJwE@8Eb&*Im1~ebLAj`2x~Dc700aR@cc)3c{HvhlNF<@ z*6?N$VKieEFL#&4R8p_^Tcz!$Q%j~-1bBrG1<4@ekE{{RV9~S4ss? z)9IEd_*x^S1{GCStCQ}klaPv&R~5MIL_So|nk?m9R!QmQ#0tLli3r50Ou2%As=}dc zWtaspXl}zXbB2(Yq(r8b$(ozGm@${SLdzA0kOsnV`i}|unn3m~iQM!uFDF`AGFG=$ z+;OWmY?8?&oLpSXDySMX^twCgD_Ar0Z|3Eh0!cQ5geebeMm~d-Q1g=nN2P6+A!{up zHP*rkx<=3SaZlhVw8BV7*2z#+1)JpKM>#`|V2+|1ghH#1gwk+B{qhhmH`{2^kZ9CQ zQk1t#Vl%isBF3Tc!DVW5>5&77yeT zI0&b5>IPrcs*WkCkk2JeG4gc8l)+0hv)R@dx@hct6~y6tXbwB^yk!o1)gUpQ-Nve~ zWj79flI?dK0o$*00>@S5?ySU(&SsQU7L!h|)eKw^a(o|XChHU-xN&^Gj(zv%=@sld z;d@1x2zhSjln70&oqQCCw5}8fj3{U@1u8jjG~A4E#_kdzpiA%4v75f_hea41nC&$I zn!3`%oV(KFvt)xIFB!1OlBn(v#W_1G`q8Y>^E41{WB+H^7hYWnHy4M9nVt3h2yVUv zE!vWfaD+8QaaC&c_}Ce*_swKK7(lbeyHryFAK2%2poN`V2N7KUvqZB23rW^A@=V>W zb8(AnvzJJv5{cqt7s1qB`S_JK9MF;&MnDg3o46ewhFb$l+6r_eA@%8jLOa{COufYw z<6TmA#shxV-Nt!VgExL$$GsJ4*{^ZURP-8E9mN(cuWXNlH}-GGRGW zOi$fco5?;h16o3tj=ksV`V_VHqRwAtKqFX?JlCFNWGRwEa56IKDy5`8MS^>Ew=D)M zT{`yJO*c(NZd}NIYccuE$oqgeK|lz;`L^s78c7O#>!L+ed=Pc z*rns*Rb%pK7RaOLuuB%4HG9)Sv;>wvaad38rNq7I7R267z|1b-b19uuw<>3{4==>+ z{(K#K&wEb;vvpl}G5gNKvj)c(gF)*=91L=iE#j_9sz!M!icY(8VKOe|ig~aH+J3hV z!l*vJ@=GPj?9NCp?nBOr?70ebCGD*OGO1-QRYq?rkyBS-XR?duLczLp>}wBB#V6)D zuGzciq7S)RoS27}07W^DsmiS%x{I_bNfGvX$XLkQyu8tO=7G^J6-)f32NsRb*!w#- z%}1j>oWb11@VN8@4wcLCM%1E(96>en6=m8Wql+%MyoddUd^S98w~mVhwr4idosH!6 z7hnw?TR0*evJWJM2m2oAeIBo={bKQbzKJ|QaKze4ZPdsR{!m#PP`DIY6OFHAu9)5} z#%s#(dbIM3JKvs(1bl(tm<0t6P1Md^Eq2EX4iynmTT#+zf=HHec9RmE>9VD0#`JC- zyHqm&26jSyrKq!RDf0Hr2)8PZDrL4LO0smFpmpFSuSK($P%rB*0IN0wi`Q(K7*_f=y3u^ zH|5?z(15%!0@r9Hwx+~lZPM(zl~6(5Vs`TPyDgpm%aOZh1{^?+%ZQSt5jMKjq!Z#) zrmujXbc@+DRg<;z_7(Uis+h@_BTIf=BvP$<^Li=kx)QAz?-H{UPnd0;>)#wcOAzwm zRcO(I+b0Up1e^2i%Z+LeVNL}d1|4l|g#zXpE4vzfX1rTC6_fJoS0hUg+jloPF8HGG zZ@6Vpi`RG_DxTwS=zd@PyS!U`fp^(C_Q)b2J@S(1mQQ(&>`Nq?K7OHB#}hvsq|nXt z?EWB762X}>J&+P*alkic6YkQAxn@L3(Dd0C%);LD#w1Uev|EBcjWFq-6106rOAp6) z@#3)B495U6Mc@#@P4s(Gc&u(+r{`7`P(FM`j{Lwv%hT8*izn>9bawELWIw(lf(^o z#q0|zVOa7LV7j={3Rj!2L!WxJ`8s&^?l#Z&2jle@=ntKqtwwnEMK_}091_Bd>Wx&8 zbftmo2;Pt@4IxL_iEGiE6%s;DDn7=-AG}~@%n|ed59S6n@TJwLZ^mb*ja}MzazxYf zS>eAA#RT&QzEXUlXITdr9xk04xwW8Yaw9iSra(t2rMTsSAu>{y66^*G^qDR(`|JsD zwa;9=wEt5_ZLGiseoQfO7noL04GMELx4lSeC~ea$H>s&4jE&$~*+CIGVfzI z%NOT{!O$;!0wyj^1UwI@c!?9tcWy{L0Yiy-QO zed2TH209LB1ZAMZ>aKh&fz}c1YSF6couy_d8rXy|!Mx3=Hdm{m zbcObjQKd(Nfb1m%RqnHa+vw7bLHtYi>q+>~&{%G$)u1R@DvK=~!XB>AN$-&@39aWncf0-$?t2DjMNyv{Z~(=DHD zdL3wbC&4S;3eOGEK9P;Ig1@$k?Rs4bIO!nrXBvDpG~DH4>3PvkE}WSqUiZNm|F<_M z|F=4r@{Q?fBmSPW;EJ*3eZK(ehhw4+vGi0=52n9yFS_r#$!XxgxOkTmhtdo?jvAXd z+j9HzDfU?s&15S%G;8`NRL3k3DQ${D28a!2vhQ?E*Rj*>;v@WAA&=(@p~)WTU>qZz zlg`#uB%#g*qVZ@W<9edB`fIkZe8ycGNvRpW1Yk?h`I9-HfdEFDLblOPf`XKtYG*F#kqu( zz`q~!X($p8g;tARO&bBDB_sp;YN1=}h=<9lCLXlEt72H$Jio;WN>)6SWAFlk; zlahIzY8*lb%oRLk-Uk_YN8CJiT4>s| z5X1qVH`E@uzwdG34lZ!HYVjKPL-3vCnZmkWH`f$qvkw-a=XB|&ngT!8yS;>NnXA{r z(9V>yX)t}1kp!lh7WAG5`(g>Ln0Wyugt*B9CFJG`nlU%%F*e`~y%<7@H*6#rfI$Zg z%Gl>B2v~0}sATWC;%#5&nOCm7{w(Xw!@Xx&Z-C0H8H7=mRc~!sJwWQH*TUG2NwIH# z3s`TY(vJ^sE||5m>G203@GX>WfPJ8W27$p$2W*$Rv>kkd6<9B=9#a-9W~VG(D)~5d z;{~&_@1C|nB=0G%$Yu+k7*qQ|Tywiem9Ya`oZWA%+elp&ztt79FQ|lwzxTkn@J=O+ z3-9>!ap4^Zhk9=V`5TTeJo{7Hjq%P4x0|!%H=hH42>hXG@PR-_WP>}7OlpedGphyi z8)$he#7H8QDL(2*7tRgzLEit+Z66(2g;3Qt%!*PG*lcV4o zxG`eV3_T&KQz}BZ!ig9bT=x=t#xbV?KCypIr+du}`R;-2*ge&&(tj zbiTC~2F^3g*+L?Ya*T_RTH-Z>h2|OUDv%70eKD6wEKIhsxy_^5WA*ZW+6> zCq8hx@719Vq7i|j1CwNX&%*m`lQW>wxXMpO18QHmp;89z3Ax$EeP=gp#-E-p%_hP1 zQ^)(}bbh}XSG|35&be`USOMQIUCU+EN1Up1J;^@1AD%S&D4IETzKWfEZyUIL9BB1B zkK$!mRklidWw1+^sU{3ri-P;5{4x0D`6@Q7b#k1KPdtX)T`s1nNb!xYL|}f`2+Bc z9-S#)(8;s#*;{0p90xnx8eFt$&({cF3H+V?22YNz1HNsv*%-Ox!ewy=^Nr<}MxE^W~SP&J`}~JhK&+;4XrohkU7oS*>eyYS+|aTEiNr3#bEJcbj{zyG6ZL*kW~OBPA5Cq{R}ht!>%_ zo#uQMP@>7>ksvQs?)j;LG5hCBTF zI}7XYGdnMxz<$I&`B8}6W*+WN5wfH&Wf3#RniM`{xKtN+pj2Ht_8tU*(P8Uiey7>_ zf0Vrmd|YMKKi@fTm?hnY+#m`y?}yOfoZ>naq+IkTUz8J()!y)V{c) zrJ_8F2qaa(4e5(8f{OG-UN=Ngao0ZuQBhP-aYOO{eeS*4F6pa3{XpqGcb@w!=Q+=L z&iS5m zT&l=tJeiPpRO(bK`RpQ;y!9j!YHjbi^*86$l>fEJ`87K?$*$ET3QW}9h!W%%p&a=G zHP0{C?%jp6k*4aCx4dmClkjt%d~(*Gvf0K*$*FH+3L|IpI~r9aYCMr7M`!u*vw27k z_ae<4D4$MA#x2Hpq(T!*rZG30&Jfqxd@H&CJifV6MI*-_@01U@9q04X8A~%E%0jUi znoGF>JMGtoU4m;sFZbr&X7olyA{r}HF6o$R+>U0t9EtxakNv z`Dbni5%=>g4eKf7)IT0m1Q6Lz8?i0gaJiFb23Sij5ex=Q`MA9>k&p+p^#I?zZ5;(V z%M%J(J$--&Gq@KASEgmyZ1Ils9%sm54hwxe)FVs_at|KjTN+g~Btx!U&8*#8e)JGe zIl{4MT^Uw-K0J*|1(~2h*EikINL@mOg9|XO^(2(M?WD;WQCRxd7htKN$E;?Fj0Dr8 zLsJoJe#(_DrJYfEU_U#^H#e*&!JqWKHD~YT=c1){iMKYrwrSIA4Ld8Isu$`UwTY@v z)R3wBS~{qW;|VfxlH1no$c==j8P22C74lFQw8$V&x8_|Zv87Zr@WZuqB^Bpgx#GX+ z{`4)Li&>QYU-?ix!!Z_9Oy`cLEbOpIZ)h;8u78YMK2DSSj2A#}evJC6e5q0b*qTyy z*pmy5xs6G1l*5^D`46*2-DE`DsCJ zPOvTC3ucFJU$Cwn8qg?Yf>Rm!o zr|AK1Xwr$47G}ZV4w3ZNac5CKCW~p_UjFUZxdBc0HH)-hw(L~W3Ij1OJHqF)Bf@0d z;vlXk@as1`Wp32j%U?Kj`8l{ieG7WYKflSH+iZ>}5qvm1JkZBm`bvQz9nn3BAFCge zQwRHOia=O+r6$KE>5Fvon0AkMFbO9NF}=K07Uvrc)d;Ig6}zt*u%8 zTKVK;3N9(%x4A3Nv|8W)_6Dm}K7Pe5qZ;z)TQp(v>F-K*3dUaQOWV_lyaTQ&q#I}L zX)8naJ|o#F-asT8Z?BYj`yl!FGiNe9-ugXy?LM}3<=U<77lWS3*sLXK8r07lIof<1 z`P%omriS$-V*E;Kxr)c_KcHsFl38#JIFj~sA4+3*5vOX^+D!?8T=6@u{cJ&}TXQIH z_$~>(n*P5t&QkBx!jHK64oBL|2hu)xe-aG!0tG!NZ{o@Dlylq3!$0C0+BSZL9Ji%K za|Rb}J1$?3NH|AP$eir;FxXH(6+4d>L}goG}hs;BBwmCfaS zPrZDpW|v`+*4CE&O7@B9sE-L`#GJ)2JeJjE$j5(;t*d%WG~|~3e= z>nZA^3M``fx?*0|O|scBn>aheTgUjxnJg(j&-H9u_mpT1fA67Y<*xGYo`+b)C{QX~ z5v#KAef&G7JTX_00eD#zcs13NaN!E$S} zk%OLn^<3`CRV5lfph@!-JNp4#ELZSJj~ri%A5P! zHl~u(om2nbr1~sZ+oZX!=BJfH^_IFDYyZ1GAX_YAuy^r`I%uw!N}lm-!d=WD_u#O5 zN=S{S=rPq!CSKqgx2>a)sg@^Tk9*Iuq2jy0fCO_c8X&>sdy!>`=^tl;nRq;$HcZdu z;bH$f6sVi(`Q|1yjTmp7y}bNVJv88M=i)^xZS;xGaGo16+iWJS7#SWQcl{k_=I82g zFHn)lD-WOAf9v_Bu5!m#+KOvYk5=Tn(74YDuKcVwR_>HANa%0vS|w)n`05h zqm=F>^`=lDIudmyO_5}dBGPCxmsQi7(|Qs)KK1*9kBPP&rc-msoTd!rbbzgCG`k77%`epADt+Rs&9Qr%F07`Mgi>u#df zus9~~qD3=4BUikb9Gp%tY|xI}wBd=Ae>h5vt+?nFcY`O?G;-v1PtV<7+RZCRUJ<)A6>HUpJT-8|g!^qmLZXpslAmaTQrlffKId9CBF^A;H=%9+rC7BI-gY zBe%@*mMB-6H)rx%&h8JUr zOAC*9autmlZZNP{(a`fPl*5J>`@vzdHE7POwfBnwOWu~z@(}=Kq$NAA9gM0XVa2|8 zN%^hq@`d{H6&{_RV62gxUN6l0hDO){dHda>;deBwr;x?_uYrxgc5Zd~Sq<-BX06Dk z+LI`VCD!~@6RCS^y`Q4IsqG8*(ouXvp0UY+@YK-Qe345Gj=~?5CQs}6{f(-pN$ZInUGm#MoC#KBC z=_x(!LmPScBEG3fO(VwkT^Eo;e>k+Gyz^puO?NGhtPG}TONc4nh{%9s$|X$C%BGNG z`}iGAZy+sK3F|2TVIN(5`yvgPm(3Wcc@q?o2W&PT?iU>cS$R%&=rAWL5?QpMw%1b> z1D@CMk_FJa(w&gqXiM>yVdOQMAJ4cDzb~m7mkJQUDw-0%e|Phi^1B7zOXp`bt3W83 zm@#sGE|bttrc6a`MDEYw%OF40G;pKq0D1J0{kUsJFY zBm5p}hzp=WnKAWqzLq@A2#VDEGIK4;nFpDiYD0zeO?Vy=J858`mN&AtsBL zkS-+5vNHp2ex9*~rjvp^gYU;l)~KQpcbEUdP|4z6yb|rmrZ%sbn;c*e zZ`x-=W-qe^RXQBt^7q*=gK8Q~gNF~2Yrb;XPV%aaSCHj99Q@wyp~W$Y$ zs6#^E(SCg@9FQzREhOE~Z*NqQ$nhCH%%4Z}9p$g}V}PB*i*JH3mx14XVJoAbcO)nD z6QO`l=GQ+ALPn?vn!vMAI~s)6yOB{&IT~h$c)-#ZX`wV(_=%z6QGvCL!OQ8m=xHHZhz{bG8YaX?kWV*cW2SYZktz zN&OggsE*spZyw+W6bZIzY*WM5`ki&>)Uun#YHqKxR@_I?xL1&%li$`bJi&*DSaFsS z2M{krreKgGPx<(2@@^-3yPk@;g~tdg%st8igBEe~z|#((O3nZ+pyma@BAN>LQR>qZ z;K?gtEbDLFd{f)Tuh1GnjI7DOX_P+`p!UI0o~rV2JSnPt&|1P z20LHpL045IR1#&D%@|G}A3!}#t%D7qpAK!$cnj5@9G?oAJ z?{DeH=K0O%934N_v5fctm@Z4Pwf2&c4d#59ltcmLlS;%l#`o;lh)7Ncr{K7etAGai z<~H0208K^_P#|=H#Bcz$8}R!G^M0&QFv#y{-SCC7<{3R!XUA21GpfiXFwQ7SqFVF7 zJ7@7{!44!Fx$tTpmK)^FTD4JZ_-^^WmzRzyu#<+X`7IrQha_R1!WAW(3#85Y;D9?9 z^f)rK#r>@tQpw8?9$rS8{NpfRxBc}^n_h3&SXAZ%dqFlBaW zTNiy=+c1+J&?4k*)DjIS91)&3X-C^k}f5^-)hYmby!S=aw5iwE< zx^>WQ953;Pn141u!HvxeF|znDc=SLByrZHaGUisv`p{K=dx#&?oOzSfM4*Rkv`J*+ zK`g@Kw(eVuQ{#hl>-P?p2JAygSHL&fpG!~&3+=?$;?Nq`lVtzOzos2AoR>V;RDH1HKeaslm7u}xH0NevvzNh((kB!x5*~{O}@@@oXO{Qn& z8Fr$7!f5FaMTcWVHx3b|ehe`5TW#fs#`!^wZnJsQ_KFuYTTg7Qtcz@Ue9QjY8#lku zcum7u+ul<1(VFV&Sk>cI`zvp(f3D&M>HlWUM;jj76r(KFTUq~HWtlN~cS#7wy_F4* zY3`i5rc!f=qP-h6RY$syTtsqrjrVYd!(o9F^ja;`%V`BeFE6lSZ#b;e_Qp6t7dCK_ zh%PKJI!0unTkCa)bXvlEVqo{VoPps)JtH2{BNYk|nY@-?`AaU8O+``@b2Ipkj(+DL z6VY>F9TScBvb-4XMT~O1*B}a^UR_MfMYJ(3AJvCezQUl!XpdHWKgUbQlva#Pz*lRvYS#MdJFH5aS~l=JJPhhC>EM8IFzt*nZ7- z)_ipBcLeD>yzVd;im}KpDE5YcIm34%(cVyu$6v*$J{Cf54+CPlm1)!I4+(nyPG+A* zv+G>$Kl~EE{G||XxO`aPds&8!_3~Psp;vFfh-C{;8{N z#L6QQ562=LYI}t+S;&tAW(a9}4FtZa99)&4H?vP&4-pRP=!2YxE9F&)eKOADf;SmNbXW+0@Q8t9(Xbrt+KOAPl zTAkLgvYSNa5Z&M;^vUsE&kWj?HAZff|WenOwdOi1{(>M+Cw(HjSty_;Z{a?Et=SW{+`NKL9EX`sB zLO6u4@DaXOAJ^l*Vo`zDhxCYGTN#U>Kg5xfKl;}m`i-9DfdJUEI!CMD=sI%tmLo0a zlc~GL&%$>M$X&$5Li%2yBed9}*sO-AA=Vpbc%BV0G2}yyFVC5PElL*2A9w!;V}U?l zWo82%)w$X*AC6PerVX=L`cNbU76W5zqX^lL#qsUf%F^qFL)bbmcUAsB2vV)QLgHZo z1>6xy%k?rL5$A%I5BG+2;W&1XP76T*v7=qxq|70aXULJy-X`zS6+T!eR9C03`v}S2 zHGY7nqCm^Vk*KgY6yop|9w&ssV2Jcac|$~uMmSwekF}RiAD#9P$~@j_^i?XN;Ox~^ zS|htxK7-V8o20_;s9o26q*rDN;jlIy=GkyW*URX_V1*Esb6Q5*tLNiPM5mAI;^N9; ziTXo^TXk>SBW=)y)z57t2xzLh>ou2XDxa>rABFMqm4V8O8!D=Ash+F$R~xFks{V;$ zdZ)H+um4lSRVY;OInB50Z>zty;k%7ruD^QQ&+D(KKT8v=_(*-#)?aM>YVDm{Khf}q zt?%ACvDLMes~D>6uDVgPaBIZ{TU#3*touvd4;%K@eZJy#)GJufe0H0*v8gUp@z%Qj zy8VrBuiL!k#Vy~cI#Kz1&C6Rpz2(@JsV$>hge~n=+bW)|XlP8={;leKlnDG{?UCBZ zw*Rd)*B+>{Hk2A|+p@J=suG)j({S15Z&oBXe`fRX%`=<5n{}Ia*1Wduoi#tL`O^Nz z=V}%kKG68Fnxi$bZTHj+G#=XKs5!T0tLBo5|Ed11rcnK@>XRC>@1$vGMa8pZ-_@Tw zYXK35X#}x&hG6WsBY4G^a-=hb)|p+EmsZ$4MwDE(b9R#vp&kjOgM+f~52km#L#Fz0 ztFl1bMh(&usvr+|^U&1`J2;tYhLggbb)?}!pwWA!NHJ)NX4=MOss+I;@ZK(zfPMEv zRZl0AcKmzC9*H~N z?Jk*WhqoGUc!JrW3E=pW3*9p2Tb`1s_$WFY@DC+}CU<(l?(xF4VM(@}QphO0k`V9| zfb$52#uwmC&9r<_rnikqEVz){@fDfugCEC=Lay1Qqhw_Qo+Pe(bPS*q9%Bhed13o^6e=Ht2j6aTWP^SbN$^Bi6z=A> zKT!qpLItgP8}OJ54qE$mz+OPD8eBGq(mPYqud%3z{bVp)`2G?6NUwILp;TwHLgnpj zFoOcOz`i3E$V6*%yOUKvQK%@&8_@-wuwb}N!O20*{7#IWod1C=!dkotFHcusEFQcDD5qnd+h$W)X#em{{s} zOS@3c*OKhIOs0bA{Q+<$E%a+gBt;)(^L*DiGS!OBHiX$WYJ(=Qk|)9}*uh<0bS1D5 z0S=jZaUl<;0%@1jM>|49I)1BAsk<+0&mkNF^@AxNVT`%P2Nfzh>PVr`I1mviV2pqZ z+^N}0c}u_+VrS8De9$pqFG{n9s;!MT?plyPjEO`%N*X)Pl;PlB!?uku?T3`6wTR)! zz$B4Eso^3*eNpJwlG*vVO!ZNIL&;w(L(sE~AaSX|r-kR$;VpN0rSLFz5H zDdfB(4Zg;NI#68M?#JHDxr&tqg~|cxK}U>;nFw|r_6!EGwO66i;>;8p1L>8`qSKhU zp_JyQGSv;|GPS?h8SKTvh-m@6_XG+R$7M3?RUT|$SghdS#hRG~$js~(rD<2mQHtOV zAJ*AhgpAT+snV4;<+oH~QCk23h;LO$8^6<&qP2XlzY@mnDS0@!fq zgvTs2{qG9Z6Dffq5fwu>dj=xZk!n6FQ!#$@2a}DBlk-vWkU>X^o8G4Um`Y=aBPufy zatNLcc=}Rx4uwiNnsW>w0?V0DdK_s7CUL}%V=oP^Hd$G_ zX((C$iRIr?R)rkI8Ro)KVk}}#vsHhWsfgpu!Axa>OdJRl7l2=axXEa@pHO~`%GqWt z1RbeSK$I7(m;tt4nM_9#BgFb5Z4Yt-*i9J$M?$XtWAbmo<4E`h0iL&)qB%zzAIe#a zTTUxfmhKY=mWXaaM+rx)C$f;Qc#}fL&cqR4asWPL#fjf(nM+EG0oFEjC0CD?1g$iMX^P8p85?tWN>4$DLcoZtw9LEoI z6uV~uk_#deBhPPBq#hkDPBW7Q?9+!`8q5Yfj%>vW)q&%NhLG8FW(H?K3ConLKyhcP zubH7!(E97He9(g(Zo=UWO{QkQLWN>vhG>IEMiFyhU;6^grp==YnE~@~mx6zEU&=Babv$IIT(xu42IB zMs&Fs6^|g|ph8tXtdOw=krI`^FmNOJg;fY*#y5XiqEanx0JA&*P0)ijN_I?`m8~CB zsMw=WP63yJWP^s{hHx=z>kP|Os2fn#pkprhalYiRY<^36n{t#xaDyEHZb1f4%&8{< zagbn|6n%_Z?x6*yso-;GA#LF-2&QWPDK`!Ii<1hfIL;&^X4?hfX~|W{D(FB!fHqu& zURl79@J)AS0ivz6UGA3$yJ&#Q6Ufta5N8bSfSv0)A~o&t=B4ZxtQ8W;4&8SM=d~r( z8JDTp!*~LLiS2?Qc)C=qOXzx4rn*X~`HA`TflabdiTa@AMsuAWS^t0v4q1xbM9ub) z$28AK$&u<*_!5Gl6oJ<1OJfI0yy@^;lAZEVPSqd}PE=D89kwKqn*_2e!teZtJRiOc zI))Di1nJzx7aW+^UEh+sWiBoRrA_Vv85831BAnkS?7CR#H9hE|>1UwEMjv??gYpcu%WqVAFyP*WAbnN zQfLq7wIv0JDild*{*X`I%8;PT;=+Op4}=TEscC`g0>NzSocv>)pj5-~n-LHUxy%N^ zzt&=_A_6d#RKKLhxZjt<*pfJnGrM=mzm?<;eCT^ce_kQ$`}^=3~Dp3 zH&BD25_r6Y&V_m9!weN#kT(!*nLJLDEJmU2cuArTP@NJ&4{yL{hmk`Tr~8sS-z@(Y z&EnLumy#LG2@ZKIq{*n=d7TWZcWtV;yCDrP;|-f!wJ#!``(M=Tu>3#L`{=@jUB~vV zVg@~WqcDK7!sCNltv1AveRFVw+%QSOGwVp?>3#26_Bi^c`Ky{$u9{^x&JU)~;Kl)J zaRmOb&&={cAepHOjq}7T}BkENO|yjS@8{q*2_-mzan-+j2ikF|lxAm8lRd|)ehRiO?; zB$GXJe0vY7jcV71Kb_&-&@-|B6N@K1DqD~3t-bU{+TC_28ATj7kQi3z$UX#=XTUcB zg!5C!)I%k{xpl)gh-T(KCHnhknTui8tfGtAm+PjNE!3U$fo3siCv#XZ4q9 z%$1dO*VMkd=HW7RB1srBnsQFYkcm?P-wZN}>takc%awd_a^vlAnyDTW*K7qKO)qJ8 zlFPShFD6$^GsrvlH_iLVT|VI;skwvSg=7jDxCJ$myEC8fpA@45BmUuWcAkkMYu_i} z%b(4CRR+)68KETx?qnlV_4 z6En%7EGxG%a|^bqibST&2*yN~iO%wOZ=ryZ;9_>g(>X^==CO=ZEM>;}MfVhf?&!?i zbuV8<9=Q$9VATsGo?>y^D`GtzXFH zHGaok8?SNsslE2MYDj2_54Ka?6Bhw`&xXbWpFY(gJZ7>uC7=q)65rCg;Ty!|y<-ic zVDrB7fli2E)3*S}ti??n`-$4HjL3C^^UH76lE*(n1>uHNa(r;6t$f4JF1S{6Pz+5^ z0_||#GTH$qI*3(hrBF(s&`@0-r)NS-uFwb_XCv$8D$ZczSIOy5Ot-CqA2ySB-2=1% znt(cre2KEwfFl}k2pmIFvwJyaO)k$3UM(+N^p5vwNZ}Lw_I8A7;KahI1+|J=I&o71 z#2Iqr6MRqWhD6dl$^&No$ur9RBcJ4#npNDl%$@_E0xn8LlQ?r3Yke<|7!oKPz`VoA zWrhw*6;7zuesf`k!?(9>{0bl`r`kx<=0M^9O6o%;y(HIe*rd4uv6TLX3#zwOUQ+XH z?SE5jY!dN#`o#(CS2=Pd#TUm4zG(koX~yIn%EzVsx?9Kd+?rYLU;h?)<<)ns;+6j; z%eLHYkZtzGS+p#J_#BzS;EdKg9Sr(BgMv-MU9^yfGWdQyiM$eT-+$|sLRWdR4BSL> zadKKW#f{94yS)C$OhAhwKJ-j_{&SEaDjFgxKdAtmjSo?1rDGAfv6K#s6_YMIYnkhd z4tTAW$$8}Hco;I|k_UjQQ_~QL_oqwCw?6=!Zs+`pFvBU7vzjf|sRD}3&K2Q=qYWhP z$11BxfQ~%gQ@-zh{%TDp&6+3!!V<1R){z)57{`YL&Y3~!_cW{)f@eL67$53Fs)+A| zyUJgB1gJ`+`CUZDLAv@KHe_jq<5Bo^#wq| zx~9>JEZ;|+{nJR#J>Tamm<+|~X=y=v8dZr*`&#!`E0Z0N0f zd+q&|7i;45jC4r-yndyhsmT=JX@#V~d$8h(er3Ybk72%4G_v^0rw))C-p_TGzxf!1 zKSE)zTbZ_OUi6L``ZJ~eB67ebW$4poj{}vro}9-rr@ z*_p{PHk*rUqw?Zi^&}92DjH!nAJ{J=wZHfzxM=rL`y%qbDG))yHZsOB1Eo;VnGV{m z7DjG}oW$&_Xyo`2q}|%{Wz?qn^GP(+h17ORccQ-hXqGP&CSsE)p3pxI06*oW?Oy>i zs%b>?$8Gz`Wcm79()6Lrca-P8LbpY@G@YJcxk-Ie7t@V0F~rBy7Jl(n%&v+?7B4{R zEh*60@-=$2jw~YgoWhjD1y`iRS_(0}Q|E}~bkg=}A@6ts?Wkzv^zBX1!k^%;qD{~Y zi3-X)tE!SJccuJw+LiS*^2$3Ag7D~*$UFV}C&bor`!}#q3VOe|sqP*1Z>p}ZeLz#J zdA31YsiP7qg!#W{iDu!FH7}1_$4@hJhB+pQoMVQPvJ2;bhmWaf$WizXpn)&p+sWY{ zXOV5}_xxvM>Gbp8^WE4~OEgQE3~dcN3NAAr87=9Dn6dawil?`M7INfyid0w8u&d^f zbmwb>UF8>^NB_H>OGsO`ysxy;EdKY$>}l-(o#o+(pbolPT8QwQJy{V z653MHh~}a9C^6~Pzom0*TdGDoGCq1j>k0RtP~k+q&grap+|%~EQHr~XJMf2K5?G_VPe(^`so-9t8ooBCdbv{BJW^9!G$n{zpK z{KTtNQj9EZUOjeFS(A;i#ioWP$MYisdHSyiJ^R#Y^uoH1LQd7bfR<>c@W$tGa&>K8 z;ie=P9`!JjC=!r$B?3`V>CX#)1v98=*fq(6W$oYixTZPap7hVMZr3mhUg^9kBLH=D zS3LZ8%(RL|PVVESWFE-D_Zo%X4=>RaOENqgbr(WTCfKLf7eeqkAr-sSPTOD5j*2Fy zUw3YPe-)ByL)iU=g3w2nRg=@%dIYwBgTy78w&`-|Di%gHA%{O*5*?_o>x!l2VHX;N z?G5Wm3tg@v5!}Gkf%azRpkdYf(My)yv1?k(v35$-aJ3$i7IP)s8VQY zRMC*z+_eUlUOrYS(0G-l#udhz4Vax#M$DUM1?Py~z-8qTe)ttEtcpga40rD*zkgcX zRo480N`~-K8`_aCQ=__pFra5chDdf`tZz2VlP7D0o+kBUD8*J=*|}LjwgH3F@9yKQ zQKNZgbSyJr&XCX6;wS3IUV$#wO@fj2(I)z9|eHeo=s zLx#g#wyE*Cid5s58$Z_g_KJUzrl;H&)K>1Qcw7DVG!KxyFMnZ2m4;NDCXO5UJ!I;s z*IRej9?^WKHbP-36~nb#HveYxH#dJq^NI{cspuv5PTq{Az2?rUii(etCnj(1Bu{F+ zwe=KlQ_)x%sCcaM;#))K?WIXA_L9AioLjw+2B?IZ)BQlD!?y&liGa%oU-4JTx<{!n zIm2xYHy+R+aN&*kz3i5^OP&Q#VbRtG(^*);jWAKcCu8c%$i5N^4WVALv=J<8;Aa>ZNnwMfci8~#JG*O(Or=gq7)JpBfs?nm0JJ&} zKb^Mwl+rYA(r}PacRAdLhY}2*?e5ZsrB1>sK<_g1=_qh=cC|AEZ7^yUE3O z{ZRfeCKHY)V07THqHZN0Ix>{&`liw?>NH5fZvhy;8HgUd!P@z*&&gDp)f>Nur+fsS zVYuqFG)rQa)zR2fi10LI;N6$-{J~qsf-Xlx_h(1aB9N!0>l!@fpA|GTQcQ z6)Nx&)P)OET*-y&a~4RCfYAQ-Wh$H_y$?5KTP-(Jb~%% zOVc&${DnfMZXMok0+a`ye2S3?A^~yRdzYz*y_S5XfG@!R0N(UularO2LPus^IVU?WSa;|7Ha*aG|wCh$8&zQ7octQE-`*?9yQ1_iIsG?l=^=VJl)k!$rM)lR^c@ zP#HiSt=KOpbxz%YjgQJyBODwV_$h|K)b1n&k^wPN(0p*2itizjD-Zy1Gb5WT&2AlF zx5`MeG#~@8!31geeF+UffKbV`Rj2$I+sFzb0&rW-3(pl&@?-Q>N~eu*fI)u1p$Lx) zU~n{a-(ISzQ+_J|_XLPa0zwn0pqzC9k}H_qB0GT6Ml?sU4k)64V0&~RM~y&TS1kV+ z$?vfZsq+$!95?~MiiP%%Dpa_5tVK{Et>Gnx#}(~x4bLf5xZ7!ogCLd&J{)XP3hC;+ zd0~|dualHz1aJyid3@j#2JOnvQOL}T!4IrFvTu_V}q7lfb{e79Zx7fhI$B%nkn*2g7O$}VE?6)cy4FX4Pb2Pto$TiPa{@>|&X z0N-F2DDs7R;ou=Fxl`MJtdNrs!mz@@e~4*51UW zZn<2c0?vlaz-f#Yjx=DOa6n}i$RhEl?C@U;`+Ez=CO~=U+5e`RQdUR-K;D zz=BYJJxyK=1m;$GAA^K71%k&5CqISHA=f*Q9-C#!1t0?L7P^EDX9d0m5G%;~7PH(m zCLdl&3My~_oG4@dtjzZQ6)L>=@H|7x&|QTr62OAB-6T=rfk!ABfU2l$0Y)i}06qf* zSE=K;q+x(+m(K49n2MT2q0g4w=^3SEctRn}Azd(V^czqRk0rbLafOO~N_Qa8o)8X@ zS=7tS)!UY-03)PF7Np_OT*+{&0dTN&k3t4$&7}onV@|1Yo$`ve(D;RAD&`PO?F9+| zAW0md)IGONQ3Eh_bUI6zEWn-sF{1wBQr#`eZw2f`K*7MzrAz_(2jmZ4Xj=X;g>zw_ zQM?sh<^=F{R&DEtl^=5ulJF8^`vMLIS3UfI?sTIpAfTARuMKb%^gUz!J+R#q2Y?_6*9U(E#MReNo8^pQ)e$Vyla^XPy*mE@NExJV>`}j zlUdvP6PbzyC_#T20EUF(hM_)Cgi4)!azPOU*Wyf~#{`4~gag$UJEhYY2uxbrBLbWe zl?>=H9LYG~ip{dLrH~W}8i(TxU=27Buq(~^mK&50<3Izq(sLFWN-%TqfP4A&A1zbC zX_(I-6a~1cDVz+p^cqEcU| z=hx(>>A3{WB4@@)N)P)4IuPKiUs9;pg@9pDXg9@brJ+KgTXlCYQz>>0IxSjUpc-KY zFtvoXPKHGQ<^%`@#4}hQ9e_Ro`4i1HJ*)f}N((*qAdzTQ6zG{y?6e(Tg-X%7RGR^C z1tJeN3o5pDA>H&TrVT7p0l?xPibSPA4;J~f|vxU{f$Dsxz zp?gPWnTjr98$xFRYzq1d5PJ!s`8zAr1rISUnb? za!fl=bjenO@?-D@6eg&@((!=Z4Av`Fw<%NsSQI{ zKh_)PEl_5eZL<0bA%`u93AF&M=%yMqgkGZ9Dl5j&RRAx+x?1oXx{^R71OMN=Lus0U zJ`1ej5Y!`RCZ$e?8d+P_094(_6t=zs0K9T+`AA0mp7ixB0ytJAdxt}-r=eR&N zn=3k^!*0|T_{Kq@r&0A-t}wBh7FqJ&+s}g~;i4s)U01eEk2szB5}y=|Q?amz4VvLo z=|n2J0|$i0Miq^m9-4r`=Mug{ZJR!R5UmE65bdsHD)V}>@i60$vf-qgnaUJ-Wd9c0 zNcwD{sYy*EM)L)im%nzlFb2n&0hyDy*r0!~=<*NbO;NJ9RcIvx`vo}8*3-x2+iBp5hywWP2A4bmw$MH;L|j@bRKtz9f}Jx+Sy#d zHBUmkD*9KTitb=MrwaiL#keR(8i4%O=g)5s?)3-de-`~FR)QaURj&|IjA)nqMT#0%()G~lFS+JJi zG!vjE;41GzJ)BlyKeCc-L`6D;`Adn`KiWj@X%)@@*SWP#xV3Zm7+2f-_WghfwDzx? zTxr%1Y%t;Fz2EP-9<_QpgkY-|u-XJJk5HXiSbTs<$Hj{<`>`4J?i89^HlV}zpJ)GV z1vBc-Cf9We+uCw800W1miH5D<@|~llIgmAcJ6PhuPN8|nMlX<;+roBouuC{os)-|A z!qOSo#nLV8*pO3}z4^O^KpXDpP>wl>CVJoGaRH*%8``V(a}0>$T;oN@W%G^iB8%GD z|Jf|Ssb5X1ofiytA45_?rT&vz97v*~=M7Tgfs;Fsv-DHEFoNe`8k_6jf^s` z@mY3g)HfI`#>f>8Oy`1DXlhi^2=kE&WFL}p0eVHbVF6btA3uj_W@-IPHY93B`rcJo#P3VI*$4qK0BX{wu zBD$!ek(1eHmw|O3(hL3$D2&j~a4Ersoa*S*Muv#2ByFPOEL2ij#iwleDoRO({?81i zGIw4?Cn5*sI8C9$xNQQpin}(z#29j$Dj6P)W>X zX*zTX=0HWG(ll9iw)Y~}?XJs&u@1xx2+(7p2gB5f8x2%tiWM(O0=Y-f3gWtKARE3+ zG@mlP`#%DmL^oCLYdA|2t^H_S5p`~<~DH0`o?n73G+Nj9$UPfkx5M#oLGhdapL0imVo4WuKEUtLx{G9Vzun`4RQ zjhFE+qH|=<%^`Z<%l4VZvVBN~ei8P>wfzwFDjIpk*S^1uN+DMw@zfGctuMQ)<^f)r zWiz-JWwQF&{yDh5FT(cx#t;+%HBBnoRBjrU+n{OiwW51-<5e!Wd_hXn7i(#Bs0 z(T19aJouGBj|4`#%K@uEb3rZ9jPvr8%$IVb5k|1UByX_0%pqt6bUb!5#-pNAVD&kZfMbqpI4p@`mo&a4#!RJcr=cY>#e2ErPMylXW-N{H%IwrJ#w*oYj5Q zzH|s)GI`Pqld(xta)yltgXTaAyDyFT8Xpya^jk+E$6G!p)%pPbWK@6ySMa-rIJRib znx^vNxMv_kG=8CVACL4NYhi5t>i0TgWg@kY{W5wpR707sj1 zi6$bK*B^=`)6Yx@Zr0%v2m0p$e!B>|&`npt`=_FjMeZUQ`$L+R4z-nkca=b~BTMJ4 z3}`f{_sw$J5g`_zN(Dxykob`{_D~Rwsc2-8_3wZ1N`XR0mJY78;ByBOeZ13Qi<;&p zilKjrMvlJ@XyoMW|Jy_E<7`{x%!gb0Fi8pqC4yq^b^leVuSF?$lzWO)*Om7*I{JWZE3#hW*Hs(1t-@9D}%0k!X=jxlX{HG4#00v4s4?3Ns}0gEO=C$-FRw z+#k+#Xd9rCFNgp$Fpg&LPfZ@wh}?IASTFP##@{L^I~?!(zr=Ag2c*GapC`Ee-1_gem_I_DtnaE75+E zt17o;=*Dp`Y0)b=Uz~w0CdaukU1ly8amS}cxv8thF+ddwsmX)`nY^O{(U`bifX;)!W=1_wg3T!47ex3WeYT8Y0a|~f|8Jq z#*6VK`9?WDnhxe?eCdLA#MNgNl%<`+^`&7w35dnr=r1xBl21RvG?BYr{Ov`gaY49G z0X!`T-N;+IbjixnY@9Q=x~Tm`qps#ThixZC|2!UuB$4gzfJeXYx*0 zaKe*GBu3@={OlC^q9OqbHwT~%z#$J#C9KROzT%=lEe++@;75=(pQ{Cap`kIGoZ_->+^=w0D zJx347bC74*w$zV=hw=d#Ncj7#v-2h|Ts{Lvlz+SyllJo4g_ioY6cTFw_5t!Ts=ScV zcL=Y^EH(2^C|k~@)qJsq8K!9Ee1d+?#v}`QlzTyIZF`U~$*`t2K)>oWsr1WAIhs~- z>OI2i3eO%B0Mhd=(e$=&mf$pgojq7$iy2O@>o29o4F+=I9k^2Nd7IGCsG^aR%p^dQ zLSJY3&2JNctB@=$Cmd<4bn`$vH-Q_24R461^P@rUWkr5=sCTEeCeH7Hx&uT>m>)IM3iLD zyM%wr9W>q~P3q-nPZl*}qf^LmFzvNEMgo&DJ{hMy>}gazCP$w69(d{8fiAN7I^iF3 zTL-U4TahK2jaN<`*-e-!Di;n{6qJE5>gS=~BJPNQ-Q*kVZ@;$*& z+!GiM#8K^G-;Kh7X7$rJ(fn|?t^Cm&1+(VXn}ujI8;SUJ?7S`;oSTY_IUGn$_c6@d zJ8#BmtfFBz4liFMuX!)*8ZcmP7z|3AXeYmZuh7u8@heE37*mo-25&jz4gdaIaD$rb zH!=O3ZG3jj7nus@imcqfH@^@4Q_;wghCeLdB1dk;4GP!pYi{UK|22fLJMlsQ)mYq3?-m6;26fO5oT(ng73n9)rPMU?T3qNqfbb~9cUG{boer1AAy?=`Bh-NMg$5H zj?h;3w{1)%i}5a0R=q<2`fhMjLwCKt>IZdKX$ET^tgNnmClzj5>F^w0IXq``Txibh zE4k)$@LGlo?w zOTX$hX|K^+URU|spA!6YATd zH#RVuMCHYlxkjK%I+tiRX<0B^Z3*7Y8B2w+p~O@ufKulFdQfQHi^C3y{j>?! z(kPmc6$jHGn;hlXu(5w;-ZV8al9al&55=WLhFjAu^?T&$qywkhUoLDf_di7SA;&-x zK32Qkk(e2Xj89t(QbVNtFc?%tBd2cP4}B`D`7Fp`OmTYbao~2ZH>lEO4)W z1h@J16w-X|rRT`yx4-lVIFnuiXo_{Y6<2)3Imfd+aH})Pey&gH(7V0>>zRrM7459G zH{f4?0i)|4Uh<$Z8QAQcwWcQc(b+-cjBV7<@{%~%!y&`vT9rrj7CCuWOuET-mM6-q zH-hx0+6Nn$`YY?+sYzEiRbE>29OXN=)P0&eTkig_EoIhoC8K-HH((gxLpt)zS8<4| zACsqDSqakLPIh1Uij_S2OUHS)&TQF68fvb(3x%@)gdP97q`SOnMH#XN@?5_!nYHEE zq1cQiMYNAYUao&iPJjJ;dZpc2{>bC9iHjz@mX*noXlN3(&8(b}HRb&MQ6x-$9H;)y zuVATFG~#OCEM2d<%f+tlC5Jgj<; zgkCugwDJjr+kE>mddF}s`7t(mUxem@eFbh>AGSG0weguL;&>9KpbwnHqN_+`@jFkT zdh8Q?cloa;>0R5tL^HF?`n_S?7dLahpu@wu3+BX}f!y`>KXa^y)uG5sh&+w~3j z!kVoy6ticLHH;4obJJ#2-Yq^M>~B;(maFbA2l}*@Uw#4`vB@PE-2pLNw8X|3cz1c) z^PWc4Q*z|851$LYlxr_P_9R4EQ|;#)4%NN8xn&qJ8RVSpSqXzjz-s=bitx zSq`3=`#$ZGV~OUVmbuy*X5CRHmCQ}>C6l$lB;_vMc}i$%Qq#!ko8An8v0}>j=P4=< z9ZNJ{vfP?eJLf>j-8qjbIz1gs6hxV~b%F@?UL&7X@1c%BMu}s2`6n1>*YHvda#3c= zem3iix!8Gk4z)R)MLNv3-8zvK);Ki!*S|#e&D5SlaH;PqFFu3z(8p_5`WQB$HWp(| zCiro?!#@tSk?!L?NH=NV*EYHSJ#vltR|kkxzvI!L$x2%7ow#?J>!vEZYQCWvta@2i z(x^Dj;bXEqbB^bVI&Rcv$;@f3Ia9xID{feObOx;>C_~0`sp@ID=xO>;a}2e@Gp&{odron z3z+N{&|}VT0H~(x-)nCN+(OTtB*`{N>XEd>hUs1gOZZ(Hl9| zV$c{hrMaO@UwqQ!%q0)Un~^(090tDOwlcH<}9z5K1Ja0)CS`eZ2@{ zc!k)~y5SqRtUk1y#lGn!v6|Sb#I3lp0Z!_nA?e8Yf*N5!!T{kMfqlOQ{PMOcaU1S! z8@+cb^6{5NSy~(&}u6+@}hmjo&8D@eK z<{xFy02Pzlxw1~&-n!u{x|%h%HTO8aYz=%}dJLc8V~9JC|tu zy1bF~$d&JBT@G%5XAHW8n=B5AJ4kgans@{0bW0V?{JPF^qE&=09}D?8J)73W^Qn>I zTxm#She?-Y9)2iHGF zT`r52?7g_5ru<5$=+ZP#q~`}Gc|;HP!Q9k070Qs&Zn39H{a6mtdZt?(Ky`toNqkkd zSfTb?Xp{-XT%x6~$WJ*lM86w9S3jmdca%TB8`F*)9ZM4{y>=T1Q6ogFEsg*d&JDR4 z;(iI@M*Wza`s=m!@-r_%R>{?YHMj%bheGFxhTi(InxEF)SY2lJJ%Boy;E<8sM~9ba z{Iq-nh&qQIVRkTCm>&|ki4mCSrKOD>!rZE8vW@<}qpl9}K^1@DLa}Q% z%=0u}T^9XOF7I=)31gVcOwXBub0N9eTP_f{H>zkr4&1Qzmhz_yM4SPxrPWA$J~Hpq zbJ;l;pz2Y*%c!jX_}OAh!+ILgoO^SR9Q*#%*^~oEmabj79}E|ZiHYQ(eRNh3=1NG! zAdR&BfY`Ea9f@c@^j5e%Xzk|W0TFs4jh>g!=2`EoZj$pb{u!r>nHmHz!0(0USl*fWX?=H(F6 zRQ}k0G=<4|^GcV-2ghS}#vjNRQjX&ESUe)P^_zp}l8Q!78Cl6#w6<`X<6OGMtXVzw zM{ZI-+&95E#+N7O(eu!XiY8~Nkgm&ToiARo%yKcf9yKv|v+L{LhREcTmBiTjoW2Z> zYlB^5uKbq=Hp6QgszK48={Pp#zcxu^|6B~VJ7jtq2{ z?-D4VJ5JCP1M=Prjj{a`{Op`=ct$@o8a5HvA=TT{Ml{ zWuY`Kkka0}Z66qZJ!$hYVWUmEAqcQSAS)7lST?!rj{+&i3W68 z-lL|ONWlXScepTZm~(sV%Aud@$4R56A<;?dTzda%Eq}8gTODJsTN(SPJ2jW!Mn^c0 zhw+SuCX`d}fgv=crje7+?!i55C5b`DFco5s6Wdl+Wh$A14J(({7qpZ5k>G$b1x7Pw zQbi++Hw;n--K$;Y6K2e0=T^+4ytdhC2QwSDGvi?)BER(pOBji^Wj5R8N95z|pN zTQP^bMo!SkarxGgHK(;{M)U{99r}V}1ejcDJ+5|OXlfcVK;4Yq(87jaa?nv>wrM!K zJlo@5v0!9J;@+ZmVA7YjlUH_t+1_D8hg2lMg8EkP;O*t#+R#{+{Y3rB;4DK^nR$en z+r#7f8PP`NLL1pJAfkw*iXzp?lkVWt1C-UACr}MrVcA?v$Q$`oI$v~o^Ew2rqnQIu zZ+NN+!05Mp)vYf7g+Xr=J{#FodmGT#BQ^h9c~;e{^;a}>(wm=-TCz?wugsxo#-tND zeW|ac6Q-vTI4sX$=xPjIMI%$sAUW8xZ=0ziSKxX=9=lrnhg|DUK0XhNT~tK2tZbLb z^q4I%uJ`%04!3U(hEyz1>mHU7SWaAX%U=H)HLSu0`jyK%$k|tlN~yWNtHiy#>?dfr zxZ(x<{*HxV3jH)obMBGr%Sziheiw(^boDH(xFFk%r~VePjcv0VD-w7*Bji zm@6g~N%&zSrdCBGNBX}dyVRw83;!@m=i`Ycv?VjB4_Qd`%&aLlrXTFLI$^PpSpBFA zZK-G&^F!y6XBob|{0nHznq9sVt!PKiSTHs;XqjNAM?A67WEdQpmaa$LdU5T7tbd7U zUi^KJl)#{Ty(^g>HiKL+}Xx0gTZ zg_fxB>Ap=3UG+lUh-P2yRL#e#eq8Z7<^GA;Tw%^^d7 zqMwPCMt#$a-4f( zNrOwaY>IDcxPRN>P4Rkd-3MzeHJ`3{qiQX035Z1>2?j*QD0%4Mx& zbWUt;+29TG?9e>-Z;|(x{aoC9&e7Imqbn&xX&kqd>H&$;ku)0#n2~7MlB4X?Mt(Cd zHnt(Mc!O8S>5GmaXXq2AW^#32>^lRH_<_8*v>}tVlj{rEE*mjfx#{~o@6ixfNkm>f z)S*Q3dxX#T(G30wkVi!agmKdD!9uVR6)`#6D1cz_>NE6dQMdg)M4E`VoPW$&d+Aa0 zPTl@p2yR3CFrqh2G;BRdgCSAk!3s!qNj%WHA&qD+Jo)%RPCqjdpUsD+V{dUDgFp7a zdTCb1|L4t3UVdoq4wAoKynL7S7(CVgwMS}3y?6i3zP^x*e17g2d3-@MHUnIHR_#5N zO!X#BwC>G-ZIdI}#;57!_u5@YttXJ=_QsfGB277%$iRrL=n`f|okMZdT006xOT0&H zZdgyEB}042g8NWA`SN>~kFC?kL=@8=KCy4blI^m@=3}#dam-vY^a&oRxjme~Fov}* z)%9Sh(~oMC&IoODf0Oz#Oodr!eP2Kx!|xrXmta7i z73DF3Bn7aq`}8*JtVxS38?=QM^4^$0)9 zFFna~`MG|lI5aViQqR)#cfSq7Mn#iqJrh96y8wrx%B<_eDwI2t9h_i!Hj(sMJo>R2 zK(M8DtT&<^6-|n%fQqEwRsO_{bY_AlDB6DO|4-SM2gp@bd3W`ePN&mL_MNb#Lxc|X zmU>GP0=4h^UM!*Zee2pwGz3IIP=X6rkpW_N1_fk@Eamngh<>Q!AaO=eVU&odpdt|! z7Y4p_>%H!zo*l>U&${QQJ3J8oZJ-~p{rt8Tu@E}MHm(79ev6u-oN4HdQ0?_wn zsko_Cih(Em9njl%J`25-(7;LLfEXTk;B#>K!R*bzDhTpXSy!qWsaTp+#*Afmp~d5U z4|uXip&bbgovr;5@B}t3K6VuIs%vgHv?IJ;(>c4jMAg#qbUoxLwKyK1T9J$<(APc+j~!`g=hz!NAY$tNk2Bqf zslejjC5*DbMDII%1|||OYxhSPJNoO#83+`D@MQoNf{1g7MFOlJ9LNpuuPyY%N11gy zScW(~++gX-fWh6_kGB7Mwc~%iw&4E0Y~lU}lLz2y0E|x?Ji15#g1{+}H2|yI-3H&e zota#JhAN;uDeprMeKoWSU4j_p8NT`n#9&19&>|vw?|KPKxei_VNoI1Xr4;XS;tnRT z-U`vr09TJQih!X72X5s6px%p=KY*w5BX@u?V#yllr9H8K7_Wt|@^fKM{0nme@K697 z0YJRn93$XC*F~0cqL;9gZoQKM*S;ldz+rDA(4}v(ThJ4CGG~aZL>vAEu;C;J;ld&L z(!T)5NNC+dvh&dShU;YLk-Hh!s!ZST_Xo}$bI3A-e;7Y!^y-n%;`fRRe0mjgBwV5b z=v>O6P9?k*&X8-R;_j|Iwi-1a2Tf5g1<7iF#ku_(a3?>rmVH&s9sf0aCtK&_aGnUa zjKO{T6+LHu0WQIE#db?^{`!*w=FF=UK(Onwl0Ukom}@?va7+{3-~? z5*kvzHP}5HH+BB@)l;|awSA)>8oPXG_3+Choq_%17s{^1w`~S)TW)SYtiKSQ*T^;V zbTdyX&8*wXS!tyFCXBxM49IxBBy?g6gn2#g1+@EZ|83ZdzQ)ob+I{x|KJh)~EUakU z2lFA^oUMo}5~9Kd8{gFBbdd2BH$6QeDMnNGFBgJnI^Tpj*ld~Ofz^c>jSz)g%kE4D z9Q8oNNP{mQvu-QL^rBVwR6-{|c){sPH2UAMG~}4WF8l(QG@~95L(0>Mwl|?lMjbg} z!0&tumRm|gvU@=)`XkXoJiEoR3%Lr4c4$a08S{~>AT=**zOV< zc179IDLu_VjFfE-#{vk0%=$7lCDrDmv$1+Jp@g`xZWHszU>`|oC@fohN-HHh*u z*%r$j2g@m_hJqft9OfK#&YmKFyA@mE?%6UV1iZi zR7-A@H)BpPA7s1T+0H5;G>$w?w_9)gp)!P(g=^3= zvzPBdlRsttO+4X#iuuqrr-l&;l9vin+7xL=%k6ObotjJ*f-SHlc>eRSMiLsZ&n8&# zqoAX|>3J;fSm&^>zA&}k2;XRua7^S?`noOznljwZc9MXc)Tg@xO6m!|JzZ_})YoBF zV7YLBg3xA3?Q0t<1fMWibg5Df;z@AV{`1GM`+7;}(7B+G6>(G7c8C}7Ua`)pV6Ob7@LSI4MxJqI@M{dyXJF?OX~dr z)?)S20Eu)QMu#1K9{B<0NZ(vHu0aS3@%k-#vYJs9NXp{Nfd(u6pP$1WP%FxI!?)fL}g@fFBjfAfmUipy50`#-bdf)%Sr5B|^SE2Gbh zJ~n#S=m$rOqk+*&N6#OfT>j_fFD?Jp@`w7rzx-3nukC+rd1kq5`JUzHEFT^D{m75| zH6vdixqswiBku)RP|Jv7Wb4S#ve%bAzwB$v?p=24vc|Fl%k=%1ExTyh`r&u`FC6~m z@Uz2T9KL7x#^KU%U|0$1X{QD@4*g~5XG7l^`hsrg4q0I6+M&#lYiQ5VIYTQ3-yD2l z@TtN32R}Y|^3F9(aA=xq-(A?j5)lFh##Sa9}_`aFOh7*)L?z$R3m3CA&dZ zyiK_VUFF<9w9Z8mwrbeyamKaTkkgS4Z0-MY--ofxeG|Ip?%|<>&TQCXA)Kj{GLW{Z z5N!ODVxxb~$#905Xbpsbc{RYuA z6|3a{7c9Ht`Ka$3LiJWnZX*ij*}O;31KfMs*A}W5XVvwDva+wHs3&|LSJd-Q+U(%Moe8lf8PdQ>Q{c+v{05@A&KIHaD4C0*AHT!frY{&4f<&bn5aCX^*P5zw-6 z+Ri%1gum2Xi5lJZ`>ZO3w_Hg?ouk61GuoVsic)nln((Kzoa61a12g?<7hwt)ZT^Oy z%h;?$%yE5RpKKV5a{aRIR33CG3Z%nXQy24EFOdopeZTE~#-&Ils}$2zRNLCDFIG)a z9}&yL`34n;YKsmFQ}@N#kxz)_EP#XPa%On}bk3AFx?x|pTP`|oixCl(p5X%)i#&36 zQm9V58hKj7^9K_qJx2$9ijfr}L2s+l)`C%A3x>TxKX3Ajmt+7=u zp`2*u-=|rrF-H!v zX@Nl2Q#nd&i29RyJH=6H=4`P%%MuV{7BX4=JOq=5H3_lY9J7;-Y*h=myr!^{8vKb^ zu8C_=k&+u)1-aK+%xBa6ZwUhR)1Tzb`F3XbrG;_;vC5dkHG`7N*^7!T0-L(z>2#0^R0^4zF%yoH^q!Ss z{gk{(%sRqEnzLnEk>c(WZj-H`=^AVl3#rS?gnBeM>b=w+iN@%1D+P!KCqh z-SUIZHm6|dbX%2-b5>`|o!W6&_(O~L1c*!{;Ru#;dMX{WAhDcECkcI&E44gv1#eGU z_brr@2Fez;I@L}Hi=g5c8^m%lSs=YuyQ*HMQ{G@&`FWwd*#P88-@$^9%SEhFM~ykh zD-x=OC{4AqVYOSARb}I6o#;-4v+2@SD%7k)mkhM!9C7}YVlf}0C{wUningi@>px$Z zXJ?b)@mN}BkDLaoY?Adb*({Qf|<^&IaN>7dI?UW<8y+lR1q!<&L)%X)UGQ zDAtd}+f-cZJ6IxvTC1TDF&q#H;V4BKnzJ6>K&0zrcJD$%UWhogXwnoF&C(f;-I^2Y zdz63?mdI%fx`@-0POcaf=B;jN(*$R61Y9bT2|PitW=vd95N35fw$P84c3fq?K5)TP!a*XX!xEZV2jA@^XV-*(a7~ zi)DffIvKtgHdv|fGT~Tt)`GSG(MUBasc=TA$%fCX3iS`x)bR>IQA&55v80;dcs(aJ zM1nV>#}d;TOVtEz&Yk~tVF1-?fQxAq08nD(t*+#5w^&@EYed>t4pdcgaNFt^P9CoF=bXivH!a6t>>%~c{^h<6&htX zlUQy_c}YV!2EfIEqOL$F9umtnkT8THi;1|!4b@5^_qAs-V$rZpRvW`r?pKz1%ceoxv1uZK_oVeL6}V7wVU5 zt|DdeM}twP*IDAjM)3qI*VJ%l=Cf5g)#Ng9cBm=VPel!cjyF4#>R8@5o1?xbw(rTa zrV5=ev8tje9v!||EY?)5{;)sCkhQ8VmD+VHZsnlbSynX4l%Zy9W;A85)0Z^ch2~2c zWs%l+)J~rjVyCp}0rBK7B{VL=Qf0~6fYYnVN4ASQw-j_m2)33?DQDYOKAG75uflgr z&a5j|_ga~X&Cx2S&$>};o>jz&#KA-$s+9B1usO+yvRyG>wh*i{?@%b*Ri&ETuvhp) zF#*XS5~L%j$OJ8b^s-BAs2Jp$v^o{A)lwF&&T^`bSl`Em2va0OhNGH7ww)t`V!4j+ zkp@jepJ~<;2RWX!tr0p}RQam)NN~1J)Qn~#wTTw$7m{_Js^|UAhO27MsAD7F7R&9{ zB-oY}c8i5|8#Kwa+r)A+q=2is!p>B+>96v{dE)(1Foa8mNFx?))Z|1WwewnB9p=BF zbs5R_tUuYzo04rRyjPH{oCP?3=}5vJHIm?kpJoj*q5XUS{DNtD!0Xe8J!yT8+#r@a zJUSv?bojI-T9`bWf<`U&Ltx@Dxb>~gF4<}ATvAPE7Z?6^dyl>mvg476EH@pU7N-7 zoXtU*8-9oqs(O>N>Am97nRU0)l-+(%DE_9x1zGjf&1g zFr3&>NC{a^5^kn|^@}_Gd^i zE;RA%FTkH*=_)AvN9{k1tH)}7H1jKF4APuNA&>+@NB~e50!koE!UcJbgUInKW_sPy z#LjIuYQU#p(`(GsdYHT});q?l#YqmqU;{9BDRg9%U5&i2F{{@tU88d-^A*TGJMkNc z(11t~F!CfJv#$-1_A$scV5~v*0Ia_Xsjdt~QR%NRCz4Wh z{Q0L9RG7i~PwjDM22#U37m{30Lj>nPbZP0~Div{PV=iX*qvZ;c;MZ}0` zyTNGXJ}TA@BmNz5Xpk0T_c`#VdIx5HH7Lyn){mb%{QWV#EHHZW;F}}=hSe9Bf~VEq zIUJ0x?<(e0l{#M`4Q!@R2FG1Fl|{~9fs@!1o7nLQ2@T1{b*DhNCefvz_U}RRgnKjU z=F9C`5T>`V+rc<&U(9ryFMHEEp0Bc8z!HY&I&}OG%=CC~DQJTuU4Oi(j{c8~37~D~ zAc$Y|0pNpayN=G!+EcRycf6&{q2mVF$`4Pm0Q%EQLrU4)e)Q1#okN`st5~0G%Ga(% zDpagQ&U#`tYd{l42UoMxlhR@&TkgB0^M}`b0z(a?}7uoZLt_nBP1R_{XJa{Z)({Ieo-ORucrOW^{qh?Gnq=*h zogZys!Iw|LmI*%vSgQ>hAPGHf7Ad!}(-V?noQZFL=aFr!OEzfl>$9WLQc!(XU*88@ zw|f%mSPu$t@85Bu54rIu9moO@u9?V98v;BmpC|99(x2lI(**r~r;o6eCpEMV66 z^|OFqI>@eEueZ|p@P!mdIJXJpR0lM1O_apbF}-FfB9f^;0$j1>@+tJ$A@)qZZ0`=S z*c6^yG==w0>cV_KJ-qaMizeVtkFbC~gY#bGAx{%v>f;3602Ysv_z=R1ZC}oUiF(N@ zaDD9h-*3tHkFsMMAW;bg*&=Ximpsmz1otJNmz!X7`~j}0&L}&%dWkB?p?I3U{VQ*7 zLGM|?p2-A$?F#lYOYjUdybhVi*ombWhw0q&_RfPcv~8UAZva$T$Q%Lay6^_XNV_l> zkoN-IPl4^$p9_#BrvcI|Sr_o8ehY9}uUwWs!!^3-jYuX)tJOi$IR`l2L3j4E>(EWx*~tkB4Ly1J ziwn}(73Z**O-as~g)`{IbCy1X7BHY6Igh<;1I}asE{6c`4k-Q}$fp4gmyiYnOqTm$ z|L)ttf)D1BRZw^bd-x0!Fg(qEX0jcv@#d_i>GIIk7-XUp2K3A{3`j!i$nIhu27Ima zfjc3K0OZF2*bqQ{2JoU34nu{AP6hrq;GpkfR|5X;5>?QN+wcD0VUN3>m)EViwG8eW z7@2xKfb0VhKYUIPnO7j!4CDiWggI77k%&+6FTIDITDNo+B>ULcyRy_Inz`VN%zFI= z-E9jAd~e*@6>odb=VB0LD^3g)x3&@Xzvupw8{o<() zS)P}y0*Ku!<^PmVDzNMDs+;--)WcsIKX0fHGT7fV^2yP{qv7hTY%?==IT!+!-CMcM zM!g0t<7b@((DSMB$+3Pb2kNHNgq+?wNX9Hb@5~m}gk>uYtbzhc4|UGLsLJ36uj6O`ZWuy#Tch@ZN~T@;#&(m5t>xgVgxT=4bwJp!qi-4 zgZ?CXX~2t*fxkr14tY~;EPfxj=HiP3OXd_6lF%ge6y0it3f`E|(0(n938# zhBiwmC%(K5M3zrb8#*sXflGloFrtRQ9Eo<(YNO0-%V1F@>qS8S{csKha7l3&_!n(| zWb+U@>u+$r4CG-+x7g=EBo!AmSj*>pzH}`_IqS-}mJw!WR}yBYmxN?jx=+EUuI+p{ z2?x#QQ=lbIxe3B^Opbzwwy5K3OA1}5gbqoHk?ejza_yoy|4AwI1!I;7GZWK=ENRNi zr#$LXJ=vZ`mx464ouye)e!3DvQVpGblU@vVz9@?~Glql_IJT~jc+#L?04I5KOp{Z? zD+LQk@1}rbB{U>k@%d9By+fU=((Iz6Qoe62FtBg@!l7}xm@CKtZOmZ#WCM?Y1tAS4>BorPnpYHti#?`nj$J{KmCAjaf1w$!Pu_juUV4~3m z^p)-w_+=9oxtD})qh2`WCbzC*YT?_&K8N8bgf+5JVGl)e(N@4twCpBRraR8<5N;t? zoGwX7>Y1x%shK zI9ouygn=Xk2GT~eJVOGAMO0Nv&9d9jsDqZ+gl z>ayKsOL3WMJS?>Gf7;NBgoeUi0AKG0gP--@QzzZ_zTrFi|1kJ%*>(}YB#rehBXF)d z=Gu$jA;3E?LQv6`ztSpmh605?{~_3dl45k|b%>?M37OG(H!s|!%3DAra?W8O3V~%x zMtcbIW!jRAHXCU=ElhVR&*BuMLVns?OWj)!U96JaD$a$o+6FsB`U(%DeuwvBj#7E%9H_tVoAt56? z#2+d2WhxZT+H#&qF^fAnJ>FXi{;7LUdB~xs-oMb=iG#RbSIxa2niKSPRYDsJSj}p? zLRI$A?i^Zw9lK*fQi_hehAbU)9oS$%&Uzorm>_478q(+`P3jg=b*O7TXBPeK18_q~ ziv`S+tFOnRQa0mn;&@J9DXnoR3uXm+>4WeWX|WK}7`cH3WZt;nA5GEbsDjpMJjrwn z{ofneoqu0?{QC1O9pg=`PImhnGnb*@VRpro-%)PrNu|kBY-RX%8gc+A9|TF@=ELx~ zlhC?30K}k$t3HZfoNY*lo56X~obZqVJ%k_f6hi_#^yGKoh4zi5_V!KITLEuGd~W#-^(0xzXA858yxBs}{t%Ar*2nR6-Ag#}AvYmDw(Pg# zS7;s*H@6{^FsRlcc`Ni6R5_5(5f5`cdhT|1eBIJj@Hq^+!p_Dk&hRwu>IN?OB)fV& zyw)JO3q0Z=f&y}>Kte-^-SBI{o0eUJ(w}5kty!u@=g{bn56jS5cd%3IAq5-&{o=I4 zI!G-IEp*c~>d^5Yf*26GgIx_U!b{cYA~1Fi-!+w$p*451Q)_S{M;qiX4e0^v2@f5T zN~0(5*Q`eS?_!sq!;+`rs4Z33*17Hcy@0L+y&3^{UKa40Ag^XHVPf#M(cxrmRW|si%%&Urcid!b7b5~z`0 z5(Mq+z4(wng{o3xRH+6{+kJqin+!UPtT3)UNAb9NX>cN~>PGi%>U`=bmZDtq7*RzK z?8r8u2vcga-&_lEary1f17jV#51x$@LI8z3vS}gb!J7NAc<7kNSSG^7)xi%}bw!-biRDd=&hq;cc}It&Lo&M_2v(C4hfX{4Y?(|L(54(M$gZs_FQB z?AERRxr5NY0FpP$<+vuPjj6oG79VxBF)%c{VJp{ze=4a2!H6#cHv7x$#?C{BUuitw%?9_PeSRf$ zR*+dpFYngU0o^PYvsLvL4TGNjBCy=WkHULHN<&A&--Z~_hn1TM`=-vfAMOfo^BC<# z5V>q>#*rZ1oZB;7Zzlo<;VAslm)X^me@7CLqc?Ome+5tNY#^C7l6=-svWJw#Kszc7 z;=^BsK}cwb@B?1w;ctFpOXqiAWdX{-HNOJ7AZ!_<8&oVb*)H>LUD2mhciRC3+n!>i z{KE%8&je4Q&P88hg9||j*8=>~*k!V7hgOZ=IB@Ck&qp4`vONxl*)xwZON7wV+$WHqOcD6 zV#*crFnlwUGQ0iV%U}(<@M&QGUJAYhPR|N+%hOmsx6NaC5n(wRfSzll6h?4aYO}70 zErM_8=}BoZ>_zzwbax!~qT=6yE4EnY*FtZEHe7ZG=+}90m~nFf9S%H!jfg_u1aVbD zlE$5U<(u6%-8=^A5Ju+A_Bw1J89vZ%doEK1Sx(=Iu6Z#8rq;}-&mBHzZ(LJVypjE~nER0h(l3<6lAGvU=_ z&_}-ub0jTB$2Ty5So^qo9fZT+?QEaNP%FZ?LT$G+lZ3Eb$7+ER#|ix@}6gucP@9 z3ubAisW<9qvtMcC+RrR2n6?&xl0e-ah zkdSh2qwwD99Q^^_YWDeUi>)ZMB}fphusKV`x{pzgT zFeZ_chWq+ohNKAWsCy(o_$at+9L9F4*SB65oZkVL>rhv5uBkzcjG2yyYbC$RPvy{| zecWnfIstv{C8078d$21dJ$M33Nw#^2^B1>`E+4DUl3ugLpfUL@@c=#qSEDN7{1rPr_4mcZ^{lnC;#I6#y=wj(SUusr zsI}Ci`jpifQ6&@QT7*IQ*WmV)ltQSK+0yylYxu#Zfvm?F!t5(EzDChDTT3GMZ{XCB z7NaMdZfobc-w5B^zWBYSyB+kBoK=@0gBTIzTeR?Ed{fu@Er6R23xO+P?J+{Slsie`Z%h@{(i| z(xcOW;sMFTQ{cswZNnojgHHY&*thU!cIBF-s-SDWlUl^s{VUr|(gHmM-AWgwCJHGz zV}Mp;Y~Xg*qXU11XDWu2`THuJL#9uFJK37ISpfXa$7b}uA8hxa(% zOXrZMdoC?m6(GCLSIn%AoirHnQw~sB$2rlYbYg-7m5^;7fG8FuQ=4$CFU6W7|6q(Q@!l{_JKZ*mmN4+#y19+(d80+TF@c}$A%RELL5iVtq(PIcD zLm9KvF0ZMSVPUG*E#p>=_mU8?9N;p$$fu2E9OOl)r-C&N#e}kYN2ctuLU4I^hyH2= zdLW?*(dF_&l?~7t2~DuW-;;E2>S#CO*>%hVkb&44Z#=AYQba0bu{4`OGm#bAS+yS8kN)_>j8(CZ3M)N{DS8RiJBs9o%1v2I-tcWMKL1U`` z-|a$B9V9URE<~e0jLnFcm$qGJoyVC51#XWvsDhgII^52xMpe|!lEPjKnn?mWI5W**R? z=W)hFfe%7KSAroRA%H)vrxX@nT$?wvO`YTCav1t){uBg5LqiiK zBAU`itd3YVp%pja>YXrW5*nbRiSVPHt9Eh$Jol$S0Rnl4vp`l1_N1ahG~Ef2w=dlR z?MP_o#J-CbZ8sY`b31UKZ1Wg^K^UCM8uG_Uh~G^oD5_Lci-Y^pd!Q`|4H2LEAsi@g z$~Sg4ULY{}UT8-+Z#5AmrziAsM^e$Y$6GdGvR^$PCR;*6ve$Lp7w49aaTo56V;;jV z2z$kowlR9b$s0T#c}iDzi>Kr#rl30#8h~~{(ojHffYdQl(2gjY8~O%cANd$$D*M{N z*3l#u(lKAjVNIR$O8Aa&$WWx-5go;VHQh4M;w^=$2&l$jjHd3Wn|fqC#G7g0z3k*1%on(c*j%8;%FbBL%x^Cxs5EA*1kp{K6^Zw;IS zU9IQfm1Uo|F5Vf%a5}1E3zfLWOc))37}~DprpJ3r0pJYsXm>B^PpCm=0lu^?@?`?F z&=n6K2^H-YtI^Ei1|U5sP0^>@izT%H>g-my#*Xga)cLv+^MY?4lIShO4U~+Q3hi=a zZ1Jqx&p^`Wi>~B0pp{x~d?L_G!%3e(fKgru@dsKC;8er&IEkJx{ccm#o2I!40HOq& zDoUM24HLIxQd%rn?EY+mYkg~I-VE^~Xw9}EZSJSD}be4WD5v9r+Y+h4lmGIWK5TQS+Y?h7n&vtwzN=sY`l z37D-SE)EQUc`*FxT^YN^DTnug!tM_Oco|?AcE|iH7q@EN(p4~&A^2Qgec2?s!p)t@ zLHJQO2O&j=#}-41q!TDkZriiOPUoRK~eOaNO z-}iBl!DOi_U;{koAG)F*n^WG3CST-+&%3U0csV4LIk0hN$7-t{z&|}kc+6>=kfx?# z%V=96Jv`=s$>C8L;NVfXL=|*=&#mw%jO}efc9Rf?6R!lZ&9VhaTQGE7vVu1)%;9zys{Ty*U|LdpWdZ$NvPMV8|WQfXtonL{&C|9tbqTd*mFNKh1c* zWK|TtJ_0Ypg|5NN@Jep^2C!68A&*jS(}y5|j<*@~2f+s$`UkB-X3-_7r+4k`1KjAU zYx-o@48JfIg8bJHjqe^>HekiN_EgtC2+9?IG zWU~N*fs}IWSP&fh253k!e8p}^s9oe9659NEk%Q#Kj(LbB5ih1{GU`kcNtMg(2$|Vv zP$4vXFbd5|Xn@!UMvPP9=ZPp5I-K(kXiN|WW?Kz;jLN!f7Fw4~=0Kwae6$wL<+!Qw zUK%?4y5E7<3U=0mx8nNFU>?iq&UqY#BecZ^8#xuJ02O|zrP9=jY22~t2}v;uv!4+$ zPd}LCKyU1#CEy;yc>bD#@knUsco-mq_O~EK_+@|~A)9J(tw4+jv@*#e>mwjDityj> zW#GRO8X_vQf+2Nx7Qb?B^Ek3akYwau7kI3y%FU?DNVsiOMrg(z2cbbq!%F%~IuFOW zMQ^P_-|#C#t4F>#b~&WNyLn*0tk5~z(ePs_;FMc!+^LBfm~4oy_$tu~sHET+TZ>}v z=O)K{N$9pW{ij)6(AVG3{g22B2Qe!+=dsVPD9SaQ%2}$AWa@;Xkujd`zmLQ71v_K@YYm12nrQ3@E)1t>NVc7`%6c>}4{+&}Fwf}KChU@4 z5>g)eooJCYweY0a=CNb6z-Exlj8jvTrj#zKIaAxf;nA!^8ynojgoK7p-Un+05A&_y zbjIypknl5o*mN^+2{@l-MsFHgHT(*e@Nw!+=REcV7TCh5N-_$Pmsj{gl5EcAIdtSh z9N>eo1lwc2lGK9;GDuMj-ho>?>YMNk*yqEG3!&z%rhF?@X3Bud-UKUOmw#`*1vZ+5 zgq@V(k+Yb>@i(`CK4?>Xu_c!y?bVT~ST(HoMcg58w{vLU^?1AYlF-T5Hk^kY$F_Cu zx*m(w=6Q(X62)p|+iB#fwl*KonPMap6q?Ch2hB)G=*hF+f|dOlpv?XIb;1D%@y_C0 zRpY5_kW6#!v@Md=sX##vb2U97DF!c$|K54~uOZLox|{LgVV#FqWbvJ@@hQC~k}$K2NN*^@Yh#UmX6+Iz$!JH7*>#C1HLsA;L zZHIGz=W8E<&WI1mRek-xl&u>4GWh;6qxRujM=}W5?5~*1utTuGWpQ<(D5qI29ZYgn z${hlTHazZc{VRMzN<&Y+__$hbSM10u^i`RvD0Fb!I!lpel#YR-qubCO zhwxJN(gfGrE?hwwr;=ds7M(4lmQ%c-brE~u9C-cq!bLqC}ZIaOMWPJH)V@zv)! ziu>Z9&qEu6t;kD|0S}?l*7Is*xTt|g_(hL{T(xBmBz*}@e1v1~lKLDxVnEU_Ks$n@ zFLx^BW+G-S>x0I;A{pk;jh_WcUs{a1Zga~&$APIP!xIG`<!t+}9seR<0J%Td&Vt1w z1aXnRycMh;c8#`S%|qZ_w~5!jz(L^Ql2y=?vej~Q>A8EhpvxcT&gA^}=)>IYTP%mc z6XHf3+O<}lc7&=-TP{~Q)L^1d0!}6F>iZsnqrI1el+7B`+5Y_W`vLj?F%DaQf+R@$ za=TyK4rZM4pa-yk^4^Bf!VezfCf1*!3K*p>`|ug;KRsgq)S}oAc_XcmZ_(N|<*b?% z1{MGyWhaGvU*sUmz*1C*g>5X#)nCRUe@08$AV|&%DNBQGEm(vgqRsDYBg2T*c`r$(OF$xoyKGIK^U!14;jJ zko2u>csqb~31_nmLewR^YAAT&fMw}%4npsirgjdsABC6V-wtpqR(bmdPmZ5AuzE}< z^NyB>pBec~=j_re;Igx4z5*OBn1CE5L#aYGr%bkTitVIL2Dx!4H((Y2S;xD(WA+U@d`7yA~C!U1EPf9~d?S+?i{`4e1BZBkb z>n*BFBs*bYmt1@VG(!@akUZzA%C60wJCATU_v<|NkQX#n&0;0O5eAQs52$?dyp|Oh zQ2$Nni1YdwH!mC`@NOm{*c@K{khLif`_7MZ zsl;;V^FM^$%Mhn2$d<0!k)8W-p@$>rmLKBXo6*7{h+TJWX*f(8fWZT1T&onYnpi~OBlMun{%0RFxK$bY05MrCgYrSLL(p2o2hI6P) zZ${_8aK_XA&qWPX z%GRKVe#{L|0|*~Q^QS^tm#D3IK!bQ{|eip^$zfKFAYo%De!W7>Y@#3>;G&9 zeBw(C|0X^s-xV|qjm3k6qq&QR_KSL?y5xdi5tN8K&rjADw_#;e; zga!c1|8dHkzOM7dKSFoF@4F2`ns6Wz_IRbGXk;A?IsoqI(QaD++zbiNPxmX7R6{4d zdqMSb1WeM=zu+dV^EiY=cvR+d&1NH(P$qf5FI#l-c+;#yAAA!o5eW%mB$H+u-Q= zw2X(dS3*O|>wmTrY%-9Z<82w=WeDuMEsUC^_?U zfksG9Mcai$$XwI6!PUFl#8*aPlBBe*tM_9oc)$a49L4EGh5H*$zZ^t*vbI#MoKDp; zv@p-b0qBK<1}R;SbnTFvJKr1N!N(Lr6U2$}SS#rgfDfAM;YP*+kvc+0J~GBnPDp4F z+*}ov6t9nU7waf?Axrvo0f9WsK+mhsaQl42oiTsN<2V;M9dGE};6 z_@}^9m&?*aE5}@Gj z0*~E(^prn6FONWOOK*@VHB>TA@-6`dFX98e@`m6py|yEtD@V&Z{b%iQ}?azf2Ds#-{@5%*DZT_;;Qi{ z#<#D$X6&W0OIO@8JU2Wr_|2i{;EsXo`(Ii9#PTQlwad?u9hD6)M<*N)$ou=>kM$p) z9)!Z5cAO{fd_gvNXv-l7%HLDi!O-*pp5SAVh$21%Cqa0I28fH9NL)_Ogd=i-gD_P& z9ia&put9lRL9)9k$PbEcD-3VhMbm_W<_KmtN5~FenNTr^v-|^o;P- zpf(*cquc&v!!*qth{xbB(B_PSPbBd4!OX=J)C|wXqtOT#=Sdc@J%#CmW+Ao~o&4Lo z+ol->EnobM0&*BF%;TxAY&m4<4v40y17so|3&-T}8JdmE(2$sSCd`w>43l8OY=VhE z(C(?vu)8@3LvX*l?VlXZmP5wHnTs=VDwcpnAz_+kXigrT;iK}z49i9tCJMs?4bS3u zh~01+Fc9pH+2Nm>xh;nbB0EqAn1mwEb5X@i9A;vMR>awv2o)n{ViB5F#AqhL(x=8G z-%T?L#JNz?WT7FL7J(%(D#N57L{HFW>tQJZ01ThnVj?d6xj)#>3?vRJW;dq2( z!O$KRhez||Zb;RAH=!JmZQTN^MaxeyH~~1Ki%W)fe@;)rZa5&1E7&*@kIoQe4E7SB ztNJ37`K;UtlOV9~Ll#DGb7s>4gf3FiCdlUHLpWM6q z@Q0=;{s7M~Bon0)GYqBRVcsG<%pk$d@UbYt!;Xr>dtz~9^4)Uw)5j0Vw(X*Lf&#p$ zg|YQa;o{(6KzqC2q4@*RLs>MD7do6Fk{DH;#hu$&XVLHaaLeX$eL}T)qFsmSEI3^tB;W|-7=~JKL zc2flXY2`2eKfa_~{1VGkfGtEuW+)1OiD2Zw?0f>2iv*tM=@<{WFBdiyvzwL6?>>2d z|NqCQE)_o|KM+sIp`$Uln*g+71~^&{{1ByQ*tmj}%SkX8aHsaKVz->|;Cen2SA=1yVsNTQB9X)l1qvgAOoUmMSzroqL)cAH#NA3C97KEn z(LuEMsV;o3tiMmzKfVpZU0fr%!AJU^L)&F{?ZYnS4`Cq`hi3_5PQe-}I*3rVUDHzu zHZ&_rDXz6V7(Mytt0DAd7Y~S`+OVqF zCMb)skW}!721%mAd-xrb(qga|fw$Z5-ot|xg*C*?ETwN%7?;Nuuv_EEeId-4q!=Cf zW5D{@O2tk{+G*zoZ{H0<>y<|*LF5!LQ8O-wEl;YVfn1}e4}-FJ&u)Ilgrrn3-h5>@ z%s3jBU!vP`_?$&>NDt)=5rod-^K0~eP=nCuNfNptDen53i^h-pX&wVi9)={|BEY0% zm4(G$i>{HwdqhI(a)5|b=_Pr{`AG9)00C?Tt-4We)5J1XtUmMumOvX|CXX@vy7O2- zP&v)PWy#9ujcKbD9aZpWGN-(w;6F2IwOKd=s2X!kM(Fg?@@vpH7OSoHiLO*)8>g~Y>?d=l*16{1SzEP#+rs3PQjk`Tm(Gn zC2FG+_uX(N*v-X>fJ{_Z^?gKUkPY5Fc;jGcFfgbb+%-5g@RxxT1K%DvHt?x|Lj#!s z*T9~Ea|c%RKh^){L})@a@t%oQ44htxT_UuH3Woyp?19FO2?dRYckJKB(AdGTC;DyuO#in2VcF}l=VV`#-77mRYs#*g`2NI~ zCq6S#=@Sxe#4}p+EJb*YPD&?_gc^kV4-*v`g>@bm$@zA${S)h0BAyQNk5Z3?#3 zVEh8ye7u#A7b#w+vH6Koj*DjeU+tp1$5Sob%M{=|x7VmnoBoHA1flm4)d)ujwkVtW@RKAy@c_*T9^ z>fG|U#UC3a#QO1Sgz^@e!HCmO&e|f}TCqH$w^3DFB3fq6ZMv1Xq#!oqX;#TPXN#4| zT)w7S=@hHmLRnJId6a4$ueK|RgA<<+3C2K{((1t1tf+3Qi}ap(v79l72!EqxR5>}D z%bnUviRFrrpQKGCUhN}|oH4rlf5dVE5Hoa+RFO(T8r^i3d{-z>)>|pE;E)@f&hYH4 zHKD%0TYfN}^e0o4j@Cp1Oj7PtlKMBqKX`O%vTAL&au#m{qBt)6k}$BOLsyQbAyaqM z*^oCGw~*;5p42AFgh{V-aYb{*Qs8A*i_P#B5c}fo1OUE;0(F3x6Pii1+oguRd{FJM zmQAdZ+5DVXUNgAtO}gL-JB#uVD-$xPBp`>6CZ_fT!it8vp2>~g(``LL##~W4lG1>u zOGt0l#ucV+D-z#jZk0_e)uCUM!;k4Chzsl|KdMdsGWfPK5B?w0%?9ox>1mAWrdCKsr*ouZwlO-ixawpBC zgN~p3aiLt^PFfBUDvhI}aF|*ZJ~tvHdrHVNrYP+t*tp%Iub0b-4Zjfo5I5#%gLk&n zZc=niLyrr&91?P$rbP$rxv;`nD}*ai?g^ora(g}IPX#p^W7=bBMkekRo3UBkR4A@2 z&DyF5W9~{+DP;3X$PH|Y2rJYzW!?u++^Lxx#6Pf!SwiD;L|S3@Y={qU6|x_Jp2ZtU zX4#ClLIr4TYMrNBJ>G6cI5HP%$NhYh`lPSv-JiHJ`_ zxc&sq=T~Xs&6*}jRaJ7Y%;K;b0!h<8+`gG@X}q~yPOCAR()s8XTxlfUjCv>{*J5pz zjyK?h;zZ~5n`@{x+?_+Ah$L%rQA%9kB;FL)G^DnyOS0ao-6_xP{|9c~2-e+D;mcQX zRjh0_Z)W?WZFqfFDz9}^vL%UuGG&~&q+GmVFGMJfEM+m)5=APLoZE&+3qh?0O6-@K zq3$~)$;o8izI-#$A~NBWi3Rhn?lgS@H?MmWSt6Z)_Y7Lyh}q_e$!?!vFE$97H*anv z%n4muKHaOpqlwqeS(u$xw2}%)jG8ht%TF83S{?HL;H$RTpkSe@9ZjD5&purqv5|#r zt<$U!=9*DD{M9}ko+Alu#!6L!g;vT&X{tPZ9t4SfeliD%17ycWW?k6}{(}FYmUlM^ z4-u1!)sW}mruN41z-m4jVQJN6g}PJitV?Y({pLDHi;l)?r8HZL+D**bi~DqqhM;rd zIPFVGOZ8-gc@@*E)p(tX&C7J9Alz+@5{mTq8D&kH&N#ycy*XIVG>Ns>_vx{UifCBs zdeWMVyXxfrotR#UTbxu{+m?`Nud|}fO5W3_N5imdn8j9ipb?~OImwl{{}o@;n3F}- z(hSi^&l|(r@a7z^cp7;FR5R-2GvRVONq)ND+#D;Y%1uin=4zG#xt+MuR=i?pRXTo) zM#oB>)tGd5wEv@OlZ}Y@BW6ds8J9-G8*mw-ctu`ukUq1RuE))qdL(MbJA8b;BBxSh zshn(F!s!aTl&q_HmLtR)4eDV?F9@SUbv0ieJtNzZTlc%PA=qNLnYBYZ_dt*J88{d2nHl*iqA zc|BVTnJo=^bAK=7!&Qi;*d>-|#6?{&ez4#DVmk}2YG+DL>Fc4iD=yJv@x@BWNJwJf z<&}qIV4)pyWBPnC7|_uXN|iF((osz+Ywb^HQIjPIu|yvV6govqGjha_=b@;s8v>Rj zZS^*YYMdGQIhIqXFl92?5`!VuR)>7C^)zl?2*smLQ?}7kw@T7P?9d`Ppe_Q4Y1BVo z@fN&LljZ8Z7@4U;dxA-E$(k11$*AV1y^3k^g1AMh~w(WZsk2%OYwM?tf0Bnh%L{5J04Mli=VVz8}-GWw{lS zbz&-~T^=)K*5e9j@oXg6CL95q)gW&*TdwHv*YVG0LoG9D%DY>22zT>#2x^Vtx_!SGrNtAJfrvp9#pysb-CJA$VrIhi$pED>b5?; zqJy&LWiefCh5}M|cpDfo{2HchVTfFJc>Pg-KF2oV=ZX7tz1~han$~nCDzye1Y4yhk zrtTcrvRGpZ{o|#7%&bcg>TE~sarl!Ox&pLF6y$Q%~P|o)pFz?Kbkd&f>8Zw&I zWIQ75dAn+0GuqX9}u&v3ZDX zR=}$zYk*fv0S_Hx=lQ&nt>{YG<*%Tgya$ZTncD%(s2?mC%r?McjA$EFOlyvsZCNOB z!))9wp{0y$Stavj?a*USesd1>V*Us<12KQ01;7;QixfDLuzzXOZYX9-za!sDBWQ-P z4Sw+2dv|f#Sq735oeMi*%=qb7Wz88XbU~}D6dD1o$xHBK-VC5R%+!>Chh9*Ce-NVe zc5+i%{uw>A0MJQ&|6m#nQHE$YRa!QkbL1fBj~^`>Gr@`ocsLKV^u)exT*|}`ky_XW z{gG{zKwTo4)11@LZga97wFeVEHK2c+nYo$M$lREPQHw-0GFzE5b_5r;Ku=cpApV5T zC+wH8yY0vF;j_xe&x6RlC=6zO zC~uP3I{FOjfkZ=tuE`4yX4n)K`pXzIxpBo7021fD!}9Fc78;A<+Z?yL4EC9$-Sf z9bV$>hLyPJsP~%v{d7V=iRIC1^y#374;y52tX7=~dAvjrqVISun%(>^Tr~6M`4+T4 z`|j?!EV$oD$q~{gommjLmnSQ*?@A- zNf<)#W1qC*&dLz61Lp{%#BR$z`BP46@j~A3{8LX@CHtNDeMani*nXdEQ;5Y@>yb?R5qZMgsmA8 z%lcajWC>X4{*)HPCk+d5nez;@6=4~WQy)N<rwLxX8lGX>r7CGDthC4km2^VE0{Tc%Y0#; znOzqJw0XXI#_;&aFDK7^I|>kjqu$2wDalP$@C3yumDkGzZP6GWdG=~pP9YC4nxYU4 zXfkf$zJE1dgR^1aIDn7xSKz|Q9POpbuRSDkWf{^51g3FtwfBAFc?|)evONRjwRHg&NRh@59 zxIgc?0ptjHXwPa$czj-^*up)00|fE$4~aZ_6BZQKSi>w8tmfPvT5F4#AV!q`<_=#2 z6D{OHW}6&l=+BVZcKbC9pabt)8dp1&adsfAAV(P+F`~f|Sj-p8&>sO0-S`p-s`{8? zE4QY?he$dX&I394^NSi&wlYPS1Mzmvt}%*x4_WKcx@$q>m-EoEH-9jPdLe>V}XZL!c$pkS^YAa%(GT)CR+0A`&0SD zPry_Pd8q82J_j9b$~JQJCqZXH`ROG=B^McRk*qtftEU`hyC;q((|YHA$;JeHhDG_!Pe<3V1x)@;lQgM?cN?%Dx~0 zY4{TeRcU{lwl!T9x+4z1vy}AY4xa$$t{|lC;NFwo>Vh{!gMbEuzrx>iqp4y^g z&=~;_TaWj?Y1z*G?HE5O=K_yB)z>$NB_g9#8E@OD_gSm}^3{{`uaASA=yD!L`8sl^ zW(Rll*0&XIbO6fSo`TdxdfYaaUiDkiC?E6l$DLPSv;e?HeIRdNt(H^M0kS~0lhv#? zh;Dy~fyy7GOeTJ30VY8+fOEP8suI3(-Zb~oJNP$kr!)*3HoJg1~S1VMOAsJ(-Jai9qbj_CW`2lw9cc32s;#ES5 z*n63^GuCiQTc?O}N1l(?Aan(y)1O|9(tU>o4BPUucHGI^;}3|C|31dC!+jhM%6^GH zfy!XbLO;C^&Lsh>r%nAw`!9Wk32lL~@QEgX?cvI^`5+PUBzYS%-|G;f?`I%yXvHQN zM~9ehB8l^f27-ma~xR<$D(kNbh`<32g#g8V?kQgfa?j2SOM!UI?(@F9Q7E z-}xxBZo^6q{y%Mh)4=53i9>^<<3~lNq2G)=Fm^rvs7!#ZpjgnrH-M8G(ycaN4~-bOI%(HRLGddtj)Svd&&$~6WC?Z)+fNm74VSg)?d6G z?$0%z;LjJ=f(~S15M|cx0ynDGS~mGqrBcBS_SMhfD-}a@>9WmM&<-8j2>u-airUHD z^)3G3b1djVCbkc1^>R^8YN=EtoC-F5W_0oau(WcIGaIH)W9?ZTIuD6&r8aUuc$|T} z$?`^h*~~I%T-yeuF+e@xhVk|J$6S86!zwCZsn+7U`xZcv}&ZaOL zk3(V?XcT(oJN&8%c&I#k^lWrw^`Z4h|J}vwa^!n(UA8R%K38AgNgwO=5ox`F_zE;J-AT@ezNd!rrv8H`rQ zLt)WIxab7!JGl7I@bnu&Q2(NnW!o|;)rr}1u3E&b%V0qZ&w`+=fCs+OA3~2_x&Tu1 zehFXA_JM)Eb2mCLb|2Jhd=3zEt`S8ig2QWY<{6mXo~55kGk#TyHmD%Z6M$bE{@zNj zM^i6@EhyljV`aF*^vYP3Uk1Bqn`21|Ja*XbODZc~)CRH&4^Ih(@_VW&@nwI(2=ryrB{&}6oA8-Iuwl!tA?3)*OgTqK>!`sH>_ z$C@Miv;5NUV3q|uup8IHdcG;%#%W){8s-H#cu4wit&}4z27SHl^Q2RG@E<=7+o|F= zAV?<#4aUB}pvcfr3d7 zaa(>5i`C!L>=+?ucIfY8caA(IvX58!gHr};>001{lki8SX)-w(RSHY(v9O7dKrCul zq<|RKaRsD|E$1Q8n{~h{Twu1NGu9~H!W-L>2?g&d3oZ>l+pg3dgfl0p$BlH}9gAau z=0OlB;Gts$XFmt+i-U^ZO)~^?@L~kg`iz|j7Xt~FDfmKkhL%st=Qf&Mh1_y-=_%%lRU zoGx4hy4r^=VjBjHHz^Nk2z{Xer5Jj16`h2kQOjAqN(|`Kq~d@2`~Q>z_W$U@CD1vH zC78&RwJK8EVq>kAT~$uU(c@!^xoII8e3kb+0 zuRYDUbO|Hrz^{q%%T$JrbiN(u#@u$#91t|2Jn_!UyJS5r`>P3sM<9wT8f_L~A z!q72{f8(*Xokr4Bt(hcli5jwn4jfQyMcX$jCZ_}}2)}jqiz_uYDj?|Gv5){USdA?- zKy;H1vDl_A$bCsFi@T#;58V;)kZ4l>Hb&hvcjtNqTx$ahP*1l1jFZ(HO$ADv(dr{f zvBXGVSs&iUe_G2~xGM1Pw<%aa<5}QAp751cT`=lAlp$3~h8+bN)siCb4$wLw8O+mT zHts)nD4^=Xdl!zv2hiMV2Oq1%ttD(xCsXkIO^pP&z?fZ%*(m|FUj<&QOzp0gD1ilcd!;+7qj47_O}(lr8}58z+=6 zaJGX`#(@9!06KHOVlBMOt<;1Q-Si|pbDhyqjO~#xKF9$!2NWd)fRB#18G@)FkVFG8 zQ432udX8f4=67kr9Sc1K*fj@QiZQg~JjM8CZLkd(6CD=fqacSe)KSB|GzuUZJaPq8j{wx45WoZQ5@$E8#O40@l{aq! zJe>;^Yt}Ue#y>dn+sX5X*NYkx?-^8&alFU&5>RX7LKf6I+XDFYh5VY(Y;PQv8)a8|Ki9hZVa30(ybR-on?#yr!D8QdzYp7FT() zgj0?sdL$rGz(XPid}vp0)okVNlPG#FeICpT@8Tw@RRT#P$!s>0(n1+0$amoP!avCs z(^CQ-I(f%&3}eID8TfL+oaX_~aDV*XMlnSMJ<>9jCgQ$g63e;uAoNGTLpNUkWDnJU z6ZfZsuz$g+QdsIwsuZI=1myCnlCntK<;tQT7!@1OfUG{KH2jXMwV)l0(b_ZGHgmtE z_`cZ}l1nm^#sE~a3Z$wXJ7K6KC3yDFpa@9wdIyM$M$isUlwCY*$7b&PGrUOaLJmY? zoa#cvn2M1^DBiMVLzZT>e}v4+6w}i}9y<9j#c)^1Kn8dqc?dQ<^%}7_o+c!L7HO#E zm~a9;9Z;-Ck1G`Grvxl0v;!do@LsruJ5vcW);~UTqKOb(O3xqrGQ1W{igJU8c-`}W z?y(Cz;t{q;q@^MeBO|UvkTn{Nc6q!vqk9;sTqb*`%TCx1iN5=E52a!Q_bDCx=yvNu z1Maz4Xq{ARS}8KpQa5Fx5`%&o#oU^A5RrZ3Q~Q^24cBr1uHi>-Tc|A=N^Lv9hths= zib)3jgto-@Y7<|{B}{Ik?X?uZG7 zw1Zs$)T{n9M|Gi0hNwt1@YJMdBv6Vypa4i60!*yaSc^5|HgRi7Fmrbgz=aGjxcZ%O z`XiP)VJTKp8Dk_=wJ>;0*IVKH6!1{^4FngCC!s#nD^`%SsBHs-helo+|9~hrJTrM< zB7}E354c&_1s=2o51I`&`I0DNG&tvBo3F9 zy2Y;mp9*~H%ij$5nG>w{9ZJM|V9ktfgyRMdZN1>yt-hpV<#=J=?p_geg zQgc&kji8Gn@CyPm0_5gd^vY4i3|jrgZyZ4*QAO|lat{483O2p0I}8F3_XJvKO-w_S zeLj8J5t6%EIr?rK1PaLLg^Lf&pcH-)g=|Xx68Uve5>C%Roqi<6(xi& zo1!~VWkM{4fp$)%3Hl>%AP?f?uCPnWsPw!GD7rPD5|nl!*?#tVws$>mglS#Zyt`1&Ph z^*i)pkvBr@3p`d4{#IqhVkuA39!a2`<}-@o=z~s}bO9NiyzvEa@I38`;)1aullm{}3UAL4JWk6(C=XnTCzMQfRu-W){ zrH~fDBCjhcW;eeJmpl3V$q!>A7lkTdl^S$_x$h-IS`)xAvYDUY8HRrj?s4B1N8~ z7~P{@G`sCuSBfzjg@j7f5^s+)jL# zDJD0r*n+$9t8yMs^Bl!6T6={8V(vDf$)(=&EmE$i}tN%)H^#ZneAPlwFr($;E@u9j6f6u$vRB_Jb}=(Drjqc<$=M=ySa z-%1qSwM+f6M66Mo$XT;Fod=F9M+(hf%kSUI$?&580QiwcR}Z1*u3hZZTOWY2*}8l} zIzC3hW)quj9&uV4(^7c{g(6piC;=5hW3;pA>+FS_xgTH2pLyj}*at~Psl1cvbSm-! zi6mFSp9#q5ji2nCyQOjI7&`7fvVpt%D%j9=&|My{i|Oq~?NBC6CrEv{=nI6cAu0OO z^{_rdD)*^^M%UYj&ba}4PjtsXfTS17>tG#CR^DtG0)Q$B4|!+kun0Z@l9p4!>-{)b;Q#!OVdVJa;^4}k z0!eIlGf2XxZ;^@{yms1}A@Y%Y-3o|<$3fC^DmwYt7C3t!JG7nq_Hq8~wRCy33k)sS zYycEIA@Qrh&qcWCc9!qUMl}90I5~wpShSJ7X!;k2ws47$!AZQs+T}}9W24ujt(xUT z++-%JX-6CG7Ckx4M-?-Z%US)a#YA)nv8D?*a5sMx`m_}*uX*V!iOl~S992$RDP!cc`|R9>B*J+Z^5>1)Cx4?$mL zT|SZ=Z#LCp$Pge2u`foMnpJZvhyL~u$PtqHDVs%}uPv@!{b7*9bonsb{^1PJYHiwA zj#eBYy48th&@~(=IlY_=ZmwUSjV{_?oqV zKm^sD1rb z`VFwuSLA}{`ZI8&xk6DAA?r646A+^3q*;=`T0wFP+#76$AXxoS?5gxl@T{-IMaMpP zaj)_gbj7^b6)18HNiN{(2P2=&sKmhxRP^$*JuzEQ=i7?48&_I@_z@0#>W(%#^sLxRmR^NzNeVk43OXyMDIz09eoO} z43u3Pg~@iJ8BjTN(f1VVHmuYFJ^w*Ib*DEuTc3p269aSrsBz5ZM5-^7bokbTef_5nUx9`6HAX)UfM?3P42SZ``fHYvLO zUfAY@WOU>Dg<15EdlwJko%ewpMVF6U$GcKMnlLvBqhIGG()Fa;E<>vSgr#Ua2U~!E z2dAfEmV4y6rOoNZU-27?qf3D_>_Rh?=}d@f$n`C+Cq!uy5%k2>0)S$>kjIM()~&inE6{b1yst9^0MH?)lIg9BN_@ zrXAp$vE@^SrrOa6NO&CPgu7SauL_Z&$8GCBjJ$~oFE=bjC z_HHEdt^#Zgd|rj(ZeO!x*P5hSYsXW~An7Y$Yb>Wi-qJh-n7*>Kg7?1)hm@qtmr=$S z2eK_rSnD2jyVEkNvwgbYHmj=nrQ zgdD$Lyx5jrgP}29zF0M$plZNVl2K&Pt@X)m8JQo=3@O*6M_&U)7qGyi`;A#{_Z^DjybwAkcIW!uBq3w6kX5Sr5$fNN+tP@tw*bVtyniD;34NVAAzWzznM03M}G~6 z9;g=|T8`DL?Mk>cgr=CTrfE$e3N;tDy$IinfXvrffE&$(dK-7ci(uZt^??tf$Jd8i zL}p3GgK-<7^5@FhC^9_{5(HF4yad6iuRrc4G#VPNF>vCj-9CUnDRPHr8qh`s<3cIJ=5 z<|ps+A-Z_Oa+fp~Exd*Y_31WSCy5C9$eZvb?fx4WE&?7pwyQb|0Q5^9k8A(l+x-qN z35!d7dOwl1+g$Q89S-HebMh99T0lm}4*U-0?M?9zdi6q_1VBMq0&EvADaG3VNMPh(yxA zz$gV|sA&Gv-W%8mdQ@^~hWp%KVCUFj@ABo7v9^|zI;u&v%z1-1>holZ{LF)IW;qp< z{@`A8D^>iB16$XgB$@F>8{(M*lNSt}IrgLRy9RHa=nVTtH;R6_=&Av~Az#55D_tX!ftQkO%c7=P z8R=}J*ral9ayb?7-=}78x$B%EfInCEU3D)`DPc>KcWuyVEXic@#o}ZhfXahT15OU@W>m>^!W+pz9|6} z3IxJ_CSRkRL7%VeJ%YSzmG@$Y$o@%?r|j~9z=obl!6c1M166HQ0KHRE%(}7eT2?DJ zz*Ffm79U->kNena<>GtGSI0q?qH6_Nc((;GoCf?SA-$!bD`aBu26^MCa>Mj#tUIoq zndN>yx+LtaF%V|!8erz}%{3GjmqR6AM%oaYE%~S%9bToJTf2;i-q7!#L)O0?+Qj|a zDkbcUt}Y+^i_L&$J_?UNEW;LvU@&B_$9Vx8Z@xk~Gc9Bx(b-VzPO3b#<^E?u4EO_~ zP;}oPSdvPMO>stTP^TK;jFh53jVs|&DWG!au2EutU}2&+4juFZZ?A5*D(|7BnS{O6 zG|E#M^vD|!ktLv_7rt{04xr)TVQ%|>DSV>-&G#_x+^!599(!%{z{K&v2SxuHf0V!Z z&hlOvK5Q7zd#AzV+C(5k)jQc7QLCoWmv(?^3CQS$XJ_WP(Va_Ee(o;ls=Vukv0~lI zY^D)0mUVzaV;g8yqvuTOl%Tihpa)oYP^qCTs- z>}CVtaEkAOp$VvPzU9E1Tv#=VzO`$yKQHd)KS4#857))>q)SO<79tUFS}9M~TD7Io zo7+H`fQ(M=xM!BLZC5V3TPr)DPi&Wuh{m>0>t>1#Q0OBrV=B=PH7>`1dKAYdmYTraw-&xdJr5=8mMZ2 z(>hQw@Ko^O(8^vywXU3iLVwn1SrZFH>!D&CFJYCdWC z;?95^aorh8xW=u-MdDAl7jL?r#p@-!V^RE*Psk92xHKrI28G%}2Dn~cdL}PtB`$jY zRqxVGcdrt_V*&OgNV=e=brvGibkHw&bb~NLRNAYYh0;?iak-PP-`NjDJHxfu8GEmI zw+{m4OdTH70jfE-S-@#2?p1C@ojE03bysSEUcbflj;pS7>8k6ALcSHiOJr0;$nS(` zK_7rIgtExLzc;oOxR7(RX>pDmi`@$4*^CXI##oOT3SXPEp}Y;Q&*m&Lode@rnTz%e z^40KqH{NaMDJM6?p!7E^R|bN%;h``H&wgwNLS~iQkncR@)XMB*=9_yUA5cbc?Exi^ znc?IM9JT=D0-jXhy)JKSLWfdFd_cJuIGA>Gc+cpxr7c~WZF*vW_eYT#^aq77!s38sKj;%_I@D`3L$ys(5cU?h12`c(&>Ge-#VBs zAE}PFp-!Qi&X8o*Vu{qv)odz-XolZnmy^++_JyQx!sD z^@oXcsSz#14gMg=5s=YLTsOywE?nAz<_;+c6paC^xWU?HEhL|*R)kylJLSO_r`kI?mr|`ZkWt0<3Po` zJcPVlci9m7Pnq&9Y)Sl84qJ(>8vtqez}7`A=^AW_5sB7H8`O|VNy5@Cr=swAPwYcS zzI)9m_fb;m;jK(R2*6gRHd1gGN-ev(UN^Z_{&;WIb^|!QjCp5T-|}XV?(`TK!Uy&Y zp?lBTIgEawIW)~ZI<17bCTEw=qUa~F#Jp}Jm6qgGQ8p~0z$tic^`dUUk>dUq!!Jb^XwuRkc+Y52aV> z22HEZU$s&6uc_ayzIu3S>IYK~PTete-BfuhIHlroiHG-%-!WmE{QGM6czN>0$?uJ9 zn*8$6cP2kM{_^m(lUGk>SO0y|J*k`+S*;u-Mb}L39s2m>+O_|^_PMq5PprLn_^BbL z2V9(4>jL27GuN&eK0NW}aB)01{MN*?6W<(Htr?iOd*bGa%O~P%elmXc@B>5lu6cCz zi-X}||C;Wa8wNkOrm^OdHHOunT>a&tD@FIOK5O;F*q_Fp9sB0k-D4jcyKF2zW?S=z zG0E7jv5~)DAY~u({iM2Pwt?f?jhX+oZy6eYoSWk#3np``KQ5Pb&nb zv~QkD)FL5SOlG0TvoNDmttCjOxo)AHcGl%(CPw>ozuQlm(+NANfts3yc zqyu3?J*#b$i}dzR59!R)A!4PNyk-q~15&3fwGHDydfI+liimW)_GC1YNzX^(8~=*s zv|ZT{(Uism&JtO(dvj+S`*dkDN~wIbrxcLK^P$wfGN!lm5f>FIr>Zs@ph_#zefRb0 z@-#^l3kfFxR~8MPjm%(wo*LdYc?z?oz04y zcL3y`^tf3~$ZJj)eQERV9^I?eYNNE<;!7rJmnC0pM@(PB471i(q^eT4v}UZCHDSv1 z-d=aS#-heu3d;;$x!T}P#MxDSIjL-u2+C?DfHg@{=9KkUYc>yrc{}+%=*WBlfUWhl zDAXd6x#Zb)B55N61pY&*H`AnIRMb>#LV0dl5?GJvwtB}x#m$khyp|NJ?3DKao{n}p zk<)tRO|i)mcdBw8j2G?IMfC(hgmuMsD@HaWSx3hjD*e zW^J0*X`<$46i_UJ>Q7+tVp*w5S%T`KNlXPLe)+t5KV}fMSe^=%^g6m&Clglbk=HR@ z&U)okwkl4WnUF(Yr__JMbgeO}q5%lk9E}=^=}PX%1O4_PD3$6ngY&!sV6klO!pkw8 zraUF6;^g+3wXuM_nmt(V^>f~9)3$1HgV`7i7Hyhv>|g-5SNrHP;LEDjR<}VL24HCn zs_2z^3}uq^QyDNZRYpllDaGwsi?j~!#tnZZ!ls)pxn-!|pN=gAMIY5sM;x?KPAMXI z-pE>uFsY*R)mB97C5lM}#=-U4d{PtP39DW4c%mSUWOuc&9Gi_uQf+ZFkqf75>T-7X zm-}=hW1w9zEfJ&Ql5!?a9l>;K9!fuH%1KrlG6L>5dB&+e-4!Yk2|pF~x}AZ7WgNL0ZN)SfAH_dwfiOHe7_J(~h~C49$??8^&ReJ^pwmUkBw4BwwuJl) z8~y`xLua5`VpSmJH^IbTzgITurDw!OY0P8iI+i6`{8>kv9DO)VL1@AUcX}(Qa9F5j|xR{XAV#zjug}ea7o0>j@#pg0* z@N_xG-IxQYGeTpEMp18cRvLS$|lv7}cmqInj#dbp1`5tazP- zRxGjT?8Txy9JhUQHU0r>+3&YQ=71+hcQhrb?nhXTn3ij)uv;C=>RRfoM{2$d1G{^5 zZfSr_nl+tbwn0FlC|zF(b)Fa~O377@B_k?Gk(chq@=duM)9}YFYAAFbkVo~u!}7H% zo0%xY?d}>|Dbl8d?iaW@?TfMSs?Emex>r(bNOlhN=$@wAGM^#BiIiPRlv~l{c>ibB znvR#u>McoKOsoy+a8o03y%j?X`+qr!PgAv+#Jm zOoi5Z8J8r^8fa@%s=aMu=c)lQe;A(E!!VuqYHKl)mQ+Z4K_=}Or5E&!01c2edP*jD zB>Yh~D-Ono`zHpxr5d|KRJ302$Wpz6`E)hX3TWxB}r{%&J{APy?; zPbZi&xmWako(k#m^>D5 zE|i|U2g_l+v65Qv&IZf?b)HMC{RwU^cYtY@F1M{7ZKxd%lAAF8yH_qwm1TiO#ZhcY zbf)-@U*YDmPC7>V?M-hE780Hf=67O~%PWIVpG^6s8W&WmviZZCH2pvD$Gt?8aR7!d z1UA>xYm~SGbq;|6`NJ5R=+&&G_Asx({iM+g7jmrfdsM8cGd8w{Oz zqL~`K0ymc=tq|DmwmIxMvh9H1`E(&D$n8*SL@n)ka> z)2p#`D8;4)5SB#TDNj`rmc-Z(F`dpwjYO%aGZZCWmCKUb*Eb?)b0kGb9RNU{in!%b z`OH|qy`-$C86y$bwJTY#Q?{nBAyhR{B}$!aFzU$5^xD{zbkpEGf4q?`C}U6zl|n{O zwpB=P>2K6z)f1!+hNv73)|@*kqwrV_0P`;fMsNM59!* zLFEZ=SvHJ8^SuOHhyxZ@Bv1L;>5eD8_eK1>1R3xUYF#6*QH6_IcV=B4)5Q%>gs9sh zPHWifsSt@XxAy4~qm2q_b)}pnl+4Bm>GU4FFk-jfUMR5XC@qWT($ZZI_uFgA5z3?K zgp*0NDG*9*?O%#I4V9b{8`>SQJ}-`kGv_>lpK2Tf!|$6sZ@@888h>EypR3l69vS>D zznw{Uf`cXk&I9b*t;7uu9bLDOPA6F?8%-#}f+O=Zs`EF_{ov`px$ney(XNCrKzTQ@ zflAf64l9+TNn)k=lO>w=EDx2LY^tcYh2&m|V>o47p z_UIRVJZb|-k#^%C1;@t41$g9$F~OtEGAhKpzBGp*L|_OZld>O&`+ynzVA5_3{4v~_0y4Vsaex!GS{D10w}KdX7qA5SQ=C%isXS@%XW>1t zolhF0=<`+(BOs%b#2;r*4B8eQhI1^4adg8Vrtf(&S>;VqTW1XhIO;5r&U^V05TjjA z#+kg2+^}nu`{fa(7iZ?J9taE!{$Tj}iK|wROsdDfwQ9pa08O9zpCkP1ADciphrxXPhrOTsWW?u83G_cGNwSO6)&UcCGa3ApaN#re?tnwB}-j; z@x9o?%BM(TIS?Ptswjg#6|ortc^yF`qYKtRKn8d1FK4+sT}y(#?S`=_yL@gi_OLpW zUfM?0z10RuCsiJC6#YH~JAsf4318#zwExoZFtS{<`0-^gR_@u(XG7yIu^mY>O|-z6 z0Dyc}2Q}9le&~{bjLWV6z`xX`KLwym2fKX!IgVz@5@BPGuBC~lPtp=s=`=cVF?2~t zMlWn3=D25@=EaAn{g;3sMK=$E@Fph-Rx@ELlP(upZYt&jBw29~IwTpbs2X&TU+giC)MUdrtrm5_s|Adjy34 zK{O%c{`lcB!2l)dJf?QA1JQ|{2>;%)A{PYRvG^WgiSds%5K{UHn6Ur^<+L&_frj?r@(GwHBE?p;r7)KpEK=7GgImk#-!-EaLU6Z~PFJu-F2v_1F z(KGUQWLE{3UTZQo0zeg-c7q-Q64^8$5x^@;kU+i^|H`r=m&Zk1oSwkq^Z)>P9xC?1 zlaD#g0{%H*l@qKdN+4qf1g*@4r)>M;^lZ(+^w_k~77IyntluU9d<02I3vWM=Eru>A zD7Ty`S%%=fQd0;@nCw3!p~-@BHGq`^Y=bA;3Ff^m)?jPG3y=h`HCnvD*-a~Rk!bL- zO*s4O5KV?FrM2J+9~}T}tnH%zHR_#I57)>4WA%o?Q$W6&?eaO?_${F7ijyrUf995k zJuYdzN}#3#6jeZml#Pexkoji^H*qgJ_}5W;w+cHQ-jh`+u_ariU2VOkoR*s-XtV+n z1XM(DGKdukUcDOGOc1(qSq0uHhel1J`?)=(OHV=sk)zvyUSW}WU8z_nQh@i8(2x#F z5=B4hz;`Gl^GW6V(fEfh1ibZ27muFoWy)RWOk6iGvFN|PTG_3EWW4F*I*qb{)KO$A zlS2y&@};> zPcWb5M3*n^KXX?ocWqodoE{hzy*>cR>*euJj{S1g?-085y2TUf6CdoIP<);&-o~ry zT&@cB^UUf}JV<%kD0~IHb2YAo5ElUpGEV+$?!=?lE>7wT9}rB2tjlM6!$=fFa&--%e`J#Zt6!$o!wOS;|T};$^%=`1AiU2kEMt1 z8TrtvAMzK5=XYK0JHe+uU)~FRYLz0bHbJ#z#hOFbD&_#g<{stdT{7|VT>a&(0N*|d zCec5CwvBuJ6UxEr*zF7)OL zcW{N9z#N^iWvCJqtuz{>O`oYQ@k{XEzVb2nTLBN1Z-syvK-t{RnQm4>HIvARF_;;Q z0!22|4S4NILd`mPh>U@`a`G0?J0ThEdAV-mD8xrhg-?va_J#kv<_bihwW%NCoxu2K68N#yzz{I-ycdJ%okd`b!6 z%yK57rAQ{321it(83eFH`Dfrygk)5HrUKBUpHY7CU1$0F+m+KR&NBCd>B9hn6uwh= z(H6Foq*+KjfM|+rD8onlvtR`I`U~~SoyzG=D>s3|^cxqVd!Idb8eRNZ<-37YedV*t zJKt?3FT3kqR+2k@*&HNDIJ(LJAT$9Yl^Q^gO^`^T1Cz?uw)4QuJw5tyS2?qB#TGm+ z^Z&Uh@59OwK9M85XfN6FV39!9cPQ@_LpFE{Y$r(G*3roKIj|;IWP(wm?wLz%$maNh z5-O;40O(6=Yk`~`5BdexD9E&dsq_VikXez7PM-QPWTgM$@MR*j@oweJ=De2zI4T-~ zf9R0GDTeNV(WKAtpYxWp7=n2lwg@c66`FE4rmkOtq`F55sT}Z@2FWhL43C(V$_Fzr zE+`hm3!K}uGLySwWcs*hBeszy8UsV48wW-=PHM*=8GD60S^DenC|DvV20+cRC1Ni| zAThRCPmyvhsj8`C=wsKwMX>IFSn zF&6a=2F+as0cEF=xr?s?bBzxuyW?u*E-vz$>VJrK%1?+u5I(+{fCdoHGc?3a+G~EI z7(>rq4aSF%3>z-5_Z{V z?t|}3z=MgKm2zT@`j`ma{T1a!n>!{654x0x?5qwH!v@O_sk{d_Bgy^Bsr4(g zKyUcmELyl<`L4yu?}yLc;kQBUObcl=O2XbshypaQ2S6(XWZ1h8EP{N0;;YKQ7P# z1TcwJA3@Xb;iJnR;_oD+x5;{-P`kkdX<$L9d!%XwJ3$`soWIzt$VE4PK)Y!X^88(g zf9z{8{J7KJv=ODGN#CIwb{miP&L5kmhaqfB$m`?1?|c--AIg{^J1v%noI8rI8*kG> z-km4f>HYbv6dr^n?;PHCi13BBlefe=-j^)HO$Vv9>8Eui!StvT;jT-Fw z99yB#ufNUviYEjPQ0D*XE-Jf7lr4k7oWc&<`OG5!e3i5ck|; zuuXw|!2?}j`-0Ne&@DP~hDs-!mothI!0 z)uniSzW6MxkAR0%*KXX$J^%1Q>>8X!|C_QmkCUq^^Tt!@C7n*Emn7ZUIw36Sge}&+ zwUeq!YTvr{y+Eb5uDz?OyQ^yvXhIMXkufeg4j==J*o`1V#(`2)gmFXkMNq*(eHo(T zf-;Qg;EMSBp1QZ2^riF4?+-q}c}|@^_nhZE=Q+>veMVn6yl>pGcm|%p92*Zyl4(}r z&&52foE&-<$3OD|#;UI-5%0DD2WUsW`oduzOZW7D9tHsJ<%>XX;DK5Nl5kl{zVaVy zOG#~e^7+GV%79}lTPCf?oN%)m({?*EsZf>U^aJ+~37W~VK0s1*u+RVb*-n)7B29tk zj({wYYRi0O#**AZSH6c)R+GrFr`i+5b3nSY{hjX}M&gNkks>W{OkDT-rm|8Q6P6_u^I20UO==0cGUaBFY8wAp8P>&dK>P^3)G8j)2w?_MD=A>5mRO zmeJs@M5Us^i+g|Ee|_JnE@@A%=*srF*Je;9(X&XCv$@&U^v$N1HCYs{xw(0F7IDYd zp2m?AG?NntFB|)a=fgwfQI}>%`?sfQ=%j1$Tnxk6axCK688JI6O-hZr_+&U1r^Aer zBR|8j6Vk}3AD4kz_y@qc-0?Fi0(^@UVSy8hZv9Nw&59#4*%@1C&W9?Aoq=*c1wRRB zxG%S#f%EdMpJEBey^9oxf|CWa)k(XVopnc>8S#v_9w7hptHTF|-_rW(Wrq&JPjhrf zd+gVA7u<^!)_`LyW+ph3mUujguvlr(DO%ij?UPCwmGlgy5yj+I^&_HtDbn$)x}ELv zFTfxe^PH72LlNC<7D*>Xr;cUPaYoYl#C?oPtU3c4)gbJ)f&jOpt$&G=oD}7P+s06? zG>5XN?cN(uk@9(Y{kaUESP&TU9I? zYl~m(LdKYNk%B11J2%GUY{>+W2~!IR_(5sOM08KV+K_z%HWvX2Z-O#JJ`YMVLcaRO zibVPwl}M9|G%ugS{j{oV*_2dbEzT8YZ2B30jvRdrtoW@zV<`kQQr-G(R8sqqc4zzG zU$FJNE?SW&Q1ZX9`X%57oGW@j1jW70}a zM#MepQSzBrF^+&n9^X2F0Pg}!34_1Id^*M1xKZGu4+L0MMK{mroB{oOft$^r{s^WK z(#XiYxV?uru^WJoXx!S4{E0hr6q|uNa}|%RR%Jrrs?*hUCPLv19SwTX>SjptT}bDl zXe6gz1M~4|qWN__y#t=!=erKzI{i%lwW2&#z382)TBI4|oV72iFvj#u+Ep?-D~-ym zJ40?9P{U!mx|tmN+BHCzEq4?9=hdB@z5S$TP`z)@<%{oFxd6q8sGDPy!I;Epm(I_X zRYW(a9s~5gdU!}cBk@sS)u00Ic>A19Y8X`9i!{}q`|5dRB;I71Vt&Sf8d>>>lG}-2 z_o+vQ1T^GzejTQ_=fSr2jcQ0N&mzqM=k`Jt3o%KinVJ{pYuQku)ENivpViIe^nm>U z`H)Pvqy5Pqb>{|SR&FrYTq_&(I|`LxxRMo5DahqrSR6qstXw;hR{gATto?KsM%X>M z$YKO8pDn_OYgJvm<`L(dwT6t`D8c~3MikRHNUjV+?!F;XqXdm>k!HkmhXskGsM-~; zTHTqv#W|Bkb_V6kog381%oEVau}5Dz(r#{`W5gDbzSwvuqOL=k&#mwHK*3Z!g6P(R>nFQ>dvMMs+Ea$OYseOZR7#eEuT!@aUR7$m!qT zry=4+^Dw#iV)faKW5+L6pWGAp5InRuUW#jG)F3#8%O~{t^UiWY`7L|k0=0+a52-i7 z&E_h=VOfA1Q;gKJ91_l2$c~cI`EEa7DwQbTG#{E=zTC>xIcuDfEzFD zpwA1LwZp?>#Bm8WRY>DEb-rwss~JAps57@F#H%^XZDbL_B>&jT<<&co+w- zr*p3h&cX5-xm|shGs20)zpB-!y5L@zm$OEFg~@rRopV#cnpf8u zY%6(yp&z)KM&je};azDt)J;@}wWC0w##iDUM&Twn)z8GL9CnE{8<6XyDkE!^(&ZjI zN3M{_&oGS`1l`EF8{WXUG%NWwnL2_@C>Z4K5Czu_{Sx_2pBuV!=*FSSP-N)n(7~bM z!9R+EgD(y~F?ee59|x}+%n$koFB?36aMR}BZT`{buWY_=^G7#dy?JW0YqNawIh!{O z{AS?!fyW0vJ@Day)<9ywF(4fnAL!on@}}=^`r@WfZn}BX+@>ow88=r-8~bk)1w-DT-|N7s(7_3MAN{(Ce(Z2iqNGi<$a{Uz(SiC!1|m+0G~heV$cy;oFP z_8@ouO@rb(fpIyd+ce3{RKz}`WG-VA=Odrs+Jm)Xm6bMP@zjFE<4yVFJzrWTPlGQv3c@)TWKx1Rry}Jp z)I7eTg-f@{`H@(WEe5A_mAG>{kl6IeF_bGb5^5@v8w6B~`G`)_r^Ef|B zJc(?an1h*|id1qLwx5e<&-pwd9sCu@Z(z(4i@q@YLB78^j6lXhXr>lZMVr;cQ6Cpx zn)B9D)q+x-4kr;4=#ckc#P#=j;{jGz)_cp|R45%xoX>@?=DhAwkr8J?Mw!ji$iy?} zaRKCLPZgNRY*=Y7WW5=m#Pl_O9H-gJMx&Wv$R~?CrsF%)e7n?XSU}u51O^k)rDt*) zE^Q;{DVF`r4C`;q%V&K~Wx9Ka`+=tzsj`u#yw*^erp)n#^E(_DdSY|(mRPL!7_2Np z`?pm1?$)_58*k+7Hnuu12_?m4zTKQzX-sydtU(l?d~@hsCY7iV%amFZA{ z8Tc9Bu54OZy{IvJVt(rAykfwa+^YdZR$z0ALerT3yu!=m_ z?2dct(yFWIs;S~GUvV>yf?dF-yIme7TkwUZCi9LgYfiaeF zNhjYv6G*YMULP{`6;rW{!r@l+b?4Q(@nMWtHKmE>PAhBL3peOZfh}vYk<=5>w`yN9s_rs=K&(I_3I^buNpD zh%w!ssWfi@h)m$(j@G+8Q<@&IpTyt0}WywA+1t~WfnDnGA zPJhr7l}jZu8yB3Mn^d_AtUe#97?Ew)Nab{c-1w97GT6$mGEG-=$<}moh)dVWO`<%h z1W`Oji!wMBaOd3L;QBin4T;ph5O?{5=FF@oCELpj2S-CCXF_^iSZDDYD-657#{VE$ zlt~Rno2e9whbGI)AeUy7L;844GNou#>eK0Jq8Qixj#~$Z+b5GSdDa&&Ml3~Vu$ybP z$LGvbMPCbnvelAnL2-oNFMCW} z?2gHdB%70YJT<+yG@aJ++hy0!)uqXtE86fhZ1WApQHC4Gmd{iechX;*j5!RmbJ+_` zv>oejOPK1?TEk~8IJ|5+o4w#D|AT~1Ckf4m%#t_&Elh=BE~PPNbLyw0%2X|gT#AaA zElhrs?{AT$m}D^R5l`9O^UmbCT*`0GCR5Bx($Tuumy#QlmgJ82^8KZ9F}qN}+cOww z`CG-5KFSls$R#q*DVr*LtE93dRkK{XwFU80nNdtT+-9t-Y6mX{tSwuOwWrM9hTPZ8 zC^9UUJeRZ9Z46uVt2{cHG$KhVcYKx~XHH^cYt>qUwJR5Nj@g3vS)NdsYp_*IB_DCQ z{77k1{hV*lO;%xaooQ6EHhF2P7_xC&Y0a1dMnl0Jlvz*)CvD^z*BU9+S=L{#*lk{^ z!YJXD0qdkV&Q8wEDdy_4s_>Ld@*+l|^2e$x8WZfUj`1sjdEc0H8I~OtM zCzXlZ)V_1bl;jgDBv#R`s0j|HfqAG*` zrIoNHHSM>L+xYG&XH(*uvD74za%{3yRDYRomseA)%IB$0NgEBzWa=Ql45nsN!AkPA zz`Q+TaV}U>nqP3^o2Ky!)}_ZN!XLJt7@`l+?+8w=${4un`HA- zj?lbr&gL>D2ju+$(E@vWVw6@aHcyoc#+vfctRVwG;uM49> zER~pKdY>;IDHRl%^)h}S=@e?c%d<0cjjSon6b88Dmz<&1h)EhoTW&5kKc!MAHr>GW zH?*eB(#%{F8H(jrzL^^C=i6&VFB4=O`C`i12rj5(rVsOkeB95LBUQI2uR!@EW`Y;E zhP)JIiZfF>SKNhE9m%%8@cpMk6^SydQ&<91RarPb%%2K_f6h4{&Dixxr^jGVcfHE3 zkHOT+BS+WdaVV_LR-ECKkcFJVl$WypP;9C^ZS_f{l5_rzA6||KzosmKlFts;j3cv` z*RJ%1R!Zv0vvONWuXof^m;HnrU+)RbvhrLyTr|xzLdqljI_q_jd5KSzGETRUOX5py z=BJ}q&f1YbcOXd^=NF@JZ?!2QtgNEw;vncpg{H z&9<0e)Z+_<=Vr69wDo-M2dbG+jm<0L4YMp5o|Lo31UDa5+7x7sx+&AltSnWR?&7t3 zRa!MADNEfcldI}$hEj%?`C;BHth>;uth?p=Ji+FOO7bDL?pL&|;`zk-FZ1Jzld62s z;*MKqompk_=-0UJ$|e$7D}_0wRS~V_0_+gKhsya>E>iJ^q_d{kv`1mE^WBqfmBf&6 zMQT=@I5{-@?Oh8w5YVAL>rgrn^Tk( zMn-2)c#?9NZ@!W^$cq?7&}U>@B~yMmPNMg$8$7T3)d6GQoxR`buZrH&rJ#k;k|Uj9jKWyqo;y zPoj^~+^hX${}t+eRdbu`wM3@&xdRF8Y``&eT>qVt|H0d3N;GK_|@Bn-$JTBn>cs|md#K7uwIW8EQv;3 zYE>A-*6_66F*`-$jV6W!&BSZ?SqCj_ce@=_YpL^Ehb7?*N{MN`KC8-wnBa6Pnn4Ul zXTcxzV!>CFxHyhw6r8d479V^7SQ6k$^5*wiJ^0mLfS)jIUf>{D--I=w?%=1`}$Y$ZQQsK>_EBFFON z^m89PBY1JcIae(wd?3Mt1;$sM=Bqd)WNr(Jj6O1@26*=x)b@kdJ&73Ab3T2z zk9;7jM#2Y+NG)TM>DcvwI_5M6TR}1(5YU`gPmHcf?8FoB0bhl)x;2g!;MNeZ$}$_-if3UXKFoE`G<9tN`a9r4 zxllXOnWTSECKw!?@Q0Hv2XGeZVgWpC+Cjy;0dfPFu>B>VRq8=bhXz`Fi-_qMx# z-Zdf$^nC#F<*>Iu{Tq#Fk7|)(PI5BMZjXh4sco8zPbsIQ2D6mxtKnR-=5g{_gy%@?badCn!)SH}(sXhf8I5`i->4R(`FNS$eC>o7v^rog3~_z8Fv zI)$|6pO@)#fxOEJOM4y>lebjWLqh@@5!HXq1*^7yRi&nE&mx5Z=Egzo_i{n1H&)Zm zg0DEARnRGICoeQGj(|q)@)t3smFysOlUnSPixmBotMP4e8qHA#Xet;jlKWW{Z*Qk@GAAMcvmi)dO%iavIRC_$W~-;wq^-iNDVJh}+k`t)DSK7Z9(X_eJ;UYF6atccOjYG; z#3BwIx$9Q^?B<)m`~nj4L4JA>x$~(5W9?txME`tfkpk0lxgIK6G24(7YzT!);UOPR zk&BN}?qA(Zs?FWV>i$~Kj`k;xQHNDx(S;$nz`^=lBjsg7&O}054<@n>2?^YcZ5KAv zz`@D(b2qCIA(B|6=)c_0^U|=r$;#v5xw&{*r_iA=_bvFju$floo@_sI3qFAKJ}9=2 zpFnUnf7c23oMR30gAY@`xqxjDbDqOxcmGG#?mgFgKXeUZrZ4O`Oa)utB&83Xg(2E6 zif=;9bL7KnC;7`q;oU|^anspKwonWrA1%d72&65<0FX(ya{uU>RPy4J$SwZRYZJT4 zr#^PpyWnph!(AZc0-i&jIJpLgv_;ok4j1=rA6L`hXZYJ&P5``z@-Z3&Y|NsbbV1T# zunSm*Ri060cg@b^nDzT_&x1>@xm7)|9e2AVn%C!m>?w00i#8gd)wIo&H7AfJx)zZz zds+-#hjDVzZD;jvUw51O?z3>b{r0nPe0!LPZxWF`ci>8-#WY$}Rj@S>4qk8vkPH!a zHpvI?P)}@Ii+Hl@t|MgMueW;s?hSaSx^MlNQTQi%SEBG&O94(m0L6Bd*yzXx-uHgr zC)Mt~*9T7YuP}DP!b%lVgV-l6&COP0b18D_Q@Ax3?gV2CY3;inI|{}Q-i?@xKYvm^ zIF`yfkt~jgbm%2cHWm&d!8KavMv&a2-ZHvo2Qu=zOC98%d(O&}Z`=c()YWT+0y{Nd zj%4F@76w{6EOJm+HzSIB57U0|p!K+j+`0soM9c#)R-y5s%sNs|7b>^^)sZ0mXh>qy0$$tiKQS&`Clkq&!5PNR_47Tt0oPUD^j@af3ik+=f1 z%4Dz!m|5fm!MPQP6+5@aex;0&pMm7Lc4q`4-0*i7p`((`;hov_j=uK~7)5ivpYG3g zztTSU=;iMejVl%@Dygn>e-+#rl&3TxOrXxn-1Af9<M=Wr3ecvZNETzNpbmF)fRgO`#2 z-1v_1Gv2FRkK($2l zjK(t$ccRvSe#?h#*NUb>iJf$q6SYKLH;rJS$NwFB_kqu1?}Ri`_3zP;Bll{1+An_= zk5+`gg;oX7m9JNg&ax%z(D`?2oVslp~FuE*4y zhvJ5u$1avv64m+XkQogAVSL%ukKxN!Q^@Iyip#l2!GBkK_5@BKDT2S!h1=2DDx`M^ zcCam)y$C|@zOSk;M-Gm&fxs%%w@u=}r*g5d84nD zpbU6Q10o!V+JOQ?e+~KfO~}8syO8*67yjL&Pp*CvVxN|@^0F?YxrBHv#FqtIE?PJC zt|!$8M%SbPf8w~BJov@QVRGTO&UytO`9g@Y2G>(rCb!1xN;P^@9zk#VPKb$n%wA1#_l2T%$8N{loK64fkzC-<^C~ z-8bC#4}<54-rfEDfTe3s?`Qi92np+gB6|F?#dkr9aWP?2KB+z@O|*RCn%HJVWisy} z%~nEw3{%uwNTT;`LU{52)AH8!0>qDUkz(m^0$0xXnguo?mSh}Gb2*#Ew$t0Z`*}zW z0S(wk>pS=l9q|ACr0_%azTKfkigUft5#ENfvQnuxCJWY7Tsj*gkNp-xvHU%}JyugV zo5Rr`)DO15^*y{>cL5iQPsMf@J+Vxd&D+A>d@wCbkdYs#$M%XPGKJ#J$UejBUPSc0 zEn@Om`rrt8K;}Hs7JpYgDB5|&%9yK9IDhud&#ry;xrf!g&q5p_M?ASA8vTigJ`+tf zboTr#V`e)On;2Z(3Opv@Od(Bsy#2l(&;i1W0EW6@Lr1m-43>yaB8e+)R=rN8nkA3_ z7RT$+AJX^qY7${KAQ|Pc$%}Tk_xy+xi$KQapJsy7%pLME5_$pBRY2>U^iDDg*}Tzv zwEfx(>P`IXcAbCSI{#p90K#(py?rnBe!Tl{R9GG!zutEO)mQn9&DFcs+0O%OZDsp0 z@lAK)`SQQ?`Qkf)%9{KDtM`fDO>*sTa1>XQI$PL&@xgsJh)CeKP!|94zX(o6X0gi> zlsRchJJha*2$48ZU61m_D3QLV9vNM;2Z_r*fy|wmI<~AK_kfW%1I7Vyawdh2*pR1Ie5tO=C zSF-TuKfgWG7PJ=-m)*g?oOMZ# z{iU-cJ64uNz?if2FF>t)9lRzWb$GTt{DTRkX772UvnF0tQbZL4)+UJsp!=49XJbV1 zbISJnRjg$7s;t!+cR=Fr-Y*^1GPzEa?AkYYUhmW0ulL>4-xzSBBGoon6;z89!;I6} z;zoA$u~0agR?Nrg^|PJ4XHYXVB%qPg>Od!xn|$RObq5m-w!R_FIeU&r7J;tD z%c?}tTP#kp)8#}a*+|J$D~ZcYXl>o6ll$7QXdTz1wV;pSBC z!kh#&lq+~YpHBExmjJm`%8Zza&&}J-v-)@>o8ZQ|O@wg-G#LDKoixck z?Z1lXd}51JD`L}OQ7GaF7;)yZQm!o~FJL9pkhB<04-y&=E$7WK=VKf8mW$ z&D|pnYqOY_xRgr!oH!LW)jQLg7!ov-XHH$W@{r!4ffx+vAo`qQC(t3HB?RfiwuAih zCihYMc53jDUb73JHty2CEz1VEdY5MN_PnWq3ZSJJRnzjxmb2tT)zt#>+IMLt#?~g1 z5x>$w4(>kdhacOG4;OL*&n5QpHMj)tXe)h3@6|-M zBj+ZSIfTIkH1f=dZ#iT7kY+h!`W;k&dlr$>!7o)TT#3#y0dqR#5u+|clw5f}PT$@G z7*IeW%w`~4?%OWk)4uiqzH)qWu?V%7^A^`KGPADgFPSA-gdXdX+`K+^iDqQ;DiVy% z-$d;i1BCc%mtc@xp2hOYTxEqj2J%hP%;@pw0DkBbsyjG658kI=}-GGT9K`Sbvs*bduJ0C)m zPghB=8}RgB-TSSs^H4V>-FL^}dGu}K?Bwn>F=y^Z^(JP`W@*ip(3i`pOvToDaMFAg z&DO!yG$e+Jkm-8DvI7pUTQ4KSM>HMe5L~NAG;pE$7V8+5%R5dxO$i$_8EII30dKWr zPtu3zR#K8^whjwvt2M#dHhi`c4c^SwubOni)T=fs4q!Si^>L#~Xk~`ZPG&wnW5}_NnpCc$KN};zR^qP{pjW~}BqQL{@vcz*x! zo^8D^4Fvigq%thtVJr%z#xYiXZqnVl7p6O(R?A&s0@&K~)pb02bQ?s8W|^ z8EE0On=({v5y)@6SB=f5{c&k5P^>cZzUX|tKu%nRH}q$9U??FC=DGt%+oO7DY2)4{ ziU7pvA&Ii1fYO{ZMs~(hnaq_*brwThY5^ArNE96b9QC+%cl$#Y$gpw4k_fvO?Fhu+ zEb607S6pec*I{flp$*$L`%xZmRVyu3k5Y6q*QnPQ5dx-)Gaa>-^ zC9)RjytRlRuIa2ao1)K+t>hL1PTy)8IrhLyfF9eZ-r0WHz{z?Fx5r7Z=v-vJAt{wZ zk#a3!%1n2L86`b7NI?OOoD$v3<$kwaHcbebSxf8jXj-SoD zOgM7_5;--{eF4q&-qHS|iJp__;x*VT&ICCrSH#S0Os5EET6#-UoZvR=)=7*bppjG6 zV^C%-Kt=oO@80YECy?UKzeR;R&2zyAJ!^15`_$9af|v4XF5jNF zqnvvYIu;@qN=Ot9#PTsC++@%BG!xs_A`+3|mJXCBP_ym~XohznuM_|`u>A#K_Cnn} zXDdi?zNF-dfaZd+wW;Lv`1tqqNL^Rva zmx;w^|dG(T;BbrUyQ5`Op2N)RQx?*{XFlxhdTUV!}PHcHAk^Iku z^+GNNhP)?+X*mH=>I`J_@ZmM_Z@f!WS)`KI>8_2E&!NlM+Fh_pcf-3;J2*}*zFc$G z4ARS?l?k?;V~J7XxB?t1pmkV+e}!P;un3i@fFwRK(@-;QGk1T=&;9Hq#S*Y%Ju%CuYC7bY}_2=Og#z+l|{ zE^pZVlT0Hqr?W{tlKHxvdp8?07)(GTukO-g310sWo|qYoGwxjK!>4i~GR?AYzE}^X zLe`Kwdxge?7x$y3X*%N8>4XdX(pzF`(?`PiBuIXX5Psy*h_gV zn1F;jh8JDX2I>N`c3n%o_#SQ^=1|EKm!ia|+%7XmZJreOwA_`$r6{10W3N2NBPG;w z-1lt6IGiBXC+8&vX*OFcni;dx)8ej}+mo1yfW%>%T>Fx!8$KA__Vyb|&5`8`_L_D5 zpBT7&@KVt=Jr{I&dVk;d1ifIVU{!W44dJV~yF;EfXWVtY&0RB^eST}2JFf4jW9?Rx z0HXfkiB7HE_6O^9Cp}9P?uuKxwB8ymvUR4_C`KemhE#CFyl)meDWH*azX|pJ8iQ`U z{mWUX72~cYSnc`QDE;Dy&s~F(C2iF0J|#EI@eB48MgGZ{xOJUD1$4GoRf=8BK|k*OwOm_#tbJwk&8NlTb^TZN-O{yXa98&) zdLJ2(iVoAK#ra@R{}P3fYIYQ*gf*$k`IY)orepF=cCI;c?J>>Zkbp!>-K*O_Jf`X8 z6{Tx$Pdf@W<`C`X=CABb<=@=4K5aUp;(FXQ~vp zjGJmy0hE5m9Gta#(eT#PI}d8Q$`5$b zUm3{eGpB-#UN!}kjKY-1QzT!%5m&6BndmHgo$W{N@K5mL%-p0I=bpgp{=9B*d_dms zUias|YWG9EA6fqc>LK~b`0?n{IWPfp_zH@AD(3Q&%QPN6xtiD%h_-3Ta{&(8#%I-I2EaV;Tf_ zM^TwE!q`WbT>In-zmGGzKz{9M?K?RHPL z|L0Z>;yG*XXhI>)8ts;9PLdHLfGKdhW@2!4GkNe5i>v+I?Ha#mc$P^y>&ASUne;hL z(@_~w-2p}rv?97Uf)R_iBGM;25r%yi)cXKk|r`1HnrSg zrxXEA4FnDVOeR%y8}0NUY)9;rW_arw9Y}nC$lED+HzaNrjn#04ZE@$cE-ziO@+UM*5MX>(vLLDSy1 z^Osd{}dGkNbq09+6HIN6QeHui$1?HtTFPVT+`>Kl8-H*bpJDE!ulAc=6WHffrHX zR2I$q@E9!uVHb}+mS$xT?;GI7b3Tu!=vg|PezNrTwgI@hn$2UZjaK78nRq>(x`hU! zMS$fSC3ileIWW2=je;^wl7nA3yYt}-n!ATnIVmzQb>-Y_GbwhrI@iD$;B>K_0uln{ zuR{U*OT-_9|KU+hY|LJA1+qD(#hyi6FXAd~;73GN-t`Fh;qFH@TehyzfgJne-ESj~ zmNMUCn%*yIa>&}S1PhpyorHK_!u;93HClOk*N^)kzkU`Lmvo-$i zE4ayb2bV5{2ZsxzQL#?zjJcXj%Cf%VOqtyII4-!=jXTXk#+IE%cwSirVCM+cue3rCa3t^$tULr-bEq7l!!^`Am~%2@x^ z>pZxRKhjM`E~u(#bO}-td5c~yEU9FDPK7w(R540CpBRO9D|z<2U=9JPed@t|xJN(p zeT{qkdd~@M-=+Lzyn0nTOFc%eeVS@st2Uu6I)4EJ1i!0slh?mbucR>IQH=#M`vmec`3pk8$ULK4ehh28fYjmfus9Hsh;WQDNC7CpNu6_|Xh26; z;*^cv-kf`$(dQ#f0ZcHwI3*$OMsaEeh+=`dO9XSin7Sr0%F;WJuE2% z93^{V#$91y&7#7)@d~}nSJPmJx*U>j4O2izIQ`fE;N^QfyactC&j}J72L7CU;a8e1 z!gE4Sc|Awldwxy5AD$%&(#gH~YN}!#01FLWtzoU$BzmGdA1CeOr>R$Y6$v4sKb#=i zrfPTlFQ=*F$z^V~SgFnumdf)XnQNXGBjumsy96{6fBB}4({{Z5^iQeh$+H9mNqz?A zhOw?=8~!P0%H;`Wi->Xg1=M&!Gx1*cB}g=pYFE4V3yoVej4blftUPBlrc<*CqYb9U zM{pPY`j?ua!PO-4>gS&77+ZI@tuIj*iF=8`ALpL>Qw3eF&el`jd`dBw33?EsLp3eK z&+rif8aZ|B(=<+JXZx<7(P3gs6rXfcCjwA-X8H4c>&t7LXL9;eDsB5uFGDQzF4@vL zQE4F5_u$~gU5A0>dwuVJa^C+v$L&i}Of}uHo2b}8*u-XMtv17qT_GuR7iRhmoD2bp zcxynjfAF|>2l?6?nm-ecdH$vu-wQj^o4|dh{8Y)qgwyFTW6q>Zs1Jj0-%7^*fakuD zh9Z4NZM*&l&c3Hwu|F{v_QX2N0}>tYHSZV3Hr5Yz$^IsM39J}Tj!*C-D-mjGtS z8%U8C9-3$6^;o(-WALZEaAMM_-1#b|BBYUHTDiLY#;er5 z3Y4AjEOy5D(w{LG0gZYVJLt^2+UNX*j^kRQP>r04r7X>vRFbH%5SmOY=cFOTH_^FN zeur@cG%|AdLRiENvR&}3B5A1CJ{&gB|;ayU^IhbD+nqfVKV8SX<+I{iPU|Y#A|A>=bUrmEc@LOjfc02xr ziSdk9SvL?Fytwb)-ecAk)ieaty<$R{VdzOx@jN_DfQ$_&n$tu$>o5kYQ#1qI zOW#oLX-78VlXyFtOSJLPfl)yC?qBEXy`@{b{vK*skrVf@cJqiMp9OqVnaQ!UrN)dQ znj+_pYDdonYMn}T2G*@X*pJUEi)_)l$X~Z<5fj_eu?X20JM%h}6>=5v7MG&VOOuX= z?D;jRL^Rvx6Reg-wP%Zn6OCz4j!&MLgxa~k^E#a>o81m}Ug?}`xx|HxlKu&R`;KXc z2UnBGGq*;TGc7)`LmS@i3WpF6Yhqn36pIYFpn0GYN-IeAVSovVO01Ng5h=WOXL9Ty zN*n#%kg<+lwoAKtixD+ejPMo*bPO^Zkb7n()$7mSO757{ZX}QF(hhBXYmY2>@uD3^ z$b$nOp!@FDp4B(ITYGYk|AZM@*~PefMhybiTxQ$nx15D-`7&MqvQ6tI`MugraFhon zG)>hB$1}p|I0e>-8l#l`_bcVdsy;(ETeJ7cZw$PRh&n9KIY9S40Vn`oqs-_dIh{0G zkxWN?Mpwoy=Z>6xTstx>q_ss4=sS^r+R5!4go2ZqZGe^+6iFfS-+$@cG)2!PPVxyfDGx@IQ1u z4)M5s2^-8S7b$ZE8Fi_GN>Q&nt#cMYlHkt!!vsX5fP}Ifz{_2R%^zz=4``2wc2nd9 zPNT9}9H_J7*2!a%1ZxOJRNRCP><6m|Xb4@u7GU=@c;&tOwLmv_FPT=x(YX>nk3?27 z%v9~-rj>~PfUvo*9mIr$6ky}xyLhboZS4y$q#qYqvO`Pe0#8<-UG7-pLc0V@w3^g8 z*4(rChnLU|iY@`}fFDK3D?A^C53RvRMD)_+k@mxfutQruysl?o->Kdg`fm_@c<|DJ zXjhyD4z$2RjwKI1mkWVpv1ANm^4Tp0TeBGP+$bm0bjXHyLCuFBB!p}2kFj(7XOXA z$=|8Qc$Y2F%zaKRkYtS#okSmme(TeR ziRTkK9wLZS5{__6f@?)d2$ka&v&COE%)25XuRcz{ePT$^N*@35y$DcIXw#x$zg6#_ zk(OuXnih%I&sMpQ+o{6G2}tCbUDr*Je~_U_NJ|B^0@}ZOg~wd^#&lAWa+!mvn%kHu zu$@H*7_(|s=}AF1l!^>-aS(09K}4t)3Va1#S5eH(N1W`;RHMRXB>7^p^DU#~+YI(m zK!c+8FZ(-~+60)|JKC4BRMU`qW+MTn;?P&3nQ%pyFMi|_WoEj-}jk;NdI;8QSq+M<216et3Kr%TVaaxM!7dBOB$Ul zNxHNXgR7fi1loLH1yE!w`QY4oc&Odlf8murw-zr8&l2)g`9(1J>vJWxF0-4xhEy<# z8tX4vv7v(IPL1`Go38C|qhj#8MI%5j^;(!>O3|=pEY2WGY<(R1#)$oYR(MEGto+nI0$X zM^=X@w4XL;161invMs+Ct!M!y+^r5jlNOsY3E=4;f=+YKBxdy%(#SufH0~3erRyly4MG!{m#D3`saE{^}($>2rA9|AM%C=nx54aw9hfNSSuRV#TBe0 zfkM{W9pkI;%msbOxgYtZru{)LRckL_N~~O@ws2-rCk;oe$%HQ!ttW~1QCK5>9Dvjp zkcjAa*T}hyzN0}Zsy$0rtbB9IRL=(_p?bq(p7oVjLxJ0hO@16g0gascHneQG+;_Bd ze#i${Ig^+U_pFyAO{NThOuKk~Rwo7Kljs|m&KE+Mj(~*n*PrJNu6x6DI*BEkh{-{Y zNK+1L6eW1l)|#ULA!DuTZ?MF71%4-NrZ76r_On-LQMFZ-(nk!^ znZ$fJrkE|jwN8}p!cTy-=_Cp`POY}W1Aipkwij!`F0~vOHdFn zTB4=qZ43%iu&$D;NWMG;hWu4RJ3P8(4|2MH0q(y0b*R>wJgdt3Z%OUl!-7rW_p6yY z%YO03L(h~pyaP@pL~bJKCTx@8Drh+KUc53wIXXM|VArIQ_(RpVr?I14>k02NqL`}$ zcUqnnt@MiFUX(-w6f^}Tyfw4h?WB~|4vwweg_iSP!9B}sw~Pf5CtA$AEHRqXjG#kX zD`s@%xN+W{*A8!8qXX+lwY2gp5LDP0MHE9AYO(=`mjofPxy~s*U$Uw& z$(mi;qVIhNxq;{8wS6dXuiXe`KZ=oP*%4O}X+f}}!+IP>eO`D7BCsD>gym`yO z{|-F2{!;^=8@P4gs)2V69341spnLtHO+VlC#QNb)_w}VVeQ;BGlXvJ-n@Q42A zMGyCXq5l*83;l_HWB){d-^O2U{PxBNHhyU1%=)ix914h98|52!^!>T-$9<3X-ANw2 z@}l#iqAPkY>K*8LrRV9Mf9?5b&wNj$=dzyh_4)2Mx?k-6_wG-MzTbUAcUJWAZhQA7 z-Gg1f>H2QhzjdALYIMcA)LnbK)~)|ZpQZ1*p`Q$Wbyd}Yb$vv4hiUivJ~KI2$DF&+ zDj>ax`Zp=mTaO_0qz;PrT)|P1%USX=3r?dR_;RS4VWh>C zgVH@0ab(~edmf;_MikONA4wo$4RlSalW1f-3LA#mAkOujkGGnSVzLTQ{;V4F3XVwmY8O)qI zjZye@*UU1tMX-2?t&ntAWQ4RD^yq^oF!n=1Tw(lvu7b?THCMT zs6OB`#LxmGN*=-L7FQNrB-z~Hsl`}$AqvzYEOQAi6x7m14W;7n^fEb`r3KWA!QNPv1kCm6X95Kyql+@K(`GmgxopSBtv)sH2^T%>MPU$+}IXh zHo5@kma~;qG%~(UqvU)0cxn#SfKX5g$UFH=6P0&?AZcst ze1fBTfk{C_!|_kRS8xX4Ap$^A|7|=KzoDlBkczalbUrCtpw6SAU-0AxScU<@RuTE> zC`JTK$v~mm^}9EzX8aIrWJLBlDmuAXUvccZW$Ie-BYpqEQ|oj}v9JjV)H+~!6&hGi zwr6h7Lg$ow>rT|qb{h*Q$*nKI>5pPorq-rU@IOW*gbDHdA@Hv&>k62}2!Ce=Ht|%P zW5^B`iIgo9#-J-;6K{Nmry_w78xY7M;{nIGi^GLw>Vh**`PGRKh$sv;u{=sL zWe1lJ8}95-&Km z1&G8I=nCi>n|P*1b%$04vctXru@S?c@X>t|Z+w;iF%nJ-;AmZo?iB!6By>$S{x?s} zA!eh2_^}G%60aG}$p;Y@geZ?Tc*$i(kvBbY>-_phZ76DZ@TvvMBl|G=iQuqj8uJ=zo6`@7u9N3nD;)arExV+ieLaCn@ium6= z5XHhFd>b|a|4qS$MtISL%P9{lY72Qid8e4BHxJ5cI50}hp86;>do5Fop+gja5QoEU#OF|9oc9&if0?H?Vn*`< z6oDY-6@qxcKuEgo=Oq^vHc-Pm*ABE87Iz?=0o}tKd)Vr+fIbfZx(2?ujFu#X3s2oWN>av$yt>^-TmJX-NRou+8tqs}%xF$>mm|ePfx5 zKh!|T&>jGC~Oj`Y@yb69sYC`eEETmbngaZiC0sN7?ue9Yn z{>Q-eE6_UtdK`AF6~s8UdKbTkkO{akaV-I;OD6`BGX!oZJIe6C#l-{F6i3t&!_+RfsMY3=*~|J!^F zDjZ<3=y}3pk4EmqvK!Cgso;OOL|Q>y=t!=$nVkx20 zxLOdbEhhqr?70!op00(CHjiZj$F=Ox;=!C2`b5;(71~51i^$6)?0^SLYZ4S@KOG^GOEJGAie3Wi4aR!47&CDFYr`}djSDX5I1<; z&^v&_W}6x#@nte}0w@-Mp`f=GqCqiD*>L9$z#qmPPX#sZ_?8!X6Mc$gn2iShw@A}O zmS?!LJ&+ObnHdYMk$3S_8iNeJFfn2ZXakvrr&Tex<$spR_`*7U(IC7?jKctK$TWsp zc*uR1dOV*Z!+*P>r^rHz=ZjQ5fszHFwH9_B!enoXj)G%OgPRdjig#6jiV0wV<4PaC ze1+Q4i(DAn%Rse<4(==Mm2+Mw^Sb^Vf{bn+Far7dr(G9_=%djnbd`1wEOHckhI8RpW0jCs63WX;Mt{l| zO%zG43X8CynVkB~d9aADWWT*o)w)E(c8kO1Mr{>SM(PPg3I?K{)gE|jYbT8gIec*0 z&%z8o9$lKkvUG7dN1@DQjKwiX6_v@RAq9{?EXxZG_zM!NN#xZhP57MI3wO1(O;~2f z!%L}^a4TK7(q!3rQ%o`$oeB6*OZyu5+Is3RD+)-&yEq}{vO=cnSX=}F0M&;#D^6K0 z0XbVJPG*ZnZ`RIA$+_=^39NM$;u!=q68A0#az1|*wJXM!(ktWC+_HF6YH(WeC4(wa zGoWtiHCR+ZGjRWdylL{GYqVa#8DHrcBBT4ns`0>y7~G_nc3ixIb>Nrix$Cgw0#av* zc)XeiuGe;e!9pvcn}UVttkKvxVmay&o&obF=+#-Sw%BkZK*FNeQP2PNT0|Z~`9Xvu z?q{eeVINYNA)-qrZu2DX)gtn6tsdl=`~QQ2gsCRT(tFSD{J%ka_lRJ%mv`dH8?-}f z?gVc!y!}Qk!VPJ8S||!Y_JvJ@zHDJc!0D!&xs{yre%R;M?m|v~{h!{R*^n&Uga8QK zcTmBgGy!j`gR@A%((tP1xbJf}!Em}}7b5z~>Fpf;|3x1->pC3&0DS%K6L1Of{&E5P za9o9IxHp441+)%pEr(#nMEA-50j;joz1#^@+5ebHP`_P5wpZ9P03Wj7fg`Po`juV*t{Gr{Bdjt zRBfuF;kizqseo<@;JuH3$iP3s5W6-NLCn_wcSd|C0_9fi;Ha5{JvPFugr^r?g-}pj zfZNBCKXj{hblX~V5)U?D&A-Hn0F>L#_PylzZ5^h(a)l{NQ_)gh>Z^qx+rg9q+N!wVJLoD<;~Y!XOFY5?cBEQiC0f1$9b)_WO2wJ=Dc0-@kO1H$y`9LM zPCiA1q9H3p5nR^a?63BHqMKCjJMvq4S-bZjYy?z zLaZJIPU4*MY)u&|Nuyq$K4MSB{dpPZOu6HJEQ^3fPCo%ijpeEkZ*k)GJ|3yN}+5%dW7RMnpR=!O#b!JKL|`1;^p;H*uJ1W*2bu zyy^dsvF`wrtSZy)>YS!~@(h!hVVD^}8tSI1TZE|`y1H_%5*cpg9J{)LXcHDiMZ&0D zby*Z6jbRy4%T*S|uqwI=x~v(&fQl}Hu37PaPu)8+OwseNJkQKCobTLICw%8S>HFT- z?n_ymg)opz`b*}9_a6lW@_>hYO-=8q-?v>t;hh1zS>Zhs`$cBrYM;Jf zcWFp<4$luHi<{oCNp>{;;=9SaYNx_?5_H6si!TSAj%-u@{mb5q=g&b||Mz>>z4z$L z$ubN4CV9CYoMCbC1NW^n@g%?Ab3Z`FD0Xl0)aL{0DXH$^b+uMG9l9sIP?SR3`)^MzhVin3an8)F)BQfJ~$^j~u#l={Z0gJZRntd}#8B z@42^y8cAj8la{vC4_jhG?5)|Kk&621C*ZGhrbvAL`Ta-4=k8JM>Dm4bu8nY!1T2&6 zh-6Y(Q)$X+(5FkOvbydjZ^>K5!UNdz4TwbjZ{LC)(qo~Wy)QpNd_=tWwof&Trrkjk zt6T}u&QQ3U^2YnMIiO-`4fUchK;vLOanmnG4~x2v=A2%&hyCc@rF)lAsO0Tq*F;Pe zMk5H6J8taw0)1`XCT1Q&Zw<)AJ6=!_tY&Vb_}sOB*)4wQp`(A0{VqOD{4V_WHc_ku z%4QGRQ*}08S#cWT(To$(;r%&#`-9N-K^Xum_QJjNPvEHe?Stq$*=;00q{vTxY&JUn z)W{WZAeozf4T)*+^+6`C#Ry4GUL|%Vo(3&tBNdOPn_-&F>Mi0czIJrW+?gT(0=*d+ zayKT%#QWdG0Ho$?#3S}b*V@pjvdmFUF~KO8gM6}`;wh_C);7Gf&ku-1;lWSCuZVc% zw!hdP?ll5ZB-yLv;*u}H=p!NCsg5yLK`N&BIaKLPk$BIZjk1gIS3Y;ts@QWcK}?bg z3ALNRM4;8dPAY45*}?JCZ`d!sgvt!a2*=N%p7P7^T-gmkD%p`eS@)S842z?tI|SBW`kbtfP;+;*MpCsumPEP!2BIl z>S510z1?3Srzp>w;#BWg%$b~-$~%nVe4x?f7Nr@b{{mdVULrd2!Ji%Nz3U5@+OlG` zhvt~++eWxqVf-hPpH#HR#)&`DHBbi48o|$z0{DWRqyZf0QN0QGpK6O))V&&$w)F&R zIv~P61>JWNjb^j>Ab&@x?~~^Q}#y8Zri6-LUAS;^Da6lWV0^a1iSc#`WJs6H{l(BnPoRM$V7F zNqkehYXnn9GLmJrHSM99m4ub=T9W*-G#DRz48;tH#1s3^lR|T!)clEfD-v7= zB_7eQ(Br7ffDBlt71@9FfyYUc7S{-1PpW@P*EgwVz3h%S%sif~mf>PZih1O_M>o$8 zh`>^yy`p!)_b@h+pYD)vX!u@474DdR^^gy!*KZpm7c+g(>-?#sX<6yZoAY{i!7F%z zzNC1`?~d-+r{dWcQ(+j-%mghvc1S+!hJSSQs!fB#%!{A@(K@5wJMr8hL>2z)PmaDE z*z>sh1BW~=X~{tm7lgQ($Lp4O>F=?sE%J;hNAe4X$9IlNzRX9dh@+;ZY+ znOu?L`2~+^_7bV$_5&I_g(W3M*Y9~8651LCA>@H@f^=Z@IlDnLJ%)E z)VI%Q^!SxW#0!6U))Vawzr<;&(TK)bwz-Jdm?gKF=hY(j zD~!`%a!+yhB06E;v*-jjt{BLTGj6;Ic_8jaGk8fuC%o}la#~tfDn9l0i~i5k5;+xY z&JE3-KVqJ|ZEU9^H)|XJ#&n!4tX{>Q8zXDLOOh|D&eXoXiXNFeGqJCdG-{ui9cvw z@nYZK$ro_U(5!7ng(ZXUjxmNZlL&U(DK6Aps%OZlY@0aoCloy(6NSgQL%pRx9R(g_ z-;ucXXB6gMJB?{%%vM3NtpQxNW5wnR=`(UYpU3`ZP=*L~6D-j_!;aoxo+nl@zD7Wz zB#*sLAY)sid~86kXG4ubgBLga0opT|EIxMA`HtRgf50wccVunTDTnicnI_G_bANGk ze6NOmaqP=rzNZeqT-Q7B7c!`kHK0k!`~rhYt0o$`LyW#~bp9m@EuQGQw7uR7N8O6e z*A0zrpT2b@I_sExaQs(_>*n^5B{z#DH@F5Qf0>f4?uXfS=bF}dS{;qGGvcNDv^&LL zPHX4p&J@AuvN&AnFW%L&&S=L@4#KQ zXSG}B2PIF%;Jw_(>hk2Yehenis6L#9)K?re2PELm`z%LvDk%i=8>`#`ysmyhuNDhmi9#51-cFkqjZ)E=H6NEIKxz~JarrnDBtogV%byYB!bu^c9})Wq{V zWhs|k*^rPmz(3cf-6p<%qjuBWnIiGPK}OYka-;TpiXARf2Fz6O2?6f`o}xIiJmQ*0 z{Iv~g_{?T4ydl@kAwG54>v5CxRlvYpwMBb27?=mPXbBg@GU_Pt$QbxiFlZ>43!#!z zzXS)_ejQ)A6?HsQ1SlNaM-`%byEd|eynm7RO1#xkF%uqY$#YZQKJ{9NQmox`tsaaP-;%RTYsCl@e1uY@er+@@(>N<&JHjB{ipW66D4_SEpTFJr}ofR zyc)km+PnUdKN8N_UD{2!n9jge1+JHP5GF)?@Qh=L!=7l{r6sPc>q$k0bq4O2&uXg* z@ti%{SzH~$!3;hLc(Vc;LXtR)!NbK2A5K_@gEXZ%y(3sZE0BPKFLG9$5a;%3XSNsc z0J;e0kG|Jh-^lG&0#5;-) zT-iH#1omoAWNrVcHRw!bKB?#LzThQ#E<(@Ikgo#yYve*L;e|FRopz>bqoUh(5?!*iGWMkCzZjnkCWA%#Qb+Ici?sp8 z#zdeE?0|eg@EUCPBu9ywOJHjTQe~&}OSFWAQ|GbmzN34}*qk|((kO2eU!_C?&lL4X zS;p-0)7q=fHp-9FXBp+5?#7+hf%S{k0;`KSTf-L=ZZklK0%&kIfq4?k5gprpNX4mM zj5)i0W>87xt`wE;w`>&O$7#fBn5yO&^|CJ$ReIb-oE2R#IRBwSMF&LU zV+U?M8Ik&SUP};@;4TGBC%|`g;G6_kiy#O(K{l-2D(=x}x124*!-_3RkdoQ1{=Y1i z_^QibC*T_g;xD}Tz>5Sp+ytcvT%5uF#DTB(x>6G9is-p9^$zjE%g@>Y*I%xE*QP;j zmuJG_73<6d0C*9gl)Xo_g!v3ePWdd@&S1JgAVK^o@kmkXPo%>LH)Yi?dWu>a``&&+^TV2JQ0EcyI+rC8W?%EUWT7wCG=8etpo+oz$DTrq>b$pkGO zUq0Ef_%q;531QM)V8woGKqe|a4AXbr7mv*JZnnaPqny()NqX~2kfzPnhOrh5sWVP6 zdXl<)+K$OLAj1Lb!+8N>d4f_$v;j$HTmVq6O(VBykRmw>6^TK^5Epm#BWC?CcZbkrueUk&nX_9 z_~68whr7y&YbR0@&IxW}@9@&Z`1rHq-x~k)_`Tz|k9Wp}@x^gUah2kh@pHx%W4{=C zZ0z60-X-4uy>(~RO1p6OF!ML zrbBVcRLF5$+!BcSa*<1<{HY^LkZ7?tOmX0E_F z!rr9+HmMR#O)l!`ngaD2=Vz;||N4=0#oF=lU6-1=@i4>Kf?a#1v{ZF63GWHH3k17` z;j3y_-Qte()}r^;p&`X9Nr-a`Ao*l)G+7@{VJDh1n;Y?HIJx*I=}W#CtJ6ZaN+%gp zI?_&>)pB~SSfD{Evz#&sp7?TV?D3Q7`7BlFa8xqlX)oHC*_-9`K%>a6SQE==P_*V^ zDS422yBm-+rqyy$Q{sFPUsm&&{DIA)W>(7iqSw+&^D%z^tK@XG%}aM(?s_(jy-Azh z`MHznN;g$cX(}461Op1%zUD1*?ztJP7Q}rU-XlPc-WwlYi%BY+_ zl*UrsZZ9g8zRF6~&KKi}1HYH@tJ6t@4m1m;RLYuOcI0jUDW}J14O6fQ?y^7YqLSI6 zAIa&V3`?mat|gDkSua^rrXR@Z!A68~G%NbFrdo{$h25Ve>8nPw+FVRiZH8O&G!lVs zgWkVW`ao55M5#*F;YiVyoH3d>?|eBu8HKA!)3}%`6|z2Ce*Wunx?_2TDdm$HpL@}0 z_j3ooC$&rE;8e6BOj|W8Tr6hwTqS2Wx6E{MHBDz*fe51x@VkE?=Qp^sbkY%Y*36n( zjy-s*oL`wSv8D*^iAI_##-BI*M#|2WX;USpwC1h0<$9Bvi%8iy5A>Ulwe%fLAYhJW z7nkMiZX1_e67uy9&kC9N>ev%UU{*Ft(1MQ(R&B-QKq5KnmWqKM&}n_uma_O9rA*TEkeppb z*VwGOX^X__{!oaW)AzHRx~pw}@;mtLo)M)8&IQZO+lsg9{jm%Ef|nH3hR z&DCr@m)|U}3tg(~h7IEr`KVeM3#n9(%0H`&w;Dnq9&}P2hnn9d72jDF7AZDW3J20@ zhfkB5%gX6>N1kDQK0`%i@GPfN=X^tIQzyyC(`I#xi}|e%y_&s&B(EAx9dFXDE^@h8 z+pns|3eMli#duK5oH;A_OEIQU<3|q5=~jn8DYHdd6N{J{mgE6xZ85cDE+3O|cB%5B zucTVcTqHNDRktkC-h4Tna(3)af9_>+*SBhkIJ>giXc}XNAf2-9DM{tGY7q_maWzSe zKUd4=bLaTvbW6j`gwpMF;R3ED zYtvJRCdWP^6|=HZFR&W7IvcDe%!cG@?$U2c`B#MQqN8PX`5aCEjk4S=71OK;8h_rJ%{r24b6TaiS1P8N$uCja ztRQ&8CcMHYj)tW4)n>Y2Vk2fsQ}8rboZj^Ge)$7S!$VaAVNKLgmyd`L=OuA3rDW>37BiWsBCtmR+i(>qL6!~)V8ZvSqn@MXA&0j!F4 zG*;Uh)^90ZCasF5tkB>*i&@A z?sgZAlvQ1%FZ{dwyB?#--OjnnTxdzd@zdAH#W>?lw&bgu>a41y#=_EEJt+X)fT?6p z+pTV&!^$qK$muN1ba=@bqWO*~%W%_Mr1VD95JM1~vh7ipSVJJWw<)JLN(P#*_+t&P zqhSuyBTlJ4jk1kRc`VTYSFUmv&LPj-Mq;%cU<^#WUDq^y0cUoTwAh#$F+9{KGHKrC z*B5I`nF9^Ee3M$m@LfY!&DHDqAie1hIi2;{n21fKjIG!)8#DHI$mvWkB` zp2BooP7mO&QJ-2wytqSXrPSQ-r1sXGX1&T9?$%3bU%{B&DR*<-W)x`ND)43Awip%) z^tO`%CdAU!usNE}({W>vvwdGGe}DrmzeU=Vm}+UYkqTHfsSr<>8qwUvf0XmbI~7K0 zDkf;gXNuG6!*WO07K?c*WTV3=WwDxFrk6HK^{lNb4OuS?Mmt=}mLs_%$E5UXEt0P0 zT3kEbS?(;-fLluAz9zf0Ar)DeJ_ z^w(n^w}#f|FMmM#*-9q8LLtc469(Z1oy4ldsE2ggYX6@Q5JAU*lyNn6NS2?33%VL8aFB#`99=d-vj8%P!vxv%27ET@&P%gTA}{@toIpybN0*UgeSQVi<@LM`o7asW&I z7@h-^oOVonXHh#p{}S;ZetbxLWfOGR125RpU01n(8AlLwrOUWb$C_2rRg;I$v4)aa<{$`<44Hdl4vBzu1pvaV-~JyA=2LV|`~BD{b{R*rvDa&?Gpu zP!S_3()2S^C9v?XrnCrDdHLGKP&%(#?;P?-L~8+NsWBRt1+&TGHya&BB!QyUD1vHsE#km18mENh*6|H*$G?q;%m z9q4Cy2yU#NWe8*+qpRv#m-xamEQPacDZotP{vPlH2p&U-If?kD#q*l|SG@J4;#0r> zfb3j%%K}Ss3VTd0f7@g6a*3`U4>cdEDLBhIb+y2M`YAIS@hEh&v=G6D0ao z+|WVI)|ZNkpS=4YhQv&)Nh3^h!JmyN<&tPkt1BiK_JHi|tzN)|Y5ePw|96JceG4o^XOa5|18; z)J6y==@Golx)J+9YPsWlrAG6jm2~~Q|M(k2VQ54({hIM7#%2@+VEEoYD+-Qgm_!x) zZO@I?H6GSZ=+Au$JB(DdlImCtxe`x{kDZSRm$_TJb?!`w_|z?zz@3AjME}R#+CNE5 zW>39C3xYuJ8iAdbY=F<=%V?-ns7x=qN@e}6XSmoWlKimc1 z0{G?-1Y^lF374^SnN_c7Jh8=+t*-13)5LSB=etkd$zueo7i1+{a@?E`ez6piw_N;N}T&Xu)aaWv4bc)`RV6~Q=QcXVn zcGTodiRk@C<20i4&ffX|OnfbzYnP)W$!T&i`d)cHhC-OfpMz59fA z^W2#tvG!BY@11h@{`f~ogI}O`tV{_84|eLtsK7d2J7zLXCBfL-*xvIL8g{E#!#yib5u#~ zb{jMWTe%>WV#fYren2GN;mFHS;qUtxdS$m`O^don&Plm?$M51&#Z->>>1&u7k7E>n z@d;?vnG*5(tAEgU89%3I|2L^?36!&>Q1zNx6QFXA7Hd`Nlh`oyb>WQ%RV^mb_NpD-V7!3{Vp5q;eG((|5)s^_;jRRC{Bu90Jw;QQ z98x4FKRh-)8=Ssj{D~2M?q$T$(E;E|&l=EFWlwu55e}BvJQcO73=K=TfM+qH|F8HO zx^6%w-t*)Gm;i)!`O{w`-c<-6u%BwS+3d?ysBn~&!9{G0Gz8Vpp_~B`Ug?u~`?bS4l`L@bm$S>Cn%PBmoK7tj0AQj}Tuh8|je+3`!b*wF-A`(k- zoL*^^*|HNaJz`%sB(hBTB)cu96M;R`KqK(W(KFxJfg6NW7KP z0|WhG6eC-$*3fKN(VDz}`UZrkOpSkUgy|hnUUrRQ55MNbuSoCOaEi-TnL<91vqn6P zFk(T8ZEQV(S#_pJy!{JTAAbL*pE!Abc}2N7)TbM|J@s4ZVnj$>iG>!EBMHJQG_%*V_t8jORJW<<}l8g@oGvmJgz-7Kaeac zeuFi+?}7Nh<3z!{Yra$6mW!1$F&g&}8sNaP9zQ3RzX>Os!DR7a2jW{EdP29O_vAOB z39xzuX;(5>E9F{D!&+ko%Su|GHc7VgYu`nmoGB4Ey$9|hu;Wdh#q9<|l!9z@1$1)feN7m^xUnb6=_MBs(JCo|I;j!`8N=wDR=4dt2mf<~j%EbvJ+ zL$P>NWCixzQ<<4$oW(FKFz8uyB9mA^FQeyajX)(dDqcvW_MgnGOvlp{ui+QKHKbf% z5hS+|PoguE6cbmeG?WUD-TUM=a++i5w7~ExWg0!6Kp*0N7X(4AM7QHo8I4uZG^g0` zqWmc;#Zbx=%1fe^EQ^ZMae5({f==)Zx`tLN=1%92$CK#2xN3pnlBiB1#V(*HR0}kN zRY{=mGaRd!KbfCD7Eh#v6awHDI5izdeUvKbVO+UDCwPGqk~{)%ImP7Z{3<3%t7t*F zpkh%AmZ8vxiBx()lVnxU#&jx?U=&kQ{v#ZJjA7#x@sV3drFk-@e0m{{_AICv27$c{ zgT;swAH5}f@B(C3CYg9rMWM<{ou!Kp~EBo{Epg#|_}D3b{=rlo1rzg9$&}7xN+UNWv;Z|#El^NOR3wSq(CCFU zqmIKdT&aZ782a1EKE$MpV@|LrSV-_>YT#c$Eso>I7*3;1C2(h`9{T&~{P_7Kk20W+ zG$|ibT9e{Yuar88DHc~HRLsx|C;OZ`25sQe8niH>;?U<9lm$Me!9d|skk`a9jWub7 zSc~6$=x{25BO*_wp{f+JrZM%AE4h%0#~F^{l=$hy&|gkgg*}!~@~}5l3RQ`t0k^oNs8WsfP<>IB88Gz%(?5<0-c2=HkBf?CPK%&Rcx z>GTkSYyOUbVva$@;WC?qiX_tLNTm`cgNKPvCK)nglo(iU=(i_p!yMCSG;uY@!^8*_ z<~74=7SMgkg>;%q!?3DZL75(U?sR^- zQ&(~X1A9fQe%-1A6^z6yn(8nlPWn4k93osQJD-Je5gDFR56s=~}YyxI(=zpaA z7jV=u0ZIaci@DG8=$$yJIEBTGjVCz`Bd8f#r5+NgI8l1!R`WPT^HBOUL)w~9qBi)6 z1f^j)%rrKkVTXQkvNqH)CXu96ES9{qibH-np+ZHV$+SiT1ID0$RC4H7C-WA0Ft@(Cd^^t6=!2&X(I(5Vy$6M@c#VP$z96FiR2V$n*_ zq$J@JlzzvfseWH7kEu0rUQH?E3$WZok5M|0dMv1uLP{CO_JM^S|6JM*#Ay@^OTECP zV8<}&c-WaFCT^T#;mM)lXo}y{&w8bbQ>rlj{DO+c>cOf=rzABLVz4Ufv7{|NCD>t_*#=3$2z`|(-dJs$Y6_RhV5}jG-nW*NPA89?}T~BLgb^_lM&cZ-0E4c~;a1o$8K-dcvNHK@D zt|t|r?4I`z1V7?x^V}gY(;P==lZ>?EjL{`Ovuv%^%GE+g-xO;J-4?O^6CAY%MLoqs z4%|ArpVm4LmXB{b6)2JidZE<}0w97m3dqz~_sxxTZ9M2UP~{KIqF4I9~5 z#T{T8^_)smN?Du0g?P1Yt9Zfl+RZN&J#|^`%HC_AC!rx!c8Q^ABcp7F5~XYcWa^}O z;`DE|a~lU`qW8e}kM`2P)h-g3VlYg|Z#rjD&L{tOedQFDZ@F?;Py0IrWxPZoBwhLB z@7K{41P&j)vbXyWxH&y{=*IXOVf&E68og=S#IbDNopyz*6%*X6U-L(tAP18XVkbI! zlYb(S9V?bru)+HIO2ZOsBuXlkSo||S8B7-MdHa&1_w1j^CmK)JVqoj#M%`P_mso2? z^!*i|3?_>YxBa%>qkkoS-#Nw$Ee1etzSI;>g|&E&#Z~n_(LPnxvR$CIex>;Dy@i(Cugr6w+#P%{DSf6iLcHbow{}QJjK4r!*l;N zs~h{({3TP{H{3h+wXyrhj!%DkY?bBo^Piu+dh)wtn&G*z-HJQsZ=N0> z{oCjdCvKnn&FI6U?;gErG&BAC(Z$i1&3#<)oZ=gk56 zWUc@V4HZVFBq`w$BT!~OU@yajgbDa_w7ct-l9T{I5-=wKJ$3Qc6OQ40>-}1OGpU7(QT1V+jBbVj$7kbDt!|<4GV3OACuj zV*h}W?!t4=9tpYCgo^f2;{ggC0QR^Q2*E(i+;p?_Z5AQ{P>!o(* zWGUDl^cW31w1YJcFz^T^^c8k|Lz0po%OacxV5!6(0oeb93t-QGOVSunXp1?xst`16 zf^&+HM1azNwU68hsAm>1Unml&uz<5h{RjrEa__SAF%V3FD@ic(2&y$k1OY*d+#D@Q z0U`|mWZ>N6+0g(LN&v2g?ZrI`NeVRJa1_X{QS=f)`vMrUOW_Jq0L5RifM|PA4FjEv_EJ-lb^$UQftLjP7^-6? z$mf9M4ssiG(zp1A#1lgAR}qH<3~k^Rz>G z9+&c@M5bUO^zVRNMIaGkAc6aesb%$cXC%;AA|?2@T?|GZP{et|Dv7jGjy)vJavS3u+ISW-DMki${ z;+P1K%fQeH~326p@Oc#bf@jvx$Ux)T?Kms zn&br_HDY54j6Z5HD-jQ@8^3GMPySB+7!3v_ZyvOXfbj>2dx5CQsDzadE(uJC0!9i* z>41a|kY5N=V}00HFjat|0a&vo!W?0Z0g69LaPQkQeau*h5xfe(Ripx6qKg-6yj;g} zV=n23p~fZP!~%>OJ~+@m(s5CCq$*2E1TBgOkTQ)b1)PL&p*zh=QcMPr0|2WQ);0va zUIjp7$yXSX2N7bhX#sYd!0!W48t~PDSZ+qvJVM-10KzV?gsmi)mvm|}Kl{IO(eS>p zzy%5P9{{;UKLX(2o}ZTc5_#dLgCW9Hf%!l*vJ27;s}l4xNOgd34_i$}F99Y9SQkJR z&%8}88tox4O$4H7kKin^p^i$OfGPaOOT>HbDU{bhaIkKK5Z0eZ+WSoMV`UDBk2M&5lV@ z_#Och7oZzB8h8-_j&=b(a_htLw?J24gd2bleG-J3hmz8+?A~`uQWBA!Xhm1U#E_HF zada%;`1j3AVo;F)fRZc%c!3AjJuvTq%(ze1`7F#jOkp1A-d0eWV6dEk^4$B=lRwgjGR%0-$ODbTbqMn3Uem<}b@1LxK+g!;dLNCR?`u!xF^<{7ulc7zh~5 zF8anqq9*m-jekDXVoXx7v%qFK!6E}=3p$VayNML@pNygxiUmRisGPKn6*`;a(#Jt` zB6I{C5wK7k_Vg^mQ%hUrO$6ZtN)SGKP&_0E{x;b|6gJC)7z9*|9>~%_$Ob)_`La9TJmY!CfnN_R z-YjpQfPzkdRk3aY{RZIE_?41bxz8{E25da&Cjdz;F_}nF!26aYDbYx*yR;WP9zZb& zpnd^gaUU;9v0VZlHq159Yn_Oag(~KY#hnLdZW-ElGBQhinV#CdhnRC9zJtgHJSxDF zB}*PAEWP8InJ*E3p#8{EgsP%#diLs%VjPIpfOP_RoUo$= zn-jCjmD}@zRGS2*E=&MS1fX}|wnDJsGs^9sm!wH-`^YSG;s}Rr3jyKBd2suiB`KjE zB0N6^Ea(K&9Dh)U?YGPAEP=9U6~he6U?NN{L=&CL?Mg|ECCQ5Y3zPu9OduG639y>m z+fS-IF=+^`#wrBxahOCHzi4akto$u@4GF9`P%of&#`@Gdu<}7!ngj0@3<`dsw2GK) zg1C;I%_e!dg_;uX2r#Yy*_%vu%o%5U^j7&}_&mah6U5pQIR(RV1MOkMaY>2=16wyN z zzb{FXFyPpdVfquA4bbIefnJ{5Dyuwp;MlsMKQOt;WPl=I&h30c`qqcF38n*-Ay{HC zn~9O}c6WY#@5nx2jbrNoIuq=<(NgSMVY~=m54H2lLqmNnIyqNCsf0DVk7$pb9|%)g;IlmcmAP_Z!8=6~_q^C??<<4HqyBOsu%`8R=Uz5>+8c@Yq7Y zJqpP9(2Z{12g?iEg-!+S3wE(s0$cOHm&8dRzeg#YR6rzvRuTAl?2zVvC4bBT z6dmLZgtY>Jk^SqLP-$N7lOQS#E+`B$Ac)Z~V5A2~{cib(lVqoj^?`i1N|2fjWKYqV z|C&@ZK=J`5PgpN-X>40}TCKgdDIRoeX(>FUirH2i*eG47mR9db|peEhAWe<$}GYTy|k-*xIntONiF z7ZWRoO;vrGj|W7dj9aGtQ@T;{`@=fG=bkASy`TI2NyM}JM|A`o`8dFRA)= z75lK4oDsywKEiJi_fF}y<682i;%FYwGs*wc(fRxvw;ey{8|zb|VDSiJ zCuOz3lWL!CoA}9T9S~&J%_2Va$jf9V^NVNB+7CC)=JiZg-B=tkxuMcZ{|M|&A3niO0F%dOt>d3n*hhadotu2y9SR%qZ2aZE8~HVWK+7H- zX=AHVWdm7NSCge|v?ecpaF_1z{6Ml;`&03-_?ah80v>F<6`FqW9^D=|55MBnRosBq zzj#($v*j$aLIPd;^cGzoDFFPQ^0i(rk*_9MrMI%k7fiX5F)vm&>2P~BkSw0?di1@Y zY|?=az_WJjlmmk!7x#4;i#1U)@`&EG$HhNy$LE8|;yujl5%Ea@fMw+!I{1dT*T7UN z`*oN!?l722`669wQ`wM#lCHh4*rwYwKOh62CP)_gLYFo!Fri+Tt}QbUVaf z(z>}FXUWpLM|JHR72?0Jx=lO5F^4M^@Qhe-Hw4BXEGIYyg7>pu$`4o_kgnFvB3}RQ zFCTf}Gq1`kE@V~U#=Nn7{NTwK04$eSldwzaf(R6+VceoA$u>*;5U<;LK&5;UdGLB! z#p^Gk&bWNPh1X31Jq4IC)@Yx7h0vH_J;nvRmnMY*L26wo{3Np{5u{#y8SFiltQ>Zh zgxw0eBb;;z=Nn#Ah(>J_dzbZ1-g;TY6T{!#P9k2^;zgJ1&W4Y3!{xenZ5mKXNnN*z z_A8+F1G2ul%5LoYj_M-Y(P8V5^8iUjxBW1sQK{7YX^1P*yD!ZQARov7xeO2sw>dR5 zchUIwrf(RVo%~ltYD6;|B0iA-3WrZ*?v(psu_XKtDY|Wpt1a(g(?4mM)IVQN9i9}a=06U;&c!s7Trxh?N7Qvc5f8O?q;jFJ*?Y2KOhnnbAs#v-3semicQOiPtC#IC(R96yFw|yL(Gf(m9^B!l|azmW-|d6Yw;hZKk@Cf@gdG$?+Xtlrta` z4_L#Jhy2HV#Ps^sk|;)UGE7E5smBAKxrY8By2Cwi|&7dEj=-1rjFJ=Yoz_ny4g0|?H3*wRxK-MPdcw~o>zN5@9o z5^*wY&8RN|pCr>JrEL-aDWTgsKOhoMT>qiI8}hE+(+N}@UVW$O2O}9L4N*uhlT6B zFs0i%cc!F|Nq^dLz4wU}QM9GCGD?!%d&7&~T9M8AYu!}I9ksFIGg;l?xieG60~0S` zNqj7HPVW^tRAtxFT4i!UcJdCF^a&$Xj@YchU^Xvx@GF`a6y&|1VeHEdv%Amt|t_qe8xuu^X%|$@%`^T+aCMQ_w|n&7oR$6#9VB= zpfc9!vZ=zRGqhCAFTYQ>aqdi!sCe1%$qn{h_v*r12(K`BRdH`XF07N_K6Q#GY>6$R z>ml9L0bmus=*4`!ywBPa?Eg(i@>Siq`0D$x5cjW%ux8`_69CVPxGlia49++4UH4%% zUtcOJM(&Z19T$G!Y+WMW@BysB`JyEbf8A(G&$p6(KAn~Ze(8hQR1L~{imw?+@YIKO zk)433?6U;oh@~WKfuO16@TkxspP#>deJNPN|Ldr@|Cd`l|6g=EH2u!|bp&&H^2GS} zXJ0-xGk3`dugFdJ$qc**MOa!RL=h4hLm4sICWb1hQb1GBQhb7(m9~i02F?w+SL^0C z4rTyMtNse{^RGU&x~-Dc&Arw^k#ew8%+lzx4VOtxz&_{lDe@_YR#=s+!+L z)63*OK1W#?7jc)^zF!F^Gv>um#sk?z?|bJE|FlE3xA(u-!jiy|{WNV!&X{L;+LTG_ zT>{=RLX6a`f3E4a%n!)KO_yINdw&0|rh^MQVH}bAxZZXfj7-`eTT#bd`gBY!mGbj8 zN*R#7X%nK7lv7vi>MeFi*SOZ&u&Gip?!vNtIcBH?P0hkeu`bue*wk&FJ5way^Uei1 z4COsdlyYjFowbkXC*L*t*Xj27*AzF+^=b#M+70Z#CrA8yZ{+VI3>8u|v%zRt;rza$ z&8wvKDNsYa^+v29XQoP|5TCi^z^Hit!M$VRqsF82;<BMCN=$MuR+ax zYlPZD+B607{(6>HF6P^gZn_e6h@XAE?#TQ=DgwkGk$|B^{tdbpq@p6Xpl+`FhESBW zaS5kQ0SA>-(rsJDzUbsR@%-1KZUf2U9r}w-2S#ib?|kja0zZB;Y3$myC{Wsam}1Ky ziom?fhg6n8HzE(qHMe3|24&(sKb|`*-p;|93~t+0V}2H+y`xJDZqYnq_A9%#O|c&&=a9|334+ncHSs zGskAEGndZnnEtzjGZzW+s0-`TfbyuTFkw z@-36EnoLbPCsmW@PEJhxdg5CX4^OO3+%eIah)>uj=!snu!{g74e{=l7@%N11GQK?i zigC;MrQkd`|HJ#hVn@DpKgQaq>Dd>>M$L zx-#db7M)3Bq@8Nma3cEWJ_3l@5NVkBNIBGX>I3YG>WB<~W$?Jmi;TCis$VRYy8g`0 z*Gt719GpNqoS0k1u2}^rLmylc^!s;5o=D;K}G*s>){A!{qlWaENY z!c8$7%;7XVFsdHlr|?U8ij{yz%mzaXV0wWX8&m_FxTZR~`k(UevUNS+A>!?H#<^Go zD!}LZh*o9;rBWx8v0yas2xrQZua$mPpQGySa;4+-r7E#PK`nvGnDuVAnbkW3`Ezjd=z}QEn?7>Dgwo5{g(mT}1GnACvQ!RUOc-8OvDRi%E*UEF!0uS`32$wgUsl z18kh5-<4ox%z;>ipXgW}Lwv-i|736XvK{u0*c%38y zDAh?RC9oxPAe>Gzb=Pt}v8ZZ`5i6ZdnbRRl%)jD^U$IlFjX%XC*^)Ek;o>Wi)u2$^{ebkdey=ebb1&tM zLUzfM5RPt>lO5)`GFfl?c}KVINRG?!jQ*u=l3f;ZS!)zPI-NM>l8XmzHCs309?ZI10`@CFd$C|_Kvy+^RwnP$=Lce1=C z9a=qPkkdmesgy6$rul-hXiH8Vkc%mlIf0Q^kVcw34xxmR$wzby9w}54_5GrLQgM!z;_R1A?60)?8-ts_IH(rR&Z{ zH4eF&ZcD_-2As`=F}Yk4R7qQ2%J1r0TXezXv#th#@)=p-mGYpwN|6pwW#e^qqyt1f z{@`)>gIL5#DVx4TDOHUHBPy!|9cac|Z;&!8mseEnV$fAD9Fc&o%%DQ(GKP2vGkDow zH!=IKm&sVTH z>CL%7oZceAhMApeZ-y;Ks_}Y|t2hez(SMa{?*Oq?*6EEKGU-|~uG)N_RE)#va?=2j zF!@%Mz9n9-89N~h48;mVsbi^?MQ5X7V=k5eynyk>q$qo3(cNJUi{41$=z^S|wz_Dl zkPLUyR;J=&ozKeYN>iNGFGu6)hPSH;WDWO8=}XJu46F8ZVz3b^V>o@~>OonMiG*oG zvKyl8t+cB_S>%G2Z1xi6S0Y_^n=MtPTEx3~;IQcAW%-gu~PVJ=8W)mcmh19U3Ts&q@WqEIZ@x>EUzp=zE2 z7Uq&U$9kjDy?02-wzjQeF)OP@&uT>JXcZg^sTf@i!5PE~_GS{aMCx+%|(UB?DOhF0_Pl->TgY~=35Ca zyV#=4w988!yiCq7)J#-zdC9U^%q=k%&ZLyneW@6e3a3~6zHG1*Pn`QHIo%XjvDS7x z&{4VElrwwYXXWyNAM9|n+O#EMrxTp+1vxw2Y_LH?jb3c8mc50=?1i#1x3uymrf#+R zmX|>ORnyFzFU@vK-56&*OJ-<&B=4#$v22Vnxg7O) ztzP28DZg3H4u`5jN4ZiCS5qo;@o2y9SpO`}B1`%5%{tZ{y&&W^$h#qnleaNTSVRP- zw(LxC7e6P}-U3<-y3#C!LLoyeQKQdWlGF8!lTqsJPS#1cmR(Ck|F&EoDpmHZc9eF_qID$*U7nE2F}JfRHf?lf1d~&r32P2ir2OWlxx!K{v!01o zbA{$*m&?hu6q_w8olRTQZ=h)1C2}ce;z_VuACc45hj-^M!CkdQjTBA`Mt3?Q{Z#{PMr-~Gn}%&GNS)YZd040V@-QiSSkySOvolR%(T=+ zm|w|Ut-CnABcu2)sT^Z%MNfN#PAcOrEoFsV_?2>chNA#)Ev(c#T!d?7_s>X=s4ol+ ze`n~0xpQWjY3F2S^n>HCC&!_a|A`Avj(m6Djp6$Um*8suA;IEXarkL}ZCO=rxPq;S zrvC^j-gXyWeFtQskh<=WSmg}6de7XY1D90);$hR>I6}Mc8%2rI<%~Y<^Q37eUu#E; z8Ed7|e~#WJChpd4+Bhf^pTF#q!*}ks?iRmrx9-nUfls}I+|0%9n?ChcKX4U&@|s$A z$62na2|LXHW9-Z0LMDv!F6R_b=Cdh@2RfJF->s&BcIRYdES2B z`>pqVuJ4BaT{ka5l*+I+bD-(mrksB(=m>{-%A?nByt4n=TbGiCdD#;%brB(jITI-t zTDPZ_pZ+6g--pQ>I!gAoB|CtTtw3@rJ!+?lU@?e7v{)&>?5A)5CH?B{@bh6ZBuOZF z`z~b(l7H|kDmtSU^wSJst^$JP%c+jNNkAc>wgS z!IcfrAWaz=Z`7C;ZYF~Dl)Y*~Vzg=i2Sv+jvU2}{d-f_vyO2TTTlX(PB9c@CNj4Ez z(qXj~+!2g~Y?F_JA=&W&n1qIS%H7=EdQ!U&KLB0<3j-{*!5SU1Ae^!;jQ3x~x}f=d zh<(+;A-S^gbb7va#_Ov}@sizUYFR@~QhDi8c9U|^gG-xcSF;rM#x0Nu<+dvql+vwN zF7?0s;L;3uI;;TLobKu1kLPSH9A0D?EsGhSAZxNtehRcYLp(?~`Fcco+=_DK7?&%4#quIRAmiMo&hx$w9xgv~lyfiYVNJ z5}1)#@qXpH z_|mri%)f!6c9(Bu`)QqfBOfY@j3<*W8La_d15g9+UD|p+X2i~RzcUY&QjS05INJZ% z)2e&eRV(1OspkVl-ITk6C1b6gMf5wt&g81WoJA;LJX&{qWM0XC3#=lmsmk5g|7xG|rTz1rRFiTcl_upzJ4noF;~@+d?9O*S3wF$5o?`ejAa(xvS@l-n!qZI`8lw?^ zh$ZQOlT(D};A=TdR=7Uc=gwi->4Rm*ZP-vSrAnPL!D7=P$q&)!P#wUP6WB1;1(tzyc4qF8tHls9f;Nr8&Se zJXa9~c}MTByJii}xEGdYwm}>u#LmYcUsSGNonuk;4Zmi=IKKPWaJE5&3PjaH$ZHScb-_s*-1h;`OijlO zYw{u^gW+dQ&bbPMW8dLRl?$FZko%h~<=3q-TnA3LSIlImK0Cf~;%C$U*x&PptW*84 zgLAbGPP}>@o?4=xpJvawM8SYb?CkGe$HMg>v;t0;y2&nB@_Vy*$3^%(;I`$kD38L| zSo!G`yLrPaSSLSo-lfWhuRF&{J2-&Iadz|E z5DV;yH|id*cZ{>(y%k&mtVR7c>Pf=A8smzMOqxkX9Yx47t={DLQ5L|7sKe;?Tz1Bcf$Fh@iOFnER{m##-8VNxRrdTV3ywL*r*`xUlPvfF z`&TZ4mS~TiRLBb%Qmd^7QLZx8dP;A}I}Om1A)a!x8DP}aoS^;R7}Oq7E9Zk8>)=4- zGLCQ-an$`Cx)zXZbz1!(!a+8}ZkQY5DafaL1J}A8%18gWa9G*!&qo&q7sAn5_Q1I} z?N%i=3xdwIbCpM~2k(PV%(7m?p4mUHd9NX{X7>5n$LIFXeqsPrR+^2?9-F;ncEkEV zu76&+=Evi8*_YfEjZ(7$nWi&KY&N3U`I9;BOPam7U zWO{DxAJ+bG?N`>`xAu;;$Jgdpn+*q6!`Dw`r~FgY)CE&hlfRk#-Ycz!bHA8)VR_=; zCO$iH&&1m%>JwK@m?tiu*fjp<@gI*rG5!h2;P$5R!d!JcGPiO3it&rb*BcUJzaM*U z?8{>x9lL$(^<$a2Qv#ZQ7>X^}dPmWk{A? z$>4yK(=3`?WYUAjG`*q33%M$8l>Mz{jPbYyE~e>)r3RX)LFRwZ#gL&;w2LjS8NBMH zdNFN55vQ$Sw0P)xN?Q7qPA^~yw9Mt(Mhhsf1?GrmERpJouvqCXcL+P??-did9UAzO zRF69wL8C1#(UD5Eff?Sfi;3HFC;%)pxERltZ24m!8t5LRdcX|{G)pOw!7R}-I(oN8 zUY+2S-2AX6rIzz0kYpAC44O^=i~{(wc#6T|NF~oj!ug0f*3OJf=yGzjs{rnItk>g@ zn~=+1r;{^uk+yh@p@NjEH?#X+)TC5vL>MtzC}XsRrx+VLsp;6IYOKrQ6|=KbHS#sw z#~nDLmv=5Vt>6$UHQQDr>d9u$|B=ohSp;X>Rf1{*LRC6Fu4%@kO0NbEW}s1trl@o+ zY}J(DQl$fl^}21=;*$!2Lb9;&Jz6s>tx_yd^zr!`A^08gEUHNdTqh2RH}kZ=x-7T} zhTN|~K}i+K#G#!Wfkz?^B5Rg6Xlg*I!o~dv;H9wnUbyYF(UyyJ`H_qz84Q`cUTc^M zA$|?uN~(CtHXcugS!1;w&jCn`rl684Zh(74aVuhEIb*iTQRA9cRjN4470gj5YoyWS zm#Lgh(_%^$!s$Vy5MFHdwQS}nPVUq@fMwEn&FHjJ-k3>rG8eAV+EcDuEEXKgw>{0Y z$xqUnB1$S3DlNsZOs$hE5lHd;2< zibZ+d)f&0T*RqK0$bdn%$Xc6@>oqAwrz?%h5h+lVx|v`cI}q0CcAF6^SE-7#NFnXI zNIj~Lf1zHEp*6f>?T9rp))Urgic(li4i`!VBHlbMw7V1%*85xV!|lE)iBc;Ssdnqw z{71D43La}2akMQ`zT+k$40`n4Ivw@%Xg<%8s6QhytqTSpOtSt=Np>oruUgUzdu zY5?lorCNCz9-0_fiwbr|##!*&x>u*iJ1#VYXDN#qiJL_ss;^Jk9i-8As>g=;P#~KZ zE`OI^-jXY$&PuikhVKf-@ay$`ny-*F-o>NwJVYjnadUoDAE7))gi)z(k(}VjPL?G? zQ;AA>$YOw6oy~At;N?_>TzW{WARld|uu4oY8xx4&!V2pzJ4JVd(5NhuG2YRLSP1We zHeq>Jy4`W7QG24q;8EhzfM%bU@+L!qy`v^us@w%?h}^0I4u->9D|L_P;@^ zHNXena>`;SLR^CGLaGZ&z(NES;ct<@xwp;6~Q=;gh&Dq@bfO3S?t=4d!6(?4h{ zBImZ-uqI!T1G$2ml6Vd44ov4_3#%m3y0 zl>mVZcbVN(p7fWkTmGL;PPwvT(OzjeM0+}oUNNtU&&FsNeMH8qvJuA^{0f_1JXk37 z&@@|)$yvavUiSyRxYfiiqY)wKh}7yvhZPG6dU-QeuEm>P@NS9cF=?cumq*zi+9}12 z*^0v<#1%D?FngN*OAKld%-mPSeehF=M-0Zw-bT5hh8OE3{2^B+}M@R;4eSr3}($Z57%_ zw`@khrHo{>@?t%JVdZ$b0FYwMXpy_<%{sjtV^A}nh3BiUknUy1HtKXaT)|t_EH1k( z&MG5Z_6wbE1TR86i)I|<6pOehkN#0e7eoslTgHk}zz##0AUd^Q`$1Z=wE?~hyij7e zuarn{$91}ZSdb(g3W0^XZXn zI69@3Ulpad4AFa=PwI@AyM`7b)s)%e=n6vN(s$_eNCljOz+{ZL?3G3tUrXwALTKUk zqQ6kHGl_PF_v@>ij|Mrsm`8d5Gg&aVGS+|7%JY6-6ELJ2wF-%oygPd_7@(E`wN~OO zyAPv@t|%sHPdQ5*oYf|t>qLBH!s0A-3S24zDGfC_kV`U;NG`fA3XV|KC0+hsI^E;w zA(@oh><_!T63YcI)alL!JX3g-sB}H;49T$1>vXmrUq)TEoE>3n!D2SE=erssRRb(Q z%IEWUDWQ%@i1EWZeJCIGW(|f=N)@Dz(}XxX@UgSvsQY%kcnlngeW4gtGAH0Bm7e>Y z)~yr_q%F$T!;&etT(JT|sb1dVj3T}Ql`h&t9fysy>f@iH3nol1B+W(!5dJEKjgnrT zK-xG~LK?0>hpI$m!_PE&vXeI9d?jh|g)H?>S#rNmr?=A$yZ|88*+iwDj$nbK`uHca z6u@^TnQ}*Fiuta%=SKYpX=@nuyV|XAkk1B8_!0enmGpwu8gtWWDOxwVdxcBBs+ac! z38aVDYPDFUl;otj5sjYc85jYZOBOEK9JM%YtyWZ8(jsc(z~k_RLnjFy^Nak&O4ZPS`df)uYIExhZ`_j*pFyJ?f7n*CLZ$HkDb z7peCMNT$gP9u419iidd#aAz%iE7rjyWb`_%HE~a;EXe7yC(JkipzU(~(;l}w8LX78 zIys}yL1nN*0~azlf8ur`nl*FTq{%P%dKuGIT4&?9ETJ(j7fd+)HX$l{9@oWVm0ZXR zd2hXtwbPp4d{8GNOd6~B64p{DYsS(eAJe478a#*EkeJ0c}(~Bo-5v(W@AkT5M!3E?4VqMCRlAXQ9lA zkpDLk$g*T2Wj5vGmuuwjKHCYL+d^C-#8yXf;cz{_@fRbimI3<_lTKUw`RoT@7t@g%LDR2&P0c z8!`n8nviSvvh#C8JjJl~*|U&H`j70@6hHe<3p2@`KpKttxvC>1Hv9p-MQ^=`-MD@g zOL;@-v3+VR!+HJxxQGP^5PaowkaBFGY+;REQv}Jvd)F9d%K6kl$|j|Eklnapn5Ue4 z^JgzrDtnJ^Qodfh=!kOQJBN1;v@ItOvEb`3fBBH*-LIeVcp)JU1YCRm0J*$r4M@ATd}5bKWOQznOe?T9+(#Q%?*(u zg7An2agyB+qqNJjatTbE7J`zLdqgBb84F3VP!|9aV=!&_B{1ScEal|?0(QZV_CWC4 zt(U0EI{(UEXo#lU@|GpOg||>&A}yDQB&Pi4Qg*BI@0Wp?A(moz&NPT!+u1*SIf&6s z%cV8bZ!?r;4^4f3eA~neu-44|J%M%{!dzAW5lrtcfZw{(kSMC=?LeTmFRzZ;Cgt;o zLACe_7Q{j9RW__cCl%v<%clPMM?j$mu?i}#o94bx0YrBjbI7a_HGvm!LRM`io0NMH zP{$4Nl=}-mIuo$4y+4jZ!$G%aJl+3T+HOt)2x!Af5jluBEoj0PC=fQpgCIh{`+<1I zh5qX(Z5&lZJZ&638BVkyrGUd+DA8?OS2Hfz30N1eU_JFLTq^)9r!OtW z6UnB6(N3@#NoL~#LJ1ya!Qirrs?7gxd=Q$sL;2!S_Ros(J?y2*PmZy>Al7pQVCHn& z4bn9WjKmXw%ljU<HM_y<6{0uU)b7o}S3+ui;Mz8zax_=%KA(dyt@Q!t_ zS!Y>yaO?s#K4R`kh>&=4`ct!ioW5&h*YsPat7Ez8<>ctDX%@1C?jISO-Z=Wf0Ud1#oBj6;6!2MwzZMD`L$Q9-Me;n>i35Km_0f5-000y|2p-tDP?LI zbfJN{PfamX7fwwZY?J>r`Tg1ZC%-VcGI`5nPmQCPOU~Y*#!`$vIyo|ePrRtbQy8w9 zc*p2(mM5BOP=%qXg;k6m8NGOPX5_y|o*nt(++BlDLo}Z?p-3sh7=@1~TL&NE zXsI4*p`N0ozTlM7+$R#(UBPlsKCTYI)fV-Zsuvql0X)YP_h+^Bn26XX*+C3a9YPbrltrti&y0%JG=>JEB-^!hr)(%@HO#SVZVg^n)UFs&u7Wpu zL>CW5a%Eo@O+2NIcUVCD3Aq(yQkkw*2$HI0mV<6^2c(ENT$tg# z66Kxl7!r$nYqH6dts$A1NuxvJL&%5jb6X*)fwvvSqbIfY1e-N$*1=V(WmnSNEkrcs zO|;w#=P-AQGqO2L)F01>wQF=V1ZcMyWpSs&z6MdraN%Wrev)Nh0&}$Dc_|pphip>d z8LeJW4rMWC0PxD1DU&5Z1T?i*G|WPD1(oUM&8cMDC`x|qX&dD{HUbevi1aYpNjWC? zgPNQ`p337^vCt6wp0?AJn_AM^zZ?)*f1^&>G-D5o6mRg%s0 z;+?vjWGIFA&xe2aGX zj{2*O3R3S0nTU~X#>h0HPnf^rPa&Of(wq+2O8FSEPVa!ff+R6#CR(f{tdVYZ8Aa22 z1<4YL6cPamDUqq3Gwqx>MF(_ZSZh(N2=5b!hdNKE#|t!)^Mj*j*PST3sZo9B`(qIn z^>l5mNLk97E5~n_)(=n?B z^94(!rOTQ#4sP)en)GrWz_|V4WwYDP7xOjoa_v2Ya+6*E*Q3$CKGuxoq}h+xP3mg{&Q7blr6$9*!Gj;%2Qi#dfZV zRZXcLVNHq@li9L-ug;(w4cwcMssTscU9V-=QaYV5X7RiimvUUUkmwRywfADQ0Ga>r zPBFp5GxoLTcW{RcrWB%^ED6A0)+GmJEo)#(ld0Zm7XCA^?z6qze9jh-)o0Rn)i1`A_>tw3&WO7?K!;$xjVf-biVUeKD55!!97MzZOt~A4 zo6|;eQVWBM=A4L`ubFDGqSS8Xvb!GE#AG2J4)4SXYf*Nyu?l`r7n4Q2ekAJz)w2#8A zMBb?B&!S==P)0h4E7WzHE2Ny>@?K4h$he$zg$Q)u!jH-r>etD1B}5tPIT~p$mkQO~ zZvAVKZu&}q>66X(FrnU#3w!>eRV#qr77MpJl&9efq^YgxOG|ksyVSLVW!9W2=QQqZhwS zKRHvzY7Qf!QY(o!mgD9UF}p{TlWfGBp0JqDHN(9csF(kHpwNgWWv44v$W_d(d`ys! zy+@OtC^zANPm{FlNu^wl^sN46NrWs;)a3)mgQzj#3FF)KwG(fcVu(|U269Zr(#@c| z9#!SQ`5VtU<0x728Y_G+EJV=rUeYRvr^G1Y5lb#26ahab?7a0l-7SHJ%+?`{)_Sky z7Dv9LH8YO)Le5MkZgje{Xnw~Lt#qu@E+Ap1A~Gqu=Qatu^)(eMB}6R1F54?LPrd9< zvT0-LE_~on9t82)#W7c7A8}LNVsloLvH)S|EU#^Msgk`oZ)PRID@x5 z%oAGis6P-OI@d3&DBv=*D|A@sU*6iR6kINRRHaHjLS0 zIjxluN7z>H7Fy{h-AqlUuhkls zdvVN}%S9vA>T)h%&K}m3z0q)1rWs$xOW+QNt&yX@sh2067BoePA;}Q}^(}U(eiII3 zJdal73=>U@MNBM=%UbzRCu+qjMn}t$2sv{if$Hl%6sUCYXr^9r2l7VR%hdSLsp_m7AhQXL6pv{cyO*)+|Ei+gTG5LJmm{Z7cOZs_QXmLCe zqRi!*7;m{+yiebAGUKhHHOyv?CB<4i!?+IW4RWC=1g%@TqPN{3Euw2tqh}r28roy6 zHrThtR5Rn$7k{c%B~d13>2QZF6+Y6To%+csCTIa^Nf6q_B7q{Ab?Eozv?bJq*O9xL z?ufmtO}2i2?k?q}AOCs56fI!-jaT#X*sJ%}D4 zKv|&a5sRp^o$`dvgQZWsYRj3nB-)CnX zhF#psVW?k==IFF@R1pQAhGNZ|vH5uA0SCC54N(D&Gv<{iFIjt7xr@1Cm!=2xv&Kne;*OCM z<0EQ{sUvD;C;*SvGedc}a;=PeorydfNkIw(S*Zk|FGFPIZo|E&l0v0I>}%%p#WX;= zIoKxdSH0^}8OV4Fs^@1z;Knw@Qw#?~keO;J1(~Tn9${0EqzF<0TY_pra=1K09(jNs z@B-wACW48wkhk@mMU5VMq-L z9o(Wk8Dr-+pQ`}4^CKRGjkB+oANSpH_VxwuEhdPEP=UC%m}N6q*?N{>1T9E-*{+lW z?6&g=0H!=U!`$jZ%H3~pAiCc@nPMUKK+RzuY(olo46-6ajz<~d_M(K^)~(9tQtXB; z=PUu4&Hn!XcFEoG8WvIo1Jnp4cn3@nALO`(Zw)y*&L`ihj@cktZew@ferm#61d;)POh*ZXLJw%6)Kd`D$e+v5jjMA zt9(|uy9e|3!wfq&H^hS|pV%ODX=ne+EbB8Y00_Gtvn2b177j~TEo>L80?sV>nD$_$ z-jRpa4Dpnw-VLYWkFHNF^#7P=6NY)pWnnr9o2j_uYCM;=0cyRvAKL|Xe#060aJwpD`_uYhw{3s!WvvTY;g%=1-` zoB=fvJy=}IWdb|9VVI}f|8{_({tYs*vwx!iC-NQu@r95!^XZS070kz=ODng-*6RRtejw$yP zHXfN;82i}N=;Vu&-yU0@{QT&3llM;EG}#*8H+jvZee%%c_VFtx*UUaJ@r#KkCq6ai zAN>#@Q@wejGLf8MC-zTl9G@Nk)A;k?i@J0CYvT`$-#LE6cmeYHfCui#+ecoUom;>B zKXboae{ybq{p0IDzW&|o-?%@<;>xwhpfw%6s;Z3tKLqt#XbMLx$jC>0mVt)^wyVt1cen##w{A6@QPx|wup)mH` z^rxopQdQd1DR7c~c-l0w**1OI^v02fuFif%2B6tLPW}7TV`J1&SRqo~T9HjIbT#Q#QBD=KZs3ylxP$X_l#!5ABv1{Yf$L={* zJ`17R%VnZm&eY9FogdZw4&-oy$m6zPoN0tS$fa*&=0AJe^N7dJht{8j2NhK3wZIz41DF#agYy9y`irt+u=r%QDUycjP}b zG2t4d@U&F@Tn({18xHBnLmJ&1b~#ZndWzLj2SH-|5mimUJYtqZTo4c%D#b3Ah?u;k z>=Dgt3zC=MOud9r*={V+4x>ljuFLPW7%UrhbV6Ju|EM~&k{<>D4D+kL8mPN%x|R#zS>Mzj#9yKSQk28*< zM)#v_8HxIutW82FE0uEuw1KeJT>=97*rG2R1CK!a-MaW5TSW59c|^{#UNQ`Ef|^o6 zjyBQ+-rzA20HwM`BVjvV`#~u0gj7;=B*_~SXjek4U(@KWqFhI*ss;BzS_Nm5uxk1) z*$%Ewl&xwu=TQiCN33D3ISyHXccP_Yr&9>JWa%RPaz7ryNbv@+E!! z$d;g7ZsER+zbNN7A9XQ<*l(omAORUrEZ_4jApWVV>|_jzhrh^d(O#j zR}r!xW+G*Cq$nj!d0bQ8F3WCb&Tef)3!N0@Pgx}MFZ5nD;BsXJm#4DXSpa0#EvI^0 zGn=tUC{)b_j6Fw@-2EA?nXY_PE(l1m<+KQvD!zG17ZVIax)LG{uWiE1n#6tDt5bFn zg$y1Fl$U8EU4=|vIm6Ss9Mt8hcgr1&_QgaSx>wT;%g#>IhB_LuH|r?4vPop?S2X#~ zM#PAl!vKxh6)GKCQk$$bX`vV{3rGD ze22pwl-cNrmrU+@X4AtO-6pwAxZBie^Db~#MP%$2O^z+u0*rFl{h~K%@)iz#QZF9u zQ3%3TjJ{F};DPWX-_eUZoF&Ydx7e2XtdVda8-JqH8B-2tJJE8p=I>U?`48)2aDYs4 z+H!@E-)FBz@dKymSU!w|0};XBbn$3V-nB(5Z!P$YSjCa=a@nv8GM#Mk>-20>M15w~ zgxMh&9+3|Rmvu&(w_)C}pO4^>6va&M9w_Y0vXv?0IAv`*8DrBg`me3 zKaIv*eh%I7W{u8gDFQ8+{8A*)4Uk^s!k2Zrv*klVtptUTJ;9m9X7%CZmg8|6b2|KO zG?=ir{Md+om~fB^81>d%d@L07w|SYlRuh!soeT<@&I=B@TC_9b=$KAVb`cx`D(bnO z&q1_uW9Ofudn%X|tYvLs6!uwm>P4L%6F8(vx0bWCQ1hX2=^}mKr5t9MM;W}TY9dCZ z@&YxIy zX-VWH*|B4ec0L#BSQ;wpN~h%N5v738h@cPHUOB;4&N7m^{yW6O(& zJ}@Z1EXV5+60gg28#X=?cFG4dPdGVN_jH3zt62>6tkrOa{I(`PmT$6Hj}dC=Rwu(s z_9rnGINUOeQLkpM)CBIO!t^pi$S`6S2442H_i{BqD@%>>*P zV*QFHC+aX|u_*46v4S^|7S?JeH#uqo*dRf&q$_ewLK6h0nHc3rx|zr1ShEsq_=uPX znbg1HksxBl<*2dj=21IjxtsTC?Fkp7Zq${L{KYWD-k1u@yY%jc(;`{DU`AnP`)VyEKM+W=co;z z)v66at|inTuybCoXtKwU1x=YJhn9U1_-9X1y>_j_+icwCl>P%RWy6cUM6v8{tth6?2$G;2>LD7hm2@8F*(q-Nm!ZnGZwU(v{ee|YqjPCIJt&{I^XFl8dH*oo?X67 zXM}2544}jPAzQ&x2VC*jX>@;=v|*95AFbGm@eIZ&Ex#%fS~Zm2hLE*b>-a2cXQ)o6*GkVEwInk8Uw(3_ibY8~_9HO?D^{8L;tmyKp7f31@dENo6>Qw<`W zB#hjY=1{sSl`bUM-TW7=*5Sl4Th{7y(9)tL;VVI+%d9U+FdL1Ucz2Vn`y+f2UA-?KFDYvJCT7*cdRPd^rn1u1SId4N%AcU@irKpMW_DsdH3q&EqXlU!J=NU~b$rz+fSj zDXRdkrQwb}R252<@jse-QVyoxGF$6!HvY+^fLSAwDsaO70nH9G)M1KcmbyWwj4 z02Az7T*dI?4i|A&fWxT*)B}zz;B%_Fr)`S=dUh77J4X@a zKItt-mHVz|!>=+1+g}G`Fs!!HRa!rK-8ocReZzAcg!zABnGJ1x_nKMD%-am_p8nX> z?&aJ&(BF2&$^9R&1bbn;fX@hF0dORr{~UU%6@(Shb|`n;CRn|FSoN3K47< zuG6-QOwEcFovB#B80NblGT zM;uNp-YMibP0WXGfcYNcDJNr}grq|%Y|7M|!0QwIYn>oRv!ujBRKSJORx)cUcD?pW zZXo9Zg2HLyY$fSXIpu!O3xm8+yZR5@2$AL+nt>d+!zBrOC6G*VSX|+5QZq5V1)NZa zSOa^I5_rpH6Uy$_UO8-hxaqCz1)yWJpVl!(h^D<;^3~XQ9ZQExl6F=+_f~e(>}r;B z^RJMl{?gl2zt;wkq(WgVoY-!|k9zV{{wzUTZU z-iL)UP0kdIgi~cf;co(!;t*MRiQBR7oOwA7&OYb$6W}ui$SJV9Gr=plyANpIy1ym zs(Zf%U<;pE7+3!CCv-<2zf*M^$5(Bb|Q&$M{#U zR5$+qBfoyf`35aH&QIRQUbyk9HS0e%vvqpU)S-#PV~#afjoh!==ghm`6uKn>#-+;# z$+n8dpr11Lx{@)87HkAe-Lz?w^5(l>=vK1;gy8ml`uFj=_rv$mTLh48FslI~XAkUY zmn|6eQ{fdtOg@%?H@+ z7gO|E5NWScw7=)ENkDPKKEQ6=7LP&ZtwFXN6RjUImC!0O|%T zQh+p8Kg8<&$o&y^)8=!PP(Q{ha?XKW$|E0PUk$2l`@gWa@ABRPdrY@Nu0B3bpRE6K z&XbkwU+~Pn*TV<%WAMQ&t^q77lc6}iefAJ|3A}UaA@xLy4txY+u-r8t0WwKN0am>R zel0QH(lAqMH}=g9krl%_z@K{LTl_+Q>u1&DEVL3mz5VJCf8T{12r-)|`dbc~R7Gr2 z-ugNCq7U=nlLXNc1I&~cKd0_v-%1<=X^{zZK3{cWpsH;bLbfd31bdq*=qI0oYvT}4 zdFm@~1^A_=X#ukPsewj;l?ceuK9@9Z5=q3{Of}P~25)adCLwidu6_v4gCQQkZ~hlx zaa@A$=s)xjwC6ks+PF#`oI%7Anx_IG4E&=DmRvp_sSsL&l>4D)!#rjF9zgXNz*79~ ze)ccQBj233P}%VSd%VOTT(MB$s#ZqEea)zaRh#IWHEy~dc;p`mZDafRtMU^Ob zKFGd25P18I?3nU}PeQ1QcO{{Y-asf<@3DYLP%)JqT!9Rj1|Rb+%7#7&9pZtVIy}I6 z*`-wb?Eh-5yya8u`FbQ$dJQbStEc~A>hlvXjxUV53~AL(1+29<@GB}Hr{<^O1t0Jt z5{*V;_LSIhz=cr#sJgxZC+;g)hUB!j|JiS_R>Q6vyek04sW*D)ai*}3!KmKwC`|Y; z=cUKtCgHpB%3aD&AJv;Y7>DV{U>rOv9EjAWs$!``Gk7NBCd>hNhsE_vP3$ocI>b|M z{;@@KgHb;Dm_E45_r3_TQ52pr-m-0$Fn z3GO(%l(&D0{eRlPe)P)&fhroRCNLYXRij9|h9<1hDB}nZ_UAH3#YS$#d-@D&i~TDb-U%G!G8d!ic)`g-XiW0G2k-okHv1!AVqA)fM71<-MR z^Jrj)f_?SW+(#ZCG!d|4^(Mxxg%~&r=AAB-3%PJsd&VjEJPu79;wjuuzjr1wY@0In zwNoQ`$rEth^sc-Ht_)ho<*M0QMI&;mn@-x1xc)S4Jpn?8SjzE>o<62L^TeqQ`RA{* z=WA$0YyPxmcION^9UA+@RAJ=16F03<<}a>(S_LDzOm$HJ&_dlsq0E>_aNQ5(sRjzm zGzjP03*ZLulW)VZG{jTxzwwan24H?#eN!Y>0JBneCs_SqKlRNY{noj^`GY*D{mi%2 zoM5q)Ec9J7#`~J(jF0d73tXg0T1%Yv{aSpAot<6HQuh4hgAmsFrSYBpH$Mfpe--#r zcS-2B#h4k1b+e^Nvsz>!5_53+g9+y|E|qtq{N-){#iN)pha! zs`J+GvU@iSlQlq{neVASRc)&km0eb$1qkIuNan1RzYm|6A*yosTW|LCfAf9y2c?dH z)vY8^F+tQ!w+I@AXW<7!RG5Jec>3RdR&}Z3lJQy(a}^~!IO^v8OjeFZA~;U3InkCQ=bJwKtKy z6-ma?Vvvm*n_e{N)EfTypFs92SU3Op%47Y-Kda7@!IiRl@(wg1LdFC7JGyK~Z7uMg zH^S#j?fmcm2M)<0o?^J;`F+Z_+Y}NE@oB2g@1tab2U#fyyZT~ zfm-nH>i^vz)JtYyMFm~e8X{IrUJ0|<+cf2fp+4t8%ogSKzl9w?#M6*Y2hY|Y{8k+o ze5D9-w0B~wC`f)RpA?G_{Z*ox#Ndr|9&@&C(mY&9IsWpYQ!mDMej9FIlP|OT&#{x( zm*H3)-bBjDeODdpKlm~mG;HM8Kpug=Gw?I1QEGhM#1FLe;i}_Sa7D%a)7C&4a&_{U zIm}0kLX3@9;eI%6+P7ht3@MY>@4fwv_J#hob*8~^bxsdg!QrCgNU)cWQ9coq+_Y(KhzGip zD@o+4JX!u&f{Ll zivIOcwK@J36<1MP)q+iENvP0`rI2LXB6s!Op%_dXHw^O>!|f4J&0WOq>i@|Af)>tz zMY^3*D~2Yb6z**Hg6;a?6~0Az+l*;`ZiuJcJ^uvw+Rm7+Gc2gEm0CL>WpM#PqiILm zg9mK&rammsPrx@7^LJnAmJZWbCc z#8d944#7R^mxeLrH}7G$_8*=#*$wkIt(m@i{LtvNGmXhLQ{S9*7?eGRe>&1PKC<~r z2p>P8;_7J=nN3IQ0koHM2&q|G;giyzhl+++3iq@Tv_79EclNh!G{N!YSy9ml zHH=_O)D(|n^;#iTwF)UyZE&n?QvR~t1c-k_JcXM%h1Yq_4iE%)!PlK`k6DPiXr6Ss zEbxhg%nRCj_~uSn535KS$8CYa74mJ)pMiDUg= zY=W5t&GYpjK|7yp(F|W~`Graa0*|7SeonrB7xZT}OX1M9XQ%BL->oi+z{)a=u_mgS zi=rIb^fXu@>CCula8FiSbNMzH<6)li6gz&gmP+9r+tfDUCsa62cJMBU=2u4tYI54= zL7P^yl&5yS@ys25v$Aw&95SVzZ~AX?o8g0_Gwiy1){Rc5*FL&-&(!g`>t-LB-LwAq z%*n|gPnrReaBMsS8AJDt{{6_$Mr?);PIGG{RdaS|Y?>SWy!voFY?wN}aJ;bg_@>L1 z>RqKh1c6+O32B7HDQ+=C65Jw=3gjXu;@Bd}fCCYPR8xYOM!*FFWpIK<526gEa1*!h zzU{f&C$^9WX~YP&L4?LgOcxbKr%;*Od7$cMFFRci#U&F79o!m4}YZz2D15J zC`p}?Owo6KQfh15(xYaujW3M4DWL03&EGB^VbW84tE7AkaV|BSMfQ zep)KD31jXIE*N(I70K;IRkHC~is5MrG4hLo$l;5424xm$7=uMB&51@H5lLJ`PD{oP zk_4mN|DNr;l^=|+YP8XKW+?gxQz!jvvz6%%P%4AUKRH&cPVdbb68DIT#n7Pg4YwMj0$~N-#+uq;TSW zPn|Rvv_@ZeYRVA$tVS2Pf+R@gX8rii<7vf^xcpMcjz@?vm*gT1ZVgZiPc8BysaDDe z(0By!X3o??9znpng+Sd1KolZ!kr@J1Tvh>Y>{43jv_@a@-3?B4a)>QYkg_n-t$UrU1@ zDMC@iA|i>q4d4C+d!2@xd`ZjnIJnME8n=^_IN$%{sgBKQnPq|+jLden>ujdvpO?HJT_ zX2#DRy)!lKI-XRDca`=MIC(AjfTRhUfG%Xz9%T@0k)a3#{-Q7%r8A%*JY5TpA0!A& z+YT?&H%^|Zha}FN3}@Gq7}SG9J&@Ro!{Me4+b#`zgUMtTIYLAhY3KrOBw?KikjhXy zfNMZfQ)&0siB`P=G=pY9K1q!2pq~AwXXu>$0jB^sS7T?bHR4*>mjc1?=pr0)u(Y8*wPJ1&))^xb8Jri4fFY-K z3!@GasB$tnv3oy278CTDwG8|-$I02_7t#BrRwPgvoEFrD0ILDcYZ$r=3VW3l;M_^W z#GO76G5jD-V@fclF6+NilQMMzHYh?~s~%gl2!|k@<}o-`XpqYb*dhTrPdJdwh>%YB zR4=fDv=N0Exoer-`$z&m({S)+KgaIebv$&s6Gm|3VaPPSD8dScdMG%@(pVaL0v@db zgHmw1pH&Zhij=!Q{_ekhxUL!0M8f8QWQPn2Fpv884uOToAUMB>;&9+FL?%sU;B3+6 zg}@KOY%$8oe<|(y8~4xEdY7Og3?oo6on92dr5NS~gAZ#44jWk2bOv(J3JCauo~j5v z2uXjHmlk2Y{VgZL!tvLfwb-a@(=?6=6hkkP0&G~Eg6+c@;d9Ot9HI6n!-%I(9|BGU z_=ex(*{vKSR&7=0%n5z=QoBkYJL+1%4HDrK3$sKKBCKhKU*s8essJQ3lLqS+EVxr$ z!s&xJW+arGOB1{P#)?vdiokdDS{`6ZNe(_UX~0!k#1YI0-%IEjDo_-aF~UX#5ORI& za1tuI)5yY+p!SD6vsKU4A1(ZIVa`p5Q~u7=mviHXx9B5{dofxV4r`*rXz+0--*f77vy}nnXdUbK2!@K zi5ggV=1rRw-yXP0uI4C6{15w-Wiz|bzkiSVc<`N2vCgzNNWC421hH^F(RRsYhvbGw zpxUe__Q7?1n5Vpyf-C8LHw1R{4_spM0XUXFr($Cm&ydsBq%A?iK>{IS~ z`uy#Efr5tYj-3FAG95`Gi4}bq+T$ZRNwB#%J3Y|7DhCPE?1o{U9+{>BO1zaYIU!{5 z#2H{Q1UGf^Xjw|oY1v2_U7YfD8s=q~tSQ4yjM^Xa#5}Y^1J(%|(``SJM5;v&ELnAk zbw1=XZ95MR{D$WwD@?n0#ZPR20iPT^z)EP7@p}D6 zQ>UDU^w5lQ=tdZ>&K0Kl+0`uNWZ_~xg7CXnm;iEz@JBm!tZL22x}qyu65u_lj&$@W zjPwvssY;;d7(^dFc+{iUBt+(~F|Q{O*)`e{Gsx%bSu=RD^*&v};bvlty7 z-CA5h-?%7#hA1?cijTl{Z_S~S4@8?cfiwdIRr&J>T89~k&dv))1ET#FeS}6R>?RN0 zp=lwqCrS6n!TkK-XP>%f5SPX;hD6J;@d`)wSo={MV8Ps{Tdo0lU^+yH>X#l{2P*MuQId|jmLl($;BQa`xxZ4{%7v|{HEl*Bg5^? zS$!U*zn}*egSFsKTM_||&yq*IhOSlqMX2ON-Bl>6_m-xK?C}}S6lQYR2mX`_w;(YO zE+X^F&I?5VtVjb;Z3(l&?$$FlH;=H;NDSj)sI+V&j|K4Ai#|eL3k=$Z8#Q0 zJ;l-QRG3gPVTg<5wVWqJ?oL2-y%94sHA+ZC_UwA3P1ATmecV7JG%~)#vt4*CXt-F`u?FvpW^21kZjCTg_UMR%Ng06}Exx~d z2zsG}hVba?VLhjTtzR6X=2H92+IeGVDjet;Fe}E#QpO2+VF2nN9Y#EiVJsw(lP5Q# zmwLqe{2+|^ftK2e(TIv}Hj?XO6hrY5-yr8;SQXSkD#fo)8Je4d>2XgU?_ zV`7}WHqw316lz(@;eDCm1%H#Aabr|{$m^vjjbirV`tcUH@4j?0`4XVp9E zJ}GQEe)le_bD?NfS?7`nqmsyKC7&6`F)AUEP3kqfh2M@F?DP}Y&41!)FlORx7YlIZ zNN8lAjRF+YqFKv7N!hV)W<3^7w3R3Hs({hw8y}j84fyh*(wW&pewD-8OGspVyai|R zq3^B{cIT-l$2CK1Z;4Txkx*VU$#7iE8B3&X;Y^9GTS#3N)@dp2V-Hn2E3SU${KQYF zUBfQhJQ5n&H1n-;H0^6wi2cx-Vj>qMrhGueFN|lScFyg# zPDjM)31=`KDUHbTy}O0)WS}KAC#{lv7x6va6n3eB_yKHp+@WR&I^|dk6vYP$X4E2(a={pzI1Ih zFT1n8Q1|89cW8k8wGc^;nQd4+@hh!tI5DNr1}D`<-V@bXM5#J@E!apxA}4>=iN*Wt z57!FMUkhGe=a``&)uI6LNRbxBe%`(T{YYrUxeo={N+8X)&r(6;oY^`*=^iPZCGDph zQP2xeE)lhR40nn9de)L}ePl$W$Y%_dvgV1gXr5)JvdPJOj0rh=n z%J6|0=w;b&*tpI*vwglpcLpe+szS)8MGRuFHy#qd^p5?QZ3zukT4UYhX0?6|`Cz|6 zjPoPwuQhD!WM;O23(hNzP_3G<#T6cZ&N`Tr+m&TjFWdyVyO0F8(0`S}23yHx=QP8Y zbF<-ZD?JqrrurM}9IjcmFLMk!ltn|_RyOy#RL~`x&!G6cTzQ#4Out< z$kYL77t&^W)9n}jcEB(oYxWQ8y?#Xx5c3jah7oU;A%TN0~GM*kfYu83txKP@YnjAIqQzD;P$y?;bYq#_Z_YwLDqYhU*uNY7oZDU!TN6{0Z z3Slc*{{^hQlt!GsmaWLKKuy~#zhLN-HRlF<_<%AQ@_3QeIA)yc5nq1$HY~G*M)o~V zpf4c$PUycKx6x)@TH|yn`gIeQ5oXj4_&M_BJHWP*W-+1xafNHh#w(ZXA|H9q7mFBf zz00uCr=HmX4(VCbgHo{yhd-;#WK6@ciGkjcLgKWU(J(rAN_6lUe0()H?X9yw%aBcR zb%*fHyA0j3B`PiX%@++@YW)=}X6skgZ6FPf%dDNZ!jWALj1Px+*8pQP0%TXZ_jDTz6YKP$)%K8Nb98*X5ilJo92)V15WsM7B?Bv8dvWliXFc3eskuC6Y1 zd6o{PZ$6&t#hxXv{qF9MqAbK7NZ3rntuU6dYoQy4zid)^06uImuCN}mZ zLj&$)i#;O9Hvd<7d}rM{hVKqTcHp~>$c=NwZ5;4x6SjnnLtH&zzr^nR4;mT~Tea9D zC@mWM_=;y}LPi@h7YczSmKsXFM?pW8284-RZ!H>{+RpF@Iq{A0^T|U+!x=NpW)1f= zNe;~NS^CS_Gn}RKvGWGk%JV9!{$6vu;VjvC^<3qex?$0TwiyQ2z>Ic2Fx2YM`=T@w<_GAg@VKF| zQ9`4UFx_PAnXPMummfDEzSS1A*|dypfEjjJ`h)I?1Qi`9y}Ym)hD2@owMU+S23Xry z5@r>Bq~SID?)BFU+=}q2vN)5lfyg4OH^^1+=6$@GS;=E1ZV_I)y!~1k@qXKI(V4jA z=igqOTL8;vy;VlO@?8i;pE(!sd6WKhfL46Z`rQ^(M=~bp^dbpoF(P5s{T~IPOR})_ z)=$oxDGIRoaC(?2EODD#pR+2wu!`6a>`nK>bKir73cq>!BjhiSUS=hGo;l-fojhYW zyv}|r!oRND4mN8=(DEXyyP90~eXy&9R$5)5>E&+7Fy;p^ULc26VJ%pZMT?G>eRmf73%*zpW$s{$u0AT|PtaMo5Zkf&aP`{p-4 zHXxvO(I<#(;0tqUSR3gyD-CX?G7GL8+=`2xfJ91JI+5!t&tF~l8mqh&8>?*fylU_a@6xvzc}M`tobFTLn?|(V!Cyc8gO#J72bH(R6GL3`7BoY zTsf2bkzX4Inq(6&azyL))qbz$y-H{GSu`yzfTQ)I89)w}k0l8|ifr0SI^P6~OK2rt z6`>%nc#}GatTO;#EZ1bRD3l|dN|R1TCKG%h#z=VSZ7!qwB`6!J~8N-(92bTQnDpYNa7?Z|JSr zJ_A6>vXLn` zVgt@eRqv2-Y^oP^g>1Li9dkTjFyvO$ON|HvhqWyJiJVG{zc1NCbNkEt_8ImUEu6lV-28}dt#JHpgGRP8QBf;Y z?ykS6?)sYFR5!~K4WFQvSQpG5_8H6k%*V!!qe`YPo*N3NBU($A9Q!uxDyjDjtC~(D zHNTSIN-lp!y-N7Odj_7`J$UpZ+C2)x0VK{3A%Z+Qrq|>`~I#Cq8`41RH7m~y%D?41!&hP|Fm+vKSK7kvaRHeTDG}iAqlsi zb78>#@P#!3yNpGtJ{N{68q{ln|gE_{C|o}l|Dyk)iN50ycz-Sv`feQ*AJUa zg9xb%=Q!t}VImhUk89OZwy8-<1JpxRDe|{X7+uPiBo@tv7snPg+eXsNw8qX^qxOkW zYoau^jXg@aLZv)qY?9~53FiuMSevF@xT_j{!stJMITQC#uRr3*03a@;)Nz1@>?7C7 z*zQJ2E7_zSDH+Dv5Oj}^gG1zF$bhuM8yiheP8vc+-(c2P=8sDnSc+@DfCMSp27lWj zCAhPJe%yZR3^^%OU(Vv&+-o1t0Z;@s*7qhXCQY3GNvPClx3^TFLmbG?IYUW5QPQN4KthINI@Zm;$BFx&6`A^JxtQw6%<%o0cL3Jn=CC5C_U{YtX zs~ROF5rz7~FNdqhMXM|gWXGp17n0m+%W?6eU)juVZ?@Sdye37=GHGYD4v)nVCM{dA zLegfkPq=-XF#2B?ca&%BmM(T3ln0u)&6n&3T1`0BgEHmbpjBnE$4yD{Y!^C`HpB0B zRhO{28(iM0p1B+oE-qZYpzh1{_8YQE-fT7utH}PXVAF-IBv{?tE!aCOXUPt4XE&{5 zW@rkvdW{lhPM*vS_0qYG1M4*kx;hylq=tVcf7t4dC3 zNq8sbP})pRes6WR@Wf7Zv+5dZ!oR8Rr_0tY9jg9H^uVB%B)7@Ic9K?dwD>0V&F-iY{wZhmvJS;es`lLSju_OX74brBpfH(n zF=L~|r@;CwYy`N^`Q5@(AMM;&W|Ehc?79y1OmcpevqNTwDQj{B`^JVHJsjDm1?z5B zQP!1E^w&;yljCh~R|^ey?ph}!4?W0Mk%MZs6UHj!KVPd|qsE*o2TfTUqwob(2D`6c z8CH_#)R^)$qn16VSv?}}%czEiLRLOw^G_%>0evp4l zmGEmVyN71dAX=rINt2uGn@C$UUKDT{?Hw3VlU+TSkAkaUKhYKt6A<^e~#KkdF1(>^vJGv*%;& zB+ca5bL((~?3=CAQina;1T7-=tBUa!;h!U+JU5)$O<6QZkFz zl8X&2tOdBf2TWEu${Hk)&5KN4bKY+9CTV{Z{$(*LIr;E=Ug4>c^UjwMc`v(k)ABjH zy&aG(Hbhj}O;%;Voy^)fBTVDY0-4~@+u~H=z&1v-gx72yJ6MOVg4lR1sJ9>oT%5}4 z_QtJ=u*wGA!^XK1Bw}Q{TNa@qg>Tv!U)?L!J=Gmm|El_R)iK#ms_tF>xvFacw{NaGr)ovzJC!e1BEh@yH%O_-jTO(V`0|R+u1K%2*S}o^?L0f;YWpsYpd~KA!a_ED5ZBoZ=eTfi%_rSCLAM$WcXLZz6_G6iWrt z)|@pFOSQjK?phfDB$W+F%h=UOzel+fH=k`6L@I!nOn?9w7*auI*s5Tg;?Fit5XaJB^EP(*K zTzzqlO3}LDfK&lKg5pdBEfmNoc9WPT8kf_vxOQA1vHa9g8yV6ziIV#u|3>^hT z=Uy6p8G!du&n)kmCv!=))m>scFc^vtan^iuWtoa$fags>*l=5twn7U05mw7yn4?-v zbOF67xK&}aH)m0}NKtjRNJSJY4UJ6%(suZH118M$-UP3x_*R*Whdqh_A{N0Q3c8g7 zX;-}NvNDyrq)}%*370ggR01~>_-cjf-^@|LZfdxP5kP8$jo5=gS#P5H!8xim;f-NP zFuEgzR^gX}i(+-n>niusU5<01z$+1ciA@)SC)JX|xu#n3werghzC%U*;P~N!Rbh-n zVklRyEmHwq7Nye+kBBh_w#8<(W~+WDQh`5Gvh-USJ7>Wx2f!=(-0HuVsR`_VGq@Tf zN?=bXQuuPKy7KpBGR{J}%XyVGZB^rE;5hIwOOhhh18#S|NrXg_OaOQTuY4st%a^Dm&PIFNz+;Yzn%i{n`5O&yiuJ0CRYvqKLBi8++Oiv-`ZMWyi|zLQnz5Ee!`5_}&ISp^Lg?-#nFr3K9f)hm8gCPQdohoZPszyy@xG~^mEO=`;=;KA;vK?z-XXpVxt755 zRFf$9;r+L&Z2+dLeQ}4q$nG9yORtO;;1{zie%pZ&C0nkpy#^v2h>^N`SiNY{U1;FRLMHQ3{Lh z1e_rF0B{e}@Lrj!!d}TEMj?fv;aAWPRL7d~Y&jv;csTC%((?`)Cg+Dk#gkpWqWm(0 z0|nK=EcE=#V!EghN!Q&{rXq?y36Y9WcN|K9Re_Z7#w!laQSByFyy2+YhFESNe1u@| z+PR+PSnxdNA#LN#YTI5e0)Jj0-JlU)wtx* z5G)2MW{A~)G)JXhjBT8^CR|B7{5Ozs>Sc%KscCqP5>ZHhKaO-Ns`>oh%2j3ZqQHpD zoO4t==T|{ez|V<+Vf0w*g6xtq6-Q|@=XXb_f(Z6ar4cQYZc>z~@zUYs#!dpdB(^#| z8FS0UclRO%0fF9_Vt^%sIqWn>oAaoay;FV}q85Cgu!6Co@P9?IT#;1e+aeV+=k`ED z4ZtH7gN%m`0eMmJ!!i{L2hL|VRAL`QoC$ni@aOA)K1YRUX7+-saoS_8v0Jf{OnsSs zu>aGTNE|R2J?g^2>0GeHD!*QS8FvSCNs%-0r8vjah+N55%)JXt%_uk~j74J?$Z@i<-x;UV51%p6_;K9#uP%RUY*xKKsU>G@i_p7D{ zfW#&fwOtgA%G0~Hkp71q7@F=TUK?EnkzHYQqp z<*sv9xWZ}Z61vA9GtMWgs`arl6><(!mM}ntLZVRtDiuzur6c~F5ZDOj(1$1 zS6Sw$I9;)&q0YK-V+HgLbk11&Crea%a+QkyQ9YH%>7IlHwkr0n9Vx#Ibrg%~4q$7V z3qT)-3dk2aMD?ETkTlL1+!MjTDnO9o+;K9kBA*rv5cyEu@Ua07>Tnv86q)3l?|yCO<~D3ML10A?5IRF3!lE{f@o_2|8c~ls3a(zI`hh)An`J%axKC)s1+`GMw3<0Uu+?j7r~Dtp~21g9?WY4hpPnJMbx}D6=T^R)wsc@(PlhGzhQ{X zT#Sj5Hj^W-H^Be&*Mqf!{Qg~QWn}xM>_!-GN9K*U?rFVUuN>{08ZZnESyTEU61fz1 zI!QA*dj3OO$u0b4Rl>I~#iDIoy0)TL_EJTI5rNo`RepBq+0~cTeuRegw8BH}pJZhG z^6M@De3NAokrm1r3cMr+>P1X`R|aLUA_JPxm`**WBv(c8dy-}{KJ`qu@Jf{Ohhv7q zZ;8IUOnf4zR*gr;V;-$K86WQ<_RFzI+7OGljD<8JyXhQ2{k~~lEgT53NTb%yT!DT> zvwshGUaxf6?7CRY6+&%s@|OgrPufgTiM9*&BrKCV@m)>y;dW@N43Jbmx6mBsUa1c0@8J;vukE3iBjw zM*7%`+k|ClaXV9ZvGYn6T$`S=Sd@J>y)iwdH20~JWM~8y+|!zcJ4W!+C?}xUWkSRTN*^v<(mQ1*JN@Zl7E<@J8TSOoDS4H)`4V>&>^`EUgUibX6RZEG?`RCQb)Ws#}LqzVf z>H^*|#$`5S(o78H^HSu&D=>0NGdb||74QNaFjWh+SF&bVGanw!1Q|;x5D9sc3C5Qo zp{wwkq?sJO`28;7@vGQJWzA`r)fQZ1$laFxtH{^`@W0%CHM^?yvbFrILMh-#FFiPwdyQ%aBhBD-{>T zWdOHl6BG-m9#Bxo=rwHj>cxq|fzPW&+j{M$m2)HVCtwVB^9ootk^f2+Vccp=zPqQl!8-Lm(bRE_rpeaPH3Nq*^!Fcx2i3& zBlS~tk5^7t-Xr@ljgYt=?CmU4I1MqIP47?gypq-HMs;qLaTIVGM{dIolQxqRA9g@s zZ{|CN_S+#HIw*pKcyI)B8h?R_*at@(YR9C1Bt|YdgdU{LV6x<{q=XSElpAy2_C54A{@Viy;!!SVW)8N*k^wv z>*y~og~L>gn{X!*ijZ|o?tn2dFk}+Dy5uglrC}k31RsAAdv+7P>DXP6`*hzgpWpXM zX-zz_AC{n>g*0-@b&)o5{OYPE;ReD2XVu5393f@i84Y_i#)0qz@;h(C5&y5x)2J8; zjU2hZsaxQ_fZrE>{PUeZmK`2jThsjgilzDnzW#dI_v>D$yuCWT3?IF$g(@RoM2t$Y z38NH`Nk`5zDOdJqN5>q!a*ei+A^m#}bvH?y36kWHwz*H&COom{Pzj{JxDuU|CroaQ z@rs1QYvzN>m_eT+p$8zV+zXqDUUo0S)E*zK5}ta1_0a_c`p2ABGZECf6o~+8;T6*S zkUB_ix(`f{ku-||eH)V8YT@7afeAXDML?R&<^PVm)T7Fz!|c=BlLZ7y9XS8cY9!(v zLPX|55(#bwfaKLb{cSaQCyc({Q6EC=j=D&5iAAYx(-(|sRVEh;Vk`BSxCj~g3eG%9 zGdcN3RVkzlI^kF7;jv#+Y{sD{o>}AWkYapX@0L5lF1>4*Sha_?HY{u;`=(HB<4aon z{QCX6Vk3TE)Phc{fk|H8b*Q^h(oFU}eO2lAs|C$@hmhT?EjFMF@#hDJv>6KmB^|-E zanv}eh>}~+M;DUjQe7Y664iMK2W{MQXhYA6>b{Dl6&)3IcQ)*(JOF*RqdHhWzNQvU z;BT6MF3wO?ALE@&VbrejdYyee*%(oMncdPPZ6>nYH$dcl8CQ*UJ;ipsE(TqM3S*N! z3VzhePYhef2RRk_^Mg1IPHPtP*FGq+oq}m*xDoLL_kOFI_={`{y?dmK?1oNFv2A|N zU4ihBEv&X0EZz)sHYNFT5svzWtz_ReGin9gzOzbLI!nVzmUhw_a;w(w*A~~#PhZ5B z9WtrH!T$7MA~>eO^&-uaXubq&$3L8FWSS}+co@6&vRa8{&6ONAkZ!_a%08-K>3w=TojRJo zD~>Lz)hPR!p^@l>S~0>KlbE`vFgj^7(Pw|NO*r-xz03tBhBOi70Kmd?Zf~Dcts?8c zjS)$jk*^u-5?;+(y2^1XN4|q#CQXs%>5AI=v>_wUD2z$pgwvRCY65Zc>UYqOq?tH> zx}{rCeU}9omDM+_*DLJ~eNRE{9>@fT$-$@bhNPM7`^pcu0$WSfM!pi?vWxtsh3ODu zxK}-cU@VW$VR0$qWIXLhEaGz*pro1H{m1*QLgkNW1fV?__o$W0L}FkxB^O*=yUzs0B|sJ;Oa6s2lPr68C!_`Xu|Y5<;FKLSmlQN!2<%a{+Im9!;B zyg!Gcwm20^@hDY_UuBzDLuG{BP>(-hOg3DuCMW!I#P}+^^-MHbPybwu$(mmv#>AGe zq-dfF?8>kNA|D7ID42<%ef|pCr&4}OiO0ns6%NF1EGy}x;a8X;13mCE8Q&uYIy|P0g!S@5zMbrY@TGc~KFG?d8-I zL?;*(j4?7WnQ&)S!+;Jy_Aa}cm|sV1wUkCS4e2is9(WykRj0Qo$3Y<$@zA(9cBEj$ z_0WhyQoTx%8^%ts4UG~KIr-c7_Xy9Oz8c8MI5?=Z?JAz^H36XUlmE-pN_bVPKS1g{Ns0cMcRz?`cL-@g*RDX&kau$ z_+EvH4UUW&Mr=6He(`&DYqPXY9kN8DtGkH-qXchQBQI$$lJa_&$jpZE{Cuedo4wXg67#Q-Uw{V;;Yz5xYS!JoV z^v_hP4Q0b_C6mh8tP=&#pp)+*k+AsoV%q%d0ub707UFxN_ye`T9n7k#3PWA@YCTgiQYWzPg>^wD40 z!|U7!*CRplTto`DvQiE#acB2wj42#Bt^}6V%>S~E%`FEvBZF)+ZryEw7em&$6Si=K zK)@+Tt8u`ml^4Hx<3HJ^)eFe89&3K3T zoZS6By^}9WJY_z%eQ?J4*!KZ@PqWdK99J^#a6B53M=}8xvCeddT0X>*NoYj&r*r12 zrmg#k1;Q2LG3eJLH~>y{h$P(4;loLmy692^V)T^Yx5XbOM_*ee2M|^7rDsOG5_3j3 zR8(AJKe%N+yA{~|u?(Yg8Wq7@E{D8^BLSRU-}xKNhEkFsyJ(wa-`;`&%NUGN*x5Y+=#e?xk9oNz*p^;$gW4P^<%MG*%mCHE<-`k5cbzHm!W+P+K z2`1Q|8y_Z0S8}V!k807EghXV1=vjO6 zs8_Lb83z+)ps1P8YL_m*$QhIM-07S_Ud(O3KzO;HLqfZR+vj$Iw*l)dq0yaiq3}op zmb!Jx7F@#O6?H#ewrOdsx>)&c!zU_ASo{N2)jkU!C#u?(KEs%v=_{BVy?qJqI6`v0 zUxkET*nIG**Sm#>z6!I;lKLA&g9nu6jp#&FnnQ#3Xhdm3sF2CVI5iiI7B(n6DA)+Ts*xpKKc!~t2mvS2e?XzFW9H2 zCkLJ6Q(c#U2+r*?rXfb%f?G6;WBVZ2HhB^z!JGen1%=Fl#2w zakBp*3|rDlPP8-K%vZwap`imRRtzIFE*8IBe(^P8M zAvJ78nzkxhSO!LNc@4t_`ZP&xJQ=VKi5tS$3MQ7&$awhKQZ8MG@IWgE2cM&eq~5aB zh~_O}mPv&5ll_xvkJU)7-h{ny>3XiE=`_+@E^eFf*aWTWHv6x(y z?$tU~$?{HbYvW*SSx6(yn_ig7D3aN98+H|Tx&i%&62qLC7>p_MsRTFRQ;ddG<()p! zf)A6>i1V2hTWKQMTH&WHRPxx0yXVK_*D<50T9!^H&4YX{Z`6qsbWTt;Cecwe z;fKn0iG(wfSFmizWsj+|!x@n;ezOhoAJ^zpNk}#MEmrf`o(_TCPFK@Wq$#yxH^cp5 zrB9*i8=2GvIX2W&<_cXGW=}#R<3GO>t~rXmm_3mzP)RXiS9;iBpg$EJ zh);`)P`?%3NJ!)W-;3jjmKYk{N=3G-NK=l*#k5&no`^C$%{cq|qq=^U961}@9^Q=E zJB?(snX+hzIOVG$(gAPT~E2Y()-35IMn> z>Nl{^){s4|@aJ6RJM|?yxt4~7By#jS%Wu_V$7C4Q><^Y$CeVuMB24nbCZ;YdueP3F+a<%6tY@uZ**jv?e0Ypam8PVHuxjwdLJ~P}U1T+RXnki3k*_he z3HPb7TS_U=;?yWL{ga~#sDTNGkqz`}%3F6-i2+Gy>>Q5}Kr05hEfsq469umBT&a`mPR$*cJV%Z;Q8?B28R6W#6B;zhL2 zlHb|hmy7Ytz*N7b*R0PP3*?v!qYCicszwP3z#+eYV+KAb@+8ld(F=cV+9!sG!MiEM-a1W9vtVRMxS0A5?AQXey*uWN&~2S&mQ4} ze#~vBvWOb(<%g?^+rblAx-!bqP=6+9+$P=x<2Wx7A&> z(CK!Cd+sI(|DxB zK36y}u~L$7)G?0xzQ@Jc$%k&Pp*31cpYbCj1=0Bk$)n+TMsZ~n9%|`?2fp*AZnE*^9kDad#G%8Nb2Td;tZ3MY+VHp59;noE*j9lF z(KAb145JV6s>o;b3JWvncgVxaamNTiQA;9oV;s{Vr2zt)iyOvOaLS9*}=iNO7$!jTIGT)Vo8BuC`9OI+9-oboNA}ZP( zb3;&B7Lv%xwa6YuRKi;F@(@?9H;&xtYVy%A*MTFJCYy`3w>i6x=~YI!OhPk}iCQx; zvD3aN7E(%^kGtp~#pqnO&&RmA`tU0%mi(dS^C-iut$L!)QJavhpyKkc>-G;8k^Eh* z72-i%CD(+{?`O@UWB$Gnx$rJ-HF;v1Yid|XBAX8WzI4=f3hT2R?B&iPg+C}O^=39R z&8X$6XwWxecE^B3ZtJ?)Kj=@6T9>Thb8_tqJeu<{HH`}Wo_Zwhc!&q07)(qFQVgZHP*09m@#_D7uHd>FC9NX- z?oY4aT(ahZ(g#hWUu79d`tu<-7b3c=@O#o`yn<@q-?$3u(@MB#me;ST+fu8j$yMyC zI zUdlr>S(2p>D#(UmJ;cQbbC5%z z#=>SI`^x1dOxY&kfrAhs9fQTud8s+!%DeJ9i&C4D>$P$}X?g`ezU2@k|3V5m@OZG? z$+d?#pR6f}#0@oLj&P$1v<=rNeJnHPP$HB)tirDelw_=}7Y{ zxLAGRHjH~Ai5%Drc)Ze&|MNEdcvH@A;#tMyVRk1yQH;)d^TSlC+H;N>DocR^;Z9It42afMDczWm5C+tNoXpRL(IZ;XB! z89lsMac_wQYNWy_r$zmL1P z4KWRNWYZy|1u?9EK}FUja*qn)6c66d0UdI&C&-Iuzw>_yB3e)hsk2m&(cCr!eftxJ zG;+HNlyh6jI}bq4E&d1zvPY32@kkGXn7?$UO9grCOSn~>wvKd(H>p+3!m>Tm#{}6| z4A8DUGgKVYOfQN{!dVf1Y(P4f7f1+UwK&XIXSk-eGdx00Sg!lrnf2+zq-U0j;Ft1Ikvdr@8K5UMMEL{CyJu|5U9 zl}M3>L2rO3tfFjmS18U*(-{TrrE%pGB{r28c`7e}LdghE5z{Agg zTP4!6EJ!c<{uu;mS!q!Gfb#+IX7OxwpnTF#UzAEtKHC3(ZPUY>TMu3^hZc)`Lx!T$ z;yf%RY6f5jpwJ;y9<&krb1)Jt`Uv@pF<=Eo@fkU_{YM;1EFFY9;<~Mv>Q;84j_lt0SlvUlf33DJ-CVhs-cLV^`{`hD3P-K1gpMZRB$3Nn ziREP&R3x+#mx<=M2VcfTuCu@RN$9Vlg|{!2oXAgQ^DS%@Po7dCr6n&>o1L~u^MuNtSZz!@sPN^j(^{u53BWw& z4cP29zXF4cMM^>_JA4JdSYIt9EvQ^IiBDRV2=Q?LOSw^C&U@0+ugVsi(X#yJK1QZ zzV4>lZ&bI?li7zjX8#kI9+R1UmVc~OHN&B1NJqZa8{w{cn{PqqZ_a==Ku+LVa8aHb4vgw8+F?{Um7!9dDR8a5go35{fW!}^FTuL_ZiU&lcD z7PMj)g-#87_{r-WVp)~$@Fc?w>gAbfcFLC<(uyN6y@3%(Xyia=q=b^ZR(RkISl3A11y3%hk7)V4Y}2dI`t^@CU#iFqw1Y;=gh2n|n?%k%|CN zr#&eg(OdzDa^>G}V*?~PGT-R|K<``5JkTIwh?!K=&S=KYVpQr9LYkG$1Z=gY8;#Xu z=Rc_CQ;4Dt3Y1E~{UF^6;h;#ZMglx>{)6iR{Qn|UL3ZzfQj9BCyQz0B^cJ^0KuH+z zc|0^IV7sOLRNYb0e%i@J@8ein^a*m}dtW@|9@*56s9W5G5ef~G3404ex ztsints}_3%=$A*7s(&!7l%7iiz%Q?8QWRP@M^W6;#TLJU^ zwQ^~*+pBpv*XppJ#2uZQ9*T3ys7s!3r~FpADn(vw2O|$v@-2-L8rifoRQ9ibuM)ki zbIsD6BGI8;7*K`u%(Tv>idr=|Rf1wax5&_sghozyA1y^E)R4>HP`3*2%6Qm=9kbQ* z;%Yd?^|4A|k7$#F@_uKshfLS=-A&SF((HR>o9GArb3G41VVk9Cnc}=mOpcjGnQRY| z;L`E_5ThdhUB_dqFKkBYHqfr0Vo`%=&2rj>Yj)}UH>ne2<^-_4f_!ptET?e~k>_jC zg`}C*wuZo@rO?=A^h=zxH2X`OURAGRBBGM3Cp?~vZlFgOA^)sF7m{YOujT)hJ>#QG zdH9wcvozCFl->PlV^5zlU$CkBEW_GC^ANE#pbJSe(0bo4g`l(xPc)#54ul1X8M$#9 z#`Cp?9kO_JeZ9Z#Gc~VKi-eOpuxC-Vxvbvg1N{a&lZ{*B(IJOwQcsr;fRGDYNwEL1 zEhV=ozlKL(oPCz&%85s1m{p8?+HjUP#8lRpEyqq}6JFFMFYUC^7K}$q z6CLxP}5 zx}(w}LtV;^wP7q~-z?1r68#k_rF&vh5$I95hQq;luD>i^KEDY+B&8AA^^Ob42b=i! z#Y%T;H}j};H%s%LMBj7&usW1xl*&l&VB9lc12SuA2IHIY^%5F6(R~*n8KPV#`Qc{% zL$SlRwv;-giDF`hW&rANOngwzPEPs8LTs7U&hMhrAfcgHN+AWwCd zdZf8yVvlZlek{wV3c-M8dN^nXU~g%NjaxB935}M#D!EnGlg!q+Z@zU~sY6;NR_rhn z85|~``m{QpN(GavoyMMhT6as2wjmeTK9= zO_rG5RO*LjbeO_fC(4U>N8&NFho%~kXLL9brOo8XgXVt0)Wg$)iAg?{RIuZd6TO3m z$#G*+oT(>vVWuQB>bozwiq;4l&f@`2FvUj;(+Xc$*O!~}P3q%iS#{I-cvnIrCyJ;B zOC4gu$@3xeIxVy7sd6H&R&Hw0lAGefx{0YtgQG_rLU0e?(vVv~B8>19q!lu72{Le7 zg=2eonzd}5r4?$$ouJ}OOqAj6u58+=HL==qXP;uID3Q=g&>&()_G=6;E4x5zlqK%$ zM3>_5`tuIcq+;4{c1{-Z$uy7*O1sqqqjsZ&R)RAij;wJFd008O{ePz7=e(6|6%8Hr zswMwh=ase9=Bj>Nb00OB{d@g>|Liu{A}UL^h!itvvnw)_@-*X2#}rvD`Bj966Kr8K zdGY9{_K@S>*;*wG4Dl!jC%sUVFB?A^#+OTJM9=TIK=?$Ihxyt*dp1@=l=yai)RWH{ zEY9(;(>(29NL?7`yQGx_Uq4y8__PUo!#I1;!#VRkj7=i;IXG#{0h-M^F&QQ5AQa7o zt-y)^hDyl{@nDd45ST>*WVw8;BWs8lRT|!)|P23rXb2Q@1hX z!s>IHg%xo+0}~m}ms2?O>C8YvH=Z=<#2eFR5|{xgjmVanFA)Ba;Nf)0XzVV%N;&O` z#ucMc`?!|4QrI@qW^!zspk9{AO5lC@;ILlR(~}}SBX~vHEP5&*AK@*i zRkP9I=sbv6zH;b|WIe@YUQIqbhA)-S=vvPepTB&9zj!spo(2{v%8DYkDHs2Ps^VvAm$5M{&1)Lpld$SMZydspKQ>m7l4B!8DIf7l~_i2Xj|`o zTwV)2a&>@`SHd?_z=~PmanL(~-vzh{Y`N9su>z)Yu}5&jyX(ULl&plSHcah6iGz_D zmv{gXnw+R@2TMM{dquXiUcs+iz4#-fc|g@qj$Of@AwY_(y^_D@Ozi&JmHf)n*j9s(;D8T zrTwfXckknynxwQ+MGhiQ?(Pu&y$`}+t$lU}IubS8iIgTV%xLXX5wCVwO-_apoO97l z{OZPqgd{ntM?HbLjG@)SlQ+?e2rdvbu~7UrKI}0lnL(e;C6A`Y!|;z@%daBeya7U8 zLW0FLU&{395IR2#9U1bDnU{A4v(4R`8J|c`+Z_gTPn3RHD=}TmH#aOKk>FNm*%E@dKl^9TMHgZ@c28O@kE#F>9ghX`slmLO zeDX#}Gifs-^y{`BzWwBC;q4o7@Rn8la7DwpHNUF+O#NW(*JR;JZS^u3*jLePuUVQ{ zCC;`|XGnyUMswCt@LG-jp$OS_AAUjFO!htThqJ}|{+;*H>xgZZCRK@d^@M4lpivB& zwXXQcpgv*gA>MoOp^|2DqMruT(`(}o?!~HiI%jE~n0V119}M!-N?%VnH5F8h6+Ggi zA3B0XmynPze>d!t4`@1szaOC^an2$KuG~#fKbRg>=A1h77-x|46KZkot}pT^!X}}C zd%jUNKm4gkxzI67Q@g}zN%PK(Q4t#PGt;I_czje%KD-~FBxxqjsmsbHmGKAYSgf;1 z>ndN#$0iN-aTwnw*+~Oq8|>*3$MW?D`Q}CmjT~iAO{`?bXrIAQI%qbYI5Et4(kfTR z&3*qLVc!8|S5@wxJ3W)hlq8c$GD%2)Ng$NmQ*MI*x$T^Dd#|D0-h00yLx?C?&`8;U zs06X0nGg{#A|k;jAP)r|qJlgmsK7&1VgW>i|F`csGh_}E|5=O0TKn6x?>>8fyM5*N zvqnk3yrc}HC%yq45f!6j?^t;w#!5n_l0zH|{39Xf#i76EJP2}n{d6Q9yLJry_Srjb zLoa?---l9n>Nml9!ECeq7ZYu@r)CV~UOWfA6^YPOu{it~PM7)79NctQ z?OitT&hTv`HOb!oZKH->_s|pgEt!IKZ9Diu%8A_UHc>>pU{u#VDZ7&drvj|&vpO)v zA`uGdKhb^ruJ3%NgIAUHAkORIl`ZITB#MN~m`*ujC0nqa67CXrLpvfF+WM29!}MSd zrC09OgB9DVQ7U81rcULf^jCdH4{#lhgE%{h?@83dMC5ec>NUF?UX!yT!(Rl5 ze~XI&((w&QKb+BQ>d-&HOV54~Q~dE0@3uy?Nva{&hmFOIA=yF?+^1i=m6R!DisRkE zAF6gNcqQ!Q0J_o%eIMTyse@`zCY~$FoKHfMPN4?&KUvifi1Oq7kq7i+VCf+)F>kb74P-lX>_7$T|U^mUb%Z4xh|eO9nE0 zJBN-yJ0cm9{NX!YyTqo>#6$SCWId>dkLLT6bETssCwFi*IccnGNPbG6cuc=~FnI|6MhfG zNkP0y6iZb~NjcOigC$myl`B!cAMZR0swI*k!gsW59O!^?Ab`(L%jC890W!3cBqPc>66Dp#yhGx7}#^Odm!(n(AEr2pnS5x`pnvS*e91+TpY^Vvk1k z5WLfE=qryycSJIt`2GV3$Nrz;;}~2uay8+hlU9Y9BYh71_mimgbC?~G2rx08Jr%ui zV0%Bhq~Ej#ZQkStg?a)MDzt1=KlCk0s8`lMIPmL{ONQInSYYVhs&MWN|HIB4t_xK=QTw&Rx0E+>0^1PJ!cM~%bo&t5)~uK_pkln^}eR_=ck~Zji!SZPzL@U z(kg{xls8)mc#AoT^b&l3p8qvmrWT9P5yw72vem+cNcAipm(W2>4#-EX(%M|1Do+(# zMK)9Qh9U?(2b~d>LL7vLLtD-r9q3H|Mh}6cYBO670Bo8=M>u3ry)A?;e;#fq;$rkv z&1mUJ{ui5Y6bH>PmglZlVWOjeFUt}p1EkUx)c#_N67=T<{lvtFWSuX(0Ds>jlcJY? zt3P9SSKlkc7xyk7x?-RcI?%zFaPL7kw9H2YnITj@HPtl3*cUZ2rfDAfB0Xh2kqLRY!u=#70lR&-i_ zfCe@N5Be6GkcR_IlrA=ORIsjT*;_F*^E+rlRE&r_dLY921~9bW@;hu=P#nZ5L40^Y zAa6{@C^i~*5_+x2*+8W?z=LFeSKp7`dKorsksQLwH8bd18L-vNZ`i*;m%ge$eZoO% zlWH2`UsEihGFRa-arssTGQ(cgkB=^v!BgUW*aC5M;n@G-hklr`m$Y;;SE$M$=U2YIeq~!Y3=!|-gfG~)z@7#kMaR%^MKfcy`xSb&;Vi(7WfOm@ypM} zu7Bu(mwL%6_ysOUR|HP;pCAwpUd}h6Ti?_VPj!)sfFywhbafpV6@VxRaLO}y&L&SK zNJ>f{=OX2CjTYC24MGCOc#MCdd+UU6=`X$oZ)x%DcQs??LrT$+T)qdM(aLwgbO6!K zzyg8c&H<|rAWbmm5pdv0d7XOT9sTIqrK@z|D$)30pn2jUxDiditH)v49vaLOm?Q~f z5djl{L5k7o(TgwZr%s_&$HmetT~(kR8+cETL#qMgA1Km+wg6D{F)j(PDCGd&3O9zB z_n^Z|S3yT4tHCe+p8jzN&<$uKH9C?to09dMDeMEP$$n<-Nm5#I{A|E>xTqQ`-JG2# zgZK9^dnP=#s;nzliJ7SrNFk1D&xyh=aY)3;Yp#pT$Mjj#QD``b=`7k9BOVa>feyfe zF4)XKNZ$Z6I=N&GbojwvOrhd4JLTy7LFPnO8#Kt=KCX}%)LK#>AiO@4kus8e)0Yl0 z;~x@rBwvz)wo$`OU<$*M0n8OFDhREQ=73NK*sO4TKJM6k!_4UFC2Al^?|l@KcGh2X zVokeg>m~ChJYa4BngsyL1>AjLxd3*k1UBUXy!Tf45&H-;wt9&g=#7tGYDEu@oba>P zuVijN!LGfTBB({F5KC;}LNMPwV~k^B*RtLX08+DSL^t%MzPE?V1D#{{x@X|P3?96A z;jj|v9bZ=fSZ{F}>y@UkVxNu;;vw^|6LI-iO z8Gk#@deUZwGy>6e*^qKjkW`CzEwp+P+7Zdn{)uzoE)#*1yFAIj3&(O0=e+S(G<}<^ zSgAxrr-^Y7?%DG@PfRdf8^fj01b^L3JM>B^>6DxES!>B* z4u$xxyt0;=7#GXHD*m<8I?^cyZt2#8VYpK9Zw`&A6;h}Rt(r5gsMKA_ZWCK5l|o4! z2l1;FRpWEFuJ|fIEgV>lyA?bLw5fufpR3Z<0NM8BfsR|HZKV`=4NsxgMrLeWEJKIe zR*1IW$Uu<(QtM~?hfAM&d-HjnyEii~$*TCWfjF|V z#KMfpv@VyL#wj-8P{HD^hLP(O2EsTN7o%gri?_qwAIw6Joq|8faWJ#cL`~DqrHGPA z8gd#;aT#O`!@>bTe^K!Qq4b8%-?uXGN(>%MEhujsaDL)+NJlb>kfOu^lF@;4;CA!F z9nAQcNQREy`Efx3H=O|r2s0L4m@#kLVk#-!DZhe}%YByac?N#j(-;U!TqHvKD-dTh zZz`SYaHm6;;N>2Nrg&YZ^~y$ws2HQsP|hrCmC$FBkD~XsF<`=3REoCxE``fuz_zhd+YTcOP9aD{6O^TF&B%(R zD^PFMQ@*6fghH3YpxkmMsPKnGUF@QF&IDbVFw2{A1)XWz=_ajn7IYC{wS@^07o$+` zoijIvFPK8sPc1(ejqhaML<66bGsr4sR!oRSeSSu+ke*;h;M%npu3cV|vBAwPyKr-> z5v^Dot}V`hj<#rOsw6r>!Z?bG(UJWZ%%7Csq8SJV1iUvLa89|^kQCv?oO2ZBC&Yie z7SS?heC^UTQ0ShE{==zv)7H%Vwhsu5zzGCdOe{1HNy8Z39Jtp2Uor*@@^LvcHo0UC zw4bZ2ShG|O zboAxh&PR9cVq7OUS=XHhhn{#J>+W%Dx5%U_T6SFipST*F`_}J*v*rRg@e%-k)4NNO z82VoS*uYDpXAOU$B$cei&YE+&8(4l}_c7QRZ;U8MoIzWGQQL_adV+&b=osP15y{Z8 zuR;9wmMQt>&IS{Maa^;CqK_~-{SCQ^%$p$qr(uSLA}&TpA3xeXGEJ+M~!49%$e+_2%S<#yT8AMRMJxUaS^3jQ9X3z!hK!i_NGpSWiG&5PYK%O zHx8qTFeFKNKAzWFNmJF2e$Ii`pQndU5{VG;$g^OpdiROx&KLF2wQ1AA0=(JyQxwdn z7OPxmCUjH)kaBUywvCAk_j~@bt#hUUjy^EkRTjEXw<^g9p{)`bMTTaiHHshBThySt zVi_PRL8#%SkDR}*^G`K@4#WBvzNHo*nno&|$yKxw7fnW^$Y{mue{nGieKifkfx)I8 zu)=p>TO?!z3S%5_`6J+ui^pu1S|%M;5qxJdS{M+K3=uBK4hCcY`p% z8bTBYu$mLQn<0Rbq{~B`v~-i9~rA#;b{{!Qrb{7OiEuS%|Bee>;QET%g})vt~m|DRrKpS z5+_y%>p{pk5gZIUw&)=!y`80_reY{*%c4Oae44lz5vmQ_k@TnZWT)kW+aY`(q>Kp1 zq9vS2Wk|MNPuVi{T-=rBPlYdE2=gS8p##!7apV8#$2;#|h`&j8umN4+lQlGLx5h!X zE#_D@l>x%85Q<;S%#4YO(J}c+-SE?O=&r!@Ip~3g5)hrd8X$-b|t=LwH3mmZ4HZ z@$EzoY}HTF}Do5#+$ut`9Qisms`$C*x6JAn+rZzR-*^9%<3_b3>`W8R@dCV4&Ao? z&yY|Mhq%P<0H2>sa+`h1{}b7_j16xzBa z-R&LDz7V1j)her=c7)?8cQ~V##uI#Fucx7RmBli2MEzUX?)J0O$efuU#C#SSqz_&O z4f1}TXui>v11Rg4D5a$ z9GjZUnA0cRsY;fm8+xxQkqfXiz@J}s8LVM(F?#A8CD(c9GJHoj%;BK?On1y%m0UFx zP{!O2uS)KB$MNc2jXqyuR*x(IG1W^_y}*}IwAjc%&VFVi2?p>M`H9Bj{jZ$WRhDrj$=t7{wfAXyFJ z51vFL4VXre3{X+uoasOy-Mo^0ve|76NB{GUm905<2Dog!C4-srNMR@GHuijz85(pIH_S=YxEy*WlA&Y&_|!tA z>l(D_XO&&(8$Z==5VpcuX5U1Ele+YP3RH7h2}P?NiJ=2G!SVU2D_}8+Wa!AdKc2tt zUwS38XC1b7!sVNU|6_P`NLh^liX)`vKofv9awRi5b%HAB=xd1+UHA|0V{V@U>PcWk z#L)2s+;D-f#{q&Is$C+)bmk^=@Uw;J1Gv3o@fwt~yc&h-9IZ%OOCM7W5<-pG7hKyVm*{)``L!i}% zW$?x=tP^6^ra#F*%vuiEG=UU40DlNi0Z2bL0xKlk*Bw{G_yj-6jILd}3gAoM)iq)k zC8zA0ysj|+008LtrFdxZ5waQ?Kh3O$WZ9)^Kwx$q!qz^0;upYY-~}K$g@qIPBsu&$ z{skba);+9+FtzV~mhp_8Hli86xaXyzD<%B{U+a4i2aWy-f=1^c=3fXJEy$w;L&mbX zvfbR&l>7>G%6>S*MaBFrxeFzS_Tv|_NFC=@b?tR0P*wg~RKJe#LAa&4s!WmDJmI0- zS^%3#qZh7+-A`PMO8aD%PUr^MkvID1RxLm!WV}f>s*7{=N}IBTYbo?!H-b@MaVgsS zc0dk9B0EMp=OVDrjmyoD3dNFId&tm`86mD4mc_Qw#ii)L_+=2f^T_t;&f1%yqvK48 zOBLmGCGWQalY%aRK6(pmiK0?;r0Ftu-n#`XMiUT9e50XiNd$Smx+s! z+OXErdF^om*gU$2!swTnO`F_vBe1W`c6az@%0h;TNZsrXsx@vvj>KxZ4qfskW^{D1 z3{8CVx7#|meTj(!=^LL`?}D`YodY-ad=qGRi!jer`O6njPv&Ixzds-1FLLk8duuENa8%(`Oh7LdDp5LW{w=-7s z-W?3kF92IJke>lgj02Wq7D7ld)h`2)G7rE~RDG3MxpwI)=;&i7OtIhlE#{_^KC-Yl z0V}jihzxrb-uA34usyKosVkW^=&`TiwYhYKqiIe+nY-ZYC$vo5^mXROjppm%)pIq@ z=bzLr);-Wj(>ItIkw$hvBjIgM-3jIiNPP#ISfq>r;tEUwjEUY+q@Z3D=j?;c{D5cSZ%VRU9B-Fxov z=Z1bM2@Sl>M?GxZ=bhUybe51|FKz2+O6}88Y^iLcAt~o=*k3<=m|4AYkp#?mDwOfn=mr;(gBKrE)^rc3tVjmjKVT2|+#`lfop0a6 zfDadvLxfkMNV$2%pG4Wa;jkCUx{A-|`aga*7)mw;=OAlIczx+znS_lhv?CsG(O@rB zAUy_u)AkOtW^}O#9hd-S$gU&$nhtJ8K8Mqb_+(>az}r$#RN82wHHCCNoy0S}ZA?@Q zJNNzFc*H63>nnF3T-dyG>tLh@yPJ+B?s5k-8J9^G(Agp63&v;?qOHL4yI2CCl{?j) zlYW5x9!7Opnj$Gq%H^q0*kz8PkKd0wvA7r=ivvpKi}&MqzHe?4wsQU#W3n`vYwKOg zRN9iP=+W*6nC+vB3(;QUr5)(DpKqV)bRJ-UIoI3WmM7cyv2j{M=GMVOFnMss=iG&J6jVJZ%y$d(+n5`F+g-solWffzh!r zn>vJV!Xo!UrgL|$9)Fmbm|U_3gdTknJlgl13t@JToN!}9k1#h*o38JHapX6)#q%y` z#Kn((NFxA55<47;#~A-qpbdbQx@67$g`FsW2+N2>X=rSMW9w$v|rvP~C>W?LH3rXne- z7(wwDV9yj4qho3n7$ja`ZUd6IrSt+w;uaToRYC~7x$q_YCQK*sZUMQBNnpqYnt6AI zfc*&^NWX{6@JAkeQ8|!CYW+ot`B>=QG5Rc+x&3NKYUKmyvcRqK>2VgTXuZz1b&?EzCAd5Ei7UCULZ1&VIS`OfG525VX*L&xsC z9=IVLmUW#c{>A{yiAyf^t0;{{PjD$WT~>FmJd^1Bf518x$JC|K^0H%FaqZ=RT zV@s|i%|-*3RM8mLx*@$2w#Vkz-iO^HT*|3`|aP@5X7mnAk&q3~{uw%#7-jQ7^L65&8!*!km%S3`ht%BpV&cQox?y#4^kW6#Z1qT}k2X_jC z7iDU`wvR!3CF~>`8)PTO#F8Vo{QUe*VUUGywano(D!!wHGDGPMK{IPkwkV4Y=pk?m zyZYIQ(ZwRP_i`ZeE$R*HJ74H$K_4u0IA4wT^QB$kGEJKZcfLx|b%O_Jpl~ypUg(HO zhK}yo3n$%A>9w7o_Og&>2GFm<944bWb&3u#9;Ms}WI$=$2yn(NDg}h-=eq7j0iEPc z3A6#ThjXg<*^35>H5cL6N3`jdGV8_}`Jh!-kFaaTL?STU%?PPkuZ^(a0dvmb>@FTL zCEqM#dv4W}Rq1mom$KWN$t{G6A{XUNi0T2S-RpuoRI?nqcGBoR+uWJZD!%~PkQRb* z32mY=Hsx<;Ve47Au?%KHVH$$=*g!N zRFux)h&ym|r#rXMZJU5m(#e%je z3l>k%SIWc;jxy7BrEoK=(H~%fMi+}vX*GVh;Uo%fJqwQVoK?;yiB`P@zMCTF)<^h1 zy>|nAuULi-?;4)z042-C5am9nf?pT1?Fk{=WwnZX;FcMj)k@v;78CfYDiHD|@< zfDA{C6gUI%74M5%+0k*a3~hZx4Uh4yY#2|$2f12OtGnK$$~4DT0*N}O5EjX6r@FStqa$}d|Ol7aa)UJz{&X683ewW=}u!iJ{2yV)4+K0vG#Fb z3W^ymY@*a`$D_dcd-<8{%;@4$)TR7=?@Si5@@wj*5^~IHhH%hZt~pd`Ui<22gZ7DJ zsPxY)Y>*r6eP}m*dS4exA052;>~qoBPWG);?{$G1hHZWK4OM!cAGm2*7uob>^sba$ zIpOn~3{6T&HZ*c0(`3MLr_Qr$k(6M^$3!yTbJsPvf0kgu;I4%ii-nXbVj7i6Nm&wM zwExpE%quC-HL(mGzSFY1lc!jCw^a3(YKe}w;o8j@{bnnPKC6Vk`y&lQDw3gN51#}u zo)`<-EQ7xtFDmLDIjNB;Rq>qNT?Afv{F9H$+40fEBDB@@Ej~zKyMo1N&~rd(CBQ1T z8c_%3uc;joYeWOYSl24q?W2nek>pE3IT}xGThZxP!QXET%`q^Sd{&NJmI$RnM6;aJ z8oUW#0_DzOA%kRbDK^4eI&YlA0ye<9Wa4iHmQgc$uv@(4}T&q=Did5pU)a4tDIe6_?|n5uk7Yu zIC1_3#91NxZkTlOJRlFI|vX zc=rMSD}=sfFtw_TpFfqJotRv*#(!ck!S5M#3&TQs1z@$d1K^3%faS&0#D?o&+L+?? z>PZF~U$O=|eEY3%Tftz<8kRj#sQVXK_Qq-R_2BIhOi+t8rK>(uD9V8fE|x&-TM+E) z3L}d#Yy%K~?oEOT3M^#?DWD=tgE+|qRDUhH-^c>h}~1ezNl z(}hQ_46rC0;JXEGTWc1*@e9~Olpc0`a>*)ir(OI1vxkDOgAK?4W&{8qA?qUN1tM<) zX=!J3ct4#)Pk7n!HA_`NrN?bnr1qUq`)={Ew@<(wq-dZLYF{d)v(+*MdAHRqBta4K zLNXgn1HPr(0x7e3b_(4eWFgOI$tvjZmXZHR z;@e$|(-*SK0g5_9S$$q07BGUggT}iv4GW95df*;rxsY80Stmh5qtXyj)31?1n;XQjsU^+{Jl$9&&ssqqi}!PGbkB)x_>8*pNYZkDL4n|tb(yq zta@FIgnYaZ3t6NhZ3SNAlVs?Mtrx85jD=b7%HU*F{<2qz%kpyI{z%K3TGG^RE4mxe z77FN!WUAwwQKEXl{csJO^*5skue5kd=Bqi4`yo;`i(#Wgdw)LIgl4)V~I+0m<(-5|N7r)PTX z)t*q#ulru=d#q=F-*@_M>D$+v=*#rE`gZl5+BYKkMepBxpYQ!i@7!o^)H8bC=-s0; zqbpaw+4GH+FRXlc<)M{myyO*EWyJh*z@|C^zp*M$qJM`$# zT|-w4C5P-o%AqZzFAXgpy>;-|;Io4d4cUhYQD^s?d^cOpmPTmA=BZh zUZO{vfeV9?ve5=#NR{&?e3a?yYkPO%^0%cgRna3qg6p z8ZuEeh55&Pc}-S@&>pp{l5Ja6`e2&7yNCbTs5<9MR#?(g%jD@See(bC^_zhrLy}3a z(nHhQL@>ja`RYY7l1>$=N<8mw$ZIi{o0{!@Y}Blj(Ok?Fl!x*fgD$&fhw!_lREDMP_m{7^NjGb{-)h+NZ9K>9b<^en7jGvNx4==QTB?Z6>Bgy9mQP5m$wpu9Gy-n zq)AUqQBjbLg)fh~e6w*<7pt@_B`~pB2u9DhUk|W0pCzu%G>xiyJj`^YRFUc&;^yUG+l{f=DXOuk{ud4h>m16g0(8?@U25nJE z$Z}OC#YOE}PwWgW-+WwKumk^IBAQJoEvi_C+a&a|ZI)B|h$X5lh09DUvHkBtdD&B> zowBe!LICYgD{{sY{O`uf?r_p&O;rP7DqN2mnnLwLxlGME7`9N1D)MQ&d`n#rL~9zF zEP9(BvoEg5s;o$8N2WB?lpdm>_uGt~sNr{fbr``A8EHjrF_#{AoI_h{LV1W}37NNS zjrx)fjW=c!nvZ(pkc=OTI5pX}au!mYPrhCF16Q<4aY?-|qjv(nt^CYC^5t!v3dTX{ zNqQpcT%L+-7!=Bt@(=+FHEJK0*bHRESN&% zER||`%v3XzP(^p{7U~ByetAIWjF`OsXd-+8E7bRdG!*4bWiv7j>r~2z-V(~q0pRnM zx%ApZB+K}Sl?2~RBkNHpEMZf;Wz#Cn#JY!s;uMk00G3};VUp#Pv-BCmLV2j9td&@U zx2B`He0Jy0`PLhRGC;ERWHYKX+0}*620_{CaF3&_OvTkr5i4#{D@F)F>qv>jJE>?zb>LksE_c!TciEWY?RfR z3e`fTlGVqA>Qqt(*^}8>Kzb&Ej&fGLnio{F6hk)STq_@IcqpTad_^eFuvy9oAfrjY z(^w5>&NT|}m)-xaz;shw1~VT!A0OI+O|PW}^LUWsWfWIDpdm1ZViv?f=4k1wCCL@Y(ZU$Q$K zEwZYnQ$51@S21h6lt*tN+tMhN&?Lux!v8_JrPC6cWX4(W`|UIf=%9RgF|21OX~U#v zb#f~aROkeKC`T(K;qnHfNn1l-iYw1i@cl0{s%$2ZoNX4gWY|loRBEAIX|~p6ZM)8_ zrDc@tlw0}YQdTRECEHY`psl4W>63(|Sn`EqWJ{WshTVi+7fI~!@VzOy0!_kWj8K6% zjCNId)~iA@78h5}GzwBBTQVgS>fo$UU+Z-d^{TGeDA3WQGd+4psIS$RNOvaKiUwH1 zr<%M_C?;%$rjbj)hsp!#*o;jWgSIJ1xukxnKb|CwmFVe$&K9d=lT12&#bik3_m|S+ zpBL)K6SHk111GqZE{CgL+4=tx1U_?uGUenBy3{7rk+3$%|8CLdm;2b3iYuDKcvPgl(j=vn(EVh^#bcI)1jm_Y0{)-Q}vd7 zd?zo+S4lTv(52IgIBT){Q=9P#1qW0UsBr(tMfXb3oxBsB^0Y$;RMaqEJattOhsj0 z{#SGAFyOK&^V)2P(&+TDT`%+H*?6Qy%=(?VctOtSELBzSFZp(|PRhRK+ZJ*yw}|ECsT0 zTzwX9wBQB-kC4J>FURU}l~z#NRHMaFW}VY*kJ`c-OGfzzzMWL1;wH4|dML*@+h#|a z6oxZZbomHhEGyHHb+VX}pX(Ru=cxo4C5!PElQ6|f0yZtOjfLg0N8T3AjmlvrMMsS*opxOV1L@ z<*5vn_MYcdry?qjsHx7`&kN#3qn9k2UBGy6C?;~z!CwjGp_Ys=TdJmrFRxc=lV{7u zCQ#|~1C!`d$CiG0M;XiJps&~}+wD17Rq1&^=&ljClLKj=i}uU3Ql)Ev4ErfC-tucp5BHGOD(530sCv(Uj*=p15J}vXSDb ze&C&6SO4~*$A`Zp**lMlXr0@$U9Wd+iNZo2WX%*m$)X-MbeYBO=jp=mgVO zfQug}e>oqY}T_!z-2ng5Y^*0ZL8FAFcm*_6MO2Is2CkkNwysq z3!uFj+wLrLmx9Lf6Y45zy^fgF9SF5lu@))A%}ky|DM*?8IObOE;%eafniN7Q$_Te; zo(n;Xd~}G;O}BDn9qy4SQX6SNoDZ~!v^T&Qh(stjPd!YjNlXNpTHPLY+G8g`{4 zNB~YL^yUlu*;S*9MSx;PfuDCjd!c07Hit1;c!R0l<1fY9j4fix*Ys7$gt-NrS-_!*S znC`rKD+|G)R-aszr+tQ8HD8w+gA^o?;DOllCHPyB3~+V;{=b`@|HChVb8q#Kq`7S1 zZ<6NlEhB~glZGA{)%QZ?=5uUEdd0od*ogZ9lXbR8Sqw3)+n%(^{e~jYq{Bd+M5(}z zf4p6IaW%C64M-lo?H>Jfhx`FvnU1*+a9VUKohd@;bg_Jq(#Op@08zo-jDv?^uMo@7 z;m4x@Cww|P-5LE3Zpc2DgwYdh);60yLlX|Up9*rul2jNy$2~9tmBli2q!fb@z|f%I zxd+dJeJ;AtPSBpP*r-;SOl$Js-&88`H*Omj7o*T$F+?k*@sZ_F|i4G{m?A@^Cd`NWk-Dxm4p8_Lv^lpC3i7%)HrM8xnR5q_8 zU20BO55{=y{P(>uLSh+Gv;Et;__G&(9}kdo4uk6O(My(S)9fRF(A1drw8C0|$L?zR z_71E$kxanH#y|pBcliAa@Lz=ei}PDcMT%lg7Fna|CFL<*)fx}LK#OGP@Q=4G1ShQN zn$kPtKVl)rfuS-bJ>geqA+9~BmOB!tG{FHI+k-GVVp-?#=Qe@=Ec_6=XAPwFByozN zjkQ3^H2{$5EHpY2-L)EBF~Rkr;_GZ5di^1A11(iC&_>5Te#U=f)s(!+-iQqU#jcow zL{CWkWRh0!iCNviFU>kIqbR!QVRro~3e|CO>Py!|rC8rQ!v7cV;0Doo53`uDIs*~> zkjmiB0#PlH%7T3@r~{AW#SgPH;J#Zz3QV=@0Z^fvxB1y^TtAXN%C3NfFEtr(8zE^k zfKk|JfSiNDh=MczQFdm{Qd0Edb9=h!n^#D{b9COvBaoo78aT4y3xPej4S~eK$_g&N z7W}ak=^tY;s>@PRaPws5U8L8(%nWWlX+9)32!Ck>_b}$L4Y&cY48oa#cRGx~u0o!FhJ%@e?}FHv9~nXN&zSg6riZDWRknky$RT)^)=Oe#GxS!8%tF%X<4H z#OT>07Z10FZXdY6?^pQvT;C1G$}Ozmh_|h+(%D+kr)6}FNIK1b$FskL6(f=XSo$!W zE;y1%{wvllnTWJmBTF`OhPt&VkLrM^q`R+u``7qy7t45}l5S|(;Ik}bW`^b}aI)~B z8p)cgoXhLoNp;2?_H!weeh%&%qEa5R@=wpPkS}Sr>N$!uDs>8r)ZwxhGRW~fjXBiX8GO^&cW)&>&R%}>LZh>KBZe?LF~&lAz0{ZF$3HpO>;!ES+TU>BCB z+oIEMi_0h%6Ro?ov1&yY#*?ybOjL{{Pp{%}dQtS5`L-Th3p>lFe#uS?L6TdRjc)9D zcVu_pv%?X|mZ56~?!g)~1ToS6xfTTK@bobudp;S9#PhZmXDYT^A(VduoSs{L2Tsq$ zBET*GBZL=X@VmXg`wtuBzka{O28p)H)}Pne^9OL^LRK#jzY4!z$(PeHGHTU;g(un$ ztI*!p;MafiGW_~t5t96LGaQJoU$UvQ>lKK;fdla)Fb({{N)?#2n=FOakqi;9NV{&+O`U^B;T(fhxb{LSoV7^7tv66rn0wD3Cf_#`ppR`g+F0tTwII^&twolwtGeA&DU_0RjQFUWiUB` zr410lmI!~k!0E7hbg>9Y8h;dWQl5Gp|Dv?2qZ1VED^j@z*!E2!bk3jQ7sbWsK$^C6 z?*B6mRdO#|c^5>8d~sY!7oR8(<4yMVDV-Wn3owcS(0S{OIe;R_0l#z$PY{HQyvdHQUZMutJN(9J ze8AG~w@$dx-~1MYjELvBJN1)W6;fg`tBkl_M{@QK$eWYB!(z-bgDl8084S}3>CXgY zM5lvkb+;)97kP&rg(G)~DoC>WxBod}=1qv)ntm4!bc;?;26d39sKeZ*OgfM@5LVU$ zkjnTzV|$mKm^wifH1W5yOz5F^PdE(I|AzB!vAWJ{@{9joT9buT;CtR@9TSCR11|$( za-@H9_*zL}=-%GW#OL1k!yfBAB!R`vUkWLov>qk&a*ikl@`(~)H+1{0>E~9DiDX^S zhJ}QS$VfMu^yJ?&>wiMVCrE0U1!Yz zEU?4p^p_p2GB^p*w}!cGD;JfbEr!;%g%>v5*H&=&+I$G(8Sx{O393qUs-k85^}0DC zZ^!x0WP7>Q<6;>)aG3@GxLT_9ouBt|5G3w6gwcoi=N(w{)iFA#tq=hV-D;(T(OEYL z4T)vw@Zndxv|j5wmkr|2x^xc11M!i##cDv2mbRM>Kb`S}tub`@2)7ORMHZC;Xv)XU zo%csL76+Yt6#keGI&pjQR(CXPXp)r_=Yw$j$SAjMba5#kX+KX($lu$6rGb449UbFl zCLGIpcMg4RxFvB6JUx1HfA2_VV$1s&0WWw6kZR@=yBS|hMfqAygDIMBWu-L01aW}k zvXKK?7Lg1ypzZGbdLsuZ=JrDv35Gv;wAn`6PO5aY2j1t&h+M@F{p}k-4@5F}n8Sr+ z9yxPur)Qdj0Cw}CVfb)fsbWQkGUj5GwM;c=G}R%ld;$p{8A{mmrXNH6HZ>H%Eu^zYMIE0~lgt&gAk4)0(0t6#V;h5t{ zzCZt73;i)ImZ7~b$Y#*{dm(4y;wjvY{SYPq=7-m-@y7xbtFcw3anj#zb%z(20u~pe zt$Ik_?_$FJegf-s@X+#ww0m=n3G3*ROWtAvV>4hKgjvsRsh0(b@~ zfM`NSpf?u;kY@Dc$sB&jEG6yif7K1)qPO0`4Q-|8UqtX8%|ast;da0&04SC@0OOZ4Wt9zZ&{0ewv8JD z3hgDTpo!I`dF<-#+=&8u(RS|k3GoFDwm^4`J8YVI$=`0X)CFRVep^> z4}WyDR8Hs)Goe3`q1NN z!G5;5uzRhXPtM%QIVOM!S3ms4k;!Oxlx#D-#Q|L1!i< zOW=04jf;zsh^(D|+mFIVfKRnP`+gpD`q2|uYScnyu57Z|*{ZA_w%QP3BW z3~b?E!Q%FN3fh@oz0is-=w~xjCKxI)tr|f9MOF8U?k1oWk&LIPdgF+FeP^7+y>T8I zgLe31vFd92VsuF^wd?Crdl0PH-FDtpLOUWEZ^iB!94}Pi9mIa<1FmLi&On(dQ^aV| z7xX!QjN~tnckF`YE|#Iawe?-d({-Kx^Y|eiT^M4AkyD51n!yOc7+QHC2Kk0?6WyYc zQv`XOu|_MZhxY%?Csy{kns&4t6#AYTltWw$CWi0NbjCGYLNd{;SY1joWTc`NRn$>zrP0+|xC4la z(a|<0d6`gc?7XMN-{v?3$ScAr!f;ekN~PRf+Lu%|O@08+#H#(e5xz|%L+Yb%04~B; zRnr}d3AbZEgo%myQzYu8wFISuTtKP8Q%$K=XeSF@5f!5&#{0ThkJFtySPpo(6i#bH zLp3>jvffG**+loxCeb$h6+LL-FTubXL@{9~! zsE75xxD*25Kd}wjK5^cr&eMAC0s!1RG!6ad0XNlo6`-P0Ew$3^lQ}$jIr_F4`Y$R* z6JK2qLn#;;R-sFN^M!NJ*q6Cy&>2>46DSP;;|NM)PdUOZ(oz68Jf%HiZpH9`tVL}r z2dt@!WjsmCi(fe#V5rW$=p1zErxsv5ZQMz-!^^+0>?TRD2cljx%U#QNEkAYn$k0EA z{&(mnLkEX$82ac?Y{)Vs8`?C~KRPq`r@>ziKCtr8;MWGP9jp&tJjjk12c?7S2PGq+ zf&Ux$pMm=ZZXan5d~%>XuxCIwaOS|8{(txXVdX#if7X9b{}=nO>d*Ci`p@g1>0h~W zw(rfp7y2IQn?2Nr`mX3p_Sr{1*Qe~;+PA#-uPa~Z{Y~$Wd%xX#eeY$x(GjxO+)MXv z9Q{~tU(f5K*`8;5e%SNXo@;yRBY)|+q=)U<*)t`1f91oHS0ztMzArf-xkeI{ltwm; zJvH|Iu>)hDT&Y;`+Q^T_$}7=Wa7;7utFaxUD@Q$Jt49Ad(lh$I*_GCjuaEvW4zykI zKP&EAar=r-t|+hAvqB3I!;{1R9{$7d&xY?A{^Iae!?|J4@Oi^C!z-7+x%`FY4=+Dt zX=hGN6(vg?9Tsxs(0D4sot)WIA>KSN~&m9UFGUI${%Lo_AoK+f`l6SqzIV)`plNLvwtfol6CKFSug!V}~6jDJVBIl4t+M#9F^3{RJ z0qA#g@qC4G2KdS@~d}P~Yy&5k9{q1g3Fti6*Gu3FT~z zhEO#w7K*EydOD?gNGPXGWh!D&CY_8wP)kwMe4qyqmpBtdp&ZMG(@B5EmF~Hh|6Q}k zT`N1hwYol0Qs|=nE4$6i=FF_EO=wk0zeD3vc@px|F5&B&a-}#$Rw`w$Hb@5}JO7*i zS(CY-r^r-EUU<8Dq|`AWLDQ!8zJYFgC;g zY|fZgSjeC^I%|>9?n=n582l;UzA>tbQRS4$qsum&<%Ht2yM=OJHb#3AYHv8_x0-VF zvL6fOOxs4)vkj?3%~};jVsl<7S62!|NUJguma?wJ#kSqWmmAC`f+{udAh!5zJQt{z{NcL{2}4|5dggbbGkAQthxa_PG3l7x?OIO{pc7maHRcgkdTY zn|>se2O!awHh3yQ2N5#F$X-5vFvkR`6hS3h#o1CQ-_j*g^w0SA8LyIbG#RGlcCpNE|hC!VJb*7=_YH=Tav`dZwt-HweE6LZ7u~Bd3`y% zn-Qu5bS@c8Wy=1VF6gkyHhq3ps4uk?X^qqsRg}X8TlCzU`TF`|p++PfHfdZ-+9_FN zH6NRi(+AxpiYu0-Zb&b5YeK!Z3iZ9_2uWyQVq~GFxso2fSSS~{Fol%qP&ldDE7T|4C6Y6n zGYN;ioHfzw_#myEuB8nU8oFSy7iAD8tJ=v&sN{5z@6XRB(9T8a_b3?BuS)A-~uq7l)`TH1gy z(2kv)=KHU)MwDrPR-3mLRc4J$_b;KCAzHLsS_o5YThUOBvV5^RYR|XyEtX~Tan=}9 z3p;>1(rl5m)*Xu$ow-@9ETTD`?~dAE@KULKS(nRKZIO`bToqrgD(jS#z32;2Zj%bW zOCczUs?d&8WyYZ;878Z>DbMOfWO}9^W68C1Il7I#(OGsXeXO zj_aU0MD*uWj9)>>A#5{9Mw&z@dakg;E3*n6?Q9k!1{W1}8)5_>>y=a5OD(DvpbhGl zSCKD7xBP(rU8SiN2KW-Isw`!a0NOY7wotBgMQNHThxAH9r>&DSd^l`Q(N5H636(Bs zqAbaVflZuQ;Qv5TFIkC}%&P~xsm>Ln&r}HI8Nx-<5n0Z_{3DC<4QuV zv_(}7qMi50HVbEh!V|NS&8o~IBh_(rNJYLR)HfAdM2j_qnyp#CvM!}|D)|voC}j*? z@kmYtyHm%m0Db;WH9GDp$@H6d5ZMCHSz+oY!cwQ^lm$%E%+O zs62GaCxrTjxPpqglnF}jkH#C+cCS#*RLi6%Y0AkwdQA|lal(vw>8grO7${FUs3$pQ zHonWq|AEJ5%n)U7*_W)xY$g@G;~Bo(owCGeDFF~F1xlSLhqPx4!2Z3*}yCowiuxAtRS+a@mAI*wNjNaE9<%!@w|^ESb2Z@=BZ%HLK0JZFUb4Y@YS6cHKim4h&a-qOdm8WD91&-z@935NmKFv5%%5jaa~pZ8q1PpSypkA zi(KNwa+;laWm*!9r_X!Sdr2^v-ZdJHq$vqe3&BsjSN0wll&HWbOU38BTwvMdlv zfDlSpV#+RILpG-D!on~7zIWb8SkE&1hd&?rp7-wDckj99o_osoXbKvYXi^ypUcJ=r zbyQ89uTe4t!p&Jnk?~;X(Rp?V37!>9nN%uO3Pc(y&%owfkCMR2dUYpG^k~`bQ^jX( z0lwPM)jXAyqq}f`Bhj(>bdhgFv=$Xta46|5fCiZEUMQRAJq#1iXEfQVW*}G33J-Kg zS7%C0Ud6SV6+J3~e*0*H707Rpt@QT`lQEE zQ=nj<@#qSAQDxB;ZQVU!*;{aVQ_9(R%kHZAQfkL;X+&b#YvktxKqd;rgnE;= zySnXhy@vG%8#a4&#x*miwM)UjtEv;DaPf}rNd3mLpB4Q%~;0xxAOv7z+&6?8QX+vgfN}368b!w(H71aj4g_6$0Z|rUcZ^0j6 zN zb zc-=vM9e{a2Mw8;yIzc6tAPi>{?!~<@d`NZ|bUmC)P_(OSDI()Y%Ckm83bHivjtL! z;T3r^g%xqMUx?Xk2(4K>K*!uEHW6w@qhiycpUTeyIatsU?~O40$Xcah6W_fNFYh_A zxDP06_0G$xvYV~?8|8rCGM_TWiS`7{POBSfjDVy4=n0!oL57q!*!G;dekC5j8Z4Ae zjoNHERj`r1Gmihu z5AY!T;uNbFMa)?0lS%S`fCN}YRz>*>@c|jz=(e>UAvgV@Kw}RkCx{_?Q76E=vT%UJ z=9$_ITjaFfSx2(K`qdrQ-LFP$-uWf2WRC&kX!y`Fq(s3M9S2gO+Z2Th1c(nTK&Mz= zKH5S6-0@q%z+Wi9Q?uq1Gzjiu(7K%r>!SycSjW>6uW?-cIb+wtE5nX>D@4KS`moU_b`$~j$2rQ|f^ z!0q5rdktbrMk9)UGk_uf@XE3FM`|`i55*P%oY?Ir5)yI2h;y7d)|zXClqwRbVwcI9 z$tBkC@%A^WRIEf7fhpO2d-YzBw#npLJA_uc-qU`=96Hz&TLkE07Z)66nUIflHX~Y> zRc}YA=xgD`TVKaV$SI1eP%j&W3U;>>bsGYKEI!t);wpL5RIS0K?6aK--nm!9orn2u zls!bww4RYU0lr5ZE!!1iCeBu$V)cc_l+)yhaR5MhLkrU&YwqBkNbyg9ZsAiflYqwT zehQnQn_qtC3 zeeRAcI^J0sV=go8Pv3eGrtJnWed_Ht-^{rHcg_EC2zV5C-Lf5WY|2(v|qZ*hJqd@FAto?v`JvuDRD;Q zP)Q%&dIv@%qmg*le(2sCR1@u=yn_bexECo%s-%9UW9G!X(WHyU!!eh=)!mHyiEZ2F zRTRSXo`mD*!NYxIK1al%48Ouj%%`l6Dc*YZh zK{asm!P;zmW_C7TP9MDX0Haka)vBWmkMfJ>=O4-5k}`)b^x2);+tZ_<340rRuIm}L ztQ#M?v*)_OXEsi3NcKI{`)jJRU$XCYktM{Wba_laRi0;Ahp9M?nhKl>g~Cr95GP0F z&7@lW+OhU`4v2_A6&()V5eAl)IpoRtOGTnPC{7NqZY6i!k=pSN&)p+L`8-(TBL_t@ zpxT!x8t8Sqt~(?cldePoH9%uEHpSsGQwF%9RoqGrTqbVWaRKchfSGD!_oO({u0OMX zL_unY#GUI@9C^zj@v5av|+dKR;u#m0Ij7(M|5m_ry2=75X$y=)1;0yl3b>!7QD|X6`eU|*<8u8#@ ztY`Dbhqm{`25%*!57=z`dwO2)Jp};AZaDC2@dTkY|G-6r)^j)Qyj?-!@3+Muxr24L z$&B;J0I4125Wz!{+DhcR@3$R-(7urR=`(6XBq6?O%Q#BoL{XzY7Irc?ETQb{p_N+7 zSS424P-doGYW&JWuTT_}y>pI^$fJ>y3l2>gB678x%T zsX|W+hM=OEmq8#{5voFweDGo0IC3){b%y zpu89=pNR#kgKQ_BkJ?6eto;Zk^-Z)MkT6F6`J*<&MGopcA48Cn>y!n@=;6*WDpyvi z8oOVEu!ZvzedP~PjdnR8c+uwFQtavfg`zn4rruW$w1;l$+cFFYx#v)cal*5xg5>Qc zAzHmY4P2A~UqEZAh(_rYx#ROVMH;I~M4{e@#7v6z_Uq5vEQ&oEY$54Ln-g-d-1Ek{ zjIL~g6EP|E^3z8U>MExpAK7w!``BlxWx};c@uj73r$8ZCW!Ydz(+E52bK2z-Hv378 zL`IX&*iO{tzkU+u;-0@DGkY9GxUjvbvNxTHwVL6yG?EivL@zQLsUA9WehBH8zKEld z+HNSKvh-cAX__U>`)uM$!O%9>P2L~-u{YR?Q&ZRo>HS9DR`YZ*LcoOrqnnXj?Y0-o|?cQ(DFyMJl z80n7QrppraHLcvNT6%N-n_y}=jhuEMCuuo5bUS&eEnZ99-!Ly1>HU^%KMFxC8Ys7S zw63Tw?U~~3m1?|JGa6lDcUT`egRhg($R)ir(hNB0Wb@;;PTAZ`$&n{)`=Osw9PPPI zhxSUc)nbj6_Qd7CW!wI};v%kW zw@WoXEww4P$fh&JdJ>^}I%Fr)i94V=s!?grx3|cilQNZQ5FuIm@^a_j`xlJXzDU8k zrBttMP*t)s+CaISEzC@%E7H_n`W1Y=jD)h@*I!1HiFcFNe`UG95C5xeUzZI(&@+6^ z(5naEI`FyvU-cdBJ)!sj4Y_+WHnL{Xj*pQP6JNS+(BYC7pJ_(?4hL#kcLeui&m!tj zP9x0kk-mJOiPXM*Ke1g!QyxTgBn`Y_(uhXZrVNEtqI=3ao0U5H=cl0W%4p=SFQ1T7 z1j!}evHg`+c)gTZzKdyAFAC^T(ms3{KG$GNvjJx{A2MZKd6ND&+u_ZtT2US1_+$r* zp8V#G&^<S(KUZ$nDoS&LM4raYR@O|;wGfGZ z{QbrW^3A80`#SgiPG30Zx_yPyGXVr$H(RsrI5xVFCP$t@U$SO$`s|CHV8RLVfoGQc z`j;PoryPrB@RU@2*O3yrQpW6wo0I7|KF^VLKSWouRz_Z92g z_nbu+dqRu8l|(&rL}MxmnUEuqj&SL`G?4%N1x(YcDdf!c3$JL~eu;3-iJKNZn0P5a zg-Zd)nu*P)LP=}ZZg!JT{yQe@g4PEM&%4^%|Dfl7a?y?Xmf*$RT)xC}vDQr9qXg8S zT0`#p6<(J&lQWkaobBDuBfkZ11R&scjr#G1ZN|xk^4S1l9TF{-ioE96cwOF1o>D|m zVf5G3jZkEu#W4P#D}3C=%3!xe&z+JJNQ+{%CCCt>871! ztaGaATB|X`aYXkbepTK~6wyIv`*SbC_pv2J0nT^#ga%(Xpz6PW-N*YnMfZ+TI~jm@ zyY_wA$}e-pPk#%8n~c`simt)!6ThbhH~%T%mUPnxW$Q1o1gy24;5p$?YIgQh8d0n?1$}#SWbm-lD|O^ulY2I z|DnKAC&C_L{GW^3s_y@vP9_2PzI)eL&D|ZoKO|%Mw>rT&Ve9I1Ug1gUtV?t6&CL zxdE;d)CaY~j@H??U-)0!C;-OSc!Dr{FJ6;xk8m&23T>NE+{*=EYdu^7LHt6j2v~HL zJB-lqYhJePy!3pv{~}KUbo}&N739FR;s&z$WgEcN18~I9Qe!NNj+x--XhrK$;LXz> z4{cwQN}hX@e;IjT^nPLeDWQK$vS;`*MRLe8_|{&-z+&Ge{lCZgx(!yK8x{d^)2$84 zTa`?SOE~R%A0G@cQ(5wMQP@sweZts?jD{qG-cHTEJ?($$6FU6>iKyF;ftiWa*r`l8 zP}T}LTL#DUcJx!|ML#kcIr$>6L6E|{ul;1N0HNq!r0_qI-tII<;T1A5o`T1K_#}hG zOyoWV`jOGdU7wuk)_M7zLcliHEZ%^AB(=e$H?dwe>Ht`zHl6fWxeim3!yC|#j7FZi zYrNxi?Pv{~6y(kU;Q;LU05|H|^NktZOn|HDHB2NI)CefNg^wHGr@_VPZ~SePJw;1! zsc8}BO>O-~0c9Oji(v>}Nq1-_Y;)O&I$!amO*N;6?J&!Pia-C7xcV8Qc*9%pwOtew znV$Mta^;Y4#hB8>M6GOT&QcOXxnM;=wF|nK%^`fWj7H9-f76A#{^5`iQH-+irFeqc zxZ9m@wCWix6%&&qvR0zlD7=z<>q*`5_8*3YF}NLWvyG7LFFCaPdmzNX4qYK8W1VHT z`oR{AL`LhdRo89$@ofSvw|wfxm5yY*)8(uE0LMJP#(+`wSck>BZq(2g!A<_MP1wA{ zBm%<3N9`X?3K8NC(7MAhvVXg9cpnQRKt><4ymGJa6kvq97QW0(6V(&T-iR@2^BP4S5Ck>sn%fUx zW@WVY=?BuEQIH!B3a-6@Q#YZDBc1XR2LJSoiA4nb>~!6jD63&UJBE+{@j(HlHCNM+ z@Ku7R?6xvIWlNU{v7N3KiXjG4WjBmeu`m)4kpb^ErBHp5jzV)t7#+XJBjoI(x4-q` zOLN~P$z|Sj1)`jj6=07<)d(2CqA0`|Md~FT=63SUNnsQb1ZzElpLh+7U^f~@iT?0K z*XW&x!Jr9!%4OxOnOZ_MUobo2HluT}pVw&A=U-f8kDXsPLUpAOLG9Wii?R)j3+^-k z0I<$L5Nw%bX|K*L)VxBR@GtmWDhi7k>3cXJ+>ifqK~hgVy!3$qotW zDA}=}0P9ta$O5y zzKqbYYBrkJxe#e*WatfJJK3fIXE#>UNVSfuGfF+~Y0qi|IIM11gb-dn+*h-(#NOM< z=dVRSYq0k*@__N`_3gda;naiU3)`gY__76UjTX=Wd#I-afMm`d0>DyI>} zj?20U`VXiC3fQ%nSkV$tTBOMGAxBoz%*@ZtOp&n-!d7x0BWxSJfOPVN^A+tsG4z`} zixiJea>B7i-e+f8O5iL5#Z_C%OY-X1T47{FMkC(WenBeV2KU#_wxFZKaV=7aJV|M( zX6wj5n)Wb0y=lhhO-i3tmqZltm7&qcH zgVsitk7T57?z>*tIwGSH#`+nkP(y}YWdEyup4r~=aOZtyN8IWx> zX+KVm$ePcKWBBwj!K>Kf?oqghFB|got?U2(z{9;q246!tO9Re|Ekb5?qdjDDaam^8 z9T&<>0Mw-c6*t6gYX87NIl{Y05y~VE4LgdF3KuC)h0L0Uxvor-X+0!T*eHyR%4y_W z@Hz?rq2AN}tWoHs?Pgb&b7m&5n`R?Te>z)?^2LCvbGRMQD7C!yysd1MJx9*QVqI_x zMxYDgS^OJLoyuJ|F`T|?^<;&T!vi>-jym=KEci$n4L30*bmKn>0YD=d|jhN*yO0ZnL7Jm z20P5}YOk|n|G@bSe8J_yX4$+s$=J=dNM4^(TRqZo6?Ea7nsQRd1N~_i*lX;Lo`LUd zSO>6^xZ;l96Mf3TwmyDk72M@poW}Shqq~OD8;iWRrt~4=E}{ymI#QXWf;diPG!*T6 z12z5bYCj&tyklEZfGo)`p%aS01;~WOseqk{R2@{)+p(9|o{xVhdxj|TUxP2;4`1Ki ze$h`whHG(VrN4l)KIdk$>6FP_ac}`tbL-r3zT^cz$Y`Yc18D1=gzUX23_vZB6s$}F zU*TMptQFYWuGWkmV1*8Z!%?Q!g&}%mG}x*T$q5Vo?)JT5!KoOlrcB5ka5|$i)4m37 z+lbPm?{17@YGgDN4qe2J;Vas`?Lw5koAK)SFk(pOqp{c=vJgws_x5X_SEQRJE2oGgfAvE0EXS2*!~&OV#1}UxiBrj25eeRJ!wsQzJ@uQN6;o~y~FPl%)rjtxIQDG5T*21QdHIuma z?yjLybF=XO$ODtsLnL&IaA1#PaTX37iKFtqViG5*EviPDfLf-bKJC*gRqQH6yH!sS zukn|X51^fFVna`O7w1>TrV=zE+`jYKOfo)iRGG+lT{t{?LF>tHrY7&*1NX+;>rxN( zl^)dAq{hZrJnnoZ*>LMLB<{eJ2IqurBQg@IR(=km?l0f!*4}+&j&AAT;>|e5q%xXy zw^A1k>w{dPHJ8&Tlf-+Uu#8{UPh{MwI@({Hh#H=MC?TyiP$8Sq?Cu+dqk#y@8`*p$vH=l#OiwzZxh@q4ah zr2vS>?!TyNzw&42i(0nw0HGm43 zu=>UjCEjH^j{ zRgAWRn8*;V%!z1uGf(4Swnn=zV{f8-Bw}z~1wCqc3amTqDh-IsRJ@-@SS|KU2r$0j z5mTOb90_M*J3FU1%TV_msw$XR6 zOT`D$kJQ(r3xy=WdId~(u`&49Wiq%KAyp7AxIVf}QN#k3@`GRRQdw8PRRW)LQG6|M zdOQ5T`;KL*6QRAdhGh(Oh+W~J3ca`XUcW+xEzuoFqDSB>TAloYt88xUR&>dXGe8lR z1YjXko;L&bO3d%gcd1IC`0_4V!xN?t{5X$J^22v6Q=Nra2M7{8Qb)y1EUKB=`E!XH z17=eZix*^Eg%rY^QphuiHbxVB7dpEfkxpT_WWty#>}6-!Qo`v|?|WtUWyE7+D_J`~ zti-iN2@_GX-_WIkU2&?=jEb-e*pX2sHJ1#HFH_-^V38$KkCx3aSphgI5M_4$r$mjm zu>bWg{Cc6+wMPg7G23p_f)nw7!N%b7H}P&P1VZ64Hhcl37X)*D*X7-pdDu)FPLmU2*O%*@dSzE` zeRm-s4^db*7QpTD>LK0#(l-qPpqAmbLjiuF*AtdKo$t~(TBQJ9QI(>1;ATJ zX{;maKSQ7}dy6Y%h)HZih$kvyN;K4x-}RfnQK_3ShIf(>*{CB8Bk7**exdbcy-EO+ zqOL8(E%+YQkNM$*^lq>jg#i&c4ZsD6V*j&Ftf;{4?(32p5T-aBz&0i)76Ch>Ra9>J z=?ay_;RL3n^?Z@s1XV8D8vo-m70lS6HsKfsj)NHijQXac*`-oO21A150`NcvfDRrA zE+}_(w?q)rgv10IH(J27(W%36w0(c~Wt@U2kqa#iTaec2#X^K~V>e4wEDMfsDk-T< zgFBgt!M!{9%VlaO>kRPjsIU!o$1lKiz46VIx&S=#GB^|42%`n?suQ>ikk|F~k9J>1 z(cUOh&4AWkhW~(t2N_#yWB0(Nv7k8J%Vwy~7@8^BLfTtyZ>;<7nmFi#2Ue)o=mLu! zj)R77HoXeEO>>~TodA;#B_i6w*@swr@H`NAL%HEMEWeCe!jPKSY%DZ|0?L&^81KGX zqS6#D5%Lf=#xQm|4sNV9Gu~xP#G9F*9Z-$3yg-rrAW+y)USaCKT#vS5Ipl&Bu!0yw z5OZQ~?T#!{;XQ|XL0wWP*$uxDJ{ zG_Ek1bHS8tZTL)=jFSx74sr$&uLDki$`B4RJ8oT}!WE8<2;B$}`UN|&kj73E0ZXCYRde4{l_AXE*)5}2E(9+d$NfbBxO4RUE@7^I)2WhdXMr-v8S!bxk1Z!7Dm8r=H*T4DT6I z4Y~(%J-_XL)4Ff3C)L}+ucUyK_rpZK)U#qDmze}$DR|-iYg-Ds{*vSes3|43v~Hyf zd%%)t@fMHQsY=<^(HU~)42(Mm9)xj6Mk34`&vs%e_O@?-kaiPU>RmC_+6>B>oPlGi z^&|=gD_Ju9Ae@sw{h%;9yqZKFe8)@OpnzBWBZ30PDg|%L$Yyem>G>IN)T3s}Ll42; zCvPTaCvSLVd(VgHD=n?3ZeRi$W2!Z)YG!A&D^azk_%L3UH`CxONBcJq3kV5|z=`8yT8t|$Frw2gYKixw zctze!&fa(2+5X-~sYx=vNP(xN%_>Bx@y40h+%3=*JQC zvc)5Lk{=qpb>K+PR+s;AVI)K-3@<6Rm|5C=0G%P;fVg5aD_6A z>U^_|QT9|@v2`BK<;W+58%AZz`?r-}Pk!_Xn0jUO&hmHT9Tq<&+&CTv)Hzf$02`uq zi2*W$rc9&$3dS)`be|SRwypI9Is3mCO}^|pP;1K$R7h0hb<#5ymk*o`9VrV9nSAy$ z!e!gnq!LB%1KnV+SGF%2?QmZk4*%7Bxy-URJ+d~-c4HmbM}^2vTqvPl(efzt+LXcx zkitogPwz1OBahZpPI>VfWh`gFQL#fp|0XwX_0Sy4O8s- zys&xunvWpI8}Xb=pBMZW@!aqH0-Wjc9mbNce*t_cYyQkJ%cl_F@Fl@F_E1lsZTQlm z(%|WVKW?~8@lY>$@YD;nHpJ2d?BR~3L0Ca0?}OI`%qPZH$Z35kd#KFkC{t`F|MY|~ zHoTeyrxxHSls`MVz1{oI*f@JAAhl%VosZkgVXjiPr{^NpdOE_;PPUS#A)iKMG*bQY zS2{k=@izZ>$BVSI9->K#rIl@g&PLfz>|cSgSVn?FBJ&Dz+^SvQ{@7P&)R<=p;MQGd zt~*~#x47J_eO8#t7@es!Nq!mAC2K~~w726m-P!)$m*Fhhqgon(Adn)m^aj?EC|B## zDxWHC0|4@)2soJhDqOg$Db(R~sD0owA_Uhvz6O~!n>QJZEN^GjQ>-_VoXb-Vm>iKc z6UCp{4$ki`>QA{!F~KeMhut@);F%9e^vrA$e3$CKzm)`}!d?_qMaVA&@3 zh-~;KhEev)@K@-H92$`|lanVf1<&0Q+0*{?H-*nD##=?$ak9AeLf0u!1Z--4GZe`k z-xemfuSq1QpWC=YGS^;OJ$1`67&rC;Ojq=-N%hN)0)s*h08nUsM>qrs?KPl9?G6Sl%aEkYijJ1j8KFfI!CKa{Jow1+*<(%D(_5fbmqBiM=t z+J5QTi^|@eKY{F#v5bIFKze!s14DhDQ^6>EtixGdLHwzo3cf9so}n9tkM?aH{0Bv) zS3mHX{(q-gMqx-J*V5>UAenXOJb5PS@RlrQlRXqg7zPz2i5DSAWHfT_rayvr6}oZq z*o(qnB^TY<{}Pa&<65Es-d+Eb&MIn{m=Se!)JeZK&>8+#V*4d}w6CTSrgnm6jgPk< z`lW#2cK6aSx{-YCmV7*00eV}YlBqd4ZL=dLw~`lrC2Sd$)5yu;hpr$my@lJ_7M~Za z5{S1XZJUv}U}r)m$6T#gtcbbJ5xkW=bQYtL(U2?B?D%?76X9n9t!5BcYj{3oo+=1h z(Z$Rlbeqo2+|Ti@j0Vq#rh|UJT3mArsM!Zj7)`=oQLCzQG zjJlR6ez-Ice<>PI@eY53kIpb&Ped*C^Tl7I9~q6De8&?wGd^&1ygl)saG!Vmy_KHc z<3rKDt%^$jF9+JgR}a3ss#NTtha5cYuX8SquQ(x1nV2&?H*3u)gQ$Uv0v??q|LTwU zDH(~JeDA=aHX=7}pzBXTx25$@YaB{7SE*WcjTr9>SGwze;$_4t$!X-|(fk!O*kWt@ z3op|n4h%_Qx25m)G%Wfkn^x!ban=!?C6ArKar@~1VkmOTxhv0f5)rqzcl@~%%&_z~ z^lYu!Q+G6ruIx<95-1`mT=74`sXlI@@`#5jA!T2)uG zDP18w1zaHJ59nZZD^AF3sE?T4(SGm`^n|3~+fuxgIcIR@SaZUju*4fc+tbnax0Cms z!%;1xQ8fAvi1&E=&*#t!=5_nZytw<#g&ND58u3WpgUaaMRA)d3I8LQho{u6gdyd@p#pjQ;zx_LOw~~i8 z__+<^eHO(BdS?-s^0tBJm-En^OZ)M2QrczK&zlXL=rkB?{+NeVqtq_ljIBO#>+otC zIi9^8Av{KYd;6I_v9k#dpc{!93cM*|-inF%B6G8It{-2!`=?Ya{xZa4lVm;YiygUUx-2abLX9aK^By z)8q*S()U-lLUZ}mB>DFBj@@nTI-0}pUiurz+Ej)KSh(a=GO8@hPpcY9X(0bKD2|TE zXe9pS&;BifVQbsIiH=6KbP%JFlsI=%2)5#>N+w<`=9Q`>`REWJ31qG0wEinsklVJu zt*<@0S-ch)^GlatUZfBetGi&;@<>S1N31QkF<2m(VRRvDCd@OxK(xp^uU+4MVpudP zw!NkYob&d)W2|R)7|M zxK-Q>E%QoDj%F9ah>i1hd!x=8=2~9;Tuk5M$<}QcgS@r!Kva* zgR`^}>TIY|F}gYO_q*}yvSxDjYEc?}+qXwV z0&^|MvJ9)XG~-RTz-fd6S)9OYvSyt6f1PX(?iGO&qguLbWvFV;jAe>9y0SW>+1#vp zNP3@mczAUyIqi2GZa?33i@Cpf%_l#FV9WlHge;&=wt0CVDNfxXGk># z*?YaXaVIUMijHst^1)b*s0#QMqhVYal*h!Ks6l(4;=J~w?bC+)q*3*g&By3;0XBrX z%@I7oIFVKX6Q`28(P)pC?O2;i9=z^bp}*az`e+sy3VP;l06K4G9D0zHOANlLqYj(7sGmB7EDb#{AhMD3tl2NM$ zFYoZ!3|_59!o9g%5VwxXX{c)Iog`nHvX8g#5a`+FT)G||Nk_F$rD-L3OUbUBs>Hoq zFiGBN#AsyAWa;|BN%GjRa(jEDiFV;xdd13E_;NNL;i}fOQ#tK12j}AC%X)MnYeo#! zZIkT-2At3nx+MzH@QMx?khfB`|%wvw9=>l_(w_mAAI{+aaT;p%1@O+EP;r--_>8Z%QjaTOr3n;f=^SSgXX3opo;v3p)I ziG==v` zH_cZCPdwl#sl0xkXgy#Kc{2*TnJ*{LomK8^f7~M?($TeKTG11NqS(xvtENcJHj{Iv zvSi2yJz;e#u8=5R^W6RX&h~P-ym!4XaQvU9{28cC_v|tTcYp_lBvj)QbwI~v;LG>YgKCET9Q41 z9%QYk%Jud`?Z-~w=Mh-FbPU7q23FT~b0#J-#h9X*DL$6r$tQ!9WmY$nlV^T{b@=w> zedMLTxVEJoJ{q?{1vveY!`vuCMRmyYxGdcd|rttfi3K zxS=!+hzvo^B!r}eiNGdLg|a#U-9<(tXBG2@$hREO4M~EkbB-k^K33YumAN@nWnLW? zjp~{x)H~h42)eqJ(CApQ{|48#_L-YRT)ruGgfxyE9}?ir3MN`yv|{r%;?g)ar7#W| z4VfAHargQ_yq`S!w0%pvn8IMz1AXkXbVqy|^Qc;);0KbHsBX;y(ac`<#Ijr+SkxJE zM;L4%Z^n+W9&Z0KETWJRw?v^RG`mz_#A+at1B5`iq7~=n zJalHtjh`$)Or*W8=_VJ|6tg+?Y+h~2O7E^K;+teN=!Jzt_kM2E`nIzu9-~SMV6D2_ z$*0Msa|B!s>}}7qM31)D|{>IhM9E= z>?3Q2x^I9j;=eO}?Z>C^>HCM~dj{6^_6)sk*t)KF@QWM!HrV^_?tP|bqNitQzV~x9 zZ1LwEk%Mgd?pfe)1YKD!;teX@A{U-+uw-Ngza(oWileqp=I;7??T#Jo*Uw<0CNxVy ze5JJmc#*Cb8^&O%R5BTDLcW|NC+p}%){2tjgOlxN>r~>XmXL^lyRM@z&lwW2dDiZ3 zI?A?Y-lQ#%>zfc47c{qLns}8iP`f2wHOhtDDl?O2Og>#6K42sHZ41Kxg4Q!Pe(6x# zbu+yVsg`^zKN_@hN*y<2^78Z2tyR7}CTOoGHQ~#yiN!i|o!ATt@ zJXO7uu^aiU*{I|!j*hamo!pm2PjVW$>(HAIwSSUDPxwFz8X@)J^3Gak*aT~}*KIS^ zU?oAGOk?ZFn{j#FaC!TR3}pCj>Uiz%dsWW{rtek5mX7S%+54?^<2@(n70a@2;L-N! z=|BE?{a&avVf>J!P8jDbStmQMVjS8eZ-Cupnuk*7nua!U0SRc0hsc+DU*Fe$_cR~@ z_a>J@=tn}i5L>nxo@M9t;U*h|@Mg&Ub5!KZnkBUBz4M}|*mc7S0~+S00x=z|1~W#b zMq?*0z6tnr@<#9<_REK^>TA2-43UlLqWSO=6DloQtB#+w+2`_REmEXd^3k_|2`^}F z|NJdoCcOM@kP_~xfXc?swq9~C#0BXRV#VW!%dQxANKBQpSu%tw1*~UNuSw@ z#e6Q-WQgVc36IB7VaVVqEUmnmC_ekrmF>bQXltVhM_TRD1T~pf$qNs)nmln2esOgx zO3S|a^7j6F0g^b@RI74LhA{?1bq6=y;?(3d1Rp7DCZ|6Sb@s8B{p;J$5^&I%tL2F4 z7#>J0(?+v~GZu;Fo%o&A&E$b|AH|u~#{e4Uom9Z9mr|G-DcPZt5V%4i5<}SwfzfDn z}SChzHFEEGhee1h7 zw7>jb@uP~J@ZKQgu82^?U>%X)xTztQEFh@JKRh5F8ovm&eb>NC5~{|)B}2>Z7{DJE zfLKySA^_r&Pzt=2Y#@lWMQ(mSuCZ%T$y0^LE~j3h83l2DP#naS8bQm5DuNd#7qenO z@BqUhRU+rUhCG(rKPZmkUcJU6WbBFDa=yhYAEI}2giNF2Iih{caGqxoc!QwCfF&<= zRDVbu-Ldu~BMXy_O$#C=Dk}<eW>&)Bp zQTmOhwc|j^H6MpT$+W3gYB_wxT){My}zN->1qH7E>$2KB*Ui9?{o*4 zX3UT-SiRvwMo0F40vlJ>Oin)>!^Yj`+unZrCnySQ!<|J%m4s*(GxOscvp8^&mP67NpM=&hRau} z#GL8ru$tV~#tX7mWB~r-q4tm3)Sk$w3aBU-G?Y`-nZk75RwBC3;tg3dIrI4qlf?7< z@cQ_xt>o-ZW|G|br?I|v;B!#H$29Z0W}daz zOQm4K3mbEqeDw1Wtny|u_WUjc7(}*|goJp*qi14CQpWR4^o>ogctuXmv9=bKfI}?%g!FzWwpLA!8Q?*Nvglr*EC&Pl~gf zzpD7E;_n+AS2@Z*6e20k+Ij)7YS(i@-K__d9n*!ZsD;~QT){Eba- z+gKRdGx*oR|4{e_zctt%eBa<3haMlC9*hhgAG~~U6lFDyBUcS^BU^|6Jp79RZu8lJ zJwp!<^ltdi4c{An?}jgI`o|6bxM_TN;qu|ihPQ91507qm^#<#PYt~&pWZy8}|JVLs zZT@5bw>Mog9PWRl|AGEH`ltINo4zpe5ByZ1tZ!)j?@`(F^!jJl|MU8fu0OTuh4r_rPpx+jCD*GIh4p*a_x1j! z_vxYD-Y@k2qh)ix_pQBiLqF<$)yTIu{;}86dvv33(}|H^_3l{r^16Rt_pNo0Y<}mu z2ZnCmWLbB|y6JV1P4nxHZ@hNX_couDs(N;cvm}W3?u}a)5_7)U7+28gS#!zKa7}4K zQjM>q))FyuHH+WX6k#l9v$o5n*Q&D|!|3gGma)xOOW8R8*G>tWM0LvUWRrX@nJ(}} zrFu`Q`*?O*%Qcx?HK;LbqqFHtAMUotN-8eqc}3DOYpVs#ociz&x&)u9!WBJ2Snn<( z{UEtxbGO~7L%41&H9b>g65&{pe|YG(Qkf#8N|ual38jHF)m%Z9<-_-MUP;1rfWRQ5 zcG?r*LcXYGhg7aDX%uy4&N!FPnp)F^oVvJCs_~UHveQA%RxQNl%Eh3zme}zYsUJgS zCd$mt#AgM&E3b{^)=A}gl7>tyz={i{nP@Z0`1M82{^8DCBn|$YIL%naX@5RYt|T|+ zyUk)NqZSN8SeOg4#tiq9Zuh*+&9U=gR%b}0Lq+Z7%5FP5U1e&h@Z!!JP2MThHmPJ& zQr`%v*z8<1Z;j7J{n~}xRd-1*=uxDM$%wN-k6maqv+=Q0((md+23?%>xo~w;!2_z; zFFmeH7cKl;%2i2*1GcI)ekJL)yR~)J6wr%_pe3ra@}uM3cAm9xB3EdbLn^&6rJ0b5 z$}J=TH;a?pm2hfm22({{x-=ubpluW_tTUod)tkOR%bFQI+imyf@_aL?5#tEpuOwC5 z?_F+J>)BkvDAtWFPb{e0_f)stQERZp2yd~4ZTW1SS4q{Hl3KCaU~>zma3PuXTg=A1 z;xg$4%~W-kkJXd{N^=<;jntLjmnK4!DCQzlv-3fXzERMs2fOPC^a-9-*5+rc$&|$` zq_p4Yc4IU3z_dhAx26n?&OYOhB%K-M z9Cz()-S&)e4pla5VKJt&TMc>5Qnx*pE^y7Hx2O*k^ogkq`$?%?RV~8LTMH;d9)D^& zz#f%~$0b$8gpaA%oc54k%$DX=!~J+3g%6Xev=XILRl$}&RClUVYE`S-k(RXSeDstfz1x?xE+qn+b5!PXQTs@M1gxASdM|E$q4 z#ne4Os|*ygSwAy&tlO@OoA?-GbWhE?YI6nc#LjNJHmhXfv-6^*W{5{}iLIS7k_*Np zixTlnK{=&#sG=TLTj=dFI+GRETwpeqQgh|JU&9@kkUCP%2@N)`D>pU1Mr+=oy?UcG zekDp0czAEcU-HJ{{`lyN-Nz%2zxkeg4LYYlJ8nob=#({1MFoCUR|F{QCY{6czjQR<~J-_t;;RK`?l}yQsCd_Lk`J9-U%R8Bd)gIJk zru1bOd)4=)=Vyw_6lWxlyyhX(Eb;U ziCHs>=ekR|dLt4FU~+XHX+X1PO_r^fxm2Q|L{?0iyI$g-SzhCc0L8+fHLAJ7)@!7v zYx8L%*Hk%U0e{?M3$U7f((v^zzR9RP4oxl-Dc8a}vsZe4ek#v#k;1~1F<()mpttG> zvrJICn4BX}tfi{1 z`@Ex3nQv9?6<5uzX0&><^!QvgT4Wu-7|UfiH_I->_cywPX|st*+0sdUem<=WW(NPI z+n%fy*+MQoR|y9Fjp?FZs{WXm^TV=}0A^9no~|SC;#ik|=DbsOrWl+SRJLf?Q%>(I zb^CG8iY#Xj=W}8vY@N$1{z%&~|IL6HW0--?|eX#QHFG;P*#liEut}= zI{xpSev*b9qK|csgxD%Y-AqDt{O3};KId;S!F(X%a@Mq|Wa)TbYBzeJq-RhjI9D{s zLeBIn?~~?dwi1jp!h*&UNILBHlsfQu=lMj_Zu2prXwi|*Wc6x&HgJbD9M)EZDmK?Z zIqo^eq4WQ*)V(QaHuK2G7F=m_B{f&L?qTV1jds>L&Ck!Kr)gzymH$K14@n&Mt2CZQrVhAQiw{mvrK+CJd5(0)*$U6Ht)zyt8g28rDV;~stdlw~ z1dV}@PDhoYCR5G0KLd5WPVdDva_8Ou)4!l&9W7p0(y1W4RrQ7@{IAjoOtCmpC6RpL zs716HZDII&sofBRy|k{^s|~8W1(~w$?s==mZJI5X^RA#cRc*wRZt24l)sV7=yf&rE z6H=)RHI+-MxSnVPghJe|TS#QQ9O}5LTt2CPWdSvGY}u)-nw!Egqjq-pQ?q3-^5tMP znsU1haWU@fZk%SwRcD=!5{Ix;Sm0;q3oU>SsnRV7U{bxb;< zGZ)MiWh$!9iPAZf28X2uKBFvY9w)ntsw_P(= z=A4|PrQ&o6!+iSE|L*p$4%d^ds#346RqLhfy3b3G&(|BMz1&EL?5TwaD!Z3dKkGc7 zR4c{8T;0gpBRSS?iC@=M-r0=W$?-GOVHIQZ%*Ayksf;ZSJ(O3D&INRuoHrOQg}Rz4 zr^)E}AXB#UDt=x&s|h~P`Prmi%__NCBBTpBX5vLL6?kgA_b3X@CiT;mByS5h)P`Cr zI-4zB_c{p&=&L=w?~*SJSu29CV~5H9&-sw8@Xv62?)5I!U@?&ViO_XtZ48%BWm?VY_)G$o!IogwkT=tk z0>I6Bez=eP`5fGmUtEH10v%B#8mS{BuFsqKh}~N@)WbEaDM4O11MBSSW;nQSfmP-3 zy7g`GaWSUY>sz9zMv^DD=Fn$();^VE8k}v$U*XBVufi}RYeobGpmv}8(AawN(v6Ot zIMCSS?Xw7RrDxfv4F0 zB8*LYzJqW`8BOvOfBPx-u6FA?)GHd{^R@!3PZjO+9<{%iW5_e##js?}tkjW=Y?cLq?!YSd#o=;)`=if@*DLlomln{8R0_Z}<238l)^Ka4obeTn zB>oUO8UGN* z)~j0)#y5V5ELbP|$!|{Dx3@R^3w&_9HxC(lwkbZ?v+4bt)(s{$KECnb!0ShD8h&i} zAUSa7?{*Gse(liD@CXnrpXO?Z3 zRVOv+Bgtf1bA-pW=tw-B&>d05RjN3{XHv>I&uADmtK;$SC_)d(xg%TmPN>w3POD_p zN42N`0rek$uKb7m;Qm*$JUVB!$xJenRvt+tRq7*rMx8pMLo(wLP7_zAk{V?q!)jJK z*B)h*IfTWF>oClKcZt<_6U<=IX(`IR92H%=^MjT zYsn>7|6c>&`CdA3)vJ}PN}JJPxJk8&If73~9?_0i1GmpFnrJe5wFPICNtlfoWl zv>bWxojdnl@%K6}$4mKSzA{%kIdSsV&f2Q~KVx4WCs$SF-_?6}dQH+j zwIPJmzPwlaULa8W_Nuz}O`r{nAS#k^l84|zbQm{OIx2;@GLF0Bfa|!7f{Kc$zd^?p zm*4l*duh`}N9T{u=aYMGop+aW&t1+r--9nv>R3WerZh(=%nyc$rjBTmYWfJBR3+%7 zGNz0xsdK#`G)D=A2A>){z3Y;{(~Z?H@zFgIv`KM8JerKgluG3hA)Ow+l87CN$y2c- zDM}SnLptPW!RlAkM@hBvfu~-OL4y9ySNPxWiS!05Nu{U+nMh%DFitdjbRuy75i(9-l2f>UV}27ylCc=2 zfTKP>7GLE}93^S>Tc0{JDBHzMtbwnkn6)9Rt$dlx%01@(|hzo#Iw0 z=jI_{(5V|V8chsYgrZ02C=r9O(3&GytBE726p@P4=txw4ZqOAP;;2TW(wuq%W4`?8 znlV40_143}n3FfCl2kOQNI*CgYGFQ=$s?M$Jar^RL{l*eDu{$K6xF0ctv)K($oZ8w zZG(`LSigVMjD%YCx6$FdV2-7E1LiRr*F>X7l&UD069iNlk)V%2IB7*pNkMM{2)L(% zkt6A-;(_B0*+qY!b?{QL-GquFaLA{RP=p+^qEJHxDCnr5<4F~*qT{hxVwE*@RIMi8 zO1L58hyPx~SH%S$Xip0cQs0%0LvorECpI1C%MTV|h^KGBYhpa6ltXri7>R#U$|Eri znZ!cIkWq?glpM#MN}-2%W%usIfMWq*O5l z38^LIkU?q3l2b>qJIQ;q{C8GXXumL8)C~|id0JC2<)Y)BQYrTxQ0|E zAoHuNK&?;#M3B)|Mh*_n#1KvgjJ_zW!F>^y7~- zZE(p}h0=~j-d!ri`LWw^DCsNaU(jmycNdjc?2{rHUUdh;Fz82az{katvQ1}87L&SG zK1Wp5J{96!ZpG2-t9KxdXe|lxfTs?0cfJaaHQg)zqIn8FI;uxrjw7q+;1OoR`VwJv zw^M0Nz!ruHxN|2iBmKo8z)}t zt8MdJUP2QSmTF&vgr%=}we6rxB^X-mx*8FQWfZ}rqpqU-c~2o|QyCKRM8bHrcrQ~A zAjRAblMju5a`aonzZ=>l{ zD}IQBW?w1)M9a%|SAHnCieA4m0dUdgb|;)Nt7&;IO}TNpt(9DClwWujGO@OhKa-=` zF8?fkx+}gij^>LlV(xI0%8@#sBDzFTm8gZ{|M+7}MSroFQ|P9j2tSXmjN#{EvwcL> zR3;nou(sx;isd-RfB&bDtiEFY!JqN=?hVh`0D4htW&I^2-L)3$nY<|MZ0y1(;z6xl{qO%7t)v2nn+~TYuZi!i>CF{y0W)e zkyXO^TN|(@1ROx5RRXXTkfDr-o(Iw?P}YQ>Z{@%7TN_d=ty6`6>haed=l49n$#nq; zh!d|czMh|BnbAvbE1sG^=iws&c>o-e#20{0iF5_IFi^MR}6-R_L*LIVvoyTY;CEHwf6OwvvqB{wLei zRsd`PYYrKpe1H`4X@SRymxG|2Kl&F$yuhS+9?JH*RrzNwT{^E_WBklt5J-b)C1B$L z|4#_#0eB;@A_WH@xu6jCZ&{zp%MQ-IZ(%u8hvDeMkj)BWQlmh#y%2X_Rn3)-`G@b={_lA1O)w+ zjjMd>njD^yxRfQSa{4=kPFmoD%(XaApO=`Tua=n46=@?DyJv#1vK;3uH^#YuL|5nfaNu6gZ6M(Y+V6JNWmHgslAB2fuJBfBbgMG|!Qr0}k{o zGt3vpnO%#amDyELqZnndw5W_9KK~LEk4#lAPHVUn*x^+4VZ?47+zT!EIp@$`Lq&a4-eb zEkG;*eg~v9vL~enRB{qmr@yVL^=o72otE?W{>F0sKiVcv?_oygZy6ZbKmNtZHvZ&81fITMsfgIP?|cr1I1u{*hDU z*6wQ$ii+ZIf%k2nHdiE!L5nlx&xMx4$k}l*v#=M(dxiY`bWHvAgg6U$a@UcCdgDGY zU39H%UOkeN-iR_DDmGNH4ne!w41dq%%z>G;rM&Dt_5J*@wq|E{@Cbt^b;rtf^h|u+ zHx|o&7m+Lm)nU1U@LG@<;bQcxzZlrw|9w^W2NyHQJ?&Uo!1pD%2d~w>L{|(5T&fnR z4FCA0%)!~@+QRM&mog_1y}q(#bvz47pW8!*-1$b7O2~7a82{WM2BA_NIkz9R;608ox5v`dg;z`R?&|G05=nqbrzw^T!8< z7Li!!-BYf~n`OsG0dF^dN%_OVk-fD0w$KU!cw$YX`;;Pdzz#VkSLG59&<&FA6u4m@K+f^!I<>VV_q|KpuFI{!?^%xqb|3WTY$zEitb6VLUnv~#QQ?&B9&h21@yE_*#LRyxMHcsp}y4>GEX+g!hN zV=-^xZ7ig%pK@O6f?W=5{z9GzU~B=A7N7;lg^D`?GB#lI7xcj;v_>I6KmXf$wfXPw zDBt^!_P9%KTR62BFjzvag{^jA?;oP^3MaC z<`dUr4;D@bhgX$OCZDLfNK+;5G1^m!icUxZif$SG4B}lUOrA?b%RK-{K0U1ze$}d7fr}}6@&Me#?&gGHmvSDF}Tr2y*O;XBMOM8g~wqA=6 z+#+J)5bf2#-9&TVIZSWutH+raDTK>AXckAE8 zztxSw>Lc+l{B-Xn{3}0o#RM;J+c$M(9_IKt^r1HljQ;@Hi{3CcJ#y9Lqf>VeWdwYN zS72t`D@V}*@sJQ8YECVk(w1vn+Gfd@;k+PRcNVf(=Y2G!)!crNf7*>qevPbf%%N6? zA!}(`;nm{RxU>p7M8(z8`96we-bdqKFdYJH0EM{h12IwJu!nl+zl$I>H zuqG|EW)ojbqU(J$K6+4yY!grxzL>;KYTg<(m^s>Ft`Xs)%PTw|^?rLz8cV02#;APV{qG74J)%n#|_8myomx*zliZ@#t4?3IoQjC@^5+(liou#-a1t zNwqOgwKHi!h!*(gTe#P+CGqp0e;o!)z;m#+h2Vy$AIidFRKB_#Kd z0(|0#1AVdziAJ9^t9_Ekq89l1lc{txMrDI)@!V&qqfcu|{K_X64xE0#zO{R%E}R|d z)h?AwwTg*u<^v9ZRp(p=S{#>;b)d2OY3D&@?0y9vmgZGtHRh$vgr8&>r>b*K3h%uM zGv80+1vKJEZ)Ol}hG#$~OzKsIPR6Vun^`sTY~dxLuNZjqf^(*vLkbocaQ#XygT$VVWV?H@i_4V9D2>wIy3{tcL@ zPuz`$_0#w>&%XWu|Nb{%a4vd{pflVn0)B@$exlqr{`LM;*cP(76r8U6e&FzToA+S{)bj{3-^ zXn(c1DF|2|;-*j!Q{^bl23cZB%NmR! z!m|0a+g0HhX`r^>$!whKr-|D+yw$dK+jl}6L8h->mFZSGZa2C^nbZ>3)>yR2wkOQo zy|2X*>m!K{YrPQZ|9P#TXB{g7nvNs^=_>1{il$aRWHK_!v^3r~-UB|wS{lEy7ugCC zki4_|#68S42$q8r=^JHV8JPX)>{GLk&%S;3HM7;(YlT3!+08S5o_TiW%QKJ8yk+K9 zGsT(U%<-8+Gjr3wpGH{S^x5hAr*E6iPkX0dHhuB*6p~+kck0uF4-MWh^}eaoQ@2c| zrW{ksLD|&qsnHF;-0+PJAK&nf4X@wO+;GDN^WZNwT(M#6Y>t0={JrC+#%~!< zjXMV|Zqo8+&2wTVqd*y=&~`SbHosW*ei%c8(2=K0o@^(T|M2ee^Y>)zNE5 z4YIF{9vNL2`SZxLgC86D&ymMQ9vr#rs*%!2Xz-qq<0FSg=7xVi{PghWh94QeZ}`M; zcGx|v8I%w28=f5c_0V^QJ~i|(@_5}mlpL}TDTa0pjSPNWxHH|yKls+sk!4MynRF73 zMkm1*n6i z%C4>~*(-s@l1C8~U2ip+oK;J490J>xJORHs5gZe%$1J&Wpy{YD>u8VCZb=11*Kv(s zOQvYE%H@jLb(FTI^nXaKA8F~Erbd_ys$E%UHSd3;Sez;)l2N(07HMTNnqt~-?|FG@ zd_Y8{J28)^V2s*I@vQe@u{@ z4=#~Ss_gKyWT%>n7c=fVrTPdEAvL}T8FO1yj-bNb6wC9OXq*lpfLy1qEG1P@${>}; z3l%b_t8>vr2sqGc+5br8%Q1LfXNZuqX>NPjhI+%j5`hi2Xs^awD?8d6Lok2Q^J0hd zrkFWfb^0{AP^%pxE>lU>wF)1VQE1f2w2-Qla+Fi7o(obQ%94y()hr_6NXys7>N!K* zMb$XA-dt8#75b85uT~^v8x4+XL@mx1T*7j;#NoXnpDYJJOb?aM=~PL7$hBQ`xYlH9 zWQa;Tea%2dUkK=9C= z9R2m0Oh`ph1_R|*Ct^$P0ypcGe&8}{C?65c6l%s~JDinm5u1~7I=GNg9WYcgl*gf1 zJXhUJL<-NovMk?34m2}=k)ahlXJk*HN8-FblQcH;Cki z5<;&@#q=&J$Pf{aTIs;y?@G8W3j>$(A^wdC*n-J|JXw_|UGJC5J%uI0s493AUI)$A zlOyjD2QFnpgq^&Rb~hr`68v6vE%yRfG%0Nf9wlCL)EEfaR1PtIN0aP$-NaHTm$tSo zzG9u+AxU{M9zoziy6Dv^y|gt+U-b&{t4SjcY0gAQZ%g}BUTxMS6Tg}?DpSaxT&v~l z@^C=8M~vdoBr0rpnPS^%Pt+XHRqggOBAdjLAxN5IM#8HMX(}Df@W-U`RM13rD$1&> zsLEy(D&?1?a=$7-Ia-N|kyIKw-prx+Is!JJu|t_1B((0VHAFMF1}$e_9?#!G4vq@5-hQ@Rna z`n0A{YR}~oAEHpE+pegK3)m7Fnwo!99EXJ5m`NvfN;TKPV{q2~{MMmmVHV>6pP*BI zZzK{|RvZ54@U&Pz?u#H1f=<7r@>`Y&%5qp_AGhb=&*ZWtD@|_(-T@9yDz_3$dr}35x;W*^ zK(Up~>7_`5Ns3YuYvl|YOOkPP%uXax{;60ymd=@IUB^e1jg?5uqcMn)(3)5}LXxjI>|SWOj`E`UIj#ovnjk@C|^);pf2 zQJ=EuE#wu_=tm+InzB^6C0kizPI_bNoK)Xi&QfthJR8kxn-N>)xLzuUPYY37UW$a9 zrE=9x=Tu*j2=17k&Zh&0bSUrl7ti+rcC{1VNQ*_TNJ5uxQ}x~vFfl{BSYHu^YL43pA?8!Z#jaOQKN zPK66~GFq9)D9m~Cl+Be1I}xte(NmWlmCAD}0Cp5B-Xv4Yg&iu#!%}(HX#(u8GgB#g zlWi?GFO6t81FR!L6SBtHbQVit?9wem%U3}D!?6w$%+a<~vFQ%j)u#UvCpa8vYwCVS zM47eul|=5?V^Xn8TPnChDr>}~F=?sU4@+M)=}mC(3Wh4QyF;55SAJP4r;{8-vw5yo z0?q`jw0&PJ4=okiL~L1;ZI=@*WtOH6zvmo*Aqhu-pkk&_HHUbS7e(n06`J*Oi>v9{ zS(`jPDRnlaS4N2(ozt0}wIH#S*mOeTB5xLHV>05ZPdV_3cqTl`<77O3F+Z z!rAF>N#&L*L%OX+O~h#`x7wP$VwAonKqCywyll2H@`BCcmurT8CH+9|OVOotyPQ?y zsn->~LMN8{I}IOYECP8;S8ybnvDw#1&Riuu6Q;unU1snDQhAPZA(lGkcPbMV zi!x>!5eLF=DH&UqPAXL`x|wCY%EgQ2z7hq?gCg9BhV4-52c=EHx1_4jzMR(^D@4l* zdz_vW+4~BXDq*h_>$-9zAGIXR+a)%f0-(mRm@N`2=3$=}gY`7NSf)$>?!{ipR2@|X zwePb%Hp?1cP-7zk9;T>pq>Qar@(MA^PUACaO+=KFYvbuuqo&BxHSxP%TRl&x@=m#4 zXSdYV(aWC^zw2om60v~E?`u2NTqIBZRjlrb!%R`4Jw8N%E+s=*^C78vP)jm~>~bfa zXcb~uMt_#-`)W;sWaJh$MCaK?>f)D6^^FN5VXixx=18JxUD_{(fNDHiICPe2MIz^R zD@)ectkhi(R5h6ir9z%gbSbt(&#NW&Do=&N3s#lYtJ4&bUN-zx5RU+Im&lsoQJ%mW|C!NR#3==&Gd8srDP>K9yZhjYx~#)iLSlO0imTS8@f~ zoZc**WLzNt7^q#Qa?Q8ox7SkEy4W1oa?qortO>2L>J8-?K&qHIhJ1*C)XOMypfsI-Rx8$TXedq^bGg0oLoQ|YfURHSP zR(h|bGn}lg0{A#NWgrpo;LXoVYtd;jsc0LcplTLhNfF2#{kGH|W7M2ja%MVlY{5yz z=$p5^9DAT%FXF%(b#bX2pny2QlYGHG|YkHo8NSh<&dWqr$Hj_!s{fk7;X3 z{N5kE1Mjl$uy5~%PYKWK{uLXzh}r0ix}w40vYBeGwBOlD1NaVBH{N-YnVDWg;-7gu z59{4YCL!AuTM@uN#mrvzraxb&{gs%)msTR{p_;$zJ~#yQ7Ym8VEZvbe!Y+;169KSR zeC3Qr1Mv3ErsZUwNSBwSSC228#;Zpki9hkZZ{uO{H?A$+!@Te$9AB}b6{2hClFm|5 z5K&lE%vOW5RLt|-{b)shF;IryiHv6VGd|gT#+eQ%=@d&Py#ZG^8&>n4H{mD!#X`ev z-LJffK`x~Dih1>mfKzEZ$c|ZStI}RaCX(XSZ($D1zqI(w{jaxoKk^oIe4}b$Xv@sL z;onRdWU9%`_u)o`ltgbfA_O?UH74PFdJmMu3Z5>ti&kL=2}&{Wzw`}U8I##A59c8qbx0nh!6~FNzcwh7t^YdRneT;v4 z{`heB&WA8si@_By+{i>X24BXT)+acRA*5_ompT-`_tR(zcLpu#BZ ZlpZJ-7lYE ztb+4}2ZJuY{3n%5@(@|^X&WA+U!C$$g3)>ZTz@efK_2fVwAd#2T&RFFAI)MLFgU!7 zBVctn!=x~z3;dhkjqmr-_-B6m9;N8U_UCsClO9wznFjKUp2?N-*^~4g!8t9%B7?mi4t0#Ry!35VG_3Rf%n1LtDnZ7CnVU3QQl=0!SjANJY)TOId z?Y;@byngB|p0)dmg?UwWpPswsgp7aR2bsuL2EV5yy`=60$9HqFMGqk!A z+`F=0YT+7o|6@#e3o`23dr6>?D;^2mojy3S1;c#wdUg}P_+dD&tyh6RkvX;X|K=fg z^W)6aHgp?VP3_3_i~L>yI7CJ+c;&falz*JrzpyTqf9A^l$9Q?rJI5dX$b|-gKk*Ux z3HFPJBs#W_t|K~K*)2lXcYPeL0!XQa>|%nm9x^K{nVng|@(d z>)&9q>8EwiJW0VN{r&$AS-stJid@b0*rz5$4YEf~(=@3*PyYL=byuFg1nh$U#yI&u z|2s3aHC(VE+k@cDmhwo`y~w}o(-)jB*=HcI zj#IEw-6c3qEa)};R~S*@eeN?*IDIr;n|^A)l+o*f&%vqDiR`oRhe4)QA;+{0$dzdt z2@f(Ni;F%F57c$5@Un}4@_!ZHFF<(1L1cE%9I2V@-x)Dj!)}`_% za{mhh&4-Y%@X!}8?B(%ANN=BBJ*RW6U%G(K?e6*Jfm8^c{6jf@l9`yjWGX*-R<=C;wV{`f{&oaL zx;^7*8Nd7#GdLbu{4%aNsI^otd5Oqw!CD?ruyGAl3ylB+wosE0NU=tm4S)6NKHWW2y0oLre?3AH<5W$o5zBP*)XxBe3Pe(YP! z>`UoSwGLm?O@2%8+*7OsaN?6dkBc$6hBPU|kw&^@ZkYHzA3{%_{We%o{Uq(bbBDS| zz5^QZ`)941Rmd|8Wog8Pph7KfK}N$V6{f*n^I|!v_ccAP{-6NP)<^E)^-R zE<JfhaG4HqNNKiq_uCntOZw+}uwJbhNQuufk&8JIjad0=v8 z{J$rDJMq1V&&&iT-Z#NdEKj62m^K{Uuth*eoqTfgu?_Vp5+>s(XCIq=aQ3d*(rkEE zH+$*q#+kX9KhFGM=8H2QoO$!i9RkwohL?}OVdARsS8Vvmczm3lvdvsG`POlId~tka zZ21?{&y0P2?Bi2ACW~Y55HM4Fh^g|iZPWLU4UGPD^vRjx=ws7=nEw3enGOFk`s&g0 zXk^+msvEs@bmPb$M}9E!g^{xxz6!L|TSsyuo{=l3Zynh;dFROF@UMoyJ)Il=6p&I+ z4c|PR9JUWDhIegvoq&=$b8zSzLmwY{$I$CH{46rm9J*m@aL7D##n9HFfx+hnpPG7M z>f2NQHudfeTc-YLsxuXv{LAEz1uWQ!ON5ab{|&}wcH(yv&rEzCxUmoP?9)>sYU|^nyY6U=2$tACggFep=Pz)+SUB=FZUh>IHsy~yYnv28T2`=esbagskp2R zkP5$!NL$0+c8wBkx*X$Ac1Q%YFv@(83lsU5{k-?8!7;8_i*&T}Od)EbREeZ!Oe$wX zZuqQ(mbrYu5U{zD@gfD`p-8USCD$1W0|);Oyw z?IqKUvc)9zu0|ty6({i_Qwl1YH7VmTCp8+0c@e3WTej4^PSRk_INi>Sn{*`z(H_NF z!i5O6MBCh1y*B7Tp!0u=j4U>FkZ^Z$K~)KcnznkOCAQxJWGgD#Bq~HTOSQb)-!B%M zYs!q?mVmJ#M|s%TlvgS)mD2&eJ=$IlD-Zyh)E^MJn+rsMP-fY1($q4igE{q^r1F%P zrCbqxnQ`Pab$wJR+ABD7*r})FQCHlU*4mqm%!o8>rZ%UbefqjV*>Q%N6>3a;i{nfY z4NDUK^_U`H^r)@$WkHdTu?mxuhoo!8NWvOlipxZhD$ZC@1c`!u+0@Lao8BdNbm9te zYJgoD^pRFeQtmJXENOXO;**o-2xTx_bf{YnXPchCODfMe8-$OsL_;xm$mYo`ltea$ zLMuwEVlmEb4TLrBQPEz?8Jr!Ga;Pa=v8fN|3dHi&mx+AzHIk)_$`0G{rPQHzc8h4s z;Ph2ToHW&JRc)kDgq}YpzP56D1d;)RgHpp$Llp>S3DHu>>9u4X*cs}jg51}lHMt|= zvm~dB6kBy}sa7;NedSzwLBzS_mUUrGmTtM)@^rJ~*O(Mn?h@Oh3p!xY(h(-Ap^*o4 zQR2U(a(B*1SDKBQzN*M2Dv2$k0gKbAmlR~H>T26+8h1pl*fTGVgHDlFk^n4iH0zC^ zIi&m8mLWo>=d@{Sjc_GQ%ZWr(FLzjCgCcuvQtqcT30FErw4ypweEJ!w+*2$QR<+CL z^8mJ0AD_NeWUn=qlrB1~Z=1Og2Z&KTM96}_5krltA}@IsKrGM&wrtpRy#?}AjWw`ECX$mp)d zW068jtvV@{t6XKO(E!{zSyvfS)V{l=aw^myI9Ma$isI9|RU>J!T)o^NGjvYtLgqE9 zlrlu=KMo9tJwsHo%ilRJDj)M`N!{#RfL< zC*L}{d6}a$oSO87$p)}m{q=TiR+@dX3d=>!=a|LU}716I6e9`@#Cb!S|pdE(V(ee5bi>T zM4+p*y+L(EiAu4^=9XXiw6m03d_*dz+%Cc$p+jjl+sx&N zA<+`V5oFsz;ep0U)u?QM=9Fi|`tnYvOt$mdY{;U}$Cj(=izY;Zwp!Bxa!{@G6m7Mj zJHg&3T7EgRnJ`f0PP^<;<;W!QtcX} z5tN!v+97BST;zQnCF^3AjC%SgDLO20G~FcWWQfx?SfZRwk_WotP*bfanRMxk1gA^; zs+#dp@w-&4%8^TrYCaJM#x2ch-y)Ukl{zxXS@onl7-)FnyVVjKU9PAscic@x9!LbLOF?~lK(rKNBThDStg=xIY8+a4 zE<7%>Hzt&pN?mKM(Jp&D8MBn7(J|ISq%~H|mQ9>OXUdx&7OR^~xdt4IEP=E>lqoFJ z=7+@kwxErs^R-TkQWZ1=q6uCpmNUw%kCdw-(G+Q@B?2k4)O>Aj$pha@mjVYVg*C1) zO7cTj0&b$5^EKFDIQ=n~avNZP55a4}c6*x$XTtKZ3Gtp@>2#?A;CGuz z6kQBCY;J;7DZ1*PHpwHs)4Ak zq0`n?j_8s1iComwatTVb&U)m=tY528i*`~@m1eSfDjJp7EOtdDH!GbjRl%r*Q0mRm zvRz~JG~<`giC+a?aGq>OOir$Bi4-vT%Tl>M7^mZSbl2I8;kr^a9T&@$#b$_V&@ns? zFXx$s(d2EKrI5d*AdtKI&r-3$-zfVOa$s{b+rGpl35kuKky9SO-BC#U z!g@2g|9Pog%aKGme+TnhABjKXz4ZWp zO&gI&<=-L70AA;Dun{epE>pnI5O$X%mhtHngHgsb zG1ligbV_tOkHr%aovsr1xZ|ND;70^DTX)e&Id$GM+uBM<3jgi>JfIPFc0chK@Y@Z* z$ru_Yj#7uHsT>ro&la89LaGf|xZW`3ehn}0ej4)l9YTEOL3(@l3%?dy7F}(bF<=QN z@?|cPk{3D+8W4QKaKG#~=wKg-mpwrC&>t4MZ~l$ozV2QT(1gT+3MBP$Jzb2X!xm?b zXsCqo-ooGgC%lBegoFgk`@2v62?1?8nU(7Spd)svq%(NDftooUQo$>=BsS#HKVsh3 zQjohf4Xf`Dj_&Mkdl4^aTSe)*Wnl8m=W2!WAKz7S&{Q53LsAbVx(aYZLM^0{v za#-x9XeNZWlwNOd8DclhtR)Gljo^y@oD9gPZ_;k*et(GViH4B=MeMO&rQu9en(!Na znj&2fq(xrulCg**=%c~LyjzGPpccC`gRGF$b0xDn11ewAV6XwSIZ_PhnwJ}P$!4;>H8FeY2;j*rXG>uPAvYTf6X#9zf@05bT$qg*b z&90Rc_=w|^lILu3VCt%pPS)Hgms4V={xl9geKelv{uD7joPB5a`Uw^oqs)qsJxny= z+lXA&qDyGFsMekU2G_|c7SODHg(vQL_rcTeF>dXSOtT0YaId6S`-6Ptl{RIsH@K#W z%PBgf*p7o^Xh$Cn>*VvjtnNFzuO1WnqgoM?0Eu>0Yrbg)z%%fpSp#C@Wu=# zsh`G|7i7I)y#;>H^u(3?jSuK|@_RPf9_62zW%q9^4aiC}mkc>Ze>0UE|Lo*_Bm260 zkM9MTN@Rt@)9Xmj#2v*=qDCO_!Vw8K)PZW0-y4Ko?k)3ZcOQ*^X1sh5*|HC9>;7e) zMLfD|rMNl|Hl>pZ6V`UUrJ_A)wKgL>uWjYOu!EhQ>!)FP{|M{ySp_n!?!-hO+C_jI z78Q@mqEi{Da6TI2f{k>JR*BD)H*aF+=lW@4Qe;GlZtH$`lfcNaBIL6Y!#GOGW=;Wf zjW298HbX^us`uc>|85&QKify+Pkegx0RM?&S8wh5wqr(i+E>bu43STvUhpR}0WF~8 zt?6=FG!^XI%5I)nOX1I4w*f(!Pq?;sZ{5loW!o!I6rzx3v|I@&YIM}8uiHq7y71EP zT43jA)>6dGuE+NSFyicj&>!VW3H=eD+Kb5;ks{QVj-hVxcanAS0h51V5d+gt1DwTv zDM0kS6L(z2-71n9w&wzpCPi*X_OZ@I&nft+NPMblT1SP_=`t&K#VSb2`k8$!aLd+|_A;_|pZp{V zWBbY_?6up3c=HI{Ih_W-BJ9fuNK43t=g9My>}O$NTbGJlY&Q_Ryu1D77cg7NzQLZp zxOhr`E_^=RffdtdL}0kFiEMQF2p-v;!El@3Q)ahaOc3W`g{)r{$W>oMsQ(ApSIYR; z9%2zXAA~^xT*E#;Agl5%yV-_J7J-bwaVtX2&$qp;U$-m!x*CJfzLcHchH(CZ)2Bm7 ze_rl@tsI7cHe3g=rwB{_L#VQ4{VMzmTVgDK=rZ;~ATlQ|V^1&IPaVf3iB{LO0&`BF z%$H+}SWD{3l4Pyeb(F<(z0XcK&6t}GkOFdvfauwy-Y zZT14QwF;@TJUQ~^fr?BsEUU|cQ^SL225%eu?;+LD_Mwwgj}29a{$u#i@FdcK{c-XE zBnbQX@Pi}15#{K_$n&E{Bp&<2*cZp%JNEkV=(v7r-}wIVvGI>g-8BBY(eKFKF#564 zw@%APPfRRL{A9vC^Q)P!jm8I)8$LU7@8F9Y-ZiF}IW~F2)bZKnyT;!W2EHht#4**V$Hv8^Yy3xl#CzxVow_bqcAKp*IE!6*O=wIgO5=fHB= zc52tq)q{3lfWyL}0aqbVa$(X6xyg5?JQ6kU1T2%i6F`1QcgF#Hivvq*^Ti@Hk+bKp zCQ#pQwnB=590$OJZJ+8fi*1*6LY?^@slFi2uBV(jleGaFpv+! z&&6r5apNBlS%al71NM0=y9|<4CNe-yYmUE5qBg_u3`gQb7^5Ot0YSlG2xMl}B4;a1 z+L4^2fF*#Xml{FL0nm`Dv2(9wLv=LUcSnhQr*hrzzwnfayk zVPMPwLJ1$ku*mJ^K;Dt#a&vpnu?`nJ1-k);cr0cC9S&%8nT69LHIt19`mJCS(nZ1> z2!6vI{C51@Z{Z_^hPyF6HqLGk(6s{Dv5Y`nw)?^a@S56@pd$xxi;mL(=#PS1G4qz* zkAqec5FQyv(3S&qULL+0kOr+{Qkvs1+#}p_hXDY41}-1&-3W4mjLi#c72to=B3ApoMo*|SGgC{$}NI%BR z3rZJRP0fDDi5sYVp8Ujp!_tr2PD368fy8tLHx0zX7No7SWm2L7O)!&%|49e(mq#K| z$WPFdU1&+XTM;-B!K%U8JAQy#*|K3|Q=Pb3`Z1;-9vjH128W&|T8(zPN!f>_-=fPN zOg-QW1#CZqR^fyWn<$9CMdDHe_8=cxjN!)aLoZ`gx$Wcim;;%C zht5%*J_lB7T+stW!+Hc*WM}Zjb5uw&f(WrJ3~o7o3!%^Cr(WBmVn4DMJRE+98y&}m zJ01>eQ!#bXuI1h`7p&NrdSM-QfI$i2cbMJs!JQK8oE>Ra?Hz0!B*cI;WiXAz{3Rll z%L4!n1ByjcfGbwck3U^*!|O$ACWGaJ60Aeao)bOC4%pccmqe3W%sWUwvb;fnFw2m5 zY*cyqhVbar^#i+3YPa)yK7M#)8EIMVIXik45EeQxA?^5JzP&InH4u`A#79_}z+6Kk zv1T!<+ivVpgC;=k;L}0arb$o1A&3oWD{NSlehbNk?n0xW;qq|!0py&qvq|Ed#txjw zE(_RM@prKGqtTA#9FoQsoRHUHQA7n>djYyt zPy>MLiNLxY_Brx{9~OTcC()d2*cZq-a0&_gv>j}$t?9c(Y9<$fqJXa))(Bh}e9&j4 zmDurfk;*~ng~_rjkQBEq;CwoA%WnCOnncdQ?@$r(nex!Bkd^=r6%lSnT>3E70Ty-6 z4VSzy=?r>cll5eGTqjYf2#|p6W)FTBZuT01b+toMo^c4f6_}?+XenR@`HaZStK$ZR zCA&O`lNAu=kPKOvLClj~m}59h&Hqqh-G-L|hAWYez$L?OK>vJ++{Ek7QIS0tzfYiV zP$@nxhw&h{i5d;bK;NlB%}rs;{aYL);v~@uzI!x&ov8xIB<>B;k=`R zjxiDrDAS1(B4=TGby*W@B^VkJ67j7)(KpAonqbN;o|EGKGa-i9a^M z*+cL=4C4ruhVJtS%c{K~&N0-gkdE15#{Py5U?&5}pq1LWAaYJ)=ZnLo1se@^GGQ{7 z?Kv*HN!oiM^8)B04yJ&eLW?;JcfL8Qls*i(g~rD2ip2^MG~ys^Y)&^ss!<*R@)e{S zJ5U~(^sK;SwH0>KBGn3i);yd@teAvw6HaIFjq~KEeUg$&qezE-;8>6o<`|n~&e+^( zKF1md1VBvLpyeVt3@p^NgPXgwM@8QwIDcRl0~i%RU9aD|;w@wd2E#j*AQZPXBlWMfGf;ERb+FJxlRZFlWXK$@r)VNJ8w_xB*E=LC08nv(T}H35Yz5?DC~YIPDdC*4_7x_r^A@+Fr*X>!%=_Nj7VMU zV?HH0nJXsWJF|zsk*&X66BOnHibPN#_%4P8EsSI*Md=m}U%g`^wj%>HprC>wpqqEj zbb410bp}Exh-Cy<4lGVH4k?{PVe={J>lg?KZ^s6Sfs{aaBY=XQdU|$_ckR+13)zLV z@9@jTfe5>e7H2JC2Q_h1$E2RO?Kn;1r~o}>#A!Kz$%$m<^%51Y0vQNCG`j(M7jcZ( zUKNwx*?;HvxF5bgz~MxV4bluL1P7e|1b@Hw#y5(;hW;WUy*LTriUjQ)$$)=u=DT9c z1wH1*$rVtsW={s!3FtFVVd0j60e-KR*eAy>fC~UrRSvW^mZk!d+}zj|Ux!lz<13SQ z483gh`y+Exk(r~iln|lfkSzk@=oNSr65n(!s<2*96pF5hBUOxB_!BR{Xz))2yLq;s za^`=+c(c)7xs8A1(}4K@Eg`%wxmSdQRw66b(uvcAtI-KH!_i{c(|dT^#DCyQcH>+> zjep@YTi}xFcJJseybKR!h=yvdKBXoS@j%q?WtvP0XX<*AKcU6VeNKgUo<0(PGRa)o zEvQ(RY&P5BvYw1jVQ&!%C%p5X*@ho|UyWzBwG{s3U5PFHldl|}JN^8r5&o~wTmfr} zMtF{Ot<=yN@x{%>INe&xuWuQGaz>Y4;>0(%8;;@euaCw*bNAIftgIc~j~~OJ2smW* z)lsQvEVUA)tjpO*sU7rsdW<&lcU^_v^w9ucyAdz&66o2+?$55mE8tEcgPGVS+AsHK zsHCzJuqf*VQzat~%vB1o>Z9?*rp(`vx3+d4RETfzLjE%GnY5x`VvT{CQV<(g(i#_e zWhkLpYe@nMEwE2dId^owNP*23QNEG`qu-wj529!@hXXAqx0-=M{utflZLe*K;Oyz{x4Q8EA9ZvZbOm<(=NZ7v&cr?Ty^ zEn1IgC|4^6xG6l^tu5ux+$)Ehc-u7mD8q(ji)RN{XCd0qBIjwENvV9P4$Yh!x{My( z?W2i92lT9+-7n~cx7?MRR%alTbh#3g(yZ2aN{NQt$3JLex9~SO@Phgh(#cN+5Agr* zHv5k5Cmq7z-{v?wu-cuJ-S0@UnH1+$W-Ab`p8NQ$83VJHf*1PTJ$#^D-I^I(cDc^V zR$HU5Gf5ShYPSi4hGR1YPLc;BI@L#m$pEH{KffF6?afBPWZ+)8d3A6cc6f?V6l2O2 z<-U^At`r7$fxnwYxB6*9k^%_BPwZQ|KVe~!!HfAa7>O_4N`2Z&lFFvlrF8k4HfvgJ z&<`zWP#+CG=>TZ|>;1r)(ps@-B$L)11EYVE-7)#L8U4s*L;mqEPw{7Ve5S(7@Adw9 zkv%(tFNxL`b;;tUsg_2c_8Dz~piS^#-^}0Z#fSPxJhAn~{ro3(d$x3c;T3xBIXeM1 zqRrHujc9FDG?i2#$tKG@V~9tM^qyG3^TD&`O$zK-3sXg@oSDHS`P zaHf%i7=IzUQ`2=c;(O!2UdL{nSxe$iZhA~iG1x_l!ObGO!`FkIQo9kV=R;KS->v8Xx_-d_RA~oy_*`6Mmt$uCtTqt+*PMHLpg6FkG!8 zYD&~wTB(VHVPSgK()cHAkMHOI^C{;JJ|1TO((Cc7BJ4#wM!`)~AcR-Pga|ongFl$M zWe$ll{82Zyjy@6}O}?^++$W`-yT~JGTiaP7n@PUszhA7!V=PrcqREh><>~m5BreDv znCmYFJf3<#|KI|^yZ$-IBA=q>tdJAL+T&3o{dGUp0FZMoVJy|+lJM0LB{thf<5!Nq z3{Sm4OA`{}I3`Hs7O@04de=#rn`g^bHo-DIg*<$$YMp#TlyO}*-<7kye zUNRDdJ#0l7$uarOYZY$gU#!V~| z$HdM~t$w?z$=6(@Kfy}rtb1$Jwk!#*tSr-gZmQ_R4+Ic=F z0^hiGeG!nXQSZ4O)+n5T0oEMBTXrCaSTCIathjc%<^1kD*!>IZQhC|fDESYJQTOd- z&fx{)zJwFCoe(bdxWVKd20SI=ge8c|0{?|qu|nk9I#m!U^<7d3$JoUmyOY&jz?5?8 zPWEl20q= zr~4KP*3TDTcY*aI_4k9XXFVIk14GK01G4axWpa7^v60QAKZhgHBRGJE&jMOs3ho9h zN=!lMiMTnrA?Cw~YQ*Wa|Q+u^}tPODZp zHB`#u^r*r$mSsfg{po%9dLN13t19m2-~UT?p{si%YeDidkE;ZjG{C7auAE$r`0xkr zhnDIu=F4A?UCuvp%SF@O$p`Ss`BoT6SY(v))@%Asu26&5fY9UioAAv(8j{p39pLAh z*YE6p`%Ns+6ar_FUg1?Ey&l7hw^l=c8;Q0p5TzBu(ngMhx3Dv_eI)+mmy%cW|8u{0 zxZ8aTHi)V50sp}C`=_=H_$Qb7IhWVGcnXjNcOAiuEa>~DUlJ1ju1DCp**;oNG^8{v z*PRvAjvY?yp~RuzRoLojDo*x<_G$#-%rd7u+l!2{O)}0VI$2 z>u^gP>MuUZ&H)O4y(+l-8MYwQ@(LAytjk^~v&-o&7HZ#Iotww&AG^RjcIUo%;2s%I zKF)@=lF-HmJdKfl82th;6*#iUSkV-kcVP2+L@-r1_%g=2 z-&`+MDNkOR;fqf~#&3B7=a4=U|CILHYr5Zg0@u2EcO*&!9#908{kfV77Hx$ zDNIZs2@V*5mA&_5V7~j&PYJ5YdKPIK?uhqPlg?mcD6&&4HW8(gRnuwyo-aYA^cC~v z!)YM&LND-t{u2A5m!sifaGq*)lVkHOXWqlY}Hd zLfE_e_8Lf__htIt-lvza^}hG?GCjSB3;_XAM39#hDlP%{1<8!iiVN^u5K$C26cLI1 zc&LxZBl>Vf{e7!%&zQN)=pXsOr_Sw~x^+*TsygRor zCYT{JPvLa8x|Q6y|G?Jfho7?T0=#XXX)ihXJ=?A`ZVW7<)W^;JEmJb9H_aKD_;kz} z@z$+Aznq_E^*3P6g|e10X&(Cqo#?q)bD|(q=ZblgOFnPTMljK+d?RQjlK!cK&GO?m zxRyeTw2nrbO~#vM1Adf8veZ>ZNkKuL{}!f~UENBKzi-;syygj<(~f=LcGa31fqI0i z^`v>{<#)M7`0tKV_fB{cRivN56AS0E6z(}hOKAMCrL5ok33^`Rfnz`X#brF9g!Y+r&C~my zfq4>s1^R8a?v_gw>eFwB!l#;|=R;VUif5501OGNns*od)OJk?-??zpa@Lv+uQciO2`^Y#$kZ9tlnG(Bd45`~-v=an8lb3|>)0L}-_Lx2z>4#m{K= zqYR%RDFirq}KFXDPD5Ru2O{Y?wuKh^x`i}bQ{co796+QdCtNdz=Ar3hPdCZxt} z2n9C=*zw&86$&z+PIe)9j_f(>`a{TYyr8=od6^y!{EH}~&_3s>1-!MbF3DLh!Cmtv z(W$uMvgX@fLKirf(P9z&xy+i$f#6SWu;gdwLm9P9Li{JOIt9(-#IxS^k?h+i>5=S; zMNrP%Jkqi%iA>S2m)J{sNx{x)%5e73HzP0n8g^J9)_?Tu?0nA6-lT7rmdo< zP_##DDP4?w`nUM=f@UIl?@#&T9C7?r)ZN_k-|&Zy&Q&}{X;xQ6usv%p2I55gA~ucN zUO_VCY7uHbJ>9;9{`V{N-kZz^%MR2z_ryY}bX+qpY3U)!zKS!IKt@CtUA3{^Fj<9k9Ndib4LHrkX zNk$I5fdkrFLUPi&?GRaf!{%CNR=52PMp?L-@*C}L6mV9YR@+l2e5`q@cdJuG-2bqB zc446VtsO+<>Kx7tyN53wK6`j@=>LYE8~S?p8AG2L`j0M4_s>Ot9=diYHpC4nhR*2O z*i{?q?YU&|)xn<(ezlt${Mg{_gY%umo*PB3!K((1gBJ~M-T3#7|F!X{?oV%gNR-<6 z!HqX>%x|38c-hDoH|`fb(RqC1Sod9`lLLPl_|?FZ14{!7_YAykAUoh0K;gN8q5jwV zpBEhwy|4fA?s)&_`pL-V{_DHm-TnLiWWTdt-M^=Qpzn8`V|~w#9Pj(jzEAhv)pu=Q zv};=*D>~69?{RnjrYF<4v#)o<|897uQ?ucb(L&#VW9QDu4lR)>H2uL zqUWrh_m31uf}lD$U!wn93yPDAOH69eBVAe9ypW3q3Ug^iOl}Q^RfW0Lk0iBrSJ~mS zaE_>cFaOh&UtEv|ymnhEnvqrfjD8!>^qfnZ_eh9TiK=WZ|DLND~Q3wLH(d zbp}ni8rL1;+Y{yrCrQQ^3e*1btW!Fd_VWnnTq5SGNYb+@y;G(w=v+xHPZ@v&F{M+Y z(={Rm2}mBT67yYrM>%EAA>}*~W5}oTXykD%Pga_%=t?SSdVbDm%h@e%YeaK7|9ml< zPe^CDTp<>W)Wi#_g#Kt}3ow-{PiN$wf>&2n<`v#@+IN`$LDVF1F_MPLA)5_lGYR=+ zJf106b$Wx0doCBT%G7ncJw5bX`^|8NmPQO#WzEN!qjlM3JeECIs%e#sRv++XB3gxY zI&p|nLN0Xba#cT9kVTy}UCCKM$ySBq|M49aP_$VZb<9S^GZk%8ro5C#4d$xhdLFc} zIeQV=cJ^7h@(%v_*?2X>l#xtO^@QUFjqCsq?#`9xemKH0HA26CQaF-(Ibz6^yGS&uO`N>4L$g+HtBa zDEcdmBUkoLvj+8iB-OLK1Oy$up_BS_`aK@sUw2$XQ$OU6Yk5mUb%7m#jV^pYScyx3wQz~=P zYBo@in^PgXGvoa&-%q%N>^H?iF>FtAx=3h7=3Ra_Ym}8RY&oqm>SVqUWB3#QgNSv0 zT56n?8cf+}!sm^+pXA#M#NJ;Rip9KdK2@~(9r81z z{PXh_omb+Wn+Y;;g{~^j^ze+mx%skZUaHHej8$2&;*qGvf8TyS8f!2rr%{I3KwTn_ zpD*T#qjU3`ayptfX=fvDZf6LZQb5C1J!!%NhYZIuHz ze_CoSN5f3CVX`ox;r6`EDJ?E0DhuV*TxdETOZSNR?#q>WgIVy-hO_qhpuJ#JoPGAP zz?@|K`m9VFuy~Ex=q?_?oh#3kYK%hch^3gcN}@`i!81zd%1O@E(8-flJ?f|^M|tRH zt{ea{Xxd*+)s6KzOC>5Tw|lo+C5%KHj7N3$q<&#ee#UEUfuSasu^Nv!sRgzuuHJti z-(D)4LQFMp3l^m*qgAQc%Y#32r5pnGxmq1bDmkrHEm2+4em>}INPU4wX?iZNFsq~T zZ?)Tz+APaiOD?f_MxxZm#_4CIHml?giZ{)kr&p4z^owd*9VxGD-G4?FqecqhXN@mgq8|!wJ z0&}vRm+|en`K(G7lDkyQe0ff0RjM9qw<}XKQbjPTjxsrg!7uIMLGlZ^Y^_#}#x)5w zW@*-`-gF)Rd^V%@NE#tMh|XmCSq-94?e?eB1B&I?t zz|5sn7x6IZT*@q#F#)bV7nX+nHl5_`NPDrQQrkZa5-HhbFWQd>YH?{TES=N%Gjkrr_M`mciSqoc%+7j~s;ooh)JQif`NtFSRM_HF zCs3DbAzBQkF3hys*_0!VD0V5|F#Ezv$)DTJs%eWP95ChQP@y3^ulN$*9FNQt^?`D| zRN<65NoLnK`9B&Dfir^WO7>=vE|Cl~k3>SU&d#+XU#is_=N^R4vx1sw!& zH&d**mHMI~Ws+qE7uy|4-B#&L%q{oIWo}hIrnr)Ck2xzQX=t`Ks}F_k3VV1{+ib?v zW+f9Y7TmT#!eFT>&gQ}BxtMaUCXHK*p?GaxoGM3m{YSeWg(}W0XsgrHj5brQV~8B1r!ZsFUb1+azdbc&4H4zh*>vw`QO$VJ1`Az3`5EtL%=e?t)# zwNJ*;pk^igk2V|T~#yJ?&Dgd`i zT)ww`DvFA$Zl)6CYI=`ZUzNztYo87yvp$1NVw;iIWI10+l9^~PqDW-MDlx{R({=|V z%`nOB=kxtX>~SRJ$jZSym-dvM(fv>Hg>!NdjZ7_*JN+IjlZjz_-uDsy2jO(GA)D8* zwoE=8ke3zPf7x!Ii6v#aKwMW3nAwCvDdmd;hB-3$myopSGy1oTQYV+{6olnu1-LEIa2caeu8Ci){O^cDppf zF=er5x?xI|tGbBdX1+a;s#h3^rXY@c0&-PSx!=}qpF!aweKg@Ou!@GNkiOtVyWNx5 z%3=;yU(heuqNo|Ld$27~`przi0=J>c!lhJ-@nXAOVwFfkie%k6JA>T)sJd;-17d4l z;%(H@bCpQ7E*ba-|F}OFE-+ffbcv~{#C1-7QQO4(6Say|fg-)N%Q z6PlWA=$HI#*SunxEpAB}q{V8koSt^JANM%rjBTbWMeeIvF{?O`UTe9$p6O)Y?0IXRc;Ncai^ylYSv!TX0x;c%pB5T=lT}jHvEqzFm-gw@ zWOolce)M`4sN&V4=84fbC7JAGIr2s~J2(ON4*+YFrx@@pfJBf}kBsvG?-P;su<(hj z^#nQj?9PAZ6S;d&1}>q!@a#=+X$mb007M0RgvX1>5^xRxzES_)R`T6mb{KSzYdu0v z{X}ac2RE?mp*)XmVDBAGv6_lgs`3Rio>{HZ?C?|suFBqTp_8F^rkT{q@G#NIn5@P@8bUE-p!rB%FI&bT! zih4yor+R+a^I#9@srMZ2x~%75&#oR(*OlEbc7LP$;_i=k-#YZk?#%F>A-kw|=`YNw-rs_%`y=ldS*%nv`*cW>X@`r_SVozl*i zIv?-+WY?aqw{-outGOYt;gStId;ifn-g~n5YrP-sy`?wRJB?a^BYoz+^ZEvda=@3q zz4Nw_bf@Rl^BLUa5PwWx0^x1=5|?#Bt>MBo>uAW;uc zR1H^h+m*ajgSywq3`f=otLL(84iFApi+27OF9qZ)jb5SZz)Jy$m;m69%Zx3YXp510 z4m2GgDL^f@;y8dF)F)dQ320&qMTIqz<$#?*GC9C{UfE;|QPLhHV1;n5!o`Z91x1I{ z#;$Akj9!s2Z=wi87AOoPar?O3&R_G=1t6I~`AtbhfxQHH)(aemr7`;V&K+F`MZn_# zg9R}VE5Nk@_6D#N*s#0!A3K3+07w9c5{iF@XBTy-<(fqZ zeM@^TIbf>{lEAnRB^_EoY9!YqlC$OR4M%xA-RL9w-UXxq0LOxP1royrBo|PjfPr?u z(f<3WR}b(mvgZLM#M+^Ti1Q-GUu5?zgmMOp!fCUuv`Epwd zL=tdN_>L4(i9dl9dJQwt0$#Sd26ht9Gr+C@WCr{Xkb(m@^TVR3FAWe z4ZxMz`UhT&cYqfI=p6vd;I)^css|7|Q@>r2N|EU=1+hHrC%y^5cG`@n1(pF8iYgAE z9r%Yn@Hr`ND?8rge~WL4!vw{5Q4~T8>)>-Oq{ctn5(6y3VXCRcVxRPzncve<(L#!3cH&LdHtRc|`!i1c)F2S1E|fi4a3H$pMtQ`RDDP5gY`tHWxsc z0MR@OU`l6`TUxM8ygx#L-Wd2+q>Ugthd=I0Zg^=$ z3KSc%K!95S05J`mYs1^vB;ln2iird?$puUVj4@ElL2N?ZuPsXfOI^TZP!ysUAwe&N zjy49De+P$$BVobr+o0)_K)#AAVL&{1JDuv3}qdbkN#;zYQnAu;4>Bm zFxGf$Q!v+mR$D5e7sQp3|sAG=4fo#J)%VJhC(ra z&Xer=dSz!3FjKzIl;fLh{MhPYr(WyY%n#Ed!(i&uw|7c57!3COJ z)6n4iI{Yk*XdU>VG9`_k}RI(Gh(SGc3&PIid2>>!1E;$bOB3}6=UFfg7O$@W>k zJ32s=DQH0~0Y1(FLDVoXQ}?!{P%V7r8vemLMkIJc;2ML;sq6XQQbkN+U$Y<%0KhW- zQKa~mwpH)~ABTLZ1s`Hq4Vt1zamk6=a0`q^_aK-OY#y)(z=HvF4TureZVN)!0z=Wg z1JEf7D-JY(?rQ|q;uJt}e=tWt^Xpkz$9>CU z9M$^Us+BW}>PYnJ`H|UzEy#-rv#@4|8MX)w-{D1+6M%8=1 z-u^B49I&qdc5C-608L2I*vKXsH1G!#M3sG1*XbdhLSgYv!0BG@zzYaV9}CnTAd|0&LOSgbJWlxPB&SQsP|yC4%i(-z}+ zWJGGP0Tw+0%MKj?C&$1$+EOrOfQJGbFQ^)DR)Y0Nv(@4DdO-a>v|vY}qk}qwg`=Sn zkF?;Z_$aUe*covH0YsO+96+@ersI3GXMBI`%UE96C;$kiCI_fhs8{E;{2$iRa}q|4 zHGxnwvTT6a=Q11GRuBhDfM+qZ7P}Bs47;Q@)7iHB*fX)C;*Fsl6z9*ikfj4H)G(%y zo(~sf(CaF+7i)F~$mD=@f*8@gj$Z9K!hIOA7Og1X9Q}!m$t?Dq&US;6~S=m znU%6#^jMdr&|!eZtw2N4_elce3UZXT(jvphhkXJ{fK~<@H{RS(8~j!Kw>W@+lmhTs zxIVC^aCBJ!n71d(YmbJemSU5kr3yf2f?x@@O{PV=Lhlba)lvj&727&&F7{GP+{k9^?;%riP3zgaWXl9o&+-T*c)HlOCG&w z&v>&q!6Fx3DHr?Q(uOmUj;bTm!Fqx`ImzxD6*iM2hoqN~`}=RYgy(r{{qgB3_S{ix zUG1((ycHc>aa;(5kMPxOA$L!)n}=76$jRV;w@b|YWr{_vRW+|rs%36X+F6)2IX%)4 z^>S?`^&J?tKt@C#47SR&ZEXH*2PW@LZXn)6H~yqRMl?Q3$l0QI^Pb5bezO|1G~|b8;!g^d2adhn@XCGm zY&JNFO$rPEG}D{jg02GRWfabN zEU4DtUZMMCi>&}O4ls-`l3tXZI*;8uv5pj~VtUs)SyU~j-0bqJQ=*jsZiw&%U`L?0 zDoT~*tnsSEUBHfvulWdh;e9t8A`e`!zE|!-c;y6I*w)ZpQpM^jWP-<=Ir%zz%|rd}m$R&B>cC3UsE={W>jl4B zX^A;KQ8tS|2pgDVu#{JeKz(>m8*lhMhP8>d&n#ZjcVWBGlGi6|xGeFwPi&b^NYi{L z`<3kGp;Zzhy6SLiNe?t{RZ?@{$W(%6X(sM1nqm=aqTF(NZzX+dyn{eSPTca&y=1|( zuXi;#^9Q7KfW2U>>MR#^GBA#+5&;xum#fL=4q!S3&E&DZmrhR|-FpeE7H#(~D)1&e zzGk`t4z@H?bc-Wqmx84$c4DVeu0E}lk8brdc&YQ`niwW~{Cl z6I6%dvM_I_l84wWBLWdQ@!FX@ilF(;L+mA@t^MEZ=<5h{3@r|B>-kyV#r;oqU*0*5 z#6Rc%Y$f6sx-K~T#{AK@uFyhCDHSC3lE4g5VlMD~QLhX6k(Ncy^BPj*JiA+no9jh; zu0=Ny`1Lp2VW@b=JqtepE^IhN)1*@JO+8CNgKJ31Ysanv@}`wLefvYU4SU|Qyf$$q z0G9?%y0}8aGY4lI{eQ2V*NCT#?53@2KLWOdn}NxAecyJXHLYuy-fv=$0V@ekh<4Ou zwT>>U@2!`wt-j6gU(TKsowfOB9pgQV1~qUPL%L@c^j%3G+C zgh<}?uVM&C_rM|0)A2Uz(MI2eZ>N81T(@c|EH9F4%G~0#hQhvh11TN2|*- zi=!aD2jE~tPi45kwEQ1NUb$EsyLro6Pmm)))qcL3-+$WHo!0Fvdu+S)=={o1S8I4{ z6>L32!JriBX)N8VAHuNDLr~^HJL`l69JqP-{H}w80a3d5SAC!F8Rab?D5w`NhXrg? zO%%oPc}XP|RZsh}9!Z)!ihY%g_*hU)tQL_|&t}>L=UE>Mb^-e$_+Q)In2QlpOlApk z(r7uEsVSA@u`^-99txr#fsBZjZUTL6F|wn%?Jx`41a47>et4jM%UR6i(rTB-)JU_% zc0a_)ZWV_Thy!|^d&O^gIk+V=gT3_bdfmk!e9<~+3{h4 z;Lh?xd&!}?dVBK&Ui1N!zjmdMs%tvvz|{y5ewig#PVldkazm|Gi-_jE+xH%uehuW@ zUp8!Oe%DRk%D#yDZtd9#x$+saG$&1!0!Dv?i-c%bx=EkX*XBq9D~WtSf9&%Bt-l{mPG77Kq4^s|NRz7fyj}z!;$8aV{Rjcz8CL zMtxSVmAGtk=CW%>I;V^BuXgJd=tm$Uk9}t+4v%{b+ncXkf$_9a_)*dD`Gdip!7imJ z+WSJ^;=s*Rxqz>Lasfo$CN=QM=Y8|;NG7iLy4@~I`_Bv}@Mi=f${uiOGm~IlqOp3_ z;Z8_&u0|l4^ai{f|Fb=)1tOJ*PtVmBJV->Z8uuN$!L+@pOR;u93T)YOj^XAC7IWQH zsW=sFolN7;3uLHdj2&M5XUjx$Ji{8OPST>+yiS^sqiUAg^qjBAXd{YrjPK__3|ADP zjEp^#IETD8CY@-$KSn>FW6_F^c#a3wlP@)xtc5G+W5H>yC&G6WkDw!=j7VPGu$L4J zmZ|2qB2+USi?kScn=FFGT}hG*hpHy^tgGsw_6N*BA-tGkwTL_|xd@BoPScL&>miJ1 zJG)3LoAWQ0jG7A`pWKx-%-AJ17r*r1k;PIIN?NeE>pyx3N|43TWz<^DyUpp8RbQ#s zYH>xFe~~Nl^zN}rME3j;sNe6u@xATMujE;sXj=!*;t=f^zG&dqz6S@d=>1jKfu2E8 zl-D0}RgoPUE%Z1Y}4#teQ93M{z2h|OCdA}6odv2U3xXuNr<$Wm^aMd!-L zv$=~gyELuHOH85COfkcQCk|B5l|Y0tfVZIVxej#+?y1mE=USu{v3W8QeYJ=JTy~E- zs&=P}=`=90)V{?K9v>0N$k=Zl*hhXz>60EW)8W_`f$(ix0vQ+8%`rA@wQ6V0SQ`9r z2CKNsyh(KA?-w6z=BiM~DWE>vOSfpKRb5h6Q;Ip9bw(8+#~bW9!>b#KGgbnB%M?EP z=fZPy|vtv3t&0qMh zxDH=LC~-dcoi>&HBiFGe(WVb}44e91?J;$g25%eqn&^WYw$s{yH{($6SVZyF_UcH? z1*#e;4$>t@T4oH&jYk31nFJpz!(rE8^|VzPHht5=Rr|h%CfOb)Gq&x}b`X z(OWT7*WQGg63TEGcb-EY{i<$j^VyqNr)X@}o?~&ZE^z@#!xIyildT``VWeWI>NGf= zPWT*oI?0_&M#IxvndPh@n z18?rV=z=%*4wp7jlhqv|d)1SVE7=Sk*S=9PzPxIpUvWG?6uUHw1SF9_B8IP_JN+h%vf3T&$ z<7Y@E>eD#pb%Lh=igWEFf2Sl;k9?3?FYw{e`ZGKqj#XoA6r_z}A*r&2-KHRU^awVL zL4uhRh{)4t{ST}lW!Rb}bosN3A(T4c4~wapTs$I;S!d>oY(r+{Uru!tFSlBPWTPD@ z4f31e9-cDn?xW}lT1^Ya@I3|dX^)Hv8NCHfUFJ3=agw1E6~Bw!GQ3)Zlfk>rX@2f5 zHb~Df|19xhE>)8m=}aL7J_lsTAqA@S!EU<;DkYGSlh1A7xyO!8+a{X-a}U`%%8HpoV$*E#hpF|TSqL1QsENCW=U2!9J?2nJ( zGYqRoEI(LpmT8)GstfPJVowYDuDs*@pGn{-}?+56t_sL z((p?>3oRJ+g9?*$Jo)~)iQG8g&X%Z#UIDI1Vd30J@Byknopau zN)75rHLfWXvmOOe-481$Y^K0@w)v&|VH~IiMDcrG15my#X++{=&g4~RY$X}PYyHEY zz&aGj$em^7KJxvi?c17DpM*8$IoLoR()rop^x(w6b$z$?k`8YVfubEc<87W}-7732 z^DeyvN!YRy>sHBX21kbMehlw<(*yA52xR2sU~bvh8eC)@+wDiM!~OFde8h3xs?Xil z3G$0Yc64Z!qzOfU&vo(h@VO#jj|&qez5uKh9p^3E@? z0~4*Nst^8JnrVXU6i}0bBiltj^96R_*0qIAk%7HiM6Q3B9hjuKAvDDiyuRoH*)?E# z0&B2@-1{)xtLsR~*ph0RocpD9eE>In3C>S}PDAtMU&i7QG`Cc}O>A<;SK;ubluwi! zmvZa}F#m8PA+aV?qwD7E79rG|q-5;A+{C|``J=}kWqZfEIz(N=+XiI=_P$j2=X&4O zNgfN1fppEXh~(KeX@|oPN(n$EXIwVFq7p;Bc+XQ9x1gEUiU)f8DRy*)6N3dO#^FU& z32Ni=6?&^9E%n-5HLuR6K($BEjX`}je+_%_Y8e@Q{U{ErM-Ogq&V3E%x9!Ch&#XYx z`BkuQ%>}>{xE*~A1_N0B65O&pH-}mto$;y-^@^l6lhnneEiK+HktkHFNSg$Yk(2vC zhvNDMH9z4+TH=Q{9y7Ia(aabl5^33C3?jLSJp4@<4`DNT?Cww4nwLC|qYEfIW^uCM ze{Po)sMXhW z+xW4d6(y92t=ab^&g)}p(@elERb(BuX<5oTYf6yZcQ9CCGkL7$W}B~l2ksz#E9~HS zb|Vf{SQqyGN9RYo|3)p80%_LA`c~4cSAWFz2i{7a{Q*0&)(38*_V51@P1p7u8(gt; zwJ4X7OUfm$HE3~{s(K08^J8}FF0l+$il_O=1doxiTl@C4`}F;QwUfX7h(&#S1Tv5) zRHayU#NxpN4cmZR71|~8uGf}=((&-Wh?kHvk8NCb9U}P4&~ytLD5Xha2$CavNt@<% z`@273N4Kv12)VNh#ERGd_~3qW`7`W#yhwLH1E(x^41|*HB0ZL929%50P%Tj`Iz7P( z`S7#s1i9v??C7Xaw4BQQEbE&JROJ#gTq*up8ZG$>Do4DciX^8kvBFG<|KQaZ zVa!&G$f@%l!!HBi^8Lw+)PW_?TVB1#$@ELu$OW>NPVYGa3je=K%Zm#pZO{ zoEUT(tq-{GW!$m_B68w6x!}U}_tBy=q0{9Wikv?mFzZ+u|GqE&8iQUfA}4p?sNbRw z(f)=;law-z%nt~UoKxCsDT74;`ViO}K{Gk^g{N8h5;nU_`IXTQV85Xf38uxzyck2hLdR*aS> zWl1I^WqZ1imy}!uANW*X$NMe3hC`r0Mv9uBE%T1}en&0U|FJ_84Mbfj)jvw)BDDyS zSDN}^fT4Pw-8a6bkc9Sn{{_|p>vHoy*Cn$5kc&eTc9AiMJaD9z0S3e?z<2-9T9<1* zLQZ}=(vBTn_Q!SC<=uZoPV|$kJ5ranB*gyvF^Dy*wM{v zJVLJjOYK}f(DUdU>(0Tpzah|LJ2nj4L@_<%y470U*7xWCwzj^vr{lqYAjD(q=>1_& zN8iT=*@1@0)^*-6ia@^5CBv;FxCAQdHd~TFsg@P)77@3m!X0Y9EaEu0KbI&)H}C$O zlPkj&8FB=pDK%HAT4Kc6#qAprG?No2Uj=pV>rYNKztP3DZv2$Un!oXj=gs+otl+g8 zJUXCW{UEZYhq?y_xUms|j2yWOxiW}>Y-1y;bMV01mpWG7CYg<>w2aJctJ!8UDw&Nqy11=G-Gi4Ah=?fl?Y-oI z-%oFEk{%9@8RsG;<>oJhPF+A(l{CcOnmnqSQ_U&);q-67aD*~)e6#wpW^x04rQlN6 zilNKSTG(kx0hK@ek;J?n!6g`i3E~^(Mn(iOKDg8}m=6wf@L1l|(IX!=_nqttZ5SB% z!r;3^?=Ol)TbttDeSQ(SWsDmdHOfQtUW3wI(2H|EHm)Qe8N-Jcv=UL>cUg0C69*gY zSfaGgZNEy*5K7Bpku;OggbJ1jNYLr>xqJfCR9P(}M?PV0Rg;}+erSTeqH_s1+V(W% zluCzPlD0>ja+%*8DFXV1lL-0s6f{^MBV#ec-eZU5Q%&=Bs)Ft%96Q@yu#7<*(lI7o z+OCq$SnVMxKb*`sW?LwOL-oqbnoo>#2nM;AD6=;2Nt<)n<`Rs{mt^Z|Q&L+3XBZvI zrfuBjQK5_+c^;KVFR!b&HRraWqaDtrejLg9B~=Wot$u$vWzNNnGcmJ_j%DBQ>Q=I6 z!{6b^KVq6{zP_15$W^(7176#wstL^I8jN{1T8h@$>U637HecO=$rZ@Ro?A_a$gU?p zb$~cNpxI7ZNo41p!R_23Tk64xG%b&dB0eWAl^N}{rEW;X?Km>fH>;k(Z601NB4c0t z2pSd-iaYjkV-tEH!t}_(hUKS7E}TaJ9048btA1{Rd~Y8& zvSqC&$P3S=4iWJ=+s?p2UC7-#Ca_Mt znJ37B+RbFG-EuD79 zv}MMxh#;ViYrwuyVKZ^=y>K6K+;VUmslB{lAsC$ElhToX8S#Mb3(@JVi%Y3e)jnJvtOzxAQ8-a+N@`9Ql6`3cR zT`1>AXLtz1;cdOsCvMbbfL?(}gz@RXng16!9iKb^Ya|e%zRWmMVRiCt&2ul|9HOzP zG+z#YXof9@6yi8L9pc~Q1DA4}Mg%f)HQPf54sknn z2A1F)XnSu2%Ll7UduW|i#e0k&I)uS&3U+jfMZrN|-~GcE^>hy0*!wfEdGBl~!uX0J zWLaZgCn=R}UURI7+)@=0nb5bOna`N{{*I$P&1*~?;uqW!t^sWwu$a_AMw+wEgd-K_ z>~tOl+v&Xj#*CL1$iTkc)h=RVw%{a!4QU(t;Wwn3wjxn6@{(-UW-?i|6$Oe>KnfFST*IvENOsbjYyt$p)iKrDLwBIH8?I9xD1v=(sJTZxTHw zi6M98qwBo?}!DrwypJ2CtfEyy)khHVy&()gqd_eGd7@r<{}I ze{9^}`Ed<#7?*nq#O&?)lLYI!IHP0~)ogiwUSa3^yVQXG1R{Rh`~D6`H@W7M7fm)l zY@lP~mL^x0k}+SBha^609&oQ2X#f?QG%yds*1JM)JDWVf*ru9)(BMGWjv+NVP+8@o z!TFwjqDJpu`@YxZfZp|mah7*2?Z#+%3uLG#vlVG96H1w9Lt^uMhD`eKCxp%9#2Z)c zC-1(&I^KMz4+n=Gt|d?oxBJLPSW^Kx>u^SDRk})ozVR0F87IE1K!l=4l6G+rguAvh zhg|eHr>92wHK!_$cldM^TsNAukU@}A)uZ~oFvPgIVj9q6KM!aPY0Bb}M|H8N@hh@7M?-8LG6pN@~l>vZ+*>iOy#VfjF%vgr07{ z0zC;tWbB>&2;oK$3O;oOclok{?eFMY=>4>4fA`Ni|3189P&MG8m&H*;id{?lFk)W8 z^pc!nS`un72_-_W|ST96kQpPM%mwYM- zXMmftb@&Q~xZx3jjQ4M%Fu+vvp%4d%K|B^Oq!@XaNieDDLa4POw-9jzZz>S+D-v#a@2tAI{^pwn^MEyj>(7 zJlOp|1EH>wz8ia=ph__bt8;kiLTsfQTJNtjBkxdFEm@p3hXpa>7~$TI>+X&UH##Da z5zR}uySED3Tw9^{!Qhf)#S>9BSEj*g6DaHJ^V?k@N7Q7^GK17N3p~} zOLeU^m9au+eQ3i^Tw-K}mWr>3xBwyxou>KGGVO}yg#G+3=xW5r}k)^#dpLY}6t zwsn`3k;zY|q!v6yMAcC_ah!AhVDonkx`y1PIafxapD8lg@O-0IAbXC&T3qvXXx8kt z_-X<)Oa-ByJguU|(M+WiD>;Oxh4;s${dLb+`ZaM}RFQCKQMK7e5&_nb~UIdBs<0;teh zkNm6L^W|$)|DLm!9g4U@g3|+aJJVXg=>TchYf!k=ASGYA88_Rtr9^b!vE_99Te$Uz zd)|KwcklY&d-Ix~x_y6Ayn_Q!DD6ZkQ-DYt0FeT-3OpwwGnN{^#=rayZe(JeN02d@ zSTFjuJOvxb)NR~G+{sZ&7|=&>sDR}F@KTg?MKRU}U2v0UsU@dnHm&_Ao$lpZ{)XFe z%ZGCsxAFjx)s!^@bz9LZ_+J>>Wx^B_+GNHh?qf6~!3Q5^lW;QST*iU~tFI!(!%xYXbYmo4u{O z6pUh((Gon?GJ|bRWZuVtM#==v8I-O8mk2x$pp8LMW2{LjHKG&bi|^xx$JcxWb*&!# z_fs-*52gf#$>G+ZX!{K6$fHQB-T=&awq<1}h~pk^2+Mt~N67Je60IogIpmRh)?JH} zAK+-%aono&t(POCyjUf_LNkj-CUE zf+S9D!KF)9Hr6>))Fx%Zx|qjfDFrwa+5I52uz4ItP#_}5uQwxY>&EjoHYe}pXz_w2 z<;u2d@j4_Wt->PCmkMC>g^T`SZtEFRu|jLqY{o$@ivZ=JgL`lwyA0cA z;ZxjByqjueua9aOLxh=C)UD-;#w9I8>1<7qM?ZzbgFr^^$Sxfsm%kGgBX)fn+w<6* zG#&+6bk-(!uu&OERmsht!61aqWb7?x$*gGO<2J1eq!H-^hXtMeF`#G1Wj|H0^s^)!^4DWVdP8<(#gQEf^ z;q?cFFjNXDbDAqo@K_VN1kbI1k-K7awNkWIhdjH;jSjCCwe)2(ie63jDbO#pCsH>n=6QshnQq zPViVuKbv=4AVw{j&p*Ps#%dkIXAY)%f8Vov;O@R}c3DN_F5B?_&s9tQL_IW4E_qUS0nQr`M?0>WLefsJ1aZlaI>h z>qPQnxIijj!xd8?B1eXQ*9NdW^EG0lvy?U=Qnu+i|edF7>tgaRj zO#+2eXo#~p@+5~s%G}aFQExLIWgd0-DvDT6l8>VNN^3%_-{3Y4uNJk+ue1(Ny!g$KhhwAzwO( zcj0eUHCx1?m{S>|MyDmHongpL-$7(+bt@UWHCf5nY#vRV8Uw^MpMq@_$cXcqTKnqq;8XO*o$TmRBhUYq;R{8{o*~r1 zCLvqJN7d&qJ8xu{C_0VL2d>S;r;`DvdLBeM#Sk1ut=AoY2I{j~M4d)^$?gfoRI~C7 z^}jln^w>{$9boF^hMOsR7KHX+=)$`CLfsCAb2ZNm67cWMR{`2ts0fDge zPnek`W=x5tZb?MuEvr2mb!+$CObkCpWKk$1&Ra|en;-cxKN#!EU>ep$GB5L|9Ii@3 z))!A*& zVL(C|kv#s9bI3K1!>9l1b2Q3rUoxU2ex1%&(|QxQwDXm!(N*;3Tk8bAO*SJoe4)>vLP1DcNP1{qO z=oq|WSUhlB@Bc%!&#|scL<#CM0pjIG$C7(x_JXmB-Xl?lot}_>I-wF%6SJ8dJqbse zKtzt;^%^voX8em&&WYxqPEr%4ua|6TM&@#9XBAqWEt{;=QZ?^h#$*#Rk@o%^*=}Mv4H-4qedrSqL%v!0<8|GBu zM2aDuFXPZ7Y=(uqunnuKyi6^wZHdC)GA&QkTvh4_`B_&yRbyF;qP=Fn{9Amx)gp2{ z1m>1j=xqCc^O|j28A)1Ro;5KbqB1G6=~7+a-Z`#(70W~*LqYJ*wd{W{Dt^hwn~%Io zwfjcf61y@cZM-oZ=8|f6Lurv4oUL={qbYu2(k|M;F8T47c#9>Ev-5^}-XWQel!`8-Tfr)BCFlJS zhpg2ia>{7OAG$|2*}VCWeBh8`xp<%bY)MmBGbx*KK4VTq!M#H?uj4Q+Xy#*&)MwxP z(CgS}5D1+?7raBXQFS4ICTIHLxL^l)bccPtbc@NIc2vz>>rl0I z7bBO6Pru{|9&4Simh&xk*;9+-L=QQW%Ny=;|FfGHM`EVyHR`4RSRaNPFqzO$%b=&9Hv?m zxNw$zctjwhhp7w6qdgOwnm<3wj#BcjB?=DY?UPvJkvW-6BCeLHY^sJG(Xu^I|My&A z-#j9aA@I`=t6&=FZX#^6r5z9-zsOF**AySh8%+sHSk$CWLo$-IF)0Q{o^F4So@Ymx zc(n-knX69=Cy}$xx3^>B+6(Nvw_BD%)O5At52*0r31<8{YdGgXT?-<@*%Qel=u;>; zbpY9MuYK9It+}+9f2a0i?gTP&vak5h`0zM! zpS%33rSs4$yF@{){Kj20p@@O3WNB0qrrDCw*)r2$T3X#qiam$;@GN=sBKtqu$q5(R z_ilQtXtamEf;j?9)ems9XWf zu-Yegs^zC6z6B4V==QJLcNVSOj->g7!Q+@`Y>J}8>n@~xK{;=4zpAj~>a|)%?$ph; zf4fU*ho3CGM4_SlvU5nRGqX}A5HJ*#dUH0;kegL@AiV|6$desln|*3K*fw&)3K}GH z06!5nljGm^nt_xb>S?}u0LyL1HA^vQV11h%=RakA8SAh%SNolNX9TJWY`Xhm`OI}x)ygb@#ROteks?!@4`s_~0v+D4~$%|}*B z%%jq}ZQUuDWHAMTRkyq%pJ$;00$FQCF7J?b?2x4nQEAvX@b1A}-&cEI=`!|AQJ;Mf z_kG6_g-h~wmQ|*5Wr=~2l-U%QtmdPwLlE+3u-6G>#xEpN%rrY&HHyT!2tlwx~l zN|pWYSfO5%n;3f|=TGvpP;kTiuNIM$H|X2x`A@s;$c^TffVpgMB8I$8tdQyqoVy&b z%x6IQ*g7zN$Y~!#iSJc1o+5x!0zKri%jX50ao7$fJ@3-&3jds|Y~^gKfYn(`hQk&IUH#+ao+~gF zLdl)ac@H(;xPtB?p<;NhBoS-O4%Dwqm!onLy$Xg$&`c!NBdt`ZNpf)Orc1~jUzAMo zj<1tfW1EY1h@xGpfm^|;^x)vtIA{$}--4~BI&&+k6I0e%gUnIS28uyxh^^zS8o>y! z&fCXEg)(yDT5S5)SG3!kkLIB})ag|D=Vy25q^Mw5vz5J0_iRNS=6iZq7CjjRGP0+C z#mAGiUq(+{Z$U@=iAx`kiL(-W)Szl4xf)YekWkq^zDJBg;*!%j1cc8aHFX#{@_RA7 z--qb;bS_oVDSznVB;ssB5|$@tQS;2AP2xC+_uL~_ish$Y6?DSqNYOjmO1z%}6%_5% zu~b``ypS&!j!No@;GN^1gq|?b8PT=zjWG(Clzy#Zy`2_98wKTu-!dyP2H!!mK zf?mPJEpY`uHquO^8-WZSjhlF4s>zI9Cz`S?)%(tGFBp@el#k0eW7=C$xb6Hy1DAN$fL;*@~H|tEDU(2e=ULvTt~GD~~ID;6`K-e?5W) zyD$J+ybp?E9V5RUdAjr9$QMVBkK8&^6vajYBbt$OM>Y-rb@;{MCx@4Y-#`4e;q0(? z_~7u~;o;7q&c6=*ap;#rk9U54=mF8|L+>5BVJI`?9=c@ctf9fd{~LU6@Ee1l9XvYt z*1^~yJ18IAIoPxD)r~*t+`I9Sji1-t}_V_qv*0AL_cLYqrbRb$QphqF;!)Ju zf4Tj<)i5h{%{VH+ADhhSsOTEL9p&P5l6hG)>u^fkWo7bwzMiV3lquRInFXzO+EmjQ zeQKqRFArz&8q_t3UoztjR_nG%B<7d#9l0xWdPb57`SXsNUuq8f`GR;BzuDnn)D0$_ za5j7aquSU0!%kIrMq+d&Kz&v(sKhbf6?{KAvzuXR;li9O$H^Cp3NTIbf{fB?WP*03 ztKmSc(yYY$KE6FvEdc$cQEGigw!(#z-e{}hmu0q=tHkBXdQq=adCY0=nS3)6WM;hK z*`St5)~oW6=L>uzAYIf%|d3ACJMA zVv>eX+*#I$OBwegd~-H5S96-OZmA*R(*+dn0N-44&e~$uoZC>D3#;O?^KR#xi$O~; zFO_NjKVxqmAXio8kEhbphNMdz<%ZKG3 zSb`KABu6&N`8j(VPvtt1l#xkBO|g+19iJmi;hpfEN9o1Y(%yh zF#D2G1Eq_(ACt3dyV_cyRP*p|x=>@RaVdMT9rfT=SF#?h&3f9UaL)6xl)vaQ;R%yZ zUH5p59tUxSS;}9iP#w%3(i&4nbzWnlh9x#?TOp*^l^wc#&QJU;5xp@;QgNS~nAC%IAf~nD%bhBjs`#DR7*WyciCy29J`1eh zE<)psRk|)V993&~AC%KG>L_8=<*MZ>?K0x@@NVh5`9P4<6uhYfUx8BucJ7p%olBZ= z+@fzMWBPy}K;#Cd24=+1dXlNwEZ#1t%l1GhchOJf>>fIW6GYx$bNVnosM+(1obJF_ zoaK34u&Cu|18#guPG?eWqEKcW`V!_Ys9u zG8spVs&Z6jmR>m`=QrpIm?e}pQbuFf9ZflPa(-Tb~% zvIFNdvF4xpG~l*$yGW4Ede=->qE*5w)2`am1)^5Am=g7Dem0i#;dY7Q7h<~sC#|Kg zHGN&mXpRr8l9Z=YZhtowNT#~!mNt>0r=_x_BY6u>wg`Kp+${m` zp-DN@u?t#qcGeWcaHGa2lwu;mGK-1nu>PgErUv7At4Uw5w|%zEW{KX@mNKjTm|l|> z;#9hWs}lp~NQzR1Km(dAO2t}X#?j2{u9MP}9SXzAhF}L^9m?L;u6k2W&oNcPl59AG zZr%}T;OCu?)6>8!IcrKA+<4ih&W4Heu*e;gx<#atp)FZyz+8F~K{8k#mHG`bdNwh?k@nR7x?exc@5<3bvXR1F?i%1sVS zyt+1_tc{Xh7iNv-3qmI4-YRD=mT1yD8>rOn5p}a}%UyOv67XH#MwC+driWp4HG#H$ zT260jj3mJrvVtR1Y|ydsyqum(HwiOu=QH`VxlCs)Gg3S7UY0d>(;hnR@UdKi=-1a^ z;~A@y&_#-=yglA-&NehF{~_zqguHmg;5W8do5xRTsPIBMOIX@XORMIN3Yz4l200z~ z#<5JgP$IiPg@>gl4@lpQRoix)A&hh@=MKeV){K-rX0+rzh&b|QrfZpXkWRnG7l||fDXRyN zXe<*}8|sZvnKv-g5?in>45uSJ+ce}g##D)}5eC1MKOD_j$O56aSn3Vh=t-@6R4Pt5 zVoZ`IT{9cP^xbf4_eMF{UG%axF2zT5QLQF@?(Ba{YCCSmtYlmZ#2>pa_f0njk!_6YNn`DOPO*lK0YF^vmsht z!>Y}gx|8!c>lI;lNzOm3R#z~K)1}wMHT86pp&yq7!H$r_I16tRTs&!Pr`O1*-(a25 zVcDuL-0tWS6$i09D(8>uj5q}R#n^^`X(G&SiTc_WWXpMs4)H`?hY3t9L%%K6E9lHq zZmXj(>m@Y7tcF?tMOlv_O5r*Je&B}4x(Y=emeKkW(5#%j7ER$UuRHDZxa}+|~$`l{bs z$D>@QluA+R2ElK;^NvU;7dfzf44xm@6#L?tsOZvz;z3TZ3&B{mWyA1Gw;zD^sa|zB(2)0VI z9;^Allj#C^MsUGgim)?2HQ{gY1v93X?-)AZrc+E9Du3u2QE7@Wc9`X9K$LdN80XWPrB}vDy7#pub-a zhDc~A5i~_=D2p9dP7-s#fX-ozO)pv1(B>8xnG`Z~&UxTm2JqDzd!3e89(oQSU}P@> zPlhpsaKK=)@TF9i4QoX^(K^(=0p6DsGVmn0u^()_5uJVY-b>KpX$mt>X0 zYq}!t^i>0S8>b6t`>j5OUTcHVYOx4Cz(SGwvGmRk6lp?Y^9G2xqoW&_xknD7iPt0h zk@H5+>Pf}$k;fRi;YQEIxI)$+TD=#q-FUMK`QGcfYBCeHh6$Y4dMjRUr0n);(Btog zCoE+$kOS=mKZl3j=ecSFxC{VWG4O2xBczBxW(2ZCa3MhZ?}cunZuX3?TOtRlT;wC( zjUA}}OyM~7OaUB*MmvQ4056wFZw5TABG02Z7S^F}zu&WNJ-$Q^bkv{%GySud?MC}< zIpZV6p*C4}e~QQhtD_B>-bS#Ng;*uyLVa54t}42a4R`Dwx9nv~4wu3J5mQ%mMJ9og;H zGgf@#KYI>ub{sYXOsRyPq%_I*jrA}7Gt3aBB=)5v$sW65#tDwbABJ}t?=qEl?A(Ei zSG+ya9{%Lek48PBvHcQQ{UUP!J|jcpDu+>jbOBq|J)ZG*3^54^=ec`e9&d5X0s7p{ znf?me%-M|`tMSC0fm~1zKyL6ZJ%v7XH%ytuA`!<;bT`8{_EvnXZ*ra!;dCS$d#-EL zvN*>C(g8tNC=!CC=7%4Jx+-Ky^}~a^(TgGoJ$V-_cw60bB65ths+7BFu1PTERwC#( zYW#Fg)Uyr+?}XJrAw#i0UcD3jU4)f>^iB@|q?0C7IE!m2I5O691d*Yn-=2R6eyfn7 zW9xRwevPkh@owyW@DMc1q|a_N)G!AgYpA2;kglGT6#VTlJP|FH9XdL+`xLbQRYH{5Dd=& z_=r4$@;bOuv1G*1vE;)JuNL0Y;f?mokHIWeh|tj=I`;Rreo@>oxj7MdL|SsoO;b)o zmeU!UjrrqlzTflf(B<<`SA`6nu-f_$OoIr3#ix7s&qIwjb8`TUAuBVr>c$vB31J^* zqWLgHc(d!!FF)^@8dpld%?aE)I_4F9|2@kW#J2O!ty>t7%_`>2;xRlIca|GAyG<)i z@qalA15zPFv3Y72%H0VtSbsd~0dT`&Rp66&Qyn3yj$k+F#-;8{KLX=mu?)Tb&9is+ z0FwL~c*vPMg*XDldxVy-tGimQ$IRJ*1F$~;*7cxK6f%(mQ1*wc_2B7qb8v1gy!Nf^ zd*K*0jHB%YKrk&6wHrHP?`%N#e91FDwpfDBsSQ)T*T3Z9Rg+z7w*^xXkh@ZXH*faK zqqzAM__jiZPTaj=C-VGeY)Aw{UyH8!x7ka9nb`BE5pO>b2jXPkgC=fw?>~FlGKg$t zPeryaIc$FXwRaAi-cj|r;?DLB4*;Zk4}**42ll|aGi4B(&RB;iMM*5!syVXV7|K5G z*)gt2MygN0e$t1*_cicg_}e!;0ElW7xzGgwMdpBh8vN0~y$)~&+i2Sp@Q}Z>6sZP| zy(`RKe~0uf>=Ys|9WaCg$tY~a!08Jg1MpGcsCx>Q$EUvOnV51fl?6@!vp^#ErE4b9 z<=^t0DNOOuxB5GUcVVYk+@1Z7hRyQZo{1$pdi!&`Zh*j?r#z8qaMA)tNPxT%V}#QX zFAVt37GQmP0andNp7N}pS~A1`je-;*r#UgZU z63{3B3SwjLj%P(Jo;eYhMY<;lp?o4x3U|wuw7C$+AmmSU=lQ@hP$Gp0=r%ud0rEtg z>wCX>M)Z;J&YeR2savap2BT6~((Y+Bu~L7z0~Ex?$tX5uIl1kL0RD;RVB>-<2Ow-@ zKt{#%gIS4w23w9Ixj!o<4~5a6i%w!8%w47ln?YR*M^idS0T*ZD26XH5a1c?-BoOLX zpNEZPi+yfAv_z_Z5Xl0?SHo#5#JL(978l+AY3cc&cqZ2@67|~Qg0&l#$t{LGJP#Th6B@KTp>f}q~Hty;2s+h`=)9|@7phUE>o=oA1=|G zZ~3b$zBUpax_9_Js!{PZ^?%Taid!@3cM0Ykrb%*m(pz+~jU+l>#qAnbB%@=(Su)VX zy($iHc3W)I5Ke0Yg3G2Q(;6)r9DrXbQqeP&As8l^0~>p-0nV=49G**^+NWDZA{(P) z0YlRpt^nvvb-;{Zv0`gK{E4e3l5UEbTfl8dS)=|aN{07vae&}9m_(%@Pksz9F|=Elbr zGIVUqEtmIJuM&Tj>+sqPmT`q^WT@qIvH~jK&Q7CSN4SXzr3_)KHeJ^H%?RfPPrkWR zo_rx9r}n9}rgl(Jdl?~x{G-r_ic}Fm#NGSJD94GBba;nwu+4U?1P~!=3TemS2Z~hm zj4BM?dt=a6XsE0+Z#fK(p|Y=?t)tU;ux8F;5)vk794HST|1Y@2FHS}W2SNbZ-RFdT z=$GOy=RXYWGO`NVM(}Y63$9u#xk$$sf&rwBA64DGI^`?{g=4S{nE2$L%|JP z(SW}IB=UeXDB|6Tw8w3+6w`=&*)uWujvVN#x4-XQ2@AwsZu^xd7j}^V!Ig!3AcVC8 z0yspX0u3}SZy(?KmAHK@l|kG-Aow(J(KOok>oYFvhkgyqy46850X)tHLPB0pr@-|H z8UVJoSKz3ikcs|BCs72kSNr~Y`J7t}zcm7pyN`zJ)ZlyOc3+d9zS0is!>vxLW6 zzK}DjcU$W5{yAbhiPM_X+gzCq-SMy4-4F*4o3#F~u&Yd}eFZj6(w(|7Un;7Lj-)j0 z9{!tWVnQiH$F5&{S#Q;w9$4zwGL_=+LZm}PQ}t-70&OYURBm|-b|8fescyRvcAzH) zH}-z@mIsKp6%#_5ED&4zHrVDAvi@X|zyasqhAnvY{|BDO7Y*IH%(>z%al<0Tbtt~D z4mrE&6oF~2bj#7AY}tAWZ5w2#56!X@;|dYF zF8nZ@_*bx3Ps8EVsDtPi2tNVjQEgJ1YKWa!zf=~mA>ITqA|eLpWh>b;1*IHX$%$MhysHe&3ED%i7AjPl1DmKhcj4c+SNn3p9Nn_Rs8{PnjJs8k$16jRjdJ-!g0k|0x zx_^Y-1y_}&g#Wjz%7K$D;qHQ^5J-95p+FZPXVegEBrfFreF9GBqwM6=k~z@9$Nm7; zym{>|^wm-JOkUR;*RY>B!(`a5!Abh`Nu`_@J=OR6Xd&ZlU~K1TRAmBgphs5x6^`oY zIQ#Hr;zD*pT*v_9O*HO6fXbVg$v6F?x)=yl62u3TQVPL z77#zl?iyF5B2|Offo?wrp({U{6g7nB_AH#Z{2o);nc?z{RJLmOG&AVZb?nZu#i>a3 zQ;2v6M6s>CqwCoIiU`Ovvh@Z_MblQCi#sy#E*Ok~N$ibjD1#zdw1#2m^?UY=^->#H zFwa=#M5ww%e=Uo^5ix}8BCbrXZ56zBK!p%b4=-NA-+Mo_1-`71Nv8DA+yJZbueY!eY!#XV2rSuvv3PR8ywPogR$QFgpEBYz z!8Pg2|xJxBmKV9rS~9SzxhVO4>WJV>2vdckN);Zs`q|4UP=mN zmDf1Y<-5-~JJD{Kor)m^Bh7yP8Ae*~$obZrAV~27HVk~w-Yi5r0#Y*vD-!f_H=RM) z%_Hm3=PqEUr& zC3B#o%YP;t3XWZL#@cS0VL!3tpq}2Qp>gtbin%4mw+v7{cQNZ-d%?0XVl*@I!0=;3 zKV0$qfmNytMC<5U721ojYbK+Hu-{3zqh+gFU2EFQ054z%L*xOBT{o_fp%Xgo{@yW6 zoVu|&09ujbjtnt(yoOsec$zOq%*7CmE+E*Q6Ut;H^06Tgzh`Cda|Em)lTpf-X_DST zx0E)8>k(jc9i!lP%4BrhdY7wrI|Z|Rt1zdA&%UQ0?&P$#f-%feGN_H530&Bc=nphZ zj>XC7_KUvn?$tCbuqjdS@@6MI7)`XCxu!**LqB2IT@%V=IPnAZQ&h`ZRa=a6dtsf8 z^;f7cxV_Z~t;-c;^AT6LAoeqW3NB6+*V&zi^{ZC&wq44?5h+bktpcG1t6wZw_c0kj zOAz<$d-t)E6G|C+=CNY`T(+Y3>OL0EdbYWXpthO**VX14>Bm?;UDi8NbPmuP;A%95 zQkTOjrI7W}8+s32&R(fn>t43ZJ(d~WI5NBZlf$nJp%rh7Cng|*@*jqP4f*D#=;xDT z;D`Emj)C3-N3;Mo^pKJ5-~Or#I#@1OP2=sX&e8VJT^EEf95urj?a0JDReD3{+2jz(Z`^P2#8K3))YOzmbcoWf7rd(V&?O}1zUdeC&n zDfPCgf6}QhoOJTwbW52tfhb$BCmObl_&I=&UYrWhKq8s@-BvaXXm`;}M8wS#!Fwzw z5*{qoQ8=7Qb=_`b$ETOhg0Sy)-z}mH-Dqc5ZG@ExUjG6_)X#O@*=zPZ+D}KFzPqwJ;0ge>i3izhP1e1-0x=BPA!=Q9p!(#`+o^aKXjO7ht^)X zY;4Ei#!=gVb|g1^Wav+-E5)VCph8!3uvBRsPS!ybllCC((HA&3g^ng!;2C3pjq)^j zEJZd{_HDf!y*RmlMeh$BoP5Acq=AErWF`uw$Uuw?I(UnzCJ1(3gC5Aj^aQM|$#I1Y z-7z`WM_Ak3`*c8@ozXdJ;Yz3+;r-D+g$h2H=1Lhl`tPp&==)FXTG{)Nj|JlZ-7`tY!E+1u zq!OgH;4_dS0SlHP$5Fc_RU__ z`|(w<^}xxM1Pu~5pklQ42XcQXu0Ww{*m31(M#mn$;ELY-H7o}fFf}!frr3}MxvynM z&oH>QU;Ldoi zUG@c>;2SDVqFocpM`^;ehH#k~?)z6p)q{(OwNJ+sp!v#jKEF2S;mZIa2?Q){?b7!pO z!5q|5F$zzPP+R^CBUHY{ZY{zs7O*ejeJP#=Ukni(6_~xuV3IRQ^}VmiuA5pi2Rc5o z{!AEffVv?qaKMsruBtv@89p}jyTP+Y{$(^Rvt)SYMC2~%orKfkoX+nFw|D@Pq#E)5 zE{ML-g|aI|=vd|cD|$PwWBa~TB9569|B115q{Me=yT=z!>moTx!|QE!a%`~(sb2nE zKmK!5kL|Exh~AtIRt>2fB{~G|>5)!7(PbH1B-Jknz*yDbSfG#r$HEox+M?2K>iww3 zdQ=nX1Q{*hIc*?RDL2hz86D$cw3r+4Q-uf}ebz5SyM3wwKb`FO{jLP2%lUvl*X(w- zVT79Dx0_q=TZIhXiCzIfh7-C?z3W@Bly1^P6G(6Mgx?v05P+~Ts_(}194#sNc!gaz zwpfIY-g0q2Eb!4PG~;G^PDHkomQ7rz^R~-e(UWb339k(uF|+Ftx*k+4mH;@%p546{ zuNOL&@xpB0QcM@-Ju^35W}Ay91yoY2=4@& zfpOuco;4eaK~JOWE@hhaR3d?Nx52`D>p|$)#Ucrf3a;y$dcQp=9@w38BF35I2V*o7 z8J;w`aAPY`?H1yIP?v=k9=nBIJE4>z-TN*%AF1!+*7x$aKof6vfEsC(rAREpVR#@) zMH85jslZ+(s!87j9i@<=SOB0F`WRl{zKJ!dHd`08giOhr0k3qcoCU|+;VL6(dEo=> zx(THWP5$-lJrb$d{(oY@4be4chu)I>Y2dx2ku~eoS$|m9^1-y}m*&!&p)?8+I(XZ^ z17EG}xedL0Zk9&92uvo8`dG4LDw1)Xza}_ynrH&{6xiIhYt=Y)dIYU98{qI~_K3KG z)4jDH66Yg3Cql1DI{nRzpe2oNO@Zv_*=_*cpM|^hEw{oBr4WgP^fEZzOSg(ei_QTQ zoNQ((H3V$~b6CrjMkQkwjEva*yC#&$NVUoayWDNC%T4;1E&q2o|DR;4_V+=+FWd4y zFIur+WLW&HCO^2n_jY#42RGT!aOFo>c8mA$4GT&Z4?k&SPNNq-0#?JtqW;K~wLJ1K zV6Jdw!DI@61n!Uxb9Dir+G3)>QLQVzo9#OUhw7!XAl2^C|D8u^Yzwy%-F=u{y&;;7 zgZUH|^^mOtjDk7foG!Ssdh{P3WjF57K-~SQL*&v~k;-@1Nx-44mw?*aKFY2FwF1Cj z1IC0ALP@h6(91^Dz>5tBH+Z-F{$X|yeeV$Q+Tdycw+jL+ zG;IJ<=(_#DQERc`(j@-^WLdvd7Ifm1W;eRN*dkaw`*tf;kGr;|hhQN~&M&X9@zya*EmsQVFdC{bB z%ex{(FYJ>yE*pMwaM#dZR5y+m2fQQqj2TYiExYGD3)@_`Y$tL?x>RiPOpJ4Y3+(q` z{n_;`nDGh`dS+u0Hkp0E_VR&m!L)+eDdO@;TLl;%UDZ4v#W*g&@H+537S&w$bx@-a ziLf)UU5fsEFMM6vbVUFrz8q8An}sT_1Y?F?c0 zmZxiHg@o0Y77H?k9y$j18l?=yEL~VtpCqSx!(W5O0oOSZbx>;Kh9gkW5r%Y@6})Db z1^fc~jm$j(tGrT%xZQhY=)t2;z-F;kJLdyMw!R&N3E}l57K_FUhJd*$fG030+BL37 zMhB->?mFqUxW0G!h1@9M*M6TpTlN@CF9TH4bwjTV=*KP|y?W%<;V+82Eek%U!8s8c z?>+qoxTY!?XNraoy+U0t=02F6y#vqTaBTyI7Z0oBLM*pnqJP zj8xQq7@R*ifAG=YvSC2moD-1(rLn0~YnpAm+x4}g>OhsM2vR}*>lGMK3K`G|z!>in zBN=}Kd+b)%+?AlG(r!ms#@M!-TyxO{rSVFJN#ornmrgg+Z9AJ0mF^l>B%`B`T`0Lh_Fg>Bt^)}F@!@mP z#+TUbFk<_#ijtkohfxG(Gx=PM*5`Eq$$G!Z(=V}W$JL8v=z-_&f|@?!*^HigiG5pA z_`6?%Lf0I)HON&~XS1CEQ3&|65L`$#?Q$RPdl{NeAwzfE__5QRKGDZtX8$f}{pzn4 zh8_fakfZ#_q2aF&{c-S;fq<$c1$&^v39xabu$YM>%6`FOXr+@uV-|hr1PnQ4GOFA} zxq4%NfRp27tfsNJF=N_pNV9w%Gw`VL2AENm$#8xAq^tMF8=@IiGZ%yUNr&8UlW`bu zb+B%Aa+zWzNr|lwr?@{t{S-3vz!4i9PM+~>=-s_pzyhn+UZB-t~+}l1s#rJtIk<{@+}wMO2Eq!jyT3N1ZLPM zIQod_TzS#WY8~3Yn_GdNp613xjIJf}!Rz_^W!IE_8@MyQ=pNd@fiYkyN3M0~%8lH* zr5w5Fp6qkFi4(!#!7|+yz$Fx1lDbfHV54?hTmbO334j-tmZGEEN7Z1IwO(^33&?e* z4AF0Y;Gb01*5Z?o8yS8@EEe zmELBOC)#$3(NL!Y!7H=%R4>Hf#5Z>~=UsazuzHTBMjje|V&&?Al34f5?Q}tQqtJD+iAp=W&x0N*Q{9I1gUp4-uPse?N}{#3_H? zuJ7QP1mg#W;)tfni^FVsJHu$H)2+J7Yzr_*8+za0$%*(^b2XTS(spNr{ioWpP%TTj zZsg$j)GyD|=Wvtb3K2T?{HFo+RRiGC7oW?)b(@|mL%k$ptWitHi&!V<2m(|_naG|R zns856$V9p~IAO|b<3#`nI9CEi5+GnX=<22*YTPb3dAr&q#L=(L=XQ=Ol9BGgU$}dz zJsd!AmTTT_mGsv*ZyWp=(-2nC9}+KK0A7Sj8AONt^9AT1$1m<5bQrKfglZNq5%DF| zC0DE!1<%&ceiTfH_g(~^iwc?KbpFEi>`t(V?&Y>`iOc~unrvMS23Ug{SNkk^cg_^m zC(-dbw;l!d!n{$4#GRr4v_IZ^bT0?|od^1B*~r<$GegV@^Kx$40rB0*vg4*Ani{_B z{RhsP*$LF`Ubuh3Yf2U_e10Iuf%^{-<#f^3V*p5hubLYLa@(b{fCE7Itm7|oufA~KSkcmeBQyui0c0Ec*+ z_znXTKGH!4?|>C)mgLsL1?-(!0EhORjWYFd|5|t%&5dlZ05Tq2uAQ%tN{ zzG(`LFD%}oN20|B0DvxlSQK58z-bfi(s1crk6imW!2Vk@hXh95534)2?~Kd#rpvg) zTRaFNZ)7eH#c-2H;x8^c!$_2${^zcMB`mva;L@=RhmQ`f8F{}dI~p2#Q9SBzq2M$LeGtTMlL|W>RM&(uXbF)Ha*|$mr8fwdO^c(6Kkx!AjQ9p9LJG9Nc%@b0RjJ zba8^GH2~sl(waa=NSDHVqQ3;44WTmR>CXv@Y)GxaujqZ%4eQyqn>=$O1e>&=X%k%^ zhn2$Fl&xd+7aO>!Zs&wD8F49adcX0(%QyFo5EUxkDX%+KMIz?Ry3=V-)|j>UVe5&BJvCh+=-nGQjmb$uygUcy9 z*9AS&6*r9~t6EIkP-C{1!4OGf{TdYw+{Cy-gpR(p91gB;LD@5)xw*zdm0Uqb zL5*85UAmL&CJ4K<%6-rYV@n|dz}9c=?DKV~|B2h!`<)Y-cp(IBG&FYM$W5xm(2E1i z@aG0c#Ze}Ppn2v_MM{_bti4)o){5PVJw+La!y#_!Y=Wjq`t%KXaW15~>7U@-tGi?) zI`Ra&0*FpI8OZo`BOH-lKEQ2;z~Ffm^t04OPTWg1{q1li$(gjYj}bqDt_VOsFP1=r z#D+dS!{*-o0S*xU=OJ=hZdzBj?b4FII^{M+lVMj-gKp+v!%`$8Ec7kd^F*?O@=6FT ze3OF)+3KDLOOreeLREFsg(WgEYc3O_%6vvF%sD_rLoPC=Dzl-mR{>y+p|SrNXz3ewrqeHTru<$Rc!2n;m?d591V!$(5BjQlY4$8w4Ah@ zl&v14FKVn+^o^j)XOl+!%MfP)M7@h8+yKN2mJfM=dm{s1+3K2ykX(5lt1CsiO*$O; zRLJXba`iNF6=6|QCQBEcK34zZMVP~IcASU6Pr3aIhL}r3wplD#2b_``m`FN#=m15s zWFF~L7XuB#hTebY#eU@GhZdTzoN+>|Bky)6#eY~J6niks?V3;~_sP>A&2iVLHm_PJ zL%FGoP(+{$k*sVrr3ql@`~;Lik&KRC5|@k^=<%;`L%jzQ96*4x^I}A=G?vWTb}>%I zoxu7@g^N5PwQEX%c2$T(T8GnOI-eB8w&mtmFI2~cI|ETXQEVkG#X!>O&7j#B6iJbc zj@}sGBVI+%>ir3j+#pVB9xi@zoH9|Yg$O)Ui^OZGOc1!y&|6999%V8**f{F~^xZey z>i}MpGoKttJC+UIyW&aJj^%$D+cZjyc!$AE@#4T}zxTw5SgFQUT@1s>yuZm4e%i(a zNHkG{Vk(kF-m1Py2`IZC1h4b=*TkjVH9rn|q%EP5%Q%ZfqgIURs-8lKNuvD~(4$C3 zCxUC`=(5jM`pfvd7>6ob7^|fu7)v|)Jb>S|ycKjs1)_EST!;D7SS&)536mV}*5}g> zG~mQKkpwU^o^*J__E1jCr(9C!J=uiLQ;1NEdRS(!-qjKp&I9x7U~0AcUTNWgv6)Qp zZaZaQ13{Ap-O`4NC{jhTV0&+6hqJ0SUp)^ou)r=YB6xQ*TE3HY7xO`~ZDlBw?{YiG z7AHzUJiqITmxO#bpURNQD9>gSc8I$HJc;XJ%qx@8bdy2g-6%h!7RT(S zg&wfhBP>qn8Dl|h=~nU(Fx5ZnW^aNfRLDdu)}1{dp1KCC*7IjU>q+A&M*^fI!&aJ| znA>IpYPi0J%WsA?eX&U7gcDzF&+6TGv)Bdf{M5prB(!{+!i-^E-s9ENAvj-r05*nO zZiQkfMChn62pia2-{0K(&8^}TbkA=DHL?x9oXHYcs$ytW4P{#mC#Axyy9M+l7R%7V zbx(mS&TjIoUi}tnW!k*ZEZ|X`v=A9jy5Vu>yCnvb^c+42dK5Br@R7*QKGN-94vPB& zJ1@p_N=-x8!#OQcYS=B-8kWbJKnNh-Bwqdis8Pt!@qPaOIi&~Z6yS{U&#wnHoxV-G zl#iF1L`Z0221_XEfY%$#Z7@I;$>^Mc(VddJ_!n;DEHLZc^V170V@U__ASUEGL`Ops zTpFx)Vo`b@gcF=n2JaKx<-O?-!Hi!xDghf=IAB^QVa9h#z@vNqW*b3zkZ?q8>x2qDk~CylX<4eA>gs z|J=dB!-Z=e0*~Y+&czozb)2W@5*{!+%o=%iTzfB+L?MIs=|fPV=e~JX@9}%(9aChp zmj(h^$k&{Nr{?Xr!nxs)X-wepAV z0X+&Cbk;@kt?9LUpfoV$&IUcwl+(7#6pQOAW4BPUwG$B1Dvj}vf*yrT3Tf@%QcQQj zl#@xEu3a|tv*FJS4y&#mn;8uc;3M}{%F9*jd+KZTv^X$!FAR)w-o-~Kj(6)Dz6$A- ztNzlb;8O|_!nB)qqqDyVCtTyF#j1PfA@o7sWjQBPisFuR)I&!Fi!CA-IsLDoMtJN3>7V6{-nL~oN_hjU>5d3E%-9bNGW?ys=L>{-xN46-pB&Qej@ zlnNVyS-G_@e-LyjWk|RC#Xaa+iyP249u!wo&%79JA~hLR)rG^jKCJc|B09I5$x4M< z`)^P;g$x|KUh7{UHub9i25oeSh@Z56;QhzxsYa)8fcl=m!%LKp)OuNaCYx#`7fIXRvg^&-Yuwb ze{m<={|>~}F%6~FU^4E&q>b<0f`53oZwe|n}rHyix)CX{Z7m`FWF{6$V+8HuIVlxb#BxmAS z0?4?u3`H>7lV75ly(Dqp@uW%xbyDL1f4WeOMHM`~PSXotB1knY&}#S+&oeV*Odw}? zfXA63VoZ{!DIQNG0n1QoJet}|Q}?OQfiG=&w=bc4?l^!`wE6(4P4I-E#b(q@9D0Tp zs2Qz>CT9d*3+D+E;5CI)%CWr~hWyxx->SC0yYhV>Ie^okoS~T*LnPxfI0O>Rkja=Z zqmA*}8Jt!_+10pK?DUf*SMS9cV5C%i;_0pD|DW1u(|gyVJ3hW~7oj~6OAy)wkxb5L zc?!B6x_O4D)S4Mm6BlAQFa*#5n<#&X(m*Zl(=`WF+t6pZ3y0R999}eYs$0 zP^*PFPT<0fAkg#-DF`rxd8h#qqvIMi!D9rqFheL}FWA!V!*m0xt?yEWFZ~O2F{M4g z0~dji;OQAqp$63n7(dAvJ%baBS{=h;L;`FUC#!((rAYF=6AvwiKBly|nqf{Gs;7-x zbk!l~W6+*VUKUj&47xWC9^ceyUn1ZM$9A`jDQBicv!8V!PE@K5b6Y_)-nrof@Jm*ICy+uC;qV&9pNq< zJZGulbm}u(-n&|^5OY8s2T%bTgYHl>@SP-$&1eA=a3%>$m71Y6Nf0hnh=!)q-go?0 zD(Lh7|H!9SPM!SDqCP@DLt?iu2MC}@p(z+ji6jGyhQK6ec<81XnjjLqh9C%V`CHHp ziv~ff4;?$a6}@oeQ$uG^-TkPfnkM2njmJP23H?k$IPwf5Bw+5vN#OEUCli7|ET|^; z0ueofjt#!M?oD?czzHZeFC=0K92N^ogTr!^RMW7k^6D8JKv}6+oFU`PsbUj*nZx(I zarV14$77(ErZfj)L_8LUp$Hp+IE~{;W`@Cd4eUoml1{?%l)z7Qsd}$Qt%Ycb{CJNnz*;{4Jaz+ml*`wUrafJwM8hY8?X8dz-y4b?aU%YVKDTB>4MtVs@A|BVr z9eU{i_T|UmwDS(p@k^#8uLQLHi=1pBzT!(9u*%Kv1%=Yx!6_7qC6aMi>PEm;rQunz ze-``jmq4RZhK}dKY3GOlhp`i1I;nBuEAU3>o}XDbyjDwwYAF(G)&Zx}?~BWq+iSl9 zH}=IM#BEr4%6xW`RPL+X+1qY%%oAeE_5F9+mWClsdUQ1(n<0y|H;!_TfPq4pj3%FC z;7~RNXY%JC5v>$dvkrmBhC~$)$H1S&Paey2=EsyEgEhZEuKo1&(A56=S{%A`$+ z2rD(qmL4>VQijgS`S$g$>v7=h%?2D?2j?Sj5sZbMOeQY6uWSxbmC0xuc&6ZqXL-{2<37R%r* zG@(JSkK(I))+YdwXNzy1fj*XO2Enw619lxuj~mRC&?UqN+MVNyR5baU@NS@{W2bw! z9fL;Qe96K)vXgFE8U)M7d@(C9W`HrXUyLWd2_|xdOtfgqG2-WaO9b^1<{?^3j`$4d z^0o@jc7d5i*Hjy7G4!EtLmw-X(K8LZtGDJ!(caYxd&maqrL{Rh0F-tugDOvfxkHhR zRA0Cfe50NMOUG7zo`Mfb@AigR$=@LInQo`VW#RyVkAhFb2bIZ4_t&DkciS6}?NFf? zXW>ys^*wIumaFF>PU+@a->^sPtfmUab5y}r^W_9Ly7YTsihW0_>N^)Xdtd$@TvldB zR#%rDR+*Qrj;_|PzF_sbk+()(9{Ju#Z{)s_TSm$w;gS6#dqyT#{cY7ttG=`9kyZDs zdf%$Ts=(;$t1er$bJf`JpN3x;{^sz145Q)M;q)*&%nWZI9$xu+pRDK8eX<^5^zoI> zmDI|uD~E>ud;FE5=YX*1Q$x28wTG@9vH?im{?^FsV}qX<{Lo-+&G4vo@XA5M;6;N| zEB?OXXV~w)orS#>YDK% zjDLRo{_zitm&d~*2h!~LnvAf0&j%CKUu}j9z9b3KTjWs`C^Yt|k zt+{i}^=sm5Tx%$gp3LaNWHzqFI^EphKW`Z5gDwkIZAKtsNsZrTr_~Kd*0)JYZ^XMK zW{79%T5rK`O%f}ua(WC{j0^5Al}gX*Qgn^nDWTX44fQ)e0qjCTJwaEAvP&0kq`7dp zL0;5Q*>%H+hXVKI>?zFBfr+b_f*%sPAg8ew;b%Nd8m?M#1;u&U8w7M5^Geu zz6#~Q0v>YDW3qmIR82-&F~1ozX)V6IeWR3K%U2qBA;5*z=Ct1B*PQ(aIbBH3s`0oh zWbl?dVZM|zen%GYgp&v{d2}Tb4P1!_vT~T{WJ6jK%blM%iIw{DTFoF%Z z<0e0yPiHmXk@Qz<$xN5h)?%)lPhE~*D7SMpVNPOJ(r5K13JF_^-~YU%rW)mOyqL|` z86OkK1o3mulGV7%m_BFlc)Q+GG?z4tZ5WspySHj}5MQ`+h?i5pT57tzSR-m<&55cfXik|V)PAAV zV1tB@^x5OQ+6f@?)0fEk^WGSqFPoCuvNzSt6U!wg4x!|?R)JZEFxALXJyA_=b3uM! z^btxNug6W%e6ZUNr^~U#=8#-akBdqtavDQC#5StwnTzFQr@FvO&^c zWZhK_p`lopx??xtm$7nw8zGQJb=(@^F;`NTJ?~a2y&$xBG9OFl9eRHzV#}}mq?{hA zXNYVzpbIdRxr5;=B%&;#KqvBTJ_PZ{w39Q=(kmp&3ZX!mc)T0o(~YD$s$ueWi9|;z z;K?TGW{dd(V=rr1Fy%=4^JTRO3wpbipw`pzGVv9xRQ!B`*OIIw;7SLvhNC+4WjVXG z1Q&`_I%xJY;aWI1`CvbN7EJt>0wDy7^%U+UT-MlS{~`S#*JQxft10>6iA9^WYtNP! znOxPG$5U!G+$XJ+zd%oKmcEVk03_ zsS{-j6UtY*&RR@!=_W}_rd&%F?7pHiq^;=^#E?9(GC3*$n35SV=Y;4;HDg~lE9d9U zcES`*7(@9~nbci;x13CO;syg=!d&iX+nn1b52+09GvdC8UT^c%BUFuC^Bbv<=}rMc z!17I(FPdP(6n5^jlA3frWUfTYLbzfpS8dw85?h#%&bm9ZWY!4&)RlBmU82kqNtBRI zcH5*?8?bvAv)SIz?z>3VA7h(%CK%1xf)r`fOwgmBXf3n`AWH(6~dKp z1V~fNj+v5Ppzi6fzbSjViP!z6te(xZ>R4>&ujTLJ5kJ8@9HFWyWc1Kxc_B%bz}Qr4 zw^GHj*KUnr=R2hDCW}lK&xM>62lkg>RCCd7a=MdFkW9&fo0}cLLC#D`Y#~C@n)S@) z?a@|+VDW;PS|yMCgkaGEHBcrL3qfdyks5hUDo!F)tzvN6=4qRznX6g;BB@U}qXKSg z=GmN!BinkCx?4_XfQh4`E?DdC1QAOlR@P)SYD-!dH#aaq`H0O1;^&M>>G5{1YM_dm zY_yT{k+@AB4Do77gBP%nt5^|2@MNr!IOT*m&t&Rlwb^7OTTWAwepLEu+@8isMz7^{ znou^Jq;}$Rx;D_nius5)MRi>zj#-uKe|1)fYsf&c?J)V<+E}!kwR}#>FElxp0L+d= z&{i*`+_>e(a=K8r;a%Jp%6pteLnysg;?WWWZ;HXJE_*lTsj=zKm^={$Q-nyB>(Qu- zBYCifH{R1<^{$LL_7 zV76uTS4d^yJ=QE(qM)Rdpvf2b9TNG6z&qLjyyfaz%|W|pMLOp{<@_et3fyLQ$eSv+ z>`r=We%ZjXWj{veyis~?Rw$Os6_O6w5><0LZg7*~_e;NOhd3KX0HunzW~(*XRPaYq zdc6pYN)f`^Ns&~+q{D*JiYipodL7oa2$6cIuEPZgdXVzhT+TX{_q0RpqCMyc#Den1 zl_@x3DV?nq8-*y#HQHEE-jJ(gU5yvpo_gG@iN>q>z|SN_Nk7xX5>CSG5^8#1Arp{K zqs5#p94}U*IlJ9pg=d`ueV#6%Yyk|NqNc((TY0zFCoMj4wJ$>w-UxUh&}w6}L(C4V z`U4^k#?UsF4`Zc3O`ERAnWps7Zrz%}BjH*h$dm{^qV?V>joNNmjYXm*kH4-f3$6U6 z@{-go)S5WS=53z5#aS_B&Y73hz_AI-6%xU++U?U+w9Y9xeHPq#F>se{5sq*^~M?OT(!zxSNe!yP9Gu za&|i$+Z$?YJ()Gs!rC1DdpWzoR<$Or3^!{{HEqts$j7Ao?FJ8)F<;AJ3PjkjJ-_K6 za(dZO#C553+$40O;C!e4uAE+M(}W#k+<+Vu@|Ln{xnAuenZ?>spr(qtY=uH<=2ba= zK5fA5DUNP9TE?WCORoT=rlq=uUVfJ~W}#&{=R`8MLRZRLbv9s4Y_dmPyEBwrmJkeSkob)SmkxsUc=t zCKoUXYAbDjx0A8OZ1VA@MHCHWfc0^8qrPOW;%l{%o@TAo#=tK)q~;572O{^&r@|&r zXCaKDX-nuM7PTi%J}>8Y+sjyqt2?!JCJcBk=T6J%GH&`MCxO#9ZIT3yF5oyB!N}cd zaS6PhUj92NJ!h)YL>V(Quxb$aClfyM@DI3aCzUpmzWrp^J4`1sF40y0$z63O)5$OX zb7|8_Z~sjj5311okGLy006vDx!U6dh(5@TxITvojfQ+Mybid~|pv#}-#;2CdfntWE z;Fk26k0D!p$0PZb-xs55pZH%-;;XrpXb(0>%gBK0>?vQtddSGLS+JU5@6%L0Pg?6 z=ehCqOJ(RCef<-+sgN7zhR~W9xYZk71wg(Br+R=O0sLKk*4@=n5RBdt_3QwQxFw{I z9{MRnZ@>8qZncPAbl#{NJTI>t{`UcFtc#~{Ch0MV?JQ@r$;GD5s!}9>qjW)jw z7CA*SxZS0})#8ue+0^^+%c24U6hnIcj-_Ln4B_+Eb9JXRZMDZy>o}Oj6v^nBV>Ecg zK7O($Na*uuwS@QHl79$+}k3GVp6?4uuG?K9c*;k@;%}d+}e3g>lV`XdjZjU2m!} z0fKYpV{QRL5Ut4e64>e9k$Uu=H!tly_LAs!!p&a>ts!|RSObv~0Y-MRR@X3gqM;E> zF}+=*R;y2U)>mdj53JK((L4T{XbElx9Jwr+;v0H1z`*)z5ETD==n+LSdO-CcG{yDd z&As{G18(=)+_KT=$omH;hkiM5`Pj_xBdVM@X#8RuITqR|qfM9sxKWohRclndMIQb$ zjF`JmKtnH<08XyRjsl+Iy+5A-*TPNK1r>E~%G-8T;R;iV8489xr~t(L#fb>J1tQ7o ze}>k9&zl#18!y^CEn_3vZe;@D21lSz{tbStNCh{q#{ec|gLy-5^P6HPJLWB*LBbn} zgxvWC_}KWpdOTFE<@yzP^)FC?#S*D``aV6@zd{#-$A*1j$c8FjN0rEw9mW=%_|*YP zOX&^JvRH(kIrvj>#`8f)*LU9#i^9$WgoZrcihMkgB-Ht8l`Uvu06BQ<6?mBW=eNM^ zLm@)PAKoiFD*f&)Py>ZAE)>RK(N{Wn+M3n?fK)yMuSm|fMZ>Tn8OH3__w~N~HvC-l zZW9q$r1@v85NZTii$+#L7%>(-Mn-%oLf>11BCn-R=8=v%VUP&C&gDOK@2~b7x5CL$)a~|QJQk4Q@4`YF>VX__5@lO5Fv&QxdAV2H}CGr z*K^481C$l6E$x`!Q!VC0HLpti^#>;Lw*xYA%kRF}56kT1BW&pnPjSfEaGVzK5yW`m zkf~EM8Z(q8Z`IT~z(wtU$)Co#+3A&{K5T98+I8G(W!nW10r4{;j#kP?Sy?<{%%y0; zM?8XCJ!$^uJ5Nap6x~*Ca)y5{SCx2jGE+vS?R<4Hl+qYF%}(edQfyuF2Ndd*vQ?B6g@EF{wJ z|HxyvAC?i%hj$!8An1-=J6$IP^&>9#R4eb{+R8{f)9P@w0ztd=<1ZmnGMo4c{t55p=u(+k~`kK6M%5Iysj2s>cPCPjJmvJJa7IyaJd&a%}-R8&7i68C7(?&--ik-5j zu1*RnwSC=B88Sk0y)Fm`3pZ&5_IJ zu~=7%z|pvSKbd*k(6E@D{*HOhC7Y=i^K~6fm5Q1QTzHz0pz$`5m$q`7Hw=gfWd_## zIijiPHV!J-b2@@A5?3o7%9NCJoC$H@4hYsG45@CyIvXe^vkSxLhu1&9Nm#Gm(*lZw zc;3P!r)@KAC+_R2J@ssiCil*woq=K!-TA;PSp##unT^;xI~=FO7#UFulv$lkZ&amA zwOCNY%SmMuH&3pc<7TE;N`UkJdMR(9Hzy3Q>$LCO+C;jI!7MjB)2h1Or7EcU*JtvP zolr{yB0xNSwVw>Ly*Iu~P-(f0UsGjVsdQw4bRv_UzQBJDjG zqJh%W_dAiaAK%ACwgMTQatDD_2NWWp98<1bCJ)3=Ir-i`4#}OXN=fwY_TPBTwqC;F zf^3KbB+`$}Qvuu_ubZHe1rt+|+;D)~x|da-2cWcC)t>Bk@4QR8a9@1@?YYeYk&+g) zgrKG9BDy-4r(6Q*1=_o0^J-G^?6($|Q+5v@;%2snbA_BMC_v4FGsDaYlub-HXk`d@ z2%o*Ww0G*pyTyzDI1b69Z;B)EU=#540lMS`+Mg{Ce0}uAlmTKiO$>*HhE|o569?BF z=-u^_u^>C75ffxDT27D!nN|kh0!9-p=qG{W+D$V+tCx$r*L68Jvt{)v=fOjN>2mHu zzy{lna35Oz(z)d#7Ljk~O@)57OQ-~Rc=}4tyYUZerguy#CfwuM;YZi}Vf1ZlzbCB6 zvp}9Z9X*FUH?ZjbKQ+2SFGDI{v>|zm4Apc zdUyl5^S+n%9#T=q5lyK?_$GTq0TqJCR74d<pXTvioT(Mn3j zo>xB}RVXz{1^R>FT9#HTj;Q67`ba9KLda;6lB?pBj6ScvIvPy^uk45_nMBl~l0knI zDg@6WtPjY)QH@-wkx^p(L+C#uM-jJ)AWKzJh=7bS2x-$G1evCzNz_HarzQo0y#M*? z#fKEfRnb_KRx24qT+4+}WyBpupzQOPb}?u_C%BKsIN5sx29%GE+F zVO)vuU^OD=fDuBg;z=bPQ^_uSrG7LnSE-e36aml*)Y8Q1BhduHW>qRVh5tclae|c{ z7V95Wvd1+^mQlxq;6y~FBl0zg@J+Rf#b8qLD1I)bifhQTw+Ao26qTujI*C|lbViX< zAY43=ID%kC_J~q}cv3vts6eIy3Q_z{YZ;?LN4 zijKx)2c`O0XKFU4R7KUABNU^;$ZMG75ls>^8%xHODos)dQjW^3%k4AAv1sISL@pw1 z7eVW+Ix6%B@sV*2us;wZDo>{5vi-~T|F*z-*|t~eM^lOfqKxB+Q$#Q};+YX}nUpJz zU==fn^^XGAnv(5WuK%}%ipw^gSO0H_%a+Z)QvYv>bC+!v>mO9n$JI%VhLsC(#)%X@ zA{j?~E9lh_11wLXEj7lLC13hl?&3qJ3}Wa6G60g;1Sy zP=7CMa`kbqJLnGZ;DK!~(Pp+2J2uqhRlObQ!R zre3a(-Y1ikMuS#kF>DbwiZqQ_OoRENsTcysHAp*9$@VSRS04vkIGvJfqDPX@7)Mxz z8cRnJMG!E8Y?JY%BBo&EvZG@C%kjM|15FpD=p$5A=zju>R86JuBk@>L4MhP}$I4!V zr$}#h&&zhOY(RBhs!|+B5G}1y$~B0l6_gKRY0)o4G|Lq!hL*?CY$_)6OZ`H9nod&c zgrE=-!n%vbupi|KA^2H^sD`)@vaFB=m+P~b2R6nEU6Qk+vcjxU(Ii6dF_*L)ITot8 zj9>olzb%PHw)2(xF+@JAu+5+{5gw0o0QyI*P#&SMQxP1WimDieZ1*eup%rl1A)f;( zLKr9Htssjfs)jP8a1tPRIi=9Zd}95BDh84F>X@2FTzV7{z&I?h{?thXd!zp>t-|pF zIq`fock!jDj8qH-ay8i_j4F!3OkzDmu|Ea%BBx^%jt)vLb1ipus1?Y0NF>-;Qs!Q+Pans)tDwl#!YW2*pwW)NkCZ|zyGDUM9|x}oC9_NQ zmCSLd1*j{9<_N-+F3c(#NsVDGDncdXUD);v#lLt-`-z6tXN(TY+hjT}Jg`0B6_j-jfYh7<0_?!L8edg zNL(eP6yZcUf*(m7!REz&QK0RlMn<&v|I@{Xkhp_g9+gK~w9O`jjxhK<;Z$K1_)G;I z)xcR zD1;c4grL=9j0UMBYDRXASYNBu99Pgdo6)5s$c7NK0*yqX1hgiFnkvM=BP~lUJJydg zU*izL;0CGAi0xW#YDSl8h2v~9Ubg&p0=f}cz2Mn0$rR40EM*#}w;4TOX=fsGr;-;xy0%GIdX|eGKe6z97}hDZG#P= z`9h22m>+hX0TDS-c=TxRUO!AaJDJm2yfClnry_(+Iku~=dsO*CGZ6Nt$!HKGHBd@U zy=L?P`Q*Euo5{7W%Uwkt334yZ7Uiw5l1&$l!L+}wrHTde#SmU(gT;X4B#xdo%z>P! z?v2Z}bW0mESPSM*ph5}zX$yHQf^|3`BYQvg`96c$_TG-`gokOUZL1bogvKsJ^bW6C z4<<<%WXQeObJH6JWP~D5ykZ0f=-b#0+%Ak;;@r3mEc*U_0D#5HT_O@2FWta-WaHpZ zhdFBvN2c#`>4@V-Zo}%cNp8LoCd*Z3P-0Q^$2dTW69mmm92%Kuv)pAAj--KV1w8f; z*^|VG{4j&{Tj_>*hh54o`QGgVo2c5Et8%DOh<{uL20WW%$Zt=?hwUNE*t@ zL1+xgek{p3{lLnV7WMHAhGakl+9EAb9O)bf_A}ZB;BJ6*`yvHr*94VqZ3Dov3^VYj zxlz)~aWiwP)p3&>zn8oar$ryp6MB0i%y>=(G$6QvGGNvPjvq{3;jUj!KKT&rv7Q1q zJ-2EV5ZKO8;P$Z>;}8+`R1d6TK#>p%!F2k67#JYx&$1v z-yMH&(lN3|=9}pD_CEF7qk>U+;ha$!iIQ}KYb5g4jK!SP0{tIHYp})v^kYDB_RoN9 ze(I-JZts1%22=UY(CNZCbJ@TGmDXtW=ApRsz*hmh)cqJFBYH(MS4 zmM5Og3wEC&0571YAW^hg3zHk@>CmYbwEaL z`2aXK0gAG{C+`S;GuP=F+L4eR*pMYccYEbz)V58}SV@c@_`>VW%(Fow}+-Abxgmzvf+B=^RSUX^P+t^++8lD*~;45TBXpJIpVvWo1Gbykz1w(IKkVGZtMNS?LtG`>BhOC z#|u~6rVwo3Y_KtVAOI2(p+nz(D>^hFBi=f^a{Wja`P&3%kmt03C@8L|R>O!GTP-3} z8>Mu-k%);M`qLfg(4Y)X8K4~tu(~R2?pDE20gz=5A9K^KSdRlDa^ms7M;_x| zZWa2VIQ=^GLEFDFkgj!|ME_f-i58XSlJqBdp!5HtuEY6ePv_5}T zZ|0piOlS4!u5W>DC{-$lE?8_w)1-PAE*%5K2voC!h41=z_3z_cG3@hq;4Xoq!AZdr z0whjXk(_xC?f@^mi<`owe6=dQ6F>9aEh8U%4>!5RlnVy~ATGvz+w7OSXiz&8y>g+6 zgBxEhJ2^IbsP{;BydWcY1^BVOS1%ujPJ;=3F%^KpilfjADt8b&0TNjFh&l4aNgRi( zS0Sro{(qUDX%6YG`@u#zXz&yKt|4-xMsg}i>2Sk z3H*ItgvhxHuACK-T|h1M6>u0va$*yoejg|B_pMfiM8A63U%$TJi-QpOu3!NXSVlp$ zj$44Un*b3sfV1yAh0k~0E8GTFts*d);OhRQX@;D+_kvHCZSUtk^lEL?S5*J{{#6u} zMBQ=vgYfY**2o&57xI8P`{B_ajcgd=5ooma2Jp+A29lxVr5RXd;^Lbl@4X+ZcR&Va zc)OC^_w~TK-v8V$T%6TQ0(zvmzYC(g&c-qgSKOY6N1U+*aWkEKnA<$PQbc4IXAbqA zeOU0xT9*W5M-jbS$@d@N{!DHR zar?<1|BlR1e(G^XB#mu77S%HTvv}gS=G{c~bocd8&WU(L*ewce% zZ1LL-W551;4Eul#V4!zyAy3^rJVRdIZr({eALafccCqmgT6LWkfGunN zR-4vTrc9SS)_k*;UWl5~LaPTh3>1@FK7k;^e$3e3k8v`Y*qH5MG!{7xa7xKzHn6dl zH(lTp7ua+X#qlSg(l(x0Gkpaz<=;8}|Hfn^@}c9h69R^K2WO;hNdP<)r(B*-XWCR9 zXF-@UawTVhoO}%39VjNZymW8hlfS*U?(^JHAZ#u5;TQW~tSeZ$2G(GySaYl?s3YqNF}8fxU5x9SP8TKa;X5A1oD9gw zEzCDwiFcSIKYMg}PNq%^GriP@WbC&p&+#!G<<>Q=4S6s@BWSX(8LmH#RtIEa)Z|4S z)5uA?1Mk4o%WLtcOK4QJG=`B|CU=Y_qHMZd&Xtw4(c+Dh_!oqci>xRnFDh?3&_jsH zKIABWk=wKTR>zWno+<8-sJYOQv$9%rl$`B9VD`ek&#bs%57s-EPQRVJtG7Iu zOP}U;?XWM60M=04E$X1!=uxo=t2%0o1?ocE2c}mRlKY>!0qalaRo9f_;#=#7pT!ss$jJQ%UzQ@L1k_NX{@n7+y!J6} zrxZH3bIr7AG77y&WIIP6UHf0d-xESGhh=2z8E$G8urPilljFjnhQ_1q782sI>N>+s z&kV}Q)AwJ8#hE?6wfE68TtGIPXj94}9i@|1lQ*N%ITK{&am>s>F?l+wlDyovKMq^S ztS?+|o0wL<>|0P|^vz&O__Hl!IuRVaT_?hF=~i6+FU@p8M+@66LKr5d2WZu%=}#E))#4IC=CNxT6jhgB#s% zA@|*`811RP$$4cn-DDvdD#eRM#+6nmV;OSKx9~#)r9^ApV(ZO60sl4_ysL#S+bwzH zdUKYSr}N|uPjdTb28%@&=9ivCz|2nN(j-1iTCOs}8Zw#GxIzZBK&zKti>0&e^=ge%PH z2WCi|xGm&IKY_X%ko9LzGCiDnj&p%onIKM7VpjG>@_sk1p_)0ZJH{ts@ZH$MwoujYANSXQq_ zWMBX5+-S0Y-*97Dt&ZD3W_Y!O zXkWPCUG04@;I1~fTE&&TN5#-9!afG8;o_o$?LzqrT-o|)_gz05_IZKJj~JRh_o*%` z?uo~KA&h_ki2tf8u(0qKy0YQpPm=Aw>DMMzvk9&0zC)}AU1(81=$}UaWlI>cwXO3j{Tb3vSk%1u>64s zT?QcF@>Cq5Hzj)J^pH-82BHL^!bsu_dfP}A^Inc_LSJp<$vZbokfy_$48l)wUFHDkLfHblKL|SVW603KLeXkKfwQ= z|121DB1?1UE>V2Nu5{CEquX(Y%@(gRBPfF{B=i#W`k)M)5;uaw@g=C(jZV=O^kJM) zhezMF#yR{aAwEkXXd1^kO*1g{;PIacNr2zym;_(#FMu_x#|&q1|fW}u0mu#{lr!>GZt=NAk9fO z%HO}$RWudh`T?Vd7a@iM|4u=8<+jPUxAXJ+6!P=p+g7a#hMYZc22FZqh<1#>kTdAL zWBi9!nOVm;zxvEdZ%M@jAKui3J_2j8+mI+Ay9ur^D|p&JTirxHHNnr%ts-^i{?`mI z=%stej!Ayqe7IXc<8S~Oz}3+eNT7{41QMcNa!vA^pu1mPgZ%3+IEM7;;2)plFBCht zbBaH?%S{j%EwO71F1`%;_7s2MRclh>g8$S8o|^@cu~k-|EKZyn;>N!_a{1Wub8-o& zu+np~WA}SBwAH?#thITMKB*wH^BCBHV&Ebj#MA#oV77P1Ja3b24=nA0-jMa<20eOj zfl0b}eO*;Rl2Wt;O=p_pH&3k);4%6>r3ha1(K+4@`_hsCBrMvOilKD7K`Rx`Vmn`M zT6C`~j zBI&D#FX7!gZu1b|_z@{idc{JJR>%6o3sQRtJ9rnrY!5>~Gu%%g0m}ImE+0sR zd`>yJwj0P;=dVkQdz8+&MS)$_W(b7H;fA{LE@| zD|tnz!#r+Sxkw@GOM~smh>n6hDHxW!gIrNq9s4)0CM8e3{pW}NTBfQn3VYn=Mxp5J z^Taw4pB?VPB8YHR1XPpzBiPNh%lS=PU^ZK&2HE=nNTvGP?2DIQP@8Q%!k^q>CoZfA z(MPuOM$x}(Y}rjIfJ=FvBY9<|{)iL zy^kC*!Gp219}f{xDU?E#T$iNuI<2l4NEe{og*(mLU&GH%uN0B{?@jlu-@AIhdJPW; zhIdJTj~31PYM-N3qV*~Tat&M!qdrB>Solr*+wKM;{Ez4GF@(sj|imG zbG@%Hyh*m>;JJp|^=!CEv3^~Xwzm^$In{5NJgeq6O|O)ZGY`KHiEfWyxvnSI@O~f= zF1-TYT#Uy9Hp-Mr*xeq6&Vy~W#BU~dQv9Y310sPA3CMc4dUy6-qy!D>SrQPcMJ0?2 zLI&|1o|du^P&l=DQ1uFcnYo z4)nLm92quaaSq7H-Y?@@?ux?slQfHa`4zNIxvyf>Akm}SjIs-5T`et6liY}D8jum~ zd+|=VA!y&-J7L5%VW(qBfYcPznlkEouxxY2?6k8+yPN$beqefKDLJ(lNv`srT(Pak zTG5di(WZf8SBS;%PuxUi9&wm=5TubwHjR~&BF@(q@)pnP^CeyMZ{YarH|5|FK}rqq z1v;>xBh@}nlT#03(VXS@Epw|#UAf)~OKtgie4meBzttreF>-mi6a0QoUmBqZ0u(^F zOP=QVt>mA5{M7sfs`Os`*0&&%4Ew8d3k;L|%&V4YPxb+;5O5K}k&5R& z*!7I9FgW$x1{Ww!F?5DFEA(@od?vzA&#hVoq^8>dThQC~+6%pngo8Es%E4+?fL30C zgeOFwAOVW@;uN=u*JS(kcqBxMudYF6E-qa|9=Y5JXVdi;9E)wQ#nWiuW-4A-w_Jo! z>=g+{1J(K$Sm}mw`Z({MePqqp<>N2Q9vQlIBsguDeEWoyGx;Uk8-$$6B_)==cuv%K zQ^4OYHW#WMCB?gt>zL#ZOs^~j)8=g7y0@eELQ*_v1c*?v0S^~<+vr?`@>t|ClRHcSX zThyxz8Qg{iEq^47#s*|Wd&_S`w^#4&S)m=*k^ovNhF0*pfYAg#=8#sGs`_&grP!(K z(r9NuMxMU-SNnTlM!Qb7Q?&%VS;@${VAa>bhsfo z#Ch{e`3SkTfxOad9=z%*^1+68C)uM6FOh74-?M{Vx(coUky6#+;yh`#mW{=`#b6^X z+%e(YDDX2=Dbi5`Sn`oy=(LRK%-D`D}hC zy#UiZu1=(ZH{yl?8F~7lpX?`sGo`oZz5K;8@?4qUw{hK?wP!(YrI_%_){W)NH_> zOY2>sV5x;97ePbqRRh&u#h$ke2kViuI}b~+#+4c-7SA_;Tu7Eb9RlBzDK@iU?__Pt z1}I@~#^60)hX!9MBD34x(f26q>X{mNQll09xkq3w94>h}$)Y+Ht=b!^Lcf)ZSi~it zf7=|WMb18S?3&)b7T$uhHho1NV`&f>bz0ScUjY=}HjeDUViARRy2Ep_8Fw|KP&v3T zYoitxg0S#ax_IXel#-`qAxH1UE)Q=++^XaZv|nKdLj<_j4GQ9aJ$_@bSp1XEm5c~v ze0Gr^K6w+rYgcSZK=u#;d~>y6Awk(2${aBIu<+DGa}(MbEGAFieu=qv`X(OMHblC@ zEwJ_z6St1DqyJ}3U}RWW6~}~^YvSC?HD=c5t+cIcQO9bGJe16lZ@dv-G*C>Q?*8|( zUH{SBc=xW`ID!O5=|EmNXX11oSZyXH@4|I&tVi*_UtLF3rORqpYcfi&#P}-Ay z!GY6O^;SMS*9`!wC)`5tOWPf^--4${9E}A7pO$->i%^f!P{|n z0eckafc?BQgC%ZgBd*EUEdf43ip)j?kP{>XOfHyZ^mShviuWPtj%(hHtLcD@ zc)2SjJN^gW&4a=8x+Q?HNbMLR1`9=76OJNhrX;5d?Ay)r|;$APKNTdx2aN8kqjBr9W$LJ>JJEtcc2({ zm1E%U`v8;~nY>GR?M{+8r?&>?dU+ju|3ep82hua(V}HlH1qE0**U-wzKDQ9waNp_+ zK{DU*AL88z&*3KlB>+EL4qS~zBjD-605UT{zktwMSWgGQ*CA)lyRNNXTOhdps{z}B z8ES8S`L>Kl1D+j$V#JJ}?0RXq6_CIYK?LhVSi;|W5dMnQs*qc*y7>^f`LyN$dCf;I zXob4_Be*UP&Uk-azzFyEcrFaeda_RlK2GW(JQol!-R<*()7F-YHsvA)ZxTmGsWMfmvi^2ZA)HO?HO^SXG*A+5#@XadlN7l`^{{KV=~sH10<K<{W!jS<-!%#^AjJ(#eHS5u%3JO{U{_D**?j8H{Q8s+96z3~?!DLT;7~b!%pW?S{SShHHGfzKqtas@@ z@Gil4FM#8SultCv)MT;C9V#JXuAXDW`F_J`T!#l_&<_74@;m?bG2`amGpBh0C~Qf< z4HEDBcFq(@vO!;yZ&5iQdrE8PqmQDk0U0?vdW%3%Io})o6fASQj7wfL6YYCL8;vMX z0ZVSbjgCZHEd##O!+DrSJnHZ&^-7g7Ms9x$jSLi%7rP3{k?_aI1jXlaq;(-$kqgH) zxq2}aW%?Hi(*6QJJ2NOFvi0&qkzl>|u zszTh_cS;BRK2l#s6v5k@c6DJ>H>6>xfPb_Y$h(71m^{8Lm^{7$BfzRP5V)`bs3KSR zDzZy%og=kZwy-V(mmnqF6kKLgA(G2vh3g3U^w-ca-)cf48@gYzpkMR#3+k?WzK$I{ zFmaeq`#0bO9w_e5r}VUEz6I6gHU!X-IPLNk;6pJou3WqoDF!m+fp0;ttS&{~NAyCs zu3Mgf^A{H_=NY&qNSBE{Aj?v&u)z=1>)$4pv*fTnF$1&A4G1*ecuzbnrjJGE~z1}TP=4n9aGqArR`m_UoG}$ z;k(c!12R&5{*FG?>XzPjz6(F!4gu6j1o_icjjasDsuvP<2hQR+f^p*Y8Bi-`H#Bd-Wd(AL3qm z1#v5x(lw1#MH$hWl$l&T*}vs(B5(T_@gpA5_hmY5bJJB0F&>Ic z#gaq1jc_-(@n4|d2V}sM+TQ0w-P-&7zX&#VM6(89<`4(Ns_Uxkp$KJ&N3EF zrF=r_Q1z#1XFx_|e|V2%4ZG+owvD~-{FDb3_Vwq!O`r5?3QQ}ZU$C^9oIfOW>H1&e z+XiK1_JQI3#Qo-@^S#ggTKG21#A~sr()|d6U|H?KmB(KRRoZIW)xT41BJcPmW^_PA z_SVKP0r~QL?`OZnr|q;a#nFm5pZ03NVU9R;>2x`6v8fb&O|%DSGa8lVJaf)KHAE|4 ziGa}0DCc^AIV&{jSUQd-MJvB4(Tvz>U64!I^>Hd676<(oKf_=Rh=@12aEahq+uF1I zTv%$(r5iC)Vl%-+NavuOiee#Z0;qYJP|xFGxAO&la|`#3(`7!e9gM? zG3B&*^2EeH51o`fK9UhGU?1z-WOL}KXi~MdV+mK6Q+nmmy1Jd!kj39)PkixrxaqGH zk(uB#my%z9HaOqA=s$UYqPAlNvx2r;OV&muS4^oh!k-@4Fi=d+6cGRV?9<>B|Bv4b zHZR)}vUsKGGn5)Ez$UdxWh=#1O-=E~fAb=yZ$Ly&7%dp3T5xO6@gG9ug=;B^QIgWl z()PTP3D`^)T_&F|l@r1QB7|a~n4GAo50IB1^3L_X{NKWaxtEX_D~&^}TCzLoIGc$l zb8KGTzqHK}^&c<}D@6#>IeqYC-n*rD_aC6)cG623G@{z300v47kybuOOy(|BOsX7XZ(yN->LPz6BH!e#?EUhkAxYDA_TT9WFJ)S;#E4`FP z^GEwP%d(A2Wa)xY)z%n1HJe9he*es?N^kMMY%l)`w4 zc}#_P+iszZCau#|NAL@qBB_@!UW3JgZ}igMy5jY_fY0cz-Tpq_ea>yE8ExNgJv|BOF7{*CcR#&2HxAjq=3<5!LE8=n~a zkFkFq`^wnEWA7Pz{a6B2S?t)(vEk8Qj(%_S3!@+D6J>oZlynlE~_L-sIuRT8WdBgxuIOw)xzy>EW-9pYK74yw(@>iMEL1I)41QUx-ZXh= zmdbZb?q&ku_l3aOe)Uq>4)7SIFXCU+nzfB!Gw^^|znrh9n6AP~7gViCMqdaV7t0$q zy@IiZJJoL17F1Od0d2p$tZ!lKRxH+l+Z|~btyDk+Z!gumWg}BI1>;m&r*D?h{xPwe zTC>f?POUdTqPSI4do0-sEIe2E_)E!=$WNfvi&RZ7)XTx=LAV zPVEwBrmSnV(#T5I`{ZgnE^CuXv3*_Dm#0|0lIz5kffTJ8SuVFMfa*EU8O>IMyHd(; z{iax78v}=tL0Jw~^=@k;m%HRPsXVe!V_k)+j`oyPF1KoNzx2UcxkF3Wi>%+T1C9*E ztd)L1Q&Cl!ge~mNID+s%veP2RMp={e@l>U2GDyagOQ`Kq8@AoR_^8F4imNl%^O7lir(V(|@(!k{a!{ir06TTFD<6QNvznp>BpO?QjsDtne;i}sAJ zTPeb`k~%Cdxv~oIq=0PeHj|A=BooLE(^7qf$xGQgEuY;GE$3?a36amGtjq#X#u#Ze z%2~hCwMfy|ydeI8GC`T>WTCj=akO>SkZN9JIV&rJ{stTF)RSG0+8RzLwo7|Y>8iHr zG)P+m(QdPpWM=M@+Hr+-zzE8;i!Hq`Y@y`87RwcRCc>E1>4jLwDql!2#_wR@z`s>i za1FhZZE9TgmcgEi8iu9%-foLhQo(Y{fwX~obVww7D=Rz}K9{wp<@JEB=E*XD+%iPT z^kuf=Y}1u&B-&7QZO&FaB(}n~tPM6%4dv@qRXZgwXf)z5)xoBbR&NxE^U92et}-cy zQBNll6<<-YZNJz_#+s>63rN1JIOv=%5~nT^%Lm^UJA6`k)RUre^;E}QP?W89)t>*7 z%DF{XfzgDW$v`*QPPDlbXn`Q0tk~PwfIkKJ90clgv+G2`oI|}la(yY+slE*~K zqB0H8G&+|I8%(iQxMYnQX2lQ2Ui0|^v1SesDOoDI?w`bBs%B3&fx6MjFDkS8B+W=m zkg7Nvl(iakhv~Y?NT=tFVs|L0WE>YZCCH_Wv9v}Za-5Z^sIAQu3{eByZdtiP-1IN@g3!l+Pcsjm`8 zxztTNS=MZ?MUtk{Vxgi@?G#DQAV3&!xmquBPFqJMS1F7A-z@>5M$6^`1y9MB?4;Uh zw@CO?>Z<%IlggCQw$gb|Cv!Duv#=9OT}81*D=bvC$-7-3Mcya1qOevNl}VA{%bd~W zOL?wBIre|4)3K;ngey185o4?3Ry)n&A9NbPu&=`vvUY(o2QYz0@?bM<#(e-HE zv`w8=UNJAW-;Ogiqf$}PsT9FZF*YZjM5VS9fwpEk6No25G2WH4a8h+`O{X;0V(qA{ z+|trV3R3fGXO}gy0bFRq-Htgiqmatkl7+ET6$Rf=%d3m!#PAP9L91IZP>iXdi4?RA zCr9lP>6S{ZB-jn@`3UgNa!Gq3VW^4qn@zut3dYQJx}eN<1InY)-3ORm8QRq{lb0{XhBi&moTkW+Q1q+cC}5k9S>N9uNCRuN=+48>-bHU zY#b)pTK2$$;91?zi>Z-AQhjqRP;%=z-q8i&8EZKu6$8Js&@iUWj*ck7OQf|>Pica5F=Nh^sG_~mj9zh4svlWw)aaPJoN$3* zH11Bx{zVcvx<$Iwh}hkRs7)JAt^E(F+}1A9!BioW3OZtrm}=^BsaziO0VACg$VJ>? zdvsK~f7imcG8=30Gg(X7=rZLyw4OB`mde9s4VBY5%H>kP z)-9wo;-#%rUDPk6ZNYdk?sP=5RD9xdV)Io++Febhm5q9p1H>)6MrwvK<`@mt&6ed! zi_agu_*-K2O3Pek+EgZ)Dy9tv&o#dnt5@oF&;SHLKF1bpb#L_0kEQag-b$Gj+N@i# z$d@X4h3jfb00MT}=5)J!hO#%4DvSs!5<9dK%<+s?RSKCak&3gN+4oWDcUd^ewaNu$ zgf2yNi9>gZ#ifY1ZmF9qCT~EaE~qC&#?ewKVvbQDI zyqUDk>9pjTqaPQ4wqyX@iK>w|=^Q4%$E3RUBB^~{rjtT)nY!$Wb@{w@qg2e4RD4M5 zOy>2V2F)m?Q>9o8C#keCRa~eUyq;qE>It#+Vy@w#U!(Kt1A1fAVWm}5k|HmL8yd=^ zFl$_%Mk5neQ=jNZp2{9wvu@3_d5n@hI`o#28-y6YTM8SVCh}*8o&W>Vl7Jv2hD9fR>n+r{hN) zv3vn($pzy=RA}hHhJj*GqMNX;kwqlb+3a07PW+rGf@Z zaP(|~tr{OTAS1JH89zW=*3ew46;i#n1VzTj@t$MX)+?W^09EE6^xPJPT+$EO3Cb{4;}0| z*ZUCF5M8i=;oWbE7HV`(uMcR%vHapB#&S?bW`oZh>Wxncf9EzOu)X5RB3q>N&448< z+UUB|zL}Xp8F~6gL;J~Zf3$nJ_xLn=yqRA!ZJE4l;)m-l9?Op`t>K6Mvi6W*0MQ7x z?(VsH_Q7qPqOzf=xsf+Ct7Vp$H{xpsiiy??rWCoxfSic$9-r@hexoqW-X$QMNb7~I zG|V(pkE#O-yWVIC704-tZxgwF#K%m|~aSb7~sSBzs+YfN-W zQwtgrwm`DvQIVaSeZVwWQA*C<5$H!9j`wcb?0b!DC$-c;16TJgb-6}3!#QfcP|}z4 z^9`2#U=9teEG4tn#Qt9K68%L|Myqe$cj>GnqO{5>Ytrb*nS%^lEs#6sefu{I6qBmv zb^CiS%nKtxEeTjuiarTSz3ryDbT#NmS(Cip6jTw@Hs68SR~7f(u+4X^Y^_pGzOdbQ z5muIf*d*d2n#=}TOKCf$vfoG-!*x={@R9X9e4956h{&lu`}UJB{^LhRd!Ze^t7W^` zrN+5tDw=dI$AlcX_?bJ7Bu|k~?!=r96eFvxvA^ej+f{p{F}Qp;#z5K9(`Ks78!23) z4W=4{gf#r^Kr!4*j~(cp+3ouW*_J#Q9c=js7%Rd+!*kKddCDQ3^euaQ2RE-KBWJsn z<)E$bKHvIz1LCv{5%5%iV*`wPKodmpU06!Obp!1X(5zF$dF}) zMz)gf0pAo-_E)PyZh8E7=lseg(t)4)__ibaH^EPh*f}JV7X2M((FqrB0n8z3xwtiQ zhkP56pS4;Q1cfg2yLOZ8;tFY_Jt4dSnefPh_h~U&2$kz1n#GrI_gO;vTkZP8zS+&I zRl!8R6VYv7NWHEf>_1AjU+!DK1(Ah$&<6qxHB5t^1C1IL$Qro+ThOf6Uf~tkkFjGVbU~t<>dVOmq$G7Us(U0^`BmU-}*abKVDy1A6~Crf9d+! zi9bx7o%rU&sfqUvTPAK9K0cA1@J?tZ_D-xD-nMS>#dXiDJG1Vgb?;i&T^CztTSu?k zzHVsz-$&Mse|Pvdp%j`7C$YsZb_ zN5<#I{xVFB{oB|-jxAk1q8|Ie*qg>mBYVbzW7m!y8k-&cA3T7$acfK;vmdWfZ6C}+XyPzfn!?&x3U z%Dzk{+vYOmK*g_6`c$%ai`9L8dxi1Dp5ID;p!V6Bw9?~OxV35u>DjIR`JhN;+PyQOmQKr<%VQdK*{eiug>i&D9}QDO?dMT?#6V)R%oHyq)ab48nmC7?(ACt&AJ8^Y5t97O|;zOxy za25~nw;vWR5AWx+X4SO}~msb-7i%Bf^<`V#m?`kpuTWKNOVNJPd z$sys*Ag^B8@~Hf2Z4j*3(moA4ddT@vaq>dR40jiVSHZ!kMtOw6CX zTH1I~WnDw7*<8q%3N0wRF|%Z=jVcX1(}Z`e;7=RXUh2x%iv5hr)kY21GO8Md5MwNi zOCufWR#I#{(dsZEQ#4wQ+t-WzjFdYy#M}c`C_- z#nvMVT}`VsfdM`i&}UQ*$*mNjx+%tx?HW{hmqP8P4oK=JTz51Xy~*!L>AIP!CVfma z0hNJt2v%=%#AU8Vsk%M8=y{{qJ~+5K&05r4(y6I(GJ5z%v6ta&GtJaoX-$PwXRC^s z>IYKwq&WbjX+xvtGb`%~Ml!;O!IUEeOSW`2h<}3N6k5+BH zUuwm_sA^9nr2P<_5@P!mY9-EaEG>9JYG9Y{u(^lhD~Lnw1u5 z&4%@j1y);U3wejTok*&Vo{>7Q(S(@Df}%s^8liTE-TYaxJOus_CT6xG(S4Cu1d8mn znMO^AE{SL7|Aq7D8HL&s}%q3GQyZ38Sbp>6ebSa<1R4Z$<$>_AC z144{D&%``j!>te5j5U^(tp6c-L`QjCOseWEM4~B%os--PA-Oq7Gq#wg5)Kp+OzIM8 z%?7)f5^YVXL%hmlRQu9X(jgMewOh2A^?JBmv6wI?_K0@xaxj39DLo(a7vlkKu*%L! zdoF0G)tF2KbiXFK&s@uEpAnaux43A@8tt)i&EXE19T!VW)|>TY;WTom16_U4QqIxW zh~Mi?#q~@AIRBP_(&CFH4>!c&@dnFrnq^aYM4_g%Ui!mQb$<~A8#bji7f*#-h14!d zhk1EJo$54z+UxZ!D(cb1p_{}%@HC2LI#oBA-QG423UKOvsXSg}SY58BG~2_$Je9ia zgHn0Wn_!{~k#MSz&^O!ZO`n#^xon5#8I!BhQu}F5V(yb-KRvdZwwtdkcoVINE~3~4 z)wU>{$;fIqF-*P@(<|+Uv^}@0EVkn=IyEf6;0jY+@T1o<+X7;_t0iyHoaJItme@f+)35KLbJw-dUg#~$XBrcXa8xEMa)NI9Chrdsr zn!G_OSA{7$7pto3^+28 z3hhPGALtu)N}1MpB08@*QA>?%5zFlrca2S{yUDaK>2KQ-2V+us$ycV_4PBiNTeZzZ zZsVJ!@?xsSq}y&?O&8TT-Sqm!k1Y#SHP+7*9hC@gQt_&bZW5==9&uUJ_A0~Lf_6R} zo3%*Q(MKxeX@uRrI-Cp%(tSi}kI|K!s6by!h9lC zGzMBhzCzDRu32-+STQ@i9=WT{20Lo@CyV0mnj@J7IxDYo`JhorYndx01!NA#YgEM@ z4lgKk#s!8N{i9T$cN-~f-S__q`wlR>%4+R7(`Paz$z;+K2xKOq7|t%Ig_hHM-}^KW zIKB6NL2RIw%!@o`gXMNZRsUq0T@g(^CV(0y4_BosD6snn)is(7QJik@|oBxl-ovd5|e8NbyM z=)}%GZ&mIHlWBw)-Fa&w64#u%N0MvZ5%84C*@(B|w#g~I^t`bbBFUc1+ggbmQW0HF zeVR168zThnH6~hSWi;efnpCG85Dgh!E)^YUSz7wGCjvs;E#u;c8R@)I!&qs1)-6|9 zb9E3uUJP48wlEGX~lHYOvP#eK|m}XYBl8#-FalDc&wOFTnVUMQPPD zJ`HJC6D5K*g%S$2c;>N(WESSu>bO(?hD_ZTz7iVce*bD<6MqE>TcdMw*_Q-v;0KYK ztKgNL(%is zvduX6=Y!1B>>4RxB6lrw=WM%rg8%6!FWxER%I7hs?xc7b4i&|dxkSU}EjnWnT_EHN zSlobV5KcEAJ`bO>R>d8g-imYB4VqDY`g{gxBh-T{C#<-vx>C?!tHkJRz}d`X#P;c3 zz<_Xgjf&gTJs+gD7vLnEmmm1oG1->s{}`H-;ky6g*r7So%OgAyh!`&xF~c*OuqLtVi<=h`Bu@GXexXyPZGBz#!pR#S4JHA{MAF z*CUjayrM@G2;qpbf_uRR69Zz-+q`s%yJ6q(DDSl6Omml)A3ITspfT=K(KQq0@>8jt z-=g3S%F$ATVs67(K$4YfHje_B>!MBkU2+DA#!7zlM3c94X(B{WnusZ=G-pdnin~e$ zLxW<#0DN$Xe@4|mnC1l#U$Hin$xO>a_NbOy;n3MBRwEqeEpi<*2E~AmyYg$lU*gK& zUK-~PyoX)ne`JO+3W=ACuMuoY|GUb~3*f_IXYUk|CPZfv?sP3!E5)oD?gk@jYe39J zA5b70_q^~{e%K^bxRMu8k;Q&pDUoR(mC$8<=Bz8$iDU&6$OU$wlmj}>`{dqb{*+H# z3^c}lF6QhFEh3Gqkyc91T7tA!10L&y3&++2Vv)o8S=l9{{81Nkp=_HFU78xA5nCFf zN1mGbx9KN_r>1sJq{lezhQPK{hlbFpW=~XOEmWW)h$ZG3Q!8!J1NZi*ZEAsgMawMA z59qj~kG*q=Kcr(W0sjZT0jc{^s&LiTFeyV=l4bmCBFycL;apy`Mkpp^e}4v%0WKzl zZ#)WPz(Dvy_D-b5Is%=z__OO0_}Kv+kmSGE$8FleeP0n7<%7xbw64khMYqb$KuM!m(3E`P;H^1G^}GBg!GZZ#J{B0O9KvE5WeEMnwtk&pDK1 zK+GN6bN$lI-`|KY$)gK<#IMfpdU_?xV73fskghH#X1_>3VxGUA_}+B1+B@>T`-{Nr;}4=QjX+c zizk$cn>%&|_jnWEIVj~vTc{!-mSb)+XKe`j=psdhV|J6q0cKT(6yDm*eXz}}pC8b1 z8=e|p=AUUZPEd5^8s%2T+R`~XWq_;XxpTWH>{=o7u))do?rnW)H~pKagTQ+@W_f0CW=QGXP2o01Cp@1K&ju0E(oM;HpVy$)}mRLT8u+__pc+ukRH=ZaRqFzB)_ z(nv=PrmPEDbqMvfxpS^(w(bQL-D@{}-sDk!!xQQgfu`$GOHMQ3Go-7TAWK9MfyV@( zZNcOcs`_MF?n>Lu0sax!-gEnbu(4a@%=jh?Q0j-b4_RiepZ?+0?uppgCrADu#K{lr zzRJa)3dbZ)UhY`jo}(IF%9!$*l(eqEy>b(V+klwcW9?$~_Z6fcWIn*)aJ*8#{!eWiN>1@FT=nWH`m$b30Zx17fWFj`fpSM){c!3$C%LQ6oLDZLzf#>4d+K0HX9A_@MzYZnR#y z#9#lO+lBb|M;P!nDEZwethgZSWKtnLRbv^2so1cm0KUA~fQb{`s-*k9~gZ17oeR(AdG*Z;cGiojP~H?5E~_Fnir>VQlBD zYgRsa$Lz+LKaadH^WQT^W^Nn(8m{A9BJ0gvJacH|mbu~KpUs>$GrI0qvRfx(qnWu| z*ZseBpBeeWy7!Gl)|J+IWEZR>*KL~q%k+9ardvW-{)b+!;smcU1a^940iXJ_Cc>U5dw$Q~Sa41Z$ezea7N{~UdG(lEI^IXUs0 ziN_}Hp15J676w|Hvo{Io6($et*BiClIr*-`6Dwfxv;x;fP_F8n@?DSa8aaO${s;~d zTt;TV%b3}ABxuS5*SfIlYmycq61e}IizC>L%iatNtZHw2>vmBaC!IL~Ixmb6cpt_e z&fiLI`Gur~mjh&5Zp8%BJYc~fp8!{;Gh4sfR|kz97a*X+y+{E+46-6G9AciFnU%C{ zXD?176#$_1t~~MxGGQiDT=>0cI!{823+x3T&1lI;5rA}HZreQ}X*(_;VK|Ed_Kda{ zSpiHOs7BjcE?IpU2@*i`3Af$m2+;P@xQdNZo24HHT1Oa&`vD+~h7|z1&%k_p(I~x3 z0X!D?u4xopi@V^qBEG!6Wu2%kAntBM9fT2gN4h}|#l#89%4TBKGmi zu=Lool4-yPhS3nf_(28*VEaj+-4!+uiCW;`VG6{L;oH(}7s8adDNiqobt!zUK?|fj z%vNRq^7d>+7a1rneysoQ3X@0bgD)pc%wVL$4;PRd;H7tcTKZuHurfgGmEVD^F_ zVnB88>WNx`_p z@)Z{om!m5HEKooK(PekmCDWkKvI2^r0C3_0GFIY*i!sV~divU+vF9Y&o(s=o>43ig zM(l;jg{1gy1i0j0RI#^%c?L|FK7d5I3Ol|jYLSy+2E00HY`dAl3KBNb0H$fV2yR1`FN!}L5He8E?}eU?(=m)^XU^H#zPzf%yFC{PG)lAZ zukh8*?xr&&EruWlXU~>}51~K~mdBI5**jLXVP?gPbsQEOW`XnA+jjM|ospfZYWxrh zv`9#Gz>hEz=qK%UTO=*Ud>Zu-Mz2W&(WZb@8DDW`aaHRIqAp0_^22F4fm9E8Yx&$Y zJ4eo!xf!;H5d^L>bXz;)%esSbG^ny|;=6*@EBc=x@^~05%rLA+0+P1tVw@cT5flsn zvTn z?S=Q8&?2`9t{#PTQcmMGg_&S01d2Z5iOGh#yUl8aJ5 zLp`9W(4Z&)x_=I%tY}>6Zu*`0asjjte^+mUhB(yYS=V2|>F8q@fNdc!7l~ zct0J6r$CTrDvZ8UdKt}wk;O#dU*jY?I2y&4nYmZe0%=X)(`GU7GuYo?C}5Tz<|Qq< zeg>H0c~};Df)iMEPI~S^QJVqUQF;Z=92*0J7Nq4)bTn2mKP;)?PtnFgw>JQ^1bKO` zoGB+0XIK0fx@$fnB#0T{c?GCFCX!wFrTA_d?jGn-xONGK9=Q|Kzu;@ve_>S%wjR_6 z*c8c?2#8*QR*R`#DkUZumf4Zvedno|t zAR80CAl(%{VCwc=BP-$x3Vj@I7n4-bsBjsCX)G*XxLJHT0kTP9=LWPvEP#Y2f-}j; z&R^9!4JasP64WDw(S)B!Q*)0=TKHw88VYl6P^fAA+cUP;%}d&>3sW0XCA~rwV*}|# zs$`}xd6A?>)e3ygc>(072ozoHtX;*Ct3|EQzSfQ_$f5_K`{LaQc*MsJNm`5o?4Wa| z0-(*YKEvV;S(oc6NsB!;S|5G``*v2?>^2M9qd@-R`(OI5DOUqO0MBJof%McrA1`U3SbM{xD$pnKVj{@eGJVuw;`$mg|s$;SSPtAVUTJuMgZ{-STQV!@L5*Hy5x%VvcLmMfh8KtHzSEohTK(GcK*c^ zTES%oZCJnvh{>pO)Ywelfna9FL>&NewG)0r@E=%jVk#PwmIT7W){CWZ8qBAdLWL&7 zievm~(QXu72Jjsw7x;lVHfVut1Sp~7 z&-GshY?ZJ-LNynhSXT<80o9(HHA-4AW1t6s+slQGkbu((kSlt}hUi?qs?8ZP(^WO+z5xfJ?oT3EGoa$4FUt0E58cgf;XnIHA+qJ=Ut^M>8H=h$ zm{cimJn74KOe)dNx$lRa0UdYv{;w=?-TsPo!XHapb>y2su4F&rw5 zeU{lYw^qaL`R3zGyz{fdv6PB`3l2-faG{o1#99- z*|mUaoxWan?SyRRvdJewgL;tw=~NM*c6e|qNDwoYVy4ur7G0H)sniRw8Scsl@QJ5< z9_MBQD(?8P%?K+@1h?^5d>$Vv#8#CkrFe#yPBctms^{#``c48F&61(tehG#KbR4nw zQveuqD95?o`M?5i`?3&YaPo>1-Kb3>i#nWPBYNa1)>S#7P|I^`rQGq`*DrDZ{#0Rt zds-IU$p85Pq4GWaYqS#`HD(4v=eK7pVP7mlsruh`8hJpj(a6=WJ6hEbJjuzP(JgbA z@n?>4mtB)V==EN~w1O9a(>3DxJeegbz{@ZiV}v7@(5l61d-yBN!iM6Yj=%k(f_Ox~ z{~_j-9WGvu4;7;^-HiLkV%Nh)!k@7 z89_E?TiGa7jUYVbWq!89Q!i}oyr=OhKJ#@}QV(hMw9}bV) zs9of~@^xl*gRWU*DO#;0E8$MN%@|bN(_e=#8W3}``{!}E`}Od4-t`T!AumM1L^vp) zx?xrk{$SUWumGt|L2&jtetG?%n7i`%BCh_F0-O0S&+*272fYAB#12}GCaP7!8&ftj zmAW%lig9BT{PO&O82A6imiS92__t!5(ERx)Jb_Ye4tp|$wUjM1ZOH!N_Iw*%a;=m* z{+G`p@xwSd&i_r3Mz%zs6Y%hNm^0QVv|1Z3wAS0zd_7f&d%35-gGv~Xa#6)odjY@e z8Reek-Z#ph`(42oATV?g#SjBSs$?q=qkJ)jvgdT_T82wKjwTwE^0L36$6X-cIQ6hE ziX}tsX0e#k=PmMDrl2tdOo+sJ&qn}LgZdERMD`8OFxQt2gKZ-FP^u=AAJmkC?ENfGmN+rfdxyzqK^$&_U?GGzwaNmoAU+#BLiop&L zy-NKsrtK&cWG|Ca9j5A7&?Ee!}K21AW9 z(tf{HYe(`jcf+g9Chm7nBN+S!)$xVVecbo&XE$?>|6%^c9XjaW&sBcR?7~E8I8i8t zw^Im^#cVI7Mku1lUD?JYaO4SQasCaOPg#(a^64#8+`az{F7Ug405<}!3!rVOYy^?i zR>&r0Bpp#rTaR3VCyt>n42Z>C0wHS4d7cU{@TUI~J(>x2q=Y7U3UDVzHf|~zIx#;$ z=0Ede*s-n^bAP<;qJH#ul%M>+?9_f_VZtR zhPhj|6`Pxro_cfFK8rx!NwvIe73fJqd`2{n(c+y9J+WM|7 z0?7M&WLvSa#=F=b;is|4#W|7>%US@&!v>;$C)Eld@lrJM^s7p@POXMTv4;dig>WkD z6BvLIAIRjeW91GNrZ#ce=a`L)Cw+pu@6lerI9JH_Ou|;Ye=`r{wm7kpJF&S!JR0j@ zlW^o+;Isv#FI@B+W?|zSp8%)i<}*Y%T5j9#P(#8B8t1auG2u9l#Az2I&^R=ggISf? zvRAeCLf%QA^au0V7jodKP8rnJi)v3`5#aK-CBE&=RJV39PJWtN$Y^MlI-e|KJjK>;&}bVznGn)bA;>;!MWWA=jP%q_z7{% zU6&^u4O-928@{e0lV}mbPb_e|o-nQgGk5Ca*DN-TJDmvm2wN!uzV8fRhRGOfBUMi#!&HA z{GPZ{?{!SJF4Vw*hi_*&CVw~b@Gy2(AAOo0p1hO4ukzOeW4kex3wYWhE@LD_J1L4uI6Ml6 znND}IVnzStPgp~~LC4GfEalS}UP3;N)*num=v<1WDt?8@7LJSW-t-b?fI%HsT|_N^ zC_2jj^d%wkY~vY}A>VIon=VP0NpDZlO!eAICaU0WnPHdb){42~kL^e7dhyTO_^DYI z`BIGvQ#aF2m$Mg*;G6`A_=!1od452Q5HO%f#nnvZ>QVk%bL>HMT@^0?rHhqbuGSoG zg7)MrCQ6UPC2-aVZo&HkDt$o5-FSOqANTO}yT|yCydcD~yE(VLOoaU@k0Pn>bXHx; z%!_z;K*t@{U@pC5F}R&CzKD({tsS01h98!#PfTr{xMb|(BM-}-;)!F|97P#pynqWU zu8MoOs)8i^WP;W+`C`+XorEW0?Qfjk4=E45|wJ*`p}4kf~K4W6#=P z$Xc^$GOvvUadhMk=o8#MV`$p}F)|ruIxDg8RudUKh34DpTXDEUv!%b#L+*G#%JqB4NH%4H5K-^C#;l6*mb_YLk5t?FG zfPX7YyuA+wY*ZTCMlz8iGi@e>)NwU;+6I^y5OYNR5+n>C^=;!nuz>~fMv&I$Jp@Cj zD@A+48jWSR>Z$DJ-K2(o-Q9Ejz*F3fUoT-XR6k=UUs+&5HNxhK4lNN!UJhHX+G;-T z#;xoY?)gpZ`uPDBci+92gU|S?GuQF1MZCJ9WH4GhRNNcz$c@Tc61?p~0l3FDq4?b%P3%12D56EbVG$oQMTN`vq>!zv>OC(WOaPQxW?;j9j+x3EEVtkum zBF0~eDilXhF_z2p=$6*$$d_VaMP11ix3f#@2gTgs+w3;}x7$&D>yx2K%S^ZwL37bt zRAPJX-O28oACPi4&OC1C|7#~}k!|Upt_^ubBBoDGzjN}Oac;;vCiIDeyRY`&idL*cj(6vGbcw z_Q)+yJbQ>c^|uS2H$kJ9{mS?6+lfnPj%=a4Y( zm1nZxIz-IY4d&zs;{8~2BlFJKb>Wbm`^1?nm_<&i<)UNRH)8;Jtva@!jq1R$F5=6G z-w5kqtXHx47C4jI!rabM))fuIqg z6r5aRbq&l7-@wgpUhC{g76!Q+$HZ|!56Ythjq-$B9zZp-@yv!c`iN=JL0M`Zmqkc zv?&s@A%<@VRg?SVc zXBXb6sv2kZ3*g;b`7it7neiP09JJ_qOHNHVPU$FXf^ZfTZc|45{eK4V9RoVf`)TkJ z_i2DH4GLxOn)Pm_9Ta+GC(+6z#40$2l9QzT_1<&sV;}+c;o1i{iGlp&+{hDQ)XA<8 zpN11T^_e>y;_>UKI;14d~HtCdSowQswaou41jamTJ&kUa6z7YqK(#e)$^s@kf7 zw(96=FB}b!>a;DA5I^lLEIw^Ohl61oKCKRX^J`faS0f^P7UfyjU%Z*))k2qQ8*wG6 z*a$?xJ%I8cTYjxrq#b~F-p+sF609#adWQwV*0E!gXH0!9pb?}fR*jex%z3~z5sON1V{*eP%P=JQy)*UBkNP38{0gXinm4p#{7V?6S>(dp! zcQf~Rik)9XaOaJWaL;b9k|LY;g=yCCCeHBIG`tdX>(&!AE(2}3+RoQrhV~iI_1jr; z^OwX}54Vzo13{WbKb8cB_X38wKobX|RHQtkyx?NZ3B&!QkKA&X;s5ecngzMu&z zunS;TIoT83@mFR+Fn{{No!ldZH?8AsMfT1&SyG&$AxOpRh`017TU|(nexS^HH|B<> zuOC|&|6lC0E&=DsAz6+`|MkIt`S=C~nRw(EwVUk#muR=jeszn|6g9#iTi`Cf9*$^G zCqRoyuv=ffzV8X$d>xj=L%*EQ8qrZ9zqOk3(V0%YKU^2M+pAcQ59l}|cpSs^3GfQM zT4ixQEv>H z7Rt*@3b8cTUCu7dW!9*0elpUBpxewpcR8FHLOxYk5$79&w_=F|bsm>C9s|xhIKqYI z(l=pct%^H#-+Nw;!vwPu;1 z7?a=c3Lw>>KTR!gv)ACq26f!=SHZyj@I#?3eBm1O4&2M>;rqp2W=O{>QL0)e0{M_H z?`VnNpS%iGzp)9(Yqm5|Bzuj z;cD8HV$I%pJFE=ounVi<#6q}aC;PB4+q!uHJ5DT2prZ>Xs9Z6kQW)hHH6=Ne>)r=D z13K=?4k&e3Z|*Mgzj+^ubWk9wxM?^sH2k7ORq@gJYv(KTq4`7e`;kcg*SX_;Xs-{> zy%WG*%-ngyADCO3o1J}W_9r**{@Iq5hi5)HoS3;`rZW>A{+}7^3^B8PW_aCi*FCZB z%j-V2?!D{k>n>WSUw0OA-d~;m<@A3}KQMjA^t-1^(}C#=rkAJZr(T}=>C~fB_e|Y7 zb;VS6$~$%L)ag?*!}_Rq0j4Sxg4{71$Ig%UkjT{`A z9yv{L;Y#tY_e#O9C`ai;v82pdo1`9&Rz&tX&q_xs?EA$+Nc3yS(q90)j+-!qT+O!0;$&#W=^~I)A-fXGnCX@UNr1^x2A6j?jfkbm z>d7vh$=0-POD~a3=f++U?PqoBxFt&D>_(4Y8BU*>5FgKUeJojZRO<>&M{Ot7r|Bhm zGY}z~HC7quWx8IFi5%*K!xSN*zzyvzC@79o?^u!33$C92M=P(^eDFX*s=Wr7K+R5hEXy zlWb@Me((C(`$vi|IP5g(+Gwij}gqwFx$>eYxYO0IuK zvZBi=s1-mp7(=>bwpmp;zPPHut#vzX_GFuBhqa!xe@>LAvQ(4wlTA}C7zHn5@=Osp zq>zerql7)}PNfMJ5Xjjv5rLtQqQJ4EVKwet(qb$s3j1FXiTQbiM0k@zTv;oV z7PC1PuxWcOZRQkOdY&pXBt@x<93^t0wBpsw$hRJm~MLZN$Ghb zQ%T$X+HAF}wWqQ(B6v+9N(B>?+=^QuZDZCD)NJ~^WQQ<02)WW~PldCpR#4;mrznpE zt7WR;#0~Fq3Q%Rqp3e}yF@soLWm6z zM7RkOp)Laoj;iWH5f26mgNX`uJNZ;kXE$bJE{9~uQHmmBqn2x%Av$c&k325^Zpa!; z%bUKcSsRMjLeaOJDLrm*bm(MF(`_gfp155_8zs3u=paHFA<;0S_oef*8OT9FPzdIo zc{-X&b#wqFh&G}Zib&~&U>Z3*c0HM8jM})jtUM^SEs}HVbhTU6$W``kz>^;OtyrF* z)0Shrk&r;B3N%H#xa!bOr$Mds@1GnFIA*AAD865 zkd1KLg57$um8-@H_vw<{l`4`}08#36s&YN0nf;z5S9)B8CeiJ&bytC~N7qSRpCv(U zVAqH9L{w8tBPmD#d=u)Q1^hc5ZTpkBr4)tpaeeX}m|-dgtwpUi1e{5$(UqC}jr4ei>Jokrn6F%A0F9zOv~J7hWCa8_JCTdb`*MJYY5 zu9(<>jZU?7DVv$xzfFAH*J#j$ldz_PVXMbaXY>j2abMZ0FlE_@r)Wzyt=X0BO6mEu zF+_Sy1~*k{d8?kB_1lu%kK5YTbc3r02l|PW#j?Z%|`f=|aNsdBYy%js*SN>O>iKB=HU zOY^$Db%ooe^3`Z%OSI$dbXc-m@2aYSjI9!gFMUdqmkTAL752F*@&ZtSl(Pj%9?u7; zv`rP#wrgo!CTozEo1RoALAU)YbfOZXlJ!`c6afqio`elK-!aBb=TwNM&|0r($Yby6 zXe>3OR-4`8GvxP3{n=yo%4tKxt>~Gu7IR!hULls>Lu;BjjiIS2IMkg;^gOA4+;Ov; zWRhu`46rRlZY8%Y!aEkQ9Hxm>P$4g8fykLZ@Qi52Z8m_0xa7zJ7(&TVOA1l!Dh2iB zMkrg%);%e`V%xvOLb?*gC{;46-3CX3ErXNw$CBKS`zoGdOsP%g3Uv=X^P(hQAs7o0 z^yW;yM7p9is*HDt_MOe5JI; zZu9238}35J!CEP|fh?cMOy9zfeGdEQU7jNX+LgGe48w(!cRh9!Uj#kdy--5>9hGM`S1L`VwwekuWeRxwC3_nd`z46rvzEAMp`P}>Zcvx@M!}&@zZe5u!X;l>wnsjVbrsD5@crm z*rYgOno8DFO$6d%4PAW`%nYays|+6Ee|eJ-?{M=g_z3aDqv1{ZVnmRR#F|#Ela@+y z%Lj3=JfIQ_(uZca^n*fMsd)i3O+-j=*G=vQ(avjQJu0qF0&=E*wAZ`?l`)_bfoBBd z8V<-c8*jOG_#ij`5%zEE=S(A>vAxrWCm$bwWu_s!T~wK@@>>!DI$%Y$D<3IdvL{DhfIvf(Zh%2tQ8)2_1KDt3v- zKf`WX{|42bsmOlrvLF(U<)0O5&v#@3cEkhdf;t~=5jsuJq@gn5RIVSv2QJj7P@DlB zM?8u<46Etg3;e~O7S4_Z&@r)>hUm00NF@UfL$%8GLS3;)@Aw$IX?{S3dkDXMEwz4; zKmIYq!!~#tSzV3_=DlWfI%bH-6JpKyKaQdd=s03x-|MsL@Bg@PHt0SwiGC#(rf%=# z{S|96Qd23j6%8%gTK*)C_SUMnKem7!_gWVHHJ=oY)LcgdJT~#n7r?lnx7DWO4woY3 zZrK6aA+*@%4&(52PzU1ki!R{j?i3EOl}7|LH8D-ppU4Efq+jhx#avmM$#RFUgNfGN zXs$P?uG~Gcm&cV8i)`bSLvzOQf6O#S0@ELxJT`Ww>`I|aWznU)M-c0m#*i^#O7=*5 z(nwVlxl&ILV5o1w&3yL%VGs@Iz~jsIYkrLT=}2f3KlN?2A$->Q6Rqf_a;X4WsuX(i zpxg}LZtn1XFm^T%V*@&5r*f}l*>2+hjTdrk+(#B*OdOjDOEVy+if(|yI)YYf6KvJ@ zA+2ao%w2g$3E97Yx@-%->GK$v=;?DOJVdrvNY>S)UvBpVTK+h4$b@j(_rJuhpIfWq zWST#`J~3MUWxcMBGmXdw6i&aKyKxWmt0&`&UxqlsDH_ok90r~C1{u%g~kgSby_eH^Xsg4NXZeoI3-J`B_ zX@|SU>U(TiO15#@Ihhthtgr08 zDsTjWJ1H|L3Q{-J7TGcyY&J(bmKCF;7awKk)(`6Xuwk4$d+ApG!J|lfLSNVnLth?@JuHxLIN5OY^Pgy;j3;I{FxZ;H-p5hg@ul{Zm2KbGW7+}*Ur zNX*LU=*#m1V(z{_eRLmp!&SH{rF>K{;W{D!lt~E#r6duhtb`}zNchqPU^t=_i>Fc~ zEtkJ8V?rNa`&=K;QA{qp;p;;6$ByiTO)>LFtMRlgL`+3%m24s6tK~TLGw9`mVy=3X z!oolJ3@Qe>dq;Mhct0Fb*D0cC4a8!daJ!dHbNTP!{XsEzwBxt%zy6Mp_e4`wPl8}7 zOxdT6=Ibts^FD@}7!Y$uUwO*HKmHgSLdH3%0pVnX(7Q_wSG}22bE?PjBZFe@*t_;R zxbI*7zoYzDA4exy7-Ge2qt7DSh#ddm5IZ(3^pf*;UG2Md@8mgBx=}b0@U=9`RMi3y zYj9d}_r%y>@7PSx1NUDTtdpkqTXlB8%x@_BT-Q{*=B%~1;t;*3Sq5=m%Zbn`(>Q+ zH*91P*e^j`5I3*_N{j#`fCT?Ecl1ZXN)ZL-zVaJ(!={rx#L3PY#Su!6 z{yTPNivR#p^dV&c_r`NT0Kjzu04^vv?PExa_56-qSUl+y{EeSF7rE`@&m;395)_DQ zbhw6qOT2(|0R9_p$QN=aY>aW{=h@lKCx4DRe0zH7{u{0@00u0@j@|MCJGMb)92))C z+}@GXXDs7CnZ7}0d8C_3OCLcQ?B%<8)86 zyHKI0qC%(oIYM$pGuI~k;efB6c4*TL?((PEeRFGt0wkxLd*Svo0O|QODrQIM$nFyc z2FAsS5d&1(AER*x)%V$|=kx#hV_4ZLrc}CzX78EVJmj8UnS9Im2ZldB`VYa$sdmH3 z?H6)b(Cmx)fiAMzeV%^tO}dYiadY>dS?BJnnOkvJ_S(1f4bfJw!c4R6tgoz6#A-n$ zcgjob=2Hm`C4c>W&%wu#o}Yyy486#@xxfFJo!tU7C*WTJ>Ld-=1mH^K1Zkw8?QBN=GISyJO9U6pW1WQsxQPK1kQrM0|js(Qh*QwCJn%2gu%1OefKZy#)XqS zz&-n$Yox5E^Iv{b*LTay$haBoY%y_IUiw#d{Tn(WFMD1Kk4L`32Dcy)s2B-`0iXh; zF9wKC0vrzMPW4lM3(;paraq{cJ<{;Sjd4L?0eBNLulKPsQRBFiA@@4gdk8v`E z?+~w@3fPgga^$tE^AW4R6E0>=A)UF>u2xgr@>pPLZmpCf_~%x06gB>h{B2`_{+b>m zN!p#!*;=4LDY{NWNvEuPJmNGpJrUS6w^qgNG3J(qq{&@;X(E8#h4YAjA0RHFHNjx7 zLwd_;OF7sxWRU!Ql`OD4KOh$KzLA``jsJ@*fPIWP~wKH;L--*o0CeR{r-Lccu<)Z=Q#fXLb z@-&PNsJJU{`rbb7k;^aG%I{hi2+KCq3V91dX5HC>G3@O2aJj+t9A>%?&jjY@2Xxp= zf1|%6fMcGR3+xmgr>~k}C+``X8969R3CRzx{&&+SzT4O+0spvN4s^k` z5R*s6h8)!dHm!ey3VF24+?KvvXX>d{9FvpT;cS<23!qUqvAIF zFuk8!|Do_^{=26O&FMNK;30^m@p}-Pqf3;kZLc<*rI3<)+u4DAb8Drj^RJ5ua6A&= z{K77pI8iUUwmYb&Y-v+E6Lh=$*s1hOa^Vt6GN9|9B67%D+sS`)N$8)hBj@0Q#7$E# zTktw<$*?cdv`|rNOf>V{{=kO0wJJ{bp6{I@q=+r@rZWOK!SEiDqcq|no383)6|}yn z^n*z_oNlE=GYk6y8`cl%xZ_*Du#bE8cyv48+=t>|{c!+>qz#zA$l6I;D(f!#*@y}# zs{POU@|pOo{92s|rMgN{yOrO07L2V-PrqyEL$dPdQoeX>1y>7;q`oXIVdLsQ?J z`rP#2r*58l`&4quIi;A|Jv}#LnUPO?Z}PtyUrhbP`MQJs5WB0Qm;IAh(N6C2n4 zdi?L>KL@ei7shX&TOPl9yfDtLJ8S&>@ul%Oky>x;zOfIkTNr!iSZ>TW{e`iEW2b?h zaPpyHM#!9~-fZ$Vax0$fnt;pA7$c_}K85=FVStZ1`i-OT+ISt`A={tX~&dr<>V2eAXO0 zyh-*C*)L`PDSJ@%k-2xtu9-hJ|E2kl&A)fPK7Y}?-ZcI5`LpIXP5yrBrMVB!y}ItY zxnIux=iL14%duR%}S@rCxvy(F~%=~EPk(p0{3HE&CR9!ZC zU~==szi!kn46nPB^B(=tjunOgdfze00v5J zeY77SU@YdYrQxy$6Y93dYEw+#D~ipfNRKe+T3LrH?~g?<5Rcs%bF7@D6n3L7sMR(i zdF7lKmtf2)O^zxBaw{57tnPK1$>lpmJEo4+txf8k=}a`L%EV`%mc+GsH0@P3yTM#k zU(0F4U=CxdC~73>PRR3ZTZ=R$l_F=8Fw2%`ldcr=RO|ItgkJi!_)*4ELQmxBN>FQJ zqh4F=&`MlVfT0d~^T9$k#;6#II3Q*lFvdW>M>ebub6!Q+8ddeiOU3dS>NYizwA#pe z*3-3X78WJ3A{`~ePHRRH_M5VHwPeLWASh>vcgh7zzSF5^&)h8js)1N>IticMUP$_r zK^vJlc%^7ZZw_g}1ERKCbXtw3zVNL0ysnn8Q6_uF=E;FTCJ;Yhm*gyw0W*+0%DO^D zc{{fCTcR1AH`~&8%#Lu^p3A2dGh)&bqiyF^G!sn(f{GOt!{!tR&kàlXs$8L^! zm94TovA-^w*E%d-sz*BQAzhYk`4h6|B)K7}r0AHVnUvEWizBwnBgyq~GZi!dF}UH4 zgNJN*QIgZqGL>yb!YT!$i9}MnzrT4!h@di>9-sgPFgtI%U}~mjRO0iRYE40;t@Wxh z$heiA0zE6qbN&onGdo*Kt&XkJ)Up^WVl*jZo-`E#&aSsa0kLdnTY5fe#Zz7YvF7d8 zP&BzLrm8R+XKO`6%ax4^Wd{v%R;B)%^n#`5qp}reB~4^|tTVY~k61q%Gt(&IRM?wR zHImuH93zPh>3|BHZW*Q9uac*C{XbExRsn>E)pkix;OWfDy&n;cgO<@m_@Y*I+Tbm( zggvR#LZU)d%0x(0qmZkYQ*N&^KXz1-8ypl}k*nf~IGrpTi3`LCDx*>rT7){JG1A$X zPR-J^)Z0|FH9;l(xnR)MbU9+=uv9%t*4(8%8eP1l^+uI)l?;i60#z5NZPZRG+N%|l zR+Y2tOf3CL`~XGM+%36k+F%{#O4&uTSRO?{r>2zNZaZLbgj(s`zK0e^h$%gzFoQYF zU~MP#0lBT7h)PfEdj+Zxs~Cd8ip}edk;{@??st;8l~zur)>~AmmTJG4pvcf!@L#d$ zeo;A{b>`hhfv=w{w~Ev2&CWyf(COCsfF}LPP9)s%%z^PR?IsR)w&~f`a|O5WT{~%6Hzwd zbqitJ!n)^0`3mXrf!-{nv1({{uR}!7{GMosbQX;EqN8Y{966=0uxGm@wi?>twCid! zfn+UZ8`~tACu&Y)$mkq7Rje6f7dRpW)N*GTeOI7qVPvU)|; zv%8hS>>;Uh5Ho9j`lm)v~o%Cu-l#j+hYtxVM0 znrH14C`!$j8&R+ZJk1#4n*=*d)ppsXlvFFz zqwkmG#axN9WAJOknNB2A*r}J~cnC~ij3X6j(QGAs_P3KP3T+^-Y&c1eRgSv8Cz@F?MH*$2 z45lk?6+k6)luOJ9W8~gehYpm}mAJ-LXvvjl9~NJbJ2OTy=LuMiQ7WU;7B+7bXmLR9jMp=lAv3CAszFO zxVYZzYD1uqCCGclA8@5YE%2rqD{&A-w$*XfK}jChXQ;N)7_(LK)=W3GS(+SN;SfV~ zE4>J5Nhp0fl|uAdjLQ=7lX+nGCe_|ZV8x;!R)4^ZBfAzED|WgW513fTi{cMB+f6r_ zP9_Y-vV&qY(ee5xd+t#wkpS~e3R660OT&H!`Sj`xb?ap-HUjK8A^HC;Zd zrmoq4vnZ#+M6}tqhioN_&ti(|O`;itCaUj8eg%*m0D6;q%^^#iEPHzT3$3}$C8dRc7koVm3o9NI7E*I{3w;2 zPBl95ED`l9n;NZ{fW$b|HijzH8dSs|O=x49QIQLn`TvZ437BJ5m4B!9uCA`7yQ`}A z1?ZyLllQW+G-ThC%KDNtTPjIquOyX9Wf6_o3W~zOAlya~1qBrurBzIoAkyQ4AfqyZ z3&SuljDKYY9T0aB|G)d*>*}sY^=N-zf8F0b@7>&Y@44rmd+#~FpNnyo4dF(?Wc9mM z4dvc%h}9>2amKyqXouOb#;&%p=L_+`LC2!o8*DbrdR^62v=mMkC$VGR*ic%aJ?er( zr$B<~iREU4ot=qk7Oe3)BTuU~?h?z{VxH9?M=)qs zN8$;lt^K4Ru!nS2*6g>{Y&uWLG^1YsmeAMspe>e;<(xjRyk^kHH=QdMI~TGG4uh#- zHY9?r!r*SP7Ns%EWRr2P&s?+Hr`5eea9q&fL=3AUk`L9JR;N9u?>Zh-HQKws?~eoj zB6}zBKHoohPdBo@X;c*re$lQRi#Q7lPM<>M@fOM!pzdhm!ui3nB0MrGm64}!SP;`4 zCmEb*ASmGCm5MyBT;0U_)Qv0{U$Y9Oa4~ne2j@i+5jpxCA|6g;IepC&rb*<}ORAO1 zZ1qq~%j7*iRWml5Od~o2ry5hE(qbaJJqUubKxjwjHVr))nO;(_)X_}a9VMi1Ss7Q+ ztF3Es%u0`*u2$iQMJgjlpGscRc~nI|%D1FJ9l|k<7N_hvr6yJh2mRC2bI5c&h=c48 zv8dv0A|6EW1nu4{Y#4DIGfNktGT~BsTEiyhShdxl^fYr$M~fl^P|(#Bq^CgkvYgfzD$G!xkA*XNRK0=MFs7 z_j2#Z;C0;xPo&OHFHtZ!A;QPN>XF_N@uaeiq9fLrR?}O9&E(1}!<$DWGV=5olIC9= zyJ~yq(JOJ-xBIYr$%u-CW8^?n;tL5CeM}$TG$N4^+2bJh;rW67phr`olX`rtFnl)E zY%AuPo1dOhRgG2PxYGNPJvup~P@KeNWnBFjP+6KHoYwbm4NZ1FX$}J#AhRepm)XR; zvZ?ngJsBjc7H}-R#R~P7h{)^L$@yf!?VUv{Jw0?UUAl4{$~v4mZ!Mp!>B=<=>n!js zBCptRdbnCd^q<6S=O+#)COc+3)g+p#2Sal;%n(lMwo+Xbf)}mC9(4 z-U0IYtLa^%ksd>Omo7m^3x}Brof4GN4mQ^?hgEv}oJMHRjV>s-R0e*vePR~sD=zf( z4hoSe416=N7>Fud-h`s2v~n(WTBzn>2c2pX*{!et_ZdRMTUaz&Z3%s1x@+=9-QHdlmG@@xRZDU}@kkqj`uKjU_Ez89dw zIlbgu`S7Br09VebWU3|3?wZdDM(;Ks4%^=*f_*qZZhmNfyz@IBwKMJ|%Zgg)W^9hE z!k3y|G{>Euv`zS^M`Gd4qi+-40vs}A@d5yG?(yiR&W=N{o;ablp)z4mb&hZ~FjI3Y z(q)%L5#;agHj{BgEDWy}k+CPJrpD)c$py{WcxRCdBaU?1STZTtgrVRM)CvWwEh#kS zl?ZxRA|t-v%lCH>A`8${-x7s#6y{wfZV!SX9eY!4$>~{a@@lo2eCTp~k5opkJ^x$i z-`hglIKJMQm>K|b|T zDZGEvH`YLayQ5oi{Y)Osgx%!2G@SFb4!LnEQfM2 zJT?i$b-+r#jWL8=z8IdGSX+qby3kbT!PWpGIL>Z_N4EmRy$;OyED$)r7XfC8RtT)v z?iTSk!uxTHyOtD@Y$M0vYj(C!2{?HuEd}TYz@}gYDMv2a1OZfzm|Cc0Z7Df+Y_}Ln zGI~vT(|7OqwE%d)-Qsfg+dJBMtz)kt_hEgula-sEcCp6lpMPzd@5j}ZSM@< zGb*{c6EF2%cqjB-BH}OgIyavy2XWq)+hKa)I~4ETJg_V)_5FPCrf&T(d;G%JvqS;= zgv%?n&mA=|4R@$Dt20Hgc_HNlwCvn87F~%9K;a)hIZE+{G`&#sECo)?ZeSx6B4%ya zRL!t{kBZhcv0JOwoE$5sTm2BZd-JyQ1l-lJ8G5xgy+m;v1xu(l#Y;LQ8UWxeS;OUT zTxi`hIoi6_GE#X3fPODt15_D#K5Uh3_pLN5ZirSC_5eUntBtwVoKmPHl0qdC5xMs9 zckJ)nl?q=@eJw9)5N@&z!KNiuR)oBEli2|1VWEb%GN?f!B1d1k7XiZkyZb5L?szAj zrJdwm^5dHX6IiPnvr$D(Ys+bjQKsk z*F8qBfcMDA!E3`C$JA+L5wrS$b~f(KEYuJ=bosS#Fr~$~uhk$(n8t*D|5_S86knpK zh0SeVc$o|Fpv$KSRciLAA!eQj436%u@EIeLV)BU_ZgF-xcfrZrb@=L~L-|zCTVZx*EUr?TpIx_Y7s!d_!E=XB|d7pbBnz-b!Ybk=3 zRrr9Wxn$E^WgOFHdAVvSD=b8H7`4Bx^yr%x?C&5_brMaZo&VH(!+R0pz|rZ#*P~I) zM>LFLA=ixhy=*Z$L)O19ynj?$EWj|YfUGQ_ zW%X>{G-Jz>=dYvt0!cABdhClA5!dzMw}h6J-VfK_y%bt$nLZUT&nueqr8z(6tjc4; zjs2tV$71<5(bJW_Gs!>vEV7mC`#|_FLWRZ~R`g7}Zg^YwrlCuEemOWJ(+<41?>kh_ z_F}NZOEc)wHXn4?@EfPS5%;`a-^6$o8FKemVb=ceVMH`YMC9m;d%$>3Q3AQ!=*EUy zx)PCMGQOI%*Wk-;fls`84Myx{_L9!WZVAU^0GFR_=AxmQL^W3p`Q!<*?_T)h+i%4V zK_Viu_2El9ty{w`*-q^e#b^}LOB6QF7-w9zxl%A_bhh*){=M*-Ba%|`(v$ZKFe8+} zd^35}`ZZ*hd_Vm9PJ}TgR^md+pn5VRQM$6w;#?XSzc<2@)$Q|K`Y;;Bwuq)UM zo98UXk|W?Dl{e5C-fFm){KH4W8%HE^ayNT1KI-u^cXVF;2u5R9Vu{C{io zfp@W%^r_5q!2}8132l@Xle?b`*>1lA@GH;WiOql*v0lRlideTV)ZbIV@aO4FFZQDTEvf_h)wm;&x9jeJ)n63ArWX@=)VH55Gc%=yf*BY zE7c0^2@i1Xhl#A(Irulh8*jcZ+(+JZe;A>Pltjn}Xly{Ofl`LzH-ZSNMV;6QvUGoV zbn_Zd+}{0>OUZ*zSw_j(pF5>j^`6h6FC;oA>ZJ7nEP4_Vua2G3A5X!5-TnD62NXE? zd0_hi?=yTpkaIF%{sE0A?_W>7&A(prX@I3)sUY&swk!Uxuu9q+ZHlkcmhF*s{dM>& zT`vt9WQPXs0_p2lH+qKNF?7YyWrKZP_YR#ld~m2|qkQB)2Oin*|0rYZ#?Ng0_J$8p z##qW1JMi4_<&-ma;N64o8kp(jj+42rS5i9H-Wnxz?GN^=`?vM|dE}eJEkttd?fd%h zk-oe8+J`s(S6_-Jx7{Gy(|Z&owzu|vzk64&u6IYzUwZzd=a}r0t`XVmvLDJG8u|!$ zV~MQUb$wSBM7H1Pd0$Vu$KG>J&&KZm?S8uZOWn62LMGaMQSUF;PYnEF;|=S}V5a>A zm}~C@A?}YxTtiEgg%%vNl!5jcFxfi0&Kv0YpOl5~^-Zd~rnz zCQR&*K$^cv%FGfHn`vq2PBb zn(NUv=KmI+{5HziLEQ*`08qDqEEBY423Rk%a=awGOd=gDmmf7pWX zV^FApMl6~`-_ZU9XZZln&Id630(wbFhnfx*WurvbXZz=P8a#|KOe2lu1yCvo5J7}i zr(~jirwcy}(orz-fddrbw|STi1A50%9C@!O1%X@w$frrLx`H;<1U}$aqAu$_F2z@3 z@W65lA~{guVVI)IF`hDxLN&VEK|4?o0i_DQNKjdUw9Zl3a+UbSVApei;tUB2;3wtz ze6611hDSvy8Vf!?;7-Dlft3#TJf>u3{6>Qkx z**2JITl6Q8)>7Q~Zc)ro>R3u`27p6Qo`G2o?5yJ#9hZU!CWJZJ#;^PoClSpfGe?tan$^vpLW#V>|_fX^5V4`^P2GSL+= z>*YOKp=vPLVcYMf#JiLgngeGni1N06K#+P0INg90B#Io!dU3XZnEB@93u3d{IJ7sw z;AEh?h->G&E!5n_GweZM!K?|$&SDHxi4uSskm{0`kAF~nSpj}EuntmwQ5X{|utJMq zvQr9Du=@rnvn|Moi(qXtg~4xZmXCc)korNrM_C`+NG^i<&=)B{@F>qZiXR651o{FC zbPTM{Ag|u`HSC66q*SM2a2@;eeT(9|IKF}n1$Q5vsOT3E#Kto1-p43+A6ktu z1`{)wSSfD?>>BKTRCR^;E=V@PKit9+&49ZWtif~~dU+;H`YJF?!H@_7SC~YQ76N3| z-q`Y&BaHJ|_DMv2VUKl{8@2i5e?ZW_q#5{=8FyvCeA;U)(vYTEO#6V;L**7c- zCb%9n$DrlLkFP(jTQFxCOcl6MpcQn3{S|Yyxv43>i?s%HreH~gbt*!8soJvxheav) z^q^X85N$$Fpxk!QYQ{2~-?t)$zXa2OZUOZqXcj#n>l{;w(hT69>CA1wpo7Gma&SlM zn|26N{47s-4WdEHpGa}1F&6zic_U9#OV>0UDFV$o(+0aAS`t-_9T8rpyos25~L2;Vmf_6{SLK&WdR{;sIl#1;t#{D0Ye%To?sFLVF^u`C=|wdqC@yq zaQ!HEXa{_aB_LNNth6-?%)7Lf8_kx!5<0D0&aKF-^MzdhHso!psV0<=oJ$tp=v!ie`%FI zG!1mpVAX~%QeXc=@nw9m2Sk)HXtWO=3gw2uYApI6b}&8KS*%NxFBEgmjd=>*?LpyP z%uh5LjsfT~+jM&Zn+UGgU4jWftD{()@dBnZR^=iHGjsV?m*@tdYAjtCV=QPec$9#Y z@ioS`i&bM$q_D?k5SfGR6daRSyX6~&Pl9#!P+mzSY+}076K$-&EkkCoA-)Wv-4Ij= zyvU%9#dHK?xVzcAQtRFS5(RO5P2D0anO&?X1<@#6DNvld;fY|#ureo9gFhCe z@J2xQ3HE2GF8YKns`$wD0nz`UrX2>H!#IH?lk#`c%)@>`1CVYCVs>~IVEb-aFqgp) zkL6;+AH=Ew><(-rD>@av2PM46z+}2Vb6kp*3hpJ0EH#ZS@TdmuOyBPXDO`^>f831` zv?8OGS}tU?_KPcs9eD8`=q@@Ec*mH_=)PE?`*(uDwAZ2Q_+j)EK-%dV1!mk_N~{?( z4=M%!4I-56g@@1g>uECX{}7Y=LY^=uwPSlQ#2U+XsPnjafDEnCO3i(F)|NU^~Sm!t!SYHx+!w z?czSdfl&{^r%Gee(cIc3=%@3{WJma6x;|r_#dem`w1X2BV;xmY@-(Y-HKwDE?qvW| z4g=(X7wT?p|6k$VXd7#m4{d@qFVd|}6#D|RYWuGQG3Gu4B>_n{)?ILcqiG{}9=g?Yv^$5Iy&Ccljt4;^NA-YmY1eHB#Ggr$Kpm(yJY?A!M59G42~ zKXr%bE(KRcn3fyf5Tsa)usuhPBIXNrZ$%KMVH)p@iBdEaYl{_w2})zk8R(e1)!rg3 zxIsO%(uaiswjQ@@bWZ|H*4pv9_;M4xy_lfT0BjdyU>Bx6ut_wxxFrJLFY>KH#!feq zAg9L-(vJV(-^Bp(rk0^Aho4Sou!P4lJ6anD&R#dLiPCvwhb9K!xz5*jYtLmk%p#Qs zH*Y1ljXrHBPNEQCAf7}8r!koV-l!pv@R@Z9T&N->_OUpeJ} zMy@3#Os0DjEJU=eThGvHnUgZ_an-lRqqrTs^8d{7gUFmRy5zz%@sy86!LHj_)fgbTnmAEDWp_f{jqT0 zrt2ty)s4O94}L**UH|&-%Lo3AUR%x~3dg?$nh5biPVR{%=GkeskT$1EEa%~mrYA}3 zTR7jB$jIy8-ZMpx<1cOL{PbHwP(mJe1;UM-CDT$B6-BuhvH6NT_`-0^J-%1X>KN_G z7nhR9$kSUvO!R|`UE4d%KjV^b2e*`7xi?rn#l*?yc>HaXkL(NGda(1E$HPe7_blb` zeZsY@s~Xekl$K1bMAojf}aJaLNI zNvV^zcdmParkA>BW{nJ_r> zWqhP)@l!5>~V*(v{+j-PLdvNVW+ zf;KLmVasYyEa^n%(rjL+>r2n!qqGtkiGS;7$e@1tA|UAhn-Cy2ztX0b(@-zg{YFyJ6>b3}A|g8rs9zpC2<0F76>gXuT4}M#Q8u7i1FMjzKxKEPEgi+*~3yiPO zc(4;#|LKTQ8Dm|=s$t%iGuB~z`C9IM6SYWW#P{=(5WU*@<(rs!h+$~0s6now(zqEl z%cW9AP1-k2Dx0xL-TV^P*!0Vo#S*!gIW4<#Tj!fEBWM6!cY?$~JIAQhY&0LrM?AS; z-ndfN<`IdA937n%Nete2iOv%L5~XAi!YXu0WdIa}Y${aomjWugM)%R6aWZPbs>jH?-}pM! zbkKiPelARz+Dczdo12arn`=3p&P?9!t|~ut8+fYk4}%}?_6}Qn zr-tS`W1nIuKA>;8XQiR;cs*3X>4k5eQ#z9taAxxN+*b{AW1~_Tkd5kR5|1uA-g$VK zL)hlw!16lOROgqAcp>XFEim86|c7!p*^n&R2g+ z=c#A83zZ4hEA2(zEs`NzT3;lXo=5l@nl(v2@CKG=iHua96@p|ZJ1@UM>zQ6U0cF_? zlmZE5vt+B6Om&UFHOni=UadkQ*PL|eXp}q$j-+nC)gpWj1LF}cLtXDKhyQqyL1wgq&{2lDijMbMo-yg|;oe1yj9R zg!u`+WFUUp05`O5@FPRz-aWF$z<2t7)9pMF=(-!q;$1$0mpH>V8IQv4PGl<@l{{J{ z`+B)?GT6_JjYvemi+EyxXS$!e0@10<6edxyjfMDXfOWFBmzy9r$xwqtME3ph&=k4( zr-i=GbAYy@oksyFh0e1WRN;~$-B<`{Q?5|ajp$w)=kXr{+}QAH89BQBnKMs9Zalc2 zqsq2?0+BMNEh;Tat(A3|O35G?(fF_02Z}Wvb8<+w^f~g1mc>|@=ibf;%|JqAM1 zww5{`NZS{6u?9$EoYU}Ad%39*Nh$HA5j1fkZuY~yv~B)niU=uKN~>w6s9@6bhHyM8UO#lG`@-H0ve`bk`xH2YynBq> zI99f^)|4XaQqIKFU{z2uU=iJ(NiJ z3W2E0r4g3;@Hn?+c(nxNvqz^oA0Ov{18BttZE!(VRLc{yT^oPf-s0b*v|FbzKt6hk%)=n%m)$FSRWq{0yVGNhWgOIqv#*O z;LGPKxo|~OHRsB+hHyZr?yN};fHo4zwZD>!;GG|wgqCj~UTKrut_wHVx+fC$&P}_W zs+BgOlGP$2`{AY&k*Hfb%nr1tJvjX3b$7`u>wuMU-SFISc=+J()bQ}e-)($>$I3WD zu`)LDNEtHA$ygZ_DTAVi3~e1+x8WBXp5Cy$;hqgQY?!Ao9UIQxuxap5gD($0HTdPh zkFDY!`osDc*MDdIgFN?82HZn!-THm&*AKit@Y8`~1D_rE$ANbYBnDgq%7L8&J^jDz zf42W?{rC3Y*k9|vs^8YH=-<}g)AwrMvwdIdyRYx2zQw*P`z*(qhkC!?+v)xI@XNi| z_m+CO-b;JW>>cU(J)$kX)AL}@9V2J=T-%fF@%LQVb6U@a?l-!h@BU`@1Kl5PcVE+; z>~?i4yLWc?biLa3OxGh__jcXbwb*rKm!<21kypC5cFAO~$o^IKRoT6=n`Dc!D*-pM zJaYHQ2S(;cVk3r;O~Zd4{;rr+XIU^HWujD?*JkQ7IbAaq5t8|=woM(yl$t-t_*PU&%H&N;~cXxnOG z^hVZbGlg|?I%huGCBS}I&5P``qB`fTrR&j1G@>+pRA{7mE}UFc`4&BMAOdk|hkh(n zZ!Q95Lu*a3{um<%j7Oi41!^^?iUx(;9MEZ|wX;T_`of0ze8Q?y#8c^ZEfUhis;RX5 zN>SkVFDO-(aI5II=~}^pjSfzWT>4y^G)#u$y&AZePTH%3KU^u zsvfr+S)WZk{2yYuzleR|!hFRXHu^1Q<;C}i#Ray-+T3!zBVqQYhT8uw z3gS60yBN-@Qg$5KGg-F)24K~@!POYZ+fB2qhOxAA&IiQjm0VJpG`EU%eE}@Vv!~rG zl}cEw$4RoKrW*RG_|T!E7PwK zUocvg3}d&%l>nS|IyA#Zv0QJCG3IH|GS8`FMXh#1NXfTqOQs^L^x3k$n59`ur-tqm zIzn44Ta+G~P48wMmRzp)141=gPTyda%|tuc(gOHW{{haYB}1ulqI8q*Wv5 z3XJ%JPRo#PUox#dBPv7I#p9(tR2<*Lb2_R z`Gt&ZtEynuv!T-bOw3+VBc0xOp3ng*r(eO!5xrosCg)4?+@RR=DpMS6Ei<*0-7s7C zCN&CCWtFWaPAn7!PB~L@D?_QNdxd(Gi9l27s2IEpi#B~RICFru5)?01WprU7(F!gm zn~rc?soEy?q!MIJ?DS$R8PPbxWqs}vMy$uU7*bS{3S-=*n|9jO)>*M!tu3*k&~$Fz zRc=-^S+*qfJc}a+#%c&;5Ynu}Y9T5Dn=Is6b=%BkTz;QBW>IVq(x0ttG*;8-3av^c zZZ>z9r={%FDX!X=?MW7Y@lVMkOKKX{Swc%$qNNAkML+HbEJl__JCh9gXF09I$;`5~ z8TYWzm`1v)P+As}Dowo+R&jYoSp6)GS&Nr-H%g93-CoWaQw9O$3*}5y(eO1=$x=~~ zQf5!<6YFtls!VlSQ__YVDK9tc5$3w3VXEr^sWadeQqR@oO1UCbz};t{R8O!1*O;Xq(akUD9p#)sZg$V6&JcgM?lI1?Y;!gh zvzbk$a*7o|A}n=#c+Oh3Fva>}Oq=Q8JEQ`~|6dPjnEu~#)O9t|N9~Pdk%@pcv7FiF)#c7vPrIkG;mizTi zmSglt-B+}5F*7_PmbYzQD>Fa0Xqaue7u3_q%XFf^T-P!+lXBLOuf%lrgkFGZu+&ug z1QYiAStKr&z9u z6cuh`bJ}iH%_YOhad89|l$IphS~TZjI1q!E9sOtF`Dz6$U49O6GQ|{DyLM*i^P*tR z>tIr|`Fg@_F6nCNNx?z0RI|Ey){#%tnQUslVMx1Q5Hz|P_nX;LERo4@xvV#@7ced? zRo}Ey5%AP?k;OkCjDFh;ghLYI%gIYbUxK+v2IOrAy{8nOj}eN z1hZtB_cqnaa7$6DrQHdSb#_ButcOV?lvb6`?e%0LoP0WCy+ROF=A0~R@__k`U5GUE zGaDWgKA_@PXet&@Hkl7;XTo_`O)R!$%itWGi+C&u!%j~Qlc&G_`p&l1;hsU#t~0~9 z@(Qippx*WuzIv-ppAW*4`!m5g)x5u^i~NzV$Let9Eew1dw{fOnbNbl#3y(V-I8x6n zXrhj?s#2a$3<;P_Rs&O8P|kZ1mYA$%W)*CBNqk-jAIPR|r;D|$rlG0pP7{{}`(jbW z%qbcGpjudr`P6~9@VoY!%>%mHgkC*wn=xc`dxU!I3t036d5f0`YeTwH&MEqB_OuVl z{Y-AIPzJT8Uo-rS_`E-oR?L-s+ECS!o~}C5Lq`OGtsHeQ3QL2{I&{8;W?cI@;dd>G zhRPbKXM9;p%{((3zFasy->|Od;jW(zZWwpSK($&z_I>x42gtj>^_$5~Xg`OWzSuITB}DXQHlu6lS*4-KYJr?&0L1ZS9vqjQ zZpJC0L?+-IUtK+GN9VAaa{&!x`2@v;svLzYnfJqAO4UpnMV?%D0H;inViNyS%H0__ ziwnp`D~mxkRKs4!saMTr8(NY-8!t#o$xBBr^K^c7Hs_a(RWzQUQaSGoD!4?AK{O`q z_^DB8F%Bv1?#?sk;+2uPR@$vpTAkHc$^xY!s`I%6qmn`$Id;I{>MWnn-P1iL`DCFx zCiW@*xttqo%@248=XAGBe>N& zd@*_O0sScPskl=mdVf~M-7~ttWK4`QV9d`Z7uco;tU*VihjVJ2ph-kHqWr?~;1{!& zi)=+CCqnBCSwx6~W{w)+3$2 z{`$$AW#rG7avR1jTsM4L-@gu7dVV*U9r%3rR#|6kbpPqNX^SnNu@VGPT_{+9NKy=_ zt&6tcVj@G1&EUo&{4Q>EL?R=Is8Za1M|iaJm3MKJz9qJNf>i>bO-&Q1@4QaC#)Sh9 zmak_Ia7k4sh0+)$j}h7752(rBd*nl%gcWt}j4V?=1c6{ejZ@q_t1Yt*Q$ZKj!w!Wp z>(hGNfvgshqx+OoM1I>PJ38Odb4YcKEK^bhp%z6kmkqfJjmWfV-tN@^nj?l<%tqJ_ ziHID%-+funJlj| z`*li{`ec5K0-R^gjdqdo*(oNqAardk}j93v?k1jugVtVCABCur$qeX5*2qDmE zq;NTMG|P;JlM70)H_DAnto;ay*RJ{dqRhxUW7L|#WO$H{7t0~Sl+Rwk4$taqP&L^< zv9=T!eeb!1JV%jQ9SGA#mJ<@~ zumm9?DvzZHDZx>eSLXd{hSjQ1HoI#*O=PEk?$W<2_4f7$5q{^8t$%cAeB(b2>|f{T zyQ$}*u6xM7oAb(@N1`iyB#T9RM9-L<(K(A+Jzt8d$ zjs-uPb1+SFEN)fO=1z@Biix8B{MnsRBEJD4r5P?diL5x9or4vwiJk}6j2Zc2zNYZ4 zd$Zi=_?l0UmnOdS_v&E|eSye#WT*M+2(v{Vi4QpgNZc^l5ipU19v~qLY2B7~SFNNk<(KIYX z;)Cc4Q`6q$*R3x~ zPO;`5pE`4#OAPx#rf?Qm~=SyVd_1VeeBq~ieNK|T^S2pTQ0X;L7 zpDS1mm8hHJ+kk@|KPyC4}PILPUDjE zye3_+vI9fds3*-vw03nN6Dg~Je)swj7#m6P?d!vrb!P9N?VDacL66cZ7_DUnjMZg3 zP);LW#C+$tN%HBhawDTs*-7w{eGk(C^DR?G5<&S)cE8i4R7MNMg5RW40w{;?^UH6; zfJtTKm?Cw6eBp;c-1*vV_}pFIWlBsUM6V>H8g)~dcPq>Z6=!z?7Ls=@Z@LvdCXoRv z?Fqyp{}4Qiuii@Q@hmf_M+gtdX5)zC3Y7fCOgWY^l@qj{&E(-*u)kd`BCqRpB4Nvp ze?&EiYNEU^dLG|Kt!)}?tS;=+H3F(wDJN`_Uit_^Sl%XzAN}%F$7_!Oa?N=sw|7@` z84M?)Z&*<1S_ana4n$KbXWCoN(NO~5&7DvviHz(Ed=B6alt=7OcfvUwYnq+@7EYl( zGXOJ@*N*G+;$6^ZiHyAdr}vyoBZN1R@*%MPj((i`9qE%_YT0olzOtH{(=nx&sW$9N zz{<{+7s+LhV$6SX51Jwo(TLXLi|Idoit|#IFkqvIEMXEA6EqL2@+Y{_QK?LX9tqt8 z8~^5~unHlAG3U0Lk%t1Z#FhZ@L33M({!#1!RQGbDTh@AnT<|X~Rv;|=^u4EAh;F|R zi?A&lsFWBh>$k{tA*a>=Ue-s^<4@d&)=6a@*$Z(bAl&&GE;fNpAv{7)%Ppq~%$^oa zj5V|L<;l}kI_*i@cw~aU{aFOU>|_2eqz%%(pBtV)dSuWiN5T(M=a998#Mc;-mr3Pi z^up5p+@>vSJwV0+N*6FkPSpYA@aM1+dyibTvaU&V?703pA2@~n9beZzPhCQq&dx-U z`IpB&*UTbmyY3EJvb+lK*QhkQlX4c;ei*<(=lsoV7n+PQ=3F=A>-kIf-obYcpWgSc z1E0ap_%)ppHqW|tZPB9V4&E4mZb)I_!n_<{K^-62p4wcHtc;hXD!BW)J zJYapD;l}r>G+LeNq@FQKo+Dsk<7snucH$jszWmD+-d2dZGS3#g8fMmF&=&MF8a6h| z*GVq_63n1PMr7yv_uqa_YkTM6FVPrV-!cW+6*{UGnTh#W0Ge8z7Hu#PV}xq1KZ